CharonÀÕË÷Èí¼þÈÚºÏAPT¼¼Êõ£¬£¬£¬Öж«¹«¹²²¿ÃÅÓ뺽¿ÕÒµÔ⾫׼½ø¹¥
°ä²¼¹¦·ò 2025-08-151. CharonÀÕË÷Èí¼þÈÚºÏAPT¼¼Êõ£¬£¬£¬Öж«¹«¹²²¿ÃÅÓ뺽¿ÕÒµÔ⾫׼½ø¹¥
8ÔÂ13ÈÕ£¬£¬£¬ÍøÂ簲ȫ»ú¹¹Ç÷Ïò¿Æ¼¼½üÈÕÅû¶£¬£¬£¬Ò»ÖÖÃûΪCharonµÄÐÂÐÍÀÕË÷Èí¼þÕýÒÔÖж«¹«¹²²¿Ãźͺ½¿ÕҵΪָ±êÌáÒé¹¥»÷£¬£¬£¬Æä¼¼Êõ¸´ÔÓ¶È´ïµ½¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©¼¶±ð¡£¡£×êÑÐÏÔʾ£¬£¬£¬¹¥»÷ÕßѡȡDLL²àÔØ¡¢¹ý³Ì×¢Èë¼°EDRÌӱܼ¼Êõ¹¹½¨¹¥»÷Á´£¬£¬£¬ÓëÔøÕë¶ÔÑÇÌ«µ±¾ÖÖ¸±êµÄEarth Baxia APT×éÖ¯´æÔÚÏÔÖø¼¼ÊõÖØµþ£¬£¬£¬µ«µ±Ç°Ö¤¾ÝÉв»¼°ÒÔÈ·ÈÏÖ±½Ó¹ØÁª¡£¡£Õâ´Î¹¥»÷ÒԺϷ¨ä¯ÀÀÆ÷ÎļþEdge.exeΪÈë¿Ú£¬£¬£¬Í¨¹ý²àÔØ¶ñÒâmsedge.dll×îÖÕ²¿ÊðCharonÀÕË÷Èí¼þ¡£¡£¸ÃÈí¼þ¾ß±¸¶àÖØ·ÛËéÐÔÖ°ÄÜ£º£º£ºÖÕÖ¹°²È«·þÎñ¡¢É¾³ý¾íÓ°¸±±¾Ó뱸·ÝÒÔ¹ÊÕϸ´Ô£¬£¬£¬Ñ¡È¡¶àÏ̼߳ÓÃܼ¼ÊõÌáÉýÎļþËø¶¨Ð§ÄÜ£¬£¬£¬²¢¼¯³É»ùÓÚ¿ªÔ´Dark-KillÏîÖ÷ÕÅÇý¶¯·¨Ê½£¬£¬£¬¿Éͨ¹ý¡°×Ô´øÒ×Êܹ¥»÷Çý¶¯·¨Ê½£¨BYOVD£©¡±¹¥»÷½ûÓÃEDR·À»¤£¬£¬£¬Ö»¹ÜÕâ´Î¹¥»÷ÖиÃÖ°ÄÜδ±»´¥·¢£¬£¬£¬°µÊ¾ÆäÈÔ´¦ÓÚ²âÊԽ׶Ρ£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬¹¥»÷ÕßʹÓö¨ÖÆ»¯ÀÕË÷ÐÅÃ÷È·Ìá¼°Êܺ¦×éÖ¯Ãû³Æ£¬£¬£¬Ö¤Êµ´ËΪÕë¶ÔÐÔÐж¯¡£¡£Ö»¹Ü¹¥»÷Á´Öжþ½øÖÆÎļþÓëEarth Baxiaº¹ÇàÊÖ·¨¸ß¶ÈÀàËÆ¡£¡£Ä¿Ç°²»×ã¹²Ïí»ù´¡ÉèÊ©»ò¹¥»÷ģʽµÈÈ·ÔäÖ¤¾Ý£¬£¬£¬½öÄÜÅж¨´æÔÚ¡°ÓÐÏÞµ«ÏÔÖøµÄ¼¼ÊõÇ÷ͬ¡±¡£¡£
https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html
2. EfimerľÂíºá¿ç2024-2025Ä꣬£¬£¬È«ÇòÎåǧÓû§Ïݸ´ºÏÐÍÍøÂç·¸×ïÉú̬
8ÔÂ13ÈÕ£¬£¬£¬¿¨°Í˹»ù½üÈÕÅû¶£¬£¬£¬×Ô2024Äê10Ô³õ´Î·¢ÏÖÒÔÀ´£¬£¬£¬EfimerľÂí²¡¶¾ÒѳÖÐø»îÔ¾ÖÁ2025Ä꣬£¬£¬Í¨¹ýαÔì˾·¨ÉêÃ÷´¹µöÓʼþ¡¢ÈëÇÖWordPressÍøÕ¾¼°¶ñÒâÖÖ×ÓÎļþÈý´óÇþµÀ£¬£¬£¬Ï°È¾È«Çò³¬¹ý5000ÃûÓû§£¬£¬£¬Ðγɼ¯¼ÓÃÜÇ®±ÒÇÔÈ¡¡¢ÍøÕ¾±©Á¦ÆÆ½âÓëÀ¬»øÓʼþ·Ö·¢ÓÚÒ»ÌåµÄ¸´ºÏÐÍÍøÂç·¸×ïÉú̬¡£¡£¸ÃľÂíµÄÖ÷Ìâ¹¥»÷¼¿Á©Ô̺¬ÈýÖØÎ¬¶È£º£º£ºÆäÒ»£¬£¬£¬Í¨¹ý¼Ù×°³ÉÆóÒµÂÉʦµÄ´¹µöÓʼþÖ´ÐÐÉç»á¹¤³Ì¹¥»÷£¬£¬£¬ÓÕµ¼Êܺ¦Õß´ò¿ªº¬¶à½×¶Î¾ç±¾µÄ¸½¼þ£¬£¬£¬Ö²ÈëľÂíºóÒÔÐéαÃýÎóÐÅÏ¢¸²¸Ç»î¶¯ºÛ¼££»Æä¶þ£¬£¬£¬Õë¶ÔWordPressÍøÕ¾ÌáÒ鱩Á¦ÆÆ½â£¬£¬£¬ÀûÓÃά»ù°Ù¿Æ´Ê»ãÌìÉúÖ¸±êÓòÃûÁÐ±í²¢²âÊÔ´óÁ¿ÃÜÂ룬£¬£¬³É¹¦ÈëÇÖºó°ä²¼¶ñÒâÎļþ»òͨ¹ýαÔìµçÓ°ÖÖ×Ó´«²¼ÁíÒ»Efimer±äÖÖ£¬£¬£¬¸½´øTron¡¢SolanaµÈαÔìÇ®°ü£»ÆäÈý£¬£¬£¬²¿ÊðÃûΪ"Liame"µÄ¾ç±¾´ÓÖ¸¶¨ÍøÕ¾×¥È¡ÓʼþµØÖ·£¬£¬£¬¹¹½¨¾«×¼Ú¿ÆÖ¸±ê¿â¡£¡£Êý¾ÝÏÔʾ£¬£¬£¬2024Äê10ÔÂÖÁ2025Äê7Ô¼䣬£¬£¬°ÍÎ÷³ÉΪ×î´óÊܺ¦¹ú£¬£¬£¬Ó¡¶È¡¢Î÷°àÑÀ¡¢¶íÂÞ˹¡¢Òâ´óÀû¼°µÂ¹ú½ôËæÆäºó¡£¡£
https://hackread.com/efimer-trojan-crypto-hacks-wordpress-torrents-phishing/
3. Ä«Î÷¸çCFE 600GBÊý¾Ýй¶¶³ö¹Ø¼üµçÁ¦»ù´¡ÉèÊ©ÍøÂç·çÏÕ
8ÔÂ13ÈÕ£¬£¬£¬×êÑÐÈËÔ±½üÈÕÅû¶£¬£¬£¬Ä«Î÷¸ç¹úÓеçÁ¦¹«Ë¾Áª°îµçÁ¦Î¯Ô±»á£¨CFE£©Ôâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ÆäÍøÂçºÍÍþв¾¯±¨ÈÕ־ͨ¹ýµÚÈý·½°²È«¹«Ë¾TelikoÖÎÀíµÄKibanaʵÀý¹«¿ªÂ¶³ö£¬£¬£¬Êý¾ÝÁ¿³¬¹ý600GB¡£¡£×÷ΪΪīÎ÷¸ç99%È˶¡¹©µçµÄÖ÷ÌâÄÜÔ´»ú¹¹£¬£¬£¬CFEÕâ´ÎйÃÜÊÂÎñ±»ÆÀ¹ÀΪ¿ÉÄÜÍþвȫ¹úµçÁ¦¹©¸ø°²È«µÄÖØ´ó·çÏÕ¡£¡£Ð¹Â¶Êý¾Ýº¸ÇÔ±¹¤É豸DNS²éÎʼͼ¡¢½Ó¼ûµÄURL¡¢Éî¶È°ü¼ì²â£¨DPI£©ÈÕÖ¾¼°·´¶ñÒâÈí¼þ¹¤¾ßÌìÉúµÄ¾¯±¨£¬£¬£¬¹¦·ò¿ç¶È¿É×·ÒäÖÁ2021Äê11Ô¡£¡£ÕâЩÈÕÖ¾ÓÉÍйܼì²âÓëÏìÓ¦£¨MDR£©½â¾ö¹æ»®AIsaacÌìÉú£¬£¬£¬¾ßÌå¼Í¼ÁËCFEÄÚ²¿ÍøÂç¼Ü¹¹¡¢Ò×Êܹ¥»÷É豸¼°·þÎñÁÐ±í¡£¡£°²È«×¨¼ÒÖ¸³ö£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý¶ÈÎö´ËÀàÊý¾Ý»æÖÆCFE°²È«·ÀÓùͼÆ×£¬£¬£¬¼ø±ðÓÄ΢»·½Ú²¢Ö´Ðо«×¼¹¥»÷¡£¡£³ýÔËÓªÍþвÍ⣬£¬£¬Ô±¹¤»¥ÁªÍø»î¶¯ÈÕÖ¾µÄй¶»¹×é³ÉÒþÖÔ·çÏÕ¡£¡£¹¥»÷Õß¿ÉÀûÓÃÓòÃûʹÓÃģʽע²á·ÂðÓòÃû£¬£¬£¬½áºÏй¶µÄÄÚ²¿¹¤¾ßÐÅÏ¢ÌáÒé¸ß¶ÈÕæÇеÄÓã²æÊ½ÍøÂç´¹µö¡£¡£
https://cybernews.com/security/cfe-data-leak-mexico-critical-infrastructure/
4. Crypto24ÀÕË÷Èí¼þÀûÓÃ×Ô½ç˵EDR¶ã±Ü¹¤¾ß¹¥»÷´óÐÍ×éÖ¯
8ÔÂ14ÈÕ£¬£¬£¬2024Äê9Ô³õ´Î±»ÆØ¹âµÄCrypto24ÀÕË÷Èí¼þ×éÖ¯Ëäδ¹ãΪÈËÖª£¬£¬£¬µ«ÆäÕë¶ÔÈ«Çò½ðÈÚ¡¢ÖÆ×÷¡¢¿Æ¼¼µÈÁìÓò¸ß¼ÛÖµÖ¸±êµÄ¶¨Ïò¹¥»÷ÒÑÒý·¢°²È«½ç¹Ø×¢¡£¡£Ç÷Ïò¿Æ¼¼×êÑÐÅú×¢£¬£¬£¬¸Ã×éÖ¯ºÜ¿ÉÄÜÓɳÛÃûÀÕË÷Èí¼þÍÅ»ïǰ³ÉÔ±×齨£¬£¬£¬Õ¹Ê¾³ö¸ß¶ÈµÄ¼¼Êõ³ÉÊì¶ÈÓëÕ½ÊõÒñ±ÎÐÔ¡£¡£Æä¹¥»÷Á´ÒÔ¶¨ÖÆ»¯¹¤¾ßΪÖ÷Ì⣬£¬£¬ÐγɴӳõʼÈëÇÖµ½Êý¾ÝÍâйµÄÈ«Á÷³ÌÍþвϵͳ¡£¡£ÔÚÈëÇֽ׶Σ¬£¬£¬¹¥»÷Õßͨ¹ý¼¤»îWindowsĬÈÏÖÎÀíÔ±ÕË»§»ò´´½¨ÐÂÓû§ÊµÏÖÓÆ¾Ã»¯½Ó¼û£¬£¬£¬Ëæºó²¿ÊðÅú´¦Öþ籾Óëϵͳö¾ÙºÅÁî·¢Õ¹¿úËÅ£¬£¬£¬´´½¨ÃûΪWinMainSvcµÄ¼üÅ̼ͼ·þÎñÓëMSRuntimeÀÕË÷Èí¼þ¼ÓÔØÆ÷¡£¡£Îª¶ã±Ü°²È«¼ì²â£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËRealBlindingEDR¹¤¾ßµÄ±äÖÖ£¬£¬£¬Í¨¹ý¶ÈÎöÄÚºËÇý¶¯ÔªÊý¾ÝÆ¥ÅäÓ²±àÂë³§ÉÌÁÐ±í£¬£¬£¬º¸ÇÇ÷Ïò¿Æ¼¼¡¢¿¨°Í˹»ù¡¢SentinelOneµÈ12¼Ò°²È«³§ÉÌ£¬£¬£¬Õë¶ÔÐÔ½ûÓÃÄں˼¶·À»¤¹³×Ó¡£¡£Êý¾ÝÇÔÈ¡»·½Ú£¬£¬£¬Crypto24Ñ¡È¡Ë«ÖØ¼¿Á©£º£º£º¼üÅ̼ͼÆ÷¼Ù×°³É"Microsoft Help Manager"£¬£¬£¬²¶»ñÔ̺¬Ö°ÄܼüÔÚÄÚµÄÓû§²Ù×÷Óë´°¿Ú±êÌ⣻ºáÏòÒÆ¶¯Ôòͨ¹ýSMB¹²ÏíʵÏÖ£¬£¬£¬×îÖÕÀûÓö¨ÖÆWinINET API¹¤¾ß½«Êý¾Ýй¶ÖÁGoogle Drive¡£¡£ÀÕË÷½×¶Î£¬£¬£¬¹¥»÷ÕßÔÚɾ³ýϵͳ¾íÓ°¸±±¾ºó´¥·¢¼ÓÃÜ·¨Ê½¡£¡£
https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/
5. ¼ÓÄôóÏÂÒéÔºÔâÍøÂç¹¥»÷Êý¾Ýй¶£¬£¬£¬Î¢Èí·ì϶³ÉÍ»ÆÆ¿Ú
8ÔÂ14ÈÕ£¬£¬£¬¼ÓÄôóÏÂÒéÔºÕýµ÷²éÒ»Â·ÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬¹¥»÷Õßͨ¹ýÀûÓÃ΢Èí½üÆÚÅû¶µÄ°²È«·ì϶£¬£¬£¬³É¹¦ÇÔȡԱ¹¤Ãô¸ÐÐÅÏ¢²¢ÈëÇÖÖÎÀíÏÂÒéÔºÍÆËã»ú¼°Òƶ¯É豸µÄÖ÷ÌâÊý¾Ý¿â¡£¡£¾Ý¼ÓÄôó¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬ÏÂÒéÔº¹¤×÷ÈËÔ±ÒÑÓÚÖÜһͨ¹ýÓʼþÊÕµ½Î¥¹æÍ¨Öª£¬£¬£¬µ«¹Ù·½ÉÐδ¹«¿ªÉêÃ÷ÊÂÎñϸ½Ú¡£¡£Õâ´Î¹¥»÷ÖУ¬£¬£¬ÍþвÐÐΪÕßÀûÓÃ΢Èí²úÆ·ÖеÄδÐÞ²¹·ì϶»ñÈ¡Êý¾Ý¿â½Ó¼ûȨÏÞ£¬£¬£¬µÁÈ¡ÁËÔ̺¬Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢°ì¹«µØÖ·¼°µç×ÓÓʼþµØÖ·ÔÚÄڵķǹ«¿ªÊý¾Ý¡£¡£ÏÂÒéÔºÒѶ½´ÙÓйØÈËÔ±¾¯ÌèÀûÓñ»µÁÐÅÏ¢Ö´ÐеÄÚ²ÆÐÐΪ£¬£¬£¬Èç¼ÙÒâÒéÔ±»ò½øÐÐÚ¿Æ¡£¡£¼ÓÄôóÍøÂ簲ȫÖÐÐÄÈ·ÈÏÕýÔÚÐÖúµ÷²é£¬£¬£¬µ«Î´½«¹¥»÷¹éÒòÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬Ç¿µ÷ÍøÂçÊÂÎñ¹éÒòÐèºÄ·Ñ×ÊÔ´Ó빦·ò£¬£¬£¬Éæ¼°¶à·´¸´Ôӳɷ֡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬¹¥»÷ÕßÀûÓõķì϶¿ÉÄÜÓë΢Èí½üÆÚÅû¶µÄÁ½¸ö¸ßΣ·ì϶Óйأº£º£ºCVE-2025-53770£¨ToolShell£©ºÍCVE-2025-53786¡£¡£ÆäÖУ¬£¬£¬CVE-2025-53770×Ô7Ô³õÆð±»¶à¹úÍþв¼¯Ìå¿í·ºÀûÓã»¶øCVE-2025-53786×÷ΪMicrosoft Exchange·ì϶£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÔÆ»·¾³ÖкáÏòÒÆ¶¯£¬£¬£¬Òѱ»ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÁÐΪ´¹Î£Ö¸Á£¬£¬ÒªÇó·Ç¾üÊ»ú¹¹Á¢¼´ÐÞ²¹¡£¡£
https://www.bleepingcomputer.com/news/security/canadas-house-of-commons-investigating-data-breach-after-cyberattack/
6. ŲÍþ²¼À×â¸ñ´ó°ÓÔâÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷
8ÔÂ14ÈÕ£¬£¬£¬Å²Íþ²¼À×â¸ñ´ó°ÓÓÚ2025Äê4ÔÂÔâ·êÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷£¬£¬£¬Æä¹Ø¼üÊý×Ö½ÚÖÆÏµÍ³±»ÈëÇÖ£¬£¬£¬Á÷³ö·§Ãű»¶ñÒâ´ò¿ª£¬£¬£¬µ¼Ö³¬¹ý720ÍòÉý£¨190Íò¼ÓÂØ£©Ë®Á÷³ö¡£¡£Õâ´ÎÊÂÎñ±»Å²Íþ¾¯Ô±°²È«¾Ö£¨PST£©ÊÓΪ¶íÂÞ˹¶Ô¹Ø¼ü»ù´¡ÉèʩԶ³Ì¹¥»÷ÄÜÁ¦µÄÌåÏÖ£¬£¬£¬µ«¸üÆ«²îÒò¶øÒ»´Î¡°ÄÜÁ¦Õ¹Ê¾¡±¶ø·ÇÄÚÈÝÐÔ·ÛËé¡£¡£¾ÝPSTÕÆ¹ÜÈ˱´æ«ÌØ¡¤¸Ê¼Ó˹ÔÚ°¢Â×´ï¶ûËÕ¿¨È«¹úÂÛ̳ÉÏй©£¬£¬£¬ºÚ¿ÍÐÐΪµÄÖ÷±êÌâ±ê²¢·ÇÖ±½ÓÔì³ÉÎïÀíÇÖº¦£¬£¬£¬¶øÊÇͨ¹ý¹«¿ªÑÝʾ¼¼ÊõÄÜÁ¦Ê©¼ÓÉúÀíÓ°Ï죬£¬£¬ÔÚÃñÖÚÖÐÖÆ×÷Õð¾ªÓ벻ȷ¶¨ÐÔ¡£¡£ÕâÒ»ÅжÏÓëŲÍþ¹ú¶ÈÐÌʵ÷²é¾Ö£¨Kripos£©µÄµ÷²é½áÂÛÒ»Ö£º£º£ººÚ¿ÍÔÚTelegramƽ̨°ä²¼ÁËÒ»¶ÎÈý·ÖÖÓÊÓÆµ£¬£¬£¬Õ¹Ê¾´ó°Ó½ÚÖÆÃæ°å²Ù×÷½çÃæ£¬£¬£¬²¢´øÓÐÓëÇ×¶íÍøÂç·¸×ï×éÖ¯¹ØÁªµÄˮӡ¡£¡£´ËÀàÐÐΪ´ËÇ°ÔøÓëSandworm (APT44) µÈ¹ú¶ÈÖ§³ÖµÄ×éÖ¯Óйأ¬£¬£¬±»ÓÃÓÚ¿ä´óÍþвÉêÃ÷£¬£¬£¬¼ÈÐßÈèÊܹ¥»÷·½£¬£¬£¬ÓÖÏòÎ÷·½´«µÝÍøÂçÕ½ÄÜÁ¦Ðźš£¡£ÊÂÎñÖУ¬£¬£¬´ó°ÓÖÎÀíÔ±ºÄʱԼËÄСʱ²Å·¢ÏÖ·§ÃÅÒì³£²¢ÐÞ¸´ÉèÖ㬣¬£¬µ«Ð¹Â©ÒѶԲ¿ÃÅË®Á÷µ÷¿Ø²úÉúÓ°Ïì¡£¡£Ö»¹ÜŲÍþÓë¶íÂÞ˹δ´¦ÓÚÖ±½ÓÕ½Õù״̬£¬£¬£¬µ«ÆÕ¾©ÕþȨÕýͨ¹ý»ìºÏÕ½Õù¼¿Á©Î¬³Ö¶ÔÎ÷·½µÄÑÏÖØÑ¹Á¦¡£¡£
https://www.bleepingcomputer.com/news/security/pro-russian-hackers-blamed-for-water-dam-sabotage-in-norway/


¾©¹«Íø°²±¸11010802024551ºÅ