ReynoldsÀÕË÷Èí¼þͨ¹ýǶÈëBYOVD½ûÓÃEDR°²È«¹¤¾ß

°ä²¼¹¦·ò 2026-02-12

1. ReynoldsÀÕË÷Èí¼þͨ¹ýǶÈëBYOVD½ûÓÃEDR°²È«¹¤¾ß


2ÔÂ10ÈÕ£¬£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶ÐÂÐÍÀÕË÷Èí¼þReynolds£¬£¬£¬ÆäÔØºÉÄÚǶBYOVD£¨×Ô´ø·ì϶Çý¶¯£©×é¼þ£¬£¬£¬Ö±½Ó¼¯³É´æÔÚ·ì϶µÄNsecSoft NSecKrnlÇý¶¯£¨CVE-2025-68947£©£¬£¬£¬ÔÚ²¿ÊðʱÖÕÖ¹Avast¡¢CrowdStrike Falcon¡¢Cortex XDRµÈ¶à¿î°²È«Èí¼þ¹ý³Ì£¬£¬£¬ÊµÏÖ·ÀÓù¶ã±Ü¡£¸Ã¼¼Êõ²¢·Ç³õ´´£¬£¬£¬´ËǰRyuk¡¢Obscura¼°Silver Fox×éÖ¯¾ùѡȡÀàËÆÊÖ·¨£¬£¬£¬ÀûÓúϷ¨Çý¶¯·ì϶¹Ø±Õ°²È«¹¤¾ßºóͶ·Å¶ñÒâÔØºÉ¡£ÐÐÒµÊý¾ÝÏÔʾ£¬£¬£¬2025ÄêÀÕË÷Èí¼þÐû³Æ¹¥»÷´ï4737Æð£¬£¬£¬½Ï2024Äê΢Ôö£»½öÇÔÈ¡Êý¾ÝʩѹµÄ¹¥»÷´ï6182Æð£¬£¬£¬Í¬±È¼¤Ôö23%¡£µÚËÄʱ¶È¾ùÔÈÊê½ðÖ§¸¶¶î´ï59.1ÍòÃÀÔª£¬£¬£¬»·±È±©ÕÇ57%£¬£¬£¬Ö÷ÒòÊǸ߶îºÍ½â°¸Æµ·¢¡£ÀÕË÷Èí¼þÖ¸±êÕý´Ó±¾µØÉ豸תÏòÔÆ´æ´¢£¬£¬£¬ÈçAWS S3Ͱ£¬£¬£¬Í¨¹ýÔÆÔ­ÉúÖ°ÄÜɾ³ý¡¢¸²¸ÇÊý¾Ý»òÇÔÈ¡Ãô¸ÐÄÚÈÝ¡£


https://thehackernews.com/2026/02/reynolds-ransomware-embeds-byovd-driver.html


2. ΢ÈíÉ̵êOutlook AgreeTo¼ÓÔØÏîÔâ½Ù³Ö


2ÔÂ11ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬Î¢Èí¹Ù·½ÀûÓÃÉ̵êÖеÄOutlook AgreeTo¼ÓÔØÏî±»ÆØÔâ½Ù³Ö£¬£¬£¬ÑݱäÎªÍøÂç´¹µö¹¤¾ß°ü£¬£¬£¬ÒÑÇÔÈ¡³¬4000¸öMicrosoftÕË»§Í´´¦¡¢ÐÅÓþ¿¨ºÅ¼°ÒøÐа²È«ÑéÖ¤´ð°¸¡£¸Ã²å¼þԭΪºÏ·¨»áÒéÆÌÅŹ¤¾ß£¬£¬£¬ÓɶÀÁ¢¿ª·¢ÕßÓÚ2022Äê12ÔÂÌá½»ÖÁMicrosoft Office¼ÓÔØÏîÉ̵꣬£¬£¬Ê¹ÓÃVercelÍйÜURL¡£Ö»¹Ü¿ª·¢ÕߺóÐøÉÕ»ÙÏîÄ¿£¬£¬£¬µ«²å¼þÈÔ±»Î¢ÈíÉÌÆÌ±£Áô£¬£¬£¬ÍþвÐÐΪÕ߳ûúÊÕÊÜÆä¹ÂÁ¢URL£¬£¬£¬Ö²Èë´¹µöÄ£¿£¿£¿é¡£¾Ý¹©¸øÁ´°²È«¹«Ë¾Koi Security×êÑÐÈËÔ±Åû¶£¬£¬£¬¹¥»÷Õß²¿ÊðÁËαÔìµÄ΢ÈíµÇÂ¼Ò³Ãæ¡¢ÃÜÂëÍøÂç±íµ¥¼°Êý¾Ýй¶¾ç±¾¡£Óû§Í¨¹ýOutlook´ò¿ª¸Ã²å¼þʱ£¬£¬£¬»áÏÔʾ²à±ßÀ¸ÖеļٵǼ½çÃæ£¬£¬£¬ÓÕÆ­ÊäÈëÕË»§ÐÅÏ¢¡£ÊäÈëµÄÍ´´¦½«Í¨¹ýTelegram»úеÈËAPIй¶ÖÁ¹¥»÷Õߣ¬£¬£¬Êܺ¦ÕßÔò±»Öض¨ÏòÖÁÕæÊµÎ¢ÈíµÇ¼ҳÒÔ½µµÍÒÉ»ó¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬²å¼þÉϼܺóÎÞÐè¶îÍâÑéÖ¤Á÷³Ì£¬£¬£¬Î¢Èí½öÔÚÌύʱÉóºËÇåµ¥Îļþ²¢¾ßÃûºË×¼¡£AgreeToÔøÍ¨¹ýÉóºË£¬£¬£¬ÆäËùÓÐ×ÊÔ´¾ù´Ó¿ª·¢Õß·þÎñÆ÷¼ÓÔØ£¬£¬£¬¶ø¸Ã·þÎñÆ÷ÏÖÒѱ»¹¥»÷Õß½ÚÖÆ¡£


https://www.bleepingcomputer.com/news/security/microsoft-store-outlook-add-in-hijacked-to-steal-4-000-microsoft-accounts/


3. LummaStealer½èCastleLoaderÓëClickFix¼¼Êõ¶«É½ÔÙÆð


2ÔÂ11ÈÕ£¬£¬£¬ÍøÂ簲ȫ¹«Ë¾Bitdefender×îл㱨ָ³ö£¬£¬£¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þLummaStealer×Ô2025Äê7Ô¸´Ô­ÔËÓªºó£¬£¬£¬ÓÚ2025Äê12ÔÂÖÁ2026Äê1ÔÂÆÚ¼äϰȾÁ¿ÏÔÖø¼¤Ôö¡£Õâ´ÎÀ©É¢ÖØÒªÒÀÀµÃûΪCastleLoaderµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷¼°ClickFix¼¼Êõ´«²¼Á´£¬£¬£¬Ðγɶà½×¶Î¹¥»÷ϵͳ¡£LummaStealer×÷Ϊ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨£¬£¬£¬ÔøÓÚ2025Äê5Ô±»¶à¹ú·¨Âɲ¿ÃŲé·â£¬£¬£¬·ÛËé2300¸öÓòÃû¼°ÖÐÑëÖ¸»Ó½á¹¹¡£È»¶ø£¬£¬£¬ÆäÔËÓª·½Í¨¹ýCastleLoaderʵÏÖ¼±¾ç¸´ËÕ¡£CastleLoaderѡȡÄ£¿£¿£¿é»¯ÄÚ´æÖ´ÐÐÄ£ÐÍ£¬£¬£¬½áºÏ¶à²ã»ìºÏ¼¼Êõ£¬£¬£¬¿ÉÔÚÄÚ´æÖнâÃܲ¢¼ÓÔØLummaStealerÓÐÐ§ÔØºÉ¡£Æä½Ã½ÝµÄºÅÁîÓë½ÚÖÆ£¨C2£©Í¨Ñ¶»úÖÆ¼°É³Ïä¼ì²âÄÜÁ¦£¬£¬£¬Ê¹ÆäÄܶã±Ü°²È«·ÖÎö²¢µ÷ÕûÓÆ¾Ã»¯Õ½Êõ£¬£¬£¬Í¨¹ý¸´ÖÆAutoIT¾ç±¾ÖÁÌØ¶¨õè¾¶¡¢²¿ÊðÚ¹ÊÍÆ÷¼°´´½¨Internet¿ì½Ý·½Ê½ÊµÏÖ¿ª»ú×ÔÆô¶¯¡£´«²¼õè¾¶·½Ã棬£¬£¬CastleLoaderͨ¹ýClickFix¼¼ÊõÖ´ÐÐÉç»á¹¤³Ì¹¥»÷£º£º£ºÓû§±»ÓÕµ¼ÖÁÐéαÑéÖ¤ÂëÒ³Ãæ£¬£¬£¬Ö´ÐмôÌù°åÖÐÔ¤ÉèµÄ¶ñÒâPowerShellºÅÁ£¬£¬×îÖÕ´Ó¹¥»÷Õß·þÎñÆ÷ÏÂÔØ²¢Ö´ÐÐCastleLoader£¬£¬£¬½ø¶ø¼ÓÔØLummaStealer¡£


https://www.bleepingcomputer.com/news/security/lummastealer-infections-surge-after-castleloader-malware-campaigns/


4. ApolloMDÔâÍøÂç¹¥»÷ÖÂ62.6Íò»¼ÕßÐÅϢй¶


2ÔÂ12ÈÕ£¬£¬£¬ÃÀ¹ú×ôÖÎÑÇÖݳÛÃûÒ½ÁƱ£½¡¹«Ë¾ApolloMD½üÈÕÅû¶£¬£¬£¬Æä2025ÄêÔâ·êÍøÂç¹¥»÷µ¼ÖÂ626,540Ãû»¼ÕßÃô¸ÐÐÅϢй¶£¬£¬£¬³ÉΪÃÀ¹úÒ½ÁÆÐÐÒµÓÖÒ»Â·ÖØ´óÊý¾Ý°²È«ÊÂÎñ¡£ApolloMDÊÇÒ»¼ÒΪȫÃÀ100Óà¼ÒÒ½ÔºÌṩ¶àר¿ÆÒ½Éú·þÎñµÄÒ½ÁƼ¯ÍÅ£¬£¬£¬ÔÚ18¸öÖÝÔËÓª³¬125¼ÒÕïËù£¬£¬£¬Äê½ÓÕïÁ¿Ô¼400ÍòÈ˴Ρ£Æ¾¾ÝÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿×îÐÂÎļþ£¬£¬£¬¸Ã¹«Ë¾ÓÚ2025Äê5ÔÂ22ÈÕÖÁ23ÈÕÆÚ¼äÔâ·êºÚ¿ÍÈëÇÖ£¬£¬£¬ÏµÍ³±»·¸·¨½Ó¼û²¢ÇÔÈ¡ÁË´óÁ¿»¼ÕßÊý¾Ý¡£Ð¹Â¶ÐÅÏ¢º­¸ÇÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µØÖ·¡¢Õï¶Ï¼Í¼¡¢¾ÍÕïÈÕÆÚ¡¢Ò½Öι滮¡¢½¡¿µ±£ÏÕÊý¾Ý¼°Éç»á±£ÏÕºÅÂëµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬ApolloMDËäÔÚ2025Äê9Ô¼´Í¨ÖªÊܺ¦ÕßÊý¾Ýй¶ÊÂÎñ£¬£¬£¬µ«Ö±ÖÁ2026Äê2ÔÂ10ÈÕ²ÅÏòÁª°î¼à¹Ü»ú¹¹ÆëÈ«Åû¶ÊÜÓ°ÏìÈËÊý¡£Õâ´ÎÊÂÎñÖУ¬£¬£¬÷è÷ëÀÕË÷Èí¼þÍÅ»ïÓÚ2025Äê6Ô¹«¿ªÐû³Æ¶Ô¹¥»÷ÕÆ¹Ü¡£


https://therecord.media/georgia-healthcare-company-data-breach-impacts-620000


5. CrazyÀÕË÷Èí¼þÍÅ»ïÀÄÓúϷ¨¼à¿Ø¹¤¾ßÖ´Ðй¥»÷


2ÔÂ11ÈÕ£¬£¬£¬Huntress×êÑÐÈËÔ±·¢ÏÖ£¬£¬£¬CrazyÀÕË÷Èí¼þÍÅ»ï³ÉÔ±Õýͨ¹ýÀÄÓÃNet Monitor for Employees ProfessionalºÍSimpleHelpµÈºÏ·¨Ô¶³ÌÖÎÀí¹¤¾ß£¬£¬£¬ÔÚÆóÒµÍøÂçÖгÉÁ¢ÓƾÃÐÔ½Ó¼û²¢¶ã±Ü¼ì²â¡£¸ÃÍÅ»ïÔÚ¶àÆð¹¥»÷ÊÂÎñÖУ¬£¬£¬ÀûÓÃWindows Installer¹¤¾ßmsiexec.exe´Ó¿ª·¢ÕßÍøÕ¾Ö±½Ó²¿Êð¼à¿Ø´úÀí£¬£¬£¬ÊµÏÖÔ¶³Ì×ÀÃæ²é¿´¡¢Îļþ´«ÊäºÍºÅÁîÖ´ÐÐµÈÆëÈ«½»»¥Ê½½Ó¼ûȨÏÞ¡£¹¥»÷Õßͨ¹ýÖ´ÐкÅÁîÆôÓñ¾µØÖÎÀíÔ±ÕË»§£¬£¬£¬²¢Í¨¹ýPowerShellÏÂÔØ¼Ù×°³ÉVisual Studio vshost.exeµÄSimpleHelp¿Í»§¶Ë£¬£¬£¬²¿ÊðOneDriveSvc.exeµÈ¼Ù×°Îļþ£¬£¬£¬ÐγÉÈßÓàÓÆ¾ÃÐÔ»úÖÆ£¬£¬£¬¼´±ãÔ±¹¤¼à¿Ø¹¤¾ß±»ÒƳý£¬£¬£¬ÈÔ¿Éͨ¹ýSimpleHelpά³ÖÔ¶³Ì½Ó¼û¡£¸ÃÍŻﻹͨ¹ýÅäÖÃ¼à¿Ø¹æ¶¨£¬£¬£¬ÔÚÉ豸½Ó¼û¼ÓÃÜÇ®±ÒÇ®°ü»òÔ¶³ÌÖÎÀí¹¤¾ßʱ´¥·¢¾¯±¨£¬£¬£¬Îª²¿ÊðÀÕË÷Èí¼þºÍ¼ÓÃÜÇ®±Ò͵ÇÔ×ö³ï±¸¡£ÈÕÖ¾ÏÔʾ£¬£¬£¬¹¥»÷´úÀí³ÖÐø¼à¿ØÇø¿éÁ´ä¯ÀÀÆ÷£¨Etherscan£©¡¢ÂòÂôËù£¨Binance£©¼°Ö§¸¶Æ½Ì¨£¨Payoneer£©Óйعؼü×Ö£¬£¬£¬²¢¼ì²âÔ¶³Ì½Ó¼û¹¤¾ß»î¶¯£¬£¬£¬Ðγɶàά¼à¿ØÏµÍ³¡£


https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/


6. WindowsÐÂÐ͹¥»÷£º£º£ºÉ繤Èë¿Ú+PythonºóÃų־ýÚÖÆ


2ÔÂ9ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬°²È«×êÑÐÈËÔ±ÖÒ¸æÆóÒµÐè·À±¸Ò»ÖÖÕë¶ÔWindows»·¾³µÄÐÂÐÍÍøÂç¹¥»÷»î¶¯£¬£¬£¬ÆäÖ÷ÌâÌØµãÊÇ¡°ÈëÇÖÖ»ÊÇÆðÍ·¶ø·ÇʵÏÖ¡±£¬£¬£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©³ÉÁ¢³õʼ½Ó¼ûºó£¬£¬£¬ÀûÓÃPython¹¤¾ß¡¢¶àºóÃż°Æ¾Ö¤ÇÔȡʵÏֳ־ýÚÖÆ²¢ºáÏòÉøÈë¡£¸Ã¹¥»÷ÒÔ¡°ClickFixʽ¡±Éç»á¹¤³ÌΪÆðµã£¬£¬£¬Í¨¹ýαÔìÃýÎóÐÂÎÅ»òÐéαITÌáÐÑÓÕÆ­Ô±¹¤Ö´ÐС°Windows+R¡±ºÅÁîÊäÈë¶ñÒâÖ¸Á£¬£¬¿´ËÆÀýÐвÙ×÷ʵÔòΪ¹¥»÷Õß´ò¿ªºóÃÅ¡£Î¢Èí¼Í¼µÄ¡°CrashFix¡±Õ½ÊõÓë´ËÓйØ£¬£¬£¬µ«ARC Labs·¢ÏÖÕâ´Î¹¥»÷¸ü¸´ÔÓ£¬£¬£¬¹¥»÷Õß²¿ÊðPythonÇý¶¯µÄºóÃż°·´ÉäÐÍDLLÖ²È뷨ʽ£¬£¬£¬Í¨¹ýWindowsÔ­Éú¹¤¾ßºÍPowerShellЭµ÷»î¶¯£¬£¬£¬Ô¤·ÀʹÓÃ×Ô½ç˵¶þ½øÖÆÎļþ£¬£¬£¬½µµÍ±»¼ì²â·çÏÕ¡£¹¥»÷µÄ¹Ø¼üÔÚÓÚÓÆ¾Ã»¯ÓëÀ©´ó½Ó¼û¡£ARC Labs·ÖÎöÏÔʾ£¬£¬£¬¹¥»÷Õßͬʱ²¿Êð¶à¸ö¶ÀÁ¢Ö²È뷨ʽ£¬£¬£¬²¢Ñ¡È¡¡°·´Éä¼ÓÔØDLLºóÃÅ¡±Éè¼Æ£¬£¬£¬¼´±ãµ¥Ò»õ辶¶³öÈÔ¿Éά³Ö½Ó¼û¡£ÕâÖֲַ㹤¾ßÕ½ÊõÄ£º£º£ºýÁ˾籾ÀÄÓÃÓ봫ͳ¶ñÒâÈí¼þµÄ½çÏÞ£¬£¬£¬Ôö³¤Á˶ϸùÄѶÈ¡£ÈëÇֺ󣬣¬£¬¹¥»÷´Ó×Ô¶¯»¯×ªÎª²Ù×÷Ô±Ö±½Ó²Î¼Ó£¬£¬£¬¹¥»÷Õß»æÖÆÍøÂçÍØÆË¡¢¼ø±ð¸ß¼Ûֵϵͳ£¬£¬£¬Í¨¹ýºáÏòÒÆ¶¯Ê¹Óñ»µÁƾ֤½øÐÐÉí·ÝÑéÖ¤£¬£¬£¬Ö¸±êÖ±Ö¸Éí·Ý»ù´¡ÉèÊ©¡£


https://cybernews.com/security/click-fix-access-broker-campaign-windows-python/