Æ»¹û°ä²¼´¹Î£°²È«¸üУ¬½¨¸´iOS/iPadOS¸ßΣ·ì϶CVE-2025-2420

°ä²¼¹¦·ò 2025-02-12

1. Æ»¹û°ä²¼´¹Î£°²È«¸üУ¬½¨¸´iOS/iPadOS¸ßΣ·ì϶CVE-2025-24200


2ÔÂ11ÈÕ£¬Æ»¹û¹«Ë¾ÖÜÒ»°ä²¼ÁËÒ»ÏîÕë¶ÔiOSºÍiPadOSµÄ°²È«¸üУ¬Ö¼ÔÚ½¨¸´CVE-2025-24200·ì϶£¬¸Ã·ì϶¾Ý³ÆÒѱ»¿í·ºÀûÓᣴ˷ì϶ΪÊÚȨÎÊÌ⣬ÔÊÐí¶ñÒâÐÐΪÕßÔÚÎïÀí½Ó´¥É豸µÄÇé¿öÏ£¬Í¨¹ýÍøÂçÎïÀí¹¥»÷½ûÓÃUSBÏÞ¶Èģʽ£¬¸ÃģʽּÔÚ×èֹδÊÚȨÅä¼þ½Ó¼ûÉ豸Êý¾Ý¡£´ËÖ°ÄÜÕý±¾ÓÃÓÚ·À±¸·¨ÂÉ»ú¹¹Ê¹ÓõÄÊý×Öȡ֤¹¤¾ßδ¾­ÊÚȨ½Ó¼ûÉ豸¡£Æ»¹û°µÊ¾£¬¸Ã·ì϶ÒÑͨ¹ý¸Ä½ø×´Ì¬ÖÎÀíµÃµ½½¨¸´£¬µ«ÈÏ¿ÉÒÑÓл㱨ָ³ö¸Ã·ì϶¿ÉÄܱ»ÓÃÓÚÕë¶ÔÌØ¶¨Ö¸±êÈËȺµÄ¸´ÔÓ¹¥»÷¡£¶àÂ×¶à´óѧÃÉ¿ËѧԺ¹«Ãñ³¢ÊÔÊҵݲȫ×êÑÐÔ±±È¶û¡¤Âí¶ûÔú¿ËÒò·¢ÏÖ²¢»ã±¨´Ë·ì϶¶øÊܵ½ÔÞÃÀ¡£Õâ´Î¸üкÏÓÃÓÚ¶à¿îiPhoneºÍiPadÉ豸¼°Æä¶ÔÓ¦µÄiOSºÍiPadOS°æ±¾¡£´Ë±í£¬Æ»¹û½üÆÚ»¹½¨¸´ÁËCore Media×é¼þÖеÄÁíÒ»¸ö°²È«·ì϶£¬¸Ã·ì϶Òѱ»ÓÃÓÚ¹¥»÷iOS 17.2֮ǰµÄ°æ±¾¡£Æ»¹ûÈí¼þµÄÁãÈÕ·ì϶³£±»Ã³Ò×¼à¿ØÈí¼þ¹©¸øÉÌÀûÓ㬲¿Êð¸´ÔÓ·¨Ê½´ÓÊܺ¦É豸ÖÐÌáÈ¡Êý¾Ý£¬Ö»¹ÜÕâЩ¹¤¾ß£¨ÀýÈç NSO ¼¯ÍŵÄPegasus£©ÓÐʱ±»Ðû´«ÎªÓÃÓÚ½ø¹¥ÑϳÁ·¸×ï»î¶¯£¬µ«Ò²´æÔÚÀÄÓ÷çÏÕ¡£NSO¼¯ÍųÁÉ꣬ÆäPegasusÈí¼þ²»ÊÇ´ó¹æÄ£¼à¿Ø¹¤¾ß£¬²¢ÒÑ»ñµÃºÏ·¨»ú¹¹µÄÊÚȨ¡£


https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html


2. OmniGPTÔâºÚ¿ÍÈëÇÖ£¬3400ÍòÓû§¶Ô»°Êý¾Ýй¶


2ÔÂ11ÈÕ£¬Ò»ÃûºÚ¿ÍÔÚBreach ForumsÉÏÐû³ÆÒѾ­ÈëÇÖÁËÊ¢ÐеÄÈËΪÖÇÄÜ̸Ìì»úеÈ˺ͳö²úÁ¦Æ½Ì¨OmniGPT£¬²¢Ð¹Â¶ÁË30,000¸öÓû§µÄµç×ÓÓʼþ¡¢µç»°ºÅÂëÒÔ¼°³¬¹ý3400ÍòÐÐÓû§¶Ô»°¡£Õâ´Îй¶µÄÄÚÈÝÔ̺¬Óû§Óë̸Ìì»úеÈËÖ®¼äµÄÐÂÎÅ»¥»»¡¢ÉÏ´«ÎļþµÄÁ´½Ó£¬ÆäÖÐһЩÎļþÔ̺¬Æ¾Ö¤¡¢Õ˵¥ÐÅÏ¢ºÍAPIÃÜÔ¿¡£ÈôÊÇÕâЩÐÅÏ¢µÃµ½Ö¤Êµ£¬Õ⽫³ÉΪÈËΪÖÇÄܶԻ°Êý¾Ý×î´óµÄй¶ÊÂÎñÖ®Ò»£¬Ê¹Óû§Ãæ¶ÔÉí·Ý͵ÇÔ¡¢ÍøÂç´¹µöÚ¿Æ­ºÍ½ðÈÚڲƭµÄÍþв¡£Ð¹Â¶µÄÊý¾Ý¼¯ÖÐÔ̺¬Óû§»áÉ̸÷ÀàÖ÷ÌâµÄ̸ÌìÐÅÏ¢£¬ÒÔ¼°Ö¸Ïò´æ´¢ÔÚOmniGPT·þÎñÆ÷ÉϵÄÃô¸ÐÎĵµµÄÁ´½Ó£¬Èç°ì¹«ÊÒÏîÄ¿¡¢´óѧ×÷Òµ¡¢Êг¡·ÖÎö»ã±¨µÈ¡£Õâ´ÎйÃÜÊÂÎñ¿ÉÄÜ»á¸øOmniGPT´øÀ´ÑϳÁµÄ˾·¨ºÍ¼à¹ÜÌôÕ½£¬ÓÈÆäÊÇÔÚÅ·ÖÞµÄGDPRºÏ¹æ·½Ãæ¡£OmniGPTÉÐδ¾Í´Ëʰ䷢¹Ù·½»ØÓ¦£¬µ«Óû§¸Ãµ±¼´²ÉȡԤ·À´ëÊ©±£»¤×Ô¼ºµÄÊý¾Ý£¬Èç¸ü¸ÄÃÜÂë¡¢ÆôÓÃË«³É·ÖÉí·ÝÑéÖ¤£¬²¢Î¬³Ö¾¯Ìè¼à¿Øµç×ÓÓʼþºÍ½ðÈÚÕË»§¡£


https://hackread.com/omnigpt-ai-chatbot-breach-hacker-leak-user-data-messages/


3. SandwormºÚ¿Í×éÖ¯ÀûÓöñÒâWindows¼¤»îÆ÷¹¥»÷ÎÚ¿ËÀ¼Óû§


2ÔÂ11ÈÕ£¬¶íÂÞ˹¾üÊÂÍøÂç¼äµý×éÖ¯SandwormÀûÓÃľÂí²¡¶¾MicrosoftÃÜÔ¿ÖÎÀí·þÎñ£¨KMS£©¼¤»î·¨Ê½ºÍÐéαµÄWindows¸üУ¬Õë¶ÔÎÚ¿ËÀ¼µÄWindowsÓû§ÌáÒéÁËһϵÁй¥»÷¡£¾ÝEclecticIQÍþв·ÖÎöʦָ³ö£¬ÕâЩ¹¥»÷¿ÉÄÜʼÓÚ2023Äêµ×£¬ËüÃÇÓëSandwormºÚ¿Í×éÖ¯ÓµÓгÁµþµÄ»ù´¡ÉèÊ©¡¢Ò»ÖµÄÕ½ÊõºÍ¼¼Êõ·¨Ê½£¬²¢Ê±Ê±Ê¹ÓÃProtonMailÕÊ»§×¢²á¹¥»÷ÓòÃû¡£¹¥»÷Õß»¹Í¨¹ýBACKORDER¼ÓÔØÆ÷²¿ÊðÁËDarkCrystal RAT£¨DcRAT£©¶ñÒâÈí¼þ£¬²¢ÒýÓöíÓï¹¹½¨»·¾³£¬½øÒ»²½¼ÓÇ¿Á˶íÂÞ˹¾ü·½ºÚ¿ÍµÄÏÓÒÉ¡£EclecticIQ·¢ÏÖÁËÓëͳһ¶ñÒâ»î¶¯¼¯ÈºÓÐ¹ØµÄÆß¸ö´«²¼»î¶¯£¬Ã¿¸ö»î¶¯¶¼Ê¹ÓÃÁËÀàËÆµÄµö¶üºÍÕ½Êõ¡£×î½üµÄÒ»´Î¹¥»÷²úÉúÔÚ2025Äê1ÔÂ12ÈÕ£¬·ÖÎöʦ¹Û²ìµ½¹¥»÷ÕßʹÓÃDcRATÔ¶³Ì½Ó¼ûľÂí£¬Í¨¹ýƴдÃýÎóµÄÓòÃûϰȾÊܺ¦Õß¡£Ò»µ©²¿Êðµ½Êܺ¦ÕßÉ豸ÉÏ£¬¼ÙµÄKMS¼¤»î¹¤¾ß¾Í»áÏÔʾ¼ÙµÄWindows¼¤»î½çÃæ£¬×°ÖöñÒâÈí¼þ¼ÓÔØ·¨Ê½£¬½ûÓÃWindows Defender£¬²¢´«µÝ×îÖÕµÄRAT¸ºÔØ¡£¹¥»÷µÄ×îÖÕÖ¸±êÊÇÍøÂçÊÜÏ°È¾ÍÆËã»úÉϵÄÃô¸ÐÐÅÏ¢£¬²¢½«Æä·¢Ë͵½¹¥»÷Õß½ÚÔìµÄ·þÎñÆ÷¡£ÓÉÓÚÎÚ¿ËÀ¼´óÁ¿Ê¹ÓõÁ°æÈí¼þ£¬µ¼Ö¹¥»÷ÃæÀ©´ó£¬µ±²¿ÃÅÃÅҲδÄÜÐÒÃâ¡£


https://www.bleepingcomputer.com/news/security/russian-military-hackers-deploy-malicious-windows-activators-in-ukraine/


4. SystemBC RATбäÖÖ¶Ô×¼Linuxƽ̨£¬ÆóÒµÍøÂçÃæ¶ÔÐÂÍþв


2ÔÂ11ÈÕ£¬Ð³öÏÖµÄSystemBC RAT±äÖÖÕýÕë¶ÔLinuxƽ̨ÌáÒé¹¥»÷£¬ÕâÒ»·¢Õ¹Ê¹ÆóÒµÍøÂç¡¢ÔÆ»ù´¡ÉèÊ©ºÍÎïÁªÍøÉè±¸Ãæ¶Ô³Á´ó·çÏÕ¡£¸Ã±äÖÖÔ½·¢ÒþÃØ£¬Ê¹ÓüÓÃÜͨѶÀ´Î¬³Ö°µ²Ø£¬Í¬Ê±ÔÊÐí¹¥»÷ÕßÔÚÊÜϰȾϵͳÖÐ×ÔÓÉÒÆ¶¯¡£SystemBCÕý±¾ÖØÒªÕë¶ÔWindowsϵͳ£¬µ«´Ë¿ÌÒÑÀ©´óµ½Linux£¬ÓÉÓÚÆä¿í·ºÀûÓÃÓÚÆóÒµ»·¾³£¬Òò¶øÎ£ÏÕÐÔ¸ü´ó¡£¸Ã¶ñÒâÈí¼þÒÔ´úÀíÖ²È뷽ʽÔËÐУ¬ÄÜÔÚÊÜÏ°È¾ÍøÂçÖÐʵÏÖºáÏòÒÆ¶¯£¬³ÉΪ¹¥»÷ÕßÔÚÆóÒµ»ù´¡ÉèÊ©ÄÚ×·ÇóÓÆ¾ÃÐԺ͸üÉîµµ´ÎÉøÈëµÄÓÐÁ¦±øÆ÷¡£´Ë±í£¬°²È«¹©¸øÉ̺ÜÄѼì²âµ½´Ë°æ±¾ÊôÓÚSystemBC¼Ò×壬ʹÆä¿ÉÄܳ¤¹¦·ò²»±»·¢ÏÖ¡£SystemBC»¹Äܼì²âÐé¹¹»¯»·¾³ÒÔÕмܶ¯Ì¬·ÖÎö£¬½øÒ»²½Ôö³¤ÁËÆäÒþÃØÐÔ¡£Ëæ×ÅSystemBC RAT½øÈëLinuxÁìÓò£¬¹¥»÷ÕßÓÐÁËв½Öè°µ²ØC2Á÷Á¿¡¢ÔÚÍøÂçÖÐÒþÃØÒÆ¶¯ÒÔ¼°Í¶·Å¸ü¶à¶ñÒâÈí¼þ¡£´«Í³°²È«¹¤¾ß¿ÉÄÜÄÑÒÔÓ¦¶ÔÕâЩÒþÃØÕ½Êõ£¬µ«Ê¹Óý»»¥Ê½É³Ï乤¾ß£¬°²È«ÍŶÓÄܹ»ÔÚÊܿػ·¾³Öа²È«·ÖÎöÍþв£¬¸ü¿ì×ö³ö·´Ó³£¬¸æ·¢Íþв²¢¼ÓǿԤ·ÀÕ½Êõ¡£


https://hackread.com/systembc-rat-targets-linux-ransomware-infostealers/


5. ÍþвÕßÀûÓà ClickFix ÔÚ×îÐÂÍøÂç¹¥»÷Öв¿Êð NetSupport RAT


2ÔÂ11ÈÕ£¬×Ô2025Äê1Ô³õÒÔÀ´£¬ÍþвÐÐΪÕ߯µÈÔÀûÓÃClickFix¼¼Êõ´«²¼ÃûΪNetSupport RATµÄÔ¶³Ì½Ó¼ûľÂí¡£NetSupport RATͨ¹ýÐéÎ±ÍøÕ¾ºÍä¯ÀÀÆ÷¸üнøÐÐÀ©É¢£¬Ê¹¹¥»÷Õß¿ÉÄÜÈ«Ãæ½ÚÔìÊܺ¦ÕßÖ÷»ú£¬½øÐÐʵʱ¼à¿Ø¡¢¼üÅÌÊó±ê½ÚÔì¡¢ÎļþÉÏ´«ÏÂÔØ¼°¶ñÒâºÅÁîÖ´ÐеȲÙ×÷¡£¸Ã·¨Ê½Æð³õÊÇ×÷ΪºÏ·¨µÄÔ¶³ÌITÖ§³Ö·¨Ê½NetSupport Manager¿ª·¢µÄ£¬µ«ºó±»¶ñÒâÀûÓá£ClickFix¼¼Êõͨ¹ýÔÚÊÜÏ°È¾ÍøÕ¾×¢ÈëÐéαCAPTCHAÍøÒ³£¬ÓÕµ¼Óû§Ö´ÐжñÒâPowerShellºÅÁÏÂÔØ²¢ÔËÐÐNetSupport RAT¿Í»§¶Ë¡£ÕâÒ»¹¥»÷¼¿Á©ÓëClickFix´«²¼Lumma Stealer¶ñÒâÈí¼þµÄа汾ÏàÏìÓ¦£¬ºóÕßʹÓÃChaCha20ÃÜÂë½âÃÜC2·þÎñÆ÷ÁбíÅäÖÃÎļþ¡£ÍøÂ簲ȫ¹«Ë¾eSentireÖ¸³ö£¬ÕâЩ±ä¶¯½ÒʾÁ˶ñÒâÈí¼þ¿ª·¢ÕßΪ¶ã±Üµ±Ç°ÌáÈ¡ºÍ·ÖÎö¹¤¾ßËùѡȡµÄÕ½Êõ£¬¾¯Ê¾ÆóÒµºÍÓ×ÎÒÐè¼ÓÇ¿ÍøÂ簲ȫ·À»¤£¬¾¯Ìè´ËÀ๥»÷¼¿Á©¡£


https://thehackernews.com/2025/02/threat-actors-exploit-clickfix-to.html


6. Bishop Fox°ä²¼CVE-2024-53704·ì϶ÀûÓÃϸ½Ú£¬¶½´Ù¾¡¿ì¸üÐÂSonicOS·À»ðǽ


2ÔÂ11ÈÕ£¬Bishop FoxµÄ°²È«×êÑÐÈËÔ±°ä²¼ÁËCVE-2024-53704·ì϶µÄÆëÈ«ÀûÓÃϸ½Ú£¬¸Ã·ì϶´æÔÚÓÚijЩ°æ±¾µÄSonicOS SSLVPNÀûÓ÷¨Ê½ÖУ¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÔ죬½Ù³Ö»î¶¯µÄSSL VPN»á»°£¬´Ó¶ø»ñµÃδ¾­ÊÚȨµÄ½Ó¼ûȨÏÞ¡£¸Ã·ì϶ÓÚ1ÔÂ7ÈÕÓɹ©¸øḚ́䲼ÖҸ棬²¢¶½´ÙÖÎÀíÔ±Éý¼¶¹Ì¼þÒÔ½â¾ö¸ÃÎÊÌâ¡£¾­¹ýBishop FoxµÄ´óÁ¿ÄæÏò¹¤³ÌÖÂÁ¦£¬ËûÃÇ֤ʵÁ˸÷ì϶µÄÀûÓÃDZÁ¦£¬²¢ÔÚÆÚ´ýϵͳÖÎÀíÔ±×°Öò¹¶¡Ò»¶Î¹¦·òºó°ä²¼ÁË·ì϶ÀûÓÃϸ½Ú¡£·ì϶µÄ¹¤×÷µÀÀíÊÇͨ¹ý·¢ËÍÌØÔìµÄ»á»°cookieµ½SSL VPNÉí·ÝÑéÖ¤¶Ëµã£¬´¥·¢ÃýÎóµÄ»á»°ÑéÖ¤£¬Ê¹¹¥»÷Õß¿ÉÄܽӼû»á»°£¬¶ÁÈ¡Óû§ÊéÇ©¡¢»ñÈ¡ÅäÖÃÉèÖᢴò¿ªµ½ÄÚ²¿ÍøÂçµÄËí·²¢Ìṩ¶Ô˽ÓÐ×ÊÔ´µÄ½Ó¼ûȨÏÞ¡£×êÑÐÈËÔ±´´½¨Á˸ÅÏëÑéÖ¤·ì϶´úÂëÀ´·ÂÕÕ¹¥»÷£¬²¢·¢ÏÖÔ¼4,500̨¶³öÔÚ»¥ÁªÍøÉϵÄSonicWall SSL VPN·þÎñÆ÷δװÖý¨¸´¸Ã·ì϶µÄ°²È«¸üС£Òò¶ø£¬ÖÎÀíÔ±Ó¦¾¡¿ìÀûÓøüÐÂÒÔ½µµÍÀûÓ÷çÏÕ¡£


https://www.bleepingcomputer.com/news/security/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/