Âêɯ°Ù»õÈ·ÈÏÉç»á¹¤³ÌѧÒý·¢´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷

°ä²¼¹¦·ò 2025-07-09

1. Âêɯ°Ù»õÈ·ÈÏÉç»á¹¤³ÌѧÒý·¢´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷


7ÔÂ8ÈÕ£¬½üÈÕ£¬Ó¢¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©Ôâ·êһ·Óɸ´ÔÓÉç»á¹¤³Ì¹¥»÷Òý·¢µÄÍøÂ簲ȫÊÂÎñ£¬×îÖÕÑݱäΪDragonForceÀÕË÷Èí¼þ¹¥»÷¡£¸Ã¹«Ë¾¶­Ê³¤°¢Ææ¡¤ÅµÂüÔÚÓ¢¹úÒé»áÌýÖ¤»áÉÏÅû¶£¬¹¥»÷Õßͨ¹ý¾«×¼¼ÙÒâÓëÂêɯ°Ù»õºÏ×÷µÄµÚÈý·½ÊµÌåÔ±¹¤£¬ÓÕÆ­IT±í°ü·þÎñÉÌËþËþÕ÷ѯ·þÎñ¹«Ë¾³ÁÖÃÔ±¹¤ÃÜÂ룬³É¹¦ÇÖÈëÆäÍøÂç¡£Õâ´ÎÉç»á¹¤³Ì¼¿Á©±»ÅµÂü³ÆÎª"¼«Æä¸´ÔӵļÙÒâÐÐΪ"£¬¹¥»÷Õß²»½öαÔìÉí·ÝÐÅÏ¢£¬»¹ÀûÓõÚÈý·½·þÎñ×÷ÎªÌø°å£¬Í¹ÏÔ¹©¸øÁ´°²È«·çÏÕ¡£µ÷²éÏÔʾ£¬ÍþвÐÐΪÕßÇÖÈëÍøÂçºó²¿ÊðÁËÔ´×ÔÑÇÖÞµÄDragonForceÀÕË÷Èí¼þ¡£Ö»¹Ü²¿ÃÅýÌåÎ󽫸ÃÍÅ»ïÓëÂíÀ´Î÷ÑÇÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯"DragonForce Malaysia"¹ØÁª£¬µ«¾Ý°²È«»ú¹¹×·×Ù£¬Õâ´Î¹¥»÷ÏÖʵÓÉÓëScattered SpiderÓйصÄÍþвÐÐΪÕßÖ´ÐУ¬Ñ¡È¡Ë«³ÁÀÕË÷Õ½Êõ¡£Ãæ¶ÔÀÕË÷Íþв£¬Âêɯ°Ù»õ²ÉÈ¡"²»Ö±½Ó½Ó´¥¹¥»÷Õß"µÄÕ½Êõ£¬Î¯ÍÐרҵ½»ÉæÍŶӴ¦Öá£ÅµÂüÔÚÌýÖ¤»áÉÏÇ¿µ÷£¬ÆóÒµÒÑÓëÓ¢¹ú¹ú¶È·¸×ï¾Ö£¨NCA£©µÈ·¨ÂÉ»ú¹¹³ä·ÖºÏ×÷£¬µ«»Ø¾øÐ¹Â©ÊÇ·ñÖ§¸¶Êê½ð£¬½ö°µÊ¾"¹«¿ªÏ¸½Ú²»ÇкϹ«¼ÒÀûÒæ"¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Ö»¹Ü´æÔÚÊý¾Ýй¶£¬DragonForceÀÕË÷ÍøÕ¾ÉÐδ°ä²¼Âêɯ°Ù»õÓйØÊý¾Ý£¬°µÊ¾¿ÉÄÜͨ¹ý½»Éæ´ï³É½â¾ö¹æ»®¡£


https://www.bleepingcomputer.com/news/security/mands-confirms-social-engineering-led-to-massive-ransomware-attack/


2. ChromeÓëEdgeÉ̵꾪ÏÖ°ÙÍò¼¶¶ñÒâÀ©´ó


7ÔÂ8ÈÕ£¬¹È¸èChromeÍøÉÏÀûÓõ꼰΢ÈíEdge¹Ù·½É̵ê½üÈÕÆØ³ö´ó¹æÄ£¶ñÒâÀ©´ó·¨Ê½ÊÂÎñ£¬Éæ¼°½ü30¿î¼Ù×°³ÉʵÓù¤¾ßµÄ¶ñÒâÈí¼þ£¬×ÜϰȾÓû§³¬¹ý230Íò¡£¾Ý°²È«¹«Ë¾Koi SecurityÅû¶£¬ÕâЩÀ©´ó·¨Ê½ÒÔÉ«²ÊÑ¡ÔñÆ÷¡¢VPN¡¢±íÇé·ûºÅ¼üÅÌ¡¢ÒôÁ¿¼ÓÇ¿Æ÷µÈÈÕ³£Ö°ÄÜΪ»Ï×Ó£¬ÔÚChromeÉ̵êÀÛ¼ÆÏÂÔØÁ¿´ï170Íò´Î£¬EdgeÉ̵êÓйØÀ©´óÏÂÔØÁ¿ÒàÍ»ÆÆ60Íò´Î¡£×êÑÐÈËÔ±·¢ÏÖ£¬ÎÞÊý¶ñÒâÀ©´ó×î³õÒԺϷ¨ÃæÄ¿ÉϼÜ£¬Í¨¹ýÊý°ÙÌõÕýÃæÆÀ¼ÛºÍÏÔÖøÕ¹Ê¾µØÎ»Îóµ¼Óû§¡£Æä¶ñÒâÖ°ÄÜͨ¹ýºóÐø¸üÐÂÇÄȻֲÈ룬¹È¸èµÄ×Ô¶¯¸üлúÔì»áÔÚÓû§ÎÞ¸ÐÖªÇé¿öϲ¿Êð×îа汾£¬ÎÞÐèÈκÎÊÚȨ¡£¶ñÒâ´úÂëÀûÓÃChromeÀ©´óAPIÔÚºó¶ÜÔËÐмàÌý·¨Ê½£¬µ±Óû§½Ó¼ûÐÂÍøÒ³Ê±£¬×Ô¶¯²¶»ñURL²¢Á¬Í¬Î¨Ò»¸ú×ÙID·¢ËÍÖÁ¾³±í·þÎñÆ÷£¬´æÔÚ½Ù³Öä¯ÀÀ»î¶¯¡¢³Á¶¨ÏòÖÁ´¹µöÍøÕ¾»ò¶ñÒâÁ´½ÓµÄ·çÏÕ¡£Ö»¹Ü²âÊÔÖÐδÏÖʵ´¥·¢³Á¶¨Ïò£¬µ«Êý¾Ýй¶·çÏÕÒÑÒý·¢°²È«¾¯±¨¡£


https://www.bleepingcomputer.com/news/security/malicious-chrome-extensions-with-17m-installs-found-on-web-store/


3. ÐÂÐÍRondoDox½©Ê¬ÍøÂçÀûÓÃÎïÁªÍø·ì϶¹¹½¨ÒþÐι¥»÷ÍøÂç


7ÔÂ8ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÆÚ·¢ÏÖÒ»ÖÖÃûΪRondoDoxµÄÐÂÐͽ©Ê¬ÍøÂ磬Õýͨ¹ýÕë¶ÔTBKÊý×ÖÊÓÆµÂ¼Ïñ»ú£¨DVR£©ºÍFour-Faith·ÓÉÆ÷µÄ°²È«·ì϶£¬½«´óÁ¿ÎïÁªÍøÉ豸ת»¯ÎªÒñ±Î¹¥»÷½Úµã¡£¸Ã¶ñÒâÈí¼þ»î¶¯¾Û½¹ÓÚÁ½¸öÒѱ»¹«¿ªÅû¶µÄºÅÁî×¢Èë·ì϶£ºCVE-2024-3721ºÍCVE-2024-12856£¬ÕâЩÉ豸Òò³Ö¾Ã²¿ÊðÔÚÁãÊ۵ꡢ²Ö¿âµÈÎÞÈË¼à¿Ø»·¾³£¬ÇÒ³£Í¨¹ý¹ýÆÚ¹Ì¼þ»òÃýÎóÅäÖö³öÓÚ»¥ÁªÍø£¬³ÉΪÃÎÏë¹¥»÷Ö¸±ê¡£¼¼Êõ·ÖÎöÏÔʾ£¬RondoDoxͨ¹ý¶à¼Ü¹¹Ö²ÈëÆ÷À©´óϰȾÁìÓò£¬³õʼ½×¶ÎÕë¶ÔARM/MIPS¼Ü¹¹µÄLinuxϵͳ£¬Ëæºóͨ¹ýshell¾ç±¾ÏÂÔØ·¨Ê½À©´óÖÁIntel 80386¡¢PowerPC¡¢AArch64µÈ¸ü¶à¼Ü¹¹¡£¶ñÒâÈí¼þÆô¶¯ºó£¬»áºöÂÔϵͳÖÕÖ¹Ðźš¢¶Ï¸ùºÅÁîÖ´Ðк¹Ç࣬²¢³ÉÁ¢Óƾû¯»úÔ죬ȷ±£³ÁÆôºó×Ô¶¯ÔËÐС£RondoDoxѡȡ¶à³Á·´¼ì²â¼¼Êõ£ºÍ¨¹ý·ÂÕÕValve¡¢Minecraft¡¢RobloxµÅ×ÎϷƽ̨¼°Discord¡¢OpenVPNµÈ¹¤¾ßµÄÁ÷Á¿ÌصãÈÚÈëÕý³£ÍøÂç»î¶¯£»Ê¹ÓÃXOR¼ÓÃÜÅäÖÃÊý¾ÝºÍ¶¨Ôì¿â¶ã±Ü´«Í³ÈëÇÖ¼ì²âϵͳ£¨IDS£©£»Í¬Ê±ÖÕÖ¹wget¡¢curlµÈÍøÂ繤¾ß¼°WiresharkµÈ·ÖÎö¹ý³Ì£¬È·±£²Ù×÷ÒþÃØÐÔ¡£×îÖÕ£¬¶ñÒâÈí¼þ»áÁªÏµ±í²¿·þÎñÆ÷£¬Í¨¹ýHTTP/UDP/TCPºÍ̸ÌáÒéDDoS¹¥»÷¡£


https://thehackernews.com/2025/07/rondodox-botnet-exploits-flaws-in-tbk.html


4. APT36×éÖ¯ÌáÒéÕë¶ÔÓ¡¶ÈLinuxϵͳµÄ¸´ÔÓÍøÂç¼äµý»î¶¯


7ÔÂ8ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Cyfirma½üÈÕÅû¶£¬ÒÉËÆÓɰͻù˹̹APT36£¨Óֳơ°Í¨Ã÷²¿Â䡱£©ÌáÒéµÄÍøÂç¼äµý»î¶¯Õý½«·æÃ¢¶Ô×¼Ó¡¶È¹ú·ÀÓйػú¹¹£¬³õ´ÎѡȡרÃÅÕë¶ÔLinux»·¾³µÄ¶ñÒâÈí¼þ£¬±ê־ȡ¸Ã×éÖ¯¹¥»÷ÄÜÁ¦µÄÏÔÖøÉý¼¶¡£Õâ´Î¹¥»÷¾Û½¹ÓÚÔËÐÐBOSS LinuxµÄϵͳ£¬ÕâÒ»»ùÓÚDebianµÄÓ¡¶È¹ú²úLinux¿¯Ðа汻¿í·ºÓÃÓÚµ±¾Ö»ú¹¹£¬Í¹ÏÔ¹¥»÷Õ߶Թؼü»ù´¡ÉèÊ©µÄ¾«×¼¶¨Î»¡£¹¥»÷Õßͨ¹ý¾«ÐÄÉè¼ÆµÄÍøÂç´¹µöÓʼþ´«²¼¶ñÒâÔØºÉ£¬Óʼþ¸½¼þΪ¼Ù×°³É¡°Cyber-Security-Advisory.zip¡±µÄѹËõÎļþ£¬ÄÚº¬Ò»¸öÃûΪ¡°.desktop¡±µÄLinux¿ì½Ý·½Ê½Îļþ¡£µ±Óû§´ò¿ª¸ÃÎļþʱ£¬ÏµÍ³»áͬʱִÐÐÁ½Ïî²Ù×÷£ºÇ°Ì¨×Ô¶¯ÏÂÔØ²¢Õ¹Ê¾Ò»¸ö¿´ËÆÕý³£µÄPowerPointÎļþÒÔ·ÖÉ¢°ÑÎÈÁ¦£¬ºó¶ÜÔò°ÂÃØÔËÐÐÃûΪ¡°BOSS.elf¡±µÄELF¶þ½øÔì¶ñÒâÈí¼þ¡£¸Ã¶ñÒⷨʽʹÓÃGo˵»°±àд£¬Êǹ¥»÷µÄÖ÷ÌâÔØºÉ£¬Ö¼ÔÚÈëÇÖÖ÷»ú²¢³ÉÁ¢Óƾû¯½Ó¼û¡£¼¼Êõ·ÖÎöÏÔʾ£¬BOSS.elf»á³¢ÊÔÏνÓIPµØÖ·101.99.92.182µÄ12520¶Ë¿Ú£¬²¢ÓëÓòÃûsorlastore.comͨѶ£¬¸ÃÓòÃûÒѱ»È·ÒÔΪAPT36Õë¶ÔÓ¡¶È¹ú·À²¿ÃŵĶñÒâ»ù´¡ÉèÊ©¡£


https://hackread.com/pakistan-transparent-tribe-indian-defence-linux-malware/


5. ÐÂÐÍBatavia¼äµýÈí¼þ½è´¹µöÓʼþÈëÇÖ¶íÂÞ˹¹¤ÒµÆóÒµ


7ÔÂ7ÈÕ£¬×Ô2024Äê7ÔÂÆð£¬Ò»³¡Õë¶Ô¶íÂÞ˹¹¤ÒµÆóÒµµÄ¶¨ÏòÍøÂç¼äµý»î¶¯³ÖÐøÉý¼¶£¬ÆäÖ÷ÌâÔØÌåΪÐÂÐÍBatavia¼äµýÈí¼þ¡£¿¨°Í˹»ù³¢ÊÔÊÒ×·×Ù·¢ÏÖ£¬¸Ã¹¥»÷×Ô2025Äê3Ô½øÈë»îÔ¾ÆÚ£¬Í¨¹ý¼Ù×°³ÉºÏͬÎļþµÄ´¹µöÓʼþ´«²¼¶ñÒâ.vbeÎļþÁ´½Ó£¬Òѵ¼Ö¶íÂÞ˹ÊýÊ®¼Ò»ú¹¹³¬¹ý100ÃûÓû§ÊÜÓ°Ïì¡£¹¥»÷ʼÓÚ¼Ù×°³ÉºÏͬ»ò¸½¼þµÄ¶ñÒâ.vbeÎļþÁ´½Ó£¬µã»÷Á´½ÓÏÂÔØVBE¾ç±¾£¬ÆäÍøÂçϵͳÐÅÏ¢²¢¼ìË÷¶ñÒâÈí¼þÎļþ£¬²é³­²Ù×÷ϵͳ°æ±¾Ö´ÐÐÓÐÐ§ÔØºÉ²¢·¢ËÍÊý¾Ýµ½C2·þÎñÆ÷£¬ÇÒʹÓö¨Ôì²ÎÊýÖÎÀíϰȾ½×¶Î¶ã±Ü¼ì²â¡£ÔÚ¹¥»÷Á´µÚ¶þ½×¶Î£¬WebView.exe¶ñÒâÈí¼þÏÂÔØ²¢ÏÔʾÐéαºÏͬ£¬¼à¶½ÏµÍ³£¬ÍøÂçϵͳÈÕÖ¾µÈ²¢¶¨ÆÚ½ØÍ¼·¢Ë͵½ÐÂC2·þÎñÆ÷£¬ÏÂÔØÐ¶ñÒâÈí¼þ½×¶Î²¢ÉèÖÃÆô¶¯¿ì½Ý·½Ê½¡£×îºó½×¶Î£¬javav.exeÀ©´ó¹¥»÷ÁìÓò£¬Õë¶Ô¸ü¶àÎļþÀàÐÍ´«Êäµ½C2·þÎñÆ÷£¬¿É¸ü¸ÄC2µØÖ·¡¢ÊµÏÖUACÈÆ¹ýÀ´ÏÂÔØ/Ö´ÐÐÐÂÓÐÐ§ÔØºÉ£¬Í¨Ñ¶¼ÓÃÜÇÒͨ¹ýÎļþ¹þÏ£Ô¤·À³Á¸´ÉÏ´«¡£


https://securityaffairs.com/179699/malware/new-batavia-spyware-targets-russian-industrial-enterprises.html


6. ÒÁÀʹØÁª×éÖ¯BladedFeline¶Ô×¼ÒÁÀ­¿Ëµ±¾Öϵͳ


7ÔÂ7ÈÕ£¬ÍøÂ簲ȫ»ú¹¹ESETÅû¶£¬ÓëÒÁÀÊ´æÔÚÇ×êǹØÁªµÄAPT×éÖ¯BladedFelineÕý¶ÔÒÁÀ­¿ËÖÐÑëµ±¾Ðİ¿â¶ûµÂ×ÔÖÎÇøµ±¾Ö£¨KRG£©Ö´Ðг־ÃÍøÂç¼äµý»î¶¯¡£×êÑÐ֤ʵ£¬BladedFeline×Ô2017Äê³õ´ÎÉøÈë¿â¶ûµÂ±í½»ÏµÍ³ÒÔÀ´£¬³ÖÐø¿ª·¢ÐÂÐ͹¥»÷¹¤¾ß¡£×îлÖУ¬¸Ã×éÖ¯²¿ÊðÁËÄ£¿é»¯¶ñÒâÈí¼þÌ×¼þ£¬Ö÷Ìâ×é¼þÔ̺¬£ºÍ¨¹ýÊÜËð΢ÈíExchangeÓÊÏäÕË»§ÊÕ·¢Ö¸ÁîµÄ"Whisper"ºóÃÅ£¬ÒÔ¼°ÓµÓиïÃüÐÔÒñ±Î»úÔìµÄ"PrimeCache"¶ñÒâIISÄ£¿é£¬¹¥»÷¹¤¾ßÁ´»¹Ô̺¬LaretÓëPinarÁ½¿î·´ÏòËí·¹¤¾ß£¬ÒÔ¼°¶à½×¶ÎÉøÈë×é¼þ¡£¸ÃÌ×¼þ¸³Óè¹¥»÷ÕßËÄÏîÖ÷ÌâÄÜÁ¦£º³Ö¾Ãά³Ö¸ß¼ÛÖµÖ¸±êϵͳ½Ó¼ûȨÏÞ¡¢Í¨¹ý¼ÓÃÜͨѶ¶ã±Ü¼à²â¡¢ÀûÓúϷ¨WebmailÕË»§Ô¶³ÌÖ´ÐÐÖ¸Áî¡¢½«¶ñÒâ»î¶¯Ç¶Èë¿ÉÕÛ·þÎñÆ÷¹ý³ÌʵÏÖÉî¶ÈÒþÄä¡£¼¼ÊõËÝÔ´ÏÔʾ£¬BladedFelineÓëÒÁÀʹú¶È¼¶ºÚ¿Í×éÖ¯OilRig´æÔÚÇ¿¹ØÁªÐÔ£¬Æä¶ñÒâÈí¼þÖ°ÄÜÉè¼ÆÓëOilRig±êÖ¾ÐÔºóÃÅRDAT¸ß¶ÈÀàËÆ£¬¹¥»÷»ù´¡ÉèÊ©´æÔÚ³Áµþ£¬Õ½ÊõÖ¸±ê¾ù¾Û½¹Öж«µØÔµÕþÖεý±¨ÍøÂç¡£ESETÆÀ¹ÀÒÔΪ£¬¸Ã×éÖ¯¼«¿ÉÄÜΪOilRigµÄÕ½Êõ×Óµ¥Ôª¡£


https://www.infosecurity-magazine.com/news/iran-hacking-group-targets-middle/