Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßÖ´ÐÐÒñ±Î¹¥»÷
°ä²¼¹¦·ò 2025-12-111. Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßÖ´ÐÐÒñ±Î¹¥»÷
12ÔÂ9ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾ReliaQuest½üÈÕÅû¶£¬ÃûΪStorm-0249µÄ³õʼ½Ó¼û´úÀíÕýͨ¹ýÀÄÓö˵ã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¹æ»®¼°ÊÜÐÅÀµµÄMicrosoft WindowsʵÓ÷¨Ê½£¬Ö´Ðи߶ÈÒñ±ÎµÄ¶ñÒâÈí¼þ¼ÓÔØÓëÓÆ¾Ã»¯²Ù×÷£¬ÎªºóÐøÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¸Ã×éÖ¯ÒÑÞðÆú´«Í³´ó¹æÄ£ÍøÂç´¹µö£¬×ª¶øÑ¡È¡¸üÏȽøµÄ¼¼Êõ¼¿Á©£¬¼´±ã·ÀÓù·½¾ßÌå¼Í¼ÆäÐÐΪ£¬ÈÔÄÑÒÔÓÐЧӦ¶Ô¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³Ì¹¥»÷£ºÓÕÆÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐÐcurlºÅÁÏÂÔØ¾ß±¸SYSTEMȨÏ޵ĶñÒâMSI°ü¡£Ëæºó£¬´ÓαÔìMicrosoftÓò»ñÈ¡µÄ¶ñÒâPowerShell¾ç±¾Ö±½Ó×¢ÈëϵͳÄڴ棬ȫ³Ì²»Âä´ÅÅÌÒÔ¶ã±Ü·À²¡¶¾¼ì²â¡£MSIÎļþ¿ªÊ͵ĶñÒâDLL£¨ÈçSentinelAgentCore.dll£©±»Õ½ÊõÐÔ¸éÖÃÔںϷ¨SentinelOne EDR×é¼þµÄSentinelAgentWorker.exeÅÔ£¬Í¨¹ýDLL²à¼ÓÔØ¼¼ÊõÔÚÊÜÐÅÀµµÄÌØÈ¨EDR¹ý³ÌÖÐÖ´ÐУ¬ÊµÏÖ²Ù×÷ϵͳ¸üкóÈÔ¿Éά³ÖµÄÒñ±ÎÓÆ¾ÃÐÔ¡£ÈëÇֺ󣬹¥»÷ÕßÀûÓÃSentinelOne×é¼þ½áºÏreg.exe¡¢findstr.exeµÈºÏ·¨Windows¹¤¾ßÍøÂçϵͳ±êʶ·û£¬²¢Í¨¹ý¼ÓÃÜHTTPS C2Á÷Á¿³ÉÁ¢Í¨Ñ¶¡£
https://www.bleepingcomputer.com/news/security/ransomware-iab-abuses-edr-for-stealthy-malware-execution/
2. ¡°Ö©ÖëÏÀ¡±ÍøÂç´¹µö¹¤¾ß°üϯ¾íÅ·ÖÞ½ðÈÚ½ç
12ÔÂ9ÈÕ£¬ÍøÂçÍþв·ÖÎö¹«Ë¾Varonis½üÈÕÅû¶£¬Ò»¿îÃûΪ¡°Ö©ÖëÏÀ¡±µÄÈ«Õ»Ê½ÍøÂç´¹µö¹¤¾ß°üÔÚ°µÍø¿í·º´«²¼£¬Ê¹·Ç¼¼Êõ¹¥»÷ÕßÒ²ÄܶÔÅ·ÖÞÖØÒªÒøÐм°¼ÓÃÜÇ®±Òƽ̨ÌáÒé´ó¹æÄ£¾«×¼¹¥»÷¡£¸Ã¹¤¾ß°ü±»×êÑÐÈËÔ±³ÆÎª¡°Äê¶È×îΣÏÕ¡±Íþв֮һ£¬ÒòÆäÎÞÐè±à³Ì֪ʶ¼´¿É¼±¾çÌìÉúÏñËØ¼¶¿Ë¡µÄ½ðÈÚ»ú¹¹µÇÂ¼Ò³Ãæ£¬¸²¸ÇµÂ¹ú¡¢±ÈÀûʱµÈÎå¹úÊýÊ®¼Ò»ú¹¹£¬Ô̺¬µÂÒâÖ¾ÒøÐÓ×¢ºÉÀ¼¹ú¼Ê¼¯ÍÅ£¨ING£©¡¢CaixaBankµÈÖ÷Á÷ÒøÐм°¼ÓÃÜÇ®°ü·þÎñÉÌ£¬Ö¸±êÓû§ÈºÌåÖØ´ó¡£¹¥»÷Á÷³Ì¼«¼ò»¯£º¹¥»÷Õß½öÐèÑ¡ÔñÖ¸±êÒøÐУ¬Æô¶¯¿Ë¡·¨Ê½£¬·¢ËÍÓë¹Ù·½ÆëȫһÖµĵö¶üÐÅÏ¢¼´¿ÉÖ´Ðд¹µö¡£¹¤¾ß°üÄÚÖüÓÃÜÖú¼Ç´ÊÇÔȡģ¿é£¬±ê־ȡڿƼ¿Á©Ïò»ìºÏÐÍ·¢Õ¹¡£Æä×îΣÏÕ¸öÐÔÔÚÓÚʵʱÐÅÏ¢À¹½ØÄÜÁ¦¡ª¡ªÊܺ¦ÕßÊäÈëµÇ¼ÐÅÏ¢ºó£¬¹¥»÷Õ߿ɵ±¼´»ñÈ¡Êý¾Ý£¬²¢´¥·¢¶þ´Î½çÃæÍøÂçÐÅÓþ¿¨ºÅ¡¢OTP»òPhotoTANÂëµÈÃô¸ÐÐÅÏ¢¡£µ¥´Î»á»°¼´¿ÉÇÔȡȫÃû¡¢µ®ÉúÈÕÆÚ¡¢ÐÅÓþ¿¨ÏêÇéµÈÆëÈ«Éí·ÝÐÅÏ¢£¬×ãÒÔÆëÈ«ÊÕÊÜÕË»§²¢Ö´ÐÐÉí·Ý͵ÇÔ¡£Îª¶ã±Ü°²È«¼ì²â£¬¸Ã¹¤¾ß°üѡȡµØÀí¹Ø±Õ¼¼ÊõÏÞ¶È·ÇÖ¸±ê¹ú¶È½Ó¼û£¬²¢ÆÁ±ÎÒÑÖª°²È«¹«Ë¾ÍøÂçÁ÷Á¿£¬ÓÐЧ¶ã±Ü×Ô¶¯É¨ÃèºÍÈËΪ·ÖÎö¡£
https://hackread.com/spiderman-phishing-kit-european-banks-credential-theft/
3. Ó¡¶ÈÂüµÏ¹«¹²Ãŵê250Íò¿Í»§ÐÅϢй¶¹ÒÊÛ
12ÔÂ9ÈÕ£¬½üÈÕ£¬ÍøÂç·¸×ïÂÛÌ³ÆØ¹âһ·Õë¶ÔÓ¡¶ÈϲÂíÙɶû¹úÂüµÏ¹«¹²Æû³µÃŵêµÄÒÉËÆÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷ÕßÐû³ÆÓÚ½ñÄêÈëÇָù«Ë¾¿Í»§¹ØÏµÖÎÀíϵͳºó¶Ü£¬ÇÔÈ¡ÁËÔ̺¬ÐÕÃû¡¢¼Òͥסַ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏäµÈÔÚÄÚµÄ250ÍòÌõ¾ÏúÉ̼°¿Í»§Ó×ÎÒÐÅÏ¢£¬²¢¹«¿ª¹ÒÅÆÊÛÂô¡£½ØÖÁĿǰ£¬ÉæÊ¹«Ë¾ÉÐδ°ä²¼¹Ù·½ÉêÃ÷È·ÈÏÊÂÎñÕæÊµÐÔ¡£Êý¾ÝÑù±¾½öÔ̺¬8ÌõÐÅÏ¢£¬ÕæÊµÐÔÔÝÎÞ·¨ºËʵ¡£¾Ýµ÷²é£¬¸Ã¹¥»÷ÕßÓÚ½ñÄê4Ô²ÎÓë¸ÃÂÛ̳£¬´ËÇ°ÔøÂÅ´ÎÏúÊÛÆóÒµÊý¾Ý²¢¸½´øÑù±¾£¬Õâ´ÎÊÂÎñÈôÊôʵ£¬±»µÁÊý¾Ý¿ÉÄܱ»ÓÃÓÚ¹¹½¨Óû§Éí·Ý»Ïñ£¬ÎªºóÐøÉç»á¹¤³Ìѧ¹¥»÷£¨Èç´¹µöÚ¿Æ¡¢Éí·ÝðÓã©Ìṩ¾«×¼ÐÅÏ¢£¬ÏÔÖøÌáÉýÊܺ¦Õß±»¶þ´Î¹¥»÷µÄ·çÏÕ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¹«¹²Æû³µ¼°Æä¾ÏúÉÌÒѷdzõ´Î³ÉÎªÍøÂç·¸×ïÖ¸±ê¡£½ñÄê10Ô£¬¹«¹²¼¯ÍÅ·¨¹ú·Ö¹«Ë¾±»÷è÷ëÀÕË÷Èí¼þÍÅ»ïÁÐÈëйÃÜÍøÕ¾£»6Ô£¬¹«¹²¼¯ÍÅ»¹³Ê´Ë¿ÌStormousÀÕË÷Èí¼þ¿¨Ëþ¶ûµÄ°µÍøÐ¹ÃÜÍøÕ¾¡£
https://cybernews.com/security/volkswagen-dealership-data-breach-india/
4. DroidLock¶ñÒâÈí¼þ»áËø¶¨°²×¿É豸²¢Ë÷ÒªÊê½ð
12ÔÂ10ÈÕ£¬Ò»ÖÖÃûΪDroidLockµÄÐÂÐͰ²×¿¶ñÒâÈí¼þ½üÆÚ±»·¢ÏÖ£¬Æäͨ¹ý¶à³Á¹¥»÷¼¿Á©¶ÔÎ÷°àÑÀÓïÓû§Ö´ÐÐÀÕË÷ÓëÊý¾ÝÇÔÈ¡¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶ñÒâÍøÕ¾ÍÆ¹ã¼ÙðºÏ·¨Èí¼þ°üµÄÐéαÀûÓã¬Ï°È¾¹ý³ÌʼÓÚÓÕÆÓû§×°ÖÃÔ̺¬ÏÖʵ¶ñÒâÈí¼þµÄ¶þ¼¶ÓÐÐ§ÔØºÉ¡£×°Öú󣬶ñÒⷨʽ»áÒªÇóÉ豸ÖÎÀíÔ±ºÍ¸¨ÖúÖ°ÄÜȨÏÞ£¬´Ó¶øÖ´ÐÐÔ̺¬ÆÁÄ»Ëø¶¨¡¢Êý¾Ý²Á³ý¡¢PINÂë/ÃÜÂë/ÉúÎï¼ø±ðÊý¾ÝÅú¸ÄµÈ15ÏîºÅÁÉõÖÁ¿ÉÔ¶³Ìͨ¹ýVNCÆëÈ«½ÚÔìÉ豸¡£DroidLockµÄÖ÷ÌâÍþвÔÚÓÚÆäÀÕË÷»úÔìÓëÊý¾ÝÇÔÈ¡ÄÜÁ¦¡£ÀÕË÷Ä£¿éͨ¹ýWebViewÏÔʾÊê½ðÒªÇó£¬ÅúʾÊܺ¦Õßͨ¹ýProtonÓÊÏäÁªÏµ¹¥»÷Õߣ¬²¢Íþв24Ó×ʱÄÚδ֧¸¶Êê½ð½«ÓÀÔ¶Ïú»ÙÎļþ¡£Ö»¹Ü¸ÃÈí¼þ²»Ö±½Ó¼ÓÃÜÎļþ£¬µ«Í¨¹ýÏú»ÙÎļþµÄÍþв´ïµ½ÓëÀÕË÷Èí¼þÒ»ÑùµÄ³ÉЧ¡£Í¬Ê±£¬Æäͨ¹ýÆÁÄ»¸²¸Ç²ãÇÔÈ¡Óû§½âËøÍ¼°¸£¬½áºÏVNCÔ¶³Ì½Ó¼ûʵÏÖÉ豸½ÚÔì¡£´Ë±í£¬¸ÃÈí¼þ»¹ÄܽӼû¶ÌÐÅ¡¢Í¨»°¼Í¼¡¢ÁªÏµÈË£¬ÉõÖÁÖ´ÐйàÒôºÍɾ³ýÊý¾ÝµÈ²Ù×÷¡£
https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/
5. Docker Hub¾µÏñ±»·¢ÏÖй¶ʹ´¦ºÍÉí·ÝÑéÖ¤ÃÜÔ¿
12ÔÂ10ÈÕ£¬Íþвµý±¨¹«Ë¾Flare½üÆÚɨÃè·¢ÏÖ£¬Docker Hubƽ̨³¬10,000¸öÈÝÆ÷¾µÏñ´æÔÚÃô¸ÐÐÅϢй¶ÎÊÌâ£¬Éæ¼°³ö²úϵͳƾ֤¡¢CI/CDÊý¾Ý¿âÃÜÔ¿¼°AIÄ£ÐÍÁîÅÆµÈ£¬Ó°Ïì100Óà¼Ò×éÖ¯£¬Ô̺¬²Æ¸»500Ç¿ÆóÒµ¡¢¹ú¶ÈÒøÐм°10Óà¼Ò½ðÈÚ»ú¹¹¡£×÷ΪȫÇò×î´óÈÝÆ÷×¢²á±í£¬Docker Hub±¾Ó¦±£ÏÕ¿ª·¢Õß°²È«¹²Ïí¼´ÓÃÐ;µÏñ£¬µ«±¾´ÎÊÂÎñ¶³öÆä°²È«·ì϶µÄÑϳÁÐÔ¡£×êÑÐÏÔʾ£¬11ÔÂÉÏ´«µÄ¾µÏñÖУ¬10,456¸ö´æÔÚÃÜԿй¶£¬ÆäÖÐ42%µÄ¾µÏñÖÁÉÙ¶³ö5¸öÃô¸ÐÊýÖµ¡£×й¶µÄÊÇOpenAI¡¢HuggingFaceµÈAIÄ£Ð͵ĽӼûÁîÅÆ£¬×ÜÁ¿´ï4,000¸ö¡£ÕâЩÃÜÔ¿¿É±»ÓÃÓÚÆëÈ«½Ó¼ûÔÆ»·¾³¡¢Git²Ö¿â¡¢CI/CDϵͳ¼°Ö§¸¶¼¯³ÉµÈÖ÷Ìâ»ù´¡ÉèÊ©£¬×é³É³Á´ó°²È«·çÏÕ¡£Ð¹Â¶×éÖ¯¶àÉ¢²¼ÓÚÈí¼þ¿ª·¢¡¢Êг¡¡¢¹¤Òµ¼°AIÁìÓò¡£ÖµÍ×ÌùÐĵÄÊÇ£¬³¬ËijÉй¶Դ×Ô"Ó°×ÓIT"ÕË»§£¬ÕâЩÕË»§ÍùÍù²»×ãÆóÒµ¼¶°²È«¼à¿Ø¡£
https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/
6. WinRAR¸ßΣõè¾¶±éÀú·ì϶Ôâ¶à¹úAPT×éÖ¯ÀûÓÃ
12ÔÂ10ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚ2025Äê12Ô½«WinRARµÄCVE-2025-6218·ì϶ÁÐÈëÒÑÖªÀûÓ÷ì϶Ŀ¼£¬¸Ã·ì϶ÒÑ֤ʵ±»¶à¸ö¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯»ý¼«ÀûÓ᣸÷ì϶Ϊõè¾¶±éÀúÀàÐÍ£¬CVSSÆÀ·Ö7.8£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§´ò¿ª¶ñÒâÎļþ»ò½Ó¼û¶ñÒâÒ³ÃæÊ±Ö´ÐÐËÁÒâ´úÂ룬½öÓ°ÏìWindowsϵͳ°æ±¾¡£RARLABÒÑÔÚ2025Äê6Ô°䲼µÄWinRAR 7.12Öн¨¸´´Ë·ì϶£¬µ«´ËǰÒÑÔâ¿í·ºÀûÓ᣾ݰ²È«³§ÉÌ·ÖÎö£¬¶íÂÞ˹GOFFEE×éÖ¯£¨±ðºÅPaper Werewolf£©Ôø½áºÏCVE-2025-6218ÓëCVE-2025-8088£¨ÆÀ·Ö8.8£©ÌáÒéÍøÂç´¹µö¹¥»÷£»ÄÏÑÇBitter APT×éÖ¯Ôòͨ¹ý¶ñÒâRARѹËõ°üÖ²ÈëNormal.dotmÈ«¾ÖÄ£°å£¬ÈƹýWordºêÏÞ¶ÈʵÏÖÓÆ¾Ã»¯ºóÃÅ£»¶íÂÞ˹Gamaredon×éÖ¯ÔòÕë¶ÔÎÚ¿ËÀ¼¾üÊ¡¢µ±¾Ö»ú¹¹ÌáÒéÓã²æÊ½ÍøÂç´¹µö£¬ÀûÓø÷ì϶²¿ÊðPteranodon¶ñÒâÈí¼þ£¬ÉõÖÁÔÚ2025Äê11Ô³õ´ÎÖ´ÐзÛËéÐÔÐж¯£¬Í¶·ÅGamaWiper²Á³ýÆ÷¡£
https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html


¾©¹«Íø°²±¸11010802024551ºÅ