CISA½«Digiever NVR¸ßΣ·ì϶ÁÐÈëKEVĿ¼
°ä²¼¹¦·ò 2025-12-261. CISA½«Digiever NVR¸ßΣ·ì϶ÁÐÈëKEVĿ¼
12ÔÂ25ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Ó°ÏìDigiever DS-2105 ProÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©µÄCVE-2023-52163°²È«·ì϶ÕýʽÄÉÈëÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬²¢Ç¿µ÷¸Ã·ì϶Òѱ»Ö¤Êµ´æÔÚ»ý¼«ÀûÓÃÐÐΪ¡£¸Ã·ì϶CVSSÆÀ·ÖΪ8.8£¬ÊôÓÚ¸ßΣ¼¶±ð£¬Éæ¼°ºÅÁî×¢Èë·ì϶£¬ÔÊÐí¹¥»÷ÕßÔÚÉí·ÝÑéÖ¤ºóͨ¹ýtime_tzsetup.cgi½Ó¿ÚÖ´ÐÐÔ¶³Ì´úÂë¡£CISAÖ¸³ö£¬AkamaiºÍFortinetµÈ¶à¼Ò°²È«»ú¹¹ÒÑÂŴλ㱨ÍþвÐÐΪÕßÀûÓô˷ì϶´«²¼MiraiºÍShadowV2µÈ½©Ê¬ÍøÂç¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Digiever DS-2105 ProÉ豸ÒÑ´¦ÓÚʹÓÃÊÙÃüÖÕÖ¹£¨EoL£©×´Ì¬£¬Òò¶ø¸Ã·ì϶¼°¹ØÁªµÄËÁÒâÎļþ¶ÁÈ¡·ì϶CVE-2023-52164£¨CVSSÆÀ·Ö5.1£©¾ùδ»ñµÃ¹Ù·½²¹¶¡½¨¸´¡£TXOne Research°²È«×êÑÐÔ±Ta-Lun Yen½øÒ»²½Ö¤Êµ£¬ÓÉÓÚÉ豸ÐÔÃüÖÜÆÚʵÏÖ£¬Óû§ÎÞ·¨Í¨¹ý³§É̸üн¨¸´ÕâЩ°²È«È±µã¡£Îª½µµÍ·çÏÕ£¬CISA½¨ÒéÓû§µ±¼´²ÉÈ¡·À»¤´ëÊ©£ºÔ¤·À½«É豸ֱ½Ó¶³öÓÚ»¥ÁªÍø£¬²¢Åú¸ÄĬÈÏÓû§ÃûºÍÃÜÂëÒÔ¼ÓÇ¿ÈÏÖ¤°²È«ÐÔ¡£
https://thehackernews.com/2025/12/cisa-flags-actively-exploited-digiever.html
2. ·ÇÖÞ19¹ú½áºÏ¡°ÉÚ±øÐж¯¡±³Á´´ÍøÂç·¸×ï
12ÔÂ24ÈÕ£¬·ÇÖÞ19¹ú·¨ÂÉ»ú¹¹10ÔÂ27ÈÕÖÁ11ÔÂ27ÈÕ½áºÏ·¢Õ¹¡°ÉÚ±øÐж¯¡±£¨Operation Sentinel£©£¬³Áµã½ø¹¥ÆóÒµÓÊÏäÈëÇ¶à¿Æ£¨BEC£©¡¢Êý×ÖÀÕË÷ºÍÀÕË÷Èí¼þ¹¥»÷Èý´óÍøÂçÍþв£¬»ñµÃ³Á´óÕ½¹û¡£Ðж¯ÆÚ¼ä¹²¿ÛÁô574ÃûÏÓÒÉÈË£¬µ·»Ù6ÖÖÀÕË÷Èí¼þ±äÖÖ£¬½ûÓÃ6000Óà¸ö¶ñÒâÁ´½Ó£¬×·»ØÔ¼300ÍòÃÀÔª·¸·¨×ʽð£¬Óйذ¸¼þËðʧ¹À¼Æ³¬2100ÍòÃÀÔª£¬³ä·ÖչʾÁ˼±¾ç¹ú¼ÊºÏ×÷ÔÚ·À±¸³Á´ó¾¼ÃËðʧÖеĹؼü×÷ÓᣵäÐͰ¸Àý͹ÏÔÐж¯ÊµÐ§£ºÈûÄÚ¼Ó¶û³É¹¦×èÖ¹´óÐÍʯÓÍÆóÒµ790ÍòÃÀÔªµç»ãÚ¿Æ£¬Í¨¹ý¼±¾ç¶³½áÊÕ¿îÕË»§Ô¤·ÀËðʧ£»¼ÓÄɽðÈÚ»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂ100TBÊý¾Ý¼ÓÃÜ¡¢12ÍòÃÀÔª±»µÁ£¬µ±¾Öͨ¹ý¶ñÒâÈí¼þ·ÖÎöËø¶¨ÀàÐͲ¢¿ª·¢½âÃܹ¤¾ß£¬¸´Ô½ü30TBÊý¾Ý£¬Í¬Ê±µ·»Ùºá¿ç¼ÓÄÉÓëÄáÈÕÀûÑǵÄÚ¿ÆÍŻ±´Äþ¹Ø¹Ø43¸ö¶ñÒâÓòÃû£¬½ûÓÃ4318¸öÓëÀÕË÷ÓйصÄÉ罻ýÌåÕË»§£¬¿ÛÁô106ÈË£»¿¦Âó¡Ѹ¿ì×èÖ¹Æû³µÏúÊÛÆ½Ì¨´¹µö¹¥»÷£¬ÊýÓ×ʱÄÚ¶³½áÓйØÒøÐÐÕË»§¡£
https://cybersecuritynews.com/interpol-taken-6-ransomware-variants-arrested/
3. Operation IconCat£ºÒÔÉ«ÁжàÐÐÒµ¾«×¼ÍøÂç¹¥»÷
12ÔÂ24ÈÕ£¬Seqrite Labs°²È«×êÑÐÈËÔ±¸æ·¢´úºÅΪOperation IconCatµÄÍøÂç¹¥»÷»î¶¯£¬¸Ã¹¥»÷ͨ¹ý¼Ù×°³É³ÛÃû°²È«¹¤¾ßµÄ¶ñÒâÎĵµ£¬¶ÔÒÔÉ«ÁÐÐÅÏ¢¼¼Êõ¡¢ÈËÁ¦×ÊÔ´·þÎñ¼°Èí¼þ¿ª·¢µÈÐÐÒµÖ´Ðо«×¼ÉøÈë¡£¹¥»÷ÕßѡȡÉç»á¹¤³ÌѧÓ븴ÔÓ¼¼Êõ¼¿Á©½áºÏµÄ·½Ê½£¬³É¹¦Èƹý´«Í³°²È«·À»¤ÏµÍ³£¬Ôì³É¶àÆðÆóÒµÈëÇÖÊÂÎñ¡£Õâ´Î¹¥»÷Ô̺¬Á½Ìõ¶ÀÁ¢µ«Õ½ÊõÀàËÆµÄ¹¥»÷Á´Â·¡£µÚÒ»ÌõÁ´Â·ÒÔPDFÎĵµÎªÔØÌ壬´«²¼»ùÓÚPython¿ª·¢µÄPYTRIC¶ñÒâÈí¼þ¡£PYTRICͨ¹ýPyInstaller´ò°ü£¬¾ß±¸ÏµÍ³ÎļþɨÃè¡¢ÖÎÀíԱȨÏÞ¼ì²â¡¢Êý¾Ýɾ³ý¼°±¸·Ý¶Ï¸ùµÈ·ÛËéÐÔÖ°ÄÜ£¬²¢Í¨¹ýÃûΪ¡°Backup2040¡±µÄTelegram»úеÈËʵÏÖÔ¶³Ì½ÚÔ죬×îÖÕÖ¸±ê²»½öÊÇÐÅÏ¢ÇÔÈ¡£¬¸üÔ̺¬Êý¾ÝÏú»Ù¡£µÚ¶þÌõÁ´Â·ÔòÀûÓÃWordÎĵµ´«²¼Rust˵»°±àдµÄRUSTRICÖ²È뷨ʽ¡£RUSTRIC¾ß±¸ÏȽøµÄ¿úËÅÄÜÁ¦£¬¿É¼ì²â28¿îÖ÷Á÷ɱ¶¾Èí¼þ£¬Í¨¹ýWindowsÖÎÀí¹æ·¶£¨WMI£©Ö´ÐÐϵͳºÅÁî¼ø±ðÊÜϰȾÉ豸£¬²¢Óë¹¥»÷Õß½ÚÔì·þÎñÆ÷³ÉÁ¢ÓƾÃÏνӡ£
https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/
4. ŵÂüÄáÚ¿ÆÉý¼¶£º¶à¹úAIͶ×ÊÏÝÚåж¯Ïò
12ÔÂ24ÈÕ£¬Ë¹Âå·¥¿ËESET¹«Ë¾Êý¾ÝÏÔʾ£¬ÃûΪ¡°ÅµÂüÄᡱµÄͶ×Êڿƻ2025ÄêÔö·ù´ï62%£¬´«²¼ÁìÓò´ÓFacebookÀ©´óÖÁYouTubeµÈƽ̨£¬ÒÑÀ¹½Ø³¬6.4Íò¸öÓйضñÒâÁ´½Ó£¬ÖØÒªÓ°Ïì½Ý¿Ë¡¢ÈÕ±¾¡¢Ë¹Âå·¥¿Ë¡¢Î÷°àÑÀ¡¢²¨À¼Îå¹ú¡£¸ÃÚ¿Æ×Ô2024Äê12Ô³õ´ÎÅû¶ÒÔÀ´£¬Í¨¹ýÉ罻ýÌå¶ñÒâ¸æ°×¡¢·ÂðÆóÒµ¹Ù·½ÌûÎļ°AIÌìÉúÊÓÆµÍƼö£¬ÓÕµ¼Óû§Í¶×ÊÐéαÏîÄ¿£¬ÒÔ¸ß¶î»Ø±¨Îªµö¶üÖ´ÐÐÚ¿Æ¡£Êܺ¦ÕßÉêÇëÌáÏÖʱ£¬Ú¿Æ·Ö×Ó»áÒÔ¡°Ö§¸¶¶î±íÓöȡ±¡°ÌṩÉí·ÝÖ¤/ÐÅÓþ¿¨ÐÅÏ¢¡±µÈÀíÓɽøÒ»²½Õ¥È¡×ʽ𡣼¼Êõ²ãÃæ£¬AIÌìÉúÊÓÆµµÄÕæÇжÈÏÔÖøÌáÉý£¬·Ö±æÂʸü¸ß¡¢ÈËÎï×÷ΪÓëºôÎü¸üÌìÈ»¡¢ÒôÊÓÆµÍ¬²½¸üÁ÷³©£¬ÃûÈË»»Á³ÊÓÆµµÄ´¹µö±íµ¥ÌîдÂÊÒò¶øÉÏÉý¡£ÐéαÄÚÈݳ£½áºÏÈȵãÊÂÎñ»ò³ÛÃûÈËÎï¼ÓÇ¿¿ÉÐŶȡ£Îª¶ã±Üƽ̨¼ì²â£¬Ú¿Æ¸æ°×ͨ³£½öͶ·ÅÊýÓ×ʱ£¬²¢Í¨¹ý³Á¶¨ÏòÖÁÕý³£¼Ù×°Ò³Ãæ¡¢ÀÄÓÃÉ罻ýÌ叿°×ϵͳ±íµ¥¹¤¾ßµÈ·½Ê½½µµÍ±»·¢ÏÖ·çÏÕ¡£
https://thehackernews.com/2025/12/nomani-investment-scam-surges-62-using.html
5. MacSyncľÂíͨ¹ýÊðÃûÀûÓÃÈÆ¹ýmacOS°²È«»úÔì
12ÔÂ24ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÃûΪMacSyncµÄÐÂÐÍmacOSÇÔÃÜľÂí±äÖÖ£¬Æäͨ¹ý¼Ù×°³É¼´Ê±Í¨Ñ¶Èí¼þ×°Ö÷¨Ê½µÄSwiftÀûÓô«²¼¡£°²È«×êÑÐÔ±Ö¸³ö£¬·ÖÆçÓÚÔçÆÚÒÀÀµÓû§ÊÖ¶¯²Ù×÷µÄ±äÖÖ£¬´Ë°æ±¾Ñ¡È¡¸ü¾ßºýŪÐÔµÄ×Ô¶¯¹¥»÷¼¿Á©¡£Ö»¹ÜÀûÓþ¹ýÊðÃûºÍ¹«Ö¤£¬¿ÉÔ¤·À±»Gatekeeper¡¢XProtectÀ¹½Ø£¬µ«×°Ö÷¨Ê½ÈÔÏÔʾ¡°ÓÒ¼ü´ò¿ª¡±×¢Ã÷ÒÔÈÆ¹ý°²È«·À»¤£¬Ä¿Ç°Æ»¹ûÒѳ·³ýÆä´úÂëÊðÃûÖ¤Êé¡£¸ÃľÂí¿ªÊÍÆ÷»ùÓÚSwift˵»°¿ª·¢£¬Ö´ÐÐǰ»á½øÐÐϵÁÐǰÖò鳣ºÑéÖ¤ÍøÂçÏνÓ״̬¡¢ÉèÖÃÔ¼3600ÃëµÄ×îÓ×Ö´ÐоàÀë¡¢ÒÆ³ýÎļþ¸ôÀëÊôÐÔ¼°ÑéÖ¤ÎļþÓÐЧÐÔ¡£ÆäÓÃÓÚ»ñÈ¡ÔØºÉµÄcurlºÅÁî²ÎÊý²úÉúÏÔÖø±ä¶¯£¬Åú×¢¹¥»÷Õß¿ÌÒâµ÷ÕûÔØºÉ»ñÈ¡ÓëÑéÖ¤·½Ê½£¬ÒÔÌáÉý¹¥»÷¿¿µÃסÐÔ»ò¶ã±Ü¼ì²â¡£´Ë±í£¬¹¥»÷Õßͨ¹ýǶÈëÎÞ¹ØPDFÎĵµ½«´ÅÅ̾µÏñ´óÓ×À©³äÖÁ25.5MBÒÔ¶ã±Ü¼ì²â¡£¾½âÎö£¬¶ñÒâÔØºÉΪBase64±àÂëµÄMacSyncľÂí£¬ÊÇ2025Äê4Ô³õ´Î³öÏÖµÄMac.cľÂíµÄ¸ÄÃû°æ±¾¡£¾Ý·ÖÎö£¬¸ÃľÂíÄÚÖÃÖ°ÄÜÍêÕûµÄGo˵»°´úÀí·¨Ê½£¬²»½ö¿ÉÇÔÈ¡Êý¾Ý£¬»¹ÄÜʵÏÖÔ¶³Ì½ÚÔì²Ù×÷¡£
https://thehackernews.com/2025/12/new-macsync-macos-stealer-uses-signed.html
6. ÐͬȦÌ×½èÐéÎ±ÍøÂçÕÐÆ¸¸æ°×¶Ô×¼Öж«ºÍ±±·Ç
12ÔÂ24ÈÕ£¬¹ú¼ÊÍøÂ簲ȫ¹«Ë¾Group-IB×îл㱨¸æ·¢£¬Öж«ºÍ±±·ÇµØÓòÕýÔâ·ê¹æÄ£»¯ÐͬÐÔÐéÎ±ÍøÂçÕÐÆ¸¸æ°×ȦÌ×£¬Ú¿Æ·Ö×ÓÀûÓÃйÚÒßÇéºóÔ¶³Ì°ì¹«±é¼°Ç÷Ïò£¬Í¨¹ýÔì×÷ÓÅÔ½µÄÉ罻ýÌ叿°×Ö´Ðо«×¼Ú¿Æ¡£¸ÃȦÌ×ÒÔ"ÇáËÉʵÏÖµ¥Ò»ÏßÉϹ¤×÷¼´¿É׬ȡ10ÖÁ170ÃÀÔªÈÕн"Ϊµö¶ü£¬ÊµÔò°µ²ØÇÔÈ¡²Æ²¯ÓëÓ×ÎÒÐÅÏ¢µÄÓÐ×éÖ¯·¸×ï»î¶¯¡£×êÑÐÏÔʾ£¬Öж«µØÓò³¬60%ÀͶ¯Õ߯«²îȫְԶ³Ì¹¤×÷£¬ÕâÒ»ÐÐΪת±ä±»Ú¿ÆÍÅ»ïÀûÓá£2025ÄêÕûÄ꣬Group-IB¼à²âµ½1500ÓàÌõÚ¿ÆÕÐÆ¸¸æ°×£¬ÖØÒª¼¯ÖÐÓÚ°£¼°¡¢º£Íå¹ú¶È¡¢°¢¶û¼°ÀûÑÇ¡¢Í»Äá˹¡¢Ä¦Âå¸ç¡¢ÒÁÀ¿ËºÍÔ¼µ©¡£Ú¿Æ¸æ°×ͨ¹ýFacebook¡¢Instagram¡¢TikTokµÈƽ̨°ä²¼£¬Ã°ÓóÛÃûµçÉÌÆ½Ì¨¡¢ÒøÐлòµ±¾Ö»ú¹¹ÃûÒ壬²¢Ñ¡È¡±¾µØ»¯ÊÊÅäÕ½Êõ¡ª¡ªÊ¹ÓõØÓò·½ÑÔ¡¢±¾µØ»õ±Òµ¥Ôª¼°ÊܶàÊìϤµÄÆ·ÅÆÔªËØ£¬ÏÔÖøÌáÉý¸æ°×¿ÉÐŶȡ£Ú¿ÆÁ÷³Ì³öÏָ߶ÈÐͬÐÔ£ºÓû§»ØÓ¦¸æ°×ºó£¬¹µÍ¨±»Ñ¸¿ì×ªÒÆÖÁWhatsApp»òTelegramµÈ¸öÈËͨѶÈí¼þ£¬Ú¿Æ·Ö×ÓÒÔ"ÈëÖ°ÉóºË"ΪÓÉË÷È¡Ó×ÎÒÐÅÏ¢¼°²ÆÕþÐÅÏ¢£¬²¢ÒªÇó½ÉÄÉѺ½ðÒÔ»ñÈ¡"¸ß±¨´ð¹¤×÷"¡£³õÆÚÓ×¶î·Â·ûÆÊØÐÅÀµºó£¬Ú¿Æ·Ö×Ó¼´Ê§Áª¡£
https://www.infosecurity-magazine.com/news/scams-mena-fake-online-job/


¾©¹«Íø°²±¸11010802024551ºÅ