FinalDraft¶ñÒâÈí¼þ£ºÀûÓÃOutlook²Ý¸å½øÐÐÒñ±Î¹¥»÷µÄÐÂÍþв
°ä²¼¹¦·ò 2025-02-171. FinalDraft¶ñÒâÈí¼þ£ºÀûÓÃOutlook²Ý¸å½øÐÐÒñ±Î¹¥»÷µÄÐÂÍþв
2ÔÂ16ÈÕ£¬FinalDraftÊÇÒ»ÖÖз¢ÏֵĶñÒâÈí¼þ£¬ËüÀûÓÃOutlookµç×ÓÓʼþ²Ý¸å½øÐÐÒñ±ÎµÄºÅÁîºÍ½ÚÔìͨѶ£¬×¨ÃŹ¥»÷ÄÏÃÀij²¿ÃÅ¡£¸Ã¹¥»÷ÓÉElastic Security Labs·¢ÏÖ£¬Éæ¼°Ò»ÌׯëÈ«µÄ¹¤¾ß¼¯£¬Ô̺¬PathLoader¼ÓÔØÆ÷¡¢FinalDraftºóÃż°¶à¸öºóÀûÓ÷¨Ê½¡£FinalDraftͨ¹ýÀÄÓÃOutlookʵÏÖÒñ±ÎͨѶ£¬Ö´ÐÐÊý¾Ýй¶¡¢´úÀí¡¢¹ý³Ì×¢ÈëºÍºáÏòÒÆ¶¯µÈ²Ù×÷£¬Í¬Ê±¾¡Á¿Ï÷¼õºÛ¼£¡£¹¥»÷ʼÓÚPathLoaderÈëÇÖ£¬ËüÖ´Ðдӹ¥»÷Õß»ù´¡ÉèÊ©¼ìË÷µÄshellcode£¬Ô̺¬FinalDraft¶ñÒâÈí¼þ¡£FinalDraftͨ¹ýMicrosoft Graph API³ÉÁ¢Í¨Ñ¶£¬Ê¹ÓÃǶÈëµÄË¢ÐÂÁîÅÆ¼ìË÷OAuthÁîÅÆ²¢´æ´¢ÔÚWindows×¢²á±íÖУ¬ÊµÏÖÓÆ¾Ã½Ó¼û¡£¹¥»÷Õßͨ¹ýOutlook²Ý¸å·¢ËͺͽӹܺÅÁԤ·À¼ì²â²¢ÈÚÈëÕý³£Microsoft 365Á÷Á¿¡£FinalDraftÖ§³Ö37¸öºÅÁÔ̺¬Êý¾Ýй¶¡¢¹ý³Ì×¢Èë¡¢´«µÝ¹þÏ£¹¥»÷µÈ¡£´Ë±í£¬»¹·¢ÏÖFinalDraftµÄLinux±äÌå¼°ÁíÒ»¸öδ¼Í¼µÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷GuidLoader¡£REF7707ÊÇÕë¶ÔÄÏÃÀ±í½»²¿µÄÍøÂç¼äµý»î¶¯£¬µ«·ÖÎöÏÔʾÆäÓë¶«ÄÏÑÇÊܺ¦ÕßÓÐÁªÏµ£¬°µÊ¾Ðж¯ÁìÓò¸ü¹ã¡£¹¥»÷Õßͨ¹ý¶«ÄÏÑǵçÐźͻ¥ÁªÍø»ù´¡ÉèÊ©ÌṩÉ̵ÄÊÜϰȾ¶Ëµã¶Ô×¼¸ß¼ÛÖµ»ú¹¹£¬²¢ÀûÓö«ÄÏÑÇÒ»Ëù´óѧµÄ´æ´¢ÏµÍ³ÍйܶñÒâÈí¼þ¸ºÔØ¡£
https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/
2. SteamÉ̵êÓÎÏ·PirateFi´«²¼Vidar¶ñÒâÈí¼þ£¬Ó°Ï쳬1500Óû§
2ÔÂ14ÈÕ£¬SteamÉ̵êÖÐÒ»¿îÃûΪPirateFiµÄÃâ·ÑÓÎÏ·ÔÚ2ÔÂ6ÈÕÖÁ2ÔÂ12ÈÕÆÚ¼ä´«²¼ÁËVidarÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬Ó°Ïì¿ÉÄܶà´ï1500ÃûÓû§¡£¸ÃÓÎÏ·ÓÉSeaworth Interactive°ä²¼£¬±»ÃèÊöΪһ¿îÉú¼ÆÓÎÏ·£¬µ«Steam·¢ÏÔìäÔ̺¬¶ñÒâÈí¼þºóÒÑÏòÊÜÓ°ÏìÓû§·¢ËÍ֪ͨ£¬½¨ÒéËûÃdzÁÐÂ×°ÖÃWindowsÒÔÈ·±£°²È«¡£SECUINFRA Falcon TeamÈ·ÈϸöñÒâÈí¼þΪVidarÐÅÏ¢ÇÔÈ¡·¨Ê½µÄÒ»¸ö°æ±¾£¬°µ²ØÔÚPirate.exeÎļþÖС£¸Ã¶ñÒâÈí¼þʹÓø÷Àà»ìºÏ¼¼ÊõºÍ¸ü¸ÄºÅÁîºÍ½ÚÔì·þÎñÆ÷ÒÔÇÔȡƾ֤¡£×êÑÐÈËÔ±ÒÔΪ£¬PirateFiÃû³ÆÖеÄweb3/Çø¿éÁ´/¼ÓÃÜÇ®±ÒÒýÓÃÊÇΪÁËÎüÒýÌØ¶¨Íæ¼ÒȺÌå¡£¹ÌÈ»SteamÍÆ³öÁ˶î±í´ëÊ©±£»¤Íæ¼ÒÃâÊÜδ¾ÊÚȨµÄ¶ñÒâ¸üÐÂÇÖº¦£¬µ«PirateFi°¸ÀýÅú×¢ÕâЩ´ëÊ©ÈÔÐè¼ÓÇ¿¡£´ËǰҲÓÐÀàËÆ¶ñÒâÈí¼þÈëÇÖSteamÉ̵êµÄ°¸Àý£¬ÈçÀûÓÃChrome·ì϶µÄDota 2ÓÎϷģʽºÍ±»ºÚ¿Í¹¥»÷µÄ¡¶Slay the Spire¡·Ä£×é¡£
https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/
3. ÒÉËÆ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-2372ÀûÓÃÉ豸´úÂë´¹µö¹¥»÷Microsoft 365ÕÊ»§
2ÔÂ15ÈÕ£¬Ò»¸öÃûΪStorm-2372µÄÍþвÐÐΪÕߣ¬ÒÉËÆÓë¶íÂÞ˹Óйأ¬ÔÚÕë¶ÔÈ«Çò¶à¸öÁìÓòµÄ×éÖ¯ÌáÒéÉ豸´úÂëÍøÂç´¹µö¹¥»÷£¬Ö¸±êÔ̺¬µ±¾Ö¡¢·Çµ±¾Ö×éÖ¯¡¢IT·þÎñºÍ¼¼Êõ¡¢¹ú·À¡¢µçÐÅ¡¢ÎÀÉúÒÔ¼°ÄÜÔ´µÈÁìÓò¡£×ÔÈ¥Äê8ÔÂÒÔÀ´£¬¸ÃÐÐΪÕßͨ¹ýÐÂÎÅÆ½Ì¨¼ÙÒâÓëÖ¸±êÓйصijÛÃûÈËÊ¿£¬ÓÕÆÓû§ÔںϷ¨µÇÂ¼Ò³ÃæÉÏÊäÈë¹¥»÷ÕßÌìÉúµÄÉ豸´úÂ룬´Ó¶ø»ñÈ¡¶ÔÊܺ¦ÕßMicrosoft 365ÕÊ»§µÄ³õʼ½Ó¼ûȨÏÞ£¬²¢ÆôÓÃGraph APIÊý¾ÝÍøÂç»î¶¯¡£Î¢Èí°µÊ¾£¬¹¥»÷Õß´Ë¿ÌʹÓÃMicrosoftÉí·ÝÑéÖ¤´úÀíµÄÌØ¶¨¿Í»§¶ËID£¬¿ÉÄÜÌìÉúеÄÁîÅÆ£¬´øÀ´ÐµĹ¥»÷ºÍÓÆ¾ÃÐÔ¿ÉÄÜÐÔ¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬Î¢Èí½¨Òé×èÖ¹É豸´úÂëÁ÷£¬Ö´ÐÐǰÌá½Ó¼ûÕ½Êõ£¬²¢ÔÚÒÉ»ó´æÔÚ´¹µö¹¥»÷ʱ³·ÏúÓû§µÄË¢ÐÂÁîÅÆ²¢ÉèÖÃǰÌá½Ó¼ûÕ½ÊõÒÔÇ¿Ôì³ÁÐÂÉí·ÝÑéÖ¤¡£Í¬Ê±£¬Ê¹ÓÃMicrosoft Entra IDµÄµÇ¼ÈÕÖ¾½øÐÐ¼à¿Ø²¢¼±¾ç¼ø±ðÒì³£µÇ¼³¢ÊÔ¡£
https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/
4. ³¯ÏʺڿÍ×éÖ¯KimsukyÒÉËÆÌáÒéDEEP#DRIVEÍøÂç´¹µö¹¥»÷
2ÔÂ14ÈÕ£¬Ò»³¡ÃûΪDEEP#DRIVEµÄÍøÂç´¹µö¹¥»÷»î¶¯×Ô2024Äê9ÔÂÆðÕë¶Ôº«¹úÆóÒµ¡¢µÐÔÖʵÌå¼°¼ÓÃÜÇ®±ÒÓû§·¢Õ¹£¬ÒÑÔì³ÉÊýǧÃûÊܺ¦Õß¡£Õâ´Î¹¥»÷ÓÉÒÉËÆ³¯ÏʺڿÍ×éÖ¯KimsukyÌáÒ飬ÆäÖØÒªÖ÷ÕÅÊÇÍøÂ纫¹úʵÌåµÄÃô¸ÐÐÅÏ¢¡£¹¥»÷ÕßʹÓú«Óï±àдµÄ¶¨ÔìÍøÂç´¹µöµö¶ü£¬¼Ù×°³É¹¤×÷ÈÕÖ¾¡¢±£ÏÕÎļþºÍ¼ÓÃÜÓйØÎļþµÈºÏ·¨Îļþ£¬Í¨¹ýDropboxµÈƽ̨·Ö·¢£¬ÒÔÌӱܴ«Í³°²È«·ÀÓù¡£ÕâЩµö¶üͨ³£ÒÔ.hwp¡¢.xlsxºÍ.pptxµÈÊÜÐÅÀµµÄÎļþÌåʽ³öÏÖ£¬¾«ÐÄÉè¼ÆÒÔÎüÒýÖ¸±êÊܶࡣ¹¥»÷Á´ÒÔ¼Ù×°³ÉºÏ·¨ÎĵµµÄ.lnkÎļþÆðÍ·£¬Æô¶¯¶ñÒâPowerShell¾ç±¾µÄÖ´ÐУ¬½ø¶øÏÂÔØÆäËûÓÐЧ¸ºÔز¢³ÉÁ¢ÓƾÃÐÔ¡£¹¥»÷Õß»¹ÀûÓÃDropbox½øÐÐÊý¾Ýй¶£¬²¢Ê¹ÓöàÖÖ¼¼ÊõÌӱܼì²â¡£Ö»¹Ü¹¥»÷ÕߵĻù´¡ÉèÊ©¿´ËƶÌÔÝ£¬µ«ÆäÕ½Êõ¡¢¼¼ÊõºÍ·¨Ê½ÓëKimsuky×éÖ¯¼«¶ÈÀàËÆ¡£Securonix½¨Òé¶ÔÓû§½øÐÐÍøÂç´¹µö½ÌÓý¡¢¼à¿Ø¶ñÒâÈí¼þÔÝ´æÄ¿Â¼ÒÔ¼°¿¿µÃסµÄ¶ËµãÈÕÖ¾¼Í¼£¬ÒÔ·ÀÓù´ËÀ๥»÷¡£
https://hackread.com/n-korean-hackers-deep-drive-attacks-against-s-korea/
5. ºÚ¿ÍÀûÓÃCVE-2025-0108·ì϶¹¥»÷PAN-OS·À»ðǽ
2ÔÂ14ÈÕ£¬ºÚ¿ÍÀûÓÃ×î½ü½¨¸´µÄCVE-2025-0108·ì϶¶ÔPalo Alto NetworksµÄPAN-OS·À»ðǽÌáÒéÁ˹¥»÷¡£¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢Å²ÓÃPHP¾ç±¾£¬Î£¼°ÏµÍ³µÄÆëÈ«ÐԺͻúÃÜÐÔ¡£Palo Alto NetworksÔÚ2ÔÂ12ÈÕ°ä²¼°²È«²¼¸æ£¬¶½´ÙÖÎÀíÔ±½«·À»ðǽÉý¼¶µ½Ö¸¶¨°æ±¾ÒÔ½â¾ö´ËÎÊÌ⣬ͬʱָ³öPAN-OS 11.0ÒòÒÑ´ïʹÓÃÊÙÃü£¬½«²»ÔÙ°ä²¼½¨¸´·¨Ê½¡£¸Ã·ì϶ÓÉAssetnoteµÄ°²È«×êÑÐÈËÔ±·¢ÏÖ²¢»ã±¨£¬ËûÃÇÒѰ䷢Ô̺¬ÆëÈ«·ì϶ÀûÓÃϸ½ÚµÄÎÄÕ¡£¹¥»÷Õß¿ÉÀûÓô˷ì϶ÌáÈ¡Ãô¸ÐÊý¾Ý¡¢¼ìË÷ÅäÖûò°Ñ³ÖÉèÖá£GreyNoiseƽ̨¼Í¼ÁËÕë¶Ô佨²¹·À»ðǽµÄ¹¥»÷³¢ÊÔ£¬ÇÒ¿ÉÄÜÓжà¸öÍþвÐÐΪÕ߲μӡ£Ä¿Ç°£¬Óг¬¹ý4400̨PAN-OSÉ豸µÄÖÎÀí½çÃæÔÚÏß¶³ö¡£Îª·ÀÓù¹¥»÷£¬½¨ÒéÀûÓò¹¶¡²¢Ï޶ȶԷÀ»ðǽÖÎÀí½Ó¿ÚµÄ½Ó¼û¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
6. CISA½«Apple iOS/iPadOS¼°Mitel SIPµç»°·ì϶ÁÐÈëÒÑÖªÀûÓ÷ì϶Ŀ¼
2ÔÂ15ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«Apple iOSºÍiPadOSµÄÊÚȨÃýÎó·ì϶£¨CVE-2025-24200£©ÒÔ¼°Mitel SIPµç»°µÄ²ÎÊý×¢Èë·ì϶£¨CVE-2024-41710£©Ôö³¤µ½ÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£Æ»¹û´¹Î£°ä²¼Á˰²È«¸üУ¬½¨¸´ÁË¿ÉÄܱ»¡°¼«Æä¸´ÔÓ¡¹Øë¶ÔÐÔ¹¥»÷ÀûÓõÄCVE-2025-24200·ì϶£¬¸Ã·ì϶ӰÏìiPhone XS¼°¸üлúÐͺͶà¿îiPad£¬¹¥»÷Õß¿ÉÀûÓô˷ì϶ÔÚËø¶¨É豸ÉϽûÓÃUSBÏÞ¶Èģʽ¡£Í¬Ê±£¬MitelÒ²°ä²¼Á˹̼þ¸üнâ¾öÁËCVE-2024-41710·ì϶£¬¸Ã·ì϶ӰÏìMitel 6800¡¢6900ºÍ6900wϵÁÐSIPµç»°£¬¿ÉÄÜÔÊÐí¹¥»÷Õß½øÐкÅÁî×¢Èë¹¥»÷¡£Ëæºó£¬ÓÐ×êÑз¢ÏÖ»ùÓÚMiraiµÄ½©Ê¬ÍøÂçAquabotµÄбäÖÖÕë¶Ô´æÔڸ÷ì϶µÄMitel SIPµç»°½øÐй¥»÷¡£CISAÒªÇóÁª¹ú»ú¹¹ÔÚ2025Äê3ÔÂ5ÈÕǰ½¨¸´ÕâЩ·ì϶£¬²¢½¨Òé¸öÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©Öеķì϶£¬ÒÔ½µµÍÂä´ó·çÏÕ¡£
https://securityaffairs.com/174246/security/u-s-cisa-adds-apple-ios-and-ipados-and-mitel-sip-phones-flaws-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ