Catwatchful¼äµýÈí¼þ·ì϶ÖÂ6.2ÍòÓû§Êý¾Ýй¶
°ä²¼¹¦·ò 2025-07-081. Catwatchful¼äµýÈí¼þ·ì϶ÖÂ6.2ÍòÓû§Êý¾Ýй¶
7ÔÂ4ÈÕ£¬2025Äê6Ô£¬°²È«×êÑÐÔ±Eric Daigle¸æ·¢Catwatchful¼äµýÈí¼þ´æÔÚÑϳÁ°²È«·ì϶£¬ÆäFirebaseÊý¾Ý¿âÒòSQL×¢Èë¹¥»÷¶³ö62,000ÃûÓû§Ã÷ÎĵǼÐÅÏ¢¼°26,000̨É豸Êý¾Ý£¬Òý·¢Êý¾Ýй¶ÊÂÎñ¡£Õâ¿î¼Ù×°³É¡°ÒþÐΡ±¶ùͯ¼à¿ØÀûÓõļäµýÈí¼þ£¬ÏÖʵͨ¹ýÎïÀí½Ó´¥Ö²ÈëÊܺ¦ÕßÊÖ»ú£¬·¸·¨ÇÔÈ¡ÕÕÆ¬¡¢¶ÌÐÅ¡¢ÊµÊ±µØÎ»¼°»·¾³ÒôƵ£¬²¢Ô¶³Ì²Ù¿ØÉãÏñÍ·¡£Ö»¹ÜÀûÓÃÉ̵êÒѲ»ÈÝ´ËÀ๤¾ß£¬CatwatchfulÈÔͨ¹ýÔ¤ÅäÖÃAPK´«²¼£¬Êܺ¦Õ߶༯ÖÐÓÚÄ«Î÷¸ç¡¢¸çÂ×±ÈÑǵÈÀ¶¡ÃÀÖÞ¹ú¶È£¬²¿ÃÅÊý¾Ý¿É×·ÒäÖÁ2018Äê¡£ÊÂÎñ¶³öºó£¬TechCrunchÓëÊý¾Ýй¶֪ͨƽ̨Have I Been PwnedºÏ×÷¾¯Ê¾Ç±ÔÚÊܺ¦Õߣ¬¹È¸èËäͨ¹ý°²È«ä¯ÀÀÏóÕ÷ÓйØÓòÃû£¬µ«ÉæÊÂÊý¾Ý¿âÔÚµ÷²éÆÚ¼äÈÔ³ÖÐøÔÚÏß¡£¹¦·òÏßÏÔʾ£¬6ÔÂ23ÈչȸèȾָºó£¬Ö÷ÓòÃûcatwatchful.pinkÓÚ6ÔÂ25ÈÕ̱»¾£¬µ«´úÌæÓòÃûxng.vju.temporary.site´ÎÈÕ¸´Ô·þÎñ£¬Ö±ÖÁ6ÔÂ27ÈÕͨ¹ýWAF×è¶ÏSQL×¢Èë¹¥»÷¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸ÃÈí¼þÄÚÖá°543210¡±ºóÃÅ´úÂ룬ÔÊÐí¹¥»÷ÕßÔÚÀûÓðµ²Øºó³ÁлñÈ¡½ÚÔìȨ£¬Óû§¿Éͨ¹ý²¦´ò¸Ã´úÂë¼ì²â²¢Ð¶ÔضñÒⷨʽ¡£
https://securityaffairs.com/179620/malware/a-flaw-in-catwatchful-spyware-exposed-logins-of-62000-users.html
2. CISA½«Google Chromium V8·ì϶ÁÐÈëÒÑÖª¿ÉÀûÓ÷ì϶Ŀ¼
7ÔÂ7ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«±àºÅΪCVE-2025-6554µÄChromiumV8·ì϶ÁÐÈëÒÑÖª¿ÉÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬±ê־ȡ¸Ã¸ßΣ·ì϶ÒѽøÈëµ±¾ÐÄà¹ÜÊÓÒ°¡£¸Ã·ì϶´æÔÚÓÚGoogleChrome138.0.7204.96֮ǰ°æ±¾µÄV8JavaScriptºÍWebAssemblyÒýÇæÖУ¬ÊôÓÚµäÐ͵ÄÀàÐÍ»ìºÏ·ì϶£¬µ±ÒýÇæÃýÎó´¦ÖÃÊý¾ÝÀàÐÍʱ£¬¿ÉÄܵ¼ÖÂÄÚ´æ°Ü»µ»òËÁÒâ´úÂëÖ´ÐУ¬¹¥»÷Õß¿Éͨ¹ý»ú¹Ø¶ñÒâHTMLÒ³ÃæÖ´ÐÐÔ¶³Ì¹¥»÷¡£¹È¸è°²È«ÍŶÓÓÚ2025Äê6ÔÂ25ÈÕÓÉÍþв·ÖÎöÓ××é×êÑÐÔ±Cl¨¦mentLecigne·¢Ïָ÷ì϶ºó£¬Ñ¸¿ìͨ¹ýStableͨ·ÏòÈ«Æ½Ì¨ÍÆËͽ¨¸´²¹¶¡£¬Chrome²»±ä°æÒѸüÐÂÖÁ138.0.7204.x°æ±¾¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ´Î½¨¸´¾à·ì϶·¢ÏÖ½ö¸ôÒ»Ì죬µ«°²È«²¼¸æÃ÷È·Ö¸³ö"Ò°±íÒÑ´æÔÚÕë¶Ô¸Ã·ì϶µÄ¹¥»÷ÀûÓÃ"£¬Åú×¢ÍþвÐÐΪÕß¿ÉÄÜÒѽ«ÆäÓÃÓÚ¶¨Ïò¹¥»÷£¬Éæ¼°¹ú¶ÈºÚ¿Í×éÖ¯»òóÒ×¼äµýÈí¼þ¹©¸øÉ̵ĿÉÄÜÐÔÒý·¢Òµ½çÓÇÓô¡£ÃÀ¹úÁª¹úµ±¾ÖÒªÇóËùÓÐÁª¹úÐÐÕþ²¿ÃÅ»ú¹¹±ØÐëÔÚ2025Äê7ÔÂ23ÈÕǰʵÏÖ·ì϶½¨¸´¡£
https://securityaffairs.com/179682/hacking/u-s-cisa-adds-google-chromium-v8-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. Atomic macOS¶ñÒâÈí¼þ½ø»¯Éý¼¶£¬MacÉè±¸Ãæ¶ÔÓÆ¾ÃÐÔºóÃÅÍþв
7ÔÂ7ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶£¬Õë¶ÔmacOSϵͳµÄAtomicÐÅÏ¢ÇÔÈ¡·¨Ê½£¨AMOS£©ÒÑÍÆ³ö¾ß±¸Óƾû¯ºóÃÅÖ°ÄܵÄа汾£¬±ê־ȡÕâÒ»¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨µÄ¼¼ÊõÄÜÁ¦ÓëÍþвµÈ¼¶ÏÔÖøÉý¼¶¡£¾ÝMacPawÆìÏÂMoonlock³¢ÊÔÊÒ·ÖÎö£¬¸ÃºóÃÅ×é¼þ¿ÉʵÏÖÔ¶³ÌºÅÁîÖ´ÐÓ×¢¼üÅ̼ͼ¡¢ºáÏòÉøÈëµÈÖ°ÄÜ£¬²¢ÄÜÔÚϵͳ³ÁÆôºó³ÖÐøÔËÐУ¬Ê¹¹¥»÷Õß»ñµÃ¶ÔÊÜϰȾÉ豸µÄ³Ö¾Ã½ÚÔìȨ¡£Õâ´Î·¢ÏÖÔ´ÓÚ¶ÀÁ¢×êÑÐÔ±g0njxaÌṩµÄÏßË÷£¬Ä¿Ç°È«ÇòÒÑÓÐ120¶à¸ö¹ú¶ÈµÄÓû§Êܵ½Ó°Ï죬ÆäÖÐÃÀ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Ó¢¹úºÍ¼ÓÄôóΪ³ÁÔÖÇø¡£AtomicÇÔÈ¡·¨Ê½×îÔçÓÚ2023Äê4Ô±»¼Í¼£¬Æä×÷ΪMaaSƽ̨ÔÚTelegramÆµÂ·ÍÆ¹ã£¬Ã¿Ô¶©ÔķѸߴï1000ÃÀÔª£¬³õÆÚÖ¸±êΪÇÔÈ¡macOSÎļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÀ©´ó·¨Ê½¼°ä¯ÀÀÆ÷±£ÁôµÄÃÜÂë¡£2023Äê11Ô£¬¸Ã×é֯ͨ¹ý"ClearFake"»î¶¯³õ´Î½«¹¥»÷ÁìÓòÀ©´óÖÁmacOSϵͳ£»2024Äê9Ô£¬ÍøÂç·¸×OÍÅ"Marko Polo"ÔÚÕë¶ÔAppleÉ豸µÄ´ó¹æÄ£»î¶¯Öв¿ÊðÁ˸öñÒâÈí¼þ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Æä·Ö·¢Õ½ÊõÒÑ´ÓÆÆ½âÈí¼þÍøÕ¾µÈ¿í·ºÇþ·£¬×ªÏòÕë¶Ô¼ÓÃÜÇ®±Ò³ÖÓÐÕߵ͍ÏòÍøÂç´¹µö£¬ÒÔ¼°Ïò×ÔÓÉÖ°ÒµÕß·¢ËͼÙ×°³É¿ÚÊÔÔ¼ÇëµÄ¶ñÒâÔØºÉ¡£
https://www.bleepingcomputer.com/news/security/atomic-macos-infostealer-adds-backdoor-for-persistent-attacks/
4. °ÍÎ÷C&M Softwareϵͳ·ì϶ÖÂ1.4ÒÚÃÀÔª´¢Ðî½ð±»µÁ
7ÔÂ7ÈÕ£¬°ÍÎ÷½ðÈÚϵͳÔâ·ê³Á´ó°²È«ÊÂÎñ£¬ÏνÓÑëÐÐÓë´¦ËùÒøÐеÄÖÐÑë·þÎñÉÌC&M Software¹«Ë¾ÒòºÚ¿Í¹¥»÷µ¼ÖÂÁù¼Ò½ðÈÚ»ú¹¹µÄ´¢ÐîÕË»§Ëðʧ800Íò°ÍÎ÷À×ÑǶû£¨Ô¼ºÏ1.4ÒÚÃÀÔª£©£¬³ÉΪ°ÍÎ÷ÑëÐк¹ÇàÉÏ×îÑϳÁµÄ¹©¸øÉÌϵͳ·ì϶ÊÂÎñÖ®Ò»¡£ÊÂÎñʼÓÚ6ÔÂ30ÈÕ£¬C&M SoftwareÏò°ÍÎ÷ÑëÐд«µÝÆäƽ̨ÔâÈëÇÖ£¬¹¥»÷Õßͨ¹ý·¸·¨¼¿Á©×ªÒÆÁ˽ðÈÚ»ú¹¹¼äÓÃÓÚËãÕʵĴ¢Ðî×ʽ𡣰ÍÎ÷ÑëÐÐËæ¼´ÔÝÍ£ËùÓб¾µØ»ú¹¹¶ÔC&Mƽ̨µÄ½Ó¼ûȨÏÞ£¬²¢È¾Ö¸µ÷²é¡£7ÔÂ4ÈÕ£¬Ê¥±£ÂÞ¾¯·½¿ÛÁôÁË48ËêµÄǰC&Mºó¶Ëϵͳ¹¤³ÌʦJo?o Roque£¬Ö¸¿ØÆäÒÔÔ¼2700ÃÀÔªµÄ¼ÛÖµÏòºÚ¿ÍÏúÊÛϵͳµÇ¼ƾ֤£¬²¢ÐÖú¹¹½¨×ʽð×ªÒÆ»úÔì¡£¾Ý¾¯·½Åû¶£¬Roqueͨ¹ýWhatsAppÓë·¸×ïÍÅ»ïÁªÏµ£¬ÀûÓÃĦÍгµ¿ìµÝÊÕÈ¡±¨´ð£¬ÇÒÿ15Ìì¸ü»»Ò»´ÎÊÖ»úÒÔ¶ã±Ü×·×Ù£¬µ«×îÖÕÈÔ±»¼¼Êõ¼¿Á©¶¨Î»¡£ÖµÍ×ÌùÐĵÄÊÇ£¬±»µÁ×ʽðÔ´×Ô½ðÈÚ»ú¹¹µÄͬҵ´¢ÐîÕË»§£¬¶ø·Ç¿Í»§´æ¿î£¬Òò¶ø¹«¼Ò×ʽðδֱ½ÓÊÜËð¡£Ä¿Ç°°ÍÎ÷µ±¾ÖÒѶ³½á5000ÍòÃÀÔªÉæ°¸×ʲú£¬C&M Software°µÊ¾Òѹ²Í¬ÊµÏÖϵͳ½¨¸´²¢¸´ÔÔËÓª¡£
https://www.bitdefender.com/en-us/blog/hotforsecurity/employee-arrested-after-brazils-central-bank-service-provider-hacked-for-us-140-million
5. ºÚ¿ÍÀÄÓÃй¶µÄShellterºì¶Ó¹¤¾ß²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½
7ÔÂ7ÈÕ£¬ÉøÈë²âÊÔ¹¤¾ß¹©¸øÉÌShellter Project½üÈÕ֤ʵ£¬ÆäóÒ×¼¶AV/EDRÌӱܼÓÔØÆ÷Shellter EliteÒò¿Í»§Ð¹Â¶¸±±¾£¬±»ºÚ¿ÍÓÃÓÚ´«²¼ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¾ÝElastic Security Labs 7ÔÂ3ÈÕÅû¶£¬×Ô2025Äê4ÔÂÆð£¬¶à¸öÍþв×éÖ¯£¨Ô̺¬Rhadamanthys¡¢LummaºÍArechclient2£©Í¨¹ýYouTubeÆÀÂÛºÍÍøÂç´¹µöÓʼþ·Ö·¢Ê¹ÓÃShellter Elite v11.0Ôì×÷µÄ¶ñÒâÔØºÉ¡£¸Ã¹¤¾ß×÷Ϊºì¶ÓרÓÃÉ豸£¬Í¨¹ý¶à̬ÐÔ¾²Ì¬¶ã±ÜºÍAMSI/ETWµÈ¶¯Ì¬ÔËÐÐʱ¶ã±Ü¼¼Êõ£¬¿É½«ÓÐÐ§ÔØºÉÖ²ÈëºÏ·¨Windows¶þ½øÔìÎļþÒÔÈÆ¹ýEDR¼ì²â¡£Elastic×êÑÐÈËԱͨ¹ýÐí¿ÉÖ¤¹¦·ò´Á×·×Ù£¬È·ÈϹ¥»÷ÕßʹÓõ¥¸öй¶¸±±¾Ö´ÐÐÁ˳¤´ïÊýÔµĹ¥»÷»î¶¯¡£Shellter ProjectÔÚÉêÃ÷ÖÐÈϿɣ¬Õâ´ÎÀÄÓÃÔ´ÓÚij¿Í»§Ð¹Â¶Æä²É°ìµÄEliteÐí¿ÉÖ¤¸±±¾£¬²¢Ç¿µ÷ÕâÊÇ2023Äê2ÔÂÖ´ÐÐÑϸñÐí¿ÉģʽºóµÄÊ×ÀýÒÑÖªÀÄÓÃÊÂÎñ¡£ÎªÓ¦¶ÔΣ»ú£¬¸Ã¹«Ë¾ÒѰ䲼Elite 11.1°æ±¾£¬½öÏòͨ¹ýÉó²éµÄ¿Í»§·Ö·¢¸üУ¬µ«Î´Ð¹Â©¾ßÌå¼¼Êõ»º½â´ëÊ©¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Shellter Project¹«¿ªÔð¹ÖElastic Security Labsδʵʱ´«µÝ·ì϶£¬³ÆÆä"ΪÔì×÷ºä¶¯Ð§Ó¦¶øÒþÂ÷ÐÅÏ¢"£¬²¢³ÆÒÑÊÕµ½ElasticÌṩµÄÑù±¾ÓÃÓÚ¶¨Î»Î¥¹æ¿Í»§¡£
https://www.bleepingcomputer.com/news/security/hackers-abuse-leaked-shellter-red-team-tool-to-deploy-infostealers/
6. ÀÕË÷Èí¼þSatanLockÖÕÖ¹ÔËÓª£¬³Æ±»µÁÊý¾Ý½«±»Ð¹Â¶
7ÔÂ7ÈÕ£¬Ð³ÉÁ¢µÄ"Èöµ©Ëø"£¨SatanLock£©ÀÕË÷Èí¼þ×éÖ¯½üÈÕºöÈ»°ä·¢¹Ø¹Ø£¬µ«ÆäÔÚ°µÍø°ä²¼µÄÉêÃ÷ÖÐÍþв½«ÓÚµ±ÈÕй¶ËùÓдÓÊܺ¦Õß´¦ÇÔÈ¡µÄÊý¾Ý£¬Òý·¢°²È«½ç¹Ø×¢¡£×Ô2025Äê4Ô³õ»îÔ¾ÒÔÀ´£¬SatanLockÒÔ¼¤½ø¹¥»÷¼¿Á©Ñ¸¿ìո¶ͷ½Ç£¬¶Ì¶ÌÊýÖÜÄÚ¼´ÔÚ°µÍøÐ¹ÃÜÍøÕ¾°ä²¼67ÃûÊܺ¦Õß¾ßÌåÐÅÏ¢¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Check Point×êÑÐÔº5Ô»㱨ָ³ö£¬ÆäÖг¬¹ý65%µÄÊܺ¦Õß´ËǰÒÑ³Ê´Ë¿ÌÆäËûÀÕË÷ÍÅ»ïµÄйÃÜÃûµ¥ÖС£ÕâÒ»¾°ÏóÅú×¢£¬¸Ã×éÖ¯¿ÉÄÜͨ¹ý¹²Ïí·¸×ï»ù´¡ÉèÊ©ÔË×÷£¬»ò¿ÌÒâÕë¶ÔÒѱ»ÆäËûÍÅ»ïÈëÇÖµÄÍøÂç½øÐÐ"¶þ´ÎÊÕ¸î"¡£ÍøÂ簲ȫ¹«Ë¾Lockbit DecryptorµÄ·ÖÎö½øÒ»²½½Òʾ£¬SatanLockÓëBabuk-Bjorka¡¢GD LockersecµÈ¶à¸ö³ÛÃûÀÕË÷Èí¼þ¼Ò×å´æÔÚ¹ØÁª£¬°µÊ¾ÆäÊôÓÚ¸ü´ó¹æÄ£µÄÍøÂç·¸×ïÍøÂç¡£ÕâÖÖ¹ØÁªÐÔÓë´Ëǰ"ÁÔÈ˹ú¼Ê"£¨Hunters International£©¸ÄÃûΪWORLD LEAKS²¢×ªÐÍÊý¾Ýй¶µÄ°¸ÀýÐγÉÏìÓ¦¡£Ö»¹ÜSatanLockµÄ¹Ø¹ØÔÒòÉв»Ã÷È·£¬µ«Òµ½ç²Â²âÆä¿ÉÄÜѡȡÀàËÆÕ½Êõ£¬Í¨¹ýÆ·ÅÆ³ÁËܶã±Ü·¨Âɽø¹¥¡£
https://hackread.com/satanlock-ransomware-ends-operations-stolen-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ