DoNot TeamÀûÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞ±í½»²¿
°ä²¼¹¦·ò 2025-07-101. DoNot TeamÀûÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞ±í½»²¿
7ÔÂ9ÈÕ£¬½üÆÚ£¬ÍøÂ簲ȫ»ú¹¹Trellix¸ß¼¶×êÑÐÖÐÐÄÅû¶һ·Õë¶ÔÅ·ÖÞ±í½»»ú¹¹µÄ¶¨ÏòÍøÂç¹¥»÷ÊÂÎñ£¬Æä±³ºóÒÉËÆÉæ¼°Ó¡¶È²¼¾°µÄ¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯DoNot Team£¨±ð³ÆAPT-C-35µÈ£©¡£¸Ã×éÖ¯×Ô2016ÄêÆð³ÖÐø»îÔ¾£¬ÒÔ¶¨Ô컯Windows¶ñÒâÈí¼þ£¨ÈçYTY¡¢GEditºóÃÅ£©½áºÏÓã²æÊ½´¹µöÓʼþÎªÖØÒª¹¥»÷¼¿Á©£¬³Ö¾ÃÕë¶Ôµ±¾Ö¡¢±í½»¡¢¹ú·À¼°·Çµ±¾Ö×éÖ¯·¢Õ¹ÍøÂç¼äµý»î¶¯£¬Ö¸±êÇøÓò´Ëǰ¼¯ÖÐÓÚÄÏÑÇ£¬Õâ´Î³õ´ÎÈ·ÈÏÆä¶ÔÅ·ÖÞ±í½»ÁìÓòµÄÀ©ÕÅÐÔÉøÈë¡£Õâ´Î¹¥»÷Á´Ê¼ÓÚ¼Ù×°³ÉÒâ´óÀûפÃϼÓÀ¹ú¹ú·ÀÎä¹Ù½Ó¼ûÐг̵Ĵ¹µöÓʼþ£¬¹¥»÷Õßͨ¹ýGmailÕË»§·¢ËÍUTF-8±àÂëµÄHTMLÌåʽÓʼþ£¬ÀûÓÃÌØÊâ×Ö·û£¨Èç·¨Óï"Attach¨¦"£©¼ÓÇ¿¿ÉÐŶȣ¬ÓÕµ¼Ö¸±êµã»÷GoogleÔÆ¶ËÓ²ÅÌÁ´½ÓÏÂÔØRARѹËõ°ü¡£Ñ¹Ëõ°üÄÚº¬¼ÙװΪPDFÎĵµµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ£¬Êܺ¦Õß´ò¿ªºó½«´¥·¢LoptikModÔ¶³Ì½Ó¼ûľÂí¡£¸ÃľÂíͨ¹ý´òË㹤×÷ʵÏÖÓÆ¾Ã»¯×¤Áô£¬¾ß±¸ÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢½Ó¹ÜÔ¶³ÌÖ¸Áî¡¢ÏÂÔØ¸½¼ÓÄ£¿éµÈÖ°ÄÜ£¬²¢Ñ¡È¡·´Ðé¹¹»ú¼¼ÊõºÍASCII»ìºÏ¼¼Êõ¶ã±Ü°²È«·ÖÎö£¬Í¬Ê±Í¨¹ýµ¥Ê·ýÔËÐлúÔìÔ¤·Àì¶Ü¡£
https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html
2. ÈÕ±¾ÐÂÈÕÌú×Ó¹«Ë¾ÔâÁãÈÕ¹¥»÷ÖÂÊý¾Ýй¶
7ÔÂ9ÈÕ£¬ÈÕ±¾ÐÂÈÕÌú¼¯ÍÅÆìÏÂ×Ó¹«Ë¾ÐÂÈÕÌú½â¾ö¹æ»®¹«Ë¾£¨Nippon Steel Solutions£©½üÈÕÅû¶һ·³Á´óÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÀûÓÃδ¹«¿ªµÄÁãÈÕ·ì϶ÇÖÈëÆäÄÚ²¿ÍøÂ磬µ¼Ö¿ͻ§¡¢ºÏ×÷ͬ°é¼°Ô±¹¤Ó×ÎÒÐÅÏ¢Ãæ¶Ôй¶·çÏÕ¡£¸Ã¹«Ë¾×¨Ò»ÓÚÔÆ·þÎñÓëÍøÂ簲ȫ½â¾ö¹æ»®£¬Õâ´ÎÊÂÎñÒòÆä¼¼Êõ²¼¾°¶ø±¸ÊܹØ×¢¡£2025Äê3ÔÂ7ÈÕ£¬ÐÂÈÕÌú½â¾ö¹æ»®¹«Ë¾¼à²âµ½·þÎñÆ÷Òì³£»î¶¯£¬Ëæ¼´¸ôÀëÊÜÓ°Ïìϵͳ¡£¾µ÷²éÈ·ÈÏ£¬¹¥»÷Õßͨ¹ýÕë¶ÔÍøÂçÉ豸µÄÁãÈÕ·ì϶ִÐÐÈëÇÖ£¬Ôì³ÉÄÚ²¿ÍøÂçδ¾ÊÚȨ½Ó¼û£¬²¿ÃÅÃô¸ÐÊý¾Ý¿ÉÄܱ»ÇÔÈ¡¡£ÖµµÃÇìÐÒµÄÊÇ£¬¸Ã¹«Ë¾Ç¿µ÷ÆäÔÆ·þÎñƽ̨δÊܲ¨¼°£¬ÒµÎñÂ½ÐøÐÔδÊÜÖ±½ÓÓ°Ï졣ƾ¾Ý²¼¸æ£¬Ð¹Â¶ÐÅÏ¢º¸ÇÈýÀàÖ÷Ì壺¿Í»§Êý¾ÝÔ̺¬ÐÕÃû¡¢¹«Ë¾Ãû³Æ¡¢ËùÊô»ú¹¹¡¢Ö°Î»¡¢µØÖ·¡¢ÓÊÏä¼°µç»°£»ºÏ×÷ͬ°éÐÅÏ¢Éæ¼°ÐÕÃû¼°¹«Ë¾ÓòÃûÓÊÏ䣻Ա¹¤Êý¾ÝÔòÔ̺¬ÐÕÃû¡¢²¿ÃÅ¡¢Ö°Î»¼°ÆóÒµÓÊÏä¡£Ö»¹ÜĿǰÎÞÖ¤¾ÝÅú×¢ÕâЩÐÅÏ¢ÒÑͨ¹ýÉ罻ýÌå»ò°µÍøÀ©É¢£¬µ«¹«Ë¾ÈÔ¾¯Ê¾Óû§¾¯Ìè¿ÉÒÉͨѶ£¬Ô¤·Àµã»÷²»Ã÷Á´½Ó»ò»Ø¸´Ä°ÉúÀ´µç¡£Ä¿Ç°£¬¹«Ë¾ÒÑʵÏÖÄÚ²¿ÍøÂ簲ȫ¸´Ô£¬²¢Ïò¾¯·½¼°ÈÕ±¾Ó×ÎÒÐÅÏ¢±£»¤Î¯Ô±»áÌá½»»ã±¨£¬Íƹ㷨¶¨Åû¶ʹÃü¡£
https://securityaffairs.com/179766/data-breach/nippon-steel-solutions-data-breach.html
3. ÃÀ¹ú¼ÓÃÜATM¾ÞÍ·Bitcoin DepotÔâ·êÊý¾Ýй¶
7ÔÂ9ÈÕ£¬ÃÀ¹ú×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin Depot½üÈÕÅû¶һ·ӰÏì2.7Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬¸Ã¹«Ë¾Í¨¹ýº¯¼þ֪ͨÊÜÓ°ÏìÓû§£¬ÊÂÎñ¿É×·ÒäÖÁ2024Äê6ÔÂ23ÈÕ£¬ÆäÍøÂç³õ´Î¼ì²âµ½¿ÉÒɻ£¬µ«ÒòÁª¹ú·¨ÂÉ»ú¹¹ÒªÇó¹²Í¬µ÷²é£¬Ö±ÖÁ7ÔÂ18ÈÕÄÚ²¿µ÷²éʵÏÖºó·½ÄÜÆô¶¯Åû¶·¨Ê½¡£Æ¾¾Ý²¼¸æ£¬Î´¾ÊÚȨµÄ¹¥»÷Õß»ñÈ¡Á˲¿Ãſͻ§ÔÚKYCÑéÖ¤¹ý³ÌÖÐÌá½»µÄÃô¸ÐÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¼°µç×ÓÓÊÏäµÈ¡£Bitcoin DepotÔÚÈ«ÃÀ¡¢¼ÓÄô󼰰ĴóÀûÑÇÔËÓª×Å8800̨É豸£¬Õâ´ÎÊÂÎñ²¨¼°ÁìÓò¿í·º¡£ÓÉÓÚ¼ÓÃÜÇ®±ÒÂòÂôµÄÄäÃûÐÔÓë×ʽ𼱾çÁ÷ת¸öÐÔ£¬´«Í³½ðÈÚÁìÓòµÄÉí·Ý¼à¿ØÓë·ÀµÁ·þÎñÔڴ˳¡¾°ÖÐÄÑÒÔÖ´ÐС£Bitcoin DepotÃ÷È·°µÊ¾ÎÞ·¨ÎªÊÜÓ°ÏìÓû§ÌṩÐÅÓþ±£»¤»òÉí·Ý¼à¿Ø·þÎñ£¬×ª¶ø½¨ÒéÓû§×Ô¶¯¼à¿ØÕË»§Òì³£ÂòÂô¡¢¶³½áÐÅÓþ»ã±¨²¢¾¯Ìè´¹µö¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/
4. ÃÀ¹ú˰ÊÕµÖÃâÕ÷ѯ¹«Ë¾Rockerboxй¶24.5ÍòÌõÃô¸ÐÊý¾Ý
7ÔÂ9ÈÕ£¬ÃÀ¹úµÃ¿ËÈøË¹ÖÝ˰ÊÕµÖÃâÕ÷ѯ¹«Ë¾Rockerbox½üÈÕÒòδÉèÃÜÂë±£»¤µÄÊý¾Ý¿â¶³ö£¬µ¼ÖÂ245,949Ìõ¡¢×ܼÆ286.9GBµÄÃô¸ÐÊý¾Ýй¶£¬º¸ÇÈ«Ãû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂ루SSN£©¡¢µØÖ·¡¢¼ÝÊ»ÅÆÕÕ¼°ÍËÒÛÎäÊ¿DD214ÎļþµÈ¸ß¶ÈÒþÖÔÐÅÏ¢¡£Õâ´ÎÊÂÎñÓÉÍøÂ簲ȫ×êÑÐÔ±Jeremiah Fowler·¢ÏÖ²¢»ã±¨ÖÁvpnMentor¡£×÷ΪרһÓÚ¹ÍÖ÷˰ÊÕ¼¤Àø´òË㣨ÈçWOTC¡¢ERTCµÈ£©µÄ·þÎñÉÌ£¬RockerboxΪ²ÍÒû¡¢¾Æµê¡¢Ò½ÁƵȶà¸öÐÐÒµµÄÆóÒµÌṩ˰ÎñÓÅ»¯Ö§³Ö£¬Æäй¶µÄ¿Í»§Êý¾ÝÉæ¼°¸´ÔӵIJÆÕþÓëÓ×ÎÒÐÅÏ¢¡£³ýÖ±½Ó´æ´¢µÄPII£¨Ó×ÎÒÉí·ÝÐÅÏ¢£©±í£¬´óÁ¿Ë°ÊÕµÖÃâÉêÇëÎļþ¡¢ºË×¼/»Ø¾øº¯¼°ÃÜÂë±£»¤PDFµÄÎļþÃûÒ²Ôâ¶³ö£¬²¿ÃÅÎļþÃû¿ÉÄÜÒþº¬ÃÜÂëÏßË÷£¬½øÒ»²½¼Ó¾çÐÅÏ¢ÀÄÓ÷çÏÕ¡£FowlerÖ¸³ö£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹µö¡¢Éí·Ý͵ÇÔ¼°½ðÈÚڲƣ¬¶ÔÊÜÓ°ÏìÓ×ÎÒ×é³É³Á´óÍþв¡£ÊÂÎñ¶³öºó£¬Fowlerµ±¼´Í¨ÖªRockerbox£¬µ«¸Ã¹«Ë¾Î´×÷³öÕýʽ»ØÓ¦£¬Êý¾Ý¿âÔÚÊýÈÕºó²Å±»¼ÓÃܱ£»¤¡£
https://hackread.com/rockerbox-server-tax-firm-exposed-sensitive-records/
5. AnatsaÒÆ¶¯¶ñÒâÈí¼þÔٴι¥»÷±±ÃÀÒøÐпͻ§
7ÔÂ9ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËԱȷÈÏ£¬³Ö¾Ã»îÔ¾µÄAndroidÒøÐÐľÂíAnatsa½üÆÚÕë¶Ô±±ÃÀ½ðÈÚ»ú¹¹ÌáÒéÐÂÒ»ÂÖ¹¥»÷£¬ºÉÀ¼ThreatFabric¹«Ë¾×·×ÙÏÔʾ£¬ÕâÒÑÊÇÆäÖÁÉÙµÚÈý´Î½«ÃÀ¹úÓë¼ÓÄôóÒÆ¶¯ÒøÐÐÓû§ÁÐΪָ±ê¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼Í¼¼üÅÌÊäÈ뼰ͨ¹ýÔ¶³Ì½ÚÔìÖ±½ÓÖ´ÐÐÚ²ÆÂòÂôµÄÄÜÁ¦£¬ÆäÁ½½×¶Î¹¥»÷ģʽÒý¿¯ÐÐÒµ¹Ø×¢¡£±¾´Î¹¥»÷ÖУ¬¹¥»÷ÕßÊ×ÏÈÔÚÀûÓÃÉ̵êÉϼܿ´ËƺϷ¨µÄ¹¤¾ßÀàÀûÓã¨ÈçÎļþÔĶÁÆ÷£©£¬³õÆÚÖ°ÄÜÕý³£ÒԶѼ¯Óû§ÐÅÀµ¡£´ýÏÂÔØÁ¿´ïµ½ÊýÍò´Îºó£¬Í¨¹ý¸üÐÂ×¢Èë¶ñÒâ´úÂ룬½«Anatsa×÷Ϊ¶ÀÁ¢·¨Ê½×°ÖÃÖÁÉ豸¡£ÒÔ±¾´Î°¸ÀýΪÀý£¬Ò»¿îÎļþÔĶÁÆ÷ÀûÓÃÔÚ6ÔÂ24ÈÕÖÁ30ÈÕÆÚ¼äÍÆË͸üУ¬Ï¼ÜǰÒÑÔÚÃÀ¹úPlayÉ̵êÃâ·Ñ¹¤¾ß°ñÃûÁÐǰ飬ÀÛ¼ÆÏÂÔØÁ¿³¬5Íò´Î¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬AnatsaÕâ´Î¹¥»÷Ö¸±êÇåµ¥ÏÔÖøÀ©´ó£¬¸²¸ÇÁ˸ü¿í·ºµÄÃÀ¹úÒÆ¶¯ÒøÐÐÀûÓá£
https://therecord.media/anatsa-android-banking-malware-returns-north-america
6. FlirtAIÔ¼»á¸±ÊÖÒòδÊܱ£»¤Ôƴ洢й¶16ÍòÕÅ˽ÃܽØÍ¼
7ÔÂ8ÈÕ£¬µÂ¹ú°ØÁÖ¹«Ë¾Buddy Network GmbH¿ª·¢µÄiOSÀûÓÃFlirtAI½üÈÕÒòÔÆ´æ´¢°²È«·ì϶Òý·¢ÑϳÁÊý¾Ýй¶£¬³¬16ÍòÕÅÓû§ÉÏ´«µÄ˽ÃÜ̸Ìì½ØÍ¼Â¶³öÓÚ¹«¹²»¥ÁªÍø¡£¸ÃÀûÓÃÖ÷´òAI¸¨ÖúÉç½»Ö°ÄÜ£¬Óû§ÐèÊÖ¶¯½ØÈ¡Ô¼»áÈí¼þ¶Ô»°»òÓ×ÎÒ×ÊÁϽçÃæ²¢ÉÏ´«£¬ÒÔ»ñÈ¡ÎåÌõ¶¨Ôì»Ø¸´½¨Ò顣Ȼ¶ø£¬×êÑÐÈËÔ±·¢ÏÔìä¹È¸èÔÆ´æ´¢Í°Î´ÉèÖýӼûȨÏÞ½ÚÔ죬µ¼ÖÂÃô¸ÐÊý¾Ý³Ö¾Ã̻¶¡£Êý¾ÝÏÔʾÇàÉÙÄêÓû§Õ¼±ÈÏÔÖø£¬ÆäÉÏ´«µÄ½ØÍ¼Ô̺¬Í¬ÁäÈË˽ÃܶԻ°£¬²¿ÃÅδ³ÉÄêÈË¿ÉÄÜÆëÈ«²»Í¨´ï̸ÌìÄÚÈݱ»½ØÍ¼±íй¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Ö»¹ÜÀûÓÃÌõ¿îÒªÇó¡°ÉÏ´«Ç°Ðè»ñµÃ¶Ô»°·½ÊÚȨ¡±£¬µ«ÏÖʵ²Ù×÷ÖÐÏÕЩÎÞ·¨Ö´ÐС£¹ÌȻƻ¹ûÉ̵ê±ê×¢17+´ºÇïÏÞ¶È£¬ÈÔδÄÜÓÐЧ×èֹδ³ÉÄêÈËʹÓá£ÊÂÎñ´ëÖù¦·òÏßÏÔʾ£¬×êÑÐÈËÔ±5ÔÂ6ÈÕ·¢ÏÖ·ì϶ºó£¬ÓÚ5ÔÂ19ÈÕÏò¿ª·¢ÉÌ´«µÝ£¬6ÔÂ2ÈÕÁªÏµÍÆËã»úÓ¦¼±ÏìÓ¦Ó××飨CERT£©£¬×îÖÕÔÚ6ÔÂ16ÈÕ½¨¸´´æ´¢Í°È¨ÏÞ¡£
https://cybernews.com/security/iphone-flirtai-app-leaks-chat-screenshots/


¾©¹«Íø°²±¸11010802024551ºÅ