ɳ¼éϸҵ¾ÞÍ·RezayatÔâ·êEverestÀÕË÷Èí¼þ¹¥»÷
°ä²¼¹¦·ò 2025-07-151. ɳ¼éϸҵ¾ÞÍ·RezayatÔâ·êEverestÀÕË÷Èí¼þ¹¥»÷
7ÔÂ14ÈÕ£¬É³¼éϸҵ·þÎñ¾ÞÍ·Rezayat¼¯ÍŽüÈÕÔâ·êEverestÀÕË÷Èí¼þÍÅ»ïµÄÍøÂç¹¥»÷£¬³ÉΪÖж«µØÓòÓÖÒ»³Á´óÍøÂ簲ȫÊÂÎñ¡£Õâ¼ÒÕ¼ÓÐ25¼Ò×Ó¹«Ë¾¡¢ÒµÎñ¸²¸Ç13¸ö¹ú¶È¡¢Ô±¹¤³¬Á½ÍòÈ˵Ŀç¹úÆóÒµ£¬±»¹¥»÷ÕßÐû³ÆÇÔÈ¡ÊýGBÃô¸ÐÊý¾Ý£¬ÓйØÑù±¾ÒÑÔÚ°µÍøÐ¹Â¶Õ¾µãÆØ¹â¡£°²È«×êÑÐÍŶӷÖÎö·¢ÏÖ£¬Ð¹Â¶ÄÚÈÝÔ̺¬¿Í»§ºÏͬ¡¢¼¼Êõ»ã±¨¼°¹¤ÒµÉ豸ͼֽµÈÖ÷ÌâóÒ×Îļþ£¬ÈôÊý¾ÝÕæÊµÐԵõ½Ö¤Êµ£¬²»½ö½«ÑϳÁÇÖº¦RezayatµÄóÒ×ŵÑÔ£¬¸ü¿ÉÄܱ»ÓÃÓÚÕë¶ÔÆäºÏ×÷ͬ°éµÄ¹©¸øÁ´¹¥»÷£¬Òý¿¯ÐÐÒµÁ¬Ëø·çÏÕ¡£Ö´ÐÐÕâ´Î¹¥»÷µÄEverestÍÅ»ï×Ô2021Äê³õ´Î±»×·×ÙÒÔÀ´£¬ÒÑÐγɳÉÊìµÄ·¸×ïģʽ¡£¸Ã×é֝ɯÓÚͨ¹ýÈëÇÔìóÒµÕË»§¼°ÀûÓÃÔ¶³Ì×ÀÃæºÍ̸£¨RDP£©½øÐÐÍøÂçÉøÈ룬´Óǰ12¸öÔÂÄÚÒѽ«³¬¹ý°Ù¼ÒÆóÒµÁÐÈë°µÍø"Êܺ¦ÕßÃûµ¥"¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸ÃÍÅ»ïÔøÐû³ÆÔÚ2022Äê³É¹¦ÇÖÈëµçÐÅÔËÓªÉÌAT&TµÄÆóÒµÍøÂ磬չʾ³ö¼«Ç¿µÄ¼¼Êõ¹¥»÷ÄÜÁ¦¡£Õâ´ÎÕë¶ÔRezayatµÄÐж¯ÖУ¬¹¥»÷ÕßËäÐû³ÆÇÔÈ¡10GBÊý¾Ý£¬µ«Í¨¹ý¶ÈÅú¿ªÊÍÊý¾ÝÑù±¾Ê©Ñ¹Êܺ¦ÆóÒµÖ§¸¶Êê½ðµÄÕ½Êõ£¬ÇÐºÏÆä¹ßÓòÙ×÷ÊÖ·¨¡£
https://cybernews.com/security/rezayat-group-ransomware-data-breach/
2. ÉÝ³ÞÆ·¾ÞÍ·LVMHÓ¢¹ú·Ö²¿Ôâ·êÊý¾Ýй¶ÊÂÎñ
7ÔÂ14ÈÕ£¬È«ÇòÉÝ³ÞÆ·¾ÞÍ·LVMH¼¯ÍÅÆìÏÂÓ¢¹ú·Ö²¿½üÈÕ¾íÈë³Á´óÊý¾Ýй¶ÊÂÎñ£¬³ÉΪ¼ÌÂêɯ°Ù»õ¡¢¹þÂ޵°ٻõµÈÖ®ºóÓÖÒ»¼ÒÔâ·êÍøÂç¹¥»÷µÄÓ¢¹úÁãÊÛÉÌ¡£Æ¾¾Ý¹«Ë¾Ïò¿Í»§·¢Ë͵Ä֪ͨ£¬7ÔÂ2ÈÕ·¢ÏÖµÄй¶ÊÂÎñ¿ÉÄܶ³öÁ˿ͻ§µÄÐÕÃû¡¢ÐԱ𡢹ú¼®¡¢µç»°¡¢ÓÊÏä¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¼°²É°ìÆ«ºÃµÈÃô¸ÐÓ×ÎÒÐÅÏ¢£¨PII£©¡£Ö»¹ÜĿǰÎÞÖ¤¾ÝÏÔʾÊý¾Ý±»ÀÄÓ㬵«Â·Ò×ÍþµÇÓ¢¹úÖÒ¸æ³Æ£¬Ð¹Â¶ÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ´¹µö¹¥»÷¡¢Ú²Æ»òÉí·ÝµÁÓ㬲¢½¨Òé¿Í»§¾¯Ìè¿ÉÒÉͨѶ¡£Õâ´ÎÊÂÎñ¾àLVMHº«¹úÒµÎñÔâºÚ¿Í¹¥»÷½öÒ»ÖÜ£¬¶ø½ñÄêÒÔÀ´ÆäÆìÏ¿ËÀï˹͡¡¤µÏ°Â¸ß¼¶Ê±×°ÓëµÙܽÄáÆ·ÅÆÒ²Òò¿Í»§Êý¾Ýй¶½ÓÊܵ±¾Öµ÷²é£¬Í¹ÏÔ¼¯ÍÅ¶àµØ»ú¹¹½ÓÁ¬Ãæ¶Ô°²È«ÌôÕ½¡£°²È«×¨¼ÒÍÐÂí˹¡¤Àí²é×ÈÖ¸³ö£¬Ö»¹ÜLVMHÕâ´Îδй¶²ÆÕþÊý¾Ý£¬·çÏÕÈÔ²»ÈÝÓ×ê¹¥»÷Õß¿ÉÄÜͨ¹ý¼ÙÒâ¿Í»§Ì×È¡¸ü¶àÐÅÏ¢£¬»ò·¢ËͼÙ×°ÖÆÆ·ÅÆµÄ¶ñÒâÓʼþÓÕµ¼µÇ¼/²ÆÕþÐÅÏ¢¡£ËûÇ¿µ÷£¬LVMH¶àµØ»ú¹¹½ÓÁ¬ÔâÀàËÆ¼¿Á©ÈëÇÖ£¬°µÊ¾Æä¿ÉÄÜ´æÔÚϵͳÐÔ·ì϶£¬»òÊǼ¼Êõϵͳ´æÔÚ¹²ÐÔȱµã£¬»òÊÇй¶½ÚÔì´ëÊ©²»¼°¡£¶Ô´Ë£¬Àí²é×Ƚ¨ÒéLVMHµ±¼´·¢Õ¹È«¼¯ÍŰ²È«ÆÀ¹À£¬×·Òä¹¥»÷±¾Ô²¢Ö´ÐÐÕû¸Ä£¬Ô¤·À·ì϶³ÖÐø±»ÀûÓá£
https://www.infosecurity-magazine.com/news/louis-vuitton-uk-retailer-data/
3. InterlockÀÕË÷Èí¼þѡȡFileFix²½Öè´«²¼¶ñÒâÈí¼þ
7ÔÂ14ÈÕ£¬½üÆÚ£¬InterlockÀÕË÷Èí¼þÍÅ»ïÔÚ¹¥»÷¼¿Á©ÉÏʵÏÖ³Á´óÉý¼¶£¬³õ´Î¹«¿ªÑ¡È¡ÃûΪ"FileFix"µÄÐÂÐÍÉç»á¹¤³Ì¼¼Êõ£¬½áºÏÔ¶³Ì½Ó¼ûľÂí£¨RAT£©Ö´ÐиüÒñ±ÎµÄÍøÂç¹¥»÷¡£¸Ã¼¼ÊõÓɰ²È«×êÑÐÔ±mr.d0x¿ª·¢£¬ÊÇClickFix¹¥»÷µÄ½ø»¯°æ±¾¡£´ÓǰһÄê¼ä£¬ClickFixÒѳÉΪ×îÖ÷Á÷µÄÓÐÐ§ÔØºÉ·Ö·¢²½ÖèÖ®Ò»£¬¶øFileFixͨ¹ý½øÒ»²½ÀûÓÃÓû§¶ÔWindowsÏµÍ³ÔªËØµÄÐÅÀµ£¬ÊµÏÖÁ˸ü¸ßЧµÄ¶ñÒâ´úÂëÖ´ÐС£¹¥»÷Á÷³ÌÖУ¬ÍþвÐÐΪÕßͨ¹ýÊÜÏ°È¾ÍøÕ¾²¿ÊðKongTukeÍøÂç×¢ÈëÆ÷£¬ÓÕµ¼½Ó¼ûÕßʵÏÖÐéαCAPTCHAÑéÖ¤ºó£¬×Ô¶¯½«¼Ù×°³ÉÎļþõè¾¶µÄPowerShellºÅÁÔìµ½¼ôÌù°å¡£Óû§±»Êèµ¼½«×Ö·û´®Õ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØÖ·À¸Ê±£¬ÏÖʵִÐеÄÊÇ´Ó"trycloudflare.com"ÏÂÔØ»ùÓÚPHP»òNode.jsµÄInterlock RAT±äÖÖ¡£ÕâÒ»¹ý³ÌÀûÓÃWindows UIÔªËØ¶ã±Ü°²È«ÖҸ棬Óû§½öÐèµ¥Ò»²Ù×÷¼´¿É´¥·¢¶ñÒâ´úÂëÏÂÔØ¡£Ï°È¾ºó£¬RATͨ¹ýPowerShellºÅÁîÍøÂçϵͳÓëÍøÂçÐÅÏ¢£¬²¢ÒԽṹ»¯JSONÌåʽй¶Êý¾ÝÖÁC2·þÎñÆ÷¡£¹¥»÷Õß»¹¿Éͨ¹ýC2·¢ËÍshellºÅÁî¡¢Ö²ÈëÐÂÔØºÉ¡¢Ôö³¤×¢²á±íÓÆ¾ÃÏî»òÀûÓÃRDPºáÏòÒÆ¶¯£¬ÐÎ³ÉÆëÈ«¹¥»÷Á´¡£
https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/
4. ¼¼¼ÎÖ÷°åUEFI¹Ì¼þ·ìÏ¶ÆØ¹â£º°ÙÍòÉè±¸Ãæ¶Ô¶ñÒâÈí¼þÍþв
7ÔÂ14ÈÕ£¬È«Çò¹Ì¼þ°²È«¹«Ë¾Binarly½üÆÚÅû¶£¬¼¼¼Î¿Æ¼¼Æìϳ¬¹ý240¿îÖ÷°åÐͺŵÄUEFI¹Ì¼þ´æÔÚËĸö¸ßΣ·ì϶£¨CVE-2025-7026ÖÁCVE-2025-7029£©£¬ÑϳÁÐÔÆÀ·Ö´ï8.2¡£ÕâЩ·ì϶ÔÊÐí¹¥»÷ÕßÔÚϵͳÖÎÀíģʽ£¨SMM£©»·¾³ÏÂÖ´ÐÐËÁÒâ´úÂ룬ֲÈë¿ÉÈÆ¹ý´«Í³°²È«·ÀÓùµÄbootkit¶ñÒâÈí¼þ£¬¼´±ã³Á×°²Ù×÷ϵͳÈÔ¿ÉÓÆ¾Ã´æÔÚ¡£×êÑз¢ÏÖ£¬·ì϶ԴÓڹ̼þ¹©¸øÉÌAmerican Megatrends Inc.£¨AMI£©µÄ²Î¿¼´úÂëȱµã£¬µ¼Ö¼¼¼ÎµÈOEM³§ÉÌδÄÜʵʱ½¨¸´£¬²¿ÃÅÉ豸Òò´ïµ½Ê¹ÓÃÊÙÃüÖÕÖ¹£¨EOL£©×´Ì¬¿ÉÄÜÓÀԶ¶³ö·çÏÕ¡£¹¥»÷Õß¿ÉÀûÓÃSMMµÄ¸ßȨÏÞ¸öÐÔ£¬Í¨¹ýÔ¶³Ì½Ó¼ûľÂí£¨RAT£©ÔÚÆô¶¯½×¶Î¼ÓÔØ¶ñÒâ´úÂë¡£ÀýÈ磬CVE-2025-7028ÔÊÐí¶ÔϵͳÖÎÀíRAM£¨SMRAM£©½øÐжÁ/д½Ó¼û£¬¿ÉÄÜÖ±½Ó×°ÖöñÒâÈí¼þ£»CVE-2025-7027Ôò¿Éͨ¹ýÅú¸ÄSMRAMÄÚÈݴ۸Ĺ̼þ¡£BinarlyÖ¸³ö£¬·ì϶ӰÏìÁìÓò¿í·º£¬¼¼¼ÎÓÐ651¿î²úÆ·Êܲ¨¼°£¬Supermicro¡¢´÷¶ûµÈÆ·ÅÆÒàÔÚÆäÖУ¬È«ÇòÊÜÓ°ÏìÉ豸ÊýÁ¿³¬°ÙÍǫ̀¡£Ö»¹ÜAMIÒѰ䲼½¨¸´²¹¶¡£¬µ«¼¼¼ÎµÈ³§É̵Ĺ̼þ¸üÐÂÖͺó£¬ÇÒδ¹«¿ª°²È«²¼¸æ¡£
https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/
5. Cursor IDEÖеĶñÒâÀ©´óµ¼Ö¼ÛÖµ50ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ
7ÔÂ14ÈÕ£¬È«Çò°²È«»ú¹¹¿¨°Í˹»ù½üÈÕÅû¶һ·Õë¶Ô¼ÓÃÜÇ®±Ò¿ª·¢ÕߵijÁ´óÍøÂç¹¥»÷ÊÂÎñ£º¶íÂÞ˹¿ª·¢ÕßÒò×°ÖÃCursor AI IDEƽ̨ÉϵÄÐéαSolidity˵»°À©´ó£¬µ¼Ö¼ÛÖµ50ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¹¥»÷ÕßÀûÓÃOpen VSX×¢²á±íÖмÙÒâÓï·¨¸ßÁÁ¹¤¾ßµÄ¶ñÒâÀ©´ó£¬Í¨¹ý¶à½×¶ÎÔØºÉͶµÝʵÏÖÁ˶ÔÉ豸µÄÓÆ¾Ã½ÚÔì¡£ÊÂÎñʼÓÚÊܺ¦Õß´ÓOpen VSXÏÂÔØÃûΪ"Solidity Language"µÄÀ©´ó·¨Ê½£¬¸Ã·¨Ê½±í±íÌṩÒÔÌ«·»ÖÇÄܺÏÔ¼¿ª·¢Ö§³Ö£¬ÊµÔòͨ¹ýÖ´ÐÐÔ¶³ÌPowerShell¾ç±¾Ö²ÈëScreenConnectÔ¶³ÌÖÎÀí¹¤¾ß¡£¹¥»÷Á´ÏÔʾ£¬¶ñÒâ´úÂëÊ×ÏȲ鳲¢×°ÖÃScreenConnect£¬Ê¹ÍþвÕß»ñµÃÆëȫԶ³Ì½Ó¼ûȨÏÞ£¬Ëæºóͨ¹ýVBScriptÏÂÔØÔ̺¬Quasar RATºÍPureLogsÇÔÈ¡·¨Ê½µÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£Ç°Õß¿ÉÖ´ÐÐËÁÒâϵͳºÅÁºóÕßÔòרÃÅÇÔÈ¡ä¯ÀÀÆ÷ƾ֤¡¢¼ÓÃÜÇ®°üÊý¾Ý¼°Éí·ÝÑéÖ¤cookie¡£¿¨°Í˹»ù·ÖÎö·¢ÏÖ£¬¸ÃÀ©´óÔÚOpen VSXµÄÏÂÔØÁ¿±»±¨´ðÐéÔöÖÁ54,000´Î£¬²¢Í¨¹ýËã·¨°Ñ³Öʹ¶ñÒⷨʽÔÚËÑË÷Á˾ÖÖÐÅÅÃû¸ßÓںϷ¨¹¤¾ß¡£¸üÖµÍ×ÌùÐĵÄÊÇ£¬¹¥»÷Õß´ÎÈÕÒÔ"solidity"ÃûÒå°ä²¼ÏÕЩһÑù°æ±¾µÄÀ©´ó£¬½«×°ÖÃÁ¿Î±ÔìÖÁ½ü200Íò´Î£¬ÏÔÖøÔö³¤Óû§Îó×°·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/malicious-vscode-extension-in-cursor-ide-led-to-500k-crypto-theft/
6. FBI²é·âÈÎÌìÌÃSwitch¡¢PS4ÓÎÏ·µÁ°æÍøÕ¾
7ÔÂ15ÈÕ£¬ÃÀ¹úÁª¹úµ÷²é¾Ö£¨FBI£©ÑÇÌØÀ¼´ó·Ö¾Ö½üÈÕ°ä·¢£¬³É¹¦µ·»ÙÒÔnsw2u.comΪÊ׵Ŀç¹úµÁ°æÓÎÏ·Æ½Ì¨ÍøÂ磬²é·âÔ̺¬nswdl.com¡¢ps4pkg.comµÈÔÚÄÚµÄ7¸öÓòÃû£¬²¢ÔÚÒ³ÃæÕ¹Ê¾·¨Âɹ«¸æÐû³Æ"ÒÑͬ²½·ÛËé¼¼ÊõÉèÊ©"¡£Õâ´ÎÐж¯µÃµ½ºÉÀ¼·¨Âɲ¿ÃÅÐÖú£¬±ê־ȡȫÇò°æÈ¨±£»¤½øÈëн׶Ρ£µ÷²éÏÔʾ£¬É永ƽ̨ÔÚ´ÓǰËÄÄê¼äÐÎ³ÉÆëÈ«µÁ°æ²úÒµÁ´£ºÔÚ¡¶Èû¶û´ï´«Ëµ£ºÍõ¹úÖ®Àá¡·µÈÈȵãÓÎÏ·Õýʽ·¢ÊÛǰÊýÖܼ´Ìá¹©ÆÆ½â×ÊÔ´£¬Í¨¹ýÈÎÌìÌÃSwitchÆÆ½âÖ÷»ú¼æÈÝPCÓÎÏ·µÄ¸öÐÔ¼±¾çÀ©É¢¡£2025Äê2ÔÂ28ÈÕÖÁ5ÔÂ28ÈÕÆÚ¼ä£¬ÖØÒªÏÂÔØÇþ··¸·¨ÏÂÔØÁ¿´ï320Íò´Î£¬°´µ¥»ú¾ù¼Û50ÃÀÔª¹ÀË㣬Ôì³É°æÈ¨·½Ô¼1.7ÒÚÃÀÔªÖ±½ÓËðʧ¡£ÆäÖÐnsw2uƽ̨ÒòÖ§³ÔìÆ½âÉ豸ÔËÐеÁ°æÓÎÏ·£¬2025Äê5ÔÂÈ«Çò½Ó¼ûÁ¿´ï230Íò´Î£¬Ö»¹Ü±»Å·ÃËÁÐÈë¼ÙðÓëµÁ°æ¼à¿ØÃûµ¥ÇÒÔâÓ¢¹ú¡¢Î÷°àÑÀµÈÁù¹ú¹Ø±Õ£¬ÈÔͨ¹ý¼¼Êõ¼¿Á©³ÖÐøÔËÓª¡£¼¼Êõ²ãÃæ£¬µÁ°æÆ½Ì¨Í¨¹ýÐé¹¹Ö÷»úºÍ¼ÓÃÜͨѶ¶ã±Ü¼à¹Ü£¬Õâ´ÎFBI³É¹¦¶¨Î»ÆäλÓÚºÉÀ¼µÄ·þÎñÆ÷¼¯Èº£¬¶Â½Ø×ʽðÁ÷ÓëÄÚÈÝ·Ö·¢Çþ·¡£
https://therecord.media/piracy-sites-for-nintendo-switch-ps4-games-taken-down


¾©¹«Íø°²±¸11010802024551ºÅ