°²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬ÍþвŷÖÞÓû§°²È«
°ä²¼¹¦·ò 2025-08-041. °²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬ÍþвŷÖÞÓû§°²È«
7ÔÂ31ÈÕ£¬°²È«×êÑÐÈËÔ±·¢ÏÖÒ»¿îÃûΪ¡°DoubleTrouble¡±µÄ°²×¿ÒøÐÐľÂíʵÏÖ³Á´ó¼¼ÊõÉý¼¶£¬Æä´«²¼¼¿Á©Óë¹¥»÷ÄÜÁ¦ÏÔÖø¼ÓÇ¿£¬¶ÔÅ·ÖÞÓû§×é³ÉÑϸñÌôÕ½¡£¸ÃľÂí×î³õͨ¹ý·Âð´óÐÍÒøÐд¹µöÍøÕ¾´«²¼£¬Èç½ñÒÑÀ©´óÖÁÀûÓÃDiscordƽ̨ÍйܶñÒâAPKÎļþ½øÐзַ¢£¬´ó·ù½µµÍÁË´«Í³°²È«¹¤¾ßµÄ¼ì²âЧÄÜ¡£¾ÝZimperiumÍŶӷÖÎö£¬µ±Ç°¹¥»÷»î¶¯Éæ¼°9¸ö×îÐÂÑù±¾¼°25¸öÔçÆÚ±äÖÖ£¬ÆäÖ°Äܵü´ú¿ì¶Å×ëÒñ±ÎÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£Ð°æÄ¾Âí¼¯³É¶àÏîÃô¸ÐÖ°ÄÜ£ºÍ¨¹ýMediaProjectionÓëVirtualDisplay½Ó»°±úÏÖʵʱÆÁϼÔ죬¿ÉÈÆ¹ý¶à³É·ÖÈÏÖ¤Ö±½Ó²¶»ñÓû§²Ù×÷»Ã棻αÔìËøÆÁ½çÃæÇÔÈ¡PINÂë¡¢ÃÜÂë¼°½âËøÍ¼°¸£»»ùÓÚÎÞ×è°ÊÂÎñµÄ¼üÅ̼ͼְÄÜ£¬Äܾ«×¼²¶»ñÓû§ÊäÈëÄÚÈÝ¡£´Ë±í£¬Ä¾Âí»¹²¿Êð¶¨Ô컯´¹µö¸²¸Ç²ã£¬·ÂÃ°ÒøÐÐÀûÓõǼ½çÃæÓÕµ¼Óû§Ìύƾ֤£¬Ö¸±êº¸ÇÒøÐÐAPP¡¢ÃÜÂëÖÎÀí¹¤¾ß¼°¼ÓÃÜÇ®±ÒÇ®°ü¡£ÇÔÈ¡Êý¾Ý¾±àÂëºó´«ÊäÖÁÔ¶³ÌC2·þÎñÆ÷£¬ÐÎ³ÉÆëÈ«Êý¾ÝÇÔÈ¡Á´Ìõ¡£
https://www.infosecurity-magazine.com/news/android-malware-targets-banks-via/
2. ³¯ÏÊLazarus GroupÀûÓöñÒ⿪ԴÈí¼þ°üÖ´ÐÐÍøÂç¼äµý»î¶¯
7ÔÂ31ÈÕ£¬¾Ý°²È«³§ÉÌSonatype»ã±¨£¬³¯Ïʹú¶ÈÖ§³ÖµÄLazarus GroupÔÚ2025ÄêÉϰëÄêÌáÒéÁËÒ»³¡´ó¹æÄ£ÍøÂç¼äµýÐж¯£¬Í¨¹ý¶È·¢200Óà¸ö¶ñÒ⿪ԴÈí¼þ°ü£¨Éæ¼°npmºÍPyPIƽ̨£©£¬³É¹¦ÉøÈëÈ«Çò¿ª·¢»·¾³¡£Õâ´Î¹¥»÷±»È϶¨Îª¸Ã×éÖ¯µÄ¡°Õ½Êõת±ä¡±£¬±ê־ȡÆä´Ó´«Í³µÄ»úÓöÖ÷Òå¹¥»÷תÏò³Ö¾ÃÊý¾ÝÇÔÈ¡Óë¼äµý»î¶¯¡£SonatypeÔÚ2025Äê1ÔÂÖÁ6Ô¼äÀÛ¼ÆÀ¹½Ø234¸ö¹ÖÒì¶ñÒâ°ü£¬¹ÀËãDZÔÚÊܺ¦Õß´ï3.6ÍòÈË¡£ÕâЩÈí¼þ°üͨ¹ý¼ÙÒâºÏ·¨¿ª·¢¿âÖ´ÐÐÓÕÆ£¬¿ª·¢ÕßÔÚδ¾ÑéÖ¤»òɳºÐ²âÊÔµÄÇé¿öÏÂÖ±½Ó×°Ö㬵¼Ö¶ñÒâ´úÂë¾CI/CD×Ô¶¯»¯Á÷³ÌÀ©É¢ÖÁ³ö²úϵͳ¡£¹¥»÷ѡȡ¶à½×¶ÎÉè¼Æ£º³õÆÚÖ²Èë·¨Ê½ÕÆ¹Ü³ÉÁ¢Óƾû¯ºóÃÅ£¬ºóÐø½×¶ÎÔòרһÓÚÇÔÈ¡Ãô¸ÐÊý¾Ý£¬Ô̺¬¿ª·¢»úƾ֤¡¢ÔÆ»ù´¡ÉèÊ©ÁîÅÆ¼°Ô´´úÂë´æ´¢¿â½Ó¼ûȨÏÞ¡£»ã±¨Ç¿µ÷£¬LazarusµÄÖ¸±êÒѳ¬¹ýµ¥´¿ÇÔȡƾ֤£¬ÆäÖ÷ÌâÒâͼÔÚÓÚͨ¹ý½ÚÔ쿪·¢Õß»·¾³£¬½øÒ»²½ÉøÈëÆóÒµÍøÂç¡£Õâ´ÎÐж¯³ö¸ñÕë¶ÔDevOpsÃܼ¯ÐÍ×éÖ¯£¬ÒòÆä×Ô¶¯»¯¹Ü·Ò׳ÉΪ¶ñÒâÒÀÀµÏîµÄ´«²¼½Úµã¡£
https://www.infosecurity-magazine.com/news/200-malicious-open-source-lazarus/
3. ¼ÓÖÝ´óѧ²®¿ËÀû·ÖУÊý¾Ý¿âÔâй¶
7ÔÂ31ÈÕ£¬×÷ΪÃÀ¹ú¶¥¼â¹«Á¢×êÑÐÐÍ´óѧ£¬¼ÓÖÝ´óѧ²®¿ËÀû·ÖУ½üÈÕ±»ÆØÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ¡£Ò»ÃûÍþвÐÐΪÕßÔÚÍøÂç·¸×ïÂÛ̳¹«¿ªÏúÊÛËùν¡°ÆëÈ«Êý¾Ý¿â¡±£¬Ðû³ÆÔ̺¬Ñ§ÉúÊý¾Ý¡¢×êÑлáÐÅÏ¢¡¢ÀÏʦÏêÇé¡¢Óû§ÕË»§£¨º¬Óû§Ãû¡¢µç×ÓÓʼþ¼°¹þÏ£ÃÜÂ룩¼°Ö§¸¶ÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬²¢ÒÔSQLºÍCSVÌåʽÌṩÊý¾Ý£¬Í¬Ê±¶µÏú½Ó¼û¸ÃУphpMyAdminÊý¾Ý¿âÖÎÀíÃæ°åµÄȨÏÞ¡£ÎªÖ¤Ã÷ÕæÊµÐÔ£¬¹¥»÷Õß°ä²¼Á˶àÕŽØÍ¼£¬Õ¹Ê¾Æä¶ÔÊý¾Ý¿âºó¶ËµÄ½ÚÔìȨÏÞ£¬Ô̺¬º¬Ãô¸ÐÐÅÏ¢µÄ±í¸ñ¼°Óû§ÕË»§ÁÐ±í¡£ÍþвÕßÌṩµÄ½ØÍ¼ÏÔʾ£¬Æä³É¹¦ÇÖÈëÊý¾Ý¿âºó¶Ë£¬¿É²é¿´Ô̺¬Ñ§Éú¡¢½ÌÈËÔ±¹¤Ó×ÎÒÐÅÏ¢µÄ±í¸ñ£¬²¢»ñÈ¡ÁË´óÁ¿Óû§ÕË»§µÄ¹þÏ£ÃÜÂë¡£´Ë±í£¬¹¥»÷ÕßÖ¸³ö£¬ÔÚ·¢ÌûÆÚ¼ä£¬²®¿ËÀû·ÖУ¶à¸ö×ÓÓòÃû³öÏÖ·þÎñÖжϣ¬¹Ù·½ÍøÕ¾ÒàÏÔʾÊý¾Ý¿âÏνÓÃýÎ󣬽øÒ»²½×ôÖ¤ÁËÊý¾Ýй¶µÄÕæÊµÐÔ¡£ÕâЩϵͳÒì³£¿ÉÄÜÓë¹¥»÷ÕߵIJÙ×÷Ö±½ÓÓйأ¬»ò·´Ó³¸ÃÐ£ÍøÂ簲ȫ·À»¤´æÔÚ³Á´ó·ì϶¡£
https://dailydarkweb.net/uc-berkeley-targeted-in-major-data-breach-full-university-database-allegedly-for-sale-online/
4. AkiraÀÕË÷Èí¼þÀûÓÃSonicWall VPNÁãÈÕ·ì϶ִÐй¥»÷
8ÔÂ3ÈÕ£¬±±¼«Àdz¢ÊÔÊÒ£¨Arctic Wolf Labs£©×êÑÐÈËÔ±½üÈÕ°ä²¼»ã±¨£¬½ÒʾAkiraÀÕË÷Èí¼þÕýͨ¹ýSonicWall SSL VPNÉ豸ÌáÒéÒÉËÆÁãÈÕ·ì϶¹¥»÷£¬ÉõÖÁÍ»ÆÆÒÑÆëÈ«½¨²¹¡¢ÆôÓöà³É·ÖÈÏÖ¤£¨MFA£©¼°Æ¾Ö¤ÂÖ»»»úÔìµÄϵͳ¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê7ÔÂ15ÈÕÆð³öÏÖ¼¤ÔöÌ¬ÊÆ£¬Æäº¹Çà¿É×·ÒäÖÁ2024Äê10Ô£¬Òý·¢ÍøÂ簲ȫÁìÓò¸ß¶È¹Ø×¢¡£×êÑÐÖ¸³ö£¬Ö»¹ÜδÆëÈ«Åųý±©Á¦ÆÆ½â¡¢Æ¾Ö¤Ìî³äµÈ´«Í³¹¥»÷¼¿Á©µÄ¿ÉÄÜÐÔ£¬µ«¶àÏîÖ¤¾ÝÅú×¢SonicWall VPN´æÔÚδ¹«¿ªµÄÁãÈÕ·ì϶¡£²¿Ã۸ÀýÏÔʾ£¬¼´±ãÉ豸ÒÑʵÏÖ×îв¹¶¡¸üС¢ÆôÓûùÓÚ¹¦·òµÄÒ»´ÎÐÔÃÜÂ루TOTP£©MFA£¬²¢ÔÚÆ¾Ö¤ÂÖ»»ºóÈÔÔâÈëÇÖ¡£¹¥»÷ÕßÀûÓÃÐ鹹רÓ÷þÎñÆ÷£¨VPS£©ÍйܽøÐÐVPNÉí·ÝÑéÖ¤£¬ÓëºÏ·¨Óû§Í¨¹ý¿í´ø·þÎñÉÌÍøÂçµÇ¼µÄÐÐΪģʽ´æÔÚÏÔÖø²î¾à¡£´Ë±í£¬ÈëÇÖÓëÊý¾Ý¼ÓÃܼäµÄ¶ÌÔݹ¦·ò²î£¬°µÊ¾¹¥»÷Õ߾߱¸¼±¾çºáÏòÒÆ¶¯ÄÜÁ¦¡£Õë¶ÔÕâÒ»Íþв£¬±±¼«Àdz¢ÊÔÊÒ½¨Òé×é֯һʱ½ûÓÃSonicWall SSL VPN·þÎñ£¬Ö±ÖÁ¹Ù·½°ä²¼ÓÐЧ²¹¶¡¡£
https://securityaffairs.com/180724/cyber-crime/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks.html
5. ·ðÂÞÀï´ïÖݼàÓüÊý¾Ýй¶ÊÂÎñÒý·¢¾ìÊô°²È«·¢¼±
8ÔÂ1ÈÕ£¬ÃÀ¹ú·ðÂÞÀï´ïÖÝ´óÕÓÔóµØ³Í½ÌËù£¨ECI£©½üÆÚ²úÉúһ·ÑϳÁÊý¾Ýй¶ÊÂÎñ£ºÒ»Ãû¹¤×÷ÈËÔ±ÎóÏòËùÓÐÇô·¸·¢Ë͵ç×ÓÓʼþ£¬ÆäÖÐÔ̺¬Í¬ÓüÇô·¸·Ã¿ÍµÄÁªÏµ·½Ê½£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂë¡£ÕâЩÐÅϢͨ¹ý¼àÓüÄÚµÄÐÅϢͤºÍ°²È«Æ½°åµçÄÔ±»Çô·¸»ñÈ¡£¬µ¼Ö´óÁ¿Çô·¸¾ìÊôÏÝÈ밲ȫ·¢¼±¡£¶àÃûÊÜÓ°Ïì¾ìÊôÏòýÌåй©£¬Ð¹Â¶µÄÁªÏµ·½Ê½¿ÉÄܱ»ÓÃÓÚÀÕË÷»òɧÈÅ¡£ÀýÈ磬¼ò¡¤ÌÀÆÕÉÓÇÓô·£º¡°ÈôÇô·¸¼ä²úÉúì¶Ü£¬¿ÉÄÜͨ¹ýй¶µÄµç»°ºÅÂëÍþв¾ìÊôÖ§¸¶Êê½ð£¬²»È»ÖÐÉËÆä±»¹ØÑºµÄÇ×Êô¡£¡±ÅÁÌØÀï˹¡¤¿ÀûÔòÒòÔøÔâ·ê¸ú×Ù£¬¸ü²»°²×Ô¼ºµÄÊý×ÖÒþÖÔ±»·¸×ï·Ö×ÓÀûÓá£Ö»¹Ü¼àÓüÒÑ֪ͨ²¿ÃžìÊôÊý¾Ýй¶Çé¿ö£¬µ«·ðÂÞÀï´ïÖݳͽ̲¿ÃÅδ¶ÔýÌåѯÎÊ×÷³ö»ØÓ¦£¬½øÒ»²½¼Ó¾çÁ˹«¼ÒµÄ²»°²¡£
https://www.theregister.com/2025/08/01/florida_prison_email_blunder/
6. ÐÂÐͶà½×¶Î¶ñÒâÈí¼þÀûÓÃWindows¿ì½Ý·½Ê½´«²¼REMCOSºóÃÅ
8ÔÂ2ÈÕ£¬°²È«×êÑÐÈËÔ±½üÈÕÅû¶ÁËһ·ÐÂÐͶà½×¶Î¶ñÒâÈí¼þ¹¥»÷»î¶¯£¬Æäͨ¹ý¾«ÐļÙ×°µÄWindows¿ì½Ý·½Ê½´«²¼Î£ÏÕµÄREMCOSÔ¶³Ì½Ó¼ûľÂí¡£¸Ã¹¥»÷Á´Éè¼ÆÆæÃÀûÓÃÓû§¶Ô¡°ÎÞº¦Îļþ¡±µÄÐÅÀµÊµÏÖÒñ±ÎÈëÇÖ£¬×îÖÕ¸³Óè¹¥»÷Õ߯ëÈ«½ÚÔìÊÜϰȾϵͳµÄÄÜÁ¦¡£¹¥»÷ʼÓÚÒ»¸ö¿´ËÆÕý³£µÄLNKÎļþ£¬Í¨³£Í¨¹ýµç×ÓÓʼþ¸½¼þ´«²¼£¬ÎļþÃû¼Ù×°³É¡°ORDINE-DI-ACQUIST-7263535¡±µÈÉÌÎñÓйØÃû³ÆÒÔ½µµÍÓû§¾¯Ìè¡£µ±Óû§µã»÷¸ÃÎļþʱ£¬ÆäÄÚÖõÄPowerShellºÅÁî»áÔÚºó¶Ü¾²Ä¬Ö´ÐУ¬Èƹý´«Í³°²È«¼ì²â»úÔì¡£PowerShell×÷ΪWindows¹¤×÷×Ô¶¯»¯¹¤¾ß£¬ÔÚÕâ´Î¹¥»÷Öб»ÀÄÓÃΪ¶ñÒâÔØºÉÏÂÔØÆ÷£ºÍ¨¹ý´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡Base64±àÂëµÄÓÐÐ§ÔØºÉ²¢½âÂ룬×îÖÕÆô¶¯Ò»¸ö¼Ù×°³É¡°CHROME.PIF¡±µÄ¿ÉÖ´ÐÐÎļþ¡£½âÂëºóµÄÔØºÉ×îÖÕÔÚϵͳ%ProgramData%Ŀ¼Ï´´½¨¡°Remcos¡±Îļþ¼Ð£¬×°ÖÃREMCOSºóÃŲ¢ÌìÉú»÷¼üÈÕÖ¾Îļþ£¬È·Î¬Óƾû¯×¤Áô¡£¹¥»÷Õ߿ɽè´ËÖ´ÐмüÅ̼ͼ¡¢´´½¨Ô¶³ÌShell¡¢½Ó¼ûÎļþ£¬ÉõÖÁ½ÚÔìÉãÏñÍ·ºÍÂó¿Ë·ç½øÐÐʵʱ¼à¶½¡£
https://hackread.com/attack-windows-shortcut-files-install-remcos-backdoor/


¾©¹«Íø°²±¸11010802024551ºÅ