CharonÀÕË÷Èí¼þÈÚºÏAPT¼¼Êõ£¬Öж«¹«¹²²¿ÃÅÓ뺽¿ÕÒµÔ⾫׼½ø¹¥

°ä²¼¹¦·ò 2025-08-15

1. CharonÀÕË÷Èí¼þÈÚºÏAPT¼¼Êõ£¬Öж«¹«¹²²¿ÃÅÓ뺽¿ÕÒµÔ⾫׼½ø¹¥


8ÔÂ13ÈÕ£¬ÍøÂ簲ȫ»ú¹¹Ç÷Ïò¿Æ¼¼½üÈÕÅû¶£¬Ò»ÖÖÃûΪCharonµÄÐÂÐÍÀÕË÷Èí¼þÕýÒÔÖж«¹«¹²²¿Ãźͺ½¿ÕҵΪָ±êÌáÒé¹¥»÷£¬Æä¼¼Êõ¸´ÔÓ¶È´ïµ½¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©¼¶±ð¡£×êÑÐÏÔʾ£¬¹¥»÷ÕßѡȡDLL²àÔØ¡¢¹ý³Ì×¢Èë¼°EDRÌӱܼ¼Êõ¹¹½¨¹¥»÷Á´£¬ÓëÔøÕë¶ÔÑÇÌ«µ±¾ÖÖ¸±êµÄEarth Baxia APT×éÖ¯´æÔÚÏÔÖø¼¼Êõ³Áµþ£¬µ«µ±Ç°Ö¤¾ÝÉв»¼°ÒÔÈ·ÈÏÖ±½Ó¹ØÁª¡£Õâ´Î¹¥»÷ÒԺϷ¨ä¯ÀÀÆ÷ÎļþEdge.exeΪÈë¿Ú£¬Í¨¹ý²àÔØ¶ñÒâmsedge.dll×îÖÕ²¿ÊðCharonÀÕË÷Èí¼þ¡£¸ÃÈí¼þ¾ß±¸¶à³Á·ÛËéÐÔÖ°ÄÜ£ºÖÕÖ¹°²È«·þÎñ¡¢É¾³ý¾íÓ°¸±±¾Ó뱸·ÝÒÔ¹ÊÕϸ´Ô­£¬Ñ¡È¡¶àÏ̼߳ÓÃܼ¼ÊõÌáÉýÎļþËø¶¨Ð§ÄÜ£¬²¢¼¯³É»ùÓÚ¿ªÔ´Dark-KillÏîÖ÷ÕÅÇý¶¯·¨Ê½£¬¿Éͨ¹ý¡°×Ô´øÒ×Êܹ¥»÷Çý¶¯·¨Ê½£¨BYOVD£©¡±¹¥»÷½ûÓÃEDR·À»¤£¬Ö»¹ÜÕâ´Î¹¥»÷ÖиÃÖ°ÄÜδ±»´¥·¢£¬°µÊ¾ÆäÈÔ´¦ÓÚ²âÊԽ׶Ρ£ÖµÍ×ÌùÐĵÄÊÇ£¬¹¥»÷ÕßʹÓö¨Ô컯ÀÕË÷ÐÅÃ÷È·Ìá¼°Êܺ¦×éÖ¯Ãû³Æ£¬Ö¤Êµ´ËΪÕë¶ÔÐÔÐж¯¡£Ö»¹Ü¹¥»÷Á´Öжþ½øÔìÎļþÓëEarth Baxiaº¹ÇàÊÖ·¨¸ß¶ÈÀàËÆ¡£Ä¿Ç°²»×ã¹²Ïí»ù´¡ÉèÊ©»ò¹¥»÷ģʽµÈÈ·ÔäÖ¤¾Ý£¬½öÄÜÅж¨´æÔÚ¡°ÓÐÏÞµ«ÏÔÖøµÄ¼¼ÊõÇ÷ͬ¡±¡£


https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html


2. EfimerľÂíºá¿ç2024-2025Ä꣬ȫÇòÎåǧÓû§Ïݸ´ºÏÐÍÍøÂç·¸×ïÉú̬


8ÔÂ13ÈÕ£¬¿¨°Í˹»ù½üÈÕÅû¶£¬×Ô2024Äê10Ô³õ´Î·¢ÏÖÒÔÀ´£¬EfimerľÂí²¡¶¾ÒѳÖÐø»îÔ¾ÖÁ2025Ä꣬ͨ¹ýαÔì˾·¨ÉêÃ÷´¹µöÓʼþ¡¢ÈëÇÖWordPressÍøÕ¾¼°¶ñÒâÖÖ×ÓÎļþÈý´óÇþ·£¬Ï°È¾È«Çò³¬¹ý5000ÃûÓû§£¬Ðγɼ¯¼ÓÃÜÇ®±ÒÇÔÈ¡¡¢ÍøÕ¾±©Á¦ÆÆ½âÓëÀ¬»øÓʼþ·Ö·¢ÓÚÒ»ÌåµÄ¸´ºÏÐÍÍøÂç·¸×ïÉú̬¡£¸ÃľÂíµÄÖ÷Ìâ¹¥»÷¼¿Á©Ô̺¬Èý³Áά¶È£ºÆäÒ»£¬Í¨¹ý¼Ù×°³ÉÆóÒµÂÉʦµÄ´¹µöÓʼþÖ´ÐÐÉç»á¹¤³Ì¹¥»÷£¬ÓÕµ¼Êܺ¦Õß´ò¿ªº¬¶à½×¶Î¾ç±¾µÄ¸½¼þ£¬Ö²ÈëľÂíºóÒÔÐéαÃýÎóÐÅÏ¢¸²¸Ç»î¶¯ºÛ¼££»Æä¶þ£¬Õë¶ÔWordPressÍøÕ¾ÌáÒ鱩Á¦ÆÆ½â£¬ÀûÓÃά»ù°Ù¿Æ´Ê»ãÌìÉúÖ¸±êÓòÃûÁÐ±í²¢²âÊÔ´óÁ¿ÃÜÂ룬³É¹¦ÈëÇÖºó°ä²¼¶ñÒâÎļþ»òͨ¹ýαÔìµçÓ°ÖÖ×Ó´«²¼ÁíÒ»Efimer±äÖÖ£¬¸½´øTron¡¢SolanaµÈαÔìÇ®°ü£»ÆäÈý£¬²¿ÊðÃûΪ"Liame"µÄ¾ç±¾´ÓÖ¸¶¨ÍøÕ¾×¥È¡ÓʼþµØÖ·£¬¹¹½¨¾«×¼Ú¿Æ­Ö¸±ê¿â¡£Êý¾ÝÏÔʾ£¬2024Äê10ÔÂÖÁ2025Äê7Լ䣬°ÍÎ÷³ÉΪ×î´óÊܺ¦¹ú£¬Ó¡¶È¡¢Î÷°àÑÀ¡¢¶íÂÞ˹¡¢Òâ´óÀû¼°µÂ¹ú½ôËæÆäºó¡£


https://hackread.com/efimer-trojan-crypto-hacks-wordpress-torrents-phishing/


3. Ä«Î÷¸çCFE 600GBÊý¾Ýй¶¶³ö¹Ø¼üµçÁ¦»ù´¡ÉèÊ©ÍøÂç·çÏÕ


8ÔÂ13ÈÕ£¬×êÑÐÈËÔ±½üÈÕÅû¶£¬Ä«Î÷¸ç¹úÓеçÁ¦¹«Ë¾Áª¹úµçÁ¦Î¯Ô±»á£¨CFE£©Ôâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬ÆäÍøÂçºÍÍþв¾¯±¨ÈÕ־ͨ¹ýµÚÈý·½°²È«¹«Ë¾TelikoÖÎÀíµÄKibanaÊ·ý¹«¿ªÂ¶³ö£¬Êý¾ÝÁ¿³¬¹ý600GB¡£×÷ΪΪīÎ÷¸ç99%È˶¡¹©µçµÄÖ÷ÌâÄÜÔ´»ú¹¹£¬CFEÕâ´ÎйÃÜÊÂÎñ±»ÆÀ¹ÀΪ¿ÉÄÜÍþвȫ¹úµçÁ¦¹©¸ø°²È«µÄ³Á´ó·çÏÕ¡£Ð¹Â¶Êý¾Ýº­¸ÇÔ±¹¤É豸DNS²éÎʼͼ¡¢½Ó¼ûµÄURL¡¢Éî¶È°ü¼ì²â£¨DPI£©ÈÕÖ¾¼°·´¶ñÒâÈí¼þ¹¤¾ßÌìÉúµÄ¾¯±¨£¬¹¦·ò¿ç¶È¿É×·ÒäÖÁ2021Äê11Ô¡£ÕâЩÈÕÖ¾ÓÉÍйܼì²âÓëÏìÓ¦£¨MDR£©½â¾ö¹æ»®AIsaacÌìÉú£¬¾ßÌå¼Í¼ÁËCFEÄÚ²¿ÍøÂç¼Ü¹¹¡¢Ò×Êܹ¥»÷É豸¼°·þÎñÁбí¡£°²È«×¨¼ÒÖ¸³ö£¬¹¥»÷Õß¿Éͨ¹ý¶ÈÎö´ËÀàÊý¾Ý»æÔìCFE°²È«·ÀÓùͼÆ×£¬¼ø±ðÓÄ΢»·½Ú²¢Ö´Ðо«×¼¹¥»÷¡£³ýÔËÓªÍþв±í£¬Ô±¹¤»¥ÁªÍø»î¶¯ÈÕÖ¾µÄй¶»¹×é³ÉÒþÖÔ·çÏÕ¡£¹¥»÷Õß¿ÉÀûÓÃÓòÃûʹÓÃģʽע²á·ÂðÓòÃû£¬½áºÏй¶µÄÄÚ²¿¹¤¾ßÐÅÏ¢ÌáÒé¸ß¶ÈÕæÇеÄÓã²æÊ½ÍøÂç´¹µö¡£


https://cybernews.com/security/cfe-data-leak-mexico-critical-infrastructure/


4. Crypto24ÀÕË÷Èí¼þÀûÓÃ×Ô½ç˵EDR¶ã±Ü¹¤¾ß¹¥»÷´óÐÍ×éÖ¯


8ÔÂ14ÈÕ£¬2024Äê9Ô³õ´Î±»ÆØ¹âµÄCrypto24ÀÕË÷Èí¼þ×éÖ¯Ëäδ¹ãΪÈËÖª£¬µ«ÆäÕë¶ÔÈ«Çò½ðÈÚ¡¢Ôì×÷¡¢¿Æ¼¼µÈÁìÓò¸ß¼ÛÖµÖ¸±êµÄ¶¨Ïò¹¥»÷ÒÑÒý·¢°²È«½ç¹Ø×¢¡£Ç÷Ïò¿Æ¼¼×êÑÐÅú×¢£¬¸Ã×éÖ¯ºÜ¿ÉÄÜÓɳÛÃûÀÕË÷Èí¼þÍÅ»ïǰ³ÉÔ±×齨£¬Õ¹Ê¾³ö¸ß¶ÈµÄ¼¼Êõ³ÉÊì¶Å×ëÕ½ÊõÒñ±ÎÐÔ¡£Æä¹¥»÷Á´ÒÔ¶¨Ô컯¹¤¾ßΪÖ÷Ì⣬ÐγɴӳõʼÈëÇÖµ½Êý¾Ý±íйµÄÈ«Á÷³ÌÍþвϵͳ¡£ÔÚÈëÇֽ׶Σ¬¹¥»÷Õßͨ¹ý¼¤»îWindowsĬÈÏÖÎÀíÔ¹ØË»§»ò´´½¨ÐÂÓû§ÊµÏÖÓÆ¾Ã»¯½Ó¼û£¬Ëæºó²¿ÊðÅú´¦Öþ籾Óëϵͳö¾ÙºÅÁî·¢Õ¹¿úËÅ£¬´´½¨ÃûΪWinMainSvcµÄ¼üÅ̼ͼ·þÎñÓëMSRuntimeÀÕË÷Èí¼þ¼ÓÔØÆ÷¡£Îª¶ã±Ü°²È«¼ì²â£¬¸Ã×éÖ¯¿ª·¢ÁËRealBlindingEDR¹¤¾ßµÄ±äÖÖ£¬Í¨¹ý¶ÈÎöÄÚºËÇý¶¯ÔªÊý¾ÝÆ¥ÅäÓ²±àÂë³§ÉÌÁбí£¬º­¸ÇÇ÷Ïò¿Æ¼¼¡¢¿¨°Í˹»ù¡¢SentinelOneµÈ12¼Ò°²È«³§ÉÌ£¬Õë¶ÔÐÔ½ûÓÃÄں˼¶·À»¤¹³×Ó¡£Êý¾ÝÇÔÈ¡»·½Ú£¬Crypto24ѡȡ˫³Á¼¿Á©£º¼üÅ̼ͼÆ÷¼Ù×°³É"Microsoft Help Manager"£¬²¶»ñÔ̺¬Ö°ÄܼüÔÚÄÚµÄÓû§²Ù×÷Óë´°¿Ú±êÌ⣻ºáÏòÒÆ¶¯Ôòͨ¹ýSMB¹²ÏíʵÏÖ£¬×îÖÕÀûÓö¨ÔìWinINET API¹¤¾ß½«Êý¾Ýй¶ÖÁGoogle Drive¡£ÀÕË÷½×¶Î£¬¹¥»÷ÕßÔÚɾ³ýϵͳ¾íÓ°¸±±¾ºó´¥·¢¼ÓÃÜ·¨Ê½¡£


https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/


5. ¼ÓÄôóÏÂÒéÔºÔâÍøÂç¹¥»÷Êý¾Ýй¶£¬Î¢Èí·ì϶³ÉÍ»ÆÆ¿Ú


8ÔÂ14ÈÕ£¬¼ÓÄôóÏÂÒéÔºÕýµ÷²éÒ»Â·ÍøÂç¹¥»÷ÊÂÎñ£¬¹¥»÷Õßͨ¹ýÀûÓÃ΢Èí½üÆÚÅû¶µÄ°²È«·ì϶£¬³É¹¦ÇÔȡԱ¹¤Ãô¸ÐÐÅÏ¢²¢ÈëÇÖÖÎÀíÏÂÒéÔºÍÆËã»ú¼°Òƶ¯É豸µÄÖ÷ÌâÊý¾Ý¿â¡£¾Ý¼ÓÄôó¹ã²¥¹«Ë¾±¨Â·£¬ÏÂÒéÔº¹¤×÷ÈËÔ±ÒÑÓÚÖÜһͨ¹ýÓʼþÊÕµ½Î¥¹æÍ¨Öª£¬µ«¹Ù·½ÉÐδ¹«¿ªÉêÃ÷ÊÂÎñϸ½Ú¡£Õâ´Î¹¥»÷ÖУ¬ÍþвÐÐΪÕßÀûÓÃ΢Èí²úÆ·ÖеÄ佨²¹·ì϶»ñÈ¡Êý¾Ý¿â½Ó¼ûȨÏÞ£¬µÁÈ¡ÁËÔ̺¬Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢°ì¹«µØÖ·¼°µç×ÓÓʼþµØÖ·ÔÚÄڵķǹ«¿ªÊý¾Ý¡£ÏÂÒéÔºÒѶ½´ÙÓйØÈËÔ±¾¯ÌèÀûÓñ»µÁÐÅÏ¢Ö´ÐеÄڲƭÐÐΪ£¬Èç¼ÙÒâÒéÔ±»ò½øÐÐÚ¿Æ­¡£¼ÓÄôóÍøÂ簲ȫÖÐÐÄÈ·ÈÏÔÚЭÖúµ÷²é£¬µ«Î´½«¹¥»÷¹éÒòÓÚÌØ¶¨Íþв×éÖ¯£¬Ç¿µ÷ÍøÂçÊÂÎñ¹éÒòÐèºÄ·Ñ×ÊÔ´Ó빦·ò£¬Éæ¼°¶à³Á¸´ÔӳɷÖ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¹¥»÷ÕßÀûÓõķì϶¿ÉÄÜÓë΢Èí½üÆÚÅû¶µÄÁ½¸ö¸ßΣ·ì϶ÓйأºCVE-2025-53770£¨ToolShell£©ºÍCVE-2025-53786¡£ÆäÖУ¬CVE-2025-53770×Ô7Ô³õÆð±»¶à¹úÍþв¼¯Ìå¿í·ºÀûÓã»¶øCVE-2025-53786×÷ΪMicrosoft Exchange·ì϶£¬ÔÊÐí¹¥»÷ÕßÔÚÔÆ»·¾³ÖкáÏòÒÆ¶¯£¬Òѱ»ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÁÐΪ´¹Î£Ö¸ÁҪÇó·Ç¾üÊ»ú¹¹µ±¼´½¨²¹¡£


https://www.bleepingcomputer.com/news/security/canadas-house-of-commons-investigating-data-breach-after-cyberattack/


6. ŲÍþ²¼À×â¸ñ´ó°ÓÔâÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷


8ÔÂ14ÈÕ£¬Å²Íþ²¼À×â¸ñ´ó°ÓÓÚ2025Äê4ÔÂÔâ·êÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷£¬Æä¹Ø¼üÊý×Ö½ÚÔìϵͳ±»ÈëÇÖ£¬Á÷³ö·§Ãű»¶ñÒâ´ò¿ª£¬µ¼Ö³¬¹ý720ÍòÉý£¨190Íò¼ÓÂØ£©Ë®Á÷³ö¡£Õâ´ÎÊÂÎñ±»Å²Íþ¾¯Ô±°²È«¾Ö£¨PST£©ÊÓΪ¶íÂÞ˹¶Ô¹Ø¼ü»ù´¡ÉèʩԶ³Ì¹¥»÷ÄÜÁ¦µÄÌåÏÖ£¬µ«¸üÆ«²îÒò¶øÒ»´Î¡°ÄÜÁ¦Õ¹Ê¾¡±¶ø·ÇÄÚÈÝÐÔ·ÛËé¡£¾ÝPSTÕÆ¹ÜÈ˱´æ«ÌØ¡¤¸Ê¼Ó˹ÔÚ°¢Â×´ï¶ûËÕ¿¨È«¹úÂÛ̳ÉÏй©£¬ºÚ¿ÍÐÐΪµÄÖ÷±êÌâ±ê²¢·ÇÖ±½ÓÔì³ÉÎïÀíÇÖº¦£¬¶øÊÇͨ¹ý¹«¿ªÑÝʾ¼¼ÊõÄÜÁ¦Ê©¼ÓÉúÀíÓ°Ï죬ÔÚÃñ¶àÖÐÔì×÷Õð¾ªÓ벻ȷ¶¨ÐÔ¡£ÕâÒ»ÅжÏÓëŲÍþ¹ú¶ÈÐÌʵ÷²é¾Ö£¨Kripos£©µÄµ÷²é½áÂÛÒ»Ö£ººÚ¿ÍÔÚTelegramƽ̨°ä²¼ÁËÒ»¶ÎÈý·ÖÖÓÊÓÆµ£¬Õ¹Ê¾´ó°Ó½ÚÔìÃæ°å²Ù×÷½çÃæ£¬²¢´øÓÐÓëÇ×¶íÍøÂç·¸×ï×éÖ¯¹ØÁªµÄˮӡ¡£´ËÀàÐÐΪ´ËÇ°ÔøÓëSandworm (APT44) µÈ¹ú¶ÈÖ§³ÖµÄ×éÖ¯ÓйØ£¬±»ÓÃÓÚ¿ä´óÍþвÉêÃ÷£¬¼ÈÐßÈèÊܹ¥»÷·½£¬ÓÖÏòÎ÷·½´«µÝÍøÂçÕ½ÄÜÁ¦ÐźÅ¡£ÊÂÎñÖУ¬´ó°ÓÖÎÀíÔ±ºÄʱԼËÄÓ×ʱ²Å·¢ÏÖ·§ÃÅÒì³£²¢½¨¸´ÉèÖ㬵«Ð¹Â©ÒѶԲ¿ÃÅË®Á÷µ÷¿Ø²úÉúÓ°Ïì¡£Ö»¹ÜŲÍþÓë¶íÂÞ˹δ´¦ÓÚÖ±½ÓÕ½Õù״̬£¬µ«ÆÕ¾©ÕþȨÕýͨ¹ý»ìºÏÕ½Õù¼¿Á©Î¬³Ö¶ÔÎ÷·½µÄÑÏÖØÑ¹Á¦¡£


https://www.bleepingcomputer.com/news/security/pro-russian-hackers-blamed-for-water-dam-sabotage-in-norway/