Ðéα°æÈ¨ÉêÃ÷´ßÉúÐÂÐÍNoodlophileÇÔÈ¡·¨Ê½±äÖÖ
°ä²¼¹¦·ò 2025-08-201. Ðéα°æÈ¨ÉêÃ÷´ßÉúÐÂÐÍNoodlophileÇÔÈ¡·¨Ê½±äÖÖ
8ÔÂ18ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Morphisec½üÈÕÅû¶һÖÖÐÂÐÍNoodlophile Stealer±äÖÖ£¬¸Ã¶ñÒâÈí¼þͨ¹ý¾«ÐÄÉè¼ÆµÄÐéα°æÈ¨ÇÖȨ´¹µöÓʼþ´«²¼£¬½áºÏDropboxÁ´½ÓÓëDLL²àÔØ¼¼Êõ£¬¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢²¨Â޵ĺ£¹ú¶È¼°ÑÇÌ«µØÓòÆóÒµÌáÒ鶨Ïò¹¥»÷¡£×êÑÐÏÔʾ£¬¸Ã±äÖÖÒÑ´ÓÔçÆÚÀûÓÃÐéαAIƽ̨µÄ¹¥»÷¼¿Á©Éý¼¶Îª¸ü¸´ÔÓµÄÕ½Êõ×éºÏ¡£¹¥»÷Á÷³ÌʼÓڸ߶ȸöÐÔ»¯µÄÍøÂç´¹µöÓʼþ£¬¹¥»÷Õß¼Ù×°³É¹Ù·½°æÈ¨ÇÖȨ֪ͨ£¬Ñ¡È¡¶à˵»°±àд²¢Ô̺¬Ö¸±êÆóÒµFacebookÒ³ÃæµÄΨһIDµÈ¾ßÌåÐÅÏ¢£¬ÓªÔì½ôÆÈ¸ÐÆÈʹÊÕ¼þÈ˵ã»÷"²é¿´Ö¤¾Ý"Á´½Ó¡£·ÖÆçÓÚ´«Í³´¹µö¹¥»÷£¬¸Ã¶ñÒâÈí¼þͨ¹ýDropboxÁ´½ÓÌṩѹËõ°üÎļþ£¬ÄÚº¬±»´Û¸ÄµÄºÏ·¨ÀûÓ÷¨Ê½£¬ÀûÓÃDLL²àÔØ¼¼ÊõÓÕÆÊÜÐÅÀµÈí¼þÔÚÓû§²»ÖªÇéʱ¼ÓÔØ°µ²Ø¶ñÒâÎļþ¡£ÕâÖÖ¼¼Êõͨ¹ýºÏ·¨·¨Ê½Óë¶ñÒâDLLµÄ¹ØÁªÖ´ÐУ¬ÓÐÐ§ÈÆ¹ý°²È«¹¤¾ß¼ì²â£¬×îÖÕ¼ÓÔØµÄ¶ñÒâ´úÂ뻹½èÖúTelegramͨѶ½øÒ»²½¶ã±Ü¼à¿Ø¡£Ò»µ©Ï°È¾³É¹¦£¬¸ÃÇÔÈ¡·¨Ê½½«³Áµã¹¥»÷ÍøÂçä¯ÀÀÆ÷£¬ÇÔÈ¡µÇ¼ʹ´¦¡¢ÐÅÓþ¿¨ºÅ¡¢×Ô¶¯Ìî³äÐÅÏ¢¼°ÍÆËã»úϵͳÏêÇé¡£
https://hackread.com/phishing-scam-fake-copyright-notice-noodlophile-stealer/
2. USB¶ñÒâÈí¼þ»î¶¯ÔÚÈ«ÇòÁìÓòÄÚ´«²¼¼ÓÃÜÇ®±ÒÍÚ¿ó·¨Ê½
8ÔÂ18ÈÕ£¬CyberProofÍйܼì²âÓëÏìÓ¦£¨MDR£©ÍŶӽüÆÚ¸æ·¢Ò»Â·ÀûÓÃÊÜϰȾUSBÉ豸´«²¼µÄ¶à½×¶Î¶ñÒâÈí¼þ¹¥»÷ÊÂÎñ£¬Æä¼¼ÊõÊÖ·¨Óë2024Äê°¢Èû°Ý½®CERTÅû¶µÄ¡°Í¨ÓÃÍÚ¿ó¡±´òËã¸ß¶È¹ØÁª£¬Í¹ÏÔ¼ÓÃÜÇ®±ÒÍÚ¿óÍþвÔÚ2025ÄêµÄ³ÖÐøÑݱ䡣¸Ã¹¥»÷ͨ¹ý°µ²ØÓÚUSBÇý¶¯Æ÷µÄVisual Basic¾ç±¾Æô¶¯£¬Ö´ÐкóŲÓÃxcopy.exeµÈ¹ý³Ì½«¶ñÒâÎļþ×ªÒÆÖÁWindows System32Ŀ¼£¬²¢ÀûÓÃDLLËÑË÷°¤´Î½Ù³Ö¼¼Êõ²àÔØ¼ÓÃܿ󹤷¨Ê½¡£Ö»¹Ü×îÖÕ±»EDR¹¤¾ß×èÖ¹£¬µ«ÆäÈÆ¹ý°²È«½ÚÔìµÄÕ½Êõ£¨Èç½áºÏPowerShell¾ç±¾£©ÈÔ¶³ö³ö´«Í³·ÀÓùϵͳµÄDZÔÚ·ì϶¡£×êÑÐÏÔʾ£¬Õâ´Î¹¥»÷ÓëÔçÆÚ»ùÓÚXMRigµÄZephyr»î¶¯´æÔÚ¼¼Êõ¹ØÁª£¬¹¥»÷Õßͨ¹ý»ìºÏ¾ç±¾ºÍ·Ö½×¶ÎÔØºÉ²¿Êð£¬ÊÔͼÔÚÖÕ¶ËÉ豸ÉϳÉÁ¢Óƾû¯ÍÚ¿óÄÜÁ¦¡£CyberProofͨ¹ý¶àÔ´µý±¨×·×Ù·¢ÏÖ£¬¸Ã¶ñÒâÈí¼þÒÑÀ©É¢ÖÁÃÀ¹ú¡¢Å·ÖÞ¡¢¶«ÄÏÑǼ°·ÇÖÞ¶à¹ú£¬µØÀí¸²¸ÇÁìÓòÖ®¹ãÓ¡Ö¤ÁË¿ÉÒÆ¶¯½éÖÊÔÚÅÓë·¢Õ¹ÖеØÓò¾ù×÷Ϊ¹ÌÖ´´«²¼ÔØÌåµÄ½ü¿ö¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬¹¥»÷Á÷³ÌÖвàÔØµÄ¶ñÒâDLLÎļþרÃÅÕë¶Ô¹Ø¼üϵͳ¹ý³Ì£¨Èçlsass.exe£©£¬Ëäδֱ½ÓÇÔȡƾ֤£¬µ«ÎªºóÐøÉý¼¶Îª¸ü¾ß·ÛËéÐԵķì϶ÀûÓÃÔ¤ÁôÁ˽ӿڡ£
https://www.infosecurity-magazine.com/news/usb-malware-spreads-cryptominer/
3. APT43ÀûÓÃXenoRAT¶ñÒâÈí¼þ¹¥»÷¶à¸öפº«´óʹ¹Ý
8ÔÂ18ÈÕ£¬Trellix×êÑÐÈËÔ±½üÈÕÅû¶һ·Óɹú¶ÈÖ§³ÖµÄ¼äµý»î¶¯£¬¸ÃÐж¯×Ô2025Äê3ÔÂÆð³ÖÐøÕë¶Ôפº«¹ú±í½»Ê¹¹ÝÌáÒéÖÁÉÙ19´ÎÓã²æÊ½´¹µö¹¥»÷£¬Æä»ù´¡ÉèÊ©Óë¹¥»÷ÊÖ·¨Ó볯ÏʺڿÍ×éÖ¯Kimsuky£¨APT43£©¸ß¶ÈÎǺϡ£Õâ´Î¹¥»÷ͨ¹ý¶ñÒâGitHub²Ö¿â·Ö·¢Ö°ÄÜ׳´óµÄXenoRATľÂí£¬Õ¹Ê¾³ö¸ß¶ÈÕë¶ÔÐÔµÄÕ½ÊõÑݱ䡣¹¥»÷·ÖΪÈý¸ö½×¶Î£º3Ô³õµÄ³õʼ̽²â½×¶ÎÒÔijÖÐÅ·¹ú¶Èʹ¹ÝΪָ±ê£»5ÔÂתÈ븴ÔÓ±í½»Ö÷Ì⣬Èç¼ÙÒâÅ·Ã˸߼¶¹ÙÔ±·¢ËÍ¡°5ÔÂ14ÈÕÅ·ÃË´ú±íÍÅÕþÖÎÕ÷ѯ»áÒ顱µÄÐéαԼÇ룻6ÖÁ7ÔÂÔò¾Û½¹ÃÀº«¾üÊÂͬÃËÒéÌ⣬µö¶üÄÚÈÝÓëÕæÊµÊÂÎñ¹¦·òµã¸ß¶È·ûºÏ¡£Ö¸±ê¼¯ÖÐÓÚפÊ×¶ûµÄÅ·ÖÞʹ¹Ý£¬´¹µöÓʼþ¼Ù×°³É»áÒéÔ¼Çë¡¢¹Ù·½Ðź¯µÈ»î¶¯Í¨Öª£¬Ñ¡È¡¶àÓïÖÖ²¢Ã°ÓÃ±í½»¹ÙÃûÒå·¢ËÍ£¬³¡¾°»¯Éè¼ÆÏÔÖø¼ÓÇ¿¿ÉÐŶȡ£ËùÓй¥»÷¾ùѡȡͳһͶµÝ·½Ê½£ºÍ¨¹ýDropbox¡¢Google Drive»òº«¹ú±¾ÍÁÔÆ´æ´¢·þÎñ·¢ËÍÃÜÂë±£»¤µÄZIPѹËõÎļþ£¬ÄÚº¬¼Ù×°³ÉPDFµÄLNKÎļþ¡£Óû§´¥·¢ºó£¬Îļþ»áÖ´ÐлìºÏ´¦ÖõÄPowerShell´úÂ룬´ÓGitHub»òDropbox»ñÈ¡XenoRATÓÐÐ§ÔØºÉ£¬²¢Í¨¹ý´òË㹤×÷ʵÏÖÏµÍ³ÓÆ¾Ã»¯×¤Áô¡£
https://www.bleepingcomputer.com/news/security/xenorat-malware-campaign-hits-multiple-embassies-in-south-korea/
4. ÃÀ¹úÔìÒ©ÆóÒµInotivÔâQilinÀÕË÷Èí¼þ¹¥»÷
8ÔÂ19ÈÕ£¬ÃÀ¹úÓ¡µÚ°²ÄÉÖݺÏͬ×êÑÐ×éÖ¯InotivÓÚ2025Äê8ÔÂ8ÈÕÅû¶һ·³Á´óÍøÂ簲ȫÊÂÎñ£¬Æä²¿ÃÅϵͳÓëÊý¾ÝÔâ"÷è÷ë"£¨Qilin£©ÀÕË÷Èí¼þÍÅ»ï¼ÓÃÜ£¬µ¼ÖÂÒµÎñÔËÓªÖжϡ£¸Ã¹«Ë¾×¨Ò»ÓÚÒ©Î↑·¢¡¢»îÌ嶯Îï×êÑн¨Ä£¼°°²È«ÆÀ¹À£¬Õ¼ÓÐÔ¼2000ÃûÔ±¹¤£¬ÄêÊÕÈ볬5ÒÚÃÀÔª¡£Æ¾¾ÝInotivÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©Ìá½»µÄÎļþ£¬¹¥»÷²úÉúºó£¬¹«Ë¾µ±¼´Æô¶¯Ó¦¼±ÏìÓ¦£¬½áºÏ±í²¿°²È«×¨¼Òµ÷²é²¢´«µÝ·¨Âɲ¿ÃÅ¡£³õ´ëÊ©²éÏÔʾ£¬ÍþвÐÐΪÕßδ¾ÊÚȨ½Ó¼ûϵͳºóÖ´ÐмÓÃÜ£¬µ¼ÖÂÊý¾Ý¿â¡¢ÄÚ²¿ÀûÓ÷¨Ê½µÈ¹Ø¼üÉèÊ©ÎÞ·¨Õý³£Ê¹Óá£Îª»º½âÓ°Ï죬ITÍŶÓÒѽ«²¿ÃÅÊÜÓ°Ïì²Ù×÷ǨáãÖÁÀëÏß´úÌæ¹æ»®£¬µ«½ØÖÁÅû¶ʱ£¬ÏµÍ³¸´Ô¹¦·òÈÔÎÞ·¨¹À¼Æ£¬ÒµÎñÖжÏÔ¤¼Æ³ÖÐøÒ»¶Î¹¦·ò¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬QilinÍÅ»ïÐû³ÆÇÔȡԼ16.2Íò¸öÎļþ£¨×ÜÁ¿´ï176GB£©£¬²¢ÔÚÆäйÃÜÍøÕ¾°ä²¼Êý¾ÝÑù±¾£¬µ«InotivÉÐδȷÈÏÊý¾ÝÕæÊµÐÔ¡£
https://www.bleepingcomputer.com/news/security/pharma-firm-inotiv-says-ransomware-attack-impacted-operations/
5. ¼ÓÄôó½ðÈÚ¼à¹Ü»ú¹¹CIROÅû¶Êý¾Ýй¶ÊÂÎñ
8ÔÂ19ÈÕ£¬¼ÓÄôóͶ×ʼà¹Ü×éÖ¯£¨CIRO£©ÓÚ2025Äê8ÔÂ11ÈÕÅû¶һ·³Á´óÍøÂ簲ȫÊÂÎñ£¬Æä²¿ÃÅ»áÔ±¹«Ë¾¼°×¢²áÔ±¹¤µÄÓ×ÎÒÐÅÏ¢Ôâδ¾ÊÚȨ½Ó¼û¡£×÷Ϊ2023Äê³ÉÁ¢µÄÈ«¹úÐÔ×ÔÂÉ×éÖ¯£¬CIROÕÆ¹Ü¼à¹Ü¼ÓÄôóͶ×ÊÂòÂôÉÌ¡¢¹²Í¬»ù½ðÂòÂôÉ̼°Õ®Îñ/¹ÉƱÊг¡»î¶¯£¬²¢Õ¼ÓжԲ»ºÏ¹æÊµÌå´¦ÒÔ·£¿îµÈ´¦·£µÄÈ¨ÊÆ¡£Õâ´ÎÊÂÎñÒý·¢¶Ô½ðÈÚ¼à¹Ü»ú¹¹Êý¾Ý°²È«ÄÜÁ¦µÄ¹Ø×¢¡£ÊÂÎñ²úÉúºó£¬CIROѸ¿ì¹Ø¹ØÊÜÓ°ÏìϵͳÒÔÈ·±£°²È«£¬²¢½áºÏ±í²¿ÍøÂ簲ȫר¼Ò¼°·¨Âɲ¿ÃÅ·¢Õ¹µ÷²é¡£³õ´ëÊ©²éÈ·ÈÏ£¬ÍþвÐÐΪÕß»ñÈ¡Á˲¿ÃÅ»áÔ±¹«Ë¾¼°ÆäÔ±¹¤µÄÓ×ÎÒÐÅÏ¢£¬µ«¾ßÌåй¶Êý¾ÝµÄÐÔÖÊÈçÐÕÃû¡¢ÁªÏµ·½Ê½¡¢²ÆÕþÐÅÏ¢µÈÉÐδ¹«¿ª¡£CIROÔÚ8ÔÂ18ÈÕµÄÐÂΟåÖÐÇ¿µ÷£¬Ö»¹ÜÊÂÎñÒý·¢ÓÇÓô£¬µ«ÆäÖ÷ÌâÖ°ÄÜÈçʵʱ¹ÉƱÊг¡¼à¹ÜδÊÜÓ°Ï죬Ͷ×ÊÕßͶ×ʻÎÞ·çÏÕ¡£ÎªÓ¦¶ÔDZÔÚÓ°Ï죬CIRO³Ðŵ½«Ö±½Ó֪ͨÊÜÓ°ÏìÓ×ÎÒ£¬²¢Ìṩ·çÏÕ»º½â·þÎñ¡£Í¬Ê±£¬¸Ã»ú¹¹ÖÒ¸æÆä³ÉÔ±¾¯ÌèÒÔ¼à¹Ü»ú¹¹ÃûÒåË÷È¡Ó×ÎÒ»ò²ÆÕþÐÅÏ¢µÄ´¹µöµç»°¼°Óʼþ£¬Ô¤·À¶þ´Î¹¥»÷¡£
https://www.infosecurity-magazine.com/news/canadian-financial-regulator-hacked/
6. °²ÁªÈËÊÙ´ó¹æÄ£Êý¾Ýй¶ӰÏì110ÍòÈË
8ÔÂ19ÈÕ£¬2025Äê7Ô£¬È«Çò³ÛÃûÀÕË÷×éÖ¯ShinyHuntersͨ¹ýÕë¶ÔSalesforceƽ̨µÄ¶ñÒâOAuthÀûÓù¥»÷£¬Òý·¢¶àÆð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÁìÓòº¸Ç±£ÏÕ¡¢¿Æ¼¼¡¢ÁãÊÛ¡¢ÉÝ³ÞÆ·µÈÁìÓò¡£Õâ´Î¹¥»÷Á´ÖУ¬ÃÀ¹ú±£ÏÕ¾ÞÍ·°²ÁªÈËÊÙ£¨Allianz Life£©³ÉΪ½¹µã£¬Æä110Íò¿Í»§Ó×ÎÒÐÅÏ¢ÔâÇÔ£¬ÊÂÎñ¶³ö³öµÚÈý·½ÔÆ·þÎñ°²È«·ì϶µÄÑϳÁ·çÏÕ¡£Æ¾¾ÝÅû¶£¬7ÔÂ16ÈÕ£¬¹¥»÷Õßͨ¹ýÓÕÆ°²ÁªÈËÊÙÔ±¹¤½«¶ñÒâOAuthÀûÓÃÁ´½Ó´ó¹«Ë¾SalesforceÊ·ý£¬³É¹¦½Ó¼ûµÚÈý·½ÔÆCRMϵͳ²¢ÏÂÔØÊý¾Ý¿â¡£Ð¹Â¶Êý¾ÝÔ̺¬¿Í»§µç×ÓÓʼþ¡¢ÐÕÃû¡¢ÐԱ𡢵®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¼°ÏÖʵµØÖ·µÈÃô¸ÐÐÅÏ¢£¬²¿ÃŰ²ÁªÔ±¹¤Ò²Êܲ¨¼°¡£Ö»¹Ü°²ÁªÎ´¹«¿ª±»ÈëÇÖµÄÔÆCRMÌṩÉÌÃû³Æ£¬µ«BleepingComputerÈ·ÈÏÕâ´Î¹¥»÷ÓëShinyHuntersÖ±½ÓÓйأ¬¸Ã×éÖ¯ËæºóÔÚйÃÜÍøÕ¾°ä²¼Ô¼280ÍòÌõÀ´×Ô°²Áª¼°ÆäËûÆóÒµµÄÊý¾Ý¼Í¼£¬Ô̺¬²Æ¸»ÖÎÀí¹«Ë¾¡¢²ÆÕþÕÕ·÷µÈºÏ×÷ͬ°éÐÅÏ¢¡£Êý¾Ýй¶֪ͨ·þÎñHave I Been PwnedµÄ»ã±¨½øÒ»²½Ö¤ÊµÁËÊÂÎñµÄÑϳÁÐÔ£¬110Íò°²Áª¿Í»§ÐÅÏ¢ÒÑÁ÷Èë°µÅÌ£¬²¿ÃÅÊܺ¦Õß·´À¡Ð¹Â¶ÎļþÖеÄ˰ºÅ¡¢µç»°ºÅÂëµÈÊý¾ÝÕýÈ·ÎÞÎó¡£
https://www.bleepingcomputer.com/news/security/massive-allianz-life-data-breach-impacts-11-million-people/


¾©¹«Íø°²±¸11010802024551ºÅ