Ðéα°æÈ¨ÉêÃ÷´ßÉúÐÂÐÍNoodlophileÇÔÈ¡·¨Ê½±äÖÖ

°ä²¼¹¦·ò 2025-08-20

1. Ðéα°æÈ¨ÉêÃ÷´ßÉúÐÂÐÍNoodlophileÇÔÈ¡·¨Ê½±äÖÖ


8ÔÂ18ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾Morphisec½üÈÕÅû¶һÖÖÐÂÐÍNoodlophile Stealer±äÖÖ £¬¸Ã¶ñÒâÈí¼þͨ¹ý¾«ÐÄÉè¼ÆµÄÐéα°æÈ¨ÇÖȨ´¹µöÓʼþ´«²¼ £¬½áºÏDropboxÁ´½ÓÓëDLL²àÔØ¼¼Êõ £¬¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢²¨Â޵ĺ£¹ú¶È¼°ÑÇÌ«µØÓòÆóÒµÌáÒ鶨Ïò¹¥»÷¡£×êÑÐÏÔʾ £¬¸Ã±äÖÖÒÑ´ÓÔçÆÚÀûÓÃÐéαAIƽ̨µÄ¹¥»÷¼¿Á©Éý¼¶Îª¸ü¸´ÔÓµÄÕ½Êõ×éºÏ¡£¹¥»÷Á÷³ÌʼÓڸ߶ȸöÐÔ»¯µÄÍøÂç´¹µöÓʼþ £¬¹¥»÷Õß¼Ù×°³É¹Ù·½°æÈ¨ÇÖȨ֪ͨ £¬Ñ¡È¡¶à˵»°±àд²¢Ô̺¬Ö¸±êÆóÒµFacebookÒ³ÃæµÄΨһIDµÈ¾ßÌåÐÅÏ¢ £¬ÓªÔì½ôÆÈ¸ÐÆÈʹÊÕ¼þÈ˵ã»÷"²é¿´Ö¤¾Ý"Á´½Ó¡£·ÖÆçÓÚ´«Í³´¹µö¹¥»÷ £¬¸Ã¶ñÒâÈí¼þͨ¹ýDropboxÁ´½ÓÌṩѹËõ°üÎļþ £¬ÄÚº¬±»´Û¸ÄµÄºÏ·¨ÀûÓ÷¨Ê½ £¬ÀûÓÃDLL²àÔØ¼¼ÊõÓÕÆ­ÊÜÐÅÀµÈí¼þÔÚÓû§²»ÖªÇéʱ¼ÓÔØ°µ²Ø¶ñÒâÎļþ¡£ÕâÖÖ¼¼Êõͨ¹ýºÏ·¨·¨Ê½Óë¶ñÒâDLLµÄ¹ØÁªÖ´ÐÐ £¬ÓÐÐ§ÈÆ¹ý°²È«¹¤¾ß¼ì²â £¬×îÖÕ¼ÓÔØµÄ¶ñÒâ´úÂ뻹½èÖúTelegramͨѶ½øÒ»²½¶ã±Ü¼à¿Ø¡£Ò»µ©Ï°È¾³É¹¦ £¬¸ÃÇÔÈ¡·¨Ê½½«³Áµã¹¥»÷ÍøÂçä¯ÀÀÆ÷ £¬ÇÔÈ¡µÇ¼ʹ´¦¡¢ÐÅÓþ¿¨ºÅ¡¢×Ô¶¯Ìî³äÐÅÏ¢¼°ÍÆËã»úϵͳÏêÇé¡£


https://hackread.com/phishing-scam-fake-copyright-notice-noodlophile-stealer/


2. USB¶ñÒâÈí¼þ»î¶¯ÔÚÈ«ÇòÁìÓòÄÚ´«²¼¼ÓÃÜÇ®±ÒÍÚ¿ó·¨Ê½


8ÔÂ18ÈÕ £¬CyberProofÍйܼì²âÓëÏìÓ¦£¨MDR£©ÍŶӽüÆÚ¸æ·¢Ò»Â·ÀûÓÃÊÜϰȾUSBÉ豸´«²¼µÄ¶à½×¶Î¶ñÒâÈí¼þ¹¥»÷ÊÂÎñ £¬Æä¼¼ÊõÊÖ·¨Óë2024Äê°¢Èû°Ý½®CERTÅû¶µÄ¡°Í¨ÓÃÍÚ¿ó¡±´òËã¸ß¶È¹ØÁª £¬Í¹ÏÔ¼ÓÃÜÇ®±ÒÍÚ¿óÍþвÔÚ2025ÄêµÄ³ÖÐøÑݱä¡£¸Ã¹¥»÷ͨ¹ý°µ²ØÓÚUSBÇý¶¯Æ÷µÄVisual Basic¾ç±¾Æô¶¯ £¬Ö´ÐкóŲÓÃxcopy.exeµÈ¹ý³Ì½«¶ñÒâÎļþ×ªÒÆÖÁWindows System32Ŀ¼ £¬²¢ÀûÓÃDLLËÑË÷°¤´Î½Ù³Ö¼¼Êõ²àÔØ¼ÓÃܿ󹤷¨Ê½¡£Ö»¹Ü×îÖÕ±»EDR¹¤¾ß×èÖ¹ £¬µ«ÆäÈÆ¹ý°²È«½ÚÔìµÄÕ½Êõ£¨Èç½áºÏPowerShell¾ç±¾£©ÈÔ¶³ö³ö´«Í³·ÀÓùϵͳµÄDZÔÚ·ì϶¡£×êÑÐÏÔʾ £¬Õâ´Î¹¥»÷ÓëÔçÆÚ»ùÓÚXMRigµÄZephyr»î¶¯´æÔÚ¼¼Êõ¹ØÁª £¬¹¥»÷Õßͨ¹ý»ìºÏ¾ç±¾ºÍ·Ö½×¶ÎÔØºÉ²¿Ê𠣬ÊÔͼÔÚÖÕ¶ËÉ豸ÉϳÉÁ¢Óƾû¯ÍÚ¿óÄÜÁ¦¡£CyberProofͨ¹ý¶àÔ´µý±¨×·×Ù·¢ÏÖ £¬¸Ã¶ñÒâÈí¼þÒÑÀ©É¢ÖÁÃÀ¹ú¡¢Å·ÖÞ¡¢¶«ÄÏÑǼ°·ÇÖÞ¶à¹ú £¬µØÀí¸²¸ÇÁìÓòÖ®¹ãÓ¡Ö¤ÁË¿ÉÒÆ¶¯½éÖÊÔÚÅÓë·¢Õ¹ÖеØÓò¾ù×÷Ϊ¹ÌÖ´´«²¼ÔØÌåµÄ½ü¿ö¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬¹¥»÷Á÷³ÌÖвàÔØµÄ¶ñÒâDLLÎļþרÃÅÕë¶Ô¹Ø¼üϵͳ¹ý³Ì£¨Èçlsass.exe£© £¬Ëäδֱ½ÓÇÔȡƾ֤ £¬µ«ÎªºóÐøÉý¼¶Îª¸ü¾ß·ÛËéÐԵķì϶ÀûÓÃÔ¤ÁôÁ˽ӿÚ¡£


https://www.infosecurity-magazine.com/news/usb-malware-spreads-cryptominer/


3. APT43ÀûÓÃXenoRAT¶ñÒâÈí¼þ¹¥»÷¶à¸öפº«´óʹ¹Ý


8ÔÂ18ÈÕ £¬Trellix×êÑÐÈËÔ±½üÈÕÅû¶һ·Óɹú¶ÈÖ§³ÖµÄ¼äµý»î¶¯ £¬¸ÃÐж¯×Ô2025Äê3ÔÂÆð³ÖÐøÕë¶Ôפº«¹ú±í½»Ê¹¹ÝÌáÒéÖÁÉÙ19´ÎÓã²æÊ½´¹µö¹¥»÷ £¬Æä»ù´¡ÉèÊ©Óë¹¥»÷ÊÖ·¨Ó볯ÏʺڿÍ×éÖ¯Kimsuky£¨APT43£©¸ß¶ÈÎǺÏ¡£Õâ´Î¹¥»÷ͨ¹ý¶ñÒâGitHub²Ö¿â·Ö·¢Ö°ÄÜ׳´óµÄXenoRATľÂí £¬Õ¹Ê¾³ö¸ß¶ÈÕë¶ÔÐÔµÄÕ½ÊõÑݱä¡£¹¥»÷·ÖΪÈý¸ö½×¶Î£º3Ô³õµÄ³õʼ̽²â½×¶ÎÒÔijÖÐÅ·¹ú¶Èʹ¹ÝΪָ±ê£»5ÔÂתÈ븴ÔÓ±í½»Ö÷Ìâ £¬Èç¼ÙÒâÅ·Ã˸߼¶¹ÙÔ±·¢ËÍ¡°5ÔÂ14ÈÕÅ·ÃË´ú±íÍÅÕþÖÎÕ÷ѯ»áÒ顱µÄÐéαԼÇ룻6ÖÁ7ÔÂÔò¾Û½¹ÃÀº«¾üÊÂͬÃËÒéÌâ £¬µö¶üÄÚÈÝÓëÕæÊµÊÂÎñ¹¦·òµã¸ß¶È·ûºÏ¡£Ö¸±ê¼¯ÖÐÓÚפÊ×¶ûµÄÅ·ÖÞʹ¹Ý £¬´¹µöÓʼþ¼Ù×°³É»áÒéÔ¼Çë¡¢¹Ù·½Ðź¯µÈ»î¶¯Í¨Öª £¬Ñ¡È¡¶àÓïÖÖ²¢Ã°ÓÃ±í½»¹ÙÃûÒå·¢ËÍ £¬³¡¾°»¯Éè¼ÆÏÔÖø¼ÓÇ¿¿ÉÐŶÈ¡£ËùÓй¥»÷¾ùѡȡͳһͶµÝ·½Ê½£ºÍ¨¹ýDropbox¡¢Google Drive»òº«¹ú±¾ÍÁÔÆ´æ´¢·þÎñ·¢ËÍÃÜÂë±£»¤µÄZIPѹËõÎļþ £¬ÄÚº¬¼Ù×°³ÉPDFµÄLNKÎļþ¡£Óû§´¥·¢ºó £¬Îļþ»áÖ´ÐлìºÏ´¦ÖõÄPowerShell´úÂë £¬´ÓGitHub»òDropbox»ñÈ¡XenoRATÓÐÐ§ÔØºÉ £¬²¢Í¨¹ý´òË㹤×÷ʵÏÖÏµÍ³ÓÆ¾Ã»¯×¤Áô¡£


https://www.bleepingcomputer.com/news/security/xenorat-malware-campaign-hits-multiple-embassies-in-south-korea/


4. ÃÀ¹úÔìÒ©ÆóÒµInotivÔâQilinÀÕË÷Èí¼þ¹¥»÷


8ÔÂ19ÈÕ £¬ÃÀ¹úÓ¡µÚ°²ÄÉÖݺÏͬ×êÑÐ×éÖ¯InotivÓÚ2025Äê8ÔÂ8ÈÕÅû¶һ·³Á´óÍøÂ簲ȫÊÂÎñ £¬Æä²¿ÃÅϵͳÓëÊý¾ÝÔâ"÷è÷ë"£¨Qilin£©ÀÕË÷Èí¼þÍÅ»ï¼ÓÃÜ £¬µ¼ÖÂÒµÎñÔËÓªÖжÏ¡£¸Ã¹«Ë¾×¨Ò»ÓÚÒ©Î↑·¢¡¢»îÌ嶯Îï×êÑн¨Ä£¼°°²È«ÆÀ¹À £¬Õ¼ÓÐÔ¼2000ÃûÔ±¹¤ £¬ÄêÊÕÈ볬5ÒÚÃÀÔª¡£Æ¾¾ÝInotivÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©Ìá½»µÄÎļþ £¬¹¥»÷²úÉúºó £¬¹«Ë¾µ±¼´Æô¶¯Ó¦¼±ÏìÓ¦ £¬½áºÏ±í²¿°²È«×¨¼Òµ÷²é²¢´«µÝ·¨Âɲ¿ÃÅ¡£³õ´ëÊ©²éÏÔʾ £¬ÍþвÐÐΪÕßδ¾­ÊÚȨ½Ó¼ûϵͳºóÖ´ÐмÓÃÜ £¬µ¼ÖÂÊý¾Ý¿â¡¢ÄÚ²¿ÀûÓ÷¨Ê½µÈ¹Ø¼üÉèÊ©ÎÞ·¨Õý³£Ê¹Óá£Îª»º½âÓ°Ïì £¬ITÍŶÓÒѽ«²¿ÃÅÊÜÓ°Ïì²Ù×÷ǨáãÖÁÀëÏß´úÌæ¹æ»® £¬µ«½ØÖÁÅû¶ʱ £¬ÏµÍ³¸´Ô­¹¦·òÈÔÎÞ·¨¹À¼Æ £¬ÒµÎñÖжÏÔ¤¼Æ³ÖÐøÒ»¶Î¹¦·ò¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬QilinÍÅ»ïÐû³ÆÇÔȡԼ16.2Íò¸öÎļþ£¨×ÜÁ¿´ï176GB£© £¬²¢ÔÚÆäйÃÜÍøÕ¾°ä²¼Êý¾ÝÑù±¾ £¬µ«InotivÉÐδȷÈÏÊý¾ÝÕæÊµÐÔ¡£


https://www.bleepingcomputer.com/news/security/pharma-firm-inotiv-says-ransomware-attack-impacted-operations/


5. ¼ÓÄôó½ðÈÚ¼à¹Ü»ú¹¹CIROÅû¶Êý¾Ýй¶ÊÂÎñ


8ÔÂ19ÈÕ £¬¼ÓÄôóͶ×ʼà¹Ü×éÖ¯£¨CIRO£©ÓÚ2025Äê8ÔÂ11ÈÕÅû¶һ·³Á´óÍøÂ簲ȫÊÂÎñ £¬Æä²¿ÃÅ»áÔ±¹«Ë¾¼°×¢²áÔ±¹¤µÄÓ×ÎÒÐÅÏ¢Ôâδ¾­ÊÚȨ½Ó¼û¡£×÷Ϊ2023Äê³ÉÁ¢µÄÈ«¹úÐÔ×ÔÂÉ×éÖ¯ £¬CIROÕÆ¹Ü¼à¹Ü¼ÓÄôóͶ×ÊÂòÂôÉÌ¡¢¹²Í¬»ù½ðÂòÂôÉ̼°Õ®Îñ/¹ÉƱÊг¡»î¶¯ £¬²¢Õ¼ÓжԲ»ºÏ¹æÊµÌå´¦ÒÔ·£¿îµÈ´¦·£µÄÈ¨ÊÆ¡£Õâ´ÎÊÂÎñÒý·¢¶Ô½ðÈÚ¼à¹Ü»ú¹¹Êý¾Ý°²È«ÄÜÁ¦µÄ¹Ø×¢¡£ÊÂÎñ²úÉúºó £¬CIROѸ¿ì¹Ø¹ØÊÜÓ°ÏìϵͳÒÔÈ·±£°²È« £¬²¢½áºÏ±í²¿ÍøÂ簲ȫר¼Ò¼°·¨Âɲ¿ÃÅ·¢Õ¹µ÷²é¡£³õ´ëÊ©²éÈ·ÈÏ £¬ÍþвÐÐΪÕß»ñÈ¡Á˲¿ÃÅ»áÔ±¹«Ë¾¼°ÆäÔ±¹¤µÄÓ×ÎÒÐÅÏ¢ £¬µ«¾ßÌåй¶Êý¾ÝµÄÐÔÖÊÈçÐÕÃû¡¢ÁªÏµ·½Ê½¡¢²ÆÕþÐÅÏ¢µÈÉÐδ¹«¿ª¡£CIROÔÚ8ÔÂ18ÈÕµÄÐÂΟåÖÐÇ¿µ÷ £¬Ö»¹ÜÊÂÎñÒý·¢ÓÇÓô £¬µ«ÆäÖ÷ÌâÖ°ÄÜÈçʵʱ¹ÉƱÊг¡¼à¹ÜδÊÜÓ°Ïì £¬Í¶×ÊÕßͶ×ʻÎÞ·çÏÕ¡£ÎªÓ¦¶ÔDZÔÚÓ°Ïì £¬CIRO³Ðŵ½«Ö±½Ó֪ͨÊÜÓ°ÏìÓ×ÎÒ £¬²¢Ìṩ·çÏÕ»º½â·þÎñ¡£Í¬Ê± £¬¸Ã»ú¹¹ÖÒ¸æÆä³ÉÔ±¾¯ÌèÒÔ¼à¹Ü»ú¹¹ÃûÒåË÷È¡Ó×ÎÒ»ò²ÆÕþÐÅÏ¢µÄ´¹µöµç»°¼°Óʼþ £¬Ô¤·À¶þ´Î¹¥»÷¡£


https://www.infosecurity-magazine.com/news/canadian-financial-regulator-hacked/


6. °²ÁªÈËÊÙ´ó¹æÄ£Êý¾Ýй¶ӰÏì110ÍòÈË


8ÔÂ19ÈÕ £¬2025Äê7Ô £¬È«Çò³ÛÃûÀÕË÷×éÖ¯ShinyHuntersͨ¹ýÕë¶ÔSalesforceƽ̨µÄ¶ñÒâOAuthÀûÓù¥»÷ £¬Òý·¢¶àÆð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ £¬Ó°ÏìÁìÓòº­¸Ç±£ÏÕ¡¢¿Æ¼¼¡¢ÁãÊÛ¡¢ÉÝ³ÞÆ·µÈÁìÓò¡£Õâ´Î¹¥»÷Á´ÖÐ £¬ÃÀ¹ú±£ÏÕ¾ÞÍ·°²ÁªÈËÊÙ£¨Allianz Life£©³ÉΪ½¹µã £¬Æä110Íò¿Í»§Ó×ÎÒÐÅÏ¢ÔâÇÔ £¬ÊÂÎñ¶³ö³öµÚÈý·½ÔÆ·þÎñ°²È«·ì϶µÄÑϳÁ·çÏÕ¡£Æ¾¾ÝÅû¶ £¬7ÔÂ16ÈÕ £¬¹¥»÷Õßͨ¹ýÓÕÆ­°²ÁªÈËÊÙÔ±¹¤½«¶ñÒâOAuthÀûÓÃÁ´½Ó´ó¹«Ë¾SalesforceÊ·ý £¬³É¹¦½Ó¼ûµÚÈý·½ÔÆCRMϵͳ²¢ÏÂÔØÊý¾Ý¿â¡£Ð¹Â¶Êý¾ÝÔ̺¬¿Í»§µç×ÓÓʼþ¡¢ÐÕÃû¡¢ÐԱ𡢵®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¼°ÏÖʵµØÖ·µÈÃô¸ÐÐÅÏ¢ £¬²¿ÃŰ²ÁªÔ±¹¤Ò²Êܲ¨¼°¡£Ö»¹Ü°²ÁªÎ´¹«¿ª±»ÈëÇÖµÄÔÆCRMÌṩÉÌÃû³Æ £¬µ«BleepingComputerÈ·ÈÏÕâ´Î¹¥»÷ÓëShinyHuntersÖ±½ÓÓйØ £¬¸Ã×éÖ¯ËæºóÔÚйÃÜÍøÕ¾°ä²¼Ô¼280ÍòÌõÀ´×Ô°²Áª¼°ÆäËûÆóÒµµÄÊý¾Ý¼Í¼ £¬Ô̺¬²Æ¸»ÖÎÀí¹«Ë¾¡¢²ÆÕþÕÕ·÷µÈºÏ×÷ͬ°éÐÅÏ¢¡£Êý¾Ýй¶֪ͨ·þÎñHave I Been PwnedµÄ»ã±¨½øÒ»²½Ö¤ÊµÁËÊÂÎñµÄÑϳÁÐÔ £¬110Íò°²Áª¿Í»§ÐÅÏ¢ÒÑÁ÷Èë°µÅÌ £¬²¿ÃÅÊܺ¦Õß·´À¡Ð¹Â¶ÎļþÖеÄ˰ºÅ¡¢µç»°ºÅÂëµÈÊý¾ÝÕýÈ·ÎÞÎó¡£


https://www.bleepingcomputer.com/news/security/massive-allianz-life-data-breach-impacts-11-million-people/