STAC6565¹¥»÷¼ÓÄô󣬲¿ÊðQWCryptÀÕË÷Èí¼þ

°ä²¼¹¦·ò 2025-12-12

1. STAC6565¹¥»÷¼ÓÄô󣬲¿ÊðQWCryptÀÕË÷Èí¼þ


12ÔÂ9ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Sophosµ÷²é·¢ÏÖ£¬2024Äê2ÔÂÖÁ2025Äê8ÔÂÆÚ¼ä£¬¼ÓÄôó×éÖ¯³ÉΪSTAC6565Íþв¼¯Èº²ß¶¯µÄÕë¶ÔÐÔÍøÂç¹¥»÷Ö÷ÌâÖ¸±ê£¬½ü80%µÄ¹¥»÷Ö¸Ïò¸Ã¹úʵÌå¡£¸Ã×éÖ¯ÓëGold Blade£¨±ðºÅEarth Kapre¡¢RedCurl¡¢Red Wolf£©¸ß¶È¹ØÁª£¬×Ô2018Äêµ×Æð´Ó¶íÂÞ˹ʵÌåÀ©´óÖÁ¼ÓÄôó¡¢ÃÀ¹ú¡¢µÂ¹úµÈ¶à¹úÖ¸±ê£¬ÐγÉ"ºÚ¿Í¹ÍÓ¶±ø"ÔË×÷ģʽ£¬ÒÔóÒ×¼äµý»î¶¯Îª»ù´¡£¬ÈÚºÏÊý¾Ý͵ÇÔÓëÑ¡ÔñÐÔÀÕË÷Èí¼þ²¿Êð¡£¹¥»÷Á´Ê¼ÓÚÕë¶ÔÈËÁ¦×ÊÔ´²¿ÃŵÄÓã²æÊ½ÍøÂç´¹µö£¬ÀûÓÃIndeed¡¢JazzHRµÈÇóְƽ̨ÉÏ´«¼Ù×°³É¼òÀúµÄ¶ñÒâÎĵµ¡£2025Äê7ÔÂбäÖÖѡȡZIP´æµµ+¿ì½Ý·½Ê½Îļþ£¬Í¨¹ýrundll32.exe´ÓCloudflare WorkersÓòÃûºóµÄWebDAV·þÎñÆ÷»ñÈ¡¶ñÒâ×é¼þ£¬×îÖÕ¼ÓÔØRedLoader DLLÖ´Ðжà½×¶Î¹¥»÷¡£¸Ã¹¤¾ßÁ´ÒÀÀµÎ¢Èí·¨Ê½¼æÈÝÐÔ¸±ÊÖÖ´ÐÐÓÐÐ§ÔØºÉ£¬ÍøÂçActive Directory»·¾³ÐÅÏ¢£¬²¢ÀûÓÃZemana AntiMalwareÇý¶¯Èƹý·À²¡¶¾Èí¼þ¡£ÍþвÐÐΪÕß±øÆ÷¿âÔ̺¬¶¨Ôì¶ñÒâÈí¼þQWCrypt¡¢¿ªÔ´·´Ïò´úÀí¹¤¾ßRPivot¼°Chisel SOCKS5¡£¹¥»÷Õßͨ¹ýSMB¹²Ïí·Ö·¢³Á¶¨Ãû×é¼þ£¬ÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒÆ¶¯£¬×îÖÕ²¿ÊðÀÕË÷Èí¼þ¡£


https://thehackernews.com/2025/12/stac6565-targets-canada-in-80-of.html


2. ËÕµ¤°ÍµÂ¶ûº½¿ÕÔâºÚ¿ÍÈëÇÖÖÂÃô¸ÐÊý¾Ýй¶


12ÔÂ10ÈÕ£¬½üÈÕ£¬Ò»ÃûºÚ¿ÍÔÚÍøÂç·¸×ïÂÛ̳Ðû³ÆÒÑÈëÇÖËÕµ¤°ÍµÂ¶ûº½¿Õ¹«Ë¾£¬Ð¹Â¶Æä2.21GBÄÚ²¿Ãô¸ÐÊý¾Ý£¬Ô̺¬2025Äê6ÔÂÖÁ7ÔÂÆÚ¼äµÄ·ÉÐе÷¶ÈÊֲᡢ°²È«´òËãÊֲᡢ°²È«ÖÎÀíϵͳÊֲᡢ×îµÍÉ豸Çåµ¥¡¢µØÃæ²Ù×÷Êֲἰ¬Íú´ï»ù¼ÓÀûÕ¾µãÈËÔ±ÐÅÏ¢µÈ¡£ÕâЩÎļþ¾ßÌ庭¸Ç²¨Òô737¼¼Êõ¹æ³Ì¡¢°²È«¼Ü¹¹¡¢»ú¶ÓÊý¾Ý¼°Ô±¹¤ÁªÏµ·½Ê½£¬¹¥»÷ÕßÕýÒÔ¼ÓÃÜÇ®±Ò¶µÏúÊý¾Ý£¬²¢¸½ÉϺ½°àµ÷¶ÈÊÖ²á½ØÍ¼×ôÖ¤¡£ÈôÊý¾ÝÊôʵ£¬CybernewsÍŶÓÖÒ¸æ¿ÉÄÜÒý·¢Éç»á¹¤³Ì¹¥»÷¼¤Ôö¼°²Ù×÷¹æ³Ìй¶·çÏÕ£¬ÎªºóÐøÀÕË÷´´ÔìǰÌá¡£°ÍµÂ¶ûº½¿Õ×÷ΪËÕµ¤ÎªÊý²»¶àµÄÃñÓú½¿ÕÔËÓªÉÌÖ®Ò»£¬³ÉÁ¢ÓÚ2004Ä꣬×ܲ¿Î»ÓÚ¿¦ÍÁÄ£¬Ìṩ¹úÄÚ/ÇøÓò¿ÍÔË¡¢»õÔ˼°VIP°ü»ú·þÎñ£¬ÄêÊÕÈë´ï5600ÍòÃÀÔª¡£Ö»¹ÜËÕµ¤ÒòÕ½ÂÒµ¼ÖÂÃñº½»ù´¡ÉèÊ©¼¸½ü±ÀÀ££¬¸Ã¹«Ë¾ÈÔά³ÖÔËÓª²¢³Ðµ£ÈË·Ö÷ÒåÔöÔ®¹¤×÷¡£Ä¿Ç°£¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Êý¾Ýй¶ÖÃÆÀÒªÇó¡£


https://cybernews.com/security/badr-airlines-data-breach-sudan/


3. Cybernews¸æ·¢43Òڱʼͼй¶ÊÂÎñ


12ÔÂ10ÈÕ£¬Cybernews×êÑÐÍŶÓ11Ô·¢ÏÖÒ»¸öδÉè·À»¤µÄMongoDBÊý¾Ý¿âÊ·ý£¬ÆäÖд洢16.14Ì«×Ö½Ú¡¢½ü43ÒÚ·ÝÎĵµ£¬Ô̺¬À´×ÔÁìÓ¢µÄÖ°Òµ¼°ÆóÒµµý±¨Êý¾Ý£¬ÈçÈ«Ãû¡¢ÓÊÏä¡¢µç»°¡¢Ö°Î»¡¢½ÌÓý²¼¾°¡¢É罻ýÌåÕ˺ŵÈÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÒÔ¼°ÆóÒµ¹ØÁª¹ØÏµ¡¢Ö°Òµ¾­ÀúµÈ¡£¸ÃÊý¾Ý¿âÓÉÍøÂ簲ȫ×êÑÐÔ±±«²ª¡¤µÏÑÇÇÙ¿ÆÓÚ11ÔÂ23ÈÕ·¢ÏÖ£¬Á½ÌìºóËùÓÐÕßʵÏÖ°²È«¼Ó¹Ì£¬µ«Â¶³öʱ³¤Î´Öª£¬¹¥»÷Õß¿ÉÄÜÔçÒÑÀûÓá£Êý¾Ý¿âÔ̺¬9¸öÊý¾Ý¼¯ÖУ¬ÆäÖÓ×°profiles¡±¡°unique_profiles¡±¡°people¡±Èý¸ö¼¯Öк¬½ü20ÒÚÌõPII¼Í¼£¬º¬ÁìÓ¢ÍøÖ·¡¢Ó×ÎÒÖ÷Ò³Õ˺𢵨ÀíµØÎ»¡¢¼¼ÊõµÈ×ֶΣ¬²¿ÃżÍ¼Ô̺¬Ó×ÎÒÕÕÆ¬¼°ÓÊÏä¿ÉÐÅ¶ÈÆÀ·Ö¡£Êý¾Ý½á¹¹ÏÔʾÐÅÏ¢Ô´ÓÚ×Ô¶¯»¯ÅÀÈ¡£¬¿ÉÄÜÕûºÏ×ÔÏúÊÛµý±¨¹¤¾ßApollo.io£¬µ«ËùÓÐÕßÉÐδȷÈÏ¡£×êÑÐÖ¸³ö£¬´ËÀà´ó¹æÄ£¡¢¸ßʱЧÐÔÊý¾Ý¼¯ÊǶñÒâ¹¥»÷Õߵġ°±¦²Ø¡±£¬¿É±»ÓÃÓÚ¶¨Ïò´¹µö¹¥»÷¡¢ÆóÒµµý±¨¿úËÅ¡¢×Ô¶¯»¯¹¥»÷¼°ÐÅÏ¢²¹È«£¬½áºÏÆäËûй¶Êý¾Ý¿É¹¹½¨Ô̺¬ÃÜÂë¡¢É豸±êʶµÄÆëÈ«Ó×ÎÒÐÅÏ¢¿â£¬½µµÍÉç»á¹¤³Ìѧ¹¥»÷Ãż÷¡£


https://cybernews.com/security/database-exposes-billions-records-linkedin-data/


4. Ƥ¶ûË¹ÏØÍ¼Êé¹ÝÊý¾Ýй¶ÊÂÎñÓ°Ïì34ÍòÈË


12ÔÂ11ÈÕ£¬ÃÀ¹ú»ªÊ¢¶ÙÖÝÆ¤¶ûË¹ÏØÍ¼Êé¹Ýϵͳ£¨PCLS£©ÓÚ2025Äê4ÔÂ15ÈÕÖÁ21ÈÕÆÚ¼äÔâ·êÍøÂç¹¥»÷£¬µ¼Ö³¬¹ý34ÍòÈ˵ÄÓ×ÎÒÐÅϢй¶¡£PCLSÔÚ·¢ÏÖÒì³£ºóµ±¼´Æô¶¯µ÷²é£¬È·ÈÏÕâ´ÎÊÂÎñΪ±í²¿·¸·¨·Ö×ÓÈëÇÔìäÍøÂçϵͳËùÖ¡£Æ¾¾Ý¹Ù·½´«µÝ£¬Õâ´ÎÊý¾Ýй¶²¨¼°ÁìÓò¿í·º£¬²»½öÔ̺¬Í¼Êé¹Ý¶ÁÕߣ¬»¹Éæ¼°ÏÖÈμ°Ç°ÈÎÔ±¹¤¼°Æä¾ìÊô¡£¾ßÌåÀ´¿´£¬¶ÁÕßȺÌåй¶µÄÐÅÏ¢ÖØÒªÎªÐÕÃûºÍµ®ÉúÈÕÆÚ£»¶øÔ±¹¤¼°Æä¼ÒÍ¥³ÉÔ±µÄÐÅϢй¶Ôò¸üΪÑϳÁ£¬º­¸ÇÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á±£ÏÕºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢»¤ÕÕºÅÂë¡¢²ÆÕþÐÅÏ¢¡¢ÐÅÓþ¿¨¾ßÌåÐÅÏ¢£¬ÒÔ¼°½¡È«±£ÏÕºÍÒ½ÁÆÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£PCLSÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«Êһ㱨³Æ£¬Õâ´ÎÊÂÎñ¹²Ó°Ïì340,101ÈË£¬²¢½«ÏòËùÓÐÊÜÓ°ÏìÕß·¢ËÍÊéÃæÍ¨Öª¡£Îª¼õÇáDZÔÚ·çÏÕ£¬PCLSΪÊÜÓ°ÏìÈËÔ±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£È»¶ø£¬½ØÖÁĿǰ£¬PCLSÉÐδ°ä²¼Õâ´ÎÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖÐÅÏ¢£¬Ò²Î´·¢ÏÖÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÊÂÎñÕÆ¹Ü¡£


https://www.securityweek.com/pierce-county-library-data-breach-impacts-340000/


5. GogsÁãÈÕ·ì϶Ö°ëÊý¶³ö·þÎñÆ÷±»ÈëÇÖ


12ÔÂ11ÈÕ£¬Gogs×÷Ϊ×ÔÍйÜGit·þÎñ£¬ÒÔÇáÁ¿¼¶¡¢Òײ¿Êð¸öÐÔ±»¿í·ºÊ¹Óã¬Ö§³Ö°æ±¾½ÚÔì¡¢ÎÊÌâ¸ú×ÙµÈÖ°ÄÜ£¬Óû§¿ÉÆëÈ«ÕÆ¿ØÊý¾ÝÓë»ù´¡ÉèÊ©¡£È»¶ø£¬Î´½¨¸´µÄÁãÈÕ·ì϶CVE-2025-8110±»ÍþвÐÐΪÕßÀûÓã¬Í¨¹ýÔ¶³Ì´úÂëÖ´ÐÐÈëÇÖÔ¼700̨»¥ÁªÍøÂ¶³öµÄ·þÎñÆ÷¡£¸Ã·ì϶ԴÓÚPutContents APIµÄõè¾¶±éÀúȱµã£ºÖ»¹ÜGogs½¨¸´CVE-2024-55947ºó¼ÓÇ¿õè¾¼ûûÑéÖ¤£¬È´Î´²é³­·ûºÅÁ´½ÓÖ¸±êµØÎ»¡£¹¥»÷Õ߿ɴ´½¨º¬Ãô¸ÐÎļþ·ûºÅÁ´½ÓµÄ´æ´¢¿â£¬ÀûÓÃPutContents¸²¸Ç±í²¿Îļþ£¬´¥·¢ËÁÒâºÅÁîÖ´ÐС£Wiz ResearchÔÚµ÷²é¿Í»§¶ñÒâÈí¼þϰȾʱ·¢ÏÖ´Ë·ì϶£¬É¨ÃèÏÔʾ³¬1400̨Gogs·þÎñÆ÷¶³öÓÚ»¥ÁªÍø£¬ÆäÖг¬50%µÄÊ·ýÔ¼700̨Òѱ»ÈëÇÖ¡£ËùÓб»ÈëÇÖÊ·ý³öÏÖÏÔÖøÄ£Ê½£º7ÔÂ10ÈÕͳһʱ¶Î´´½¨µÄËæ»ú°Ë×Ö·û´æ´¢¿â£¬Åú×¢¹¥»÷ÓÉ×Ô¶¯»¯¹¤¾ßÇý¶¯µÄµ¥Ò»ÐÐΪÕß»ò¼¯ÌåÖ´ÐС£¶ñÒâÈí¼þͨ¹ý¿ªÔ´C2¿ò¼ÜSupershell³ÉÁ¢·´ÏòSSH shell£¬ÓëC2·þÎñÆ÷ͨѶ¡£·ì϶Åû¶ºó£¬GogsÊØ»¤ÕßÓÚ10ÔÂ30ÈÕÈÏ¿Éȱµã£¬µ«ÖÁ½ñ佨¸´£¬11ÔÂ1ÈÕÒѳöÏÖµÚ¶þ²¨¹¥»÷¡£


https://securityaffairs.com/185593/hacking/critical-gogs-zero-day-under-attack-700-servers-hacked.html


6. VSCode¹©¸øÁ´¹¥»÷£º19¸ö¶ñÒâÀ©´óÖ²ÈëľÂí


12ÔÂ11ÈÕ£¬×Ô2ÔÂÒÔÀ´£¬Ò»³¡Õë¶ÔVSCode MarketplaceµÄÒñ±Î¹©¸øÁ´¹¥»÷³ÖÐø½øÐУ¬¹¥»÷Õßͨ¹ý19¸ö¶ñÒâÀ©´ó½«¶ñÒâÈí¼þ°µ²ØÔÚÒÀÀµÏîÎļþ¼ÐÖУ¬Ö¸±êËø¶¨¿ª·¢ÕßȺÌå¡£Õâ´Î¹¥»÷ÓÉReversingLabs°²È«ÍŶӷ¢ÏÖ£¬¹¥»÷ÕßÀûÓüÙ×°³É.PNGͼÏñµÄ¶ñÒâÎļþÈçbanner.png£¬ÔÚÀ©´óµÄnode_modulesÎļþ¼ÐÖÐÔ¤ÖÃÅú¸ÄºóµÄÒÀÀµÏîÈçpath-is-absolute»ò@actions/io£¬²¢ÔÚindex.jsÖÐÔö³¤¶î±íÀ࣬ʵÏÖVSCodeÆô¶¯Ê±×Ô¶¯Ö´ÐжñÒâ´úÂë¡£¾ßÌå¹¥»÷Á÷³ÌÏÔʾ£¬¶ñÒâÀ©´óͨ¹ý°ó¸¿node_modulesÎļþ¼Ð×èÖ¹VSCode´Ónpm×¢²á±í»ñÈ¡ÒÀÀµÏÒÀÀµÏîÖеÄlockÎļþ°ü·Ñ½âÏýµÄJavaScriptͶ·ÅÆ÷£¬¶ø¼Ù×°³ÉPNGµÄѹËõÎļþÔòÔ̺¬cmstp.exeºÍRustľÂí·¨Ê½¡£Ö»¹ÜľÂí¾ßÌåÖ°ÄÜÈÔÔÚ·ÖÎöÖУ¬µ«Õâ´Î¹¥»÷ÒѶԿª·¢Õßϵͳ×é³ÉÑϳÁÍþв¡£Éæ¼°µÄ19¸ö¶ñÒâÀ©´ó¾ùѡȡ¡°Ö÷Ì⡱ÀàÃû³Æ±äÌ壬Èç¡°Âí¶û¿ÆÄ·Ö÷Ì⡱¡°PandaExpressÖ÷Ì⡱£¬°æ±¾Í³Ò»Îª1.0.0£¬Ä¿Ç°ÒÑÓÉReversingLabs»ã±¨Î¢Èí²¢È«ÊýÒÆ³ý¡£È»¶ø£¬×°ÖùýÕâЩÀ©´óµÄÓû§ÈÔÐèɨÃèϵͳÒÔÅŲ鰲ȫ·ì϶¡£


https://www.bleepingcomputer.com/news/security/malicious-vscode-marketplace-extensions-hid-trojan-in-fake-png-file/