GlassWormµÚËIJ¨¹¥»÷¶Ô×¼macOS¿ª·¢Õß

°ä²¼¹¦·ò 2026-01-05

1. GlassWormµÚËIJ¨¹¥»÷¶Ô×¼macOS¿ª·¢Õß


1ÔÂ1ÈÕ£¬2025Äê10Ô³õ´Î³öÏÖµÄGlassWorm¶ñÒâÈí¼þ½üÈÕÌáÒéµÚËIJ¨¹¥»÷£¬×¨ÃÅÕë¶ÔmacOS¿ª·¢Õߣ¬Í¨¹ý´Û¸ÄVSCode/OpenVSXÀ©´ó·¨Ê½Ö²Èë¼ÓÃÜÇ®°üľÂí°æ±¾¡£Õâ´Î¹¥»÷»î¶¯³öÏÖ¿çÆ½Ì¨¸öÐÔ£¬´ËÇ°ÖØÒªÕë¶ÔWindowsϵͳ£¬ÏÖÀ©´óÖÁmacOS£¬Í¹ÏÔ¹¥»÷Õß¶Ô¿ª·¢ÕßÉú̬µÄ³ÖÐøÉøÈë¡£¹¥»÷ÀûÓÃOpenVSXºÍMicrosoft Visual Studio MarketplaceÖеĶñÒâÀ©´ó·¨Ê½£¬ÕâЩÀ©´óͨ³£ÓÃÓÚ¼ÓÇ¿±à×ëÆ÷Ö°ÄÜ¡£GlassWormͨ¹ý¡°²»Ë½¼û¡±Unicode×Ö·û°µ²Ø¶ñÒâ´úÂ룬װÖúóÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Í´´¦¼°¶àÀ©´ó·¨Ê½µÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬²¢Ö§³ÖVNCÔ¶³Ì½Ó¼ûºÍSOCKS´úÀíÁ÷Á¿Â·ÓÉ¡£×îбäÖÖѡȡAES-256-CBC¼ÓÃÜÓÐÐ§ÔØºÉ£¬ÑÓ³¤15·ÖÖÓÖ´ÐÐÒÔÌÓ±ÜɳºÐ·ÖÎö£¬Ê¹ÓÃAppleScript´úÌæPowerShell£¬Í¨¹ýLaunchAgentsʵÏÖÓÆ¾Ã»¯£¬Í¬Ê±³¢ÊÔÇÔÈ¡KeychainÃÜÂë²¢´úÌæÓ²¼þÇ®°üľÂí£¨ÈçLedger Live¡¢Trezor Suite£©£¬µ«µ±Ç°Ä¾ÂíÇ®°ü·µ»Ø¿ÕÎļþ£¬¿ÉÄÜ´¦Óڳﱸ½×¶Î¡£×êÑÐÈËÔ±·¢ÏÖ£¬¶ñÒâÀ©´óÔÚOpenVSXƽ̨ÈÔ´æÔÚ£¬ÏÂÔØÁ¿³¬33,000´Î¡£


https://www.bleepingcomputer.com/news/security/new-glassworm-malware-wave-targets-macs-with-trojanized-crypto-wallets/


2. Unleash ProtocolËðʧ390ÍòÃÀÔª¼ÓÃÜ×ʲú


12ÔÂ31ÈÕ£¬È¥ÖÐÐÄ»¯ÖªÊ¶²úȨƽ̨Unleash ProtocolÒò¶à³ÁÊðÃûÖÎÀíϵͳ±»¹¥»÷£¬Ëðʧ¼ÛÖµÔ¼390ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¾ÝÏîÄ¿ÍŶÓÅû¶£¬¹¥»÷Õßͨ¹ýδÊÚȨµÄºÏÔ¼Éý¼¶»ñÈ¡ÖÎÀíԱȨÏÞ£¬½âËø×ʲúÌá¿îÖ°ÄÜ£¬µ¼ÖÂWIP¡¢USDC¡¢WETH¡¢stIPºÍvIPµÈ×ʲú±»µÁ¡£PeckShieldAlertÇø¿éÁ´°²È«×¨¼ÒÈ·ÈÏ£¬Ëðʧ½ð¶îÔ¼390ÍòÃÀÔª£¬×ʽðͨ¹ýµÚÈý·½»ù´¡ÉèʩǎÓ×ªÒÆÖÁ±í²¿µØÖ·£¬×îÖÕÒÔ1,337 ETH´æÈëTornado Cash¼ÓÃÜÇ®±Ò»ìºÏ·þÎñÒÔ½µµÍ¿É×·ÒäÐÔ¡£Unleash Protocol¶¨Î»ÎªÖªÊ¶²úȨÖÎÀí²Ù×÷ϵͳ£¬¿É½«ÖªÊ¶²úȨ´ú±Ò»¯²¢×÷ΪDeFiµÖѺƷ£¬Í¨¹ýÖÇÄܺÏÔ¼×Ô¶¯·ÖÅäÐí¿É·ÑºÍ°æË°¡£Õâ´Î¹¥»÷¶³öÆä¶à³ÁÊðÃûÖÎÀíϵͳµÄ°²È«·ì϶£º±í²¿µØÖ·Í¨¹ýÖÎÀíϵͳ»ñÈ¡ÖÎÀí½ÚÔìȨ£¬Ö´ÐÐδ¾­ÍŶӺË×¼µÄºÏÔ¼Éý¼¶£¬Í»ÆÆÔ­ÓÐÖÎÀí¼°ÔËÓª·¨Ê½ÏÞ¶È¡£¹¥»÷ÕßÀûÓÃTornado CashµÄ»ìºÏ»úÔìÌÓ±Ü×·×Ù£¬¸Ã·þÎñÔøÒòЭÖú³¯ÏʺڿÍÏ´Ç®ÓÚ2022ÄêÔâÃÀ¹úÔì²Ã£¬2025ÄêËä±»³ýÃû£¬µ«ÈÔ±»ÍøÂç·¸×ï·Ö×ÓÀÄÓá£ÊÂÎñ²úÉúºó£¬Unleash ProtocolÒÑÔÝÍ£ËùÓÐÔËÓª£¬ÀñƸ±í²¿°²È«×¨¼Òµ÷²é·ì϶±¾Ô­£¬ÆÀ¹À²¹¾Å×븴ԭ´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/hackers-drain-39m-from-unleash-protocol-after-multisig-hijack/


3. PlayÀÕË÷Èí¼þ¹¥»÷°ÙÄêÀ±½·½´¾ÞÍ·Garner Foods


1ÔÂ2ÈÕ£¬PlayÀÕË÷Èí¼þ×éÖ¯ÔÚ°µÍø°ä²¼ÐÂÎÅ£¬ÒªÇóÕ¼Óнü°ÙÄ꺹ÇàµÄ±±¿¨ÂÞÀ´ÄÉÖÝÀ±½·½´Ôì×÷ÉÌGarner FoodsÔÚ1ÔÂ7ÈÕǰÁªÏµ²¢Ö§¸¶Î´¹«¿ªÊê½ð£¬²»È»½«Ð¹Â¶ÆäÃô¸ÐÊý¾Ý¡£×÷ΪÃÀ¹ú³ÛÃû½´ÁÏÆ·ÅÆ£¬Garner Foods×Ô1929ÄêÆð³ö²úµÂÖÝÆ¤ÌØ¡¢ÂÌɽ¸ñÁÖ¸êɯɯ½´µÈϵÁвúÆ·£¬²úÆ·¸²¸ÇÈ«ÃÀÊýÍò¼Ò³¬ÊÓ×¢¾üÐèµê¼°·½±ãµê£¬²¢ÔÚʳƷ·þÎñÓë²ÍÒûÐÐÒµÕ¼¾Ý³ÁҪְλ¡£Õâ´Î¹¥»÷¶³öÁËÆóÒµÖ÷ÌâÊý¾Ý·çÏÕ£ºPlayÐû³ÆÇÔÈ¡ÁËÔ̺¬¸öÈË»úÃÜÊý¾Ý¡¢¿Í»§Îļþ¡¢Ô¤Ëã¡¢¹¤×ʵ¥¡¢²ÆÕþÐÅÏ¢¼°Ë°ÊռͼÔÚÄڵĶàÀàÃô¸ÐÐÅÏ¢£¬¿ÉÄÜÉæ¼°±êÖ¾ÐÔÅä·½µÈרÓÐÐÅÏ¢¡£Ê³Æ·³ö²úÉÌÔâÀÕË÷¹¥»÷Ò×Òý·¢¹©¸øÁ´Á¬Ëø·´Ó³£¬´Ó³ö²úÖͰ­¡¢½»¸¶ÑÓ³¤µ½²úƷǷȱ£¬²»½öÇÖº¦ÆóÒµÃûÓþ£¬»¹¿ÉÄܵ¼ÖÂÏû·ÑÕßתÏò¾ºÆ·¡£Play×éÖ¯×÷Ϊ2024-2025ÄêÈ«ÇòµÚÈý»îÔ¾ÀÕË÷Èí¼þÍŻÒÑÔì³É³¬Ç§ÃûÊܺ¦Õß¡£Æäѡȡ¡°¼äЪÐÔ¼ÓÃÜ¡±¼¼Êõ£¬½ö¼ÓÃÜϵͳ²¿ÃŹ̶¨ÇøÓòÒÔ¼±¾çÇÔÈ¡Êý¾Ý£¬¸ÃÕ½ÊõÒѱ»¶à¸ö³ÛÃûÀÕË÷×é֯Ч·Â¡£


https://cybernews.com/news/texas-pete-hot-sauce-play-ransomware-attack-garner-foods/


4. PlayÀÕË÷Èí¼þ¹¥»÷ͯЬ¾ÞÍ·Esquire Brands


1ÔÂ2ÈÕ£¬½üÈÕ£¬Í¯Ð¬Ôì×÷ÉÌEsquire BrandsÔâ·ê³ÛÃûÀÕË÷Èí¼þÍÅ»ïPlayµÄ¹¥»÷£¬¸ÃÍÅ»ïÔÚ°µÍøÂÛ̳ÉÏÐû³ÆÒÑÇÔÈ¡Æä»úÃÜÊý¾Ý£¬²¢Íþв×îÔçÓÚ1ÔÂ3ÈÕ°ä²¼¡£×÷ΪռÓÐDKNY¡¢Sam EdelmanºÍKenneth ColeµÈÆ·ÅÆÊÚȨµÄÆóÒµ£¬Esquire BrandsרһÓÚͯЬµÄÉè¼Æ¡¢ÊÚȨÓë³ö²ú£¬ÆäÒµÎñ¸²¸ÇÈ«Çò¶à¸öÊг¡¡£¹¥»÷ÕßÐû³Æ»ñÈ¡Á˿ͻ§Îļþ¡¢¹¤×ÊÊý¾Ý¡¢²ÆÕþÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£´ËÀàÊý¾Ýй¶¿ÉÄÜÒý·¢ÑϳÁºó¹û£º¹¤×ÊÊý¾ÝÔ̺¬Ô±¹¤Ó×ÎÒÐÅÏ¢£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¶¨ÏòÍøÂç´¹µö¼°Éç»á¹¤³Ì¹¥»÷£¬ÀýÈç¼ÙÒâ¸ß¹ÜÆ­È¡×ʽð £»¿Í»§ÎļþºÍ²ÆÕþÐÅÏ¢Ôò¿ÉÄܱ»ÓÃÓÚÉèÁ¢Ú²Æ­ÕË»§»òóÒ×¼äµý»î¶¯£¬¶ÔÆóÒµÃûÓþºÍÔËÓªÔì³É³Ö¾ÃÇÖº¦¡£PlayÀÕË÷Èí¼þ¼¯ÍÅÊÇÍøÂç·¸×ïÁìÓòµÄ»îÔ¾²Î¼ÓÕߣ¬2024ÄêλÁÐÈ«Çò×î»îÔ¾ÀÕË÷Èí¼þÍÅ»ïǰÈýÃû£¬ÒÔ¡°¼äЪÐÔ¼ÓÃÜ¡±¼¼ÊõÖø³Æ£¬½ö¼ÓÃÜÏµÍ³ÌØ¶¨¹Ì¶¨²¿ÃÅ£¬´Ó¶ø¼±¾çÇÔÈ¡Êý¾Ý¡£PlayµÄ¹¥»÷Ö¸±êº­¸Ç¶à¸öÐÐÒµ£¬È纽¿Õº½Ìì¡¢ÔÆÍÆËã¡¢¾Æµê¡¢Æû³µ¼°µ±¾Ö»ú¹¹¡£


https://cybernews.com/security/esquire-brands-play-ransomware-attack/


5. ÒÁÀûŵÒÁÖÝÈËÀà·þÎñ²¿ÄÚ²¿¹æ»®µØÍ¼ÃýÎ󹫿ª


1ÔÂ3ÈÕ£¬ÒÁÀûŵÒÁÖÝÈËÀà·þÎñ²¿£¨IDHS£©½üÈÕ´«µÝһ·ÒòÒþÖÔÉèÖÃÅäÖÃʧÎóÒý·¢µÄÊý¾Ý°²È«ÊÂÎñ£¬µ¼ÖÂÄÚ²¿×ÊÔ´¹æ»®µØÍ¼±»Òâ±í¹«¿ª£¬Éæ¼°ÊýÍòÃû·þÎñ¶ÔÏóÓ×ÎÒÐÅÏ¢¡£¾ÝÅû¶£¬ÉæÊµØÍ¼´´½¨ÓÚijµØÍ¼Æ½Ì¨£¬ÓÃÓÚÄÚ²¿×ÊÔ´¹æ»®£¬µ«ÒòȨÏÞÉèÖò»µ±£¬ÔÚ2021Äê4ÔÂÖÁ2025Äê9ÔÂÆÚ¼ä±»¹«¼Ò¿É½Ó¼û¡£ÊÂÎñÓ°ÏìÁìÓò¿í·º£º¿µ¸´·þÎñ²¿ÃÅ£¨DRS£©Ô¼32,401Ãû¿Í»§ÐÅÏ¢Ôâ¶³ö£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢²¡Àý±àºÅ¡¢²¡Àý״̬¡¢×ªÕïÆðÔ´¡¢ÇøÓò°ì¹«ÊÒÐÅÏ¢¼°ÊÜÒæÈËÉí·ÝµÈ £»Ò½ÁƲ¹ÖúºÍÒ½ÁƱ£ÏÕ´¢Ðî´òË㣨MMSP£©Ô¼672,616ÃûÊÜÒæÈËÒàÊܲ¨¼°£¬Éæ¼°µØÖ·¡¢²¡Àý±àºÅ¡¢È˶¡Í³¼ÆÐÅÏ¢¼°Ò½ÁÆ´òËãÃû³Æ£¨ÈçÒ½ÁƲ¹Öú¡¢Ò½ÁƱ£Ïյȣ©£¬µ«Î´Ô̺¬ÐÕÃû¡£Á½ÅúÊý¾Ý¹«¿ªÊ±¶Î±ðÀëΪ2021Äê4ÔÂ-2025Äê9Ô¼°2022Äê1ÔÂ-2025Äê9Ô¡£¸ÃÊÂÎñÓÚ2025Äê9ÔÂ22ÈÕ±»·¢ÏÖºó£¬IDHSµ±¼´²ÉÈ¡²¹¾È´ëÊ©£ºÏ޶ȵØÍ¼½Ó¼ûȨÏÞ£¬Ã÷È·²»Èݽ«Èκοͻ§¼¶±ðÊý¾ÝÉÏ´«´ó¹«¹²µØÍ¼ÍøÕ¾¡£Í¬Ê±£¬ÒÁÀûŵÒÁÖݺÓɽ°²È«ÊýÕýͨ¹ýÓʼþµÈ·½Ê½ÏòÊÜÓ°ÏìÓ×ÎÒ·¢³ö֪ͨ£¬Í¨ÖªÖÐÔ̺¬Ãâ·ÑÕ÷ѯµç»°£¬±ãÓÚÓû§»ñÈ¡¸ü¶àÐÅÏ¢¼°Ö§³Ö¡£


https://khqa.com/news/local/illinois-agency-tightens-map-security-after-data-security-incident-human-services-medicaid-medicare-division-of-rehabilitation-services-federal-trade-commission


6. Handalaͨ¹ýÈëÇÖTelegramÕË»§¹¥»÷ÒÔÉ«ÁйÙÔ±


1ÔÂ2ÈÕ£¬ÓëÒÁÀʹØÁªµÄºÚ¿Í×éÖ¯HandalaÐû³ÆÆëÈ«ÈëÇÖÁ½ÃûÒÔÉ«ÁÐÕþÒª¡ª¡ªÇ°×ÜÀíÄÉ·òËþÀû¡¤±´ÄÚÌØÓëÕÕ·÷³¤²ìÏ£¡¤²¼À­¸¥ÂüµÄÒÆ¶¯É豸£¬²¢Ð¹Â¶ÁªÏµÈË¡¢ÕÕÆ¬¡¢ÊÓÆµ¼°Ô¼1900Ìõ̸Ìì¼Í¼¡£È»¶ø£¬KelaÍøÂçµý±¨¹«Ë¾µÄÉî¶Èȡ֤·ÖÎö½Òʾ£¬Ëùν¡°É豸ÈëÇÖ¡±ÊµÎªTelegramÕË»§°²È«·ì϶µÄ¼¯Öж³ö£º¹¥»÷Ö¸±ê½öÏÞÓÚÌØ¶¨TelegramÕË»§£¬²¢Î´»ñÈ¡Éè±¸È«Ãæ½Ó¼ûȨÏÞ¡£Kela·¢ÏÖ£¬Ð¹Â¶×ʲÂÖÐÎÞÊý¶Ô»°ÎªTelegramͬ²½²úÉúµÄ¿ÕÁªÏµÈË¿¨Æ¬£¬½öÔ¼40¸ö¶Ô»°º¬ÏÖʵÐÂÎÅ£¬ÇÒÄÚÈÝÐÔ»¥»»¼«ÉÙ¡£ËùÓÐÆØ¹âÁªÏµÈ˾ù¹ØÁª»îÔ¾TelegramÕË»§£¬Ö¤ÊµÊý¾ÝÔ´×Ô¶¯Ì¬ÔÆ´æ´¢¶ø·ÇÉ豸±¾µØ¡£´ËÊÂÎñ¶³ö³ö¼ÓÃÜÆ½Ì¨ÕË»§ÖÎÀíµÄϵͳÐÔ·çÏÕ£¬¼´±ãÈçTelegramÕâÀàÆ½Ì¨£¬ÆäĬÈÏÉèÖÃÒà·Å´óÁ˹¥»÷Ãæ£ºÔÆÃÜÂëÖ°ÄÜĬÈϽûÓ㬽öÐèÒ»´ÎÐÔÃÜÂë¼´¿ÉÆëÈ«½Ó¼ûÕË»§ £»³ß¶È̸Ìì²»×ã¶Ëµ½¶Ë¼ÓÃÜ£¬Êý¾ÝÒÔÔÆ´ó¾Ö´æ´¢ÓÚ·þÎñÆ÷£¬¹¥»÷Ãæ±»ÏÔÖøÀ©´ó¡£


https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/