Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßÖ´ÐÐÒñ±Î¹¥»÷

°ä²¼¹¦·ò 2025-12-11

1. Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßÖ´ÐÐÒñ±Î¹¥»÷


12ÔÂ9ÈÕ£¬ £¬£¬ÍøÂ簲ȫ¹«Ë¾ReliaQuest½üÈÕÅû¶£¬ £¬£¬ÃûΪStorm-0249µÄ³õʼ½Ó¼û´úÀíÕýͨ¹ýÀÄÓö˵ã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¹æ»®¼°ÊÜÐÅÀµµÄMicrosoft WindowsʵÓ÷¨Ê½£¬ £¬£¬Ö´Ðи߶ÈÒñ±ÎµÄ¶ñÒâÈí¼þ¼ÓÔØÓëÓÆ¾Ã»¯²Ù×÷£¬ £¬£¬ÎªºóÐøÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¡£¸Ã×éÖ¯ÒÑÞðÆú´«Í³´ó¹æÄ£ÍøÂç´¹µö£¬ £¬£¬×ª¶øÑ¡È¡¸üÏȽøµÄ¼¼Êõ¼¿Á©£¬ £¬£¬¼´±ã·ÀÓù·½¾ßÌå¼Í¼ÆäÐÐΪ£¬ £¬£¬ÈÔÄÑÒÔÓÐЧӦ¶Ô¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³Ì¹¥»÷£ºÓÕÆ­Óû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐÐcurlºÅÁ £¬£¬ÏÂÔØ¾ß±¸SYSTEMȨÏ޵ĶñÒâMSI°ü¡£¡£Ëæºó£¬ £¬£¬´ÓαÔìMicrosoftÓò»ñÈ¡µÄ¶ñÒâPowerShell¾ç±¾Ö±½Ó×¢ÈëϵͳÄڴ棬 £¬£¬È«³Ì²»Âä´ÅÅÌÒÔ¶ã±Ü·À²¡¶¾¼ì²â¡£¡£MSIÎļþ¿ªÊ͵ĶñÒâDLL£¨ÈçSentinelAgentCore.dll£©±»Õ½ÊõÐÔ¸éÖÃÔںϷ¨SentinelOne EDR×é¼þµÄSentinelAgentWorker.exeÅÔ£¬ £¬£¬Í¨¹ýDLL²à¼ÓÔØ¼¼ÊõÔÚÊÜÐÅÀµµÄÌØÈ¨EDR¹ý³ÌÖÐÖ´ÐУ¬ £¬£¬ÊµÏÖ²Ù×÷ϵͳ¸üкóÈÔ¿Éά³ÖµÄÒñ±ÎÓÆ¾ÃÐÔ¡£¡£ÈëÇÖºó£¬ £¬£¬¹¥»÷ÕßÀûÓÃSentinelOne×é¼þ½áºÏreg.exe¡¢¡¢findstr.exeµÈºÏ·¨Windows¹¤¾ßÍøÂçϵͳ±êʶ·û£¬ £¬£¬²¢Í¨¹ý¼ÓÃÜHTTPS C2Á÷Á¿³ÉÁ¢Í¨Ñ¶¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-iab-abuses-edr-for-stealthy-malware-execution/


2. ¡°Ö©ÖëÏÀ¡±ÍøÂç´¹µö¹¤¾ß°üϯ¾íÅ·ÖÞ½ðÈÚ½ç


12ÔÂ9ÈÕ£¬ £¬£¬ÍøÂçÍþв·ÖÎö¹«Ë¾Varonis½üÈÕÅû¶£¬ £¬£¬Ò»¿îÃûΪ¡°Ö©ÖëÏÀ¡±µÄÈ«Õ»Ê½ÍøÂç´¹µö¹¤¾ß°üÕýÔÚ°µÍø¿í·º´«²¼£¬ £¬£¬Ê¹·Ç¼¼Êõ¹¥»÷ÕßÒ²ÄܶÔÅ·ÖÞÖØÒªÒøÐм°¼ÓÃÜÇ®±Òƽ̨ÌáÒé´ó¹æÄ£¾«×¼¹¥»÷¡£¡£¸Ã¹¤¾ß°ü±»×êÑÐÈËÔ±³ÆÎª¡°Äê¶È×îΣÏÕ¡±Íþв֮һ£¬ £¬£¬ÒòÆäÎÞÐè±à³Ì֪ʶ¼´¿É¼±¾çÌìÉúÏñËØ¼¶¿Ë¡µÄ½ðÈÚ»ú¹¹µÇÂ¼Ò³Ãæ£¬ £¬£¬¸²¸ÇµÂ¹ú¡¢¡¢±ÈÀûʱµÈÎå¹úÊýÊ®¼Ò»ú¹¹£¬ £¬£¬Ô̺¬µÂÒâÖ¾ÒøÐС¢¡¢ºÉÀ¼¹ú¼Ê¼¯ÍÅ£¨ING£©¡¢¡¢CaixaBankµÈÖ÷Á÷ÒøÐм°¼ÓÃÜÇ®°ü·þÎñÉÌ£¬ £¬£¬Ö¸±êÓû§ÈºÌåÖØ´ó¡£¡£¹¥»÷Á÷³Ì¼«¼ò»¯£º¹¥»÷Õß½öÐèÑ¡ÔñÖ¸±êÒøÐУ¬ £¬£¬Æô¶¯¿Ë¡·¨Ê½£¬ £¬£¬·¢ËÍÓë¹Ù·½ÆëȫһÖµĵö¶üÐÅÏ¢¼´¿ÉÖ´Ðд¹µö¡£¡£¹¤¾ß°üÄÚÖüÓÃÜÖú¼Ç´ÊÇÔȡģ¿£¿£¿é£¬ £¬£¬±ê־ȡڿƭ¼¿Á©Ïò»ìºÏÐÍ·¢Õ¹¡£¡£Æä×îΣÏÕ¸öÐÔÔÚÓÚʵʱÐÅÏ¢À¹½ØÄÜÁ¦¡ª¡ªÊܺ¦ÕßÊäÈëµÇ¼ÐÅÏ¢ºó£¬ £¬£¬¹¥»÷Õß¿ÉÁ¢¼´»ñÈ¡Êý¾Ý£¬ £¬£¬²¢´¥·¢¶þ´Î½çÃæÍøÂçÐÅÓþ¿¨ºÅ¡¢¡¢OTP»òPhotoTANÂëµÈÃô¸ÐÐÅÏ¢¡£¡£µ¥´Î»á»°¼´¿ÉÇÔȡȫÃû¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢ÐÅÓþ¿¨ÏêÇéµÈÆëÈ«Éí·ÝÐÅÏ¢£¬ £¬£¬×ãÒÔÆëÈ«ÊÕÊÜÕË»§²¢Ö´ÐÐÉí·Ý͵ÇÔ¡£¡£Îª¶ã±Ü°²È«¼ì²â£¬ £¬£¬¸Ã¹¤¾ß°üѡȡµØÀí¹Ø±Õ¼¼ÊõÏÞ¶È·ÇÖ¸±ê¹ú¶È½Ó¼û£¬ £¬£¬²¢ÆÁ±ÎÒÑÖª°²È«¹«Ë¾ÍøÂçÁ÷Á¿£¬ £¬£¬ÓÐЧ¶ã±Ü×Ô¶¯É¨ÃèºÍÈËΪ·ÖÎö¡£¡£


https://hackread.com/spiderman-phishing-kit-european-banks-credential-theft/


3. Ó¡¶ÈÂüµÏ¹«¹²Ãŵê250Íò¿Í»§ÐÅϢй¶¹ÒÊÛ


12ÔÂ9ÈÕ£¬ £¬£¬½üÈÕ£¬ £¬£¬ÍøÂç·¸×ïÂÛÌ³ÆØ¹âһ·Õë¶ÔÓ¡¶ÈϲÂíÙɶû°îÂüµÏ¹«¹²Æû³µÃŵêµÄÒÉËÆÊý¾Ýй¶ÊÂÎñ¡£¡£¹¥»÷ÕßÐû³ÆÓÚ½ñÄêÈëÇָù«Ë¾¿Í»§¹ØÏµÖÎÀíϵͳºó¶Ü£¬ £¬£¬ÇÔÈ¡ÁËÔ̺¬ÐÕÃû¡¢¡¢¼Òͥסַ¡¢¡¢ÓÊÕþ±àÂë¡¢¡¢µç»°ºÅÂë¡¢¡¢µç×ÓÓÊÏäµÈÔÚÄÚµÄ250ÍòÌõ¾­ÏúÉ̼°¿Í»§Ð¡ÎÒÐÅÏ¢£¬ £¬£¬²¢¹«¿ª¹ÒÅÆÊÛÂô¡£¡£½ØÖÁĿǰ£¬ £¬£¬ÉæÊ¹«Ë¾ÉÐδ°ä²¼¹Ù·½ÉêÃ÷È·ÈÏÊÂÎñÕæÊµÐÔ¡£¡£Êý¾ÝÑù±¾½öÔ̺¬8ÌõÐÅÏ¢£¬ £¬£¬ÕæÊµÐÔÔÝÎÞ·¨ºËʵ¡£¡£¾Ýµ÷²é£¬ £¬£¬¸Ã¹¥»÷ÕßÓÚ½ñÄê4Ô²ÎÓë¸ÃÂÛ̳£¬ £¬£¬´ËÇ°ÔøÂÅ´ÎÏúÊÛÆóÒµÊý¾Ý²¢¸½´øÑù±¾£¬ £¬£¬Õâ´ÎÊÂÎñÈôÊôʵ£¬ £¬£¬±»µÁÊý¾Ý¿ÉÄܱ»ÓÃÓÚ¹¹½¨Óû§Éí·Ý»­Ïñ£¬ £¬£¬ÎªºóÐøÉç»á¹¤³Ìѧ¹¥»÷£¨Èç´¹µöÚ¿Æ­¡¢¡¢Éí·ÝðÓã©Ìṩ¾«×¼ÐÅÏ¢£¬ £¬£¬ÏÔÖøÌáÉýÊܺ¦Õß±»¶þ´Î¹¥»÷µÄ·çÏÕ¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ £¬£¬¹«¹²Æû³µ¼°Æä¾­ÏúÉÌÒѷdzõ´Î³ÉÎªÍøÂç·¸×ïÖ¸±ê¡£¡£½ñÄê10Ô£¬ £¬£¬¹«¹²¼¯ÍÅ·¨¹ú·Ö¹«Ë¾±»÷è÷ëÀÕË÷Èí¼þÍÅ»ïÁÐÈëйÃÜÍøÕ¾£»6Ô£¬ £¬£¬¹«¹²¼¯ÍÅ»¹³Ê´Ë¿ÌStormousÀÕË÷Èí¼þ¿¨Ëþ¶ûµÄ°µÍøÐ¹ÃÜÍøÕ¾¡£¡£


https://cybernews.com/security/volkswagen-dealership-data-breach-india/


4. DroidLock¶ñÒâÈí¼þ»áËø¶¨°²×¿É豸²¢Ë÷ÒªÊê½ð


12ÔÂ10ÈÕ£¬ £¬£¬Ò»ÖÖÃûΪDroidLockµÄÐÂÐͰ²×¿¶ñÒâÈí¼þ½üÆÚ±»·¢ÏÖ£¬ £¬£¬Æäͨ¹ý¶àÖØ¹¥»÷¼¿Á©¶ÔÎ÷°àÑÀÓïÓû§Ö´ÐÐÀÕË÷ÓëÊý¾ÝÇÔÈ¡¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶ñÒâÍøÕ¾ÍÆ¹ã¼ÙðºÏ·¨Èí¼þ°üµÄÐéαÀûÓ㬠£¬£¬Ï°È¾¹ý³ÌʼÓÚÓÕÆ­Óû§×°ÖÃÔ̺¬ÏÖʵ¶ñÒâÈí¼þµÄ¶þ¼¶ÓÐÐ§ÔØºÉ¡£¡£×°Öúó£¬ £¬£¬¶ñÒⷨʽ»áÒªÇóÉ豸ÖÎÀíÔ±ºÍ¸¨ÖúÖ°ÄÜȨÏÞ£¬ £¬£¬´Ó¶øÖ´ÐÐÔ̺¬ÆÁÄ»Ëø¶¨¡¢¡¢Êý¾Ý²Á³ý¡¢¡¢PINÂë/ÃÜÂë/ÉúÎï¼ø±ðÊý¾ÝÅú¸ÄµÈ15ÏîºÅÁ £¬£¬ÉõÖÁ¿ÉÔ¶³Ìͨ¹ýVNCÆëÈ«½ÚÖÆÉ豸¡£¡£DroidLockµÄÖ÷ÌâÍþвÔÚÓÚÆäÀÕË÷»úÖÆÓëÊý¾ÝÇÔÈ¡ÄÜÁ¦¡£¡£ÀÕË÷Ä£¿£¿£¿éͨ¹ýWebViewÏÔʾÊê½ðÒªÇó£¬ £¬£¬ÅúʾÊܺ¦Õßͨ¹ýProtonÓÊÏäÁªÏµ¹¥»÷Õߣ¬ £¬£¬²¢Íþв24СʱÄÚδ֧¸¶Êê½ð½«ÓÀÔ¶Ïú»ÙÎļþ¡£¡£Ö»¹Ü¸ÃÈí¼þ²»Ö±½Ó¼ÓÃÜÎļþ£¬ £¬£¬µ«Í¨¹ýÏú»ÙÎļþµÄÍþв´ïµ½ÓëÀÕË÷Èí¼þÒ»ÑùµÄ³ÉЧ¡£¡£Í¬Ê±£¬ £¬£¬Æäͨ¹ýÆÁÄ»¸²¸Ç²ãÇÔÈ¡Óû§½âËøÍ¼°¸£¬ £¬£¬½áºÏVNCÔ¶³Ì½Ó¼ûʵÏÖÉ豸½ÚÖÆ¡£¡£´ËÍ⣬ £¬£¬¸ÃÈí¼þ»¹ÄܽӼû¶ÌÐÅ¡¢¡¢Í¨»°¼Í¼¡¢¡¢ÁªÏµÈË£¬ £¬£¬ÉõÖÁÖ´ÐйàÒôºÍɾ³ýÊý¾ÝµÈ²Ù×÷¡£¡£


https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/


5. Docker Hub¾µÏñ±»·¢ÏÖй¶ʹ´¦ºÍÉí·ÝÑéÖ¤ÃÜÔ¿


12ÔÂ10ÈÕ£¬ £¬£¬Íþвµý±¨¹«Ë¾Flare½üÆÚɨÃè·¢ÏÖ£¬ £¬£¬Docker Hubƽ̨³¬10,000¸öÈÝÆ÷¾µÏñ´æÔÚÃô¸ÐÐÅϢй¶ÎÊÌ⣬ £¬£¬Éæ¼°³ö²úϵͳƾ֤¡¢¡¢CI/CDÊý¾Ý¿âÃÜÔ¿¼°AIÄ£ÐÍÁîÅÆµÈ£¬ £¬£¬Ó°Ïì100Óà¼Ò×éÖ¯£¬ £¬£¬Ô̺¬²Æ¸»500Ç¿ÆóÒµ¡¢¡¢¹ú¶ÈÒøÐм°10Óà¼Ò½ðÈÚ»ú¹¹¡£¡£×÷ΪȫÇò×î´óÈÝÆ÷×¢²á±í£¬ £¬£¬Docker Hub±¾Ó¦±£ÏÕ¿ª·¢Õß°²È«¹²Ïí¼´ÓÃÐ;µÏñ£¬ £¬£¬µ«±¾´ÎÊÂÎñ¶³öÆä°²È«·ì϶µÄÑÏÖØÐÔ¡£¡£×êÑÐÏÔʾ£¬ £¬£¬11ÔÂÉÏ´«µÄ¾µÏñÖУ¬ £¬£¬10,456¸ö´æÔÚÃÜԿй¶£¬ £¬£¬ÆäÖÐ42%µÄ¾µÏñÖÁÉÙ¶³ö5¸öÃô¸ÐÊýÖµ¡£¡£×й¶µÄÊÇOpenAI¡¢¡¢HuggingFaceµÈAIÄ£Ð͵ĽӼûÁîÅÆ£¬ £¬£¬×ÜÁ¿´ï4,000¸ö¡£¡£ÕâЩÃÜÔ¿¿É±»ÓÃÓÚÆëÈ«½Ó¼ûÔÆ»·¾³¡¢¡¢Git²Ö¿â¡¢¡¢CI/CDϵͳ¼°Ö§¸¶¼¯³ÉµÈÖ÷Ìâ»ù´¡ÉèÊ©£¬ £¬£¬×é³ÉÖØ´ó°²È«·çÏÕ¡£¡£Ð¹Â¶×éÖ¯¶àÉ¢²¼ÓÚÈí¼þ¿ª·¢¡¢¡¢Êг¡¡¢¡¢¹¤Òµ¼°AIÁìÓò¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ £¬£¬³¬ËijÉй¶Դ×Ô"Ó°×ÓIT"ÕË»§£¬ £¬£¬ÕâЩÕË»§ÍùÍù²»×ãÆóÒµ¼¶°²È«¼à¿Ø¡£¡£


https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/


6. WinRAR¸ßΣõè¾¶±éÀú·ì϶Ôâ¶à¹úAPT×éÖ¯ÀûÓÃ


12ÔÂ10ÈÕ£¬ £¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚ2025Äê12Ô½«WinRARµÄCVE-2025-6218·ì϶ÁÐÈëÒÑÖªÀûÓ÷ì϶Ŀ¼£¬ £¬£¬¸Ã·ì϶ÒÑ֤ʵ±»¶à¸ö¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯»ý¼«ÀûÓᣡ£¸Ã·ì϶Ϊõè¾¶±éÀúÀàÐÍ£¬ £¬£¬CVSSÆÀ·Ö7.8£¬ £¬£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§´ò¿ª¶ñÒâÎļþ»ò½Ó¼û¶ñÒâÒ³ÃæÊ±Ö´ÐÐËÁÒâ´úÂ룬 £¬£¬½öÓ°ÏìWindowsϵͳ°æ±¾¡£¡£RARLABÒÑÔÚ2025Äê6Ô°䲼µÄWinRAR 7.12ÖÐÐÞ¸´´Ë·ì϶£¬ £¬£¬µ«´ËǰÒÑÔâ¿í·ºÀûÓᣡ£¾Ý°²È«³§ÉÌ·ÖÎö£¬ £¬£¬¶íÂÞ˹GOFFEE×éÖ¯£¨±ðºÅPaper Werewolf£©Ôø½áºÏCVE-2025-6218ÓëCVE-2025-8088£¨ÆÀ·Ö8.8£©ÌáÒéÍøÂç´¹µö¹¥»÷£»ÄÏÑÇBitter APT×éÖ¯Ôòͨ¹ý¶ñÒâRARѹËõ°üÖ²ÈëNormal.dotmÈ«¾ÖÄ£°å£¬ £¬£¬ÈƹýWordºêÏÞ¶ÈʵÏÖÓÆ¾Ã»¯ºóÃÅ£»¶íÂÞ˹Gamaredon×éÖ¯ÔòÕë¶ÔÎÚ¿ËÀ¼¾üÊ¡¢¡¢µ±¾Ö»ú¹¹ÌáÒéÓã²æÊ½ÍøÂç´¹µö£¬ £¬£¬ÀûÓø÷ì϶²¿ÊðPteranodon¶ñÒâÈí¼þ£¬ £¬£¬ÉõÖÁÔÚ2025Äê11Ô³õ´ÎÖ´ÐзÛËéÐÔÐж¯£¬ £¬£¬Í¶·ÅGamaWiper²Á³ýÆ÷¡£¡£


https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html