Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßÖ´ÐÐÒñ±Î¹¥»÷
°ä²¼¹¦·ò 2025-12-111. Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßÖ´ÐÐÒñ±Î¹¥»÷
12ÔÂ9ÈÕ£¬£¬£¬ÍøÂ簲ȫ¹«Ë¾ReliaQuest½üÈÕÅû¶£¬£¬£¬ÃûΪStorm-0249µÄ³õʼ½Ó¼û´úÀíÕýͨ¹ýÀÄÓö˵ã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¹æ»®¼°ÊÜÐÅÀµµÄMicrosoft WindowsʵÓ÷¨Ê½£¬£¬£¬Ö´Ðи߶ÈÒñ±ÎµÄ¶ñÒâÈí¼þ¼ÓÔØÓëÓÆ¾Ã»¯²Ù×÷£¬£¬£¬ÎªºóÐøÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¡£¸Ã×éÖ¯ÒÑÞðÆú´«Í³´ó¹æÄ£ÍøÂç´¹µö£¬£¬£¬×ª¶øÑ¡È¡¸üÏȽøµÄ¼¼Êõ¼¿Á©£¬£¬£¬¼´±ã·ÀÓù·½¾ßÌå¼Í¼ÆäÐÐΪ£¬£¬£¬ÈÔÄÑÒÔÓÐЧӦ¶Ô¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³Ì¹¥»÷£ºÓÕÆÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐÐcurlºÅÁ£¬£¬ÏÂÔØ¾ß±¸SYSTEMȨÏ޵ĶñÒâMSI°ü¡£¡£Ëæºó£¬£¬£¬´ÓαÔìMicrosoftÓò»ñÈ¡µÄ¶ñÒâPowerShell¾ç±¾Ö±½Ó×¢ÈëϵͳÄڴ棬£¬£¬È«³Ì²»Âä´ÅÅÌÒÔ¶ã±Ü·À²¡¶¾¼ì²â¡£¡£MSIÎļþ¿ªÊ͵ĶñÒâDLL£¨ÈçSentinelAgentCore.dll£©±»Õ½ÊõÐÔ¸éÖÃÔںϷ¨SentinelOne EDR×é¼þµÄSentinelAgentWorker.exeÅÔ£¬£¬£¬Í¨¹ýDLL²à¼ÓÔØ¼¼ÊõÔÚÊÜÐÅÀµµÄÌØÈ¨EDR¹ý³ÌÖÐÖ´ÐУ¬£¬£¬ÊµÏÖ²Ù×÷ϵͳ¸üкóÈÔ¿Éά³ÖµÄÒñ±ÎÓÆ¾ÃÐÔ¡£¡£ÈëÇֺ󣬣¬£¬¹¥»÷ÕßÀûÓÃSentinelOne×é¼þ½áºÏreg.exe¡¢¡¢findstr.exeµÈºÏ·¨Windows¹¤¾ßÍøÂçϵͳ±êʶ·û£¬£¬£¬²¢Í¨¹ý¼ÓÃÜHTTPS C2Á÷Á¿³ÉÁ¢Í¨Ñ¶¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-iab-abuses-edr-for-stealthy-malware-execution/
2. ¡°Ö©ÖëÏÀ¡±ÍøÂç´¹µö¹¤¾ß°üϯ¾íÅ·ÖÞ½ðÈÚ½ç
12ÔÂ9ÈÕ£¬£¬£¬ÍøÂçÍþв·ÖÎö¹«Ë¾Varonis½üÈÕÅû¶£¬£¬£¬Ò»¿îÃûΪ¡°Ö©ÖëÏÀ¡±µÄÈ«Õ»Ê½ÍøÂç´¹µö¹¤¾ß°üÕýÔÚ°µÍø¿í·º´«²¼£¬£¬£¬Ê¹·Ç¼¼Êõ¹¥»÷ÕßÒ²ÄܶÔÅ·ÖÞÖØÒªÒøÐм°¼ÓÃÜÇ®±Òƽ̨ÌáÒé´ó¹æÄ£¾«×¼¹¥»÷¡£¡£¸Ã¹¤¾ß°ü±»×êÑÐÈËÔ±³ÆÎª¡°Äê¶È×îΣÏÕ¡±Íþв֮һ£¬£¬£¬ÒòÆäÎÞÐè±à³Ì֪ʶ¼´¿É¼±¾çÌìÉúÏñËØ¼¶¿Ë¡µÄ½ðÈÚ»ú¹¹µÇÂ¼Ò³Ãæ£¬£¬£¬¸²¸ÇµÂ¹ú¡¢¡¢±ÈÀûʱµÈÎå¹úÊýÊ®¼Ò»ú¹¹£¬£¬£¬Ô̺¬µÂÒâÖ¾ÒøÐС¢¡¢ºÉÀ¼¹ú¼Ê¼¯ÍÅ£¨ING£©¡¢¡¢CaixaBankµÈÖ÷Á÷ÒøÐм°¼ÓÃÜÇ®°ü·þÎñÉÌ£¬£¬£¬Ö¸±êÓû§ÈºÌåÖØ´ó¡£¡£¹¥»÷Á÷³Ì¼«¼ò»¯£º¹¥»÷Õß½öÐèÑ¡ÔñÖ¸±êÒøÐУ¬£¬£¬Æô¶¯¿Ë¡·¨Ê½£¬£¬£¬·¢ËÍÓë¹Ù·½ÆëȫһÖµĵö¶üÐÅÏ¢¼´¿ÉÖ´Ðд¹µö¡£¡£¹¤¾ß°üÄÚÖüÓÃÜÖú¼Ç´ÊÇÔȡģ¿£¿£¿é£¬£¬£¬±ê־ȡڿƼ¿Á©Ïò»ìºÏÐÍ·¢Õ¹¡£¡£Æä×îΣÏÕ¸öÐÔÔÚÓÚʵʱÐÅÏ¢À¹½ØÄÜÁ¦¡ª¡ªÊܺ¦ÕßÊäÈëµÇ¼ÐÅÏ¢ºó£¬£¬£¬¹¥»÷Õß¿ÉÁ¢¼´»ñÈ¡Êý¾Ý£¬£¬£¬²¢´¥·¢¶þ´Î½çÃæÍøÂçÐÅÓþ¿¨ºÅ¡¢¡¢OTP»òPhotoTANÂëµÈÃô¸ÐÐÅÏ¢¡£¡£µ¥´Î»á»°¼´¿ÉÇÔȡȫÃû¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢ÐÅÓþ¿¨ÏêÇéµÈÆëÈ«Éí·ÝÐÅÏ¢£¬£¬£¬×ãÒÔÆëÈ«ÊÕÊÜÕË»§²¢Ö´ÐÐÉí·Ý͵ÇÔ¡£¡£Îª¶ã±Ü°²È«¼ì²â£¬£¬£¬¸Ã¹¤¾ß°üѡȡµØÀí¹Ø±Õ¼¼ÊõÏÞ¶È·ÇÖ¸±ê¹ú¶È½Ó¼û£¬£¬£¬²¢ÆÁ±ÎÒÑÖª°²È«¹«Ë¾ÍøÂçÁ÷Á¿£¬£¬£¬ÓÐЧ¶ã±Ü×Ô¶¯É¨ÃèºÍÈËΪ·ÖÎö¡£¡£
https://hackread.com/spiderman-phishing-kit-european-banks-credential-theft/
3. Ó¡¶ÈÂüµÏ¹«¹²Ãŵê250Íò¿Í»§ÐÅϢй¶¹ÒÊÛ
12ÔÂ9ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬ÍøÂç·¸×ïÂÛÌ³ÆØ¹âһ·Õë¶ÔÓ¡¶ÈϲÂíÙɶû°îÂüµÏ¹«¹²Æû³µÃŵêµÄÒÉËÆÊý¾Ýй¶ÊÂÎñ¡£¡£¹¥»÷ÕßÐû³ÆÓÚ½ñÄêÈëÇָù«Ë¾¿Í»§¹ØÏµÖÎÀíϵͳºó¶Ü£¬£¬£¬ÇÔÈ¡ÁËÔ̺¬ÐÕÃû¡¢¡¢¼Òͥסַ¡¢¡¢ÓÊÕþ±àÂë¡¢¡¢µç»°ºÅÂë¡¢¡¢µç×ÓÓÊÏäµÈÔÚÄÚµÄ250ÍòÌõ¾ÏúÉ̼°¿Í»§Ð¡ÎÒÐÅÏ¢£¬£¬£¬²¢¹«¿ª¹ÒÅÆÊÛÂô¡£¡£½ØÖÁĿǰ£¬£¬£¬ÉæÊ¹«Ë¾ÉÐδ°ä²¼¹Ù·½ÉêÃ÷È·ÈÏÊÂÎñÕæÊµÐÔ¡£¡£Êý¾ÝÑù±¾½öÔ̺¬8ÌõÐÅÏ¢£¬£¬£¬ÕæÊµÐÔÔÝÎÞ·¨ºËʵ¡£¡£¾Ýµ÷²é£¬£¬£¬¸Ã¹¥»÷ÕßÓÚ½ñÄê4Ô²ÎÓë¸ÃÂÛ̳£¬£¬£¬´ËÇ°ÔøÂÅ´ÎÏúÊÛÆóÒµÊý¾Ý²¢¸½´øÑù±¾£¬£¬£¬Õâ´ÎÊÂÎñÈôÊôʵ£¬£¬£¬±»µÁÊý¾Ý¿ÉÄܱ»ÓÃÓÚ¹¹½¨Óû§Éí·Ý»Ïñ£¬£¬£¬ÎªºóÐøÉç»á¹¤³Ìѧ¹¥»÷£¨Èç´¹µöÚ¿Æ¡¢¡¢Éí·ÝðÓã©Ìṩ¾«×¼ÐÅÏ¢£¬£¬£¬ÏÔÖøÌáÉýÊܺ¦Õß±»¶þ´Î¹¥»÷µÄ·çÏÕ¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬¹«¹²Æû³µ¼°Æä¾ÏúÉÌÒѷdzõ´Î³ÉÎªÍøÂç·¸×ïÖ¸±ê¡£¡£½ñÄê10Ô£¬£¬£¬¹«¹²¼¯ÍÅ·¨¹ú·Ö¹«Ë¾±»÷è÷ëÀÕË÷Èí¼þÍÅ»ïÁÐÈëйÃÜÍøÕ¾£»6Ô£¬£¬£¬¹«¹²¼¯ÍÅ»¹³Ê´Ë¿ÌStormousÀÕË÷Èí¼þ¿¨Ëþ¶ûµÄ°µÍøÐ¹ÃÜÍøÕ¾¡£¡£
https://cybernews.com/security/volkswagen-dealership-data-breach-india/
4. DroidLock¶ñÒâÈí¼þ»áËø¶¨°²×¿É豸²¢Ë÷ÒªÊê½ð
12ÔÂ10ÈÕ£¬£¬£¬Ò»ÖÖÃûΪDroidLockµÄÐÂÐͰ²×¿¶ñÒâÈí¼þ½üÆÚ±»·¢ÏÖ£¬£¬£¬Æäͨ¹ý¶àÖØ¹¥»÷¼¿Á©¶ÔÎ÷°àÑÀÓïÓû§Ö´ÐÐÀÕË÷ÓëÊý¾ÝÇÔÈ¡¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶ñÒâÍøÕ¾ÍÆ¹ã¼ÙðºÏ·¨Èí¼þ°üµÄÐéαÀûÓ㬣¬£¬Ï°È¾¹ý³ÌʼÓÚÓÕÆÓû§×°ÖÃÔ̺¬ÏÖʵ¶ñÒâÈí¼þµÄ¶þ¼¶ÓÐÐ§ÔØºÉ¡£¡£×°Öú󣬣¬£¬¶ñÒⷨʽ»áÒªÇóÉ豸ÖÎÀíÔ±ºÍ¸¨ÖúÖ°ÄÜȨÏÞ£¬£¬£¬´Ó¶øÖ´ÐÐÔ̺¬ÆÁÄ»Ëø¶¨¡¢¡¢Êý¾Ý²Á³ý¡¢¡¢PINÂë/ÃÜÂë/ÉúÎï¼ø±ðÊý¾ÝÅú¸ÄµÈ15ÏîºÅÁ£¬£¬ÉõÖÁ¿ÉÔ¶³Ìͨ¹ýVNCÆëÈ«½ÚÖÆÉ豸¡£¡£DroidLockµÄÖ÷ÌâÍþвÔÚÓÚÆäÀÕË÷»úÖÆÓëÊý¾ÝÇÔÈ¡ÄÜÁ¦¡£¡£ÀÕË÷Ä£¿£¿£¿éͨ¹ýWebViewÏÔʾÊê½ðÒªÇ󣬣¬£¬ÅúʾÊܺ¦Õßͨ¹ýProtonÓÊÏäÁªÏµ¹¥»÷Õߣ¬£¬£¬²¢Íþв24СʱÄÚδ֧¸¶Êê½ð½«ÓÀÔ¶Ïú»ÙÎļþ¡£¡£Ö»¹Ü¸ÃÈí¼þ²»Ö±½Ó¼ÓÃÜÎļþ£¬£¬£¬µ«Í¨¹ýÏú»ÙÎļþµÄÍþв´ïµ½ÓëÀÕË÷Èí¼þÒ»ÑùµÄ³ÉЧ¡£¡£Í¬Ê±£¬£¬£¬Æäͨ¹ýÆÁÄ»¸²¸Ç²ãÇÔÈ¡Óû§½âËøÍ¼°¸£¬£¬£¬½áºÏVNCÔ¶³Ì½Ó¼ûʵÏÖÉ豸½ÚÖÆ¡£¡£´ËÍ⣬£¬£¬¸ÃÈí¼þ»¹ÄܽӼû¶ÌÐÅ¡¢¡¢Í¨»°¼Í¼¡¢¡¢ÁªÏµÈË£¬£¬£¬ÉõÖÁÖ´ÐйàÒôºÍɾ³ýÊý¾ÝµÈ²Ù×÷¡£¡£
https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/
5. Docker Hub¾µÏñ±»·¢ÏÖй¶ʹ´¦ºÍÉí·ÝÑéÖ¤ÃÜÔ¿
12ÔÂ10ÈÕ£¬£¬£¬Íþвµý±¨¹«Ë¾Flare½üÆÚɨÃè·¢ÏÖ£¬£¬£¬Docker Hubƽ̨³¬10,000¸öÈÝÆ÷¾µÏñ´æÔÚÃô¸ÐÐÅϢй¶ÎÊÌ⣬£¬£¬Éæ¼°³ö²úϵͳƾ֤¡¢¡¢CI/CDÊý¾Ý¿âÃÜÔ¿¼°AIÄ£ÐÍÁîÅÆµÈ£¬£¬£¬Ó°Ïì100Óà¼Ò×éÖ¯£¬£¬£¬Ô̺¬²Æ¸»500Ç¿ÆóÒµ¡¢¡¢¹ú¶ÈÒøÐм°10Óà¼Ò½ðÈÚ»ú¹¹¡£¡£×÷ΪȫÇò×î´óÈÝÆ÷×¢²á±í£¬£¬£¬Docker Hub±¾Ó¦±£ÏÕ¿ª·¢Õß°²È«¹²Ïí¼´ÓÃÐ;µÏñ£¬£¬£¬µ«±¾´ÎÊÂÎñ¶³öÆä°²È«·ì϶µÄÑÏÖØÐÔ¡£¡£×êÑÐÏÔʾ£¬£¬£¬11ÔÂÉÏ´«µÄ¾µÏñÖУ¬£¬£¬10,456¸ö´æÔÚÃÜԿй¶£¬£¬£¬ÆäÖÐ42%µÄ¾µÏñÖÁÉÙ¶³ö5¸öÃô¸ÐÊýÖµ¡£¡£×й¶µÄÊÇOpenAI¡¢¡¢HuggingFaceµÈAIÄ£Ð͵ĽӼûÁîÅÆ£¬£¬£¬×ÜÁ¿´ï4,000¸ö¡£¡£ÕâЩÃÜÔ¿¿É±»ÓÃÓÚÆëÈ«½Ó¼ûÔÆ»·¾³¡¢¡¢Git²Ö¿â¡¢¡¢CI/CDϵͳ¼°Ö§¸¶¼¯³ÉµÈÖ÷Ìâ»ù´¡ÉèÊ©£¬£¬£¬×é³ÉÖØ´ó°²È«·çÏÕ¡£¡£Ð¹Â¶×éÖ¯¶àÉ¢²¼ÓÚÈí¼þ¿ª·¢¡¢¡¢Êг¡¡¢¡¢¹¤Òµ¼°AIÁìÓò¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬³¬ËijÉй¶Դ×Ô"Ó°×ÓIT"ÕË»§£¬£¬£¬ÕâЩÕË»§ÍùÍù²»×ãÆóÒµ¼¶°²È«¼à¿Ø¡£¡£
https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/
6. WinRAR¸ßΣõè¾¶±éÀú·ì϶Ôâ¶à¹úAPT×éÖ¯ÀûÓÃ
12ÔÂ10ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚ2025Äê12Ô½«WinRARµÄCVE-2025-6218·ì϶ÁÐÈëÒÑÖªÀûÓ÷ì϶Ŀ¼£¬£¬£¬¸Ã·ì϶ÒÑ֤ʵ±»¶à¸ö¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯»ý¼«ÀûÓᣡ£¸Ã·ì϶Ϊõè¾¶±éÀúÀàÐÍ£¬£¬£¬CVSSÆÀ·Ö7.8£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§´ò¿ª¶ñÒâÎļþ»ò½Ó¼û¶ñÒâÒ³ÃæÊ±Ö´ÐÐËÁÒâ´úÂ룬£¬£¬½öÓ°ÏìWindowsϵͳ°æ±¾¡£¡£RARLABÒÑÔÚ2025Äê6Ô°䲼µÄWinRAR 7.12ÖÐÐÞ¸´´Ë·ì϶£¬£¬£¬µ«´ËǰÒÑÔâ¿í·ºÀûÓᣡ£¾Ý°²È«³§ÉÌ·ÖÎö£¬£¬£¬¶íÂÞ˹GOFFEE×éÖ¯£¨±ðºÅPaper Werewolf£©Ôø½áºÏCVE-2025-6218ÓëCVE-2025-8088£¨ÆÀ·Ö8.8£©ÌáÒéÍøÂç´¹µö¹¥»÷£»ÄÏÑÇBitter APT×éÖ¯Ôòͨ¹ý¶ñÒâRARѹËõ°üÖ²ÈëNormal.dotmÈ«¾ÖÄ£°å£¬£¬£¬ÈƹýWordºêÏÞ¶ÈʵÏÖÓÆ¾Ã»¯ºóÃÅ£»¶íÂÞ˹Gamaredon×éÖ¯ÔòÕë¶ÔÎÚ¿ËÀ¼¾üÊ¡¢¡¢µ±¾Ö»ú¹¹ÌáÒéÓã²æÊ½ÍøÂç´¹µö£¬£¬£¬ÀûÓø÷ì϶²¿ÊðPteranodon¶ñÒâÈí¼þ£¬£¬£¬ÉõÖÁÔÚ2025Äê11Ô³õ´ÎÖ´ÐзÛËéÐÔÐж¯£¬£¬£¬Í¶·ÅGamaWiper²Á³ýÆ÷¡£¡£
https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html


¾©¹«Íø°²±¸11010802024551ºÅ