CISA½«Digiever NVR¸ßΣ·ì϶ÁÐÈëKEVĿ¼
°ä²¼¹¦·ò 2025-12-261. CISA½«Digiever NVR¸ßΣ·ì϶ÁÐÈëKEVĿ¼
12ÔÂ25ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Ó°ÏìDigiever DS-2105 ProÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©µÄCVE-2023-52163°²È«·ì϶ÕýʽÄÉÈëÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬£¬£¬²¢Ç¿µ÷¸Ã·ì϶Òѱ»Ö¤Êµ´æÔÚ»ý¼«ÀûÓÃÐÐΪ¡£¸Ã·ì϶CVSSÆÀ·ÖΪ8.8£¬£¬£¬ÊôÓÚ¸ßΣ¼¶±ð£¬£¬£¬Éæ¼°ºÅÁî×¢Èë·ì϶£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÉí·ÝÑéÖ¤ºóͨ¹ýtime_tzsetup.cgi½Ó¿ÚÖ´ÐÐÔ¶³Ì´úÂë¡£CISAÖ¸³ö£¬£¬£¬AkamaiºÍFortinetµÈ¶à¼Ò°²È«»ú¹¹ÒÑÂŴλ㱨ÍþвÐÐΪÕßÀûÓô˷ì϶´«²¼MiraiºÍShadowV2µÈ½©Ê¬ÍøÂç¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬Digiever DS-2105 ProÉ豸ÒÑ´¦ÓÚʹÓÃÊÙÃüÖÕÖ¹£¨EoL£©×´Ì¬£¬£¬£¬Òò¶ø¸Ã·ì϶¼°¹ØÁªµÄËÁÒâÎļþ¶ÁÈ¡·ì϶CVE-2023-52164£¨CVSSÆÀ·Ö5.1£©¾ùδ»ñµÃ¹Ù·½²¹¶¡ÐÞ¸´¡£TXOne Research°²È«×êÑÐÔ±Ta-Lun Yen½øÒ»²½Ö¤Êµ£¬£¬£¬ÓÉÓÚÉ豸ÐÔÃüÖÜÆÚʵÏÖ£¬£¬£¬Óû§ÎÞ·¨Í¨¹ý³§É̸üÐÂÐÞ¸´ÕâЩ°²È«È±µã¡£Îª½µµÍ·çÏÕ£¬£¬£¬CISA½¨ÒéÓû§Á¢¼´²ÉÈ¡·À»¤´ëÊ©£ºÔ¤·À½«É豸ֱ½Ó¶³öÓÚ»¥ÁªÍø£¬£¬£¬²¢Åú¸ÄĬÈÏÓû§ÃûºÍÃÜÂëÒÔ¼ÓÇ¿ÈÏÖ¤°²È«ÐÔ¡£
https://thehackernews.com/2025/12/cisa-flags-actively-exploited-digiever.html
2. ·ÇÖÞ19¹ú½áºÏ¡°ÉÚ±øÐж¯¡±ÖØ´´ÍøÂç·¸×ï
12ÔÂ24ÈÕ£¬£¬£¬·ÇÖÞ19¹ú·¨ÂÉ»ú¹¹10ÔÂ27ÈÕÖÁ11ÔÂ27ÈÕ½áºÏ·¢Õ¹¡°ÉÚ±øÐж¯¡±£¨Operation Sentinel£©£¬£¬£¬ÖØµã½ø¹¥ÆóÒµÓÊÏäÈëÇÖÚ¿Æ£¨BEC£©¡¢¡¢Êý×ÖÀÕË÷ºÍÀÕË÷Èí¼þ¹¥»÷Èý´óÍøÂçÍþв£¬£¬£¬»ñµÃÖØ´óÕ½¹û¡£Ðж¯ÆÚ¼ä¹²¿ÛÁô574ÃûÏÓÒÉÈË£¬£¬£¬µ·»Ù6ÖÖÀÕË÷Èí¼þ±äÖÖ£¬£¬£¬½ûÓÃ6000Óà¸ö¶ñÒâÁ´½Ó£¬£¬£¬×·»ØÔ¼300ÍòÃÀÔª·¸·¨×ʽ𣬣¬£¬Óйذ¸¼þËðʧ¹À¼Æ³¬2100ÍòÃÀÔª£¬£¬£¬³ä·ÖչʾÁ˼±¾ç¹ú¼ÊºÏ×÷ÔÚ·À±¸ÖØ´ó¾¼ÃËðʧÖеĹؼü×÷ÓᣵäÐͰ¸Àý͹ÏÔÐж¯ÊµÐ§£ºÈûÄÚ¼Ó¶û³É¹¦×èÖ¹´óÐÍʯÓÍÆóÒµ790ÍòÃÀÔªµç»ãÚ¿Æ£¬£¬£¬Í¨¹ý¼±¾ç¶³½áÊÕ¿îÕË»§Ô¤·ÀËðʧ£»£»¼ÓÄɽðÈÚ»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂ100TBÊý¾Ý¼ÓÃÜ¡¢¡¢12ÍòÃÀÔª±»µÁ£¬£¬£¬µ±¾Öͨ¹ý¶ñÒâÈí¼þ·ÖÎöËø¶¨ÀàÐͲ¢¿ª·¢½âÃܹ¤¾ß£¬£¬£¬¸´Ô½ü30TBÊý¾Ý£¬£¬£¬Í¬Ê±µ·»Ùºá¿ç¼ÓÄÉÓëÄáÈÕÀûÑǵÄÚ¿ÆÍŻ£»±´Äþ¹Ø±Õ43¸ö¶ñÒâÓòÃû£¬£¬£¬½ûÓÃ4318¸öÓëÀÕË÷ÓйصÄÉ罻ýÌåÕË»§£¬£¬£¬¿ÛÁô106ÈË£»£»¿¦Âó¡ѸËÙ×èÖ¹Æû³µÏúÊÛÆ½Ì¨´¹µö¹¥»÷£¬£¬£¬ÊýСʱÄÚ¶³½áÓйØÒøÐÐÕË»§¡£
https://cybersecuritynews.com/interpol-taken-6-ransomware-variants-arrested/
3. Operation IconCat£ºÒÔÉ«ÁжàÐÐÒµ¾«×¼ÍøÂç¹¥»÷
12ÔÂ24ÈÕ£¬£¬£¬Seqrite Labs°²È«×êÑÐÈËÔ±¸æ·¢´úºÅΪOperation IconCatµÄÍøÂç¹¥»÷»î¶¯£¬£¬£¬¸Ã¹¥»÷ͨ¹ý¼Ù×°³É³ÛÃû°²È«¹¤¾ßµÄ¶ñÒâÎĵµ£¬£¬£¬¶ÔÒÔÉ«ÁÐÐÅÏ¢¼¼Êõ¡¢¡¢ÈËÁ¦×ÊÔ´·þÎñ¼°Èí¼þ¿ª·¢µÈÐÐÒµÖ´Ðо«×¼ÉøÈë¡£¹¥»÷ÕßѡȡÉç»á¹¤³ÌѧÓ븴ÔÓ¼¼Êõ¼¿Á©½áºÏµÄ·½Ê½£¬£¬£¬³É¹¦Èƹý´«Í³°²È«·À»¤ÏµÍ³£¬£¬£¬Ôì³É¶àÆðÆóÒµÈëÇÖÊÂÎñ¡£Õâ´Î¹¥»÷Ô̺¬Á½Ìõ¶ÀÁ¢µ«Õ½ÊõÀàËÆµÄ¹¥»÷Á´Â·¡£µÚÒ»ÌõÁ´Â·ÒÔPDFÎĵµÎªÔØÌ壬£¬£¬´«²¼»ùÓÚPython¿ª·¢µÄPYTRIC¶ñÒâÈí¼þ¡£PYTRICͨ¹ýPyInstaller´ò°ü£¬£¬£¬¾ß±¸ÏµÍ³ÎļþɨÃè¡¢¡¢ÖÎÀíԱȨÏÞ¼ì²â¡¢¡¢Êý¾Ýɾ³ý¼°±¸·Ý¶Ï¸ùµÈ·ÛËéÐÔÖ°ÄÜ£¬£¬£¬²¢Í¨¹ýÃûΪ¡°Backup2040¡±µÄTelegram»úеÈËʵÏÖÔ¶³Ì½ÚÖÆ£¬£¬£¬×îÖÕÖ¸±ê²»½öÊÇÐÅÏ¢ÇÔÈ¡£¬£¬£¬¸üÔ̺¬Êý¾ÝÏú»Ù¡£µÚ¶þÌõÁ´Â·ÔòÀûÓÃWordÎĵµ´«²¼Rust˵»°±àдµÄRUSTRICÖ²È뷨ʽ¡£RUSTRIC¾ß±¸ÏȽøµÄ¿úËÅÄÜÁ¦£¬£¬£¬¿É¼ì²â28¿îÖ÷Á÷ɱ¶¾Èí¼þ£¬£¬£¬Í¨¹ýWindowsÖÎÀí¹æ·¶£¨WMI£©Ö´ÐÐϵͳºÅÁî¼ø±ðÊÜϰȾÉ豸£¬£¬£¬²¢Óë¹¥»÷Õß½ÚÀñ·þÎñÆ÷³ÉÁ¢ÓƾÃÏνӡ£
https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/
4. ŵÂüÄáÚ¿ÆÉý¼¶£º¶à¹úAIͶ×ÊÏÝÚåж¯Ïò
12ÔÂ24ÈÕ£¬£¬£¬Ë¹Âå·¥¿ËESET¹«Ë¾Êý¾ÝÏÔʾ£¬£¬£¬ÃûΪ¡°ÅµÂüÄᡱµÄͶ×Êڿƻ2025ÄêÔö·ù´ï62%£¬£¬£¬´«²¼ÁìÓò´ÓFacebookÀ©´óÖÁYouTubeµÈƽ̨£¬£¬£¬ÒÑÀ¹½Ø³¬6.4Íò¸öÓйضñÒâÁ´½Ó£¬£¬£¬ÖØÒªÓ°Ïì½Ý¿Ë¡¢¡¢ÈÕ±¾¡¢¡¢Ë¹Âå·¥¿Ë¡¢¡¢Î÷°àÑÀ¡¢¡¢²¨À¼Îå¹ú¡£¸ÃÚ¿Æ×Ô2024Äê12Ô³õ´ÎÅû¶ÒÔÀ´£¬£¬£¬Í¨¹ýÉ罻ýÌå¶ñÒâ¸æ°×¡¢¡¢·ÂðÆóÒµ¹Ù·½ÌûÎļ°AIÌìÉúÊÓÆµÍƼö£¬£¬£¬ÓÕµ¼Óû§Í¶×ÊÐéαÏîÄ¿£¬£¬£¬ÒÔ¸ß¶î»Ø±¨Îªµö¶üÖ´ÐÐÚ¿Æ¡£Êܺ¦ÕßÉêÇëÌáÏÖʱ£¬£¬£¬Ú¿Æ·Ö×Ó»áÒÔ¡°Ö§¸¶¶îÍâÓöȡ±¡°ÌṩÉí·ÝÖ¤/ÐÅÓþ¿¨ÐÅÏ¢¡±µÈÀíÓɽøÒ»²½Õ¥È¡×ʽ𡣼¼Êõ²ãÃæ£¬£¬£¬AIÌìÉúÊÓÆµµÄÕæÇжÈÏÔÖøÌáÉý£¬£¬£¬·Ö±æÂʸü¸ß¡¢¡¢ÈËÎï×÷ΪÓëºôÎü¸üÌìÈ»¡¢¡¢ÒôÊÓÆµÍ¬²½¸üÁ÷³©£¬£¬£¬ÃûÈË»»Á³ÊÓÆµµÄ´¹µö±íµ¥ÌîдÂÊÒò¶øÉÏÉý¡£ÐéαÄÚÈݳ£½áºÏÈȵãÊÂÎñ»ò³ÛÃûÈËÎï¼ÓÇ¿¿ÉÐŶȡ£Îª¶ã±Üƽ̨¼ì²â£¬£¬£¬Ú¿Æ¸æ°×ͨ³£½öͶ·ÅÊýСʱ£¬£¬£¬²¢Í¨¹ýÖØ¶¨ÏòÖÁÕý³£¼Ù×°Ò³Ãæ¡¢¡¢ÀÄÓÃÉ罻ýÌ叿°×ϵͳ±íµ¥¹¤¾ßµÈ·½Ê½½µµÍ±»·¢ÏÖ·çÏÕ¡£
https://thehackernews.com/2025/12/nomani-investment-scam-surges-62-using.html
5. MacSyncľÂíͨ¹ýÊðÃûÀûÓÃÈÆ¹ýmacOS°²È«»úÖÆ
12ÔÂ24ÈÕ£¬£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÃûΪMacSyncµÄÐÂÐÍmacOSÇÔÃÜľÂí±äÖÖ£¬£¬£¬Æäͨ¹ý¼Ù×°³É¼´Ê±Í¨Ñ¶Èí¼þ×°Ö÷¨Ê½µÄSwiftÀûÓô«²¼¡£°²È«×êÑÐÔ±Ö¸³ö£¬£¬£¬·ÖÆçÓÚÔçÆÚÒÀÀµÓû§ÊÖ¶¯²Ù×÷µÄ±äÖÖ£¬£¬£¬´Ë°æ±¾Ñ¡È¡¸ü¾ßºýŪÐÔµÄ×Ô¶¯¹¥»÷¼¿Á©¡£Ö»¹ÜÀûÓþ¹ýÊðÃûºÍ¹«Ö¤£¬£¬£¬¿ÉÔ¤·À±»Gatekeeper¡¢¡¢XProtectÀ¹½Ø£¬£¬£¬µ«×°Ö÷¨Ê½ÈÔÏÔʾ¡°ÓÒ¼ü´ò¿ª¡±×¢Ã÷ÒÔÈÆ¹ý°²È«·À»¤£¬£¬£¬Ä¿Ç°Æ»¹ûÒѳ·³ýÆä´úÂëÊðÃûÖ¤Êé¡£¸ÃľÂí¿ªÊÍÆ÷»ùÓÚSwift˵»°¿ª·¢£¬£¬£¬Ö´ÐÐǰ»á½øÐÐϵÁÐǰÖò鳣ºÑéÖ¤ÍøÂçÏνÓ״̬¡¢¡¢ÉèÖÃÔ¼3600ÃëµÄ×îСִÐоàÀë¡¢¡¢ÒƳýÎļþ¸ôÀëÊôÐÔ¼°ÑéÖ¤ÎļþÓÐЧÐÔ¡£ÆäÓÃÓÚ»ñÈ¡ÔØºÉµÄcurlºÅÁî²ÎÊý²úÉúÏÔÖø±ä¶¯£¬£¬£¬Åú×¢¹¥»÷Õß¿ÌÒâµ÷ÕûÔØºÉ»ñÈ¡ÓëÑéÖ¤·½Ê½£¬£¬£¬ÒÔÌáÉý¹¥»÷¿¿µÃסÐÔ»ò¶ã±Ü¼ì²â¡£´ËÍ⣬£¬£¬¹¥»÷Õßͨ¹ýǶÈëÎÞ¹ØPDFÎĵµ½«´ÅÅ̾µÏñ¾ÞϸÀ©³äÖÁ25.5MBÒÔ¶ã±Ü¼ì²â¡£¾½âÎö£¬£¬£¬¶ñÒâÔØºÉΪBase64±àÂëµÄMacSyncľÂí£¬£¬£¬ÊÇ2025Äê4Ô³õ´Î³öÏÖµÄMac.cľÂíµÄ¸ÄÃû°æ±¾¡£¾Ý·ÖÎö£¬£¬£¬¸ÃľÂíÄÚÖÃÖ°ÄÜÍêÕûµÄGo˵»°´úÀí·¨Ê½£¬£¬£¬²»½ö¿ÉÇÔÈ¡Êý¾Ý£¬£¬£¬»¹ÄÜʵÏÖÔ¶³Ì½ÚÖÆ²Ù×÷¡£
https://thehackernews.com/2025/12/new-macsync-macos-stealer-uses-signed.html
6. ÐͬȦÌ×½èÐéÎ±ÍøÂçÕÐÆ¸¸æ°×¶Ô×¼Öж«ºÍ±±·Ç
12ÔÂ24ÈÕ£¬£¬£¬¹ú¼ÊÍøÂ簲ȫ¹«Ë¾Group-IB×îл㱨¸æ·¢£¬£¬£¬Öж«ºÍ±±·ÇµØÓòÕýÔâ·ê¹æÄ£»£»¯ÐͬÐÔÐéÎ±ÍøÂçÕÐÆ¸¸æ°×ȦÌ×£¬£¬£¬Ú¿Æ·Ö×ÓÀûÓÃйÚÒßÇéºóÔ¶³Ì°ì¹«±é¼°Ç÷Ïò£¬£¬£¬Í¨¹ýÖÆ×÷Á¼ºÃµÄÉ罻ýÌ叿°×Ö´Ðо«×¼Ú¿Æ¡£¸ÃȦÌ×ÒÔ"ÇáËÉʵÏÖµ¥Ò»ÏßÉϹ¤×÷¼´¿É׬ȡ10ÖÁ170ÃÀÔªÈÕн"Ϊµö¶ü£¬£¬£¬ÊµÔò°µ²ØÇÔÈ¡²Æ²¯ÓëСÎÒÐÅÏ¢µÄÓÐ×éÖ¯·¸×ï»î¶¯¡£×êÑÐÏÔʾ£¬£¬£¬Öж«µØÓò³¬60%ÀͶ¯Õ߯«²îȫְԶ³Ì¹¤×÷£¬£¬£¬ÕâÒ»ÐÐΪת±ä±»Ú¿ÆÍÅ»ïÀûÓá£2025ÄêÕûÄ꣬£¬£¬Group-IB¼à²âµ½1500ÓàÌõÚ¿ÆÕÐÆ¸¸æ°×£¬£¬£¬ÖØÒª¼¯ÖÐÓÚ°£¼°¡¢¡¢º£Íå¹ú¶È¡¢¡¢°¢¶û¼°ÀûÑÇ¡¢¡¢Í»Äá˹¡¢¡¢Ä¦Âå¸ç¡¢¡¢ÒÁÀ¿ËºÍÔ¼µ©¡£Ú¿Æ¸æ°×ͨ¹ýFacebook¡¢¡¢Instagram¡¢¡¢TikTokµÈƽ̨°ä²¼£¬£¬£¬Ã°ÓóÛÃûµçÉÌÆ½Ì¨¡¢¡¢ÒøÐлòµ±¾Ö»ú¹¹ÃûÒ壬£¬£¬²¢Ñ¡È¡±¾µØ»¯ÊÊÅäÕ½Êõ¡ª¡ªÊ¹ÓõØÓò·½ÑÔ¡¢¡¢±¾µØÇ®±Òµ¥Ôª¼°ÊÜÖÚÊìϤµÄÆ·ÅÆÔªËØ£¬£¬£¬ÏÔÖøÌáÉý¸æ°×¿ÉÐŶȡ£Ú¿ÆÁ÷³Ì³öÏָ߶ÈÐͬÐÔ£ºÓû§»ØÓ¦¸æ°×ºó£¬£¬£¬¹µÍ¨±»Ñ¸ËÙ×ªÒÆÖÁWhatsApp»òTelegramµÈ¸öÈËͨѶÈí¼þ£¬£¬£¬Ú¿Æ·Ö×ÓÒÔ"ÈëÖ°ÉóºË"ΪÓÉË÷ȡСÎÒÐÅÏ¢¼°²ÆÕþÐÅÏ¢£¬£¬£¬²¢ÒªÇó½ÉÄÉѺ½ðÒÔ»ñÈ¡"¸ß±¨´ð¹¤×÷"¡£³õÆÚС¶î·µÀûÆÊØÐÅÀµºó£¬£¬£¬Ú¿Æ·Ö×Ó¼´Ê§Áª¡£
https://www.infosecurity-magazine.com/news/scams-mena-fake-online-job/


¾©¹«Íø°²±¸11010802024551ºÅ