ClickFix¹¥»÷Õý´«²¼Vidar StealerÇÔÃÜľÂí
°ä²¼¹¦·ò 2026-05-091. ClickFix¹¥»÷Õý´«²¼Vidar StealerÇÔÃÜľÂí
5ÔÂ7ÈÕ£¬°Ä´óÀûÑÇÍøÂ簲ȫÖÐÐÄ£¨ACSC£©½üÈÕ°ä²¼ÖÒ¸æ³Æ£¬Ò»³¡ÀûÓÃClickFixÉç»á¹¤³Ì¼¼ÊõµÄ³ÖÐø¶ñÒâÈí¼þ¹¥»÷»î¶¯ÕýÔÚ´«²¼Vidar StealerÐÅÏ¢ÇÔȡľÂí£¬°Ä´óÀûÑǸ÷×éÖ¯ºÍ»ù´¡ÉèʩʵÌå³ÉÎªÖØÒªÖ¸±ê¡£¡£¡£¡£ÔÚÕâ´Î¹¥»÷ÖУ¬¹¥»÷ÕßÀûÓÃÁ˱»ÈëÇÖµÄWordPressÍøÕ¾£¬½«½Ó¼ûÕßÖØ¶¨Ïòµ½Ð¯´ø¶ñÒâÔØºÉµÄÒ³Ãæ¡£¡£¡£¡£Óû§½Ó¼ûºó»á¿´µ½Ò»¸öÐéαµÄCloudflareÑéÖ¤»òCAPTCHAÌáÐÑ£¬ÅúʾÆä¸´ÖƲ¢ÊÖ¶¯ÔÚϵͳÉÏÖ´ÐжñÒâPowerShellºÅÁ´Ó¶øµ¼ÖÂVidar StealerϰȾ¡£¡£¡£¡£Æä¹¥»÷Ö¸±êÔ̺¬ä¯ÀÀÆ÷ÃÜÂë¡¢¡¢¡¢Cookie¡¢¡¢¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢¡¢¡¢×Ô¶¯Ìî³äÐÅÏ¢¼°ÏµÍ³¾ßÌåÐÅÏ¢¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ´ËǰÒÑÔÚClickFix¹¥»÷Öб»·¢ÏÖ£¬²¢Í¨¹ýWindowsÐÞ¸´·¨Ê½¡¢¡¢¡¢TikTokÊÓÆµºÍGitHubµÈÇþµÀ´«²¼£¬¿ª·¢ÕßÈ¥Ä껹°ä²¼ÁËÖ°ÄÜÉý¼¶µÄа汾¡£¡£¡£¡£ACSCÖ¸³ö£¬VidarÔÚÊÜϰȾÉ豸ÉÏÆô¶¯ºó»á×Ô¶¯É¾³ý×ÔÉíµÄ¿ÉÖ´ÐÐÎļþ£¬×ª¶ø´ÓϵͳÄÚ´æÖÐÔËÐУ¬´Ó¶ø¼«´óÏ÷¼õȡ֤ºÛ¼£¡£¡£¡£¡£¡£´ËÍ⣬Ëüͨ¹ýTelegram»úеÈ˺ÍSteamСÎÒ×ÊÁϵȹ«¹²·þÎñ£¬ÀûÓá°ËÀÐÅÏ䡱URL»ñÈ¡ºÅÁîÓë½ÚÖÆ£¨C2£©·þÎñÆ÷µÄµØÖ·¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/australia-warns-of-clickfix-attacks-pushing-vidar-stealer-malware/
2. AI×ÔÖ÷¼ø±ðOTϵͳ£º£ºÄ«Î÷¸ç¹©Ë®¹«Ë¾ÔâÈëÇÖ
5ÔÂ7ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Dragos°ä²¼µÄÒ»·ÝÍþвµý±¨»ã±¨½ÒʾÁËһ··ÇͬѰ³£µÄÍøÂçÈëÇÖÊÂÎñ£º£ºÄ«Î÷¸çÃÉÌØÀ×ÊÐÒ»¼ÒÊÐÕþ¹©Ë®ºÍÅÅË®¹«ÓÃÊÂÒµ¹«Ë¾Ôâµ½ºÚ¿Í¹¥»÷£¬AnthropicµÄClaudeºÍOpenAIµÄGPTÄ£ÐÍÔÚÆäÖбíÑÝÁËÖ÷Ìâ½ÇÉ«£¬¹²Í¬×é³ÉһСÎÒ¹¤ÖÇÄܸ¨ÖúµÄÔËÓªÒýÇæ¡£¡£¡£¡£ÆäÖУ¬ClaudeÊÇÖØÒªµÄ¼¼ÊõÖ÷Á¦£¬ÕƹÜÈëÇÖ´òËã¡¢¡¢¡¢¹¤¾ß¿ª·¢ºÍÎÊÌâ½â¾ö£»£»£»¶øGPTÔòÕÆ¹ÜÊܺ¦ÕßÊý¾Ý´¦Öúͽṹ»¯»ã±¨¡£¡£¡£¡£Õâ´Î¹¥»÷ÊÇ2025Äê12ÔÂÖÁ2026Äê2ÔÂÆÚ¼äÕë¶Ô¶à¸öÄ«Î÷¸çµ±¾Ö»ú¹¹µÄ´ó¹æÄ£ÍøÂç¹¥»÷»î¶¯µÄÒ»²¿ÃÅ¡£¡£¡£¡£×êÑÐÈËÔ±½É»ñµÄ×îÒýÈËÖõÖ÷ÕųɾÍÖ®Ò»£¬ÊÇClaudeƾ¾Ý¹¥»÷Õß·´À¡²»ÐݱàдºÍÃÀÂúµÄÒ»¸ö³¤´ï17000ÐеÄPython¿ò¼Ü¡£¡£¡£¡£¸Ã¾ç±¾±»Claude¶¨ÃûΪ¡°BACKUPOSINT v9.0 APEX PREDATOR¡±£¬Ô̺¬49¸öÄ£¿é£¬º¸ÇÁË´ÓÆ¾Ö¤ÇÔÈ¡¡¢¡¢¡¢Active Directory¿úËŵ½Êý¾Ý¿â½Ó¼ûºÍȨÏÞÌáÉýµÈ¸÷¸ö·½Ãæ¡£¡£¡£¡£´Ó¹¤Òµ°²È«½Ç¶ÈÀ´¿´£¬×î¾ßÉîÔ¶Ó°ÏìµÄAI¸¨ÖúÐж¯ÊÇ£º£ºClaudeÔÚÄÚ²¿ÍøÂç¿úËŹý³ÌÖУ¬×ÔÖ÷¼ø±ð³öÁËһ̨ÔËÐÐ×ÅvNode SCADAºÍIIoTÖÎÀí½Ó¿ÚµÄÄÚ²¿·þÎñÆ÷¡£¡£¡£¡£Ëæºó£¬Claude·ÖÎöÁËvNode½Ó¿Ú£¬È·¶¨ÆäÒÀÀµµ¥Ò»ÃÜÂëÈÏÖ¤»úÖÆ£¬²¢½¨ÒéʹÓÃÃÜÂëÅçÈ÷¹¥»÷×÷Ϊ×î¿ÉÐеÄÈë¿ÚÏòÁ¿¡£¡£¡£¡£
https://www.securityweek.com/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion/
3. ÀÕË÷×éÖ¯RansomHouseÐû³Æ¹¥»÷Trellix
5ÔÂ8ÈÕ£¬ÀÕË÷Èí¼þ×éÖ¯RansomHouse½üÈÕÐû³Æ¶ÔÍøÂ簲ȫ¹«Ë¾TrellixÔâ·êµÄÍøÂç¹¥»÷ÕÆ¹Ü£¬²¢°ä²¼Á˾ݳÆÏÔʾÆäÒѽӼûTrellixÄÚ²¿·þÎñµÄÆÁÄ»½ØÍ¼ÒÔ×ôÖ¤Æä˵·¨¡£¡£¡£¡£½ñÄê5Ô³õ£¬TrellixÅû¶ÁËһ·°²È«·ì϶ÊÂÎñ£¬µ¼ÖÂÆä²¿ÃÅÔ´´úÂë¿âÔ⵽δ¾ÊÚȨµÄ½Ó¼û¡£¡£¡£¡£¸Ã¹«Ë¾°µÊ¾£¬ÒÑѸËÙÓë¶¥¼âȡ֤ר¼Ò·¢Õ¹µ÷²é£¬²¢Í¨ÖªÁË·¨Âɲ¿ÃÅ¡£¡£¡£¡£¹ÌÈ»¾ßÌå±»½Ó¼ûµÄÊý¾ÝÉв»Ã÷ÏÔ£¬µ«TrellixÇ¿µ÷£¬Ä¿Ç°Ã»ÓÐÖ¤¾ÝÅú×¢ÆäÔ´´úÂëÒѱ»´Û¸Ä»ò¶ñÒâÀûÓã¬Ò²Î´·¢ÏÖ´úÂë°ä²¼»ò·Ö·¢Á÷³ÌÊܵ½Ó°Ïì¡£¡£¡£¡£¸Ã¹«Ë¾³Ðŵ½«ÔÚµ÷²éʵÏÖºó×ÃÇé·ÖÏí¸ü¶àϸ½Ú¡£¡£¡£¡£Ä¿Ç°£¬TrellixÉÐδй©¹¥»÷ÕßµÄÉí·Ý¼°¾ßÌå¹¥»÷·½Ê½£¬Ò²²»Ã÷ÏÔ¹¥»÷Õß»ñµÃ´úÂë¿â½Ó¼ûȨÏÞµÄʱ³¤¡£¡£¡£¡£Ô´´úÂë¿âÔâδ¾ÊÚȨ½Ó¼û¿ÉÄÜ´øÀ´ÑÏÖØ·çÏÕ£º£º¹¥»÷Õß¿É×êÑдúÂëѰÕÒ·ì϶¡¢¡¢¡¢´´½¨¹¥»÷·¨Ê½»ò²ß¶¯¶¨Ïò¹¥»÷£¬Èô´Û¸ÄºóµÄ´úÂë±»·Ö·¢¸ø¿Í»§£¬»¹¿ÉÄÜÒý·¢ÖªÊ¶²úȨ͵ÇÔ¡¢¡¢¡¢ÃûÓþÊÜËð¼°¹©¸øÁ´·çÏÕ¡£¡£¡£¡£ËùÐÒTrellixÈ·ÈÏ£¬Ä¿Ç°ÎÞÖ¤¾ÝÅú×¢Æä´úÂë°ä²¼Á÷³Ì»ò²úÆ·Êܵ½ÇÖº¦¡£¡£¡£¡£
https://securityaffairs.com/191879/cyber-crime/ransomhouse-says-it-breached-trellix-and-exposes-internal-systems.html
4. Google PlayÚ²ÆÀûÓ㺣º»Ñ³Æ²éͨ»°¼Í¼ʵΪƶ©ÔÄ·Ñ
5ÔÂ8ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±ÔÚ¹Ù·½Google PlayÉ̵귢ÏÖÁËÒ»ÅúÚ²ÆÐÔ°²×¿ÀûÓã¬ËüÃǻѳƿÉÄܽӼûËÁÒâµç»°ºÅÂëµÄͨ»°¼Í¼¡¢¡¢¡¢¶ÌÐÅÉõÖÁWhatsApp¼Í¼£¬ÏÖʵÖ÷ÕÅÊÇÓÕÆÓû§¸¶·Ñ¶©ÔÄÐéα·þÎñ£¬×îÖÕÔì³ÉÓû§¾¼ÃËðʧ¡£¡£¡£¡£ÕâÅúÓÉESET¶¨ÃûΪ¡°CallPhantom¡±µÄ¹¥»÷»î¶¯ÖØÒªÕë¶ÔÓ¡¶È¼°ÑÇÌ«µØÓòÓû§£¬28¿îÀûÓÃÔÚ±»Ï¼ÜǰÀÛ¼ÆÏÂÔØÁ¿³¬¹ý730Íò´Î£¬ÆäÖе¥¿îÀûÓÃÏÂÔØÁ¿¾Í³¬¹ý300Íò´Î¡£¡£¡£¡£ÕâЩÀûÓÃÐû³Æ¿É²é¿´ÈκκÅÂëµÄͨ»°ÏêÇ飬Óû§¸¶¿îºóÈ´Ö»ÄÜ»ñµÃËæ»úÌìÉú»òÓ²±àÂëÔÚÔ´´úÂëÖеÄÐéαÊý¾Ý¡£¡£¡£¡£ÖÁÉÙÒ»¿îÀûÓÃÒÔ¡°Indian gov.in¡±µÄ¿ª·¢ÕßÃû³Æ°ä²¼£¬ÊÔͼ³ÉÁ¢ÐéαÐÅÀµ¸Ð¡£¡£¡£¡£Êܺ¦Õß±»ÒªÇóͨ¹ýGoogle Play¹Ù·½½áËãϵͳ¡¢¡¢¡¢Í³Ò»Ö§¸¶½Ó¿ÚµÚÈý·½ÀûÓã¨ÈçGoogle Pay¡¢¡¢¡¢PhonePe£©»òÖ±½ÓÌîд֧¸¶¿¨ÐÅÏ¢½øÐж©ÔÄ£¬¼ÛÖµ´ÓÔ¼6ÃÀÔªµ½80ÃÀÔª²»µÈ¡£¡£¡£¡£²¿ÃÅÀûÓû¹¶îÍâʹÓúýŪ¼¿Á©£º£ºÓû§Í˳öʱ£¬ÀûÓûá»Ñ³ÆÄ³ºÅÂëµÄͨ»°¼Í¼ÒÑ·¢ËÍÖÁÓÊÏ䣬µã»÷֪ͨºóÖ±½ÓÌø×ªµ½¶©ÔÄÒ³Ãæ¡£¡£¡£¡£
https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html
5. NVIDIA֤ʵGeForce NOWÓû§Êý¾ÝÔâй¶
5ÔÂ8ÈÕ£¬NVIDIAÔÚÒ»·ÝÉêÃ÷ÖÐ֤ʵ£¬GeForce NOWÔÆÓÎÏ··þÎñµÄÓû§ÐÅÏ¢ÔÚÒ»´ÎÊý¾Ýй¶ÊÂÎñÖÐÔ⵽й¶¡£¡£¡£¡£NVIDIA°µÊ¾£¬Æäµ÷²é·¢ÏÖ¹«Ë¾ÔËÓªµÄ·þÎñδÊÜÓ°Ï죬ÎÊÌâ½öÏÞÓÚλÓÚÑÇÃÀÄáÑǵĵÚÈý·½GeForce NOWÁªÃ˺Ï×÷ͬ°éÔËÐеÄϵͳ£¬¹«Ë¾ÕýÓë¸ÃºÏ×÷ͬ°éçÇÃܺÏ×÷Ö§³Öµ÷²éºÍ½â¾ö¹æ»®£¬ÊÜÓ°ÏìµÄÓû§½«Í¨¹ýGFN.amÊÕµ½Í¨Öª¡£¡£¡£¡£Õâ·ÝÉêÃ÷ÊǶÔÉÏÖܺڿÍÂÛ̳ÉÏÒ»¸öʹÓÃShinyHuntersêdzƵÄÍþвÐÐΪÕß°ä²¼Ìû×ӵĻØÓ¦£¬¸ÃÌû×ÓÐû³ÆÒÑÈëÇÖGeForce NOW·þÎñ²¢ÇÔÈ¡ÁËÊý°ÙÍòÓû§¼Í¼¡£¡£¡£¡£²»Í⣬¸ÃÍþвÐÐΪÕß±»ÒÔΪÊÇShinyHuntersµÄðÃû¶¥ÌæÕß¡£¡£¡£¡£¾Ý¸ÃÍþвÐÐΪÕ߳ƣ¬±»µÁÐÅÏ¢Ô̺¬È«Ãû¡¢¡¢¡¢µç×ÓÓʼþµØÖ·¡¢¡¢¡¢Óû§Ãû¡¢¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢¡¢»áԱ״̬ºÍË«³É·ÖÈÏ֤״̬£¬Æä»¹°ä²¼ÁËÊý¾ÝÑù±¾£¬²¢Ìá³öÒÔ10ÍòÃÀÔªµÄ±ÈÌØ±Ò»òÃÅÂÞ±ÒÏúÊÛÆëÈ«Êý¾Ý¿â¡£¡£¡£¡£GFN.amËæºó°ä²¼ÉêÃ÷֤ʵ£¬3ÔÂ20ÈÕÖÁ26ÈÕÆÚ¼ä²úÉúÁËÒ»Â·ÍøÂ簲ȫÊÂÎñ£¬Ð¹Â¶ÁËÈ«Ãû¡¢¡¢¡¢µç×ÓÓʼþ¡¢¡¢¡¢µç»°ºÅÂ루ÈôÊÇͨ¹ýÒÆ¶¯ÔËÓªÉÌ×¢²á£©¡¢¡¢¡¢µ®ÉúÈÕÆÚºÍÓû§ÃûµÈÐÅÏ¢¡£¡£¡£¡£GFN.am³ÎÇ壬Õâ´ÎÊÂÎñÖÐûÓÐÈκÎÕË»§ÃÜÂëй¶£¬3ÔÂ9ÈÕÖ®ºó×¢²á¸Ã·þÎñµÄÓû§¾ù²»ÊÜÓ°Ïì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/
6. Zara 19.7Íò¿Í»§Êý¾Ýй¶£º£ºShinyHunters×÷°¸Ï¸½ÚÆØ¹â
5ÔÂ8ÈÕ£¬¾ÝÊý¾Ýй¶¼à²âƽ̨Have I Been PwnedÅû¶£¬Î÷°àÑÀ¿ìʱÉÐÆ·ÅÆZaraÔâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ£¬ºÚ¿ÍÇÔÈ¡ÁË197,400Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Õâ´Îй¶µÄÊý¾Ýº¸ÇΨһµç×ÓÓʼþµØÖ·¡¢¡¢¡¢µØÀíµØÎ»¡¢¡¢¡¢²úÆ·SKU¡¢¡¢¡¢¶©µ¥ID¼°Ö§³Ö¹¤µ¥ÆðÔ´µÈÒµÎñ¹ØÁªÐÅÏ¢£¬µ«Î´Ô̺¬¿Í»§ÐÕÃû¡¢¡¢¡¢µç»°¡¢¡¢¡¢µØÖ·¡¢¡¢¡¢Ö§¸¶Æ¾Ö¤µÈÖ÷ÌâÒþÖÔÊý¾Ý¡£¡£¡£¡£Ð¹Â¶Ô´×·ÒäÖÁZaraĸ¹«Ë¾Inditex¼¯ÍŵÄǰ¼¼ÊõÌṩÉÌÍйÜÊý¾Ý¿â¡£¡£¡£¡£Inditex¼¯ÍÅÉêÃ÷³Æ£¬ÆäÔËӪϵͳδÊÜÓ°Ï죬µ«Î´Åû¶¾ßÌ幩¸øÉÌÃû³Æ»ò¹é×ïÍþвÐÐΪÕß¡£¡£¡£¡£È»¶ø£¬ÀÕË÷ÍÅ»ïShinyHuntersÒÑ×Ô¶¯ÈÏÁìÕâ´Î¹¥»÷£¬²¢¹«¿ªÁË140GBµÄй¶µµ°¸¡£¡£¡£¡£¸ÃÍÅ»ïÐû³ÆÍ¨¹ý±»µÁµÄAnodotÉí·ÝÑéÖ¤ÁîÅÆ£¬´ÓBigQueryʵÀýÖÐÌáÈ¡Êý¾Ý£¬²¢Ð¹Â©ÆäÔø³¢ÊÔ¹¥»÷SalesforceʵÀýµ«±»AI¼ì²âϵͳ×èÖ¹¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/zara-data-breach-exposed-personal-information-of-197-000-people/


¾©¹«Íø°²±¸11010802024551ºÅ