DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
Ðû²¼Ê±¼ä 2025-07-101. DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Trellix¸ß¼¶Ñо¿ÖÐÐÄÅû¶һÆðÕë¶ÔÅ·ÖÞÍâ½»»ú¹¹µÄ¶¨ÏòÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬Æä±³ºóÒÉËÆÉæ¼°Ó¡¶ÈÅä¾°µÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯DoNot Team£¨±ð³ÆAPT-C-35µÈ£©¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2016ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬£¬£¬£¬ÒÔ¶¨ÖÆ»¯Windows¶ñÒâÈí¼þ£¨ÈçYTY¡¢GEditºóÃÅ£©Á¬ÏµÓã²æÊ½´¹ÂÚÓʼþΪÖ÷Òª¹¥»÷ÊֶΣ¬£¬£¬£¬£¬£¬ºã¾ÃÕë¶ÔÕþ¸®¡¢Íâ½»¡¢¹ú·À¼°·ÇÕþ¸®×éÖ¯Õö¿ªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬Ä¿µÄÇøÓò´Ëǰ¼¯ÖÐÓÚÄÏÑÇ£¬£¬£¬£¬£¬£¬´Ë´ÎÊ×´ÎÈ·ÈÏÆä¶ÔÅ·ÖÞÍâ½»ÁìÓòµÄÀ©ÕÅÐÔÉøÍ¸¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Á´Ê¼ÓÚαװ³ÉÒâ´óÀûפÃϼÓÀ¹ú¹ú·ÀÎä¹Ù»á¼ûÐг̵Ĵ¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýGmailÕË»§·¢ËÍUTF-8±àÂëµÄHTMLÃûÌÃÓʼþ£¬£¬£¬£¬£¬£¬Ê¹ÓÃÌØÊâ×Ö·û£¨Èç·¨Óï"Attach¨¦"£©ÔöÇ¿¿ÉÐŶȣ¬£¬£¬£¬£¬£¬ÓÕµ¼Ä¿µÄµã»÷GoogleÔÆ¶ËÓ²ÅÌÁ´½ÓÏÂÔØRARѹËõ°ü¡£¡£¡£¡£¡£¡£Ñ¹Ëõ°üÄÚº¬Î±×°ÎªPDFÎĵµµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬Êܺ¦Õß·¿ªºó½«´¥·¢LoptikModÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£¸ÃľÂíͨ¹ýÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯×¤Áô£¬£¬£¬£¬£¬£¬¾ß±¸ÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢ÎüÊÕÔ¶³ÌÖ¸Áî¡¢ÏÂÔØ¸½¼ÓÄ£¿£¿£¿£¿£¿£¿éµÈ¹¦Ð§£¬£¬£¬£¬£¬£¬²¢½ÓÄÉ·´ÐéÄâ»úÊÖÒÕºÍASCII»ìÏýÊÖÒÕ¹æ±ÜÇå¾²ÆÊÎö£¬£¬£¬£¬£¬£¬Í¬Ê±Í¨¹ýµ¥ÊµÀýÔËÐлúÖÆ×èÖ¹³åÍ»¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html
2. ÈÕ±¾ÐÂÈÕÌú×Ó¹«Ë¾ÔâÁãÈÕ¹¥»÷ÖÂÊý¾Ýй¶
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÈÕ±¾ÐÂÈÕÌú¼¯ÍÅÆìÏÂ×Ó¹«Ë¾ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾£¨Nippon Steel Solutions£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃδ¹ûÕæµÄÁãÈÕÎó²îÇÖÈëÆäÄÚ²¿ÍøÂ磬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¡¢ÏàÖúͬ°é¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾×¨×¢ÓÚÔÆÐ§ÀÍÓëÍøÂçÇå¾²½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒòÆäÊÖÒÕÅä¾°¶ø±¸ÊܹØ×¢¡£¡£¡£¡£¡£¡£2025Äê3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾¼à²âµ½Ð§ÀÍÆ÷Òì³£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬Ëæ¼´¸ôÀëÊÜÓ°Ïìϵͳ¡£¡£¡£¡£¡£¡£¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÕë¶ÔÍøÂç×°±¸µÄÁãÈÕÎó²îʵÑéÈëÇÖ£¬£¬£¬£¬£¬£¬Ôì³ÉÄÚ²¿ÍøÂçδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬²¿·ÖÃô¸ÐÊý¾Ý¿ÉÄܱ»ÇÔÈ¡¡£¡£¡£¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ç¿µ÷ÆäÔÆÐ§ÀÍÆ½Ì¨Î´Êܲ¨¼°£¬£¬£¬£¬£¬£¬ÓªÒµÒ»Á¬ÐÔδÊÜÖ±½ÓÓ°Ïì¡£¡£¡£¡£¡£¡£Æ¾Ö¤Í¨¸æ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸ÇÈýÀàÖ÷Ì壺¿Í»§Êý¾Ý°üÀ¨ÐÕÃû¡¢¹«Ë¾Ãû³Æ¡¢ËùÊô»ú¹¹¡¢Ö°Î»¡¢µØµã¡¢ÓÊÏä¼°µç»°£»£»£»£»£»£»£»ÏàÖúͬ°éÐÅÏ¢Éæ¼°ÐÕÃû¼°¹«Ë¾ÓòÃûÓÊÏ䣻£»£»£»£»£»£»Ô±¹¤Êý¾ÝÔò°üÀ¨ÐÕÃû¡¢²¿·Ö¡¢Ö°Î»¼°ÆóÒµÓÊÏä¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢ÕâЩÐÅÏ¢ÒÑͨ¹ýÉ罻ýÌå»ò°µÍøÀ©É¢£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÈÔ¾¯Ê¾Óû§Ð¡ÐÄ¿ÉÒÉͨѶ£¬£¬£¬£¬£¬£¬×èÖ¹µã»÷²»Ã÷Á´½Ó»ò»Ø¸´ÉúÊèÀ´µç¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¹«Ë¾ÒÑÍê³ÉÄÚ²¿ÍøÂçÇå¾²»Ö¸´£¬£¬£¬£¬£¬£¬²¢Ïò¾¯·½¼°ÈÕ±¾Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»£»£»£»£»£»£»¤Î¯Ô±»áÌá½»±¨¸æ£¬£¬£¬£¬£¬£¬ÍÆÐз¨¶¨Åû¶ÒåÎñ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/179766/data-breach/nippon-steel-solutions-data-breach.html
3. ÃÀ¹ú¼ÓÃÜATM¾ÞÍ·Bitcoin DepotÔâÓöÊý¾Ýй¶
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin Depot¿ËÈÕÅû¶һÆðÓ°Ïì2.7Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Í¨¹ýÐżþ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬£¬£¬£¬ÊÂÎñ¿É×·ËÝÖÁ2024Äê6ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ÆäÍøÂçÊ״μì²âµ½¿ÉÒɻ£¬£¬£¬£¬£¬£¬µ«ÒòÁª°îÖ´·¨»ú¹¹ÒªÇóÅäºÏÊӲ죬£¬£¬£¬£¬£¬Ö±ÖÁ7ÔÂ18ÈÕÄÚ²¿ÊÓ²ìÍê³Éºó·½ÄÜÆô¶¯Åû¶³ÌÐò¡£¡£¡£¡£¡£¡£Æ¾Ö¤Í¨¸æ£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄ¹¥»÷Õß»ñÈ¡Á˲¿·Ö¿Í»§ÔÚKYCÑéÖ¤Àú³ÌÖÐÌá½»µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¼°µç×ÓÓÊÏäµÈ¡£¡£¡£¡£¡£¡£Bitcoin DepotÔÚÈ«ÃÀ¡¢¼ÓÄô󼰰ĴóÀûÑÇÔËÓª×Å8800̨װ±¸£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°¹æÄ£ÆÕ±é¡£¡£¡£¡£¡£¡£ÓÉÓÚ¼ÓÃÜÇ®±ÒÉúÒâµÄÄäÃûÐÔÓë×ʽð¿ìËÙÁ÷×ªÌØÕ÷£¬£¬£¬£¬£¬£¬¹Å°å½ðÈÚÁìÓòµÄÉí·Ý¼à¿ØÓë·ÀµÁЧÀÍÔڴ˳¡¾°ÖÐÄÑÒÔʵÑé¡£¡£¡£¡£¡£¡£Bitcoin DepotÃ÷È·ÌåÏÖÎÞ·¨ÎªÊÜÓ°ÏìÓû§ÌṩÐÅÓñ£»£»£»£»£»£»£»¤»òÉí·Ý¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬×ª¶ø½¨ÒéÓû§×Ô¶¯¼à¿ØÕË»§Òì³£ÉúÒâ¡¢¶³½áÐÅÓñ¨¸æ²¢Ð¡ÐÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/
4. ÃÀ¹ú˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerboxй¶24.5ÍòÌõÃô¸ÐÊý¾Ý
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úµÃ¿ËÈøË¹ÖÝ˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerbox¿ËÈÕÒòδÉèÃÜÂë±£»£»£»£»£»£»£»¤µÄÊý¾Ý¿â̻¶£¬£¬£¬£¬£¬£¬µ¼ÖÂ245,949Ìõ¡¢×ܼÆ286.9GBµÄÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬£¬£¬º¸ÇÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢µØµã¡¢¼ÝʻִÕÕ¼°ÍËÎéÎäÊ¿DD214ÎļþµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷²¢±¨¸æÖÁvpnMentor¡£¡£¡£¡£¡£¡£×÷ΪרעÓÚ¹ÍÖ÷˰ÊÕ¼¤ÀøÍýÏ루ÈçWOTC¡¢ERTCµÈ£©µÄЧÀÍÉÌ£¬£¬£¬£¬£¬£¬RockerboxΪ²ÍÒû¡¢Âùݡ¢Ò½ÁƵȶà¸öÐÐÒµµÄÆóÒµÌṩ˰ÎñÓÅ»¯Ö§³Ö£¬£¬£¬£¬£¬£¬Æäй¶µÄ¿Í»§Êý¾ÝÉæ¼°ÖØ´óµÄ²ÆÎñÓëСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£³ýÖ±½Ó´æ´¢µÄPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©Í⣬£¬£¬£¬£¬£¬´ó×Ú˰ÊÕµÖÃâÉêÇëÎļþ¡¢Åú×¼/¾Ü¾øº¯¼°ÃÜÂë±£»£»£»£»£»£»£»¤PDFµÄÎļþÃûÒ²Ôâ̻¶£¬£¬£¬£¬£¬£¬²¿·ÖÎļþÃû¿ÉÄÜÒþº¬ÃÜÂëÏßË÷£¬£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÐÅÏ¢ÀÄÓÃΣº¦¡£¡£¡£¡£¡£¡£FowlerÖ¸³ö£¬£¬£¬£¬£¬£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ¼°½ðÈÚڲƣ¬£¬£¬£¬£¬£¬¶ÔÊÜÓ°ÏìСÎÒ˽¼Ò×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¡£ÊÂÎñ̻¶ºó£¬£¬£¬£¬£¬£¬FowlerÁ¬Ã¦Í¨ÖªRockerbox£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´×÷³öÕýʽ»ØÓ¦£¬£¬£¬£¬£¬£¬Êý¾Ý¿âÔÚÊýÈÕºó²Å±»¼ÓÃܱ£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£
https://hackread.com/rockerbox-server-tax-firm-exposed-sensitive-records/
5. AnatsaÒÆ¶¯¶ñÒâÈí¼þÔٴι¥»÷±±ÃÀÒøÐпͻ§
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±È·ÈÏ£¬£¬£¬£¬£¬£¬ºã¾Ã»îÔ¾µÄAndroidÒøÐÐľÂíAnatsa½üÆÚÕë¶Ô±±ÃÀ½ðÈÚ»ú¹¹ÌᳫÐÂÒ»ÂÖ¹¥»÷£¬£¬£¬£¬£¬£¬ºÉÀ¼ThreatFabric¹«Ë¾×·×ÙÏÔʾ£¬£¬£¬£¬£¬£¬ÕâÒÑÊÇÆäÖÁÉÙµÚÈý´Î½«ÃÀ¹úÓë¼ÓÄôóÒÆ¶¯ÒøÐÐÓû§ÁÐΪĿµÄ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼Í¼¼üÅÌÊäÈ뼰ͨ¹ýÔ¶³Ì¿ØÖÆÖ±½ÓʵÑéÚ²ÆÉúÒâµÄÄÜÁ¦£¬£¬£¬£¬£¬£¬ÆäÁ½½×¶Î¹¥»÷ģʽÒý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¡£¡£¡£±¾´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈÔÚÓ¦ÓÃÊÐËÁÉϼܿ´ËÆÕýµ±µÄ¹¤¾ßÀàÓ¦Óã¨ÈçÎļþÔĶÁÆ÷£©£¬£¬£¬£¬£¬£¬³õÆÚ¹¦Ð§Õý³£ÒÔ»ýÀÛÓû§ÐÅÈΡ£¡£¡£¡£¡£¡£´ýÏÂÔØÁ¿µÖ´ïÊýÍò´Îºó£¬£¬£¬£¬£¬£¬Í¨¹ý¸üÐÂ×¢Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬½«Anatsa×÷Ϊ×ÔÁ¦³ÌÐò×°ÖÃÖÁ×°±¸¡£¡£¡£¡£¡£¡£ÒÔ±¾´Î°¸ÀýΪÀý£¬£¬£¬£¬£¬£¬Ò»¿îÎļþÔĶÁÆ÷Ó¦ÓÃÔÚ6ÔÂ24ÈÕÖÁ30ÈÕʱ´úÍÆË͸üУ¬£¬£¬£¬£¬£¬Ï¼ÜǰÒÑÔÚÃÀ¹úPlayÊÐËÁÃâ·Ñ¹¤¾ß°ñѹµ¹Ò»ÇУ¬£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬5Íò´Î¡£¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬Anatsa´Ë´Î¹¥»÷Ä¿µÄÇåµ¥ÏÔÖøÀ©Õ¹£¬£¬£¬£¬£¬£¬ÁýÕÖÁ˸üÆÕ±éµÄÃÀ¹úÒÆ¶¯ÒøÐÐÓ¦Óᣡ£¡£¡£¡£¡£
https://therecord.media/anatsa-android-banking-malware-returns-north-america
6. FlirtAIÔ¼»áÖúÊÖÒòδÊܱ£»£»£»£»£»£»£»¤Ôƴ洢й¶16ÍòÕÅ˽ÃܽØÍ¼
7ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬µÂ¹ú°ØÁÖ¹«Ë¾Buddy Network GmbH¿ª·¢µÄiOSÓ¦ÓÃFlirtAI¿ËÈÕÒòÔÆ´æ´¢Çå¾²Îó²îÒý·¢ÑÏÖØÊý¾Ýй¶£¬£¬£¬£¬£¬£¬³¬16ÍòÕÅÓû§ÉÏ´«µÄ˽ÃÜ̸Ìì½ØÍ¼Ì»Â¶ÓÚ¹«¹²»¥ÁªÍø¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÖ÷´òAI¸¨ÖúÉç½»¹¦Ð§£¬£¬£¬£¬£¬£¬Óû§ÐèÊÖ¶¯½ØÈ¡Ô¼»áÈí¼þ¶Ô»°»òСÎÒ˽¼Ò×ÊÁϽçÃæ²¢ÉÏ´«£¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡ÎåÌõ¶¨Öƻظ´½¨Òé¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Æä¹È¸èÔÆ´æ´¢Í°Î´ÉèÖûá¼ûȨÏÞ¿ØÖÆ£¬£¬£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÊý¾Ýºã¾ÃÂã¶¡£¡£¡£¡£¡£¡£Êý¾ÝÏÔʾÇàÉÙÄêÓû§Õ¼±ÈÏÔÖø£¬£¬£¬£¬£¬£¬ÆäÉÏ´«µÄ½ØÍ¼°üÀ¨Í¬ÁäÈË˽ÃܶԻ°£¬£¬£¬£¬£¬£¬²¿·Öδ³ÉÄêÈË¿ÉÄÜÍêÈ«²»ÖªÏþ̸ÌìÄÚÈݱ»½ØÍ¼Íâй¡£¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬Ö»¹ÜÓ¦ÓÃÌõ¿îÒªÇó¡°ÉÏ´«Ç°Ðè»ñµÃ¶Ô»°·½ÊÚȨ¡±£¬£¬£¬£¬£¬£¬µ«ÏÖʵ²Ù×÷ÖÐÏÕЩÎÞ·¨Ö´ÐС£¡£¡£¡£¡£¡£ËäȻƻ¹ûÊÐËÁ±ê×¢17+ÄêËêÏÞÖÆ£¬£¬£¬£¬£¬£¬ÈÔδÄÜÓÐÓÃ×èֹδ³ÉÄêÈËʹÓᣡ£¡£¡£¡£¡£ÊÂÎñ´¦Öóͷ£Ê±¼äÏßÏÔʾ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±5ÔÂ6ÈÕ·¢Ã÷Îó²îºó£¬£¬£¬£¬£¬£¬ÓÚ5ÔÂ19ÈÕÏò¿ª·¢ÉÌת´ï£¬£¬£¬£¬£¬£¬6ÔÂ2ÈÕÁªÏµÅÌËã»úÓ¦¼±ÏìӦС×飨CERT£©£¬£¬£¬£¬£¬£¬×îÖÕÔÚ6ÔÂ16ÈÕÐÞ¸´´æ´¢Í°È¨ÏÞ¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/iphone-flirtai-app-leaks-chat-screenshots/


¾©¹«Íø°²±¸11010802024551ºÅ