ÃÀ¹ú¾ü¹¤³Ð°üÉÌÊý¾Ýй¶ÊÂÎñÆØ¹âÔ±¹¤Êý¾Ý

Ðû²¼Ê±¼ä 2025-12-09

1. ÃÀ¹ú¾ü¹¤³Ð°üÉÌÊý¾Ýй¶ÊÂÎñÆØ¹âÔ±¹¤Êý¾Ý


12ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¾üʳаüÉÌMAG AerospaceÓÚ8ÔÂÏÂÑ®ÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ËæºóÆô¶¯Ó¦¼±ÏìÓ¦²¢Í¨ÖªÊýǧÃû¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£×÷ΪÄêÊÕÈ볬14ÒÚÃÀÔª¡¢Ô±¹¤³¬1400È˵ľü¹¤ÆóÒµ£¬£¬£¬£¬£¬£¬£¬MAG AerospaceΪÃÀ¹ú¾ü·½ÌṩÇ鱨¡¢¼àÊÓºÍÕì̽ЧÀÍ£¬£¬£¬£¬£¬£¬£¬Æä¿Í»§º­¸ÇÃÀ¹ú½¾ü¡¢Áª°î½ôÆÈÊÂÎñÖÎÀí¾Ö£¨FEMA£©¡¢¹ú·ÀÇ鱨¾Ö£¨DIA£©µÈ½¹µãÕþ¸®»ú¹¹¡£¡£¡£ÊÂÎñÒòÓÉÓÚ¹«Ë¾ÍøÂçÄÚ·ºÆð¿ÉÒɻ¾¯±¨¡£¡£¡£Îª¿ØÖÆÓ°Ï죬£¬£¬£¬£¬£¬£¬MAG AerospaceѸËÙ½ÓÄɶàÏî²½·¥£º¸ôÀëÊÜÓ°Ïì×ʲú¡¢½ûÓÃÏà¹ØÕË»§¼°ÓòÃû¡¢×èÖ¹Íⲿ»á¼û¡¢ÖØÖÃÃÜÂë²¢ÁªÏµÖ´·¨²¿·Ö¡£¡£¡£ºóÐøÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßËä»á¼ûÁË¡°ÓÐÏ޵ĵç×Ӵ洢СÎÒ˽¼ÒÐÅÏ¢¡±£¬£¬£¬£¬£¬£¬£¬µ«Î´·¢Ã÷Êý¾Ý±»²»µ±´¦Öóͷ£µÄÖ¤¾Ý¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¹«Ë¾Î´Ã÷È·Åû¶Ïêϸй¶µÄÊý¾ÝÀàÐÍ¡£¡£¡£Îª±£»£»£»£»£»£»¤ÊÜÓ°ÏìÖ°Ô±£¬£¬£¬£¬£¬£¬£¬MAG AerospaceÌṩΪÆÚ24¸öÔµÄÃâ·Ñڲƭ¼ì²âºÍÉí·Ý͵ÇÔ±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¼øÓڸù«Ë¾Ëù´¦ÐÐÒµµÄÃô¸ÐÐÔ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄСÎÒ˽¼ÒÊý¾Ý¶ÔÍþвÐÐΪÕߺ͹ú¼Ò¼¶¹¥»÷Õß¾ßÓм«¸ß¼ÛÖµ¡£¡£¡£


https://cybernews.com/security/mag-aerospace-military-contractor-data-breach/


2. ÀÕË÷Èí¼þÍÅ»ïÀÄÓÃShanya´ò°üƽ̨Ìӱܼì²â²¢½ûÓÃEDR


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬¶à¸öÀÕË÷Èí¼þ×éÖ¯ÕýʹÓÃÃûΪShanyaµÄ´ò°ü¼´Ð§ÀÍÆ½Ì¨°²ÅŶñÒâÔØºÉ£¬£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©ÏµÍ³¡£¡£¡£¸Ãƽ̨ÓÚ2024ÄêβÐËÆð£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¼ÓÃÜ¡¢Ñ¹Ëõ¼°×Ô½ç˵°ü×°Æ÷ÊÖÒÕ»ìÏý¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬Ê¹ÓÐÓÃÔØºÉÔÚÄÚ´æÖнâÃÜÖ´Ðжø²»´¥¼°´ÅÅÌ£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¹æ±Ü´ó¶¼Çå¾²¹¤¾ß¼ì²â¡£¡£¡£Sophos Security¼à²âÏÔʾ£¬£¬£¬£¬£¬£¬£¬Í»Äá˹¡¢°¢ÁªÇõµÈ¶à¹úÒÑ·¢Ã÷º¬Shanya´ò°üºÛ¼£µÄ¶ñÒâÑù±¾£¬£¬£¬£¬£¬£¬£¬Medusa¡¢Qilin¡¢Crytox¼°AkiraµÈÀÕË÷Èí¼þ×éÖ¯¾ùÉæÆäÖУ¬£¬£¬£¬£¬£¬£¬ÆäÖÐAkiraʹÓÃÆµÂÊ×î¸ß¡£¡£¡£ShanyaµÄÔË×÷»úÖÆ°üÀ¨£º½«Óû§Ìá½»µÄ¶ñÒâÔØºÉǶÈëWindowsϵͳÎļþshell32.dllµÄÄÚ´æÓ³É丱±¾£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÁýÕÖÆäÍ·²¿¼°.text²¿·ÖʵÏÖÒþ²Ø¼ÓÔØ£»£»£»£»£»£»½ÓÄɷDZê׼ģ¿£¿£¿£¿£¿éÄÚ´æ¼ÓÔØÓëÆæÒì¼ÓÃÜËã·¨£¬£¬£¬£¬£¬£¬£¬È·±£Ã¿¸ö¿Í»§»ñµÃ¡°Ïà¶ÔΨһ¡±µÄ´æ¸ù£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿¼ì²âÄѶȡ£¡£¡£¸Ãƽ̨»¹Í¨¹ýŲÓÃRtlDeleteFunctionTableº¯Êý´¥·¢Òì³££¬£¬£¬£¬£¬£¬£¬×ÌÈÅÓû§Ä£Ê½µ÷ÊÔÆ÷ÆÊÎö£¬£¬£¬£¬£¬£¬£¬ÖÐÖ¹×Ô¶¯»¯¼ì²âÁ÷³Ì¡£¡£¡£ÀÕË÷Èí¼þÔÚ¹¥»÷Êý¾ÝÇÔÈ¡Óë¼ÓÃܽ׶Îǰ£¬£¬£¬£¬£¬£¬£¬³£Í¨¹ýDLL²à¼ÓÔØÊÖÒÕ½ûÓÃEDR¡£¡£¡£³ýÀÕË÷Èí¼þÍ⣬£¬£¬£¬£¬£¬£¬ClickFix»î¶¯ÒàʹÓÃShanya´ò°üCastleRAT¶ñÒâÈí¼þ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-edr-killers/


3. VS Code MarketplaceÏÖ¶ñÒâÀ©Õ¹ÇÔÈ¡¿ª·¢ÕßÃô¸ÐÐÅÏ¢


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíVisual Studio Code Marketplace¿ËÈÕÆØ³öÁ½¸ö¶ñÒâÀ©Õ¹³ÌÐòBitcoin BlackÓëCodo AI£¬£¬£¬£¬£¬£¬£¬ÓÉÐû²¼Õß"BigBlack"ÒÔÑÕÉ«Ö÷ÌâºÍAIÖúÊÖÐÎʽαװÉϼܣ¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѶԿª·¢ÕßÅÌËã»úÇå¾²×é³ÉÑÏÖØÍþв¡£¡£¡£¾ÝÇå¾²»ú¹¹Koi SecurityÅû¶£¬£¬£¬£¬£¬£¬£¬Bitcoin Blackͨ¹ý"*"¼¤»îÊÂÎñÔÚÿ´ÎVSCode²Ù×÷ʱ×Ô¶¯Ö´ÐУ¬£¬£¬£¬£¬£¬£¬ÔçÆÚ°æ±¾Ê¹ÓÃPowerShellÏÂÔØ¼ÓÃÜÓÐÓÃÔØºÉ²¢´¥·¢¿É¼û´°¿Ú£¬£¬£¬£¬£¬£¬£¬Ð°æÔò¸ÄÓÃÒþ²Ø´°¿ÚµÄÅú´¦Öóͷ£¾ç±¾Å²ÓÃcurlÏÂÔØ¶ñÒâDLL£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ¸üÒþ²ØµÄ¹¥»÷¡£¡£¡£Codo AIËäÉù³ÆÌṩChatGPT/DeepSeek´úÂ븨Öú¹¦Ð§£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵ°üÀ¨¶ñÒâÄ£¿£¿£¿£¿£¿é¡£¡£¡£ÕâÁ½¸öÀ©Õ¹¾ù½ÓÄÉDLLÐ®ÖÆÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬½«Õýµ±Lightshot½ØÍ¼¹¤¾ßÓë¶ñÒâDLLÀ¦°ó£¬£¬£¬£¬£¬£¬£¬ÒÔruntime.exeÃûÒå°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¶ñÒâÈí¼þ»áÔÚ"%APPDATA%\Local\Evelyn"Ŀ¼´æ´¢ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨Àú³ÌÏêÇé¡¢¼ôÌù°åÄÚÈÝ¡¢WiFiƾ֤¡¢ÏµÍ³ÐÅÏ¢¡¢ÆÁÄ»½ØÍ¼¡¢ÒÑ×°ÖóÌÐòÁÐ±í¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¨ÈçPhantom¡¢Metamask¡¢Exodus£©¡£¡£¡£ÎªÐ®ÖÆÓû§»á»°£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹»áÎÞÍ·Æô¶¯Chrome/Edgeä¯ÀÀÆ÷ÇÔÈ¡cookie£¬£¬£¬£¬£¬£¬£¬²¢Õë¶ÔÐÔËÑË÷ÃÜÂëÆ¾Ö¤¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-vscode-extensions-on-microsofts-registry-drop-infostealers/


4. PetcoÊý¾Ýй¶ÊÂÎñ²¨¼°¶àÖÝ£¬£¬£¬£¬£¬£¬£¬Ãô¸ÐÐÅÏ¢ÔâÆØ¹â


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬³èÎïÓÃÆ·¾ÞÍ·Petco֤ʵÉÏÖܱ¬·¢ÖØ´ó¿Í»§Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢¼ÝÕÕºÅÂë¡¢ÒøÐÐÕ˺š¢ÐÅÓÿ¨/½è¼Ç¿¨ÐÅÏ¢¼°³öÉúÈÕÆÚµÈÃô¸ÐÄÚÈÝ¡£¡£¡£Æ¾Ö¤µÂ¿ËÈøË¹ÖÝ¡¢¼ÓÖÝ¡¢ÂíÈøÖîÈûÖݺÍÃÉ´óÄÃÖÝ×ÜÉó²é³¤°ì¹«ÊÒÅû¶µÄÖ´·¨Í¨Öª£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÁýÕÖ¶àÖÝ£ºÂíÈøÖîÈûÖݽö1ÃûסÃñÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬ÃÉ´óÄÃÖÝ3Ãû£¬£¬£¬£¬£¬£¬£¬¶ø¼ÓÖÝÒòÖ´·¨ÒªÇóÏÔʾÊܺ¦ÕßÈËÊý¿ÉÄÜÔ¶³¬500ÈË£¬£¬£¬£¬£¬£¬£¬ÏêϸÊý×ÖPetcoÉÐδ¹ûÕæ¡£¡£¡£PetcoÔÚÉùÃ÷ÖÐ͸¶£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Ô´ÓÚ¡°Ä³¿îÈí¼þÓ¦ÓÃÉèÖÃÎÊÌâµ¼Ö²¿·ÖÎļþÔÚÏ߿ɻá¼û¡±£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÒÑ¡°Á¬Ã¦ÐÞ¸´Îó²î²¢ÊµÑéÌØÊâÇå¾²²½·¥¡±¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Î´»ØÓ¦¹ØÓÚÏêϸÊÜÓ°Ïì¿Í»§×ÜÊý¡¢ÊÖÒÕËÝÔ´ÄÜÁ¦¡¢ÎÊÌâ·¢Ã÷ʱ¼ä¼°ÉæÊÂÓ¦ÓõÈÒªº¦ÎÊÌâ¡£¡£¡£×÷ΪÄêЧÀͳ¬2400Íò¿Í»§µÄÐÐÒµ¾ÞÍ·£¬£¬£¬£¬£¬£¬£¬Petco½öÌåÏÖÒÑÏòÊÜÓ°ÏìСÎÒ˽¼Ò¡°Ìṩ¸ü¶àÐÅÏ¢¡±¡£¡£¡£PetcoÕýΪ¼ÓÖÝ¡¢ÂíÈøÖîÈûÖݺÍÃÉ´óÄÃÖÝÊܺ¦ÕßÌṩÃâ·ÑÐÅÓÃÓëÉí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ¡£¡£¡£


https://techcrunch.com/2025/12/08/petcos-security-lapse-affected-customers-ssns-drivers-licenses-and-more/


5. Tri-Century Eye CareÔâÀÕË÷¹¥»÷ÖÂ20ÍòÈËÊý¾Ýй¶


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú±öϦ·¨ÄáÑÇÖݰͿËË¹ÏØÌṩÑÛ¿ÆÕչ˻¤Ê¿Ð§À͵ÄTri-Century Eye CareÅûÂ¶ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÔ¼20ÍòÈË¡£¡£¡£¾ÝÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©Ò½ÁƱ£½¡Êý¾Ýй¶׷×ÙÆ÷ÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÔ´ÓÚ9ÔÂ3ÈÕ·¢Ã÷µÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÓÚ10ÔÂÏÂѮͨ¹ý¹ÙÍøÐû²¼Í¨Öª£¬£¬£¬£¬£¬£¬£¬ÈϿɻ¼Õß¼°Ô±¹¤µÄСÎÒ˽¼ÒÓëÊܱ£»£»£»£»£»£»¤¿µ½¡ÐÅÏ¢¿ÉÄÜÔâй¶¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬Ö»¹Üµç×Ó²¡Àúϵͳδ±»Ö±½ÓÈëÇÖ£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷Õß»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅÂë¡¢Ò½ÁÆÕï¶ÏÐÅÏ¢¡¢¿µ½¡°ü¹ÜÏêÇé¡¢Ö§¸¶¼Í¼¼°Ë°Îñ²ÆÎñÐÅÏ¢µÈÃô¸ÐÎļþ¡£¡£¡£PearÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡³¬3TBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬º­¸ÇÈËÁ¦×ÊÔ´¡¢²ÆÎñ¡¢ÓªÒµÎļþ¡¢µç×ÓÓʼþ¼°Êý¾Ý¿âµÈ£¬£¬£¬£¬£¬£¬£¬²¢¹ûÕæ²¿·ÖÎļþ£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÒòTri-Century¾Ü¾øÖ§¸¶Êê½ð¶ø½ÓÄÉÆØ¹âÐж¯¡£¡£¡£Tri-Century Eye CareÔÚ֪ͨÖÐÇ¿µ÷ÒѽÓÄɵ÷½â²½·¥£¬£¬£¬£¬£¬£¬£¬µ«Î´Ïêϸ˵Ã÷ÏêϸÊÖÒÕÐÞ¸´Ï¸½Ú»òºóÐø·À»¤¼Æ»®¡£¡£¡£


https://www.securityweek.com/tri-century-eye-care-data-breach-impacts-200000-individuals/


6. ÃÀ¹ú¶àËù´óѧÔâÍøÂç´¹ÂÚ¹¥»÷


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Infoblox×îб¨¸æÅû¶£¬£¬£¬£¬£¬£¬£¬2025Äê4ÔÂÖÁ11ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬ÖÁÉÙ18ËùÃÀ¹ú´óѧÔâÊÜÓÐ×éÖ¯ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÿªÔ´¹¤¾ßEvilginxÀÖ³ÉÈÆ¹ý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©£¬£¬£¬£¬£¬£¬£¬ÇÔȡѧÉú¼°½ÌÖ°¹¤ÕË»§ÐÅÏ¢¡£¡£¡£¸Ã¹¤¾ßͨ¹ýÖÐÐÄÈ˹¥»÷£¨AiTM£©Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÔÚÊܺ¦Õßµã»÷´¹ÂÚÁ´½Óºó½éÈëÆäÓë´óÑ§ÕæÊµµÇÂ¼Ò³ÃæÖ®¼ä£¬£¬£¬£¬£¬£¬£¬Ä£ÄâµÇ¼Á÷³Ì²¢ÇÔÈ¡Óû§Ãû¡¢ÃÜÂë¼°Íê³ÉMFAºóµÄ»á»°cookie£¬£¬£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÕË»§¡£¡£¡£¹¥»÷Á´½Ó¶à½ÓÄɶÌʱTinyURLαװ³ÉѧУµ¥µãµÇ¼£¨SSO£©ÃÅ»§£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿ÓÕÆ­ÐÔ¡£¡£¡£ÎªÑÚÊÎ×Ù¼££¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߯µÈÔÌæ»»¹¥»÷ÓòÃû£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃCloudflareµÈЧÀÍÒþ²ØÐ§ÀÍÆ÷λÖᣡ£¡£Infoblox̫ͨ¹ýÎöDNSģʽ£¬£¬£¬£¬£¬£¬£¬×·×Ùµ½¸ÃÒõıÖÐʹÓõĽü70¸ö²î±ðÓòÃû£¬£¬£¬£¬£¬£¬£¬Ê״ι¥»÷±¬·¢ÓÚ2025Äê4ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬Ä¿µÄΪʥµØÑǸç´óѧ¡£¡£¡£¾Ý¹¥»÷Á¿Í³¼Æ£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì×îÑÏÖØµÄǰÎåËùѧУΪ¼ÓÖÝ´óѧʥ¿Ë³×È·ÖУ¡¢¼ÓÖÝ´óѧʥ°Í°ÍÀ­·ÖУ¡¢Ê¥µØÑǸç´óѧ¡¢¸¥¼ªÄáÑÇÁª°î´óѧºÍÃÜЪ¸ù´óѧ¡£¡£¡£


https://hackread.com/us-universities-domains-phishing-attacks/