°Í¶ûµÄĦÊаÙÍòÃÀÔªBECÕ©Æ­°¸Ì»Â¶ÏµÍ³ÐÔÇå¾²Îó²î

Ðû²¼Ê±¼ä 2025-09-02

1. °Í¶ûµÄĦÊаÙÍòÃÀÔªBECÕ©Æ­°¸Ì»Â¶ÏµÍ³ÐÔÇå¾²Îó²î


9ÔÂ1ÈÕ£¬£¬ £¬°Í¶ûµÄĦÊнüÆÚÅû¶һÆðÖØ´óÉÌÒµµç×ÓÓʼþй¶£¨BEC£©¹¥»÷ÊÂÎñ£¬£¬ £¬Õ©Æ­Õßͨ¹ýαÔìÉí·Ý¡¢¸Ä¶¯¹©Ó¦ÉÌÒøÐÐÐÅÏ¢µÈÊֶΣ¬£¬ £¬´ÓÊÐÕþ²¿·ÖÇÔÈ¡³¬150ÍòÃÀÔª£¬£¬ £¬Í¹ÏÔ¹«¹²»ú¹¹ÔÚÍøÂçÇå¾²Óë²ÆÎñÄÚ¿ØÖеÄÑÏÖØÎó²î¡£¡£¡£¡£Æ¾Ö¤¼à²ì³¤°ì¹«ÊÒÊӲ죬£¬ £¬2025Äê2ÔÂÖÁ3ÔÂʱ´ú£¬£¬ £¬¸ÃÊÐÓ¦¸¶Õ˿·Ö£¨AP£©·ÖÁ½´ÎÏòÕ©Æ­Õß¿ØÖƵÄÒøÐÐÕË»§×ªÕ˹²¼Æ1,524,621.04ÃÀÔª¡£¡£¡£¡£Õ©Æ­ÕßÓÚ2024Äê12ÔÂͨ¹ýÐéαÓÊÏäð³ä¹©Ó¦ÉÌÔ±¹¤£¬£¬ £¬ÇÖÈëÆäWorkdayϵͳ²¢¸Ä¶¯ÒøÐÐÕË»§ÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÕ©Æ­ÕßÌá½»µÄ±í¸ñ±£´æÐÅÏ¢¹ýʧ£¬£¬ £¬ÇÒ¶à´ÎʵÑé±ä»»ÒøÐÐϸ½Ú£¬£¬ £¬µ«AP²¿·ÖÈýÃûÔ±¹¤¾ùδִÐлù±¾ºËʵ³ÌÐò£¬£¬ £¬×îÖÕÅú×¼ÁËڲƭÐÔÇëÇ󡣡£¡£¡£ÊÂÎñ̻¶³ö¶àÖØÎÊÌ⣺Ê×ÏÈ£¬£¬ £¬AP²¿·Öȱ·¦¹©Ó¦ÉÌÐÅÏ¢ºËÑé»úÖÆ£¬£¬ £¬¼´±ãÔÚ2019Äê¡¢2022ÄêÏȺóÒòÐéÎ±ÒøÐÐÐÅÏ¢±ä»»Ëðʧ6.2Íò¼°37.6ÍòÃÀÔªºó£¬£¬ £¬ÈÔ佨ÉèÓÐÓðü¹Ü²½·¥£»£»£»£»£»£»Æä´Î£¬£¬ £¬ÄÚ²¿¿ØÖÆÐÎͬÐéÉ裬£¬ £¬Ô±¹¤¶à´ÎδºËʵÎļþÕæÊµÐÔ¼´Í¨¹ýÒªº¦²Ù×÷£»£»£»£»£»£»±ðµÄ£¬£¬ £¬ÊÐÕþϵͳ¶Ô¹©Ó¦ÉÌÕË»§µÄ»á¼ûȨÏÞÖÎÀí±£´æÊè©£¬£¬ £¬µ¼ÖÂÕ©Æ­ÕßÄܺã¾ÃÉøÍ¸²¢Ð޸Ľ¹µãÊý¾Ý¡£¡£¡£¡£


https://securityaffairs.com/181772/cyber-crime/fraudster-stole-over-1-5-million-from-city-of-baltimore.html


2. ÍøÂç·¸·¨·Ö×ÓʹÓÃMeta¹ã¸æÆ½Ì¨Èö²¥Brokewell¶ñÒâÈí¼þ


8ÔÂ31ÈÕ£¬£¬ £¬ÍøÂç·¸·¨·Ö×ÓÀÄÓÃMetaÆìÏÂÉ罻ƽ̨µÄ¹ã¸æÏµÍ³£¬£¬ £¬Í¨¹ýαÔì×ÅÃû½ðÈÚÆÊÎö¹¤¾ßTradingViewµÄÐéα¹ã¸æ£¬£¬ £¬ÏòAndroidÓû§¶¨ÏòÈö²¥¾ß±¸¶àÖØÇÔÃܹ¦Ð§µÄBrokewell¶ñÒâÈí¼þ£¬£¬ £¬ÐγÉÕë¶Ô¼ÓÃÜÇ®±Ò×ʲúµÄ¾«×¼¹¥»÷Á´Ìõ¡£¡£¡£¡£¾ÝBitdefenderÇå¾²ÍŶÓÅû¶£¬£¬ £¬¸Ã»î¶¯×Ô7ÔÂ22ÈÕÆðͨ¹ýÔ¼75¸öÍâµØ»¯¹ã¸æÕö¿ª£¬£¬ £¬¹ã¸æÄÚÈÝÒÔ"Ãâ·Ñ»ñÈ¡TradingView Premium"ΪÓÕ¶ü£¬£¬ £¬½ö¶ÔAndroid×°±¸Óû§Õ¹Ê¾¶ñÒâÄÚÈÝ£¬£¬ £¬ÆäËûϵͳ»á¼ûÔòÏÔʾÎÞº¦Ò³Ãæ¡£¡£¡£¡£¹¥»÷Á÷³ÌÉè¼ÆÏ¸ÃÜ£ºÊܺ¦Õßµã»÷¹ã¸æºó»á±»Öض¨ÏòÖÁ·ÂðTradingView¹ÙÍøµÄ´¹ÂÚÒ³Ãæ£¬£¬ £¬ÓÕµ¼ÏÂÔØÎ±×°³ÉÓ¦ÓøüеÄtw-update.apkÎļþ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×°Öúó»áÁ¬Ã¦ÇëÇó¸¨Öú¹¦Ð§È¨ÏÞ£¬£¬ £¬Í¨¹ýµ¯³öÐéαϵͳ¸üÐÂÌáÐÑÑÚÊκǫ́²Ù×÷£¬£¬ £¬×Ô¶¯ÊÚÓè×°±¸ÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¸üÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬Èí¼þ»áÄ£ÄâAndroidϵͳÉý¼¶½çÃæ£¬£¬ £¬ÓÕÆ­Óû§ÊäÈëËøÆÁPINÂ룬£¬ £¬ÎªºóÐø³¤ÆÚ»¯¿ØÖÆÆÌ·¡£¡£¡£¡£×÷Ϊ×Ô2024ÄêÍ·»îÔ¾µÄ¶ñÒâ³ÌÐò£¬£¬ £¬Brokewell´Ë´ÎÕ¹ÏÖµÄ"¸ß¼¶°æ±¾"¹¦Ð§ÖÜÈ«Éý¼¶¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/brokewell-android-malware-delivered-through-fake-tradingview-ads/


3. ºÚ¿ÍÉù³ÆÈëÇÖÁËAT&T£¬£¬ £¬ÇÔÈ¡2400ÍòÓû§Êý¾Ý


9ÔÂ1ÈÕ£¬£¬ £¬¹¥»÷ÕßÉù³ÆÒÑÀÖ³ÉÈëÇÖÃÀ¹úµçОÞÍ·AT&TµÄ½¹µã»ù´¡ÉèÊ©£¬£¬ £¬²¢ÔÚµØÏÂÂÛ̳Ðû³ÆÍ¨¹ý°²ÅŶ¨ÖƶñÒâÈí¼þ»ñµÃʵʱ¶Á/дȨÏÞ£¬£¬ £¬¿ÉÄÜÓ°ÏìÊý°ÙÍòÓû§¡£¡£¡£¡£¾ÝºÚ¿ÍÔÚ°µÍøÐû²¼µÄÌû×ÓÐÎò£¬£¬ £¬ÆäÇÖÈëÐÐΪÒÑÒ»Á¬ÊýÖÜδ±»¼ì²âµ½£¬£¬ £¬²¢Éù³ÆÕÆÎÕÁËÒ»¸ö°üÀ¨Ô¼2400ÍòAT&TÓû§Êý¾ÝµÄ¶¯Ì¬Êý¾Ý¿â£¬£¬ £¬¿ÉʵʱÐÞ¸ÄÓû§ÐÅÏ¢²¢Ö´ÐÐSIM½»Á÷¹¥»÷¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬ £¬CybernewsÑо¿ÍŶÓÉÐδÄÜÑéÖ¤ÕâЩ˵·¨µÄÕæÊµÐÔ£¬£¬ £¬Ïà¹ØÊý¾ÝÑù±¾ÍøÕ¾Ò²´¦ÓÚÎÞ·¨»á¼û״̬¡£¡£¡£¡£´Ë´ÎÊÂÎñµÄ½¹µãÍþвÔÚÓÚ¹¥»÷ÕßÐû³ÆµÄÈý´óÄÜÁ¦£ºÆäÒ»£¬£¬ £¬Í¨¹ý¸Ä¶¯Óû§µç»°ºÅÂëÓëSIM¿¨µÄ°ó¶¨¹ØÏµ£¬£¬ £¬ÊµÑéSIM½»Á÷¹¥»÷£»£»£»£»£»£»Æä¶þ£¬£¬ £¬Èƹý»ùÓÚ¶ÌÐŵÄË«ÒòËØÈÏÖ¤£¨2FA£©£¬£¬ £¬Ö±½Ó¶ÁÈ¡ÒøÐС¢É罻ýÌåµÈЧÀ͵Ķþ´ÎÑéÖ¤´úÂ룻£»£»£»£»£»ÆäÈý£¬£¬ £¬»á¼û°üÀ¨Ë°ÎñID¡¢ÐÕÃû¡¢IPµØµãµÈÃô¸ÐÐÅÏ¢µÄÓû§Êý¾Ý¿â£¬£¬ £¬ÈôÊôʵ½«×é³ÉÖØ´óÊý¾Ýй¶¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬AT&TÉÐδ¶Ô´Ë×÷³ö¹ûÕæ»ØÓ¦£¬£¬ £¬CybernewsÍŶÓÕýÒ»Á¬×·×Ù°µÍøÊý¾ÝÑù±¾¡£¡£¡£¡£


https://cybernews.com/security/att-data-breach-impacted-millions-hackers-say/


4. ±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÔâÀÕË÷Èí¼þ¹¥»÷


9ÔÂ1ÈÕ£¬£¬ £¬ÃÀ¹ú±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒ£¨OAG£©¿ËÈÕÈ·ÈÏÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬µ¼ÖÂÆäЧÀÍÆ÷ÓÚ8Ô³õ±»ÆÈÏÂÏߣ¬£¬ £¬ÐÌÊÂÓëÃñʰ¸¼þÉóÀí·ºÆðÑÓÎ󡣡£¡£¡£¸ÃÖÝ×ÜÉó²é³¤´÷·ò¡¤É­µÏ£¨Dave Sunday£©ÔÚ8ÔÂ29ÈÕµÄת´ïÖÐ֤ʵ£¬£¬ £¬´Ë´ÎÖÐÖ¹ÓÉÍⲿְԱͨ¹ý¼ÓÃÜÎļþʵÑ飬£¬ £¬¹¥»÷ÕßÒªÇóÖ§¸¶Êê½ðÒÔ»Ö¸´ÔËÓª£¬£¬ £¬µ«×èÖ¹ÏÖÔÚOAGÉÐδ֧¸¶ÈκÎÊê½ð¡£¡£¡£¡£Ö»¹ÜδÃ÷È·Êý¾ÝÊÇ·ñ±»µÁ£¬£¬ £¬É­µÏÌåÏÖÕýÓëÆäËû»ú¹¹¿ªÕ¹ÁªºÏÊӲ죬£¬ £¬²¢Ç¿µ÷¡°ÈôÊÓ²ìÏÔʾÓÐÐëÒª£¬£¬ £¬½«ÏòÏà¹ØÐ¡ÎÒ˽¼Ò·¢ËÍ֪ͨ¡±£¬£¬ £¬µ«Î´½øÒ»²½Í¸Â¶ÊÓ²ìϸ½Ú»òÓ¦¶Ô²½·¥¡£¡£¡£¡£×÷Ϊ±öÖÝ×î¸ßÖ´·¨»ú¹¹£¬£¬ £¬OAGÈÏÕæÌáÆðÐÌÊÂËßËÏ¡¢Ö´ÐÐÏûºÄÕß±£»£»£»£»£»£»¤·¨µÈ½¹µãÖ°ÄÜ¡£¡£¡£¡£´Ë´ÎÍøÂçÊÂÎñµ¼ÖÂÈ«Öݶà¼Ò·¨Ôº±»ÆÈÑÓÉì°¸¼þÉóÀíÏÞÆÚ¡£¡£¡£¡£ÊÂÎñÊ×´ÎÅû¶ÓÚ8ÔÂ18ÈÕ£¬£¬ £¬ÆäʱOAGÍøÕ¾¡¢°ì¹«ÓÊÏä¼°Àο¿µç»°ÖÜȫ̱»¾£¬£¬ £¬Ö±½ÓÓ°ÏìÆäÓ빫ÖÚ¼°ÀûÒæÏà¹ØÕßµÄÏàͬ¡£¡£¡£¡£×èÖ¹×îÐÂת´ï£¬£¬ £¬OAG´ó²¿·ÖÊÂÇéÖ°Ô±Òѻָ´ÓÊÏä»á¼ûȨÏÞ£¬£¬ £¬Ö÷µç»°Ïߺ͹ٷ½ÍøÕ¾ÒàÖØÐÂÉÏÏߣ¬£¬ £¬µ«ËùÓй¦Ð§µÄ»Ö¸´ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£É­µÏÖ¸³ö£¬£¬ £¬È«ÖÝ17¸ö°ì¹«ËùÔÚµÄÔ¼1200ÃûÔ±¹¤ÈÔÔÚͨ¹ýÌæ»»ÇþµÀά³ÖÒ»Ñùƽ³£ÊÂÇé¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/ransomware-pennsylvania-ag/


5. Silver FoxʹÓÃÊðÃûÇý¶¯³ÌÐò°²ÅÅValleyRATºóÃÅ


9ÔÂ1ÈÕ£¬£¬ £¬Check Point Research£¨CPR£©¿ËÈÕÅû¶£¬£¬ £¬Ó볯ÏʹØÁªµÄSilver Fox APT×éÖ¯ÕýʹÓÃ΢ÈíÊðÃûµÄÕýµ±Çý¶¯³ÌÐòʵÑéÐÂÐÍÍøÂç¹¥»÷£¬£¬ £¬Í¨¹ý"×Ô´øÎó²îÇý¶¯³ÌÐò£¨BYOVD£©"ÊÖÒÕÈÆ¹ýÇå¾²·À»¤£¬£¬ £¬°²ÅÅÄ£¿£¿£¿£¿£¿é»¯ºóÃÅValleyRAT¡£¡£¡£¡£¸Ã×éÖ¯ÀÄÓÃWatchDog AntimalwareÇý¶¯³ÌÐò£¨amsdk.sys£©ºÍZemanaÇý¶¯£¨ZAM.exe£©£¬£¬ £¬Ê¹ÓÃÆäí§ÒâÀú³ÌÖÕÖ¹¹¦Ð§£¬£¬ £¬Ç¿ÐÐÖÕÖ¹·À²¡¶¾¼°EDR¹¤¾ßÀú³Ì£¬£¬ £¬Îª¶ñÒâÈí¼þÆÌ·¡£¡£¡£¡£Ö»¹ÜÉÏÊöÇý¶¯¾ùͨ¹ý΢ÈíÊý×ÖÊðÃûÈÏÖ¤£¬£¬ £¬ÇÒδ±»ÁÐÈëÒÑÖªÎó²îÁбí£¬£¬ £¬µ«¹¥»÷Õßͨ¹ýÐÞ¸Äʱ¼ä´Á×Ö¶ÎÌìÉúÐÂÎļþ¹þÏ££¬£¬ £¬ÔÚ¼á³ÖÊðÃûÓÐÓÃÐÔµÄͬʱ¹æ±Ü¼ì²â¡£¡£¡£¡£´Ë´Î¹¥»÷·ºÆðÏÔÖøÊÖÒÕÑݽøÌØÕ÷£ºSilver Fox½«·´ÆÊÎöÄ£¿£¿£¿£¿£¿é¡¢³¤ÆÚ»¯»úÖÆ¡¢Ç¶ÈëʽÇý¶¯¼°Ä¿µÄÀú³ÌÁбí·â×°ÖÁ¼òµ¥¼ÓÔØÆ÷£¬£¬ £¬²¢¿ìËÙµü´úÇý¶¯°æ±¾ÒÔ×èÖ¹²éɱ¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬ £¬Æä¶ñÒâÈí¼þÉèÖÃרÃÅÕë¶Ô¶«ÑǵØÇøÊ¢ÐеÄÇå¾²²úÆ·£¬£¬ £¬ÇÒ»ù´¡ÉèʩָÏòÖйúЧÀÍÆ÷¡£¡£¡£¡£ValleyRATºóÞ߱¸ÆÁÄ»¼à¿Ø¡¢ÏÂÁîÖ´ÐС¢Êý¾ÝÍâйµÈÄÜÁ¦£¬£¬ £¬¿Éͨ¹ýTorÍøÂçÎüÊÕÔ¶³ÌÖ¸Á£¬ £¬½øÒ»²½Ç¿»¯¹¥»÷Òþ²ØÐÔ¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/silver-fox-deploy-valleyrat/


6. ÑÇÂíÑ·×èÖ¹¶íÂÞ˹APT29ºÚ¿Í¹¥»÷Microsoft 365


9ÔÂ1ÈÕ£¬£¬ £¬ÑÇÂíÑ·ÍþвÇ鱨ÍŶӿËÈÕÁªºÏCloudflareÓë΢Èí£¬£¬ £¬ÀֳɯÆËð¶íÂÞ˹Õþ¸®Åä¾°ºÚ¿Í×éÖ¯Midnight Blizzard£¨APT29£©Õë¶ÔMicrosoft 365ÕË»§µÄÖØ´ó¹¥»÷Ðж¯¡£¡£¡£¡£¸Ã×é֯ͨ¹ýË®¿Ó¹¥»÷ÊÖÒÕÈëÇÖÕýµ±ÍøÕ¾£¬£¬ £¬Ê¹ÓÃbase64±àÂë»ìÏý¶ñÒâ´úÂ룬£¬ £¬½«Ô¼10%µÄ»á¼ûÕßËæ»úÖØ¶¨ÏòÖÁ·ÂðCloudflareÑéÖ¤Ò³ÃæµÄÓòÃû£¬£¬ £¬ÓÕµ¼Êܺ¦Õß½øÈë¶ñÒâ×°±¸´úÂëÈÏÖ¤Á÷³Ì£¬£¬ £¬ÊÔͼÊÚȨ¹¥»÷Õß¿ØÖƵÄ×°±¸»á¼ûÆä΢ÈíÕË»§¡£¡£¡£¡£×÷Ϊ¶íÂÞ˹¶ÔÍâÇ鱨¾Ö£¨SVR£©¹ØÁªµÄAPT29×éÖ¯£¬£¬ £¬´Ë´ÎÐж¯ÑÓÐøÁËÆäϰÓõÄÍøÂç´¹ÂÚÕ½ÂÔ£¬£¬ £¬µ«ÊÖÒÕÊÖ·¨ÏÔÖøÉý¼¶£ºÍ¨¹ý»ùÓÚcookieµÄϵͳ×èֹͳһÓû§¶à´ÎÖØ¶¨Ïò£¬£¬ £¬½µµÍ̻¶Σº¦£»£»£»£»£»£»²»ÔÙÒÀÀµÃ°³äAWSÓòÃû»òÉç»á¹¤³ÌÈÆ¹ýMFA£¬£¬ £¬×ª¶øÊ¹ÓÃ΢Èí×°±¸´úÂëÑéÖ¤»úÖÆµÄÎó²î¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬ £¬¸Ã×éÖ¯½üÆÚ¹¥»÷Ä¿µÄº­¸ÇÅ·ÖÞ´óʹ¹Ý¡¢»ÝÆÕÆóÒµ¼°TeamViewer£¬£¬ £¬Í¹ÏÔÆäÇé±¨ÍøÂçÒâͼ¡£¡£¡£¡£ÑÇÂíÑ·Ñо¿Ö°Ô±ÔÚ·¢Ã÷¶ñÒâEC2ʵÀýºóѸËÙ¸ôÀ룬£¬ £¬²¢Ð­Í¬ÏàÖúͬ°é×è¶ÏÓòÃûÆÊÎö¡£¡£¡£¡£Ö»¹ÜAPT29ÊÔÍ¼×ªÒÆ»ù´¡ÉèÊ©ÖÁÆäËûÔÆÐ§ÀÍÉ̲¢×¢²áÐÂÓòÃû£¬£¬ £¬µ«Ðж¯ÒÑÔâÆÆË𡣡£¡£¡£


https://www.bleepingcomputer.com/news/security/amazon-disrupts-russian-apt29-hackers-targeting-microsoft-365/