Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯

Ðû²¼Ê±¼ä 2025-02-24

1. Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯


2ÔÂ23ÈÕ£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËù Bybit ½üÆÚÔâÊÜÁËÒ»´Îب¹ÅδÓеÄÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼Ö¼ÛÖµÔ¼ 15 ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ£¬£¬£¬£¬£¬³ÉΪʷÉÏ×î´óµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸¡£¡£¡£ ¡£¹¥»÷Õßͨ¹ýʹÓÃÊðÃû½çÃæ£¬£¬£¬£¬£¬½« Bybit µÄ ETH ÀäÇ®°üÖеÄ×ʽðÖØ¶¨Ïòµ½Î´ÖªµØµã¡£¡£¡£ ¡£Ö»¹Ü Bybit µÄÇå¾²ÍŶÓÕýÔÚÓëÇø¿éÁ´È¡Ö¤×¨¼ÒºÍÏàÖúͬ°éÆð¾¢ÊÓ²ì´ËÊÂÎñ£¬£¬£¬£¬£¬µ«ÉÐδ͸¶ÏêϸµÄÊÖÒÕϸ½Ú¡£¡£¡£ ¡£¾ÝÍÆ²â£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÁË Safe.global ƽ̨Óû§½çÃæÖеÄÎó²î¡£¡£¡£ ¡£Bybit Ê×ϯִÐйÙÏò¿Í»§°ü¹Ü£¬£¬£¬£¬£¬×ÝÈ»±»µÁ×ʽðÎÞ·¨×·»Ø£¬£¬£¬£¬£¬ÉúÒâËùÒ²½«¼á³Ö³¥¸¶ÄÜÁ¦£¬£¬£¬£¬£¬²¢½«ÔÚÐëҪʱʹÓùýÇÅ´û¿îÈ·±£Óû§×ʽð¿ÉÓᣡ£¡£ ¡£Í¬Ê±£¬£¬£¬£¬£¬Bybit Ç¿µ÷ËùÓÐÆäËûÀäÇ®°ü¾ùÇå¾²ÎÞÓÝ£¬£¬£¬£¬£¬ÔËÓª²»»áÖÐÖ¹¡£¡£¡£ ¡£ÍøÂçÇå¾²¹«Ë¾ Elliptic ºÍ Arkham Intelligence ¾ù½«´Ë´Î¹¥»÷¹é×ïÓÚÓ볯ÏÊÓÐ¹ØµÄ Lazarus APT ¼¯ÍÅ£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÔʹÓÃ×Ô½ç˵¶ñÒâÈí¼þ¾ÙÐÐÖØ´ó¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬²¢ÉæÏÓ¶àÆðÕë¶ÔÒøÐкͼÓÃÜÇ®±ÒÉúÒâËùµÄ¹¥»÷ÊÂÎñ¡£¡£¡£ ¡£Ö»¹Ü Bybit ÉÐδÕýʽȷÈϺڿÍÉí·Ý£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁ˼ÓÃÜÇ®±ÒÁìÓòÃæÁÙµÄÇå¾²ÌôÕ½¡£¡£¡£ ¡£


https://securityaffairs.com/174514/cyber-crime/lazarus-stole-1-5b-from-bybit-cryptocurrency-heist.html


2. PayPalÐÂÐ͵ç×ÓÓʼþÕ©Æ­£ºÊ¹ÓõصãÉèÖÃÓÕÆ­Ô¶³Ì»á¼ûȨÏÞ


2ÔÂ22ÈÕ£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬Ò»ÖÖʹÓÃPayPalµç×ÓÓʼþµØµãÉèÖù¦Ð§µÄÕ©Æ­ÊÖ¶ÎÕýÔÚÊ¢ÐС£¡£¡£ ¡£Õ©Æ­Õßͨ¹ýÏòPayPalÕË»§Ìí¼Ó°üÀ¨ÐéαMacBook¹ºÖÃÈ·ÈÏÐÅÏ¢µÄеص㣬£¬£¬£¬£¬´¥·¢PayPal·¢ËÍÈ·ÈÏÓʼþ¡£¡£¡£ ¡£ÕâЩ¿´ËÆÕýµ±µÄÓʼþÓÉ¡°service@paypal.com¡±·¢ËÍ£¬£¬£¬£¬£¬ÓÕÆ­Óû§²¦´òÕ©Æ­µç»°ºÅÂë¡£¡£¡£ ¡£Ò»µ©Óû§²¦´ò£¬£¬£¬£¬£¬Õ©Æ­Õß»áÉù³ÆÕË»§±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐÐÌØ¶¨Èí¼þÒÔ»ñȡԶ³Ì»á¼ûȨÏÞ¡£¡£¡£ ¡£È»¶ø£¬£¬£¬£¬£¬ÕâЩÓʼþÏÖʵÉÏÊÇ·¢Ë͸øÓëÕ©Æ­Õß¹ØÁªµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬¸ÃµØµã»á×Ô¶¯½«Óʼþת·¢¸øÓʼþÁбíÖеÄËùÓгÉÔ±£¬£¬£¬£¬£¬¼´Õ©Æ­Ä¿µÄ¡£¡£¡£ ¡£ÓÉÓÚPayPal²»ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬£¬£¬Õ©Æ­ÕßÄܹ»×¢ÈëÕ©Æ­ÐÅÏ¢¡£¡£¡£ ¡£ÎªÁËÌá·À´ËÀàÕ©Æ­£¬£¬£¬£¬£¬Óû§Ó¦ºöÂÔ°üÀ¨Ðéα¹ºÖÃÈ·ÈϵÄPayPalÓʼþ£¬£¬£¬£¬£¬²¢²»Òª²¦´òÆäÖÐÌṩµÄµç»°ºÅÂë¡£¡£¡£ ¡£Í¬Ê±£¬£¬£¬£¬£¬PayPalÐèÒª½ÓÄɲ½·¥ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬£¬£¬ÒÔ±ÜÃâ´ËÀàÕ©Æ­ÐÐΪµÄ±¬·¢¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/


3. CS2½ÇÖð³Éթƭаг¡£¡£¡£ ¡£ºÓÎÏ·Íæ¼ÒÐèСÐÄSteamÕÊ»§±»µÁΣº¦


2ÔÂ22ÈÕ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓ÷´¿Ö¾«Ó¢ 2 (CS2) µÄ´óÐͽÇÖ𣬣¬£¬£¬£¬ÈçIEM¿¨ÍÐά×È2025ºÍPGL¿Ë¬ÈÕ-Äɲ¨¿¨2025£¬£¬£¬£¬£¬Õë¶ÔÓÎÏ·Íæ¼ÒʵÑéÕ©Æ­£¬£¬£¬£¬£¬ÒâͼÇÔÈ¡ËûÃǵÄSteamÕÊ»§ºÍ¼ÓÃÜÇ®±Ò¡£¡£¡£ ¡£Ö»¹ÜCS2ÒÑÍÆ³ö¶àÄ꣬£¬£¬£¬£¬µ«ÆäÍæ¼ÒÉçÇøºÍÖ°Òµ¾ºÈüÃûÌÃÒÀÈ»ÖØ´óÇÒ»îÔ¾¡£¡£¡£ ¡£½üÆÚ£¬£¬£¬£¬£¬CS2ÔÚSteamÉϵÄͬʱÔÚÏßÍæ¼ÒÊýÄ¿µÖ´ïÁËеÄá¯Áë¡£¡£¡£ ¡£Bitdefender Labs·¢Ã÷ÁËÒ»ÏîÃûΪ¡°Streamjacking¡±µÄ¶ñÒâ»î¶¯£¬£¬£¬£¬£¬Õ©Æ­Õßͨ¹ýð³ä×ÅÃûCS2Íæ¼Ò£¬£¬£¬£¬£¬ÔÚYouTubeÖ±²¥ÖÐÐû´«Ã°³äµÄƤ·ôºÍ¼ÓÃÜÇ®±ÒÔùÆ·¡£¡£¡£ ¡£ËûÃÇʹÓñ»Ð®ÖƵÄÕýµ±YouTubeÕÊ»§£¬£¬£¬£¬£¬²¢Ñ­»·²¥·Å¾ÉµÄÓÎÏ·»­ÃæÒÔÓªÔìÖ±²¥Æø·Õ¡£¡£¡£ ¡£ÕâЩÊÓÆµÖеĶþάÂë»òÁ´½Ó»á½«¹ÛÖÚµ¼Ïò¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬ÒªÇóËûÃÇʹÓÃSteamÕÊ»§µÇ¼ÒÔÁìÈ¡ÀñÎï»ò·¢ËͼÓÃÜÇ®±ÒÒÔ»ñÈ¡¸ß¶î»Ø±¨¡£¡£¡£ ¡£Ò»µ©µÇ¼£¬£¬£¬£¬£¬Êܺ¦Õ߾ͻáÔÚ²»ÖªÇéµÄÇéÐÎÏÂÊÚÓèÕ©Æ­Õß»á¼ûȨÏÞ£¬£¬£¬£¬£¬µ¼ÖÂÓмÛÖµµÄƤ·ôºÍÎïÆ·±»µÁ£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÒ²»á±»Á¬Ã¦×ªÒÆÖÁÕ©Æ­Õß¿ØÖƵÄÇ®°ü¡£¡£¡£ ¡£ÓÎÏ·Íæ¼ÒÓ¦¼á³ÖСÐÄ£¬£¬£¬£¬£¬ºËʵÓë¹Ù·½µç×Ó¾º¼¼×éÖ¯µÄ¹ØÏµ£¬£¬£¬£¬£¬²¢¼¤»î¶àÖØÉí·ÝÑéÖ¤¡¢ÆôÓÃSteam GuardÒÆÆôº½·ÝÑéÖ¤Æ÷ÒÔ¼°°´ÆÚ¼ì²éµÇ¼»î¶¯¡£¡£¡£ ¡£ÔÚYouTubeÉÏ£¬£¬£¬£¬£¬Ö»Ô¢Ä¿¹Ù·½Ö°ÒµÇòÔ±ÕÊ»§µÄÊÓÆµ£¬£¬£¬£¬£¬²¢¶ÔÆäËûƵµÀÉϵÄÖ±²¥¼á³ÖÏÓÒÉ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/fake-cs2-tournament-streams-used-to-steal-crypto-steam-accounts/


4. SpyLend Android ¶ñÒâÈí¼þÔÚ Google Play ±»ÏÂÔØÁ˳¬ 10 Íò´Î


2ÔÂ21ÈÕ£¬£¬£¬£¬£¬Ò»¿îÃûΪSpyLend£¨ÓÖ³ÆFinance Simplified£©µÄAndroid¶ñÒâÈí¼þÓ¦ÓóÌÐòÔÚGoogle PlayÉϱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬£¬£¬£¬Ëüαװ³É½ðÈÚ¹¤¾ß£¬£¬£¬£¬£¬ÊµÔòÕë¶ÔÓ¡¶ÈÓû§ÊµÑéÂÓ¶áÐÔ´û¿î¡£¡£¡£ ¡£¸ÃÓ¦ÓÃÊôÓÚSpyLoan¶ñÒâÈí¼þ×飬£¬£¬£¬£¬Í¨¹ýÇëÇó¹ý¶àȨÏÞÇÔÈ¡Óû§Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬ÈçÁªÏµÈË¡¢Í¨»°¼Í¼¡¢¶ÌÐÅ¡¢ÕÕÆ¬¡¢×°±¸Î»ÖõÈ¡£¡£¡£ ¡£ÕâЩÊý¾Ý±»ÓÃÓÚɧÈÅ¡¢Ú²Æ­ºÍÀÕË÷Óû§£¬£¬£¬£¬£¬ÌØÊâÊǵ±Óû§Î´ÄÜÖª×㻹¿îÌõ¿îʱ¡£¡£¡£ ¡£¸ÃÓ¦Óû¹Éù³ÆÊÇ×¢²áµÄ·ÇÒøÐнðÈÚ¹«Ë¾£¬£¬£¬£¬£¬µ«ÊµÔò²»È»¡£¡£¡£ ¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬Ëü¼ÓÔØWebView½«Óû§Öض¨Ïòµ½Íâ²¿ÍøÕ¾ÏÂÔØ´û¿îÓ¦ÓÃAPK¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þ»î¶¯×¨ÃÅÕë¶ÔÓ¡¶ÈÓû§£¬£¬£¬£¬£¬²¢ÇÔÈ¡°üÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵĶàÖÖÊý¾Ý£¬£¬£¬£¬£¬ÓÃÓÚڲƭÀÕË÷»ò½ðÈÚڲƭ¡£¡£¡£ ¡£Ö»¹Ü¸ÃÓ¦ÓÃÒÑ´ÓGoogle PlayÒÆ³ý£¬£¬£¬£¬£¬µ«ÈÔ¿ÉÄܼÌÐøÔËÐв¢ÍøÂçÃô¸ÐÐÅÏ¢¡£¡£¡£ ¡£ÈôÏÓÒÉ×°±¸±»Ñ¬È¾£¬£¬£¬£¬£¬ÇëÁ¬Ã¦É¾³ýÏà¹ØÓ¦Ó㬣¬£¬£¬£¬ÖØÖÃȨÏÞ£¬£¬£¬£¬£¬¸ü¸ÄÃÜÂ룬£¬£¬£¬£¬²¢Ö´ÐÐ×°±¸É¨Ãè¡£¡£¡£ ¡£Í¬Ê±£¬£¬£¬£¬£¬È·±£GoogleµÄPlay Protect¹¤¾ß´¦Óڻ״̬£¬£¬£¬£¬£¬ÒÔ¼ì²â²¢×èÖ¹¶ñÒâÈí¼þ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/


5. CISA½«Craft CMS¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209¼ÓÈëKEVĿ¼


2ÔÂ21ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCraftÄÚÈÝÖÎÀíϵͳ£¨CMS£©µÄ¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£ ¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.1£¬£¬£¬£¬£¬Ó°ÏìCraft CMS°æ±¾4ºÍ5£¬£¬£¬£¬£¬ÏêϸΪ°æ±¾¹æÄ£ÔÚ>= 4.0.0-RC1, < 4.13.8ºÍ>= 5.0.0-RC1, < 5.5.5Ö®¼ä¡£¡£¡£ ¡£CISAÖ¸³ö£¬£¬£¬£¬£¬ÓÉÓÚÒ×Êܹ¥»÷µÄ°æ±¾ÒѾ­Î£¼°Óû§Çå¾²ÃÜÔ¿£¬£¬£¬£¬£¬Craft CMS±£´æ´úÂë×¢ÈëÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£ ¡£ÏîĿά»¤Ö°Ô±ÒÑÔÚ2024Äê12ÔÂÏÂÑ®Ðû²¼µÄ°æ±¾4.13.8ºÍ5.5.8Öнâ¾öÁ˸ÃÎó²î¡£¡£¡£ ¡£Craft CMSÔÚGitHubÉÏÐû²¼µÄͨ¸æÖÐÌáµ½£¬£¬£¬£¬£¬ËùÓÐδÐÞ²¹ÇÒÇå¾²ÃÜÔ¿±»Ð¹Â¶µÄ°æ±¾¶¼»áÊܵ½¸ÃÇ徲ȱÏݵÄÓ°Ï죬£¬£¬£¬£¬²¢½¨ÒéÎÞ·¨¸üе½ÐÞ²¹°æ±¾µÄÓû§ÂÖ»»Çå¾²ÃÜÔ¿²¢È·±£ÆäÒþ˽ÒÔ»º½âÎÊÌâ¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»½¨ÒéÔÚ2025Äê3ÔÂ13ÈÕ֮ǰӦÓÃÐëÒªµÄÐÞ¸´³ÌÐò¡£¡£¡£ ¡£


https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html


6. CISA½«Microsoft Power PagesÎó²îCVE-2025-24989¼ÓÈëKEVĿ¼


2ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Microsoft Power PagesµÄÒ»¸ö¸ßÑÏÖØÐÔÎó²î£¨±àºÅΪCVE-2025-24989£¬£¬£¬£¬£¬CVSS·ÖÊýΪ8.2£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£ ¡£¸ÃÎó²îÊôÓÚ²»µ±»á¼û¿ØÖÆÎó²î£¬£¬£¬£¬£¬ÔÊÐíδ¾­ÊÚȨµÄ¹¥»÷Õßͨ¹ýÍøÂçÌáÉýȨÏÞ£¬£¬£¬£¬£¬¿ÉÄÜÈÆ¹ýÓû§×¢²á¿ØÖÆ¡£¡£¡£ ¡£´ËÎó²îÓÉ΢ÈíµÄRaj Kumar±¨¸æ£¬£¬£¬£¬£¬Î¢ÈíÒÑÈ·ÈÏ´ËÎó²îÕýÔÚ±»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬²¢Ðû²¼ÁËͨ¸æÍ¨ÖªÊÜÓ°ÏìµÄ¿Í»§¼ì²éÍøÕ¾²¢½ÓÄÉÕûÀí²½·¥¡£¡£¡£ ¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ×èÖ¹ÈÕÆÚǰ½â¾öÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£ ¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ21ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬Í¬Ê±×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬£¬ÒÔ½µµÍÇ徲Σº¦¡£¡£¡£ ¡£


https://securityaffairs.com/174541/hacking/u-s-cisa-adds-microsoft-power-pages-flaw-known-exploited-vulnerabilities-catalog.html