É³ÌØ¹¤Òµ¾ÞÍ·RezayatÔâÓöEverestÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-07-15

1. É³ÌØ¹¤Òµ¾ÞÍ·RezayatÔâÓöEverestÀÕË÷Èí¼þ¹¥»÷


7ÔÂ14ÈÕ£¬£¬£¬É³Ìع¤ÒµÐ§À;ÞÍ·Rezayat¼¯ÍÅ¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þÍÅ»ïµÄÍøÂç¹¥»÷£¬£¬£¬³ÉΪÖж«µØÇøÓÖÒ»ÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£Õâ¼ÒÓµÓÐ25¼Ò×Ó¹«Ë¾¡¢ÓªÒµÁýÕÖ13¸ö¹ú¼Ò¡¢Ô±¹¤³¬Á½ÍòÈ˵Ŀç¹úÆóÒµ£¬£¬£¬±»¹¥»÷ÕßÐû³ÆÇÔÈ¡ÊýGBÃô¸ÐÊý¾Ý£¬£¬£¬Ïà¹ØÑù±¾ÒÑÔÚ°µÍøÐ¹Â¶Õ¾µãÆØ¹â¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿ÍŶӯÊÎö·¢Ã÷£¬£¬£¬Ð¹Â¶ÄÚÈݰüÀ¨¿Í»§ÌõÔ¼¡¢ÊÖÒÕ±¨¸æ¼°¹¤Òµ×°±¸Í¼Ö½µÈ½¹µãÉÌÒµÎļþ£¬£¬£¬ÈôÊý¾ÝÕæÊµÐÔ»ñµÃ֤ʵ£¬£¬£¬²»µ«½«ÑÏÖØËðº¦RezayatµÄÉÌÒµÐÅÓþ£¬£¬£¬¸ü¿ÉÄܱ»ÓÃÓÚÕë¶ÔÆäÏàÖúͬ°éµÄ¹©Ó¦Á´¹¥»÷£¬£¬£¬Òý¿¯ÐÐÒµÁ¬ËøÎ£º¦¡£¡£¡£¡£¡£¡£ÊµÑé´Ë´Î¹¥»÷µÄEverestÍÅ»ï×Ô2021ÄêÊ״α»×·×ÙÒÔÀ´£¬£¬£¬ÒÑÐγɳÉÊìµÄ·¸·¨Ä£Ê½¡£¡£¡£¡£¡£¡£¸Ã×é֝ɯÓÚͨ¹ýÈëÇÖÆóÒµÕË»§¼°Ê¹ÓÃÔ¶³Ì×ÀÃæÐ­Ò飨RDP£©¾ÙÐÐÍøÂçÉøÍ¸£¬£¬£¬ÒÑÍù12¸öÔÂÄÚÒѽ«Áè¼Ý°Ù¼ÒÆóÒµÁÐÈë°µÍø"Êܺ¦ÕßÃûµ¥"¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸ÃÍÅ»ïÔøÐû³ÆÔÚ2022ÄêÀÖ³ÉÇÖÈëµçÐÅÔËÓªÉÌAT&TµÄÆóÒµÍøÂ磬£¬£¬Õ¹ÏÖ³ö¼«Ç¿µÄÊÖÒÕ¹¥»÷ÄÜÁ¦¡£¡£¡£¡£¡£¡£´Ë´ÎÕë¶ÔRezayatµÄÐж¯ÖУ¬£¬£¬¹¥»÷ÕßËäÉù³ÆÇÔÈ¡10GBÊý¾Ý£¬£¬£¬µ«Í¨Ì«¹ýÅúÊÍ·ÅÊý¾ÝÑù±¾Ê©Ñ¹Êܺ¦ÆóÒµÖ§¸¶Êê½ðµÄÕ½ÂÔ£¬£¬£¬ÇÐºÏÆäϰÓòÙ×÷ÊÖ·¨¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/rezayat-group-ransomware-data-breach/


2. ÉÝ³ÞÆ·¾ÞÍ·LVMHÓ¢¹ú·Ö²¿ÔâÓöÊý¾Ýй¶ÊÂÎñ


7ÔÂ14ÈÕ£¬£¬£¬È«ÇòÉÝ³ÞÆ·¾ÞÍ·LVMH¼¯ÍÅÆìÏÂÓ¢¹ú·Ö²¿¿ËÈÕ¾íÈëÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬³ÉΪ¼ÌÂêɯ°Ù»õ¡¢¹þÂ޵°ٻõµÈÖ®ºóÓÖÒ»¼ÒÔâÓöÍøÂç¹¥»÷µÄÓ¢¹úÁãÊÛÉÌ¡£¡£¡£¡£¡£¡£Æ¾Ö¤¹«Ë¾Ïò¿Í»§·¢Ë͵Ä֪ͨ£¬£¬£¬7ÔÂ2ÈÕ·¢Ã÷µÄй¶ÊÂÎñ¿ÉÄÜ̻¶Á˿ͻ§µÄÐÕÃû¡¢ÐԱ𡢹ú¼®¡¢µç»°¡¢ÓÊÏä¡¢µØµã¡¢³öÉúÈÕÆÚ¼°¹ºÖÃÆ«ºÃµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¨PII£©¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÏÔʾÊý¾Ý±»ÀÄÓ㬣¬£¬µ«Â·Ò×ÍþµÇÓ¢¹úÖÒÑԳƣ¬£¬£¬Ð¹Â¶ÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ´¹ÂÚ¹¥»÷¡¢Ú²Æ­»òÉí·ÝµÁÓ㬣¬£¬²¢½¨Òé¿Í»§Ð¡ÐÄ¿ÉÒÉͨѶ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¾àLVMHº«¹úÓªÒµÔâºÚ¿Í¹¥»÷½öÒ»ÖÜ£¬£¬£¬ÏÖÔÚÄêÒÔÀ´ÆäÆìÏ¿ËÀï˹͡¡¤µÏ°Â¸ß¼¶Ê±×°ÓëµÙܽÄáÆ·ÅÆÒ²Òò¿Í»§Êý¾Ýй¶½ÓÊÜÕþ¸®ÊӲ죬£¬£¬Í¹ÏÔ¼¯ÍÅ¶àµØ»ú¹¹½ÓÁ¬ÃæÁÙÇå¾²ÌôÕ½¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÍÐÂí˹¡¤Àí²é×ÈÖ¸³ö£¬£¬£¬Ö»¹ÜLVMH´Ë´Îδй¶²ÆÎñÊý¾Ý£¬£¬£¬Î£º¦ÈÔ½ûֹСê¹¥»÷Õß¿ÉÄÜͨ¹ýð³ä¿Í»§Ì×È¡¸ü¶àÐÅÏ¢£¬£¬£¬»ò·¢ËÍÎ±×°ÖÆÆ·ÅÆµÄ¶ñÒâÓʼþÓÕµ¼µÇ¼/²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£ËûÇ¿µ÷£¬£¬£¬LVMH¶àµØ»ú¹¹½ÓÁ¬ÔâÀàËÆÊÖ¶ÎÈëÇÖ£¬£¬£¬ÌåÏÖÆä¿ÉÄܱ£´æÏµÍ³ÐÔÎó²î£¬£¬£¬»òÊÇÊÖÒÕϵͳ±£´æ¹²ÐÔȱÏÝ£¬£¬£¬»òÊÇй¶¿ØÖƲ½·¥È±·¦¡£¡£¡£¡£¡£¡£¶Ô´Ë£¬£¬£¬Àí²é×Ƚ¨ÒéLVMHÁ¬Ã¦¿ªÕ¹È«¼¯ÍÅÇå¾²ÆÀ¹À£¬£¬£¬×·Ëݹ¥»÷ȪԴ²¢ÊµÑéÕû¸Ä£¬£¬£¬×èÖ¹Îó²îÒ»Á¬±»Ê¹Óᣡ£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/louis-vuitton-uk-retailer-data/


3. InterlockÀÕË÷Èí¼þ½ÓÄÉFileFixÒªÁìÈö²¥¶ñÒâÈí¼þ


7ÔÂ14ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬InterlockÀÕË÷Èí¼þÍÅ»ïÔÚ¹¥»÷ÊÖ¶ÎÉÏʵÏÖÖØ´óÉý¼¶£¬£¬£¬Ê״ιûÕæ½ÓÄÉÃûΪ"FileFix"µÄÐÂÐÍÉç»á¹¤³ÌÊÖÒÕ£¬£¬£¬Á¬ÏµÔ¶³Ì»á¼ûľÂí£¨RAT£©ÊµÑé¸üÒþ²ØµÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¸ÃÊÖÒÕÓÉÇå¾²Ñо¿Ô±mr.d0x¿ª·¢£¬£¬£¬ÊÇClickFix¹¥»÷µÄ½ø»¯°æ±¾¡£¡£¡£¡£¡£¡£ÒÑÍùÒ»Äê¼ä£¬£¬£¬ClickFixÒѳÉΪ×îÖ÷Á÷µÄÓÐÓÃÔØºÉ·Ö·¢ÒªÁìÖ®Ò»£¬£¬£¬¶øFileFixͨ¹ý½øÒ»²½Ê¹ÓÃÓû§¶ÔWindowsÏµÍ³ÔªËØµÄÐÅÈΣ¬£¬£¬ÊµÏÖÁ˸ü¸ßЧµÄ¶ñÒâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬ÍþвÐÐΪÕßͨ¹ýÊÜÑ¬È¾ÍøÕ¾°²ÅÅKongTukeÍøÂç×¢ÈëÆ÷£¬£¬£¬ÓÕµ¼»á¼ûÕßÍê³ÉÐéαCAPTCHAÑéÖ¤ºó£¬£¬£¬×Ô¶¯½«Î±×°³ÉÎļþ·¾¶µÄPowerShellÏÂÁî¸´ÖÆµ½¼ôÌù°å¡£¡£¡£¡£¡£¡£Óû§±»Ö¸µ¼½«×Ö·û´®Õ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸Ê±£¬£¬£¬ÏÖʵִÐеÄÊÇ´Ó"trycloudflare.com"ÏÂÔØ»ùÓÚPHP»òNode.jsµÄInterlock RAT±äÖÖ¡£¡£¡£¡£¡£¡£ÕâÒ»Àú³ÌʹÓÃWindows UIÔªËØ¹æ±ÜÇå¾²ÖÒÑÔ£¬£¬£¬Óû§½öÐè¼òÆÓ²Ù×÷¼´¿É´¥·¢¶ñÒâ´úÂëÏÂÔØ¡£¡£¡£¡£¡£¡£Ñ¬È¾ºó£¬£¬£¬RATͨ¹ýPowerShellÏÂÁîÍøÂçϵͳÓëÍøÂçÐÅÏ¢£¬£¬£¬²¢ÒԽṹ»¯JSONÃûÌÃй¶Êý¾ÝÖÁC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹¿Éͨ¹ýC2·¢ËÍshellÏÂÁî¡¢Ö²ÈëÐÂÔØºÉ¡¢Ìí¼Ó×¢²á±í³¤ÆÚÏî»òʹÓÃRDPºáÏòÒÆ¶¯£¬£¬£¬ÐγÉÍêÕû¹¥»÷Á´¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/


4. ¼¼¼ÎÖ÷°åUEFI¹Ì¼þÎó²îÆØ¹â£º°ÙÍò×°±¸ÃæÁÙ¶ñÒâÈí¼þÍþв


7ÔÂ14ÈÕ£¬£¬£¬È«Çò¹Ì¼þÇå¾²¹«Ë¾Binarly½üÆÚÅû¶£¬£¬£¬¼¼¼Î¿Æ¼¼ÆìÏÂÁè¼Ý240¿îÖ÷°åÐͺŵÄUEFI¹Ì¼þ±£´æËĸö¸ßΣÎó²î£¨CVE-2025-7026ÖÁCVE-2025-7029£©£¬£¬£¬ÑÏÖØÐÔÆÀ·Ö´ï8.2¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÔÊÐí¹¥»÷ÕßÔÚϵͳÖÎÀíģʽ£¨SMM£©ÇéÐÎÏÂÖ´ÐÐí§Òâ´úÂ룬£¬£¬Ö²Èë¿ÉÈÆ¹ý¹Å°åÇå¾²·ÀÓùµÄbootkit¶ñÒâÈí¼þ£¬£¬£¬×ÝÈ»ÖØ×°²Ù×÷ϵͳÈԿɳ¤ÆÚ±£´æ¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬Îó²îÔ´Óڹ̼þ¹©Ó¦ÉÌAmerican Megatrends Inc.£¨AMI£©µÄ²Î¿¼´úÂëȱÏÝ£¬£¬£¬µ¼Ö¼¼¼ÎµÈOEM³§ÉÌδÄÜʵʱÐÞ¸´£¬£¬£¬²¿·Ö×°±¸ÒòµÖ´ïʹÓÃÊÙÃüÖÕÖ¹£¨EOL£©×´Ì¬¿ÉÄÜÓÀÊÀ̻¶Σº¦¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃSMMµÄ¸ßȨÏÞÌØÕ÷£¬£¬£¬Í¨¹ýÔ¶³Ì»á¼ûľÂí£¨RAT£©ÔÚÆô¶¯½×¶Î¼ÓÔØ¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬CVE-2025-7028ÔÊÐí¶ÔϵͳÖÎÀíRAM£¨SMRAM£©¾ÙÐжÁ/д»á¼û£¬£¬£¬¿ÉÄÜÖ±½Ó×°ÖöñÒâÈí¼þ£»£»£»£»£»£»£»CVE-2025-7027Ôò¿Éͨ¹ýÐÞ¸ÄSMRAMÄÚÈݸ͝¹Ì¼þ¡£¡£¡£¡£¡£¡£BinarlyÖ¸³ö£¬£¬£¬Îó²îÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬¼¼¼ÎÓÐ651¿î²úÆ·Êܲ¨¼°£¬£¬£¬Supermicro¡¢´÷¶ûµÈÆ·ÅÆÒàÔÚÆäÖУ¬£¬£¬È«ÇòÊÜÓ°Ïì×°±¸ÊýÄ¿³¬°ÙÍǫ̀¡£¡£¡£¡£¡£¡£Ö»¹ÜAMIÒÑÐû²¼ÐÞ¸´²¹¶¡£¬£¬£¬µ«¼¼¼ÎµÈ³§É̵Ĺ̼þ¸üÐÂÖͺ󣬣¬£¬ÇÒδ¹ûÕæÇ徲ͨ¸æ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/


5. Cursor IDEÖеĶñÒâÀ©Õ¹µ¼Ö¼ÛÖµ50ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ


7ÔÂ14ÈÕ£¬£¬£¬È«ÇòÇå¾²»ú¹¹¿¨°Í˹»ù¿ËÈÕÅû¶һÆðÕë¶Ô¼ÓÃÜÇ®±Ò¿ª·¢ÕßµÄÖØ´óÍøÂç¹¥»÷ÊÂÎñ£º¶íÂÞ˹¿ª·¢ÕßÒò×°ÖÃCursor AI IDEƽ̨ÉϵÄÐéαSolidityÓïÑÔÀ©Õ¹£¬£¬£¬µ¼Ö¼ÛÖµ50ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃOpen VSX×¢²á±íÖÐð³äÓï·¨¸ßÁÁ¹¤¾ßµÄ¶ñÒâÀ©Õ¹£¬£¬£¬Í¨¹ý¶à½×¶ÎÔØºÉͶµÝʵÏÖÁ˶Ô×°±¸µÄ³¤ÆÚ¿ØÖÆ¡£¡£¡£¡£¡£¡£ÊÂÎñʼÓÚÊܺ¦Õß´ÓOpen VSXÏÂÔØÃûΪ"Solidity Language"µÄÀ©Õ¹³ÌÐò£¬£¬£¬¸Ã³ÌÐòÍâòÌṩÒÔÌ«·»ÖÇÄܺÏÔ¼¿ª·¢Ö§³Ö£¬£¬£¬ÊµÔòͨ¹ýÖ´ÐÐÔ¶³ÌPowerShell¾ç±¾Ö²ÈëScreenConnectÔ¶³ÌÖÎÀí¹¤¾ß¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬¶ñÒâ´úÂëÊ×Ïȼì²é²¢×°ÖÃScreenConnect£¬£¬£¬Ê¹ÍþвÕß»ñµÃÍêȫԶ³Ì»á¼ûȨÏÞ£¬£¬£¬Ëæºóͨ¹ýVBScriptÏÂÔØ°üÀ¨Quasar RATºÍPureLogsÇÔÈ¡³ÌÐòµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£¡£Ç°Õß¿ÉÖ´ÐÐí§ÒâϵͳÏÂÁ£¬£¬ºóÕßÔòרÃÅÇÔÈ¡ä¯ÀÀÆ÷ƾ֤¡¢¼ÓÃÜÇ®°üÊý¾Ý¼°Éí·ÝÑéÖ¤cookie¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿¨°Í˹»ùÆÊÎö·¢Ã÷£¬£¬£¬¸ÃÀ©Õ¹ÔÚOpen VSXµÄÏÂÔØÁ¿±»ÈËΪÐéÔöÖÁ54,000´Î£¬£¬£¬²¢Í¨¹ýË㷨ʹÓÃʹ¶ñÒâ³ÌÐòÔÚËÑË÷Ч¹ûÖÐÅÅÃû¸ßÓÚÕýµ±¹¤¾ß¡£¡£¡£¡£¡£¡£¸üÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¹¥»÷ÕßÔ½ÈÕÒÔ"solidity"ÃûÒåÐû²¼ÏÕЩÏàͬ°æ±¾µÄÀ©Õ¹£¬£¬£¬½«×°ÖÃÁ¿Î±ÔìÖÁ½ü200Íò´Î£¬£¬£¬ÏÔÖøÔöÌíÓû§ÎóװΣº¦¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-vscode-extension-in-cursor-ide-led-to-500k-crypto-theft/


6. FBI²é·âÈÎÌìÌÃSwitch¡¢PS4ÓÎÏ·µÁ°æÍøÕ¾


7ÔÂ15ÈÕ£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©ÑÇÌØÀ¼´ó·Ö¾Ö¿ËÈÕÐû²¼£¬£¬£¬Àֳɵ·»ÙÒÔnsw2u.comΪÊ׵Ŀç¹úµÁ°æÓÎÏ·Æ½Ì¨ÍøÂ磬£¬£¬²é·â°üÀ¨nswdl.com¡¢ps4pkg.comµÈÔÚÄÚµÄ7¸öÓòÃû£¬£¬£¬²¢ÔÚÒ³ÃæÕ¹Ê¾Ö´·¨Í¨¸æÐû³Æ"ÒÑͬ²½´Ý»ÙÊÖÒÕÉèÊ©"¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯»ñµÃºÉÀ¼Ö´·¨²¿·ÖЭÖú£¬£¬£¬±ê¼Ç×ÅÈ«Çò°æÈ¨±£»£»£»£»£»£»£»¤½øÈëн׶Ρ£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬É永ƽ̨ÔÚÒÑÍùËÄÄê¼äÐγÉÍêÕûµÁ°æ¹¤ÒµÁ´£ºÔÚ¡¶Èû¶û´ï´«Ëµ£ºÍõ¹úÖ®Àá¡·µÈÈÈÃÅÓÎÏ·Õýʽ·¢ÊÛǰÊýÖܼ´Ìá¹©ÆÆ½â×ÊÔ´£¬£¬£¬Í¨¹ýÈÎÌìÌÃSwitchÆÆ½âÖ÷»ú¼æÈÝPCÓÎÏ·µÄÌØÕ÷¿ìËÙÀ©É¢¡£¡£¡£¡£¡£¡£2025Äê2ÔÂ28ÈÕÖÁ5ÔÂ28ÈÕʱ´ú£¬£¬£¬Ö÷ÒªÏÂÔØÇþµÀ²»·¨ÏÂÔØÁ¿´ï320Íò´Î£¬£¬£¬°´µ¥»ú¾ù¼Û50ÃÀÔª¹ÀË㣬£¬£¬Ôì³É°æÈ¨·½Ô¼1.7ÒÚÃÀÔªÖ±½ÓËðʧ¡£¡£¡£¡£¡£¡£ÆäÖÐnsw2uƽ̨ÒòÖ§³ÖÆÆ½â×°±¸ÔËÐеÁ°æÓÎÏ·£¬£¬£¬2025Äê5ÔÂÈ«Çò»á¼ûÁ¿´ï230Íò´Î£¬£¬£¬Ö»¹Ü±»Å·ÃËÁÐÈëð³äÓëµÁ°æ¼à¿ØÃûµ¥ÇÒÔâÓ¢¹ú¡¢Î÷°àÑÀµÈÁù¹ú·â±Õ£¬£¬£¬ÈÔͨ¹ýÊÖÒÕÊÖ¶ÎÒ»Á¬ÔËÓª¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬µÁ°æÆ½Ì¨Í¨¹ýÐéÄâÖ÷»úºÍ¼ÓÃÜͨѶ¹æ±Üî¿Ïµ£¬£¬£¬´Ë´ÎFBIÀֳɶ¨Î»ÆäλÓÚºÉÀ¼µÄЧÀÍÆ÷¼¯Èº£¬£¬£¬ÇжÏ×ʽðÁ÷ÓëÄÚÈÝ·Ö·¢ÇþµÀ¡£¡£¡£¡£¡£¡£


https://therecord.media/piracy-sites-for-nintendo-switch-ps4-games-taken-down