°Í¶ûµÄĦÊаÙÍòÃÀÔªBECթư¸Ì»Â¶ÏµÍ³ÐÔÇå¾²Îó²î
Ðû²¼Ê±¼ä 2025-09-021. °Í¶ûµÄĦÊаÙÍòÃÀÔªBECթư¸Ì»Â¶ÏµÍ³ÐÔÇå¾²Îó²î
9ÔÂ1ÈÕ£¬£¬£¬£¬£¬°Í¶ûµÄĦÊнüÆÚÅû¶һÆðÖØ´óÉÌÒµµç×ÓÓʼþй¶£¨BEC£©¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬Õ©ÆÕßͨ¹ýαÔìÉí·Ý¡¢¸Ä¶¯¹©Ó¦ÉÌÒøÐÐÐÅÏ¢µÈÊֶΣ¬£¬£¬£¬£¬´ÓÊÐÕþ²¿·ÖÇÔÈ¡³¬150ÍòÃÀÔª£¬£¬£¬£¬£¬Í¹ÏÔ¹«¹²»ú¹¹ÔÚÍøÂçÇå¾²Óë²ÆÎñÄÚ¿ØÖеÄÑÏÖØÎó²î¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¼à²ì³¤°ì¹«ÊÒÊӲ죬£¬£¬£¬£¬2025Äê2ÔÂÖÁ3ÔÂʱ´ú£¬£¬£¬£¬£¬¸ÃÊÐÓ¦¸¶Õ˿·Ö£¨AP£©·ÖÁ½´ÎÏòÕ©ÆÕß¿ØÖƵÄÒøÐÐÕË»§×ªÕ˹²¼Æ1,524,621.04ÃÀÔª¡£¡£¡£¡£¡£¡£¡£Õ©ÆÕßÓÚ2024Äê12ÔÂͨ¹ýÐéαÓÊÏäð³ä¹©Ó¦ÉÌÔ±¹¤£¬£¬£¬£¬£¬ÇÖÈëÆäWorkdayϵͳ²¢¸Ä¶¯ÒøÐÐÕË»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÕ©ÆÕßÌá½»µÄ±í¸ñ±£´æÐÅÏ¢¹ýʧ£¬£¬£¬£¬£¬ÇÒ¶à´ÎʵÑé±ä»»ÒøÐÐϸ½Ú£¬£¬£¬£¬£¬µ«AP²¿·ÖÈýÃûÔ±¹¤¾ùδִÐлù±¾ºËʵ³ÌÐò£¬£¬£¬£¬£¬×îÖÕÅú×¼ÁËÚ²ÆÐÔÇëÇ󡣡£¡£¡£¡£¡£¡£ÊÂÎñ̻¶³ö¶àÖØÎÊÌ⣺Ê×ÏÈ£¬£¬£¬£¬£¬AP²¿·Öȱ·¦¹©Ó¦ÉÌÐÅÏ¢ºËÑé»úÖÆ£¬£¬£¬£¬£¬¼´±ãÔÚ2019Äê¡¢2022ÄêÏȺóÒòÐéÎ±ÒøÐÐÐÅÏ¢±ä»»Ëðʧ6.2Íò¼°37.6ÍòÃÀÔªºó£¬£¬£¬£¬£¬ÈÔ佨ÉèÓÐÓðü¹Ü²½·¥£»£»£»£»£»£»£»Æä´Î£¬£¬£¬£¬£¬ÄÚ²¿¿ØÖÆÐÎͬÐéÉ裬£¬£¬£¬£¬Ô±¹¤¶à´ÎδºËʵÎļþÕæÊµÐÔ¼´Í¨¹ýÒªº¦²Ù×÷£»£»£»£»£»£»£»±ðµÄ£¬£¬£¬£¬£¬ÊÐÕþϵͳ¶Ô¹©Ó¦ÉÌÕË»§µÄ»á¼ûȨÏÞÖÎÀí±£´æÊè©£¬£¬£¬£¬£¬µ¼ÖÂÕ©ÆÕßÄܺã¾ÃÉøÍ¸²¢Ð޸Ľ¹µãÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/181772/cyber-crime/fraudster-stole-over-1-5-million-from-city-of-baltimore.html
2. ÍøÂç·¸·¨·Ö×ÓʹÓÃMeta¹ã¸æÆ½Ì¨Èö²¥Brokewell¶ñÒâÈí¼þ
8ÔÂ31ÈÕ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÀÄÓÃMetaÆìÏÂÉ罻ƽ̨µÄ¹ã¸æÏµÍ³£¬£¬£¬£¬£¬Í¨¹ýαÔì×ÅÃû½ðÈÚÆÊÎö¹¤¾ßTradingViewµÄÐéα¹ã¸æ£¬£¬£¬£¬£¬ÏòAndroidÓû§¶¨ÏòÈö²¥¾ß±¸¶àÖØÇÔÃܹ¦Ð§µÄBrokewell¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ÐγÉÕë¶Ô¼ÓÃÜÇ®±Ò×ʲúµÄ¾«×¼¹¥»÷Á´Ìõ¡£¡£¡£¡£¡£¡£¡£¾ÝBitdefenderÇå¾²ÍŶÓÅû¶£¬£¬£¬£¬£¬¸Ã»î¶¯×Ô7ÔÂ22ÈÕÆðͨ¹ýÔ¼75¸öÍâµØ»¯¹ã¸æÕö¿ª£¬£¬£¬£¬£¬¹ã¸æÄÚÈÝÒÔ"Ãâ·Ñ»ñÈ¡TradingView Premium"ΪÓÕ¶ü£¬£¬£¬£¬£¬½ö¶ÔAndroid×°±¸Óû§Õ¹Ê¾¶ñÒâÄÚÈÝ£¬£¬£¬£¬£¬ÆäËûϵͳ»á¼ûÔòÏÔʾÎÞº¦Ò³Ãæ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÉè¼ÆÏ¸ÃÜ£ºÊܺ¦Õßµã»÷¹ã¸æºó»á±»Öض¨ÏòÖÁ·ÂðTradingView¹ÙÍøµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬ÓÕµ¼ÏÂÔØÎ±×°³ÉÓ¦ÓøüеÄtw-update.apkÎļþ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×°Öúó»áÁ¬Ã¦ÇëÇó¸¨Öú¹¦Ð§È¨ÏÞ£¬£¬£¬£¬£¬Í¨¹ýµ¯³öÐéαϵͳ¸üÐÂÌáÐÑÑÚÊκǫ́²Ù×÷£¬£¬£¬£¬£¬×Ô¶¯ÊÚÓè×°±¸ÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£¸üÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Èí¼þ»áÄ£ÄâAndroidϵͳÉý¼¶½çÃæ£¬£¬£¬£¬£¬ÓÕÆÓû§ÊäÈëËøÆÁPINÂ룬£¬£¬£¬£¬ÎªºóÐø³¤ÆÚ»¯¿ØÖÆÆÌ·¡£¡£¡£¡£¡£¡£¡£×÷Ϊ×Ô2024ÄêÍ·»îÔ¾µÄ¶ñÒâ³ÌÐò£¬£¬£¬£¬£¬Brokewell´Ë´ÎÕ¹ÏÖµÄ"¸ß¼¶°æ±¾"¹¦Ð§ÖÜÈ«Éý¼¶¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/brokewell-android-malware-delivered-through-fake-tradingview-ads/
3. ºÚ¿ÍÉù³ÆÈëÇÖÁËAT&T£¬£¬£¬£¬£¬ÇÔÈ¡2400ÍòÓû§Êý¾Ý
9ÔÂ1ÈÕ£¬£¬£¬£¬£¬¹¥»÷ÕßÉù³ÆÒÑÀÖ³ÉÈëÇÖÃÀ¹úµçОÞÍ·AT&TµÄ½¹µã»ù´¡ÉèÊ©£¬£¬£¬£¬£¬²¢ÔÚµØÏÂÂÛ̳Ðû³ÆÍ¨¹ý°²ÅŶ¨ÖƶñÒâÈí¼þ»ñµÃʵʱ¶Á/дȨÏÞ£¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÊý°ÙÍòÓû§¡£¡£¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÔÚ°µÍøÐû²¼µÄÌû×ÓÐÎò£¬£¬£¬£¬£¬ÆäÇÖÈëÐÐΪÒÑÒ»Á¬ÊýÖÜδ±»¼ì²âµ½£¬£¬£¬£¬£¬²¢Éù³ÆÕÆÎÕÁËÒ»¸ö°üÀ¨Ô¼2400ÍòAT&TÓû§Êý¾ÝµÄ¶¯Ì¬Êý¾Ý¿â£¬£¬£¬£¬£¬¿ÉʵʱÐÞ¸ÄÓû§ÐÅÏ¢²¢Ö´ÐÐSIM½»Á÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬CybernewsÑо¿ÍŶÓÉÐδÄÜÑéÖ¤ÕâЩ˵·¨µÄÕæÊµÐÔ£¬£¬£¬£¬£¬Ïà¹ØÊý¾ÝÑù±¾ÍøÕ¾Ò²´¦ÓÚÎÞ·¨»á¼û״̬¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñµÄ½¹µãÍþвÔÚÓÚ¹¥»÷ÕßÐû³ÆµÄÈý´óÄÜÁ¦£ºÆäÒ»£¬£¬£¬£¬£¬Í¨¹ý¸Ä¶¯Óû§µç»°ºÅÂëÓëSIM¿¨µÄ°ó¶¨¹ØÏµ£¬£¬£¬£¬£¬ÊµÑéSIM½»Á÷¹¥»÷£»£»£»£»£»£»£»Æä¶þ£¬£¬£¬£¬£¬Èƹý»ùÓÚ¶ÌÐŵÄË«ÒòËØÈÏÖ¤£¨2FA£©£¬£¬£¬£¬£¬Ö±½Ó¶ÁÈ¡ÒøÐС¢É罻ýÌåµÈЧÀ͵Ķþ´ÎÑéÖ¤´úÂ룻£»£»£»£»£»£»ÆäÈý£¬£¬£¬£¬£¬»á¼û°üÀ¨Ë°ÎñID¡¢ÐÕÃû¡¢IPµØµãµÈÃô¸ÐÐÅÏ¢µÄÓû§Êý¾Ý¿â£¬£¬£¬£¬£¬ÈôÊôʵ½«×é³ÉÖØ´óÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬AT&TÉÐδ¶Ô´Ë×÷³ö¹ûÕæ»ØÓ¦£¬£¬£¬£¬£¬CybernewsÍŶÓÕýÒ»Á¬×·×Ù°µÍøÊý¾ÝÑù±¾¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/att-data-breach-impacted-millions-hackers-say/
4. ±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÔâÀÕË÷Èí¼þ¹¥»÷
9ÔÂ1ÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒ£¨OAG£©¿ËÈÕÈ·ÈÏÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆäЧÀÍÆ÷ÓÚ8Ô³õ±»ÆÈÏÂÏߣ¬£¬£¬£¬£¬ÐÌÊÂÓëÃñʰ¸¼þÉóÀí·ºÆðÑÓÎ󡣡£¡£¡£¡£¡£¡£¸ÃÖÝ×ÜÉó²é³¤´÷·ò¡¤ÉµÏ£¨Dave Sunday£©ÔÚ8ÔÂ29ÈÕµÄת´ïÖÐ֤ʵ£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉÍⲿְԱͨ¹ý¼ÓÃÜÎļþʵÑ飬£¬£¬£¬£¬¹¥»÷ÕßÒªÇóÖ§¸¶Êê½ðÒÔ»Ö¸´ÔËÓª£¬£¬£¬£¬£¬µ«×èÖ¹ÏÖÔÚOAGÉÐδ֧¸¶ÈκÎÊê½ð¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜδÃ÷È·Êý¾ÝÊÇ·ñ±»µÁ£¬£¬£¬£¬£¬ÉµÏÌåÏÖÕýÓëÆäËû»ú¹¹¿ªÕ¹ÁªºÏÊӲ죬£¬£¬£¬£¬²¢Ç¿µ÷¡°ÈôÊÓ²ìÏÔʾÓÐÐëÒª£¬£¬£¬£¬£¬½«ÏòÏà¹ØÐ¡ÎÒ˽¼Ò·¢ËÍ֪ͨ¡±£¬£¬£¬£¬£¬µ«Î´½øÒ»²½Í¸Â¶ÊÓ²ìϸ½Ú»òÓ¦¶Ô²½·¥¡£¡£¡£¡£¡£¡£¡£×÷Ϊ±öÖÝ×î¸ßÖ´·¨»ú¹¹£¬£¬£¬£¬£¬OAGÈÏÕæÌáÆðÐÌÊÂËßËÏ¡¢Ö´ÐÐÏûºÄÕß±£»£»£»£»£»£»£»¤·¨µÈ½¹µãÖ°ÄÜ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÍøÂçÊÂÎñµ¼ÖÂÈ«Öݶà¼Ò·¨Ôº±»ÆÈÑÓÉì°¸¼þÉóÀíÏÞÆÚ¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÊ×´ÎÅû¶ÓÚ8ÔÂ18ÈÕ£¬£¬£¬£¬£¬ÆäʱOAGÍøÕ¾¡¢°ì¹«ÓÊÏä¼°Àο¿µç»°ÖÜȫ̱»¾£¬£¬£¬£¬£¬Ö±½ÓÓ°ÏìÆäÓ빫ÖÚ¼°ÀûÒæÏà¹ØÕßµÄÏàͬ¡£¡£¡£¡£¡£¡£¡£×èÖ¹×îÐÂת´ï£¬£¬£¬£¬£¬OAG´ó²¿·ÖÊÂÇéÖ°Ô±Òѻָ´ÓÊÏä»á¼ûȨÏÞ£¬£¬£¬£¬£¬Ö÷µç»°Ïߺ͹ٷ½ÍøÕ¾ÒàÖØÐÂÉÏÏߣ¬£¬£¬£¬£¬µ«ËùÓй¦Ð§µÄ»Ö¸´ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£¡£ÉµÏÖ¸³ö£¬£¬£¬£¬£¬È«ÖÝ17¸ö°ì¹«ËùÔÚµÄÔ¼1200ÃûÔ±¹¤ÈÔÔÚͨ¹ýÌæ»»ÇþµÀά³ÖÒ»Ñùƽ³£ÊÂÇé¡£¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/ransomware-pennsylvania-ag/
5. Silver FoxʹÓÃÊðÃûÇý¶¯³ÌÐò°²ÅÅValleyRATºóÃÅ
9ÔÂ1ÈÕ£¬£¬£¬£¬£¬Check Point Research£¨CPR£©¿ËÈÕÅû¶£¬£¬£¬£¬£¬Ó볯ÏʹØÁªµÄSilver Fox APT×éÖ¯ÕýʹÓÃ΢ÈíÊðÃûµÄÕýµ±Çý¶¯³ÌÐòʵÑéÐÂÐÍÍøÂç¹¥»÷£¬£¬£¬£¬£¬Í¨¹ý"×Ô´øÎó²îÇý¶¯³ÌÐò£¨BYOVD£©"ÊÖÒÕÈÆ¹ýÇå¾²·À»¤£¬£¬£¬£¬£¬°²ÅÅÄ£¿£¿£¿£¿£¿£¿£¿é»¯ºóÃÅValleyRAT¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÀÄÓÃWatchDog AntimalwareÇý¶¯³ÌÐò£¨amsdk.sys£©ºÍZemanaÇý¶¯£¨ZAM.exe£©£¬£¬£¬£¬£¬Ê¹ÓÃÆäí§ÒâÀú³ÌÖÕÖ¹¹¦Ð§£¬£¬£¬£¬£¬Ç¿ÐÐÖÕÖ¹·À²¡¶¾¼°EDR¹¤¾ßÀú³Ì£¬£¬£¬£¬£¬Îª¶ñÒâÈí¼þÆÌ·¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÉÏÊöÇý¶¯¾ùͨ¹ý΢ÈíÊý×ÖÊðÃûÈÏÖ¤£¬£¬£¬£¬£¬ÇÒδ±»ÁÐÈëÒÑÖªÎó²îÁÐ±í£¬£¬£¬£¬£¬µ«¹¥»÷Õßͨ¹ýÐÞ¸Äʱ¼ä´Á×Ö¶ÎÌìÉúÐÂÎļþ¹þÏ££¬£¬£¬£¬£¬ÔÚ¼á³ÖÊðÃûÓÐÓÃÐÔµÄͬʱ¹æ±Ü¼ì²â¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷·ºÆðÏÔÖøÊÖÒÕÑݽøÌØÕ÷£ºSilver Fox½«·´ÆÊÎöÄ£¿£¿£¿£¿£¿£¿£¿é¡¢³¤ÆÚ»¯»úÖÆ¡¢Ç¶ÈëʽÇý¶¯¼°Ä¿µÄÀú³ÌÁбí·â×°ÖÁ¼òµ¥¼ÓÔØÆ÷£¬£¬£¬£¬£¬²¢¿ìËÙµü´úÇý¶¯°æ±¾ÒÔ×èÖ¹²éɱ¡£¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬Æä¶ñÒâÈí¼þÉèÖÃרÃÅÕë¶Ô¶«ÑǵØÇøÊ¢ÐеÄÇå¾²²úÆ·£¬£¬£¬£¬£¬ÇÒ»ù´¡ÉèʩָÏòÖйúЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ValleyRATºóÞ߱¸ÆÁÄ»¼à¿Ø¡¢ÏÂÁîÖ´ÐС¢Êý¾ÝÍâйµÈÄÜÁ¦£¬£¬£¬£¬£¬¿Éͨ¹ýTorÍøÂçÎüÊÕÔ¶³ÌÖ¸Á£¬£¬£¬£¬½øÒ»²½Ç¿»¯¹¥»÷Òþ²ØÐÔ¡£¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/silver-fox-deploy-valleyrat/
6. ÑÇÂíÑ·×èÖ¹¶íÂÞ˹APT29ºÚ¿Í¹¥»÷Microsoft 365
9ÔÂ1ÈÕ£¬£¬£¬£¬£¬ÑÇÂíÑ·ÍþвÇ鱨ÍŶӿËÈÕÁªºÏCloudflareÓë΢Èí£¬£¬£¬£¬£¬ÀֳɯÆËð¶íÂÞ˹Õþ¸®Åä¾°ºÚ¿Í×éÖ¯Midnight Blizzard£¨APT29£©Õë¶ÔMicrosoft 365ÕË»§µÄÖØ´ó¹¥»÷Ðж¯¡£¡£¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýË®¿Ó¹¥»÷ÊÖÒÕÈëÇÖÕýµ±ÍøÕ¾£¬£¬£¬£¬£¬Ê¹ÓÃbase64±àÂë»ìÏý¶ñÒâ´úÂ룬£¬£¬£¬£¬½«Ô¼10%µÄ»á¼ûÕßËæ»úÖØ¶¨ÏòÖÁ·ÂðCloudflareÑéÖ¤Ò³ÃæµÄÓòÃû£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õß½øÈë¶ñÒâ×°±¸´úÂëÈÏÖ¤Á÷³Ì£¬£¬£¬£¬£¬ÊÔͼÊÚȨ¹¥»÷Õß¿ØÖƵÄ×°±¸»á¼ûÆä΢ÈíÕË»§¡£¡£¡£¡£¡£¡£¡£×÷Ϊ¶íÂÞ˹¶ÔÍâÇ鱨¾Ö£¨SVR£©¹ØÁªµÄAPT29×éÖ¯£¬£¬£¬£¬£¬´Ë´ÎÐж¯ÑÓÐøÁËÆäϰÓõÄÍøÂç´¹ÂÚÕ½ÂÔ£¬£¬£¬£¬£¬µ«ÊÖÒÕÊÖ·¨ÏÔÖøÉý¼¶£ºÍ¨¹ý»ùÓÚcookieµÄϵͳ×èֹͳһÓû§¶à´ÎÖØ¶¨Ïò£¬£¬£¬£¬£¬½µµÍ̻¶Σº¦£»£»£»£»£»£»£»²»ÔÙÒÀÀµÃ°³äAWSÓòÃû»òÉç»á¹¤³ÌÈÆ¹ýMFA£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃ΢Èí×°±¸´úÂëÑéÖ¤»úÖÆµÄÎó²î¡£¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬¸Ã×éÖ¯½üÆÚ¹¥»÷Ä¿µÄº¸ÇÅ·ÖÞ´óʹ¹Ý¡¢»ÝÆÕÆóÒµ¼°TeamViewer£¬£¬£¬£¬£¬Í¹ÏÔÆäÇé±¨ÍøÂçÒâͼ¡£¡£¡£¡£¡£¡£¡£ÑÇÂíÑ·Ñо¿Ö°Ô±ÔÚ·¢Ã÷¶ñÒâEC2ʵÀýºóѸËÙ¸ôÀ룬£¬£¬£¬£¬²¢ÐͬÏàÖúͬ°é×è¶ÏÓòÃûÆÊÎö¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜAPT29ÊÔÍ¼×ªÒÆ»ù´¡ÉèÊ©ÖÁÆäËûÔÆÐ§ÀÍÉ̲¢×¢²áÐÂÓòÃû£¬£¬£¬£¬£¬µ«Ðж¯ÒÑÔâÆÆË𡣡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/amazon-disrupts-russian-apt29-hackers-targeting-microsoft-365/


¾©¹«Íø°²±¸11010802024551ºÅ