Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßʵÑéÒþ²Ø¹¥»÷
Ðû²¼Ê±¼ä 2025-12-111. Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßʵÑéÒþ²Ø¹¥»÷
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ReliaQuest¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬ÃûΪStorm-0249µÄ³õʼ»á¼ûÊðÀíÕýͨ¹ýÀÄÓö˵ã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¼Æ»®¼°ÊÜÐÅÈεÄMicrosoft WindowsÊÊÓóÌÐò£¬£¬£¬£¬£¬£¬ÊµÑé¸ß¶ÈÒþ²ØµÄ¶ñÒâÈí¼þ¼ÓÔØÓ볤ÆÚ»¯²Ù×÷£¬£¬£¬£¬£¬£¬ÎªºóÐøÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¡£¡£¡£¡£¸Ã×éÖ¯ÒÑÞðÆú¹Å°å´ó¹æÄ£ÍøÂç´¹ÂÚ£¬£¬£¬£¬£¬£¬×ª¶ø½ÓÄɸüÏȽøµÄÊÖÒÕÊֶΣ¬£¬£¬£¬£¬£¬¼´±ã·ÀÓù·½Ïêϸ¼Í¼ÆäÐÐΪ£¬£¬£¬£¬£¬£¬ÈÔÄÑÒÔÓÐÓÃÓ¦¶Ô¡£¡£¡£¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³Ì¹¥»÷£ºÓÕÆÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐÐcurlÏÂÁ£¬£¬£¬£¬£¬ÏÂÔØ¾ß±¸SYSTEMȨÏ޵ĶñÒâMSI°ü¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬´ÓαÔìMicrosoftÓò»ñÈ¡µÄ¶ñÒâPowerShell¾ç±¾Ö±½Ó×¢ÈëϵͳÄڴ棬£¬£¬£¬£¬£¬È«³Ì²»Âä´ÅÅÌÒÔ¹æ±Ü·À²¡¶¾¼ì²â¡£¡£¡£¡£¡£MSIÎļþÊͷŵĶñÒâDLL£¨ÈçSentinelAgentCore.dll£©±»Õ½ÂÔÐÔ°²ÅÅÔÚÕýµ±SentinelOne EDR×é¼þµÄSentinelAgentWorker.exeÅÔ£¬£¬£¬£¬£¬£¬Í¨¹ýDLL²à¼ÓÔØÊÖÒÕÔÚÊÜÐÅÈεÄÌØÈ¨EDRÀú³ÌÖÐÖ´ÐУ¬£¬£¬£¬£¬£¬ÊµÏÖ²Ù×÷ϵͳ¸üкóÈÔ¿Éά³ÖµÄÒþ²Ø³¤ÆÚÐÔ¡£¡£¡£¡£¡£ÈëÇֺ󣬣¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃSentinelOne×é¼þÁ¬Ïµreg.exe¡¢findstr.exeµÈÕýµ±Windows¹¤¾ßÍøÂçϵͳ±êʶ·û£¬£¬£¬£¬£¬£¬²¢Í¨¹ý¼ÓÃÜHTTPS C2Á÷Á¿½¨ÉèͨѶ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-iab-abuses-edr-for-stealthy-malware-execution/
2. ¡°Ö©ÖëÏÀ¡±ÍøÂç´¹ÂÚ¹¤¾ß°üϯ¾íÅ·ÖÞ½ðÈÚ½ç
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÍþвÆÊÎö¹«Ë¾Varonis¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Ò»¿îÃûΪ¡°Ö©ÖëÏÀ¡±µÄÈ«Õ»Ê½ÍøÂç´¹ÂÚ¹¤¾ß°üÕýÔÚ°µÍøÆÕ±éÈö²¥£¬£¬£¬£¬£¬£¬Ê¹·ÇÊÖÒÕ¹¥»÷ÕßÒ²ÄܶÔÅ·ÖÞÖ÷ÒªÒøÐм°¼ÓÃÜÇ®±Òƽ̨Ìᳫ´ó¹æÄ£¾«×¼¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¤¾ß°ü±»Ñо¿Ö°Ô±³ÆÎª¡°Äê¶È×îΣÏÕ¡±Íþв֮һ£¬£¬£¬£¬£¬£¬ÒòÆäÎÞÐè±à³Ì֪ʶ¼´¿É¿ìËÙÌìÉúÏñËØ¼¶¿Ë¡µÄ½ðÈÚ»ú¹¹µÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬ÁýÕֵ¹ú¡¢±ÈÀûʱµÈÎå¹úÊýÊ®¼Ò»ú¹¹£¬£¬£¬£¬£¬£¬°üÀ¨µÂÒâÖ¾ÒøÐС¢ºÉÀ¼¹ú¼Ê¼¯ÍÅ£¨ING£©¡¢CaixaBankµÈÖ÷Á÷ÒøÐм°¼ÓÃÜÇ®°üЧÀÍÉÌ£¬£¬£¬£¬£¬£¬Ä¿µÄÓû§ÈºÌåÖØ´ó¡£¡£¡£¡£¡£¹¥»÷Á÷³Ì¼«¼ò»¯£º¹¥»÷Õß½öÐèÑ¡ÔñÄ¿µÄÒøÐУ¬£¬£¬£¬£¬£¬Æô¶¯¿Ë¡³ÌÐò£¬£¬£¬£¬£¬£¬·¢ËÍÓë¹Ù·½ÍêȫһÖµÄÓÕ¶üÐÅÏ¢¼´¿ÉʵÑé´¹ÂÚ¡£¡£¡£¡£¡£¹¤¾ß°üÄÚÖüÓÃÜÖú¼Ç´ÊÇÔȡģ¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬±ê¼Ç×ÅÕ©ÆÊÖ¶ÎÏò»ìÏýÐÍÉú³¤¡£¡£¡£¡£¡£Æä×îΣÏÕÌØÕ÷ÔÚÓÚʵʱÐÅÏ¢×èµ²ÄÜÁ¦¡ª¡ªÊܺ¦ÕßÊäÈëµÇ¼ÐÅÏ¢ºó£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÁ¬Ã¦»ñÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬²¢´¥·¢¶þ´Î½çÃæÍøÂçÐÅÓÿ¨ºÅ¡¢OTP»òPhotoTANÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£µ¥´Î»á»°¼´¿ÉÇÔȡȫÃû¡¢³öÉúÈÕÆÚ¡¢ÐÅÓÿ¨ÏêÇéµÈÍêÕûÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬×ãÒÔÍêÈ«½ÓÊÜÕË»§²¢ÊµÑéÉí·Ý͵ÇÔ¡£¡£¡£¡£¡£Îª¹æ±ÜÇå¾²¼ì²â£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß°ü½ÓÄɵØÀí·â±ÕÊÖÒÕÏÞÖÆ·ÇÄ¿µÄ¹ú¼Ò»á¼û£¬£¬£¬£¬£¬£¬²¢ÆÁÕÏÒÑÖªÇå¾²¹«Ë¾ÍøÂçÁ÷Á¿£¬£¬£¬£¬£¬£¬ÓÐÓÃÌÓ±Ü×Ô¶¯É¨ÃèºÍÈ˹¤ÆÊÎö¡£¡£¡£¡£¡£
https://hackread.com/spiderman-phishing-kit-european-banks-credential-theft/
3. Ó¡¶ÈÂüµÏ¹«¹²Ãŵê250Íò¿Í»§ÐÅϢй¶¹ÒÊÛ
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨ÂÛÌ³ÆØ¹âÒ»ÆðÕë¶ÔÓ¡¶ÈϲÂíÙɶû°îÂüµÏ¹«¹²Æû³µÃŵêµÄÒÉËÆÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷ÕßÐû³ÆÓÚ½ñÄêÈëÇָù«Ë¾¿Í»§¹ØÏµÖÎÀíϵͳºǫ́£¬£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏäµÈÔÚÄÚµÄ250ÍòÌõ¾ÏúÉ̼°¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢¹ûÕæ¹ÒÅÆÊÛÂô¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉæÊ¹«Ë¾ÉÐδÐû²¼¹Ù·½ÉùÃ÷È·ÈÏÊÂÎñÕæÊµÐÔ¡£¡£¡£¡£¡£Êý¾ÝÑù±¾½ö°üÀ¨8ÌõÐÅÏ¢£¬£¬£¬£¬£¬£¬ÕæÊµÐÔÔÝÎÞ·¨ºËʵ¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÕßÓÚ½ñÄê4Ô¼ÓÈë¸ÃÂÛ̳£¬£¬£¬£¬£¬£¬´ËÇ°Ôø¶à´Î³öÊÛÆóÒµÊý¾Ý²¢¸½´øÑù±¾£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÈôÊôʵ£¬£¬£¬£¬£¬£¬±»µÁÊý¾Ý¿ÉÄܱ»ÓÃÓÚ¹¹½¨Óû§Éí·Ý»Ïñ£¬£¬£¬£¬£¬£¬ÎªºóÐøÉç»á¹¤³Ìѧ¹¥»÷£¨Èç´¹ÂÚÕ©Æ¡¢Éí·ÝðÓã©Ìṩ¾«×¼ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÏÔÖøÌáÉýÊܺ¦Õß±»¶þ´Î¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¹«¹²Æû³µ¼°Æä¾ÏúÉÌÒÑ·ÇÊ״γÉÎªÍøÂç·¸·¨Ä¿µÄ¡£¡£¡£¡£¡£½ñÄê10Ô£¬£¬£¬£¬£¬£¬¹«¹²¼¯ÍÅ·¨¹ú·Ö¹«Ë¾±»÷è÷ëÀÕË÷Èí¼þÍÅ»ïÁÐÈëйÃÜÍøÕ¾£»£»£»£»£»6Ô£¬£¬£¬£¬£¬£¬¹«¹²¼¯ÍÅ»¹·ºÆðÔÚStormousÀÕË÷Èí¼þ¿¨Ëþ¶ûµÄ°µÍøÐ¹ÃÜÍøÕ¾¡£¡£¡£¡£¡£
https://cybernews.com/security/volkswagen-dealership-data-breach-india/
4. DroidLock¶ñÒâÈí¼þ»áËø¶¨°²×¿×°±¸²¢Ë÷ÒªÊê½ð
12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪDroidLockµÄÐÂÐͰ²×¿¶ñÒâÈí¼þ½üÆÚ±»·¢Ã÷£¬£¬£¬£¬£¬£¬Æäͨ¹ý¶àÖØ¹¥»÷ÊֶζÔÎ÷°àÑÀÓïÓû§ÊµÑéÀÕË÷ÓëÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶ñÒâÍøÕ¾ÍÆ¹ãð³äÕýµ±Èí¼þ°üµÄÐéαӦÓ㬣¬£¬£¬£¬£¬Ñ¬È¾Àú³ÌʼÓÚÓÕÆÓû§×°ÖðüÀ¨ÏÖʵ¶ñÒâÈí¼þµÄ¶þ¼¶ÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬£¬¶ñÒâ³ÌÐò»áÇëÇó×°±¸ÖÎÀíÔ±ºÍ¸¨Öú¹¦Ð§È¨ÏÞ£¬£¬£¬£¬£¬£¬´Ó¶øÖ´ÐаüÀ¨ÆÁÄ»Ëø¶¨¡¢Êý¾Ý²Á³ý¡¢PINÂë/ÃÜÂë/ÉúÎïʶ±ðÊý¾ÝÐ޸ĵÈ15ÏîÏÂÁ£¬£¬£¬£¬£¬ÉõÖÁ¿ÉÔ¶³Ìͨ¹ýVNCÍêÈ«¿ØÖÆ×°±¸¡£¡£¡£¡£¡£DroidLockµÄ½¹µãÍþвÔÚÓÚÆäÀÕË÷»úÖÆÓëÊý¾ÝÇÔÈ¡ÄÜÁ¦¡£¡£¡£¡£¡£ÀÕË÷Ä£¿£¿£¿£¿éͨ¹ýWebViewÏÔʾÊê½ðÒªÇ󣬣¬£¬£¬£¬£¬Ö¸Ê¾Êܺ¦Õßͨ¹ýProtonÓÊÏäÁªÏµ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬²¢Íþв24СʱÄÚδ֧¸¶Êê½ð½«ÓÀÊÀÏú»ÙÎļþ¡£¡£¡£¡£¡£Ö»¹Ü¸ÃÈí¼þ²»Ö±½Ó¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬µ«Í¨¹ýÏú»ÙÎļþµÄÍþвµÖ´ïÓëÀÕË÷Èí¼þÏàͬµÄЧ¹û¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Æäͨ¹ýÆÁÄ»ÁýÕÖ²ãÇÔÈ¡Óû§½âËøÍ¼°¸£¬£¬£¬£¬£¬£¬Á¬ÏµVNCÔ¶³Ì»á¼ûʵÏÖ×°±¸¿ØÖÆ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ»¹ÄÜ»á¼û¶ÌÐÅ¡¢Í¨»°¼Í¼¡¢ÁªÏµÈË£¬£¬£¬£¬£¬£¬ÉõÖÁÖ´ÐмÒôºÍɾ³ýÊý¾ÝµÈ²Ù×÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/
5. Docker Hub¾µÏñ±»·¢Ã÷й¶ƾ֤ºÍÉí·ÝÑéÖ¤ÃÜÔ¿
12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÍþвÇ鱨¹«Ë¾Flare½üÆÚɨÃè·¢Ã÷£¬£¬£¬£¬£¬£¬Docker Hubƽ̨³¬10,000¸öÈÝÆ÷¾µÏñ±£´æÃô¸ÐÐÅϢй¶ÎÊÌ⣬£¬£¬£¬£¬£¬Éæ¼°Éú²úϵͳƾ֤¡¢CI/CDÊý¾Ý¿âÃÜÔ¿¼°AIÄ£×ÓÁîÅÆµÈ£¬£¬£¬£¬£¬£¬Ó°Ïì100Óà¼Ò×éÖ¯£¬£¬£¬£¬£¬£¬°üÀ¨²Æ²ú500Ç¿ÆóÒµ¡¢¹ú¼ÒÒøÐм°10Óà¼Ò½ðÈÚ»ú¹¹¡£¡£¡£¡£¡£×÷ΪȫÇò×î´óÈÝÆ÷×¢²á±í£¬£¬£¬£¬£¬£¬Docker Hub±¾Ó¦°ü¹Ü¿ª·¢ÕßÇå¾²¹²Ïí¼´ÓÃÐ;µÏñ£¬£¬£¬£¬£¬£¬µ«±¾´ÎÊÂÎñ̻¶ÆäÇå¾²Îó²îµÄÑÏÖØÐÔ¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬11ÔÂÉÏ´«µÄ¾µÏñÖУ¬£¬£¬£¬£¬£¬10,456¸ö±£´æÃÜԿй¶£¬£¬£¬£¬£¬£¬ÆäÖÐ42%µÄ¾µÏñÖÁÉÙ̻¶5¸öÃô¸ÐÊýÖµ¡£¡£¡£¡£¡£×й¶µÄÊÇOpenAI¡¢HuggingFaceµÈAIÄ£×ӵĻá¼ûÁîÅÆ£¬£¬£¬£¬£¬£¬×ÜÁ¿´ï4,000¸ö¡£¡£¡£¡£¡£ÕâЩÃÜÔ¿¿É±»ÓÃÓÚÍêÈ«»á¼ûÔÆÇéÐΡ¢Git¿ÍÕ»¡¢CI/CDϵͳ¼°Ö§¸¶¼¯³ÉµÈ½¹µã»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬×é³ÉÖØ´óÇ徲Σº¦¡£¡£¡£¡£¡£Ð¹Â¶×éÖ¯¶àÂþÑÜÓÚÈí¼þ¿ª·¢¡¢Êг¡¡¢¹¤Òµ¼°AIÁìÓò¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬³¬ËijÉй¶Դ×Ô"Ó°×ÓIT"ÕË»§£¬£¬£¬£¬£¬£¬ÕâЩÕË»§ÍùÍùȱ·¦ÆóÒµ¼¶Çå¾²¼à¿Ø¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/
6. WinRAR¸ßΣ·¾¶±éÀúÎó²îÔâ¶à¹úAPT×é֯ʹÓÃ
12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÓÚ2025Äê12Ô½«WinRARµÄCVE-2025-6218Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒÑ֤ʵ±»¶à¸ö¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯Æð¾¢Ê¹Óᣡ£¡£¡£¡£¸ÃÎó²îΪ·¾¶±éÀúÀàÐÍ£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö7.8£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§·¿ª¶ñÒâÎļþ»ò»á¼û¶ñÒâÒ³ÃæÊ±Ö´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬½öÓ°ÏìWindowsϵͳ°æ±¾¡£¡£¡£¡£¡£RARLABÒÑÔÚ2025Äê6ÔÂÐû²¼µÄWinRAR 7.12ÖÐÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬µ«´ËǰÒÑÔâÆÕ±éʹÓᣡ£¡£¡£¡£¾ÝÇå¾²³§ÉÌÆÊÎö£¬£¬£¬£¬£¬£¬¶íÂÞ˹GOFFEE×éÖ¯£¨ÓÖÃûPaper Werewolf£©ÔøÁ¬ÏµCVE-2025-6218ÓëCVE-2025-8088£¨ÆÀ·Ö8.8£©Ìá³«ÍøÂç´¹ÂÚ¹¥»÷£»£»£»£»£»ÄÏÑÇBitter APT×éÖ¯Ôòͨ¹ý¶ñÒâRARѹËõ°üÖ²ÈëNormal.dotmÈ«¾ÖÄ£°å£¬£¬£¬£¬£¬£¬ÈƹýWordºêÏÞÖÆÊµÏÖ³¤ÆÚ»¯ºóÃÅ£»£»£»£»£»¶íÂÞ˹Gamaredon×éÖ¯ÔòÕë¶ÔÎÚ¿ËÀ¼¾üÊ¡¢Õþ¸®»ú¹¹ÌᳫÓã²æÊ½ÍøÂç´¹ÂÚ£¬£¬£¬£¬£¬£¬Ê¹ÓøÃÎó²î°²ÅÅPteranodon¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÉõÖÁÔÚ2025Äê11ÔÂÊ×´ÎʵÑ鯯ËðÐÔÐж¯£¬£¬£¬£¬£¬£¬Í¶·ÅGamaWiper²Á³ýÆ÷¡£¡£¡£¡£¡£
https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html


¾©¹«Íø°²±¸11010802024551ºÅ