FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв
Ðû²¼Ê±¼ä 2025-02-171. FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв
2ÔÂ16ÈÕ£¬£¬£¬£¬FinalDraftÊÇÒ»ÖÖз¢Ã÷µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬ËüʹÓÃOutlookµç×ÓÓʼþµ×¸å¾ÙÐÐÒþ²ØµÄÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶£¬£¬£¬£¬×¨ÃŹ¥»÷ÄÏÃÀij²¿·Ö¡£¡£¡£¡£¡£¸Ã¹¥»÷ÓÉElastic Security Labs·¢Ã÷£¬£¬£¬£¬Éæ¼°Ò»Ì×ÍêÕûµÄ¹¤¾ß¼¯£¬£¬£¬£¬°üÀ¨PathLoader¼ÓÔØÆ÷¡¢FinalDraftºóÃż°¶à¸öºóʹÓóÌÐò¡£¡£¡£¡£¡£FinalDraftͨ¹ýÀÄÓÃOutlookʵÏÖÒþ²ØÍ¨Ñ¶£¬£¬£¬£¬Ö´ÐÐÊý¾Ýй¶¡¢ÊðÀí¡¢Àú³Ì×¢ÈëºÍºáÏòÒÆ¶¯µÈ²Ù×÷£¬£¬£¬£¬Í¬Ê±Ö»¹ÜïÔ̺ۼ£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚPathLoaderÈëÇÖ£¬£¬£¬£¬ËüÖ´Ðдӹ¥»÷Õß»ù´¡ÉèÊ©¼ìË÷µÄshellcode£¬£¬£¬£¬°üÀ¨FinalDraft¶ñÒâÈí¼þ¡£¡£¡£¡£¡£FinalDraftͨ¹ýMicrosoft Graph API½¨ÉèͨѶ£¬£¬£¬£¬Ê¹ÓÃǶÈëµÄË¢ÐÂÁîÅÆ¼ìË÷OAuthÁîÅÆ²¢´æ´¢ÔÚWindows×¢²á±íÖУ¬£¬£¬£¬ÊµÏÖ³¤ÆÚ»á¼û¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýOutlookµ×¸å·¢ËͺÍÎüÊÕÏÂÁ£¬£¬£¬×èÖ¹¼ì²â²¢ÈÚÈëÕý³£Microsoft 365Á÷Á¿¡£¡£¡£¡£¡£FinalDraftÖ§³Ö37¸öÏÂÁ£¬£¬£¬°üÀ¨Êý¾Ýй¶¡¢Àú³Ì×¢È롢ת´ï¹þÏ£¹¥»÷µÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¹·¢Ã÷FinalDraftµÄLinux±äÌå¼°ÁíÒ»¸öδ¼Í¼µÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷GuidLoader¡£¡£¡£¡£¡£REF7707ÊÇÕë¶ÔÄÏÃÀÍâ½»²¿µÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬µ«ÆÊÎöÏÔʾÆäÓë¶«ÄÏÑÇÊܺ¦ÕßÓÐÁªÏµ£¬£¬£¬£¬ÌåÏÖÐж¯¹æÄ£¸ü¹ã¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶«ÄÏÑǵçÐźͻ¥ÁªÍø»ù´¡ÉèÊ©ÌṩÉ̵ÄÊÜѬȾ¶ËµãÃé×¼¸ß¼ÛÖµ»ú¹¹£¬£¬£¬£¬²¢Ê¹Óö«ÄÏÑÇÒ»Ëù´óѧµÄ´æ´¢ÏµÍ³ÍйܶñÒâÈí¼þ¸ºÔØ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/
2. SteamÊÐËÁÓÎÏ·PirateFiÈö²¥Vidar¶ñÒâÈí¼þ£¬£¬£¬£¬Ó°Ï쳬1500Óû§
2ÔÂ14ÈÕ£¬£¬£¬£¬SteamÊÐËÁÖÐÒ»¿îÃûΪPirateFiµÄÃâ·ÑÓÎÏ·ÔÚ2ÔÂ6ÈÕÖÁ2ÔÂ12ÈÕʱ´úÈö²¥ÁËVidarÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬Ó°Ïì¿ÉÄܶà´ï1500ÃûÓû§¡£¡£¡£¡£¡£¸ÃÓÎÏ·ÓÉSeaworth InteractiveÐû²¼£¬£¬£¬£¬±»ÐÎòΪһ¿îÉúÑÄÓÎÏ·£¬£¬£¬£¬µ«Steam·¢Ã÷Æä°üÀ¨¶ñÒâÈí¼þºóÒÑÏòÊÜÓ°ÏìÓû§·¢ËÍ֪ͨ£¬£¬£¬£¬½¨ÒéËûÃÇÖØÐÂ×°ÖÃWindowsÒÔÈ·±£Çå¾²¡£¡£¡£¡£¡£SECUINFRA Falcon TeamÈ·ÈϸöñÒâÈí¼þΪVidarÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÒ»¸ö°æ±¾£¬£¬£¬£¬Òþ²ØÔÚPirate.exeÎļþÖС£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÖÖÖÖ»ìÏýÊÖÒպ͸ü¸ÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÒÔÇÔȡƾ֤¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬PirateFiÃû³ÆÖеÄweb3/Çø¿éÁ´/¼ÓÃÜÇ®±ÒÒýÓÃÊÇΪÁËÎüÒýÌØ¶¨Íæ¼ÒȺÌå¡£¡£¡£¡£¡£ËäÈ»SteamÍÆ³öÁËÌØÊâ²½·¥±£»£»¤Íæ¼ÒÃâÊÜδ¾ÊÚȨµÄ¶ñÒâ¸üÐÂË𺦣¬£¬£¬£¬µ«PirateFi°¸ÀýÅú×¢ÕâЩ²½·¥ÈÔÐèÔöÇ¿¡£¡£¡£¡£¡£´ËǰҲÓÐÀàËÆ¶ñÒâÈí¼þÈëÇÖSteamÊÐËÁµÄ°¸Àý£¬£¬£¬£¬ÈçʹÓÃChromeÎó²îµÄDota 2ÓÎϷģʽºÍ±»ºÚ¿Í¹¥»÷µÄ¡¶Slay the Spire¡·Ä£×é¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/
3. ÒÉËÆ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-2372ʹÓÃ×°±¸´úÂë´¹ÂÚ¹¥»÷Microsoft 365ÕÊ»§
2ÔÂ15ÈÕ£¬£¬£¬£¬Ò»¸öÃûΪStorm-2372µÄÍþвÐÐΪÕߣ¬£¬£¬£¬ÒÉËÆÓë¶íÂÞ˹Óйأ¬£¬£¬£¬ÕýÔÚÕë¶ÔÈ«Çò¶à¸öÁìÓòµÄ×éÖ¯Ìᳫװ±¸´úÂëÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬Ä¿µÄ°üÀ¨Õþ¸®¡¢·ÇÕþ¸®×éÖ¯¡¢ITЧÀͺÍÊÖÒÕ¡¢¹ú·À¡¢µçÐÅ¡¢ÎÀÉúÒÔ¼°ÄÜÔ´µÈÁìÓò¡£¡£¡£¡£¡£×ÔÈ¥Äê8ÔÂÒÔÀ´£¬£¬£¬£¬¸ÃÐÐΪÕßͨ¹ýÐÂÎÅÆ½Ì¨Ã°³äÓëÄ¿µÄÏà¹ØµÄ×ÅÃûÈËÊ¿£¬£¬£¬£¬ÓÕÆÓû§ÔÚÕýµ±µÇÂ¼Ò³ÃæÉÏÊäÈë¹¥»÷ÕßÌìÉúµÄ×°±¸´úÂ룬£¬£¬£¬´Ó¶ø»ñÈ¡¶ÔÊܺ¦ÕßMicrosoft 365ÕÊ»§µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬²¢ÆôÓÃGraph APIÊý¾ÝÍøÂç»î¶¯¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬¹¥»÷ÕßÏÖÔÚʹÓÃMicrosoftÉí·ÝÑéÖ¤ÊðÀíµÄÌØ¶¨¿Í»§¶ËID£¬£¬£¬£¬Äܹ»ÌìÉúеÄÁîÅÆ£¬£¬£¬£¬´øÀ´ÐµĹ¥»÷ºÍ³¤ÆÚÐÔ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬£¬£¬Î¢Èí½¨Òé×èÖ¹×°±¸´úÂëÁ÷£¬£¬£¬£¬ÊµÑéÌõ¼þ»á¼ûÕ½ÂÔ£¬£¬£¬£¬²¢ÔÚÏÓÒɱ£´æ´¹ÂÚ¹¥»÷ʱ×÷·ÏÓû§µÄË¢ÐÂÁîÅÆ²¢ÉèÖÃÌõ¼þ»á¼ûÕ½ÂÔÒÔÇ¿ÖÆÖØÐÂÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬Ê¹ÓÃMicrosoft Entra IDµÄµÇ¼ÈÕÖ¾¾ÙÐÐ¼à¿Ø²¢¿ìËÙʶ±ðÒì³£µÇ¼ʵÑé¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/
4. ³¯ÏʺڿÍ×éÖ¯KimsukyÒÉËÆÌᳫDEEP#DRIVEÍøÂç´¹ÂÚ¹¥»÷
2ÔÂ14ÈÕ£¬£¬£¬£¬Ò»³¡ÃûΪDEEP#DRIVEµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯×Ô2024Äê9ÔÂÆðÕë¶Ôº«¹úÆóÒµ¡¢Õþ¸®ÊµÌå¼°¼ÓÃÜÇ®±ÒÓû§Õö¿ª£¬£¬£¬£¬ÒÑÔì³ÉÊýǧÃûÊܺ¦Õß¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÒÉËÆ³¯ÏʺڿÍ×éÖ¯KimsukyÌᳫ£¬£¬£¬£¬ÆäÖ÷ҪĿµÄÊÇÍøÂ纫¹úʵÌåµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓú«Óï±àдµÄ¶¨ÖÆÍøÂç´¹ÂÚÓÕ¶ü£¬£¬£¬£¬Î±×°³ÉÊÂÇéÈÕÖ¾¡¢°ü¹ÜÎļþºÍ¼ÓÃÜÏà¹ØÎļþµÈÕýµ±Îļþ£¬£¬£¬£¬Í¨¹ýDropboxµÈƽ̨·Ö·¢£¬£¬£¬£¬ÒÔÌӱܹŰåÇå¾²·ÀÓù¡£¡£¡£¡£¡£ÕâЩÓÕ¶üͨ³£ÒÔ.hwp¡¢.xlsxºÍ.pptxµÈÊÜÐÅÈεÄÎļþÃûÌ÷ºÆð£¬£¬£¬£¬È«ÐÄÉè¼ÆÒÔÎüÒýÄ¿µÄÊÜÖÚ¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔαװ³ÉÕýµ±ÎĵµµÄ.lnkÎļþ×îÏÈ£¬£¬£¬£¬Æô¶¯¶ñÒâPowerShell¾ç±¾µÄÖ´ÐУ¬£¬£¬£¬½ø¶øÏÂÔØÆäËûÓÐÓøºÔز¢½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃDropbox¾ÙÐÐÊý¾Ýй¶£¬£¬£¬£¬²¢Ê¹ÓöàÖÖÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕߵĻù´¡ÉèÊ©¿´ËƶÌÔÝ£¬£¬£¬£¬µ«ÆäÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÓëKimsuky×éÖ¯ºÜÊÇÏàËÆ¡£¡£¡£¡£¡£Securonix½¨Òé¶ÔÓû§¾ÙÐÐÍøÂç´¹ÂÚ½ÌÓý¡¢¼à¿Ø¶ñÒâÈí¼þÔÝ´æÄ¿Â¼ÒÔ¼°¿É¿¿µÄ¶ËµãÈÕÖ¾¼Í¼£¬£¬£¬£¬ÒÔ·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£¡£
https://hackread.com/n-korean-hackers-deep-drive-attacks-against-s-korea/
5. ºÚ¿ÍʹÓÃCVE-2025-0108Îó²î¹¥»÷PAN-OS·À»ðǽ
2ÔÂ14ÈÕ£¬£¬£¬£¬ºÚ¿ÍʹÓÃ×î½üÐÞ¸´µÄCVE-2025-0108Îó²î¶ÔPalo Alto NetworksµÄPAN-OS·À»ðǽÌᳫÁ˹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢Å²ÓÃPHP¾ç±¾£¬£¬£¬£¬Î£¼°ÏµÍ³µÄÍêÕûÐÔºÍÉñÃØÐÔ¡£¡£¡£¡£¡£Palo Alto NetworksÔÚ2ÔÂ12ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬±Þ²ßÖÎÀíÔ±½«·À»ðǽÉý¼¶µ½Ö¸¶¨°æ±¾ÒÔ½â¾ö´ËÎÊÌ⣬£¬£¬£¬Í¬Ê±Ö¸³öPAN-OS 11.0ÒòÒÑ´ïʹÓÃÊÙÃü£¬£¬£¬£¬½«²»ÔÙÐû²¼ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¸ÃÎó²îÓÉAssetnoteµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬ËûÃÇÒѽÒÏþ°üÀ¨ÍêÕûÎó²îʹÓÃϸ½ÚµÄÎÄÕ¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²îÌáÈ¡Ãô¸ÐÊý¾Ý¡¢¼ìË÷ÉèÖûòʹÓÃÉèÖᣡ£¡£¡£¡£GreyNoiseƽ̨¼Í¼ÁËÕë¶ÔδÐÞ²¹·À»ðǽµÄ¹¥»÷ʵÑ飬£¬£¬£¬ÇÒ¿ÉÄÜÓжà¸öÍþвÐÐΪÕß¼ÓÈë¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÓÐÁè¼Ý4400̨PAN-OS×°±¸µÄÖÎÀí½çÃæÔÚÏß̻¶¡£¡£¡£¡£¡£Îª·ÀÓù¹¥»÷£¬£¬£¬£¬½¨ÒéÓ¦Óò¹¶¡²¢ÏÞÖÆ¶Ô·À»ðǽÖÎÀí½Ó¿ÚµÄ»á¼û¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
6. CISA½«Apple iOS/iPadOS¼°Mitel SIPµç»°Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼
2ÔÂ15ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Apple iOSºÍiPadOSµÄÊÚȨ¹ýʧÎó²î£¨CVE-2025-24200£©ÒÔ¼°Mitel SIPµç»°µÄ²ÎÊý×¢ÈëÎó²î£¨CVE-2024-41710£©Ìí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£Æ»¹û½ôÆÈÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁË¿ÉÄܱ»¡°¼«ÆäÖØ´ó¡±Õë¶ÔÐÔ¹¥»÷ʹÓõÄCVE-2025-24200Îó²î£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìiPhone XS¼°¸üлúÐͺͶà¿îiPad£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚËø¶¨×°±¸ÉϽûÓÃUSBÏÞÖÆÄ£Ê½¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬MitelÒ²Ðû²¼Á˹̼þ¸üнâ¾öÁËCVE-2024-41710Îó²î£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìMitel 6800¡¢6900ºÍ6900wϵÁÐSIPµç»°£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õß¾ÙÐÐÏÂÁî×¢Èë¹¥»÷¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬ÓÐÑо¿·¢Ã÷»ùÓÚMiraiµÄ½©Ê¬ÍøÂçAquabotµÄбäÖÖÕë¶Ô±£´æ¸ÃÎó²îµÄMitel SIPµç»°¾ÙÐй¥»÷¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ5ÈÕǰÐÞ¸´ÕâЩÎó²î£¬£¬£¬£¬²¢½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£
https://securityaffairs.com/174246/security/u-s-cisa-adds-apple-ios-and-ipados-and-mitel-sip-phones-flaws-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ