CatwatchfulÌØ¹¤Èí¼þÎó²îÖÂ6.2ÍòÓû§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-07-081. CatwatchfulÌØ¹¤Èí¼þÎó²îÖÂ6.2ÍòÓû§Êý¾Ýй¶
7ÔÂ4ÈÕ£¬2025Äê6Ô£¬Çå¾²Ñо¿Ô±Eric Daigle½ÒÆÆCatwatchfulÌØ¹¤Èí¼þ±£´æÑÏÖØÇå¾²Îó²î£¬ÆäFirebaseÊý¾Ý¿âÒòSQL×¢Èë¹¥»÷̻¶62,000ÃûÓû§Ã÷ÎĵǼÐÅÏ¢¼°26,000̨װ±¸Êý¾Ý£¬Òý·¢Êý¾Ýй¶ÊÂÎñ¡£Õâ¿îαװ³É¡°ÒþÐΡ±¶ùͯ¼à¿ØÓ¦ÓõÄÌØ¹¤Èí¼þ£¬ÏÖʵͨ¹ýÎïÀí½Ó´¥Ö²ÈëÊܺ¦ÕßÊÖ»ú£¬²»·¨ÇÔÈ¡ÕÕÆ¬¡¢¶ÌÐÅ¡¢ÊµÊ±Î»Öü°ÇéÐÎÒôƵ£¬²¢Ô¶³Ì²Ù¿ØÉãÏñÍ·¡£Ö»¹ÜÓ¦ÓÃÊÐËÁÒÑեȡ´ËÀ๤¾ß£¬CatwatchfulÈÔͨ¹ýÔ¤ÉèÖÃAPKÈö²¥£¬Êܺ¦Õ߶༯ÖÐÓÚÄ«Î÷¸ç¡¢¸çÂ×±ÈÑǵÈÀ¶¡ÃÀÖÞ¹ú¼Ò£¬²¿·ÖÊý¾Ý¿É×·ËÝÖÁ2018Äê¡£ÊÂÎñ̻¶ºó£¬TechCrunchÓëÊý¾Ýй¶֪ͨƽ̨Have I Been PwnedÏàÖú¾¯Ê¾Ç±ÔÚÊܺ¦Õߣ¬¹È¸èËäͨ¹ýÇå¾²ä¯ÀÀ±ê¼ÇÏà¹ØÓòÃû£¬µ«ÉæÊÂÊý¾Ý¿âÔÚÊÓ²ìʱ´úÈÔÒ»Á¬ÔÚÏß¡£Ê±¼äÏßÏÔʾ£¬6ÔÂ23Èչȸè½éÈëºó£¬Ö÷ÓòÃûcatwatchful.pinkÓÚ6ÔÂ25ÈÕ̱»¾£¬µ«Ìæ»»ÓòÃûxng.vju.temporary.siteÔ½ÈÕ»Ö¸´·þÎñ£¬Ö±ÖÁ6ÔÂ27ÈÕͨ¹ýWAF×è¶ÏSQL×¢Èë¹¥»÷¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¸ÃÈí¼þÄÚÖá°543210¡±ºóÃÅ´úÂ룬ÔÊÐí¹¥»÷ÕßÔÚÓ¦ÓÃÒþ²ØºóÖØÐ»ñÈ¡¿ØÖÆÈ¨£¬Óû§¿Éͨ¹ý²¦´ò¸Ã´úÂë¼ì²â²¢Ð¶ÔضñÒâ³ÌÐò¡£
https://securityaffairs.com/179620/malware/a-flaw-in-catwatchful-spyware-exposed-logins-of-62000-users.html
2. CISA½«Google Chromium V8Îó²îÁÐÈëÒÑÖª¿ÉʹÓÃÎó²îĿ¼
7ÔÂ7ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«±àºÅΪCVE-2025-6554µÄChromiumV8Îó²îÁÐÈëÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬±ê¼ÇןøßΣÎó²îÒѽøÈëÕþ¸®î¿ÏµÊÓÒ°¡£¸ÃÎó²î±£´æÓÚGoogleChrome138.0.7204.96֮ǰ°æ±¾µÄV8JavaScriptºÍWebAssemblyÒýÇæÖУ¬ÊôÓڵ䷶µÄÀàÐÍ»ìÏýÎó²î£¬µ±ÒýÇæ¹ýʧ´¦Öóͷ£Êý¾ÝÀàÐÍʱ£¬¿ÉÄܵ¼ÖÂÄÚ´æË𻵻òí§Òâ´úÂëÖ´ÐУ¬¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâHTMLÒ³ÃæÊµÑéÔ¶³Ì¹¥»÷¡£¹È¸èÇå¾²ÍŶÓÓÚ2025Äê6ÔÂ25ÈÕÓÉÍþвÆÊÎöС×éÑо¿Ô±Cl¨¦mentLecigne·¢Ã÷¸ÃÎó²îºó£¬Ñ¸ËÙͨ¹ýStableͨµÀÏòÈ«Æ½Ì¨ÍÆËÍÐÞ¸´²¹¶¡£¬ChromeÎȹ̰æÒѸüÐÂÖÁ138.0.7204.x°æ±¾¡£ÖµµÃ×¢ÖØµÄÊÇ£¬´Ë´ÎÐÞ¸´¾àÎó²î·¢Ã÷½ö¸ôÒ»Ì죬µ«Ç徲ͨ¸æÃ÷È·Ö¸³ö"Ò°ÍâÒѱ£´æÕë¶Ô¸ÃÎó²îµÄ¹¥»÷ʹÓÃ"£¬Åú×¢ÍþвÐÐΪÕß¿ÉÄÜÒѽ«ÆäÓÃÓÚ¶¨Ïò¹¥»÷£¬Éæ¼°¹ú¼ÒºÚ¿Í×éÖ¯»òÉÌÒµÌØ¹¤Èí¼þ¹©Ó¦É̵ĿÉÄÜÐÔÒý·¢Òµ½çµ£ÐÄ¡£ÃÀ¹úÁª°îÕþ¸®ÒªÇóËùÓÐÁª°îÐÐÕþ²¿·Ö»ú¹¹±ØÐèÔÚ2025Äê7ÔÂ23ÈÕǰÍê³ÉÎó²îÐÞ¸´¡£
https://securityaffairs.com/179682/hacking/u-s-cisa-adds-google-chromium-v8-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. Atomic macOS¶ñÒâÈí¼þ½ø»¯Éý¼¶£¬Mac×°±¸ÃæÁÙ³¤ÆÚÐÔºóÃÅÍþв
7ÔÂ7ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬Õë¶ÔmacOSϵͳµÄAtomicÐÅÏ¢ÇÔÈ¡³ÌÐò£¨AMOS£©ÒÑÍÆ³ö¾ß±¸³¤ÆÚ»¯ºóÃŹ¦Ð§µÄа汾£¬±ê¼Ç×ÅÕâÒ»¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨µÄÊÖÒÕÄÜÁ¦ÓëÍþвƷ¼¶ÏÔÖøÉý¼¶¡£¾ÝMacPawÆìÏÂMoonlockʵÑéÊÒÆÊÎö£¬¸ÃºóÃÅ×é¼þ¿ÉʵÏÖÔ¶³ÌÏÂÁîÖ´ÐС¢¼üÅ̼ͼ¡¢ºáÏòÉøÍ¸µÈ¹¦Ð§£¬²¢ÄÜÔÚÏµÍ³ÖØÆôºó¼ÌÐøÔËÐУ¬Ê¹¹¥»÷Õß»ñµÃ¶ÔÊÜѬȾװ±¸µÄºã¾Ã¿ØÖÆÈ¨¡£´Ë´Î·¢Ã÷Ô´ÓÚ×ÔÁ¦Ñо¿Ô±g0njxaÌṩµÄÏßË÷£¬ÏÖÔÚÈ«ÇòÒÑÓÐ120¶à¸ö¹ú¼ÒµÄÓû§Êܵ½Ó°Ï죬ÆäÖÐÃÀ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Ó¢¹úºÍ¼ÓÄôóÎªÖØÔÖÇø¡£AtomicÇÔÈ¡³ÌÐò×îÔçÓÚ2023Äê4Ô±»¼Í¼£¬Æä×÷ΪMaaSƽ̨ÔÚTelegramƵµÀÍÆ¹ã£¬Ã¿Ô¶©ÔķѸߴï1000ÃÀÔª£¬³õÆÚÄ¿µÄΪÇÔÈ¡macOSÎļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÀ©Õ¹³ÌÐò¼°ä¯ÀÀÆ÷ÉúÑĵÄÃÜÂë¡£2023Äê11Ô£¬¸Ã×é֯ͨ¹ý"ClearFake"Ô˶¯Ê״ν«¹¥»÷¹æÄ£À©Õ¹ÖÁmacOSϵͳ£»2024Äê9Ô£¬ÍøÂç·¸·¨¼¯ÍÅ"Marko Polo"ÔÚÕë¶ÔApple×°±¸µÄ´ó¹æÄ£Ô˶¯Öа²ÅÅÁ˸öñÒâÈí¼þ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Æä·Ö·¢Õ½ÂÔÒÑ´ÓÆÆ½âÈí¼þÍøÕ¾µÈÆÕ±éÇþµÀ£¬×ªÏòÕë¶Ô¼ÓÃÜÇ®±Ò³ÖÓÐÕߵ͍ÏòÍøÂç´¹ÂÚ£¬ÒÔ¼°Ïò×ÔÓÉÖ°ÒµÕß·¢ËÍαװ³ÉÃæÊÔÔ¼ÇëµÄ¶ñÒâÔØºÉ¡£
https://www.bleepingcomputer.com/news/security/atomic-macos-infostealer-adds-backdoor-for-persistent-attacks/
4. °ÍÎ÷C&M SoftwareϵͳÎó²îÖÂ1.4ÒÚÃÀÔª´¢±¸½ð±»µÁ
7ÔÂ7ÈÕ£¬°ÍÎ÷½ðÈÚϵͳÔâÓöÖØ´óÇå¾²ÊÂÎñ£¬ÅþÁ¬ÑëÐÐÓëµØ·½ÒøÐеÄÖÐÐÄ·þÎñÉÌC&M Software¹«Ë¾ÒòºÚ¿Í¹¥»÷µ¼ÖÂÁù¼Ò½ðÈÚ»ú¹¹µÄ´¢±¸ÕË»§Ëðʧ800Íò°ÍÎ÷À×ÑǶû£¨Ô¼ºÏ1.4ÒÚÃÀÔª£©£¬³ÉΪ°ÍÎ÷ÑëÐÐÀúÊ·ÉÏ×îÑÏÖØµÄ¹©Ó¦ÉÌϵͳÎó²îÊÂÎñÖ®Ò»¡£ÊÂÎñʼÓÚ6ÔÂ30ÈÕ£¬C&M SoftwareÏò°ÍÎ÷ÑëÐÐת´ïÆäƽ̨ÔâÈëÇÖ£¬¹¥»÷Õßͨ¹ý²»·¨ÊÖ¶Î×ªÒÆÁ˽ðÈÚ»ú¹¹¼äÓÃÓÚÕûÀíµÄ´¢±¸×ʽ𡣰ÍÎ÷ÑëÐÐËæ¼´ÔÝÍ£ËùÓÐÍâµØ»ú¹¹¶ÔC&Mƽ̨µÄ»á¼ûȨÏÞ£¬²¢½éÈëÊӲ졣7ÔÂ4ÈÕ£¬Ê¥±£ÂÞ¾¯·½¾Ð²¶ÁË48ËêµÄǰC&Mºó¶Ëϵͳ¹¤³ÌʦJo?o Roque£¬Ö¸¿ØÆäÒÔÔ¼2700ÃÀÔªµÄ¼ÛÇ®ÏòºÚ¿Í³öÊÛϵͳµÇ¼ƾ֤£¬²¢ÐÖú¹¹½¨×ʽð×ªÒÆ»úÖÆ¡£¾Ý¾¯·½Åû¶£¬Roqueͨ¹ýWhatsAppÓë·¸·¨ÍÅ»ïÁªÂ磬ʹÓÃĦÍгµ¿ìµÝÊÕÈ¡³ê½ð£¬ÇÒÿ15ÌìÌæ»»Ò»´ÎÊÖ»úÒÔ¹æ±Ü×·×Ù£¬µ«×îÖÕÈÔ±»ÊÖÒÕÊֶζ¨Î»¡£ÖµµÃ×¢ÖØµÄÊÇ£¬±»µÁ×ʽðÔ´×Ô½ðÈÚ»ú¹¹µÄͬҵ´¢±¸ÕË»§£¬¶ø·Ç¿Í»§´æ¿î£¬Òò´Ë¹«ÖÚ×ʽðδֱ½ÓÊÜËð¡£ÏÖÔÚ°ÍÎ÷Õþ¸®ÒѶ³½á5000ÍòÃÀÔªÉæ°¸×ʲú£¬C&M SoftwareÌåÏÖÒÑÅäºÏÍê³ÉϵͳÐÞ¸´²¢»Ö¸´ÔËÓª¡£
https://www.bitdefender.com/en-us/blog/hotforsecurity/employee-arrested-after-brazils-central-bank-service-provider-hacked-for-us-140-million
5. ºÚ¿ÍÀÄÓÃй¶µÄShellterºì¶Ó¹¤¾ß°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐò
7ÔÂ7ÈÕ£¬ÉøÍ¸²âÊÔ¹¤¾ß¹©Ó¦ÉÌShellter Project¿ËÈÕ֤ʵ£¬ÆäÉÌÒµ¼¶AV/EDRÌӱܼÓÔØÆ÷Shellter EliteÒò¿Í»§Ð¹Â¶¸±±¾£¬±»ºÚ¿ÍÓÃÓÚÈö²¥ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¾ÝElastic Security Labs 7ÔÂ3ÈÕÅû¶£¬×Ô2025Äê4ÔÂÆð£¬¶à¸öÍþв×éÖ¯£¨°üÀ¨Rhadamanthys¡¢LummaºÍArechclient2£©Í¨¹ýYouTube̸ÂÛºÍÍøÂç´¹ÂÚÓʼþ·Ö·¢Ê¹ÓÃShellter Elite v11.0ÖÆ×÷µÄ¶ñÒâÔØºÉ¡£¸Ã¹¤¾ß×÷Ϊºì¶ÓרÓÃ×°±¸£¬Í¨¹ý¶à̬ÐÔ¾²Ì¬¹æ±ÜºÍAMSI/ETWµÈ¶¯Ì¬ÔËÐÐʱ¹æ±ÜÊÖÒÕ£¬¿É½«ÓÐÓÃÔØºÉÖ²ÈëÕýµ±Windows¶þ½øÖÆÎļþÒÔÈÆ¹ýEDR¼ì²â¡£ElasticÑо¿Ö°Ô±Í¨¹ýÔÊÐí֤ʱ¼ä´Á×·×Ù£¬È·ÈϹ¥»÷ÕßʹÓõ¥¸öй¶¸±±¾ÊµÑéÁ˳¤´ïÊýÔµĹ¥»÷Ô˶¯¡£Shellter ProjectÔÚÉùÃ÷ÖÐÈϿɣ¬´Ë´ÎÀÄÓÃÔ´ÓÚij¿Í»§Ð¹Â¶Æä¹ºÖõÄEliteÔÊÐíÖ¤¸±±¾£¬²¢Ç¿µ÷ÕâÊÇ2023Äê2ÔÂʵÑéÑÏ¿áÔÊÐíģʽºóµÄÊ×ÀýÒÑÖªÀÄÓÃÊÂÎñ¡£ÎªÓ¦¶ÔΣ»ú£¬¸Ã¹«Ë¾ÒÑÐû²¼Elite 11.1°æ±¾£¬½öÏòͨ¹ýÉó²éµÄ¿Í»§·Ö·¢¸üУ¬µ«Î´Í¸Â¶ÏêϸÊÖÒÕ»º½â²½·¥¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Shellter Project¹ûÕæÖ¸ÔðElastic Security Labsδʵʱת´ïÎó²î£¬³ÆÆä"ÎªÖÆÔ쾪¶¯Ð§Ó¦¶øÕÚÑÚÐÅÏ¢"£¬²¢³ÆÒÑÊÕµ½ElasticÌṩµÄÑù±¾ÓÃÓÚ¶¨Î»Î¥¹æ¿Í»§¡£
https://www.bleepingcomputer.com/news/security/hackers-abuse-leaked-shellter-red-team-tool-to-deploy-infostealers/
6. ÀÕË÷Èí¼þSatanLockÖÕÖ¹ÔËÓª£¬³Æ±»µÁÊý¾Ý½«±»Ð¹Â¶
7ÔÂ7ÈÕ£¬Ð½¨ÉèµÄ"Èöµ©Ëø"£¨SatanLock£©ÀÕË÷Èí¼þ×éÖ¯¿ËÈÕͻȻÐû²¼¹Ø±Õ£¬µ«ÆäÔÚ°µÍøÐû²¼µÄÉùÃ÷ÖÐÍþв½«ÓÚµ±ÈÕй¶ËùÓдÓÊܺ¦Õß´¦ÇÔÈ¡µÄÊý¾Ý£¬Òý·¢Çå¾²½ç¹Ø×¢¡£×Ô2025Äê4Ô³õ»îÔ¾ÒÔÀ´£¬SatanLockÒÔ¼¤½ø¹¥»÷ÊÖ¶ÎѸËÙո¶ͷ½Ç£¬¶Ì¶ÌÊýÖÜÄÚ¼´ÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼67ÃûÊܺ¦ÕßÏêϸÐÅÏ¢¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Check PointÑо¿Ôº5Ô±¨¸æÖ¸³ö£¬ÆäÖÐÁè¼Ý65%µÄÊܺ¦Õß´ËǰÒÑ·ºÆðÔÚÆäËûÀÕË÷ÍÅ»ïµÄйÃÜÃûµ¥ÖС£ÕâÒ»Õ÷ÏóÅú×¢£¬¸Ã×éÖ¯¿ÉÄÜͨ¹ý¹²Ïí·¸·¨»ù´¡ÉèÊ©ÔË×÷£¬»ò¿ÌÒâÕë¶ÔÒѱ»ÆäËûÍÅ»ïÈëÇÖµÄÍøÂç¾ÙÐÐ"¶þ´ÎÊÕ¸î"¡£ÍøÂçÇå¾²¹«Ë¾Lockbit DecryptorµÄÆÊÎö½øÒ»²½Õ¹ÏÖ£¬SatanLockÓëBabuk-Bjorka¡¢GD LockersecµÈ¶à¸ö×ÅÃûÀÕË÷Èí¼þ¼Ò×å±£´æ¹ØÁª£¬ÌåÏÖÆäÊôÓÚ¸ü´ó¹æÄ£µÄÍøÂç·¸·¨ÍøÂç¡£ÕâÖÖ¹ØÁªÐÔÓë´Ëǰ"ÁÔÈ˹ú¼Ê"£¨Hunters International£©¸üÃûΪWORLD LEAKS²¢×ªÐÍÊý¾Ýй¶µÄ°¸ÀýÐγɺôÓ¦¡£Ö»¹ÜSatanLockµÄ¹Ø±ÕÔµ¹ÊÔÓÉÉв»Ã÷È·£¬µ«Òµ½çÍÆ²âÆä¿ÉÄܽÓÄÉÀàËÆÕ½ÂÔ£¬Í¨¹ýÆ·ÅÆÖØËܹæ±ÜÖ´·¨¹¥»÷¡£
https://hackread.com/satanlock-ransomware-ends-operations-stolen-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ