DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
Ðû²¼Ê±¼ä 2025-07-101. DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
7ÔÂ9ÈÕ£¬½üÆÚ£¬ÍøÂçÇå¾²»ú¹¹Trellix¸ß¼¶Ñо¿ÖÐÐÄÅû¶һÆðÕë¶ÔÅ·ÖÞÍâ½»»ú¹¹µÄ¶¨ÏòÍøÂç¹¥»÷ÊÂÎñ£¬Æä±³ºóÒÉËÆÉæ¼°Ó¡¶ÈÅä¾°µÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯DoNot Team£¨±ð³ÆAPT-C-35µÈ£©¡£¸Ã×éÖ¯×Ô2016ÄêÆðÒ»Á¬»îÔ¾£¬ÒÔ¶¨ÖÆ»¯Windows¶ñÒâÈí¼þ£¨ÈçYTY¡¢GEditºóÃÅ£©ÍŽáÓã²æÊ½´¹ÂÚÓʼþΪÖ÷Òª¹¥»÷ÊֶΣ¬ºã¾ÃÕë¶ÔÕþ¸®¡¢Íâ½»¡¢¹ú·À¼°·ÇÕþ¸®×éÖ¯Õö¿ªÍøÂçÌØ¹¤Ô˶¯£¬Ä¿µÄÇøÓò´Ëǰ¼¯ÖÐÓÚÄÏÑÇ£¬´Ë´ÎÊ×´ÎÈ·ÈÏÆä¶ÔÅ·ÖÞÍâ½»ÁìÓòµÄÀ©ÕÅÐÔÉøÍ¸¡£´Ë´Î¹¥»÷Á´Ê¼ÓÚαװ³ÉÒâ´óÀûפÃϼÓÀ¹ú¹ú·ÀÎä¹Ù»á¼ûÐг̵Ĵ¹ÂÚÓʼþ£¬¹¥»÷Õßͨ¹ýGmailÕË»§·¢ËÍUTF-8±àÂëµÄHTMLÃûÌÃÓʼþ£¬Ê¹ÓÃÌØÊâ×Ö·û£¨Èç·¨Óï"Attach¨¦"£©ÔöÇ¿¿ÉÐŶȣ¬ÓÕµ¼Ä¿µÄµã»÷GoogleÔÆ¶ËÓ²ÅÌÁ´½ÓÏÂÔØRARѹËõ°ü¡£Ñ¹Ëõ°üÄÚº¬Î±×°ÎªPDFÎĵµµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ£¬Êܺ¦Õß·¿ªºó½«´¥·¢LoptikModÔ¶³Ì»á¼ûľÂí¡£¸ÃľÂíͨ¹ýÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯×¤Áô£¬¾ß±¸ÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢ÎüÊÕÔ¶³ÌÖ¸Áî¡¢ÏÂÔØ¸½¼ÓÄ£¿éµÈ¹¦Ð§£¬²¢½ÓÄÉ·´ÐéÄâ»úÊÖÒÕºÍASCII»ìÏýÊÖÒÕ¹æ±ÜÇå¾²ÆÊÎö£¬Í¬Ê±Í¨¹ýµ¥ÊµÀýÔËÐлúÖÆ×èÖ¹³åÍ»¡£
https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html
2. ÈÕ±¾ÐÂÈÕÌú×Ó¹«Ë¾ÔâÁãÈÕ¹¥»÷ÖÂÊý¾Ýй¶
7ÔÂ9ÈÕ£¬ÈÕ±¾ÐÂÈÕÌú¼¯ÍÅÆìÏÂ×Ó¹«Ë¾ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾£¨Nippon Steel Solutions£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßʹÓÃδ¹ûÕæµÄÁãÈÕÎó²îÇÖÈëÆäÄÚ²¿ÍøÂ磬µ¼Ö¿ͻ§¡¢ÏàÖúͬ°é¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙй¶Σº¦¡£¸Ã¹«Ë¾×¨×¢ÓÚÔÆ·þÎñÓëÍøÂçÇå¾²½â¾ö¼Æ»®£¬´Ë´ÎÊÂÎñÒòÆäÊÖÒÕÅä¾°¶ø±¸ÊܹØ×¢¡£2025Äê3ÔÂ7ÈÕ£¬ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾¼à²âµ½·þÎñÆ÷Òì³£Ô˶¯£¬Ëæ¼´¸ôÀëÊÜÓ°Ïìϵͳ¡£¾ÊÓ²ìÈ·ÈÏ£¬¹¥»÷Õßͨ¹ýÕë¶ÔÍøÂç×°±¸µÄÁãÈÕÎó²îʵÑéÈëÇÖ£¬Ôì³ÉÄÚ²¿ÍøÂçδ¾ÊÚȨ»á¼û£¬²¿·ÖÃô¸ÐÊý¾Ý¿ÉÄܱ»ÇÔÈ¡¡£ÖµµÃÇìÐÒµÄÊÇ£¬¸Ã¹«Ë¾Ç¿µ÷ÆäÔÆ·þÎñƽ̨δÊܲ¨¼°£¬ÓªÒµÒ»Á¬ÐÔδÊÜÖ±½ÓÓ°Ï졣ƾ֤ͨ¸æ£¬Ð¹Â¶ÐÅÏ¢º¸ÇÈýÀàÖ÷Ì壺¿Í»§Êý¾Ý°üÀ¨ÐÕÃû¡¢¹«Ë¾Ãû³Æ¡¢ËùÊô»ú¹¹¡¢Ö°Î»¡¢µØµã¡¢ÓÊÏä¼°µç»°£»ÏàÖúͬ°éÐÅÏ¢Éæ¼°ÐÕÃû¼°¹«Ë¾ÓòÃûÓÊÏ䣻Ա¹¤Êý¾ÝÔò°üÀ¨ÐÕÃû¡¢²¿·Ö¡¢Ö°Î»¼°ÆóÒµÓÊÏä¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢ÕâЩÐÅÏ¢ÒÑͨ¹ýÉ罻ýÌå»ò°µÍøÀ©É¢£¬µ«¹«Ë¾ÈÔ¾¯Ê¾Óû§Ð¡ÐÄ¿ÉÒÉͨѶ£¬×èÖ¹µã»÷²»Ã÷Á´½Ó»ò»Ø¸´ÉúÊèÀ´µç¡£ÏÖÔÚ£¬¹«Ë¾ÒÑÍê³ÉÄÚ²¿ÍøÂçÇå¾²»Ö¸´£¬²¢Ïò¾¯·½¼°ÈÕ±¾Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»¤Î¯Ô±»áÌá½»±¨¸æ£¬ÍÆÐз¨¶¨Åû¶ÒåÎñ¡£
https://securityaffairs.com/179766/data-breach/nippon-steel-solutions-data-breach.html
3. ÃÀ¹ú¼ÓÃÜATM¾ÞÍ·Bitcoin DepotÔâÓöÊý¾Ýй¶
7ÔÂ9ÈÕ£¬ÃÀ¹ú×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin Depot¿ËÈÕÅû¶һÆðÓ°Ïì2.7Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬¸Ã¹«Ë¾Í¨¹ýÐżþ֪ͨÊÜÓ°ÏìÓû§£¬ÊÂÎñ¿É×·ËÝÖÁ2024Äê6ÔÂ23ÈÕ£¬ÆäÍøÂçÊ״μì²âµ½¿ÉÒÉÔ˶¯£¬µ«ÒòÁª°îÖ´·¨»ú¹¹ÒªÇóÅäºÏÊӲ죬ֱÖÁ7ÔÂ18ÈÕÄÚ²¿ÊÓ²ìÍê³Éºó·½ÄÜÆô¶¯Åû¶³ÌÐò¡£Æ¾Ö¤Í¨¸æ£¬Î´¾ÊÚȨµÄ¹¥»÷Õß»ñÈ¡Á˲¿·Ö¿Í»§ÔÚKYCÑéÖ¤Àú³ÌÖÐÌá½»µÄÃô¸ÐÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¼°µç×ÓÓÊÏäµÈ¡£Bitcoin DepotÔÚÈ«ÃÀ¡¢¼ÓÄô󼰰ĴóÀûÑÇÔËÓª×Å8800̨װ±¸£¬´Ë´ÎÊÂÎñ²¨¼°¹æÄ£ÆÕ±é¡£ÓÉÓÚ¼ÓÃÜÇ®±ÒÉúÒâµÄÄäÃûÐÔÓë×ʽð¿ìËÙÁ÷×ªÌØÕ÷£¬¹Å°å½ðÈÚÁìÓòµÄÉí·Ý¼à¿ØÓë·ÀµÁ·þÎñÔڴ˳¡¾°ÖÐÄÑÒÔʵÑé¡£Bitcoin DepotÃ÷È·ÌåÏÖÎÞ·¨ÎªÊÜÓ°ÏìÓû§ÌṩÐÅÓñ£»¤»òÉí·Ý¼à¿Ø·þÎñ£¬×ª¶ø½¨ÒéÓû§×Ô¶¯¼à¿ØÕË»§Òì³£ÉúÒâ¡¢¶³½áÐÅÓñ¨¸æ²¢Ð¡ÐÄ´¹ÂÚ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/
4. ÃÀ¹ú˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerboxй¶24.5ÍòÌõÃô¸ÐÊý¾Ý
7ÔÂ9ÈÕ£¬ÃÀ¹úµÃ¿ËÈøË¹ÖÝ˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerbox¿ËÈÕÒòδÉèÃÜÂë±£»¤µÄÊý¾Ý¿â̻¶£¬µ¼ÖÂ245,949Ìõ¡¢×ܼÆ286.9GBµÄÃô¸ÐÊý¾Ýй¶£¬º¸ÇÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢µØµã¡¢¼ÝʻִÕÕ¼°ÍËÎéÎäÊ¿DD214ÎļþµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£´Ë´ÎÊÂÎñÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷²¢±¨¸æÖÁvpnMentor¡£×÷ΪרעÓÚ¹ÍÖ÷˰ÊÕ¼¤ÀøÍýÏ루ÈçWOTC¡¢ERTCµÈ£©µÄ·þÎñÉÌ£¬RockerboxΪ²ÍÒû¡¢Âùݡ¢Ò½ÁƵȶà¸öÐÐÒµµÄÆóÒµÌṩ˰ÎñÓÅ»¯Ö§³Ö£¬Æäй¶µÄ¿Í»§Êý¾ÝÉæ¼°ÖØ´óµÄ²ÆÎñÓëСÎÒ˽¼ÒÐÅÏ¢¡£³ýÖ±½Ó´æ´¢µÄPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©Í⣬´ó×Ú˰ÊÕµÖÃâÉêÇëÎļþ¡¢Åú×¼/¾Ü¾øº¯¼°ÃÜÂë±£»¤PDFµÄÎļþÃûÒ²Ôâ̻¶£¬²¿·ÖÎļþÃû¿ÉÄÜÒþº¬ÃÜÂëÏßË÷£¬½øÒ»²½¼Ó¾çÐÅÏ¢ÀÄÓÃΣº¦¡£FowlerÖ¸³ö£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ¼°½ðÈÚڲƣ¬¶ÔÊÜÓ°ÏìСÎÒ˽¼Ò×é³ÉÖØ´óÍþв¡£ÊÂÎñ̻¶ºó£¬FowlerÁ¬Ã¦Í¨ÖªRockerbox£¬µ«¸Ã¹«Ë¾Î´×÷³öÕýʽ»ØÓ¦£¬Êý¾Ý¿âÔÚÊýÈÕºó²Å±»¼ÓÃܱ£»¤¡£
https://hackread.com/rockerbox-server-tax-firm-exposed-sensitive-records/
5. AnatsaÒÆ¶¯¶ñÒâÈí¼þÔٴι¥»÷±±ÃÀÒøÐпͻ§
7ÔÂ9ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±È·ÈÏ£¬ºã¾Ã»îÔ¾µÄAndroidÒøÐÐľÂíAnatsa½üÆÚÕë¶Ô±±ÃÀ½ðÈÚ»ú¹¹ÌᳫÐÂÒ»ÂÖ¹¥»÷£¬ºÉÀ¼ThreatFabric¹«Ë¾×·×ÙÏÔʾ£¬ÕâÒÑÊÇÆäÖÁÉÙµÚÈý´Î½«ÃÀ¹úÓë¼ÓÄôóÒÆ¶¯ÒøÐÐÓû§ÁÐΪĿµÄ¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼Í¼¼üÅÌÊäÈ뼰ͨ¹ýÔ¶³Ì¿ØÖÆÖ±½ÓʵÑéÚ²ÆÉúÒâµÄÄÜÁ¦£¬ÆäÁ½½×¶Î¹¥»÷ģʽÒý¿¯ÐÐÒµ¹Ø×¢¡£±¾´Î¹¥»÷ÖУ¬¹¥»÷ÕßÊ×ÏÈÔÚÓ¦ÓÃÊÐËÁÉϼܿ´ËÆÕýµ±µÄ¹¤¾ßÀàÓ¦Óã¨ÈçÎļþÔĶÁÆ÷£©£¬³õÆÚ¹¦Ð§Õý³£ÒÔ»ýÀÛÓû§ÐÅÍС£´ýÏÂÔØÁ¿µÖ´ïÊýÍò´Îºó£¬Í¨¹ý¸üÐÂ×¢Èë¶ñÒâ´úÂ룬½«Anatsa×÷Ϊ×ÔÁ¦³ÌÐò×°ÖÃÖÁ×°±¸¡£ÒÔ±¾´Î°¸ÀýΪÀý£¬Ò»¿îÎļþÔĶÁÆ÷Ó¦ÓÃÔÚ6ÔÂ24ÈÕÖÁ30ÈÕʱ´úÍÆË͸üУ¬Ï¼ÜǰÒÑÔÚÃÀ¹úPlayÊÐËÁÃâ·Ñ¹¤¾ß°ñѹµ¹Ò»ÇУ¬ÀÛ¼ÆÏÂÔØÁ¿³¬5Íò´Î¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Anatsa´Ë´Î¹¥»÷Ä¿µÄÇåµ¥ÏÔÖøÀ©Õ¹£¬ÁýÕÖÁ˸üÆÕ±éµÄÃÀ¹úÒÆ¶¯ÒøÐÐÓ¦Óá£
https://therecord.media/anatsa-android-banking-malware-returns-north-america
6. FlirtAIÔ¼»áÖúÊÖÒòδÊܱ£»¤Ôƴ洢й¶16ÍòÕÅ˽ÃܽØÍ¼
7ÔÂ8ÈÕ£¬µÂ¹ú°ØÁÖ¹«Ë¾Buddy Network GmbH¿ª·¢µÄiOSÓ¦ÓÃFlirtAI¿ËÈÕÒòÔÆ´æ´¢Çå¾²Îó²îÒý·¢ÑÏÖØÊý¾Ýй¶£¬³¬16ÍòÕÅÓû§ÉÏ´«µÄ˽ÃÜ̸Ìì½ØÍ¼Ì»Â¶ÓÚ¹«¹²»¥ÁªÍø¡£¸ÃÓ¦ÓÃÖ÷´òAI¸¨ÖúÉç½»¹¦Ð§£¬Óû§ÐèÊÖ¶¯½ØÈ¡Ô¼»áÈí¼þ¶Ô»°»òСÎÒ˽¼Ò×ÊÁϽçÃæ²¢ÉÏ´«£¬ÒÔ»ñÈ¡ÎåÌõ¶¨Öƻظ´½¨Ò顣Ȼ¶ø£¬Ñо¿Ö°Ô±·¢Ã÷Æä¹È¸èÔÆ´æ´¢Í°Î´ÉèÖûá¼ûȨÏÞ¿ØÖÆ£¬µ¼ÖÂÃô¸ÐÊý¾Ýºã¾ÃÂã¶¡£Êý¾ÝÏÔʾÇàÉÙÄêÓû§Õ¼±ÈÏÔÖø£¬ÆäÉÏ´«µÄ½ØÍ¼°üÀ¨Í¬ÁäÈË˽ÃܶԻ°£¬²¿·Öδ³ÉÄêÈË¿ÉÄÜÍêÈ«²»ÖªÏþ̸ÌìÄÚÈݱ»½ØÍ¼Íâй¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Ö»¹ÜÓ¦ÓÃÌõ¿îÒªÇó¡°ÉÏ´«Ç°Ðè»ñµÃ¶Ô»°·½ÊÚȨ¡±£¬µ«ÏÖʵ²Ù×÷ÖÐÏÕЩÎÞ·¨Ö´ÐС£ËäȻƻ¹ûÊÐËÁ±ê×¢17+ÄêËêÏÞÖÆ£¬ÈÔδÄÜÓÐÓÃ×èֹδ³ÉÄêÈËʹÓá£ÊÂÎñ´¦Öóͷ£Ê±¼äÏßÏÔʾ£¬Ñо¿Ö°Ô±5ÔÂ6ÈÕ·¢Ã÷Îó²îºó£¬ÓÚ5ÔÂ19ÈÕÏò¿ª·¢ÉÌת´ï£¬6ÔÂ2ÈÕÁªÏµÅÌËã»úÓ¦¼±ÏìӦС×飨CERT£©£¬×îÖÕÔÚ6ÔÂ16ÈÕÐÞ¸´´æ´¢Í°È¨ÏÞ¡£
https://cybernews.com/security/iphone-flirtai-app-leaks-chat-screenshots/


¾©¹«Íø°²±¸11010802024551ºÅ