É³ÌØ¹¤Òµ¾ÞÍ·RezayatÔâÓöEverestÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-07-15

1. É³ÌØ¹¤Òµ¾ÞÍ·RezayatÔâÓöEverestÀÕË÷Èí¼þ¹¥»÷


7ÔÂ14ÈÕ£¬É³Ìع¤Òµ·þÎñ¾ÞÍ·Rezayat¼¯ÍÅ¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þÍÅ»ïµÄÍøÂç¹¥»÷£¬³ÉΪÖж«µØÇøÓÖÒ»ÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£Õâ¼ÒÓµÓÐ25¼Ò×Ó¹«Ë¾¡¢ÓªÒµÁýÕÖ13¸ö¹ú¼Ò¡¢Ô±¹¤³¬Á½ÍòÈ˵Ŀç¹úÆóÒµ£¬±»¹¥»÷ÕßÐû³ÆÇÔÈ¡ÊýGBÃô¸ÐÊý¾Ý£¬Ïà¹ØÑù±¾ÒÑÔÚ°µÍøÐ¹Â¶Õ¾µãÆØ¹â¡£Çå¾²Ñо¿ÍŶӯÊÎö·¢Ã÷£¬Ð¹Â¶ÄÚÈݰüÀ¨¿Í»§ÌõÔ¼¡¢ÊÖÒÕ±¨¸æ¼°¹¤Òµ×°±¸Í¼Ö½µÈ½¹µãÉÌÒµÎļþ£¬ÈôÊý¾ÝÕæÊµÐÔ»ñµÃ֤ʵ£¬²»µ«½«ÑÏÖØËðº¦RezayatµÄÉÌÒµÐÅÓþ£¬¸ü¿ÉÄܱ»ÓÃÓÚÕë¶ÔÆäÏàÖúͬ°éµÄ¹©Ó¦Á´¹¥»÷£¬Òý¿¯ÐÐÒµÁ¬ËøÎ£º¦¡£ÊµÑé´Ë´Î¹¥»÷µÄEverestÍÅ»ï×Ô2021ÄêÊ״α»×·×ÙÒÔÀ´£¬ÒÑÐγɳÉÊìµÄ·¸·¨Ä£Ê½¡£¸Ã×é֝ɯÓÚͨ¹ýÈëÇÖÆóÒµÕË»§¼°Ê¹ÓÃÔ¶³Ì×ÀÃæÐ­Ò飨RDP£©¾ÙÐÐÍøÂçÉøÍ¸£¬ÒÑÍù12¸öÔÂÄÚÒѽ«Áè¼Ý°Ù¼ÒÆóÒµÁÐÈë°µÍø"Êܺ¦ÕßÃûµ¥"¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¸ÃÍÅ»ïÔøÐû³ÆÔÚ2022ÄêÀÖ³ÉÇÖÈëµçÐÅÔËÓªÉÌAT&TµÄÆóÒµÍøÂ磬չÏÖ³ö¼«Ç¿µÄÊÖÒÕ¹¥»÷ÄÜÁ¦¡£´Ë´ÎÕë¶ÔRezayatµÄÐж¯ÖУ¬¹¥»÷ÕßËäÉù³ÆÇÔÈ¡10GBÊý¾Ý£¬µ«Í¨Ì«¹ýÅúÊÍ·ÅÊý¾ÝÑù±¾Ê©Ñ¹Êܺ¦ÆóÒµÖ§¸¶Êê½ðµÄÕ½ÂÔ£¬ÇÐºÏÆäϰÓòÙ×÷ÊÖ·¨¡£


https://cybernews.com/security/rezayat-group-ransomware-data-breach/


2. ÉÝ³ÞÆ·¾ÞÍ·LVMHÓ¢¹ú·Ö²¿ÔâÓöÊý¾Ýй¶ÊÂÎñ


7ÔÂ14ÈÕ£¬È«ÇòÉÝ³ÞÆ·¾ÞÍ·LVMH¼¯ÍÅÆìÏÂÓ¢¹ú·Ö²¿¿ËÈÕ¾íÈëÖØ´óÊý¾Ýй¶ÊÂÎñ£¬³ÉΪ¼ÌÂêɯ°Ù»õ¡¢¹þÂ޵°ٻõµÈÖ®ºóÓÖÒ»¼ÒÔâÓöÍøÂç¹¥»÷µÄÓ¢¹úÁãÊÛÉÌ¡£Æ¾Ö¤¹«Ë¾Ïò¿Í»§·¢Ë͵Ä֪ͨ£¬7ÔÂ2ÈÕ·¢Ã÷µÄй¶ÊÂÎñ¿ÉÄÜ̻¶Á˿ͻ§µÄÐÕÃû¡¢ÐԱ𡢹ú¼®¡¢µç»°¡¢ÓÊÏä¡¢µØµã¡¢³öÉúÈÕÆÚ¼°¹ºÖÃÆ«ºÃµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¨PII£©¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÏÔʾÊý¾Ý±»ÀÄÓ㬵«Â·Ò×ÍþµÇÓ¢¹úÖÒÑԳƣ¬Ð¹Â¶ÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ´¹ÂÚ¹¥»÷¡¢Ú²Æ­»òÉí·ÝµÁÓ㬲¢½¨Òé¿Í»§Ð¡ÐÄ¿ÉÒÉͨѶ¡£´Ë´ÎÊÂÎñ¾àLVMHº«¹úÓªÒµÔâºÚ¿Í¹¥»÷½öÒ»ÖÜ£¬ÏÖÔÚÄêÒÔÀ´ÆäÆìÏ¿ËÀï˹͡¡¤µÏ°Â¸ß¼¶Ê±×°ÓëµÙܽÄáÆ·ÅÆÒ²Òò¿Í»§Êý¾Ýй¶½ÓÊÜÕþ¸®ÊӲ죬͹ÏÔ¼¯ÍÅ¶àµØ»ú¹¹½ÓÁ¬ÃæÁÙÇå¾²ÌôÕ½¡£Ç徲ר¼ÒÍÐÂí˹¡¤Àí²é×ÈÖ¸³ö£¬Ö»¹ÜLVMH´Ë´Îδй¶²ÆÎñÊý¾Ý£¬Î£º¦ÈÔ½ûֹСê¹¥»÷Õß¿ÉÄÜͨ¹ýð³ä¿Í»§Ì×È¡¸ü¶àÐÅÏ¢£¬»ò·¢ËÍÎ±×°ÖÆÆ·ÅÆµÄ¶ñÒâÓʼþÓÕµ¼µÇ¼/²ÆÎñÐÅÏ¢¡£ËûÇ¿µ÷£¬LVMH¶àµØ»ú¹¹½ÓÁ¬ÔâÀàËÆÊÖ¶ÎÈëÇÖ£¬ÌåÏÖÆä¿ÉÄܱ£´æÏµÍ³ÐÔÎó²î£¬»òÊÇÊÖÒÕϵͳ±£´æ¹²ÐÔȱÏÝ£¬»òÊÇй¶¿ØÖƲ½·¥È±·¦¡£¶Ô´Ë£¬Àí²é×Ƚ¨ÒéLVMHÁ¬Ã¦¿ªÕ¹È«¼¯ÍÅÇå¾²ÆÀ¹À£¬×·Ëݹ¥»÷ȪԴ²¢ÊµÑéÕû¸Ä£¬×èÖ¹Îó²îÒ»Á¬±»Ê¹Óá£


https://www.infosecurity-magazine.com/news/louis-vuitton-uk-retailer-data/


3. InterlockÀÕË÷Èí¼þ½ÓÄÉFileFixÒªÁìÈö²¥¶ñÒâÈí¼þ


7ÔÂ14ÈÕ£¬½üÆÚ£¬InterlockÀÕË÷Èí¼þÍÅ»ïÔÚ¹¥»÷ÊÖ¶ÎÉÏʵÏÖÖØ´óÉý¼¶£¬Ê״ιûÕæ½ÓÄÉÃûΪ"FileFix"µÄÐÂÐÍÉç»á¹¤³ÌÊÖÒÕ£¬ÍŽáÔ¶³Ì»á¼ûľÂí£¨RAT£©ÊµÑé¸üÒþ²ØµÄÍøÂç¹¥»÷¡£¸ÃÊÖÒÕÓÉÇå¾²Ñо¿Ô±mr.d0x¿ª·¢£¬ÊÇClickFix¹¥»÷µÄ½ø»¯°æ±¾¡£ÒÑÍùÒ»Äê¼ä£¬ClickFixÒѳÉΪ×îÖ÷Á÷µÄÓÐÓÃÔØºÉ·Ö·¢ÒªÁìÖ®Ò»£¬¶øFileFixͨ¹ý½øÒ»²½Ê¹ÓÃÓû§¶ÔWindowsÏµÍ³ÔªËØµÄÐÅÍУ¬ÊµÏÖÁ˸ü¸ßЧµÄ¶ñÒâ´úÂëÖ´ÐС£¹¥»÷Á÷³ÌÖУ¬ÍþвÐÐΪÕßͨ¹ýÊÜÑ¬È¾ÍøÕ¾°²ÅÅKongTukeÍøÂç×¢ÈëÆ÷£¬ÓÕµ¼»á¼ûÕßÍê³ÉÐéαCAPTCHAÑéÖ¤ºó£¬×Ô¶¯½«Î±×°³ÉÎļþ·¾¶µÄPowerShellÏÂÁî¸´ÖÆµ½¼ôÌù°å¡£Óû§±»Ö¸µ¼½«×Ö·û´®Õ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸Ê±£¬ÏÖʵִÐеÄÊÇ´Ó"trycloudflare.com"ÏÂÔØ»ùÓÚPHP»òNode.jsµÄInterlock RAT±äÖÖ¡£ÕâÒ»Àú³ÌʹÓÃWindows UIÔªËØ¹æ±ÜÇå¾²ÖÒÑÔ£¬Óû§½öÐè¼òÆÓ²Ù×÷¼´¿É´¥·¢¶ñÒâ´úÂëÏÂÔØ¡£Ñ¬È¾ºó£¬RATͨ¹ýPowerShellÏÂÁîÍøÂçϵͳÓëÍøÂçÐÅÏ¢£¬²¢ÒԽṹ»¯JSONÃûÌÃй¶Êý¾ÝÖÁC2·þÎñÆ÷¡£¹¥»÷Õß»¹¿Éͨ¹ýC2·¢ËÍshellÏÂÁî¡¢Ö²ÈëÐÂÔØºÉ¡¢Ìí¼Ó×¢²á±í³¤ÆÚÏî»òʹÓÃRDPºáÏòÒÆ¶¯£¬ÐγÉÍêÕû¹¥»÷Á´¡£


https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/


4. ¼¼¼ÎÖ÷°åUEFI¹Ì¼þÎó²îÆØ¹â£º°ÙÍò×°±¸ÃæÁÙ¶ñÒâÈí¼þÍþв


7ÔÂ14ÈÕ£¬È«Çò¹Ì¼þÇå¾²¹«Ë¾Binarly½üÆÚÅû¶£¬¼¼¼Î¿Æ¼¼ÆìÏÂÁè¼Ý240¿îÖ÷°åÐͺŵÄUEFI¹Ì¼þ±£´æËĸö¸ßΣÎó²î£¨CVE-2025-7026ÖÁCVE-2025-7029£©£¬ÑÏÖØÐÔÆÀ·Ö´ï8.2¡£ÕâЩÎó²îÔÊÐí¹¥»÷ÕßÔÚϵͳÖÎÀíģʽ£¨SMM£©ÇéÐÎÏÂÖ´ÐÐí§Òâ´úÂ룬ֲÈë¿ÉÈÆ¹ý¹Å°åÇå¾²·ÀÓùµÄbootkit¶ñÒâÈí¼þ£¬×ÝÈ»ÖØ×°²Ù×÷ϵͳÈԿɳ¤ÆÚ±£´æ¡£Ñо¿·¢Ã÷£¬Îó²îÔ´Óڹ̼þ¹©Ó¦ÉÌAmerican Megatrends Inc.£¨AMI£©µÄ²Î¿¼´úÂëȱÏÝ£¬µ¼Ö¼¼¼ÎµÈOEM³§ÉÌδÄÜʵʱÐÞ¸´£¬²¿·Ö×°±¸ÒòµÖ´ïʹÓÃÊÙÃüÖÕÖ¹£¨EOL£©×´Ì¬¿ÉÄÜÓÀÊÀ̻¶Σº¦¡£¹¥»÷Õß¿ÉʹÓÃSMMµÄ¸ßȨÏÞÌØÕ÷£¬Í¨¹ýÔ¶³Ì»á¼ûľÂí£¨RAT£©ÔÚÆô¶¯½×¶Î¼ÓÔØ¶ñÒâ´úÂë¡£ÀýÈ磬CVE-2025-7028ÔÊÐí¶ÔϵͳÖÎÀíRAM£¨SMRAM£©¾ÙÐжÁ/д»á¼û£¬¿ÉÄÜÖ±½Ó×°ÖöñÒâÈí¼þ£»CVE-2025-7027Ôò¿Éͨ¹ýÐÞ¸ÄSMRAMÄÚÈݸ͝¹Ì¼þ¡£BinarlyÖ¸³ö£¬Îó²îÓ°Ïì¹æÄ£ÆÕ±é£¬¼¼¼ÎÓÐ651¿î²úÆ·Êܲ¨¼°£¬Supermicro¡¢´÷¶ûµÈÆ·ÅÆÒàÔÚÆäÖУ¬È«ÇòÊÜÓ°Ïì×°±¸ÊýÄ¿³¬°ÙÍǫ̀¡£Ö»¹ÜAMIÒÑÐû²¼ÐÞ¸´²¹¶¡£¬µ«¼¼¼ÎµÈ³§É̵Ĺ̼þ¸üÐÂÖͺó£¬ÇÒδ¹ûÕæÇ徲ͨ¸æ¡£


https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/


5. Cursor IDEÖеĶñÒâÀ©Õ¹µ¼Ö¼ÛÖµ50ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ


7ÔÂ14ÈÕ£¬È«ÇòÇå¾²»ú¹¹¿¨°Í˹»ù¿ËÈÕÅû¶һÆðÕë¶Ô¼ÓÃÜÇ®±Ò¿ª·¢ÕßµÄÖØ´óÍøÂç¹¥»÷ÊÂÎñ£º¶íÂÞ˹¿ª·¢ÕßÒò×°ÖÃCursor AI IDEƽ̨ÉϵÄÐéαSolidityÓïÑÔÀ©Õ¹£¬µ¼Ö¼ÛÖµ50ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¹¥»÷ÕßʹÓÃOpen VSX×¢²á±íÖÐð³äÓï·¨¸ßÁÁ¹¤¾ßµÄ¶ñÒâÀ©Õ¹£¬Í¨¹ý¶à½×¶ÎÔØºÉͶµÝʵÏÖÁ˶Ô×°±¸µÄ³¤ÆÚ¿ØÖÆ¡£ÊÂÎñʼÓÚÊܺ¦Õß´ÓOpen VSXÏÂÔØÃûΪ"Solidity Language"µÄÀ©Õ¹³ÌÐò£¬¸Ã³ÌÐòÍâòÌṩÒÔÌ«·»ÖÇÄܺÏÔ¼¿ª·¢Ö§³Ö£¬ÊµÔòͨ¹ýÖ´ÐÐÔ¶³ÌPowerShell¾ç±¾Ö²ÈëScreenConnectÔ¶³ÌÖÎÀí¹¤¾ß¡£¹¥»÷Á´ÏÔʾ£¬¶ñÒâ´úÂëÊ×Ïȼì²é²¢×°ÖÃScreenConnect£¬Ê¹ÍþвÕß»ñµÃÍêȫԶ³Ì»á¼ûȨÏÞ£¬Ëæºóͨ¹ýVBScriptÏÂÔØ°üÀ¨Quasar RATºÍPureLogsÇÔÈ¡³ÌÐòµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£Ç°Õß¿ÉÖ´ÐÐí§ÒâϵͳÏÂÁºóÕßÔòרÃÅÇÔÈ¡ä¯ÀÀÆ÷ƾ֤¡¢¼ÓÃÜÇ®°üÊý¾Ý¼°Éí·ÝÑéÖ¤cookie¡£¿¨°Í˹»ùÆÊÎö·¢Ã÷£¬¸ÃÀ©Õ¹ÔÚOpen VSXµÄÏÂÔØÁ¿±»ÈËΪÐéÔöÖÁ54,000´Î£¬²¢Í¨¹ýË㷨ʹÓÃʹ¶ñÒâ³ÌÐòÔÚËÑË÷Ч¹ûÖÐÅÅÃû¸ßÓÚÕýµ±¹¤¾ß¡£¸üÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷ÕßÔ½ÈÕÒÔ"solidity"ÃûÒåÐû²¼ÏÕЩÏàͬ°æ±¾µÄÀ©Õ¹£¬½«×°ÖÃÁ¿Î±ÔìÖÁ½ü200Íò´Î£¬ÏÔÖøÔöÌíÓû§ÎóװΣº¦¡£


https://www.bleepingcomputer.com/news/security/malicious-vscode-extension-in-cursor-ide-led-to-500k-crypto-theft/


6. FBI²é·âÈÎÌìÌÃSwitch¡¢PS4ÓÎÏ·µÁ°æÍøÕ¾


7ÔÂ15ÈÕ£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©ÑÇÌØÀ¼´ó·Ö¾Ö¿ËÈÕÐû²¼£¬Àֳɵ·»ÙÒÔnsw2u.comΪÊ׵Ŀç¹úµÁ°æÓÎÏ·Æ½Ì¨ÍøÂ磬²é·â°üÀ¨nswdl.com¡¢ps4pkg.comµÈÔÚÄÚµÄ7¸öÓòÃû£¬²¢ÔÚÒ³ÃæÕ¹Ê¾Ö´·¨Í¨¸æÐû³Æ"ÒÑͬ²½´Ý»ÙÊÖÒÕÉèÊ©"¡£´Ë´ÎÐж¯»ñµÃºÉÀ¼Ö´·¨²¿·ÖЭÖú£¬±ê¼Ç×ÅÈ«Çò°æÈ¨ÑÚ»¤½øÈëн׶Ρ£ÊÓ²ìÏÔʾ£¬É永ƽ̨ÔÚÒÑÍùËÄÄê¼äÐγÉÍêÕûµÁ°æ¹¤ÒµÁ´£ºÔÚ¡¶Èû¶û´ï´«Ëµ£ºÍõ¹úÖ®Àá¡·µÈÈÈÃÅÓÎÏ·Õýʽ·¢ÊÛǰÊýÖܼ´Ìá¹©ÆÆ½â×ÊÔ´£¬Í¨¹ýÈÎÌìÌÃSwitchÆÆ½âÖ÷»ú¼æÈÝPCÓÎÏ·µÄÌØÕ÷¿ìËÙÀ©É¢¡£2025Äê2ÔÂ28ÈÕÖÁ5ÔÂ28ÈÕʱ´ú£¬Ö÷ÒªÏÂÔØÇþµÀ²»·¨ÏÂÔØÁ¿´ï320Íò´Î£¬°´µ¥»ú¾ù¼Û50ÃÀÔª¹ÀË㣬Ôì³É°æÈ¨·½Ô¼1.7ÒÚÃÀÔªÖ±½ÓËðʧ¡£ÆäÖÐnsw2uƽ̨ÒòÖ§³ÖÆÆ½â×°±¸ÔËÐеÁ°æÓÎÏ·£¬2025Äê5ÔÂÈ«Çò»á¼ûÁ¿´ï230Íò´Î£¬Ö»¹Ü±»Å·ÃËÁÐÈëð³äÓëµÁ°æ¼à¿ØÃûµ¥ÇÒÔâÓ¢¹ú¡¢Î÷°àÑÀµÈÁù¹ú·â±Õ£¬ÈÔͨ¹ýÊÖÒÕÊÖ¶ÎÒ»Á¬ÔËÓª¡£ÊÖÒÕ²ãÃæ£¬µÁ°æÆ½Ì¨Í¨¹ýÐéÄâÖ÷»úºÍ¼ÓÃÜͨѶ¹æ±Üî¿Ïµ£¬´Ë´ÎFBIÀֳɶ¨Î»ÆäλÓÚºÉÀ¼µÄ·þÎñÆ÷¼¯Èº£¬ÇжÏ×ʽðÁ÷ÓëÄÚÈÝ·Ö·¢ÇþµÀ¡£


https://therecord.media/piracy-sites-for-nintendo-switch-ps4-games-taken-down