CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷

Ðû²¼Ê±¼ä 2025-08-15

1. CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷


8ÔÂ13ÈÕ£¬ÍøÂçÇå¾²»ú¹¹Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶£¬Ò»ÖÖÃûΪCharonµÄÐÂÐÍÀÕË÷Èí¼þÕýÒÔÖж«¹«¹²²¿·ÖºÍº½¿ÕҵΪĿµÄÌᳫ¹¥»÷£¬ÆäÊÖÒÕÖØÆ¯ºóµÖ´ï¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©¼¶±ð ¡£Ñо¿ÏÔʾ£¬¹¥»÷Õß½ÓÄÉDLL²àÔØ¡¢Àú³Ì×¢Èë¼°EDRÌÓ±ÜÊÖÒÕ¹¹½¨¹¥»÷Á´£¬ÓëÔøÕë¶ÔÑÇÌ«Õþ¸®Ä¿µÄµÄEarth Baxia APT×éÖ¯±£´æÏÔÖøÊÖÒÕÖØµþ£¬µ«Ä¿½ñÖ¤¾ÝÉÐȱ·¦ÒÔÈ·ÈÏÖ±½Ó¹ØÁª ¡£´Ë´Î¹¥»÷ÒÔÕýµ±ä¯ÀÀÆ÷ÎļþEdge.exeΪÈë¿Ú£¬Í¨¹ý²àÔØ¶ñÒâmsedge.dll×îÖÕ°²ÅÅCharonÀÕË÷Èí¼þ ¡£¸ÃÈí¼þ¾ß±¸¶àÖØÆÆËðÐÔ¹¦Ð§£ºÖÕÖ¹Çå¾²·þÎñ¡¢É¾³ý¾íÓ°¸±±¾Ó뱸·ÝÒÔ×è°­»Ö¸´£¬½ÓÄɶàÏ̼߳ÓÃÜÊÖÒÕÌáÉýÎļþËø¶¨Ð§ÂÊ£¬²¢¼¯³É»ùÓÚ¿ªÔ´Dark-KillÏîÄ¿µÄÇý¶¯³ÌÐò£¬¿Éͨ¹ý¡°×Ô´øÒ×Êܹ¥»÷Çý¶¯³ÌÐò£¨BYOVD£©¡±¹¥»÷½ûÓÃEDR·À»¤£¬Ö»¹Ü´Ë´Î¹¥»÷Öиù¦Ð§Î´±»´¥·¢£¬ÌåÏÖÆäÈÔ´¦ÓÚ²âÊÔ½×¶Î ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷ÕßʹÓö¨ÖÆ»¯ÀÕË÷ÐÅÃ÷È·Ìá¼°Êܺ¦×éÖ¯Ãû³Æ£¬Ö¤Êµ´ËΪÕë¶ÔÐÔÐж¯ ¡£Ö»¹Ü¹¥»÷Á´Öжþ½øÖÆÎļþÓëEarth BaxiaÀúÊ·ÊÖ·¨¸ß¶ÈÏàËÆ ¡£ÏÖÔÚȱ·¦¹²Ïí»ù´¡ÉèÊ©»ò¹¥»÷ģʽµÈÈ·ÔäÖ¤¾Ý£¬½öÄÜÅжϱ£´æ¡°ÓÐÏÞµ«ÏÔÖøµÄÊÖÒÕÇ÷ͬ¡± ¡£


https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html


2. EfimerľÂíºá¿ç2024-2025Ä꣬ȫÇòÎåǧÓû§Ïݸ´ºÏÐÍÍøÂç·¸·¨Éú̬


8ÔÂ13ÈÕ£¬¿¨°Í˹»ù¿ËÈÕÅû¶£¬×Ô2024Äê10ÔÂÊ״η¢Ã÷ÒÔÀ´£¬EfimerľÂí²¡¶¾ÒÑÒ»Á¬»îÔ¾ÖÁ2025Ä꣬ͨ¹ýαÔìÖ´·¨ÉùÃ÷´¹ÂÚÓʼþ¡¢ÈëÇÖWordPressÍøÕ¾¼°¶ñÒâÖÖ×ÓÎļþÈý´óÇþµÀ£¬Ñ¬È¾È«ÇòÁè¼Ý5000ÃûÓû§£¬Ðγɼ¯¼ÓÃÜÇ®±ÒÇÔÈ¡¡¢ÍøÕ¾±©Á¦ÆÆ½âÓëÀ¬»øÓʼþ·Ö·¢ÓÚÒ»ÌåµÄ¸´ºÏÐÍÍøÂç·¸·¨Éú̬ ¡£¸ÃľÂíµÄ½¹µã¹¥»÷ÊֶΰüÀ¨ÈýÖØÎ¬¶È£ºÆäÒ»£¬Í¨¹ýαװ³ÉÆóҵ״ʦµÄ´¹ÂÚÓʼþʵÑéÉç»á¹¤³Ì¹¥»÷£¬ÓÕµ¼Êܺ¦Õß·­¿ªº¬¶à½×¶Î¾ç±¾µÄ¸½¼þ£¬Ö²ÈëľÂíºóÒÔÐéα¹ýʧÐÅÏ¢ÑÚÊÎÔ˶¯ºÛ¼£ £»Æä¶þ£¬Õë¶ÔWordPressÍøÕ¾Ìᳫ±©Á¦ÆÆ½â£¬Ê¹ÓÃά»ù°Ù¿Æ´Ê»ãÌìÉúÄ¿µÄÓòÃûÁÐ±í²¢²âÊÔ´ó×ÚÃÜÂ룬ÀÖ³ÉÈëÇÖºóÐû²¼¶ñÒâÎļþ»òͨ¹ýαÔìÓ°Ï·ÖÖ×ÓÈö²¥ÁíÒ»Efimer±äÖÖ£¬¸½´øTron¡¢SolanaµÈαÔìÇ®°ü £»ÆäÈý£¬°²ÅÅÃûΪ"Liame"µÄ¾ç±¾´ÓÖ¸¶¨ÍøÕ¾×¥È¡ÓʼþµØµã£¬¹¹½¨¾«×¼Õ©Æ­Ä¿µÄ¿â ¡£Êý¾ÝÏÔʾ£¬2024Äê10ÔÂÖÁ2025Äê7Լ䣬°ÍÎ÷³ÉΪ×î´óÊܺ¦¹ú£¬Ó¡¶È¡¢Î÷°àÑÀ¡¢¶íÂÞ˹¡¢Òâ´óÀû¼°µÂ¹ú½ôËæØÊºó ¡£


https://hackread.com/efimer-trojan-crypto-hacks-wordpress-torrents-phishing/


3. Ä«Î÷¸çCFE 600GBÊý¾Ýй¶̻¶Ҫº¦µçÁ¦»ù´¡ÉèÊ©ÍøÂçΣº¦


8ÔÂ13ÈÕ£¬Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬Ä«Î÷¸ç¹úÓеçÁ¦¹«Ë¾Áª°îµçÁ¦Î¯Ô±»á£¨CFE£©ÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬ÆäÍøÂçºÍÍþв¾¯±¨ÈÕ־ͨ¹ýµÚÈý·½Çå¾²¹«Ë¾TelikoÖÎÀíµÄKibanaʵÀý¹ûÕæÌ»Â¶£¬Êý¾ÝÁ¿Áè¼Ý600GB ¡£×÷ΪΪīÎ÷¸ç99%Éú³Ý¹©µçµÄ½¹µãÄÜÔ´»ú¹¹£¬CFE´Ë´ÎйÃÜÊÂÎñ±»ÆÀ¹ÀΪ¿ÉÄÜÍþвÌìϵçÁ¦¹©Ó¦Çå¾²µÄÖØ´óΣº¦ ¡£Ð¹Â¶Êý¾Ýº­¸ÇÔ±¹¤×°±¸DNSÅÌÎʼͼ¡¢»á¼ûµÄURL¡¢Éî¶È°ü¼ì²â£¨DPI£©ÈÕÖ¾¼°·´¶ñÒâÈí¼þ¹¤¾ßÌìÉúµÄ¾¯±¨£¬Ê±¼ä¿ç¶È¿É×·ËÝÖÁ2021Äê11Ô ¡£ÕâЩÈÕÖ¾ÓÉÍйܼì²âÓëÏìÓ¦£¨MDR£©½â¾ö¼Æ»®AIsaacÌìÉú£¬Ïêϸ¼Í¼ÁËCFEÄÚ²¿ÍøÂç¼Ü¹¹¡¢Ò×Êܹ¥»÷×°±¸¼°·þÎñÁбí ¡£Ç徲ר¼ÒÖ¸³ö£¬¹¥»÷Õß¿É̫ͨ¹ýÎö´ËÀàÊý¾Ý»æÖÆCFEÇå¾²·ÀÓùͼÆ×£¬Ê¶±ð±¡Èõ»·½Ú²¢ÊµÑ龫׼¹¥»÷ ¡£³ýÔËÓªÍþвÍ⣬Ա¹¤»¥ÁªÍøÔ˶¯ÈÕÖ¾µÄй¶»¹×é³ÉÒþ˽Σº¦ ¡£¹¥»÷Õß¿ÉʹÓÃÓòÃûʹÓÃģʽע²á·ÂðÓòÃû£¬ÍŽáй¶µÄÄÚ²¿¹¤¾ßÐÅÏ¢Ìᳫ¸ß¶È±ÆÕæµÄÓã²æÊ½ÍøÂç´¹ÂÚ ¡£


https://cybernews.com/security/cfe-data-leak-mexico-critical-infrastructure/


4. Crypto24ÀÕË÷Èí¼þʹÓÃ×Ô½ç˵EDR¹æ±Ü¹¤¾ß¹¥»÷´óÐÍ×éÖ¯


8ÔÂ14ÈÕ£¬2024Äê9ÔÂÊ״α»ÆØ¹âµÄCrypto24ÀÕË÷Èí¼þ×éÖ¯Ëäδ¹ãΪÈËÖª£¬µ«ÆäÕë¶ÔÈ«Çò½ðÈÚ¡¢ÖÆÔì¡¢¿Æ¼¼µÈÁìÓò¸ß¼ÛֵĿµÄµÄ¶¨Ïò¹¥»÷ÒÑÒý·¢Çå¾²½ç¹Ø×¢ ¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Åú×¢£¬¸Ã×éÖ¯ºÜ¿ÉÄÜÓÉ×ÅÃûÀÕË÷Èí¼þÍÅ»ïǰ³ÉÔ±×齨£¬Õ¹ÏÖ³ö¸ß¶ÈµÄÊÖÒÕ³ÉÊì¶ÈÓëÕ½ÊõÒþ²ØÐÔ ¡£Æä¹¥»÷Á´ÒÔ¶¨ÖÆ»¯¹¤¾ßΪ½¹µã£¬ÐγɴӳõʼÈëÇÖµ½Êý¾ÝÍâйµÄÈ«Á÷³ÌÍþвϵͳ ¡£ÔÚÈëÇֽ׶Σ¬¹¥»÷Õßͨ¹ý¼¤»îWindowsĬÈÏÖÎÀíÔ±ÕË»§»ò½¨ÉèÐÂÓû§ÊµÏÖ³¤ÆÚ»¯»á¼û£¬Ëæºó°²ÅÅÅú´¦Öóͷ£¾ç±¾Óëϵͳö¾ÙÏÂÁչÕì̽£¬½¨ÉèÃûΪWinMainSvcµÄ¼üÅ̼ͼ·þÎñÓëMSRuntimeÀÕË÷Èí¼þ¼ÓÔØÆ÷ ¡£Îª¹æ±ÜÇå¾²¼ì²â£¬¸Ã×éÖ¯¿ª·¢ÁËRealBlindingEDR¹¤¾ßµÄ±äÖÖ£¬Í¨Ì«¹ýÎöÄÚºËÇý¶¯ÔªÊý¾ÝÆ¥ÅäÓ²±àÂë³§ÉÌÁбí£¬º­¸ÇÇ÷ÊÆ¿Æ¼¼¡¢¿¨°Í˹»ù¡¢SentinelOneµÈ12¼ÒÇå¾²³§ÉÌ£¬Õë¶ÔÐÔ½ûÓÃÄں˼¶·À»¤¹³×Ó ¡£Êý¾ÝÇÔÈ¡»·½Ú£¬Crypto24½ÓÄÉË«ÖØÊֶΣº¼üÅ̼ͼÆ÷αװ³É"Microsoft Help Manager"£¬²¶»ñ°üÀ¨¹¦Ð§¼üÔÚÄÚµÄÓû§²Ù×÷Óë´°¿ÚÎÊÌâ £»ºáÏòÒÆ¶¯Ôòͨ¹ýSMB¹²ÏíʵÏÖ£¬×îÖÕʹÓö¨ÖÆWinINET API¹¤¾ß½«Êý¾Ýй¶ÖÁGoogle Drive ¡£ÀÕË÷½×¶Î£¬¹¥»÷ÕßÔÚɾ³ýϵͳ¾íÓ°¸±±¾ºó´¥·¢¼ÓÃܳÌÐò ¡£


https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/


5. ¼ÓÄôóÏÂÒéÔºÔâÍøÂç¹¥»÷Êý¾Ýй¶£¬Î¢ÈíÎó²î³ÉÍ»ÆÆ¿Ú


8ÔÂ14ÈÕ£¬¼ÓÄôóÏÂÒéÔºÕýÊÓ²ìÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬¹¥»÷Õßͨ¹ýʹÓÃ΢Èí½üÆÚÅû¶µÄÇå¾²Îó²î£¬ÀÖ³ÉÇÔȡԱ¹¤Ãô¸ÐÐÅÏ¢²¢ÈëÇÖÖÎÀíÏÂÒéÔºÅÌËã»ú¼°Òƶ¯×°±¸µÄ½¹µãÊý¾Ý¿â ¡£¾Ý¼ÓÄôó¹ã²¥¹«Ë¾±¨µÀ£¬ÏÂÒéÔºÊÂÇéÖ°Ô±ÒÑÓÚÖÜһͨ¹ýÓʼþÊÕµ½Î¥¹æÍ¨Öª£¬µ«¹Ù·½ÉÐδ¹ûÕæÉùÃ÷ÊÂÎñϸ½Ú ¡£´Ë´Î¹¥»÷ÖУ¬ÍþвÐÐΪÕßʹÓÃ΢Èí²úÆ·ÖеÄδÐÞ²¹Îó²î»ñÈ¡Êý¾Ý¿â»á¼ûȨÏÞ£¬ÍµÈ¡Á˰üÀ¨Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢°ì¹«ËùÔÚ¼°µç×ÓÓʼþµØµãÔÚÄڵķǹûÕæÊý¾Ý ¡£ÏÂÒéÔºÒѱ޲ßÏà¹ØÖ°Ô±Ð¡ÐÄʹÓñ»µÁÐÅϢʵÑéµÄڲƭÐÐΪ£¬Èçð³äÒéÔ±»ò¾ÙÐÐÕ©Æ­ ¡£¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÈ·ÈÏÕýÔÚЭÖúÊӲ죬µ«Î´½«¹¥»÷¹éÒòÓÚÌØ¶¨Íþв×éÖ¯£¬Ç¿µ÷ÍøÂçÊÂÎñ¹éÒòÐèãýÃð×ÊÔ´Óëʱ¼ä£¬Éæ¼°¶àÖØÖØ´óÒòËØ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷ÕßʹÓõÄÎó²î¿ÉÄÜÓë΢Èí½üÆÚÅû¶µÄÁ½¸ö¸ßΣÎó²îÏà¹Ø£ºCVE-2025-53770£¨ToolShell£©ºÍCVE-2025-53786 ¡£ÆäÖУ¬CVE-2025-53770×Ô7Ô³õÆð±»¶à¹úÍþвÕûÌåÆÕ±éʹÓà £»¶øCVE-2025-53786×÷ΪMicrosoft ExchangeÎó²î£¬ÔÊÐí¹¥»÷ÕßÔÚÔÆÇéÐÎÖкáÏòÒÆ¶¯£¬Òѱ»ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐΪ½ôÆÈÖ¸ÁҪÇó·Ç¾üÊ»ú¹¹Á¬Ã¦ÐÞ²¹ ¡£


https://www.bleepingcomputer.com/news/security/canadas-house-of-commons-investigating-data-breach-after-cyberattack/


6. ŲÍþ²¼À×â¸ñ´ó°ÓÔâÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷


8ÔÂ14ÈÕ£¬Å²Íþ²¼À×â¸ñ´ó°ÓÓÚ2025Äê4ÔÂÔâÓöÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷£¬ÆäÒªº¦Êý×Ö¿ØÖÆÏµÍ³±»ÈëÇÖ£¬Á÷³ö·§Ãű»¶ñÒâ·­¿ª£¬µ¼ÖÂÁè¼Ý720ÍòÉý£¨190Íò¼ÓÂØ£©Ë®Á÷³ö ¡£´Ë´ÎÊÂÎñ±»Å²Íþ¾¯Ô±Çå¾²¾Ö£¨PST£©ÊÓΪ¶íÂÞ˹¶ÔÒªº¦»ù´¡ÉèʩԶ³Ì¹¥»÷ÄÜÁ¦µÄÌåÏÖ£¬µ«¸üÇãÏòÓÚÊÇÒ»´Î¡°ÄÜÁ¦Õ¹Ê¾¡±¶ø·ÇʵÖÊÐÔÆÆËð ¡£¾ÝPSTÈÏÕæÈ˱´æ«ÌØ¡¤¸Ê¼Ó˹ÔÚ°¢Â×´ï¶ûËÕ¿¨ÌìÏÂÂÛ̳ÉÏ͸¶£¬ºÚ¿ÍÐÐΪµÄ½¹µãÄ¿µÄ²¢·ÇÖ±½ÓÔì³ÉÎïÀíË𺦣¬¶øÊÇͨ¹ý¹ûÕæÑÝʾÊÖÒÕÄÜÁ¦Ê©¼ÓÐÄÀíÓ°Ï죬ÔÚÃñÖÚÖÐÖÆÔì¿Ö¾åÓ벻ȷ¶¨ÐÔ ¡£ÕâÒ»ÅжÏÓëŲÍþ¹ú¼ÒÐÌÊÂÊÓ²ì¾Ö£¨Kripos£©µÄÊÓ²ì½áÂÛÒ»Ö£ººÚ¿ÍÔÚTelegramƽ̨Ðû²¼ÁËÒ»¶ÎÈý·ÖÖÓÊÓÆµ£¬Õ¹Ê¾´ó°Ó¿ØÖÆÃæ°å²Ù×÷½çÃæ£¬²¢´øÓÐÓëÇ×¶íÍøÂç·¸·¨×éÖ¯¹ØÁªµÄˮӡ ¡£´ËÀàÐÐΪ´ËÇ°ÔøÓëSandworm (APT44) µÈ¹ú¼ÒÖ§³ÖµÄ×éÖ¯ÓйØ£¬±»ÓÃÓÚÇ¿µ÷ÍþвÉùÃ÷£¬¼ÈÐßÈèÊܹ¥»÷·½£¬ÓÖÏòÎ÷·½×ª´ïÍøÂçÕ½ÄÜÁ¦ÐźŠ¡£ÊÂÎñÖУ¬´ó°ÓÖÎÀíÔ±ºÄʱԼËÄСʱ²Å·¢Ã÷·§ÃÅÒì³£²¢ÐÞ¸´ÉèÖ㬵«×ß©ÒѶԾֲ¿Ë®Á÷µ÷¿Ø±¬·¢Ó°Ïì ¡£Ö»¹ÜŲÍþÓë¶íÂÞ˹δ´¦ÓÚÖ±½ÓÕ½Õù״̬£¬µ«ÆÕ¾©ÕþȨÕýͨ¹ý»ìÏýÕ½ÕùÊÖ¶Îά³Ö¶ÔÎ÷·½µÄÖ÷ҪѹÁ¦ ¡£


https://www.bleepingcomputer.com/news/security/pro-russian-hackers-blamed-for-water-dam-sabotage-in-norway/