STAC6565¹¥»÷¼ÓÄô󣬰²ÅÅQWCryptÀÕË÷Èí¼þ
Ðû²¼Ê±¼ä 2025-12-121. STAC6565¹¥»÷¼ÓÄô󣬰²ÅÅQWCryptÀÕË÷Èí¼þ
12ÔÂ9ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾SophosÊӲ췢Ã÷£¬2024Äê2ÔÂÖÁ2025Äê8ÔÂʱ´ú£¬¼ÓÄôó×éÖ¯³ÉΪSTAC6565Íþв¼¯Èº²ß»®µÄÕë¶ÔÐÔÍøÂç¹¥»÷½¹µãÄ¿µÄ£¬½ü80%µÄ¹¥»÷Ö¸Ïò¸Ã¹úʵÌå¡£¸Ã×éÖ¯ÓëGold Blade£¨ÓÖÃûEarth Kapre¡¢RedCurl¡¢Red Wolf£©¸ß¶È¹ØÁª£¬×Ô2018Äêµ×Æð´Ó¶íÂÞ˹ʵÌåÀ©Õ¹ÖÁ¼ÓÄôó¡¢ÃÀ¹ú¡¢µÂ¹úµÈ¶à¹úÄ¿µÄ£¬ÐγÉ"ºÚ¿Í¹ÍÓ¶±ø"ÔË×÷ģʽ£¬ÒÔÉÌÒµÌØ¹¤Ô˶¯Îª»ù´¡£¬ÈÚºÏÊý¾Ý͵ÇÔÓëÑ¡ÔñÐÔÀÕË÷Èí¼þ°²ÅÅ¡£¹¥»÷Á´Ê¼ÓÚÕë¶ÔÈËÁ¦×ÊÔ´²¿·ÖµÄÓã²æÊ½ÍøÂç´¹ÂÚ£¬Ê¹ÓÃIndeed¡¢JazzHRµÈÇóְƽ̨ÉÏ´«Î±×°³É¼òÀúµÄ¶ñÒâÎĵµ¡£2025Äê7ÔÂбäÖÖ½ÓÄÉZIP´æµµ+¿ì½Ý·½·¨Îļþ£¬Í¨¹ýrundll32.exe´ÓCloudflare WorkersÓòÃûºóµÄWebDAV·þÎñÆ÷»ñÈ¡¶ñÒâ×é¼þ£¬×îÖÕ¼ÓÔØRedLoader DLLÖ´Ðжà½×¶Î¹¥»÷¡£¸Ã¹¤¾ßÁ´ÒÀÀµÎ¢Èí³ÌÐò¼æÈÝÐÔÖúÊÖÖ´ÐÐÓÐÓÃÔØºÉ£¬ÍøÂçActive DirectoryÇéÐÎÐÅÏ¢£¬²¢Ê¹ÓÃZemana AntiMalwareÇý¶¯Èƹý·À²¡¶¾Èí¼þ¡£ÍþвÐÐΪÕßÎäÆ÷¿â°üÀ¨¶¨ÖƶñÒâÈí¼þQWCrypt¡¢¿ªÔ´·´ÏòÊðÀí¹¤¾ßRPivot¼°Chisel SOCKS5¡£¹¥»÷Õßͨ¹ýSMB¹²Ïí·Ö·¢ÖØÃüÃû×é¼þ£¬ÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒÆ¶¯£¬×îÖÕ°²ÅÅÀÕË÷Èí¼þ¡£
https://thehackernews.com/2025/12/stac6565-targets-canada-in-80-of.html
2. ËÕµ¤°ÍµÂ¶ûº½¿ÕÔâºÚ¿ÍÈëÇÖÖÂÃô¸ÐÊý¾Ýй¶
12ÔÂ10ÈÕ£¬¿ËÈÕ£¬Ò»ÃûºÚ¿ÍÔÚÍøÂç·¸·¨ÂÛ̳Ðû³ÆÒÑÈëÇÖËÕµ¤°ÍµÂ¶ûº½¿Õ¹«Ë¾£¬Ð¹Â¶Æä2.21GBÄÚ²¿Ãô¸ÐÊý¾Ý£¬°üÀ¨2025Äê6ÔÂÖÁ7ÔÂʱ´úµÄº½Ðе÷ÀíÊֲᡢÇå¾²ÍýÏëÊֲᡢÇå¾²ÖÎÀíϵͳÊֲᡢ×îµÍ×°±¸Çåµ¥¡¢µØÃæ²Ù×÷Êֲἰ¬Íú´ï»ù¼ÓÀûÕ¾µãÖ°Ô±ÐÅÏ¢µÈ¡£ÕâЩÎļþÏêϸº¸Ç²¨Òô737ÊÖÒÕ¹æ³Ì¡¢Çå¾²¼Ü¹¹¡¢»ú¶ÓÊý¾Ý¼°Ô±¹¤ÁªÏµ·½·¨£¬¹¥»÷ÕßÕýÒÔ¼ÓÃÜÇ®±Ò¶µÊÛÊý¾Ý£¬²¢¸½ÉϺ½°àµ÷ÀíÊÖ²á½ØÍ¼×ôÖ¤¡£ÈôÊý¾ÝÊôʵ£¬CybernewsÍŶÓÖÒÑÔ¿ÉÄÜÒý·¢Éç»á¹¤³Ì¹¥»÷¼¤Ôö¼°²Ù×÷¹æ³Ìй¶Σº¦£¬ÎªºóÐøÀÕË÷´´Á¢Ìõ¼þ¡£°ÍµÂ¶ûº½¿Õ×÷ΪËÕµ¤ÎªÊýδ¼¸µÄÃñÓú½¿ÕÔËÓªÉÌÖ®Ò»£¬½¨ÉèÓÚ2004Ä꣬×ܲ¿Î»ÓÚ¿¦ÍÁÄ£¬Ìṩº£ÄÚ/ÇøÓò¿ÍÔË¡¢»õÔ˼°VIP°ü»ú·þÎñ£¬ÄêÊÕÈë´ï5600ÍòÃÀÔª¡£Ö»¹ÜËÕµ¤ÒòÕ½ÂÒµ¼ÖÂÃñº½»ù´¡ÉèÊ©¼¸½üÍ߽⣬¸Ã¹«Ë¾ÈÔά³ÖÔËÓª²¢¼ç¸ºÈËÐÔÖ÷ÒåÔ®ÖúʹÃü¡£ÏÖÔÚ£¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Êý¾Ýй¶ÖÃÆÀÇëÇó¡£
https://cybernews.com/security/badr-airlines-data-breach-sudan/
3. Cybernews½ÒÆÆ43ÒÚÌõ¼Í¼й¶ÊÂÎñ
12ÔÂ10ÈÕ£¬CybernewsÑо¿ÍŶÓ11Ô·¢Ã÷Ò»¸öδÉè·À»¤µÄMongoDBÊý¾Ý¿âʵÀý£¬ÆäÖд洢16.14Ì«×Ö½Ú¡¢½ü43ÒÚ·ÝÎĵµ£¬°üÀ¨À´×ÔÁìÓ¢µÄÖ°Òµ¼°ÆóÒµÇ鱨Êý¾Ý£¬ÈçÈ«Ãû¡¢ÓÊÏä¡¢µç»°¡¢Ö°Î»¡¢½ÌÓýÅä¾°¡¢É罻ýÌåÕ˺ŵÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÒÔ¼°ÆóÒµ¹ØÁª¹ØÏµ¡¢Ö°ÒµÂÄÀúµÈ¡£¸ÃÊý¾Ý¿âÓÉÍøÂçÇå¾²Ñо¿Ô±±«²ª¡¤µÏÑÇÇÙ¿ÆÓÚ11ÔÂ23ÈÕ·¢Ã÷£¬Á½ÌìºóËùÓÐÕßÍê³ÉÇå¾²¼Ó¹Ì£¬µ«Ì»Â¶Ê±³¤Î´Öª£¬¹¥»÷Õß¿ÉÄÜÔçÒÑʹÓá£Êý¾Ý¿â°üÀ¨9¸öÊý¾ÝÜöÝÍ£¬ÆäÖС°profiles¡±¡°unique_profiles¡±¡°people¡±Èý¸öÜöÝͺ¬½ü20ÒÚÌõPII¼Í¼£¬º¬ÁìÓ¢ÍøÖ·¡¢Ð¡ÎÒ˽¼ÒÖ÷Ò³Õ˺𢵨ÀíλÖá¢ÊÖÒÕµÈ×ֶΣ¬²¿·Ö¼Í¼°üÀ¨Ð¡ÎÒ˽¼ÒÕÕÆ¬¼°ÓÊÏä¿ÉÐÅ¶ÈÆÀ·Ö¡£Êý¾Ý½á¹¹ÏÔʾÐÅÏ¢Ô´ÓÚ×Ô¶¯»¯ÅÀÈ¡£¬¿ÉÄÜÕûºÏ×ÔÏúÊÛÇ鱨¹¤¾ßApollo.io£¬µ«ËùÓÐÕßÉÐδȷÈÏ¡£Ñо¿Ö¸³ö£¬´ËÀà´ó¹æÄ£¡¢¸ßʱЧÐÔÊý¾Ý¼¯ÊǶñÒâ¹¥»÷Õߵġ°±¦²Ø¡±£¬¿É±»ÓÃÓÚ¶¨Ïò´¹ÂÚ¹¥»÷¡¢ÆóÒµÇ鱨Õì̽¡¢×Ô¶¯»¯¹¥»÷¼°ÐÅÏ¢²¹È«£¬ÍŽáÆäËûй¶Êý¾Ý¿É¹¹½¨°üÀ¨ÃÜÂë¡¢×°±¸±êʶµÄÍêÕûСÎÒ˽¼ÒÐÅÏ¢¿â£¬½µµÍÉç»á¹¤³Ìѧ¹¥»÷Ãż÷¡£
https://cybernews.com/security/database-exposes-billions-records-linkedin-data/
4. Ƥ¶ûË¹ÏØÍ¼Êé¹ÝÊý¾Ýй¶ÊÂÎñÓ°Ïì34ÍòÈË
12ÔÂ11ÈÕ£¬ÃÀ¹ú»ªÊ¢¶ÙÖÝÆ¤¶ûË¹ÏØÍ¼Êé¹Ýϵͳ£¨PCLS£©ÓÚ2025Äê4ÔÂ15ÈÕÖÁ21ÈÕʱ´úÔâÓöÍøÂç¹¥»÷£¬µ¼ÖÂÁè¼Ý34ÍòÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£PCLSÔÚ·¢Ã÷Òì³£ºóÁ¬Ã¦Æô¶¯ÊӲ죬ȷÈÏ´Ë´ÎÊÂÎñΪÍⲿ²»·¨·Ö×ÓÈëÇÖÆäÍøÂçϵͳËùÖ¡£Æ¾Ö¤¹Ù·½×ª´ï£¬´Ë´ÎÊý¾Ýй¶²¨¼°¹æÄ£ÆÕ±é£¬²»µ«°üÀ¨Í¼Êé¹Ý¶ÁÕߣ¬»¹Éæ¼°ÏÖÈμ°Ç°ÈÎÔ±¹¤¼°Æä¾ìÊô¡£ÏêϸÀ´¿´£¬¶ÁÕßȺÌåй¶µÄÐÅÏ¢Ö÷ҪΪÐÕÃûºÍ³öÉúÈÕÆÚ£»¶øÔ±¹¤¼°Æä¼ÒÍ¥³ÉÔ±µÄÐÅϢй¶Ôò¸üΪÑÏÖØ£¬º¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢»¤ÕÕºÅÂë¡¢²ÆÎñÐÅÏ¢¡¢ÐÅÓÿ¨ÏêϸÐÅÏ¢£¬ÒÔ¼°¿µ½¡°ü¹ÜºÍÒ½ÁÆÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£PCLSÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ³Æ£¬´Ë´ÎÊÂÎñ¹²Ó°Ïì340,101ÈË£¬²¢½«ÏòËùÓÐÊÜÓ°ÏìÕß·¢ËÍÊéÃæÍ¨Öª¡£Îª¼õÇáDZÔÚΣº¦£¬PCLSΪÊÜÓ°ÏìÖ°Ô±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£È»¶ø£¬×èÖ¹ÏÖÔÚ£¬PCLSÉÐδÐû²¼´Ë´ÎÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖÐÅÏ¢£¬Ò²Î´·¢Ã÷ÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÊÂÎñÈÏÕæ¡£
https://www.securityweek.com/pierce-county-library-data-breach-impacts-340000/
5. GogsÁãÈÕÎó²îÖ°ëÊý̻¶·þÎñÆ÷±»ÈëÇÖ
12ÔÂ11ÈÕ£¬Gogs×÷Ϊ×ÔÍйÜGit·þÎñ£¬ÒÔÇáÁ¿¼¶¡¢Ò×°²ÅÅÌØÕ÷±»ÆÕ±éʹÓã¬Ö§³Ö°æ±¾¿ØÖÆ¡¢ÎÊÌâ¸ú×ٵȹ¦Ð§£¬Óû§¿ÉÍêÈ«ÕÆ¿ØÊý¾ÝÓë»ù´¡ÉèÊ©¡£È»¶ø£¬Î´ÐÞ¸´µÄÁãÈÕÎó²îCVE-2025-8110±»ÍþвÐÐΪÕßʹÓã¬Í¨¹ýÔ¶³Ì´úÂëÖ´ÐÐÈëÇÖÔ¼700̨»¥ÁªÍøÌ»Â¶µÄ·þÎñÆ÷¡£¸ÃÎó²îÔ´ÓÚPutContents APIµÄ·¾¶±éÀúȱÏÝ£ºÖ»¹ÜGogsÐÞ¸´CVE-2024-55947ºóÔöǿ·¾¶ÃûÑéÖ¤£¬È´Î´¼ì²é·ûºÅÁ´½ÓÄ¿µÄλÖ᣹¥»÷Õ߿ɽ¨É躬Ãô¸ÐÎļþ·ûºÅÁ´½ÓµÄ´æ´¢¿â£¬Ê¹ÓÃPutContentsÁýÕÖÍⲿÎļþ£¬´¥·¢í§ÒâÏÂÁîÖ´ÐС£Wiz ResearchÔÚÊÓ²ì¿Í»§¶ñÒâÈí¼þѬȾʱ·¢Ã÷´ËÎó²î£¬É¨ÃèÏÔʾ³¬1400̨Gogs·þÎñÆ÷̻¶ÓÚ»¥ÁªÍø£¬ÆäÖг¬50%µÄʵÀýÔ¼700̨Òѱ»ÈëÇÖ¡£ËùÓб»ÈëÇÖʵÀý·ºÆðÏÔ×Åģʽ£º7ÔÂ10ÈÕͳһʱ¶Î½¨ÉèµÄËæ»ú°Ë×Ö·û´æ´¢¿â£¬Åú×¢¹¥»÷ÓÉ×Ô¶¯»¯¹¤¾ßÇý¶¯µÄ¼òµ¥ÐÐΪÕß»òÕûÌåʵÑé¡£¶ñÒâÈí¼þͨ¹ý¿ªÔ´C2¿ò¼ÜSupershell½¨Éè·´ÏòSSH shell£¬ÓëC2·þÎñÆ÷ͨѶ¡£Îó²îÅû¶ºó£¬Gogsά»¤ÕßÓÚ10ÔÂ30ÈÕÈÏ¿ÉȱÏÝ£¬µ«ÖÁ½ñδÐÞ¸´£¬11ÔÂ1ÈÕÒÑ·ºÆðµÚ¶þ²¨¹¥»÷¡£
https://securityaffairs.com/185593/hacking/critical-gogs-zero-day-under-attack-700-servers-hacked.html
6. VSCode¹©Ó¦Á´¹¥»÷£º19¸ö¶ñÒâÀ©Õ¹Ö²ÈëľÂí
12ÔÂ11ÈÕ£¬×Ô2ÔÂÒÔÀ´£¬Ò»³¡Õë¶ÔVSCode MarketplaceµÄÒþ²Ø¹©Ó¦Á´¹¥»÷Ò»Á¬¾ÙÐУ¬¹¥»÷Õßͨ¹ý19¸ö¶ñÒâÀ©Õ¹½«¶ñÒâÈí¼þÒþ²ØÔÚÒÀÀµÏîÎļþ¼ÐÖУ¬Ä¿µÄËø¶¨¿ª·¢ÕßȺÌå¡£´Ë´Î¹¥»÷ÓÉReversingLabsÇå¾²ÍŶӷ¢Ã÷£¬¹¥»÷ÕßʹÓÃαװ³É.PNGͼÏñµÄ¶ñÒâÎļþÈçbanner.png£¬ÔÚÀ©Õ¹µÄnode_modulesÎļþ¼ÐÖÐÔ¤ÖÃÐ޸ĺóµÄÒÀÀµÏîÈçpath-is-absolute»ò@actions/io£¬²¢ÔÚindex.jsÖÐÌí¼ÓÌØÊâÀ࣬ʵÏÖVSCodeÆô¶¯Ê±×Ô¶¯Ö´ÐжñÒâ´úÂë¡£Ïêϸ¹¥»÷Á÷³ÌÏÔʾ£¬¶ñÒâÀ©Õ¹Í¨¹ýÀ¦°ónode_modulesÎļþ¼Ð×èÖ¹VSCode´Ónpm×¢²á±í»ñÈ¡ÒÀÀµÏÒÀÀµÏîÖеÄlockÎļþ°üÀ¨»ìÏýµÄJavaScriptͶ·ÅÆ÷£¬¶øÎ±×°³ÉPNGµÄѹËõÎļþÔò°üÀ¨cmstp.exeºÍRustľÂí³ÌÐò¡£Ö»¹ÜľÂíÏêϸ¹¦Ð§ÈÔÔÚÆÊÎöÖУ¬µ«´Ë´Î¹¥»÷ÒѶԿª·¢Õßϵͳ×é³ÉÑÏÖØÍþв¡£Éæ¼°µÄ19¸ö¶ñÒâÀ©Õ¹¾ù½ÓÄÉ¡°Ö÷Ì⡱ÀàÃû³Æ±äÌ壬Èç¡°Âí¶û¿ÆÄ·Ö÷Ì⡱¡°PandaExpressÖ÷Ì⡱£¬°æ±¾Í³Ò»Îª1.0.0£¬ÏÖÔÚÒÑÓÉReversingLabs±¨¸æÎ¢Èí²¢ËùÓÐÒÆ³ý¡£È»¶ø£¬×°ÖùýÕâЩÀ©Õ¹µÄÓû§ÈÔÐèɨÃèϵͳÒÔÅŲéÇå¾²Îó²î¡£
https://www.bleepingcomputer.com/news/security/malicious-vscode-marketplace-extensions-hid-trojan-in-fake-png-file/


¾©¹«Íø°²±¸11010802024551ºÅ