CISA½«Digiever NVR¸ßΣÎó²îÁÐÈëKEVĿ¼
Ðû²¼Ê±¼ä 2025-12-261. CISA½«Digiever NVR¸ßΣÎó²îÁÐÈëKEVĿ¼
12ÔÂ25ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ó°ÏìDigiever DS-2105 ProÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©µÄCVE-2023-52163Çå¾²Îó²îÕýʽÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬²¢Ç¿µ÷¸ÃÎó²îÒѱ»Ö¤Êµ±£´æÆð¾¢Ê¹ÓÃÐÐΪ¡£¸ÃÎó²îCVSSÆÀ·ÖΪ8.8£¬ÊôÓÚ¸ßΣ¼¶±ð£¬Éæ¼°ÏÂÁî×¢ÈëÎó²î£¬ÔÊÐí¹¥»÷ÕßÔÚÉí·ÝÑéÖ¤ºóͨ¹ýtime_tzsetup.cgi½Ó¿ÚÖ´ÐÐÔ¶³Ì´úÂë¡£CISAÖ¸³ö£¬AkamaiºÍFortinetµÈ¶à¼ÒÇå¾²»ú¹¹ÒѶà´Î±¨¸æÍþвÐÐΪÕßʹÓôËÎó²îÈö²¥MiraiºÍShadowV2µÈ½©Ê¬ÍøÂç¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Digiever DS-2105 Pro×°±¸ÒÑ´¦ÓÚʹÓÃÊÙÃüÖÕÖ¹£¨EoL£©×´Ì¬£¬Òò´Ë¸ÃÎó²î¼°¹ØÁªµÄí§ÒâÎļþ¶ÁÈ¡Îó²îCVE-2023-52164£¨CVSSÆÀ·Ö5.1£©¾ùδ»ñµÃ¹Ù·½²¹¶¡ÐÞ¸´¡£TXOne ResearchÇå¾²Ñо¿Ô±Ta-Lun Yen½øÒ»²½Ö¤Êµ£¬ÓÉÓÚ×°±¸ÉúÃüÖÜÆÚ¿¢Ê£¬Óû§ÎÞ·¨Í¨¹ý³§É̸üÐÂÐÞ¸´ÕâЩÇ徲ȱÏÝ¡£Îª½µµÍΣº¦£¬CISA½¨ÒéÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥£º×èÖ¹½«×°±¸Ö±½Ó̻¶ÓÚ»¥ÁªÍø£¬²¢ÐÞ¸ÄĬÈÏÓû§ÃûºÍÃÜÂëÒÔÔöÇ¿ÈÏÖ¤Çå¾²ÐÔ¡£
https://thehackernews.com/2025/12/cisa-flags-actively-exploited-digiever.html
2. ·ÇÖÞ19¹úÍŽᡰÉÚ±øÐж¯¡±ÖØ´´ÍøÂç·¸·¨
12ÔÂ24ÈÕ£¬·ÇÖÞ19¹úÖ´·¨»ú¹¹10ÔÂ27ÈÕÖÁ11ÔÂ27ÈÕÍŽῪչ¡°ÉÚ±øÐж¯¡±£¨Operation Sentinel£©£¬Öص㹥»÷ÆóÒµÓÊÏäÈëÇÖÕ©Æ£¨BEC£©¡¢Êý×ÖÀÕË÷ºÍÀÕË÷Èí¼þ¹¥»÷Èý´óÍøÂçÍþв£¬È¡µÃÖØ´óÕ½¹û¡£Ðж¯Ê±´ú¹²¾Ð²¶574ÃûÏÓÒÉÈË£¬µ·»Ù6ÖÖÀÕË÷Èí¼þ±äÖÖ£¬½ûÓÃ6000Óà¸ö¶ñÒâÁ´½Ó£¬×·»ØÔ¼300ÍòÃÀÔª²»·¨×ʽð£¬Ïà¹Ø°¸¼þËðʧԤ¼Æ³¬2100ÍòÃÀÔª£¬³ä·ÖÕ¹ÏÖÁË¿ìËÙ¹ú¼ÊÏàÖúÔÚÌá·ÀÖØ´ó¾¼ÃËðʧÖеÄÒªº¦×÷Óᣵ䷶°¸Àý͹ÏÔÐж¯ÊµÐ§£ºÈûÄÚ¼Ó¶ûÀÖ³É×èÖ¹´óÐÍʯÓÍÆóÒµ790ÍòÃÀÔªµç»ãÕ©Æ£¬Í¨¹ý¿ìËÙ¶³½áÊÕ¿îÕË»§×èÖ¹Ëðʧ£»¼ÓÄɽðÈÚ»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂ100TBÊý¾Ý¼ÓÃÜ¡¢12ÍòÃÀÔª±»µÁ£¬Õþ¸®Í¨¹ý¶ñÒâÈí¼þÆÊÎöËø¶¨ÀàÐͲ¢¿ª·¢½âÃܹ¤¾ß£¬»Ö¸´½ü30TBÊý¾Ý£¬Í¬Ê±µ·»Ùºá¿ç¼ÓÄÉÓëÄáÈÕÀûÑǵÄÕ©ÆÍŻ±´Äþ¹Ø±Õ43¸ö¶ñÒâÓòÃû£¬½ûÓÃ4318¸öÓëÀÕË÷Ïà¹ØµÄÉ罻ýÌåÕË»§£¬¾Ð²¶106ÈË£»¿¦Âó¡ѸËÙ×èÖ¹Æû³µÏúÊÛÆ½Ì¨´¹ÂÚ¹¥»÷£¬ÊýСʱÄÚ¶³½áÏà¹ØÒøÐÐÕË»§¡£
https://cybersecuritynews.com/interpol-taken-6-ransomware-variants-arrested/
3. Operation IconCat£ºÒÔÉ«ÁжàÐÐÒµ¾«×¼ÍøÂç¹¥»÷
12ÔÂ24ÈÕ£¬Seqrite LabsÇå¾²Ñо¿Ö°Ô±½ÒÆÆ´úºÅΪOperation IconCatµÄÍøÂç¹¥»÷Ô˶¯£¬¸Ã¹¥»÷ͨ¹ýαװ³É×ÅÃûÇå¾²¹¤¾ßµÄ¶ñÒâÎĵµ£¬¶ÔÒÔÉ«ÁÐÐÅÏ¢ÊÖÒÕ¡¢ÈËÁ¦×ÊÔ´·þÎñ¼°Èí¼þ¿ª·¢µÈÐÐҵʵÑé¾«×¼ÉøÍ¸¡£¹¥»÷Õß½ÓÄÉÉç»á¹¤³ÌѧÓëÖØ´óÊÖÒÕÊÖ¶ÎÍŽáµÄ·½·¨£¬ÀÖ³ÉÈÆ¹ý¹Å°åÇå¾²·À»¤ÏµÍ³£¬Ôì³É¶àÆðÆóÒµÈëÇÖÊÂÎñ¡£´Ë´Î¹¥»÷°üÀ¨Á½Ìõ×ÔÁ¦µ«Õ½ÊõÏàËÆµÄ¹¥»÷Á´Â·¡£µÚÒ»ÌõÁ´Â·ÒÔPDFÎĵµÎªÔØÌ壬Èö²¥»ùÓÚPython¿ª·¢µÄPYTRIC¶ñÒâÈí¼þ¡£PYTRICͨ¹ýPyInstaller´ò°ü£¬¾ß±¸ÏµÍ³ÎļþɨÃè¡¢ÖÎÀíԱȨÏÞ¼ì²â¡¢Êý¾Ýɾ³ý¼°±¸·Ýɨ³ýµÈÆÆËðÐÔ¹¦Ð§£¬²¢Í¨¹ýÃûΪ¡°Backup2040¡±µÄTelegram»úеÈËʵÏÖÔ¶³Ì¿ØÖÆ£¬×îÖÕÄ¿µÄ²»µ«ÊÇÐÅÏ¢ÇÔÈ¡£¬¸ü°üÀ¨Êý¾ÝÏú»Ù¡£µÚ¶þÌõÁ´Â·ÔòʹÓÃWordÎĵµÈö²¥RustÓïÑÔ±àдµÄRUSTRICÖ²Èë³ÌÐò¡£RUSTRIC¾ß±¸ÏȽøµÄÕì̽ÄÜÁ¦£¬¿É¼ì²â28¿îÖ÷Á÷ɱ¶¾Èí¼þ£¬Í¨¹ýWindowsÖÎÀí¹æ·¶£¨WMI£©Ö´ÐÐϵͳÏÂÁîʶ±ðÊÜѬȾװ±¸£¬²¢Óë¹¥»÷Õß¿ØÖÆ·þÎñÆ÷½¨É賤ÆÚÅþÁ¬¡£
https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/
4. ŵÂüÄáÕ©ÆÉý¼¶£º¶à¹úAIͶ×ÊÏÝÚåж¯Ïò
12ÔÂ24ÈÕ£¬Ë¹Âå·¥¿ËESET¹«Ë¾Êý¾ÝÏÔʾ£¬ÃûΪ¡°ÅµÂüÄᡱµÄͶ×ÊÕ©ÆÔ˶¯2025ÄêÔö·ù´ï62%£¬Èö²¥¹æÄ£´ÓFacebookÀ©Õ¹ÖÁYouTubeµÈƽ̨£¬ÒÑ×èµ²³¬6.4Íò¸öÏà¹Ø¶ñÒâÁ´½Ó£¬Ö÷ÒªÓ°Ïì½Ý¿Ë¡¢ÈÕ±¾¡¢Ë¹Âå·¥¿Ë¡¢Î÷°àÑÀ¡¢²¨À¼Îå¹ú¡£¸ÃÕ©Æ×Ô2024Äê12ÔÂÊ×´ÎÅû¶ÒÔÀ´£¬Í¨¹ýÉ罻ýÌå¶ñÒâ¹ã¸æ¡¢·ÂðÆóÒµ¹Ù·½ÌûÎļ°AIÌìÉúÊÓÆµÍƼö£¬ÓÕµ¼Óû§Í¶×ÊÐéαÏîÄ¿£¬ÒÔ¸ß¶î»Ø±¨ÎªÓÕ¶üʵÑéÕ©Æ¡£Êܺ¦ÕßÉêÇëÌáÏÖʱ£¬Õ©Æ·Ö×Ó»áÒÔ¡°Ö§¸¶ÌØÊâÓöȡ±¡°ÌṩÉí·ÝÖ¤/ÐÅÓÿ¨ÐÅÏ¢¡±µÈÀíÓɽøÒ»²½Õ¥È¡×ʽð¡£ÊÖÒÕ²ãÃæ£¬AIÌìÉúÊÓÆµµÄ±ÆÕæ¶ÈÏÔÖøÌáÉý£¬Çø·ÖÂʸü¸ß¡¢ÈËÎïÐж¯ÓëºôÎü¸ü×ÔÈ»¡¢ÒôÊÓÆµÍ¬²½¸üÁ÷ͨ£¬ÃûÈË»»Á³ÊÓÆµµÄ´¹ÂÚ±íµ¥ÌîдÂÊÒò´ËÉÏÉý¡£ÐéαÄÚÈݳ£ÍŽáÈÈÃÅÊÂÎñ»ò×ÅÃûÈËÎïÔöÇ¿¿ÉÐŶȡ£Îª¹æ±Üƽ̨¼ì²â£¬Õ©Æ¹ã¸æÍ¨³£½öͶ·ÅÊýСʱ£¬²¢Í¨¹ýÖØ¶¨ÏòÖÁÕý³£Î±×°Ò³Ãæ¡¢ÀÄÓÃÉ罻ýÌå¹ã¸æÏµÍ³±íµ¥¹¤¾ßµÈ·½·¨½µµÍ±»·¢Ã÷Σº¦¡£
https://thehackernews.com/2025/12/nomani-investment-scam-surges-62-using.html
5. MacSyncľÂíͨ¹ýÊðÃûÓ¦ÓÃÈÆ¹ýmacOSÇå¾²»úÖÆ
12ÔÂ24ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÃûΪMacSyncµÄÐÂÐÍmacOSÇÔÃÜľÂí±äÖÖ£¬Æäͨ¹ýαװ³É¼´Ê±Í¨Ñ¶Èí¼þ×°ÖóÌÐòµÄSwiftÓ¦ÓÃÈö²¥¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬²î±ðÓÚÔçÆÚÒÀÀµÓû§ÊÖ¶¯²Ù×÷µÄ±äÖÖ£¬´Ë°æ±¾½ÓÄɸü¾ßÓÕÆÐÔµÄ×Ô¶¯¹¥»÷ÊֶΡ£Ö»¹ÜÓ¦ÓþÓÉÊðÃûºÍ¹«Ö¤£¬¿É×èÖ¹±»Gatekeeper¡¢XProtect×èµ²£¬µ«×°ÖóÌÐòÈÔÏÔʾ¡°ÓÒ¼ü·¿ª¡±ËµÃ÷ÒÔÈÆ¹ýÇå¾²·À»¤£¬ÏÖÔÚÆ»¹ûÒѵõÏúÆä´úÂëÊðÃûÖ¤Êé¡£¸ÃľÂíÊÍ·ÅÆ÷»ùÓÚSwiftÓïÑÔ¿ª·¢£¬Ö´ÐÐǰ»á¾ÙÐÐϵÁÐǰÖüì²é£ºÑéÖ¤ÍøÂçÅþÁ¬×´Ì¬¡¢ÉèÖÃÔ¼3600ÃëµÄ×îСִÐоàÀë¡¢ÒÆ³ýÎļþ¸ôÀëÊôÐÔ¼°ÑéÖ¤ÎļþÓÐÓÃÐÔ¡£ÆäÓÃÓÚ»ñÈ¡ÔØºÉµÄcurlÏÂÁî²ÎÊý±¬·¢ÏÔÖø×ª±ä£¬Åú×¢¹¥»÷Õß¿ÌÒâµ÷½âÔØºÉ»ñÈ¡ÓëÑéÖ¤·½·¨£¬ÒÔÌáÉý¹¥»÷¿É¿¿ÐÔ»ò¹æ±Ü¼ì²â¡£±ðµÄ£¬¹¥»÷Õßͨ¹ýǶÈëÎÞ¹ØPDFÎĵµ½«´ÅÅ̾µÏñ¾ÞϸÀ©³äÖÁ25.5MBÒÔ¹æ±Ü¼ì²â¡£¾ÆÊÎö£¬¶ñÒâÔØºÉΪBase64±àÂëµÄMacSyncľÂí£¬ÊÇ2025Äê4ÔÂÊ״ηºÆðµÄMac.cľÂíµÄ¸üÃû°æ±¾¡£¾ÝÆÊÎö£¬¸ÃľÂíÄÚÖù¦Ð§ÍêÕûµÄGoÓïÑÔÊðÀí³ÌÐò£¬²»µ«¿ÉÇÔÈ¡Êý¾Ý£¬»¹ÄÜʵÏÖÔ¶³Ì¿ØÖƲÙ×÷¡£
https://thehackernews.com/2025/12/new-macsync-macos-stealer-uses-signed.html
6. ÐͬȦÌ×½èÐéÎ±ÍøÂçÕÐÆ¸¹ã¸æÃé×¼Öж«ºÍ±±·Ç
12ÔÂ24ÈÕ£¬¹ú¼ÊÍøÂçÇå¾²¹«Ë¾Group-IB×îб¨¸æ½ÒÆÆ£¬Öж«ºÍ±±·ÇµØÇøÕýÔâÓö¹æÄ£»¯ÐͬÐÔÐéÎ±ÍøÂçÕÐÆ¸¹ã¸æÈ¦Ì×£¬Õ©Æ·Ö×ÓʹÓÃйÚÒßÇéºóÔ¶³Ì°ì¹«ÆÕ¼°Ç÷ÊÆ£¬Í¨¹ýÖÆ×÷ÓÅÒìµÄÉ罻ýÌå¹ã¸æÊµÑ龫׼թơ£¸ÃȦÌ×ÒÔ"ÇáËÉÍê³É¼òÆÓÏßÉÏʹÃü¼´¿É׬ȡ10ÖÁ170ÃÀÔªÈÕн"ΪÓÕ¶ü£¬ÊµÔòDZÔÚÇÔȡǮ²ÆÓëСÎÒ˽¼ÒÐÅÏ¢µÄÓÐ×éÖ¯·¸·¨Ô˶¯¡£Ñо¿ÏÔʾ£¬Öж«µØÇø³¬60%ÀͶ¯ÕßÇãÏòȫְԶ³ÌÊÂÇ飬ÕâÒ»ÐÐΪת±ä±»Õ©ÆÍÅ»ïʹÓá£2025ÄêÕûÄ꣬Group-IB¼à²âµ½1500ÓàÌõÕ©ÆÕÐÆ¸¹ã¸æ£¬Ö÷Òª¼¯ÖÐÓÚ°£¼°¡¢º£Íå¹ú¼Ò¡¢°¢¶û¼°ÀûÑÇ¡¢Í»Äá˹¡¢Ä¦Âå¸ç¡¢ÒÁÀ¿ËºÍÔ¼µ©¡£Õ©Æ¹ã¸æÍ¨¹ýFacebook¡¢Instagram¡¢TikTokµÈƽ̨Ðû²¼£¬Ã°ÓÃ×ÅÃûµçÉÌÆ½Ì¨¡¢ÒøÐлòÕþ¸®»ú¹¹ÃûÒ壬²¢½ÓÄÉÍâµØ»¯ÊÊÅäÕ½ÂÔ¡ª¡ªÊ¹ÓõØÇø·½ÑÔ¡¢ÍâµØÇ®±Òµ¥Î»¼°ÊÜÖÚÊìϤµÄÆ·ÅÆÔªËØ£¬ÏÔÖøÌáÉý¹ã¸æ¿ÉÐŶȡ£Õ©ÆÁ÷³Ì·ºÆð¸ß¶ÈÐͬÐÔ£ºÓû§»ØÓ¦¹ã¸æºó£¬Ïàͬ±»Ñ¸ËÙ×ªÒÆÖÁWhatsApp»òTelegramµÈ˽ÈËͨѶÈí¼þ£¬Õ©Æ·Ö×ÓÒÔ"ÈëÖ°ÉóºË"ΪÓÉË÷ȡСÎÒ˽¼ÒÐÅÏ¢¼°²ÆÎñÐÅÏ¢£¬²¢ÒªÇó½ÉÄÉѺ½ðÒÔ»ñÈ¡"¸ß³ê½ðʹÃü"¡£³õÆÚС¶î·µÀûÆÊØÐÅÍкó£¬Õ©Æ·Ö×Ó¼´Ê§Áª¡£
https://www.infosecurity-magazine.com/news/scams-mena-fake-online-job/


¾©¹«Íø°²±¸11010802024551ºÅ