FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв
Ðû²¼Ê±¼ä 2025-02-171. FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв
2ÔÂ16ÈÕ£¬£¬FinalDraftÊÇÒ»ÖÖз¢Ã÷µÄ¶ñÒâÈí¼þ£¬£¬ËüʹÓÃOutlookµç×ÓÓʼþµ×¸å¾ÙÐÐÒþ²ØµÄÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶£¬£¬×¨ÃŹ¥»÷ÄÏÃÀij²¿·Ö¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÓÉElastic Security Labs·¢Ã÷£¬£¬Éæ¼°Ò»Ì×ÍêÕûµÄ¹¤¾ß¼¯£¬£¬°üÀ¨PathLoader¼ÓÔØÆ÷¡¢FinalDraftºóÃż°¶à¸öºóʹÓóÌÐò¡£¡£¡£¡£¡£¡£FinalDraftͨ¹ýÀÄÓÃOutlookʵÏÖÒþ²ØÍ¨Ñ¶£¬£¬Ö´ÐÐÊý¾Ýй¶¡¢ÊðÀí¡¢Àú³Ì×¢ÈëºÍºáÏòÒÆ¶¯µÈ²Ù×÷£¬£¬Í¬Ê±Ö»¹ÜïÔ̺ۼ£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚPathLoaderÈëÇÖ£¬£¬ËüÖ´Ðдӹ¥»÷Õß»ù´¡ÉèÊ©¼ìË÷µÄshellcode£¬£¬°üÀ¨FinalDraft¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£FinalDraftͨ¹ýMicrosoft Graph API½¨ÉèͨѶ£¬£¬Ê¹ÓÃǶÈëµÄË¢ÐÂÁîÅÆ¼ìË÷OAuthÁîÅÆ²¢´æ´¢ÔÚWindows×¢²á±íÖУ¬£¬ÊµÏÖ³¤ÆÚ»á¼û¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýOutlookµ×¸å·¢ËͺÍÎüÊÕÏÂÁ£¬×èÖ¹¼ì²â²¢ÈÚÈëÕý³£Microsoft 365Á÷Á¿¡£¡£¡£¡£¡£¡£FinalDraftÖ§³Ö37¸öÏÂÁ£¬°üÀ¨Êý¾Ýй¶¡¢Àú³Ì×¢È롢ת´ï¹þÏ£¹¥»÷µÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬»¹·¢Ã÷FinalDraftµÄLinux±äÌå¼°ÁíÒ»¸öδ¼Í¼µÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷GuidLoader¡£¡£¡£¡£¡£¡£REF7707ÊÇÕë¶ÔÄÏÃÀÍâ½»²¿µÄÍøÂçÌØ¹¤»î¶¯£¬£¬µ«ÆÊÎöÏÔʾÆäÓë¶«ÄÏÑÇÊܺ¦ÕßÓÐÁªÏµ£¬£¬ÌåÏÖÐж¯¹æÄ£¸ü¹ã¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶«ÄÏÑǵçÐźͻ¥ÁªÍø»ù´¡ÉèÊ©ÌṩÉ̵ÄÊÜѬȾ¶ËµãÃé×¼¸ß¼ÛÖµ»ú¹¹£¬£¬²¢Ê¹Óö«ÄÏÑÇÒ»Ëù´óѧµÄ´æ´¢ÏµÍ³ÍйܶñÒâÈí¼þ¸ºÔØ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/
2. SteamÊÐËÁÓÎÏ·PirateFiÈö²¥Vidar¶ñÒâÈí¼þ£¬£¬Ó°Ï쳬1500Óû§
2ÔÂ14ÈÕ£¬£¬SteamÊÐËÁÖÐÒ»¿îÃûΪPirateFiµÄÃâ·ÑÓÎÏ·ÔÚ2ÔÂ6ÈÕÖÁ2ÔÂ12ÈÕʱ´úÈö²¥ÁËVidarÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬Ó°Ïì¿ÉÄܶà´ï1500ÃûÓû§¡£¡£¡£¡£¡£¡£¸ÃÓÎÏ·ÓÉSeaworth InteractiveÐû²¼£¬£¬±»ÐÎòΪһ¿îÉúÑÄÓÎÏ·£¬£¬µ«Steam·¢Ã÷Æä°üÀ¨¶ñÒâÈí¼þºóÒÑÏòÊÜÓ°ÏìÓû§·¢ËÍ֪ͨ£¬£¬½¨ÒéËûÃÇÖØÐÂ×°ÖÃWindowsÒÔÈ·±£Çå¾²¡£¡£¡£¡£¡£¡£SECUINFRA Falcon TeamÈ·ÈϸöñÒâÈí¼þΪVidarÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÒ»¸ö°æ±¾£¬£¬Òþ²ØÔÚPirate.exeÎļþÖС£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÖÖÖÖ»ìÏýÊÖÒպ͸ü¸ÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÒÔÇÔȡƾ֤¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬PirateFiÃû³ÆÖеÄweb3/Çø¿éÁ´/¼ÓÃÜÇ®±ÒÒýÓÃÊÇΪÁËÎüÒýÌØ¶¨Íæ¼ÒȺÌå¡£¡£¡£¡£¡£¡£ËäÈ»SteamÍÆ³öÁËÌØÊâ²½·¥±£»£»¤Íæ¼ÒÃâÊÜδ¾ÊÚȨµÄ¶ñÒâ¸üÐÂË𺦣¬£¬µ«PirateFi°¸ÀýÅú×¢ÕâЩ²½·¥ÈÔÐèÔöÇ¿¡£¡£¡£¡£¡£¡£´ËǰҲÓÐÀàËÆ¶ñÒâÈí¼þÈëÇÖSteamÊÐËÁµÄ°¸Àý£¬£¬ÈçʹÓÃChromeÎó²îµÄDota 2ÓÎϷģʽºÍ±»ºÚ¿Í¹¥»÷µÄ¡¶Slay the Spire¡·Ä£×é¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/
3. ÒÉËÆ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-2372ʹÓÃ×°±¸´úÂë´¹ÂÚ¹¥»÷Microsoft 365ÕÊ»§
2ÔÂ15ÈÕ£¬£¬Ò»¸öÃûΪStorm-2372µÄÍþвÐÐΪÕߣ¬£¬ÒÉËÆÓë¶íÂÞ˹Óйأ¬£¬ÕýÔÚÕë¶ÔÈ«Çò¶à¸öÁìÓòµÄ×éÖ¯Ìᳫװ±¸´úÂëÍøÂç´¹ÂÚ¹¥»÷£¬£¬Ä¿µÄ°üÀ¨Õþ¸®¡¢·ÇÕþ¸®×éÖ¯¡¢ITЧÀͺÍÊÖÒÕ¡¢¹ú·À¡¢µçÐÅ¡¢ÎÀÉúÒÔ¼°ÄÜÔ´µÈÁìÓò¡£¡£¡£¡£¡£¡£×ÔÈ¥Äê8ÔÂÒÔÀ´£¬£¬¸ÃÐÐΪÕßͨ¹ýÐÂÎÅÆ½Ì¨Ã°³äÓëÄ¿µÄÏà¹ØµÄ×ÅÃûÈËÊ¿£¬£¬ÓÕÆÓû§ÔÚÕýµ±µÇÂ¼Ò³ÃæÉÏÊäÈë¹¥»÷ÕßÌìÉúµÄ×°±¸´úÂ룬£¬´Ó¶ø»ñÈ¡¶ÔÊܺ¦ÕßMicrosoft 365ÕÊ»§µÄ³õʼ»á¼ûȨÏÞ£¬£¬²¢ÆôÓÃGraph APIÊý¾ÝÍøÂç»î¶¯¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬¹¥»÷ÕßÏÖÔÚʹÓÃMicrosoftÉí·ÝÑéÖ¤ÊðÀíµÄÌØ¶¨¿Í»§¶ËID£¬£¬Äܹ»ÌìÉúеÄÁîÅÆ£¬£¬´øÀ´ÐµĹ¥»÷ºÍ³¤ÆÚÐÔ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬Î¢Èí½¨Òé×èÖ¹×°±¸´úÂëÁ÷£¬£¬ÊµÑéÌõ¼þ»á¼ûÕ½ÂÔ£¬£¬²¢ÔÚÏÓÒɱ£´æ´¹ÂÚ¹¥»÷ʱ×÷·ÏÓû§µÄË¢ÐÂÁîÅÆ²¢ÉèÖÃÌõ¼þ»á¼ûÕ½ÂÔÒÔÇ¿ÖÆÖØÐÂÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬Ê¹ÓÃMicrosoft Entra IDµÄµÇ¼ÈÕÖ¾¾ÙÐÐ¼à¿Ø²¢¿ìËÙʶ±ðÒì³£µÇ¼ʵÑé¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/
4. ³¯ÏʺڿÍ×éÖ¯KimsukyÒÉËÆÌᳫDEEP#DRIVEÍøÂç´¹ÂÚ¹¥»÷
2ÔÂ14ÈÕ£¬£¬Ò»³¡ÃûΪDEEP#DRIVEµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯×Ô2024Äê9ÔÂÆðÕë¶Ôº«¹úÆóÒµ¡¢Õþ¸®ÊµÌå¼°¼ÓÃÜÇ®±ÒÓû§Õö¿ª£¬£¬ÒÑÔì³ÉÊýǧÃûÊܺ¦Õß¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÒÉËÆ³¯ÏʺڿÍ×éÖ¯KimsukyÌᳫ£¬£¬ÆäÖ÷ҪĿµÄÊÇÍøÂ纫¹úʵÌåµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓú«Óï±àдµÄ¶¨ÖÆÍøÂç´¹ÂÚÓÕ¶ü£¬£¬Î±×°³ÉÊÂÇéÈÕÖ¾¡¢°ü¹ÜÎļþºÍ¼ÓÃÜÏà¹ØÎļþµÈÕýµ±Îļþ£¬£¬Í¨¹ýDropboxµÈƽ̨·Ö·¢£¬£¬ÒÔÌӱܹŰåÇå¾²·ÀÓù¡£¡£¡£¡£¡£¡£ÕâЩÓÕ¶üͨ³£ÒÔ.hwp¡¢.xlsxºÍ.pptxµÈÊÜÐÅÈεÄÎļþÃûÌ÷ºÆð£¬£¬È«ÐÄÉè¼ÆÒÔÎüÒýÄ¿µÄÊÜÖÚ¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔαװ³ÉÕýµ±ÎĵµµÄ.lnkÎļþ×îÏÈ£¬£¬Æô¶¯¶ñÒâPowerShell¾ç±¾µÄÖ´ÐУ¬£¬½ø¶øÏÂÔØÆäËûÓÐÓøºÔز¢½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃDropbox¾ÙÐÐÊý¾Ýй¶£¬£¬²¢Ê¹ÓöàÖÖÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕߵĻù´¡ÉèÊ©¿´ËƶÌÔÝ£¬£¬µ«ÆäÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÓëKimsuky×éÖ¯ºÜÊÇÏàËÆ¡£¡£¡£¡£¡£¡£Securonix½¨Òé¶ÔÓû§¾ÙÐÐÍøÂç´¹ÂÚ½ÌÓý¡¢¼à¿Ø¶ñÒâÈí¼þÔÝ´æÄ¿Â¼ÒÔ¼°¿É¿¿µÄ¶ËµãÈÕÖ¾¼Í¼£¬£¬ÒÔ·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£¡£¡£
https://hackread.com/n-korean-hackers-deep-drive-attacks-against-s-korea/
5. ºÚ¿ÍʹÓÃCVE-2025-0108Îó²î¹¥»÷PAN-OS·À»ðǽ
2ÔÂ14ÈÕ£¬£¬ºÚ¿ÍʹÓÃ×î½üÐÞ¸´µÄCVE-2025-0108Îó²î¶ÔPalo Alto NetworksµÄPAN-OS·À»ðǽÌᳫÁ˹¥»÷¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢Å²ÓÃPHP¾ç±¾£¬£¬Î£¼°ÏµÍ³µÄÍêÕûÐÔºÍÉñÃØÐÔ¡£¡£¡£¡£¡£¡£Palo Alto NetworksÔÚ2ÔÂ12ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬±Þ²ßÖÎÀíÔ±½«·À»ðǽÉý¼¶µ½Ö¸¶¨°æ±¾ÒÔ½â¾ö´ËÎÊÌ⣬£¬Í¬Ê±Ö¸³öPAN-OS 11.0ÒòÒÑ´ïʹÓÃÊÙÃü£¬£¬½«²»ÔÙÐû²¼ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉAssetnoteµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷²¢±¨¸æ£¬£¬ËûÃÇÒѽÒÏþ°üÀ¨ÍêÕûÎó²îʹÓÃϸ½ÚµÄÎÄÕ¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²îÌáÈ¡Ãô¸ÐÊý¾Ý¡¢¼ìË÷ÉèÖûòʹÓÃÉèÖᣡ£¡£¡£¡£¡£GreyNoiseƽ̨¼Í¼ÁËÕë¶ÔδÐÞ²¹·À»ðǽµÄ¹¥»÷ʵÑ飬£¬ÇÒ¿ÉÄÜÓжà¸öÍþвÐÐΪÕß¼ÓÈë¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ÓÐÁè¼Ý4400̨PAN-OS×°±¸µÄÖÎÀí½çÃæÔÚÏß̻¶¡£¡£¡£¡£¡£¡£Îª·ÀÓù¹¥»÷£¬£¬½¨ÒéÓ¦Óò¹¶¡²¢ÏÞÖÆ¶Ô·À»ðǽÖÎÀí½Ó¿ÚµÄ»á¼û¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
6. CISA½«Apple iOS/iPadOS¼°Mitel SIPµç»°Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼
2ÔÂ15ÈÕ£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Apple iOSºÍiPadOSµÄÊÚȨ¹ýʧÎó²î£¨CVE-2025-24200£©ÒÔ¼°Mitel SIPµç»°µÄ²ÎÊý×¢ÈëÎó²î£¨CVE-2024-41710£©Ìí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£¡£Æ»¹û½ôÆÈÐû²¼ÁËÇå¾²¸üУ¬£¬ÐÞ¸´ÁË¿ÉÄܱ»¡°¼«ÆäÖØ´ó¡±Õë¶ÔÐÔ¹¥»÷ʹÓõÄCVE-2025-24200Îó²î£¬£¬¸ÃÎó²îÓ°ÏìiPhone XS¼°¸üлúÐͺͶà¿îiPad£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚËø¶¨×°±¸ÉϽûÓÃUSBÏÞÖÆÄ£Ê½¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬MitelÒ²Ðû²¼Á˹̼þ¸üнâ¾öÁËCVE-2024-41710Îó²î£¬£¬¸ÃÎó²îÓ°ÏìMitel 6800¡¢6900ºÍ6900wϵÁÐSIPµç»°£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õß¾ÙÐÐÏÂÁî×¢Èë¹¥»÷¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬ÓÐÑо¿·¢Ã÷»ùÓÚMiraiµÄ½©Ê¬ÍøÂçAquabotµÄбäÖÖÕë¶Ô±£´æ¸ÃÎó²îµÄMitel SIPµç»°¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ5ÈÕǰÐÞ¸´ÕâЩÎó²î£¬£¬²¢½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/174246/security/u-s-cisa-adds-apple-ios-and-ipados-and-mitel-sip-phones-flaws-to-its-known-exploited-vulnerabilities-catalog.html