CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬£¬£¬£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷

Ðû²¼Ê±¼ä 2025-08-15

1. CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬£¬£¬£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷


8ÔÂ13ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶£¬£¬£¬£¬Ò»ÖÖÃûΪCharonµÄÐÂÐÍÀÕË÷Èí¼þÕýÒÔÖж«¹«¹²²¿·ÖºÍº½¿ÕҵΪĿµÄÌᳫ¹¥»÷£¬£¬£¬£¬ÆäÊÖÒÕÖØÆ¯ºóµÖ´ï¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©¼¶±ð¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬¹¥»÷Õß½ÓÄÉDLL²àÔØ¡¢Àú³Ì×¢Èë¼°EDRÌÓ±ÜÊÖÒÕ¹¹½¨¹¥»÷Á´£¬£¬£¬£¬ÓëÔøÕë¶ÔÑÇÌ«Õþ¸®Ä¿µÄµÄEarth Baxia APT×éÖ¯±£´æÏÔÖøÊÖÒÕÖØµþ£¬£¬£¬£¬µ«Ä¿½ñÖ¤¾ÝÉÐȱ·¦ÒÔÈ·ÈÏÖ±½Ó¹ØÁª¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÒÔÕýµ±ä¯ÀÀÆ÷ÎļþEdge.exeΪÈë¿Ú£¬£¬£¬£¬Í¨¹ý²àÔØ¶ñÒâmsedge.dll×îÖÕ°²ÅÅCharonÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¸ÃÈí¼þ¾ß±¸¶àÖØÆÆËðÐÔ¹¦Ð§£ºÖÕÖ¹Ç徲ЧÀÍ¡¢É¾³ý¾íÓ°¸±±¾Ó뱸·ÝÒÔ×è°­»Ö¸´£¬£¬£¬£¬½ÓÄɶàÏ̼߳ÓÃÜÊÖÒÕÌáÉýÎļþËø¶¨Ð§ÂÊ£¬£¬£¬£¬²¢¼¯³É»ùÓÚ¿ªÔ´Dark-KillÏîÄ¿µÄÇý¶¯³ÌÐò£¬£¬£¬£¬¿Éͨ¹ý¡°×Ô´øÒ×Êܹ¥»÷Çý¶¯³ÌÐò£¨BYOVD£©¡±¹¥»÷½ûÓÃEDR·À»¤£¬£¬£¬£¬Ö»¹Ü´Ë´Î¹¥»÷Öиù¦Ð§Î´±»´¥·¢£¬£¬£¬£¬ÌåÏÖÆäÈÔ´¦ÓÚ²âÊԽ׶Ρ£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¹¥»÷ÕßʹÓö¨ÖÆ»¯ÀÕË÷ÐÅÃ÷È·Ìá¼°Êܺ¦×éÖ¯Ãû³Æ£¬£¬£¬£¬Ö¤Êµ´ËΪÕë¶ÔÐÔÐж¯¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷Á´Öжþ½øÖÆÎļþÓëEarth BaxiaÀúÊ·ÊÖ·¨¸ß¶ÈÏàËÆ¡£¡£¡£¡£¡£ÏÖÔÚȱ·¦¹²Ïí»ù´¡ÉèÊ©»ò¹¥»÷ģʽµÈÈ·ÔäÖ¤¾Ý£¬£¬£¬£¬½öÄÜÅжϱ£´æ¡°ÓÐÏÞµ«ÏÔÖøµÄÊÖÒÕÇ÷ͬ¡±¡£¡£¡£¡£¡£


https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html


2. EfimerľÂíºá¿ç2024-2025Ä꣬£¬£¬£¬È«ÇòÎåǧÓû§Ïݸ´ºÏÐÍÍøÂç·¸·¨Éú̬


8ÔÂ13ÈÕ£¬£¬£¬£¬¿¨°Í˹»ù¿ËÈÕÅû¶£¬£¬£¬£¬×Ô2024Äê10ÔÂÊ״η¢Ã÷ÒÔÀ´£¬£¬£¬£¬EfimerľÂí²¡¶¾ÒÑÒ»Á¬»îÔ¾ÖÁ2025Ä꣬£¬£¬£¬Í¨¹ýαÔìÖ´·¨ÉùÃ÷´¹ÂÚÓʼþ¡¢ÈëÇÖWordPressÍøÕ¾¼°¶ñÒâÖÖ×ÓÎļþÈý´óÇþµÀ£¬£¬£¬£¬Ñ¬È¾È«ÇòÁè¼Ý5000ÃûÓû§£¬£¬£¬£¬Ðγɼ¯¼ÓÃÜÇ®±ÒÇÔÈ¡¡¢ÍøÕ¾±©Á¦ÆÆ½âÓëÀ¬»øÓʼþ·Ö·¢ÓÚÒ»ÌåµÄ¸´ºÏÐÍÍøÂç·¸·¨Éú̬¡£¡£¡£¡£¡£¸ÃľÂíµÄ½¹µã¹¥»÷ÊֶΰüÀ¨ÈýÖØÎ¬¶È£ºÆäÒ»£¬£¬£¬£¬Í¨¹ýαװ³ÉÆóҵ״ʦµÄ´¹ÂÚÓʼþʵÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õß·­¿ªº¬¶à½×¶Î¾ç±¾µÄ¸½¼þ£¬£¬£¬£¬Ö²ÈëľÂíºóÒÔÐéα¹ýʧÐÅÏ¢ÑÚÊλºÛ¼££»£»£» £»£»£»Æä¶þ£¬£¬£¬£¬Õë¶ÔWordPressÍøÕ¾Ìᳫ±©Á¦ÆÆ½â£¬£¬£¬£¬Ê¹ÓÃά»ù°Ù¿Æ´Ê»ãÌìÉúÄ¿µÄÓòÃûÁÐ±í²¢²âÊÔ´ó×ÚÃÜÂ룬£¬£¬£¬ÀÖ³ÉÈëÇÖºóÐû²¼¶ñÒâÎļþ»òͨ¹ýαÔìÓ°Ï·ÖÖ×ÓÈö²¥ÁíÒ»Efimer±äÖÖ£¬£¬£¬£¬¸½´øTron¡¢SolanaµÈαÔìÇ®°ü£»£»£» £»£»£»ÆäÈý£¬£¬£¬£¬°²ÅÅÃûΪ"Liame"µÄ¾ç±¾´ÓÖ¸¶¨ÍøÕ¾×¥È¡ÓʼþµØµã£¬£¬£¬£¬¹¹½¨¾«×¼Õ©Æ­Ä¿µÄ¿â¡£¡£¡£¡£¡£Êý¾ÝÏÔʾ£¬£¬£¬£¬2024Äê10ÔÂÖÁ2025Äê7Լ䣬£¬£¬£¬°ÍÎ÷³ÉΪ×î´óÊܺ¦¹ú£¬£¬£¬£¬Ó¡¶È¡¢Î÷°àÑÀ¡¢¶íÂÞ˹¡¢Òâ´óÀû¼°µÂ¹ú½ôËæØÊºó¡£¡£¡£¡£¡£


https://hackread.com/efimer-trojan-crypto-hacks-wordpress-torrents-phishing/


3. Ä«Î÷¸çCFE 600GBÊý¾Ýй¶̻¶Ҫº¦µçÁ¦»ù´¡ÉèÊ©ÍøÂçΣº¦


8ÔÂ13ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬Ä«Î÷¸ç¹úÓеçÁ¦¹«Ë¾Áª°îµçÁ¦Î¯Ô±»á£¨CFE£©ÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ÆäÍøÂçºÍÍþв¾¯±¨ÈÕ־ͨ¹ýµÚÈý·½Çå¾²¹«Ë¾TelikoÖÎÀíµÄKibanaʵÀý¹ûÕæÌ»Â¶£¬£¬£¬£¬Êý¾ÝÁ¿Áè¼Ý600GB¡£¡£¡£¡£¡£×÷ΪΪīÎ÷¸ç99%Éú³Ý¹©µçµÄ½¹µãÄÜÔ´»ú¹¹£¬£¬£¬£¬CFE´Ë´ÎйÃÜÊÂÎñ±»ÆÀ¹ÀΪ¿ÉÄÜÍþвÌìϵçÁ¦¹©Ó¦Çå¾²µÄÖØ´óΣº¦¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸ÇÔ±¹¤×°±¸DNSÅÌÎʼͼ¡¢»á¼ûµÄURL¡¢Éî¶È°ü¼ì²â£¨DPI£©ÈÕÖ¾¼°·´¶ñÒâÈí¼þ¹¤¾ßÌìÉúµÄ¾¯±¨£¬£¬£¬£¬Ê±¼ä¿ç¶È¿É×·ËÝÖÁ2021Äê11Ô¡£¡£¡£¡£¡£ÕâЩÈÕÖ¾ÓÉÍйܼì²âÓëÏìÓ¦£¨MDR£©½â¾ö¼Æ»®AIsaacÌìÉú£¬£¬£¬£¬Ïêϸ¼Í¼ÁËCFEÄÚ²¿ÍøÂç¼Ü¹¹¡¢Ò×Êܹ¥»÷×°±¸¼°Ð§ÀÍÁбí¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬¹¥»÷Õß¿É̫ͨ¹ýÎö´ËÀàÊý¾Ý»æÖÆCFEÇå¾²·ÀÓùͼÆ×£¬£¬£¬£¬Ê¶±ð±¡Èõ»·½Ú²¢ÊµÑ龫׼¹¥»÷¡£¡£¡£¡£¡£³ýÔËÓªÍþвÍ⣬£¬£¬£¬Ô±¹¤»¥ÁªÍø»î¶¯ÈÕÖ¾µÄй¶»¹×é³ÉÒþ˽Σº¦¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃÓòÃûʹÓÃģʽע²á·ÂðÓòÃû£¬£¬£¬£¬Á¬ÏµÐ¹Â¶µÄÄÚ²¿¹¤¾ßÐÅÏ¢Ìᳫ¸ß¶È±ÆÕæµÄÓã²æÊ½ÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£


https://cybernews.com/security/cfe-data-leak-mexico-critical-infrastructure/


4. Crypto24ÀÕË÷Èí¼þʹÓÃ×Ô½ç˵EDR¹æ±Ü¹¤¾ß¹¥»÷´óÐÍ×éÖ¯


8ÔÂ14ÈÕ£¬£¬£¬£¬2024Äê9ÔÂÊ״α»ÆØ¹âµÄCrypto24ÀÕË÷Èí¼þ×éÖ¯Ëäδ¹ãΪÈËÖª£¬£¬£¬£¬µ«ÆäÕë¶ÔÈ«Çò½ðÈÚ¡¢ÖÆÔì¡¢¿Æ¼¼µÈÁìÓò¸ß¼ÛֵĿµÄµÄ¶¨Ïò¹¥»÷ÒÑÒý·¢Çå¾²½ç¹Ø×¢¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Åú×¢£¬£¬£¬£¬¸Ã×éÖ¯ºÜ¿ÉÄÜÓÉ×ÅÃûÀÕË÷Èí¼þÍÅ»ïǰ³ÉÔ±×齨£¬£¬£¬£¬Õ¹ÏÖ³ö¸ß¶ÈµÄÊÖÒÕ³ÉÊì¶ÈÓëÕ½ÊõÒþ²ØÐÔ¡£¡£¡£¡£¡£Æä¹¥»÷Á´ÒÔ¶¨ÖÆ»¯¹¤¾ßΪ½¹µã£¬£¬£¬£¬ÐγɴӳõʼÈëÇÖµ½Êý¾ÝÍâйµÄÈ«Á÷³ÌÍþвϵͳ¡£¡£¡£¡£¡£ÔÚÈëÇֽ׶Σ¬£¬£¬£¬¹¥»÷Õßͨ¹ý¼¤»îWindowsĬÈÏÖÎÀíÔ±ÕË»§»ò½¨ÉèÐÂÓû§ÊµÏÖ³¤ÆÚ»¯»á¼û£¬£¬£¬£¬Ëæºó°²ÅÅÅú´¦Öóͷ£¾ç±¾Óëϵͳö¾ÙÏÂÁչÕì̽£¬£¬£¬£¬½¨ÉèÃûΪWinMainSvcµÄ¼üÅ̼ͼЧÀÍÓëMSRuntimeÀÕË÷Èí¼þ¼ÓÔØÆ÷¡£¡£¡£¡£¡£Îª¹æ±ÜÇå¾²¼ì²â£¬£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËRealBlindingEDR¹¤¾ßµÄ±äÖÖ£¬£¬£¬£¬Í¨Ì«¹ýÎöÄÚºËÇý¶¯ÔªÊý¾ÝÆ¥ÅäÓ²±àÂë³§ÉÌÁбí£¬£¬£¬£¬º­¸ÇÇ÷ÊÆ¿Æ¼¼¡¢¿¨°Í˹»ù¡¢SentinelOneµÈ12¼ÒÇå¾²³§ÉÌ£¬£¬£¬£¬Õë¶ÔÐÔ½ûÓÃÄں˼¶·À»¤¹³×Ó¡£¡£¡£¡£¡£Êý¾ÝÇÔÈ¡»·½Ú£¬£¬£¬£¬Crypto24½ÓÄÉË«ÖØÊֶΣº¼üÅ̼ͼÆ÷αװ³É"Microsoft Help Manager"£¬£¬£¬£¬²¶»ñ°üÀ¨¹¦Ð§¼üÔÚÄÚµÄÓû§²Ù×÷Óë´°¿ÚÎÊÌ⣻£»£» £»£»£»ºáÏòÒÆ¶¯Ôòͨ¹ýSMB¹²ÏíʵÏÖ£¬£¬£¬£¬×îÖÕʹÓö¨ÖÆWinINET API¹¤¾ß½«Êý¾Ýй¶ÖÁGoogle Drive¡£¡£¡£¡£¡£ÀÕË÷½×¶Î£¬£¬£¬£¬¹¥»÷ÕßÔÚɾ³ýϵͳ¾íÓ°¸±±¾ºó´¥·¢¼ÓÃܳÌÐò¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/


5. ¼ÓÄôóÏÂÒéÔºÔâÍøÂç¹¥»÷Êý¾Ýй¶£¬£¬£¬£¬Î¢ÈíÎó²î³ÉÍ»ÆÆ¿Ú


8ÔÂ14ÈÕ£¬£¬£¬£¬¼ÓÄôóÏÂÒéÔºÕýÊÓ²ìÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬¹¥»÷Õßͨ¹ýʹÓÃ΢Èí½üÆÚÅû¶µÄÇå¾²Îó²î£¬£¬£¬£¬ÀÖ³ÉÇÔȡԱ¹¤Ãô¸ÐÐÅÏ¢²¢ÈëÇÖÖÎÀíÏÂÒéÔºÅÌËã»ú¼°Òƶ¯×°±¸µÄ½¹µãÊý¾Ý¿â¡£¡£¡£¡£¡£¾Ý¼ÓÄôó¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬£¬ÏÂÒéÔºÊÂÇéÖ°Ô±ÒÑÓÚÖÜһͨ¹ýÓʼþÊÕµ½Î¥¹æÍ¨Öª£¬£¬£¬£¬µ«¹Ù·½ÉÐδ¹ûÕæÉùÃ÷ÊÂÎñϸ½Ú¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃ΢Èí²úÆ·ÖеÄδÐÞ²¹Îó²î»ñÈ¡Êý¾Ý¿â»á¼ûȨÏÞ£¬£¬£¬£¬ÍµÈ¡Á˰üÀ¨Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢°ì¹«ËùÔÚ¼°µç×ÓÓʼþµØµãÔÚÄڵķǹûÕæÊý¾Ý¡£¡£¡£¡£¡£ÏÂÒéÔºÒѱ޲ßÏà¹ØÖ°Ô±Ð¡ÐÄʹÓñ»µÁÐÅϢʵÑéµÄڲƭÐÐΪ£¬£¬£¬£¬Èçð³äÒéÔ±»ò¾ÙÐÐÕ©Æ­¡£¡£¡£¡£¡£¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÈ·ÈÏÕýÔÚЭÖúÊӲ죬£¬£¬£¬µ«Î´½«¹¥»÷¹éÒòÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬£¬Ç¿µ÷ÍøÂçÊÂÎñ¹éÒòÐèãýÃð×ÊÔ´Óëʱ¼ä£¬£¬£¬£¬Éæ¼°¶àÖØÖØ´óÒòËØ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¹¥»÷ÕßʹÓõÄÎó²î¿ÉÄÜÓë΢Èí½üÆÚÅû¶µÄÁ½¸ö¸ßΣÎó²îÏà¹Ø£ºCVE-2025-53770£¨ToolShell£©ºÍCVE-2025-53786¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬CVE-2025-53770×Ô7Ô³õÆð±»¶à¹úÍþвÕûÌåÆÕ±éʹÓ㻣»£» £»£»£»¶øCVE-2025-53786×÷ΪMicrosoft ExchangeÎó²î£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÔÆÇéÐÎÖкáÏòÒÆ¶¯£¬£¬£¬£¬Òѱ»ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐΪ½ôÆÈÖ¸Á£¬£¬£¬ÒªÇó·Ç¾üÊ»ú¹¹Á¬Ã¦ÐÞ²¹¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadas-house-of-commons-investigating-data-breach-after-cyberattack/


6. ŲÍþ²¼À×â¸ñ´ó°ÓÔâÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷


8ÔÂ14ÈÕ£¬£¬£¬£¬Å²Íþ²¼À×â¸ñ´ó°ÓÓÚ2025Äê4ÔÂÔâÓöÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷£¬£¬£¬£¬ÆäÒªº¦Êý×Ö¿ØÖÆÏµÍ³±»ÈëÇÖ£¬£¬£¬£¬Á÷³ö·§Ãű»¶ñÒâ·­¿ª£¬£¬£¬£¬µ¼ÖÂÁè¼Ý720ÍòÉý£¨190Íò¼ÓÂØ£©Ë®Á÷³ö¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ±»Å²Íþ¾¯Ô±Çå¾²¾Ö£¨PST£©ÊÓΪ¶íÂÞ˹¶ÔÒªº¦»ù´¡ÉèʩԶ³Ì¹¥»÷ÄÜÁ¦µÄÌåÏÖ£¬£¬£¬£¬µ«¸üÇãÏòÓÚÊÇÒ»´Î¡°ÄÜÁ¦Õ¹Ê¾¡±¶ø·ÇʵÖÊÐÔÆÆË𡣡£¡£¡£¡£¾ÝPSTÈÏÕæÈ˱´æ«ÌØ¡¤¸Ê¼Ó˹ÔÚ°¢Â×´ï¶ûËÕ¿¨ÌìÏÂÂÛ̳ÉÏ͸¶£¬£¬£¬£¬ºÚ¿ÍÐÐΪµÄ½¹µãÄ¿µÄ²¢·ÇÖ±½ÓÔì³ÉÎïÀíË𺦣¬£¬£¬£¬¶øÊÇͨ¹ý¹ûÕæÑÝʾÊÖÒÕÄÜÁ¦Ê©¼ÓÐÄÀíÓ°Ï죬£¬£¬£¬ÔÚÃñÖÚÖÐÖÆÔì¿Ö¾åÓ벻ȷ¶¨ÐÔ¡£¡£¡£¡£¡£ÕâÒ»ÅжÏÓëŲÍþ¹ú¼ÒÐÌÊÂÊÓ²ì¾Ö£¨Kripos£©µÄÊÓ²ì½áÂÛÒ»Ö£ººÚ¿ÍÔÚTelegramƽ̨Ðû²¼ÁËÒ»¶ÎÈý·ÖÖÓÊÓÆµ£¬£¬£¬£¬Õ¹Ê¾´ó°Ó¿ØÖÆÃæ°å²Ù×÷½çÃæ£¬£¬£¬£¬²¢´øÓÐÓëÇ×¶íÍøÂç·¸·¨×éÖ¯¹ØÁªµÄˮӡ¡£¡£¡£¡£¡£´ËÀàÐÐΪ´ËÇ°ÔøÓëSandworm (APT44) µÈ¹ú¼ÒÖ§³ÖµÄ×éÖ¯ÓйØ£¬£¬£¬£¬±»ÓÃÓÚÇ¿µ÷ÍþвÉùÃ÷£¬£¬£¬£¬¼ÈÐßÈèÊܹ¥»÷·½£¬£¬£¬£¬ÓÖÏòÎ÷·½×ª´ïÍøÂçÕ½ÄÜÁ¦ÐźÅ¡£¡£¡£¡£¡£ÊÂÎñÖУ¬£¬£¬£¬´ó°ÓÖÎÀíÔ±ºÄʱԼËÄСʱ²Å·¢Ã÷·§ÃÅÒì³£²¢ÐÞ¸´ÉèÖ㬣¬£¬£¬µ«×ß©ÒѶԾֲ¿Ë®Á÷µ÷¿Ø±¬·¢Ó°Ïì¡£¡£¡£¡£¡£Ö»¹ÜŲÍþÓë¶íÂÞ˹δ´¦ÓÚÖ±½ÓÕ½Õù״̬£¬£¬£¬£¬µ«ÆÕ¾©ÕþȨÕýͨ¹ý»ìÏýÕ½ÕùÊÖ¶Îά³Ö¶ÔÎ÷·½µÄÖ÷ҪѹÁ¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pro-russian-hackers-blamed-for-water-dam-sabotage-in-norway/