Ìá½»ÐèÇó
*
*

*
*
*
Á¢¼´Ìá½»
µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

logo

    ²úÆ·Óë·þÎñ
    ½â¾ö·½°¸
    ¼¼ÊõÖ§³Ö
    ºÏ×÷·¢Õ¹
    ¹ØÓڻƽð³Ç

    ÉêÇëÊÔÓÃ
      ÿÖܻƽð³Ç¹ÙÍøËÙµÝ??? | HellCatÀÕË÷×éÖ¯ÀûÓÃÇÔÈ¡µÄƾ֤¹¥»÷ËĹúÆóÒµ
      ·¢²¼Ê±¼ä£º2025-04-11 ÔĶÁ´ÎÊý£º 1455 ´Î
      ±¾ÖÜÈȵãʼþÍþвÇ鱨




      1

      HellCatÀÕË÷×éÖ¯ÀûÓÃÇÔÈ¡µÄƾ֤¹¥»÷ËĹúÆóÒµ


      2025Äê4ÔÂ8ÈÕ£¬Ñо¿ÈËÔ±Åû¶£¬HellCatÀÕË÷×é֯ͨ¹ýÇÔÈ¡»ñµÃµÄJiraƾ֤£¬ÈëÇÖÁ˲¨À¼Asseco¡¢ÃÀ¹úHighWire PressºÍRacami¡¢ÈðµäLeoVegas¼¯ÍÅËÄ¼ÒÆóÒµ¡£¹¥»÷ÕßÀûÓÃÇÔÃÜľÂí³¤ÆÚDZ·ü£¬´ÓÊܸÐȾÉ豸ÖлñÈ¡JiraµÇ¼ÐÅÏ¢£¬½ø¶øÉøÍ¸ÄÚÍøÇÔÈ¡²ÆÎñÊý¾Ý¡¢ÄÚ²¿ÓʼþµÈÃô¸ÐÐÅÏ¢£¬²¢Íþв¹«¿ªÊý¾ÝÒÔÀÕË÷Êê½ð¡£JiraϵͳÒò¹ØÁª¿ª·¢Á÷³Ì¡¢¿Í»§Êý¾Ý¼°È¨ÏÞ¹ÜÀí£¬³ÉΪ¸ß¼ÛֵĿ±ê£¬µ«ÆóÒµ³£ºöÊÓÆä¶àÒòËØÈÏÖ¤£¨MFA£©ÅäÖ㬾Ýͳ¼ÆÈ«Çò³¬3000Íò¸ÐȾÉ豸ÖдæÔÚ´óÁ¿Î´¸ü»»µÄJiraƾ֤¡£


      ͼƬ


      ²Î¿¼Á´½Ó£º

      https://hackread.com/hellcat-ransomware-firms-infostealer-stolen-jira-credentials/




      2

      MedusaÀÕË÷×éÖ¯¹¥»÷ÁËÃÀÈü³µÐ­»á


      2025Äê4ÔÂ8ÈÕ£¬Ñо¿ÈËÔ±Åû¶£¬MedusaÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾ÉÏÐû²¼³É¹¦ÈëÇÖNASCAR£¨ÃÀ¹úÄÉ˹¿¨Èü³µÐ­»á£©£¬²¢Ë÷Òª400ÍòÃÀÔªÊê½ð£¬·ñÔò½«¹«¿ªÇÔÈ¡µÄÄÚ²¿Êý¾Ý¡£Medusa·¢²¼37·ÝNASCARÏà¹ØÎļþ×÷Ϊ֤¾Ý£¬ÆäÖаüÀ¨ÈüµÀµØÍ¼¡¢Ô±¹¤ÁªÏµ·½Ê½¡¢ÄÚ²¿±¸Íü¼¼°ÆóÒµÆ·ÅÆ×ÊÁÏ¡£·ÖÎöÏÔʾ£¬Ð¹Â¶Êý¾Ý¿ÉÄÜÉæ¼°ÔËÓªºÍºóÇÚÐÅÏ¢£¬ÈôÊôʵ£¬½«¶ÔÆóÒµ»Æ½ð³Ç¹ÙÍø¹¹³ÉÑÏÖØÍþв¡£


      ͼƬ


      ²Î¿¼Á´½Ó£º

      https://hackread.com/medusa-ransomware-claims-nascar-breach-latest-attack/




      3

      ºÚ¿ÍÀûÓÃCLFSÁãÈÕ©¶´²¿ÊðÀÕË÷Èí¼þ


      2025Äê4ÔÂ8ÈÕ£¬Î¢ÈíÍþвÇ鱨ÖÐÐÄ£¨MSTIC£©·¢ÏÖºÚ¿Í×éÖ¯Storm-2460ÀûÓÃWindowsͨÓÃÈÕÖ¾Îļþϵͳ£¨CLFS£©µÄÁãÈÕÌáȨ©¶´£¨CVE-2025-29824£©¹¥»÷¶à¸öÐÐҵĿ±ê¡£¸Ã©¶´ÔÊÐíÆÕͨÓû§È¨Ï޵Ĺ¥»÷ÕßÌáÉýÖÁϵͳȨÏÞ£¬½ø¶ø²¿ÊðÀÕË÷Èí¼þ¡£Î¢Èí·ÖÎöÏÔʾ£¬¹¥»÷Õßͨ¹ýPipeMagic¶ñÒâÈí¼þÀûÓøÃ©¶´£¬²¢²ÉÓÃcertutil¹¤¾ß´Ó±»ÈëÇֵĺϷ¨ÍøÕ¾ÏÂÔØ¶ñÒâMSBuildÎļþ£¬½âÃܺóÖ´ÐÐPayload¡£¹¥»÷Á´ÖУ¬ºÚ¿ÍÀûÓÃNtQuerySystemInformation APIй¶Äں˵ØÖ·£¬²¢Í¨¹ýÄÚ´æÆÆ»µ¼¼Êõ´Û¸Ä½ø³ÌÁîÅÆ£¬×îÖÕ×¢ÈëSYSTEM½ø³Ì¡£


      ͼƬ



      ²Î¿¼Á´½Ó£º

      https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/








      4

      ¶ñÒâVisual Studio CodeÀ©Õ¹±»·¢ÏÖÖ²ÈëÍÚ¿óľÂí


      2025Äê4ÔÂ7ÈÕ£¬Ñо¿ÈËÔ±·¢ÏÖ10¸ö¶ñÒâVisual Studio CodeÀ©Õ¹£¬Î±×°³É³£Óÿª·¢¹¤¾ß£¬¶ñÒâÀ©Õ¹ÀÛ¼ÆÏÂÔØÁ¿Òѳ¬°ÙÍò´Î¡£Óû§ÔÚ°²×°¶ñÒâÀ©Õ¹ºó£¬¶ñÒâÀ©Õ¹»áÏÂÔØÒ»¸öPowerShell½Å±¾£¬¸Ã½Å±¾½ûÓÃÁËWindows»Æ½ð³Ç¹ÙÍøÐÔ£¬Í¨¹ý¼Æ»®ÈÎÎñʵÏֳ־û¯£¬²¢°²×°XMRigÃÅÂÞ±ÒÍÚ¿ó³ÌÐò¡£¹¥»÷Õß·¢ÆðÁ˸´ÔӵĶà½×¶Î¹¥»÷£¬Í¬Ê±°²×°±»·ÂðµÄºÏ·¨À©Õ¹£¬ÓÃÀ´±ÜÃâÔÚºǫ́ÍÚ¾ò¼ÓÃÜ»õ±ÒʱÒýÆð»³ÒÉ¡£


      ͼƬ



      ²Î¿¼Á´½Ó£º

      https://blog.extensiontotal.com/mining-in-plain-sight-the-vs-code-extension-cryptojacking-campaign-19ca12904b59







      5

      WK KelloggÒòCleo©¶´ÔâClopÀÕË÷ÍÅ»ïÊý¾ÝÇÔÈ¡


      2025Äê4ÔÂ7ÈÕ£¬ÃÀ¹úʳƷ¾ÞÍ·WK Kellogg CoÅû¶ÆäÒòCleoÎļþ´«ÊäÈí¼þ©¶´£¨CVE-2024-50623ºÍCVE-2024-55956£©ÔâÓöÊý¾Ýй¶¡£ClopÀÕË÷ÍÅ»ïÀûÓÃÕâÁ½¸öÁãÈÕ©¶´ÈëÇÖCleo·þÎñÆ÷£¬ÇÔÈ¡Á˰üº¬Ô±¹¤ÐÕÃûºÍÉç»á»Æ½ð³Ç¹ÙÍøºÅÂ루SSN£©µÄÃô¸ÐÊý¾Ý¡£´Ë´ÎʼþÊÇClopÍÅ»ïÕë¶ÔCleoÈí¼þÈ«Çò¹¥»÷µÄÒ»²¿·Ö£¬´ËǰÒѲ¨¼°Western Alliance BankµÈ»ú¹¹¡£




      ͼƬ

      ²Î¿¼Á´½Ó£º

      https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/

      Ãâ·ÑÊÔÓÃ
      ·þÎñÈÈÏß

      ÂíÉÏ×Éѯ

      400-811-3777

      »Øµ½¶¥²¿
      ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿