Ìá½»ÐèÇó
*
*

*
*
*
Á¢¼´Ìá½»
µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

logo

    ²úÆ·Óë·þÎñ
    ½â¾ö·½°¸
    ¼¼ÊõÖ§³Ö
    ºÏ×÷·¢Õ¹
    ¹ØÓڻƽð³Ç

    ÉêÇëÊÔÓÃ
      ÿÖܻƽð³Ç¹ÙÍøËÙµÝ??? | OsirisÀÕË÷Èí¼þÀûÓÃBYOVD¼¼Êõ½ûÓûƽð³Ç¹ÙÍø¹¤¾ß
      ·¢²¼Ê±¼ä£º2026-02-02 ÔĶÁ´ÎÊý£º 3249 ´Î
      ±¾ÖÜÈȵãʼþÍþвÇ鱨

      1¡¢OsirisÀÕË÷Èí¼þÀûÓÃBYOVD¼¼Êõ½ûÓûƽð³Ç¹ÙÍø¹¤¾ß


      Ñо¿ÈËÔ±·¢ÏÖÒ»ÖÖÐÂÐÍOsirisÀÕË÷Èí¼þ£¬ÆäÔÚ2025Äê11ÔÂÕë¶Ô¶«ÄÏÑÇij´óÐͲÍÒûÁ¬ËøÔËÓªÉ̵Ĺ¥»÷Öб»ÆôÓ㬹¥»÷Õß½èÖú×Ô´øÒ×Êܹ¥»÷Çý¶¯£¨BYOVD£©¼¼Êõ£¬ÀÄÓÃPOORTRYÇý¶¯À´½ûÓÃÄ¿±êÉ豸ÉϵĻƽð³Ç¹ÙÍø¹¤¾ß£¬ÎªºóÐø¹¥»÷ÆÌ·¡£Õâ¿îÀÕË÷Èí¼þ¾ß±¸ÍêÕûµÄ¹¥»÷¹¦ÄÜ£¬¿ÉÖÕÖ¹¸÷Àà·þÎñÓë½ø³Ì¡¢¾«×¼É¸Ñ¡Îļþ¼°Îļþ¼Ð½øÐмÓÃÜ¡¢Í¶·ÅÀÕË÷ÐÅ£¬²ÉÓûìºÏ¼ÓÃÜËã·¨±£ÕϼÓÃÜÇ¿¶È£¬¸ø¼ÓÃÜÎļþÌí¼ÓרÊô.Osirisºó׺£¬Í¬Ê±É¾³ýϵͳ¿ìÕÕ²¢ÖÕÖ¹Êý¾Ý¿â¡¢±¸·ÝµÈ¹Ø¼ü½ø³Ì£¬ÇжÏÊܺ¦ÕßµÄÊý¾Ý»Ö¸´Â·¾¶¡£Ä¿Ç°OsirisÀÕË÷Èí¼þµÄ¿ª·¢ÕßÉí·Ý¼°ÊÇ·ñÒÔÀÕË÷¼´·þÎñ£¨RaaS£©Ä£Ê½ÔËÓªÉÐδÃ÷È·£¬µ«Ñо¿ÈËÔ±·¢ÏÖÆäÓëINCÀÕË÷Èí¼þÍÅ»ï´æÔÚDZÔÚ¹ØÁª£¬¹¥»÷Öй¤¾ß¸´Óá¢Êý¾ÝÇÔÈ¡¼°Î±×°ÊÖ·¨¾ùÓë¸ÃÍÅ»ï¹ýÍù²Ù×÷¸ß¶ÈÏàËÆ¡£



      ²Î¿¼Á´½Ó£º

      https://securityaffairs.com/187279/security/osiris-ransomware-emerges-leveraging-byovd-technique-to-kill-security-tools.html


      2¡¢¶ñÒâPyPI°ü·ÂðSymPy´«²¥ÍÚ¿óľÂí

      Ñо¿ÈËÔ±·¢ÏÖÒ»¿îÃûΪsympy-devµÄ¶ñÒâPyPI°ü£¬¸Ã°ü·ÂðÈÈÃÅPython·ûºÅÊýѧ¿âSymPy£¬ºóÕßÔÂÏÂÔØÁ¿´ï8500Íò´Î£¬¹¥»÷Õ߸´ÖÆÁËSymPyµÄÏîÄ¿ÃèÊö¼°Æ·ÅÆÔªËØ£¬ÒÔ´ËÓÕµ¼Óû§Îó°²×°¡£¸Ã¶ñÒâ°üÓÚ2026Äê1ÔÂ17ÈÕ·¢²¼4¸ö°æ±¾£¨1.2.3ÖÁ1.2.6£©£¬¾ùº¬¶ñÒâ´úÂ룬ά»¤Õß±êעΪNanit£¬ÉÏÏßÊ×ÈÕÏÂÔØÁ¿¼´Í»ÆÆ1000´Î£¬ËäÏÂÔØÁ¿²»µÈͬÓÚ¸ÐȾÁ¿£¬µ«ÒÑ¿ìËÙÉøÍ¸ÖÁ¿ª·¢Õß¼°³ÖÐø¼¯³É£¨CI£©»·¾³¡£°üÄÚ¶ñÒâ´úÂë×¢ÈëÏÂÔØÆ÷¼°ÄÚ´æÖ´ÐгÌÐòµ½SymPy¶àÏîʽ´úÂë·¾¶£¬µ÷Óúó»á»ñȡԶ³ÌJSONÅäÖá¢ÏÂÔØ¹¥»÷Õß¿ØÖƵÄELF¸ºÔØ£¬Í¨¹ýLinuxÄÚ´æÎļþÃèÊö·û¼¼ÊõÖ´ÐУ¬¼õÉÙ´ÅÅ̺ۼ££¬Êµ²âÏÂÔØµÄ¸ºÔØÎªXMRig¼ÓÃÜÍÚ¿ó³ÌÐò£¬Í¨¹ýTLSÁ¬½Ó¿ó³Ø¶Ëµã£¬ÅäÖü°¸ºÔؾùÀ´×ÔÁ½¸öÖ¸¶¨¿ØÖÆ·þÎñÆ÷¡£




      ²Î¿¼Á´½Ó£º

      https://socket.dev/blog/pypi-package-impersonates-sympy-to-deliver-cryptomining-malware


      3¡¢¹¥»÷ÕßÀûÓÃDefendnotÈÆ¹ý·ÀÓùͶ·ÅÀÕË÷Èí¼þ

      »Æ½ð³Ç¹ÙÍøÑо¿ÈËÔ±Åû¶£¬Ò»³¡Õë¶Ô¶íÂÞ˹Óû§µÄ¶à½×¶Î¶ñÒâ¹¥»÷»î¶¯ÕýÔÚ»îÔ¾´«²¥£¬¸ÃÐж¯Í¨¹ýÉç»á¹¤³ÌÊֶνáºÏÀÄÓÃGitHubºÍDropboxµÈºÏ·¨ÔÆ·þÎñ£¬ÊµÏÖ¶ÔϵͳµÄÒþ±ÎÈëÇÖºÍÀÕË÷Èí¼þͶ·Å¡£FortiGuard Labs·ÖÎöÖ¸³ö£¬¹¥»÷Á´Ê¼ÓÚαװ³ÉÕý³£ÉÌÎñÎļþµÄÓÕ¶üÎĵµ£¬Óû§´ò¿ªºó»á¿´µ½Ðé¼ÙÈÎÎñ»òÌáʾÐÅÏ¢£¬¶øÕæÊµµÄ¶ñÒâ½Å±¾ÔÚºǫ́ÇÄȻִÐв¢½¨Á¢³Ö¾Ã¿ØÖÆ¡£¸Ã¹¥»÷×îÏÔÖøµÄÌØÕ÷ÔÚÓÚÀûÓÃÃûΪDefendnotµÄ¹¤¾ß£¬¸Ã¹¤¾ßÔ­±¾ÓÃÓڻƽð³Ç¹ÙÍøÑо¿£¬Ö¼ÔÚÑÝʾWindows»Æ½ð³Ç¹ÙÍøÖÐÐÄÐÅÈλúÖÆµÄȱÏÝ¡£¹¥»÷Õß½«ÆäÎäÆ÷»¯£¬ÓÃÓÚÖ±½Ó¹Ø±ÕMicrosoft Defender·À»¤¹¦ÄÜ£¬´Ó¶øÔÚ²»ÒÀÀµÂ©¶´ÀûÓõÄÇé¿öÏ¡°ºÏ·¨¡±½â³ýϵͳ»Æ½ð³Ç¹ÙÍø·ÀÏߣ¬ÎªºóÐø¶ñÒâ¸ºÔØÆÌƽµÀ·¡£



      ²Î¿¼Á´½Ó£º

      https://securityonline.info/github-dropbox-weaponized-defendnot-tool-used-to-disable-windows-defender/


      4¡¢ShinyHuntersÍÅ»ïй¶Êý°ÙÍòÌõÓû§¼°ÆóÒµÊý¾Ý

      ºÚ¿ÍÍÅ»ïShinyHuntersÔÙ¶È»îÔ¾£¬ÓÚ2026Äê1ÔÂ22ÈÕͨ¹ýTelegram·¢²¼°µÍøÁ´½Ó£¬¹«¿ªÐ¹Â¶SoundCloud¡¢Crunchbase¼°BettermentÈý¼Òƽ̨µÄÊý°ÙÍòÌõÓû§¼°ÆóÒµÊý¾Ý£¬´Ë´Îй¶ԴÓÚ¶ÔÈý¼Ò¹«Ë¾µÄÀÕË÷δËì¡£¸ÃÍÅ»ï´î½¨×¨Êô°µÍøÐ¹Â¶Õ¾µã£¬Ðû³Æ¡°ÒªÃ´¸¶¿îҪôй¶¡±£¬²¢·Å»°ºóÐø½«·¢Æð¸ü¶àÊý¾Ýй¶¹¥»÷¡£Ð¹Â¶Êý¾Ýº¬Betterment³¬2000ÍòÌõ¸öÈËÉí·ÝÐÅÏ¢¡¢Crunchbase³¬200ÍòÌõÆóÒµÊý¾Ý¼°SoundCloud³¬3000ÍòÌõÓû§¼Ç¼¡£ÖµµÃ×¢ÒâµÄÊÇ£¬SoundCloudÈ¥Äê12ÔÂÔøÈ·ÈÏÊý¾Ýй¶£¬Ó°ÏìÔ¼3500ÖÁ3600ÍòÓû§£¬Óë¸ÃÍÅ»ïÐû³ÆµÄй¶¹æÄ£¸ß¶ÈÎǺÏ¡£





      ²Î¿¼Á´½Ó£º

      https://hackread.com/shinyhunters-leak-soundcloud-crunchbase-betterment-data/

      5¡¢ÀÕË÷Èí¼þÍÅ»ïÍ·Ä¿³ÐÈÏʵʩÀÕË÷Èí¼þ¹¥»÷


      ¶íÂÞ˹¹«ÃñÒÁÑÇÄá˹¡¤ÑÇÀúɽµÂÂÞÎ¬Ææ¡¤°²ÌØÂÞÅí¿Æ£¨Ianis Aleksandrovich Antropenko£©½üÈÕÔÚÃÀ¹úµÃ¿ËÈøË¹Öݱ±ÇøÁª°îµØÇø·¨ÔºÈÏ×³ÐÈÏÔÚ2018ÄêÖÁ2022ÄêµÄËÄÄê¼äÁìµ¼ÀÕË÷Èí¼þÒõı£¬¹¥»÷ÖÁÉÙ50ÃûÊܺ¦Õß¡£Ëû±»¿ØºÏıϴǮ¡¢ºÏı¼ÆËã»úÆÛÕ©ÓëÀÄÓã¬ÃæÁÙ×î¸ß25Äê¼à½û¡¢75ÍòÃÀÔª·£¿î£¬Í¬Ê±ÐèÏòÊܺ¦ÕßÖ§¸¶Åâ³¥½ð²¢Ã»ÊÕ·Ç·¨ËùµÃ²Æ²ú£¬´Ë°¸ÒòÏÓ·¸ÔÚÃÀ¾³ÄÚʵʩ¶àÊý·¸×ïÐÐΪ¶øÏÔµÃÓÈÎªÌØÊâ¡£°²ÌØÂÞÅí¿ÆÒÆ¾ÓÃÀ¹úǰºó¾ù²ÎÓëÀÕË÷Èí¼þ¹¥»÷£¬ÔÚ·ðÂÞÀï´ïºÍ¼ÓÖݾÓסÆÚ¼ä·¸Ï¶àÆð×ïÐУ¬2024Äê±»²¶ºóº±¼û»ñ×¼±£ÊÍ£¬È´ÔÚÈ¥ÄêËĸöÔÂÄÚÈý´ÎÎ¥·´ÉóǰÊÍ·ÅÌõ¼þ£¬º¬Á½´ÎÒòÎü¶¾Ðï¾ÆÒý·¢Î£ÏÕÐÐΪ±»²¶¡£





      ²Î¿¼Á´½Ó£º

      https://cyberscoop.com/ianis-antropenko-russian-ransomware-leader-guilty/

      Ãâ·ÑÊÔÓÃ
      ·þÎñÈÈÏß

      ÂíÉÏ×Éѯ

      400-811-3777

      »Øµ½¶¥²¿
      ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿