FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв

Ðû²¼Ê±¼ä 2025-02-17

1. FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв


2ÔÂ16ÈÕ£¬FinalDraftÊÇÒ»ÖÖз¢Ã÷µÄ¶ñÒâÈí¼þ£¬ËüʹÓÃOutlookµç×ÓÓʼþµ×¸å¾ÙÐÐÒþ²ØµÄÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶£¬×¨ÃŹ¥»÷ÄÏÃÀij²¿·Ö ¡£¸Ã¹¥»÷ÓÉElastic Security Labs·¢Ã÷£¬Éæ¼°Ò»Ì×ÍêÕûµÄ¹¤¾ß¼¯£¬°üÀ¨PathLoader¼ÓÔØÆ÷¡¢FinalDraftºóÃż°¶à¸öºóʹÓóÌÐò ¡£FinalDraftͨ¹ýÀÄÓÃOutlookʵÏÖÒþ²ØÍ¨Ñ¶£¬Ö´ÐÐÊý¾Ýй¶¡¢´úÀí¡¢Àú³Ì×¢ÈëºÍºáÏòÒÆ¶¯µÈ²Ù×÷£¬Í¬Ê±Ö»¹ÜïÔÌ­ºÛ¼£ ¡£¹¥»÷ʼÓÚPathLoaderÈëÇÖ£¬ËüÖ´Ðдӹ¥»÷Õß»ù´¡ÉèÊ©¼ìË÷µÄshellcode£¬°üÀ¨FinalDraft¶ñÒâÈí¼þ ¡£FinalDraftͨ¹ýMicrosoft Graph API½¨ÉèͨѶ£¬Ê¹ÓÃǶÈëµÄË¢ÐÂÁîÅÆ¼ìË÷OAuthÁîÅÆ²¢´æ´¢ÔÚWindows×¢²á±íÖУ¬ÊµÏÖ³¤ÆÚ»á¼û ¡£¹¥»÷Õßͨ¹ýOutlookµ×¸å·¢ËͺÍÎüÊÕÏÂÁ×èÖ¹¼ì²â²¢ÈÚÈëÕý³£Microsoft 365Á÷Á¿ ¡£FinalDraftÖ§³Ö37¸öÏÂÁ°üÀ¨Êý¾Ýй¶¡¢Àú³Ì×¢È롢ת´ï¹þÏ£¹¥»÷µÈ ¡£±ðµÄ£¬»¹·¢Ã÷FinalDraftµÄLinux±äÌå¼°ÁíÒ»¸öδ¼Í¼µÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷GuidLoader ¡£REF7707ÊÇÕë¶ÔÄÏÃÀÍâ½»²¿µÄÍøÂçÌØ¹¤Ô˶¯£¬µ«ÆÊÎöÏÔʾÆäÓë¶«ÄÏÑÇÊܺ¦ÕßÓÐÁªÏµ£¬ÌåÏÖÐж¯¹æÄ£¸ü¹ã ¡£¹¥»÷Õßͨ¹ý¶«ÄÏÑǵçÐźͻ¥ÁªÍø»ù´¡ÉèÊ©ÌṩÉ̵ÄÊÜѬȾ¶ËµãÃé×¼¸ß¼ÛÖµ»ú¹¹£¬²¢Ê¹Óö«ÄÏÑÇÒ»Ëù´óѧµÄ´æ´¢ÏµÍ³ÍйܶñÒâÈí¼þ¸ºÔØ ¡£


https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/


2. SteamÊÐËÁÓÎÏ·PirateFiÈö²¥Vidar¶ñÒâÈí¼þ£¬Ó°Ï쳬1500Óû§


2ÔÂ14ÈÕ£¬SteamÊÐËÁÖÐÒ»¿îÃûΪPirateFiµÄÃâ·ÑÓÎÏ·ÔÚ2ÔÂ6ÈÕÖÁ2ÔÂ12ÈÕʱ´úÈö²¥ÁËVidarÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬Ó°Ïì¿ÉÄܶà´ï1500ÃûÓû§ ¡£¸ÃÓÎÏ·ÓÉSeaworth InteractiveÐû²¼£¬±»ÐÎòΪһ¿îÉúÑÄÓÎÏ·£¬µ«Steam·¢Ã÷Æä°üÀ¨¶ñÒâÈí¼þºóÒÑÏòÊÜÓ°ÏìÓû§·¢ËÍ֪ͨ£¬½¨ÒéËûÃÇÖØÐÂ×°ÖÃWindowsÒÔÈ·±£Çå¾² ¡£SECUINFRA Falcon TeamÈ·ÈϸöñÒâÈí¼þΪVidarÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÒ»¸ö°æ±¾£¬Òþ²ØÔÚPirate.exeÎļþÖÐ ¡£¸Ã¶ñÒâÈí¼þʹÓÃÖÖÖÖ»ìÏýÊÖÒպ͸ü¸ÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ÒÔÇÔȡƾ֤ ¡£Ñо¿Ö°Ô±ÒÔΪ£¬PirateFiÃû³ÆÖеÄweb3/Çø¿éÁ´/¼ÓÃÜÇ®±ÒÒýÓÃÊÇΪÁËÎüÒýÌØ¶¨Íæ¼ÒȺÌå ¡£ËäÈ»SteamÍÆ³öÁËÌØÊâ²½·¥±£»¤Íæ¼ÒÃâÊÜδ¾­ÊÚȨµÄ¶ñÒâ¸üÐÂË𺦣¬µ«PirateFi°¸ÀýÅú×¢ÕâЩ²½·¥ÈÔÐèÔöÇ¿ ¡£´ËǰҲÓÐÀàËÆ¶ñÒâÈí¼þÈëÇÖSteamÊÐËÁµÄ°¸Àý£¬ÈçʹÓÃChromeÎó²îµÄDota 2ÓÎϷģʽºÍ±»ºÚ¿Í¹¥»÷µÄ¡¶Slay the Spire¡·Ä£×é ¡£


https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/


3. ÒÉËÆ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-2372ʹÓÃ×°±¸´úÂë´¹ÂÚ¹¥»÷Microsoft 365ÕÊ»§


2ÔÂ15ÈÕ£¬Ò»¸öÃûΪStorm-2372µÄÍþвÐÐΪÕߣ¬ÒÉËÆÓë¶íÂÞ˹ÓйØ£¬ÕýÔÚÕë¶ÔÈ«Çò¶à¸öÁìÓòµÄ×éÖ¯Ìᳫװ±¸´úÂëÍøÂç´¹ÂÚ¹¥»÷£¬Ä¿µÄ°üÀ¨Õþ¸®¡¢·ÇÕþ¸®×éÖ¯¡¢IT·þÎñºÍÊÖÒÕ¡¢¹ú·À¡¢µçÐÅ¡¢ÎÀÉúÒÔ¼°ÄÜÔ´µÈÁìÓò ¡£×ÔÈ¥Äê8ÔÂÒÔÀ´£¬¸ÃÐÐΪÕßͨ¹ýÐÂÎÅÆ½Ì¨Ã°³äÓëÄ¿µÄÏà¹ØµÄ×ÅÃûÈËÊ¿£¬ÓÕÆ­Óû§ÔÚÕýµ±µÇÂ¼Ò³ÃæÉÏÊäÈë¹¥»÷ÕßÌìÉúµÄ×°±¸´úÂ룬´Ó¶ø»ñÈ¡¶ÔÊܺ¦ÕßMicrosoft 365ÕÊ»§µÄ³õʼ»á¼ûȨÏÞ£¬²¢ÆôÓÃGraph APIÊý¾ÝÍøÂçÔ˶¯ ¡£Î¢ÈíÌåÏÖ£¬¹¥»÷ÕßÏÖÔÚʹÓÃMicrosoftÉí·ÝÑéÖ¤´úÀíµÄÌØ¶¨¿Í»§¶ËID£¬Äܹ»ÌìÉúеÄÁîÅÆ£¬´øÀ´ÐµĹ¥»÷ºÍ³¤ÆÚÐÔ¿ÉÄÜÐÔ ¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬Î¢Èí½¨Òé×èÖ¹×°±¸´úÂëÁ÷£¬ÊµÑéÌõ¼þ»á¼ûÕ½ÂÔ£¬²¢ÔÚÏÓÒɱ£´æ´¹ÂÚ¹¥»÷ʱ×÷·ÏÓû§µÄË¢ÐÂÁîÅÆ²¢ÉèÖÃÌõ¼þ»á¼ûÕ½ÂÔÒÔÇ¿ÖÆÖØÐÂÉí·ÝÑéÖ¤ ¡£Í¬Ê±£¬Ê¹ÓÃMicrosoft Entra IDµÄµÇ¼ÈÕÖ¾¾ÙÐÐ¼à¿Ø²¢¿ìËÙʶ±ðÒì³£µÇ¼ʵÑé ¡£


https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/


4. ³¯ÏʺڿÍ×éÖ¯KimsukyÒÉËÆÌᳫDEEP#DRIVEÍøÂç´¹ÂÚ¹¥»÷


2ÔÂ14ÈÕ£¬Ò»³¡ÃûΪDEEP#DRIVEµÄÍøÂç´¹ÂÚ¹¥»÷Ô˶¯×Ô2024Äê9ÔÂÆðÕë¶Ôº«¹úÆóÒµ¡¢Õþ¸®ÊµÌå¼°¼ÓÃÜÇ®±ÒÓû§Õö¿ª£¬ÒÑÔì³ÉÊýǧÃûÊܺ¦Õß ¡£´Ë´Î¹¥»÷ÓÉÒÉËÆ³¯ÏʺڿÍ×éÖ¯KimsukyÌᳫ£¬ÆäÖ÷ҪĿµÄÊÇÍøÂ纫¹úʵÌåµÄÃô¸ÐÐÅÏ¢ ¡£¹¥»÷ÕßʹÓú«Óï±àдµÄ¶¨ÖÆÍøÂç´¹ÂÚÓÕ¶ü£¬Î±×°³ÉÊÂÇéÈÕÖ¾¡¢°ü¹ÜÎļþºÍ¼ÓÃÜÏà¹ØÎļþµÈÕýµ±Îļþ£¬Í¨¹ýDropboxµÈƽ̨·Ö·¢£¬ÒÔÌӱܹŰåÇå¾²·ÀÓù ¡£ÕâЩÓÕ¶üͨ³£ÒÔ.hwp¡¢.xlsxºÍ.pptxµÈÊÜÐÅÈεÄÎļþÃûÌ÷ºÆð£¬È«ÐÄÉè¼ÆÒÔÎüÒýÄ¿µÄÊÜÖÚ ¡£¹¥»÷Á´ÒÔαװ³ÉÕýµ±ÎĵµµÄ.lnkÎļþ×îÏÈ£¬Æô¶¯¶ñÒâPowerShell¾ç±¾µÄÖ´ÐУ¬½ø¶øÏÂÔØÆäËûÓÐÓøºÔز¢½¨É賤ÆÚÐÔ ¡£¹¥»÷Õß»¹Ê¹ÓÃDropbox¾ÙÐÐÊý¾Ýй¶£¬²¢Ê¹ÓöàÖÖÊÖÒÕÌӱܼì²â ¡£Ö»¹Ü¹¥»÷ÕߵĻù´¡ÉèÊ©¿´ËƶÌÔÝ£¬µ«ÆäÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÓëKimsuky×éÖ¯ºÜÊÇÏàËÆ ¡£Securonix½¨Òé¶ÔÓû§¾ÙÐÐÍøÂç´¹ÂÚ½ÌÓý¡¢¼à¿Ø¶ñÒâÈí¼þÔÝ´æÄ¿Â¼ÒÔ¼°¿É¿¿µÄ¶ËµãÈÕÖ¾¼Í¼£¬ÒÔ·ÀÓù´ËÀ๥»÷ ¡£


https://hackread.com/n-korean-hackers-deep-drive-attacks-against-s-korea/


5. ºÚ¿ÍʹÓÃCVE-2025-0108Îó²î¹¥»÷PAN-OS·À»ðǽ


2ÔÂ14ÈÕ£¬ºÚ¿ÍʹÓÃ×î½üÐÞ¸´µÄCVE-2025-0108Îó²î¶ÔPalo Alto NetworksµÄPAN-OS·À»ðǽÌᳫÁ˹¥»÷ ¡£¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢Å²ÓÃPHP¾ç±¾£¬Î£¼°ÏµÍ³µÄÍêÕûÐÔºÍÉñÃØÐÔ ¡£Palo Alto NetworksÔÚ2ÔÂ12ÈÕÐû²¼Ç徲ͨ¸æ£¬±Þ²ß¹ÜÀíÔ±½«·À»ðǽÉý¼¶µ½Ö¸¶¨°æ±¾ÒÔ½â¾ö´ËÎÊÌ⣬ͬʱָ³öPAN-OS 11.0ÒòÒÑ´ïʹÓÃÊÙÃü£¬½«²»ÔÙÐû²¼ÐÞ¸´³ÌÐò ¡£¸ÃÎó²îÓÉAssetnoteµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷²¢±¨¸æ£¬ËûÃÇÒѽÒÏþ°üÀ¨ÍêÕûÎó²îʹÓÃϸ½ÚµÄÎÄÕ ¡£¹¥»÷Õß¿ÉʹÓôËÎó²îÌáÈ¡Ãô¸ÐÊý¾Ý¡¢¼ìË÷ÉèÖûòʹÓÃÉèÖà ¡£GreyNoiseƽ̨¼Í¼ÁËÕë¶ÔδÐÞ²¹·À»ðǽµÄ¹¥»÷ʵÑ飬ÇÒ¿ÉÄÜÓжà¸öÍþвÐÐΪÕß¼ÓÈë ¡£ÏÖÔÚ£¬ÓÐÁè¼Ý4400̨PAN-OS×°±¸µÄ¹ÜÀí½çÃæÔÚÏß̻¶ ¡£Îª·ÀÓù¹¥»÷£¬½¨ÒéÓ¦Óò¹¶¡²¢ÏÞÖÆ¶Ô·À»ðǽ¹ÜÀí½Ó¿ÚµÄ»á¼û ¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/


6. CISA½«Apple iOS/iPadOS¼°Mitel SIPµç»°Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼


2ÔÂ15ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Apple iOSºÍiPadOSµÄÊÚȨ¹ýʧÎó²î£¨CVE-2025-24200£©ÒÔ¼°Mitel SIPµç»°µÄ²ÎÊý×¢ÈëÎó²î£¨CVE-2024-41710£©Ìí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐ ¡£Æ»¹û½ôÆÈÐû²¼ÁËÇå¾²¸üУ¬ÐÞ¸´ÁË¿ÉÄܱ»¡°¼«ÆäÖØ´ó¡±Õë¶ÔÐÔ¹¥»÷ʹÓõÄCVE-2025-24200Îó²î£¬¸ÃÎó²îÓ°ÏìiPhone XS¼°¸üлúÐͺͶà¿îiPad£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚËø¶¨×°±¸ÉϽûÓÃUSBÏÞÖÆÄ£Ê½ ¡£Í¬Ê±£¬MitelÒ²Ðû²¼Á˹̼þ¸üнâ¾öÁËCVE-2024-41710Îó²î£¬¸ÃÎó²îÓ°ÏìMitel 6800¡¢6900ºÍ6900wϵÁÐSIPµç»°£¬¿ÉÄÜÔÊÐí¹¥»÷Õß¾ÙÐÐÏÂÁî×¢Èë¹¥»÷ ¡£Ëæºó£¬ÓÐÑо¿·¢Ã÷»ùÓÚMiraiµÄ½©Ê¬ÍøÂçAquabotµÄбäÖÖÕë¶Ô±£´æ¸ÃÎó²îµÄMitel SIPµç»°¾ÙÐй¥»÷ ¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ5ÈÕǰÐÞ¸´ÕâЩÎó²î£¬²¢½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬ÒÔ½µµÍÖØ´óΣº¦ ¡£


https://securityaffairs.com/174246/security/u-s-cisa-adds-apple-ios-and-ipados-and-mitel-sip-phones-flaws-to-its-known-exploited-vulnerabilities-catalog.html