• Ìá½»ÐèÇó
    *
    *

    *
    *
    *
    Á¢¼´Ìá½»
    µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

    logo

      ²úÆ·Óë·þÎñ
      ½â¾ö·½°¸
      ¼¼ÊõÖ§³Ö
      ºÏ×÷·¢Õ¹
      ¹ØÓڻƽð³Ç

      ÉêÇëÊÔÓÃ
        ÿÖܻƽð³Ç¹ÙÍøËÙµÝ??? | XWorm¶ñÒâÈí¼þбäÖÖ´øÓÐÀÕË÷Èí¼þÄ£¿éºÍ³¬¹ý35¸ö²å¼þ
        ·¢²¼Ê±¼ä£º2025-10-11 ÔĶÁ´ÎÊý£º 2270 ´Î


        ±¾ÖÜÈȵãʼþÍþвÇ鱨
        1¡¢XWorm¶ñÒâÈí¼þбäÖÖ´øÓÐÀÕË÷Èí¼þÄ£¿éºÍ³¬¹ý35¸ö²å¼þ
        ½üÆÚÍøÂç»Æ½ð³Ç¹ÙÍø¹«Ë¾Trellix±¨¸æ³Æ£¬XWormÔ¶¿ØÄ¾ÂíÔÚ¾­Àú¿ª·¢ÕßXCoderÈ¥Äê·ÅÆúÏîÄ¿ºóÔٴλîÔ¾£¬×îа汾6.0¡¢6.4Óë6.5Õý±»¶à·½ÍþвÐÐΪÕßÓÃÓÚµöÓã¹¥»÷´«²¥¡£Ð°æXWormÓµÓг¬¹ý35¸ö²å¼þ£¬¹¦Äܺ­¸ÇÊý¾ÝÇÔÈ¡¡¢Ô¶³Ì¿ØÖÆ¡¢Îļþ¼Ó½âÃܵȶàÖÖ¶ñÒâ²Ù×÷£¬²¢ÐÂÔöÀÕË÷Ä£¿é¡°Ransomware.dll¡±£¬¿É¼ÓÃÜÓû§Îĵµ²¢ÏÔʾÊê½ðÒªÇó¡£Ñо¿·¢ÏÖ£¬¸ÃÄ£¿éÓë2021Äê³öÏÖµÄNoCryÀÕË÷Èí¼þÔÚ¼ÓÃÜËã·¨¼°·´·ÖÎö»úÖÆÉÏ´æÔڸ߶ÈÏàËÆÐÔ¡£´ËÍ⣬XWormµÄ´«²¥·½Ê½Ò²¸ü¼Ó¶àÑù£¬³ý´«Í³ÓʼþÓëLNKÎļþÍ⣬»¹ÀûÓÃαװΪºÏ·¨Ó¦ÓõĿÉÖ´ÐÐÎļþ¡¢¶ñÒâJavaScript½Å±¾ÒÔ¼°AIÖ÷ÌâµöÓãÎĵµÊµÏÖ¸ÐȾÁ´À©Õ¹£¬ÏÔʾÆäÔÚÍøÂç·¸×ïȦµÄÔÙ¶È»îÔ¾ÓëÑÝ»¯Ç÷ÊÆ¡£


        ²Î¿¼Á´½Ó£º
        https://www.trellix.com/blogs/research/xworms-evolving-infection-chain-from-predictable-to-deceptive/


        2¡¢GoAnywhere¹Ø¼ü©¶´ÔâÀÕË÷Èí¼þ¹¥»÷

        ΢Èí½üÈÕÈ·ÈÏ£¬ÍøÂç·¸×ïÍÅ»ïStorm-1175ÕýÔÚÀûÓÃGoAnywhere MFTÎļþ´«Ê乤¾ßµÄ¸ßΣ©¶´CVE-2025-10035·¢ÆðMedusaÀÕË÷¹¥»÷¡£¸Ã©¶´Ô´ÓÚLicense Servlet×é¼þµÄ·´ÐòÁл¯È±ÏÝ£¬¿É±»Ô¶³ÌµÍ¸´ÔӶȹ¥»÷ÀûÓã¬ÎÞÐèÓû§½»»¥¡£Ñо¿ÏÔʾ£¬¹¥»÷Õß×Ô9ÔÂ11ÈÕÆð¼´ÀÄÓôË©¶´»ñÈ¡³õʼ·ÃÎÊȨÏÞ£¬²¢Í¨¹ýÔ¶³Ì¼à¿Ø¹¤¾ßSimpleHelpÓëMeshAgentά³Ö³Ö¾Ã¿ØÖÆ£¬ËæºóÀûÓÃNetscan½øÐкáÏòÒÆ¶¯ºÍϵͳÕì²ì£¬×îÖÕ²¿ÊðMedusaÀÕË÷³ÌÐò¼ÓÃÜÊܺ¦ÕßÊý¾Ý¡£Î¢ÈíÖ¸³ö£¬Ïà¹Ø»î¶¯ÒѲ¨¼°¶à¼Ò»ú¹¹£¬ÇÒÓë´ËǰÀûÓÃVMware ESXi©¶´µÄ¹¥»÷ÊÖ·¨ÏàËÆ¡£Îª·ÀÓù´ËÀàÍþв£¬Î¢ÈíÓëFortra¾ù½¨Òé¹ÜÀíÔ±Á¢¼´Éý¼¶ÖÁ×îаæGoAnywhere£¬²¢¼ì²éÈÕÖ¾ÖÐÊÇ·ñ³öÏÖSignedObject.getObject¶ÑÕ»´íÎóÒÔÈ·ÈÏϵͳÊÇ·ñÔâÈëÇÖ¡£


        ²Î¿¼Á´½Ó£º
        https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/


        3¡¢LockBit¡¢QilinºÍDragonForceÁªÊÖÖ÷Ô×ÀÕË÷Èí¼þÉú̬ϵͳ

        ReliaQuest±¨¸æÏÔʾ£¬LockBit¡¢QilinÓëDragonForceÈý´óÀÕË÷×éÖ¯½üÈÕÐû²¼½á³ÉÁªÃË£¬ÒâͼÕûºÏ×ÊÔ´¡¢¹²Ïí»ù´¡ÉèÊ©£¬ÒÔÌáÉý¹¥»÷ЧÂʲ¢¹®¹ÌÔÚÀÕË÷Éú̬ÖеÄÖ÷µ¼µØÎ»¡£´Ë´ÎºÏ×÷½ôËæLockBitÔÚ2024Ä걻ȡµÞºóÖØ·µÍøÂçÖ®¼Ê£¬±»ÊÓΪÆäÖØ½¨ÉùÓþ¡¢»Ö¸´Óë¼ÓÃËÕßÐÅÈεÄÖØÒª¾Ù´ë¡£·ÖÎöÖ¸³ö£¬ÁªÃË¿ÉÄÜÒý·¢Õë¶Ô¹Ø¼ü»ù´¡ÉèÊ©µÄÐÂÒ»ÂÖ¹¥»÷³±£¬À©´óÍþв·¶Î§¡£QilinÔÚ2025ÄêµÚÈý¼¾¶Èµ¥¼¾¹¥»÷³¬200Æð£¬³ÉΪ×î»îÔ¾µÄÀÕË÷×éÖ¯£»LockBitÒà·¢²¼¿É¹¥»÷Windows¡¢LinuxÓëESXiϵͳµÄ5.0°æ±¾¡£»Æ½ð³Ç¹ÙÍøÑо¿Õß¾¯¸æ£¬´Ë´ÎÁªÃË»òԤʾÀÕË÷Éú̬½øÒ»²½×¨Òµ»¯ÓëÈ«ÇòÀ©ÕÅÇ÷ÊÆ£¬ÓÈÆäÕë¶Ô±±ÃÀ¼°ÐÂÐËÊг¡¹ú¼ÒµÄ¹¥»÷·çÏÕÉÏÉý¡£



        ²Î¿¼Á´½Ó£º

        https://reliaquest.com/blog/threat-spotlight-ransomware-and-cyber-extortion-in-q3-2025



        4¡¢Salesforce¾Ü¾øÏòºÚ¿ÍÖ§¸¶Êý¾ÝÀÕË÷Êê½ð

        ¿Í»§¹ØÏµ¹ÜÀí¾ÞÍ·Salesforce֤ʵ£¬½«²»»áÓëºÚ¿Í×éÖ¯¡°Scattered Lapsus$ Hunters¡±Ì¸ÅлòÖ§¸¶ÈκÎÊê½ð¡£¸Ã×éÖ¯´Ëǰͨ¹ýÉç»á¹¤³ÌÓëOAuthÀÄÓ÷¢¶¯¶àÂÖ¹¥»÷£¬´ÓSalesforce¿Í»§ÊµÀýÖÐÇÔÈ¡½ü10ÒÚÌõÊý¾Ý£¬²¢ÔÚÊý¾Ýй¶վÉÏÀÕË÷°üÀ¨¹È¸è¡¢µÏÊ¿Äá¡¢·áÌï¡¢ÍòºÀ¡¢Âóµ±À͵È39¼ÒÖªÃûÆóÒµ¡£¹¥»÷»î¶¯·ÖÁ½½×¶Î½øÐУºÒ»ÊÇð³äITÈËÔ±ÓÕÆ­Ô±¹¤ÊÚȨ¶ñÒâOAuthÓ¦Ó㬶þÊÇÀûÓñ»µÁµÄSalesLoft DriftÁîÅÆ·ÃÎʿͻ§CRMϵͳ²¢ÍâйÊý¾Ý¡£Salesforce±íʾ£¬¾¡¹ÜÍþвÇ鱨ÏÔʾ¹¥»÷Õ߼ƻ®¹«¿ªÐ¹Â¶Êý¾Ý£¬µ«¹«Ë¾½«¼á³Ö¾Ü¾øÖ§¸¶Êê½ð¡£µ±Ç°Ð¹Â¶Õ¾µãÒѱ»¹Ø±Õ£¬ÒÉËÆÓÉFBI½Ó¹Ü¡£


        ²Î¿¼Á´½Ó£º
        https://www.bloomberg.com/news/articles/2025-10-07/salesforce-tells-clients-it-won-t-pay-hackers-for-data-extortion



        Ãâ·ÑÊÔÓÃ
        ·þÎñÈÈÏß

        ÂíÉÏ×Éѯ

        400-811-3777

        »Øµ½¶¥²¿
        ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿