FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв
Ðû²¼Ê±¼ä 2025-02-171. FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв
2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬FinalDraftÊÇÒ»ÖÖз¢Ã÷µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃOutlookµç×ÓÓʼþµ×¸å¾ÙÐÐÒþ²ØµÄÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶£¬£¬£¬£¬£¬£¬£¬×¨ÃŹ¥»÷ÄÏÃÀij²¿·Ö¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÓÉElastic Security Labs·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Éæ¼°Ò»Ì×ÍêÕûµÄ¹¤¾ß¼¯£¬£¬£¬£¬£¬£¬£¬°üÀ¨PathLoader¼ÓÔØÆ÷¡¢FinalDraftºóÃż°¶à¸öºóʹÓóÌÐò¡£¡£¡£¡£¡£¡£¡£¡£FinalDraftͨ¹ýÀÄÓÃOutlookʵÏÖÒþ²ØÍ¨Ñ¶£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐÊý¾Ýй¶¡¢ÊðÀí¡¢Àú³Ì×¢ÈëºÍºáÏòÒÆ¶¯µÈ²Ù×÷£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ö»¹ÜïÔ̺ۼ£¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚPathLoaderÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ËüÖ´Ðдӹ¥»÷Õß»ù´¡ÉèÊ©¼ìË÷µÄshellcode£¬£¬£¬£¬£¬£¬£¬°üÀ¨FinalDraft¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£FinalDraftͨ¹ýMicrosoft Graph API½¨ÉèͨѶ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃǶÈëµÄË¢ÐÂÁîÅÆ¼ìË÷OAuthÁîÅÆ²¢´æ´¢ÔÚWindows×¢²á±íÖУ¬£¬£¬£¬£¬£¬£¬ÊµÏÖ³¤ÆÚ»á¼û¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýOutlookµ×¸å·¢ËͺÍÎüÊÕÏÂÁ£¬£¬£¬£¬£¬£¬×èÖ¹¼ì²â²¢ÈÚÈëÕý³£Microsoft 365Á÷Á¿¡£¡£¡£¡£¡£¡£¡£¡£FinalDraftÖ§³Ö37¸öÏÂÁ£¬£¬£¬£¬£¬£¬°üÀ¨Êý¾Ýй¶¡¢Àú³Ì×¢È롢ת´ï¹þÏ£¹¥»÷µÈ¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬»¹·¢Ã÷FinalDraftµÄLinux±äÌå¼°ÁíÒ»¸öδ¼Í¼µÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷GuidLoader¡£¡£¡£¡£¡£¡£¡£¡£REF7707ÊÇÕë¶ÔÄÏÃÀÍâ½»²¿µÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬£¬µ«ÆÊÎöÏÔʾÆäÓë¶«ÄÏÑÇÊܺ¦ÕßÓÐÁªÏµ£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÐж¯¹æÄ£¸ü¹ã¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶«ÄÏÑǵçÐźͻ¥ÁªÍø»ù´¡ÉèÊ©ÌṩÉ̵ÄÊÜѬȾ¶ËµãÃé×¼¸ß¼ÛÖµ»ú¹¹£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óö«ÄÏÑÇÒ»Ëù´óѧµÄ´æ´¢ÏµÍ³ÍйܶñÒâÈí¼þ¸ºÔØ¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/
2. SteamÊÐËÁÓÎÏ·PirateFiÈö²¥Vidar¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ó°Ï쳬1500Óû§
2ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬SteamÊÐËÁÖÐÒ»¿îÃûΪPirateFiµÄÃâ·ÑÓÎÏ·ÔÚ2ÔÂ6ÈÕÖÁ2ÔÂ12ÈÕʱ´úÈö²¥ÁËVidarÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¿ÉÄܶà´ï1500ÃûÓû§¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÓÎÏ·ÓÉSeaworth InteractiveÐû²¼£¬£¬£¬£¬£¬£¬£¬±»ÐÎòΪһ¿îÉúÑÄÓÎÏ·£¬£¬£¬£¬£¬£¬£¬µ«Steam·¢Ã÷Æä°üÀ¨¶ñÒâÈí¼þºóÒÑÏòÊÜÓ°ÏìÓû§·¢ËÍ֪ͨ£¬£¬£¬£¬£¬£¬£¬½¨ÒéËûÃÇÖØÐÂ×°ÖÃWindowsÒÔÈ·±£Çå¾²¡£¡£¡£¡£¡£¡£¡£¡£SECUINFRA Falcon TeamÈ·ÈϸöñÒâÈí¼þΪVidarÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÒ»¸ö°æ±¾£¬£¬£¬£¬£¬£¬£¬Òþ²ØÔÚPirate.exeÎļþÖС£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÖÖÖÖ»ìÏýÊÖÒպ͸ü¸ÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÒÔÇÔȡƾ֤¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬PirateFiÃû³ÆÖеÄweb3/Çø¿éÁ´/¼ÓÃÜÇ®±ÒÒýÓÃÊÇΪÁËÎüÒýÌØ¶¨Íæ¼ÒȺÌå¡£¡£¡£¡£¡£¡£¡£¡£ËäÈ»SteamÍÆ³öÁËÌØÊâ²½·¥±£»£»£»¤Íæ¼ÒÃâÊÜδ¾ÊÚȨµÄ¶ñÒâ¸üÐÂË𺦣¬£¬£¬£¬£¬£¬£¬µ«PirateFi°¸ÀýÅú×¢ÕâЩ²½·¥ÈÔÐèÔöÇ¿¡£¡£¡£¡£¡£¡£¡£¡£´ËǰҲÓÐÀàËÆ¶ñÒâÈí¼þÈëÇÖSteamÊÐËÁµÄ°¸Àý£¬£¬£¬£¬£¬£¬£¬ÈçʹÓÃChromeÎó²îµÄDota 2ÓÎϷģʽºÍ±»ºÚ¿Í¹¥»÷µÄ¡¶Slay the Spire¡·Ä£×é¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/
3. ÒÉËÆ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-2372ʹÓÃ×°±¸´úÂë´¹ÂÚ¹¥»÷Microsoft 365ÕÊ»§
2ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪStorm-2372µÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬ÒÉËÆÓë¶íÂÞ˹Óйأ¬£¬£¬£¬£¬£¬£¬ÕýÔÚÕë¶ÔÈ«Çò¶à¸öÁìÓòµÄ×éÖ¯Ìᳫװ±¸´úÂëÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨Õþ¸®¡¢·ÇÕþ¸®×éÖ¯¡¢ITЧÀͺÍÊÖÒÕ¡¢¹ú·À¡¢µçÐÅ¡¢ÎÀÉúÒÔ¼°ÄÜÔ´µÈÁìÓò¡£¡£¡£¡£¡£¡£¡£¡£×ÔÈ¥Äê8ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬¸ÃÐÐΪÕßͨ¹ýÐÂÎÅÆ½Ì¨Ã°³äÓëÄ¿µÄÏà¹ØµÄ×ÅÃûÈËÊ¿£¬£¬£¬£¬£¬£¬£¬ÓÕÆÓû§ÔÚÕýµ±µÇÂ¼Ò³ÃæÉÏÊäÈë¹¥»÷ÕßÌìÉúµÄ×°±¸´úÂ룬£¬£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡¶ÔÊܺ¦ÕßMicrosoft 365ÕÊ»§µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢ÆôÓÃGraph APIÊý¾ÝÍøÂç»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÏÖÔÚʹÓÃMicrosoftÉí·ÝÑéÖ¤ÊðÀíµÄÌØ¶¨¿Í»§¶ËID£¬£¬£¬£¬£¬£¬£¬Äܹ»ÌìÉúеÄÁîÅÆ£¬£¬£¬£¬£¬£¬£¬´øÀ´ÐµĹ¥»÷ºÍ³¤ÆÚÐÔ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£¡£¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬£¬£¬£¬£¬£¬Î¢Èí½¨Òé×èÖ¹×°±¸´úÂëÁ÷£¬£¬£¬£¬£¬£¬£¬ÊµÑéÌõ¼þ»á¼ûÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÏÓÒɱ£´æ´¹ÂÚ¹¥»÷ʱ×÷·ÏÓû§µÄË¢ÐÂÁîÅÆ²¢ÉèÖÃÌõ¼þ»á¼ûÕ½ÂÔÒÔÇ¿ÖÆÖØÐÂÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃMicrosoft Entra IDµÄµÇ¼ÈÕÖ¾¾ÙÐÐ¼à¿Ø²¢¿ìËÙʶ±ðÒì³£µÇ¼ʵÑé¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/
4. ³¯ÏʺڿÍ×éÖ¯KimsukyÒÉËÆÌᳫDEEP#DRIVEÍøÂç´¹ÂÚ¹¥»÷
2ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»³¡ÃûΪDEEP#DRIVEµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯×Ô2024Äê9ÔÂÆðÕë¶Ôº«¹úÆóÒµ¡¢Õþ¸®ÊµÌå¼°¼ÓÃÜÇ®±ÒÓû§Õö¿ª£¬£¬£¬£¬£¬£¬£¬ÒÑÔì³ÉÊýǧÃûÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÒÉËÆ³¯ÏʺڿÍ×éÖ¯KimsukyÌᳫ£¬£¬£¬£¬£¬£¬£¬ÆäÖ÷ҪĿµÄÊÇÍøÂ纫¹úʵÌåµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓú«Óï±àдµÄ¶¨ÖÆÍøÂç´¹ÂÚÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬Î±×°³ÉÊÂÇéÈÕÖ¾¡¢°ü¹ÜÎļþºÍ¼ÓÃÜÏà¹ØÎļþµÈÕýµ±Îļþ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýDropboxµÈƽ̨·Ö·¢£¬£¬£¬£¬£¬£¬£¬ÒÔÌӱܹŰåÇå¾²·ÀÓù¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÓÕ¶üͨ³£ÒÔ.hwp¡¢.xlsxºÍ.pptxµÈÊÜÐÅÈεÄÎļþÃûÌ÷ºÆð£¬£¬£¬£¬£¬£¬£¬È«ÐÄÉè¼ÆÒÔÎüÒýÄ¿µÄÊÜÖÚ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔαװ³ÉÕýµ±ÎĵµµÄ.lnkÎļþ×îÏÈ£¬£¬£¬£¬£¬£¬£¬Æô¶¯¶ñÒâPowerShell¾ç±¾µÄÖ´ÐУ¬£¬£¬£¬£¬£¬£¬½ø¶øÏÂÔØÆäËûÓÐÓøºÔز¢½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃDropbox¾ÙÐÐÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓöàÖÖÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕߵĻù´¡ÉèÊ©¿´ËƶÌÔÝ£¬£¬£¬£¬£¬£¬£¬µ«ÆäÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÓëKimsuky×éÖ¯ºÜÊÇÏàËÆ¡£¡£¡£¡£¡£¡£¡£¡£Securonix½¨Òé¶ÔÓû§¾ÙÐÐÍøÂç´¹ÂÚ½ÌÓý¡¢¼à¿Ø¶ñÒâÈí¼þÔÝ´æÄ¿Â¼ÒÔ¼°¿É¿¿µÄ¶ËµãÈÕÖ¾¼Í¼£¬£¬£¬£¬£¬£¬£¬ÒÔ·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/n-korean-hackers-deep-drive-attacks-against-s-korea/
5. ºÚ¿ÍʹÓÃCVE-2025-0108Îó²î¹¥»÷PAN-OS·À»ðǽ
2ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃ×î½üÐÞ¸´µÄCVE-2025-0108Îó²î¶ÔPalo Alto NetworksµÄPAN-OS·À»ðǽÌᳫÁ˹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢Å²ÓÃPHP¾ç±¾£¬£¬£¬£¬£¬£¬£¬Î£¼°ÏµÍ³µÄÍêÕûÐÔºÍÉñÃØÐÔ¡£¡£¡£¡£¡£¡£¡£¡£Palo Alto NetworksÔÚ2ÔÂ12ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬±Þ²ßÖÎÀíÔ±½«·À»ðǽÉý¼¶µ½Ö¸¶¨°æ±¾ÒÔ½â¾ö´ËÎÊÌ⣬£¬£¬£¬£¬£¬£¬Í¬Ê±Ö¸³öPAN-OS 11.0ÒòÒÑ´ïʹÓÃÊÙÃü£¬£¬£¬£¬£¬£¬£¬½«²»ÔÙÐû²¼ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉAssetnoteµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÒѽÒÏþ°üÀ¨ÍêÕûÎó²îʹÓÃϸ½ÚµÄÎÄÕ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²îÌáÈ¡Ãô¸ÐÊý¾Ý¡¢¼ìË÷ÉèÖûòʹÓÃÉèÖᣡ£¡£¡£¡£¡£¡£¡£GreyNoiseƽ̨¼Í¼ÁËÕë¶ÔδÐÞ²¹·À»ðǽµÄ¹¥»÷ʵÑ飬£¬£¬£¬£¬£¬£¬ÇÒ¿ÉÄÜÓжà¸öÍþвÐÐΪÕß¼ÓÈë¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý4400̨PAN-OS×°±¸µÄÖÎÀí½çÃæÔÚÏß̻¶¡£¡£¡£¡£¡£¡£¡£¡£Îª·ÀÓù¹¥»÷£¬£¬£¬£¬£¬£¬£¬½¨ÒéÓ¦Óò¹¶¡²¢ÏÞÖÆ¶Ô·À»ðǽÖÎÀí½Ó¿ÚµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
6. CISA½«Apple iOS/iPadOS¼°Mitel SIPµç»°Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼
2ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Apple iOSºÍiPadOSµÄÊÚȨ¹ýʧÎó²î£¨CVE-2025-24200£©ÒÔ¼°Mitel SIPµç»°µÄ²ÎÊý×¢ÈëÎó²î£¨CVE-2024-41710£©Ìí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£¡£¡£¡£Æ»¹û½ôÆÈÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁË¿ÉÄܱ»¡°¼«ÆäÖØ´ó¡±Õë¶ÔÐÔ¹¥»÷ʹÓõÄCVE-2025-24200Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìiPhone XS¼°¸üлúÐͺͶà¿îiPad£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚËø¶¨×°±¸ÉϽûÓÃUSBÏÞÖÆÄ£Ê½¡£¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬MitelÒ²Ðû²¼Á˹̼þ¸üнâ¾öÁËCVE-2024-41710Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìMitel 6800¡¢6900ºÍ6900wϵÁÐSIPµç»°£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õß¾ÙÐÐÏÂÁî×¢Èë¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬ÓÐÑо¿·¢Ã÷»ùÓÚMiraiµÄ½©Ê¬ÍøÂçAquabotµÄбäÖÖÕë¶Ô±£´æ¸ÃÎó²îµÄMitel SIPµç»°¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ5ÈÕǰÐÞ¸´ÕâЩÎó²î£¬£¬£¬£¬£¬£¬£¬²¢½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/174246/security/u-s-cisa-adds-apple-ios-and-ipados-and-mitel-sip-phones-flaws-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ