FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв

Ðû²¼Ê±¼ä 2025-02-17

1. FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв


2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬FinalDraftÊÇÒ»ÖÖз¢Ã÷µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃOutlookµç×ÓÓʼþµ×¸å¾ÙÐÐÒþ²ØµÄÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶£¬£¬£¬£¬£¬£¬£¬£¬×¨ÃŹ¥»÷ÄÏÃÀij²¿·Ö¡£¡£¡£¡£¡£¸Ã¹¥»÷ÓÉElastic Security Labs·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°Ò»Ì×ÍêÕûµÄ¹¤¾ß¼¯£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨PathLoader¼ÓÔØÆ÷¡¢FinalDraftºóÃż°¶à¸öºóʹÓóÌÐò¡£¡£¡£¡£¡£FinalDraftͨ¹ýÀÄÓÃOutlookʵÏÖÒþ²ØÍ¨Ñ¶£¬£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐÊý¾Ýй¶¡¢ÊðÀí¡¢Àú³Ì×¢ÈëºÍºáÏòÒÆ¶¯µÈ²Ù×÷£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ö»¹ÜïÔÌ­ºÛ¼£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚPathLoaderÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬ËüÖ´Ðдӹ¥»÷Õß»ù´¡ÉèÊ©¼ìË÷µÄshellcode£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨FinalDraft¶ñÒâÈí¼þ¡£¡£¡£¡£¡£FinalDraftͨ¹ýMicrosoft Graph API½¨ÉèͨѶ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃǶÈëµÄË¢ÐÂÁîÅÆ¼ìË÷OAuthÁîÅÆ²¢´æ´¢ÔÚWindows×¢²á±íÖУ¬£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ³¤ÆÚ»á¼û¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýOutlookµ×¸å·¢ËͺÍÎüÊÕÏÂÁ£¬£¬£¬£¬£¬£¬£¬×èÖ¹¼ì²â²¢ÈÚÈëÕý³£Microsoft 365Á÷Á¿¡£¡£¡£¡£¡£FinalDraftÖ§³Ö37¸öÏÂÁ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Êý¾Ýй¶¡¢Àú³Ì×¢È롢ת´ï¹þÏ£¹¥»÷µÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬»¹·¢Ã÷FinalDraftµÄLinux±äÌå¼°ÁíÒ»¸öδ¼Í¼µÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷GuidLoader¡£¡£¡£¡£¡£REF7707ÊÇÕë¶ÔÄÏÃÀÍâ½»²¿µÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬µ«ÆÊÎöÏÔʾÆäÓë¶«ÄÏÑÇÊܺ¦ÕßÓÐÁªÏµ£¬£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÐж¯¹æÄ£¸ü¹ã¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶«ÄÏÑǵçÐźͻ¥ÁªÍø»ù´¡ÉèÊ©ÌṩÉ̵ÄÊÜѬȾ¶ËµãÃé×¼¸ß¼ÛÖµ»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óö«ÄÏÑÇÒ»Ëù´óѧµÄ´æ´¢ÏµÍ³ÍйܶñÒâÈí¼þ¸ºÔØ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/


2. SteamÊÐËÁÓÎÏ·PirateFiÈö²¥Vidar¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬Ó°Ï쳬1500Óû§


2ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬SteamÊÐËÁÖÐÒ»¿îÃûΪPirateFiµÄÃâ·ÑÓÎÏ·ÔÚ2ÔÂ6ÈÕÖÁ2ÔÂ12ÈÕʱ´úÈö²¥ÁËVidarÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¿ÉÄܶà´ï1500ÃûÓû§¡£¡£¡£¡£¡£¸ÃÓÎÏ·ÓÉSeaworth InteractiveÐû²¼£¬£¬£¬£¬£¬£¬£¬£¬±»ÐÎòΪһ¿îÉúÑÄÓÎÏ·£¬£¬£¬£¬£¬£¬£¬£¬µ«Steam·¢Ã÷Æä°üÀ¨¶ñÒâÈí¼þºóÒÑÏòÊÜÓ°ÏìÓû§·¢ËÍ֪ͨ£¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéËûÃÇÖØÐÂ×°ÖÃWindowsÒÔÈ·±£Çå¾²¡£¡£¡£¡£¡£SECUINFRA Falcon TeamÈ·ÈϸöñÒâÈí¼þΪVidarÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÒ»¸ö°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬Òþ²ØÔÚPirate.exeÎļþÖС£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÖÖÖÖ»ìÏýÊÖÒպ͸ü¸ÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÒÔÇÔȡƾ֤¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬£¬PirateFiÃû³ÆÖеÄweb3/Çø¿éÁ´/¼ÓÃÜÇ®±ÒÒýÓÃÊÇΪÁËÎüÒýÌØ¶¨Íæ¼ÒȺÌå¡£¡£¡£¡£¡£ËäÈ»SteamÍÆ³öÁËÌØÊâ²½·¥± £»£»£»£»¤Íæ¼ÒÃâÊÜδ¾­ÊÚȨµÄ¶ñÒâ¸üÐÂË𺦣¬£¬£¬£¬£¬£¬£¬£¬µ«PirateFi°¸ÀýÅú×¢ÕâЩ²½·¥ÈÔÐèÔöÇ¿¡£¡£¡£¡£¡£´ËǰҲÓÐÀàËÆ¶ñÒâÈí¼þÈëÇÖSteamÊÐËÁµÄ°¸Àý£¬£¬£¬£¬£¬£¬£¬£¬ÈçʹÓÃChromeÎó²îµÄDota 2ÓÎϷģʽºÍ±»ºÚ¿Í¹¥»÷µÄ¡¶Slay the Spire¡·Ä£×é¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/


3. ÒÉËÆ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-2372ʹÓÃ×°±¸´úÂë´¹ÂÚ¹¥»÷Microsoft 365ÕÊ»§


2ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪStorm-2372µÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬£¬ÒÉËÆÓë¶íÂÞ˹Óйأ¬£¬£¬£¬£¬£¬£¬£¬ÕýÔÚÕë¶ÔÈ«Çò¶à¸öÁìÓòµÄ×éÖ¯Ìᳫװ±¸´úÂëÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨Õþ¸®¡¢·ÇÕþ¸®×éÖ¯¡¢ITЧÀͺÍÊÖÒÕ¡¢¹ú·À¡¢µçÐÅ¡¢ÎÀÉúÒÔ¼°ÄÜÔ´µÈÁìÓò¡£¡£¡£¡£¡£×ÔÈ¥Äê8ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÐÐΪÕßͨ¹ýÐÂÎÅÆ½Ì¨Ã°³äÓëÄ¿µÄÏà¹ØµÄ×ÅÃûÈËÊ¿£¬£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§ÔÚÕýµ±µÇÂ¼Ò³ÃæÉÏÊäÈë¹¥»÷ÕßÌìÉúµÄ×°±¸´úÂ룬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡¶ÔÊܺ¦ÕßMicrosoft 365ÕÊ»§µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÆôÓÃGraph APIÊý¾ÝÍøÂç»î¶¯¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÏÖÔÚʹÓÃMicrosoftÉí·ÝÑéÖ¤ÊðÀíµÄÌØ¶¨¿Í»§¶ËID£¬£¬£¬£¬£¬£¬£¬£¬Äܹ»ÌìÉúеÄÁîÅÆ£¬£¬£¬£¬£¬£¬£¬£¬´øÀ´ÐµĹ¥»÷ºÍ³¤ÆÚÐÔ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬£¬£¬£¬£¬£¬£¬Î¢Èí½¨Òé×èÖ¹×°±¸´úÂëÁ÷£¬£¬£¬£¬£¬£¬£¬£¬ÊµÑéÌõ¼þ»á¼ûÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÏÓÒɱ£´æ´¹ÂÚ¹¥»÷ʱ×÷·ÏÓû§µÄË¢ÐÂÁîÅÆ²¢ÉèÖÃÌõ¼þ»á¼ûÕ½ÂÔÒÔÇ¿ÖÆÖØÐÂÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃMicrosoft Entra IDµÄµÇ¼ÈÕÖ¾¾ÙÐÐ¼à¿Ø²¢¿ìËÙʶ±ðÒì³£µÇ¼ʵÑé¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/


4. ³¯ÏʺڿÍ×éÖ¯KimsukyÒÉËÆÌᳫDEEP#DRIVEÍøÂç´¹ÂÚ¹¥»÷


2ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»³¡ÃûΪDEEP#DRIVEµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯×Ô2024Äê9ÔÂÆðÕë¶Ôº«¹úÆóÒµ¡¢Õþ¸®ÊµÌå¼°¼ÓÃÜÇ®±ÒÓû§Õö¿ª£¬£¬£¬£¬£¬£¬£¬£¬ÒÑÔì³ÉÊýǧÃûÊܺ¦Õß¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÒÉËÆ³¯ÏʺڿÍ×éÖ¯KimsukyÌᳫ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖ÷ҪĿµÄÊÇÍøÂ纫¹úʵÌåµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓú«Óï±àдµÄ¶¨ÖÆÍøÂç´¹ÂÚÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬£¬Î±×°³ÉÊÂÇéÈÕÖ¾¡¢°ü¹ÜÎļþºÍ¼ÓÃÜÏà¹ØÎļþµÈÕýµ±Îļþ£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýDropboxµÈƽ̨·Ö·¢£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÌӱܹŰåÇå¾²·ÀÓù¡£¡£¡£¡£¡£ÕâЩÓÕ¶üͨ³£ÒÔ.hwp¡¢.xlsxºÍ.pptxµÈÊÜÐÅÈεÄÎļþÃûÌ÷ºÆð£¬£¬£¬£¬£¬£¬£¬£¬È«ÐÄÉè¼ÆÒÔÎüÒýÄ¿µÄÊÜÖÚ¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔαװ³ÉÕýµ±ÎĵµµÄ.lnkÎļþ×îÏÈ£¬£¬£¬£¬£¬£¬£¬£¬Æô¶¯¶ñÒâPowerShell¾ç±¾µÄÖ´ÐУ¬£¬£¬£¬£¬£¬£¬£¬½ø¶øÏÂÔØÆäËûÓÐÓøºÔز¢½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃDropbox¾ÙÐÐÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓöàÖÖÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕߵĻù´¡ÉèÊ©¿´ËƶÌÔÝ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÆäÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÓëKimsuky×éÖ¯ºÜÊÇÏàËÆ¡£¡£¡£¡£¡£Securonix½¨Òé¶ÔÓû§¾ÙÐÐÍøÂç´¹ÂÚ½ÌÓý¡¢¼à¿Ø¶ñÒâÈí¼þÔÝ´æÄ¿Â¼ÒÔ¼°¿É¿¿µÄ¶ËµãÈÕÖ¾¼Í¼£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£¡£


https://hackread.com/n-korean-hackers-deep-drive-attacks-against-s-korea/


5. ºÚ¿ÍʹÓÃCVE-2025-0108Îó²î¹¥»÷PAN-OS·À»ðǽ


2ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃ×î½üÐÞ¸´µÄCVE-2025-0108Îó²î¶ÔPalo Alto NetworksµÄPAN-OS·À»ðǽÌᳫÁ˹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢Å²ÓÃPHP¾ç±¾£¬£¬£¬£¬£¬£¬£¬£¬Î£¼°ÏµÍ³µÄÍêÕûÐÔºÍÉñÃØÐÔ¡£¡£¡£¡£¡£Palo Alto NetworksÔÚ2ÔÂ12ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬£¬±Þ²ßÖÎÀíÔ±½«·À»ðǽÉý¼¶µ½Ö¸¶¨°æ±¾ÒÔ½â¾ö´ËÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ö¸³öPAN-OS 11.0ÒòÒÑ´ïʹÓÃÊÙÃü£¬£¬£¬£¬£¬£¬£¬£¬½«²»ÔÙÐû²¼ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¸ÃÎó²îÓÉAssetnoteµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÒѽÒÏþ°üÀ¨ÍêÕûÎó²îʹÓÃϸ½ÚµÄÎÄÕ¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²îÌáÈ¡Ãô¸ÐÊý¾Ý¡¢¼ìË÷ÉèÖûòʹÓÃÉèÖᣡ£¡£¡£¡£GreyNoiseƽ̨¼Í¼ÁËÕë¶ÔδÐÞ²¹·À»ðǽµÄ¹¥»÷ʵÑ飬£¬£¬£¬£¬£¬£¬£¬ÇÒ¿ÉÄÜÓжà¸öÍþвÐÐΪÕß¼ÓÈë¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý4400̨PAN-OS×°±¸µÄÖÎÀí½çÃæÔÚÏß̻¶¡£¡£¡£¡£¡£Îª·ÀÓù¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéÓ¦Óò¹¶¡²¢ÏÞÖÆ¶Ô·À»ðǽÖÎÀí½Ó¿ÚµÄ»á¼û¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/


6. CISA½«Apple iOS/iPadOS¼°Mitel SIPµç»°Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼


2ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Apple iOSºÍiPadOSµÄÊÚȨ¹ýʧÎó²î£¨CVE-2025-24200£©ÒÔ¼°Mitel SIPµç»°µÄ²ÎÊý×¢ÈëÎó²î£¨CVE-2024-41710£©Ìí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£Æ»¹û½ôÆÈÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁË¿ÉÄܱ»¡°¼«ÆäÖØ´ó¡±Õë¶ÔÐÔ¹¥»÷ʹÓõÄCVE-2025-24200Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìiPhone XS¼°¸üлúÐͺͶà¿îiPad£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚËø¶¨×°±¸ÉϽûÓÃUSBÏÞÖÆÄ£Ê½¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬£¬MitelÒ²Ðû²¼Á˹̼þ¸üнâ¾öÁËCVE-2024-41710Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìMitel 6800¡¢6900ºÍ6900wϵÁÐSIPµç»°£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õß¾ÙÐÐÏÂÁî×¢Èë¹¥»÷¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÑо¿·¢Ã÷»ùÓÚMiraiµÄ½©Ê¬ÍøÂçAquabotµÄбäÖÖÕë¶Ô±£´æ¸ÃÎó²îµÄMitel SIPµç»°¾ÙÐй¥»÷¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ5ÈÕǰÐÞ¸´ÕâЩÎó²î£¬£¬£¬£¬£¬£¬£¬£¬²¢½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£


https://securityaffairs.com/174246/security/u-s-cisa-adds-apple-ios-and-ipados-and-mitel-sip-phones-flaws-to-its-known-exploited-vulnerabilities-catalog.html