ÀÕË÷Èí¼þÍÅ»ïÔÚ BYOVD ¹¥»÷ÖÐʹÓà Paragon Partition Manager Îó²î

Ðû²¼Ê±¼ä 2025-03-03

1. ÀÕË÷Èí¼þÍÅ»ïÔÚ BYOVD ¹¥»÷ÖÐʹÓà Paragon Partition Manager Îó²î


3ÔÂ1ÈÕ £¬£¬£¬£¬Î¢Èí½üÆÚ·¢Ã÷ÁËParagon Partition ManagerÖеÄÎå¸öBioNTdrv.sysÇý¶¯³ÌÐòȱÏÝ £¬£¬£¬£¬ÆäÖÐÒ»¸öÒѱ»ÀÕË÷Èí¼þÍÅ»ïÔÚÁãÈÕ¹¥»÷ÖÐʹÓà £¬£¬£¬£¬ÒÔ»ñÈ¡WindowsϵͳµÄSYSTEMȨÏÞ¡£¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÓÚ¡°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò¡±£¨BYOVD£©¹¥»÷ £¬£¬£¬£¬¹¥»÷Õßͨ¹ý°²ÅÅÄÚºËÇý¶¯³ÌÐòÔÚÄ¿µÄϵͳÉÏÌáÉýȨÏÞ¡£¡£¡£¡£CERT/CCÖÒÑÔ³Æ £¬£¬£¬£¬¾ßÓÐ×°±¸ÍâµØ»á¼ûȨÏ޵Ĺ¥»÷ÕßÄÜʹÓÃÕâЩÎó²îÌáÉýȨÏÞ»òÒý·¢¾Ü¾øÐ§ÀÍ(DoS)¹¥»÷¡£¡£¡£¡£ÓÉÓÚÉæ¼°Î¢ÈíÊðÃûµÄÇý¶¯³ÌÐò £¬£¬£¬£¬×ÝȻδװÖÃParagon Partition Manager £¬£¬£¬£¬¹¥»÷ÕßÒ²ÄÜʹÓÃBYOVDÊÖÒÕ¡£¡£¡£¡£BioNTdrv.sys×÷ΪÄں˼¶Çý¶¯³ÌÐò £¬£¬£¬£¬Ê¹ÍþвÐÐΪÕßÄÜÈÆ¹ý±£»£»£» £»£»£»£»¤ºÍÇå¾²Èí¼þÖ´ÐÐÏÂÁî¡£¡£¡£¡£Î¢ÈíÒÑÊӲ쵽CVE-2025-0289Îó²î±»ÓÃÓÚBYOVDÀÕË÷Èí¼þ¹¥»÷ÖС£¡£¡£¡£Paragon SoftwareÒÑÐÞ²¹ÕâЩÎó²î £¬£¬£¬£¬Î¢ÈíÒ²½«Ò×Êܹ¥»÷µÄBioNTdrv.sys°æ±¾¼ÓÈë×èÖ¹Áбí¡£¡£¡£¡£½¨ÒéÓû§Éý¼¶µ½°üÀ¨½â¾öËùÓÐȱÏݵÄBioNTdrv.sys°æ±¾2.0.0µÄ×îÐÂÈí¼þ°æ±¾¡£¡£¡£¡£µ«Ðè×¢ÖØ £¬£¬£¬£¬Î´×°ÖÃParagon Partition ManagerµÄÓû§Ò²¿ÉÄÜÊܵ½¹¥»÷ £¬£¬£¬£¬ÓÉÓÚBYOVDÕ½ÂÔ²»ÒÀÀµÓÚÄ¿µÄÈí¼þ¡£¡£¡£¡£Î¢ÈíÒѸüÐÂÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò×èÖ¹ÁÐ±í £¬£¬£¬£¬Óû§Ó¦Ñé֤ϵͳ±£»£»£» £»£»£»£»¤ÊÇ·ñÆôÓᣡ£¡£¡£Paragon Software»¹ÖÒÑÔÓû§Éý¼¶Paragon Hard Disk Manager £¬£¬£¬£¬ÒòËüʹÓÃÏàͬÇý¶¯³ÌÐò¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-gangs-exploit-paragon-partition-manager-bug-in-byovd-attacks/


2. ÷è÷ëÀÕË÷Èí¼þÍÅ»ïÍþвLee Enterprises £¬£¬£¬£¬Éù³Æ½«¹ûÕæ350GBÇÔÈ¡Êý¾Ý


2ÔÂ28ÈÕ £¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô2ÔÂ3ÈÕÕë¶ÔÃÀ¹úýÌ幫˾Lee EnterprisesµÄÍøÂç¹¥»÷ÈÏÕæ £¬£¬£¬£¬´Ë´Î¹¥»÷µ¼Ö¸ù«Ë¾ÔËÓªÖÐÖ¹ £¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË×ܼÆ350GBµÄ120,000¸öÎļþ £¬£¬£¬£¬°üÀ¨Õþ¸®Éí·Ý֤ɨÃè¼þ¡¢±£ÃÜЭÒé¡¢²ÆÎñµç×Ó±í¸ñµÈÉñÃØÎļþ¡£¡£¡£¡£Lee EnterprisesÒÑÈ·ÈÏÊÕµ½ÕâЩָ¿Ø²¢ÕýÔÚÊӲ졣¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÍÅ»ïÍþв³Æ £¬£¬£¬£¬³ý·ÇÖ§¸¶Êê½ð £¬£¬£¬£¬²»È»½«ÓÚ3ÔÂ5ÈÕ¹ûÕæËùÓоݳƱ»µÁµÄÊý¾Ý¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×Ô2022ÄêÍÆ³öÒÔÀ´ £¬£¬£¬£¬ÒÑÈ¡µÃÁËÏÔÖøÏ£Íû £¬£¬£¬£¬²¢ÔÚÊÖÒÕ·½ÃæÒ»Ö±Ñݽø £¬£¬£¬£¬ÍƳöÁËLinux±äÌå¡¢×Ô½ç˵Chromeƾ֤ÇÔÈ¡³ÌÐòÒÔ¼°»ùÓÚRustµÄÊý¾Ý´¢Îï¹ñµÈ¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬Î¢Èí±¨¸æ³Æ £¬£¬£¬£¬¡°É¢²¼Ö©Ö롱ºÚ¿Í¼¯ÍųÉÔ±Ò²×îÏÈʹÓÃ÷è÷ëÀÕË÷Èí¼þ¾ÙÐй¥»÷¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÌáÐÑÆóÒµºÍСÎÒ˽¼ÒÔöÇ¿ÍøÂçÇå¾²·À»¤ £¬£¬£¬£¬Ìá·ÀÀÕË÷Èí¼þµÈÍøÂçÍþв¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/


3. Skype½«ÓÚ5ÔÂ¹Ø±Õ £¬£¬£¬£¬Î¢ÈíÍÆ¶¯Óû§Ç¨áãÖÁTeams


2ÔÂ28ÈÕ £¬£¬£¬£¬Î¢ÈíÒÑÈ·ÈÏ £¬£¬£¬£¬ÆäÊÓÆµÍ¨»°ºÍÐÂÎÅЧÀÍSkype½«ÓÚ2025Äê5ÔÂ5ÈÕÏÂÏß¡£¡£¡£¡£Skype×Ô2011Ä걻΢ÈíÊÕ¹ºÒÔÀ´ £¬£¬£¬£¬Ò»Ö±×÷Ϊ¸Ã¹«Ë¾µÄÖ÷ҪͨѶ¹¤¾ß £¬£¬£¬£¬µ«ÏÖÔÚ΢ÈíÕýÍÆ¶¯Óû§Ç¨áãµ½ÆäÃæÏòÏûºÄÕßµÄÃâ·ÑTeamsÓ¦ÓóÌÐò¡£¡£¡£¡£¾ÝBleepingComputer±¨µÀ £¬£¬£¬£¬WindowsºÍMac°æµÄSkypeÔ¤ÀÀ°æÖÐÒÑ·ºÆðÌáÐÑÓû§Çл»µ½TeamsµÄ×Ö·û´® £¬£¬£¬£¬Ò»µ©Óû§µÇ¼ÕÊ»§ £¬£¬£¬£¬ËûÃǵÄËùÓÐÁªÏµÈË¡¢Í¨»°¼Í¼ºÍÐÂÎŶ¼»á×Ô¶¯Ç¨áã¡£¡£¡£¡£ÈôÊÇÓû§²»ÏëÇл»µ½Teams £¬£¬£¬£¬ËûÃÇ¿ÉÒÔµ¼³ö̸Ìì¼Í¼ºÍÐÂÎÅÖзÖÏíµÄͼÏñ¡£¡£¡£¡£Î¢ÈíÌåÏÖ £¬£¬£¬£¬ÔÚ¹ý¶Éʱ´ú £¬£¬£¬£¬TeamsÓû§¿ÉÒÔÓëSkypeÓû§Í¨»°ºÍ̸Ìì¡£¡£¡£¡£Ëæ×ÅSkypeµÄ¹Ø±Õ £¬£¬£¬£¬Î¢Èí½«×èÖ¹Ìṩ¸¶·ÑSkype¹¦Ð§ £¬£¬£¬£¬°üÀ¨SkypeµãÊýºÍÓïÒôͨ»°¡£¡£¡£¡£Î¢Èí365Э×÷Ó¦ÓÃÓëÆ½Ì¨×ܲÃJeff TeperÌåÏÖ £¬£¬£¬£¬Ê¹ÓÃTeams £¬£¬£¬£¬Óû§¿ÉÒÔ»á¼ûSkypeÖеÄÐí¶à½¹µã¹¦Ð§ £¬£¬£¬£¬²¢»ñµÃ¸ü¶àÔöÇ¿¹¦Ð§¡£¡£¡£¡£Skype×î³õÓÚ2003ÄêÐû²¼ £¬£¬£¬£¬ÌìÌìÓÐÁè¼Ý3600ÍòÈËʹÓÃËü¾ÙÐе绰ºÍ̸ÌìÁªÏµ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-its-killing-off-skype-in-may-after-14-years/


4. ´óÐÍÓïÑÔÄ£×ÓѵÁ·Êý¾Ý¼¯ÖоªÏÖÍòÓàʵʱÉñÃØ


2ÔÂ28ÈÕ £¬£¬£¬£¬½üÆÚ £¬£¬£¬£¬ÓÃÓÚѵÁ·´óÐÍÓïÑÔÄ£×Ó£¨LLM£©µÄÊý¾Ý¼¯±»·¢Ã÷°üÀ¨½ü12,000¸ö¿ÉÓÃÓÚÉí·ÝÑéÖ¤µÄʵʱÉñÃØ £¬£¬£¬£¬ÕâÔÙ´Î͹ÏÔÁËÓ²±àÂëÆ¾Ö¤µÄÇ徲Σº¦¡£¡£¡£¡£Truffle Security´ÓCommon CrawlµÄÖØ´óÊý¾Ý¼¯Öз¢Ã÷ÁËÕâЩÉñÃØ £¬£¬£¬£¬¸ÃÊý¾Ý¼¯°üÀ¨18ÄêÀ´Áè¼Ý2500ÒÚ¸öÒ³Ãæ¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬Lasso SecurityÔøÖÒÑÔ £¬£¬£¬£¬Í¨¹ý¹«¹²Ô´´úÂë´æ´¢¿âй¶µÄÊý¾Ý¿Éͨ¹ýAI̸Ìì»úеÈË»á¼û £¬£¬£¬£¬×ÝÈ»ÒÑÉèΪ˽ÓÐ £¬£¬£¬£¬ÕâÖÖ¹¥»÷ÒªÁì·¢Ã÷Á˶à¸ö×ÅÃû×éÖ¯µÄ´æ´¢¿â̻¶ÁË˽ÈËÁîÅÆºÍÃÜÔ¿¡£¡£¡£¡£ÐÂÑо¿Åú×¢ £¬£¬£¬£¬¶Ô²»Çå¾²´úÂëʾÀý¾ÙÐÐAIÓïÑÔÄ£×Ó΢µ÷¿ÉÄܵ¼ÖÂÒâÍâÓк¦ÐÐΪ £¬£¬£¬£¬³ÆÎªÍ»·¢´íλ¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö £¬£¬£¬£¬Ä£×Ó¾­ÓÉ΢µ÷ºó £¬£¬£¬£¬¿ÉÒÔÔÚ²»Í¸Â¶µÄÇéÐÎÏÂÊä³ö²»Çå¾²µÄ´úÂë £¬£¬£¬£¬²¢Óë±àÂëÎÞ¹ØµÄÆÕ±éÌáÐÑÉÏÌåÏַׯçÖ¡£¡£¡£¡£ÕâÖÖ¶Ô¿¹ÐÔ¹¥»÷±»³ÆÎª¼´Ê±×¢Èë £¬£¬£¬£¬¿Éµ¼ÖÂLLMÔÚ²»ÖªÇéµÄÇéÐÎÏÂÌìÉú±»Õ¥È¡µÄÄÚÈÝ¡£¡£¡£¡£Palo Alto Networks Unit 42µÄÊӲ췢Ã÷ £¬£¬£¬£¬ËùÓÐÊÓ²ìµÄGenAIÍøÂç²úÆ·¶¼±£´æÒ»¶¨Ë®Æ½µÄÒ×±»Ô½ÓüµÄΣº¦¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬´óÐÍÍÆÀíÄ£×ÓµÄ˼Ð÷Á´ÖÐÐÄÍÆÀí¿ÉÄÜ»á±»Ð®ÖÆ £¬£¬£¬£¬¶ø¡°logit bias¡±²ÎÊýµÄ²»µ±µ÷½âÒ²¿ÉÄܵ¼ÖÂÄ£×Ó±¬·¢²»Êʵ±»òÓꦵÄÄÚÈÝ¡£¡£¡£¡£ÕâЩ·¢Ã÷Ç¿µ÷ÁËÔöÇ¿AIÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£¡£¡£¡£


https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html


5. ÃÀÕþ¸®ÀÖ³É×·»ØUranium Finance±»µÁ3100ÍòÃÀÔª¼ÓÃÜÇ®±Ò


2ÔÂ28ÈÕ £¬£¬£¬£¬2021Äê4Ô £¬£¬£¬£¬»ùÓÚ±Ò°²ÖÇÄÜÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Ð­ÒéUranium FinanceÉÏÏߺ󲻾ñãÔâÓöÁËÁ½´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£¡£¸Ãƽ̨×÷Ϊ×Ô¶¯×öÊÐÉÌ£¨AMM£©ÔË×÷ £¬£¬£¬£¬ÀàËÆÓÚUniswap¡£¡£¡£¡£ºÚ¿ÍʹÓÃÖÇÄܺÏÔ¼ÖеÄÎó²î £¬£¬£¬£¬ÔÚÁ½´Î¹¥»÷Öл®·ÖµÁ×ßÁË140ÍòÃÀÔªºÍ5200ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò £¬£¬£¬£¬×ܼÆÔì³ÉÁè¼Ý5370ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£Ö»¹ÜºÚ¿ÍÔÚµÚÒ»´Î¹¥»÷ºóËÍ»¹Á˲¿·Ö×ʽ𠣬£¬£¬£¬µ«ÈÔÁôÏÂÁË385,500ÃÀÔª £¬£¬£¬£¬²¢Í¨¹ýTornado Cash¾ÙÐÐÁËÏ´Ç®¡£¡£¡£¡£ÕâЩ±»µÁ×ʽðͨÒÑÍùÖÐÐÄ»¯ÉúÒâËùת»»³ÉÁËÖÖÖÖ¼ÓÃÜÇ®±Ò £¬£¬£¬£¬²¢´æ·ÅÔÚÏÐÖÃÇ®°üÖжàÄê¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬ÔÚÇø¿éÁ´Ç鱨¹«Ë¾TRM LabsµÄЭÖúÏ £¬£¬£¬£¬Å¦Ô¼ÄÏÇø£¨SDNY£©ºÍÁìÍÁÇå¾²ÊÓ²ì¾Ö£¨HSI£©Ê¥µØÑǸç·Ö¾ÖÀÖ³É×·×Ù²¢×·»ØÁ˲¿·Ö±»µÁ×ʲú¡£¡£¡£¡£TRM LabsÓëÖ´·¨²¿·ÖÇ×½üÏàÖú £¬£¬£¬£¬Ï꾡׷×ÙÁ˶à¸öÇø¿éÁ´Öб»µÁ×ʲúµÄÁ÷¶¯ÇéÐÎ £¬£¬£¬£¬²¢ÌṩÁ˿ɲÙ×÷µÄÇ鱨¡£¡£¡£¡£×îÖÕ £¬£¬£¬£¬Ö´·¨²¿·ÖÓÚ2025Äê2ÔÂÀֳɿÛѺÁË3100ÍòÃÀÔªµÄδËÍ»¹×ʽ𠣬£¬£¬£¬Áè¼ÝÁËÒ»°ëµÄËðʧµÃÒÔÍì»Ø¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬Å¦Ô¼ÖÝÄÏÇø¾¯Ô±¾ÖÕýÒªÇóºÚ¿Í¹¥»÷µÄÊܺ¦Õß·¢Ë͵ç×ÓÓʼþÒÔÁìÈ¡²¿·Ö±»×·»ØµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/


6. ÍøÂç´¹ÂڻʹÓÃÐéαCAPTCHAÈö²¥Lumma Stealer¶ñÒâÈí¼þ


2ÔÂ28ÈÕ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±½ÒÆÆÁËÒ»³¡´ó¹æÄ£ÍøÂç´¹Âڻ £¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÍйÜÔÚWebflow CDNÉϵÄPDFÎĵµ £¬£¬£¬£¬Í¨¹ýÐéαµÄCAPTCHAͼÏñÈö²¥Lumma Stealer¶ñÒâÈí¼þ¡£¡£¡£¡£Netskope Threat Labs·¢Ã÷Áè¼Ý260¸öÓòÃûÍйÜÁË5000¸ö´¹ÂÚPDFÎļþ £¬£¬£¬£¬ÕâЩÎļþ½«Êܺ¦ÕßÖØ¶¨ÏòÖÁ¶ñÒâÍøÕ¾¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃSEOÓÕÆ­Êܺ¦Õßµã»÷¶ñÒâËÑË÷Ч¹û £¬£¬£¬£¬²¢Í¨¹ýÔÚÏßͼÊé¹ÝºÍPDF´æ´¢¿âÉÏ´«PDFÎļþÒÔÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£ÕâЩPDF°üÀ¨Î±ÔìµÄCAPTCHA £¬£¬£¬£¬ÓÕÆ­Êܺ¦ÕßÖ´ÐжñÒâPowerShellÏÂÁî £¬£¬£¬£¬×îÖÕµ¼ÖÂLumma StealerµÄ×°Öᣡ£¡£¡£×Ô2024ÄêϰëÄêÒÔÀ´ £¬£¬£¬£¬¸Ã»î¶¯ÒÑÓ°Ïì1150¶à¸ö×éÖ¯ºÍ7000¶àÃûÓû§ £¬£¬£¬£¬Ö÷Òª¼¯ÖÐÔÚ±±ÃÀ¡¢ÑÇÖÞºÍÄÏÅ·¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬Lumma StealerÈÕÖ¾ÔÚÒ»¸öкڿÍÂÛ̳Leaky[.]proÉÏÃâ·Ñ¹²Ïí £¬£¬£¬£¬Åú×¢¸Ã¶ñÒâÈí¼þÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ä£Ê½³öÊÛ £¬£¬£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´ÓÊÜѬȾWindowsÖ÷»úÖлñÈ¡´ó×ÚÐÅÏ¢µÄÒªÁì¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçVidarºÍAtomic macOS StealerÒ²½ÓÄÉÀàËÆÒªÁìÈö²¥ £¬£¬£¬£¬ÍøÂç´¹ÂÚ¹¥»÷»¹ÀÄÓÃÁËÒ»ÖÖеÄJavaScript»ìÏýÊÖÒÕ¡£¡£¡£¡£ÕâЩ¹¥»÷¸ß¶È¸öÐÔ»¯ £¬£¬£¬£¬°üÀ¨·Ç¹ûÕæÐÅÏ¢ £¬£¬£¬£¬²¢ÊµÑéͨ¹ýÖØ¶¨ÏòÖÁÁ¼ÐÔÍøÕ¾À´ÖÐÖ¹¹¥»÷ £¬£¬£¬£¬ÔöÌíÁËÆäÒþ²ØÐÔºÍÖØ´óÐÔ¡£¡£¡£¡£


https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html