Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯
Ðû²¼Ê±¼ä 2025-02-241. Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯
2ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËù Bybit ½üÆÚÔâÊÜÁËÒ»´Îب¹ÅδÓеÄÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼Ö¼ÛÖµÔ¼ 15 ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ£¬£¬£¬£¬£¬£¬£¬³ÉΪʷÉÏ×î´óµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýʹÓÃÊðÃû½çÃæ£¬£¬£¬£¬£¬£¬£¬½« Bybit µÄ ETH ÀäÇ®°üÖеÄ×ʽðÖØ¶¨Ïòµ½Î´ÖªµØµã¡£¡£¡£¡£¡£¡£Ö»¹Ü Bybit µÄÇå¾²ÍŶÓÕýÔÚÓëÇø¿éÁ´È¡Ö¤×¨¼ÒºÍÏàÖúͬ°éÆð¾¢ÊÓ²ì´ËÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«ÉÐδ͸¶ÏêϸµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¾ÝÍÆ²â£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÁË Safe.global ƽ̨Óû§½çÃæÖеÄÎó²î¡£¡£¡£¡£¡£¡£Bybit Ê×ϯִÐйÙÏò¿Í»§°ü¹Ü£¬£¬£¬£¬£¬£¬£¬×ÝÈ»±»µÁ×ʽðÎÞ·¨×·»Ø£¬£¬£¬£¬£¬£¬£¬ÉúÒâËùÒ²½«¼á³Ö³¥¸¶ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬²¢½«ÔÚÐëҪʱʹÓùýÇÅ´û¿îÈ·±£Óû§×ʽð¿ÉÓᣡ£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Bybit Ç¿µ÷ËùÓÐÆäËûÀäÇ®°ü¾ùÇå¾²ÎÞÓÝ£¬£¬£¬£¬£¬£¬£¬ÔËÓª²»»áÖÐÖ¹¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ Elliptic ºÍ Arkham Intelligence ¾ù½«´Ë´Î¹¥»÷¹é×ïÓÚÓ볯ÏÊÓÐ¹ØµÄ Lazarus APT ¼¯ÍÅ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÔʹÓÃ×Ô½ç˵¶ñÒâÈí¼þ¾ÙÐÐÖØ´ó¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬£¬£¬²¢ÉæÏÓ¶àÆðÕë¶ÔÒøÐкͼÓÃÜÇ®±ÒÉúÒâËùµÄ¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£Ö»¹Ü Bybit ÉÐδÕýʽȷÈϺڿÍÉí·Ý£¬£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁ˼ÓÃÜÇ®±ÒÁìÓòÃæÁÙµÄÇå¾²ÌôÕ½¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/174514/cyber-crime/lazarus-stole-1-5b-from-bybit-cryptocurrency-heist.html
2. PayPalÐÂÐ͵ç×ÓÓʼþÕ©Æ£ºÊ¹ÓõصãÉèÖÃÓÕÆÔ¶³Ì»á¼ûȨÏÞ
2ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖʹÓÃPayPalµç×ÓÓʼþµØµãÉèÖù¦Ð§µÄÕ©ÆÊÖ¶ÎÕýÔÚÊ¢ÐС£¡£¡£¡£¡£¡£Õ©ÆÕßͨ¹ýÏòPayPalÕË»§Ìí¼Ó°üÀ¨ÐéαMacBook¹ºÖÃÈ·ÈÏÐÅÏ¢µÄеص㣬£¬£¬£¬£¬£¬£¬´¥·¢PayPal·¢ËÍÈ·ÈÏÓʼþ¡£¡£¡£¡£¡£¡£ÕâЩ¿´ËÆÕýµ±µÄÓʼþÓÉ¡°service@paypal.com¡±·¢ËÍ£¬£¬£¬£¬£¬£¬£¬ÓÕÆÓû§²¦´òթƵ绰ºÅÂë¡£¡£¡£¡£¡£¡£Ò»µ©Óû§²¦´ò£¬£¬£¬£¬£¬£¬£¬Õ©ÆÕß»áÉù³ÆÕË»§±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐÐÌØ¶¨Èí¼þÒÔ»ñȡԶ³Ì»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÕâЩÓʼþÏÖʵÉÏÊÇ·¢Ë͸øÓëÕ©ÆÕß¹ØÁªµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬¸ÃµØµã»á×Ô¶¯½«Óʼþת·¢¸øÓʼþÁбíÖеÄËùÓгÉÔ±£¬£¬£¬£¬£¬£¬£¬¼´Õ©ÆÄ¿µÄ¡£¡£¡£¡£¡£¡£ÓÉÓÚPayPal²»ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬£¬£¬£¬£¬Õ©ÆÕßÄܹ»×¢ÈëÕ©ÆÐÅÏ¢¡£¡£¡£¡£¡£¡£ÎªÁËÌá·À´ËÀàÕ©Æ£¬£¬£¬£¬£¬£¬£¬Óû§Ó¦ºöÂÔ°üÀ¨Ðéα¹ºÖÃÈ·ÈϵÄPayPalÓʼþ£¬£¬£¬£¬£¬£¬£¬²¢²»Òª²¦´òÆäÖÐÌṩµÄµç»°ºÅÂë¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬PayPalÐèÒª½ÓÄɲ½·¥ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâ´ËÀàÕ©ÆÐÐΪµÄ±¬·¢¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/
3. CS2½ÇÖð³ÉÕ©ÆÐ°г¡£¡£¡£¡£¡£¡£ºÓÎÏ·Íæ¼ÒÐèСÐÄSteamÕÊ»§±»µÁΣº¦
2ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓ÷´¿Ö¾«Ó¢ 2 (CS2) µÄ´óÐͽÇÖ𣬣¬£¬£¬£¬£¬£¬ÈçIEM¿¨ÍÐά×È2025ºÍPGL¿Ë¬ÈÕ-Äɲ¨¿¨2025£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÓÎÏ·Íæ¼ÒʵÑéÕ©Æ£¬£¬£¬£¬£¬£¬£¬ÒâͼÇÔÈ¡ËûÃǵÄSteamÕÊ»§ºÍ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£Ö»¹ÜCS2ÒÑÍÆ³ö¶àÄ꣬£¬£¬£¬£¬£¬£¬µ«ÆäÍæ¼ÒÉçÇøºÍÖ°Òµ¾ºÈüÃûÌÃÒÀÈ»ÖØ´óÇÒ»îÔ¾¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬£¬CS2ÔÚSteamÉϵÄͬʱÔÚÏßÍæ¼ÒÊýÄ¿µÖ´ïÁËеÄá¯Áë¡£¡£¡£¡£¡£¡£Bitdefender Labs·¢Ã÷ÁËÒ»ÏîÃûΪ¡°Streamjacking¡±µÄ¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬£¬Õ©ÆÕßͨ¹ýð³ä×ÅÃûCS2Íæ¼Ò£¬£¬£¬£¬£¬£¬£¬ÔÚYouTubeÖ±²¥ÖÐÐû´«Ã°³äµÄƤ·ôºÍ¼ÓÃÜÇ®±ÒÔùÆ·¡£¡£¡£¡£¡£¡£ËûÃÇʹÓñ»Ð®ÖƵÄÕýµ±YouTubeÕÊ»§£¬£¬£¬£¬£¬£¬£¬²¢Ñ»·²¥·Å¾ÉµÄÓÎÏ·»ÃæÒÔÓªÔìÖ±²¥Æø·Õ¡£¡£¡£¡£¡£¡£ÕâЩÊÓÆµÖеĶþάÂë»òÁ´½Ó»á½«¹ÛÖÚµ¼Ïò¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬£¬£¬ÒªÇóËûÃÇʹÓÃSteamÕÊ»§µÇ¼ÒÔÁìÈ¡ÀñÎï»ò·¢ËͼÓÃÜÇ®±ÒÒÔ»ñÈ¡¸ß¶î»Ø±¨¡£¡£¡£¡£¡£¡£Ò»µ©µÇ¼£¬£¬£¬£¬£¬£¬£¬Êܺ¦Õ߾ͻáÔÚ²»ÖªÇéµÄÇéÐÎÏÂÊÚÓèÕ©ÆÕß»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÓмÛÖµµÄƤ·ôºÍÎïÆ·±»µÁ£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÒ²»á±»Á¬Ã¦×ªÒÆÖÁÕ©ÆÕß¿ØÖƵÄÇ®°ü¡£¡£¡£¡£¡£¡£ÓÎÏ·Íæ¼ÒÓ¦¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬ºËʵÓë¹Ù·½µç×Ó¾º¼¼×éÖ¯µÄ¹ØÏµ£¬£¬£¬£¬£¬£¬£¬²¢¼¤»î¶àÖØÉí·ÝÑéÖ¤¡¢ÆôÓÃSteam GuardÒÆÆôº½·ÝÑéÖ¤Æ÷ÒÔ¼°°´ÆÚ¼ì²éµÇ¼»î¶¯¡£¡£¡£¡£¡£¡£ÔÚYouTubeÉÏ£¬£¬£¬£¬£¬£¬£¬Ö»Ô¢Ä¿¹Ù·½Ö°ÒµÇòÔ±ÕÊ»§µÄÊÓÆµ£¬£¬£¬£¬£¬£¬£¬²¢¶ÔÆäËûƵµÀÉϵÄÖ±²¥¼á³ÖÏÓÒÉ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-cs2-tournament-streams-used-to-steal-crypto-steam-accounts/
4. SpyLend Android ¶ñÒâÈí¼þÔÚ Google Play ±»ÏÂÔØÁ˳¬ 10 Íò´Î
2ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»¿îÃûΪSpyLend£¨ÓÖ³ÆFinance Simplified£©µÄAndroid¶ñÒâÈí¼þÓ¦ÓóÌÐòÔÚGoogle PlayÉϱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬£¬£¬£¬£¬£¬Ëüαװ³É½ðÈÚ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÊµÔòÕë¶ÔÓ¡¶ÈÓû§ÊµÑéÂÓ¶áÐÔ´û¿î¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÊôÓÚSpyLoan¶ñÒâÈí¼þ×飬£¬£¬£¬£¬£¬£¬Í¨¹ýÇëÇó¹ý¶àȨÏÞÇÔÈ¡Óû§Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÈçÁªÏµÈË¡¢Í¨»°¼Í¼¡¢¶ÌÐÅ¡¢ÕÕÆ¬¡¢×°±¸Î»Öõȡ£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý±»ÓÃÓÚɧÈÅ¡¢Ú²ÆºÍÀÕË÷Óû§£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊǵ±Óû§Î´ÄÜÖª×㻹¿îÌõ¿îʱ¡£¡£¡£¡£¡£¡£¸ÃÓ¦Óû¹Éù³ÆÊÇ×¢²áµÄ·ÇÒøÐнðÈÚ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬µ«ÊµÔò²»È»¡£¡£¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬£¬£¬Ëü¼ÓÔØWebView½«Óû§Öض¨Ïòµ½Íâ²¿ÍøÕ¾ÏÂÔØ´û¿îÓ¦ÓÃAPK¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»î¶¯×¨ÃÅÕë¶ÔÓ¡¶ÈÓû§£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡°üÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵĶàÖÖÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÚ²ÆÀÕË÷»ò½ðÈÚڲơ£¡£¡£¡£¡£¡£Ö»¹Ü¸ÃÓ¦ÓÃÒÑ´ÓGoogle PlayÒÆ³ý£¬£¬£¬£¬£¬£¬£¬µ«ÈÔ¿ÉÄܼÌÐøÔËÐв¢ÍøÂçÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÈôÏÓÒÉ×°±¸±»Ñ¬È¾£¬£¬£¬£¬£¬£¬£¬ÇëÁ¬Ã¦É¾³ýÏà¹ØÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÖØÖÃȨÏÞ£¬£¬£¬£¬£¬£¬£¬¸ü¸ÄÃÜÂ룬£¬£¬£¬£¬£¬£¬²¢Ö´ÐÐ×°±¸É¨Ãè¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬È·±£GoogleµÄPlay Protect¹¤¾ß´¦Óڻ״̬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼ì²â²¢×èÖ¹¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/
5. CISA½«Craft CMS¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209¼ÓÈëKEVĿ¼
2ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCraftÄÚÈÝÖÎÀíϵͳ£¨CMS£©µÄ¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.1£¬£¬£¬£¬£¬£¬£¬Ó°ÏìCraft CMS°æ±¾4ºÍ5£¬£¬£¬£¬£¬£¬£¬ÏêϸΪ°æ±¾¹æÄ£ÔÚ>= 4.0.0-RC1, < 4.13.8ºÍ>= 5.0.0-RC1, < 5.5.5Ö®¼ä¡£¡£¡£¡£¡£¡£CISAÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÒ×Êܹ¥»÷µÄ°æ±¾ÒѾΣ¼°Óû§Çå¾²ÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬Craft CMS±£´æ´úÂë×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÏîĿά»¤Ö°Ô±ÒÑÔÚ2024Äê12ÔÂÏÂÑ®Ðû²¼µÄ°æ±¾4.13.8ºÍ5.5.8Öнâ¾öÁ˸ÃÎó²î¡£¡£¡£¡£¡£¡£Craft CMSÔÚGitHubÉÏÐû²¼µÄͨ¸æÖÐÌáµ½£¬£¬£¬£¬£¬£¬£¬ËùÓÐδÐÞ²¹ÇÒÇå¾²ÃÜÔ¿±»Ð¹Â¶µÄ°æ±¾¶¼»áÊܵ½¸ÃÇ徲ȱÏݵÄÓ°Ï죬£¬£¬£¬£¬£¬£¬²¢½¨ÒéÎÞ·¨¸üе½ÐÞ²¹°æ±¾µÄÓû§ÂÖ»»Çå¾²ÃÜÔ¿²¢È·±£ÆäÒþ˽ÒÔ»º½âÎÊÌâ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»½¨ÒéÔÚ2025Äê3ÔÂ13ÈÕ֮ǰӦÓÃÐëÒªµÄÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html
6. CISA½«Microsoft Power PagesÎó²îCVE-2025-24989¼ÓÈëKEVĿ¼
2ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Microsoft Power PagesµÄÒ»¸ö¸ßÑÏÖØÐÔÎó²î£¨±àºÅΪCVE-2025-24989£¬£¬£¬£¬£¬£¬£¬CVSS·ÖÊýΪ8.2£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£¡£¸ÃÎó²îÊôÓÚ²»µ±»á¼û¿ØÖÆÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾ÊÚȨµÄ¹¥»÷Õßͨ¹ýÍøÂçÌáÉýȨÏÞ£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÈÆ¹ýÓû§×¢²á¿ØÖÆ¡£¡£¡£¡£¡£¡£´ËÎó²îÓÉ΢ÈíµÄRaj Kumar±¨¸æ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÒÑÈ·ÈÏ´ËÎó²îÕýÔÚ±»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËͨ¸æÍ¨ÖªÊÜÓ°ÏìµÄ¿Í»§¼ì²éÍøÕ¾²¢½ÓÄÉÕûÀí²½·¥¡£¡£¡£¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ×èÖ¹ÈÕÆÚǰ½â¾öÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ21ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬£¬Í¬Ê±×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔ½µµÍÇ徲Σº¦¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/174541/hacking/u-s-cisa-adds-microsoft-power-pages-flaw-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ