Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬ £¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯

Ðû²¼Ê±¼ä 2025-02-24

1. Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬ £¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯


2ÔÂ23ÈÕ£¬£¬£¬ £¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËù Bybit ½üÆÚÔâÊÜÁËÒ»´Îب¹ÅδÓеÄÖØ´óÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬µ¼Ö¼ÛÖµÔ¼ 15 ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ£¬£¬£¬ £¬£¬£¬³ÉΪʷÉÏ×î´óµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸¡£¡£¡£¡£ ¡£¡£¹¥»÷Õßͨ¹ýʹÓÃÊðÃû½çÃæ£¬£¬£¬ £¬£¬£¬½« Bybit µÄ ETH ÀäÇ®°üÖеÄ×ʽðÖØ¶¨Ïòµ½Î´ÖªµØµã¡£¡£¡£¡£ ¡£¡£Ö»¹Ü Bybit µÄÇå¾²ÍŶÓÕýÔÚÓëÇø¿éÁ´È¡Ö¤×¨¼ÒºÍÏàÖúͬ°éÆð¾¢ÊÓ²ì´ËÊÂÎñ£¬£¬£¬ £¬£¬£¬µ«ÉÐδ͸¶ÏêϸµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£ ¡£¡£¾ÝÍÆ²â£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÁË Safe.global ƽ̨Óû§½çÃæÖеÄÎó²î¡£¡£¡£¡£ ¡£¡£Bybit Ê×ϯִÐйÙÏò¿Í»§°ü¹Ü£¬£¬£¬ £¬£¬£¬×ÝÈ»±»µÁ×ʽðÎÞ·¨×·»Ø£¬£¬£¬ £¬£¬£¬ÉúÒâËùÒ²½«¼á³Ö³¥¸¶ÄÜÁ¦£¬£¬£¬ £¬£¬£¬²¢½«ÔÚÐëҪʱʹÓùýÇÅ´û¿îÈ·±£Óû§×ʽð¿ÉÓᣡ£¡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬ £¬£¬£¬Bybit Ç¿µ÷ËùÓÐÆäËûÀäÇ®°ü¾ùÇå¾²ÎÞÓÝ£¬£¬£¬ £¬£¬£¬ÔËÓª²»»áÖÐÖ¹¡£¡£¡£¡£ ¡£¡£ÍøÂçÇå¾²¹«Ë¾ Elliptic ºÍ Arkham Intelligence ¾ù½«´Ë´Î¹¥»÷¹é×ïÓÚÓ볯ÏÊÓÐ¹ØµÄ Lazarus APT ¼¯ÍÅ£¬£¬£¬ £¬£¬£¬¸Ã×éÖ¯ÒÔʹÓÃ×Ô½ç˵¶ñÒâÈí¼þ¾ÙÐÐÖØ´ó¹¥»÷¶øÖøÃû£¬£¬£¬ £¬£¬£¬²¢ÉæÏÓ¶àÆðÕë¶ÔÒøÐкͼÓÃÜÇ®±ÒÉúÒâËùµÄ¹¥»÷ÊÂÎñ¡£¡£¡£¡£ ¡£¡£Ö»¹Ü Bybit ÉÐδÕýʽȷÈϺڿÍÉí·Ý£¬£¬£¬ £¬£¬£¬µ«´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁ˼ÓÃÜÇ®±ÒÁìÓòÃæÁÙµÄÇå¾²ÌôÕ½¡£¡£¡£¡£ ¡£¡£


https://securityaffairs.com/174514/cyber-crime/lazarus-stole-1-5b-from-bybit-cryptocurrency-heist.html


2. PayPalÐÂÐ͵ç×ÓÓʼþÕ©Æ­£ºÊ¹ÓõصãÉèÖÃÓÕÆ­Ô¶³Ì»á¼ûȨÏÞ


2ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬½üÆÚ£¬£¬£¬ £¬£¬£¬Ò»ÖÖʹÓÃPayPalµç×ÓÓʼþµØµãÉèÖù¦Ð§µÄÕ©Æ­ÊÖ¶ÎÕýÔÚÊ¢ÐС£¡£¡£¡£ ¡£¡£Õ©Æ­Õßͨ¹ýÏòPayPalÕË»§Ìí¼Ó°üÀ¨ÐéαMacBook¹ºÖÃÈ·ÈÏÐÅÏ¢µÄеص㣬£¬£¬ £¬£¬£¬´¥·¢PayPal·¢ËÍÈ·ÈÏÓʼþ¡£¡£¡£¡£ ¡£¡£ÕâЩ¿´ËÆÕýµ±µÄÓʼþÓÉ¡°service@paypal.com¡±·¢ËÍ£¬£¬£¬ £¬£¬£¬ÓÕÆ­Óû§²¦´òÕ©Æ­µç»°ºÅÂë¡£¡£¡£¡£ ¡£¡£Ò»µ©Óû§²¦´ò£¬£¬£¬ £¬£¬£¬Õ©Æ­Õß»áÉù³ÆÕË»§±»ºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬£¬²¢ÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐÐÌØ¶¨Èí¼þÒÔ»ñȡԶ³Ì»á¼ûȨÏÞ¡£¡£¡£¡£ ¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬ÕâЩÓʼþÏÖʵÉÏÊÇ·¢Ë͸øÓëÕ©Æ­Õß¹ØÁªµÄµç×ÓÓʼþµØµã£¬£¬£¬ £¬£¬£¬¸ÃµØµã»á×Ô¶¯½«Óʼþת·¢¸øÓʼþÁбíÖеÄËùÓгÉÔ±£¬£¬£¬ £¬£¬£¬¼´Õ©Æ­Ä¿µÄ¡£¡£¡£¡£ ¡£¡£ÓÉÓÚPayPal²»ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬ £¬£¬£¬Õ©Æ­ÕßÄܹ»×¢ÈëÕ©Æ­ÐÅÏ¢¡£¡£¡£¡£ ¡£¡£ÎªÁËÌá·À´ËÀàÕ©Æ­£¬£¬£¬ £¬£¬£¬Óû§Ó¦ºöÂÔ°üÀ¨Ðéα¹ºÖÃÈ·ÈϵÄPayPalÓʼþ£¬£¬£¬ £¬£¬£¬²¢²»Òª²¦´òÆäÖÐÌṩµÄµç»°ºÅÂë¡£¡£¡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬ £¬£¬£¬PayPalÐèÒª½ÓÄɲ½·¥ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬ £¬£¬£¬ÒÔ±ÜÃâ´ËÀàÕ©Æ­ÐÐΪµÄ±¬·¢¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/


3. CS2½ÇÖð³Éթƭаг¡£¡£¡£¡£ ¡£¡£ºÓÎÏ·Íæ¼ÒÐèСÐÄSteamÕÊ»§±»µÁΣº¦


2ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßÕýʹÓ÷´¿Ö¾«Ó¢ 2 (CS2) µÄ´óÐͽÇÖ𣬣¬£¬ £¬£¬£¬ÈçIEM¿¨ÍÐά×È2025ºÍPGL¿Ë¬ÈÕ-Äɲ¨¿¨2025£¬£¬£¬ £¬£¬£¬Õë¶ÔÓÎÏ·Íæ¼ÒʵÑéÕ©Æ­£¬£¬£¬ £¬£¬£¬ÒâͼÇÔÈ¡ËûÃǵÄSteamÕÊ»§ºÍ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£ ¡£¡£Ö»¹ÜCS2ÒÑÍÆ³ö¶àÄ꣬£¬£¬ £¬£¬£¬µ«ÆäÍæ¼ÒÉçÇøºÍÖ°Òµ¾ºÈüÃûÌÃÒÀÈ»ÖØ´óÇÒ»îÔ¾¡£¡£¡£¡£ ¡£¡£½üÆÚ£¬£¬£¬ £¬£¬£¬CS2ÔÚSteamÉϵÄͬʱÔÚÏßÍæ¼ÒÊýÄ¿µÖ´ïÁËеÄá¯Áë¡£¡£¡£¡£ ¡£¡£Bitdefender Labs·¢Ã÷ÁËÒ»ÏîÃûΪ¡°Streamjacking¡±µÄ¶ñÒâ»î¶¯£¬£¬£¬ £¬£¬£¬Õ©Æ­Õßͨ¹ýð³ä×ÅÃûCS2Íæ¼Ò£¬£¬£¬ £¬£¬£¬ÔÚYouTubeÖ±²¥ÖÐÐû´«Ã°³äµÄƤ·ôºÍ¼ÓÃÜÇ®±ÒÔùÆ·¡£¡£¡£¡£ ¡£¡£ËûÃÇʹÓñ»Ð®ÖƵÄÕýµ±YouTubeÕÊ»§£¬£¬£¬ £¬£¬£¬²¢Ñ­»·²¥·Å¾ÉµÄÓÎÏ·»­ÃæÒÔÓªÔìÖ±²¥Æø·Õ¡£¡£¡£¡£ ¡£¡£ÕâЩÊÓÆµÖеĶþάÂë»òÁ´½Ó»á½«¹ÛÖÚµ¼Ïò¶ñÒâÍøÕ¾£¬£¬£¬ £¬£¬£¬ÒªÇóËûÃÇʹÓÃSteamÕÊ»§µÇ¼ÒÔÁìÈ¡ÀñÎï»ò·¢ËͼÓÃÜÇ®±ÒÒÔ»ñÈ¡¸ß¶î»Ø±¨¡£¡£¡£¡£ ¡£¡£Ò»µ©µÇ¼£¬£¬£¬ £¬£¬£¬Êܺ¦Õ߾ͻáÔÚ²»ÖªÇéµÄÇéÐÎÏÂÊÚÓèÕ©Æ­Õß»á¼ûȨÏÞ£¬£¬£¬ £¬£¬£¬µ¼ÖÂÓмÛÖµµÄƤ·ôºÍÎïÆ·±»µÁ£¬£¬£¬ £¬£¬£¬¼ÓÃÜÇ®±ÒÒ²»á±»Á¬Ã¦×ªÒÆÖÁÕ©Æ­Õß¿ØÖƵÄÇ®°ü¡£¡£¡£¡£ ¡£¡£ÓÎÏ·Íæ¼ÒÓ¦¼á³ÖСÐÄ£¬£¬£¬ £¬£¬£¬ºËʵÓë¹Ù·½µç×Ó¾º¼¼×éÖ¯µÄ¹ØÏµ£¬£¬£¬ £¬£¬£¬²¢¼¤»î¶àÖØÉí·ÝÑéÖ¤¡¢ÆôÓÃSteam GuardÒÆÆôº½·ÝÑéÖ¤Æ÷ÒÔ¼°°´ÆÚ¼ì²éµÇ¼»î¶¯¡£¡£¡£¡£ ¡£¡£ÔÚYouTubeÉÏ£¬£¬£¬ £¬£¬£¬Ö»Ô¢Ä¿¹Ù·½Ö°ÒµÇòÔ±ÕÊ»§µÄÊÓÆµ£¬£¬£¬ £¬£¬£¬²¢¶ÔÆäËûƵµÀÉϵÄÖ±²¥¼á³ÖÏÓÒÉ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/fake-cs2-tournament-streams-used-to-steal-crypto-steam-accounts/


4. SpyLend Android ¶ñÒâÈí¼þÔÚ Google Play ±»ÏÂÔØÁ˳¬ 10 Íò´Î


2ÔÂ21ÈÕ£¬£¬£¬ £¬£¬£¬Ò»¿îÃûΪSpyLend£¨ÓÖ³ÆFinance Simplified£©µÄAndroid¶ñÒâÈí¼þÓ¦ÓóÌÐòÔÚGoogle PlayÉϱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬£¬ £¬£¬£¬Ëüαװ³É½ðÈÚ¹¤¾ß£¬£¬£¬ £¬£¬£¬ÊµÔòÕë¶ÔÓ¡¶ÈÓû§ÊµÑéÂÓ¶áÐÔ´û¿î¡£¡£¡£¡£ ¡£¡£¸ÃÓ¦ÓÃÊôÓÚSpyLoan¶ñÒâÈí¼þ×飬£¬£¬ £¬£¬£¬Í¨¹ýÇëÇó¹ý¶àȨÏÞÇÔÈ¡Óû§Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬£¬ £¬£¬£¬ÈçÁªÏµÈË¡¢Í¨»°¼Í¼¡¢¶ÌÐÅ¡¢ÕÕÆ¬¡¢×°±¸Î»ÖõÈ¡£¡£¡£¡£ ¡£¡£ÕâЩÊý¾Ý±»ÓÃÓÚɧÈÅ¡¢Ú²Æ­ºÍÀÕË÷Óû§£¬£¬£¬ £¬£¬£¬ÌØÊâÊǵ±Óû§Î´ÄÜÖª×㻹¿îÌõ¿îʱ¡£¡£¡£¡£ ¡£¡£¸ÃÓ¦Óû¹Éù³ÆÊÇ×¢²áµÄ·ÇÒøÐнðÈÚ¹«Ë¾£¬£¬£¬ £¬£¬£¬µ«ÊµÔò²»È»¡£¡£¡£¡£ ¡£¡£ÎªÌӱܼì²â£¬£¬£¬ £¬£¬£¬Ëü¼ÓÔØWebView½«Óû§Öض¨Ïòµ½Íâ²¿ÍøÕ¾ÏÂÔØ´û¿îÓ¦ÓÃAPK¡£¡£¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ»î¶¯×¨ÃÅÕë¶ÔÓ¡¶ÈÓû§£¬£¬£¬ £¬£¬£¬²¢ÇÔÈ¡°üÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵĶàÖÖÊý¾Ý£¬£¬£¬ £¬£¬£¬ÓÃÓÚڲƭÀÕË÷»ò½ðÈÚڲƭ¡£¡£¡£¡£ ¡£¡£Ö»¹Ü¸ÃÓ¦ÓÃÒÑ´ÓGoogle PlayÒÆ³ý£¬£¬£¬ £¬£¬£¬µ«ÈÔ¿ÉÄܼÌÐøÔËÐв¢ÍøÂçÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ ¡£¡£ÈôÏÓÒÉ×°±¸±»Ñ¬È¾£¬£¬£¬ £¬£¬£¬ÇëÁ¬Ã¦É¾³ýÏà¹ØÓ¦Ó㬣¬£¬ £¬£¬£¬ÖØÖÃȨÏÞ£¬£¬£¬ £¬£¬£¬¸ü¸ÄÃÜÂ룬£¬£¬ £¬£¬£¬²¢Ö´ÐÐ×°±¸É¨Ãè¡£¡£¡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬ £¬£¬£¬È·±£GoogleµÄPlay Protect¹¤¾ß´¦Óڻ״̬£¬£¬£¬ £¬£¬£¬ÒÔ¼ì²â²¢×èÖ¹¶ñÒâÈí¼þ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/


5. CISA½«Craft CMS¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209¼ÓÈëKEVĿ¼


2ÔÂ21ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCraftÄÚÈÝÖÎÀíϵͳ£¨CMS£©µÄ¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£ ¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.1£¬£¬£¬ £¬£¬£¬Ó°ÏìCraft CMS°æ±¾4ºÍ5£¬£¬£¬ £¬£¬£¬ÏêϸΪ°æ±¾¹æÄ£ÔÚ>= 4.0.0-RC1, < 4.13.8ºÍ>= 5.0.0-RC1, < 5.5.5Ö®¼ä¡£¡£¡£¡£ ¡£¡£CISAÖ¸³ö£¬£¬£¬ £¬£¬£¬ÓÉÓÚÒ×Êܹ¥»÷µÄ°æ±¾ÒѾ­Î£¼°Óû§Çå¾²ÃÜÔ¿£¬£¬£¬ £¬£¬£¬Craft CMS±£´æ´úÂë×¢ÈëÎó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£ ¡£¡£ÏîĿά»¤Ö°Ô±ÒÑÔÚ2024Äê12ÔÂÏÂÑ®Ðû²¼µÄ°æ±¾4.13.8ºÍ5.5.8Öнâ¾öÁ˸ÃÎó²î¡£¡£¡£¡£ ¡£¡£Craft CMSÔÚGitHubÉÏÐû²¼µÄͨ¸æÖÐÌáµ½£¬£¬£¬ £¬£¬£¬ËùÓÐδÐÞ²¹ÇÒÇå¾²ÃÜÔ¿±»Ð¹Â¶µÄ°æ±¾¶¼»áÊܵ½¸ÃÇ徲ȱÏݵÄÓ°Ï죬£¬£¬ £¬£¬£¬²¢½¨ÒéÎÞ·¨¸üе½ÐÞ²¹°æ±¾µÄÓû§ÂÖ»»Çå¾²ÃÜÔ¿²¢È·±£ÆäÒþ˽ÒÔ»º½âÎÊÌâ¡£¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»½¨ÒéÔÚ2025Äê3ÔÂ13ÈÕ֮ǰӦÓÃÐëÒªµÄÐÞ¸´³ÌÐò¡£¡£¡£¡£ ¡£¡£


https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html


6. CISA½«Microsoft Power PagesÎó²îCVE-2025-24989¼ÓÈëKEVĿ¼


2ÔÂ23ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Microsoft Power PagesµÄÒ»¸ö¸ßÑÏÖØÐÔÎó²î£¨±àºÅΪCVE-2025-24989£¬£¬£¬ £¬£¬£¬CVSS·ÖÊýΪ8.2£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£ ¡£¡£¸ÃÎó²îÊôÓÚ²»µ±»á¼û¿ØÖÆÎó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíδ¾­ÊÚȨµÄ¹¥»÷Õßͨ¹ýÍøÂçÌáÉýȨÏÞ£¬£¬£¬ £¬£¬£¬¿ÉÄÜÈÆ¹ýÓû§×¢²á¿ØÖÆ¡£¡£¡£¡£ ¡£¡£´ËÎó²îÓÉ΢ÈíµÄRaj Kumar±¨¸æ£¬£¬£¬ £¬£¬£¬Î¢ÈíÒÑÈ·ÈÏ´ËÎó²îÕýÔÚ±»Æð¾¢Ê¹Ó㬣¬£¬ £¬£¬£¬²¢Ðû²¼ÁËͨ¸æÍ¨ÖªÊÜÓ°ÏìµÄ¿Í»§¼ì²éÍøÕ¾²¢½ÓÄÉÕûÀí²½·¥¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬ £¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ×èÖ¹ÈÕÆÚǰ½â¾öÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬ £¬£¬£¬ÒÔ±£»£» £»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£ ¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ21ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬ £¬£¬£¬Í¬Ê±×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬ £¬£¬£¬ÒÔ½µµÍÇ徲Σº¦¡£¡£¡£¡£ ¡£¡£


https://securityaffairs.com/174541/hacking/u-s-cisa-adds-microsoft-power-pages-flaw-known-exploited-vulnerabilities-catalog.html