ViciousTrapºÚ¿Í×é֯ʹÓÃÎó²î¹¹½¨ÀàÃÛ¹ÞÍøÂç

Ðû²¼Ê±¼ä 2025-05-26

1. ViciousTrapºÚ¿Í×é֯ʹÓÃÎó²î¹¹½¨ÀàÃÛ¹ÞÍøÂç


5ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶£¬£¬£¬£¬£¬£¬´úºÅViciousTrapµÄºÚ¿Í×éÖ¯ÒÑÈëÇÖÈ«Çò84¸ö¹ú¼Ò½ü5300Ì¨ÍøÂç±ßÑØ×°±¸£¬£¬£¬£¬£¬£¬½«ÆäˢгÉÀàÃÛ¹ÞÍøÂç¡£ ¡£¡£¡£¡£¡£¸Ã×é֯ʹÓÃ˼¿ÆÐ¡ÐÍÆóҵ·ÓÉÆ÷¶à¿îÐͺŵÄÒªº¦Îó²îCVE-2023-20118ʵÑé´ó¹æÄ£ÈëÇÖ£¬£¬£¬£¬£¬£¬ÆäÖÐ850̨ÊÜ¿Ø×°±¸Î»ÓÚ°ÄÃÅ¡£ ¡£¡£¡£¡£¡£Çå¾²¹«Ë¾SekoiaÔÚÆÊÎö±¨¸æÖÐÖ¸³ö£¬£¬£¬£¬£¬£¬Ñ¬È¾Á´Éæ¼°Ö´ÐÐÃûΪNetGhostµÄshell¾ç±¾£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾Äܽ«±»ÈëÇÖ·ÓÉÆ÷µÄÁ÷Á¿Öض¨ÏòÖÁ¹¥»÷Õß¿ØÖƵÄÀàÃÛ¹ÞÉèÊ©£¬£¬£¬£¬£¬£¬ÊµÏÖÍøÂçÁ÷Á¿Ð®ÖÆ¡£ ¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬·¨¹úÍøÂçÇå¾²¹«Ë¾Ôø½«¸ÃÎó²îʹÓùéÒòÓÚPolarEdge½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬²»¹ýÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢¶þÕßÓйØÁª¡£ ¡£¡£¡£¡£¡£ViciousTrap±³ºóµÄ×éÖ¯Õýͨ¹ýÈëÇÖ´ó×Ú̻¶ÓÚ»¥ÁªÍøµÄ×°±¸¹¹½¨ÃÛ¹Þ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬Éæ¼°50Óà¸ö³§É̵ÄSOHO·ÓÉÆ÷¡¢SSL VPNµÈ¶àÖÖ×°±¸¡£ ¡£¡£¡£¡£¡£ÕâÖּܹ¹Ê¹¹¥»÷ÕßÄÜÊÓ²ì¶àÇéÐÎÉøÍ¸ÊµÑ飬£¬£¬£¬£¬£¬¿ÉÄÜÍøÂçδ¹ûÕæ»òÁãÈÕÎó²îʹÓüƻ®£¬£¬£¬£¬£¬£¬²¢Ð®ÖÆÆäËûÍþв×éÖ¯µÄÈëÇÖЧ¹û¡£ ¡£¡£¡£¡£¡£¹¥»÷Á´ÏÈͨ¹ýÎó²îʹÓÃÏÂÔØbash¾ç±¾£¬£¬£¬£¬£¬£¬½ø¶øÖ´Ðеڶþ½×¶ÎµÄNetGhost¾ç±¾£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾¾ß±¸Á÷Á¿Öض¨Ïò¹¦Ð§£¬£¬£¬£¬£¬£¬¿ÉʵÑéÖÐÐÄÈ˹¥»÷£¬£¬£¬£¬£¬£¬»¹¾ß±¸×Ôɾ³ýÄÜÁ¦ÒÔïÔ̭ȡ֤ºÛ¼£¡£ ¡£¡£¡£¡£¡£ËùÓй¥»÷ʵÑé¾ùÔ´×Ô¼òµ¥IPµØµã£¬£¬£¬£¬£¬£¬×îÔç»î¶¯¿É×·ËÝÖÁ2025Äê3Ô£¬£¬£¬£¬£¬£¬´ÎÔ¸Ã×éÖ¯»¹½«PolarEdge½©Ê¬ÍøÂçÔøÊ¹ÓõÄδ¹ûÕæWebShell¹¤¾ß¸Ä×÷¼ºÓᣠ¡£¡£¡£¡£¡£±¾ÔÂ×îй¥»÷»î¶¯×ªÏò»ªË¶Â·ÓÉÆ÷£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁíÒ»IPµØµã£¬£¬£¬£¬£¬£¬µ«Î´°²ÅÅÃÛ¹Þ£¬£¬£¬£¬£¬£¬ËùÓлîÔ¾IP¾ùλÓÚÂíÀ´Î÷ÑÇ£¬£¬£¬£¬£¬£¬¹éÊôÍйÜЧÀÍÉÌShinjiruÔËÓªµÄ×ÔÖÎϵͳ¡£ ¡£¡£¡£¡£¡£


https://thehackernews.com/2025/05/vicioustrap-uses-cisco-flaw-to-build.html


2. NPMÉϵÄÊýÊ®¸ö¶ñÒâÈí¼þ°üÍøÂçÖ÷»úºÍÍøÂçÊý¾Ý


5ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬SocketÍþвÑо¿ÍŶÓÔÚNPMË÷ÒýÖз¢Ã÷ÁËÁ½Æð¶ñÒâÈí¼þ°ü»î¶¯¡£ ¡£¡£¡£¡£¡£µÚÒ»ÆðÉæ¼°60¸ö¶ñÒâÈí¼þ°ü£¬£¬£¬£¬£¬£¬ËüÃÇ×Ô5ÔÂ12ÈÕÆð´ÓÈý¸öÐû²¼ÕßÕË»§ÉÏ´«ÖÁNPM´æ´¢¿â¡£ ¡£¡£¡£¡£¡£ÕâЩÈí¼þ°ü°üÀ¨×°Öúó¾ç±¾£¬£¬£¬£¬£¬£¬ÔÚ¡°npm install¡±Ê±´ú×Ô¶¯Ö´ÐУ¬£¬£¬£¬£¬£¬ÍøÂç°üÀ¨Ö÷»úÃû¡¢ÄÚ²¿IPµØµã¡¢Óû§Ö÷Ŀ¼µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢·¢Ë͵½ÍþвÐÐΪÕß¿ØÖƵÄDiscord webhook¡£ ¡£¡£¡£¡£¡£¸Ã¾ç±¾»¹¾ß±¸ÇéÐμì²â¹¦Ð§£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÊÇ·ñÔÚÆÊÎöÇéÐÎÖÐÔËÐС£ ¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδÊӲ쵽µÚ¶þ½×¶ÎÓÐÓÃÔØºÉµÄͶµÝ¡¢È¨ÏÞÌáÉý»ò³¤ÆÚ»úÖÆ£¬£¬£¬£¬£¬£¬µ«Ë¼Á¿µ½ËùÍøÂçÊý¾ÝµÄÃô¸ÐÐÔ£¬£¬£¬£¬£¬£¬´ËÀ๥»÷µÄΣÏÕÐÔÏ൱¸ß¡£ ¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÔøÀÛ¼ÆÏÂÔØ3000´Î£¬£¬£¬£¬£¬£¬²»¹ýÔÚ±¨¸æÐû²¼Ê±ÒÑ´ÓNPM´æ´¢¿âÖÐÏûÊÅ¡£ ¡£¡£¡£¡£¡£ÎªÓÕÆ­¿ª·¢Ö°Ô±£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÁËÓëÕýµ±Èí¼þ°üÏàËÆµÄÃû³Æ£¬£¬£¬£¬£¬£¬¿ÉÄÜÕë¶ÔCI/CD¹ÜµÀ¡£ ¡£¡£¡£¡£¡£ÁíÒ»Æð¶ñÒâ»î¶¯Éæ¼°°Ë¸öÈí¼þ°ü£¬£¬£¬£¬£¬£¬ËüÃÇͨ¹ýÓòÃûÇÀעģÄâReact¡¢Vue.js¡¢Vite¡¢Node.jsºÍQuillÉú̬ϵͳµÄÕýµ±¹¤¾ß£¬£¬£¬£¬£¬£¬µ«¾ß±¸Êý¾Ý²Á³ý¹¦Ð§£¬£¬£¬£¬£¬£¬¿Éɾ³ýÎļþ¡¢Ëð»µÊý¾ÝºÍ¹Ø±Õϵͳ¡£ ¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÒÑÍùÁ½ÄêÒ»Ö±±£´æÓÚNPMÉÏ£¬£¬£¬£¬£¬£¬ÏÂÔØÁ¿´ï6200´Î¡£ ¡£¡£¡£¡£¡£ÆäÌӱܼì²âµÄ²¿·ÖÔµ¹ÊÔ­ÓÉÊÇÓÐÓÃÔØºÉƾ֤Ӳ±àÂëµÄϵͳÈÕÆÚ¼¤»î£¬£¬£¬£¬£¬£¬ÇÒÆä½á¹¹»áÖð²½ÆÆËðϵͳ¡£ ¡£¡£¡£¡£¡£´Ë´Î»î¶¯±³ºóµÄÍþвÐÐΪÕßÒÔ¡°xuxingfeng¡±ÃûÒåÐû²¼ÕâЩÎļþ£¬£¬£¬£¬£¬£¬²¢ÁгöÁ˼¸¸öÕýµ±Èí¼þ°üÒÔ½¨ÉèÐÅÈΡ£ ¡£¡£¡£¡£¡£Ö»¹Üƾ֤Ӳ±àÂëÈÕÆÚ£¬£¬£¬£¬£¬£¬Î£ÏÕÒÑÒÑÍù£¬£¬£¬£¬£¬£¬µ«¼øÓÚ×÷Õß¿ÉÄÜÒýÈë¸üÐÂÖØÐ´¥·¢²Á³ý¹¦Ð§£¬£¬£¬£¬£¬£¬É¾³ýÕâЩÈí¼þ°üÖÁ¹ØÖ÷Òª¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/


3. Cetus ProtocolÔâºÚ¿ÍÇÔÈ¡2.23ÒÚ¼ÓÃÜÇ®±Ò


5ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯ÉúÒâËùCetus Protocol¿ËÈÕÐû²¼ÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬¼ÛÖµ2.23ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£ ¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿Á¬Ã¦ÔÝÍ£ÖÇÄܺÏÔ¼Õö¿ªÊӲ죬£¬£¬£¬£¬£¬²¢È·ÈÏ¡°1.62ÒÚÃÀÔªµÄÊÜËð×ʽðÒÑÀÖ³ÉÔÝÍ£¡±¡£ ¡£¡£¡£¡£¡£Cetus ProtocolËæºóÖ¸³ö£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁËÒ»¸öÒ×Êܹ¥»÷µÄÈí¼þ°üʵÑé¹¥»÷£¬£¬£¬£¬£¬£¬µ«Î´Åû¶Ïêϸϸ½Ú¡£ ¡£¡£¡£¡£¡£¸ÃÏîÄ¿ÌåÏÖÒÑÕÒµ½Îó²î»ù´¡Ôµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÏà¹ØÈí¼þ°ü£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÉú̬ϵͳ½¨ÉèÕßÒÔ±ÜÃâÆäËûÍŶÓÊÜÓ°Ïì¡£ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Cetus Protocolʶ±ð³ö¹¥»÷ÕßµÄÒÔÌ«·»Ç®°üµØµãºÍÕË»§£¬£¬£¬£¬£¬£¬ÕýÓëµÚÈý·½ÏàÖú×·×ٺͶ³½á×ʽ𣬣¬£¬£¬£¬£¬²¢ÒÑִ֪ͨ·¨²¿·Ö¡£ ¡£¡£¡£¡£¡£Îª´ÙʹºÚ¿ÍËÍ»¹×ʽ𣬣¬£¬£¬£¬£¬Cetus ProtocolÌá³ö¡°ÓÐʱÏ޵İ×ñϢÕùЭÒ顱£¬£¬£¬£¬£¬£¬ÔÊÐíÈô×ʽðÍË»¹½«²»ÔÙ½ÓÄÉÖ´·¨Ðж¯¡£ ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿Ðû²¼½«Ìṩ500ÍòÃÀÔªÉͽ𣬣¬£¬£¬£¬£¬½±ÀøÌṩÏßË÷¡¢×ÊÖúʶ±ðºÍ¾Ð²¶ºÚ¿ÍµÄÐÅÏ¢ÌṩÕß¡£ ¡£¡£¡£¡£¡£ÔÚÑéÖ¤Õß½ôÆÈͶƱºó£¬£¬£¬£¬£¬£¬SuiÇø¿éÁ´ÉÏ1.62ÒÚÃÀÔªµÄ×ʽð±»ÔÝÍ£¡£ ¡£¡£¡£¡£¡£Çø¿éÁ´ÆÊÎö¹«Ë¾EllipticÐû²¼±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬×Ô¶¯×öÊÐÉÌ£¨AMM£©Âß¼­±£´æÈ±ÏÝ£¬£¬£¬£¬£¬£¬¿ÉÄÜÉæ¼°³Ø¼ÛǮʹÓ㬣¬£¬£¬£¬£¬´Ó¶øÒý·¢ÉÁµç´ûʽ¹¥»÷¡£ ¡£¡£¡£¡£¡£Elliptic»¹¸ÅÊöÁ˹¥»÷ÕßµÄ×ʽð×ªÒÆÊµÑ飬£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÆð¾¢×·×Ù´ÓSui³õʼÎó²îµ½¹¥»÷ÕßÔÚÒÔÌ«·»ÉÏÇ®°üµÄÉúÒâ¡£ ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ºÚ¿ÍµÄµØµãÒÑÔÚËùÓÐÖ÷ÒªÉúÒâËùºÍÐéÄâ×ʲúЧÀÍÌṩÉÌÉϱê¼Ç£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâÏ´Ç®»ò×ʽð×ªÒÆÍýÏë¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/


4. FBIÖÒÑÔSilent Ransom GroupÕë¶ÔÃÀÂÉËùÌᳫÀÕË÷¹¥»÷


5ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ö¸³öÒ»¸öÃûΪSilent Ransom Group£¨SRG£©µÄÀÕË÷ÍÅ»ïÔÚÒÑÍùÁ½ÄêÀïÒ»Á¬Õë¶ÔÃÀ¹ú״ʦÊÂÎñËù·¢¶¯»Ø²¦ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷¡£ ¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÖÃûLuna Moth¡¢Chatty SpiderºÍUNC3753£¬£¬£¬£¬£¬£¬×Ô2022ÄêÆð±ãÒ»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬ÊÇBazarCall»î¶¯µÄÄ»ºóÖ÷ʹ£¬£¬£¬£¬£¬£¬ÎªRyukºÍContiÀÕË÷Èí¼þ¹¥»÷ÌṩÁ˳õÊ¼ÍøÂç»á¼ûȨÏÞ¡£ ¡£¡£¡£¡£¡£ÔÚConti¹Ø±Õºó£¬£¬£¬£¬£¬£¬¸ÃÍþвÐÐΪÕßÍÑÀëÔ­ÍøÂç·¸·¨¼¯ÍÅ£¬£¬£¬£¬£¬£¬×齨ÁËSRG¡£ ¡£¡£¡£¡£¡£ÔÚ×î½üµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬SRGͨ¹ýµç×ÓÓʼþ¡¢ÐéÎ±ÍøÕ¾ºÍµç»°Ã°³äÄ¿µÄITÖ§³ÖÖ°Ô±£¬£¬£¬£¬£¬£¬Ê¹ÓÃÉç»á¹¤³ÌѧÊֶλñÈ¡ÍøÂç»á¼ûȨÏÞ¡£ ¡£¡£¡£¡£¡£ÓëÒ»Ñùƽ³£ÀÕË÷×éÖ¯²î±ð£¬£¬£¬£¬£¬£¬SRG²¢²»¼ÓÃÜÊܺ¦Õßϵͳ£¬£¬£¬£¬£¬£¬¶øÊÇÒÔË÷ÒªÊê½ð±ÜÃâÃô¸ÐÐÅϢй¶¶øÖøÃû¡£ ¡£¡£¡£¡£¡£ËûÃÇͨ¹ýÔ¶³Ì»á¼û»á»°½øÈëÊܺ¦Õß×°±¸£¬£¬£¬£¬£¬£¬¾ÙÐÐ×îµÍÏ޶ȵÄȨÏÞÌáÉý£¬£¬£¬£¬£¬£¬²¢Ñ¸ËÙתÏòÊý¾Ýй¶£¬£¬£¬£¬£¬£¬Ê¹Óá°WinSCP¡±»òÒþ²Ø/ÖØÃüÃûµÄ¡°Rclone¡±°æ±¾ÇÔÈ¡Êý¾Ý¡£ ¡£¡£¡£¡£¡£ÇÔÈ¡Êý¾Ýºó£¬£¬£¬£¬£¬£¬SRGͨ¹ýÀÕË÷ÓʼþºÍµç»°Íþв³öÊÛ»ò¹ûÕæÐÅÏ¢£¬£¬£¬£¬£¬£¬ÆÈʹÊܺ¦Õß¾ÙÐÐÊê½ð̸ÅС£ ¡£¡£¡£¡£¡£Ö»¹ÜËûÃÇÓÐרÃŵÄÍøÕ¾Ð¹Â¶Êܺ¦ÕßÊý¾Ý£¬£¬£¬£¬£¬£¬µ«FBIÖ¸³ö£¬£¬£¬£¬£¬£¬ÕâЩÀÕË÷ÍŻﲢ²»×Ü»á¶ÒÏÖÊý¾Ýй¶Íþв¡£ ¡£¡£¡£¡£¡£Îª·ÀÓù´ËÀ๥»÷£¬£¬£¬£¬£¬£¬FBI½¨ÒéʹÓÃÇ¿ÃÜÂë¡¢ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤¡¢°´ÆÚ±¸·ÝÊý¾Ý£¬£¬£¬£¬£¬£¬²¢¶ÔÔ±¹¤¾ÙÐÐÍøÂç´¹ÂÚʵÑé¼ì²âÅàѵ¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-warns-of-luna-moth-extortion-attacks-targeting-law-firms/


5. Marlboro-Chesterfield PathologyÊý¾Ýй¶ӰÏì23.5ÍòÈË


5ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú±±¿¨ÂÞÀ´ÄÉÖÝȫЧÀÍÆÊ½â²¡ÀíʵÑéÊÒMarlboro-Chesterfield Pathology£¨MCP£©½üÆÚÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÖÂʹ´ó×ÚСÎÒ˽¼ÒÐÅÏ¢¼Í¼ʧÔô¡£ ¡£¡£¡£¡£¡£¸Ã»ú¹¹ÔÚ¹ÙÍøÐû²¼µÄÊý¾Ýй¶֪ͨÅú×¢£¬£¬£¬£¬£¬£¬2025Äê1ÔÂ16ÈÕÆäÄÚ²¿ITϵͳ·ºÆðδ¾­ÊÚȨ»î¶¯£¬£¬£¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈϹ¥»÷ÕßÇÔÈ¡Á˲¿·ÖÎļþ¡£ ¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ýº­¸ÇÐÕÃû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Ò½ÁÆÖÎÁÆÐÅÏ¢¼°¿µ½¡°ü¹ÜÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬£¬Ïêϸй¶×Ö¶ÎÒò¸öÌå²î±ð¶øÓÐËù²î±ð¡£ ¡£¡£¡£¡£¡£MCP±¾ÖÜÏòÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©×ª´ï£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£Éæ¼°235,911ÈË¡£ ¡£¡£¡£¡£¡£ÀÕË÷Èí¼þ×éÖ¯SafePayÓÚÒ»ÔÂÏÂÑ®Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ï½üÆÚ»¹¶ÔÉÌҵЧÀÍÌṩÉÌConduentÌᳫ¹¥»÷¡£ ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬×èÖ¹·¢¸åʱ£¬£¬£¬£¬£¬£¬MCPÒÑ´ÓSafePayµÄйÃÜÍøÕ¾Ï¼Ü£¬£¬£¬£¬£¬£¬ÕâÌåÏÖÊܺ¦·½¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£ ¡£¡£¡£¡£¡£


https://www.securityweek.com/marlboro-chesterfield-pathology-data-breach-impacts-235000-people/


6. ºÚ¿ÍʹÓÃÐéαVPN¼°ä¯ÀÀÆ÷NSIS×°ÖðüÈö²¥Winos 4.0¶ñÒâÈí¼þ


5ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýαװ³ÉLetsVPN¡¢QQä¯ÀÀÆ÷µÈÊ¢Ðй¤¾ßµÄÐéαװÖóÌÐò£¬£¬£¬£¬£¬£¬×îÖÕͶµÝWinos 4.0¿ò¼Ü¡£ ¡£¡£¡£¡£¡£´Ë¹¥»÷Ðж¯ÓÉRapid7ÓÚ2025Äê2ÔÂÊ״μà²âµ½£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÃûΪCatenaµÄ¶à½×¶ÎפÄÚ´æ¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬½«ÓÐÓÃÔØºÉÍêȫפÁôÄÚ´æÒÔ¹æ±Üɱ¶¾Èí¼þ¼ì²â¡£ ¡£¡£¡£¡£¡£Ö²Èëºó£¬£¬£¬£¬£¬£¬Catena»á¾²Ä¬ÅþÁ¬¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬´ó¶¼Î»ÓÚÏã¸Û£¬£¬£¬£¬£¬£¬ÒÔÎüÊÕºóÐøÖ¸Áî»òÌØÊâ¶ñÒâ³ÌÐò¡£ ¡£¡£¡£¡£¡£¸Ã¹¥»÷ËÆºõרÃÅÕë¶ÔÖÐÎÄÇéÐΣ¬£¬£¬£¬£¬£¬Ä»ºó±£´æ¾ß±¸¸ß¶ÈÄÜÁ¦µÄÍþв×éÖ¯¡£ ¡£¡£¡£¡£¡£Winos 4.0ÊÇ»ùÓÚ×ÅÃûÔ¶³ÌľÂíGh0st RAT´úÂë»ù´¡±àдµÄÏȽø¶ñÒâ¿ò¼Ü£¬£¬£¬£¬£¬£¬¾ßÓÐÊý¾ÝÇÔÈ¡¡¢Ô¶³ÌShell»á¼û¼°·¢¶¯DDoS¹¥»÷µÈ¹¦Ð§¡£ ¡£¡£¡£¡£¡£2025Äê·¢Ã÷µÄ»ùÓÚQQä¯ÀÀÆ÷µÄѬȾÁ÷³ÌÏÔʾ£¬£¬£¬£¬£¬£¬ËùÓÐÏà¹Ø¹¥»÷ÔØÌå¾ùÒÀÀµNSIS×°ÖóÌÐò£¬£¬£¬£¬£¬£¬ÕâЩװÖðüÀ¦°óÁ˾­ÓÉÊðÃûµÄÓÕ¶üÓ¦Ó㬣¬£¬£¬£¬£¬Í¨¹ý·´ÉäʽDLL×¢ÈëÊÖÒÕʵÏÖÒþ²Ø×¤Áô¡£ ¡£¡£¡£¡£¡£ÔÚ2025Äê4Ô·¢Ã÷µÄLetsVPN×°Öðü¹¥»÷°¸ÀýÖУ¬£¬£¬£¬£¬£¬¶ñÒâ³ÌÐòͨ¹ý½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬£¬£¬ÇÒ°üÀ¨¼ì²âϵͳÖÐÎÄÓïÑÔÉèÖõÄÏÔÐÔУÑ飬£¬£¬£¬£¬£¬µ«×ÝȻδ·¢Ã÷ÖÐÎÄÇéÐÎÈÔ»á¼ÌÐøÖ´ÐС£ ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹¾ÙÐÐÁË¡°Õ½Êõµ÷½â¡±£¬£¬£¬£¬£¬£¬ÐÞ¸ÄÁËCatenaÖ´ÐÐÁ´µÄijЩ×é¼þ£¬£¬£¬£¬£¬£¬ÐÂÔö·´É±¶¾¼ì²â¹æ±Ü¹¦Ð§£¬£¬£¬£¬£¬£¬ÈçΪËùÓÐÇý¶¯Æ÷Ìí¼ÓMicrosoft Defenderɨ³ýÏ£¬£¬£¬£¬£¬²¢Ê¹ÓÃÓâÆÚÖ¤ÊéÊðÃûµÄ¶ñÒâÔØºÉ·´Éäʽ¼ÓÔØDLLÎļþÒÔÅþÁ¬C2ЧÀÍÆ÷ÏÂÔØÖ´ÐÐWinos 4.0¡£ ¡£¡£¡£¡£¡£


https://thehackernews.com/2025/05/hackers-use-fake-vpn-and-browser-nsis.html