GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß
Ðû²¼Ê±¼ä 2026-01-051. GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß
1ÔÂ1ÈÕ£¬£¬£¬£¬£¬2025Äê10ÔÂÊ״ηºÆðµÄGlassWorm¶ñÒâÈí¼þ¿ËÈÕÌᳫµÚËIJ¨¹¥»÷£¬£¬£¬£¬£¬×¨ÃÅÕë¶ÔmacOS¿ª·¢Õߣ¬£¬£¬£¬£¬Í¨¹ý¸Ä¶¯VSCode/OpenVSXÀ©Õ¹³ÌÐòÖ²Èë¼ÓÃÜÇ®°üľÂí°æ±¾¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯·ºÆð¿çÆ½Ì¨ÌØÕ÷£¬£¬£¬£¬£¬´ËǰÖ÷ÒªÕë¶ÔWindowsϵͳ£¬£¬£¬£¬£¬ÏÖÀ©Õ¹ÖÁmacOS£¬£¬£¬£¬£¬Í¹ÏÔ¹¥»÷Õß¶Ô¿ª·¢ÕßÉú̬µÄÒ»Á¬ÉøÍ¸¡£¡£¡£¡£¡£¹¥»÷ʹÓÃOpenVSXºÍMicrosoft Visual Studio MarketplaceÖеĶñÒâÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬ÕâЩÀ©Õ¹Í¨³£ÓÃÓÚÔöÇ¿±à¼Æ÷¹¦Ð§¡£¡£¡£¡£¡£GlassWormͨ¹ý¡°²»¿É¼û¡±Unicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬£¬×°ÖúóÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°¶àÀ©Õ¹³ÌÐòµÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬£¬²¢Ö§³ÖVNCÔ¶³Ì»á¼ûºÍSOCKSÊðÀíÁ÷Á¿Â·ÓÉ¡£¡£¡£¡£¡£×îбäÖÖ½ÓÄÉAES-256-CBC¼ÓÃÜÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬ÑÓ³Ù15·ÖÖÓÖ´ÐÐÒÔÌÓ±ÜɳºÐÆÊÎö£¬£¬£¬£¬£¬Ê¹ÓÃAppleScriptÌæ»»PowerShell£¬£¬£¬£¬£¬Í¨¹ýLaunchAgentsʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬£¬Í¬Ê±ÊµÑéÇÔÈ¡KeychainÃÜÂë²¢Ìæ»»Ó²¼þÇ®°üľÂí£¨ÈçLedger Live¡¢Trezor Suite£©£¬£¬£¬£¬£¬µ«Ä¿½ñľÂíÇ®°ü·µ»Ø¿ÕÎļþ£¬£¬£¬£¬£¬¿ÉÄÜ´¦ÓÚ×¼±¸½×¶Î¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¶ñÒâÀ©Õ¹ÔÚOpenVSXƽ̨ÈÔ±£´æ£¬£¬£¬£¬£¬ÏÂÔØÁ¿³¬33,000´Î¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-glassworm-malware-wave-targets-macs-with-trojanized-crypto-wallets/
2. Unleash ProtocolËðʧ390ÍòÃÀÔª¼ÓÃÜ×ʲú
12ÔÂ31ÈÕ£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯ÖªÊ¶²úȨƽ̨Unleash ProtocolÒò¶àÖØÊðÃûÖÎÀíϵͳ±»¹¥»÷£¬£¬£¬£¬£¬Ëðʧ¼ÛÖµÔ¼390ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¾ÝÏîÄ¿ÍŶÓÅû¶£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýδÊÚȨµÄºÏÔ¼Éý¼¶»ñÈ¡ÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬½âËø×ʲúÌá¿î¹¦Ð§£¬£¬£¬£¬£¬µ¼ÖÂWIP¡¢USDC¡¢WETH¡¢stIPºÍvIPµÈ×ʲú±»µÁ¡£¡£¡£¡£¡£PeckShieldAlertÇø¿éÁ´Ç徲ר¼ÒÈ·ÈÏ£¬£¬£¬£¬£¬Ëðʧ½ð¶îÔ¼390ÍòÃÀÔª£¬£¬£¬£¬£¬×ʽðͨ¹ýµÚÈý·½»ù´¡ÉèʩǎÓ×ªÒÆÖÁÍⲿµØµã£¬£¬£¬£¬£¬×îÖÕÒÔ1,337 ETH´æÈëTornado Cash¼ÓÃÜÇ®±Ò»ìÏýЧÀÍÒÔ½µµÍ¿É×·ËÝÐÔ¡£¡£¡£¡£¡£Unleash Protocol¶¨Î»ÎªÖªÊ¶²úȨÖÎÀí²Ù×÷ϵͳ£¬£¬£¬£¬£¬¿É½«ÖªÊ¶²úȨ´ú±Ò»¯²¢×÷ΪDeFiµäÖÊÆ·£¬£¬£¬£¬£¬Í¨¹ýÖÇÄܺÏÔ¼×Ô¶¯·ÖÅÉÔÊÐí·ÑºÍ°æË°¡£¡£¡£¡£¡£´Ë´Î¹¥»÷̻¶Æä¶àÖØÊðÃûÖÎÀíϵͳµÄÇå¾²Îó²î£ºÍⲿµØµãͨ¹ýÖÎÀíϵͳ»ñÈ¡ÖÎÀí¿ØÖÆÈ¨£¬£¬£¬£¬£¬Ö´ÐÐδ¾ÍŶÓÅú×¼µÄºÏÔ¼Éý¼¶£¬£¬£¬£¬£¬Í»ÆÆÔÓÐÖÎÀí¼°ÔËÓª³ÌÐòÏÞÖÆ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃTornado CashµÄ»ìÏý»úÖÆÌÓ±Ü×·×Ù£¬£¬£¬£¬£¬¸ÃЧÀÍÔøÒòÐÖú³¯ÏʺڿÍÏ´Ç®ÓÚ2022ÄêÔâÃÀ¹úÖÆ²Ã£¬£¬£¬£¬£¬2025ÄêËä±»³ýÃû£¬£¬£¬£¬£¬µ«ÈÔ±»ÍøÂç·¸·¨·Ö×ÓÀÄÓᣡ£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬Unleash ProtocolÒÑÔÝÍ£ËùÓÐÔËÓª£¬£¬£¬£¬£¬Ô¼ÇëÍⲿÇ徲ר¼ÒÊÓ²ìÎó²îȪԴ£¬£¬£¬£¬£¬ÆÀ¹Àµ÷½âÓë»Ö¸´²½·¥¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-drain-39m-from-unleash-protocol-after-multisig-hijack/
3. PlayÀÕË÷Èí¼þ¹¥»÷°ÙÄêÀ±½·½´¾ÞÍ·Garner Foods
1ÔÂ2ÈÕ£¬£¬£¬£¬£¬PlayÀÕË÷Èí¼þ×éÖ¯ÔÚ°µÍøÐû²¼ÐÂÎÅ£¬£¬£¬£¬£¬ÒªÇóÓµÓнü°ÙÄêÀúÊ·µÄ±±¿¨ÂÞÀ´ÄÉÖÝÀ±½·½´ÖÆÔìÉÌGarner FoodsÔÚ1ÔÂ7ÈÕǰÁªÏµ²¢Ö§¸¶Î´¹ûÕæÊê½ð£¬£¬£¬£¬£¬²»È»½«Ð¹Â¶ÆäÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£×÷ΪÃÀ¹ú×ÅÃû½´ÁÏÆ·ÅÆ£¬£¬£¬£¬£¬Garner Foods×Ô1929ÄêÆðÉú²úµÂÖÝÆ¤ÌØ¡¢ÂÌɽ¸ñÁÖ¸êɯɯ½´µÈϵÁвúÆ·£¬£¬£¬£¬£¬²úÆ·ÁýÕÖÈ«ÃÀÊýÍò¼Ò³¬ÊС¢¾üÐèµê¼°±ãµ±µê£¬£¬£¬£¬£¬²¢ÔÚʳÎïЧÀÍÓë²ÍÒûÐÐÒµÕ¼ÓÐÖ÷Ҫְλ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷̻¶ÁËÆóÒµ½¹µãÊý¾ÝΣº¦£ºPlayÉù³ÆÇÔÈ¡Á˰üÀ¨Ë½ÈËÉñÃØÊý¾Ý¡¢¿Í»§Îļþ¡¢Ô¤Ëã¡¢ÈËΪµ¥¡¢²ÆÎñÐÅÏ¢¼°Ë°ÊռͼÔÚÄڵĶàÀàÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬¿ÉÄÜÉæ¼°±ê¼ÇÐÔÅä·½µÈרÓÐÐÅÏ¢¡£¡£¡£¡£¡£Ê³ÎïÉú²úÉÌÔâÀÕË÷¹¥»÷Ò×Òý·¢¹©Ó¦Á´Á¬Ëø·´Ó¦£¬£¬£¬£¬£¬´ÓÉú²úÕϰ¡¢½»¸¶ÑÓ³Ùµ½²úƷǷȱ£¬£¬£¬£¬£¬²»µ«Ëðº¦ÆóÒµÉùÓþ£¬£¬£¬£¬£¬»¹¿ÉÄܵ¼ÖÂÏûºÄÕßתÏò¾ºÆ·¡£¡£¡£¡£¡£Play×éÖ¯×÷Ϊ2024-2025ÄêÈ«ÇòµÚÈý»îÔ¾ÀÕË÷Èí¼þÍŻ£¬£¬£¬£¬ÒÑÔì³É³¬Ç§ÃûÊܺ¦Õß¡£¡£¡£¡£¡£Æä½ÓÄÉ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕ£¬£¬£¬£¬£¬½ö¼ÓÃÜϵͳ²¿·ÖÀο¿ÇøÓòÒÔ¿ìËÙÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬¸ÃÕ½ÂÔÒѱ»¶à¸ö×ÅÃûÀÕË÷×é֯Ч·Â¡£¡£¡£¡£¡£
https://cybernews.com/news/texas-pete-hot-sauce-play-ransomware-attack-garner-foods/
4. PlayÀÕË÷Èí¼þ¹¥»÷ͯЬ¾ÞÍ·Esquire Brands
1ÔÂ2ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬Í¯Ð¬ÖÆÔìÉÌEsquire BrandsÔâÓöÖøÃûÀÕË÷Èí¼þÍÅ»ïPlayµÄ¹¥»÷£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔÚ°µÍøÂÛ̳ÉÏÐû³ÆÒÑÇÔÈ¡ÆäÉñÃØÊý¾Ý£¬£¬£¬£¬£¬²¢Íþв×îÔçÓÚ1ÔÂ3ÈÕÐû²¼¡£¡£¡£¡£¡£×÷ΪӵÓÐDKNY¡¢Sam EdelmanºÍKenneth ColeµÈÆ·ÅÆÊÚȨµÄÆóÒµ£¬£¬£¬£¬£¬Esquire BrandsרעÓÚͯЬµÄÉè¼Æ¡¢ÊÚȨÓëÉú²ú£¬£¬£¬£¬£¬ÆäÓªÒµÁýÕÖÈ«Çò¶à¸öÊг¡¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³Æ»ñÈ¡Á˿ͻ§Îļþ¡¢ÈËΪÊý¾Ý¡¢²ÆÎñÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£´ËÀàÊý¾Ýй¶¿ÉÄÜÒý·¢ÑÏÖØÐ§¹û£ºÈËΪÊý¾Ý°üÀ¨Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¶¨ÏòÍøÂç´¹ÂÚ¼°Éç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬ÀýÈçð³ä¸ß¹ÜÆÈ¡×ʽ𣻣»£»£»£»¿Í»§ÎļþºÍ²ÆÎñÐÅÏ¢Ôò¿ÉÄܱ»ÓÃÓÚÉèÁ¢Ú²ÆÕË»§»òÉÌÒµÌØ¹¤»î¶¯£¬£¬£¬£¬£¬¶ÔÆóÒµÉùÓþºÍÔËÓªÔì³Éºã¾ÃË𺦡£¡£¡£¡£¡£PlayÀÕË÷Èí¼þ¼¯ÍÅÊÇÍøÂç·¸·¨ÁìÓòµÄ»îÔ¾¼ÓÈëÕߣ¬£¬£¬£¬£¬2024ÄêλÁÐÈ«Çò×î»îÔ¾ÀÕË÷Èí¼þÍÅ»ïǰÈýÃû£¬£¬£¬£¬£¬ÒÔ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕÖø³Æ£¬£¬£¬£¬£¬½ö¼ÓÃÜÏµÍ³ÌØ¶¨Àο¿²¿·Ö£¬£¬£¬£¬£¬´Ó¶ø¿ìËÙÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£PlayµÄ¹¥»÷Ä¿µÄº¸Ç¶à¸öÐÐÒµ£¬£¬£¬£¬£¬È纽¿Õº½Ìì¡¢ÔÆÅÌËã¡¢Âùݡ¢Æû³µ¼°Õþ¸®»ú¹¹¡£¡£¡£¡£¡£
https://cybernews.com/security/esquire-brands-play-ransomware-attack/
5. ÒÁÀûŵÒÁÖÝÈËÀàЧÀͲ¿ÄÚ²¿ÍýÏëµØÍ¼¹ýʧ¹ûÕæ
1ÔÂ3ÈÕ£¬£¬£¬£¬£¬ÒÁÀûŵÒÁÖÝÈËÀàЧÀͲ¿£¨IDHS£©¿ËÈÕת´ïÒ»ÒòÓÉÒþ˽ÉèÖÃÉèÖÃʧÎóÒý·¢µÄÊý¾ÝÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂÄÚ²¿×ÊÔ´ÍýÏëµØÍ¼±»ÒâÍâ¹ûÕæ£¬£¬£¬£¬£¬Éæ¼°ÊýÍòÃûЧÀ͹¤¾ßСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¾ÝÅû¶£¬£¬£¬£¬£¬ÉæÊµØÍ¼½¨ÉèÓÚijµØÍ¼Æ½Ì¨£¬£¬£¬£¬£¬ÓÃÓÚÄÚ²¿×ÊÔ´ÍýÏ룬£¬£¬£¬£¬µ«ÒòȨÏÞÉèÖò»µ±£¬£¬£¬£¬£¬ÔÚ2021Äê4ÔÂÖÁ2025Äê9ÔÂʱ´ú±»¹«ÖÚ¿É»á¼û¡£¡£¡£¡£¡£ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£º¿µ¸´Ð§ÀͲ¿·Ö£¨DRS£©Ô¼32,401Ãû¿Í»§ÐÅÏ¢Ôâ̻¶£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢²¡Àý±àºÅ¡¢²¡Àý״̬¡¢×ªÕïȪԴ¡¢ÇøÓò°ì¹«ÊÒÐÅÏ¢¼°ÊÜÒæÈËÉí·ÝµÈ£»£»£»£»£»Ò½ÁƽòÌùºÍÒ½Áưü¹Ü´¢±¸ÍýÏ루MMSP£©Ô¼672,616ÃûÊÜÒæÈËÒàÊܲ¨¼°£¬£¬£¬£¬£¬Éæ¼°µØµã¡¢²¡Àý±àºÅ¡¢Éú³Ýͳ¼ÆÐÅÏ¢¼°Ò½ÁÆÍýÏëÃû³Æ£¨ÈçÒ½ÁƽòÌù¡¢Ò½Áưü¹ÜµÈ£©£¬£¬£¬£¬£¬µ«Î´°üÀ¨ÐÕÃû¡£¡£¡£¡£¡£Á½ÅúÊý¾Ý¹ûÕæÊ±¶Î»®·ÖΪ2021Äê4ÔÂ-2025Äê9Ô¼°2022Äê1ÔÂ-2025Äê9Ô¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ2025Äê9ÔÂ22ÈÕ±»·¢Ã÷ºó£¬£¬£¬£¬£¬IDHSÁ¬Ã¦½ÓÄɵ÷½â²½·¥£ºÏÞÖÆµØÍ¼»á¼ûȨÏÞ£¬£¬£¬£¬£¬Ã÷ȷեȡ½«Èκοͻ§¼¶±ðÊý¾ÝÉÏ´«ÖÁ¹«¹²µØÍ¼ÍøÕ¾¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ÒÁÀûŵÒÁÖÝÁìÍÁÇå¾²²¿Õýͨ¹ýÓʼþµÈ·½·¨ÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢³ö֪ͨ£¬£¬£¬£¬£¬Í¨ÖªÖаüÀ¨Ãâ·Ñ×Éѯµç»°£¬£¬£¬£¬£¬±ãÓÚÓû§»ñÈ¡¸ü¶àÐÅÏ¢¼°Ö§³Ö¡£¡£¡£¡£¡£
https://khqa.com/news/local/illinois-agency-tightens-map-security-after-data-security-incident-human-services-medicaid-medicare-division-of-rehabilitation-services-federal-trade-commission
6. Handalaͨ¹ýÈëÇÖTelegramÕË»§¹¥»÷ÒÔÉ«ÁйÙÔ±
1ÔÂ2ÈÕ£¬£¬£¬£¬£¬ÓëÒÁÀʹØÁªµÄºÚ¿Í×éÖ¯HandalaÐû³ÆÍêÈ«ÈëÇÖÁ½ÃûÒÔÉ«ÁÐÕþÒª¡ª¡ªÇ°×ÜÀíÄÉ·òËþÀû¡¤±´ÄÚÌØÓëÕÕÁϳ¤²ìÏ£¡¤²¼À¸¥ÂüµÄÒÆ¶¯×°±¸£¬£¬£¬£¬£¬²¢Ð¹Â¶ÁªÏµÈË¡¢ÕÕÆ¬¡¢ÊÓÆµ¼°Ô¼1900Ìõ̸Ìì¼Í¼¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬KelaÍøÂçÇ鱨¹«Ë¾µÄÉî¶Èȡ֤ÆÊÎöÕ¹ÏÖ£¬£¬£¬£¬£¬Ëùν¡°×°±¸ÈëÇÖ¡±ÊµÎªTelegramÕË»§Çå¾²Îó²îµÄ¼¯ÖÐ̻¶£º¹¥»÷Ä¿µÄ½öÏÞÓÚÌØ¶¨TelegramÕË»§£¬£¬£¬£¬£¬²¢Î´»ñȡװ±¸ÖÜÈ«»á¼ûȨÏÞ¡£¡£¡£¡£¡£Kela·¢Ã÷£¬£¬£¬£¬£¬Ð¹Â¶ÖÊÁÏÖд󶼶Ի°ÎªTelegramͬ²½±¬·¢µÄ¿ÕÁªÏµÈË¿¨Æ¬£¬£¬£¬£¬£¬½öÔ¼40¸ö¶Ô»°º¬ÏÖʵÐÂÎÅ£¬£¬£¬£¬£¬ÇÒʵÖÊÐÔ½»Á÷ÉÙÉÙ¡£¡£¡£¡£¡£ËùÓÐÆØ¹âÁªÏµÈ˾ù¹ØÁª»îÔ¾TelegramÕË»§£¬£¬£¬£¬£¬Ö¤ÊµÊý¾ÝÔ´×Ô¶¯Ì¬ÔÆ´æ´¢¶ø·Ç×°±¸ÍâµØ¡£¡£¡£¡£¡£´ËÊÂÎñ̻¶³ö¼ÓÃÜÆ½Ì¨ÕË»§ÖÎÀíµÄϵͳÐÔΣº¦£¬£¬£¬£¬£¬¼´±ãÈçTelegramÕâÀàÆ½Ì¨£¬£¬£¬£¬£¬ÆäĬÈÏÉèÖÃÒà·Å´óÁ˹¥»÷Ãæ£ºÔÆÃÜÂ빦ЧĬÈϽûÓ㬣¬£¬£¬£¬½öÐèÒ»´ÎÐÔÃÜÂë¼´¿ÉÍêÕû»á¼ûÕË»§£»£»£»£»£»±ê׼̸Ììȱ·¦¶Ëµ½¶Ë¼ÓÃÜ£¬£¬£¬£¬£¬Êý¾ÝÒÔÔÆÐÎʽ´æ´¢ÓÚЧÀÍÆ÷£¬£¬£¬£¬£¬¹¥»÷Ãæ±»ÏÔÖøÀ©Õ¹¡£¡£¡£¡£¡£
https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/


¾©¹«Íø°²±¸11010802024551ºÅ