DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
Ðû²¼Ê±¼ä 2025-07-101. DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
7ÔÂ9ÈÕ£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Trellix¸ß¼¶Ñо¿ÖÐÐÄÅû¶һÆðÕë¶ÔÅ·ÖÞÍâ½»»ú¹¹µÄ¶¨ÏòÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬Æä±³ºóÒÉËÆÉæ¼°Ó¡¶ÈÅä¾°µÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯DoNot Team£¨±ð³ÆAPT-C-35µÈ£©¡£¡£¡£¸Ã×éÖ¯×Ô2016ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬£¬ÒÔ¶¨ÖÆ»¯Windows¶ñÒâÈí¼þ£¨ÈçYTY¡¢GEditºóÃÅ£©Á¬ÏµÓã²æÊ½´¹ÂÚÓʼþΪÖ÷Òª¹¥»÷ÊֶΣ¬£¬£¬£¬ºã¾ÃÕë¶ÔÕþ¸®¡¢Íâ½»¡¢¹ú·À¼°·ÇÕþ¸®×éÖ¯Õö¿ªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬Ä¿µÄÇøÓò´Ëǰ¼¯ÖÐÓÚÄÏÑÇ£¬£¬£¬£¬´Ë´ÎÊ×´ÎÈ·ÈÏÆä¶ÔÅ·ÖÞÍâ½»ÁìÓòµÄÀ©ÕÅÐÔÉøÍ¸¡£¡£¡£´Ë´Î¹¥»÷Á´Ê¼ÓÚαװ³ÉÒâ´óÀûפÃϼÓÀ¹ú¹ú·ÀÎä¹Ù»á¼ûÐг̵Ĵ¹ÂÚÓʼþ£¬£¬£¬£¬¹¥»÷Õßͨ¹ýGmailÕË»§·¢ËÍUTF-8±àÂëµÄHTMLÃûÌÃÓʼþ£¬£¬£¬£¬Ê¹ÓÃÌØÊâ×Ö·û£¨Èç·¨Óï"Attach¨¦"£©ÔöÇ¿¿ÉÐŶȣ¬£¬£¬£¬ÓÕµ¼Ä¿µÄµã»÷GoogleÔÆ¶ËÓ²ÅÌÁ´½ÓÏÂÔØRARѹËõ°ü¡£¡£¡£Ñ¹Ëõ°üÄÚº¬Î±×°ÎªPDFÎĵµµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬Êܺ¦Õß·¿ªºó½«´¥·¢LoptikModÔ¶³Ì»á¼ûľÂí¡£¡£¡£¸ÃľÂíͨ¹ýÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯×¤Áô£¬£¬£¬£¬¾ß±¸ÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢ÎüÊÕÔ¶³ÌÖ¸Áî¡¢ÏÂÔØ¸½¼ÓÄ£¿£¿£¿£¿£¿éµÈ¹¦Ð§£¬£¬£¬£¬²¢½ÓÄÉ·´ÐéÄâ»úÊÖÒÕºÍASCII»ìÏýÊÖÒÕ¹æ±ÜÇå¾²ÆÊÎö£¬£¬£¬£¬Í¬Ê±Í¨¹ýµ¥ÊµÀýÔËÐлúÖÆ×èÖ¹³åÍ»¡£¡£¡£
https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html
2. ÈÕ±¾ÐÂÈÕÌú×Ó¹«Ë¾ÔâÁãÈÕ¹¥»÷ÖÂÊý¾Ýй¶
7ÔÂ9ÈÕ£¬£¬£¬£¬ÈÕ±¾ÐÂÈÕÌú¼¯ÍÅÆìÏÂ×Ó¹«Ë¾ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾£¨Nippon Steel Solutions£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬¹¥»÷ÕßʹÓÃδ¹ûÕæµÄÁãÈÕÎó²îÇÖÈëÆäÄÚ²¿ÍøÂ磬£¬£¬£¬µ¼Ö¿ͻ§¡¢ÏàÖúͬ°é¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¸Ã¹«Ë¾×¨×¢ÓÚÔÆÐ§ÀÍÓëÍøÂçÇå¾²½â¾ö¼Æ»®£¬£¬£¬£¬´Ë´ÎÊÂÎñÒòÆäÊÖÒÕÅä¾°¶ø±¸ÊܹØ×¢¡£¡£¡£2025Äê3ÔÂ7ÈÕ£¬£¬£¬£¬ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾¼à²âµ½Ð§ÀÍÆ÷Òì³£»£»£»î¶¯£¬£¬£¬£¬Ëæ¼´¸ôÀëÊÜÓ°Ïìϵͳ¡£¡£¡£¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÕë¶ÔÍøÂç×°±¸µÄÁãÈÕÎó²îʵÑéÈëÇÖ£¬£¬£¬£¬Ôì³ÉÄÚ²¿ÍøÂçδ¾ÊÚȨ»á¼û£¬£¬£¬£¬²¿·ÖÃô¸ÐÊý¾Ý¿ÉÄܱ»ÇÔÈ¡¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬¸Ã¹«Ë¾Ç¿µ÷ÆäÔÆÐ§ÀÍÆ½Ì¨Î´Êܲ¨¼°£¬£¬£¬£¬ÓªÒµÒ»Á¬ÐÔδÊÜÖ±½ÓÓ°Ïì¡£¡£¡£Æ¾Ö¤Í¨¸æ£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸ÇÈýÀàÖ÷Ì壺¿Í»§Êý¾Ý°üÀ¨ÐÕÃû¡¢¹«Ë¾Ãû³Æ¡¢ËùÊô»ú¹¹¡¢Ö°Î»¡¢µØµã¡¢ÓÊÏä¼°µç»°£»£»£»ÏàÖúͬ°éÐÅÏ¢Éæ¼°ÐÕÃû¼°¹«Ë¾ÓòÃûÓÊÏ䣻£»£»Ô±¹¤Êý¾ÝÔò°üÀ¨ÐÕÃû¡¢²¿·Ö¡¢Ö°Î»¼°ÆóÒµÓÊÏä¡£¡£¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢ÕâЩÐÅÏ¢ÒÑͨ¹ýÉ罻ýÌå»ò°µÍøÀ©É¢£¬£¬£¬£¬µ«¹«Ë¾ÈÔ¾¯Ê¾Óû§Ð¡ÐÄ¿ÉÒÉͨѶ£¬£¬£¬£¬×èÖ¹µã»÷²»Ã÷Á´½Ó»ò»Ø¸´ÉúÊèÀ´µç¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¹«Ë¾ÒÑÍê³ÉÄÚ²¿ÍøÂçÇå¾²»Ö¸´£¬£¬£¬£¬²¢Ïò¾¯·½¼°ÈÕ±¾Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»£»£»¤Î¯Ô±»áÌá½»±¨¸æ£¬£¬£¬£¬ÍÆÐз¨¶¨Åû¶ÒåÎñ¡£¡£¡£
https://securityaffairs.com/179766/data-breach/nippon-steel-solutions-data-breach.html
3. ÃÀ¹ú¼ÓÃÜATM¾ÞÍ·Bitcoin DepotÔâÓöÊý¾Ýй¶
7ÔÂ9ÈÕ£¬£¬£¬£¬ÃÀ¹ú×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin Depot¿ËÈÕÅû¶һÆðÓ°Ïì2.7Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬¸Ã¹«Ë¾Í¨¹ýÐżþ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬£¬ÊÂÎñ¿É×·ËÝÖÁ2024Äê6ÔÂ23ÈÕ£¬£¬£¬£¬ÆäÍøÂçÊ״μì²âµ½¿ÉÒɻ£¬£¬£¬£¬µ«ÒòÁª°îÖ´·¨»ú¹¹ÒªÇóÅäºÏÊӲ죬£¬£¬£¬Ö±ÖÁ7ÔÂ18ÈÕÄÚ²¿ÊÓ²ìÍê³Éºó·½ÄÜÆô¶¯Åû¶³ÌÐò¡£¡£¡£Æ¾Ö¤Í¨¸æ£¬£¬£¬£¬Î´¾ÊÚȨµÄ¹¥»÷Õß»ñÈ¡Á˲¿·Ö¿Í»§ÔÚKYCÑéÖ¤Àú³ÌÖÐÌá½»µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¼°µç×ÓÓÊÏäµÈ¡£¡£¡£Bitcoin DepotÔÚÈ«ÃÀ¡¢¼ÓÄô󼰰ĴóÀûÑÇÔËÓª×Å8800̨װ±¸£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°¹æÄ£ÆÕ±é¡£¡£¡£ÓÉÓÚ¼ÓÃÜÇ®±ÒÉúÒâµÄÄäÃûÐÔÓë×ʽð¿ìËÙÁ÷×ªÌØÕ÷£¬£¬£¬£¬¹Å°å½ðÈÚÁìÓòµÄÉí·Ý¼à¿ØÓë·ÀµÁЧÀÍÔڴ˳¡¾°ÖÐÄÑÒÔʵÑé¡£¡£¡£Bitcoin DepotÃ÷È·ÌåÏÖÎÞ·¨ÎªÊÜÓ°ÏìÓû§ÌṩÐÅÓñ£»£»£»¤»òÉí·Ý¼à¿ØÐ§ÀÍ£¬£¬£¬£¬×ª¶ø½¨ÒéÓû§×Ô¶¯¼à¿ØÕË»§Òì³£ÉúÒâ¡¢¶³½áÐÅÓñ¨¸æ²¢Ð¡ÐÄ´¹ÂÚ¹¥»÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/
4. ÃÀ¹ú˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerboxй¶24.5ÍòÌõÃô¸ÐÊý¾Ý
7ÔÂ9ÈÕ£¬£¬£¬£¬ÃÀ¹úµÃ¿ËÈøË¹ÖÝ˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerbox¿ËÈÕÒòδÉèÃÜÂë±£»£»£»¤µÄÊý¾Ý¿â̻¶£¬£¬£¬£¬µ¼ÖÂ245,949Ìõ¡¢×ܼÆ286.9GBµÄÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬º¸ÇÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢µØµã¡¢¼ÝʻִÕÕ¼°ÍËÎéÎäÊ¿DD214ÎļþµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£¡£¡£´Ë´ÎÊÂÎñÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷²¢±¨¸æÖÁvpnMentor¡£¡£¡£×÷ΪרעÓÚ¹ÍÖ÷˰ÊÕ¼¤ÀøÍýÏ루ÈçWOTC¡¢ERTCµÈ£©µÄЧÀÍÉÌ£¬£¬£¬£¬RockerboxΪ²ÍÒû¡¢Âùݡ¢Ò½ÁƵȶà¸öÐÐÒµµÄÆóÒµÌṩ˰ÎñÓÅ»¯Ö§³Ö£¬£¬£¬£¬Æäй¶µÄ¿Í»§Êý¾ÝÉæ¼°ÖØ´óµÄ²ÆÎñÓëСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£³ýÖ±½Ó´æ´¢µÄPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©Í⣬£¬£¬£¬´ó×Ú˰ÊÕµÖÃâÉêÇëÎļþ¡¢Åú×¼/¾Ü¾øº¯¼°ÃÜÂë±£»£»£»¤PDFµÄÎļþÃûÒ²Ôâ̻¶£¬£¬£¬£¬²¿·ÖÎļþÃû¿ÉÄÜÒþº¬ÃÜÂëÏßË÷£¬£¬£¬£¬½øÒ»²½¼Ó¾çÐÅÏ¢ÀÄÓÃΣº¦¡£¡£¡£FowlerÖ¸³ö£¬£¬£¬£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ¼°½ðÈÚڲƣ¬£¬£¬£¬¶ÔÊÜÓ°ÏìСÎÒ˽¼Ò×é³ÉÖØ´óÍþв¡£¡£¡£ÊÂÎñ̻¶ºó£¬£¬£¬£¬FowlerÁ¬Ã¦Í¨ÖªRockerbox£¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´×÷³öÕýʽ»ØÓ¦£¬£¬£¬£¬Êý¾Ý¿âÔÚÊýÈÕºó²Å±»¼ÓÃܱ£»£»£»¤¡£¡£¡£
https://hackread.com/rockerbox-server-tax-firm-exposed-sensitive-records/
5. AnatsaÒÆ¶¯¶ñÒâÈí¼þÔٴι¥»÷±±ÃÀÒøÐпͻ§
7ÔÂ9ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±È·ÈÏ£¬£¬£¬£¬ºã¾Ã»îÔ¾µÄAndroidÒøÐÐľÂíAnatsa½üÆÚÕë¶Ô±±ÃÀ½ðÈÚ»ú¹¹ÌᳫÐÂÒ»ÂÖ¹¥»÷£¬£¬£¬£¬ºÉÀ¼ThreatFabric¹«Ë¾×·×ÙÏÔʾ£¬£¬£¬£¬ÕâÒÑÊÇÆäÖÁÉÙµÚÈý´Î½«ÃÀ¹úÓë¼ÓÄôóÒÆ¶¯ÒøÐÐÓû§ÁÐΪĿµÄ¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼Í¼¼üÅÌÊäÈ뼰ͨ¹ýÔ¶³Ì¿ØÖÆÖ±½ÓʵÑéÚ²ÆÉúÒâµÄÄÜÁ¦£¬£¬£¬£¬ÆäÁ½½×¶Î¹¥»÷ģʽÒý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£±¾´Î¹¥»÷ÖУ¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈÔÚÓ¦ÓÃÊÐËÁÉϼܿ´ËÆÕýµ±µÄ¹¤¾ßÀàÓ¦Óã¨ÈçÎļþÔĶÁÆ÷£©£¬£¬£¬£¬³õÆÚ¹¦Ð§Õý³£ÒÔ»ýÀÛÓû§ÐÅÈΡ£¡£¡£´ýÏÂÔØÁ¿µÖ´ïÊýÍò´Îºó£¬£¬£¬£¬Í¨¹ý¸üÐÂ×¢Èë¶ñÒâ´úÂ룬£¬£¬£¬½«Anatsa×÷Ϊ×ÔÁ¦³ÌÐò×°ÖÃÖÁ×°±¸¡£¡£¡£ÒÔ±¾´Î°¸ÀýΪÀý£¬£¬£¬£¬Ò»¿îÎļþÔĶÁÆ÷Ó¦ÓÃÔÚ6ÔÂ24ÈÕÖÁ30ÈÕʱ´úÍÆË͸üУ¬£¬£¬£¬Ï¼ÜǰÒÑÔÚÃÀ¹úPlayÊÐËÁÃâ·Ñ¹¤¾ß°ñѹµ¹Ò»ÇУ¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬5Íò´Î¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬Anatsa´Ë´Î¹¥»÷Ä¿µÄÇåµ¥ÏÔÖøÀ©Õ¹£¬£¬£¬£¬ÁýÕÖÁ˸üÆÕ±éµÄÃÀ¹úÒÆ¶¯ÒøÐÐÓ¦Óᣡ£¡£
https://therecord.media/anatsa-android-banking-malware-returns-north-america
6. FlirtAIÔ¼»áÖúÊÖÒòδÊܱ£»£»£»¤Ôƴ洢й¶16ÍòÕÅ˽ÃܽØÍ¼
7ÔÂ8ÈÕ£¬£¬£¬£¬µÂ¹ú°ØÁÖ¹«Ë¾Buddy Network GmbH¿ª·¢µÄiOSÓ¦ÓÃFlirtAI¿ËÈÕÒòÔÆ´æ´¢Çå¾²Îó²îÒý·¢ÑÏÖØÊý¾Ýй¶£¬£¬£¬£¬³¬16ÍòÕÅÓû§ÉÏ´«µÄ˽ÃÜ̸Ìì½ØÍ¼Ì»Â¶ÓÚ¹«¹²»¥ÁªÍø¡£¡£¡£¸ÃÓ¦ÓÃÖ÷´òAI¸¨ÖúÉç½»¹¦Ð§£¬£¬£¬£¬Óû§ÐèÊÖ¶¯½ØÈ¡Ô¼»áÈí¼þ¶Ô»°»òСÎÒ˽¼Ò×ÊÁϽçÃæ²¢ÉÏ´«£¬£¬£¬£¬ÒÔ»ñÈ¡ÎåÌõ¶¨Öƻظ´½¨Òé¡£¡£¡£È»¶ø£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Æä¹È¸èÔÆ´æ´¢Í°Î´ÉèÖûá¼ûȨÏÞ¿ØÖÆ£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÊý¾Ýºã¾ÃÂã¶¡£¡£¡£Êý¾ÝÏÔʾÇàÉÙÄêÓû§Õ¼±ÈÏÔÖø£¬£¬£¬£¬ÆäÉÏ´«µÄ½ØÍ¼°üÀ¨Í¬ÁäÈË˽ÃܶԻ°£¬£¬£¬£¬²¿·Öδ³ÉÄêÈË¿ÉÄÜÍêÈ«²»ÖªÏþ̸ÌìÄÚÈݱ»½ØÍ¼Íâй¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬Ö»¹ÜÓ¦ÓÃÌõ¿îÒªÇó¡°ÉÏ´«Ç°Ðè»ñµÃ¶Ô»°·½ÊÚȨ¡±£¬£¬£¬£¬µ«ÏÖʵ²Ù×÷ÖÐÏÕЩÎÞ·¨Ö´ÐС£¡£¡£ËäȻƻ¹ûÊÐËÁ±ê×¢17+ÄêËêÏÞÖÆ£¬£¬£¬£¬ÈÔδÄÜÓÐÓÃ×èֹδ³ÉÄêÈËʹÓᣡ£¡£ÊÂÎñ´¦Öóͷ£Ê±¼äÏßÏÔʾ£¬£¬£¬£¬Ñо¿Ö°Ô±5ÔÂ6ÈÕ·¢Ã÷Îó²îºó£¬£¬£¬£¬ÓÚ5ÔÂ19ÈÕÏò¿ª·¢ÉÌת´ï£¬£¬£¬£¬6ÔÂ2ÈÕÁªÏµÅÌËã»úÓ¦¼±ÏìӦС×飨CERT£©£¬£¬£¬£¬×îÖÕÔÚ6ÔÂ16ÈÕÐÞ¸´´æ´¢Í°È¨ÏÞ¡£¡£¡£
https://cybernews.com/security/iphone-flirtai-app-leaks-chat-screenshots/


¾©¹«Íø°²±¸11010802024551ºÅ