ÀÕË÷Èí¼þÍÅ»ïÔÚ BYOVD ¹¥»÷ÖÐʹÓà Paragon Partition Manager Îó²î

Ðû²¼Ê±¼ä 2025-03-03

1. ÀÕË÷Èí¼þÍÅ»ïÔÚ BYOVD ¹¥»÷ÖÐʹÓà Paragon Partition Manager Îó²î


3ÔÂ1ÈÕ£¬£¬£¬£¬Î¢Èí½üÆÚ·¢Ã÷ÁËParagon Partition ManagerÖеÄÎå¸öBioNTdrv.sysÇý¶¯³ÌÐòȱÏÝ£¬£¬£¬£¬ÆäÖÐÒ»¸öÒѱ»ÀÕË÷Èí¼þÍÅ»ïÔÚÁãÈÕ¹¥»÷ÖÐʹÓ㬣¬£¬£¬ÒÔ»ñÈ¡WindowsϵͳµÄSYSTEMȨÏÞ¡£¡£¡£¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÓÚ¡°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò¡±£¨BYOVD£©¹¥»÷£¬£¬£¬£¬¹¥»÷Õßͨ¹ý°²ÅÅÄÚºËÇý¶¯³ÌÐòÔÚÄ¿µÄϵͳÉÏÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£CERT/CCÖÒÑԳƣ¬£¬£¬£¬¾ßÓÐ×°±¸ÍâµØ»á¼ûȨÏ޵Ĺ¥»÷ÕßÄÜʹÓÃÕâЩÎó²îÌáÉýȨÏÞ»òÒý·¢¾Ü¾øÐ§ÀÍ(DoS)¹¥»÷¡£¡£¡£¡£¡£¡£ÓÉÓÚÉæ¼°Î¢ÈíÊðÃûµÄÇý¶¯³ÌÐò£¬£¬£¬£¬×ÝȻδװÖÃParagon Partition Manager£¬£¬£¬£¬¹¥»÷ÕßÒ²ÄÜʹÓÃBYOVDÊÖÒÕ¡£¡£¡£¡£¡£¡£BioNTdrv.sys×÷ΪÄں˼¶Çý¶¯³ÌÐò£¬£¬£¬£¬Ê¹ÍþвÐÐΪÕßÄÜÈÆ¹ý±£»£»£»£»£»£»¤ºÍÇå¾²Èí¼þÖ´ÐÐÏÂÁî¡£¡£¡£¡£¡£¡£Î¢ÈíÒÑÊӲ쵽CVE-2025-0289Îó²î±»ÓÃÓÚBYOVDÀÕË÷Èí¼þ¹¥»÷ÖС£¡£¡£¡£¡£¡£Paragon SoftwareÒÑÐÞ²¹ÕâЩÎó²î£¬£¬£¬£¬Î¢ÈíÒ²½«Ò×Êܹ¥»÷µÄBioNTdrv.sys°æ±¾¼ÓÈë×èÖ¹Áбí¡£¡£¡£¡£¡£¡£½¨ÒéÓû§Éý¼¶µ½°üÀ¨½â¾öËùÓÐȱÏݵÄBioNTdrv.sys°æ±¾2.0.0µÄ×îÐÂÈí¼þ°æ±¾¡£¡£¡£¡£¡£¡£µ«Ðè×¢ÖØ£¬£¬£¬£¬Î´×°ÖÃParagon Partition ManagerµÄÓû§Ò²¿ÉÄÜÊܵ½¹¥»÷£¬£¬£¬£¬ÓÉÓÚBYOVDÕ½ÂÔ²»ÒÀÀµÓÚÄ¿µÄÈí¼þ¡£¡£¡£¡£¡£¡£Î¢ÈíÒѸüÐÂÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò×èÖ¹ÁÐ±í£¬£¬£¬£¬Óû§Ó¦Ñé֤ϵͳ±£»£»£»£»£»£»¤ÊÇ·ñÆôÓᣡ£¡£¡£¡£¡£Paragon Software»¹ÖÒÑÔÓû§Éý¼¶Paragon Hard Disk Manager£¬£¬£¬£¬ÒòËüʹÓÃÏàͬÇý¶¯³ÌÐò¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-gangs-exploit-paragon-partition-manager-bug-in-byovd-attacks/


2. ÷è÷ëÀÕË÷Èí¼þÍÅ»ïÍþвLee Enterprises£¬£¬£¬£¬Éù³Æ½«¹ûÕæ350GBÇÔÈ¡Êý¾Ý


2ÔÂ28ÈÕ£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô2ÔÂ3ÈÕÕë¶ÔÃÀ¹úýÌ幫˾Lee EnterprisesµÄÍøÂç¹¥»÷ÈÏÕæ£¬£¬£¬£¬´Ë´Î¹¥»÷µ¼Ö¸ù«Ë¾ÔËÓªÖÐÖ¹£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË×ܼÆ350GBµÄ120,000¸öÎļþ£¬£¬£¬£¬°üÀ¨Õþ¸®Éí·Ý֤ɨÃè¼þ¡¢±£ÃÜЭÒé¡¢²ÆÎñµç×Ó±í¸ñµÈÉñÃØÎļþ¡£¡£¡£¡£¡£¡£Lee EnterprisesÒÑÈ·ÈÏÊÕµ½ÕâЩָ¿Ø²¢ÕýÔÚÊӲ졣¡£¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÍÅ»ïÍþв³Æ£¬£¬£¬£¬³ý·ÇÖ§¸¶Êê½ð£¬£¬£¬£¬²»È»½«ÓÚ3ÔÂ5ÈÕ¹ûÕæËùÓоݳƱ»µÁµÄÊý¾Ý¡£¡£¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×Ô2022ÄêÍÆ³öÒÔÀ´£¬£¬£¬£¬ÒÑÈ¡µÃÁËÏÔÖøÏ£Íû£¬£¬£¬£¬²¢ÔÚÊÖÒÕ·½ÃæÒ»Ö±Ñݽø£¬£¬£¬£¬ÍƳöÁËLinux±äÌå¡¢×Ô½ç˵Chromeƾ֤ÇÔÈ¡³ÌÐòÒÔ¼°»ùÓÚRustµÄÊý¾Ý´¢Îï¹ñµÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Î¢Èí±¨¸æ³Æ£¬£¬£¬£¬¡°É¢²¼Ö©Ö롱ºÚ¿Í¼¯ÍųÉÔ±Ò²×îÏÈʹÓÃ÷è÷ëÀÕË÷Èí¼þ¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÌáÐÑÆóÒµºÍСÎÒ˽¼ÒÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬£¬Ìá·ÀÀÕË÷Èí¼þµÈÍøÂçÍþв¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/


3. Skype½«ÓÚ5Ô¹رգ¬£¬£¬£¬Î¢ÈíÍÆ¶¯Óû§Ç¨áãÖÁTeams


2ÔÂ28ÈÕ£¬£¬£¬£¬Î¢ÈíÒÑÈ·ÈÏ£¬£¬£¬£¬ÆäÊÓÆµÍ¨»°ºÍÐÂÎÅЧÀÍSkype½«ÓÚ2025Äê5ÔÂ5ÈÕÏÂÏß¡£¡£¡£¡£¡£¡£Skype×Ô2011Ä걻΢ÈíÊÕ¹ºÒÔÀ´£¬£¬£¬£¬Ò»Ö±×÷Ϊ¸Ã¹«Ë¾µÄÖ÷ҪͨѶ¹¤¾ß£¬£¬£¬£¬µ«ÏÖÔÚ΢ÈíÕýÍÆ¶¯Óû§Ç¨áãµ½ÆäÃæÏòÏûºÄÕßµÄÃâ·ÑTeamsÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£¾ÝBleepingComputer±¨µÀ£¬£¬£¬£¬WindowsºÍMac°æµÄSkypeÔ¤ÀÀ°æÖÐÒÑ·ºÆðÌáÐÑÓû§Çл»µ½TeamsµÄ×Ö·û´®£¬£¬£¬£¬Ò»µ©Óû§µÇ¼ÕÊ»§£¬£¬£¬£¬ËûÃǵÄËùÓÐÁªÏµÈË¡¢Í¨»°¼Í¼ºÍÐÂÎŶ¼»á×Ô¶¯Ç¨áã¡£¡£¡£¡£¡£¡£ÈôÊÇÓû§²»ÏëÇл»µ½Teams£¬£¬£¬£¬ËûÃÇ¿ÉÒÔµ¼³ö̸Ìì¼Í¼ºÍÐÂÎÅÖзÖÏíµÄͼÏñ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬ÔÚ¹ý¶Éʱ´ú£¬£¬£¬£¬TeamsÓû§¿ÉÒÔÓëSkypeÓû§Í¨»°ºÍ̸Ìì¡£¡£¡£¡£¡£¡£Ëæ×ÅSkypeµÄ¹Ø±Õ£¬£¬£¬£¬Î¢Èí½«×èÖ¹Ìṩ¸¶·ÑSkype¹¦Ð§£¬£¬£¬£¬°üÀ¨SkypeµãÊýºÍÓïÒôͨ»°¡£¡£¡£¡£¡£¡£Î¢Èí365Э×÷Ó¦ÓÃÓëÆ½Ì¨×ܲÃJeff TeperÌåÏÖ£¬£¬£¬£¬Ê¹ÓÃTeams£¬£¬£¬£¬Óû§¿ÉÒÔ»á¼ûSkypeÖеÄÐí¶à½¹µã¹¦Ð§£¬£¬£¬£¬²¢»ñµÃ¸ü¶àÔöÇ¿¹¦Ð§¡£¡£¡£¡£¡£¡£Skype×î³õÓÚ2003ÄêÐû²¼£¬£¬£¬£¬ÌìÌìÓÐÁè¼Ý3600ÍòÈËʹÓÃËü¾ÙÐе绰ºÍ̸ÌìÁªÏµ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-its-killing-off-skype-in-may-after-14-years/


4. ´óÐÍÓïÑÔÄ£×ÓѵÁ·Êý¾Ý¼¯ÖоªÏÖÍòÓàʵʱÉñÃØ


2ÔÂ28ÈÕ£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬ÓÃÓÚѵÁ·´óÐÍÓïÑÔÄ£×Ó£¨LLM£©µÄÊý¾Ý¼¯±»·¢Ã÷°üÀ¨½ü12,000¸ö¿ÉÓÃÓÚÉí·ÝÑéÖ¤µÄʵʱÉñÃØ£¬£¬£¬£¬ÕâÔÙ´Î͹ÏÔÁËÓ²±àÂëÆ¾Ö¤µÄÇ徲Σº¦¡£¡£¡£¡£¡£¡£Truffle Security´ÓCommon CrawlµÄÖØ´óÊý¾Ý¼¯Öз¢Ã÷ÁËÕâЩÉñÃØ£¬£¬£¬£¬¸ÃÊý¾Ý¼¯°üÀ¨18ÄêÀ´Áè¼Ý2500ÒÚ¸öÒ³Ãæ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Lasso SecurityÔøÖÒÑÔ£¬£¬£¬£¬Í¨¹ý¹«¹²Ô´´úÂë´æ´¢¿âй¶µÄÊý¾Ý¿Éͨ¹ýAI̸Ìì»úеÈË»á¼û£¬£¬£¬£¬×ÝÈ»ÒÑÉèΪ˽ÓУ¬£¬£¬£¬ÕâÖÖ¹¥»÷ÒªÁì·¢Ã÷Á˶à¸ö×ÅÃû×éÖ¯µÄ´æ´¢¿â̻¶ÁË˽ÈËÁîÅÆºÍÃÜÔ¿¡£¡£¡£¡£¡£¡£ÐÂÑо¿Åú×¢£¬£¬£¬£¬¶Ô²»Çå¾²´úÂëʾÀý¾ÙÐÐAIÓïÑÔÄ£×Ó΢µ÷¿ÉÄܵ¼ÖÂÒâÍâÓк¦ÐÐΪ£¬£¬£¬£¬³ÆÎªÍ»·¢´íλ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬Ä£×Ó¾­ÓÉ΢µ÷ºó£¬£¬£¬£¬¿ÉÒÔÔÚ²»Í¸Â¶µÄÇéÐÎÏÂÊä³ö²»Çå¾²µÄ´úÂ룬£¬£¬£¬²¢Óë±àÂëÎÞ¹ØµÄÆÕ±éÌáÐÑÉÏÌåÏַׯçÖ¡£¡£¡£¡£¡£¡£ÕâÖÖ¶Ô¿¹ÐÔ¹¥»÷±»³ÆÎª¼´Ê±×¢È룬£¬£¬£¬¿Éµ¼ÖÂLLMÔÚ²»ÖªÇéµÄÇéÐÎÏÂÌìÉú±»Õ¥È¡µÄÄÚÈÝ¡£¡£¡£¡£¡£¡£Palo Alto Networks Unit 42µÄÊӲ췢Ã÷£¬£¬£¬£¬ËùÓÐÊÓ²ìµÄGenAIÍøÂç²úÆ·¶¼±£´æÒ»¶¨Ë®Æ½µÄÒ×±»Ô½ÓüµÄΣº¦¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬´óÐÍÍÆÀíÄ£×ÓµÄ˼Ð÷Á´ÖÐÐÄÍÆÀí¿ÉÄÜ»á±»Ð®ÖÆ£¬£¬£¬£¬¶ø¡°logit bias¡±²ÎÊýµÄ²»µ±µ÷½âÒ²¿ÉÄܵ¼ÖÂÄ£×Ó±¬·¢²»Êʵ±»òÓꦵÄÄÚÈÝ¡£¡£¡£¡£¡£¡£ÕâЩ·¢Ã÷Ç¿µ÷ÁËÔöÇ¿AIÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html


5. ÃÀÕþ¸®ÀÖ³É×·»ØUranium Finance±»µÁ3100ÍòÃÀÔª¼ÓÃÜÇ®±Ò


2ÔÂ28ÈÕ£¬£¬£¬£¬2021Äê4Ô£¬£¬£¬£¬»ùÓÚ±Ò°²ÖÇÄÜÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Ð­ÒéUranium FinanceÉÏÏߺ󲻾ñãÔâÓöÁËÁ½´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¸Ãƽ̨×÷Ϊ×Ô¶¯×öÊÐÉÌ£¨AMM£©ÔË×÷£¬£¬£¬£¬ÀàËÆÓÚUniswap¡£¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃÖÇÄܺÏÔ¼ÖеÄÎó²î£¬£¬£¬£¬ÔÚÁ½´Î¹¥»÷Öл®·ÖµÁ×ßÁË140ÍòÃÀÔªºÍ5200ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò£¬£¬£¬£¬×ܼÆÔì³ÉÁè¼Ý5370ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿ÍÔÚµÚÒ»´Î¹¥»÷ºóËÍ»¹Á˲¿·Ö×ʽ𣬣¬£¬£¬µ«ÈÔÁôÏÂÁË385,500ÃÀÔª£¬£¬£¬£¬²¢Í¨¹ýTornado Cash¾ÙÐÐÁËÏ´Ç®¡£¡£¡£¡£¡£¡£ÕâЩ±»µÁ×ʽðͨÒÑÍùÖÐÐÄ»¯ÉúÒâËùת»»³ÉÁËÖÖÖÖ¼ÓÃÜÇ®±Ò£¬£¬£¬£¬²¢´æ·ÅÔÚÏÐÖÃÇ®°üÖжàÄê¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ÔÚÇø¿éÁ´Ç鱨¹«Ë¾TRM LabsµÄЭÖúÏ£¬£¬£¬£¬Å¦Ô¼ÄÏÇø£¨SDNY£©ºÍÁìÍÁÇå¾²ÊÓ²ì¾Ö£¨HSI£©Ê¥µØÑǸç·Ö¾ÖÀÖ³É×·×Ù²¢×·»ØÁ˲¿·Ö±»µÁ×ʲú¡£¡£¡£¡£¡£¡£TRM LabsÓëÖ´·¨²¿·ÖÇ×½üÏàÖú£¬£¬£¬£¬Ï꾡׷×ÙÁ˶à¸öÇø¿éÁ´Öб»µÁ×ʲúµÄÁ÷¶¯ÇéÐΣ¬£¬£¬£¬²¢ÌṩÁ˿ɲÙ×÷µÄÇ鱨¡£¡£¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬Ö´·¨²¿·ÖÓÚ2025Äê2ÔÂÀֳɿÛѺÁË3100ÍòÃÀÔªµÄδËÍ»¹×ʽ𣬣¬£¬£¬Áè¼ÝÁËÒ»°ëµÄËðʧµÃÒÔÍì»Ø¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Å¦Ô¼ÖÝÄÏÇø¾¯Ô±¾ÖÕýÒªÇóºÚ¿Í¹¥»÷µÄÊܺ¦Õß·¢Ë͵ç×ÓÓʼþÒÔÁìÈ¡²¿·Ö±»×·»ØµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/


6. ÍøÂç´¹ÂڻʹÓÃÐéαCAPTCHAÈö²¥Lumma Stealer¶ñÒâÈí¼þ


2ÔÂ28ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±½ÒÆÆÁËÒ»³¡´ó¹æÄ£ÍøÂç´¹Âڻ£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÍйÜÔÚWebflow CDNÉϵÄPDFÎĵµ£¬£¬£¬£¬Í¨¹ýÐéαµÄCAPTCHAͼÏñÈö²¥Lumma Stealer¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Netskope Threat Labs·¢Ã÷Áè¼Ý260¸öÓòÃûÍйÜÁË5000¸ö´¹ÂÚPDFÎļþ£¬£¬£¬£¬ÕâЩÎļþ½«Êܺ¦ÕßÖØ¶¨ÏòÖÁ¶ñÒâÍøÕ¾¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃSEOÓÕÆ­Êܺ¦Õßµã»÷¶ñÒâËÑË÷Ч¹û£¬£¬£¬£¬²¢Í¨¹ýÔÚÏßͼÊé¹ÝºÍPDF´æ´¢¿âÉÏ´«PDFÎļþÒÔÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£¡£¡£ÕâЩPDF°üÀ¨Î±ÔìµÄCAPTCHA£¬£¬£¬£¬ÓÕÆ­Êܺ¦ÕßÖ´ÐжñÒâPowerShellÏÂÁ£¬£¬£¬×îÖÕµ¼ÖÂLumma StealerµÄ×°Öᣡ£¡£¡£¡£¡£×Ô2024ÄêϰëÄêÒÔÀ´£¬£¬£¬£¬¸Ã»î¶¯ÒÑÓ°Ïì1150¶à¸ö×éÖ¯ºÍ7000¶àÃûÓû§£¬£¬£¬£¬Ö÷Òª¼¯ÖÐÔÚ±±ÃÀ¡¢ÑÇÖÞºÍÄÏÅ·¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Lumma StealerÈÕÖ¾ÔÚÒ»¸öкڿÍÂÛ̳Leaky[.]proÉÏÃâ·Ñ¹²Ïí£¬£¬£¬£¬Åú×¢¸Ã¶ñÒâÈí¼þÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ä£Ê½³öÊÛ£¬£¬£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´ÓÊÜѬȾWindowsÖ÷»úÖлñÈ¡´ó×ÚÐÅÏ¢µÄÒªÁì¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçVidarºÍAtomic macOS StealerÒ²½ÓÄÉÀàËÆÒªÁìÈö²¥£¬£¬£¬£¬ÍøÂç´¹ÂÚ¹¥»÷»¹ÀÄÓÃÁËÒ»ÖÖеÄJavaScript»ìÏýÊÖÒÕ¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷¸ß¶È¸öÐÔ»¯£¬£¬£¬£¬°üÀ¨·Ç¹ûÕæÐÅÏ¢£¬£¬£¬£¬²¢ÊµÑéͨ¹ýÖØ¶¨ÏòÖÁÁ¼ÐÔÍøÕ¾À´ÖÐÖ¹¹¥»÷£¬£¬£¬£¬ÔöÌíÁËÆäÒþ²ØÐÔºÍÖØ´óÐÔ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html