安全研究 SECURITY SERVICE

UNC6201组织利用CVE-2026-22769零日漏洞部署恶意软件

发布时间: 2026-03-02
来源:
浏览数: 1025


UNC6201组织利用CVE-2026-22769零日漏洞部署恶意软件

UNC6201组织利用CVE-2026-22769零日漏洞部署恶意软件

 

https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day/

 

Lotus Blossom组织发起Notepad++软件供应链间谍攻击

 

https://dti.domaintools.com/research/lotus-blossom-and-the-notepad-supply-chain-espionage-campaign

 

揭秘多阶段恶意加载器OysterLoader

 

https://blog.sekoia.io/oysterloader-unmasked-the-multi-stage-evasion-loader/

 

KONNI组织利用AI生成PowerShell后门开展钓鱼攻击活动

 

https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware/


分享到:
  • 相关推荐 RELATED TO RECOMMEND
  • 点击次数: 1025
    2026 - 03 - 02
    UNC6201组织利用CVE-2026-22769零日漏洞部署恶意软件 https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day/ Lotus Blossom组织发起Notepad++软件供应链间谍攻击 https://dti.domaintools.com/research/lotus-blossom-and-the-notepad-supply-chain-espionage-campaign 揭秘多阶段恶意加载器OysterLoader https://blog.sekoia.io/oysterloader-unmasked-the-multi-stage-evasion-loader/ KONNI组织利用AI生成PowerShell后门开展钓鱼攻击活动 https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware/
  • 点击次数: 1024
    2026 - 02 - 09
    新型多阶段恶意软件攻击活动利用VHD文件传播AsyncRAT https://www.securonix.com/blog/deadvax-threat-research-security-advisory/ Interlock勒索软件组织针对北美教育组织发起攻击 https://www.fortinet.com/blog/threat-research/interlock-ransomware-new-techniques-same-old-tricks 攻击者利用虚假LINE安装程序部署ValleyRAT恶意软件 https://www.cybereason.com/blog/fake-installer-valleyrat Transparent Tribe组织瞄准印度初创企业传播Crimson RAT https://www.acronis.com/en/tru/posts/new-year-new-sector-transparent-tribe-targets-indias-startup-ecosystem/
  • 点击次数: 127
    2025 - 12 - 15
    GOLD BLADE组织使用定制恶意软件针对加拿大多个行业 https://news.sophos.com/en-us/2025/12/05/sharpening-the-knife-gold-blades-strategic-evolution/ 微软补丁日通告:2025年12月版 https://msrc.microsoft.com/update-guide/releaseNote/2025-Dec 攻击者利用React2Shell漏洞部署新型EtherRAT恶意软件 https://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacks 研究人员发现多集群Cobalt Strike攻击活动瞄准俄罗斯 https://www.seqrite.com/blog/operation-frostbeacon-multi-cluster-cobalt-strike-campaign-targets-russia/ 新型DroidLock恶意软件可锁定Android设备并勒索赎金 https://zimperium.com/blog/total-takeover-droidlock-hijacks-your-device
  • 点击次数: 109
    2025 - 12 - 10
    APT36利用ELF恶意软件瞄准印度政府机构  https://www.cyfirma.com/research/apt36-python-based-elf-malware-targeting-indian-government-entities/ 攻击者创建以节日促销为主题的虚假在线网站进行欺诈活  https://cybersecuritynews.com/hackers-registered-2000-fake-holiday-themed-online-stores/ 攻击者利用虚假招聘诱饵传播FlexibleFerret恶意软件 https://www.jamf.com/blog/flexibleferret-macos-malware-recruitment-lure/ Water Saci攻击活动通过WhatsApp传播恶意软件  https://www.trendmicro.com/en_us/research/25/l/water-saci.html Lazarus组织开展针对美国多种行业IT员工的渗透行动  https://any.run/cybersecurity-blog/lazarus-group-it-workers-investigation/
  • 点击次数: 1033
    2025 - 11 - 24
    朝鲜Konni组织针对安卓设备发起远程数据擦除攻击  https://hackread.com/hackers-kakaotalk-google-find-hub-android-spyware/ Xillen Stealer恶意软件新版本可绕过AI检测 https://www.darktrace.com/blog/xillen-stealer-updates-to-version-5-to-evade-ai-detection Tsundere僵尸网络利用游戏诱饵和基于以太坊的C2在Windows上扩张 https://thehackernews.com/2025/11/tsundere-botnet-expands-using-game.html PlushDaemon组织利用EdgeStepper植入程序执行中间人攻击 https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/
友情连接:
免费服务热线 ree service hotline 400-613-1868 手机端
法律声明 Copyright  西安交大捷普网络科技有限公司  陕ICP备18022218号-1

陕公网安备 61019002000857号

犀牛云提供云计算服务