{"vulnerability": "CVE-2025-26633", "sightings": [{"uuid": "0efe08e1-45c3-469e-b055-41d6f8d2d4bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/thehackernews/6620", "content": "\ud83d\udc40 Microsoft Credits EncryptHub \u2014 the Hacker Behind 618+ Breaches \u2014 for Disclosing Windows Flaws. \ud83d\udc40\n\nIn March 2025, EncryptHub reported 2 critical bugs (CVE-2025-24061 &amp; CVE-2025-24071).\n\nWeeks later, he exploited a zero-day (CVE-2025-26633), hitting hundreds of targets using ChatGPT-built malware.\n\n\ud83d\udd17 Full story: https://thehackernews.com/2025/04/microsoft-credits-encrypthub-hacker.html", "creation_timestamp": "2025-04-05T17:55:19.000000Z"}, {"uuid": "faa713bc-1f4d-460f-8744-3ac0e70a6ac3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/thehackernews/6560", "content": "\ud83d\udc40 Running an unpatched Windows system? You\u2019re a target.\n\nHackers are exploiting CVE-2025-26633: EncryptHub hijacks Windows MMC with a stealthy .msc file swap via MUIPath, loading malware like Rhadamanthys and StealC through a fake \u201cen-US\u201d folder.\n\n\ud83e\uddea Trend Micro calls it \"MSC EvilTwin.\"\n\nRead: https://thehackernews.com/2025/03/encrypthub-exploits-windows-zero-day-to.html\n\nPatch now. Share widely.", "creation_timestamp": "2025-03-26T15:04:10.000000Z"}, {"uuid": "44e673b6-175a-462a-9af3-044cdbaa7ef3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/thehackernews/6585", "content": "\ud83d\udea8 A Russian group, Water Gamayun, is abusing a Windows zero-day (CVE-2025-26633) to drop two chilling backdoors: SilentPrism &amp; DarkWisp.\n\nThey\u2019re hiding in plain sight\u2014using signed .msi files posing as legit apps like DingTalk &amp; VooV to hijack systems.\n\n\ud83d\udc40 Targets? Your data, credentials, and even crypto wallets.\n\n\ud83d\udc80 Techniques? Living-off-the-land, PowerShell implants, fake WinRAR sites\u2014pure cyber espionage playbook.\n\n\ud83d\udd17 Learn more: https://thehackernews.com/2025/03/russian-hackers-exploit-cve-2025-26633.html", "creation_timestamp": "2025-03-31T18:44:20.000000Z"}, {"uuid": "8da6f745-c8bc-4c1c-910f-119f08b76ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3llouzzeylk2r", "content": "", "creation_timestamp": "2025-03-31T17:28:36.512447Z"}, {"uuid": "c8905693-5ccb-4aac-be13-ad9b5ea3ff7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/techit.bsky.social/post/3llov4nrrz52c", "content": "", "creation_timestamp": "2025-03-31T17:30:06.084392Z"}, {"uuid": "f035972d-57e0-4a76-a7d8-7f616c567292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://thehackernews.com/2025/03/russian-hackers-exploit-cve-2025-26633.html", "content": "", "creation_timestamp": "2025-03-31T14:41:00.000000Z"}, {"uuid": "9d15c552-073e-4fb9-96ba-f2b41bd9e797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://bsky.app/profile/montxt.bsky.social/post/3llow4dfkry26", "content": "", "creation_timestamp": "2025-03-31T17:47:47.349627Z"}, {"uuid": "6dde7940-3f7f-4318-a31c-18513a6f285f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llow67d3qm2k", "content": "", "creation_timestamp": "2025-03-31T17:48:50.164933Z"}, {"uuid": "7509222a-c878-4da6-a585-2a9d43d90466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3llpstnb6h52n", "content": "", "creation_timestamp": "2025-04-01T02:21:54.391821Z"}, {"uuid": "a11d9e0d-651b-4ec8-ae33-0381a8c27b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lloy7sr6ne26", "content": "", "creation_timestamp": "2025-03-31T18:25:32.133168Z"}, {"uuid": "721ae2f6-7a57-4862-8aac-829735fe0bf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://mastodon.social/users/verbrecher/statuses/114258753721796989", "content": "", "creation_timestamp": "2025-03-31T19:43:42.297234Z"}, {"uuid": "d939d1f3-4854-4a73-afcb-7f221f74eb18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://mastodon.social/users/verbrecher/statuses/114258753721796989", "content": "", "creation_timestamp": "2025-03-31T19:43:42.299723Z"}, {"uuid": "5ae47837-aba2-4e34-a9c8-0bf389edc6e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llpw55yz7zo2", "content": "", "creation_timestamp": "2025-04-01T03:21:00.634299Z"}, {"uuid": "d1947809-7cfe-4f58-a31f-662c64dbb46f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-25T08:06:32.000000Z"}, {"uuid": "40220d97-8f86-40e9-9d91-ec6a557e6b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3543143", "content": "", "creation_timestamp": "2025-03-11T20:08:09.323596Z"}, {"uuid": "6b27bd96-5cc1-43ba-995c-eabc1068c430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lk72fmjrsk2x", "content": "", "creation_timestamp": "2025-03-12T16:56:47.193622Z"}, {"uuid": "6c35a915-1ca0-430c-bdff-8b872a101d1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3llbxr3hlvr2e", "content": "", "creation_timestamp": "2025-03-26T14:12:41.469899Z"}, {"uuid": "e2bf3634-a904-4f0c-a82b-4246b0c4ad43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3llbya4ilet2o", "content": "", "creation_timestamp": "2025-03-26T14:21:06.107824Z"}, {"uuid": "0b158691-c63f-4c6a-9435-6faa305808e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/thezdi.bsky.social/post/3ll7iak2vak2k", "content": "", "creation_timestamp": "2025-03-25T14:29:41.466441Z"}, {"uuid": "326ad2ec-3677-45ed-8ff8-e6559e9cb7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "MISP/b0164795-079d-4aa7-a45d-95d2657051db", "content": "", "creation_timestamp": "2025-03-12T12:08:20.000000Z"}, {"uuid": "f4ad67ae-2b66-4fd4-9a1d-b2e78080a024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/wdormann.infosec.exchange.ap.brid.gy/post/3llc4pekyzut2", "content": "", "creation_timestamp": "2025-03-26T15:44:43.416039Z"}, {"uuid": "6c9f101e-ac91-41b4-b30a-f708f631e907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://www.thezdi.com/blog/2025/3/11/the-march-2025-security-update-review", "content": "", "creation_timestamp": "2025-03-11T16:39:36.000000Z"}, {"uuid": "65dc6cd2-1626-4e3b-aedb-4b0f6a123518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/opalsec.io/post/3llaqyelsf22s", "content": "", "creation_timestamp": "2025-03-26T02:38:49.727488Z"}, {"uuid": "6199d874-4b9c-4e28-bdfd-75bf485a0ccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3llcajpu32t26", "content": "", "creation_timestamp": "2025-03-26T16:49:37.938447Z"}, {"uuid": "d6de535e-a52a-4505-8766-f92448fc019d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3llbjq2g4zw24", "content": "", "creation_timestamp": "2025-03-26T10:01:34.677350Z"}, {"uuid": "52eaf854-fc16-4f09-9d11-d65669b6a460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/defendopsdiaries.bsky.social/post/3ll7qoodyru2s", "content": "", "creation_timestamp": "2025-03-25T17:00:44.685364Z"}, {"uuid": "8768cf96-e17d-4c22-9bd8-d8663312b8d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3ll7stzuff52m", "content": "", "creation_timestamp": "2025-03-25T17:39:31.530998Z"}, {"uuid": "4aad53ba-a750-45ea-9775-714eb09d6b54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/cyberwatchers.bsky.social/post/3llbffug4gs2e", "content": "", "creation_timestamp": "2025-03-26T08:44:23.193507Z"}, {"uuid": "16ccd723-d0fb-430e-b676-caf829df5511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/virusbtn.bsky.social/post/3lle3iji6zc23", "content": "", "creation_timestamp": "2025-03-27T10:24:55.667590Z"}, {"uuid": "78c19c0e-7fbc-4287-ac14-aee2701155a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llf4q643ik2g", "content": "", "creation_timestamp": "2025-03-27T20:19:37.989984Z"}, {"uuid": "ad084fe8-dc24-4ec7-ae24-a3f9971338ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114144902283889820", "content": "", "creation_timestamp": "2025-03-11T17:09:47.142752Z"}, {"uuid": "3327764d-ed9b-4497-9abf-69eea8ffb399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lk6nstghd72d", "content": "", "creation_timestamp": "2025-03-12T13:11:31.833612Z"}, {"uuid": "a8e2cdbe-9417-4801-bff5-d443439971e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llbh5ui7n22o", "content": "", "creation_timestamp": "2025-03-26T09:15:38.357271Z"}, {"uuid": "fd42e45a-ab50-4b4d-b25f-fa415a2630fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-11T18:10:04.000000Z"}, {"uuid": "42d416cb-808b-480e-98cd-b1b3031a5ff7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3llrdpwrvoc2x", "content": "", "creation_timestamp": "2025-04-01T16:56:43.897160Z"}, {"uuid": "94c03e5b-8c7c-4f37-8b74-d30cfb563bea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/reconbee.bsky.social/post/3llrhbw7z622j", "content": "", "creation_timestamp": "2025-04-01T18:00:31.890310Z"}, {"uuid": "fd813584-7579-4c37-883a-8d34d4719179", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://swecyb.com/users/nopatience/statuses/114241756582311689", "content": "", "creation_timestamp": "2025-03-28T19:41:33.086577Z"}, {"uuid": "5d37f5bc-f4f4-44ce-a6d8-f6d2b342bb52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://swecyb.com/users/nopatience/statuses/114241756582311689", "content": "", "creation_timestamp": "2025-03-28T19:41:33.094044Z"}, {"uuid": "f6c75512-5fd9-4bc2-82e9-cba09d16ed88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://threatintel.cc/2025/04/01/russian-hackers-exploit-cve-via.html", "content": "", "creation_timestamp": "2025-04-01T10:40:10.000000Z"}, {"uuid": "ec94bbec-f469-4b3d-9376-b1c37db30776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llruypcurcp2", "content": "", "creation_timestamp": "2025-04-01T22:11:02.473508Z"}, {"uuid": "5fd9c57c-712e-40d1-8981-4e5734a1e29c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lpcdujd4u72k", "content": "", "creation_timestamp": "2025-05-16T15:30:07.342478Z"}, {"uuid": "2597a7d3-bec0-4388-890d-b612c6a04c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lq3o7ukoa222", "content": "", "creation_timestamp": "2025-05-26T17:11:59.379508Z"}, {"uuid": "515dd0a3-5463-4a63-9d6f-fdd2ae4b13e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m6i5eh6qgx2y", "content": "", "creation_timestamp": "2025-11-25T20:07:39.110068Z"}, {"uuid": "773a6001-db55-4cba-9cc4-5ec7168c571e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1500", "content": "", "creation_timestamp": "2025-03-12T04:00:00.000000Z"}, {"uuid": "41d1813c-655c-4fea-a171-16e11210f38e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/exploitdb-bot.bsky.social/post/3miyj25yejg2n", "content": "", "creation_timestamp": "2026-04-08T14:31:10.758624Z"}, {"uuid": "b2fec750-8368-4ebe-9409-e04339a98e42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mj3peyvrwy2h", "content": "", "creation_timestamp": "2026-04-09T21:02:42.503267Z"}, {"uuid": "1bfee83f-d45e-4b37-a3d7-96f330bd92b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "published-proof-of-concept", "source": "Telegram/UvedVtqVDCGkXv8NmRK2UeaPa7O6lLobLjxeVTA8w6_YiKk", "content": "", "creation_timestamp": "2025-11-22T15:00:14.000000Z"}, {"uuid": "dacaf651-74b5-4129-99ac-88ed32ddd888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26633\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)\n\ud83d\udd39 Description: Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.\n\ud83d\udccf Published: 2025-03-11T16:59:24.607Z\n\ud83d\udccf Modified: 2025-03-11T17:27:44.438Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633", "creation_timestamp": "2025-03-11T17:39:55.000000Z"}, {"uuid": "675d2873-0c3f-42e4-92b9-94ed6c6f91d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9570", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26633\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)\n\ud83d\udd39 Description: Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.\n\ud83d\udccf Published: 2025-03-11T16:59:24.607Z\n\ud83d\udccf Modified: 2025-03-31T01:40:50.428Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633", "creation_timestamp": "2025-03-31T02:30:46.000000Z"}, {"uuid": "7c0fdced-ed72-484c-a265-6ba20d9c460f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/1088", "content": "Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp \u2013 thehackernews.com\n\nTue, 01 Apr 2025 00:41:00", "creation_timestamp": "2025-03-31T20:03:03.000000Z"}, {"uuid": "d1fb8cdc-d107-4165-b8c2-9f617fe9bbf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/thehackernews/7352", "content": "\ud83d\udc68\u200d\ud83d\udcbb Hackers are abusing a Windows flaw (CVE-2025-26633) to drop malware\u2014masquerading as IT staff on Microsoft Teams and tricking users with rogue MSC files.\n\nThe group? EncryptHub, a Russian crew blending social engineering with zero-days.\n\nDetails \u2192 https://thehackernews.com/2025/08/russian-group-encrypthub-exploits-msc.html", "creation_timestamp": "2025-08-16T05:36:59.000000Z"}, {"uuid": "166052a9-3eef-4fa8-8484-c473d2b30fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "published-proof-of-concept", "source": "Telegram/OGmpQkIDLTXcJ6m2hE_QNoMMCDIvzALmqMRxALOvOn4Hxw", "content": "", "creation_timestamp": "2025-08-16T09:44:24.000000Z"}, {"uuid": "4775a7b3-8eac-4efd-bef0-4b13f7324197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/445", "content": "Top Security News for Today\n\nAn Introduction to Data Masking in Privacy Engineering  \nhttps://www.tripwire.com/state-of-security/introduction-data-masking-privacy-engineering\n\nMAS Compliance 101: Key Regulations for Financial Institutions in Singapore  \nhttps://www.tripwire.com/state-of-security/mas-compliance-key-regulations-financial-institutions-singapore\n\nFrida 16.7.0 is out w/ brand new APIs for observing the lifecycles of threads and modules  \nhttps://www.reddit.com/r/netsec/comments/1jjg9kq/frida_1670_is_out_w_brand_new_apis_for_observing/\n\nReport on Paragon Spyware  \nhttps://www.schneier.com/blog/archives/2025/03/report-on-paragon-spyware.html\n\nCVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin  \nhttps://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html\n\nCVE-2024-55963: Unauthenticated RCE in Default-Install of Appsmith  \nhttps://www.reddit.com/r/netsec/comments/1jjnjam/cve202455963_unauthenticated_rce_in/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-03-26T09:30:16.000000Z"}, {"uuid": "530e3d51-6937-4164-9595-e7b4a0afe614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "Telegram/yvdPRlOG6O4HtGBrbNh3bKaRZKghsJf327sCAFBdQit8wA", "content": "", "creation_timestamp": "2025-03-17T21:29:13.000000Z"}, {"uuid": "1a9c5b26-b099-452b-892e-a7087fc9536f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "Telegram/tSgQQeMUmxFAurjN7T8cjCgAIfeiaAXuM7b6qUAeeC7zXw", "content": "", "creation_timestamp": "2025-03-16T16:32:35.000000Z"}, {"uuid": "cfebf3a6-c639-42ac-a0bb-dc4481c89e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/DarkWebInformer_News/2632", "content": "\ud83d\udea8 News Alert!\n\nSource: The Hacker News\nTitle: Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp\nLink: https://thehackernews.com/2025/03/russian-hackers-exploit-cve-2025-26633.html", "creation_timestamp": "2025-03-31T17:18:56.000000Z"}, {"uuid": "13c0e9c9-a2ba-4f02-a533-32278edbc15f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "Telegram/bhPFONutzRgYG_IEl2xtNMQ6jsmPZutkpy3ghpR5fz7n5A", "content": "", "creation_timestamp": "2025-03-12T23:51:13.000000Z"}, {"uuid": "b8b4fe3b-1747-494b-b0a5-b69dc657c334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/itsec_news/5777", "content": "\u200b\u26a1\ufe0f11 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u0434\u044b\u0440, \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0443\u043d\u0435\u0441\u0442\u0438 \u0432\u0441\u0451: \u043e\u0442 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f\n\n\ud83d\udcac \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Positive Technologies \u043e\u0442\u043d\u0435\u0441\u043b\u0438 \u043a \u0447\u0438\u0441\u043b\u0443 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0445 \u0435\u0449\u0451 \u043e\u0434\u0438\u043d\u043d\u0430\u0434\u0446\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u0412 \u0441\u043f\u0438\u0441\u043e\u043a \u0432\u043e\u0448\u043b\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Microsoft, \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u044b VMware, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440 Kubernetes \u0438 \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440 Apache Tomcat.\n\nMicrosoft\n\nCVE-2024-30085 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows Cloud Files Mini Filter (CVSS 7.8) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c SYSTEM-\u0434\u043e\u0441\u0442\u0443\u043f. \u041e\u0448\u0438\u0431\u043a\u0430 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0431\u0438\u0442\u043e\u0432\u044b\u0445 \u043a\u0430\u0440\u0442. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0441\u0435\u0442\u0438, PoLP, \u0443\u0441\u0438\u043b\u0435\u043d\u043d\u044b\u0439 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433.\n\nCVE-2025-24983 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u044f\u0434\u0440\u0430 Win32 (CVSS 7.0) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0433\u043e\u043d\u043a\u0443. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0430\u0432, \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u0441\u043a\u0430\u043b\u0430\u0446\u0438\u0438.\n\nCVE-2025-26633 \u2014 \u043e\u0431\u0445\u043e\u0434 \u0437\u0430\u0449\u0438\u0442\u044b \u0432 Microsoft Management Console (CVSS 7.0). \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 MSC-\u0444\u0430\u0439\u043b \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 MSC \u0438 VHD-\u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u043f\u0440\u043e\u043a\u0441\u0438 \u0438 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445.\n\nCVE-2025-24071 \u2014 \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0432 Windows File Explorer (CVSS 7.5). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c NTLM-\u0445\u0435\u0448\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f LIBRARY-MS-\u0444\u0430\u0439\u043b\u044b. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043f\u043e\u0434\u043f\u0438\u0441\u044b\u0432\u0430\u043d\u0438\u0435 SMB, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 NTLM.\n\nCVE-2025-24993 \u2014 RCE \u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 NTFS (CVSS 7.8). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 VHD-\u0434\u0438\u0441\u043a.\n\nCVE-2025-24985 \u2014 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Fast FAT (CVSS 7.8), \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 VHD \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e.\n\nVMware\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shadowserver, \u0431\u043e\u043b\u0435\u0435 40 \u0442\u044b\u0441. \u0443\u0437\u043b\u043e\u0432 ESXi \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0438\u0437\u0432\u043d\u0435 \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0440\u0438\u0441\u043a\u0443:\n\nCVE-2025-22224 (CVSS 9.3) \u2014 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u0430\u044f \u0437\u0430\u043f\u0438\u0441\u044c \u0447\u0435\u0440\u0435\u0437 TOCTOU \u0432 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 ESXi \u0438 Workstation.\n\nCVE-2025-22225 (CVSS 8.2) \u2014 \u0437\u0430\u043f\u0438\u0441\u044c \u043a\u043e\u0434\u0430 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u044f\u0434\u0440\u0430 VMX-\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430.\n\nCVE-2025-22226 (CVSS 7.1) \u2014 \u0443\u0442\u0435\u0447\u043a\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0447\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u043e\u0433\u043e \u0434\u0438\u0430\u043f\u0430\u0437\u043e\u043d\u0430 \u0432 HGFS.\n\n\u0420\u0435\u0448\u0435\u043d\u0438\u044f : \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 VMware Workstation 17.6.3, Fusion 13.6.3 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u043f\u0430\u0442\u0447\u0435\u0439.\n\nKubernetes\n\nCVE-2025-1974 (CVSS 9.8) \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 ingress-nginx \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430. \u041f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c \u0431\u043e\u043b\u0435\u0435 6500 \u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Wiz .\n\n\u041c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 ingress-nginx, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 Validating Admission Controller \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432.\n\nApache\n\nCVE-2025-24813 (CVSS 9.8) \u2014 RCE \u0432 Tomcat \u0447\u0435\u0440\u0435\u0437 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0435 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Rapid7 \u0432\u044b\u044f\u0432\u0438\u043b\u043e ~200 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e Tomcat 9.0.99, 10.1.35, 11.0.3 \u0438 \u0432\u044b\u0448\u0435.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-11T17:25:57.000000Z"}, {"uuid": "25d50168-b816-4ae0-aa12-9610c51c16cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/kasperskyb2b/1655", "content": "\u2757\ufe0f \u0412\u0435\u0441\u0435\u043d\u043d\u0438\u0439 \u0443\u0440\u043e\u0436\u0430\u0439 \u043f\u0430\u0442\u0447\u0435\u0439: 7 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u043e\u0442 Microsoft \n\n\u041c\u0430\u0440\u0442\u043e\u0432\u0441\u043a\u0438\u0439 Patch Tuesday \u043d\u0435 \u043f\u043e\u0440\u0430\u0436\u0430\u0435\u0442 \u0447\u0438\u0441\u043b\u043e\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u2014 \u0438\u0445 57, \u043d\u043e \u0430\u0436 7 \u0431\u044b\u043b\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b \u0434\u043e \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0438 6 (!) \u0438\u0437 \u043d\u0438\u0445 \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0438\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u041d\u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u043d\u0435 \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e, \u0437\u0430\u0442\u043e \u044d\u0442\u0443 \u043e\u0446\u0435\u043d\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0448\u0435\u0441\u0442\u044c \u0434\u0440\u0443\u0433\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u0432\u0441\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE. \n\n\u0418\u0437 \u043e\u0431\u0449\u0435\u0433\u043e \u0447\u0438\u0441\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 23 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE, 23 \u2014 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043f\u043e 4 \u2014 \u043a \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0443 \u0438 \u0443\u0442\u0435\u0447\u043a\u0435  \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 3 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0410\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\nCVE-2025-26633 (CVSS3 7.0) \u2014 \u0441\u0430\u043c\u044b\u0439 \u043f\u043e\u043d\u044f\u0442\u043d\u044b\u0439 \u0438\u0437 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432, \u043e\u0431\u0445\u043e\u0434 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 Microsoft Management Console. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u0435\u0437 \u00ab\u043b\u0438\u0448\u043d\u0438\u0445\u00bb \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u0439 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 .msc-\u0444\u0430\u0439\u043b. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c ZDI \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 ransomware-\u0430\u0442\u0430\u043a\u0430\u0445 EncryptHub.\n\nCVE-2025-24993 \u0438 -24985 (CVSS 7.8) \u2014 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0435\u0441\u043b\u0438 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0437 \u0434\u0438\u0441\u043a\u0430 (VHD). \u041f\u0435\u0440\u0432\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u043a\u0440\u043e\u0435\u0442\u0441\u044f \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 NTFS, \u0432\u0442\u043e\u0440\u043e\u0439 \u2014 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Fast FAT FS.\nCVE-2025-24984 \u0438 -24991 (4.6 \u0438 5.5) \u0442\u043e\u0436\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0432 NTFS \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0413\u0434\u0435 \u0438 \u043a\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u0442\u0438 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0443\u0432\u044b, \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e. \u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u043d\u043e\u0441\u0442\u0438 \u0430\u0434\u0440\u0435\u0441\u043e\u0432\u0430\u043d\u044b \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0432\u0441\u0435 \u043e\u043d\u0438 \u0431\u044b\u043b\u0438 \u0447\u0430\u0441\u0442\u044c\u044e \u043e\u0434\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438.\n\nCVE-2025-24983 (7.0) \u2014 \u0443\u0436\u0435 \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439  \u0434\u043e system \u0447\u0435\u0440\u0435\u0437 Win32.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-26630 (7.8) \u2014 \u044d\u0442\u043e RCE \u0432 MS Access, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0411\u0414. \u0418\u0437 \u043f\u0430\u043d\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u043e\u043d\u0430 \u043d\u0435 \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442.  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0433\u0438\u0433\u0430\u043d\u0442\u0441\u043a\u0438\u043c\u0438 \u0431\u043e\u0435\u0432\u044b\u043c\u0438 \u0440\u043e\u0431\u043e\u0442\u0430\u043c\u0438 Unpatched.ai.\n\n\u041f\u0435\u0440\u0435\u0445\u043e\u0434\u044f \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0442\u043e\u0438\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c, \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 (\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435) \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0432\u044b\u0434\u0435\u043b\u0438\u043c CVE-2025-24035 \u0438 -24045 (8.1). \u041e\u0431\u0430 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f RCE \u0432 Remote Desktop Services, \u043a\u043e\u043c\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0438 \u0438\u0437\u043b\u0438\u0448\u043d\u0438.\n\n\u0412\u0438\u0448\u0435\u043d\u043a\u0430 \u043d\u0430 \u0442\u043e\u0440\u0442\u0435 \u2014 RCE \u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u0435 Remote Desktop, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u043f\u0440\u0438 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438 \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0443 RDP (CVE-2025-26645, 8.8)\n\n\u041d\u0435 \u0434\u043e \u043a\u043e\u043d\u0446\u0430 \u043f\u043e\u043d\u044f\u0442\u0435\u043d \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0440\u0430\u0431\u043e\u0442\u044b CVE-2025-24084 (8.4) \u0432 WSL2. \u041d\u0430\u0436\u0430\u0442\u0438\u0435 \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u043d\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0441\u0441\u044b\u043b\u043a\u0443, \u0430 \u0432 \u0445\u0443\u0434\u0448\u0435\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u2014 \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e email \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u044f\u0434\u0440\u0430 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux. \u0414\u043e\u043b\u0436\u0435\u043d \u043b\u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u044b\u0439 \u043a\u043b\u0438\u0435\u043d\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0432 \u0441\u0440\u0435\u0434\u0435 Linux, \u0438\u043b\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e, \u0447\u0442\u043e\u0431\u044b WSL2 \u0431\u044b\u043b\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u0430 \u0432 Windows, \u043d\u0435\u044f\u0441\u043d\u043e.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f RCE \u0432 Office, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u0434\u0430\u0436\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u041e\u0434\u043d\u0430\u043a\u043e Microsoft \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e CVE-2025-24057 \u043a\u0430\u043a \u043c\u0430\u043b\u043e\u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0443\u044e.\n\n\u041f\u0440\u0438\u0437\u043e\u0432\u0430\u044f \u0438\u0433\u0440\u0430:\nAdobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c, \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0439 8 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 Reader, 6 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0438\u043c\u0435\u044e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445, \u0432\u0441\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE).\n\n\u041d\u0443 \u0430 Apple \u0441\u0440\u043e\u0447\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u0442 Safari \u043d\u0430 \u0432\u0441\u0435\u0445 \u0441\u0432\u043e\u0438\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c CVE-2025-24201 \u0432 WebKit, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0432 \u00ab\u043e\u0447\u0435\u043d\u044c \u0441\u043b\u043e\u0436\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445\u00bb.\n\n\u041d\u0435\u0441\u043a\u0443\u0447\u043d\u043e\u0439 \u0432\u0441\u0435\u043c \u043d\u0435\u0434\u0435\u043b\u0438!\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #Adobe #Microsoft #Apple @\u041f2\u0422", "creation_timestamp": "2025-03-12T07:42:45.000000Z"}, {"uuid": "cdce42f5-5c83-49cc-a168-34d62ccd6f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/ton618cyber/3352", "content": "Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp\n\nWater Gamayun exploited CVE-2025-26633 to deploy SilentPrism, DarkWisp, and stealers with persistence.\n\nThe Hacker News | thehackernews.com \u2022 Mar 31, 2025", "creation_timestamp": "2025-04-01T06:24:18.000000Z"}, {"uuid": "72fe4722-9b13-4efe-ba9f-a2678e00a55b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/CyberBulletin/2829", "content": "\u26a1CVE-2025-26633: Water Gamayun Exploits Windows MMC in Active Zero-Day Campaign.\n\n#CyberBulletin", "creation_timestamp": "2025-03-26T17:58:31.000000Z"}, {"uuid": "9628db60-778c-4dcb-a5e4-6decebe6b48c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/CyberBulletin/2596", "content": "\u26a1Microsoft warns: 6 zero-days under active attack!\n\nThis month\u2019s Patch Tuesday fixes 57 security flaws, including 6 exploited zero-days that attackers are already using for privilege escalation, data theft, and remote code execution.\n\nKey threats:\nCVE-2025-24985 &amp; CVE-2025-24993 \u2013 File system flaws allowing remote code execution\nCVE-2025-24983 \u2013 A Win32k zero-day used in the wild with PipeMagic malware\nCVE-2025-26633 \u2013 Security bypass flaw in Microsoft Management Console\n\n#CyberBulletin", "creation_timestamp": "2025-03-12T14:22:23.000000Z"}, {"uuid": "588e8132-ed4c-4262-a39c-b9f1bf560371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/cibsecurity/83972", "content": "\ud83d\udd8b\ufe0f Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp \ud83d\udd8b\ufe0f\n\nThe threat actors behind the zeroday exploitation of a recentlypatched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The activity has been attributed to a suspected Russian hacking group called Water Gamayun, which is also known as EncryptHub and LARVA208. \"The threat actor deploys payloads primarily by means of.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-04-01T05:16:33.000000Z"}, {"uuid": "9e107a93-8576-4eda-bb38-57006d163af3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/29510", "content": "Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp \u2013 thehackernews.com\n\nTue, 01 Apr 2025 00:41:00", "creation_timestamp": "2025-03-31T22:03:03.000000Z"}, {"uuid": "0adf90fb-fbde-45b1-b1c4-c2c00334c07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "Telegram/d86YjhrTa_rsTAeSagxjZoLffFGTVOIWMr91dKIKYqnEQQ", "content": "", "creation_timestamp": "2025-04-01T02:02:04.000000Z"}, {"uuid": "c13bf7c1-7dd3-429a-8588-2b5939a8c995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "Telegram/eAAGe9MZLSFopClHjdX8i8646FSMgBvC3fPBG15ApBsDQ-o", "content": "", "creation_timestamp": "2025-03-31T21:13:47.000000Z"}, {"uuid": "56df3cca-4b82-4a25-83fc-23f6ef694f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/cyberguerre/2951", "content": "Trend Micro \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u043c\u0438\u0444\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0442\u0435\u043c\u0443 \u0432 \u043d\u0435\u0439\u043c\u0438\u043d\u0433\u0435: \u043a \u0437\u0435\u043c\u043b\u044f\u043d\u043e\u043c\u0443 \u041a\u043e\u0449\u0435\u044e \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0441\u044f \u0432\u043e\u0434\u043d\u044b\u0439 \u0433\u0430\u043c\u0430\u044e\u043d (Water Gamayun). \u042d\u0442\u043e \u043f\u0440\u043e\u0437\u0432\u0438\u0449\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0434\u043b\u044f \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0443\u0441\u0441\u043a\u043e\u044f\u0437\u044b\u0447\u043d\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438. \u041e\u043d\u0430 \u0431\u043e\u043b\u0435\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430 \u043a\u0430\u043a EncryptHub \u0438\u043b\u0438 Larva-208. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438, \u0447\u0442\u043e \u0432 \u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f Microsoft Management Console \u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0438 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435 \u0436\u0435\u0440\u0442\u0432\u044b \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b. Microsoft \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2025-26633) 11 \u043c\u0430\u0440\u0442\u0430, \u0430 Trend Micro \u043f\u043e\u0441\u0432\u044f\u0442\u0438\u043b\u0438 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u0434\u0432\u0430 \u043e\u0442\u0447\u0451\u0442\u0430.", "creation_timestamp": "2025-04-02T09:21:32.000000Z"}, {"uuid": "f8776a7a-e779-49a3-93b9-41bf801683a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/true_secator/6833", "content": "Microsoft \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u043c\u0430\u0440\u0442\u043e\u0432\u0441\u043a\u0438\u0439 PatchTuesday \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 57 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 7 0-day, \u0448\u0435\u0441\u0442\u044c \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f.\n\n\u0412 \u0446\u0435\u043b\u043e\u043c, \u0437\u0430\u043a\u0440\u044b\u0442\u043e \u0448\u0435\u0441\u0442\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u0432\u0441\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 RCE, \u0430 \u043e\u0431\u0449\u0435\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c: 23 - EoP, 3 - \u043e\u0431\u0445\u043e\u0434 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 23 - RCE, 4 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 1 0 DoS \u0438 3 - \u0441\u043f\u0443\u0444\u0438\u043d\u0433.\n\n\u041a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u043d\u0443\u043b\u044f\u043c:\n\n- CVE-2025-24983: \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u044f\u0434\u0440\u0430 Windows Win32, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 SYSTEM \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435.\n\nMicrosoft \u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0435 \u0434\u0435\u043b\u0438\u0442\u0441\u044f \u0442\u0435\u043c, \u043a\u0430\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u0434\u043d\u0430\u043a\u043e, \u0432 \u0432\u0438\u0434\u0443 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0435\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0432 ESET, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0431\u0443\u0434\u0443\u0442 \u0432 \u043e\u0442\u0447\u0435\u0442\u0435.\n\n- CVE-2025-24984: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 Windows NTFS, \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u0438\u043c\u0435\u044e\u0449\u0438\u0435 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e USB-\u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044f.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0441\u0447\u0438\u0442\u044b\u0432\u0430\u0442\u044c \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u044b \u0434\u0438\u043d\u0430\u043c\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043a\u0440\u0430\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e. \u041e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e, \u043a\u0430\u043a \u0438 \u0442\u0440\u0438 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435.\n\n- CVE-2025-24985: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows Fast FAT, \u0434\u0435\u043b\u0430\u044e\u0449\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c RCE.\n\n\u041e\u043d\u0430 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0438\u043b\u0438 \u043e\u0431\u0442\u0435\u043a\u0430\u043d\u0438\u0435\u043c \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows Fast FAT Driver.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430 \u043f\u0443\u0442\u0435\u043c \u043e\u0431\u043c\u0430\u043d\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438 \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e VHD, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0442\u0435\u043c \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c. \n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043e\u0442 Microsoft, \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043e\u0431\u0440\u0430\u0437\u044b VHD \u0440\u0430\u043d\u0435\u0435 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u043b\u0438\u0441\u044c \u0432 \u0445\u043e\u0434\u0435\u00a0\u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u00a0\u0438 \u0447\u0435\u0440\u0435\u0437\u00a0\u0441\u0430\u0439\u0442\u044b \u0441 \u043f\u0438\u0440\u0430\u0442\u0441\u043a\u0438\u043c \u041f\u041e. \n\n- CVE-2025-24991: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 Windows NTFS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 VHD-\u0444\u0430\u0439\u043b \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u043e\u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043a\u0440\u0430\u0436\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n- CVE-2025-24993: \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u0432 Windows NTFS \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 VHD.\n\n- CVE-2025-26633: \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f Microsoft, \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Trend Micro.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\u0441\u044f, \u043d\u043e \u0441\u0443\u0434\u044f \u043f\u043e \u0435\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u044e, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u0444\u0430\u0439\u043b\u0430\u043c \u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Windows \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434.\n\n\u041f\u0440\u0438 \u0430\u0442\u0430\u043a\u0435 \u0447\u0435\u0440\u0435\u0437 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438\u043b\u0438 \u043c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u043e\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0446\u0435\u043b\u0435\u0432\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0412 \u043b\u044e\u0431\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u043d\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u043a\u043e\u043d\u0442\u0435\u043d\u0442.\n\n\u0412\u043c\u0435\u0441\u0442\u043e \u044d\u0442\u043e\u0433\u043e \u043f\u0440\u0438\u0434\u0435\u0442\u0441\u044f \u0443\u0431\u0435\u0434\u0438\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u0443 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043a\u0430\u043a\u0438\u0435-\u043b\u0438\u0431\u043e \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f. \u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u043d\u0430\u0436\u0430\u0442\u044c \u043d\u0430 \u0441\u0441\u044b\u043b\u043a\u0443, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u0438\u0442 \u0435\u0433\u043e \u043d\u0430 \u0441\u0430\u0439\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u0438\u043b\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u0432\u043b\u043e\u0436\u0435\u043d\u0438\u0435.\n\n\u041a \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u043e\u0439 0-day \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f CVE-2025-26630, RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 Microsoft Access. \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0430 Unpatched.ai.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u0445 \u0430\u0442\u0430\u043a \u0438\u043b\u0438 \u0441\u043e\u0446\u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0438\u0438, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u043c\u0430\u043d\u043e\u043c \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u0443 \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b Access.\n\n\u041f\u043e\u043b\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 - \u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2025-03-12T16:31:14.000000Z"}, {"uuid": "e28381e5-c67e-4d8e-9b0f-8a45eaa0807c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/ctinow/232799", "content": "CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin\nhttps://ift.tt/D63nsNA", "creation_timestamp": "2025-03-25T15:49:05.000000Z"}, {"uuid": "5064242c-f785-4509-9c56-157b1757e9fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/ctinow/232804", "content": "CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin\nhttps://ift.tt/D63nsNA", "creation_timestamp": "2025-03-25T16:20:12.000000Z"}, {"uuid": "5ecd09df-015c-4307-8de6-034a8eafb5e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/ctinow/233116", "content": "Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp\nhttps://ift.tt/HpDZ6jz", "creation_timestamp": "2025-03-31T19:24:21.000000Z"}, {"uuid": "70b82d59-5340-44e9-9bda-683bd7e19c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3llq76up5qh2l", "content": "", "creation_timestamp": "2025-04-01T06:02:55.918699Z"}, {"uuid": "ab71129b-d7a9-4979-9448-abd7a48799bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llqgsdhfc22d", "content": "", "creation_timestamp": "2025-04-01T08:19:09.650543Z"}, {"uuid": "b97b6103-9269-41a6-8b34-b61542fe7590", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3llq76utkuj2o", "content": "", "creation_timestamp": "2025-04-01T06:02:56.442853Z"}, {"uuid": "6586dfda-9779-4b17-94b8-2ff304594502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3llpcusjgus2s", "content": "", "creation_timestamp": "2025-03-31T21:36:08.936773Z"}, {"uuid": "fcdcb312-5b82-4288-9ccc-01c83db0eca4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk5rfbjyr22i", "content": "", "creation_timestamp": "2025-03-12T04:42:52.332318Z"}, {"uuid": "ffd54ef9-1ebd-431a-b5a9-34df9086af80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://threatintel.cc/2025/03/11/microsoft-security-advisory-march-monthly.html", "content": "", "creation_timestamp": "2025-03-11T22:47:45.000000Z"}, {"uuid": "3c622ed7-7a90-4c41-b81b-89d2664bf85f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3llb6io4rz72h", "content": "", "creation_timestamp": "2025-03-26T06:40:35.483817Z"}, {"uuid": "4d46c32e-a0b4-4249-9fe4-1750fc24cfb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3llb6jfnx7n2w", "content": "", "creation_timestamp": "2025-03-26T06:40:59.739952Z"}, {"uuid": "e78e9db8-20b7-4202-8203-05f89676581a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://krebsonsecurity.com/2025/03/microsoft-6-zero-days-in-march-2025-patch-tuesday/", "content": "", "creation_timestamp": "2025-03-11T22:53:01.000000Z"}, {"uuid": "7f208b0b-1423-4691-8662-06ad948be0c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lk5v5b5urdl2", "content": "", "creation_timestamp": "2025-03-12T05:53:02.093402Z"}, {"uuid": "3edf1c3a-8bdd-4954-825d-c6230ed011b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3llb6jkvznl2n", "content": "", "creation_timestamp": "2025-03-26T06:41:04.903303Z"}, {"uuid": "56e6ac48-9463-45a1-9512-1a1a17685cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-a8b1f1f7-7544db6064fedc76", "content": "", "creation_timestamp": "2025-03-12T09:39:02.677063Z"}, {"uuid": "22a5eef9-370c-43cf-a15e-9859ee62aaf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-150/", "content": "", "creation_timestamp": "2025-03-18T04:00:00.000000Z"}, {"uuid": "a98873d2-f913-46da-90af-dc24ea39eef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://infosec.exchange/users/tomcat/statuses/114290040836699500", "content": "", "creation_timestamp": "2025-04-06T08:20:25.475121Z"}, {"uuid": "ffdc0430-3cdb-4b0c-a2bf-6fb3ae897dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://infosec.exchange/users/0patch/statuses/114574216377926880", "content": "", "creation_timestamp": "2025-05-26T12:50:01.546652Z"}, {"uuid": "af062a5b-24d7-4ef0-8bba-eda1243b1184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "MISP/751f0c8f-e49f-40bf-8857-2a09c83e61a0", "content": "", "creation_timestamp": "2025-08-14T22:31:23.000000Z"}, {"uuid": "717e5b8e-7295-4531-b66f-fd2a30d18266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-ec1d4118-0814116fef8e69b9", "content": "", "creation_timestamp": "2025-08-15T12:52:23.245774Z"}, {"uuid": "efe33245-089f-4249-ba48-66b7e2e887d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3lwivu6vzgb2d", "content": "", "creation_timestamp": "2025-08-16T08:04:24.608340Z"}, {"uuid": "d63f5bde-e1a5-49ee-ae16-5917e3e72daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://infosec.exchange/users/tomcat/statuses/115037468823452471", "content": "", "creation_timestamp": "2025-08-16T08:21:11.405831Z"}, {"uuid": "febeea6f-6294-4d4b-9beb-6be68fa088d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://thehackernews.com/2025/08/russian-group-encrypthub-exploits-msc.html", "content": "", "creation_timestamp": "2025-08-16T03:34:00.000000Z"}, {"uuid": "63bdac4b-c862-460f-b446-f6f1e562b060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/cecallihelper.bsky.social/post/3lwjreh2zj22z", "content": "", "creation_timestamp": "2025-08-16T16:16:45.472749Z"}, {"uuid": "e16326af-a192-41cd-b3ad-b66c629006d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-7fcd797f-b1089e18afdc127d", "content": "", "creation_timestamp": "2025-08-17T07:15:16.435795Z"}, {"uuid": "2e611b29-3305-44d3-9249-819b4298fbb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://infosec.exchange/users/tomcat/statuses/115044076354151765", "content": "", "creation_timestamp": "2025-08-17T12:21:34.377925Z"}, {"uuid": "573a717f-5ece-4b9b-9b17-deb276f14622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-26633", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3lwlwucjvqt2b", "content": "", "creation_timestamp": "2025-08-17T13:00:21.918994Z"}, {"uuid": "4f63bb67-a562-435b-9ff6-350487a07545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lwmzuw3juk2d", "content": "", "creation_timestamp": "2025-08-17T23:27:02.256388Z"}, {"uuid": "b9e91d58-e2dd-4b83-bd8d-df5f1034a52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lwvndlplps2t", "content": "", "creation_timestamp": "2025-08-21T09:36:33.858926Z"}, {"uuid": "73b37619-80a4-4686-bc36-26359803b398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/115617187234489009", "content": "", "creation_timestamp": "2025-11-26T17:31:13.000896Z"}, {"uuid": "b4ab381c-93ee-4fbd-a784-2feebb973d86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3m6kf3z4b6t2j", "content": "", "creation_timestamp": "2025-11-26T17:31:24.978073Z"}, {"uuid": "27492c76-e4ee-4a88-baad-3691b61b5caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2395ac0b-467a-497a-ae42-e6f7579adbb3", "content": "", "creation_timestamp": "2026-02-02T12:26:08.219145Z"}, {"uuid": "3d74c4bf-bfa7-4859-9c4d-b8585c940f8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2395ac0b-467a-497a-ae42-e6f7579adbb3", "content": "", "creation_timestamp": "2026-02-02T12:26:08.219145Z"}, {"uuid": "1e94b232-cb7d-4666-96af-b4b2e37dd9b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/cvedetector/20109", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26633 - Microsoft Management Console Neutralization Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26633 \nPublished : March 11, 2025, 5:16 p.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. \nSeverity: 7.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T20:08:20.000000Z"}, {"uuid": "87be8205-c3af-4bfc-b5c8-c369e666197d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/itsec_news/5470", "content": "\u200b\u26a1\ufe0fUSB-\u0448\u043f\u0438\u043e\u043d \u0438 7 Zero Day: \u043a\u0430\u043a \u043f\u0440\u043e\u0448\u0435\u043b \u043c\u0430\u0440\u0442\u043e\u0432\u0441\u043a\u0438\u0439 Patch Tuesday \u0443 Microsoft\n\n\ud83d\udcac Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043c\u0430\u0440\u0442\u043e\u0432\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Patch Tuesday 2025, \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0432 57 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 6 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u043d\u0443\u043b\u0435\u0432\u044b\u0445 \u0434\u043d\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u2014 6 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0445 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u0439 \u043a\u043e\u0434.\n\n\u0412 \u043c\u0430\u0440\u0442\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u043a\u0440\u044b\u043b\u0430:\n23 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 (Elevation of Privilege, EoP);\n3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (Security Feature Bypass);\n23 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (Remote Code Execution, RCE);\n4 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (Information Disclosure);\n1 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0442\u0438\u043f\u0430 \u00ab\u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438\u00bb (Denial of Service, DoS);\n3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0430 (Spoofing).\n\n\u0412 \u0441\u043f\u0438\u0441\u043e\u043a \u043d\u0435 \u0432\u043e\u0448\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Mariner \u0438 10 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0430\u043d\u0435\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Microsoft Edge.\n\n\u0427\u0442\u043e\u0431\u044b \u0443\u0437\u043d\u0430\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0435 \u043e \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u0445, \u043d\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e, \u0441\u0442\u043e\u0438\u0442 \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u0441 \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 Windows 11 KB5053598 \u0438 KB5053602 , \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows 10 KB5053606 .\n\n\u0428\u0435\u0441\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\nMicrosoft \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 6 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0445\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0430 \u0442\u0430\u043a\u0436\u0435 1 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443, \u0434\u043e\u0432\u0435\u0434\u044f \u043e\u0431\u0449\u0435\u0435 \u0447\u0438\u0441\u043b\u043e \u043d\u0443\u043b\u0435\u0432\u044b\u0445 \u0434\u043d\u0435\u0439 \u0434\u043e 7. \u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u043e\u0448\u0438\u0431\u043e\u043a \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 NTFS \u0438 \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c VHD-\u0434\u0438\u0441\u043a\u043e\u0432.\n\nCVE-2025-24983 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u044f\u0434\u0440\u0430 Windows Win32, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 SYSTEM \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u0431\u0435\u0434\u044b \u0432 \u0433\u043e\u043d\u043a\u0435 race condition. Microsoft \u043f\u043e\u043a\u0430 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0434\u0435\u0442\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438\n\nCVE-2025-24984 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 Windows NTFS \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u0441 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443 \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u0437 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0443\u0442\u0451\u043c \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e USB-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430. \u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\n\nCVE-2025-24985 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows Fast FAT, \u0434\u0435\u043b\u0430\u044e\u0449\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430. \u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 integer overflow \u0438\u043b\u0438 wraparound. \u0410\u0442\u0430\u043a\u0430 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u0443\u0442\u0451\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e VHD-\u0434\u0438\u0441\u043a\u0430. \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0440\u0430\u0441\u043a\u0440\u044b\u0442 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e.\n\nCVE-2025-24991 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 Windows NTFS \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u0435 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u044b \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u043e\u0445\u0438\u0449\u0430\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e, \u043e\u0431\u043c\u0430\u043d\u043e\u043c \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0441\u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 VHD-\u0444\u0430\u0439\u043b. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e.\n\nCVE-2025-24993 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 Windows NTFS. \u0414\u0430\u043d\u043d\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 (heap-based buffer overflow) \u0432 Windows NTFS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434. \u0410\u0442\u0430\u043a\u0430 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u0443\u0442\u0451\u043c \u043c\u043e\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e VHD-\u0434\u0438\u0441\u043a\u0430. \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e.\n\nCVE-2025-26633 \u2014 \u043e\u0431\u0445\u043e\u0434 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f (Microsoft Management Console). \u041f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0437\u0430\u0449\u0438\u0442\u043d\u044b\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b Windows, \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0436\u0435\u0440\u0442\u0432\u0443 \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 .msc-\u0444\u0430\u0439\u043b. \u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043d\u0435\u0442. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 Trend Micro.\n\n\u041f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f\nCVE-2025-26630 \u2014 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0432 Microsoft Access. \u0412\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 (use-after-free, UAF) \u0432 Microsoft Office Access. \u0414\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0436\u0435\u0440\u0442\u0432\u0443 \u043d\u0443\u0436\u043d\u043e \u043e\u0431\u043c\u0430\u043d\u043e\u043c \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b Access. \u042d\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u0438\u043b\u0438 \u0430\u0442\u0430\u043a \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0438\u0438. \u041e\u0434\u043d\u0430\u043a\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d Unpatched.ai.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-03-12T14:55:14.000000Z"}, {"uuid": "b7cd8f24-6086-4a6b-b5f6-cecbaa42e5a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/codeby_sec/9335", "content": "\u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430 EncryptHub \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c MSC EvilTwin \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e Fickle Stealer\n\n\ud83d\udccc\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a EncryptHub, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Microsoft Windows \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c.\n\n1\ufe0f\u20e3Trustwave SpiderLabs \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044e EncryptHub, \u0441\u043e\u0447\u0435\u0442\u0430\u044e\u0449\u0443\u044e \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0438\u044e \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0435 \u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f Microsoft (MMC) (CVE-2025-26633, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043a\u0430\u043a MSC EvilTwin) \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0441\u043e\u043b\u0438 Microsoft (MSC).\n\n2\ufe0f\u20e3EncryptHub, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043a\u0430\u043a LARVA-208 \u0438 \u00ab\u0412\u043e\u0434\u044f\u043d\u0430\u044f \u0413\u0430\u043c\u0430\u044e\u043d\u00bb, \u2014 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0430\u044f \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430, \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 2024 \u0433\u043e\u0434\u0430. \u0420\u0430\u0431\u043e\u0442\u0430\u044f \u0432 \u0432\u044b\u0441\u043e\u043a\u043e\u043c \u0442\u0435\u043c\u043f\u0435, \u044d\u0442\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043e \u0440\u0430\u0431\u043e\u0442\u0435, \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u0440\u0442\u0444\u043e\u043b\u0438\u043e \u0438 \u0434\u0430\u0436\u0435 \u0432\u0437\u043b\u043e\u043c \u0438\u0433\u0440 Steam, \u0434\u043b\u044f \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0446\u0435\u043b\u0435\u0439 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n3\ufe0f\u20e3\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-26633 \u0440\u0430\u043d\u0435\u0435 \u0431\u044b\u043b\u043e \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0435\u0439 Trend Micro \u0432 \u043c\u0430\u0440\u0442\u0435 2025 \u0433\u043e\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0430\u0442\u0430\u043a\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0434\u0432\u0443\u0445 \u0431\u044d\u043a\u0434\u043e\u0440\u043e\u0432: SilentPrism \u0438 DarkWisp.\n\u0412 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0430\u0442\u0430\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0432\u044b\u0434\u0430\u0451\u0442 \u0441\u0435\u0431\u044f \u0437\u0430 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u0430 \u0418\u0422-\u043e\u0442\u0434\u0435\u043b\u0430 \u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u043e\u0431\u044a\u0435\u043a\u0442 \u0437\u0430\u043f\u0440\u043e\u0441 Microsoft Teams \u0441 \u0446\u0435\u043b\u044c\u044e \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0435 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044c \u0432\u0442\u043e\u0440\u0438\u0447\u043d\u0443\u044e \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u043c\u0430\u043d\u0434 PowerShell.\n\u0421\u0440\u0435\u0434\u0438 \u0441\u0431\u0440\u043e\u0448\u0435\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0435\u0441\u0442\u044c \u0434\u0432\u0430 \u0444\u0430\u0439\u043b\u0430 MSC \u0441 \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u043c \u0438\u043c\u0435\u043d\u0435\u043c, \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u0435\u0437\u0432\u0440\u0435\u0434\u0435\u043d, \u0430 \u0434\u0440\u0443\u0433\u043e\u0439 \u2014 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0435\u043d, \u0447\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-26633, \u0447\u0442\u043e \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043c \u0438\u0442\u043e\u0433\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 MSC \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u0435\u0433\u043e \u0431\u0435\u0437\u043e\u0431\u0438\u0434\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u043e\u0433\u0430.\n\u0424\u0430\u0439\u043b MSC, \u0441\u043e \u0441\u0432\u043e\u0435\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b, \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0435\u0442 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0441 \u0432\u043d\u0435\u0448\u043d\u0435\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0434\u0440\u0443\u0433\u043e\u0439 \u0441\u043a\u0440\u0438\u043f\u0442 PowerShell, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e, \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u043f\u0435\u0440\u0441\u0438\u0441\u0442\u0435\u043d\u0442\u043d\u043e\u0441\u0442\u044c \u043d\u0430 \u0445\u043e\u0441\u0442\u0435 \u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f (C2) EncryptHub \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u043d\u0430\u0433\u0440\u0443\u0437\u043e\u043a, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043f\u043e\u0445\u0438\u0442\u0438\u0442\u0435\u043b\u044c \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Fickle Stealer.\n\u0412 \u0445\u043e\u0434\u0435 \u0430\u0442\u0430\u043a\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Go \u043f\u043e\u0434 \u043a\u043e\u0434\u043e\u0432\u044b\u043c \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c SilentCrystal, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 Brave Support, \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u0443\u044e \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0443, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u043c Brave, \u0434\u043b\u044f \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u2014 ZIP-\u0430\u0440\u0445\u0438\u0432\u0430, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0435\u0433\u043e \u0434\u0432\u0430 MSC-\u0444\u0430\u0439\u043b\u0430 \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f CVE-2025-26633 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043e\u0440\u0443\u0436\u0438\u044f.", "creation_timestamp": "2025-08-27T15:23:08.000000Z"}, {"uuid": "f648b52e-fe55-4991-8e36-e39dff288993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/itsec_news/5617", "content": "\u200b\u26a1\ufe0f\u0422\u0440\u043e\u044f\u043d \u0432 \u043a\u043e\u043d\u0441\u043e\u043b\u0438 Windows: \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0443\u0442\u0438 \u0441\u0442\u0430\u043b\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u043c \u0432\u0437\u043b\u043e\u043c\u0430\n\n\ud83d\udcac Trend Micro \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u043d\u043e\u0432\u0443\u044e \u0430\u0442\u0430\u043a\u0443 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 Water Gamayun. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Microsoft Management Console (MMC), \u0447\u0442\u043e\u0431\u044b \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 .msc.\n\n\u0422\u0435\u0445\u043d\u0438\u043a\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 MSC EvilTwin \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u044b\u0439 \u0441\u043f\u043e\u0441\u043e\u0431 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0442\u0440\u043e\u044f\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 Windows. \u0412 \u0430\u0442\u0430\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-26633 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 7.0), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u043c\u0430\u0440\u0442\u0435 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 Patch Tuesday.\n\n\u041e\u0441\u043d\u043e\u0432\u0443 \u0430\u0442\u0430\u043a\u0438 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u043f\u043e\u0434\u043c\u0435\u043d\u0430 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u043a\u043e\u043d\u0441\u043e\u043b\u0438 Windows \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u0430\u043d\u0430\u043b\u043e\u0433\u043e\u043c \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0435 en-US, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u043c \u0441 \u044f\u0437\u044b\u043a\u043e\u0432\u044b\u043c \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u043e\u043c. \u041f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u043f\u043e\u0434\u043c\u0435\u043d\u0451\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432\u043c\u0435\u0441\u0442\u043e \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u044f\u043c \u0440\u0430\u0431\u043e\u0442\u044b \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 MUIPath. \u042d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0438 \u0438\u0441\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439 PowerShell, \u0431\u0435\u0437 \u0432\u0438\u0434\u0438\u043c\u044b\u0445 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.\n\n\u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0444\u0430\u0439\u043b\u044b .msc \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0438 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e HTML-\u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430. \u0412\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b ActiveX \u0438 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 Internet Explorer \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0434\u043b\u044f \u0432\u044b\u0437\u043e\u0432\u0430 \u043c\u0435\u0442\u043e\u0434\u0430 ExecuteShellCommand \u2014 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0433\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u044e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f Windows. \u0414\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u043f\u043e\u0434\u043c\u0435\u043d\u0451\u043d\u043d\u0443\u044e \u043a\u043e\u043d\u0441\u043e\u043b\u044c, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439.\n\n\u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442\u0441\u044f \u0442\u0435\u0445\u043d\u0438\u043a\u0430 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u00ab\u043b\u043e\u0436\u043d\u044b\u0445\u00bb \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0439. \u0414\u043e\u0431\u0430\u0432\u0438\u0432 \u043f\u0440\u043e\u0431\u0435\u043b\u044b \u0438\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u043c\u0432\u043e\u043b\u044b \u0432 \u043f\u0443\u0442\u0438, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0438, \u0432\u0438\u0437\u0443\u0430\u043b\u044c\u043d\u043e \u0441\u0445\u043e\u0436\u0438\u0435 \u0441 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u043c\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u00abC:\\Windows \\System32\u00bb. \u0412 \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430\u0445 \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u044e\u0442\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043a\u043e\u043f\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432, \u0447\u0442\u043e \u0441\u0431\u0438\u0432\u0430\u0435\u0442 \u0441 \u0442\u043e\u043b\u043a\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043d\u0443\u0436\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438.\n\n\u0417\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a MSC EvilTwin, \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 PowerShell, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u0440\u0430\u0437\u0443 \u0432\u0441\u0435 \u043c\u0435\u0442\u043e\u0434\u044b. \u041e\u043d \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 MSI-\u0444\u0430\u0439\u043b\u044b, \u0437\u0430\u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u0434 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0432\u0440\u043e\u0434\u0435 DingTalk. \u041f\u0440\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u0444\u0430\u0439\u043b\u044b \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u044e\u0442 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0440\u0430\u0441\u043f\u0430\u043a\u043e\u0432\u044b\u0432\u0430\u044e\u0442 \u0434\u0432\u0430 .msc \u0444\u0430\u0439\u043b\u0430 \u2014 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u0439 \u0438 \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u2014 \u0438 \u043f\u043e\u043c\u0435\u0449\u0430\u044e\u0442 \u0438\u0445 \u0432 \u00ab\u043b\u043e\u0436\u043d\u044b\u0435\u00bb \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0438.\n\n\u0414\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0439 \u0437\u0430\u043f\u0443\u0441\u043a \u0431\u0435\u0437\u0432\u0440\u0435\u0434\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u0434\u043c\u0435\u043d\u0443 \u0447\u0435\u0440\u0435\u0437 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c MUIPath, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e, \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u044e\u0449\u0443\u044e HTML-\u043a\u043e\u043d\u0442\u0435\u043d\u0442 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432. HTML \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0441\u043a\u0440\u0438\u043f\u0442, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 ExecuteShellCommand \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f PowerShell \u0441 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u044b\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u2014 \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u043e\u043c \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440\u0430 Rhadamanthys.\n\n\u0422\u0430\u043a\u0430\u044f \u0442\u0435\u0445\u043d\u0438\u043a\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430\u0441\u044c \u0435\u0449\u0451 \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 2024 \u0433\u043e\u0434\u0430, \u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0431\u044b\u043b\u0430 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u0441\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0430\u043c\u043e\u0433\u043e \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u0430, \u0432 \u0430\u0440\u0441\u0435\u043d\u0430\u043b\u0435 Water Gamayun \u0435\u0441\u0442\u044c \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b: \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0435 \u041f\u041e EncryptHub, \u0431\u044d\u043a\u0434\u043e\u0440\u044b DarkWisp \u0438 SilentPrism, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u0442\u0438\u043b\u0435\u0440\u044b Stealc \u0438 Rhadamanthys. Microsoft \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 Zero Day Initiative \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 \u043e\u0448\u0438\u0431\u043a\u0443, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 11 \u043c\u0430\u0440\u0442\u0430.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-03-26T15:57:23.000000Z"}, {"uuid": "33cbdfd5-ae3f-423f-babb-83a9cfc67c50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/itsec_news/5726", "content": "\u200b\u26a1\ufe0f\u0414\u0432\u043e\u0439\u043d\u0430\u044f \u0436\u0438\u0437\u043d\u044c \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0433\u043e \u0433\u0435\u043d\u0438\u044f: \u0434\u043d\u0435\u043c \u0441\u043f\u0430\u0441\u0430\u043b Windows, \u043d\u043e\u0447\u044c\u044e \u0432\u0437\u043b\u0430\u043c\u044b\u0432\u0430\u043b \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438\n\n\ud83d\udcac\n\u0428\u0432\u0435\u0434\u0441\u043a\u0438\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043f\u043e \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u043d\u0435\u043e\u0431\u044b\u0447\u043d\u0443\u044e \u0438\u0441\u0442\u043e\u0440\u0438\u044e \u0445\u0430\u043a\u0435\u0440\u0430 , \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0431\u0430\u043b\u0430\u043d\u0441\u0438\u0440\u0443\u0435\u0442 \u043c\u0435\u0436\u0434\u0443 \u043b\u0435\u0433\u0430\u043b\u044c\u043d\u043e\u0439 \u043a\u0430\u0440\u044c\u0435\u0440\u043e\u0439 \u0438 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043b\u0435\u043d\u0438\u044f\u043c\u0438. \u0412 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u043e\u043d \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u043d\u043e\u0441\u0442\u044c \u043e\u0442 Microsoft \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0434\u0432\u0443\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Windows, \u043d\u043e, \u043a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Outpost24 KrakenLabs , \u043f\u0430\u0440\u0430\u043b\u043b\u0435\u043b\u044c\u043d\u043e \u0437\u0430\u043d\u0438\u043c\u0430\u043b\u0441\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c.\n\n\u041d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 \u0431\u0440\u0435\u0448\u0438 \u0432 \u0437\u0430\u0449\u0438\u0442\u0435 \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u043f\u0430\u0441\u043d\u044b\u043c\u0438. \u041f\u0435\u0440\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c ( CVE-2025-24061 ) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u043e\u0431\u043e\u0439\u0442\u0438 \u0432\u0430\u0436\u043d\u044b\u0439 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Mark-of-the-Web, \u043f\u043e\u043b\u0443\u0447\u0438\u0432 \u0432\u044b\u0441\u043e\u043a\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u2013 7.8 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS. \u0412\u0442\u043e\u0440\u0430\u044f ( CVE-2025-24071 ) \u0441 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c 6.5 \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u043b\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0434\u043c\u0435\u043d\u0443 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0432 \u043f\u0440\u043e\u0432\u043e\u0434\u043d\u0438\u043a\u0435 Windows. \u0412 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 Microsoft \u0430\u0432\u0442\u043e\u0440 \u043d\u0430\u0445\u043e\u0434\u043e\u043a \u0437\u0430\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d \u043f\u043e\u0434 \u0438\u043c\u0435\u043d\u0435\u043c \"SkorikARI with SkorikARI\", \u043d\u043e \u0431\u043e\u043b\u044c\u0448\u0435 \u0432 \u0441\u0435\u0442\u0438 \u043e\u043d \u0438\u0437\u0432\u0435\u0441\u0442\u0435\u043d \u043a\u0430\u043a EncryptHub.\n\n\u0414\u0435\u0441\u044f\u0442\u044c \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434 \u043e\u043d \u043f\u043e\u043a\u0438\u043d\u0443\u043b \u0440\u043e\u0434\u043d\u043e\u0439 \u0425\u0430\u0440\u044c\u043a\u043e\u0432 \u0438 \u043e\u0431\u043e\u0441\u043d\u043e\u0432\u0430\u043b\u0441\u044f \u043d\u0430 \u043f\u043e\u0431\u0435\u0440\u0435\u0436\u044c\u0435 \u0420\u0443\u043c\u044b\u043d\u0438\u0438. \u0422\u0430\u043c \u0431\u0443\u0434\u0443\u0449\u0438\u0439 \u0445\u0430\u043a\u0435\u0440 \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0437\u0443\u0447\u0430\u043b \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u044b\u0435 \u043d\u0430\u0443\u043a\u0438 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d- \u043a\u0443\u0440\u0441\u044b \u0438 \u043f\u044b\u0442\u0430\u043b\u0441\u044f \u043d\u0430\u0439\u0442\u0438 \u0440\u0430\u0431\u043e\u0442\u0443 \u0432 IT-\u0441\u0444\u0435\u0440\u0435. \u041f\u043e\u0441\u043b\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043d\u0435\u0443\u0434\u0430\u0447\u043d\u044b\u0445 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u0437\u0430\u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445 bug bounty \u043e\u043d \u043f\u0435\u0440\u0435\u043a\u043b\u044e\u0447\u0438\u043b\u0441\u044f \u043d\u0430 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f.\n\n\u0415\u0433\u043e \u043f\u0435\u0440\u0432\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u0441\u0442\u0430\u043b Fickle Stealer \u2013 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 Rust \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u043b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u044f Fortinet FortiGuard \u0432 \u0438\u044e\u043d\u0435 2024 \u0433\u043e\u0434\u0430. \u0412 \u043d\u0435\u0434\u0430\u0432\u043d\u0435\u043c \u0438\u043d\u0442\u0435\u0440\u0432\u044c\u044e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e g0njxa \u0430\u0432\u0442\u043e\u0440 \u0441 \u0433\u043e\u0440\u0434\u043e\u0441\u0442\u044c\u044e \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b \u043e \u0441\u0432\u043e\u0435\u043c \u0434\u0435\u0442\u0438\u0449\u0435: \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u043e\u0431\u0445\u043e\u0434\u0438\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0437\u0430\u0449\u0438\u0442\u044b \u0438 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0434\u0430\u0436\u0435 \u0442\u0430\u043c, \u0433\u0434\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0432\u0440\u043e\u0434\u0435 StealC \u0438\u043b\u0438 Rhadamantys \u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0431\u0435\u0441\u0441\u0438\u043b\u044c\u043d\u044b. \u042d\u0442\u043e\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0441\u0440\u0435\u0434\u0438 \u0438\u0437\u0431\u0440\u0430\u043d\u043d\u044b\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0438 \u0432\u0441\u0442\u0440\u043e\u0435\u043d \u0432 \u043d\u043e\u0432\u0443\u044e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0443 \u0430\u0432\u0442\u043e\u0440\u0430 \u2013 EncryptRAT.\n\n\u041d\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0441\u0432\u044f\u0437\u0430\u0442\u044c Fickle Stealer \u0441 \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u043f\u0440\u0435\u0436\u043d\u0438\u0445 \u043f\u0441\u0435\u0432\u0434\u043e\u043d\u0438\u043c\u043e\u0432 EncryptHub, \u2013 \u043f\u043e\u044f\u0441\u043d\u044f\u0435\u0442 \u041b\u0438\u0434\u0438\u044f \u041b\u043e\u043f\u0435\u0441, \u0432\u0435\u0434\u0443\u0449\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0442\u0438\u043a Outpost24. \u2013 \u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u043e\u0434\u0438\u043d \u0438\u0437 \u0434\u043e\u043c\u0435\u043d\u043e\u0432 \u0442\u043e\u0439 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441\u043e\u0432\u043f\u0430\u0434\u0430\u0435\u0442 \u0441 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043e\u0439, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b \u0434\u043b\u044f \u043b\u0435\u0433\u0430\u043b\u044c\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u044b \u043d\u0430 \u0444\u0440\u0438\u043b\u0430\u043d\u0441\u0435. \u041f\u043e \u043d\u0430\u0448\u0438\u043c \u043e\u0446\u0435\u043d\u043a\u0430\u043c, \u0435\u0433\u043e \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0430\u044f \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u043d\u0430\u0447\u0430\u043b\u0430\u0441\u044c \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u0432 \u043c\u0430\u0440\u0442\u0435 2024 \u0433\u043e\u0434\u0430. \u041e\u0442\u0447\u0435\u0442 Fortinet \u0432 \u0438\u044e\u043d\u0435 \u0441\u0442\u0430\u043b \u043f\u0435\u0440\u0432\u044b\u043c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u043d\u0438\u0435\u043c \u043e\u0431 \u044d\u0442\u0438\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f\u0445.\n\u041a \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 2024 \u0433\u043e\u0434\u0430 \u0445\u0430\u043a\u0435\u0440 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u043b \u0435\u0449\u0435 \u043e\u0434\u043d\u0443 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u0443\u044e \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044e. \u041e\u043d \u0441\u043e\u0437\u0434\u0430\u043b \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u0441\u0430\u0439\u0442 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0433\u043e \u0430\u0440\u0445\u0438\u0432\u0430\u0442\u043e\u0440\u0430 WinRAR \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0447\u0435\u0440\u0435\u0437 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 \u043d\u0430 GitHub. \u0412 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438, \u0447\u0442\u043e \u043e\u043d \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u043d\u043e\u0432\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Microsoft Management Console (CVE-2025-26633). \u0427\u0435\u0440\u0435\u0437 \u044d\u0442\u0443 \u0431\u0440\u0435\u0448\u044c \u0441 \u0443\u0440\u043e\u0432\u043d\u0435\u043c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 7.0, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0443\u044e \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 MSC EvilTwin, \u043e\u043d \u0432\u043d\u0435\u0434\u0440\u044f\u0435\u0442 \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440\u044b \u0438 \u0440\u0430\u043d\u0435\u0435 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0431\u044d\u043a\u0434\u043e\u0440\u044b SilentPrism \u0438 DarkWisp.\n\n\u041c\u0430\u0441\u0448\u0442\u0430\u0431 \u0430\u0442\u0430\u043a \u0432\u043f\u0435\u0447\u0430\u0442\u043b\u044f\u0435\u0442: \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 PRODAFT, \u0437\u0430 \u0434\u0435\u0432\u044f\u0442\u044c \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0432\u0437\u043b\u043e\u043c\u0430\u043b \u0431\u043e\u043b\u0435\u0435 618 \u0432\u0430\u0436\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0439 \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u043e\u0442\u0440\u0430\u0441\u043b\u044f\u0445. \u041b\u043e\u043f\u0435\u0441 \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442:\n\n\u0412\u0441\u0435 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043e\u0434\u0438\u043d \u0447\u0435\u043b\u043e\u0432\u0435\u043a. \u041e\u0434\u043d\u0430\u043a\u043e \u043c\u044b \u043d\u0435 \u0438\u0441\u043a\u043b\u044e\u0447\u0430\u0435\u043c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0433\u043e \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u0447\u0435\u0441\u0442\u0432\u0430 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438. \u0412 \u043e\u0434\u043d\u043e\u043c \u0438\u0437 Telegram-\u043a\u0430\u043d\u0430\u043b\u043e\u0432, \u0433\u0434\u0435 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043b\u0430\u0441\u044c \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0430 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u0439, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0441\u044f \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430.\n\u041e\u0442\u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0441\u043b\u0435\u0434 \u043f\u043e\u043c\u043e\u0433\u043b\u0438 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 EncryptHub. \u041e\u043d \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u043b \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u044b\u0435 \u0441\u0430\u043c\u043e\u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0438\u0437-\u0437\u0430 \u043d\u0435\u043e\u0441\u0442\u043e\u0440\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u043d\u043e\u0432\u044b\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u0435\u0433\u043e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432. \u0412 \u0440\u0430\u0431\u043e\u0442\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b ChatGPT \u2013 \u043d\u0435\u0439\u0440\u043e\u0441\u0435\u0442\u044c \u043f\u043e\u043c\u043e\u0433\u0430\u043b\u0430 \u0435\u043c\u0443 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0441 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430, \u043d\u043e \u0438 \u0441 \u043f\u0435\u0440\u0435\u0432\u043e\u0434\u043e\u043c \u043f\u0438\u0441\u0435\u043c \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439. \u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u043e\u043d \u0432\u0435\u043b \u0441 \u0438\u0441\u043a\u0443\u0441\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0438\u043d\u0442\u0435\u043b\u043b\u0435\u043a\u0442\u043e\u043c \u043e\u0442\u043a\u0440\u043e\u0432\u0435\u043d\u043d\u044b\u0435 \u0431\u0435\u0441\u0435\u0434\u044b, \u0441\u043b\u043e\u0432\u043d\u043e \u043d\u0430 \u0438\u0441\u043f\u043e\u0432\u0435\u0434\u0438 \u0434\u0435\u043b\u044f\u0441\u044c \u0434\u0435\u0442\u0430\u043b\u044f\u043c\u0438 \u0441\u0432\u043e\u0435\u0439 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438.\n\n\u0418\u0441\u0442\u043e\u0440\u0438\u044f EncryptHub \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u0434\u0430\u0436\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u043e\u0434\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0447\u0430\u0441\u0442\u043e \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u044e\u0442 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u0430\u0440\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 . \u041c\u043d\u043e\u0433\u043e\u043a\u0440\u0430\u0442\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439, \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u0430\u044f \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430, \u0441\u043c\u0435\u0448\u0435\u043d\u0438\u0435 \u043b\u0438\u0447\u043d\u043e\u0439 \u0438 \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u2013 \u0432\u0441\u0435 \u044d\u0442\u043e \u0432 \u0438\u0442\u043e\u0433\u0435 \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u0435\u0433\u043e \u0440\u0430\u0437\u043e\u0431\u043b\u0430\u0447\u0435\u043d\u0438\u044e. \u0427\u0442\u043e \u0431\u0443\u0434\u0435\u0442 \u0434\u0430\u043b\u044c\u0448\u0435 - \u0443\u0437\u043d\u0430\u0435\u043c.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-07T05:46:01.000000Z"}, {"uuid": "cdc50eec-761c-4d4f-8229-055c40cfabc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "Telegram/nZV9bpQ2AB0OGeIJb_SwnFGtna9Ucpoh_c8FyRIDGVHqSQ", "content": "", "creation_timestamp": "2025-03-12T10:58:14.000000Z"}, {"uuid": "bc3e152c-8b1e-4d26-a683-9c0b9e2ccc1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/10549", "content": "Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp \u2013 thehackernews.com\n\nTue, 01 Apr 2025 00:41:00", "creation_timestamp": "2025-03-31T22:03:03.000000Z"}, {"uuid": "987227c5-e42d-4297-9768-17ece306f93f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "seen", "source": "https://t.me/ViralCyber/11525", "content": "\u2764\ufe0f\u06f6 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u062d\u0627\u0644 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u062f\u0631 \u0645\u06cc\u0627\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u062c\u062f\u06cc\u062f \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a!\n\ud83d\udd34\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0628\u0647\u200c\u062a\u0627\u0632\u06af\u06cc \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc \u06f6\u06f7 #\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647 \u06a9\u0647 \u0634\u0627\u0645\u0644 \u06f5\u06f6 \u062a\u0627 #CVE \u062c\u062f\u06cc\u062f \u062f\u0631 Windows\u060c Office\u060c Azure\u060c .NET\u060c Remote Desktop Services\u060c DNS Server\u060c \u0648 Hyper-V \u0627\u0633\u062a.  \u06f6 \u0645\u0648\u0631\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u062f\u0631 \u062d\u0627\u0644 \u062d\u0627\u0636\u0631 #Exploit \u0634\u062f\u0647 \u0648 \u0628\u0635\u0648\u0631\u062a \u0641\u0639\u0627\u0644 \u062a\u0648\u0633\u0637 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u062f\u0631 \u062d\u0627\u0644 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0633\u062a!\n\n\u274c \u0646\u06a9\u0627\u062a \u0645\u0647\u0645:\n\ud83d\udd34 \u06f6 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u062d\u0627\u0644 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0641\u0639\u0627\u0644 \u2013 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u0632 \u0622\u0646\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u062d\u0645\u0644\u0627\u062a \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.\n\ud83d\udd34 \u06f5\u06f0 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0647\u0645\u060c \u06f6 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u2013 \u0628\u0631 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0627\u0635\u0644\u06cc #\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc\u200c\u06af\u0630\u0627\u0631\u0646\u062f.\n\ud83d\udd34  \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-26633 \u062f\u0627\u0631\u0627\u06cc \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0639\u0645\u0648\u0645\u06cc \u0627\u0633\u062a \u0648 \u06af\u0631\u0648\u0647 \u062a\u0647\u062f\u06cc\u062f EncryptHub (Larva-208) \u062a\u0627\u06a9\u0646\u0648\u0646 \u0628\u06cc\u0634 \u0627\u0632 \u06f6\u06f0\u06f0 \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a.\n\n\u274c \u06f6 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062a\u062d\u062a \u062d\u0645\u0644\u0647 \n\ud83d\udea9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-26633 - \u0646\u0642\u0635 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 #Microsoft Management Console\n\ud83d\udd34 \u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u0647\u062f\u0641\u0645\u0646\u062f \u062a\u0648\u0633\u0637 \u06af\u0631\u0648\u0647 EncryptHub (Larva-208) \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0648 \u0628\u06cc\u0634 \u0627\u0632 \u06f6\u06f0\u06f0 \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a.\n\ud83d\udd34 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u0645\u062d\u062f\u0648\u062f\u06cc\u062a\u200c\u0647\u0627\u06cc \u0627\u0639\u062a\u0628\u0627\u0631 \u0641\u0627\u06cc\u0644 \u0631\u0627 \u062f\u0648\u0631 \u0628\u0632\u0646\u0646\u062f \u0648 \u06a9\u062f \u0645\u062e\u0631\u0628 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc MSC \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\ud83d\udd34 \u0627\u06cc\u0646 \u0627\u0635\u0644\u0627\u062d\u06cc\u0647 \u0631\u0627 \u0641\u0648\u0631\u0627\u064b \u0627\u0639\u0645\u0627\u0644 \u06a9\u0646\u06cc\u062f \u062a\u0627 \u0647\u062f\u0641 \u0628\u0639\u062f\u06cc \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0646\u0628\u0627\u0634\u06cc\u062f!\n\n\ud83d\udea9  \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-24993 - \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062f\u0631 Windows NTFS\n\ud83d\udd34 \u0628\u0627 \u0627\u062a\u0635\u0627\u0644 \u06cc\u06a9 VHD \u0645\u062e\u0631\u0628\u060c \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u06a9\u0646\u062f.\n\ud83d\udd34 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0633\u0631\u0631\u06cc\u0632 \u062d\u0627\u0641\u0638\u0647 heap\u060c \u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0648\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\ud83d\udd34 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646 \u0622\u0646 \u0631\u0627 \u0628\u0627 \u0627\u0641\u0632\u0627\u06cc\u0634 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u062a\u0631\u06a9\u06cc\u0628 \u06a9\u0631\u062f \u062a\u0627 \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0628\u0647 \u062f\u0633\u062a \u0622\u06cc\u062f.\n\n\ud83d\udea9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-24985 - \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062f\u0631 \u062f\u0631\u0627\u06cc\u0648\u0631 Windows Fast FAT\n\ud83d\udd34 \u0645\u0634\u0627\u0628\u0647 \u0645\u0648\u0631\u062f \u0642\u0628\u0644\u06cc\u060c \u0627\u062a\u0635\u0627\u0644 \u06cc\u06a9 VHD \u0645\u062e\u0631\u0628 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.\n\ud83d\udd34 \u0627\u0632 \u06cc\u06a9 \u0633\u0631\u0631\u06cc\u0632 \u0639\u062f\u062f \u0635\u062d\u06cc\u062d \u0628\u0631\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.\n\ud83d\udd34 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0646\u062a\u0631\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0628\u0647 \u062f\u0633\u062a \u0628\u06af\u06cc\u0631\u0646\u062f.\n\n\ud83d\udea9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-24983 - \u0627\u0641\u0632\u0627\u06cc\u0634 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0631 Windows Win32 Kernel\n\ud83d\udd34 \u0628\u0647 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a\u200c\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 SYSTEM \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u0646\u062f.\n\ud83d\udd34 \u0645\u0639\u0645\u0648\u0644\u0627\u064b \u0647\u0645\u0631\u0627\u0647 \u0628\u0627 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u0628\u0631\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\ud83d\udea9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-24984 - \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062f\u0631 Windows NTFS\n\ud83d\udd34 \u0628\u0631\u0627\u06cc \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc\u060c \u062f\u0633\u062a\u0631\u0633\u06cc \u0641\u06cc\u0632\u06cc\u06a9\u06cc \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u0627\u0633\u062a\u060c \u06a9\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u06a9\u0645\u06cc\u0627\u0628 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\ud83d\udd34 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0645\u062d\u062a\u0648\u0627\u06cc \u062d\u0633\u0627\u0633 \u062d\u0627\u0641\u0638\u0647 \u0631\u0627 \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u06a9\u0646\u0646\u062f \u06a9\u0647 \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0628\u0647 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0628\u0639\u062f\u06cc \u06a9\u0645\u06a9 \u06a9\u0646\u062f.\n\n\ud83d\udea9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-24991 - \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062f\u0631 Windows NTFS\n\ud83d\udd34 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0641\u0631\u06cc\u0628 \u06a9\u0627\u0631\u0628\u0631 \u0628\u0631\u0627\u06cc \u0627\u062a\u0635\u0627\u0644 \u06cc\u06a9 VHD \u0645\u062e\u0631\u0628 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.\n\ud83d\udd34 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0647 \u0645\u062d\u062a\u0648\u0627\u06cc \u0646\u0627\u0645\u0634\u062e\u0635 \u062d\u0627\u0641\u0638\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f \u0648 \u062d\u0645\u0644\u0627\u062a \u0628\u06cc\u0634\u062a\u0631\u06cc \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\n\u2709\ufe0f@PingChannel\n\u062e\u0628\u0631\u060c \u062a\u062d\u0644\u06cc\u0644\u060c \u0627\u0646\u062a\u0642\u0627\u062f - \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\n\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b", "creation_timestamp": "2025-03-12T13:36:50.000000Z"}, {"uuid": "1a59d44f-b99d-4d3c-afec-b068aea6ab47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/ton618cyber/8435", "content": "Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp\n\nWater Gamayun exploited CVE-2025-26633 to deploy SilentPrism, DarkWisp, and stealers with persistence.\n\nThe Hacker News | thehackernews.com \u2022 Mar 31, 2025", "creation_timestamp": "2025-04-01T06:24:17.000000Z"}, {"uuid": "01ff8912-9398-47bc-ad95-2e7ce626431b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26633", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/2947", "content": "Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp \u2013 thehackernews.com\n\nTue, 01 Apr 2025 00:41:00", "creation_timestamp": "2025-03-31T22:03:03.000000Z"}]}