CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows

Ðû²¼Ê±¼ä 2024-11-06

1. CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows


11ÔÂ4ÈÕ£¬£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂç´¹ÂڻʹÓÃLinuxÐéÄâ»úѬȾWindowsϵͳ£¬£¬Í¨¹ýÄÚÖúóÃÅÉñÃØ»á¼ûÆóÒµÍøÂç¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³É¡°OneAmerica ÊӲ족µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬·¢ËÍÒ»¸ö°üÀ¨285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½·¨ºÍQEMUÐéÄâ»úÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£Æô¶¯¿ì½Ý·½·¨ºó£¬£¬»áÖ´ÐÐPowerShellÏÂÁ£¬½«ÏÂÔØµÄ´æµµÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬£¬²¢ÔÚ×°±¸ÉÏÉèÖÃºÍÆô¶¯×Ô½ç˵QEMU LinuxÐéÄâ»ú¡£¡£¡£¡£¡£¡£¸ÃÐéÄâ»úÃûΪ¡°PivotBox¡±£¬£¬Ô¤×°Á˺óÃÅ£¬£¬¿ÉÈ·¼á³¤ÆÚµÄC2ͨѶ£¬£¬Ê¹¹¥»÷ÕßÔÚºǫ́¾ÙÐвÙ×÷¡£¡£¡£¡£¡£¡£ÓÉÓÚQEMUÊÇÕýµ±¹¤¾ß£¬£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬£¬Çå¾²¹¤¾ßÒ²ÎÞ·¨¼ì²éÐéÄâ»úÄÚ²¿µÄ¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£ºóÃŵĽ¹µãÊÇÃûΪChiselµÄÍøÂçËíµÀ³ÌÐò£¬£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬£¬Ê¹¹¥»÷Õß×ÝÈ»ÔÚÍøÂçÊÜ·À»ðǽ±£»£»£»£»£»£»¤Ê±Ò²ÄÜÓëºóÃÅͨѶ¡£¡£¡£¡£¡£¡£ÎªÁ˱ÜÃâQEMUÀÄÓ㬣¬½¨Òé¼àÊÓ´ÓÓû§¿É»á¼ûÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈÀú³Ì£¬£¬½«QEMUºÍÆäËûÐéÄ⻯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬£¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹Òªº¦Éè±¹ØÁ¬ÄÐéÄ⻯¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/


2. ºÚ¿ÍÀÄÓÃDocuSign API½¨ÉèÐéα·¢Æ±Ã°³ä×ÅÃûÆ·ÅÆ¾ÙÐÐڲƭ


11ÔÂ4ÈÕ£¬£¬DocuSign ÊÇÒ»¸öµç×ÓÊðÃûƽ̨£¬£¬Ö§³ÖÒÔÊý×Ö·½·¨Ç©Êð¡¢·¢ËͺÍÖÎÀíÎĵµ¡£¡£¡£¡£¡£¡£Envelopes APIÖ¼ÔÚ×ÊÖú¿Í»§×Ô¶¯·¢ËÍÐèÒªÊðÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÊðÃûºó¼ìË÷ËüÃÇ¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÕýÔÚʹÓÃDocuSignµÄEnvelopes API½¨Éè²¢·Ö·¢¿´ËÆÕæÊµµÄÐéα·¢Æ±£¬£¬Ã°³ä×ÅÃûÆ·ÅÆÈçNortonºÍPayPal¡£¡£¡£¡£¡£¡£ËûÃÇʹÓÃÕýµ±µÄ¸¶·ÑDocuSignÕË»§£¬£¬Í¨¹ý¸ÃAPI·¢ËÍÄ£Äâ×ÅÃûÈí¼þ¹«Ë¾Íâ¹ÛºÍ¸ÐÊܵÄڲƭÐÔ·¢Æ±£¬£¬²¢ÓÕµ¼Ä¿µÄ¿Í»§¶ÔÎļþ¾ÙÐеç×ÓÊðÃûÒÔÊÚȨ¸¶¿î¡£¡£¡£¡£¡£¡£ÕâЩ·¢Æ±µÄÓöȿØÖÆÔÚÏÖʵ¹æÄ£ÄÚ£¬£¬ÒÔÔöÌíÆäÕýµ±ÐÔ¡£¡£¡£¡£¡£¡£¾ÝWallarmÇå¾²Ñо¿Ö°Ô±³Æ£¬£¬ÕâÖÖÀÄÓÃÐÐΪÒѾ­Ò»Á¬ÁËÒ»¶Îʱ¼ä£¬£¬²¢ÒÑÏòDocuSign±¨¸æ¡£¡£¡£¡£¡£¡£¿£¿£¿£¿ £¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳É϶à´Î¾Ù±¨´ËÀàÐÐΪ£¬£¬µ«ËƺõÄÑÒÔ»ñµÃÓÐÓýâ¾ö¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬£¬´ó¹æÄ£±¬·¢£¬£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ¡£¡£¡£¡£¡£¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓò½·¥¼°ÊÇ·ñÍýÏëÔöÇ¿ÕâЩ²½·¥µÄÎÊÌâ×÷³ö̸ÂÛ¡£¡£¡£¡£¡£¡£ºÚ¿ÍÒÑÍùÒ²ÔøÀÄÓÃAPI¾ÙÐÐÆäËû¶ñÒâ»î¶¯£¬£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØµãÁ´½Óµ½ÕÊ»§µÈ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/


3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaѬȾ³¬1500̨װ±¸


11ÔÂ5ÈÕ£¬£¬Cleafy Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬£¬ÒÑѬȾÁè¼Ý 1,500 ̨װ±¸£¬£¬Ö÷ҪĿµÄΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ­¶¡ÃÀÖÞµÄ16¼ÒÒøÐС£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓë¶«ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬µ«´úÂë²î±ðÏÔÖø¡£¡£¡£¡£¡£¡£ToxicPanda ʹÓÃ×°±¸Ú²Æ­ÊÖÒÕÈÆ¹ýÒøÐÐÇå¾²²½·¥£¬£¬¾ÙÐÐڲƭÐÔ×ʽð×ªÒÆ¡£¡£¡£¡£¡£¡£Ö»¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬£¬´úÂë²»ÍêÕû£¬£¬µ«ËüÒÑÏÔʾ³öǿʢµÄڲƭÄÜÁ¦¡£¡£¡£¡£¡£¡£ToxicPanda ½ÓÄÉÊÖ¶¯·½·¨£¬£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈÆ¹ýÒøÐеÄÐÐΪ¼ì²â·ÀÓù¡£¡£¡£¡£¡£¡£Ëü»¹¿ÉÒÔ»á¼ûÊÖ»úÏà²á£¬£¬ÍøÂçÃô¸ÐÐÅÏ¢£¬£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÅþÁ¬ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£Òâ´óÀûÊÇÆäÖ÷ҪĿµÄ£¬£¬Ñ¬È¾Âʸߴï 56.8%£¬£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃØÂ³µÈµØÒ²ÓÐѬȾ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬½ñÊÀ·À²¡¶¾½â¾ö¼Æ»®ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ô¼òÆÓµÄÍþв£¬£¬È±·¦×Ô¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖ÷ÒªÎÊÌâ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html


4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ð­Í¬¶þºÅÐж¯¡±ÖØÈ­¹¥»÷ÍøÂç·¸·¨


11ÔÂ5ÈÕ£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂʱ´ú£¬£¬´úºÅΪ¡°Ð­Í¬¶þºÅÐж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÖУ¬£¬Àֳɾв¶ÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂÚºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸·¨Ïà¹ØµÄÏÓÒÉÈË£¬£¬²¢´Ý»ÙÁË 22,000 ¸ö IP µØµãÉÏÔËÐеÄ1,037̨ЧÀÍÆ÷ºÍ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯Éæ¼°95¸ö¹ú¼Ò£¬£¬»ñµÃÁ˶à¼ÒË½ÓªÍøÂçÇå¾²¹«Ë¾µÄÇ鱨֧³Ö¡£¡£¡£¡£¡£¡£Ðж¯ÖУ¬£¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬£¬59̨ЧÀÍÆ÷±»²é·â£¬£¬43̨µç×Ó×°±¸±»Ã»ÊÕÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬Õþ¸®»¹ÔÚÊÓ²ìÁíÍâ65ÃûÉæÏÓ¼ÓÈë²»·¨»î¶¯µÄÈË¡£¡£¡£¡£¡£¡£Ðж¯ÁÁµã°üÀ¨Ïã¸ÛºÍ°ÄÞ¯·½¹Ø±ÕÁË´ó×Ú¶ñÒâЧÀÍÆ÷£¬£¬ÃɹžÙÐÐÁ˶à´ÎºâÓîËѲ鲢²é»ñÁËһ̨ЧÀÍÆ÷£¬£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâЧÀÍÆ÷ÓÐÁªÏµµÄСÎÒ˽¼Ò²¢²é»ñÁ˵ç×Ó×°±¸£¬£¬°®É³ÄáÑÇÔò²é»ñÁËÁè¼Ý80GBµÄЧÀÍÆ÷Êý¾Ý¡£¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸·¨¾Ö¾Ö³¤ÌåÏÖ£¬£¬ÍøÂç·¸·¨µÄÈ«ÇòÐÔҪǴÔðÇòÓ¦¶Ô£¬£¬´Ë´ÎÐж¯²»µ«´Ý»ÙÁ˶ñÒâ»ù´¡ÉèÊ©£¬£¬»¹±ÜÃâÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙÎªÍøÂç·¸·¨µÄÎþÉüÆ·¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/


5. ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èй¶¾üÊ»ùְλÖ㬣¬Òý·¢Çå¾²µ£ÐÄ


11ÔÂ6ÈÕ£¬£¬ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èÔÚÆäÔÚÏßµØÍ¼Ð§À͵Ä×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄλÖ㬣¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°Æð¾¢Èö²¥¡±¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼¹ú¼ÒÇå¾²Óë¹ú·ÀίԱ»á·´ÐéαÐÅÏ¢²¿·ÖÈÏÕæÈËÌåÏÖ£¬£¬¹È¸èÉÐδÐÞ¸´µØÍ¼£¬£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½Ðżþ²¢ÔÊÐí¸üС£¡£¡£¡£¡£¡£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêǰÅÄÉãµÄ£¬£¬À´×Ô¹ûÕæÈªÔ´£¬£¬²¢ÌåÏÖÖØÊÓ´ËÀàÇëÇó²¢ÓëÎÚ¿ËÀ¼¹ÙÔ±¼á³ÖÏàͬ¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼µ£ÐľüÊÂÐÅÏ¢µÄ¹ûÕæ¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂ×°±¸µÄλÖ㬣¬²»µ«¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯×èµ²Æ÷µÄ¹ú¼Ò¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÍøÂçÇ鱨£¬£¬µ«¶íÂÞ˹ÒòÖÆ²Ã»òÆ·µÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓÉÌÒµ¹«Ë¾¹ºÖᣡ£¡£¡£¡£¡£¹È¸èÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄÐí¶àЧÀÍ£¬£¬µ«µØÍ¼µÈ²¿·ÖЧÀÍÈÔ¿ÉʹÓ㬣¬µ«¹¦Ð§ÓÐÏÞ¡£¡£¡£¡£¡£¡£


https://therecord.media/ukraine-google-locations-revealing-military


6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶


11ÔÂ5ÈÕ£¬£¬¼ÓÄôóÕþ¸®¾Ð²¶ÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨ÓÖÃû"Waifu"ºÍ"Judische"£©¡£¡£¡£¡£¡£¡£¾ÝÅí²©ÉçºÍ404 Media±¨µÀ£¬£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯ΪĿµÄ£¬£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬£¬ÕâЩ×éÖ¯ËùÓÐÊÇSnowflakeµÄ¿Í»§¡£¡£¡£¡£¡£¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄÁªºÏÊӲ췢Ã÷£¬£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÉèÖöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»£»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬£¬ÓëÖ®Ïà¹ØµÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼ÒЧÀ͵ÄÊýÒÚСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Í¼±»µÁ¡£¡£¡£¡£¡£¡£SnowflakeÒÔºóÐû²¼½«¶ÔÐÂÕË»§Ç¿ÖÆÊµÑéMFA£¬£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/