Quad7½©Ê¬ÍøÂçÃé×¼SOHO×°±¸£¬Í¨Ñ¶Õ½ÂÔ¸üÒþÃØ

Ðû²¼Ê±¼ä 2024-09-10
1. Quad7½©Ê¬ÍøÂçÃé×¼SOHO×°±¸£¬Í¨Ñ¶Õ½ÂÔ¸üÒþÃØ


9ÔÂ9ÈÕ£¬Quad7 ½©Ê¬ÍøÂç½üÆÚͨ¹ý¶¨ÖƶñÒâÈí¼þ¹¥»÷¸ü¶àSOHO×°±¸£¬ÓÈÆäÊÇZyxel VPN¡¢Ruckus ÎÞÏß·ÓÉÆ÷ºÍAxentraýÌå·þÎñÆ÷£¬ÏÔʾ³öÆäÒ»Ö±½ø»¯µÄÔËÓªÕ½ÂÔ¡£¸ÃÍøÂç²»µ«Õë¶ÔTP-LinkºÍ»ªË¶Â·ÓÉÆ÷£¬»¹À©Õ¹µ½ÐµÄÄ¿µÄ£¬Ê¹Óòî±ðµÇ¼±äÌåÈç¡°xlogin¡±¡¢¡°alogin¡±¡¢¡°rlogin¡±ºÍ¡°zylogin¡±£¬Í¨¹ýÌض¨¶Ë¿Ú¿ØÖÆ×°±¸¡£Ö»¹ÜijЩм¯ÈºÈç¡°rlogin¡±ºÍ¡°zylogin¡±Ñ¬È¾°¸ÀýÏà¶Ô½ÏÉÙ£¬µ«Ç±ÔÚÍþв½ûֹСê¿ÉÄÜЯ´øÕë¶Ô¸üÆÕ±é×°±¸µÄÐÂÎó²î¡£Quad7 µÄÑݱ仹°üÀ¨ÊÖÒÕÉϵÄˢУ¬Èç·ÅÆú¹Å°åµÄSOCKSÊðÀí£¬×ª¶ø½ÓÄÉKCPЭæź͡°FsyNet¡±¹¤¾ß¾ÙÐÐUDPͨѶ£¬ÒÔ¼°Ê¹Óá°UPDTAE¡±ºóÃźÍHTTP·´Ïòshell¾ÙÐиüÒþ²ØµÄ¿ØÖÆ£¬ÕâЩ¶¼¼«´óµØÔöÌíÁ˼ì²âÄѶÈ¡£±ðµÄ£¬ÊµÑéÖеġ°netd¡±¶þ½øÖÆÎļþÓëCJD route2ЭÒéµÄ͎ᣬԤʾ×Å¿ÉÄÜ¿ª·¢³ö¸üΪÒþÃصÄͨѶ»úÖÆ¡£ÃæÁÙÕâÖðÒ»Á¬ÑݱäµÄÍþв£¬Óû§Ó¦½ÓÄÉÆð¾¢·ÀÓù²½·¥£¬°üÀ¨×°ÖÃ×îй̼þ¸üС¢¸ü¸ÄĬÈÏÖÎÀíÃÜÂë¡¢½ûÓò»ÐëÒªµÄWebÖÎÀí¹¦Ð§£¬²¢ÔÚ¿ÉÄܵÄÇéÐÎÏÂÉý¼¶ÖÁÖ§³Öºã¾ÃÇå¾²¸üеÄ×°±¸ÐͺÅ¡£


https://www.bleepingcomputer.com/news/security/quad7-botnet-targets-more-soho-and-vpn-routers-media-servers/


2. Highline¹«Á¢Ñ§Ð£ÒòÍøÂç¹¥»÷¹Ø±ÕȫѧÇø£¬Ñ§Éú¿ªÑ§ÊÜ×è


9ÔÂ9ÈÕ£¬»ªÊ¢¶ÙÖÝHighline¹«Á¢Ñ§Ð£Ñ§Çø£¬·þÎñ²¼Àï¶÷¡¢µÃ÷Òò¡¢ÅµÂüµ×¹«Ô°¡¢Î÷Ëþ¿ÆºÍ°×ÖÐÐÄÉçÇøµÄ34ËùѧУ¼°17,500ÃûѧÉú£¬¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬µ¼ÖÂѧÇøÊÖÒÕϵͳ·ºÆðδÊÚȨÔ˶¯¡£ÎªÈ·±£Ñ§ÉúÇå¾²£¬Ñ§Çø½ôÆȹرÕÁËËùÓÐѧУ²¢×÷·ÏÁËÔ­¶¨ÓÚ9ÔÂ9ÈÕµÄËùÓÐÔ˶¯£¬°üÀ¨ÌåÓýºÍ¾Û»á£¬Ö»¹ÜѧÇøÖÐÑë°ì¹«ÊÒÈÔÕý³£ÔË×÷¡£Ñ§ÇøѸËÙÐж¯£¬¸ôÀëÒªº¦ÏµÍ³£¬²¢ÓëµÚÈý·½¼°ÖÝ¡¢Áª°îÏàÖúͬ°éϸÃÜÏàÖú£¬ÒÔÇå¾²»Ö¸´ºÍ²âÊÔϵͳ¡£´Ë´ÎÍ»·¢×´Ì¬ÓÈÆä¶ÔѧÉú¼ÒÍ¥Ôì³Éδ±ã£¬ÌØÊâÊÇÕýÖµÓ׶ùÔ°¿ªÑ§Ç°Ï¦£¬Ñ§Çø¶Ô´ËÉî±íǸÒ⣬²¢Ç¿µ÷ѧÉúÇå¾²ÊÇÖ÷Òª¿¼Á¿¡£ÏÖÔÚ£¬ÊÓ²ìÊÂÇéÕýÔÚ¾ÙÐÐÖУ¬ÉÐδÃ÷È·ÍøÂç¹¥»÷µÄÏêϸÐÔ×Ó¼°ÊÇ·ñÓÐʦÉúСÎÒ˽¼ÒÐÅϢй¶¡£HighlineѧÇøÍýÏëÓÚÖÜÒ»ÏÂÖçÇ°Ïò½ÌÖ°Ô±¹¤ºÍ¼Ò³¤×ª´ïºóÐø°²ÅÅ¡£


https://www.bleepingcomputer.com/news/security/highline-public-schools-closes-schools-following-cyberattack/


3. Predator Ìع¤Èí¼þÐж¯ÒÔеĻù´¡ÉèÊ©¾íÍÁÖØÀ´


9ÔÂ9ÈÕ£¬ÔÚÃÀ¹ú¶ÔIntellexaͬÃËʵÑéÖƲúó£¬Ñо¿Ö°Ô±·¢³öÔ¤¾¯£¬Ö¸³öPredatorÌع¤Èí¼þ¿ÉÄÜͨ¹ýлù´¡ÉèÊ©¾íÍÁÖØÀ´¡£´ËÇ°£¬ÃÀ¹ú²ÆÎñ²¿ÒòIntellexaÔÚ¿ª·¢ºÍ·Ö·¢Õë¶ÔÃÀ¹úÈ˵ÄÉÌÒµÌع¤Èí¼þÖеÄ×÷Ó㬶ÔÆäÏà¹ØСÎÒ˽¼ÒºÍʵÌå¾ÙÐÐÁËÖƲá£PredatorÒÔÆäÆÕ±éµÄÊý¾ÝÇÔÈ¡ºÍ¼àÊÓ¹¦Ð§Öø³Æ£¬Ôø±»ÓÃÓÚ¼àÊÓÕþ¸®¹ÙÔ±¡¢¼ÇÕß¼°Õþ²ßר¼Ò¡£ÖƲú󣬸ÃÌع¤Èí¼þÔ˶¯Ò»¶ÈïÔÌ­£¬µ«ÏÖÒÑÔÚлù´¡ÉèÊ©ÉÏÖØлîÔ¾£¬ÓÈÆäÊÇÔÚ¸Õ¹ûÃñÖ÷¹²ºÍ¹úºÍ°²¸çÀ­µÈ¹ú¼ÒÒ»Á¬±»Ê¹Óá£Recorded FutureÖ¸³ö£¬PredatorµÄËÕÐÑ¿ÉÄÜÓëÆäˢеĻù´¡ÉèÊ©¡¢ÔöÇ¿µÄÄäÃû²Ù×÷ºÍÌӱܼì²âÄÜÁ¦ÓйØ£¬Ê¹µÃ×·×Ù±äµÃ¸üΪÄÑÌâ¡£Ö»¹Ü¹¥»÷Á´Î´±ä£¬ÈÔÒÀÀµ¡°Ò»¼ü¡±ºÍ¡°Áãµã»÷¡±Îó²î£¬µ«Predator¶Ô×ÅÃûÈËÊ¿ÈçÕþ¿Í¡¢¸ß¹Ü¡¢¼ÇÕߺÍÔ˶¯¼ÒµÄÍþвÒÀ¾ÉÖØ´ó¡£Æä¸ß°ºµÄÔÊÐí·ÑÅú×¢£¬¸ÃÈí¼þ±»ÓÃÓÚÕë¶ÔÕ½ÂÔÐÔ¡¢¸ß¼ÛֵĿµÄ¡£ÕâÒ»Ç÷ÊÆÒý·¢ÁËÅ·Ã˵ȵØÇø¶Ô¹ÍÓ¶Ìع¤Èí¼þÀÄÓõĵ£ÐÄ£¬ÓÈÆäÊÇÔÚÕþÖÎ×èµ²ÅɺͼÇÕßÖеÄʹÓã¬ÒÑÒý·¢¶Ô¼àÊÓÕýµ±ÐÔºÍÆ·µÂÐеÄÖÊÒÉ¡£Ëæ׿à¿ØÊг¡µÄÒ»Ö±ÔöÌí£¬Õþ¸®ºÍÍøÂçÇ徲ר¼ÒÐè¼á³Ö¸ß¶ÈСÐÄ£¬ÒÔÓ¦¶ÔÖØ´ó¶ñÒâÈí¼þºÍ¼à¿Ø¹¤¾ß´øÀ´µÄÌôÕ½¡£


https://securityaffairs.com/168222/intelligence/predator-spyware-new-infrastructure.html


4. Slim CDÔâºÚ¿ÍÈëÇÖ£¬½ü170ÍòÓû§ÐÅÓÿ¨¼°Ð¡ÎÒ˽¼ÒÊý¾Ýй¶


9ÔÂ9ÈÕ£¬Slim CD×÷ΪΪÁãÊÛ¡¢Âùݼ°²ÍÒûµÈÐÐÒµÌṩ֧¸¶½â¾ö¼Æ»®µÄ·þÎñÉÌ£¬¿ËÈÕ¹ûÕæÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬¸ÃÊÂÎñ²¨¼°½ü170ÍòÓû§£¬ÆäÐÅÓÿ¨¼°Ð¡ÎÒ˽¼ÒÃô¸ÐÐÅÏ¢Ô⵽й¶¡£ºÚ¿ÍÔÚ³¤´ï½üÒ»ÄêµÄʱ¼äÀ2023Äê8ÔÂÖÁ2024Äê6Ô£©£¬ÇÄÎÞÉùÏ¢µØÇÖÈëÁËSlim CDµÄϵͳ¡£¸Ã¹«Ë¾ÓÚ½ñÄê6ÔÂ15ÈÕÊ״βì¾õÒì³£Ô˶¯£¬²¢×·ËÝ·¢Ã÷ºÚ¿ÍÈëÇÖʼÓÚ2023Äê8ÔÂ17ÈÕ¡£Ö»¹ÜÈëÇÖʱ¼ä³¤£¬µ«Slim CDÖ¸³ö£¬ÐÅÓÿ¨ÐÅÏ¢µÄÉó²é»òÇÔÈ¡Ö÷Òª¼¯ÖÐÔÚ6ÔÂ14ÈÕÖÁ15ÈÕÕâÁ½Ì졣鶵ÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µØµã¡¢ÐÅÓÿ¨ºÅÂë¼°ÓÐÓÃÆÚ£¬Ö»¹Üδ°üÀ¨Òªº¦µÄ¿¨ÑéÖ¤ºÅ£¨CVV£©£¬µ«ÈÔÔöÌíÁËÐÅÓÿ¨Ú²Æ­µÄΣº¦¡£Slim CDÒÑÔöÇ¿ÆäÇ徲ϵͳÒÔÌá·ÀδÀ´ÀàËÆÊÂÎñ£¬²¢½¨ÒéÊÜÓ°ÏìÓû§Ìá¸ßСÐÄ£¬×¢ÖØڲƭ¼£Ï󣬲¢Á¬Ã¦ÏòÒøÐб¨¸æÈκοÉÒÉÔ˶¯¡£ÖµµÃ×¢ÖصÄÊÇ£¬ÊÜÓ°ÏìµÄÓû§²¢Î´»ñµÃÃâ·ÑÉí·Ý͵ÇÔ±£»¤·þÎñ¡£


https://www.bleepingcomputer.com/news/security/payment-gateway-data-breach-affects-17-million-credit-card-owners/


5. RAMBO¹¥»÷ʹÓÃÄÚ´æ×ÜÏßÎÞÏßµçÐźŴӸôÀëϵͳÇÔÈ¡Êý¾Ý


9ÔÂ9ÈÕ£¬Ñо¿Ö°Ô±Mordechai Guri¿ª·¢³öÁËÒ»ÖÖÃûΪRAMBOµÄÐÂÐ͹¥»÷ÊÖÒÕ£¬¸ÃÊÖÒÕʹÓÃÄÚ´æ×ÜÏß±¬·¢µÄÎÞÏßµçÐźÅ£¬ÀֳɵشÓÎïÀíºÍÂß¼­Ë«ÖظôÀëµÄϵͳÖÐÔ¶³ÌÇÔÈ¡Êý¾Ý¡£¸ÃÊÖÒÕÔÊÐí¹¥»÷ÕßÒÔÿÃë1,000±ÈÌصÄËÙÂÊ£¬ÔÚ×îÔ¶7Ã×¾àÀëÄÚ͵ȡ°üÀ¨¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢°´¼üºÍÉúÎïÌØÕ÷ÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£Í¨¹ýÈí¼þ½ç˵ÎÞÏߵ磨SDR£©Ó²¼þºÍÌìÏߣ¬¶ñÒâÈí¼þÄܹ»ÔÚ¸ôÀëϵͳÖбàÂëÊý¾Ý£¬²¢½«ÕâЩ±àÂëºóµÄÊý¾ÝÒÔµç´Å²¨µÄÐÎʽ·øÉä³öÈ¥£¬½ø¶ø±»Ô¶´¦µÄÎüÊÕ×°±¸²¶»ñ²¢½âÂë¡£RAMBO¹¥»÷µÄ½¹µãÔÚÓÚʹÓÃRAMµÄ»á¼ûģʽ£¬ÌìÉúÓë¶þ½øÖÆÊý¾ÝÏà¶ÔÓ¦µÄµç´ÅÐźÅ£¬ÐγÉÒþ²ØͨµÀ¡£ÕâÖÖ¹¥»÷·½·¨Í»ÆÆÁ˹Űå¸ôÀëϵͳµÄÇå¾²·ÀµØ£¬ÓÉÓÚ¼´±ãϵͳ±»ÎïÀí¸ôÀ룬ҲÎÞ·¨µÖÓùÀ´×ÔÄÚ²¿¶ñÒâÈí¼þµÄÍþв¡£¶ñÒâÈí¼þ¿Éͨ¹ý¶àÖÖ;¾¶£¨ÈçѬȾUSBÇý¶¯Æ÷¡¢ÄÚ²¿Ö°Ô±¶ñÒâ²Ù×÷»ò¹©Ó¦Á´¹¥»÷£©±»Ö²Èë¸ôÀëϵͳ¡£Mordechai Guri½øÒ»²½Õ¹ÏÖÁËÊý¾Ýͨ¹ýRAM´«Êäʱ±¬·¢µÄµç´Å·øÉäÊÇ鶵ÄÒªº¦£¬ÕâЩ·øÉäµÄƵÂÊÓëÊý¾Ý¿í¶È¡¢Ê±ÖÓËÙÂʼ°ÏµÍ³¼Ü¹¹Ï¸ÃÜÏà¹Ø¡£Í¨¹ý׼ȷ¿ØÖÆÄÚ´æ»á¼ûÖ¸Á¹¥»÷ÕßÄܹ»½¨Éèµç´ÅÒþ²ØͨµÀ£¬ÊµÏÖÊý¾ÝµÄÔ¶³Ì´«Êä¡£Õë¶ÔRAMBO¹¥»÷£¬Ñо¿Ö°Ô±Ò²Ìá³öÁËÏìÓ¦µÄ·ÀÓùÕ½ÂԺͱ£»¤²½·¥¡£


https://www.securityweek.com/new-rambo-attack-allows-air-gapped-data-theft-via-ram-radio-signals/


6. ³¯ÏʺڿÍʹÓÃLinkedInÓÕÆ­°²ÅÅCOVERTCATCH¶ñÒâÈí¼þ


9ÔÂ7ÈÕ£¬³¯ÏÊÍþвÐÐΪÕßͨ¹ýLinkedInƽ̨¶ÔWeb3ÁìÓòµÄ¿ª·¢Ö°Ô±ÊµÑéÁËһϵÁÐÈ«ÐIJ߻®µÄÐéαÕÐƸ¹¥»÷£¬Ê¹ÓÃÉç»á¹¤³ÌѧÊÖ¶ÎÓÕÆ­Ä¿µÄÏÂÔز¢Ö´ÐжñÒâÈí¼þ¡£¹È¸è×Ó¹«Ë¾MandiantÔÚÆä×îб¨¸æÖÐÕ¹ÏÖÁËÕâЩ¹¥»÷µÄϸ½Ú£¬Ö¸³ö¹¥»÷Õß³£ÒÔ±àÂë²âÊÔΪ»Ï×Ó£¬Í¨¹ý·¢ËÍ°üÀ¨COVERTCATCH¶ñÒâÈí¼þµÄZIPÎļþ×÷Ϊ³õʼѬȾÊֶΡ£¸Ã¶ñÒâÈí¼þÖ¼ÔÚѬȾmacOSϵͳ£¬²¢Í¨¹ýÏÂÔصڶþ½×¶ÎÓÐÓøºÔؽ¨É賤ÆÚÐÔ¿ØÖÆ¡£´ËÀàÔ˶¯ÊôÓÚ³¯ÏʺڿÍ×éÖ¯ÆÕ±éÔ˶¯µÄÒ»²¿·Ö£¬Èç¡°ÃÎÏëÊÂÇéÐж¯¡±µÈ£¬ËüÃÇʹÓÃÊÂÇéÓÕ¶üÈö²¥RustBucket¡¢KANDYKORNµÈ¶ñÒâÈí¼þ¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬³¯ÏʺڿͲ»µ«ÏÞÓÚÉç»á¹¤³Ìѧ¹¥»÷£¬»¹Éæ×ãÈí¼þ¹©Ó¦Á´¹¥»÷£¬ÈçÕë¶Ô3CXºÍJumpCloudµÄÏÈÀýËùʾ¡£Ò»µ©Í¨¹ý¶ñÒâÈí¼þ»ñµÃפ×ãµã£¬¹¥»÷Õß»á½øÒ»²½ÇÔÈ¡ÃÜÂë¡¢¾ÙÐÐÄÚ²¿Õì̽£¬²¢Éø͸ÔÆÇéÐÎÒÔ͵ȡ¼ÓÃÜÇ®±Ò×ʽð¡£FBIÒ²·¢³öÖÒÑÔ£¬Ö¸³ö³¯ÏÊÍþвÐÐΪÕßÕýʹÓø߶ȶ¨ÖÆ»¯µÄÉç»á¹¤³ÌÔ˶¯£¬ÌØÊâÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÐÐÒµ£¬Í¨¹ýαÔì¸öÐÔ»¯ÕÐƸ»òͶ×Êʱ»ú£¬ÍýÏëΪÊÜÖƲõij¯ÏÊ»ñÈ¡²»·¨ÊÕÈë¡£ÕâЩ¹¥»÷Ç°³£ÅãͬÏ꾡µÄÊܺ¦ÕßÅä¾°ÊӲ죬ÒÔÔöÇ¿ÐÅÍиУ¬Ìá¸ß¹¥»÷ÀÖ³ÉÂÊ¡£FBIÇ¿µ÷£¬·¸·¨·Ö×Ó»áʹÓÃÊܺ¦ÕßµÄСÎÒ˽¼ÒÐÅÏ¢»òÏÊΪÈËÖªµÄϸ½ÚÀ´½¨ÉèÁªÏµ£¬½ø¶øÈö²¥¶ñÒâÈí¼þ£¬ÊµÏÖÆä²»·¨Ä¿µÄ¡£


https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html