CRON#TRAPÍøÂç´¹ÂÚÔ˶¯£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows
Ðû²¼Ê±¼ä 2024-11-061. CRON#TRAPÍøÂç´¹ÂÚÔ˶¯£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows
11ÔÂ4ÈÕ£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂç´¹ÂÚÔ˶¯Ê¹ÓÃLinuxÐéÄâ»úѬȾWindowsϵͳ£¬Í¨¹ýÄÚÖúóÃÅÉñÃØ»á¼ûÆóÒµÍøÂç¡£¸ÃÔ˶¯Í¨¹ýαװ³É¡°OneAmerica ÊӲ족µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬·¢ËÍÒ»¸ö°üÀ¨285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½·¨ºÍQEMUÐéÄâ»úÓ¦ÓóÌÐò¡£Æô¶¯¿ì½Ý·½·¨ºó£¬»áÖ´ÐÐPowerShellÏÂÁ½«ÏÂÔصĴ浵ÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬²¢ÔÚ×°±¸ÉÏÉèÖúÍÆô¶¯×Ô½ç˵QEMU LinuxÐéÄâ»ú¡£¸ÃÐéÄâ»úÃûΪ¡°PivotBox¡±£¬Ô¤×°Á˺óÃÅ£¬¿ÉÈ·¼á³¤ÆÚµÄC2ͨѶ£¬Ê¹¹¥»÷ÕßÔÚºǫ́¾ÙÐвÙ×÷¡£ÓÉÓÚQEMUÊÇÕýµ±¹¤¾ß£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬Çå¾²¹¤¾ßÒ²ÎÞ·¨¼ì²éÐéÄâ»úÄÚ²¿µÄ¶ñÒâ³ÌÐò¡£ºóÃŵĽ¹µãÊÇÃûΪChiselµÄÍøÂçËíµÀ³ÌÐò£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬Ê¹¹¥»÷Õß×ÝÈ»ÔÚÍøÂçÊÜ·À»ðǽ±£»¤Ê±Ò²ÄÜÓëºóÃÅͨѶ¡£ÎªÁ˱ÜÃâQEMUÀÄÓ㬽¨Òé¼àÊÓ´ÓÓû§¿É»á¼ûÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈÀú³Ì£¬½«QEMUºÍÆäËûÐéÄ⻯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹Òªº¦Éè±¹ØÁ¬ÄÐéÄ⻯¡£
https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/
2. ºÚ¿ÍÀÄÓÃDocuSign API½¨ÉèÐéα·¢Æ±Ã°³ä×ÅÃûÆ·ÅƾÙÐÐÚ²Æ
11ÔÂ4ÈÕ£¬DocuSign ÊÇÒ»¸öµç×ÓÊðÃûƽ̨£¬Ö§³ÖÒÔÊý×Ö·½·¨Ç©Êð¡¢·¢ËͺÍÖÎÀíÎĵµ¡£Envelopes APIÖ¼ÔÚ×ÊÖú¿Í»§×Ô¶¯·¢ËÍÐèÒªÊðÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÊðÃûºó¼ìË÷ËüÃÇ¡£ÍþвÐÐΪÕßÕýÔÚʹÓÃDocuSignµÄEnvelopes API½¨Éè²¢·Ö·¢¿´ËÆÕæʵµÄÐéα·¢Æ±£¬Ã°³ä×ÅÃûÆ·ÅÆÈçNortonºÍPayPal¡£ËûÃÇʹÓÃÕýµ±µÄ¸¶·ÑDocuSignÕË»§£¬Í¨¹ý¸ÃAPI·¢ËÍÄ£Äâ×ÅÃûÈí¼þ¹«Ë¾Íâ¹ÛºÍ¸ÐÊܵÄÚ²ÆÐÔ·¢Æ±£¬²¢ÓÕµ¼Ä¿µÄ¿Í»§¶ÔÎļþ¾ÙÐеç×ÓÊðÃûÒÔÊÚȨ¸¶¿î¡£ÕâЩ·¢Æ±µÄÓöȿØÖÆÔÚÏÖʵ¹æÄ£ÄÚ£¬ÒÔÔöÌíÆäÕýµ±ÐÔ¡£¾ÝWallarmÇå¾²Ñо¿Ö°Ô±³Æ£¬ÕâÖÖÀÄÓÃÐÐΪÒѾһÁ¬ÁËÒ»¶Îʱ¼ä£¬²¢ÒÑÏòDocuSign±¨¸æ¡£¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳É϶à´Î¾Ù±¨´ËÀàÐÐΪ£¬µ«ËƺõÄÑÒÔ»ñµÃÓÐÓýâ¾ö¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬´ó¹æÄ£±¬·¢£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓò½·¥¼°ÊÇ·ñÍýÏëÔöÇ¿ÕâЩ²½·¥µÄÎÊÌâ×÷³ö̸ÂÛ¡£ºÚ¿ÍÒÑÍùÒ²ÔøÀÄÓÃAPI¾ÙÐÐÆäËû¶ñÒâÔ˶¯£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØµãÁ´½Óµ½ÕÊ»§µÈ¡£
https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/
3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaѬȾ³¬1500̨װ±¸
11ÔÂ5ÈÕ£¬Cleafy Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬ÒÑѬȾÁè¼Ý 1,500 ̨װ±¸£¬Ö÷ҪĿµÄΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ¶¡ÃÀÖÞµÄ16¼ÒÒøÐС£¸Ã¶ñÒâÈí¼þÓ붫ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÏàËÆÖ®´¦£¬µ«´úÂë²î±ðÏÔÖø¡£ToxicPanda ʹÓÃ×°±¸Ú²ÆÊÖÒÕÈƹýÒøÐÐÇå¾²²½·¥£¬¾ÙÐÐÚ²ÆÐÔ×ʽðתÒÆ¡£Ö»¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬´úÂë²»ÍêÕû£¬µ«ËüÒÑÏÔʾ³öÇ¿Ê¢µÄÚ²ÆÄÜÁ¦¡£ToxicPanda ½ÓÄÉÊÖ¶¯·½·¨£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈƹýÒøÐеÄÐÐΪ¼ì²â·ÀÓù¡£Ëü»¹¿ÉÒÔ»á¼ûÊÖ»úÏà²á£¬ÍøÂçÃô¸ÐÐÅÏ¢£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÅþÁ¬ÆäÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷¡£Òâ´óÀûÊÇÆäÖ÷ҪĿµÄ£¬Ñ¬È¾Âʸߴï 56.8%£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃسµÈµØÒ²ÓÐѬȾ¡£±¨¸æÖ¸³ö£¬½ñÊÀ·À²¡¶¾½â¾ö¼Æ»®ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ô¼òÆÓµÄÍþв£¬È±·¦×Ô¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖ÷ÒªÎÊÌâ¡£
https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html
4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ðͬ¶þºÅÐж¯¡±ÖØȹ¥»÷ÍøÂç·¸·¨
11ÔÂ5ÈÕ£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂʱ´ú£¬´úºÅΪ¡°Ðͬ¶þºÅÐж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÖУ¬Àֳɾв¶ÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂÚºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸·¨Ïà¹ØµÄÏÓÒÉÈË£¬²¢´Ý»ÙÁË 22,000 ¸ö IP µØµãÉÏÔËÐеÄ1,037̨·þÎñÆ÷ºÍ»ù´¡ÉèÊ©¡£´Ë´ÎÐж¯Éæ¼°95¸ö¹ú¼Ò£¬»ñµÃÁ˶à¼Ò˽ӪÍøÂçÇå¾²¹«Ë¾µÄÇ鱨֧³Ö¡£Ðж¯ÖУ¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬59̨·þÎñÆ÷±»²é·â£¬43̨µç×Ó×°±¸±»Ã»ÊÕÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý¡£±ðµÄ£¬Õþ¸®»¹ÔÚÊÓ²ìÁíÍâ65ÃûÉæÏÓ¼ÓÈë²»·¨Ô˶¯µÄÈË¡£Ðж¯ÁÁµã°üÀ¨Ïã¸ÛºÍ°ÄÞ¯·½¹Ø±ÕÁË´ó×Ú¶ñÒâ·þÎñÆ÷£¬ÃɹžÙÐÐÁ˶à´ÎºâÓîËѲ鲢²é»ñÁËһ̨·þÎñÆ÷£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâ·þÎñÆ÷ÓÐÁªÏµµÄСÎÒ˽¼Ò²¢²é»ñÁ˵ç×Ó×°±¸£¬°®É³ÄáÑÇÔò²é»ñÁËÁè¼Ý80GBµÄ·þÎñÆ÷Êý¾Ý¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸·¨¾Ö¾Ö³¤ÌåÏÖ£¬ÍøÂç·¸·¨µÄÈ«ÇòÐÔҪǴÔðÇòÓ¦¶Ô£¬´Ë´ÎÐж¯²»µ«´Ý»ÙÁ˶ñÒâ»ù´¡ÉèÊ©£¬»¹±ÜÃâÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙΪÍøÂç·¸·¨µÄÎþÉüÆ·¡£
https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/
5. ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èй¶¾üÊ»ùְλÖã¬Òý·¢Çå¾²µ£ÐÄ
11ÔÂ6ÈÕ£¬ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èÔÚÆäÔÚÏßµØͼ·þÎñµÄ×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄλÖã¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°Æð¾¢Èö²¥¡±¡£ÎÚ¿ËÀ¼¹ú¼ÒÇå¾²Óë¹ú·ÀίԱ»á·´ÐéαÐÅÏ¢²¿·ÖÈÏÕæÈËÌåÏÖ£¬¹È¸èÉÐδÐÞ¸´µØͼ£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½Ðżþ²¢ÔÊÐí¸üС£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêÇ°ÅÄÉãµÄ£¬À´×Ô¹ûÕæȪԴ£¬²¢ÌåÏÖÖØÊÓ´ËÀàÇëÇó²¢ÓëÎÚ¿ËÀ¼¹ÙÔ±¼á³ÖÏàͬ¡£ÎÚ¿ËÀ¼µ£ÐľüÊÂÐÅÏ¢µÄ¹ûÕæ¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂ×°±¸µÄλÖ㬲»µ«¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯×èµ²Æ÷µÄ¹ú¼Ò¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÍøÂçÇ鱨£¬µ«¶íÂÞ˹ÒòÖƲûòÆ·µÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓÉÌÒµ¹«Ë¾¹ºÖ᣹ȸèÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄÐí¶à·þÎñ£¬µ«µØͼµÈ²¿·Ö·þÎñÈÔ¿ÉʹÓ㬵«¹¦Ð§ÓÐÏÞ¡£
https://therecord.media/ukraine-google-locations-revealing-military
6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶
11ÔÂ5ÈÕ£¬¼ÓÄôóÕþ¸®¾Ð²¶ÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨ÓÖÃû"Waifu"ºÍ"Judische"£©¡£¾ÝÅí²©ÉçºÍ404 Media±¨µÀ£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯ΪĿµÄ£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬ÕâЩ×éÖ¯ËùÓÐÊÇSnowflakeµÄ¿Í»§¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄÍŽáÊӲ췢Ã÷£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÉèÖöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬ÓëÖ®Ïà¹ØµÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼Ò·þÎñµÄÊýÒÚСÎÒ˽¼Ò¡£ÆäÖУ¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Í¼±»µÁ¡£SnowflakeÒÔºóÐû²¼½«¶ÔÐÂÕË»§Ç¿ÖÆʵÑéMFA£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û¡£
https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/