CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows

Ðû²¼Ê±¼ä 2024-11-06

1. CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂç´¹ÂڻʹÓÃLinuxÐéÄâ»úѬȾWindowsϵͳ£¬£¬£¬£¬£¬Í¨¹ýÄÚÖúóÃÅÉñÃØ»á¼ûÆóÒµÍøÂç¡£¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³É¡°OneAmerica ÊӲ족µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬·¢ËÍÒ»¸ö°üÀ¨285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬£¬£¬£¬£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½·¨ºÍQEMUÐéÄâ»úÓ¦ÓóÌÐò¡£¡£¡£¡£¡£Æô¶¯¿ì½Ý·½·¨ºó£¬£¬£¬£¬£¬»áÖ´ÐÐPowerShellÏÂÁ£¬£¬£¬£¬½«ÏÂÔØµÄ´æµµÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬£¬£¬£¬£¬²¢ÔÚ×°±¸ÉÏÉèÖÃºÍÆô¶¯×Ô½ç˵QEMU LinuxÐéÄâ»ú¡£¡£¡£¡£¡£¸ÃÐéÄâ»úÃûΪ¡°PivotBox¡±£¬£¬£¬£¬£¬Ô¤×°Á˺óÃÅ£¬£¬£¬£¬£¬¿ÉÈ·¼á³¤ÆÚµÄC2ͨѶ£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÔÚºǫ́¾ÙÐвÙ×÷¡£¡£¡£¡£¡£ÓÉÓÚQEMUÊÇÕýµ±¹¤¾ß£¬£¬£¬£¬£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬£¬£¬£¬£¬Çå¾²¹¤¾ßÒ²ÎÞ·¨¼ì²éÐéÄâ»úÄÚ²¿µÄ¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£ºóÃŵĽ¹µãÊÇÃûΪChiselµÄÍøÂçËíµÀ³ÌÐò£¬£¬£¬£¬£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬£¬£¬£¬£¬Ê¹¹¥»÷Õß×ÝÈ»ÔÚÍøÂçÊÜ·À»ðǽ±£»£»£»¤Ê±Ò²ÄÜÓëºóÃÅͨѶ¡£¡£¡£¡£¡£ÎªÁ˱ÜÃâQEMUÀÄÓ㬣¬£¬£¬£¬½¨Òé¼àÊÓ´ÓÓû§¿É»á¼ûÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈÀú³Ì£¬£¬£¬£¬£¬½«QEMUºÍÆäËûÐéÄ⻯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬£¬£¬£¬£¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹Òªº¦Éè±¹ØÁ¬ÄÐéÄ⻯¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/


2. ºÚ¿ÍÀÄÓÃDocuSign API½¨ÉèÐéα·¢Æ±Ã°³ä×ÅÃûÆ·ÅÆ¾ÙÐÐڲƭ


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬DocuSign ÊÇÒ»¸öµç×ÓÊðÃûƽ̨£¬£¬£¬£¬£¬Ö§³ÖÒÔÊý×Ö·½·¨Ç©Êð¡¢·¢ËͺÍÖÎÀíÎĵµ¡£¡£¡£¡£¡£Envelopes APIÖ¼ÔÚ×ÊÖú¿Í»§×Ô¶¯·¢ËÍÐèÒªÊðÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÊðÃûºó¼ìË÷ËüÃÇ¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÕýÔÚʹÓÃDocuSignµÄEnvelopes API½¨Éè²¢·Ö·¢¿´ËÆÕæÊµµÄÐéα·¢Æ±£¬£¬£¬£¬£¬Ã°³ä×ÅÃûÆ·ÅÆÈçNortonºÍPayPal¡£¡£¡£¡£¡£ËûÃÇʹÓÃÕýµ±µÄ¸¶·ÑDocuSignÕË»§£¬£¬£¬£¬£¬Í¨¹ý¸ÃAPI·¢ËÍÄ£Äâ×ÅÃûÈí¼þ¹«Ë¾Íâ¹ÛºÍ¸ÐÊܵÄڲƭÐÔ·¢Æ±£¬£¬£¬£¬£¬²¢ÓÕµ¼Ä¿µÄ¿Í»§¶ÔÎļþ¾ÙÐеç×ÓÊðÃûÒÔÊÚȨ¸¶¿î¡£¡£¡£¡£¡£ÕâЩ·¢Æ±µÄÓöȿØÖÆÔÚÏÖʵ¹æÄ£ÄÚ£¬£¬£¬£¬£¬ÒÔÔöÌíÆäÕýµ±ÐÔ¡£¡£¡£¡£¡£¾ÝWallarmÇå¾²Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ÕâÖÖÀÄÓÃÐÐΪÒѾ­Ò»Á¬ÁËÒ»¶Îʱ¼ä£¬£¬£¬£¬£¬²¢ÒÑÏòDocuSign±¨¸æ¡£¡£¡£¡£¡£¿£¿£¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳É϶à´Î¾Ù±¨´ËÀàÐÐΪ£¬£¬£¬£¬£¬µ«ËƺõÄÑÒÔ»ñµÃÓÐÓýâ¾ö¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬£¬£¬£¬£¬´ó¹æÄ£±¬·¢£¬£¬£¬£¬£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ¡£¡£¡£¡£¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓò½·¥¼°ÊÇ·ñÍýÏëÔöÇ¿ÕâЩ²½·¥µÄÎÊÌâ×÷³ö̸ÂÛ¡£¡£¡£¡£¡£ºÚ¿ÍÒÑÍùÒ²ÔøÀÄÓÃAPI¾ÙÐÐÆäËû¶ñÒâ»î¶¯£¬£¬£¬£¬£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØµãÁ´½Óµ½ÕÊ»§µÈ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/


3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaѬȾ³¬1500̨װ±¸


11ÔÂ5ÈÕ£¬£¬£¬£¬£¬Cleafy Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬£¬£¬£¬£¬ÒÑѬȾÁè¼Ý 1,500 ̨װ±¸£¬£¬£¬£¬£¬Ö÷ҪĿµÄΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ­¶¡ÃÀÖÞµÄ16¼ÒÒøÐС£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓë¶«ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬µ«´úÂë²î±ðÏÔÖø¡£¡£¡£¡£¡£ToxicPanda ʹÓÃ×°±¸Ú²Æ­ÊÖÒÕÈÆ¹ýÒøÐÐÇå¾²²½·¥£¬£¬£¬£¬£¬¾ÙÐÐڲƭÐÔ×ʽð×ªÒÆ¡£¡£¡£¡£¡£Ö»¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬£¬£¬£¬£¬´úÂë²»ÍêÕû£¬£¬£¬£¬£¬µ«ËüÒÑÏÔʾ³öǿʢµÄڲƭÄÜÁ¦¡£¡£¡£¡£¡£ToxicPanda ½ÓÄÉÊÖ¶¯·½·¨£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈÆ¹ýÒøÐеÄÐÐΪ¼ì²â·ÀÓù¡£¡£¡£¡£¡£Ëü»¹¿ÉÒÔ»á¼ûÊÖ»úÏà²á£¬£¬£¬£¬£¬ÍøÂçÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÅþÁ¬ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£Òâ´óÀûÊÇÆäÖ÷ҪĿµÄ£¬£¬£¬£¬£¬Ñ¬È¾Âʸߴï 56.8%£¬£¬£¬£¬£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃØÂ³µÈµØÒ²ÓÐѬȾ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬½ñÊÀ·À²¡¶¾½â¾ö¼Æ»®ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ô¼òÆÓµÄÍþв£¬£¬£¬£¬£¬È±·¦×Ô¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖ÷ÒªÎÊÌâ¡£¡£¡£¡£¡£


https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html


4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ð­Í¬¶þºÅÐж¯¡±ÖØÈ­¹¥»÷ÍøÂç·¸·¨


11ÔÂ5ÈÕ£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂʱ´ú£¬£¬£¬£¬£¬´úºÅΪ¡°Ð­Í¬¶þºÅÐж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÖУ¬£¬£¬£¬£¬Àֳɾв¶ÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂÚºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸·¨Ïà¹ØµÄÏÓÒÉÈË£¬£¬£¬£¬£¬²¢´Ý»ÙÁË 22,000 ¸ö IP µØµãÉÏÔËÐеÄ1,037̨ЧÀÍÆ÷ºÍ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£´Ë´ÎÐж¯Éæ¼°95¸ö¹ú¼Ò£¬£¬£¬£¬£¬»ñµÃÁ˶à¼ÒË½ÓªÍøÂçÇå¾²¹«Ë¾µÄÇ鱨֧³Ö¡£¡£¡£¡£¡£Ðж¯ÖУ¬£¬£¬£¬£¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬£¬£¬£¬£¬59̨ЧÀÍÆ÷±»²é·â£¬£¬£¬£¬£¬43̨µç×Ó×°±¸±»Ã»ÊÕÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Õþ¸®»¹ÔÚÊÓ²ìÁíÍâ65ÃûÉæÏÓ¼ÓÈë²»·¨»î¶¯µÄÈË¡£¡£¡£¡£¡£Ðж¯ÁÁµã°üÀ¨Ïã¸ÛºÍ°ÄÞ¯·½¹Ø±ÕÁË´ó×Ú¶ñÒâЧÀÍÆ÷£¬£¬£¬£¬£¬ÃɹžÙÐÐÁ˶à´ÎºâÓîËѲ鲢²é»ñÁËһ̨ЧÀÍÆ÷£¬£¬£¬£¬£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâЧÀÍÆ÷ÓÐÁªÏµµÄСÎÒ˽¼Ò²¢²é»ñÁ˵ç×Ó×°±¸£¬£¬£¬£¬£¬°®É³ÄáÑÇÔò²é»ñÁËÁè¼Ý80GBµÄЧÀÍÆ÷Êý¾Ý¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸·¨¾Ö¾Ö³¤ÌåÏÖ£¬£¬£¬£¬£¬ÍøÂç·¸·¨µÄÈ«ÇòÐÔҪǴÔðÇòÓ¦¶Ô£¬£¬£¬£¬£¬´Ë´ÎÐж¯²»µ«´Ý»ÙÁ˶ñÒâ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬»¹±ÜÃâÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙÎªÍøÂç·¸·¨µÄÎþÉüÆ·¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/


5. ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èй¶¾üÊ»ùְλÖ㬣¬£¬£¬£¬Òý·¢Çå¾²µ£ÐÄ


11ÔÂ6ÈÕ£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èÔÚÆäÔÚÏßµØÍ¼Ð§À͵Ä×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄλÖ㬣¬£¬£¬£¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°Æð¾¢Èö²¥¡±¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼¹ú¼ÒÇå¾²Óë¹ú·ÀίԱ»á·´ÐéαÐÅÏ¢²¿·ÖÈÏÕæÈËÌåÏÖ£¬£¬£¬£¬£¬¹È¸èÉÐδÐÞ¸´µØÍ¼£¬£¬£¬£¬£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½Ðżþ²¢ÔÊÐí¸üС£¡£¡£¡£¡£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬£¬£¬£¬£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêǰÅÄÉãµÄ£¬£¬£¬£¬£¬À´×Ô¹ûÕæÈªÔ´£¬£¬£¬£¬£¬²¢ÌåÏÖÖØÊÓ´ËÀàÇëÇó²¢ÓëÎÚ¿ËÀ¼¹ÙÔ±¼á³ÖÏàͬ¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼µ£ÐľüÊÂÐÅÏ¢µÄ¹ûÕæ¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂ×°±¸µÄλÖ㬣¬£¬£¬£¬²»µ«¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬£¬£¬£¬£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯×èµ²Æ÷µÄ¹ú¼Ò¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÍøÂçÇ鱨£¬£¬£¬£¬£¬µ«¶íÂÞ˹ÒòÖÆ²Ã»òÆ·µÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓÉÌÒµ¹«Ë¾¹ºÖᣡ£¡£¡£¡£¹È¸èÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄÐí¶àЧÀÍ£¬£¬£¬£¬£¬µ«µØÍ¼µÈ²¿·ÖЧÀÍÈÔ¿ÉʹÓ㬣¬£¬£¬£¬µ«¹¦Ð§ÓÐÏÞ¡£¡£¡£¡£¡£


https://therecord.media/ukraine-google-locations-revealing-military


6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶


11ÔÂ5ÈÕ£¬£¬£¬£¬£¬¼ÓÄôóÕþ¸®¾Ð²¶ÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨ÓÖÃû"Waifu"ºÍ"Judische"£©¡£¡£¡£¡£¡£¾ÝÅí²©ÉçºÍ404 Media±¨µÀ£¬£¬£¬£¬£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯ΪĿµÄ£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬£¬£¬£¬£¬ÕâЩ×éÖ¯ËùÓÐÊÇSnowflakeµÄ¿Í»§¡£¡£¡£¡£¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄÁªºÏÊӲ췢Ã÷£¬£¬£¬£¬£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÉèÖöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬£¬£¬£¬£¬ÓëÖ®Ïà¹ØµÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼ÒЧÀ͵ÄÊýÒÚСÎÒ˽¼Ò¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Í¼±»µÁ¡£¡£¡£¡£¡£SnowflakeÒÔºóÐû²¼½«¶ÔÐÂÕË»§Ç¿ÖÆÊµÑéMFA£¬£¬£¬£¬£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/