Quad7½©Ê¬ÍøÂçÃé×¼SOHOÉ豸£¬Í¨ÐżÆı¸üÒþÃØ
Ðû²¼Ê±¼ä 2024-09-109ÔÂ9ÈÕ£¬Quad7 ½©Ê¬ÍøÂç½üÆÚͨ¹ý¶¨ÖƶñÒâÈí¼þ¹¥»÷¸ü¶àSOHOÉ豸£¬ÓÈÆäÊÇZyxel VPN¡¢Ruckus ÎÞÏß·ÓÉÆ÷ºÍAxentraýÌå·þÎñÆ÷£¬ÏÔʾ³öÆ䲻ͣ½ø»¯µÄÔËÓª¼Æı¡£¸ÃÍøÂç²»½öÕë¶ÔTP-LinkºÍ»ªË¶Â·ÓÉÆ÷£¬»¹À©Õ¹µ½ÐµÄÄ¿±ê£¬ÀûÓòîÒìµÇ¼±äÌåÈç¡°xlogin¡±¡¢¡°alogin¡±¡¢¡°rlogin¡±ºÍ¡°zylogin¡±£¬Í¨¹ýÌض¨¶Ë¿Ú¿ØÖÆÉ豸¡£¾¡¹ÜijЩм¯ÈºÈç¡°rlogin¡±ºÍ¡°zylogin¡±Ñ¬È¾°¸ÀýÏà¶Ô½ÏÉÙ£¬µ«Ç±ÔÚÍþв²»ÈÝСê¿ÉÄÜЯ´øÕë¶Ô¸ü¹ã·ºÉ豸µÄЩ¶´¡£Quad7 µÄÑݱ仹°üÂÞ¼¼ÊõÉϵĸïУ¬Èç·ÅÆú´«Í³µÄSOCKSÊðÀí£¬×ª¶ø½ÓÄÉKCPÐÒéºÍ¡°FsyNet¡±¹¤¾ß½øÐÐUDPͨÐÅ£¬ÒÔ¼°Ê¹Óá°UPDTAE¡±ºóÃźÍHTTP·´Ïòshell½øÐиüÒþ±ÎµÄ¿ØÖÆ£¬ÕâЩ¶¼¼«´óµØÔö¼ÓÁ˼ì²âÄѶȡ£´ËÍ⣬ʵÑéÖеġ°netd¡±¶þ½øÖÆÎļþÓëCJD route2ÐÒéµÄ½áºÏ£¬Ô¤Ê¾×Å¿ÉÄÜ¿ª·¢³ö¸üΪÒþÃصÄͨÐÅ»úÖÆ¡£Ãæ¶ÔÕâÒ»Á¬ÐøÑݱäµÄÍþв£¬Óû§Ó¦½ÓÄÉ»ý¼«·ÀÓù´ëÊ©£¬°üÂÞ°²×°×îй̼þ¸üС¢¸ü¸ÄĬÈϹÜÀíÃÜÂë¡¢½ûÓò»ÐëÒªµÄWeb¹ÜÀí¹¦Ð§£¬²¢ÔÚ¿ÉÄܵÄÇé¿öÏÂÉý¼¶ÖÁÖ§³Öºã¾ÃÄþ¾²¸üеÄÉ豸Ðͺš£
https://www.bleepingcomputer.com/news/security/quad7-botnet-targets-more-soho-and-vpn-routers-media-servers/
2. Highline¹«Á¢Ñ§Ð£ÒòÍøÂç¹¥»÷¹Ø±ÕȫѧÇø£¬Ñ§Éú¿ªÑ§ÊÜ×è
9ÔÂ9ÈÕ£¬»ªÊ¢¶ÙÖÝHighline¹«Á¢Ñ§Ð£Ñ§Çø£¬·þÎñ²¼Àï¶÷¡¢µÃ÷Òò¡¢ÅµÂüµ×¹«Ô°¡¢Î÷Ëþ¿ÆºÍ°×ÖÐÐÄÉçÇøµÄ34ËùѧУ¼°17,500ÃûѧÉú£¬½üÈÕÔâÓöÍøÂç¹¥»÷£¬µ¼ÖÂѧÇø¼¼Êõϵͳ·ºÆðδÊÚȨ»î¶¯¡£ÎªÈ·±£Ñ§ÉúÄþ¾²£¬Ñ§Çø½ô¼±¹Ø±ÕÁËËùÓÐѧУ²¢È¡ÏûÁËÔ¶¨ÓÚ9ÔÂ9ÈÕµÄËùÓл£¬°üÂÞÌåÓýºÍ»áÒ飬¾¡¹ÜѧÇøÖÐÑë°ì¹«ÊÒÈÔÕý³£ÔË×÷¡£Ñ§ÇøѸËÙÐж¯£¬¸ôÀëÒªº¦ÏµÍ³£¬²¢ÓëµÚÈý·½¼°ÖÝ¡¢Áª°îºÏ×÷»ï°é½ôÃܺÏ×÷£¬ÒÔÄþ¾²»Ö¸´ºÍ²âÊÔϵͳ¡£´Ë´ÎÍ»·¢×´¿öÓÈÆä¶ÔѧÉú¼ÒÍ¥Ôì³Éδ±ã£¬ÌرðÊÇÕýÖµÓ׶ùÔ°¿ªÑ§Ç°Ï¦£¬Ñ§Çø¶Ô´ËÉî±íǸÒ⣬²¢Ç¿µ÷ѧÉúÄþ¾²ÊÇÊ×Òª¿¼Á¿¡£Ä¿Ç°£¬ÊÓ²ìÊÂÇéÕýÔÚ½øÐÐÖУ¬ÉÐδÃ÷È·ÍøÂç¹¥»÷µÄ¾ßÌåÐÔÖʼ°ÊÇ·ñÓÐʦÉú¸öÈËÐÅϢй¶¡£HighlineѧÇø¼Æ»®ÓÚÖÜÒ»ÏÂÎçÇ°Ïò½ÌÖ°Ô±¹¤ºÍ¼Ò³¤Í¨±¨ºóÐø²¿Êð¡£
https://www.bleepingcomputer.com/news/security/highline-public-schools-closes-schools-following-cyberattack/
3. Predator ¼äµýÈí¼þÐж¯ÒÔеĻù´¡ÉèÊ©¾íÍÁÖØÀ´
9ÔÂ9ÈÕ£¬ÔÚÃÀ¹ú¶ÔIntellexaÁªÃËʵʩÖƲúó£¬Ñо¿ÈËÔ±·¢³öÔ¤¾¯£¬Ö¸³öPredator¼äµýÈí¼þ¿ÉÄÜͨ¹ýлù´¡ÉèÊ©¾íÍÁÖØÀ´¡£´ËÇ°£¬ÃÀ¹ú²ÆÕþ²¿ÒòIntellexaÔÚ¿ª·¢ºÍ·Ö·¢Õë¶ÔÃÀ¹úÈ˵ÄÉÌÒµ¼äµýÈí¼þÖеÄ×÷Ó㬶ÔÆäÏà¹Ø¸öÈ˺ÍʵÌå½øÐÐÁËÖƲá£PredatorÒÔÆä¹ã·ºµÄÊý¾ÝÇÔÈ¡ºÍ¼àÊÓ¹¦Ð§Öø³Æ£¬Ôø±»ÓÃÓÚ¼àÊÓÕþ¸®¹ÙÔ±¡¢¼ÇÕß¼°Õþ²ßר¼Ò¡£ÖƲú󣬸üäµýÈí¼þ»î¶¯Ò»¶È¼õÉÙ£¬µ«ÏÖÒÑÔÚлù´¡ÉèÊ©ÉÏÖØлîÔ¾£¬ÓÈÆäÊÇÔÚ¸Õ¹ûÃñÖ÷¹²ºÍ¹úºÍ°²¸çÀµÈ¹ú¼ÒÁ¬Ðø±»Ê¹Óá£Recorded FutureÖ¸³ö£¬PredatorµÄËÕÐÑ¿ÉÄÜÓëÆä¸ïеĻù´¡ÉèÊ©¡¢ÔöÇ¿µÄÄäÃû²Ù×÷ºÍÌӱܼì²âÄÜÁ¦Óйأ¬Ê¹µÃ×·×Ù±äµÃ¸üΪÀ§ÄÑ¡£¾¡¹Ü¹¥»÷Á´Î´±ä£¬ÈÔÒÀÀµ¡°Ò»¼ü¡±ºÍ¡°Áãµã»÷¡±Â©¶´£¬µ«Predator¶ÔÖªÃûÈËÊ¿ÈçÕþ¿Í¡¢¸ß¹Ü¡¢¼ÇÕߺͻ¼ÒµÄÍþвÒÀ¾ÉÖØ´ó¡£Æä¸ß°ºµÄÐí¿É·Ñ±íÃ÷£¬¸ÃÈí¼þ±»ÓÃÓÚÕë¶ÔÕ½ÂÔÐÔ¡¢¸ß¼ÛֵĿ±ê¡£ÕâÒ»Ç÷ÊÆÒý·¢ÁËÅ·Ã˵ȵØÓò¶Ô¹ÍÓ¶¼äµýÈí¼þÀÄÓõĵ£ÓÇ£¬ÓÈÆäÊÇÔÚÕþÖÎ×èµ²ÅɺͼÇÕßÖеÄʹÓã¬ÒÑÒý·¢¶Ô¼àÊӺϷ¨ÐԺ͵ÀµÂÐÔµÄÖÊÒÉ¡£Ëæ׿à¿ØÊг¡µÄ²»Í£Ôö³¤£¬Õþ¸®ºÍÍøÂçÄþ¾²×¨¼ÒÐè±£³Ö¸ß¶È¾¯Ì裬ÒÔÓ¦¶ÔÅÓ´ó¶ñÒâÈí¼þºÍ¼à¿Ø¹¤¾ß´øÀ´µÄÌôÕ½¡£
https://securityaffairs.com/168222/intelligence/predator-spyware-new-infrastructure.html
4. Slim CDÔâºÚ¿ÍÈëÇÖ£¬½ü170ÍòÓû§ÐÅÓÿ¨¼°¸öÈËÊý¾Ýй¶
9ÔÂ9ÈÕ£¬Slim CD×÷ΪΪÁãÊÛ¡¢¾Æµê¼°²ÍÒûµÈÐÐÒµÌṩ֧¸¶½â¾ö·½°¸µÄ·þÎñÉÌ£¬½üÈÕ¹ûÈ»ÁËÒ»ÆðÖØ´óÊý¾Ýй¶Ê¼þ£¬¸Ãʼþ²¨¼°½ü170ÍòÓû§£¬ÆäÐÅÓÿ¨¼°¸öÈËÃô¸ÐÐÅÏ¢Ô⵽й¶¡£ºÚ¿ÍÔÚ³¤´ï½üÒ»ÄêµÄʱ¼äÀ2023Äê8ÔÂÖÁ2024Äê6Ô£©£¬ÇÄÎÞÉùÏ¢µØÇÖÈëÁËSlim CDµÄϵͳ¡£¸Ã¹«Ë¾ÓÚ½ñÄê6ÔÂ15ÈÕÊ״βì¾õÒì³£»î¶¯£¬²¢×·ËÝ·¢ÏÖºÚ¿ÍÈëÇÖʼÓÚ2023Äê8ÔÂ17ÈÕ¡£¾¡¹ÜÈëÇÖʱ¼ä³¤£¬µ«Slim CDÖ¸³ö£¬ÐÅÓÿ¨ÐÅÏ¢µÄ¼ì²ì»òÇÔÈ¡Ö÷Òª¼¯ÖÐÔÚ6ÔÂ14ÈÕÖÁ15ÈÕÕâÁ½Ì졣鶵ÄÐÅÏ¢°üÂÞÓû§µÄÐÕÃû¡¢µØÖ·¡¢ÐÅÓÿ¨ºÅÂë¼°ÓÐЧÆÚ£¬¾¡¹Üδ°üÂÞÒªº¦µÄ¿¨ÑéÖ¤ºÅ£¨CVV£©£¬µ«ÈÔÔö¼ÓÁËÐÅÓÿ¨ÆÛÕ©µÄ·çÏÕ¡£Slim CDÒѼÓÇ¿ÆäÄþ¾²ÌåϵÒÔ·À·¶Î´À´ÀàËÆʼþ£¬²¢½¨ÒéÊÜÓ°ÏìÓû§Ìá¸ß¾¯Ì裬ÁôÒâÆÛÕ©¼£Ï󣬲¢Á¢¼´ÏòÒøÐгÂËßÈκοÉÒɻ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬ÊÜÓ°ÏìµÄÓû§²¢Î´»ñµÃÃâ·ÑÉí·Ý͵ÇÔ±£»¤·þÎñ¡£
https://www.bleepingcomputer.com/news/security/payment-gateway-data-breach-affects-17-million-credit-card-owners/
5. RAMBO¹¥»÷ÀûÓÃÄÚ´æ×ÜÏßÎÞÏßµçÐźŴӸôÀëϵͳÇÔÈ¡Êý¾Ý
9ÔÂ9ÈÕ£¬Ñо¿ÈËÔ±Mordechai Guri¿ª·¢³öÁËÒ»ÖÖÃûΪRAMBOµÄÐÂÐ͹¥»÷¼¼Êõ£¬¸Ã¼¼ÊõÀûÓÃÄÚ´æ×ÜÏß·¢ÉúµÄÎÞÏßµçÐźţ¬ÀֳɵشÓÎïÀíºÍÂ߼˫ÖظôÀëµÄϵͳÖÐÔ¶³ÌÇÔÈ¡Êý¾Ý¡£¸Ã¼¼ÊõÔÊÐí¹¥»÷ÕßÒÔÿÃë1,000±ÈÌصÄËٶȣ¬ÔÚ×îÔ¶7Ã×¾àÀëÄÚ͵ȡ°üÂÞ¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢°´¼üºÍÉúÎïÌØÕ÷ÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£Í¨¹ýÈí¼þ½ç˵ÎÞÏߵ磨SDR£©Ó²¼þºÍÌìÏߣ¬¶ñÒâÈí¼þÄܹ»ÔÚ¸ôÀëϵͳÖбàÂëÊý¾Ý£¬²¢½«ÕâЩ±àÂëºóµÄÊý¾ÝÒÔµç´Å²¨µÄÐÎʽ·øÉä³öÈ¥£¬½ø¶ø±»Ô¶´¦µÄ½ÓÊÕÉ豸²¶×½²¢½âÂë¡£RAMBO¹¥»÷µÄºËÐÄÔÚÓÚÀûÓÃRAMµÄ·ÃÎÊģʽ£¬Éú³ÉÓë¶þ½øÖÆÊý¾ÝÏà¶ÔÓ¦µÄµç´ÅÐźţ¬ÐγÉÒþ±ÎͨµÀ¡£ÕâÖÖ¹¥»÷·½Ê½Í»ÆÆÁË´«Í³¸ôÀëϵͳµÄÄþ¾²·ÀÏߣ¬ÒòΪ¼´±ãϵͳ±»ÎïÀí¸ôÀ룬ҲÎÞ·¨µÖÓùÀ´×ÔÄÚ²¿¶ñÒâÈí¼þµÄÍþв¡£¶ñÒâÈí¼þ¿Éͨ¹ý¶àÖÖ;¾¶£¨ÈçѬȾUSBÇý¶¯Æ÷¡¢ÄÚ²¿ÈËÔ±¶ñÒâ²Ù×÷»ò¹©Ó¦Á´¹¥»÷£©±»Ö²Èë¸ôÀëϵͳ¡£Mordechai Guri½øÒ»²½½ÒʾÁËÊý¾Ýͨ¹ýRAM´«Êäʱ·¢ÉúµÄµç´Å·øÉäÊÇ鶵ÄÒªº¦£¬ÕâЩ·øÉäµÄƵÂÊÓëÊý¾Ý¿í¶È¡¢Ê±ÖÓËٶȼ°ÏµÍ³¼Ü¹¹½ôÃÜÏà¹Ø¡£Í¨¹ý¾«È·¿ØÖÆÄÚ´æ·ÃÎÊÖ¸Á¹¥»÷ÕßÄܹ»½¨Á¢µç´ÅÒþ±ÎͨµÀ£¬ÊµÏÖÊý¾ÝµÄÔ¶³Ì´«Êä¡£Õë¶ÔRAMBO¹¥»÷£¬Ñо¿ÈËÔ±Ò²Ìá³öÁËÏàÓ¦µÄ·ÀÓù¼ÆıºÍ±£»¤´ëÊ©¡£
https://www.securityweek.com/new-rambo-attack-allows-air-gapped-data-theft-via-ram-radio-signals/
6. ³¯ÏʺڿÍÀûÓÃLinkedInÓÕƲ¿ÊðCOVERTCATCH¶ñÒâÈí¼þ
9ÔÂ7ÈÕ£¬³¯ÏÊÍþвÐÐΪÕßͨ¹ýLinkedInƽ̨¶ÔWeb3ÁìÓòµÄ¿ª·¢ÈËԱʵʩÁËһϵÁо«ÐijïıµÄÐé¼ÙÕÐƸ¹¥»÷£¬ÀûÓÃÉç»á¹¤³ÌѧÊÖ¶ÎÓÕÆÄ¿±êÏÂÔز¢Ö´ÐжñÒâÈí¼þ¡£¹È¸è×Ó¹«Ë¾MandiantÔÚÆä×îгÂËßÖнÒʾÁËÕâЩ¹¥»÷µÄϸ½Ú£¬Ö¸³ö¹¥»÷Õß³£ÒÔ±àÂë²âÊÔΪ»Ï×Ó£¬Í¨¹ý·¢ËÍ°üÂÞCOVERTCATCH¶ñÒâÈí¼þµÄZIPÎļþ×÷Ϊ³õʼѬȾÊֶΡ£¸Ã¶ñÒâÈí¼þÖ¼ÔÚѬȾmacOSϵͳ£¬²¢Í¨¹ýÏÂÔصڶþ½×¶ÎÓÐЧ¸ºÔؽ¨Á¢³Ö¾ÃÐÔ¿ØÖÆ¡£´ËÀà»î¶¯ÊôÓÚ³¯ÏʺڿÍ×éÖ¯¹ã·º»î¶¯µÄÒ»²¿ÃÅ£¬Èç¡°ÃÎÏëÊÂÇéÐж¯¡±µÈ£¬ËüÃÇÀûÓÃÊÂÇéÓÕ¶üÁ÷´«RustBucket¡¢KANDYKORNµÈ¶ñÒâÈí¼þ¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬³¯ÏʺڿͲ»½öÏÞÓÚÉç»á¹¤³Ìѧ¹¥»÷£¬»¹Éæ×ãÈí¼þ¹©Ó¦Á´¹¥»÷£¬ÈçÕë¶Ô3CXºÍJumpCloudµÄÏÈÀýËùʾ¡£Ò»µ©Í¨¹ý¶ñÒâÈí¼þ»ñµÃÁ¢×ãµã£¬¹¥»÷Õß»á½øÒ»²½ÇÔÈ¡ÃÜÂë¡¢½øÐÐÄÚ²¿Õì²ì£¬²¢Éø͸ÔÆ»·¾³ÒÔ͵ȡ¼ÓÃÜ»õ±Ò×ʽð¡£FBIÒ²·¢³ö¾¯¸æ£¬Ö¸³ö³¯ÏÊÍþвÐÐΪÕßÕýÀûÓø߶ȶ¨ÖÆ»¯µÄÉç»á¹¤³Ì»î¶¯£¬ÌرðÊÇÕë¶Ô¼ÓÃÜ»õ±ÒÐÐÒµ£¬Í¨¹ýαÔì¸öÐÔ»¯ÕÐƸ»òͶ×Ê»ú»á£¬ÆóͼΪÊÜÖƲõij¯ÏÊ»ñÈ¡·Ç·¨ÊÕÈë¡£ÕâЩ¹¥»÷Ç°³£ÅãͬÏ꾡µÄÊܺ¦ÕßÅä¾°ÊӲ죬ÒÔÔöÇ¿ÐÅÈθУ¬Ìá¸ß¹¥»÷ÀÖ³ÉÂÊ¡£FBIÇ¿µ÷£¬·¸×ï·Ö×Ó»áÀûÓÃÊܺ¦ÕߵĸöÈËÐÅÏ¢»òÏÊΪÈËÖªµÄϸ½ÚÀ´½¨Á¢ÁªÏµ£¬½ø¶øÁ÷´«¶ñÒâÈí¼þ£¬ÊµÏÖÆä·Ç·¨Ä¿µÄ¡£
https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html