CRON#TRAPÍøÂçµöÓã»î¶¯£ºÀûÓÃLinuxÐéÄâ»úѬȾWindows
Ðû²¼Ê±¼ä 2024-11-061. CRON#TRAPÍøÂçµöÓã»î¶¯£ºÀûÓÃLinuxÐéÄâ»úѬȾWindows
11ÔÂ4ÈÕ£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂçµöÓã»î¶¯ÀûÓÃLinuxÐéÄâ»úѬȾWindowsϵͳ£¬Í¨¹ýÄÚÖúóÃÅÃØÃÜ·ÃÎÊÆóÒµÍøÂç¡£¸Ã»î¶¯Í¨¹ýαװ³É¡°OneAmerica ÊӲ족µÄÍøÂçµöÓãµç×ÓÓʼþ£¬·¢ËÍÒ»¸ö°üÂÞ285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½Ê½ºÍQEMUÐéÄâ»úÓ¦Ó÷¨Ê½¡£Æô¶¯¿ì½Ý·½Ê½ºó£¬»áÖ´ÐÐPowerShellÃüÁ½«ÏÂÔصĴ浵ÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬²¢ÔÚÉ豸ÉÏÉèÖúÍÆô¶¯×Ô½ç˵QEMU LinuxÐéÄâ»ú¡£¸ÃÐéÄâ»úÃûΪ¡°PivotBox¡±£¬Ô¤×°Á˺óÃÅ£¬¿ÉÈ·±£³Ö¾ÃµÄC2ͨÐÅ£¬Ê¹¹¥»÷ÕßÔÚºǫ́½øÐвÙ×÷¡£ÓÉÓÚQEMUÊǺϷ¨¹¤¾ß£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬Äþ¾²¹¤¾ßÒ²ÎÞ·¨¼ì²éÐéÄâ»úÄÚ²¿µÄ¶ñÒⷨʽ¡£ºóÃŵĺËÐÄÊÇÃûΪChiselµÄÍøÂçËíµÀ·¨Ê½£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬Ê¹¹¥»÷Õß¼´Ê¹ÔÚÍøÂçÊÜ·À»ðǽ±£»¤Ê±Ò²ÄÜÓëºóÃÅͨÐÅ¡£ÎªÁË·ÀÖ¹QEMUÀÄÓ㬽¨Òé¼àÊÓ´ÓÓû§¿É·ÃÎÊÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈ½ø³Ì£¬½«QEMUºÍÆäËûÐéÄ⻯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹Òªº¦Éè±¹ØÁ¬ÄÐéÄ⻯¡£
https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/
2. ºÚ¿ÍÀÄÓÃDocuSign API´´½¨Ðé¼Ù·¢Æ±Ã°³äÖªÃûÆ·ÅƽøÐÐÆÛÕ©
11ÔÂ4ÈÕ£¬DocuSign ÊÇÒ»¸öµç×ÓÇ©Ãûƽ̨£¬Ö§³ÖÒÔÊý×Ö·½Ê½Ç©Êð¡¢·¢Ëͺ͹ÜÀíÎĵµ¡£Envelopes APIÖ¼ÔÚ×ÊÖú¿Í»§×Ô¶¯·¢ËÍÐèҪǩÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÇ©Ãûºó¼ìË÷ËüÃÇ¡£ÍþвÐÐΪÕßÕýÔÚÀûÓÃDocuSignµÄEnvelopes API´´½¨²¢·Ö·¢¿´ËÆÕæʵµÄÐé¼Ù·¢Æ±£¬Ã°³äÖªÃûÆ·ÅÆÈçNortonºÍPayPal¡£ËûÃÇʹÓúϷ¨µÄ¸¶·ÑDocuSignÕË»§£¬Í¨¹ý¸ÃAPI·¢ËÍÄ£·ÂÖªÃûÈí¼þ¹«Ë¾Íâ¹ÛºÍ¸ÐÊܵÄÆÛÕ©ÐÔ·¢Æ±£¬²¢ÓÕµ¼Ä¿±ê¿Í»§¶ÔÎļþ½øÐеç×ÓÇ©ÃûÒÔÊÚȨ¸¶¿î¡£ÕâЩ·¢Æ±µÄÓöȿØÖÆÔÚÏÖʵ·¶Î§ÄÚ£¬ÒÔÔö¼ÓÆäºÏ·¨ÐÔ¡£¾ÝWallarmÄþ¾²Ñо¿ÈËÔ±³Æ£¬ÕâÖÖÀÄÓÃÐÐΪÒѾÁ¬ÐøÁËÒ»¶Îʱ¼ä£¬²¢ÒÑÏòDocuSign³ÂËß¡£¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳É϶à´Î¾Ù±¨´ËÀàÐÐΪ£¬µ«ËƺõÄÑÒԵõ½ÓÐЧ½â¾ö¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬´ó¹æÄ£·¢Éú£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓôëÊ©¼°ÊÇ·ñ¼Æ»®¼ÓÇ¿ÕâЩ´ëÊ©µÄÎÊÌâ×÷³öÆÀÂÛ¡£ºÚ¿Í¹ýÈ¥Ò²ÔøÀÄÓÃAPI½øÐÐÆäËû¶ñÒâ»î¶¯£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØÖ·Á´½Óµ½ÕÊ»§µÈ¡£
https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/
3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaѬȾ³¬1500̨É豸
11ÔÂ5ÈÕ£¬Cleafy Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬ÒÑѬȾÁè¼Ý 1,500 ̨É豸£¬Ö÷ҪĿ±êΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ¶¡ÃÀÖÞµÄ16¼ÒÒøÐС£¸Ã¶ñÒâÈí¼þÓ붫ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÏàËÆÖ®´¦£¬µ«´úÂë²îÒìÏÔÖø¡£ToxicPanda ÀûÓÃÉ豸ÆÛÕ©¼¼ÊõÈƹýÒøÐÐÄþ¾²´ëÊ©£¬½øÐÐÆÛÕ©ÐÔ×ʽðתÒÆ¡£¾¡¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬´úÂë²»ÍêÕû£¬µ«ËüÒÑÏÔʾ³öÇ¿´óµÄÆÛÕ©ÄÜÁ¦¡£ToxicPanda ½ÓÄÉÊÖ¶¯·½Ê½£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈƹýÒøÐеÄÐÐΪ¼ì²â·ÀÓù¡£Ëü»¹¿ÉÒÔ·ÃÎÊÊÖ»úÏà²á£¬ÊÕ¼¯Ãô¸ÐÐÅÏ¢£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÁ¬½ÓÆäÃüÁîºÍ¿ØÖÆ·þÎñÆ÷¡£Òâ´óÀûÊÇÆäÖ÷ҪĿ±ê£¬Ñ¬È¾Âʸߴï 56.8%£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃسµÈµØÒ²ÓÐѬȾ¡£³ÂËßÖ¸³ö£¬½ñÊÀ·À²¡¶¾½â¾ö·½°¸ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ô¼òµ¥µÄÍþв£¬È±·¦Ö÷¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖ÷ÒªÎÊÌâ¡£
https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html
4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ðͬ¶þºÅÐж¯¡±ÖØȹ¥»÷ÍøÂç·¸×ï
11ÔÂ5ÈÕ£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂÆڼ䣬´úºÅΪ¡°Ðͬ¶þºÅÐж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÖУ¬Àֳɴþ²¶ÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂçµöÓãºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸×ïÏà¹ØµÄÏÓÒÉÈË£¬²¢´Ý»ÙÁË 22,000 ¸ö IP µØÖ·ÉÏÔËÐеÄ1,037̨·þÎñÆ÷ºÍ»ù´¡ÉèÊ©¡£´Ë´ÎÐж¯Éæ¼°95¸ö¹ú¼Ò£¬µÃµ½Á˶à¼Ò˽ӪÍøÂçÄþ¾²¹«Ë¾µÄÇ鱨֧³Ö¡£Ðж¯ÖУ¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬59̨·þÎñÆ÷±»²é·â£¬43̨µç×ÓÉ豸±»Ã»ÊÕÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý¡£´ËÍ⣬Õþ¸®»¹ÔÚÊÓ²ìÁíÍâ65ÃûÉæÏÓ¼ÓÈë·Ç·¨»î¶¯µÄÈË¡£Ðж¯ÁÁµã°üÂÞÏã¸ÛºÍ°ÄÞ¯·½¹Ø±ÕÁË´óÁ¿¶ñÒâ·þÎñÆ÷£¬ÃɹŽøÐÐÁ˶à´ÎºâÓîËѲ鲢²é»ñÁËһ̨·þÎñÆ÷£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâ·þÎñÆ÷ÓÐÁªÏµµÄ¸öÈ˲¢²é»ñÁ˵ç×ÓÉ豸£¬°®É³ÄáÑÇÔò²é»ñÁËÁè¼Ý80GBµÄ·þÎñÆ÷Êý¾Ý¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸×ï¾Ö¾Ö³¤ÌåÏÖ£¬ÍøÂç·¸×ïµÄÈ«ÇòÐÔÒªÇóÈ«ÇòÓ¦¶Ô£¬´Ë´ÎÐж¯²»½ö´Ý»ÙÁ˶ñÒâ»ù´¡ÉèÊ©£¬»¹·ÀÖ¹ÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙΪÍøÂç·¸×ïµÄÎþÉüÆ·¡£
https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/
5. ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èй¶¾üÊ»ùְλÖã¬Òý·¢Äþ¾²µ£ÓÇ
11ÔÂ6ÈÕ£¬ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èÔÚÆäÔÚÏßµØͼ·þÎñµÄ×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄλÖã¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°»ý¼«Á÷´«¡±¡£ÎÚ¿ËÀ¼¹ú¼ÒÄþ¾²Óë¹ú·ÀίԱ»á·´Ðé¼ÙÐÅÏ¢²¿ÃÅÂôÁ¦ÈËÌåÏÖ£¬¹È¸èÉÐδÐÞ¸´µØͼ£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½Ðżþ²¢ÔÊÐí¸üС£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêÇ°ÅÄÉãµÄ£¬À´×Ô¹ûÈ»À´Ô´£¬²¢ÌåÏÖÖØÊÓ´ËÀàÇëÇó²¢ÓëÎÚ¿ËÀ¼¹ÙÔ±±£³ÖÏàͬ¡£ÎÚ¿ËÀ¼µ£ÓǾüÊÂÐÅÏ¢µÄ¹ûÈ»¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂ×°±¸µÄλÖ㬲»½ö¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯À¹½ØÆ÷µÄ¹ú¼Ò¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÊÕ¼¯Ç鱨£¬µ«¶íÂÞ˹ÒòÖƲûòµÀµÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓÉÌÒµ¹«Ë¾¹ºÖ᣹ȸèÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄÐí¶à·þÎñ£¬µ«µØͼµÈ²¿ÃÅ·þÎñÈÔ¿ÉʹÓ㬵«¹¦Ð§ÓÐÏÞ¡£
https://therecord.media/ukraine-google-locations-revealing-military
6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶
11ÔÂ5ÈÕ£¬¼ÓÄôóÕþ¸®´þ²¶ÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨ÓÖÃû"Waifu"ºÍ"Judische"£©¡£¾ÝÅí²©ÉçºÍ404 Media±¨µÀ£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯ΪĿ±ê£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬ÕâЩ×é֯ȫ²¿ÊÇSnowflakeµÄ¿Í»§¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄÁªºÏÊӲ췢ÏÖ£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÅäÖöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬ÓëÖ®Ïà¹ØµÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼Ò·þÎñµÄÊýÒÚ¸öÈË¡£ÆäÖУ¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Ç¼±»µÁ¡£Snowflake½ñºóÐû²¼½«¶ÔÐÂÕË»§Ç¿ÖÆʵʩMFA£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û¡£
https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/