ÍøÂç·¸·¨·Ö×Ó½« Raspberry Pi Äð³ÉڲƺÍÌØ¹¤¹¤¾ß
Ðû²¼Ê±¼ä 2024-03-273ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ GEOBOX µÄÐÂÈí¼þ°ü½ÓÄɼÛǮʵ»ÝÇÒÆÕ±éʹÓõÄRaspberry PiÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬²¢½«Æäת±äÎªÖØ´óµÄÄäÃû¹¤¾ß - רΪڲơ¢Ìع¤»î¶¯ºÍÈÆ¹ýÇå¾²¿ØÖƶø¶¨ÖÆ¡£¡£¡£¡£¡£¡£¡£GEOBOX ÔÚ°µÍøÂÛ̳ÉÏµÄ¹ã¸æ¼ÛÇ®½öΪÿÔ 80 ÃÀÔª£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÍøÂç·¸·¨·Ö×ÓÄܹ»£ºÐéα GPS λÖ㻣»£»£»£»£»ÓÕÆÍøÂçÉèÖúÍÑÚÊλ¥ÁªÍø»î¶¯¡£¡£¡£¡£¡£¡£¡£GEOBOX ϵͳµÄÉè¼ÆºÜÊǼòÆÓ¡£¡£¡£¡£¡£¡£¡£Í¨¹ýÌṩÓû§Êֲᣬ£¬£¬£¬£¬£¬£¬×ÝÈ»ÊÖÒÕרҵ֪ʶÓÐÏÞµÄÈËÒ²¿ÉÄܻᰲÅÅÕâÖÖΣÏյŤ¾ß¡£¡£¡£¡£¡£¡£¡£GEOBOX ÒÔ¼°ÀàËÆ¹¤¾ß¸øÖ´·¨²¿·ÖºÍÍøÂçÇå¾²ÉçÇø´øÀ´ÁËÔ½À´Ô½´óµÄÌôÕ½¡£¡£¡£¡£¡£¡£¡£Ëæ×ÅÁªÍø×°±¸±äµÃÔ½·¢Ç¿Ê¢ÇÒ¼ÛǮʵ»Ý£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚѰÕÒеÄÒªÁìÀ´Ê¹ÓÃËüÃÇ¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/cybercriminals-turn-cheap-raspberry-pi-into-powerful-fraud-and-espionage-tool/
2. kimsuky Èö²¥Î±×°³Éº«¹úij¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ
3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬AhnLab Çå¾²Ç鱨ÖÐÐÄ (ASEC) ×î½ü·¢Ã÷ Kimsuky ×éÖ¯Èö²¥Î±×°³Éº«¹ú¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ËùÉæ¼°µÄ¶ñÒâÈí¼þÊÇÒ»¸ö½¨ÉèEndorºóÃŵÄÖ²Èë³ÌÐò¡£¡£¡£¡£¡£¡£¡£ËäȻûÓÐÔÚÏÖʵ¹¥»÷ÖÐʹÓøÃÖ²Èë³ÌÐòµÄ¼Í¼£¬£¬£¬£¬£¬£¬£¬µ«ÔÚÓë¸ÃÖ²Èë³ÌÐò±»ÍøÂçµÄԼĪͳһʱÆÚ£¬£¬£¬£¬£¬£¬£¬ÓÐÒ»¸öÉæ¼°¸ÃÖ²Èë³ÌÐò½¨ÉèºóÃŵĹ¥»÷°¸Àý¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßʹÓúóÃÅÏÂÔØÆäËû¶ñÒâÈí¼þ»ò×°ÖÃ½ØÆÁ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Endor Ò²¾³£ÓÃÓÚÆäËû¹¥»÷£»£»£»£»£»£»ÒÑÍù£¬£¬£¬£¬£¬£¬£¬ËüÓëNikidoorÒ»ÆðʹÓ㬣¬£¬£¬£¬£¬£¬Nikidoor ͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£¡£Dropper ±»Î±×°³Éº«¹úij¹«¹²»ú¹¹µÄ×°ÖóÌÐò¡£¡£¡£¡£¡£¡£¡£Æäͼ±ê½ÓÄÉÁ×ÆÃ»ú¹¹µÄ±ê¼Ç£¬£¬£¬£¬£¬£¬£¬Ïà¹ØÒªº¦´Ê¿ÉÔÚ°æ±¾ÐÅÏ¢ºÍÉèÖÃÒ³ÃæÖÐÕÒµ½¡£¡£¡£¡£¡£¡£¡£ÁíÍ⣬£¬£¬£¬£¬£¬£¬Ã»ÓÐÈκÎÕýµ±³ÌÐòµÄ°æ±¾Óë´ËÏàͬ¡£¡£¡£¡£¡£¡£¡£ÕâÅú×¢¸Ã¶ñÒâÈí¼þÖ»ÊDZ»Éè¼ÆµÃÏñÈÎºÎÆäËûÕýµ±³ÌÐòÒ»Ñù£¬£¬£¬£¬£¬£¬£¬ÎÞÒ⽫×Ô¼ºÎ±×°³ÉÏÖÓгÌÐò¡£¡£¡£¡£¡£¡£¡£×ÝÈ»ÔÚ×°ÖÃÀú³ÌÖУ¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þÒ²ÊÇΨһÒÔÕý³£·½·¨×°ÖõijÌÐò¡£¡£¡£¡£¡£¡£¡£
https://asec.ahnlab.com/en/63396/
3. ·ðÂÞÀï´ïÖݵÄÊ¥¿ËÀ͵ÂÊÐÔâµ½ÀÕË÷¹¥»÷
3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬Ê¥¿ËÀ͵ÂÊÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷¹¥»÷µ¼ÖÂÐí¶à²¿·ÖÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬µ«ËûÃÇÕýÔÚ¾¡¿ÉÄÜ×î¼ÑµØÔË×÷£¬£¬£¬£¬£¬£¬£¬Ö±µ½ÎÊÌâ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£¡£Ê¥¿ËÀ͵ÂλÓÚ°ÂÀ¼¶àÒÔÄÏԼһСʱ³µ³Ì´¦£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ 60000 ÃûסÃñ¡£¡£¡£¡£¡£¡£¡£²¢ÇÒ¹«Ô°ºÍÐÝÏл¼°Ð§À͵ÄÏÖ³¡¸¶¿îÒ²ÔÝʱֻÄÜʹÓÃÏֽ𡣡£¡£¡£¡£¡£¡£ÔÚÏßÉèʩԤ¶©¸¶¿îºÍÔÚÏ߻ע²áÈÔÈ»½ÓÊÜÐÅÓÿ¨¸¶¿î¡£¡£¡£¡£¡£¡£¡£¾¯Ô±ºÍÏû·À¾ÈÔ®ÕýÔÚÏìӦЧÀÍÇëÇ󡣡£¡£¡£¡£¡£¡£×ªÔËÕ¾µÄЧÀÍÓöÈÔÝʱֻÄÜÓÃÏÖ½ðÖ§¸¶£¬£¬£¬£¬£¬£¬£¬ËùÓÐÀ¬»øºÍ½ÓÄÉÍøÂçõè¾¶½«°´ÍýÏëÔËÐС£¡£¡£¡£¡£¡£¡£°ÂÎ÷°ÂÀÏØË°Îñ¾ÖºÍ OUC µÈÍⲿ¹«ÓÃÊÂÒµµÄÌṩÉ̲¢Î´Êܵ½´Ë´Î¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/st-cloud-hit-with-ransomware-florida-string
4. Top.gg Discord »úеÈËÉçÇøÔâµ½¹©Ó¦Á´¹¥»÷
3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬¶àÄêÀ´£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÒ»Ö±ÔÚʹÓöàÖÖÕ½ÂÔ¡¢ÊÖÒպͳÌÐò (TTP)£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ð®ÖÆ GitHub ÕÊ»§¡¢·Ö·¢¶ñÒâ Python °ü¡¢Ê¹ÓÃÐéαµÄ Python »ù´¡ÉèÊ©ºÍÉç»á¹¤³Ì¡£¡£¡£¡£¡£¡£¡£ÉÏ´«µ½ PyPI µÄ¶ñÒâ°ü³äµ±ÁËÆÆËðϵͳµÄ³õÊ¼ÔØÌå¡£¡£¡£¡£¡£¡£¡£Ò»µ©ÏµÍ³Ôâµ½ÆÆË𣬣¬£¬£¬£¬£¬£¬»òÕß¹¥»÷ÕßÐ®ÖÆÁËÌØÈ¨ GitHub ÕÊ»§£¬£¬£¬£¬£¬£¬£¬ËûÃǾͻá¸ü¸ÄÏîÄ¿ÎļþÒÔÖ¸Ïò¼Ù¾µÏñÉÏÍйܵÄÒÀÀµÏî¡£¡£¡£¡£¡£¡£¡£Top.gg Êǹ¥»÷Õß×î½üµÄÊܺ¦ÕßÖ®Ò»£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÊ¢ÐеÄËÑË÷ºÍ·¢Ã÷ƽ̨£¬£¬£¬£¬£¬£¬£¬ÊÊÓÃÓÚ Discord ЧÀÍÆ÷¡¢»úеÈËºÍÆäËûÉç½»¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÓÎÏ·¡¢Ìá¸ß¼ÓÈë¶ÈºÍˢй¦Ð§¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁË top.gg ά»¤Õß¡°editor-syntax¡±µÄÕÊ»§£¬£¬£¬£¬£¬£¬£¬¸Ãά»¤Õß¶Ô¸ÃÆ½Ì¨µÄ GitHub ´æ´¢¿âÓµÓÐÖ÷ÒªµÄдÈë»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-poison-source-code-from-largest-discord-bot-platform/
5. ÓëÒÁÀÊÏà¹ØµÄ APT TA450 ÔÚ PDF ¸½¼þÖÐǶÈë¶ñÒâÁ´½Ó
3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬ÓëÒÁÀÊÓÐ¹ØµÄ APT ×éÖ¯MuddyWater £¨ÓÖÃû SeedWorm¡¢ TEMP.Zagros¡¢TA450 ºÍ Static Kitten£©ÊÇ 2024 Äê 3 ÔÂÌᳫµÄÒ»´ÎеÄÍøÂç´¹ÂڻµÄÄ»ºóºÚÊÖ£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÊÔͼÔÚ 2024 Äê 3 ÔÂͶ·ÅÃûΪ Atera µÄÕýµ±Ô¶³Ì¼à¿ØºÍÖÎÀí (RMM) ½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Õë¶Ô´óÐÍ¿ç¹ú×éÖ¯µÄÒÔÉ«ÁÐÔ±¹¤£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓëн³êÏà¹ØµÄÉç»á¹¤³Ì¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÂç´¹ÂڻÓÚ 3 Ô 7 ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬£¬Ò»Ö±Ò»Á¬µ½ 2024 Äê 3 Ô 11 ÈÕÕâÒ»ÖÜ¡£¡£¡£¡£¡£¡£¡£TA450 ×éÖ¯·¢ËÍÓã²æÊ½ÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨°üÀ¨¶ñÒâÁ´½ÓµÄ PDF ¸½¼þ¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÏòͳһÊÕ¼þÈË·¢ËÍÁ˶à·â´øÓÐ PDF ¸½¼þµÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬ÆäÖÐǶÈëµÄÁ´½ÓÂÔÓвî±ð¡£¡£¡£¡£¡£¡£¡£Proofpoint ƾ֤¶ÔÓëÍøÂçÌØ¹¤×éÖ¯¡¢»î¶¯Ä¿µÄÒÔ¼°¹¥»÷ÖÐʹÓõĶñÒâÈí¼þÏà¹ØµÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐòµÄÊӲ죬£¬£¬£¬£¬£¬£¬½«´Ë´Î»î¶¯¹éÒòÓÚ TA450¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/161042/apt/iran-ta450-rmm-atera.html
6. ºÚ¿Í¿É½âËø Dormakaba ÏúÊÛµÄ 300 ¶àÍò¸ö·¿ÃÅ
3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬ÊýǧÃûÇå¾²Ñо¿Ö°Ô±Æë¾ÛÀ˹ά¼Ó˹¼ÓÈëËùνµÄ¡°ºÚ¿ÍÏÄÁîÓª¡±£¨Ò»Á¬¾ÙÐÐ Black Hat ºÍ Defcon ºÚ¿Í¾Û»á£©Ê±£¬£¬£¬£¬£¬£¬£¬ËûÃÇÖеÄһЩÈ˿϶¨»áʵÑéÈëÇÖ»ù´¡Éèʩά¼Ó˹×Ô¼º£¬£¬£¬£¬£¬£¬£¬Õâ×ù¶¼»áÓµÓÐһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶Ä³¡ºÍÂùÝÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£Ian Carroll¡¢Lennert Wouters ºÍÆäËûÇå¾²Ñо¿Ö°Ô±ÍŶÓÕ¹ÏÖÁËÒ»ÖÖËûÃdzÆÖ®Îª Unsaflok µÄÂùÝÔ¿³×¿¨ºÚ¿ÍÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£¸ÃÊÖÒÕÊÇһϵÁÐÇå¾²Îó²îµÄÜöÝÍ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÏÕЩ¿ÉÒÔÁ¬Ã¦·¿ªÈðÊ¿Ëø¾ßÖÆÔìÉÌ Dormakaba ÏúÊÛµÄ Saflok Æ·ÅÆ»ùÓÚ RFID µÄÔ¿³×¿¨ËøµÄ¶àÖÖÐͺ𣡣¡£¡£¡£¡£¡£Saflok ϵͳװÖÃÔÚÈ«Çò 131 ¸ö¹ú¼Ò 13000 ´¦·¿²úµÄ 300 ÍòÉÈÃÅÉÏ¡£¡£¡£¡£¡£¡£¡£
https://news.hitb.org/content/hackers-can-unlock-over-3-million-hotel-doors-seconds