CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows

Ðû²¼Ê±¼ä 2024-11-06

1. CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows


11ÔÂ4ÈÕ£¬£¬£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂç´¹ÂڻʹÓÃLinuxÐéÄâ»úѬȾWindowsϵͳ£¬£¬£¬Í¨¹ýÄÚÖúóÃÅÉñÃØ»á¼ûÆóÒµÍøÂç¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³É¡°OneAmerica ÊӲ족µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬·¢ËÍÒ»¸ö°üÀ¨285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬£¬£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½·¨ºÍQEMUÐéÄâ»úÓ¦ÓóÌÐò¡£¡£¡£Æô¶¯¿ì½Ý·½·¨ºó£¬£¬£¬»áÖ´ÐÐPowerShellÏÂÁ£¬£¬½«ÏÂÔØµÄ´æµµÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬£¬£¬²¢ÔÚ×°±¸ÉÏÉèÖÃºÍÆô¶¯×Ô½ç˵QEMU LinuxÐéÄâ»ú¡£¡£¡£¸ÃÐéÄâ»úÃûΪ¡°PivotBox¡±£¬£¬£¬Ô¤×°Á˺óÃÅ£¬£¬£¬¿ÉÈ·¼á³¤ÆÚµÄC2ͨѶ£¬£¬£¬Ê¹¹¥»÷ÕßÔÚºǫ́¾ÙÐвÙ×÷¡£¡£¡£ÓÉÓÚQEMUÊÇÕýµ±¹¤¾ß£¬£¬£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬£¬£¬Çå¾²¹¤¾ßÒ²ÎÞ·¨¼ì²éÐéÄâ»úÄÚ²¿µÄ¶ñÒâ³ÌÐò¡£¡£¡£ºóÃŵĽ¹µãÊÇÃûΪChiselµÄÍøÂçËíµÀ³ÌÐò£¬£¬£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬£¬£¬Ê¹¹¥»÷Õß×ÝÈ»ÔÚÍøÂçÊÜ·À»ðǽ±£»£»£»£» £»¤Ê±Ò²ÄÜÓëºóÃÅͨѶ¡£¡£¡£ÎªÁ˱ÜÃâQEMUÀÄÓ㬣¬£¬½¨Òé¼àÊÓ´ÓÓû§¿É»á¼ûÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈÀú³Ì£¬£¬£¬½«QEMUºÍÆäËûÐéÄ⻯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬£¬£¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹Òªº¦Éè±¹ØÁ¬ÄÐéÄ⻯¡£¡£¡£


https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/


2. ºÚ¿ÍÀÄÓÃDocuSign API½¨ÉèÐéα·¢Æ±Ã°³ä×ÅÃûÆ·ÅÆ¾ÙÐÐڲƭ


11ÔÂ4ÈÕ£¬£¬£¬DocuSign ÊÇÒ»¸öµç×ÓÊðÃûƽ̨£¬£¬£¬Ö§³ÖÒÔÊý×Ö·½·¨Ç©Êð¡¢·¢ËͺÍÖÎÀíÎĵµ¡£¡£¡£Envelopes APIÖ¼ÔÚ×ÊÖú¿Í»§×Ô¶¯·¢ËÍÐèÒªÊðÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÊðÃûºó¼ìË÷ËüÃÇ¡£¡£¡£ÍþвÐÐΪÕßÕýÔÚʹÓÃDocuSignµÄEnvelopes API½¨Éè²¢·Ö·¢¿´ËÆÕæÊµµÄÐéα·¢Æ±£¬£¬£¬Ã°³ä×ÅÃûÆ·ÅÆÈçNortonºÍPayPal¡£¡£¡£ËûÃÇʹÓÃÕýµ±µÄ¸¶·ÑDocuSignÕË»§£¬£¬£¬Í¨¹ý¸ÃAPI·¢ËÍÄ£Äâ×ÅÃûÈí¼þ¹«Ë¾Íâ¹ÛºÍ¸ÐÊܵÄڲƭÐÔ·¢Æ±£¬£¬£¬²¢ÓÕµ¼Ä¿µÄ¿Í»§¶ÔÎļþ¾ÙÐеç×ÓÊðÃûÒÔÊÚȨ¸¶¿î¡£¡£¡£ÕâЩ·¢Æ±µÄÓöȿØÖÆÔÚÏÖʵ¹æÄ£ÄÚ£¬£¬£¬ÒÔÔöÌíÆäÕýµ±ÐÔ¡£¡£¡£¾ÝWallarmÇå¾²Ñо¿Ö°Ô±³Æ£¬£¬£¬ÕâÖÖÀÄÓÃÐÐΪÒѾ­Ò»Á¬ÁËÒ»¶Îʱ¼ä£¬£¬£¬²¢ÒÑÏòDocuSign±¨¸æ¡£¡£¡ £¿£¿£¿£¿£¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳É϶à´Î¾Ù±¨´ËÀàÐÐΪ£¬£¬£¬µ«ËƺõÄÑÒÔ»ñµÃÓÐÓýâ¾ö¡£¡£¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬£¬£¬´ó¹æÄ£±¬·¢£¬£¬£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ¡£¡£¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓò½·¥¼°ÊÇ·ñÍýÏëÔöÇ¿ÕâЩ²½·¥µÄÎÊÌâ×÷³ö̸ÂÛ¡£¡£¡£ºÚ¿ÍÒÑÍùÒ²ÔøÀÄÓÃAPI¾ÙÐÐÆäËû¶ñÒâ»î¶¯£¬£¬£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØµãÁ´½Óµ½ÕÊ»§µÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/


3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaѬȾ³¬1500̨װ±¸


11ÔÂ5ÈÕ£¬£¬£¬Cleafy Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬£¬£¬ÒÑѬȾÁè¼Ý 1,500 ̨װ±¸£¬£¬£¬Ö÷ҪĿµÄΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ­¶¡ÃÀÖÞµÄ16¼ÒÒøÐС£¡£¡£¸Ã¶ñÒâÈí¼þÓë¶«ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬£¬µ«´úÂë²î±ðÏÔÖø¡£¡£¡£ToxicPanda ʹÓÃ×°±¸Ú²Æ­ÊÖÒÕÈÆ¹ýÒøÐÐÇå¾²²½·¥£¬£¬£¬¾ÙÐÐڲƭÐÔ×ʽð×ªÒÆ¡£¡£¡£Ö»¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬£¬£¬´úÂë²»ÍêÕû£¬£¬£¬µ«ËüÒÑÏÔʾ³öǿʢµÄڲƭÄÜÁ¦¡£¡£¡£ToxicPanda ½ÓÄÉÊÖ¶¯·½·¨£¬£¬£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈÆ¹ýÒøÐеÄÐÐΪ¼ì²â·ÀÓù¡£¡£¡£Ëü»¹¿ÉÒÔ»á¼ûÊÖ»úÏà²á£¬£¬£¬ÍøÂçÃô¸ÐÐÅÏ¢£¬£¬£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÅþÁ¬ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£Òâ´óÀûÊÇÆäÖ÷ҪĿµÄ£¬£¬£¬Ñ¬È¾Âʸߴï 56.8%£¬£¬£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃØÂ³µÈµØÒ²ÓÐѬȾ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬½ñÊÀ·À²¡¶¾½â¾ö¼Æ»®ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ô¼òÆÓµÄÍþв£¬£¬£¬È±·¦×Ô¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖ÷ÒªÎÊÌâ¡£¡£¡£


https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html


4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ð­Í¬¶þºÅÐж¯¡±ÖØÈ­¹¥»÷ÍøÂç·¸·¨


11ÔÂ5ÈÕ£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂʱ´ú£¬£¬£¬´úºÅΪ¡°Ð­Í¬¶þºÅÐж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÖУ¬£¬£¬Àֳɾв¶ÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂÚºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸·¨Ïà¹ØµÄÏÓÒÉÈË£¬£¬£¬²¢´Ý»ÙÁË 22,000 ¸ö IP µØµãÉÏÔËÐеÄ1,037̨ЧÀÍÆ÷ºÍ»ù´¡ÉèÊ©¡£¡£¡£´Ë´ÎÐж¯Éæ¼°95¸ö¹ú¼Ò£¬£¬£¬»ñµÃÁ˶à¼ÒË½ÓªÍøÂçÇå¾²¹«Ë¾µÄÇ鱨֧³Ö¡£¡£¡£Ðж¯ÖУ¬£¬£¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬£¬£¬59̨ЧÀÍÆ÷±»²é·â£¬£¬£¬43̨µç×Ó×°±¸±»Ã»ÊÕÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý¡£¡£¡£±ðµÄ£¬£¬£¬Õþ¸®»¹ÔÚÊÓ²ìÁíÍâ65ÃûÉæÏÓ¼ÓÈë²»·¨»î¶¯µÄÈË¡£¡£¡£Ðж¯ÁÁµã°üÀ¨Ïã¸ÛºÍ°ÄÞ¯·½¹Ø±ÕÁË´ó×Ú¶ñÒâЧÀÍÆ÷£¬£¬£¬ÃɹžÙÐÐÁ˶à´ÎºâÓîËѲ鲢²é»ñÁËһ̨ЧÀÍÆ÷£¬£¬£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâЧÀÍÆ÷ÓÐÁªÏµµÄСÎÒ˽¼Ò²¢²é»ñÁ˵ç×Ó×°±¸£¬£¬£¬°®É³ÄáÑÇÔò²é»ñÁËÁè¼Ý80GBµÄЧÀÍÆ÷Êý¾Ý¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸·¨¾Ö¾Ö³¤ÌåÏÖ£¬£¬£¬ÍøÂç·¸·¨µÄÈ«ÇòÐÔҪǴÔðÇòÓ¦¶Ô£¬£¬£¬´Ë´ÎÐж¯²»µ«´Ý»ÙÁ˶ñÒâ»ù´¡ÉèÊ©£¬£¬£¬»¹±ÜÃâÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙÎªÍøÂç·¸·¨µÄÎþÉüÆ·¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/


5. ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èй¶¾üÊ»ùְλÖ㬣¬£¬Òý·¢Çå¾²µ£ÐÄ


11ÔÂ6ÈÕ£¬£¬£¬ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èÔÚÆäÔÚÏßµØÍ¼Ð§À͵Ä×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄλÖ㬣¬£¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°Æð¾¢Èö²¥¡±¡£¡£¡£ÎÚ¿ËÀ¼¹ú¼ÒÇå¾²Óë¹ú·ÀίԱ»á·´ÐéαÐÅÏ¢²¿·ÖÈÏÕæÈËÌåÏÖ£¬£¬£¬¹È¸èÉÐδÐÞ¸´µØÍ¼£¬£¬£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½Ðżþ²¢ÔÊÐí¸üС£¡£¡£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬£¬£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêǰÅÄÉãµÄ£¬£¬£¬À´×Ô¹ûÕæÈªÔ´£¬£¬£¬²¢ÌåÏÖÖØÊÓ´ËÀàÇëÇó²¢ÓëÎÚ¿ËÀ¼¹ÙÔ±¼á³ÖÏàͬ¡£¡£¡£ÎÚ¿ËÀ¼µ£ÐľüÊÂÐÅÏ¢µÄ¹ûÕæ¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂ×°±¸µÄλÖ㬣¬£¬²»µ«¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬£¬£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯×èµ²Æ÷µÄ¹ú¼Ò¡£¡£¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÍøÂçÇ鱨£¬£¬£¬µ«¶íÂÞ˹ÒòÖÆ²Ã»òÆ·µÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓÉÌÒµ¹«Ë¾¹ºÖᣡ£¡£¹È¸èÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄÐí¶àЧÀÍ£¬£¬£¬µ«µØÍ¼µÈ²¿·ÖЧÀÍÈÔ¿ÉʹÓ㬣¬£¬µ«¹¦Ð§ÓÐÏÞ¡£¡£¡£


https://therecord.media/ukraine-google-locations-revealing-military


6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶


11ÔÂ5ÈÕ£¬£¬£¬¼ÓÄôóÕþ¸®¾Ð²¶ÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨ÓÖÃû"Waifu"ºÍ"Judische"£©¡£¡£¡£¾ÝÅí²©ÉçºÍ404 Media±¨µÀ£¬£¬£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯ΪĿµÄ£¬£¬£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬£¬£¬ÕâЩ×éÖ¯ËùÓÐÊÇSnowflakeµÄ¿Í»§¡£¡£¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄÁªºÏÊӲ췢Ã÷£¬£¬£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÉèÖöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£» £»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤¡£¡£¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬£¬£¬ÓëÖ®Ïà¹ØµÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼ÒЧÀ͵ÄÊýÒÚСÎÒ˽¼Ò¡£¡£¡£ÆäÖУ¬£¬£¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Í¼±»µÁ¡£¡£¡£SnowflakeÒÔºóÐû²¼½«¶ÔÐÂÕË»§Ç¿ÖÆÊµÑéMFA£¬£¬£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û¡£¡£¡£


https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/