Matanbuchus 3.0¶ñÒâÈí¼þ¼ÓÔØÆ÷Éý¼¶

Ðû²¼Ê±¼ä 2025-07-17

1. Matanbuchus 3.0¶ñÒâÈí¼þ¼ÓÔØÆ÷Éý¼¶


7ÔÂ16ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò½üÆÚ¾Û½¹ÓÚMatanbuchus¶ñÒâÈí¼þ¼ÓÔØÆ÷бäÖÖ£¨3.0°æ£©µÄÓ¿ÏÖ¡£¡£¡£×÷Ϊһ¿î×Ô2021ÄêÆðÔÚ¶íÓïÍøÂç·¸·¨ÂÛ̳ÒÔ¡°¶ñÒâÈí¼þ¼´Ð§ÀÍ¡±£¨MaaS£©Ä£Ê½ÔËÓªµÄ¹¥»÷¹¤¾ß£¬£¬£¬£¬Æä³õʼ°æ±¾ÒÔ2500ÃÀÔªÔÂ×â¼Û±»ÓÃÓÚÈö²¥Cobalt StrikeÐűêºÍÀÕË÷Èí¼þ£¬£¬£¬£¬ÔøÍ¨¹ý¡°ClickFix¡±Ê½ÓÕµ¼¹¥»÷ʵÑéÉøÍ¸¡£¡£¡£¶ø×îÐÂ3.0°æ±¾ÔÚÊÖÒÕ²ãÃæÊµÏÖÖØ´óÉý¼¶£¬£¬£¬£¬Òþ²ØÐÔÓë¹¥»÷ЧÂÊÏÔÖøÌáÉý£¬£¬£¬£¬Òý¿¯ÐÐÒµ¸ß¶ÈСÐÄ¡£¡£¡£Ð°æMatanbuchusµÄ½¹µãÍþвÔÚÓÚÆäÈö²¥Õ½ÂÔÓ빦Чǿ»¯¡£¡£¡£²î±ðÓڹŰåÒÀÀµÀ¬»øÓʼþ»òÎó²îʹÓõÄÀ©É¢·½·¨£¬£¬£¬£¬¸Ã¼ÓÔØÆ÷¸üÒÀÀµ¡°Ö±½Ó½»»¥Ê½Éç»á¹¤³Ìѧ¡±ÊֶΣ¬£¬£¬£¬¹¥»÷Õßͨ¹ýαװÉí·ÝÓÕÆ­Óû§Ö´ÐÐÔ¶³ÌЭÖú¹¤¾ß£¬£¬£¬£¬½ø¶ø°²ÅÅPowerShell¾ç±¾´¥·¢¶ñÒâÔØºÉÏÂÔØ¡£¡£¡£ÕâÖÖ¡°¾«×¼¶¨Î»+È˹¤ÓÕµ¼¡±µÄģʽ£¬£¬£¬£¬Ê¹Æä³ÉΪ³õʼ»á¼û¾­¼ÍÈË£¨IAB£©ÏòÀÕË÷ÍÅ»ï³öÊÛÆóÒµÍøÂçÈë¿ÚµÄ¸ßЧ¹¤¾ß£¬£¬£¬£¬ÍþвÐÔÔ¶³¬Í¨Ë×ÉÌÒµ»¯¼ÓÔØÆ÷¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬Matanbuchus 3.0µÄÉý¼¶¾Û½¹ÓÚÈý´óÆ«Ïò£ºÍ¨Ñ¶Ð­ÒéÓÅ»¯¡¢ÄÚ´æ²Ù×÷Ç¿»¯¡¢»ìÏýÊÖÒÕÉý¼¶¡£¡£¡£Æä¹¦Ð§À©Õ¹°üÀ¨Ö§³ÖCMD/PowerShell·´ÏòShell¡¢¿ÉÔËÐÐDLL/EXE/ShellcodeµÈ¶àÀàÐͺóÐøÔØºÉ£¬£¬£¬£¬²¢¾ß±¸Í¨¹ýCOM×é¼þ½»»¥×¢ÈëShellcodeʵÏÖÖØ´óʹÃüµ÷ÀíµÄÄÜÁ¦¡£¡£¡£


https://thehackernews.com/2025/07/hackers-leverage-microsoft-teams-to.html


2. Ó¢¹úCo-opÁãÊÛÉÌÔâÍøÂç¹¥»÷£¬£¬£¬£¬650Íò»áÔ±Êý¾Ýй¶


7ÔÂ16ÈÕ£¬£¬£¬£¬Ó¢¹ú×ÅÃûÁãÊÛÉÌÏàÖúÉ缯ÍÅ£¨Co-op£©¿ËÈÕ֤ʵ£¬£¬£¬£¬½ñÄê4ÔÂÔâÓöµÄ´ó¹æÄ£ÍøÂç¹¥»÷µ¼ÖÂÆäϵͳ̱»¾¡¢ÔÓ»õµêʳÎïǷȱ£¬£¬£¬£¬²¢Ôì³É650Íò»áÔ±µÄСÎÒ˽¼ÒÊý¾Ý±»µÁ¡£¡£¡£¹¥»÷±¬·¢ÓÚ4ÔÂ22ÈÕ£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÖØÖÃÒ»ÃûÔ±¹¤ÃÜÂ룬£¬£¬£¬ÀÖ³ÉÇÖÈëCo-opÍøÂç¡£¡£¡£Ëæºó£¬£¬£¬£¬¹¥»÷ÕßѸËÙºáÏòÉøÍ¸ÖÁÆäËû×°±¸£¬£¬£¬£¬²¢ÇÔÈ¡ÁËWindows Active DirectoryЧÀ͵Ľ¹µãÊý¾Ý¿âÎļþNTDS.dit¡£¡£¡£¸ÃÎļþ°üÀ¨Óû§ÃÜÂë¹þÏ£Öµ£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÀëÏßÆÆ½â½øÒ»²½À©´óÍøÂç»á¼ûȨÏÞ¡£¡£¡£×îÖÕ£¬£¬£¬£¬¹¥»÷ÕßÊÔͼ°²ÅÅDragonForceÀÕË÷Èí¼þ¼ÓÃÜÆ÷£¬£¬£¬£¬µ¼ÖÂCo-op±»ÆÈ¹Ø±Õ¶à¸öITϵͳÒÔ×èÖ¹ÍþвÀ©É¢¡£¡£¡£Ö»¹Ü²ÆÎñ¼°ÉúÒâÐÅϢδ±»Ð¹Â¶£¬£¬£¬£¬µ«»áÔ±µÄÁªÏµÐÅÏ¢µÈÃô¸ÐÊý¾ÝÔâÇÔ£¬£¬£¬£¬Ê×ϯִÐйÙShirine Khoury-HaqÔڲɷÃÖÐÌåÏÖ£¬£¬£¬£¬´Ë´ÎÊÂÎñ¡°ÓÌÈçÈËÉí¹¥»÷¡±£¬£¬£¬£¬Ëý¶Ô»áÔ±ºÍÔ±¹¤Êܵ½µÄΣÏÕÉî¸ÐÀ¢¾Î¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬´Ë´Î¹¥»÷ÓëÃûΪ¡°Scattered Spider¡±µÄºÚ¿Í×éÖ¯Óйء£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬DragonForceÀÕË÷Èí¼þÔËÓªÉÌÉù³Æ¶ÔCo-opÊÂÎñÈÏÕæ£¬£¬£¬£¬²¢ÏòBBCÌṩÁ˱»µÁÊý¾ÝÑù±¾¡£¡£¡£


https://www.bleepingcomputer.com/news/security/co-op-confirms-data-of-65-million-members-stolen-in-cyberattack/


3. BADBOX 2.0ÒÑԤװÔÚÈ«Çò°ÙÍòAndroid×°±¸ÉÏ


7ÔÂ16ÈÕ£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©¿ËÈÕ½«Ò»¿îÃûΪBADBOX 2.0µÄ°²×¿¶ñÒâÈí¼þÁÐΪȫÇòÐÔÍøÂçÍþв¡£¡£¡£¾ÝÇå¾²ÍŶӯÊÎö£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒÑÈëÇÖ222¸ö¹ú¼ÒºÍµØÇøµÄ³¬100Íǫ̀װ±¸£¬£¬£¬£¬Æä½¹µãÔÚÓÚͨ¹ýԤװ¹Ì¼þµÄ·½·¨£¬£¬£¬£¬½«µÍ±¾Ç®°²×¿×°±¸×ª»¯Îª½©Ê¬ÍøÂç½Úµã£¬£¬£¬£¬ÉõÖÁÔÚÓû§¹ºÖÃ×°±¸Ç°±ãÒÑDZÔÚÆäÖС£¡£¡£BADBOX 2.0µÄΣÏÕÐÔÔ´ÓÚÆäÆæÒìµÄÈö²¥Ä£Ê½£º²î±ðÓڹŰå¶ñÒâÈí¼þͨ¹ý¶ñÒâÏÂÔØ»òÐéαӦÓÃÈö²¥£¬£¬£¬£¬ËüÖ±½ÓǶÈë×°±¸¹Ì¼þ£¬£¬£¬£¬ÔÚÖÆÔì½×¶Î¼´±»Ô¤×°¡£¡£¡£ÕâÒâζ×ÅÓû§²ð·âÐÂ×°±¸¡¢Ê×´ÎÆô¶¯Ê±±ãÒÑ̻¶ÔÚÍþвÖС£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬ÊÜѬȾװ±¸¶àÀ´×Ôδ¾­ÑÏ¿áÇå¾²Éó²éµÄ¹©Ó¦Á´£¬£¬£¬£¬ÓÈÆäÊÇһЩÎÞÆ·ÅÆ»ò³¬µÍ¼Û²úÆ·£¬£¬£¬£¬²¿·ÖÉõÖÁͨ¹ýÑÇÂíÑ·µÈÖ÷Á÷ƽ̨ÏúÊÛ¡£¡£¡£Ò»µ©¼¤»î£¬£¬£¬£¬¶ñÒâÈí¼þ»áͨ¹ýÔ­ÉúºóÃÅ¿âlibanl.so£¨ÉîǶ¹Ì¼þ£©ÔÚºǫ́¾²Ä¬ÔËÐУ¬£¬£¬£¬×ÝÈ»»Ö¸´³ö³§ÉèÖÃÈÔÎÞ·¨É¨³ý¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ½¹µã¹¦Ð§Êǽ«×°±¸±äΪ¡°×¡Õ¬ÊðÀíÍøÂ硱½Úµã£¬£¬£¬£¬³öÊÛ¸ø·¸·¨¼¯ÍÅÓÃÓÚÒþ²Øµã»÷ڲƭ¡¢Æ¾Ö¤Ìî³äµÈÍøÂç¹¥»÷µÄ×Ù¼£¡£¡£¡£Æä×é¼þ°üÀ¨´¥·¢¶ñÒâÄ£¿£¿£¿£¿éµÄlibanl.so¡¢ÈÏÕæ³¤ÆÚ»¯µÄJavaÄ£¿£¿£¿£¿ép.jarºÍq.jar£¬£¬£¬£¬ÒÔ¼°ÏµÍ³¼¶Ó¦ÓÃcom.hs.app£¬£¬£¬£¬Í¨¹ý¼ÓÃÜͨѶÓëC2ÓòÃû½»»¥¡£¡£¡£Êܺ¦Õß¿ÉÄܲì¾õ×°±¸Òì³££ºÏÐÖÃʱCPUÕ¼ÓÃÂʸߡ¢·¢ÈÈÑÏÖØ¡¢ÐÔÄÜϽµ»òÍøÂçÁ÷Á¿Òì³££¬£¬£¬£¬µ«ÍùÍùÄÑÒÔ×·ËÝÔ´Í·¡£¡£¡£


https://hackread.com/badbox-2-0-preinstalled-android-iot-devices-worldwide/


4. Å·ÖÞÐ̾¯×éÖ¯µ·»ÙÇ×¶íµÄNoName057(16) DDoSºÚ¿Í×éÖ¯


7ÔÂ16ÈÕ£¬£¬£¬£¬Ò»³¡´úºÅΪ¡°ÒÁË¹ÌØÎ鯷Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯Õë¶ÔÇ×¶íºÚ¿Í×éÖ¯NoName057(16)Õö¿ª¾«×¼¹¥»÷¡£¡£¡£¸ÃÐж¯ÓÉÅ·ÖÞÐ̾¯×éÖ¯ºÍÅ·ÖÞ˾·¨×é֯ǣͷ£¬£¬£¬£¬ÁªºÏ12¸ö¹ú¼ÒµÄÖ´·¨ÊµÁ¦£¬£¬£¬£¬Ä¿µÄÖ±Ö¸Õâ¸ö×Ô2022ÄêÎÚ¿ËÀ¼Õ½Õù±¬·¢ºó»îÔ¾µÄÇ×¶íºÚ¿ÍÕûÌå¡£¡£¡£NoName057(16)ÒÔTelegramƵµÀºÍ¡°DDoSia¡±ÖÚ°üÏîĿΪ¹¤¾ß£¬£¬£¬£¬Í¨¹ý×ÔÔ¸ÕßÅÌËã»úÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬ºã¾ÃÕë¶ÔÅ·ÖÞ¡¢ÒÔÉ«ÁкÍÎÚ¿ËÀ¼µÄÖ§³ÖÎÚ¿ËÀ¼»ú¹¹£¬£¬£¬£¬°üÀ¨±±Ô¼Õ¾µã¡¢Õþ¸®»ú¹¹¡¢ÒøÐС¢ÄÜÔ´¹©Ó¦É̼°Ã½Ìå×éÖ¯¡£¡£¡£¾ÝÅ·ÖÞÐ̾¯×éÖ¯Åû¶£¬£¬£¬£¬¸Ã×éÖ¯µÄ¹¥»÷»î¶¯ÔøÈÅÂҵ¹ú¡¢²¨À¼¡¢Á¢ÌÕÍðµÈ¹úµÄÒªº¦Ð§ÀÍ¡£¡£¡£´Ë´ÎÐж¯ÖУ¬£¬£¬£¬Ö´·¨»ú¹¹ÔÚ7¹úÕö¿ªËѲ飬£¬£¬£¬´Ý»Ù»òÏÂÏß100Óą̀ЧÀÍÆ÷£¬£¬£¬£¬¾Ð²¶2ÈË£¬£¬£¬£¬²¢·¢³ö7·ÝÅ·Ö޾в¶Á£¬£¬£¬Ä¿µÄÖ±Ö¸Òþ²ØÓÚ¶íÂÞ˹µÄ½¹µã³ÉÔ±¡£¡£¡£±ðµÄ£¬£¬£¬£¬Õþ¸®Ïò1100Ãû¼ÓÈëÕß¼°17ÃûÖÎÀíÔ±·¢ËÍTelegramÖÒÑÔ£¬£¬£¬£¬Ã÷È·ÆäÖ´·¨ÔðÈΡ£¡£¡£Ö»¹ÜÐж¯¶ÔNoName057(16)Ôì³ÉÖØ´ó¹¥»÷£¬£¬£¬£¬µ«ÒòÆä½¹µã³ÉԱλÓÚ¶íÂÞ˹£¬£¬£¬£¬»ù´¡ÉèÊ©¿ÉÄÜ¿ìËÙÖØÐÞ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/europol-disrupts-pro-russian-noname05716-ddos-hacktivist-group/


5. UNC6148ʹÓÃOverstep¶ñÒâÈí¼þ¹¥»÷¹ýʱSonicWall×°±¸


7ÔÂ16ÈÕ£¬£¬£¬£¬¹È¸èÍþвÇ鱨С×飨GTIG£©¿ËÈÕÖÒÑÔ£¬£¬£¬£¬Ò»¸ö±»×·×ÙΪUNC6148µÄÍþвÐÐΪÕßÕýÕë¶ÔÒÑ¿¢ÊÂÖ§³Öµ«ÈÔÔÚʹÓÃÖеÄSonicWall Secure Mobile Access£¨SMA£©100ϵÁÐ×°±¸ÌᳫÐÂÐ͹¥»÷¡£¡£¡£¸Ã×éÖ¯×Ô2024Äê10ÔÂÆð»îÔ¾£¬£¬£¬£¬Í¨¹ý°²ÅÅδ֪¶ñÒâÈí¼þOVERSTEP£¬£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡¢Æ¾Ö¤µÁÓü°Ç±ÔÚÀÕË÷Èí¼þ°²ÅÅ£¬£¬£¬£¬Æä»î¶¯¿ÉÄܹØÁªWorld LeaksÊý¾Ýй¶ƽ̨¡£¡£¡£¹¥»÷Ä¿µÄΪÒÑÍêÈ«ÐÞ²¹µ«ÊÙÃüÖÕÖ¹£¨EoL£©µÄSMA×°±¸£¬£¬£¬£¬ÕâÀà×°±¸Òòȱ·¦³§ÉÌÇå¾²¸üУ¬£¬£¬£¬³ÉΪÎó²îʹÓõÄδ²¡£¡£¡£UNC6148ͨ¹ý¶à¸öÒÑÖªÎó²î£¨ÈçCVE-2025-32819¡¢CVE-2024-38475µÈ£©ÇÔÈ¡ÍâµØÖÎÀíԱƾ֤£¬£¬£¬£¬ËæºóʹÓÃSSL-VPN»á»°½¨Éè·´ÏòShell£¬£¬£¬£¬Ö»¹ÜSonicWall×°±¸Éè¼ÆÉÏեȡShell»á¼û£¬£¬£¬£¬µ«¹¥»÷Õß¿ÉÄÜʹÓÃδ֪ÁãÈÕÎó²îʵÏÖÍ»ÆÆ¡£¡£¡£Ò»µ©»ñµÃȨÏÞ£¬£¬£¬£¬ÍþвÐÐΪÕßÊÖ¶¯É¨³ýϵͳÈÕÖ¾ÒÔÑÚÊÎ×Ù¼££¬£¬£¬£¬²¢°²ÅÅOVERSTEP¶ñÒâÈí¼þ¡£¡£¡£OVERSTEP×÷ΪÓû§Ä£Ê½Rootkit£¬£¬£¬£¬Í¨¹ýÐÞ¸Ä×°±¸Æô¶¯Á÷³ÌʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬¾ß±¸Òþ²ØÇÔȡƾ֤¡¢»á»°ÁîÅÆ¼°Ò»´ÎÐÔÃÜÂ루OTP£©ÖÖ×ÓµÄÄÜÁ¦¡£¡£¡£Ö»¹ÜδÃ÷È·È·ÈϾ­¼ÃÄîÍ·£¬£¬£¬£¬µ«Êܺ¦×°±¸Êý¾Ý±»Ðû²¼ÖÁWorld LeaksÍøÕ¾£¬£¬£¬£¬ÌåÏÖDZÔÚÀÕË÷Òâͼ¡£¡£¡£


https://www.securityweek.com/sonicwall-sma-appliances-targeted-with-new-overstep-malware/


6. Century Support ServicesÔâÊý¾Ýй¶£¬£¬£¬£¬16ÍòÈËÃô¸ÐÐÅÏ¢±»ÇÔ


7ÔÂ15ÈÕ£¬£¬£¬£¬±öϦ·¨ÄáÑÇÖÝÕ®ÎñÇå³¥¹«Ë¾Next Level Finance Partners£¨ÒÔCentury Support ServicesÃûÒåÔËÓª£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°ÏìÓâ16ÍòÃûÓû§¡£¡£¡£¸Ã¹«Ë¾ÓÚ2024Äê11Ô¼ì²âµ½ÏµÍ³ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¾­5ÔÂÏÂÑ®Íê³ÉµÄÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»á¼û»òÇÔÈ¡ÁË´æ´¢Óû§Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄÎļþ¡£¡£¡£´Ë´ÎÊÂÎñ³ÉΪÓÖÒ»ÆðÉæ¼°¸ßÃô¸ÐÊý¾Ýй¶µÄÇ徲ʹʡ£¡£¡£Ð¹Â¶ÐÅÏ¢º­¸Ç¶à¸öÒªº¦ÁìÓò£¬£¬£¬£¬°üÀ¨Óû§ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕ/ÖÝÉí·ÝÖ¤/»¤ÕÕºÅÂëµÈÉí·Ý±êʶ£¬£¬£¬£¬ÒÔ¼°Ò½ÁÆ¿µ½¡°ü¹ÜÐÅÏ¢¡¢½ðÈÚÕË»§Êý¾Ý¼°Êý×ÖÊðÃû¡£¡£¡£ÕâЩÐÅÏ¢Èô±»ÀÄÓ㬣¬£¬£¬¿ÉÄܵ¼ÖÂÉí·ÝµÁÓᢽðÈÚÕ©Æ­»òÒ½ÁÆÐÅϢй¶µÈÑÏÖØÎ£º¦¡£¡£¡£Æ¾Ö¤Century Support ServicesÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄ±¨¸æ£¬£¬£¬£¬ÆäÀÛ¼ÆÐ§ÀͿͻ§½ü30Íò£¬£¬£¬£¬´Ë´Îй¶¹æÄ£Õ¼Æä¿Í»§ÈºµÄ°ëÊýÒÔÉÏ¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼ÎªÊÜÓ°ÏìÓû§Ìṩ12¸öÔµÄÃâ·ÑÉí·ÝµÁÓñ£»£»£»£»¤¼°ÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬ÒÔ»º½âDZÔÚΣº¦¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ÉÐδÓÐÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬¹¥»÷ÄîÍ·ÈÔ²»Ã÷È·¡£¡£¡£


https://www.securityweek.com/data-breach-at-debt-settlement-firm-impacts-160000-people/