DARK ANGELS³Æ´ÓÐ¾Æ¬ÖÆÔìÉÌNEXPERIAÇÔÈ¡1TBÊý¾Ý
Ðû²¼Ê±¼ä 2024-04-184ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬Dark Angels (Dunghill) ÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶ÔÈëÇÖÐ¾Æ¬ÖÆÔìÉÌ Nexperia ²¢ÇÔÈ¡¸Ã¹«Ë¾ 1 TB Êý¾ÝÈÏÕæ¡£¡£¡£¡£¡£¡£NexperiaÊÇÒ»¼Ò°ëµ¼ÌåÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚºÉÀ¼ÄÎ÷ºà¡£¡£¡£¡£¡£¡£ËüÔڵ¹úºº±¤ºÍÓ¢¹ú´óÂü³¹Ë¹ÌØÉèÓÐǰ¶Ë¹¤³§¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄ²úÆ·¹æÄ£°üÀ¨Ë«¼«¾§Ìå¹Ü¡¢¶þ¼«¹Ü¡¢ESD ±£»£»£»¤¡¢TVS ¶þ¼«¹Ü¡¢MOSFET ºÍÂß¼Æ÷¼þ¡£¡£¡£¡£¡£¡£×èÖ¹ 2024 Ä꣬£¬£¬£¬£¬£¬£¬¸ÃÐ¾Æ¬ÖÆÔìÉÌÓµÓÐ 14000 ÃûÔ±¹¤¡£¡£¡£¡£¡£¡£Dark Angels ÀÕË÷Èí¼þ×éÖ¯½« Nexperia Ìí¼Óµ½Æä Tor Ð¹Â¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ÖС£¡£¡£¡£¡£¡£¸Ã×éÖ¯Ðû²¼ÁËÒ»×éÎļþ×÷ΪÇå¾²Îó²îµÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬²¢Íþв³Æ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬¾Í»áй¶ËùÓб»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÐ¾Æ¬ÖÆÔìÉÌ֤ʵ£¬£¬£¬£¬£¬£¬£¬ËüÓÚ 2024 Äê 3 ÔÂÒâʶµ½Ä³Ð© Nexperia IT ЧÀÍÆ÷Ô⵽δ¾ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¡£ÎªÁËÓ¦¶ÔÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾½«ÊÜÓ°ÏìµÄϵͳÓ뻥ÁªÍø¶Ï¿ªÅþÁ¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâÍþвÉìÕÅ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/161888/cyber-crime/ransomware-dark-angels-nexperia.html
2. AWS¡¢Google ºÍ Azure CLI ¹¤¾ß¿ÉÄÜ»áй¶¹¹½¨ÈÕÖ¾ÖÐµÄÆ¾Ö¤
4ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÐµÄÍøÂçÇå¾²Ñо¿·¢Ã÷£¬£¬£¬£¬£¬£¬£¬À´×Ô Amazon Web Services (AWS) ºÍ Google Cloud µÄÏÂÁîÐнçÃæ (CLI) ¹¤¾ß¿ÉÄÜ»á̻¶¹¹½¨ÈÕÖ¾ÖеÄÃô¸Ðƾ֤£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¸ø×éÖ¯´øÀ´ÖØ´óΣº¦¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»ÔÆÇå¾²¹«Ë¾ OrcaÃüÃûΪLeakyCLI ¡£¡£¡£¡£¡£¡£Azure CLI¡¢AWS CLI ºÍ Google Cloud CLI ÉϵÄһЩÏÂÁî¿ÉÒÔÒÔÇéÐαäÁ¿µÄÐÎʽ̻¶Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÒÔÔÚͨ¹ý GitHub Actions µÈ¹¤¾ßÐû²¼Ê±±»¹¥»÷ÕßÍøÂç¡£¡£¡£¡£¡£¡£ÒԺ󣬣¬£¬£¬£¬£¬£¬Î¢ÈíÔÚ 2023 Äê 11 ÔÂÐû²¼µÄÇå¾²¸üÐÂÖнâ¾öÁ˸ÃÎÊÌ⣬£¬£¬£¬£¬£¬£¬²¢ÎªÆä·ÖÅÉÁË CVE ±êʶ·û CVE-2023-36052£¨CVSS ÆÀ·Ö£º8.6£©¡£¡£¡£¡£¡£¡£¼ò¶øÑÔÖ®£¬£¬£¬£¬£¬£¬£¬Õâ¸öÏë·¨Óë CLI ÏÂÁîÔõÑùÓÃÓÚÏÔʾ£¨Ô¤£©½ç˵µÄÇéÐαäÁ¿ÒÔ¼°Êä³öµ½Ò»Á¬¼¯³ÉºÍÒ»Á¬°²ÅÅ (CI/CD) ÈÕÖ¾Óйء£¡£¡£¡£¡£¡£Orca ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËüÔÚ GitHub ÉÏ·¢Ã÷Á˶à¸öÏîÄ¿£¬£¬£¬£¬£¬£¬£¬ÕâЩÏîÄ¿ÎÞÒâÖÐͨ¹ý Github Actions¡¢CircleCI¡¢TravisCI ºÍ Cloud Build ÈÕ־й¶ÁË»á¼ûÁîÅÆºÍÆäËûÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/04/aws-google-and-azure-cli-tools-could.html
3. ½©Ê¬ÍøÂç¼ÌÐøÊ¹Óà CVE-2023-1389 ¾ÙÐдó¹æÄ£Èö²¥
4ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÔÚ2023ÄêÏÂÁî×¢ÈëÎó²îCVE-2023-1389±»Åû¶£¬£¬£¬£¬£¬£¬£¬²¢Õë¶Ô TP-Link Archer AX21 (AX1800) µÄ Web ÖÎÀí½çÃæ¿ª·¢ÁËÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£FortiGuard Labs ¿ª·¢ÁË IPS ÊðÃûÀ´½â¾öÕâ¸öÎÊÌâ¡£¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬£¬ÎÒÃÇÊӲ쵽Õë¶ÔÕâ¸öÒ»ÄêǰµÄÎó²îµÄ¶àÆð¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÖØµã¹Ø×¢ Moobot¡¢Miori¡¢»ùÓÚ Golang µÄÊðÀí¡°AGoent¡±ºÍ Gafgyt ±äÌåµÈ½©Ê¬ÍøÂç¡£¡£¡£¡£¡£¡£ÕâÊÇͨ¹ý Web ÖÎÀí½çÃæÌṩµÄ¡°locale¡±API ÖÐδ¾Éí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£Gafgyt£¬£¬£¬£¬£¬£¬£¬Ò²³ÆÎª BASHLITE£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»ÖÖѬȾ Linux ¼Ü¹¹²Ù×÷ϵͳÒÔÌᳫ DDoS£¨ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£©¹¥»÷µÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÓëÍù³£Ò»Ñù£¬£¬£¬£¬£¬£¬£¬½©Ê¬ÍøÂçÒ»Ö±µØÃé×¼ÎïÁªÍøÎó²î£¬£¬£¬£¬£¬£¬£¬Ò»Ö±ÊµÑéʹÓÃËüÃÇ¡£¡£¡£¡£¡£¡£Ö»¹ÜÈ¥Äê·¢Ã÷ÁËÎó²î CVE-2023-1389 ²¢ÌṩÁËÐÞ¸´²½·¥£¬£¬£¬£¬£¬£¬£¬µ«ÈÔÓÐÐí¶à»î¶¯Ê¹ÓøÃÎó²î£¬£¬£¬£¬£¬£¬£¬µ¼Ö¼øºÚµ£±£Íø IPS Ò£²âµÖ´ïÏÔ×Å·åÖµ¡£¡£¡£¡£¡£¡£Óû§Ó¦Ð¡ÐÄDDoS½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬£¬²¢ÊµÊ±Ó¦Óò¹¶¡ÒÔ±£»£»£»¤ÆäÍøÂçÇéÐÎÃâÊÜѬȾ£¬£¬£¬£¬£¬£¬£¬±ÜÃâÆä³ÉΪ¶ñÒâÍþвÕߵĻúеÈË¡£¡£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread
4. LightSpy ºÚ¿ÍÃé×¼Ó¡¶ÈÆ»¹û×°±¸Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÃé׼ƻ¹û×°±¸Óû§ÊÇÓÉÓÚËûÃDZ»ÒÔΪ¾ßÓнϸߵÄÉç»á½×¼¶¡£¡£¡£¡£¡£¡£Õâ»áµ¼ÖÂÄ¿µÄ±ÈÆäËûÈ˸ü¸»ÓУ¬£¬£¬£¬£¬£¬£¬²¢ÇÒ¿ÉÄÜÒÔijÖÖ·½·¨ÏòºÚ¿ÍÌṩ¸ü¶à×ʽ𡣡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬Æ»¹ûµÄÉú̬ϵͳÊÇÏ໥¹ØÁªµÄ£¬£¬£¬£¬£¬£¬£¬ÕâÒâζ×ÅËüÓжà¸öºÚ¿Í¿ÉÒÔ½øÈëµÄµã£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÕÊ»§ºÍ×°±¸Êܵ½Ë𺦡£¡£¡£¡£¡£¡£ºÚÝ®ÍøÂçÇå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷ LightSpy ºÚ¿ÍÕýÔÚÆð¾¢Ãé×¼Ó¡¶ÈÆ»¹û×°±¸Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£LightSpy ÊÇÒ»¸öÄ£¿£¿£¿£¿£¿£¿£¿é»¯Ìع¤¹¤¾ß°ü£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÇÔÈ¡Êܺ¦ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÀýÈçÏÖʵ GPS ×ø±ê»ò VOIP ͨ»°¡£¡£¡£¡£¡£¡£ÕâÖÖеÄÍþвºÜΣÏÕ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚËüÔÊÐíºÚ¿ÍÒÔ¼«¸ßµÄ׼ȷ¶È¸ú×ÙÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬À©´óÕâÖÖÆÕ±é¼àÊÓ¶ÔÕþÖÎÃô¸ÐµØÇø×ÅÃûÊܺ¦ÕßµÄDZÔÚÓ°Ïì¡£¡£¡£¡£¡£¡£LightSpy ¾ßÓÐÆÕ±éµÄÌØ¹¤ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¼à¿Ø×°±¸Êý¾Ý¡¢QQ ÐÂÎÅÄÚÈÝ¡¢Î¢ÐÅÐÂÎÅ¡¢Telegram ̸Ìì¼Í¼ºÍ΢ÐÅÖ§¸¶ÀúÊ·¼Í¼¡£¡£¡£¡£¡£¡£
https://gbhackers.com/lightspy-hackers-target-indian-apple-users/
5. ˼¿ÆÖÒÑÔ VPN ºÍ SSH ЧÀÍÃæÁÙ´ó¹æÄ£±©Á¦¹¥»÷
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Ë¼¿Æ Talos Ñо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬ÖÁÉÙ×Ô 2024 Äê 3 Ô 18 ÈÕÆð£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¶à¸öÄ¿µÄµÄ´ó¹æÄ£Æ¾Ö¤±©Á¦¹¥»÷½«Ò»Ö±±¬·¢£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÐéÄâרÓÃÍøÂç (VPN) ЧÀÍ¡¢Web Ó¦ÓóÌÐòÉí·ÝÑéÖ¤½Ó¿ÚºÍ SSH ЧÀÍ¡£¡£¡£¡£¡£¡£ ÒÔÏÂÊÇÒÑÖªÊÜÓ°ÏìЧÀ͵ÄÁÐ±í£ºCisco Secure Firewall VPN Checkpoint VPN¡¢Fortinet VPN¡¢SonicWall VPN¡¢RD Web Services¡¢Miktrotik¡¢DraytekºÍUbiquiti¡£¡£¡£¡£¡£¡£Àֳɵı©Á¦¹¥»÷¿ÉÄܻᵼÖÂδ¾ÊÚȨµÄÍøÂç»á¼û¡¢ÕÊ»§Ëø¶¨»ò¾Ü¾øÐ§ÀÍ (DoS) ÇéÐΡ£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷Ô´×Ô TOR ³ö¿Ú½ÚµãÒÔ¼°ÄäÃûËíµÀºÍÊðÀí£¬£¬£¬£¬£¬£¬£¬ÀýÈ磺VPN Gate¡¢IPIDEA Proxy¡¢BigMama Proxy¡¢Space Proxies¡¢Nexus ProxyºÍProxy Rack¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/161943/hacking/brute-force-attacks.html
6. GOLD IONIC ÀÕË÷ÍÅ»ïµÄ¹¥»÷»î¶¯ÏÔ×ÅÉý¼¶
4ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÕýÔÚ×·×Ù GOLD IONIC ÀÕË÷Èí¼þ×éÖ¯µÄ»î¶¯ÏÔ×ÅÉý¼¶¡£¡£¡£¡£¡£¡£×Ô 2023 Äê 8 Ô·ºÆðÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Õâ¸ö¼¤½øµÄÍþв×éÖ¯ÒÑѸËÙ»ýÀÛÁËÒ»·ÝÊܺ¦ÕßÃûµ¥¡£¡£¡£¡£¡£¡£ËûÃǵĹ¥»÷Õë¶ÔÌìϸ÷µØµÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬°²ÅŶ¨ÖƵġ°INC¡±ÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬¶ÔÖ÷ÒªÊý¾Ý¾ÙÐмÓÃܲ¢½«Æä¿ÛΪÈËÖÊ¡£¡£¡£¡£¡£¡£GOLD IONIC µÄ¹¥»÷ÌåÏÖ³öÆä²»·ÖÊǷǺڰ׵ÄÐÔ×Ó£¬£¬£¬£¬£¬£¬£¬Ó°Ïìן÷¸öÐÐÒµµÄÆóÒµºÍ×éÖ¯¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ËûÃǵÄÖØµãËÆºõÊÇÃÀ¹úµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ÆäÖй¤Òµ¡¢Ò½ÁƱ£½¡ºÍ½ÌÓý»ú¹¹ÔâÊܵĹ¥»÷ÊýÄ¿¹ý¶à¡£¡£¡£¡£¡£¡£ÓÉÓÚÉúÃüºÍ»¼ÕßÊý¾ÝÐü¶øÎ´¾ö£¬£¬£¬£¬£¬£¬£¬Ò½ÁƱ£½¡ÐÐÒµÒÑ¾ÃæÁÙ×ÅÖÚ¶àÌôÕ½£¬£¬£¬£¬£¬£¬£¬»¹ÃæÁÙ×ÅÀÕË÷Èí¼þµÄÑÏÖØÎ£º¦¡£¡£¡£¡£¡£¡£½ÌÓý»ú¹¹¡¢Ãô¸ÐѧÉú¼Í¼ºÍÑо¿µÄ±£¹ÜÕßÒ²·¢Ã÷×Ô¼ºÔ½À´Ô½³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£
https://securityonline.info/inc-ransomware-surge-new-gold-ionic-group-hits-global-targets/