ÒÁÀʺڿÍ×éÖ¯OilRig¶ÔÒÁÀ¿ËÕþ¸®Ìᳫ¶ñÒâÈí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2024-09-149ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ÒÁÀ¿ËÕþ¸®ÍøÂç½üÆÚ³ÉΪÒÁÀÊÖ§³ÖµÄÍøÂç×éÖ¯OilRig£¨Òà³ÆAPT34µÈ£©µÄÈ«ÐIJ߻®¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Check PointÆÊÎö£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔÒÁÀ¿Ë×ÜÀí°ì¹«ÊÒ¼°Íâ½»²¿µÈÒªº¦²¿·Ö£¬£¬£¬£¬£¬£¬Ê¹ÓÃжñÒâÈí¼þVeatyºÍSpearal£¬£¬£¬£¬£¬£¬Í¨¹ýαװÎĵµºÍÉç»á¹¤³ÌѧÊÖ¶ÎÉøÍ¸ÍøÂç¡£¡£¡£¡£¡£OilRig×Ô2014ÄêÆðÔÚÖж«µØÇø»îÔ¾£¬£¬£¬£¬£¬£¬ÉÆÓÚÍøÂç´¹ÂںͶ¨ÖƺóÃŹ¥»÷£¬£¬£¬£¬£¬£¬´Ë´ÎÒ²²»ÆÆÀý£¬£¬£¬£¬£¬£¬Õ¹Ê¾ÁËÆäÆæÒìµÄÏÂÁîÓë¿ØÖÆ»úÖÆ£¬£¬£¬£¬£¬£¬°üÀ¨×Ô½ç˵DNSËíµÀºÍ»ùÓÚ±»Ñ¬È¾µç×ÓÓʼþµÄC2ͨµÀ¡£¡£¡£¡£¡£¹¥»÷Á´Í¨¹ýÓÕÆÐÔÎļþÆô¶¯£¬£¬£¬£¬£¬£¬Ö´ÐÐPowerShell»òPyinstaller¾ç±¾£¬£¬£¬£¬£¬£¬É¾³ýºÛ¼£²¢°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£SpearalʹÓÃDNSËíµÀͨѶ£¬£¬£¬£¬£¬£¬VeatyÔòͨ¹ýÌØ¶¨ÓÊÏäÏÂÔØ²¢Ö´ÐÐÏÂÁî¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹·¢Ã÷ÓëSSHËíµÀºóÃźÍIISЧÀÍÆ÷ºóÃÅÏà¹ØµÄ»î¶¯£¬£¬£¬£¬£¬£¬Åú×¢¹¥»÷ÕßÊֶζàÑùÇÒÊÖÒÕÏȽø¡£¡£¡£¡£¡£Check PointÇ¿µ÷£¬£¬£¬£¬£¬£¬´Ë´ÎÐж¯Í¹ÏÔÁËÒÁÀÊÍþвÐÐΪÕßÔÚµØÇøÄÚµÄÒ»Á¬ºÍ¼¯ÖÐÆð¾¢£¬£¬£¬£¬£¬£¬ÒÔ¼°ÆäÔÚ¿ª·¢×¨ÃÅC2»úÖÆÉϵÄÐîÒâͶÈë¡£¡£¡£¡£¡£
https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html
2. TrickMoÒøÐÐľÂíбäÖÖÆØ¹â£ºÔöÇ¿Íþв£¬£¬£¬£¬£¬£¬ÇÔÈ¡Òþ˽
9ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Cleafy ÍþвÇ鱨ÍŶÓ×î½ü½ÒÆÆÁËTrickMoÒøÐÐľÂíµÄÒ»¸öÐÂÐͱäÖÖ£¬£¬£¬£¬£¬£¬ÕâÒ»±äÖÖ²»µ«¼ÌÐø²¢Ç¿»¯ÁËÆäǰÉíÕë¶ÔAndroid×°±¸ÒøÐÐÆ¾Ö¤µÄ¹Å°åÍþвÄÜÁ¦£¬£¬£¬£¬£¬£¬»¹ÒýÈëÁËÆÁÄ»Â¼ÖÆ¡¢¼üÅ̼ͼ¼°Ô¶³Ì¿ØÖƵȸ߼¶¹¦Ð§£¬£¬£¬£¬£¬£¬¼«´óµØÀ©Õ¹ÁËÆä¹¥»÷¹æÄ£ºÍÆÆËðÁ¦¡£¡£¡£¡£¡£TrickMo×÷ΪTrickBot¼Ò×åµÄÒ»Ô±£¬£¬£¬£¬£¬£¬×Ô2019ÄêÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬£¬£¬£¬Ò»Á¬½ø»¯£¬£¬£¬£¬£¬£¬ÏÖÒѳÉΪ½ðÈÚڲƺÍСÎÒ˽¼ÒÒþ˽Çå¾²µÄÖØ´óÒþ»¼¡£¡£¡£¡£¡£Ð±äÖÖ²»µ«ÄÜ×èµ²Ò»´ÎÐÔÃÜÂë(OTP)ÈÆ¹ýË«ÒòËØÈÏÖ¤(2FA)£¬£¬£¬£¬£¬£¬¸üͨ¹ýÖ±½Ó¿ØÖÆÊܺ¦Õß×°±¸Ö´ÐÐ×°±¸Ú²Æ(ODF)£¬£¬£¬£¬£¬£¬ÎÞÊÓ×îÑÏÃܵÄÒøÐÐÇå¾²·À»¤¡£¡£¡£¡£¡£ÓÈΪÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Cleafy·¢Ã÷¸Ã±äÖÖ»¹´ÓÊÜѬȾװ±¸ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬²¢½«ÕâЩÊý¾Ý´æ´¢ÔÚÎÞ±£»£»£»¤µÄÏÂÁîÓë¿ØÖÆ(C2)ЧÀÍÆ÷ÉÏ£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶Σº¦¼¤Ôö£¬£¬£¬£¬£¬£¬ÈκεÚÈý·½¶¼ÄÜÈÝÒ×»ñÈ¡ÕâЩÊý¾Ý¡£¡£¡£¡£¡£±»µÁÊý¾ÝÁè¼Ý 12 GB£¬£¬£¬£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÖ¤¼þ¡¢²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬ÉõÖÁÊܺ¦ÕßµÄ˽ÃÜÕÕÆ¬¡£¡£¡£¡£¡£TrickMoͨ¹ýÀÄÓÃAndroidµÄ¸¨Öú¹¦Ð§Ð§ÀÍ£¬£¬£¬£¬£¬£¬ÊµÏÖÎÞÉùÎÞÏ¢µÄȨÏÞÌáÉýÓë¹¥»÷Ö´ÐУ¬£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËÆäÍþвµÄÒþ²ØÐÔºÍΣº¦ÐÔ¡£¡£¡£¡£¡£
https://securityonline.info/beware-the-new-trickmo-banking-trojan-enhanced-features-increased-danger/
3. ÍøÂçÍþвж¯Ïò£ºÕýµ±Python¿â³É¹¥»÷ÀûÆ÷
9ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±Mertens½üÆÚÐû²¼ÁËÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁËÍøÂçÍþвÁìÓòµÄÒ»ÏîÑÏËàÇ÷ÊÆ£ºÍøÂç·¸·¨·Ö×ÓÕýÈÕÒæÇÉÃîµØÊ¹ÓÃÕýµ±µÄPython¿âÖ´ÐжñÒâ»î¶¯¡£¡£¡£¡£¡£ÕâЩ¿â£¬£¬£¬£¬£¬£¬ÈçpyWinhook¡¢psutil¡¢win32guiºÍpyperclip£¬£¬£¬£¬£¬£¬Ô±¾ÓÃÓÚÈí¼þ¿ª·¢ºÍ×Ô¶¯»¯£¬£¬£¬£¬£¬£¬È´±»·¸·¨·Ö×ÓÀÄÓÃÒÔʵÑé¼üÅ̼ͼ¡¢ÏµÍ³¼à¿Ø¡¢¼ôÌù°åÐ®ÖÆµÈ¶ñÒâÐÐΪ¡£¡£¡£¡£¡£MertensÖ¸³ö£¬£¬£¬£¬£¬£¬PyPi.orgµÈÖØ´ó¿âÉú̬ϵͳµÄ±£´æ£¬£¬£¬£¬£¬£¬Îª¶ñÒâÈí¼þ¿ª·¢ÕßÌṩÁ˸»ºñµÄ×ÊÔ´¡£¡£¡£¡£¡£Ö»¹ÜÕâЩ¿â×Ô¼ºÎÞº¦£¬£¬£¬£¬£¬£¬µ«ËüÃǵÄǿʢ¹¦Ð§±»²»·¨·Ö×ÓʹÓ㬣¬£¬£¬£¬£¬ÒÔÌӱܼì²â£¬£¬£¬£¬£¬£¬ÊµÏÖ´úÂë×¢Èë¡¢Êý¾Ýй¶µÈÄ¿µÄ¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬discord¿â±»ÖØÐ°üװΪC2ƽ̨£¬£¬£¬£¬£¬£¬ftplib¡¢dropboxµÈ¹¤¾ßÔò³ÉΪÊý¾Ýй¶µÄצÑÀ¡£¡£¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹½ÓÄÉPython»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬ÈçmarshalºÍpy_compile£¬£¬£¬£¬£¬£¬½øÒ»²½Ä£ºý¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬ÔöÌíÄæÏò¹¤³ÌµÄÄѶȡ£¡£¡£¡£¡£ÕâÖÖÕ½ÂÔʹµÃ¶ñÒâÈí¼þ¸üÄѱ»Çå¾²ÆÊÎöʦ²ì¾õ£¬£¬£¬£¬£¬£¬´Ó¶ø¼Ó¾çÁËÍøÂçÇå¾²·ÀÓùµÄÖØ´óÐÔ¡£¡£¡£¡£¡£
https://securityonline.info/cybersecurity-alert-python-libraries-exploited-for-malicious-intent/
4. Î÷ÑÅͼ¸ÛÔâRhysidaÀÕË÷Èí¼þ¹¥»÷
9ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬Î÷ÑÅͼ¸Û×÷Ϊî¿ÏµÎ÷ÑÅͼµØÇøº£¸ÛÓë»ú³¡µÄÖ÷ÒªÕþ¸®»ú¹¹£¬£¬£¬£¬£¬£¬½üÆÚÈ·ÈÏÆäϵͳÔÚÒÑÍùÈýÖÜÄÚÔâÓöÁËRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¶ñÒâ¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷ʼÓÚ8Ô£¬£¬£¬£¬£¬£¬ÆÈʹ¿Ú°¶½ôÆÈ¸ôÀ벿·ÖÒªº¦ÏµÍ³ÒÔ×èÖ¹Ó°Ï죬£¬£¬£¬£¬£¬Ö±½Ó×ÌÈÅÁËÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡µÄº½°àÔ¤¶©ÓëµÇ»úÁ÷³Ì£¬£¬£¬£¬£¬£¬µ¼Öº½°àÑÓÎ󡣡£¡£¡£¡£ÈýÖܺ󣬣¬£¬£¬£¬£¬¿Ú°¶¹ÙÆÓֱʽָÈÏRhysidaΪĻºóÔªÐ×£¬£¬£¬£¬£¬£¬²¢ÉùÃ÷×ÔÊ·¢ºóϵͳδÔÙÊÜеÄδÊÚȨ»î¶¯ÈÅÂÒ£¬£¬£¬£¬£¬£¬»ú³¡¼°¿Ú°¶ÉèÊ©ÈÔÊôÇå¾²¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬RhysidaÍÅ»ïÀÖ³ÉÉøÍ¸¿Ú°¶ÅÌËã»úϵͳ£¬£¬£¬£¬£¬£¬¼ÓÃÜÒªº¦Êý¾Ý£¬£¬£¬£¬£¬£¬µ¼Ö°üÀ¨ÐÐÀî´¦Öóͷ£¡¢×ÔÖúЧÀÍ¡¢Wi-FiÍøÂç¡¢ÐÅÏ¢ÏÔʾµÈ¶à¸öЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£Ö»¹Ü¿Ú°¶Ñ¸ËÙÏìÓ¦£¬£¬£¬£¬£¬£¬»Ö¸´Á˴󲿷Öϵͳ£¬£¬£¬£¬£¬£¬µ«ÈÔÔÚÈ«Á¦ÐÞ¸´Èç¹Ù·½ÍøÕ¾¡¢·Ã¿ÍͨÐÐ֤ЧÀ͵ÈÒªº¦¹¦Ð§¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¿Ú°¶¼á¾ö¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬ÕÃÏÔÁËÆäά»¤¹«¹²×ʽðÇå¾²¡¢²»Ïò·¸·¨Í×еÄ̬¶È¡£¡£¡£¡£¡£Rhysida×÷ΪһÖÖÐÂÐ˵ÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©£¬£¬£¬£¬£¬£¬×Ô½ñÄê5Ô»îÔ¾ÒÔÀ´£¬£¬£¬£¬£¬£¬ÒѶà´Î¶ÔÈ«Çò¶à¸öÁìÓòÌᳫ¹¥»÷¡£¡£¡£¡£¡££¬£¬£¬£¬£¬£¬CISAÓëFBIµÈ»ú¹¹ÒÑ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬ÌáÐѸ÷ÐÐÒµÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬£¬£¬£¬ÅäºÏµÖÓùÀÕË÷Èí¼þµÄË𺦡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/port-of-seattle-says-rhysida-ransomware-was-behind-august-attack/
5. Ivanti CSA¸ßΣÎó²îÔâʹÓ㬣¬£¬£¬£¬£¬Áª°î»ú¹¹ÏÞÆÚÐÞ²¹
9ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬IvantiÈ·ÈÏÆäÔÆÐ§ÀÍ×°±¸£¨CSA£©½â¾ö¼Æ»®Öб£´æ¸ßΣÎó²îCVE-2024-8190£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÔâ¹¥»÷ÕßʹÓᣡ£¡£¡£¡£ÔçÏÈ£¬£¬£¬£¬£¬£¬Ivanti±¨¸æ³ÆÎ´·¢Ã÷¿Í»§ÊÜÓ°Ï죬£¬£¬£¬£¬£¬µ«ËæºóÈ·ÈÏÉÙÊý¿Í»§ÒÑÖÐÕС£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÔ¶³ÌÈÏÖ¤µÄÖÎÀíԱͨ¹ýÏÂÁî×¢ÈëÔÚCSA 4.6°æ±¾ÉÏÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£Ivanti½¨Òé½ÓÄÉÌØ¶¨ÉèÖýµµÍΣº¦£¬£¬£¬£¬£¬£¬²¢¼ì²éÖÎÀíÓû§È¨ÏÞ¼°ÏµÍ³ÈÕÖ¾ÒÔ¼ì²â¹¥»÷ʵÑé¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¹«Ë¾±Þ²ß¿Í»§´ÓÒÑÖÕÖ¹Ö§³ÖµÄCSA 4.6.xÉý¼¶µ½CSA 5.0°æ±¾£¬£¬£¬£¬£¬£¬»òÖÁÉÙ¸üÐÂÖÁCSA 4.6µÄPatch 519¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«CVE-2024-8190¼ÓÈëÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ4ÈÕǰÐÞ¸´¡£¡£¡£¡£¡£CISAÇ¿µ÷´ËÀàÎó²î´ºÁª°îÆóÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£IvantiÔÚÈ«ÇòÓµÓÐÆÕ±éµÄÏàÖúͬ°éÍøÂ磬£¬£¬£¬£¬£¬Æä²úÆ·ºÍЧÀͱ»Áè¼Ý40,000¼Ò¹«Ë¾ÓÃÓÚϵͳÖÎÀí£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁËʵʱÐÞ¸´Çå¾²Îó²îµÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ivanti-warns-high-severity-csa-flaw-is-now-exploited-in-attacks/
6. Trojan Ajina.BankerËÁŰÖÐÑÇ£ºÎ±×°Õýµ±Ó¦ÓÃÇÔÈ¡ÒøÐÐÐÅÏ¢
9ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬ÃûΪTrojan Ajina.BankerµÄÐÂÐÍAndroid¶ñÒâÈí¼þÕýËÁŰÖÐÑǵØÇø£¬£¬£¬£¬£¬£¬ÒÔÎÚ×ȱð¿Ë˹̹Éñ»°Öеĺݶ¾¾«ÁéÃüÃû£¬£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÕýµ±Ó¦ÓóÌÐòÈçÒøÐÐЧÀͺÍÕþ¸®ÃÅ»§£¬£¬£¬£¬£¬£¬Ê¹ÓÃTelegramµÈƽ̨ÉϵÄÉç½»¹¤³ÌÕ½ÂÔÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐжñÒâÎļþ¡£¡£¡£¡£¡£×Ô2023Äê11ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬ÒÑ·¢Ã÷Ô¼1,400ÖÖ±äÖÖ£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄΪÎÚ×ȱð¿Ë˹̹Óû§£¬£¬£¬£¬£¬£¬µ«¹¥»÷¹æÄ£ÒÑÀ©É¢ÖÁ¶à¸ö¹ú¼Ò¡£¡£¡£¡£¡£Ajina.Bankerͨ¹ý·¢ËÍÓÕÈËÓŻݺʹÙÏúÐÅÏ¢µÄ¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬ÒÔ¼°·ÖÏíÍйܶñÒâÈí¼þµÄƵµÀÁ´½Ó£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓû§µÄºÃÆæÐľÙÐÐÈö²¥¡£¡£¡£¡£¡£ÆäÍâµØ»¯ÍƹãÕ½ÂÔÔÚÇøÓòÉçÇøÖÐÖÆÔì½ôÆÈ¸Ð£¬£¬£¬£¬£¬£¬´ÙʹÓû§²»¾Ë¼Ë÷¼´µã»÷Á´½Ó¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÄÜÍøÂç½ðÈÚÓ¦ÓÃÐÅÏ¢¡¢SIM¿¨ÏêÇ飬£¬£¬£¬£¬£¬»¹ÄÜ×èµ²¶ÌÐÅÒÔ»ñÈ¡2FAÑéÖ¤Â룬£¬£¬£¬£¬£¬Õ¹ÏÖ³ö¸ß¶È˳ӦÐԺͽø»¯ÄÜÁ¦¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ajina.Banker½ÓÄÉͬÃËÍýÏëģʽÔËÓª£¬£¬£¬£¬£¬£¬½¹µãÍŶÓÓëͬÃËÍøÂçÏàÖú£¬£¬£¬£¬£¬£¬Í¨Ì«¹ýÏí±»µÁ×ʽð¼¤Àø·Ö·¢ºÍѬȾÁ´µÄÀ©´ó¡£¡£¡£¡£¡£ÃæÁÙÕâÒ»Íþв£¬£¬£¬£¬£¬£¬×¨¼Ò½¨Òé¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬×èÖ¹µã»÷δ¾ÇëÇóµÄÐÂÎźÍÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬£¬¼á³ÖʹÓùٷ½Ó¦ÓÃÊÐËÁÏÂÔØÓ¦Ó㬣¬£¬£¬£¬£¬²¢×Ðϸ¼ì²éÓ¦ÓÃȨÏÞ¡£¡£¡£¡£¡£
https://hackread.com/android-malware-ajina-banker-steal-2fa-codes-telegram/