CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows

Ðû²¼Ê±¼ä 2024-11-06

1. CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows


11ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂç´¹ÂڻʹÓÃLinuxÐéÄâ»úѬȾWindowsϵͳ£¬£¬£¬£¬ £¬£¬£¬Í¨¹ýÄÚÖúóÃÅÉñÃØ»á¼ûÆóÒµÍøÂç ¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³É¡°OneAmerica ÊӲ족µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬ £¬£¬£¬·¢ËÍÒ»¸ö°üÀ¨285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬£¬£¬£¬ £¬£¬£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½·¨ºÍQEMUÐéÄâ»úÓ¦ÓóÌÐò ¡£¡£¡£Æô¶¯¿ì½Ý·½·¨ºó£¬£¬£¬£¬ £¬£¬£¬»áÖ´ÐÐPowerShellÏÂÁ£¬£¬£¬ £¬£¬£¬½«ÏÂÔØµÄ´æµµÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬£¬£¬£¬ £¬£¬£¬²¢ÔÚ×°±¸ÉÏÉèÖÃºÍÆô¶¯×Ô½ç˵QEMU LinuxÐéÄâ»ú ¡£¡£¡£¸ÃÐéÄâ»úÃûΪ¡°PivotBox¡±£¬£¬£¬£¬ £¬£¬£¬Ô¤×°Á˺óÃÅ£¬£¬£¬£¬ £¬£¬£¬¿ÉÈ·¼á³¤ÆÚµÄC2ͨѶ£¬£¬£¬£¬ £¬£¬£¬Ê¹¹¥»÷ÕßÔÚºǫ́¾ÙÐвÙ×÷ ¡£¡£¡£ÓÉÓÚQEMUÊÇÕýµ±¹¤¾ß£¬£¬£¬£¬ £¬£¬£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬£¬£¬£¬ £¬£¬£¬Çå¾²¹¤¾ßÒ²ÎÞ·¨¼ì²éÐéÄâ»úÄÚ²¿µÄ¶ñÒâ³ÌÐò ¡£¡£¡£ºóÃŵĽ¹µãÊÇÃûΪChiselµÄÍøÂçËíµÀ³ÌÐò£¬£¬£¬£¬ £¬£¬£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬£¬£¬£¬ £¬£¬£¬Ê¹¹¥»÷Õß×ÝÈ»ÔÚÍøÂçÊÜ·À»ðǽ±£»£»£»£»£»£»£»¤Ê±Ò²ÄÜÓëºóÃÅͨѶ ¡£¡£¡£ÎªÁ˱ÜÃâQEMUÀÄÓ㬣¬£¬£¬ £¬£¬£¬½¨Òé¼àÊÓ´ÓÓû§¿É»á¼ûÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈÀú³Ì£¬£¬£¬£¬ £¬£¬£¬½«QEMUºÍÆäËûÐéÄ⻯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬£¬£¬£¬ £¬£¬£¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹Òªº¦Éè±¹ØÁ¬ÄÐéÄ⻯ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/


2. ºÚ¿ÍÀÄÓÃDocuSign API½¨ÉèÐéα·¢Æ±Ã°³ä×ÅÃûÆ·ÅÆ¾ÙÐÐڲƭ


11ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬£¬DocuSign ÊÇÒ»¸öµç×ÓÊðÃûƽ̨£¬£¬£¬£¬ £¬£¬£¬Ö§³ÖÒÔÊý×Ö·½·¨Ç©Êð¡¢·¢ËͺÍÖÎÀíÎĵµ ¡£¡£¡£Envelopes APIÖ¼ÔÚ×ÊÖú¿Í»§×Ô¶¯·¢ËÍÐèÒªÊðÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÊðÃûºó¼ìË÷ËüÃÇ ¡£¡£¡£ÍþвÐÐΪÕßÕýÔÚʹÓÃDocuSignµÄEnvelopes API½¨Éè²¢·Ö·¢¿´ËÆÕæÊµµÄÐéα·¢Æ±£¬£¬£¬£¬ £¬£¬£¬Ã°³ä×ÅÃûÆ·ÅÆÈçNortonºÍPayPal ¡£¡£¡£ËûÃÇʹÓÃÕýµ±µÄ¸¶·ÑDocuSignÕË»§£¬£¬£¬£¬ £¬£¬£¬Í¨¹ý¸ÃAPI·¢ËÍÄ£Äâ×ÅÃûÈí¼þ¹«Ë¾Íâ¹ÛºÍ¸ÐÊܵÄڲƭÐÔ·¢Æ±£¬£¬£¬£¬ £¬£¬£¬²¢ÓÕµ¼Ä¿µÄ¿Í»§¶ÔÎļþ¾ÙÐеç×ÓÊðÃûÒÔÊÚȨ¸¶¿î ¡£¡£¡£ÕâЩ·¢Æ±µÄÓöȿØÖÆÔÚÏÖʵ¹æÄ£ÄÚ£¬£¬£¬£¬ £¬£¬£¬ÒÔÔöÌíÆäÕýµ±ÐÔ ¡£¡£¡£¾ÝWallarmÇå¾²Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ £¬£¬£¬ÕâÖÖÀÄÓÃÐÐΪÒѾ­Ò»Á¬ÁËÒ»¶Îʱ¼ä£¬£¬£¬£¬ £¬£¬£¬²¢ÒÑÏòDocuSign±¨¸æ ¡£¡£¡£¿£¿£¿£¿£¿£¿ £¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳É϶à´Î¾Ù±¨´ËÀàÐÐΪ£¬£¬£¬£¬ £¬£¬£¬µ«ËƺõÄÑÒÔ»ñµÃÓÐÓýâ¾ö ¡£¡£¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬£¬£¬£¬ £¬£¬£¬´ó¹æÄ£±¬·¢£¬£¬£¬£¬ £¬£¬£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ ¡£¡£¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓò½·¥¼°ÊÇ·ñÍýÏëÔöÇ¿ÕâЩ²½·¥µÄÎÊÌâ×÷³ö̸ÂÛ ¡£¡£¡£ºÚ¿ÍÒÑÍùÒ²ÔøÀÄÓÃAPI¾ÙÐÐÆäËû¶ñÒâ»î¶¯£¬£¬£¬£¬ £¬£¬£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØµãÁ´½Óµ½ÕÊ»§µÈ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/


3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaѬȾ³¬1500̨װ±¸


11ÔÂ5ÈÕ£¬£¬£¬£¬ £¬£¬£¬Cleafy Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬£¬£¬£¬ £¬£¬£¬ÒÑѬȾÁè¼Ý 1,500 ̨װ±¸£¬£¬£¬£¬ £¬£¬£¬Ö÷ҪĿµÄΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ­¶¡ÃÀÖÞµÄ16¼ÒÒøÐÐ ¡£¡£¡£¸Ã¶ñÒâÈí¼þÓë¶«ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬£¬£¬ £¬£¬£¬µ«´úÂë²î±ðÏÔÖø ¡£¡£¡£ToxicPanda ʹÓÃ×°±¸Ú²Æ­ÊÖÒÕÈÆ¹ýÒøÐÐÇå¾²²½·¥£¬£¬£¬£¬ £¬£¬£¬¾ÙÐÐڲƭÐÔ×ʽð×ªÒÆ ¡£¡£¡£Ö»¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬£¬£¬£¬ £¬£¬£¬´úÂë²»ÍêÕû£¬£¬£¬£¬ £¬£¬£¬µ«ËüÒÑÏÔʾ³öǿʢµÄڲƭÄÜÁ¦ ¡£¡£¡£ToxicPanda ½ÓÄÉÊÖ¶¯·½·¨£¬£¬£¬£¬ £¬£¬£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈÆ¹ýÒøÐеÄÐÐΪ¼ì²â·ÀÓù ¡£¡£¡£Ëü»¹¿ÉÒÔ»á¼ûÊÖ»úÏà²á£¬£¬£¬£¬ £¬£¬£¬ÍøÂçÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÅþÁ¬ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ ¡£¡£¡£Òâ´óÀûÊÇÆäÖ÷ҪĿµÄ£¬£¬£¬£¬ £¬£¬£¬Ñ¬È¾Âʸߴï 56.8%£¬£¬£¬£¬ £¬£¬£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃØÂ³µÈµØÒ²ÓÐѬȾ ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬ £¬£¬£¬½ñÊÀ·À²¡¶¾½â¾ö¼Æ»®ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ô¼òÆÓµÄÍþв£¬£¬£¬£¬ £¬£¬£¬È±·¦×Ô¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖ÷ÒªÎÊÌâ ¡£¡£¡£


https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html


4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ð­Í¬¶þºÅÐж¯¡±ÖØÈ­¹¥»÷ÍøÂç·¸·¨


11ÔÂ5ÈÕ£¬£¬£¬£¬ £¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂʱ´ú£¬£¬£¬£¬ £¬£¬£¬´úºÅΪ¡°Ð­Í¬¶þºÅÐж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÖУ¬£¬£¬£¬ £¬£¬£¬Àֳɾв¶ÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂÚºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸·¨Ïà¹ØµÄÏÓÒÉÈË£¬£¬£¬£¬ £¬£¬£¬²¢´Ý»ÙÁË 22,000 ¸ö IP µØµãÉÏÔËÐеÄ1,037̨ЧÀÍÆ÷ºÍ»ù´¡ÉèÊ© ¡£¡£¡£´Ë´ÎÐж¯Éæ¼°95¸ö¹ú¼Ò£¬£¬£¬£¬ £¬£¬£¬»ñµÃÁ˶à¼ÒË½ÓªÍøÂçÇå¾²¹«Ë¾µÄÇ鱨֧³Ö ¡£¡£¡£Ðж¯ÖУ¬£¬£¬£¬ £¬£¬£¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬£¬£¬£¬ £¬£¬£¬59̨ЧÀÍÆ÷±»²é·â£¬£¬£¬£¬ £¬£¬£¬43̨µç×Ó×°±¸±»Ã»ÊÕÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý ¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬Õþ¸®»¹ÔÚÊÓ²ìÁíÍâ65ÃûÉæÏÓ¼ÓÈë²»·¨»î¶¯µÄÈË ¡£¡£¡£Ðж¯ÁÁµã°üÀ¨Ïã¸ÛºÍ°ÄÞ¯·½¹Ø±ÕÁË´ó×Ú¶ñÒâЧÀÍÆ÷£¬£¬£¬£¬ £¬£¬£¬ÃɹžÙÐÐÁ˶à´ÎºâÓîËѲ鲢²é»ñÁËһ̨ЧÀÍÆ÷£¬£¬£¬£¬ £¬£¬£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâЧÀÍÆ÷ÓÐÁªÏµµÄСÎÒ˽¼Ò²¢²é»ñÁ˵ç×Ó×°±¸£¬£¬£¬£¬ £¬£¬£¬°®É³ÄáÑÇÔò²é»ñÁËÁè¼Ý80GBµÄЧÀÍÆ÷Êý¾Ý ¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸·¨¾Ö¾Ö³¤ÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬ÍøÂç·¸·¨µÄÈ«ÇòÐÔҪǴÔðÇòÓ¦¶Ô£¬£¬£¬£¬ £¬£¬£¬´Ë´ÎÐж¯²»µ«´Ý»ÙÁ˶ñÒâ»ù´¡ÉèÊ©£¬£¬£¬£¬ £¬£¬£¬»¹±ÜÃâÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙÎªÍøÂç·¸·¨µÄÎþÉüÆ· ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/


5. ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èй¶¾üÊ»ùְλÖ㬣¬£¬£¬ £¬£¬£¬Òý·¢Çå¾²µ£ÐÄ


11ÔÂ6ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èÔÚÆäÔÚÏßµØÍ¼Ð§À͵Ä×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄλÖ㬣¬£¬£¬ £¬£¬£¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°Æð¾¢Èö²¥¡± ¡£¡£¡£ÎÚ¿ËÀ¼¹ú¼ÒÇå¾²Óë¹ú·ÀίԱ»á·´ÐéαÐÅÏ¢²¿·ÖÈÏÕæÈËÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬¹È¸èÉÐδÐÞ¸´µØÍ¼£¬£¬£¬£¬ £¬£¬£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½Ðżþ²¢ÔÊÐí¸üР¡£¡£¡£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬£¬£¬£¬ £¬£¬£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêǰÅÄÉãµÄ£¬£¬£¬£¬ £¬£¬£¬À´×Ô¹ûÕæÈªÔ´£¬£¬£¬£¬ £¬£¬£¬²¢ÌåÏÖÖØÊÓ´ËÀàÇëÇó²¢ÓëÎÚ¿ËÀ¼¹ÙÔ±¼á³ÖÏàͬ ¡£¡£¡£ÎÚ¿ËÀ¼µ£ÐľüÊÂÐÅÏ¢µÄ¹ûÕæ¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂ×°±¸µÄλÖ㬣¬£¬£¬ £¬£¬£¬²»µ«¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬£¬£¬£¬ £¬£¬£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯×èµ²Æ÷µÄ¹ú¼Ò ¡£¡£¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÍøÂçÇ鱨£¬£¬£¬£¬ £¬£¬£¬µ«¶íÂÞ˹ÒòÖÆ²Ã»òÆ·µÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓÉÌÒµ¹«Ë¾¹ºÖà ¡£¡£¡£¹È¸èÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄÐí¶àЧÀÍ£¬£¬£¬£¬ £¬£¬£¬µ«µØÍ¼µÈ²¿·ÖЧÀÍÈÔ¿ÉʹÓ㬣¬£¬£¬ £¬£¬£¬µ«¹¦Ð§ÓÐÏÞ ¡£¡£¡£


https://therecord.media/ukraine-google-locations-revealing-military


6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶


11ÔÂ5ÈÕ£¬£¬£¬£¬ £¬£¬£¬¼ÓÄôóÕþ¸®¾Ð²¶ÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨ÓÖÃû"Waifu"ºÍ"Judische"£© ¡£¡£¡£¾ÝÅí²©ÉçºÍ404 Media±¨µÀ£¬£¬£¬£¬ £¬£¬£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯ΪĿµÄ£¬£¬£¬£¬ £¬£¬£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬£¬£¬£¬ £¬£¬£¬ÕâЩ×éÖ¯ËùÓÐÊÇSnowflakeµÄ¿Í»§ ¡£¡£¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄÁªºÏÊӲ췢Ã÷£¬£¬£¬£¬ £¬£¬£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÉèÖöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»£»£»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤ ¡£¡£¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬£¬£¬£¬ £¬£¬£¬ÓëÖ®Ïà¹ØµÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼ÒЧÀ͵ÄÊýÒÚСÎÒ˽¼Ò ¡£¡£¡£ÆäÖУ¬£¬£¬£¬ £¬£¬£¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Í¼±»µÁ ¡£¡£¡£SnowflakeÒÔºóÐû²¼½«¶ÔÐÂÕË»§Ç¿ÖÆÊµÑéMFA£¬£¬£¬£¬ £¬£¬£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/