¹ú¼ÊÁªºÏÐж¯µ·»ÙTycoon2FA´¹ÂÚÆ½Ì¨
Ðû²¼Ê±¼ä 2026-03-061. ¹ú¼ÊÁªºÏÐж¯µ·»ÙTycoon2FA´¹ÂÚÆ½Ì¨
3ÔÂ4ÈÕ£¬£¬£¬£¬£¬Å·ÖÞÐ̾¯×é֯е÷µÄ¹ú¼ÊÖ´·¨Ðж¯¿ËÈÕÀֳɵ·»ÙTycoon2FA´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÓÉ΢ÈíÔÚ˽ӪÏàÖúͬ°éͬÃËÖ§³ÖÏÂÌᳫÊÖÒÕÖÐÖ¹£¬£¬£¬£¬£¬ÀÍÑάÑÇ¡¢Á¢ÌÕÍð¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Î÷°àÑÀºÍÓ¢¹úÖ´·¨²¿·ÖÖ´ÐÐÓòÃû²é·âµÈ²½·¥£¬£¬£¬£¬£¬¹²¹Ø±Õ330¸öÊôÓÚ·¸·¨Ð§ÀÍ»ú¹¹Ö÷¸É»ù´¡ÉèÊ©µÄÓòÃû£¬£¬£¬£¬£¬°üÀ¨¿ØÖÆÃæ°åºÍ´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£Tycoon2FA×Ô2023Äê8ÔÂÆð»îÔ¾£¬£¬£¬£¬£¬±»ÍøÂç·¸·¨·Ö×ÓÓÃÓÚÈÆ¹ý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬ÈëÇÖÈ«Çò½ü10Íò¸ö×éÖ¯µÄÕË»§¡£¡£¡£¡£¡£¡£¾Ý΢ÈíÊý¾Ý£¬£¬£¬£¬£¬ÖÁ2025ÄêÄêÖУ¬£¬£¬£¬£¬¸Ãƽ̨ÿÔÂÌìÉúÊýÍòÍò·â´¹ÂÚÓʼþ£¬£¬£¬£¬£¬Ó°Ï쳬50Íò¸ö×éÖ¯£¬£¬£¬£¬£¬Õ¼ËùÓб»×èµ²´¹ÂÚʵÑéµÄ60%¡£¡£¡£¡£¡£¡£ÆäÊÖÒÕÔÀíΪͨ¹ý·´ÏòÊðÀíЧÀÍÆ÷ʵʱ×èµ²Êܺ¦ÕߵǼƾ֤ºÍ»á»°cookie£¬£¬£¬£¬£¬Ä£ÄâMicrosoft 365¡¢OneDrive¡¢Outlook¡¢SharePoint¼°GmailµÈ¿ÉÐÅÆ·ÅƵÇÂ¼Ò³Ãæ¡£¡£¡£¡£¡£¡£×ÝÈ»Êܺ¦ÕßÍê³ÉÕý³£µÇ¼£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔÄÜÐ®ÖÆÒÑÈÏÖ¤»á»°²¢ÈƹýMFA±£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬³ý·Ç»î¶¯»á»°ºÍÁîÅÆ±»Ã÷È·×÷·Ï¡£¡£¡£¡£¡£¡£¸Ãƽ̨ͨ¹ýTelegramÒÔ120ÃÀÔª10ÌìʹÓÃȨµÄ¼ÛÇ®³öÊÛ£¬£¬£¬£¬£¬´ó·ù½µµÍµÍÊÖÒÕ·¸·¨·Ö×ÓÌá³«ÖØ´óMFAÈÆ¹ý¹¥»÷µÄÃż÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/
2. ÒÁÀÊÎÞÈË»úÏ®»÷ÑÇÂíÑ·Öж«Êý¾ÝÖÐÐÄÖÂÔÆÐ§ÀÍÖÐÖ¹
3ÔÂ3ÈÕ£¬£¬£¬£¬£¬ÒÁÀÊ±ÊÆÜ¶ÔÑÇÂíÑ·ÔÚ°¢ÁªÇõºÍ°ÍÁÖµÄÈý×ùÊý¾ÝÖÐÐÄ·¢¶¯ÎÞÈË»úÏ®»÷£¬£¬£¬£¬£¬µ¼ÖÂÖж«²¿·ÖµØÇøÔÆÐ§ÀÍÖÐÖ¹£¬£¬£¬£¬£¬µØÇøÖ÷ÒªÊ±ÊÆ½øÒ»²½¶ñ»¯¡£¡£¡£¡£¡£¡£¾ÝÑÇÂíÑ·Åû¶£¬£¬£¬£¬£¬°¢ÁªÇõÁ½×ùÊý¾ÝÖÐÐÄÔâÎÞÈË»ú¡°Ö±½Ó»÷ÖС±£¬£¬£¬£¬£¬°ÍÁÖÉèÊ©Òò¡°½ü¾àÀëÎÞÈË»úÏ®»÷¡±ÊÜË𣬣¬£¬£¬£¬¹²Ôì³ÉÔ¼60ÏîÑÇÂíÑ·ÔÆÐ§ÀÍÖÐÖ¹£¬£¬£¬£¬£¬Ó°ÏìÍøÂçÁ÷Á¿¼°ÒÀÀµÔÆÐ§À͵ÄÓªÒµÔËÓª¡£¡£¡£¡£¡£¡£´Ë´ÎÏ®»÷±¬·¢ÔÚÃÀÒÔÁªºÏ¹¥»÷µ¼ÖÂÒÁÀÊ×î¸ßÊ×ÄÔ¹þ÷ÄÚÒÁ¼°¶àÃû¸ß¼¶¹ÙÔ±ÉíÍöºó£¬£¬£¬£¬£¬ÒÁÀÊËæ¼´¶Ô°¢ÁªÇõ¼°ÁÚ¹úÕö¿ªÅê»÷Ðж¯£¬£¬£¬£¬£¬Ä¿µÄ²»µ«°üÀ¨ÃÀ¾ü»ùµØ£¬£¬£¬£¬£¬»¹À©Õ¹ÖÁ»ú³¡¡¢Âùݼ°Òªº¦ÓÍÆø»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£ÑÇÂíÑ·ÉùÃ÷Ö¸³ö£¬£¬£¬£¬£¬Ï®»÷Ôì³ÉÊý¾ÝÖÐÐĽṹË𻵡¢µçÁ¦ÖÐÖ¹£¬£¬£¬£¬£¬²¢´¥·¢Ïû·Àϵͳµ¼ÖÂÊÒÄÚË®Ë𣬣¬£¬£¬£¬ÍâµØÏû·À²¿·ÖÔÚɱ¾ø²Ðº¡ÒýÉúÆøÔÖʱ¹Ø±ÕÁ˵çÔ´ºÍ·¢µç»ú£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£ÑÇÂíÑ·ÌåÏÖ£¬£¬£¬£¬£¬ÏÖÔÚÕýÓëµØ·½Õþ¸®ÏàÖúÓÅÏȰü¹ÜÔ±¹¤Çå¾²£¬£¬£¬£¬£¬²¢½¨ÒéÖж«¿Í»§±¸·ÝÒªº¦Êý¾Ý£¬£¬£¬£¬£¬½«Ó¦ÓÃǨáãÖÁÆäËûAWSÇøÓò¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬ÖÜÈ«»Ö¸´È¡¾öÓÚÊÜÓ°Ïì»ù´¡ÉèÊ©µÄÐÞ¸´½ø¶È£¬£¬£¬£¬£¬¶øÄ¿½ñÖж«Ò»Á¬³åÍ»µ¼ÖÂÕûÌåÔËÓªÇéÐÎÈÔ²»¿ÉÕ¹Íû¡£¡£¡£¡£¡£¡£
https://therecord.media/iran-drone-strikes-hit-amazon-data-centers-gulf
3. ¹È¸èÅû¶CorunaÐÂÐÍiOSÎó²îʹÓù¤¾ß°ü
3ÔÂ5ÈÕ£¬£¬£¬£¬£¬¹È¸èÍþвÇ鱨С×飨GTIG£©·¢Ã÷ÃûΪCoruna£¨ÓÖÃûCryptoWaters£©µÄÐÂÐÍiOSÎó²îʹÓù¤¾ß°ü£¬£¬£¬£¬£¬¸Ã¹¤¾ß°üÕë¶ÔÔËÐÐiOS 13.0ÖÁ17.2.1°æ±¾µÄiPhone£¬£¬£¬£¬£¬°üÀ¨ÎåÌõÍêÕûÎó²îʹÓÃÁ´¹²23¸öÎó²î³ÌÐò¡£¡£¡£¡£¡£¡£Coruna¶Ô¾É°æiOS¾ßÓÐÇ¿¹¥»÷ÄÜÁ¦£¬£¬£¬£¬£¬µ«¶ÔiOS 17.3¼°ÒÔÉϰ汾ÎÞЧ£¬£¬£¬£¬£¬ÒòCVE-2024-23222µÈÎó²îÒÑÔÚ17.3ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ß°üÓÉ¼à¿Ø×°±¸¹©Ó¦É̿ͻ§Ê×´ÎʹÓ㬣¬£¬£¬£¬ºó±»¶à¸öÍþв×éÖ¯¸´ÓÃˢС£¡£¡£¡£¡£¡£UNC6353ÔÚÎÚ¿ËÀ¼Ìᳫˮ¿Ó¹¥»÷£¬£¬£¬£¬£¬Öйú½ðÈÚÍþв×éÖ¯UNC6691Ôòͨ¹ýÐéα½ðÈÚÍøÕ¾°²ÅÅÍêÕû¹¤¾ß°ü£¬£¬£¬£¬£¬Ê¹ÓÃÒþ²ØiFrameͶ·ÅÎó²î³ÌÐò£¬£¬£¬£¬£¬Ì»Â¶»îÔ¾µÄ¡°¶þÊÖ¡±ÁãÈÕÎó²îÊг¡¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬£¬Coruna¿ò¼Ü½ÓÄÉÆæÒìJavaScript»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬Í¨¹ý×°±¸Ö¸ÎÆÊ¶±ð¼ÓÔØ¶ÔÓ¦Îó²î³ÌÐò¡£¡£¡£¡£¡£¡£Æä½¹µã°üÀ¨WebKitÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²îʹÓá¢Ö¸ÕëÈÏÖ¤£¨PAC£©ÈƹýÄ£¿£¿£¿é£¬£¬£¬£¬£¬ÒÔ¼°¿ÉÖØÓÃ×é¼þ£¬£¬£¬£¬£¬ÓÃÓÚÈÆ¹ýÓû§Ì¬RWXÄÚ´æ·ÖÅÉÏÞÖÆ¡£¡£¡£¡£¡£¡£¹È¸èÒÑÐû²¼ÈëÇÖÖ¸±ê£¨IOC£©ºÍYara¹æÔò£¬£¬£¬£¬£¬²¢½«Ïà¹ØÓòÃû¼ÓÈëÇå¾²ä¯ÀÀ±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/188928/security/google-uncovers-coruna-ios-exploit-kit-targeting-ios-13-17-2-1.html
4. Bing AIËÑË÷Èö²¥Î±ÔìOpenClawµÄ¶ñÒâÈí¼þ
3ÔÂ5ÈÕ£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬Íйܼì²âÓëÏìÓ¦¹«Ë¾HuntressÅû¶һÆðÐÂÐÍÍøÂç¹¥»÷»î¶¯£ºÍþвÐÐΪÕßͨ¹ýαÔìGitHub´æ´¢¿â£¬£¬£¬£¬£¬Á¬ÏµÎ¢ÈíBingµÄAIÔöÇ¿ËÑË÷¹¦Ð§£¬£¬£¬£¬£¬ÏòÊÔͼװÖÿªÔ´AIÊðÀíOpenClawµÄÓû§Èö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò¼°ÊðÀí¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£OpenClawÒòÆäÄÜ»á¼ûÍâµØÎļþ²¢¼¯³Éµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶µÈÔÚÏßЧÀ͵Ĺ¦Ð§ÌØÕ÷£¬£¬£¬£¬£¬³ÉΪ¹¥»÷ÕßÑÛÖеġ°ÀíÏëÔØÌ塱¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏȽ¨Éè¶ñÒâGitHub´æ´¢¿â£¬£¬£¬£¬£¬Î±×°³ÉOpenClaw¹Ù·½×°ÖóÌÐò£¬£¬£¬£¬£¬²¢Ê¹ÓÃBing AIÔÚËÑË÷Ч¹ûÖеÄÍÆ¼ö»úÖÆ£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£¡£¡£¡£ÔÚmacOS³¡¾°Ï£¬£¬£¬£¬£¬Óû§±»Ö¸µ¼Ö´ÐаüÀ¨Atomic Stealer¶ñÒâÈí¼þµÄbashÏÂÁ£¬£¬£¬£¬¸ÃÏÂÁî»áÅþÁ¬ÖÁ¡°puppeteerrr¡±µÈ×ÔÁ¦GitHub¿ÍÕ»£¬£¬£¬£¬£¬°²ÅŰüÀ¨shell¾ç±¾ºÍMach-O¿ÉÖ´ÐÐÎļþµÄ¶ñÒâÎļþ¡£¡£¡£¡£¡£¡£WindowsÓû§ÔòÃæÁÙ¡°OpenClaw_x64.exe¡±µÄÈö²¥£¬£¬£¬£¬£¬¸Ã³ÌÐò»áÊͷŶà¸ö»ùÓÚRustµÄ¶ñÒâ¼ÓÔØÆ÷£¬£¬£¬£¬£¬ÔÚÄÚ´æÖÐÖ´ÐÐÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬VidarÇÔÈ¡³ÌÐò»áͨ¹ýTelegramºÍSteamÓû§×ÊÁÏ»ñÈ¡C2Êý¾Ý£¬£¬£¬£¬£¬¶øGhostSocksÊðÀíÔò½«Óû§ÅÌËã»úת»¯Îª¹¥»÷½Úµã£¬£¬£¬£¬£¬ÓÃÓÚ·ÓɶñÒâÁ÷Á¿»òÒþ²Ø¹¥»÷ºÛ¼£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/
5. ά»ùýÌå»ù½ð»áÔâJavaScriptÈ䳿¹¥»÷
3ÔÂ5ÈÕ£¬£¬£¬£¬£¬Î¬»ùýÌå»ù½ð»áÔâÓöÒ»ÆðÓÉ×ÔÎÒÈö²¥JavaScriptÈ䳿Òý·¢µÄÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¸ÃÈä³æÍ¨¹ýÐÞ¸ÄÓû§¾ç±¾¼°ÆÆËðMeta-WikiÒ³ÃæÊµÑé¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÔ¼3996¸öÒ³Ãæ±»Ð޸ġ¢85λÓû§µÄcommon.jsÎļþ±»Ìæ»»£¬£¬£¬£¬£¬×îÖÕÆÈʹ»ù½ð»áÔÝʱÏÞÖÆËùÓÐÏîÄ¿±à¼¹¦Ð§¡£¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ¶íÂÞ˹ά»ù°Ù¿ÆÍйܵÄÒ»·Ý¶ñÒâ¾ç±¾test.js£¬£¬£¬£¬£¬¸Ã¾ç±¾ÓÚ2024Äê3ÔÂÊ×´ÎÉÏ´«£¬£¬£¬£¬£¬ÓëÀúÊ·¹¥»÷ÖÐʹÓõľ籾±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬µ±ÈÕÒ»Ãûά»ùýÌåÔ±¹¤ÕË»§ÔÚ²âÊÔÓû§¾ç±¾¹¦Ð§Ê±£¬£¬£¬£¬£¬¿ÉÄÜÒòÓÐÒâÖ´ÐС¢ÒâÍâ¼ÓÔØ»òÕË»§±»µÁ´¥·¢¸Ã¾ç±¾£¬£¬£¬£¬£¬µ¼ÖÂÆäͨ¹ýÒѵÇÈÎÃü»§µÄcommon.js¼°È«¾ÖMediaWiki:Common.jsÎļþʵÏÖ×ÔÎÒÈö²¥¡£¡£¡£¡£¡£¡£È䳿»¹¾ß±¸±à¼Ëæ»úÒ³Ãæ¹¦Ð§£¬£¬£¬£¬£¬Í¨¹ý²åÈëÒþ²ØµÄJavaScript¼ÓÔØÆ÷¼°´ó³ß´çÍ¼Æ¬ÆÆËðÒ³ÃæÄÚÈÝ¡£¡£¡£¡£¡£¡£Î¬»ùýÌå»ù½ð»áʺóÉùÃ÷³Æ£¬£¬£¬£¬£¬¸Ã¶ñÒâ´úÂë½ö»îÔ¾23·ÖÖÓ£¬£¬£¬£¬£¬Ê±´ú½ö¶ÔMeta-WikiÄÚÈÝÔì³ÉÔÝʱ¸ü¸ÄÓëɾ³ý£¬£¬£¬£¬£¬ÎÞÓÀÊÀÐÔË𺦻òСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£ÏÖÔڱ༹¦Ð§Òѻָ´£¬£¬£¬£¬£¬»ù½ð»áÕýÔöÇ¿Çå¾²Éó²é²¢Öƶ©ÌØÊâ·À»¤²½·¥£¬£¬£¬£¬£¬ÒÔ½µµÍͬÀàÊÂÎñΣº¦¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/
6. ¶í¹ØÁª´¹ÂڻÓÃжñÒâÈí¼þ¹¥»÷ÎÚ×éÖ¯
3ÔÂ5ÈÕ£¬£¬£¬£¬£¬ClearSkyÑо¿±¨¸æÅû¶һÆðÓë¶íÂÞ˹ÓйصÄÍøÂç´¹ÂÚ¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬¸Ã»î¶¯Í¨¹ýÁ½ÖÖÐÂÐͶñÒâÈí¼þBadPawºÍMeowMeowÕë¶ÔÎÚ¿ËÀ¼×éÖ¯Ìᳫ¶à½×¶Î¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÒ»·â°üÀ¨ZIPѹËõÎļþÁ´½ÓµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬Óʼþͨ¹ýÎÚ¿ËÀ¼ÍøÂçЧÀÍÌṩÉÌukr[.]net·¢ËÍ£¬£¬£¬£¬£¬¸ÃÓòÃû´ËÇ°Ôø±»¶íÂÞ˹¹¥»÷»î¶¯ÀÄÓᣡ£¡£¡£¡£¡£Êܺ¦Õßµã»÷Á´½Óºó£¬£¬£¬£¬£¬ÏµÍ³»á¼ÓÔØ×·×ÙÏñËØÍ¨Öª¹¥»÷Õߣ¬£¬£¬£¬£¬ËæºóÖØ¶¨ÏòÖÁ¶ÌÁ´½ÓÏÂÔØZIPÎļþ¡£¡£¡£¡£¡£¡£½âѹZIPºó£¬£¬£¬£¬£¬Î±×°³ÉHTMLÎĵµµÄHTAÎļþ»áÏÔʾÎÚ¿ËÀ¼ÓïÓÕ¶üÐÅÏ¢£¬£¬£¬£¬£¬ÄÚÈÝÉæ¼°ÁìÍÁͨÐÐÔÊÐíÉêÇ룬£¬£¬£¬£¬ÒÔ´ËÓÕÆÊܺ¦Õ߸ᣡ£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬HTAÎļþͨ¹ý¼ì²éϵͳװÖÃÈÕÆÚÖ´Ðз´É³Ïä¼ì²â£¬£¬£¬£¬£¬ÈôϵͳװÖÃȱ·¦10ÌìÔòÖÕÖ¹Ö´ÐС£¡£¡£¡£¡£¡£Öª×ãÌõ¼þºó£¬£¬£¬£¬£¬HTAÎļþÌáÈ¡ÆäËû×é¼þ£¬£¬£¬£¬£¬Í¨¹ýÍýÏëʹÃü½¨É賤ÆÚ»¯ÅþÁ¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃVBS¾ç±¾´ÓͼÏñÖÐÌáÈ¡ÒþдÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬×îÖÕ¼ÓÔØBadPaw¼ÓÔØÆ÷¡£¡£¡£¡£¡£¡£BadPaw×÷Ϊ»ùÓÚ.NETµÄ¼ÓÔØÆ÷£¬£¬£¬£¬£¬Ê¹ÓÃ.NET Reactor¼Ó¿ÇÆ÷»ìÏý´úÂ룬£¬£¬£¬£¬×è°ÄæÏòÆÊÎö¡£¡£¡£¡£¡£¡£½¨ÉèC2ͨѶºó£¬£¬£¬£¬£¬BadPaw°²ÅÅMeowMeowÖØ´óºóÃÅ¡£¡£¡£¡£¡£¡£¸ÃºóÞ߱¸ÇéÐμì²â¹¦Ð§£¬£¬£¬£¬£¬¿ÉɨÃèÐéÄâ»ú¼°Wireshark¡¢ProcMonÖÐÆÊÎö¹¤¾ß£¬£¬£¬£¬£¬Èô·¢Ã÷ɳÏäÇéÐÎÔòÁ¬Ã¦×èÖ¹Ö´ÐС£¡£¡£¡£¡£¡£
https://securityaffairs.com/188974/apt/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ