NPDÒòÊý¾Ýй¶ÉêÇëÆÆ²ú£¬Ãæ¶Ô¶à·½ËßËÏ
°ä²¼¹¦·ò 2024-10-141. NPDÒòÊý¾Ýй¶ÉêÇëÆÆ²ú£¬Ãæ¶Ô¶à·½ËßËÏ
10ÔÂ12ÈÕ£¬ÃÀ¹ú¹ú¶È¹«¹²Êý¾Ý¹«Ë¾£¨NPD£©£¬×÷ΪÃÀ¹ú×î´óµÄ²¼¾°µ÷²é¹«Ë¾Ö®Ò»£¬½üÆÚÒòÔâ·êºÚ¿Í¹¥»÷²¢Ð¹Â¶ÊýÒÚÈËÊý¾Ý¶øÏÝÈë³Á³ÁÀ§¾³£¬×îÖÕÓÚ10ÔÂ2ÈÕÓÉĸ¹«Ë¾Jerico PicturesÏò·ðÂÞÀï´ïÖÝÄÏÇø·¨ÔºÉêÇëÆÆ²ú¡£ºÚ¿ÍÓÚ2023Äê12ÔÂÈëÇÖNPDϵͳ£¬²¢ÓÚ½ñÄê4ÔÂÔÚBreachedºÚ¿Í·¸×ïÊг¡Öгõ´Î³öÏÖÓйØÊý¾Ý£¬ºÚ¿ÍUSDoDÐû³Æ¶Ô´ËÕÆ¹Ü£¬²¢¿äÒ«ÆäÔÚÈëÇÖFBI¡¢¿Õ¿ÍµÈ»ú¹¹·½ÃæµÄ³É¾Í¡£6Ô£¬USDoDÊÔͼÒÔ350ÍòÃÀÔªÏúÊÛÔ̺¬29ÒÚÌõÃÀ¹ú¹«Ãñ¼Í¼µÄ±»µÁÊý¾Ý£»7Ô£¬ÁíÒ»ºÚ¿ÍFeniceÔÚBreachForumsÉÏÃâ·Ñ°ä²¼ÁËÒ»¸öÔ̺¬27ÒڱʼͼµÄÊý¾Ý¿â¡£Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢Éç»á°²È«ºÅÂëµÈÃô¸ÐÐÅÏ¢£¬ÍøÂ簲ȫר¼Ò֤ʵ´ó²¿ÃÅÐÅÏ¢ÕýÈ·¡£NPDË䰵ʾÒѹ²Í¬·¨Âɲ¿Ãŵ÷²é£¬µ«Î´Ìṩ×îнøÕ¹£¬Ò²Î´ÎªÊܺ¦ÕßÌṩ±£»¤·þÎñ¡£¹«Ë¾ÆÆ²úÉêÃ÷Ö¸³ö£¬ÒòÎÞ·¨²úÉú×ã¹»ÊÕÈë½â¾öDZÔÚ¸ºÕ®¼°³Ðµ£ÓйØÓöȣ¬¼ÓÖ®Ò½ÁÆ»ú¹¹µÈ¿Í»§²»ÈÝÓв¼¾°ÎÊÌâµÄÆóÒµÌṩ·þÎñ£¬¹«Ë¾ÏÝÈë¾ø¾³¡£´Ë±í£¬NPD»¹Ãæ¶Ô¶àÆð¼¯ÌåËßËϼ°À´×Ô20¶à¸öÖÝ×ܼì²ì³¤ÒªÇóÖ§¸¼ûñÊ·£¿îµÄѹÁ¦£¬ÃÀ¹úÁª¹úÒµÎñίԱ»áÒ²ÔÚÉó²é´ËÊ¡£
https://therecord.media/national-public-data-bankruptcy-cyberattack?__cf_chl_rt_tk=GF.IqF4I1q4XLxFQViMGflsJ0gqSiczsmGeWUI2MOhE-1728699076-1.0.1.1-n6A6vfbEhmIy5OoZy.Ikdg9MFhV1brh0Rte3ceh4Gg8
2. DarkVision RAT£ºÍøÂç·¸×ï·Ö×ÓµÄ׳´ó¶àÖ°Äܹ¤¾ß¼°Æä¼¼ÊõÑݱä
10ÔÂ13ÈÕ£¬DarkVision RATÊÇÒ»Öֵͳɱ¾ÇÒÖ°ÄÜ׳´óµÄÔ¶³Ì½Ó¼ûľÂí£¨RAT£©£¬×Ô2020Äê³õ´Î³öÏÖÒÔÀ´£¬ÒòÆä¸ß¶È¿É¶¨ÔìÐÔºÍÔÚHack ForumsµÈÍøÕ¾ÉÏÒÔµÍÖÁ60ÃÀÔªµÄ¼ÛÖµÏúÊÛ£¬¶øÔÚÍøÂç·¸×ï·Ö×ÓÖÐѸ¿ìÊ¢ÐС£¸ÃRAT¾ß±¸¶àÖÖÖ°ÄÜ£¬Ô̺¬¼üÅ̼ͼ¡¢Îļþ²Ù×÷¡¢¹ý³Ì×¢Èë¡¢ÃÜÂëÇÔÈ¡ºÍÔ¶³Ì´úÂëÖ´ÐУ¬³ÉΪ¹¥»÷ÕßÈëÇÖϵͳºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÈȵ㹤¾ß¡£×î½ü£¬ThreatLabz¹Û²ìµ½DarkVisionÓëÁíÒ»¿î¶ñÒâÈí¼þPureCrypterһ·ÔÚлÖд«²¼¡£DarkVision RATʹÓÃ×Ô½çËµÍøÂçºÍ̸ÓëºÅÁîºÍ½ÚÔ죨C2£©·þÎñÆ÷ͨѶ£¬½Ó¹ÜºÅÁî²¢ÇÔÈ¡Êý¾Ý¡£ÆäÌÓ±ÜÕ½ÊõÔ̺¬DLL½Ù³Ö¡¢¹ý³Ì×¢ÈëºÍ×Ô¶¯ÌáÉý¼¼Êõ£¬ÒÔÈÆ¹ý°²È«·ÀÓù²¢»ñµÃÌáÉýȨÏÞ¡£´Ë±í£¬¸ÃRAT»¹Ê¹ÓÃWindows DefenderÅųýºÍ¶àÖÖÓÆ¾ÃÐÔ»úÔìÀ´Ô¤·À¼ì²âºÍά³Ö»î¶¯×´Ì¬£¬È罫¾ç±¾¸éÖÃÔÚWindowsÆô¶¯Îļþ¼ÐÖÓעʹÓÃ×Ô¶¯ÔËÐÐ×¢²á±íÏîÒÔ¼°Í¨¹ý¹¤×÷´òË㷨ʽÆÌÅŹ¤×÷¡£DarkVision RATµÄ¸ß¶ÈÊÊÓ¦ÐÔÌå´Ë¿ÌÆä±êÖ¾ÔÊÐí¹¥»÷ÕßÑ¡ÔñʹÓÃÄÄÖÖÓÆ¾ÃÐÔ²½Ö裬ÄÑÒÔ¼ì²â¡£¸ÃRAT»¹Ö§³Ö¸÷ÀàºÅÁͨ¹ý²å¼þʵÏÖ¸ü¶à¶ñÒâÖ°ÄÜ£¬Èç²¶»ñ°´¼ü¡¢ÍøÂçÉãÏñÍ·¾µÍ·¡¢¹àÒôºÍ°Ñ³Öϵͳ¹ý³Ì¡£
https://securityonline.info/darkvision-rat-the-60-malware-threatening-your-data/
3. Game FreakÔâ·ê¡°Teraleak¡±Êý¾Ýй¶£¬½ü1TBÃô¸ÐPok¨¦monÊý¾Ý±íй
10ÔÂ13ÈÕ£¬¿Ú´üÑý¹ÖϵÁÐÓÎÏ·µÄ¿ª·¢ÉÌGame Freak£¬½üÆÚÔâ·êÁ˱»³ÆÎª¡°Teraleak¡±µÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬µ¼Ö½ü1TBµÄÃô¸ÐÊý¾Ý±íй£¬Ó°ÏìÁË2,606ÃûÔ±¹¤ºÍ³Ð°üÉÌ¡£Ð¹Â¶ÄÚÈÝÔ̺¬Ô´´úÂ롢ȡµÞµÄÓÎÏ·¡¢¸ÅÏëͼ¡¢Î´°ä²¼µÄÏîÄ¿µÈ£¬¹¦·ò¿ç¶È´Ó25ÄêǰµÄÄÚ²¿Îļþµ½¼´½«ÍƳöµÄÐÂÓÎÏ·¡£Ð¹Â¶µÄÊý¾Ý×î³õÔÚÉ罻ýÌåºÍÂÛ̳Èçr/PokeLeaksÉÏÁ÷´«£¬Éæ¼°µÄ×ÊÁÏÔ̺¬¿Ú´üÑý¹ÖÉè¼Æ¡¢¶¯ÂþÉè¼ÆÎĵµ¡¢Î´Ê¹Óõľ«Á鱦¿ÉÃÎÉè¼Æ¡¢µçÓ°Ðø¼¯Ðû´«Æ¬ÒÔ¼°ÈÎÌìÌÃSwitch 2µÄ¼¼ÊõÑÝʾµÈ¡£¹ÌȻйÃÜÕßÁгöµÄÄÚÈÝÔ̺¬Õæ¼ÙÄѱæµÄÎļþ£¬µ«¹Ø¼üÎļþÈç¡¶¾«Á鱦¿ÉÃκÚ2/°×2¡·µÄ¿ª·¢°æ±¾¡¢¡¶¾«Á鱦¿ÉÃÎÒøÐÓ×·µÄÔ´´úÂëµÈÒѱ»È·ÈÏ¡£Õâ´Îй¶»¹½ÒʾÁËGame Freak¶à¸öÏîÖ÷ÕÅ´úºÅ£¬Ô̺¬ÓëILCA¹²Í¬¿ª·¢µÄδ°ä²¼¶àÈËÓÎÏ·¡°Synapse¡±µÈ¡£Ä¿Ç°£¬ºÚ¿Í¼°Æä¶¯»úÉв»Ã÷ÏÔ£¬µ«Õâ´ÎйÃÜ¿ÉÄÜÊÇÓÎÏ·Ê·ÉÏ×î´óµÄйÃÜÊÂÎñÖ®Ò»£¬Game FreakÔ¤¼Æ½«Ãæ¶Ô½øÒ»²½µÄºó¹û£¬¶øÈ«ÃæÓ°ÏìÉдýÆëÈ«Ïàʶ¡£
https://hackread.com/teraleak-pokemon-developer-game-freak-hacked-data-leak/
4. ÒÁÀʺڿÍ×éÖ¯OilRig¼Ó´ó¶ÔÖж«¹¥»÷£¬ÀûÓÃкóÃÅÇÔȡʹ´¦
10ÔÂ13ÈÕ£¬ÒÁÀʵ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯APT34£¨OilRig£©½üÆÚÕë¶Ô°¢À²®½áºÏÇõ³¤¹úºÍº£Í嵨ÓòÈ·µ±¾ÖºÍ¹Ø¼ü»ù´¡ÉèʩʵÌåÌáÒéÁËÐµĹ¥»÷»î¶¯¡£ÔÚÕâЩ¹¥»÷ÖУ¬OilRig²¿ÊðÁËÒ»¸öÐÂÐͺóÃÅ£¬ÀûÓÃMicrosoft Exchange·þÎñÆ÷ÇÔȡʹ´¦£¬²¢½èÖúWindows CVE-2024-30088·ì϶ÌáÉýȨÏÞ¡£¸Ã·ì϶ËäÒѱ»Î¢Èí½¨¸´£¬µ«ÉÐδ±»ÏóÕ÷ΪÔÚ±»»ý¼«ÀûÓ᣹¥»÷Õßͨ¹ýÉÏ´«Web shellÖ´ÐÐÔ¶³Ì´úÂëºÍPowerShellºÅÁ½ø¶øÀûÓÃCVE-2024-30088·ì϶£¬×¢²áÃÜÂë¹ýÂËÆ÷DLLÀ¹½ØÍ´´¦£¬²¢ÏÂÔØÔ¶³Ì¼à¿ØºÍÖÎÀí¹¤¾ß¡°ngrok¡±¡£´Ë±í£¬OilRig»¹ÀûÓÃÃûΪ¡°StealHook¡±µÄкóÃÅÇÔȡʹ´¦£¬²¢Í¨¹ýµ±¾ÖExchange·þÎñÆ÷·¢Ëͺ¬Óб»µÁÃÜÂëµÄµç×ÓÓʼþ£¬Ê¹ÕâÒ»¹ý³Ì¿´ËƺϷ¨¡£Ç÷Ïò¿Æ¼¼Ö¸³ö£¬StealHookÓëOilRig´ÓǰµÄºóÃÅÔÚ´úÂëÉÏÓÐÀàËÆÖ®´¦£¬ÏÔʾÆäÊÇÒ»´Î½ø»¯¶ø·Çȫд´×÷¡£Í¬Ê±£¬OilRigÓëÁíÒ»¸öÒÁÀÊAPT×éÖ¯FOX Kitten´æÔÚÁªÏµ£¬¿ÉÄܽ«ÀÕË÷Èí¼þÔö³¤µ½Æä¹¥»÷±øÆ÷¿âÖС£ÓÉÓÚÖ¸±êʵÌå¶àÊôÄÜÔ´ÁìÓò£¬ÔËÓªÖжϿÉÄܶԺܶàÈ˲úÉúÑϳÁÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/oilrig-hackers-now-exploit-windows-flaw-to-elevate-privileges/
5. Telekopyeڿƹ¤¾ß°üж¯Ïò£º½ø¾üסËÞԤԼƽ̨
10ÔÂ10ÈÕ£¬ESET Research×îзÖÏíÁ˹ØÓÚTelekopyeڿƹ¤¾ß°üµÄ·¢ÏÖ¡£TelekopyeÊÇÒ»¸ö»ùÓÚTelegramµÄڿƹ¤¾ß°ü£¬×Ô2016ÄêÒÔÀ´±»ÍøÂç·¸×ï·Ö×ÓÓÃÓÚÔÚÏßÊг¡Ú¿Æ£¬ÏÖÒѽ«Ö¸±êÀ©´óµ½ÈȵãסËÞԤԼƽ̨ÈçBooking.comºÍAirbnb¡£Ú¿ÆÕßͨ¹ýµÁÈ¡ºÏ·¨¾ÆµêºÍסËÞÌṩÉ̵ÄÕË»§ÐÅÏ¢£¬ÏòÊܺ¦Õß·¢ËÍ¿´ËƺϷ¨µÄÔ¤Ô¼ÎÊÌâÐÂÎÅ£¬Êèµ¼Æäµã»÷´¹µöÁ´½Ó²¢ÊäÈëÖ§¸¶¿¨ÐÅÏ¢¡£ÕâÖÖеÄÚ¿Æ·½Ê½ÀûÓÃÁËÊܺ¦Õß¶ÔԤԼƽ̨µÄÐÅÀµ£¬Ê¹µÃȦÌ׸üÄѱ»·¢ÏÖ¡£´Ë±í£¬TelekopyeÚ¿ÆÍŻﻹ¸Ä½øÁ˹¤¾ßºÍÔËÓª·½Ê½£¬Èç×Ô¶¯ÌìÉú´¹µöÒ³Ãæ¡¢Ñ¡È¡¼´Ê±·ÒëÖ°ÄܵĽ»»¥Ê½Ì¸Ìì»úеÈËÒÔ¼°Ö´Ðз´DDoS´ëÊ©µÈ£¬ÒÔÔö³¤²ÆÕþ»Ø±¨¡£Æ¾¾ÝESETÒ£²âÊý¾Ý£¬´ËÀàÚ¿ÆÔÚ2024ÄêÊî¼ÙÆÚ¼äÓÈΪ·è¿ñ¡£ESET»¹ÌṩÁË·À±¸´ËÀàڿƵĽ¨Ò飬Ô̺¬ÔÚÆ½Ì¨ÉÏÉóÉ÷¹µÍ¨¡¢ºËʵ¶Ô·½ÐÅÏ¢ÒÔ¼°×Ðϸ²é³ÍøÕ¾URLµÈ¡£Í¬Ê±£¬¾¯·½Ò²ÒѲÉÈ¡Ðж¯½ø¹¥ÀûÓÃTelekopyeµÄ·¸×ï»î¶¯¡£
https://www.welivesecurity.com/en/eset-research/telekopye-hits-new-hunting-ground-hotel-booking-scams/
6. PureLogs¶ñÒâÈí¼þ£ºÁ®¼Û¸ßЧµÄÐÅÏ¢ÇÔÈ¡¹¤¾ßÔÚÍøÂçÖзºÀÄ
10ÔÂ12ÈÕ£¬PureLogsÊÇÒ»ÖÖÐÂÐ˵ĶñÒâÈí¼þ£¬ÒÔÆä±ãÒ˵ļÛÖµºÍ׳´óµÄÖ°ÄÜÔÚ¹¥»÷ÕßÖб¸ÊÜÇàíù¡£Õâ¿îÓÃC#¹¹½¨µÄ64λÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¿ÉÄÜͨ¹ýChrome¡¢Edge¡¢OperaµÈä¯ÀÀÆ÷»ñÈ¡¸öÈËÐÅÏ¢£¬ÓëÉÙÊýÆäËû¶ñÒâÈí¼þÈçLumma¡¢VidarºÍMeduzaÓµÓÐÀàËÆµÄÄÜÁ¦¡£PureLogs×î³õÔÚµØÏÂÊг¡ÉÏÏúÊÛ£¬²¢ÔÚ¶à¸öµØÏÂÂÛ̳ÉϽøÐÐÍÆ¹ã£¬Ä¿Ç°Í¨¹ýTelegram»úеÈËÌṩ֧³ÖºÍÏúÊÛ²éÎÊ£¬¼ÛÖµÏà¶Ô±ãÒË£¬³ÉΪÊг¡ÉÏ×î±ãÒ˵ÄÐÅÏ¢ÇÔÈ¡·¨Ê½Ö®Ò»¡£¾ÝFlashpoint Intel Team»ã±¨£¬PureLogs·ÖÈý¸ö½×¶ÎÔËÐУ¬Ô̺¬¼ÓÔØºÍÖ´Ðн׶Ρ¢·´É³Ïä²âÊÔºÍÍøÂçÅäÖý׶ÎÒÔ¼°Ö´ÐÐÐÅÏ¢ÇÔÈ¡·¨Ê½´úÂë½×¶Î¡£Ëü¿ÉÄÜ»ñÈ¡ä¯ÀÀÊý¾Ý¡¢ä¯ÀÀÆ÷À©´ó¡¢¼ÓÃÜÇ®±ÒÇ®°üÀûÓ÷¨Ê½¡¢×ÀÃæÀûÓ÷¨Ê½ÒÔ¼°Êܺ¦ÕßÍÆËã»úÐÅÏ¢µÈ£¬²¢½«ÓйØÊý¾Ý´«Êäµ½Telegram¡£PureLogsµÄTelegramÃæ°åÄܹ»ÏÔʾÊܺ¦ÕߵľßÌåÐÅÏ¢¡¢±»ÇÔÊý¾ÝµÄÊýÁ¿¡¢²¶»ñµÄÆÁÄ»½ØÍ¼ÒÔ¼°ÈÕÖ¾ÎļþµÈ¡£
https://cybersecuritynews.com/purelogs-chrome-browser/


¾©¹«Íø°²±¸11010802024551ºÅ