CRON#TRAPÍøÂç´¹µö»î¶¯£ºÀûÓÃLinuxÐé¹¹»úϰȾWindows

°ä²¼¹¦·ò 2024-11-06

1. CRON#TRAPÍøÂç´¹µö»î¶¯£ºÀûÓÃLinuxÐé¹¹»úϰȾWindows


11ÔÂ4ÈÕ£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂç´¹µö»î¶¯ÀûÓÃLinuxÐé¹¹»úϰȾWindowsϵͳ£¬Í¨¹ýÄÚÖúóÃŰÂÃØ½Ó¼ûÆóÒµÍøÂç¡£¸Ã»î¶¯Í¨¹ý¼Ù×°³É¡°OneAmerica µ÷²é¡±µÄÍøÂç´¹µöµç×ÓÓʼþ£¬·¢ËÍÒ»¸öÔ̺¬285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½Ê½ºÍQEMUÐé¹¹»úÀûÓ÷¨Ê½¡£Æô¶¯¿ì½Ý·½Ê½ºó£¬»áÖ´ÐÐPowerShellºÅÁ½«ÏÂÔØµÄ´æµµÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬²¢ÔÚÉ豸ÉÏÉèÖÃºÍÆô¶¯×Ô½ç˵QEMU LinuxÐé¹¹»ú¡£¸ÃÐé¹¹»úÃûΪ¡°PivotBox¡±£¬Ô¤×°Á˺óÃÅ£¬¿ÉÈ·Î¬ÓÆ¾ÃµÄC2ͨѶ£¬Ê¹¹¥»÷ÕßÔÚºó¶Ü½øÐвÙ×÷¡£ÓÉÓÚQEMUÊǺϷ¨¹¤¾ß£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬°²È«¹¤¾ßÒ²ÎÞ·¨²é³­Ðé¹¹»úÄÚ²¿µÄ¶ñÒⷨʽ¡£ºóÃŵÄÖ÷ÌâÊÇÃûΪChiselµÄÍøÂçËí··¨Ê½£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬Ê¹¹¥»÷Õß¼´±ãÔÚÍøÂçÊÜ·À»ðǽ± £»¤Ê±Ò²ÄÜÓëºóÃÅͨѶ¡£ÎªÁËÔ¤·ÀQEMUÀÄÓ㬽¨Òé¼à¶½´ÓÓû§¿É½Ó¼ûÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈ¹ý³Ì£¬½«QEMUºÍÆäËûÐé¹¹»¯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹¹Ø¼üÉ豸ÉϵÄÐé¹¹»¯¡£


https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/


2. ºÚ¿ÍÀÄÓÃDocuSign API´´½¨Ðéα·¢Æ±¼ÙÒâ³ÛÃûÆ·ÅÆ½øÐÐڲƭ


11ÔÂ4ÈÕ£¬DocuSign ÊÇÒ»¸öµç×ÓÊðÃûƽ̨£¬Ö§³ÖÒÔÊý×Ö·½Ê½Ç©Êð¡¢·¢ËͺÍÖÎÀíÎĵµ¡£Envelopes APIÖ¼ÔÚÔ®ÊÖ¿Í»§×Ô¶¯·¢ËͱØÒªÊðÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÊðÃûºó¼ìË÷ËüÃÇ¡£ÍþвÐÐΪÕßÔÚÀûÓÃDocuSignµÄEnvelopes API´´½¨²¢·Ö·¢¿´ËÆÕæÊµµÄÐéα·¢Æ±£¬¼ÙÒâ³ÛÃûÆ·ÅÆÈçNortonºÍPayPal¡£ËûÃÇʹÓúϷ¨µÄ¸¶·ÑDocuSignÕË»§£¬Í¨¹ý¸ÃAPI·¢ËÍ·ÂÕÕ³ÛÃûÈí¼þ¹«Ë¾±í¹ÛºÍ¸Ð´¥µÄڲƭÐÔ·¢Æ±£¬²¢ÓÕµ¼Ö¸±ê¿Í»§¶ÔÎļþ½øÐеç×ÓÊðÃûÒÔÊÚȨ¸¶¿î¡£ÕâЩ·¢Æ±µÄÓöȽÚÔìÔÚÏÖʵÁìÓòÄÚ£¬ÒÔÔö³¤ÆäºÏ·¨ÐÔ¡£¾ÝWallarm°²È«×êÑÐÈËÔ±³Æ£¬ÕâÖÖÀÄÓÃÐÐΪÒѾ­³ÖÐøÁËÒ»¶Î¹¦·ò£¬²¢ÒÑÏòDocuSign»ã±¨¡£¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳ÉÏÂŴξٱ¨´ËÀàÐÐΪ£¬µ«ËƺõÄÑÒԵõ½ÓÐЧ½â¾ö¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬´ó¹æÄ£²úÉú£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓôëÊ©¼°ÊÇ·ñ´òËã¼ÓÇ¿ÕâЩ´ëÊ©µÄÎÊÌâ×÷³öÆÀÂÛ¡£ºÚ¿Í´ÓÇ°Ò²ÔøÀÄÓÃAPI½øÐÐÆäËû¶ñÒâ»î¶¯£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØÖ·Á´½Óµ½ÕÊ»§µÈ¡£


https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/


3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaϰȾ³¬1500̨É豸


11ÔÂ5ÈÕ£¬Cleafy ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬ÒÑϰȾ³¬¹ý 1,500 ̨É豸£¬ÖØÒªÖ¸±êΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ­¶¡ÃÀÖÞµÄ16¼ÒÒøÐС£¸Ã¶ñÒâÈí¼þÓë¶«ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÀàËÆÖ®´¦£¬µ«´úÂë²î¾àÏÔÖø¡£ToxicPanda ÀûÓÃÉ豸ڲƭ¼¼ÊõÈÆ¹ýÒøÐа²È«´ëÊ©£¬½øÐÐڲƭÐÔ×ʽð×ªÒÆ¡£Ö»¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬´úÂë²»ÆëÈ«£¬µ«ËüÒÑÏÔʾ³ö׳´óµÄڲƭÄÜÁ¦¡£ToxicPanda ѡȡÊÖ¶¯·½Ê½£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈÆ¹ýÒøÐеÄÐÐΪ¼ì²â·ÀÓù¡£Ëü»¹Äܹ»½Ó¼ûÊÖ»úÏà²á£¬ÍøÂçÃô¸ÐÐÅÏ¢£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÏÎ½ÓÆäºÅÁîºÍ½ÚÔì·þÎñÆ÷¡£Òâ´óÀûÊÇÆäÖØÒªÖ¸±ê£¬Ï°È¾Âʸߴï 56.8%£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃØÂ³µÈµØÒ²ÓÐϰȾ¡£»ã±¨Ö¸³ö£¬ÏÖ´ú·À²¡¶¾½â¾ö¹æ»®ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ôµ¥Ò»µÄÍþв£¬²»×ã×Ô¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖØÒªÎÊÌâ¡£


https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html


4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ð­Í¬¶þºÅÐж¯¡±³ÁÈ­½ø¹¥ÍøÂç·¸×ï


11ÔÂ5ÈÕ£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂÆÚ¼ä£¬´úºÅΪ¡°Ð­Í¬¶þºÅÐж¯¡±µÄ¹ú¼Ê·¨ÂÉÐж¯ÖУ¬³É¹¦¿ÛÁôÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂç´¹µöºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸×ïÓйصÄÏÓÒÉÈË£¬²¢·ÛËéÁË 22,000 ¸ö IP µØÖ·ÉÏÔËÐеÄ1,037̨·þÎñÆ÷ºÍ»ù´¡ÉèÊ©¡£Õâ´ÎÐж¯Éæ¼°95¸ö¹ú¶È£¬µÃµ½Á˶à¼ÒË½ÓªÍøÂ簲ȫ¹«Ë¾µÄµý±¨Ö§³Ö¡£Ðж¯ÖУ¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬59̨·þÎñÆ÷±»²é·â£¬43̨µç×ÓÉ豸±»³ä¹«ÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý¡£´Ë±í£¬µ±¾Ö»¹ÔÚµ÷²éÁí±í65ÃûÉæÏӲμӷ¸·¨»î¶¯µÄÈË¡£Ðж¯ÁÁµãÔ̺¬Ïã¸ÛºÍ°ÄÞ¯·½¹Ø¹ØÁË´óÁ¿¶ñÒâ·þÎñÆ÷£¬ÃɹŽøÐÐÁËÂŴη¿ÎÝËѲ鲢²é»ñÁËһ̨·þÎñÆ÷£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâ·þÎñÆ÷ÓÐÁªÏµµÄÓ×ÎÒ²¢²é»ñÁ˵ç×ÓÉ豸£¬°®É³ÄáÑÇÔò²é»ñÁ˳¬¹ý80GBµÄ·þÎñÆ÷Êý¾Ý¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸×ï¾Ö¾Ö³¤°µÊ¾£¬ÍøÂç·¸×ïµÄÈ«ÇòÐÔÒªÇóÈ«ÇòÓ¦¶Ô£¬Õâ´ÎÐж¯²»½ö·ÛËéÁ˶ñÒâ»ù´¡ÉèÊ©£¬»¹Ô¤·ÀÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙÎªÍøÂç·¸×ïµÄ¾ÍÒ寷¡£


https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/


5. ÎÚ¿ËÀ¼Ôð¹Ö¹È¸èй¶¾üÊ»ùÖ°µØÎ»£¬Òý·¢°²È«ÓÇÓô


11ÔÂ6ÈÕ£¬ÎÚ¿ËÀ¼Ôð¹Ö¹È¸èÔÚÆäÔÚÏßµØÍ¼·þÎñµÄ×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄµØÎ»£¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°»ý¼«´«²¼¡±¡£ÎÚ¿ËÀ¼¹ú¶È°²È«Óë¹ú·ÀίԱ»á·´ÐéαÐÅÏ¢²¿ÃÅÕÆ¹ÜÈ˰µÊ¾£¬¹È¸èÉÐ佨¸´µØÍ¼£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½º¯¼þ²¢³Ðŵ¸üС£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêǰÅÄÉãµÄ£¬À´×Ô¹«¿ªÆðÔ´£¬²¢°µÊ¾Æ÷³Á´ËÀàÒªÇó²¢ÓëÎÚ¿ËÀ¼¹ÙԱά³Ö¹µÍ¨¡£ÎÚ¿ËÀ¼²»°²¾üÊÂÐÅÏ¢µÄ¹«¿ª¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂÉ豸µÄµØÎ»£¬²»½ö¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯À¹½ØÆ÷µÄ¹ú¶È¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÍøÂçµý±¨£¬µ«¶íÂÞ˹ÒòÔì²Ã»ò·µÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓóÒ×¹«Ë¾²É°ì¡£¹È¸èÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄºÜ¶à·þÎñ£¬µ«µØÍ¼µÈ²¿ÃÅ·þÎñÈÔ¿ÉʹÓ㬵«Ö°ÄÜÓÐÏÞ¡£


https://therecord.media/ukraine-google-locations-revealing-military


6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶


11ÔÂ5ÈÕ£¬¼ÓÄô󵱾ֿÛÁôÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨±ðÃû"Waifu"ºÍ"Judische"£©¡£¾ÝÅí²©ÉçºÍ404 Media±¨Â·£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯Ϊָ±ê£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬ÕâЩ×é֯ȫÊýÊÇSnowflakeµÄ¿Í»§¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄ½áºÏµ÷²é·¢ÏÖ£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÅäÖöà³É·ÖÉí·ÝÑéÖ¤£¨MFA£©± £»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬ÓëÖ®ÓйصÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼Ò·þÎñµÄÊýÒÚÓ×ÎÒ¡£ÆäÖУ¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Í¼±»µÁ¡£Snowflake¶ûºó°ä·¢½«¶ÔÐÂÕË»§Ç¿ÔìÖ´ÐÐMFA£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û¡£


https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/