FBI¾¯Ê¾ÐéαÎĵµ×ª»»¹¤¾ßÇÔÊØÐÅÏ¢²¢´«²¼ÀÕË÷Èí¼þ

°ä²¼¹¦·ò 2025-03-24

1. FBI¾¯Ê¾ÐéαÎĵµ×ª»»¹¤¾ßÇÔÊØÐÅÏ¢²¢´«²¼ÀÕË÷Èí¼þ


3ÔÂ23ÈÕ£¬Áª¹úµ÷²é¾Ö£¨FBI£©µ¤·ð·Ö¾Ö½üÈÕ°ä²¼ÍøÂ簲ȫԤ¾¯£¬Ö¸³öÍøÂç·¸×ï×éÖ¯ÕýÀûÓÃαÔìµÄÔÚÏßÎĵµ×ª»»¹¤¾ßÖ´Ðдó¹æÄ£ÐÅÏ¢ÇÔÈ¡ÓëÀÕË÷¹¥»÷¡£¾Ý°²È«»ã±¨ÏÔʾ£¬¹¥»÷Õßͨ¹ý´´½¨ÐéαÎļþת»»¡¢¹é²¢»òÏÂÔØ¹¤¾ßÍøÕ¾£¬ÓÕµ¼Óû§ÉÏ´«Ô̺¬Ãô¸ÐÐÅÏ¢µÄÎĵµ£¬½ø¶øÔÚÉ豸ÖÐÖ²Èë¶ñÒâÈí¼þ¡£FBIÖ¸³ö£¬ÕâЩ´¹µöÍøÕ¾Í¨³£¼Ù×°³ÉÌṩ".docת.pdf""¶àͼ¹é²¢.pdf"µÈʵÓÃÖ°ÄܵÄÃâ·Ñ·þÎñ£¬ÆäÓòÃûÓëºÏ·¨ÍøÕ¾¸ß¶ÈÀàËÆ£¨Èç´Û¸Ä×Öĸ»òºó׺£©¡£µ±Óû§ÉÏ´«Îļþºó£¬¹¥»÷Õß²»½öÇÔÈ¡ÐÕÃû¡¢Éç±£ºÅ¡¢¼ÓÃÜÇ®±ÒÃÜÔ¿¡¢ÒøÐÐÕË»§µÈÃô¸ÐÊý¾Ý£¬¸üͨ¹ý°ó¸¿µÄ¶ñÒâÈí¼þ£¨ÈçGootloader£©ÊµÏÖÔ¶³ÌÉ豸½ÚÔ죬×îÖÕ²¿ÊðREvil¡¢BlackSuitµÈÀÕË÷Èí¼þ¡£ÍøÂ簲ȫ×êÑÐÔ±ÒÑÈ·È϶àÆðÏÖʵ¹¥»÷°¸Àý¡£°²È«×¨¼Ò½¨Ò飬Óû§Ó¦Ñ¡Ôñ³ÛÃûÎļþת»»·þÎñ£¬Ô¤·ÀʹÓÃÎÞÆÀ¼Û¼Í¼µÄÓ׶๤¾ß£»ÏÂÔØÇ°Îñ±ØºË²éÎļþ¹þÏ£Öµ£¬¶Ô¿ÉÖ´ÐÐÎļþ£¨.exe£©ºÍ¾ç±¾Îļþ£¨.js£©½øÐÐɳÏä·ÖÎö£»ÆóÒµÓû§Ð貿ÊðÓʼþ¹ýÂËÓëÄÚÈݼì²â»úÔ죬×è¶Ï¿ÉÒÉÎļþ´«Êä¡£


https://www.bleepingcomputer.com/news/security/fbi-warnings-are-true-fake-file-converters-do-push-malware/


2. ΢Èí¿ÉÐÅÊðÃûÔâÀÄÓãº¶ÌÆÚÖ¤ÊéÖú¶ñÒâÈí¼þÈÆ¹ý°²È«¼ì²â


3ÔÂ22ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÆÚ¸æ·¢£¬ÍøÂç·¸×ï×éÖ¯ÕýÀûÓÃ΢ÈíÐÂÍÆ³öµÄ"¿ÉÐÅÊðÃû·þÎñ£¨Trusted Signing£©"Ç©·¢¶ÌÆÚÓÐЧ´úÂëÊðÃûÖ¤Ê飬Ϊ¶ñÒâÈí¼þÅûÉϺϷ¨±íÒ¡£¸Ã·þÎñÔÊÐí¿ª·¢ÕßÒÔÿÔÂ9.99ÃÀÔª¶©ÔÄ»ñÈ¡ÓÉ΢ÈíÖÎÀíµÄÈÏÖ¤»ú¹¹Ç©·¢µÄ¶ÌÆÚÖ¤Ê飬ÆäÉè¼Æ³õÖÔÊÇͨ¹ý×Ô¶¯»¯Ö¤ÊéÂÖ»»»úÔìÌáÉýÈí¼þ·Ö·¢°²È«ÐÔ¡£È»¶ø£¬ÍþвÐÐΪÕß·¢Ïָ÷þÎñ´æÔڿɱ»ÀûÓõķì϶£ºÖ»¹Ü΢ÈíÒªÇó×¢²áʵÌåÐèΪ³ÉÁ¢ÂúÈýÄêµÄÆóÒµ£¬µ«ÔÊÐíÓ×ÎÒÒÔ×ÔÉíÃûÒå×¢²á£¬ÕâΪ·¸·¨·Ö×ÓÌṩÁ˸ü±ã½ÝµÄ¼Ù×°õè¾¶¡£·ÖÎöÏÔʾ£¬¹¥»÷Õ߯«ºÃʹÓÃÓÐЧÆÚ½öÈýÌìµÄ¶ÌÆÚÖ¤Ê飬ÕâÀàÖ¤Êé¼´±ã±»ÓÃÓÚ¶ñÒâ»î¶¯£¬Î¢ÈíÒ²ÄÜͨ¹ýÍþвµý±¨¼à¿Ø¼±¾ç³·Ïú£¬ÀíÂÛÉÏ¿É×îÓ×»¯ÀÄÓÃÓ°Ïì¡£µ«ÏÖʵÇé¿öÖУ¬ÒÑ·¢ÏÖ¶àÆðÔÚÖ¤ÊéʧЧǰÀûÓÃÓÐЧÊðÃû´«²¼µÄ¶ñÒâÈí¼þ°¸Àý¡£°²È«×¨¼ÒÖ¸³ö£¬ÍþвÐÐΪÕßתÏò΢Èí·þÎñ£¬ÖØÒªÒòÆäÑéÖ¤Á÷³Ì½Ï´«Í³À©´óÑéÖ¤£¨EV£©Ö¤Êé¸üΪÇá±ã¡£Î¢Èí·½Ãæ°µÊ¾£¬ÒѲ¿Êð×Ô¶¯¼à¿Ø»úÔ죬½áºÏÍþвµý±¨ÊµÊ±×·×ÙÖ¤ÊéʹÓÃÇé¿ö£¬Ò»µ©·¢ÏÖ¶ñÒâÀûÓõ±¼´Ö´Ðдó¹æÄ£Ö¤Êé³·Ïú£¬Í¬Ê±Ç¿µ÷Æä·´¶ñÒâÈí¼þ²úÆ·ÒÑÄܼì²âÓйØÑù±¾¡£


https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/


3. ºÚ¿ÍÐû³Æ»ñÈ¡600Íò±Ê¼Í¼£¬µ«Oracle·ñ¶¨´æÔÚÎ¥¹æÐÐΪ


3ÔÂ22ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾CloudSEKͨ¹ýÆäXVigilƽ̨¼à²âµ½Õë¶ÔOracle Cloud»ù´¡ÉèÊ©µÄ´ó¹æÄ£ÍøÂç¹¥»÷ÊÂÎñ£¬µ¼ÖÂÔ¼600ÍòÌõÃô¸Ð¼Í¼й¶£¬²¨¼°³¬14ÍòÃû×â»§¡£¹¥»÷Õß"rose87168"×Ô2025ËêÊׯðÍ·»î¶¯£¬ÀûÓÃOracle Fusion Middleware 11GµÄ×ÓÓòÃû·ì϶ִÐÐÈëÇÖ£¬ÇÔÈ¡Ô̺¬JKSÃÜÔ¿¿â¡¢¼ÓÃܵ¥µãµÇ¼(SSO)ƾ֤¼°ÆóÒµÖÎÀíÆ÷ÃÜÔ¿µÄÃô¸ÐÊý¾Ý£¬²¢ÔÚ°µÍøÂÛ̳¶µÏú¡£¸Ã×éÖ¯ÉõÖÁÒªÇóÊܺ¦ÕßÖ§¸¶Êê½ðɾ³ýÊý¾Ý£¬²¢ÎªÆÆ½âÃÜÂëÕßÌṩ¼Î½±¡£¼¼Êõ·ÖÎöÏÔʾ£¬¹¥»÷¿ÉÄÜÀûÓÃ2021ÄêÅû¶µÄCVE-2021-35587·ì϶£¬¸Ã·ì϶ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³ÌÊÕÊÜOracle Access Manager£¬½ø¶øÖ´ÐкáÏòÉøÈë¡£ÖµÍ×ÌùÐĵÄÊÇ£¬±»ÈëÇÖ·þÎñÆ÷Èí¼þ°æ±¾×Ô2014ÄêÆðδ¸üУ¬³Ö¾Ã´¦ÓÚʧ½¨×´Ì¬¡£Oracle¹Ù·½·ñ¶¨ÔÆ»ù´¡ÉèÊ©ÔâÈëÇÖ£¬Ðû³ÆÐ¹Â¶Æ¾Ö¤²»ºÏÓÃÓÚÆäÔÆÆ½Ì¨¡£µ«CloudSEKÖ¸³ö£¬¹¥»÷Õß»ñÈ¡µÄJKSÎļþÔ̺¬½âÃÜÃô¸ÐÊý¾ÝµÄÃÜÔ¿×ÊÁÏ£¬Ð¹Â¶µÄ¼ÓÃÜSSO/LDAPƾ֤¸ü¿ÉÄÜÒý·¢Á¬Ëø¹¥»÷£¬ÁãÈÕ·ì϶ÀûÓÃҲ¶³öÁËOracle CloudµÄ°²È«Òþ»¼¡£°²È«×¨¼Ò½¨ÒéÊÜÓ°Ïì×â»§µ±¼´Ö´ÐÐÆ¾Ö¤ÂÖ»»¡¢·¢Õ¹È«ÃæÈ¡Ö¤µ÷²é£¬²¢¼ÓÇ¿Íþвµý±¨¼à¿Ø¡£


https://hackread.com/oracle-denies-breach-hacker-access-6-million-records/


4. ŦԼ´óѧÕÐÉúϵͳÔâºÚ¿Í¹¥»÷£¬300ÍòÃô¸ÐÊý¾Ýй¶ÒýÖÖ×åÕùÒé


3ÔÂ22ÈÕ£¬ÃÀ¹úŦԼ´óѧÔâ·êÑϳÁÊý¾Ýй¶ÊÂÎñ£¬ºÚ¿Íͨ¹ýÈëÇÖÕÐÉúϵͳ»ñÈ¡³¬¹ý300Íò·ÝÉêÇëÕßÃô¸ÐÐÅÏ¢¡£¹¥»÷ÕßÓÚ22ÈÕÁè³¿ÉøÈë¹ÙÍø£¬³ÖÐø´Û¸ÄÒ³Ãæ´ïÁ½Ó×ʱ£¬¹«¿ªÅû¶Ô̺¬ÐÕÃû¡¢¿¼ÊԳɾ͡¢¼ÒÍ¥²¼¾°¼°¾­¼ÃÔöÔ®¼Í¼µÄCSVÎļþ£¬²¿ÃÅÊý¾Ý¿É×·ÒäÖÁ1989Äê¡£´Û¸ÄÒ³ÃæÕ¹Ê¾ÕÐÉúµÇ¿ÆÍ³¼ÆÍ¼±í£¬Ðû³ÆÔÚ×î¸ß·¨ÔºÈ¡µÞƽȨÐж¯ºó£¬ÑÇÒáºÍ°×ÈËÉêÇëÕߵǿƳ߶ÈÈÔ¸ßÓÚÉÙÊý×åÒᣬÒâͼ¼¤»¯ÖÖ×åÒéÌâ¡£´óѧITÍŶÓÔÚÖÐÎçǰ¸´Ô­ÏµÍ³½ÚÔ죬½²»°ÈËÔ¼º²¡¤±´¿ËÂü֤ʵÒÑÆô¶¯°²È«Éó²é²¢Óë·¨ÂÉ»ú¹¹ºÏ×÷¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Ö´Ðй¥»÷µÄºÚ¿Í×éÖ¯"Computer Niggy Exploitation"´ËÇ°ÔøÈëÇÖÃ÷ÄáËÕ´ï´óѧ£¬Ð¹Â¶700Íò·Ýº¬Éç»á°²È«ºÅÂëµÄÕÐÉúÊý¾Ý£¬Òý·¢¼¯ÌåËßËÏ¡£ÀàËÆÊÂÎñ½üÄêÆµ·¢£¬Ë¹Ì¹¸£´óѧ£¨2019£©¡¢ÇÇÖγǴóѧ£¨2024£©¾ùÔâ·ê¹ýÉæ¼°Ñ§ÉúÒþÖԵĴó¹æÄ£Ð¹Â¶¡£×¨¼ÒÖ¸³ö£¬½ÌÓýÊý¾Ý°²È«·ì϶ÓëÖÖ×åÒéÌâ½»´í£¬Í¹ÏÔ¸ßУÔÚÊý¾ÝÖÎÀíºÍÉç»áÔðÈη½ÃæµÄË«³ÁÌôÕ½¡£


https://nyunews.com/news/2025/03/22/nyu-website-hacked-data-leak/


5. SEOרҵÈËÊ¿ÔâSemrush´¹µö¹¥»÷£¬GoogleÕË»§Êý¾Ý±»ÇÔÈ¡


3ÔÂ21ÈÕ£¬Ò»ÏîеÄÍøÂç´¹µö»î¶¯Õë¶ÔSEOרҵÈËÊ¿£¬Ê¹ÓöñÒâSemrush Google¸æ°×Ö¼ÔÚÇÔÈ¡ËûÃÇµÄ Google ÕÊ»§Í´´¦¡£¾ÝMalwarebytes³¢ÊÔÊÒ·ÖÎö£¬ÍøÂç·¸×ï×éÖ¯Õýͨ¹ý¼ÙðSemrushƽ̨µÄGoogle¸æ°×Ö´Ðо«×¼´¹µö¹¥»÷£¬Ö¸±êÖ±Ö¸Óû§GoogleÕË»§Í´´¦¡£¸ÃÊÖ·¨ÊôÓÚ"Á¬ËøÚ²Æ­"ģʽ£¬¹¥»÷ÕßÏÈÉøÈëGoogle AdsÕË»§´´½¨¶ñÒâ¸æ°×£¬ÔÙÓÕµ¼Óû§½øÈë·ÂðµÇÂ¼Ò³Ãæ¡£×÷Ϊ·þÎñ40%ÊÀ½ç500Ç¿ÆóÒµµÄSEO·ÖÎö¹¤¾ß£¬SemrushÓëGoogle AnalyticsµÈÖ÷Ìâ·þÎñÉî¶È¼¯³É£¬Ê¹Æä³ÉΪ¸ß¼ÛÖµ¹¥»÷Ö¸±ê¡£¹¥»÷Õß×¢²áÁËsemrush[.]clickµÈ¶à¸ö·ÂðÓòÃû£¬¹¹½¨Óë¹Ù·½¸ß¶ÈÀàËÆµÄ´¹µöÒ³Ãæ£¬Ç¿ÔìÓû§Í¨¹ý"GoogleµÇ¼"Ìύƾ֤¡£ÓÉÓÚSemrushÕË»§³£¹ØÁªÆóÒµ¼¶Google·þÎñ£¬¹¥»÷Õ߿ɼä½Ó»ñÈ¡ÊÕÈëÊý¾Ý¡¢ÓªÏúÕ½ÊõµÈÃô¸ÐÐÅÏ¢£¬¶øÎÞÐèÖ±½Ó¹¥ÆÆSemrushϵͳ¡£°²È«×¨¼ÒElie BerrebyÖ¸³ö£¬Ä»ºóºÚÊÖΪ°ÍÎ÷·¸×OÍÅ£¬ÆäÊÖ·¨Õ¹Ê¾³ö¶ÔSaaSÉú̬µÄÉî¿ÌÀí½â¡£·ÀÓù½¨ÒéÔ̺¬£ºÔ¤·Àµã»÷ÍÆ¹ãÁ´½Ó¡¢Ê¹ÓÃÊéǩֱ´ï¹Ù·½Ò³Ãæ¡¢µÇ¼ǰÑϸñУÑéÓòÃû£¬²¢ÆôÓÃÃÜÂëÖÎÀíÆ÷µÄ×Ô¶¯Ìî³äÖ°ÄÜ¡£


https://www.bleepingcomputer.com/news/security/fake-semrush-ads-used-to-steal-seo-professionals-google-accounts/


6. ÒÁÀÊ´¬Ö»ÔâºÚ¿Í¹¥»÷£¬116ËÒ´¬Í¨Ñ¶ÏµÍ³Ì±»¾


3ÔÂ21ÈÕ£¬½üÆÚ£¬ÒÁÀʺ½ÔËÒµÔâ·ê³Á´óÍøÂç¹¥»÷ÊÂÎñ£¬Ò»¸öÃûΪLabDookhteganµÄºÚ¿Í×éÖ¯Ðû³Æ¶Ôµ¼ÖÂ116ËÒÒÁÀÊ´¬Ö»Í¨Ñ¶ÏµÍ³Ì±»¾µÄ¹¥»÷ÕÆ¹Ü¡£¾ÝÂ×¶ØÍøÂ簲ȫר¼ÒÄÉÀïÂü¡¤¼ÓÀﲼ֤ʵ£¬Õâ´Î¹¥»÷Ö¸±êÖ±Ö¸ÒÁÀʹú¶ÈÓÍÂÖ¹«Ë¾£¨50ËÒ£©ºÍÒÁÀÊÒÁ˹À¼¹²ºÍ¹úº½Ô˹«Ë¾£¨66ËÒ£©ÔËÓªµÄ´¬²°£¬¹¥»÷Õßͨ¹ý¶Ï¸ùVSATÎÀÐÇͨѶϵͳµÄ´æ´¢É豸ִÐзÛËé¡£¸Ã×éÖ¯Ðû³Æ£¬ÕâÁ½¼Ò¹«Ë¾³Ö¾ÃΪҲÃźúÈûÅѾüÌṩº£Éϲ¹¸ø£¬¶øÅѾüƵÈÔÏ®»÷ÂüµÂº£Ï¿¹ýÍù´¬Ö»£¬ÑϳÁÍþвȫÇòÒµÎñ°²È«¡£ÖµÍ×ÌùÐĵÄÊÇ£¬LabDookhtegan´ËǰÒÔй¶ÒÁÀʵ±¾Ö»úÃÜÖø³Æ£¬×Ô2019ÄêÆØ¹âÒÁÀʼäµý×éÖ¯APT34µÄºÚ¿Í¹¤¾ßºó£¬³ÖÐø¹«¿ª´óÁ¿µ±¾ÖÄÚ²¿Îļþ£¬Õâ´Î¹¥»÷±ê־ȡÆäÕ½Êõ´ÓÐÅϢй¶תÏòÖ±½Ó·ÛËé¡£


https://news.risky.biz/risky-bulletin-hacktivists-claim-cyber-sabotage-of-116-iranian-ships/