Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¶È
°ä²¼¹¦·ò 2025-06-111. Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¶È
6ÔÂ10ÈÕ£¬Rare Werewolf£¨Ç°³Æ Rare Wolf£©ºÚ¿Í×éÖ¯£¬Ò²±»³ÆÎª Librarian Ghouls ºÍ Rezet£¬±»È϶¨Îª¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯£¬ÓëһϵÁÐÕë¶Ô¶íÂÞ˹ºÍ¶ÀÁ¢¹ú¶È½áºÏÌ壨CIS£©¹ú¶ÈµÄÍøÂç¹¥»÷Óйأ¬×Ô 2019 ÄêÒÔÀ´Ò»Ïò»îÔ¾¡£¸Ã×éÖ¯¹¥»÷ÒâͼÊÇÔÚÊÜϰȾÖ÷»úÉϳÉÁ¢Ô¶³Ì½Ó¼û¡¢ÇÔȡƾ֤²¢²¿Êð¼ÓÃÜÇ®±Ò¿ó¹¤£¬Ó°ÏìÊý°ÙÃû¶íÂÞ˹Óû§£¬Éæ¼°¹¤ÒµÆóÒµºÍ¹¤³ÌԺУ£¬°×¶íÂÞ˹ºÍ¹þÈø¿Ë˹̹ҲÓÐÉÙÁ¿Ï°È¾¡£Æä¹¥»÷ÏÔÖøÌØµãÊÇÆ«²îÓÚʹÓúϷ¨µÚÈý·½Èí¼þ£¬¶ñÒâÖ°ÄÜͨ¹ýºÅÁîÎļþºÍ PowerShell ¾ç±¾ÊµÏÖ¡£¸ÃÍþвÐÐΪÕßͨ¹ý´¹µöÓʼþ»ñÈ¡³õʼ½Ó¼ûȨÏÞ£¬ÀûÓð²ÉíµãÇÔÈ¡Êý¾Ý²¢Í¶·Å¶àÖÖ¹¤¾ß£¬ÓÃÓÚ½»»¥¡¢ÍøÂçÃÜÂëºÍ½ûÓ÷À²¡¶¾Èí¼þ¡£¿¨°Í˹»ù¼Í¼µÄ×îй¥»÷ÏÔʾ£¬ÒÔÔ̺¬¿ÉÖ´ÐÐÎļþµÄÊÜÃÜÂë±£»¤Ñ¹Ëõ°üΪÆðµã£¬Ñ¹Ëõ°üÖÐÓÐ×°Ö÷¨Ê½£¬ÓÃÓÚ²¿ÊðºÏ·¨¹¤¾ß¼°ÆäËûÔØºÉ£¬Ô̺¬µö¶ü PDF Îĵµ¡£ÖÐÑëÔØºÉ´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡ÆäËûÎļþ£¬»¹Ê¹Óà AnyDesk Ô¶³Ì×ÀÃæÈí¼þºÍ Windows Åú´¦ÖÃ¾ç±¾ÍÆ½øÊý¾ÝÇÔÈ¡ºÍ¿ó¹¤²¿Êð£¬Åú´¦Öþ籾ÄÜ×Ô¶¯»½ÐÑÊܺ¦Õßϵͳ²¢ÔÊÐí¹¥»÷ÕßÔ¶³Ì½Ó¼û¡£ÀûÓõÚÈý·½ºÏ·¨Èí¼þ½øÐжñÒâÖ÷ÕÅÊdz£¼û¼¼Êõ£¬Ôö³¤ÁË APT »î¶¯¼ì²âºÍ¹éÒòÄѶȡ£
https://thehackernews.com/2025/06/rare-werewolf-apt-uses-legitimate.html
2. DanaBot¶ñÒâÈí¼þ·ì϶¡°DanaBleed¡±Â¶³öÖÂÆä±»²é
6ÔÂ10ÈÕ£¬2022Äê6Ô¸üÐÂÖУ¬DanaBot¶ñÒâÈí¼þ²Ù×÷ÒýÈëµÄÃûΪ¡°DanaBleed¡±µÄ·ì϶£¬µ¼ÖÂÆäÔÚºóÐø·¨ÂÉÐж¯Öб»¼ø±ð¡¢¸æ×´²¢²ð³ý¡£DanaBotÊÇÒ»¸ö»îÔ¾ÓÚ2018ÄêÖÁ2025ÄêµÄ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨£¬³£ÓÃÓÚÒøÐÐڲơ¢Æ¾Ö¤ÍµÇÔ¡¢Ô¶³Ì½Ó¼ûºÍDDoS¹¥»÷¡£Zscaler ThreatLabz×êÑÐÈËÔ±·¢Ïָ÷ì϶£¬ÄÚ´æÐ¹Â©Ê¹ËûÃǵÃÒÔÉî¿ÌÏàʶ¶ñÒâÈí¼þÄÚ²¿²Ù×÷¼°Æä±³ºóÈËÔ±¡£ÀûÓô˷ì϶£¬¹ú¼Ê·¨Âɲ¿ÃÅ·¢Õ¹¡°ÖÕ¾ÖÐж¯¡±£¬Ê¹DanaBot»ù´¡ÉèÊ©ÏÂÏߣ¬²¢¸æ×´¸ÃÍþв×éÖ¯16Ãû³ÉÔ±¡£DanaBleed·ìÏ¶ËæDataBot°æ±¾2380ÒýÈ룬¸Ã°æ±¾ÐÂÔöC2ºÍ̸£¬µ«ÐºÍ̸Âß¼´æÔÚÈõµã£¬Î´ÎªËæ»úÌìÉúµÄÌî³ä×Ö½Ú³õʼ»¯Ð·ÖÅäÄڴ棬µ¼ÖÂC2ÏìÓ¦Ô̺¬·þÎñÆ÷ÄÚ´æÖÐÔü×ÒÊý¾ÝƬ¶Î£¬ÀàËÆ2014ÄêHeartBleedÎÊÌâ¡£´Ë·ì϶ʹ´óÁ¿¸öÈËÊý¾Ý¶³ö¸ø×êÑÐÈËÔ±£¬Ô̺¬ÍþвÐÐΪÕß¾ßÌåÐÅÏ¢¡¢ºó¶Ë»ù´¡ÉèÊ©¡¢Êܺ¦ÕßÊý¾Ý¡¢¶ñÒâÈí¼þ¸üÐÂÈÕÖ¾¡¢¸öÈ˼ÓÃÜÃÜÔ¿¡¢SQL²éÎʺ͵÷ÊÔÈÕÖ¾ÒÔ¼°C2ÒDZí°åµÄHTMLºÍWeb½çÃæÆ¬¶ÎµÈ¡£ÈýÄê¶àÀ´£¬DanaBotÒ»Ïò´¦ÓÚÊÜËðģʽ£¬¿ª·¢ÈËÔ±»ò¿Í»§Î´¾õ²ìÒѶ³ö¡£µ±ÍøÂçµ½×ã¹»Êý¾Ýºó£¬·¨Âɲ¿ÃŲÉÈ¡Ðж¯£¬ËäÖ÷ÌâÍŶӽö±»¸æ×´Î´±»¿ÛÁô£¬µ«¹Ø¼üC2·þÎñÆ÷¡¢650¸öÓòÃûºÍ½ü400ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»²é·â£¬ÁÙʱ½â³ýÁËÍþв¡£½«À´ÍþвÐÐΪÕß³Á·µÍøÂç·¸×ï»î¶¯µÄ¿ÉÄÜÐÔ²»´ó£¬ÇÒºÚ¿ÍÉçÇøÐÅÀµ¶È½µµÍ½«³ÉΪÆäÒ»´ó×è°¡£
https://www.bleepingcomputer.com/news/security/danabot-malware-operators-exposed-via-c2-bug-added-in-2022/
3. FIN6ºÚ¿Í×éÖ¯¼ÙÒâÇóÖ°Õß´«²¼¶ñÒâÈí¼þ¡°More Eggs¡±
6ÔÂ10ÈÕ£¬ÓëµäÐÍÕÐÆ¸ÓйØÉç»á¹¤³Ì¹¥»÷·ÖÆç£¬FIN6ºÚ¿Í×éÖ¯¼ÙÒâÇóÖ°Õߣ¬ÀûÓÃÉç»á¹¤³Ì¼¿Á©´«²¼¶ñÒâÈí¼þ¡£FIN6±ðÃû¡°÷¼÷ÃÖ©Ö롱£¬×î³õÒÔ½ðÈÚÚ²ÆÎÅÃû£¬ÈçÈëÇÖÏúÊÛµãϵͳÇÔÊØÐÅÓþ¿¨ÐÅÏ¢£¬2019ÄêÆð¹¥»÷ÁìÓòÀ©´óÖÁÀÕË÷Èí¼þ£¬²¢²ÎÓëRyukºÍLockergogaµÈÐж¯¡£½üÆÚ£¬¸Ã×éÖ¯ÀûÓÃÉç»á¹¤³Ì»î¶¯´«²¼¡°More Eggs¡±£¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ¼´·þÎñµÄJavaScriptºóÃÅ£¬ÓÃÓÚÆ¾Ö¤ÍµÇÔ¡¢ÏµÍ³½Ó¼ûºÍÀÕË÷Èí¼þ²¿Êð¡£¹¥»÷¹ý³ÌÖУ¬FIN6¼Ù×°³ÉÐéαÇóÖ°Õߣ¬Í¨¹ýLinkedInºÍIndeedÓëÕÐÆ¸ÈËÔ±ºÍÈËÁ¦×ÊÔ´²¿ÃÅÁªÏµ£¬³ÉÁ¢¹ØÏµºó·¢ËÍ´¹µöÓʼþ¡£Óʼþº¬Ö¸Ïò¡°¼òÀúÍøÕ¾¡±µÄ²»³Éµã»÷URL£¬ÆÈʹÊÕ¼þÈËÊÖ¶¯ÊäÈ룬ÕâЩÓòÃûͨ¹ýGoDaddyÄäÃû×¢²á²¢ÍйÜÔÚAWSÉÏ¡£FIN6»¹Ôö³¤»·¾³Ö¸ÎƺÍÐÐΪ²é³£¬È·±£Ö»ÓÐÖ¸±êÄÜ´ò¿ªµÇÂ½Ò³Ãæ£¬×èÖ¹VPN»òÔÆÏνӼ°Linux»òmacOS½Ó¼û³¢ÊÔ¡£ÇкÏǰÌáµÄÊܺ¦Õß»áÊÕµ½¼ÙµÄCAPTCHA²½Ö裬²¢±»ÌáÐÑÏÂÔØÔ̺¬¼Ù×°Windows¿ì½Ý·½Ê½Îļþ£¨LNK£©µÄZIPµµ°¸£¬¸ÃÎļþÖ´Ðо籾ÏÂÔØ¡°More Eggs¡±ºóÃÅ¡£¸ÃºóÃÅÓÉ¡°Venom Spider¡±´´½¨£¬ÊÇÄ£¿é»¯ºóÃÅ£¬ÄÜÖ´ÐкÅÁî¡¢ÇÔȡƾ֤¡¢´«µÝ¶î±íÓÐÐ§ÔØºÉ¼°Ö´ÐÐPowerShell¡£FIN6µÄ¹¥»÷Ëäµ¥Ò»µ«ÓÐЧ£¬ÒÀÀµÉç»á¹¤³ÌѧºÍ¸ß¼¶Ìӱܼ¼Êõ¡£Òò¶ø£¬ÕÐÆ¸ÈËÔ±ºÍÈËÁ¦×ÊÔ´Ô±¹¤Ó¦ÉóÉ÷¶Ô´ýÉó²é¼òÀúºÍÎÄÕ¼¯µÄÔ¼Ç룬¹«Ë¾ºÍÕÐÆ¸»ú¹¹Ò²Ó¦¶ÀÁ¢È·ÈÏÈËÔ±Éí·Ý¡£
https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/
4. HerokuÍ»·¢´óÃæ»ýÖжϳ¬ÁùÓ×ʱ£¬Ö¿ª·¢Åö±Ú·þÎñÊÜÓ°Ïì
6ÔÂ10ÈÕ£¬Heroku×÷ΪSalesforceÆìÏÂµÄÆ½Ì¨¼´·þÎñ£¨PaaS£©£¬ÔÊÐí¿ª·¢ÈËÔ±½«ÀûÓ÷¨Ê½²¿Êðµ½Ôƶ˶øÎÞÐèÖÎÀí»ù´¡ÉèÊ©£¬µ«½üÈÕÔâ·êÁ˳ÖÐøÁù¸ö¶àÓ×ʱµÄ´óÃæ»ýÖжϡ£Õâ´Îå´»úʼÓÚÖܶþÁ賿£¬Óû§»ã±¨³ÆHerokuÀûÓÃÎÞ·¨ÔËÐУ¬ÇÒ¿ª·¢ÈËÔ±ÎÞ·¨µÇ¼HerokuÒDZí°å²¢Ê¹ÓÃCLI¹¤¾ß¡£HerokuÔÚÆä×´Ì¬Ò³ÃæÉÏÈÏ¿ÉÁËÕâÒ»ÊÂÎñ£¬²¢°µÊ¾ÔÚµ÷²é¡£ÖжÏÓ°ÏìÁ˶à¶à¹«Ë¾ºÍÕ¾µãµÄ·þÎñ£¬ÀýÈçSolarWindsÒòÎÞ·¨´ÓHeroku»ñÈ¡ÈÕÖ¾¶øÊܵ½²¨¼°¡£Ê¹ÓÃHerokuÀûÓ÷¨Ê½ÊµÏÖ¸÷ÀàÖ°ÄܵÄÍøÕ¾Ò²Êܵ½Ó°Ï죬²¿ÃÅÖ°ÄÜÎÞ·¨Õý³£ÔËÐС£HerokuÉÐδÌṩÓйØÖжϵ××ÓÔÒòµÄ¾ßÌåÐÅÏ¢»òºÎʱ¸´Ô·þÎñ£¬²»ÍâÔÚ2025Äê6ÔÂ10ÈÕ£¬Salesforce°µÊ¾Ã»ÓÐÖ¤¾ÝÅú×¢Õâ´Î·þÎñÖжϴæÔÚ¶ñÒâ»î¶¯£¬²¢ÌṩÁ˿ͻ§¸ú×Ù¸üеÄÁ´½Ó¡£½ØÖÁUTC¹¦·ò21:48:25£¬Heroku×´Ì¬Ò³ÃæÏÔʾÒѽâ¾ödashboard.heroku.comµÄÎÊÌ⣬¿Í»§¿É½Ó¼û¸ÃÍøÕ¾£¬Í¬Ê±ÎªÈÔÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËͨ¹ýHerokuºÅÁîÐнçÃæÔËÐеĺÅÁî×÷Ϊ½â¾ö²½Ö裬²¢Ç¿µ÷Ó¦Ò»´Î³ÁÆôһ̨²â¹¦»úÒÔÔ¤·À·þÎñÖжϡ£Heroku°µÊ¾Æä¹¤×÷³ÁµãÈÔÊÇÄÚ²¿²âÊÔºÍÑéÖ¤£¬²¢½«³ÖÐø¹Ø×¢ÆäËû²úÆ·µÄ¸Ä½ø£¬Í¬Ê±³Ô¼µ¾¡¿ìÌṩ½â¾ö¹æ»®¹¦·ò±í£¬²¢¶ÔÓÉ´ËÔì³ÉµÄ³ÖÐøÀ§ÈÅÉî±íǸÒâ¡£
https://www.bleepingcomputer.com/news/technology/massive-heroku-outage-impacts-web-platforms-worldwide/
5. DuplexSpy RATÐÂÐÍľÂíÏÖÉí£¬¿ÉÆëÈ«½ÚÔìWindowsϵͳ
6ÔÂ9ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕ·¢ÏÖÒ»¿îÃûΪDuplexSpy RATµÄÐÂÐ͸߼¶Ô¶³Ì½Ó¼ûľÂí£¬¸ÃľÂí¿ÉÈù¥»÷ÕßÈ«Ãæ¼à¿ØÓë½ÚÔìWindowsϵͳ¡£Õâ¿î¶ñÒâÈí¼þѡȡC#˵»°¿ª·¢£¬¾ß±¸¼ò½àµÄͼÐνçÃæºÍ¿ÉÅäÖÃÑ¡ÏÏÔÖø½µµÍÁËÍøÂç·¸×ï·Ö×ÓÈëÇÖÖ¸±êÉ豸µÄ¼¼ÊõÃż÷¡£ÆäѡȡAES-256-CBCºÍRSA-4096Ë«³Á¼ÓÃÜËã·¨£¬±£»¤ÊÜϰȾÖ÷»úÓëºÅÁî½ÚÔì·þÎñÆ÷¼äµÄͨѶ£¬ÓÐЧ¶ã±ÜÍøÂç¼ì²â¡£¸ÃRAT×î³õÓÉ¿ª·¢ÕßÒÔ¡°½ÌÓýÓô¦¡±°ä²¼ÔÚGitHubÉÏ£¬µ«Æä¶àÖ°ÄÜÐÔºÍÒ×¶¨ÔìÐÔÎüÒýÁËÍþвÐÐΪÕß¡£DuplexSpy RATÖ°ÄÜÈ«Ãæ£¬²»½öÔ̺¬¼üÅ̼ͼ¡¢ÊµÊ±ÆÁÄ»²¶»ñµÈ´«Í³Ô¶³Ì½Ó¼ûÖ°ÄÜ£¬»¹¾ß±¸ÉãÏñÍ·/Âó¿Ë·ç¼à¿Ø¼°½»»¥Ê½ºÅÁîÖն˵ȸ߼¶¼à¿ØÄÜÁ¦¡£ÔÚÓÆ¾Ã»¯ÓëÒñ±ÎÐÔ·½Ã棬¸ÃľÂíѡȡ¶à²ãÕ½Êõ£¬ÒÔ¡°Windows Update.exe¡±Îª¼Ù×°Ãû³Æ¸´Ôìµ½Óû§Æô¶¯Îļþ¼Ð£¬²¢´´½¨¶ÔӦע²á±íÏȷ±£ÏµÍ³³ÁÆôºÍËãÕʳ¢ÊÔÖÐÈÔÄÜ´æ»î¡£Í¬Ê±£¬Ëü»¹¾ß±¸¸ß¼¶·´·ÖÎöÄÜÁ¦£¬Ã¿100ºÁÃë¼à¿ØÏµÍ³¹ý³Ì£¬Õë¶Ô°²È«¹¤¾ßºÍ·ÖÎöÀûÓã¬Ò»µ©¼ì²âµ½°²È«Èí¼þ£¬±ã»áÖÕÖ¹Óйعý³Ì²¢ÏÔʾÐéαÃýÎóÐÅÏ¢Îóµ¼Óû§¡£´Ë±í£¬¸ÃRATѡȡÎÞÎļþÖ´Ðм¼Êõ£¬Ö±½Ó½«×ÔÉí¼ÓÔØµ½ÄÚ´æºóɾ³ý´ÅÅÌÔʼ¿ÉÖ´ÐÐÎļþ£¬¼«´óÏ÷¼õÁËȡ֤ºÛ¼£¡£
https://cybersecuritynews.com/new-duplexspy-rat-let-attackers-gain-complete-control/
6. S5 Agency WorldÔâBertÀÕË÷¹¥»÷ÖÂÊý¾Ý±»µÁ
6ÔÂ10ÈÕ£¬´óÐ͸ۿڴúÀí»ú¹¹S5 Agency World½üÈÕÔâµ½ÀÕË÷Èí¼þÍŻ﹥»÷£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Á˽ü140GBÊý¾Ý£¬²¢½«¸Ã¹«Ë¾Ãû×Ö°ä²¼ÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ£¬ÒÔ´ËÆÈʹS5Ö§¸¶Êê½ð£¬Ô¤·ÀÊý¾Ýй¶¸ø¹«¼Ò´øÀ´²»Á¼Ó°Ïì¡£S5×÷Ϊһ¼Òº£ÉÏÔËÊ乫˾£¬ÒµÎñ¸²¸ÇÈ«Çò360¶à¸ö¸Û¿Ú£¬ÔÚº½Ô˹«Ë¾´¬²°Í£¿¿Ê±³äÈα¾µØ´ú±í£¬ÆäÔËÓª¶Ôº£ÉÏÔËÊäÖÁ¹Ø³ÁÒª¡£¹¥»÷Õß°ä²¼Á˼¸ÕžݳƱ»µÁÐÅÏ¢µÄ½ØÍ¼£¬¾×êÑÐÍŶӵ÷²é£¬ÕâЩÊý¾ÝÑù±¾ËƺõÊǺϷ¨µÄ£¬Ô̺¬²é³»ã±¨¡¢Ô±¹¤Ð¹ÚÒßÃç½ÓÖÖÇé¿ö¡¢²¿ÃÅ»¤ÕÕ¸´Ó¡¼þµÈ£¬µ«Êý¾ÝÑù±¾ÓÐÏÞ£¬ÏÖʵ»ñÈ¡µÄÎļþ×ÜÁ¿¿ÉÄܸü´ó¡£¶ÔÓÚº£ÉÏÔËÊ乫˾¶øÑÔ£¬ÍøÂç¹¥»÷µ¼ÖµÄÍ£»ú²»³É½ÓÊÜ£¬ÓÉÓÚÔËÊäÑÓÎó»áÔì³É¹©¸øÁ´Æ¿¾±£¬¶Ô¿Í»§Ôì³É¸ºÃæÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬BertÀÕË÷Èí¼þÊǸÃÁìÓòµÄгÉÔ±£¬ÓÚ2025Äê4Ô³õ´Î±»·¢ÏÖ£¬ÇÒÔڶ̶̹¦·òÄÚÒѳɹ¦¹¥»÷ÁËÊ®¼¸¸ö×éÖ¯¡£×êÑÐÈËÔ±Ö¸³ö£¬BertÀÕË÷Èí¼þÍÅ»ïͨ¹ýºÏ·¨Èí¼þ¹©¸øÁ´´«²¼¶ñÒâÈí¼þ£¬Í¨³£ÒÔÒ½ÁƱ£½¡ºÍ¿Æ¼¼ÐÐҵΪָ±ê£¬ÇÒËÆºõ¼«¶ÈÊʸõ±Ç°µÄÍøÂç·¸×ï¾ÖÊÆ£¬½«À´¿ÉÄÜÑÝÔì³É¸ü´óµÄÍþв¡£
https://cybernews.com/security/port-agency-ransomware-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ