ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿éÈÆ¹ýÉí·ÝÑéÖ¤

°ä²¼¹¦·ò 2025-08-05

1. ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿éÈÆ¹ýÉí·ÝÑéÖ¤


8ÔÂ2ÈÕ£¬ÍøÂ簲ȫÁìÓò½üÈÕÅû¶һ¿îÃûΪ"Plague"µÄÐÂÐÍLinuxºóÃÅ·¨Ê½£¬¸Ã¶ñÒâÈí¼þͨ¹ý¼Ù×°³É¿É²å°ÎÈÏ֤ģ¿é£¨PAM£©ÊµÏÖ³¤´ïÒ»ÄêµÄÒñ±ÎÔËÐС£¾ÝNextron Systems×êÑÐÔ±Pierre-Henri Pezier½Òʾ£¬¸ÃÖ²È뷨ʽÉî¶È¼¯³ÉÓÚLinuxϵͳµÄÈÏÖ¤²Ö¿â£¬Í¨¹ý´úÌæ»ò´Û¸ÄPAMÄ£¿é£¬Ê¹¹¥»÷Õß¿ÉÄܾ²Ä¬ÈƹýϵͳÈÏÖ¤»úÔ죬³ÉÁ¢ÓƾõÄSSH½Ó¼ûͨ·¡£×÷ΪUNIX/LinuxϵͳÖ÷Ìâ×é¼þ£¬PAMͨ¹ý¹²Ïí¿âʵÏÖÓû§ÈÏÖ¤µÄ¼¯Öл¯ÖÎÀí£¬µ«ÕâÒ»¸öÐÔ±»¶ñÒâÈí¼þ¿ª·¢ÕßÀûÓᣵ±¶ñÒâPAMÄ£¿é¼ÓÔØÖÁÌØÈ¨¹ý³Ìʱ£¬¿ÉͬʱʵÏÔì¾Ö¤ÇÔÈ¡¡¢ÈÏÖ¤Á÷³ÌÈÆ¹ý¼°°²È«¹¤¾ß¶ã±ÜÈý³ÁÖ°ÄÜ¡£×êÑÐÏÔʾ£¬×Ô2024Äê7ÔÂ29ÈÕÆð£¬VirusTotalƽ̨ÒÑÊÕ¼¶à¸öPlagueÑù±¾£¬µ«½ØÖÁÅû¶ʱËùÓÐÖ÷Á÷·´²¡¶¾ÒýÇæ¾ù佫Æä¼ø±ðΪÍþв£¬°µÊ¾¸Ã¿ò¼Ü¾ß±¸³ÉÊìµÄÃâɱ¼¼Êõ¡£


https://thehackernews.com/2025/08/new-plague-pam-backdoor-exposes.html


2. ºÚ¿Í×éÖ¯CL-STA-0969Âñ·ü10¸öÔ£¬ÏòµçÐÅÍøÂçÖ²ÈëÒñ±Î¶ñÒâÈí¼þ


8ÔÂ2ÈÕ£¬¶«ÄÏÑǵçÐÅ×éÖ¯½üÆÚÔâ·ê¹ú¶È¼¶Íþв×éÖ¯CL-STA-0969µÄ¶¨ÏòÍøÂç¹¥»÷£¬¸Ã×é֯ͨ¹ý²¿Êð¸ß¶È¶¨Ô컯µÄ¶ñÒ⹤¾ßÁ´ÊµÏÖ¶ÔÖ¸±êÍøÂçµÄÔ¶³Ì½ÚÔì¡£¾ÝPalo Alto NetworksÆìÏÂUnit 42³¢ÊÔÊÒÅû¶£¬2024Äê2ÔÂÖÁ11ÔÂÆÚ¼ä£¬¸Ã×éÖ¯Õë¶Ô¶«ÄÏÑǹؼüµçÐÅ»ù´¡ÉèÊ©ÌáÒé¶àÆð¹¥»÷ÊÂÎñ£¬ÀûÓÃCordscanµÈ¹¤¾ßÍøÂçÒÆ¶¯É豸µØÎ»Êý¾Ý£¬µ«µ÷²éÏÔʾÆäδִÐÐÊý¾Ý±íй»òÉ豸׷×ÙÐÐΪ¡£¼¼Êõ·ÖÎöÏÔʾ£¬CL-STA-0969×Ô2020ÄêÆð³ÖÐøÕë¶ÔÄÏÑÇ¡¢·ÇÖÞµçÐÅʵÌå·¢Õ¹µý±¨ÇÔÈ¡»î¶¯£¬Æä²¿ÃŹ¥»÷ÊÖ·¨Óë³ÛÃûAPT×éÖ¯"LightBasin"£¨UNC1945£©¼°½ðÈÚ·¸×OÌå"UNC2891"´æÔÚ¹ØÁª¡£Õâ´Î¹¥»÷ÖУ¬¹¥»÷Õßͨ¹ýSSH±©Á¦ÆÆ½âµçÐÅÉ豸ÄÚÖÃÕË»§»ñÈ¡³õʼ½Ó¼ûȨÏÞ£¬Ê¹Óö¨Ô컯×ÖµäÁбíÖ´Ðж¨ÏòÍ»ÆÆ¡£Æä¹¤¾ßÁ´Ô̺¬Áù´óÖ÷Ìâ×é¼þ£º¸²¸ÇºÏ·¨PAMÄ£¿éµÄAuthDoorƾ֤ÇÔÈ¡¹¤¾ß¡¢ÀÄÓÃGTP-CºÍ̸µÄGTPDoorÒñ±ÎC2ͨ·¡¢»ùÓÚICMP»ØÏÔµÄEchoBackdoorÎÞ¼ÓÃÜÖ¸Áî´«Êä¡¢·ÂÕÕSGSN½ÚµãµÄÍøÂçÁ÷Á¿ÈÆÐм¼Êõ£¬ÒÔ¼°¾ß±¸Ô¶³ÌShellºÍ¼üÅ̼ͼְÄܵÄChronosRATºóÃÅ¡£ÖµµÃ¹Ø×¢µÄÊÇNoDepDNS¹¤¾ß£¬¸Ã»ùÓÚGolangµÄDNSËí·ºóÃÅͨ¹ýԭʼÌ×½Ó×Ö½âÎö53¶Ë¿ÚUDPÖ¸ÁʵÏÖ¿ç·À»ðǽͨѶ¡£


https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html


3. Ô½ÄϺڿÍÀûÓÃPXAÇÔÈ¡Èí¼þ¹¥»÷È«Çò4000¸öIPµØÖ·


8ÔÂ4ÈÕ£¬ÍøÂ簲ȫÁìÓò½üÆÚÆØ¹âһ·ÓÉÔ½ÄϺڿÍÍÅ»ïÌáÒéµÄ¿ç¹úÍøÂç·¸×ï»î¶¯£¬ÆäÖ÷Ì⹤¾ßΪÐÂÐÍPythonÐÅÏ¢ÇÔȡľÂí"PXA Stealer"¡£¾ÝBeazley SecurityÓëSentinelOne½áºÏ»ã±¨£¬¸Ã·¸×OÍÅͨ¹ýTelegram API¹¹½¨¶©ÔÄÔìµØÏÂÉú̬£¬Òѳɹ¦¹¥ÏÂ62¸ö¹ú¶È³¬4000̨É豸£¬ÇÔÈ¡Ô̺¬20Íò×é¶ÀÁ¢ÃÜÂë¡¢Êý°ÙÌõÐÅÓþ¿¨ÐÅÏ¢¼°400ÍòÌõä¯ÀÀÆ÷CookieµÄÃô¸ÐÊý¾Ý£¬Ðγɼ¯Êý¾ÝÇÔÈ¡¡¢×Ô¶¯»¯×ªÊÛÓ븴ÓÃÓÚÒ»ÌåµÄÆëÈ«·¸×ï²úÒµÁ´¡£×êÑÐÏÔʾ£¬PXA StealerµÄ¼¼ÊõÑݽø³öÏÖÏÔÖøÍ»ÆÆ¡£×îÔçÓÉ˼¿ÆTalosÓÚ2024Äê11Ô·¢ÏֵĸÃľÂí£¬×î³õÕë¶ÔÅ·Ñǵ±¾ÐݽÌÓý»ú¹¹Ö´Ðж¨Ïò¹¥»÷£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢½ðÈÚ»ú¹¹ÐÅÏ¢¼°ä¯ÀÀÆ÷×Ô¶¯Ìî³äÊý¾Ý¡£2025Äê¹¥»÷»î¶¯Éý¼¶ºó£¬·¸×ïÍÅ»ïѡȡDLL²à¼ÓÔØ¼¼ÊõÓ븴Ôӷֽ׶β¿Êð²ã¶ã±Ü¼ì²â£¬Í¨¹ýÏòÊܺ¦Õßչʾ°æÈ¨ÇÖȨ֪ͨµÈ·Ç¶ñÒâµö¶üÎĵµÊµÏÖϰȾÁ÷³Ì¡£Ð°æÄ¾ÂíÍ»ÆÆChromiumä¯ÀÀÆ÷"ÀûÓð󶨼ÓÃܱ£»¤"»úÔ죬½«¹¥»÷ÁìÓòÀ©´óÖÁVPN¿Í»§¶Ë¡¢ÔƺÅÁîÐй¤¾ß£¨CLI£©¡¢¹²ÏíÎļþ¼°DiscordµÅצÓÃÊý¾Ý¡£


https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html


4. ÏãÄζùÏÝSalesforceÊý¾Ýй¶·çÀË£ºShinyHunters×éÖ¯³ÖÐø¹¥»÷


8ÔÂ4ÈÕ£¬·¨¹úʱÉоÞÍ·ÏãÄζù½üÈÕ³ÉΪ¿ç¹úÊý¾Ý͵ÇÔº£³±ÖеÄ×îÐÂÊܺ¦Õߣ¬ÆäÃÀ¹ú¿Í»§·þÎñÖÐÐÄÊý¾Ý¿âÔâÈëÇÖµ¼ÖÂÓû§ÐÅϢй¶¡£¾Ý±¨Â·£¬Õâ´ÎÊÂÎñÔ´ÓÚÍþвÐÐΪÕß¶ÔÏãÄζùµÚÈý·½·þÎñÌṩÉÌSalesforceÊ·ýµÄ·¸·¨½Ó¼û£¬¹¥»÷Õßͨ¹ýÓïÒô´¹µöºÍÉç»á¹¤³Ì¼¿Á©ÇÔȡԱ¹¤Æ¾Ö¤£¬»òÓÕÆ­ÆäÊÚȨ¶ñÒâOAuthÀûÓ÷¨Ê½£¬×îÖÕÓÚ7ÔÂ25Èճɹ¦ÉøÈëϵͳ¡£Ð¹Â¶Êý¾Ýº­¸Ç²¿ÃÅÃÀ¹ú¿Í»§µÄÐÕÃû¡¢µç×ÓÓʼþ¡¢ÓʼĵØÖ·¼°µç»°ºÅÂëµÅ×ÐÏÞÓ×ÎÒÐÅÏ¢£¬ÏãÄζùÒÑÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬µ«Î´¹«¿ª¾ßÌåÊÜÓ°ÏìÈËÊý¼°µÚÈý·½·þÎñÉÌÃû³Æ¡£Õâ´Î¹¥»÷±»¹éÒòÓÚÀÕË÷×éÖ¯ShinyHuntersÌáÒéµÄ³ÖÐøÐÔSalesforce¶¨Ïò¹¥»÷¡£¾ÝMandiant·ÖÎö£¬¸ÃÍÅ»ïͨ¹ý¸´ÔÓµÄÉç»á¹¤³ÌÕ½Êõ»ñÈ¡ÆóÒµSalesforceÕË»§½ÚÔìȨ£¬½ø¶øÇÔÈ¡Êý¾Ý¿âÖ´ÐÐÀÕË÷¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Salesforce¹Ù·½Ç¿µ÷Æäƽ̨δ±»Ö±½ÓÈëÇÖ£¬ÎÊÌâÔ´ÓÚ¿Í»§ÕË»§°²È«´ëÊ©²»¼°£¬²¢³ÁÉêÆóÒµ¼¶°²È«»úÔìÒÑÈÚÈëÆ½Ì¨µ×²ãÉè¼Æ£¬µ«¿Í»§ÈÔÐè³Ðµ£Êý¾Ý±£»¤ÔðÈΡ£¸Ã¹«Ë¾½¨ÒéÓû§ÆôÓöà³É·ÖÈÏÖ¤£¨MFA£©¡¢×ñÑ­×îÓ×ȨÏÞ×¼Ôò¼°ÑϸñÖÎÀíµÚÈý·½ÀûÓÃÏνÓ£¬²¢°ä²¼°²È«Ö¸ÄÏЭÖú·À±¸ÀàËÆ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/


5. ĦÄɸçÉÝ»ª¾Æµê¼¯ÍÅÔâD4rk4rmyºÚ¿Í×éÖ¯Êý¾Ýй¶


8ÔÂ4ÈÕ£¬Ä¦Äɸç°ÙÄêÉÝ»ª¾Æµê¼¯ÍÅÃÉÌØ¿¨Âå±õº£¶È¼Ù¾Æµê£¨SBM£©½üÈÕ¾íÈë³Á´óÍøÂ簲ȫÊÂÎñ£¬ÍøÂç·¸×OÍÅD4rk4rmyÐû³Æ¶ÔÆä·¢ÆðºÚ¿Í¹¥»÷£¬²¢½«¸Ã¼¯ÍÅÁÐÈëÆäTor°µÍøÐ¹ÃÜÍøÕ¾µÄÊܺ¦ÕßÃûµ¥¡£×÷ΪĦÄɸ繫¹úÏóÕ÷ÐÔÆóÒµ£¬SBM×Ô1863Äê³ÉÁ¢ÒÔÀ´Ê¼ÖÕÖ÷µ¼×ű¾µØÉÝ»ª¾Æµê¡¢²©²Ê¼°¸ß¶Ë²ÍÒû²úÒµ£¬ÆäÆìÏÂÃÉÌØ¿¨Âå¶Ä³¡Óë°ÍÀè´ó¾Æµê¸üÊÇÈ«Çò¾«Ó¢½×¼¶µÄ±êÖ¾ÐÔÉç½»³¡Ëù¡£Õâ´ÎÊý¾Ýй¶ÊÂÎñ²»½öÍþвµ½¸ß¶Ë¿Í»§ÒþÖÔ°²È«£¬¸ü¿ÉÄܵßô¤Ä¦ÄɸçÉÝ³ÞÆ·¸ñÒµ¿àÐľ­ÓªµÄÆ·ÅÆÐÎÏó¡£¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡´óÁ¿Ãô¸Ð¿Í»§Êý¾ÝÓ빫˾ÄÚ²¿Îļþ£¬¾ßÌåÓ°ÏìÁìÓòÉÐδÆëÈ«Åû¶¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Õâ´ÎÊÂÎñ͹ÏÔÍøÂç·¸×ï·Ö×ÓÕý½«Ö¸±êתÏò¸ß¾»Öµ·þÎñÒµ£¬ÕâÀà»ú¹¹ËäÕ¼ÓÐÑϸñµÄ°²È«·À»¤ÏµÍ³£¬È´Òò°ÑÎÕ´óÁ¿¸ß¼ÛÖµ¿Í»§Êý¾Ý¶ø³ÉΪ¹¥»÷ÕßµÄ"ÓÅѡָ±ê"¡£ÍøÂ簲ȫר¼ÒÖ¸³ö£¬Èôй¶ÐÅÏ¢Éæ¼°ÕþÉÌÒªÔ±»ò»úÃÜóÒ×Êý¾Ý£¬¿ÉÄÜÒý·¢Á¬Ëø·´Ó³£¬²¨¼°SBMµÄ¿ç¹úºÏ×÷ͬ°é¹ØÏµÓë¸ß¶Ë¿Í»§ÐÅÀµ¶È¡£


https://securityaffairs.com/180780/cyber-crime/hacking-group-d4rk4rmy-claimed-the-hack-of-monte-carlo-societe-des-bains-de-mer.html


6. CTM360·¢ÏÖÕë¶ÔTikTok ShopÓû§µÄ¶ñÒâ¡°ClickTok¡±»î¶¯


8ÔÂ4ÈÕ£¬ÍøÂ簲ȫ»ú¹¹CTM360½üÈÕÅû¶´úºÅ"ClickTok"µÄÐÂÐÍ¿çÆ½Ì¨Ú¿Æ­Ðж¯£¬¸Ã×é֯ͨ¹ý¹¹½¨ÆëÈ«ÐéαTikTokóÒ×Éú̬£¬½áºÏÍøÂç´¹µöÓëSparkKitty¼äµýÈí¼þÖ´ÐмÓÃÜÇ®±Ò͵ÇÔ¡£¹¥»÷ÕßÀûÓÃAIÌìÉúÊÓÆµÔÚTikTokƽ̨´ó¹æÄ£ÒýÁ÷£¬ÓÕµ¼Óû§½Ó¼û¾«ÐÄαÔìµÄÓòÃû£¬Í¨¹ý¼ÓÃÜÇ®±ÒÖ§¸¶ÒªÇóÓÕµ¼×°ÖÃǶÌ×¶ñÒâ´úÂëµÄ"TikTokÅú¸Ä°æ"ÀûÓ᣼¼Êõ·ÖÎöÏÔʾ£¬¸ÃľÂíÓ뿨°Í˹»ù´ËÇ°ÆØ¹âµÄSparkCat¼äµýÈí¼þ´æÔÚ¼¼Êõ¹ØÁª£¬Æä±äÖÖSparkKittyͨ¹ý×¢ÈëChromiumä¯ÀÀÆ÷¹ý³ÌÍ»ÆÆ´«Í³¼ÓÃܱ£»¤£¬¿ÉÉî¶ÈÇÔÈ¡É豸½ØÍ¼¡¢VPNƾ֤¡¢ÔÆ·þÎñCLI¹¤¾ßÊý¾Ý¼°DiscordµÅצÓÃÐÅÏ¢¡£ÓÈΪֵÍ×ÌùÐĵÄÊÇ£¬¸Ã×é֯ѡȡ"ÀûÓð󶨼ÓÃܱ£»¤"Í»ÆÆ¼¼Êõ£¬Ê¹¶ñÒâ´úÂëÄÜÈÆ¹ýͨÀý°²È«¼ì²â¡£¾ÝCTM360ͳ¼Æ£¬Õâ´ÎÐж¯ÒѲ¿Êð³¬10000¸öÐéαÓòÃû¼°5000¸ö¶ñÒâÀûÓÃÊ·ý£¬Í¨¹ý¶þάÂë¡¢¼´Ê±Í¨Ñ¶Èí¼þ¼°ÀûÓÃÄÚÏÂÔØÊµÏÖÁѱäʽ´«²¼¡£¹¥»÷Õß¹¹½¨ÁËÆëÈ«µÄµØÏÂÂòÂôÁ´£ºÇÔÈ¡Êý¾Ý¾­SherlockµÈ°µÅÌÆ½Ì¨×ªÊÛ£¬ÏÂÓη¸×ïÍÅ»ï¿ÉÀûÓûñÈ¡µÄTikTokÕ˺ÅÖ´Ðжþ´ÎÚ¿Æ­»òÉøÈë¹¥»÷£¬ÐγÉ"Êý¾ÝÇÔÈ¡-ƽ̨ÍйÜ-¶©ÔÄÏúÊÛ"µÄ²úÒµ»¯·¸×ïģʽ¡£


https://www.bleepingcomputer.com/news/security/ctm360-spots-malicious-clicktok-campaign-targeting-tiktok-shop-users/