Punishing Owl¶Ô¶íÌáÒé¼¼Êõ¸´ÔÓÍøÂç¹¥»÷
°ä²¼¹¦·ò 2026-02-041. Punishing Owl¶Ô¶íÌáÒé¼¼Êõ¸´ÔÓÍøÂç¹¥»÷
2ÔÂ2ÈÕ£¬ºÚ¿Í×éÖ¯Punishing OwlÓÚ2025Äê12ÔÂ12ÈÕ³õ´Î¹«¿ª»î¶¯£¬¶Ô¶íÂÞ˹µ±¾Ö°²È«»ú¹¹ÌáÒé¼¼Êõ¸´ÔÓµÄÍøÂç¹¥»÷¡£¸Ã×é֯ͨ¹ýÈëÇÖÖ¸±êÍøÂçÇÔÈ¡ÄÚ²¿Îļþ£¬²¢½«Æä°ä²¼ÖÁÊý¾Ýй¶ƽ̨£¬Í¬Ê±ÔÚMega.nz´æ´¢²Ö¿â±¸·ÝÎļþ£¬ÒÔ×î´ó»¯ÆØ¹â¶È¡£Îª³ÙÑÓÊܺ¦ÕßÏìÓ¦²¢À©´óÓ°Ï죬¹¥»÷ÕßרÃÅÑ¡ÔñÖÜÎåÍí6µã37·ÖÕâÒ»·Ç¹¤×÷ʱ¶Î°ä·¢ÈëÇÖÊÂÎñ¡£¹¥»÷¹ý³ÌÖУ¬Punishing Owl½ÚÔìÁËÊܺ¦»ú¹¹µÄDNSÅäÖ㬴´½¨×ÓÓòÃû²¢½«Á÷Á¿½Ù³ÖÖÁλÓÚ°ÍÎ÷µÄ·þÎñÆ÷¡£¸Ã·þÎñÆ÷²»½öÍйÜÁËÇÔÈ¡µÄÎļþ£¬»¹¸½´øÁËÒ»·ÝÂÛÊö¹¥»÷¶¯»úµÄÕþÖÎÉêÃ÷¡£Ëæºó£¬¸Ã×éÖ¯½øÒ»²½¶ÔÊܺ¦»ú¹¹µÄºÏ×÷ͬ°éÓë³Ð°üÉÌÌáÒéóÒ×µç×ÓÓʼþڲƣ¨BEC£©¹¥»÷£¬Ê¹ÓÃαÔìµÄ·¢¼þµØÖ··¢ËÍ´¹µöÓʼþ£¬»Ñ³ÆÊÇÍøÂçÈëÇÖÊÂÎñµÄºËʵ֪ͨ£¬²¢¶½´ÙÊÕ¼þÈ˲鿴¸½¼þÎĵµ¡£¼¼Êõ²ãÃæ£¬Punishing Owlչʾ³ö¸ßË®×¼µÄ¹¥»÷ÄÜÁ¦¡£ÆäÅäÖÃÁËαÔìµÄTLSÖ¤Ê飬´î½¨ÁËÓÃÓÚÓʼþÊÕ·¢µÄIMAPºÍSMTP·þÎñ£¬²¢²¿ÊðÁËÃûΪZipWhisperµÄPowerShellÇÔÃÜľÂí£¬ÓÃÓÚµÁÈ¡ÊÜϰȾϵͳµÄä¯ÀÀÆ÷ƾ֤¡£
https://cybersecuritynews.com/new-punishing-owl-hacker-group-targeting-networks/
2. DynoWiper¶ñÒâÈí¼þ¹¥»÷²¨À¼ÄÜÔ´ÆóÒµ
2ÔÂ2ÈÕ£¬Ò»¿îÃûΪDynoWiperµÄÐÂÐ͸ßΣÊý¾Ý²Á³ý¶ñÒâÈí¼þ³õ´Î±»·¢ÏÖ£¬Õý¶Ô²¨À¼ÄÜÔ´ÆóÒµÌáÒé·ÛËéÐÔ¹¥»÷£¬ÆäÖ÷ÌâÖ¸±ê²¢·ÇÀÕË÷²Æ²¯£¬¶øÊÇÓÀÔ¶¶Ï¸ù¹Ø¼üÊý¾Ý²¢µ¼ÖÂϵͳ̱»¾¡£ÓëͨÀýÀÕË÷Èí¼þ·ÖÆç£¬DynoWiperͨ¹ýÈý½×¶Î·ÛËéÁ÷³ÌʵÏÔìÆ»µ£ºµÚÒ»½×¶ÎµÝ¹éËÑË÷ËùÓй̶¨¼°¿ÉÒÆ¶¯Çý¶¯Æ÷ÉϵÄÎļþ£¬±Ü¿ª¹Ø¼üϵͳĿ¼ÒÔά³Ö¸ù»ùÔËÐУ»µÚ¶þ½×¶ÎʹÓÃ16×Ö½ÚËæ»úÊý¾Ý»º³åÇø¸²Ð´ÎļþÄÚÈÝ£¬Ó×ÓÚ16×Ö½ÚµÄÎļþ±»ÆëÈ«¸²¸Ç£¬´óÓÚ16×Ö½ÚµÄÔò²¿·ÔìÆ»µ£¬ÒÔ´ËÌáÉý·ÛËéЧÄÜ£»µÚÈý½×¶Îͨ¹ýϵͳ³ÁÆô»òÖ±½ÓÖÕÖ¹¹ý³ÌʹÊÜϰȾÉ豸ÎÞ·¨Æô¶¯¡£¸Ã¶ñÒâÈí¼þ´æÔÚ¶à¸ö±äÖÖ£¬¾ùÓÚ2025Äê12ÔÂ29ÈÕͶ·Å¡£¹¥»÷ÕßÔÚ³õ´ÎÖ´ÐÐʧ°ÜºóÂÅ´ÎÅú¸Ä´úÂëÒÔÈÆ¹ý°²È«·À»¤£¬µ«ÆóÒµ²¿ÊðµÄÖն˼ì²âÓëÏìÓ¦¹¤¾ß³É¹¦À¹½ØÁËÆäÖ´ÐУ¬´ó·ù½µµÍËðʧ¡£Welivesecurity·ÖÎöʦָ³ö£¬DynoWiperÓëÕë¶ÔÎÚ¿ËÀ¼µÄÒÑÖª²Á³ý¶ñÒâÈí¼þZOV´æÔÚÏÔÖøÀàËÆÐÔ£¬Æä¹éÒòÓÚÓë¶íÂÞ˹¹ØÁªµÄSandworm×éÖ¯¡£
https://cybersecuritynews.com/dynowiper-data-wiping-malware/
3. Coinbase֤ʵÄÚ²¿ÈËÔ±Êý¾Ýй¶
2ÔÂ3ÈÕ£¬ÃÀ¹ú¼ÓÃÜÇ®±ÒÂòÂôËùCoinbase½üÈÕÈ·ÈϲúÉúһ·ÄÚ²¿ÈËÔ±Êý¾Ýй¶ÊÂÎñ¡£¾Ý¹«Ë¾½²»°ÈËÅû¶£¬2025Äê12Ô£¬Ò»Ãû³Ð°üÉ̲»µ±½Ó¼ûÔ¼30Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢£¬Ô̺¬µç×ÓÓʼþ¡¢ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢KYCÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üÓà¶î¼°ÂòÂô¼Í¼¡£¸Ã³Ð°üÉÌÒѱ»ÖÕÖ¹ºÏ×÷£¬ÊÜÓ°ÏìÓû§ÒÑ»ñÉí·Ý͵ÇÔ±£»¤·þÎñ¼°Áìµ¼£¬ÊÂÎñͬ²½Éϱ¨¼à¹Ü»ú¹¹¡£ÍþвÐÐΪÕß¡°Shiny Lapsus Hunters¡±Ôø¶ÌÔÝÔÚTelegram°ä²¼CoinbaseÄÚ²¿Ö§³Ö½çÃæ½ØÍ¼ºóɾ³ý£¬½ØÍ¼ÏÔʾ¿É½Ó¼û¿Í»§Ãô¸ÐÊý¾Ý¡£Ö»¹ÜÎÞ·¨È·ÈϸÃ×éÖ¯ÊÇ·ñÖ±½Ó¹ØÁªÄÚ²¿ÈËÔ±ÈëÇÖ£¬µ«ÀàËÆÊÖ·¨ÔÚÆäËû¹¥»÷ÖÐÆµÏÖ£¬ÈçÍþвÐÐΪÕßÔø»ß¸CrowdStrikeÄÚ²¿ÈËÔ±»ñÈ¡½ØÍ¼£¬»òͨ¹ýÉç½»¹¤³Ì¼ÙÒâÔ±¹¤ÆÈ¡BPOÖ§³ÖÈËÔ±ÊÚȨ½Ó¼ûȨÏÞ¡£BPO¹«Ë¾Òò³Ð½Ó¿Í»§Ö§³Ö¡¢Éí·ÝÑéÖ¤¡¢IT·þÎñµÈÔËÓª¹¤×÷£¬ÆäÔ±¹¤³£½Ó´¥ÆóÒµÖ÷ÌâϵͳÓë¿Í»§Êý¾Ý£¬³ÉΪ¹¥»÷Õ߸߼ÛÖµÖ¸±ê¡£
https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/
4. Step FinanceÔâºÚ¿Í¹¥»÷ÖÂ4000ÍòÃÀÔª×ʲúËðʧ
2ÔÂ3ÈÕ£¬ÃÀ¹ú¼ÓÃÜÇ®±Òƽ̨Step FinanceÓÚ2025Äê1ÔÂ31ÈÕ¼ì²âµ½°²È«·ì϶£¬¾µ÷²éÈ·ÈÏÒò¸ß¹ÜÉ豸ÔâºÚ¿ÍÈëÇÖ£¬µ¼Ö¼ÛÖµÔ¼4000ÍòÃÀÔªµÄÊý×Ö×ʲú±»µÁ¡£¸Ãƽ̨ÊÇ»ùÓÚSolanaÇø¿éÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Æ½Ì¨¼°·ÖÎö¹¤¾ß£¬Ö§³ÖÓû§×ʲú¿ÉÊÓ»¯¡¢ÂòÂô¡¢ÖÊѺµÈ²Ù×÷£¬²¢Õ¼ÓÐÔÉú´ú±Ò$STEP£¬µ«ÂòÂôÁ¿Ïà¶Ô½ÏÓס£¹¥»÷²úÉúºó£¬Step FinanceѸ¿ìÀñÆ¸ÍøÂ簲ȫר¼ÒÐÖú×·»Ø×ʲú¡£Çø¿éÁ´·ÖÎö¹«Ë¾CertiK³õ²½»ã±¨ÏÔʾ£¬±»µÁ×ʲúÔ̺¬261,854 SOL£¨Ô¼2890ÍòÃÀÔª£©£¬µ«Æ½Ì¨×îÖÕºËʵ×ÜËðʧԼ4000ÍòÃÀÔª¡£Í¨¹ýToken22±£»¤´ëÊ©¼°ºÏ×÷ͬ°éе÷£¬Ä¿Ç°ÒÑ×·»ØÔ¼370ÍòÃÀÔªRemora×ʲú¼°100ÍòÃÀÔªÆäËûÍ·´ç£¬¼ÆËã470ÍòÃÀÔª¡£Îª¼ÓÇ¿°²È«·À»¤£¬Æ½Ì¨ÒÑÔÝÍ£²¿ÃÅÒµÎñÔËÓª£¬²¢Ç¿µ÷ÆäÆìÏÂRemora MarketsδÊÜÓ°Ï죬ËùÓÐrTokenÈÔά³Ö1:1ÆëÈ«´¢Ðî¡£Step Finance½¨ÒéÓû§ÔÚµ÷²éʵÏÖǰÔÝͣʹÓÃSTEP´ú±Ò£¬²¢³Ðŵ½«¶Ô¹¥»÷ǰ״̬½øÐпìÕÕ£¬Ôì¶©Õë¶Ô³ÖÓÐÕߵĽâ¾ö¹æ»®¡£
https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/
5. Citrix NetScalerÔâ6.3ÍòIPÐͬ¿úËÅ
2ÔÂ3ÈÕ£¬Íþв¼à¿ØÆ½Ì¨GreyNoise¹Û²âµ½Õë¶ÔCitrix NetScaler»ù´¡ÉèÊ©µÄÐͬ¿úËÅÐж¯£¬¸ÃÐж¯ÀûÓó¬6.3Íò¸ö¶ÀÁ¢IPµØÖ·ÌáÒé111,834¸ö»á»°£¬ÆäÖÐ79%Á÷Á¿Ö¸ÏòCitrix GatewayÃÛ¹Þ£¬64%À´×Ô¼Ù×°³ÉºÏ·¨Ïû·ÑÕßISPµØÖ·µÄסլ´úÀí£¬Ôü×Ò36%Ô´×ÔͳһAzure IPµØÖ·¡£GreyNoiseÖ¸³ö£¬Õâ´Î»î¶¯²¢·ÇËæ»ú»¥ÁªÍøÉ¨Ã裬¶øÊÇÓÐ×éÖ¯µÄ»ù´¡ÉèÊ©²â»æ£¬Ö¼ÔÚÈëÇÖǰ¼ø±ð¶³öµÄCitrixµÇÂ¼Ãæ°å¼°²úÆ·°æ±¾¡£¹¥»÷Õßͨ¹ýÁ½¸öÖ÷ÌâÖ¸±ê¶³ö¶ñÒâÒâͼ£ºÆäÒ»£¬63,189¸öIPÌìÉú109,942¸ö»á»°£¬¼¯ÖÐɨÃè¡°/logon/LogonPoint/index.html¡±Éí·ÝÑéÖ¤½çÃæ£¬´ó¹æÄ£¼ø±ð¶³öµÄµÇÂ¼Ãæ°å£»Æä¶þ£¬2ÔÂ1ÈÕ10¸öIPÔÚ6Ó×ʱÄÚÆô¶¯1,892¸ö»á»°£¬¾Û½¹URLõè¾¶¡°/epa/scripts/win/nsepa_setup.exe¡±£¬Í¨¹ýEPA¹¤¼þö¾ÙCitrix°æ±¾¡£¹¥»÷ÕßʹÓÃ2016ËêÊ×°ä²¼µÄChrome 50Óû§´úÀí£¬Õë¶ÔEPA×°ÖÃÎļþõè¾¶µÄÌØ¶¨¹¥»÷Åú×¢ÆäÕý¿ª·¢Ìض¨°æ±¾·ì϶ÀûÓ÷¨Ê½»òÑéÖ¤ÒÑÖªCitrix ADC·ì϶¡£
https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/
6. CISA´¹Î£´«µÝSolarWinds·þÎñ̨·ì϶
2ÔÂ3ÈÕ£¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«SolarWinds Web Help DeskµÄÑϳÁ·ì϶CVE-2025-40551ÏóÕ÷Ϊ"ÔÚÔâ·ê¹¥»÷"£¬²¢Æ¾¾Ý2021Äê°ä²¼µÄÓµÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD 22-01£©£¬ÒªÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÔÚÈýÌìÄÚʵÏÖϵͳ½¨²¹¡£¸Ã·ì϶Óɰ²È«×êÑÐÔ±Jimi Sebree·¢ÏÖ£¬Ô´ÓÚ²»ÊÜÐÅÀµµÄÊý¾Ý·´ÐòÁл¯Èõµã£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓÃʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬ÔÚδ´ò²¹¶¡µÄÉ豸ÉÏÔËÐжñÒâºÅÁî¡£SolarWindsÓÚ1ÔÂ28ÈÕ°ä²¼Web Help Desk 2026.1°æ±¾½¨¸´´Ë·ì϶£¬Í¬Ê±Ò»²¢½¨¸´ÁËSebree·¢ÏÖµÄÓ²±àÂëÆ¾Ö¤¸ßΣ·ì϶£¨CVE-2025-40537£©¼°watchTowrµÄPiotr Bazydlo»ã±¨µÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2025-40552¡¢CVE-2025-40554£©£¬ËùÓзì϶¾ùÖ§³ÖÔ¶³ÌÀûÓá£CISAÇ¿µ÷£¬Ö»¹ÜBOD 22-01½öÕë´ºÁª¹ú»ú¹¹£¬µ«Ë½Óª²¿ÃÅÒ²Ó¦¾¡¿ì½¨²¹ÒÔÕмܳÖÐø¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/


¾©¹«Íø°²±¸11010802024551ºÅ