Ó¡¶ÈºÚ¿Í×éÖ¯CyberVolk£ºÐÂÐËÀÕË÷Èí¼þÍþвȫÇòÍøÂçÇå¾²

Ðû²¼Ê±¼ä 2024-09-06

1. Ó¡¶ÈºÚ¿Í×éÖ¯CyberVolk£ºÐÂÐËÀÕË÷Èí¼þÍþвȫÇòÍøÂçÇå¾²


9ÔÂ5ÈÕ£¬£¬£¬£¬ £¬Ó¡¶ÈºÚ¿Í×éÖ¯CyberVolk×÷ÎªÍøÂç·¸·¨ÁìÓòµÄÐÂÐ㣬£¬£¬£¬ £¬ÒÔÆäÖØ´óµÄÀÕË÷Èí¼þѸËÙáÈÆð²¢Òý·¢¹Ø×¢¡£¡£¡£¸Ã×éÖ¯×Ô2024Äê7ÔÂÍÆ³öÆäÀÕË÷Èí¼þÒÔÀ´£¬£¬£¬£¬ £¬ÒÀ¸½ÆäÏȽøµÄ¼ÓÃÜÊÖÒÕºÍѸËÙÀ©É¢µÄÄÜÁ¦£¬£¬£¬£¬ £¬Ñ¸ËÙÔÚÍøÂç·¸·¨½çÉùÃûÉ¢ÂÒ¡£¡£¡£CyberVolkÀÕË÷Èí¼þ²»µ«¹¦Ð§Ç¿Ê¢£¬£¬£¬£¬ £¬»¹ÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÐÎʽÁ÷ͨ£¬£¬£¬£¬ £¬ÈκÎÈ˾ù¿É×âÓò¢·¢¶¯¹¥»÷£¬£¬£¬£¬ £¬¼«´óµØÀ©´óÁËÆäÍþв¹æÄ£¡£¡£¡£¸ÃÈí¼þµÄ¼ÓÃÜËã·¨Ò»Ö±Éý¼¶£¬£¬£¬£¬ £¬½ÓÄɰüÀ¨ChaCha20-Poly1305¡¢AES¼°¿¹Á¿×ÓÊÖÒÕÔÚÄڵĶàÖØ¼ÓÃÜÊֶΣ¬£¬£¬£¬ £¬È·±£Êý¾ÝÄÑÒÔ½âÃÜ£¬£¬£¬£¬ £¬¼´±ãÃæÁÙÁ¿×ÓÅÌËãÌôÕ½Òà²»ÆÆÀý¡£¡£¡£CyberVolkÀÕË÷Èí¼þ×îÎªÆæÒìÖ®´¦ÔÚÓÚÆäÎÞÐèC2ЧÀÍÆ÷¼´¿É×ÔÁ¦ÔËÐУ¬£¬£¬£¬ £¬ÔöÇ¿ÁËÒþ²ØÐÔÓëÆÆËðÐÔ¡£¡£¡£Ò»µ©¼ÓÃÜÆô¶¯£¬£¬£¬£¬ £¬½«Ñ¸ËÙËø¶¨Îļþ£¬£¬£¬£¬ £¬²¢ÉèÖÃÑÏ¿áÊê½ðÏÞÆÚÓë´¦·Ö»£» £»£»úÖÆ£¬£¬£¬£¬ £¬ÈçÊäÈë¹ýʧÃÜÔ¿Ôò×Ô¶¯Ïú»ÙÊý¾Ý£¬£¬£¬£¬ £¬ÆÈʹÊܺ¦Õ߾ͷ¶¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬¸ÃÈí¼þ»¹¾ß±¸Ìӱܼì²â¡¢Èä³æÊ½Èö²¥µÈÄÜÁ¦£¬£¬£¬£¬ £¬ÑÏÖØÍþвÆóÒµ¼°Ð¡ÎÒ˽¼ÒÐÅÏ¢Çå¾²¡£¡£¡£Ö»¹ÜCyberVolkÀÕË÷Èí¼þÉè¼Æ¾«Ã£¬£¬£¬ £¬µ«ÍøÂçÇå¾²Ñо¿»ú¹¹ThreatMonÈÔ·¢Ã÷ÁËÆäÎó²î£¬£¬£¬£¬ £¬Èç¿Éͨ¹ýPowerShellÏÂÁîÖÕÖ¹¼ÓÃÜ¡¢ÐÞ¸Äʱ¼äÎļþÑÓÉìÊê½ðÖ§¸¶ÏÞÆÚµÈ£¬£¬£¬£¬ £¬ÎªÓ¦¶Ô¹¥»÷ÌṩÁË¿ÉÄÜÐÔ¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬CyberVolkÀÕË÷Èí¼þµÄ²ÆÎñÊÕÒæ¼¤Ôö£¬£¬£¬£¬ £¬ÏÔʾ³öÆä»î¶¯µÄÆÕ±éÓ°ÏìÓëΣº¦¡£¡£¡£


https://securityonline.info/cybervolk-ransomware-a-new-and-evolving-threat-to-global-cybersecurity/


2. СÐÄð³äNetflixµÄ´¹ÂÚÓʼþÂþÒç


9ÔÂ2ÈÕ£¬£¬£¬£¬ £¬AhnLab Çå¾²Ç鱨ÖÐÐÄ£¨ASEC£©½üÆÚÕ¹ÏÖÁËÕë¶Ô×ÅÃûOTTƽ̨NetflixµÄÍøÂç´¹ÂÚÓʼþ»î¶¯¡£¡£¡£Ëæ×ÅOTTƽ̨ÆÕ¼°ºÍÓû§»ùÊýµÄÀ©´ó£¬£¬£¬£¬ £¬´ËÀà´¹ÂÚ¹¥»÷ÈÕÒæ·Å×Ý¡£¡£¡£¹¥»÷ÕßÈ«ÐÄαÔìNetflix¶©Ôĸ¶¿îʧ°ÜµÄÓʼþ£¬£¬£¬£¬ £¬ÓÕµ¼Óû§µã»÷Á´½Ó¸üи¶¿î·½·¨£¬£¬£¬£¬ £¬ÓʼþÉè¼Æ±ÆÕ棬£¬£¬£¬ £¬ÉõÖÁʹÓÿ´ËÆÎÞº¦µÄ¡°netflix-team[.]com¡±ÓòÃû¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬Õâ²¢·ÇNetflix¹Ù·½µØµã£¬£¬£¬£¬ £¬¶øÊÇרΪ´¹ÂÚÉè¼ÆµÄÓòÃû¡£¡£¡£ÓʼþÖÐǶÈëµÄ¡¿ÕÊÖúÖÐÐÄ¡±ºÍ¡°ÁªÏµ·½·¨¡±Á´½ÓÖ¸Ïò¹Ù·½£¬£¬£¬£¬ £¬µ«Òªº¦µÄ¡°Á¬Ã¦¸üÐÂÕÊ»§¡±°´Å¥Ôòµ¼ÏòÒѹرյĴ¹ÂÚÍøÕ¾URL£¬£¬£¬£¬ £¬Ö»¹Ü¸ÃÍøÕ¾ÎÞ·¨½øÒ»²½ÆÊÎö£¬£¬£¬£¬ £¬µ«Í¨Ì«¹ýÎöÓòÃûºÍ×ÓURLÖз¢Ã÷µÄ×ÅÃûƽ̨CSSÎļþ£¬£¬£¬£¬ £¬ÍƲ⹥»÷Õß¿ÉÄܹ¹½¨Á˶à¸öÀàËÆ´¹ÂÚÕ¾µã¡£¡£¡£´Ë°¸Àý͹ÏÔÁË´¹ÂÚÓʼþµÄÒþ²ØÐÔºÍÖØ´óÐÔ£¬£¬£¬£¬ £¬¹¥»÷ÕßʹÓù«ÖÚ¶ÔOTTƽ̨µÄÊìϤ¸Ð½µµÍ¾¯±¸¡£¡£¡£ÎªÌá·À´ËÀ๥»÷£¬£¬£¬£¬ £¬Óû§ÐèÌáÉýÇå¾²Òâʶ£¬£¬£¬£¬ £¬×Ðϸ¼ì²éÓʼþÖеÄURL£¬£¬£¬£¬ £¬²¢ÔÚµã»÷ǰͨ¹ý¹Ù·½ÇþµÀÑéÖ¤ÐÅÏ¢ÕæÎ±¡£¡£¡£


https://asec.ahnlab.com/en/82969/


3. FBIÖÒÑÔ³¯ÏʺڿÍÃé×¼¼ÓÃÜÇ®±ÒÁìÓò£¬£¬£¬£¬ £¬Éç»á¹¤³Ì¹¥»÷Ƶ·¢


9ÔÂ3ÈÕ£¬£¬£¬£¬ £¬ÃÀ¹úÁª°îÊÓ²ì¾Ö¿ËÈÕ·¢³ö½ôÆÈÖÒÑÔ£¬£¬£¬£¬ £¬Ö¸³ö³¯ÏʺڿÍ×éÖ¯ÕýÆð¾¢Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓòÌᳫ¸ß¶ÈÖØ´óµÄÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬ £¬Ö¼ÔÚÇÔÈ¡¼ÓÃÜ×ʲú¡£¡£¡£ÕâЩ¹¥»÷¼«¾ßÒþ²ØÐÔ£¬£¬£¬£¬ £¬¼´¼´ÊÇÍøÂçÇ徲ר¼ÒÒ²ÄÑÒÔÈÝÒײì¾õ¡£¡£¡£³¯ÏʺڿÍÊÂÏȶԼÓÃÜÇ®±ÒÉúÒâËùÉúÒâ»ù½ð£¨ETF£©¼°Ïà¹ØÐ¡ÎÒ˽¼Ò¾ÙÐÐÏ꾡µ÷ÑУ¬£¬£¬£¬ £¬ÏÔʾ³öÆä¶ÔDZÔÚÄ¿µÄµÄÉîÈëÏàʶºÍÖÜÃÜ×¼±¸¡£¡£¡£ËûÃDz»µ«Ãé×¼¼ÓÃÜÇ®±Ò¹«Ë¾£¬£¬£¬£¬ £¬»¹Õë¶Ô´¦Öóͷ£´ó×Ú¼ÓÃÜ×ʲúµÄ×éÖ¯Ìá³«ÍøÂçÈëÇÖ£¬£¬£¬£¬ £¬ÍýÏë͵ȡ×ʽ𡣡£¡£FBIÇ¿µ÷£¬£¬£¬£¬ £¬³¯ÏʺڿÍÉÆÓÚͨ¹ýÈ«ÐIJ߻®µÄÉç»á¹¤³ÌÊֶΣ¬£¬£¬£¬ £¬Î±×°³ÉÕÐÆ¸Ö°Ô±»ò×ÅÃûÐÐÒµÈËÊ¿£¬£¬£¬£¬ £¬Ê¹ÓÃÓÕÈ˵ľÍÒµºÍͶ×Êʱ»úÓÕÆ­Ô±¹¤ÖмÆ¡£¡£¡£ËûÃÇʹÓÃÁ÷ÀûµÄÓ¢ÓרҵµÄ¼ÓÃÜÇ®±Ò֪ʶ¼°Î±ÔìµÄÉí·ÝÐÅÏ¢£¬£¬£¬£¬ £¬¼«´óÌáÉýÁ˹¥»÷µÄ¿ÉÐŶÈ¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬ºÚ¿Í»¹ÉÆÓÚ¹¹½¨¿´ËÆÕýµ±µÄÍøÕ¾ºÍµÁÓÃͼƬ£¬£¬£¬£¬ £¬ÒÔ»ìÏýÊÓÌý¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬£¬£¬£¬ £¬FBIÁгöÁ˳¯ÏÊÉç»á¹¤³Ì»î¶¯µÄDZÔÚ¼£Ï󣬣¬£¬£¬ £¬²¢Îª¼ÓÃÜÇ®±ÒÐÐÒµ¼°ÆäÔ±¹¤ÌṩÁËÌá·À½¨Ò飬£¬£¬£¬ £¬°üÀ¨×ÐϸºË²éÓʼþȪԴ¡¢×èÖ¹µã»÷²»Ã÷Á´½Ó¡¢Í¨¹ý¹Ù·½ÇþµÀÑéÖ¤ÐÅÏ¢µÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-warns-crypto-firms-of-aggressive-social-engineering-attacks/?&web_view=true


4. BlindEagleʹÓÃBlotchyQuasar¹¥»÷¸çÂ×±ÈÑǰü¹ÜÒµ


9ÔÂ5ÈÕ£¬£¬£¬£¬ £¬Zscaler ThreatLabz½üÆÚ¼ì²âµ½BlindEagle£¨Ò²±»³ÆÎªAguilaCiega¡¢APT-C-36ºÍAPT-Q-98£©ÕâÒ»¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©ÐÐΪÕßµÄл¡£¡£¡£BlindEagleÖ÷Òª½«Ä¿µÄËø¶¨ÔÚÄÏÃÀÖÞ£¬£¬£¬£¬ £¬ÌØÊâÊǸçÂ×±ÈÑǺͶò¹Ï¶à¶ûµÄÕþ¸®ºÍ½ðÈÚ²¿·Ö×éÖ¯¼°Ð¡ÎÒ˽¼Ò¡£¡£¡£Æäͨ¹ýÈ«ÐÄÉè¼ÆµÄÍøÂç´¹ÂÚµç×ÓÓʼþ»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬ £¬ËæºóʹÓÃÉÌÆ·»¯µÄ.NETÔ¶³Ì»á¼ûľÂí£¨RAT£©ÈçAsyncRAT¡¢RemcosRAT¼°¶¨ÖƱäÌåBlotchyQuasarÇÔÈ¡ÒøÐÐЧÀÍÌṩÉÌµÄÆ¾Ö¤¡£¡£¡£´Ë´Î¹¥»÷ÌØÊâÕë¶Ô¸çÂ×±ÈÑǰü¹ÜÒµ£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßαװ³É¸çÂ×±ÈÑÇ˰Îñ»ú¹Ø£¨DIAN£©·¢ËͽôÆÈ֪ͨ£¬£¬£¬£¬ £¬Éù³ÆÒòδ¸¶Ë°¿î¶ø·¢³ö¿ÛѺÁ£¬£¬£¬ £¬ÆÈʹÊܺ¦ÕßÁ¬Ã¦Ðж¯¡£¡£¡£Êܺ¦Õß±»ÓÕµ¼ÏÂÔØ²¢ÔËÐÐÒ»¸öÊÜÃÜÂë±£»£» £»£»¤µÄZIP´æµµ£¬£¬£¬£¬ £¬¸Ã´æµµ°üÀ¨BlotchyQuasar¶ñÒâÈí¼þ¡£¡£¡£BlotchyQuasar¾ßÓÐǿʢµÄ¹¦Ð§£¬£¬£¬£¬ £¬Èç¼üÅ̼ͼ¡¢¼à¿ØÒøÐÐЧÀÍ´°¿ÚÎÊÌâÒÔ¼°Ö´ÐÐshellÏÂÁ£¬£¬£¬ £¬´Ó¶øÇÔȡ֧¸¶Ïà¹ØÊý¾Ý¡£¡£¡£ThreatLabzÒÔΪ´Ë´Î¹¥»÷¸ß¶È¿ÉÐŵØÓÉBlindEagleÌᳫ£¬£¬£¬£¬ £¬ÒòÆäÇкϸÃ×éÖ¯ÒÑÖªµÄ×÷°¸ÊÖ·¨ºÍÄ¿µÄÌØÕ÷¡£¡£¡£


https://www.zscaler.com/blogs/security-research/blindeagle-targets-colombian-insurance-sector-blotchyquasar


5. LiteSpeed CacheÎó²îµ¼ÖÂ600Íò¸öWordPressÍøÕ¾ÃæÁÙÕË»§½ÓÊÜΣº¦


9ÔÂ5ÈÕ£¬£¬£¬£¬ £¬WordPress¼ÓËÙ²å¼þLiteSpeed Cache½üÆÚÆØ³öÑÏÖØÇå¾²Îó²îCVE-2024-44000£¬£¬£¬£¬ £¬Ó°Ï쳬600ÍòWordPressÍøÕ¾Çå¾²¡£¡£¡£¸ÃÎó²îÊôÓÚδ¾­Éí·ÝÑéÖ¤µÄÕÊ»§½ÓÊÜÎÊÌ⣬£¬£¬£¬ £¬Ô´ÓÚ²å¼þµÄµ÷ÊÔÈÕÖ¾¹¦Ð§²»µ±´¦Öóͷ£Óû§»á»°cookie¡£¡£¡£µ±¸Ã¹¦Ð§ÆôÓÃʱ£¬£¬£¬£¬ £¬ËùÓÐHTTPÏìӦͷ£¨º¬Ãô¸Ðcookie£©±»Ð´ÈëδÊܱ£»£» £»£»¤µÄÈÕÖ¾Îļþ£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ý»á¼û¸ÃÎļþ¿ÉÇÔÈ¡cookie£¬£¬£¬£¬ £¬½ø¶øÃ°³äÖÎÀíÔ±¿ØÖÆÍøÕ¾¡£¡£¡£LiteSpeed TechnologiesѸËÙÏìÓ¦£¬£¬£¬£¬ £¬Ðû²¼6.5.0.1°æ±¾ÐÞ¸´Îó²î£¬£¬£¬£¬ £¬°üÀ¨½«ÈÕÖ¾ÒÆÖÁרÓÃÎļþ¼Ð¡¢Ëæ»ú»¯ÎļþÃû¡¢ÒƳýcookie¼Í¼ѡÏî¼°ÔöÉè±£»£» £»£»¤Îļþ¡£¡£¡£Óû§±»½¨Òéɨ³ýÎôÈÕÖ¾Îļþ²¢ÉèÖÃ.htaccess¹æÔò±ÜÃâÖ±½Ó»á¼û£¬£¬£¬£¬ £¬ÒÔ·ÀDZÔÚ¹¥»÷¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬¸Ã²å¼þ½üÆÚÒѶà´Î±»ÆØ³öÇå¾²Îó²î£¬£¬£¬£¬ £¬°üÀ¨Î´ÑéÖ¤¿çÕ¾¾ç±¾ºÍȨÏÞÉý¼¶Îó²î£¬£¬£¬£¬ £¬ºÚ¿Í»î¶¯ÆµÈÔ£¬£¬£¬£¬ £¬ÒÑÍù24СʱÄÚ¹¥»÷´ÎÊý¸ß´ï34Íò´Î£¬£¬£¬£¬ £¬Í¹ÏÔÁËʵʱ¸üкͼӹÌÇå¾²²½·¥µÄÖ÷ÒªÐÔ¡£¡£¡£WordPressÉçÇøºÍÓû§ÐèÇ×½ü¹Ø×¢²¢½ÓÄÉÏìÓ¦·À»¤²½·¥£¬£¬£¬£¬ £¬ÒÔÈ·±£ÍøÕ¾Çå¾²¡£¡£¡£


https://www.bleepingcomputer.com/news/security/litespeed-cache-bug-exposes-6-million-wordpress-sites-to-takeover-attacks/


6. ºÚ¿ÍÏÝÚ壺αÔìOnlyFans¹¤¾ßDZÔÚLumma¶ñÒâÈí¼þ


9ÔÂ5ÈÕ£¬£¬£¬£¬ £¬ºÚ¿ÍÃǽüÆÚ½ÓÄÉÁËÒ»ÖÖ½ÆÕ©µÄÕ½ÂÔ£¬£¬£¬£¬ £¬Ê¹ÓÃαÔìµÄOnlyFansÕË»§¼ì²é¹¤¾ß×÷ΪÓÕ¶ü£¬£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸ÆäËûºÚ¿ÍȺÌå¡£¡£¡£ÕâЩ¹¤¾ßÉù³ÆÄÜÑéÖ¤²¢ÇÔÈ¡OnlyFansÕË»§£¬£¬£¬£¬ £¬ÊµÔòDZÔÚLummaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬Í¨¹ýGitHubµÈÇþµÀÈö²¥¡£¡£¡£Lumma×÷ΪһÖָ߼¶µÄMaaS£¨¶ñÒâÈí¼þ¼´Ð§ÀÍ£©£¬£¬£¬£¬ £¬²»µ«¾ß±¸Ç¿Ê¢µÄÐÅÏ¢ÇÔÈ¡ÄÜÁ¦£¬£¬£¬£¬ £¬»¹ÄܼÓÔØÆäËû¶ñÒâ¸ºÔØ£¬£¬£¬£¬ £¬¶ÔÊܺ¦ÕßµÄϵͳÔì³ÉÉî¶ÈË𺦡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬ £¬ºÚ¿ÍÃÇÈ«ÐÄÉè¼ÆÁËÏÝÚ壬£¬£¬£¬ £¬Ê¹ÍþвÐÐΪÕßÔÚʵÑéÑéÖ¤OnlyFansÕË»§Ê±£¬£¬£¬£¬ £¬²»Öª²»¾õÖÐѬȾÁËLumma£¬£¬£¬£¬ £¬½ø¶øÌ»Â¶ÁË×ÔÉíµÄÃô¸ÐÐÅÏ¢¡£¡£¡£Lumma»¹Í¨¹ýÆäÎÞаµÄÈö²¥·½·¨£¬£¬£¬£¬ £¬Èç¶ñÒâ¹ã¸æ¡¢É罻ýÌå̸Â۵ȣ¬£¬£¬£¬ £¬Ò»Ö±À©´óÆäÓ°Ïì¹æÄ£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ²»µ«ÄÜÇÔÈ¡ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢µÈ¹Å°åÊý¾Ý£¬£¬£¬£¬ £¬»¹Äָܻ´ÓâÆÚµÄGoogle»á»°ÁîÅÆ£¬£¬£¬£¬ £¬ÏÔʾ³öÆä¸ß¶ÈµÄÊÖÒÕÖØ´óÐÔºÍΣº¦ÐÔ¡£¡£¡£´Ë´Î¹¥»÷²»µ«ÏÞÓÚOnlyFansÕË»§£¬£¬£¬£¬ £¬»¹À©Õ¹µ½Disney+¡¢InstagramµÈ¶à¸öƽ̨£¬£¬£¬£¬ £¬ÉõÖÁ°üÀ¨Mirai½©Ê¬ÍøÂç¹¹½¨Æ÷µÄÈö²¥£¬£¬£¬£¬ £¬ÏÔʾÁ˹¥»÷Õ߯ձ鶸¶àÑùµÄÄ¿µÄÑ¡Ôñ¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬¹¥»÷Õß»¹Ê¹ÓÃGitHubµÈ¿ªÔ´Æ½Ì¨ÍйܶñÒâ¸ºÔØ£¬£¬£¬£¬ £¬½øÒ»²½ÔöÌíÁËÒþ²ØÐÔºÍÈö²¥Ð§ÂÊ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hacker-trap-fake-onlyfans-tool-backstabs-cybercriminals-steals-passwords/