ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿£¿£¿£¿£¿£¿£¿éÈÆ¹ýÉí·ÝÑéÖ¤
Ðû²¼Ê±¼ä 2025-08-051. ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿£¿£¿£¿£¿£¿£¿éÈÆ¹ýÉí·ÝÑéÖ¤
8ÔÂ2ÈÕ£¬£¬£¬ÍøÂçÇå¾²ÁìÓò¿ËÈÕÅû¶һ¿îÃûΪ"Plague"µÄÐÂÐÍLinuxºóÃųÌÐò£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýαװ³É¿É²å°ÎÈÏ֤ģ¿£¿£¿£¿£¿£¿£¿é£¨PAM£©ÊµÏÖ³¤´ïÒ»ÄêµÄÒþ²ØÔËÐС£¡£¡£¾ÝNextron SystemsÑо¿Ô±Pierre-Henri PezierÕ¹ÏÖ£¬£¬£¬¸ÃÖ²Èë³ÌÐòÉî¶È¼¯³ÉÓÚLinuxϵͳµÄÈÏÖ¤¿ÍÕ»£¬£¬£¬Í¨¹ýÌæ»»»ò¸Ä¶¯PAMÄ£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»¾²Ä¬ÈƹýϵͳÈÏÖ¤»úÖÆ£¬£¬£¬½¨É賤ÆÚµÄSSH»á¼ûͨµÀ¡£¡£¡£×÷ΪUNIX/Linuxϵͳ½¹µã×é¼þ£¬£¬£¬PAMͨ¹ý¹²Ïí¿âʵÏÖÓû§ÈÏÖ¤µÄ¼¯Öл¯ÖÎÀí£¬£¬£¬µ«ÕâÒ»ÌØÕ÷±»¶ñÒâÈí¼þ¿ª·¢ÕßʹÓᣡ£¡£µ±¶ñÒâPAMÄ£¿£¿£¿£¿£¿£¿£¿é¼ÓÔØÖÁÌØÈ¨Àú³Ìʱ£¬£¬£¬¿ÉͬʱʵÏÖÆ¾Ö¤ÇÔÈ¡¡¢ÈÏÖ¤Á÷³ÌÈÆ¹ý¼°Çå¾²¹¤¾ß¹æ±ÜÈýÖØ¹¦Ð§¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬×Ô2024Äê7ÔÂ29ÈÕÆð£¬£¬£¬VirusTotalƽ̨ÒÑÊÕ¼¶à¸öPlagueÑù±¾£¬£¬£¬µ«×èÖ¹Åû¶ʱËùÓÐÖ÷Á÷·´²¡¶¾ÒýÇæ¾ù佫Æäʶ±ðΪÍþв£¬£¬£¬ÌåÏָÿò¼Ü¾ß±¸³ÉÊìµÄÃâɱÊÖÒÕ¡£¡£¡£
https://thehackernews.com/2025/08/new-plague-pam-backdoor-exposes.html
2. ºÚ¿Í×éÖ¯CL-STA-0969DZÔÚ10¸öÔ£¬£¬£¬ÏòµçÐÅÍøÂçÖ²ÈëÒþ²Ø¶ñÒâÈí¼þ
8ÔÂ2ÈÕ£¬£¬£¬¶«ÄÏÑǵçÐÅ×éÖ¯½üÆÚÔâÓö¹ú¼Ò¼¶Íþв×éÖ¯CL-STA-0969µÄ¶¨ÏòÍøÂç¹¥»÷£¬£¬£¬¸Ã×é֯ͨ¹ý°²ÅŸ߶ȶ¨ÖÆ»¯µÄ¶ñÒ⹤¾ßÁ´ÊµÏÖ¶ÔÄ¿µÄÍøÂçµÄÔ¶³Ì¿ØÖÆ¡£¡£¡£¾ÝPalo Alto NetworksÆìÏÂUnit 42ʵÑéÊÒÅû¶£¬£¬£¬2024Äê2ÔÂÖÁ11ÔÂʱ´ú£¬£¬£¬¸Ã×éÖ¯Õë¶Ô¶«ÄÏÑÇÒªº¦µçÐÅ»ù´¡ÉèÊ©Ìᳫ¶àÆð¹¥»÷ÊÂÎñ£¬£¬£¬Ê¹ÓÃCordscanµÈ¹¤¾ßÍøÂçÒÆ¶¯×°±¸Î»ÖÃÊý¾Ý£¬£¬£¬µ«ÊÓ²ìÏÔʾÆäδʵÑéÊý¾ÝÍâй»ò×°±¸×·×ÙÐÐΪ¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬CL-STA-0969×Ô2020ÄêÆðÒ»Á¬Õë¶ÔÄÏÑÇ¡¢·ÇÖÞµçÐÅʵÌ忪չÇ鱨ÇÔÈ¡»î¶¯£¬£¬£¬Æä²¿·Ö¹¥»÷ÊÖ·¨Óë×ÅÃûAPT×éÖ¯"LightBasin"£¨UNC1945£©¼°½ðÈÚ·¸·¨ÕûÌå"UNC2891"±£´æ¹ØÁª¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬¹¥»÷Õßͨ¹ýSSH±©Á¦ÆÆ½âµçÐÅ×°±¸ÄÚÖÃÕË»§»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬Ê¹Óö¨ÖÆ»¯×ÖµäÁбíʵÑ鶨ÏòÍ»ÆÆ¡£¡£¡£Æä¹¤¾ßÁ´°üÀ¨Áù´ó½¹µã×é¼þ£ºÁýÕÖÕýµ±PAMÄ£¿£¿£¿£¿£¿£¿£¿éµÄAuthDoorƾ֤ÇÔÈ¡¹¤¾ß¡¢ÀÄÓÃGTP-CÐÒéµÄGTPDoorÒþ²ØC2ͨµÀ¡¢»ùÓÚICMP»ØÏÔµÄEchoBackdoorÎÞ¼ÓÃÜÖ¸Áî´«Ê䡢ģÄâSGSN½ÚµãµÄÍøÂçÁ÷Á¿ÈÆÐÐÊÖÒÕ£¬£¬£¬ÒÔ¼°¾ß±¸Ô¶³ÌShellºÍ¼üÅ̼ͼ¹¦Ð§µÄChronosRATºóÃÅ¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇNoDepDNS¹¤¾ß£¬£¬£¬¸Ã»ùÓÚGolangµÄDNSËíµÀºóÃÅͨ¹ýÔʼÌ×½Ó×ÖÆÊÎö53¶Ë¿ÚUDPÖ¸Á£¬£¬ÊµÏÖ¿ç·À»ðǽͨѶ¡£¡£¡£
https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html
3. Ô½ÄϺڿÍʹÓÃPXAÇÔÈ¡Èí¼þ¹¥»÷È«Çò4000¸öIPµØµã
8ÔÂ4ÈÕ£¬£¬£¬ÍøÂçÇå¾²ÁìÓò½üÆÚÆØ¹âÒ»ÆðÓÉÔ½ÄϺڿÍÍÅ»ïÌᳫµÄ¿ç¹úÍøÂç·¸·¨»î¶¯£¬£¬£¬Æä½¹µã¹¤¾ßΪÐÂÐÍPythonÐÅÏ¢ÇÔȡľÂí"PXA Stealer"¡£¡£¡£¾ÝBeazley SecurityÓëSentinelOneÁªºÏ±¨¸æ£¬£¬£¬¸Ã·¸·¨¼¯ÍÅͨ¹ýTelegram API¹¹½¨¶©ÔÄÖÆµØÏÂÉú̬£¬£¬£¬ÒÑÀֳɹ¥ÏÝ62¸ö¹ú¼Ò³¬4000̨װ±¸£¬£¬£¬ÇÔÈ¡°üÀ¨20Íò×é×ÔÁ¦ÃÜÂë¡¢Êý°ÙÌõÐÅÓÿ¨ÐÅÏ¢¼°400ÍòÌõä¯ÀÀÆ÷CookieµÄÃô¸ÐÊý¾Ý£¬£¬£¬Ðγɼ¯Êý¾ÝÇÔÈ¡¡¢×Ô¶¯»¯×ªÊÛÓ븴ÓÃÓÚÒ»ÌåµÄÍêÕû·¸·¨¹¤ÒµÁ´¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬PXA StealerµÄÊÖÒÕÑݽø·ºÆðÏÔÖøÍ»ÆÆ¡£¡£¡£×îÔçÓÉ˼¿ÆTalosÓÚ2024Äê11Ô·¢Ã÷µÄ¸ÃľÂí£¬£¬£¬×î³õÕë¶ÔÅ·ÑÇÕþ¸®¼°½ÌÓý»ú¹¹ÊµÑ鶨Ïò¹¥»÷£¬£¬£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢½ðÈÚ»ú¹¹ÐÅÏ¢¼°ä¯ÀÀÆ÷×Ô¶¯Ìî³äÊý¾Ý¡£¡£¡£2025Äê¹¥»÷»î¶¯Éý¼¶ºó£¬£¬£¬·¸·¨ÍÅ»ï½ÓÄÉDLL²à¼ÓÔØÊÖÒÕÓëÖØ´ó·Ö½×¶Î°²ÅÅ²ã¹æ±Ü¼ì²â£¬£¬£¬Í¨¹ýÏòÊܺ¦Õßչʾ°æÈ¨ÇÖȨ֪ͨµÈ·Ç¶ñÒâÓÕ¶üÎĵµÍê³ÉѬȾÁ÷³Ì¡£¡£¡£Ð°æÄ¾ÂíÍ»ÆÆChromiumä¯ÀÀÆ÷"Ó¦Óð󶨼ÓÃܱ£»£»£»£»¤"»úÖÆ£¬£¬£¬½«¹¥»÷¹æÄ£À©Õ¹ÖÁVPN¿Í»§¶Ë¡¢ÔÆÏÂÁîÐй¤¾ß£¨CLI£©¡¢¹²ÏíÎļþ¼°DiscordµÈÓ¦ÓÃÊý¾Ý¡£¡£¡£
https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
4. ÏãÄζùÏÝSalesforceÊý¾Ýй¶·ç²¨£ºShinyHunters×éÖ¯Ò»Á¬¹¥»÷
8ÔÂ4ÈÕ£¬£¬£¬·¨¹úʱÉоÞÍ·ÏãÄζù¿ËÈÕ³ÉΪ¿ç¹úÊý¾Ý͵ÇÔÀ˳±ÖеÄ×îÐÂÊܺ¦Õߣ¬£¬£¬ÆäÃÀ¹ú¿Í»§Ð§ÀÍÖÐÐÄÊý¾Ý¿âÔâÈëÇÖµ¼ÖÂÓû§ÐÅϢй¶¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬´Ë´ÎÊÂÎñÔ´ÓÚÍþвÐÐΪÕß¶ÔÏãÄζùµÚÈý·½Ð§ÀÍÌṩÉÌSalesforceʵÀýµÄ²»·¨»á¼û£¬£¬£¬¹¥»÷Õßͨ¹ýÓïÒô´¹ÂÚºÍÉç»á¹¤³ÌÊÖ¶ÎÇÔȡԱ¹¤Æ¾Ö¤£¬£¬£¬»òÓÕÆÆäÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò£¬£¬£¬×îÖÕÓÚ7ÔÂ25ÈÕÀÖ³ÉÉøÍ¸ÏµÍ³¡£¡£¡£Ð¹Â¶Êý¾Ýº¸Ç²¿·ÖÃÀ¹ú¿Í»§µÄÐÕÃû¡¢µç×ÓÓʼþ¡¢Óʼĵص㼰µç»°ºÅÂëµÈÓÐÏÞСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ÏãÄζùÒÑÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬£¬£¬µ«Î´¹ûÕæÏêϸÊÜÓ°ÏìÈËÊý¼°µÚÈý·½Ð§ÀÍÉÌÃû³Æ¡£¡£¡£´Ë´Î¹¥»÷±»¹éÒòÓÚÀÕË÷×éÖ¯ShinyHuntersÌᳫµÄÒ»Á¬ÐÔSalesforce¶¨Ïò¹¥»÷¡£¡£¡£¾ÝMandiantÆÊÎö£¬£¬£¬¸ÃÍÅ»ïͨ¹ýÖØ´óµÄÉç»á¹¤³ÌÕ½ÂÔ»ñÈ¡ÆóÒµSalesforceÕË»§¿ØÖÆÈ¨£¬£¬£¬½ø¶øÇÔÈ¡Êý¾Ý¿âʵÑéÀÕË÷¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Salesforce¹Ù·½Ç¿µ÷Æäƽ̨δ±»Ö±½ÓÈëÇÖ£¬£¬£¬ÎÊÌâÔ´ÓÚ¿Í»§ÕË»§Çå¾²²½·¥È±·¦£¬£¬£¬²¢ÖØÉêÆóÒµ¼¶Çå¾²»úÖÆÒÑÈÚÈëÆ½Ì¨µ×²ãÉè¼Æ£¬£¬£¬µ«¿Í»§ÈÔÐè¼ç¸ºÊý¾Ý±£»£»£»£»¤ÔðÈΡ£¡£¡£¸Ã¹«Ë¾½¨ÒéÓû§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡¢×ñÕÕ×îСȨÏÞÔÔò¼°ÑÏ¿áÖÎÀíµÚÈý·½Ó¦ÓÃÅþÁ¬£¬£¬£¬²¢Ðû²¼Çå¾²Ö¸ÄÏÐÖúÌá·ÀÀàËÆ¹¥»÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/
5. ĦÄɸçÉÝ»ªÂùݼ¯ÍÅÔâD4rk4rmyºÚ¿Í×éÖ¯Êý¾Ýй¶
8ÔÂ4ÈÕ£¬£¬£¬Ä¦Äɸç°ÙÄêÉÝ»ªÂùݼ¯ÍÅÃÉÌØ¿¨Âå±õº£¶È¼ÙÂùݣ¨SBM£©¿ËÈÕ¾íÈëÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬ÍøÂç·¸·¨¼¯ÍÅD4rk4rmyÐû³Æ¶ÔÆä·¢¶¯ºÚ¿Í¹¥»÷£¬£¬£¬²¢½«¸Ã¼¯ÍÅÁÐÈëÆäTor°µÍøÐ¹ÃÜÍøÕ¾µÄÊܺ¦ÕßÃûµ¥¡£¡£¡£×÷ΪĦÄɸ繫¹úÏóÕ÷ÐÔÆóÒµ£¬£¬£¬SBM×Ô1863Ä꽨ÉèÒÔÀ´Ê¼ÖÕÖ÷µ¼×ÅÍâµØºÀ»ªÂùݡ¢²©²Ê¼°¸ß¶Ë²ÍÒû¹¤Òµ£¬£¬£¬ÆäÆìÏÂÃÉÌØ¿¨Âå¶Ä³¡Óë°ÍÀè´óÂùݸüÊÇÈ«Çò¾«Ó¢½×¼¶µÄ±ê¼ÇÐÔÉç½»³¡ºÏ¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÊÂÎñ²»µ«Íþвµ½¸ß¶Ë¿Í»§Òþ˽Çå¾²£¬£¬£¬¸ü¿ÉÄÜÒ¡¶¯Ä¦ÄɸçÉÝ³ÞÆ·ÐÐÒµ¿àÐÄı»®µÄÆ·ÅÆÐÎÏ󡣡£¡£¹¥»÷ÕßÉù³ÆÒÑÇÔÈ¡´ó×ÚÃô¸Ð¿Í»§Êý¾ÝÓ빫˾ÄÚ²¿Îļþ£¬£¬£¬ÏêϸӰÏì¹æÄ£ÉÐδÍêÈ«Åû¶¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬´Ë´ÎÊÂÎñ͹ÏÔÍøÂç·¸·¨·Ö×ÓÕý½«Ä¿µÄתÏò¸ß¾»ÖµÐ§ÀÍÒµ£¬£¬£¬ÕâÀà»ú¹¹ËäÓµÓÐÑÏ¿áµÄÇå¾²·À»¤ÏµÍ³£¬£¬£¬È´ÒòÕÆÎÕ´ó×ڸ߼ÛÖµ¿Í»§Êý¾Ý¶ø³ÉΪ¹¥»÷ÕßµÄ"ÓÅѡĿµÄ"¡£¡£¡£ÍøÂçÇ徲ר¼ÒÖ¸³ö£¬£¬£¬Èôй¶ÐÅÏ¢Éæ¼°ÕþÉÌÒªÔ±»òÉñÃØÉÌÒµÊý¾Ý£¬£¬£¬¿ÉÄÜÒý·¢Á¬Ëø·´Ó¦£¬£¬£¬²¨¼°SBMµÄ¿ç¹úÏàÖúͬ°é¹ØÏµÓë¸ß¶Ë¿Í»§ÐÅÈζȡ£¡£¡£
https://securityaffairs.com/180780/cyber-crime/hacking-group-d4rk4rmy-claimed-the-hack-of-monte-carlo-societe-des-bains-de-mer.html
6. CTM360·¢Ã÷Õë¶ÔTikTok ShopÓû§µÄ¶ñÒâ¡°ClickTok¡±»î¶¯
8ÔÂ4ÈÕ£¬£¬£¬ÍøÂçÇå¾²»ú¹¹CTM360¿ËÈÕÅû¶´úºÅ"ClickTok"µÄÐÂÐÍ¿çÆ½Ì¨Õ©ÆÐж¯£¬£¬£¬¸Ã×é֯ͨ¹ý¹¹½¨ÍêÕûÐéαTikTokÉÌÒµÉú̬£¬£¬£¬Á¬ÏµÍøÂç´¹ÂÚÓëSparkKittyÌØ¹¤Èí¼þʵÑé¼ÓÃÜÇ®±Ò͵ÇÔ¡£¡£¡£¹¥»÷ÕßʹÓÃAIÌìÉúÊÓÆµÔÚTikTokƽ̨´ó¹æÄ£ÒýÁ÷£¬£¬£¬ÓÕµ¼Óû§»á¼ûÈ«ÐÄαÔìµÄÓòÃû£¬£¬£¬Í¨¹ý¼ÓÃÜÇ®±ÒÖ§¸¶ÒªÇóÓÕµ¼×°ÖÃǶÌ×¶ñÒâ´úÂëµÄ"TikTokÐ޸İæ"Ó¦Óᣡ£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬¸ÃľÂíÓ뿨°Í˹»ù´ËÇ°ÆØ¹âµÄSparkCatÌØ¹¤Èí¼þ±£´æÊÖÒÕ¹ØÁª£¬£¬£¬Æä±äÖÖSparkKittyͨ¹ý×¢ÈëChromiumä¯ÀÀÆ÷Àú³ÌÍ»ÆÆ¹Å°å¼ÓÃܱ£»£»£»£»¤£¬£¬£¬¿ÉÉî¶ÈÇÔȡװ±¸½ØÍ¼¡¢VPNƾ֤¡¢ÔÆÐ§ÀÍCLI¹¤¾ßÊý¾Ý¼°DiscordµÈÓ¦ÓÃÐÅÏ¢¡£¡£¡£ÓÈΪֵµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸Ã×éÖ¯½ÓÄÉ"Ó¦Óð󶨼ÓÃܱ£»£»£»£»¤"Í»ÆÆÊÖÒÕ£¬£¬£¬Ê¹¶ñÒâ´úÂëÄÜÈÆ¹ýͨÀýÇå¾²¼ì²â¡£¡£¡£¾ÝCTM360ͳ¼Æ£¬£¬£¬´Ë´ÎÐж¯ÒѰ²Åų¬10000¸öÐéαÓòÃû¼°5000¸ö¶ñÒâÓ¦ÓÃʵÀý£¬£¬£¬Í¨¹ý¶þάÂë¡¢¼´Ê±Í¨Ñ¶Èí¼þ¼°Ó¦ÓÃÄÚÏÂÔØÊµÏÖÁѱäʽÈö²¥¡£¡£¡£¹¥»÷Õß¹¹½¨ÁËÍêÕûµÄµØÏÂÉúÒâÁ´£ºÇÔÈ¡Êý¾Ý¾SherlockµÈºÚÊÐÆ½Ì¨×ªÊÛ£¬£¬£¬ÏÂÓη¸·¨ÍÅ»ï¿ÉʹÓûñÈ¡µÄTikTokÕ˺ÅʵÑé¶þ´ÎÕ©Æ»òÉøÍ¸¹¥»÷£¬£¬£¬ÐγÉ"Êý¾ÝÇÔÈ¡-ƽ̨ÍйÜ-¶©ÔÄÏúÊÛ"µÄ¹¤Òµ»¯·¸·¨Ä£Ê½¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ctm360-spots-malicious-clicktok-campaign-targeting-tiktok-shop-users/


¾©¹«Íø°²±¸11010802024551ºÅ