¹ú¼ÊÁªºÏÐж¯µ·»ÙTycoon2FA´¹ÂÚÆ½Ì¨

Ðû²¼Ê±¼ä 2026-03-06

1. ¹ú¼ÊÁªºÏÐж¯µ·»ÙTycoon2FA´¹ÂÚÆ½Ì¨


3ÔÂ4ÈÕ£¬ £¬£¬Å·ÖÞÐ̾¯×é֯Эµ÷µÄ¹ú¼ÊÖ´·¨Ðж¯¿ËÈÕÀֳɵ·»ÙTycoon2FA´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨¡£¡£¡£´Ë´ÎÐж¯ÓÉ΢ÈíÔÚ˽ӪÏàÖúͬ°éͬÃËÖ§³ÖÏÂÌᳫÊÖÒÕÖÐÖ¹£¬ £¬£¬À­ÍÑάÑÇ¡¢Á¢ÌÕÍð¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Î÷°àÑÀºÍÓ¢¹úÖ´·¨²¿·ÖÖ´ÐÐÓòÃû²é·âµÈ²½·¥£¬ £¬£¬¹²¹Ø±Õ330¸öÊôÓÚ·¸·¨Ð§ÀÍ»ú¹¹Ö÷¸É»ù´¡ÉèÊ©µÄÓòÃû£¬ £¬£¬°üÀ¨¿ØÖÆÃæ°åºÍ´¹ÂÚÒ³Ãæ¡£¡£¡£Tycoon2FA×Ô2023Äê8ÔÂÆð»îÔ¾£¬ £¬£¬±»ÍøÂç·¸·¨·Ö×ÓÓÃÓÚÈÆ¹ý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£» £»£»¤£¬ £¬£¬ÈëÇÖÈ«Çò½ü10Íò¸ö×éÖ¯µÄÕË»§¡£¡£¡£¾Ý΢ÈíÊý¾Ý£¬ £¬£¬ÖÁ2025ÄêÄêÖУ¬ £¬£¬¸Ãƽ̨ÿÔÂÌìÉúÊýÍòÍò·â´¹ÂÚÓʼþ£¬ £¬£¬Ó°Ï쳬50Íò¸ö×éÖ¯£¬ £¬£¬Õ¼ËùÓб»×èµ²´¹ÂÚʵÑéµÄ60%¡£¡£¡£ÆäÊÖÒÕÔ­ÀíΪͨ¹ý·´ÏòÊðÀíЧÀÍÆ÷ʵʱ×èµ²Êܺ¦ÕߵǼƾ֤ºÍ»á»°cookie£¬ £¬£¬Ä£ÄâMicrosoft 365¡¢OneDrive¡¢Outlook¡¢SharePoint¼°GmailµÈ¿ÉÐÅÆ·ÅƵÇÂ¼Ò³Ãæ¡£¡£¡£×ÝÈ»Êܺ¦ÕßÍê³ÉÕý³£µÇ¼£¬ £¬£¬¹¥»÷ÕßÈÔÄÜÐ®ÖÆÒÑÈÏÖ¤»á»°²¢ÈƹýMFA±£»£»£» £»£»¤£¬ £¬£¬³ý·Ç»î¶¯»á»°ºÍÁîÅÆ±»Ã÷È·×÷·Ï¡£¡£¡£¸Ãƽ̨ͨ¹ýTelegramÒÔ120ÃÀÔª10ÌìʹÓÃȨµÄ¼ÛÇ®³öÊÛ£¬ £¬£¬´ó·ù½µµÍµÍÊÖÒÕ·¸·¨·Ö×ÓÌá³«ÖØ´óMFAÈÆ¹ý¹¥»÷µÄÃż÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/


2. ÒÁÀÊÎÞÈË»úÏ®»÷ÑÇÂíÑ·Öж«Êý¾ÝÖÐÐÄÖÂÔÆÐ§ÀÍÖÐÖ¹


3ÔÂ3ÈÕ£¬ £¬£¬ÒÁÀÊ±ÊÆÜ¶ÔÑÇÂíÑ·ÔÚ°¢ÁªÇõºÍ°ÍÁÖµÄÈý×ùÊý¾ÝÖÐÐÄ·¢¶¯ÎÞÈË»úÏ®»÷£¬ £¬£¬µ¼ÖÂÖж«²¿·ÖµØÇøÔÆÐ§ÀÍÖÐÖ¹£¬ £¬£¬µØÇøÖ÷ÒªÊ±ÊÆ½øÒ»²½¶ñ»¯¡£¡£¡£¾ÝÑÇÂíÑ·Åû¶£¬ £¬£¬°¢ÁªÇõÁ½×ùÊý¾ÝÖÐÐÄÔâÎÞÈË»ú¡°Ö±½Ó»÷ÖС±£¬ £¬£¬°ÍÁÖÉèÊ©Òò¡°½ü¾àÀëÎÞÈË»úÏ®»÷¡±ÊÜË𣬠£¬£¬¹²Ôì³ÉÔ¼60ÏîÑÇÂíÑ·ÔÆÐ§ÀÍÖÐÖ¹£¬ £¬£¬Ó°ÏìÍøÂçÁ÷Á¿¼°ÒÀÀµÔÆÐ§À͵ÄÓªÒµÔËÓª¡£¡£¡£´Ë´ÎÏ®»÷±¬·¢ÔÚÃÀÒÔÁªºÏ¹¥»÷µ¼ÖÂÒÁÀÊ×î¸ßÊ×ÄÔ¹þ÷ÄÚÒÁ¼°¶àÃû¸ß¼¶¹ÙÔ±ÉíÍöºó£¬ £¬£¬ÒÁÀÊËæ¼´¶Ô°¢ÁªÇõ¼°ÁÚ¹úÕö¿ªÅê»÷Ðж¯£¬ £¬£¬Ä¿µÄ²»µ«°üÀ¨ÃÀ¾ü»ùµØ£¬ £¬£¬»¹À©Õ¹ÖÁ»ú³¡¡¢Âùݼ°Òªº¦ÓÍÆø»ù´¡ÉèÊ©¡£¡£¡£ÑÇÂíÑ·ÉùÃ÷Ö¸³ö£¬ £¬£¬Ï®»÷Ôì³ÉÊý¾ÝÖÐÐĽṹË𻵡¢µçÁ¦ÖÐÖ¹£¬ £¬£¬²¢´¥·¢Ïû·Àϵͳµ¼ÖÂÊÒÄÚË®Ë𣬠£¬£¬ÍâµØÏû·À²¿·ÖÔÚɱ¾ø²Ðº¡ÒýÉúÆøÔÖʱ¹Ø±ÕÁ˵çÔ´ºÍ·¢µç»ú£¬ £¬£¬½øÒ»²½¼Ó¾çЧÀÍÖÐÖ¹¡£¡£¡£ÑÇÂíÑ·ÌåÏÖ£¬ £¬£¬ÏÖÔÚÕýÓëµØ·½Õþ¸®ÏàÖúÓÅÏȰü¹ÜÔ±¹¤Çå¾²£¬ £¬£¬²¢½¨ÒéÖж«¿Í»§±¸·ÝÒªº¦Êý¾Ý£¬ £¬£¬½«Ó¦ÓÃǨáãÖÁÆäËûAWSÇøÓò¡£¡£¡£¹«Ë¾Ç¿µ÷£¬ £¬£¬ÖÜÈ«»Ö¸´È¡¾öÓÚÊÜÓ°Ïì»ù´¡ÉèÊ©µÄÐÞ¸´½ø¶È£¬ £¬£¬¶øÄ¿½ñÖж«Ò»Á¬³åÍ»µ¼ÖÂÕûÌåÔËÓªÇéÐÎÈÔ²»¿ÉÕ¹Íû¡£¡£¡£


https://therecord.media/iran-drone-strikes-hit-amazon-data-centers-gulf


3. ¹È¸èÅû¶CorunaÐÂÐÍiOSÎó²îʹÓù¤¾ß°ü


3ÔÂ5ÈÕ£¬ £¬£¬¹È¸èÍþвÇ鱨С×飨GTIG£©·¢Ã÷ÃûΪCoruna£¨ÓÖÃûCryptoWaters£©µÄÐÂÐÍiOSÎó²îʹÓù¤¾ß°ü£¬ £¬£¬¸Ã¹¤¾ß°üÕë¶ÔÔËÐÐiOS 13.0ÖÁ17.2.1°æ±¾µÄiPhone£¬ £¬£¬°üÀ¨ÎåÌõÍêÕûÎó²îʹÓÃÁ´¹²23¸öÎó²î³ÌÐò¡£¡£¡£Coruna¶Ô¾É°æiOS¾ßÓÐÇ¿¹¥»÷ÄÜÁ¦£¬ £¬£¬µ«¶ÔiOS 17.3¼°ÒÔÉϰ汾ÎÞЧ£¬ £¬£¬ÒòCVE-2024-23222µÈÎó²îÒÑÔÚ17.3ÖÐÐÞ¸´¡£¡£¡£¸Ã¹¤¾ß°üÓÉ¼à¿Ø×°±¸¹©Ó¦É̿ͻ§Ê×´ÎʹÓ㬠£¬£¬ºó±»¶à¸öÍþв×éÖ¯¸´ÓÃˢС£¡£¡£UNC6353ÔÚÎÚ¿ËÀ¼Ìᳫˮ¿Ó¹¥»÷£¬ £¬£¬Öйú½ðÈÚÍþв×éÖ¯UNC6691Ôòͨ¹ýÐéα½ðÈÚÍøÕ¾°²ÅÅÍêÕû¹¤¾ß°ü£¬ £¬£¬Ê¹ÓÃÒþ²ØiFrameͶ·ÅÎó²î³ÌÐò£¬ £¬£¬Ì»Â¶»îÔ¾µÄ¡°¶þÊÖ¡±ÁãÈÕÎó²îÊг¡¡£¡£¡£ÊÖÒÕ²ãÃæ£¬ £¬£¬Coruna¿ò¼Ü½ÓÄÉÆæÒìJavaScript»ìÏýÊÖÒÕ£¬ £¬£¬Í¨¹ý×°±¸Ö¸ÎÆÊ¶±ð¼ÓÔØ¶ÔÓ¦Îó²î³ÌÐò¡£¡£¡£Æä½¹µã°üÀ¨WebKitÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²îʹÓá¢Ö¸ÕëÈÏÖ¤£¨PAC£©ÈƹýÄ£¿£¿£¿£¿é£¬ £¬£¬ÒÔ¼°¿ÉÖØÓÃ×é¼þ£¬ £¬£¬ÓÃÓÚÈÆ¹ýÓû§Ì¬RWXÄÚ´æ·ÖÅÉÏÞÖÆ¡£¡£¡£¹È¸èÒÑÐû²¼ÈëÇÖÖ¸±ê£¨IOC£©ºÍYara¹æÔò£¬ £¬£¬²¢½«Ïà¹ØÓòÃû¼ÓÈëÇå¾²ä¯ÀÀ±£»£»£» £»£»¤¡£¡£¡£


https://securityaffairs.com/188928/security/google-uncovers-coruna-ios-exploit-kit-targeting-ios-13-17-2-1.html


4. Bing AIËÑË÷Èö²¥Î±ÔìOpenClawµÄ¶ñÒâÈí¼þ


3ÔÂ5ÈÕ£¬ £¬£¬½üÆÚ£¬ £¬£¬Íйܼì²âÓëÏìÓ¦¹«Ë¾HuntressÅû¶һÆðÐÂÐÍÍøÂç¹¥»÷»î¶¯£ºÍþвÐÐΪÕßͨ¹ýαÔìGitHub´æ´¢¿â£¬ £¬£¬Á¬ÏµÎ¢ÈíBingµÄAIÔöÇ¿ËÑË÷¹¦Ð§£¬ £¬£¬ÏòÊÔͼװÖÿªÔ´AIÊðÀíOpenClawµÄÓû§Èö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò¼°ÊðÀí¶ñÒâÈí¼þ¡£¡£¡£OpenClawÒòÆäÄÜ»á¼ûÍâµØÎļþ²¢¼¯³Éµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶µÈÔÚÏßЧÀ͵Ĺ¦Ð§ÌØÕ÷£¬ £¬£¬³ÉΪ¹¥»÷ÕßÑÛÖеġ°ÀíÏëÔØÌ塱¡£¡£¡£¹¥»÷ÕßÊ×ÏȽ¨Éè¶ñÒâGitHub´æ´¢¿â£¬ £¬£¬Î±×°³ÉOpenClaw¹Ù·½×°ÖóÌÐò£¬ £¬£¬²¢Ê¹ÓÃBing AIÔÚËÑË÷Ч¹ûÖеÄÍÆ¼ö»úÖÆ£¬ £¬£¬ÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£ÔÚmacOS³¡¾°Ï£¬ £¬£¬Óû§±»Ö¸µ¼Ö´ÐаüÀ¨Atomic Stealer¶ñÒâÈí¼þµÄbashÏÂÁ £¬£¬¸ÃÏÂÁî»áÅþÁ¬ÖÁ¡°puppeteerrr¡±µÈ×ÔÁ¦GitHub¿ÍÕ»£¬ £¬£¬°²ÅŰüÀ¨shell¾ç±¾ºÍMach-O¿ÉÖ´ÐÐÎļþµÄ¶ñÒâÎļþ¡£¡£¡£WindowsÓû§ÔòÃæÁÙ¡°OpenClaw_x64.exe¡±µÄÈö²¥£¬ £¬£¬¸Ã³ÌÐò»áÊͷŶà¸ö»ùÓÚRustµÄ¶ñÒâ¼ÓÔØÆ÷£¬ £¬£¬ÔÚÄÚ´æÖÐÖ´ÐÐÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£ÆäÖУ¬ £¬£¬VidarÇÔÈ¡³ÌÐò»áͨ¹ýTelegramºÍSteamÓû§×ÊÁÏ»ñÈ¡C2Êý¾Ý£¬ £¬£¬¶øGhostSocksÊðÀíÔò½«Óû§ÅÌËã»úת»¯Îª¹¥»÷½Úµã£¬ £¬£¬ÓÃÓÚ·ÓɶñÒâÁ÷Á¿»òÒþ²Ø¹¥»÷ºÛ¼£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/


5. ά»ùýÌå»ù½ð»áÔâJavaScriptÈ䳿¹¥»÷


3ÔÂ5ÈÕ£¬ £¬£¬Î¬»ùýÌå»ù½ð»áÔâÓöÒ»ÆðÓÉ×ÔÎÒÈö²¥JavaScriptÈ䳿Òý·¢µÄÇå¾²ÊÂÎñ¡£¡£¡£¸ÃÈä³æÍ¨¹ýÐÞ¸ÄÓû§¾ç±¾¼°ÆÆËðMeta-WikiÒ³ÃæÊµÑé¹¥»÷£¬ £¬£¬µ¼ÖÂÔ¼3996¸öÒ³Ãæ±»Ð޸ġ¢85λÓû§µÄcommon.jsÎļþ±»Ìæ»»£¬ £¬£¬×îÖÕÆÈʹ»ù½ð»áÔÝʱÏÞÖÆËùÓÐÏîÄ¿±à¼­¹¦Ð§¡£¡£¡£ÊÂÎñÔ´ÓÚ¶íÂÞ˹ά»ù°Ù¿ÆÍйܵÄÒ»·Ý¶ñÒâ¾ç±¾test.js£¬ £¬£¬¸Ã¾ç±¾ÓÚ2024Äê3ÔÂÊ×´ÎÉÏ´«£¬ £¬£¬ÓëÀúÊ·¹¥»÷ÖÐʹÓõľ籾±£´æ¹ØÁª¡£¡£¡£¾ÝÊӲ죬 £¬£¬µ±ÈÕÒ»Ãûά»ùýÌåÔ±¹¤ÕË»§ÔÚ²âÊÔÓû§¾ç±¾¹¦Ð§Ê±£¬ £¬£¬¿ÉÄÜÒòÓÐÒâÖ´ÐС¢ÒâÍâ¼ÓÔØ»òÕË»§±»µÁ´¥·¢¸Ã¾ç±¾£¬ £¬£¬µ¼ÖÂÆäͨ¹ýÒѵÇÈÎÃü»§µÄcommon.js¼°È«¾ÖMediaWiki:Common.jsÎļþʵÏÖ×ÔÎÒÈö²¥¡£¡£¡£È䳿»¹¾ß±¸±à¼­Ëæ»úÒ³Ãæ¹¦Ð§£¬ £¬£¬Í¨¹ý²åÈëÒþ²ØµÄJavaScript¼ÓÔØÆ÷¼°´ó³ß´çÍ¼Æ¬ÆÆËðÒ³ÃæÄÚÈÝ¡£¡£¡£Î¬»ùýÌå»ù½ð»áʺóÉùÃ÷³Æ£¬ £¬£¬¸Ã¶ñÒâ´úÂë½ö»îÔ¾23·ÖÖÓ£¬ £¬£¬Ê±´ú½ö¶ÔMeta-WikiÄÚÈÝÔì³ÉÔÝʱ¸ü¸ÄÓëɾ³ý£¬ £¬£¬ÎÞÓÀÊÀÐÔË𺦻òСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£ÏÖÔڱ༭¹¦Ð§Òѻָ´£¬ £¬£¬»ù½ð»áÕýÔöÇ¿Çå¾²Éó²é²¢Öƶ©ÌØÊâ·À»¤²½·¥£¬ £¬£¬ÒÔ½µµÍͬÀàÊÂÎñΣº¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/


6. ¶í¹ØÁª´¹ÂڻÓÃжñÒâÈí¼þ¹¥»÷ÎÚ×éÖ¯


3ÔÂ5ÈÕ£¬ £¬£¬ClearSkyÑо¿±¨¸æÅû¶һÆðÓë¶íÂÞ˹ÓйصÄÍøÂç´¹ÂÚ¹¥»÷ÊÂÎñ£¬ £¬£¬¸Ã»î¶¯Í¨¹ýÁ½ÖÖÐÂÐͶñÒâÈí¼þBadPawºÍMeowMeowÕë¶ÔÎÚ¿ËÀ¼×éÖ¯Ìᳫ¶à½×¶Î¹¥»÷¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÒ»·â°üÀ¨ZIPѹËõÎļþÁ´½ÓµÄ´¹ÂÚÓʼþ£¬ £¬£¬Óʼþͨ¹ýÎÚ¿ËÀ¼ÍøÂçЧÀÍÌṩÉÌukr[.]net·¢ËÍ£¬ £¬£¬¸ÃÓòÃû´ËÇ°Ôø±»¶íÂÞ˹¹¥»÷»î¶¯ÀÄÓᣡ£¡£Êܺ¦Õßµã»÷Á´½Óºó£¬ £¬£¬ÏµÍ³»á¼ÓÔØ×·×ÙÏñËØÍ¨Öª¹¥»÷Õߣ¬ £¬£¬ËæºóÖØ¶¨ÏòÖÁ¶ÌÁ´½ÓÏÂÔØZIPÎļþ¡£¡£¡£½âѹZIPºó£¬ £¬£¬Î±×°³ÉHTMLÎĵµµÄHTAÎļþ»áÏÔʾÎÚ¿ËÀ¼ÓïÓÕ¶üÐÅÏ¢£¬ £¬£¬ÄÚÈÝÉæ¼°ÁìÍÁͨÐÐÔÊÐíÉêÇ룬 £¬£¬ÒÔ´ËÓÕÆ­Êܺ¦Õ߸ᣡ£¡£Í¬Ê±£¬ £¬£¬HTAÎļþͨ¹ý¼ì²éϵͳװÖÃÈÕÆÚÖ´Ðз´É³Ïä¼ì²â£¬ £¬£¬ÈôϵͳװÖÃȱ·¦10ÌìÔòÖÕÖ¹Ö´ÐС£¡£¡£Öª×ãÌõ¼þºó£¬ £¬£¬HTAÎļþÌáÈ¡ÆäËû×é¼þ£¬ £¬£¬Í¨¹ýÍýÏëʹÃü½¨É賤ÆÚ»¯ÅþÁ¬£¬ £¬£¬²¢Ê¹ÓÃVBS¾ç±¾´ÓͼÏñÖÐÌáÈ¡ÒþдÓÐÓÃÔØºÉ£¬ £¬£¬×îÖÕ¼ÓÔØBadPaw¼ÓÔØÆ÷¡£¡£¡£BadPaw×÷Ϊ»ùÓÚ.NETµÄ¼ÓÔØÆ÷£¬ £¬£¬Ê¹ÓÃ.NET Reactor¼Ó¿ÇÆ÷»ìÏý´úÂ룬 £¬£¬×è°­ÄæÏòÆÊÎö¡£¡£¡£½¨ÉèC2ͨѶºó£¬ £¬£¬BadPaw°²ÅÅMeowMeowÖØ´óºóÃÅ¡£¡£¡£¸ÃºóÞ߱¸ÇéÐμì²â¹¦Ð§£¬ £¬£¬¿ÉɨÃèÐéÄâ»ú¼°Wireshark¡¢ProcMonÖÐÆÊÎö¹¤¾ß£¬ £¬£¬Èô·¢Ã÷ɳÏäÇéÐÎÔòÁ¬Ã¦×èÖ¹Ö´ÐС£¡£¡£


https://securityaffairs.com/188974/apt/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware.html