¹ú¼ÊÁªºÏÐж¯µ·»ÙTycoon2FA´¹ÂÚÆ½Ì¨
Ðû²¼Ê±¼ä 2026-03-061. ¹ú¼ÊÁªºÏÐж¯µ·»ÙTycoon2FA´¹ÂÚÆ½Ì¨
3ÔÂ4ÈÕ£¬£¬£¬Å·ÖÞÐ̾¯×é֯е÷µÄ¹ú¼ÊÖ´·¨Ðж¯¿ËÈÕÀֳɵ·»ÙTycoon2FA´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨¡£¡£¡£´Ë´ÎÐж¯ÓÉ΢ÈíÔÚ˽ӪÏàÖúͬ°éͬÃËÖ§³ÖÏÂÌᳫÊÖÒÕÖÐÖ¹£¬£¬£¬ÀÍÑάÑÇ¡¢Á¢ÌÕÍð¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Î÷°àÑÀºÍÓ¢¹úÖ´·¨²¿·ÖÖ´ÐÐÓòÃû²é·âµÈ²½·¥£¬£¬£¬¹²¹Ø±Õ330¸öÊôÓÚ·¸·¨Ð§ÀÍ»ú¹¹Ö÷¸É»ù´¡ÉèÊ©µÄÓòÃû£¬£¬£¬°üÀ¨¿ØÖÆÃæ°åºÍ´¹ÂÚÒ³Ãæ¡£¡£¡£Tycoon2FA×Ô2023Äê8ÔÂÆð»îÔ¾£¬£¬£¬±»ÍøÂç·¸·¨·Ö×ÓÓÃÓÚÈÆ¹ý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»¤£¬£¬£¬ÈëÇÖÈ«Çò½ü10Íò¸ö×éÖ¯µÄÕË»§¡£¡£¡£¾Ý΢ÈíÊý¾Ý£¬£¬£¬ÖÁ2025ÄêÄêÖУ¬£¬£¬¸Ãƽ̨ÿÔÂÌìÉúÊýÍòÍò·â´¹ÂÚÓʼþ£¬£¬£¬Ó°Ï쳬50Íò¸ö×éÖ¯£¬£¬£¬Õ¼ËùÓб»×èµ²´¹ÂÚʵÑéµÄ60%¡£¡£¡£ÆäÊÖÒÕÔÀíΪͨ¹ý·´ÏòÊðÀíЧÀÍÆ÷ʵʱ×èµ²Êܺ¦ÕߵǼƾ֤ºÍ»á»°cookie£¬£¬£¬Ä£ÄâMicrosoft 365¡¢OneDrive¡¢Outlook¡¢SharePoint¼°GmailµÈ¿ÉÐÅÆ·ÅƵÇÂ¼Ò³Ãæ¡£¡£¡£×ÝÈ»Êܺ¦ÕßÍê³ÉÕý³£µÇ¼£¬£¬£¬¹¥»÷ÕßÈÔÄÜÐ®ÖÆÒÑÈÏÖ¤»á»°²¢ÈƹýMFA±£»£»£»£»£»¤£¬£¬£¬³ý·Ç»î¶¯»á»°ºÍÁîÅÆ±»Ã÷È·×÷·Ï¡£¡£¡£¸Ãƽ̨ͨ¹ýTelegramÒÔ120ÃÀÔª10ÌìʹÓÃȨµÄ¼ÛÇ®³öÊÛ£¬£¬£¬´ó·ù½µµÍµÍÊÖÒÕ·¸·¨·Ö×ÓÌá³«ÖØ´óMFAÈÆ¹ý¹¥»÷µÄÃż÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/
2. ÒÁÀÊÎÞÈË»úÏ®»÷ÑÇÂíÑ·Öж«Êý¾ÝÖÐÐÄÖÂÔÆÐ§ÀÍÖÐÖ¹
3ÔÂ3ÈÕ£¬£¬£¬ÒÁÀÊ±ÊÆÜ¶ÔÑÇÂíÑ·ÔÚ°¢ÁªÇõºÍ°ÍÁÖµÄÈý×ùÊý¾ÝÖÐÐÄ·¢¶¯ÎÞÈË»úÏ®»÷£¬£¬£¬µ¼ÖÂÖж«²¿·ÖµØÇøÔÆÐ§ÀÍÖÐÖ¹£¬£¬£¬µØÇøÖ÷ÒªÊ±ÊÆ½øÒ»²½¶ñ»¯¡£¡£¡£¾ÝÑÇÂíÑ·Åû¶£¬£¬£¬°¢ÁªÇõÁ½×ùÊý¾ÝÖÐÐÄÔâÎÞÈË»ú¡°Ö±½Ó»÷ÖС±£¬£¬£¬°ÍÁÖÉèÊ©Òò¡°½ü¾àÀëÎÞÈË»úÏ®»÷¡±ÊÜË𣬣¬£¬¹²Ôì³ÉÔ¼60ÏîÑÇÂíÑ·ÔÆÐ§ÀÍÖÐÖ¹£¬£¬£¬Ó°ÏìÍøÂçÁ÷Á¿¼°ÒÀÀµÔÆÐ§À͵ÄÓªÒµÔËÓª¡£¡£¡£´Ë´ÎÏ®»÷±¬·¢ÔÚÃÀÒÔÁªºÏ¹¥»÷µ¼ÖÂÒÁÀÊ×î¸ßÊ×ÄÔ¹þ÷ÄÚÒÁ¼°¶àÃû¸ß¼¶¹ÙÔ±ÉíÍöºó£¬£¬£¬ÒÁÀÊËæ¼´¶Ô°¢ÁªÇõ¼°ÁÚ¹úÕö¿ªÅê»÷Ðж¯£¬£¬£¬Ä¿µÄ²»µ«°üÀ¨ÃÀ¾ü»ùµØ£¬£¬£¬»¹À©Õ¹ÖÁ»ú³¡¡¢Âùݼ°Òªº¦ÓÍÆø»ù´¡ÉèÊ©¡£¡£¡£ÑÇÂíÑ·ÉùÃ÷Ö¸³ö£¬£¬£¬Ï®»÷Ôì³ÉÊý¾ÝÖÐÐĽṹË𻵡¢µçÁ¦ÖÐÖ¹£¬£¬£¬²¢´¥·¢Ïû·Àϵͳµ¼ÖÂÊÒÄÚË®Ë𣬣¬£¬ÍâµØÏû·À²¿·ÖÔÚɱ¾ø²Ðº¡ÒýÉúÆøÔÖʱ¹Ø±ÕÁ˵çÔ´ºÍ·¢µç»ú£¬£¬£¬½øÒ»²½¼Ó¾çЧÀÍÖÐÖ¹¡£¡£¡£ÑÇÂíÑ·ÌåÏÖ£¬£¬£¬ÏÖÔÚÕýÓëµØ·½Õþ¸®ÏàÖúÓÅÏȰü¹ÜÔ±¹¤Çå¾²£¬£¬£¬²¢½¨ÒéÖж«¿Í»§±¸·ÝÒªº¦Êý¾Ý£¬£¬£¬½«Ó¦ÓÃǨáãÖÁÆäËûAWSÇøÓò¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬ÖÜÈ«»Ö¸´È¡¾öÓÚÊÜÓ°Ïì»ù´¡ÉèÊ©µÄÐÞ¸´½ø¶È£¬£¬£¬¶øÄ¿½ñÖж«Ò»Á¬³åÍ»µ¼ÖÂÕûÌåÔËÓªÇéÐÎÈÔ²»¿ÉÕ¹Íû¡£¡£¡£
https://therecord.media/iran-drone-strikes-hit-amazon-data-centers-gulf
3. ¹È¸èÅû¶CorunaÐÂÐÍiOSÎó²îʹÓù¤¾ß°ü
3ÔÂ5ÈÕ£¬£¬£¬¹È¸èÍþвÇ鱨С×飨GTIG£©·¢Ã÷ÃûΪCoruna£¨ÓÖÃûCryptoWaters£©µÄÐÂÐÍiOSÎó²îʹÓù¤¾ß°ü£¬£¬£¬¸Ã¹¤¾ß°üÕë¶ÔÔËÐÐiOS 13.0ÖÁ17.2.1°æ±¾µÄiPhone£¬£¬£¬°üÀ¨ÎåÌõÍêÕûÎó²îʹÓÃÁ´¹²23¸öÎó²î³ÌÐò¡£¡£¡£Coruna¶Ô¾É°æiOS¾ßÓÐÇ¿¹¥»÷ÄÜÁ¦£¬£¬£¬µ«¶ÔiOS 17.3¼°ÒÔÉϰ汾ÎÞЧ£¬£¬£¬ÒòCVE-2024-23222µÈÎó²îÒÑÔÚ17.3ÖÐÐÞ¸´¡£¡£¡£¸Ã¹¤¾ß°üÓÉ¼à¿Ø×°±¸¹©Ó¦É̿ͻ§Ê×´ÎʹÓ㬣¬£¬ºó±»¶à¸öÍþв×éÖ¯¸´ÓÃˢС£¡£¡£UNC6353ÔÚÎÚ¿ËÀ¼Ìᳫˮ¿Ó¹¥»÷£¬£¬£¬Öйú½ðÈÚÍþв×éÖ¯UNC6691Ôòͨ¹ýÐéα½ðÈÚÍøÕ¾°²ÅÅÍêÕû¹¤¾ß°ü£¬£¬£¬Ê¹ÓÃÒþ²ØiFrameͶ·ÅÎó²î³ÌÐò£¬£¬£¬Ì»Â¶»îÔ¾µÄ¡°¶þÊÖ¡±ÁãÈÕÎó²îÊг¡¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬Coruna¿ò¼Ü½ÓÄÉÆæÒìJavaScript»ìÏýÊÖÒÕ£¬£¬£¬Í¨¹ý×°±¸Ö¸ÎÆÊ¶±ð¼ÓÔØ¶ÔÓ¦Îó²î³ÌÐò¡£¡£¡£Æä½¹µã°üÀ¨WebKitÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²îʹÓá¢Ö¸ÕëÈÏÖ¤£¨PAC£©ÈƹýÄ£¿£¿£¿£¿é£¬£¬£¬ÒÔ¼°¿ÉÖØÓÃ×é¼þ£¬£¬£¬ÓÃÓÚÈÆ¹ýÓû§Ì¬RWXÄÚ´æ·ÖÅÉÏÞÖÆ¡£¡£¡£¹È¸èÒÑÐû²¼ÈëÇÖÖ¸±ê£¨IOC£©ºÍYara¹æÔò£¬£¬£¬²¢½«Ïà¹ØÓòÃû¼ÓÈëÇå¾²ä¯ÀÀ±£»£»£»£»£»¤¡£¡£¡£
https://securityaffairs.com/188928/security/google-uncovers-coruna-ios-exploit-kit-targeting-ios-13-17-2-1.html
4. Bing AIËÑË÷Èö²¥Î±ÔìOpenClawµÄ¶ñÒâÈí¼þ
3ÔÂ5ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Íйܼì²âÓëÏìÓ¦¹«Ë¾HuntressÅû¶һÆðÐÂÐÍÍøÂç¹¥»÷»î¶¯£ºÍþвÐÐΪÕßͨ¹ýαÔìGitHub´æ´¢¿â£¬£¬£¬Á¬ÏµÎ¢ÈíBingµÄAIÔöÇ¿ËÑË÷¹¦Ð§£¬£¬£¬ÏòÊÔͼװÖÿªÔ´AIÊðÀíOpenClawµÄÓû§Èö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò¼°ÊðÀí¶ñÒâÈí¼þ¡£¡£¡£OpenClawÒòÆäÄÜ»á¼ûÍâµØÎļþ²¢¼¯³Éµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶µÈÔÚÏßЧÀ͵Ĺ¦Ð§ÌØÕ÷£¬£¬£¬³ÉΪ¹¥»÷ÕßÑÛÖеġ°ÀíÏëÔØÌ塱¡£¡£¡£¹¥»÷ÕßÊ×ÏȽ¨Éè¶ñÒâGitHub´æ´¢¿â£¬£¬£¬Î±×°³ÉOpenClaw¹Ù·½×°ÖóÌÐò£¬£¬£¬²¢Ê¹ÓÃBing AIÔÚËÑË÷Ч¹ûÖеÄÍÆ¼ö»úÖÆ£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£ÔÚmacOS³¡¾°Ï£¬£¬£¬Óû§±»Ö¸µ¼Ö´ÐаüÀ¨Atomic Stealer¶ñÒâÈí¼þµÄbashÏÂÁ£¬£¬¸ÃÏÂÁî»áÅþÁ¬ÖÁ¡°puppeteerrr¡±µÈ×ÔÁ¦GitHub¿ÍÕ»£¬£¬£¬°²ÅŰüÀ¨shell¾ç±¾ºÍMach-O¿ÉÖ´ÐÐÎļþµÄ¶ñÒâÎļþ¡£¡£¡£WindowsÓû§ÔòÃæÁÙ¡°OpenClaw_x64.exe¡±µÄÈö²¥£¬£¬£¬¸Ã³ÌÐò»áÊͷŶà¸ö»ùÓÚRustµÄ¶ñÒâ¼ÓÔØÆ÷£¬£¬£¬ÔÚÄÚ´æÖÐÖ´ÐÐÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£ÆäÖУ¬£¬£¬VidarÇÔÈ¡³ÌÐò»áͨ¹ýTelegramºÍSteamÓû§×ÊÁÏ»ñÈ¡C2Êý¾Ý£¬£¬£¬¶øGhostSocksÊðÀíÔò½«Óû§ÅÌËã»úת»¯Îª¹¥»÷½Úµã£¬£¬£¬ÓÃÓÚ·ÓɶñÒâÁ÷Á¿»òÒþ²Ø¹¥»÷ºÛ¼£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/
5. ά»ùýÌå»ù½ð»áÔâJavaScriptÈ䳿¹¥»÷
3ÔÂ5ÈÕ£¬£¬£¬Î¬»ùýÌå»ù½ð»áÔâÓöÒ»ÆðÓÉ×ÔÎÒÈö²¥JavaScriptÈ䳿Òý·¢µÄÇå¾²ÊÂÎñ¡£¡£¡£¸ÃÈä³æÍ¨¹ýÐÞ¸ÄÓû§¾ç±¾¼°ÆÆËðMeta-WikiÒ³ÃæÊµÑé¹¥»÷£¬£¬£¬µ¼ÖÂÔ¼3996¸öÒ³Ãæ±»Ð޸ġ¢85λÓû§µÄcommon.jsÎļþ±»Ìæ»»£¬£¬£¬×îÖÕÆÈʹ»ù½ð»áÔÝʱÏÞÖÆËùÓÐÏîÄ¿±à¼¹¦Ð§¡£¡£¡£ÊÂÎñÔ´ÓÚ¶íÂÞ˹ά»ù°Ù¿ÆÍйܵÄÒ»·Ý¶ñÒâ¾ç±¾test.js£¬£¬£¬¸Ã¾ç±¾ÓÚ2024Äê3ÔÂÊ×´ÎÉÏ´«£¬£¬£¬ÓëÀúÊ·¹¥»÷ÖÐʹÓõľ籾±£´æ¹ØÁª¡£¡£¡£¾ÝÊӲ죬£¬£¬µ±ÈÕÒ»Ãûά»ùýÌåÔ±¹¤ÕË»§ÔÚ²âÊÔÓû§¾ç±¾¹¦Ð§Ê±£¬£¬£¬¿ÉÄÜÒòÓÐÒâÖ´ÐС¢ÒâÍâ¼ÓÔØ»òÕË»§±»µÁ´¥·¢¸Ã¾ç±¾£¬£¬£¬µ¼ÖÂÆäͨ¹ýÒѵÇÈÎÃü»§µÄcommon.js¼°È«¾ÖMediaWiki:Common.jsÎļþʵÏÖ×ÔÎÒÈö²¥¡£¡£¡£È䳿»¹¾ß±¸±à¼Ëæ»úÒ³Ãæ¹¦Ð§£¬£¬£¬Í¨¹ý²åÈëÒþ²ØµÄJavaScript¼ÓÔØÆ÷¼°´ó³ß´çÍ¼Æ¬ÆÆËðÒ³ÃæÄÚÈÝ¡£¡£¡£Î¬»ùýÌå»ù½ð»áʺóÉùÃ÷³Æ£¬£¬£¬¸Ã¶ñÒâ´úÂë½ö»îÔ¾23·ÖÖÓ£¬£¬£¬Ê±´ú½ö¶ÔMeta-WikiÄÚÈÝÔì³ÉÔÝʱ¸ü¸ÄÓëɾ³ý£¬£¬£¬ÎÞÓÀÊÀÐÔË𺦻òСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£ÏÖÔڱ༹¦Ð§Òѻָ´£¬£¬£¬»ù½ð»áÕýÔöÇ¿Çå¾²Éó²é²¢Öƶ©ÌØÊâ·À»¤²½·¥£¬£¬£¬ÒÔ½µµÍͬÀàÊÂÎñΣº¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/
6. ¶í¹ØÁª´¹ÂڻÓÃжñÒâÈí¼þ¹¥»÷ÎÚ×éÖ¯
3ÔÂ5ÈÕ£¬£¬£¬ClearSkyÑо¿±¨¸æÅû¶һÆðÓë¶íÂÞ˹ÓйصÄÍøÂç´¹ÂÚ¹¥»÷ÊÂÎñ£¬£¬£¬¸Ã»î¶¯Í¨¹ýÁ½ÖÖÐÂÐͶñÒâÈí¼þBadPawºÍMeowMeowÕë¶ÔÎÚ¿ËÀ¼×éÖ¯Ìᳫ¶à½×¶Î¹¥»÷¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÒ»·â°üÀ¨ZIPѹËõÎļþÁ´½ÓµÄ´¹ÂÚÓʼþ£¬£¬£¬Óʼþͨ¹ýÎÚ¿ËÀ¼ÍøÂçЧÀÍÌṩÉÌukr[.]net·¢ËÍ£¬£¬£¬¸ÃÓòÃû´ËÇ°Ôø±»¶íÂÞ˹¹¥»÷»î¶¯ÀÄÓᣡ£¡£Êܺ¦Õßµã»÷Á´½Óºó£¬£¬£¬ÏµÍ³»á¼ÓÔØ×·×ÙÏñËØÍ¨Öª¹¥»÷Õߣ¬£¬£¬ËæºóÖØ¶¨ÏòÖÁ¶ÌÁ´½ÓÏÂÔØZIPÎļþ¡£¡£¡£½âѹZIPºó£¬£¬£¬Î±×°³ÉHTMLÎĵµµÄHTAÎļþ»áÏÔʾÎÚ¿ËÀ¼ÓïÓÕ¶üÐÅÏ¢£¬£¬£¬ÄÚÈÝÉæ¼°ÁìÍÁͨÐÐÔÊÐíÉêÇ룬£¬£¬ÒÔ´ËÓÕÆÊܺ¦Õ߸ᣡ£¡£Í¬Ê±£¬£¬£¬HTAÎļþͨ¹ý¼ì²éϵͳװÖÃÈÕÆÚÖ´Ðз´É³Ïä¼ì²â£¬£¬£¬ÈôϵͳװÖÃȱ·¦10ÌìÔòÖÕÖ¹Ö´ÐС£¡£¡£Öª×ãÌõ¼þºó£¬£¬£¬HTAÎļþÌáÈ¡ÆäËû×é¼þ£¬£¬£¬Í¨¹ýÍýÏëʹÃü½¨É賤ÆÚ»¯ÅþÁ¬£¬£¬£¬²¢Ê¹ÓÃVBS¾ç±¾´ÓͼÏñÖÐÌáÈ¡ÒþдÓÐÓÃÔØºÉ£¬£¬£¬×îÖÕ¼ÓÔØBadPaw¼ÓÔØÆ÷¡£¡£¡£BadPaw×÷Ϊ»ùÓÚ.NETµÄ¼ÓÔØÆ÷£¬£¬£¬Ê¹ÓÃ.NET Reactor¼Ó¿ÇÆ÷»ìÏý´úÂ룬£¬£¬×è°ÄæÏòÆÊÎö¡£¡£¡£½¨ÉèC2ͨѶºó£¬£¬£¬BadPaw°²ÅÅMeowMeowÖØ´óºóÃÅ¡£¡£¡£¸ÃºóÞ߱¸ÇéÐμì²â¹¦Ð§£¬£¬£¬¿ÉɨÃèÐéÄâ»ú¼°Wireshark¡¢ProcMonÖÐÆÊÎö¹¤¾ß£¬£¬£¬Èô·¢Ã÷ɳÏäÇéÐÎÔòÁ¬Ã¦×èÖ¹Ö´ÐС£¡£¡£
https://securityaffairs.com/188974/apt/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ