CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows
Ðû²¼Ê±¼ä 2024-11-061. CRON#TRAPÍøÂç´¹Âڻ£ºÊ¹ÓÃLinuxÐéÄâ»úѬȾWindows
11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°CRON#TRAP¡±µÄÐÂÐÍÍøÂç´¹ÂڻʹÓÃLinuxÐéÄâ»úѬȾWindowsϵͳ£¬£¬£¬£¬£¬£¬Í¨¹ýÄÚÖúóÃÅÉñÃØ»á¼ûÆóÒµÍøÂç¡£¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³É¡°OneAmerica ÊӲ족µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬·¢ËÍÒ»¸ö°üÀ¨285MB ZIPµµ°¸µÄ´óÐÍÎļþ£¬£¬£¬£¬£¬£¬ÄÚº¬Ò»¸öWindows¿ì½Ý·½·¨ºÍQEMUÐéÄâ»úÓ¦ÓóÌÐò¡£¡£¡£¡£¡£Æô¶¯¿ì½Ý·½·¨ºó£¬£¬£¬£¬£¬£¬»áÖ´ÐÐPowerShellÏÂÁ£¬£¬£¬£¬£¬½«ÏÂÔØµÄ´æµµÌáÈ¡µ½Ö¸¶¨Îļþ¼Ð£¬£¬£¬£¬£¬£¬²¢ÔÚ×°±¸ÉÏÉèÖÃºÍÆô¶¯×Ô½ç˵QEMU LinuxÐéÄâ»ú¡£¡£¡£¡£¡£¸ÃÐéÄâ»úÃûΪ¡°PivotBox¡±£¬£¬£¬£¬£¬£¬Ô¤×°Á˺óÃÅ£¬£¬£¬£¬£¬£¬¿ÉÈ·¼á³¤ÆÚµÄC2ͨѶ£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÔÚºǫ́¾ÙÐвÙ×÷¡£¡£¡£¡£¡£ÓÉÓÚQEMUÊÇÕýµ±¹¤¾ß£¬£¬£¬£¬£¬£¬Windows²»»á¶ÔÆä·¢³ö¾¯±¨£¬£¬£¬£¬£¬£¬Çå¾²¹¤¾ßÒ²ÎÞ·¨¼ì²éÐéÄâ»úÄÚ²¿µÄ¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£ºóÃŵĽ¹µãÊÇÃûΪChiselµÄÍøÂçËíµÀ³ÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ýHTTPºÍSSH´«ÊäÊý¾Ý£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷Õß×ÝÈ»ÔÚÍøÂçÊÜ·À»ðǽ±£»£»£»£»£»¤Ê±Ò²ÄÜÓëºóÃÅͨѶ¡£¡£¡£¡£¡£ÎªÁ˱ÜÃâQEMUÀÄÓ㬣¬£¬£¬£¬£¬½¨Òé¼àÊÓ´ÓÓû§¿É»á¼ûÎļþ¼ÐÖ´Ðеġ°qemu.exe¡±µÈÀú³Ì£¬£¬£¬£¬£¬£¬½«QEMUºÍÆäËûÐéÄ⻯Ì×¼þ·ÅÈë×èÖ¹ÁбíÖУ¬£¬£¬£¬£¬£¬²¢´ÓϵͳBIOSÖнûÓûò×èÖ¹Òªº¦Éè±¹ØÁ¬ÄÐéÄ⻯¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/
2. ºÚ¿ÍÀÄÓÃDocuSign API½¨ÉèÐéα·¢Æ±Ã°³ä×ÅÃûÆ·ÅÆ¾ÙÐÐÚ²Æ
11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬DocuSign ÊÇÒ»¸öµç×ÓÊðÃûƽ̨£¬£¬£¬£¬£¬£¬Ö§³ÖÒÔÊý×Ö·½·¨Ç©Êð¡¢·¢ËͺÍÖÎÀíÎĵµ¡£¡£¡£¡£¡£Envelopes APIÖ¼ÔÚ×ÊÖú¿Í»§×Ô¶¯·¢ËÍÐèÒªÊðÃûµÄÎĵµ¡¢¸ú×ÙÆä״̬²¢ÔÚÊðÃûºó¼ìË÷ËüÃÇ¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÕýÔÚʹÓÃDocuSignµÄEnvelopes API½¨Éè²¢·Ö·¢¿´ËÆÕæÊµµÄÐéα·¢Æ±£¬£¬£¬£¬£¬£¬Ã°³ä×ÅÃûÆ·ÅÆÈçNortonºÍPayPal¡£¡£¡£¡£¡£ËûÃÇʹÓÃÕýµ±µÄ¸¶·ÑDocuSignÕË»§£¬£¬£¬£¬£¬£¬Í¨¹ý¸ÃAPI·¢ËÍÄ£Äâ×ÅÃûÈí¼þ¹«Ë¾Íâ¹ÛºÍ¸ÐÊܵÄÚ²ÆÐÔ·¢Æ±£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Ä¿µÄ¿Í»§¶ÔÎļþ¾ÙÐеç×ÓÊðÃûÒÔÊÚȨ¸¶¿î¡£¡£¡£¡£¡£ÕâЩ·¢Æ±µÄÓöȿØÖÆÔÚÏÖʵ¹æÄ£ÄÚ£¬£¬£¬£¬£¬£¬ÒÔÔöÌíÆäÕýµ±ÐÔ¡£¡£¡£¡£¡£¾ÝWallarmÇå¾²Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ÕâÖÖÀÄÓÃÐÐΪÒѾһÁ¬ÁËÒ»¶Îʱ¼ä£¬£¬£¬£¬£¬£¬²¢ÒÑÏòDocuSign±¨¸æ¡£¡£¡£¡£¡£¿£¿£¿£¿Í»§Ò²ÔÚDocuSignµÄÉçÇøÂÛ̳É϶à´Î¾Ù±¨´ËÀàÐÐΪ£¬£¬£¬£¬£¬£¬µ«ËƺõÄÑÒÔ»ñµÃÓÐÓýâ¾ö¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÇ×Ô¶¯»¯µÄ£¬£¬£¬£¬£¬£¬´ó¹æÄ£±¬·¢£¬£¬£¬£¬£¬£¬Ê¹µÃƽ̨ºÜÄѺöÊÓ¡£¡£¡£¡£¡£DocuSignÉÐδ¶ÔѯÎÊÆä·´ÀÄÓò½·¥¼°ÊÇ·ñÍýÏëÔöÇ¿ÕâЩ²½·¥µÄÎÊÌâ×÷³ö̸ÂÛ¡£¡£¡£¡£¡£ºÚ¿ÍÒÑÍùÒ²ÔøÀÄÓÃAPI¾ÙÐÐÆäËû¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬ÈçÑéÖ¤Óû§µç»°ºÅÂ롢ץȡ¿Í»§ÐÅÏ¢ÒÔ¼°½«µç×ÓÓʼþµØµãÁ´½Óµ½ÕÊ»§µÈ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices/
3. ÐÂÐÍAndroidÒøÐжñÒâÈí¼þToxicPandaѬȾ³¬1500̨װ±¸
11ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬Cleafy Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ ToxicPanda µÄÐÂÐÍ Android ÒøÐжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÒÑѬȾÁè¼Ý 1,500 ̨װ±¸£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄΪÒâ´óÀû¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀºÍÀ¶¡ÃÀÖÞµÄ16¼ÒÒøÐС£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓë¶«ÄÏÑÇµÄ TgToxic ľÂí¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬£¬µ«´úÂë²î±ðÏÔÖø¡£¡£¡£¡£¡£ToxicPanda ʹÓÃ×°±¸Ú²ÆÊÖÒÕÈÆ¹ýÒøÐÐÇå¾²²½·¥£¬£¬£¬£¬£¬£¬¾ÙÐÐÚ²ÆÐÔ×ʽð×ªÒÆ¡£¡£¡£¡£¡£Ö»¹Ü´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬£¬£¬£¬£¬£¬´úÂë²»ÍêÕû£¬£¬£¬£¬£¬£¬µ«ËüÒÑÏÔʾ³öǿʢµÄÚ²ÆÄÜÁ¦¡£¡£¡£¡£¡£ToxicPanda ½ÓÄÉÊÖ¶¯·½·¨£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÇáËÉÈÆ¹ýÒøÐеÄÐÐΪ¼ì²â·ÀÓù¡£¡£¡£¡£¡£Ëü»¹¿ÉÒÔ»á¼ûÊÖ»úÏà²á£¬£¬£¬£¬£¬£¬ÍøÂçÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÓ²±àÂëÓòÃûÅþÁ¬ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£Òâ´óÀûÊÇÆäÖ÷ҪĿµÄ£¬£¬£¬£¬£¬£¬Ñ¬È¾Âʸߴï 56.8%£¬£¬£¬£¬£¬£¬ÆÏÌÑÑÀ¡¢Ïã¸Û¡¢Î÷°àÑÀºÍÃØÂ³µÈµØÒ²ÓÐѬȾ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬½ñÊÀ·À²¡¶¾½â¾ö¼Æ»®ÄÑÒÔ¼ì²âµ½´ËÀàÏà¶Ô¼òÆÓµÄÍþв£¬£¬£¬£¬£¬£¬È±·¦×Ô¶¯¡¢ÊµÊ±µÄ¼ì²âϵͳÊÇÒ»¸öÖ÷ÒªÎÊÌâ¡£¡£¡£¡£¡£
https://securityaffairs.com/170605/malware/toxicpanda-android-malware-targets-italy.html
4. ¹ú¼ÊÐ̾¯×éÖ¯¡°Ðͬ¶þºÅÐж¯¡±ÖØÈ¹¥»÷ÍøÂç·¸·¨
11ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ2024Äê4ÔÂÖÁ8ÔÂʱ´ú£¬£¬£¬£¬£¬£¬´úºÅΪ¡°Ðͬ¶þºÅÐж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÖУ¬£¬£¬£¬£¬£¬Àֳɾв¶ÁË41ÃûÓëÀÕË÷Èí¼þ¡¢ÍøÂç´¹ÂÚºÍÐÅÏ¢ÇÔÈ¡µÈÍøÂç·¸·¨Ïà¹ØµÄÏÓÒÉÈË£¬£¬£¬£¬£¬£¬²¢´Ý»ÙÁË 22,000 ¸ö IP µØµãÉÏÔËÐеÄ1,037̨ЧÀÍÆ÷ºÍ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£´Ë´ÎÐж¯Éæ¼°95¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬»ñµÃÁ˶à¼ÒË½ÓªÍøÂçÇå¾²¹«Ë¾µÄÇ鱨֧³Ö¡£¡£¡£¡£¡£Ðж¯ÖУ¬£¬£¬£¬£¬£¬Ô¼76%µÄ¶ñÒâÄÚÈݱ»É¾³ý£¬£¬£¬£¬£¬£¬59̨ЧÀÍÆ÷±»²é·â£¬£¬£¬£¬£¬£¬43̨µç×Ó×°±¸±»Ã»ÊÕÒÔ»ñÈ¡¸ü¶àÖ¤¾Ý¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Õþ¸®»¹ÔÚÊÓ²ìÁíÍâ65ÃûÉæÏÓ¼ÓÈë²»·¨»î¶¯µÄÈË¡£¡£¡£¡£¡£Ðж¯ÁÁµã°üÀ¨Ïã¸ÛºÍ°ÄÞ¯·½¹Ø±ÕÁË´ó×Ú¶ñÒâЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÃɹžÙÐÐÁ˶à´ÎºâÓîËѲ鲢²é»ñÁËһ̨ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Âí´ï¼Ó˹¼ÓÈ·¶¨ÁËÓë¶ñÒâЧÀÍÆ÷ÓÐÁªÏµµÄСÎÒ˽¼Ò²¢²é»ñÁ˵ç×Ó×°±¸£¬£¬£¬£¬£¬£¬°®É³ÄáÑÇÔò²é»ñÁËÁè¼Ý80GBµÄЧÀÍÆ÷Êý¾Ý¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯ÍøÂç·¸·¨¾Ö¾Ö³¤ÌåÏÖ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨µÄÈ«ÇòÐÔҪǴÔðÇòÓ¦¶Ô£¬£¬£¬£¬£¬£¬´Ë´ÎÐж¯²»µ«´Ý»ÙÁ˶ñÒâ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬»¹±ÜÃâÁËÊýÊ®ÍòDZÔÚÊܺ¦ÕßÂÙÎªÍøÂç·¸·¨µÄÎþÉüÆ·¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/
5. ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èй¶¾üÊ»ùְλÖ㬣¬£¬£¬£¬£¬Òý·¢Çå¾²µ£ÐÄ
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼Ö¸Ôð¹È¸èÔÚÆäÔÚÏßµØÍ¼Ð§À͵Ä×îиüÐÂÖÐй¶Á˾üÊ»ùµØµÄλÖ㬣¬£¬£¬£¬£¬ÕâЩͼÏñ±»¶íÂÞ˹ÈË¡°Æð¾¢Èö²¥¡±¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼¹ú¼ÒÇå¾²Óë¹ú·ÀίԱ»á·´ÐéαÐÅÏ¢²¿·ÖÈÏÕæÈËÌåÏÖ£¬£¬£¬£¬£¬£¬¹È¸èÉÐδÐÞ¸´µØÍ¼£¬£¬£¬£¬£¬£¬Ö»»ØÓ¦ÁËÎÚ¿ËÀ¼µÄ¹Ù·½Ðżþ²¢ÔÊÐí¸üС£¡£¡£¡£¡£¹È¸èÎÚ¿ËÀ¼¹«Ë¾»ØÓ¦³Æ£¬£¬£¬£¬£¬£¬ÓÐÎÊÌâµÄÎÀÐÇͼÏñÊÇÒ»ÄêǰÅÄÉãµÄ£¬£¬£¬£¬£¬£¬À´×Ô¹ûÕæÈªÔ´£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÖØÊÓ´ËÀàÇëÇó²¢ÓëÎÚ¿ËÀ¼¹ÙÔ±¼á³ÖÏàͬ¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼µ£ÐľüÊÂÐÅÏ¢µÄ¹ûÕæ¿ÉÄÜΣ¼°·À¿ÕϵͳµÈ¾üÊÂ×°±¸µÄλÖ㬣¬£¬£¬£¬£¬²»µ«¿ÉÄÜΣ¼°ÎÚ¿ËÀ¼£¬£¬£¬£¬£¬£¬»¹¿ÉÄÜΣ¼°ÈκÎʹÓõ¼µ¯×èµ²Æ÷µÄ¹ú¼Ò¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼ºÍ¶íÂÞ˹¶¼¸ß¶ÈÒÀÀµÎÀÐÇͼÏñÀ´ÍøÂçÇ鱨£¬£¬£¬£¬£¬£¬µ«¶íÂÞ˹ÒòÖÆ²Ã»òÆ·µÂÎÊÌâ¶øÄÑÒÔÖ±½Ó´ÓÉÌÒµ¹«Ë¾¹ºÖᣡ£¡£¡£¡£¹È¸èÒÑÔÝÍ£ÁËÔÚ¶íÂÞ˹µÄÐí¶àЧÀÍ£¬£¬£¬£¬£¬£¬µ«µØÍ¼µÈ²¿·ÖЧÀÍÈÔ¿ÉʹÓ㬣¬£¬£¬£¬£¬µ«¹¦Ð§ÓÐÏÞ¡£¡£¡£¡£¡£
https://therecord.media/ukraine-google-locations-revealing-military
6. SnowflakeÊý¾ÝÇÔÈ¡¹¥»÷ÏÓÒÉÈËÔÚ¼ÓÄô󱻲¶
11ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬¼ÓÄôóÕþ¸®¾Ð²¶ÁËÒ»ÃûÉæÏÓÇÔÈ¡ÔÆ´æ´¢¹«Ë¾Snowflake¿Í»§Êý¾ÝµÄÄÐ×ÓAlexander "Connor" Moucka£¨ÓÖÃû"Waifu"ºÍ"Judische"£©¡£¡£¡£¡£¡£¾ÝÅí²©ÉçºÍ404 Media±¨µÀ£¬£¬£¬£¬£¬£¬¸ÃÄÐ×ÓÒÔ165¸ö×é֯ΪĿµÄ£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÊýÒÚÊý¾Ý£¬£¬£¬£¬£¬£¬ÕâЩ×éÖ¯ËùÓÐÊÇSnowflakeµÄ¿Í»§¡£¡£¡£¡£¡£Snowflake¡¢MandiantºÍCrowdStrikeµÄÁªºÏÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬ÕâÃû¹¥»÷ÕßʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÇÔÈ¡ÁËδÄÜÉèÖöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»¤µÄSnowflakeÕÊ»§µÄ¿Í»§Æ¾Ö¤¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ʼÓÚ2024Äê4Ô£¬£¬£¬£¬£¬£¬ÓëÖ®Ïà¹ØµÄÊý¾Ýй¶ӰÏìÁËʹÓÃAT&T¡¢Ticketmaster¡¢SantanderµÈ¶à¼ÒЧÀ͵ÄÊýÒÚСÎÒ˽¼Ò¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬TicketmasterµÄ5.6ÒÚ¿Í»§ºÍAT&TµÄÔ¼1.09ÒÚ¿Í»§µÄͨ»°¼Í¼±»µÁ¡£¡£¡£¡£¡£SnowflakeÒÔºóÐû²¼½«¶ÔÐÂÕË»§Ç¿ÖÆÊµÑéMFA£¬£¬£¬£¬£¬£¬²¢ÒªÇóÃÜÂ볤¶ÈÖÁÉÙΪ14¸ö×Ö·û¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/suspect-behind-snowflake-data-theft-attacks-arrested-in-canada/


¾©¹«Íø°²±¸11010802024551ºÅ