Âí˹¿ËDOGEÍýÏëÏÝÍøÂçÇ徲Σ»ú £¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹âÎó²î

Ðû²¼Ê±¼ä 2025-02-18

1. Âí˹¿ËDOGEÍýÏëÏÝÍøÂçÇ徲Σ»ú £¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹âÎó²î


2ÔÂ14ÈÕ £¬¿Æ¼¼ÒÚÍò¸»Ḭ̂£Â¡¡¤Âí˹¿Ë¹ÜÀíµÄÕþ¸®Ð§Âʲ¿£¨DOGE£©Ö¼ÔÚÏ÷¼õÁª°î¿ªÖ§²¢ÌáÉýÕþ¸®Ð§ÂÊ £¬È»¶ø £¬Æäн¨ÉèµÄDOGE.govÍøÕ¾È´ÒòÍøÂçÇå¾²²½·¥ËÉи¶øÃæÁÙÖØ´óΣº¦ ¡£ºÚ¿ÍÖ¸³ö £¬¸ÃÍøÕ¾±£´æÑÏÖØÇå¾²Îó²î £¬ÈκÎÈ˶¼ÄÜ»á¼û²¢±à¼­´æ´¢µÄÐÅÏ¢ ¡£ÍøÕ¾Ëƺõ»Å潨³É £¬¸´ÖÆÁËDOGEµÄÉ罻ýÌåÌû×Ó¼°Òªº¦Í³¼ÆÊý¾Ý £¬ÇÒÊý¾Ý¿â¹ûÕæ £¬ÔÊÐíµÚÈý·½ÐÞ¸ÄÄÚÈݲ¢ÊµÊ±ÏÔʾ ¡£¾Ý¿ª·¢Ö°Ô±Í¸Â¶ £¬¸ÃÍøÕ¾ÍйÜÔÚCloudflare PagesÉÏ £¬¶ø·ÇÕþ¸®·þÎñÆ÷ £¬Êý¾Ý¿âAPI¶Ëµã¿É±»ÈÝÒ×ÕÒµ½²¢ÍÆË͸üР¡£±ðµÄ £¬DOGEµÄÁíÒ»ÍøÕ¾waste.govÒ²±£´æÁËWordPressĬÈÏÄ£°åºÍʾÀýÎı¾ £¬½öÔÚýÌ幨עºó²Å±»·â½û ¡£ÕâЩÊÂÎñ͹ÏÔÁËDOGEÔÚ×·ÇóЧÂʵÄͬʱ £¬ºöÊÓÁËÍøÂçÇå¾²µÄÖ÷ÒªÐÔ £¬¿ÉÄܳÉΪÆäˢеÄÎþÉüÆ· ¡£


https://cybernews.com/security/musk-doge-website-hacked/


2. ºÉÀ¼¾¯·½²é·âZservers/XHost·Àµ¯ÍйܷþÎñ127̨·þÎñÆ÷


2ÔÂ17ÈÕ £¬¿ËÈÕ £¬ÃÀ¡¢Ó¢¡¢°ÄÈý¹ú¶Ô¶íÂÞ˹·Àµ¯ÍйܷþÎñÌṩÉÌZservers¼°Æä¹ÜÀíÔ±Alexander Igorevich MishinºÍAleksandr Sergeyevich BolshakovʵÑéÖÆ²Ã £¬ÒòÆäÖ§³Ö¶íÂÞ˹ÀÕË÷Èí¼þLockBitÐж¯ ¡£ZserversλÓÚ¶íÂÞ˹°Í¶ûè§¶û £¬Í¨¹ýÌṩ·Àµ¯ÍйܷþÎñ£¨BPH£© £¬°üÀ¨×âÁÞ´ó×ÚIPµØÖ· £¬Ð­ÖúLockBit¹ØÁª¹«Ë¾ÌÓ±ÜÖ´·¨ºÍÍøÂçÇå¾²¹«Ë¾µÄÉó²é £¬Ð­Ð­µ÷ÌᳫÀÕË÷Èí¼þ¹¥»÷ ¡£´Ëǰ £¬¼ÓÄôóÖ´·¨²¿·ÖÔÚËѲéÖз¢Ã÷ZserversµÄת×âIPµØÖ·ÓëLockBit¶ñÒâÈí¼þ²Ù×÷ÓйØ ¡£ºÉÀ¼ÒòÖ´·¨±¡ÈõÄÑÒԹرմËÀà·þÎñ £¬Í¹ÏÔÁËÔöÇ¿¹æÔòµÄÐëÒªÐÔ ¡£¼¸Ììºó £¬ºÉÀ¼¾¯·½Ðû²¼ÒÑÏÂÏß²¢²é·âÁËÓëZservers/XHostÏà¹ØµÄ127̨λÓÚ°¢Ä·Ë¹Ìص¤µÄ·þÎñÆ÷ ¡£ÕâЩ·þÎñÆ÷±»ContiºÍLockBitµÈÍøÂç·¸·¨¼¯ÍÅʹÓà ¡£¾­ÓÉÒ»Äê¶àµÄÊÓ²ì £¬°¢Ä·Ë¹Ìص¤¾¯·½ÍøÂç·¸·¨Ð¡×éÔÚ2ÔÂ12ÈÕµÄͻϮÖе·»ÙÁËÕâ¼Ò·Àµ¯ÍйÜÉÌ ¡£Ðж¯Öз¢Ã÷µÄ·þÎñÆ÷ÉÏ×°ÓÐContiºÍLockbitµÄºÚ¿Í¹¤¾ß £¬ÕâÁ½¸ö¼¯Íű»ÒÔΪÊÇÌìÏÂÉÏ×î¾ßÉú²úÁ¦ºÍÆÆËðÁ¦µÄÀÕË÷Èí¼þ¼¯ÍÅ ¡£ÏÖÔÚ £¬¸ÃÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ £¬¾¯ÆÓÖ±ÔÚÆÊÎö±»¿ÛѺ·þÎñÆ÷ÉÏ´æ´¢µÄÊý¾Ý ¡£


https://securityaffairs.com/174321/hacking/dutch-police-seized-127-servers-bulletproof-hosting-service-zservers-xhost.html


3. XCSSET macOS¶ñÒâÈí¼þбäÖÖÔöÇ¿¹¥»÷ÄÜÁ¦ £¬ÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢


2ÔÂ17ÈÕ £¬XCSSET macOSÄ£¿é»¯¶ñÒâÈí¼þµÄбäÖÖÒÑ·ºÆðÔÚÕë¶ÔÓû§Ãô¸ÐÐÅÏ¢µÄ¹¥»÷ÖÐ £¬°üÀ¨Êý×ÖÇ®°üºÍNotesÓ¦ÓóÌÐòµÄÊý¾Ý ¡£¸Ã¶ñÒâÈí¼þͨ³£Í¨¹ýÊÜѬȾµÄXcodeÏîÄ¿¾ÙÐÐÈö²¥ £¬ÒѾ­±£´æÖÁÉÙÎåÄê £¬²¢ÇÒÿ´Î¸üж¼´ú±í×Å¿ª·¢µÄÒ»¸öÀï³Ì±® ¡£Î¢ÈíÍþвÇ鱨ÍŶÓÔÚÓÐÏ޵Ĺ¥»÷Öз¢Ã÷ÁË×îбäÖÖ £¬Ëü¾ßÓÐÔöÇ¿µÄ´úÂë»ìÏý¡¢¸üºÃµÄ³¤ÆÚÐÔºÍеÄѬȾսÂÔ ¡£ÐµıäÖÖ½ÓÄÉÁËÒÀÀµÓÚBase64ºÍxxdÒªÁìµÄ±àÂëÊÖÒÕ¾ÙÐÐеĻìÏý £¬Í¬Ê±Ê¹ÓÃÁËzshrcºÍdockÁ½ÖÖ³¤ÆÚÐÔÊÖÒÕ ¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃеÄXcodeѬȾҪÁì £¬½«ÓÐÓÃÔØºÉ°²ÅÅÔÚXcodeÏîÄ¿ÖÐ ¡£¹ØÓÚzshrc³¤ÆÚ»¯ÒªÁì £¬ÐµıäÖֻὨÉèÒ»¸ö°üÀ¨ÓÐÓøºÔصÄÎļþ £¬²¢ÔÚÆô¶¯ÐµÄshell»á»°Ê±Æô¶¯¸ÃÎļþ ¡£¹ØÓÚdockÒªÁì £¬¶ñÒâÈí¼þ´Ó¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ÏÂÔØÒÑÊðÃûµÄdockutil¹¤¾ßÀ´¹ÜÀídockÏîÄ¿ £¬²¢½¨ÉèÒ»¸ö¶ñÒâµÄLaunchpadÓ¦ÓóÌÐòÀ´Ö´ÐжñÒâ¸ºÔØ ¡£XcodeÊÇAppleµÄ¿ª·¢¹¤¾ß¼¯ £¬XCSSETµÄÔËÓªÕßͨ¹ýÕë¶ÔXcodeÏîÄ¿×ÊÔ´¿ÉÒÔ½Ó´¥µ½¸ü¶àµÄÊܺ¦Õß ¡£Î¢Èí½¨Òé¼ì²éºÍÑéÖ¤´Ó·Ç¹Ù·½´æ´¢¿â¿Ë¡µÄXcodeÏîÄ¿ºÍ´úÂë¿â £¬ÒÔ·ÀÒþ²Ø»ìÏýµÄ¶ñÒâÈí¼þ»òºóÃÅ ¡£


https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/


4. ºÚ¿ÍʹÓà Telegram API Èö²¥Ð嵀 Golang ºóÃÅ


2ÔÂ17ÈÕ £¬NetskopeµÄÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеġ¢¿ÉÄÜÈÔÔÚ¿ª·¢ÖеĻùÓÚGolangµÄºóÃŶñÒâÈí¼þ £¬ËüʹÓÃTelegram API¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶ ¡£ÕâÖÖ¶ñÒâÈí¼þÔ´×Ô¶íÂÞ˹ £¬Ê¹ÓÃÁËTelegramµÈÔÆ·þÎñ £¬ÕâЩ·þÎñÒ×ÓÚ¹¥»÷ÕßʹÓöøÄÑÒÔ±»Ñо¿Ö°Ô±¼à¿Ø ¡£¸Ã¶ñÒâÈí¼þÔÚÖ´ÐÐʱ»á¼ì²é×ÔÉíÊÇ·ñ´ÓÖ¸¶¨Î»ÖúÍÎļþÃûÔËÐÐ £¬Èç²»ÊÇ £¬Ôò»á¸´ÖƵ½¸ÃλÖò¢Æô¶¯¸±±¾ ¡£¹ØÓÚC2ͨѶ £¬ºóÃÅʹÓÿªÔ´Go°üÓëTelegram½»»¥ £¬½¨ÉèÒ»¸ö»úеÈËʵÀýÀ´¼àÊÓÖ¸¶¨µÄ̸ÌìÖÐÊÇ·ñÓÐÐÂÏÂÁî ¡£¸Ã¶ñÒâÈí¼þÖ§³ÖËĸöÏÂÁî £¬µ«ÏÖÔÚֻʵÏÖÁËÈý¸ö £¬°üÀ¨Ö´ÐÐPowerShellÏÂÁî¡¢ÖØ¸´³õʼװÖüì²éºÍÀú³Ì¡¢·¢ËÍÆÁÄ»½ØÍ¼ÐÂÎÅ£¨ËäδÍêȫʵÏÖ£©ÒÔ¼°×Ô»ÙÏÂÁî ¡£ÕâÖÖ¶ÔÔÆÓ¦ÓóÌÐòµÄ¶ñÒâʹÓøø·ÀÓùÕß´øÀ´ÁËÌôÕ½ £¬ÓÉÓÚ´Ó·ÀÓùÕߵĽǶÈÀ´¿´ £¬ºÜÄÑÇø·ÖʹÓÃAPIµÄͨË×Óû§ºÍC2ͨѶ ¡£ÎªÁ˼á³ÖÇå¾² £¬½¨Òé×°ÖÃ×îÐÂÇÒÐÅÓþÓÅÒìµÄ·À²¡¶¾ºÍ·´¶ñÒâÈí¼þ £¬ÒÔ¼ì²âºÍ×èÖ¹´ËÀà¶ñÒâÎļþ ¡£


https://hackread.com/hackers-exploit-telegram-api-spread-golang-backdoor/


5. RansomHubÀÕË÷Èí¼þ×éÖ¯¹¥»÷ËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä


2ÔÂ17ÈÕ £¬RansomHubÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶ÔËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä¾ÙÐÐÁ˹¥»÷ £¬ÒÑËø¶¨Æä»ù´¡ÉèÊ©²¢»ñÈ¡ÁË119GBµÄÎļþ ¡£ÊÜÓ°ÏìµÄϵͳ°üÀ¨¶Ä³¡¡¢±ãµ±µê¡¢Õþ¸®´óÂ¥¡¢µçÐÅ·þÎñÒÔ¼°¶à¸öÒ½ÁÆÖÐÐÄ ¡£RansomHubÖ¸Ôð²¿Âäδ¾ÙÐÐ̸ÅÐ £¬²¢Æ·ÆÀÆä°ü¹Ü¹«Ë¾ºÍ¶­Ê»áδ½ÓÄÉÐж¯ ¡£RansomHubÍþв³Æ £¬ÈôÖÜÈýǰδÊÕµ½»Ø¸´ £¬½«Ð¹Â¶ËùÓÐÊý¾Ý ¡£ËÕÊ¥ÂêÀöÆæçêÍßÓ¡µÚ°²²¿ÂäÔò½ÒÏþÉùÃ÷³Æ £¬2ÔÂ9ÈÕÔâÊÜÁËÀÕË÷Èí¼þÍøÂç¹¥»÷ £¬¶à¸öµç»°ºÍÅÌËã»úϵͳÊܵ½Ó°Ïì ¡£²¿ÂäÕýÔÚÓëÍøÂçÇ徲ר¼ÒºÏ×÷ £¬Æð¾¢½â¾öÎÊÌâ £¬²¢ÉèÁ¢ÁËеĵ绰ºÅÂë £¬Ô¤¼Æ½«ÒÔÓÐÏÞÄÜÁ¦ÔË×÷Ò»ÖÜ ¡£²¿ÂäÖ÷ϯÏòÉçÇø°ü¹Ü £¬ËûÃǽ«¼ÌÐø°´ÆÚ¸üлָ´ÇéÐÎ £¬µ«ÏÖÔÚÎÞ·¨·ÖÏí¸ü¶àϸ½Ú £¬Ð»Ð»¸÷È˵ÄÄÍÐĺÍÃ÷È· ¡£


https://databreaches.net/2025/02/17/ransomware-attack-affects-michigan-casinos-and-tribal-health-centers/


6. Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯DDoS¹¥»÷


2ÔÂ17ÈÕ £¬Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯ÁËDDoS¹¥»÷ £¬Ä¿µÄ°üÀ¨ÀûÄÉÌØ»ú³¡¡¢Âí¶ûÅíÈø»ú³¡¡¢½»Í¨¹ÜÀí¾Ö¡¢Intesa San PaoloÒøÐÐÒÔ¼°ËþÀ¼Íиۺ͵ÄÀïÑÅË¹ÌØ¸ÛµÄÍøÕ¾ ¡£ÕâЩ¹¥»÷ÊǶÔÒâ´óÀû×ÜͳÂíËþÀ×À­½«¶íÂÞ˹ÓëÄÉ´âµÂ¹úÀúÊ·¾ÙÐнÏÁ¿µÄÑÔÂ۵ĻØÓ¦ £¬NoName057(16)Éù³ÆÕâÊǶԡ°¿Ö¶íÕß¡±µÄ´¦·Ö ¡£Ö»¹Ü¹¥»÷¶ÔÄ¿µÄµÄÓ°Ïì½ÏС £¬µ«Òâ´óÀû¹ú¼ÒÍøÂçÇå¾²¾ÖѸËÙ½ÓÄÉÐж¯ £¬Ö§³ÖÊÜÓ°ÏìµÄ×éÖ¯²¢Ïû³ýÁ˹¥»÷ ¡£NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ö±»îÔ¾ £¬Ê¹ÓöàÖÖ¹¤¾ß¾ÙÐй¥»÷ £¬²¢ÔÚµØÔµÕþÖÎÖ÷ҪʱÆÚÉý¼¶Ï®»÷ ¡£´Ë´Î¹¥»÷²¢·ÇÊ×´Î £¬Ö®Ç°¸Ã×éÖ¯Ò²Ôø¶ÔÒâ´óÀû¸÷²¿Î¯¡¢»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ÍøÕ¾ºÍ˽ÈË×éÖ¯Ìᳫ¹ý¹¥»÷ ¡£¶íÂÞ˹Íâ½»²¿½²»°ÈËÂêÀöÑÇ¡¤Ôú¹þÂÞÍÞÒ²ÌåÏÖ £¬ÂíËþÀ×À­µÄÑÔÂÛ²»»á¡°²»ÊÜ´¦·Ö¡± ¡£


https://securityaffairs.com/174294/hacktivism/noname05716-launched-ddos-attacks-on-italian-sites.html