Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¶È

°ä²¼¹¦·ò 2025-06-11

1. Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¶È


6ÔÂ10ÈÕ £¬Rare Werewolf£¨Ç°³Æ Rare Wolf£©ºÚ¿Í×éÖ¯ £¬Ò²±»³ÆÎª Librarian Ghouls ºÍ Rezet £¬±»È϶¨Îª¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯ £¬ÓëһϵÁÐÕë¶Ô¶íÂÞ˹ºÍ¶ÀÁ¢¹ú¶È½áºÏÌ壨CIS£©¹ú¶ÈµÄÍøÂç¹¥»÷ÓйØ £¬×Ô 2019 ÄêÒÔÀ´Ò»Ïò»îÔ¾¡£¸Ã×éÖ¯¹¥»÷ÒâͼÊÇÔÚÊÜϰȾÖ÷»úÉϳÉÁ¢Ô¶³Ì½Ó¼û¡¢ÇÔȡƾ֤²¢²¿Êð¼ÓÃÜÇ®±Ò¿ó¹¤ £¬Ó°ÏìÊý°ÙÃû¶íÂÞ˹Óû§ £¬Éæ¼°¹¤ÒµÆóÒµºÍ¹¤³ÌԺУ £¬°×¶íÂÞ˹ºÍ¹þÈø¿Ë˹̹ҲÓÐÉÙÁ¿Ï°È¾¡£Æä¹¥»÷ÏÔÖøÌØµãÊÇÆ«²îÓÚʹÓúϷ¨µÚÈý·½Èí¼þ £¬¶ñÒâÖ°ÄÜͨ¹ýºÅÁîÎļþºÍ PowerShell ¾ç±¾ÊµÏÖ¡£¸ÃÍþвÐÐΪÕßͨ¹ý´¹µöÓʼþ»ñÈ¡³õʼ½Ó¼ûȨÏÞ £¬ÀûÓð²ÉíµãÇÔÈ¡Êý¾Ý²¢Í¶·Å¶àÖÖ¹¤¾ß £¬ÓÃÓÚ½»»¥¡¢ÍøÂçÃÜÂëºÍ½ûÓ÷À²¡¶¾Èí¼þ¡£¿¨°Í˹»ù¼Í¼µÄ×îй¥»÷ÏÔʾ £¬ÒÔÔ̺¬¿ÉÖ´ÐÐÎļþµÄÊÜÃÜÂë±£»¤Ñ¹Ëõ°üΪÆðµã £¬Ñ¹Ëõ°üÖÐÓÐ×°Ö÷¨Ê½ £¬ÓÃÓÚ²¿ÊðºÏ·¨¹¤¾ß¼°ÆäËûÔØºÉ £¬Ô̺¬µö¶ü PDF Îĵµ¡£ÖÐÑëÔØºÉ´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡ÆäËûÎļþ £¬»¹Ê¹Óà AnyDesk Ô¶³Ì×ÀÃæÈí¼þºÍ Windows Åú´¦ÖÃ¾ç±¾ÍÆ½øÊý¾ÝÇÔÈ¡ºÍ¿ó¹¤²¿Ê𠣬Åú´¦Öþ籾ÄÜ×Ô¶¯»½ÐÑÊܺ¦Õßϵͳ²¢ÔÊÐí¹¥»÷ÕßÔ¶³Ì½Ó¼û¡£ÀûÓõÚÈý·½ºÏ·¨Èí¼þ½øÐжñÒâÖ÷ÕÅÊdz£¼û¼¼Êõ £¬Ôö³¤ÁË APT »î¶¯¼ì²âºÍ¹éÒòÄѶÈ¡£


https://thehackernews.com/2025/06/rare-werewolf-apt-uses-legitimate.html


2. DanaBot¶ñÒâÈí¼þ·ì϶¡°DanaBleed¡±Â¶³öÖÂÆä±»²é


6ÔÂ10ÈÕ £¬2022Äê6Ô¸üÐÂÖÐ £¬DanaBot¶ñÒâÈí¼þ²Ù×÷ÒýÈëµÄÃûΪ¡°DanaBleed¡±µÄ·ì϶ £¬µ¼ÖÂÆäÔÚºóÐø·¨ÂÉÐж¯Öб»¼ø±ð¡¢¸æ×´²¢²ð³ý¡£DanaBotÊÇÒ»¸ö»îÔ¾ÓÚ2018ÄêÖÁ2025ÄêµÄ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨ £¬³£ÓÃÓÚÒøÐÐڲƭ¡¢Æ¾Ö¤ÍµÇÔ¡¢Ô¶³Ì½Ó¼ûºÍDDoS¹¥»÷¡£Zscaler ThreatLabz×êÑÐÈËÔ±·¢Ïָ÷ì϶ £¬ÄÚ´æÐ¹Â©Ê¹ËûÃǵÃÒÔÉî¿ÌÏàʶ¶ñÒâÈí¼þÄÚ²¿²Ù×÷¼°Æä±³ºóÈËÔ±¡£ÀûÓô˷ì϶ £¬¹ú¼Ê·¨Âɲ¿ÃÅ·¢Õ¹¡°ÖÕ¾ÖÐж¯¡± £¬Ê¹DanaBot»ù´¡ÉèÊ©ÏÂÏß £¬²¢¸æ×´¸ÃÍþв×éÖ¯16Ãû³ÉÔ±¡£DanaBleed·ìÏ¶ËæDataBot°æ±¾2380ÒýÈë £¬¸Ã°æ±¾ÐÂÔöC2ºÍ̸ £¬µ«ÐºÍ̸Âß¼­´æÔÚÈõµã £¬Î´ÎªËæ»úÌìÉúµÄÌî³ä×Ö½Ú³õʼ»¯Ð·ÖÅäÄÚ´æ £¬µ¼ÖÂC2ÏìÓ¦Ô̺¬·þÎñÆ÷ÄÚ´æÖÐÔü×ÒÊý¾ÝƬ¶Î £¬ÀàËÆ2014ÄêHeartBleedÎÊÌâ¡£´Ë·ì϶ʹ´óÁ¿¸öÈËÊý¾Ý¶³ö¸ø×êÑÐÈËÔ± £¬Ô̺¬ÍþвÐÐΪÕß¾ßÌåÐÅÏ¢¡¢ºó¶Ë»ù´¡ÉèÊ©¡¢Êܺ¦ÕßÊý¾Ý¡¢¶ñÒâÈí¼þ¸üÐÂÈÕÖ¾¡¢¸öÈ˼ÓÃÜÃÜÔ¿¡¢SQL²éÎʺ͵÷ÊÔÈÕÖ¾ÒÔ¼°C2ÒDZí°åµÄHTMLºÍWeb½çÃæÆ¬¶ÎµÈ¡£ÈýÄê¶àÀ´ £¬DanaBotÒ»Ïò´¦ÓÚÊÜËðģʽ £¬¿ª·¢ÈËÔ±»ò¿Í»§Î´¾õ²ìÒѶ³ö¡£µ±ÍøÂçµ½×ã¹»Êý¾Ýºó £¬·¨Âɲ¿ÃŲÉÈ¡Ðж¯ £¬ËäÖ÷ÌâÍŶӽö±»¸æ×´Î´±»¿ÛÁô £¬µ«¹Ø¼üC2·þÎñÆ÷¡¢650¸öÓòÃûºÍ½ü400ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»²é·â £¬ÁÙʱ½â³ýÁËÍþв¡£½«À´ÍþвÐÐΪÕß³Á·µÍøÂç·¸×ï»î¶¯µÄ¿ÉÄÜÐÔ²»´ó £¬ÇÒºÚ¿ÍÉçÇøÐÅÀµ¶È½µµÍ½«³ÉΪÆäÒ»´ó×è°­¡£


https://www.bleepingcomputer.com/news/security/danabot-malware-operators-exposed-via-c2-bug-added-in-2022/


3. FIN6ºÚ¿Í×éÖ¯¼ÙÒâÇóÖ°Õß´«²¼¶ñÒâÈí¼þ¡°More Eggs¡±


6ÔÂ10ÈÕ £¬ÓëµäÐÍÕÐÆ¸ÓйØÉç»á¹¤³Ì¹¥»÷·ÖÆç £¬FIN6ºÚ¿Í×éÖ¯¼ÙÒâÇóÖ°Õß £¬ÀûÓÃÉç»á¹¤³Ì¼¿Á©´«²¼¶ñÒâÈí¼þ¡£FIN6±ðÃû¡°÷¼÷ÃÖ©Ö롱 £¬×î³õÒÔ½ðÈÚڲƭÎÅÃû £¬ÈçÈëÇÖÏúÊÛµãϵͳÇÔÊØÐÅÓþ¿¨ÐÅÏ¢ £¬2019ÄêÆð¹¥»÷ÁìÓòÀ©´óÖÁÀÕË÷Èí¼þ £¬²¢²ÎÓëRyukºÍLockergogaµÈÐж¯¡£½üÆÚ £¬¸Ã×éÖ¯ÀûÓÃÉç»á¹¤³Ì»î¶¯´«²¼¡°More Eggs¡± £¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ¼´·þÎñµÄJavaScriptºóÃÅ £¬ÓÃÓÚÆ¾Ö¤ÍµÇÔ¡¢ÏµÍ³½Ó¼ûºÍÀÕË÷Èí¼þ²¿Êð¡£¹¥»÷¹ý³ÌÖÐ £¬FIN6¼Ù×°³ÉÐéαÇóÖ°Õß £¬Í¨¹ýLinkedInºÍIndeedÓëÕÐÆ¸ÈËÔ±ºÍÈËÁ¦×ÊÔ´²¿ÃÅÁªÏµ £¬³ÉÁ¢¹ØÏµºó·¢ËÍ´¹µöÓʼþ¡£Óʼþº¬Ö¸Ïò¡°¼òÀúÍøÕ¾¡±µÄ²»³Éµã»÷URL £¬ÆÈʹÊÕ¼þÈËÊÖ¶¯ÊäÈë £¬ÕâЩÓòÃûͨ¹ýGoDaddyÄäÃû×¢²á²¢ÍйÜÔÚAWSÉÏ¡£FIN6»¹Ôö³¤»·¾³Ö¸ÎƺÍÐÐΪ²é³­ £¬È·±£Ö»ÓÐÖ¸±êÄÜ´ò¿ªµÇÂ½Ò³Ãæ £¬×èÖ¹VPN»òÔÆÏνӼ°Linux»òmacOS½Ó¼û³¢ÊÔ¡£ÇкÏǰÌáµÄÊܺ¦Õß»áÊÕµ½¼ÙµÄCAPTCHA²½Öè £¬²¢±»ÌáÐÑÏÂÔØÔ̺¬¼Ù×°Windows¿ì½Ý·½Ê½Îļþ£¨LNK£©µÄZIPµµ°¸ £¬¸ÃÎļþÖ´Ðо籾ÏÂÔØ¡°More Eggs¡±ºóÃÅ¡£¸ÃºóÃÅÓÉ¡°Venom Spider¡±´´½¨ £¬ÊÇÄ£¿é»¯ºóÃÅ £¬ÄÜÖ´ÐкÅÁî¡¢ÇÔȡƾ֤¡¢´«µÝ¶î±íÓÐÐ§ÔØºÉ¼°Ö´ÐÐPowerShell¡£FIN6µÄ¹¥»÷Ëäµ¥Ò»µ«ÓÐЧ £¬ÒÀÀµÉç»á¹¤³ÌѧºÍ¸ß¼¶Ìӱܼ¼Êõ¡£Òò¶ø £¬ÕÐÆ¸ÈËÔ±ºÍÈËÁ¦×ÊÔ´Ô±¹¤Ó¦ÉóÉ÷¶Ô´ýÉó²é¼òÀúºÍÎÄÕ¼¯µÄÔ¼Çë £¬¹«Ë¾ºÍÕÐÆ¸»ú¹¹Ò²Ó¦¶ÀÁ¢È·ÈÏÈËÔ±Éí·Ý¡£


https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/


4. HerokuÍ»·¢´óÃæ»ýÖжϳ¬ÁùÓ×ʱ £¬Ö¿ª·¢Åö±Ú·þÎñÊÜÓ°Ïì


6ÔÂ10ÈÕ £¬Heroku×÷ΪSalesforceÆìÏÂµÄÆ½Ì¨¼´·þÎñ£¨PaaS£© £¬ÔÊÐí¿ª·¢ÈËÔ±½«ÀûÓ÷¨Ê½²¿Êðµ½Ôƶ˶øÎÞÐèÖÎÀí»ù´¡ÉèÊ© £¬µ«½üÈÕÔâ·êÁ˳ÖÐøÁù¸ö¶àÓ×ʱµÄ´óÃæ»ýÖжÏ¡£Õâ´Îå´»úʼÓÚÖܶþÁ賿 £¬Óû§»ã±¨³ÆHerokuÀûÓÃÎÞ·¨ÔËÐÐ £¬ÇÒ¿ª·¢ÈËÔ±ÎÞ·¨µÇ¼HerokuÒDZí°å²¢Ê¹ÓÃCLI¹¤¾ß¡£HerokuÔÚÆä×´Ì¬Ò³ÃæÉÏÈÏ¿ÉÁËÕâÒ»ÊÂÎñ £¬²¢°µÊ¾ÔÚµ÷²é¡£ÖжÏÓ°ÏìÁ˶à¶à¹«Ë¾ºÍÕ¾µãµÄ·þÎñ £¬ÀýÈçSolarWindsÒòÎÞ·¨´ÓHeroku»ñÈ¡ÈÕÖ¾¶øÊܵ½²¨¼°¡£Ê¹ÓÃHerokuÀûÓ÷¨Ê½ÊµÏÖ¸÷ÀàÖ°ÄܵÄÍøÕ¾Ò²Êܵ½Ó°Ïì £¬²¿ÃÅÖ°ÄÜÎÞ·¨Õý³£ÔËÐС£HerokuÉÐδÌṩÓйØÖжϵ××ÓÔ­ÒòµÄ¾ßÌåÐÅÏ¢»òºÎʱ¸´Ô­·þÎñ £¬²»ÍâÔÚ2025Äê6ÔÂ10ÈÕ £¬Salesforce°µÊ¾Ã»ÓÐÖ¤¾ÝÅú×¢Õâ´Î·þÎñÖжϴæÔÚ¶ñÒâ»î¶¯ £¬²¢ÌṩÁ˿ͻ§¸ú×Ù¸üеÄÁ´½Ó¡£½ØÖÁUTC¹¦·ò21:48:25 £¬Heroku×´Ì¬Ò³ÃæÏÔʾÒѽâ¾ödashboard.heroku.comµÄÎÊÌâ £¬¿Í»§¿É½Ó¼û¸ÃÍøÕ¾ £¬Í¬Ê±ÎªÈÔÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËͨ¹ýHerokuºÅÁîÐнçÃæÔËÐеĺÅÁî×÷Ϊ½â¾ö²½Öè £¬²¢Ç¿µ÷Ó¦Ò»´Î³ÁÆôһ̨²â¹¦»úÒÔÔ¤·À·þÎñÖжÏ¡£Heroku°µÊ¾Æä¹¤×÷³ÁµãÈÔÊÇÄÚ²¿²âÊÔºÍÑéÖ¤ £¬²¢½«³ÖÐø¹Ø×¢ÆäËû²úÆ·µÄ¸Ä½ø £¬Í¬Ê±³Ô¼µ¾¡¿ìÌṩ½â¾ö¹æ»®¹¦·ò±í £¬²¢¶ÔÓÉ´ËÔì³ÉµÄ³ÖÐøÀ§ÈÅÉî±íǸÒâ¡£


https://www.bleepingcomputer.com/news/technology/massive-heroku-outage-impacts-web-platforms-worldwide/


5. DuplexSpy RATÐÂÐÍľÂíÏÖÉí £¬¿ÉÆëÈ«½ÚÔìWindowsϵͳ


6ÔÂ9ÈÕ £¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕ·¢ÏÖÒ»¿îÃûΪDuplexSpy RATµÄÐÂÐ͸߼¶Ô¶³Ì½Ó¼ûľÂí £¬¸ÃľÂí¿ÉÈù¥»÷ÕßÈ«Ãæ¼à¿ØÓë½ÚÔìWindowsϵͳ¡£Õâ¿î¶ñÒâÈí¼þѡȡC#˵»°¿ª·¢ £¬¾ß±¸¼ò½àµÄͼÐνçÃæºÍ¿ÉÅäÖÃÑ¡Ïî £¬ÏÔÖø½µµÍÁËÍøÂç·¸×ï·Ö×ÓÈëÇÖÖ¸±êÉ豸µÄ¼¼ÊõÃż÷¡£ÆäѡȡAES-256-CBCºÍRSA-4096Ë«³Á¼ÓÃÜËã·¨ £¬±£»¤ÊÜϰȾÖ÷»úÓëºÅÁî½ÚÔì·þÎñÆ÷¼äµÄͨѶ £¬ÓÐЧ¶ã±ÜÍøÂç¼ì²â¡£¸ÃRAT×î³õÓÉ¿ª·¢ÕßÒÔ¡°½ÌÓýÓô¦¡±°ä²¼ÔÚGitHubÉÏ £¬µ«Æä¶àÖ°ÄÜÐÔºÍÒ×¶¨ÔìÐÔÎüÒýÁËÍþвÐÐΪÕß¡£DuplexSpy RATÖ°ÄÜÈ«Ãæ £¬²»½öÔ̺¬¼üÅ̼ͼ¡¢ÊµÊ±ÆÁÄ»²¶»ñµÈ´«Í³Ô¶³Ì½Ó¼ûÖ°ÄÜ £¬»¹¾ß±¸ÉãÏñÍ·/Âó¿Ë·ç¼à¿Ø¼°½»»¥Ê½ºÅÁîÖն˵ȸ߼¶¼à¿ØÄÜÁ¦¡£ÔÚÓÆ¾Ã»¯ÓëÒñ±ÎÐÔ·½Ãæ £¬¸ÃľÂíѡȡ¶à²ãÕ½Êõ £¬ÒÔ¡°Windows Update.exe¡±Îª¼Ù×°Ãû³Æ¸´Ôìµ½Óû§Æô¶¯Îļþ¼Ð £¬²¢´´½¨¶ÔӦע²á±íÏî £¬È·±£ÏµÍ³³ÁÆôºÍËãÕʳ¢ÊÔÖÐÈÔÄÜ´æ»î¡£Í¬Ê± £¬Ëü»¹¾ß±¸¸ß¼¶·´·ÖÎöÄÜÁ¦ £¬Ã¿100ºÁÃë¼à¿ØÏµÍ³¹ý³Ì £¬Õë¶Ô°²È«¹¤¾ßºÍ·ÖÎöÀûÓà £¬Ò»µ©¼ì²âµ½°²È«Èí¼þ £¬±ã»áÖÕÖ¹Óйعý³Ì²¢ÏÔʾÐéαÃýÎóÐÅÏ¢Îóµ¼Óû§¡£´Ë±í £¬¸ÃRATѡȡÎÞÎļþÖ´Ðм¼Êõ £¬Ö±½Ó½«×ÔÉí¼ÓÔØµ½ÄÚ´æºóɾ³ý´ÅÅÌԭʼ¿ÉÖ´ÐÐÎļþ £¬¼«´óÏ÷¼õÁËȡ֤ºÛ¼£¡£


https://cybersecuritynews.com/new-duplexspy-rat-let-attackers-gain-complete-control/


6. S5 Agency WorldÔâBertÀÕË÷¹¥»÷ÖÂÊý¾Ý±»µÁ


6ÔÂ10ÈÕ £¬´óÐ͸ۿڴúÀí»ú¹¹S5 Agency World½üÈÕÔâµ½ÀÕË÷Èí¼þÍŻ﹥»÷ £¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Á˽ü140GBÊý¾Ý £¬²¢½«¸Ã¹«Ë¾Ãû×Ö°ä²¼ÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ £¬ÒÔ´ËÆÈʹS5Ö§¸¶Êê½ð £¬Ô¤·ÀÊý¾Ýй¶¸ø¹«¼Ò´øÀ´²»Á¼Ó°Ïì¡£S5×÷Ϊһ¼Òº£ÉÏÔËÊ乫˾ £¬ÒµÎñ¸²¸ÇÈ«Çò360¶à¸ö¸Û¿Ú £¬ÔÚº½Ô˹«Ë¾´¬²°Í£¿¿Ê±³äÈα¾µØ´ú±í £¬ÆäÔËÓª¶Ôº£ÉÏÔËÊäÖÁ¹Ø³ÁÒª¡£¹¥»÷Õß°ä²¼Á˼¸ÕžݳƱ»µÁÐÅÏ¢µÄ½ØÍ¼ £¬¾­×êÑÐÍŶӵ÷²é £¬ÕâЩÊý¾ÝÑù±¾ËƺõÊǺϷ¨µÄ £¬Ô̺¬²é³­»ã±¨¡¢Ô±¹¤Ð¹ÚÒßÃç½ÓÖÖÇé¿ö¡¢²¿ÃÅ»¤ÕÕ¸´Ó¡¼þµÈ £¬µ«Êý¾ÝÑù±¾ÓÐÏÞ £¬ÏÖʵ»ñÈ¡µÄÎļþ×ÜÁ¿¿ÉÄܸü´ó¡£¶ÔÓÚº£ÉÏÔËÊ乫˾¶øÑÔ £¬ÍøÂç¹¥»÷µ¼ÖµÄÍ£»ú²»³É½ÓÊÜ £¬ÓÉÓÚÔËÊäÑÓÎó»áÔì³É¹©¸øÁ´Æ¿¾± £¬¶Ô¿Í»§Ôì³É¸ºÃæÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ £¬BertÀÕË÷Èí¼þÊǸÃÁìÓòµÄгÉÔ± £¬ÓÚ2025Äê4Ô³õ´Î±»·¢ÏÖ £¬ÇÒÔڶ̶̹¦·òÄÚÒѳɹ¦¹¥»÷ÁËÊ®¼¸¸ö×éÖ¯¡£×êÑÐÈËÔ±Ö¸³ö £¬BertÀÕË÷Èí¼þÍÅ»ïͨ¹ýºÏ·¨Èí¼þ¹©¸øÁ´´«²¼¶ñÒâÈí¼þ £¬Í¨³£ÒÔÒ½ÁƱ£½¡ºÍ¿Æ¼¼ÐÐҵΪָ±ê £¬ÇÒËÆºõ¼«¶ÈÊʸõ±Ç°µÄÍøÂç·¸×ï¾ÖÊÆ £¬½«À´¿ÉÄÜÑÝÔì³É¸ü´óµÄÍþв¡£


https://cybernews.com/security/port-agency-ransomware-data-breach/