±ÏÂíÍþºÉÀ¼·Ö²¿ÔâNovaÀÕË÷Èí¼þ¹¥»÷

°ä²¼¹¦·ò 2026-01-29

1. ±ÏÂíÍþºÉÀ¼·Ö²¿ÔâNovaÀÕË÷Èí¼þ¹¥»÷


1ÔÂ26ÈÕ £¬½üÈÕ £¬ºÉÀ¼±ÏÂíÍþ¹ÜÕÊʦÊÂÎñËùºÉÀ¼·Ö²¿Ôâ·ê»îÔ¾ÀÕË÷Èí¼þ×éÖ¯NovaµÄ¹©¸øÁ´¹¥»÷ £¬³ÉΪ¸Ã×éÖ¯×îÐÂÖ¸±ê¡£¾ÝÀÕË÷Èí¼þ»î¶¯¸ú×ÙÆ½Ì¨Åû¶ £¬¹¥»÷²úÉú¹¦·òÓë·¢ÏÖÈÕÆÚÏà½ü £¬¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡´óÁ¿Ãô¸ÐÊý¾Ý £¬²¢·¢³öΪÆÚ10ÌìµÄ×îºóͨëº £¬ÒªÇóÊܺ¦·½ÁªÏµ½»ÉæÊê½ðÖ§¸¶¡£±ÏÂíÍþ×÷ΪȫÇòµ±ÏȵÄרҵ·þÎñ»ú¹¹ £¬ºÉÀ¼·Ö²¿°ÑÎÕן­¸Ç½ðÈÚ·þÎñ¡¢ºÏ¹æÉ󼯼°ÆóÒµÔËÓªµÄÃô¸Ð¿Í»§Êý¾Ý £¬Õâ´Î¹¥»÷ÇкÏNovaÒ»¹áµÄ×÷°¸Ä£Ê½¡ª¡ª×¨Ò»ÓÚרҵ·þÎñÓë½ðÈÚÐÐÒµµÄ³ÛÃûÆóÒµ¡£ÊÂÎñ²úÉúºó £¬ÍøÂ簲ȫÍŶӽ¨ÒéÁ¢¼´¹Ø±ÕÒÑʶ´ËÍâÓйØÓòÃû»ù´¡ÉèÊ© £¬²¢Ç×êÇ¼à¿ØÍøÂçÄÚÊÇ·ñ´æÔÚÓëÀÕË÷Èí¼þ²¿ÊðÓйصĺáÏòÒÆ¶¯»î¶¯¡£Ò»µ©·¢ÏÖÓëNovaÓйصÄÈëÇÖºÛ¼£»ò¹¥»÷Ö¸±ê £¬±ØÐëÁ¢¼´Æô¶¯Ó¦¼±Ô¤°¸¡£½ØÖÁĿǰ £¬±ÏÂíÍþ¹Ù·½ÉÐδ¾Í´ËÊÂÎñ¹«¿ª°ä·¢ÉêÃ÷ £¬¿Í»§¼°Óйط½ÐèÇ×êǹØ×¢Æä¹Ù·½Çþ·ºóÐø´«µÝ £¬ÒÔ»ñÈ¡ÊÂÎñÓ°ÏìÆÀ¹À¼°½¨¸´½øÕ¹¹¦·ò±í¡£


https://cybersecuritynews.com/nova-ransomware-breach-kpmg-netherlands/


2. TA584ÀûÓÃTsundere BotÓëXWormľÂíÖ´ÐÐÀÕË÷¹¥»÷Á´


1ÔÂ28ÈÕ £¬×Ô2020ÄêÆð £¬Proofpoint³ÖÐø×·×ÙµÄTA584³õʼ½Ó¼û´úÀí½üÆÚ»î¶¯¼¤Ôö £¬Æäͨ¹ýTsundere BotÓëXWormÔ¶³Ì½Ó¼ûľÂí¹¹½¨¸´ÔÓ¹¥»÷Á´ £¬ÏÔÖøÌáÉýÈÆ¹ý¾²Ì¬¼ì²âÄÜÁ¦ £¬¿ÉÄÜÒý·¢ÀÕË÷Èí¼þ¹¥»÷¡£¸Ã×éÖ¯2025Ëêĺ»î¶¯Á¿½ÏͬÄêµÚÒ»¼¾¶ÈÔö³¤Èý±¶ £¬¹¥»÷ÁìÓò´Ó´«Í³Ö¸±êÇø£¨±±ÃÀ¡¢Ó¢°®£©À©´óÖÁµÂ¹ú¡¢Å·ÖÞ¶à¹ú¼°°Ä´óÀûÑÇ¡£Tsundere BotÓÉ¿¨°Í˹»ù2023Äê¼Í¼ £¬¹ØÁª¶íÓï²Ù×÷Ô±¼°123 Stealer¶ñÒâÈí¼þ £¬¾ß±¸ºóÃÅ¡¢¼ÓÔØÆ÷Ö°ÄÜ £¬ÐèNode.js»·¾³ÔËÐС£Æäͨ¹ýEtherHiding¼¼Êõ´ÓÒÔÌ«·»Çø¿éÁ´»ñÈ¡C2µØÖ· £¬²¢ÄÚÖÃÓ²±àÂ뱸ÓõØÖ· £¬Í¨¹ýWebSocketÓëC2·þÎñÆ÷ͨѶ £¬Í¬Ê±¼ì²âϵͳ˵»° £¬ÈôΪ¶ÀÁªÌå˵»°£¨Èç¶íÓÔò¶ôÖÆÖ´ÐС£¸Ã¶ñÒâÈí¼þ¿ÉÍøÂçϵͳÐÅÏ¢¡¢Ö´ÐÐËÁÒâJS´úÂë¡¢³äÈÎSOCKS´úÀí £¬²¢ÄÚÖÃÊг¡ÓÃÓÚ½©Ê¬·¨Ê½ÂòÂô¡£¹¥»÷Á´Ê¼ÓÚ±»ÈëÇÖÀϾÉÕË»§·¢Ë͵Ĵ¹µöÓʼþ £¬ÓʼþÔ̺¬Ö¸±êΨһURL¡¢µØÀíΧÀ¸¡¢IP¹ýÂ˼°³Á¶¨ÏòÁ´¡£Óû§¾­CAPTCHAÑéÖ¤ºó½øÈëClickFixÒ³Ãæ £¬±»ÓÕµ¼Ö´ÐÐPowerShellºÅÁî £¬¼ÓÔØ»ìºÏ¾ç±¾½«XWorm»òTsundere Bot×¢ÈëÄÚ´æ £¬×îÖÕä¯ÀÀÆ÷±»³Á¶¨ÏòÖÁÎÞº¦ÍøÕ¾ÒÔ¸²¸Ç¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/


3. ²¨À¼µçÍøÔâ·êÍøÂç¹¥»÷ £¬Ô¼30¸öÉèÊ©Êܵ½Ó°Ïì


1ÔÂ28ÈÕ £¬²¨À¼µçÍø12ÔÂÏÂÑ®Ôâ·êЭͬ¹¥»÷ £¬Ö¸±êֱָȫ¹ú¶à¸öÉ¢²¼Ê½ÄÜÔ´×ÊÔ´£¨DER£©Õ¾µã £¬Ô̺¬ÈȵçÁª²ú£¨CHP£©ÉèÊ©¡¢·çÄܼ°Ì«ÑôÄܵ÷¶Èϵͳ¡£Õâ´Î¹¥»÷ËäδÖжϵçÁ¦¹©¸ø £¬µ«µ¼Ö¹ؼüÔËÓª¼¼Êõ£¨OT£©ÏµÍ³ÊÜË𠣬°Ü»µ¡°ÎÞ·¨½¨¸´µÄ¹Ø¼üÉ豸¡± £¬×ÜËðʧ´ï1.2¼ªÍß £¬Õ¼²¨À¼ÄÜÔ´¹©¸øµÄ5%¡£¾Ý¹Ø¼ü¹¤Òµ»ù´¡ÉèÊ©°²È«¹«Ë¾DragosÅû¶ £¬ÊÜÓ°ÏìµØÖ·ÏÖʵԼ30¸ö £¬Ô¶³¬¹«¿ª±¨Â·µÄ12¸ö¡£DragosÒÔÖеÈÐÅÄÕâ´Î¹¥»÷¹éÒòÓÚ¶íÂÞ˹ÍþвÐÐΪÌåElectrum¡£¸Ã×éÖ¯ËäÓëSandworm£¨APT44£©´æÔÚ³Áµþ £¬µ«±»ÊÓΪ¶ÀÁ¢»î¶¯¼¯Èº¡£´Ëǰ £¬ESETÔø»ã±¨APT44ʹÓÃDynoWiper¶ñÒâÈí¼þ¶Ô²¨À¼µçÍøÌáÒéʧ°Ü¹¥»÷ £¬¶øElectrumµÄ¹¥»÷Ö¸±ê¸ü¾Û½¹ÓÚÉ¢²¼Ê½ÄÜÔ´Õ¾µãµÄµ÷¶Èϵͳ¡¢Ô¶³ÌÖն˵¥Ôª£¨RTU£©¡¢ÍøÂç±ßÔµÉ豸¡¢¼à¿ØÏµÍ³¼°»ùÓÚWindowsµÄ»úеµÈ¶³öÇÒÒ×Êܹ¥»÷µÄϵͳ¡£ÊÂÎñÏìÓ¦Ö¤¾ÝÏÔʾ £¬¹¥»÷Õß¶ÔÉ豸²¿ÊðºÍ²Ù×÷·½Ê½ÓÐÉî¿ÌÀí½â £¬·´¸´ÈëÇÖ¶à¸öÕ¾µãµÄÀàËÆRTUºÍ±ßÔµÉ豸ÅäÖá£ËûÃdzɹ¦Ê¹¶àÕ¾µãͨѶÉ豸ʧЧ £¬µ¼ÖÂÔ¶³Ì¼à¿ØºÍ½ÚÔìÖ°ÄÜʧÂä £¬µ«·¢µçÖ°ÄÜδÖжÏ¡£²¿ÃÅOT/ICSÉ豸ÅäÖðܻµÖÁÎÞ·¨¸´Ô­ £¬Õ¾µãWindowsϵͳ±»²Á³ý¡£


https://www.bleepingcomputer.com/news/security/cyberattack-on-polish-energy-grid-impacted-around-30-facilities/


4. eScan¸üзþÎñÆ÷ÔâÈëÇÖÖ¶ñÒâ¸üзַ¢


1ÔÂ28ÈÕ £¬eScan·À²¡¶¾²úÆ·Ôì×÷ÉÌMicroWorld Technologies 1ÔÂ20ÈÕ֤ʵÆäÇøÓò¸üзþÎñÆ÷ÔâÈëÇÖ £¬ÔÚÁ½Ó×ʱ´°¿°¢ÚÄÚÏò²¿Ãſͻ§·Ö·¢Á˶ñÒâ¸üС£¸Ã¸üб»·ÖÎöΪÔ̺¬¶à½×¶Î¶ñÒâÈí¼þ £¬Í¨¹ý´Û¸ÄeScanºÏ·¨¸üÐÂ×é¼þ¡°Reload.exe¡±ÊµÏÖÓÆ¾Ã»¯ºóÃŲ¿Ê𠣬µ¼ÖÂϵͳhostsÎļþÅú¸Ä¡¢¸üзþÎñÏνÓ×è¶Ï¼°Ð°²È«½ç˵½Ó¹Üʧ°Ü¡£eScan°µÊ¾ £¬Õâ´ÎÊÂÎñÔ´ÓÚδ¾­ÊÚȨ½Ó¼ûÇøÓò·þÎñÆ÷ÅäÖà £¬ÔÊÐí¶ñÒâÎļþ±»¸éÖÃÔÚ¸üзַ¢õè¾¶ÖС£¹«Ë¾Ç¿µ÷¸ÃÊÂÎñÓë²úÆ·×ÔÉí·ì϶ÎÞ¹Ø £¬½öÓ°Ïì´ÓÌØ¶¨ÇøÓò¼¯ÈºÏÂÔØ¸üеĿͻ§¡£ÊÂÎñ²úÉúºó £¬eScanѸËÙ¸ôÀëÊÜÓ°Ïì»ù´¡ÉèÊ©¡¢ÂÖ»»Éí·ÝÑé֤ƾ֤ £¬²¢ÓÚ1ÔÂ21ÈÕ°ä²¼°²È«²¼¸æ £¬×Ô¶¯Í¨Öª²¢Ö±½ÓÁªÏµÊÜÓ°Ïì¿Í»§ £¬ÌṩÔ̺¬ÏµÍ³¸´Ô­¡¢¸üÐÂÖ°ÄܳÁÆôÓü°ÑéÖ¤µÄ½¨¸´¸üз¨Ê½¡£


https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/


5. FBI²é·âÀÕË÷Èí¼þÍÅ»ïʹÓõÄRAMPÍøÂç·¸×ïÂÛ̳


1ÔÂ28ÈÕ £¬FBI½áºÏÃÀ¹ú·ðÂÞÀï´ïÖÝÄÏÇø¼ì²ì¹Ù°ì¹«ÊÒ¼°Ë¾·¨²¿ÍÆËã»ú·¸×ﲿÃŲé·âÁ˳ôÃûÔ¶ÑïµÄRAMPÍøÂç·¸×ïÂÛ̳¡£¸ÃÂÛ̳×÷Ϊ¶íÓïµØÏÂÍøÂçÖÐÉÙÊýÈÔ¹«¿ªÔÊÐíÍÆ¹ãÀÕË÷Èí¼þÐж¯µÄƽ̨ £¬ÆäTorÍøÕ¾¼°Ã÷ÍøÓòÃûramp4u.ioÏÖÒÑÏÔʾ²é·â֪ͨ £¬²¢³°·íʽÒýÓÃ×ÔÉí±êÓΨһÔÊÐíÀÕË÷Èí¼þµÄ´¦Ëù£¡¡±¼°¶íÂÞ˹¶¯»­½ÇÉ«ÂêɯգÑÛͼ°¸¡£Õâ´ÎÐж¯Ê¹·¨Âɲ¿ÃſɻñÈ¡ÂÛ̳Óû§Êý¾Ý £¬Ô̺¬Óʼþ¡¢IPµØÖ·¡¢Ë½ÐŵÈDZÔÚ·¸×ïÖ¤¾Ý £¬¿ÉÄܶԲÙ×÷°²È«ºöÂÔµÄÍþвÐÐΪÕßÖ´ÐÐÉí·Ý¼ø±ðÓë¿ÛÁô¡£RAMPÂÛ̳ÓÉ»¯ÃûOrangeµÄMikhail MatveevÓÚ2021Äê7ÔµÞÔì £¬Ö¼ÔڳнÓÒòDarkSide¹¥»÷Colonial Pipelineºó¶íÓïÂÛ̳²»ÈÝÀÕË÷Èí¼þÍÆ¹ãµÄ¿Õȱ¡£Matveev´ËǰΪBabukÀÕË÷Èí¼þÖÎÀíÔ± £¬¸Ã×éÖ¯Òò¹¥»÷»ªÊ¢¶ÙÌØÇø¾¯¾ÖºóÄÚ²¿¸îÁÑ £¬ËûÀûÓÃBabukÔ­ÓÐTorÓòÃû³Á½¨RAMP¡£ÂÛ̳ÉÏÏß³õÆÚÔâDDoS¹¥»÷ £¬OrangeÔøÔð¹ÖBabukǰ³ÉÔ± £¬µ«ºóÕß·ñ¶¨¡£MatveevÔڲɷÃÖÐй© £¬RAMPδʵÏÖÓ¯ÀûÇÒ³ÖÐøÊܹ¥»÷ £¬ºóÖð²½Í˳öÖÎÀí¡£


https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/


6. PackageGate·ì϶½ÒʾJavaScript°üÖÎÀíÆ÷°²È«È±µã


1ÔÂ28ÈÕ £¬°²È«¹«Ë¾Koi½üÈÕÅû¼ûûΪ"PackageGate"µÄϵÁÐÁãÈÕ·ì϶ £¬Ó°ÏìNPM¡¢PNPM¡¢VLTºÍBunµÈÖ÷Á÷JavaScript°üÖÎÀíÆ÷¡£ÕâЩ·ì϶¿ÉÈÆ¹ý¹©¸øÁ´·À»¤»úÔì £¬ÔÊÐí¹¥»÷ÕßÔÚÒÀÀµÏîÖÐÖ²Èë°µ²Ø¶ñÒâ´úÂë £¬¼´±ãÆôÓýûÓÃÐÔÃüÖÜÆÚ¾ç±¾£¨--ignore-scripts£©ºÍËø¶¨Îļþ±£»¤´ëÊ©ÈÔ¿ÉÄܱ»ÀûÓá£×êÑÐÏÔʾ £¬npm´æÔÚÑϳÁÉè¼ÆÈ±µã£º¶ñÒâGitÒÀÀµÏî¿Éͨ¹ýαÔìµÄ.npmrcÎļþ´úÌæGit¶þ½øÔìÎļþ £¬´¥·¢Ô¶³Ì´úÂëÖ´ÐУ»pnpmËäĬÈϽûÓþ籾 £¬µ«»áÔÚGitÀ­È¡Ê±ÔËÐгﱸ¾ç±¾£»vltÔÊÐí±éÀútar°üõè¾¶ £¬¹¥»÷Õ߿ɸ²¸ÇϵͳÎļþ£»BunÔòÒòÐÅÀµ°üÃû¶ø·ÇÔ´´úÂë £¬´æÔÚ°üÃû³ÁÓ÷çÏÕ¡£¸üÑϸñµÄÊÇ £¬pnpmºÍvltµÄËø¶¨Îļþ»úÔìʧЧ £¬ËüÃǽÓÊÜÎÞÆëÈ«ÐÔ¹þÏ£µÄÔ¶³Ìtar°ü £¬Ê¹¹¥»÷ÕßÄÜÔÚ´úÂëÉó²éºóÅú¸ÄÄÚÈÝ¡£Koi»ã±¨Ö¸³ö £¬¹¥»÷Õß¿Éͨ¹ýÉî¶ÈÒÀÀµÊ÷Ö²Èë¶ñÒâ°ü £¬Æ¾¾Ý¹¦·ò¡¢IPµÈÐźŶ¨ÏòͶ·Å¶ñÒâ´úÂë £¬Ëø¶¨ÎļþÎÞ·¨Ìṩ·À»¤¡£


https://securityaffairs.com/187416/hacking/packagegate-bugs-let-attackers-bypass-protections-in-npm-pnpm-vlt-and-bun.html