¹ú¼Ê½áºÏÐж¯µ·»ÙTycoon2FA´¹µöƽ̨

°ä²¼¹¦·ò 2026-03-06

1. ¹ú¼Ê½áºÏÐж¯µ·»ÙTycoon2FA´¹µöƽ̨


3ÔÂ4ÈÕ £¬Å·ÖÞÐ̾¯×é֯Эµ÷µÄ¹ú¼Ê·¨ÂÉÐж¯½üÈճɹ¦µ·»ÙTycoon2FA´¹µö¼´·þÎñ£¨PhaaS£©Æ½Ì¨¡£Õâ´ÎÐж¯ÓÉ΢ÈíÔÚ˽ӪºÏ×÷ͬ°éͬÃËÖ§³ÖÏÂÌáÒé¼¼ÊõÖжÏ £¬À­ÍÑάÑÇ¡¢Á¢ÌÕÍð¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Î÷°àÑÀºÍÓ¢¹ú·¨Âɲ¿ÃÅÖ´ÐÐÓòÃû²é·âµÈ´ëÊ© £¬¹²¹Ø¹Ø330¸öÊôÓÚ·¸×ï·þÎñ»ú¹¹¹Ç¸É»ù´¡ÉèÊ©µÄÓòÃû £¬Ô̺¬½ÚÔìÃæ°åºÍ´¹µöÒ³Ãæ¡£Tycoon2FA×Ô2023Äê8ÔÂÆð»îÔ¾ £¬±»ÍøÂç·¸×ï·Ö×ÓÓÃÓÚÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©±£»¤ £¬ÈëÇÖÈ«Çò½ü10Íò¸ö×éÖ¯µÄÕË»§¡£¾Ý΢ÈíÊý¾Ý £¬ÖÁ2025ÄêÄêÖÐ £¬¸Ãƽ̨ÿÔÂÌìÉúÊýǧÍò·â´¹µöÓʼþ £¬Ó°Ï쳬50Íò¸ö×éÖ¯ £¬Õ¼ËùÓб»À¹½Ø´¹µö³¢ÊÔµÄ60%¡£Æä¼¼ÊõµÀÀíΪͨ¹ý·´Ïò´úÀí·þÎñÆ÷ʵʱÀ¹½ØÊܺ¦ÕߵǼʹ´¦ºÍ»á»°cookie £¬·ÂÕÕMicrosoft 365¡¢OneDrive¡¢Outlook¡¢SharePoint¼°GmailµÈ¿ÉÐÅÆ·ÅƵÇÂ¼Ò³Ãæ¡£¼´±ãÊܺ¦ÕßʵÏÖÕý³£µÇ¼ £¬¹¥»÷ÕßÈÔÄܽٳÖÒÑÈÏÖ¤»á»°²¢ÈƹýMFA±£»¤ £¬³ý·Ç»î¶¯»á»°ºÍÁîÅÆ±»Ã÷È·³·Ïú¡£¸Ãƽ̨ͨ¹ýTelegramÒÔ120ÃÀÔª10ÌìʹÓÃȨµÄ¼ÛÖµÏúÊÛ £¬´ó·ù½µµÍµÍ¼¼Êõ·¸×ï·Ö×ÓÌáÒ鸴ÔÓMFAÈÆ¹ý¹¥»÷µÄÃż÷¡£


https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/


2. ÒÁÀÊÎÞÈË»úÏ®»÷ÑÇÂíÑ·Öж«Êý¾ÝÖÐÐÄÖÂÔÆ·þÎñÖжÏ


3ÔÂ3ÈÕ £¬ÒÁÀʱ¾ÖܶÔÑÇÂíÑ·ÔÚ°¢ÁªÇõºÍ°ÍÁÖµÄÈý×ùÊý¾ÝÖÐÐÄ·¢ÆðÎÞÈË»úÏ®»÷ £¬µ¼ÖÂÖж«²¿ÃŵØÓòÔÆ·þÎñÖжÏ £¬µØÓòÑÏÖØ´óÊÆ½øÒ»²½¶ñ»¯¡£¾ÝÑÇÂíÑ·Åû¶ £¬°¢ÁªÇõÁ½×ùÊý¾ÝÖÐÐÄÔâÎÞÈË»ú¡°Ö±½Ó»÷ÖÓ×± £¬°ÍÁÖÉèÊ©Òò¡°½ü¾àÀëÎÞÈË»úÏ®»÷¡±ÊÜË𠣬¹²Ôì³ÉÔ¼60ÏîÑÇÂíÑ·ÔÆ·þÎñÖжÏ £¬Ó°ÏìÍøÂçÁ÷Á¿¼°ÒÀÀµÔÆ·þÎñµÄÒµÎñÔËÓª¡£Õâ´ÎÏ®»÷²úÉúÔÚÃÀÒÔ½áºÏ½ø¹¥µ¼ÖÂÒÁÀÊ×î¸ßÇ̳þ¹þ÷ÄÚÒÁ¼°¶àÃû¸ß¼¶¹ÙÔ±ÉíÍöºó £¬ÒÁÀÊËæ¼´¶Ô°¢ÁªÇõ¼°ÁÚ¹ú·¢Õ¹±¨³ðÐж¯ £¬Ö¸±ê²»½öÔ̺¬ÃÀ¾ü»ùµØ £¬»¹À©´óÖÁ»ú³¡¡¢¾Æµê¼°¹Ø¼üÓÍÆø»ù´¡ÉèÊ©¡£ÑÇÂíÑ·ÉêÃ÷Ö¸³ö £¬Ï®»÷Ôì³ÉÊý¾ÝÖÐÐĽṹ°Ü»µ¡¢µçÁ¦ÖжÏ £¬²¢´¥·¢Ïû·Àϵͳµ¼ÖÂÊÒÄÚË®Ë𠣬±¾µØÏû·À²¿ÃÅÔÚɱ¾ø²Ðº¡Òý·¢»ð¾¯Ê±¹Ø¹ØÁ˵çÔ´ºÍ·¢µç»ú £¬½øÒ»²½¼Ó¾ç·þÎñÖжÏ¡£ÑÇÂíÑ·°µÊ¾ £¬Ä¿Ç°ÕýÓë´¦Ëùµ±¾ÖºÏ×÷ÓÅÏȱ£ÏÕÔ±¹¤°²È« £¬²¢½¨ÒéÖж«¿Í»§±¸·Ý¹Ø¼üÊý¾Ý £¬½«ÀûÓÃǨáãÖÁÆäËûAWSÇøÓò¡£¹«Ë¾Ç¿µ÷ £¬È«Ã渴ԭȡ¾öÓÚÊÜÓ°Ïì»ù´¡ÉèÊ©µÄ½¨¸´½ø¶È £¬¶øµ±Ç°Öж«³ÖÐøÃ¬¶Üµ¼ÖÂÕûÌåÔËÓª»·¾³ÈÔ²»³ÉÔ¤²â¡£


https://therecord.media/iran-drone-strikes-hit-amazon-data-centers-gulf


3. ¹È¸èÅû¶CorunaÐÂÐÍiOS·ì϶ÀûÓù¤¾ß°ü


3ÔÂ5ÈÕ £¬¹È¸èÍþвµý±¨Ó××飨GTIG£©·¢ÏÖÃûΪCoruna£¨±ðºÅCryptoWaters£©µÄÐÂÐÍiOS·ì϶ÀûÓù¤¾ß°ü £¬¸Ã¹¤¾ß°üÕë¶ÔÔËÐÐiOS 13.0ÖÁ17.2.1°æ±¾µÄiPhone £¬Ô̺¬ÎåÌõÆëÈ«·ì϶ÀûÓÃÁ´¹²23¸ö·ì϶·¨Ê½¡£Coruna¶Ô¾É°æiOSÓµÓÐÇ¿¹¥»÷ÄÜÁ¦ £¬µ«¶ÔiOS 17.3¼°ÒÔÉϰ汾ÎÞЧ £¬ÒòCVE-2024-23222µÈ·ì϶ÒÑÔÚ17.3Öн¨¸´¡£¸Ã¹¤¾ß°üÓÉ¼à¿ØÉ豸¹©¸øÉ̿ͻ§³õ´ÎʹÓà £¬ºó±»¶à¸öÍþв×éÖ¯¸´ÓøĽø¡£UNC6353ÔÚÎÚ¿ËÀ¼ÌáÒéË®¿Ó¹¥»÷ £¬Öйú½ðÈÚÍþв×éÖ¯UNC6691Ôòͨ¹ýÐéα½ðÈÚÍøÕ¾²¿ÊðÆëÈ«¹¤¾ß°ü £¬ÀûÓðµ²ØiFrameͶ·Å·ì϶·¨Ê½ £¬Â¶³ö»îÔ¾µÄ¡°¶þÊÖ¡±ÁãÈÕ·ì϶Êг¡¡£¼¼Êõ²ãÃæ £¬Coruna¿ò¼Üѡȡ¹ÖÒìJavaScript»ìºÏ¼¼Êõ £¬Í¨¹ýÉè±¸Ö¸ÎÆ¼ø±ð¼ÓÔØ¶ÔÓ¦·ì϶·¨Ê½¡£ÆäÖ÷ÌâÔ̺¬WebKitÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶ÀûÓá¢Ö¸ÕëÈÏÖ¤£¨PAC£©ÈƹýÄ£¿é £¬ÒÔ¼°¿É³ÁÓÃ×é¼þ £¬ÓÃÓÚÈÆ¹ýÓû§Ì¬RWXÄÚ´æ·ÖÅäÏÞ¶È¡£¹È¸èÒѰ䲼ÈëÇÖÖ¸±ê£¨IOC£©ºÍYara¹æ¶¨ £¬²¢½«ÓйØÓòÃû²ÎÓ밲ȫä¯ÀÀ±£»¤¡£


https://securityaffairs.com/188928/security/google-uncovers-coruna-ios-exploit-kit-targeting-ios-13-17-2-1.html


4. Bing AIËÑË÷´«²¼Î±ÔìOpenClawµÄ¶ñÒâÈí¼þ


3ÔÂ5ÈÕ £¬½üÆÚ £¬Íйܼì²âÓëÏìÓ¦¹«Ë¾HuntressÅû¶һ·ÐÂÐÍÍøÂç¹¥»÷»î¶¯£ºÍþвÐÐΪÕßͨ¹ýαÔìGitHub´æ´¢¿â £¬½áºÏ΢ÈíBingµÄAI¼ÓÇ¿ËÑË÷Ö°ÄÜ £¬ÏòÊÔͼװÖÿªÔ´AI´úÀíOpenClawµÄÓû§´«²¼ÐÅÏ¢ÇÔÈ¡·¨Ê½¼°´úÀí¶ñÒâÈí¼þ¡£OpenClawÒòÆäÄܽӼû±¾µØÎļþ²¢¼¯³Éµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶µÈÔÚÏß·þÎñµÄÖ°ÄܸöÐÔ £¬³ÉΪ¹¥»÷ÕßÑÛÖеġ°ÃÎÏëÔØÌ塱¡£¹¥»÷Õ߯ð³õ´´½¨¶ñÒâGitHub´æ´¢¿â £¬¼Ù×°³ÉOpenClaw¹Ù·½×°Ö÷¨Ê½ £¬²¢ÀûÓÃBing AIÔÚËÑË÷Á˾ÖÖеÄÍÆ¼ö»úÔì £¬ÓÕµ¼Óû§ÏÂÔØ¡£ÔÚmacOS³¡¾°Ï £¬Óû§±»Êèµ¼Ö´ÐÐÔ̺¬Atomic Stealer¶ñÒâÈí¼þµÄbashºÅÁî £¬¸ÃºÅÁî»áÏνÓÖÁ¡°puppeteerrr¡±µÈ¶ÀÁ¢GitHub²Ö¿â £¬²¿ÊðÔ̺¬shell¾ç±¾ºÍMach-O¿ÉÖ´ÐÐÎļþµÄ¶ñÒâÎļþ¡£WindowsÓû§ÔòÃæ¶Ô¡°OpenClaw_x64.exe¡±µÄ´«²¼ £¬¸Ã·¨Ê½»á¿ªÊͶà¸ö»ùÓÚRustµÄ¶ñÒâ¼ÓÔØÆ÷ £¬ÔÚÄÚ´æÖÐÖ´ÐÐÐÅÏ¢ÇÔÈ¡·¨Ê½¡£ÆäÖÐ £¬VidarÇÔÈ¡·¨Ê½»áͨ¹ýTelegramºÍSteamÓû§×ÊÁÏ»ñÈ¡C2Êý¾Ý £¬¶øGhostSocks´úÀíÔò½«Óû§ÍÆËã»úת»¯Îª¹¥»÷½Úµã £¬ÓÃÓÚ·ÓɶñÒâÁ÷Á¿»ò°µ²Ø¹¥»÷ºÛ¼£¡£


https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/


5. ά»ùýÌå»ù½ð»áÔâJavaScriptÈ䳿¹¥»÷


3ÔÂ5ÈÕ £¬Î¬»ùýÌå»ù½ð»áÔâ·êһ·ÓÉ×ÔÎÒ´«²¼JavaScriptÈ䳿Òý·¢µÄ°²È«ÊÂÎñ¡£¸ÃÈä³æÍ¨¹ýÅú¸ÄÓû§¾ç±¾¼°·ÛËéMeta-WikiÒ³ÃæÖ´Ðй¥»÷ £¬µ¼ÖÂÔ¼3996¸öÒ³Ãæ±»Åú¸Ä¡¢85λÓû§µÄcommon.jsÎļþ±»´úÌæ £¬×îÖÕÆÈʹ»ù½ð»áÁÙʱÏÞ¶ÈËùÓÐÏîÄ¿±à×ëÖ°ÄÜ¡£ÊÂÎñÔ´ÓÚ¶íÂÞ˹ά»ù°Ù¿ÆÍйܵÄÒ»·Ý¶ñÒâ¾ç±¾test.js £¬¸Ã¾ç±¾ÓÚ2024Äê3Ô³õ´ÎÉÏ´« £¬Ó뺹Ç๥»÷ÖÐʹÓõľ籾´æÔÚ¹ØÁª¡£¾Ýµ÷²é £¬µ±ÈÕÒ»Ãûά»ùýÌåÔ±¹¤ÕË»§ÔÚ²âÊÔÓû§¾çÐÔ×ÓÄÜʱ £¬¿ÉÄÜÒòÓÐÒâÖ´ÐÓ×¢Òâ±í¼ÓÔØ»òÕË»§±»µÁ´¥·¢¸Ã¾ç±¾ £¬µ¼ÖÂÆäͨ¹ýÒѵǼÓû§µÄcommon.js¼°È«¾ÖMediaWiki:Common.jsÎļþʵÏÖ×ÔÎÒ´«²¼¡£È䳿»¹¾ß±¸±à×ëËæ»úÒ³ÃæÖ°ÄÜ £¬Í¨¹ý²åÈë°µ²ØµÄJavaScript¼ÓÔØÆ÷¼°´ó³ß´çͼƬ·ÛËéÒ³ÃæÄÚÈÝ¡£Î¬»ùýÌå»ù½ð»á¹ýºóÉêÃ÷³Æ £¬¸Ã¶ñÒâ´úÂë½ö»îÔ¾23·ÖÖÓ £¬ÆÚ¼ä½ö¶ÔMeta-WikiÄÚÈÝÔì³Éһʱ¸ü¸ÄÓëɾ³ý £¬ÎÞÓÀÔ¶ÐÔÇÖº¦»òÓ×ÎÒÐÅϢй¶¡£Ä¿Ç°±à×ëÖ°ÄÜÒѸ´Ô­ £¬»ù½ð»áÕý¼ÓÇ¿°²È«Éó²é²¢Ôì¶©¶î±í·À»¤´ëÊ© £¬ÒÔ½µµÍͬÀàÊÂÎñ·çÏÕ¡£


https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/


6. ¶í¹ØÁª´¹µö»î¶¯ÓÃжñÒâÈí¼þ¹¥»÷ÎÚ×éÖ¯


3ÔÂ5ÈÕ £¬ClearSky×êÑл㱨Åû¶һ·Óë¶íÂÞ˹ÓйصÄÍøÂç´¹µö¹¥»÷ÊÂÎñ £¬¸Ã»î¶¯Í¨¹ýÁ½ÖÖÐÂÐͶñÒâÈí¼þBadPawºÍMeowMeowÕë¶ÔÎÚ¿ËÀ¼×éÖ¯ÌáÒé¶à½×¶Î¹¥»÷¡£¹¥»÷Á´Ê¼ÓÚÒ»·âÔ̺¬ZIPѹËõÎļþÁ´½ÓµÄ´¹µöÓʼþ £¬Óʼþͨ¹ýÎÚ¿ËÀ¼ÍøÂç·þÎñÌṩÉÌukr[.]net·¢ËÍ £¬¸ÃÓòÃû´ËÇ°Ôø±»¶íÂÞ˹¹¥»÷»î¶¯ÀÄÓá£Êܺ¦Õßµã»÷Á´½Óºó £¬ÏµÍ³»á¼ÓÔØ×·×ÙÏñËØÍ¨Öª¹¥»÷Õß £¬Ëæºó³Á¶¨ÏòÖÁ¶ÌÁ´½ÓÏÂÔØZIPÎļþ¡£½âѹZIPºó £¬¼Ù×°³ÉHTMLÎĵµµÄHTAÎļþ»áÏÔʾÎÚ¿ËÀ¼Óïµö¶üÐÅÏ¢ £¬ÄÚÈÝÉæ¼°±ßÚïͨ³©Ðí¿ÉÉêÇë £¬ÒԴ˺ýŪÊܺ¦Õ߸á£Í¬Ê± £¬HTAÎļþͨ¹ý²é³­ÏµÍ³×°ÖÃÈÕÆÚÖ´Ðз´É³Ïä¼ì²â £¬ÈôϵͳװÖò»¼°10ÌìÔòÖÕÖ¹Ö´ÐС£Âú×ãǰÌáºó £¬HTAÎļþÌáÈ¡ÆäËû×é¼þ £¬Í¨¹ý´òË㹤×÷³ÉÁ¢Óƾû¯ÏνÓ £¬²¢ÀûÓÃVBS¾ç±¾´ÓͼÏñÖÐÌáÈ¡ÒþдÓÐÐ§ÔØºÉ £¬×îÖÕ¼ÓÔØBadPaw¼ÓÔØÆ÷¡£BadPaw×÷Ϊ»ùÓÚ.NETµÄ¼ÓÔØÆ÷ £¬Ê¹ÓÃ.NET Reactor¼Ó¿ÇÆ÷»ìºÏ´úÂë £¬¹ÊÕÏÄæÏò·ÖÎö¡£³ÉÁ¢C2ͨѶºó £¬BadPaw²¿ÊðMeowMeow¸´ÔÓºóÃÅ¡£¸ÃºóÞ߱¸»·¾³¼ì²âÖ°ÄÜ £¬¿ÉɨÃèÐé¹¹»ú¼°Wireshark¡¢ProcMonµÈ·ÖÎö¹¤¾ß £¬Èô·¢ÏÖɳÏä»·¾³ÔòÁ¢¼´ÖÕ³¡Ö´ÐС£


https://securityaffairs.com/188974/apt/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware.html