ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷ £¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶

°ä²¼¹¦·ò 2025-05-09

1. ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷ £¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶


5ÔÂ8ÈÕ £¬½ÌÓý¾ÞÍ·ÅàÉú¼¯ÍÅÔâ·êÍøÂç¹¥»÷ £¬ÍþвÐÐΪÕßÇÔÈ¡Á˹«Ë¾Êý¾ÝºÍ¿Í»§ÐÅÏ¢¡£ÅàÉú¼¯ÍÅ×ܲ¿Î»ÓÚÓ¢¹ú £¬ÊÇÈ«Çò×î´óµÄѧÊõ³ö°æ¡¢Êý×Ö½ø½¨¹¤¾ßºÍ³ß¶È»¯ÆÀ¹ÀÌṩÉÌÖ®Ò»¡£ÅàÉú¼¯ÍŰ䷢ÉêÃ÷ÈÏ¿ÉÔâ·êÍøÂç¹¥»÷ £¬Êý¾Ý±»µÁ £¬µ«³Æ´ó²¿ÃÅΪ¡°ÒÅÁôÊý¾Ý¡±¡£ÅàÉú´ú±í֤ʵ £¬ÓÐδ¾­ÊÚȨµÄÐÐΪÕß½Ó¼ûÁËÆä²¿ÃÅϵͳ £¬Ò»µ©È·Èϸû £¬ÅàÉúÁ¢¼´²ÉÈ¡´ëÊ©×èÖ¹ £¬²¢Óëȡ֤ר¼ÒºÏ×÷µ÷²éÊÂÎñ¾­¹ý¼°ÊÜÓ°ÏìÊý¾Ý £¬»¹Ð­Öú·¨Âɲ¿ÃÅ·¢Õ¹µ÷²é £¬Í¬Ê±ÒÑÔÚϵͳÖв¿Êð¶î±í°²È«´ëÊ© £¬Ô̺¬¼ÓÇ¿°²È«¼à¿ØºÍÉí·ÝÑéÖ¤¡£ÅàÉú»¹Ö¤Êµ±»µÁÊý¾Ý²»Ô̺¬Ô±¹¤ÐÅÏ¢¡£´ËǰÓÐÐÂÎųÆ £¬ÍþвÐÐΪÕßÓÚ2025Äê1ÔÂͨ¹ýÔÚ¹«¹².git/configÎļþÖз¢ÏֵͳöµÄGitLabÓ×ÎÒ½Ó¼ûÁîÅÆ·ÛËéÁËÅàÉúµÄ¿ª·¢»·¾³ £¬¸ÃÎļþÈôÎó¶³öÇÒÔ̺¬Ç¶ÈëÔÚÔ¶³ÌURLÖеĽӼûÁîÅÆ £¬¹¥»÷Õß¿ÉÄÜδ¾­ÊÚȨ½Ó¼ûÄÚ²¿´æ´¢¿â¡£ÔÚÕë¶ÔÅàÉúµÄ¹¥»÷ÖÐ £¬Â¶³öµÄÁîÅÆÊ¹ÍþвÐÐΪÕß½Ó¼ûÁ˹«Ë¾Ô´´úÂë £¬ÆäÖÐÔ̺¬ÓÃÓÚÔÆÆ½Ì¨µÄ½øÒ»²½Ó²±àÂëÍ´´¦ºÍÉí·ÝÑéÖ¤ÁîÅÆ £¬ËæºóÍþвÐÐΪÕßʹÓÃÕâЩƾ֤´Ó¹«Ë¾ÄÚ²¿ÍøÂçºÍÔÆ»ù´¡ÉèÊ©ÖÐÇÔÈ¡ÁËÊýTBÊý¾Ý £¬Ô̺¬AWS¡¢Google Cloud¼°¸÷Àà»ùÓÚÔÆµÄÊý¾Ý¿â·þÎñÊý¾Ý £¬±»µÁÊý¾ÝÔ̺¬¿Í»§ÐÅÏ¢¡¢²ÆÕþÐÅÏ¢µÈ £¬Êý°ÙÍòÈËÊÜÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/


2. PyPI¾ªÏÖ¶ñÒâ°üÕë¶ÔDiscord¿ª·¢Õßϵͳ


5ÔÂ8ÈÕ £¬PythonÈí¼þ°üË÷Òý£¨PyPI£©ÉϾªÏÖÕë¶ÔDiscord¿ª·¢ÈËÔ±µÄ¶ñÒâPythonÈí¼þ°ü¡°discordpydebug¡±¡£¸ÃÈí¼þ°ü¼Ù×°³ÉDiscord»úеÈË¿ª·¢ÈËÔ±µÄÃýÎó¼Í¼Æ÷ʵÓ÷¨Ê½ £¬×Ô2022Äê3ÔÂ21ÈÕÉÏ´«ÒÔÀ´ £¬Òѱ»ÏÂÔØ³¬¹ý11000´Î¡£ÍøÂ簲ȫ¹«Ë¾Socket×îÏÈ·¢ÏÖÕâÒ»¶ñÒâÈí¼þ £¬²¢Ö¸³öÆä¿ÉÓÃÓÚ¶ÔDiscord¿ª·¢ÈËÔ±µÄϵͳ½øÐкóÃŹ¥»÷ £¬Îª¹¥»÷ÕßÌṩÊý¾Ý͵ÇÔºÍÔ¶³Ì´úÂëÖ´ÐÐÖ°ÄÜ¡£×êÑÐÈËÔ±°µÊ¾ £¬¸ÃÈí¼þ°üÖØÒªÕë¶Ô¹¹½¨»òÊØ»¤Discord»úеÈ˵Ŀª·¢ÈËÔ± £¬ÕâЩ¿ª·¢ÈËÔ±¿ÉÄÜ»áÔÚδ¾­¿í·ºÉó²éµÄÇé¿öÏÂ×°ÖôËÀ๤¾ß¡£ÓÉÓÚPyPI²»»á¶ÔÉÏ´«µÄÈí¼þ°ü½øÐÐÉî¶È°²È«ÉóºË £¬¹¥»÷Õß³£ÀûÓÃÕâÒ»µã £¬Í¨¹ýÎóµ¼ÐÔÃèÊö¡¢ºÏ·¨Ãû³Æ»ò¸´ÔìÊ¢ÐÐÏîÄ¿´úÂëÀ´Ê¹¶ñÒâÈí¼þ°üÏԵÿÉÐÅ¡£Ò»µ©×°Öà £¬¶ñÒâÈí¼þ°ü±ã»á½«É豸ת±äΪԶ³Ì½ÚÔìϵͳ £¬Ö´Ðй¥»÷Õß½ÚÔìµÄºÅÁîºÍ½ÚÔ죨C2£©·þÎñÆ÷·¢Ë͵ÄÖ¸Áî¡£¹¥»÷Õß¿Éͨ¹ý¸Ã¶ñÒâÈí¼þ»ñȡƾ֤µÈÃô¸ÐÐÅÏ¢µÄδ¾­ÊÚȨ½Ó¼ûȨÏÞ £¬ÇÔÈ¡Êý¾Ý¡¢¼à¶½ÏµÍ³»î¶¯¡¢Ô¶³ÌÖ´ÐдúÂë £¬²¢»ñÈ¡ÓÐÖúÓÚÔÚÍøÂçÖкáÏòÒÆ¶¯µÄÐÅÏ¢¡£¸Ã¶ñÒâÈí¼þËä²»×ãÓÆ¾ÃÐÔ»òȨÏÞÌáÉý»úÔì £¬µ«Ê¹ÓóöÕ¾HTTPÂÖѯ¿ÉÈÆ¹ý·À»ðǽºÍ°²È«Èí¼þ¡£×°Öúó £¬Ëü»á¾²Ä¬Ïνӵ½¹¥»÷Õß½ÚÔìµÄC2·þÎñÆ÷¡£´Ë±í £¬¸Ã¶ñÒâÈí¼þ»¹¾ß±¸Í¨¹ýÌØ¶¨¹Ø¼ü×Ö´¥·¢À´¶ÁÈ¡ºÍдÈëÖ÷»úÉÏÎļþµÄÖ°ÄÜ¡£


https://www.bleepingcomputer.com/news/security/malicious-pypi-package-hides-rat-malware-targets-discord-devs-since-2022/


3. ÀÕË÷Èí¼þÀûÓúϷ¨KickidlerÈí¼þÖ´Ðй¥»÷²¢ÇÔÃÜ


5ÔÂ8ÈÕ £¬ÀÕË÷Èí¼þ·ÖÖ§»ú¹¹QilinºÍHunters InternationalÀûÓúϷ¨Ô±¹¤¼à¿ØÈí¼þKickidler·¢Õ¹¹¥»÷»î¶¯¡£ÔÚVaronisºÍSynacktiv¹Û²ìµ½µÄ¹¥»÷ÖÐ £¬¹¥»÷Õßͨ¹ýÖ²ÈëGoogle¸æ°× £¬ÓÕµ¼Óû§µã»÷ºóÌø×ªÖÁαÔìµÄRVToolsÍøÕ¾ £¬´Ó¶øÏÂÔØ²¢ÔËÐб»Ä¾ÂíϰȾµÄ·¨Ê½¡£¸Ã·¨Ê½×÷Ϊ¶ñÒâÈí¼þ¼ÓÔØÆ÷ £¬ÏÂÔØ²¢ÔËÐÐSMOKEDHAM PowerShell .NETºóÃÅ £¬½ø¶øÔÚÉ豸Éϲ¿ÊðKickidler¡£Kickidler¿É²¶»ñ»÷¼ü¡¢½ØÈ¡ÆÁÄ»½ØÍ¼ºÍ´´½¨ÆÁÄ»ÊÓÆµ £¬¹¥»÷Õß½è´Ë¼à¶½ÆóÒµÖÎÀíÔ±µÄ»î¶¯ £¬»ñÈ¡ÌØÈ¨Æ¾Ö¤¡£¹¥»÷Õß¿ÉÄÜÒѰÂÃØ½Ó¼ûÊܺ¦ÕßϵͳÊýÌìÉõÖÁÊýÖÜ £¬ÒÔÍøÂç½Ó¼ûÒìµØÔÆ±¸·ÝËùÐèµÄƾ֤¡£Kickidlerͨ¹ý²¶»ñÖÎÀíÔ±¹¤×÷Õ¾µÄ°´¼üºÍÍøÒ³ £¬Ê¹¹¥»÷Õß¿ÉÄܼø±ðÒìµØÔÆ±¸·Ý²¢»ñÈ¡ÃÜÂë £¬ÎÞÐèѡȡ¸ß·çÏÕÕ½Êõ¡£ÀÕË÷Èí¼þÔËÓªÉÌÔÚ¸´Ô­¶ñÒâ»î¶¯ºó £¬²¿ÊðÕë¶ÔÊܺ¦ÕßVMware ESXi»ù´¡¼Ü¹¹µÄÓÐÐ§ÔØºÉ £¬¼ÓÃÜVMDKÐé¹¹Ó²ÅÌÇý¶¯Æ÷ £¬Ôì³ÉÑϳÁ·ÛËé¡£Hunters InternationalʹÓõIJ¿Êð¾ç±¾ÀûÓÃVMware PowerCLIºÍWinSCP AutomationÀ´Ö´ÐÐÓйزÙ×÷¡£´Ë±í £¬ÀÕË÷Èí¼þÍÅ»ï¶àÄêÀ´Ò»ÏòÔÚÀÄÓúϷ¨µÄÔ¶³Ì¼à¿ØºÍÖÎÀí£¨RMM£©Èí¼þ¡£


https://www.bleepingcomputer.com/news/security/kickidler-employee-monitoring-software-abused-in-ransomware-attacks/


4. ¶íµ±¾ÖÖ§³ÖColdRiver×éÖ¯ÀûÓÃLostKeys¶ñÒâÈí¼þÇÔÃÜ


5ÔÂ8ÈÕ £¬×Ô½ñÄêËêÊׯ𠣬¶íÂÞ˹µ±¾ÖÖ§³ÖµÄColdRiverºÚ¿Í×éÖ¯³ÖÐøÀûÓÃÐÂÐÍLostKeys¶ñÒâÈí¼þ £¬¶ÔÎ÷·½µ±¾Ö¡¢¼ÇÕß¡¢Öǿ⼰·Çµ±¾Ö×éÖ¯·¢Æð¼äµý¹¥»÷ÒÔÇÔÈ¡Îļþ¡£12Ô £¬Ó¢¹úºÍÎåÑÛͬÃËÈ·ÈϸÃ×éÖ¯Óë¶íÂÞ˹Áª¹ú°²È«¾Ö£¨FSB£©´æÔÚ¹ØÁª¡£¹È¸èÍþвµý±¨Ó××飨GTIG£©ÓÚ1Ô³õ´Î·¢ÏÖLostKeys±»¸ß¶ÈÑ¡ÔñÐԵز¿Ê𠣬×÷ΪClickFixÉç»á¹¤³Ì¹¥»÷µÄÒ»²¿ÃÅ £¬¹¥»÷ÕßÓÕÆ­Ö¸±êÔËÐжñÒâPowerShell¾ç±¾ £¬½ø¶øÏÂÔØ²¢Ö´Ðжî±íPowerShell¸ºÔØ £¬×îÖÕ²¿Êð±»×·×ÙΪLostKeysµÄVisual Basic Script£¨VBS£©Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þ¡£GTIGÖ¸³ö £¬LOSTKEYSÄÜ´ÓÓ²±àÂëµÄÀ©´óÃûºÍĿ¼ÁбíÖÐÇÔÈ¡Îļþ £¬²¢Ïò¹¥»÷Õß·¢ËÍϵͳÐÅÏ¢ºÍÔÚÔËÐеĹý³Ì¡£ColdRiver¹ß³£ÇÔȡƾ֤ÒÔÇÔȡָ±êµç×ÓÓʼþºÍÁªÏµÈË £¬ÈôÐè½Ó¼ûÖ¸±êϵͳÎĵµ £¬»¹»á²¿ÊðSPICA¶ñÒâÈí¼þ½øÐÐÑ¡ÔñÐÔ»ñÈ¡¡£LOSTKEYSÉè¼ÆÖ÷ÕÅÓëColdRiverÀàËÆ £¬ÇÒ½öÔÚÌØ¶¨Çé¿öϲ¿Êð¡£ColdRiver×Ô2017ÄêÆð·½±ãÓÃÉç»á¹¤³ÌѧºÍ¿ªÔ´µý±¨¼¼Êõ×êÑкÍÒýÓÕÖ¸±ê¡£


https://www.bleepingcomputer.com/news/security/google-links-new-lostkeys-data-theft-malware-to-russian-cyberspies/


5. ÃÀ¶à²¿Ãž¯±¨ÓÍÆøÐÐÒµICS/SCADAÏµÍ³Ãæ¶ÔÍøÂç¹¥»÷Íþв


5ÔÂ7ÈÕ £¬ÃÀ¹úÍøÂ簲ȫ¾Ö£¨CISA£©¡¢Áª¹úµ÷²é¾Ö£¨FBI£©¡¢»·¾³±£»¤¾Ö£¨EPA£©ºÍÄÜÔ´²¿£¨DoE£©ÓÚÖܶþ½áºÏ°ä²¼¾¯±¨ £¬¾ÍÕë¶ÔÃÀ¹úʯÓͺÍÌìÈ»ÆøÐÐÒµµÄÍøÂç¹¥»÷·¢³öÖҸ档µ±¾Ö»ú¹¹Ö¸³ö £¬ÕâЩ¹¥»÷Ëäѡȡ¸ù»ùÈëÇÖ¼¼Êõ £¬µ«¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯ÍøÂ簲ȫÎÀÉúÇé¿öÇ·°² £¬¿ÉÄܵ¼Ö·þÎñÖжÏÉõÖÁÎïÀí°Ü»µ¡£CISAÇ¿µ÷ £¬Ò»Ð©¼¼Êõ²»Ì«¸´ÔÓµÄÍøÂçÐÐΪÕßÕý¶Ô×¼ÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©²¿ÃÅ£¨ÓÈÆäÊÇÄÜÔ´ºÍ½»Í¨ÏµÍ³£©µÄ¹¤Òµ½ÚÔìϵͳ/¼à¿ØÓëÊý¾Ý²É¼¯ÏµÍ³£¨ICS/SCADA£©·¢Æð¹¥»÷¡£ÕâЩÍþвÐÐΪÕߺܿÉÄÜÊǺڿÍÐж¯Ö÷Ò弯Ìå»ò×ԳƺڿÍÐж¯Ö÷ÒåÕߵĺڿÍ £¬½üÄêÀ´ËûÃÇÒÑÂÅ´ÎÕë¶Ô¶³öÔÚ»¥ÁªÍøÉÏÇÒδÊܱ£»¤»òʹÓÃĬÈÏÃÜÂëµÄSCADA¼°ÆäËûICSϵͳ·¢Æð¹¥»÷¡£¹¤ÒµÍøÂ簲ȫר¼ÒÖÒ¸æ³Æ £¬Ö»¹ÜºÚ¿ÍµÄºÜ¶à˵·¨±»¿ä´ó £¬µ«ÕâЩ¹¥»÷ÈÔ¿ÉÄܲúÉú³Á´óÓ°Ï졣ΪӦ¶ÔÕâЩÍþв £¬CISA¡¢FBI¡¢EPAºÍDoE¶½´Ù¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯Á¢¼´²ÉÈ¡Ðж¯ £¬¸ÄÉÆÍøÂç°²È«Ì¬ÊÆ¡£¾ßÌå´ëÊ©Ô̺¬È·±£ÔËÓª¼¼Êõ£¨OT£©ÏµÍ³ÎÞ·¨Ö±½Ó´Ó»¥ÁªÍø½Ó¼û £¬Í¨¹ýÐ鹹רÓÃÍøÂ磨VPN£©¡¢Ç¿ÃÜÂëºÍ·À´¹µö¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©°²È«µØÔ¶³Ì½Ó¼ûËüÃÇ £¬¼ø±ð²¢¸ü¸ÄĬÈÏÃÜÂë £¬¶Ô¹Ø¼üϵͳִÐÐÍøÂç·Ö¶Î £¬²¢È·±£¿ÉÄÜÊÖ¶¯²Ù×÷OTϵͳ¡£´Ë±í £¬½¨Òé×éÖ¯ÓëÓйØÊµÌåºÏ×÷ £¬¼ø±ð²¢½â¾ö¿ÉÄÜ´æÔÚµÄÅäÖÃÃýÎó¡£


https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/


6. iOSÓÎÏ·½ü50ÍòÓû§Êý¾Ýй¶ÇÒÓ²±àÂë°ÂÃØÔâÆØ¹â


5ÔÂ8ÈÕ £¬iOSÓÎÏ·¡°Cats Tower£ºThe Cat Game£¡¡±´æÔÚÑϳÁÊý¾Ýй¶ÎÊÌâ £¬ÒÔÖÁ½ü50ÍòÓû§Ãæ¶ÔºÚ¿Í¹¥»÷·çÏÕ¡£Cybernews×êÑÐÈËÔ±·¢ÏÖ £¬¸ÃÓÎϷй¶ÁËÍæ¼ÒµÄIPµØÖ·¡¢Óû§Ãû¡¢FacebookÓû§ID¼°½Ó¼ûÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ºÚ¿ÍÓÃÓÚ×·×ÙÓû§ÔÚÏ߻¡¢½Ù³ÖFacebookÕË»§ £¬ÉõÖÁ¾«È·¶¨Î»Óû§µØÎ»¡£Ö»¹ÜIPµØÖ·²¢·ÇGPS×ø±ê £¬µ«½áºÏÆäËûÊý¾ÝÈÔ¿ÉÌṩ½Ï¾«È·µÄλÏàÐÅÏ¢¡£´Ë±í £¬ÓÉÓÚFirebaseÅäÖÃÃýÎó £¬¸ÃÀûÓû¹Ð¹Â¶Á˳¬¹ý45ÍòÓû§µÄIPµØÖ·ºÍÓû§Ãû £¬ÒÔ¼°229¸öFacebookÓû§IDºÍ½Ó¼ûÁîÅÆ¶Ô¡£¸üÑϳÁµÄÊÇ £¬¸ÃÀûÓôúÂë¿âÖл¹³äÒç×Ų»Ó¦±»¹«¿ªµÄÃô¸ÐÐÅÏ¢ £¬Èç¿Í»§¶ËID¡¢APIÃÜÔ¿¡¢ÏîÄ¿IDµÈ £¬ÕâЩӲ±àÂëµÄ°ÂÃØÒ»µ©±»°ÑÎÕ £¬ÍþвÐÐΪÕß¾ÍÄÜ»æÔì³öÀûÓ÷¨Ê½µÄÕû¸öºó¶Ë»ù´¡ÉèÊ© £¬ÀÄÓÃÆä·þÎñÍøÂç¸ü¶àÓû§Êý¾Ý £¬ÉõÖÁÖ±½Óͨ¹ýÀûÓûù´¡ÉèÊ©·¢ËÍÀ¬»øÓʼþ £¬´Ó¶ø½«Æä±øÆ÷»¯¡£Õâ´ÎйÃÜÊÂÎñÊÇCybernewsµ÷²éµÄÒ»²¿ÃÅ £¬×êÑÐÈËÔ±·ÖÎöÁËÔ¼8%µÄApp StoreÀûÓà £¬·¢ÏÖ71%µÄÊÜ·ÖÎöÀûÓÃÖÁÉÙй¶ÁËÒ»¸ö»úÃÜÐÅÏ¢ £¬¾ùÔÈÿ¸öÀûÓÃй¶5.2¸ö¡£Ä³Ð©°¸ÀýÖÐ £¬ÈȵãÔ¼»áÀûÓÃй¶ÁËÓû§ÕÕÆ¬ £¬¼ÒÍ¥×·×ÙÀûÓÃй¶ÁËʵʱGPS×ø±ê £¬À¬»øÓʼþÀ¹½ØÆ÷Ôòй¶Á˱»À¹½ØµÄºÅÂëµÈÃô¸ÐÐÅÏ¢¡£


https://cybernews.com/security/cats-tower-iphone-data-leak/