Lazarus Group¶«É½ÔÙÆð£ºnpmÈí¼þ´æ´¢¿âÔâ¶ñÒâ´úÂëÖ²Èë¹¥»÷
°ä²¼¹¦·ò 2025-03-121. Lazarus Group¶«É½ÔÙÆð£ºnpmÈí¼þ´æ´¢¿âÔâ¶ñÒâ´úÂëÖ²Èë¹¥»÷
3ÔÂ12ÈÕ£¬³ôÃûÔ¶ÑïµÄLazarus GroupºÚ¿Í×éÖ¯ÔٴλîÔ¾£¬Õâ´ÎËûÃǽ«¶ñÒâ´úÂëÖ²ÈëÈ«Çò¿ª·¢ÈËÔ±ÒÀÀµµÄnpmÈí¼þ´æ´¢¿â¡£¡£¡£¡£¡£npm×÷ΪJavaScript´úÂëµÄ´óÐÍÔÚÏ߿⣬±»¿ª·¢ÈËÔ±¿í·ºÓÃÓÚ»ñȡԤÏȹ¹½¨µÄÈí¼þƬ¶Î¡£¡£¡£¡£¡£Lazarus GroupÀûÓá°ÓòÃûÇÀ×¢¡±¼¼Êõ£¬´´½¨ÁËÓëºÏ·¨Èí¼þ°üÃû³ÆÀàËÆµÄÐéαÈí¼þ°ü£¬²¢ÉèÖÃÁËÐéαµÄGitHubÒ³ÃæÒÔÔö³¤¿ÉÐŶȡ£¡£¡£¡£¡£ÕâЩÐéαÈí¼þ°üÒѱ»ÏÂÔØÊý°Ù´Î£¬Ö¼ÔÚÉøÈ뿪·¢ÈËÔ±µÄÍÆËã»ú£¬ÇÔÈ¡µÇ¼ÐÅÏ¢¡¢¡¢¡¢¼ÓÃÜÇ®±ÒÐÅÏ¢£¬²¢×°ÖúóÃÅÒÔ¹©³Ö¾Ã½Ó¼û¡£¡£¡£¡£¡£Ï°È¾ºó£¬¶ñÒâÈí¼þ»áÖ´ÐжàÏî¶ñÒâ»î¶¯£¬Ô̺¬ÍøÂçϵͳ¾ßÌåÐÅÏ¢¡¢¡¢¡¢ÌáÈ¡ä¯ÀÀÆ÷ÖеĵǼʹ´¦¡¢¡¢¡¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü£¬²¢×°ÖÃÆäËû¶ñÒâÈí¼þÒÔά³Ö¶ÔÊÜϰȾϵͳµÄ³ÖÐø½Ó¼û¡£¡£¡£¡£¡£´ËÊÂÎñ²»½öÓ°ÏìСÎÒ¿ª·¢Õߣ¬»¹¿ÉÄÜÈÃÕû¸ö×éÖ¯Ãæ¶Ô·çÏÕ¡£¡£¡£¡£¡£¹ÌÈ»GitHubÒÑɾ³ýËùÓжñÒâÈí¼þ°ü£¬µ«Lazarus Group¿ÉÄÜÈÔÔÚÔËÓªÆäËû¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Òò¶ø£¬¿ª·¢ÈËÔ±ºÍ×éÖ¯Ó¦²ÉÈ¡×Ô¶¯µÄ°²È«´ëÊ©£¬ÈçÑéÖ¤Èí¼þ°üÆðÔ´¡¢¡¢¡¢Ê¹Óð²È«¹¤¾ß¼ì²â¶ñÒâÒÀÀµÏî¡¢¡¢¡¢Ö´Ðжà²ã°²È«ÐÔ¡¢¡¢¡¢¶¨ÆÚɨÃèµÚÈý·½Èí¼þ°üÖеķì϶£¬²¢½ÌÓýÍŶӼø±ð¿ÉÒɵÄÈí¼þ°üÃû³Æ£¬ÒÔ¼õÇṩ¸øÁ´¹¥»÷´øÀ´µÄ·çÏÕ¡£¡£¡£¡£¡£
https://hackread.com/lazarus-group-backdoor-fake-npm-packages-attack/
2. MassJacker¼ôÌù°å½Ù³Ö²Ù×÷£ºÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÐÂÍþв
3ÔÂ11ÈÕ£¬Ð·¢ÏֵļôÌù°å½Ù³Ö²Ù×÷¡°MassJacker¡±ÒÑÇÔÈ¡´óÁ¿Êý×Ö×ʲú£¬ÀûÓÃÖÁÉÙ778,531¸ö¼ÓÃÜÇ®±ÒÇ®°üµØÖ·´ÓÊÜÏ°È¾ÍÆËã»úÖÐ×ªÒÆ×ʽ𡣡£¡£¡£¡£CyberArk·¢ÏÖ£¬Óë¸Ã²Ù×÷ÓйصÄÇ®°üÔÚ·ÖÎöʱÔ̺¬Ô¼95,300ÃÀÔª£¬µ«º¹ÇàÂòÂô½ð¶î¸ü´ó£¬ÆäÖÐÒ»¸öSolanaÇ®°ü×÷ΪÖÐÑëÊÕ¿îÖÐÐÄ£¬ÒÑÀÛ¼ÆÊµÏÖ³¬¹ý30ÍòÃÀÔªµÄÂòÂô¡£¡£¡£¡£¡£CyberArkÒÉ»ó¸Ã²Ù×÷ÓÉÌØ¶¨Íþв×éÖ¯ÌáÒ飬µ«Ò²¿ÉÄÜѡȡ¶ñÒâÈí¼þ¼´·þÎñģʽ£¬ÓÉÖÐÑëÖÎÀíÔ±ÏòÍøÂç·¸×ï·Ö×ÓÏúÊÛ½Ó¼ûȨÏÞ¡£¡£¡£¡£¡£MassJackerʹÓüôÌù°å½Ù³Ö¶ñÒâÈí¼þ£¨clippers£©£¬¼à¶½Windows¼ôÌù°åÖи´ÖƵļÓÃÜÇ®±ÒÇ®°üµØÖ·£¬²¢½«Æä´úÌæÎª¹¥»÷Õß½ÚÖÆµÄµØÖ·£¬Ê¹Êܺ¦ÕßÔÚ²»ÖªÇéµÄÇé¿öϽ«×ʽðת¸ø¹¥»÷Õß¡£¡£¡£¡£¡£¸Ã²Ù×÷ͨ¹ýÍйܵÁ°æÈí¼þºÍ¶ñÒâÈí¼þµÄÍøÕ¾pesktop[.]com·Ö·¢£¬ÀûÓÃһϵÁи´Ôӵľ籾ºÍ¼ÓÔØÆ÷£¬×îÖÕ½«MassJacker×¢ÈëºÏ·¨µÄWindows¹ý³ÌÖС£¡£¡£¡£¡£CyberArkºôÓõÍøÂ簲ȫ×êÑÐ½ç¹Ø×¢´ËÀà´óÐͼÓÃܽٳÖÐж¯£¬ÒÔ»ñÈ¡ÍþвÐÐΪÕßµÄÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/massjacker-malware-uses-778-000-wallets-to-steal-cryptocurrency/
3. ÐéαÒÁ¡¡¤Âí˹¿Ë´úÑÔ½ÚÄÜÉ豸¶ÌÐÅȦÌ×½ÒÃØ
3ÔÂ11ÈÕ£¬½üÆÚ£¬ÃÀ¹úСÎÒÆµÈÔÊÕµ½ÀûÓÃÒÁ¡¡¤Âí˹¿ËÃûÒå½øÐÐÐéαÐû´«µÄ¶ÌÐÅ£¬Ö¼ÔÚÏúÊÛËùνµÄ½ÚÄÜÉ豸¡£¡£¡£¡£¡£Bitdefender°²È«×êÑÐÈËÔ±¸æ·¢ÁËÕâһȦÌ×£¬Ö¸³öÚ¿ÆÕßͨ¹ý·¢Ë͸öÐÔ»¯¶ÌÐÅ£¬ÓÕÆÊÕ¼þÈ˵ã»÷¶ñÒâÍøÕ¾Á´½Ó¡£¡£¡£¡£¡£ÕâЩ¶ÌÐÅÐû³ÆÄÜ´ó·ù½µµÍµç·Ñ£¬ÉõÖÁÒýÓÃÐéαµÄÂí˹¿ËÒýÑÔ£¬Ðû´«Ò»ÖÖ±»»Ñ³ÆÎªÂí˹¿Ë·¢ÏÖµÄСÐͽÚÄÜÉ豸¡£¡£¡£¡£¡£ÕâЩαÔìµÄÎÄÕÂʹÓÃÁîÈËÕÛ·þµÄ˵»°ºÍ¼¼Êõ´ë´Ç£¬ÒÔ´´ÖƺϷ¨ÐԵļÙÏ󣬲¢Ô̺¬Î±ÔìµÄͼƬÒÔ½øÒ»²½ºýŪDZÔÚÊܺ¦Õß¡£¡£¡£¡£¡£¶ÌÐŻʼÓÚ1Ô·ݣ¬ÒÑ·¢ËÍÊýǧÌõÐÂÎÅ£¬¶à¸öÓòÃûÈÔ´¦Óڻ״̬¡£¡£¡£¡£¡£BitdefenderÖÒ¸æ³Æ£¬ÕâЩÓòÃû¿ÉÄÜÔÚ½«À´»î¶¯Öб»·´¸´Ê¹Ó㬽¨ÒéСÎÒ¾¯Ìè´ËÀàδ¾ÒªÇóµÄ¶ÌÐÅ£¬Ö±½ÓÏòÄÜÔ´¹©¸øÉ̺ËʵÈκÎÄÜÔ´ÕÛ¿ÛÉêÃ÷£¬²¢Ïòµç»°ÔËÓªÉ̺ͱ¾µØµ±¾Ö»ã±¨¿ÉÒÉÐÅÏ¢¡£¡£¡£¡£¡£Í¬Ê±£¬Ò²ÌáÐѹ«¼Ò°ÑÎÈesavrrcom¡¢¡¢¡¢gimelovecomºÍeaeloncomµÈÓòÃû¿ÉÄÜ´æÔڵķçÏÕ¡£¡£¡£¡£¡£
https://hackread.com/sms-scam-elon-musks-sell-fake-energy-devices-usa/
4. Ballista½©Ê¬ÍøÂç¶Ô׼δÐÞ²¹µÄTP-Link Archer·ÓÉÆ÷
3ÔÂ11ÈÕ£¬Cato CTRLÍŶÓ×îз¢ÏÖ£¬Î´ÐÞ²¹µÄTP-Link Archer AX-21·ÓÉÆ÷Òò´æÔÚ¸ßÑÏÖØÐÔ°²È«·ì϶CVE-2023-1389£¬ÒѳÉΪн©Ê¬ÍøÂçBallistaµÄ¹¥»÷Ö¸±ê¡£¡£¡£¡£¡£¸Ã·ì϶×Ô2023Äê4ÔÂÆð±»ÀûÓã¬×î³õÓÃÓÚͶ·ÅMirai½©Ê¬ÍøÂç¶ñÒâÈí¼þ£¬ËæºóÒ²±»ÓÃÓÚ´«²¼ÆäËû¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Ballista»î¶¯ÓÚ2025Äê1ÔÂ10ÈÕ±»Cato CTRL¼ì²âµ½£¬×î½üÒ»´ÎÀûÓó¢ÊÔÔÚ2ÔÂ17ÈÕ¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÀûÓöñÒâÈí¼þͶ·ÅÆ÷ºÍshell¾ç±¾»ñÈ¡²¢Ö´ÐÐÖ¸±êϵͳÉϵÄÖ÷¶þ½øÖÆÎļþ£¬³ÉÁ¢¼ÓÃܵĺÅÁîºÍ½ÚÖÆÍ¨µÀ£¬Ö´ÐÐRCEºÍDoS¹¥»÷£¬²¢³¢ÊÔ¶ÁÈ¡Ãô¸ÐÎļþ¡£¡£¡£¡£¡£BallistaÖ§³Ö¶àÖÖºÅÁÔ̺¬ºéË®¹¥»÷¡¢¡¢¡¢Æô¶¯Ä£¿£¿é¡¢¡¢¡¢ÖÕ³¡Ä£¿£¿é¡¢¡¢¡¢ÔËÐÐLinux shellºÅÁîºÍÖÕÖ¹·þÎñµÈ¡£¡£¡£¡£¡£¶ñÒâÈí¼þ¶þ½øÖÆÎļþÖеÄC2 IPµØÖ·ºÍÒâ´óÀûÓï×Ö·û´®Åú×¢ÓÐδ֪Òâ´óÀûÍþвÐÐΪÕ߲μӡ£¡£¡£¡£¡£È»¶ø£¬¸Ã¶ñÒâÈí¼þÕýÔÚ»ý¼«¿ª·¢ÖУ¬ÒѳöÏÖʹÓÃTORÍøÂçÓòµÄÐÂͶ·ÅÆ÷±äÖÖ¡£¡£¡£¡£¡£Ä¿Ç°£¬³¬¹ý6000̨É豸Êܵ½BallistaϰȾ£¬ÖØÒª¼¯ÖÐÔÚ°ÍÎ÷¡¢¡¢¡¢²¨À¼¡¢¡¢¡¢Ó¢¹ú¡¢¡¢¡¢±£¼ÓÀûÑǺÍÍÁ¶úÆäµÈ¹ú£¬Ö¸±êΪÃÀ¹ú¡¢¡¢¡¢°Ä´óÀûÑÇ¡¢¡¢¡¢ÖйúºÍÄ«Î÷¸çµÄÖÆ×÷Òµ¡¢¡¢¡¢Ò½ÁÆ/±£½¡¡¢¡¢¡¢·þÎñÒµºÍ¼¼Êõ×éÖ¯¡£¡£¡£¡£¡£Ö»¹ÜÓëÆäËû½©Ê¬ÍøÂçÓÐÀàËÆÖ®´¦£¬BallistaÈÔÓÐÆä¶À¸öÐÔ¡£¡£¡£¡£¡£
https://thehackernews.com/2025/03/ballista-botnet-exploits-unpatched-tp.html
5. CISAÖҸ棺Ivanti EPMÉ豸·ì϶ÍþвÁª°î»ú¹¹ÍøÂ簲ȫ
3ÔÂ11ÈÕ£¬CISAÖÒ¸æÃÀ¹úÁª°î»ú¹¹°ÑÎȱ£»£»£»¤ÆäÍøÂ磬·À±¸Õë¶ÔIvanti Endpoint Manager (EPM) É豸µÄÈý¸öÑÏÖØ·ì϶£¨CVE-2024-13159¡¢¡¢¡¢CVE-2024-13160ºÍCVE-2024-13161£©µÄ¹¥»÷¡£¡£¡£¡£¡£IvantiÓëÈ«Çò7000¶à¼Ò×éÖ¯ºÏ×÷£¬Îª40000¶à¼Ò¹«Ë¾ÌṩϵͳºÍIT×ʲúÖÎÀí½â¾ö¹æ»®¡£¡£¡£¡£¡£ÕâЩ·ì϶Óɾø¶Ôõè¾¶±éÀúÈõµãÔì³É£¬¿ÉʹԶ³Ìδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õ߯ëÈ«·ÛËéÒ×Êܹ¥»÷µÄ·þÎñÆ÷¡£¡£¡£¡£¡£ÕâЩ·ì϶ÓÚÈ¥Äê10Ô±»»ã±¨£¬²¢ÓÚ½ñÄê1ÔÂ13ÈÕ±»IvantiÐÞ¸´¡£¡£¡£¡£¡£È»¶ø£¬½öÒ»¸ö¶àÔºó£¬Horizon3.ai°ä²¼Á˸ÅÄîÑéÖ¤·ì϶£¬¿ÉÓÃÓÚÖм̹¥»÷£¬Ð²ÆÈIvanti EPM»úеƾ֤¡£¡£¡£¡£¡£CISAÒѽ«ÕâЩ·ì϶Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ÖУ¬Áª°îÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÐèÔÚÈýÖÜÄÚ±£»£»£»¤ÆäϵͳÃâÊܹ¥»÷¡£¡£¡£¡£¡£CISAÇ¿ÁÒ¶½´ÙËùÓÐ×é֯ʵʱÐÞ¸´Ä¿Â¼·ì϶£¬ÒÔÏ÷¼õÔâ·êÍøÂç¹¥»÷µÄ·çÏÕ¡£¡£¡£¡£¡£×Ô2025ËêÊ×ÒÔÀ´£¬ÓмäµýÐÐΪÕßÒÑÀûÓÃIvanti·ì϶½øÐй¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-tags-critical-ivanti-epm-flaws-as-actively-exploited-in-attacks/
6. °ÍÀèË÷°î´óѧÔâÈËΪÖÇÄÜ¿ª·¢µÄFunksecÀÕË÷Èí¼þ¹¥»÷
3ÔÂ10ÈÕ£¬FunksecÀÕË÷Èí¼þ×éÖ¯ÒÔÆä²¿ÊðµÄ¾Ý³ÆÊÇÊ׸öѡȡÌìÉúʽÈËΪÖÇÄÜ£¨GenAI£©µÄÀÕË÷Èí¼þ¶øÎÅÃû£¬×î½ü¸Ã×éÖ¯Ðû³Æ¹¥ÆÆÁ˺¹ÇàÓÆ¾ÃµÄ°ÍÀèË÷°î´óѧ£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Éϰ䲼Á˾ݳƴӸÃУ·þÎñÆ÷ÇÔÈ¡µÄ20GBÎļþµÄÐÅÏ¢£¬´ÍÓëѧÌùÙԱԼĪ12Ì칦·òÖ§¸¶Î´¹«¿ªµÄÊê½ð¡£¡£¡£¡£¡£Ë÷°î´óѧÊÇÒ»ËùÕ¼ÓÐ55,000ÃûѧÉúºÍÊýǧÃû×êÑм°ÐÐÕþÈËÔ±µÄ¹«Á¢´óѧ£¬´ËÇ°Ò²ÔøÔâ·ê¹ýÖØ´óºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£Funksec×Ô2024Äê11Ô¹«¿ª³öÏÖÒÔÀ´£¬Ò»ÏòÔÚ¼Ó´ó¹¥»÷´ÎÊý£¬ÖØÒªÕë¶ÔÃÀ¹ú¡¢¡¢¡¢Ó¡¶È¡¢¡¢¡¢Î÷°àÑÀºÍÃɹÅÈ·µ±¾ÖºÍ¹ú·À¡¢¡¢¡¢¼¼Êõ¡¢¡¢¡¢½ðÈںͽÌÓýÁìÓò¡£¡£¡£¡£¡£¸Ã×é֯ʹÓÃÈËΪÖÇÄÜ¿ª·¢ÀÕË÷Èí¼þ£¬±»ÁÐΪ´ÓǰÖÜΧÄÚ×î»îÔ¾µÄÎå´óÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£¡£¡£¡£¡£´ËÍ⣬Funksec»¹³ÉÁ¢ÁËÒ»¸öÔ̺¬ÅÄÂôÍøÕ¾¡¢¡¢¡¢Êг¡ºÍ»áÉÌÂÛ̳ÔÚÄ򵀮ëÈ«Éú̬ϵͳ£¬ÖÂÁ¦ÓÚÈÃÕâ¸öÊг¡³ÉΪTorÍøÂçÖÐ×îºÃµÄ¡£¡£¡£¡£¡£
https://cybernews.com/news/sorbonne-university-paris-claim-funksec-ai-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ