Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£º£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¶È

°ä²¼¹¦·ò 2025-06-11

1. Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£º£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¶È


6ÔÂ10ÈÕ£¬£¬Rare Werewolf£¨Ç°³Æ Rare Wolf£©ºÚ¿Í×éÖ¯£¬£¬Ò²±»³ÆÎª Librarian Ghouls ºÍ Rezet£¬£¬±»È϶¨Îª¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯£¬£¬ÓëһϵÁÐÕë¶Ô¶íÂÞ˹ºÍ¶ÀÁ¢¹ú¶È½áºÏÌ壨CIS£©¹ú¶ÈµÄÍøÂç¹¥»÷ÓйØ£¬£¬×Ô 2019 ÄêÒÔÀ´Ò»Ïò»îÔ¾¡£¸Ã×éÖ¯¹¥»÷ÒâͼÊÇÔÚÊÜϰȾÖ÷»úÉϳÉÁ¢Ô¶³Ì½Ó¼û¡¢ÇÔȡƾ֤²¢²¿Êð¼ÓÃÜÇ®±Ò¿ó¹¤£¬£¬Ó°ÏìÊý°ÙÃû¶íÂÞ˹Óû§£¬£¬Éæ¼°¹¤ÒµÆóÒµºÍ¹¤³ÌԺУ£¬£¬°×¶íÂÞ˹ºÍ¹þÈø¿Ë˹̹ҲÓÐÉÙÁ¿Ï°È¾¡£Æä¹¥»÷ÏÔÖøÌØµãÊÇÆ«²îÓÚʹÓúϷ¨µÚÈý·½Èí¼þ£¬£¬¶ñÒâÖ°ÄÜͨ¹ýºÅÁîÎļþºÍ PowerShell ¾ç±¾ÊµÏÖ¡£¸ÃÍþвÐÐΪÕßͨ¹ý´¹µöÓʼþ»ñÈ¡³õʼ½Ó¼ûȨÏÞ£¬£¬ÀûÓð²ÉíµãÇÔÈ¡Êý¾Ý²¢Í¶·Å¶àÖÖ¹¤¾ß£¬£¬ÓÃÓÚ½»»¥¡¢ÍøÂçÃÜÂëºÍ½ûÓ÷À²¡¶¾Èí¼þ¡£¿£¿£¿¨°Í˹»ù¼Í¼µÄ×îй¥»÷ÏÔʾ£¬£¬ÒÔÔ̺¬¿ÉÖ´ÐÐÎļþµÄÊÜÃÜÂë± £»¤Ñ¹Ëõ°üΪÆðµã£¬£¬Ñ¹Ëõ°üÖÐÓÐ×°Ö÷¨Ê½£¬£¬ÓÃÓÚ²¿ÊðºÏ·¨¹¤¾ß¼°ÆäËûÔØºÉ£¬£¬Ô̺¬µö¶ü PDF Îĵµ¡£ÖÐÑëÔØºÉ´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡ÆäËûÎļþ£¬£¬»¹Ê¹Óà AnyDesk Ô¶³Ì×ÀÃæÈí¼þºÍ Windows Åú´¦ÖÃ¾ç±¾ÍÆ½øÊý¾ÝÇÔÈ¡ºÍ¿ó¹¤²¿Ê𣬣¬Åú´¦Öþ籾ÄÜ×Ô¶¯»½ÐÑÊܺ¦Õßϵͳ²¢ÔÊÐí¹¥»÷ÕßÔ¶³Ì½Ó¼û¡£ÀûÓõÚÈý·½ºÏ·¨Èí¼þ½øÐжñÒâÖ÷ÕÅÊdz£¼û¼¼Êõ£¬£¬Ôö³¤ÁË APT »î¶¯¼ì²âºÍ¹éÒòÄѶÈ¡£


https://thehackernews.com/2025/06/rare-werewolf-apt-uses-legitimate.html


2. DanaBot¶ñÒâÈí¼þ·ì϶¡°DanaBleed¡±Â¶³öÖÂÆä±»²é


6ÔÂ10ÈÕ£¬£¬2022Äê6Ô¸üÐÂÖУ¬£¬DanaBot¶ñÒâÈí¼þ²Ù×÷ÒýÈëµÄÃûΪ¡°DanaBleed¡±µÄ·ì϶£¬£¬µ¼ÖÂÆäÔÚºóÐø·¨ÂÉÐж¯Öб»¼ø±ð¡¢¸æ×´²¢²ð³ý¡£DanaBotÊÇÒ»¸ö»îÔ¾ÓÚ2018ÄêÖÁ2025ÄêµÄ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨£¬£¬³£ÓÃÓÚÒøÐÐڲƭ¡¢Æ¾Ö¤ÍµÇÔ¡¢Ô¶³Ì½Ó¼ûºÍDDoS¹¥»÷¡£Zscaler ThreatLabz×êÑÐÈËÔ±·¢Ïָ÷ì϶£¬£¬ÄÚ´æÐ¹Â©Ê¹ËûÃǵÃÒÔÉî¿ÌÏàʶ¶ñÒâÈí¼þÄÚ²¿²Ù×÷¼°Æä±³ºóÈËÔ±¡£ÀûÓô˷ì϶£¬£¬¹ú¼Ê·¨Âɲ¿ÃÅ·¢Õ¹¡°ÖÕ¾ÖÐж¯¡±£¬£¬Ê¹DanaBot»ù´¡ÉèÊ©ÏÂÏߣ¬£¬²¢¸æ×´¸ÃÍþв×éÖ¯16Ãû³ÉÔ±¡£DanaBleed·ìÏ¶ËæDataBot°æ±¾2380ÒýÈ룬£¬¸Ã°æ±¾ÐÂÔöC2ºÍ̸£¬£¬µ«ÐºÍ̸Âß¼­´æÔÚÈõµã£¬£¬Î´ÎªËæ»úÌìÉúµÄÌî³ä×Ö½Ú³õʼ»¯Ð·ÖÅäÄڴ棬£¬µ¼ÖÂC2ÏìÓ¦Ô̺¬·þÎñÆ÷ÄÚ´æÖÐÔü×ÒÊý¾ÝƬ¶Î£¬£¬ÀàËÆ2014ÄêHeartBleedÎÊÌâ¡£´Ë·ì϶ʹ´óÁ¿¸öÈËÊý¾Ý¶³ö¸ø×êÑÐÈËÔ±£¬£¬Ô̺¬ÍþвÐÐΪÕß¾ßÌåÐÅÏ¢¡¢ºó¶Ë»ù´¡ÉèÊ©¡¢Êܺ¦ÕßÊý¾Ý¡¢¶ñÒâÈí¼þ¸üÐÂÈÕÖ¾¡¢¸öÈ˼ÓÃÜÃÜÔ¿¡¢SQL²éÎʺ͵÷ÊÔÈÕÖ¾ÒÔ¼°C2ÒDZí°åµÄHTMLºÍWeb½çÃæÆ¬¶ÎµÈ¡£ÈýÄê¶àÀ´£¬£¬DanaBotÒ»Ïò´¦ÓÚÊÜËðģʽ£¬£¬¿ª·¢ÈËÔ±»ò¿Í»§Î´¾õ²ìÒѶ³ö¡£µ±ÍøÂçµ½×ã¹»Êý¾Ýºó£¬£¬·¨Âɲ¿ÃŲÉÈ¡Ðж¯£¬£¬ËäÖ÷ÌâÍŶӽö±»¸æ×´Î´±»¿ÛÁô£¬£¬µ«¹Ø¼üC2·þÎñÆ÷¡¢650¸öÓòÃûºÍ½ü400ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»²é·â£¬£¬ÁÙʱ½â³ýÁËÍþв¡£½«À´ÍþвÐÐΪÕßÖØ·µÍøÂç·¸×ï»î¶¯µÄ¿ÉÄÜÐÔ²»´ó£¬£¬ÇÒºÚ¿ÍÉçÇøÐÅÀµ¶È½µµÍ½«³ÉΪÆäÒ»´ó×è°­¡£


https://www.bleepingcomputer.com/news/security/danabot-malware-operators-exposed-via-c2-bug-added-in-2022/


3. FIN6ºÚ¿Í×éÖ¯¼ÙÒâÇóÖ°Õß´«²¼¶ñÒâÈí¼þ¡°More Eggs¡±


6ÔÂ10ÈÕ£¬£¬ÓëµäÐÍÕÐÆ¸ÓйØÉç»á¹¤³Ì¹¥»÷·ÖÆç£¬£¬FIN6ºÚ¿Í×éÖ¯¼ÙÒâÇóÖ°Õߣ¬£¬ÀûÓÃÉç»á¹¤³Ì¼¿Á©´«²¼¶ñÒâÈí¼þ¡£FIN6±ðÃû¡°÷¼÷ÃÖ©Ö롱£¬£¬×î³õÒÔ½ðÈÚڲƭÎÅÃû£¬£¬ÈçÈëÇÖÏúÊÛµãϵͳÇÔÊØÐÅÓþ¿¨ÐÅÏ¢£¬£¬2019ÄêÆð¹¥»÷ÁìÓòÀ©´óÖÁÀÕË÷Èí¼þ£¬£¬²¢²ÎÓëRyukºÍLockergogaµÈÐж¯¡£½üÆÚ£¬£¬¸Ã×éÖ¯ÀûÓÃÉç»á¹¤³Ì»î¶¯´«²¼¡°More Eggs¡±£¬£¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ¼´·þÎñµÄJavaScriptºóÃÅ£¬£¬ÓÃÓÚÆ¾Ö¤ÍµÇÔ¡¢ÏµÍ³½Ó¼ûºÍÀÕË÷Èí¼þ²¿Êð¡£¹¥»÷¹ý³ÌÖУ¬£¬FIN6¼Ù×°³ÉÐéαÇóÖ°Õߣ¬£¬Í¨¹ýLinkedInºÍIndeedÓëÕÐÆ¸ÈËÔ±ºÍÈËÁ¦×ÊÔ´²¿ÃÅÁªÏµ£¬£¬³ÉÁ¢¹ØÏµºó·¢ËÍ´¹µöÓʼþ¡£Óʼþº¬Ö¸Ïò¡°¼òÀúÍøÕ¾¡±µÄ²»³Éµã»÷URL£¬£¬ÆÈʹÊÕ¼þÈËÊÖ¶¯ÊäÈ룬£¬ÕâЩÓòÃûͨ¹ýGoDaddyÄäÃû×¢²á²¢ÍйÜÔÚAWSÉÏ¡£FIN6»¹Ôö³¤»·¾³Ö¸ÎƺÍÐÐΪ²é³­£¬£¬È·±£Ö»ÓÐÖ¸±êÄÜ´ò¿ªµÇÂ½Ò³Ãæ£¬£¬×èÖ¹VPN»òÔÆÏνӼ°Linux»òmacOS½Ó¼û³¢ÊÔ¡£ÇкÏǰÌáµÄÊܺ¦Õß»áÊÕµ½¼ÙµÄCAPTCHA²½Ö裬£¬²¢±»ÌáÐÑÏÂÔØÔ̺¬¼Ù×°Windows¿ì½Ý·½Ê½Îļþ£¨LNK£©µÄZIPµµ°¸£¬£¬¸ÃÎļþÖ´Ðо籾ÏÂÔØ¡°More Eggs¡±ºóÃÅ¡£¸ÃºóÃÅÓÉ¡°Venom Spider¡±´´½¨£¬£¬ÊÇÄ£¿£¿£¿é»¯ºóÃÅ£¬£¬ÄÜÖ´ÐкÅÁî¡¢ÇÔȡƾ֤¡¢´«µÝ¶îÍâÓÐÐ§ÔØºÉ¼°Ö´ÐÐPowerShell¡£FIN6µÄ¹¥»÷Ëäµ¥Ò»µ«ÓÐЧ£¬£¬ÒÀÀµÉç»á¹¤³ÌѧºÍ¸ß¼¶Ìӱܼ¼Êõ¡£Òò¶ø£¬£¬ÕÐÆ¸ÈËÔ±ºÍÈËÁ¦×ÊÔ´Ô±¹¤Ó¦ÉóÉ÷¶Ô´ýÉó²é¼òÀúºÍÎÄÕ¼¯µÄÔ¼Ç룬£¬¹«Ë¾ºÍÕÐÆ¸»ú¹¹Ò²Ó¦¶ÀÁ¢È·ÈÏÈËÔ±Éí·Ý¡£


https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/


4. HerokuÍ»·¢´óÃæ»ýÖжϳ¬ÁùСʱ£¬£¬Ö¿ª·¢Åö±Ú·þÎñÊÜÓ°Ïì


6ÔÂ10ÈÕ£¬£¬Heroku×÷ΪSalesforceÆìÏÂµÄÆ½Ì¨¼´·þÎñ£¨PaaS£©£¬£¬ÔÊÐí¿ª·¢ÈËÔ±½«ÀûÓ÷¨Ê½²¿Êðµ½Ôƶ˶øÎÞÐèÖÎÀí»ù´¡ÉèÊ©£¬£¬µ«½üÈÕÔâ·êÁ˳ÖÐøÁù¸ö¶àСʱµÄ´óÃæ»ýÖжÏ¡£Õâ´Îå´»úʼÓÚÖܶþÁ賿£¬£¬Óû§»ã±¨³ÆHerokuÀûÓÃÎÞ·¨ÔËÐУ¬£¬ÇÒ¿ª·¢ÈËÔ±ÎÞ·¨µÇ¼HerokuÒDZí°å²¢Ê¹ÓÃCLI¹¤¾ß¡£HerokuÔÚÆä×´Ì¬Ò³ÃæÉÏÈÏ¿ÉÁËÕâÒ»ÊÂÎñ£¬£¬²¢°µÊ¾ÕýÔÚµ÷²é¡£ÖжÏÓ°ÏìÁËÖڶ๫˾ºÍÕ¾µãµÄ·þÎñ£¬£¬ÀýÈçSolarWindsÒòÎÞ·¨´ÓHeroku»ñÈ¡ÈÕÖ¾¶øÊܵ½²¨¼°¡£Ê¹ÓÃHerokuÀûÓ÷¨Ê½ÊµÏÖ¸÷ÀàÖ°ÄܵÄÍøÕ¾Ò²Êܵ½Ó°Ï죬£¬²¿ÃÅÖ°ÄÜÎÞ·¨Õý³£ÔËÐС£HerokuÉÐδÌṩÓйØÖжϵ××ÓÔ­ÒòµÄ¾ßÌåÐÅÏ¢»òºÎʱ¸´Ô­·þÎñ£¬£¬²»ÍâÔÚ2025Äê6ÔÂ10ÈÕ£¬£¬Salesforce°µÊ¾Ã»ÓÐÖ¤¾ÝÅú×¢Õâ´Î·þÎñÖжϴæÔÚ¶ñÒâ»î¶¯£¬£¬²¢ÌṩÁ˿ͻ§¸ú×Ù¸üеÄÁ´½Ó¡£½ØÖÁUTC¹¦·ò21:48:25£¬£¬Heroku×´Ì¬Ò³ÃæÏÔʾÒѽâ¾ödashboard.heroku.comµÄÎÊÌ⣬£¬¿Í»§¿É½Ó¼û¸ÃÍøÕ¾£¬£¬Í¬Ê±ÎªÈÔÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËͨ¹ýHerokuºÅÁîÐнçÃæÔËÐеĺÅÁî×÷Ϊ½â¾ö²½Ö裬£¬²¢Ç¿µ÷Ó¦Ò»´ÎÖØÆôһ̨²â¹¦»úÒÔÔ¤·À·þÎñÖжÏ¡£Heroku°µÊ¾Æä¹¤×÷ÖØµãÈÔÊÇÄÚ²¿²âÊÔºÍÑéÖ¤£¬£¬²¢½«³ÖÐø¹Ø×¢ÆäËû²úÆ·µÄ¸Ä½ø£¬£¬Í¬Ê±³Ô¼µ¾¡¿ìÌṩ½â¾ö¹æ»®¹¦·ò±í£¬£¬²¢¶ÔÓÉ´ËÔì³ÉµÄ³ÖÐøÀ§ÈÅÉî±íǸÒâ¡£


https://www.bleepingcomputer.com/news/technology/massive-heroku-outage-impacts-web-platforms-worldwide/


5. DuplexSpy RATÐÂÐÍľÂíÏÖÉí£¬£¬¿ÉÆëÈ«½ÚÖÆWindowsϵͳ


6ÔÂ9ÈÕ£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕ·¢ÏÖÒ»¿îÃûΪDuplexSpy RATµÄÐÂÐ͸߼¶Ô¶³Ì½Ó¼ûľÂí£¬£¬¸ÃľÂí¿ÉÈù¥»÷ÕßÈ«Ãæ¼à¿ØÓë½ÚÖÆWindowsϵͳ¡£Õâ¿î¶ñÒâÈí¼þѡȡC#˵»°¿ª·¢£¬£¬¾ß±¸¼ò½àµÄͼÐνçÃæºÍ¿ÉÅäÖÃÑ¡Ï£¬ÏÔÖø½µµÍÁËÍøÂç·¸×ï·Ö×ÓÈëÇÖÖ¸±êÉ豸µÄ¼¼ÊõÃż÷¡£ÆäѡȡAES-256-CBCºÍRSA-4096Ë«ÖØ¼ÓÃÜËã·¨£¬£¬± £»¤ÊÜϰȾÖ÷»úÓëºÅÁî½ÚÀñ·þÎñÆ÷¼äµÄͨѶ£¬£¬ÓÐЧ¶ã±ÜÍøÂç¼ì²â¡£¸ÃRAT×î³õÓÉ¿ª·¢ÕßÒÔ¡°½ÌÓýÓô¦¡±°ä²¼ÔÚGitHubÉÏ£¬£¬µ«Æä¶àÖ°ÄÜÐÔºÍÒ×¶¨ÖÆÐÔÎüÒýÁËÍþвÐÐΪÕß¡£DuplexSpy RATÖ°ÄÜÈ«Ãæ£¬£¬²»½öÔ̺¬¼üÅ̼ͼ¡¢ÊµÊ±ÆÁÄ»²¶»ñµÈ´«Í³Ô¶³Ì½Ó¼ûÖ°ÄÜ£¬£¬»¹¾ß±¸ÉãÏñÍ·/Âó¿Ë·ç¼à¿Ø¼°½»»¥Ê½ºÅÁîÖն˵ȸ߼¶¼à¿ØÄÜÁ¦¡£ÔÚÓÆ¾Ã»¯ÓëÒñ±ÎÐÔ·½Ã棬£¬¸ÃľÂíѡȡ¶à²ãÕ½Êõ£¬£¬ÒÔ¡°Windows Update.exe¡±Îª¼Ù×°Ãû³Æ¸´ÖƵ½Óû§Æô¶¯Îļþ¼Ð£¬£¬²¢´´½¨¶ÔӦע²á±íÏ£¬È·±£ÏµÍ³ÖØÆôºÍËãÕʳ¢ÊÔÖÐÈÔÄÜ´æ»î¡£Í¬Ê±£¬£¬Ëü»¹¾ß±¸¸ß¼¶·´·ÖÎöÄÜÁ¦£¬£¬Ã¿100ºÁÃë¼à¿ØÏµÍ³¹ý³Ì£¬£¬Õë¶Ô°²È«¹¤¾ßºÍ·ÖÎöÀûÓ㬣¬Ò»µ©¼ì²âµ½°²È«Èí¼þ£¬£¬±ã»áÖÕÖ¹Óйعý³Ì²¢ÏÔʾÐéαÃýÎóÐÅÏ¢Îóµ¼Óû§¡£´ËÍ⣬£¬¸ÃRATѡȡÎÞÎļþÖ´Ðм¼Êõ£¬£¬Ö±½Ó½«×ÔÉí¼ÓÔØµ½ÄÚ´æºóɾ³ý´ÅÅÌԭʼ¿ÉÖ´ÐÐÎļþ£¬£¬¼«´óÏ÷¼õÁËȡ֤ºÛ¼£¡£


https://cybersecuritynews.com/new-duplexspy-rat-let-attackers-gain-complete-control/


6. S5 Agency WorldÔâBertÀÕË÷¹¥»÷ÖÂÊý¾Ý±»µÁ


6ÔÂ10ÈÕ£¬£¬´óÐ͸ۿڴúÀí»ú¹¹S5 Agency World½üÈÕÔâµ½ÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Á˽ü140GBÊý¾Ý£¬£¬²¢½«¸Ã¹«Ë¾Ãû×Ö°ä²¼ÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ£¬£¬ÒÔ´ËÆÈʹS5Ö§¸¶Êê½ð£¬£¬Ô¤·ÀÊý¾Ýй¶¸ø¹«¼Ò´øÀ´²»Á¼Ó°Ïì¡£S5×÷Ϊһ¼Òº£ÉÏÔËÊ乫˾£¬£¬ÒµÎñ¸²¸ÇÈ«Çò360¶à¸ö¸Û¿Ú£¬£¬ÔÚº½Ô˹«Ë¾´¬²°Í£¿£¿£¿¿Ê±³äÈα¾µØ´ú±í£¬£¬ÆäÔËÓª¶Ôº£ÉÏÔËÊäÖÁ¹ØÖØÒª¡£¹¥»÷Õß°ä²¼Á˼¸ÕžݳƱ»µÁÐÅÏ¢µÄ½ØÍ¼£¬£¬¾­×êÑÐÍŶӵ÷²é£¬£¬ÕâЩÊý¾ÝÑù±¾ËƺõÊǺϷ¨µÄ£¬£¬Ô̺¬²é³­»ã±¨¡¢Ô±¹¤Ð¹ÚÒßÃç½ÓÖÖÇé¿ö¡¢²¿ÃÅ»¤ÕÕ¸´Ó¡¼þµÈ£¬£¬µ«Êý¾ÝÑù±¾ÓÐÏÞ£¬£¬ÏÖʵ»ñÈ¡µÄÎļþ×ÜÁ¿¿ÉÄܸü´ó¡£¶ÔÓÚº£ÉÏÔËÊ乫˾¶øÑÔ£¬£¬ÍøÂç¹¥»÷µ¼ÖµÄÍ £»ú²»³É½ÓÊÜ£¬£¬ÓÉÓÚÔËÊäÑÓÎó»áÔì³É¹©¸øÁ´Æ¿¾±£¬£¬¶Ô¿Í»§Ôì³É¸ºÃæÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬BertÀÕË÷Èí¼þÊǸÃÁìÓòµÄгÉÔ±£¬£¬ÓÚ2025Äê4Ô³õ´Î±»·¢ÏÖ£¬£¬ÇÒÔڶ̶̹¦·òÄÚÒѳɹ¦¹¥»÷ÁËÊ®¼¸¸ö×éÖ¯¡£×êÑÐÈËÔ±Ö¸³ö£¬£¬BertÀÕË÷Èí¼þÍÅ»ïͨ¹ýºÏ·¨Èí¼þ¹©¸øÁ´´«²¼¶ñÒâÈí¼þ£¬£¬Í¨³£ÒÔÒ½ÁƱ£½¡ºÍ¿Æ¼¼ÐÐҵΪָ±ê£¬£¬ÇÒËÆºõ¼«¶ÈÊʸõ±Ç°µÄÍøÂç·¸×ï¾ÖÊÆ£¬£¬½«À´¿ÉÄÜÑÝÔì³É¸ü´óµÄÍþв¡£


https://cybernews.com/security/port-agency-ransomware-data-breach/