ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿éÈÆ¹ýÉí·ÝÑéÖ¤
°ä²¼¹¦·ò 2025-08-051. ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿éÈÆ¹ýÉí·ÝÑéÖ¤
8ÔÂ2ÈÕ£¬£¬£¬ÍøÂ簲ȫÁìÓò½üÈÕÅû¶һ¿îÃûΪ"Plague"µÄÐÂÐÍLinuxºóÃÅ·¨Ê½£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ý¼Ù×°³É¿É²å°ÎÈÏ֤ģ¿é£¨PAM£©ÊµÏÖ³¤´ïÒ»ÄêµÄÒñ±ÎÔËÐС£¾ÝNextron Systems×êÑÐÔ±Pierre-Henri Pezier½Òʾ£¬£¬£¬¸ÃÖ²È뷨ʽÉî¶È¼¯³ÉÓÚLinuxϵͳµÄÈÏÖ¤²Ö¿â£¬£¬£¬Í¨¹ý´úÌæ»ò´Û¸ÄPAMÄ£¿é£¬£¬£¬Ê¹¹¥»÷Õß¿ÉÄܾ²Ä¬ÈƹýϵͳÈÏÖ¤»úÖÆ£¬£¬£¬³ÉÁ¢ÓƾõÄSSH½Ó¼ûͨµÀ¡£×÷ΪUNIX/LinuxϵͳÖ÷Ìâ×é¼þ£¬£¬£¬PAMͨ¹ý¹²Ïí¿âʵÏÖÓû§ÈÏÖ¤µÄ¼¯Öл¯ÖÎÀí£¬£¬£¬µ«ÕâÒ»¸öÐÔ±»¶ñÒâÈí¼þ¿ª·¢ÕßÀûÓᣵ±¶ñÒâPAMÄ£¿é¼ÓÔØÖÁÌØÈ¨¹ý³Ìʱ£¬£¬£¬¿ÉͬʱʵÏÖÆ¾Ö¤ÇÔÈ¡¡¢¡¢¡¢ÈÏÖ¤Á÷³ÌÈÆ¹ý¼°°²È«¹¤¾ß¶ã±ÜÈýÖØÖ°ÄÜ¡£×êÑÐÏÔʾ£¬£¬£¬×Ô2024Äê7ÔÂ29ÈÕÆð£¬£¬£¬VirusTotalƽ̨ÒÑÊÕ¼¶à¸öPlagueÑù±¾£¬£¬£¬µ«½ØÖÁÅû¶ʱËùÓÐÖ÷Á÷·´²¡¶¾ÒýÇæ¾ù佫Æä¼ø±ðΪÍþв£¬£¬£¬°µÊ¾¸Ã¿ò¼Ü¾ß±¸³ÉÊìµÄÃâɱ¼¼Êõ¡£
https://thehackernews.com/2025/08/new-plague-pam-backdoor-exposes.html
2. ºÚ¿Í×éÖ¯CL-STA-0969Âñ·ü10¸öÔ£¬£¬£¬ÏòµçÐÅÍøÂçÖ²ÈëÒñ±Î¶ñÒâÈí¼þ
8ÔÂ2ÈÕ£¬£¬£¬¶«ÄÏÑǵçÐÅ×éÖ¯½üÆÚÔâ·ê¹ú¶È¼¶Íþв×éÖ¯CL-STA-0969µÄ¶¨ÏòÍøÂç¹¥»÷£¬£¬£¬¸Ã×é֯ͨ¹ý²¿Êð¸ß¶È¶¨ÖÆ»¯µÄ¶ñÒ⹤¾ßÁ´ÊµÏÖ¶ÔÖ¸±êÍøÂçµÄÔ¶³Ì½ÚÖÆ¡£¾ÝPalo Alto NetworksÆìÏÂUnit 42³¢ÊÔÊÒÅû¶£¬£¬£¬2024Äê2ÔÂÖÁ11ÔÂÆÚ¼ä£¬£¬£¬¸Ã×éÖ¯Õë¶Ô¶«ÄÏÑǹؼüµçÐÅ»ù´¡ÉèÊ©ÌáÒé¶àÆð¹¥»÷ÊÂÎñ£¬£¬£¬ÀûÓÃCordscanµÈ¹¤¾ßÍøÂçÒÆ¶¯É豸µØÎ»Êý¾Ý£¬£¬£¬µ«µ÷²éÏÔʾÆäδִÐÐÊý¾ÝÍâй»òÉ豸׷×ÙÐÐΪ¡£¼¼Êõ·ÖÎöÏÔʾ£¬£¬£¬CL-STA-0969×Ô2020ÄêÆð³ÖÐøÕë¶ÔÄÏÑÇ¡¢¡¢¡¢·ÇÖÞµçÐÅʵÌå·¢Õ¹µý±¨ÇÔÈ¡»î¶¯£¬£¬£¬Æä²¿ÃŹ¥»÷ÊÖ·¨Óë³ÛÃûAPT×éÖ¯"LightBasin"£¨UNC1945£©¼°½ðÈÚ·¸×OÌå"UNC2891"´æÔÚ¹ØÁª¡£Õâ´Î¹¥»÷ÖУ¬£¬£¬¹¥»÷Õßͨ¹ýSSH±©Á¦ÆÆ½âµçÐÅÉ豸ÄÚÖÃÕË»§»ñÈ¡³õʼ½Ó¼ûȨÏÞ£¬£¬£¬Ê¹Óö¨ÖÆ»¯×ÖµäÁбíÖ´Ðж¨ÏòÍ»ÆÆ¡£Æä¹¤¾ßÁ´Ô̺¬Áù´óÖ÷Ìâ×é¼þ£º¸²¸ÇºÏ·¨PAMÄ£¿éµÄAuthDoorƾ֤ÇÔÈ¡¹¤¾ß¡¢¡¢¡¢ÀÄÓÃGTP-CºÍ̸µÄGTPDoorÒñ±ÎC2ͨµÀ¡¢¡¢¡¢»ùÓÚICMP»ØÏÔµÄEchoBackdoorÎÞ¼ÓÃÜÖ¸Áî´«Êä¡¢¡¢¡¢·ÂÕÕSGSN½ÚµãµÄÍøÂçÁ÷Á¿ÈÆÐм¼Êõ£¬£¬£¬ÒÔ¼°¾ß±¸Ô¶³ÌShellºÍ¼üÅ̼ͼְÄܵÄChronosRATºóÃÅ¡£ÖµµÃ¹Ø×¢µÄÊÇNoDepDNS¹¤¾ß£¬£¬£¬¸Ã»ùÓÚGolangµÄDNSËíµÀºóÃÅͨ¹ýÔʼÌ×½Ó×Ö½âÎö53¶Ë¿ÚUDPÖ¸Á£¬£¬ÊµÏÖ¿ç·À»ðǽͨѶ¡£
https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html
3. Ô½ÄϺڿÍÀûÓÃPXAÇÔÈ¡Èí¼þ¹¥»÷È«Çò4000¸öIPµØÖ·
8ÔÂ4ÈÕ£¬£¬£¬ÍøÂ簲ȫÁìÓò½üÆÚÆØ¹âһ·ÓÉÔ½ÄϺڿÍÍÅ»ïÌáÒéµÄ¿ç¹úÍøÂç·¸×ï»î¶¯£¬£¬£¬ÆäÖ÷Ì⹤¾ßΪÐÂÐÍPythonÐÅÏ¢ÇÔȡľÂí"PXA Stealer"¡£¾ÝBeazley SecurityÓëSentinelOne½áºÏ»ã±¨£¬£¬£¬¸Ã·¸×OÍÅͨ¹ýTelegram API¹¹½¨¶©ÔÄÖÆµØÏÂÉú̬£¬£¬£¬Òѳɹ¦¹¥ÏÂ62¸ö¹ú¶È³¬4000̨É豸£¬£¬£¬ÇÔÈ¡Ô̺¬20Íò×é¶ÀÁ¢ÃÜÂë¡¢¡¢¡¢Êý°ÙÌõÐÅÓþ¿¨ÐÅÏ¢¼°400ÍòÌõä¯ÀÀÆ÷CookieµÄÃô¸ÐÊý¾Ý£¬£¬£¬Ðγɼ¯Êý¾ÝÇÔÈ¡¡¢¡¢¡¢×Ô¶¯»¯×ªÊÛÓ븴ÓÃÓÚÒ»ÌåµÄÆëÈ«·¸×ï²úÒµÁ´¡£×êÑÐÏÔʾ£¬£¬£¬PXA StealerµÄ¼¼ÊõÑݽø³öÏÖÏÔÖøÍ»ÆÆ¡£×îÔçÓÉ˼¿ÆTalosÓÚ2024Äê11Ô·¢ÏֵĸÃľÂí£¬£¬£¬×î³õÕë¶ÔÅ·Ñǵ±¾ÐݽÌÓý»ú¹¹Ö´Ðж¨Ïò¹¥»÷£¬£¬£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¡¢¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢¡¢¡¢½ðÈÚ»ú¹¹ÐÅÏ¢¼°ä¯ÀÀÆ÷×Ô¶¯Ìî³äÊý¾Ý¡£2025Äê¹¥»÷»î¶¯Éý¼¶ºó£¬£¬£¬·¸×ïÍÅ»ïѡȡDLL²à¼ÓÔØ¼¼ÊõÓ븴Ôӷֽ׶β¿Êð²ã¶ã±Ü¼ì²â£¬£¬£¬Í¨¹ýÏòÊܺ¦Õßչʾ°æÈ¨ÇÖȨ֪ͨµÈ·Ç¶ñÒâµö¶üÎĵµÊµÏÖϰȾÁ÷³Ì¡£Ð°æÄ¾ÂíÍ»ÆÆChromiumä¯ÀÀÆ÷"ÀûÓð󶨼ÓÃܱ£»¤"»úÖÆ£¬£¬£¬½«¹¥»÷ÁìÓòÀ©´óÖÁVPN¿Í»§¶Ë¡¢¡¢¡¢ÔƺÅÁîÐй¤¾ß£¨CLI£©¡¢¡¢¡¢¹²ÏíÎļþ¼°DiscordµÈÀûÓÃÊý¾Ý¡£
https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
4. ÏãÄζùÏÝSalesforceÊý¾Ýй¶·çÀË£ºShinyHunters×éÖ¯³ÖÐø¹¥»÷
8ÔÂ4ÈÕ£¬£¬£¬·¨¹úʱÉоÞÍ·ÏãÄζù½üÈÕ³ÉΪ¿ç¹úÊý¾Ý͵ÇÔº£³±ÖеÄ×îÐÂÊܺ¦Õߣ¬£¬£¬ÆäÃÀ¹ú¿Í»§·þÎñÖÐÐÄÊý¾Ý¿âÔâÈëÇÖµ¼ÖÂÓû§ÐÅϢй¶¡£¾Ý±¨µÀ£¬£¬£¬Õâ´ÎÊÂÎñÔ´ÓÚÍþвÐÐΪÕß¶ÔÏãÄζùµÚÈý·½·þÎñÌṩÉÌSalesforceʵÀýµÄ·¸·¨½Ó¼û£¬£¬£¬¹¥»÷Õßͨ¹ýÓïÒô´¹µöºÍÉç»á¹¤³Ì¼¿Á©ÇÔȡԱ¹¤Æ¾Ö¤£¬£¬£¬»òÓÕÆÆäÊÚȨ¶ñÒâOAuthÀûÓ÷¨Ê½£¬£¬£¬×îÖÕÓÚ7ÔÂ25Èճɹ¦ÉøÈëϵͳ¡£Ð¹Â¶Êý¾Ýº¸Ç²¿ÃÅÃÀ¹ú¿Í»§µÄÐÕÃû¡¢¡¢¡¢µç×ÓÓʼþ¡¢¡¢¡¢ÓʼĵØÖ·¼°µç»°ºÅÂëµÈÓÐÏÞСÎÒÐÅÏ¢£¬£¬£¬ÏãÄζùÒÑÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬£¬£¬µ«Î´¹«¿ª¾ßÌåÊÜÓ°ÏìÈËÊý¼°µÚÈý·½·þÎñÉÌÃû³Æ¡£Õâ´Î¹¥»÷±»¹éÒòÓÚÀÕË÷×éÖ¯ShinyHuntersÌáÒéµÄ³ÖÐøÐÔSalesforce¶¨Ïò¹¥»÷¡£¾ÝMandiant·ÖÎö£¬£¬£¬¸ÃÍÅ»ïͨ¹ý¸´ÔÓµÄÉç»á¹¤³ÌÕ½Êõ»ñÈ¡ÆóÒµSalesforceÕË»§½ÚÖÆÈ¨£¬£¬£¬½ø¶øÇÔÈ¡Êý¾Ý¿âÖ´ÐÐÀÕË÷¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬Salesforce¹Ù·½Ç¿µ÷Æäƽ̨δ±»Ö±½ÓÈëÇÖ£¬£¬£¬ÎÊÌâÔ´ÓÚ¿Í»§ÕË»§°²È«´ëÊ©²»¼°£¬£¬£¬²¢ÖØÉêÆóÒµ¼¶°²È«»úÖÆÒÑÈÚÈëÆ½Ì¨µ×²ãÉè¼Æ£¬£¬£¬µ«¿Í»§ÈÔÐè³Ðµ£Êý¾Ý±£»¤ÔðÈΡ£¸Ã¹«Ë¾½¨ÒéÓû§ÆôÓöà³É·ÖÈÏÖ¤£¨MFA£©¡¢¡¢¡¢×ñÑ×îСȨÏÞ×¼Ôò¼°ÑϸñÖÎÀíµÚÈý·½ÀûÓÃÏνӣ¬£¬£¬²¢°ä²¼°²È«Ö¸ÄÏÐÖú·À±¸ÀàËÆ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/
5. ĦÄɸçÉÝ»ª¾Æµê¼¯ÍÅÔâD4rk4rmyºÚ¿Í×éÖ¯Êý¾Ýй¶
8ÔÂ4ÈÕ£¬£¬£¬Ä¦Äɸç°ÙÄêÉÝ»ª¾Æµê¼¯ÍÅÃÉÌØ¿¨Âå±õº£¶È¼Ù¾Æµê£¨SBM£©½üÈÕ¾íÈëÖØ´óÍøÂ簲ȫÊÂÎñ£¬£¬£¬ÍøÂç·¸×OÍÅD4rk4rmyÐû³Æ¶ÔÆä·¢ÆðºÚ¿Í¹¥»÷£¬£¬£¬²¢½«¸Ã¼¯ÍÅÁÐÈëÆäTor°µÍøÐ¹ÃÜÍøÕ¾µÄÊܺ¦ÕßÃûµ¥¡£×÷ΪĦÄɸ繫¹úÏóÕ÷ÐÔÆóÒµ£¬£¬£¬SBM×Ô1863Äê³ÉÁ¢ÒÔÀ´Ê¼ÖÕÖ÷µ¼×ű¾µØºÀ»ª¾Æµê¡¢¡¢¡¢²©²Ê¼°¸ß¶Ë²ÍÒû²úÒµ£¬£¬£¬ÆäÆìÏÂÃÉÌØ¿¨Âå¶Ä³¡Óë°ÍÀè´ó¾Æµê¸üÊÇÈ«Çò¾«Ó¢½×¼¶µÄ±êÖ¾ÐÔÉç½»³¡Ëù¡£Õâ´ÎÊý¾Ýй¶ÊÂÎñ²»½öÍþвµ½¸ß¶Ë¿Í»§ÒþÖÔ°²È«£¬£¬£¬¸ü¿ÉÄܵßô¤Ä¦ÄɸçÉÝ³ÞÆ·¸ñÒµ¿àÐľӪµÄÆ·ÅÆÐÎÏó¡£¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡´óÁ¿Ãô¸Ð¿Í»§Êý¾ÝÓ빫˾ÄÚ²¿Îļþ£¬£¬£¬¾ßÌåÓ°ÏìÁìÓòÉÐδÆëÈ«Åû¶¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬Õâ´ÎÊÂÎñ͹ÏÔÍøÂç·¸×ï·Ö×ÓÕý½«Ö¸±êתÏò¸ß¾»Öµ·þÎñÒµ£¬£¬£¬ÕâÀà»ú¹¹ËäÕ¼ÓÐÑϸñµÄ°²È«·À»¤ÏµÍ³£¬£¬£¬È´Òò°ÑÎÕ´óÁ¿¸ß¼ÛÖµ¿Í»§Êý¾Ý¶ø³ÉΪ¹¥»÷ÕßµÄ"ÓÅѡָ±ê"¡£ÍøÂ簲ȫר¼ÒÖ¸³ö£¬£¬£¬Èôй¶ÐÅÏ¢Éæ¼°ÕþÉÌÒªÔ±»ò»úÃÜóÒ×Êý¾Ý£¬£¬£¬¿ÉÄÜÒý·¢Á¬Ëø·´Ó³£¬£¬£¬²¨¼°SBMµÄ¿ç¹úºÏ×÷ͬ°é¹ØÏµÓë¸ß¶Ë¿Í»§ÐÅÀµ¶È¡£
https://securityaffairs.com/180780/cyber-crime/hacking-group-d4rk4rmy-claimed-the-hack-of-monte-carlo-societe-des-bains-de-mer.html
6. CTM360·¢ÏÖÕë¶ÔTikTok ShopÓû§µÄ¶ñÒâ¡°ClickTok¡±»î¶¯
8ÔÂ4ÈÕ£¬£¬£¬ÍøÂ簲ȫ»ú¹¹CTM360½üÈÕÅû¶´úºÅ"ClickTok"µÄÐÂÐÍ¿çÆ½Ì¨Ú¿ÆÐж¯£¬£¬£¬¸Ã×é֯ͨ¹ý¹¹½¨ÆëÈ«ÐéαTikTokóÒ×Éú̬£¬£¬£¬½áºÏÍøÂç´¹µöÓëSparkKitty¼äµýÈí¼þÖ´ÐмÓÃÜÇ®±Ò͵ÇÔ¡£¹¥»÷ÕßÀûÓÃAIÌìÉúÊÓÆµÔÚTikTokƽ̨´ó¹æÄ£ÒýÁ÷£¬£¬£¬ÓÕµ¼Óû§½Ó¼û¾«ÐÄαÔìµÄÓòÃû£¬£¬£¬Í¨¹ý¼ÓÃÜÇ®±ÒÖ§¸¶ÒªÇóÓÕµ¼×°ÖÃǶÌ×¶ñÒâ´úÂëµÄ"TikTokÅú¸Ä°æ"ÀûÓ᣼¼Êõ·ÖÎöÏÔʾ£¬£¬£¬¸ÃľÂíÓ뿨°Í˹»ù´ËÇ°ÆØ¹âµÄSparkCat¼äµýÈí¼þ´æÔÚ¼¼Êõ¹ØÁª£¬£¬£¬Æä±äÖÖSparkKittyͨ¹ý×¢ÈëChromiumä¯ÀÀÆ÷¹ý³ÌÍ»ÆÆ´«Í³¼ÓÃܱ£»¤£¬£¬£¬¿ÉÉî¶ÈÇÔÈ¡É豸½ØÍ¼¡¢¡¢¡¢VPNƾ֤¡¢¡¢¡¢ÔÆ·þÎñCLI¹¤¾ßÊý¾Ý¼°DiscordµÈÀûÓÃÐÅÏ¢¡£ÓÈΪֵÍ×ÌùÐĵÄÊÇ£¬£¬£¬¸Ã×é֯ѡȡ"ÀûÓð󶨼ÓÃܱ£»¤"Í»ÆÆ¼¼Êõ£¬£¬£¬Ê¹¶ñÒâ´úÂëÄÜÈÆ¹ýͨÀý°²È«¼ì²â¡£¾ÝCTM360ͳ¼Æ£¬£¬£¬Õâ´ÎÐж¯ÒѲ¿Êð³¬10000¸öÐéαÓòÃû¼°5000¸ö¶ñÒâÀûÓÃʵÀý£¬£¬£¬Í¨¹ý¶þάÂë¡¢¡¢¡¢¼´Ê±Í¨Ñ¶Èí¼þ¼°ÀûÓÃÄÚÏÂÔØÊµÏÖÁѱäʽ´«²¼¡£¹¥»÷Õß¹¹½¨ÁËÆëÈ«µÄµØÏÂÂòÂôÁ´£ºÇÔÈ¡Êý¾Ý¾SherlockµÈ°µÅÌÆ½Ì¨×ªÊÛ£¬£¬£¬ÏÂÓη¸×ïÍÅ»ï¿ÉÀûÓûñÈ¡µÄTikTokÕ˺ÅÖ´Ðжþ´ÎÚ¿Æ»òÉøÈë¹¥»÷£¬£¬£¬ÐγÉ"Êý¾ÝÇÔÈ¡-ƽ̨ÍйÜ-¶©ÔÄÏúÊÛ"µÄ²úÒµ»¯·¸×ïģʽ¡£
https://www.bleepingcomputer.com/news/security/ctm360-spots-malicious-clicktok-campaign-targeting-tiktok-shop-users/


¾©¹«Íø°²±¸11010802024551ºÅ