Quad7½©Ê¬ÍøÂç¶Ô×¼SOHOÉ豸£¬Í¨Ñ¶Õ½Êõ¸üÒþÃØ

°ä²¼¹¦·ò 2024-09-10
1. Quad7½©Ê¬ÍøÂç¶Ô×¼SOHOÉ豸£¬Í¨Ñ¶Õ½Êõ¸üÒþÃØ


9ÔÂ9ÈÕ£¬Quad7 ½©Ê¬ÍøÂç½üÆÚͨ¹ý¶¨Ôì¶ñÒâÈí¼þ¹¥»÷¸ü¶àSOHOÉ豸£¬ÓÈÆäÊÇZyxel VPN¡¢Ruckus ÎÞÏß·ÓÉÆ÷ºÍAxentraýÌå·þÎñÆ÷£¬ÏÔʾ³öÆä²»Ðݽø»¯µÄÔËÓªÕ½Êõ¡£¸ÃÍøÂç²»½öÕë¶ÔTP-LinkºÍ»ªË¶Â·ÓÉÆ÷£¬»¹À©´óµ½ÐµÄÖ¸±ê£¬ÀûÓÃ·ÖÆçµÇ¼±äÌåÈç¡°xlogin¡±¡¢¡°alogin¡±¡¢¡°rlogin¡±ºÍ¡°zylogin¡±£¬Í¨¹ýÌØ¶¨¶Ë¿Ú½ÚÔìÉ豸¡£Ö»¹ÜijЩм¯ÈºÈç¡°rlogin¡±ºÍ¡°zylogin¡±Ï°È¾°¸ÀýÏà¶Ô½ÏÉÙ£¬µ«Ç±ÔÚÍþв²»ÈÝÓ×ê¿ÉÄÜЯ´øÕë¶Ô¸ü¿í·ºÉ豸µÄзì϶¡£Quad7 µÄÑݱ仹Ô̺¬¼¼ÊõÉϵĸĸÈçÉÕ»Ù´«Í³µÄSOCKS´úÀí£¬×ª¶øÑ¡È¡KCPºÍ̸ºÍ¡°FsyNet¡±¹¤¾ß½øÐÐUDPͨѶ£¬ÒÔ¼°Ê¹Óá°UPDTAE¡±ºóÃźÍHTTP·´Ïòshell½øÐиüÒñ±ÎµÄ½ÚÔ죬ÕâЩ¶¼¼«´óµØÔö³¤Á˼ì²âÄѶÈ¡£´Ë±í£¬³¢ÊÔÖеġ°netd¡±¶þ½øÔìÎļþÓëCJD route2ºÍ̸µÄ½áºÏ£¬Ô¤Ê¾×Å¿ÉÄÜ¿ª·¢³ö¸üΪÒþÃØµÄͨѶ»úÔì¡£Ãæ¶ÔÕâÒ»³ÖÐøÑݱäµÄÍþв£¬Óû§Ó¦²ÉÈ¡»ý¼«·ÀÓù´ëÊ©£¬Ô̺¬×°ÖÃ×îй̼þ¸üС¢¸ü¸ÄĬÈÏÖÎÀíÃÜÂë¡¢½ûÓò»ÓÃÒªµÄWebÖÎÀíÖ°ÄÜ£¬²¢ÔÚ¿ÉÄܵÄÇé¿öÏÂÉý¼¶ÖÁÖ§³Ö³Ö¾Ã°²È«¸üеÄÉ豸ÐͺÅ¡£


https://www.bleepingcomputer.com/news/security/quad7-botnet-targets-more-soho-and-vpn-routers-media-servers/


2. Highline¹«Á¢Ñ§ÌÃÒòÍøÂç¹¥»÷¹Ø¹ØÈ«Ñ§Çø£¬Ñ§Éú¿ªÑ§Åö±Ú


9ÔÂ9ÈÕ£¬»ªÊ¢¶ÙÖÝHighline¹«Á¢Ñ§ÌÃÑ§Çø£¬·þÎñ²¼Àï¶÷¡¢µÃ÷Òò¡¢ÅµÂüµ×¹«Ô°¡¢Î÷Ëþ¿ÆºÍ°×ÖÐÐÄÉçÇøµÄ34ËùѧÌü°17,500ÃûѧÉú£¬½üÈÕÔâ·êÍøÂç¹¥»÷£¬µ¼ÖÂÑ§Çø¼¼Êõϵͳ³öÏÖδÊÚȨ»î¶¯¡£ÎªÈ·±£Ñ§Éú°²È«£¬Ñ§Çø´¹Î£¹Ø¹ØÁËËùÓÐѧÌò¢È¡µÞÁËÔ­¶¨ÓÚ9ÔÂ9ÈÕµÄËùÓл£¬Ô̺¬ÌåÓýºÍ»áÒ飬ֻ¹ÜÑ§ÇøÖÐÑë°ì¹«ÊÒÈÔÕý³£ÔË×÷¡£Ñ§ÇøÑ¸¿ìÐж¯£¬¸ôÀë¹Ø¼üϵͳ£¬²¢ÓëµÚÈý·½¼°ÖÝ¡¢Áª¹úºÏ×÷ͬ°éçÇÃܺÏ×÷£¬ÒÔ°²È«¸´Ô­ºÍ²âÊÔϵͳ¡£Õâ´ÎÍ»·¢Çé¿öÓÈÆä¶ÔѧÉú¼ÒÍ¥Ôì³É²»±ã£¬³ö¸ñÊÇÕýÖµÓ×¶ùÔ°¿ªÑ§Ç°Ï¦£¬Ñ§Çø¶Ô´ËÉî±íǸÒ⣬²¢Ç¿µ÷ѧÉú°²ÂúÊÇÊ×Òª¿¼Á¿¡£Ä¿Ç°£¬µ÷²é¹¤×÷ÔÚ½øÐÐÖУ¬ÉÐδÃ÷È·ÍøÂç¹¥»÷µÄ¾ßÌåÐÔÖʼ°ÊÇ·ñÓÐʦÉúÓ×ÎÒÐÅϢй¶¡£HighlineÑ§Çø´òËãÓÚÖÜÒ»ÏÂÎçǰÏò½ÌÈËÔ±¹¤ºÍ¼Ò³¤´«µÝºóÐøÆÌÅÅ¡£


https://www.bleepingcomputer.com/news/security/highline-public-schools-closes-schools-following-cyberattack/


3. Predator ¼äµýÈí¼þÐж¯ÒÔеĻù´¡ÉèÊ©¾íÍÁ³ÁÀ´


9ÔÂ9ÈÕ£¬ÔÚÃÀ¹ú¶ÔIntellexaͬÃËÖ´ÐÐÔì²Ãºó£¬×êÑÐÈËÔ±·¢³öÔ¤¾¯£¬Ö¸³öPredator¼äµýÈí¼þ¿ÉÄÜͨ¹ýлù´¡ÉèÊ©¾íÍÁ³ÁÀ´¡£´Ëǰ£¬ÃÀ¹ú²ÆÕþ²¿ÒòIntellexaÔÚ¿ª·¢ºÍ·Ö·¢Õë¶ÔÃÀ¹úÈ˵ÄóÒ×¼äµýÈí¼þÖеÄ×÷Óã¬¶ÔÆäÓйØÓ×ÎÒºÍʵÌå½øÐÐÁËÔì²Ã¡£PredatorÒÔÆä¿í·ºµÄÊý¾ÝÇÔÈ¡ºÍ¼à¶½Ö°ÄÜÖø³Æ£¬Ôø±»ÓÃÓڼලµ±¾Ö¹ÙÔ±¡¢¼ÇÕß¼°Õþ²ßר¼Ò¡£Ôì²Ãºó£¬¸Ã¼äµýÈí¼þ»î¶¯Ò»¶ÈÏ÷¼õ£¬µ«ÏÖÒÑÔÚлù´¡ÉèÊ©ÉϳÁлîÔ¾£¬ÓÈÆäÊÇÔÚ¸Õ¹ûÃñÖ÷¹²ºÍ¹úºÍ°²¸çÀ­µÈ¹ú¶È³ÖÐø±»Ê¹Óá£Recorded FutureÖ¸³ö£¬PredatorµÄ¸´ËÕ¿ÉÄÜÓëÆä¸Ä½øµÄ»ù´¡ÉèÊ©¡¢¼ÓÇ¿µÄÄäÃû²Ù×÷ºÍÌӱܼì²âÄÜÁ¦ÓйØ£¬Ê¹µÃ×·×Ù±äµÃ¸ü×÷ÄÑÌâ¡£Ö»¹Ü¹¥»÷Á´Î´±ä£¬ÈÔÒÀÀµ¡°Ò»¼ü¡±ºÍ¡°Áãµã»÷¡±·ì϶£¬µ«Predator¶Ô³ÛÃûÈËÊ¿ÈçÕþ¿Í¡¢¸ß¹Ü¡¢¼ÇÕߺͻ¼ÒµÄÍþвÈԾɳÁ´ó¡£Æä¸ß°ºµÄÐí¿É·ÑÅú×¢£¬¸ÃÈí¼þ±»ÓÃÓÚÕë¶ÔÕ½ÊõÐÔ¡¢¸ß¼ÛÖµÖ¸±ê¡£ÕâÒ»Ç÷ÏòÒý·¢ÁËÅ·Ã˵ȵØÓò¶Ô¹ÍÓ¶¼äµýÈí¼þÀÄÓõÄÓÇÓô£¬ÓÈÆäÊÇÔÚÕþÖηñ¾öÅɺͼÇÕßÖеÄʹÓã¬ÒÑÒý·¢¶Ô¼à¶½ºÏ·¨ÐԺͷµÂÐÔµÄÖÊÒÉ¡£Ëæ×Å¼à¿ØÊг¡µÄ²»ÐÝÔö³¤£¬µ±¾ÖºÍÍøÂ簲ȫר¼ÒÐèά³Ö¸ß¶È¾¯Ì裬ÒÔÓ¦¶Ô¸´ÔÓ¶ñÒâÈí¼þºÍ¼à¿Ø¹¤¾ß´øÀ´µÄÌôÕ½¡£


https://securityaffairs.com/168222/intelligence/predator-spyware-new-infrastructure.html


4. Slim CDÔâºÚ¿ÍÈëÇÖ£¬½ü170ÍòÓû§ÐÅÓþ¿¨¼°Ó×ÎÒÊý¾Ýй¶


9ÔÂ9ÈÕ£¬Slim CD×÷ΪΪÁãÊÛ¡¢¾Æµê¼°²ÍÒûµÈÐÐÒµÌṩ֧¸¶½â¾ö¹æ»®µÄ·þÎñÉÌ£¬½üÈÕ¹«¿ªÁËһ·³Á´óÊý¾Ýй¶ÊÂÎñ£¬¸ÃÊÂÎñ²¨¼°½ü170ÍòÓû§£¬ÆäÐÅÓþ¿¨¼°Ó×ÎÒÃô¸ÐÐÅÏ¢Ô⵽й¶¡£ºÚ¿ÍÔÚ³¤´ï½üÒ»ÄêµÄ¹¦·òÀ2023Äê8ÔÂÖÁ2024Äê6Ô£©£¬ÇÄÎÞÉùÏ¢µØÇÖÈëÁËSlim CDµÄϵͳ¡£¸Ã¹«Ë¾ÓÚ½ñÄê6ÔÂ15ÈÕ³õ´Î¾õ²ìÒì³ £»î¶¯£¬²¢×·Òä·¢ÏÖºÚ¿ÍÈëÇÖʼÓÚ2023Äê8ÔÂ17ÈÕ¡£Ö»¹ÜÈëÇÖ¹¦·ò³¤£¬µ«Slim CDÖ¸³ö£¬ÐÅÓþ¿¨ÐÅÏ¢µÄ²é¿´»òÇÔÈ¡ÖØÒª¼¯ÖÐÔÚ6ÔÂ14ÈÕÖÁ15ÈÕÕâÁ½Ì졣й¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢µØÖ·¡¢ÐÅÓþ¿¨ºÅÂë¼°ÓÐЧÆÚ£¬Ö»¹ÜδÔ̺¬¹Ø¼üµÄ¿¨ÑéÖ¤ºÅ£¨CVV£©£¬µ«ÈÔÔö³¤ÁËÐÅÓþ¿¨Ú²Æ­µÄ·çÏÕ¡£Slim CDÒѼÓÇ¿Æä°²Õû¸öϵÒÔ·À±¸½«À´ÀàËÆÊÂÎñ£¬²¢½¨ÒéÊÜÓ°ÏìÓû§Ìá¸ß¾¯Ì裬עÒâڲƭ¼£Ï󣬲¢µ±¼´ÏòÒøÐл㱨ÈκοÉÒɻ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ÊÜÓ°ÏìµÄÓû§²¢Î´»ñµÃÃâ·ÑÉí·Ý͵ÇÔ± £»¤·þÎñ¡£


https://www.bleepingcomputer.com/news/security/payment-gateway-data-breach-affects-17-million-credit-card-owners/


5. RAMBO¹¥»÷ÀûÓÃÄÚ´æ×ÜÏßÎÞÏßµçÐźŴӸôÀëϵͳÇÔÈ¡Êý¾Ý


9ÔÂ9ÈÕ£¬×êÑÐÈËÔ±Mordechai Guri¿ª·¢³öÁËÒ»ÖÖÃûΪRAMBOµÄÐÂÐ͹¥»÷¼¼Êõ£¬¸Ã¼¼ÊõÀûÓÃÄÚ´æ×ÜÏß²úÉúµÄÎÞÏßµçÐźÅ£¬³É¹¦µØ´ÓÎïÀíºÍÂß¼­Ë«³Á¸ôÀëµÄϵͳÖÐÔ¶³ÌÇÔÈ¡Êý¾Ý¡£¸Ã¼¼ÊõÔÊÐí¹¥»÷ÕßÒÔÿÃë1,000±ÈÌØµÄ¿ìÂÊ£¬ÔÚ×îÔ¶7Ã×¾àÀëÄÚµÁÈ¡Ô̺¬¼ÓÃÜÃÜÔ¿¡¢Í¼Ïñ¡¢°´¼üºÍÉúÎïÌØµãÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£Í¨¹ýÈí¼þ½ç˵ÎÞÏߵ磨SDR£©Ó²¼þºÍÌìÏߣ¬¶ñÒâÈí¼þ¿ÉÄÜÔÚ¸ôÀëϵͳÖбàÂëÊý¾Ý£¬²¢½«ÕâЩ±àÂëºóµÄÊý¾ÝÒÔµç´Å²¨µÄ´ó¾Ö·øÉä³öÈ¥£¬½ø¶ø±»Ô¶´¦µÄ½Ó¹ÜÉ豸²¶»ñ²¢½âÂë¡£RAMBO¹¥»÷µÄÖ÷ÌâÔÚÓڰѳÖRAMµÄ½Ó¼ûģʽ£¬ÌìÉúÓë¶þ½øÔìÊý¾ÝÏà¶ÔÓ¦µÄµç´ÅÐźÅ£¬ÐγÉÒñ±Îͨ·¡£ÕâÖÖ¹¥»÷·½Ê½Í»ÆÆÁË´«Í³¸ôÀëϵͳµÄ°²È«·ÀÏߣ¬ÓÉÓÚ¼´±ãϵͳ±»ÎïÀí¸ôÀ룬ҲÎÞ·¨ÕмÜÀ´×ÔÄÚ²¿¶ñÒâÈí¼þµÄÍþв¡£¶ñÒâÈí¼þ¿Éͨ¹ý¶àÖÖõè¾¶£¨ÈçϰȾUSBÇý¶¯Æ÷¡¢ÄÚ²¿ÈËÔ±¶ñÒâ²Ù×÷»ò¹©¸øÁ´¹¥»÷£©±»Ö²Èë¸ôÀëϵͳ¡£Mordechai Guri½øÒ»²½½ÒʾÁËÊý¾Ýͨ¹ýRAM´«Êäʱ²úÉúµÄµç´Å·øÉäÊÇй¶µÄ¹Ø¼ü£¬ÕâЩ·øÉäµÄƵÂÊÓëÊý¾Ý¿í¶È¡¢Ê±ÖÓ¿ìÂʼ°ÏµÍ³¼Ü¹¹çÇÃÜÓйØ¡£Í¨¹ý¾«È·½ÚÔìÄÚ´æ½Ó¼ûÖ¸Á¹¥»÷Õß¿ÉÄܳÉÁ¢µç´ÅÒñ±Îͨ·£¬ÊµÏÖÊý¾ÝµÄÔ¶³Ì´«Êä¡£Õë¶ÔRAMBO¹¥»÷£¬×êÑÐÈËÔ±Ò²Ìá³öÁËÏàÓ¦µÄ·ÀÓùÕ½ÊõºÍ± £»¤´ëÊ©¡£


https://www.securityweek.com/new-rambo-attack-allows-air-gapped-data-theft-via-ram-radio-signals/


6. ³¯ÏʺڿÍÀûÓÃLinkedInÓÕÆ­²¿ÊðCOVERTCATCH¶ñÒâÈí¼þ


9ÔÂ7ÈÕ£¬³¯ÏÊÍþвÐÐΪÕßͨ¹ýLinkedInƽ̨¶ÔWeb3ÁìÓòµÄ¿ª·¢ÈËÔ±Ö´ÐÐÁËһϵÁо«ÐIJ߶¯µÄÐéαÕÐÆ¸¹¥»÷£¬ÀûÓÃÉç»á¹¤³Ìѧ¼¿Á©ÓÕÆ­Ö¸±êÏÂÔØ²¢Ö´ÐжñÒâÈí¼þ¡£¹È¸è×Ó¹«Ë¾MandiantÔÚÆä×îл㱨ÖнÒʾÁËÕâЩ¹¥»÷µÄϸ½Ú£¬Ö¸³ö¹¥»÷Õß³£ÒÔ±àÂë²âÊÔΪ»Ï×Ó£¬Í¨¹ý·¢ËÍÔ̺¬COVERTCATCH¶ñÒâÈí¼þµÄZIPÎļþ×÷Ϊ³õʼϰȾ¼¿Á©¡£¸Ã¶ñÒâÈí¼þÖ¼ÔÚϰȾmacOSϵͳ£¬²¢Í¨¹ýÏÂÔØµÚ¶þ½×¶ÎÓÐЧ¸ºÔسÉÁ¢ÓƾÃÐÔ½ÚÔì¡£´ËÀà»î¶¯ÊôÓÚ³¯ÏʺڿÍ×éÖ¯¿í·º»î¶¯µÄÒ»²¿ÃÅ£¬Èç¡°ÍýÏ빤×÷Ðж¯¡±µÈ£¬ËüÃÇÀûÓù¤×÷µö¶ü´«²¼RustBucket¡¢KANDYKORNµÈ¶ñÒâÈí¼þ¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬³¯ÏʺڿͲ»½öÏÞÓÚÉç»á¹¤³Ìѧ¹¥»÷£¬»¹Éæ×ãÈí¼þ¹©¸øÁ´¹¥»÷£¬ÈçÕë¶Ô3CXºÍJumpCloudµÄÏÈÀýËùʾ¡£Ò»µ©Í¨¹ý¶ñÒâÈí¼þ»ñµÃ°²Éíµã£¬¹¥»÷Õß»á½øÒ»²½ÇÔÈ¡ÃÜÂë¡¢½øÐÐÄÚ²¿¿úËÅ£¬²¢ÉøÈëÔÆ»·¾³ÒÔµÁÈ¡¼ÓÃÜÇ®±Ò×ʽð¡£FBIÒ²·¢³öÖҸ棬ָ³ö³¯ÏÊÍþвÐÐΪÕßÕýÀûÓø߶ȶ¨Ô컯µÄÉç»á¹¤³Ì»î¶¯£¬³ö¸ñÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÐÐÒµ£¬Í¨¹ýαÔì¸öÐÔ»¯ÕÐÆ¸»òͶ×Ê»úÓö£¬Ì°Í¼ÎªÊÜÔì²ÃµÄ³¯ÏÊ»ñÈ¡·¸·¨ÊÕÈë¡£ÕâЩ¹¥»÷ǰ³£°éËæÏ꾡µÄÊܺ¦Õß²¼¾°µ÷²é£¬ÒÔ¼ÓÇ¿ÐÅÀµ¸Ð£¬Ìá¸ß¹¥»÷³É¹¦ÂÊ¡£FBIÇ¿µ÷£¬·¸×ï·Ö×Ó»áÀûÓÃÊܺ¦ÕßµÄÓ×ÎÒÐÅÏ¢»òÏÊΪÈËÖªµÄϸ½ÚÀ´³ÉÁ¢ÁªÏµ£¬½ø¶ø´«²¼¶ñÒâÈí¼þ£¬ÊµÏÔìä·¸·¨Ö÷ÕÅ¡£


https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html