Âí˹¿ËDOGE´òËãÏÝÍøÂ簲ȫΣ»ú£¬µ±¾ÖЧÄܲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹â·ì϶
°ä²¼¹¦·ò 2025-02-181. Âí˹¿ËDOGE´òËãÏÝÍøÂ簲ȫΣ»ú£¬µ±¾ÖЧÄܲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹â·ì϶
2ÔÂ14ÈÕ£¬¿Æ¼¼ÒÚÍò²ÆÖ÷°£Â¡¡¤Âí˹¿ËÖÎÀíÈ·µ±¾ÖЧÄܲ¿£¨DOGE£©Ö¼ÔÚÏ÷¼õÁª¹ú¿ªÖ§²¢ÌáÉýµ±¾ÖЧÄÜ£¬È»¶ø£¬Æäд´½¨µÄDOGE.govÍøÕ¾È´ÒòÍøÂ簲ȫ´ëÊ©ËɳڶøÃæ¶Ô³Á´ó·çÏÕ¡£ºÚ¿ÍÖ¸³ö£¬¸ÃÍøÕ¾´æÔÚÑϳÁ°²È«·ì϶£¬ÈκÎÈ˶¼ÄܽӼû²¢±à×ë´æ´¢µÄÐÅÏ¢¡£ÍøÕ¾Ëƺõ»Å潨³É£¬¸´ÔìÁËDOGEµÄÉ罻ýÌåÌû×Ó¼°¹Ø¼üͳ¼ÆÊý¾Ý£¬ÇÒÊý¾Ý¿â¹«¿ª£¬ÔÊÐíµÚÈý·½Åú¸ÄÄÚÈݲ¢ÊµÊ±ÏÔʾ¡£¾Ý¿ª·¢ÈËԱй©£¬¸ÃÍøÕ¾ÍйÜÔÚCloudflare PagesÉÏ£¬¶ø·Çµ±¾Ö·þÎñÆ÷£¬Êý¾Ý¿âAPI¶Ëµã¿É±»µÈÏÐÕÒµ½²¢ÍÆË͸üС£´Ë±í£¬DOGEµÄÁíÒ»ÍøÕ¾waste.govÒ²±£ÁôÁËWordPressĬÈÏÄ£°åºÍʾÀýÎı¾£¬½öÔÚýÌ幨עºó²Å±»·â½û¡£ÕâЩÊÂÎñ͹ÏÔÁËDOGEÔÚ×êӪЧÄܵÄͬʱ£¬ºöÊÓÁËÍøÂ簲ȫµÄ³ÁÒªÐÔ£¬¿ÉÄܳÉΪÆä¶¦ÐµľÍÒ寷¡£
https://cybernews.com/security/musk-doge-website-hacked/
2. ºÉÀ¼¾¯·½²é·âZservers/XHost·Àµ¯ÍйܷþÎñ127̨·þÎñÆ÷
2ÔÂ17ÈÕ£¬½üÈÕ£¬ÃÀ¡¢Ó¢¡¢°ÄÈý¹ú¶Ô¶íÂÞ˹·Àµ¯ÍйܷþÎñÌṩÉÌZservers¼°ÆäÖÎÀíÔ±Alexander Igorevich MishinºÍAleksandr Sergeyevich BolshakovÖ´ÐÐÔì²Ã£¬ÒòÆäÖ§³Ö¶íÂÞ˹ÀÕË÷Èí¼þLockBitÐж¯¡£ZserversλÓÚ¶íÂÞ˹°Í¶ûè§¶û£¬Í¨¹ýÌṩ·Àµ¯ÍйܷþÎñ£¨BPH£©£¬Ô̺¬×âÁÞ´óÁ¿IPµØÖ·£¬ÐÖúLockBit¹ØÁª¹«Ë¾Ìӱܷ¨ÂɺÍÍøÂ簲ȫ¹«Ë¾µÄÉó²é£¬ÐºÍгÌáÒéÀÕË÷Èí¼þ¹¥»÷¡£´Ëǰ£¬¼ÓÄôó·¨Âɲ¿ÃÅÔÚËѲéÖз¢ÏÖZserversµÄת×âIPµØÖ·ÓëLockBit¶ñÒâÈí¼þ²Ù×÷Óйء£ºÉÀ¼Òò˾·¨ÓÄ΢ÄÑÒԹعشËÀà·þÎñ£¬Í¹ÏÔÁ˼ÓÇ¿ÂÉÀýµÄ±ØÒªÐÔ¡£¼¸Ììºó£¬ºÉÀ¼¾¯·½°ä·¢ÒÑÏÂÏß²¢²é·âÁËÓëZservers/XHostÓйصÄ127̨λÓÚ°¢Ä·Ë¹Ìص¤µÄ·þÎñÆ÷¡£ÕâЩ·þÎñÆ÷±»ContiºÍLockBitµÈÍøÂç·¸×OÍÅʹÓ᣾¹ýÒ»Äê¶àµÄµ÷²é£¬°¢Ä·Ë¹Ìص¤¾¯·½ÍøÂç·¸×ïÓ××éÔÚ2ÔÂ12ÈÕµÄͻϮÖе·»ÙÁËÕâ¼Ò·Àµ¯ÍйÜÉÌ¡£Ðж¯Öз¢ÏֵķþÎñÆ÷ÉÏ×°ÓÐContiºÍLockbitµÄºÚ¿Í¹¤¾ß£¬ÕâÁ½¸ö¼¯Íű»ÒÔΪÊÇÊÀ½çÉÏ×î¾ß³ö²úÁ¦ºÍ·ÛËéÁ¦µÄÀÕË÷Èí¼þ¼¯ÍÅ¡£Ä¿Ç°£¬¸Ãµ÷²éÈÔÔÚ½øÐÐÖУ¬¾¯·½ÔÚ·ÖÎö±»¿ÛѺ·þÎñÆ÷ÉÏ´æ´¢µÄÊý¾Ý¡£
https://securityaffairs.com/174321/hacking/dutch-police-seized-127-servers-bulletproof-hosting-service-zservers-xhost.html
3. XCSSET macOS¶ñÒâÈí¼þбäÖÖ¼ÓÇ¿¹¥»÷ÄÜÁ¦£¬ÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢
2ÔÂ17ÈÕ£¬XCSSET macOSÄ£¿é»¯¶ñÒâÈí¼þµÄбäÖÖÒѳʴ˿ÌÕë¶ÔÓû§Ãô¸ÐÐÅÏ¢µÄ¹¥»÷ÖУ¬Ô̺¬Êý×ÖÇ®°üºÍNotesÀûÓ÷¨Ê½µÄÊý¾Ý¡£¸Ã¶ñÒâÈí¼þͨ³£Í¨¹ýÊÜϰȾµÄXcodeÏîÄ¿½øÐд«²¼£¬ÒѾ´æÔÚÖÁÉÙÎåÄ꣬²¢ÇÒÿ´Î¸üж¼´ú±í×Å¿ª·¢µÄÒ»¸öÀï³Ì±®¡£Î¢ÈíÍþвµý±¨ÍŶÓÔÚÓÐÏ޵Ĺ¥»÷Öз¢ÏÖÁË×îбäÖÖ£¬ËüÓµÓмÓÇ¿µÄ´úÂë»ìºÏ¡¢¸üºÃµÄÓÆ¾ÃÐÔºÍеÄϰȾսÊõ¡£ÐµıäÖÖѡȡÁËÒÀÀµÓÚBase64ºÍxxd²½ÖèµÄ±àÂë¼¼Êõ½øÐÐеĻìºÏ£¬Í¬Ê±Ê¹ÓÃÁËzshrcºÍdockÁ½ÖÖÓÆ¾ÃÐÔ¼¼Êõ¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃеÄXcodeϰȾ²½Ö裬½«ÓÐÐ§ÔØºÉ¸éÖÃÔÚXcodeÏîÄ¿ÖС£¶ÔÓÚzshrcÓÆ¾Ã»¯²½Ö裬еıäÖֻᴴ½¨Ò»¸öÔ̺¬ÓÐЧ¸ºÔصÄÎļþ£¬²¢ÔÚÆô¶¯ÐµÄshell»á»°Ê±Æô¶¯¸ÃÎļþ¡£¶ÔÓÚdock²½Ö裬¶ñÒâÈí¼þ´Ó¹¥»÷ÕߵĺÅÁîºÍ½ÚÔì·þÎñÆ÷ÏÂÔØÒÑÊðÃûµÄdockutil¹¤¾ßÀ´ÖÎÀídockÏîÄ¿£¬²¢´´½¨Ò»¸ö¶ñÒâµÄLaunchpadÀûÓ÷¨Ê½À´Ö´ÐжñÒâ¸ºÔØ¡£XcodeÊÇAppleµÄ¿ª·¢¹¤¾ß¼¯£¬XCSSETµÄÔËÓªÕßͨ¹ýÕë¶ÔXcodeÏîÄ¿×ÊÔ´Äܹ»½Ó´¥µ½¸ü¶àµÄÊܺ¦Õß¡£Î¢Èí½¨Òé²é³ºÍÑéÖ¤´Ó·Ç¹Ù·½´æ´¢¿â¿Ë¡µÄXcodeÏîÄ¿ºÍ´úÂë¿â£¬ÒÔ·À°µ²Ø»ìºÏµÄ¶ñÒâÈí¼þ»òºóÃÅ¡£
https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/
4. ºÚ¿ÍÀûÓà Telegram API ´«²¼Ð嵀 Golang ºóÃÅ
2ÔÂ17ÈÕ£¬NetskopeµÄÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öеġ¢¿ÉÄÜÈÔÔÚ¿ª·¢ÖеĻùÓÚGolangµÄºóÃŶñÒâÈí¼þ£¬ËüÀûÓÃTelegram API½øÐкÅÁîºÍ½ÚÔ죨C2£©Í¨Ñ¶¡£ÕâÖÖ¶ñÒâÈí¼þÔ´×Ô¶íÂÞ˹£¬ÀûÓÃÁËTelegramµÈÔÆ·þÎñ£¬ÕâЩ·þÎñÒ×ÓÚ¹¥»÷ÕßʹÓöøÄÑÒÔ±»×êÑÐÈËÔ±¼à¿Ø¡£¸Ã¶ñÒâÈí¼þÔÚÖ´ÐÐʱ»á²é³×ÔÉíÊÇ·ñ´ÓÖ¸¶¨µØÎ»ºÍÎļþÃûÔËÐУ¬Èç²»ÊÇ£¬Ôò»á¸´Ôìµ½¸ÃµØÎ»²¢Æô¶¯¸±±¾¡£¶ÔÓÚC2ͨѶ£¬ºóÃÅʹÓÿªÔ´Go°üÓëTelegram½»»¥£¬³ÉÁ¢Ò»¸ö»úеÈËÊ·ýÀ´¼à¶½Ö¸¶¨µÄ̸ÌìÖÐÊÇ·ñÓÐкÅÁî¡£¸Ã¶ñÒâÈí¼þÖ§³ÖËĸöºÅÁµ«Ä¿Ç°Ö»ÊµÏÖÁËÈý¸ö£¬Ô̺¬Ö´ÐÐPowerShellºÅÁî¡¢³Á¸´³õʼװÖò鳺͹ý³Ì¡¢·¢ËÍÆÁÄ»½ØÍ¼ÐÂÎÅ£¨ËäδÆëȫʵÏÖ£©ÒÔ¼°×Ô»ÙºÅÁî¡£ÕâÖÖ¶ÔÔÆÀûÓ÷¨Ê½µÄ¶ñÒâÀûÓøø·ÀÓùÕß´øÀ´ÁËÌôÕ½£¬ÓÉÓÚ´Ó·ÀÓùÕߵĽǶÈÀ´¿´£¬ºÜÄÑ·Ö±æÊ¹ÓÃAPIµÄͨ³£Óû§ºÍC2ͨѶ¡£ÎªÁËά³Ö°²È«£¬½¨Òé×°ÖÃ×îÐÂÇÒŵÑÔÓÅÁ¼µÄ·À²¡¶¾ºÍ·´¶ñÒâÈí¼þ£¬ÒÔ¼ì²âºÍ×èÖ¹´ËÀà¶ñÒâÎļþ¡£
https://hackread.com/hackers-exploit-telegram-api-spread-golang-backdoor/
5. RansomHubÀÕË÷Èí¼þ×éÖ¯¹¥»÷ËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä
2ÔÂ17ÈÕ£¬RansomHubÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä½øÐÐÁ˹¥»÷£¬ÒÑËø¶¨Æä»ù´¡ÉèÊ©²¢»ñÈ¡ÁË119GBµÄÎļþ¡£ÊÜÓ°ÏìµÄϵͳÔ̺¬¶Ä³¡¡¢·½±ãµê¡¢µ±¾Ö´óÂ¥¡¢µçÕÛ·þÎñÒÔ¼°¶à¸öÒ½ÁÆÖÐÐÄ¡£RansomHubÔð¹Ö²¿Âäδ½øÐн»É棬²¢Æ·ÆÀÆä±£ÏÕ¹«Ë¾ºÍ¶Ê»áδ²ÉÈ¡Ðж¯¡£RansomHubÍþв³Æ£¬ÈôÖÜÈýǰδÊÕµ½»Ø¸´£¬½«Ð¹Â¶Ëùº±¼û¾Ý¡£ËÕÊ¥ÂêÀöÆæçêÍßÓ¡µÚ°²²¿ÂäÔò°ä·¢ÉêÃ÷³Æ£¬2ÔÂ9ÈÕÔâ·êÁËÀÕË÷Èí¼þÍøÂç¹¥»÷£¬¶à¸öµç»°ºÍÍÆËã»úϵͳÊܵ½Ó°Ïì¡£²¿ÂäÔÚÓëÍøÂ簲ȫר¼ÒºÏ×÷£¬È«Á¦½â¾öÎÊÌ⣬²¢ÉèÁ¢ÁËеĵ绰ºÅÂ룬Ԥ¼Æ½«ÒÔÓÐÏÞÄÜÁ¦ÔË×÷Ò»ÖÜ¡£²¿ÂäÖ÷ϯÏòÉçÇø±£ÕÏ£¬ËûÃǽ«³ÖÐø¶¨ÆÚ¸üи´ÔÇé¿ö£¬µ«Ä¿Ç°ÎÞ·¨·ÖÏí¸ü¶àϸ½Ú£¬¸Ð¼¤¸÷È˵ÄÄÍÐĺÍÀí½â¡£
https://databreaches.net/2025/02/17/ransomware-attack-affects-michigan-casinos-and-tribal-health-centers/
6. Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢ÆðDDoS¹¥»÷
2ÔÂ17ÈÕ£¬Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢ÆðÁËDDoS¹¥»÷£¬Ö¸±êÔ̺¬ÀûÄÉÌØ»ú³¡¡¢Âí¶ûÅíÈø»ú³¡¡¢½»Í¨ÖÎÀí¾Ö¡¢Intesa San PaoloÒøÐÐÒÔ¼°ËþÀ¼Íиۺ͵ÄÀïÑÅË¹ÌØ¸ÛµÄÍøÕ¾¡£ÕâЩ¹¥»÷ÊǶÔÒâ´óÀû×ÜͳÂíËþÀ×À½«¶íÂÞ˹ÓëÄÉ´âµÂ¹úº¹Çà½øÐбÈÁ¦µÄÓßÂ۵ĻØÓ¦£¬NoName057(16)Ðû³ÆÕâÊǶԡ°¿Ö¶íÕß¡±µÄ³ÍÖΡ£Ö»¹Ü¹¥»÷¶ÔÖ¸±êµÄÓ°Ïì½ÏÓ×£¬µ«Òâ´óÀû¹ú¶ÈÍøÂ簲ȫ¾ÖѸ¿ì²ÉÈ¡Ðж¯£¬Ö§³ÖÊÜÓ°ÏìµÄ×éÖ¯²¢½â³ýÁ˹¥»÷¡£NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬Ê¹ÓöàÖÖ¹¤¾ß½øÐй¥»÷£¬²¢ÔÚµØÔµÕþÖÎÑÏÖØÊ±ÆÚÉý¼¶Ï®»÷¡£Õâ´Î¹¥»÷²¢·Ç³õ´Î£¬Ö®Ç°¸Ã×éÖ¯Ò²Ôø¶ÔÒâ´óÀû¸÷²¿Î¯¡¢»ú¹¹¡¢¹Ø¼ü»ù´¡ÉèÊ©ÍøÕ¾ºÍ¸öÈË×éÖ¯ÌáÒé¹ý¹¥»÷¡£¶íÂÞ˹±í½»²¿½²»°ÈËÂêÀöÑÇ¡¤Ôú¹þÂÞÍÞÒ²°µÊ¾£¬ÂíËþÀ×ÀµÄÓßÂÛ²»»á¡°²»ÊܳÍÖΡ±¡£
https://securityaffairs.com/174294/hacktivism/noname05716-launched-ddos-attacks-on-italian-sites.html


¾©¹«Íø°²±¸11010802024551ºÅ