Lazarus Group¾íÍÁ³ÁÀ´£ºnpmÈí¼þ´æ´¢¿âÔâ¶ñÒâ´úÂëÖ²Èë¹¥»÷
°ä²¼¹¦·ò 2025-03-121. Lazarus Group¾íÍÁ³ÁÀ´£ºnpmÈí¼þ´æ´¢¿âÔâ¶ñÒâ´úÂëÖ²Èë¹¥»÷
3ÔÂ12ÈÕ£¬³ôÃûÔ¶ÑïµÄLazarus GroupºÚ¿Í×éÖ¯ÔٴλîÔ¾£¬Õâ´ÎËûÃǽ«¶ñÒâ´úÂëÖ²ÈëÈ«Çò¿ª·¢ÈËÔ±ÒÀÀµµÄnpmÈí¼þ´æ´¢¿â¡£npm×÷ΪJavaScript´úÂëµÄ´óÐÍÔÚÏ߿⣬±»¿ª·¢ÈËÔ±¿í·ºÓÃÓÚ»ñȡԤÏȹ¹½¨µÄÈí¼þƬ¶Î¡£Lazarus GroupÀûÓá°ÓòÃûÇÀ×¢¡±¼¼Êõ£¬´´½¨ÁËÓëºÏ·¨Èí¼þ°üÃû³ÆÀàËÆµÄÐéαÈí¼þ°ü£¬²¢ÉèÖÃÁËÐéαµÄGitHubÒ³ÃæÒÔÔö³¤¿ÉÐŶȡ£ÕâЩÐéαÈí¼þ°üÒѱ»ÏÂÔØÊý°Ù´Î£¬Ö¼ÔÚÉøÈ뿪·¢ÈËÔ±µÄÍÆËã»ú£¬ÇÔÈ¡µÇ¼ÐÅÏ¢¡¢¼ÓÃÜÇ®±ÒÐÅÏ¢£¬²¢×°ÖúóÃÅÒÔ¹©³Ö¾Ã½Ó¼û¡£Ï°È¾ºó£¬¶ñÒâÈí¼þ»áÖ´ÐжàÏî¶ñÒâ»î¶¯£¬Ô̺¬ÍøÂçϵͳ¾ßÌåÐÅÏ¢¡¢ÌáÈ¡ä¯ÀÀÆ÷ÖеĵǼʹ´¦¡¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü£¬²¢×°ÖÃÆäËû¶ñÒâÈí¼þÒÔά³Ö¶ÔÊÜϰȾϵͳµÄ³ÖÐø½Ó¼û¡£´ËÊÂÎñ²»½öÓ°ÏìÓ×ÎÒ¿ª·¢Õߣ¬»¹¿ÉÄÜÈÃÕû¸ö×éÖ¯Ãæ¶Ô·çÏÕ¡£¹ÌÈ»GitHubÒÑɾ³ýËùÓжñÒâÈí¼þ°ü£¬µ«Lazarus Group¿ÉÄÜÈÔÔÚÔËÓªÆäËû¶ñÒâÈí¼þ¡£Òò¶ø£¬¿ª·¢ÈËÔ±ºÍ×éÖ¯Ó¦²ÉÈ¡×Ô¶¯µÄ°²È«´ëÊ©£¬ÈçÑéÖ¤Èí¼þ°üÆðÔ´¡¢Ê¹Óð²È«¹¤¾ß¼ì²â¶ñÒâÒÀÀµÏî¡¢Ö´Ðжà²ã°²È«ÐÔ¡¢¶¨ÆÚɨÃèµÚÈý·½Èí¼þ°üÖеķì϶£¬²¢½ÌÓýÍŶӼø±ð¿ÉÒɵÄÈí¼þ°üÃû³Æ£¬ÒÔ¼õÇṩ¸øÁ´¹¥»÷´øÀ´µÄ·çÏÕ¡£
https://hackread.com/lazarus-group-backdoor-fake-npm-packages-attack/
2. MassJacker¼ôÌù°å½Ù³Ö²Ù×÷£ºÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÐÂÍþв
3ÔÂ11ÈÕ£¬Ð·¢ÏֵļôÌù°å½Ù³Ö²Ù×÷¡°MassJacker¡±ÒÑÇÔÈ¡´óÁ¿Êý×Ö×ʲú£¬ÀûÓÃÖÁÉÙ778,531¸ö¼ÓÃÜÇ®±ÒÇ®°üµØÖ·´ÓÊÜÏ°È¾ÍÆËã»úÖÐ×ªÒÆ×ʽð¡£CyberArk·¢ÏÖ£¬Óë¸Ã²Ù×÷ÓйصÄÇ®°üÔÚ·ÖÎöʱÔ̺¬Ô¼95,300ÃÀÔª£¬µ«º¹ÇàÂòÂô½ð¶î¸ü´ó£¬ÆäÖÐÒ»¸öSolanaÇ®°ü×÷ΪÖÐÑëÊÕ¿îÖÐÐÄ£¬ÒÑÀÛ¼ÆÊµÏÖ³¬¹ý30ÍòÃÀÔªµÄÂòÂô¡£CyberArkÒÉ»ó¸Ã²Ù×÷ÓÉÌØ¶¨Íþв×éÖ¯ÌáÒ飬µ«Ò²¿ÉÄÜѡȡ¶ñÒâÈí¼þ¼´·þÎñģʽ£¬ÓÉÖÐÑëÖÎÀíÔ±ÏòÍøÂç·¸×ï·Ö×ÓÏúÊÛ½Ó¼ûȨÏÞ¡£MassJackerʹÓüôÌù°å½Ù³Ö¶ñÒâÈí¼þ£¨clippers£©£¬¼à¶½Windows¼ôÌù°åÖи´ÔìµÄ¼ÓÃÜÇ®±ÒÇ®°üµØÖ·£¬²¢½«Æä´úÌæÎª¹¥»÷Õß½ÚÔìµÄµØÖ·£¬Ê¹Êܺ¦ÕßÔÚ²»ÖªÇéµÄÇé¿öϽ«×ʽðת¸ø¹¥»÷Õß¡£¸Ã²Ù×÷ͨ¹ýÍйܵÁ°æÈí¼þºÍ¶ñÒâÈí¼þµÄÍøÕ¾pesktop[.]com·Ö·¢£¬ÀûÓÃһϵÁи´Ôӵľ籾ºÍ¼ÓÔØÆ÷£¬×îÖÕ½«MassJacker×¢ÈëºÏ·¨µÄWindows¹ý³ÌÖС£CyberArkºôÓõÍøÂ簲ȫ×êÑÐ½ç¹Ø×¢´ËÀà´óÐͼÓÃܽٳÖÐж¯£¬ÒÔ»ñÈ¡ÍþвÐÐΪÕßµÄÉí·ÝÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/massjacker-malware-uses-778-000-wallets-to-steal-cryptocurrency/
3. ÐéαÒÁ¡¡¤Âí˹¿Ë´úÑÔ½ÚÄÜÉ豸¶ÌÐÅȦÌ×½ÒÃØ
3ÔÂ11ÈÕ£¬½üÆÚ£¬ÃÀ¹úÓ×ÎÒÆµÈÔÊÕµ½ÀûÓÃÒÁ¡¡¤Âí˹¿ËÃûÒå½øÐÐÐéαÐû´«µÄ¶ÌÐÅ£¬Ö¼ÔÚÏúÊÛËùνµÄ½ÚÄÜÉ豸¡£Bitdefender°²È«×êÑÐÈËÔ±¸æ·¢ÁËÕâһȦÌ×£¬Ö¸³öÚ¿ÆÕßͨ¹ý·¢Ë͸öÐÔ»¯¶ÌÐÅ£¬ÓÕÆÊÕ¼þÈ˵ã»÷¶ñÒâÍøÕ¾Á´½Ó¡£ÕâЩ¶ÌÐÅÐû³ÆÄÜ´ó·ù½µµÍµç·Ñ£¬ÉõÖÁÒýÓÃÐéαµÄÂí˹¿ËÒýÑÔ£¬Ðû´«Ò»ÖÖ±»»Ñ³ÆÎªÂí˹¿Ë·¢ÏÖµÄÓ×ÐͽÚÄÜÉ豸¡£ÕâЩαÔìµÄÎÄÕÂʹÓÃÁîÈËÕÛ·þµÄ˵»°ºÍ¼¼Êõ´ë´Ç£¬ÒÔ´´ÔìºÏ·¨ÐԵļÙÏ󣬲¢Ô̺¬Î±ÔìµÄͼƬÒÔ½øÒ»²½ºýŪDZÔÚÊܺ¦Õß¡£¶ÌÐŻʼÓÚ1Ô·ݣ¬ÒÑ·¢ËÍÊýǧÌõÐÂÎÅ£¬¶à¸öÓòÃûÈÔ´¦Óڻ״̬¡£BitdefenderÖÒ¸æ³Æ£¬ÕâЩÓòÃû¿ÉÄÜÔÚ½«À´»î¶¯Öб»³Á¸´Ê¹Ó㬽¨ÒéÓ×ÎÒ¾¯Ìè´ËÀàδ¾ÒªÇóµÄ¶ÌÐÅ£¬Ö±½ÓÏòÄÜÔ´¹©¸øÉ̺ËʵÈκÎÄÜÔ´ÕÛ¿ÛÉêÃ÷£¬²¢Ïòµç»°ÔËÓªÉ̺ͱ¾µØµ±¾Ö»ã±¨¿ÉÒÉÐÅÏ¢¡£Í¬Ê±£¬Ò²ÌáÐѹ«¼Ò°ÑÎÈesavrrcom¡¢gimelovecomºÍeaeloncomµÅ×òÃû¿ÉÄÜ´æÔڵķçÏÕ¡£
https://hackread.com/sms-scam-elon-musks-sell-fake-energy-devices-usa/
4. Ballista½©Ê¬ÍøÂç¶Ô׼佨²¹µÄTP-Link Archer·ÓÉÆ÷
3ÔÂ11ÈÕ£¬Cato CTRLÍŶÓ×îз¢ÏÖ£¬Î´½¨²¹µÄTP-Link Archer AX-21·ÓÉÆ÷Òò´æÔÚ¸ßÑϳÁÐÔ°²È«·ì϶CVE-2023-1389£¬ÒѳÉΪн©Ê¬ÍøÂçBallistaµÄ¹¥»÷Ö¸±ê¡£¸Ã·ì϶×Ô2023Äê4ÔÂÆð±»ÀûÓã¬×î³õÓÃÓÚͶ·ÅMirai½©Ê¬ÍøÂç¶ñÒâÈí¼þ£¬ËæºóÒ²±»ÓÃÓÚ´«²¼ÆäËû¶ñÒâÈí¼þ¡£Ballista»î¶¯ÓÚ2025Äê1ÔÂ10ÈÕ±»Cato CTRL¼ì²âµ½£¬×î½üÒ»´ÎÀûÓó¢ÊÔÔÚ2ÔÂ17ÈÕ¡£¸Ã½©Ê¬ÍøÂçÀûÓöñÒâÈí¼þͶ·ÅÆ÷ºÍshell¾ç±¾»ñÈ¡²¢Ö´ÐÐÖ¸±êϵͳÉϵÄÖ÷¶þ½øÔìÎļþ£¬³ÉÁ¢¼ÓÃܵĺÅÁîºÍ½ÚÔìͨ·£¬Ö´ÐÐRCEºÍDoS¹¥»÷£¬²¢³¢ÊÔ¶ÁÈ¡Ãô¸ÐÎļþ¡£BallistaÖ§³Ö¶àÖÖºÅÁÔ̺¬ºéË®¹¥»÷¡¢Æô¶¯Ä£¿é¡¢ÖÕ³¡Ä£¿é¡¢ÔËÐÐLinux shellºÅÁîºÍÖÕÖ¹·þÎñµÈ¡£¶ñÒâÈí¼þ¶þ½øÔìÎļþÖеÄC2 IPµØÖ·ºÍÒâ´óÀûÓï×Ö·û´®Åú×¢ÓÐδ֪Òâ´óÀûÍþвÐÐΪÕ߲μӡ£È»¶ø£¬¸Ã¶ñÒâÈí¼þÔÚ»ý¼«¿ª·¢ÖУ¬ÒѳöÏÖʹÓÃTORÍøÂçÓòµÄÐÂͶ·ÅÆ÷±äÖÖ¡£Ä¿Ç°£¬³¬¹ý6000̨É豸Êܵ½BallistaϰȾ£¬ÖØÒª¼¯ÖÐÔÚ°ÍÎ÷¡¢²¨À¼¡¢Ó¢¹ú¡¢±£¼ÓÀûÑǺÍÍÁ¶úÆäµÈ¹ú£¬Ö¸±êΪÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÖйúºÍÄ«Î÷¸çµÄÔì×÷Òµ¡¢Ò½ÁÆ/±£½¡¡¢·þÎñÒµºÍ¼¼Êõ×éÖ¯¡£Ö»¹ÜÓëÆäËû½©Ê¬ÍøÂçÓÐÀàËÆÖ®´¦£¬BallistaÈÔÓÐÆä¶À¸öÐÔ¡£
https://thehackernews.com/2025/03/ballista-botnet-exploits-unpatched-tp.html
5. CISAÖҸ棺Ivanti EPMÉ豸·ì϶ÍþвÁª¹ú»ú¹¹ÍøÂ簲ȫ
3ÔÂ11ÈÕ£¬CISAÖÒ¸æÃÀ¹úÁª¹ú»ú¹¹°ÑÎȱ£»¤ÆäÍøÂ磬·À±¸Õë¶ÔIvanti Endpoint Manager (EPM) É豸µÄÈý¸öÑϳÁ·ì϶£¨CVE-2024-13159¡¢CVE-2024-13160ºÍCVE-2024-13161£©µÄ¹¥»÷¡£IvantiÓëÈ«Çò7000¶à¼Ò×éÖ¯ºÏ×÷£¬Îª40000¶à¼Ò¹«Ë¾ÌṩϵͳºÍIT×ʲúÖÎÀí½â¾ö¹æ»®¡£ÕâЩ·ì϶Óɾø¶Ôõè¾¶±éÀúÈõµãÔì³É£¬¿ÉʹԶ³Ìδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õ߯ëÈ«·ÛËéÒ×Êܹ¥»÷µÄ·þÎñÆ÷¡£ÕâЩ·ì϶ÓÚÈ¥Äê10Ô±»»ã±¨£¬²¢ÓÚ½ñÄê1ÔÂ13ÈÕ±»Ivanti½¨¸´¡£È»¶ø£¬½öÒ»¸ö¶àÔºó£¬Horizon3.ai°ä²¼Á˸ÅÏëÑéÖ¤·ì϶£¬¿ÉÓÃÓÚÖм̹¥»÷£¬Ð²ÆÈIvanti EPM»úеƾ֤¡£CISAÒѽ«ÕâЩ·ì϶Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ÖУ¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÐèÔÚÈýÖÜÄÚ±£»¤ÆäϵͳÃâÊܹ¥»÷¡£CISAÇ¿ÁÒ¶½´ÙËùÓÐ×é֯ʵʱ½¨¸´Ä¿Â¼·ì϶£¬ÒÔÏ÷¼õÔâ·êÍøÂç¹¥»÷µÄ·çÏÕ¡£×Ô2025ËêÊ×ÒÔÀ´£¬ÓмäµýÐÐΪÕßÒÑÀûÓÃIvanti·ì϶½øÐй¥»÷¡£
https://www.bleepingcomputer.com/news/security/cisa-tags-critical-ivanti-epm-flaws-as-actively-exploited-in-attacks/
6. °ÍÀèË÷¹ú´óѧÔâÈËΪÖÇÄÜ¿ª·¢µÄFunksecÀÕË÷Èí¼þ¹¥»÷
3ÔÂ10ÈÕ£¬FunksecÀÕË÷Èí¼þ×éÖ¯ÒÔÆä²¿ÊðµÄ¾Ý³ÆÊÇÊ׸öѡȡÌìÉúʽÈËΪÖÇÄÜ£¨GenAI£©µÄÀÕË÷Èí¼þ¶øÎÅÃû£¬×î½ü¸Ã×éÖ¯Ðû³Æ¹¥ÆÆÁ˺¹ÇàÓÆ¾ÃµÄ°ÍÀèË÷¹ú´óѧ£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Éϰ䲼Á˾ݳƴӸÃУ·þÎñÆ÷ÇÔÈ¡µÄ20GBÎļþµÄÐÅÏ¢£¬´ÍÓëѧÌùÙԱԼĪ12Ì칦·òÖ§¸¶Î´¹«¿ªµÄÊê½ð¡£Ë÷¹ú´óѧÊÇÒ»ËùÕ¼ÓÐ55,000ÃûѧÉúºÍÊýǧÃû×êÑм°ÐÐÕþÈËÔ±µÄ¹«Á¢´óѧ£¬´ËÇ°Ò²ÔøÔâ·ê¹ý³Á´óºÚ¿Í¹¥»÷¡£Funksec×Ô2024Äê11Ô¹«¿ª³öÏÖÒÔÀ´£¬Ò»ÏòÔÚ¼Ó´ó¹¥»÷´ÎÊý£¬ÖØÒªÕë¶ÔÃÀ¹ú¡¢Ó¡¶È¡¢Î÷°àÑÀºÍÃɹÅÈ·µ±¾ÖºÍ¹ú·À¡¢¼¼Êõ¡¢½ðÈںͽÌÓýÁìÓò¡£¸Ã×é֯ʹÓÃÈËΪÖÇÄÜ¿ª·¢ÀÕË÷Èí¼þ£¬±»ÁÐΪ´ÓǰÖÜΧÄÚ×î»îÔ¾µÄÎå´óÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£´Ë±í£¬Funksec»¹³ÉÁ¢ÁËÒ»¸öÔ̺¬ÅÄÂôÍøÕ¾¡¢Êг¡ºÍ»áÉÌÂÛ̳ÔÚÄ򵀮ëÈ«Éú̬ϵͳ£¬ÖÂÁ¦ÓÚÈÃÕâ¸öÊг¡³ÉΪTorÍøÂçÖÐ×îºÃµÄ¡£
https://cybernews.com/news/sorbonne-university-paris-claim-funksec-ai-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ