Lazarus Group¾íÍÁ³ÁÀ´£ºnpmÈí¼þ´æ´¢¿âÔâ¶ñÒâ´úÂëÖ²Èë¹¥»÷

°ä²¼¹¦·ò 2025-03-12

1. Lazarus Group¾íÍÁ³ÁÀ´£ºnpmÈí¼þ´æ´¢¿âÔâ¶ñÒâ´úÂëÖ²Èë¹¥»÷


3ÔÂ12ÈÕ £¬³ôÃûÔ¶ÑïµÄLazarus GroupºÚ¿Í×éÖ¯ÔٴλîÔ¾ £¬Õâ´ÎËûÃǽ«¶ñÒâ´úÂëÖ²ÈëÈ«Çò¿ª·¢ÈËÔ±ÒÀÀµµÄnpmÈí¼þ´æ´¢¿â¡£npm×÷ΪJavaScript´úÂëµÄ´óÐÍÔÚÏ߿⠣¬±»¿ª·¢ÈËÔ±¿í·ºÓÃÓÚ»ñȡԤÏȹ¹½¨µÄÈí¼þƬ¶Î¡£Lazarus GroupÀûÓá°ÓòÃûÇÀ×¢¡±¼¼Êõ £¬´´½¨ÁËÓëºÏ·¨Èí¼þ°üÃû³ÆÀàËÆµÄÐéαÈí¼þ°ü £¬²¢ÉèÖÃÁËÐéαµÄGitHubÒ³ÃæÒÔÔö³¤¿ÉÐŶÈ¡£ÕâЩÐéαÈí¼þ°üÒѱ»ÏÂÔØÊý°Ù´Î £¬Ö¼ÔÚÉøÈ뿪·¢ÈËÔ±µÄÍÆËã»ú £¬ÇÔÈ¡µÇ¼ÐÅÏ¢¡¢¼ÓÃÜÇ®±ÒÐÅÏ¢ £¬²¢×°ÖúóÃÅÒÔ¹©³Ö¾Ã½Ó¼û¡£Ï°È¾ºó £¬¶ñÒâÈí¼þ»áÖ´ÐжàÏî¶ñÒâ»î¶¯ £¬Ô̺¬ÍøÂçϵͳ¾ßÌåÐÅÏ¢¡¢ÌáÈ¡ä¯ÀÀÆ÷ÖеĵǼʹ´¦¡¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü £¬²¢×°ÖÃÆäËû¶ñÒâÈí¼þÒÔά³Ö¶ÔÊÜϰȾϵͳµÄ³ÖÐø½Ó¼û¡£´ËÊÂÎñ²»½öÓ°ÏìÓ×ÎÒ¿ª·¢Õß £¬»¹¿ÉÄÜÈÃÕû¸ö×éÖ¯Ãæ¶Ô·çÏÕ¡£¹ÌÈ»GitHubÒÑɾ³ýËùÓжñÒâÈí¼þ°ü £¬µ«Lazarus Group¿ÉÄÜÈÔÔÚÔËÓªÆäËû¶ñÒâÈí¼þ¡£Òò¶ø £¬¿ª·¢ÈËÔ±ºÍ×éÖ¯Ó¦²ÉÈ¡×Ô¶¯µÄ°²È«´ëÊ© £¬ÈçÑéÖ¤Èí¼þ°üÆðÔ´¡¢Ê¹Óð²È«¹¤¾ß¼ì²â¶ñÒâÒÀÀµÏî¡¢Ö´Ðжà²ã°²È«ÐÔ¡¢¶¨ÆÚɨÃèµÚÈý·½Èí¼þ°üÖеķì϶ £¬²¢½ÌÓýÍŶӼø±ð¿ÉÒɵÄÈí¼þ°üÃû³Æ £¬ÒÔ¼õÇṩ¸øÁ´¹¥»÷´øÀ´µÄ·çÏÕ¡£


https://hackread.com/lazarus-group-backdoor-fake-npm-packages-attack/


2. MassJacker¼ôÌù°å½Ù³Ö²Ù×÷£ºÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÐÂÍþв


3ÔÂ11ÈÕ £¬Ð·¢ÏֵļôÌù°å½Ù³Ö²Ù×÷¡°MassJacker¡±ÒÑÇÔÈ¡´óÁ¿Êý×Ö×ʲú £¬ÀûÓÃÖÁÉÙ778,531¸ö¼ÓÃÜÇ®±ÒÇ®°üµØÖ·´ÓÊÜÏ°È¾ÍÆËã»úÖÐ×ªÒÆ×ʽð¡£CyberArk·¢ÏÖ £¬Óë¸Ã²Ù×÷ÓйصÄÇ®°üÔÚ·ÖÎöʱÔ̺¬Ô¼95,300ÃÀÔª £¬µ«º¹ÇàÂòÂô½ð¶î¸ü´ó £¬ÆäÖÐÒ»¸öSolanaÇ®°ü×÷ΪÖÐÑëÊÕ¿îÖÐÐÄ £¬ÒÑÀÛ¼ÆÊµÏÖ³¬¹ý30ÍòÃÀÔªµÄÂòÂô¡£CyberArkÒÉ»ó¸Ã²Ù×÷ÓÉÌØ¶¨Íþв×éÖ¯ÌáÒé £¬µ«Ò²¿ÉÄÜѡȡ¶ñÒâÈí¼þ¼´·þÎñģʽ £¬ÓÉÖÐÑëÖÎÀíÔ±ÏòÍøÂç·¸×ï·Ö×ÓÏúÊÛ½Ó¼ûȨÏÞ¡£MassJackerʹÓüôÌù°å½Ù³Ö¶ñÒâÈí¼þ£¨clippers£© £¬¼à¶½Windows¼ôÌù°åÖи´ÔìµÄ¼ÓÃÜÇ®±ÒÇ®°üµØÖ· £¬²¢½«Æä´úÌæÎª¹¥»÷Õß½ÚÔìµÄµØÖ· £¬Ê¹Êܺ¦ÕßÔÚ²»ÖªÇéµÄÇé¿öϽ«×ʽðת¸ø¹¥»÷Õß¡£¸Ã²Ù×÷ͨ¹ýÍйܵÁ°æÈí¼þºÍ¶ñÒâÈí¼þµÄÍøÕ¾pesktop[.]com·Ö·¢ £¬ÀûÓÃһϵÁи´Ôӵľ籾ºÍ¼ÓÔØÆ÷ £¬×îÖÕ½«MassJacker×¢ÈëºÏ·¨µÄWindows¹ý³ÌÖС£CyberArkºôÓõÍøÂ簲ȫ×êÑÐ½ç¹Ø×¢´ËÀà´óÐͼÓÃܽٳÖÐж¯ £¬ÒÔ»ñÈ¡ÍþвÐÐΪÕßµÄÉí·ÝÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/massjacker-malware-uses-778-000-wallets-to-steal-cryptocurrency/


3. ÐéαÒÁ¡¡¤Âí˹¿Ë´úÑÔ½ÚÄÜÉ豸¶ÌÐÅȦÌ×½ÒÃØ


3ÔÂ11ÈÕ £¬½üÆÚ £¬ÃÀ¹úÓ×ÎÒÆµÈÔÊÕµ½ÀûÓÃÒÁ¡¡¤Âí˹¿ËÃûÒå½øÐÐÐéαÐû´«µÄ¶ÌÐÅ £¬Ö¼ÔÚÏúÊÛËùνµÄ½ÚÄÜÉ豸¡£Bitdefender°²È«×êÑÐÈËÔ±¸æ·¢ÁËÕâһȦÌ× £¬Ö¸³öÚ¿Æ­Õßͨ¹ý·¢Ë͸öÐÔ»¯¶ÌÐÅ £¬ÓÕÆ­ÊÕ¼þÈ˵ã»÷¶ñÒâÍøÕ¾Á´½Ó¡£ÕâЩ¶ÌÐÅÐû³ÆÄÜ´ó·ù½µµÍµç·Ñ £¬ÉõÖÁÒýÓÃÐéαµÄÂí˹¿ËÒýÑÔ £¬Ðû´«Ò»ÖÖ±»»Ñ³ÆÎªÂí˹¿Ë·¢ÏÖµÄÓ×ÐͽÚÄÜÉ豸¡£ÕâЩαÔìµÄÎÄÕÂʹÓÃÁîÈËÕÛ·þµÄ˵»°ºÍ¼¼Êõ´ë´Ç £¬ÒÔ´´ÔìºÏ·¨ÐԵļÙÏó £¬²¢Ô̺¬Î±ÔìµÄͼƬÒÔ½øÒ»²½ºýŪDZÔÚÊܺ¦Õß¡£¶ÌÐŻʼÓÚ1Ô·Ý £¬ÒÑ·¢ËÍÊýǧÌõÐÂÎÅ £¬¶à¸öÓòÃûÈÔ´¦Óڻ״̬¡£BitdefenderÖÒ¸æ³Æ £¬ÕâЩÓòÃû¿ÉÄÜÔÚ½«À´»î¶¯Öб»³Á¸´Ê¹Óà £¬½¨ÒéÓ×ÎÒ¾¯Ìè´ËÀàδ¾­ÒªÇóµÄ¶ÌÐÅ £¬Ö±½ÓÏòÄÜÔ´¹©¸øÉ̺ËʵÈκÎÄÜÔ´ÕÛ¿ÛÉêÃ÷ £¬²¢Ïòµç»°ÔËÓªÉ̺ͱ¾µØµ±¾Ö»ã±¨¿ÉÒÉÐÅÏ¢¡£Í¬Ê± £¬Ò²ÌáÐѹ«¼Ò°ÑÎÈesavrrcom¡¢gimelovecomºÍeaeloncomµÅ×òÃû¿ÉÄÜ´æÔڵķçÏÕ¡£


https://hackread.com/sms-scam-elon-musks-sell-fake-energy-devices-usa/


4. Ballista½©Ê¬ÍøÂç¶Ô׼佨²¹µÄTP-Link Archer·ÓÉÆ÷


3ÔÂ11ÈÕ £¬Cato CTRLÍŶÓ×îз¢ÏÖ £¬Î´½¨²¹µÄTP-Link Archer AX-21·ÓÉÆ÷Òò´æÔÚ¸ßÑϳÁÐÔ°²È«·ì϶CVE-2023-1389 £¬ÒѳÉΪн©Ê¬ÍøÂçBallistaµÄ¹¥»÷Ö¸±ê¡£¸Ã·ì϶×Ô2023Äê4ÔÂÆð±»ÀûÓà £¬×î³õÓÃÓÚͶ·ÅMirai½©Ê¬ÍøÂç¶ñÒâÈí¼þ £¬ËæºóÒ²±»ÓÃÓÚ´«²¼ÆäËû¶ñÒâÈí¼þ¡£Ballista»î¶¯ÓÚ2025Äê1ÔÂ10ÈÕ±»Cato CTRL¼ì²âµ½ £¬×î½üÒ»´ÎÀûÓó¢ÊÔÔÚ2ÔÂ17ÈÕ¡£¸Ã½©Ê¬ÍøÂçÀûÓöñÒâÈí¼þͶ·ÅÆ÷ºÍshell¾ç±¾»ñÈ¡²¢Ö´ÐÐÖ¸±êϵͳÉϵÄÖ÷¶þ½øÔìÎļþ £¬³ÉÁ¢¼ÓÃܵĺÅÁîºÍ½ÚÔìͨ· £¬Ö´ÐÐRCEºÍDoS¹¥»÷ £¬²¢³¢ÊÔ¶ÁÈ¡Ãô¸ÐÎļþ¡£BallistaÖ§³Ö¶àÖÖºÅÁî £¬Ô̺¬ºéË®¹¥»÷¡¢Æô¶¯Ä  £¿é¡¢ÖÕ³¡Ä  £¿é¡¢ÔËÐÐLinux shellºÅÁîºÍÖÕÖ¹·þÎñµÈ¡£¶ñÒâÈí¼þ¶þ½øÔìÎļþÖеÄC2 IPµØÖ·ºÍÒâ´óÀûÓï×Ö·û´®Åú×¢ÓÐδ֪Òâ´óÀûÍþвÐÐΪÕ߲μÓ¡£È»¶ø £¬¸Ã¶ñÒâÈí¼þÔÚ»ý¼«¿ª·¢ÖÐ £¬ÒѳöÏÖʹÓÃTORÍøÂçÓòµÄÐÂͶ·ÅÆ÷±äÖÖ¡£Ä¿Ç° £¬³¬¹ý6000̨É豸Êܵ½BallistaϰȾ £¬ÖØÒª¼¯ÖÐÔÚ°ÍÎ÷¡¢²¨À¼¡¢Ó¢¹ú¡¢±£¼ÓÀûÑǺÍÍÁ¶úÆäµÈ¹ú £¬Ö¸±êΪÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÖйúºÍÄ«Î÷¸çµÄÔì×÷Òµ¡¢Ò½ÁÆ/±£½¡¡¢·þÎñÒµºÍ¼¼Êõ×éÖ¯¡£Ö»¹ÜÓëÆäËû½©Ê¬ÍøÂçÓÐÀàËÆÖ®´¦ £¬BallistaÈÔÓÐÆä¶À¸öÐÔ¡£


https://thehackernews.com/2025/03/ballista-botnet-exploits-unpatched-tp.html


5. CISAÖҸ棺Ivanti EPMÉ豸·ì϶ÍþвÁª¹ú»ú¹¹ÍøÂ簲ȫ


3ÔÂ11ÈÕ £¬CISAÖÒ¸æÃÀ¹úÁª¹ú»ú¹¹°ÑÎȱ £»¤ÆäÍøÂç £¬·À±¸Õë¶ÔIvanti Endpoint Manager (EPM) É豸µÄÈý¸öÑϳÁ·ì϶£¨CVE-2024-13159¡¢CVE-2024-13160ºÍCVE-2024-13161£©µÄ¹¥»÷¡£IvantiÓëÈ«Çò7000¶à¼Ò×éÖ¯ºÏ×÷ £¬Îª40000¶à¼Ò¹«Ë¾ÌṩϵͳºÍIT×ʲúÖÎÀí½â¾ö¹æ»®¡£ÕâЩ·ì϶Óɾø¶Ôõè¾¶±éÀúÈõµãÔì³É £¬¿ÉʹԶ³Ìδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õ߯ëÈ«·ÛËéÒ×Êܹ¥»÷µÄ·þÎñÆ÷¡£ÕâЩ·ì϶ÓÚÈ¥Äê10Ô±»»ã±¨ £¬²¢ÓÚ½ñÄê1ÔÂ13ÈÕ±»Ivanti½¨¸´¡£È»¶ø £¬½öÒ»¸ö¶àÔºó £¬Horizon3.ai°ä²¼Á˸ÅÏëÑéÖ¤·ì϶ £¬¿ÉÓÃÓÚÖм̹¥»÷ £¬Ð²ÆÈIvanti EPM»úеƾ֤¡£CISAÒѽ«ÕâЩ·ì϶Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ÖÐ £¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÐèÔÚÈýÖÜÄÚ± £»¤ÆäϵͳÃâÊܹ¥»÷¡£CISAÇ¿ÁÒ¶½´ÙËùÓÐ×é֯ʵʱ½¨¸´Ä¿Â¼·ì϶ £¬ÒÔÏ÷¼õÔâ·êÍøÂç¹¥»÷µÄ·çÏÕ¡£×Ô2025ËêÊ×ÒÔÀ´ £¬ÓмäµýÐÐΪÕßÒÑÀûÓÃIvanti·ì϶½øÐй¥»÷¡£


https://www.bleepingcomputer.com/news/security/cisa-tags-critical-ivanti-epm-flaws-as-actively-exploited-in-attacks/


6. °ÍÀèË÷¹ú´óѧÔâÈËΪÖÇÄÜ¿ª·¢µÄFunksecÀÕË÷Èí¼þ¹¥»÷


3ÔÂ10ÈÕ £¬FunksecÀÕË÷Èí¼þ×éÖ¯ÒÔÆä²¿ÊðµÄ¾Ý³ÆÊÇÊ׸öѡȡÌìÉúʽÈËΪÖÇÄÜ£¨GenAI£©µÄÀÕË÷Èí¼þ¶øÎÅÃû £¬×î½ü¸Ã×éÖ¯Ðû³Æ¹¥ÆÆÁ˺¹ÇàÓÆ¾ÃµÄ°ÍÀèË÷¹ú´óѧ £¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Éϰ䲼Á˾ݳƴӸÃУ·þÎñÆ÷ÇÔÈ¡µÄ20GBÎļþµÄÐÅÏ¢ £¬´ÍÓëѧÌùÙԱԼĪ12Ì칦·òÖ§¸¶Î´¹«¿ªµÄÊê½ð¡£Ë÷¹ú´óѧÊÇÒ»ËùÕ¼ÓÐ55,000ÃûѧÉúºÍÊýǧÃû×êÑм°ÐÐÕþÈËÔ±µÄ¹«Á¢´óѧ £¬´ËÇ°Ò²ÔøÔâ·ê¹ý³Á´óºÚ¿Í¹¥»÷¡£Funksec×Ô2024Äê11Ô¹«¿ª³öÏÖÒÔÀ´ £¬Ò»ÏòÔÚ¼Ó´ó¹¥»÷´ÎÊý £¬ÖØÒªÕë¶ÔÃÀ¹ú¡¢Ó¡¶È¡¢Î÷°àÑÀºÍÃɹÅÈ·µ±¾ÖºÍ¹ú·À¡¢¼¼Êõ¡¢½ðÈںͽÌÓýÁìÓò¡£¸Ã×é֯ʹÓÃÈËΪÖÇÄÜ¿ª·¢ÀÕË÷Èí¼þ £¬±»ÁÐΪ´ÓǰÖÜΧÄÚ×î»îÔ¾µÄÎå´óÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£´Ë±í £¬Funksec»¹³ÉÁ¢ÁËÒ»¸öÔ̺¬ÅÄÂôÍøÕ¾¡¢Êг¡ºÍ»áÉÌÂÛ̳ÔÚÄ򵀮ëÈ«Éú̬ϵͳ £¬ÖÂÁ¦ÓÚÈÃÕâ¸öÊг¡³ÉΪTorÍøÂçÖÐ×îºÃµÄ¡£


https://cybernews.com/news/sorbonne-university-paris-claim-funksec-ai-ransomware-attack/