ÐÂÐÍCrocodilus¶ñÒâÈí¼þÇÔÈ¡AndroidÓû§¼ÓÃÜÇ®°üÃÜÔ¿
°ä²¼¹¦·ò 2025-03-311. ÐÂÐÍCrocodilus¶ñÒâÈí¼þÇÔÈ¡AndroidÓû§¼ÓÃÜÇ®°üÃÜÔ¿
3ÔÂ30ÈÕ£¬Ð·¢ÏÖµÄAndroidÒøÐжñÒâÈí¼þ"Crocodilus"ͨ¹ýÕûºÏÉç»á¹¤³Ìѧ¹¥»÷Óë¸ß¼¶ÉøÈë¼¼Êõ£¬Õ¹Ê¾³ö¶Ô¼ÓÃÜÇ®±ÒÇ®°ü¼°½ðÈÚÕË»§µÄÑϳÁÍþв¡£¸Ã¶ñÒâÈí¼þÀûÓÃרÓÐÖ²ÈëÆ÷ÈÆ¹ýAndroid 13¼°ÒÔÉϰ汾µÄ°²È«»úÔ죬ͨ¹ý¶ñÒâÍøÕ¾¡¢É罻ڲƻòµÚÈý·½ÀûÓÃÉ̵êÖ´ÐгõʼϰȾ¡£Æä¹¥»÷Á´µÄÖ÷ÌâÔÚÓÚÓÕµ¼Óû§Ð¹Â¶¼ÓÃÜÇ®°üµÄ"ÖÖ×Ó¶ÌÓï"£¬¹¥»÷Õßͨ¹ýαÔìϵͳÖÒ¸æ½çÃæ£¬¶½´ÙÓû§ÔÚ12Ó×ʱÄÚ±¸·ÝÇ®°üÃÜÔ¿£¬ÊµÔòÀûÓø¨ÖúÖ°ÄÜ·þÎñ¼Í¼Óû§ÊäÈëÐÅÏ¢£¬½ø¶øÆëÈ«½ÚÔìÊý×Ö×ʲú¡£¼¼Êõ·ÖÎöÏÔʾ£¬Crocodilus¾ß±¸ÆëÈ«µÄRAT£¨Ô¶³Ì½Ó¼ûľÂí£©Ö°ÄÜ£¬¿ÉÖ´ÐÐ23ÏîÉ豸½ÚÔìÖ¸ÁÔ̺¬À¹½Ø¶ÌÐÅ¡¢´Û¸ÄÈÏÖ¤Æ÷½ØÍ¼ÇÔȡ˫³É·ÖÁîÅÆ¡¢¸²¸ÇÆÁÄ»½çÃæµÁÈ¡ÒøÐÐÆ¾Ö¤µÈ¡£ÆäÌØÊâÄÜÁ¦ÔÚÓÚ¼¤»îºÚÆÁ¾²Ä¬Ä£Ê½°µ²Ø¹¥»÷ÐÐΪ£¬Í¬Ê±ÀÄÓø¨ÖúÖ°ÄÜ·þÎñÍ»ÆÆÎÞ×è°È¨ÏÞÏÞ¶È¡£µ±Ç°¹¥»÷Ö¸±ê¼¯ÖÐÓÚÍÁ¶úÆäºÍÎ÷°àÑÀµÄ½ðÈÚÓû§£¬µ«Ä£¿é»¯Éè¼Æ°µÊ¾Æä¾ß±¸¼±¾çÀ©´ó¹¥»÷ÃæµÄDZÁ¦¡£°²È«×¨¼Ò½¨ÒéÓû§Ó¦Ñϸñ×ñѹٷ½ÀûÓÃÉ̵êÏÂÔØ×¼Ôò£¬Î¬³ÖPlay Protectʵʱ·À»¤£¬²¢¶ÔÒªÇóÌṩÃô¸ÐÐÅÏ¢µÄÒ쳣ϵͳÌáÐÑά³Ö¾¯Ìè¡£
https://www.bleepingcomputer.com/news/security/new-crocodilus-malware-steals-android-users-crypto-wallet-keys/
2. Oracle Health¾É·þÎñÆ÷ÔâÈëÇÖÖÂÃÀ¶à¼ÒÒ½Ôº»¼ÕßÊý¾Ýй¶
3ÔÂ28ÈÕ£¬³ÛÃûÒ½ÁÆÐÅÏ¢»¯·þÎñÉÌOracle Health£¨Ç°ÉíΪCerner£©È·ÈÏÆäÒÅÁô·þÎñÆ÷ÔâδÊÚȨ½Ó¼û£¬µ¼Ö¶à¼ÒÃÀ¹úÒ½ÁÆ»ú¹¹»¼ÕßÊý¾Ýй¶¡£¾Ýµ÷²é£¬¹¥»÷ÕßÀûÓÃй¶µÄ¿Í»§Æ¾Ö¤ÓÚ2025Äê1ÔÂÈëÇÖδǨáãÖÁOracle CloudµÄ¾É°æCerner·þÎñÆ÷£¬ÇÔÈ¡ÁË¿ÉÄÜÔ̺¬µç×Ó½¡È«¼Í¼£¨EHR£©µÄÃô¸ÐÐÅÏ¢¡£Ö»¹ÜOracleÔÚ˽ÃÜ֪ͨÖнö±íÊöΪ"²¿ÃÅÊý¾ÝÊÜÓ°Ïì"£¬µ«¶à¸öÐÂÎÅԴ֤ʵ»¼ÕßÐÅϢȷÒѱ»µÁ¡£Õâ´ÎÊÂÎñ¶³öOracleÔÚΣ»ú´¦ÖÃÖеÄͨÃ÷¶È²»¼°£ºÊÜÓ°ÏìÒ½ÔºÊÕµ½µÄ֪ͨѡȡͨ³£°×Ö½¶ø·Ç¹Ù·½Ðż㣬ÇÒ¹«Ë¾Î´¹«¿ªÈϿɰ²È«Î¥¹æ¡£¸üÒý·¢¹Ø×¢µÄÊÇ£¬ÍþвÐÐΪÕß"°²µÂ³"ͨ¹ýÃ÷ÍøÍøÕ¾Ö´ÐÐÀÕË÷£¬ÒªÇóÊý°ÙÍòÃÀÔª¼ÓÃÜÇ®±ÒÒÔ×èÖ¹Êý¾Ý¹«¿ª£¬Æä¹¥»÷ÊÖ·¨ÓëÒÑÖªÀÕË÷ÍÅ»ïÎÞ¹ØÁª¡£Ò½ÁÆ»ú¹¹±»ÆÈ×ÔÐÐÆÀ¹ÀÊÇ·ñÎ¥·´HIPAAÂÉÀý²¢³Ðµ£»¼Õß֪ͨÔðÈΣ¬¶øOracle½öÌṩÓÐÏÞÐÖúÄ£°åºÍÓöÈÅâ³¥¡£¼¼Êõϸ½ÚÏÔʾ£¬¹¥»÷Õß½«µÁÈ¡Êý¾Ý×ªÒÆÖÁÔ¶³Ì·þÎñÆ÷£¬Æä×÷°¸ÊÖ·¨Óë½üÆÚOracle Cloud½áºÏµ¥µãµÇ¼£¨SSO£©·þÎñÆ÷ÔâÈëÇÖÊÂÎñ´æÔÚDZÔÚ¹ØÁª¡£´ËǰÍþвÕßÔøÐû³ÆÇÔÈ¡600ÍòÌõLDAPÈÏÖ¤Êý¾Ý£¬Ö»¹ÜOracle¹Ù·½·ñ¶¨£¬µ«¿Í»§ÑéÖ¤Ñù±¾Ö¤ÊµÊý¾ÝÓÐЧÐÔ¡£°²È«×¨¼ÒÖ¸³ö£¬OracleÔÚ´¦ÖÃÁ½ÆðÊÂÎñÖеÄÐÅÏ¢·â¹ØÕ½Êõ£¬¿ÉÄܼӾçÒ½Áƿͻ§ÔںϹæÓ¦¶ÔºÍ»¼ÕßÐÅÀµ³Á½¨ÖеÄÀ§¾³¡£
https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
3. GrandoreiroľÂíÔÙ·¢È«Çò´¹µö¹¥»÷£¬¼Ùװ˰ÎñÇÔÈ¡½ðÈÚÊý¾Ý
3ÔÂ28ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Forcepoint½üÆÚ°ä²¼µÄÍþвµý±¨ÏÔʾ£¬³Ö¾Ã»îÔ¾µÄGrandoreiroÒøÐÐľÂíÕýͨ¹ýÐÂÐÍÍøÂç´¹µö¹¥ÊƶÔÈ«Çò½ðÈÚϵͳ×é³ÉÑϳÁÍþв¡£¸Ã¶ñÒâÈí¼þ×Ô2016Äê³õ´ÎÏÖÉí°ÍÎ÷ºó£¬Öð²½½«¹¥»÷ÁìÓòÀ©´óÖÁÄ«Î÷¸ç¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀµÈÀÃÀ¼°Å·ÖÞ¹ú¶È£¬²¢ÔÚ2024Äê½øÒ»²½½«Ö¸±êËø¶¨ÑÇÖÞ½ðÈÚ»ú¹¹£¬Ðγɸ²¸Ç1700¼ÒÒøÐм°276¸ö¼ÓÃÜÇ®°üµÄÈ«Çò¹¥»÷ÍøÂç¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Grandoreiroѡȡ"¶ñÒâÈí¼þ¼´·þÎñ"£¨MaaS£©Ã³Ò×ģʽÔËÓª£¬Æä±³ºóµÄTetrade·¸×OÍż´±ãÔÚ2021ÄêÓë2024ÄêÂŴη¨Âɽø¹¥ÖгÉÔ±Ôâ²¶£¬ÈÔ³ÖÐø¸üй¥»÷ÊÖ·¨¡£×îй¥»÷»î¶¯ÀûÓÃOVHcloud»ù´¡ÉèÊ©¼Ùװ˰Îñ·£¿î֪ͨ£¬Í¨¹ýMediafireƽ̨·Ö·¢µÄPDFÎĵµ¼ÓÔØ¶ñÒâÔØºÉ£¬Êܺ¦ÕßÊÕµ½µÄ»ìºÏÐÍVisual Basic¾ç±¾ÓëÐéαDelphi¿ÉÖ´ÐÐÎļþ£¬¿ÉÇÔÈ¡ÕË»§Æ¾Ö¤²¢Í¨¹ý¼ÓÃÜѹËõÎļþ¶ã±Ü°²È«¼ì²â¡£¼¼Êõ²ãÃæ£¬¸ÃľÂíչʾ³ö¸ß¶ÈÄ£¿é»¯µÄ¹¥»÷ÌØµã£ºÖ´Ðк󲻽öÇÔÈ¡Óû§Æ¾Ö¤£¬»¹»áɨÃè±ÈÌØ±ÒÇ®°üõè¾¶²¢Óë¹¥»÷Õß½ÚÔìµÄcontaboserver[.]net×ÓÓòÃû³ÉÁ¢C&CͨѶ£¬Í¨¹ýƵÈÔ¸ü»»×ÓÓòÃûÓòÃûÀ´ÌÓ±Ü×·×Ù¡£Forcepoint³ö¸ñÇ¿µ÷£¬¹¥»÷ÕßÕýÀûÓúϷ¨ÍйܷþÎñContaboµÄŵÑÔÖ´Ðз¸×͹ÏÔÁËÍøÂç·¸×ïÁ´ÌõÖлù´¡ÉèÊ©ÀÄÓõÄÐÂÇ÷Ïò¡£
https://www.securityweek.com/fresh-grandoreiro-banking-trojan-campaigns-target-latin-america-europe/
4. Twitter(X)ÉæÏÓÄÚ²¿ÈËÔ±²Ù×÷µ¼ÖÂ28ÒÚÓ×ÎÒ×ÊÁÏÊý¾Ýй¶
3ÔÂ29ÈÕ£¬É罻ýÌåÆ½Ì¨X£¨ÔTwitter£©Ôâ·êÊ·ÉÏ×î´ó¹æÄ£Óû§Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°¸ß´ï28ÒÚÓû§ÐÅÏ¢£¬µ«¸Ã¹«Ë¾ÖÁ½ñδ×÷¹Ù·½»ØÓ¦¡£°²È«ÉçÇøBreach ForumsÉÏ£¬Óû§ThinkingOne°ä²¼ÉêÃ÷³Æ£¬Õâ´Îй¶ԴÓÚX¹«Ë¾²ÃÔ±ÆÚ¼äijԱ¹¤µÄ²»ÂúÐÐΪ£¬²¢ÌṩÁËÔ̺¬400GBÔʼÊý¾ÝµÄÖ¤¾Ý¡£Õâ´ÎÊÂÎñÓë2023Äêй¶ÐγÉÏÊÃ÷¶Ô±È¡£2023ÄêÁäÎñÉæ¼°2.09ÒÚÓû§£¬ÖØÒªÂ¶³öµç×ÓÓʼþ¡¢Óû§ÃûµÈ¹«¿ªÐÅÏ¢£¬X¹«Ë¾ÆäʱÒÔ"ÎÞÃô¸ÐÊý¾Ý"ΪÓɵ»¯Ó°Ïì¡£¶ø2025Äêй¶Ëä²»º¬µç×ÓÓʼþ£¬È´Ô̺¬Óû§ID¡¢ÕË»§´´½¨ÈÕÆÚ¡¢µØÀíµØÎ»¡¢ÍÆÎĺ¹ÇàµÈ¶¯Ì¬ÔªÊý¾Ý£¬ÄÚÈݹ¹½¨ÁËÓû§ÐÐΪµÄȫά¶È»Ïñ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ThinkingOne½«Á½´Îй¶Êý¾Ý¹é²¢ÌìÉú34GBÊý¾Ý¼¯£¬µ¼Ö¹«¼ÒÎóÅÐ2025Äêй¶Ô̺¬ÓʼþÐÅÏ¢¡£ÏÖʵÉÏ£¬ÓʼþÊý¾Ý½öÀ´×Ô2023ÄêÁäÎñ¡£ÕâÖÖ»ìºÏ²Ù×÷·Å´óÁËÊÂÎñÓ°Ï죬Òý·¢¶ÔÊý¾ÝÆëÈ«ÐÔµÄÖÊÒÉ¡£¹ØÓÚ28ÒÚÓû§µÄÒì³£Êý×Ö£¬°²È«×¨¼ÒÖ¸³ö¿ÉÄÜ´æÔÚ¶à³Áͳ¼ÆÎó²î£ºÔ̺¬ÒÑɾ³ýÕË»§¡¢»úеÈËÕ˺š¢API·þÎñÕ˺ŵȷÇÕæÊµÓû§ÊµÌ壬»òÊǺ¹ÇàÊý¾Ýµþ¼Óµ¼Ö³Á¸´¼ÆÊý¡£´Ë±í£¬ThinkingOneµÄÊý¾ÝÆðÔ´ÈÔ´æÒÉ£¬ÆäÉí·Ý¸ü×óÌ»Êý¾Ý·ÖÎöʦ¶ø·Ç´«Í³ºÚ¿Í£¬Æä»ñÈ¡õè¾¶¿ÉÄÜÉæ¼°ÄÚ²¿Ð¹ÃÜ»ò¸´ÔÓµÄÊý¾Ý¾ÛºÏ¡£
https://hackread.com/twitter-x-of-2-8-billion-data-leak-an-insider-job/
5. ɽķ»áÔ±µêµ÷²éClopÀÕË÷Èí¼þ£¬ÁãÈÕ·ì϶ÍþвÊý¾Ý°²È«
3ÔÂ28ÈÕ£¬ÎÖ¶ûÂêÆìϲִ¢ÁãÊÛ¾Þͷɽķ»áÔ±É̵꣨Sam's Club£©ÕýÃæ¶ÔClopÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖÖ¸¿Ø£¬¸Ã×éÖ¯ÒÑÔÚÆä°µÍøÐ¹ÃÜÆ½Ì¨°ä²¼ÓйØÌõ¿î¡£×÷ΪȫÃÀÕ¼ÓÐ600Óà¼ÒÃŵꡢº£±í¸²¸ÇÖÐÄ«Á½¹úµÄ²Ö´¢Á¬ËøÆóÒµ£¬É½Ä·Õ¼ÓÐ230ÍòÔ±¹¤¼°843ÒÚÃÀÔªÄê½»Ò׶ÆäÐÅÏ¢×ʲú¼ÛֵʹÆä³ÉÎªÍøÂç·¸×ïµÄ¸ß¼ÛÖµÖ¸±ê¡£É½Ä·½²»°ÈË֤ʵÒÑÆô¶¯°²È«ÊÂÎñµ÷²é£¬Ç¿µ÷"¿Í»§Êý¾Ý°²ÂúÊÇÊ×Òª¹ØÇÐ"¡£Ö»¹ÜÆóҵδÅû¶¼¼Êõϸ½Ú£¬µ«ClopÍÅ»ïµÄÖ¸¿ØÄ£Ê½ÏÔʾÆä¹ßÓÃÁãÈÕ·ì϶ִÐй©¸øÁ´¹¥»÷¡ª¡ª½ñËêÊ׸ÃÍÅ»ïÒÑÀûÓÃCleoÎļþ´«ÊäÈí¼þµÄδÅû¶·ì϶£¨CVE-2024-50623£©Ö´Ðдó¹æÄ£Êý¾ÝÇÔÈ¡£¬µ¼ÖÂÎ÷²¿Í¬ÃËÒøÐеÈ4000Óà¼Ò»ú¹¹ÖÐÕС£ÖµµÃ¹Ø×¢µÄÊÇ£¬ClopÕâ´Î¹¥»÷ÓëÈ¥ÄêÕë¶ÔAccellion FTAµÈÎļþ´«ÊäϵͳµÄÁãÈÕ·ì϶ÀûÓÃǧƪһÂÉ£¬·´Ó³³öÆä¶Ô¹Ø¼ü»ù´¡ÉèÊ©µÄ¾«×¼½ø¹¥Õ½Êõ¡£¶øÉ½Ä·²¢·Ç³õ´ÎÔâ·ê°²È«Î£»ú£º2020ÄêÔø²úÉúƾ֤Ìî³ä¹¥»÷£¬ÆÈʹÆóÒµ³ÁÖÃÊýÍò¿Í»§ÃÜÂ룬Æäʱ¹«Ë¾Ç¿µ÷ϵ±í²¿´¹µö»î¶¯ËùÖ¶ø·Çϵͳ±»Í»ÆÆ¡£µ±Ç°µ÷²é½¹µãÔÚÓÚÈ·ÈÏClopÊÇ·ñ³É¹¦ÉøÈëɽķϵͳ£¬ÒÔ¼°ÊÇ·ñÀûÓÃCleo·ì϶ִÐй¥»÷¡£¼øÓÚɽķ»áÔ±Êý¾ÝÔ̺¬Ïû·Ñ¼Í¼µÈÃô¸ÐÐÅÏ¢£¬Ç±ÔÚй¶·çÏÕ¿ÉÄÜÒý·¢´ó¹æÄ£Ú²Æ¼°ºÏ¹æ·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/
6. Morphing Meerkat´¹µö¼´·þÎñÀûÓÃDoHÓëMX¼Í¼¶ã±Ü¼ì²â
3ÔÂ28ÈÕ£¬ÍøÂç·¸×ïÁìÓò½üÆÚ¸¡ÏÖµÄ"Morphing Meerkat"´¹µö¼´·þÎñ£¨PhaaS£©Æ½Ì¨£¬Õ¹Ê¾³ö¸ß¶È¾«ÃܵĹ¥»÷¼¼ÊõÁ´¡£¸Ã×éÖ¯×Ô2020ÄêÆð³ÖÐø»îÔ¾£¬Í¨¹ýDNS over HTTPS£¨DoH£©¼ÓÃܺÍ̸ÓëDNSÓʼþ»¥»»£¨MX£©¼Í¼²éÎʹ¹½¨¶¯Ì¬¹¥»÷»ù´¡ÉèÊ©£¬³É¹¦¶ã±Ü´«Í³°²È«¼à²â¡£×êÑÐÏÔʾ£¬¸ÃÍÅ»ïÔËÓª×ÅÔ̺¬114¸öÆ·ÅÆ·Âðģ°åµÄ´¹µö¹¤¾ß°ü£¬ÀûÓÃiomartºÍHostPapaµÄSMTP·þÎñ·Ö·¢¶à˵»°´¹µöÓʼþ¡£¹¥»÷Óʼþѡȡ"ÕË»§Í£ÓÃ"µÈ´¹Î£Ö÷Ì⣬¹²Í¬·¢¼þÈ˵ØÖ·Î±Ôì¼¼Êõ£¬ÓÕµ¼Êܺ¦Õßµã»÷¶ñÒâÁ´½Ó¡£ºóÐø¹¥»÷Á´¾¹ý¾«ÐÄÉè¼ÆµÄÊ¢¿ª³Á¶¨Ïòõè¾¶£¬Éæ¼°±»ÈëÇÖµÄWordPressÕ¾µã¡¢ÐéαÓòÃû¼°Ãâ·ÑÍйܷþÎñ£¬×îÖÕͨ¹ýGoogle/CloudflareµÄDoH·þÎñ¼ÓÔØ´¹µöÒ³Ãæ¡£¼¼ÊõÍ»ÆÆÌå´Ë¿ÌÆäË«³Á¶ã±ÜÕ½Êõ£ºÒ»·½Ã棬DoH¼ÓÃܲéÎÊʹDNSÁ÷Á¿·ÖÎöʧЧ£»ÁíÒ»·½Ã棬ʵʱ½âÎöÊܺ¦ÕßÓÊÏäÓòµÄMX¼Í¼£¬¶¯Ì¬ÌìÉúÓëÆäÓʼþ·þÎñÉÌÆ¥ÅäµÄ´¹µöÒ³Ãæ¡£¹¥»÷ÕßÉõÖÁÉèÖÃ"ÃÜÂëÃýÎó"ÐéαÌáÐÑ£¬ÓÕÆÓû§³Á¸´Ìύƾ֤£¬²¢Í¨¹ýAJAXÒªÇóÓëPHP¾ç±¾¼´Ê±»Ø´«Êý¾Ý£¬¸¨ÒÔTelegram»úеÈËʵÏÖʵʱÊý¾Ýת·¢¡£·ÀÓù·ÖÎöÖ¸³ö£¬ÆóÒµÓ¦¼ÓÇ¿DNS²ã¹Ü¿Ø£¬ÏÞ¶È·ÇÒµÎñÓйصÄDoHͨѶ£¬×è¶ÏÓë¸æ°×¼¼Êõ¡¢Îļþ¹²ÏíµÈ¸ß·çÏÕ»ù´¡ÉèÊ©µÄ½»»¥¡£
https://www.bleepingcomputer.com/news/security/phishing-as-a-service-operation-uses-dns-over-https-for-evasion/


¾©¹«Íø°²±¸11010802024551ºÅ