FogÀÕË÷Èí¼þÀûÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß

°ä²¼¹¦·ò 2025-04-22

1. FogÀÕË÷Èí¼þÀûÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß


4ÔÂ22ÈÕ£¬FogÀÕË÷Èí¼þÔËÓªÉ̽üÆÚʹÓÃDOGEÖ÷ÌâÀÕË÷Ðų°·íÊܺ¦Õߣ¬ÌṩÃâ·Ñ½âÃÜÃÜÔ¿ÒÔ»»È¡¶ñÒâÈí¼þ´«²¼¡£ÓëÔçÆÚÒÀ¸½±»µÁVPNƾ֤·ÖÆç£¬×îй¥»÷ʼÓÚÔ̺¬¡°Pay Adjustment.zip¡±µÄÍøÂç´¹µöÓʼþ£¬ÄÚº¬¶ñÒâLNKÎļþ£¬µã»÷ºó´¥·¢Ò»ÏµÁвÙ×÷½«ÀÕË÷Èí¼þÖ²Èëϵͳ¡£Ç÷Ïò¿Æ¼¼×êÑÐÈËÔ±³Æ£¬×Ô½ñÄê1ÔÂÒÔÀ´£¬¸ÃÈí¼þÒÑϰȾ100ÃûÊܺ¦Õߣ¬2Ô·Ý×î¶à£¬Îª53ÈË  £»×Ô2024Äê6ÔÂÒÔÀ´£¬ÔÚ¿Í»§Öмì²âµ½173ÆðÓйØÀÕË÷»î¶¯¡£ÎÞÊýÊܺ¦ÕßÀ´×ԿƼ¼¡¢Ôì×÷¡¢½ÌÓýºÍ½»Í¨ÔËÊäÐÐÒµ¡£Ð¹¥»÷ÖУ¬¶ñÒâLNKÎļþÏÂÔØPowerShell¾ç±¾£¬¼ìË÷ÀÕË÷Èí¼þÏÂÔØ·¨Ê½¼°¶à¸öÆäËû¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ¡£ÕâЩ¾ç±¾Ô̺¬ÍøÂçϵͳÐÅÏ¢¡¢ºáÏòÒÆ¶¯¹¤¾ß¼°´ò¿ª¶þάÂëµÄ¾ç±¾£¬Êܺ¦Õß¿ÉÓøöþάÂëÖ§¸¶Êê½ð¡£³õʼPowerShell¾ç±¾»¹´ò¿ªÕþÖÎÖ÷ÌâYouTubeÊÓÆµ²¢Ô̺¬ÊéÃæÕþÖÎÆÀÂÛ¡£³õʼÊê½ð֪ͨÌá¼°DOGE£¬ÉõÖÁDOGE¹¤×÷ÈËÔ±£¬ÒªÇóÊܺ¦ÕßÁгöÎåÏ×÷£¬²»È»Ö§¸¶Ò»ÍòÒÚÃÀÔªÊê½ð¡£ÍþвÕß°µÊ¾£¬ÈôÊܺ¦Õß½«¶ñÒâÈí¼þ·¢Ë͸øËûÈË£¬¼´¿ÉÃâ·Ñ½âÃÜϵͳ¡£FogÀÕË÷Èí¼þÊÇÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼Ò×壬ÆóÒµ±ØÐ뽫ÆäÔö³¤µ½¼à¿ØÁбíÖС£


https://www.darkreading.com/cyberattacks-data-breaches/fog-hackers-doge-ransom-notes


2. RustoBot½©Ê¬ÍøÂçÀûÓ÷ÓÉÆ÷·ì϶·¢Æð¹¥»÷


4ÔÂ22ÈÕ£¬FortiGuard Labs½üÆÚ·¢ÏÖRustoBot£¬ÕâÒ»ÓÃRust±àдµÄ¸´ÔÓ½©Ê¬ÍøÂçÕýÀûÓÃTOTOLINKºÍDrayTek·ÓÉÆ÷·ì϶£¬ÔÚÈÕ±¾¡¢Ì¨Íå¡¢Ô½ÄϺÍÄ«Î÷¸çµÄ¼¼Êõ»ù´¡ÉèÊ©ÖÐËÁŰ¡£2025ËêÊ×£¬¹¥»÷³¢ÊÔ¼±¾çÔö³¤£¬Ö¸±êÖ±Ö¸TOTOLINK cstecgi.cgi¾ç±¾Öеij־÷ì϶£¬ÕâЩ·ìÏ¶Éæ¼°ÅäÖøü¸ÄºÍÉí·ÝÑéÖ¤£¬´æÔÚ¶à¸öºÅÁî×¢Èëµã£¬Ô̺¬CVE-2022-26210¡¢CVE-2022-26187ÒÔ¼°Ó°ÏìDrayTek·ÓÉÆ÷µÄCVE-2024-12987¡£ÕâЩÈõµãʹ¹¥»÷Õß»ñµÃÔ¶³Ì´úÂëÖ´ÐÐÄÜÁ¦£¬ÎªRustoBotϰȾ̯ƽ··¡£Ò»µ©»ñµÃ³õʼ½Ó¼ûȨÏÞ£¬RustoBot±ãͨ¹ýËĸöÏÂÔØ¾ç±¾Ö®Ò»½øÐв¿Êð£¬Ö§³Ö¶àÖּܹ¹£¬È·±£ÓëÒ×Êܹ¥»÷µÄ·ÓÉÆ÷¿í·º¼æÈÝ¡£Æä¹ÖÒìÖ®´¦ÔÚÓÚʹÓÃRust˵»°£¬¶þ½øÔì½á¹¹Í¨¹ýXOR¼ÓÃܺÍGOT²Ù×÷½øÐлìºÏ£¬ÊµÏÖÒþÉíÐÔ£¬²¢Ê¹ÄæÏò¹¤³Ì¸´ÔÓ»¯¡£½âÃܺóµÄÅäÖýÒʾ£¬RustoBotÖ´ÐÐÁ½ÏîÖ÷Ìâ¶ñÒâ²Ù×÷£º½âÎö¶à¸öC2ÓòÃû£¬²¢Æ¾¾ÝºÅÁîÌáÒéDDoS¹¥»÷¡£RustoBot»î¶¯ÒÑÓ°Ïì¶à¿îTOTOLINKºÍDrayTek·ÓÉÆ÷ÐͺÅ£¬Êܺ¦ÕßÖØÒªÎ»ÓڿƼ¼ÁìÓò£¬Åú×¢¹¥»÷¿ÉÄÜÓµÓÐÕë¶ÔÐÔ¡£


https://securityonline.info/rustobot-botnet-exploits-router-flaws-in-sophisticated-attacks/


3. WordPress¸æ°×ڲƭ²å¼þÿÌì²úÉú14ÒÚ¸ö¸æ°×ÒªÇó


4ÔÂ21ÈÕ£¬½üÈÕ£¬Ò»¸öÃûΪ¡°Scallywag¡±µÄ´ó¹æÄ£¸æ°×ڲƭ×éÖ¯¸¡³öË®Ãæ£¬¸Ã×é֯ͨ¹ý¶¨ÔìWordPress²å¼þ£¬½«µÁ°æºÍURLËõ¶ÌÍøÕ¾Ç®±Ò»¯£¬ÖðÈÕ²úÉúÊýÊ®ÒÚ¸öڲƭҪÇó¡£ScallywagÓÉ»úеÈ˺Íڲƭ¼ì²â¹«Ë¾HUMAN·¢ÏÖ£¬Æä±³ºóÊÇÒ»¸öÓÉ407¸öÓòÃû×é³ÉµÄÖØ´óÍøÂ磬ÖðÈÕڲƭ¸æ°×ÒªÇó·åÖµ¸ß´ï14ÒÚÌõ¡£Ö»¹ÜHUMAN²ÉÈ¡´ëʩʹScallywagÁ÷Á¿Ï÷¼õ95%£¬µ«¸Ã×é֯ͨ¹ýÂÖ»»ÓòÃûºÍµ÷ÕûÇ®±Ò»¯Ä£Ê½Õ¹Ê¾³ö׳´óÈÍÐÔ¡£Scallywag»ùÓÚËĸöWordPress²å¼þ¹¹½¨£¬Ô̺¬Soralink¡¢Yu Idea¡¢WPSafeLinkºÍDroplink£¬ÎªÍøÂç·¸×ï·Ö×ÓÌṩ´Ó¸ß·çÏÕ¡¢µÍÖÊÁ¿ÍøÕ¾Ó®ÀûµÄõè¾¶¡£ÕâЩ²å¼þ½µµÍÁËDZÔÚÍþвÐÐΪÕߵĽøÈëÃż÷£¬ÉõÖÁÓÐÈËÔÚYouTubeÉϰ䲼²Ù×÷½Ì³Ì¡£Óû§½Ó¼ûµÁ°æÄ¿Â¼ÍøÕ¾Ê±£¬µã»÷ǶÈëµÄURLËõ¶ÌÁ´½Ó£¬»á±»³Á¶¨ÏòÖÁÖÐÑë¸æ°×Ãܼ¯Ò³Ã棬ΪScallywagÔËÓªÉ̲úÉúڲƭÐÔÓ¡Ïó£¬×îÖÕ½øÈë³ÐŵÄÚÈݵÄÒ³Ãæ¡£ÕâЩÖÐÑëÍøÕ¾ÔËÐÐScallywag²å¼þ£¬Õƹܴ¦ÖóÁ¶¨ÏòÂß¼­¡¢¸æ°×¼ÓÔØµÈ£¬ÒÔÔÚ¸æ°×ƽ̨²é³­ÖмÙ×°³ÉÕý³£²©¿Í¡£HUMANͨ¹ý¶ÈÎöÁ÷Á¿Ä£Ê½¼ì²âScallywag»î¶¯£¬²¢Óë¸æ°×ÌṩÉ̺Ï×÷ÖÕ³¡¶Ô¸æ°×ÒªÇóµÄ¾º±ê£¬¶Â½ØÆäÊÕÈëÆðÔ´¡£


https://www.bleepingcomputer.com/news/security/scallywag-ad-fraud-operation-generated-14-billion-ad-requests-per-day/


4. ÐÂÐͶñÒâÈí¼þResolverRATÍþвҽÁÆÓëÔìÒ©ÐÐÒµ


4ÔÂ21ÈÕ£¬MorphisecÍþв³¢ÊÔÊÒ·¢ÏÖÁËÒ»ÖÖÐÂÐ͸´ÔÓ¶ñÒâÈí¼þResolverRAT£¬¸Ã¶ñÒâÈí¼þÕý»ý¼«Õë¶ÔÒ½ÁƱ£½¡ºÍÔìÒ©ÐÐÒµ·¢Õ¹¹¥»÷£¬×î½üÒ»²¨¹¥»÷¼¯ÖÐÔÚ2025Äê3ÔÂ10ÈÕ×óÓÒ¡£ResolverRATƾ½èÆäÏȽøµÄ¼¼Êõ¼¿Á©£¬ÈçÄÚ´æÖ´ÐÓ×¢¶¯Ì¬×ÊÔ´´¦Öü°¶à²ã¶ã±Ü¼¼Êõ£¬Ê¹µÃ´«Í³¼ì²â²½ÖèÄÑÒÔ¼ûЧ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¾«ÐÄÉè¼ÆµÄ´¹µöÓʼþ´«²¼£¬ÀûÓýôÆÈ¸Ð»òÕ𾪸ÐÓÕµ¼ÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó£¬½ø¶ø´¥·¢Ï°È¾¹ý³Ì¡£¹¥»÷¸ß¶È±¾µØ»¯£¬Óʼþѡȡָ±ê¹ú¶ÈĸÓï׫д£¬Ö÷ÌâÉæ¼°Ë¾·¨µ÷²é»ò°æÈ¨ÇÖȨ£¬Ö¼ÔÚͨ¹ý¸öÐÔ»¯¶¨Î»Ìá¸ßϰȾ³É¹¦ÂÊ¡£Ï°È¾Ê¼ÓÚDLL²àÔØ¼¼Êõ£¬½«¶ñÒâDLLÎļþÓëºÏ·¨·¨Ê½£¨Èç hpreader.exe£©Ò»Æð¸éÖ㬵±·¨Ê½Ö´ÐÐʱ£¬¶ñÒâDLL±»ÍµÍµ¼ÓÔØ£¬´Ó¶øÆô¶¯¶ñÒâÈí¼þ¡£ResolverRAT ѡȡ¶à²ã¶ã±Ü¼¼Êõ£¬Ô̺¬´úÂë»ìºÏºÍ×Ô½ç˵ºÍ̸À´»ìºÏÍøÂçÁ÷Á¿£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐжñÒâ´úÂ룬²¢ÔÚÔËÐÐʱ¶¯Ì¬¼ø±ðºÍʹÓÃϵͳº¯Êý¡£ÎªÈ·Î¬ÓƾÃÐÔ£¬ResolverRAT ÔÚ Windows ×¢²á±íÖд´½¨¶à¸öÌõ¿î£¬²¢ÔÚ¶à¸öµØÎ»×°ÖÃ×ÔÉí¸±±¾¡£´Ë±í£¬Ëü»¹Ê¹ÓùÖÒìµÄÖ¤ÊéÑéÖ¤²½ÖèºÍ¡°.NET ×ÊÔ´½âÎöÆ÷½Ù³Ö¡±¼¼ÊõÀ´ÒþÉí£¬²¢³¢ÊÔ¶Ô·ÖÎö»·¾³½øÐÐÖ¸ÎÆ¼ø±ð£¬ÒÔÔÚ¼ì²âµ½±»²é³­Ê±Å¤×ªÐÐΪ¡£


https://hackread.com/native-language-phishing-resolverrat-healthcare/


5. Ú¿Æ­·Ö×Ó¼ÙÒâFBI IC3Ô±¹¤ÇÔÈ¡ÄúµÄ²ÆÕþÐÅÏ¢


4ÔÂ19ÈÕ£¬½üÈÕ£¬FBI°ä²¼Ú¿Æ­¾¯±¨£¬½Òʾڿƭ·Ö×ÓÕý¼ÙÒâFBI»¥ÁªÍø·¸×ïͶËßÖÐÐÄ(IC3)ÈËÔ±£¬ÒÔ×·»ØËðʧ×ʽðΪµö¶ü£¬ÇÔÈ¡Êܺ¦Õß²ÆÕþÐÅÏ¢¡£×Ô2023Äê12ÔÂÖÁ2025Äê2Ô£¬FBIÒÑÊÕµ½100¶àÆðÓйػ㱨¡£Ú¿Æ­Õß³£¶Ô×¼ÍøÂç½ðÈÚÚ¿Æ­Êܺ¦ÕßµÄÉç½»ÍøÂç»òÔÚÏßÂÛ̳£¬ÓÐʱ¼ÙÒâÕæÊµÉí·Ý»òʹÓÃÐéαƾ֤¡£ËùÓÐȦÌ×¾ùÉæ¼°ÒÔijÖÖ´ó¾ÖÔ®ÊÖÊܺ¦Õß×·»ØËðʧ£¬Ö»¹Ü×î³õÁªÏµ·½Ê½¸÷±ð£¬Ô̺¬µç×ÓÓʼþ¡¢µç»°¡¢É罻ýÌå»òÂÛ̳¡£ÔÚijЩ°¸ÀýÖУ¬Ú¿Æ­ÕßÉõÖÁÐû³ÆÃÔʧ×ʽð¾ÍÔÚËûÃÇÊÖÖС£ËûÃÇͨ¹ý´´½¨ÐéαÓ×ÎÒ×ÊÁÏ£¬²ÎÓëÔÚÏß½ðÈÚÚ¿Æ­ÍŻ²¢½¨ÒéÊܺ¦ÕßÁªÏµ¼ÙðµÄIC3¡°Ê×ϯִÐй١±»ñȡԮÊÖ¡£Ò»µ©Êܺ¦ÕßÖмÆ£¬Ú¿Æ­Õß±ãÐû³ÆÒѸ´Ô­×ʽ𣬲¢½è´Ë»ñÈ¡Æä²ÆÕþÐÅÏ¢¡£FBI°µÊ¾£¬ÕâЩ´òËã²»½öºýŪºÍÚ¿Æ­Ö¸±ê£¬»¹Ê¹ËûÃÇÔٴγÉΪÊܺ¦Õß¡£Îª·À±¸´ËÀàÚ¿Æ­£¬FBIÌáÐѹ«¼Ò£¬IC3¾ø²»»áͨ¹ýµç»°¡¢µç×ÓÓʼþ¡¢É罻ýÌåµÈÖ±½ÓÓëÓ×ÎÒ¹µÍ¨£¬Ò²²»»áÒªÇ󸶿îÀ´×·»ØËðʧ×ʽ𣬸ü²»»á½«Êܺ¦Õßת½é¸øÒªÇ󸶿îµÄ¹«Ë¾¡£¹«¼ÒÓ¦Ìá¸ß¾¯Ì裬ÇÐÎðÓë½öÔÚÍøÉÏ»òµç»°ÖÐÒâʶµÄÈË·ÖÏíÃô¸ÐÐÅÏ¢»ò·¢ËͲƲ¯¡£ÈçÐè¾Ù±¨ÍøÂçڲƭ£¬¿É½Ó¼ûFBI»¥ÁªÍø·¸×ïͶËßÖÐÐĹÙÍø¡£


https://cybernews.com/security/fbi-alert-ic3-impersonation-scam-recover-lost-funds-steal-financial-info/


6. ºÚ¿ÍÀûÓÃGoogleϵͳÈõµãÖ´ÐÐDKIM³Á·ÅÍøÂç´¹µö¹¥»÷


4ÔÂ20ÈÕ£¬½üÈÕ£¬ºÚ¿ÍÀûÓÃGoogleϵͳÈõµã£¬ÌáÒéÁËÒ»³¡ÆæÃîµÄÍøÂç´¹µö¹¥»÷¡£¹¥»÷Õßͨ¹ý·¢ËÍÒ»·â¿´ËÆÀ´×Ô¡°no-reply@google.com¡±µÄÐéαµç×ÓÓʼþ£¬³É¹¦ÈƹýËùÓÐÑéÖ¤£¬Ö¸ÏòÒ»¸öÍøÂçµÇ¼ÐÅÏ¢µÄÚ²Æ­Ò³Ãæ¡£¸ÃÓʼþ²»½öͨ¹ýÁËDKIMÉí·ÝÑéÖ¤£¬ÇÒÄÚÈÝÏÕЩÓë¹È¸è¹Ù·½°²È«¾¯±¨ÎÞÒ죬¼«Ò׺ýŪ¼¼Êõˮƽ½ÏµÍµÄÓû§¡£È»¶ø£¬ENSÊ×ϯ¿ª·¢ÈËÔ±Äá¿Ë¡¤Ô¼º²Ñ·Ãô¸ÐµØ·¢ÏÖ£¬Ðéα֧³ÖÃÅ»§ÍйÜÔÚsites.google.comÉÏ£¬¶ø·ÇÕæÕýµÄaccounts.google.com£¬´Ó¶øÊ¶ÆÆÁËȦÌס£¹¥»÷Õ߯æÃîµØ×¢²áÁËÒ»¸öÓòÃû£¬²¢ÒÔ¡°me@domain¡±´´½¨GoogleÕÊ»§£¬Ëæºó´´½¨ÁËÒ»¸öGoogle OAuthÀûÓ㬽«´¹µöÓʼþ¶¨ÃûΪ¸ÃÀûÓᣵ±¹¥»÷ÕßÊÚÓèÆäOAuthÀûÓýӼûGoogle WorkspaceÖеç×ÓÓʼþµØÖ·µÄȨÏÞʱ£¬Google×Ô¶¯·¢ËÍÁ˰²È«¾¯±¨£¬¸Ã¾¯±¨ÒòʹÓÃÓÐЧµÄDKIMÃÜÔ¿ÊðÃû¶øÍ¨¹ýÁËËùÓв鳭¡£¹¥»÷ÕßËæºó½«°²È«¾¯±¨×ª·¢¸øÊܺ¦Õߣ¬Ê¹Æä¿´ÆðÀ´ÏñÊÇÀ´×ԹȸèµÄºÏ·¨Óʼþ¡£´Ë±í£¬¹¥»÷Õß»¹ÀûÓÃÁËGoogleϵͳµÄÈõµã£¬¼´DKIM½ö²é³­ÓʼþÕýÎĺÍÓʼþÍ·£¬¶ø²»²é³­Ðŷ⣬ʹµÃαÔìÓʼþ¿ÉÄÜͨ¹ýÊðÃûÑéÖ¤¡£Ä¿Ç°£¬¹È¸èÒÑÒâʶµ½OAuthµÄÈõµã£¬²¢ÔÚÖÂÁ¦½¨¸´¡£


https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/