FogÀÕË÷Èí¼þÀûÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß
°ä²¼¹¦·ò 2025-04-221. FogÀÕË÷Èí¼þÀûÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß
4ÔÂ22ÈÕ£¬FogÀÕË÷Èí¼þÔËÓªÉ̽üÆÚʹÓÃDOGEÖ÷ÌâÀÕË÷Ðų°·íÊܺ¦Õߣ¬ÌṩÃâ·Ñ½âÃÜÃÜÔ¿ÒÔ»»È¡¶ñÒâÈí¼þ´«²¼¡£ÓëÔçÆÚÒÀ¸½±»µÁVPNƾ֤·ÖÆç£¬×îй¥»÷ʼÓÚÔ̺¬¡°Pay Adjustment.zip¡±µÄÍøÂç´¹µöÓʼþ£¬ÄÚº¬¶ñÒâLNKÎļþ£¬µã»÷ºó´¥·¢Ò»ÏµÁвÙ×÷½«ÀÕË÷Èí¼þÖ²Èëϵͳ¡£Ç÷Ïò¿Æ¼¼×êÑÐÈËÔ±³Æ£¬×Ô½ñÄê1ÔÂÒÔÀ´£¬¸ÃÈí¼þÒÑϰȾ100ÃûÊܺ¦Õߣ¬2Ô·Ý×î¶à£¬Îª53ÈË£»×Ô2024Äê6ÔÂÒÔÀ´£¬ÔÚ¿Í»§Öмì²âµ½173ÆðÓйØÀÕË÷»î¶¯¡£ÎÞÊýÊܺ¦ÕßÀ´×ԿƼ¼¡¢Ôì×÷¡¢½ÌÓýºÍ½»Í¨ÔËÊäÐÐÒµ¡£Ð¹¥»÷ÖУ¬¶ñÒâLNKÎļþÏÂÔØPowerShell¾ç±¾£¬¼ìË÷ÀÕË÷Èí¼þÏÂÔØ·¨Ê½¼°¶à¸öÆäËû¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ¡£ÕâЩ¾ç±¾Ô̺¬ÍøÂçϵͳÐÅÏ¢¡¢ºáÏòÒÆ¶¯¹¤¾ß¼°´ò¿ª¶þάÂëµÄ¾ç±¾£¬Êܺ¦Õß¿ÉÓøöþάÂëÖ§¸¶Êê½ð¡£³õʼPowerShell¾ç±¾»¹´ò¿ªÕþÖÎÖ÷ÌâYouTubeÊÓÆµ²¢Ô̺¬ÊéÃæÕþÖÎÆÀÂÛ¡£³õʼÊê½ð֪ͨÌá¼°DOGE£¬ÉõÖÁDOGE¹¤×÷ÈËÔ±£¬ÒªÇóÊܺ¦ÕßÁгöÎåÏ×÷£¬²»È»Ö§¸¶Ò»ÍòÒÚÃÀÔªÊê½ð¡£ÍþвÕß°µÊ¾£¬ÈôÊܺ¦Õß½«¶ñÒâÈí¼þ·¢Ë͸øËûÈË£¬¼´¿ÉÃâ·Ñ½âÃÜϵͳ¡£FogÀÕË÷Èí¼þÊÇÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼Ò×壬ÆóÒµ±ØÐ뽫ÆäÔö³¤µ½¼à¿ØÁбíÖС£
https://www.darkreading.com/cyberattacks-data-breaches/fog-hackers-doge-ransom-notes
2. RustoBot½©Ê¬ÍøÂçÀûÓ÷ÓÉÆ÷·ì϶·¢Æð¹¥»÷
4ÔÂ22ÈÕ£¬FortiGuard Labs½üÆÚ·¢ÏÖRustoBot£¬ÕâÒ»ÓÃRust±àдµÄ¸´ÔÓ½©Ê¬ÍøÂçÕýÀûÓÃTOTOLINKºÍDrayTek·ÓÉÆ÷·ì϶£¬ÔÚÈÕ±¾¡¢Ì¨Íå¡¢Ô½ÄϺÍÄ«Î÷¸çµÄ¼¼Êõ»ù´¡ÉèÊ©ÖÐËÁŰ¡£2025ËêÊ×£¬¹¥»÷³¢ÊÔ¼±¾çÔö³¤£¬Ö¸±êÖ±Ö¸TOTOLINK cstecgi.cgi¾ç±¾Öеij־÷ì϶£¬ÕâЩ·ìÏ¶Éæ¼°ÅäÖøü¸ÄºÍÉí·ÝÑéÖ¤£¬´æÔÚ¶à¸öºÅÁî×¢Èëµã£¬Ô̺¬CVE-2022-26210¡¢CVE-2022-26187ÒÔ¼°Ó°ÏìDrayTek·ÓÉÆ÷µÄCVE-2024-12987¡£ÕâЩÈõµãʹ¹¥»÷Õß»ñµÃÔ¶³Ì´úÂëÖ´ÐÐÄÜÁ¦£¬ÎªRustoBotϰȾ̯ƽ··¡£Ò»µ©»ñµÃ³õʼ½Ó¼ûȨÏÞ£¬RustoBot±ãͨ¹ýËĸöÏÂÔØ¾ç±¾Ö®Ò»½øÐв¿Êð£¬Ö§³Ö¶àÖּܹ¹£¬È·±£ÓëÒ×Êܹ¥»÷µÄ·ÓÉÆ÷¿í·º¼æÈÝ¡£Æä¹ÖÒìÖ®´¦ÔÚÓÚʹÓÃRust˵»°£¬¶þ½øÔì½á¹¹Í¨¹ýXOR¼ÓÃܺÍGOT²Ù×÷½øÐлìºÏ£¬ÊµÏÖÒþÉíÐÔ£¬²¢Ê¹ÄæÏò¹¤³Ì¸´ÔÓ»¯¡£½âÃܺóµÄÅäÖýÒʾ£¬RustoBotÖ´ÐÐÁ½ÏîÖ÷Ìâ¶ñÒâ²Ù×÷£º½âÎö¶à¸öC2ÓòÃû£¬²¢Æ¾¾ÝºÅÁîÌáÒéDDoS¹¥»÷¡£RustoBot»î¶¯ÒÑÓ°Ïì¶à¿îTOTOLINKºÍDrayTek·ÓÉÆ÷Ðͺţ¬Êܺ¦ÕßÖØÒªÎ»ÓڿƼ¼ÁìÓò£¬Åú×¢¹¥»÷¿ÉÄÜÓµÓÐÕë¶ÔÐÔ¡£
https://securityonline.info/rustobot-botnet-exploits-router-flaws-in-sophisticated-attacks/
3. WordPress¸æ°×ڲƲå¼þÿÌì²úÉú14ÒÚ¸ö¸æ°×ÒªÇó
4ÔÂ21ÈÕ£¬½üÈÕ£¬Ò»¸öÃûΪ¡°Scallywag¡±µÄ´ó¹æÄ£¸æ°×Ú²Æ×éÖ¯¸¡³öË®Ãæ£¬¸Ã×é֯ͨ¹ý¶¨ÔìWordPress²å¼þ£¬½«µÁ°æºÍURLËõ¶ÌÍøÕ¾Ç®±Ò»¯£¬ÖðÈÕ²úÉúÊýÊ®ÒÚ¸öÚ²ÆÒªÇó¡£ScallywagÓÉ»úеÈ˺ÍڲƼì²â¹«Ë¾HUMAN·¢ÏÖ£¬Æä±³ºóÊÇÒ»¸öÓÉ407¸öÓòÃû×é³ÉµÄÖØ´óÍøÂ磬ÖðÈÕڲƸæ°×ÒªÇó·åÖµ¸ß´ï14ÒÚÌõ¡£Ö»¹ÜHUMAN²ÉÈ¡´ëʩʹScallywagÁ÷Á¿Ï÷¼õ95%£¬µ«¸Ã×é֯ͨ¹ýÂÖ»»ÓòÃûºÍµ÷ÕûÇ®±Ò»¯Ä£Ê½Õ¹Ê¾³ö׳´óÈÍÐÔ¡£Scallywag»ùÓÚËĸöWordPress²å¼þ¹¹½¨£¬Ô̺¬Soralink¡¢Yu Idea¡¢WPSafeLinkºÍDroplink£¬ÎªÍøÂç·¸×ï·Ö×ÓÌṩ´Ó¸ß·çÏÕ¡¢µÍÖÊÁ¿ÍøÕ¾Ó®ÀûµÄõè¾¶¡£ÕâЩ²å¼þ½µµÍÁËDZÔÚÍþвÐÐΪÕߵĽøÈëÃż÷£¬ÉõÖÁÓÐÈËÔÚYouTubeÉϰ䲼²Ù×÷½Ì³Ì¡£Óû§½Ó¼ûµÁ°æÄ¿Â¼ÍøÕ¾Ê±£¬µã»÷ǶÈëµÄURLËõ¶ÌÁ´½Ó£¬»á±»³Á¶¨ÏòÖÁÖÐÑë¸æ°×Ãܼ¯Ò³Ã棬ΪScallywagÔËÓªÉ̲úÉúÚ²ÆÐÔÓ¡Ïó£¬×îÖÕ½øÈë³ÐŵÄÚÈݵÄÒ³Ãæ¡£ÕâЩÖÐÑëÍøÕ¾ÔËÐÐScallywag²å¼þ£¬Õƹܴ¦ÖóÁ¶¨ÏòÂß¼¡¢¸æ°×¼ÓÔØµÈ£¬ÒÔÔÚ¸æ°×ƽ̨²é³ÖмÙ×°³ÉÕý³£²©¿Í¡£HUMANͨ¹ý¶ÈÎöÁ÷Á¿Ä£Ê½¼ì²âScallywag»î¶¯£¬²¢Óë¸æ°×ÌṩÉ̺Ï×÷ÖÕ³¡¶Ô¸æ°×ÒªÇóµÄ¾º±ê£¬¶Â½ØÆäÊÕÈëÆðÔ´¡£
https://www.bleepingcomputer.com/news/security/scallywag-ad-fraud-operation-generated-14-billion-ad-requests-per-day/
4. ÐÂÐͶñÒâÈí¼þResolverRATÍþвҽÁÆÓëÔìÒ©ÐÐÒµ
4ÔÂ21ÈÕ£¬MorphisecÍþв³¢ÊÔÊÒ·¢ÏÖÁËÒ»ÖÖÐÂÐ͸´ÔÓ¶ñÒâÈí¼þResolverRAT£¬¸Ã¶ñÒâÈí¼þÕý»ý¼«Õë¶ÔÒ½ÁƱ£½¡ºÍÔìÒ©ÐÐÒµ·¢Õ¹¹¥»÷£¬×î½üÒ»²¨¹¥»÷¼¯ÖÐÔÚ2025Äê3ÔÂ10ÈÕ×óÓÒ¡£ResolverRATƾ½èÆäÏȽøµÄ¼¼Êõ¼¿Á©£¬ÈçÄÚ´æÖ´ÐÓ×¢¶¯Ì¬×ÊÔ´´¦Öü°¶à²ã¶ã±Ü¼¼Êõ£¬Ê¹µÃ´«Í³¼ì²â²½ÖèÄÑÒÔ¼ûЧ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¾«ÐÄÉè¼ÆµÄ´¹µöÓʼþ´«²¼£¬ÀûÓýôÆÈ¸Ð»òÕ𾪸ÐÓÕµ¼ÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó£¬½ø¶ø´¥·¢Ï°È¾¹ý³Ì¡£¹¥»÷¸ß¶È±¾µØ»¯£¬Óʼþѡȡָ±ê¹ú¶ÈĸÓï׫д£¬Ö÷ÌâÉæ¼°Ë¾·¨µ÷²é»ò°æÈ¨ÇÖȨ£¬Ö¼ÔÚͨ¹ý¸öÐÔ»¯¶¨Î»Ìá¸ßϰȾ³É¹¦ÂÊ¡£Ï°È¾Ê¼ÓÚDLL²àÔØ¼¼Êõ£¬½«¶ñÒâDLLÎļþÓëºÏ·¨·¨Ê½£¨Èç hpreader.exe£©Ò»Æð¸éÖ㬵±·¨Ê½Ö´ÐÐʱ£¬¶ñÒâDLL±»ÍµÍµ¼ÓÔØ£¬´Ó¶øÆô¶¯¶ñÒâÈí¼þ¡£ResolverRAT ѡȡ¶à²ã¶ã±Ü¼¼Êõ£¬Ô̺¬´úÂë»ìºÏºÍ×Ô½ç˵ºÍ̸À´»ìºÏÍøÂçÁ÷Á¿£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐжñÒâ´úÂ룬²¢ÔÚÔËÐÐʱ¶¯Ì¬¼ø±ðºÍʹÓÃϵͳº¯Êý¡£ÎªÈ·Î¬ÓƾÃÐÔ£¬ResolverRAT ÔÚ Windows ×¢²á±íÖд´½¨¶à¸öÌõ¿î£¬²¢ÔÚ¶à¸öµØÎ»×°ÖÃ×ÔÉí¸±±¾¡£´Ë±í£¬Ëü»¹Ê¹ÓùÖÒìµÄÖ¤ÊéÑéÖ¤²½ÖèºÍ¡°.NET ×ÊÔ´½âÎöÆ÷½Ù³Ö¡±¼¼ÊõÀ´ÒþÉí£¬²¢³¢ÊÔ¶Ô·ÖÎö»·¾³½øÐÐÖ¸ÎÆ¼ø±ð£¬ÒÔÔÚ¼ì²âµ½±»²é³Ê±Å¤×ªÐÐΪ¡£
https://hackread.com/native-language-phishing-resolverrat-healthcare/
5. Ú¿Æ·Ö×Ó¼ÙÒâFBI IC3Ô±¹¤ÇÔÈ¡ÄúµÄ²ÆÕþÐÅÏ¢
4ÔÂ19ÈÕ£¬½üÈÕ£¬FBI°ä²¼Ú¿Æ¾¯±¨£¬½ÒʾڿƷÖ×ÓÕý¼ÙÒâFBI»¥ÁªÍø·¸×ïͶËßÖÐÐÄ(IC3)ÈËÔ±£¬ÒÔ×·»ØËðʧ×ʽðΪµö¶ü£¬ÇÔÈ¡Êܺ¦Õß²ÆÕþÐÅÏ¢¡£×Ô2023Äê12ÔÂÖÁ2025Äê2Ô£¬FBIÒÑÊÕµ½100¶àÆðÓйػ㱨¡£Ú¿ÆÕß³£¶Ô×¼ÍøÂç½ðÈÚÚ¿ÆÊܺ¦ÕßµÄÉç½»ÍøÂç»òÔÚÏßÂÛ̳£¬ÓÐʱ¼ÙÒâÕæÊµÉí·Ý»òʹÓÃÐéαƾ֤¡£ËùÓÐȦÌ×¾ùÉæ¼°ÒÔijÖÖ´ó¾ÖÔ®ÊÖÊܺ¦Õß×·»ØËðʧ£¬Ö»¹Ü×î³õÁªÏµ·½Ê½¸÷±ð£¬Ô̺¬µç×ÓÓʼþ¡¢µç»°¡¢É罻ýÌå»òÂÛ̳¡£ÔÚijЩ°¸ÀýÖУ¬Ú¿ÆÕßÉõÖÁÐû³ÆÃÔʧ×ʽð¾ÍÔÚËûÃÇÊÖÖС£ËûÃÇͨ¹ý´´½¨ÐéαÓ×ÎÒ×ÊÁÏ£¬²ÎÓëÔÚÏß½ðÈÚÚ¿ÆÍŻ²¢½¨ÒéÊܺ¦ÕßÁªÏµ¼ÙðµÄIC3¡°Ê×ϯִÐй١±»ñȡԮÊÖ¡£Ò»µ©Êܺ¦ÕßÖмƣ¬Ú¿ÆÕß±ãÐû³ÆÒѸ´Ô×ʽ𣬲¢½è´Ë»ñÈ¡Æä²ÆÕþÐÅÏ¢¡£FBI°µÊ¾£¬ÕâЩ´òËã²»½öºýŪºÍÚ¿ÆÖ¸±ê£¬»¹Ê¹ËûÃÇÔٴγÉΪÊܺ¦Õß¡£Îª·À±¸´ËÀàÚ¿Æ£¬FBIÌáÐѹ«¼Ò£¬IC3¾ø²»»áͨ¹ýµç»°¡¢µç×ÓÓʼþ¡¢É罻ýÌåµÈÖ±½ÓÓëÓ×ÎÒ¹µÍ¨£¬Ò²²»»áÒªÇ󸶿îÀ´×·»ØËðʧ×ʽ𣬸ü²»»á½«Êܺ¦Õßת½é¸øÒªÇ󸶿îµÄ¹«Ë¾¡£¹«¼ÒÓ¦Ìá¸ß¾¯Ì裬ÇÐÎðÓë½öÔÚÍøÉÏ»òµç»°ÖÐÒâʶµÄÈË·ÖÏíÃô¸ÐÐÅÏ¢»ò·¢ËͲƲ¯¡£ÈçÐè¾Ù±¨ÍøÂçڲƣ¬¿É½Ó¼ûFBI»¥ÁªÍø·¸×ïͶËßÖÐÐĹÙÍø¡£
https://cybernews.com/security/fbi-alert-ic3-impersonation-scam-recover-lost-funds-steal-financial-info/
6. ºÚ¿ÍÀûÓÃGoogleϵͳÈõµãÖ´ÐÐDKIM³Á·ÅÍøÂç´¹µö¹¥»÷
4ÔÂ20ÈÕ£¬½üÈÕ£¬ºÚ¿ÍÀûÓÃGoogleϵͳÈõµã£¬ÌáÒéÁËÒ»³¡ÆæÃîµÄÍøÂç´¹µö¹¥»÷¡£¹¥»÷Õßͨ¹ý·¢ËÍÒ»·â¿´ËÆÀ´×Ô¡°no-reply@google.com¡±µÄÐéαµç×ÓÓʼþ£¬³É¹¦ÈƹýËùÓÐÑéÖ¤£¬Ö¸ÏòÒ»¸öÍøÂçµÇ¼ÐÅÏ¢µÄÚ²ÆÒ³Ãæ¡£¸ÃÓʼþ²»½öͨ¹ýÁËDKIMÉí·ÝÑéÖ¤£¬ÇÒÄÚÈÝÏÕЩÓë¹È¸è¹Ù·½°²È«¾¯±¨ÎÞÒ죬¼«Ò׺ýŪ¼¼Êõˮƽ½ÏµÍµÄÓû§¡£È»¶ø£¬ENSÊ×ϯ¿ª·¢ÈËÔ±Äá¿Ë¡¤Ô¼º²Ñ·Ãô¸ÐµØ·¢ÏÖ£¬Ðéα֧³ÖÃÅ»§ÍйÜÔÚsites.google.comÉÏ£¬¶ø·ÇÕæÕýµÄaccounts.google.com£¬´Ó¶øÊ¶ÆÆÁËȦÌס£¹¥»÷Õ߯æÃîµØ×¢²áÁËÒ»¸öÓòÃû£¬²¢ÒÔ¡°me@domain¡±´´½¨GoogleÕÊ»§£¬Ëæºó´´½¨ÁËÒ»¸öGoogle OAuthÀûÓ㬽«´¹µöÓʼþ¶¨ÃûΪ¸ÃÀûÓᣵ±¹¥»÷ÕßÊÚÓèÆäOAuthÀûÓýӼûGoogle WorkspaceÖеç×ÓÓʼþµØÖ·µÄȨÏÞʱ£¬Google×Ô¶¯·¢ËÍÁ˰²È«¾¯±¨£¬¸Ã¾¯±¨ÒòʹÓÃÓÐЧµÄDKIMÃÜÔ¿ÊðÃû¶øÍ¨¹ýÁËËùÓв鳡£¹¥»÷ÕßËæºó½«°²È«¾¯±¨×ª·¢¸øÊܺ¦Õߣ¬Ê¹Æä¿´ÆðÀ´ÏñÊÇÀ´×ԹȸèµÄºÏ·¨Óʼþ¡£´Ë±í£¬¹¥»÷Õß»¹ÀûÓÃÁËGoogleϵͳµÄÈõµã£¬¼´DKIM½ö²é³ÓʼþÕýÎĺÍÓʼþÍ·£¬¶ø²»²é³Ðŷ⣬ʹµÃαÔìÓʼþ¿ÉÄÜͨ¹ýÊðÃûÑéÖ¤¡£Ä¿Ç°£¬¹È¸èÒÑÒâʶµ½OAuthµÄÈõµã£¬²¢ÔÚÖÂÁ¦½¨¸´¡£
https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/


¾©¹«Íø°²±¸11010802024551ºÅ