FBIÖÒ¸æAIÇý¶¯ÓïÒô¶ÌÐÅ´¹µöÁ÷ÐÐ
°ä²¼¹¦·ò 2025-05-191. FBIÖÒ¸æAIÇý¶¯ÓïÒô¶ÌÐÅ´¹µöÁ÷ÐÐ
5ÔÂ18ÈÕ£¬ÃÀ¹úÁª¹úµ÷²é¾Ö£¨FBI£©·¢³öÖҸ棬³Æ´æÔÚÒ»ÖÖ¸´ÔÓµÄÓïÒôÍøÂç´¹µöºÍ¶ÌÐÅÍøÂç´¹µö»î¶¯£¬¶ñÒâÈËÊ¿ÕýÀûÓÃÈËΪÖÇÄÜ£¨AI£©·¢Õ¹ºýŪÐÐΪ£¬ÍþвÈÕÒæÑϳÁ¡£×Ô2025Äê4ÔÂÒÔÀ´£¬¡°¶ñÒâÐÐΪÕß¡±Ê¹Óá°¶ÌÐÅÍøÂç´¹µö¡±ºÍ¡°ÓïÒôÍøÂç´¹µö¡±¼¼Êõ£¬´´½¨¿´ËÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÓïÒô±¸Íü¼£¬½áºÏºýŪÐÔ¶ÌÐŹ¥»÷ÏÖÈÎ/ǰÈε±¾Ö¹ÙÔ±¼°ÆäͨѶ¼ÖеÄÓ×ÎÒ£¬ÊÔͼÓëÖ¸±ê³ÉÁ¢ÐÅÀµºÍÁªÏµ¡£FBIÃ÷È·ÌáÐÑÃñ¶à£¬ÊÕµ½Ðû³ÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÐÂÎŲ»³ÉÇáÐÅ¡£Ò»µ©ÁªÏµÉÏÖ¸±ê£¬·¸×ï·Ö×Ó»áÊÔͼ½Ó¼ûÆäÓ×ÎÒÕË»§£¬ÈçÔÚÐÅÏ¢Öз¢ËͶñÒâÁ´½Ó£¬ÓÕµ¼Êܺ¦Õßµã»÷ºó×ªÒÆµ½Ëùν¸ü°²È«µÄÐÂÎÅÆ½Ì¨£¬ÊµÔò¿ÉÄÜÊèµ¼Óû§½øÈë¶ñÒâÍøÕ¾£¬ÇÔÈ¡µÇ¼ƾ֤»ò×°ÖöñÒâÈí¼þ¡£Ò»´Î³É¹¦ÈëÇÖ¿ÉÄÜÒý·¢Á¬Ëø·´Ó³£¬·¸·¨·Ö×Ó¿ÉÄÜÀûÓñ»µÁÕË»§¹¥»÷ÆäËûÃÀ¹ú¹ÙÔ±»òÆäͬ»ï£¬ÇÔÈ¡µÄÐÅÏ¢ÓÃÓÚÔì×÷¼ÙÒâÕË»§»òÌáÒé½øÒ»²½Éç»á¹¤³Ì¹¥»÷£¬Í¨¹ýÉç»á¹¤³Ìѧ¼¿Á©»ñÈ¡µÄÁªÏµÐÅÏ¢Ò²¿ÉÄܱ»ÓÃÀ´¼ÙÒâÁªÏµÈËÇÔÊØÐÅÏ¢»ò×ʽð¡£FBIËäδй©±»¼ÙÒâµÄ¾ßÌå¹ÙÔ±£¬µ«²¼¸æÅú×¢ÎÞÊýÖ¸±êÊÇ¡°ÏÖÈλòǰÈÎÃÀ¹úÁª¹ú»òÖݵ±¾Ö¸ß¼¶¹ÙÔ±¼°ÆäÁªÏµÈË¡±£¬ÕâÊÇÒ»³¡Õë¶Ô°ÑÎÕDZÔÚÃô¸ÐÐÅÏ¢»ò½Ó¼ûȨÏÞÓ×ÎÒµÄ¿í·º¹¥»÷»î¶¯¡£
https://hackread.com/fbi-warn-ai-voice-scams-impersonate-us-govt-officials/
2. BSHÔâÀÕË÷Èí¼þ¹¥»÷£¬²©Í¨Ô±¹¤Êý¾ÝÔâй¶
5ÔÂ17ÈÕ£¬Ð½×Ê·þÎñ¾ÞÍ·ADPµÄÖж«ºÏ×÷ͬ°éBSHÔÚ2024Äê9ÔÂÔâÀÕË÷Èí¼þ¹¥»÷£¬Ö²©Í¨Ô±¹¤Ãô¸ÐÊý¾Ýй¶¡£²©Í¨ÔøÀûÓÃADP´¦Öù¤×ʵ¥£¬BSHÊÇADPÖж«ÇøÓò¹©¸øÉÌ£¬Ë䲩ͨÆäʱÒÑÆðÍ·ÉÕ»ÙADPºÍBSH£¬µ«Çл»Î´ÊµÏÖʱ¹¥»÷ÒÑ·¢Æð¡£ÊÂÎñ¹¦·òÏßÏÔʾÆóÒµ¼à¿ØºÍ±£»¤¹©¸øÉÌÉúÌ¬ÏµÍ³Ãæ¶ÔÌôÕ½¡£BSH/ADPÓÚ2024Äê9ÔÂÏÂÑ®·¢ÏÖÈëÇÖ£¬Ö±µ½12Ô²ÅÒâʶµ½Ô±¹¤Êý¾Ý±»Ð¹Â¶µ½»¥ÁªÍø¡£Òò±»µÁÐÅϢΪ¡°·Ç½á¹¹»¯Ìåʽ¡±£¬BSHºÍADPÔÚÈ·¶¨ÊÜÓ°ÏìÊý¾ÝºÍÓ×ÎÒÁìÓòÉÏÔâ·ê³Á´óÑÓÎ󣬲©Í¨Ö±µ½2025Äê5ÔÂ12ÈÕ²ÅÊÕµ½¾¯±¨£¬¾àÀë³õ´ÎÈëÇÖ½ü°Ë¸öÔ¡£ÄÚ²¿ÓʼþÅú×¢£¬È·¶¨ÊÜÓ°ÏìÔ±¹¤ºÍÊý¾Ý×ֶζÔBSH/ADPÊÇÂþ³¤¹ý³Ì£¬µ¼ÖÂÔ±¹¤³Ö¾Ã²»È·¶¨Ó×ÎÒÐÅÏ¢ÊÇ·ñй¶¡£TechNadu±¨Â·³Æ£¬El DoradoÀÕË÷Èí¼þ×éÖ¯²ß¶¯ÁËÕâ´Î¹¥»÷£¬¸Ã×éÖ¯³£¹¥»÷µÚÈý·½·þÎñÌṩÉ̲¢ÇÔȡԱ¹¤Êý¾Ý¡£ÕâÅú×¢ÍøÂç·¸×ï·Ö×ÓÕý¶Ô×¼´óÐÍ×éÖ¯Êý×Ö¹©¸øÁ´ÓÄ΢»·½Ú¡£²©Í¨¾ÀúÓëÒµ½ç¶Ô¹©¸øÉÌ·çÏÕÖÎÀíÓÇÓôÒ»Ö£¬Ð½×Ê·þÎñÌṩÉÌת»»¹ý³Ì¸´ÔÓ£¬BSHºÍADPδʵʱÅû¶Υ¹æÐÐΪ¼Ó¾çÀ§¾³¡£Á½¼Ò¹«Ë¾ÒÑÓë·¨Âɲ¿ÃźÍÊý¾Ý±£»¤»ú¹¹½ÓÇ¢£¬²¢²ÉÈ¡´ëʩǿ»¯BSH»·¾³¡£
https://www.webpronews.com/ransomware-attack-on-adp-partner-exposes-broadcom-employee-data/
3. Ç×ÎÚ¿ËÀ¼×éÖ¯ÀûÓÃPythonºóÃŹ¥»÷¶íÂÞ˹¿ª·¢Õß
5ÔÂ16ÈÕ£¬ReversingLabsÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÒ»¸öÃûΪdbgpkgµÄαÔìPythonµ÷ÊÔÆ÷Èí¼þ°ü£¬¸ÃÈí¼þ°ü¼Ù×°³Éµ÷ÊÔ¹¤¾ß£¬ÊµÔò°ÂÃØÔÚ¿ª·¢ÕßϵͳÖÐÖ²ÈëºóÃÅÒÔÇÔÈ¡Êý¾Ý¡£RLÒÉ»ó´Ë¹¥»÷±³ºóÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼µÄºÚ¿Í×éÖ¯£¬¸Ã×éÖ¯ÒÔÖ§³ÖÎÚ¿ËÀ¼¡¢Õë¶Ô¶íÂÞ˹ÀûÒæ¶øÎÅÃû¡£dbgpkg²»Ô̺¬ÏÖʵµ÷ÊÔÖ°ÄÜ£¬¶øÊÇÓÕÆ¿ª·¢ÈËÔ±×°ÖúóÃÅ£¬½«Æä¿ª·¢»úеÔì³ÉÊÜϰȾ×ʲú¡£ÆäÖ²ÈëºóÃŵIJ½Ö踴ÔÓ£¬ÀûÓá°º¯Êý°ü×°¡±»ò¡°×°è«Æ÷¡±¼¼ÊõÅú¸Ä³ß¶ÈPythonÍøÂ繤¾ßÐÐΪ£¬Ê¹¶ñÒâ´úÂëÔÚ¿ª·¢ÈËԱʹÓÃÍøÂ纯ÊýǰһÏò°µ²Ø¡£¶ñÒâ°ü×°Æ÷´úÂë»á²é³Ìض¨Îļþ£¬ÈôºóÃŲ»´æÔÚÔòÖ´ÐÐÈý¸öºÅÁÔ̺¬´ÓÔÚÏßPastebin·þÎñÏÂÔØ¹«Ô¿¡¢×°ÖÃÈÆ¹ý·À»ðǽµÄ¹¤¾ßGlobal Socket Toolkit²¢¼ÓÃÜÏνӺóÃÅËùÐèÃÜÔ¿¡¢½«¼ÓÃÜÃÜÔ¿·¢Ë͵½Ë½ÃÜÔÚÏßµØÎ»£¬¶à½×¶Î¹ý³ÌÓë¶ÔÊÜÐÅÀµÄ£¿éʹÓú¯Êý°ü×°Æ÷Ôö³¤Á˶ñÒâ»î¶¯¼ì²âÄѶȡ£RL×êÑÐÈËÔ±»¹·¢ÏָúóÃÅÓëÇ×ÎÚ¿ËÀ¼µÄPhoenix HyenaºÚ¿Í×éÖ¯ÏÈǰʹÓõĶñÒâÈí¼þÓÐÀàËÆÖ®´¦£¬¸Ã×éÖ¯×Ô2022ÄêÒÔÀ´»îÔ¾£¬ÒÔÕë¶Ô¶íÂÞ˹ʵÌåÖø³Æ£¬ÇÒ2024Äê9ÔÂÉæÏÓÈëÇÖ¶íÂÞË¹ÍøÂ簲ȫ¹«Ë¾Dr. Web¡£
https://hackread.com/ukraine-group-russian-developers-python-backdoor/
4. ÀÕË÷Èí¼þÍÅ»ïÇàíùSkitnet¶ñÒâÈí¼þ
5ÔÂ16ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ïÕýÔ½À´Ô½¶àµØÊ¹ÓÃÃûΪSkitnet£¨¡°Bossnet¡±£©µÄжñÒâÈí¼þ£¬ÔÚ±»¹¥ÆÆµÄÍøÂçÖÐÖ´ÐÐÒþÃØµÄºóÀûÓû¡£¸Ã¶ñÒâÈí¼þ×Ô2024Äê4ÔÂÆðÔÚµØÏÂÂÛ̳ÏúÊÛ£¬µ«×Ô2025ËêÊ×ÒÔÀ´£¬ÔÚÀÕË÷Èí¼þÍÅ»ïÖÐÊܵ½ÏÔÖø¹Ø×¢¡£Prodaft×êÑÐÈËÔ±¹Û²ìµ½£¬¶à¸öÀÕË÷Èí¼þ²Ù×÷ÔÚÏÖʵ¹¥»÷Öв¿ÊðÁËSkitnet£¬ÈçÕë¶ÔÆóÒµµÄMicrosoft TeamsÍøÂç´¹µö¹¥»÷ÖеÄBlackBastaºÍCactus¡£SkitnetµÄϰȾʼÓÚÔÚÖ¸±êϵͳÉϸéÖò¢Ö´ÐлùÓÚRustµÄ¼ÓÔØÆ÷£¬¸Ã¼ÓÔØÆ÷½âÃÜChaCha20¼ÓÃܵÄNim¶þ½øÔìÎļþ²¢¼ÓÔØµ½ÄÚ´æÖС£NimÓÐЧ¸ºÔسÉÁ¢»ùÓÚDNSµÄ·´Ïòshell£¬ÓÃÓÚÓëC2·þÎñÆ÷ͨѶ£¬²¢Ê¹ÓÃËæ»úDNS²éÎÊÆô¶¯»á»°¡£¶ñÒâÈí¼þÆô¶¯Èý¸öỊ̈߳¬±ðÀëÓÃÓÚ·¢ËÍÐÄÌøDNSÒªÇ󡢼ලºÍй¶shellÊä³ö¡¢¼àÌýºÍ½âÃÜÀ´×ÔDNSÏìÓ¦µÄºÅÁͨѶºÍ´ýÖ´ÐеĺÅÁîͨ¹ýHTTP»òDNS·¢ËÍ£¬»ùÓÚSkitnet C2½ÚÔìÃæ°åµÄÖ¸Áî¡£SkitnetÖ§³Ö¶àÖÖºÅÁÔ̺¬³ÉÁ¢ÓƾÃÐÔ¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢ÏÂÔØ²¢¾²Ä¬×°ÖúϷ¨µÄÔ¶³Ì½Ó¼û¹¤¾ß¡¢Æô¶¯PowerShellºÅÁîÑ»·ÒÔ¼°Ã¶¾ÙÒÑ×°ÖõķÀ²¡¶¾ºÍ°²È«Èí¼þµÈ¡£´Ë±í£¬²Ù×÷Ô±»¹¿ÉÀûÓÃÉæ¼°.NET¼ÓÔØÆ÷µÄÖ°ÄÜ£¬ÔÚÄÚ´æÖÐÖ´ÐÐPowerShell¾ç±¾£¬ÊµÏÖ¸üÉîµµ´ÎµÄ¹¥»÷¶¨Ôì¡£
https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/
5. °²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÀÕË÷¹¥»÷ÖÂÊý¾Ýй¶
5ÔÂ15ÈÕ£¬2Ô·ݰ²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâ·êÍøÂç¹¥»÷£¬µ¼Ö»¼Õß»úÃÜÊý¾Ýй¶¡£Õâ´ÎÊÂÎñÒý·¢Ïص±¾Ö´óÂ¥ÁÙʱ¹Ø¹Ø£¬²¢Ó°Ïì¶àÏî¾ÓÃñ·þÎñ¡£Ïص±¾ÖÓÚ2ÔÂ22ÈÕ³õ´Î¾õ²ìÕâ´Î¹¥»÷£¬²¢µ±¼´½áºÏÐÐÒµµ±ÏȵÄÍøÂ簲ȫר¼Ò¡¢·¨ÂÉ»ú¹¹¼°ÓйØÖݵ±¾Ö»ú¹¹·¢Õ¹µ÷²é¡£µ÷²éÁ˾ÖÏÔʾ£¬Õâ´ÎÊÂÎñΪ±í²¿ÍþвÐÐΪÕßÌáÒéµÄÀÕË÷Èí¼þ¹¥»÷£¬¹¥»÷²úÉúÔÚ1ÔÂ28ÈÕÖÁ2ÔÂ22ÈÕÆÚ¼ä£¬¡°¸ÃÏØÍøÂçµÄÒ»Óײ¿ÃÅ¡±Ôâµ½ÈëÇÖ£¬ÆÚ¼äijЩÎļþ±»Î´¾ÊÚȨ½Ó¼û»òÏÂÔØ¡£×¨¼ÒÖ¸³ö£¬ÀÕË÷Èí¼þ¹¥»÷ÖУ¬ºÚ¿Íͨ³£ÇÖÈëϵͳ¼ÓÃÜ»òËø¶¨Êý¾Ý£¬²¢ÒªÇóÖ§¸¶Êê½ðÒÔ¿ªÊÍÐÅÏ¢¡£µ±±»Îʼ°ÊÇ·ñÒÑÖ§¸¶Êê½ðʱ£¬½²»°È˰µÊ¾µ÷²éÈÔÔÚ½øÐÐÖУ¬ÎÞ·¨Ð¹Â©ÓйØÐÅÏ¢¡£Ä¿Ç°£¬¸ÃÏØÕýÓëÕÕ·÷ºÏ×÷£¬ÒÔÈ·¶¨ÄÄЩÎļþ±»Ð¹Â¶£¬Éв»Ã÷ÏÔÊÜÓ°ÏìÈËÊý¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÓû§µÄÈ«Ãû¡¢µØÖ·¼°Ò½ÁÆÕï¶ÏµÈÐÅÏ¢£¬Ö»¹Ü²ÆÕþÐÅϢδÊÜй¶£¬µ«¹ÙÔ±ÈÔ¼¤Àø¾ÓÃñά³Ö¾¯Ì裬ͨ¹ýÉó²éÕË»§±¨±í¡¢ÐÅÓþ»ã±¨µÈ·À±¸Éí·Ý͵ÇÔ¡£
https://www.thebaltimorebanner.com/community/local-news/cybersecurity-ransomware-anne-arundel-county-cyberattack-FYSLHXQANFCHBBCBDJWNDVUW6Q/
6. EffortelÊý¾Ýй¶Ö±ÈÀûʱMVNOÆßÍò¿Í»§ÐÅÏ¢±íй
5ÔÂ16ÈÕ£¬½üÆÚ£¬ÓÉÓÚEffortel²úÉúÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂÈý¼Ò±ÈÀûÊ±ÒÆ¶¯Ðé¹¹ÍøÂçÔËÓªÉÌ£¨MVNO£©µÄ70,000Ãû¿Í»§Ó×ÎÒÐÅÏ¢±»Ð¹Â¶¡£Effortel×÷ÎªÒÆ¶¯Ðé¹¹ÍøÂçÍÆ¶¯Õߣ¨MVNE£©£¬ÔÚµçÐÅÐÐÒµÖбíÑÝ׏ؼü½ÇÉ«£¬ËüΪռÓÐÎïÀíÍøÂçµÄµçÐŹ«Ë¾£¨ÈçProximus£©ÓëÐé¹¹µçÐÅÌṩÉÌ£¨ÈçNeibo£©Ö®¼ä´î½¨ÇÅÁº£¬Í¨¹ý¿ª·¢Èí¼þƽ̨£¬Ê¹ÆóÒµ¿ÉÄÜÒÔMVNOÉí·ÝÔÚµçÐÅÔËÓªÉ̵ÄÎïÀíÍøÂçÉÏÔËÓª£¬¶øÎÞÐè¾ß±¸´óÁ¿¼¼Êõרҵ֪ʶ¡£Ä¿Ç°£¬EffortelΪȫÇò30¶à¼ÒMVNO¿Í»§Ìṩ¿ªÆ±ºÍÏνÓSIM¿¨µÈ·þÎñ¡£È»¶ø£¬Õâ´ÎÊý¾Ýй¶ÊÂÎñ²úÉúÔÚÖÐÑëÊý¾Ý¿âµÄ²âÊԽ׶Σ¬EffortelÔÚ´«µÝ¿Í»§Êý¾Ý£¨ÈçÓÃÓÚ´¹Î£·þÎñµÄÊý¾Ý£©ÒÔ½øÐÐϵͳ¼¯³Éʱ£¬ÌìÉúÁËÔ̺¬¿Í»§Êý¾ÝµÄÎļþ£¬ÕâЩÎļþ²»ÐÒ±»Ð¹Â¶¡£Ò»ÃûºÚ¿Í³É¹¦ÈëÇÖÁËMVNOºÍTelfortÖ®¼äµÄÖ§³ÖÃÅ»§£¬»ñÈ¡ÁËÕâЩÎļþµÄ½Ó¼ûȨÏÞ¡£Õâ´ÎÐ¹Â¶Éæ¼°¼ÒÀÖ¸£Òƶ¯¡¢NeiboºÍUndoµÈ¿Í»§µÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂ롢סլµØÖ·¡¢»¤ÕÕºÅÂë¡¢Óû§ºÅÂëÒÔ¼°SIM¿¨ºÅµÈ¼¼Êõ¼ø±ðÊý¾Ý¡£Effortel×ܾÀíLaurent Bataille°µÊ¾£¬60%µ½65%µÄÖն˿ͻ§Í¨¹ýÔÚÏßÖ§¸¶È·ÈÏÉí·Ý£¬ÆäÉí·ÝÊý¾Ý²»»á±»´æ´¢£¬Ö§¸¶IDËä´æÔÚ£¬µ«Ö»ÄÜͨ¹ýÖ§¸¶ÌṩÉÌÓëÓ×ÎÒÊý¾Ý¹ØÁª¡£
https://cybernews.com/security/data-belgian-virtual-telecom-operators-leaked/


¾©¹«Íø°²±¸11010802024551ºÅ