Matanbuchus 3.0¶ñÒâÈí¼þ¼ÓÔØÆ÷Éý¼¶

°ä²¼¹¦·ò 2025-07-17

1. Matanbuchus 3.0¶ñÒâÈí¼þ¼ÓÔØÆ÷Éý¼¶


7ÔÂ16ÈÕ£¬ÍøÂ簲ȫÁìÓò½üÆÚ¾Û½¹ÓÚMatanbuchus¶ñÒâÈí¼þ¼ÓÔØÆ÷бäÖÖ£¨3.0°æ£©µÄÓ¿ÏÖ¡£×÷Ϊһ¿î×Ô2021ÄêÆðÔÚ¶íÓïÍøÂç·¸×ïÂÛ̳ÒÔ¡°¶ñÒâÈí¼þ¼´·þÎñ¡±£¨MaaS£©Ä£Ê½ÔËÓªµÄ¹¥»÷¹¤¾ß£¬Æä³õʼ°æ±¾ÒÔ2500ÃÀÔªÔÂ×â¼Û±»ÓÃÓÚ´«²¼Cobalt StrikeÐűêºÍÀÕË÷Èí¼þ£¬ÔøÍ¨¹ý¡°ClickFix¡±Ê½ÓÕµ¼¹¥»÷Ö´ÐÐÉøÈë¡£¶ø×îÐÂ3.0°æ±¾ÔÚ¼¼Êõ²ãÃæÊµÏÖ³Á´óÉý¼¶£¬Òñ±ÎÐÔÓë¹¥»÷ЧÄÜÏÔÖøÌáÉý£¬Òý¿¯ÐÐÒµ¸ß¶È¾¯Ì衣аæMatanbuchusµÄÖ÷ÌâÍþвÔÚÓÚÆä´«²¼Õ½ÊõÓëÖ°ÄÜÇ¿»¯¡£·ÖÆçÓÚ´«Í³ÒÀÀ·¬»øÓʼþ»ò·ì϶ÀûÓõÄÀ©É¢·½Ê½£¬¸Ã¼ÓÔØÆ÷¸üÒÀÀµ¡°Ö±½Ó½»»¥Ê½Éç»á¹¤³Ìѧ¡±¼¿Á©£¬¹¥»÷Õßͨ¹ý¼Ù×°Éí·ÝÓÕÆ­Óû§Ö´ÐÐÔ¶³ÌЭÖú¹¤¾ß£¬½ø¶ø²¿ÊðPowerShell¾ç±¾´¥·¢¶ñÒâÔØºÉÏÂÔØ¡£ÕâÖÖ¡°¾«×¼¶¨Î»+ÈËΪÓÕµ¼¡±µÄģʽ£¬Ê¹Æä³ÉΪ³õʼ½Ó¼û¾­¼ÍÈË£¨IAB£©ÏòÀÕË÷ÍÅ»ïÏúÊÛÆóÒµÍøÂçÈë¿ÚµÄ¸ßЧ¹¤¾ß£¬ÍþвÐÔÔ¶³¬Í¨³£Ã³Ò×»¯¼ÓÔØÆ÷¡£¼¼Êõ²ãÃæ£¬Matanbuchus 3.0µÄÉý¼¶¾Û½¹ÓÚÈý·çÑÅÏò£ºÍ¨Ñ¶ºÍ̸ÓÅ»¯¡¢ÄÚ´æ²Ù×÷Ç¿»¯¡¢»ìºÏ¼¼ÊõÉý¼¶¡£ÆäÖ°ÄÜÀ©´óÔ̺¬Ö§³ÖCMD/PowerShell·´ÏòShell¡¢¿ÉÔËÐÐDLL/EXE/ShellcodeµÈ¶àÀàÐͺóÐøÔØºÉ£¬²¢¾ß±¸Í¨¹ýCOM×é¼þ½»»¥×¢ÈëShellcodeʵÏÖ¸´ÔÓ¹¤×÷µ÷¶ÈµÄÄÜÁ¦¡£


https://thehackernews.com/2025/07/hackers-leverage-microsoft-teams-to.html


2. Ó¢¹úCo-opÁãÊÛÉÌÔâÍøÂç¹¥»÷£¬650Íò»áÔ±Êý¾Ýй¶


7ÔÂ16ÈÕ£¬Ó¢¹ú³ÛÃûÁãÊÛÉ̺Ï×÷É缯ÍÅ£¨Co-op£©½üÈÕ֤ʵ£¬½ñÄê4ÔÂÔâ·êµÄ´ó¹æÄ£ÍøÂç¹¥»÷µ¼ÖÂÆäϵͳ̱»¾¡¢ÔÓ»õµêʳƷǷȱ£¬²¢Ôì³É650Íò»áÔ±µÄÓ×ÎÒÊý¾Ý±»µÁ¡£¹¥»÷²úÉúÓÚ4ÔÂ22ÈÕ£¬ÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³Ì¼¿Á©³ÁÖÃÒ»ÃûÔ±¹¤ÃÜÂ룬³É¹¦ÇÖÈëCo-opÍøÂç¡£Ëæºó£¬¹¥»÷ÕßѸ¿ìºáÏòÉøÈëÖÁÆäËûÉ豸£¬²¢ÇÔÈ¡ÁËWindows Active Directory·þÎñµÄÖ÷ÌâÊý¾Ý¿âÎļþNTDS.dit¡£¸ÃÎļþÔ̺¬Óû§ÃÜÂë¹þÏ£Öµ£¬¹¥»÷Õß¿Éͨ¹ýÀëÏßÆÆ½â½øÒ»²½À©´óÍøÂç½Ó¼ûȨÏÞ¡£×îÖÕ£¬¹¥»÷ÕßÊÔͼ²¿ÊðDragonForceÀÕË÷Èí¼þ¼ÓÃÜÆ÷£¬µ¼ÖÂCo-op±»ÆÈ¹Ø¹Ø¶à¸öITϵͳÒÔ¶ôÔìÍþвÀ©É¢¡£Ö»¹Ü²ÆÕþ¼°ÂòÂôÐÅϢδ±»Ð¹Â¶£¬µ«»áÔ±µÄÁªÏµÐÅÏ¢µÈÃô¸ÐÊý¾ÝÔâÇÔ£¬Ê×ϯִÐйÙShirine Khoury-HaqÔڲɷÃÖаµÊ¾£¬Õâ´ÎÊÂÎñ¡°ÈçͬÈËÉí¹¥»÷¡±£¬Ëý¶Ô»áÔ±ºÍÔ±¹¤Êܵ½µÄÖÐÉËÉî¸ÐÀ¢¾Î¡£µ÷²éÏÔʾ£¬Õâ´Î¹¥»÷ÓëÃûΪ¡°Scattered Spider¡±µÄºÚ¿Í×éÖ¯ÓйØ¡£¹¥»÷²úÉúºó£¬DragonForceÀÕË÷Èí¼þÔËÓªÉÌÐû³Æ¶ÔCo-opÊÂÎñÕÆ¹Ü£¬²¢ÏòBBCÌṩÁ˱»µÁÊý¾ÝÑù±¾¡£


https://www.bleepingcomputer.com/news/security/co-op-confirms-data-of-65-million-members-stolen-in-cyberattack/


3. BADBOX 2.0ÒÑԤװÔÚÈ«Çò°ÙÍòAndroidÉ豸ÉÏ


7ÔÂ16ÈÕ£¬ÃÀ¹úÁª¹úµ÷²é¾Ö£¨FBI£©½üÈÕ½«Ò»¿îÃûΪBADBOX 2.0µÄ°²×¿¶ñÒâÈí¼þÁÐΪȫÇòÐÔÍøÂçÍþв¡£¾Ý°²È«ÍŶӷÖÎö£¬¸Ã¶ñÒâÈí¼þÒÑÈëÇÖ222¸ö¹ú¶ÈºÍµØÓòµÄ³¬100Íǫ̀É豸£¬ÆäÖ÷ÌâÔÚÓÚͨ¹ýԤװ¹Ì¼þµÄ·½Ê½£¬½«µÍ³É±¾°²×¿É豸ת»¯Îª½©Ê¬ÍøÂç½Úµã£¬ÉõÖÁÔÚÓû§²É°ìÉ豸ǰ±ãÒÑÂñ·üÆäÖС£BADBOX 2.0µÄΣÏÕÐÔÔ´ÓÚÆä¹ÖÒìµÄ´«²¼Ä£Ê½£º·ÖÆçÓÚ´«Í³¶ñÒâÈí¼þͨ¹ý¶ñÒâÏÂÔØ»òÐéαÀûÓô«²¼£¬ËüÖ±½ÓǶÈëÉ豸¹Ì¼þ£¬ÔÚÔì×÷½×¶Î¼´±»Ô¤×°¡£ÕâÒâζ×ÅÓû§²ð·âÐÂÉ豸¡¢³õ´ÎÆô¶¯Ê±±ãÒѶ³öÔÚÍþвÖС£×êÑÐÏÔʾ£¬ÊÜϰȾÉ豸¶àÀ´×Ôδ¾­Ñϸñ°²È«Éó²éµÄ¹©¸øÁ´£¬ÓÈÆäÊÇһЩÎÞÆ·ÅÆ»ò³¬Á®¼Û²úÆ·£¬²¿ÃÅÉõÖÁͨ¹ýÑÇÂíÑ·µÈÖ÷Á÷ƽ̨ÏúÊÛ¡£Ò»µ©¼¤»î£¬¶ñÒâÈí¼þ»áͨ¹ýÔ­ÉúºóÃÅ¿âlibanl.so£¨ÉîǶ¹Ì¼þ£©ÔÚºó¶Ü¾²Ä¬ÔËÐУ¬¼´±ã¸´Ô­³ö³§ÉèÖÃÈÔÎÞ·¨¶Ï¸ù¡£¸Ã¶ñÒâÈí¼þµÄÖ÷ÌâÖ°ÄÜÊǽ«É豸±äΪ¡°×¡Õ¬´úÀíÍøÂ硱½Úµã£¬ÏúÊÛ¸ø·¸×OÍÅÓÃÓÚ°µ²Øµã»÷ڲƭ¡¢Æ¾Ö¤Ìî³äµÈÍøÂç¹¥»÷µÄ×ÙÓ°¡£Æä×é¼þÔ̺¬´¥·¢¶ñÒâÄ£¿éµÄlibanl.so¡¢ÕƹÜÓÆ¾Ã»¯µÄJavaÄ£¿ép.jarºÍq.jar£¬ÒÔ¼°ÏµÍ³¼¶ÀûÓÃcom.hs.app£¬Í¨¹ý¼ÓÃÜͨѶÓëC2ÓòÃû½»»¥¡£Êܺ¦Õß¿ÉÄܾõ²ìÉ豸Òì³££ºÏÐÖÃʱCPUÕ¼ÓÃÂʸߡ¢·¢ÈÈÑϳÁ¡¢»úÄܽµÂä»òÍøÂçÁ÷Á¿Òì³££¬µ«ÍùÍùÄÑÒÔ×·ÒäÔ´Í·¡£


https://hackread.com/badbox-2-0-preinstalled-android-iot-devices-worldwide/


4. Å·ÖÞÐ̾¯×éÖ¯µ·»ÙÇ×¶íµÄNoName057(16) DDoSºÚ¿Í×éÖ¯


7ÔÂ16ÈÕ£¬Ò»³¡´úºÅΪ¡°ÒÁË¹ÌØÎéµÂÐÔ¶¯¡±µÄ¹ú¼Ê·¨ÂÉÐж¯Õë¶ÔÇ×¶íºÚ¿Í×éÖ¯NoName057(16)·¢Õ¹¾«×¼½ø¹¥¡£¸ÃÐж¯ÓÉÅ·ÖÞÐ̾¯×éÖ¯ºÍÅ·ÖÞ˾·¨×é֯ǣͷ£¬½áºÏ12¸ö¹ú¶ÈµÄ·¨ÂÉÁ¦Á¿£¬Ö¸±êÖ±Ö¸Õâ¸ö×Ô2022ÄêÎÚ¿ËÀ¼Õ½Õù·¢×÷ºó»îÔ¾µÄÇ×¶íºÚ¿Í¼¯Ìå¡£NoName057(16)ÒÔTelegramƵ·ºÍ¡°DDoSia¡±¶à°üÏîĿΪ¹¤¾ß£¬Í¨¹ý×ÔÔ¸ÕßÍÆËã»úÌáÒéÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷£¬³Ö¾ÃÕë¶ÔÅ·ÖÞ¡¢ÒÔÉ«ÁкÍÎÚ¿ËÀ¼µÄÖ§³ÖÎÚ¿ËÀ¼»ú¹¹£¬Ô̺¬±±Ô¼Õ¾µã¡¢µ±¾Ö»ú¹¹¡¢ÒøÐÓ×¢ÄÜÔ´¹©¸øÉ̼°Ã½Ìå×éÖ¯¡£¾ÝÅ·ÖÞÐ̾¯×éÖ¯Åû¶£¬¸Ã×éÖ¯µÄ¹¥»÷»î¶¯ÔøÇÖÈŵ¹ú¡¢²¨À¼¡¢Á¢ÌÕÍðµÈ¹úµÄ¹Ø¼ü·þÎñ¡£Õâ´ÎÐж¯ÖУ¬·¨ÂÉ»ú¹¹ÔÚ7¹ú·¢Õ¹ËѲ飬·ÛËé»òÏÂÏß100Óą̀·þÎñÆ÷£¬¿ÛÁô2ÈË£¬²¢·¢³ö7·ÝÅ·ÖÞ¿ÛÁôÁָ±êÖ±Ö¸ÒþÄäÓÚ¶íÂÞ˹µÄÖ÷Ìâ³ÉÔ±¡£´Ë±í£¬µ±¾ÖÏò1100Ãû²Î¼ÓÕß¼°17ÃûÖÎÀíÔ±·¢ËÍTelegramÖҸ棬Ã÷È·Æä˾·¨ÔðÈΡ£Ö»¹ÜÐж¯¶ÔNoName057(16)Ôì³É³ÁÃͽø¹¥£¬µ«ÒòÆäÖ÷Ìâ³ÉԱλÓÚ¶íÂÞ˹£¬»ù´¡ÉèÊ©¿ÉÄܼ±¾ç³Á½¨¡£


https://www.bleepingcomputer.com/news/security/europol-disrupts-pro-russian-noname05716-ddos-hacktivist-group/


5. UNC6148ÀûÓÃOverstep¶ñÒâÈí¼þ¹¥»÷¹ýÆÚSonicWallÉ豸


7ÔÂ16ÈÕ£¬¹È¸èÍþвµý±¨Ó××飨GTIG£©½üÈÕÖҸ棬һ¸ö±»×·×ÙΪUNC6148µÄÍþвÐÐΪÕßÕýÕë¶ÔÒÑʵÏÖÖ§³Öµ«ÈÔÔÚʹÓÃÖеÄSonicWall Secure Mobile Access£¨SMA£©100ϵÁÐÉ豸ÌáÒéÐÂÐ͹¥»÷¡£¸Ã×éÖ¯×Ô2024Äê10ÔÂÆð»îÔ¾£¬Í¨¹ý²¿Êðδ֪¶ñÒâÈí¼þOVERSTEP£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡¢Æ¾Ö¤µÁÓü°Ç±ÔÚÀÕË÷Èí¼þ²¿Êð£¬Æä»î¶¯¿ÉÄܹØÁªWorld LeaksÊý¾Ýй¶ƽ̨¡£¹¥»÷Ö¸±êΪÒÑÆëÈ«½¨²¹µ«ÊÙÃüÖÕÖ¹£¨EoL£©µÄSMAÉ豸£¬ÕâÀàÉ豸Òò²»×ã³§Ḛ́²È«¸üУ¬³ÉΪ·ì϶ÀûÓõÄδ²¡£UNC6148ͨ¹ý¶à¸öÒÑÖª·ì϶£¨ÈçCVE-2025-32819¡¢CVE-2024-38475µÈ£©ÇÔÈ¡±¾µØÖÎÀíԱʹ´¦£¬ËæºóÀûÓÃSSL-VPN»á»°³ÉÁ¢·´ÏòShell£¬Ö»¹ÜSonicWallÉ豸Éè¼ÆÉϲ»ÈÝShell½Ó¼û£¬µ«¹¥»÷Õß¿ÉÄÜÀûÓÃδ֪ÁãÈÕ·ì϶ʵÏÖÍ»ÆÆ¡£Ò»µ©»ñµÃȨÏÞ£¬ÍþвÐÐΪÕßÊÖ¶¯¶Ï¸ùϵͳÈÕÖ¾ÒÔ¸²¸Ç×ÙÓ°£¬²¢²¿ÊðOVERSTEP¶ñÒâÈí¼þ¡£OVERSTEP×÷ΪÓû§Ä£Ê½Rootkit£¬Í¨¹ýÅú¸ÄÉ豸Æô¶¯Á÷³ÌʵÏÖÓÆ¾Ã»¯£¬¾ß±¸Òñ±ÎÇÔȡʹ´¦¡¢»á»°ÁîÅÆ¼°Ò»´ÎÐÔÃÜÂ루OTP£©ÖÖ×ÓµÄÄÜÁ¦¡£Ö»¹ÜδÃ÷È·È·ÈϾ­¼Ã¶¯»ú£¬µ«Êܺ¦É豸Êý¾Ý±»°ä²¼ÖÁWorld LeaksÍøÕ¾£¬°µÊ¾Ç±ÔÚÀÕË÷Òâͼ¡£


https://www.securityweek.com/sonicwall-sma-appliances-targeted-with-new-overstep-malware/


6. Century Support ServicesÔâÊý¾Ýй¶£¬16ÍòÈËÃô¸ÐÐÅÏ¢±»ÇÔ


7ÔÂ15ÈÕ£¬±öϦ·¨ÄáÑÇÖÝÕ®ÎñÇå³¥¹«Ë¾Next Level Finance Partners£¨ÒÔCentury Support ServicesÃûÒåÔËÓª£©½üÈÕÅû¶һ·³Á´óÊý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÓâ16ÍòÃûÓû§¡£¸Ã¹«Ë¾ÓÚ2024Äê11Ô¼ì²âµ½ÏµÍ³ÔâºÚ¿ÍÈëÇÖ£¬¾­5ÔÂÏÂѮʵÏֵĵ÷²éÈ·ÈÏ£¬¹¥»÷Õß¿ÉÄܽӼû»òÇÔÈ¡ÁË´æ´¢Óû§Ó×ÎÒÐÅÏ¢µÄÎļþ¡£Õâ´ÎÊÂÎñ³ÉΪÓÖÒ»Â·Éæ¼°¸ßÃô¸ÐÊý¾Ýй¶µÄ°²È«±äÂÒ¡£Ð¹Â¶ÐÅÏ¢º­¸Ç¶à¸ö¹Ø¼üÁìÓò£¬Ô̺¬Óû§ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÕÕ/ÖÝÉí·ÝÖ¤/»¤ÕÕºÅÂëµÈÉí·Ý±êʶ£¬ÒÔ¼°Ò½Áƽ¡È«±£ÏÕÐÅÏ¢¡¢½ðÈÚÕË»§Êý¾Ý¼°Êý×ÖÊðÃû¡£ÕâЩÐÅÏ¢Èô±»ÀÄÓ㬿ÉÄܵ¼ÖÂÉí·ÝµÁÓᢽðÈÚÚ¿Æ­»òÒ½ÁÆÐÅϢй¶µÈÑϳÁ·çÏÕ¡£Æ¾¾ÝCentury Support ServicesÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄ»ã±¨£¬ÆäÀۼƷþÎñ¿Í»§½ü30Íò£¬Õâ´Îй¶¹æÄ£Õ¼Æä¿Í»§ÈºµÄ°ëÊýÒÔÉÏ¡£ÊÂÎñÆØ¹âºó£¬¸Ã¹«Ë¾°ä·¢ÎªÊÜÓ°ÏìÓû§Ìṩ12¸öÔµÄÃâ·ÑÉí·ÝµÁÓñ£»¤¼°ÐÅÓþ¼à¿Ø·þÎñ£¬ÒÔ»º½âDZÔÚ·çÏÕ¡£½ØÖÁĿǰ£¬ÉÐδÓÐÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬¹¥»÷¶¯»úÈÔ²»Ã÷È·¡£


https://www.securityweek.com/data-breach-at-debt-settlement-firm-impacts-160000-people/