WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØµãÓ밲ȫ¾¯Ê¾
°ä²¼¹¦·ò 2025-09-241. WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØµãÓ밲ȫ¾¯Ê¾
9ÔÂ21ÈÕ£¬Sophos×êÑÐÍŶӽÒʾ£¬ÃûΪWarlockµÄÀÕË÷Èí¼þ×éÖ¯£¨Î¢Èí³ÆStorm 2603£¬Sophos×·×ÙΪGOLD SALEM£©ÕýÒÔ¸ßÃ÷¼¼Êõ¼¿Á©¼Ó¾çÈ«ÇòÍøÂç¹¥»÷¡£¸Ã×éÖ¯×Ô2025Äê3ÔÂÆð»îÔ¾£¬9ÔÂÒÑÔÚÆä"Warlock¿Í»§Êý¾Ýй¶Ðã"°µÍøÕ¾µã°ä²¼60ÃûÊܺ¦Õߣ¬Ö¸±êº¸Ç±±ÃÀ¡¢Å·ÖÞ¡¢ÄÏÃÀµÄÓ×ÐÍóÒ×ʵÌå¡¢µ±¾Ö»ú¹¹¼°´óÐÍ¿ç¹ú¹«Ë¾¡£Æä¹¥»÷ÌØµãÔ̺¬ÀûÓÃSharePointÁãÈÕ·ì϶¡¢²¿Êð×Ô½ç˵ToolShellÁ´¡¢Í¶·ÅWeb Shell¼°»ùÓÚGolangµÄWebSocket·þÎñÆ÷½øÐÐÓÆ¾Ã»¯£¬²¢ÀÄÓÃVelociraptorµÈºÏ·¨¹¤¾ßÖ´ÐÐÒñ±ÎËí·¹¥»÷£¬Í¬Ê±½áºÏMimikatzƾ֤͵ÇÔ¡¢PsExecºáÏòÒÆ¶¯¼°GPOÍÆËÍÀÕË÷¸ºÔصȴ«Í³ÊÖ·¨¡£¸Ã×é֯йÃÜģʽ¹ÖÒ죬ʡÂÔ°ä²¼ÈÕÆÚÓëÊÓ¾õÑù±¾£¬½öËæ»úÅû¶±»µÁÊý¾ÝÁ¿£¬²¢Í¨¹ý×¢½â±ê×¢Êý¾Ý״̬£¨°ä²¼/ÏúÊÛ/δ֧¸¶Êê½ð£©£¬ÉõÖÁÌṩÏÖʵÊý¾ÝÁ´½Ó¡£ÆäFAQÉêÃ÷ß³Ôð"²»ÕƹÜÈεĹ«Ë¾"£¬³ÆÎ´ÁªÏµµÄ´ó¿Í»§Êý¾Ý½«Ãâ·Ñ¹«¿ª£¬µ«"¸ß¶ÈÃô¸ÐÊý¾Ý"µÄ´óÐÍÆóÒµ¿Í»§ÐÅÏ¢²»»áÆëÈ«Åû¶¡£SophosÖ¸³ö£¬WarlockÖ±ÖÁ6Ô²ÅÔÚ¶íÓïÂÛ̳Ramp¹«¿ª»îÔ¾£¬ÔøÕ÷¼¯Veeam¡¢ESXi¡¢SharePoint·ì϶ÀûÓü°EDRÖжϹ¤¾ß¡£
https://cybernews.com/security/warlock-ransomware-group-attacks-surge-september/
2. Æ×ÓÀÄÓÃÈËΪÖÇÄÜÔÉúƽ̨ÍйÜÐéαÑéÖ¤ÂëÒ³Ãæ
9ÔÂ22ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Ç÷Ïò¿Æ¼¼×îл㱨½Òʾ£¬ÈËΪÖÇÄÜ¿ª·¢Æ½Ì¨Õý±»ÍøÂç·¸×ï·Ö×ÓÀûÓ㬳ÉΪÍйÜÐéαÑéÖ¤Â루CAPTCHA£©Ò³ÃæµÄÐÂÔØÌ壬´Ó¶øÌӱܰ²È«¼ì²â²¢ÓÕµ¼Óû§½øÈë´¹µöÍøÕ¾¡£×÷ΪÑéÖ¤ÕæÊµÓû§µÄ¹Ø¼ü¹¤¾ß£¬CAPTCHA±¾Ó¦ÕмܻúеÈ˹¥»÷£¬Èç½ñÈ´±»·´ÏòÀûÓ㬳ÉÎªÍøÂç´¹µöµÄ"צÑÀ"¡£×êÑз¢ÏÖ£¬×Ô2025Äê1ÔÂÆð£¬ÀûÓÃLovable¡¢Netlify¡¢VercelµÈAIÔÉú¿ª·¢Æ½Ì¨ÍйÜÐéαÑéÖ¤ÂëÒ³ÃæµÄÍøÂç´¹µö»î¶¯¼¤Ôö¡£ÕâЩƽ̨Ðû³Æ"Áã´úÂë¼´¿É¹¹½¨ÀûÓÃ"£¬½µµÍÁ˼¼ÊõÃż÷£¬Ê¹·¸×ï·Ö×ÓÄܼ±¾ç´´½¨¿´ËÆÕý¹æµÄÑéÖ¤ÂëÌôÕ½Ò³Ãæ¡£¹¥»÷Á÷³Ìͨ³£Ê¼ÓÚ¼Ù×°³É"ÃÜÂë³ÁÖÃ""USPSµØÖ·µ÷»»"µÈ´¹Î£ÓʼþµÄ´¹µöÁ´½Ó£¬Óû§µã»÷ºóÊ×ÏÈ¿´µ½ÐéαCAPTCHAÒ³Ãæ£¬ÒòÆä"¹Ù·½ÑéÖ¤"±í¹Û£¬Êܺ¦ÕßÒ×·ÅËɾ¯Ì裬¶ø×Ô¶¯É¨Ã蹤¾ßÒò½ö¼ì²âµ½ÑéÖ¤Âë¶ø·Çµ×²ãÆ¾Ö¤ÍøÂç±íµ¥£¬ÄÑÒÔ¼ø±ð¶ñÒâÒ³Ãæ¡£ÊµÏÖÑéÖ¤ºó£¬Óû§»á±»³Á¶¨ÏòÖÁÕæÕýµÄ´¹µöÒ³Ãæ£¬µ¼ÖÂÆ¾Ö¤¡¢Ãô¸ÐÊý¾Ýй¶¡£¸üÑϸñµÄÊÇ£¬¹¹½¨´ËÀàÒ³Ãæ½öÐè»ù´¡¼¼ÊõÄÜÁ¦£¬¹²Í¬AI±àÂ븱ÊÖ¼´¿ÉʵÏÖ¡£
https://cybernews.com/security/ai-platforms-captcha-phishing/
3. µÂ¹úDCS³äµçÕ¾Êý¾Ýй¶£¬¿Í»§·þÎñÉÌÎ¥¹æ½Ó¼ûÖÂÓû§ÐÅÏ¢·çÏÕ
9ÔÂ23ÈÕ£¬µÂ¹úÊý×Ö³äµç½â¾ö¹æ»®¹«Ë¾£¨DCS£©½üÈÕÏòÓû§´«µÝһ·Êý¾Ý°²È«ÊÂÎñ£¬Æä¿Í»§·þÎñÌṩÉÌÔÚ´¦ÖÃÊý¾Ýʱ²úÉúÎ¥¹æÐÐΪ£¬µ¼Ö²¿Ãſͻ§ÐÅÏ¢Ãæ¶Ôй¶·çÏÕ¡£DCS×÷ΪŷÖÞÖØÒªµç¶¯Æû³µ³äµç·þÎñÉÌ£¬ÖÎÀí×Å30¶à¸ö¹ú¶È³¬100ÍòÓû§¼°98Íò×ù³äµçÕ¾£¬²¢Îª±¦Âí¡¢ÆðÑÇµÈÆ·ÅÆÌṩ¼Æ·Ñ·þÎñ¡£ÊÂÎñ·¢Ô´ÓÚDCS·¢ÏÔìäºÏ×÷µÄ·þÎñÉÌÔÚÎÞºÏÀíÀíÓÉÇé¿öϽӼûÁ˿ͻ§Êý¾Ý¡£DCSµ±¼´Æô¶¯È«Ãæµ÷²é£¬È·ÈÏÎ¥¹æÐÐÎªÉæ¼°¸öλÊý²¡Àý£¬ÊÜÓ°ÏìÊý¾Ý½öÏÞÓÚÐÕÃûºÍµç×ÓÓʼþµØÖ·£¬¶øÆëȫ֧¸¶ÐÅÏ¢Òòδ´æ´¢ÔÚÊÜÓ°ÏìÊý¾Ý¿âÖеÃÒÔ±£È«¡£Ä¿Ç°£¬DCSÒÑÓë·þÎñÉÌÖÎÀí²ãºÏ×÷²éÃ÷ÔÒò£¬Ö´Ðжî±í°²È«´ëÊ©£¬²¢´«µÝ·¨Âɼ°Êý¾Ý±£»¤²¿ÃÅ¡£DCSÔÚ9ÔÂ19ÈÕÉèÁ¢µÄרÏîÒ³ÃæÖÐÇ¿µ÷£¬³äµç·þÎñ¼°¼Æ·ÑϵͳÈÔ°²È«ÔËÐУ¬Óû§ÎÞÐè²ÉÈ¡¶î±í²Ù×÷£¬µ«Ð辯ÌèDZÔÚ´¹µö¹¥»÷¡£¹«Ë¾³ÁÉֻ꣬¹Üµ±Ç°½öÈ·ÈÏÉÙÊý°¸Àý£¬µ«ÎÞ·¨ÆëÈ«ÅųýÆäËû¿Í»§Êý¾Ý±»·ÇÊÚȨ²é¿´µÄ¿ÉÄÜÐÔ£¬µ÷²éÈÔÔÚ½øÐÐÖС£
https://www.theregister.com/2025/09/23/dcs_data_breach/
4. ŦԼ½áºÏ¹ú´ó»áǰϦ·ÛËé´óÐ͵çÐÅÍøÂç
9ÔÂ23ÈÕ£¬ÔÚ½áºÏ¹ú´ó»áÓÚÂü¹þ¶ÙÕÙ¿ªÇ°Ï¦£¬Áª¹úµ÷²éÈËÔ±·ÛËéÁËÒ»¸ö°µ²ØÔÚŦԼµØÓòµÄ´óÐ͵çÐÅÍøÂç¡£¸ÃÍøÂçÔ̺¬³¬¹ý10ÍòÕÅSIM¿¨ºÍ300̨·þÎñÆ÷£¬¿ÉÄܶÔŦԼÊÐͨѶϵͳÔì³É¿àÄÑÐÔ·ÛËé¡£ÌØÇÚ¾ÖÖ¸³ö£¬´ËÍøÂç¿É×ÌÈÅ´¹Î£ÏìÓ¦·þÎñ¡¢¹Ø¹Ø·äÎÑÍøÂç²¢·¢ËͼÓÃÜÐÅÏ¢£¬Ç¡·ê150Óàλ¹ú¼Ê¸¨µ¼ÈËÆë¾ÛŦԼÆÚ¼ä¡£µ÷²éÏÔʾ£¬¸ÃÍøÂçÉ豸ɢ²¼ÓÚ½áºÏ¹ú×ܲ¿35Ó¢Àï°ë¾¶ÁìÓòÄÚ£¬¹æÄ£ÓëÉ豸ÀàÐͰµÊ¾Æä¿ÉÄÜΪÃñ×å¹ú¶È¼à¿ØÐж¯¡£Í¨¹ý¶ÈÎöSIM¿¨Êý¾Ý£¬ÌØÇÚ¾Ö·¢ÏÔìäÓëÖÁÉÙÒ»¸ö±í¹úµ±¾Ðİ··¶¾¼¯ÍÅ´æÔÚ¹ØÁª¡£Ö»¹Ü½áºÏ¹ú´ó»áÊÇ·ñΪָ±êÉв»Ã÷È·£¬µ«ÌØÇÚ¾Ö¼éϸÂíÌØ¡¤Âó¿Ë¿â¶ûÇ¿µ÷£¬¸Ãϵͳ¾ß±¸·ÛËéÊÖ»úÐźÅËþ¡¢×è¶ÏÓ¦¼±Í¨Ñ¶µÄÄÜÁ¦£¬ÔÚ³Á´ó¹ú¼Ê»î¶¯²¼¾°Ï¿ÉÄÜÒý·¢³ÇÊм¶Í¨Ñ¶Ì±»¾¡£¸ÃÍøÂçÓÚ½ñÄê8Ô±»ÌØÇÚ¾ÖÔÚµ÷²éÕë´ºÁª¹ú¹ÙÔ±µÄ¡°µç»°Íþв¡±ÊÂÎñʱ·¢ÏÖ¡£Âó¿Ë¿â¶û°µÊ¾£¬½âÎöÍøÂç´«ÊäµÄͨѶÄÚÈÝÐèʱÈÕ£¬µ«ÏµÍ³ÍþÁ¦²»ÈÝÓ×ê˼¿¼µ½É豸¼ÛÖµÊý°ÙÍòÃÀÔª£¬Ä»ºó×éÖ¯×ʽðÐÛºñ£¬¿ÉÄÜ´æÔÚÀàËÆÍøÂç±é²¼ÃÀ¹úÆäËû³ÇÊС£
https://securityboulevard.com/2025/09/secret-service-shuts-down-sprawling-hidden-telecom-network-in-ny/
5. CISA³ÆºÚ¿ÍÀûÓÃGeoServer·ì϶ÈëÇÖÁª¹ú»ú¹¹
9ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Åû¶£¬2024Äê7Ô£¬¹¥»÷ÕßÀûÓÃ佨²¹µÄGeoServerÊ·ý£¨Éæ¼°CVE-2024-36401Ô¶³Ì´úÂëÖ´Ðзì϶£©ÇÖÈëÁËÒ»¼ÒÃÀ¹úÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÍøÂç¡£¸Ã·ì϶ÓÚ2024Äê6ÔÂ18ÈÕ±»½¨¸´£¬µ«Ò»¸öÔºó£¬Òò°²È«×êÑÐÈËÔ±ÔÚÏß·ÖÏí¸ÅÏëÑéÖ¤£¨PoC£©ÑÝʾ´úÂ룬CISA½«Æä²ÎÓë¡°ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼¡±¡£Íþв¼à¿Ø×éÖ¯ShadowserverÓÚ7ÔÂ9ÈÕÆð¼ì²âµ½Õë¶Ô¸Ã·ì϶µÄ¹¥»÷£¬OSINTËÑË÷ÒýÇæZoomEye×·×Ùµ½³¬16,000̨¶³öÔÚÍøµÄGeoServer·þÎñÆ÷¡£¹¥»÷ÕßÈëÇÖÁª¹ú»ú¹¹GeoServer·þÎñÆ÷ºó£¬ÔÚÔ¼Á½ÖÜÄÚºáÏòÒÆ¶¯¹¥ÏÂWeb·þÎñÆ÷ºÍSQL·þÎñÆ÷£¬ÉÏ´«China ChopperµÈWeb Shell¼°ÓÃÓÚÔ¶³Ì½Ó¼û¡¢Óƾû¯¡¢ºÅÁîÖ´ÐкÍȨÏÞÌáÉýµÄ¾ç±¾£¬²¢Í¨¹ý±©Á¦ÆÆ½â¼¼Êõ£¨T1110£©»ñÈ¡ÃÜÂëÒÔ½øÒ»²½ºáÏòÒÆ¶¯¡£¹¥»÷ÕßÂñ·üÈýÖÜδ±»·¢ÏÖ£¬Ö±ÖÁ7ÔÂ31ÈÕÁª¹ú»ú¹¹µÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©¹¤¾ß½«SQL·þÎñÆ÷ÉϵĿÉÒÉÎļþÏóÕ÷Ϊ¶ñÒâÈí¼þ²¢´¥·¢¾¯±¨£¬°²È«ÔËÓªÖÐÐÄ£¨SOC£©Ëæºó¸ôÀë·þÎñÆ÷²¢½áºÏCISAµ÷²é¡£
https://www.bleepingcomputer.com/news/security/cisa-says-hackers-breached-federal-agency-using-geoserver-exploit/
6. Circle KÏã¸ÛÒµÎñÒòÍøÂçÖжÏ̱»¾
9ÔÂ23ÈÕ£¬½üÈÕ£¬·½±ãµêÁ¬ËøÆ·ÅÆCircle KÏã¸ÛÒµÎñÒò¡°ÍøÂçÖжϡ±ÊÂÎñµ¼ÖÂÈ«¸Û½ü400¼ÒÃŵêµç×ÓÖ§¸¶¡¢»áÔ±·þÎñ¼°µç×ÓÓʼþϵͳ̱»¾ÊýÈÕ£¬½öÏֽ𼰰˴ï֧ͨ¸¶Ö°ÄÜά³ÖÔË×÷¡£¸Ã¹«Ë¾ÓÚÖÜÄ©³õ´Î´«µÝÊÂÎñºó£¬ÖÜÒ»ÔÚFacebookÉêÃ÷ÖаµÊ¾£¬ÒòÎÞ·¨ÅųýÍøÂç¹¥»÷¿ÉÄÜÐÔ£¬ÒÑÆô¶¯Êý¾Ý±£»¤´ëÊ©²¢Óë·¨Âɲ¿Ãż°µÚÈý·½×¨¼ÒºÏ×÷µ÷²éÔÒò¡¢ÁìÓò¼°Ó°Ïìˮƽ¡£½ØÖÁÖܶþ£¬Óû§ÈÔͨ¹ýÉ罻ýÌå·´À¡·þÎñÖжÏÎÊÌ⣬Èç»ý·ÖºÍÓÅ»Ýȯ¹ýÆÚ£¬ºôÓõµ¢¸éʹÓÃÆÚÏÞ¡£Circle KÏã¸ÛÓɼÓÄôó¹«Ë¾Alimentation Couche-TardËùÓУ¬¸Ã¹«Ë¾ÔÚ±±ÃÀ¼°ÆäËûµØÓò¾ÓªCircle KÉ̵ꡣCircle KÏã¸ÛµÄǰĸ¹«Ë¾ÑÇÖÞ·½±ãÁãÊÛÓÐÏÞ¹«Ë¾ (CRA) ÖÜÒ»Ò²»ã±¨ÁËÍøÂçÖжϡ£CRAÓÚ20ÊÀ¼Í80Äê´ú»ñµÃÁËCircle KµÄÊÚȨ£¬²¢ÓÚ2020Ä꽫ÆäÊۻظøAlimentation Couche-Tard¡£CRA°µÊ¾£¬ÆäÄÚ²¿ÏµÍ³Êܵ½Ó°Ï죬²¢ÒÑ֪ͨ·¨Âɲ¿ÃÅ£¬µ«Ä¿Ç°Éв»Ã÷ÏÔÁ½ÆðÊÂÎñÊÇ·ñÓйØÁª¡£
https://therecord.media/circle-k-hong-kong-suspected-cyberattack-convience-stores


¾©¹«Íø°²±¸11010802024551ºÅ