APT36ÀûÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶Èµ±¾Ö
°ä²¼¹¦·ò 2025-10-271. APT36ÀûÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶Èµ±¾Ö
10ÔÂ24ÈÕ£¬½üÈÕ£¬°Í»ù˹̹¹ú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯Transparent Tribe£¨APT36£©Õë¶ÔÓ¡¶ÈµÐÔÖʵÌåÌáÒéÓã²æÊ½ÍøÂç´¹µö¹¥»÷£¬´«²¼»ùÓÚGolangµÄDeskRAT¶ñÒâÈí¼þ¡£¸Ã¹¥»÷Á´Í¨¹ýº¬ZIP¸½¼þ»òGoogle DriveÁ´½ÓµÄ´¹µöÓʼþÖ´ÐУ¬ÀûÓÃMozilla FirefoxÏÔʾµö¶üPDFÎļþµÄͬʱִÐÐÖ÷ÔØºÉ¡£DeskRATͨ¹ýWebSocket³ÉÁ¢C2Ïνӣ¬Ö§³Öping¡¢heartbeatµÈÎåÖÖºÅÁ²¢Ñ¡È¡systemd·þÎñ¡¢cron×÷ÒµµÈËÄÖÖÓÆ¾ÃÐÔ²½Öè¡£ÆäC2·þÎñÆ÷ѡȡÒþÐÎÉè¼Æ£¬Î´³Ê´Ë¿Ì¹«¿ªNS¼Í¼ÖС£Õâ´Î»î¶¯Ò»Á¬ÁËCYFIRMA´ËǰÅû¶µÄ¹¥»÷ģʽ£¬²¢¹ØÁªµ½¿çƽ̨ºóÃÅStealthServer¡£¸ÃºóÃÅ´æÔÚWindowsÈý°æ±¾¼°LinuxÁ½±äÖÖ£ºWindows-V3°æ±¾Ñ¡È¡WebSocketͨѶ£¬ÓëDeskRATÖ°ÄÜÒ»Ö£»Linux±äÖÖÔòͨ¹ýHTTPͨѶ£¬¾ß±¸Îļþä¯ÀÀ¡¢ÉÏ´«¼°Ö´ÐÐÄÜÁ¦£¬¿É´Ó¸ùĿ¼µÝ¹éËÑË÷ÌØ¶¨À©´óÃûÎļþ²¢¼ÓÃÜ´«Êä¡£
https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
2. Windows Server WSUS¸ßΣ·ì϶ÔâÒ°±íÀûÓÃ
10ÔÂ24ÈÕ£¬½üÈÕ£¬ÍøÂ簲ȫÁìÓò¾Û½¹ÓÚ±àºÅΪCVE-2025-59287µÄ¸ßΣԶ³Ì´úÂëÖ´Ðзì϶£¬¸Ã·ì϶ӰÏìÆôÓÃÁËWindows Server¸üзþÎñ£¨WSUS£©·þÎñÆ÷½ÇÉ«µÄWindows Serverϵͳ£¬ÓÈÆäÊÇ×÷Ϊ×éÖ¯ÄÚÆäËûWSUS·þÎñÆ÷¸üÐÂÔ´µÄ·þÎñÆ÷¡£¹¥»÷Õß¿ÉÎÞÐèÌØÈ¨»òÓû§½»»¥£¬Ô¶³ÌÀûÓô˷ì϶ÒÔSYSTEMȨÏÞÖ´ÐжñÒâ´úÂ룬²¢¿ÉÄÜÔÚWSUS·þÎñÆ÷¼äºáÏò´«²¼¡£Î¢ÈíÒÑÕë¶ÔËùÓÐÊÜÓ°Ïì°æ±¾°ä²¼´ø±í°²È«¸üУ¬²¢Ç¿ÁÒ½¨ÒéITÖÎÀíÔ±¾¡¿ì²¿Êð¡£¶ÔÓÚÎÞ·¨µ±¼´¸üеÄϵͳ£¬Î¢ÈíÌṩÁËһʱ½â¾ö¹æ»®£¬Èç½ûÓÃWSUS·þÎñÆ÷½ÇÉ«¡£·ì϶¹«¿ªºó£¬HawkTrace Security°ä²¼Á˲»ÔÊÐíÖ´ÐÐËÁÒâºÅÁîµÄ¸ÅÏëÑéÖ¤£¨PoC£©´úÂ룬µ«Eye SecurityºÍHuntress LabsËæ¼´¹Û²ìµ½Ò°±íÀûÓó¢ÊÔ¡£Eye Security»ã±¨ÖÁÉÙÒ»Ãû¿Í»§ÏµÍ³Ôâ¹¥»÷£¬ÇÒ¹¥»÷ÊÖ·¨ÓëHawkTraceµÄPoC·ÖÆç£»HuntressÔò·¢ÏÖ×Ô10ÔÂ23ÈÕÆð£¬Õë¶Ô¶³ö8530/8531¶Ë¿ÚµÄWSUSÊ·ýµÄ¹¥»÷£¬¹¥»÷Õßͨ¹ýPowerShellºÅÁî¿úËÅÄÚ²¿WindowsÓò²¢½«Êý¾Ý·¢ËÍÖÁwebhook¡£HuntressÖ¸³ö£¬Ô¼25̨Ö÷»úÒ×Êܹ¥»÷£¬µ«Ô¤¼ÆÀûÓÃÂʽϵͣ¬ÒòWSUSͨ³£²»Â¶³öÓÚ¹«Íø¡£
https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/
3. AT&TÕÐÆ¸Æ½Ì¨ÔâEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷
10ÔÂ24ÈÕ£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾°ä²¼Õë¶ÔAT&T Careersƽ̨µÄÀÕË÷ÐÅÏ¢£¬Ðû³Æ°ÑÎÕ576,686ÌõÓë¸ÃµçОÞÍ·ÕÐÆ¸Æ½Ì¨ÓйصÄÓ×ÎҼͼ£¬²¢ÉèÖÃËÄÌìºó¹«¿ªÊý¾ÝµÄµ¹¼ÆÊ±¡£¸ÃÌõ¿î±»ÃÜÂë±£»¤£¬ÒªÇóAT&T´ú±íÔÚʱÏÞÄÚ¡°°´Åúʾ²Ù×÷¡±£¬²»È»Êý¾Ý½«±»¹«¿ª¡£EverestÒÔ°ä²¼±»µÁÊý¾Ý¿â¼°ÀÕË÷ÒªÇóÎÅÃû£¬ÆäйÃÜÍøÕ¾Ëä½ñÄêÔâ·ÛË鵫ÈÔ»îÔ¾£¬Êܺ¦ÕßÃûµ¥³ÖÐø¸üС£AT&TÉÐδ֤ʵÕâ´ÎÊÂÎñ£¬µ«¸Ã¹«Ë¾º¹ÇàÊý¾Ýй¶Ƶ·¢£º2021Äê8ÔÂShinyHuntersºÚ¿Í×éÖ¯ÇÔÈ¡7000Íò¿Í»§Êý¾Ý²¢ÏúÊÛ£¬AT&TÖ±ÖÁ2024Äê4Ô²ÅÈϿɣ»2025Äê6Ô£¬8600ÍòÌõº¬½âÃÜÉç»á°²È«ºÅÂ루SSN£©µÄ¼Í¼±»Ð¹Â¶£¬AT&TΪ´ËÖ§¸¶1.77ÒÚÃÀÔªºÍ½â½ð¡£µ±Ç°£¬ÊÜÓ°ÏìÕߣ¨ÉêÇëÈË¡¢Ô±¹¤¡¢¹Û²ìÔ±£©Ðè²ÉÈ¡·À»¤´ëÊ©£º¸ü¸ÄAT&TÕË»§ÃÜÂë²¢Ô¤·À³Á¸´Ê¹Óã»ÆôÓöà³É·ÖÈÏÖ¤£»¼à¿Ø²ÆÕþ¡¢ÐÅÓþ¼°Í¨Ñ¶Òì³££»¾¯Ìè¡°AT&TÖ°Òµ¡±Óйش¹µö¹¥»÷£»½öͨ¹ý¹Ù·½Çþ·»ñȡ֪ͨ£¬Îðµã»÷δ¾ÑéÖ¤Á´½Ó¡£
https://hackread.com/everest-ransomware-att-careers-breach/
4. WordPress²å¼þ¸ßΣ·ì϶Òý·¢´ó¹æÄ£RCE¹¥»÷
10ÔÂ24ÈÕ£¬½üÈÕ£¬Ò»³¡Õë¶ÔWordPressÍøÕ¾µÄ´ó¹æÄ£¹¥»÷»î¶¯·¢×÷£¬¹¥»÷ÕßÀûÓÃGutenKitºÍHunk Companion²å¼þµÄÑϳÁ¾É°²È«·ì϶ʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£Wordfence°²È«¹«Ë¾Åû¶£¬½ö10ÔÂ8ÈÕÖÁ9ÈÕÁ½ÌìÄÚ£¬Æä¾Í×èÖ¹ÁËÕë¶Ô¿Í»§µÄ870Íò´Î¹¥»÷³¢ÊÔ¡£Õâ´Î¹¥»÷Éæ¼°Èý¸ö¸ßΣ·ì϶£ºCVE-2024-9234¡¢CVE-2024-9707ºÍCVE-2024-11972¡£ÕâЩ·ì϶¾ù±»ÆÀ¶¨ÎªCVSS 9.8·Ö£¬ÔÊÐíδ¾ÈÏÖ¤µÄ¹¥»÷Õß×°ÖÃËÁÒâ²å¼þ£¬½ø¶øÒýÈëÆäËû¶ñÒâ²å¼þʵÏÖRCE¡£Ö»¹ÜGutenKit 2.1.1ºÍHunk Companion 1.9.0Òѽ¨¸´·ì϶£¬µ«ºÜ¶àÍøÕ¾ÈÔÔÚʹÓÃÒ×Êܹ¥»÷µÄ¾É°æ±¾¡£¹¥»÷Õßͨ¹ýGitHubÍйÜÃûΪ¡°up¡±µÄ¶ñÒâZIP´æµµ£¬ÄڷѽâÏý¾ç±¾£¬¿ÉÖ´ÐÐÎļþÉÏ´«/ÏÂÔØ/ɾ³ý¡¢È¨ÏÞÅú¸ÄµÈ²Ù×÷£¬²¢¼Ù×°³ÉAll in One SEO²å¼þ×é¼þ×Ô¶¯ÒÔÖÎÀíÔ±Éí·ÝµÇ¼£¬ÒÔά³ÖÓÆ¾ÃÐÔ¡¢ÇÔÈ¡»òɾ³ýÊý¾Ý¡¢Ðá̽¸öÈËÐÅÏ¢¡£ÈôÎÞ·¨Ö±½Ó»ñÈ¡ÖÎÀíºóÃÅ£¬¹¥»÷Õß»¹»á×°ÖÃÒ×Êܹ¥»÷µÄ¡°wp-query-console¡±²å¼þ½øÐÐδ¾ÈÏÖ¤µÄRCE¡£
https://www.bleepingcomputer.com/news/security/hackers-launch-mass-attacks-exploiting-outdated-wordpress-plugins/
5. ÐÂÐÍCoPhish¹¥»÷ͨ¹ýCopilot Studio´úÀíÇÔÈ¡OAuthÁîÅÆ
10ÔÂ25ÈÕ£¬Datadog°²È«³¢ÊÔÊÒ×êÑÐÈËÔ±·¢ÏÖÒ»ÖÖÃûΪ¡°CoPhish¡±µÄÐÂÐÍÍøÂç´¹µö¼¼Êõ£¬ÆäÀûÓÃ΢ÈíCopilot Studio´úÀíͨ¹ýºÏ·¨MicrosoftÓò·¢ËÍÚ²ÆÐÔOAuthÔÞ³ÉÒªÇ󡣸ü¼ÊõÒÀÀµÉç»á¹¤³Ìѧ£¬µ«Î¢ÈíÒÑ֤ʵ½«Í¨¹ý½«À´²úÆ·¸üн¨¸´µ××ÓÔÒò£¬²¢ÆÀ¹À¶î±í±£ÏÕ´ëʩǿ»¯ÖÎÀíÓëÔÞ³ÉÂÄÀú¡£CoPhilot Studio´úÀíÊÇ¿É×Ô½ç˵µÄ̸Ìì»úеÈË£¬Ö§³Ö¡°ÑÝÊ¾ÍøÕ¾¡±Ö°ÄÜÔÚ΢ÈíÓòÃû¹²Ïí£¬ºÏ·¨URL¸öÐÔÒ×ÓÕµ¼Óû§ÐÅÀµ¡£¹¥»÷Õ߿ɴ´½¨¶ñÒâ¶à×â»§ÀûÓã¬ÅäÖõǼÖ÷ÌâÖ¸ÏòÉí·ÝÑéÖ¤Ìṩ·¨Ê½£¬Í¨¹ýBurp Collaborator URL²¶»ñ»á»°ÁîÅÆ¡£µ±Óû§µã»÷¶ñÒâµÇ¼°´Å¥Ê±£¬³Á¶¨Ïò¿ÉÖ¸ÏòËÁÒâ¶ñÒâURL£¬¶øOAuthÔ޳ɹ¤×÷Á÷URL½öΪ¹¥»÷õè¾¶Ö®Ò»¡£Î¢Èí½¨Òé¿Í»§Í¨¹ýÏÞ¶ÈÖÎÀíȨÏÞ¡¢Ï÷¼õÀûÓÃȨÏÞ¼°Ö´ÐÐÖÎÀíÕþ²ß·ÀÓùCoPhish¡£Datadog²¹³ä°²È«½¨Ò飬Ô̺¬½ûÓÃÓû§ÀûÓô´½¨Ä¬ÈÏÖµ¡¢Í¨¹ýEntra IDÓëCopilot´úÀíÊÂÎñ¼à¿ØÀûÓÃÔ޳ɡ¢Ö´ÐÐÇ¿ÀûÓÃÔÞ³ÉÕ½ÊõÌí²¹Î¢ÈíĬÈÏÅäÖ÷ì϶¡£
https://www.bleepingcomputer.com/news/security/new-cophish-attack-steals-oauth-tokens-via-copilot-studio-agents/
6. ¶íÂÞ˹Áª¹úÊÞÒ½ºÍÖ²Îï¼ìÒ߼ල¾ÖÔâDDoS¹¥»÷
10ÔÂ25ÈÕ£¬¶íÂÞ˹Áª¹úÊÞÒ½ºÍÖ²Îï¼ìÒ߼ල¾Ö£¨Rosselkhoznadzor£©ÓÚ22ÈÕÔâ·ê´ó¹æÄ£¶¨ÏòDDoS¹¥»÷£¬µ¼ÖÂÆäÅ©²úÆ·¼°»¯Ñ§Æ·¸ú×ÙϵͳVetISºÍSaturnÏÂÏߣ¬È«¹úʳƷÔËÊäÁ´ÏÝÈë»ìÂÒ¡£¸Ã»ú¹¹´ÓÊôÓÚ¶íÂÞ˹ũҵ²¿£¬Õƹܼà¹ÜʳƷ¡¢Å©²úÆ·¼°»¯Ñ§Æ·µÄÁ÷ͨ°²È«¡£¹¥»÷Ö±½Ó³å»÷ÁËMercuryƽ̨£¨VetISÖ÷Ìâ×é³É²¿ÃÅ£©£¬ÒÔÖÁÈâÀࡢţÄ̵ȶ¯Îï²úÆ·ÔËÊäËùÐèµÄÇ¿ÔìÐÔµç×ÓÊÞÒ½Ö¤ÊéÎÞ·¨Ç©·¢£¬´óÐÍÈéÖÆÆ·¼°Ó¤¶ùʳƷ³ö²úÉ̻㱨ÔËÊäÑÓÎóÊýÓ×ʱ¡£¹©¸øÉ̱»ÆÅ×ëÁãÊÛÁ¬ËøµêÐÉÌÎÞµç×Óµ¥¾Ý»õÎïµÄ½Ó¹ÜÎÊÌ⣬ȫÇþ·ÁãÊÛÆóҵлᣨAKORT£©Ö÷ϯ˹̹Äá˹À·ò¡¤²©¸ñ´ïŵ·ò°µÊ¾£¬¶à¼ÒÁãÊÛÁ¬ËøµêÊÜϵͳ¹ÊÕÏÓ°Ï죬Õý´¹Î£µ÷ÕûMercuryϵͳÒÔά³ÖÔËÓªºÍ²úÆ·×¢²á¡£RosselkhoznadzorÔÚTelegramÉêÃ÷ÖÐÇ¿µ÷£¬¹¥»÷δÍþвÊý¾ÝÆëÈ«ÐÔÓë»úÃÜÐÔ£¬µ«ÏµÍ³¿ÉÄÜÒòµØÀíµØÎ»»òÏνӷ½Ê½³öÏÖÁÙʱ²»³ÉÓ᣸ûú¹¹·ñ¶¨³ÖÐøÖжϱ¨Â·£¬³Æµ±Èճɹ¦´¦Öó¬1450Íò·Ýµç×ÓÊÞÒ½Îļþ£¬²¢Ç¿µ÷Èô²úÉú¸üÑϳÁÖжϣ¬´ËÀà²Ù×÷½«ÎÞ·¨½øÐС£
https://securityaffairs.com/183845/security/russian-rosselkhoznadzor-hit-by-ddos-attack-food-shipments-delayed.html


¾©¹«Íø°²±¸11010802024551ºÅ