Punishing Owl¶Ô¶íÌáÒé¼¼Êõ¸´ÔÓÍøÂç¹¥»÷

°ä²¼¹¦·ò 2026-02-04

1. Punishing Owl¶Ô¶íÌáÒé¼¼Êõ¸´ÔÓÍøÂç¹¥»÷


2ÔÂ2ÈÕ£¬ºÚ¿Í×éÖ¯Punishing OwlÓÚ2025Äê12ÔÂ12ÈÕ³õ´Î¹«¿ª»î¶¯£¬¶Ô¶íÂÞ˹µ±¾Ö°²È«»ú¹¹ÌáÒé¼¼Êõ¸´ÔÓµÄÍøÂç¹¥»÷ ¡£¸Ã×é֯ͨ¹ýÈëÇÖÖ¸±êÍøÂçÇÔÈ¡ÄÚ²¿Îļþ£¬²¢½«Æä°ä²¼ÖÁÊý¾Ýй¶ƽ̨£¬Í¬Ê±ÔÚMega.nz´æ´¢²Ö¿â±¸·ÝÎļþ£¬ÒÔ×î´ó»¯ÆØ¹â¶È ¡£Îª³ÙÑÓÊܺ¦ÕßÏìÓ¦²¢À©´óÓ°Ï죬¹¥»÷ÕßרÃÅÑ¡ÔñÖÜÎåÍí6µã37·ÖÕâÒ»·Ç¹¤×÷ʱ¶Î°ä·¢ÈëÇÖÊÂÎñ ¡£¹¥»÷¹ý³ÌÖУ¬Punishing Owl½ÚÔìÁËÊܺ¦»ú¹¹µÄDNSÅäÖ㬴´½¨×ÓÓòÃû²¢½«Á÷Á¿½Ù³ÖÖÁλÓÚ°ÍÎ÷µÄ·þÎñÆ÷ ¡£¸Ã·þÎñÆ÷²»½öÍйÜÁËÇÔÈ¡µÄÎļþ£¬»¹¸½´øÁËÒ»·ÝÂÛÊö¹¥»÷¶¯»úµÄÕþÖÎÉêÃ÷ ¡£Ëæºó£¬¸Ã×éÖ¯½øÒ»²½¶ÔÊܺ¦»ú¹¹µÄºÏ×÷ͬ°éÓë³Ð°üÉÌÌáÒéóÒ×µç×ÓÓʼþڲƭ£¨BEC£©¹¥»÷£¬Ê¹ÓÃαÔìµÄ·¢¼þµØÖ··¢ËÍ´¹µöÓʼþ£¬»Ñ³ÆÊÇÍøÂçÈëÇÖÊÂÎñµÄºËʵ֪ͨ£¬²¢¶½´ÙÊÕ¼þÈ˲鿴¸½¼þÎĵµ ¡£¼¼Êõ²ãÃæ£¬Punishing Owlչʾ³ö¸ßË®×¼µÄ¹¥»÷ÄÜÁ¦ ¡£ÆäÅäÖÃÁËαÔìµÄTLSÖ¤Ê飬´î½¨ÁËÓÃÓÚÓʼþÊÕ·¢µÄIMAPºÍSMTP·þÎñ£¬²¢²¿ÊðÁËÃûΪZipWhisperµÄPowerShellÇÔÃÜľÂí£¬ÓÃÓÚµÁÈ¡ÊÜϰȾϵͳµÄä¯ÀÀÆ÷ƾ֤ ¡£


https://cybersecuritynews.com/new-punishing-owl-hacker-group-targeting-networks/


2. DynoWiper¶ñÒâÈí¼þ¹¥»÷²¨À¼ÄÜÔ´ÆóÒµ


2ÔÂ2ÈÕ£¬Ò»¿îÃûΪDynoWiperµÄÐÂÐ͸ßΣÊý¾Ý²Á³ý¶ñÒâÈí¼þ³õ´Î±»·¢ÏÖ£¬Õý¶Ô²¨À¼ÄÜÔ´ÆóÒµÌáÒé·ÛËéÐÔ¹¥»÷£¬ÆäÖ÷ÌâÖ¸±ê²¢·ÇÀÕË÷²Æ²¯£¬¶øÊÇÓÀÔ¶¶Ï¸ù¹Ø¼üÊý¾Ý²¢µ¼ÖÂϵͳ̱»¾ ¡£ÓëͨÀýÀÕË÷Èí¼þ·ÖÆç£¬DynoWiperͨ¹ýÈý½×¶Î·ÛËéÁ÷³ÌʵÏÔìÆ»µ£ºµÚÒ»½×¶ÎµÝ¹éËÑË÷ËùÓй̶¨¼°¿ÉÒÆ¶¯Çý¶¯Æ÷ÉϵÄÎļþ£¬±Ü¿ª¹Ø¼üϵͳĿ¼ÒÔά³Ö¸ù»ùÔËÐУ»µÚ¶þ½×¶ÎʹÓÃ16×Ö½ÚËæ»úÊý¾Ý»º³åÇø¸²Ð´ÎļþÄÚÈÝ£¬Ó×ÓÚ16×Ö½ÚµÄÎļþ±»ÆëÈ«¸²¸Ç£¬´óÓÚ16×Ö½ÚµÄÔò²¿·ÔìÆ»µ£¬ÒÔ´ËÌáÉý·ÛËéЧÄÜ£»µÚÈý½×¶Îͨ¹ýϵͳ³ÁÆô»òÖ±½ÓÖÕÖ¹¹ý³ÌʹÊÜϰȾÉ豸ÎÞ·¨Æô¶¯ ¡£¸Ã¶ñÒâÈí¼þ´æÔÚ¶à¸ö±äÖÖ£¬¾ùÓÚ2025Äê12ÔÂ29ÈÕͶ·Å ¡£¹¥»÷ÕßÔÚ³õ´ÎÖ´ÐÐʧ°ÜºóÂÅ´ÎÅú¸Ä´úÂëÒÔÈÆ¹ý°²È«·À»¤£¬µ«ÆóÒµ²¿ÊðµÄÖն˼ì²âÓëÏìÓ¦¹¤¾ß³É¹¦À¹½ØÁËÆäÖ´ÐУ¬´ó·ù½µµÍËðʧ ¡£Welivesecurity·ÖÎöʦָ³ö£¬DynoWiperÓëÕë¶ÔÎÚ¿ËÀ¼µÄÒÑÖª²Á³ý¶ñÒâÈí¼þZOV´æÔÚÏÔÖøÀàËÆÐÔ£¬Æä¹éÒòÓÚÓë¶íÂÞ˹¹ØÁªµÄSandworm×éÖ¯ ¡£


https://cybersecuritynews.com/dynowiper-data-wiping-malware/


3. Coinbase֤ʵÄÚ²¿ÈËÔ±Êý¾Ýй¶


2ÔÂ3ÈÕ£¬ÃÀ¹ú¼ÓÃÜÇ®±ÒÂòÂôËùCoinbase½üÈÕÈ·ÈϲúÉúһ·ÄÚ²¿ÈËÔ±Êý¾Ýй¶ÊÂÎñ ¡£¾Ý¹«Ë¾½²»°ÈËÅû¶£¬2025Äê12Ô£¬Ò»Ãû³Ð°üÉ̲»µ±½Ó¼ûÔ¼30Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢£¬Ô̺¬µç×ÓÓʼþ¡¢ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢KYCÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üÓà¶î¼°ÂòÂô¼Í¼ ¡£¸Ã³Ð°üÉÌÒѱ»ÖÕÖ¹ºÏ×÷£¬ÊÜÓ°ÏìÓû§ÒÑ»ñÉí·Ý͵ÇÔ±£»¤·þÎñ¼°Áìµ¼£¬ÊÂÎñͬ²½Éϱ¨¼à¹Ü»ú¹¹ ¡£ÍþвÐÐΪÕß¡°Shiny Lapsus Hunters¡±Ôø¶ÌÔÝÔÚTelegram°ä²¼CoinbaseÄÚ²¿Ö§³Ö½çÃæ½ØÍ¼ºóɾ³ý£¬½ØÍ¼ÏÔʾ¿É½Ó¼û¿Í»§Ãô¸ÐÊý¾Ý ¡£Ö»¹ÜÎÞ·¨È·ÈϸÃ×éÖ¯ÊÇ·ñÖ±½Ó¹ØÁªÄÚ²¿ÈËÔ±ÈëÇÖ£¬µ«ÀàËÆÊÖ·¨ÔÚÆäËû¹¥»÷ÖÐÆµÏÖ£¬ÈçÍþвÐÐΪÕßÔø»ß¸CrowdStrikeÄÚ²¿ÈËÔ±»ñÈ¡½ØÍ¼£¬»òͨ¹ýÉç½»¹¤³Ì¼ÙÒâÔ±¹¤Æ­È¡BPOÖ§³ÖÈËÔ±ÊÚȨ½Ó¼ûȨÏÞ ¡£BPO¹«Ë¾Òò³Ð½Ó¿Í»§Ö§³Ö¡¢Éí·ÝÑéÖ¤¡¢IT·þÎñµÈÔËÓª¹¤×÷£¬ÆäÔ±¹¤³£½Ó´¥ÆóÒµÖ÷ÌâϵͳÓë¿Í»§Êý¾Ý£¬³ÉΪ¹¥»÷Õ߸߼ÛÖµÖ¸±ê ¡£


https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/


4. Step FinanceÔâºÚ¿Í¹¥»÷ÖÂ4000ÍòÃÀÔª×ʲúËðʧ


2ÔÂ3ÈÕ£¬ÃÀ¹ú¼ÓÃÜÇ®±Òƽ̨Step FinanceÓÚ2025Äê1ÔÂ31ÈÕ¼ì²âµ½°²È«·ì϶£¬¾­µ÷²éÈ·ÈÏÒò¸ß¹ÜÉ豸ÔâºÚ¿ÍÈëÇÖ£¬µ¼Ö¼ÛÖµÔ¼4000ÍòÃÀÔªµÄÊý×Ö×ʲú±»µÁ ¡£¸Ãƽ̨ÊÇ»ùÓÚSolanaÇø¿éÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Æ½Ì¨¼°·ÖÎö¹¤¾ß£¬Ö§³ÖÓû§×ʲú¿ÉÊÓ»¯¡¢ÂòÂô¡¢ÖÊѺµÈ²Ù×÷£¬²¢Õ¼ÓÐÔ­Éú´ú±Ò$STEP£¬µ«ÂòÂôÁ¿Ïà¶Ô½ÏÓ× ¡£¹¥»÷²úÉúºó£¬Step FinanceѸ¿ìÀñÆ¸ÍøÂ簲ȫר¼ÒЭÖú×·»Ø×ʲú ¡£Çø¿éÁ´·ÖÎö¹«Ë¾CertiK³õ²½»ã±¨ÏÔʾ£¬±»µÁ×ʲúÔ̺¬261,854 SOL£¨Ô¼2890ÍòÃÀÔª£©£¬µ«Æ½Ì¨×îÖÕºËʵ×ÜËðʧԼ4000ÍòÃÀÔª ¡£Í¨¹ýToken22±£»¤´ëÊ©¼°ºÏ×÷ͬ°éЭµ÷£¬Ä¿Ç°ÒÑ×·»ØÔ¼370ÍòÃÀÔªRemora×ʲú¼°100ÍòÃÀÔªÆäËûÍ·´ç£¬¼ÆËã470ÍòÃÀÔª ¡£Îª¼ÓÇ¿°²È«·À»¤£¬Æ½Ì¨ÒÑÔÝÍ£²¿ÃÅÒµÎñÔËÓª£¬²¢Ç¿µ÷ÆäÆìÏÂRemora MarketsδÊÜÓ°Ï죬ËùÓÐrTokenÈÔά³Ö1:1ÆëÈ«´¢Ðî ¡£Step Finance½¨ÒéÓû§ÔÚµ÷²éʵÏÖǰÔÝͣʹÓÃSTEP´ú±Ò£¬²¢³Ðŵ½«¶Ô¹¥»÷ǰ״̬½øÐпìÕÕ£¬Ôì¶©Õë¶Ô³ÖÓÐÕߵĽâ¾ö¹æ»® ¡£


https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/


5. Citrix NetScalerÔâ6.3ÍòIPЭͬ¿úËÅ


2ÔÂ3ÈÕ£¬Íþв¼à¿ØÆ½Ì¨GreyNoise¹Û²âµ½Õë¶ÔCitrix NetScaler»ù´¡ÉèÊ©µÄЭͬ¿úËÅÐж¯£¬¸ÃÐж¯ÀûÓó¬6.3Íò¸ö¶ÀÁ¢IPµØÖ·ÌáÒé111,834¸ö»á»°£¬ÆäÖÐ79%Á÷Á¿Ö¸ÏòCitrix GatewayÃÛ¹Þ£¬64%À´×Ô¼Ù×°³ÉºÏ·¨Ïû·ÑÕßISPµØÖ·µÄסլ´úÀí£¬Ôü×Ò36%Ô´×ÔͳһAzure IPµØÖ· ¡£GreyNoiseÖ¸³ö£¬Õâ´Î»î¶¯²¢·ÇËæ»ú»¥ÁªÍøÉ¨Ã裬¶øÊÇÓÐ×éÖ¯µÄ»ù´¡ÉèÊ©²â»æ£¬Ö¼ÔÚÈëÇÖǰ¼ø±ð¶³öµÄCitrixµÇÂ¼Ãæ°å¼°²úÆ·°æ±¾ ¡£¹¥»÷Õßͨ¹ýÁ½¸öÖ÷ÌâÖ¸±ê¶³ö¶ñÒâÒâͼ£ºÆäÒ»£¬63,189¸öIPÌìÉú109,942¸ö»á»°£¬¼¯ÖÐɨÃè¡°/logon/LogonPoint/index.html¡±Éí·ÝÑéÖ¤½çÃæ£¬´ó¹æÄ£¼ø±ð¶³öµÄµÇÂ¼Ãæ°å£»Æä¶þ£¬2ÔÂ1ÈÕ10¸öIPÔÚ6Ó×ʱÄÚÆô¶¯1,892¸ö»á»°£¬¾Û½¹URLõè¾¶¡°/epa/scripts/win/nsepa_setup.exe¡±£¬Í¨¹ýEPA¹¤¼þö¾ÙCitrix°æ±¾ ¡£¹¥»÷ÕßʹÓÃ2016ËêÊ×°ä²¼µÄChrome 50Óû§´úÀí£¬Õë¶ÔEPA×°ÖÃÎļþõè¾¶µÄÌØ¶¨¹¥»÷Åú×¢ÆäÕý¿ª·¢Ìض¨°æ±¾·ì϶ÀûÓ÷¨Ê½»òÑéÖ¤ÒÑÖªCitrix ADC·ì϶ ¡£


https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/


6. CISA´¹Î£´«µÝSolarWinds·þÎñ̨·ì϶


2ÔÂ3ÈÕ£¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«SolarWinds Web Help DeskµÄÑϳÁ·ì϶CVE-2025-40551ÏóÕ÷Ϊ"ÔÚÔâ·ê¹¥»÷"£¬²¢Æ¾¾Ý2021Äê°ä²¼µÄÓµÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD 22-01£©£¬ÒªÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÔÚÈýÌìÄÚʵÏÖϵͳ½¨²¹ ¡£¸Ã·ì϶Óɰ²È«×êÑÐÔ±Jimi Sebree·¢ÏÖ£¬Ô´ÓÚ²»ÊÜÐÅÀµµÄÊý¾Ý·´ÐòÁл¯Èõµã£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓÃʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬ÔÚδ´ò²¹¶¡µÄÉ豸ÉÏÔËÐжñÒâºÅÁî ¡£SolarWindsÓÚ1ÔÂ28ÈÕ°ä²¼Web Help Desk 2026.1°æ±¾½¨¸´´Ë·ì϶£¬Í¬Ê±Ò»²¢½¨¸´ÁËSebree·¢ÏÖµÄÓ²±àÂëÆ¾Ö¤¸ßΣ·ì϶£¨CVE-2025-40537£©¼°watchTowrµÄPiotr Bazydlo»ã±¨µÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2025-40552¡¢CVE-2025-40554£©£¬ËùÓзì϶¾ùÖ§³ÖÔ¶³ÌÀûÓà ¡£CISAÇ¿µ÷£¬Ö»¹ÜBOD 22-01½öÕë´ºÁª¹ú»ú¹¹£¬µ«Ë½Óª²¿ÃÅÒ²Ó¦¾¡¿ì½¨²¹ÒÔÕмܳÖÐø¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/