FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß

Ðû²¼Ê±¼ä 2025-04-22

1. FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß


4ÔÂ22ÈÕ£¬FogÀÕË÷Èí¼þÔËÓªÉ̽üÆÚʹÓÃDOGEÖ÷ÌâÀÕË÷Ðż¥Ð¦Êܺ¦Õߣ¬ÌṩÃ⺬»ìÃÜÃÜÔ¿ÒÔ»»È¡¶ñÒâÈí¼þÈö²¥¡£ÓëÔçÆÚÒÀÀµ±»µÁVPNƾ֤²î±ð£¬×îй¥»÷ʼÓÚ°üÀ¨¡°Pay Adjustment.zip¡±µÄÍøÂç´¹ÂÚÓʼþ£¬ÄÚº¬¶ñÒâLNKÎļþ£¬µã»÷ºó´¥·¢Ò»ÏµÁвÙ×÷½«ÀÕË÷Èí¼þÖ²Èëϵͳ¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±³Æ£¬×Ô½ñÄê1ÔÂÒÔÀ´£¬¸ÃÈí¼þÒÑѬȾ100ÃûÊܺ¦Õߣ¬2Ô·Ý×î¶à£¬Îª53ÈË£»×Ô2024Äê6ÔÂÒÔÀ´£¬ÔÚ¿Í»§Öмì²âµ½173ÆðÏà¹ØÀÕË÷Ô˶¯¡£´ó¶¼Êܺ¦ÕßÀ´×ԿƼ¼¡¢ÖÆÔì¡¢½ÌÓýºÍ½»Í¨ÔËÊäÐÐÒµ¡£Ð¹¥»÷ÖУ¬¶ñÒâLNKÎļþÏÂÔØPowerShell¾ç±¾£¬¼ìË÷ÀÕË÷Èí¼þÏÂÔØ³ÌÐò¼°¶à¸öÆäËû¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ¡£ÕâЩ¾ç±¾°üÀ¨ÍøÂçϵͳÐÅÏ¢¡¢ºáÏòÒÆ¶¯¹¤¾ß¼°·­¿ª¶þάÂëµÄ¾ç±¾£¬Êܺ¦Õß¿ÉÓøöþάÂëÖ§¸¶Êê½ð¡£³õʼPowerShell¾ç±¾»¹·­¿ªÕþÖÎÖ÷ÌâYouTubeÊÓÆµ²¢°üÀ¨ÊéÃæÕþÖÎ̸ÂÛ¡£³õʼÊê½ð֪ͨÌá¼°DOGE£¬ÉõÖÁDOGEÊÂÇéÖ°Ô±£¬ÒªÇóÊܺ¦ÕßÁгöÎåÏîʹÃü£¬²»È»Ö§¸¶Ò»ÍòÒÚÃÀÔªÊê½ð¡£ÍþвÕßÌåÏÖ£¬ÈôÊܺ¦Õß½«¶ñÒâÈí¼þ·¢Ë͸øËûÈË£¬¼´¿ÉÃ⺬»ìÃÜϵͳ¡£FogÀÕË÷Èí¼þÊÇÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼Ò×壬ÆóÒµ±ØÐ轫ÆäÌí¼Óµ½¼à¿ØÁбíÖС£


https://www.darkreading.com/cyberattacks-data-breaches/fog-hackers-doge-ransom-notes


2. RustoBot½©Ê¬ÍøÂçʹÓ÷ÓÉÆ÷Îó²î·¢¶¯¹¥»÷


4ÔÂ22ÈÕ£¬FortiGuard Labs½üÆÚ·¢Ã÷RustoBot£¬ÕâÒ»ÓÃRust±àдµÄÖØ´ó½©Ê¬ÍøÂçÕýʹÓÃTOTOLINKºÍDrayTek·ÓÉÆ÷Îó²î£¬ÔÚÈÕ±¾¡¢Ì¨Íå¡¢Ô½ÄϺÍÄ«Î÷¸çµÄÊÖÒÕ»ù´¡ÉèÊ©ÖÐËÁŰ¡£2025ÄêÍ·£¬¹¥»÷ʵÑé¼±¾çÔöÌí£¬Ä¿µÄÖ±Ö¸TOTOLINK cstecgi.cgi¾ç±¾Öеĺã¾ÃÎó²î£¬ÕâЩÎó²îÉæ¼°ÉèÖøü¸ÄºÍÉí·ÝÑéÖ¤£¬±£´æ¶à¸öÏÂÁî×¢Èëµã£¬°üÀ¨CVE-2022-26210¡¢CVE-2022-26187ÒÔ¼°Ó°ÏìDrayTek·ÓÉÆ÷µÄCVE-2024-12987¡£ÕâЩÈõµãʹ¹¥»÷Õß»ñµÃÔ¶³Ì´úÂëÖ´ÐÐÄÜÁ¦£¬ÎªRustoBotѬȾÆÌƽõè¾¶¡£Ò»µ©»ñµÃ³õʼ»á¼ûȨÏÞ£¬RustoBot±ãͨ¹ýËĸöÏÂÔØ¾ç±¾Ö®Ò»¾ÙÐа²ÅÅ£¬Ö§³Ö¶àÖּܹ¹£¬È·±£ÓëÒ×Êܹ¥»÷µÄ·ÓÉÆ÷ÆÕ±é¼æÈÝ¡£ÆäÆæÒìÖ®´¦ÔÚÓÚʹÓÃRustÓïÑÔ£¬¶þ½øÖƽṹͨ¹ýXOR¼ÓÃܺÍGOT²Ù×÷¾ÙÐлìÏý£¬ÊµÏÖÒþÉíÐÔ£¬²¢Ê¹ÄæÏò¹¤³ÌÖØ´ó»¯¡£½âÃܺóµÄÉèÖÃÕ¹ÏÖ£¬RustoBotÖ´ÐÐÁ½Ïî½¹µã¶ñÒâ²Ù×÷£ºÆÊÎö¶à¸öC2ÓòÃû£¬²¢Æ¾Ö¤ÏÂÁîÌᳫDDoS¹¥»÷¡£RustoBotÔ˶¯ÒÑÓ°Ïì¶à¿îTOTOLINKºÍDrayTek·ÓÉÆ÷ÐͺÅ£¬Êܺ¦ÕßÖ÷ҪλÓڿƼ¼ÁìÓò£¬Åú×¢¹¥»÷¿ÉÄܾßÓÐÕë¶ÔÐÔ¡£


https://securityonline.info/rustobot-botnet-exploits-router-flaws-in-sophisticated-attacks/


3. WordPress¹ã¸æÚ²Æ­²å¼þÌìÌ챬·¢14ÒÚ¸ö¹ã¸æÇëÇó


4ÔÂ21ÈÕ£¬¿ËÈÕ£¬Ò»¸öÃûΪ¡°Scallywag¡±µÄ´ó¹æÄ£¹ã¸æÚ²Æ­×éÖ¯¸¡³öË®Ãæ£¬¸Ã×é֯ͨ¹ý¶¨ÖÆWordPress²å¼þ£¬½«µÁ°æºÍURLËõ¶ÌÍøÕ¾Ç®±Ò»¯£¬ÖðÈÕ±¬·¢ÊýÊ®ÒÚ¸öڲƭÇëÇó¡£ScallywagÓÉ»úеÈ˺Íڲƭ¼ì²â¹«Ë¾HUMAN·¢Ã÷£¬Æä±³ºóÊÇÒ»¸öÓÉ407¸öÓòÃû×é³ÉµÄÖØ´óÍøÂ磬ÖðÈÕڲƭ¹ã¸æÇëÇó·åÖµ¸ß´ï14ÒÚÌõ¡£Ö»¹ÜHUMAN½ÓÄɲ½·¥Ê¹ScallywagÁ÷Á¿ïÔÌ­95%£¬µ«¸Ã×é֯ͨ¹ýÂÖ»»ÓòÃûºÍµ÷½âÇ®±Ò»¯Ä£Ê½Õ¹ÏÖ³öǿʢÈÍÐÔ¡£Scallywag»ùÓÚËĸöWordPress²å¼þ¹¹½¨£¬°üÀ¨Soralink¡¢Yu Idea¡¢WPSafeLinkºÍDroplink£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´Ó¸ßΣº¦¡¢µÍÖÊÁ¿ÍøÕ¾×¬Ç®µÄ;¾¶¡£ÕâЩ²å¼þ½µµÍÁËDZÔÚÍþвÐÐΪÕߵĽøÈëÃż÷£¬ÉõÖÁÓÐÈËÔÚYouTubeÉÏÐû²¼²Ù×÷½Ì³Ì¡£Óû§»á¼ûµÁ°æÄ¿Â¼ÍøÕ¾Ê±£¬µã»÷ǶÈëµÄURLËõ¶ÌÁ´½Ó£¬»á±»Öض¨ÏòÖÁÖÐÐĹãÃÜ¸æ¼¯Ò³Ãæ£¬ÎªScallywagÔËÓªÉ̱¬·¢Ú²Æ­ÐÔÓ¡Ïó£¬×îÖÕ½øÈëÔÊÐíÄÚÈݵÄÒ³Ãæ¡£ÕâЩÖÐÐÄÍøÕ¾ÔËÐÐScallywag²å¼þ£¬ÈÏÕæ´¦Öóͷ£Öض¨ÏòÂß¼­¡¢¹ã¸æ¼ÓÔØµÈ£¬ÒÔÔÚ¹ã¸æÆ½Ì¨¼ì²éÖÐαװ³ÉÕý³£²©¿Í¡£HUMAN̫ͨ¹ýÎöÁ÷Á¿Ä£Ê½¼ì²âScallywagÔ˶¯£¬²¢Óë¹ã¸æÌṩÉÌÏàÖú×èÖ¹¶Ô¹ã¸æÇëÇóµÄ¾º±ê£¬ÇÐ¶ÏÆäÊÕÈëȪԴ¡£


https://www.bleepingcomputer.com/news/security/scallywag-ad-fraud-operation-generated-14-billion-ad-requests-per-day/


4. ÐÂÐͶñÒâÈí¼þResolverRATÍþвҽÁÆÓëÖÆÒ©ÐÐÒµ


4ÔÂ21ÈÕ£¬MorphisecÍþвʵÑéÊÒ·¢Ã÷ÁËÒ»ÖÖÐÂÐÍÖØ´ó¶ñÒâÈí¼þResolverRAT£¬¸Ã¶ñÒâÈí¼þÕýÆð¾¢Õë¶ÔÒ½ÁƱ£½¡ºÍÖÆÒ©ÐÐÒµÕö¿ª¹¥»÷£¬×î½üÒ»²¨¹¥»÷¼¯ÖÐÔÚ2025Äê3ÔÂ10ÈÕ×óÓÒ¡£ResolverRATÒÀ¸½ÆäÏȽøµÄÊÖÒÕÊֶΣ¬ÈçÄÚ´æÖ´ÐС¢¶¯Ì¬×ÊÔ´´¦Öóͷ£¼°¶à²ã¹æ±ÜÊÖÒÕ£¬Ê¹µÃ¹Å°å¼ì²âÒªÁìÄÑÒÔ×àЧ¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÈö²¥£¬Ê¹ÓýôÆÈ¸Ð»ò¿Ö¾å¸ÐÓÕµ¼ÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó£¬½ø¶ø´¥·¢Ñ¬È¾Àú³Ì¡£¹¥»÷¸ß¶ÈÍâµØ»¯£¬Óʼþ½ÓÄÉÄ¿µÄ¹ú¼ÒĸÓï׫д£¬Ö÷ÌâÉæ¼°Ö´·¨ÊÓ²ì»ò°æÈ¨ÇÖȨ£¬Ö¼ÔÚͨ¹ý¸öÐÔ»¯¶¨Î»Ìá¸ßѬȾÀÖ³ÉÂÊ¡£Ñ¬È¾Ê¼ÓÚDLL²àÔØÊÖÒÕ£¬½«¶ñÒâDLLÎļþÓëÕýµ±³ÌÐò£¨Èç hpreader.exe£©Ò»Í¬°²ÅÅ£¬µ±³ÌÐòÖ´ÐÐʱ£¬¶ñÒâDLL±»ÇÄÇļÓÔØ£¬´Ó¶øÆô¶¯¶ñÒâÈí¼þ¡£ResolverRAT ½ÓÄɶà²ã¹æ±ÜÊÖÒÕ£¬°üÀ¨´úÂë»ìÏýºÍ×Ô½ç˵ЭÒéÀ´»ìÏýÍøÂçÁ÷Á¿£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐжñÒâ´úÂ룬²¢ÔÚÔËÐÐʱ¶¯Ì¬Ê¶±ðºÍʹÓÃϵͳº¯Êý¡£ÎªÈ·¼á³¤ÆÚÐÔ£¬ResolverRAT ÔÚ Windows ×¢²á±íÖн¨Éè¶à¸öÌõÄ¿£¬²¢ÔÚ¶à¸öλÖÃ×°ÖÃ×ÔÉí¸±±¾¡£±ðµÄ£¬Ëü»¹Ê¹ÓÃÆæÒìµÄÖ¤ÊéÑéÖ¤ÒªÁìºÍ¡°.NET ×ÊÔ´ÆÊÎöÆ÷Ð®ÖÆ¡±ÊÖÒÕÀ´ÒþÉí£¬²¢ÊµÑé¶ÔÆÊÎöÇéÐξÙÐÐÖ¸ÎÆÊ¶±ð£¬ÒÔÔÚ¼ì²âµ½±»¼ì²éʱ¸Ä±äÐÐΪ¡£


https://hackread.com/native-language-phishing-resolverrat-healthcare/


5. Õ©Æ­·Ö×Óð³äFBI IC3Ô±¹¤ÇÔÈ¡ÄúµÄ²ÆÎñÐÅÏ¢


4ÔÂ19ÈÕ£¬¿ËÈÕ£¬FBIÐû²¼Õ©Æ­¾¯±¨£¬Õ¹ÏÖÕ©Æ­·Ö×ÓÕýð³äFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐÄ(IC3)Ö°Ô±£¬ÒÔ×·»ØËðʧ×ʽðΪÓÕ¶ü£¬ÇÔÈ¡Êܺ¦Õß²ÆÎñÐÅÏ¢¡£×Ô2023Äê12ÔÂÖÁ2025Äê2Ô£¬FBIÒÑÊÕµ½100¶àÆðÏà¹Ø±¨¸æ¡£Õ©Æ­Õß³£Ãé×¼ÍøÂç½ðÈÚÕ©Æ­Êܺ¦ÕßµÄÉç½»ÍøÂç»òÔÚÏßÂÛ̳£¬ÓÐʱð³äÕæÊµÉí·Ý»òʹÓÃÐéαƾ֤¡£ËùÓÐȦÌ×¾ùÉæ¼°ÒÔijÖÖÐÎʽ×ÊÖúÊܺ¦Õß×·»ØËðʧ£¬Ö»¹Ü×î³õÁªÏµ·½·¨¸÷Ò죬°üÀ¨µç×ÓÓʼþ¡¢µç»°¡¢É罻ýÌå»òÂÛ̳¡£ÔÚijЩ°¸ÀýÖУ¬Õ©Æ­ÕßÉõÖÁÉù³ÆÉ¥Ê§×ʽð¾ÍÔÚËûÃÇÊÖÖС£ËûÃÇͨ¹ý½¨ÉèÐéαСÎÒ˽¼Ò×ÊÁÏ£¬¼ÓÈëÔÚÏß½ðÈÚÕ©Æ­ÍŻ²¢½¨ÒéÊܺ¦ÕßÁªÏµÃ°³äµÄIC3¡°Ê×ϯִÐй١±»ñÈ¡×ÊÖú¡£Ò»µ©Êܺ¦ÕßÖмÆ£¬Õ©Æ­Õß±ãÉù³ÆÒѻָ´×ʽ𣬲¢½è´Ë»ñÈ¡Æä²ÆÎñÐÅÏ¢¡£FBIÌåÏÖ£¬ÕâЩÍýÏë²»µ«ÓÕÆ­ºÍÕ©Æ­Ä¿µÄ£¬»¹Ê¹ËûÃÇÔٴγÉΪÊܺ¦Õß¡£ÎªÌá·À´ËÀàÕ©Æ­£¬FBIÌáÐѹ«ÖÚ£¬IC3¾ø²»»áͨ¹ýµç»°¡¢µç×ÓÓʼþ¡¢É罻ýÌåµÈÖ±½ÓÓëСÎÒ˽¼ÒÏàͬ£¬Ò²²»»áÒªÇ󸶿îÀ´×·»ØËðʧ×ʽ𣬸ü²»»á½«Êܺ¦Õßת½é¸øÒªÇ󸶿îµÄ¹«Ë¾¡£¹«ÖÚÓ¦Ìá¸ßСÐÄ£¬ÇÐÎðÓë½öÔÚÍøÉÏ»òµç»°ÖÐÊìϤµÄÈË·ÖÏíÃô¸ÐÐÅÏ¢»ò·¢ËÍÇ®²Æ¡£ÈçÐè¾Ù±¨ÍøÂçڲƭ£¬¿É»á¼ûFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐĹÙÍø¡£


https://cybernews.com/security/fbi-alert-ic3-impersonation-scam-recover-lost-funds-steal-financial-info/


6. ºÚ¿ÍʹÓÃGoogleϵͳÈõµãʵÑéDKIMÖØ·ÅÍøÂç´¹ÂÚ¹¥»÷


4ÔÂ20ÈÕ£¬¿ËÈÕ£¬ºÚ¿ÍʹÓÃGoogleϵͳÈõµã£¬ÌᳫÁËÒ»³¡ÇÉÃîµÄÍøÂç´¹ÂÚ¹¥»÷¡£¹¥»÷Õßͨ¹ý·¢ËÍÒ»·â¿´ËÆÀ´×Ô¡°no-reply@google.com¡±µÄÐéαµç×ÓÓʼþ£¬ÀÖ³ÉÈÆ¹ýËùÓÐÑéÖ¤£¬Ö¸ÏòÒ»¸öÍøÂçµÇ¼ÐÅÏ¢µÄÚ²Æ­Ò³Ãæ¡£¸ÃÓʼþ²»µ«Í¨¹ýÁËDKIMÉí·ÝÑéÖ¤£¬ÇÒÄÚÈÝÏÕЩÓë¹È¸è¹Ù·½Çå¾²¾¯±¨ÎÞÒ죬¼«Ò×ÓÕÆ­ÊÖÒÕˮƽ½ÏµÍµÄÓû§¡£È»¶ø£¬ENSÊ×ϯ¿ª·¢Ö°Ô±Äá¿Ë¡¤Ô¼º²Ñ·ÃôÈñµØ·¢Ã÷£¬Ðéα֧³ÖÃÅ»§ÍйÜÔÚsites.google.comÉÏ£¬¶ø·ÇÕæÕýµÄaccounts.google.com£¬´Ó¶øÊ¶ÆÆÁËȦÌס£¹¥»÷ÕßÇÉÃîµØ×¢²áÁËÒ»¸öÓòÃû£¬²¢ÒÔ¡°me@domain¡±½¨ÉèGoogleÕÊ»§£¬Ëæºó½¨ÉèÁËÒ»¸öGoogle OAuthÓ¦Ó㬽«´¹ÂÚÓʼþÃüÃûΪ¸ÃÓ¦Óᣵ±¹¥»÷ÕßÊÚÓèÆäOAuthÓ¦Óûá¼ûGoogle WorkspaceÖеç×ÓÓʼþµØµãµÄȨÏÞʱ£¬Google×Ô¶¯·¢ËÍÁËÇå¾²¾¯±¨£¬¸Ã¾¯±¨ÒòʹÓÃÓÐÓõÄDKIMÃÜÔ¿ÊðÃû¶øÍ¨¹ýÁËËùÓмì²é¡£¹¥»÷ÕßËæºó½«Çå¾²¾¯±¨×ª·¢¸øÊܺ¦Õߣ¬Ê¹Æä¿´ÆðÀ´ÏñÊÇÀ´×ԹȸèµÄÕýµ±Óʼþ¡£±ðµÄ£¬¹¥»÷Õß»¹Ê¹ÓÃÁËGoogleϵͳµÄÈõµã£¬¼´DKIM½ö¼ì²éÓʼþÕýÎĺÍÓʼþÍ·£¬¶ø²»¼ì²éÐŷ⣬ʹµÃαÔìÓʼþÄܹ»Í¨¹ýÊðÃûÑéÖ¤¡£ÏÖÔÚ£¬¹È¸èÒÑÊìϤµ½OAuthµÄÈõµã£¬²¢ÕýÔÚÆð¾¢ÐÞ¸´¡£


https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/