WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØÕ÷ÓëÇå¾²¾¯Ê¾
Ðû²¼Ê±¼ä 2025-09-241. WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØÕ÷ÓëÇå¾²¾¯Ê¾
9ÔÂ21ÈÕ£¬SophosÑо¿ÍŶÓÕ¹ÏÖ£¬ÃûΪWarlockµÄÀÕË÷Èí¼þ×éÖ¯£¨Î¢Èí³ÆStorm 2603£¬Sophos×·×ÙΪGOLD SALEM£©ÕýÒÔ¸ßÃ÷ÊÖÒÕÊֶμӾçÈ«ÇòÍøÂç¹¥»÷¡£¸Ã×éÖ¯×Ô2025Äê3ÔÂÆð»îÔ¾£¬9ÔÂÒÑÔÚÆä"Warlock¿Í»§Êý¾Ýй¶Ðã"°µÍøÕ¾µãÐû²¼60ÃûÊܺ¦Õߣ¬Ä¿µÄº¸Ç±±ÃÀ¡¢Å·ÖÞ¡¢ÄÏÃÀµÄСÐÍÉÌҵʵÌå¡¢Õþ¸®»ú¹¹¼°´óÐÍ¿ç¹ú¹«Ë¾¡£Æä¹¥»÷ÌØÕ÷°üÀ¨Ê¹ÓÃSharePointÁãÈÕÎó²î¡¢°²ÅÅ×Ô½ç˵ToolShellÁ´¡¢Í¶·ÅWeb Shell¼°»ùÓÚGolangµÄWebSocket·þÎñÆ÷¾ÙÐг¤ÆÚ»¯£¬²¢ÀÄÓÃVelociraptorµÈÕýµ±¹¤¾ßʵÑéÒþ²ØËíµÀ¹¥»÷£¬Í¬Ê±ÍŽáMimikatzƾ֤͵ÇÔ¡¢PsExecºáÏòÒÆ¶¯¼°GPOÍÆËÍÀÕË÷¸ºÔصȹŰåÊÖ·¨¡£¸Ã×é֯йÃÜÄ£Ê½ÆæÒ죬ʡÂÔÐû²¼ÈÕÆÚÓëÊÓ¾õÑù±¾£¬½öËæ»úÅû¶±»µÁÊý¾ÝÁ¿£¬²¢Í¨¹ý×¢Êͱê×¢Êý¾Ý״̬£¨Ðû²¼/³öÊÛ/δ֧¸¶Êê½ð£©£¬ÉõÖÁÌṩÏÖʵÊý¾ÝÁ´½Ó¡£ÆäFAQÉùÃ÷ѵ³â"²»ÈÏÕæÈεĹ«Ë¾"£¬³ÆÎ´ÁªÏµµÄ´ó¿Í»§Êý¾Ý½«Ãâ·Ñ¹ûÕæ£¬µ«"¸ß¶ÈÃô¸ÐÊý¾Ý"µÄ´óÐÍÆóÒµ¿Í»§ÐÅÏ¢²»»áÍêÈ«Åû¶¡£SophosÖ¸³ö£¬WarlockÖ±ÖÁ6Ô²ÅÔÚ¶íÓïÂÛ̳Ramp¹ûÕæ»îÔ¾£¬ÔøÕ÷¼¯Veeam¡¢ESXi¡¢SharePointÎó²îʹÓü°EDRÖÐÖ¹¹¤¾ß¡£
https://cybernews.com/security/warlock-ransomware-group-attacks-surge-september/
2. Æ×ÓÀÄÓÃÈ˹¤ÖÇÄÜÔÉúƽ̨ÍйÜÐéαÑéÖ¤ÂëÒ³Ãæ
9ÔÂ22ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼×îб¨¸æÕ¹ÏÖ£¬È˹¤ÖÇÄÜ¿ª·¢Æ½Ì¨Õý±»ÍøÂç·¸·¨·Ö×ÓʹÓ㬳ÉΪÍйÜÐéαÑéÖ¤Â루CAPTCHA£©Ò³ÃæµÄÐÂÔØÌ壬´Ó¶øÌÓ±ÜÇå¾²¼ì²â²¢ÓÕµ¼Óû§½øÈë´¹ÂÚÍøÕ¾¡£×÷ΪÑéÖ¤ÕæÊÊÓû§µÄÒªº¦¹¤¾ß£¬CAPTCHA±¾Ó¦µÖÓù»úеÈ˹¥»÷£¬ÏÖÔÚÈ´±»·´ÏòʹÓ㬳ÉÎªÍøÂç´¹ÂÚµÄ"צÑÀ"¡£Ñо¿·¢Ã÷£¬×Ô2025Äê1ÔÂÆð£¬Ê¹ÓÃLovable¡¢Netlify¡¢VercelµÈAIÔÉú¿ª·¢Æ½Ì¨ÍйÜÐéαÑéÖ¤ÂëÒ³ÃæµÄÍøÂç´¹ÂÚÔ˶¯¼¤Ôö¡£ÕâЩƽ̨Ðû³Æ"Áã´úÂë¼´¿É¹¹½¨Ó¦ÓÃ"£¬½µµÍÁËÊÖÒÕÃż÷£¬Ê¹·¸·¨·Ö×ÓÄÜ¿ìËÙ½¨Éè¿´ËÆÕý¹æµÄÑéÖ¤ÂëÌôÕ½Ò³Ãæ¡£¹¥»÷Á÷³Ìͨ³£Ê¼ÓÚαװ³É"ÃÜÂëÖØÖÃ""USPSµØµã±ä»»"µÈ½ôÆÈÓʼþµÄ´¹ÂÚÁ´½Ó£¬Óû§µã»÷ºóÊ×ÏÈ¿´µ½ÐéαCAPTCHAÒ³Ãæ£¬ÒòÆä"¹Ù·½ÑéÖ¤"Íâ¹Û£¬Êܺ¦ÕßÒ×ËÉ¿ªÐ¡ÐÄ£¬¶ø×Ô¶¯É¨Ã蹤¾ßÒò½ö¼ì²âµ½ÑéÖ¤Âë¶ø·Çµ×²ãÆ¾Ö¤ÍøÂç±íµ¥£¬ÄÑÒÔʶ±ð¶ñÒâÒ³Ãæ¡£Íê³ÉÑéÖ¤ºó£¬Óû§»á±»Öض¨ÏòÖÁÕæÕýµÄ´¹ÂÚÒ³Ãæ£¬µ¼ÖÂÆ¾Ö¤¡¢Ãô¸ÐÊý¾Ýй¶¡£¸üÑÏËàµÄÊÇ£¬¹¹½¨´ËÀàÒ³Ãæ½öÐè»ù´¡ÊÖÒÕÄÜÁ¦£¬ÅäºÏAI±àÂëÖúÊÖ¼´¿ÉÍê³É¡£
https://cybernews.com/security/ai-platforms-captcha-phishing/
3. µÂ¹úDCS³äµçÕ¾Êý¾Ýй¶£¬¿Í»§·þÎñÉÌÎ¥¹æ»á¼ûÖÂÓû§ÐÅϢΣº¦
9ÔÂ23ÈÕ£¬µÂ¹úÊý×Ö³äµç½â¾ö¼Æ»®¹«Ë¾£¨DCS£©¿ËÈÕÏòÓû§×ª´ïÒ»ÆðÊý¾ÝÇå¾²ÊÂÎñ£¬Æä¿Í»§·þÎñÌṩÉÌÔÚ´¦Öóͷ£Êý¾Ýʱ±¬·¢Î¥¹æÐÐΪ£¬µ¼Ö²¿·Ö¿Í»§ÐÅÏ¢ÃæÁÙй¶Σº¦¡£DCS×÷ΪŷÖÞÖ÷Òªµç¶¯Æû³µ³äµç·þÎñÉÌ£¬ÖÎÀí×Å30¶à¸ö¹ú¼Ò³¬100ÍòÓû§¼°98Íò×ù³äµçÕ¾£¬²¢Îª±¦Âí¡¢ÆðÑÇµÈÆ·ÅÆÌṩ¼Æ·Ñ·þÎñ¡£ÊÂÎñÆðÔ´ÓÚDCS·¢Ã÷ÆäÏàÖúµÄ·þÎñÉÌÔÚÎÞºÏÀíÀíÓÉÇéÐÎÏ»á¼ûÁ˿ͻ§Êý¾Ý¡£DCSÁ¬Ã¦Æô¶¯ÖÜÈ«ÊӲ죬ȷÈÏÎ¥¹æÐÐÎªÉæ¼°¸öλÊý²¡Àý£¬ÊÜÓ°ÏìÊý¾Ý½öÏÞÓÚÐÕÃûºÍµç×ÓÓʼþµØµã£¬¶øÍêÕûÖ§¸¶ÐÅÏ¢Òòδ´æ´¢ÔÚÊÜÓ°ÏìÊý¾Ý¿âÖеÃÒÔ±£È«¡£ÏÖÔÚ£¬DCSÒÑÓë·þÎñÉÌÖÎÀí²ãÏàÖú²éÃ÷Ôµ¹ÊÔÓÉ£¬ÊµÑéÌØÊâÇå¾²²½·¥£¬²¢×ª´ïÖ´·¨¼°Êý¾Ý±£»¤²¿·Ö¡£DCSÔÚ9ÔÂ19ÈÕÉèÁ¢µÄרÏîÒ³ÃæÖÐÇ¿µ÷£¬³äµç·þÎñ¼°¼Æ·ÑϵͳÈÔÇå¾²ÔËÐУ¬Óû§ÎÞÐè½ÓÄÉÌØÊâ²Ù×÷£¬µ«ÐèСÐÄDZÔÚ´¹ÂÚ¹¥»÷¡£¹«Ë¾ÖØÉֻ꣬¹ÜÄ¿½ñ½öÈ·ÈÏÉÙÊý°¸Àý£¬µ«ÎÞ·¨Íêȫɨ³ýÆäËû¿Í»§Êý¾Ý±»·ÇÊÚȨÉó²éµÄ¿ÉÄÜÐÔ£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£
https://www.theregister.com/2025/09/23/dcs_data_breach/
4. ŦԼÍŽá¹ú´ó»áǰϦ´Ý»Ù´óÐ͵çÐÅÍøÂç
9ÔÂ23ÈÕ£¬ÔÚÍŽá¹ú´ó»áÓÚÂü¹þ¶ÙÕÙ¿ªÇ°Ï¦£¬Áª°îÊÓ²ìÖ°Ô±´Ý»ÙÁËÒ»¸öÒþ²ØÔÚŦԼµØÇøµÄ´óÐ͵çÐÅÍøÂç¡£¸ÃÍøÂç°üÀ¨Áè¼Ý10ÍòÕÅSIM¿¨ºÍ300̨·þÎñÆ÷£¬¿ÉÄܶÔŦԼÊÐͨѶϵͳÔì³ÉÔÖÄÑÐÔÆÆËð¡£ÌØÇÚ¾ÖÖ¸³ö£¬´ËÍøÂç¿É×ÌÈŽôÆÈÏìÓ¦·þÎñ¡¢¹Ø±Õ·äÎÑÍøÂç²¢·¢ËͼÓÃÜÐÅÏ¢£¬Ç¡·ê150Óàλ¹ú¼ÊÏòµ¼ÈËÆë¾ÛŦԼʱ´ú¡£ÊÓ²ìÏÔʾ£¬¸ÃÍøÂç×°±¸ÂþÑÜÓÚÍŽá¹ú×ܲ¿35Ó¢Àï°ë¾¶¹æÄ£ÄÚ£¬¹æÄ£Óë×°±¸ÀàÐÍÌåÏÖÆä¿ÉÄÜΪÃñ×å¹ú¼Ò¼à¿ØÐж¯¡£Í¨Ì«¹ýÎöSIM¿¨Êý¾Ý£¬ÌØÇÚ¾Ö·¢Ã÷ÆäÓëÖÁÉÙÒ»¸öÍâ¹úÕþ¸®¼°··¶¾¼¯Íű£´æ¹ØÁª¡£Ö»¹ÜÍŽá¹ú´ó»áÊÇ·ñΪĿµÄÉв»Ã÷È·£¬µ«ÌØÇÚ¾ÖÌØ¹¤ÂíÌØ¡¤Âó¿Ë¿â¶ûÇ¿µ÷£¬¸Ãϵͳ¾ß±¸´Ý»ÙÊÖ»úÐźÅËþ¡¢×è¶ÏÓ¦¼±Í¨Ñ¶µÄÄÜÁ¦£¬ÔÚÖØ´ó¹ú¼ÊÔ˶¯Åä¾°Ï¿ÉÄÜÒý·¢¶¼»á¼¶Í¨Ñ¶Ì±»¾¡£¸ÃÍøÂçÓÚ½ñÄê8Ô±»ÌØÇÚ¾ÖÔÚÊÓ²ìÕë´ºÁª°î¹ÙÔ±µÄ¡°µç»°Íþв¡±ÊÂÎñʱ·¢Ã÷¡£Âó¿Ë¿â¶ûÌåÏÖ£¬ÆÊÎöÍøÂç´«ÊäµÄͨѶÄÚÈÝÐèʱÈÕ£¬µ«ÏµÍ³ÍþÁ¦½ûֹСê˼Á¿µ½×°±¸¼ÛÖµÊý°ÙÍòÃÀÔª£¬Ä»ºó×éÖ¯×ʽðÐÛºñ£¬¿ÉÄܱ£´æÀàËÆÍøÂç±é²¼ÃÀ¹úÆäËû¶¼»á¡£
https://securityboulevard.com/2025/09/secret-service-shuts-down-sprawling-hidden-telecom-network-in-ny/
5. CISA³ÆºÚ¿ÍʹÓÃGeoServerÎó²îÈëÇÖÁª°î»ú¹¹
9ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Åû¶£¬2024Äê7Ô£¬¹¥»÷ÕßʹÓÃδÐÞ²¹µÄGeoServerʵÀý£¨Éæ¼°CVE-2024-36401Ô¶³Ì´úÂëÖ´ÐÐÎó²î£©ÇÖÈëÁËÒ»¼ÒÃÀ¹úÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÍøÂç¡£¸ÃÎó²îÓÚ2024Äê6ÔÂ18ÈÕ±»ÐÞ¸´£¬µ«Ò»¸öÔºó£¬ÒòÇå¾²Ñо¿Ö°Ô±ÔÚÏß·ÖÏí¿´·¨ÑéÖ¤£¨PoC£©ÑÝʾ´úÂ룬CISA½«Æä¼ÓÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±¡£Íþв¼à¿Ø×éÖ¯ShadowserverÓÚ7ÔÂ9ÈÕÆð¼ì²âµ½Õë¶Ô¸ÃÎó²îµÄ¹¥»÷£¬OSINTËÑË÷ÒýÇæZoomEye×·×Ùµ½³¬16,000̨̻¶ÔÚÍøµÄGeoServer·þÎñÆ÷¡£¹¥»÷ÕßÈëÇÖÁª°î»ú¹¹GeoServer·þÎñÆ÷ºó£¬ÔÚÔ¼Á½ÖÜÄÚºáÏòÒÆ¶¯¹¥ÏÝWeb·þÎñÆ÷ºÍSQL·þÎñÆ÷£¬ÉÏ´«China ChopperµÈWeb Shell¼°ÓÃÓÚÔ¶³Ì»á¼û¡¢³¤ÆÚ»¯¡¢ÏÂÁîÖ´ÐкÍȨÏÞÌáÉýµÄ¾ç±¾£¬²¢Í¨¹ý±©Á¦ÆÆ½âÊÖÒÕ£¨T1110£©»ñÈ¡ÃÜÂëÒÔ½øÒ»²½ºáÏòÒÆ¶¯¡£¹¥»÷ÕßDZÔÚÈýÖÜδ±»·¢Ã÷£¬Ö±ÖÁ7ÔÂ31ÈÕÁª°î»ú¹¹µÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©¹¤¾ß½«SQL·þÎñÆ÷ÉϵĿÉÒÉÎļþ±ê¼ÇΪ¶ñÒâÈí¼þ²¢´¥·¢¾¯±¨£¬Çå¾²ÔËÓªÖÐÐÄ£¨SOC£©Ëæºó¸ôÀë·þÎñÆ÷²¢ÍŽáCISAÊӲ졣
https://www.bleepingcomputer.com/news/security/cisa-says-hackers-breached-federal-agency-using-geoserver-exploit/
6. Circle KÏã¸ÛÓªÒµÒòÍøÂçÖÐֹ̱»¾
9ÔÂ23ÈÕ£¬¿ËÈÕ£¬±ãµ±µêÁ¬ËøÆ·ÅÆCircle KÏã¸ÛÓªÒµÒò¡°ÍøÂçÖÐÖ¹¡±ÊÂÎñµ¼ÖÂÈ«¸Û½ü400¼ÒÃŵêµç×ÓÖ§¸¶¡¢»áÔ±·þÎñ¼°µç×ÓÓʼþϵͳ̱»¾ÊýÈÕ£¬½öÏֽ𼰰˴ï֧ͨ¸¶¹¦Ð§Î¬³ÖÔË×÷¡£¸Ã¹«Ë¾ÓÚÖÜÄ©Ê×´Îת´ïÊÂÎñºó£¬ÖÜÒ»ÔÚFacebookÉùÃ÷ÖÐÌåÏÖ£¬ÒòÎÞ·¨É¨³ýÍøÂç¹¥»÷¿ÉÄÜÐÔ£¬ÒÑÆô¶¯Êý¾Ý±£»¤²½·¥²¢ÓëÖ´·¨²¿·Ö¼°µÚÈý·½×¨¼ÒÏàÖúÊÓ²ìÔµ¹ÊÔÓÉ¡¢¹æÄ£¼°Ó°Ïìˮƽ¡£×èÖ¹Öܶþ£¬Óû§ÈÔͨ¹ýÉ罻ýÌå·´Ïì·þÎñÖÐÖ¹ÎÊÌ⣬Èç»ý·ÖºÍÓÅ»ÝȯÓâÆÚ£¬ºôÓõÑÓÉìʹÓÃÏÞÆÚ¡£Circle KÏã¸ÛÓɼÓÄÃÖÁ¹«Ë¾Alimentation Couche-TardËùÓУ¬¸Ã¹«Ë¾ÔÚ±±ÃÀ¼°ÆäËûµØÇøÄ±»®Circle KÊÐËÁ¡£Circle KÏã¸ÛµÄǰĸ¹«Ë¾ÑÇÖޱ㵱ÁãÊÛÓÐÏÞ¹«Ë¾ (CRA) ÖÜÒ»Ò²±¨¸æÁËÍøÂçÖÐÖ¹¡£CRAÓÚ20ÊÀ¼Í80ÄêÔ»ñµÃÁËCircle KµÄÊÚȨ£¬²¢ÓÚ2020Ä꽫ÆäÊۻظøAlimentation Couche-Tard¡£CRAÌåÏÖ£¬ÆäÄÚ²¿ÏµÍ³Êܵ½Ó°Ï죬²¢ÒÑִ֪ͨ·¨²¿·Ö£¬µ«ÏÖÔÚÉв»ÇåÎúÁ½ÆðÊÂÎñÊÇ·ñÓйØÁª¡£
https://therecord.media/circle-k-hong-kong-suspected-cyberattack-convience-stores


¾©¹«Íø°²±¸11010802024551ºÅ