APT36ʹÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶ÈÕþ¸®
Ðû²¼Ê±¼ä 2025-10-271. APT36ʹÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶ÈÕþ¸®
10ÔÂ24ÈÕ£¬¿ËÈÕ£¬°Í»ù˹̹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Transparent Tribe£¨APT36£©Õë¶ÔÓ¡¶ÈÕþ¸®ÊµÌåÌᳫÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬Èö²¥»ùÓÚGolangµÄDeskRAT¶ñÒâÈí¼þ¡£¸Ã¹¥»÷Á´Í¨¹ýº¬ZIP¸½¼þ»òGoogle DriveÁ´½ÓµÄ´¹ÂÚÓʼþʵÑ飬ʹÓÃMozilla FirefoxÏÔʾÓÕ¶üPDFÎļþµÄͬʱִÐÐÖ÷ÔØºÉ¡£DeskRATͨ¹ýWebSocket½¨ÉèC2ÅþÁ¬£¬Ö§³Öping¡¢heartbeatµÈÎåÖÖÏÂÁ²¢½ÓÄÉsystemd·þÎñ¡¢cron×÷ÒµµÈËÄÖÖ³¤ÆÚÐÔÒªÁì¡£ÆäC2·þÎñÆ÷½ÓÄÉÒþÐÎÉè¼Æ£¬Î´·ºÆðÔÚ¹ûÕæNS¼Í¼ÖС£´Ë´ÎÔ˶¯ÑÓÐøÁËCYFIRMA´ËǰÅû¶µÄ¹¥»÷ģʽ£¬²¢¹ØÁªµ½¿çƽ̨ºóÃÅStealthServer¡£¸ÃºóÃű£´æWindowsÈý°æ±¾¼°LinuxÁ½±äÖÖ£ºWindows-V3°æ±¾½ÓÄÉWebSocketͨѶ£¬ÓëDeskRAT¹¦Ð§Ò»Ö£»Linux±äÖÖÔòͨ¹ýHTTPͨѶ£¬¾ß±¸Îļþä¯ÀÀ¡¢ÉÏ´«¼°Ö´ÐÐÄÜÁ¦£¬¿É´Ó¸ùĿ¼µÝ¹éËÑË÷ÌØ¶¨À©Õ¹ÃûÎļþ²¢¼ÓÃÜ´«Êä¡£
https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
2. Windows Server WSUS¸ßΣÎó²îÔâÒ°ÍâʹÓÃ
10ÔÂ24ÈÕ£¬¿ËÈÕ£¬ÍøÂçÇå¾²ÁìÓò¾Û½¹ÓÚ±àºÅΪCVE-2025-59287µÄ¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²î£¬¸ÃÎó²îÓ°ÏìÆôÓÃÁËWindows Server¸üзþÎñ£¨WSUS£©·þÎñÆ÷½ÇÉ«µÄWindows Serverϵͳ£¬ÓÈÆäÊÇ×÷Ϊ×éÖ¯ÄÚÆäËûWSUS·þÎñÆ÷¸üÐÂÔ´µÄ·þÎñÆ÷¡£¹¥»÷Õß¿ÉÎÞÐèÌØÈ¨»òÓû§½»»¥£¬Ô¶³ÌʹÓôËÎó²îÒÔSYSTEMȨÏÞÖ´ÐжñÒâ´úÂ룬²¢¿ÉÄÜÔÚWSUS·þÎñÆ÷¼äºáÏòÈö²¥¡£Î¢ÈíÒÑÕë¶ÔËùÓÐÊÜÓ°Ïì°æ±¾Ðû²¼´øÍâÇå¾²¸üУ¬²¢Ç¿ÁÒ½¨ÒéITÖÎÀíÔ±¾¡¿ì°²ÅÅ¡£¹ØÓÚÎÞ·¨Á¬Ã¦¸üеÄϵͳ£¬Î¢ÈíÌṩÁËÔÝʱ½â¾ö¼Æ»®£¬Èç½ûÓÃWSUS·þÎñÆ÷½ÇÉ«¡£Îó²î¹ûÕæºó£¬HawkTrace SecurityÐû²¼Á˲»ÔÊÐíÖ´ÐÐí§ÒâÏÂÁîµÄ¿´·¨ÑéÖ¤£¨PoC£©´úÂ룬µ«Eye SecurityºÍHuntress LabsËæ¼´ÊӲ쵽ҰÍâʹÓÃʵÑé¡£Eye Security±¨¸æÖÁÉÙÒ»Ãû¿Í»§ÏµÍ³Ôâ¹¥»÷£¬ÇÒ¹¥»÷ÊÖ·¨ÓëHawkTraceµÄPoC²î±ð£»HuntressÔò·¢Ã÷×Ô10ÔÂ23ÈÕÆð£¬Õë¶Ô̻¶8530/8531¶Ë¿ÚµÄWSUSʵÀýµÄ¹¥»÷£¬¹¥»÷Õßͨ¹ýPowerShellÏÂÁîÕì̽ÄÚ²¿WindowsÓò²¢½«Êý¾Ý·¢ËÍÖÁwebhook¡£HuntressÖ¸³ö£¬Ô¼25̨Ö÷»úÒ×Êܹ¥»÷£¬µ«Ô¤¼ÆÊ¹ÓÃÂʽϵͣ¬ÒòWSUSͨ³£²»Ì»Â¶ÓÚ¹«Íø¡£
https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/
3. AT&TÕÐÆ¸Æ½Ì¨ÔâEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷
10ÔÂ24ÈÕ£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû²¼Õë¶ÔAT&T Careersƽ̨µÄÀÕË÷ÐÅÏ¢£¬Éù³ÆÕÆÎÕ576,686ÌõÓë¸ÃµçОÞÍ·ÕÐÆ¸Æ½Ì¨Ïà¹ØµÄСÎÒ˽¼Ò¼Í¼£¬²¢ÉèÖÃËÄÌìЧ¹ûÕæÊý¾ÝµÄµ¹¼ÆÊ±¡£¸ÃÌõÄ¿±»ÃÜÂë±£»¤£¬ÒªÇóAT&T´ú±íÔÚʱÏÞÄÚ¡°°´Ö¸Ê¾²Ù×÷¡±£¬²»È»Êý¾Ý½«±»¹ûÕæ¡£EverestÒÔÐû²¼±»µÁÊý¾Ý¿â¼°ÀÕË÷ÒªÇóÖøÃû£¬ÆäйÃÜÍøÕ¾Ëä½ñÄêÔâÆÆËðµ«ÈÔ»îÔ¾£¬Êܺ¦ÕßÃû¼òµ¥Á¬¸üС£AT&TÉÐδ֤ʵ´Ë´ÎÊÂÎñ£¬µ«¸Ã¹«Ë¾ÀúÊ·Êý¾Ýй¶Ƶ·¢£º2021Äê8ÔÂShinyHuntersºÚ¿Í×éÖ¯ÇÔÈ¡7000Íò¿Í»§Êý¾Ý²¢³öÊÛ£¬AT&TÖ±ÖÁ2024Äê4Ô²ÅÈϿɣ»2025Äê6Ô£¬8600ÍòÌõº¬½âÃÜÉç»áÇå¾²ºÅÂ루SSN£©µÄ¼Í¼±»Ð¹Â¶£¬AT&TΪ´ËÖ§¸¶1.77ÒÚÃÀԪϢÕù½ð¡£Ä¿½ñ£¬ÊÜÓ°ÏìÕߣ¨ÉêÇëÈË¡¢Ô±¹¤¡¢ÊÓ²ìÔ±£©Ðè½ÓÄÉ·À»¤²½·¥£º¸ü¸ÄAT&TÕË»§ÃÜÂë²¢×èÖ¹ÖØ¸´Ê¹Óã»ÆôÓöàÒòËØÈÏÖ¤£»¼à¿Ø²ÆÎñ¡¢ÐÅÓü°Í¨Ñ¶Òì³££»Ð¡ÐÄ¡°AT&TÖ°Òµ¡±Ïà¹Ø´¹ÂÚ¹¥»÷£»½öͨ¹ý¹Ù·½ÇþµÀ»ñȡ֪ͨ£¬Îðµã»÷δÂÄÀúÖ¤Á´½Ó¡£
https://hackread.com/everest-ransomware-att-careers-breach/
4. WordPress²å¼þ¸ßΣÎó²îÒý·¢´ó¹æÄ£RCE¹¥»÷
10ÔÂ24ÈÕ£¬¿ËÈÕ£¬Ò»³¡Õë¶ÔWordPressÍøÕ¾µÄ´ó¹æÄ£¹¥»÷Ô˶¯±¬·¢£¬¹¥»÷ÕßʹÓÃGutenKitºÍHunk Companion²å¼þµÄÑÏÖØ¾ÉÇå¾²Îó²îʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£WordfenceÇå¾²¹«Ë¾Åû¶£¬½ö10ÔÂ8ÈÕÖÁ9ÈÕÁ½ÌìÄÚ£¬Æä¾Í×èÖ¹ÁËÕë¶Ô¿Í»§µÄ870Íò´Î¹¥»÷ʵÑé¡£´Ë´Î¹¥»÷Éæ¼°Èý¸ö¸ßΣÎó²î£ºCVE-2024-9234¡¢CVE-2024-9707ºÍCVE-2024-11972¡£ÕâЩÎó²î¾ù±»ÆÀ¶¨ÎªCVSS 9.8·Ö£¬ÔÊÐíδ¾ÈÏÖ¤µÄ¹¥»÷Õß×°ÖÃí§Òâ²å¼þ£¬½ø¶øÒýÈëÆäËû¶ñÒâ²å¼þʵÏÖRCE¡£Ö»¹ÜGutenKit 2.1.1ºÍHunk Companion 1.9.0ÒÑÐÞ¸´Îó²î£¬µ«Ðí¶àÍøÕ¾ÈÔÔÚʹÓÃÒ×Êܹ¥»÷µÄ¾É°æ±¾¡£¹¥»÷Õßͨ¹ýGitHubÍйÜÃûΪ¡°up¡±µÄ¶ñÒâZIP´æµµ£¬ÄÚº¬»ìÏý¾ç±¾£¬¿ÉÖ´ÐÐÎļþÉÏ´«/ÏÂÔØ/ɾ³ý¡¢È¨ÏÞÐ޸ĵȲÙ×÷£¬²¢Î±×°³ÉAll in One SEO²å¼þ×é¼þ×Ô¶¯ÒÔÖÎÀíÔ±Éí·ÝµÇ¼£¬ÒÔά³Ö³¤ÆÚÐÔ¡¢ÇÔÈ¡»òɾ³ýÊý¾Ý¡¢Ðá̽˽ÈËÐÅÏ¢¡£ÈôÎÞ·¨Ö±½Ó»ñÈ¡ÖÎÀíºóÃÅ£¬¹¥»÷Õß»¹»á×°ÖÃÒ×Êܹ¥»÷µÄ¡°wp-query-console¡±²å¼þ¾ÙÐÐδ¾ÈÏÖ¤µÄRCE¡£
https://www.bleepingcomputer.com/news/security/hackers-launch-mass-attacks-exploiting-outdated-wordpress-plugins/
5. ÐÂÐÍCoPhish¹¥»÷ͨ¹ýCopilot StudioÊðÀíÇÔÈ¡OAuthÁîÅÆ
10ÔÂ25ÈÕ£¬DatadogÇ徲ʵÑéÊÒÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪ¡°CoPhish¡±µÄÐÂÐÍÍøÂç´¹ÂÚÊÖÒÕ£¬ÆäʹÓÃ΢ÈíCopilot StudioÊðÀíͨ¹ýÕýµ±MicrosoftÓò·¢ËÍÚ²ÆÐÔOAuthÔÞ³ÉÇëÇ󡣸ÃÊÖÒÕÒÀÀµÉç»á¹¤³Ìѧ£¬µ«Î¢ÈíÒÑ֤ʵ½«Í¨¹ýδÀ´²úÆ·¸üÐÂÐÞ¸´»ù´¡Ôµ¹ÊÔÓÉ£¬²¢ÆÀ¹ÀÌØÊâ°ü¹Ü²½·¥Ç¿»¯ÖÎÀíÓëÔÞ³ÉÌåÑé¡£CoPhilot StudioÊðÀíÊÇ¿É×Ô½ç˵µÄ̸Ìì»úеÈË£¬Ö§³Ö¡°ÑÝÊ¾ÍøÕ¾¡±¹¦Ð§ÔÚ΢ÈíÓòÃû¹²Ïí£¬Õýµ±URLÌØÕ÷Ò×ÓÕµ¼Óû§ÐÅÍС£¹¥»÷Õ߿ɽ¨Éè¶ñÒâ¶à×â»§Ó¦Óã¬ÉèÖõǼÖ÷ÌâÖ¸ÏòÉí·ÝÑéÖ¤Ìṩ³ÌÐò£¬Í¨¹ýBurp Collaborator URL²¶»ñ»á»°ÁîÅÆ¡£µ±Óû§µã»÷¶ñÒâµÇ¼°´Å¥Ê±£¬Öض¨Ïò¿ÉÖ¸Ïòí§Òâ¶ñÒâURL£¬¶øOAuthÔÞ³ÉÊÂÇéÁ÷URL½öΪ¹¥»÷·¾¶Ö®Ò»¡£Î¢Èí½¨Òé¿Í»§Í¨¹ýÏÞÖÆÖÎÀíȨÏÞ¡¢ïÔÌÓ¦ÓÃȨÏÞ¼°ÊµÑéÖÎÀíÕþ²ß·ÀÓùCoPhish¡£DatadogÔö²¹Çå¾²½¨Ò飬°üÀ¨½ûÓÃÓû§Ó¦Óý¨ÉèĬÈÏÖµ¡¢Í¨¹ýEntra IDÓëCopilotÊðÀíÊÂÎñ¼à¿ØÓ¦ÓÃÔ޳ɡ¢ÊµÑéǿӦÓÃÔÞ³ÉÕ½ÂÔÌ΢ÈíĬÈÏÉèÖÃÎó²î¡£
https://www.bleepingcomputer.com/news/security/new-cophish-attack-steals-oauth-tokens-via-copilot-studio-agents/
6. ¶íÂÞ˹Áª°îÊÞÒ½ºÍÖ²Îï¼ìÒß¼àÊÓ¾ÖÔâDDoS¹¥»÷
10ÔÂ25ÈÕ£¬¶íÂÞ˹Áª°îÊÞÒ½ºÍÖ²Îï¼ìÒß¼àÊÓ¾Ö£¨Rosselkhoznadzor£©ÓÚ22ÈÕÔâÓö´ó¹æÄ£¶¨ÏòDDoS¹¥»÷£¬µ¼ÖÂÆäÅ©²úÆ·¼°»¯Ñ§Æ·¸ú×ÙϵͳVetISºÍSaturnÏÂÏߣ¬ÌìÏÂʳÎïÔËÊäÁ´ÏÝÈëÔÓÂÒ¡£¸Ã»ú¹¹Á¥ÊôÓÚ¶íÂÞ˹ũҵ²¿£¬ÈÏÕæî¿ÏµÊ³Îũ²úÆ·¼°»¯Ñ§Æ·µÄÁ÷ͨÇå¾²¡£¹¥»÷Ö±½Ó¹¥»÷ÁËMercuryƽ̨£¨VetIS½¹µã×é³É²¿·Ö£©£¬ÖÂʹÈâÀࡢţÄ̵ȶ¯Îï²úÆ·ÔËÊäËùÐèµÄÇ¿ÖÆÐÔµç×ÓÊÞÒ½Ö¤ÊéÎÞ·¨Ç©·¢£¬´óÐÍÈéÖÆÆ·¼°Ó¤¶ùʳÎïÉú²úÉ̱¨¸æÔËÊäÑÓÎóÊýСʱ¡£¹©Ó¦É̱»ÆÈÓëÁãÊÛÁ¬ËøµêÐÉÌÎÞµç×ÓÆ±¾Ý»õÎïµÄÎüÊÕÎÊÌ⣬ȫÇþµÀÁãÊÛÆóҵлᣨAKORT£©Ö÷ϯ˹̹Äá˹À·ò¡¤²©¸ñ´ïŵ·òÌåÏÖ£¬¶à¼ÒÁãÊÛÁ¬ËøµêÊÜϵͳ¹ÊÕÏÓ°Ï죬Õý½ôÆÈµ÷½âMercuryϵͳÒÔά³ÖÔËÓªºÍ²úÆ·×¢²á¡£RosselkhoznadzorÔÚTelegramÉùÃ÷ÖÐÇ¿µ÷£¬¹¥»÷δÍþвÊý¾ÝÍêÕûÐÔÓëÉñÃØÐÔ£¬µ«ÏµÍ³¿ÉÄÜÒòµØÀíλÖûòÅþÁ¬·½·¨·ºÆðÔÝʱ²»¿ÉÓ᣸ûú¹¹·ñ¶¨Ò»Á¬ÖÐÖ¹±¨µÀ£¬³Æµ±ÈÕÀֳɴ¦Öóͷ£³¬1450Íò·Ýµç×ÓÊÞÒ½Îļþ£¬²¢Ç¿µ÷Èô±¬·¢¸üÑÏÖØÖÐÖ¹£¬´ËÀà²Ù×÷½«ÎÞ·¨¾ÙÐС£
https://securityaffairs.com/183845/security/russian-rosselkhoznadzor-hit-by-ddos-attack-food-shipments-delayed.html


¾©¹«Íø°²±¸11010802024551ºÅ