±ÏÂíÍþºÉÀ¼·Ö²¿ÔâNovaÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2026-01-291. ±ÏÂíÍþºÉÀ¼·Ö²¿ÔâNovaÀÕË÷Èí¼þ¹¥»÷
1ÔÂ26ÈÕ£¬¿ËÈÕ£¬ºÉÀ¼±ÏÂíÍþ»á¼ÆÊ¦ÊÂÎñËùºÉÀ¼·Ö²¿ÔâÓö»îÔ¾ÀÕË÷Èí¼þ×éÖ¯NovaµÄ¹©Ó¦Á´¹¥»÷£¬³ÉΪ¸Ã×éÖ¯×îÐÂÄ¿µÄ¡£¾ÝÀÕË÷Èí¼þÔ˶¯¸ú×ÙÆ½Ì¨Åû¶£¬¹¥»÷±¬·¢Ê±¼äÓë·¢Ã÷ÈÕÆÚÏà½ü£¬¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡´ó×ÚÃô¸ÐÊý¾Ý£¬²¢·¢³öΪÆÚ10ÌìµÄ×îºóͨ뺣¬ÒªÇóÊܺ¦·½ÁªÏµÌ¸ÅÐÊê½ðÖ§¸¶¡£±ÏÂíÍþ×÷ΪȫÇòÁìÏȵÄרҵ·þÎñ»ú¹¹£¬ºÉÀ¼·Ö²¿ÕÆÎÕן¸Ç½ðÈÚ·þÎñ¡¢ºÏ¹æÉ󼯼°ÆóÒµÔËÓªµÄÃô¸Ð¿Í»§Êý¾Ý£¬´Ë´Î¹¥»÷ÇкÏNovaÒ»Ö±µÄ×÷°¸Ä£Ê½¡ª¡ª×¨×¢ÓÚרҵ·þÎñÓë½ðÈÚÐÐÒµµÄ×ÅÃûÆóÒµ¡£ÊÂÎñ±¬·¢ºó£¬ÍøÂçÇå¾²ÍŶӽ¨ÒéÁ¬Ã¦·â±ÕÒÑʶ±ðµÄÏà¹ØÓòÃû»ù´¡ÉèÊ©£¬²¢Ç×½ü¼à¿ØÍøÂçÄÚÊÇ·ñ±£´æÓëÀÕË÷Èí¼þ°²ÅÅÏà¹ØµÄºáÏòÒÆ¶¯Ô˶¯¡£Ò»µ©·¢Ã÷ÓëNovaÏà¹ØµÄÈëÇÖºÛ¼£»ò¹¥»÷Ö¸±ê£¬±ØÐèÁ¬Ã¦Æô¶¯Ó¦¼±Ô¤°¸¡£×èÖ¹ÏÖÔÚ£¬±ÏÂíÍþ¹Ù·½ÉÐδ¾Í´ËÊÂÎñ¹ûÕæ½ÒÏþÉùÃ÷£¬¿Í»§¼°Ïà¹Ø·½ÐèÇ×½ü¹Ø×¢Æä¹Ù·½ÇþµÀºóÐø×ª´ï£¬ÒÔ»ñÈ¡ÊÂÎñÓ°ÏìÆÀ¹À¼°ÐÞ¸´Ï£Íûʱ¼ä±í¡£
https://cybersecuritynews.com/nova-ransomware-breach-kpmg-netherlands/
2. TA584ʹÓÃTsundere BotÓëXWormľÂíʵÑéÀÕË÷¹¥»÷Á´
1ÔÂ28ÈÕ£¬×Ô2020ÄêÆð£¬ProofpointÒ»Á¬×·×ÙµÄTA584³õʼ»á¼ûÊðÀí½üÆÚÔ˶¯¼¤Ôö£¬Æäͨ¹ýTsundere BotÓëXWormÔ¶³Ì»á¼ûľÂí¹¹½¨ÖØ´ó¹¥»÷Á´£¬ÏÔÖøÌáÉýÈÆ¹ý¾²Ì¬¼ì²âÄÜÁ¦£¬¿ÉÄÜÒý·¢ÀÕË÷Èí¼þ¹¥»÷¡£¸Ã×éÖ¯2025ÄêβÔ˶¯Á¿½ÏͬÄêµÚÒ»¼¾¶ÈÔöÌíÈý±¶£¬¹¥»÷¹æÄ£´Ó¹Å°åÄ¿µÄÇø£¨±±ÃÀ¡¢Ó¢°®£©À©Õ¹ÖÁµÂ¹ú¡¢Å·ÖÞ¶à¹ú¼°°Ä´óÀûÑÇ¡£Tsundere BotÓÉ¿¨°Í˹»ù2023ÄêËê¼£¬¹ØÁª¶íÓï²Ù×÷Ô±¼°123 Stealer¶ñÒâÈí¼þ£¬¾ß±¸ºóÃÅ¡¢¼ÓÔØÆ÷¹¦Ð§£¬ÐèNode.jsÇéÐÎÔËÐС£Æäͨ¹ýEtherHidingÊÖÒÕ´ÓÒÔÌ«·»Çø¿éÁ´»ñÈ¡C2µØµã£¬²¢ÄÚÖÃÓ²±àÂ뱸Óõص㣬ͨ¹ýWebSocketÓëC2·þÎñÆ÷ͨѶ£¬Í¬Ê±¼ì²âϵͳÓïÑÔ£¬ÈôΪ¶ÀÁªÌåÓïÑÔ£¨Èç¶íÓÔòÖÐÖ¹Ö´ÐС£¸Ã¶ñÒâÈí¼þ¿ÉÍøÂçϵͳÐÅÏ¢¡¢Ö´ÐÐí§ÒâJS´úÂë¡¢³äµ±SOCKSÊðÀí£¬²¢ÄÚÖÃÊг¡ÓÃÓÚ½©Ê¬³ÌÐòÉúÒâ¡£¹¥»÷Á´Ê¼ÓÚ±»ÈëÇÖÀϾÉÕË»§·¢Ë͵Ĵ¹ÂÚÓʼþ£¬Óʼþ°üÀ¨Ä¿µÄΨһURL¡¢µØÀíΧÀ¸¡¢IP¹ýÂ˼°Öض¨ÏòÁ´¡£Óû§¾CAPTCHAÑéÖ¤ºó½øÈëClickFixÒ³Ãæ£¬±»ÓÕµ¼Ö´ÐÐPowerShellÏÂÁ¼ÓÔØ»ìÏý¾ç±¾½«XWorm»òTsundere Bot×¢ÈëÄڴ棬×îÖÕä¯ÀÀÆ÷±»Öض¨ÏòÖÁÎÞº¦ÍøÕ¾ÒÔÑÚÊι¥»÷¡£
https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/
3. ²¨À¼µçÍøÔâÊÜÍøÂç¹¥»÷£¬Ô¼30¸öÉèÊ©Êܵ½Ó°Ïì
1ÔÂ28ÈÕ£¬²¨À¼µçÍø12ÔÂÏÂÑ®ÔâÊÜÐͬ¹¥»÷£¬Ä¿µÄÖ±Ö¸Ìì϶à¸öÂþÑÜʽÄÜÔ´×ÊÔ´£¨DER£©Õ¾µã£¬°üÀ¨ÈȵçÁª²ú£¨CHP£©ÉèÊ©¡¢·çÄܼ°Ì«ÑôÄܵ÷Àíϵͳ¡£´Ë´Î¹¥»÷ËäδÖÐÖ¹µçÁ¦¹©Ó¦£¬µ«µ¼ÖÂÒªº¦ÔËÓªÊÖÒÕ£¨OT£©ÏµÍ³ÊÜËð£¬Ë𻵡°ÎÞ·¨ÐÞ¸´µÄÒªº¦×°±¸¡±£¬×ÜËðʧ´ï1.2¼ªÍߣ¬Õ¼²¨À¼ÄÜÔ´¹©Ó¦µÄ5%¡£¾ÝÒªº¦¹¤Òµ»ù´¡ÉèÊ©Çå¾²¹«Ë¾DragosÅû¶£¬ÊÜÓ°ÏìËùÔÚÏÖʵԼ30¸ö£¬Ô¶³¬¹ûÕæ±¨µÀµÄ12¸ö¡£DragosÒÔÖеÈÐÅÐĽ«´Ë´Î¹¥»÷¹éÒòÓÚ¶íÂÞ˹ÍþвÐÐΪÌåElectrum¡£¸Ã×éÖ¯ËäÓëSandworm£¨APT44£©±£´æÖصþ£¬µ«±»ÊÓΪ×ÔÁ¦Ô˶¯¼¯Èº¡£´Ëǰ£¬ESETÔø±¨¸æAPT44ʹÓÃDynoWiper¶ñÒâÈí¼þ¶Ô²¨À¼µçÍøÌᳫʧ°Ü¹¥»÷£¬¶øElectrumµÄ¹¥»÷Ä¿µÄ¸ü¾Û½¹ÓÚÂþÑÜʽÄÜÔ´Õ¾µãµÄµ÷Àíϵͳ¡¢Ô¶³ÌÖն˵¥Î»£¨RTU£©¡¢ÍøÂç±ßÑØ×°±¸¡¢¼à¿ØÏµÍ³¼°»ùÓÚWindowsµÄ»úеµÈ̻¶ÇÒÒ×Êܹ¥»÷µÄϵͳ¡£ÊÂÎñÏìÓ¦Ö¤¾ÝÏÔʾ£¬¹¥»÷Õß¶Ô×°±¸°²ÅźͲÙ×÷·½·¨ÓÐÉî¿ÌÃ÷È·£¬Öظ´ÈëÇÖ¶à¸öÕ¾µãµÄÀàËÆRTUºÍ±ßÑØ×°±¸ÉèÖá£ËûÃÇÀÖ³Éʹ¶àÕ¾µãͨѶװ±¸Ê§Ð§£¬µ¼ÖÂÔ¶³Ì¼à¿ØºÍ¿ØÖƹ¦Ð§Ëðʧ£¬µ«·¢µç¹¦Ð§Î´ÖÐÖ¹¡£²¿·ÖOT/ICS×°±¸ÉèÖÃËð»µÖÁÎÞ·¨»Ö¸´£¬Õ¾µãWindowsϵͳ±»²Á³ý¡£
https://www.bleepingcomputer.com/news/security/cyberattack-on-polish-energy-grid-impacted-around-30-facilities/
4. eScan¸üзþÎñÆ÷ÔâÈëÇÖÖ¶ñÒâ¸üзַ¢
1ÔÂ28ÈÕ£¬eScan·À²¡¶¾²úÆ·ÖÆÔìÉÌMicroWorld Technologies 1ÔÂ20ÈÕ֤ʵÆäÇøÓò¸üзþÎñÆ÷ÔâÈëÇÖ£¬ÔÚÁ½Ð¡Ê±´°¿°¢ÚÄÚÏò²¿·Ö¿Í»§·Ö·¢Á˶ñÒâ¸üС£¸Ã¸üб»ÆÊÎöΪ°üÀ¨¶à½×¶Î¶ñÒâÈí¼þ£¬Í¨¹ý¸Ä¶¯eScanÕýµ±¸üÐÂ×é¼þ¡°Reload.exe¡±ÊµÏÖ³¤ÆÚ»¯ºóÃŰ²ÅÅ£¬µ¼ÖÂϵͳhostsÎļþÐ޸ġ¢¸üзþÎñÅþÁ¬×è¶Ï¼°ÐÂÇå¾²½ç˵ÎüÊÕʧ°Ü¡£eScanÌåÏÖ£¬´Ë´ÎÊÂÎñÔ´ÓÚδ¾ÊÚȨ»á¼ûÇøÓò·þÎñÆ÷ÉèÖã¬ÔÊÐí¶ñÒâÎļþ±»°²ÅÅÔÚ¸üзַ¢Â·¾¶ÖС£¹«Ë¾Ç¿µ÷¸ÃÊÂÎñÓë²úÆ·×Ô¼ºÎó²îÎ޹أ¬½öÓ°Ïì´ÓÌØ¶¨ÇøÓò¼¯ÈºÏÂÔØ¸üеĿͻ§¡£ÊÂÎñ±¬·¢ºó£¬eScanѸËÙ¸ôÀëÊÜÓ°Ïì»ù´¡ÉèÊ©¡¢ÂÖ»»Éí·ÝÑé֤ƾ֤£¬²¢ÓÚ1ÔÂ21ÈÕÐû²¼Ç徲ͨ¸æ£¬×Ô¶¯Í¨Öª²¢Ö±½ÓÁªÏµÊÜÓ°Ïì¿Í»§£¬Ìṩ°üÀ¨ÏµÍ³»Ö¸´¡¢¸üй¦Ð§ÖØÆôÓü°ÑéÖ¤µÄÐÞ¸´¸üгÌÐò¡£
https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/
5. FBI²é·âÀÕË÷Èí¼þÍÅ»ïʹÓõÄRAMPÍøÂç·¸·¨ÂÛ̳
1ÔÂ28ÈÕ£¬FBIÍŽáÃÀ¹ú·ðÂÞÀï´ïÖÝÄÏÇøÉó²é¹Ù°ì¹«ÊÒ¼°Ë¾·¨²¿ÅÌËã»ú·¸·¨²¿·Ö²é·âÁËÎÛÃûÕÑÖøµÄRAMPÍøÂç·¸·¨ÂÛ̳¡£¸ÃÂÛ̳×÷Ϊ¶íÓïµØÏÂÍøÂçÖÐÉÙÊýÈÔ¹ûÕæÔÊÐíÍÆ¹ãÀÕË÷Èí¼þÐж¯µÄƽ̨£¬ÆäTorÍøÕ¾¼°Ã÷ÍøÓòÃûramp4u.ioÏÖÒÑÏÔʾ²é·â֪ͨ£¬²¢¼¥Ð¦Ê½ÒýÓÃ×ÔÉí¿ÚºÅ¡°Î¨Ò»ÔÊÐíÀÕË÷Èí¼þµÄµØ·½£¡¡±¼°¶íÂÞ˹¶¯»½ÇÉ«ÂêɯգÑÛͼ°¸¡£´Ë´ÎÐж¯Ê¹Ö´·¨²¿·Ö¿É»ñÈ¡ÂÛ̳Óû§Êý¾Ý£¬°üÀ¨Óʼþ¡¢IPµØµã¡¢Ë½ÐŵÈDZÔÚ·¸·¨Ö¤¾Ý£¬¿ÉÄܶԲÙ×÷Çå¾²ÊèºöµÄÍþвÐÐΪÕßʵÑéÉí·Ýʶ±ðÓë¾Ð²¶¡£RAMPÂÛ̳ÓɼÙÃûOrangeµÄMikhail MatveevÓÚ2021Äê7Ô½¨É裬ּÔڳнÓÒòDarkSide¹¥»÷Colonial Pipelineºó¶íÓïÂÛ̳եȡÀÕË÷Èí¼þÍÆ¹ãµÄ¿Õȱ¡£Matveev´ËǰΪBabukÀÕË÷Èí¼þÖÎÀíÔ±£¬¸Ã×éÖ¯Òò¹¥»÷»ªÊ¢¶ÙÌØÇø¾¯¾ÖºóÄÚ²¿·ÖÁÑ£¬ËûʹÓÃBabukÔÓÐTorÓòÃûÖØÐÞRAMP¡£ÂÛ̳ÉÏÏß³õÆÚÔâDDoS¹¥»÷£¬OrangeÔøÖ¸ÔðBabukǰ³ÉÔ±£¬µ«ºóÕß·ñ¶¨¡£MatveevÔڲɷÃÖÐ͸¶£¬RAMPδʵÏÖÓ¯ÀûÇÒÒ»Á¬Êܹ¥»÷£¬ºóÖð½¥Í˳öÖÎÀí¡£
https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/
6. PackageGateÎó²îÕ¹ÏÖJavaScript°ü¹ÜÀíÆ÷Ç徲ȱÏÝ
1ÔÂ28ÈÕ£¬Çå¾²¹«Ë¾Koi¿ËÈÕÅû¶ÃûΪ"PackageGate"µÄϵÁÐÁãÈÕÎó²î£¬Ó°ÏìNPM¡¢PNPM¡¢VLTºÍBunµÈÖ÷Á÷JavaScript°ü¹ÜÀíÆ÷¡£ÕâЩÎó²î¿ÉÈÆ¹ý¹©Ó¦Á´·À»¤»úÖÆ£¬ÔÊÐí¹¥»÷ÕßÔÚÒÀÀµÏîÖÐÖ²ÈëÒþ²Ø¶ñÒâ´úÂ룬×ÝÈ»ÆôÓýûÓÃÉúÃüÖÜÆÚ¾ç±¾£¨--ignore-scripts£©ºÍËø¶¨Îļþ±£»¤²½·¥ÈÔ¿ÉÄܱ»Ê¹Óá£Ñо¿ÏÔʾ£¬npm±£´æÑÏÖØÉè¼ÆÈ±ÏÝ£º¶ñÒâGitÒÀÀµÏî¿Éͨ¹ýαÔìµÄ.npmrcÎļþÌæ»»Git¶þ½øÖÆÎļþ£¬´¥·¢Ô¶³Ì´úÂëÖ´ÐУ»pnpmËäĬÈϽûÓþ籾£¬µ«»áÔÚGitÀȡʱÔËÐÐ×¼±¸¾ç±¾£»vltÔÊÐí±éÀútar°ü·¾¶£¬¹¥»÷Õß¿ÉÁýÕÖϵͳÎļþ£»BunÔòÒòÐÅÍаüÃû¶ø·ÇÔ´´úÂ룬±£´æ°üÃûÖØÓÃΣº¦¡£¸üÑÏËàµÄÊÇ£¬pnpmºÍvltµÄËø¶¨Îļþ»úÖÆÊ§Ð§£¬ËüÃǽÓÊÜÎÞÍêÕûÐÔ¹þÏ£µÄÔ¶³Ìtar°ü£¬Ê¹¹¥»÷ÕßÄÜÔÚ´úÂëÉó²éºóÐÞ¸ÄÄÚÈÝ¡£Koi±¨¸æÖ¸³ö£¬¹¥»÷Õß¿Éͨ¹ýÉî¶ÈÒÀÀµÊ÷Ö²Èë¶ñÒâ°ü£¬Æ¾Ö¤Ê±¼ä¡¢IPµÈÐźŶ¨ÏòͶ·Å¶ñÒâ´úÂë£¬Ëø¶¨ÎļþÎÞ·¨Ìṩ·À»¤¡£
https://securityaffairs.com/187416/hacking/packagegate-bugs-let-attackers-bypass-protections-in-npm-pnpm-vlt-and-bun.html


¾©¹«Íø°²±¸11010802024551ºÅ