ÍøÂç·¸·¨·Ö×Ó½« Raspberry Pi Äð³ÉڲƺÍÌØ¹¤¹¤¾ß
Ðû²¼Ê±¼ä 2024-03-273ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ GEOBOX µÄÐÂÈí¼þ°ü½ÓÄɼÛǮʵ»ÝÇÒÆÕ±éʹÓõÄRaspberry PiÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬£¬²¢½«Æäת±äÎªÖØ´óµÄÄäÃû¹¤¾ß - רΪڲơ¢Ìع¤»î¶¯ºÍÈÆ¹ýÇå¾²¿ØÖƶø¶¨ÖÆ¡£¡£¡£¡£¡£GEOBOX ÔÚ°µÍøÂÛ̳ÉÏµÄ¹ã¸æ¼ÛÇ®½öΪÿÔ 80 ÃÀÔª£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÍøÂç·¸·¨·Ö×ÓÄܹ»£ºÐéα GPS λÖ㻣»£»£»ÓÕÆÍøÂçÉèÖúÍÑÚÊλ¥ÁªÍø»î¶¯¡£¡£¡£¡£¡£GEOBOX ϵͳµÄÉè¼ÆºÜÊǼòÆÓ¡£¡£¡£¡£¡£Í¨¹ýÌṩÓû§Êֲᣬ£¬£¬£¬£¬£¬£¬£¬×ÝÈ»ÊÖÒÕרҵ֪ʶÓÐÏÞµÄÈËÒ²¿ÉÄܻᰲÅÅÕâÖÖΣÏյŤ¾ß¡£¡£¡£¡£¡£GEOBOX ÒÔ¼°ÀàËÆ¹¤¾ß¸øÖ´·¨²¿·ÖºÍÍøÂçÇå¾²ÉçÇø´øÀ´ÁËÔ½À´Ô½´óµÄÌôÕ½¡£¡£¡£¡£¡£Ëæ×ÅÁªÍø×°±¸±äµÃÔ½·¢Ç¿Ê¢ÇÒ¼ÛǮʵ»Ý£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚѰÕÒеÄÒªÁìÀ´Ê¹ÓÃËüÃÇ¡£¡£¡£¡£¡£
https://securityonline.info/cybercriminals-turn-cheap-raspberry-pi-into-powerful-fraud-and-espionage-tool/
2. kimsuky Èö²¥Î±×°³Éº«¹úij¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ
3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬AhnLab Çå¾²Ç鱨ÖÐÐÄ (ASEC) ×î½ü·¢Ã÷ Kimsuky ×éÖ¯Èö²¥Î±×°³Éº«¹ú¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ËùÉæ¼°µÄ¶ñÒâÈí¼þÊÇÒ»¸ö½¨ÉèEndorºóÃŵÄÖ²Èë³ÌÐò¡£¡£¡£¡£¡£ËäȻûÓÐÔÚÏÖʵ¹¥»÷ÖÐʹÓøÃÖ²Èë³ÌÐòµÄ¼Í¼£¬£¬£¬£¬£¬£¬£¬£¬µ«ÔÚÓë¸ÃÖ²Èë³ÌÐò±»ÍøÂçµÄԼĪͳһʱÆÚ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÒ»¸öÉæ¼°¸ÃÖ²Èë³ÌÐò½¨ÉèºóÃŵĹ¥»÷°¸Àý¡£¡£¡£¡£¡£ÍþвÐÐΪÕßʹÓúóÃÅÏÂÔØÆäËû¶ñÒâÈí¼þ»ò×°ÖÃ½ØÆÁ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Endor Ò²¾³£ÓÃÓÚÆäËû¹¥»÷£»£»£»£»ÒÑÍù£¬£¬£¬£¬£¬£¬£¬£¬ËüÓëNikidoorÒ»ÆðʹÓ㬣¬£¬£¬£¬£¬£¬£¬Nikidoor ͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¾ÙÐзַ¢¡£¡£¡£¡£¡£Dropper ±»Î±×°³Éº«¹úij¹«¹²»ú¹¹µÄ×°ÖóÌÐò¡£¡£¡£¡£¡£Æäͼ±ê½ÓÄÉÁ×ÆÃ»ú¹¹µÄ±ê¼Ç£¬£¬£¬£¬£¬£¬£¬£¬Ïà¹ØÒªº¦´Ê¿ÉÔÚ°æ±¾ÐÅÏ¢ºÍÉèÖÃÒ³ÃæÖÐÕÒµ½¡£¡£¡£¡£¡£ÁíÍ⣬£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÈκÎÕýµ±³ÌÐòµÄ°æ±¾Óë´ËÏàͬ¡£¡£¡£¡£¡£ÕâÅú×¢¸Ã¶ñÒâÈí¼þÖ»ÊDZ»Éè¼ÆµÃÏñÈÎºÎÆäËûÕýµ±³ÌÐòÒ»Ñù£¬£¬£¬£¬£¬£¬£¬£¬ÎÞÒ⽫×Ô¼ºÎ±×°³ÉÏÖÓгÌÐò¡£¡£¡£¡£¡£×ÝÈ»ÔÚ×°ÖÃÀú³ÌÖУ¬£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þÒ²ÊÇΨһÒÔÕý³£·½·¨×°ÖõijÌÐò¡£¡£¡£¡£¡£
https://asec.ahnlab.com/en/63396/
3. ·ðÂÞÀï´ïÖݵÄÊ¥¿ËÀ͵ÂÊÐÔâµ½ÀÕË÷¹¥»÷
3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ê¥¿ËÀ͵ÂÊÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ÀÕË÷¹¥»÷µ¼ÖÂÐí¶à²¿·ÖÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬£¬µ«ËûÃÇÕýÔÚ¾¡¿ÉÄÜ×î¼ÑµØÔË×÷£¬£¬£¬£¬£¬£¬£¬£¬Ö±µ½ÎÊÌâ»ñµÃ½â¾ö¡£¡£¡£¡£¡£Ê¥¿ËÀ͵ÂλÓÚ°ÂÀ¼¶àÒÔÄÏԼһСʱ³µ³Ì´¦£¬£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ 60000 ÃûסÃñ¡£¡£¡£¡£¡£²¢ÇÒ¹«Ô°ºÍÐÝÏл¼°Ð§À͵ÄÏÖ³¡¸¶¿îÒ²ÔÝʱֻÄÜʹÓÃÏֽ𡣡£¡£¡£¡£ÔÚÏßÉèʩԤ¶©¸¶¿îºÍÔÚÏ߻ע²áÈÔÈ»½ÓÊÜÐÅÓÿ¨¸¶¿î¡£¡£¡£¡£¡£¾¯Ô±ºÍÏû·À¾ÈÔ®ÕýÔÚÏìӦЧÀÍÇëÇ󡣡£¡£¡£¡£×ªÔËÕ¾µÄЧÀÍÓöÈÔÝʱֻÄÜÓÃÏÖ½ðÖ§¸¶£¬£¬£¬£¬£¬£¬£¬£¬ËùÓÐÀ¬»øºÍ½ÓÄÉÍøÂçõè¾¶½«°´ÍýÏëÔËÐС£¡£¡£¡£¡£°ÂÎ÷°ÂÀÏØË°Îñ¾ÖºÍ OUC µÈÍⲿ¹«ÓÃÊÂÒµµÄÌṩÉ̲¢Î´Êܵ½´Ë´Î¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£
https://therecord.media/st-cloud-hit-with-ransomware-florida-string
4. Top.gg Discord »úеÈËÉçÇøÔâµ½¹©Ó¦Á´¹¥»÷
3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¶àÄêÀ´£¬£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÒ»Ö±ÔÚʹÓöàÖÖÕ½ÂÔ¡¢ÊÖÒպͳÌÐò (TTP)£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ð®ÖÆ GitHub ÕÊ»§¡¢·Ö·¢¶ñÒâ Python °ü¡¢Ê¹ÓÃÐéαµÄ Python »ù´¡ÉèÊ©ºÍÉç»á¹¤³Ì¡£¡£¡£¡£¡£ÉÏ´«µ½ PyPI µÄ¶ñÒâ°ü³äµ±ÁËÆÆËðϵͳµÄ³õÊ¼ÔØÌå¡£¡£¡£¡£¡£Ò»µ©ÏµÍ³Ôâµ½ÆÆË𣬣¬£¬£¬£¬£¬£¬£¬»òÕß¹¥»÷ÕßÐ®ÖÆÁËÌØÈ¨ GitHub ÕÊ»§£¬£¬£¬£¬£¬£¬£¬£¬ËûÃǾͻá¸ü¸ÄÏîÄ¿ÎļþÒÔÖ¸Ïò¼Ù¾µÏñÉÏÍйܵÄÒÀÀµÏî¡£¡£¡£¡£¡£Top.gg Êǹ¥»÷Õß×î½üµÄÊܺ¦ÕßÖ®Ò»£¬£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÊ¢ÐеÄËÑË÷ºÍ·¢Ã÷ƽ̨£¬£¬£¬£¬£¬£¬£¬£¬ÊÊÓÃÓÚ Discord ЧÀÍÆ÷¡¢»úеÈËºÍÆäËûÉç½»¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÓÎÏ·¡¢Ìá¸ß¼ÓÈë¶ÈºÍˢй¦Ð§¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁË top.gg ά»¤Õß¡°editor-syntax¡±µÄÕÊ»§£¬£¬£¬£¬£¬£¬£¬£¬¸Ãά»¤Õß¶Ô¸ÃÆ½Ì¨µÄ GitHub ´æ´¢¿âÓµÓÐÖ÷ÒªµÄдÈë»á¼ûȨÏÞ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-poison-source-code-from-largest-discord-bot-platform/
5. ÓëÒÁÀÊÏà¹ØµÄ APT TA450 ÔÚ PDF ¸½¼þÖÐǶÈë¶ñÒâÁ´½Ó
3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÓëÒÁÀÊÓÐ¹ØµÄ APT ×éÖ¯MuddyWater £¨ÓÖÃû SeedWorm¡¢ TEMP.Zagros¡¢TA450 ºÍ Static Kitten£©ÊÇ 2024 Äê 3 ÔÂÌᳫµÄÒ»´ÎеÄÍøÂç´¹ÂڻµÄÄ»ºóºÚÊÖ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÊÔͼÔÚ 2024 Äê 3 ÔÂͶ·ÅÃûΪ Atera µÄÕýµ±Ô¶³Ì¼à¿ØºÍÖÎÀí (RMM) ½â¾ö¼Æ»®¡£¡£¡£¡£¡£¸Ã»î¶¯Õë¶Ô´óÐÍ¿ç¹ú×éÖ¯µÄÒÔÉ«ÁÐÔ±¹¤£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓëн³êÏà¹ØµÄÉç»á¹¤³Ì¡£¡£¡£¡£¡£¸ÃÍøÂç´¹ÂڻÓÚ 3 Ô 7 ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬£¬£¬Ò»Ö±Ò»Á¬µ½ 2024 Äê 3 Ô 11 ÈÕÕâÒ»ÖÜ¡£¡£¡£¡£¡£TA450 ×éÖ¯·¢ËÍÓã²æÊ½ÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨°üÀ¨¶ñÒâÁ´½ÓµÄ PDF ¸½¼þ¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÏòͳһÊÕ¼þÈË·¢ËÍÁ˶à·â´øÓÐ PDF ¸½¼þµÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐǶÈëµÄÁ´½ÓÂÔÓвî±ð¡£¡£¡£¡£¡£Proofpoint ƾ֤¶ÔÓëÍøÂçÌØ¹¤×éÖ¯¡¢»î¶¯Ä¿µÄÒÔ¼°¹¥»÷ÖÐʹÓõĶñÒâÈí¼þÏà¹ØµÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐòµÄÊӲ죬£¬£¬£¬£¬£¬£¬£¬½«´Ë´Î»î¶¯¹éÒòÓÚ TA450¡£¡£¡£¡£¡£
https://securityaffairs.com/161042/apt/iran-ta450-rmm-atera.html
6. ºÚ¿Í¿É½âËø Dormakaba ÏúÊÛµÄ 300 ¶àÍò¸ö·¿ÃÅ
3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÊýǧÃûÇå¾²Ñо¿Ö°Ô±Æë¾ÛÀ˹ά¼Ó˹¼ÓÈëËùνµÄ¡°ºÚ¿ÍÏÄÁîÓª¡±£¨Ò»Á¬¾ÙÐÐ Black Hat ºÍ Defcon ºÚ¿Í¾Û»á£©Ê±£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÖеÄһЩÈ˿϶¨»áʵÑéÈëÇÖ»ù´¡Éèʩά¼Ó˹×Ô¼º£¬£¬£¬£¬£¬£¬£¬£¬Õâ×ù¶¼»áÓµÓÐһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶Ä³¡ºÍÂùÝÊÖÒÕ¡£¡£¡£¡£¡£Ian Carroll¡¢Lennert Wouters ºÍÆäËûÇå¾²Ñо¿Ö°Ô±ÍŶÓÕ¹ÏÖÁËÒ»ÖÖËûÃdzÆÖ®Îª Unsaflok µÄÂùÝÔ¿³×¿¨ºÚ¿ÍÊÖÒÕ¡£¡£¡£¡£¡£¸ÃÊÖÒÕÊÇһϵÁÐÇå¾²Îó²îµÄÜöÝÍ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÏÕЩ¿ÉÒÔÁ¬Ã¦·¿ªÈðÊ¿Ëø¾ßÖÆÔìÉÌ Dormakaba ÏúÊÛµÄ Saflok Æ·ÅÆ»ùÓÚ RFID µÄÔ¿³×¿¨ËøµÄ¶àÖÖÐͺ𣡣¡£¡£¡£Saflok ϵͳװÖÃÔÚÈ«Çò 131 ¸ö¹ú¼Ò 13000 ´¦·¿²úµÄ 300 ÍòÉÈÃÅÉÏ¡£¡£¡£¡£¡£
https://news.hitb.org/content/hackers-can-unlock-over-3-million-hotel-doors-seconds


¾©¹«Íø°²±¸11010802024551ºÅ