ºÚ¿ÍʹÓÃCR4TºóÃÅÃé×¼Öж«µØÇøµÄÕþ¸®»ú¹¹
Ðû²¼Ê±¼ä 2024-04-224ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬CR4T£¨¡°CR4T.pdb¡±£©ÊÇÒ»ÖÖ»ùÓÚ C/C++ µÄ´¿ÄÚ´æÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õß»á¼û¿ØÖÆÌ¨£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚÊÜѬȾµÄÅÌËã»úÉÏÖ´ÐÐÏÂÁîÐС¢Ö´ÐÐÎļþ²Ù×÷ÒÔ¼°ÔÚÁªÏµ C2 ЧÀÍÆ÷ºóÉÏ´«ºÍÏÂÔØÎļþ¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Ëü»¹·¢Ã÷Á˾ßÓÐÏàͬ¹¦Ð§µÄ Golang °æ±¾µÄ CR4T£¬£¬£¬£¬£¬£¬£¬£¬±ðµÄ»¹¾ßÓÐÖ´ÐÐí§ÒâÏÂÁîºÍʹÓÃGo-ole ¿â½¨ÉèÍýÏëʹÃüµÄÄÜÁ¦¡£¡£¡£¡£¡£×îÖ÷ÒªµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬Golang CR4T ºóÃÅ¿ÉÒÔʹÓÃCOM ¹¤¾ßÐ®ÖÆÊÖÒÕʵÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óà Telegram API ¾ÙÐÐ C2 ͨѶ¡£¡£¡£¡£¡£¶íÂÞË¹ÍøÂçÇå¾²¹«Ë¾¿¨°Í˹»ùÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ËüÓÚ 2024 Äê 2 Ô·¢Ã÷Á˸û£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÖ¤¾ÝÅú×¢¸Ã»î¶¯¿ÉÄÜÖÁÉÙ´ÓÒ»Äêǰ¾Í×îÏÈ»îÔ¾¡£¡£¡£¡£¡£¸Ã»î¶¯µÄ´úºÅΪDuneQuixote¡£¡£¡£¡£¡£Golang ±äÌåµÄ±£´æÅú×¢£¬£¬£¬£¬£¬£¬£¬£¬DuneQuixote ±³ºóµÄÉí·Ý²»Ã÷µÄÍþв¼ÓÈëÕßÕýÔÚÆð¾¢Ê¹ÓÃ¿çÆ½Ì¨¶ñÒâÈí¼þË¢ÐÂËûÃǵĹ¥»÷·½·¨¡£¡£¡£¡£¡£
https://thehackernews.com/2024/04/hackers-target-middle-east-governments.html
2. Frontier Communications ÔÚÍøÂç¹¥»÷ºó¹Ø±Õϵͳ
4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬µçОÞÍ· Frontier Communications ÒÑ֪ͨÃÀ¹ú֤ȯÉúÒâίԱ»á (SEC)£¬£¬£¬£¬£¬£¬£¬£¬Ä³Ð©ÏµÍ³ÔÚÍøÂç¹¥»÷ºó±»¹Ø±Õ¡£¡£¡£¡£¡£¸ÃÊÂÎñÊÇÔÚ 4 Ô 14 ÈÕ·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬£¬ÆäʱµÚÈý·½¡°Î´¾ÊÚȨ»á¼ûÁËÆä²¿·ÖÐÅÏ¢ÊÖÒÕÇéÐΡ£¡£¡£¡£¡£Frontier ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ËüÁ¬Ã¦Æô¶¯ÁËÊÂÎñÏìÓ¦ÐÒ飬£¬£¬£¬£¬£¬£¬£¬²¢½ÓÄɲ½·¥¿ØÖÆÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¹Ø±ÕijЩϵͳ£¬£¬£¬£¬£¬£¬£¬£¬Õâ¡°µ¼ÖÂÁË¿ÉÄܱ»ÊÓÎªÖØ´óµÄÔËÓªÖÐÖ¹¡±¡£¡£¡£¡£¡£¾Ý Frontier ³Æ£¬£¬£¬£¬£¬£¬£¬£¬Õâ´Î¹¥»÷ºÜ¿ÉÄÜÊÇÒ»¸öÍøÂç·¸·¨×éÖ¯ËùΪ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯»ñµÃÁËÖÖÖÖÀàÐ͵ÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾»¹Ö¸³ö£¬£¬£¬£¬£¬£¬£¬£¬ËüÒÑִ֪ͨ·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄܲ»»á¶ÔÆä²ÆÎñ״̬»òÔËÓªÒµ¼¨±¬·¢ÖØ´óÓ°Ïì¡£¡£¡£¡£¡£ËäÈ» Frontier ûÓÐ˵Ã÷ËüÔâÊÜÁËÄÄÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ«ºÜ¿ÉÄÜÉæ¼°Îļþ¼ÓÃÜÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓڹرÕϵͳÊǶÔÀÕË÷Èí¼þµÄµä·¶ÏìÓ¦¡£¡£¡£¡£¡£Õâ¼ÒµçОÞÍ·»¹ÔÚÆäÍøÕ¾ÉÏÐû²¼ÁË֪ͨ£¬£¬£¬£¬£¬£¬£¬£¬¼û¸æ»á¼ûÕßËüÕýÔÚÂÄÀú¡°ÍòÀû¹ú¼Ê¹ÙÍøÄÚ²¿Ö§³ÖϵͳµÄÊÖÒÕÎÊÌ⡱¡£¡£¡£¡£¡£¿£¿£¿Í»§µÄ»¥ÁªÍøÐ§ÀͲ¢Î´Êܵ½¹¥»÷µÄÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬µ«½öͨ¹ýµç»°Ìṩ×ÊÖú¡£¡£¡£¡£¡£
https://www.securityweek.com/frontier-communications-shuts-down-systems-following-cyberattack/
3. ÁªºÏ¹ú¿ª·¢ÍýÏëÊð (UNDP) ÊÓ²ìÆäÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÁªºÏ¹ú¿ª·¢ÍýÏëÊð (UNDP) ÕýÔÚÊÓ²ìÍþвÐÐΪÕßÈëÇÖÆä IT ϵͳÇÔÈ¡ÈËÁ¦×ÊÔ´Êý¾Ýºó±¬·¢µÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÁªºÏ¹ú¿ª·¢ÍýÏëÊðÊÇÁªºÏ¹úµÄÈ«ÇòÉú³¤ÍøÂ磬£¬£¬£¬£¬£¬£¬£¬ÔÚ 170 ¶à¸ö¹ú¼ÒºÍµØÇø¿ªÕ¹ÊÂÇ飬£¬£¬£¬£¬£¬£¬£¬ÒÀÀµÁªºÏ¹ú³ÉÔ±¹úºÍ˽Ӫ²¿·Ö/¶à±ß×éÖ¯µÄ¾èÇ®À´×ÊÖúÏû³ýƶÀ§¡¢Ïû³ý²»Ò»ÂɺÍÇãÔþ¡£¡£¡£¡£¡£3 Ô 27 ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿ª·¢ÊðÊÕµ½ÍþвÇ鱨֪ͨ£¬£¬£¬£¬£¬£¬£¬£¬³ÆÒ»ÃûÊý¾ÝÀÕË÷ÕßÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ä³Ð©ÈËÁ¦×ÊÔ´ºÍ²É¹ºÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬ÁªºÏ¹ú¿ª·¢ÍýÏëÊðÏÖÔÚÕýÔÚÊÓ²ì¸ÃÊÂÎñµÄÐÔ×Ӻ͹æÄ££¬£¬£¬£¬£¬£¬£¬£¬²¢ÆÀ¹À´Ë´Î¹¥»÷¶ÔÐÅÏ¢±»µÁСÎÒ˽¼ÒµÄÓ°Ïì¡£¡£¡£¡£¡£Ëü»¹ÏòÊܸÃÎó²îÓ°ÏìµÄÈË·¢³ö¾¯±¨£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÔÚÓëËûÃÇÏàÖú£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±ãËûÃÇÄܹ»±£»£»£»£»£»£»¤×Ô¼ºµÄСÎÒ˽¼ÒÐÅÏ¢ÃâÔâÀÄÓᣡ£¡£¡£¡£ËäÈ»ÁªºÏ¹ú»ú¹¹ÉÐ佫´Ë´Î¹¥»÷ÓëÌØ¶¨Íþв×éÖ¯ÁªÏµÆðÀ´£¬£¬£¬£¬£¬£¬£¬£¬µ« 8Base ÀÕË÷Èí¼þÍÅ»ïÓÚ 3 Ô 27 ÈÕÔÚÆä°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÌí¼ÓÁËÐ嵀 UNDP ÌõÄ¿¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ËûÃǵIJÙ×÷Ô±ÔÚй¶ʱ´úÏ뷨й¶µÄÎļþ°üÀ¨´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/united-nations-agency-investigates-ransomware-attack-claimed-by-8Base-gang/
4. MITRE ÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓà Ivanti ÁãÈÕÎó²î
4ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿ºÍ¿ª·¢ÁìÓòµÄÁìÏÈ×éÖ¯ MITRE ×î½üÅû¶ÁËÒ»ÆðÖØ´óµÄÍøÂçÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÁËÏÖ´úÍøÂçÍþвһֱÑݱäµÄÐÔ×ÓÒÔ¼°Ç¿ÓÐÁ¦µÄÍøÂçÇå¾²²½·¥µÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ 2024 Äê 4 Ô»ñµÃ֤ʵ£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼° MITRE µÄÍøÂçʵÑé¡¢Ñо¿ºÍÐéÄ⻯ÇéÐÎ (NERVE) µÄй¶£¬£¬£¬£¬£¬£¬£¬£¬NERVE ÊÇÒ»¸öÓÃÓÚÑо¿¡¢¿ª·¢ºÍÔÐÍÉè¼ÆµÄÐ×÷ÍøÂç¡£¡£¡£¡£¡£ÔÚ¼ì²âµ½¿ÉÒɻºó£¬£¬£¬£¬£¬£¬£¬£¬MITRE Á¬Ã¦½ÓÄÉÐж¯¿ØÖÆÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ê¹ NERVE ÇéÐÎÏÂÏߣ¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÄÚ²¿ºÍÁìÏȵĵÚÈý·½×¨¼ÒµÄÖ§³ÖÏÂÕö¿ªÊӲ졣¡£¡£¡£¡£¼ì²âµ½Îó²îºó£¬£¬£¬£¬£¬£¬£¬£¬MITRE ÁªÏµÁËÕþ¸®£¬£¬£¬£¬£¬£¬£¬£¬Í¨ÖªÁËÊÜÓ°ÏìµÄ¸÷·½£¬£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚÆð¾¢»Ö¸´ÒÔÇå¾²·½·¨¾ÙÐÐÐ×÷µÄ²Ù×÷Ìæ»»¼Æ»®¡£¡£¡£¡£¡£ÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢¹æÄ£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÊÐíËæ×ÅÊÓ²ìµÄ¼ÌÐøºÍ¿¢Ê£¬£¬£¬£¬£¬£¬£¬£¬·ÖÏí¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£Ëæ×ÅÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬£¬£¬MITREÌáµ½£¬£¬£¬£¬£¬£¬£¬£¬Ã»Óм£ÏóÅú×¢MITREµÄ½¹µãÆóÒµÍøÂç»òÏàÖúͬ°éµÄϵͳÊܵ½´ËÊÂÎñµÄÓ°Ïì¡£¡£¡£¡£¡£
https://www.cyberkendra.com/2024/04/mitre-suffers-cyber-breach-hacker.html#google_vignette
5. MadMxShell ÒÔ IT ÍŶÓΪĿµÄ¿ªÕ¹¶ñÒâ¹ã¸æ»î¶¯
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÍøÂç¹¥»÷Ò»Ö±ÑݱäµÄÅä¾°Ï£¬£¬£¬£¬£¬£¬£¬£¬Ð·¢Ã÷µÄÃûΪ¡°MadMxShell¡±µÄºóÃÅ¶Ô IT Çå¾²×é³ÉÁËÆæÒìµÄÍþв¡£¡£¡£¡£¡£Zscaler ThreatLabz×î½üµÄÒ»·Ý±¨¸æÏêϸÏÈÈÝÁËÕâ¸öºóÃÅ£¬£¬£¬£¬£¬£¬£¬£¬Ëü¾ÓÉÈ«ÐÄÉè¼Æ£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÌӱܼì²â£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Õë¶ÔÈÏÕæ×éÖ¯ÍøÂç·ÀÓùµÄСÎÒ˽¼Ò¡£¡£¡£¡£¡£MadMxShell »î¶¯ÌåÏÖÁ˸߼¶ÍøÂç·¸·¨·Ö×ӵĽÆÕ©ºÍÄÍÐÄ¡£¡£¡£¡£¡£¹¥»÷ÕßÈ«ÐĽ¨ÉèÚ²ÆÐÔÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬Ä£Äâ IT רҵְԱ³£ÓõÄÕýµ±Èí¼þ£¨ÀýÈçÍøÂçɨÃèÒǺÍϵͳÖÎÀí¹¤¾ß£©µÄÍâ¹Û¡£¡£¡£¡£¡£Ñ©ÉϼÓ˪µÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÐéÎ±ÍøÕ¾»¹Ê¹Óà Google Ads ¾ÙÐÐÆð¾¢Íƹ㣬£¬£¬£¬£¬£¬£¬£¬½«ÆäÍÆÖÁËÑË÷Ч¹ûµÄ¶¥²¿£¬£¬£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÁËÄ¿µÄÊÜÖڵĿɼû¶È¡£¡£¡£¡£¡£Õë¶Ô IT רҵְԱµÄÈ«ÐÄÑ¡ÔñÒâζ×Å¿ÉÄÜÔì³ÉÆÕ±éµÄË𺦡£¡£¡£¡£¡£ÕâЩÈËÓµÓжÔÃô¸ÐϵͳºÍÍøÂçÊý¾ÝµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£Êܵ½ MadMxShell ¹¥»÷µÄ IT ÍŶӿÉÄÜ»áΪ¹¥»÷ÕßÌá¹©ÆÆËðÐÔÆÆËðµÄÊֶΣ¬£¬£¬£¬£¬£¬£¬£¬ÉõÖÁΪËûÃÇÌṩÃû¹óµÄ»á¼ûȨÏÞÒÔ½«Æä³öÊÛ¸øÆäËû·¸·¨¼¯ÍÅ¡£¡£¡£¡£¡£
https://securityonline.info/stealthy-madmxshell-backdoor-targets-it-teams-in-malvertising-campaign/
6. Ð嵀 RedLine Stealer ±äÖÖαװ³ÉÓÎÏ·Íâ¹Ò¾ÙÐй¥»÷
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Âõ¿Ë·ÆÊµÑéÊÒµÄÊÓ²ìЧ¹ûÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬ÒѾ·¢Ã÷Ò»ÖÖеÄÐÅÏ¢ÇÔÈ¡³ÌÐòʹÓà Lua ×Ö½ÚÂëÀ´ÔöÇ¿Òþ²ØÐÔºÍÖØ´óÐÔ¡£¡£¡£¡£¡£¸ÃÍøÂçÇå¾²¹«Ë¾Òѽ«ÆäÆÀ¹ÀΪÃûΪ RedLine Stealer µÄÒÑÖª¶ñÒâÈí¼þµÄ±äÌ壬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÏÂÁîÓë¿ØÖÆ (C2) ЧÀÍÆ÷IP µØµã֮ǰÒѱ»Ê¶±ðΪÓë¸Ã¶ñÒâÈí¼þÏà¹Ø¡£¡£¡£¡£¡£RedLine StealerÓÚ 2020 Äê 3 ÔÂÊ״μͼ£¬£¬£¬£¬£¬£¬£¬£¬Í¨³£Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¹ã¸æ»î¶¯Ö±½Ó»òͨ¹ýÎó²îʹÓù¤¾ß°üºÍ¼ÓÔØÆ÷¶ñÒâÈí¼þ£¨ÈçdotRunpeXºÍHijackLoader £©Èö²¥¡£¡£¡£¡£¡£ÕâÖÖÏֳɵĶñÒâÈí¼þÄܹ»´Ó¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN Èí¼þºÍÍøÂçä¯ÀÀÆ÷ÖÐÍøÂçÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈçÉúÑĵį¾Ö¤¡¢×Ô¶¯Íê³ÉÊý¾Ý¡¢ÐÅÓÿ¨ÐÅÏ¢ºÍ»ùÓÚÊܺ¦Õß IP µØµãµÄµØÀíλÖᣡ£¡£¡£¡£¶àÄêÀ´£¬£¬£¬£¬£¬£¬£¬£¬RedLine Stealer Òѱ»¶à¸öÍþв¼ÓÈëÕßÄÉÈëÆä¹¥»÷Á´£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Æä³ÉΪºá¿ç±±ÃÀ¡¢ÄÏÃÀ¡¢Å·ÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵÄÊ¢Ðв¡¶¾¡£¡£¡£¡£¡£McAfee ·¢Ã÷µÄѬȾÐòÁÐÀÄÓÃÁË GitHub£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Óà Microsoft µÄÁ½¸ö¹Ù·½´æ´¢¿âÀ´ÊµÏÖ C++ ±ê×¼¿â ( STL ) ºÍvcpkg£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ ZIP ´æµµµÄÐÎʽÍйܳäÂú¶ñÒâÈí¼þµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£
https://thehackernews.com/2024/04/new-redline-stealer-variant-disguised.html


¾©¹«Íø°²±¸11010802024551ºÅ