Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¼Ò

Ðû²¼Ê±¼ä 2025-06-11

1. Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¼Ò


6ÔÂ10ÈÕ £¬£¬ £¬£¬£¬£¬£¬£¬Rare Werewolf£¨Ç°³Æ Rare Wolf£©ºÚ¿Í×éÖ¯ £¬£¬ £¬£¬£¬£¬£¬£¬Ò²±»³ÆÎª Librarian Ghouls ºÍ Rezet £¬£¬ £¬£¬£¬£¬£¬£¬±»È϶¨Îª¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯ £¬£¬ £¬£¬£¬£¬£¬£¬ÓëһϵÁÐÕë¶Ô¶íÂÞ˹ºÍ×ÔÁ¦¹ú¼ÒÁªºÏÌ壨CIS£©¹ú¼ÒµÄÍøÂç¹¥»÷ÓÐ¹Ø £¬£¬ £¬£¬£¬£¬£¬£¬×Ô 2019 ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£¡£¡£¡£¡£ ¡£¸Ã×éÖ¯¹¥»÷ÒâͼÊÇÔÚÊÜѬȾÖ÷»úÉϽ¨ÉèÔ¶³Ì»á¼û¡¢ÇÔȡƾ֤²¢°²ÅżÓÃÜÇ®±Ò¿ó¹¤ £¬£¬ £¬£¬£¬£¬£¬£¬Ó°ÏìÊý°ÙÃû¶íÂÞ˹Óû§ £¬£¬ £¬£¬£¬£¬£¬£¬Éæ¼°¹¤ÒµÆóÒµºÍ¹¤³ÌԺУ £¬£¬ £¬£¬£¬£¬£¬£¬°×¶íÂÞ˹ºÍ¹þÈø¿Ë˹̹ҲÓÐÉÙÁ¿Ñ¬È¾¡£¡£¡£¡£¡£¡£¡£ ¡£Æä¹¥»÷ÏÔÖøÌØÕ÷ÊÇÇãÏòÓÚʹÓÃÕýµ±µÚÈý·½Èí¼þ £¬£¬ £¬£¬£¬£¬£¬£¬¶ñÒ⹦Чͨ¹ýÏÂÁîÎļþºÍ PowerShell ¾ç±¾ÊµÏÖ¡£¡£¡£¡£¡£¡£¡£ ¡£¸ÃÍþвÐÐΪÕßͨ¹ý´¹ÂÚÓʼþ»ñÈ¡³õʼ»á¼ûȨÏÞ £¬£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃפ×ãµãÇÔÈ¡Êý¾Ý²¢Í¶·Å¶àÖÖ¹¤¾ß £¬£¬ £¬£¬£¬£¬£¬£¬ÓÃÓÚ½»»¥¡¢ÍøÂçÃÜÂëºÍ½ûÓ÷À²¡¶¾Èí¼þ¡£¡£¡£¡£¡£¡£¡£ ¡ £¿£¿£¿£¿£¿£¿¨°Í˹»ù¼Í¼µÄ×îй¥»÷ÏÔʾ £¬£¬ £¬£¬£¬£¬£¬£¬ÒÔ°üÀ¨¿ÉÖ´ÐÐÎļþµÄÊÜÃÜÂë±£»£»£»£»£»¤Ñ¹Ëõ°üΪÆðµã £¬£¬ £¬£¬£¬£¬£¬£¬Ñ¹Ëõ°üÖÐÓÐ×°ÖóÌÐò £¬£¬ £¬£¬£¬£¬£¬£¬ÓÃÓÚ°²ÅÅÕýµ±¹¤¾ß¼°ÆäËûÔØºÉ £¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÓÕ¶ü PDF Îĵµ¡£¡£¡£¡£¡£¡£¡£ ¡£ÖÐÐÄÔØºÉ´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡ÆäËûÎļþ £¬£¬ £¬£¬£¬£¬£¬£¬»¹Ê¹Óà AnyDesk Ô¶³Ì×ÀÃæÈí¼þºÍ Windows Åú´¦Öóͷ£¾ç±¾Ôö½øÊý¾ÝÇÔÈ¡ºÍ¿ó¹¤°²ÅÅ £¬£¬ £¬£¬£¬£¬£¬£¬Åú´¦Öóͷ£¾ç±¾ÄÜ×Ô¶¯½ÐÐÑÊܺ¦Õßϵͳ²¢ÔÊÐí¹¥»÷ÕßÔ¶³Ì»á¼û¡£¡£¡£¡£¡£¡£¡£ ¡£Ê¹ÓõÚÈýÆÓÖ±µ±Èí¼þ¾ÙÐжñÒâÄ¿µÄÊdz£¼ûÊÖÒÕ £¬£¬ £¬£¬£¬£¬£¬£¬ÔöÌíÁË APT »î¶¯¼ì²âºÍ¹éÒòÄѶÈ¡£¡£¡£¡£¡£¡£¡£ ¡£


https://thehackernews.com/2025/06/rare-werewolf-apt-uses-legitimate.html


2. DanaBot¶ñÒâÈí¼þÎó²î¡°DanaBleed¡±Ì»Â¶ÖÂÆä±»²é


6ÔÂ10ÈÕ £¬£¬ £¬£¬£¬£¬£¬£¬2022Äê6Ô¸üÐÂÖÐ £¬£¬ £¬£¬£¬£¬£¬£¬DanaBot¶ñÒâÈí¼þ²Ù×÷ÒýÈëµÄÃûΪ¡°DanaBleed¡±µÄÎó²î £¬£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÔÚºóÐøÖ´·¨Ðж¯Öб»Ê¶±ð¡¢ÆðËß²¢²ð³ý¡£¡£¡£¡£¡£¡£¡£ ¡£DanaBotÊÇÒ»¸ö»îÔ¾ÓÚ2018ÄêÖÁ2025ÄêµÄ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Æ½Ì¨ £¬£¬ £¬£¬£¬£¬£¬£¬³£ÓÃÓÚÒøÐÐڲƭ¡¢Æ¾Ö¤ÍµÇÔ¡¢Ô¶³Ì»á¼ûºÍDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£ ¡£Zscaler ThreatLabzÑо¿Ö°Ô±·¢Ã÷¸ÃÎó²î £¬£¬ £¬£¬£¬£¬£¬£¬ÄÚ´æ×ß©ʹËûÃǵÃÒÔÉîÈëÏàʶ¶ñÒâÈí¼þÄÚ²¿²Ù×÷¼°Æä±³ºóÖ°Ô±¡£¡£¡£¡£¡£¡£¡£ ¡£Ê¹ÓôËÎó²î £¬£¬ £¬£¬£¬£¬£¬£¬¹ú¼ÊÖ´·¨²¿·Ö¿ªÕ¹¡°ÖÕ¾ÖÐж¯¡± £¬£¬ £¬£¬£¬£¬£¬£¬Ê¹DanaBot»ù´¡ÉèÊ©ÏÂÏß £¬£¬ £¬£¬£¬£¬£¬£¬²¢ÆðË߸ÃÍþв×éÖ¯16Ãû³ÉÔ±¡£¡£¡£¡£¡£¡£¡£ ¡£DanaBleedÎó²îËæDataBot°æ±¾2380ÒýÈë £¬£¬ £¬£¬£¬£¬£¬£¬¸Ã°æ±¾ÐÂÔöC2ЭÒé £¬£¬ £¬£¬£¬£¬£¬£¬µ«ÐÂЭÒéÂß¼­±£´æÈõµã £¬£¬ £¬£¬£¬£¬£¬£¬Î´ÎªËæ»úÌìÉúµÄÌî³ä×Ö½Ú³õʼ»¯Ð·ÖÅÉÄÚ´æ £¬£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂC2ÏìÓ¦°üÀ¨Ð§ÀÍÆ÷ÄÚ´æÖÐÊ£ÓàÊý¾ÝƬ¶Ï £¬£¬ £¬£¬£¬£¬£¬£¬ÀàËÆ2014ÄêHeartBleedÎÊÌâ¡£¡£¡£¡£¡£¡£¡£ ¡£´ËÎó²îʹ´ó×Ú˽ÈËÊý¾Ý̻¶¸øÑо¿Ö°Ô± £¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÍþвÐÐΪÕßÏêϸÐÅÏ¢¡¢ºó¶Ë»ù´¡ÉèÊ©¡¢Êܺ¦ÕßÊý¾Ý¡¢¶ñÒâÈí¼þ¸üÐÂÈÕÖ¾¡¢Ë½È˼ÓÃÜÃÜÔ¿¡¢SQLÅÌÎʺ͵÷ÊÔÈÕÖ¾ÒÔ¼°C2ÒDZí°åµÄHTMLºÍWeb½çÃæÆ¬¶ÏµÈ¡£¡£¡£¡£¡£¡£¡£ ¡£ÈýÄê¶àÀ´ £¬£¬ £¬£¬£¬£¬£¬£¬DanaBotÒ»Ö±´¦ÓÚÊÜËðģʽ £¬£¬ £¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±»ò¿Í»§Î´²ì¾õÒÑ̻¶¡£¡£¡£¡£¡£¡£¡£ ¡£µ±ÍøÂçµ½×ã¹»Êý¾Ýºó £¬£¬ £¬£¬£¬£¬£¬£¬Ö´·¨²¿·Ö½ÓÄÉÐж¯ £¬£¬ £¬£¬£¬£¬£¬£¬Ëä½¹µãÍŶӽö±»ÆðËßδ±»¾Ð²¶ £¬£¬ £¬£¬£¬£¬£¬£¬µ«Òªº¦C2ЧÀÍÆ÷¡¢650¸öÓòÃûºÍ½ü400ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»²é·â £¬£¬ £¬£¬£¬£¬£¬£¬ÔÝʱÏû³ýÁËÍþв¡£¡£¡£¡£¡£¡£¡£ ¡£Î´À´ÍþвÐÐΪÕßÖØ·µÍøÂç·¸·¨»î¶¯µÄ¿ÉÄÜÐÔ²»´ó £¬£¬ £¬£¬£¬£¬£¬£¬ÇÒºÚ¿ÍÉçÇøÐÅÈζȽµµÍ½«³ÉΪÆäÒ»´óÕϰ­¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/danabot-malware-operators-exposed-via-c2-bug-added-in-2022/


3. FIN6ºÚ¿Í×é֯ð³äÇóÖ°ÕßÈö²¥¶ñÒâÈí¼þ¡°More Eggs¡±


6ÔÂ10ÈÕ £¬£¬ £¬£¬£¬£¬£¬£¬Óëµä·¶ÕÐÆ¸Ïà¹ØÉç»á¹¤³Ì¹¥»÷²î±ð £¬£¬ £¬£¬£¬£¬£¬£¬FIN6ºÚ¿Í×é֯ð³äÇóÖ°Õß £¬£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÉç»á¹¤³ÌÊÖ¶ÎÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ ¡£FIN6ÓÖÃû¡°÷¼÷ÃÖ©Ö롱 £¬£¬ £¬£¬£¬£¬£¬£¬×î³õÒÔ½ðÈÚÚ²Æ­ÖøÃû £¬£¬ £¬£¬£¬£¬£¬£¬ÈçÈëÇÖÏúÊÛµãϵͳÇÔÊØÐÅÓÿ¨ÐÅÏ¢ £¬£¬ £¬£¬£¬£¬£¬£¬2019ÄêÆð¹¥»÷¹æÄ£À©´óÖÁÀÕË÷Èí¼þ £¬£¬ £¬£¬£¬£¬£¬£¬²¢¼ÓÈëRyukºÍLockergogaµÈÐж¯¡£¡£¡£¡£¡£¡£¡£ ¡£½üÆÚ £¬£¬ £¬£¬£¬£¬£¬£¬¸Ã×é֯ʹÓÃÉç»á¹¤³Ì»î¶¯Èö²¥¡°More Eggs¡± £¬£¬ £¬£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ¼´Ð§À͵ÄJavaScriptºóÃÅ £¬£¬ £¬£¬£¬£¬£¬£¬ÓÃÓÚÆ¾Ö¤ÍµÇÔ¡¢ÏµÍ³»á¼ûºÍÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷Àú³ÌÖÐ £¬£¬ £¬£¬£¬£¬£¬£¬FIN6αװ³ÉÐéαÇóÖ°Õß £¬£¬ £¬£¬£¬£¬£¬£¬Í¨¹ýLinkedInºÍIndeedÓëÕÐÆ¸Ö°Ô±ºÍÈËÁ¦×ÊÔ´²¿·ÖÁªÏµ £¬£¬ £¬£¬£¬£¬£¬£¬½¨Éè¹ØÏµºó·¢ËÍ´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£¡£ ¡£Óʼþº¬Ö¸Ïò¡°¼òÀúÍøÕ¾¡±µÄ²»¿Éµã»÷URL £¬£¬ £¬£¬£¬£¬£¬£¬ÆÈʹÊÕ¼þÈËÊÖ¶¯ÊäÈë £¬£¬ £¬£¬£¬£¬£¬£¬ÕâЩÓòÃûͨ¹ýGoDaddyÄäÃû×¢²á²¢ÍйÜÔÚAWSÉÏ¡£¡£¡£¡£¡£¡£¡£ ¡£FIN6»¹ÔöÌíÇéÐÎÖ¸ÎÆºÍÐÐΪ¼ì²é £¬£¬ £¬£¬£¬£¬£¬£¬È·±£Ö»ÓÐÄ¿µÄÄÜ·­¿ªÉϰ¶Ò³Ãæ £¬£¬ £¬£¬£¬£¬£¬£¬×èÖ¹VPN»òÔÆÅþÁ¬¼°Linux»òmacOS»á¼ûʵÑé¡£¡£¡£¡£¡£¡£¡£ ¡£ÇкÏÌõ¼þµÄÊܺ¦Õß»áÊÕµ½¼ÙµÄCAPTCHA°ì·¨ £¬£¬ £¬£¬£¬£¬£¬£¬²¢±»ÌáÐÑÏÂÔØ°üÀ¨Î±×°Windows¿ì½Ý·½·¨Îļþ£¨LNK£©µÄZIPµµ°¸ £¬£¬ £¬£¬£¬£¬£¬£¬¸ÃÎļþÖ´Ðо籾ÏÂÔØ¡°More Eggs¡±ºóÃÅ¡£¡£¡£¡£¡£¡£¡£ ¡£¸ÃºóÃÅÓÉ¡°Venom Spider¡±½¨Éè £¬£¬ £¬£¬£¬£¬£¬£¬ÊÇÄ £¿£¿£¿£¿£¿£¿é»¯ºóÃÅ £¬£¬ £¬£¬£¬£¬£¬£¬ÄÜÖ´ÐÐÏÂÁî¡¢ÇÔȡƾ֤¡¢×ª´ïÌØÊâÓÐÓÃÔØºÉ¼°Ö´ÐÐPowerShell¡£¡£¡£¡£¡£¡£¡£ ¡£FIN6µÄ¹¥»÷Ëä¼òÆÓµ«ÓÐÓà £¬£¬ £¬£¬£¬£¬£¬£¬ÒÀÀµÉç»á¹¤³ÌѧºÍ¸ß¼¶ÌÓ±ÜÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£ ¡£Òò´Ë £¬£¬ £¬£¬£¬£¬£¬£¬ÕÐÆ¸Ö°Ô±ºÍÈËÁ¦×ÊÔ´Ô±¹¤Ó¦ÉóÉ÷¿´´ýÉó²é¼òÀúºÍ×÷Æ·¼¯µÄÔ¼Çë £¬£¬ £¬£¬£¬£¬£¬£¬¹«Ë¾ºÍÕÐÆ¸»ú¹¹Ò²Ó¦×ÔÁ¦È·ÈÏÖ°Ô±Éí·Ý¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/


4. HerokuÍ»·¢´óÃæ»ýÖÐÖ¹³¬ÁùСʱ £¬£¬ £¬£¬£¬£¬£¬£¬Ö¿ª·¢ÊÜ×èЧÀÍÊÜÓ°Ïì


6ÔÂ10ÈÕ £¬£¬ £¬£¬£¬£¬£¬£¬Heroku×÷ΪSalesforceÆìÏÂµÄÆ½Ì¨¼´Ð§ÀÍ£¨PaaS£© £¬£¬ £¬£¬£¬£¬£¬£¬ÔÊÐí¿ª·¢Ö°Ô±½«Ó¦ÓóÌÐò°²Åŵ½Ôƶ˶øÎÞÐèÖÎÀí»ù´¡ÉèÊ© £¬£¬ £¬£¬£¬£¬£¬£¬µ«¿ËÈÕÔâÓöÁËÒ»Á¬Áù¸ö¶àСʱµÄ´óÃæ»ýÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ ¡£´Ë´Îå´»úʼÓÚÖܶþÆÆÏþ £¬£¬ £¬£¬£¬£¬£¬£¬Óû§±¨¸æ³ÆHerokuÓ¦ÓÃÎÞ·¨ÔËÐÐ £¬£¬ £¬£¬£¬£¬£¬£¬ÇÒ¿ª·¢Ö°Ô±ÎÞ·¨µÇ¼HerokuÒDZí°å²¢Ê¹ÓÃCLI¹¤¾ß¡£¡£¡£¡£¡£¡£¡£ ¡£HerokuÔÚÆä×´Ì¬Ò³ÃæÉÏÈÏ¿ÉÁËÕâÒ»ÊÂÎñ £¬£¬ £¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÊӲ졣¡£¡£¡£¡£¡£¡£ ¡£ÖÐÖ¹Ó°ÏìÁËÖڶ๫˾ºÍÕ¾µãµÄЧÀÍ £¬£¬ £¬£¬£¬£¬£¬£¬ÀýÈçSolarWindsÒòÎÞ·¨´ÓHeroku»ñÈ¡ÈÕÖ¾¶øÊܵ½²¨¼°¡£¡£¡£¡£¡£¡£¡£ ¡£Ê¹ÓÃHerokuÓ¦ÓóÌÐòʵÏÖÖÖÖÖ¹¦Ð§µÄÍøÕ¾Ò²Êܵ½Ó°Ïì £¬£¬ £¬£¬£¬£¬£¬£¬²¿·Ö¹¦Ð§ÎÞ·¨Õý³£ÔËÐС£¡£¡£¡£¡£¡£¡£ ¡£HerokuÉÐδÌṩÓйØÖÐÖ¹»ù´¡Ôµ¹ÊÔ­ÓɵÄÏêϸÐÅÏ¢»òºÎʱ»Ö¸´Ð§ÀÍ £¬£¬ £¬£¬£¬£¬£¬£¬²»¹ýÔÚ2025Äê6ÔÂ10ÈÕ £¬£¬ £¬£¬£¬£¬£¬£¬SalesforceÌåÏÖûÓÐÖ¤¾ÝÅú×¢´Ë´ÎЧÀÍÖÐÖ¹±£´æ¶ñÒâ»î¶¯ £¬£¬ £¬£¬£¬£¬£¬£¬²¢ÌṩÁ˿ͻ§¸ú×Ù¸üеÄÁ´½Ó¡£¡£¡£¡£¡£¡£¡£ ¡£×èÖ¹UTCʱ¼ä21:48:25 £¬£¬ £¬£¬£¬£¬£¬£¬Heroku×´Ì¬Ò³ÃæÏÔʾÒѽâ¾ödashboard.heroku.comµÄÎÊÌâ £¬£¬ £¬£¬£¬£¬£¬£¬¿Í»§¿É»á¼û¸ÃÍøÕ¾ £¬£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±ÎªÈÔÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËͨ¹ýHerokuÏÂÁîÐнçÃæÔËÐеÄÏÂÁî×÷Ϊ½â¾öÒªÁì £¬£¬ £¬£¬£¬£¬£¬£¬²¢Ç¿µ÷Ó¦Ò»´ÎÖØÆôһ̨²â¹¦»úÒÔ×èֹЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ ¡£HerokuÌåÏÖÆäÊÂÇéÖØµãÈÔÊÇÄÚ²¿²âÊÔºÍÑéÖ¤ £¬£¬ £¬£¬£¬£¬£¬£¬²¢½«¼ÌÐø¹Ø×¢ÆäËû²úÆ·µÄˢР£¬£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±ÔÊÐí¾¡¿ìÌṩ½â¾ö¼Æ»®Ê±¼ä±í £¬£¬ £¬£¬£¬£¬£¬£¬²¢¶ÔÓÉ´ËÔì³ÉµÄÒ»Á¬À§ÈÅÉî±íǸÒâ¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/technology/massive-heroku-outage-impacts-web-platforms-worldwide/


5. DuplexSpy RATÐÂÐÍľÂíÏÖÉí £¬£¬ £¬£¬£¬£¬£¬£¬¿ÉÍêÈ«¿ØÖÆWindowsϵͳ


6ÔÂ9ÈÕ £¬£¬ £¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷Ò»¿îÃûΪDuplexSpy RATµÄÐÂÐ͸߼¶Ô¶³Ì»á¼ûľÂí £¬£¬ £¬£¬£¬£¬£¬£¬¸ÃľÂí¿ÉÈù¥»÷ÕßÖÜÈ«¼à¿ØÓë¿ØÖÆWindowsϵͳ¡£¡£¡£¡£¡£¡£¡£ ¡£Õâ¿î¶ñÒâÈí¼þ½ÓÄÉC#ÓïÑÔ¿ª·¢ £¬£¬ £¬£¬£¬£¬£¬£¬¾ß±¸¾«Á·µÄͼÐνçÃæºÍ¿ÉÉèÖÃÑ¡Ïî £¬£¬ £¬£¬£¬£¬£¬£¬ÏÔÖø½µµÍÁËÍøÂç·¸·¨·Ö×ÓÈëÇÖÄ¿µÄ×°±¸µÄÊÖÒÕÃż÷¡£¡£¡£¡£¡£¡£¡£ ¡£Æä½ÓÄÉAES-256-CBCºÍRSA-4096Ë«ÖØ¼ÓÃÜËã·¨ £¬£¬ £¬£¬£¬£¬£¬£¬±£»£»£»£»£»¤ÊÜѬȾÖ÷»úÓëÏÂÁî¿ØÖÆÐ§ÀÍÆ÷¼äµÄͨѶ £¬£¬ £¬£¬£¬£¬£¬£¬ÓÐÓùæ±ÜÍøÂç¼ì²â¡£¡£¡£¡£¡£¡£¡£ ¡£¸ÃRAT×î³õÓÉ¿ª·¢ÕßÒÔ¡°½ÌÓýÓÃ;¡±Ðû²¼ÔÚGitHubÉÏ £¬£¬ £¬£¬£¬£¬£¬£¬µ«Æä¶à¹¦Ð§ÐÔºÍÒ×¶¨ÖÆÐÔÎüÒýÁËÍþвÐÐΪÕß¡£¡£¡£¡£¡£¡£¡£ ¡£DuplexSpy RAT¹¦Ð§ÖÜÈ« £¬£¬ £¬£¬£¬£¬£¬£¬²»µ«°üÀ¨¼üÅ̼ͼ¡¢ÊµÊ±ÆÁÄ»²¶»ñµÈ¹Å°åÔ¶³Ì»á¼û¹¦Ð§ £¬£¬ £¬£¬£¬£¬£¬£¬»¹¾ß±¸ÉãÏñÍ·/Âó¿Ë·ç¼à¿Ø¼°½»»¥Ê½ÏÂÁîÖն˵ȸ߼¶¼à¿ØÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£ ¡£ÔÚ³¤ÆÚ»¯ÓëÒþ²ØÐÔ·½Ãæ £¬£¬ £¬£¬£¬£¬£¬£¬¸ÃľÂí½ÓÄɶà²ãÕ½ÂÔ £¬£¬ £¬£¬£¬£¬£¬£¬ÒÔ¡°Windows Update.exe¡±ÎªÎ±×°Ãû³Æ¸´ÖƵ½Óû§Æô¶¯Îļþ¼Ð £¬£¬ £¬£¬£¬£¬£¬£¬²¢½¨Éè¶ÔӦע²á±íÏî £¬£¬ £¬£¬£¬£¬£¬£¬È·±£ÏµÍ³ÖØÆôºÍÕûÀíʵÑéÖÐÈÔÄÜ´æ»î¡£¡£¡£¡£¡£¡£¡£ ¡£Í¬Ê± £¬£¬ £¬£¬£¬£¬£¬£¬Ëü»¹¾ß±¸¸ß¼¶·´ÆÊÎöÄÜÁ¦ £¬£¬ £¬£¬£¬£¬£¬£¬Ã¿100ºÁÃë¼à¿ØÏµÍ³Àú³Ì £¬£¬ £¬£¬£¬£¬£¬£¬Õë¶ÔÇå¾²¹¤¾ßºÍÆÊÎöÓ¦Óà £¬£¬ £¬£¬£¬£¬£¬£¬Ò»µ©¼ì²âµ½Çå¾²Èí¼þ £¬£¬ £¬£¬£¬£¬£¬£¬±ã»áÖÕÖ¹Ïà¹ØÀú³Ì²¢ÏÔʾÐéα¹ýʧÐÅÏ¢Îóµ¼Óû§¡£¡£¡£¡£¡£¡£¡£ ¡£±ðµÄ £¬£¬ £¬£¬£¬£¬£¬£¬¸ÃRAT½ÓÄÉÎÞÎļþÖ´ÐÐÊÖÒÕ £¬£¬ £¬£¬£¬£¬£¬£¬Ö±½Ó½«×ÔÉí¼ÓÔØµ½ÄÚ´æºóɾ³ý´ÅÅÌԭʼ¿ÉÖ´ÐÐÎļþ £¬£¬ £¬£¬£¬£¬£¬£¬¼«´óïÔÌ­ÁËȡ֤ºÛ¼£¡£¡£¡£¡£¡£¡£¡£ ¡£


https://cybersecuritynews.com/new-duplexspy-rat-let-attackers-gain-complete-control/


6. S5 Agency WorldÔâBertÀÕË÷¹¥»÷ÖÂÊý¾Ý±»µÁ


6ÔÂ10ÈÕ £¬£¬ £¬£¬£¬£¬£¬£¬´óÐͿڰ¶ÊðÀí»ú¹¹S5 Agency World¿ËÈÕÔâµ½ÀÕË÷Èí¼þÍŻ﹥»÷ £¬£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Á˽ü140GBÊý¾Ý £¬£¬ £¬£¬£¬£¬£¬£¬²¢½«¸Ã¹«Ë¾Ãû×ÖÐû²¼ÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ £¬£¬ £¬£¬£¬£¬£¬£¬ÒÔ´ËÆÈʹS5Ö§¸¶Êê½ð £¬£¬ £¬£¬£¬£¬£¬£¬×èÖ¹Êý¾Ýй¶¸ø¹«ÖÚ´øÀ´²»Á¼Ó°Ïì¡£¡£¡£¡£¡£¡£¡£ ¡£S5×÷Ϊһ¼Òº£ÉÏÔËÊ乫˾ £¬£¬ £¬£¬£¬£¬£¬£¬ÓªÒµÁýÕÖÈ«Çò360¶à¸ö¿Ú°¶ £¬£¬ £¬£¬£¬£¬£¬£¬ÔÚº½Ô˹«Ë¾´¬²°Í £¿£¿£¿£¿£¿£¿¿Ê±³äµ±ÍâµØ´ú±í £¬£¬ £¬£¬£¬£¬£¬£¬ÆäÔËÓª¶Ôº£ÉÏÔËÊäÖÁ¹ØÖ÷Òª¡£¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßÐû²¼Á˼¸ÕžݳƱ»µÁÐÅÏ¢µÄ½ØÍ¼ £¬£¬ £¬£¬£¬£¬£¬£¬¾­Ñо¿ÍŶÓÊÓ²ì £¬£¬ £¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÑù±¾ËƺõÊÇÕýµ±µÄ £¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨¼ì²é±¨¸æ¡¢Ô±¹¤Ð¹ÚÒßÃç½ÓÖÖÇéÐΡ¢²¿·Ö»¤ÕÕ¸´Ó¡¼þµÈ £¬£¬ £¬£¬£¬£¬£¬£¬µ«Êý¾ÝÑù±¾ÓÐÏÞ £¬£¬ £¬£¬£¬£¬£¬£¬ÏÖʵ»ñÈ¡µÄÎļþ×ÜÁ¿¿ÉÄܸü´ó¡£¡£¡£¡£¡£¡£¡£ ¡£¹ØÓÚº£ÉÏÔËÊ乫˾¶øÑÔ £¬£¬ £¬£¬£¬£¬£¬£¬ÍøÂç¹¥»÷µ¼ÖµÄÍ£»£»£»£»£»ú²»¿É½ÓÊÜ £¬£¬ £¬£¬£¬£¬£¬£¬ÓÉÓÚÔËÊäÑÓÎó»áÔì³É¹©Ó¦Á´Æ¿¾± £¬£¬ £¬£¬£¬£¬£¬£¬¶Ô¿Í»§Ôì³É¸ºÃæÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬ £¬£¬£¬£¬£¬£¬BertÀÕË÷Èí¼þÊǸÃÁìÓòµÄгÉÔ± £¬£¬ £¬£¬£¬£¬£¬£¬ÓÚ2025Äê4ÔÂÊ״α»·¢Ã÷ £¬£¬ £¬£¬£¬£¬£¬£¬ÇÒÔڶ̶Ìʱ¼äÄÚÒÑÀֳɹ¥»÷ÁËÊ®¼¸¸ö×éÖ¯¡£¡£¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±Ö¸³ö £¬£¬ £¬£¬£¬£¬£¬£¬BertÀÕË÷Èí¼þÍÅ»ïͨ¹ýÕýµ±Èí¼þ¹©Ó¦Á´Èö²¥¶ñÒâÈí¼þ £¬£¬ £¬£¬£¬£¬£¬£¬Í¨³£ÒÔÒ½ÁƱ£½¡ºÍ¿Æ¼¼ÐÐҵΪĿµÄ £¬£¬ £¬£¬£¬£¬£¬£¬ÇÒËÆºõºÜÊÇ˳ӦĿ½ñµÄÍøÂç·¸·¨ÐÎÊÆ £¬£¬ £¬£¬£¬£¬£¬£¬Î´À´¿ÉÄÜÑÝÄð³É¸ü´óµÄÍþв¡£¡£¡£¡£¡£¡£¡£ ¡£


https://cybernews.com/security/port-agency-ransomware-data-breach/