FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß

Ðû²¼Ê±¼ä 2025-04-22

1. FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß


4ÔÂ22ÈÕ £¬FogÀÕË÷Èí¼þÔËÓªÉ̽üÆÚʹÓÃDOGEÖ÷ÌâÀÕË÷Ðż¥Ð¦Êܺ¦Õß £¬ÌṩÃ⺬»ìÃÜÃÜÔ¿ÒÔ»»È¡¶ñÒâÈí¼þÈö²¥¡£ÓëÔçÆÚÒÀÀµ±»µÁVPNƾ֤²î±ð £¬×îй¥»÷ʼÓÚ°üÀ¨¡°Pay Adjustment.zip¡±µÄÍøÂç´¹ÂÚÓʼþ £¬ÄÚº¬¶ñÒâLNKÎļþ £¬µã»÷ºó´¥·¢Ò»ÏµÁвÙ×÷½«ÀÕË÷Èí¼þÖ²Èëϵͳ¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±³Æ £¬×Ô½ñÄê1ÔÂÒÔÀ´ £¬¸ÃÈí¼þÒÑѬȾ100ÃûÊܺ¦Õß £¬2Ô·Ý×î¶à £¬Îª53ÈË£»×Ô2024Äê6ÔÂÒÔÀ´ £¬ÔÚ¿Í»§Öмì²âµ½173ÆðÏà¹ØÀÕË÷Ô˶¯¡£´ó¶¼Êܺ¦ÕßÀ´×ԿƼ¼¡¢ÖÆÔì¡¢½ÌÓýºÍ½»Í¨ÔËÊäÐÐÒµ¡£Ð¹¥»÷ÖÐ £¬¶ñÒâLNKÎļþÏÂÔØPowerShell¾ç±¾ £¬¼ìË÷ÀÕË÷Èí¼þÏÂÔØ³ÌÐò¼°¶à¸öÆäËû¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ¡£ÕâЩ¾ç±¾°üÀ¨ÍøÂçϵͳÐÅÏ¢¡¢ºáÏòÒÆ¶¯¹¤¾ß¼°·­¿ª¶þάÂëµÄ¾ç±¾ £¬Êܺ¦Õß¿ÉÓøöþάÂëÖ§¸¶Êê½ð¡£³õʼPowerShell¾ç±¾»¹·­¿ªÕþÖÎÖ÷ÌâYouTubeÊÓÆµ²¢°üÀ¨ÊéÃæÕþÖÎ̸ÂÛ¡£³õʼÊê½ð֪ͨÌá¼°DOGE £¬ÉõÖÁDOGEÊÂÇéÖ°Ô± £¬ÒªÇóÊܺ¦ÕßÁгöÎåÏîʹÃü £¬²»È»Ö§¸¶Ò»ÍòÒÚÃÀÔªÊê½ð¡£ÍþвÕßÌåÏÖ £¬ÈôÊܺ¦Õß½«¶ñÒâÈí¼þ·¢Ë͸øËûÈË £¬¼´¿ÉÃ⺬»ìÃÜϵͳ¡£FogÀÕË÷Èí¼þÊÇÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼Ò×å £¬ÆóÒµ±ØÐ轫ÆäÌí¼Óµ½¼à¿ØÁбíÖС£


https://www.darkreading.com/cyberattacks-data-breaches/fog-hackers-doge-ransom-notes


2. RustoBot½©Ê¬ÍøÂçʹÓ÷ÓÉÆ÷Îó²î·¢¶¯¹¥»÷


4ÔÂ22ÈÕ £¬FortiGuard Labs½üÆÚ·¢Ã÷RustoBot £¬ÕâÒ»ÓÃRust±àдµÄÖØ´ó½©Ê¬ÍøÂçÕýʹÓÃTOTOLINKºÍDrayTek·ÓÉÆ÷Îó²î £¬ÔÚÈÕ±¾¡¢Ì¨Íå¡¢Ô½ÄϺÍÄ«Î÷¸çµÄÊÖÒÕ»ù´¡ÉèÊ©ÖÐËÁŰ¡£2025ÄêÍ· £¬¹¥»÷ʵÑé¼±¾çÔöÌí £¬Ä¿µÄÖ±Ö¸TOTOLINK cstecgi.cgi¾ç±¾Öеĺã¾ÃÎó²î £¬ÕâЩÎó²îÉæ¼°ÉèÖøü¸ÄºÍÉí·ÝÑéÖ¤ £¬±£´æ¶à¸öÏÂÁî×¢Èëµã £¬°üÀ¨CVE-2022-26210¡¢CVE-2022-26187ÒÔ¼°Ó°ÏìDrayTek·ÓÉÆ÷µÄCVE-2024-12987¡£ÕâЩÈõµãʹ¹¥»÷Õß»ñµÃÔ¶³Ì´úÂëÖ´ÐÐÄÜÁ¦ £¬ÎªRustoBotѬȾÆÌƽõè¾¶¡£Ò»µ©»ñµÃ³õʼ»á¼ûȨÏÞ £¬RustoBot±ãͨ¹ýËĸöÏÂÔØ¾ç±¾Ö®Ò»¾ÙÐа²ÅÅ £¬Ö§³Ö¶àÖּܹ¹ £¬È·±£ÓëÒ×Êܹ¥»÷µÄ·ÓÉÆ÷ÆÕ±é¼æÈÝ¡£ÆäÆæÒìÖ®´¦ÔÚÓÚʹÓÃRustÓïÑÔ £¬¶þ½øÖƽṹͨ¹ýXOR¼ÓÃܺÍGOT²Ù×÷¾ÙÐлìÏý £¬ÊµÏÖÒþÉíÐÔ £¬²¢Ê¹ÄæÏò¹¤³ÌÖØ´ó»¯¡£½âÃܺóµÄÉèÖÃÕ¹ÏÖ £¬RustoBotÖ´ÐÐÁ½Ïî½¹µã¶ñÒâ²Ù×÷£ºÆÊÎö¶à¸öC2ÓòÃû £¬²¢Æ¾Ö¤ÏÂÁîÌᳫDDoS¹¥»÷¡£RustoBotÔ˶¯ÒÑÓ°Ïì¶à¿îTOTOLINKºÍDrayTek·ÓÉÆ÷ÐͺŠ£¬Êܺ¦ÕßÖ÷ҪλÓڿƼ¼ÁìÓò £¬Åú×¢¹¥»÷¿ÉÄܾßÓÐÕë¶ÔÐÔ¡£


https://securityonline.info/rustobot-botnet-exploits-router-flaws-in-sophisticated-attacks/


3. WordPress¹ã¸æÚ²Æ­²å¼þÌìÌ챬·¢14ÒÚ¸ö¹ã¸æÇëÇó


4ÔÂ21ÈÕ £¬¿ËÈÕ £¬Ò»¸öÃûΪ¡°Scallywag¡±µÄ´ó¹æÄ£¹ã¸æÚ²Æ­×éÖ¯¸¡³öË®Ãæ £¬¸Ã×é֯ͨ¹ý¶¨ÖÆWordPress²å¼þ £¬½«µÁ°æºÍURLËõ¶ÌÍøÕ¾Ç®±Ò»¯ £¬ÖðÈÕ±¬·¢ÊýÊ®ÒÚ¸öڲƭÇëÇó¡£ScallywagÓÉ»úеÈ˺Íڲƭ¼ì²â¹«Ë¾HUMAN·¢Ã÷ £¬Æä±³ºóÊÇÒ»¸öÓÉ407¸öÓòÃû×é³ÉµÄÖØ´óÍøÂç £¬ÖðÈÕڲƭ¹ã¸æÇëÇó·åÖµ¸ß´ï14ÒÚÌõ¡£Ö»¹ÜHUMAN½ÓÄɲ½·¥Ê¹ScallywagÁ÷Á¿ïÔÌ­95% £¬µ«¸Ã×é֯ͨ¹ýÂÖ»»ÓòÃûºÍµ÷½âÇ®±Ò»¯Ä£Ê½Õ¹ÏÖ³öǿʢÈÍÐÔ¡£Scallywag»ùÓÚËĸöWordPress²å¼þ¹¹½¨ £¬°üÀ¨Soralink¡¢Yu Idea¡¢WPSafeLinkºÍDroplink £¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´Ó¸ßΣº¦¡¢µÍÖÊÁ¿ÍøÕ¾×¬Ç®µÄ;¾¶¡£ÕâЩ²å¼þ½µµÍÁËDZÔÚÍþвÐÐΪÕߵĽøÈëÃż÷ £¬ÉõÖÁÓÐÈËÔÚYouTubeÉÏÐû²¼²Ù×÷½Ì³Ì¡£Óû§»á¼ûµÁ°æÄ¿Â¼ÍøÕ¾Ê± £¬µã»÷ǶÈëµÄURLËõ¶ÌÁ´½Ó £¬»á±»Öض¨ÏòÖÁÖÐÐĹãÃÜ¸æ¼¯Ò³Ãæ £¬ÎªScallywagÔËÓªÉ̱¬·¢Ú²Æ­ÐÔÓ¡Ïó £¬×îÖÕ½øÈëÔÊÐíÄÚÈݵÄÒ³Ãæ¡£ÕâЩÖÐÐÄÍøÕ¾ÔËÐÐScallywag²å¼þ £¬ÈÏÕæ´¦Öóͷ£Öض¨ÏòÂß¼­¡¢¹ã¸æ¼ÓÔØµÈ £¬ÒÔÔÚ¹ã¸æÆ½Ì¨¼ì²éÖÐαװ³ÉÕý³£²©¿Í¡£HUMAN̫ͨ¹ýÎöÁ÷Á¿Ä£Ê½¼ì²âScallywagÔ˶¯ £¬²¢Óë¹ã¸æÌṩÉ̺Ï×÷×èÖ¹¶Ô¹ã¸æÇëÇóµÄ¾º±ê £¬ÇÐ¶ÏÆäÊÕÈëȪԴ¡£


https://www.bleepingcomputer.com/news/security/scallywag-ad-fraud-operation-generated-14-billion-ad-requests-per-day/


4. ÐÂÐͶñÒâÈí¼þResolverRATÍþвҽÁÆÓëÖÆÒ©ÐÐÒµ


4ÔÂ21ÈÕ £¬MorphisecÍþвʵÑéÊÒ·¢Ã÷ÁËÒ»ÖÖÐÂÐÍÖØ´ó¶ñÒâÈí¼þResolverRAT £¬¸Ã¶ñÒâÈí¼þÕýÆð¾¢Õë¶ÔÒ½ÁƱ£½¡ºÍÖÆÒ©ÐÐÒµÕö¿ª¹¥»÷ £¬×î½üÒ»²¨¹¥»÷¼¯ÖÐÔÚ2025Äê3ÔÂ10ÈÕ×óÓÒ¡£ResolverRATÒÀ¸½ÆäÏȽøµÄÊÖÒÕÊÖ¶Î £¬ÈçÄÚ´æÖ´ÐС¢¶¯Ì¬×ÊÔ´´¦Öóͷ£¼°¶à²ã¹æ±ÜÊÖÒÕ £¬Ê¹µÃ¹Å°å¼ì²âÒªÁìÄÑÒÔ×àЧ¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÈö²¥ £¬Ê¹ÓýôÆÈ¸Ð»ò¿Ö¾å¸ÐÓÕµ¼ÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó £¬½ø¶ø´¥·¢Ñ¬È¾Àú³Ì¡£¹¥»÷¸ß¶ÈÍâµØ»¯ £¬Óʼþ½ÓÄÉÄ¿µÄ¹ú¼ÒĸÓï׫д £¬Ö÷ÌâÉæ¼°Ö´·¨ÊÓ²ì»ò°æÈ¨ÇÖȨ £¬Ö¼ÔÚͨ¹ý¸öÐÔ»¯¶¨Î»Ìá¸ßѬȾÀÖ³ÉÂÊ¡£Ñ¬È¾Ê¼ÓÚDLL²àÔØÊÖÒÕ £¬½«¶ñÒâDLLÎļþÓëÕýµ±³ÌÐò£¨Èç hpreader.exe£©Ò»Í¬°²ÅÅ £¬µ±³ÌÐòÖ´ÐÐʱ £¬¶ñÒâDLL±»ÇÄÇļÓÔØ £¬´Ó¶øÆô¶¯¶ñÒâÈí¼þ¡£ResolverRAT ½ÓÄɶà²ã¹æ±ÜÊÖÒÕ £¬°üÀ¨´úÂë»ìÏýºÍ×Ô½ç˵ЭÒéÀ´»ìÏýÍøÂçÁ÷Á¿ £¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐжñÒâ´úÂë £¬²¢ÔÚÔËÐÐʱ¶¯Ì¬Ê¶±ðºÍʹÓÃϵͳº¯Êý¡£ÎªÈ·¼á³¤ÆÚÐÔ £¬ResolverRAT ÔÚ Windows ×¢²á±íÖн¨Éè¶à¸öÌõÄ¿ £¬²¢ÔÚ¶à¸öλÖÃ×°ÖÃ×ÔÉí¸±±¾¡£±ðµÄ £¬Ëü»¹Ê¹ÓÃÆæÒìµÄÖ¤ÊéÑéÖ¤ÒªÁìºÍ¡°.NET ×ÊÔ´ÆÊÎöÆ÷Ð®ÖÆ¡±ÊÖÒÕÀ´ÒþÉí £¬²¢ÊµÑé¶ÔÆÊÎöÇéÐξÙÐÐÖ¸ÎÆÊ¶±ð £¬ÒÔÔÚ¼ì²âµ½±»¼ì²éʱ¸Ä±äÐÐΪ¡£


https://hackread.com/native-language-phishing-resolverrat-healthcare/


5. Õ©Æ­·Ö×Óð³äFBI IC3Ô±¹¤ÇÔÈ¡ÄúµÄ²ÆÎñÐÅÏ¢


4ÔÂ19ÈÕ £¬¿ËÈÕ £¬FBIÐû²¼Õ©Æ­¾¯±¨ £¬Õ¹ÏÖÕ©Æ­·Ö×ÓÕýð³äFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐÄ(IC3)Ö°Ô± £¬ÒÔ×·»ØËðʧ×ʽðΪÓÕ¶ü £¬ÇÔÈ¡Êܺ¦Õß²ÆÎñÐÅÏ¢¡£×Ô2023Äê12ÔÂÖÁ2025Äê2Ô £¬FBIÒÑÊÕµ½100¶àÆðÏà¹Ø±¨¸æ¡£Õ©Æ­Õß³£Ãé×¼ÍøÂç½ðÈÚÕ©Æ­Êܺ¦ÕßµÄÉç½»ÍøÂç»òÔÚÏßÂÛ̳ £¬ÓÐʱð³äÕæÊµÉí·Ý»òʹÓÃÐéαƾ֤¡£ËùÓÐȦÌ×¾ùÉæ¼°ÒÔijÖÖÐÎʽ×ÊÖúÊܺ¦Õß×·»ØËðʧ £¬Ö»¹Ü×î³õÁªÏµ·½·¨¸÷Òì £¬°üÀ¨µç×ÓÓʼþ¡¢µç»°¡¢É罻ýÌå»òÂÛ̳¡£ÔÚijЩ°¸ÀýÖÐ £¬Õ©Æ­ÕßÉõÖÁÉù³ÆÉ¥Ê§×ʽð¾ÍÔÚËûÃÇÊÖÖС£ËûÃÇͨ¹ý½¨ÉèÐéαСÎÒ˽¼Ò×ÊÁÏ £¬¼ÓÈëÔÚÏß½ðÈÚÕ©Æ­ÍÅ»ï £¬²¢½¨ÒéÊܺ¦ÕßÁªÏµÃ°³äµÄIC3¡°Ê×ϯִÐй١±»ñÈ¡×ÊÖú¡£Ò»µ©Êܺ¦ÕßÖÐ¼Æ £¬Õ©Æ­Õß±ãÉù³ÆÒѻָ´×ʽ𠣬²¢½è´Ë»ñÈ¡Æä²ÆÎñÐÅÏ¢¡£FBIÌåÏÖ £¬ÕâЩÍýÏë²»µ«ÓÕÆ­ºÍÕ©Æ­Ä¿µÄ £¬»¹Ê¹ËûÃÇÔٴγÉΪÊܺ¦Õß¡£ÎªÌá·À´ËÀàÕ©Æ­ £¬FBIÌáÐѹ«ÖÚ £¬IC3¾ø²»»áͨ¹ýµç»°¡¢µç×ÓÓʼþ¡¢É罻ýÌåµÈÖ±½ÓÓëСÎÒ˽¼ÒÏàͬ £¬Ò²²»»áÒªÇ󸶿îÀ´×·»ØËðʧ×ʽ𠣬¸ü²»»á½«Êܺ¦Õßת½é¸øÒªÇ󸶿îµÄ¹«Ë¾¡£¹«ÖÚÓ¦Ìá¸ßСÐÄ £¬ÇÐÎðÓë½öÔÚÍøÉÏ»òµç»°ÖÐÊìϤµÄÈË·ÖÏíÃô¸ÐÐÅÏ¢»ò·¢ËÍÇ®²Æ¡£ÈçÐè¾Ù±¨ÍøÂçڲƭ £¬¿É»á¼ûFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐĹÙÍø¡£


https://cybernews.com/security/fbi-alert-ic3-impersonation-scam-recover-lost-funds-steal-financial-info/


6. ºÚ¿ÍʹÓÃGoogleϵͳÈõµãʵÑéDKIMÖØ·ÅÍøÂç´¹ÂÚ¹¥»÷


4ÔÂ20ÈÕ £¬¿ËÈÕ £¬ºÚ¿ÍʹÓÃGoogleϵͳÈõµã £¬ÌᳫÁËÒ»³¡ÇÉÃîµÄÍøÂç´¹ÂÚ¹¥»÷¡£¹¥»÷Õßͨ¹ý·¢ËÍÒ»·â¿´ËÆÀ´×Ô¡°no-reply@google.com¡±µÄÐéαµç×ÓÓʼþ £¬ÀÖ³ÉÈÆ¹ýËùÓÐÑéÖ¤ £¬Ö¸ÏòÒ»¸öÍøÂçµÇ¼ÐÅÏ¢µÄÚ²Æ­Ò³Ãæ¡£¸ÃÓʼþ²»µ«Í¨¹ýÁËDKIMÉí·ÝÑéÖ¤ £¬ÇÒÄÚÈÝÏÕЩÓë¹È¸è¹Ù·½Çå¾²¾¯±¨ÎÞÒì £¬¼«Ò×ÓÕÆ­ÊÖÒÕˮƽ½ÏµÍµÄÓû§¡£È»¶ø £¬ENSÊ×ϯ¿ª·¢Ö°Ô±Äá¿Ë¡¤Ô¼º²Ñ·ÃôÈñµØ·¢Ã÷ £¬Ðéα֧³ÖÃÅ»§ÍйÜÔÚsites.google.comÉÏ £¬¶ø·ÇÕæÕýµÄaccounts.google.com £¬´Ó¶øÊ¶ÆÆÁËȦÌס£¹¥»÷ÕßÇÉÃîµØ×¢²áÁËÒ»¸öÓòÃû £¬²¢ÒÔ¡°me@domain¡±½¨ÉèGoogleÕÊ»§ £¬Ëæºó½¨ÉèÁËÒ»¸öGoogle OAuthÓ¦Óà £¬½«´¹ÂÚÓʼþÃüÃûΪ¸ÃÓ¦Óᣵ±¹¥»÷ÕßÊÚÓèÆäOAuthÓ¦Óûá¼ûGoogle WorkspaceÖеç×ÓÓʼþµØÖ·µÄȨÏÞʱ £¬Google×Ô¶¯·¢ËÍÁËÇå¾²¾¯±¨ £¬¸Ã¾¯±¨ÒòʹÓÃÓÐÓõÄDKIMÃÜÔ¿ÊðÃû¶øÍ¨¹ýÁËËùÓмì²é¡£¹¥»÷ÕßËæºó½«Çå¾²¾¯±¨×ª·¢¸øÊܺ¦Õß £¬Ê¹Æä¿´ÆðÀ´ÏñÊÇÀ´×ԹȸèµÄÕýµ±Óʼþ¡£±ðµÄ £¬¹¥»÷Õß»¹Ê¹ÓÃÁËGoogleϵͳµÄÈõµã £¬¼´DKIM½ö¼ì²éÓʼþÕýÎĺÍÓʼþÍ· £¬¶ø²»¼ì²éÐÅ·â £¬Ê¹µÃαÔìÓʼþÄܹ»Í¨¹ýÊðÃûÑéÖ¤¡£ÏÖÔÚ £¬¹È¸èÒÑÊìϤµ½OAuthµÄÈõµã £¬²¢ÕýÔÚÆð¾¢ÐÞ¸´¡£


https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/