Âí˹¿ËDOGEÍýÏëÏÝÍøÂçÇ徲Σ»£»£»£»ú£¬£¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹âÎó²î
Ðû²¼Ê±¼ä 2025-02-181. Âí˹¿ËDOGEÍýÏëÏÝÍøÂçÇ徲Σ»£»£»£»ú£¬£¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹âÎó²î
2ÔÂ14ÈÕ£¬£¬¿Æ¼¼ÒÚÍò¸»Ḭ̂£Â¡¡¤Âí˹¿ËÖÎÀíµÄÕþ¸®Ð§Âʲ¿£¨DOGE£©Ö¼ÔÚÏ÷¼õÁª°î¿ªÖ§²¢ÌáÉýÕþ¸®Ð§ÂÊ£¬£¬È»¶ø£¬£¬Æäн¨ÉèµÄDOGE.govÍøÕ¾È´ÒòÍøÂçÇå¾²²½·¥ËÉи¶øÃæÁÙÖØ´óΣº¦¡£¡£¡£¡£¡£ºÚ¿ÍÖ¸³ö£¬£¬¸ÃÍøÕ¾±£´æÑÏÖØÇå¾²Îó²î£¬£¬ÈκÎÈ˶¼ÄÜ»á¼û²¢±à¼´æ´¢µÄÐÅÏ¢¡£¡£¡£¡£¡£ÍøÕ¾Ëƺõ»Å潨³É£¬£¬¸´ÖÆÁËDOGEµÄÉ罻ýÌåÌû×Ó¼°Òªº¦Í³¼ÆÊý¾Ý£¬£¬ÇÒÊý¾Ý¿â¹ûÕæ£¬£¬ÔÊÐíµÚÈý·½ÐÞ¸ÄÄÚÈݲ¢ÊµÊ±ÏÔʾ¡£¡£¡£¡£¡£¾Ý¿ª·¢Ö°Ô±Í¸Â¶£¬£¬¸ÃÍøÕ¾ÍйÜÔÚCloudflare PagesÉÏ£¬£¬¶ø·ÇÕþ¸®Ð§ÀÍÆ÷£¬£¬Êý¾Ý¿âAPI¶Ëµã¿É±»ÈÝÒ×ÕÒµ½²¢ÍÆË͸üС£¡£¡£¡£¡£±ðµÄ£¬£¬DOGEµÄÁíÒ»ÍøÕ¾waste.govÒ²±£´æÁËWordPressĬÈÏÄ£°åºÍʾÀýÎı¾£¬£¬½öÔÚýÌ幨עºó²Å±»·â½û¡£¡£¡£¡£¡£ÕâЩÊÂÎñ͹ÏÔÁËDOGEÔÚ×·ÇóЧÂʵÄͬʱ£¬£¬ºöÊÓÁËÍøÂçÇå¾²µÄÖ÷ÒªÐÔ£¬£¬¿ÉÄܳÉΪÆäˢеÄÎþÉüÆ·¡£¡£¡£¡£¡£
https://cybernews.com/security/musk-doge-website-hacked/
2. ºÉÀ¼¾¯·½²é·âZservers/XHost·Àµ¯ÍйÜЧÀÍ127̨ЧÀÍÆ÷
2ÔÂ17ÈÕ£¬£¬¿ËÈÕ£¬£¬ÃÀ¡¢Ó¢¡¢°ÄÈý¹ú¶Ô¶íÂÞ˹·Àµ¯ÍйÜЧÀÍÌṩÉÌZservers¼°ÆäÖÎÀíÔ±Alexander Igorevich MishinºÍAleksandr Sergeyevich BolshakovʵÑéÖÆ²Ã£¬£¬ÒòÆäÖ§³Ö¶íÂÞ˹ÀÕË÷Èí¼þLockBitÐж¯¡£¡£¡£¡£¡£ZserversλÓÚ¶íÂÞ˹°Í¶ûè§¶û£¬£¬Í¨¹ýÌṩ·Àµ¯ÍйÜЧÀÍ£¨BPH£©£¬£¬°üÀ¨×âÁÞ´ó×ÚIPµØµã£¬£¬ÐÖúLockBit¹ØÁª¹«Ë¾ÌÓ±ÜÖ´·¨ºÍÍøÂçÇå¾²¹«Ë¾µÄÉó²é£¬£¬Ðе÷ÌᳫÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£´Ëǰ£¬£¬¼ÓÄôóÖ´·¨²¿·ÖÔÚËѲéÖз¢Ã÷ZserversµÄת×âIPµØµãÓëLockBit¶ñÒâÈí¼þ²Ù×÷Óйء£¡£¡£¡£¡£ºÉÀ¼ÒòÖ´·¨±¡ÈõÄÑÒԹرմËÀàЧÀÍ£¬£¬Í¹ÏÔÁËÔöÇ¿¹æÔòµÄÐëÒªÐÔ¡£¡£¡£¡£¡£¼¸Ììºó£¬£¬ºÉÀ¼¾¯·½Ðû²¼ÒÑÏÂÏß²¢²é·âÁËÓëZservers/XHostÏà¹ØµÄ127̨λÓÚ°¢Ä·Ë¹Ìص¤µÄЧÀÍÆ÷¡£¡£¡£¡£¡£ÕâЩЧÀÍÆ÷±»ContiºÍLockBitµÈÍøÂç·¸·¨¼¯ÍÅʹÓᣡ£¡£¡£¡£¾ÓÉÒ»Äê¶àµÄÊӲ죬£¬°¢Ä·Ë¹Ìص¤¾¯·½ÍøÂç·¸·¨Ð¡×éÔÚ2ÔÂ12ÈÕµÄͻϮÖе·»ÙÁËÕâ¼Ò·Àµ¯ÍйÜÉÌ¡£¡£¡£¡£¡£Ðж¯Öз¢Ã÷µÄЧÀÍÆ÷ÉÏ×°ÓÐContiºÍLockbitµÄºÚ¿Í¹¤¾ß£¬£¬ÕâÁ½¸ö¼¯Íű»ÒÔΪÊÇÌìÏÂÉÏ×î¾ßÉú²úÁ¦ºÍÆÆËðÁ¦µÄÀÕË÷Èí¼þ¼¯ÍÅ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬¸ÃÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬¾¯ÆÓÖ±ÔÚÆÊÎö±»¿ÛѺЧÀÍÆ÷ÉÏ´æ´¢µÄÊý¾Ý¡£¡£¡£¡£¡£
https://securityaffairs.com/174321/hacking/dutch-police-seized-127-servers-bulletproof-hosting-service-zservers-xhost.html
3. XCSSET macOS¶ñÒâÈí¼þбäÖÖÔöÇ¿¹¥»÷ÄÜÁ¦£¬£¬ÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢
2ÔÂ17ÈÕ£¬£¬XCSSET macOSÄ£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þµÄбäÖÖÒÑ·ºÆðÔÚÕë¶ÔÓû§Ãô¸ÐÐÅÏ¢µÄ¹¥»÷ÖУ¬£¬°üÀ¨Êý×ÖÇ®°üºÍNotesÓ¦ÓóÌÐòµÄÊý¾Ý¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ³£Í¨¹ýÊÜѬȾµÄXcodeÏîÄ¿¾ÙÐÐÈö²¥£¬£¬ÒѾ±£´æÖÁÉÙÎåÄ꣬£¬²¢ÇÒÿ´Î¸üж¼´ú±í×Å¿ª·¢µÄÒ»¸öÀï³Ì±®¡£¡£¡£¡£¡£Î¢ÈíÍþвÇ鱨ÍŶÓÔÚÓÐÏ޵Ĺ¥»÷Öз¢Ã÷ÁË×îбäÖÖ£¬£¬Ëü¾ßÓÐÔöÇ¿µÄ´úÂë»ìÏý¡¢¸üºÃµÄ³¤ÆÚÐÔºÍеÄѬȾսÂÔ¡£¡£¡£¡£¡£ÐµıäÖÖ½ÓÄÉÁËÒÀÀµÓÚBase64ºÍxxdÒªÁìµÄ±àÂëÊÖÒÕ¾ÙÐÐеĻìÏý£¬£¬Í¬Ê±Ê¹ÓÃÁËzshrcºÍdockÁ½ÖÖ³¤ÆÚÐÔÊÖÒÕ¡£¡£¡£¡£¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃеÄXcodeѬȾҪÁ죬£¬½«ÓÐÓÃÔØºÉ°²ÅÅÔÚXcodeÏîÄ¿ÖС£¡£¡£¡£¡£¹ØÓÚzshrc³¤ÆÚ»¯ÒªÁ죬£¬ÐµıäÖֻὨÉèÒ»¸ö°üÀ¨ÓÐÓøºÔصÄÎļþ£¬£¬²¢ÔÚÆô¶¯ÐµÄshell»á»°Ê±Æô¶¯¸ÃÎļþ¡£¡£¡£¡£¡£¹ØÓÚdockÒªÁ죬£¬¶ñÒâÈí¼þ´Ó¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÏÂÔØÒÑÊðÃûµÄdockutil¹¤¾ßÀ´ÖÎÀídockÏîÄ¿£¬£¬²¢½¨ÉèÒ»¸ö¶ñÒâµÄLaunchpadÓ¦ÓóÌÐòÀ´Ö´ÐжñÒâ¸ºÔØ¡£¡£¡£¡£¡£XcodeÊÇAppleµÄ¿ª·¢¹¤¾ß¼¯£¬£¬XCSSETµÄÔËÓªÕßͨ¹ýÕë¶ÔXcodeÏîÄ¿×ÊÔ´¿ÉÒÔ½Ó´¥µ½¸ü¶àµÄÊܺ¦Õß¡£¡£¡£¡£¡£Î¢Èí½¨Òé¼ì²éºÍÑéÖ¤´Ó·Ç¹Ù·½´æ´¢¿â¿Ë¡µÄXcodeÏîÄ¿ºÍ´úÂë¿â£¬£¬ÒÔ·ÀÒþ²Ø»ìÏýµÄ¶ñÒâÈí¼þ»òºóÃÅ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/
4. ºÚ¿ÍʹÓà Telegram API Èö²¥Ð嵀 Golang ºóÃÅ
2ÔÂ17ÈÕ£¬£¬NetskopeµÄÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеġ¢¿ÉÄÜÈÔÔÚ¿ª·¢ÖеĻùÓÚGolangµÄºóÃŶñÒâÈí¼þ£¬£¬ËüʹÓÃTelegram API¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶¡£¡£¡£¡£¡£ÕâÖÖ¶ñÒâÈí¼þÔ´×Ô¶íÂÞ˹£¬£¬Ê¹ÓÃÁËTelegramµÈÔÆÐ§ÀÍ£¬£¬ÕâЩЧÀÍÒ×ÓÚ¹¥»÷ÕßʹÓöøÄÑÒÔ±»Ñо¿Ö°Ô±¼à¿Ø¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÔÚÖ´ÐÐʱ»á¼ì²é×ÔÉíÊÇ·ñ´ÓÖ¸¶¨Î»ÖúÍÎļþÃûÔËÐУ¬£¬Èç²»ÊÇ£¬£¬Ôò»á¸´ÖƵ½¸ÃλÖò¢Æô¶¯¸±±¾¡£¡£¡£¡£¡£¹ØÓÚC2ͨѶ£¬£¬ºóÃÅʹÓÿªÔ´Go°üÓëTelegram½»»¥£¬£¬½¨ÉèÒ»¸ö»úеÈËʵÀýÀ´¼àÊÓÖ¸¶¨µÄ̸ÌìÖÐÊÇ·ñÓÐÐÂÏÂÁî¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ§³ÖËĸöÏÂÁ£¬µ«ÏÖÔÚֻʵÏÖÁËÈý¸ö£¬£¬°üÀ¨Ö´ÐÐPowerShellÏÂÁî¡¢ÖØ¸´³õʼװÖüì²éºÍÀú³Ì¡¢·¢ËÍÆÁÄ»½ØÍ¼ÐÂÎÅ£¨ËäδÍêȫʵÏÖ£©ÒÔ¼°×Ô»ÙÏÂÁî¡£¡£¡£¡£¡£ÕâÖÖ¶ÔÔÆÓ¦ÓóÌÐòµÄ¶ñÒâʹÓøø·ÀÓùÕß´øÀ´ÁËÌôÕ½£¬£¬ÓÉÓÚ´Ó·ÀÓùÕߵĽǶÈÀ´¿´£¬£¬ºÜÄÑÇø·ÖʹÓÃAPIµÄͨË×Óû§ºÍC2ͨѶ¡£¡£¡£¡£¡£ÎªÁ˼á³ÖÇå¾²£¬£¬½¨Òé×°ÖÃ×îÐÂÇÒÐÅÓþÓÅÒìµÄ·À²¡¶¾ºÍ·´¶ñÒâÈí¼þ£¬£¬ÒÔ¼ì²âºÍ×èÖ¹´ËÀà¶ñÒâÎļþ¡£¡£¡£¡£¡£
https://hackread.com/hackers-exploit-telegram-api-spread-golang-backdoor/
5. RansomHubÀÕË÷Èí¼þ×éÖ¯¹¥»÷ËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä
2ÔÂ17ÈÕ£¬£¬RansomHubÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶ÔËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä¾ÙÐÐÁ˹¥»÷£¬£¬ÒÑËø¶¨Æä»ù´¡ÉèÊ©²¢»ñÈ¡ÁË119GBµÄÎļþ¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄϵͳ°üÀ¨¶Ä³¡¡¢±ãµ±µê¡¢Õþ¸®´óÂ¥¡¢µçÐÅЧÀÍÒÔ¼°¶à¸öÒ½ÁÆÖÐÐÄ¡£¡£¡£¡£¡£RansomHubÖ¸Ôð²¿Âäδ¾ÙÐÐ̸ÅУ¬£¬²¢Æ·ÆÀÆä°ü¹Ü¹«Ë¾ºÍ¶Ê»áδ½ÓÄÉÐж¯¡£¡£¡£¡£¡£RansomHubÍþв³Æ£¬£¬ÈôÖÜÈýǰδÊÕµ½»Ø¸´£¬£¬½«Ð¹Â¶ËùÓÐÊý¾Ý¡£¡£¡£¡£¡£ËÕÊ¥ÂêÀöÆæçêÍßÓ¡µÚ°²²¿ÂäÔò½ÒÏþÉùÃ÷³Æ£¬£¬2ÔÂ9ÈÕÔâÊÜÁËÀÕË÷Èí¼þÍøÂç¹¥»÷£¬£¬¶à¸öµç»°ºÍÅÌËã»úϵͳÊܵ½Ó°Ïì¡£¡£¡£¡£¡£²¿ÂäÕýÔÚÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬Æð¾¢½â¾öÎÊÌ⣬£¬²¢ÉèÁ¢ÁËеĵ绰ºÅÂ룬£¬Ô¤¼Æ½«ÒÔÓÐÏÞÄÜÁ¦ÔË×÷Ò»ÖÜ¡£¡£¡£¡£¡£²¿ÂäÖ÷ϯÏòÉçÇø°ü¹Ü£¬£¬ËûÃǽ«¼ÌÐø°´ÆÚ¸üлָ´ÇéÐΣ¬£¬µ«ÏÖÔÚÎÞ·¨·ÖÏí¸ü¶àϸ½Ú£¬£¬Ð»Ð»¸÷È˵ÄÄÍÐĺÍÃ÷È·¡£¡£¡£¡£¡£
https://databreaches.net/2025/02/17/ransomware-attack-affects-michigan-casinos-and-tribal-health-centers/
6. Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯DDoS¹¥»÷
2ÔÂ17ÈÕ£¬£¬Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯ÁËDDoS¹¥»÷£¬£¬Ä¿µÄ°üÀ¨ÀûÄÉÌØ»ú³¡¡¢Âí¶ûÅíÈø»ú³¡¡¢½»Í¨ÖÎÀí¾Ö¡¢Intesa San PaoloÒøÐÐÒÔ¼°ËþÀ¼Íиۺ͵ÄÀïÑÅË¹ÌØ¸ÛµÄÍøÕ¾¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊǶÔÒâ´óÀû×ÜͳÂíËþÀ×À½«¶íÂÞ˹ÓëÄÉ´âµÂ¹úÀúÊ·¾ÙÐнÏÁ¿µÄÑÔÂ۵ĻØÓ¦£¬£¬NoName057(16)Éù³ÆÕâÊǶԡ°¿Ö¶íÕß¡±µÄ´¦·Ö¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷¶ÔÄ¿µÄµÄÓ°Ïì½ÏС£¡£¡£¡£¡£¬£¬µ«Òâ´óÀû¹ú¼ÒÍøÂçÇå¾²¾ÖѸËÙ½ÓÄÉÐж¯£¬£¬Ö§³ÖÊÜÓ°ÏìµÄ×éÖ¯²¢Ïû³ýÁ˹¥»÷¡£¡£¡£¡£¡£NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬Ê¹ÓöàÖÖ¹¤¾ß¾ÙÐй¥»÷£¬£¬²¢ÔÚµØÔµÕþÖÎÖ÷ҪʱÆÚÉý¼¶Ï®»÷¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²¢·ÇÊ״Σ¬£¬Ö®Ç°¸Ã×éÖ¯Ò²Ôø¶ÔÒâ´óÀû¸÷²¿Î¯¡¢»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ÍøÕ¾ºÍ˽ÈË×éÖ¯Ìᳫ¹ý¹¥»÷¡£¡£¡£¡£¡£¶íÂÞ˹Íâ½»²¿½²»°ÈËÂêÀöÑÇ¡¤Ôú¹þÂÞÍÞÒ²ÌåÏÖ£¬£¬ÂíËþÀ×ÀµÄÑÔÂÛ²»»á¡°²»ÊÜ´¦·Ö¡±¡£¡£¡£¡£¡£
https://securityaffairs.com/174294/hacktivism/noname05716-launched-ddos-attacks-on-italian-sites.html