FBI¾¯Ê¾ÐéαÎĵµ×ª»»¹¤¾ßÇÔÊØÐÅÏ¢²¢Èö²¥ÀÕË÷Èí¼þ

Ðû²¼Ê±¼ä 2025-03-24

1. FBI¾¯Ê¾ÐéαÎĵµ×ª»»¹¤¾ßÇÔÊØÐÅÏ¢²¢Èö²¥ÀÕË÷Èí¼þ


3ÔÂ23ÈÕ£¬£¬£¬£¬Áª°îÊÓ²ì¾Ö£¨FBI£©µ¤·ð·Ö¾Ö¿ËÈÕÐû²¼ÍøÂçÇå¾²Ô¤¾¯£¬£¬£¬£¬Ö¸³öÍøÂç·¸·¨×éÖ¯ÕýʹÓÃαÔìµÄÔÚÏßÎĵµ×ª»»¹¤¾ßʵÑé´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡ÓëÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¾ÝÇå¾²±¨¸æÏÔʾ£¬£¬£¬£¬¹¥»÷Õßͨ¹ý½¨ÉèÐéαÎļþת»»¡¢ºÏ²¢»òÏÂÔØ¹¤¾ßÍøÕ¾£¬£¬£¬£¬ÓÕµ¼Óû§ÉÏ´«°üÀ¨Ãô¸ÐÐÅÏ¢µÄÎĵµ£¬£¬£¬£¬½ø¶øÔÚ×°±¸ÖÐÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£FBIÖ¸³ö£¬£¬£¬£¬ÕâЩ´¹ÂÚÍøÕ¾Í¨³£Î±×°³ÉÌṩ".docת.pdf""¶àͼºÏ²¢.pdf"µÈÊÊÓù¦Ð§µÄÃâ·ÑЧÀÍ£¬£¬£¬£¬ÆäÓòÃûÓëÕýµ±ÍøÕ¾¸ß¶ÈÏàËÆ£¨Èç¸Ä¶¯×Öĸ»òºó׺£©¡£¡£¡£¡£¡£¡£µ±Óû§ÉÏ´«Îļþºó£¬£¬£¬£¬¹¥»÷Õß²»µ«ÇÔÈ¡ÐÕÃû¡¢Éç±£ºÅ¡¢¼ÓÃÜÇ®±ÒÃÜÔ¿¡¢ÒøÐÐÕË»§µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬¸üͨ¹ýÀ¦°óµÄ¶ñÒâÈí¼þ£¨ÈçGootloader£©ÊµÏÖÔ¶³Ì×°±¸¿ØÖÆ£¬£¬£¬£¬×îÖÕ°²ÅÅREvil¡¢BlackSuitµÈÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±ÒÑÈ·È϶àÆðÏÖʵ¹¥»÷°¸Àý¡£¡£¡£¡£¡£¡£Ç徲ר¼Ò½¨Ò飬£¬£¬£¬Óû§Ó¦Ñ¡Ôñ×ÅÃûÎļþת»»Ð§ÀÍ£¬£¬£¬£¬×èֹʹÓÃÎÞÆÀ¼Û¼Í¼µÄСÖÚ¹¤¾ß£»£»£»£»£»ÏÂÔØÇ°Îñ±ØºË²éÎļþ¹þÏ£Öµ£¬£¬£¬£¬¶Ô¿ÉÖ´ÐÐÎļþ£¨.exe£©ºÍ¾ç±¾Îļþ£¨.js£©¾ÙÐÐɳÏäÆÊÎö£»£»£»£»£»ÆóÒµÓû§Ðè°²ÅÅÓʼþ¹ýÂËÓëÄÚÈݼì²â»úÖÆ£¬£¬£¬£¬×è¶Ï¿ÉÒÉÎļþ´«Êä¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-warnings-are-true-fake-file-converters-do-push-malware/


2. ΢Èí¿ÉÐÅÊðÃûÔâÀÄÓãº¶ÌÆÚÖ¤ÊéÖú¶ñÒâÈí¼þÈÆ¹ýÇå¾²¼ì²â


3ÔÂ22ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±½üÆÚ½ÒÆÆ£¬£¬£¬£¬ÍøÂç·¸·¨×éÖ¯ÕýʹÓÃ΢ÈíÐÂÍÆ³öµÄ"¿ÉÐÅÊðÃûЧÀÍ£¨Trusted Signing£©"Ç©·¢¶ÌÆÚÓÐÓôúÂëÊðÃûÖ¤Ê飬£¬£¬£¬Îª¶ñÒâÈí¼þÅûÉÏÕýµ±ÍâÒ¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÔÊÐí¿ª·¢ÕßÒÔÿÔÂ9.99ÃÀÔª¶©ÔÄ»ñÈ¡ÓÉ΢ÈíÖÎÀíµÄÈÏÖ¤»ú¹¹Ç©·¢µÄ¶ÌÆÚÖ¤Ê飬£¬£¬£¬ÆäÉè¼Æ³õÖ¾ÊÇͨ¹ý×Ô¶¯»¯Ö¤ÊéÂÖ»»»úÖÆÌáÉýÈí¼þ·Ö·¢Çå¾²ÐÔ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ÍþвÐÐΪÕß·¢Ã÷¸ÃЧÀͱ£´æ¿É±»Ê¹ÓõÄÎó²î£ºÖ»¹Ü΢ÈíÒªÇó×¢²áʵÌåÐèΪ½¨ÉèÂúÈýÄêµÄÆóÒµ£¬£¬£¬£¬µ«ÔÊÐíСÎÒ˽¼ÒÒÔ×ÔÉíÃûÒå×¢²á£¬£¬£¬£¬ÕâΪ²»·¨·Ö×ÓÌṩÁ˸ü±ã½ÝµÄαװ·¾¶¡£¡£¡£¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬£¬¹¥»÷Õ߯«ºÃʹÓÃÓÐÓÃÆÚ½öÈýÌìµÄ¶ÌÆÚÖ¤Ê飬£¬£¬£¬ÕâÀàÖ¤Êé×ÝÈ»±»ÓÃÓÚ¶ñÒâ»î¶¯£¬£¬£¬£¬Î¢ÈíÒ²ÄÜͨ¹ýÍþвÇ鱨¼à¿Ø¿ìËÙ×÷·Ï£¬£¬£¬£¬ÀíÂÛÉÏ¿É×îС»¯ÀÄÓÃÓ°Ïì¡£¡£¡£¡£¡£¡£µ«ÏÖÕæÏàÐÎÖУ¬£¬£¬£¬ÒÑ·¢Ã÷¶àÆðÔÚÖ¤ÊéʧЧǰʹÓÃÓÐÓÃÊðÃûÊ¿´«µÄ¶ñÒâÈí¼þ°¸Àý¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬ÍþвÐÐΪÕßתÏò΢ÈíЧÀÍ£¬£¬£¬£¬Ö÷ÒªÒòÆäÑéÖ¤Á÷³Ì½Ï¹Å°åÀ©Õ¹ÑéÖ¤£¨EV£©Ö¤Êé¸üΪÇáÓ¯¡£¡£¡£¡£¡£¡£Î¢Èí·½ÃæÌåÏÖ£¬£¬£¬£¬ÒѰ²ÅÅ×Ô¶¯¼à¿Ø»úÖÆ£¬£¬£¬£¬Á¬ÏµÍþвÇ鱨ʵʱ׷×ÙÖ¤ÊéʹÓÃÇéÐΣ¬£¬£¬£¬Ò»µ©·¢Ã÷¶ñÒâʹÓÃÁ¬Ã¦Ö´Ðдó¹æÄ£Ö¤Êé×÷·Ï£¬£¬£¬£¬Í¬Ê±Ç¿µ÷Æä·´¶ñÒâÈí¼þ²úÆ·ÒÑÄܼì²âÏà¹ØÑù±¾¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/


3. ºÚ¿ÍÉù³Æ»ñÈ¡600ÍòÌõ¼Í¼£¬£¬£¬£¬µ«Oracle·ñ¶¨±£´æÎ¥¹æÐÐΪ


3ÔÂ22ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾CloudSEKͨ¹ýÆäXVigilƽ̨¼à²âµ½Õë¶ÔOracle Cloud»ù´¡ÉèÊ©µÄ´ó¹æÄ£ÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬µ¼ÖÂÔ¼600ÍòÌõÃô¸Ð¼Í¼й¶£¬£¬£¬£¬²¨¼°³¬14ÍòÃû×â»§¡£¡£¡£¡£¡£¡£¹¥»÷Õß"rose87168"×Ô2025ÄêÍ·×îÏȻ£¬£¬£¬£¬Ê¹ÓÃOracle Fusion Middleware 11GµÄ×ÓÓòÃûÎó²îʵÑéÈëÇÖ£¬£¬£¬£¬ÇÔÈ¡°üÀ¨JKSÃÜÔ¿¿â¡¢¼ÓÃܵ¥µãµÇ¼(SSO)ƾ֤¼°ÆóÒµÖÎÀíÆ÷ÃÜÔ¿µÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬²¢ÔÚ°µÍøÂÛ̳¶µÊÛ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÉõÖÁÒªÇóÊܺ¦ÕßÖ§¸¶Êê½ðɾ³ýÊý¾Ý£¬£¬£¬£¬²¢ÎªÆÆ½âÃÜÂëÕßÌṩ½±Àø¡£¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬¹¥»÷¿ÉÄÜʹÓÃ2021ÄêÅû¶µÄCVE-2021-35587Îó²î£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì½ÓÊÜOracle Access Manager£¬£¬£¬£¬½ø¶øÊµÑéºáÏòÉøÍ¸¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬±»ÈëÇÖЧÀÍÆ÷Èí¼þ°æ±¾×Ô2014ÄêÆðδ¸üУ¬£¬£¬£¬ºã¾Ã´¦ÓÚʧÐÞ״̬¡£¡£¡£¡£¡£¡£Oracle¹Ù·½·ñ¶¨ÔÆ»ù´¡ÉèÊ©ÔâÈëÇÖ£¬£¬£¬£¬Éù³ÆÐ¹Â¶Æ¾Ö¤²»ÊÊÓÃÓÚÆäÔÆÆ½Ì¨¡£¡£¡£¡£¡£¡£µ«CloudSEKÖ¸³ö£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡µÄJKSÎļþ°üÀ¨½âÃÜÃô¸ÐÊý¾ÝµÄÃÜÔ¿ÖÊÁÏ£¬£¬£¬£¬Ð¹Â¶µÄ¼ÓÃÜSSO/LDAPƾ֤¸ü¿ÉÄÜÒý·¢Á¬Ëø¹¥»÷£¬£¬£¬£¬ÁãÈÕÎó²îʹÓÃҲ̻¶ÁËOracle CloudµÄÇå¾²Òþ»¼¡£¡£¡£¡£¡£¡£Ç徲ר¼Ò½¨ÒéÊÜÓ°Ïì×â»§Á¬Ã¦Ö´ÐÐÆ¾Ö¤ÂÖ»»¡¢¿ªÕ¹ÖÜȫȡ֤ÊӲ죬£¬£¬£¬²¢ÔöÇ¿ÍþвÇ鱨¼à¿Ø¡£¡£¡£¡£¡£¡£


https://hackread.com/oracle-denies-breach-hacker-access-6-million-records/


4. ŦԼ´óѧÕÐÉúϵͳÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬300ÍòÃô¸ÐÊý¾Ýй¶ÒýÖÖ×åÕùÒé


3ÔÂ22ÈÕ£¬£¬£¬£¬ÃÀ¹úŦԼ´óѧÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ºÚ¿Íͨ¹ýÈëÇÖÕÐÉúϵͳ»ñÈ¡Áè¼Ý300Íò·ÝÉêÇëÕßÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÚ22ÈÕÆÆÏþÉøÍ¸¹ÙÍø£¬£¬£¬£¬Ò»Á¬¸Ä¶¯Ò³Ãæ´ïÁ½Ð¡Ê±£¬£¬£¬£¬¹ûÕæÅû¶°üÀ¨ÐÕÃû¡¢¿¼ÊÔЧ¹û¡¢¼ÒÍ¥Åä¾°¼°¾­¼ÃÔ®Öú¼Í¼µÄCSVÎļþ£¬£¬£¬£¬²¿·ÖÊý¾Ý¿É×·ËÝÖÁ1989Äê¡£¡£¡£¡£¡£¡£¸Ä¶¯Ò³ÃæÕ¹Ê¾ÕÐÉú¼ȡͳ¼ÆÍ¼±í£¬£¬£¬£¬Éù³ÆÔÚ×î¸ß·¨Ôº×÷·ÏƽȨÐж¯ºó£¬£¬£¬£¬ÑÇÒáºÍ°×ÈËÉêÇëÕß¼ȡ±ê×¼ÈÔ¸ßÓÚÉÙÊý×åÒᣬ£¬£¬£¬Òâͼ¼¤»¯ÖÖ×åÒéÌâ¡£¡£¡£¡£¡£¡£´óѧITÍŶÓÔÚÖÐÎçǰ»Ö¸´ÏµÍ³¿ØÖÆ£¬£¬£¬£¬½²»°ÈËÔ¼º²¡¤±´¿ËÂü֤ʵÒÑÆô¶¯Çå¾²Éó²é²¢ÓëÖ´·¨»ú¹¹ÏàÖú¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ÊµÑé¹¥»÷µÄºÚ¿Í×éÖ¯"Computer Niggy Exploitation"´ËÇ°ÔøÈëÇÖÃ÷ÄáËÕ´ï´óѧ£¬£¬£¬£¬Ð¹Â¶700Íò·Ýº¬Éç»áÇå¾²ºÅÂëµÄÕÐÉúÊý¾Ý£¬£¬£¬£¬Òý·¢ÕûÌåËßËÏ¡£¡£¡£¡£¡£¡£ÀàËÆÊÂÎñ½üÄêÆµ·¢£¬£¬£¬£¬Ë¹Ì¹¸£´óѧ£¨2019£©¡¢ÇÇÖγǴóѧ£¨2024£©¾ùÔâÓö¹ýÉæ¼°Ñ§ÉúÒþ˽µÄ´ó¹æÄ£Ð¹Â¶¡£¡£¡£¡£¡£¡£×¨¼ÒÖ¸³ö£¬£¬£¬£¬½ÌÓýÊý¾ÝÇå¾²Îó²îÓëÖÖ×åÒéÌâ½»Ö¯£¬£¬£¬£¬Í¹ÏÔ¸ßУÔÚÊý¾ÝÖÎÀíºÍÉç»áÔðÈη½ÃæµÄË«ÖØÌôÕ½¡£¡£¡£¡£¡£¡£


https://nyunews.com/news/2025/03/22/nyu-website-hacked-data-leak/


5. SEOרҵÈËÊ¿ÔâSemrush´¹ÂÚ¹¥»÷£¬£¬£¬£¬GoogleÕË»§Êý¾Ý±»ÇÔÈ¡


3ÔÂ21ÈÕ£¬£¬£¬£¬Ò»ÏîеÄÍøÂç´¹ÂڻÕë¶ÔSEOרҵÈËÊ¿£¬£¬£¬£¬Ê¹ÓöñÒâSemrush Google¹ã¸æÖ¼ÔÚÇÔÈ¡ËûÃÇµÄ Google ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¾ÝMalwarebytesʵÑéÊÒÆÊÎö£¬£¬£¬£¬ÍøÂç·¸·¨×éÖ¯Õýͨ¹ýð³äSemrushƽ̨µÄGoogle¹ã¸æÊµÑ龫׼´¹ÂÚ¹¥»÷£¬£¬£¬£¬Ä¿µÄÖ±Ö¸Óû§GoogleÕË»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¸ÃÊÖ·¨ÊôÓÚ"Á¬ËøÚ²Æ­"ģʽ£¬£¬£¬£¬¹¥»÷ÕßÏÈÉøÍ¸Google AdsÕË»§½¨Éè¶ñÒâ¹ã¸æ£¬£¬£¬£¬ÔÙÓÕµ¼Óû§½øÈë·ÂðµÇÂ¼Ò³Ãæ¡£¡£¡£¡£¡£¡£×÷ΪЧÀÍ40%ÌìÏÂ500Ç¿ÆóÒµµÄSEOÆÊÎö¹¤¾ß£¬£¬£¬£¬SemrushÓëGoogle AnalyticsµÈ½¹µãЧÀÍÉî¶È¼¯³É£¬£¬£¬£¬Ê¹Æä³ÉΪ¸ß¼ÛÖµ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¹¥»÷Õß×¢²áÁËsemrush[.]clickµÈ¶à¸ö·ÂðÓòÃû£¬£¬£¬£¬¹¹½¨Óë¹Ù·½¸ß¶ÈÏàËÆµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬£¬Ç¿ÖÆÓû§Í¨¹ý"GoogleµÇ¼"Ìύƾ֤¡£¡£¡£¡£¡£¡£ÓÉÓÚSemrushÕË»§³£¹ØÁªÆóÒµ¼¶GoogleЧÀÍ£¬£¬£¬£¬¹¥»÷Õ߿ɼä½Ó»ñÈ¡ÊÕÈëÊý¾Ý¡¢ÓªÏúÕ½ÂÔµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬¶øÎÞÐèÖ±½Ó¹¥ÆÆSemrushϵͳ¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒElie BerrebyÖ¸³ö£¬£¬£¬£¬Ä»ºóºÚÊÖΪ°ÍÎ÷·¸·¨¼¯ÍÅ£¬£¬£¬£¬ÆäÊÖ·¨Õ¹ÏÖ³ö¶ÔSaaSÉú̬µÄÉî¿ÌÃ÷È·¡£¡£¡£¡£¡£¡£·ÀÓù½¨Òé°üÀ¨£º×èÖ¹µã»÷ÍÆ¹ãÁ´½Ó¡¢Ê¹ÓÃÊéǩֱ´ï¹Ù·½Ò³Ãæ¡¢µÇ¼ǰÑÏ¿áУÑéÓòÃû£¬£¬£¬£¬²¢ÆôÓÃÃÜÂëÖÎÀíÆ÷µÄ×Ô¶¯Ìî³ä¹¦Ð§¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-semrush-ads-used-to-steal-seo-professionals-google-accounts/


6. ÒÁÀÊ´¬Ö»ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬116ËÒ´¬Í¨Ñ¶ÏµÍ³Ì±»¾


3ÔÂ21ÈÕ£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬ÒÁÀʺ½ÔËÒµÔâÓöÖØ´óÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬Ò»¸öÃûΪLabDookhteganµÄºÚ¿Í×éÖ¯Ðû³Æ¶Ôµ¼ÖÂ116ËÒÒÁÀÊ´¬Ö»Í¨Ñ¶ÏµÍ³Ì±»¾µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¾ÝÂ×¶ØÍøÂçÇ徲ר¼ÒÄÉÀïÂü¡¤¼ÓÀﲼ֤ʵ£¬£¬£¬£¬´Ë´Î¹¥»÷Ä¿µÄÖ±Ö¸ÒÁÀʹú¼ÒÓÍÂÖ¹«Ë¾£¨50ËÒ£©ºÍÒÁÀÊÒÁ˹À¼¹²ºÍ¹úº½Ô˹«Ë¾£¨66ËÒ£©ÔËÓªµÄ´¬²°£¬£¬£¬£¬¹¥»÷Õßͨ¹ýɨ³ýVSATÎÀÐÇͨѶϵͳµÄ´æ´¢×°±¸ÊµÑ鯯Ë𡣡£¡£¡£¡£¡£¸Ã×éÖ¯Éù³Æ£¬£¬£¬£¬ÕâÁ½¼Ò¹«Ë¾ºã¾ÃΪҲÃźúÈûÅѾüÌṩº£Éϲ¹¸ø£¬£¬£¬£¬¶øÅѾüƵÈÔÏ®»÷ÂüµÂº£Ï¿¹ýÍù´¬Ö»£¬£¬£¬£¬ÑÏÖØÍþвȫÇòÉÌÒµÇå¾²¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬LabDookhtegan´ËǰÒÔй¶ÒÁÀÊÕþ¸®ÉñÃØÖø³Æ£¬£¬£¬£¬×Ô2019ÄêÆØ¹âÒÁÀÊÌØ¹¤×éÖ¯APT34µÄºÚ¿Í¹¤¾ßºó£¬£¬£¬£¬Ò»Á¬¹ûÕæ´ó×ÚÕþ¸®ÄÚ²¿Îļþ£¬£¬£¬£¬´Ë´Î¹¥»÷±ê¼Ç×ÅÆäÕ½ÂÔ´ÓÐÅϢй¶תÏòÖ±½ÓÆÆË𡣡£¡£¡£¡£¡£


https://news.risky.biz/risky-bulletin-hacktivists-claim-cyber-sabotage-of-116-iranian-ships/