FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß
Ðû²¼Ê±¼ä 2025-04-221. FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß
4ÔÂ22ÈÕ£¬£¬FogÀÕË÷Èí¼þÔËÓªÉ̽üÆÚʹÓÃDOGEÖ÷ÌâÀÕË÷Ðż¥Ð¦Êܺ¦Õߣ¬£¬ÌṩÃ⺬»ìÃÜÃÜÔ¿ÒÔ»»È¡¶ñÒâÈí¼þÈö²¥¡£¡£¡£¡£¡£¡£ÓëÔçÆÚÒÀÀµ±»µÁVPNƾ֤²î±ð£¬£¬×îй¥»÷ʼÓÚ°üÀ¨¡°Pay Adjustment.zip¡±µÄÍøÂç´¹ÂÚÓʼþ£¬£¬ÄÚº¬¶ñÒâLNKÎļþ£¬£¬µã»÷ºó´¥·¢Ò»ÏµÁвÙ×÷½«ÀÕË÷Èí¼þÖ²Èëϵͳ¡£¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±³Æ£¬£¬×Ô½ñÄê1ÔÂÒÔÀ´£¬£¬¸ÃÈí¼þÒÑѬȾ100ÃûÊܺ¦Õߣ¬£¬2Ô·Ý×î¶à£¬£¬Îª53ÈË£»£»×Ô2024Äê6ÔÂÒÔÀ´£¬£¬ÔÚ¿Í»§Öмì²âµ½173ÆðÏà¹ØÀÕË÷»î¶¯¡£¡£¡£¡£¡£¡£´ó¶¼Êܺ¦ÕßÀ´×ԿƼ¼¡¢ÖÆÔì¡¢½ÌÓýºÍ½»Í¨ÔËÊäÐÐÒµ¡£¡£¡£¡£¡£¡£Ð¹¥»÷ÖУ¬£¬¶ñÒâLNKÎļþÏÂÔØPowerShell¾ç±¾£¬£¬¼ìË÷ÀÕË÷Èí¼þÏÂÔØ³ÌÐò¼°¶à¸öÆäËû¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£¡£ÕâЩ¾ç±¾°üÀ¨ÍøÂçϵͳÐÅÏ¢¡¢ºáÏòÒÆ¶¯¹¤¾ß¼°·¿ª¶þάÂëµÄ¾ç±¾£¬£¬Êܺ¦Õß¿ÉÓøöþάÂëÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£³õʼPowerShell¾ç±¾»¹·¿ªÕþÖÎÖ÷ÌâYouTubeÊÓÆµ²¢°üÀ¨ÊéÃæÕþÖÎ̸ÂÛ¡£¡£¡£¡£¡£¡£³õʼÊê½ð֪ͨÌá¼°DOGE£¬£¬ÉõÖÁDOGEÊÂÇéÖ°Ô±£¬£¬ÒªÇóÊܺ¦ÕßÁгöÎåÏîʹÃü£¬£¬²»È»Ö§¸¶Ò»ÍòÒÚÃÀÔªÊê½ð¡£¡£¡£¡£¡£¡£ÍþвÕßÌåÏÖ£¬£¬ÈôÊܺ¦Õß½«¶ñÒâÈí¼þ·¢Ë͸øËûÈË£¬£¬¼´¿ÉÃ⺬»ìÃÜϵͳ¡£¡£¡£¡£¡£¡£FogÀÕË÷Èí¼þÊÇÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼Ò×壬£¬ÆóÒµ±ØÐ轫ÆäÌí¼Óµ½¼à¿ØÁбíÖС£¡£¡£¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/fog-hackers-doge-ransom-notes
2. RustoBot½©Ê¬ÍøÂçʹÓ÷ÓÉÆ÷Îó²î·¢¶¯¹¥»÷
4ÔÂ22ÈÕ£¬£¬FortiGuard Labs½üÆÚ·¢Ã÷RustoBot£¬£¬ÕâÒ»ÓÃRust±àдµÄÖØ´ó½©Ê¬ÍøÂçÕýʹÓÃTOTOLINKºÍDrayTek·ÓÉÆ÷Îó²î£¬£¬ÔÚÈÕ±¾¡¢Ì¨Íå¡¢Ô½ÄϺÍÄ«Î÷¸çµÄÊÖÒÕ»ù´¡ÉèÊ©ÖÐËÁŰ¡£¡£¡£¡£¡£¡£2025ÄêÍ·£¬£¬¹¥»÷ʵÑé¼±¾çÔöÌí£¬£¬Ä¿µÄÖ±Ö¸TOTOLINK cstecgi.cgi¾ç±¾Öеĺã¾ÃÎó²î£¬£¬ÕâЩÎó²îÉæ¼°ÉèÖøü¸ÄºÍÉí·ÝÑéÖ¤£¬£¬±£´æ¶à¸öÏÂÁî×¢Èëµã£¬£¬°üÀ¨CVE-2022-26210¡¢CVE-2022-26187ÒÔ¼°Ó°ÏìDrayTek·ÓÉÆ÷µÄCVE-2024-12987¡£¡£¡£¡£¡£¡£ÕâЩÈõµãʹ¹¥»÷Õß»ñµÃÔ¶³Ì´úÂëÖ´ÐÐÄÜÁ¦£¬£¬ÎªRustoBotѬȾÆÌƽõè¾¶¡£¡£¡£¡£¡£¡£Ò»µ©»ñµÃ³õʼ»á¼ûȨÏÞ£¬£¬RustoBot±ãͨ¹ýËĸöÏÂÔØ¾ç±¾Ö®Ò»¾ÙÐа²ÅÅ£¬£¬Ö§³Ö¶àÖּܹ¹£¬£¬È·±£ÓëÒ×Êܹ¥»÷µÄ·ÓÉÆ÷ÆÕ±é¼æÈÝ¡£¡£¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚʹÓÃRustÓïÑÔ£¬£¬¶þ½øÖƽṹͨ¹ýXOR¼ÓÃܺÍGOT²Ù×÷¾ÙÐлìÏý£¬£¬ÊµÏÖÒþÉíÐÔ£¬£¬²¢Ê¹ÄæÏò¹¤³ÌÖØ´ó»¯¡£¡£¡£¡£¡£¡£½âÃܺóµÄÉèÖÃÕ¹ÏÖ£¬£¬RustoBotÖ´ÐÐÁ½Ïî½¹µã¶ñÒâ²Ù×÷£ºÆÊÎö¶à¸öC2ÓòÃû£¬£¬²¢Æ¾Ö¤ÏÂÁîÌᳫDDoS¹¥»÷¡£¡£¡£¡£¡£¡£RustoBot»î¶¯ÒÑÓ°Ïì¶à¿îTOTOLINKºÍDrayTek·ÓÉÆ÷Ðͺţ¬£¬Êܺ¦ÕßÖ÷ҪλÓڿƼ¼ÁìÓò£¬£¬Åú×¢¹¥»÷¿ÉÄܾßÓÐÕë¶ÔÐÔ¡£¡£¡£¡£¡£¡£
https://securityonline.info/rustobot-botnet-exploits-router-flaws-in-sophisticated-attacks/
3. WordPress¹ã¸æÚ²Æ²å¼þÌìÌ챬·¢14ÒÚ¸ö¹ã¸æÇëÇó
4ÔÂ21ÈÕ£¬£¬¿ËÈÕ£¬£¬Ò»¸öÃûΪ¡°Scallywag¡±µÄ´ó¹æÄ£¹ã¸æÚ²Æ×éÖ¯¸¡³öË®Ãæ£¬£¬¸Ã×é֯ͨ¹ý¶¨ÖÆWordPress²å¼þ£¬£¬½«µÁ°æºÍURLËõ¶ÌÍøÕ¾Ç®±Ò»¯£¬£¬ÖðÈÕ±¬·¢ÊýÊ®ÒÚ¸öÚ²ÆÇëÇ󡣡£¡£¡£¡£¡£ScallywagÓÉ»úеÈ˺ÍڲƼì²â¹«Ë¾HUMAN·¢Ã÷£¬£¬Æä±³ºóÊÇÒ»¸öÓÉ407¸öÓòÃû×é³ÉµÄÖØ´óÍøÂ磬£¬ÖðÈÕÚ²Æ¹ã¸æÇëÇó·åÖµ¸ß´ï14ÒÚÌõ¡£¡£¡£¡£¡£¡£Ö»¹ÜHUMAN½ÓÄɲ½·¥Ê¹ScallywagÁ÷Á¿ïÔÌ95%£¬£¬µ«¸Ã×é֯ͨ¹ýÂÖ»»ÓòÃûºÍµ÷½âÇ®±Ò»¯Ä£Ê½Õ¹ÏÖ³öǿʢÈÍÐÔ¡£¡£¡£¡£¡£¡£Scallywag»ùÓÚËĸöWordPress²å¼þ¹¹½¨£¬£¬°üÀ¨Soralink¡¢Yu Idea¡¢WPSafeLinkºÍDroplink£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´Ó¸ßΣº¦¡¢µÍÖÊÁ¿ÍøÕ¾×¬Ç®µÄ;¾¶¡£¡£¡£¡£¡£¡£ÕâЩ²å¼þ½µµÍÁËDZÔÚÍþвÐÐΪÕߵĽøÈëÃż÷£¬£¬ÉõÖÁÓÐÈËÔÚYouTubeÉÏÐû²¼²Ù×÷½Ì³Ì¡£¡£¡£¡£¡£¡£Óû§»á¼ûµÁ°æÄ¿Â¼ÍøÕ¾Ê±£¬£¬µã»÷ǶÈëµÄURLËõ¶ÌÁ´½Ó£¬£¬»á±»Öض¨ÏòÖÁÖÐÐĹãÃÜ¸æ¼¯Ò³Ãæ£¬£¬ÎªScallywagÔËÓªÉ̱¬·¢Ú²ÆÐÔÓ¡Ï󣬣¬×îÖÕ½øÈëÔÊÐíÄÚÈݵÄÒ³Ãæ¡£¡£¡£¡£¡£¡£ÕâЩÖÐÐÄÍøÕ¾ÔËÐÐScallywag²å¼þ£¬£¬ÈÏÕæ´¦Öóͷ£Öض¨ÏòÂß¼¡¢¹ã¸æ¼ÓÔØµÈ£¬£¬ÒÔÔÚ¹ã¸æÆ½Ì¨¼ì²éÖÐαװ³ÉÕý³£²©¿Í¡£¡£¡£¡£¡£¡£HUMAN̫ͨ¹ýÎöÁ÷Á¿Ä£Ê½¼ì²âScallywag»î¶¯£¬£¬²¢Óë¹ã¸æÌṩÉÌÏàÖú×èÖ¹¶Ô¹ã¸æÇëÇóµÄ¾º±ê£¬£¬ÇÐ¶ÏÆäÊÕÈëȪԴ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/scallywag-ad-fraud-operation-generated-14-billion-ad-requests-per-day/
4. ÐÂÐͶñÒâÈí¼þResolverRATÍþвҽÁÆÓëÖÆÒ©ÐÐÒµ
4ÔÂ21ÈÕ£¬£¬MorphisecÍþвʵÑéÊÒ·¢Ã÷ÁËÒ»ÖÖÐÂÐÍÖØ´ó¶ñÒâÈí¼þResolverRAT£¬£¬¸Ã¶ñÒâÈí¼þÕýÆð¾¢Õë¶ÔÒ½ÁƱ£½¡ºÍÖÆÒ©ÐÐÒµÕö¿ª¹¥»÷£¬£¬×î½üÒ»²¨¹¥»÷¼¯ÖÐÔÚ2025Äê3ÔÂ10ÈÕ×óÓÒ¡£¡£¡£¡£¡£¡£ResolverRATÒÀ¸½ÆäÏȽøµÄÊÖÒÕÊֶΣ¬£¬ÈçÄÚ´æÖ´ÐС¢¶¯Ì¬×ÊÔ´´¦Öóͷ£¼°¶à²ã¹æ±ÜÊÖÒÕ£¬£¬Ê¹µÃ¹Å°å¼ì²âÒªÁìÄÑÒÔ×àЧ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÈö²¥£¬£¬Ê¹ÓýôÆÈ¸Ð»ò¿Ö¾å¸ÐÓÕµ¼ÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó£¬£¬½ø¶ø´¥·¢Ñ¬È¾Àú³Ì¡£¡£¡£¡£¡£¡£¹¥»÷¸ß¶ÈÍâµØ»¯£¬£¬Óʼþ½ÓÄÉÄ¿µÄ¹ú¼ÒĸÓï׫д£¬£¬Ö÷ÌâÉæ¼°Ö´·¨ÊÓ²ì»ò°æÈ¨ÇÖȨ£¬£¬Ö¼ÔÚͨ¹ý¸öÐÔ»¯¶¨Î»Ìá¸ßѬȾÀÖ³ÉÂÊ¡£¡£¡£¡£¡£¡£Ñ¬È¾Ê¼ÓÚDLL²àÔØÊÖÒÕ£¬£¬½«¶ñÒâDLLÎļþÓëÕýµ±³ÌÐò£¨Èç hpreader.exe£©Ò»Í¬°²ÅÅ£¬£¬µ±³ÌÐòÖ´ÐÐʱ£¬£¬¶ñÒâDLL±»ÇÄÇļÓÔØ£¬£¬´Ó¶øÆô¶¯¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ResolverRAT ½ÓÄɶà²ã¹æ±ÜÊÖÒÕ£¬£¬°üÀ¨´úÂë»ìÏýºÍ×Ô½ç˵ÐÒéÀ´»ìÏýÍøÂçÁ÷Á¿£¬£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐжñÒâ´úÂ룬£¬²¢ÔÚÔËÐÐʱ¶¯Ì¬Ê¶±ðºÍʹÓÃϵͳº¯Êý¡£¡£¡£¡£¡£¡£ÎªÈ·¼á³¤ÆÚÐÔ£¬£¬ResolverRAT ÔÚ Windows ×¢²á±íÖн¨Éè¶à¸öÌõÄ¿£¬£¬²¢ÔÚ¶à¸öλÖÃ×°ÖÃ×ÔÉí¸±±¾¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬Ëü»¹Ê¹ÓÃÆæÒìµÄÖ¤ÊéÑéÖ¤ÒªÁìºÍ¡°.NET ×ÊÔ´ÆÊÎöÆ÷Ð®ÖÆ¡±ÊÖÒÕÀ´ÒþÉí£¬£¬²¢ÊµÑé¶ÔÆÊÎöÇéÐξÙÐÐÖ¸ÎÆÊ¶±ð£¬£¬ÒÔÔÚ¼ì²âµ½±»¼ì²éʱ¸Ä±äÐÐΪ¡£¡£¡£¡£¡£¡£
https://hackread.com/native-language-phishing-resolverrat-healthcare/
5. Õ©Æ·Ö×Óð³äFBI IC3Ô±¹¤ÇÔÈ¡ÄúµÄ²ÆÎñÐÅÏ¢
4ÔÂ19ÈÕ£¬£¬¿ËÈÕ£¬£¬FBIÐû²¼Õ©Æ¾¯±¨£¬£¬Õ¹ÏÖÕ©Æ·Ö×ÓÕýð³äFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐÄ(IC3)Ö°Ô±£¬£¬ÒÔ×·»ØËðʧ×ʽðΪÓÕ¶ü£¬£¬ÇÔÈ¡Êܺ¦Õß²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£×Ô2023Äê12ÔÂÖÁ2025Äê2Ô£¬£¬FBIÒÑÊÕµ½100¶àÆðÏà¹Ø±¨¸æ¡£¡£¡£¡£¡£¡£Õ©ÆÕß³£Ãé×¼ÍøÂç½ðÈÚÕ©ÆÊܺ¦ÕßµÄÉç½»ÍøÂç»òÔÚÏßÂÛ̳£¬£¬ÓÐʱð³äÕæÊµÉí·Ý»òʹÓÃÐéαƾ֤¡£¡£¡£¡£¡£¡£ËùÓÐȦÌ×¾ùÉæ¼°ÒÔijÖÖÐÎʽ×ÊÖúÊܺ¦Õß×·»ØËðʧ£¬£¬Ö»¹Ü×î³õÁªÏµ·½·¨¸÷Ò죬£¬°üÀ¨µç×ÓÓʼþ¡¢µç»°¡¢É罻ýÌå»òÂÛ̳¡£¡£¡£¡£¡£¡£ÔÚijЩ°¸ÀýÖУ¬£¬Õ©ÆÕßÉõÖÁÉù³ÆÉ¥Ê§×ʽð¾ÍÔÚËûÃÇÊÖÖС£¡£¡£¡£¡£¡£ËûÃÇͨ¹ý½¨ÉèÐéαСÎÒ˽¼Ò×ÊÁÏ£¬£¬¼ÓÈëÔÚÏß½ðÈÚÕ©ÆÍŻ£¬²¢½¨ÒéÊܺ¦ÕßÁªÏµÃ°³äµÄIC3¡°Ê×ϯִÐй١±»ñÈ¡×ÊÖú¡£¡£¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÖмƣ¬£¬Õ©ÆÕß±ãÉù³ÆÒѻָ´×ʽ𣬣¬²¢½è´Ë»ñÈ¡Æä²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬ÕâЩÍýÏë²»µ«ÓÕÆºÍÕ©ÆÄ¿µÄ£¬£¬»¹Ê¹ËûÃÇÔٴγÉΪÊܺ¦Õß¡£¡£¡£¡£¡£¡£ÎªÌá·À´ËÀàÕ©Æ£¬£¬FBIÌáÐѹ«ÖÚ£¬£¬IC3¾ø²»»áͨ¹ýµç»°¡¢µç×ÓÓʼþ¡¢É罻ýÌåµÈÖ±½ÓÓëСÎÒ˽¼ÒÏàͬ£¬£¬Ò²²»»áÒªÇ󸶿îÀ´×·»ØËðʧ×ʽ𣬣¬¸ü²»»á½«Êܺ¦Õßת½é¸øÒªÇ󸶿îµÄ¹«Ë¾¡£¡£¡£¡£¡£¡£¹«ÖÚÓ¦Ìá¸ßСÐÄ£¬£¬ÇÐÎðÓë½öÔÚÍøÉÏ»òµç»°ÖÐÊìϤµÄÈË·ÖÏíÃô¸ÐÐÅÏ¢»ò·¢ËÍÇ®²Æ¡£¡£¡£¡£¡£¡£ÈçÐè¾Ù±¨ÍøÂçڲƣ¬£¬¿É»á¼ûFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐĹÙÍø¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/fbi-alert-ic3-impersonation-scam-recover-lost-funds-steal-financial-info/
6. ºÚ¿ÍʹÓÃGoogleϵͳÈõµãʵÑéDKIMÖØ·ÅÍøÂç´¹ÂÚ¹¥»÷
4ÔÂ20ÈÕ£¬£¬¿ËÈÕ£¬£¬ºÚ¿ÍʹÓÃGoogleϵͳÈõµã£¬£¬ÌᳫÁËÒ»³¡ÇÉÃîµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÒ»·â¿´ËÆÀ´×Ô¡°no-reply@google.com¡±µÄÐéαµç×ÓÓʼþ£¬£¬ÀÖ³ÉÈÆ¹ýËùÓÐÑéÖ¤£¬£¬Ö¸ÏòÒ»¸öÍøÂçµÇ¼ÐÅÏ¢µÄÚ²ÆÒ³Ãæ¡£¡£¡£¡£¡£¡£¸ÃÓʼþ²»µ«Í¨¹ýÁËDKIMÉí·ÝÑéÖ¤£¬£¬ÇÒÄÚÈÝÏÕЩÓë¹È¸è¹Ù·½Çå¾²¾¯±¨ÎÞÒ죬£¬¼«Ò×ÓÕÆÊÖÒÕˮƽ½ÏµÍµÄÓû§¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ENSÊ×ϯ¿ª·¢Ö°Ô±Äá¿Ë¡¤Ô¼º²Ñ·ÃôÈñµØ·¢Ã÷£¬£¬Ðéα֧³ÖÃÅ»§ÍйÜÔÚsites.google.comÉÏ£¬£¬¶ø·ÇÕæÕýµÄaccounts.google.com£¬£¬´Ó¶øÊ¶ÆÆÁËȦÌס£¡£¡£¡£¡£¡£¹¥»÷ÕßÇÉÃîµØ×¢²áÁËÒ»¸öÓòÃû£¬£¬²¢ÒÔ¡°me@domain¡±½¨ÉèGoogleÕÊ»§£¬£¬Ëæºó½¨ÉèÁËÒ»¸öGoogle OAuthÓ¦Ó㬣¬½«´¹ÂÚÓʼþÃüÃûΪ¸ÃÓ¦Óᣡ£¡£¡£¡£¡£µ±¹¥»÷ÕßÊÚÓèÆäOAuthÓ¦Óûá¼ûGoogle WorkspaceÖеç×ÓÓʼþµØµãµÄȨÏÞʱ£¬£¬Google×Ô¶¯·¢ËÍÁËÇå¾²¾¯±¨£¬£¬¸Ã¾¯±¨ÒòʹÓÃÓÐÓõÄDKIMÃÜÔ¿ÊðÃû¶øÍ¨¹ýÁËËùÓмì²é¡£¡£¡£¡£¡£¡£¹¥»÷ÕßËæºó½«Çå¾²¾¯±¨×ª·¢¸øÊܺ¦Õߣ¬£¬Ê¹Æä¿´ÆðÀ´ÏñÊÇÀ´×ԹȸèµÄÕýµ±Óʼþ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËGoogleϵͳµÄÈõµã£¬£¬¼´DKIM½ö¼ì²éÓʼþÕýÎĺÍÓʼþÍ·£¬£¬¶ø²»¼ì²éÐŷ⣬£¬Ê¹µÃαÔìÓʼþÄܹ»Í¨¹ýÊðÃûÑéÖ¤¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬¹È¸èÒÑÊìϤµ½OAuthµÄÈõµã£¬£¬²¢ÕýÔÚÆð¾¢ÐÞ¸´¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/