MOVEitÎó²îÖÂÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬£¬Nam3L3ss×éÖ¯ÆØ¹âÊý°ÙÍòÔ±¹¤¼Í¼

Ðû²¼Ê±¼ä 2024-12-05

1. MOVEitÎó²îÖÂÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬£¬Nam3L3ss×éÖ¯ÆØ¹âÊý°ÙÍòÔ±¹¤¼Í¼


12ÔÂ3ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬Ò»ÆðÉæ¼°MOVEitÎļþ´«Ê乤¾ßµÄÇå¾²Îó²îÊÂÎñÒý·¢ÁËÆÕ±é¹Ø×¢¡£¡£¡£¸ÃÎó²î±»Cl0pÀÕË÷²¡¶¾ÍÅ»ïʹÓà £¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊýǧ¼Ò¹«Ë¾µÄÃô¸ÐÊý¾Ý±»µÁ £¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨À´×Ô27¼ÒÖÁ¹«Ë¾µÄÁè¼Ý760,000·ÝÔ±¹¤¼Í¼ £¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÖÙÁ¿ÁªÐй«Ë¾(JLL.com)µÄ1200ÍòÐÐÊý¾Ý £¬£¬£¬£¬£¬£¬£¬£¬×ÜÊýµÖ´ï1312ÍòÌõ¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢µØµãºÍ¹«Ë¾Î»ÖÃ×ø±êµÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬£¬±»Ð¹Â¶ºó¿ÉÄܻᱻÓÃÓÚÉç»á¹¤³Ì¹¥»÷¡¢Éí·Ý͵ÇÔ»òÍøÂç´¹ÂÚÕ©Æ­µÈ¶ñÒâÐÐΪ¡£¡£¡£Ð¹Â¶Êý¾ÝµÄ×éÖ¯Nam3L3ss×Գơ°Êý¾ÝÒåÓ¾ü¡± £¬£¬£¬£¬£¬£¬£¬£¬ÔÚºÚ¿ÍÂÛ̳BreachForumsÉÏÐû²¼ÁËÕâЩÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬£¬²¢Éù³ÆÊÇ´ÓMOVEitÎó²îÖлñµÃµÄÊý¾Ý¡£¡£¡£´Ë´ÎйÃÜÊÂÎñÉæ¼°µÄ¹«Ë¾°üÀ¨ÃÀ¹úÒøÐС¢Åµ»ùÑÇ¡¢Ä¦¸ùÊ¿µ¤ÀûµÈÐÐÒµ¾ÞÍ· £¬£¬£¬£¬£¬£¬£¬£¬×ÜÊýµÖ´ï½ü1ÒÚСÎÒ˽¼Ò¡£¡£¡£ËäÈ»Nam3L3ssµÄÄîÍ·Éв»Ã÷È· £¬£¬£¬£¬£¬£¬£¬£¬µ«ËûÃǵÄÐÐΪÎÞÒÉ̻¶ÁËMOVEitÎó²îµÄÖØ´óÓ°ÏìÒÔ¼°±»µÁÔ±¹¤Êý¾Ý´øÀ´µÄΣº¦¡£¡£¡£ÊÜÓ°Ï칫˾µÄÔ±¹¤Ó¦¼á³ÖСÐÄ £¬£¬£¬£¬£¬£¬£¬£¬ÒÔ·ÀÍøÂç´¹Âڵȹ¥»÷¡£¡£¡£


https://hackread.com/data-vigilante-leaks-772k-employee-record-database/


2. KimsukyʹÓô¹ÂÚÓʼþ¾ÙÐÐÆ¾Ö¤ÇÔÈ¡ £¬£¬£¬£¬£¬£¬£¬£¬ÀÄÓöíÂÞ˹·¢¼þÈ˵صã


12ÔÂ3ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬Ó볯ÏʽáÃ˵ÄÍþвÐÐΪÕßKimsuky £¬£¬£¬£¬£¬£¬£¬£¬±»Ö¸ÓëһϵÁÐÍøÂç´¹ÂÚ¹¥»÷ÓйØÁª¡£¡£¡£ÕâЩ¹¥»÷Ö÷Ҫͨ¹ý·¢ËÍÔ´×Ô¶íÂÞ˹·¢¼þÈ˵صãµÄµç×ÓÓʼþ¾ÙÐÐ £¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡƾ֤¡£¡£¡£¾Ýº«¹úÍøÂçÇå¾²¹«Ë¾GeniansÊÓ²ì £¬£¬£¬£¬£¬£¬£¬£¬´¹ÂÚÓʼþ×î³õÖ÷Ҫͨ¹ýÈÕ±¾ºÍº«¹úµÄµç×ÓÓʼþЧÀÍ·¢ËÍ £¬£¬£¬£¬£¬£¬£¬£¬µ«´Ó9ÔÂÖÐÑ®×îÏÈ £¬£¬£¬£¬£¬£¬£¬£¬Î±×°³ÉÀ´×Ô¶íÂÞ˹µÄ´¹ÂÚÓʼþÖð½¥Ôö¶à £¬£¬£¬£¬£¬£¬£¬£¬ÀÄÓÃVKµÄMail.ruµç×ÓÓʼþЧÀÍ £¬£¬£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÖ§³ÖÎå¸öÌåÃûÓò¡£¡£¡£Kimsuky¹¥»÷ÕßʹÓÃÕâЩ·¢¼þÈËÓòαװ³É½ðÈÚ»ú¹¹ºÍ»¥ÁªÍøÃÅ»§ÍøÕ¾ £¬£¬£¬£¬£¬£¬£¬£¬ÈçNaver £¬£¬£¬£¬£¬£¬£¬£¬¾ÙÐÐÍøÂç´¹Âڻ¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬£¬»¹·¢ËÍÄ£ÄâNaver MYBOXÔÆ´æ´¢Ð§À͵ÄÐÂÎÅ £¬£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§µã»÷Á´½Ó £¬£¬£¬£¬£¬£¬£¬£¬Éù³ÆÔÚÆäÕÊ»§Öмì²âµ½¶ñÒâÎļþ²¢ÐèҪɾ³ý £¬£¬£¬£¬£¬£¬£¬£¬ÒÔ´ËÓÕÆ­Óû§¡£¡£¡£ÕâЩÐÂÎÅËäÈ»ÍâòÉÏÊÇ´ÓÌØ¶¨ÓòÃû·¢Ë굀 £¬£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÊÇʹÓÃÊÜѬȾµÄµç×ÓÓʼþЧÀÍÆ÷·¢Ë͵ġ£¡£¡£Kimsuky»¹ÉÆÓÚʹÓÃÕýµ±µç×ÓÓʼþ¹¤¾ßÈçPHPMailerºÍStar £¬£¬£¬£¬£¬£¬£¬£¬ÒÔÌÓ±ÜÇå¾²¼ì²é¡£¡£¡£ÕâЩ¹¥»÷µÄ×îÖÕÄ¿µÄÊÇÆ¾Ö¤ÍµÇÔ £¬£¬£¬£¬£¬£¬£¬£¬½ø¶øÐ®ÖÆÊܺ¦ÕßÕË»§ £¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃËüÃÇ¶ÔÆäËûÔ±¹¤»òÊìÈËÌᳫºóÐø¹¥»÷¡£¡£¡£


https://thehackernews.com/2024/12/north-korean-kimsuky-hackers-use.html


3. Å·¾¯µ·»Ù¼ÓÃÜ·¸·¨Æ½Ì¨MATRIX £¬£¬£¬£¬£¬£¬£¬£¬½É»ñ´ó×Ú²»·¨×ʲú


12ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬Å·ÖÞÐ̾¯×éÖ¯Ðû²¼ £¬£¬£¬£¬£¬£¬£¬£¬·¨¹úºÍºÉÀ¼Ö´·¨²¿·ÖÒѵ·»ÙÓë¹ú¼Ê··¶¾¡¢ÎäÆ÷··Ô˺ÍÏ´Ç®µÈÑÏÖØ·¸·¨ÓйصÄÃûΪMATRIXµÄ¼ÓÃÜÐÅϢЧÀÍ¡£¡£¡£¸Ãƽ̨×î³õÓɺÉÀ¼Õþ¸®ÔÚÒ»Ãû×ï·¸ÊÖ»úÖз¢Ã÷ £¬£¬£¬£¬£¬£¬£¬£¬ÓµÓнü8000ÃûÓû§ £¬£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍÆ÷±é²¼¶à¸ö¹ú¼Ò £¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÔڵ¹úºÍ·¨¹ú¡£¡£¡£¾¯·½ÔÚÈý¸öÔµÄÊÓ²ìÖнػñ²¢ÆÆÒëÁË230¶àÍòÌõÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¹ú¼ÊÐж¯ÖдݻÙÁËЧÀÍÆ÷ £¬£¬£¬£¬£¬£¬£¬£¬¾Ð²¶ÁËÈýÃûÏÓÒÉÈË £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Æ½Ì¨µÄÏÓÒÉËùÓÐÕߺÍÔËÓªÉÌ¡£¡£¡£MATRIXÓµÓÐÖØ´óµÄ»ù´¡ÉèÊ© £¬£¬£¬£¬£¬£¬£¬£¬Ìṩ¼ÓÃÜÐÂÎÅת´ï¡¢Ç徲ͨ»°¡¢ÊÓÆµºÍÓïÒô¹²ÏíÒÔ¼°ÄäÃûÍøÒ³ä¯ÀÀµÈЧÀÍ £¬£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÍÆ³öÁ˶IJ©Ó¦ÓóÌÐòºÍÇ®±Ò¡£¡£¡£Å·ÖÞÐ̾¯×éÖ¯ÌåÏÖ £¬£¬£¬£¬£¬£¬£¬£¬MATRIX±È֮ǰ±»È¡µÞµÄSky ECCºÍEncroChatµÈƽ̨¸üÎªÖØ´ó £¬£¬£¬£¬£¬£¬£¬£¬Óû§Ö»ÄÜͨ¹ýÔ¼Çë¼ÓÈë¡£¡£¡£¾¯·½½«¼ÌÐøÊÓ²ìÓë¸Ãƽ̨Ïà¹ØµÄ·¸·¨»î¶¯¡£¡£¡£


https://therecord.media/matrix-criminal-encrypted-chat-platform-takedown-police


4. CISA½«Èý¸öÎó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼


12ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ¸üÐÂÁËÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ £¬£¬£¬£¬£¬£¬£¬£¬ÐÂÔöÁËÈý¸öÎó²î £¬£¬£¬£¬£¬£¬£¬£¬»®·ÖÊÇProjectSendµÄÉí·ÝÑéÖ¤²»µ±Îó²î£¨CVE-2024-11680£©¡¢North Grid ProselfµÄXMLÍⲿʵÌ壨XEE£©ÒýÓÃÎó²î£¨CVE-2023-45727£©ÒÔ¼°Zyxel¶à·À»ðǽµÄ·¾¶±éÀúÎó²î£¨CVE-2024-11667£©¡£¡£¡£ÆäÖÐ £¬£¬£¬£¬£¬£¬£¬£¬ProselfµÄÎó²îÔÊÐíδ¾­ÊÚȨµÄ¹¥»÷Õß¶ÁȡЧÀÍÆ÷Îļþ £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÕË»§Êý¾Ý£»£»£»£»ProjectSendµÄÎó²îÔòÓ°Ïìr1720֮ǰµÄ°æ±¾ £¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´Ëδ¾­ÊÚȨÐÞ¸ÄÓ¦ÓÃÉèÖà £¬£¬£¬£¬£¬£¬£¬£¬½¨ÉèÕË»§ £¬£¬£¬£¬£¬£¬£¬£¬ÉÏ´«¶ñÒâÈí¼þ£»£»£»£»¶øZyxelµÄÎó²îÔò¿ÉÄÜÈù¥»÷Õßͨ¹ýÈ«ÐÄÉè¼ÆµÄURLÏÂÔØ»òÉÏ´«Îļþ¡£¡£¡£¾ÝVulnCheckÑо¿Ö°Ô±³Æ £¬£¬£¬£¬£¬£¬£¬£¬ProjectSendµÄÎó²îËÆºõÒѱ»Ò°Íâ¹¥»÷ÕßʹÓà £¬£¬£¬£¬£¬£¬£¬£¬ÇÒ¹¥»÷ÕßÒѽÓÄÉһϵÁÐÐж¯ £¬£¬£¬£¬£¬£¬£¬£¬Èç¸ü¸ÄµÇÂ¼Ò³ÃæÎÊÌâ £¬£¬£¬£¬£¬£¬£¬£¬ÆôÓÃÓû§×¢²áÒÔ»ñÈ¡Éí·ÝÑéÖ¤ºóµÄ»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÉÏ´«Webshell¡£¡£¡£CISAÒÑÒªÇóÁª°î»ú¹¹ÔÚ2024Äê12ÔÂ24ÈÕ֮ǰÐÞ¸´ÕâЩÎó²î £¬£¬£¬£¬£¬£¬£¬£¬²¢½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î £¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»¤ÍøÂçÃâÊܹ¥»÷¡£¡£¡£


https://securityaffairs.com/171638/security/u-s-cisa-adds-projectsend-north-grid-proself-and-zyxel-firewalls-bugs-to-its-known-exploited-vulnerabilities-catalog.html


5. DroidBot£ºÐÂÐÍAndroidÒøÐжñÒâÈí¼þÇÔÈ¡¶à¹ú¼ÓÃÜÇ®±Ò¼°ÒøÐÐÆ¾Ö¤


12ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬DroidBotÊÇÒ»ÖÖÐÂÐÍAndroidÒøÐжñÒâÈí¼þ £¬£¬£¬£¬£¬£¬£¬£¬×Ô2024Äê6ÔÂÆð»îÔ¾ £¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©ÐÎʽÔËÓª £¬£¬£¬£¬£¬£¬£¬£¬Ã¿ÔÂÊÛ¼Û3000ÃÀÔª¡£¡£¡£ËüÊÔͼÇÔȡӢ¹ú¡¢Òâ´óÀû¡¢·¨¹ú¡¢Î÷°àÑÀ¡¢ÆÏÌÑÑÀµÈ¹úµÄ77¶à¸ö¼ÓÃÜÇ®±ÒÉúÒâËùºÍÒøÐÐÓ¦ÓÃµÄÆ¾Ö¤¡£¡£¡£Ö»¹Ü¹¦Ð§²¢²»ÐÂÓ±ÖØ´ó £¬£¬£¬£¬£¬£¬£¬£¬µ«DroidBotÔÚÓ¢¹ú¡¢Òâ´óÀû¡¢·¨¹ú¡¢ÍÁ¶úÆäºÍµÂ¹úÒÑÔì³É776ÆðÆæÒìѬȾ £¬£¬£¬£¬£¬£¬£¬£¬ÏÔʾÆä¸ß¶È»îÔ¾¡£¡£¡£´Ë¶ñÒâÈí¼þÕý¶¦Á¦´ó¾Ù¿ª·¢ÖÐ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼÀ©Õ¹ÖÁеØÇø £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨À­¶¡ÃÀÖÞ¡£¡£¡£DroidBotÓÉÍÁ¶úÆä¿ª·¢Õß½¨Éè £¬£¬£¬£¬£¬£¬£¬£¬ÎªÍ¬Ã˳ÉÔ±Ìṩ¶ñÒâÈí¼þ¹¹½¨Æ÷¡¢ÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷¼°ÖÐÑëÖÎÀíÃæ°åµÈ¹¤¾ß £¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÍøÂç·¸·¨·Ö×ÓÒ×ÓÚʹÓᣡ£¡£Ëü³£Î±×°³ÉGoogle Chrome¡¢Google PlayÊÐËÁ»òAndroidÇå¾²ÖÐÐÄ £¬£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§×°Öà £¬£¬£¬£¬£¬£¬£¬£¬³äµ±Ä¾Âí½ÇÉ«ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£Ö÷ÒªÌØÕ÷°üÀ¨¼üÅ̼ͼ¡¢ÁýÕÖÕýµ±ÒøÐÐÓ¦ÓýçÃæÏÔʾÐéαµÇÂ¼Ò³Ãæ¡¢¶ÌÐÅ×èµ²ºÍVNCÄ £¿£¿£¿£¿£¿£¿£¿£¿é¡£¡£¡£Ëü»¹ÀÄÓÃAndroid¸¨Öú¹¦Ð§Ð§ÀÍ¼à¿ØÓû§²Ù×÷¡£¡£¡£ÎªÁ˼õÇáÍþв £¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéAndroidÓû§½ö´ÓGoogle PlayÏÂÔØÓ¦Óà £¬£¬£¬£¬£¬£¬£¬£¬×Ðϸ¼ì²éȨÏÞÇëÇó £¬£¬£¬£¬£¬£¬£¬£¬²¢È·±£Play Protect´¦Óڻ״̬¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-droidbot-android-malware-targets-77-banking-crypto-apps/


6. BT¼¯ÍÅÔâBlack BastaÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬²¿·ÖЧÀÍÆ÷ÒѹرÕ


12ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬¿ç¹úµçОÞÍ·BT¼¯ÍÅ£¨Ç°ÉíΪӢ¹úµçÐÅ£©È·ÈÏÆäBT¾Û»áÓªÒµ²¿·ÖÔÚÔâÊÜBlack BastaÀÕË÷Èí¼þ¹¥»÷ºó £¬£¬£¬£¬£¬£¬£¬£¬Òѹرղ¿·ÖЧÀÍÆ÷¡£¡£¡£Ö»¹Ü´Ë´ÎÇå¾²ÊÂÎñδӰÏìBT¼¯ÍŵÄÔËÓª»òBT¾Û»áЧÀÍ £¬£¬£¬£¬£¬£¬£¬£¬µ«Black BastaÍÅ»ïÉù³ÆÒÑÈëÇָù«Ë¾Ð§ÀÍÆ÷²¢ÇÔÈ¡500GBÊý¾Ý £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨²ÆÎñ¡¢×éÖ¯¡¢Óû§Êý¾ÝºÍСÎÒ˽¼ÒÎĵµµÈ¡£¡£¡£¸ÃÍŻﻹÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏÌí¼ÓÁ˵¹¼ÆÊ± £¬£¬£¬£¬£¬£¬£¬£¬Éù³Æ½«ÓÚÏÂÖÜй¶¾Ý³Æ±»µÁµÄÊý¾Ý¡£¡£¡£BT¼¯ÕûÌåÏÖ½«¼ÌÐøÆð¾¢ÊÓ²ì´ËÊ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÓëÏà¹Ø»ú¹¹ÏàÖúÓ¦¶Ô¡£¡£¡£Black BastaÀÕË÷Èí¼þÐж¯×Ô2022Äê4ÔÂÒÔÀ´ÒÑÔì³ÉÐí¶à×ÅÃûÊܺ¦Õß £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ò½ÁƱ£½¡¹«Ë¾¡¢Õþ¸®³Ð°üÉÌµÈ £¬£¬£¬£¬£¬£¬£¬£¬Æä·ÖÖ§»ú¹¹ÒÑÈëÇÖ500¶à¸ö×éÖ¯ £¬£¬£¬£¬£¬£¬£¬£¬²¢´Ó90¶àÃûÊܺ¦ÕßÊÖÖÐÊÕÈ¡ÖÁÉÙ1ÒÚÃÀÔªµÄÊê½ð¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bt-conferencing-division-took-servers-offline-after-black-basta-ransomware-attack/