NPDÒòÊý¾Ýй¶ÉêÇëÆƲú£¬ÃæÁٶ෽ËßËÏ
Ðû²¼Ê±¼ä 2024-10-141. NPDÒòÊý¾Ýй¶ÉêÇëÆƲú£¬ÃæÁٶ෽ËßËÏ
10ÔÂ12ÈÕ£¬ÃÀ¹ú¹ú¼Ò¹«¹²Êý¾Ý¹«Ë¾£¨NPD£©£¬×÷ΪÃÀ¹ú×î´óµÄÅä¾°ÊӲ칫˾֮һ£¬½üÆÚÒòÔâÊܺڿ͹¥»÷²¢Ð¹Â¶ÊýÒÚÈËÊý¾Ý¶øÏÝÈëÖØÖØÀ§¾³£¬×îÖÕÓÚ10ÔÂ2ÈÕÓÉĸ¹«Ë¾Jerico PicturesÏò·ðÂÞÀï´ïÖÝÄÏÇø·¨ÔºÉêÇëÆƲú¡£ºÚ¿ÍÓÚ2023Äê12ÔÂÈëÇÖNPDϵͳ£¬²¢ÓÚ½ñÄê4ÔÂÔÚBreachedºÚ¿Í·¸×ïÊг¡ÖÐÊ״ηºÆðÏà¹ØÊý¾Ý£¬ºÚ¿ÍUSDoDÉù³Æ¶Ô´ËÂôÁ¦£¬²¢ìÅÒ«ÆäÔÚÈëÇÖFBI¡¢¿Õ¿ÍµÈ»ú¹¹·½ÃæµÄ³É¾Í¡£6Ô£¬USDoDÊÔͼÒÔ350ÍòÃÀÔª³öÊÛ°üÂÞ29ÒÚÌõÃÀ¹ú¹«Ãñ¼Ç¼µÄ±»µÁÊý¾Ý£»7Ô£¬ÁíÒ»ºÚ¿ÍFeniceÔÚBreachForumsÉÏÃâ·ÑÐû²¼ÁËÒ»¸ö°üÂÞ27ÒÚÌõ¼Ç¼µÄÊý¾Ý¿â¡£Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢Éç»áÄþ¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢£¬ÍøÂçÄþ¾²×¨¼Ò֤ʵ´ó²¿ÃÅÐÅϢ׼ȷ¡£NPDËäÌåÏÖÒÑÅäºÏÖ´·¨²¿ÃÅÊӲ죬µ«Î´Ìṩ×îнøÕ¹£¬Ò²Î´ÎªÊܺ¦ÕßÌṩ±£»¤·þÎñ¡£¹«Ë¾ÆƲúÉêÃ÷Ö¸³ö£¬ÒòÎÞ·¨·¢Éú×ã¹»ÊÕÈë½â¾öDZÔÚÇ·Õ®¼°¸ºµ£Ïà¹ØÓöȣ¬¼ÓÖ®Ò½ÁÆ»ú¹¹µÈ¿Í»§½ûÖ¹ÓÐÅä¾°ÎÊÌâµÄÆóÒµÌṩ·þÎñ£¬¹«Ë¾ÏÝÈë¾ø¾³¡£´ËÍ⣬NPD»¹ÃæÁÙ¶àÆð¼¯ÌåËßËϼ°À´×Ô20¶à¸öÖÝ×ܼì²ì³¤ÒªÇóÖ§¸¶ÃñÊ·£¿îµÄѹÁ¦£¬ÃÀ¹úÁª°îóÒ×ίԱ»áÒ²ÔÚÉó²é´ËÊ¡£
https://therecord.media/national-public-data-bankruptcy-cyberattack?__cf_chl_rt_tk=GF.IqF4I1q4XLxFQViMGflsJ0gqSiczsmGeWUI2MOhE-1728699076-1.0.1.1-n6A6vfbEhmIy5OoZy.Ikdg9MFhV1brh0Rte3ceh4Gg8
2. DarkVision RAT£ºÍøÂç·¸×ï·Ö×ÓµÄÇ¿´ó¶à¹¦Ð§¹¤¾ß¼°Æä¼¼ÊõÑݱä
10ÔÂ13ÈÕ£¬DarkVision RATÊÇÒ»Öֵͳɱ¾ÇÒ¹¦Ð§Ç¿´óµÄÔ¶³Ì·ÃÎÊľÂí£¨RAT£©£¬×Ô2020ÄêÊ״ηºÆðÒÔÀ´£¬ÒòÆä¸ß¶È¿É¶¨ÖÆÐÔºÍÔÚHack ForumsµÈÍøÕ¾ÉÏÒÔµÍÖÁ60ÃÀÔªµÄ¼Û¸ñ³öÊÛ£¬¶øÔÚÍøÂç·¸×ï·Ö×ÓÖÐѸËÙÁ÷ÐС£¸ÃRAT¾ß±¸¶àÖÖ¹¦Ð§£¬°üÂÞ¼üÅ̼Ǽ¡¢Îļþ²Ù×÷¡¢½ø³Ì×¢Èë¡¢ÃÜÂëÇÔÈ¡ºÍÔ¶³Ì´úÂëÖ´ÐУ¬³ÉΪ¹¥»÷ÕßÈëÇÖϵͳºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÈÈÃŹ¤¾ß¡£×î½ü£¬ThreatLabzÊӲ쵽DarkVisionÓëÁíÒ»¿î¶ñÒâÈí¼þPureCrypterÒ»ÆðÔÚлÖÐÁ÷´«¡£DarkVision RATʹÓÃ×Ô½ç˵ÍøÂçÐÒéÓëÃüÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷ͨÐÅ£¬½ÓÊÕÃüÁî²¢ÇÔÈ¡Êý¾Ý¡£ÆäÌӱܼÆı°üÂÞDLL½Ù³Ö¡¢½ø³Ì×¢ÈëºÍ×Ô¶¯ÌáÉý¼¼Êõ£¬ÒÔÈƹýÄþ¾²·ÀÓù²¢»ñµÃÌáÉýȨÏÞ¡£´ËÍ⣬¸ÃRAT»¹Ê¹ÓÃWindows DefenderÅųýºÍ¶àÖÖ³Ö¾ÃÐÔ»úÖÆÀ´ÖÆÖ¹¼ì²âºÍ±£³Ö»î¶¯×´Ì¬£¬È罫½Å±¾·ÅÖÃÔÚWindowsÆô¶¯Îļþ¼ÐÖС¢Ê¹ÓÃ×Ô¶¯ÔËÐÐ×¢²á±íÏîÒÔ¼°Í¨¹ýÈÎÎñ¼Æ»®·¨Ê½²¿ÊðÈÎÎñ¡£DarkVision RATµÄ¸ß¶ÈÊÊÓ¦ÐÔÌåÏÖÔÚÆä±êÖ¾ÔÊÐí¹¥»÷ÕßÑ¡ÔñʹÓÃÄÄÖÖ³Ö¾ÃÐÔÒªÁ죬ÄÑÒÔ¼ì²â¡£¸ÃRAT»¹Ö§³ÖÖÖÖÖÃüÁͨ¹ý²å¼þʵÏÖ¸ü¶à¶ñÒ⹦Ч£¬È粶׽°´¼ü¡¢ÍøÂçÉãÏñÍ·¾µÍ·¡¢Â¼ÒôºÍÀûÓÃϵͳ½ø³Ì¡£
https://securityonline.info/darkvision-rat-the-60-malware-threatening-your-data/
3. Game FreakÔâÓö¡°Teraleak¡±Êý¾Ýй¶£¬½ü1TBÃô¸ÐPok¨¦monÊý¾ÝÍâй
10ÔÂ13ÈÕ£¬¿Ú´üÑý¹ÖϵÁÐÓÎÏ·µÄ¿ª·¢ÉÌGame Freak£¬½üÆÚÔâÓöÁ˱»³ÆΪ¡°Teraleak¡±µÄ´ó¹æÄ£Êý¾Ýй¶Ê¼þ£¬µ¼Ö½ü1TBµÄÃô¸ÐÊý¾ÝÍâй£¬Ó°ÏìÁË2,606ÃûÔ±¹¤ºÍ³Ð°üÉÌ¡£Ð¹Â¶ÄÚÈÝ°üÂÞÔ´´úÂ롢ȡÏûµÄÓÎÏ·¡¢¿´·¨Í¼¡¢Î´Ðû²¼µÄÏîÄ¿µÈ£¬Ê±¼ä¿ç¶È´Ó25ÄêÇ°µÄÄÚ²¿Îļþµ½¼´½«ÍƳöµÄÐÂÓÎÏ·¡£Ð¹Â¶µÄÊý¾Ý×î³õÔÚÉ罻ýÌåºÍÂÛ̳Èçr/PokeLeaksÉÏÁ÷´«£¬Éæ¼°µÄÖÊÁÏ°üÂÞ¿Ú´üÑý¹ÖÉè¼Æ¡¢¶¯ÂþÉè¼ÆÎĵµ¡¢Î´Ê¹Óõľ«Á鱦¿ÉÃÎÉè¼Æ¡¢Ó°Ï·Ðø¼¯Ðû´«Æ¬ÒÔ¼°ÈÎÌìÌÃSwitch 2µÄ¼¼ÊõÑÝʾµÈ¡£ËäȻйÃÜÕßÁгöµÄÄÚÈÝ°üÂÞÕæ¼ÙÄѱæµÄÎļþ£¬µ«Òªº¦ÎļþÈ硶¾«Á鱦¿ÉÃκÚ2/°×2¡·µÄ¿ª·¢°æ±¾¡¢¡¶¾«Á鱦¿ÉÃÎÒøÐС·µÄÔ´´úÂëµÈÒѱ»È·ÈÏ¡£´Ë´Î鶻¹½ÒʾÁËGame Freak¶à¸öÏîÄ¿µÄ´úºÅ£¬°üÂÞÓëILCAÅäºÏ¿ª·¢µÄδÐû²¼¶àÈËÓÎÏ·¡°Synapse¡±µÈ¡£Ä¿Ç°£¬ºÚ¿Í¼°Æ䶯»úÉв»Çå³þ£¬µ«´Ë´ÎйÃÜ¿ÉÄÜÊÇÓÎÏ·Ê·ÉÏ×î´óµÄйÃÜʼþÖ®Ò»£¬Game FreakÔ¤¼Æ½«ÃæÁÙ½øÒ»²½µÄºó¹û£¬¶øÈ«ÃæÓ°ÏìÉдýÍêÈ«Á˽⡣
https://hackread.com/teraleak-pokemon-developer-game-freak-hacked-data-leak/
4. ÒÁÀʺڿÍ×éÖ¯OilRig¼Ó´ó¶ÔÖж«¹¥»÷£¬ÀûÓÃкóÃÅÇÔȡƾ¾Ý
10ÔÂ13ÈÕ£¬ÒÁÀÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT34£¨OilRig£©½üÆÚÕë¶Ô°¢À²®ÁªºÏÇõ³¤¹úºÍº£ÍåµØÓòµÄÕþ¸®ºÍÒªº¦»ù´¡ÉèʩʵÌåÌᳫÁËÐµĹ¥»÷»î¶¯¡£ÔÚÕâЩ¹¥»÷ÖУ¬OilRig²¿ÊðÁËÒ»¸öÐÂÐͺóÃÅ£¬ÀûÓÃMicrosoft Exchange·þÎñÆ÷ÇÔȡƾ¾Ý£¬²¢½èÖúWindows CVE-2024-30088©¶´ÌáÉýȨÏÞ¡£¸Ã©¶´ËäÒѱ»Î¢ÈíÐÞ¸´£¬µ«ÉÐδ±»±ê־ΪÕýÔÚ±»»ý¼«ÀûÓ᣹¥»÷Õßͨ¹ýÉÏ´«Web shellÖ´ÐÐÔ¶³Ì´úÂëºÍPowerShellÃüÁ½ø¶øÀûÓÃCVE-2024-30088©¶´£¬×¢²áÃÜÂë¹ýÂËÆ÷DLLÀ¹½Øƾ¾Ý£¬²¢ÏÂÔØÔ¶³Ì¼à¿ØºÍ¹ÜÀí¹¤¾ß¡°ngrok¡±¡£´ËÍ⣬OilRig»¹ÀûÓÃÃûΪ¡°StealHook¡±µÄкóÃÅÇÔȡƾ¾Ý£¬²¢Í¨¹ýÕþ¸®Exchange·þÎñÆ÷·¢Ëͺ¬Óб»µÁÃÜÂëµÄµç×ÓÓʼþ£¬Ê¹ÕâÒ»¹ý³Ì¿´ËƺϷ¨¡£Ç÷ÊƿƼ¼Ö¸³ö£¬StealHookÓëOilRig¹ýÈ¥µÄºóÃÅÔÚ´úÂëÉÏÓÐÏàËÆÖ®´¦£¬ÏÔʾÆäÊÇÒ»´Î½ø»¯¶ø·Çȫд´×÷¡£Í¬Ê±£¬OilRigÓëÁíÒ»¸öÒÁÀÊAPT×éÖ¯FOX Kitten´æÔÚÁªÏµ£¬¿ÉÄܽ«ÀÕË÷Èí¼þÌí¼Óµ½Æä¹¥»÷ÎäÆ÷¿âÖС£ÓÉÓÚÄ¿±êʵÌå¶àÊôÄÜÔ´ÁìÓò£¬ÔËÓªÖжϿÉÄܶÔÐí¶àÈË·¢ÉúÑÏÖØÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/oilrig-hackers-now-exploit-windows-flaw-to-elevate-privileges/
5. Telekopyeթƹ¤¾ß°üж¯Ïò£º½ø¾üסËÞÔ¤¶©Æ½Ì¨
10ÔÂ10ÈÕ£¬ESET Research×îзÖÏíÁ˹ØÓÚTelekopyeթƹ¤¾ß°üµÄ·¢ÏÖ¡£TelekopyeÊÇÒ»¸ö»ùÓÚTelegramµÄթƹ¤¾ß°ü£¬×Ô2016ÄêÒÔÀ´±»ÍøÂç·¸×ï·Ö×ÓÓÃÓÚÔÚÏßÊг¡Õ©Æ£¬ÏÖÒѽ«Ä¿±êÀ©´óµ½ÈÈÃÅסËÞÔ¤¶©Æ½Ì¨ÈçBooking.comºÍAirbnb¡£Õ©ÆÕßͨ¹ý͵ȡºÏ·¨¾ÆµêºÍסËÞÌṩÉ̵ÄÕË»§ÐÅÏ¢£¬ÏòÊܺ¦Õß·¢ËÍ¿´ËƺϷ¨µÄÔ¤¶©ÎÊÌâÏûÏ¢£¬Òýµ¼Æäµã»÷µöÓãÁ´½Ó²¢ÊäÈëÖ§¸¶¿¨ÐÅÏ¢¡£ÕâÖÖеÄÕ©Æ·½Ê½ÀûÓÃÁËÊܺ¦Õ߶ÔÔ¤¶©Æ½Ì¨µÄÐÅÈΣ¬Ê¹µÃƾָüÄѱ»·¢ÏÖ¡£´ËÍ⣬TelekopyeÕ©ÆÍŻﻹ¸ïÐÂÁ˹¤¾ßºÍÔËÓª·½Ê½£¬Èç×Ô¶¯Éú³ÉµöÓãÒ³Ãæ¡¢½ÓÄɼ´Ê±·Ò빦ЧµÄ½»»¥Ê½ÁÄÌì»úÆ÷ÈËÒÔ¼°ÊµÊ©·´DDoS´ëÊ©µÈ£¬ÒÔÔö¼Ó²ÆÕþ»Ø±¨¡£Æ¾¾ÝESETÒ£²âÊý¾Ý£¬´ËÀàÕ©ÆÔÚ2024ÄêÊî¼ÙÆÚ¼äÓÈΪ·ÅËÁ¡£ESET»¹ÌṩÁË·À·¶´ËÀàթƵĽ¨Ò飬°üÂÞÔÚƽ̨ÉϽ÷É÷Ïàͬ¡¢ºËʵ¶Ô·½ÐÅÏ¢ÒÔ¼°×Ðϸ¼ì²éÍøÕ¾URLµÈ¡£Í¬Ê±£¬¾¯·½Ò²ÒѽÓÄÉÐж¯¹¥»÷ÀûÓÃTelekopyeµÄ·¸×ï»î¶¯¡£
https://www.welivesecurity.com/en/eset-research/telekopye-hits-new-hunting-ground-hotel-booking-scams/
6. PureLogs¶ñÒâÈí¼þ£ºµÍ¼Û¸ßЧµÄÐÅÏ¢ÇÔÈ¡¹¤¾ßÔÚÍøÂçÖзºÀÄ
10ÔÂ12ÈÕ£¬PureLogsÊÇÒ»ÖÖÐÂÐ˵ĶñÒâÈí¼þ£¬ÒÔÆäµÍÁ®µÄ¼Û¸ñºÍÇ¿´óµÄ¹¦Ð§ÔÚ¹¥»÷ÕßÖб¸ÊÜÇàíù¡£Õâ¿îÓÃC#¹¹½¨µÄ64λÐÅÏ¢ÇÔÈ¡·¨Ê½£¬Äܹ»Í¨¹ýChrome¡¢Edge¡¢OperaµÈä¯ÀÀÆ÷»ñȡ˽ÈËÐÅÏ¢£¬ÓëÉÙÊýÆäËû¶ñÒâÈí¼þÈçLumma¡¢VidarºÍMeduza¾ßÓÐÏàËƵÄÄÜÁ¦¡£PureLogs×î³õÔÚµØÏÂÊг¡ÉϳöÊÛ£¬²¢ÔÚ¶à¸öµØÏÂÂÛ̳ÉϽøÐÐÍƹ㣬Ŀǰͨ¹ýTelegram»úÆ÷ÈËÌṩ֧³ÖºÍÏúÊÛ²éѯ£¬¼Û¸ñÏà¶ÔµÍÁ®£¬³ÉΪÊг¡ÉÏ×î×ÔÖƵÄÐÅÏ¢ÇÔÈ¡·¨Ê½Ö®Ò»¡£¾ÝFlashpoint Intel Team³ÂËߣ¬PureLogs·ÖÈý¸ö½×¶ÎÔËÐУ¬°üÂÞ¼ÓÔغÍÖ´Ðн׶Ρ¢·´É³Ïä²âÊÔºÍÍøÂçÅäÖý׶ÎÒÔ¼°ÊµÊ©ÐÅÏ¢ÇÔÈ¡·¨Ê½´úÂë½×¶Î¡£ËüÄܹ»»ñÈ¡ä¯ÀÀÊý¾Ý¡¢ä¯ÀÀÆ÷À©Õ¹¡¢¼ÓÃÜ»õ±ÒÇ®°üÓ¦Ó÷¨Ê½¡¢×ÀÃæÓ¦Ó÷¨Ê½ÒÔ¼°Êܺ¦Õß¼ÆËã»úÐÅÏ¢µÈ£¬²¢½«Ïà¹ØÊý¾Ý´«Êäµ½Telegram¡£PureLogsµÄTelegramÃæ°å¿ÉÒÔÏÔʾÊܺ¦ÕßµÄÏêϸÐÅÏ¢¡¢±»ÇÔÊý¾ÝµÄÊýÁ¿¡¢²¶×½µÄÆÁÄ»½ØͼÒÔ¼°ÈÕÖ¾ÎļþµÈ¡£
https://cybersecuritynews.com/purelogs-chrome-browser/