Âí˹¿ËDOGE¼Æ»®ÏÝÍøÂçÄþ¾²Î£»ú£¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹â©¶´
Ðû²¼Ê±¼ä 2025-02-181. Âí˹¿ËDOGE¼Æ»®ÏÝÍøÂçÄþ¾²Î£»ú£¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹â©¶´
2ÔÂ14ÈÕ£¬¿Æ¼¼ÒÚÍò¸»Ḭ̂£Â¡¡¤Âí˹¿Ë¹ÜÀíµÄÕþ¸®Ð§Âʲ¿£¨DOGE£©Ö¼ÔÚÏ÷¼õÁª°î¿ªÖ§²¢ÌáÉýÕþ¸®Ð§ÂÊ£¬È»¶ø£¬Æäд´½¨µÄDOGE.govÍøÕ¾È´ÒòÍøÂçÄþ¾²´ëÊ©ËÉи¶øÃæÁÙÖØ´ó·çÏÕ¡£ºÚ¿ÍÖ¸³ö£¬¸ÃÍøÕ¾´æÔÚÑÏÖØÄþ¾²Â©¶´£¬ÈκÎÈ˶¼ÄÜ·ÃÎʲ¢±à¼´æ´¢µÄÐÅÏ¢¡£ÍøÕ¾Ëƺõ´Ò潨³É£¬¸´ÖÆÁËDOGEµÄÉ罻ýÌåÌû×Ó¼°Òªº¦Í³¼ÆÊý¾Ý£¬ÇÒÊý¾Ý¿â¹ûÈ»£¬ÔÊÐíµÚÈý·½ÐÞ¸ÄÄÚÈݲ¢ÊµÊ±ÏÔʾ¡£¾Ý¿ª·¢ÈËԱ͸¶£¬¸ÃÍøÕ¾ÍйÜÔÚCloudflare PagesÉÏ£¬¶ø·ÇÕþ¸®·þÎñÆ÷£¬Êý¾Ý¿âAPI¶Ëµã¿É±»ÇáÒ×ÕÒµ½²¢ÍÆË͸üС£´ËÍ⣬DOGEµÄÁíÒ»ÍøÕ¾waste.govÒ²±£ÁôÁËWordPressĬÈÏÄ£°åºÍʾÀýÎı¾£¬½öÔÚýÌ幨עºó²Å±»·â½û¡£ÕâЩʼþ͹ÏÔÁËDOGEÔÚ×·ÇóЧÂʵÄͬʱ£¬ºöÊÓÁËÍøÂçÄþ¾²µÄÖØÒªÐÔ£¬¿ÉÄܳÉΪÆä¸ïеÄÎþÉüÆ·¡£
https://cybernews.com/security/musk-doge-website-hacked/
2. ºÉÀ¼¾¯·½²é·âZservers/XHost·Àµ¯ÍйܷþÎñ127̨·þÎñÆ÷
2ÔÂ17ÈÕ£¬½üÈÕ£¬ÃÀ¡¢Ó¢¡¢°ÄÈý¹ú¶Ô¶íÂÞ˹·Àµ¯ÍйܷþÎñÌṩÉÌZservers¼°Æä¹ÜÀíÔ±Alexander Igorevich MishinºÍAleksandr Sergeyevich BolshakovÊµÊ©ÖÆ²Ã£¬ÒòÆäÖ§³Ö¶íÂÞ˹ÀÕË÷Èí¼þLockBitÐж¯¡£ZserversλÓÚ¶íÂÞ˹°Í¶ûè§¶û£¬Í¨¹ýÌṩ·Àµ¯ÍйܷþÎñ£¨BPH£©£¬°üÂÞ×âÁÞ´óÁ¿IPµØÖ·£¬ÐÖúLockBit¹ØÁª¹«Ë¾ÌÓ±ÜÖ´·¨ºÍÍøÂçÄþ¾²¹«Ë¾µÄÉó²é£¬Ðµ÷ºÍÌᳫÀÕË÷Èí¼þ¹¥»÷¡£´Ëǰ£¬¼ÓÄôóÖ´·¨²¿ÃÅÔÚËѲéÖз¢ÏÖZserversµÄת×âIPµØÖ·ÓëLockBit¶ñÒâÈí¼þ²Ù×÷Óйء£ºÉÀ¼ÒòÖ´·¨µ¥±¡ÄÑÒԹرմËÀà·þÎñ£¬Í¹ÏÔÁ˼ÓÇ¿¹æÔòµÄÐëÒªÐÔ¡£¼¸Ììºó£¬ºÉÀ¼¾¯·½Ðû²¼ÒÑÏÂÏß²¢²é·âÁËÓëZservers/XHostÏà¹ØµÄ127̨λÓÚ°¢Ä·Ë¹Ìص¤µÄ·þÎñÆ÷¡£ÕâЩ·þÎñÆ÷±»ContiºÍLockBitµÈÍøÂç·¸×OÍÅʹÓ᣾¹ýÒ»Äê¶àµÄÊӲ죬°¢Ä·Ë¹Ìص¤¾¯·½ÍøÂç·¸×ïС×éÔÚ2ÔÂ12ÈÕµÄͻϮÖе·»ÙÁËÕâ¼Ò·Àµ¯ÍйÜÉÌ¡£Ðж¯Öз¢ÏֵķþÎñÆ÷ÉÏ×°ÓÐContiºÍLockbitµÄºÚ¿Í¹¤¾ß£¬ÕâÁ½¸ö¼¯Íű»ÈÏΪÊÇÊÀ½çÉÏ×î¾ßÉú²úÁ¦ºÍÆÆ»µÁ¦µÄÀÕË÷Èí¼þ¼¯ÍÅ¡£Ä¿Ç°£¬¸ÃÊÓ²ìÈÔÔÚ½øÐÐÖУ¬¾¯·½ÕýÔÚ·ÖÎö±»¿ÛѺ·þÎñÆ÷ÉÏ´æ´¢µÄÊý¾Ý¡£
https://securityaffairs.com/174321/hacking/dutch-police-seized-127-servers-bulletproof-hosting-service-zservers-xhost.html
3. XCSSET macOS¶ñÒâÈí¼þбäÖÖÔöÇ¿¹¥»÷ÄÜÁ¦£¬ÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢
2ÔÂ17ÈÕ£¬XCSSET macOSÄ£¿é»¯¶ñÒâÈí¼þµÄбäÖÖÒÑ·ºÆðÔÚÕë¶ÔÓû§Ãô¸ÐÐÅÏ¢µÄ¹¥»÷ÖУ¬°üÂÞÊý×ÖÇ®°üºÍNotesÓ¦Ó÷¨Ê½µÄÊý¾Ý¡£¸Ã¶ñÒâÈí¼þͨ³£Í¨¹ýÊÜѬȾµÄXcodeÏîÄ¿½øÐÐÁ÷´«£¬ÒѾ´æÔÚÖÁÉÙÎåÄ꣬¶øÇÒÿ´Î¸üж¼´ú±í×Å¿ª·¢µÄÒ»¸öÀï³Ì±®¡£Î¢ÈíÍþвÇ鱨ÍŶÓÔÚÓÐÏ޵Ĺ¥»÷Öз¢ÏÖÁË×îбäÖÖ£¬Ëü¾ßÓÐÔöÇ¿µÄ´úÂë»ìÏý¡¢¸üºÃµÄ³Ö¾ÃÐÔºÍеÄѬȾ¼ÆÄ±¡£ÐµıäÖÖ½ÓÄÉÁËÒÀÀµÓÚBase64ºÍxxdÒªÁìµÄ±àÂë¼¼Êõ½øÐÐеĻìÏý£¬Í¬Ê±Ê¹ÓÃÁËzshrcºÍdockÁ½ÖÖ³Ö¾ÃÐÔ¼¼Êõ¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃеÄXcodeѬȾҪÁ죬½«ÓÐÐ§ÔØºÉ·ÅÖÃÔÚXcodeÏîÄ¿ÖС£¶ÔÓÚzshrc³Ö¾Ã»¯ÒªÁ죬еıäÖֻᴴ½¨Ò»¸ö°üÂÞÓÐЧ¸ºÔصÄÎļþ£¬²¢ÔÚÆô¶¯ÐµÄshell»á»°Ê±Æô¶¯¸ÃÎļþ¡£¶ÔÓÚdockÒªÁ죬¶ñÒâÈí¼þ´Ó¹¥»÷ÕßµÄÃüÁîºÍ¿ØÖÆ·þÎñÆ÷ÏÂÔØÒÑÇ©ÃûµÄdockutil¹¤¾ßÀ´¹ÜÀídockÏîÄ¿£¬²¢´´½¨Ò»¸ö¶ñÒâµÄLaunchpadÓ¦Ó÷¨Ê½À´Ö´ÐжñÒâ¸ºÔØ¡£XcodeÊÇAppleµÄ¿ª·¢¹¤¾ß¼¯£¬XCSSETµÄÔËÓªÕßͨ¹ýÕë¶ÔXcodeÏîÄ¿×ÊÔ´¿ÉÒÔ½Ó´¥µ½¸ü¶àµÄÊܺ¦Õß¡£Î¢Èí½¨Òé¼ì²éºÍÑéÖ¤´Ó·Ç¹Ù·½´æ´¢¿â¿Ë¡µÄXcodeÏîÄ¿ºÍ´úÂë¿â£¬ÒÔ·ÀÒþ²Ø»ìÏýµÄ¶ñÒâÈí¼þ»òºóÃÅ¡£
https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/
4. ºÚ¿ÍÀûÓà Telegram API Á÷´«Ð嵀 Golang ºóÃÅ
2ÔÂ17ÈÕ£¬NetskopeµÄÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸öеġ¢¿ÉÄÜÈÔÔÚ¿ª·¢ÖеĻùÓÚGolangµÄºóÃŶñÒâÈí¼þ£¬ËüÀûÓÃTelegram API½øÐÐÃüÁîºÍ¿ØÖÆ£¨C2£©Í¨ÐÅ¡£ÕâÖÖ¶ñÒâÈí¼þÔ´×Ô¶íÂÞ˹£¬ÀûÓÃÁËTelegramµÈÔÆ·þÎñ£¬ÕâЩ·þÎñÒ×ÓÚ¹¥»÷ÕßʹÓöøÄÑÒÔ±»Ñо¿ÈËÔ±¼à¿Ø¡£¸Ã¶ñÒâÈí¼þÔÚÖ´ÐÐʱ»á¼ì²é×ÔÉíÊÇ·ñ´ÓÖ¸¶¨Î»ÖúÍÎļþÃûÔËÐУ¬Èç²»ÊÇ£¬Ôò»á¸´ÖƵ½¸ÃλÖò¢Æô¶¯¸±±¾¡£¶ÔÓÚC2ͨÐÅ£¬ºóÃÅʹÓÿªÔ´Go°üÓëTelegram½»»¥£¬½¨Á¢Ò»¸ö»úÆ÷ÈËʵÀýÀ´¼àÊÓÖ¸¶¨µÄÁÄÌìÖÐÊÇ·ñÓÐÐÂÃüÁî¡£¸Ã¶ñÒâÈí¼þÖ§³ÖËĸöÃüÁµ«Ä¿Ç°Ö»ÊµÏÖÁËÈý¸ö£¬°üÂÞÖ´ÐÐPowerShellÃüÁî¡¢ÖØ¸´³õʼ°²×°¼ì²éºÍ¹ý³Ì¡¢·¢ËÍÆÁÄ»½ØÍ¼ÏûÏ¢£¨ËäδÍêȫʵÏÖ£©ÒÔ¼°×Ô»ÙÃüÁî¡£ÕâÖÖ¶ÔÔÆÓ¦Ó÷¨Ê½µÄ¶ñÒâÀûÓøø·ÀÓùÕß´øÀ´ÁËÌôÕ½£¬ÒòΪ´Ó·ÀÓùÕߵĽǶÈÀ´¿´£¬ºÜÄÑÇø·ÖʹÓÃAPIµÄÆÕͨÓû§ºÍC2ͨÐÅ¡£ÎªÁ˱£³ÖÄþ¾²£¬½¨Òé°²×°×îÐÂÇÒÐÅÓþÁ¼ºÃµÄ·À²¡¶¾ºÍ·´¶ñÒâÈí¼þ£¬ÒÔ¼ì²âºÍ×èÖ¹´ËÀà¶ñÒâÎļþ¡£
https://hackread.com/hackers-exploit-telegram-api-spread-golang-backdoor/
5. RansomHubÀÕË÷Èí¼þ×éÖ¯¹¥»÷ËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä
2ÔÂ17ÈÕ£¬RansomHubÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶ÔËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä½øÐÐÁ˹¥»÷£¬ÒÑËø¶¨Æä»ù´¡ÉèÊ©²¢»ñÈ¡ÁË119GBµÄÎļþ¡£ÊÜÓ°ÏìµÄϵͳ°üÂ޶ij¡¡¢±ãÀûµê¡¢Õþ¸®´óÂ¥¡¢µçÐÅ·þÎñÒÔ¼°¶à¸öÒ½ÁÆÖÐÐÄ¡£RansomHubÖ¸Ôð²¿Âäδ½øÐÐ̸ÅУ¬²¢ÅúÆÀÆä±£ÏÕ¹«Ë¾ºÍ¶Ê»áδ½ÓÄÉÐж¯¡£RansomHubÍþв³Æ£¬ÈôÖÜÈýǰδÊÕµ½»Ø¸´£¬½«Ð¹Â¶ËùÓÐÊý¾Ý¡£ËÕÊ¥ÂêÀöÆæçêÍßÓ¡µÚ°²²¿ÂäÔò·¢±íÉùÃ÷³Æ£¬2ÔÂ9ÈÕÔâÊÜÁËÀÕË÷Èí¼þÍøÂç¹¥»÷£¬¶à¸öµç»°ºÍ¼ÆËã»úϵͳÊܵ½Ó°Ïì¡£²¿ÂäÕýÔÚÓëÍøÂçÄþ¾²×¨¼ÒºÏ×÷£¬¾¡Á¦½â¾öÎÊÌ⣬²¢ÉèÁ¢ÁËеĵ绰ºÅÂ룬Ԥ¼Æ½«ÒÔÓÐÏÞÄÜÁ¦ÔË×÷Ò»ÖÜ¡£²¿ÂäÖ÷ϯÏòÉçÇø±£Ö¤£¬ËûÃǽ«¼ÌÐø¶¨ÆÚ¸üлָ´Çé¿ö£¬µ«Ä¿Ç°ÎÞ·¨·ÖÏí¸ü¶àϸ½Ú£¬Ð»Ð»¸÷È˵ÄÄÍÐĺÍÀí½â¡£
https://databreaches.net/2025/02/17/ransomware-attack-affects-michigan-casinos-and-tribal-health-centers/
6. Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯DDoS¹¥»÷
2ÔÂ17ÈÕ£¬Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯ÁËDDoS¹¥»÷£¬Ä¿±ê°üÂÞÀûÄÉÌØ»ú³¡¡¢Âí¶ûÅíÈø»ú³¡¡¢½»Í¨¹ÜÀí¾Ö¡¢Intesa San PaoloÒøÐÐÒÔ¼°ËþÀ¼Íиۺ͵ÄÀïÑÅË¹ÌØ¸ÛµÄÍøÕ¾¡£ÕâЩ¹¥»÷ÊǶÔÒâ´óÀû×ÜͳÂíËþÀ×À½«¶íÂÞ˹ÓëÄÉ´âµÂ¹úÀúÊ·½øÐбÈÁ¦µÄÑÔÂ۵ĻØÓ¦£¬NoName057(16)Éù³ÆÕâÊǶԡ°¿Ö¶íÕß¡±µÄ´¦·£¡£¾¡¹Ü¹¥»÷¶ÔÄ¿±êµÄÓ°Ïì½ÏС£¬µ«Òâ´óÀû¹ú¼ÒÍøÂçÄþ¾²¾ÖѸËÙ½ÓÄÉÐж¯£¬Ö§³ÖÊÜÓ°ÏìµÄ×éÖ¯²¢Ïû³ýÁ˹¥»÷¡£NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬Ê¹ÓöàÖÖ¹¤¾ß½øÐй¥»÷£¬²¢ÔÚµØÔµÕþÖνôÕÅʱÆÚÉý¼¶Ï®»÷¡£´Ë´Î¹¥»÷²¢·ÇÊ״Σ¬Ö®Ç°¸Ã×éÖ¯Ò²Ôø¶ÔÒâ´óÀû¸÷²¿Î¯¡¢»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ÍøÕ¾ºÍ˽ÈË×éÖ¯Ìᳫ¹ý¹¥»÷¡£¶íÂÞ˹Íâ½»²¿·¢ÑÔÈËÂêÀöÑÇ¡¤Ôú¹þÂÞÍÞÒ²ÌåÏÖ£¬ÂíËþÀ×ÀµÄÑÔÂÛ²»»á¡°²»ÊÜ´¦·£¡±¡£
https://securityaffairs.com/174294/hacktivism/noname05716-launched-ddos-attacks-on-italian-sites.html