¹ú¼Ê½áºÏÐж¯µ·»ÙTycoon2FA´¹µöƽ̨
°ä²¼¹¦·ò 2026-03-061. ¹ú¼Ê½áºÏÐж¯µ·»ÙTycoon2FA´¹µöƽ̨
3ÔÂ4ÈÕ£¬Å·ÖÞÐ̾¯×é֯е÷µÄ¹ú¼Ê·¨ÂÉÐж¯½üÈճɹ¦µ·»ÙTycoon2FA´¹µö¼´·þÎñ£¨PhaaS£©Æ½Ì¨¡£Õâ´ÎÐж¯ÓÉ΢ÈíÔÚ˽ӪºÏ×÷ͬ°éͬÃËÖ§³ÖÏÂÌáÒé¼¼ÊõÖжϣ¬ÀÍÑάÑÇ¡¢Á¢ÌÕÍð¡¢ÆÏÌÑÑÀ¡¢²¨À¼¡¢Î÷°àÑÀºÍÓ¢¹ú·¨Âɲ¿ÃÅÖ´ÐÐÓòÃû²é·âµÈ´ëÊ©£¬¹²¹Ø¹Ø330¸öÊôÓÚ·¸×ï·þÎñ»ú¹¹¹Ç¸É»ù´¡ÉèÊ©µÄÓòÃû£¬Ô̺¬½ÚÔìÃæ°åºÍ´¹µöÒ³Ãæ¡£Tycoon2FA×Ô2023Äê8ÔÂÆð»îÔ¾£¬±»ÍøÂç·¸×ï·Ö×ÓÓÃÓÚÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©±£»¤£¬ÈëÇÖÈ«Çò½ü10Íò¸ö×éÖ¯µÄÕË»§¡£¾Ý΢ÈíÊý¾Ý£¬ÖÁ2025ÄêÄêÖУ¬¸Ãƽ̨ÿÔÂÌìÉúÊýǧÍò·â´¹µöÓʼþ£¬Ó°Ï쳬50Íò¸ö×éÖ¯£¬Õ¼ËùÓб»À¹½Ø´¹µö³¢ÊÔµÄ60%¡£Æä¼¼ÊõµÀÀíΪͨ¹ý·´Ïò´úÀí·þÎñÆ÷ʵʱÀ¹½ØÊܺ¦ÕߵǼʹ´¦ºÍ»á»°cookie£¬·ÂÕÕMicrosoft 365¡¢OneDrive¡¢Outlook¡¢SharePoint¼°GmailµÈ¿ÉÐÅÆ·ÅƵÇÂ¼Ò³Ãæ¡£¼´±ãÊܺ¦ÕßʵÏÖÕý³£µÇ¼£¬¹¥»÷ÕßÈÔÄܽٳÖÒÑÈÏÖ¤»á»°²¢ÈƹýMFA±£»¤£¬³ý·Ç»î¶¯»á»°ºÍÁîÅÆ±»Ã÷È·³·Ïú¡£¸Ãƽ̨ͨ¹ýTelegramÒÔ120ÃÀÔª10ÌìʹÓÃȨµÄ¼ÛÖµÏúÊÛ£¬´ó·ù½µµÍµÍ¼¼Êõ·¸×ï·Ö×ÓÌáÒ鸴ÔÓMFAÈÆ¹ý¹¥»÷µÄÃż÷¡£
https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/
2. ÒÁÀÊÎÞÈË»úÏ®»÷ÑÇÂíÑ·Öж«Êý¾ÝÖÐÐÄÖÂÔÆ·þÎñÖжÏ
3ÔÂ3ÈÕ£¬ÒÁÀʱ¾ÖܶÔÑÇÂíÑ·ÔÚ°¢ÁªÇõºÍ°ÍÁÖµÄÈý×ùÊý¾ÝÖÐÐÄ·¢ÆðÎÞÈË»úÏ®»÷£¬µ¼ÖÂÖж«²¿ÃŵØÓòÔÆ·þÎñÖжϣ¬µØÓòÑÏÖØ´óÊÆ½øÒ»²½¶ñ»¯¡£¾ÝÑÇÂíÑ·Åû¶£¬°¢ÁªÇõÁ½×ùÊý¾ÝÖÐÐÄÔâÎÞÈË»ú¡°Ö±½Ó»÷ÖÓ×±£¬°ÍÁÖÉèÊ©Òò¡°½ü¾àÀëÎÞÈË»úÏ®»÷¡±ÊÜË𣬹²Ôì³ÉÔ¼60ÏîÑÇÂíÑ·ÔÆ·þÎñÖжϣ¬Ó°ÏìÍøÂçÁ÷Á¿¼°ÒÀÀµÔÆ·þÎñµÄÒµÎñÔËÓª¡£Õâ´ÎÏ®»÷²úÉúÔÚÃÀÒÔ½áºÏ½ø¹¥µ¼ÖÂÒÁÀÊ×î¸ßÇ̳þ¹þ÷ÄÚÒÁ¼°¶àÃû¸ß¼¶¹ÙÔ±ÉíÍöºó£¬ÒÁÀÊËæ¼´¶Ô°¢ÁªÇõ¼°ÁÚ¹ú·¢Õ¹±¨³ðÐж¯£¬Ö¸±ê²»½öÔ̺¬ÃÀ¾ü»ùµØ£¬»¹À©´óÖÁ»ú³¡¡¢¾Æµê¼°¹Ø¼üÓÍÆø»ù´¡ÉèÊ©¡£ÑÇÂíÑ·ÉêÃ÷Ö¸³ö£¬Ï®»÷Ôì³ÉÊý¾ÝÖÐÐĽṹ°Ü»µ¡¢µçÁ¦Öжϣ¬²¢´¥·¢Ïû·Àϵͳµ¼ÖÂÊÒÄÚË®Ë𣬱¾µØÏû·À²¿ÃÅÔÚɱ¾ø²Ðº¡Òý·¢»ð¾¯Ê±¹Ø¹ØÁ˵çÔ´ºÍ·¢µç»ú£¬½øÒ»²½¼Ó¾ç·þÎñÖжϡ£ÑÇÂíÑ·°µÊ¾£¬Ä¿Ç°ÕýÓë´¦Ëùµ±¾ÖºÏ×÷ÓÅÏȱ£ÏÕÔ±¹¤°²È«£¬²¢½¨ÒéÖж«¿Í»§±¸·Ý¹Ø¼üÊý¾Ý£¬½«ÀûÓÃǨáãÖÁÆäËûAWSÇøÓò¡£¹«Ë¾Ç¿µ÷£¬È«Ã渴ÔÈ¡¾öÓÚÊÜÓ°Ïì»ù´¡ÉèÊ©µÄ½¨¸´½ø¶È£¬¶øµ±Ç°Öж«³ÖÐøÃ¬¶Üµ¼ÖÂÕûÌåÔËÓª»·¾³ÈÔ²»³ÉÔ¤²â¡£
https://therecord.media/iran-drone-strikes-hit-amazon-data-centers-gulf
3. ¹È¸èÅû¶CorunaÐÂÐÍiOS·ì϶ÀûÓù¤¾ß°ü
3ÔÂ5ÈÕ£¬¹È¸èÍþвµý±¨Ó××飨GTIG£©·¢ÏÖÃûΪCoruna£¨±ðºÅCryptoWaters£©µÄÐÂÐÍiOS·ì϶ÀûÓù¤¾ß°ü£¬¸Ã¹¤¾ß°üÕë¶ÔÔËÐÐiOS 13.0ÖÁ17.2.1°æ±¾µÄiPhone£¬Ô̺¬ÎåÌõÆëÈ«·ì϶ÀûÓÃÁ´¹²23¸ö·ì϶·¨Ê½¡£Coruna¶Ô¾É°æiOSÓµÓÐÇ¿¹¥»÷ÄÜÁ¦£¬µ«¶ÔiOS 17.3¼°ÒÔÉϰ汾ÎÞЧ£¬ÒòCVE-2024-23222µÈ·ì϶ÒÑÔÚ17.3Öн¨¸´¡£¸Ã¹¤¾ß°üÓÉ¼à¿ØÉ豸¹©¸øÉ̿ͻ§³õ´ÎʹÓ㬺󱻶à¸öÍþв×éÖ¯¸´ÓøĽø¡£UNC6353ÔÚÎÚ¿ËÀ¼ÌáÒéË®¿Ó¹¥»÷£¬Öйú½ðÈÚÍþв×éÖ¯UNC6691Ôòͨ¹ýÐéα½ðÈÚÍøÕ¾²¿ÊðÆëÈ«¹¤¾ß°ü£¬ÀûÓðµ²ØiFrameͶ·Å·ì϶·¨Ê½£¬Â¶³ö»îÔ¾µÄ¡°¶þÊÖ¡±ÁãÈÕ·ì϶Êг¡¡£¼¼Êõ²ãÃæ£¬Coruna¿ò¼Üѡȡ¹ÖÒìJavaScript»ìºÏ¼¼Êõ£¬Í¨¹ýÉè±¸Ö¸ÎÆ¼ø±ð¼ÓÔØ¶ÔÓ¦·ì϶·¨Ê½¡£ÆäÖ÷ÌâÔ̺¬WebKitÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶ÀûÓá¢Ö¸ÕëÈÏÖ¤£¨PAC£©ÈƹýÄ£¿é£¬ÒÔ¼°¿É³ÁÓÃ×é¼þ£¬ÓÃÓÚÈÆ¹ýÓû§Ì¬RWXÄÚ´æ·ÖÅäÏÞ¶È¡£¹È¸èÒѰ䲼ÈëÇÖÖ¸±ê£¨IOC£©ºÍYara¹æ¶¨£¬²¢½«ÓйØÓòÃû²ÎÓ밲ȫä¯ÀÀ±£»¤¡£
https://securityaffairs.com/188928/security/google-uncovers-coruna-ios-exploit-kit-targeting-ios-13-17-2-1.html
4. Bing AIËÑË÷´«²¼Î±ÔìOpenClawµÄ¶ñÒâÈí¼þ
3ÔÂ5ÈÕ£¬½üÆÚ£¬Íйܼì²âÓëÏìÓ¦¹«Ë¾HuntressÅû¶һ·ÐÂÐÍÍøÂç¹¥»÷»î¶¯£ºÍþвÐÐΪÕßͨ¹ýαÔìGitHub´æ´¢¿â£¬½áºÏ΢ÈíBingµÄAI¼ÓÇ¿ËÑË÷Ö°ÄÜ£¬ÏòÊÔͼװÖÿªÔ´AI´úÀíOpenClawµÄÓû§´«²¼ÐÅÏ¢ÇÔÈ¡·¨Ê½¼°´úÀí¶ñÒâÈí¼þ¡£OpenClawÒòÆäÄܽӼû±¾µØÎļþ²¢¼¯³Éµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶µÈÔÚÏß·þÎñµÄÖ°ÄܸöÐÔ£¬³ÉΪ¹¥»÷ÕßÑÛÖеġ°ÃÎÏëÔØÌ塱¡£¹¥»÷Õ߯ð³õ´´½¨¶ñÒâGitHub´æ´¢¿â£¬¼Ù×°³ÉOpenClaw¹Ù·½×°Ö÷¨Ê½£¬²¢ÀûÓÃBing AIÔÚËÑË÷Á˾ÖÖеÄÍÆ¼ö»úÔ죬ÓÕµ¼Óû§ÏÂÔØ¡£ÔÚmacOS³¡¾°Ï£¬Óû§±»Êèµ¼Ö´ÐÐÔ̺¬Atomic Stealer¶ñÒâÈí¼þµÄbashºÅÁ¸ÃºÅÁî»áÏνÓÖÁ¡°puppeteerrr¡±µÈ¶ÀÁ¢GitHub²Ö¿â£¬²¿ÊðÔ̺¬shell¾ç±¾ºÍMach-O¿ÉÖ´ÐÐÎļþµÄ¶ñÒâÎļþ¡£WindowsÓû§ÔòÃæ¶Ô¡°OpenClaw_x64.exe¡±µÄ´«²¼£¬¸Ã·¨Ê½»á¿ªÊͶà¸ö»ùÓÚRustµÄ¶ñÒâ¼ÓÔØÆ÷£¬ÔÚÄÚ´æÖÐÖ´ÐÐÐÅÏ¢ÇÔÈ¡·¨Ê½¡£ÆäÖУ¬VidarÇÔÈ¡·¨Ê½»áͨ¹ýTelegramºÍSteamÓû§×ÊÁÏ»ñÈ¡C2Êý¾Ý£¬¶øGhostSocks´úÀíÔò½«Óû§ÍÆËã»úת»¯Îª¹¥»÷½Úµã£¬ÓÃÓÚ·ÓɶñÒâÁ÷Á¿»ò°µ²Ø¹¥»÷ºÛ¼£¡£
https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/
5. ά»ùýÌå»ù½ð»áÔâJavaScriptÈ䳿¹¥»÷
3ÔÂ5ÈÕ£¬Î¬»ùýÌå»ù½ð»áÔâ·êһ·ÓÉ×ÔÎÒ´«²¼JavaScriptÈ䳿Òý·¢µÄ°²È«ÊÂÎñ¡£¸ÃÈä³æÍ¨¹ýÅú¸ÄÓû§¾ç±¾¼°·ÛËéMeta-WikiÒ³ÃæÖ´Ðй¥»÷£¬µ¼ÖÂÔ¼3996¸öÒ³Ãæ±»Åú¸Ä¡¢85λÓû§µÄcommon.jsÎļþ±»´úÌæ£¬×îÖÕÆÈʹ»ù½ð»áÁÙʱÏÞ¶ÈËùÓÐÏîÄ¿±à×ëÖ°ÄÜ¡£ÊÂÎñÔ´ÓÚ¶íÂÞ˹ά»ù°Ù¿ÆÍйܵÄÒ»·Ý¶ñÒâ¾ç±¾test.js£¬¸Ã¾ç±¾ÓÚ2024Äê3Ô³õ´ÎÉÏ´«£¬Ó뺹Ç๥»÷ÖÐʹÓõľ籾´æÔÚ¹ØÁª¡£¾Ýµ÷²é£¬µ±ÈÕÒ»Ãûά»ùýÌåÔ±¹¤ÕË»§ÔÚ²âÊÔÓû§¾çÐÔ×ÓÄÜʱ£¬¿ÉÄÜÒòÓÐÒâÖ´ÐÓ×¢Òâ±í¼ÓÔØ»òÕË»§±»µÁ´¥·¢¸Ã¾ç±¾£¬µ¼ÖÂÆäͨ¹ýÒѵǼÓû§µÄcommon.js¼°È«¾ÖMediaWiki:Common.jsÎļþʵÏÖ×ÔÎÒ´«²¼¡£È䳿»¹¾ß±¸±à×ëËæ»úÒ³ÃæÖ°ÄÜ£¬Í¨¹ý²åÈë°µ²ØµÄJavaScript¼ÓÔØÆ÷¼°´ó³ß´çͼƬ·ÛËéÒ³ÃæÄÚÈÝ¡£Î¬»ùýÌå»ù½ð»á¹ýºóÉêÃ÷³Æ£¬¸Ã¶ñÒâ´úÂë½ö»îÔ¾23·ÖÖÓ£¬ÆÚ¼ä½ö¶ÔMeta-WikiÄÚÈÝÔì³Éһʱ¸ü¸ÄÓëɾ³ý£¬ÎÞÓÀÔ¶ÐÔÇÖº¦»òÓ×ÎÒÐÅϢй¶¡£Ä¿Ç°±à×ëÖ°ÄÜÒѸ´Ô£¬»ù½ð»áÕý¼ÓÇ¿°²È«Éó²é²¢Ôì¶©¶î±í·À»¤´ëÊ©£¬ÒÔ½µµÍͬÀàÊÂÎñ·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/
6. ¶í¹ØÁª´¹µö»î¶¯ÓÃжñÒâÈí¼þ¹¥»÷ÎÚ×éÖ¯
3ÔÂ5ÈÕ£¬ClearSky×êÑл㱨Åû¶һ·Óë¶íÂÞ˹ÓйصÄÍøÂç´¹µö¹¥»÷ÊÂÎñ£¬¸Ã»î¶¯Í¨¹ýÁ½ÖÖÐÂÐͶñÒâÈí¼þBadPawºÍMeowMeowÕë¶ÔÎÚ¿ËÀ¼×éÖ¯ÌáÒé¶à½×¶Î¹¥»÷¡£¹¥»÷Á´Ê¼ÓÚÒ»·âÔ̺¬ZIPѹËõÎļþÁ´½ÓµÄ´¹µöÓʼþ£¬Óʼþͨ¹ýÎÚ¿ËÀ¼ÍøÂç·þÎñÌṩÉÌukr[.]net·¢ËÍ£¬¸ÃÓòÃû´ËÇ°Ôø±»¶íÂÞ˹¹¥»÷»î¶¯ÀÄÓá£Êܺ¦Õßµã»÷Á´½Óºó£¬ÏµÍ³»á¼ÓÔØ×·×ÙÏñËØÍ¨Öª¹¥»÷Õߣ¬Ëæºó³Á¶¨ÏòÖÁ¶ÌÁ´½ÓÏÂÔØZIPÎļþ¡£½âѹZIPºó£¬¼Ù×°³ÉHTMLÎĵµµÄHTAÎļþ»áÏÔʾÎÚ¿ËÀ¼Óïµö¶üÐÅÏ¢£¬ÄÚÈÝÉæ¼°±ßÚïͨ³©Ðí¿ÉÉêÇ룬ÒԴ˺ýŪÊܺ¦Õ߸á£Í¬Ê±£¬HTAÎļþͨ¹ý²é³ÏµÍ³×°ÖÃÈÕÆÚÖ´Ðз´É³Ïä¼ì²â£¬ÈôϵͳװÖò»¼°10ÌìÔòÖÕÖ¹Ö´ÐС£Âú×ãǰÌáºó£¬HTAÎļþÌáÈ¡ÆäËû×é¼þ£¬Í¨¹ý´òË㹤×÷³ÉÁ¢Óƾû¯Ïνӣ¬²¢ÀûÓÃVBS¾ç±¾´ÓͼÏñÖÐÌáÈ¡ÒþдÓÐÐ§ÔØºÉ£¬×îÖÕ¼ÓÔØBadPaw¼ÓÔØÆ÷¡£BadPaw×÷Ϊ»ùÓÚ.NETµÄ¼ÓÔØÆ÷£¬Ê¹ÓÃ.NET Reactor¼Ó¿ÇÆ÷»ìºÏ´úÂ룬¹ÊÕÏÄæÏò·ÖÎö¡£³ÉÁ¢C2ͨѶºó£¬BadPaw²¿ÊðMeowMeow¸´ÔÓºóÃÅ¡£¸ÃºóÞ߱¸»·¾³¼ì²âÖ°ÄÜ£¬¿ÉɨÃèÐé¹¹»ú¼°Wireshark¡¢ProcMonµÈ·ÖÎö¹¤¾ß£¬Èô·¢ÏÖɳÏä»·¾³ÔòÁ¢¼´ÖÕ³¡Ö´ÐС£
https://securityaffairs.com/188974/apt/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ