WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØµãÓ밲ȫ¾¯Ê¾

°ä²¼¹¦·ò 2025-09-24

1. WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØµãÓ밲ȫ¾¯Ê¾


9ÔÂ21ÈÕ £¬Sophos×êÑÐÍŶӽÒʾ £¬ÃûΪWarlockµÄÀÕË÷Èí¼þ×éÖ¯£¨Î¢Èí³ÆStorm 2603 £¬Sophos×·×ÙΪGOLD SALEM£©ÕýÒÔ¸ßÃ÷¼¼Êõ¼¿Á©¼Ó¾çÈ«ÇòÍøÂç¹¥»÷¡£¸Ã×éÖ¯×Ô2025Äê3ÔÂÆð»îÔ¾ £¬9ÔÂÒÑÔÚÆä"Warlock¿Í»§Êý¾Ýй¶Ðã"°µÍøÕ¾µã°ä²¼60ÃûÊܺ¦Õß £¬Ö¸±êº­¸Ç±±ÃÀ¡¢Å·ÖÞ¡¢ÄÏÃÀµÄÓ×ÐÍóÒ×ʵÌå¡¢µ±¾Ö»ú¹¹¼°´óÐÍ¿ç¹ú¹«Ë¾¡£Æä¹¥»÷ÌØµãÔ̺¬ÀûÓÃSharePointÁãÈÕ·ì϶¡¢²¿Êð×Ô½ç˵ToolShellÁ´¡¢Í¶·ÅWeb Shell¼°»ùÓÚGolangµÄWebSocket·þÎñÆ÷½øÐÐÓÆ¾Ã»¯ £¬²¢ÀÄÓÃVelociraptorµÈºÏ·¨¹¤¾ßÖ´ÐÐÒñ±ÎËí·¹¥»÷ £¬Í¬Ê±½áºÏMimikatzƾ֤͵ÇÔ¡¢PsExecºáÏòÒÆ¶¯¼°GPOÍÆËÍÀÕË÷¸ºÔصȴ«Í³ÊÖ·¨¡£¸Ã×é֯йÃÜģʽ¹ÖÒì £¬Ê¡ÂÔ°ä²¼ÈÕÆÚÓëÊÓ¾õÑù±¾ £¬½öËæ»úÅû¶±»µÁÊý¾ÝÁ¿ £¬²¢Í¨¹ý×¢½â±ê×¢Êý¾Ý״̬£¨°ä²¼/ÏúÊÛ/δ֧¸¶Êê½ð£© £¬ÉõÖÁÌṩÏÖʵÊý¾ÝÁ´½Ó¡£ÆäFAQÉêÃ÷ß³Ôð"²»ÕƹÜÈεĹ«Ë¾" £¬³ÆÎ´ÁªÏµµÄ´ó¿Í»§Êý¾Ý½«Ãâ·Ñ¹«¿ª £¬µ«"¸ß¶ÈÃô¸ÐÊý¾Ý"µÄ´óÐÍÆóÒµ¿Í»§ÐÅÏ¢²»»áÆëÈ«Åû¶¡£SophosÖ¸³ö £¬WarlockÖ±ÖÁ6Ô²ÅÔÚ¶íÓïÂÛ̳Ramp¹«¿ª»îÔ¾ £¬ÔøÕ÷¼¯Veeam¡¢ESXi¡¢SharePoint·ì϶ÀûÓü°EDRÖжϹ¤¾ß¡£


https://cybernews.com/security/warlock-ransomware-group-attacks-surge-september/


2. Æ­×ÓÀÄÓÃÈËΪÖÇÄÜÔ­Éúƽ̨ÍйÜÐéαÑéÖ¤ÂëÒ³Ãæ


9ÔÂ22ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾Ç÷Ïò¿Æ¼¼×îл㱨½Òʾ £¬ÈËΪÖÇÄÜ¿ª·¢Æ½Ì¨Õý±»ÍøÂç·¸×ï·Ö×ÓÀûÓà £¬³ÉΪÍйÜÐéαÑéÖ¤Â루CAPTCHA£©Ò³ÃæµÄÐÂÔØÌå £¬´Ó¶øÌӱܰ²È«¼ì²â²¢ÓÕµ¼Óû§½øÈë´¹µöÍøÕ¾¡£×÷ΪÑéÖ¤ÕæÊµÓû§µÄ¹Ø¼ü¹¤¾ß £¬CAPTCHA±¾Ó¦ÕмܻúеÈ˹¥»÷ £¬Èç½ñÈ´±»·´ÏòÀûÓà £¬³ÉÎªÍøÂç´¹µöµÄ"צÑÀ"¡£×êÑз¢ÏÖ £¬×Ô2025Äê1ÔÂÆð £¬ÀûÓÃLovable¡¢Netlify¡¢VercelµÈAIÔ­Éú¿ª·¢Æ½Ì¨ÍйÜÐéαÑéÖ¤ÂëÒ³ÃæµÄÍøÂç´¹µö»î¶¯¼¤Ôö¡£ÕâЩƽ̨Ðû³Æ"Áã´úÂë¼´¿É¹¹½¨ÀûÓÃ" £¬½µµÍÁ˼¼ÊõÃż÷ £¬Ê¹·¸×ï·Ö×ÓÄܼ±¾ç´´½¨¿´ËÆÕý¹æµÄÑéÖ¤ÂëÌôÕ½Ò³Ãæ¡£¹¥»÷Á÷³Ìͨ³£Ê¼ÓÚ¼Ù×°³É"ÃÜÂë³ÁÖÃ""USPSµØÖ·µ÷»»"µÈ´¹Î£ÓʼþµÄ´¹µöÁ´½Ó £¬Óû§µã»÷ºóÊ×ÏÈ¿´µ½ÐéαCAPTCHAÒ³Ãæ £¬ÒòÆä"¹Ù·½ÑéÖ¤"±í¹Û £¬Êܺ¦ÕßÒ×·ÅËɾ¯Ìè £¬¶ø×Ô¶¯É¨Ã蹤¾ßÒò½ö¼ì²âµ½ÑéÖ¤Âë¶ø·Çµ×²ãÆ¾Ö¤ÍøÂç±íµ¥ £¬ÄÑÒÔ¼ø±ð¶ñÒâÒ³Ãæ¡£ÊµÏÖÑéÖ¤ºó £¬Óû§»á±»³Á¶¨ÏòÖÁÕæÕýµÄ´¹µöÒ³Ãæ £¬µ¼ÖÂÆ¾Ö¤¡¢Ãô¸ÐÊý¾Ýй¶¡£¸üÑϸñµÄÊÇ £¬¹¹½¨´ËÀàÒ³Ãæ½öÐè»ù´¡¼¼ÊõÄÜÁ¦ £¬¹²Í¬AI±àÂ븱ÊÖ¼´¿ÉʵÏÖ¡£


https://cybernews.com/security/ai-platforms-captcha-phishing/


3. µÂ¹úDCS³äµçÕ¾Êý¾Ýй¶ £¬¿Í»§·þÎñÉÌÎ¥¹æ½Ó¼ûÖÂÓû§ÐÅÏ¢·çÏÕ


9ÔÂ23ÈÕ £¬µÂ¹úÊý×Ö³äµç½â¾ö¹æ»®¹«Ë¾£¨DCS£©½üÈÕÏòÓû§´«µÝһ·Êý¾Ý°²È«ÊÂÎñ £¬Æä¿Í»§·þÎñÌṩÉÌÔÚ´¦ÖÃÊý¾Ýʱ²úÉúÎ¥¹æÐÐΪ £¬µ¼Ö²¿Ãſͻ§ÐÅÏ¢Ãæ¶Ôй¶·çÏÕ¡£DCS×÷ΪŷÖÞÖØÒªµç¶¯Æû³µ³äµç·þÎñÉÌ £¬ÖÎÀí×Å30¶à¸ö¹ú¶È³¬100ÍòÓû§¼°98Íò×ù³äµçÕ¾ £¬²¢Îª±¦Âí¡¢ÆðÑÇµÈÆ·ÅÆÌṩ¼Æ·Ñ·þÎñ¡£ÊÂÎñ·¢Ô´ÓÚDCS·¢ÏÔìäºÏ×÷µÄ·þÎñÉÌÔÚÎÞºÏÀíÀíÓÉÇé¿öϽӼûÁ˿ͻ§Êý¾Ý¡£DCSÁ¢¼´Æô¶¯È«Ãæµ÷²é £¬È·ÈÏÎ¥¹æÐÐÎªÉæ¼°¸öλÊý²¡Àý £¬ÊÜÓ°ÏìÊý¾Ý½öÏÞÓÚÐÕÃûºÍµç×ÓÓʼþµØÖ· £¬¶øÆëȫ֧¸¶ÐÅÏ¢Òòδ´æ´¢ÔÚÊÜÓ°ÏìÊý¾Ý¿âÖеÃÒÔ±£È«¡£Ä¿Ç° £¬DCSÒÑÓë·þÎñÉÌÖÎÀí²ãºÏ×÷²éÃ÷Ô­Òò £¬Ö´Ðжî±í°²È«´ëÊ© £¬²¢´«µÝ·¨Âɼ°Êý¾Ý±£»¤²¿ÃÅ¡£DCSÔÚ9ÔÂ19ÈÕÉèÁ¢µÄרÏîÒ³ÃæÖÐÇ¿µ÷ £¬³äµç·þÎñ¼°¼Æ·ÑϵͳÈÔ°²È«ÔËÐÐ £¬Óû§ÎÞÐè²ÉÈ¡¶î±í²Ù×÷ £¬µ«Ð辯ÌèDZÔÚ´¹µö¹¥»÷¡£¹«Ë¾³ÁÉê £¬Ö»¹Üµ±Ç°½öÈ·ÈÏÉÙÊý°¸Àý £¬µ«ÎÞ·¨ÆëÈ«ÅųýÆäËû¿Í»§Êý¾Ý±»·ÇÊÚȨ²é¿´µÄ¿ÉÄÜÐÔ £¬µ÷²éÈÔÔÚ½øÐÐÖС£


https://www.theregister.com/2025/09/23/dcs_data_breach/


4. ŦԼ½áºÏ¹ú´ó»áǰϦ·ÛËé´óÐ͵çÐÅÍøÂç


9ÔÂ23ÈÕ £¬ÔÚ½áºÏ¹ú´ó»áÓÚÂü¹þ¶ÙÕÙ¿ªÇ°Ï¦ £¬Áª¹úµ÷²éÈËÔ±·ÛËéÁËÒ»¸ö°µ²ØÔÚŦԼµØÓòµÄ´óÐ͵çÐÅÍøÂç¡£¸ÃÍøÂçÔ̺¬³¬¹ý10ÍòÕÅSIM¿¨ºÍ300̨·þÎñÆ÷ £¬¿ÉÄܶÔŦԼÊÐͨѶϵͳÔì³É¿àÄÑÐÔ·ÛËé¡£ÌØÇÚ¾ÖÖ¸³ö £¬´ËÍøÂç¿É×ÌÈÅ´¹Î£ÏìÓ¦·þÎñ¡¢¹Ø¹Ø·äÎÑÍøÂç²¢·¢ËͼÓÃÜÐÅÏ¢ £¬Ç¡·ê150Óàλ¹ú¼Ê¸¨µ¼ÈËÆë¾ÛŦԼÆÚ¼ä¡£µ÷²éÏÔʾ £¬¸ÃÍøÂçÉ豸ɢ²¼ÓÚ½áºÏ¹ú×ܲ¿35Ó¢Àï°ë¾¶ÁìÓòÄÚ £¬¹æÄ£ÓëÉ豸ÀàÐͰµÊ¾Æä¿ÉÄÜΪÃñ×å¹ú¶È¼à¿ØÐж¯¡£Í¨¹ý¶ÈÎöSIM¿¨Êý¾Ý £¬ÌØÇÚ¾Ö·¢ÏÔìäÓëÖÁÉÙÒ»¸ö±í¹úµ±¾Ðİ··¶¾¼¯ÍÅ´æÔÚ¹ØÁª¡£Ö»¹Ü½áºÏ¹ú´ó»áÊÇ·ñΪָ±êÉв»Ã÷È· £¬µ«ÌØÇÚ¾Ö¼éϸÂíÌØ¡¤Âó¿Ë¿â¶ûÇ¿µ÷ £¬¸Ãϵͳ¾ß±¸·ÛËéÊÖ»úÐźÅËþ¡¢×è¶ÏÓ¦¼±Í¨Ñ¶µÄÄÜÁ¦ £¬ÔÚ³Á´ó¹ú¼Ê»î¶¯²¼¾°Ï¿ÉÄÜÒý·¢³ÇÊм¶Í¨Ñ¶Ì±»¾¡£¸ÃÍøÂçÓÚ½ñÄê8Ô±»ÌØÇÚ¾ÖÔÚµ÷²éÕë´ºÁª¹ú¹ÙÔ±µÄ¡°µç»°Íþв¡±ÊÂÎñʱ·¢ÏÖ¡£Âó¿Ë¿â¶û°µÊ¾ £¬½âÎöÍøÂç´«ÊäµÄͨѶÄÚÈÝÐèʱÈÕ £¬µ«ÏµÍ³ÍþÁ¦²»ÈÝÓ×ê˼¿¼µ½É豸¼ÛÖµÊý°ÙÍòÃÀÔª £¬Ä»ºó×éÖ¯×ʽðÐÛºñ £¬¿ÉÄÜ´æÔÚÀàËÆÍøÂç±é²¼ÃÀ¹úÆäËû³ÇÊС£


https://securityboulevard.com/2025/09/secret-service-shuts-down-sprawling-hidden-telecom-network-in-ny/


5. CISA³ÆºÚ¿ÍÀûÓÃGeoServer·ì϶ÈëÇÖÁª¹ú»ú¹¹


9ÔÂ23ÈÕ £¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Åû¶ £¬2024Äê7Ô £¬¹¥»÷ÕßÀûÓÃ佨²¹µÄGeoServerÊ·ý£¨Éæ¼°CVE-2024-36401Ô¶³Ì´úÂëÖ´Ðзì϶£©ÇÖÈëÁËÒ»¼ÒÃÀ¹úÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÍøÂç¡£¸Ã·ì϶ÓÚ2024Äê6ÔÂ18ÈÕ±»½¨¸´ £¬µ«Ò»¸öÔºó £¬Òò°²È«×êÑÐÈËÔ±ÔÚÏß·ÖÏí¸ÅÏëÑéÖ¤£¨PoC£©ÑÝʾ´úÂë £¬CISA½«Æä²ÎÓë¡°ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼¡±¡£Íþв¼à¿Ø×éÖ¯ShadowserverÓÚ7ÔÂ9ÈÕÆð¼ì²âµ½Õë¶Ô¸Ã·ì϶µÄ¹¥»÷ £¬OSINTËÑË÷ÒýÇæZoomEye×·×Ùµ½³¬16,000̨¶³öÔÚÍøµÄGeoServer·þÎñÆ÷¡£¹¥»÷ÕßÈëÇÖÁª¹ú»ú¹¹GeoServer·þÎñÆ÷ºó £¬ÔÚÔ¼Á½ÖÜÄÚºáÏòÒÆ¶¯¹¥ÏÂWeb·þÎñÆ÷ºÍSQL·þÎñÆ÷ £¬ÉÏ´«China ChopperµÈWeb Shell¼°ÓÃÓÚÔ¶³Ì½Ó¼û¡¢Óƾû¯¡¢ºÅÁîÖ´ÐкÍȨÏÞÌáÉýµÄ¾ç±¾ £¬²¢Í¨¹ý±©Á¦ÆÆ½â¼¼Êõ£¨T1110£©»ñÈ¡ÃÜÂëÒÔ½øÒ»²½ºáÏòÒÆ¶¯¡£¹¥»÷ÕßÂñ·üÈýÖÜδ±»·¢ÏÖ £¬Ö±ÖÁ7ÔÂ31ÈÕÁª¹ú»ú¹¹µÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©¹¤¾ß½«SQL·þÎñÆ÷ÉϵĿÉÒÉÎļþÏóÕ÷Ϊ¶ñÒâÈí¼þ²¢´¥·¢¾¯±¨ £¬°²È«ÔËÓªÖÐÐÄ£¨SOC£©Ëæºó¸ôÀë·þÎñÆ÷²¢½áºÏCISAµ÷²é¡£


https://www.bleepingcomputer.com/news/security/cisa-says-hackers-breached-federal-agency-using-geoserver-exploit/


6. Circle KÏã¸ÛÒµÎñÒòÍøÂçÖжÏ̱»¾


9ÔÂ23ÈÕ £¬½üÈÕ £¬·½±ãµêÁ¬ËøÆ·ÅÆCircle KÏã¸ÛÒµÎñÒò¡°ÍøÂçÖжϡ±ÊÂÎñµ¼ÖÂÈ«¸Û½ü400¼ÒÃŵêµç×ÓÖ§¸¶¡¢»áÔ±·þÎñ¼°µç×ÓÓʼþϵͳ̱»¾ÊýÈÕ £¬½öÏֽ𼰰˴ï֧ͨ¸¶Ö°ÄÜά³ÖÔË×÷¡£¸Ã¹«Ë¾ÓÚÖÜÄ©³õ´Î´«µÝÊÂÎñºó £¬ÖÜÒ»ÔÚFacebookÉêÃ÷ÖаµÊ¾ £¬ÒòÎÞ·¨ÅųýÍøÂç¹¥»÷¿ÉÄÜÐÔ £¬ÒÑÆô¶¯Êý¾Ý±£»¤´ëÊ©²¢Óë·¨Âɲ¿Ãż°µÚÈý·½×¨¼ÒºÏ×÷µ÷²éÔ­Òò¡¢ÁìÓò¼°Ó°Ïìˮƽ¡£½ØÖÁÖܶþ £¬Óû§ÈÔͨ¹ýÉ罻ýÌå·´À¡·þÎñÖжÏÎÊÌâ £¬Èç»ý·ÖºÍÓÅ»Ýȯ¹ýÆÚ £¬ºôÓõµ¢¸éʹÓÃÆÚÏÞ¡£Circle KÏã¸ÛÓɼÓÄôó¹«Ë¾Alimentation Couche-TardËùÓÐ £¬¸Ã¹«Ë¾ÔÚ±±ÃÀ¼°ÆäËûµØÓò¾­ÓªCircle KÉ̵ê¡£Circle KÏã¸ÛµÄǰĸ¹«Ë¾ÑÇÖÞ·½±ãÁãÊÛÓÐÏÞ¹«Ë¾ (CRA) ÖÜÒ»Ò²»ã±¨ÁËÍøÂçÖжÏ¡£CRAÓÚ20ÊÀ¼Í80Äê´ú»ñµÃÁËCircle KµÄÊÚȨ £¬²¢ÓÚ2020Ä꽫ÆäÊۻظøAlimentation Couche-Tard¡£CRA°µÊ¾ £¬ÆäÄÚ²¿ÏµÍ³Êܵ½Ó°Ïì £¬²¢ÒÑ֪ͨ·¨Âɲ¿ÃÅ £¬µ«Ä¿Ç°Éв»Ã÷ÏÔÁ½ÆðÊÂÎñÊÇ·ñÓйØÁª¡£


https://therecord.media/circle-k-hong-kong-suspected-cyberattack-convience-stores