ÍøÂç·¸·¨·Ö×Ó½« Raspberry Pi Äð³ÉڲƭºÍÌØ¹¤¹¤¾ß

Ðû²¼Ê±¼ä 2024-03-27
1. ÍøÂç·¸·¨·Ö×Ó½« Raspberry Pi Äð³ÉڲƭºÍÌØ¹¤¹¤¾ß


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ GEOBOX µÄÐÂÈí¼þ°ü½ÓÄɼÛǮʵ»ÝÇÒÆÕ±éʹÓõÄRaspberry PiÅÌËã»ú£¬£¬£¬£¬£¬£¬²¢½«Æäת±äÎªÖØ´óµÄÄäÃû¹¤¾ß - רΪڲƭ¡¢Ìع¤»î¶¯ºÍÈÆ¹ýÇå¾²¿ØÖƶø¶¨ÖÆ ¡£¡£¡£GEOBOX ÔÚ°µÍøÂÛ̳ÉÏµÄ¹ã¸æ¼ÛÇ®½öΪÿÔ 80 ÃÀÔª£¬£¬£¬£¬£¬£¬ÔÊÐíÍøÂç·¸·¨·Ö×ÓÄܹ»£ºÐéα GPS λÖ㻣»£»£»£»ÓÕÆ­ÍøÂçÉèÖúÍÑÚÊλ¥ÁªÍø»î¶¯ ¡£¡£¡£GEOBOX ϵͳµÄÉè¼ÆºÜÊǼòÆÓ ¡£¡£¡£Í¨¹ýÌṩÓû§Êֲᣬ£¬£¬£¬£¬£¬×ÝÈ»ÊÖÒÕרҵ֪ʶÓÐÏÞµÄÈËÒ²¿ÉÄܻᰲÅÅÕâÖÖΣÏյŤ¾ß ¡£¡£¡£GEOBOX ÒÔ¼°ÀàËÆ¹¤¾ß¸øÖ´·¨²¿·ÖºÍÍøÂçÇå¾²ÉçÇø´øÀ´ÁËÔ½À´Ô½´óµÄÌôÕ½ ¡£¡£¡£Ëæ×ÅÁªÍø×°±¸±äµÃÔ½·¢Ç¿Ê¢ÇÒ¼ÛǮʵ»Ý£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚѰÕÒеÄÒªÁìÀ´Ê¹ÓÃËüÃÇ ¡£¡£¡£


https://securityonline.info/cybercriminals-turn-cheap-raspberry-pi-into-powerful-fraud-and-espionage-tool/


2. kimsuky Èö²¥Î±×°³Éº«¹úij¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ


3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬AhnLab Çå¾²Ç鱨ÖÐÐÄ (ASEC) ×î½ü·¢Ã÷ Kimsuky ×éÖ¯Èö²¥Î±×°³Éº«¹ú¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ ¡£¡£¡£ËùÉæ¼°µÄ¶ñÒâÈí¼þÊÇÒ»¸ö½¨ÉèEndorºóÃŵÄÖ²Èë³ÌÐò ¡£¡£¡£ËäȻûÓÐÔÚÏÖʵ¹¥»÷ÖÐʹÓøÃÖ²Èë³ÌÐòµÄ¼Í¼£¬£¬£¬£¬£¬£¬µ«ÔÚÓë¸ÃÖ²Èë³ÌÐò±»ÍøÂçµÄԼĪͳһʱÆÚ£¬£¬£¬£¬£¬£¬ÓÐÒ»¸öÉæ¼°¸ÃÖ²Èë³ÌÐò½¨ÉèºóÃŵĹ¥»÷°¸Àý ¡£¡£¡£ÍþвÐÐΪÕßʹÓúóÃÅÏÂÔØÆäËû¶ñÒâÈí¼þ»ò×°ÖÃ½ØÆÁ¶ñÒâÈí¼þ ¡£¡£¡£Endor Ò²¾­³£ÓÃÓÚÆäËû¹¥»÷£»£»£»£»£»ÒÑÍù£¬£¬£¬£¬£¬£¬ËüÓëNikidoorÒ»ÆðʹÓ㬣¬£¬£¬£¬£¬Nikidoor ͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¾ÙÐзַ¢ ¡£¡£¡£Dropper ±»Î±×°³Éº«¹úij¹«¹²»ú¹¹µÄ×°ÖóÌÐò ¡£¡£¡£Æäͼ±ê½ÓÄÉÁ×ÆÃ»ú¹¹µÄ±ê¼Ç£¬£¬£¬£¬£¬£¬Ïà¹ØÒªº¦´Ê¿ÉÔÚ°æ±¾ÐÅÏ¢ºÍÉèÖÃÒ³ÃæÖÐÕÒµ½ ¡£¡£¡£ÁíÍ⣬£¬£¬£¬£¬£¬Ã»ÓÐÈκÎÕýµ±³ÌÐòµÄ°æ±¾Óë´ËÏàͬ ¡£¡£¡£ÕâÅú×¢¸Ã¶ñÒâÈí¼þÖ»ÊDZ»Éè¼ÆµÃÏñÈÎºÎÆäËûÕýµ±³ÌÐòÒ»Ñù£¬£¬£¬£¬£¬£¬ÎÞÒ⽫×Ô¼ºÎ±×°³ÉÏÖÓгÌÐò ¡£¡£¡£×ÝÈ»ÔÚ×°ÖÃÀú³ÌÖУ¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þÒ²ÊÇΨһÒÔÕý³£·½·¨×°ÖõijÌÐò ¡£¡£¡£ 


https://asec.ahnlab.com/en/63396/


3. ·ðÂÞÀï´ïÖݵÄÊ¥¿ËÀ͵ÂÊÐÔâµ½ÀÕË÷¹¥»÷


3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Ê¥¿ËÀ͵ÂÊÐÌåÏÖ£¬£¬£¬£¬£¬£¬ÀÕË÷¹¥»÷µ¼ÖÂÐí¶à²¿·ÖÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬µ«ËûÃÇÕýÔÚ¾¡¿ÉÄÜ×î¼ÑµØÔË×÷£¬£¬£¬£¬£¬£¬Ö±µ½ÎÊÌâ»ñµÃ½â¾ö ¡£¡£¡£Ê¥¿ËÀ͵ÂλÓÚ°ÂÀ¼¶àÒÔÄÏԼһСʱ³µ³Ì´¦£¬£¬£¬£¬£¬£¬ÓµÓÐ 60000 ÃûסÃñ ¡£¡£¡£²¢ÇÒ¹«Ô°ºÍÐÝÏл¼°Ð§À͵ÄÏÖ³¡¸¶¿îÒ²ÔÝʱֻÄÜʹÓÃÏֽ𠡣¡£¡£ÔÚÏßÉèʩԤ¶©¸¶¿îºÍÔÚÏ߻ע²áÈÔÈ»½ÓÊÜÐÅÓÿ¨¸¶¿î ¡£¡£¡£¾¯Ô±ºÍÏû·À¾ÈÔ®ÕýÔÚÏìӦЧÀÍÇëÇó ¡£¡£¡£×ªÔËÕ¾µÄЧÀÍÓöÈÔÝʱֻÄÜÓÃÏÖ½ðÖ§¸¶£¬£¬£¬£¬£¬£¬ËùÓÐÀ¬»øºÍ½ÓÄÉÍøÂçõè¾¶½«°´ÍýÏëÔËÐÐ ¡£¡£¡£°ÂÎ÷°ÂÀ­ÏØË°Îñ¾ÖºÍ OUC µÈÍⲿ¹«ÓÃÊÂÒµµÄÌṩÉ̲¢Î´Êܵ½´Ë´Î¹¥»÷µÄÓ°Ïì ¡£¡£¡£


https://therecord.media/st-cloud-hit-with-ransomware-florida-string


4. Top.gg Discord »úеÈËÉçÇøÔâµ½¹©Ó¦Á´¹¥»÷


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬¶àÄêÀ´£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÒ»Ö±ÔÚʹÓöàÖÖÕ½ÂÔ¡¢ÊÖÒպͳÌÐò (TTP)£¬£¬£¬£¬£¬£¬°üÀ¨Ð®ÖÆ GitHub ÕÊ»§¡¢·Ö·¢¶ñÒâ Python °ü¡¢Ê¹ÓÃÐéαµÄ Python »ù´¡ÉèÊ©ºÍÉç»á¹¤³Ì ¡£¡£¡£ÉÏ´«µ½ PyPI µÄ¶ñÒâ°ü³äµ±ÁËÆÆËðϵͳµÄ³õÊ¼ÔØÌå ¡£¡£¡£Ò»µ©ÏµÍ³Ôâµ½ÆÆË𣬣¬£¬£¬£¬£¬»òÕß¹¥»÷ÕßÐ®ÖÆÁËÌØÈ¨ GitHub ÕÊ»§£¬£¬£¬£¬£¬£¬ËûÃǾͻá¸ü¸ÄÏîÄ¿ÎļþÒÔÖ¸Ïò¼Ù¾µÏñÉÏÍйܵÄÒÀÀµÏî ¡£¡£¡£Top.gg Êǹ¥»÷Õß×î½üµÄÊܺ¦ÕßÖ®Ò»£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÊ¢ÐеÄËÑË÷ºÍ·¢Ã÷ƽ̨£¬£¬£¬£¬£¬£¬ÊÊÓÃÓÚ Discord ЧÀÍÆ÷¡¢»úеÈËºÍÆäËûÉç½»¹¤¾ß£¬£¬£¬£¬£¬£¬Ö¼ÔÚÓÎÏ·¡¢Ìá¸ß¼ÓÈë¶ÈºÍˢй¦Ð§ ¡£¡£¡£¹¥»÷ÕßÈëÇÖÁË top.gg ά»¤Õß¡°editor-syntax¡±µÄÕÊ»§£¬£¬£¬£¬£¬£¬¸Ãά»¤Õß¶Ô¸ÃÆ½Ì¨µÄ GitHub ´æ´¢¿âÓµÓÐÖ÷ÒªµÄдÈë»á¼ûȨÏÞ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-poison-source-code-from-largest-discord-bot-platform/


5. ÓëÒÁÀÊÏà¹ØµÄ APT TA450 ÔÚ PDF ¸½¼þÖÐǶÈë¶ñÒâÁ´½Ó


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬ÓëÒÁÀÊÓÐ¹ØµÄ APT ×éÖ¯MuddyWater  £¨ÓÖÃû SeedWorm¡¢  TEMP.Zagros¡¢TA450 ºÍ Static Kitten£©ÊÇ 2024 Äê 3 ÔÂÌᳫµÄÒ»´ÎеÄÍøÂç´¹ÂڻµÄÄ»ºóºÚÊÖ£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÊÔͼÔÚ 2024 Äê 3 ÔÂͶ·ÅÃûΪ Atera µÄÕýµ±Ô¶³Ì¼à¿ØºÍÖÎÀí (RMM) ½â¾ö¼Æ»® ¡£¡£¡£¸Ã»î¶¯Õë¶Ô´óÐÍ¿ç¹ú×éÖ¯µÄÒÔÉ«ÁÐÔ±¹¤£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓëн³êÏà¹ØµÄÉç»á¹¤³Ì ¡£¡£¡£¸ÃÍøÂç´¹ÂڻÓÚ 3 Ô 7 ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬Ò»Ö±Ò»Á¬µ½ 2024 Äê 3 Ô 11 ÈÕÕâÒ»ÖÜ ¡£¡£¡£TA450 ×éÖ¯·¢ËÍÓã²æÊ½ÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨°üÀ¨¶ñÒâÁ´½ÓµÄ PDF ¸½¼þ ¡£¡£¡£ÍþвÐÐΪÕßÏòͳһÊÕ¼þÈË·¢ËÍÁ˶à·â´øÓÐ PDF ¸½¼þµÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ÆäÖÐǶÈëµÄÁ´½ÓÂÔÓвî±ð ¡£¡£¡£Proofpoint ƾ֤¶ÔÓëÍøÂçÌØ¹¤×éÖ¯¡¢»î¶¯Ä¿µÄÒÔ¼°¹¥»÷ÖÐʹÓõĶñÒâÈí¼þÏà¹ØµÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐòµÄÊӲ죬£¬£¬£¬£¬£¬½«´Ë´Î»î¶¯¹éÒòÓÚ TA450 ¡£¡£¡£


https://securityaffairs.com/161042/apt/iran-ta450-rmm-atera.html


6. ºÚ¿Í¿É½âËø Dormakaba ÏúÊ۵Ġ300 ¶àÍò¸ö·¿ÃÅ


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬ÊýǧÃûÇå¾²Ñо¿Ö°Ô±Æë¾ÛÀ­Ë¹Î¬¼Ó˹¼ÓÈëËùνµÄ¡°ºÚ¿ÍÏÄÁîÓª¡±£¨Ò»Á¬¾ÙÐÐ Black Hat ºÍ Defcon ºÚ¿Í¾Û»á£©Ê±£¬£¬£¬£¬£¬£¬ËûÃÇÖеÄһЩÈ˿϶¨»áʵÑéÈëÇÖ»ù´¡Éèʩά¼Ó˹×Ô¼º£¬£¬£¬£¬£¬£¬Õâ×ù¶¼»áÓµÓÐһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶Ä³¡ºÍÂùÝÊÖÒÕ ¡£¡£¡£Ian Carroll¡¢Lennert Wouters ºÍÆäËûÇå¾²Ñо¿Ö°Ô±ÍŶÓÕ¹ÏÖÁËÒ»ÖÖËûÃdzÆÖ®Îª Unsaflok µÄÂùÝÔ¿³×¿¨ºÚ¿ÍÊÖÒÕ ¡£¡£¡£¸ÃÊÖÒÕÊÇһϵÁÐÇå¾²Îó²îµÄÜöÝÍ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÏÕЩ¿ÉÒÔÁ¬Ã¦·­¿ªÈðÊ¿Ëø¾ßÖÆÔìÉÌ Dormakaba ÏúÊÛµÄ Saflok Æ·ÅÆ»ùÓÚ RFID µÄÔ¿³×¿¨ËøµÄ¶àÖÖÐͺŠ¡£¡£¡£Saflok ϵͳװÖÃÔÚÈ«Çò 131 ¸ö¹ú¼Ò 13000 ´¦·¿²úµÄ 300 ÍòÉÈÃÅÉÏ ¡£¡£¡£


https://news.hitb.org/content/hackers-can-unlock-over-3-million-hotel-doors-seconds