iClickerƽ̨ÔâClickFix¹¥»÷
Ðû²¼Ê±¼ä 2025-05-121. iClickerƽ̨ÔâClickFix¹¥»÷
5ÔÂ11ÈÕ£¬Ê¢ÐеÄѧÉú¼ÓÈëÆ½Ì¨iClickerÍøÕ¾ÔâÓöClickFix¹¥»÷£¬¸Ã¹¥»÷ͨ¹ýÐéαCAPTCHAÌáÐÑÓÕÆÓû§×°ÖöñÒâÈí¼þ¡£iClickerÊÇÂó¿ËÃ×Â×µÄ×Ó¹«Ë¾£¬×÷ΪÊý×Ö¿ÎÌù¤¾ß±»ÃÀ¹ú¶àËù´óרԺУÆÕ±éʹÓã¬Éæ¼°5000ÃûÎ÷ϯºÍ700ÍòÃûѧÉú¡£2025Äê4ÔÂ12ÈÕÖÁ16ÈÕʱ´ú£¬iClickerÍøÕ¾±»ºÚ¿ÍÈëÇÖ£¬ÏÔʾαÔìµÄCAPTCHA£¬ÓÕµ¼Óû§µã»÷¡°ÎÒ²»ÊÇ»úеÈË¡±¾ÙÐÐÑéÖ¤¡£µ±Óû§µã»÷ºó£¬PowerShell¾ç±¾±»¸´ÖƵ½Windows¼ôÌù°å£¬Óû§±»Ö¸Ê¾·¿ªÔËÐжԻ°¿òÕ³Ìù²¢Ö´Ðиþ籾ÒÔÍê³ÉÑéÖ¤¡£Ö»¹Ü¸Ã¹¥»÷ÒѲ»ÔÙÔÚiClickerÍøÕ¾ÉÏÔËÐУ¬µ«RedditÉÏÓÐÓû§Õ¹ÏÖÁËÖ´ÐеÄPowerShellÓÐÓøºÔØ¡£¹¥»÷ÖÐʹÓõÄPowerShellÏÂÁî¸ß¶È»ìÏý£¬Ö´ÐÐʱ»áÅþÁ¬µ½Ô¶³Ì·þÎñÆ÷¼ìË÷ÁíÒ»¸öPowerShell¾ç±¾¡£Æ¾Ö¤»á¼ûÕßÀàÐÍ£¬¸Ã¾ç±¾»áÏÂÔØ²î±ðµÄÄÚÈÝ£º¹ØÓÚÄ¿µÄ·Ã¿Í£¬»áÏÂÔØ¶ñÒâÈí¼þµ½ÅÌËã»úÉÏ£¬ÔÊÐíÍþвÐÐΪÕßÍêÈ«»á¼ûÊÜѬȾװ±¸£»¹ØÓÚ·ÇÄ¿µÄ¹¤¾ß£¬Èç¶ñÒâÈí¼þÆÊÎöɳÏ䣬Ôò»áÏÂÔØ²¢ÔËÐÐÕýµ±µÄMicrosoft Visual C++ Redistributable¡£´ÓÒÑÍùÔ˶¯¿´£¬´Ë´Î¹¥»÷ºÜ¿ÉÄÜÈö²¥ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬ÄÜÇÔÈ¡ä¯ÀÀÆ÷cookie¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍä¯ÀÀÀúÊ·¼Í¼£¬»¹ÄÜÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢Ë½Ô¿ºÍÃô¸ÐÎı¾Îļþ¡£
https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/
2. ÐéαAIÊÓÆµ¹¤¾ßÈö²¥Noodlophile¶ñÒâÈí¼þ
5ÔÂ10ÈÕ£¬½üÆÚ£¬ÐéαÈ˹¤ÖÇÄÜÊÓÆµÌìÉú¹¤¾ß±»ÍøÂç·¸·¨·Ö×ÓʹÓã¬Èö²¥ÃûΪ¡°Noodlophile¡±µÄÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼Ò×å¡£ÕâЩ¶ñÒâÍøÕ¾Ê¹Óá°ÃÎÏë»úе¡±µÈÓÕÈËÃû³Æ£¬ÔÚFacebook¸ß×ÅÃû¶ÈȺ×éÖдò¹ã¸æ£¬Ã°³äÏȽøÈ˹¤ÖÇÄܹ¤¾ß£¬ÓÕÆÓû§ÉÏ´«ÎļþÒÔÌìÉúÊÓÆµ¡£Morphisec·¢Ã÷£¬NoodlophileÔÚ°µÍøÂÛ̳ÉϳöÊÛ£¬³£Óë¡°»ñÈ¡Cookie+Pass¡±·þÎñÀ¦°ó£¬ÓëÔ½ÄÏÓïÔËÓªÉÌÏà¹Ø£¬ÊÇÒ»ÖÖÐÂÐͶñÒâÈí¼þ¼´·þÎñÐж¯¡£ÆäѬȾÁ´Îª¶à½×¶ÎÀú³Ì£ºÊܺ¦Õß»á¼û¶ñÒâÍøÕ¾²¢ÉÏ´«Îļþºó£¬»áÊÕµ½Ò»¸ö°üÀ¨ÓÕÆÐÔ¿ÉÖ´ÐÐÎļþ£¨Video Dream MachineAI.mp4.exe£©µÄZIP´æµµ£¬¸ÃÎļþ¿´ËÆMP4ÊÓÆµ£¬ÊµÎªÖØÐÂʹÓõÄCapCutÊÓÆµ±à¼¹¤¾ß°æ±¾£¬ÓÃÒÔÌÓ±ÜÓû§ÏÓÒɺͲ¿·ÖÇå¾²½â¾ö¼Æ»®¼ì²â¡£Ë«»÷¸ÃÎļþºó£¬»áÖ´ÐÐһϵÁпÉÖ´ÐÐÎļþ£¬×îÖÕÆô¶¯Åú´¦Öóͷ£¾ç±¾£¬Ê¹ÓÃÕýµ±Windows¹¤¾ß½âÂë²¢ÌáÈ¡ÊÜÃÜÂë±£»¤µÄRARÎļþ£¬Í¬Ê±Ìí¼Ó×¢²á±íÏîÒÔʵÏÖ³¤ÆÚÐÔ¡£Ëæºó£¬Ö´ÐдÓÔ¶³Ì·þÎñÆ÷»ñÈ¡µÄ»ìÏýPython¾ç±¾£¬ÔÚÄÚ´æÖÐÖ´ÐÐNoodlophile Stealer¡£NoodlophileÖ¼ÔÚÇÔÈ¡ÍøÂçä¯ÀÀÆ÷ÉÏ´æ´¢µÄÊý¾Ý£¬ÈçÕË»§Æ¾Ö¤¡¢»á»°cookie¡¢ÁîÅÆºÍ¼ÓÃÜÇ®±ÒÇ®°üÎļþ£¬²¢Í¨¹ýTelegram»úеÈËй¶Êý¾Ý£¬¸Ã»úеÈ˳䵱Òþ²ØµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷¡£
https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-drop-new-noodlophile-infostealer-malware/
3. AscensionÊý¾Ýй¶ӰÏ쳬43ÍòÃû»¼Õß
5ÔÂ9ÈÕ£¬ÃÀ¹úAscensionÒ½ÁƱ£½¡ÏµÍ³¿ËÈÕ͸¶£¬ÉϸöÔ±¬·¢ÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬Áè¼Ý43ÍòÃû»¼ÕßµÄСÎÒ˽¼ÒºÍÒ½ÁƱ£½¡ÐÅÏ¢Ô⵽й¶¡£¾ÝAscensionÔÚ4Ô·ݷ¢Ë͸øÊÜÓ°ÏìÕßµÄ֪ͨÐÅÏÔʾ£¬ÕâЩÐÅÏ¢ÔÚÈ¥Äê12ÔµÄÒ»´ÎÊý¾Ý͵ÇÔ¹¥»÷Öб»µÁ£¬¹¥»÷Éæ¼°AscensionµÄһλǰÉÌҵͬ°é¡£¹¥»÷Õß»ñÈ¡ÁËÓ뻼ÕßסԺ¾ÍÕïÏà¹ØµÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¬ÈçÒ½ÉúÐÕÃû¡¢ÈëÔººÍ³öÔºÈÕÆÚ¡¢Õï¶ÏºÍÕ˵¥´úÂëµÈ£¬»¹°üÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬ÈçÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúÈÕÆÚ¡¢ÖÖ×å¡¢ÐÔ±ðºÍÉç»áÇå¾²ºÅÂëµÈ¡£AscensionÔÚ»ñϤDZÔÚÇå¾²ÊÂÎñºóÁ¬Ã¦Õö¿ªÊӲ죬²¢ÓÚ½ñÄê1ÔÂ21ÈÕÈ·¶¨£¬ÆäÎÞÒâÖÐÏòǰÉÌҵͬ°éй¶ÁËÐÅÏ¢£¬ÇÒ²¿·ÖÐÅÏ¢¿ÉÄÜÒòǰÉÌҵͬ°éʹÓõĵÚÈý·½Èí¼þÎó²î¶ø±»ÇÔÈ¡¡£Ö»¹ÜAscensionÆäʱδ͸¶ÊÜÓ°Ïì×ÜÈËÊý£¬µ«ºóÐøÎļþÏÔʾ£¬´Ë´ÎÊÂÎñÓ°ÏìÁ˵¿ËÈøË¹ÖݵÄ11Íò¶àÈË£¬ÂíÈøÖîÈûÖÝÒ²ÓÐ96ÃûסÃñµÄÒ½ÁƼͼºÍÉç»áÇå¾²ºÅÂ뱻й¶¡£±ðµÄ£¬Ascension»¹ÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿Ìá½»µÄÎļþÖÐÅû¶£¬´Ë´ÎÊý¾Ýй¶¹²Ó°ÏìÁË43Íò¶àÈË¡£AscensionΪÊÜÓ°ÏìÓû§ÌṩÁËÁ½ÄêµÄÃâ·ÑÉí·Ý¼à¿Ø·þÎñ¡£
https://www.bleepingcomputer.com/news/security/ascension-says-recent-data-breach-affects-over-430-000-patients/
4. Ö´·¨²¿·Ö´Ý»ÙÔËÓª20ÄêµÄ½©Ê¬ÍøÂç
5ÔÂ9ÈÕ£¬Ö´·¨²¿·Ö¿ËÈÕ´Ý»ÙÁËÒ»¸öÔËÓª20ÄêµÄ½©Ê¬ÍøÂ磬¸ÃÍøÂçͨ¹ý¶ñÒâÈí¼þѬȾÁËÊýǧ̨¾ÉʽÎÞÏß»¥ÁªÍøÂ·ÓÉÆ÷£¬²¢½¨ÉèÁËAnyproxyºÍ5socksÁ½¸öסլÊðÀíÍøÂç¡£ÃÀ¹ú˾·¨²¿ÆðËßÁËÈýÃû¶íÂÞ˹¹«ÃñºÍÒ»Ãû¹þÈø¿Ë˹̹¹«Ãñ£¬Ö¸¿ØËûÃǼÓÈëÔËÓª²¢´ÓÖÐ׬Ǯ¡£´Ë´ÎÐж¯ÓÉÃÀ¹úÕþ¸®ÓëºÉÀ¼¹ú¼Ò¾¯Ô±¾Ö¡¢ºÉÀ¼¹«¹²Éó²é»ú¹Ø¡¢Ì©¹ú»Ê¼Ò¾¯Ô±¾ÐİLumen TechnologiesÆìÏÂBlack Lotus LabsÆÊÎöʦÍŽῪչ¡£½©Ê¬ÍøÂç×Ô2004ÄêÆð±ãʹÓöñÒâÈí¼þѬȾ·ÓÉÆ÷£¬ÔÊÐíδ¾ÊÚȨ»á¼û×°±¸£¬²¢½«Æä×÷ΪÊðÀí·þÎñÆ÷³öÊÛ¡£Óû§ÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÖ±½ÓÅþÁ¬ÊðÀí£¬µ¼Ö´ó×Ú¶ñÒâÐÐΪÕß¿ÉÄÜ»ñµÃÃâ·Ñ»á¼ûȨÏÞ¡£´ËÀàÊðÀí·þÎñÒþ²ØÐÔÇ¿£¬ÄܱܿªÍøÂç¼à¿Ø¹¤¾ß£¬±»ÓÃÓÚ¹ã¸æÚ²Æ¡¢DDoS¹¥»÷µÈ¶àÖÖ²»·¨ÐÐΪ¡£Óû§ÐèÖ§¸¶¶©ÔÄ·Ñ£¬¶øËÄÃû±»¸æÍ¨¹ý³öÊÛ¶ÔAnyproxy½©Ê¬ÍøÂçÊÜѬȾ·ÓÉÆ÷²¿·ÖµÄ»á¼ûȨÏÞ£¬ÊÕÈ¡Á˾޶î×ʽð¡£ËûÃÇʹÓöíÂÞ˹ºÍºÉÀ¼µÈµØµÄ·þÎñÆ÷À´ÔËÓªÍøÕ¾ºÍÖÎÀí½©Ê¬ÍøÂç¡£ËÄÈ˾ù±»Ö¸¿Ø·¸ÓÐͬı×ïºÍÆÆËðÊܱ£»¤ÅÌËã»ú×ÆäÖÐÁ½ÈË»¹±»Ö¸¿ØÐéαע²áÓòÃû¡£
https://www.bleepingcomputer.com/news/security/police-dismantles-botnet-selling-hacked-routers-as-residential-proxies/
5. ÍøÂç´¹ÂÚ¹¥»÷ʹÓÃBlob URIÈÆ¹ýÇå¾²ÇÔȡƾ֤
5ÔÂ9ÈÕ£¬Cofense IntelligenceÕ¹ÏÖÁËÒ»ÖÖÐÂÐÍÍøÂç´¹ÂÚÊÖÒÕ£¬¸ÃÊÖÒÕʹÓÃblob URIÔÚÓû§ä¯ÀÀÆ÷Öн¨ÉèÍâµØÐéαµÇÂ¼Ò³Ãæ£¬ÒÔÈÆ¹ýµç×ÓÓʼþÇå¾²»úÖÆ²¢ÇÔÈ¡Óû§Æ¾Ö¤¡£ÕâÖÖÊÖÒÕ×Ô2022ÄêÖÐÆÚ·ºÆðÒÔÀ´£¬ÕýÈÕÒæ±»ÍøÂç·¸·¨·Ö×ÓËùʹÓã¬ËûÃÇͨ¹ýµç×ÓÓʼþ½«Æ¾Ö¤´¹ÂÚÒ³ÃæÖ±½Ó·¢Ë͵½Óû§ÊÕ¼þÏä¡£Blob URIÔ±¾ÊÇÖ¸Ïòä¯ÀÀÆ÷ÉúÑÄÔÚÓû§ÅÌËã»úÉϵÄÔÝʱÊý¾ÝµÄµØµã£¬³£ÓÃÓÚÕýµ±Web¹¦Ð§£¬ÈçYouTubeµÄÊÓÆµÊý¾ÝÔÝʱ´æ´¢¡£È»¶ø£¬ÆäÍâµØ»¯ÌØÕ÷£¬¼´Ò»¸öä¯ÀÀÆ÷½¨ÉèµÄBlob URIÎÞ·¨±»ÆäËûä¯ÀÀÆ÷»á¼û£¬È´±»ÍþвÐÐΪÕßʹÓÃÀ´ÊµÑé¶ñÒâ¹¥»÷¡£ÓÉÓÚBlob URIÊý¾Ý²»ÔÚͨÀý»¥ÁªÍøÉÏ£¬µç×ÓÓʼþÇ徲ϵͳÄÑÒÔ¼ì²âµ½ÆäÖеÄÓк¦ÐéαµÇÂ¼Ò³Ãæ¡£µ±Óû§µã»÷´¹ÂÚÓʼþÖеÄÁ´½Óʱ£¬ËûÃÇͨ³£»á±»Ö¸µ¼ÖÁÒ»¸öÊÜÐÅÍеÄÕæÊµÍøÕ¾£¬ËæºóÔÙ±»Öض¨Ïòµ½¹¥»÷Õß¿ØÖƵÄÒþ²ØÍøÒ³¡£Õâ¸öÒþ²ØÍøÒ³»áʹÓÃBlob URIÔÚÓû§ä¯ÀÀÆ÷ÖÐÖ±½Ó½¨ÉèÐéαµÇÂ¼Ò³Ãæ£¬ÇÔÈ¡Óû§ÃûºÍÃÜÂë¡£ÕâÖÖÊÖÒÕ¶Ô×Ô¶¯»¯Ç徲ϵͳ£¬ÓÈÆäÊÇÇå¾²µç×ÓÓʼþÍø¹Ø(SEG)×é³ÉÁËÌôÕ½£¬ÓÉÓÚ»ùÓÚÈ˹¤ÖÇÄܵÄÇ徲ģ×Ó¿ÉÄÜÉÐδ³ä·ÖѵÁ·ÒÔÇø·ÖBlob URIµÄÕýµ±Óë¶ñÒâÓÃ;¡£
https://hackread.com/phishing-attack-blob-uri-fake-login-pages-browser/
6. ÄϷǺ½¿ÕÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾
5ÔÂ8ÈÕ£¬ÄϷǺ½¿Õ¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬µ¼ÖÂÆä¹Ù·½ÍøÕ¾¡¢¶à¸öÄÚ²¿ÔËӪϵͳ¼°Òƶ¯Ó¦ÓóÌÐòÔÝʱÖÐÖ¹¡£²»¹ý£¬¹«Ë¾ITÍŶÓÒÑ¿ØÖÆÊÂ̬£¬²¢½«½¹µãº½°àÔËÓªµÄ×ÌÈŽµÖÁ×îµÍ¡£ÔÚÖܶþÐû²¼µÄÉùÃ÷ÖУ¬ÄϷǺ½¿ÕÇ¿µ÷Òªº¦¿Í·þÇþµÀÈç¿Í»§·þÎñÖÐÐĺÍÏúÊ۰칫ÊÒÒ»Á¬ÔËÐУ¬ÇÒËùÓÐÊÜÓ°ÏìÆ½Ì¨Òѻָ´Õý³£¹¦Ð§¡£¹ØÓÚ´Ë´ÎÊÂÎñÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ£¬¹«Ë¾Î´Óè»ØÓ¦¡£Ê×ϯִÐйÙÔ¼º²¡¤ÀĪÀÌåÏÖ£¬¹«Ë¾ÕýÔÚÊÓ²ìÊÂÎñ»ù´¡Ôµ¹ÊÔÓÉ£¬²¢ºË²éÃô¸ÐÐÅÏ¢ÊÇ·ñÍâй£¬Í¬Ê±ÒÑÏò¹ú¼ÒÇå¾²¾Ö¡¢ÄϷǾ¯Ô±¾ÐİÐÅÏ¢î¿Ïµ»ú¹¹±¨¸æ´ËÊ¡£ÄϷǺ½¿ÕÔÊÐí£¬ÈôÈ·Èϱ£´æÐÅÏ¢±»µÁ½«Í¨ÖªÊÜÓ°ÏìÖ°Ô±¡£´Ë´Î¹¥»÷ÊÇÄÏ·ÇÒªº¦»ú¹¹Ò»Á¬ÔâÊÜÍøÂç·¸·¨¹¥»÷µÄÓÖÒ»°¸Àý£¬´ËǰÀÕË÷ÍÅ»ïÔøÐ¹Â¶×ÜͳСÎÒ˽¼ÒÁªÏµ·½·¨¡¢ÇÔÈ¡¹ú·À²¿Êý¾Ý£¬¹úÓÐÒøÐС¢ÄÜÔ´¾ÞÍ·µÈÒ²½ÓÁ¬ÓöÏ®¡£ÃæÁÙÓúÑÝÓúÁÒµÄÍøÂçÍþв£¬ÄÏ·ÇÕþ¸®ÓÚ½ñÄê4Ô³ǫ̈ÐÂ¹æ£¬Ç¿ÖÆÒªÇóËùÓлú¹¹ÏòÐÅÏ¢î¿Ïµ»ú¹¹±¨¸æÍøÂç¹¥»÷£¬ÒÔÔöǿСÎÒ˽¼ÒÐÅÏ¢Çå¾²ÊÂÎñµÄ¼à¿Ø¡£ÕâÏîÁ¢·¨³ǫ֮̈¼Ê£¬ÕýÖµÄϷǺ½¿ÕµÈ¹úÓÐÆóÒµ´Óºã¾Ã²ÆÎñΣ»úÖÐËÕÐѵÄÒªº¦Ê±ÆÚ£¬¸Ãº½Ë¾2024Äê²ÅʵÏÖ13ÄêÀ´Ê×´ÎÓ¯Àû£¬´ËǰÒÑÀۼƽÓÊÜÕþ¸®×¢×ÊÔ¼137ÒÚÔªÈËÃñ±Ò¡£
https://therecord.media/south-african-airways-cyberattack-disrupted


¾©¹«Íø°²±¸11010802024551ºÅ