FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ

Ðû²¼Ê±¼ä 2025-05-19

1. FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ


5ÔÂ18ÈÕ £¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©·¢³öÖÒÑÔ £¬³Æ±£´æÒ»ÖÖÖØ´óµÄÓïÒôÍøÂç´¹ÂںͶÌÐÅÍøÂç´¹ÂÚÔ˶¯ £¬¶ñÒâÈËÊ¿ÕýʹÓÃÈ˹¤ÖÇÄÜ£¨AI£©¿ªÕ¹ÓÕÆ­ÐÐΪ £¬ÍþвÈÕÒæÑÏÖØ ¡£×Ô2025Äê4ÔÂÒÔÀ´ £¬¡°¶ñÒâÐÐΪÕß¡±ÔËÓá°¶ÌÐÅÍøÂç´¹ÂÚ¡±ºÍ¡°ÓïÒôÍøÂç´¹ÂÚ¡±ÊÖÒÕ £¬½¨Éè¿´ËÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÓïÒô±¸Íü¼ £¬ÍŽáÓÕÆ­ÐÔ¶ÌÐŹ¥»÷ÏÖÈÎ/ǰÈÎÕþ¸®¹ÙÔ±¼°ÆäͨѶ¼ÖеÄСÎÒ˽¼Ò £¬ÊÔͼÓëÄ¿µÄ½¨ÉèÐÅÍкÍÁªÏµ ¡£FBIÃ÷È·ÌáÐÑÃñÖÚ £¬ÊÕµ½Éù³ÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÐÂÎŲ»¿ÉÇáÐÅ ¡£Ò»µ©ÁªÏµÉÏÄ¿µÄ £¬·¸·¨·Ö×Ó»áÊÔͼ»á¼ûÆäСÎÒ˽¼ÒÕË»§ £¬ÈçÔÚÐÅÏ¢Öз¢ËͶñÒâÁ´½Ó £¬ÓÕµ¼Êܺ¦Õßµã»÷ºó×ªÒÆµ½Ëùν¸üÇå¾²µÄÐÂÎÅÆ½Ì¨ £¬ÊµÔò¿ÉÄÜÖ¸µ¼Óû§½øÈë¶ñÒâÍøÕ¾ £¬ÇÔÈ¡µÇ¼ƾ֤»ò×°ÖöñÒâÈí¼þ ¡£Ò»´ÎÀÖ³ÉÈëÇÖ¿ÉÄÜÒý·¢Á¬Ëø·´Ó¦ £¬²»·¨·Ö×Ó¿ÉÄÜʹÓñ»µÁÕË»§¹¥»÷ÆäËûÃÀ¹ú¹ÙÔ±»òÆäͬ»ï £¬ÇÔÈ¡µÄÐÅÏ¢ÓÃÓÚÖÆÔìð³äÕË»§»òÌᳫ½øÒ»²½Éç»á¹¤³Ì¹¥»÷ £¬Í¨¹ýÉç»á¹¤³ÌѧÊֶλñÈ¡µÄÁªÏµÐÅÏ¢Ò²¿ÉÄܱ»ÓÃÀ´Ã°³äÁªÏµÈËÇÔÊØÐÅÏ¢»ò×ʽð ¡£FBIËäδ͸¶±»Ã°³äµÄÏêϸ¹ÙÔ± £¬µ«Í¨¸æÅú×¢´ó¶¼Ä¿µÄÊÇ¡°ÏÖÈλòǰÈÎÃÀ¹úÁª°î»òÖÝÕþ¸®¸ß¼¶¹ÙÔ±¼°ÆäÁªÏµÈË¡± £¬ÕâÊÇÒ»³¡Õë¶ÔÕÆÎÕDZÔÚÃô¸ÐÐÅÏ¢»ò»á¼ûȨÏÞСÎÒ˽¼ÒµÄÆÕ±é¹¥»÷Ô˶¯ ¡£


https://hackread.com/fbi-warn-ai-voice-scams-impersonate-us-govt-officials/


2. BSHÔâÀÕË÷Èí¼þ¹¥»÷ £¬²©Í¨Ô±¹¤Êý¾ÝÔâй¶


5ÔÂ17ÈÕ £¬Ð½×Ê·þÎñ¾ÞÍ·ADPµÄÖж«ÏàÖúͬ°éBSHÔÚ2024Äê9ÔÂÔâÀÕË÷Èí¼þ¹¥»÷ £¬Ö²©Í¨Ô±¹¤Ãô¸ÐÊý¾Ýй¶ ¡£²©Í¨ÔøÊ¹ÓÃADP´¦Öóͷ£ÈËΪµ¥ £¬BSHÊÇADPÖж«ÇøÓò¹©Ó¦ÉÌ £¬Ë䲩ͨÆäʱÒÑ×îÏÈ·ÅÆúADPºÍBSH £¬µ«Çл»Î´Íê³Éʱ¹¥»÷ÒÑ·¢¶¯ ¡£ÊÂÎñʱ¼äÏßÏÔʾÆóÒµ¼à¿ØºÍ±£»¤¹©Ó¦ÉÌÉúÌ¬ÏµÍ³ÃæÁÙÌôÕ½ ¡£BSH/ADPÓÚ2024Äê9ÔÂÏÂÑ®·¢Ã÷ÈëÇÖ £¬Ö±µ½12Ô²ÅÒâʶµ½Ô±¹¤Êý¾Ý±»Ð¹Â¶µ½»¥ÁªÍø ¡£Òò±»µÁÐÅϢΪ¡°·Ç½á¹¹»¯ÃûÌá± £¬BSHºÍADPÔÚÈ·¶¨ÊÜÓ°ÏìÊý¾ÝºÍСÎÒ˽¼Ò¹æÄ£ÉÏÔâÓöÖØ´óÑÓÎó £¬²©Í¨Ö±µ½2025Äê5ÔÂ12ÈÕ²ÅÊÕµ½¾¯±¨ £¬¾àÀëÊ×´ÎÈëÇÖ½ü°Ë¸öÔ ¡£ÄÚ²¿ÓʼþÅú×¢ £¬È·¶¨ÊÜÓ°ÏìÔ±¹¤ºÍÊý¾Ý×ֶζÔBSH/ADPÊÇÂþ³¤Àú³Ì £¬µ¼ÖÂÔ±¹¤ºã¾Ã²»È·¶¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ÊÇ·ñй¶ ¡£TechNadu±¨µÀ³Æ £¬El DoradoÀÕË÷Èí¼þ×éÖ¯²ß»®Á˴˴ι¥»÷ £¬¸Ã×éÖ¯³£¹¥»÷µÚÈý·½·þÎñÌṩÉ̲¢ÇÔȡԱ¹¤Êý¾Ý ¡£ÕâÅú×¢ÍøÂç·¸·¨·Ö×ÓÕýÃé×¼´óÐÍ×éÖ¯Êý×Ö¹©Ó¦Á´±¡Èõ»·½Ú ¡£²©Í¨ÂÄÀúÓëÒµ½ç¶Ô¹©Ó¦ÉÌΣº¦ÖÎÀíµ£ÐÄÒ»Ö £¬Ð½×Ê·þÎñÌṩÉÌת»»Àú³ÌÖØ´ó £¬BSHºÍADPδʵʱÅû¶Υ¹æÐÐΪ¼Ó¾çÄæ¾³ ¡£Á½¼Ò¹«Ë¾ÒÑÓëÖ´·¨²¿·ÖºÍÊý¾Ý±£»¤»ú¹¹ÁªÏµ £¬²¢½ÓÄɲ½·¥Ç¿»¯BSHÇéÐÎ ¡£


https://www.webpronews.com/ransomware-attack-on-adp-partner-exposes-broadcom-employee-data/


3. Ç×ÎÚ¿ËÀ¼×é֯ʹÓÃPythonºóÃŹ¥»÷¶íÂÞ˹¿ª·¢Õß


5ÔÂ16ÈÕ £¬ReversingLabsÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öÃûΪdbgpkgµÄαÔìPythonµ÷ÊÔÆ÷Èí¼þ°ü £¬¸ÃÈí¼þ°üαװ³Éµ÷ÊÔ¹¤¾ß £¬ÊµÔòÉñÃØÔÚ¿ª·¢ÕßϵͳÖÐÖ²ÈëºóÃÅÒÔÇÔÈ¡Êý¾Ý ¡£RLÏÓÒɴ˹¥»÷±³ºóÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼µÄºÚ¿Í×éÖ¯ £¬¸Ã×éÖ¯ÒÔÖ§³ÖÎÚ¿ËÀ¼¡¢Õë¶Ô¶íÂÞ˹ÀûÒæ¶øÖøÃû ¡£dbgpkg²»°üÀ¨ÏÖʵµ÷ÊÔ¹¦Ð§ £¬¶øÊÇÓÕÆ­¿ª·¢Ö°Ô±×°ÖúóÃÅ £¬½«Æä¿ª·¢»úеÄð³ÉÊÜѬȾ×ʲú ¡£ÆäÖ²ÈëºóÃŵÄÒªÁìÖØ´ó £¬Ê¹Óá°º¯Êý°ü×°¡±»ò¡°×°ÊÎÆ÷¡±ÊÖÒÕÐ޸ıê×¼PythonÍøÂ繤¾ßÐÐΪ £¬Ê¹¶ñÒâ´úÂëÔÚ¿ª·¢Ö°Ô±Ê¹ÓÃÍøÂ纯ÊýǰһֱÒþ²Ø ¡£¶ñÒâ°ü×°Æ÷´úÂë»á¼ì²éÌØ¶¨Îļþ £¬ÈôºóÃŲ»±£´æÔòÖ´ÐÐÈý¸öÏÂÁî £¬°üÀ¨´ÓÔÚÏßPastebin·þÎñÏÂÔØ¹«Ô¿¡¢×°ÖÃÈÆ¹ý·À»ðǽµÄ¹¤¾ßGlobal Socket Toolkit²¢¼ÓÃÜÅþÁ¬ºóÃÅËùÐèÃÜÔ¿¡¢½«¼ÓÃÜÃÜÔ¿·¢Ë͵½Ë½ÃÜÔÚÏßλÖà £¬¶à½×¶ÎÀú³ÌÓë¶ÔÊÜÐÅÍÐÄ £¿éʹÓú¯Êý°ü×°Æ÷ÔöÌíÁ˶ñÒâÔ˶¯¼ì²âÄÑ¶È ¡£RLÑо¿Ö°Ô±»¹·¢Ã÷¸ÃºóÃÅÓëÇ×ÎÚ¿ËÀ¼µÄPhoenix HyenaºÚ¿Í×éÖ¯ÏÈǰʹÓõĶñÒâÈí¼þÓÐÏàËÆÖ®´¦ £¬¸Ã×éÖ¯×Ô2022ÄêÒÔÀ´»îÔ¾ £¬ÒÔÕë¶Ô¶íÂÞ˹ʵÌåÖø³Æ £¬ÇÒ2024Äê9ÔÂÉæÏÓÈëÇÖ¶íÂÞË¹ÍøÂçÇå¾²¹«Ë¾Dr. Web ¡£


https://hackread.com/ukraine-group-russian-developers-python-backdoor/


4. ÀÕË÷Èí¼þÍÅ»ïÇàíùSkitnet¶ñÒâÈí¼þ


5ÔÂ16ÈÕ £¬ÀÕË÷Èí¼þÍÅ»ïÕýÔ½À´Ô½¶àµØÊ¹ÓÃÃûΪSkitnet£¨¡°Bossnet¡±£©µÄжñÒâÈí¼þ £¬ÔÚ±»¹¥ÆÆµÄÍøÂçÖÐÖ´ÐÐÒþÃØµÄºóʹÓÃÔ˶¯ ¡£¸Ã¶ñÒâÈí¼þ×Ô2024Äê4ÔÂÆðÔÚµØÏÂÂÛ̳³öÊÛ £¬µ«×Ô2025ÄêÍ·ÒÔÀ´ £¬ÔÚÀÕË÷Èí¼þÍÅ»ïÖÐÊܵ½ÏÔÖø¹Ø×¢ ¡£ProdaftÑо¿Ö°Ô±ÊӲ쵽 £¬¶à¸öÀÕË÷Èí¼þ²Ù×÷ÔÚÏÖʵ¹¥»÷Öа²ÅÅÁËSkitnet £¬ÈçÕë¶ÔÆóÒµµÄMicrosoft TeamsÍøÂç´¹ÂÚ¹¥»÷ÖеÄBlackBastaºÍCactus ¡£SkitnetµÄѬȾʼÓÚÔÚÄ¿µÄϵͳÉϰ²ÅŲ¢Ö´ÐлùÓÚRustµÄ¼ÓÔØÆ÷ £¬¸Ã¼ÓÔØÆ÷½âÃÜChaCha20¼ÓÃܵÄNim¶þ½øÖÆÎļþ²¢¼ÓÔØµ½ÄÚ´æÖÐ ¡£NimÓÐÓøºÔؽ¨Éè»ùÓÚDNSµÄ·´Ïòshell £¬ÓÃÓÚÓëC2·þÎñÆ÷ͨѶ £¬²¢Ê¹ÓÃËæ»úDNSÅÌÎÊÆô¶¯»á»° ¡£¶ñÒâÈí¼þÆô¶¯Èý¸öÏß³Ì £¬»®·ÖÓÃÓÚ·¢ËÍÐÄÌøDNSÇëÇó¡¢¼àÊÓºÍй¶shellÊä³ö¡¢¼àÌýÏ¢ÕùÃÜÀ´×ÔDNSÏìÓ¦µÄÏÂÁî ¡£Í¨Ñ¶ºÍ´ýÖ´ÐеÄÏÂÁîͨ¹ýHTTP»òDNS·¢ËÍ £¬»ùÓÚSkitnet C2¿ØÖÆÃæ°åµÄÖ¸Áî ¡£SkitnetÖ§³Ö¶àÖÖÏÂÁî £¬°üÀ¨½¨É賤ÆÚÐÔ¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢ÏÂÔØ²¢¾²Ä¬×°ÖÃÕýµ±µÄÔ¶³Ì»á¼û¹¤¾ß¡¢Æô¶¯PowerShellÏÂÁîÑ­»·ÒÔ¼°Ã¶¾ÙÒÑ×°ÖõķÀ²¡¶¾ºÍÇå¾²Èí¼þµÈ ¡£±ðµÄ £¬²Ù×÷Ô±»¹¿ÉʹÓÃÉæ¼°.NET¼ÓÔØÆ÷µÄ¹¦Ð§ £¬ÔÚÄÚ´æÖÐÖ´ÐÐPowerShell¾ç±¾ £¬ÊµÏÖ¸üÉîÌõÀíµÄ¹¥»÷¶¨ÖÆ ¡£


https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/


5. °²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÀÕË÷¹¥»÷ÖÂÊý¾Ýй¶


5ÔÂ15ÈÕ £¬2Ô·ݰ²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÓöÍøÂç¹¥»÷ £¬µ¼Ö»¼ÕßÉñÃØÊý¾Ýй¶ ¡£´Ë´ÎÊÂÎñÒý·¢ÏØÕþ¸®´óÂ¥ÔÝʱ¹Ø±Õ £¬²¢Ó°Ïì¶àÏîסÃñ·þÎñ ¡£ÏØÕþ¸®ÓÚ2ÔÂ22ÈÕÊ״βì¾õ´Ë´Î¹¥»÷ £¬²¢Á¬Ã¦ÍŽáÐÐÒµÁìÏȵÄÍøÂçÇ徲ר¼Ò¡¢Ö´·¨»ú¹¹¼°Ïà¹ØÖÝÕþ¸®»ú¹¹Õö¿ªÊÓ²ì ¡£ÊÓ²ìЧ¹ûÏÔʾ £¬´Ë´ÎÊÂÎñΪÍⲿÍþвÐÐΪÕßÌᳫµÄÀÕË÷Èí¼þ¹¥»÷ £¬¹¥»÷±¬·¢ÔÚ1ÔÂ28ÈÕÖÁ2ÔÂ22ÈÕʱ´ú £¬¡°¸ÃÏØÍøÂçµÄһС²¿·Ö¡±Ôâµ½ÈëÇÖ £¬Ê±´úijЩÎļþ±»Î´¾­ÊÚȨ»á¼û»òÏÂÔØ ¡£×¨¼ÒÖ¸³ö £¬ÀÕË÷Èí¼þ¹¥»÷ÖÐ £¬ºÚ¿Íͨ³£ÇÖÈëϵͳ¼ÓÃÜ»òËø¶¨Ãü¾Ý £¬²¢ÒªÇóÖ§¸¶Êê½ðÒÔÊÍ·ÅÐÅÏ¢ ¡£µ±±»Îʼ°ÊÇ·ñÒÑÖ§¸¶Êê½ðʱ £¬½²»°ÈËÌåÏÖÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ £¬ÎÞ·¨Í¸Â¶Ïà¹ØÐÅÏ¢ ¡£ÏÖÔÚ £¬¸ÃÏØÕýÓëÕÕÁÏÏàÖú £¬ÒÔÈ·¶¨ÄÄЩÎļþ±»Ð¹Â¶ £¬Éв»ÇåÎúÊÜÓ°ÏìÈËÊý ¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÓû§µÄÈ«Ãû¡¢µØµã¼°Ò½ÁÆÕï¶ÏµÈÐÅÏ¢ £¬Ö»¹Ü²ÆÎñÐÅϢδÊÜй¶ £¬µ«¹ÙÔ±ÈÔÃãÀø×¡Ãñ¼á³ÖСÐÄ £¬Í¨¹ýÉó²éÕË»§±¨±í¡¢ÐÅÓñ¨¸æµÈÌá·ÀÉí·Ý͵ÇÔ ¡£


https://www.thebaltimorebanner.com/community/local-news/cybersecurity-ransomware-anne-arundel-county-cyberattack-FYSLHXQANFCHBBCBDJWNDVUW6Q/


6. EffortelÊý¾Ýй¶Ö±ÈÀûʱMVNOÆßÍò¿Í»§ÐÅÏ¢Íâй


5ÔÂ16ÈÕ £¬½üÆÚ £¬ÓÉÓÚEffortel±¬·¢Êý¾Ýй¶ÊÂÎñ £¬µ¼ÖÂÈý¼Ò±ÈÀûÊ±ÒÆ¶¯ÐéÄâÍøÂçÔËÓªÉÌ£¨MVNO£©µÄ70,000Ãû¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶ ¡£Effortel×÷ÎªÒÆ¶¯ÐéÄâÍøÂçÍÆ¶¯Õߣ¨MVNE£© £¬ÔÚµçÐÅÐÐÒµÖÐÊÎÑÝ×ÅÒªº¦½ÇÉ« £¬ËüΪӵÓÐÎïÀíÍøÂçµÄµçÐŹ«Ë¾£¨ÈçProximus£©ÓëÐéÄâµçÐÅÌṩÉÌ£¨ÈçNeibo£©Ö®¼ä´î½¨ÇÅÁº £¬Í¨¹ý¿ª·¢Èí¼þƽ̨ £¬Ê¹ÆóÒµÄܹ»ÒÔMVNOÉí·ÝÔÚµçÐÅÔËÓªÉ̵ÄÎïÀíÍøÂçÉÏÔËÓª £¬¶øÎÞÐè¾ß±¸´ó×ÚÊÖÒÕרҵ֪ʶ ¡£ÏÖÔÚ £¬EffortelΪȫÇò30¶à¼ÒMVNO¿Í»§Ìṩ¿ªÆ±ºÍÅþÁ¬SIM¿¨µÈ·þÎñ ¡£È»¶ø £¬´Ë´ÎÊý¾Ýй¶ÊÂÎñ±¬·¢ÔÚÖÐÑëÊý¾Ý¿âµÄ²âÊÔ½×¶Î £¬EffortelÔÚת´ï¿Í»§Êý¾Ý£¨ÈçÓÃÓÚ½ôÆÈ·þÎñµÄÊý¾Ý£©ÒÔ¾ÙÐÐϵͳ¼¯³Éʱ £¬ÌìÉúÁ˰üÀ¨¿Í»§Êý¾ÝµÄÎļþ £¬ÕâЩÎļþ²»ÐÒ±»Ð¹Â¶ ¡£Ò»ÃûºÚ¿ÍÀÖ³ÉÈëÇÖÁËMVNOºÍTelfortÖ®¼äµÄÖ§³ÖÃÅ»§ £¬»ñÈ¡ÁËÕâЩÎļþµÄ»á¼ûȨÏÞ ¡£´Ë´ÎÐ¹Â¶Éæ¼°¼ÒÀÖ¸£Òƶ¯¡¢NeiboºÍUndoµÈ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢ £¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ롢סլµØµã¡¢»¤ÕÕºÅÂë¡¢Óû§ºÅÂëÒÔ¼°SIM¿¨ºÅµÈÊÖÒÕʶ±ðÊý¾Ý ¡£Effortel×Ü˾ÀíLaurent BatailleÌåÏÖ £¬60%µ½65%µÄÖն˿ͻ§Í¨¹ýÔÚÏßÖ§¸¶È·ÈÏÉí·Ý £¬ÆäÉí·ÝÊý¾Ý²»»á±»´æ´¢ £¬Ö§¸¶IDËä±£´æ £¬µ«Ö»ÄÜͨ¹ýÖ§¸¶ÌṩÉÌÓëСÎÒ˽¼ÒÊý¾Ý¹ØÁª ¡£


https://cybernews.com/security/data-belgian-virtual-telecom-operators-leaked/