Matanbuchus 3.0¶ñÒâÈí¼þ¼ÓÔØÆ÷Éý¼¶

Ðû²¼Ê±¼ä 2025-07-17

1. Matanbuchus 3.0¶ñÒâÈí¼þ¼ÓÔØÆ÷Éý¼¶


7ÔÂ16ÈÕ£¬ÍøÂçÇå¾²ÁìÓò½üÆÚ¾Û½¹ÓÚMatanbuchus¶ñÒâÈí¼þ¼ÓÔØÆ÷бäÖÖ£¨3.0°æ£©µÄÓ¿ÏÖ¡£×÷Ϊһ¿î×Ô2021ÄêÆðÔÚ¶íÓïÍøÂç·¸·¨ÂÛ̳ÒÔ¡°¶ñÒâÈí¼þ¼´·þÎñ¡±£¨MaaS£©Ä£Ê½ÔËÓªµÄ¹¥»÷¹¤¾ß£¬Æä³õʼ°æ±¾ÒÔ2500ÃÀÔªÔÂ×â¼Û±»ÓÃÓÚÈö²¥Cobalt StrikeÐűêºÍÀÕË÷Èí¼þ£¬ÔøÍ¨¹ý¡°ClickFix¡±Ê½ÓÕµ¼¹¥»÷ʵÑéÉøÍ¸¡£¶ø×îÐÂ3.0°æ±¾ÔÚÊÖÒÕ²ãÃæÊµÏÖÖØ´óÉý¼¶£¬Òþ²ØÐÔÓë¹¥»÷ЧÂÊÏÔÖøÌáÉý£¬Òý¿¯ÐÐÒµ¸ß¶ÈСÐÄ¡£Ð°æMatanbuchusµÄ½¹µãÍþвÔÚÓÚÆäÈö²¥Õ½ÂÔÓ빦Чǿ»¯¡£²î±ðÓڹŰåÒÀÀµÀ¬»øÓʼþ»òÎó²îʹÓõÄÀ©É¢·½·¨£¬¸Ã¼ÓÔØÆ÷¸üÒÀÀµ¡°Ö±½Ó½»»¥Ê½Éç»á¹¤³Ìѧ¡±ÊֶΣ¬¹¥»÷Õßͨ¹ýαװÉí·ÝÓÕÆ­Óû§Ö´ÐÐÔ¶³ÌЭÖú¹¤¾ß£¬½ø¶ø°²ÅÅPowerShell¾ç±¾´¥·¢¶ñÒâÔØºÉÏÂÔØ¡£ÕâÖÖ¡°¾«×¼¶¨Î»+È˹¤ÓÕµ¼¡±µÄģʽ£¬Ê¹Æä³ÉΪ³õʼ»á¼û¾­¼ÍÈË£¨IAB£©ÏòÀÕË÷ÍÅ»ï³öÊÛÆóÒµÍøÂçÈë¿ÚµÄ¸ßЧ¹¤¾ß£¬ÍþвÐÔÔ¶³¬Í¨Ë×ÉÌÒµ»¯¼ÓÔØÆ÷¡£ÊÖÒÕ²ãÃæ£¬Matanbuchus 3.0µÄÉý¼¶¾Û½¹ÓÚÈý´óÆ«Ïò£ºÍ¨Ñ¶Ð­ÒéÓÅ»¯¡¢ÄÚ´æ²Ù×÷Ç¿»¯¡¢»ìÏýÊÖÒÕÉý¼¶¡£Æä¹¦Ð§À©Õ¹°üÀ¨Ö§³ÖCMD/PowerShell·´ÏòShell¡¢¿ÉÔËÐÐDLL/EXE/ShellcodeµÈ¶àÀàÐͺóÐøÔØºÉ£¬²¢¾ß±¸Í¨¹ýCOM×é¼þ½»»¥×¢ÈëShellcodeʵÏÖÖØ´óʹÃüµ÷ÀíµÄÄÜÁ¦¡£


https://thehackernews.com/2025/07/hackers-leverage-microsoft-teams-to.html


2. Ó¢¹úCo-opÁãÊÛÉÌÔâÍøÂç¹¥»÷£¬650Íò»áÔ±Êý¾Ýй¶


7ÔÂ16ÈÕ£¬Ó¢¹ú×ÅÃûÁãÊÛÉÌÏàÖúÉ缯ÍÅ£¨Co-op£©¿ËÈÕ֤ʵ£¬½ñÄê4ÔÂÔâÓöµÄ´ó¹æÄ£ÍøÂç¹¥»÷µ¼ÖÂÆäϵͳ̱»¾¡¢ÔÓ»õµêʳÎïǷȱ£¬²¢Ôì³É650Íò»áÔ±µÄСÎÒ˽¼ÒÊý¾Ý±»µÁ¡£¹¥»÷±¬·¢ÓÚ4ÔÂ22ÈÕ£¬ÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÖØÖÃÒ»ÃûÔ±¹¤ÃÜÂ룬ÀÖ³ÉÇÖÈëCo-opÍøÂç¡£Ëæºó£¬¹¥»÷ÕßѸËÙºáÏòÉøÍ¸ÖÁÆäËû×°±¸£¬²¢ÇÔÈ¡ÁËWindows Active Directory·þÎñµÄ½¹µãÊý¾Ý¿âÎļþNTDS.dit¡£¸ÃÎļþ°üÀ¨Óû§ÃÜÂë¹þÏ£Öµ£¬¹¥»÷Õß¿Éͨ¹ýÀëÏßÆÆ½â½øÒ»²½À©´óÍøÂç»á¼ûȨÏÞ¡£×îÖÕ£¬¹¥»÷ÕßÊÔͼ°²ÅÅDragonForceÀÕË÷Èí¼þ¼ÓÃÜÆ÷£¬µ¼ÖÂCo-op±»ÆÈ¹Ø±Õ¶à¸öITϵͳÒÔ×èÖ¹ÍþвÀ©É¢¡£Ö»¹Ü²ÆÎñ¼°ÉúÒâÐÅϢδ±»Ð¹Â¶£¬µ«»áÔ±µÄÁªÏµÐÅÏ¢µÈÃô¸ÐÊý¾ÝÔâÇÔ£¬Ê×ϯִÐйÙShirine Khoury-HaqÔڲɷÃÖÐÌåÏÖ£¬´Ë´ÎÊÂÎñ¡°ÓÌÈçÈËÉí¹¥»÷¡±£¬Ëý¶Ô»áÔ±ºÍÔ±¹¤Êܵ½µÄΣÏÕÉî¸ÐÀ¢¾Î¡£ÊÓ²ìÏÔʾ£¬´Ë´Î¹¥»÷ÓëÃûΪ¡°Scattered Spider¡±µÄºÚ¿Í×éÖ¯ÓйØ¡£¹¥»÷±¬·¢ºó£¬DragonForceÀÕË÷Èí¼þÔËÓªÉÌÉù³Æ¶ÔCo-opÊÂÎñÈÏÕæ£¬²¢ÏòBBCÌṩÁ˱»µÁÊý¾ÝÑù±¾¡£


https://www.bleepingcomputer.com/news/security/co-op-confirms-data-of-65-million-members-stolen-in-cyberattack/


3. BADBOX 2.0ÒÑԤװÔÚÈ«Çò°ÙÍòAndroid×°±¸ÉÏ


7ÔÂ16ÈÕ£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©¿ËÈÕ½«Ò»¿îÃûΪBADBOX 2.0µÄ°²×¿¶ñÒâÈí¼þÁÐΪȫÇòÐÔÍøÂçÍþв¡£¾ÝÇå¾²ÍŶӯÊÎö£¬¸Ã¶ñÒâÈí¼þÒÑÈëÇÖ222¸ö¹ú¼ÒºÍµØÇøµÄ³¬100Íǫ̀װ±¸£¬Æä½¹µãÔÚÓÚͨ¹ýԤװ¹Ì¼þµÄ·½·¨£¬½«µÍ±¾Ç®°²×¿×°±¸×ª»¯Îª½©Ê¬ÍøÂç½Úµã£¬ÉõÖÁÔÚÓû§¹ºÖÃ×°±¸Ç°±ãÒÑDZÔÚÆäÖС£BADBOX 2.0µÄΣÏÕÐÔÔ´ÓÚÆäÆæÒìµÄÈö²¥Ä£Ê½£º²î±ðÓڹŰå¶ñÒâÈí¼þͨ¹ý¶ñÒâÏÂÔØ»òÐéαӦÓÃÈö²¥£¬ËüÖ±½ÓǶÈë×°±¸¹Ì¼þ£¬ÔÚÖÆÔì½×¶Î¼´±»Ô¤×°¡£ÕâÒâζ×ÅÓû§²ð·âÐÂ×°±¸¡¢Ê×´ÎÆô¶¯Ê±±ãÒÑ̻¶ÔÚÍþвÖС£Ñо¿ÏÔʾ£¬ÊÜѬȾװ±¸¶àÀ´×Ôδ¾­ÑÏ¿áÇå¾²Éó²éµÄ¹©Ó¦Á´£¬ÓÈÆäÊÇһЩÎÞÆ·ÅÆ»ò³¬µÍ¼Û²úÆ·£¬²¿·ÖÉõÖÁͨ¹ýÑÇÂíÑ·µÈÖ÷Á÷ƽ̨ÏúÊÛ¡£Ò»µ©¼¤»î£¬¶ñÒâÈí¼þ»áͨ¹ýÔ­ÉúºóÃÅ¿âlibanl.so£¨ÉîǶ¹Ì¼þ£©ÔÚºǫ́¾²Ä¬ÔËÐУ¬×ÝÈ»»Ö¸´³ö³§ÉèÖÃÈÔÎÞ·¨É¨³ý¡£¸Ã¶ñÒâÈí¼þµÄ½¹µã¹¦Ð§Êǽ«×°±¸±äΪ¡°×¡Õ¬ÊðÀíÍøÂ硱½Úµã£¬³öÊÛ¸ø·¸·¨¼¯ÍÅÓÃÓÚÒþ²Øµã»÷ڲƭ¡¢Æ¾Ö¤Ìî³äµÈÍøÂç¹¥»÷µÄ×Ù¼£¡£Æä×é¼þ°üÀ¨´¥·¢¶ñÒâÄ£¿éµÄlibanl.so¡¢ÈÏÕæ³¤ÆÚ»¯µÄJavaÄ£¿ép.jarºÍq.jar£¬ÒÔ¼°ÏµÍ³¼¶Ó¦ÓÃcom.hs.app£¬Í¨¹ý¼ÓÃÜͨѶÓëC2ÓòÃû½»»¥¡£Êܺ¦Õß¿ÉÄܲì¾õ×°±¸Òì³££ºÏÐÖÃʱCPUÕ¼ÓÃÂʸߡ¢·¢ÈÈÑÏÖØ¡¢ÐÔÄÜϽµ»òÍøÂçÁ÷Á¿Òì³££¬µ«ÍùÍùÄÑÒÔ×·ËÝÔ´Í·¡£


https://hackread.com/badbox-2-0-preinstalled-android-iot-devices-worldwide/


4. Å·ÖÞÐ̾¯×éÖ¯µ·»ÙÇ×¶íµÄNoName057(16) DDoSºÚ¿Í×éÖ¯


7ÔÂ16ÈÕ£¬Ò»³¡´úºÅΪ¡°ÒÁË¹ÌØÎ鯷Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯Õë¶ÔÇ×¶íºÚ¿Í×éÖ¯NoName057(16)Õö¿ª¾«×¼¹¥»÷¡£¸ÃÐж¯ÓÉÅ·ÖÞÐ̾¯×éÖ¯ºÍÅ·ÖÞ˾·¨×é֯ǣͷ£¬ÍŽá12¸ö¹ú¼ÒµÄÖ´·¨ÊµÁ¦£¬Ä¿µÄÖ±Ö¸Õâ¸ö×Ô2022ÄêÎÚ¿ËÀ¼Õ½Õù±¬·¢ºó»îÔ¾µÄÇ×¶íºÚ¿ÍÕûÌå¡£NoName057(16)ÒÔTelegramƵµÀºÍ¡°DDoSia¡±ÖÚ°üÏîĿΪ¹¤¾ß£¬Í¨¹ý×ÔÔ¸ÕßÅÌËã»úÌᳫÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬ºã¾ÃÕë¶ÔÅ·ÖÞ¡¢ÒÔÉ«ÁкÍÎÚ¿ËÀ¼µÄÖ§³ÖÎÚ¿ËÀ¼»ú¹¹£¬°üÀ¨±±Ô¼Õ¾µã¡¢Õþ¸®»ú¹¹¡¢ÒøÐС¢ÄÜÔ´¹©Ó¦É̼°Ã½Ìå×éÖ¯¡£¾ÝÅ·ÖÞÐ̾¯×éÖ¯Åû¶£¬¸Ã×éÖ¯µÄ¹¥»÷Ô˶¯ÔøÈÅÂҵ¹ú¡¢²¨À¼¡¢Á¢ÌÕÍðµÈ¹úµÄÒªº¦·þÎñ¡£´Ë´ÎÐж¯ÖУ¬Ö´·¨»ú¹¹ÔÚ7¹úÕö¿ªËѲ飬´Ý»Ù»òÏÂÏß100Óą̀·þÎñÆ÷£¬¾Ð²¶2ÈË£¬²¢·¢³ö7·ÝÅ·Ö޾в¶ÁĿµÄÖ±Ö¸Òþ²ØÓÚ¶íÂÞ˹µÄ½¹µã³ÉÔ±¡£±ðµÄ£¬Õþ¸®Ïò1100Ãû¼ÓÈëÕß¼°17ÃûÖÎÀíÔ±·¢ËÍTelegramÖÒÑÔ£¬Ã÷È·ÆäÖ´·¨ÔðÈΡ£Ö»¹ÜÐж¯¶ÔNoName057(16)Ôì³ÉÖØ´ó¹¥»÷£¬µ«ÒòÆä½¹µã³ÉԱλÓÚ¶íÂÞ˹£¬»ù´¡ÉèÊ©¿ÉÄÜ¿ìËÙÖØÐÞ¡£


https://www.bleepingcomputer.com/news/security/europol-disrupts-pro-russian-noname05716-ddos-hacktivist-group/


5. UNC6148ʹÓÃOverstep¶ñÒâÈí¼þ¹¥»÷¹ýʱSonicWall×°±¸


7ÔÂ16ÈÕ£¬¹È¸èÍþвÇ鱨С×飨GTIG£©¿ËÈÕÖÒÑÔ£¬Ò»¸ö±»×·×ÙΪUNC6148µÄÍþвÐÐΪÕßÕýÕë¶ÔÒÑ¿¢ÊÂÖ§³Öµ«ÈÔÔÚʹÓÃÖеÄSonicWall Secure Mobile Access£¨SMA£©100ϵÁÐ×°±¸ÌᳫÐÂÐ͹¥»÷¡£¸Ã×éÖ¯×Ô2024Äê10ÔÂÆð»îÔ¾£¬Í¨¹ý°²ÅÅδ֪¶ñÒâÈí¼þOVERSTEP£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡¢Æ¾Ö¤µÁÓü°Ç±ÔÚÀÕË÷Èí¼þ°²ÅÅ£¬ÆäÔ˶¯¿ÉÄܹØÁªWorld LeaksÊý¾Ýй¶ƽ̨¡£¹¥»÷Ä¿µÄΪÒÑÍêÈ«ÐÞ²¹µ«ÊÙÃüÖÕÖ¹£¨EoL£©µÄSMA×°±¸£¬ÕâÀà×°±¸Òòȱ·¦³§ÉÌÇå¾²¸üУ¬³ÉΪÎó²îʹÓõÄδ²¡£UNC6148ͨ¹ý¶à¸öÒÑÖªÎó²î£¨ÈçCVE-2025-32819¡¢CVE-2024-38475µÈ£©ÇÔÈ¡ÍâµØÖÎÀíԱƾ֤£¬ËæºóʹÓÃSSL-VPN»á»°½¨Éè·´ÏòShell£¬Ö»¹ÜSonicWall×°±¸Éè¼ÆÉÏեȡShell»á¼û£¬µ«¹¥»÷Õß¿ÉÄÜʹÓÃδ֪ÁãÈÕÎó²îʵÏÖÍ»ÆÆ¡£Ò»µ©»ñµÃȨÏÞ£¬ÍþвÐÐΪÕßÊÖ¶¯É¨³ýϵͳÈÕÖ¾ÒÔÑÚÊÎ×Ù¼££¬²¢°²ÅÅOVERSTEP¶ñÒâÈí¼þ¡£OVERSTEP×÷ΪÓû§Ä£Ê½Rootkit£¬Í¨¹ýÐÞ¸Ä×°±¸Æô¶¯Á÷³ÌʵÏÖ³¤ÆÚ»¯£¬¾ß±¸Òþ²ØÇÔȡƾ֤¡¢»á»°ÁîÅÆ¼°Ò»´ÎÐÔÃÜÂ루OTP£©ÖÖ×ÓµÄÄÜÁ¦¡£Ö»¹ÜδÃ÷È·È·ÈϾ­¼ÃÄîÍ·£¬µ«Êܺ¦×°±¸Êý¾Ý±»Ðû²¼ÖÁWorld LeaksÍøÕ¾£¬ÌåÏÖDZÔÚÀÕË÷Òâͼ¡£


https://www.securityweek.com/sonicwall-sma-appliances-targeted-with-new-overstep-malware/


6. Century Support ServicesÔâÊý¾Ýй¶£¬16ÍòÈËÃô¸ÐÐÅÏ¢±»ÇÔ


7ÔÂ15ÈÕ£¬±öϦ·¨ÄáÑÇÖÝÕ®ÎñÇå³¥¹«Ë¾Next Level Finance Partners£¨ÒÔCentury Support ServicesÃûÒåÔËÓª£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÓâ16ÍòÃûÓû§¡£¸Ã¹«Ë¾ÓÚ2024Äê11Ô¼ì²âµ½ÏµÍ³ÔâºÚ¿ÍÈëÇÖ£¬¾­5ÔÂÏÂÑ®Íê³ÉµÄÊÓ²ìÈ·ÈÏ£¬¹¥»÷Õß¿ÉÄÜ»á¼û»òÇÔÈ¡ÁË´æ´¢Óû§Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄÎļþ¡£´Ë´ÎÊÂÎñ³ÉΪÓÖÒ»ÆðÉæ¼°¸ßÃô¸ÐÊý¾Ýй¶µÄÇ徲ʹÊ¡£Ð¹Â¶ÐÅÏ¢º­¸Ç¶à¸öÒªº¦ÁìÓò£¬°üÀ¨Óû§ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕ/ÖÝÉí·ÝÖ¤/»¤ÕÕºÅÂëµÈÉí·Ý±êʶ£¬ÒÔ¼°Ò½ÁÆ¿µ½¡°ü¹ÜÐÅÏ¢¡¢½ðÈÚÕË»§Êý¾Ý¼°Êý×ÖÊðÃû¡£ÕâЩÐÅÏ¢Èô±»ÀÄÓ㬿ÉÄܵ¼ÖÂÉí·ÝµÁÓᢽðÈÚÕ©Æ­»òÒ½ÁÆÐÅϢй¶µÈÑÏÖØÎ£º¦¡£Æ¾Ö¤Century Support ServicesÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄ±¨¸æ£¬ÆäÀۼƷþÎñ¿Í»§½ü30Íò£¬´Ë´Îй¶¹æÄ£Õ¼Æä¿Í»§ÈºµÄ°ëÊýÒÔÉÏ¡£ÊÂÎñÆØ¹âºó£¬¸Ã¹«Ë¾Ðû²¼ÎªÊÜÓ°ÏìÓû§Ìṩ12¸öÔµÄÃâ·ÑÉí·ÝµÁÓñ£»¤¼°ÐÅÓÃ¼à¿Ø·þÎñ£¬ÒÔ»º½âDZÔÚΣº¦¡£×èÖ¹ÏÖÔÚ£¬ÉÐδÓÐÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬¹¥»÷ÄîÍ·ÈÔ²»Ã÷È·¡£


https://www.securityweek.com/data-breach-at-debt-settlement-firm-impacts-160000-people/