ÐÂÐÍMirai±äÖÖShadowV2½©Ê¬ÍøÂçÈ«Çò¹¥»÷ÎïÁªÍø×°±¸
Ðû²¼Ê±¼ä 2025-11-281. ÐÂÐÍMirai±äÖÖShadowV2½©Ê¬ÍøÂçÈ«Çò¹¥»÷ÎïÁªÍø×°±¸
11ÔÂ26ÈÕ£¬FortinetÆìÏÂFortiGuard LabsÑо¿Ö°Ô±ÔÚ10ÔÂAWS´ó¹æÄ£·þÎñÖÐֹʱ´ú·¢Ã÷ÃûΪ¡°ShadowV2¡±µÄÐÂÐÍ»ùÓÚMiraiµÄ½©Ê¬ÍøÂç¶ñÒâÈí¼þ£¬¸Ã¶ñÒâÈí¼þʹÓÃD-Link¡¢TP-LinkµÈ¹©Ó¦ÉÌÎïÁªÍø×°±¸µÄÖÁÉٰ˸öÒÑÖªÎó²î¾ÙÐÐÈö²¥£¬°üÀ¨CVE-2009-2765¡¢CVE-2020-25506µÈ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬²¿·ÖÎó²îÈçCVE-2024-10914ºÍCVE-2024-10915Éæ¼°ÒÑÍ£²ú»ò²»ÊÜÖ§³Ö×°±¸£¬D-LinkÃ÷È·ÌåÏÖ´ËÀà×°±¸½«²»ÔÙ»ñµÃ¹Ì¼þ¸üУ¬¼Ó¾çÁËÇ徲Σº¦¡£ShadowV2¹¥»÷Ä¿µÄº¸ÇÕþ¸®¡¢¿Æ¼¼¡¢ÖÆÔìÒµ¡¢ÍйÜÇå¾²·þÎñÌṩÉÌ£¨MSSP£©¡¢µçÐÅ¡¢½ÌÓýµÈÆß¸öÐÐÒµµÄ·ÓÉÆ÷¡¢NASºÍDVR×°±¸£¬¹¥»÷¹æÄ£ÆÕ±é±±ÃÀÖÞ¡¢ÄÏÃÀÖÞ¡¢Å·ÖÞ¡¢·ÇÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑÇÁù´óÖÞ¡£¸Ã¶ñÒâÈí¼þ×Ô³ÆÎª¡°ShadowV2 Build v1.0.0 IoT°æ±¾¡±£¬ÓëMirai LZRD±äÖÖÀàËÆ£¬Í¨¹ý³õʼ»á¼û½×¶Î±»×ª´ï¸øÒ×Êܹ¥»÷µÄ×°±¸£¬¸Ã½×¶ÎʹÓÃÏÂÔØÆ÷¾ç±¾binary.sh£¬²¢½ÓÄÉXOR±àÂëÉèÖÃÎļþϵͳ·¾¶¡¢Óû§ÊðÀí×Ö·û´®¡¢HTTP±êÍ·µÈ£¬¾ß±¸Òþ²ØÐÔ¡£¹¦Ð§ÉÏÖ§³ÖÕë¶ÔUDP¡¢TCPºÍHTTPÐÒéµÄ¶àÖÖÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ÀàÐÍ£¬C2»ù´¡Éèʩͨ¹ý·¢ËÍÏÂÁî´¥·¢¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/new-shadowv2-botnet-malware-used-aws-outage-as-a-test-opportunity/
2. OpenAI APIÓû§Êý¾ÝÒòMixpanelй¶ÊÂÎñÊÜÓ°Ïì
11ÔÂ27ÈÕ£¬¿ËÈÕ£¬OpenAIÏò²¿·ÖChatGPT API¿Í»§×ª´ï£¬ÒòµÚÈý·½ÆÊÎö·þÎñÉÌMixpanelÔâÓöÊý¾Ýй¶£¬µ¼Ö²¿·ÖAPIÓû§Éí·Ýʶ±ðÐÅÏ¢Íâй¡£¾ÝϤ£¬MixpanelΪOpenAIÌṩÊÂÎñÆÊÎö¹¦Ð§£¬ÓÃÓÚ×·×ÙAPI²úƷǰ¶Ë½çÃæµÄÓû§½»»¥ÐÐΪ¡£´Ë´ÎÊÂÎñ½öÓ°Ïì¡°Ó벿·ÖAPIÓû§Ïà¹ØµÄÓÐÏÞÆÊÎöÊý¾Ý¡±£¬Î´²¨¼°ChatGPT»òÆäËû²úÆ·µÄͨË×Óû§¡£OpenAIÃ÷È·ÌåÏÖ£¬Æä½¹µãϵͳδ±»ÈëÇÖ£¬Ì¸Ìì¼Í¼¡¢APIÇëÇó¡¢Ö§¸¶ÏêÇé¡¢ÃÜÂ롢ƾ֤¡¢APIÃÜÔ¿¼°Õþ¸®Éí·ÝÖ¤¼þ¾ùδй¶¡£Ð¹Â¶ÄÚÈÝÖ÷Òª°üÀ¨APIÕË»§ÖеÄÃû³Æ¡¢¹ØÁªÓÊÏä¡¢ä¯ÀÀÆ÷ÌṩµÄ¼òªµØÀíλÖ㨶¼»á/Ê¡/¹ú¼Ò£©¡¢²Ù×÷ϵͳºÍä¯ÀÀÆ÷ÀàÐÍ¡¢ÍƼöÈªÔ´ÍøÕ¾ÒÔ¼°×éÖ¯»òÓû§ID¡£ÓÉÓÚÎ´Éæ¼°Ãô¸Ðƾ֤£¬Óû§ÎÞÐèÖØÖÃÃÜÂë»òAPIÃÜÔ¿¡£MixpanelÅû¶£¬´Ë´Î¹¥»÷Ô´ÓÚ11ÔÂ8ÈÕ·¢Ã÷µÄ¶ÌÐÅ´¹ÂÚÔ˶¯£¬Ó°Ïì¹æÄ£ÓÐÏÞ¡£OpenAIÔÚ11ÔÂ25ÈÕ»ñϤÊÜÓ°ÏìÊý¾Ý¼¯ÏêÇéºó£¬Òѽ«Mixpanel´ÓÉú²ú·þÎñÖÐÒÆ³ý£¬²¢Ö±½Ó֪ͨÏà¹Ø×éÖ¯¡¢ÖÎÀíÔ±¼°Ð¡ÎÒ˽¼ÒÓû§¡£
https://www.bleepingcomputer.com/news/security/openai-discloses-api-customer-data-breach-via-mixpanel-vendor-hack/
3. ³¯ÈÕÆ¡¾ÆÔâÀÕË÷Èí¼þ¹¥»÷ÖÂ200Íò¿Í»§Ô±¹¤Êý¾Ýй¶
11ÔÂ27ÈÕ£¬ÈÕ±¾×î´óÆ¡¾ÆÄðÔìÉ̳¯ÈÕ¼¯ÍſعÉÓÐÏÞ¹«Ë¾£¨¼ò³Æ³¯ÈÕ£©ÈÕÌìÖ°¹«Ë¾9ÔÂ29ÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÔ¼200Íò¿Í»§¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶£¬²¢ÑÏÖØÈÅÂÒÆäÈÕ±¾¾³ÄÚÔËÓª¡£´Ë´Î¹¥»÷ÓÉ¡°÷è÷롱ÀÕË÷Èí¼þÍÅ»ïʵÑ飬¸Ã×éÖ¯Éù³Æ¶ÔÊÂÎñÈÏÕæ£¬²¢Ð¹Â¶ÁË27GBµÄ±»µÁÊý¾Ý£¬°üÀ¨ÌõÔ¼¡¢Ô±¹¤ÐÅÏ¢¡¢²ÆÎñÊý¾ÝµÈ9323¸öÎļþ¡£¾Ý³¯ÈÕÅû¶£¬¹¥»÷Õßͨ¹ý¼¯ÍÅ×ܲ¿ÍøÂç×°±¸²»·¨ÈëÇÖÊý¾ÝÖÐÐÄÍøÂ磬°²ÅÅÀÕË÷Èí¼þ¼ÓÃܶą̀·þÎñÆ÷¼°²¿·ÖÔ±¹¤Åä·¢PC×°±¸µÄÊý¾Ý¡£Ð¹Â¶Êý¾ÝÉæ¼°152.5ÍòÃûÔøÁªÏµ¿Í·þµÄÖ°Ô±£¨º¬ÐÕÃû¡¢µØµã¡¢µç»°¡¢ÓÊÏ䣩¡¢11.4ÍòÃûÍⲿÁªÏµÈË£¨º¬ÐÕÃû¡¢µØµã¡¢µç»°£©¡¢10.7ÍòÃûÔ±¹¤£¨º¬³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢ÁªÏµ·½·¨£©¼°16.8ÍòÃûÔ±¹¤¾ìÊô£¨º¬ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÐԱ𣩡£ÖµµÃÇìÐÒµÄÊÇ£¬¿Í»§²ÆÎñÐÅÏ¢£¨ÈçÐÅÓÿ¨Êý¾Ý£©Î´±»ÇÔÈ¡¡£´Ë´Î¹¥»÷µ¼Ö³¯ÈÕÈÕÌìÖ°¹«Ë¾¶©µ¥´¦Öóͷ£¡¢·¢»õ¡¢ºô½ÐÖÐÐļ°¿Í·þ̨ӪҵÖÐÖ¹£¬ÆäËû¹ú¼Ê·Ö֧δÊÜÓ°Ïì¡£×èÖ¹11ÔÂ27ÈÕ£¬¹«Ë¾ÒÑÈ·Èϲ¿·ÖÔ±¹¤PC¼°Êý¾ÝÖÐÐÄÕÛÎñÆ÷´æ´¢µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜй¶£¬µ«Î´·¢Ã÷Êý¾Ý±»¹ûÕæÐû²¼¡£
https://securityaffairs.com/185126/data-breach/asahi-says-crooks-stole-data-of-approximately-2m-customers-and-employees.html
4. Bloody Wolf APT×é֯ʹÓÃÕýµ±Ô¶³ÌÈí¼þ·¢¶¯¹¥»÷
11ÔÂ28ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬Bloody Wolf¸ß¼¶Ò»Á¬Íþв£¨APT£©×éÖ¯Õýͨ¹ýÕýµ±Ô¶³Ì»á¼ûÈí¼þÉøÍ¸Õþ¸®Ä¿µÄ£¬Ìᳫ¹æÄ£Ò»Ö±À©´óµÄÍøÂç¹¥»÷¡£×Ô2023Äêµ×»îÔ¾ÒÔÀ´£¬Bloody WolfһֱˢÐÂÊÖÒÕ¡£2025Äê6ÔÂÆð£¬¸Ã×éÖ¯ÔÚ¼ª¶û¼ªË¹Ë¹Ì¹Ò»Á¬¿ªÕ¹Ô˶¯£¬²¢ÓÚ10Ô³õ½«¹æÄ£À©´óÖÁÎÚ×ȱð¿Ë˹̹¡£¹¥»÷Õßð³ä˾·¨²¿£¬Í¨¹ý·¢ËͱÆÕæPDFÎĵµ¡¢Î±ÔìÓòÃû¼°ÓÕµ¼Êܺ¦Õß×°ÖÃJavaÒÔÉó²é¡°°¸¼þ×ÊÁÏ¡±µÄÖ¸ÁîʵÑé¹¥»÷£¬Ç¶Èë¶ÌÐÅÏ¢ÓªÔìÕýµ±ÐÔ¼ÙÏó¡£ÎÚ×ȱð¿Ë˹̹µÄ»ù´¡ÉèÊ©»¹ÉèÖÃÁ˵ØÀíΧÀ¸¹¦Ð§£¬¾³ÍâÓû§±»Öض¨ÏòÖÁÕýµ±Õþ¸®ÍøÕ¾£¬ÍâµØÓû§ÔòÊÕµ½¶ñÒâJARÎļþ¡£Ñ¬È¾Á´ÖУ¬Êܺ¦ÕßÏÂÔØJARÎļþºó£¬¼ÓÔØÆ÷»á»ñÈ¡ÆäËû×é¼þ²¢×îÖÕ×°ÖÃNetSupport RAT¡£ÕâЩ¼ÓÔØÆ÷ʹÓÃJava 8¹¹½¨£¬½öº¬Ò»¸öÀàÇÒδ»ìÏý£¬¿É×Ô¶¯Ö´ÐÐHTTP»ñÈ¡¶þ½øÖÆÎļþ¡¢Ìí¼Ó³¤ÆÚÐÔ¡¢½¨ÉèÍýÏëʹÃü¼°ÏÔʾÐéα¹ýʧÐÅÏ¢µÈʹÃü¡£ÆäÄÚÖÃÆô¶¯ÏÞÖÆ¼ÆÊýÆ÷£¨ÉèΪ3´Î£©£¬´æ´¢ÓÚÓû§ÉèÖÃÎļþĿ¼£¬ïÔ̱»×¢ÖØÎ£º¦¡£
https://www.infosecurity-magazine.com/news/bloody-wolf-expands-central-asia/
5. »ªË¶ÐÞ¸´¸ßΣÎó²î£¬Ð¡ÐÄWrtHug¹¥»÷Í£²ú·ÓÉÆ÷
11ÔÂ27ÈÕ£¬»ªË¶Ðû²¼Ð°æ¹Ì¼þÐÞ¸´ÁË9¸öÇå¾²Îó²î£¬ÆäÖÐ×îÑÏÖØµÄÊDZàºÅΪCVE-2025-59366µÄ¸ßΣÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬¸ÃÎó²îÓ°ÏìËùÓÐÆôÓÃAiCloud¹¦Ð§µÄ·ÓÉÆ÷×°±¸¡£AiCloudÊÇ»ªË¶Â·ÓÉÆ÷ÄÚÖõÄÔ¶³Ì»á¼û¹¦Ð§£¬¿ÉʵÏÖСÎÒ˽¼ÒÔÆ·þÎñÆ÷¡¢Ô¶³ÌýÌåÈö²¥ÊäºÍÔÆ´æ´¢·þÎñ¡£»ªË¶Ç徲ͨ¸æÖ¸³ö£¬¸ÃÎó²î¿Éͨ¹ýSamba¹¦Ð§µÄÒâÍ⸱×÷Óô¥·¢£¬¹¥»÷Õß¿ÉÄÜδ¾ÊÚȨִÐÐÌØ¶¨¹¦Ð§¡£´Ë´ÎÐÞ¸´Éæ¼°¶à¸ö¹Ì¼þ°æ±¾ÏµÁУ¬°üÀ¨3.0.0.4_386¡¢3.0.0.4_388¼°3.0.0.6_102ϵÁУ¬¾ùÐÞ¸´ÁËCVE-2025-59366¼°ÆäËû8¸öÎó²î¡£»ªË¶Ç¿ÁÒ½¨ÒéÓû§Á¬Ã¦¸üÐÂÖÁ2025Äê10ÔÂÐû²¼µÄ×îй̼þ¡£¹ØÓÚÒÑ×èÖ¹Ö§³ÖµÄÍ£²ú·ÓÉÆ÷Ðͺţ¬»ªË¶ÌṩÁËÔÝʱ»º½â½¨Ò飺Ϊ·ÓÉÆ÷µÇ¼ÕË»§ºÍWiFiÉèÖøßÇ¿¶ÈΨһÃÜÂ룻½ûÓÃËùÓÐÃæÏò»¥ÁªÍøµÄ·þÎñ£¬ÈçAiCloud¡¢¹ãÓòÍøÔ¶³Ì»á¼û¡¢¶Ë¿Úת·¢¡¢¶¯Ì¬ÓòÃûÆÊÎö¡¢VPN·þÎñÆ÷¡¢·Ç¾üÊÂÇø¡¢¶Ë¿Ú´¥·¢ºÍFTPµÈ¹¦Ð§¡£½üÆÚ£¬ÃûΪ¡°Operation WrtHug¡±µÄÐÂÐ͹¥»÷Ô˶¯ÒÑÓ°ÏìÈ«ÇòÊýÍǫ̀¹ýʱ»òÍ£²úµÄ»ªË¶Â·ÓÉÆ÷£¬»ªË¶Ç¿µ÷£¬Óû§Ó¦¸ß¶ÈÖØÊӹ̼þ¸üкÍÇå¾²ÉèÖã¬ÒÔÌá·À´ËÀ๥»÷¡£
https://securityaffairs.com/185109/iot/new-asus-firmware-patches-critical-aicloud-vulnerability.html
6. ¶ñÒâChromeÀ©Õ¹Crypto CopilotÆáºÚÇÔÈ¡¼ÓÃÜÉúÒâÓöÈ
11ÔÂ27ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾Socket½ÒÆÆ£¬Ò»¿îÃûΪCrypto CopilotµÄChromeÀ©Õ¹³ÌÐòʵΪ¶ñÒâÈí¼þ£¬ÔÚÿ±Ê¼ÓÃÜÇ®±ÒÉúÒâÖÐÆáºÚÊÕÈ¡0.05%»ò¸ü¸ßµÄÒþ²ØÓöȡ£¸ÃÀ©Õ¹Ðû³Æ¿ÉÈÃÓû§ÔÚXƽֱ̨½ÓÉúÒâ¼ÓÃÜÇ®±Ò£¬Óë½çÃæÎ޷켯³É£¬µ«ÏÖʵͨ¹ý¸ß¶È»ìÏýµÄ´úÂëÔÚÉúÒâÖÐ×¢ÈëÌØÊâתÕË£¬½«×ʽð×ªÒÆÖÁ¹¥»÷Õß¿ØÖƵÄÇ®°ü¡£ÀýÈ磬ÉúÒâÁè¼Ý2.6 SOL£¨Ô¼371ÃÀÔª£©Ê±£¬»áÊÕÈ¡0.0013 SOL£¨Ô¼0.19ÃÀÔª£©µÄÓöȣ¬ÇÒChromeÊÐËÁδ¹ûÕæÅû¶ÊÕ·ÑÂß¼¡£SocketÑо¿Ö°Ô±Ö¸³ö£¬¸ÃÀ©Õ¹Ê¹ÓÃRaydiumÇø¿éÁ´½»Á÷¹¦Ð§£¬ÔÚÓû§ÊðÃûǰÌí¼ÓÒþ²ØÓöȣ¬Í¨¹ýÓ²±àÂë²ÎÊýÅÌËãÓöȲ¢Ç¶ÈëͳһÉúÒâÖУ¬Óû§Èô²»Õö¿ªÇ®°üÖ¸ÁîÁбíÔòÄÑÒÔ²ì¾õ¡£Ö»¹ÜÓû§»ùÊý½ÏС£¬µ«¶ñÒâÐÐΪÒÑÒ»Á¬³¬Ò»Äêδ±»·¢Ã÷£¬¿ÉÄܱ£´æÀàËÆÄ£Ê½µÄÀ©Õ¹³ÌÐò¡£¹¥»÷Õßͨ¹ý¶à¸öÍⲿ·þÎñÄ£ÄâÕýµ±¹¤¾ß£¬µ«ºó¶ËÍøÕ¾ÎÞ·¨ÔËÐУ¬ÏÔʾÆä¿ÉÄܼ±åῪ·¢»ò´¦ÓÚ²âÊԽ׶Ρ£¸ÃÀ©Õ¹³ÌÐòÓÉÍøÃûΪsjclark76µÄ½¨ÉèÕßÐû²¼£¬ÉϴθüÐÂʱ¼äΪ2024Äê6ÔÂ18ÈÕ£¬×èÖ¹±¨¸æÊ±ÈÔ¿É»á¼û¡£
https://cybernews.com/security/malicious-chrome-extension-skims-crypto-with-every-trade/


¾©¹«Íø°²±¸11010802024551ºÅ