Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2026-02-04

1. Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷


2ÔÂ2ÈÕ £¬ºÚ¿Í×éÖ¯Punishing OwlÓÚ2025Äê12ÔÂ12ÈÕÊ״ιûÕæÔ˶¯ £¬¶Ô¶íÂÞ˹Õþ¸®Çå¾²»ú¹¹ÌᳫÊÖÒÕÖØ´óµÄÍøÂç¹¥»÷¡£¸Ã×é֯ͨ¹ýÈëÇÖÄ¿µÄÍøÂçÇÔÈ¡ÄÚ²¿Îļþ £¬²¢½«ÆäÐû²¼ÖÁÊý¾Ýй¶ƽ̨ £¬Í¬Ê±ÔÚMega.nz´æ´¢¿ÍÕ»±¸·ÝÎļþ £¬ÒÔ×î´ó»¯ÆØ¹â¶È¡£ÎªÍÏÑÓÊܺ¦ÕßÏìÓ¦²¢À©´óÓ°Ïì £¬¹¥»÷ÕßÌØÒâÑ¡ÔñÖÜÎåÍí6µã37·ÖÕâÒ»·ÇÊÂÇéʱ¶ÎÐû²¼ÈëÇÖÊÂÎñ¡£¹¥»÷Àú³ÌÖÐ £¬Punishing Owl¿ØÖÆÁËÊܺ¦»ú¹¹µÄDNSÉèÖà £¬½¨Éè×ÓÓòÃû²¢½«Á÷Á¿Ð®ÖÆÖÁλÓÚ°ÍÎ÷µÄ·þÎñÆ÷¡£¸Ã·þÎñÆ÷²»µ«ÍйÜÁËÇÔÈ¡µÄÎļþ £¬»¹¸½´øÁËÒ»·ÝÐðÊö¹¥»÷ÄîÍ·µÄÕþÖÎÉùÃ÷¡£Ëæºó £¬¸Ã×éÖ¯½øÒ»²½¶ÔÊܺ¦»ú¹¹µÄÏàÖúͬ°éÓë³Ð°üÉÌÌᳫÉÌÒµµç×ÓÓʼþڲƭ£¨BEC£©¹¥»÷ £¬Ê¹ÓÃαÔìµÄ·¢¼þµØµã·¢ËÍ´¹ÂÚÓʼþ £¬»Ñ³ÆÊÇÍøÂçÈëÇÖÊÂÎñµÄºËʵ֪ͨ £¬²¢±Þ²ßÊÕ¼þÈËÉó²é¸½¼þÎĵµ¡£ÊÖÒÕ²ãÃæ £¬Punishing OwlÕ¹ÏÖ³ö¸ßË®×¼µÄ¹¥»÷ÄÜÁ¦¡£ÆäÉèÖÃÁËαÔìµÄTLSÖ¤Êé £¬´î½¨ÁËÓÃÓÚÓʼþÊÕ·¢µÄIMAPºÍSMTP·þÎñ £¬²¢°²ÅÅÁËÃûΪZipWhisperµÄPowerShellÇÔÃÜľÂí £¬ÓÃÓÚ͵ȡÊÜѬȾϵͳµÄä¯ÀÀÆ÷ƾ֤¡£


https://cybersecuritynews.com/new-punishing-owl-hacker-group-targeting-networks/


2. DynoWiper¶ñÒâÈí¼þ¹¥»÷²¨À¼ÄÜÔ´ÆóÒµ


2ÔÂ2ÈÕ £¬Ò»¿îÃûΪDynoWiperµÄÐÂÐ͸ßΣÊý¾Ý²Á³ý¶ñÒâÈí¼þÊ״α»·¢Ã÷ £¬Õý¶Ô²¨À¼ÄÜÔ´ÆóÒµÌá³«ÆÆËðÐÔ¹¥»÷ £¬Æä½¹µãÄ¿µÄ²¢·ÇÀÕË÷Ç®²Æ £¬¶øÊÇÓÀÊÀɨ³ýÒªº¦Êý¾Ý²¢µ¼ÖÂϵͳ̱»¾¡£ÓëͨÀýÀÕË÷Èí¼þ²î±ð £¬DynoWiperͨ¹ýÈý½×¶Î´Ý»ÙÁ÷³ÌʵÏÖÆÆË𣺵ÚÒ»½×¶ÎµÝ¹éËÑË÷ËùÓÐÀο¿¼°¿ÉÒÆ¶¯Çý¶¯Æ÷ÉϵÄÎļþ £¬±Ü¿ªÒªº¦ÏµÍ³Ä¿Â¼ÒÔά³Ö»ù±¾ÔËÐУ»µÚ¶þ½×¶ÎʹÓÃ16×Ö½ÚËæ»úÊý¾Ý»º³åÇø¸²Ð´ÎļþÄÚÈÝ £¬Ð¡ÓÚ16×Ö½ÚµÄÎļþ±»ÍêÈ«ÁýÕÖ £¬´óÓÚ16×Ö½ÚµÄÔò²¿·ÖÆÆË𠣬ÒÔ´ËÌáÉý´Ý»ÙЧÂÊ£»µÚÈý½×¶Îͨ¹ýÏµÍ³ÖØÆô»òÖ±½ÓÖÕÖ¹Àú³ÌʹÊÜѬȾװ±¸ÎÞ·¨Æô¶¯¡£¸Ã¶ñÒâÈí¼þ±£´æ¶à¸ö±äÖÖ £¬¾ùÓÚ2025Äê12ÔÂ29ÈÕͶ·Å¡£¹¥»÷ÕßÔÚÊ×´ÎÖ´ÐÐʧ°Üºó¶à´ÎÐ޸ĴúÂëÒÔÈÆ¹ýÇå¾²·À»¤ £¬µ«ÆóÒµ°²ÅŵÄÖն˼ì²âÓëÏìÓ¦¹¤¾ßÀÖ³É×èµ²ÁËÆäÖ´ÐÐ £¬´ó·ù½µµÍËðʧ¡£WelivesecurityÆÊÎöʦָ³ö £¬DynoWiperÓëÕë¶ÔÎÚ¿ËÀ¼µÄÒÑÖª²Á³ý¶ñÒâÈí¼þZOV±£´æÏÔÖøÏàËÆÐÔ £¬Æä¹éÒòÓÚÓë¶íÂÞ˹¹ØÁªµÄSandworm×éÖ¯¡£


https://cybersecuritynews.com/dynowiper-data-wiping-malware/


3. Coinbase֤ʵÄÚ²¿Ö°Ô±Êý¾Ýй¶


2ÔÂ3ÈÕ £¬ÃÀ¹ú¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÈ·Èϱ¬·¢Ò»ÆðÄÚ²¿Ö°Ô±Êý¾Ýй¶ÊÂÎñ¡£¾Ý¹«Ë¾½²»°ÈËÅû¶ £¬2025Äê12Ô £¬Ò»Ãû³Ð°üÉ̲»µ±»á¼ûÔ¼30Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢ £¬°üÀ¨µç×ÓÓʼþ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢KYCÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üÓà¶î¼°ÉúÒâ¼Í¼¡£¸Ã³Ð°üÉÌÒѱ»ÖÕÖ¹ÏàÖú £¬ÊÜÓ°ÏìÓû§ÒÑ»ñÉí·Ý͵ÇÔ±£»¤·þÎñ¼°Ö¸µ¼ £¬ÊÂÎñͬ²½Éϱ¨î¿Ïµ»ú¹¹¡£ÍþвÐÐΪÕß¡°Shiny Lapsus Hunters¡±Ôø¶ÌÔÝÔÚTelegramÐû²¼CoinbaseÄÚ²¿Ö§³Ö½çÃæ½ØÍ¼ºóɾ³ý £¬½ØÍ¼ÏÔʾ¿É»á¼û¿Í»§Ãô¸ÐÊý¾Ý¡£Ö»¹ÜÎÞ·¨È·ÈϸÃ×éÖ¯ÊÇ·ñÖ±½Ó¹ØÁªÄÚ²¿Ö°Ô±ÈëÇÖ £¬µ«ÀàËÆÊÖ·¨ÔÚÆäËû¹¥»÷ÖÐÆµÏÖ £¬ÈçÍþвÐÐΪÕßÔøÐлßCrowdStrikeÄÚ²¿Ö°Ô±»ñÈ¡½ØÍ¼ £¬»òͨ¹ýÉç½»¹¤³Ìð³äÔ±¹¤Æ­È¡BPOÖ§³ÖÖ°Ô±ÊÚȨ»á¼ûȨÏÞ¡£BPO¹«Ë¾Òò³Ð½Ó¿Í»§Ö§³Ö¡¢Éí·ÝÑéÖ¤¡¢IT·þÎñµÈÔËӪʹÃü £¬ÆäÔ±¹¤³£½Ó´¥ÆóÒµ½¹µãϵͳÓë¿Í»§Êý¾Ý £¬³ÉΪ¹¥»÷Õ߸߼ÛֵĿµÄ¡£


https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/


4. Step FinanceÔâºÚ¿Í¹¥»÷ÖÂ4000ÍòÃÀÔª×ʲúËðʧ


2ÔÂ3ÈÕ £¬ÃÀ¹ú¼ÓÃÜÇ®±Òƽ̨Step FinanceÓÚ2025Äê1ÔÂ31ÈÕ¼ì²âµ½Çå¾²Îó²î £¬¾­ÊÓ²ìÈ·ÈÏÒò¸ß¹Ü×°±¸ÔâºÚ¿ÍÈëÇÖ £¬µ¼Ö¼ÛÖµÔ¼4000ÍòÃÀÔªµÄÊý×Ö×ʲú±»µÁ¡£¸Ãƽ̨ÊÇ»ùÓÚSolanaÇø¿éÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Æ½Ì¨¼°ÆÊÎö¹¤¾ß £¬Ö§³ÖÓû§×ʲú¿ÉÊÓ»¯¡¢ÉúÒâ¡¢ÖÊѺµÈ²Ù×÷ £¬²¢ÓµÓÐÔ­Éú´ú±Ò$STEP £¬µ«ÉúÒâÁ¿Ïà¶Ô½ÏС¡£¹¥»÷±¬·¢ºó £¬Step FinanceѸËÙÔ¼ÇëÍøÂçÇ徲ר¼ÒЭÖú×·»Ø×ʲú¡£Çø¿éÁ´ÆÊÎö¹«Ë¾CertiKÆðÔ´±¨¸æÏÔʾ £¬±»µÁ×ʲú°üÀ¨261,854 SOL£¨Ô¼2890ÍòÃÀÔª£© £¬µ«Æ½Ì¨×îÖÕºËʵ×ÜËðʧԼ4000ÍòÃÀÔª¡£Í¨¹ýToken22±£»¤²½·¥¼°ÏàÖúͬ°éЭµ÷ £¬ÏÖÔÚÒÑ×·»ØÔ¼370ÍòÃÀÔªRemora×ʲú¼°100ÍòÃÀÔªÆäËûÍ·´ç £¬ºÏ¼Æ470ÍòÃÀÔª¡£ÎªÔöÇ¿Çå¾²·À»¤ £¬Æ½Ì¨ÒÑÔÝÍ£²¿·ÖÓªÒµÔËÓª £¬²¢Ç¿µ÷ÆäÆìÏÂRemora MarketsδÊÜÓ°Ïì £¬ËùÓÐrTokenÈÔ¼á³Ö1:1ÍêÈ«´¢±¸¡£Step Finance½¨ÒéÓû§ÔÚÊӲ쿢ÊÂǰÔÝͣʹÓÃSTEP´ú±Ò £¬²¢ÔÊÐí½«¶Ô¹¥»÷ǰ״̬¾ÙÐпìÕÕ £¬Öƶ©Õë¶Ô³ÖÓÐÕߵĽâ¾ö¼Æ»®¡£


https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/


5. Citrix NetScalerÔâ6.3ÍòIPЭͬÕì̽


2ÔÂ3ÈÕ £¬Íþв¼à¿ØÆ½Ì¨GreyNoiseÊӲ쵽Õë¶ÔCitrix NetScaler»ù´¡ÉèÊ©µÄЭͬÕì̽Ðж¯ £¬¸ÃÐж¯Ê¹Óó¬6.3Íò¸ö×ÔÁ¦IPµØµãÌᳫ111,834¸ö»á»° £¬ÆäÖÐ79%Á÷Á¿Ö¸ÏòCitrix GatewayÃÛ¹Þ £¬64%À´×Ôαװ³ÉÕýµ±ÏûºÄÕßISPµØµãµÄסլÊðÀí £¬Ê£Óà36%Ô´×ÔͳһAzure IPµØµã¡£GreyNoiseÖ¸³ö £¬´Ë´ÎÔ˶¯²¢·ÇËæ»ú»¥ÁªÍøÉ¨Ãè £¬¶øÊÇÓÐ×éÖ¯µÄ»ù´¡ÉèÊ©²â»æ £¬Ö¼ÔÚÈëÇÖǰʶ±ð̻¶µÄCitrixµÇÂ¼Ãæ°å¼°²úÆ·°æ±¾¡£¹¥»÷Õßͨ¹ýÁ½¸ö½¹µãÖ¸±ê̻¶¶ñÒâÒâͼ£ºÆäÒ» £¬63,189¸öIPÌìÉú109,942¸ö»á»° £¬¼¯ÖÐɨÃè¡°/logon/LogonPoint/index.html¡±Éí·ÝÑéÖ¤½çÃæ £¬´ó¹æÄ£Ê¶±ð̻¶µÄµÇÂ¼Ãæ°å£»Æä¶þ £¬2ÔÂ1ÈÕ10¸öIPÔÚ6СʱÄÚÆô¶¯1,892¸ö»á»° £¬¾Û½¹URL·¾¶¡°/epa/scripts/win/nsepa_setup.exe¡± £¬Í¨¹ýEPA¹¤¼þö¾ÙCitrix°æ±¾¡£¹¥»÷ÕßʹÓÃ2016ÄêÍ·Ðû²¼µÄChrome 50Óû§ÊðÀí £¬Õë¶ÔEPA×°ÖÃÎļþ·¾¶µÄÌØ¶¨¹¥»÷Åú×¢ÆäÕý¿ª·¢Ìض¨°æ±¾Îó²îʹÓóÌÐò»òÑéÖ¤ÒÑÖªCitrix ADCÎó²î¡£


https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/


6. CISA½ôÆÈת´ïSolarWinds·þÎñ̨Îó²î


2ÔÂ3ÈÕ £¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SolarWinds Web Help DeskµÄÑÏÖØÎó²îCVE-2025-40551±ê¼ÇΪ"ÕýÔÚÔâÊܹ¥»÷" £¬²¢ÒÀ¾Ý2021ÄêÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD 22-01£© £¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚÈýÌìÄÚÍê³ÉϵͳÐÞ²¹¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Jimi Sebree·¢Ã÷ £¬Ô´ÓÚ²»ÊÜÐÅÍеÄÊý¾Ý·´ÐòÁл¯Èõµã £¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃʵÏÖÔ¶³Ì´úÂëÖ´ÐÐ £¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔËÐжñÒâÏÂÁî¡£SolarWindsÓÚ1ÔÂ28ÈÕÐû²¼Web Help Desk 2026.1°æ±¾ÐÞ¸´´ËÎó²î £¬Í¬Ê±Ò»²¢ÐÞ¸´ÁËSebree·¢Ã÷µÄÓ²±àÂëÆ¾Ö¤¸ßΣÎó²î£¨CVE-2025-40537£©¼°watchTowrµÄPiotr Bazydlo±¨¸æµÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-40552¡¢CVE-2025-40554£© £¬ËùÓÐÎó²î¾ùÖ§³ÖÔ¶³ÌʹÓá£CISAÇ¿µ÷ £¬Ö»¹ÜBOD 22-01½öÕë´ºÁª°î»ú¹¹ £¬µ«Ë½Óª²¿·ÖÒ²Ó¦¾¡¿ìÐÞ²¹ÒÔµÖÓùÒ»Á¬¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/