Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2026-02-041. Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷
2ÔÂ2ÈÕ£¬ºÚ¿Í×éÖ¯Punishing OwlÓÚ2025Äê12ÔÂ12ÈÕÊ״ιûÕæÔ˶¯£¬¶Ô¶íÂÞ˹Õþ¸®Çå¾²»ú¹¹ÌᳫÊÖÒÕÖØ´óµÄÍøÂç¹¥»÷¡£¸Ã×é֯ͨ¹ýÈëÇÖÄ¿µÄÍøÂçÇÔÈ¡ÄÚ²¿Îļþ£¬²¢½«ÆäÐû²¼ÖÁÊý¾Ýй¶ƽ̨£¬Í¬Ê±ÔÚMega.nz´æ´¢¿ÍÕ»±¸·ÝÎļþ£¬ÒÔ×î´ó»¯ÆØ¹â¶È¡£ÎªÍÏÑÓÊܺ¦ÕßÏìÓ¦²¢À©´óÓ°Ï죬¹¥»÷ÕßÌØÒâÑ¡ÔñÖÜÎåÍí6µã37·ÖÕâÒ»·ÇÊÂÇéʱ¶ÎÐû²¼ÈëÇÖÊÂÎñ¡£¹¥»÷Àú³ÌÖУ¬Punishing Owl¿ØÖÆÁËÊܺ¦»ú¹¹µÄDNSÉèÖ㬽¨Éè×ÓÓòÃû²¢½«Á÷Á¿Ð®ÖÆÖÁλÓÚ°ÍÎ÷µÄ·þÎñÆ÷¡£¸Ã·þÎñÆ÷²»µ«ÍйÜÁËÇÔÈ¡µÄÎļþ£¬»¹¸½´øÁËÒ»·ÝÐðÊö¹¥»÷ÄîÍ·µÄÕþÖÎÉùÃ÷¡£Ëæºó£¬¸Ã×éÖ¯½øÒ»²½¶ÔÊܺ¦»ú¹¹µÄÏàÖúͬ°éÓë³Ð°üÉÌÌᳫÉÌÒµµç×ÓÓʼþڲƣ¨BEC£©¹¥»÷£¬Ê¹ÓÃαÔìµÄ·¢¼þµØµã·¢ËÍ´¹ÂÚÓʼþ£¬»Ñ³ÆÊÇÍøÂçÈëÇÖÊÂÎñµÄºËʵ֪ͨ£¬²¢±Þ²ßÊÕ¼þÈËÉó²é¸½¼þÎĵµ¡£ÊÖÒÕ²ãÃæ£¬Punishing OwlÕ¹ÏÖ³ö¸ßË®×¼µÄ¹¥»÷ÄÜÁ¦¡£ÆäÉèÖÃÁËαÔìµÄTLSÖ¤Ê飬´î½¨ÁËÓÃÓÚÓʼþÊÕ·¢µÄIMAPºÍSMTP·þÎñ£¬²¢°²ÅÅÁËÃûΪZipWhisperµÄPowerShellÇÔÃÜľÂí£¬ÓÃÓÚ͵ȡÊÜѬȾϵͳµÄä¯ÀÀÆ÷ƾ֤¡£
https://cybersecuritynews.com/new-punishing-owl-hacker-group-targeting-networks/
2. DynoWiper¶ñÒâÈí¼þ¹¥»÷²¨À¼ÄÜÔ´ÆóÒµ
2ÔÂ2ÈÕ£¬Ò»¿îÃûΪDynoWiperµÄÐÂÐ͸ßΣÊý¾Ý²Á³ý¶ñÒâÈí¼þÊ״α»·¢Ã÷£¬Õý¶Ô²¨À¼ÄÜÔ´ÆóÒµÌá³«ÆÆËðÐÔ¹¥»÷£¬Æä½¹µãÄ¿µÄ²¢·ÇÀÕË÷Ç®²Æ£¬¶øÊÇÓÀÊÀɨ³ýÒªº¦Êý¾Ý²¢µ¼ÖÂϵͳ̱»¾¡£ÓëͨÀýÀÕË÷Èí¼þ²î±ð£¬DynoWiperͨ¹ýÈý½×¶Î´Ý»ÙÁ÷³ÌʵÏÖÆÆË𣺵ÚÒ»½×¶ÎµÝ¹éËÑË÷ËùÓÐÀο¿¼°¿ÉÒÆ¶¯Çý¶¯Æ÷ÉϵÄÎļþ£¬±Ü¿ªÒªº¦ÏµÍ³Ä¿Â¼ÒÔά³Ö»ù±¾ÔËÐУ»µÚ¶þ½×¶ÎʹÓÃ16×Ö½ÚËæ»úÊý¾Ý»º³åÇø¸²Ð´ÎļþÄÚÈÝ£¬Ð¡ÓÚ16×Ö½ÚµÄÎļþ±»ÍêÈ«ÁýÕÖ£¬´óÓÚ16×Ö½ÚµÄÔò²¿·ÖÆÆËð£¬ÒÔ´ËÌáÉý´Ý»ÙЧÂÊ£»µÚÈý½×¶Îͨ¹ýÏµÍ³ÖØÆô»òÖ±½ÓÖÕÖ¹Àú³ÌʹÊÜѬȾװ±¸ÎÞ·¨Æô¶¯¡£¸Ã¶ñÒâÈí¼þ±£´æ¶à¸ö±äÖÖ£¬¾ùÓÚ2025Äê12ÔÂ29ÈÕͶ·Å¡£¹¥»÷ÕßÔÚÊ×´ÎÖ´ÐÐʧ°Üºó¶à´ÎÐ޸ĴúÂëÒÔÈÆ¹ýÇå¾²·À»¤£¬µ«ÆóÒµ°²ÅŵÄÖն˼ì²âÓëÏìÓ¦¹¤¾ßÀÖ³É×èµ²ÁËÆäÖ´ÐУ¬´ó·ù½µµÍËðʧ¡£WelivesecurityÆÊÎöʦָ³ö£¬DynoWiperÓëÕë¶ÔÎÚ¿ËÀ¼µÄÒÑÖª²Á³ý¶ñÒâÈí¼þZOV±£´æÏÔÖøÏàËÆÐÔ£¬Æä¹éÒòÓÚÓë¶íÂÞ˹¹ØÁªµÄSandworm×éÖ¯¡£
https://cybersecuritynews.com/dynowiper-data-wiping-malware/
3. Coinbase֤ʵÄÚ²¿Ö°Ô±Êý¾Ýй¶
2ÔÂ3ÈÕ£¬ÃÀ¹ú¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÈ·Èϱ¬·¢Ò»ÆðÄÚ²¿Ö°Ô±Êý¾Ýй¶ÊÂÎñ¡£¾Ý¹«Ë¾½²»°ÈËÅû¶£¬2025Äê12Ô£¬Ò»Ãû³Ð°üÉ̲»µ±»á¼ûÔ¼30Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢£¬°üÀ¨µç×ÓÓʼþ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢KYCÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üÓà¶î¼°ÉúÒâ¼Í¼¡£¸Ã³Ð°üÉÌÒѱ»ÖÕÖ¹ÏàÖú£¬ÊÜÓ°ÏìÓû§ÒÑ»ñÉí·Ý͵ÇÔ±£»¤·þÎñ¼°Ö¸µ¼£¬ÊÂÎñͬ²½Éϱ¨î¿Ïµ»ú¹¹¡£ÍþвÐÐΪÕß¡°Shiny Lapsus Hunters¡±Ôø¶ÌÔÝÔÚTelegramÐû²¼CoinbaseÄÚ²¿Ö§³Ö½çÃæ½ØÍ¼ºóɾ³ý£¬½ØÍ¼ÏÔʾ¿É»á¼û¿Í»§Ãô¸ÐÊý¾Ý¡£Ö»¹ÜÎÞ·¨È·ÈϸÃ×éÖ¯ÊÇ·ñÖ±½Ó¹ØÁªÄÚ²¿Ö°Ô±ÈëÇÖ£¬µ«ÀàËÆÊÖ·¨ÔÚÆäËû¹¥»÷ÖÐÆµÏÖ£¬ÈçÍþвÐÐΪÕßÔøÐлßCrowdStrikeÄÚ²¿Ö°Ô±»ñÈ¡½ØÍ¼£¬»òͨ¹ýÉç½»¹¤³Ìð³äÔ±¹¤ÆÈ¡BPOÖ§³ÖÖ°Ô±ÊÚȨ»á¼ûȨÏÞ¡£BPO¹«Ë¾Òò³Ð½Ó¿Í»§Ö§³Ö¡¢Éí·ÝÑéÖ¤¡¢IT·þÎñµÈÔËӪʹÃü£¬ÆäÔ±¹¤³£½Ó´¥ÆóÒµ½¹µãϵͳÓë¿Í»§Êý¾Ý£¬³ÉΪ¹¥»÷Õ߸߼ÛֵĿµÄ¡£
https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/
4. Step FinanceÔâºÚ¿Í¹¥»÷ÖÂ4000ÍòÃÀÔª×ʲúËðʧ
2ÔÂ3ÈÕ£¬ÃÀ¹ú¼ÓÃÜÇ®±Òƽ̨Step FinanceÓÚ2025Äê1ÔÂ31ÈÕ¼ì²âµ½Çå¾²Îó²î£¬¾ÊÓ²ìÈ·ÈÏÒò¸ß¹Ü×°±¸ÔâºÚ¿ÍÈëÇÖ£¬µ¼Ö¼ÛÖµÔ¼4000ÍòÃÀÔªµÄÊý×Ö×ʲú±»µÁ¡£¸Ãƽ̨ÊÇ»ùÓÚSolanaÇø¿éÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Æ½Ì¨¼°ÆÊÎö¹¤¾ß£¬Ö§³ÖÓû§×ʲú¿ÉÊÓ»¯¡¢ÉúÒâ¡¢ÖÊѺµÈ²Ù×÷£¬²¢ÓµÓÐÔÉú´ú±Ò$STEP£¬µ«ÉúÒâÁ¿Ïà¶Ô½ÏС¡£¹¥»÷±¬·¢ºó£¬Step FinanceѸËÙÔ¼ÇëÍøÂçÇ徲ר¼ÒÐÖú×·»Ø×ʲú¡£Çø¿éÁ´ÆÊÎö¹«Ë¾CertiKÆðÔ´±¨¸æÏÔʾ£¬±»µÁ×ʲú°üÀ¨261,854 SOL£¨Ô¼2890ÍòÃÀÔª£©£¬µ«Æ½Ì¨×îÖÕºËʵ×ÜËðʧԼ4000ÍòÃÀÔª¡£Í¨¹ýToken22±£»¤²½·¥¼°ÏàÖúͬ°éе÷£¬ÏÖÔÚÒÑ×·»ØÔ¼370ÍòÃÀÔªRemora×ʲú¼°100ÍòÃÀÔªÆäËûÍ·´ç£¬ºÏ¼Æ470ÍòÃÀÔª¡£ÎªÔöÇ¿Çå¾²·À»¤£¬Æ½Ì¨ÒÑÔÝÍ£²¿·ÖÓªÒµÔËÓª£¬²¢Ç¿µ÷ÆäÆìÏÂRemora MarketsδÊÜÓ°Ï죬ËùÓÐrTokenÈÔ¼á³Ö1:1ÍêÈ«´¢±¸¡£Step Finance½¨ÒéÓû§ÔÚÊӲ쿢ÊÂǰÔÝͣʹÓÃSTEP´ú±Ò£¬²¢ÔÊÐí½«¶Ô¹¥»÷ǰ״̬¾ÙÐпìÕÕ£¬Öƶ©Õë¶Ô³ÖÓÐÕߵĽâ¾ö¼Æ»®¡£
https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/
5. Citrix NetScalerÔâ6.3ÍòIPÐͬÕì̽
2ÔÂ3ÈÕ£¬Íþв¼à¿ØÆ½Ì¨GreyNoiseÊӲ쵽Õë¶ÔCitrix NetScaler»ù´¡ÉèÊ©µÄÐͬÕì̽Ðж¯£¬¸ÃÐж¯Ê¹Óó¬6.3Íò¸ö×ÔÁ¦IPµØµãÌᳫ111,834¸ö»á»°£¬ÆäÖÐ79%Á÷Á¿Ö¸ÏòCitrix GatewayÃÛ¹Þ£¬64%À´×Ôαװ³ÉÕýµ±ÏûºÄÕßISPµØµãµÄסլÊðÀí£¬Ê£Óà36%Ô´×ÔͳһAzure IPµØµã¡£GreyNoiseÖ¸³ö£¬´Ë´ÎÔ˶¯²¢·ÇËæ»ú»¥ÁªÍøÉ¨Ã裬¶øÊÇÓÐ×éÖ¯µÄ»ù´¡ÉèÊ©²â»æ£¬Ö¼ÔÚÈëÇÖǰʶ±ð̻¶µÄCitrixµÇÂ¼Ãæ°å¼°²úÆ·°æ±¾¡£¹¥»÷Õßͨ¹ýÁ½¸ö½¹µãÖ¸±ê̻¶¶ñÒâÒâͼ£ºÆäÒ»£¬63,189¸öIPÌìÉú109,942¸ö»á»°£¬¼¯ÖÐɨÃè¡°/logon/LogonPoint/index.html¡±Éí·ÝÑéÖ¤½çÃæ£¬´ó¹æÄ£Ê¶±ð̻¶µÄµÇÂ¼Ãæ°å£»Æä¶þ£¬2ÔÂ1ÈÕ10¸öIPÔÚ6СʱÄÚÆô¶¯1,892¸ö»á»°£¬¾Û½¹URL·¾¶¡°/epa/scripts/win/nsepa_setup.exe¡±£¬Í¨¹ýEPA¹¤¼þö¾ÙCitrix°æ±¾¡£¹¥»÷ÕßʹÓÃ2016ÄêÍ·Ðû²¼µÄChrome 50Óû§ÊðÀí£¬Õë¶ÔEPA×°ÖÃÎļþ·¾¶µÄÌØ¶¨¹¥»÷Åú×¢ÆäÕý¿ª·¢Ìض¨°æ±¾Îó²îʹÓóÌÐò»òÑéÖ¤ÒÑÖªCitrix ADCÎó²î¡£
https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/
6. CISA½ôÆÈת´ïSolarWinds·þÎñ̨Îó²î
2ÔÂ3ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SolarWinds Web Help DeskµÄÑÏÖØÎó²îCVE-2025-40551±ê¼ÇΪ"ÕýÔÚÔâÊܹ¥»÷"£¬²¢ÒÀ¾Ý2021ÄêÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD 22-01£©£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚÈýÌìÄÚÍê³ÉϵͳÐÞ²¹¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Jimi Sebree·¢Ã÷£¬Ô´ÓÚ²»ÊÜÐÅÍеÄÊý¾Ý·´ÐòÁл¯Èõµã£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔËÐжñÒâÏÂÁî¡£SolarWindsÓÚ1ÔÂ28ÈÕÐû²¼Web Help Desk 2026.1°æ±¾ÐÞ¸´´ËÎó²î£¬Í¬Ê±Ò»²¢ÐÞ¸´ÁËSebree·¢Ã÷µÄÓ²±àÂëÆ¾Ö¤¸ßΣÎó²î£¨CVE-2025-40537£©¼°watchTowrµÄPiotr Bazydlo±¨¸æµÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-40552¡¢CVE-2025-40554£©£¬ËùÓÐÎó²î¾ùÖ§³ÖÔ¶³ÌʹÓá£CISAÇ¿µ÷£¬Ö»¹ÜBOD 22-01½öÕë´ºÁª°î»ú¹¹£¬µ«Ë½Óª²¿·ÖÒ²Ó¦¾¡¿ìÐÞ²¹ÒÔµÖÓùÒ»Á¬¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/


¾©¹«Íø°²±¸11010802024551ºÅ