EmansrepoÐÅÏ¢ÇÔÈ¡³ÌÐò£ºFortiGuard×·×ÙÆäÖØ´ó¹¥»÷Á´
Ðû²¼Ê±¼ä 2024-09-059ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬FortiGuardʵÑéÊÒµÄÍøÂçÇ徲ר¼ÒÕýϸÃÜ×·×ÙÒ»ÖÖÃûΪ¡°Emansrepo¡±µÄ»ùÓÚPythonµÄÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐò×Ô2023Äê11ÔÂÆØ¹âÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Í¨¹ýαװ²É¹º¶©µ¥ºÍ·¢Æ±µÄÍøÂç´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬£¬£¬£¬¹¹½¨³öÈýÌõÖØ´ó¶à±äµÄ¹¥»÷·¾¶¡£¡£¡£ÕâЩ·¾¶»®·Ö½ÓÄÉAutoIt±àÒëµÄ¿ÉÖ´ÐÐÎļþ¡¢HTAÎļþ¼°BatchShield»ìÏýµÄÅú´¦Öóͷ£Îļþ×÷ÎªÔØÌ壬£¬£¬£¬£¬£¬£¬Ã¿ÖÖÊֶξùÖ¼ÔÚÈÆ¹ýÇå¾²¼ì²â£¬£¬£¬£¬£¬£¬£¬×îÖÕÖ´ÐжñÒâPython¾ç±¾ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£Emansrepo´Ó×î³õµÄµÇ¼ƾ֤¡¢ÐÅÓÿ¨ÐÅÏ¢ÍøÂ磬£¬£¬£¬£¬£¬£¬ÒÑÉú³¤µ½ÄÜÇÔÈ¡PDFÎĵµ¡¢ä¯ÀÀÆ÷À©Õ¹¡¢¼ÓÃÜÇ®±ÒÇ®°ü¼°ÓÎϷƽ̨Êý¾ÝµÈ¸üÆÕ±é¹æÄ£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÊµÑéÊÒ»¹×¢Öص½ÓëEmansrepo»î¶¯ÏàËÆµÄRemcos¶ñÒâÈí¼þÈö²¥£¬£¬£¬£¬£¬£¬£¬ÌåÏÖ±³ºó¿ÉÄÜÓÐͳһÍþв×éÖ¯¡£¡£¡£¼øÓÚ¹¥»÷ÕßÊÖÒÕµÄÒ»Ö±Éý¼¶Óë¶àÑù»¯£¬£¬£¬£¬£¬£¬£¬¸÷×éÖ¯Ðè¼á³Ö¸ß¶ÈСÐÄ£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÆð¾¢×Ô¶¯µÄÍøÂçÇå¾²·ÀÓùÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÒÔÓÐÓÃÓ¦¶ÔÈÕÒæÖØ´óµÄÍøÂçÍþвÇéÐΡ£¡£¡£
https://securityonline.info/emansrepo-stealer-a-multi-faceted-threat-evolving-in-complexity/
2. ÐÂÀÕË÷Èí¼þ±äÖÖUndergroundÓëRomCom×éÖ¯¹ØÁª
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬FortiGuard Labs½ÒÆÆÁËÒ»ÖÖÐÂÐÍÀÕË÷Èí¼þ±äÖÖUnderground£¬£¬£¬£¬£¬£¬£¬ËüÓëÎÛÃûÕÑÖøµÄ¶íÂÞ˹ºÚ¿Í×éÖ¯RomCom£¨ÓÖÃûStorm-0978£©Ï¸ÃÜÏà¹Ø¡£¡£¡£Õâ¿î¶ñÒâÈí¼þ×Ô2023Äê7ÔÂÆðËÁŰ£¬£¬£¬£¬£¬£¬£¬Öص㹥»÷ÐÞ½¨¡¢ÖÆÒ©¡¢ÒøÐм°ÖÆÔìÒµµÈ¶à¸öÒªº¦ÐÐÒµ£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¼ÓÃÜÊܺ¦ÕßWindowsϵͳÉϵÄÎļþÀ´ÀÕË÷Êê½ð¡£¡£¡£RomCom×éÖ¯²»µ«Ê¹ÓÃMicrosoft OfficeºÍWindows HTMLµÄÒÑÖªÎó²î£¨ÈçCVE-2023-36884£©ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬»¹¿ÉÄܽÓÄÉ´¹ÂÚÓʼþºÍ¹ºÖóõʼ»á¼ûȨÏÞµÈͨÀýÊֶΡ£¡£¡£UndergroundÈëÇֺ󣬣¬£¬£¬£¬£¬£¬»áѸËÙ½ûÓÃÇå¾²»úÖÆ£¬£¬£¬£¬£¬£¬£¬É¨³ýÓ°×Ó¸±±¾ºÍÈÕÖ¾¼Í¼£¬£¬£¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØ¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬£¬²¢ÁôÏÂÒ»ÕÅÃûΪ¡°!!readme!!!.txt¡±µÄÀÕË÷ÐÅ£¬£¬£¬£¬£¬£¬£¬ÒªÇóÖ§¸¶½âÃÜÓöȣ¬£¬£¬£¬£¬£¬£¬ÆäÆæÒìÖ®´¦ÔÚÓÚ²»¸Ä±äÎļþÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬£¬ÔöÌíÁËʶ±ðÄѶȡ£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔËÓªÒ»¸öÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬¹ûÕæ¾Ü¾øÖ§¸¶Êê½ðµÄÊܺ¦ÕßÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬½øÒ»²½Ê©Ñ¹¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬UndergroundµÄ¹¥»÷¹æÄ£ÒÑÀ©Õ¹ÖÁÈ«Çò£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÐ¹Â¶ÍøÕ¾ÒÑÁгö16¸ö¹ú¼ÒµÄÊܺ¦ÕßÃûµ¥£¬£¬£¬£¬£¬£¬£¬º¸ÇÃÀ¡¢·¨¡¢µÂ¡¢Î÷¡¢º«¡¢Ì¨¡¢Ð¼°¼ÓµÈµØ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯»¹Ê¹ÓÃTelegramºÍMegaÔÆ´æ´¢Ð§ÀÍÀ©´óÆäÓ°ÏìÁ¦£¬£¬£¬£¬£¬£¬£¬Èö²¥ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£
https://securityonline.info/romcom-groups-underground-ransomware-exploits-microsoft-zero-day-flaw/
3. ³¬2.2ÍòÈí¼þ°üÃæÁÙRevival HijackµÄΣº¦
9ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Revival Hijack¡±µÄÐÂÐ͹©Ó¦Á´¹¥»÷ÊÖÒÕÕýÍþв×ÅPythonÈí¼þ°üË÷Òý£¨PyPI£©µÄÇå¾²£¬£¬£¬£¬£¬£¬£¬¸ÃÊÖÒÕÒѱ»·¢Ã÷²¢±»ÓÃÓÚʵÑéÉøÍ¸ÏÂÓÎ×éÖ¯¡£¡£¡£JFrogÇå¾²¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬£¬£¬¸ÃÊÖÒÕÄÜÐ®ÖÆÁè¼Ý2.2Íò¸öÏÖÓÐPyPIÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬Òѵ¼ÖÂÊýÊ®Íò´Î¶ñÒâÏÂÔØ£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£ÆÕ±é¡£¡£¡£¹¥»÷ÕßʹÓÃPyPIµÄÕþ²ßÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÚÈí¼þ°ü±»ÔËùÓÐÕßɾ³ýºóÖØÐÂ×¢²á²¢ÉÏ´«¶ñÒâ°æ±¾£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓû§¿ÉÄܱ£´æµÄƴд¹ýʧ»òÐÅÈιßÐÔ£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼ÏÂÔØ¡£¡£¡£Óë¹Å°åÓòÃûÇÀ×¢²î±ð£¬£¬£¬£¬£¬£¬£¬Revival HijackרעÓÚÒÑɾ³ýµÄÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬Ã¿ÔÂÔ¼ÓÐ309¸öÈí¼þ°üÒò´Ë±äµÃųÈõ¡£¡£¡£ÕâЩÈí¼þ°üÒòȱ·¦Î¬»¤¡¢¸üÃû»ò¹¦Ð§ÕûºÏ¶ø±»ÒƳý£¬£¬£¬£¬£¬£¬£¬È´Îª¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú¡£¡£¡£JFrogÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÄÜÇÄÎÞÉùÏ¢µØÌæ»»Èí¼þ°ü£¬£¬£¬£¬£¬£¬£¬ÉõÖÁͨ¹ý¡°pip install -upgrade¡±ÏÂÁÕýµ±Èí¼þ°üÌæ»»Îª¶ñÒâ°æ±¾£¬£¬£¬£¬£¬£¬£¬¶ø¿ª·¢ÕߺÁÎÞ²ì¾õ¡£¡£¡£ÓÈΪÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪJinnisµÄÍþвÐÐΪÕßÒÑÏÖʵʹÓøÃÊÖÒÕ¡£¡£¡£ÆóÒµºÍ¿ª·¢ÕßÐèÔöǿСÐÄ£¬£¬£¬£¬£¬£¬£¬¼ì²éDevOps¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬È·±£²»×°ÖÃÒÑɾ³ýµÄÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬²¢½ÓÄÉÐëÒª²½·¥±£»£»£»£»£»£»£»£»¤×ÔÉíÃâÊÜ´ËÀàÐ®ÖÆÊÖÒÕµÄË𺦡£¡£¡£
https://www.trendmicro.com/en_us/research/24/i/earth-lusca-ktlvdoor.html
4. ÃÉ´óÄÃÖÝÍýÏëÉúÓýлáÔâRansomHubÀÕË÷Èí¼þ¹¥»÷
9ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÉ´óÄÃÖÝÍýÏëÉúÓýлá½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯RansomHubÉù³ÆÒÑÇÖÈëÆäϵͳ²¢ÇÔÈ¡93GBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÊý¾Ý¡£¡£¡£¸Ã·ÇÓªÀû×é֯ѸËÙÏìÓ¦£¬£¬£¬£¬£¬£¬£¬½«²¿·ÖÍøÂçÀëÏß²¢Õ÷ÕÙÁª°îÖ´·¨ºÍÐÅÏ¢Ç徲ר¼ÒÐÖúÊÓ²ìÓëÖØÐÞITÇéÐΡ£¡£¡£ÃÀ¹úÍýÏëÉúÓý°ì¹«ÊÒÊ×ϯִÐйÙÂêɯ¡¤¸»ÀÕÈ·ÈÏÁËÕâÒ»¡°ÍøÂçÇå¾²ÊÂÎñ¡±£¬£¬£¬£¬£¬£¬£¬²¢Ð»Ð»ÍŶӵIJ»Ð¸Æð¾¢ÒÔ»Ö¸´ÏµÍ³ºÍÊÓ²ìÊÂÎñ¡£¡£¡£Ö»¹Ü¸»ÀÕδ͸¶ÏêϸÊý¾Ýй¶ÇéÐΣ¬£¬£¬£¬£¬£¬£¬µ«È·ÈÏÒÑÏòÁª°îÖ´·¨²¿·Ö±¨¸æ²¢×·ÇóÖ§³Ö¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢Ç°£¬£¬£¬£¬£¬£¬£¬FBIµÈÒÑÐû²¼¹ØÓÚRansomHub»îÔ¾ÐÔµÄÇå¾²¾¯±¨£¬£¬£¬£¬£¬£¬£¬Ö¸³öÆä×Ô2ÔÂÒÔÀ´Òѵ¼ÖÂÖÁÉÙ210ÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬º¸Ç¶à¸öÒªº¦»ù´¡ÉèÊ©ÁìÓò¡£¡£¡£´Ë´ÎÕë¶ÔÌṩÉúÖ³±£½¡Ð§À͵ķÇÓªÀû×éÖ¯µÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬±»ÊÓΪÓÈΪ±°ÁÓµÄÐÐΪ¡£¡£¡£
https://www.theregister.com/2024/09/04/planned_parenthood_cybersecurity_incident/
5. ºÚ¿Í×éÖ¯ÁªºÏ¶Ô·¨·¢¶¯DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒªÇóÊÍ·ÅTelegramÊ×´´ÈË
9ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬Telegram Ê×ϯִÐйÙÅÁά¶û¡¤¶ÅÂÞ·ò±»²¶ºó£¬£¬£¬£¬£¬£¬£¬Ò»ÏµÁкڿÍ×é֯ѸËÙ¼¯½á£¬£¬£¬£¬£¬£¬£¬ÌᳫÃûΪ #FreeDurov »ò #OpDurov µÄÈ«ÇòÍøÂçÐж¯£¬£¬£¬£¬£¬£¬£¬Ã¬Í·Ö±Ö¸·¨¹ú£¬£¬£¬£¬£¬£¬£¬Í¨¹ýʵÑé´ó¹æÄ£µÄÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷ºÍºÚ¿ÍÊÖÒÕÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¶ÔÁè¼Ý50¸ö·¨¹úÕþ¸®»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢½»Í¨ÊàŦ¡¢½ÌÓý»ú¹¹¼°Ë½ÓªÆóÒµÌᳫÌôÕ½¡£¡£¡£ÕâЩºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶íÂÞË¹ÍøÂç¾üÖØÉú£¨CARR£©¡¢RipperSec¡¢EvilWeb¡¢CyberDragon µÈ£¬£¬£¬£¬£¬£¬£¬´ó¶¼¾ßÓÐÇ×¶í»òÇ×ÒÁ˹À¼ÇãÏò£¬£¬£¬£¬£¬£¬£¬ËûÃÇʹÓÃ×ÔÉíÊÖÒÕ×ÊÔ´ºÍ Telegram ƽ̨ÆÕ±é·¢¶¯£¬£¬£¬£¬£¬£¬£¬ÒªÇ󷨹úÊͷŶÅÂÞ·ò¡£¡£¡£CARR ×÷Ϊ´Ë´ÎÐж¯µÄÁìÍ·Ñò£¬£¬£¬£¬£¬£¬£¬ÒÀ¸½ÆäÓë¶íÂÞ˹¾üÊÂÇ鱨²¿·ÖµÄÁªÏµ¼°ÖØ´óµÄÉçȺ»ù´¡£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¶à¸ö·¨¹úÖ÷Òª»ú¹¹·¢¶¯¹¥»÷¡£¡£¡£RipperSec µÈ×éÖ¯Ò²²»¸ÊÂäÎ飬£¬£¬£¬£¬£¬£¬½ÓÄÉרҵ¹¤¾ßÈç MegaMedusa ¶Ô·¨¹ú˾·¨ºÍ¾¯·½ÏµÍ³ÊµÑéÇ¿ÁÒ¹¥»÷¡£¡£¡£ºÚ¿ÍÃDz»µ«Í¨¹ý DDoS ¹¥»÷̱»¾Ä¿µÄÍøÕ¾£¬£¬£¬£¬£¬£¬£¬»¹Éù³ÆÈëÇÖ²¢ÇÔÈ¡Á˲¿·ÖÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÔÚ Telegram ÉÏìÅÒ«Õ½¹û¡£¡£¡£Ö»¹ÜÄîÍ·¸÷Ò죬£¬£¬£¬£¬£¬£¬´ÓÖ§³Ö¶ÅÂÞ·òСÎÒ˽¼Òµ½Î¬»¤ Telegram µÄÔËÓªÇå¾²£¬£¬£¬£¬£¬£¬£¬µ«ÅäºÏµÄËßÇóÊÇ´Ùʹ·¨¹úÕþ¸®ÖØÐÂ˼Á¿ÆäÐж¯¡£¡£¡£
https://hackread.com/ddos-attacks-france-telegrams-pavel-durov-arrest/
6. MacroPack¹¤¾ßÔâÀÄÓ㬣¬£¬£¬£¬£¬£¬¶à¹ú·¢Ã÷¶ñÒâÎĵµ
9ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬MacroPackÊÇÒ»¿îÔΪºì¶ÓÑÝÁ·Éè¼ÆµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬½üÆÚ±»²»·¨·Ö×ÓÀÄÓ㬣¬£¬£¬£¬£¬£¬ÓÃÓÚÈö²¥Havoc¡¢Brute RatelºÍPhatomCoreµÈ¶ñÒâ¸ºÔØ£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£²¨¼°¶à¸ö¹ú¼ÒºÍµØÇø¡£¡£¡£¸Ã¹¤¾ßÓÉ·¨¹ú¿ª·¢ÕßEmeric Nasi¿ª·¢£¬£¬£¬£¬£¬£¬£¬¾ß±¸·´¶ñÒâÈí¼þÈÆ¹ý¡¢´úÂë»ìÏýµÈ¸ß¼¶¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¹½¨Òþ²ØµÄ¶ñÒâÎĵµ³ÉΪ¿ÉÄÜ¡£¡£¡£Cisco TalosµÄÑо¿Õ¹ÏÖ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâÎĵµÍ¨¹ýVirusTotalƽ̨Ìá½»µÄÑù±¾ÏÔʾ³ö¸ß¶È¶àÑùÐÔ£¬£¬£¬£¬£¬£¬£¬°üÀ¨²î±ðÓÕ¶ü¡¢ÅÓºéˮƽºÍѬȾÊֶΣ¬£¬£¬£¬£¬£¬£¬Åú×¢MacroPackÒѳÉΪºÚ¿Í¹¥»÷µÄг衣¡£¡£±»²¶»ñµÄ¶ñÒâÑù±¾ÖУ¬£¬£¬£¬£¬£¬£¬¾ùÁôÓÐMacroPack½¨ÉèµÄÌØÕ÷£¬£¬£¬£¬£¬£¬£¬ÈçÂí¶û¿É·òÁ´ÃüÃûµÄº¯ÊýºÍ±äÁ¿¡¢É¾³ý×¢Êͼ°¿Õ¸ñÒÔïÔ̾²Ì¬ÆÊÎö¼ì²âµÈ¡£¡£¡£Êܺ¦ÕßÒ»µ©·¿ªÕâЩαװ³É¼ÓÃܱí¸ñ¡¢¾üÊÂ֪ͨ»ò¾ÍҵȷÈÏÊéµÄOfficeÎĵµ£¬£¬£¬£¬£¬£¬£¬±ã»á´¥·¢VBA´úÂ룬£¬£¬£¬£¬£¬£¬¼ÓÔØ¶ñÒâDLL²¢ÅþÁ¬µ½¹¥»÷ÕßµÄC2ЧÀÍÆ÷¡£¡£¡£²î±ðµØÇøµÄ¹¥»÷°¸Àý¸÷¾ßÌØÉ«£ºÃÀ¹ú°¸ÀýÖУ¬£¬£¬£¬£¬£¬£¬¶ñÒâÎĵµÎ±×°³É¼ÓÃܸüбí¸ñ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃmshta.exeÏÂÔØÎ´ÖªÔØºÉ£»£»£»£»£»£»£»£»¶íÂÞ˹°¸ÀýÖУ¬£¬£¬£¬£¬£¬£¬ExcelÊÂÇé²¾ÍýÏëÏÂÔØPhantomCoreºóÃÅ£»£»£»£»£»£»£»£»°Í»ù˹̹°¸ÀýÖУ¬£¬£¬£¬£¬£¬£¬ÔòÒÔ¾üÊÂÏà¹ØÖ÷Ìâαװ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃHTTPS DNSºÍÑÇÂíÑ·CloudFrontͨѶ£¬£¬£¬£¬£¬£¬£¬ÉõÖÁǶÈëAdobe Experience Cloud¸ú×Ù´úÂë¡£¡£¡£
https://www.bleepingcomputer.com/news/security/red-team-tool-macropack-abused-in-attacks-to-deploy-brute-ratel/


¾©¹«Íø°²±¸11010802024551ºÅ