ÍøÂç·¸·¨·Ö×Ó½« Raspberry Pi Äð³ÉڲƺÍÌØ¹¤¹¤¾ß
Ðû²¼Ê±¼ä 2024-03-273ÔÂ25ÈÕ£¬£¬£¬£¬Ò»ÖÖÃûΪ GEOBOX µÄÐÂÈí¼þ°ü½ÓÄɼÛǮʵ»ÝÇÒÆÕ±éʹÓõÄRaspberry PiÅÌËã»ú£¬£¬£¬£¬²¢½«Æäת±äÎªÖØ´óµÄÄäÃû¹¤¾ß - רΪڲơ¢Ìع¤»î¶¯ºÍÈÆ¹ýÇå¾²¿ØÖƶø¶¨ÖÆ¡£¡£¡£¡£¡£¡£¡£GEOBOX ÔÚ°µÍøÂÛ̳ÉÏµÄ¹ã¸æ¼ÛÇ®½öΪÿÔ 80 ÃÀÔª£¬£¬£¬£¬ÔÊÐíÍøÂç·¸·¨·Ö×ÓÄܹ»£ºÐéα GPS λÖ㻣»£»£»£»£»ÓÕÆÍøÂçÉèÖúÍÑÚÊλ¥ÁªÍø»î¶¯¡£¡£¡£¡£¡£¡£¡£GEOBOX ϵͳµÄÉè¼ÆºÜÊǼòÆÓ¡£¡£¡£¡£¡£¡£¡£Í¨¹ýÌṩÓû§Êֲᣬ£¬£¬£¬×ÝÈ»ÊÖÒÕרҵ֪ʶÓÐÏÞµÄÈËÒ²¿ÉÄܻᰲÅÅÕâÖÖΣÏյŤ¾ß¡£¡£¡£¡£¡£¡£¡£GEOBOX ÒÔ¼°ÀàËÆ¹¤¾ß¸øÖ´·¨²¿·ÖºÍÍøÂçÇå¾²ÉçÇø´øÀ´ÁËÔ½À´Ô½´óµÄÌôÕ½¡£¡£¡£¡£¡£¡£¡£Ëæ×ÅÁªÍø×°±¸±äµÃÔ½·¢Ç¿Ê¢ÇÒ¼ÛǮʵ»Ý£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚѰÕÒеÄÒªÁìÀ´Ê¹ÓÃËüÃÇ¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/cybercriminals-turn-cheap-raspberry-pi-into-powerful-fraud-and-espionage-tool/
2. kimsuky Èö²¥Î±×°³Éº«¹úij¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ
3ÔÂ26ÈÕ£¬£¬£¬£¬AhnLab Çå¾²Ç鱨ÖÐÐÄ (ASEC) ×î½ü·¢Ã÷ Kimsuky ×éÖ¯Èö²¥Î±×°³Éº«¹ú¹«¹²»ú¹¹×°ÖóÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ËùÉæ¼°µÄ¶ñÒâÈí¼þÊÇÒ»¸ö½¨ÉèEndorºóÃŵÄÖ²Èë³ÌÐò¡£¡£¡£¡£¡£¡£¡£ËäȻûÓÐÔÚÏÖʵ¹¥»÷ÖÐʹÓøÃÖ²Èë³ÌÐòµÄ¼Í¼£¬£¬£¬£¬µ«ÔÚÓë¸ÃÖ²Èë³ÌÐò±»ÍøÂçµÄԼĪͳһʱÆÚ£¬£¬£¬£¬ÓÐÒ»¸öÉæ¼°¸ÃÖ²Èë³ÌÐò½¨ÉèºóÃŵĹ¥»÷°¸Àý¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßʹÓúóÃÅÏÂÔØÆäËû¶ñÒâÈí¼þ»ò×°ÖÃ½ØÆÁ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Endor Ò²¾³£ÓÃÓÚÆäËû¹¥»÷£»£»£»£»£»£»ÒÑÍù£¬£¬£¬£¬ËüÓëNikidoorÒ»ÆðʹÓ㬣¬£¬£¬Nikidoor ͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£¡£Dropper ±»Î±×°³Éº«¹úij¹«¹²»ú¹¹µÄ×°ÖóÌÐò¡£¡£¡£¡£¡£¡£¡£Æäͼ±ê½ÓÄÉÁ×ÆÃ»ú¹¹µÄ±ê¼Ç£¬£¬£¬£¬Ïà¹ØÒªº¦´Ê¿ÉÔÚ°æ±¾ÐÅÏ¢ºÍÉèÖÃÒ³ÃæÖÐÕÒµ½¡£¡£¡£¡£¡£¡£¡£ÁíÍ⣬£¬£¬£¬Ã»ÓÐÈκÎÕýµ±³ÌÐòµÄ°æ±¾Óë´ËÏàͬ¡£¡£¡£¡£¡£¡£¡£ÕâÅú×¢¸Ã¶ñÒâÈí¼þÖ»ÊDZ»Éè¼ÆµÃÏñÈÎºÎÆäËûÕýµ±³ÌÐòÒ»Ñù£¬£¬£¬£¬ÎÞÒ⽫×Ô¼ºÎ±×°³ÉÏÖÓгÌÐò¡£¡£¡£¡£¡£¡£¡£×ÝÈ»ÔÚ×°ÖÃÀú³ÌÖУ¬£¬£¬£¬¶ñÒâÈí¼þÒ²ÊÇΨһÒÔÕý³£·½·¨×°ÖõijÌÐò¡£¡£¡£¡£¡£¡£¡£
https://asec.ahnlab.com/en/63396/
3. ·ðÂÞÀï´ïÖݵÄÊ¥¿ËÀ͵ÂÊÐÔâµ½ÀÕË÷¹¥»÷
3ÔÂ26ÈÕ£¬£¬£¬£¬Ê¥¿ËÀ͵ÂÊÐÌåÏÖ£¬£¬£¬£¬ÀÕË÷¹¥»÷µ¼ÖÂÐí¶à²¿·ÖÊܵ½Ó°Ï죬£¬£¬£¬µ«ËûÃÇÕýÔÚ¾¡¿ÉÄÜ×î¼ÑµØÔË×÷£¬£¬£¬£¬Ö±µ½ÎÊÌâ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£¡£Ê¥¿ËÀ͵ÂλÓÚ°ÂÀ¼¶àÒÔÄÏԼһСʱ³µ³Ì´¦£¬£¬£¬£¬ÓµÓÐ 60000 ÃûסÃñ¡£¡£¡£¡£¡£¡£¡£²¢ÇÒ¹«Ô°ºÍÐÝÏл¼°Ð§À͵ÄÏÖ³¡¸¶¿îÒ²ÔÝʱֻÄÜʹÓÃÏֽ𡣡£¡£¡£¡£¡£¡£ÔÚÏßÉèʩԤ¶©¸¶¿îºÍÔÚÏ߻ע²áÈÔÈ»½ÓÊÜÐÅÓÿ¨¸¶¿î¡£¡£¡£¡£¡£¡£¡£¾¯Ô±ºÍÏû·À¾ÈÔ®ÕýÔÚÏìӦЧÀÍÇëÇ󡣡£¡£¡£¡£¡£¡£×ªÔËÕ¾µÄЧÀÍÓöÈÔÝʱֻÄÜÓÃÏÖ½ðÖ§¸¶£¬£¬£¬£¬ËùÓÐÀ¬»øºÍ½ÓÄÉÍøÂçõè¾¶½«°´ÍýÏëÔËÐС£¡£¡£¡£¡£¡£¡£°ÂÎ÷°ÂÀÏØË°Îñ¾ÖºÍ OUC µÈÍⲿ¹«ÓÃÊÂÒµµÄÌṩÉ̲¢Î´Êܵ½´Ë´Î¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/st-cloud-hit-with-ransomware-florida-string
4. Top.gg Discord »úеÈËÉçÇøÔâµ½¹©Ó¦Á´¹¥»÷
3ÔÂ25ÈÕ£¬£¬£¬£¬¶àÄêÀ´£¬£¬£¬£¬ÍþвÐÐΪÕßÒ»Ö±ÔÚʹÓöàÖÖÕ½ÂÔ¡¢ÊÖÒպͳÌÐò (TTP)£¬£¬£¬£¬°üÀ¨Ð®ÖÆ GitHub ÕÊ»§¡¢·Ö·¢¶ñÒâ Python °ü¡¢Ê¹ÓÃÐéαµÄ Python »ù´¡ÉèÊ©ºÍÉç»á¹¤³Ì¡£¡£¡£¡£¡£¡£¡£ÉÏ´«µ½ PyPI µÄ¶ñÒâ°ü³äµ±ÁËÆÆËðϵͳµÄ³õÊ¼ÔØÌå¡£¡£¡£¡£¡£¡£¡£Ò»µ©ÏµÍ³Ôâµ½ÆÆË𣬣¬£¬£¬»òÕß¹¥»÷ÕßÐ®ÖÆÁËÌØÈ¨ GitHub ÕÊ»§£¬£¬£¬£¬ËûÃǾͻá¸ü¸ÄÏîÄ¿ÎļþÒÔÖ¸Ïò¼Ù¾µÏñÉÏÍйܵÄÒÀÀµÏî¡£¡£¡£¡£¡£¡£¡£Top.gg Êǹ¥»÷Õß×î½üµÄÊܺ¦ÕßÖ®Ò»£¬£¬£¬£¬ÕâÊÇÒ»¸öÊ¢ÐеÄËÑË÷ºÍ·¢Ã÷ƽ̨£¬£¬£¬£¬ÊÊÓÃÓÚ Discord ЧÀÍÆ÷¡¢»úеÈËºÍÆäËûÉç½»¹¤¾ß£¬£¬£¬£¬Ö¼ÔÚÓÎÏ·¡¢Ìá¸ß¼ÓÈë¶ÈºÍˢй¦Ð§¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁË top.gg ά»¤Õß¡°editor-syntax¡±µÄÕÊ»§£¬£¬£¬£¬¸Ãά»¤Õß¶Ô¸ÃÆ½Ì¨µÄ GitHub ´æ´¢¿âÓµÓÐÖ÷ÒªµÄдÈë»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-poison-source-code-from-largest-discord-bot-platform/
5. ÓëÒÁÀÊÏà¹ØµÄ APT TA450 ÔÚ PDF ¸½¼þÖÐǶÈë¶ñÒâÁ´½Ó
3ÔÂ25ÈÕ£¬£¬£¬£¬ÓëÒÁÀÊÓÐ¹ØµÄ APT ×éÖ¯MuddyWater £¨ÓÖÃû SeedWorm¡¢ TEMP.Zagros¡¢TA450 ºÍ Static Kitten£©ÊÇ 2024 Äê 3 ÔÂÌᳫµÄÒ»´ÎеÄÍøÂç´¹ÂڻµÄÄ»ºóºÚÊÖ£¬£¬£¬£¬¸Ã»î¶¯ÊÔͼÔÚ 2024 Äê 3 ÔÂͶ·ÅÃûΪ Atera µÄÕýµ±Ô¶³Ì¼à¿ØºÍÖÎÀí (RMM) ½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Õë¶Ô´óÐÍ¿ç¹ú×éÖ¯µÄÒÔÉ«ÁÐÔ±¹¤£¬£¬£¬£¬Ê¹ÓÃÓëн³êÏà¹ØµÄÉç»á¹¤³Ì¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÂç´¹ÂڻÓÚ 3 Ô 7 ÈÕ×îÏÈ£¬£¬£¬£¬Ò»Ö±Ò»Á¬µ½ 2024 Äê 3 Ô 11 ÈÕÕâÒ»ÖÜ¡£¡£¡£¡£¡£¡£¡£TA450 ×éÖ¯·¢ËÍÓã²æÊ½ÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬ÆäÖаüÀ¨°üÀ¨¶ñÒâÁ´½ÓµÄ PDF ¸½¼þ¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÏòͳһÊÕ¼þÈË·¢ËÍÁ˶à·â´øÓÐ PDF ¸½¼þµÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬ÆäÖÐǶÈëµÄÁ´½ÓÂÔÓвî±ð¡£¡£¡£¡£¡£¡£¡£Proofpoint ƾ֤¶ÔÓëÍøÂçÌØ¹¤×éÖ¯¡¢»î¶¯Ä¿µÄÒÔ¼°¹¥»÷ÖÐʹÓõĶñÒâÈí¼þÏà¹ØµÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐòµÄÊӲ죬£¬£¬£¬½«´Ë´Î»î¶¯¹éÒòÓÚ TA450¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/161042/apt/iran-ta450-rmm-atera.html
6. ºÚ¿Í¿É½âËø Dormakaba ÏúÊÛµÄ 300 ¶àÍò¸ö·¿ÃÅ
3ÔÂ25ÈÕ£¬£¬£¬£¬ÊýǧÃûÇå¾²Ñо¿Ö°Ô±Æë¾ÛÀ˹ά¼Ó˹¼ÓÈëËùνµÄ¡°ºÚ¿ÍÏÄÁîÓª¡±£¨Ò»Á¬¾ÙÐÐ Black Hat ºÍ Defcon ºÚ¿Í¾Û»á£©Ê±£¬£¬£¬£¬ËûÃÇÖеÄһЩÈ˿϶¨»áʵÑéÈëÇÖ»ù´¡Éèʩά¼Ó˹×Ô¼º£¬£¬£¬£¬Õâ×ù¶¼»áÓµÓÐһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶Ä³¡ºÍÂùÝÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£Ian Carroll¡¢Lennert Wouters ºÍÆäËûÇå¾²Ñо¿Ö°Ô±ÍŶÓÕ¹ÏÖÁËÒ»ÖÖËûÃdzÆÖ®Îª Unsaflok µÄÂùÝÔ¿³×¿¨ºÚ¿ÍÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£¸ÃÊÖÒÕÊÇһϵÁÐÇå¾²Îó²îµÄÜöÝÍ£¬£¬£¬£¬ºÚ¿ÍÏÕЩ¿ÉÒÔÁ¬Ã¦·¿ªÈðÊ¿Ëø¾ßÖÆÔìÉÌ Dormakaba ÏúÊÛµÄ Saflok Æ·ÅÆ»ùÓÚ RFID µÄÔ¿³×¿¨ËøµÄ¶àÖÖÐͺ𣡣¡£¡£¡£¡£¡£Saflok ϵͳװÖÃÔÚÈ«Çò 131 ¸ö¹ú¼Ò 13000 ´¦·¿²úµÄ 300 ÍòÉÈÃÅÉÏ¡£¡£¡£¡£¡£¡£¡£
https://news.hitb.org/content/hackers-can-unlock-over-3-million-hotel-doors-seconds


¾©¹«Íø°²±¸11010802024551ºÅ