Âí˹¿ËDOGEÍýÏëÏÝÍøÂçÇ徲Σ»£»£»£»£»ú£¬£¬£¬£¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹âÎó²î
Ðû²¼Ê±¼ä 2025-02-181. Âí˹¿ËDOGEÍýÏëÏÝÍøÂçÇ徲Σ»£»£»£»£»ú£¬£¬£¬£¬Õþ¸®Ð§Âʲ¿ÍøÕ¾ÔâºÚ¿ÍÆØ¹âÎó²î
2ÔÂ14ÈÕ£¬£¬£¬£¬¿Æ¼¼ÒÚÍò¸»Ḭ̂£Â¡¡¤Âí˹¿ËÖÎÀíµÄÕþ¸®Ð§Âʲ¿£¨DOGE£©Ö¼ÔÚÏ÷¼õÁª°î¿ªÖ§²¢ÌáÉýÕþ¸®Ð§ÂÊ£¬£¬£¬£¬È»¶ø£¬£¬£¬£¬Æäн¨ÉèµÄDOGE.govÍøÕ¾È´ÒòÍøÂçÇå¾²²½·¥ËÉи¶øÃæÁÙÖØ´óΣº¦¡£¡£¡£¡£ºÚ¿ÍÖ¸³ö£¬£¬£¬£¬¸ÃÍøÕ¾±£´æÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬ÈκÎÈ˶¼ÄÜ»á¼û²¢±à¼´æ´¢µÄÐÅÏ¢¡£¡£¡£¡£ÍøÕ¾Ëƺõ»Å潨³É£¬£¬£¬£¬¸´ÖÆÁËDOGEµÄÉ罻ýÌåÌû×Ó¼°Òªº¦Í³¼ÆÊý¾Ý£¬£¬£¬£¬ÇÒÊý¾Ý¿â¹ûÕæ£¬£¬£¬£¬ÔÊÐíµÚÈý·½ÐÞ¸ÄÄÚÈݲ¢ÊµÊ±ÏÔʾ¡£¡£¡£¡£¾Ý¿ª·¢Ö°Ô±Í¸Â¶£¬£¬£¬£¬¸ÃÍøÕ¾ÍйÜÔÚCloudflare PagesÉÏ£¬£¬£¬£¬¶ø·ÇÕþ¸®Ð§ÀÍÆ÷£¬£¬£¬£¬Êý¾Ý¿âAPI¶Ëµã¿É±»ÈÝÒ×ÕÒµ½²¢ÍÆË͸üС£¡£¡£¡£±ðµÄ£¬£¬£¬£¬DOGEµÄÁíÒ»ÍøÕ¾waste.govÒ²±£´æÁËWordPressĬÈÏÄ£°åºÍʾÀýÎı¾£¬£¬£¬£¬½öÔÚýÌ幨עºó²Å±»·â½û¡£¡£¡£¡£ÕâЩÊÂÎñ͹ÏÔÁËDOGEÔÚ×·ÇóЧÂʵÄͬʱ£¬£¬£¬£¬ºöÊÓÁËÍøÂçÇå¾²µÄÖ÷ÒªÐÔ£¬£¬£¬£¬¿ÉÄܳÉΪÆäˢеÄÎþÉüÆ·¡£¡£¡£¡£
https://cybernews.com/security/musk-doge-website-hacked/
2. ºÉÀ¼¾¯·½²é·âZservers/XHost·Àµ¯ÍйÜЧÀÍ127̨ЧÀÍÆ÷
2ÔÂ17ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ÃÀ¡¢Ó¢¡¢°ÄÈý¹ú¶Ô¶íÂÞ˹·Àµ¯ÍйÜЧÀÍÌṩÉÌZservers¼°ÆäÖÎÀíÔ±Alexander Igorevich MishinºÍAleksandr Sergeyevich BolshakovʵÑéÖÆ²Ã£¬£¬£¬£¬ÒòÆäÖ§³Ö¶íÂÞ˹ÀÕË÷Èí¼þLockBitÐж¯¡£¡£¡£¡£ZserversλÓÚ¶íÂÞ˹°Í¶ûè§¶û£¬£¬£¬£¬Í¨¹ýÌṩ·Àµ¯ÍйÜЧÀÍ£¨BPH£©£¬£¬£¬£¬°üÀ¨×âÁÞ´ó×ÚIPµØµã£¬£¬£¬£¬ÐÖúLockBit¹ØÁª¹«Ë¾ÌÓ±ÜÖ´·¨ºÍÍøÂçÇå¾²¹«Ë¾µÄÉó²é£¬£¬£¬£¬Ðе÷ÌᳫÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬¼ÓÄôóÖ´·¨²¿·ÖÔÚËѲéÖз¢Ã÷ZserversµÄת×âIPµØµãÓëLockBit¶ñÒâÈí¼þ²Ù×÷Óйء£¡£¡£¡£ºÉÀ¼ÒòÖ´·¨±¡ÈõÄÑÒԹرմËÀàЧÀÍ£¬£¬£¬£¬Í¹ÏÔÁËÔöÇ¿¹æÔòµÄÐëÒªÐÔ¡£¡£¡£¡£¼¸Ììºó£¬£¬£¬£¬ºÉÀ¼¾¯·½Ðû²¼ÒÑÏÂÏß²¢²é·âÁËÓëZservers/XHostÏà¹ØµÄ127̨λÓÚ°¢Ä·Ë¹Ìص¤µÄЧÀÍÆ÷¡£¡£¡£¡£ÕâЩЧÀÍÆ÷±»ContiºÍLockBitµÈÍøÂç·¸·¨¼¯ÍÅʹÓᣡ£¡£¡£¾ÓÉÒ»Äê¶àµÄÊӲ죬£¬£¬£¬°¢Ä·Ë¹Ìص¤¾¯·½ÍøÂç·¸·¨Ð¡×éÔÚ2ÔÂ12ÈÕµÄͻϮÖе·»ÙÁËÕâ¼Ò·Àµ¯ÍйÜÉÌ¡£¡£¡£¡£Ðж¯Öз¢Ã÷µÄЧÀÍÆ÷ÉÏ×°ÓÐContiºÍLockbitµÄºÚ¿Í¹¤¾ß£¬£¬£¬£¬ÕâÁ½¸ö¼¯Íű»ÒÔΪÊÇÌìÏÂÉÏ×î¾ßÉú²úÁ¦ºÍÆÆËðÁ¦µÄÀÕË÷Èí¼þ¼¯ÍÅ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬¾¯ÆÓÖ±ÔÚÆÊÎö±»¿ÛѺЧÀÍÆ÷ÉÏ´æ´¢µÄÊý¾Ý¡£¡£¡£¡£
https://securityaffairs.com/174321/hacking/dutch-police-seized-127-servers-bulletproof-hosting-service-zservers-xhost.html
3. XCSSET macOS¶ñÒâÈí¼þбäÖÖÔöÇ¿¹¥»÷ÄÜÁ¦£¬£¬£¬£¬ÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢
2ÔÂ17ÈÕ£¬£¬£¬£¬XCSSET macOSÄ£¿£¿£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þµÄбäÖÖÒÑ·ºÆðÔÚÕë¶ÔÓû§Ãô¸ÐÐÅÏ¢µÄ¹¥»÷ÖУ¬£¬£¬£¬°üÀ¨Êý×ÖÇ®°üºÍNotesÓ¦ÓóÌÐòµÄÊý¾Ý¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ³£Í¨¹ýÊÜѬȾµÄXcodeÏîÄ¿¾ÙÐÐÈö²¥£¬£¬£¬£¬ÒѾ±£´æÖÁÉÙÎåÄ꣬£¬£¬£¬²¢ÇÒÿ´Î¸üж¼´ú±í×Å¿ª·¢µÄÒ»¸öÀï³Ì±®¡£¡£¡£¡£Î¢ÈíÍþвÇ鱨ÍŶÓÔÚÓÐÏ޵Ĺ¥»÷Öз¢Ã÷ÁË×îбäÖÖ£¬£¬£¬£¬Ëü¾ßÓÐÔöÇ¿µÄ´úÂë»ìÏý¡¢¸üºÃµÄ³¤ÆÚÐÔºÍеÄѬȾսÂÔ¡£¡£¡£¡£ÐµıäÖÖ½ÓÄÉÁËÒÀÀµÓÚBase64ºÍxxdÒªÁìµÄ±àÂëÊÖÒÕ¾ÙÐÐеĻìÏý£¬£¬£¬£¬Í¬Ê±Ê¹ÓÃÁËzshrcºÍdockÁ½ÖÖ³¤ÆÚÐÔÊÖÒÕ¡£¡£¡£¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃеÄXcodeѬȾҪÁ죬£¬£¬£¬½«ÓÐÓÃÔØºÉ°²ÅÅÔÚXcodeÏîÄ¿ÖС£¡£¡£¡£¹ØÓÚzshrc³¤ÆÚ»¯ÒªÁ죬£¬£¬£¬ÐµıäÖֻὨÉèÒ»¸ö°üÀ¨ÓÐÓøºÔصÄÎļþ£¬£¬£¬£¬²¢ÔÚÆô¶¯ÐµÄshell»á»°Ê±Æô¶¯¸ÃÎļþ¡£¡£¡£¡£¹ØÓÚdockÒªÁ죬£¬£¬£¬¶ñÒâÈí¼þ´Ó¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÏÂÔØÒÑÊðÃûµÄdockutil¹¤¾ßÀ´ÖÎÀídockÏîÄ¿£¬£¬£¬£¬²¢½¨ÉèÒ»¸ö¶ñÒâµÄLaunchpadÓ¦ÓóÌÐòÀ´Ö´ÐжñÒâ¸ºÔØ¡£¡£¡£¡£XcodeÊÇAppleµÄ¿ª·¢¹¤¾ß¼¯£¬£¬£¬£¬XCSSETµÄÔËÓªÕßͨ¹ýÕë¶ÔXcodeÏîÄ¿×ÊÔ´¿ÉÒÔ½Ó´¥µ½¸ü¶àµÄÊܺ¦Õß¡£¡£¡£¡£Î¢Èí½¨Òé¼ì²éºÍÑéÖ¤´Ó·Ç¹Ù·½´æ´¢¿â¿Ë¡µÄXcodeÏîÄ¿ºÍ´úÂë¿â£¬£¬£¬£¬ÒÔ·ÀÒþ²Ø»ìÏýµÄ¶ñÒâÈí¼þ»òºóÃÅ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-spots-xcsset-macos-malware-variant-used-for-crypto-theft/
4. ºÚ¿ÍʹÓà Telegram API Èö²¥Ð嵀 Golang ºóÃÅ
2ÔÂ17ÈÕ£¬£¬£¬£¬NetskopeµÄÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеġ¢¿ÉÄÜÈÔÔÚ¿ª·¢ÖеĻùÓÚGolangµÄºóÃŶñÒâÈí¼þ£¬£¬£¬£¬ËüʹÓÃTelegram API¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶¡£¡£¡£¡£ÕâÖÖ¶ñÒâÈí¼þÔ´×Ô¶íÂÞ˹£¬£¬£¬£¬Ê¹ÓÃÁËTelegramµÈÔÆÐ§ÀÍ£¬£¬£¬£¬ÕâЩЧÀÍÒ×ÓÚ¹¥»÷ÕßʹÓöøÄÑÒÔ±»Ñо¿Ö°Ô±¼à¿Ø¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÔÚÖ´ÐÐʱ»á¼ì²é×ÔÉíÊÇ·ñ´ÓÖ¸¶¨Î»ÖúÍÎļþÃûÔËÐУ¬£¬£¬£¬Èç²»ÊÇ£¬£¬£¬£¬Ôò»á¸´ÖƵ½¸ÃλÖò¢Æô¶¯¸±±¾¡£¡£¡£¡£¹ØÓÚC2ͨѶ£¬£¬£¬£¬ºóÃÅʹÓÿªÔ´Go°üÓëTelegram½»»¥£¬£¬£¬£¬½¨ÉèÒ»¸ö»úеÈËʵÀýÀ´¼àÊÓÖ¸¶¨µÄ̸ÌìÖÐÊÇ·ñÓÐÐÂÏÂÁî¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ§³ÖËĸöÏÂÁ£¬£¬£¬µ«ÏÖÔÚֻʵÏÖÁËÈý¸ö£¬£¬£¬£¬°üÀ¨Ö´ÐÐPowerShellÏÂÁî¡¢ÖØ¸´³õʼװÖüì²éºÍÀú³Ì¡¢·¢ËÍÆÁÄ»½ØÍ¼ÐÂÎÅ£¨ËäδÍêȫʵÏÖ£©ÒÔ¼°×Ô»ÙÏÂÁî¡£¡£¡£¡£ÕâÖÖ¶ÔÔÆÓ¦ÓóÌÐòµÄ¶ñÒâʹÓøø·ÀÓùÕß´øÀ´ÁËÌôÕ½£¬£¬£¬£¬ÓÉÓÚ´Ó·ÀÓùÕߵĽǶÈÀ´¿´£¬£¬£¬£¬ºÜÄÑÇø·ÖʹÓÃAPIµÄͨË×Óû§ºÍC2ͨѶ¡£¡£¡£¡£ÎªÁ˼á³ÖÇå¾²£¬£¬£¬£¬½¨Òé×°ÖÃ×îÐÂÇÒÐÅÓþÓÅÒìµÄ·À²¡¶¾ºÍ·´¶ñÒâÈí¼þ£¬£¬£¬£¬ÒÔ¼ì²âºÍ×èÖ¹´ËÀà¶ñÒâÎļþ¡£¡£¡£¡£
https://hackread.com/hackers-exploit-telegram-api-spread-golang-backdoor/
5. RansomHubÀÕË÷Èí¼þ×éÖ¯¹¥»÷ËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä
2ÔÂ17ÈÕ£¬£¬£¬£¬RansomHubÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶ÔËÕÊ¥ÂêÀöÆæÆÕÍßÓ¡µÚ°²²¿Âä¾ÙÐÐÁ˹¥»÷£¬£¬£¬£¬ÒÑËø¶¨Æä»ù´¡ÉèÊ©²¢»ñÈ¡ÁË119GBµÄÎļþ¡£¡£¡£¡£ÊÜÓ°ÏìµÄϵͳ°üÀ¨¶Ä³¡¡¢±ãµ±µê¡¢Õþ¸®´óÂ¥¡¢µçÐÅЧÀÍÒÔ¼°¶à¸öÒ½ÁÆÖÐÐÄ¡£¡£¡£¡£RansomHubÖ¸Ôð²¿Âäδ¾ÙÐÐ̸ÅУ¬£¬£¬£¬²¢Æ·ÆÀÆä°ü¹Ü¹«Ë¾ºÍ¶Ê»áδ½ÓÄÉÐж¯¡£¡£¡£¡£RansomHubÍþв³Æ£¬£¬£¬£¬ÈôÖÜÈýǰδÊÕµ½»Ø¸´£¬£¬£¬£¬½«Ð¹Â¶ËùÓÐÊý¾Ý¡£¡£¡£¡£ËÕÊ¥ÂêÀöÆæçêÍßÓ¡µÚ°²²¿ÂäÔò½ÒÏþÉùÃ÷³Æ£¬£¬£¬£¬2ÔÂ9ÈÕÔâÊÜÁËÀÕË÷Èí¼þÍøÂç¹¥»÷£¬£¬£¬£¬¶à¸öµç»°ºÍÅÌËã»úϵͳÊܵ½Ó°Ïì¡£¡£¡£¡£²¿ÂäÕýÔÚÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬£¬Æð¾¢½â¾öÎÊÌ⣬£¬£¬£¬²¢ÉèÁ¢ÁËеĵ绰ºÅÂ룬£¬£¬£¬Ô¤¼Æ½«ÒÔÓÐÏÞÄÜÁ¦ÔË×÷Ò»ÖÜ¡£¡£¡£¡£²¿ÂäÖ÷ϯÏòÉçÇø°ü¹Ü£¬£¬£¬£¬ËûÃǽ«¼ÌÐø°´ÆÚ¸üлָ´ÇéÐΣ¬£¬£¬£¬µ«ÏÖÔÚÎÞ·¨·ÖÏí¸ü¶àϸ½Ú£¬£¬£¬£¬Ð»Ð»¸÷È˵ÄÄÍÐĺÍÃ÷È·¡£¡£¡£¡£
https://databreaches.net/2025/02/17/ransomware-attack-affects-michigan-casinos-and-tribal-health-centers/
6. Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯DDoS¹¥»÷
2ÔÂ17ÈÕ£¬£¬£¬£¬Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀû¶à¼ÒʵÌå·¢¶¯ÁËDDoS¹¥»÷£¬£¬£¬£¬Ä¿µÄ°üÀ¨ÀûÄÉÌØ»ú³¡¡¢Âí¶ûÅíÈø»ú³¡¡¢½»Í¨ÖÎÀí¾Ö¡¢Intesa San PaoloÒøÐÐÒÔ¼°ËþÀ¼Íиۺ͵ÄÀïÑÅË¹ÌØ¸ÛµÄÍøÕ¾¡£¡£¡£¡£ÕâЩ¹¥»÷ÊǶÔÒâ´óÀû×ÜͳÂíËþÀ×À½«¶íÂÞ˹ÓëÄÉ´âµÂ¹úÀúÊ·¾ÙÐнÏÁ¿µÄÑÔÂ۵ĻØÓ¦£¬£¬£¬£¬NoName057(16)Éù³ÆÕâÊǶԡ°¿Ö¶íÕß¡±µÄ´¦·Ö¡£¡£¡£¡£Ö»¹Ü¹¥»÷¶ÔÄ¿µÄµÄÓ°Ïì½ÏС£¡£¡£¡£¬£¬£¬£¬µ«Òâ´óÀû¹ú¼ÒÍøÂçÇå¾²¾ÖѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬Ö§³ÖÊÜÓ°ÏìµÄ×éÖ¯²¢Ïû³ýÁ˹¥»÷¡£¡£¡£¡£NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬Ê¹ÓöàÖÖ¹¤¾ß¾ÙÐй¥»÷£¬£¬£¬£¬²¢ÔÚµØÔµÕþÖÎÖ÷ҪʱÆÚÉý¼¶Ï®»÷¡£¡£¡£¡£´Ë´Î¹¥»÷²¢·ÇÊ״Σ¬£¬£¬£¬Ö®Ç°¸Ã×éÖ¯Ò²Ôø¶ÔÒâ´óÀû¸÷²¿Î¯¡¢»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ÍøÕ¾ºÍ˽ÈË×éÖ¯Ìᳫ¹ý¹¥»÷¡£¡£¡£¡£¶íÂÞ˹Íâ½»²¿½²»°ÈËÂêÀöÑÇ¡¤Ôú¹þÂÞÍÞÒ²ÌåÏÖ£¬£¬£¬£¬ÂíËþÀ×ÀµÄÑÔÂÛ²»»á¡°²»ÊÜ´¦·Ö¡±¡£¡£¡£¡£
https://securityaffairs.com/174294/hacktivism/noname05716-launched-ddos-attacks-on-italian-sites.html


¾©¹«Íø°²±¸11010802024551ºÅ