Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2026-02-041. Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷
2ÔÂ2ÈÕ£¬£¬£¬ºÚ¿Í×éÖ¯Punishing OwlÓÚ2025Äê12ÔÂ12ÈÕÊ״ιûÕæ»î¶¯£¬£¬£¬¶Ô¶íÂÞ˹Õþ¸®Çå¾²»ú¹¹ÌᳫÊÖÒÕÖØ´óµÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÈëÇÖÄ¿µÄÍøÂçÇÔÈ¡ÄÚ²¿Îļþ£¬£¬£¬²¢½«ÆäÐû²¼ÖÁÊý¾Ýй¶ƽ̨£¬£¬£¬Í¬Ê±ÔÚMega.nz´æ´¢¿ÍÕ»±¸·ÝÎļþ£¬£¬£¬ÒÔ×î´ó»¯ÆØ¹â¶È¡£¡£¡£¡£¡£¡£ÎªÍÏÑÓÊܺ¦ÕßÏìÓ¦²¢À©´óÓ°Ï죬£¬£¬¹¥»÷ÕßÌØÒâÑ¡ÔñÖÜÎåÍí6µã37·ÖÕâÒ»·ÇÊÂÇéʱ¶ÎÐû²¼ÈëÇÖÊÂÎñ¡£¡£¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬Punishing Owl¿ØÖÆÁËÊܺ¦»ú¹¹µÄDNSÉèÖ㬣¬£¬½¨Éè×ÓÓòÃû²¢½«Á÷Á¿Ð®ÖÆÖÁλÓÚ°ÍÎ÷µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷²»µ«ÍйÜÁËÇÔÈ¡µÄÎļþ£¬£¬£¬»¹¸½´øÁËÒ»·ÝÐðÊö¹¥»÷ÄîÍ·µÄÕþÖÎÉùÃ÷¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬¸Ã×éÖ¯½øÒ»²½¶ÔÊܺ¦»ú¹¹µÄÏàÖúͬ°éÓë³Ð°üÉÌÌᳫÉÌÒµµç×ÓÓʼþڲƣ¨BEC£©¹¥»÷£¬£¬£¬Ê¹ÓÃαÔìµÄ·¢¼þµØµã·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬»Ñ³ÆÊÇÍøÂçÈëÇÖÊÂÎñµÄºËʵ֪ͨ£¬£¬£¬²¢±Þ²ßÊÕ¼þÈËÉó²é¸½¼þÎĵµ¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬Punishing OwlÕ¹ÏÖ³ö¸ßË®×¼µÄ¹¥»÷ÄÜÁ¦¡£¡£¡£¡£¡£¡£ÆäÉèÖÃÁËαÔìµÄTLSÖ¤Ê飬£¬£¬´î½¨ÁËÓÃÓÚÓʼþÊÕ·¢µÄIMAPºÍSMTPЧÀÍ£¬£¬£¬²¢°²ÅÅÁËÃûΪZipWhisperµÄPowerShellÇÔÃÜľÂí£¬£¬£¬ÓÃÓÚ͵ȡÊÜѬȾϵͳµÄä¯ÀÀÆ÷ƾ֤¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/new-punishing-owl-hacker-group-targeting-networks/
2. DynoWiper¶ñÒâÈí¼þ¹¥»÷²¨À¼ÄÜÔ´ÆóÒµ
2ÔÂ2ÈÕ£¬£¬£¬Ò»¿îÃûΪDynoWiperµÄÐÂÐ͸ßΣÊý¾Ý²Á³ý¶ñÒâÈí¼þÊ״α»·¢Ã÷£¬£¬£¬Õý¶Ô²¨À¼ÄÜÔ´ÆóÒµÌá³«ÆÆËðÐÔ¹¥»÷£¬£¬£¬Æä½¹µãÄ¿µÄ²¢·ÇÀÕË÷Ç®²Æ£¬£¬£¬¶øÊÇÓÀÊÀɨ³ýÒªº¦Êý¾Ý²¢µ¼ÖÂϵͳ̱»¾¡£¡£¡£¡£¡£¡£ÓëͨÀýÀÕË÷Èí¼þ²î±ð£¬£¬£¬DynoWiperͨ¹ýÈý½×¶Î´Ý»ÙÁ÷³ÌʵÏÖÆÆË𣺵ÚÒ»½×¶ÎµÝ¹éËÑË÷ËùÓÐÀο¿¼°¿ÉÒÆ¶¯Çý¶¯Æ÷ÉϵÄÎļþ£¬£¬£¬±Ü¿ªÒªº¦ÏµÍ³Ä¿Â¼ÒÔά³Ö»ù±¾ÔËÐУ»£»£»£»£»£»µÚ¶þ½×¶ÎʹÓÃ16×Ö½ÚËæ»úÊý¾Ý»º³åÇø¸²Ð´ÎļþÄÚÈÝ£¬£¬£¬Ð¡ÓÚ16×Ö½ÚµÄÎļþ±»ÍêÈ«ÁýÕÖ£¬£¬£¬´óÓÚ16×Ö½ÚµÄÔò²¿·ÖÆÆË𣬣¬£¬ÒÔ´ËÌáÉý´Ý»ÙЧÂÊ£»£»£»£»£»£»µÚÈý½×¶Îͨ¹ýÏµÍ³ÖØÆô»òÖ±½ÓÖÕÖ¹Àú³ÌʹÊÜѬȾװ±¸ÎÞ·¨Æô¶¯¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ±£´æ¶à¸ö±äÖÖ£¬£¬£¬¾ùÓÚ2025Äê12ÔÂ29ÈÕͶ·Å¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÊ×´ÎÖ´ÐÐʧ°Üºó¶à´ÎÐ޸ĴúÂëÒÔÈÆ¹ýÇå¾²·À»¤£¬£¬£¬µ«ÆóÒµ°²ÅŵÄÖն˼ì²âÓëÏìÓ¦¹¤¾ßÀÖ³É×èµ²ÁËÆäÖ´ÐУ¬£¬£¬´ó·ù½µµÍËðʧ¡£¡£¡£¡£¡£¡£WelivesecurityÆÊÎöʦָ³ö£¬£¬£¬DynoWiperÓëÕë¶ÔÎÚ¿ËÀ¼µÄÒÑÖª²Á³ý¶ñÒâÈí¼þZOV±£´æÏÔÖøÏàËÆÐÔ£¬£¬£¬Æä¹éÒòÓÚÓë¶íÂÞ˹¹ØÁªµÄSandworm×éÖ¯¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/dynowiper-data-wiping-malware/
3. Coinbase֤ʵÄÚ²¿Ö°Ô±Êý¾Ýй¶
2ÔÂ3ÈÕ£¬£¬£¬ÃÀ¹ú¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÈ·Èϱ¬·¢Ò»ÆðÄÚ²¿Ö°Ô±Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¾Ý¹«Ë¾½²»°ÈËÅû¶£¬£¬£¬2025Äê12Ô£¬£¬£¬Ò»Ãû³Ð°üÉ̲»µ±»á¼ûÔ¼30Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢KYCÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üÓà¶î¼°ÉúÒâ¼Í¼¡£¡£¡£¡£¡£¡£¸Ã³Ð°üÉÌÒѱ»ÖÕÖ¹ÏàÖú£¬£¬£¬ÊÜÓ°ÏìÓû§ÒÑ»ñÉí·Ý͵ÇÔ±£»£»£»£»£»£»¤Ð§Àͼ°Ö¸µ¼£¬£¬£¬ÊÂÎñͬ²½Éϱ¨î¿Ïµ»ú¹¹¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕß¡°Shiny Lapsus Hunters¡±Ôø¶ÌÔÝÔÚTelegramÐû²¼CoinbaseÄÚ²¿Ö§³Ö½çÃæ½ØÍ¼ºóɾ³ý£¬£¬£¬½ØÍ¼ÏÔʾ¿É»á¼û¿Í»§Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£Ö»¹ÜÎÞ·¨È·ÈϸÃ×éÖ¯ÊÇ·ñÖ±½Ó¹ØÁªÄÚ²¿Ö°Ô±ÈëÇÖ£¬£¬£¬µ«ÀàËÆÊÖ·¨ÔÚÆäËû¹¥»÷ÖÐÆµÏÖ£¬£¬£¬ÈçÍþвÐÐΪÕßÔøÐлßCrowdStrikeÄÚ²¿Ö°Ô±»ñÈ¡½ØÍ¼£¬£¬£¬»òͨ¹ýÉç½»¹¤³Ìð³äÔ±¹¤ÆÈ¡BPOÖ§³ÖÖ°Ô±ÊÚȨ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£BPO¹«Ë¾Òò³Ð½Ó¿Í»§Ö§³Ö¡¢Éí·ÝÑéÖ¤¡¢ITЧÀ͵ÈÔËӪʹÃü£¬£¬£¬ÆäÔ±¹¤³£½Ó´¥ÆóÒµ½¹µãϵͳÓë¿Í»§Êý¾Ý£¬£¬£¬³ÉΪ¹¥»÷Õ߸߼ÛֵĿµÄ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/
4. Step FinanceÔâºÚ¿Í¹¥»÷ÖÂ4000ÍòÃÀÔª×ʲúËðʧ
2ÔÂ3ÈÕ£¬£¬£¬ÃÀ¹ú¼ÓÃÜÇ®±Òƽ̨Step FinanceÓÚ2025Äê1ÔÂ31ÈÕ¼ì²âµ½Çå¾²Îó²î£¬£¬£¬¾ÊÓ²ìÈ·ÈÏÒò¸ß¹Ü×°±¸ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬µ¼Ö¼ÛÖµÔ¼4000ÍòÃÀÔªµÄÊý×Ö×ʲú±»µÁ¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÊÇ»ùÓÚSolanaÇø¿éÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Æ½Ì¨¼°ÆÊÎö¹¤¾ß£¬£¬£¬Ö§³ÖÓû§×ʲú¿ÉÊÓ»¯¡¢ÉúÒâ¡¢ÖÊѺµÈ²Ù×÷£¬£¬£¬²¢ÓµÓÐÔÉú´ú±Ò$STEP£¬£¬£¬µ«ÉúÒâÁ¿Ïà¶Ô½ÏС¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬Step FinanceѸËÙÔ¼ÇëÍøÂçÇ徲ר¼ÒÐÖú×·»Ø×ʲú¡£¡£¡£¡£¡£¡£Çø¿éÁ´ÆÊÎö¹«Ë¾CertiKÆðÔ´±¨¸æÏÔʾ£¬£¬£¬±»µÁ×ʲú°üÀ¨261,854 SOL£¨Ô¼2890ÍòÃÀÔª£©£¬£¬£¬µ«Æ½Ì¨×îÖÕºËʵ×ÜËðʧԼ4000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£Í¨¹ýToken22±£»£»£»£»£»£»¤²½·¥¼°ÏàÖúͬ°éе÷£¬£¬£¬ÏÖÔÚÒÑ×·»ØÔ¼370ÍòÃÀÔªRemora×ʲú¼°100ÍòÃÀÔªÆäËûÍ·´ç£¬£¬£¬ºÏ¼Æ470ÍòÃÀÔª¡£¡£¡£¡£¡£¡£ÎªÔöÇ¿Çå¾²·À»¤£¬£¬£¬Æ½Ì¨ÒÑÔÝÍ£²¿·ÖÓªÒµÔËÓª£¬£¬£¬²¢Ç¿µ÷ÆäÆìÏÂRemora MarketsδÊÜÓ°Ï죬£¬£¬ËùÓÐrTokenÈÔ¼á³Ö1:1ÍêÈ«´¢±¸¡£¡£¡£¡£¡£¡£Step Finance½¨ÒéÓû§ÔÚÊӲ쿢ÊÂǰÔÝͣʹÓÃSTEP´ú±Ò£¬£¬£¬²¢ÔÊÐí½«¶Ô¹¥»÷ǰ״̬¾ÙÐпìÕÕ£¬£¬£¬Öƶ©Õë¶Ô³ÖÓÐÕߵĽâ¾ö¼Æ»®¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/
5. Citrix NetScalerÔâ6.3ÍòIPÐͬÕì̽
2ÔÂ3ÈÕ£¬£¬£¬Íþв¼à¿ØÆ½Ì¨GreyNoiseÊӲ쵽Õë¶ÔCitrix NetScaler»ù´¡ÉèÊ©µÄÐͬÕì̽Ðж¯£¬£¬£¬¸ÃÐж¯Ê¹Óó¬6.3Íò¸ö×ÔÁ¦IPµØµãÌᳫ111,834¸ö»á»°£¬£¬£¬ÆäÖÐ79%Á÷Á¿Ö¸ÏòCitrix GatewayÃÛ¹Þ£¬£¬£¬64%À´×Ôαװ³ÉÕýµ±ÏûºÄÕßISPµØµãµÄסլÊðÀí£¬£¬£¬Ê£Óà36%Ô´×ÔͳһAzure IPµØµã¡£¡£¡£¡£¡£¡£GreyNoiseÖ¸³ö£¬£¬£¬´Ë´Î»î¶¯²¢·ÇËæ»ú»¥ÁªÍøÉ¨Ã裬£¬£¬¶øÊÇÓÐ×éÖ¯µÄ»ù´¡ÉèÊ©²â»æ£¬£¬£¬Ö¼ÔÚÈëÇÖǰʶ±ð̻¶µÄCitrixµÇÂ¼Ãæ°å¼°²úÆ·°æ±¾¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÁ½¸ö½¹µãÖ¸±ê̻¶¶ñÒâÒâͼ£ºÆäÒ»£¬£¬£¬63,189¸öIPÌìÉú109,942¸ö»á»°£¬£¬£¬¼¯ÖÐɨÃè¡°/logon/LogonPoint/index.html¡±Éí·ÝÑéÖ¤½çÃæ£¬£¬£¬´ó¹æÄ£Ê¶±ð̻¶µÄµÇÂ¼Ãæ°å£»£»£»£»£»£»Æä¶þ£¬£¬£¬2ÔÂ1ÈÕ10¸öIPÔÚ6СʱÄÚÆô¶¯1,892¸ö»á»°£¬£¬£¬¾Û½¹URL·¾¶¡°/epa/scripts/win/nsepa_setup.exe¡±£¬£¬£¬Í¨¹ýEPA¹¤¼þö¾ÙCitrix°æ±¾¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ2016ÄêÍ·Ðû²¼µÄChrome 50Óû§ÊðÀí£¬£¬£¬Õë¶ÔEPA×°ÖÃÎļþ·¾¶µÄÌØ¶¨¹¥»÷Åú×¢ÆäÕý¿ª·¢Ìض¨°æ±¾Îó²îʹÓóÌÐò»òÑéÖ¤ÒÑÖªCitrix ADCÎó²î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/
6. CISA½ôÆÈת´ïSolarWindsЧÀĮ́Îó²î
2ÔÂ3ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SolarWinds Web Help DeskµÄÑÏÖØÎó²îCVE-2025-40551±ê¼ÇΪ"ÕýÔÚÔâÊܹ¥»÷"£¬£¬£¬²¢ÒÀ¾Ý2021ÄêÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD 22-01£©£¬£¬£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚÈýÌìÄÚÍê³ÉϵͳÐÞ²¹¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Jimi Sebree·¢Ã÷£¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈεÄÊý¾Ý·´ÐòÁл¯Èõµã£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔËÐжñÒâÏÂÁî¡£¡£¡£¡£¡£¡£SolarWindsÓÚ1ÔÂ28ÈÕÐû²¼Web Help Desk 2026.1°æ±¾ÐÞ¸´´ËÎó²î£¬£¬£¬Í¬Ê±Ò»²¢ÐÞ¸´ÁËSebree·¢Ã÷µÄÓ²±àÂëÆ¾Ö¤¸ßΣÎó²î£¨CVE-2025-40537£©¼°watchTowrµÄPiotr Bazydlo±¨¸æµÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-40552¡¢CVE-2025-40554£©£¬£¬£¬ËùÓÐÎó²î¾ùÖ§³ÖÔ¶³ÌʹÓᣡ£¡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬Ö»¹ÜBOD 22-01½öÕë´ºÁª°î»ú¹¹£¬£¬£¬µ«Ë½Óª²¿·ÖÒ²Ó¦¾¡¿ìÐÞ²¹ÒÔµÖÓùÒ»Á¬¹¥»÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/


¾©¹«Íø°²±¸11010802024551ºÅ