APT36ʹÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶ÈÕþ¸®

Ðû²¼Ê±¼ä 2025-10-27

1. APT36ʹÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶ÈÕþ¸®


10ÔÂ24ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬°Í»ù˹̹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Transparent Tribe£¨APT36£©Õë¶ÔÓ¡¶ÈÕþ¸®ÊµÌåÌᳫÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬Èö²¥»ùÓÚGolangµÄDeskRAT¶ñÒâÈí¼þ¡£¡£¡£¸Ã¹¥»÷Á´Í¨¹ýº¬ZIP¸½¼þ»òGoogle DriveÁ´½ÓµÄ´¹ÂÚÓʼþʵÑ飬£¬£¬£¬Ê¹ÓÃMozilla FirefoxÏÔʾÓÕ¶üPDFÎļþµÄͬʱִÐÐÖ÷ÔØºÉ¡£¡£¡£DeskRATͨ¹ýWebSocket½¨ÉèC2ÅþÁ¬£¬£¬£¬£¬Ö§³Öping¡¢heartbeatµÈÎåÖÖÏÂÁ£¬£¬£¬²¢½ÓÄÉsystemdЧÀÍ¡¢cron×÷ÒµµÈËÄÖÖ³¤ÆÚÐÔÒªÁì¡£¡£¡£ÆäC2ЧÀÍÆ÷½ÓÄÉÒþÐÎÉè¼Æ£¬£¬£¬£¬Î´·ºÆðÔÚ¹ûÕæNS¼Í¼ÖС£¡£¡£´Ë´Î»î¶¯ÑÓÐøÁËCYFIRMA´ËǰÅû¶µÄ¹¥»÷ģʽ£¬£¬£¬£¬²¢¹ØÁªµ½¿çƽ̨ºóÃÅStealthServer¡£¡£¡£¸ÃºóÃű£´æWindowsÈý°æ±¾¼°LinuxÁ½±äÖÖ£ºWindows-V3°æ±¾½ÓÄÉWebSocketͨѶ£¬£¬£¬£¬ÓëDeskRAT¹¦Ð§Ò»Ö£»£»£»£»£»£»Linux±äÖÖÔòͨ¹ýHTTPͨѶ£¬£¬£¬£¬¾ß±¸Îļþä¯ÀÀ¡¢ÉÏ´«¼°Ö´ÐÐÄÜÁ¦£¬£¬£¬£¬¿É´Ó¸ùĿ¼µÝ¹éËÑË÷ÌØ¶¨À©Õ¹ÃûÎļþ²¢¼ÓÃÜ´«Êä¡£¡£¡£


https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html


2. Windows Server WSUS¸ßΣÎó²îÔâÒ°ÍâʹÓÃ


10ÔÂ24ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò¾Û½¹ÓÚ±àºÅΪCVE-2025-59287µÄ¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÆôÓÃÁËWindows Server¸üÐÂЧÀÍ£¨WSUS£©Ð§ÀÍÆ÷½ÇÉ«µÄWindows Serverϵͳ£¬£¬£¬£¬ÓÈÆäÊÇ×÷Ϊ×éÖ¯ÄÚÆäËûWSUSЧÀÍÆ÷¸üÐÂÔ´µÄЧÀÍÆ÷¡£¡£¡£¹¥»÷Õß¿ÉÎÞÐèÌØÈ¨»òÓû§½»»¥£¬£¬£¬£¬Ô¶³ÌʹÓôËÎó²îÒÔSYSTEMȨÏÞÖ´ÐжñÒâ´úÂ룬£¬£¬£¬²¢¿ÉÄÜÔÚWSUSЧÀÍÆ÷¼äºáÏòÈö²¥¡£¡£¡£Î¢ÈíÒÑÕë¶ÔËùÓÐÊÜÓ°Ïì°æ±¾Ðû²¼´øÍâÇå¾²¸üУ¬£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéITÖÎÀíÔ±¾¡¿ì°²ÅÅ¡£¡£¡£¹ØÓÚÎÞ·¨Á¬Ã¦¸üеÄϵͳ£¬£¬£¬£¬Î¢ÈíÌṩÁËÔÝʱ½â¾ö¼Æ»®£¬£¬£¬£¬Èç½ûÓÃWSUSЧÀÍÆ÷½ÇÉ«¡£¡£¡£Îó²î¹ûÕæºó£¬£¬£¬£¬HawkTrace SecurityÐû²¼Á˲»ÔÊÐíÖ´ÐÐí§ÒâÏÂÁîµÄ¿´·¨ÑéÖ¤£¨PoC£©´úÂ룬£¬£¬£¬µ«Eye SecurityºÍHuntress LabsËæ¼´ÊӲ쵽ҰÍâʹÓÃʵÑé¡£¡£¡£Eye Security±¨¸æÖÁÉÙÒ»Ãû¿Í»§ÏµÍ³Ôâ¹¥»÷£¬£¬£¬£¬ÇÒ¹¥»÷ÊÖ·¨ÓëHawkTraceµÄPoC²î±ð£»£»£»£»£»£»HuntressÔò·¢Ã÷×Ô10ÔÂ23ÈÕÆð£¬£¬£¬£¬Õë¶Ô̻¶8530/8531¶Ë¿ÚµÄWSUSʵÀýµÄ¹¥»÷£¬£¬£¬£¬¹¥»÷Õßͨ¹ýPowerShellÏÂÁîÕì̽ÄÚ²¿WindowsÓò²¢½«Êý¾Ý·¢ËÍÖÁwebhook¡£¡£¡£HuntressÖ¸³ö£¬£¬£¬£¬Ô¼25̨Ö÷»úÒ×Êܹ¥»÷£¬£¬£¬£¬µ«Ô¤¼ÆÊ¹ÓÃÂʽϵÍ£¬£¬£¬£¬ÒòWSUSͨ³£²»Ì»Â¶ÓÚ¹«Íø¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/


3. AT&TÕÐÆ¸Æ½Ì¨ÔâEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷


10ÔÂ24ÈÕ£¬£¬£¬£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû²¼Õë¶ÔAT&T Careersƽ̨µÄÀÕË÷ÐÅÏ¢£¬£¬£¬£¬Éù³ÆÕÆÎÕ576,686ÌõÓë¸ÃµçОÞÍ·ÕÐÆ¸Æ½Ì¨Ïà¹ØµÄСÎÒ˽¼Ò¼Í¼£¬£¬£¬£¬²¢ÉèÖÃËÄÌìЧ¹ûÕæÊý¾ÝµÄµ¹¼ÆÊ±¡£¡£¡£¸ÃÌõÄ¿±»ÃÜÂë±£»£»£»£»£»£»¤£¬£¬£¬£¬ÒªÇóAT&T´ú±íÔÚʱÏÞÄÚ¡°°´Ö¸Ê¾²Ù×÷¡±£¬£¬£¬£¬²»È»Êý¾Ý½«±»¹ûÕæ¡£¡£¡£EverestÒÔÐû²¼±»µÁÊý¾Ý¿â¼°ÀÕË÷ÒªÇóÖøÃû£¬£¬£¬£¬ÆäйÃÜÍøÕ¾Ëä½ñÄêÔâÆÆËðµ«ÈÔ»îÔ¾£¬£¬£¬£¬Êܺ¦ÕßÃû¼òµ¥Á¬¸üС£¡£¡£AT&TÉÐδ֤ʵ´Ë´ÎÊÂÎñ£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÀúÊ·Êý¾Ýй¶Ƶ·¢£º2021Äê8ÔÂShinyHuntersºÚ¿Í×éÖ¯ÇÔÈ¡7000Íò¿Í»§Êý¾Ý²¢³öÊÛ£¬£¬£¬£¬AT&TÖ±ÖÁ2024Äê4Ô²ÅÈϿɣ»£»£»£»£»£»2025Äê6Ô£¬£¬£¬£¬8600ÍòÌõº¬½âÃÜÉç»áÇå¾²ºÅÂ루SSN£©µÄ¼Í¼±»Ð¹Â¶£¬£¬£¬£¬AT&TΪ´ËÖ§¸¶1.77ÒÚÃÀԪϢÕù½ð¡£¡£¡£Ä¿½ñ£¬£¬£¬£¬ÊÜÓ°ÏìÕߣ¨ÉêÇëÈË¡¢Ô±¹¤¡¢ÊÓ²ìÔ±£©Ðè½ÓÄÉ·À»¤²½·¥£º¸ü¸ÄAT&TÕË»§ÃÜÂë²¢×èÖ¹ÖØ¸´Ê¹Ó㻣»£»£»£»£»ÆôÓöàÒòËØÈÏÖ¤£»£»£»£»£»£»¼à¿Ø²ÆÎñ¡¢ÐÅÓü°Í¨Ñ¶Òì³££»£»£»£»£»£»Ð¡ÐÄ¡°AT&TÖ°Òµ¡±Ïà¹Ø´¹ÂÚ¹¥»÷£»£»£»£»£»£»½öͨ¹ý¹Ù·½ÇþµÀ»ñȡ֪ͨ£¬£¬£¬£¬Îðµã»÷δÂÄÀúÖ¤Á´½Ó¡£¡£¡£


https://hackread.com/everest-ransomware-att-careers-breach/


4. WordPress²å¼þ¸ßΣÎó²îÒý·¢´ó¹æÄ£RCE¹¥»÷


10ÔÂ24ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Ò»³¡Õë¶ÔWordPressÍøÕ¾µÄ´ó¹æÄ£¹¥»÷»î¶¯±¬·¢£¬£¬£¬£¬¹¥»÷ÕßʹÓÃGutenKitºÍHunk Companion²å¼þµÄÑÏÖØ¾ÉÇå¾²Îó²îʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£WordfenceÇå¾²¹«Ë¾Åû¶£¬£¬£¬£¬½ö10ÔÂ8ÈÕÖÁ9ÈÕÁ½ÌìÄÚ£¬£¬£¬£¬Æä¾Í×èÖ¹ÁËÕë¶Ô¿Í»§µÄ870Íò´Î¹¥»÷ʵÑé¡£¡£¡£´Ë´Î¹¥»÷Éæ¼°Èý¸ö¸ßΣÎó²î£ºCVE-2024-9234¡¢CVE-2024-9707ºÍCVE-2024-11972¡£¡£¡£ÕâЩÎó²î¾ù±»ÆÀ¶¨ÎªCVSS 9.8·Ö£¬£¬£¬£¬ÔÊÐíδ¾­ÈÏÖ¤µÄ¹¥»÷Õß×°ÖÃí§Òâ²å¼þ£¬£¬£¬£¬½ø¶øÒýÈëÆäËû¶ñÒâ²å¼þʵÏÖRCE¡£¡£¡£Ö»¹ÜGutenKit 2.1.1ºÍHunk Companion 1.9.0ÒÑÐÞ¸´Îó²î£¬£¬£¬£¬µ«Ðí¶àÍøÕ¾ÈÔÔÚʹÓÃÒ×Êܹ¥»÷µÄ¾É°æ±¾¡£¡£¡£¹¥»÷Õßͨ¹ýGitHubÍйÜÃûΪ¡°up¡±µÄ¶ñÒâZIP´æµµ£¬£¬£¬£¬ÄÚº¬»ìÏý¾ç±¾£¬£¬£¬£¬¿ÉÖ´ÐÐÎļþÉÏ´«/ÏÂÔØ/ɾ³ý¡¢È¨ÏÞÐ޸ĵȲÙ×÷£¬£¬£¬£¬²¢Î±×°³ÉAll in One SEO²å¼þ×é¼þ×Ô¶¯ÒÔÖÎÀíÔ±Éí·ÝµÇ¼£¬£¬£¬£¬ÒÔά³Ö³¤ÆÚÐÔ¡¢ÇÔÈ¡»òɾ³ýÊý¾Ý¡¢Ðá̽˽ÈËÐÅÏ¢¡£¡£¡£ÈôÎÞ·¨Ö±½Ó»ñÈ¡ÖÎÀíºóÃÅ£¬£¬£¬£¬¹¥»÷Õß»¹»á×°ÖÃÒ×Êܹ¥»÷µÄ¡°wp-query-console¡±²å¼þ¾ÙÐÐδ¾­ÈÏÖ¤µÄRCE¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-launch-mass-attacks-exploiting-outdated-wordpress-plugins/


5. ÐÂÐÍCoPhish¹¥»÷ͨ¹ýCopilot StudioÊðÀíÇÔÈ¡OAuthÁîÅÆ


10ÔÂ25ÈÕ£¬£¬£¬£¬DatadogÇ徲ʵÑéÊÒÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪ¡°CoPhish¡±µÄÐÂÐÍÍøÂç´¹ÂÚÊÖÒÕ£¬£¬£¬£¬ÆäʹÓÃ΢ÈíCopilot StudioÊðÀíͨ¹ýÕýµ±MicrosoftÓò·¢ËÍڲƭÐÔOAuthÔÞ³ÉÇëÇ󡣡£¡£¸ÃÊÖÒÕÒÀÀµÉç»á¹¤³Ìѧ£¬£¬£¬£¬µ«Î¢ÈíÒÑ֤ʵ½«Í¨¹ýδÀ´²úÆ·¸üÐÂÐÞ¸´»ù´¡Ôµ¹ÊÔ­ÓÉ£¬£¬£¬£¬²¢ÆÀ¹ÀÌØÊâ°ü¹Ü²½·¥Ç¿»¯ÖÎÀíÓëÔÞ³ÉÌåÑé¡£¡£¡£CoPhilot StudioÊðÀíÊÇ¿É×Ô½ç˵µÄ̸Ìì»úеÈË£¬£¬£¬£¬Ö§³Ö¡°ÑÝÊ¾ÍøÕ¾¡±¹¦Ð§ÔÚ΢ÈíÓòÃû¹²Ïí£¬£¬£¬£¬Õýµ±URLÌØÕ÷Ò×ÓÕµ¼Óû§ÐÅÈΡ£¡£¡£¹¥»÷Õ߿ɽ¨Éè¶ñÒâ¶à×â»§Ó¦Ó㬣¬£¬£¬ÉèÖõǼÖ÷ÌâÖ¸ÏòÉí·ÝÑéÖ¤Ìṩ³ÌÐò£¬£¬£¬£¬Í¨¹ýBurp Collaborator URL²¶»ñ»á»°ÁîÅÆ¡£¡£¡£µ±Óû§µã»÷¶ñÒâµÇ¼°´Å¥Ê±£¬£¬£¬£¬Öض¨Ïò¿ÉÖ¸Ïòí§Òâ¶ñÒâURL£¬£¬£¬£¬¶øOAuthÔÞ³ÉÊÂÇéÁ÷URL½öΪ¹¥»÷·¾¶Ö®Ò»¡£¡£¡£Î¢Èí½¨Òé¿Í»§Í¨¹ýÏÞÖÆÖÎÀíȨÏÞ¡¢ïÔÌ­Ó¦ÓÃȨÏÞ¼°ÊµÑéÖÎÀíÕþ²ß·ÀÓùCoPhish¡£¡£¡£DatadogÔö²¹Çå¾²½¨Ò飬£¬£¬£¬°üÀ¨½ûÓÃÓû§Ó¦Óý¨ÉèĬÈÏÖµ¡¢Í¨¹ýEntra IDÓëCopilotÊðÀíÊÂÎñ¼à¿ØÓ¦ÓÃÔ޳ɡ¢ÊµÑéǿӦÓÃÔÞ³ÉÕ½ÂÔÌ΢ÈíĬÈÏÉèÖÃÎó²î¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-cophish-attack-steals-oauth-tokens-via-copilot-studio-agents/


6. ¶íÂÞ˹Áª°îÊÞÒ½ºÍÖ²Îï¼ìÒß¼àÊÓ¾ÖÔâDDoS¹¥»÷


10ÔÂ25ÈÕ£¬£¬£¬£¬¶íÂÞ˹Áª°îÊÞÒ½ºÍÖ²Îï¼ìÒß¼àÊÓ¾Ö£¨Rosselkhoznadzor£©ÓÚ22ÈÕÔâÓö´ó¹æÄ£¶¨ÏòDDoS¹¥»÷£¬£¬£¬£¬µ¼ÖÂÆäÅ©²úÆ·¼°»¯Ñ§Æ·¸ú×ÙϵͳVetISºÍSaturnÏÂÏߣ¬£¬£¬£¬ÌìÏÂʳÎïÔËÊäÁ´ÏÝÈëÔÓÂÒ¡£¡£¡£¸Ã»ú¹¹Á¥ÊôÓÚ¶íÂÞ˹ũҵ²¿£¬£¬£¬£¬ÈÏÕæî¿ÏµÊ³Îũ²úÆ·¼°»¯Ñ§Æ·µÄÁ÷ͨÇå¾²¡£¡£¡£¹¥»÷Ö±½Ó¹¥»÷ÁËMercuryƽ̨£¨VetIS½¹µã×é³É²¿·Ö£©£¬£¬£¬£¬ÖÂʹÈâÀࡢţÄ̵ȶ¯Îï²úÆ·ÔËÊäËùÐèµÄÇ¿ÖÆÐÔµç×ÓÊÞÒ½Ö¤ÊéÎÞ·¨Ç©·¢£¬£¬£¬£¬´óÐÍÈéÖÆÆ·¼°Ó¤¶ùʳÎïÉú²úÉ̱¨¸æÔËÊäÑÓÎóÊýСʱ¡£¡£¡£¹©Ó¦É̱»ÆÈÓëÁãÊÛÁ¬ËøµêЭÉÌÎÞµç×ÓÆ±¾Ý»õÎïµÄÎüÊÕÎÊÌ⣬£¬£¬£¬È«ÇþµÀÁãÊÛÆóҵЭ»á£¨AKORT£©Ö÷ϯ˹̹Äá˹À­·ò¡¤²©¸ñ´ïŵ·òÌåÏÖ£¬£¬£¬£¬¶à¼ÒÁãÊÛÁ¬ËøµêÊÜϵͳ¹ÊÕÏÓ°Ï죬£¬£¬£¬Õý½ôÆÈµ÷½âMercuryϵͳÒÔά³ÖÔËÓªºÍ²úÆ·×¢²á¡£¡£¡£RosselkhoznadzorÔÚTelegramÉùÃ÷ÖÐÇ¿µ÷£¬£¬£¬£¬¹¥»÷δÍþвÊý¾ÝÍêÕûÐÔÓëÉñÃØÐÔ£¬£¬£¬£¬µ«ÏµÍ³¿ÉÄÜÒòµØÀíλÖûòÅþÁ¬·½·¨·ºÆðÔÝʱ²»¿ÉÓᣡ£¡£¸Ã»ú¹¹·ñ¶¨Ò»Á¬ÖÐÖ¹±¨µÀ£¬£¬£¬£¬³Æµ±ÈÕÀֳɴ¦Öóͷ£³¬1450Íò·Ýµç×ÓÊÞÒ½Îļþ£¬£¬£¬£¬²¢Ç¿µ÷Èô±¬·¢¸üÑÏÖØÖÐÖ¹£¬£¬£¬£¬´ËÀà²Ù×÷½«ÎÞ·¨¾ÙÐС£¡£¡£


https://securityaffairs.com/183845/security/russian-rosselkhoznadzor-hit-by-ddos-attack-food-shipments-delayed.html