APT36ʹÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶ÈÕþ¸®
Ðû²¼Ê±¼ä 2025-10-271. APT36ʹÓÃDeskRAT¶ñÒâÈí¼þ¹¥»÷Ó¡¶ÈÕþ¸®
10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬°Í»ù˹̹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Transparent Tribe£¨APT36£©Õë¶ÔÓ¡¶ÈÕþ¸®ÊµÌåÌᳫÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬Èö²¥»ùÓÚGolangµÄDeskRAT¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷Á´Í¨¹ýº¬ZIP¸½¼þ»òGoogle DriveÁ´½ÓµÄ´¹ÂÚÓʼþʵÑ飬£¬£¬£¬£¬£¬Ê¹ÓÃMozilla FirefoxÏÔʾÓÕ¶üPDFÎļþµÄͬʱִÐÐÖ÷ÔØºÉ¡£¡£¡£¡£¡£¡£¡£DeskRATͨ¹ýWebSocket½¨ÉèC2ÅþÁ¬£¬£¬£¬£¬£¬£¬Ö§³Öping¡¢heartbeatµÈÎåÖÖÏÂÁ£¬£¬£¬£¬£¬²¢½ÓÄÉsystemdЧÀÍ¡¢cron×÷ÒµµÈËÄÖÖ³¤ÆÚÐÔÒªÁì¡£¡£¡£¡£¡£¡£¡£ÆäC2ЧÀÍÆ÷½ÓÄÉÒþÐÎÉè¼Æ£¬£¬£¬£¬£¬£¬Î´·ºÆðÔÚ¹ûÕæNS¼Í¼ÖС£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯ÑÓÐøÁËCYFIRMA´ËǰÅû¶µÄ¹¥»÷ģʽ£¬£¬£¬£¬£¬£¬²¢¹ØÁªµ½¿çƽ̨ºóÃÅStealthServer¡£¡£¡£¡£¡£¡£¡£¸ÃºóÃű£´æWindowsÈý°æ±¾¼°LinuxÁ½±äÖÖ£ºWindows-V3°æ±¾½ÓÄÉWebSocketͨѶ£¬£¬£¬£¬£¬£¬ÓëDeskRAT¹¦Ð§Ò»Ö£»£»£»£»£»£»Linux±äÖÖÔòͨ¹ýHTTPͨѶ£¬£¬£¬£¬£¬£¬¾ß±¸Îļþä¯ÀÀ¡¢ÉÏ´«¼°Ö´ÐÐÄÜÁ¦£¬£¬£¬£¬£¬£¬¿É´Ó¸ùĿ¼µÝ¹éËÑË÷ÌØ¶¨À©Õ¹ÃûÎļþ²¢¼ÓÃÜ´«Êä¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
2. Windows Server WSUS¸ßΣÎó²îÔâÒ°ÍâʹÓÃ
10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò¾Û½¹ÓÚ±àºÅΪCVE-2025-59287µÄ¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÆôÓÃÁËWindows Server¸üÐÂЧÀÍ£¨WSUS£©Ð§ÀÍÆ÷½ÇÉ«µÄWindows Serverϵͳ£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇ×÷Ϊ×éÖ¯ÄÚÆäËûWSUSЧÀÍÆ÷¸üÐÂÔ´µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÎÞÐèÌØÈ¨»òÓû§½»»¥£¬£¬£¬£¬£¬£¬Ô¶³ÌʹÓôËÎó²îÒÔSYSTEMȨÏÞÖ´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬²¢¿ÉÄÜÔÚWSUSЧÀÍÆ÷¼äºáÏòÈö²¥¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÒÑÕë¶ÔËùÓÐÊÜÓ°Ïì°æ±¾Ðû²¼´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéITÖÎÀíÔ±¾¡¿ì°²ÅÅ¡£¡£¡£¡£¡£¡£¡£¹ØÓÚÎÞ·¨Á¬Ã¦¸üеÄϵͳ£¬£¬£¬£¬£¬£¬Î¢ÈíÌṩÁËÔÝʱ½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬Èç½ûÓÃWSUSЧÀÍÆ÷½ÇÉ«¡£¡£¡£¡£¡£¡£¡£Îó²î¹ûÕæºó£¬£¬£¬£¬£¬£¬HawkTrace SecurityÐû²¼Á˲»ÔÊÐíÖ´ÐÐí§ÒâÏÂÁîµÄ¿´·¨ÑéÖ¤£¨PoC£©´úÂ룬£¬£¬£¬£¬£¬µ«Eye SecurityºÍHuntress LabsËæ¼´ÊӲ쵽ҰÍâʹÓÃʵÑé¡£¡£¡£¡£¡£¡£¡£Eye Security±¨¸æÖÁÉÙÒ»Ãû¿Í»§ÏµÍ³Ôâ¹¥»÷£¬£¬£¬£¬£¬£¬ÇÒ¹¥»÷ÊÖ·¨ÓëHawkTraceµÄPoC²î±ð£»£»£»£»£»£»HuntressÔò·¢Ã÷×Ô10ÔÂ23ÈÕÆð£¬£¬£¬£¬£¬£¬Õë¶Ô̻¶8530/8531¶Ë¿ÚµÄWSUSʵÀýµÄ¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýPowerShellÏÂÁîÕì̽ÄÚ²¿WindowsÓò²¢½«Êý¾Ý·¢ËÍÖÁwebhook¡£¡£¡£¡£¡£¡£¡£HuntressÖ¸³ö£¬£¬£¬£¬£¬£¬Ô¼25̨Ö÷»úÒ×Êܹ¥»÷£¬£¬£¬£¬£¬£¬µ«Ô¤¼ÆÊ¹ÓÃÂʽϵͣ¬£¬£¬£¬£¬£¬ÒòWSUSͨ³£²»Ì»Â¶ÓÚ¹«Íø¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-windows-server-wsus-flaw-in-attacks/
3. AT&TÕÐÆ¸Æ½Ì¨ÔâEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷
10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû²¼Õë¶ÔAT&T Careersƽ̨µÄÀÕË÷ÐÅÏ¢£¬£¬£¬£¬£¬£¬Éù³ÆÕÆÎÕ576,686ÌõÓë¸ÃµçОÞÍ·ÕÐÆ¸Æ½Ì¨Ïà¹ØµÄСÎÒ˽¼Ò¼Í¼£¬£¬£¬£¬£¬£¬²¢ÉèÖÃËÄÌìЧ¹ûÕæÊý¾ÝµÄµ¹¼ÆÊ±¡£¡£¡£¡£¡£¡£¡£¸ÃÌõÄ¿±»ÃÜÂë±£»£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬ÒªÇóAT&T´ú±íÔÚʱÏÞÄÚ¡°°´Ö¸Ê¾²Ù×÷¡±£¬£¬£¬£¬£¬£¬²»È»Êý¾Ý½«±»¹ûÕæ¡£¡£¡£¡£¡£¡£¡£EverestÒÔÐû²¼±»µÁÊý¾Ý¿â¼°ÀÕË÷ÒªÇóÖøÃû£¬£¬£¬£¬£¬£¬ÆäйÃÜÍøÕ¾Ëä½ñÄêÔâÆÆËðµ«ÈÔ»îÔ¾£¬£¬£¬£¬£¬£¬Êܺ¦ÕßÃû¼òµ¥Á¬¸üС£¡£¡£¡£¡£¡£¡£AT&TÉÐδ֤ʵ´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÀúÊ·Êý¾Ýй¶Ƶ·¢£º2021Äê8ÔÂShinyHuntersºÚ¿Í×éÖ¯ÇÔÈ¡7000Íò¿Í»§Êý¾Ý²¢³öÊÛ£¬£¬£¬£¬£¬£¬AT&TÖ±ÖÁ2024Äê4Ô²ÅÈϿɣ»£»£»£»£»£»2025Äê6Ô£¬£¬£¬£¬£¬£¬8600ÍòÌõº¬½âÃÜÉç»áÇå¾²ºÅÂ루SSN£©µÄ¼Í¼±»Ð¹Â¶£¬£¬£¬£¬£¬£¬AT&TΪ´ËÖ§¸¶1.77ÒÚÃÀԪϢÕù½ð¡£¡£¡£¡£¡£¡£¡£Ä¿½ñ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÕߣ¨ÉêÇëÈË¡¢Ô±¹¤¡¢ÊÓ²ìÔ±£©Ðè½ÓÄÉ·À»¤²½·¥£º¸ü¸ÄAT&TÕË»§ÃÜÂë²¢×èÖ¹ÖØ¸´Ê¹Ó㻣»£»£»£»£»ÆôÓöàÒòËØÈÏÖ¤£»£»£»£»£»£»¼à¿Ø²ÆÎñ¡¢ÐÅÓü°Í¨Ñ¶Òì³££»£»£»£»£»£»Ð¡ÐÄ¡°AT&TÖ°Òµ¡±Ïà¹Ø´¹ÂÚ¹¥»÷£»£»£»£»£»£»½öͨ¹ý¹Ù·½ÇþµÀ»ñȡ֪ͨ£¬£¬£¬£¬£¬£¬Îðµã»÷δÂÄÀúÖ¤Á´½Ó¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/everest-ransomware-att-careers-breach/
4. WordPress²å¼þ¸ßΣÎó²îÒý·¢´ó¹æÄ£RCE¹¥»÷
10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬Ò»³¡Õë¶ÔWordPressÍøÕ¾µÄ´ó¹æÄ£¹¥»÷»î¶¯±¬·¢£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃGutenKitºÍHunk Companion²å¼þµÄÑÏÖØ¾ÉÇå¾²Îó²îʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¡£¡£¡£WordfenceÇå¾²¹«Ë¾Åû¶£¬£¬£¬£¬£¬£¬½ö10ÔÂ8ÈÕÖÁ9ÈÕÁ½ÌìÄÚ£¬£¬£¬£¬£¬£¬Æä¾Í×èÖ¹ÁËÕë¶Ô¿Í»§µÄ870Íò´Î¹¥»÷ʵÑé¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Éæ¼°Èý¸ö¸ßΣÎó²î£ºCVE-2024-9234¡¢CVE-2024-9707ºÍCVE-2024-11972¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²î¾ù±»ÆÀ¶¨ÎªCVSS 9.8·Ö£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾ÈÏÖ¤µÄ¹¥»÷Õß×°ÖÃí§Òâ²å¼þ£¬£¬£¬£¬£¬£¬½ø¶øÒýÈëÆäËû¶ñÒâ²å¼þʵÏÖRCE¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜGutenKit 2.1.1ºÍHunk Companion 1.9.0ÒÑÐÞ¸´Îó²î£¬£¬£¬£¬£¬£¬µ«Ðí¶àÍøÕ¾ÈÔÔÚʹÓÃÒ×Êܹ¥»÷µÄ¾É°æ±¾¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýGitHubÍйÜÃûΪ¡°up¡±µÄ¶ñÒâZIP´æµµ£¬£¬£¬£¬£¬£¬ÄÚº¬»ìÏý¾ç±¾£¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐÎļþÉÏ´«/ÏÂÔØ/ɾ³ý¡¢È¨ÏÞÐ޸ĵȲÙ×÷£¬£¬£¬£¬£¬£¬²¢Î±×°³ÉAll in One SEO²å¼þ×é¼þ×Ô¶¯ÒÔÖÎÀíÔ±Éí·ÝµÇ¼£¬£¬£¬£¬£¬£¬ÒÔά³Ö³¤ÆÚÐÔ¡¢ÇÔÈ¡»òɾ³ýÊý¾Ý¡¢Ðá̽˽ÈËÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÈôÎÞ·¨Ö±½Ó»ñÈ¡ÖÎÀíºóÃÅ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹»á×°ÖÃÒ×Êܹ¥»÷µÄ¡°wp-query-console¡±²å¼þ¾ÙÐÐδ¾ÈÏÖ¤µÄRCE¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-launch-mass-attacks-exploiting-outdated-wordpress-plugins/
5. ÐÂÐÍCoPhish¹¥»÷ͨ¹ýCopilot StudioÊðÀíÇÔÈ¡OAuthÁîÅÆ
10ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬DatadogÇ徲ʵÑéÊÒÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪ¡°CoPhish¡±µÄÐÂÐÍÍøÂç´¹ÂÚÊÖÒÕ£¬£¬£¬£¬£¬£¬ÆäʹÓÃ΢ÈíCopilot StudioÊðÀíͨ¹ýÕýµ±MicrosoftÓò·¢ËÍÚ²ÆÐÔOAuthÔÞ³ÉÇëÇ󡣡£¡£¡£¡£¡£¡£¸ÃÊÖÒÕÒÀÀµÉç»á¹¤³Ìѧ£¬£¬£¬£¬£¬£¬µ«Î¢ÈíÒÑ֤ʵ½«Í¨¹ýδÀ´²úÆ·¸üÐÂÐÞ¸´»ù´¡Ôµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬²¢ÆÀ¹ÀÌØÊâ°ü¹Ü²½·¥Ç¿»¯ÖÎÀíÓëÔÞ³ÉÌåÑé¡£¡£¡£¡£¡£¡£¡£CoPhilot StudioÊðÀíÊÇ¿É×Ô½ç˵µÄ̸Ìì»úеÈË£¬£¬£¬£¬£¬£¬Ö§³Ö¡°ÑÝÊ¾ÍøÕ¾¡±¹¦Ð§ÔÚ΢ÈíÓòÃû¹²Ïí£¬£¬£¬£¬£¬£¬Õýµ±URLÌØÕ÷Ò×ÓÕµ¼Óû§ÐÅÈΡ£¡£¡£¡£¡£¡£¡£¹¥»÷Õ߿ɽ¨Éè¶ñÒâ¶à×â»§Ó¦Ó㬣¬£¬£¬£¬£¬ÉèÖõǼÖ÷ÌâÖ¸ÏòÉí·ÝÑéÖ¤Ìṩ³ÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ýBurp Collaborator URL²¶»ñ»á»°ÁîÅÆ¡£¡£¡£¡£¡£¡£¡£µ±Óû§µã»÷¶ñÒâµÇ¼°´Å¥Ê±£¬£¬£¬£¬£¬£¬Öض¨Ïò¿ÉÖ¸Ïòí§Òâ¶ñÒâURL£¬£¬£¬£¬£¬£¬¶øOAuthÔÞ³ÉÊÂÇéÁ÷URL½öΪ¹¥»÷·¾¶Ö®Ò»¡£¡£¡£¡£¡£¡£¡£Î¢Èí½¨Òé¿Í»§Í¨¹ýÏÞÖÆÖÎÀíȨÏÞ¡¢ïÔÌÓ¦ÓÃȨÏÞ¼°ÊµÑéÖÎÀíÕþ²ß·ÀÓùCoPhish¡£¡£¡£¡£¡£¡£¡£DatadogÔö²¹Çå¾²½¨Ò飬£¬£¬£¬£¬£¬°üÀ¨½ûÓÃÓû§Ó¦Óý¨ÉèĬÈÏÖµ¡¢Í¨¹ýEntra IDÓëCopilotÊðÀíÊÂÎñ¼à¿ØÓ¦ÓÃÔ޳ɡ¢ÊµÑéǿӦÓÃÔÞ³ÉÕ½ÂÔÌ΢ÈíĬÈÏÉèÖÃÎó²î¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-cophish-attack-steals-oauth-tokens-via-copilot-studio-agents/
6. ¶íÂÞ˹Áª°îÊÞÒ½ºÍÖ²Îï¼ìÒß¼àÊÓ¾ÖÔâDDoS¹¥»÷
10ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬¶íÂÞ˹Áª°îÊÞÒ½ºÍÖ²Îï¼ìÒß¼àÊÓ¾Ö£¨Rosselkhoznadzor£©ÓÚ22ÈÕÔâÓö´ó¹æÄ£¶¨ÏòDDoS¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÅ©²úÆ·¼°»¯Ñ§Æ·¸ú×ÙϵͳVetISºÍSaturnÏÂÏߣ¬£¬£¬£¬£¬£¬ÌìÏÂʳÎïÔËÊäÁ´ÏÝÈëÔÓÂÒ¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹Á¥ÊôÓÚ¶íÂÞ˹ũҵ²¿£¬£¬£¬£¬£¬£¬ÈÏÕæî¿ÏµÊ³Îũ²úÆ·¼°»¯Ñ§Æ·µÄÁ÷ͨÇå¾²¡£¡£¡£¡£¡£¡£¡£¹¥»÷Ö±½Ó¹¥»÷ÁËMercuryƽ̨£¨VetIS½¹µã×é³É²¿·Ö£©£¬£¬£¬£¬£¬£¬ÖÂʹÈâÀࡢţÄ̵ȶ¯Îï²úÆ·ÔËÊäËùÐèµÄÇ¿ÖÆÐÔµç×ÓÊÞÒ½Ö¤ÊéÎÞ·¨Ç©·¢£¬£¬£¬£¬£¬£¬´óÐÍÈéÖÆÆ·¼°Ó¤¶ùʳÎïÉú²úÉ̱¨¸æÔËÊäÑÓÎóÊýСʱ¡£¡£¡£¡£¡£¡£¡£¹©Ó¦É̱»ÆÈÓëÁãÊÛÁ¬ËøµêÐÉÌÎÞµç×ÓÆ±¾Ý»õÎïµÄÎüÊÕÎÊÌ⣬£¬£¬£¬£¬£¬È«ÇþµÀÁãÊÛÆóҵлᣨAKORT£©Ö÷ϯ˹̹Äá˹À·ò¡¤²©¸ñ´ïŵ·òÌåÏÖ£¬£¬£¬£¬£¬£¬¶à¼ÒÁãÊÛÁ¬ËøµêÊÜϵͳ¹ÊÕÏÓ°Ï죬£¬£¬£¬£¬£¬Õý½ôÆÈµ÷½âMercuryϵͳÒÔά³ÖÔËÓªºÍ²úÆ·×¢²á¡£¡£¡£¡£¡£¡£¡£RosselkhoznadzorÔÚTelegramÉùÃ÷ÖÐÇ¿µ÷£¬£¬£¬£¬£¬£¬¹¥»÷δÍþвÊý¾ÝÍêÕûÐÔÓëÉñÃØÐÔ£¬£¬£¬£¬£¬£¬µ«ÏµÍ³¿ÉÄÜÒòµØÀíλÖûòÅþÁ¬·½·¨·ºÆðÔÝʱ²»¿ÉÓᣡ£¡£¡£¡£¡£¡£¸Ã»ú¹¹·ñ¶¨Ò»Á¬ÖÐÖ¹±¨µÀ£¬£¬£¬£¬£¬£¬³Æµ±ÈÕÀֳɴ¦Öóͷ£³¬1450Íò·Ýµç×ÓÊÞÒ½Îļþ£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷Èô±¬·¢¸üÑÏÖØÖÐÖ¹£¬£¬£¬£¬£¬£¬´ËÀà²Ù×÷½«ÎÞ·¨¾ÙÐС£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/183845/security/russian-rosselkhoznadzor-hit-by-ddos-attack-food-shipments-delayed.html


¾©¹«Íø°²±¸11010802024551ºÅ