Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2026-02-041. Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷
2ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯Punishing OwlÓÚ2025Äê12ÔÂ12ÈÕÊ״ιûÕæ»î¶¯£¬£¬£¬£¬£¬£¬¶Ô¶íÂÞ˹Õþ¸®Çå¾²»ú¹¹ÌᳫÊÖÒÕÖØ´óµÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÈëÇÖÄ¿µÄÍøÂçÇÔÈ¡ÄÚ²¿Îļþ£¬£¬£¬£¬£¬£¬²¢½«ÆäÐû²¼ÖÁÊý¾Ýй¶ƽ̨£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÚMega.nz´æ´¢¿ÍÕ»±¸·ÝÎļþ£¬£¬£¬£¬£¬£¬ÒÔ×î´ó»¯ÆØ¹â¶È¡£¡£¡£¡£¡£¡£¡£ÎªÍÏÑÓÊܺ¦ÕßÏìÓ¦²¢À©´óÓ°Ï죬£¬£¬£¬£¬£¬¹¥»÷ÕßÌØÒâÑ¡ÔñÖÜÎåÍí6µã37·ÖÕâÒ»·ÇÊÂÇéʱ¶ÎÐû²¼ÈëÇÖÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬£¬£¬£¬Punishing Owl¿ØÖÆÁËÊܺ¦»ú¹¹µÄDNSÉèÖ㬣¬£¬£¬£¬£¬½¨Éè×ÓÓòÃû²¢½«Á÷Á¿Ð®ÖÆÖÁλÓÚ°ÍÎ÷µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷²»µ«ÍйÜÁËÇÔÈ¡µÄÎļþ£¬£¬£¬£¬£¬£¬»¹¸½´øÁËÒ»·ÝÐðÊö¹¥»÷ÄîÍ·µÄÕþÖÎÉùÃ÷¡£¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯½øÒ»²½¶ÔÊܺ¦»ú¹¹µÄÏàÖúͬ°éÓë³Ð°üÉÌÌᳫÉÌÒµµç×ÓÓʼþڲƣ¨BEC£©¹¥»÷£¬£¬£¬£¬£¬£¬Ê¹ÓÃαÔìµÄ·¢¼þµØµã·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬»Ñ³ÆÊÇÍøÂçÈëÇÖÊÂÎñµÄºËʵ֪ͨ£¬£¬£¬£¬£¬£¬²¢±Þ²ßÊÕ¼þÈËÉó²é¸½¼þÎĵµ¡£¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬£¬£¬Punishing OwlÕ¹ÏÖ³ö¸ßË®×¼µÄ¹¥»÷ÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£ÆäÉèÖÃÁËαÔìµÄTLSÖ¤Ê飬£¬£¬£¬£¬£¬´î½¨ÁËÓÃÓÚÓʼþÊÕ·¢µÄIMAPºÍSMTPЧÀÍ£¬£¬£¬£¬£¬£¬²¢°²ÅÅÁËÃûΪZipWhisperµÄPowerShellÇÔÃÜľÂí£¬£¬£¬£¬£¬£¬ÓÃÓÚ͵ȡÊÜѬȾϵͳµÄä¯ÀÀÆ÷ƾ֤¡£¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/new-punishing-owl-hacker-group-targeting-networks/
2. DynoWiper¶ñÒâÈí¼þ¹¥»÷²¨À¼ÄÜÔ´ÆóÒµ
2ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬Ò»¿îÃûΪDynoWiperµÄÐÂÐ͸ßΣÊý¾Ý²Á³ý¶ñÒâÈí¼þÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬Õý¶Ô²¨À¼ÄÜÔ´ÆóÒµÌá³«ÆÆËðÐÔ¹¥»÷£¬£¬£¬£¬£¬£¬Æä½¹µãÄ¿µÄ²¢·ÇÀÕË÷Ç®²Æ£¬£¬£¬£¬£¬£¬¶øÊÇÓÀÊÀɨ³ýÒªº¦Êý¾Ý²¢µ¼ÖÂϵͳ̱»¾¡£¡£¡£¡£¡£¡£¡£ÓëͨÀýÀÕË÷Èí¼þ²î±ð£¬£¬£¬£¬£¬£¬DynoWiperͨ¹ýÈý½×¶Î´Ý»ÙÁ÷³ÌʵÏÖÆÆË𣺵ÚÒ»½×¶ÎµÝ¹éËÑË÷ËùÓÐÀο¿¼°¿ÉÒÆ¶¯Çý¶¯Æ÷ÉϵÄÎļþ£¬£¬£¬£¬£¬£¬±Ü¿ªÒªº¦ÏµÍ³Ä¿Â¼ÒÔά³Ö»ù±¾ÔËÐУ»£»£»µÚ¶þ½×¶ÎʹÓÃ16×Ö½ÚËæ»úÊý¾Ý»º³åÇø¸²Ð´ÎļþÄÚÈÝ£¬£¬£¬£¬£¬£¬Ð¡ÓÚ16×Ö½ÚµÄÎļþ±»ÍêÈ«ÁýÕÖ£¬£¬£¬£¬£¬£¬´óÓÚ16×Ö½ÚµÄÔò²¿·ÖÆÆË𣬣¬£¬£¬£¬£¬ÒÔ´ËÌáÉý´Ý»ÙЧÂÊ£»£»£»µÚÈý½×¶Îͨ¹ýÏµÍ³ÖØÆô»òÖ±½ÓÖÕÖ¹Àú³ÌʹÊÜѬȾװ±¸ÎÞ·¨Æô¶¯¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ±£´æ¶à¸ö±äÖÖ£¬£¬£¬£¬£¬£¬¾ùÓÚ2025Äê12ÔÂ29ÈÕͶ·Å¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÊ×´ÎÖ´ÐÐʧ°Üºó¶à´ÎÐ޸ĴúÂëÒÔÈÆ¹ýÇå¾²·À»¤£¬£¬£¬£¬£¬£¬µ«ÆóÒµ°²ÅŵÄÖն˼ì²âÓëÏìÓ¦¹¤¾ßÀÖ³É×èµ²ÁËÆäÖ´ÐУ¬£¬£¬£¬£¬£¬´ó·ù½µµÍËðʧ¡£¡£¡£¡£¡£¡£¡£WelivesecurityÆÊÎöʦָ³ö£¬£¬£¬£¬£¬£¬DynoWiperÓëÕë¶ÔÎÚ¿ËÀ¼µÄÒÑÖª²Á³ý¶ñÒâÈí¼þZOV±£´æÏÔÖøÏàËÆÐÔ£¬£¬£¬£¬£¬£¬Æä¹éÒòÓÚÓë¶íÂÞ˹¹ØÁªµÄSandworm×éÖ¯¡£¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/dynowiper-data-wiping-malware/
3. Coinbase֤ʵÄÚ²¿Ö°Ô±Êý¾Ýй¶
2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÈ·Èϱ¬·¢Ò»ÆðÄÚ²¿Ö°Ô±Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¾Ý¹«Ë¾½²»°ÈËÅû¶£¬£¬£¬£¬£¬£¬2025Äê12Ô£¬£¬£¬£¬£¬£¬Ò»Ãû³Ð°üÉ̲»µ±»á¼ûÔ¼30Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢KYCÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üÓà¶î¼°ÉúÒâ¼Í¼¡£¡£¡£¡£¡£¡£¡£¸Ã³Ð°üÉÌÒѱ»ÖÕÖ¹ÏàÖú£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§ÒÑ»ñÉí·Ý͵ÇÔ±£»£»£»¤Ð§Àͼ°Ö¸µ¼£¬£¬£¬£¬£¬£¬ÊÂÎñͬ²½Éϱ¨î¿Ïµ»ú¹¹¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕß¡°Shiny Lapsus Hunters¡±Ôø¶ÌÔÝÔÚTelegramÐû²¼CoinbaseÄÚ²¿Ö§³Ö½çÃæ½ØÍ¼ºóɾ³ý£¬£¬£¬£¬£¬£¬½ØÍ¼ÏÔʾ¿É»á¼û¿Í»§Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÎÞ·¨È·ÈϸÃ×éÖ¯ÊÇ·ñÖ±½Ó¹ØÁªÄÚ²¿Ö°Ô±ÈëÇÖ£¬£¬£¬£¬£¬£¬µ«ÀàËÆÊÖ·¨ÔÚÆäËû¹¥»÷ÖÐÆµÏÖ£¬£¬£¬£¬£¬£¬ÈçÍþвÐÐΪÕßÔøÐлßCrowdStrikeÄÚ²¿Ö°Ô±»ñÈ¡½ØÍ¼£¬£¬£¬£¬£¬£¬»òͨ¹ýÉç½»¹¤³Ìð³äÔ±¹¤ÆÈ¡BPOÖ§³ÖÖ°Ô±ÊÚȨ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£BPO¹«Ë¾Òò³Ð½Ó¿Í»§Ö§³Ö¡¢Éí·ÝÑéÖ¤¡¢ITЧÀ͵ÈÔËӪʹÃü£¬£¬£¬£¬£¬£¬ÆäÔ±¹¤³£½Ó´¥ÆóÒµ½¹µãϵͳÓë¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬³ÉΪ¹¥»÷Õ߸߼ÛֵĿµÄ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/
4. Step FinanceÔâºÚ¿Í¹¥»÷ÖÂ4000ÍòÃÀÔª×ʲúËðʧ
2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¼ÓÃÜÇ®±Òƽ̨Step FinanceÓÚ2025Äê1ÔÂ31ÈÕ¼ì²âµ½Çå¾²Îó²î£¬£¬£¬£¬£¬£¬¾ÊÓ²ìÈ·ÈÏÒò¸ß¹Ü×°±¸ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼Ö¼ÛÖµÔ¼4000ÍòÃÀÔªµÄÊý×Ö×ʲú±»µÁ¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÊÇ»ùÓÚSolanaÇø¿éÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Æ½Ì¨¼°ÆÊÎö¹¤¾ß£¬£¬£¬£¬£¬£¬Ö§³ÖÓû§×ʲú¿ÉÊÓ»¯¡¢ÉúÒâ¡¢ÖÊѺµÈ²Ù×÷£¬£¬£¬£¬£¬£¬²¢ÓµÓÐÔÉú´ú±Ò$STEP£¬£¬£¬£¬£¬£¬µ«ÉúÒâÁ¿Ïà¶Ô½ÏС¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬£¬Step FinanceѸËÙÔ¼ÇëÍøÂçÇ徲ר¼ÒÐÖú×·»Ø×ʲú¡£¡£¡£¡£¡£¡£¡£Çø¿éÁ´ÆÊÎö¹«Ë¾CertiKÆðÔ´±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬±»µÁ×ʲú°üÀ¨261,854 SOL£¨Ô¼2890ÍòÃÀÔª£©£¬£¬£¬£¬£¬£¬µ«Æ½Ì¨×îÖÕºËʵ×ÜËðʧԼ4000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£Í¨¹ýToken22±£»£»£»¤²½·¥¼°ÏàÖúͬ°éе÷£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑ×·»ØÔ¼370ÍòÃÀÔªRemora×ʲú¼°100ÍòÃÀÔªÆäËûÍ·´ç£¬£¬£¬£¬£¬£¬ºÏ¼Æ470ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£ÎªÔöÇ¿Çå¾²·À»¤£¬£¬£¬£¬£¬£¬Æ½Ì¨ÒÑÔÝÍ£²¿·ÖÓªÒµÔËÓª£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ÆäÆìÏÂRemora MarketsδÊÜÓ°Ï죬£¬£¬£¬£¬£¬ËùÓÐrTokenÈÔ¼á³Ö1:1ÍêÈ«´¢±¸¡£¡£¡£¡£¡£¡£¡£Step Finance½¨ÒéÓû§ÔÚÊӲ쿢ÊÂǰÔÝͣʹÓÃSTEP´ú±Ò£¬£¬£¬£¬£¬£¬²¢ÔÊÐí½«¶Ô¹¥»÷ǰ״̬¾ÙÐпìÕÕ£¬£¬£¬£¬£¬£¬Öƶ©Õë¶Ô³ÖÓÐÕߵĽâ¾ö¼Æ»®¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/
5. Citrix NetScalerÔâ6.3ÍòIPÐͬÕì̽
2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬Íþв¼à¿ØÆ½Ì¨GreyNoiseÊӲ쵽Õë¶ÔCitrix NetScaler»ù´¡ÉèÊ©µÄÐͬÕì̽Ðж¯£¬£¬£¬£¬£¬£¬¸ÃÐж¯Ê¹Óó¬6.3Íò¸ö×ÔÁ¦IPµØµãÌᳫ111,834¸ö»á»°£¬£¬£¬£¬£¬£¬ÆäÖÐ79%Á÷Á¿Ö¸ÏòCitrix GatewayÃÛ¹Þ£¬£¬£¬£¬£¬£¬64%À´×Ôαװ³ÉÕýµ±ÏûºÄÕßISPµØµãµÄסլÊðÀí£¬£¬£¬£¬£¬£¬Ê£Óà36%Ô´×ÔͳһAzure IPµØµã¡£¡£¡£¡£¡£¡£¡£GreyNoiseÖ¸³ö£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯²¢·ÇËæ»ú»¥ÁªÍøÉ¨Ã裬£¬£¬£¬£¬£¬¶øÊÇÓÐ×éÖ¯µÄ»ù´¡ÉèÊ©²â»æ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÈëÇÖǰʶ±ð̻¶µÄCitrixµÇÂ¼Ãæ°å¼°²úÆ·°æ±¾¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÁ½¸ö½¹µãÖ¸±ê̻¶¶ñÒâÒâͼ£ºÆäÒ»£¬£¬£¬£¬£¬£¬63,189¸öIPÌìÉú109,942¸ö»á»°£¬£¬£¬£¬£¬£¬¼¯ÖÐɨÃè¡°/logon/LogonPoint/index.html¡±Éí·ÝÑéÖ¤½çÃæ£¬£¬£¬£¬£¬£¬´ó¹æÄ£Ê¶±ð̻¶µÄµÇÂ¼Ãæ°å£»£»£»Æä¶þ£¬£¬£¬£¬£¬£¬2ÔÂ1ÈÕ10¸öIPÔÚ6СʱÄÚÆô¶¯1,892¸ö»á»°£¬£¬£¬£¬£¬£¬¾Û½¹URL·¾¶¡°/epa/scripts/win/nsepa_setup.exe¡±£¬£¬£¬£¬£¬£¬Í¨¹ýEPA¹¤¼þö¾ÙCitrix°æ±¾¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ2016ÄêÍ·Ðû²¼µÄChrome 50Óû§ÊðÀí£¬£¬£¬£¬£¬£¬Õë¶ÔEPA×°ÖÃÎļþ·¾¶µÄÌØ¶¨¹¥»÷Åú×¢ÆäÕý¿ª·¢Ìض¨°æ±¾Îó²îʹÓóÌÐò»òÑéÖ¤ÒÑÖªCitrix ADCÎó²î¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/
6. CISA½ôÆÈת´ïSolarWindsЧÀĮ́Îó²î
2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SolarWinds Web Help DeskµÄÑÏÖØÎó²îCVE-2025-40551±ê¼ÇΪ"ÕýÔÚÔâÊܹ¥»÷"£¬£¬£¬£¬£¬£¬²¢ÒÀ¾Ý2021ÄêÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD 22-01£©£¬£¬£¬£¬£¬£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚÈýÌìÄÚÍê³ÉϵͳÐÞ²¹¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Jimi Sebree·¢Ã÷£¬£¬£¬£¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈεÄÊý¾Ý·´ÐòÁл¯Èõµã£¬£¬£¬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔËÐжñÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£SolarWindsÓÚ1ÔÂ28ÈÕÐû²¼Web Help Desk 2026.1°æ±¾ÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬Í¬Ê±Ò»²¢ÐÞ¸´ÁËSebree·¢Ã÷µÄÓ²±àÂëÆ¾Ö¤¸ßΣÎó²î£¨CVE-2025-40537£©¼°watchTowrµÄPiotr Bazydlo±¨¸æµÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-40552¡¢CVE-2025-40554£©£¬£¬£¬£¬£¬£¬ËùÓÐÎó²î¾ùÖ§³ÖÔ¶³ÌʹÓᣡ£¡£¡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬£¬£¬£¬Ö»¹ÜBOD 22-01½öÕë´ºÁª°î»ú¹¹£¬£¬£¬£¬£¬£¬µ«Ë½Óª²¿·ÖÒ²Ó¦¾¡¿ìÐÞ²¹ÒÔµÖÓùÒ»Á¬¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/


¾©¹«Íø°²±¸11010802024551ºÅ