WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØÕ÷ÓëÇå¾²¾¯Ê¾

Ðû²¼Ê±¼ä 2025-09-24

1. WarlockÀÕË÷Èí¼þ×éÖ¯£ºÐÂÐËÍþвµÄ¹¥»÷ÌØÕ÷ÓëÇå¾²¾¯Ê¾


9ÔÂ21ÈÕ£¬£¬£¬SophosÑо¿ÍŶÓÕ¹ÏÖ£¬£¬£¬ÃûΪWarlockµÄÀÕË÷Èí¼þ×éÖ¯£¨Î¢Èí³ÆStorm 2603£¬£¬£¬Sophos×·×ÙΪGOLD SALEM£©ÕýÒÔ¸ßÃ÷ÊÖÒÕÊֶμӾçÈ«ÇòÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2025Äê3ÔÂÆð»îÔ¾£¬£¬£¬9ÔÂÒÑÔÚÆä"Warlock¿Í»§Êý¾Ýй¶Ðã"°µÍøÕ¾µãÐû²¼60ÃûÊܺ¦Õߣ¬£¬£¬Ä¿µÄº­¸Ç±±ÃÀ¡¢Å·ÖÞ¡¢ÄÏÃÀµÄСÐÍÉÌҵʵÌå¡¢Õþ¸®»ú¹¹¼°´óÐÍ¿ç¹ú¹«Ë¾¡£¡£¡£¡£¡£¡£Æä¹¥»÷ÌØÕ÷°üÀ¨Ê¹ÓÃSharePointÁãÈÕÎó²î¡¢°²ÅÅ×Ô½ç˵ToolShellÁ´¡¢Í¶·ÅWeb Shell¼°»ùÓÚGolangµÄWebSocketЧÀÍÆ÷¾ÙÐг¤ÆÚ»¯£¬£¬£¬²¢ÀÄÓÃVelociraptorµÈÕýµ±¹¤¾ßʵÑéÒþ²ØËíµÀ¹¥»÷£¬£¬£¬Í¬Ê±Á¬ÏµMimikatzƾ֤͵ÇÔ¡¢PsExecºáÏòÒÆ¶¯¼°GPOÍÆËÍÀÕË÷¸ºÔصȹŰåÊÖ·¨¡£¡£¡£¡£¡£¡£¸Ã×é֯йÃÜÄ£Ê½ÆæÒ죬£¬£¬Ê¡ÂÔÐû²¼ÈÕÆÚÓëÊÓ¾õÑù±¾£¬£¬£¬½öËæ»úÅû¶±»µÁÊý¾ÝÁ¿£¬£¬£¬²¢Í¨¹ý×¢Êͱê×¢Êý¾Ý״̬£¨Ðû²¼/³öÊÛ/δ֧¸¶Êê½ð£©£¬£¬£¬ÉõÖÁÌṩÏÖʵÊý¾ÝÁ´½Ó¡£¡£¡£¡£¡£¡£ÆäFAQÉùÃ÷ѵ³â"²»ÈÏÕæÈεĹ«Ë¾"£¬£¬£¬³ÆÎ´ÁªÏµµÄ´ó¿Í»§Êý¾Ý½«Ãâ·Ñ¹ûÕæ£¬£¬£¬µ«"¸ß¶ÈÃô¸ÐÊý¾Ý"µÄ´óÐÍÆóÒµ¿Í»§ÐÅÏ¢²»»áÍêÈ«Åû¶¡£¡£¡£¡£¡£¡£SophosÖ¸³ö£¬£¬£¬WarlockÖ±ÖÁ6Ô²ÅÔÚ¶íÓïÂÛ̳Ramp¹ûÕæ»îÔ¾£¬£¬£¬ÔøÕ÷¼¯Veeam¡¢ESXi¡¢SharePointÎó²îʹÓü°EDRÖÐÖ¹¹¤¾ß¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/warlock-ransomware-group-attacks-surge-september/


2. Æ­×ÓÀÄÓÃÈ˹¤ÖÇÄÜÔ­Éúƽ̨ÍйÜÐéαÑéÖ¤ÂëÒ³Ãæ


9ÔÂ22ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼×îб¨¸æÕ¹ÏÖ£¬£¬£¬È˹¤ÖÇÄÜ¿ª·¢Æ½Ì¨Õý±»ÍøÂç·¸·¨·Ö×ÓʹÓ㬣¬£¬³ÉΪÍйÜÐéαÑéÖ¤Â루CAPTCHA£©Ò³ÃæµÄÐÂÔØÌ壬£¬£¬´Ó¶øÌÓ±ÜÇå¾²¼ì²â²¢ÓÕµ¼Óû§½øÈë´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£×÷ΪÑéÖ¤ÕæÊÊÓû§µÄÒªº¦¹¤¾ß£¬£¬£¬CAPTCHA±¾Ó¦µÖÓù»úеÈ˹¥»÷£¬£¬£¬ÏÖÔÚÈ´±»·´ÏòʹÓ㬣¬£¬³ÉÎªÍøÂç´¹ÂÚµÄ"צÑÀ"¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬×Ô2025Äê1ÔÂÆð£¬£¬£¬Ê¹ÓÃLovable¡¢Netlify¡¢VercelµÈAIÔ­Éú¿ª·¢Æ½Ì¨ÍйÜÐéαÑéÖ¤ÂëÒ³ÃæµÄÍøÂç´¹Âڻ¼¤Ôö¡£¡£¡£¡£¡£¡£ÕâЩƽ̨Ðû³Æ"Áã´úÂë¼´¿É¹¹½¨Ó¦ÓÃ"£¬£¬£¬½µµÍÁËÊÖÒÕÃż÷£¬£¬£¬Ê¹·¸·¨·Ö×ÓÄÜ¿ìËÙ½¨Éè¿´ËÆÕý¹æµÄÑéÖ¤ÂëÌôÕ½Ò³Ãæ¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³Ìͨ³£Ê¼ÓÚαװ³É"ÃÜÂëÖØÖÃ""USPSµØµã±ä»»"µÈ½ôÆÈÓʼþµÄ´¹ÂÚÁ´½Ó£¬£¬£¬Óû§µã»÷ºóÊ×ÏÈ¿´µ½ÐéαCAPTCHAÒ³Ãæ£¬£¬£¬ÒòÆä"¹Ù·½ÑéÖ¤"Íâ¹Û£¬£¬£¬Êܺ¦ÕßÒ×ËÉ¿ªÐ¡ÐÄ£¬£¬£¬¶ø×Ô¶¯É¨Ã蹤¾ßÒò½ö¼ì²âµ½ÑéÖ¤Âë¶ø·Çµ×²ãÆ¾Ö¤ÍøÂç±íµ¥£¬£¬£¬ÄÑÒÔʶ±ð¶ñÒâÒ³Ãæ¡£¡£¡£¡£¡£¡£Íê³ÉÑéÖ¤ºó£¬£¬£¬Óû§»á±»Öض¨ÏòÖÁÕæÕýµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬µ¼ÖÂÆ¾Ö¤¡¢Ãô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¸üÑÏËàµÄÊÇ£¬£¬£¬¹¹½¨´ËÀàÒ³Ãæ½öÐè»ù´¡ÊÖÒÕÄÜÁ¦£¬£¬£¬ÅäºÏAI±àÂëÖúÊÖ¼´¿ÉÍê³É¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/ai-platforms-captcha-phishing/


3. µÂ¹úDCS³äµçÕ¾Êý¾Ýй¶£¬£¬£¬¿Í»§Ð§ÀÍÉÌÎ¥¹æ»á¼ûÖÂÓû§ÐÅϢΣº¦


9ÔÂ23ÈÕ£¬£¬£¬µÂ¹úÊý×Ö³äµç½â¾ö¼Æ»®¹«Ë¾£¨DCS£©¿ËÈÕÏòÓû§×ª´ïÒ»ÆðÊý¾ÝÇå¾²ÊÂÎñ£¬£¬£¬Æä¿Í»§Ð§ÀÍÌṩÉÌÔÚ´¦Öóͷ£Êý¾Ýʱ±¬·¢Î¥¹æÐÐΪ£¬£¬£¬µ¼Ö²¿·Ö¿Í»§ÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¡£¡£¡£DCS×÷ΪŷÖÞÖ÷Òªµç¶¯Æû³µ³äµçЧÀÍÉÌ£¬£¬£¬ÖÎÀí×Å30¶à¸ö¹ú¼Ò³¬100ÍòÓû§¼°98Íò×ù³äµçÕ¾£¬£¬£¬²¢Îª±¦Âí¡¢ÆðÑÇµÈÆ·ÅÆÌṩ¼Æ·ÑЧÀÍ¡£¡£¡£¡£¡£¡£ÊÂÎñÆðÔ´ÓÚDCS·¢Ã÷ÆäÏàÖúµÄЧÀÍÉÌÔÚÎÞºÏÀíÀíÓÉÇéÐÎÏ»á¼ûÁ˿ͻ§Êý¾Ý¡£¡£¡£¡£¡£¡£DCSÁ¬Ã¦Æô¶¯ÖÜÈ«ÊӲ죬£¬£¬È·ÈÏÎ¥¹æÐÐÎªÉæ¼°¸öλÊý²¡Àý£¬£¬£¬ÊÜÓ°ÏìÊý¾Ý½öÏÞÓÚÐÕÃûºÍµç×ÓÓʼþµØµã£¬£¬£¬¶øÍêÕûÖ§¸¶ÐÅÏ¢Òòδ´æ´¢ÔÚÊÜÓ°ÏìÊý¾Ý¿âÖеÃÒÔ±£È«¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬DCSÒÑÓëЧÀÍÉÌÖÎÀí²ãÏàÖú²éÃ÷Ôµ¹ÊÔ­ÓÉ£¬£¬£¬ÊµÑéÌØÊâÇå¾²²½·¥£¬£¬£¬²¢×ª´ïÖ´·¨¼°Êý¾Ý±£»£»£»£»¤²¿·Ö¡£¡£¡£¡£¡£¡£DCSÔÚ9ÔÂ19ÈÕÉèÁ¢µÄרÏîÒ³ÃæÖÐÇ¿µ÷£¬£¬£¬³äµçЧÀͼ°¼Æ·ÑϵͳÈÔÇå¾²ÔËÐУ¬£¬£¬Óû§ÎÞÐè½ÓÄÉÌØÊâ²Ù×÷£¬£¬£¬µ«ÐèСÐÄDZÔÚ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¹«Ë¾ÖØÉ꣬£¬£¬Ö»¹ÜÄ¿½ñ½öÈ·ÈÏÉÙÊý°¸Àý£¬£¬£¬µ«ÎÞ·¨Íêȫɨ³ýÆäËû¿Í»§Êý¾Ý±»·ÇÊÚȨÉó²éµÄ¿ÉÄÜÐÔ£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£


https://www.theregister.com/2025/09/23/dcs_data_breach/


4. ŦԼÁªºÏ¹ú´ó»áǰϦ´Ý»Ù´óÐ͵çÐÅÍøÂç


9ÔÂ23ÈÕ£¬£¬£¬ÔÚÁªºÏ¹ú´ó»áÓÚÂü¹þ¶ÙÕÙ¿ªÇ°Ï¦£¬£¬£¬Áª°îÊÓ²ìÖ°Ô±´Ý»ÙÁËÒ»¸öÒþ²ØÔÚŦԼµØÇøµÄ´óÐ͵çÐÅÍøÂç¡£¡£¡£¡£¡£¡£¸ÃÍøÂç°üÀ¨Áè¼Ý10ÍòÕÅSIM¿¨ºÍ300̨ЧÀÍÆ÷£¬£¬£¬¿ÉÄܶÔŦԼÊÐͨѶϵͳÔì³ÉÔÖÄÑÐÔÆÆË𡣡£¡£¡£¡£¡£ÌØÇÚ¾ÖÖ¸³ö£¬£¬£¬´ËÍøÂç¿É×ÌÈŽôÆÈÏìӦЧÀÍ¡¢¹Ø±Õ·äÎÑÍøÂç²¢·¢ËͼÓÃÜÐÅÏ¢£¬£¬£¬Ç¡·ê150Óàλ¹ú¼ÊÏòµ¼ÈËÆë¾ÛŦԼʱ´ú¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬¸ÃÍøÂç×°±¸ÂþÑÜÓÚÁªºÏ¹ú×ܲ¿35Ó¢Àï°ë¾¶¹æÄ£ÄÚ£¬£¬£¬¹æÄ£Óë×°±¸ÀàÐÍÌåÏÖÆä¿ÉÄÜΪÃñ×å¹ú¼Ò¼à¿ØÐж¯¡£¡£¡£¡£¡£¡£Í¨Ì«¹ýÎöSIM¿¨Êý¾Ý£¬£¬£¬ÌØÇÚ¾Ö·¢Ã÷ÆäÓëÖÁÉÙÒ»¸öÍâ¹úÕþ¸®¼°··¶¾¼¯Íű£´æ¹ØÁª¡£¡£¡£¡£¡£¡£Ö»¹ÜÁªºÏ¹ú´ó»áÊÇ·ñΪĿµÄÉв»Ã÷È·£¬£¬£¬µ«ÌØÇÚ¾ÖÌØ¹¤ÂíÌØ¡¤Âó¿Ë¿â¶ûÇ¿µ÷£¬£¬£¬¸Ãϵͳ¾ß±¸´Ý»ÙÊÖ»úÐźÅËþ¡¢×è¶ÏÓ¦¼±Í¨Ñ¶µÄÄÜÁ¦£¬£¬£¬ÔÚÖØ´ó¹ú¼Ê»î¶¯Åä¾°Ï¿ÉÄÜÒý·¢¶¼»á¼¶Í¨Ñ¶Ì±»¾¡£¡£¡£¡£¡£¡£¸ÃÍøÂçÓÚ½ñÄê8Ô±»ÌØÇÚ¾ÖÔÚÊÓ²ìÕë´ºÁª°î¹ÙÔ±µÄ¡°µç»°Íþв¡±ÊÂÎñʱ·¢Ã÷¡£¡£¡£¡£¡£¡£Âó¿Ë¿â¶ûÌåÏÖ£¬£¬£¬ÆÊÎöÍøÂç´«ÊäµÄͨѶÄÚÈÝÐèʱÈÕ£¬£¬£¬µ«ÏµÍ³ÍþÁ¦½ûֹСêï¡£¡£¡£¡£¡£¡£¿£¿£Ë¼Á¿µ½×°±¸¼ÛÖµÊý°ÙÍòÃÀÔª£¬£¬£¬Ä»ºó×éÖ¯×ʽðÐÛºñ£¬£¬£¬¿ÉÄܱ£´æÀàËÆÍøÂç±é²¼ÃÀ¹úÆäËû¶¼»á¡£¡£¡£¡£¡£¡£


https://securityboulevard.com/2025/09/secret-service-shuts-down-sprawling-hidden-telecom-network-in-ny/


5. CISA³ÆºÚ¿ÍʹÓÃGeoServerÎó²îÈëÇÖÁª°î»ú¹¹


9ÔÂ23ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Åû¶£¬£¬£¬2024Äê7Ô£¬£¬£¬¹¥»÷ÕßʹÓÃδÐÞ²¹µÄGeoServerʵÀý£¨Éæ¼°CVE-2024-36401Ô¶³Ì´úÂëÖ´ÐÐÎó²î£©ÇÖÈëÁËÒ»¼ÒÃÀ¹úÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÍøÂç¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ2024Äê6ÔÂ18ÈÕ±»ÐÞ¸´£¬£¬£¬µ«Ò»¸öԺ󣬣¬£¬ÒòÇå¾²Ñо¿Ö°Ô±ÔÚÏß·ÖÏí¿´·¨ÑéÖ¤£¨PoC£©ÑÝʾ´úÂ룬£¬£¬CISA½«Æä¼ÓÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±¡£¡£¡£¡£¡£¡£Íþв¼à¿Ø×éÖ¯ShadowserverÓÚ7ÔÂ9ÈÕÆð¼ì²âµ½Õë¶Ô¸ÃÎó²îµÄ¹¥»÷£¬£¬£¬OSINTËÑË÷ÒýÇæZoomEye×·×Ùµ½³¬16,000̨̻¶ÔÚÍøµÄGeoServerЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁª°î»ú¹¹GeoServerЧÀÍÆ÷ºó£¬£¬£¬ÔÚÔ¼Á½ÖÜÄÚºáÏòÒÆ¶¯¹¥ÏÝWebЧÀÍÆ÷ºÍSQLЧÀÍÆ÷£¬£¬£¬ÉÏ´«China ChopperµÈWeb Shell¼°ÓÃÓÚÔ¶³Ì»á¼û¡¢³¤ÆÚ»¯¡¢ÏÂÁîÖ´ÐкÍȨÏÞÌáÉýµÄ¾ç±¾£¬£¬£¬²¢Í¨¹ý±©Á¦ÆÆ½âÊÖÒÕ£¨T1110£©»ñÈ¡ÃÜÂëÒÔ½øÒ»²½ºáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßDZÔÚÈýÖÜδ±»·¢Ã÷£¬£¬£¬Ö±ÖÁ7ÔÂ31ÈÕÁª°î»ú¹¹µÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©¹¤¾ß½«SQLЧÀÍÆ÷ÉϵĿÉÒÉÎļþ±ê¼ÇΪ¶ñÒâÈí¼þ²¢´¥·¢¾¯±¨£¬£¬£¬Çå¾²ÔËÓªÖÐÐÄ£¨SOC£©Ëæºó¸ôÀëЧÀÍÆ÷²¢ÁªºÏCISAÊӲ졣¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-says-hackers-breached-federal-agency-using-geoserver-exploit/


6. Circle KÏã¸ÛÓªÒµÒòÍøÂçÖÐֹ̱»¾


9ÔÂ23ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬±ãµ±µêÁ¬ËøÆ·ÅÆCircle KÏã¸ÛÓªÒµÒò¡°ÍøÂçÖÐÖ¹¡±ÊÂÎñµ¼ÖÂÈ«¸Û½ü400¼ÒÃŵêµç×ÓÖ§¸¶¡¢»áԱЧÀͼ°µç×ÓÓʼþϵͳ̱»¾ÊýÈÕ£¬£¬£¬½öÏֽ𼰰˴ï֧ͨ¸¶¹¦Ð§Î¬³ÖÔË×÷¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚÖÜÄ©Ê×´Îת´ïÊÂÎñºó£¬£¬£¬ÖÜÒ»ÔÚFacebookÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬ÒòÎÞ·¨É¨³ýÍøÂç¹¥»÷¿ÉÄÜÐÔ£¬£¬£¬ÒÑÆô¶¯Êý¾Ý±£»£»£»£»¤²½·¥²¢ÓëÖ´·¨²¿·Ö¼°µÚÈý·½×¨¼ÒÏàÖúÊÓ²ìÔµ¹ÊÔ­ÓÉ¡¢¹æÄ£¼°Ó°Ïìˮƽ¡£¡£¡£¡£¡£¡£×èÖ¹Öܶþ£¬£¬£¬Óû§ÈÔͨ¹ýÉ罻ýÌå·´ÏìЧÀÍÖÐÖ¹ÎÊÌ⣬£¬£¬Èç»ý·ÖºÍÓÅ»ÝȯÓâÆÚ£¬£¬£¬ºôÓõÑÓÉìʹÓÃÏÞÆÚ¡£¡£¡£¡£¡£¡£Circle KÏã¸ÛÓɼÓÄÃÖÁ¹«Ë¾Alimentation Couche-TardËùÓУ¬£¬£¬¸Ã¹«Ë¾ÔÚ±±ÃÀ¼°ÆäËûµØÇøÄ±»®Circle KÊÐËÁ¡£¡£¡£¡£¡£¡£Circle KÏã¸ÛµÄǰĸ¹«Ë¾ÑÇÖޱ㵱ÁãÊÛÓÐÏÞ¹«Ë¾ (CRA) ÖÜÒ»Ò²±¨¸æÁËÍøÂçÖÐÖ¹¡£¡£¡£¡£¡£¡£CRAÓÚ20ÊÀ¼Í80ÄêÔ»ñµÃÁËCircle KµÄÊÚȨ£¬£¬£¬²¢ÓÚ2020Ä꽫ÆäÊۻظøAlimentation Couche-Tard¡£¡£¡£¡£¡£¡£CRAÌåÏÖ£¬£¬£¬ÆäÄÚ²¿ÏµÍ³Êܵ½Ó°Ï죬£¬£¬²¢ÒÑִ֪ͨ·¨²¿·Ö£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúÁ½ÆðÊÂÎñÊÇ·ñÓйØÁª¡£¡£¡£¡£¡£¡£


https://therecord.media/circle-k-hong-kong-suspected-cyberattack-convience-stores