¹ú¼Ê½áºÏÐж¯µ·»ÙTycoon2FA´¹µöƽ̨

°ä²¼¹¦·ò 2026-03-06

1. ¹ú¼Ê½áºÏÐж¯µ·»ÙTycoon2FA´¹µöƽ̨


3ÔÂ4ÈÕ£¬£¬Å·ÖÞÐ̾¯×é֯Эµ÷µÄ¹ú¼Ê·¨ÂÉÐж¯½üÈճɹ¦µ·»ÙTycoon2FA´¹µö¼´·þÎñ£¨PhaaS£©Æ½Ì¨¡£Õâ´ÎÐж¯ÓÉ΢ÈíÔÚ˽ӪºÏ×÷ͬ°éÁªÃËÖ§³ÖÏÂÌáÒé¼¼ÊõÖжÏ£¬£¬À­ÍÑάÑÇ¡¢¡¢Á¢ÌÕÍ𡢡¢ÆÏÌÑÑÀ¡¢¡¢²¨À¼¡¢¡¢Î÷°àÑÀºÍÓ¢¹ú·¨Âɲ¿ÃÅÖ´ÐÐÓòÃû²é·âµÈ´ëÊ©£¬£¬¹²¹Ø±Õ330¸öÊôÓÚ·¸×ï·þÎñ»ú¹¹¹Ç¸É»ù´¡ÉèÊ©µÄÓòÃû£¬£¬Ô̺¬½ÚÖÆÃæ°åºÍ´¹µöÒ³Ãæ¡£Tycoon2FA×Ô2023Äê8ÔÂÆð»îÔ¾£¬£¬±»ÍøÂç·¸×ï·Ö×ÓÓÃÓÚÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»¤£¬£¬ÈëÇÖÈ«Çò½ü10Íò¸ö×éÖ¯µÄÕË»§¡£¾Ý΢ÈíÊý¾Ý£¬£¬ÖÁ2025ÄêÄêÖУ¬£¬¸Ãƽ̨ÿÔÂÌìÉúÊýǧÍò·â´¹µöÓʼþ£¬£¬Ó°Ï쳬50Íò¸ö×éÖ¯£¬£¬Õ¼ËùÓб»À¹½Ø´¹µö³¢ÊÔµÄ60%¡£Æä¼¼ÊõµÀÀíΪͨ¹ý·´Ïò´úÀí·þÎñÆ÷ʵʱÀ¹½ØÊܺ¦ÕߵǼʹ´¦ºÍ»á»°cookie£¬£¬·ÂÕÕMicrosoft 365¡¢¡¢OneDrive¡¢¡¢Outlook¡¢¡¢SharePoint¼°GmailµÈ¿ÉÐÅÆ·ÅƵÇÂ¼Ò³Ãæ¡£¼´±ãÊܺ¦ÕßʵÏÖÕý³£µÇ¼£¬£¬¹¥»÷ÕßÈÔÄܽٳÖÒÑÈÏÖ¤»á»°²¢ÈƹýMFA±£»£»£»¤£¬£¬³ý·Ç»î¶¯»á»°ºÍÁîÅÆ±»Ã÷È·³·Ïú¡£¸Ãƽ̨ͨ¹ýTelegramÒÔ120ÃÀÔª10ÌìʹÓÃȨµÄ¼ÛÖµÏúÊÛ£¬£¬´ó·ù½µµÍµÍ¼¼Êõ·¸×ï·Ö×ÓÌáÒ鸴ÔÓMFAÈÆ¹ý¹¥»÷µÄÃż÷¡£


https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/


2. ÒÁÀÊÎÞÈË»úÏ®»÷ÑÇÂíÑ·Öж«Êý¾ÝÖÐÐÄÖÂÔÆ·þÎñÖжÏ


3ÔÂ3ÈÕ£¬£¬ÒÁÀʱ¾ÖܶÔÑÇÂíÑ·ÔÚ°¢ÁªÇõºÍ°ÍÁÖµÄÈý×ùÊý¾ÝÖÐÐÄ·¢ÆðÎÞÈË»úÏ®»÷£¬£¬µ¼ÖÂÖж«²¿ÃŵØÓòÔÆ·þÎñÖжÏ£¬£¬µØÓòÑÏÖØ´óÊÆ½øÒ»²½¶ñ»¯¡£¾ÝÑÇÂíÑ·Åû¶£¬£¬°¢ÁªÇõÁ½×ùÊý¾ÝÖÐÐÄÔâÎÞÈË»ú¡°Ö±½Ó»÷ÖС±£¬£¬°ÍÁÖÉèÊ©Òò¡°½ü¾àÀëÎÞÈË»úÏ®»÷¡±ÊÜË𣬣¬¹²Ôì³ÉÔ¼60ÏîÑÇÂíÑ·ÔÆ·þÎñÖжÏ£¬£¬Ó°ÏìÍøÂçÁ÷Á¿¼°ÒÀÀµÔÆ·þÎñµÄÒµÎñÔËÓª¡£Õâ´ÎÏ®»÷²úÉúÔÚÃÀÒÔ½áºÏ½ø¹¥µ¼ÖÂÒÁÀÊ×î¸ßÇ̳þ¹þ÷ÄÚÒÁ¼°¶àÃû¸ß¼¶¹ÙÔ±ÉíÍöºó£¬£¬ÒÁÀÊËæ¼´¶Ô°¢ÁªÇõ¼°ÁÚ¹ú·¢Õ¹±¨³ðÐж¯£¬£¬Ö¸±ê²»½öÔ̺¬ÃÀ¾ü»ùµØ£¬£¬»¹À©´óÖÁ»ú³¡¡¢¡¢¾Æµê¼°¹Ø¼üÓÍÆø»ù´¡ÉèÊ©¡£ÑÇÂíÑ·ÉêÃ÷Ö¸³ö£¬£¬Ï®»÷Ôì³ÉÊý¾ÝÖÐÐĽṹ°Ü»µ¡¢¡¢µçÁ¦ÖжÏ£¬£¬²¢´¥·¢Ïû·Àϵͳµ¼ÖÂÊÒÄÚË®Ë𣬣¬±¾µØÏû·À²¿ÃÅÔÚɱ¾ø²Ðº¡Òý·¢»ð¾¯Ê±¹Ø±ÕÁ˵çÔ´ºÍ·¢µç»ú£¬£¬½øÒ»²½¼Ó¾ç·þÎñÖжÏ¡£ÑÇÂíÑ·°µÊ¾£¬£¬Ä¿Ç°ÕýÓë´¦Ëùµ±¾ÖºÏ×÷ÓÅÏȱ£ÏÕÔ±¹¤°²È«£¬£¬²¢½¨ÒéÖж«¿Í»§±¸·Ý¹Ø¼üÊý¾Ý£¬£¬½«ÀûÓÃǨáãÖÁÆäËûAWSÇøÓò¡£¹«Ë¾Ç¿µ÷£¬£¬È«Ã渴ԭȡ¾öÓÚÊÜÓ°Ïì»ù´¡ÉèÊ©µÄÐÞ¸´½ø¶È£¬£¬¶øµ±Ç°Öж«³ÖÐøÃ¬¶Üµ¼ÖÂÕûÌåÔËÓª»·¾³ÈÔ²»³ÉÔ¤²â¡£


https://therecord.media/iran-drone-strikes-hit-amazon-data-centers-gulf


3. ¹È¸èÅû¶CorunaÐÂÐÍiOS·ì϶ÀûÓù¤¾ß°ü


3ÔÂ5ÈÕ£¬£¬¹È¸èÍþвµý±¨Ð¡×飨GTIG£©·¢ÏÖÃûΪCoruna£¨±ðºÅCryptoWaters£©µÄÐÂÐÍiOS·ì϶ÀûÓù¤¾ß°ü£¬£¬¸Ã¹¤¾ß°üÕë¶ÔÔËÐÐiOS 13.0ÖÁ17.2.1°æ±¾µÄiPhone£¬£¬Ô̺¬ÎåÌõÆëÈ«·ì϶ÀûÓÃÁ´¹²23¸ö·ì϶·¨Ê½¡£Coruna¶Ô¾É°æiOSÓµÓÐÇ¿¹¥»÷ÄÜÁ¦£¬£¬µ«¶ÔiOS 17.3¼°ÒÔÉϰ汾ÎÞЧ£¬£¬ÒòCVE-2024-23222µÈ·ì϶ÒÑÔÚ17.3ÖÐÐÞ¸´¡£¸Ã¹¤¾ß°üÓÉ¼à¿ØÉ豸¹©¸øÉ̿ͻ§³õ´ÎʹÓ㬣¬ºó±»¶à¸öÍþв×éÖ¯¸´ÓøĽø¡£UNC6353ÔÚÎÚ¿ËÀ¼ÌáÒéË®¿Ó¹¥»÷£¬£¬Öйú½ðÈÚÍþв×éÖ¯UNC6691Ôòͨ¹ýÐéα½ðÈÚÍøÕ¾²¿ÊðÆëÈ«¹¤¾ß°ü£¬£¬ÀûÓðµ²ØiFrameͶ·Å·ì϶·¨Ê½£¬£¬Â¶³ö»îÔ¾µÄ¡°¶þÊÖ¡±ÁãÈÕ·ì϶Êг¡¡£¼¼Êõ²ãÃæ£¬£¬Coruna¿ò¼Üѡȡ¹ÖÒìJavaScript»ìºÏ¼¼Êõ£¬£¬Í¨¹ýÉè±¸Ö¸ÎÆ¼ø±ð¼ÓÔØ¶ÔÓ¦·ì϶·¨Ê½¡£ÆäÖ÷ÌâÔ̺¬WebKitÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶ÀûÓᢡ¢Ö¸ÕëÈÏÖ¤£¨PAC£©ÈƹýÄ£¿£¿é£¬£¬ÒÔ¼°¿ÉÖØÓÃ×é¼þ£¬£¬ÓÃÓÚÈÆ¹ýÓû§Ì¬RWXÄÚ´æ·ÖÅäÏÞ¶È¡£¹È¸èÒѰ䲼ÈëÇÖÖ¸±ê£¨IOC£©ºÍYara¹æ¶¨£¬£¬²¢½«ÓйØÓòÃû²ÎÓ밲ȫä¯ÀÀ±£»£»£»¤¡£


https://securityaffairs.com/188928/security/google-uncovers-coruna-ios-exploit-kit-targeting-ios-13-17-2-1.html


4. Bing AIËÑË÷´«²¼Î±ÔìOpenClawµÄ¶ñÒâÈí¼þ


3ÔÂ5ÈÕ£¬£¬½üÆÚ£¬£¬Íйܼì²âÓëÏìÓ¦¹«Ë¾HuntressÅû¶һ·ÐÂÐÍÍøÂç¹¥»÷»î¶¯£ºÍþвÐÐΪÕßͨ¹ýαÔìGitHub´æ´¢¿â£¬£¬½áºÏ΢ÈíBingµÄAI¼ÓÇ¿ËÑË÷Ö°ÄÜ£¬£¬ÏòÊÔͼװÖÿªÔ´AI´úÀíOpenClawµÄÓû§´«²¼ÐÅÏ¢ÇÔÈ¡·¨Ê½¼°´úÀí¶ñÒâÈí¼þ¡£OpenClawÒòÆäÄܽӼû±¾µØÎļþ²¢¼¯³Éµç×ÓÓʼþ¡¢¡¢¼´Ê±Í¨Ñ¶µÈÔÚÏß·þÎñµÄÖ°ÄܸöÐÔ£¬£¬³ÉΪ¹¥»÷ÕßÑÛÖеġ°ÃÎÏëÔØÌ塱¡£¹¥»÷Õ߯ð³õ´´½¨¶ñÒâGitHub´æ´¢¿â£¬£¬¼Ù×°³ÉOpenClaw¹Ù·½×°Ö÷¨Ê½£¬£¬²¢ÀûÓÃBing AIÔÚËÑË÷Á˾ÖÖеÄÍÆ¼ö»úÖÆ£¬£¬ÓÕµ¼Óû§ÏÂÔØ¡£ÔÚmacOS³¡¾°Ï£¬£¬Óû§±»Êèµ¼Ö´ÐÐÔ̺¬Atomic Stealer¶ñÒâÈí¼þµÄbashºÅÁ£¬¸ÃºÅÁî»áÏνÓÖÁ¡°puppeteerrr¡±µÈ¶ÀÁ¢GitHub²Ö¿â£¬£¬²¿ÊðÔ̺¬shell¾ç±¾ºÍMach-O¿ÉÖ´ÐÐÎļþµÄ¶ñÒâÎļþ¡£WindowsÓû§ÔòÃæ¶Ô¡°OpenClaw_x64.exe¡±µÄ´«²¼£¬£¬¸Ã·¨Ê½»á¿ªÊͶà¸ö»ùÓÚRustµÄ¶ñÒâ¼ÓÔØÆ÷£¬£¬ÔÚÄÚ´æÖÐÖ´ÐÐÐÅÏ¢ÇÔÈ¡·¨Ê½¡£ÆäÖУ¬£¬VidarÇÔÈ¡·¨Ê½»áͨ¹ýTelegramºÍSteamÓû§×ÊÁÏ»ñÈ¡C2Êý¾Ý£¬£¬¶øGhostSocks´úÀíÔò½«Óû§ÍÆËã»úת»¯Îª¹¥»÷½Úµã£¬£¬ÓÃÓÚ·ÓɶñÒâÁ÷Á¿»ò°µ²Ø¹¥»÷ºÛ¼£¡£


https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/


5. ά»ùýÌå»ù½ð»áÔâJavaScriptÈ䳿¹¥»÷


3ÔÂ5ÈÕ£¬£¬Î¬»ùýÌå»ù½ð»áÔâ·êһ·ÓÉ×ÔÎÒ´«²¼JavaScriptÈ䳿Òý·¢µÄ°²È«ÊÂÎñ¡£¸ÃÈä³æÍ¨¹ýÅú¸ÄÓû§¾ç±¾¼°·ÛËéMeta-WikiÒ³ÃæÖ´Ðй¥»÷£¬£¬µ¼ÖÂÔ¼3996¸öÒ³Ãæ±»Åú¸Ä¡¢¡¢85λÓû§µÄcommon.jsÎļþ±»´úÌæ£¬£¬×îÖÕÆÈʹ»ù½ð»áÁÙʱÏÞ¶ÈËùÓÐÏîÄ¿±à×ëÖ°ÄÜ¡£ÊÂÎñÔ´ÓÚ¶íÂÞ˹ά»ù°Ù¿ÆÍйܵÄÒ»·Ý¶ñÒâ¾ç±¾test.js£¬£¬¸Ã¾ç±¾ÓÚ2024Äê3Ô³õ´ÎÉÏ´«£¬£¬Ó뺹Ç๥»÷ÖÐʹÓõľ籾´æÔÚ¹ØÁª¡£¾Ýµ÷²é£¬£¬µ±ÈÕÒ»Ãûά»ùýÌåÔ±¹¤ÕË»§ÔÚ²âÊÔÓû§¾çÐÔ×ÓÄÜʱ£¬£¬¿ÉÄÜÒòÓÐÒâÖ´ÐС¢¡¢²»²â¼ÓÔØ»òÕË»§±»µÁ´¥·¢¸Ã¾ç±¾£¬£¬µ¼ÖÂÆäͨ¹ýÒѵǼÓû§µÄcommon.js¼°È«¾ÖMediaWiki:Common.jsÎļþʵÏÖ×ÔÎÒ´«²¼¡£È䳿»¹¾ß±¸±à×ëËæ»úÒ³ÃæÖ°ÄÜ£¬£¬Í¨¹ý²åÈë°µ²ØµÄJavaScript¼ÓÔØÆ÷¼°´ó³ß´çͼƬ·ÛËéÒ³ÃæÄÚÈÝ¡£Î¬»ùýÌå»ù½ð»á¹ýºóÉêÃ÷³Æ£¬£¬¸Ã¶ñÒâ´úÂë½ö»îÔ¾23·ÖÖÓ£¬£¬ÆÚ¼ä½ö¶ÔMeta-WikiÄÚÈÝÔì³Éһʱ¸ü¸ÄÓëɾ³ý£¬£¬ÎÞÓÀÔ¶ÐÔÇÖº¦»òСÎÒÐÅϢй¶¡£Ä¿Ç°±à×ëÖ°ÄÜÒѸ´Ô­£¬£¬»ù½ð»áÕý¼ÓÇ¿°²È«Éó²é²¢Öƶ©¶îÍâ·À»¤´ëÊ©£¬£¬ÒÔ½µµÍͬÀàÊÂÎñ·çÏÕ¡£


https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/


6. ¶í¹ØÁª´¹µö»î¶¯ÓÃжñÒâÈí¼þ¹¥»÷ÎÚ×éÖ¯


3ÔÂ5ÈÕ£¬£¬ClearSky×êÑл㱨Åû¶һ·Óë¶íÂÞ˹ÓйصÄÍøÂç´¹µö¹¥»÷ÊÂÎñ£¬£¬¸Ã»î¶¯Í¨¹ýÁ½ÖÖÐÂÐͶñÒâÈí¼þBadPawºÍMeowMeowÕë¶ÔÎÚ¿ËÀ¼×éÖ¯ÌáÒé¶à½×¶Î¹¥»÷¡£¹¥»÷Á´Ê¼ÓÚÒ»·âÔ̺¬ZIPѹËõÎļþÁ´½ÓµÄ´¹µöÓʼþ£¬£¬Óʼþͨ¹ýÎÚ¿ËÀ¼ÍøÂç·þÎñÌṩÉÌukr[.]net·¢ËÍ£¬£¬¸ÃÓòÃû´ËÇ°Ôø±»¶íÂÞ˹¹¥»÷»î¶¯ÀÄÓá£Êܺ¦Õßµã»÷Á´½Óºó£¬£¬ÏµÍ³»á¼ÓÔØ×·×ÙÏñËØÍ¨Öª¹¥»÷Õߣ¬£¬ËæºóÖØ¶¨ÏòÖÁ¶ÌÁ´½ÓÏÂÔØZIPÎļþ¡£½âѹZIPºó£¬£¬¼Ù×°³ÉHTMLÎĵµµÄHTAÎļþ»áÏÔʾÎÚ¿ËÀ¼Óïµö¶üÐÅÏ¢£¬£¬ÄÚÈÝÉæ¼°±ßÚïͨ³©Ðí¿ÉÉêÇ룬£¬ÒԴ˺ýŪÊܺ¦Õ߸á£Í¬Ê±£¬£¬HTAÎļþͨ¹ý²é³­ÏµÍ³×°ÖÃÈÕÆÚÖ´Ðз´É³Ïä¼ì²â£¬£¬ÈôϵͳװÖò»¼°10ÌìÔòÖÕÖ¹Ö´ÐС£Âú×ãǰÌáºó£¬£¬HTAÎļþÌáÈ¡ÆäËû×é¼þ£¬£¬Í¨¹ý´òË㹤×÷³ÉÁ¢Óƾû¯ÏνÓ£¬£¬²¢ÀûÓÃVBS¾ç±¾´ÓͼÏñÖÐÌáÈ¡ÒþдÓÐÐ§ÔØºÉ£¬£¬×îÖÕ¼ÓÔØBadPaw¼ÓÔØÆ÷¡£BadPaw×÷Ϊ»ùÓÚ.NETµÄ¼ÓÔØÆ÷£¬£¬Ê¹ÓÃ.NET Reactor¼Ó¿ÇÆ÷»ìºÏ´úÂ룬£¬¹ÊÕÏÄæÏò·ÖÎö¡£³ÉÁ¢C2ͨѶºó£¬£¬BadPaw²¿ÊðMeowMeow¸´ÔÓºóÃÅ¡£¸ÃºóÞ߱¸»·¾³¼ì²âÖ°ÄÜ£¬£¬¿ÉɨÃèÐé¹¹»ú¼°Wireshark¡¢¡¢ProcMonµÈ·ÖÎö¹¤¾ß£¬£¬Èô·¢ÏÖɳÏä»·¾³ÔòÁ¢¼´ÖÕ³¡Ö´ÐС£


https://securityaffairs.com/188974/apt/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware.html