Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2026-02-04

1. Punishing Owl¶Ô¶íÌᳫÊÖÒÕÖØ´óÍøÂç¹¥»÷


2ÔÂ2ÈÕ£¬£¬£¬ £¬£¬£¬ºÚ¿Í×éÖ¯Punishing OwlÓÚ2025Äê12ÔÂ12ÈÕÊ״ιûÕæ»î¶¯£¬£¬£¬ £¬£¬£¬¶Ô¶íÂÞ˹Õþ¸®Çå¾²»ú¹¹ÌᳫÊÖÒÕÖØ´óµÄÍøÂç¹¥»÷¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÈëÇÖÄ¿µÄÍøÂçÇÔÈ¡ÄÚ²¿Îļþ£¬£¬£¬ £¬£¬£¬²¢½«ÆäÐû²¼ÖÁÊý¾Ýй¶ƽ̨£¬£¬£¬ £¬£¬£¬Í¬Ê±ÔÚMega.nz´æ´¢¿ÍÕ»±¸·ÝÎļþ£¬£¬£¬ £¬£¬£¬ÒÔ×î´ó»¯ÆØ¹â¶È¡£¡£¡£¡£ÎªÍÏÑÓÊܺ¦ÕßÏìÓ¦²¢À©´óÓ°Ï죬£¬£¬ £¬£¬£¬¹¥»÷ÕßÌØÒâÑ¡ÔñÖÜÎåÍí6µã37·ÖÕâÒ»·ÇÊÂÇéʱ¶ÎÐû²¼ÈëÇÖÊÂÎñ¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬ £¬£¬£¬Punishing Owl¿ØÖÆÁËÊܺ¦»ú¹¹µÄDNSÉèÖ㬣¬£¬ £¬£¬£¬½¨Éè×ÓÓòÃû²¢½«Á÷Á¿Ð®ÖÆÖÁλÓÚ°ÍÎ÷µÄЧÀÍÆ÷¡£¡£¡£¡£¸ÃЧÀÍÆ÷²»µ«ÍйÜÁËÇÔÈ¡µÄÎļþ£¬£¬£¬ £¬£¬£¬»¹¸½´øÁËÒ»·ÝÐðÊö¹¥»÷ÄîÍ·µÄÕþÖÎÉùÃ÷¡£¡£¡£¡£Ëæºó£¬£¬£¬ £¬£¬£¬¸Ã×éÖ¯½øÒ»²½¶ÔÊܺ¦»ú¹¹µÄÏàÖúͬ°éÓë³Ð°üÉÌÌᳫÉÌÒµµç×ÓÓʼþڲƭ£¨BEC£©¹¥»÷£¬£¬£¬ £¬£¬£¬Ê¹ÓÃαÔìµÄ·¢¼þµØµã·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬ £¬£¬£¬»Ñ³ÆÊÇÍøÂçÈëÇÖÊÂÎñµÄºËʵ֪ͨ£¬£¬£¬ £¬£¬£¬²¢±Þ²ßÊÕ¼þÈËÉó²é¸½¼þÎĵµ¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬ £¬£¬£¬Punishing OwlÕ¹ÏÖ³ö¸ßË®×¼µÄ¹¥»÷ÄÜÁ¦¡£¡£¡£¡£ÆäÉèÖÃÁËαÔìµÄTLSÖ¤Ê飬£¬£¬ £¬£¬£¬´î½¨ÁËÓÃÓÚÓʼþÊÕ·¢µÄIMAPºÍSMTPЧÀÍ£¬£¬£¬ £¬£¬£¬²¢°²ÅÅÁËÃûΪZipWhisperµÄPowerShellÇÔÃÜľÂí£¬£¬£¬ £¬£¬£¬ÓÃÓÚ͵ȡÊÜѬȾϵͳµÄä¯ÀÀÆ÷ƾ֤¡£¡£¡£¡£


https://cybersecuritynews.com/new-punishing-owl-hacker-group-targeting-networks/


2. DynoWiper¶ñÒâÈí¼þ¹¥»÷²¨À¼ÄÜÔ´ÆóÒµ


2ÔÂ2ÈÕ£¬£¬£¬ £¬£¬£¬Ò»¿îÃûΪDynoWiperµÄÐÂÐ͸ßΣÊý¾Ý²Á³ý¶ñÒâÈí¼þÊ״α»·¢Ã÷£¬£¬£¬ £¬£¬£¬Õý¶Ô²¨À¼ÄÜÔ´ÆóÒµÌá³«ÆÆËðÐÔ¹¥»÷£¬£¬£¬ £¬£¬£¬Æä½¹µãÄ¿µÄ²¢·ÇÀÕË÷Ç®²Æ£¬£¬£¬ £¬£¬£¬¶øÊÇÓÀÊÀɨ³ýÒªº¦Êý¾Ý²¢µ¼ÖÂϵͳ̱»¾¡£¡£¡£¡£ÓëͨÀýÀÕË÷Èí¼þ²î±ð£¬£¬£¬ £¬£¬£¬DynoWiperͨ¹ýÈý½×¶Î´Ý»ÙÁ÷³ÌʵÏÖÆÆË𣺵ÚÒ»½×¶ÎµÝ¹éËÑË÷ËùÓÐÀο¿¼°¿ÉÒÆ¶¯Çý¶¯Æ÷ÉϵÄÎļþ£¬£¬£¬ £¬£¬£¬±Ü¿ªÒªº¦ÏµÍ³Ä¿Â¼ÒÔά³Ö»ù±¾ÔËÐУ»£»£»£»£»£»£»µÚ¶þ½×¶ÎʹÓÃ16×Ö½ÚËæ»úÊý¾Ý»º³åÇø¸²Ð´ÎļþÄÚÈÝ£¬£¬£¬ £¬£¬£¬Ð¡ÓÚ16×Ö½ÚµÄÎļþ±»ÍêÈ«ÁýÕÖ£¬£¬£¬ £¬£¬£¬´óÓÚ16×Ö½ÚµÄÔò²¿·ÖÆÆË𣬣¬£¬ £¬£¬£¬ÒÔ´ËÌáÉý´Ý»ÙЧÂÊ£»£»£»£»£»£»£»µÚÈý½×¶Îͨ¹ýÏµÍ³ÖØÆô»òÖ±½ÓÖÕÖ¹Àú³ÌʹÊÜѬȾװ±¸ÎÞ·¨Æô¶¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ±£´æ¶à¸ö±äÖÖ£¬£¬£¬ £¬£¬£¬¾ùÓÚ2025Äê12ÔÂ29ÈÕͶ·Å¡£¡£¡£¡£¹¥»÷ÕßÔÚÊ×´ÎÖ´ÐÐʧ°Üºó¶à´ÎÐ޸ĴúÂëÒÔÈÆ¹ýÇå¾²·À»¤£¬£¬£¬ £¬£¬£¬µ«ÆóÒµ°²ÅŵÄÖն˼ì²âÓëÏìÓ¦¹¤¾ßÀÖ³É×èµ²ÁËÆäÖ´ÐУ¬£¬£¬ £¬£¬£¬´ó·ù½µµÍËðʧ¡£¡£¡£¡£WelivesecurityÆÊÎöʦָ³ö£¬£¬£¬ £¬£¬£¬DynoWiperÓëÕë¶ÔÎÚ¿ËÀ¼µÄÒÑÖª²Á³ý¶ñÒâÈí¼þZOV±£´æÏÔÖøÏàËÆÐÔ£¬£¬£¬ £¬£¬£¬Æä¹éÒòÓÚÓë¶íÂÞ˹¹ØÁªµÄSandworm×éÖ¯¡£¡£¡£¡£


https://cybersecuritynews.com/dynowiper-data-wiping-malware/


3. Coinbase֤ʵÄÚ²¿Ö°Ô±Êý¾Ýй¶


2ÔÂ3ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹ú¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÈ·Èϱ¬·¢Ò»ÆðÄÚ²¿Ö°Ô±Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¾Ý¹«Ë¾½²»°ÈËÅû¶£¬£¬£¬ £¬£¬£¬2025Äê12Ô£¬£¬£¬ £¬£¬£¬Ò»Ãû³Ð°üÉ̲»µ±»á¼ûÔ¼30Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬ £¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢KYCÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üÓà¶î¼°ÉúÒâ¼Í¼¡£¡£¡£¡£¸Ã³Ð°üÉÌÒѱ»ÖÕÖ¹ÏàÖú£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìÓû§ÒÑ»ñÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤Ð§Àͼ°Ö¸µ¼£¬£¬£¬ £¬£¬£¬ÊÂÎñͬ²½Éϱ¨î¿Ïµ»ú¹¹¡£¡£¡£¡£ÍþвÐÐΪÕß¡°Shiny Lapsus Hunters¡±Ôø¶ÌÔÝÔÚTelegramÐû²¼CoinbaseÄÚ²¿Ö§³Ö½çÃæ½ØÍ¼ºóɾ³ý£¬£¬£¬ £¬£¬£¬½ØÍ¼ÏÔʾ¿É»á¼û¿Í»§Ãô¸ÐÊý¾Ý¡£¡£¡£¡£Ö»¹ÜÎÞ·¨È·ÈϸÃ×éÖ¯ÊÇ·ñÖ±½Ó¹ØÁªÄÚ²¿Ö°Ô±ÈëÇÖ£¬£¬£¬ £¬£¬£¬µ«ÀàËÆÊÖ·¨ÔÚÆäËû¹¥»÷ÖÐÆµÏÖ£¬£¬£¬ £¬£¬£¬ÈçÍþвÐÐΪÕßÔøÐлßCrowdStrikeÄÚ²¿Ö°Ô±»ñÈ¡½ØÍ¼£¬£¬£¬ £¬£¬£¬»òͨ¹ýÉç½»¹¤³Ìð³äÔ±¹¤Æ­È¡BPOÖ§³ÖÖ°Ô±ÊÚȨ»á¼ûȨÏÞ¡£¡£¡£¡£BPO¹«Ë¾Òò³Ð½Ó¿Í»§Ö§³Ö¡¢Éí·ÝÑéÖ¤¡¢ITЧÀ͵ÈÔËӪʹÃü£¬£¬£¬ £¬£¬£¬ÆäÔ±¹¤³£½Ó´¥ÆóÒµ½¹µãϵͳÓë¿Í»§Êý¾Ý£¬£¬£¬ £¬£¬£¬³ÉΪ¹¥»÷Õ߸߼ÛֵĿµÄ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/


4. Step FinanceÔâºÚ¿Í¹¥»÷ÖÂ4000ÍòÃÀÔª×ʲúËðʧ


2ÔÂ3ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹ú¼ÓÃÜÇ®±Òƽ̨Step FinanceÓÚ2025Äê1ÔÂ31ÈÕ¼ì²âµ½Çå¾²Îó²î£¬£¬£¬ £¬£¬£¬¾­ÊÓ²ìÈ·ÈÏÒò¸ß¹Ü×°±¸ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬£¬µ¼Ö¼ÛÖµÔ¼4000ÍòÃÀÔªµÄÊý×Ö×ʲú±»µÁ¡£¡£¡£¡£¸Ãƽ̨ÊÇ»ùÓÚSolanaÇø¿éÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Æ½Ì¨¼°ÆÊÎö¹¤¾ß£¬£¬£¬ £¬£¬£¬Ö§³ÖÓû§×ʲú¿ÉÊÓ»¯¡¢ÉúÒâ¡¢ÖÊѺµÈ²Ù×÷£¬£¬£¬ £¬£¬£¬²¢ÓµÓÐÔ­Éú´ú±Ò$STEP£¬£¬£¬ £¬£¬£¬µ«ÉúÒâÁ¿Ïà¶Ô½ÏС¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬ £¬£¬£¬Step FinanceѸËÙÔ¼ÇëÍøÂçÇ徲ר¼ÒЭÖú×·»Ø×ʲú¡£¡£¡£¡£Çø¿éÁ´ÆÊÎö¹«Ë¾CertiKÆðÔ´±¨¸æÏÔʾ£¬£¬£¬ £¬£¬£¬±»µÁ×ʲú°üÀ¨261,854 SOL£¨Ô¼2890ÍòÃÀÔª£©£¬£¬£¬ £¬£¬£¬µ«Æ½Ì¨×îÖÕºËʵ×ÜËðʧԼ4000ÍòÃÀÔª¡£¡£¡£¡£Í¨¹ýToken22±£»£»£»£»£»£»£»¤²½·¥¼°ÏàÖúͬ°éЭµ÷£¬£¬£¬ £¬£¬£¬ÏÖÔÚÒÑ×·»ØÔ¼370ÍòÃÀÔªRemora×ʲú¼°100ÍòÃÀÔªÆäËûÍ·´ç£¬£¬£¬ £¬£¬£¬ºÏ¼Æ470ÍòÃÀÔª¡£¡£¡£¡£ÎªÔöÇ¿Çå¾²·À»¤£¬£¬£¬ £¬£¬£¬Æ½Ì¨ÒÑÔÝÍ£²¿·ÖÓªÒµÔËÓª£¬£¬£¬ £¬£¬£¬²¢Ç¿µ÷ÆäÆìÏÂRemora MarketsδÊÜÓ°Ï죬£¬£¬ £¬£¬£¬ËùÓÐrTokenÈÔ¼á³Ö1:1ÍêÈ«´¢±¸¡£¡£¡£¡£Step Finance½¨ÒéÓû§ÔÚÊӲ쿢ÊÂǰÔÝͣʹÓÃSTEP´ú±Ò£¬£¬£¬ £¬£¬£¬²¢ÔÊÐí½«¶Ô¹¥»÷ǰ״̬¾ÙÐпìÕÕ£¬£¬£¬ £¬£¬£¬Öƶ©Õë¶Ô³ÖÓÐÕߵĽâ¾ö¼Æ»®¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/


5. Citrix NetScalerÔâ6.3ÍòIPЭͬÕì̽


2ÔÂ3ÈÕ£¬£¬£¬ £¬£¬£¬Íþв¼à¿ØÆ½Ì¨GreyNoiseÊӲ쵽Õë¶ÔCitrix NetScaler»ù´¡ÉèÊ©µÄЭͬÕì̽Ðж¯£¬£¬£¬ £¬£¬£¬¸ÃÐж¯Ê¹Óó¬6.3Íò¸ö×ÔÁ¦IPµØµãÌᳫ111,834¸ö»á»°£¬£¬£¬ £¬£¬£¬ÆäÖÐ79%Á÷Á¿Ö¸ÏòCitrix GatewayÃÛ¹Þ£¬£¬£¬ £¬£¬£¬64%À´×Ôαװ³ÉÕýµ±ÏûºÄÕßISPµØµãµÄסլÊðÀí£¬£¬£¬ £¬£¬£¬Ê£Óà36%Ô´×ÔͳһAzure IPµØµã¡£¡£¡£¡£GreyNoiseÖ¸³ö£¬£¬£¬ £¬£¬£¬´Ë´Î»î¶¯²¢·ÇËæ»ú»¥ÁªÍøÉ¨Ã裬£¬£¬ £¬£¬£¬¶øÊÇÓÐ×éÖ¯µÄ»ù´¡ÉèÊ©²â»æ£¬£¬£¬ £¬£¬£¬Ö¼ÔÚÈëÇÖǰʶ±ð̻¶µÄCitrixµÇÂ¼Ãæ°å¼°²úÆ·°æ±¾¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÁ½¸ö½¹µãÖ¸±ê̻¶¶ñÒâÒâͼ£ºÆäÒ»£¬£¬£¬ £¬£¬£¬63,189¸öIPÌìÉú109,942¸ö»á»°£¬£¬£¬ £¬£¬£¬¼¯ÖÐɨÃè¡°/logon/LogonPoint/index.html¡±Éí·ÝÑéÖ¤½çÃæ£¬£¬£¬ £¬£¬£¬´ó¹æÄ£Ê¶±ð̻¶µÄµÇÂ¼Ãæ°å£»£»£»£»£»£»£»Æä¶þ£¬£¬£¬ £¬£¬£¬2ÔÂ1ÈÕ10¸öIPÔÚ6СʱÄÚÆô¶¯1,892¸ö»á»°£¬£¬£¬ £¬£¬£¬¾Û½¹URL·¾¶¡°/epa/scripts/win/nsepa_setup.exe¡±£¬£¬£¬ £¬£¬£¬Í¨¹ýEPA¹¤¼þö¾ÙCitrix°æ±¾¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ2016ÄêÍ·Ðû²¼µÄChrome 50Óû§ÊðÀí£¬£¬£¬ £¬£¬£¬Õë¶ÔEPA×°ÖÃÎļþ·¾¶µÄÌØ¶¨¹¥»÷Åú×¢ÆäÕý¿ª·¢Ìض¨°æ±¾Îó²îʹÓóÌÐò»òÑéÖ¤ÒÑÖªCitrix ADCÎó²î¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/


6. CISA½ôÆÈת´ïSolarWindsЧÀĮ́Îó²î


2ÔÂ3ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SolarWinds Web Help DeskµÄÑÏÖØÎó²îCVE-2025-40551±ê¼ÇΪ"ÕýÔÚÔâÊܹ¥»÷"£¬£¬£¬ £¬£¬£¬²¢ÒÀ¾Ý2021ÄêÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD 22-01£©£¬£¬£¬ £¬£¬£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚÈýÌìÄÚÍê³ÉϵͳÐÞ²¹¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Jimi Sebree·¢Ã÷£¬£¬£¬ £¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈεÄÊý¾Ý·´ÐòÁл¯Èõµã£¬£¬£¬ £¬£¬£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬ £¬£¬£¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔËÐжñÒâÏÂÁî¡£¡£¡£¡£SolarWindsÓÚ1ÔÂ28ÈÕÐû²¼Web Help Desk 2026.1°æ±¾ÐÞ¸´´ËÎó²î£¬£¬£¬ £¬£¬£¬Í¬Ê±Ò»²¢ÐÞ¸´ÁËSebree·¢Ã÷µÄÓ²±àÂëÆ¾Ö¤¸ßΣÎó²î£¨CVE-2025-40537£©¼°watchTowrµÄPiotr Bazydlo±¨¸æµÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-40552¡¢CVE-2025-40554£©£¬£¬£¬ £¬£¬£¬ËùÓÐÎó²î¾ùÖ§³ÖÔ¶³ÌʹÓᣡ£¡£¡£CISAÇ¿µ÷£¬£¬£¬ £¬£¬£¬Ö»¹ÜBOD 22-01½öÕë´ºÁª°î»ú¹¹£¬£¬£¬ £¬£¬£¬µ«Ë½Óª²¿·ÖÒ²Ó¦¾¡¿ìÐÞ²¹ÒÔµÖÓùÒ»Á¬¹¥»÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited/