LiteSpeed Cache²å¼þÎó²îµ¼ÖÂÊý°ÙÍòWordPressÍøÕ¾ÃæÁÙ±»¿ØÎ£º¦

Ðû²¼Ê±¼ä 2024-08-23
1. LiteSpeed Cache²å¼þÎó²îµ¼ÖÂÊý°ÙÍòWordPressÍøÕ¾ÃæÁÙ±»¿ØÎ£º¦


8ÔÂ21ÈÕ£¬£¬ £¬ £¬£¬£¬£¬LiteSpeed Cache×÷ΪWordPressƽ̨ÉÏÒ»¿î¹ãÊܽӴýµÄÍøÕ¾¼ÓËÙ²å¼þ£¬£¬ £¬ £¬£¬£¬£¬½üÆÚ±»·¢Ã÷±£´æÒ»¸öÑÏÖØÇå¾²Îó²î£¨CVE-2024-28000£©£¬£¬ £¬ £¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý½¨Éè¶ñÒâÖÎÀíÔ±ÕË»§À´¿ØÖÆÊý°ÙÍò¸öÍøÕ¾¡£¡£¡£¸ÃÎó²îÔ´ÓÚLiteSpeed Cache 6.3.0.1¼°ÒÔÉϰ汾ÖÐÓû§Ä£Ä⹦ЧµÄÈõ¹þϣУÑéÎÊÌâ¡£¡£¡£Çå¾²Ñо¿Ô±John BlackbournÓÚ8Ô³õ±¨¸æÁË´ËÎó²î£¬£¬ £¬ £¬£¬£¬£¬LiteSpeedÍŶÓѸËÙÏìÓ¦£¬£¬ £¬ £¬£¬£¬£¬²¢ÓÚ8ÔÂ13ÈÕÐû²¼Á˰üÀ¨ÐÞ¸´²¹¶¡µÄ6.4°æ±¾¡£¡£¡£´ËÎó²îµÄÑÏÖØÐÔÔÚÓÚ£¬£¬ £¬ £¬£¬£¬£¬Ò»µ©ÀÖ³ÉʹÓ㬣¬ £¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ»ñÈ¡ÖÎÀíԱȨÏÞ£¬£¬ £¬ £¬£¬£¬£¬½ø¶ø×°ÖöñÒâ²å¼þ¡¢¸Ä¶¯ÍøÕ¾ÉèÖá¢Öض¨ÏòÁ÷Á¿ÖÁ¶ñÒâÕ¾µã¡¢·Ö·¢¶ñÒâÈí¼þ»òÇÔÈ¡Óû§Êý¾Ý¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬ £¬ £¬£¬£¬£¬Í¨¹ý±©Á¦ÆÆ½â¹þÏ£ÖµµÄ·½·¨£¬£¬ £¬ £¬£¬£¬£¬¹¥»÷ÕßÄܹ»ÔÚ¶Ìʱ¼äÄÚʵÏÖ¶ÔÌØ¶¨Óû§IDµÄÖÎÀíÔ±¼¶»á¼û£¬£¬ £¬ £¬£¬£¬£¬ÓÈÆäµ±Ê¹Óó£¼ûµÄÓû§ID£¨Èç1£©Ê±£¬£¬ £¬ £¬£¬£¬£¬ÀÖ³ÉÂʸü¸ß¡£¡£¡£Ö»¹ÜLiteSpeedÒÑÐû²¼ÐÞ¸´°æ±¾£¬£¬ £¬ £¬£¬£¬£¬µ«¼øÓÚWordPress¹Ù·½²å¼þ¿âÏÂÔØÊý¾ÝÏÔʾ½öÓаëÊýÍøÕ¾¸üУ¬£¬ £¬ £¬£¬£¬£¬Ê£ÓàÁè¼ÝÒ»°ëµÄÓû§ÈÔÃæÁÙΣº¦¡£¡£¡£½¨ÒéËùÓÐʹÓÃLiteSpeed CacheµÄWordPressÍøÕ¾ÖÎÀíÔ±Á¬Ã¦Éý¼¶ÖÁ×îа汾¡£¡£¡£


https://www.bleepingcomputer.com/news/security/litespeed-cache-bug-exposes-millions-of-wordpress-sites-to-takeover-attacks/


2. ÎÚ¿ËÀ¼MonobankÔâ´ó¹æÄ£DDoS¹¥»÷£¬£¬ £¬ £¬£¬£¬£¬¾èǮЧÀͳɺڿÍÄ¿µÄ


8ÔÂ19ÈÕ£¬£¬ £¬ £¬£¬£¬£¬ÎÚ¿ËÀ¼×ÅÃûÍøÉÏÒøÐÐMonobank½üÆÚÔâÊÜÁËØ¨¹ÅδÓеĴó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬ £¬ £¬£¬£¬£¬´Ë´Î¹¥»÷ÓÈÆäÕë¶ÔÆäÓÃÓÚΪÎÚ¿ËÀ¼¾ü¶Ó³ï¼¯¾èÇ®µÄÔÚÏßЧÀÍ¡£¡£¡£´ÓÖÜÎåÍíÖÁÖÜÒ»Ô磬£¬ £¬ £¬£¬£¬£¬¹¥»÷·åÖµµÖ´ïÿÃë75ÒÚ´ÎÇëÇ󣬣¬ £¬ £¬£¬£¬£¬¹æÄ£Òì³£ÖØ´ó£¬£¬ £¬ £¬£¬£¬£¬Ö»¹Üδֱ½ÓÓ°ÏìÒøÐн¹µãÓªÒµÔËÐУ¬£¬ £¬ £¬£¬£¬£¬µ«Í¹ÏÔÁËÇå¾²ÌôÕ½µÄÑÏËàÐÔ¡£¡£¡£MonobankѸËÙÁªºÏÎÚ¿ËÀ¼Çå¾²²¿·Ö¼°ÑÇÂíÑ·ÔÆÐ§ÀÍר¼Ò¾ÙÐзÀÓù£¬£¬ £¬ £¬£¬£¬£¬ÓÐÓûº½âÁ˹¥»÷ѹÁ¦¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬ £¬£¬£¬£¬Monobank½öͨ¹ýÒÆ¶¯Ó¦ÓÃÌṩЧÀÍ£¬£¬ £¬ £¬£¬£¬£¬ÕâÒ»ÌØÕ÷ʹÆä³ÉΪºÚ¿ÍµÄÖØµã¹¥»÷¹¤¾ß¡£¡£¡£´Ëǰ£¬£¬ £¬ £¬£¬£¬£¬¸ÃÒøÐÐÔÚ1ÔÂÒÑÔâÓö¹ýÒ»´ÎDDoS¹¥»÷£¬£¬ £¬ £¬£¬£¬£¬ÈýÈÕÄÚÎüÊÕÁË5.8ÒÚÌõÀ¬»øÇëÇ󡣡£¡£´Ë´Î¹¥»÷Ä¿µÄÃ÷È·£¬£¬ £¬ £¬£¬£¬£¬Ö¼ÔÚÆÆËðÎÚ¿ËÀ¼ÃñÖÚͨ¹ýMonobankƽ̨±ã½ÝµØÎª¾ü¶Ó¾èÇ®µÄÇþµÀ£¬£¬ £¬ £¬£¬£¬£¬¸ÃЧÀÍÔÊÐíÓû§½¨ÉèÐéÄâÇ®°ü²¢Í¨¹ýÉ罻ýÌå·ÖÏí£¬£¬ £¬ £¬£¬£¬£¬¼ò»¯¾èÇ®Á÷³Ì¡£¡£¡£MonobankÊ×ϯִÐйÙOleh HorokhovskyiÖ¸³ö£¬£¬ £¬ £¬£¬£¬£¬ÒÑÍùÈýÄê¼ä£¬£¬ £¬ £¬£¬£¬£¬¸Ãƽ̨һÁ¬Ò»Ö±µÄ¾èÇ®»î¶¯¿ÉÄÜÈÇÄÕÁ˳ðÊÓÊÆÁ¦£¬£¬ £¬ £¬£¬£¬£¬´ÙʹËûÃǽÓÄɼ«¶ËÊÖ¶ÎÊÔͼ̱»¾Ð§ÀÍ¡£¡£¡£Ö»¹ÜÒøÐÐÌåÏÖ¶íÂÞ˹¿ÉÄÜΪ´Ë´Î¹¥»÷µÄÄ»ºó²ß»®Õߣ¬£¬ £¬ £¬£¬£¬£¬µ«²¢Î´¹ûÕæÏêϸ֤¾Ý¡£¡£¡£HorokhovskyiÇ¿µ÷£¬£¬ £¬ £¬£¬£¬£¬MonobankÒѳÉΪÎÚ¿ËÀ¼ITÁìÓòÔâÊÜ×îÑÏÖØ¹¥»÷µÄÄ¿µÄÖ®Ò»¡£¡£¡£


https://therecord.media/ukraine-monobank-ddos-attack-donations


3. ÒÁÀÊAPT×éÖ¯GreenCharlie¶ÔÃÀ¹úÕþÖÎÔ˶¯Ìá³«ÍøÂç¹¥»÷


8ÔÂ21ÈÕ£¬£¬ £¬ £¬£¬£¬£¬Insikt Group×îÐÂÐû²¼µÄ±¨¸æÕ¹ÏÖÁËÒÁÀÊÖ§³ÖµÄ¸ß¼¶Ò»Á¬ÐÔÍþв×éÖ¯GreenCharlieµÄÒþÃØÐж¯£¬£¬ £¬ £¬£¬£¬£¬¸Ã×éÖ¯±»Ö¸ÓëÕë¶ÔÃÀ¹úÕþÖÎÔ˶¯µÄÍøÂç¹¥»÷Ïà¹ØÁª£¬£¬ £¬ £¬£¬£¬£¬ÇÒÊÜÒÁÀʸïÃüÎÀ¶ÓÇ鱨×éÖ¯(IRGC-IO)Ö¸»Ó¡£¡£¡£×Ô2024Äê5ÔÂÆð£¬£¬ £¬ £¬£¬£¬£¬GreenCharlie¹¹½¨²¢À©´óÁËÆä¶ñÒâ»ù´¡ÉèÊ©ÍøÂ磬£¬ £¬ £¬£¬£¬£¬Õë¶ÔÕþ¸®¹ÙÔ±¡¢Íâ½»¹ÙµÈ¸ß¼ÛֵĿµÄʵÑéÍøÂçÌØ¹¤»î¶¯¡£¡£¡£Æä»ù´¡ÉèʩʹÓö¯Ì¬DNSЧÀͺͶàÖÖ¶¥¼¶ÓòÃû£¬£¬ £¬ £¬£¬£¬£¬Ôö½øÍøÂç´¹ÂںͶñÒâÈí¼þÈö²¥¡£¡£¡£±¨¸æÇ¿µ÷£¬£¬ £¬ £¬£¬£¬£¬GreenCharlieÔËÓðüÀ¨GORBLE¡¢POWERSTARºÍNokNokÔÚÄÚµÄÖØ´ó¶ñÒâÈí¼þ¼Ò×壬£¬ £¬ £¬£¬£¬£¬Í¨¹ýÓã²æÊ½ÍøÂç´¹ÂÚÊÖ¶ÎÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬ £¬ £¬£¬£¬£¬ÕâЩ¶ñÒâÈí¼þ¼Ò×å¼ä±£´æÏÔÖø´úÂëÖØµþ£¬£¬ £¬ £¬£¬£¬£¬ÏÔʾÆä±äÖÖ¼äµÄϸÃÜÁªÏµ¡£¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬£¬£¬GreenCharlieƵÈÔʹÓÃÒÁÀÊIPµØµãÓë»ù´¡ÉèʩͨѶ£¬£¬ £¬ £¬£¬£¬£¬½øÒ»²½Ö¤ÊµÁËÆäÓëÒÁÀʵÄϸÃÜÁªÏµ¼°Çé±¨ÍøÂçÕ½ÂÔ¡£¡£¡£ÎªÑÚÊλ£¬£¬ £¬ £¬£¬£¬£¬GreenCharlie»¹½ÓÄÉÁ˰üÀ¨ProtonVPNºÍProtonMailÔÚÄڵļÓÃÜЧÀÍ£¬£¬ £¬ £¬£¬£¬£¬ÕâÊÇÒÁÀÊAPTÕûÌåµÄϰÓÃÊÖ·¨¡£¡£¡£ÆäÍøÂç´¹ÂÚ²Ù×÷¼«Æä½ÆÕ©£¬£¬ £¬ £¬£¬£¬£¬Í¨¹ýαÔìÕýµ±Ð§ÀÍÓòÃûÓÕÆ­Êܺ¦Õß¡£¡£¡£Ç¿ÁÒ½¨Òé¼ÓÈëÕþÖÎÔ˶¯µÄ×éÖ¯£¬£¬ £¬ £¬£¬£¬£¬ÓÈÆäÊÇÃÀ¹úµÄÏà¹Ø×éÖ¯Ìá¸ßСÐÄ¡£¡£¡£


https://securityonline.info/iranian-apt-greencharlie-escalates-threats-against-us-political-targets-using-gorble-and-powerstar-malware/


4. ʯÓ;ÞÍ·HalliburtonÔâÊÜ»ùÓÚÔÆµÄÍøÂç¹¥»÷


8ÔÂ21ÈÕ£¬£¬ £¬ £¬£¬£¬£¬È«ÇòµÚ¶þ´óÓÍÌïЧÀ͹«Ë¾HalliburtonÈ·ÈÏÔâÊÜÁËÍøÂç¹¥»÷£¬£¬ £¬ £¬£¬£¬£¬¸ÃÊÂÎñÒÑ´Ùʹ¹«Ë¾½ôÆÈָʾԱ¹¤ÖÜÈ«¶Ï¿ªÓëÄÚ²¿ÍøÂçµÄÅþÁ¬£¬£¬ £¬ £¬£¬£¬£¬ÒÔ±ÜÃâDZÔÚµÄÊý¾Ýй¶»òϵͳË𺦡£¡£¡£¹«Ë¾½²»°ÈËѸËÙ»ØÓ¦£¬£¬ £¬ £¬£¬£¬£¬ÌåÏÖÒѲì¾õµ½ÏµÍ³ÊÜÓ°ÏìµÄ״̬£¬£¬ £¬ £¬£¬£¬£¬²¢ÕýÈ«Á¦ÆÀ¹À¹¥»÷µÄÔµ¹ÊÔ­Óɼ°¿ÉÄÜ´øÀ´µÄЧ¹û¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎΣ»£»£»£»£»£»ú£¬£¬ £¬ £¬£¬£¬£¬Halliburton¼¤»îÁ˼ȶ¨µÄÓ¦¼±ÍýÏ룬£¬ £¬ £¬£¬£¬£¬ÆäITÍŶÓÕýÆð¾¢Ð­Í¬Íⲿ¶¥¼âר¼ÒÅäºÏ´¦Öóͷ£ÕâÒ»ÎÊÌâ¡£¡£¡£×÷ΪӪҵ±é²¼70¸ö¹ú¼Ò¡¢ÓµÓг¬4ÍòÃû¹ú¼ÊÔ±¹¤µÄÐÐÒµ¾ÞÍ·£¬£¬ £¬ £¬£¬£¬£¬HalliburtonÔÚÄÜԴЧÀÍÁìÓòÊÎÑÝמÙ×ãÇáÖØµÄ½ÇÉ«£¬£¬ £¬ £¬£¬£¬£¬Ìṩ´ÓÊÖÒÕЧÀÍ¡¢×°±¸¹©Ó¦µ½×ê¾®¡¢Á¶Óͼ°Ë®Á¦Ñ¹ÁÑ×÷ÒµµÄÈ«Á´ÌõЧÀÍ¡£¡£¡£´Ë´Î¹¥»÷²»µ«Ó°ÏìÁËÆäλÓÚÃÀ¹úÐÝ˹¶Ù¼°µÏ°ÝÁ½´ó×ܲ¿µÄÔËÓª£¬£¬ £¬ £¬£¬£¬£¬»¹²¨¼°ÁËÈ«Çò¹æÄ£ÄڵIJ¿·ÖÓªÒµÍøÂç¡£¡£¡£É罻ýÌåÉÏ£¬£¬ £¬ £¬£¬£¬£¬ÓйØHalliburtonÔâÊÜÔÆÇå¾²¹¥»÷µÄÐÂÎÅѸËÙÈö²¥£¬£¬ £¬ £¬£¬£¬£¬Ò»Ð©Ì¸ÂÛÕßµ£ÐĵØÖ¸³ö£¬£¬ £¬ £¬£¬£¬£¬Ì«¹ýÒÀÀµÔÆÅÌËã¿ÉÄܼӾçÁË´Ë´ÎÊÂÎñµÄÑÏÖØÐÔ¡£¡£¡£ÏÖÔÚÉÐÎÞÈκÎÍøÂç·¸·¨×éÖ¯Õ¾³öÀ´Éù³Æ¶ÔHalliburtonÔâÊܵÄÏ®»÷ÈÏÕæ¡£¡£¡£


https://cybernews.com/news/halliburton-oil-cyberattack-cloud-fuel-supply/


5. PG_MEM¶ñÒâÈí¼þʹÓÃPostgreSQLÈõÃÜÂ뱩Á¦ÆÆ½âÍÚ¾ò¼ÓÃÜÇ®±Ò


8ÔÂ22ÈÕ£¬£¬ £¬ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷ÁËÒ»ÖÖÐÂÐͶñÒâÈí¼þPG_MEM£¬£¬ £¬ £¬£¬£¬£¬ËüÕë¶ÔPostgreSQLÊý¾Ý¿âÌᳫ±©Á¦ÆÆ½â¹¥»÷£¬£¬ £¬ £¬£¬£¬£¬Ö¼ÔÚÍÚ¾ò¼ÓÃÜÇ®±Ò¡£¡£¡£AquaÇå¾²¹«Ë¾µÄAssaf MoragÖ¸³ö£¬£¬ £¬ £¬£¬£¬£¬¹¥»÷Õßͨ¹ýһֱʵÑéÈõÃÜÂëÒÔ»ñÈ¡Êý¾Ý¿â»á¼ûȨÏÞ£¬£¬ £¬ £¬£¬£¬£¬²¢Ê¹ÓÃPostgreSQLµÄ¡°COPY ... FROM PROGRAM¡±¹¦Ð§Ö´ÐÐí§ÒâshellÏÂÁ£¬ £¬ £¬£¬£¬£¬½ø¶øÖ´ÐÐÊý¾ÝÇÔÈ¡¡¢°²ÅŶñÒâÈí¼þµÈ¶ñÒâ»î¶¯¡£¡£¡£¹¥»÷Á´ÖУ¬£¬ £¬ £¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈÕë¶Ô¹ýʧÉèÖõÄPostgreSQLÊý¾Ý¿â½¨ÉèÖÎÀíÔ±½ÇÉ«£¬£¬ £¬ £¬£¬£¬£¬²¢Ê¹ÓÃPROGRAM¹¦Ð§ÔËÐÐshellÏÂÁî¡£¡£¡£µ½Êֺ󣬣¬ £¬ £¬£¬£¬£¬ËûÃDz»µ«°þ¶áÁË¡°postgres¡±Óû§µÄ³¬µÈÓû§È¨ÏÞ£¬£¬ £¬ £¬£¬£¬£¬»¹Í¨¹ýÔ¶³ÌЧÀÍÆ÷Ͷ·ÅPG_MEMºÍPG_COREÁ½¸öÔØºÉ£¬£¬ £¬ £¬£¬£¬£¬ÕâÐ©ÔØºÉÄÜÖÕÖ¹¾ºÕùÍÚ¿óÀú³Ì¡¢ÉèÖó¤ÆÚÐÔ£¬£¬ £¬ £¬£¬£¬£¬²¢×îÖÕ°²ÅÅMonero¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£´Ë¹¥»÷µÄ½¹µãÔÚÓÚʹÓÃÁËPostgreSQLµÄCOPYÏÂÁî¼°ÆäPROGRAM²ÎÊý£¬£¬ £¬ £¬£¬£¬£¬ÔÊÐíЧÀÍÆ÷Ö´ÐÐÍâÊÖÏÂÁî²¢½«Ð§¹ûµ¼ÈëÊý¾Ý¿â¡£¡£¡£Ö»¹Ü¼ÓÃÜÇ®±ÒÍÚ¾òÊÇÆäÖ÷ҪĿµÄ£¬£¬ £¬ £¬£¬£¬£¬µ«¹¥»÷ÕßͬÑùÄÜÖ´ÐÐÏÂÁî¡¢»á¼ûÊý¾Ý²¢¿ØÖÆÊÜѬȾЧÀÍÆ÷¡£¡£¡£´ËÇå¾²Íþв͹ÏÔÁË»¥ÁªÍøÅþÁ¬PostgreSQLÊý¾Ý¿âÒòÈõÃÜÂë¶øÃæÁÙµÄÖØ´óΣº¦£¬£¬ £¬ £¬£¬£¬£¬ÕâÍùÍùÔ´ÓÚÉèÖò»µ±ºÍÉí·ÝÈÏÖ¤¿ØÖƵÄȱʧ¡£¡£¡£


https://thehackernews.com/2024/08/new-malware-pgmem-targets-postgresql.html


6. Tycoon 2FAÍøÂç´¹ÂÚÕë¶ÔÃÀ¹úÕþ¸®×éÖ¯


8ÔÂ22ÈÕ£¬£¬ £¬ £¬£¬£¬£¬ANY.RUNµÄÑо¿Ö°Ô±½ÒÆÆÁËÒ»ÏîеÄÍøÂç´¹Âڻ£¬£¬ £¬ £¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃTycoon 2FA¹¤¾ß°ü£¬£¬ £¬ £¬£¬£¬£¬Õë¶ÔÃÀ¹úÕþ¸®×éÖ¯Õö¿ª¹¥»÷¡£¡£¡£Tycoon 2FA×Ô2023ÄêÆð±ãƵÈÔ±»ÓÃÓÚ´¹Âڻ£¬£¬ £¬ £¬£¬£¬£¬ÒÔÆäÖØ´óÕ½ÂԺͶ๦ЧÐÔÖø³Æ¡£¡£¡£×î½ü£¬£¬ £¬ £¬£¬£¬£¬¹¥»÷Õßͨ¹ýÊÜѬȾµÄÑÇÂíÑ·SESÕË»§£¬£¬ £¬ £¬£¬£¬£¬·¢ËÍαװ³ÉDocusignµÄÓʼþ£¬£¬ £¬ £¬£¬£¬£¬ÓÕµ¼ÊÕ¼þÈ˵ã»÷Á´½Ó£¬£¬ £¬ £¬£¬£¬£¬ÂÄÀúһϵÁÐÖØ¶¨Ïòºó£¬£¬ £¬ £¬£¬£¬£¬×îÖÕµÖ´ïð³äµÄMicrosoft TeamsµÇÂ¼Ò³Ãæ¡£¡£¡£ÕâЩÓʼþÌØÊâÕë¶Ô.govÓòÄÚµÄ338¸öÕþ¸®×éÖ¯µÄÓÊÏ䣬£¬ £¬ £¬£¬£¬£¬ÏÔʾ³ö¸ß¶ÈµÄÄ¿µÄÑ¡ÔñÐÔ¡£¡£¡£ÔÚANY.RUNɳÏäÖÐÆÊÎöÏÔʾ£¬£¬ £¬ £¬£¬£¬£¬´¹ÂÚÁ´½Ó½«Êܺ¦ÕßÖ¸µ¼ÖÁMSOFT_DOCUSIGN_VERIFICATION_SECURED-DOC_OFFICE[.]zatrdg[.]comµÈÓòÃû£¬£¬ £¬ £¬£¬£¬£¬ÒªÇóÊäÈëµç×ÓÓʼþµØµã¡£¡£¡£ÈôµØµãÆ¥Åä¹¥»÷ÕßÁбí£¬£¬ £¬ £¬£¬£¬£¬Êܺ¦Õß½«±»½øÒ»²½Öض¨ÏòÖÁdonostain[.]com£¬£¬ £¬ £¬£¬£¬£¬¸ÃÓòͨ¹ýAES¼ÓÃܵĶಿ·ÖPOSTÇëÇóʵÑéÇÔÈ¡MicrosoftÕË»§ÃÜÂë¡£¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬£¬£¬vereares[.]ruÓòÃû×÷Ϊ¹¥»÷ÕßµÄÖØ¶¨Ïò¹¤¾ß£¬£¬ £¬ £¬£¬£¬£¬ÔöÇ¿ÁË´¹Âڼƻ®µÄÎÞаÐÔ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬ £¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËÕýµ±Ð§ÀÍÈçmailmeteor[.]comÀ´ÔöÇ¿´¹ÂÚÒ³ÃæµÄ¿ÉÐŶÈ£¬£¬ £¬ £¬£¬£¬£¬²¢Í¨¹ýjsonip[.]com»ñÈ¡IPÐÅÏ¢¡£¡£¡£


https://securityonline.info/new-phishing-campaign-targets-us-government-organizations/