¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷
Ðû²¼Ê±¼ä 2025-11-061. ¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷
11ÔÂ4ÈÕ£¬£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯Curly COMrades±»ÆØ×Ô2024ÄêÄêÖÐÆð»îÔ¾£¬£¬£¬£¬Æä»î¶¯Óë¶íÂÞ˹µØÔµÕþÖÎÀûÒæÇ×½üÏà¹Ø¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÀÄÓÃWindowsרҵ°æ/ÆóÒµ°æ¼°Windows ServerÖеÄMicrosoft Hyper-VÐéÄ⻯ÊÖÒÕ£¬£¬£¬£¬½¨ÉèÒþ²ØµÄ»ùÓÚAlpine LinuxµÄÇáÁ¿¼¶ÐéÄâ»ú£¨½öÕ¼ÓÃ120MB´ÅÅ̿ռäºÍ256MBÄڴ棩ÔËÐжñÒâÈí¼þ£¬£¬£¬£¬ÀÖ³ÉÈÆ¹ý¹Å°å»ùÓÚÖ÷»úµÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¼Æ»®¡£¡£¡£¡£¡£ÐéÄâ»úÄÚÍйÜÁË×Ô½ç˵¹¤¾ßCurlyShell·´ÏòshellºÍCurlCat·´ÏòÊðÀí£ºÇ°Õßͨ¹ýcron×÷Òµ¼á³Ö³¤ÆÚ»¯£¬£¬£¬£¬ÒÔÎÞͷģʽÔËÐв¢Í¨¹ýHTTPSÅþÁ¬C2ЧÀÍÆ÷Ö´ÐÐÏÂÁ£»£»£»£»ºóÕß×÷ΪSOCKSÊðÀí·â×°SSHÁ÷Á¿ÎªHTTPSÇëÇ󣬣¬£¬£¬ÊµÏÖÒþ²ØËíµÀ´«Ê䣬£¬£¬£¬Ê¹¶ñÒâÁ÷Á¿Î±×°³ÉÕýµ±Ö÷»úIPµØµã¡£¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬£¬ÍþвÐÐΪÕßÊ×ÏÈÔ¶³Ì»á¼ûÊܺ¦Õßϵͳ£¬£¬£¬£¬ÆôÓÃHyper-V²¢½ûÓÃÆäÖÎÀí½çÃæ£¬£¬£¬£¬°²ÅÅ»ùÓÚAlpine LinuxµÄ¼«¼òÐéÄâ»ú¡£¡£¡£¡£¡£BitdefenderÓë¸ñ³¼ªÑÇCERTÏàÖúÊӲ췢Ã÷£¬£¬£¬£¬¸Ã×éÖ¯»¹Ê¹ÓÃÁ½¸öPowerShell¾ç±¾Ç¿»¯¹¥»÷£ºÆäÒ»½«KerberosƱ¾Ý×¢ÈëLSASSÒÔʵÏÖÔ¶³ÌϵͳÉí·ÝÑéÖ¤ºÍÏÂÁîÖ´ÐУ»£»£»£»£»Æä¶þͨ¹ý×éÕ½ÂÔÔÚÓòÄÚ¶ą̀ÅÌËã»ú½¨ÉèÍâµØÕË»§£¬£¬£¬£¬Ö§³ÖºáÏòÒÆ¶¯¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/
2. ¡¶ÐûÑÔ±¨¡·Êý¾Ýй¶£¬£¬£¬£¬ÕþÖÎÒþ˽Σº¦Í¹ÏÔ
11ÔÂ4ÈÕ£¬£¬£¬£¬Òâ´óÀû×óÒí±ê¼ÇÐÔ±¨Ö½¡¶ÐûÑÔ±¨¡·£¨Il Manifesto£©ÒòδÉèÖÃÃÜÂë±£»£»£»£»£»¤µÄClickHouseÊý¾Ý¿â£¬£¬£¬£¬µ¼ÖÂ15Íò¸¶·Ñ¶©ÔÄÓû§ÓÊÏä¼°1100ÍòÌõ·Ã¿ÍÐÐΪÈÕ־й¶¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨×°±¸ÊÖÒÕϸ½Ú¡¢»á»°ÁîÅÆ¡¢IPµØµã¡¢¾«¶È´ï11Ã×µÄGeoIPÐÅÏ¢¼°ÎÄÕÂÍÆ¼öȪԴµÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬»¹Ì»Â¶ÁËÄÚ²¿ÍøÕ¾ÆÊÎöÊý¾Ý£¨ÈçÎÄÕÂÌåÏÖ¡¢ÊÜÖÚÐÐΪ¡¢Òý¼öȪԴ£©£¬£¬£¬£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚÉÌÒµÇ鱨ÇÔÈ¡¡£¡£¡£¡£¡£×÷Ϊ1969Ä꽨ÉèµÄ¼¤½ø×óÒí¿¯Î£¬£¬£¬¡¶ÐûÑÔ±¨¡·Ôø¼ÓÈë1972Äê´óÑ¡²¢ÔâÓö2000Äêз¨Î÷˹·Ö×ÓÕ¨µ¯Ï®»÷δË죬£¬£¬£¬ÏÖΪ·ÇÓªÀûÏàÖúÉ磬£¬£¬£¬ÈÕ¿¯ÐÐÁ¿Ô¼1.5Íò·Ý¡£¡£¡£¡£¡£´Ë´Îй¶ËäÎ´Éæ¼°ÃÜÂë»òÖ±½ÓÕË»§Æ¾Ö¤£¬£¬£¬£¬µ«¶ÁÕßÔĶÁ¼Í¼Òò·´Ó¦ÕþÖÎÐËȤÓëÐÅÑö£¬£¬£¬£¬ÊôÓÚÅ·ÖÞÒþ˽·¨ÖС°ÌØÊâÖÖ±ð¡±ÐÅÏ¢£¬£¬£¬£¬ÃæÁÙ¸üÑϿᱣ»£»£»£»£»¤¡£¡£¡£¡£¡£ÈôÊý¾Ý±»ÕþÖÎÄîÍ·Õß»ñÈ¡£¡£¡£¡£¡£¬£¬£¬£¬¶ÁÕßÓ뱨Éç¿ÉÄÜÔâÕþ¸®É§ÈÅ»ò¼àÊÓ¡£¡£¡£¡£¡£
https://cybernews.com/security/il-manifesto-data-leak-exposed-readers/
3. ÃÀ¹úSuper QuikÔâ¶í¹ØÁªÀÕË÷ÍŻ﹥»÷
11ÔÂ3ÈÕ£¬£¬£¬£¬ÃÀ¹úÇøÓòÐÔ¼ÓÓÍÕ¾Á¬ËøµêSuper QuikÔâÓë¶íÂÞ˹ÓйصÄPlayÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬£¬£¬¹¥»÷ÕßÔÚ°µÍøÐ¹Â¶¼à¿ØÂ¼Ïñ¼°5.5GBÄÚ²¿Îļþ¡£¡£¡£¡£¡£´Ë´Îй¶°üÀ¨²ÆÎñ±¨¸æ£¨ÖðÈÕÏúÊÛ¶î¡¢ÀûÈ󱨸桢×ʲúÇ·Õ®±í¼°ÀúÄêÒµ¼¨½ÏÁ¿£©¡¢²É¹º·¢Æ±£¨ÊÖÒÕ×°±¸Óëά»¤±¾Ç®£©¡¢¼à¿ØÆ¬¶Ï£¨º¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢£©¡¢Ð½×ʱ任֪ͨ£¨Ô±¹¤ÐÕÃû¼°Ð½×ʱê×¼£©¡¢×°ÐÞÍýÏ루Ա¹¤ÁªÏµ·½·¨£©¡¢ÊÂÇéÆÀ¹À±ê×¼¡¢ÅàѵÖÊÁϼ°ÄÚ²¿Õþ²ßÎļþµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£PlayÍÅ»ïÒÔË«ÖØÀÕË÷ÊÖÒÕÖøÃû£¬£¬£¬£¬ÒªÇóÖ§¸¶½âÃÜÓöȲ¢°ü¹Ü²»ÀÄÓñ»µÁÊý¾Ý¡£¡£¡£¡£¡£ÈôÆóÒµ¾Ü¾ø£¬£¬£¬£¬ÆäÊý¾Ý½«±»¹ûÕæÒÔʩѹ¡£¡£¡£¡£¡£´Ë´ÎSuper QuikÊý¾Ýй¶¿ÉÄÜÒý·¢¶àÖØÎ£º¦£º²ÆÎñ±¨¸æÓ뷢Ʊ¿ÉÄÜ̻¶ÉÌÒµÇ鱨¡¢¹©Ó¦É̶¨¼Û¼°»ù´¡Éèʩϸ½Ú£¬£¬£¬£¬±»¾ºÕùµÐÊÖʹÓ㻣»£»£»£»¼à¿ØÆ¬¶Ï¿ÉÄÜ̻¶¼à¿ØÃ¤Çø£¬£¬£¬£¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢Éæ¼°Òþ˽ÓëÖ´·¨ÎÊÌ⣻£»£»£»£»Ð½×Ê¡¢ÁªÏµ·½·¨µÈÊý¾ÝÔöÌíÉí·Ý͵ÇÔÓëÉç»á¹¤³Ì¹¥»÷Σº¦£»£»£»£»£»ÄÚ²¿ÎļþÄ£°å¿ÉÄܱ»ÓÃÓÚÕ©Æ£¬£¬£¬£¬ÍþвÐÔÓïÑÔÎļþÔò¿ÉÄÜË𺦹«Ë¾¹«ÖÚÐÎÏ󡣡£¡£¡£¡£
https://cybernews.com/security/ransomware-super-quik-data-leak/
4. Gootloader¶ñÒâÈí¼þ7¸öÔºó¾íÍÁÖØÀ´
11ÔÂ5ÈÕ£¬£¬£¬£¬Gootloader¶ñÒâÈí¼þ¼ÓÔØÆ÷ÔÚÏûÊÅ7¸öÔºóÖØÏÖ£¬£¬£¬£¬Í¨¹ýSEOͶ¶¾ÍƹãÐéÎ±ÍøÕ¾ÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã»ùÓÚJavaScriptµÄ¼ÓÔØÆ÷ͨ¹ý±»ÈëÇÖ»ò¹¥»÷Õß¿ØÖƵÄÍøÕ¾£¬£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâÎĵµ¡£¡£¡£¡£¡£Æä¹¥»÷Á´ÌõʼÓÚSEOͶ¶¾£¬£¬£¬£¬Í¨¹ýÓÅ»¯Ìض¨Òªº¦´Ê£¨ÈçÖ´·¨ÎļþºÍÐÒ飩ÔÚËÑË÷ÒýÇæÖеÄÅÅÃû£¬£¬£¬£¬ÎüÒýÓû§»á¼ûαװ³ÉÖ´·¨ÎļþÄ£°å·ÖÏíÆ½Ì¨µÄÍøÕ¾¡£¡£¡£¡£¡£µ±Óû§µã»÷¡°»ñÈ¡Îĵµ¡±°´Å¥Ê±£¬£¬£¬£¬ÍøÕ¾»áÑéÖ¤ÊÇ·ñΪÕýµ±Óû§£¬£¬£¬£¬ËæºóÏÂÔØ°üÀ¨.jsÀ©Õ¹ÃûµÄ¶ñÒâѹËõ°ü¡£¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬Gootloader»áÏÂÔØCobalt Strike¡¢ºóÃųÌÐò¼°½©Ê¬³ÌÐòµÈ¶ñÒâÔØºÉ£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬×îÖÕ¿ÉÄܰ²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£´Ë´Î»Ø¹é£¬£¬£¬£¬Gootloader½ÓÄɶàÏîÐÂÊÖÒÕ¹æ±Ü¼ì²â£ºÍ¨¹ýÌØÊâÍøÒ³×ÖÌåÌæ»»×ÖÐΣ¬£¬£¬£¬ÔÚHTMLÔ´´úÂëÖÐÒþ²Ø¡°·¢Æ±¡±¡°ÌõÔ¼¡±µÈÒªº¦´Ê£»£»£»£»£»Ê¹ÓÃÃûÌùýʧµÄZIPÎļþ£¬£¬£¬£¬Windows×ÊÔ´ÖÎÀíÆ÷½âѹʱÊͷŶñÒâJSÎļþ£¬£¬£¬£¬¶øÇå¾²¹¤¾ß½âѹÔòÏÔʾÎÞº¦Îı¾Îļþ£¬£¬£¬£¬×ÌÈÅÆÊÎö¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷ÕßÖ²ÈëSupper SOCKS5ºóÃÅ£¬£¬£¬£¬ÊµÏÖÔ¶³Ì»á¼û¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/
5. ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾ÔâºÚ¿ÍÈëÇÖÖÂСÎÒ˽¼ÒÐÅϢй¶
11ÔÂ5ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾£¨HAEA£©ÔâÓöºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¹¥»÷Õßͨ¹ý²»·¨»á¼ûÆäITÇéÐÎÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂ루SSN£©¼°¼ÝʻִÕÕÔÚÄÚµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ1ÈÕÊ״η¢Ã÷ÈëÇÖ¼£Ï󣬣¬£¬£¬ËæºóÁ¬Ã¦ÁªºÏÍâ²¿ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÕö¿ªÊӲ죬£¬£¬£¬È·ÈϹ¥»÷ʼÓÚ2ÔÂ22ÈÕÇÒÒÑ¿ØÖÆÊ±ÊÆ¡£¡£¡£¡£¡£HAEA×÷ΪÏÖ´úÆû³µ¼¯ÍÅ×Ó¹«Ë¾£¬£¬£¬£¬ÈÏÕæÎªÆû³µÈ«ÉúÃüÖÜÆÚÌṩITЧÀÍ£¬£¬£¬£¬º¸ÇÔ¶³ÌÐÅÏ¢´¦Öóͷ£¡¢OTA¸üС¢×Ô¶¯¼Ýʻϵͳ¼°Êý×Ö»¯ÖÆÔìÆ½Ì¨µÈ£¬£¬£¬£¬Ð§À͹æÄ£ÁýÕÖ270ÍòÁ¾Æû³µ¡¢200ÍòÓû§¼°5000ÃûÔ±¹¤¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÆäϵͳÇå¾²ÐÔÎó²î£¬£¬£¬£¬µ«ÏêϸÊÜÓ°ÏìÈËÊý¼°ÊÇ·ñÉæ¼°¿Í»§/Óû§Êý¾ÝÈÔ²»Ã÷È·¡£¡£¡£¡£¡£ÊÂÎñÊÓ²ìÏÔʾ£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢ÀàÐͱ£´æ²î±ð£ºÍ¨ÖªÐŽöÌá¼°ÐÕÃû£¬£¬£¬£¬¶øÂíÈøÖîÈûÖÝÕþ¸®ÃÅ»§ÍøÕ¾Ôö²¹ÁгöÁËSSNºÍ¼ÝÕÕÐÅÏ¢¡£¡£¡£¡£¡£×èÖ¹·¢¸å£¬£¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬ÕØÊÂÕßÉí·ÝÈÔ³ÉÃÕ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/
6. CISA½ôÆÈת´ïCentOS Web Panel¸ßΣÎó²î
11ÔÂ5ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃCentOS Web Panel£¨CWP£©ÖеÄCVE-2025-48703Ô¶³ÌÏÂÁîÖ´ÐÐÎó²îÌᳫ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδÊÚȨ¹¥»÷Õßͨ¹ýÓÐÓÃÓû§ÃûÔÚCWPʵÀýÉÏÖ´ÐÐí§ÒâshellÏÂÁ£¬£¬£¬Ó°Ïì0.9.8.1204֮ǰËùÓа汾¡£¡£¡£¡£¡£CWP×÷ΪÃâ·Ñ¿ªÔ´µÄLinuxЧÀÍÆ÷ÖÎÀíÃæ°å£¬£¬£¬£¬±»ÆÕ±éÓÃÓÚÍøÕ¾Íйܡ¢ÏµÍ³ÖÎÀí¼°VPS/×ÔÁ¦Ð§ÀÍÆ÷ÔËÓª£¬£¬£¬£¬ÆäÎó²îΣº¦²¨¼°È«Çò´ó×ÚÆóÒµ¼°Ð¡ÎÒ˽¼ÒÓû§¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÎļþÖÎÀíÆ÷¡°changePerm¡±¶Ëµã±£´æÉè¼ÆÈ±ÏÝ£ºµ±ÇëÇóÖÐÊ¡ÂÔÓû§±êʶ·ûʱ£¬£¬£¬£¬ÏµÍ³ÈԻᴦÖóͷ£Î´ÊÚȨÇëÇ󣬣¬£¬£¬ÇÒ¡°t_total¡±²ÎÊýδ¾Çå¾²¹ýÂËÖ±½Ó´«ÈëshellÏÂÁ£¬£¬£¬µ¼ÖÂÏÂÁî×¢ÈëΣº¦¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Maxime RinaudoÓÚ6ÔÂÏÂÑ®ÔÚCentOS 7ÇéÐÎÖÐÀÖ³ÉÑÝʾÁËʹÓÃÀú³Ì£¬£¬£¬£¬Í¨¹ýÏò¸Ã¶Ëµã·¢ËͶñÒâPOSTÇëÇ󣬣¬£¬£¬¿É×¢Èë·´ÏòshellÒÔÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£CISAÒѽ«¸ÃÎó²îÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬²¢ÒÀ¾ÝBOD 22-01Ö¸ÄÏÒªÇóÁª°î»ú¹¹ÔÚ11ÔÂ25ÈÕǰӦÓÃÐÞ¸´²¹¶¡£¡£¡£¡£¡£¨Ðû²¼ÓÚ6ÔÂ18ÈÕ£©£¬£¬£¬£¬»ò×èֹʹÓÃÊÜÓ°Ïì²úÆ·¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ