¹È¸èÐÞ¸´ÁËChromeÖб»Æð¾¢Ê¹ÓõÄɳºÐÌÓÒÝÁãÈÕÎó²î

Ðû²¼Ê±¼ä 2025-07-18

1. ¹È¸èÐÞ¸´ÁËChromeÖб»Æð¾¢Ê¹ÓõÄɳºÐÌÓÒÝÁãÈÕÎó²î


7ÔÂ16ÈÕ£¬£¬ £¬£¬£¬£¬¹È¸è¿ËÈÕÐû²¼Chromeä¯ÀÀÆ÷Çå¾²¸üУ¬£¬ £¬£¬£¬£¬½ôÆÈÐÞ¸´Áù¸öÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ÆäÖбàºÅΪCVE-2025-6558µÄ¸ßΣÎó²îÒѱ»¹¥»÷ÕßʹÓ㬣¬ £¬£¬£¬£¬ÊµÏÖɳºÐÌÓÒÝ¡£¡£¡£ ¡£¸ÃÎó²îÑÏÖØÆ·¼¶´ï8.8·Ö£¬£¬ £¬£¬£¬£¬Ó°Ïì138.0.7204.157֮ǰ°æ±¾µÄChrome£¬£¬ £¬£¬£¬£¬¹È¸èÍþвÆÊÎöС×飨TAG£©ÓÚ6ÔÂ23ÈÕ·¢Ã÷ºóѸËÙÍÆ³ö²¹¶¡£¬£¬ £¬£¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ138.0.7204.157/158°æ±¾¡£¡£¡£ ¡£CVE-2025-6558µÄ½¹µãÎÊÌâÔÚÓÚChromeµÄͼÐÎÒýÇæ×é¼þANGLE¶Ô²»ÊÜÐÅÈÎÊäÈëµÄÑé֤ȱ·¦¡£¡£¡£ ¡£ANGLE×÷Ϊ¿ªÔ´Í¼ÐÎÁýͳ²ã£¬£¬ £¬£¬£¬£¬ÈÏÕæ½«OpenGL ESŲÓÃת»»ÎªÆäËûͼÐÎAPI£¨ÈçDirect3D¡¢Vulkan£©£¬£¬ £¬£¬£¬£¬µ«ÆäÔÚ´¦Öóͷ£WebGLÍøÕ¾µÈȪԴµÄGPUÏÂÁîʱ±£´æÈ±ÏÝ£¬£¬ £¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýÌØÖÆHTMLÒ³ÃæÔÚGPUÀú³ÌÖÐÖ´ÐÐí§Òâ´úÂ룬£¬ £¬£¬£¬£¬²¢×îÖÕÍ»ÆÆä¯ÀÀÆ÷ɳºÐÏÞÖÆ¡£¡£¡£ ¡£É³ºÐ»úÖÆ±¾ÊÇChromeµÄ½¹µãÇå¾²·À»¤£¬£¬ £¬£¬£¬£¬ÓÃÓÚ¸ôÀëä¯ÀÀÆ÷Àú³ÌÓë²Ù×÷ϵͳ£¬£¬ £¬£¬£¬£¬±ÜÃâ¶ñÒâÈí¼þÀ©É¢ÖÁ×°±¸ÆäËû²¿·Ö¡£¡£¡£ ¡£´Ë´ÎÎó²îµÄÍ»ÆÆ£¬£¬ £¬£¬£¬£¬¿ÉÄÜʹ¹¥»÷ÕßÖ±½Ó¿ØÖÆÓû§×°±¸£¬£¬ £¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò°²ÅŶñÒâÈí¼þ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/


2. ¸ñÀ­µÂÄáÊÕÑø»ú¹¹Êý¾Ýй¶£¬£¬ £¬£¬£¬£¬110ÍòÌõ¼Í¼±»ÆØ¹â


7ÔÂ17ÈÕ£¬£¬ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÔÚÍøÂçɨÃèÖз¢Ã÷£¬£¬ £¬£¬£¬£¬ÃÀ¹ú¸ñÀ­µÂÄáÊÕÑøÖÐÐÄÏà¹ØµÄ´ó×ÚδÊܱ£»£»£»£»£»£»£»¤Êý¾ÝÔÚÏß̻¶£¬£¬ £¬£¬£¬£¬Òý·¢ÑÏÖØÒþ˽Σ»£»£»£»£»£»£»ú¡£¡£¡£ ¡£´Ë´Îй¶µÄÊý¾Ý¿âÈÝÁ¿´ï2.49GB£¬£¬ £¬£¬£¬£¬°üÀ¨Áè¼Ý110ÍòÌõÃô¸Ð¼Í¼£¬£¬ £¬£¬£¬£¬Éæ¼°¶ùͯ¡¢ÑøâïÊÑ¡¢Ç×Éú¼ÒÍ¥¼°»ú¹¹Ô±¹¤£¬£¬ £¬£¬£¬£¬º­¸ÇÐÕÃû¡¢ÁªÏµ·½·¨¡¢²¡Àý¼Í¼¡¢Ë½ÈËÆÀ¹ÀµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£¡£¡£ ¡£ÕâЩÊý¾ÝδÉèÖÃÃÜÂë»ò¼ÓÃܱ£»£»£»£»£»£»£»¤£¬£¬ £¬£¬£¬£¬Èκξ߱¸»ù´¡ÍøÂç֪ʶµÄÓû§¾ù¿Éͨ¹ý̻¶µÄÔÆÐ§ÀÍÆ÷Ö±½Ó»á¼û£¬£¬ £¬£¬£¬£¬ÓÈÆäÒ×±»ÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£ ¡£Fowler·¢Ã÷Êý¾ÝºóÁ¬Ã¦ÏòÏà¹Ø×éÖ¯ÌᳫÈÏÕæÈÎÅû¶£¬£¬ £¬£¬£¬£¬Ô½ÈÕÊý¾ÝËä±»½ôÆÈÏÂÏߣ¬£¬ £¬£¬£¬£¬µ«Ì»Â¶Ê±³¤¼°ÊÇ·ñÔâ¶ñÒâ»á¼ûÈÔ´æÒÉ¡£¡£¡£ ¡£Ð¹Â¶¼Í¼Դ×Ըûú¹¹ÓÃÓÚÖÎÀí°¸ÀýÓëÏàͬµÄCRMƽ̨£¬£¬ £¬£¬£¬£¬Îļþ¼Ð±ê×¢"ÁªÏµÈË""ÉêÇë""Ç×Éú¸¸Ç×"µÈ£¬£¬ £¬£¬£¬£¬Ïêϸ¼Í¼ÉêÇëÈ˼ÒÍ¥Åä¾°¡¢±»¾ÜÊÕÑøÔµ¹ÊÔ­ÓÉ¡¢Ò©ÎïÀÄÓûòÖ´·¨ÎÊÌâµÈϸ½Ú¡£¡£¡£ ¡£Ö»¹Üδ°üÀ¨ÍêÕû°¸¼þµµ°¸£¬£¬ £¬£¬£¬£¬µ«µ¥Ìõ¼Í¼ÒѰüÀ¨×ã¹»ÐÅÏ¢£¬£¬ £¬£¬£¬£¬×ãÒÔ³ÉΪÉç»á¹¤³Ì¹¥»÷»òÕ©Æ­µÄÄ¿µÄ¡£¡£¡£ ¡£ÓÈΪÃô¸ÐµÄÊÇ28.4ÍòÌõµç×ÓÓʼþÔªÊý¾Ý£¬£¬ £¬£¬£¬£¬ËäÎ´ÆØ¹âÍêÕûÓʼþÕýÎÄ£¬£¬ £¬£¬£¬£¬µ«Ö÷ÌâÐпÉÄÜй¶ÐÕÃû»ò²Î¿¼ÐÅÏ¢£¬£¬ £¬£¬£¬£¬ÈôÁ¬Ïµ»ú¹¹ÓëÒ½ÁÆ¡¢Éç»áЧÀÍ»ú¹¹µÄ¹ØÁª¼Í¼£¬£¬ £¬£¬£¬£¬Òþ˽Σº¦½«½øÒ»²½À©´ó¡£¡£¡£ ¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬ £¬£¬£¬£¬¸ÃÊý¾Ý¿âÓÉ´¿Îı¾ÓëͨÓÃΨһ±êʶ·û£¨UUID£©×é³É£¬£¬ £¬£¬£¬£¬ËäUUID¿´ËÆÖش󣬣¬ £¬£¬£¬£¬µ«È±·¦¼ÓÃܱ£»£»£»£»£»£»£»¤£¬£¬ £¬£¬£¬£¬ÎÞ·¨×èֹδ¾­ÊÚȨ»á¼û¡£¡£¡£ ¡£


https://hackread.com/massive-data-leak-texas-adoption-agency-million-records/


3. ÎÚ¿ËÀ¼·¢Ã÷APT28ʹÓÃLLMµÄÐÂÐͶñÒâÈí¼þLameHug


7ÔÂ17ÈÕ£¬£¬ £¬£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÊÂÎñÏìӦС×飨CERT-UA£©¿ËÈÕÅû¶ÁËÒ»ÖÖÃûΪLameHugµÄÐÂÐͶñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬ÆäÍ»ÆÆÐÔÌØÕ÷ÔÚÓÚÊ״ιûÕæ¼Í¼ÁËʹÓôóÐÍÓïÑÔÄ£×Ó£¨LLM£©¶¯Ì¬ÌìÉú¹¥»÷ÏÂÁîµÄ¹¥»÷ģʽ£¬£¬ £¬£¬£¬£¬²¢½«¹¥»÷¹éÒòÓÚ¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄAPT28£¨Fancy Bear£©×éÖ¯¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þÓÉPython±àд£¬£¬ £¬£¬£¬£¬Í¨¹ýHugging Face APIÓë°¢ÀïÔÆ¿ªÔ´µÄQwen 2.5-Coder-32B-InstructÄ£×Ó½»»¥¡£¡£¡£ ¡£LameHugµÄ¹¥»÷Á´ÌõʼÓÚ¶ñÒâµç×ÓÓʼþ£º¹¥»÷Õßð³äÕþ¸®¹ÙÔ±£¬£¬ £¬£¬£¬£¬ÏòÕþ¸®ÐÐÕþ»ú¹¹·¢ËͰüÀ¨ZIP¸½¼þµÄ´¹ÂÚÓʼþ£¬£¬ £¬£¬£¬£¬¸½¼þÄÚǶLameHug¼ÓÔØ³ÌÐò¡£¡£¡£ ¡£Ò»µ©Ö´ÐУ¬£¬ £¬£¬£¬£¬¶ñÒâÈí¼þ»áͨ¹ýLLM¶¯Ì¬ÌìÉúϵͳÕì̽ÓëÊý¾ÝÇÔÈ¡ÏÂÁ£¬ £¬£¬£¬£¬Ïêϸ²Ù×÷°üÀ¨£ºÍøÂçϵͳÐÅÏ¢²¢ÉúÑÄÖÁ¡°info.txt¡±Îļþ£»£»£»£»£»£»£»µÝ¹éËÑË÷¡°Îĵµ¡±¡°×ÀÃæ¡±¡°ÏÂÔØ¡±µÈÒªº¦WindowsĿ¼ÖеÄÎĵµ£»£»£»£»£»£»£»×îÖÕͨ¹ýSFTP»òHTTP POSTÇëÇó½«Êý¾ÝÇÔÈ¡ÖÁ¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷¡£¡£¡£ ¡£ÊÖÒÕ²ãÃæ£¬£¬ £¬£¬£¬£¬LameHugµÄÁ¢ÒìÐÔÌåÏÖÔÚÁ½·½Ã棺ÆäÒ»£¬£¬ £¬£¬£¬£¬ËüÊÇÊ׸ö¹ûÕæ¼Í¼µÄʹÓÃLLMÖ§³Ö¹¥»÷ÕßʹÃüµÄ¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬Ê¹ÍþвÐÐΪÕßÄÜÔÚ¹¥»÷Àú³ÌÖÐʵʱµ÷½âÕ½ÂÔ£¬£¬ £¬£¬£¬£¬ÎÞÐè°²ÅÅÐÂÓÐÓÃÔØºÉ£»£»£»£»£»£»£»Æä¶þ£¬£¬ £¬£¬£¬£¬Í¨¹ýHugging Face»ù´¡ÉèÊ©¾ÙÐÐÖ¸»Ó¿ØÖÆ£¨C2£©Í¨Ñ¶£¬£¬ £¬£¬£¬£¬½µµÍÁ˹ŰåC2ЧÀÍÆ÷µÄ̻¶Σº¦£¬£¬ £¬£¬£¬£¬ÑÓÉìÁËÈëÇÖÒþ²ØÆÚ¡£¡£¡£ ¡£±ðµÄ£¬£¬ £¬£¬£¬£¬¶¯Ì¬ÌìÉúµÄÏÂÁî¿É¹æ±Ü»ùÓÚ¾²Ì¬ÌØÕ÷¼ì²âµÄÇå¾²Èí¼þ£¬£¬ £¬£¬£¬£¬ÔöÌíÁË·ÀÓùÄѶÈ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/lamehug-malware-uses-ai-llm-to-craft-windows-data-theft-commands-in-real-time/


4. StormousÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÑÇÀûÉ£ÄÇÖÝÒ½ÁÆÖÐÐÄ60Íò»¼ÕßÊý¾Ý


7ÔÂ17ÈÕ£¬£¬ £¬£¬£¬£¬Ç×¶íÀÕË÷Èí¼þ×éÖ¯Stormous¿ËÈÕÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû³Æ£¬£¬ £¬£¬£¬£¬ÀÖ³ÉÈëÇÖÃÀ¹úÑÇÀûÉ£ÄÇÖݱ±²¿·ÇÓªÀûÐÔÁª°îÈÏÖ¤Ò½ÁÆÖÐÐÄ£¨FQHC£©North Country HealthCare£¬£¬ £¬£¬£¬£¬ÇÔÈ¡ÁËÔ¼60ÍòÃû»¼ÕßµÄÃô¸ÐÐÅÏ¢¡£¡£¡£ ¡£¸ÃÒ½ÁÆÖÐÐÄÔÚ11¸öÉçÇøµÄ14¸öËùÔÚÌṩȫ¿ÆÒ½ÁÆÐ§ÀÍ£¬£¬ £¬£¬£¬£¬ÁýÕÖ¼Òͥҽѧ¡¢¶ù¿Æ¡¢ÐÐΪ¿µ½¡¡¢ÑÀ¿ÆÕչ˻¤Ê¿µÈ¶àÁìÓò£¬£¬ £¬£¬£¬£¬²¢½ÓÊÜ´ó´ó¶¼°ü¹ÜÍýÏ뼰ΪδͶ±£»£»£»£»£»£»£»¼ÕßÌṩÓöÈÕÛ¿Û¡£¡£¡£ ¡£StormousÍÅ»ïÉù³Æ£¬£¬ £¬£¬£¬£¬ÇÔÈ¡µÄÊý¾Ý°üÀ¨ÍêÕûµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡¢Êܱ£»£»£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡¢Õï¶Ï´úÂ루ICD£©¼°ÕïËùÓëÒ½ÁÆÐ§ÀÍÌṩÕßÏêÇ飬£¬ £¬£¬£¬£¬Ïêϸ°üÀ¨»¼ÕßÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢¾ÍÕïÈÕÆÚÓëËùÔÚ¡¢°ü¹Ü¹«Ë¾ÐÅÏ¢¡¢Õï¶ÏÐÎòµÈ¡£¡£¡£ ¡£¸Ã×éÖ¯½ÓÄÉ¡°Ë«ÖØÀÕË÷¡±Ä£Ê½£ºÆäÖÐ10ÍòÃû»¼ÕßµÄÊý¾Ý±»¹ÒÅÆ³öÊÛ£¬£¬ £¬£¬£¬£¬Ê£Óà50ÍòÌõ¼Í¼ÔòÓÚ7ÔÂ15ÈÕ±»Ãâ·Ñ¹ûÕæÖÁйÃÜÍøÕ¾£¬£¬ £¬£¬£¬£¬½øÒ»²½À©´óÁËÊý¾Ý̻¶Σº¦¡£¡£¡£ ¡£Stormous×Ô2022ÄêÍ·»îÔ¾ÒÔÀ´£¬£¬ £¬£¬£¬£¬ÒÑÕë¶ÔÒ½ÁƱ£½¡¡¢Âùݡ¢¿Æ¼¼¡¢Õþ¸®µÈÁìÓòµÄÖÁÉÙ150¸ö×éÖ¯·¢¶¯¹¥»÷£¬£¬ £¬£¬£¬£¬Êܺ¦Õß¼¯ÖÐÓÚÎ÷°àÑÀ¡¢ÃÀ¹ú¡¢°¢ÁªÇõ¡¢·¨¹úºÍ°ÍÎ÷¡£¡£¡£ ¡£


https://securityaffairs.com/180057/data-breach/180057stormous-ransomware-gang-targets-north-country-healthcare-claims-600k-patient-data-stolen.html


5. BigONEÉúÒâËùÔâºÚ¿Í¹¥»÷£¬£¬ £¬£¬£¬£¬2700ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ


7ÔÂ16ÈÕ£¬£¬ £¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùBigONE¼ì²âµ½Æ½Ì¨²¿·Ö×ʲú·ºÆðÒì³£±ä»»£¬£¬ £¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏϵÕë¶ÔÆäÈÈÇ®°üµÄµÚÈý·½¹¥»÷ËùÖ£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡Á˼ÛÖµÔ¼2700ÍòÃÀÔªµÄÖÖÖÖÊý×Ö×ʲú¡£¡£¡£ ¡£BigONEËæ¼´Ðû²¼Í¨¸æ³Æ£¬£¬ £¬£¬£¬£¬Óû§Ë½Ô¿¼°Ð¡ÎÒ˽¼ÒÊý¾ÝδÊÜÓ°Ï죬£¬ £¬£¬£¬£¬ËùÓÐËðʧ½«ÓÉÆ½Ì¨´¢±¸½ðÈ«¶î¼ç¸º£¬£¬ £¬£¬£¬£¬Óû§×ʲú²»»áÔâÊÜʵÖÊÐÔËðʧ¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬Æ½Ì¨ÒÑÓëÇå¾²¹«Ë¾SlowMistÏàÖú×·×Ù±»µÁ×ʽ𣬣¬ £¬£¬£¬£¬²¢¼à¿ØÆäÔÚÇø¿éÁ´ÉϵÄÁ÷¶¯ÇéÐΣ¬£¬ £¬£¬£¬£¬Í¬Ê±Ðû²¼´æ¿îºÍÉúÒâЧÀÍÒÑÍêÈ«»Ö¸´£¬£¬ £¬£¬£¬£¬µ«ÌáÏÖ¼°OTC¹¦Ð§ÉÐÎ´ÖØÆô¡£¡£¡£ ¡£Ö»¹Ü¹¥»÷ÒªÁìÒѱ»¿ØÖÆ£¬£¬ £¬£¬£¬£¬µ«ÏêϸÈëÇÖÊÖ¶ÎÈÔδÃ÷È·¡£¡£¡£ ¡£SlowMistÆðÔ´Åжϴ˴ÎÊÂÎñΪ¹©Ó¦Á´¹¥»÷£¬£¬ £¬£¬£¬£¬¶øÇø¿éÁ´ÊÓ²ì»ú¹¹LookochainÔòÅû¶£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÒÑ×îÏÈÏ´Ç®²Ù×÷£¬£¬ £¬£¬£¬£¬½«Ôß¿î¶Ò»»Îª120ö±ÈÌØ±Ò£¨BTC£©¡¢1272öÒÔÌ«±Ò£¨ETH£©¡¢2625öSolana£¨SOL£©¼°2330ÍòöTron£¨TRX£©¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hacker-steals-27-million-in-bigone-exchange-crypto-breach/


6. Ïã¸Û½ðÈÚ»ú¹¹ÔâSquidLoader¶ñÒâÈí¼þ¹¥»÷


7ÔÂ16ÈÕ£¬£¬ £¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷£¬£¬ £¬£¬£¬£¬Õë¶ÔÏã¸Û½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâÈí¼þ¹¥»÷À˳±ÕýÔÚÉìÕÅ£¬£¬ £¬£¬£¬£¬Æä½¹µãΪ¾ß±¸¸ß¶È¹æ±ÜÄÜÁ¦µÄ¼ÓÔØÆ÷SquidLoader¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶ÎѬȾÁ´°²ÅÅCobalt Strike Beacon£¬£¬ £¬£¬£¬£¬²¢½ÓÄɶàÖÖÏȽø¿¹ÆÊÎöÕ½ÂÔ£¬£¬ £¬£¬£¬£¬¶ÔÄ¿µÄ»ú¹¹×é³ÉÑÏÖØÍþв¡£¡£¡£ ¡£¹¥»÷ʼÓÚÓã²æÊ½´¹ÂÚÓʼþ¡£¡£¡£ ¡£ÕâЩÒÔͨË×»°×«Ð´µÄÓʼþð³ä½ðÈÚ»ú¹¹£¬£¬ £¬£¬£¬£¬¸½´øÎ±×°³É·¢Æ±µÄÃÜÂë±£»£»£»£»£»£»£»¤RARѹËõ°ü¡£¡£¡£ ¡£Óû§½âѹºó£¬£¬ £¬£¬£¬£¬»á·¢Ã÷Ò»¸öαװ³ÉMicrosoft WordÎĵµµÄ¶ñÒâPE¶þ½øÖÆÎļþ£¬£¬ £¬£¬£¬£¬ÆäÎļþÃûÄ£ÄâÕýµ±³ÌÐò¡°AMDRSServ.exe¡±£¬£¬ £¬£¬£¬£¬ÒÔÔöÇ¿Éç»á¹¤³ÌÓÕÆ­ÐÔ¡£¡£¡£ ¡£Ò»µ©Ö´ÐУ¬£¬ £¬£¬£¬£¬SquidLoader±ãÆô¶¯¶à½×¶ÎѬȾÁ÷³Ì£ºÊ×ÏÈ×ÔÎÒ½â°üÒÔ½âÃÜÄÚ²¿¸ºÔØ£¬£¬ £¬£¬£¬£¬Ëæºóͨ¹ý»ìÏý´úÂ붯̬ÆÊÎöÒªº¦Windows API£¬£¬ £¬£¬£¬£¬²¢³õʼ»¯»ùÓÚ¿ÍÕ»µÄ×Ô½ç˵½á¹¹´æ´¢²Ù×÷Êý¾Ý¡£¡£¡£ ¡£Îª¹æ±ÜɳÏä¡¢µ÷ÊÔÆ÷¼°·À²¡¶¾¹¤¾ß£¬£¬ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÖ´ÐжàÖØ¹æ±ÜÀý³Ì£¬£¬ £¬£¬£¬£¬°üÀ¨ÇéÐμì²é¡¢×Ö·û´®»ìÏý¡¢¿ØÖÆÁ÷»ìÏý¼°Å²ÓÃδ¹ûÕæµÄWindowsϵͳŲÓᣡ£¡£ ¡£Èô¼ì²âµ½ÆÊÎö¹¤¾ß»òµ÷ÊÔ¼£Ï󣬣¬ £¬£¬£¬£¬Æä»áÁ¬Ã¦ÖÕÖ¹ÔËÐС£¡£¡£ ¡£±ðµÄ£¬£¬ £¬£¬£¬£¬SquidLoader»¹½ÓÄÉÑÓ³ÙÏß³Ì˯Ãß¡¢Òì²½Àú³ÌŲÓõÈÊÖÒÕÈÆ¹ý×Ô¶¯»¯É³Ïä¡£¡£¡£ ¡£Í¨¹ý¼ì²éºó£¬£¬ £¬£¬£¬£¬¶ñÒâÈí¼þ»áͨ¹ýÄ£ÄâKubernetesЧÀÍ·¾¶µÄURLÁªÏµC2ЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬ÍøÂç²¢´«ÊäÖ÷»úÊý¾Ý£¬£¬ £¬£¬£¬£¬×îÖմӴμ¶IPµØµãÏÂÔØCobalt Strike Beacon¡£¡£¡£ ¡£


https://www.infosecurity-magazine.com/news/squidloader-malware-targets-hong/