¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷
Ðû²¼Ê±¼ä 2025-11-061. ¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷
11ÔÂ4ÈÕ£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯Curly COMrades±»ÆØ×Ô2024ÄêÄêÖÐÆð»îÔ¾£¬£¬£¬Æä»î¶¯Óë¶íÂÞ˹µØÔµÕþÖÎÀûÒæÇ×½üÏà¹Ø¡£¡£¡£¸Ã×é֯ͨ¹ýÀÄÓÃWindowsרҵ°æ/ÆóÒµ°æ¼°Windows ServerÖеÄMicrosoft Hyper-VÐéÄ⻯ÊÖÒÕ£¬£¬£¬½¨ÉèÒþ²ØµÄ»ùÓÚAlpine LinuxµÄÇáÁ¿¼¶ÐéÄâ»ú£¨½öÕ¼ÓÃ120MB´ÅÅ̿ռäºÍ256MBÄڴ棩ÔËÐжñÒâÈí¼þ£¬£¬£¬ÀÖ³ÉÈÆ¹ý¹Å°å»ùÓÚÖ÷»úµÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¼Æ»®¡£¡£¡£ÐéÄâ»úÄÚÍйÜÁË×Ô½ç˵¹¤¾ßCurlyShell·´ÏòshellºÍCurlCat·´ÏòÊðÀí£ºÇ°Õßͨ¹ýcron×÷Òµ¼á³Ö³¤ÆÚ»¯£¬£¬£¬ÒÔÎÞͷģʽÔËÐв¢Í¨¹ýHTTPSÅþÁ¬C2ЧÀÍÆ÷Ö´ÐÐÏÂÁ£»£»£»£»£»£»ºóÕß×÷ΪSOCKSÊðÀí·â×°SSHÁ÷Á¿ÎªHTTPSÇëÇ󣬣¬£¬ÊµÏÖÒþ²ØËíµÀ´«Ê䣬£¬£¬Ê¹¶ñÒâÁ÷Á¿Î±×°³ÉÕýµ±Ö÷»úIPµØµã¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬ÍþвÐÐΪÕßÊ×ÏÈÔ¶³Ì»á¼ûÊܺ¦Õßϵͳ£¬£¬£¬ÆôÓÃHyper-V²¢½ûÓÃÆäÖÎÀí½çÃæ£¬£¬£¬°²ÅÅ»ùÓÚAlpine LinuxµÄ¼«¼òÐéÄâ»ú¡£¡£¡£BitdefenderÓë¸ñ³¼ªÑÇCERTÏàÖúÊӲ췢Ã÷£¬£¬£¬¸Ã×éÖ¯»¹Ê¹ÓÃÁ½¸öPowerShell¾ç±¾Ç¿»¯¹¥»÷£ºÆäÒ»½«KerberosƱ¾Ý×¢ÈëLSASSÒÔʵÏÖÔ¶³ÌϵͳÉí·ÝÑéÖ¤ºÍÏÂÁîÖ´ÐУ»£»£»£»£»£»£»Æä¶þͨ¹ý×éÕ½ÂÔÔÚÓòÄÚ¶ą̀ÅÌËã»ú½¨ÉèÍâµØÕË»§£¬£¬£¬Ö§³ÖºáÏòÒÆ¶¯¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/
2. ¡¶ÐûÑÔ±¨¡·Êý¾Ýй¶£¬£¬£¬ÕþÖÎÒþ˽Σº¦Í¹ÏÔ
11ÔÂ4ÈÕ£¬£¬£¬Òâ´óÀû×óÒí±ê¼ÇÐÔ±¨Ö½¡¶ÐûÑÔ±¨¡·£¨Il Manifesto£©ÒòδÉèÖÃÃÜÂë±£»£»£»£»£»£»£»¤µÄClickHouseÊý¾Ý¿â£¬£¬£¬µ¼ÖÂ15Íò¸¶·Ñ¶©ÔÄÓû§ÓÊÏä¼°1100ÍòÌõ·Ã¿ÍÐÐΪÈÕ־й¶¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨×°±¸ÊÖÒÕϸ½Ú¡¢»á»°ÁîÅÆ¡¢IPµØµã¡¢¾«¶È´ï11Ã×µÄGeoIPÐÅÏ¢¼°ÎÄÕÂÍÆ¼öȪԴµÈÃô¸ÐÊý¾Ý£¬£¬£¬»¹Ì»Â¶ÁËÄÚ²¿ÍøÕ¾ÆÊÎöÊý¾Ý£¨ÈçÎÄÕÂÌåÏÖ¡¢ÊÜÖÚÐÐΪ¡¢Òý¼öȪԴ£©£¬£¬£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚÉÌÒµÇ鱨ÇÔÈ¡¡£¡£¡£×÷Ϊ1969Ä꽨ÉèµÄ¼¤½ø×óÒí¿¯Î£¬£¬¡¶ÐûÑÔ±¨¡·Ôø¼ÓÈë1972Äê´óÑ¡²¢ÔâÓö2000Äêз¨Î÷˹·Ö×ÓÕ¨µ¯Ï®»÷δË죬£¬£¬ÏÖΪ·ÇÓªÀûÏàÖúÉ磬£¬£¬ÈÕ¿¯ÐÐÁ¿Ô¼1.5Íò·Ý¡£¡£¡£´Ë´Îй¶ËäÎ´Éæ¼°ÃÜÂë»òÖ±½ÓÕË»§Æ¾Ö¤£¬£¬£¬µ«¶ÁÕßÔĶÁ¼Í¼Òò·´Ó¦ÕþÖÎÐËȤÓëÐÅÑö£¬£¬£¬ÊôÓÚÅ·ÖÞÒþ˽·¨ÖС°ÌØÊâÖÖ±ð¡±ÐÅÏ¢£¬£¬£¬ÃæÁÙ¸üÑϿᱣ»£»£»£»£»£»£»¤¡£¡£¡£ÈôÊý¾Ý±»ÕþÖÎÄîÍ·Õß»ñÈ¡£¬£¬£¬¶ÁÕßÓ뱨Éç¿ÉÄÜÔâÕþ¸®É§ÈÅ»ò¼àÊÓ¡£¡£¡£
https://cybernews.com/security/il-manifesto-data-leak-exposed-readers/
3. ÃÀ¹úSuper QuikÔâ¶í¹ØÁªÀÕË÷ÍŻ﹥»÷
11ÔÂ3ÈÕ£¬£¬£¬ÃÀ¹úÇøÓòÐÔ¼ÓÓÍÕ¾Á¬ËøµêSuper QuikÔâÓë¶íÂÞ˹ÓйصÄPlayÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬£¬¹¥»÷ÕßÔÚ°µÍøÐ¹Â¶¼à¿ØÂ¼Ïñ¼°5.5GBÄÚ²¿Îļþ¡£¡£¡£´Ë´Îй¶°üÀ¨²ÆÎñ±¨¸æ£¨ÖðÈÕÏúÊÛ¶î¡¢ÀûÈ󱨸桢×ʲúÇ·Õ®±í¼°ÀúÄêÒµ¼¨½ÏÁ¿£©¡¢²É¹º·¢Æ±£¨ÊÖÒÕ×°±¸Óëά»¤±¾Ç®£©¡¢¼à¿ØÆ¬¶Ï£¨º¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢£©¡¢Ð½×ʱ任֪ͨ£¨Ô±¹¤ÐÕÃû¼°Ð½×ʱê×¼£©¡¢×°ÐÞÍýÏ루Ա¹¤ÁªÏµ·½·¨£©¡¢ÊÂÇéÆÀ¹À±ê×¼¡¢ÅàѵÖÊÁϼ°ÄÚ²¿Õþ²ßÎļþµÈÃô¸ÐÐÅÏ¢¡£¡£¡£PlayÍÅ»ïÒÔË«ÖØÀÕË÷ÊÖÒÕÖøÃû£¬£¬£¬ÒªÇóÖ§¸¶½âÃÜÓöȲ¢°ü¹Ü²»ÀÄÓñ»µÁÊý¾Ý¡£¡£¡£ÈôÆóÒµ¾Ü¾ø£¬£¬£¬ÆäÊý¾Ý½«±»¹ûÕæÒÔʩѹ¡£¡£¡£´Ë´ÎSuper QuikÊý¾Ýй¶¿ÉÄÜÒý·¢¶àÖØÎ£º¦£º²ÆÎñ±¨¸æÓ뷢Ʊ¿ÉÄÜ̻¶ÉÌÒµÇ鱨¡¢¹©Ó¦É̶¨¼Û¼°»ù´¡Éèʩϸ½Ú£¬£¬£¬±»¾ºÕùµÐÊÖʹÓ㻣»£»£»£»£»£»¼à¿ØÆ¬¶Ï¿ÉÄÜ̻¶¼à¿ØÃ¤Çø£¬£¬£¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢Éæ¼°Òþ˽ÓëÖ´·¨ÎÊÌ⣻£»£»£»£»£»£»Ð½×Ê¡¢ÁªÏµ·½·¨µÈÊý¾ÝÔöÌíÉí·Ý͵ÇÔÓëÉç»á¹¤³Ì¹¥»÷Σº¦£»£»£»£»£»£»£»ÄÚ²¿ÎļþÄ£°å¿ÉÄܱ»ÓÃÓÚÕ©Æ£¬£¬£¬ÍþвÐÔÓïÑÔÎļþÔò¿ÉÄÜË𺦹«Ë¾¹«ÖÚÐÎÏ󡣡£¡£
https://cybernews.com/security/ransomware-super-quik-data-leak/
4. Gootloader¶ñÒâÈí¼þ7¸öÔºó¾íÍÁÖØÀ´
11ÔÂ5ÈÕ£¬£¬£¬Gootloader¶ñÒâÈí¼þ¼ÓÔØÆ÷ÔÚÏûÊÅ7¸öÔºóÖØÏÖ£¬£¬£¬Í¨¹ýSEOͶ¶¾ÍƹãÐéÎ±ÍøÕ¾ÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¸Ã»ùÓÚJavaScriptµÄ¼ÓÔØÆ÷ͨ¹ý±»ÈëÇÖ»ò¹¥»÷Õß¿ØÖƵÄÍøÕ¾£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâÎĵµ¡£¡£¡£Æä¹¥»÷Á´ÌõʼÓÚSEOͶ¶¾£¬£¬£¬Í¨¹ýÓÅ»¯Ìض¨Òªº¦´Ê£¨ÈçÖ´·¨ÎļþºÍÐÒ飩ÔÚËÑË÷ÒýÇæÖеÄÅÅÃû£¬£¬£¬ÎüÒýÓû§»á¼ûαװ³ÉÖ´·¨ÎļþÄ£°å·ÖÏíÆ½Ì¨µÄÍøÕ¾¡£¡£¡£µ±Óû§µã»÷¡°»ñÈ¡Îĵµ¡±°´Å¥Ê±£¬£¬£¬ÍøÕ¾»áÑéÖ¤ÊÇ·ñΪÕýµ±Óû§£¬£¬£¬ËæºóÏÂÔØ°üÀ¨.jsÀ©Õ¹ÃûµÄ¶ñÒâѹËõ°ü¡£¡£¡£Ö´Ðк󣬣¬£¬Gootloader»áÏÂÔØCobalt Strike¡¢ºóÃųÌÐò¼°½©Ê¬³ÌÐòµÈ¶ñÒâÔØºÉ£¬£¬£¬Îª¹¥»÷ÕßÌṩÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ£¬£¬£¬×îÖÕ¿ÉÄܰ²ÅÅÀÕË÷Èí¼þ¡£¡£¡£´Ë´Î»Ø¹é£¬£¬£¬Gootloader½ÓÄɶàÏîÐÂÊÖÒÕ¹æ±Ü¼ì²â£ºÍ¨¹ýÌØÊâÍøÒ³×ÖÌåÌæ»»×ÖÐΣ¬£¬£¬ÔÚHTMLÔ´´úÂëÖÐÒþ²Ø¡°·¢Æ±¡±¡°ÌõÔ¼¡±µÈÒªº¦´Ê£»£»£»£»£»£»£»Ê¹ÓÃÃûÌùýʧµÄZIPÎļþ£¬£¬£¬Windows×ÊÔ´ÖÎÀíÆ÷½âѹʱÊͷŶñÒâJSÎļþ£¬£¬£¬¶øÇå¾²¹¤¾ß½âѹÔòÏÔʾÎÞº¦Îı¾Îļþ£¬£¬£¬×ÌÈÅÆÊÎö¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷ÕßÖ²ÈëSupper SOCKS5ºóÃÅ£¬£¬£¬ÊµÏÖÔ¶³Ì»á¼û¡£¡£¡£
https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/
5. ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾ÔâºÚ¿ÍÈëÇÖÖÂСÎÒ˽¼ÒÐÅϢй¶
11ÔÂ5ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾£¨HAEA£©ÔâÓöºÚ¿ÍÈëÇÖ£¬£¬£¬¹¥»÷Õßͨ¹ý²»·¨»á¼ûÆäITÇéÐÎÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂ루SSN£©¼°¼ÝʻִÕÕÔÚÄÚµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ1ÈÕÊ״η¢Ã÷ÈëÇÖ¼£Ï󣬣¬£¬ËæºóÁ¬Ã¦ÁªºÏÍâ²¿ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÕö¿ªÊӲ죬£¬£¬È·ÈϹ¥»÷ʼÓÚ2ÔÂ22ÈÕÇÒÒÑ¿ØÖÆÊ±ÊÆ¡£¡£¡£HAEA×÷ΪÏÖ´úÆû³µ¼¯ÍÅ×Ó¹«Ë¾£¬£¬£¬ÈÏÕæÎªÆû³µÈ«ÉúÃüÖÜÆÚÌṩITЧÀÍ£¬£¬£¬º¸ÇÔ¶³ÌÐÅÏ¢´¦Öóͷ£¡¢OTA¸üС¢×Ô¶¯¼Ýʻϵͳ¼°Êý×Ö»¯ÖÆÔìÆ½Ì¨µÈ£¬£¬£¬Ð§À͹æÄ£ÁýÕÖ270ÍòÁ¾Æû³µ¡¢200ÍòÓû§¼°5000ÃûÔ±¹¤¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÆäϵͳÇå¾²ÐÔÎó²î£¬£¬£¬µ«ÏêϸÊÜÓ°ÏìÈËÊý¼°ÊÇ·ñÉæ¼°¿Í»§/Óû§Êý¾ÝÈÔ²»Ã÷È·¡£¡£¡£ÊÂÎñÊÓ²ìÏÔʾ£¬£¬£¬Ð¹Â¶ÐÅÏ¢ÀàÐͱ£´æ²î±ð£ºÍ¨ÖªÐŽöÌá¼°ÐÕÃû£¬£¬£¬¶øÂíÈøÖîÈûÖÝÕþ¸®ÃÅ»§ÍøÕ¾Ôö²¹ÁгöÁËSSNºÍ¼ÝÕÕÐÅÏ¢¡£¡£¡£×èÖ¹·¢¸å£¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬ÕØÊÂÕßÉí·ÝÈÔ³ÉÃÕ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/
6. CISA½ôÆÈת´ïCentOS Web Panel¸ßΣÎó²î
11ÔÂ5ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃCentOS Web Panel£¨CWP£©ÖеÄCVE-2025-48703Ô¶³ÌÏÂÁîÖ´ÐÐÎó²îÌᳫ¹¥»÷¡£¡£¡£¸ÃÎó²îÔÊÐíδÊÚȨ¹¥»÷Õßͨ¹ýÓÐÓÃÓû§ÃûÔÚCWPʵÀýÉÏÖ´ÐÐí§ÒâshellÏÂÁ£¬£¬Ó°Ïì0.9.8.1204֮ǰËùÓа汾¡£¡£¡£CWP×÷ΪÃâ·Ñ¿ªÔ´µÄLinuxЧÀÍÆ÷ÖÎÀíÃæ°å£¬£¬£¬±»ÆÕ±éÓÃÓÚÍøÕ¾Íйܡ¢ÏµÍ³ÖÎÀí¼°VPS/×ÔÁ¦Ð§ÀÍÆ÷ÔËÓª£¬£¬£¬ÆäÎó²îΣº¦²¨¼°È«Çò´ó×ÚÆóÒµ¼°Ð¡ÎÒ˽¼ÒÓû§¡£¡£¡£Îó²îȪԴÔÚÓÚÎļþÖÎÀíÆ÷¡°changePerm¡±¶Ëµã±£´æÉè¼ÆÈ±ÏÝ£ºµ±ÇëÇóÖÐÊ¡ÂÔÓû§±êʶ·ûʱ£¬£¬£¬ÏµÍ³ÈԻᴦÖóͷ£Î´ÊÚȨÇëÇ󣬣¬£¬ÇÒ¡°t_total¡±²ÎÊýδ¾Çå¾²¹ýÂËÖ±½Ó´«ÈëshellÏÂÁ£¬£¬µ¼ÖÂÏÂÁî×¢ÈëΣº¦¡£¡£¡£Çå¾²Ñо¿Ô±Maxime RinaudoÓÚ6ÔÂÏÂÑ®ÔÚCentOS 7ÇéÐÎÖÐÀÖ³ÉÑÝʾÁËʹÓÃÀú³Ì£¬£¬£¬Í¨¹ýÏò¸Ã¶Ëµã·¢ËͶñÒâPOSTÇëÇ󣬣¬£¬¿É×¢Èë·´ÏòshellÒÔÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£CISAÒѽ«¸ÃÎó²îÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬²¢ÒÀ¾ÝBOD 22-01Ö¸ÄÏÒªÇóÁª°î»ú¹¹ÔÚ11ÔÂ25ÈÕǰӦÓÃÐÞ¸´²¹¶¡£¡£¡£¨Ðû²¼ÓÚ6ÔÂ18ÈÕ£©£¬£¬£¬»ò×èֹʹÓÃÊÜÓ°Ïì²úÆ·¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ