¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷

Ðû²¼Ê±¼ä 2025-11-06

1. ¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷


11ÔÂ4ÈÕ£¬£¬ £¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯Curly COMrades±»ÆØ×Ô2024ÄêÄêÖÐÆð»îÔ¾£¬£¬ £¬£¬Æä»î¶¯Óë¶íÂÞ˹µØÔµÕþÖÎÀûÒæÇ×½üÏà¹Ø¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÀÄÓÃWindowsרҵ°æ/ÆóÒµ°æ¼°Windows ServerÖеÄMicrosoft Hyper-VÐéÄ⻯ÊÖÒÕ£¬£¬ £¬£¬½¨ÉèÒþ²ØµÄ»ùÓÚAlpine LinuxµÄÇáÁ¿¼¶ÐéÄâ»ú£¨½öÕ¼ÓÃ120MB´ÅÅ̿ռäºÍ256MBÄڴ棩ÔËÐжñÒâÈí¼þ£¬£¬ £¬£¬ÀÖ³ÉÈÆ¹ý¹Å°å»ùÓÚÖ÷»úµÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¼Æ»®¡£¡£¡£¡£¡£ÐéÄâ»úÄÚÍйÜÁË×Ô½ç˵¹¤¾ßCurlyShell·´ÏòshellºÍCurlCat·´ÏòÊðÀí£ºÇ°Õßͨ¹ýcron×÷Òµ¼á³Ö³¤ÆÚ»¯£¬£¬ £¬£¬ÒÔÎÞͷģʽÔËÐв¢Í¨¹ýHTTPSÅþÁ¬C2ЧÀÍÆ÷Ö´ÐÐÏÂÁ£»£»£»£»ºóÕß×÷ΪSOCKSÊðÀí·â×°SSHÁ÷Á¿ÎªHTTPSÇëÇ󣬣¬ £¬£¬ÊµÏÖÒþ²ØËíµÀ´«Ê䣬£¬ £¬£¬Ê¹¶ñÒâÁ÷Á¿Î±×°³ÉÕýµ±Ö÷»úIPµØµã¡£¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬ £¬£¬ÍþвÐÐΪÕßÊ×ÏÈÔ¶³Ì»á¼ûÊܺ¦Õßϵͳ£¬£¬ £¬£¬ÆôÓÃHyper-V²¢½ûÓÃÆäÖÎÀí½çÃæ£¬£¬ £¬£¬°²ÅÅ»ùÓÚAlpine LinuxµÄ¼«¼òÐéÄâ»ú¡£¡£¡£¡£¡£BitdefenderÓë¸ñ³¼ªÑÇCERTÏàÖúÊӲ췢Ã÷£¬£¬ £¬£¬¸Ã×éÖ¯»¹Ê¹ÓÃÁ½¸öPowerShell¾ç±¾Ç¿»¯¹¥»÷£ºÆäÒ»½«KerberosƱ¾Ý×¢ÈëLSASSÒÔʵÏÖÔ¶³ÌϵͳÉí·ÝÑéÖ¤ºÍÏÂÁîÖ´ÐУ»£»£»£»£»Æä¶þͨ¹ý×éÕ½ÂÔÔÚÓòÄÚ¶ą̀ÅÌËã»ú½¨ÉèÍâµØÕË»§£¬£¬ £¬£¬Ö§³ÖºáÏòÒÆ¶¯¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/


2. ¡¶ÐûÑÔ±¨¡·Êý¾Ýй¶£¬£¬ £¬£¬ÕþÖÎÒþ˽Σº¦Í¹ÏÔ


11ÔÂ4ÈÕ£¬£¬ £¬£¬Òâ´óÀû×óÒí±ê¼ÇÐÔ±¨Ö½¡¶ÐûÑÔ±¨¡·£¨Il Manifesto£©ÒòδÉèÖÃÃÜÂë±£»£»£»£»£»¤µÄClickHouseÊý¾Ý¿â£¬£¬ £¬£¬µ¼ÖÂ15Íò¸¶·Ñ¶©ÔÄÓû§ÓÊÏä¼°1100ÍòÌõ·Ã¿ÍÐÐΪÈÕ־й¶¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨×°±¸ÊÖÒÕϸ½Ú¡¢»á»°ÁîÅÆ¡¢IPµØµã¡¢¾«¶È´ï11Ã×µÄGeoIPÐÅÏ¢¼°ÎÄÕÂÍÆ¼öȪԴµÈÃô¸ÐÊý¾Ý£¬£¬ £¬£¬»¹Ì»Â¶ÁËÄÚ²¿ÍøÕ¾ÆÊÎöÊý¾Ý£¨ÈçÎÄÕÂÌåÏÖ¡¢ÊÜÖÚÐÐΪ¡¢Òý¼öȪԴ£©£¬£¬ £¬£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚÉÌÒµÇ鱨ÇÔÈ¡¡£¡£¡£¡£¡£×÷Ϊ1969Ä꽨ÉèµÄ¼¤½ø×óÒí¿¯Î£¬ £¬£¬¡¶ÐûÑÔ±¨¡·Ôø¼ÓÈë1972Äê´óÑ¡²¢ÔâÓö2000Äêз¨Î÷˹·Ö×ÓÕ¨µ¯Ï®»÷δË죬£¬ £¬£¬ÏÖΪ·ÇÓªÀûÏàÖúÉ磬£¬ £¬£¬ÈÕ¿¯ÐÐÁ¿Ô¼1.5Íò·Ý¡£¡£¡£¡£¡£´Ë´Îй¶ËäÎ´Éæ¼°ÃÜÂë»òÖ±½ÓÕË»§Æ¾Ö¤£¬£¬ £¬£¬µ«¶ÁÕßÔĶÁ¼Í¼Òò·´Ó¦ÕþÖÎÐËȤÓëÐÅÑö£¬£¬ £¬£¬ÊôÓÚÅ·ÖÞÒþ˽·¨ÖС°ÌØÊâÖÖ±ð¡±ÐÅÏ¢£¬£¬ £¬£¬ÃæÁÙ¸üÑϿᱣ»£»£»£»£»¤¡£¡£¡£¡£¡£ÈôÊý¾Ý±»ÕþÖÎÄîÍ·Õß»ñÈ¡£¡£¡£¡£¡£¬£¬ £¬£¬¶ÁÕßÓ뱨Éç¿ÉÄÜÔâÕþ¸®É§ÈÅ»ò¼àÊÓ¡£¡£¡£¡£¡£


https://cybernews.com/security/il-manifesto-data-leak-exposed-readers/


3. ÃÀ¹úSuper QuikÔâ¶í¹ØÁªÀÕË÷ÍŻ﹥»÷


11ÔÂ3ÈÕ£¬£¬ £¬£¬ÃÀ¹úÇøÓòÐÔ¼ÓÓÍÕ¾Á¬ËøµêSuper QuikÔâÓë¶íÂÞ˹ÓйصÄPlayÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬ £¬£¬¹¥»÷ÕßÔÚ°µÍøÐ¹Â¶¼à¿ØÂ¼Ïñ¼°5.5GBÄÚ²¿Îļþ¡£¡£¡£¡£¡£´Ë´Îй¶°üÀ¨²ÆÎñ±¨¸æ£¨ÖðÈÕÏúÊÛ¶î¡¢ÀûÈ󱨸桢×ʲúÇ·Õ®±í¼°ÀúÄêÒµ¼¨½ÏÁ¿£©¡¢²É¹º·¢Æ±£¨ÊÖÒÕ×°±¸Óëά»¤±¾Ç®£©¡¢¼à¿ØÆ¬¶Ï£¨º¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢£©¡¢Ð½×ʱ任֪ͨ£¨Ô±¹¤ÐÕÃû¼°Ð½×ʱê×¼£©¡¢×°ÐÞÍýÏ루Ա¹¤ÁªÏµ·½·¨£©¡¢ÊÂÇéÆÀ¹À±ê×¼¡¢ÅàѵÖÊÁϼ°ÄÚ²¿Õþ²ßÎļþµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£PlayÍÅ»ïÒÔË«ÖØÀÕË÷ÊÖÒÕÖøÃû£¬£¬ £¬£¬ÒªÇóÖ§¸¶½âÃÜÓöȲ¢°ü¹Ü²»ÀÄÓñ»µÁÊý¾Ý¡£¡£¡£¡£¡£ÈôÆóÒµ¾Ü¾ø£¬£¬ £¬£¬ÆäÊý¾Ý½«±»¹ûÕæÒÔʩѹ¡£¡£¡£¡£¡£´Ë´ÎSuper QuikÊý¾Ýй¶¿ÉÄÜÒý·¢¶àÖØÎ£º¦£º²ÆÎñ±¨¸æÓ뷢Ʊ¿ÉÄÜ̻¶ÉÌÒµÇ鱨¡¢¹©Ó¦É̶¨¼Û¼°»ù´¡Éèʩϸ½Ú£¬£¬ £¬£¬±»¾ºÕùµÐÊÖʹÓ㻣»£»£»£»¼à¿ØÆ¬¶Ï¿ÉÄÜ̻¶¼à¿ØÃ¤Çø£¬£¬ £¬£¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢Éæ¼°Òþ˽ÓëÖ´·¨ÎÊÌ⣻£»£»£»£»Ð½×Ê¡¢ÁªÏµ·½·¨µÈÊý¾ÝÔöÌíÉí·Ý͵ÇÔÓëÉç»á¹¤³Ì¹¥»÷Σº¦£»£»£»£»£»ÄÚ²¿ÎļþÄ£°å¿ÉÄܱ»ÓÃÓÚÕ©Æ­£¬£¬ £¬£¬ÍþвÐÔÓïÑÔÎļþÔò¿ÉÄÜË𺦹«Ë¾¹«ÖÚÐÎÏ󡣡£¡£¡£¡£


https://cybernews.com/security/ransomware-super-quik-data-leak/


4. Gootloader¶ñÒâÈí¼þ7¸öÔºó¾íÍÁÖØÀ´


11ÔÂ5ÈÕ£¬£¬ £¬£¬Gootloader¶ñÒâÈí¼þ¼ÓÔØÆ÷ÔÚÏûÊÅ7¸öÔºóÖØÏÖ£¬£¬ £¬£¬Í¨¹ýSEOͶ¶¾ÍƹãÐéÎ±ÍøÕ¾ÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã»ùÓÚJavaScriptµÄ¼ÓÔØÆ÷ͨ¹ý±»ÈëÇÖ»ò¹¥»÷Õß¿ØÖƵÄÍøÕ¾£¬£¬ £¬£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâÎĵµ¡£¡£¡£¡£¡£Æä¹¥»÷Á´ÌõʼÓÚSEOͶ¶¾£¬£¬ £¬£¬Í¨¹ýÓÅ»¯Ìض¨Òªº¦´Ê£¨ÈçÖ´·¨ÎļþºÍЭÒ飩ÔÚËÑË÷ÒýÇæÖеÄÅÅÃû£¬£¬ £¬£¬ÎüÒýÓû§»á¼ûαװ³ÉÖ´·¨ÎļþÄ£°å·ÖÏíÆ½Ì¨µÄÍøÕ¾¡£¡£¡£¡£¡£µ±Óû§µã»÷¡°»ñÈ¡Îĵµ¡±°´Å¥Ê±£¬£¬ £¬£¬ÍøÕ¾»áÑéÖ¤ÊÇ·ñΪÕýµ±Óû§£¬£¬ £¬£¬ËæºóÏÂÔØ°üÀ¨.jsÀ©Õ¹ÃûµÄ¶ñÒâѹËõ°ü¡£¡£¡£¡£¡£Ö´Ðк󣬣¬ £¬£¬Gootloader»áÏÂÔØCobalt Strike¡¢ºóÃųÌÐò¼°½©Ê¬³ÌÐòµÈ¶ñÒâÔØºÉ£¬£¬ £¬£¬Îª¹¥»÷ÕßÌṩÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ£¬£¬ £¬£¬×îÖÕ¿ÉÄܰ²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£´Ë´Î»Ø¹é£¬£¬ £¬£¬Gootloader½ÓÄɶàÏîÐÂÊÖÒÕ¹æ±Ü¼ì²â£ºÍ¨¹ýÌØÊâÍøÒ³×ÖÌåÌæ»»×ÖÐΣ¬£¬ £¬£¬ÔÚHTMLÔ´´úÂëÖÐÒþ²Ø¡°·¢Æ±¡±¡°ÌõÔ¼¡±µÈÒªº¦´Ê£»£»£»£»£»Ê¹ÓÃÃûÌùýʧµÄZIPÎļþ£¬£¬ £¬£¬Windows×ÊÔ´ÖÎÀíÆ÷½âѹʱÊͷŶñÒâJSÎļþ£¬£¬ £¬£¬¶øÇå¾²¹¤¾ß½âѹÔòÏÔʾÎÞº¦Îı¾Îļþ£¬£¬ £¬£¬×ÌÈÅÆÊÎö¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬¹¥»÷ÕßÖ²ÈëSupper SOCKS5ºóÃÅ£¬£¬ £¬£¬ÊµÏÖÔ¶³Ì»á¼û¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/


5. ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾ÔâºÚ¿ÍÈëÇÖÖÂСÎÒ˽¼ÒÐÅϢй¶


11ÔÂ5ÈÕ£¬£¬ £¬£¬¿ËÈÕ£¬£¬ £¬£¬ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾£¨HAEA£©ÔâÓöºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬¹¥»÷Õßͨ¹ý²»·¨»á¼ûÆäITÇéÐÎÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂ루SSN£©¼°¼ÝʻִÕÕÔÚÄÚµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ1ÈÕÊ״η¢Ã÷ÈëÇÖ¼£Ï󣬣¬ £¬£¬ËæºóÁ¬Ã¦ÁªºÏÍâ²¿ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÕö¿ªÊӲ죬£¬ £¬£¬È·ÈϹ¥»÷ʼÓÚ2ÔÂ22ÈÕÇÒÒÑ¿ØÖÆÊ±ÊÆ¡£¡£¡£¡£¡£HAEA×÷ΪÏÖ´úÆû³µ¼¯ÍÅ×Ó¹«Ë¾£¬£¬ £¬£¬ÈÏÕæÎªÆû³µÈ«ÉúÃüÖÜÆÚÌṩITЧÀÍ£¬£¬ £¬£¬º­¸ÇÔ¶³ÌÐÅÏ¢´¦Öóͷ£¡¢OTA¸üС¢×Ô¶¯¼Ýʻϵͳ¼°Êý×Ö»¯ÖÆÔìÆ½Ì¨µÈ£¬£¬ £¬£¬Ð§À͹æÄ£ÁýÕÖ270ÍòÁ¾Æû³µ¡¢200ÍòÓû§¼°5000ÃûÔ±¹¤¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÆäϵͳÇå¾²ÐÔÎó²î£¬£¬ £¬£¬µ«ÏêϸÊÜÓ°ÏìÈËÊý¼°ÊÇ·ñÉæ¼°¿Í»§/Óû§Êý¾ÝÈÔ²»Ã÷È·¡£¡£¡£¡£¡£ÊÂÎñÊÓ²ìÏÔʾ£¬£¬ £¬£¬Ð¹Â¶ÐÅÏ¢ÀàÐͱ£´æ²î±ð£ºÍ¨ÖªÐŽöÌá¼°ÐÕÃû£¬£¬ £¬£¬¶øÂíÈøÖîÈûÖÝÕþ¸®ÃÅ»§ÍøÕ¾Ôö²¹ÁгöÁËSSNºÍ¼ÝÕÕÐÅÏ¢¡£¡£¡£¡£¡£×èÖ¹·¢¸å£¬£¬ £¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬ £¬£¬ÕØÊÂÕßÉí·ÝÈÔ³ÉÃÕ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/


6. CISA½ôÆÈת´ïCentOS Web Panel¸ßΣÎó²î


11ÔÂ5ÈÕ£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬£¬ £¬£¬ÍþвÐÐΪÕßÕýʹÓÃCentOS Web Panel£¨CWP£©ÖеÄCVE-2025-48703Ô¶³ÌÏÂÁîÖ´ÐÐÎó²îÌᳫ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδÊÚȨ¹¥»÷Õßͨ¹ýÓÐÓÃÓû§ÃûÔÚCWPʵÀýÉÏÖ´ÐÐí§ÒâshellÏÂÁ£¬ £¬£¬Ó°Ïì0.9.8.1204֮ǰËùÓа汾¡£¡£¡£¡£¡£CWP×÷ΪÃâ·Ñ¿ªÔ´µÄLinuxЧÀÍÆ÷ÖÎÀíÃæ°å£¬£¬ £¬£¬±»ÆÕ±éÓÃÓÚÍøÕ¾Íйܡ¢ÏµÍ³ÖÎÀí¼°VPS/×ÔÁ¦Ð§ÀÍÆ÷ÔËÓª£¬£¬ £¬£¬ÆäÎó²îΣº¦²¨¼°È«Çò´ó×ÚÆóÒµ¼°Ð¡ÎÒ˽¼ÒÓû§¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÎļþÖÎÀíÆ÷¡°changePerm¡±¶Ëµã±£´æÉè¼ÆÈ±ÏÝ£ºµ±ÇëÇóÖÐÊ¡ÂÔÓû§±êʶ·ûʱ£¬£¬ £¬£¬ÏµÍ³ÈԻᴦÖóͷ£Î´ÊÚȨÇëÇ󣬣¬ £¬£¬ÇÒ¡°t_total¡±²ÎÊýδ¾­Çå¾²¹ýÂËÖ±½Ó´«ÈëshellÏÂÁ£¬ £¬£¬µ¼ÖÂÏÂÁî×¢ÈëΣº¦¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Maxime RinaudoÓÚ6ÔÂÏÂÑ®ÔÚCentOS 7ÇéÐÎÖÐÀÖ³ÉÑÝʾÁËʹÓÃÀú³Ì£¬£¬ £¬£¬Í¨¹ýÏò¸Ã¶Ëµã·¢ËͶñÒâPOSTÇëÇ󣬣¬ £¬£¬¿É×¢Èë·´ÏòshellÒÔÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£CISAÒѽ«¸ÃÎó²îÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬ £¬£¬²¢ÒÀ¾ÝBOD 22-01Ö¸ÄÏÒªÇóÁª°î»ú¹¹ÔÚ11ÔÂ25ÈÕǰӦÓÃÐÞ¸´²¹¶¡£¡£¡£¡£¡£¨Ðû²¼ÓÚ6ÔÂ18ÈÕ£©£¬£¬ £¬£¬»ò×èֹʹÓÃÊÜÓ°Ïì²úÆ·¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/