Win 11×îв¹¶¡µ¼ÖÂMalwarebytesÓëChrome²»¼æÈÝ
Ðû²¼Ê±¼ä 2023-06-16¾ÝýÌå6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬±¾ÖܶþÐû²¼µÄWindows 11 22H2 KB5027231ÀÛ»ý¸üÐÂÓ°ÏìÁËMalwarebytes¿Í»§ÏµÍ³ÉϵÄGoogle Chrome¡£¡£¡£¡£Ò»Î»ÖÎÀíԱ˵£¬£¬£¬£¬£¬£¬£¬×°ÖøüкóChromeä¯ÀÀÆ÷·ºÆðÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÊÔͼͨ¹ýWSUS»Ø¹ö£¬£¬£¬£¬£¬£¬£¬ÊÂÎñÉó²éÆ÷ÖÐÏÔʾ¡°catastrophic error¡±£¬£¬£¬£¬£¬£¬£¬²¢ÇÒWSUSÏÔʾ²»¿É»Ø¹ö¡£¡£¡£¡£ChromeÀú³ÌÏÖʵÉÏÕýÔÚÔËÐУ¬£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚ³åÍ»¶øÎÞ·¨ÍêÈ«Æô¶¯Ó¦ÓóÌÐòºÍ¼ÓÔØÓû§½çÃæ¡£¡£¡£¡£MalwarebytesÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Win 11¸üе¼ÖÂChromeÓëÎó²îʹÓñ£»£»£»£»£»£»£»¤±¬·¢³åÍ»£¬£¬£¬£¬£¬£¬£¬½ø¶øµ¼ÖÂä¯ÀÀÆ÷Í߽⡣¡£¡£¡£Óöµ½´ËÎÊÌâµÄÓû§¿ÉÒÔ´ÓÆäMalwarebytesÊܱ£»£»£»£»£»£»£»¤Ó¦ÓóÌÐòÁбíÖйرÕÍøÂçä¯ÀÀÆ÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5027231-update-breaks-google-chrome-for-malwarebytes-users/
2¡¢ÃÀ¹ú¶à¸öÕþ¸®»ú¹¹Ôâµ½ÀÕË÷ÍÅ»ïClopµÄ¹¥»÷
¾Ý6ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¶à¸öÕþ¸®»ú¹¹Ôâµ½ÁËÀÕË÷ÍÅ»ïClopµÄ¹¥»÷¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËMOVEitÎļþ´«Ê乤¾ßÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬CISA³ÆÆäÕýÔÚºÍFBIÆð¾¢ÎªÊ¹ÓÃMOVEitµÄÁª°î»ú¹¹Ìṩ×ÊÖú£¬£¬£¬£¬£¬£¬£¬È·ÈϹ¥»÷µÄÓ°Ï첢ʵʱµ÷½â¡£¡£¡£¡£¹Ù·½¾Ü¾øÍ¸Â¶ÊÜÓ°ÏìµÄ»ú¹¹µÄÃû³ÆºÍÊýÄ¿£¬£¬£¬£¬£¬£¬£¬µ«Ò»Î»ÄÜÔ´²¿½²»°ÈË͸¶£¬£¬£¬£¬£¬£¬£¬¸Ã²¿·ÖÊÇÔâµ½ÈëÇֵĶà¸öÁª°î»ú¹¹Ö®Ò»¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ó¢¹úʯÓͺÍ×ÔÈ»Æø¹«Ë¾¿ÇÅÆÔÚ±¾ÖÜËÄ͸¶ÆäÒ²Ôâµ½ÁËClopÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾È¥ÄêµÄÊÕÈëÁè¼Ý3810ÒÚÃÀÔª¡£¡£¡£¡£
https://therecord.media/several-us-federal-agencies-affected-by-moveit-breach
3¡¢HP¹ûÕæÍ¨¹ý¶ñÒâÍøÕ¾·Ö·¢ChromeÀ©Õ¹ShampooµÄ»î¶¯
6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬HP¹ûÕæÁËÒ»¸öÕýÔÚ¾ÙÐÐÖеÄÐÂChromeLoader»î¶¯¡£¡£¡£¡£¸Ã»î¶¯Ê¼ÓÚ3Ô£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÉù³Æ¿ÉÃâ·ÑÏÂÔØµÁ°æÒôÀÖ¡¢Ó°Ï·»òÓÎÏ·µÄ¶ñÒâÍøÕ¾·Ö·¢ChromeLoader¡£¡£¡£¡£ÓÕʹĿµÄÏÂÔØÖ´ÐÐPowerShell¾ç±¾µÄVBScript£¬£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾ÉèÖÃÒÔ¡°chrome_¡±ÎªÇ°×ºµÄÍýÏëʹÃü¡£¡£¡£¡£´ËʹÃü»á´¥·¢Ò»ÏµÁо籾£¬£¬£¬£¬£¬£¬£¬½«ÐµÄPowerShell¾ç±¾ÏÂÔØ²¢ÉúÑĵ½×¢²á±íÖУ¬£¬£¬£¬£¬£¬£¬Í¬Ê±»á»ñÈ¡¶ñÒâChromeÀ©Õ¹Shampoo¡£¡£¡£¡£ShampooÊÇChromeLoaderµÄ±äÌ壬£¬£¬£¬£¬£¬£¬Äܹ»ÔÚÄ¿µÄ»á¼ûµÄÍøÕ¾ÉÏ×¢Èë¹ã¸æ²¢Ö´ÐÐËÑË÷ÅÌÎÊÖØ¶¨Ïò¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites/
4¡¢Trellix³ÆÐÂÇÔÈ¡³ÌÐòSkuldÕë¶ÔÎ÷Å·ºÍ¶«ÄÏÑǵȵØ
TrellixÔÚ6ÔÂ13ÈÕ³ÆÆä·¢Ã÷ÁËÐÂÐÍGolangÇÔÈ¡³ÌÐòSkuld£¬£¬£¬£¬£¬£¬£¬ÒÑÈëÇÖÅ·ÖÞ¡¢¶«ÄÏÑǺÍÃÀ¹úµÄWindowsϵͳ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô4ÔÂÏÂÑ®×îÏȱ¬·¢£¬£¬£¬£¬£¬£¬£¬»áËÑË÷´æ´¢ÔÚDiscordºÍä¯ÀÀÆ÷µÈÓ¦ÓÃÖеÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÏµÍ³µÄÐÅÏ¢ºÍÎļþ¼ÐÖеÄÎļþ¡£¡£¡£¡£²¿·ÖÑù±¾ÉõÖÁ°üÀ¨ÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ¸ÃÄ£¿£¿£¿£¿£¿£¿éÈÔÔÚ¿ª·¢ÖС£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±Deathined´Ó¶à¸ö¿ªÔ´ÏîÄ¿ºÍ¶ñÒâÈí¼þÑù±¾ÖÐÂÞÖÂÁé¸Ð£¬£¬£¬£¬£¬£¬£¬½«¹¦Ð§ÒÆÖ²µ½GolangÀ´¹¹½¨Skuld¡£¡£¡£¡£
https://www.trellix.com/en-us/about/newsroom/stories/research/skuld-the-infostealer-that-speaks-golang.html
5¡¢Î¢ÈíÐû²¼¹ØÓÚºÚ¿ÍÍÅ»ïCadet BlizzardµÄÆÊÎö±¨¸æ
6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïCadet BlizzardµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¾ÝÐÅ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÓÚ2020Äê×îÏÈÔËÓª£¬£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹GRUÓйأ¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÎÚ¿ËÀ¼µÄÕþ¸®Ð§ÀÍ¡¢Ö´·¨»ú¹¹¡¢·ÇÓªÀû/·ÇÕþ¸®×éÖ¯¡¢ITЧÀÍÌṩÉÌ/×Éѯ¹«Ë¾ºÍ½ôÆÈЧÀÍ¡£¡£¡£¡£²¢½«ÆäÓë2022Äê1ÔÂ13ÈÕÕë¶ÔÎÚ¿ËÀ¼µÄWhisperGate¹¥»÷ÁªÆðÀ´¡£¡£¡£¡£¸ÃÍÅ»ïÔÚ2022Äê6ÔÂÖ®ºóÖð½¥µ³öÈËÃǵÄÊÓÏߣ¬£¬£¬£¬£¬£¬£¬µ«ÔÚ2023ÄêÍ·ÖØÐ¸¡³öË®Ãæ¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÓëAPT28ºÍSandwormµÈÆäËüGRUÏà¹ØºÚ¿ÍÍÅ»ïÏà±È£¬£¬£¬£¬£¬£¬£¬Cadet Blizzard¹¥»÷µÄÀÖ³ÉÂÊÏà¶Ô½ÏµÍ¡£¡£¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/06/14/cadet-blizzard-emerges-as-a-novel-and-distinct-russian-threat-actor/
6¡¢StairwellÅû¶ChamelGangÖ²Èë³ÌÐòChamelDoHµÄϸ½Ú
6ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬StairwellÅû¶ºÚ¿ÍÍÅ»ïChamelGangµÄÐÂÖ²Èë³ÌÐòChamelDoHµÄϸ½Ú¡£¡£¡£¡£ÕâÊÇÒ»ÖÖÓÃC++¿ª·¢µÄLinuxÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÔ¶³Ì»á¼ûÄ¿µÄϵͳ£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýDNS-over-HTTPS (DoH)ËíµÀÓëÉèÖõÄC2»ù´¡ÉèʩͨѶ¡£¡£¡£¡£ËùÓжñÒâÈí¼þµÄͨѶ¶¼Ê¹ÓÃAES128ºÍÐ޸ĺóµÄbase64±àÂë¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨·Ç×ÖĸÊý×Ö×Ö·ûµÄÌæ»»¡£¡£¡£¡£¸ÃÖ²Èë³ÌÐòÍøÂçϵͳµÄÐÅÏ¢À´ÆÊÎö±»Ñ¬È¾µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬²¢Äܹ»¾ÙÐлù±¾µÄÔ¶³Ì»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬ÀýÈçÎļþÉÏ´«¡¢ÏÂÔØ¡¢É¾³ýºÍÖ´ÐС£¡£¡£¡£
https://stairwell.com/news/chamelgang-and-chameldoh-a-dns-over-https-implant/


¾©¹«Íø°²±¸11010802024551ºÅ