¹È¸èÐÞ¸´ÁËChromeÖб»Æð¾¢Ê¹ÓõÄɳºÐÌÓÒÝÁãÈÕÎó²î

Ðû²¼Ê±¼ä 2025-07-18

1. ¹È¸èÐÞ¸´ÁËChromeÖб»Æð¾¢Ê¹ÓõÄɳºÐÌÓÒÝÁãÈÕÎó²î


7ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬¹È¸è¿ËÈÕÐû²¼Chromeä¯ÀÀÆ÷Çå¾²¸üУ¬£¬£¬£¬£¬£¬½ôÆÈÐÞ¸´Áù¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÆäÖбàºÅΪCVE-2025-6558µÄ¸ßΣÎó²îÒѱ»¹¥»÷ÕßʹÓ㬣¬£¬£¬£¬£¬ÊµÏÖɳºÐÌÓÒÝ¡£¡£¡£¡£¡£¸ÃÎó²îÑÏÖØÆ·¼¶´ï8.8·Ö£¬£¬£¬£¬£¬£¬Ó°Ïì138.0.7204.157֮ǰ°æ±¾µÄChrome£¬£¬£¬£¬£¬£¬¹È¸èÍþвÆÊÎöС×飨TAG£©ÓÚ6ÔÂ23ÈÕ·¢Ã÷ºóѸËÙÍÆ³ö²¹¶¡£¬£¬£¬£¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ138.0.7204.157/158°æ±¾¡£¡£¡£¡£¡£CVE-2025-6558µÄ½¹µãÎÊÌâÔÚÓÚChromeµÄͼÐÎÒýÇæ×é¼þANGLE¶Ô²»ÊÜÐÅÈÎÊäÈëµÄÑé֤ȱ·¦¡£¡£¡£¡£¡£ANGLE×÷Ϊ¿ªÔ´Í¼ÐÎÁýͳ²ã£¬£¬£¬£¬£¬£¬ÈÏÕæ½«OpenGL ESŲÓÃת»»ÎªÆäËûͼÐÎAPI£¨ÈçDirect3D¡¢Vulkan£©£¬£¬£¬£¬£¬£¬µ«ÆäÔÚ´¦Öóͷ£WebGLÍøÕ¾µÈȪԴµÄGPUÏÂÁîʱ±£´æÈ±ÏÝ£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýÌØÖÆHTMLÒ³ÃæÔÚGPUÀú³ÌÖÐÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬²¢×îÖÕÍ»ÆÆä¯ÀÀÆ÷ɳºÐÏÞÖÆ¡£¡£¡£¡£¡£É³ºÐ»úÖÆ±¾ÊÇChromeµÄ½¹µãÇå¾²·À»¤£¬£¬£¬£¬£¬£¬ÓÃÓÚ¸ôÀëä¯ÀÀÆ÷Àú³ÌÓë²Ù×÷ϵͳ£¬£¬£¬£¬£¬£¬±ÜÃâ¶ñÒâÈí¼þÀ©É¢ÖÁ×°±¸ÆäËû²¿·Ö¡£¡£¡£¡£¡£´Ë´ÎÎó²îµÄÍ»ÆÆ£¬£¬£¬£¬£¬£¬¿ÉÄÜʹ¹¥»÷ÕßÖ±½Ó¿ØÖÆÓû§×°±¸£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/


2. ¸ñÀ­µÂÄáÊÕÑø»ú¹¹Êý¾Ýй¶£¬£¬£¬£¬£¬£¬110ÍòÌõ¼Í¼±»ÆØ¹â


7ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÔÚÍøÂçɨÃèÖз¢Ã÷£¬£¬£¬£¬£¬£¬ÃÀ¹ú¸ñÀ­µÂÄáÊÕÑøÖÐÐÄÏà¹ØµÄ´ó×ÚδÊܱ£»£»£»£»¤Êý¾ÝÔÚÏß̻¶£¬£¬£¬£¬£¬£¬Òý·¢ÑÏÖØÒþ˽Σ»£»£»£»ú¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¿âÈÝÁ¿´ï2.49GB£¬£¬£¬£¬£¬£¬°üÀ¨Áè¼Ý110ÍòÌõÃô¸Ð¼Í¼£¬£¬£¬£¬£¬£¬Éæ¼°¶ùͯ¡¢ÑøâïÊÑ¡¢Ç×Éú¼ÒÍ¥¼°»ú¹¹Ô±¹¤£¬£¬£¬£¬£¬£¬º­¸ÇÐÕÃû¡¢ÁªÏµ·½·¨¡¢²¡Àý¼Í¼¡¢Ë½ÈËÆÀ¹ÀµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£¡£¡£¡£¡£ÕâЩÊý¾ÝδÉèÖÃÃÜÂë»ò¼ÓÃܱ£»£»£»£»¤£¬£¬£¬£¬£¬£¬Èκξ߱¸»ù´¡ÍøÂç֪ʶµÄÓû§¾ù¿Éͨ¹ý̻¶µÄÔÆÐ§ÀÍÆ÷Ö±½Ó»á¼û£¬£¬£¬£¬£¬£¬ÓÈÆäÒ×±»ÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£¡£¡£Fowler·¢Ã÷Êý¾ÝºóÁ¬Ã¦ÏòÏà¹Ø×éÖ¯ÌᳫÈÏÕæÈÎÅû¶£¬£¬£¬£¬£¬£¬Ô½ÈÕÊý¾ÝËä±»½ôÆÈÏÂÏߣ¬£¬£¬£¬£¬£¬µ«Ì»Â¶Ê±³¤¼°ÊÇ·ñÔâ¶ñÒâ»á¼ûÈÔ´æÒÉ¡£¡£¡£¡£¡£Ð¹Â¶¼Í¼Դ×Ըûú¹¹ÓÃÓÚÖÎÀí°¸ÀýÓëÏàͬµÄCRMƽ̨£¬£¬£¬£¬£¬£¬Îļþ¼Ð±ê×¢"ÁªÏµÈË""ÉêÇë""Ç×Éú¸¸Ç×"µÈ£¬£¬£¬£¬£¬£¬Ïêϸ¼Í¼ÉêÇëÈ˼ÒÍ¥Åä¾°¡¢±»¾ÜÊÕÑøÔµ¹ÊÔ­ÓÉ¡¢Ò©ÎïÀÄÓûòÖ´·¨ÎÊÌâµÈϸ½Ú¡£¡£¡£¡£¡£Ö»¹Üδ°üÀ¨ÍêÕû°¸¼þµµ°¸£¬£¬£¬£¬£¬£¬µ«µ¥Ìõ¼Í¼ÒѰüÀ¨×ã¹»ÐÅÏ¢£¬£¬£¬£¬£¬£¬×ãÒÔ³ÉΪÉç»á¹¤³Ì¹¥»÷»òÕ©Æ­µÄÄ¿µÄ¡£¡£¡£¡£¡£ÓÈΪÃô¸ÐµÄÊÇ28.4ÍòÌõµç×ÓÓʼþÔªÊý¾Ý£¬£¬£¬£¬£¬£¬ËäÎ´ÆØ¹âÍêÕûÓʼþÕýÎÄ£¬£¬£¬£¬£¬£¬µ«Ö÷ÌâÐпÉÄÜй¶ÐÕÃû»ò²Î¿¼ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÈôÁ¬Ïµ»ú¹¹ÓëÒ½ÁÆ¡¢Éç»áЧÀÍ»ú¹¹µÄ¹ØÁª¼Í¼£¬£¬£¬£¬£¬£¬Òþ˽Σº¦½«½øÒ»²½À©´ó¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âÓÉ´¿Îı¾ÓëͨÓÃΨһ±êʶ·û£¨UUID£©×é³É£¬£¬£¬£¬£¬£¬ËäUUID¿´ËÆÖش󣬣¬£¬£¬£¬£¬µ«È±·¦¼ÓÃܱ£»£»£»£»¤£¬£¬£¬£¬£¬£¬ÎÞ·¨×èֹδ¾­ÊÚȨ»á¼û¡£¡£¡£¡£¡£


https://hackread.com/massive-data-leak-texas-adoption-agency-million-records/


3. ÎÚ¿ËÀ¼·¢Ã÷APT28ʹÓÃLLMµÄÐÂÐͶñÒâÈí¼þLameHug


7ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÊÂÎñÏìӦС×飨CERT-UA£©¿ËÈÕÅû¶ÁËÒ»ÖÖÃûΪLameHugµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÆäÍ»ÆÆÐÔÌØÕ÷ÔÚÓÚÊ״ιûÕæ¼Í¼ÁËʹÓôóÐÍÓïÑÔÄ£×Ó£¨LLM£©¶¯Ì¬ÌìÉú¹¥»÷ÏÂÁîµÄ¹¥»÷ģʽ£¬£¬£¬£¬£¬£¬²¢½«¹¥»÷¹éÒòÓÚ¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄAPT28£¨Fancy Bear£©×éÖ¯¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉPython±àд£¬£¬£¬£¬£¬£¬Í¨¹ýHugging Face APIÓë°¢ÀïÔÆ¿ªÔ´µÄQwen 2.5-Coder-32B-InstructÄ£×Ó½»»¥¡£¡£¡£¡£¡£LameHugµÄ¹¥»÷Á´ÌõʼÓÚ¶ñÒâµç×ÓÓʼþ£º¹¥»÷Õßð³äÕþ¸®¹ÙÔ±£¬£¬£¬£¬£¬£¬ÏòÕþ¸®ÐÐÕþ»ú¹¹·¢ËͰüÀ¨ZIP¸½¼þµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬¸½¼þÄÚǶLameHug¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áͨ¹ýLLM¶¯Ì¬ÌìÉúϵͳÕì̽ÓëÊý¾ÝÇÔÈ¡ÏÂÁ£¬£¬£¬£¬£¬Ïêϸ²Ù×÷°üÀ¨£ºÍøÂçϵͳÐÅÏ¢²¢ÉúÑÄÖÁ¡°info.txt¡±Îļþ£»£»£»£»µÝ¹éËÑË÷¡°Îĵµ¡±¡°×ÀÃæ¡±¡°ÏÂÔØ¡±µÈÒªº¦WindowsĿ¼ÖеÄÎĵµ£»£»£»£»×îÖÕͨ¹ýSFTP»òHTTP POSTÇëÇó½«Êý¾ÝÇÔÈ¡ÖÁ¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬£¬£¬LameHugµÄÁ¢ÒìÐÔÌåÏÖÔÚÁ½·½Ã棺ÆäÒ»£¬£¬£¬£¬£¬£¬ËüÊÇÊ׸ö¹ûÕæ¼Í¼µÄʹÓÃLLMÖ§³Ö¹¥»÷ÕßʹÃüµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ê¹ÍþвÐÐΪÕßÄÜÔÚ¹¥»÷Àú³ÌÖÐʵʱµ÷½âÕ½ÂÔ£¬£¬£¬£¬£¬£¬ÎÞÐè°²ÅÅÐÂÓÐÓÃÔØºÉ£»£»£»£»Æä¶þ£¬£¬£¬£¬£¬£¬Í¨¹ýHugging Face»ù´¡ÉèÊ©¾ÙÐÐÖ¸»Ó¿ØÖÆ£¨C2£©Í¨Ñ¶£¬£¬£¬£¬£¬£¬½µµÍÁ˹ŰåC2ЧÀÍÆ÷µÄ̻¶Σº¦£¬£¬£¬£¬£¬£¬ÑÓÉìÁËÈëÇÖÒþ²ØÆÚ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¶¯Ì¬ÌìÉúµÄÏÂÁî¿É¹æ±Ü»ùÓÚ¾²Ì¬ÌØÕ÷¼ì²âµÄÇå¾²Èí¼þ£¬£¬£¬£¬£¬£¬ÔöÌíÁË·ÀÓùÄѶȡ£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lamehug-malware-uses-ai-llm-to-craft-windows-data-theft-commands-in-real-time/


4. StormousÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÑÇÀûÉ£ÄÇÖÝÒ½ÁÆÖÐÐÄ60Íò»¼ÕßÊý¾Ý


7ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Ç×¶íÀÕË÷Èí¼þ×éÖ¯Stormous¿ËÈÕÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû³Æ£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖÃÀ¹úÑÇÀûÉ£ÄÇÖݱ±²¿·ÇÓªÀûÐÔÁª°îÈÏÖ¤Ò½ÁÆÖÐÐÄ£¨FQHC£©North Country HealthCare£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÔ¼60ÍòÃû»¼ÕßµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¸ÃÒ½ÁÆÖÐÐÄÔÚ11¸öÉçÇøµÄ14¸öËùÔÚÌṩȫ¿ÆÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬ÁýÕÖ¼Òͥҽѧ¡¢¶ù¿Æ¡¢ÐÐΪ¿µ½¡¡¢ÑÀ¿ÆÕչ˻¤Ê¿µÈ¶àÁìÓò£¬£¬£¬£¬£¬£¬²¢½ÓÊÜ´ó´ó¶¼°ü¹ÜÍýÏ뼰ΪδͶ±£»£»£»£»¼ÕßÌṩÓöÈÕÛ¿Û¡£¡£¡£¡£¡£StormousÍÅ»ïÉù³Æ£¬£¬£¬£¬£¬£¬ÇÔÈ¡µÄÊý¾Ý°üÀ¨ÍêÕûµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡¢Êܱ£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡¢Õï¶Ï´úÂ루ICD£©¼°ÕïËùÓëÒ½ÁÆÐ§ÀÍÌṩÕßÏêÇ飬£¬£¬£¬£¬£¬Ïêϸ°üÀ¨»¼ÕßÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢¾ÍÕïÈÕÆÚÓëËùÔÚ¡¢°ü¹Ü¹«Ë¾ÐÅÏ¢¡¢Õï¶ÏÐÎòµÈ¡£¡£¡£¡£¡£¸Ã×éÖ¯½ÓÄÉ¡°Ë«ÖØÀÕË÷¡±Ä£Ê½£ºÆäÖÐ10ÍòÃû»¼ÕßµÄÊý¾Ý±»¹ÒÅÆ³öÊÛ£¬£¬£¬£¬£¬£¬Ê£Óà50ÍòÌõ¼Í¼ÔòÓÚ7ÔÂ15ÈÕ±»Ãâ·Ñ¹ûÕæÖÁйÃÜÍøÕ¾£¬£¬£¬£¬£¬£¬½øÒ»²½À©´óÁËÊý¾Ý̻¶Σº¦¡£¡£¡£¡£¡£Stormous×Ô2022ÄêÍ·»îÔ¾ÒÔÀ´£¬£¬£¬£¬£¬£¬ÒÑÕë¶ÔÒ½ÁƱ£½¡¡¢Âùݡ¢¿Æ¼¼¡¢Õþ¸®µÈÁìÓòµÄÖÁÉÙ150¸ö×éÖ¯·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬Êܺ¦Õß¼¯ÖÐÓÚÎ÷°àÑÀ¡¢ÃÀ¹ú¡¢°¢ÁªÇõ¡¢·¨¹úºÍ°ÍÎ÷¡£¡£¡£¡£¡£


https://securityaffairs.com/180057/data-breach/180057stormous-ransomware-gang-targets-north-country-healthcare-claims-600k-patient-data-stolen.html


5. BigONEÉúÒâËùÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬2700ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ


7ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùBigONE¼ì²âµ½Æ½Ì¨²¿·Ö×ʲú·ºÆðÒì³£±ä»»£¬£¬£¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏϵÕë¶ÔÆäÈÈÇ®°üµÄµÚÈý·½¹¥»÷ËùÖ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡Á˼ÛÖµÔ¼2700ÍòÃÀÔªµÄÖÖÖÖÊý×Ö×ʲú¡£¡£¡£¡£¡£BigONEËæ¼´Ðû²¼Í¨¸æ³Æ£¬£¬£¬£¬£¬£¬Óû§Ë½Ô¿¼°Ð¡ÎÒ˽¼ÒÊý¾ÝδÊÜÓ°Ï죬£¬£¬£¬£¬£¬ËùÓÐËðʧ½«ÓÉÆ½Ì¨´¢±¸½ðÈ«¶î¼ç¸º£¬£¬£¬£¬£¬£¬Óû§×ʲú²»»áÔâÊÜʵÖÊÐÔËðʧ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Æ½Ì¨ÒÑÓëÇå¾²¹«Ë¾SlowMistÏàÖú×·×Ù±»µÁ×ʽ𣬣¬£¬£¬£¬£¬²¢¼à¿ØÆäÔÚÇø¿éÁ´ÉϵÄÁ÷¶¯ÇéÐΣ¬£¬£¬£¬£¬£¬Í¬Ê±Ðû²¼´æ¿îºÍÉúÒâЧÀÍÒÑÍêÈ«»Ö¸´£¬£¬£¬£¬£¬£¬µ«ÌáÏÖ¼°OTC¹¦Ð§ÉÐÎ´ÖØÆô¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÒªÁìÒѱ»¿ØÖÆ£¬£¬£¬£¬£¬£¬µ«ÏêϸÈëÇÖÊÖ¶ÎÈÔδÃ÷È·¡£¡£¡£¡£¡£SlowMistÆðÔ´Åжϴ˴ÎÊÂÎñΪ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬¶øÇø¿éÁ´ÊÓ²ì»ú¹¹LookochainÔòÅû¶£¬£¬£¬£¬£¬£¬ºÚ¿ÍÒÑ×îÏÈÏ´Ç®²Ù×÷£¬£¬£¬£¬£¬£¬½«Ôß¿î¶Ò»»Îª120ö±ÈÌØ±Ò£¨BTC£©¡¢1272öÒÔÌ«±Ò£¨ETH£©¡¢2625öSolana£¨SOL£©¼°2330ÍòöTron£¨TRX£©¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hacker-steals-27-million-in-bigone-exchange-crypto-breach/


6. Ïã¸Û½ðÈÚ»ú¹¹ÔâSquidLoader¶ñÒâÈí¼þ¹¥»÷


7ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷£¬£¬£¬£¬£¬£¬Õë¶ÔÏã¸Û½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâÈí¼þ¹¥»÷À˳±ÕýÔÚÉìÕÅ£¬£¬£¬£¬£¬£¬Æä½¹µãΪ¾ß±¸¸ß¶È¹æ±ÜÄÜÁ¦µÄ¼ÓÔØÆ÷SquidLoader¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶ÎѬȾÁ´°²ÅÅCobalt Strike Beacon£¬£¬£¬£¬£¬£¬²¢½ÓÄɶàÖÖÏȽø¿¹ÆÊÎöÕ½ÂÔ£¬£¬£¬£¬£¬£¬¶ÔÄ¿µÄ»ú¹¹×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÓã²æÊ½´¹ÂÚÓʼþ¡£¡£¡£¡£¡£ÕâЩÒÔͨË×»°×«Ð´µÄÓʼþð³ä½ðÈÚ»ú¹¹£¬£¬£¬£¬£¬£¬¸½´øÎ±×°³É·¢Æ±µÄÃÜÂë±£»£»£»£»¤RARѹËõ°ü¡£¡£¡£¡£¡£Óû§½âѹºó£¬£¬£¬£¬£¬£¬»á·¢Ã÷Ò»¸öαװ³ÉMicrosoft WordÎĵµµÄ¶ñÒâPE¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬ÆäÎļþÃûÄ£ÄâÕýµ±³ÌÐò¡°AMDRSServ.exe¡±£¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿Éç»á¹¤³ÌÓÕÆ­ÐÔ¡£¡£¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬£¬£¬£¬£¬SquidLoader±ãÆô¶¯¶à½×¶ÎѬȾÁ÷³Ì£ºÊ×ÏÈ×ÔÎÒ½â°üÒÔ½âÃÜÄÚ²¿¸ºÔØ£¬£¬£¬£¬£¬£¬Ëæºóͨ¹ý»ìÏý´úÂ붯̬ÆÊÎöÒªº¦Windows API£¬£¬£¬£¬£¬£¬²¢³õʼ»¯»ùÓÚ¿ÍÕ»µÄ×Ô½ç˵½á¹¹´æ´¢²Ù×÷Êý¾Ý¡£¡£¡£¡£¡£Îª¹æ±ÜɳÏä¡¢µ÷ÊÔÆ÷¼°·À²¡¶¾¹¤¾ß£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÖ´ÐжàÖØ¹æ±ÜÀý³Ì£¬£¬£¬£¬£¬£¬°üÀ¨ÇéÐμì²é¡¢×Ö·û´®»ìÏý¡¢¿ØÖÆÁ÷»ìÏý¼°Å²ÓÃδ¹ûÕæµÄWindowsϵͳŲÓᣡ£¡£¡£¡£Èô¼ì²âµ½ÆÊÎö¹¤¾ß»òµ÷ÊÔ¼£Ï󣬣¬£¬£¬£¬£¬Æä»áÁ¬Ã¦ÖÕÖ¹ÔËÐС£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬SquidLoader»¹½ÓÄÉÑÓ³ÙÏß³Ì˯Ãß¡¢Òì²½Àú³ÌŲÓõÈÊÖÒÕÈÆ¹ý×Ô¶¯»¯É³Ïä¡£¡£¡£¡£¡£Í¨¹ý¼ì²éºó£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áͨ¹ýÄ£ÄâKubernetesЧÀÍ·¾¶µÄURLÁªÏµC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÍøÂç²¢´«ÊäÖ÷»úÊý¾Ý£¬£¬£¬£¬£¬£¬×îÖմӴμ¶IPµØµãÏÂÔØCobalt Strike Beacon¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/squidloader-malware-targets-hong/