¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷

Ðû²¼Ê±¼ä 2025-11-06

1. ¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯Curly COMrades±»ÆØ×Ô2024ÄêÄêÖÐÆð»îÔ¾£¬£¬£¬£¬£¬£¬Æä»î¶¯Óë¶íÂÞ˹µØÔµÕþÖÎÀûÒæÇ×½üÏà¹Ø¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÀÄÓÃWindowsרҵ°æ/ÆóÒµ°æ¼°Windows ServerÖеÄMicrosoft Hyper-VÐéÄ⻯ÊÖÒÕ£¬£¬£¬£¬£¬£¬½¨ÉèÒþ²ØµÄ»ùÓÚAlpine LinuxµÄÇáÁ¿¼¶ÐéÄâ»ú£¨½öÕ¼ÓÃ120MB´ÅÅ̿ռäºÍ256MBÄڴ棩ÔËÐжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈÆ¹ý¹Å°å»ùÓÚÖ÷»úµÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¼Æ»®¡£¡£¡£¡£¡£ÐéÄâ»úÄÚÍйÜÁË×Ô½ç˵¹¤¾ßCurlyShell·´ÏòshellºÍCurlCat·´ÏòÊðÀí£ºÇ°Õßͨ¹ýcron×÷Òµ¼á³Ö³¤ÆÚ»¯£¬£¬£¬£¬£¬£¬ÒÔÎÞͷģʽÔËÐв¢Í¨¹ýHTTPSÅþÁ¬C2ЧÀÍÆ÷Ö´ÐÐÏÂÁ £»£»£»£»ºóÕß×÷ΪSOCKSÊðÀí·â×°SSHÁ÷Á¿ÎªHTTPSÇëÇ󣬣¬£¬£¬£¬£¬ÊµÏÖÒþ²ØËíµÀ´«Ê䣬£¬£¬£¬£¬£¬Ê¹¶ñÒâÁ÷Á¿Î±×°³ÉÕýµ±Ö÷»úIPµØµã¡£¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÊ×ÏÈÔ¶³Ì»á¼ûÊܺ¦Õßϵͳ£¬£¬£¬£¬£¬£¬ÆôÓÃHyper-V²¢½ûÓÃÆäÖÎÀí½çÃæ£¬£¬£¬£¬£¬£¬°²ÅÅ»ùÓÚAlpine LinuxµÄ¼«¼òÐéÄâ»ú¡£¡£¡£¡£¡£BitdefenderÓë¸ñ³¼ªÑÇCERTÏàÖúÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯»¹Ê¹ÓÃÁ½¸öPowerShell¾ç±¾Ç¿»¯¹¥»÷£ºÆäÒ»½«KerberosƱ¾Ý×¢ÈëLSASSÒÔʵÏÖÔ¶³ÌϵͳÉí·ÝÑéÖ¤ºÍÏÂÁîÖ´ÐУ» £»£»£»£»Æä¶þͨ¹ý×éÕ½ÂÔÔÚÓòÄÚ¶ą̀ÅÌËã»ú½¨ÉèÍâµØÕË»§£¬£¬£¬£¬£¬£¬Ö§³ÖºáÏòÒÆ¶¯¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/


2. ¡¶ÐûÑÔ±¨¡·Êý¾Ýй¶£¬£¬£¬£¬£¬£¬ÕþÖÎÒþ˽Σº¦Í¹ÏÔ


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Òâ´óÀû×óÒí±ê¼ÇÐÔ±¨Ö½¡¶ÐûÑÔ±¨¡·£¨Il Manifesto£©ÒòδÉèÖÃÃÜÂë±£» £»£»£»£»¤µÄClickHouseÊý¾Ý¿â£¬£¬£¬£¬£¬£¬µ¼ÖÂ15Íò¸¶·Ñ¶©ÔÄÓû§ÓÊÏä¼°1100ÍòÌõ·Ã¿ÍÐÐΪÈÕ־й¶¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨×°±¸ÊÖÒÕϸ½Ú¡¢»á»°ÁîÅÆ¡¢IPµØµã¡¢¾«¶È´ï11Ã×µÄGeoIPÐÅÏ¢¼°ÎÄÕÂÍÆ¼öȪԴµÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬»¹Ì»Â¶ÁËÄÚ²¿ÍøÕ¾ÆÊÎöÊý¾Ý£¨ÈçÎÄÕÂÌåÏÖ¡¢ÊÜÖÚÐÐΪ¡¢Òý¼öȪԴ£©£¬£¬£¬£¬£¬£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚÉÌÒµÇ鱨ÇÔÈ¡¡£¡£¡£¡£¡£×÷Ϊ1969Ä꽨ÉèµÄ¼¤½ø×óÒí¿¯Î£¬£¬£¬£¬£¬¡¶ÐûÑÔ±¨¡·Ôø¼ÓÈë1972Äê´óÑ¡²¢ÔâÓö2000Äêз¨Î÷˹·Ö×ÓÕ¨µ¯Ï®»÷δË죬£¬£¬£¬£¬£¬ÏÖΪ·ÇÓªÀûÏàÖúÉ磬£¬£¬£¬£¬£¬ÈÕ¿¯ÐÐÁ¿Ô¼1.5Íò·Ý¡£¡£¡£¡£¡£´Ë´Îй¶ËäÎ´Éæ¼°ÃÜÂë»òÖ±½ÓÕË»§Æ¾Ö¤£¬£¬£¬£¬£¬£¬µ«¶ÁÕßÔĶÁ¼Í¼Òò·´Ó¦ÕþÖÎÐËȤÓëÐÅÑö£¬£¬£¬£¬£¬£¬ÊôÓÚÅ·ÖÞÒþ˽·¨ÖС°ÌØÊâÖÖ±ð¡±ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÃæÁÙ¸üÑϿᱣ» £»£»£»£»¤¡£¡£¡£¡£¡£ÈôÊý¾Ý±»ÕþÖÎÄîÍ·Õß»ñÈ¡£¬£¬£¬£¬£¬£¬¶ÁÕßÓ뱨Éç¿ÉÄÜÔâÕþ¸®É§ÈÅ»ò¼àÊÓ¡£¡£¡£¡£¡£


https://cybernews.com/security/il-manifesto-data-leak-exposed-readers/


3. ÃÀ¹úSuper QuikÔâ¶í¹ØÁªÀÕË÷ÍŻ﹥»÷


11ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÇøÓòÐÔ¼ÓÓÍÕ¾Á¬ËøµêSuper QuikÔâÓë¶íÂÞ˹ÓйصÄPlayÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ°µÍøÐ¹Â¶¼à¿ØÂ¼Ïñ¼°5.5GBÄÚ²¿Îļþ¡£¡£¡£¡£¡£´Ë´Îй¶°üÀ¨²ÆÎñ±¨¸æ£¨ÖðÈÕÏúÊÛ¶î¡¢ÀûÈ󱨸桢×ʲúÇ·Õ®±í¼°ÀúÄêÒµ¼¨½ÏÁ¿£©¡¢²É¹º·¢Æ±£¨ÊÖÒÕ×°±¸Óëά»¤±¾Ç®£©¡¢¼à¿ØÆ¬¶Ï£¨º¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢£©¡¢Ð½×ʱ任֪ͨ£¨Ô±¹¤ÐÕÃû¼°Ð½×ʱê×¼£©¡¢×°ÐÞÍýÏ루Ա¹¤ÁªÏµ·½·¨£©¡¢ÊÂÇéÆÀ¹À±ê×¼¡¢ÅàѵÖÊÁϼ°ÄÚ²¿Õþ²ßÎļþµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£PlayÍÅ»ïÒÔË«ÖØÀÕË÷ÊÖÒÕÖøÃû£¬£¬£¬£¬£¬£¬ÒªÇóÖ§¸¶½âÃÜÓöȲ¢°ü¹Ü²»ÀÄÓñ»µÁÊý¾Ý¡£¡£¡£¡£¡£ÈôÆóÒµ¾Ü¾ø£¬£¬£¬£¬£¬£¬ÆäÊý¾Ý½«±»¹ûÕæÒÔʩѹ¡£¡£¡£¡£¡£´Ë´ÎSuper QuikÊý¾Ýй¶¿ÉÄÜÒý·¢¶àÖØÎ£º¦£º²ÆÎñ±¨¸æÓ뷢Ʊ¿ÉÄÜ̻¶ÉÌÒµÇ鱨¡¢¹©Ó¦É̶¨¼Û¼°»ù´¡Éèʩϸ½Ú£¬£¬£¬£¬£¬£¬±»¾ºÕùµÐÊÖʹÓã» £»£»£»£»¼à¿ØÆ¬¶Ï¿ÉÄÜ̻¶¼à¿ØÃ¤Çø£¬£¬£¬£¬£¬£¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢Éæ¼°Òþ˽ÓëÖ´·¨ÎÊÌ⣻ £»£»£»£»Ð½×Ê¡¢ÁªÏµ·½·¨µÈÊý¾ÝÔöÌíÉí·Ý͵ÇÔÓëÉç»á¹¤³Ì¹¥»÷Σº¦£» £»£»£»£»ÄÚ²¿ÎļþÄ£°å¿ÉÄܱ»ÓÃÓÚÕ©Æ­£¬£¬£¬£¬£¬£¬ÍþвÐÔÓïÑÔÎļþÔò¿ÉÄÜË𺦹«Ë¾¹«ÖÚÐÎÏ󡣡£¡£¡£¡£


https://cybernews.com/security/ransomware-super-quik-data-leak/


4. Gootloader¶ñÒâÈí¼þ7¸öÔºó¾íÍÁÖØÀ´


11ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬Gootloader¶ñÒâÈí¼þ¼ÓÔØÆ÷ÔÚÏûÊÅ7¸öÔºóÖØÏÖ£¬£¬£¬£¬£¬£¬Í¨¹ýSEOͶ¶¾ÍƹãÐéÎ±ÍøÕ¾ÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã»ùÓÚJavaScriptµÄ¼ÓÔØÆ÷ͨ¹ý±»ÈëÇÖ»ò¹¥»÷Õß¿ØÖƵÄÍøÕ¾£¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâÎĵµ¡£¡£¡£¡£¡£Æä¹¥»÷Á´ÌõʼÓÚSEOͶ¶¾£¬£¬£¬£¬£¬£¬Í¨¹ýÓÅ»¯Ìض¨Òªº¦´Ê£¨ÈçÖ´·¨ÎļþºÍЭÒ飩ÔÚËÑË÷ÒýÇæÖеÄÅÅÃû£¬£¬£¬£¬£¬£¬ÎüÒýÓû§»á¼ûαװ³ÉÖ´·¨ÎļþÄ£°å·ÖÏíÆ½Ì¨µÄÍøÕ¾¡£¡£¡£¡£¡£µ±Óû§µã»÷¡°»ñÈ¡Îĵµ¡±°´Å¥Ê±£¬£¬£¬£¬£¬£¬ÍøÕ¾»áÑéÖ¤ÊÇ·ñΪÕýµ±Óû§£¬£¬£¬£¬£¬£¬ËæºóÏÂÔØ°üÀ¨.jsÀ©Õ¹ÃûµÄ¶ñÒâѹËõ°ü¡£¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬£¬Gootloader»áÏÂÔØCobalt Strike¡¢ºóÃųÌÐò¼°½©Ê¬³ÌÐòµÈ¶ñÒâÔØºÉ£¬£¬£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬×îÖÕ¿ÉÄܰ²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£´Ë´Î»Ø¹é£¬£¬£¬£¬£¬£¬Gootloader½ÓÄɶàÏîÐÂÊÖÒÕ¹æ±Ü¼ì²â£ºÍ¨¹ýÌØÊâÍøÒ³×ÖÌåÌæ»»×ÖÐΣ¬£¬£¬£¬£¬£¬ÔÚHTMLÔ´´úÂëÖÐÒþ²Ø¡°·¢Æ±¡±¡°ÌõÔ¼¡±µÈÒªº¦´Ê£» £»£»£»£»Ê¹ÓÃÃûÌùýʧµÄZIPÎļþ£¬£¬£¬£¬£¬£¬Windows×ÊÔ´ÖÎÀíÆ÷½âѹʱÊͷŶñÒâJSÎļþ£¬£¬£¬£¬£¬£¬¶øÇå¾²¹¤¾ß½âѹÔòÏÔʾÎÞº¦Îı¾Îļþ£¬£¬£¬£¬£¬£¬×ÌÈÅÆÊÎö¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ²ÈëSupper SOCKS5ºóÃÅ£¬£¬£¬£¬£¬£¬ÊµÏÖÔ¶³Ì»á¼û¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/


5. ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾ÔâºÚ¿ÍÈëÇÖÖÂСÎÒ˽¼ÒÐÅϢй¶


11ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾£¨HAEA£©ÔâÓöºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý²»·¨»á¼ûÆäITÇéÐÎÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂ루SSN£©¼°¼ÝʻִÕÕÔÚÄÚµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ1ÈÕÊ״η¢Ã÷ÈëÇÖ¼£Ï󣬣¬£¬£¬£¬£¬ËæºóÁ¬Ã¦ÁªºÏÍâ²¿ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÕö¿ªÊӲ죬£¬£¬£¬£¬£¬È·ÈϹ¥»÷ʼÓÚ2ÔÂ22ÈÕÇÒÒÑ¿ØÖÆÊ±ÊÆ¡£¡£¡£¡£¡£HAEA×÷ΪÏÖ´úÆû³µ¼¯ÍÅ×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬ÈÏÕæÎªÆû³µÈ«ÉúÃüÖÜÆÚÌṩITЧÀÍ£¬£¬£¬£¬£¬£¬º­¸ÇÔ¶³ÌÐÅÏ¢´¦Öóͷ£¡¢OTA¸üС¢×Ô¶¯¼Ýʻϵͳ¼°Êý×Ö»¯ÖÆÔìÆ½Ì¨µÈ£¬£¬£¬£¬£¬£¬Ð§À͹æÄ£ÁýÕÖ270ÍòÁ¾Æû³µ¡¢200ÍòÓû§¼°5000ÃûÔ±¹¤¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÆäϵͳÇå¾²ÐÔÎó²î£¬£¬£¬£¬£¬£¬µ«ÏêϸÊÜÓ°ÏìÈËÊý¼°ÊÇ·ñÉæ¼°¿Í»§/Óû§Êý¾ÝÈÔ²»Ã÷È·¡£¡£¡£¡£¡£ÊÂÎñÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢ÀàÐͱ£´æ²î±ð£ºÍ¨ÖªÐŽöÌá¼°ÐÕÃû£¬£¬£¬£¬£¬£¬¶øÂíÈøÖîÈûÖÝÕþ¸®ÃÅ»§ÍøÕ¾Ôö²¹ÁгöÁËSSNºÍ¼ÝÕÕÐÅÏ¢¡£¡£¡£¡£¡£×èÖ¹·¢¸å£¬£¬£¬£¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬£¬ÕØÊÂÕßÉí·ÝÈÔ³ÉÃÕ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/


6. CISA½ôÆÈת´ïCentOS Web Panel¸ßΣÎó²î


11ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃCentOS Web Panel£¨CWP£©ÖеÄCVE-2025-48703Ô¶³ÌÏÂÁîÖ´ÐÐÎó²îÌᳫ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδÊÚȨ¹¥»÷Õßͨ¹ýÓÐÓÃÓû§ÃûÔÚCWPʵÀýÉÏÖ´ÐÐí§ÒâshellÏÂÁ£¬£¬£¬£¬£¬Ó°Ïì0.9.8.1204֮ǰËùÓа汾¡£¡£¡£¡£¡£CWP×÷ΪÃâ·Ñ¿ªÔ´µÄLinuxЧÀÍÆ÷ÖÎÀíÃæ°å£¬£¬£¬£¬£¬£¬±»ÆÕ±éÓÃÓÚÍøÕ¾Íйܡ¢ÏµÍ³ÖÎÀí¼°VPS/×ÔÁ¦Ð§ÀÍÆ÷ÔËÓª£¬£¬£¬£¬£¬£¬ÆäÎó²îΣº¦²¨¼°È«Çò´ó×ÚÆóÒµ¼°Ð¡ÎÒ˽¼ÒÓû§¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÎļþÖÎÀíÆ÷¡°changePerm¡±¶Ëµã±£´æÉè¼ÆÈ±ÏÝ£ºµ±ÇëÇóÖÐÊ¡ÂÔÓû§±êʶ·ûʱ£¬£¬£¬£¬£¬£¬ÏµÍ³ÈԻᴦÖóͷ£Î´ÊÚȨÇëÇ󣬣¬£¬£¬£¬£¬ÇÒ¡°t_total¡±²ÎÊýδ¾­Çå¾²¹ýÂËÖ±½Ó´«ÈëshellÏÂÁ£¬£¬£¬£¬£¬µ¼ÖÂÏÂÁî×¢ÈëΣº¦¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Maxime RinaudoÓÚ6ÔÂÏÂÑ®ÔÚCentOS 7ÇéÐÎÖÐÀÖ³ÉÑÝʾÁËʹÓÃÀú³Ì£¬£¬£¬£¬£¬£¬Í¨¹ýÏò¸Ã¶Ëµã·¢ËͶñÒâPOSTÇëÇ󣬣¬£¬£¬£¬£¬¿É×¢Èë·´ÏòshellÒÔÍêÈ«¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£CISAÒѽ«¸ÃÎó²îÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬£¬²¢ÒÀ¾ÝBOD 22-01Ö¸ÄÏÒªÇóÁª°î»ú¹¹ÔÚ11ÔÂ25ÈÕǰӦÓÃÐÞ¸´²¹¶¡£¡£¡£¡£¡£¨Ðû²¼ÓÚ6ÔÂ18ÈÕ£©£¬£¬£¬£¬£¬£¬»ò×èֹʹÓÃÊÜÓ°Ïì²úÆ·¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/