¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷

°ä²¼¹¦·ò 2025-11-06

1. ¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷


11ÔÂ4ÈÕ£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯Curly COMrades±»ÆØ×Ô2024ÄêÄêÖÐÆð»îÔ¾£¬£¬Æä»î¶¯Óë¶íÂÞ˹µØÔµÕþÖÎÀûÒæÇ×êÇÓйØ¡£¡£¸Ã×é֯ͨ¹ýÀÄÓÃWindowsרҵ°æ/ÆóÒµ°æ¼°Windows ServerÖеÄMicrosoft Hyper-VÐé¹¹»¯¼¼Êõ£¬£¬´´½¨°µ²ØµÄ»ùÓÚAlpine LinuxµÄÇáÁ¿¼¶Ðé¹¹»ú£¨½öÕ¼ÓÃ120MB´ÅÅ̿ռäºÍ256MBÄڴ棩ÔËÐжñÒâÈí¼þ£¬£¬³É¹¦Èƹý´«Í³»ùÓÚÖ÷»úµÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¹æ»®¡£¡£Ðé¹¹»úÄÚÍйÜÁË×Ô½ç˵¹¤¾ßCurlyShell·´ÏòshellºÍCurlCat·´Ïò´úÀí£º£ºÇ°Õßͨ¹ýcron×÷ҵά³ÖÓÆ¾Ã»¯£¬£¬ÒÔÎÞͷģʽÔËÐв¢Í¨¹ýHTTPSÏνÓC2·þÎñÆ÷Ö´ÐкÅÁ£»£»ºóÕß×÷ΪSOCKS´úÀí·â×°SSHÁ÷Á¿ÎªHTTPSÒªÇ󣬣¬ÊµÏÖÒñ±ÎËíµÀ´«Ê䣬£¬Ê¹¶ñÒâÁ÷Á¿¼Ù×°³ÉºÏ·¨Ö÷»úIPµØÖ·¡£¡£¹¥»÷¹ý³ÌÖУ¬£¬ÍþвÐÐΪÕßÊ×ÏÈÔ¶³Ì½Ó¼ûÊܺ¦Õßϵͳ£¬£¬ÆôÓÃHyper-V²¢½ûÓÃÆäÖÎÀí½çÃæ£¬£¬²¿Êð»ùÓÚAlpine LinuxµÄ¼«¼òÐé¹¹»ú¡£¡£BitdefenderÓë¸ñ³¼ªÑÇCERTºÏ×÷µ÷²é·¢ÏÖ£¬£¬¸Ã×éÖ¯»¹Ê¹ÓÃÁ½¸öPowerShell¾ç±¾Ç¿»¯¹¥»÷£º£ºÆäÒ»½«Kerberosµ¥¾Ý×¢ÈëLSASSÒÔʵÏÖÔ¶³ÌϵͳÉí·ÝÑéÖ¤ºÍºÅÁîÖ´ÐУ»£»£»Æä¶þͨ¹ý×éÕ½ÊõÔÚÓòÄÚ¶àÌ¨ÍÆËã»ú´´½¨±¾µØÕË»§£¬£¬Ö§³ÖºáÏòÒÆ¶¯¡£¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/


2. ¡¶ÐûÑÔ±¨¡·Êý¾Ýй¶£¬£¬ÕþÖÎÒþÖÔ·çÏÕ͹ÏÔ


11ÔÂ4ÈÕ£¬£¬Òâ´óÀû×óÒí±êÖ¾ÐÔ±¨Ö½¡¶ÐûÑÔ±¨¡·£¨Il Manifesto£©ÒòδÉèÖÃÃÜÂë±£»£»£»¤µÄClickHouseÊý¾Ý¿â£¬£¬µ¼ÖÂ15Íò¸¶·Ñ¶©ÔÄÓû§ÓÊÏä¼°1100ÍòÌõ·Ã¿ÍÐÐΪÈÕ־й¶¡£¡£¸ÃÊý¾Ý¿âÔ̺¬É豸¼¼Êõϸ½Ú¡¢¡¢¡¢»á»°ÁîÅÆ¡¢¡¢¡¢IPµØÖ·¡¢¡¢¡¢¾«¶È´ï11Ã×µÄGeoIPÐÅÏ¢¼°ÎÄÕÂÍÆ¼öÆðÔ´µÈÃô¸ÐÊý¾Ý£¬£¬»¹Â¶³öÁËÄÚ²¿ÍøÕ¾·ÖÎöÊý¾Ý£¨ÈçÎÄÕ²û·¢¡¢¡¢¡¢ÊÜÖÚÐÐΪ¡¢¡¢¡¢ÍƼöÆðÔ´£©£¬£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚóÒ×µý±¨ÇÔÈ¡¡£¡£×÷Ϊ1969ÄêµÞÔìµÄ¼¤½ø×óÒí¿¯Î£¬¡¶ÐûÑÔ±¨¡·Ôø²Î¼Ó1972Äê´óÑ¡²¢Ôâ·ê2000Äêз¨Î÷˹·Ö×ÓÕ¨µ¯Ï®»÷δË죬£¬ÏÖΪ·ÇͶ»úºÏ×÷É磬£¬ÈÕ¿¯ÐÐÁ¿Ô¼1.5Íò·Ý¡£¡£Õâ´Îй¶ËäÎ´Éæ¼°ÃÜÂë»òÖ±½ÓÕË»§Æ¾Ö¤£¬£¬µ«¶ÁÕßÔĶÁ¼Í¼Òò·´Ó³ÕþÖÎÐËÖÂÓëÐÅÑö£¬£¬ÊôÓÚÅ·ÖÞÒþÖÔ·¨ÖС°ÌØÊâÀà±ð¡±ÐÅÏ¢£¬£¬Ãæ¶Ô¸üÑϸñ±£»£»£»¤¡£¡£ÈôÊý¾Ý±»ÕþÖζ¯»úÕß»ñÈ¡£¡£¬£¬¶ÁÕßÓ뱨Éç¿ÉÄÜÔâµ±¾ÖɧÈÅ»ò¼à¶½¡£¡£


https://cybernews.com/security/il-manifesto-data-leak-exposed-readers/


3. ÃÀ¹úSuper QuikÔâ¶í¹ØÁªÀÕË÷ÍŻ﹥»÷


11ÔÂ3ÈÕ£¬£¬ÃÀ¹úÇøÓòÐÔ¼ÓÓÍÕ¾Á¬ËøµêSuper QuikÔâÓë¶íÂÞ˹ÓйصÄPlayÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬¹¥»÷ÕßÔÚ°µÍøÐ¹Â¶¼à¿ØÂ¼Ïñ¼°5.5GBÄÚ²¿Îļþ¡£¡£Õâ´Îй¶Ô̺¬²ÆÕþ»ã±¨£¨ÖðÈÕÏúÊÛ¶î¡¢¡¢¡¢ÀûÈó»ã±¨¡¢¡¢¡¢×ʲú¸ºÕ®±í¼°»ýÄêÒµ¼¨±ÈÁ¦£©¡¢¡¢¡¢²É¹º·¢Æ±£¨¼¼ÊõÉ豸ÓëÊØ»¤³É±¾£©¡¢¡¢¡¢¼à¿ØÆ¬¶Î£¨º¬Ô±¹¤/¹Ë¿ÍÃæ²¿ÐÅÏ¢£©¡¢¡¢¡¢Ð½×ʵ÷»»Í¨Öª£¨Ô±¹¤ÐÕÃû¼°Ð½×ʳ߶ȣ©¡¢¡¢¡¢×°ÐÞ´òË㣨Ա¹¤ÁªÏµ·½Ê½£©¡¢¡¢¡¢¹¤×÷ÆÀ¹À³ß¶È¡¢¡¢¡¢Åàѵ×ÊÁϼ°ÄÚ²¿Õþ²ßÎļþµÈÃô¸ÐÐÅÏ¢¡£¡£PlayÍÅ»ïÒÔË«ÖØÀÕË÷¼¼ÊõÎÅÃû£¬£¬ÒªÇóÖ§¸¶½âÃÜÓöȲ¢±£Õϲ»ÀÄÓñ»µÁÊý¾Ý¡£¡£ÈôÆóÒµ»Ø¾ø£¬£¬ÆäÊý¾Ý½«±»¹«¿ªÒÔʩѹ¡£¡£Õâ´ÎSuper QuikÊý¾Ýй¶¿ÉÄÜÒý·¢¶àÖØ·çÏÕ£º£º²ÆÕþ»ã±¨Ó뷢Ʊ¿ÉÄܶ³öóÒ×µý±¨¡¢¡¢¡¢¹©¸øÔ¼¶¨¼Û¼°»ù´¡Éèʩϸ½Ú£¬£¬±»¾ºÕùµÐÊÖÀûÓ㻣»£»¼à¿ØÆ¬¶Î¿ÉÄܶ³ö¼à¿ØÃ¤Çø£¬£¬Ô±¹¤/¹Ë¿ÍÃæ²¿ÐÅÏ¢Éæ¼°ÒþÖÔÓë˾·¨ÎÊÌ⣻£»£»Ð½×Ê¡¢¡¢¡¢ÁªÏµ·½Ê½µÈÊý¾ÝÔö³¤Éí·Ý͵ÇÔÓëÉç»á¹¤³Ì¹¥»÷·çÏÕ£»£»£»ÄÚ²¿ÎļþÄ£°å¿ÉÄܱ»ÓÃÓÚÚ¿Æ­£¬£¬ÍþвÐÔ´ë´ÇÎļþÔò¿ÉÄÜÇÖº¦¹«Ë¾¹«¼ÒÐÎÏ󡣡£


https://cybernews.com/security/ransomware-super-quik-data-leak/


4. Gootloader¶ñÒâÈí¼þ7¸öÔºó¶«É½ÔÙÆð


11ÔÂ5ÈÕ£¬£¬Gootloader¶ñÒâÈí¼þ¼ÓÔØÆ÷ÔÚÒþû7¸öÔºóÖØÏÖ£¬£¬Í¨¹ýSEOͶ¶¾ÍƹãÐéÎ±ÍøÕ¾ÒÔ´«²¼¶ñÒâÈí¼þ¡£¡£¸Ã»ùÓÚJavaScriptµÄ¼ÓÔØÆ÷ͨ¹ý±»ÈëÇÖ»ò¹¥»÷Õß½ÚÖÆµÄÍøÕ¾£¬£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâÎĵµ¡£¡£Æä¹¥»÷Á´ÌõʼÓÚSEOͶ¶¾£¬£¬Í¨¹ýÓÅ»¯Ìض¨¹Ø¼ü´Ê£¨Èç˾·¨ÎļþºÍºÍ̸£©ÔÚËÑË÷ÒýÇæÖеÄÅÅÃû£¬£¬ÎüÒýÓû§½Ó¼û¼Ù×°³É˾·¨ÎļþÄ£°å·ÖÏíÆ½Ì¨µÄÍøÕ¾¡£¡£µ±Óû§µã»÷¡°»ñÈ¡Îĵµ¡±°´Å¥Ê±£¬£¬ÍøÕ¾»áÑéÖ¤ÊÇ·ñΪºÏ·¨Óû§£¬£¬ËæºóÏÂÔØÔ̺¬.jsÀ©´óÃûµÄ¶ñÒâѹËõ°ü¡£¡£Ö´Ðк󣬣¬Gootloader»áÏÂÔØCobalt Strike¡¢¡¢¡¢ºóÃÅ·¨Ê½¼°½©Ê¬·¨Ê½µÈ¶ñÒâÔØºÉ£¬£¬Îª¹¥»÷ÕßÌṩÆóÒµÍøÂç³õʼ½Ó¼ûȨÏÞ£¬£¬×îÖÕ¿ÉÄܲ¿ÊðÀÕË÷Èí¼þ¡£¡£Õâ´Î»Ø¹é£¬£¬Gootloaderѡȡ¶àÏîм¼Êõ¶ã±Ü¼ì²â£º£ºÍ¨¹ýÌØÊâÍøÒ³×ÖÌå´úÌæ×ÖÐΣ¬£¬ÔÚHTMLÔ´´úÂëÖаµ²Ø¡°·¢Æ±¡±¡°ºÏͬ¡±µÈ¹Ø¼ü´Ê£»£»£»ÀûÓÃÌåʽÃýÎóµÄZIPÎļþ£¬£¬Windows×ÊÔ´ÖÎÀíÆ÷½âѹʱ¿ªÊͶñÒâJSÎļþ£¬£¬¶ø°²È«¹¤¾ß½âѹÔòÏÔʾÎÞº¦Îı¾Îļþ£¬£¬×ÌÈÅ·ÖÎö¡£¡£´ËÍ⣬£¬¹¥»÷ÕßÖ²ÈëSupper SOCKS5ºóÃÅ£¬£¬ÊµÏÖÔ¶³Ì½Ó¼û¡£¡£


https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/


5. ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾ÔâºÚ¿ÍÈëÇÖÖÂСÎÒÐÅϢй¶


11ÔÂ5ÈÕ£¬£¬½üÈÕ£¬£¬ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾£¨HAEA£©Ôâ·êºÚ¿ÍÈëÇÖ£¬£¬¹¥»÷Õßͨ¹ý·¸·¨½Ó¼ûÆäIT»·¾³ÇÔÈ¡ÁËÔ̺¬ÐÕÃû¡¢¡¢¡¢Éç»á±£ÏÕºÅÂ루SSN£©¼°¼ÝÊ»ÅÆÕÕÔÚÄÚµÄСÎÒÐÅÏ¢¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ1ÈÕ³õ´Î·¢ÏÖÈëÇÖ¼£Ï󣬣¬ËæºóÁ¢¼´½áºÏÍâ²¿ÍøÂ簲ȫר¼Ò¼°·¨Âɲ¿ÃÅ·¢Õ¹µ÷²é£¬£¬È·ÈϹ¥»÷ʼÓÚ2ÔÂ22ÈÕÇÒÒѽÚÖÆ¾ÖÃæ¡£¡£HAEA×÷ΪÏÖ´úÆû³µ¼¯ÍÅ×Ó¹«Ë¾£¬£¬ÕƹÜΪÆû³µÈ«ÐÔÃüÖÜÆÚÌṩIT·þÎñ£¬£¬º­¸ÇÔ¶³ÌÐÅÏ¢´¦Öᢡ¢¡¢OTA¸üС¢¡¢¡¢×Ô¶¯¼Ýʻϵͳ¼°Êý×Ö»¯ÖÆ×÷ƽ̨µÈ£¬£¬·þÎñÁìÓò¸²¸Ç270ÍòÁ¾Æû³µ¡¢¡¢¡¢200ÍòÓû§¼°5000ÃûÔ±¹¤¡£¡£Õâ´ÎÊÂÎñ¶³öÆäϵͳ°²È«ÐÔ·ì϶£¬£¬µ«¾ßÌåÊÜÓ°ÏìÈËÊý¼°ÊÇ·ñÉæ¼°¿Í»§/Óû§Êý¾ÝÈÔ²»Ã÷È·¡£¡£ÊÂÎñµ÷²éÏÔʾ£¬£¬Ð¹Â¶ÐÅÏ¢ÀàÐÍ´æÔÚ²î¾à£º£ºÍ¨ÖªÐŽöÌá¼°ÐÕÃû£¬£¬¶øÂíÈøÖîÈûÖݵ±¾ÖÃÅ»§ÍøÕ¾²¹³äÁгöÁËSSNºÍ¼ÝÕÕÐÅÏ¢¡£¡£½ØÖÁ·¢¸å£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü£¬£¬ÕØÊÂÕßÉí·ÝÈÔ³ÉÃÕ¡£¡£


https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/


6. CISA´¹Î£´«µÝCentOS Web Panel¸ßΣ·ì϶


11ÔÂ5ÈÕ£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ°ä²¼ÑÏÖØÖҸ棬£¬ÍþвÐÐΪÕßÕýÀûÓÃCentOS Web Panel£¨CWP£©ÖеÄCVE-2025-48703Ô¶³ÌºÅÁîÖ´Ðзì϶ÌáÒé¹¥»÷¡£¡£¸Ã·ì϶ÔÊÐíδÊÚȨ¹¥»÷Õßͨ¹ýÓÐЧÓû§ÃûÔÚCWPʵÀýÉÏÖ´ÐÐËÁÒâshellºÅÁ£¬Ó°Ïì0.9.8.1204֮ǰËùÓа汾¡£¡£CWP×÷ΪÃâ·Ñ¿ªÔ´µÄLinux·þÎñÆ÷ÖÎÀíÃæ°å£¬£¬±»¿í·ºÓÃÓÚÍøÕ¾ÍйÜ¡¢¡¢¡¢ÏµÍ³ÖÎÀí¼°VPS/¶ÀÁ¢·þÎñÆ÷ÔËÓª£¬£¬Æä·ì϶·çÏÕ²¨¼°È«Çò´óÁ¿ÆóÒµ¼°Ð¡ÎÒÓû§¡£¡£·ì϶±¾Ô­ÔÚÓÚÎļþÖÎÀíÆ÷¡°changePerm¡±¶Ëµã´æÔÚÉè¼ÆÈ±µã£º£ºµ±ÒªÇóÖÐÊ¡ÂÔÓû§±êʶ·ûʱ£¬£¬ÏµÍ³ÈԻᴦÖÃδÊÚȨҪÇ󣬣¬ÇÒ¡°t_total¡±²ÎÊýδ¾­°²È«¹ýÂËÖ±½Ó´«ÈëshellºÅÁ£¬µ¼ÖºÅÁî×¢Èë·çÏÕ¡£¡£°²È«×êÑÐÔ±Maxime RinaudoÓÚ6ÔÂÏÂÑ®ÔÚCentOS 7»·¾³Öгɹ¦ÑÝʾÁËÀûÓùý³Ì£¬£¬Í¨¹ýÏò¸Ã¶Ëµã·¢ËͶñÒâPOSTÒªÇ󣬣¬¿É×¢Èë·´ÏòshellÒÔÆëÈ«½ÚÀñ·þÎñÆ÷¡£¡£CISAÒѽ«¸Ã·ì϶ÄÉÈëÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬£¬²¢Æ¾¾ÝBOD 22-01Ö¸ÄÏÒªÇóÁª°î»ú¹¹ÔÚ11ÔÂ25ÈÕǰÀûÓÃÐÞ¸´²¹¶¡£¡£¨°ä²¼ÓÚ6ÔÂ18ÈÕ£©£¬£¬»òÖÕ³¡Ê¹ÓÃÊÜÓ°Ïì²úÆ·¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/