½©Ê¬ÍøÂçSSHStalkerʹÓô«Í³µÄIRC½øÐÐC2ͨѶ
°ä²¼¹¦·ò 2026-02-111. ½©Ê¬ÍøÂçSSHStalkerʹÓô«Í³µÄIRC½øÐÐC2ͨѶ
2ÔÂ10ÈÕ£¬£¬£¬Íþвµý±¨¹«Ë¾FlareÅû¶ÁËÒ»¸öÃûΪSSHStalkerµÄÐÂÐÍLinux½©Ê¬ÍøÂ磬£¬£¬Æäͨ¹ý¾µäµÄ»¥ÁªÍøÖмÌ̸Ì죨IRC£©ºÍ̸ʵÏÖºÅÁîÓë½ÚÖÆ£¨C2£©²Ù×÷¡£¡£¡£¹¥»÷Á÷³Ì·½Ã棬£¬£¬SSHStalkerͨ¹ý¼Ù×°³Énmap¿ªÔ´¹¤¾ßµÄGo¶þ½øÖÆÎļþÌáÒé×Ô¶¯SSHɨÃèÓ뱩Á¦ÆÆ½â£¬£¬£¬ÊµÏÖ³õʼ½Ó¼ûºó£¬£¬£¬ÀûÓñ»ÈëÇÖÖ÷»úɨÃèÆäËûSSHÖ¸±ê£¬£¬£¬ÐγÉÈä³æÊ½´«²¼¡£¡£¡£Ï°È¾Ö÷»úºó£¬£¬£¬Ëü»áÏÂÔØGCC¹¤¾ßÁ´ÔÚ±¾µØ±àÒëÓÐÐ§ÔØºÉ£¬£¬£¬ÌáÉý¿ÉÒÆÖ²ÐÔÓë¶ã±ÜÄÜÁ¦¡£¡£¡£Ê×ÅúÓÐÐ§ÔØºÉΪº¬Ó²±àÂëC2·þÎñÆ÷ºÍƵµÀµÄC˵»°IRC»úеÈË£¬£¬£¬ÓÃÓÚ×¢²áÐÂÊܺ¦ÕßÖÁ½©Ê¬ÍøÂç»ù´¡ÉèÊ©¡£¡£¡£Ëæºó£¬£¬£¬¶ñÒâÈí¼þ»á»ñÈ¡Ô̺¬±àÅűäÖÖµÄGSºÍbootbou¹éµµÎļþ£¬£¬£¬²¢Í¨¹ýÿ·ÖÖÓÔËÐеÄcron×÷ҵʵÏÖÓÆ¾Ã»¯¡£¡£¡£ÎªÌáÉýȨÏÞ£¬£¬£¬¹¥»÷ÕßÀûÓÃ2009-2010ÄêLinuxÄں˵Ä16¸öCVE·ì϶£¬£¬£¬ÔÚ±©Á¦ÆÆ½â»ñµÃµÄµÍȨÏÞÓû§»ù´¡ÉϽøÒ»²½ÌáȨ¡£¡£¡£Ó¯ÀûģʽÔ̺¬AWSÃÜÔ¿ÇÔÈ¡¡¢ÍøÕ¾É¨Ãè¼°´îÔØPhoenixMinerµÈ¼ÓÃÜÇ®±ÒÍڿ󹤾߰ü£¬£¬£¬Ëä¾ß±¸DDoSÄÜÁ¦µ«ÉÐδ¹Û²ìµ½ÏÖʵ¹¥»÷£¬£¬£¬´§Ä¦¿ÉÄÜ´¦ÓÚ²âÊÔ»ò¶Ú»ý½Ó¼û½×¶Î¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-linux-botnet-sshstalker-uses-old-school-irc-for-c2-comms/
2. ÎÖ¶ûÎÖ±±ÃÀ¿Í»§Êý¾ÝÒòConduent¹¥»÷й¶
2ÔÂ10ÈÕ£¬£¬£¬ÎÖ¶ûÎÖ¼¯ÍŽüÆÚ½ÓÁ¬ÆØ³ö¶àÆðÓɵÚÈý·½·þÎñÉÌÒý·¢µÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Òý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¾ÝÅû¶£¬£¬£¬ÎÖ¶ûÎÖ¼¯Íű±ÃÀ¹«Ë¾ÒòÃÀ¹úóÒ×·þÎñ¾ÞÍ·ConduentµÄITϵͳÔâÈëÇÖ£¬£¬£¬µ¼Ö½ü17,000Ãû¿Í»§¼°Ô±¹¤Ð¡ÎÒÐÅϢй¶£¬£¬£¬Éæ¼°È«Ãû¡¢Éç±£º£º£ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢½¡¿µ±£ÏÕÏêÇéµÈÃô¸ÐÊý¾Ý¡£¡£¡£Conduent×÷ΪҵÎñÁ÷³ÌÍâ°ü·þÎñÉÌ£¬£¬£¬ÔÚ2024Äê10ÔÂÖÁ2025Äê1ÔÂÆÚ¼äÔâ·ê°²È«·ì϶£¬£¬£¬Ó°ÏìÁìÓòº¸Ç¶íÀÕ¸ÔÖÝ1050ÍòÈË¡¢µÂ¿ËÈøË¹ÖÝ1550ÍòÈË£¬£¬£¬Ä¿Ç°ÊÜÓ°Ïì×ÜÈËÊýÉÐδÆëȫȷ¶¨¡£¡£¡£Áíһ·ÊÂÎñÓÉIT·þÎñÉÌMilj?dataµÄϵͳ·ì϶Òý·¢£¬£¬£¬2025Äê8ÔÂй¶150ÍòÌõÐÅÏ¢£¬£¬£¬Éæ¼°Èðµä¡¢ÃÀ¹úÎÖ¶ûÎÖ¼¯ÍÅÔ±¹¤ÐÕÃû¼°Éç±£º£º£ºÅÂë¡£¡£¡£Õë¶ÔConduentÊÂÎñ£¬£¬£¬ÎÖ¶ûÎÖ¼¯Íű±ÃÀ¹«Ë¾ÒÑÆô¶¯Ó¦¶Ô´ëÊ©£º£º£ºÎªÊÜÓ°Ïì·½ÌṩÖÁÉÙÒ»ÄêµÄÃâ·ÑÉí·Ý¼à¿Ø¡¢ÐÅÓþ¼°°µÍø¼à¿Ø·þÎñ£¬£¬£¬²¢½¨ÒéÓû§ÉèÏàÐÅÓþ»ã±¨Ú²Æ¾¯±¨»ò°²È«¶³½á¡£¡£¡£¶øMilj?dataÊÂÎñµÄ¾ßÌåÓ¦¶Ô´ëÊ©ÉÐδ¹«¿ªÅû¶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/
3. ¿çƽ̨óÒ×¼äµýÈí¼þZeroDayRATÍþвСÎÒÓë×éÖ¯°²È«
2ÔÂ10ÈÕ£¬£¬£¬°²È«»ú¹¹iVerifyÅû¶һ¿îÃûΪZeroDayRATµÄÐÂÐÍóÒ×ÒÆ¶¯¼äµýÈí¼þ¹¤¾ß°ü£¬£¬£¬ÆäÖ°ÄÜÖ®È«Ãæ¡¢»úÄÜ֮׳´ó¿°±È¹ú¶È¼¶¿ª·¢¹¤¾ß£¬£¬£¬ÇÒÒÑÔÚTelegramƽ̨¹«¿ªÏúÊÛ¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ§³Ö°²×¿ÓëiOS˫ƽ̨£¬£¬£¬¹¥»÷Õß¿ÉÆëÈ«½ÚÖÆÊÜϰȾÉ豸£¬£¬£¬ÊµÏÖʵʱÉãÏñÍ·½Ó¼û¡¢¼üÅ̼ͼ¡¢GPS¶¨Î»×·×Ù¼°½ðÈÚÊý¾ÝÇÔÈ¡µÈÖ÷ÌâÖ°ÄÜ¡£¡£¡£ZeroDayRATͨ¹ý¶ÌÐÅ/Óʼþ´¹µö¡¢ÐéαÀûÓûò¼´Ê±Í¨Ñ¶Æ½Ì¨·ÖÏíµÄ¶ñÒâÁ´½Ó´«²¼£¬£¬£¬¹¥»÷ÕßÐè×ÔÐд·þÎñÆ÷²¢ÌìÉú¶ñÒâÀûÓÃϰȾÊܺ¦Õß¡£¡£¡£ÆäÅäÌ×½ÚÖÆÃæ°åÌṩÉ豸ȫά¶È¸ÅÀÀ£¬£¬£¬Ô̺¬ÊÖ»úÐͺš¢²Ù×÷ϵͳ¡¢µç³Ø×´Ì¬¡¢SIM¿¨ÐÅÏ¢¡¢ÀûÓÃʹÓüͼ¡¢¶ÌÐÅÔ¤ÀÀ¼°½üÆÚ»î¶¯¹ì¼££¬£¬£¬Ê¹¹¥»÷ÕßÄܾ«×¼·ÖÎöÓû§Ï°¹ßÓëÉç½»¹ØÏµ¡£¡£¡£ÊµÊ±¼à¿ØÄ£¿£¿éÖ§³ÖǰÖÃ/ºóÖÃÉãÏñÍ·»ÃæÖ±²¥¡¢ÆÁÄ»Â¼ÖÆ¡¢Âó¿Ë·ç¼àÌý¼°GPSº¹Çà¹ì¼£×·×Ù£¬£¬£¬½áºÏÕË»§Ñ¡ÏÁгöµÄGoogle¡¢WhatsApp¡¢InstagramµÈƽ̨ע²áÕ˺ţ¬£¬£¬¿ÉÌáÒéÕë¶ÔÐÔÉç½»¹¤³Ì¹¥»÷»òÕË»§µÁÓᣡ£¡£½ðÈÚ͵ÇÔÄ£¿£¿é·ÖΪ¼ÓÃÜÇ®±ÒÓëÒøÐÐÁ½´ó·ÖÖ§£º£º£ºÇ°ÕßɨÃèÉ豸Ǯ°üÀûÓüͼID¡¢Óà¶î£¬£¬£¬²¢½Ù³Ö¼ôÌù°å´úÌæÇ®°üµØÖ·£»£»£»ºóÕßÕë¶ÔÒÆ¶¯ÒøÐС¢UPI·þÎñ¼°PayPalµÈÖ§¸¶Æ½Ì¨£¬£¬£¬Í¨¹ý¸²¸Ç²ãÇÔÈ¡µÇ¼ƾ֤¡£¡£¡£
https://securityaffairs.com/187820/malware/zerodayrat-spyware-grants-attackers-total-access-to-mobile-devices.html
4. ¼Ùð7-ZipÍøÕ¾É¢²¼Ä¾Âí¹¹½¨×¡Õ¬´úÀíÍøÂç
2ÔÂ10ÈÕ£¬£¬£¬ÍøÂ簲ȫ¹«Ë¾MalwarebytesÅû¶һ·ÀûÓüÙð7-ZipÍøÕ¾É¢²¼Ä¾Âí×°Ö÷¨Ê½µÄ¹¥»÷»î¶¯£¬£¬£¬¸Ã¶ñÒâÈí¼þ½«Óû§ÍÆËã»úת»¯Îª×¡Õ¬´úÀí½Úµã£¬£¬£¬ÓÃÓÚÖ´ÐÐÆ¾Ö¤Ìî³ä¡¢ÍøÂç´¹µö¡¢¶ñÒâÈí¼þ´«²¼µÈ¶ñÒâ»î¶¯¡£¡£¡£¹¥»÷Õß×¢²áÓòÃû7zip[.]com£¬£¬£¬Í¨¹ý¸´ÖƺϷ¨7-ZipÍøÕ¾µÄ½á¹¹¼°Îı¾£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâ×°Ö÷¨Ê½£¬£¬£¬ÕâÒ»·ì϶ÒòÓû§Í¨¹ýYouTubeµçÄÔ×é×°½Ì³ÌÊèµ¼ÖÁ¸ÃÍøÕ¾¶ø¹ãΪÈËÖª¡£¡£¡£¶ñÒâ×°Ö÷¨Ê½Ê¹ÓÃÒѳ·³ýµÄJozeal Network Technology Co., LimitedÖ¤ÊéÊðÃû£¬£¬£¬ËäÔ̺¬7-ZipͨÀýÖ°ÄÜ£¬£¬£¬µ«»á¿ªÊÍÈý¸ö¶ñÒâÎļþ£º£º£ºUphero.exe¡¢hero.exe¡¢hero.dll¡£¡£¡£ÕâЩÎļþ´æ·ÅÓÚ¡°C:\Windows\SysWOW64\hero\¡±£¬£¬£¬²¢´´½¨ÒÔSYSTEMÉí·ÝÔËÐеÄ×Ô¶¯Æô¶¯Windows·þÎñ£¬£¬£¬Í¬Ê±Åú¸Ä·À»ðǽ¹æ¶¨ÔÊÐíÈëÕ¾/³öÕ¾Ïνӡ£¡£¡£Í¨¹ý΢ÈíWMI¼°Windows API£¬£¬£¬¶ñÒâÈí¼þÍøÂçÖ÷»úÓ²¼þ¡¢ÄÚ´æ¡¢CPU¡¢´ÅÅÌ¡¢ÍøÂç¸öÐÔ£¬£¬£¬Êý¾Ý·¢ËÍÖÁiplogger[.]org¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-7-zip-site-distributes-installer-laced-with-proxy-tool/
5. ³¯ÏÊUNC1069ºÚ¿ÍAIÊÓÆµÓë¶à¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÇ®±Ò
2ÔÂ10ÈÕ£¬£¬£¬¹È¸èMandiant×êÑÐÍŶӽüÈÕÅû¶£¬£¬£¬³¯ÏʺڿÍ×éÖ¯UNC1069×Ô2018ÄêÆð³ÖÐø½ø»¯£¬£¬£¬×Ô2023ÄêÆð½«Ö¸±êתÏòWeb3¼°¼ÓÃÜÇ®±ÒÐÐÒµ£¬£¬£¬Í¨¹ýAIÌìÉúÊÓÆµÓëClickFix¼¼ÊõÌáÒ鶍֯»¯¹¥»÷£¬£¬£¬Ïò½ðÈڿƼ¼¹«Ë¾Í¶·ÅmacOS¼°Windows¶ñÒâÈí¼þÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò²¢Íƶ¯Éç»á¹¤³Ì¹¥»÷¡£¡£¡£¹¥»÷Á´ÒÔÉç»á¹¤³ÌѧΪÖ÷Ì⣺£º£ººÚ¿Íͨ¹ýTelegramµÁÓüÓÃÜÇ®±Ò¹«Ë¾¸ß¹ÜÕË»§ÁªÏµÊܺ¦Õߣ¬£¬£¬³ÉÁ¢ÐÅÀµºó·ÖÏí¼Ù×°³ÉCalendlyÁ´½ÓµÄαÔìZoom»áÒéÒ³Ãæ¡£¡£¡£ÔÚ¡°»áÒ顱ÖУ¬£¬£¬ºÚ¿Í²¥·ÅÁíÒ»¼ÓÃܹ«Ë¾CEOµÄÉî¶ÈαÔìÊÓÆµ£¬£¬£¬»Ñ³ÆÊܺ¦ÕßÔâ·êÒôƵÎÊÌ⣬£¬£¬ÓÕµ¼ÆäÖ´ÐÐÍøÒ³ºÅÁîÆô¶¯Ï°È¾Á´¡£¡£¡£Huntress×êÑÐÈËÔ±2025ÄêÖÐÆÚ¼Í¼µÄÀàËÆÊÖ·¨ÏÔʾ£¬£¬£¬´ËÀ๥»÷Óɳ¯ÏÊBlueNoroff£¨±ðºÅSapphire Sleet/TA44£©Ö´ÐУ¬£¬£¬Õë¶ÔmacOSϵͳʹÓÃ·ÖÆçÔØºÉ¡£¡£¡£Ï°È¾Á´Æô¶¯ºó£¬£¬£¬¹¥»÷Õßͨ¹ýAppleScriptÖ´ÐжñÒâMach-O¶þ½øÖÆÎļþ£¬£¬£¬²¿ÊðÆß¸ömacOS¶ñÒâÈí¼þ¼Ò×壺£º£ºWAVESHAPER¡¢HYPERCALL¡¢HIDDENCALL¡¢SILENCELIFT¡¢DEEPBREATH¡¢SUGARLOADER¼°CHROMEPUSH¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/
6. Claude Opus 4.6 Ö÷Á÷¿ªÔ´¿â·¢ÏÖ500+¸ßΣ·ì϶
2ÔÂ6ÈÕ£¬£¬£¬ÈËΪÖÇÄܹ«Ë¾Anthropic½üÈÕ°ä²¼Æä×îдó˵»°Ä£ÐÍClaude Opus 4.6£¬£¬£¬¸ÃÄ£ÐÍÔÚ´úÂëÉó²éÓëµ÷ÊÔÄÜÁ¦ÉÏʵÏÖÏÔÖøÉý¼¶£¬£¬£¬²¢ÔÚ½ðÈÚ·ÖÎö¡¢×êÑС¢ÎĵµÌìÉúµÈ¹¤×÷Öвû·¢ÓÅ»¯¡£¡£¡£ÓÈÎªÖØÒªµÄÊÇ£¬£¬£¬Opus 4.6ÔÚÎÞÐèרÓù¤¾ß¡¢×Ô½ç˵¿ò¼Ü»òÌØ¶¨ÌáÐѴʵÄÇé¿öÏ£¬£¬£¬×ÔÖ÷·¢ÏÖÁËGhostscript¡¢OpenSC¡¢CGIFµÈ¿ªÔ´¿âÖÐ500Óà¸ö´Ëǰδ֪µÄ¸ßΣ°²È«·ì϶£¬£¬£¬Ä¿Ç°Òѱ»ÓÃÓÚ¿ªÔ´Èí¼þ·ì϶µÄ·¢ÏÖÓëÐÞ¸´¸¨Öú¹¤×÷¡£¡£¡£AnthropicÇ¿µ÷£¬£¬£¬Opus 4.6¾ß±¸ÀàËÆÈËÀà×êÑÐÔ±µÄ´úÂëÍÆÀíÄÜÁ¦£¬£¬£¬Í¨¹ý¶ÈÎö¹ýÍùÐÞ¸´¼Í¼¼ø±ðͬÀàδ½â¾ö·ì϶£¬£¬£¬¶¨Î»Ò×Òý·¢ÎÊÌâµÄ´úÂëģʽ£¬£¬£¬²¢Éî¿ÌÀí½â·¨Ê½Âß¼ÒÔ¾«×¼ÅжÏÒì³£ÊäÈë´¥·¢Ç°Ìá¡£¡£¡£ÔÚÕýʽ°ä²¼Ç°£¬£¬£¬¸ÃÄ£ÐÍ¾Ç°ÑØºì¶ÓÔÚÐé¹¹»¯»·¾³ÖвâÊÔ£¬£¬£¬½¨Éèµ÷ÊÔÆ÷¡¢Ä£º£º£ºý²âÊÔÆ÷µÈ¹¤¾ß£¬£¬£¬È«³ÌδÌṩ¹¤¾ßʹÓÃÁìµ¼»ò¶îÍâ·ì϶¼ø±ðÐÅÏ¢£¬£¬£¬ÑéÖ¤ÁËÆä¿ªÏä¼´Óõķì϶·¢ÏÖÄÜÁ¦¡£¡£¡£
https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html


¾©¹«Íø°²±¸11010802024551ºÅ