ÐÂÐÍLinux¶ñÒâÈí¼þQLNX¹¥»÷¿ª·¢Õßϵͳ

°ä²¼¹¦·ò 2026-05-07

1. ÐÂÐÍLinux¶ñÒâÈí¼þQLNX¹¥»÷¿ª·¢Õßϵͳ


5ÔÂ5ÈÕ £¬£¬Ò»ÖÖ´Ëǰδ±»¼Í¼µÄÃûΪQuasar Linux£¨QLNX£©µÄLinuxÖ²È뷨ʽ £¬£¬ÕýÀûÓÃrootkit¡¢¡¢ºóÃÅºÍÆ¾Ö¤ÇÔȡְÄܹ¥»÷¿ª·¢Õßϵͳ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒѲ¿ÊðÔÚnpm¡¢¡¢PyPI¡¢¡¢GitHub¡¢¡¢AWS¡¢¡¢DockerºÍKubernetesµÈ¿ª·¢ºÍDevOps»·¾³ÖÐ £¬£¬¿ÉÄܵ¼Ö¹©¸øÁ´¹¥»÷¡£¡£¡£¡£¾ÝÇ÷Ïò¿Æ¼¼×êÑÐÈËÔ±·ÖÎö £¬£¬QLNXʹÓÃgccÔÚÖ¸±êÖ÷»úÉ϶¯Ì¬±àÒërootkit¹²Ïí¶ÔÏóºÍPAMºóÃÅÄ£¿é¡£¡£¡£¡£ÆäÉè¼ÆÖ¼ÔÚʵÏÖÒñ±ÎÐԺͳ־ÃÓÆ¾ÃÐÔ £º£º£ºÔÚÄÚ´æÖÐÔËÐÐ £¬£¬É¾³ýԭʼ¶þ½øÖÆÎļþ £¬£¬²Á³ýÈÕÖ¾ £¬£¬Î±Ôì¹ý³ÌÃû³Æ £¬£¬²¢¶Ï¸ùȡ֤»·¾³±äÁ¿¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þѡȡÆßÖÖ·ÖÆçµÄÓÆ¾Ã»¯»úÖÆ £¬£¬Ô̺¬LD_PRELOAD¡¢¡¢systemd¡¢¡¢crontab¡¢¡¢init.d¾ç±¾¡¢¡¢XDG×Ô¶¯Æô¶¯ºÍ.bashrc×¢Èë £¬£¬È·±£Æä¼ÓÔØµ½Ã¿¸ö¶¯Ì¬Á´½Ó¹ý³ÌÖÐ £¬£¬²¢ÔÚ±»ÖÕÖ¹ºóÖØÐÂÌìÉú¡£¡£¡£¡£QLNXÔ̺¬¶à¸öרÓÃÓÚÌØ¶¨»î¶¯µÄÖ°ÄÜÄ£¿é £¬£¬ÊÇÒ»¿îÆëÈ«µÄ¹¥»÷¹¤¾ß¡£¡£¡£¡£»£»ñµÃ³õʼ½Ó¼ûȨÏÞºó £¬£¬QLNX³ÉÁ¢ÎÞÎļþ°²Éíµã £¬£¬²¿ÊðÓÆ¾ÃÐÔºÍÒñ±Î»úÖÆ £¬£¬½ø¶øÍøÂ翪·¢ÕߺÍÔÆÆ¾Ö¤¡£¡£¡£¡£Í¨¹ý¹¥»÷¿ª·¢Õß¹¤×÷Õ¾ £¬£¬¹¥»÷Õß¿ÉÈÆ¹ýÆóÒµ°²È«½ÚÖÆ £¬£¬»ñȡ֧³ÖÈí¼þ½»¸¶¹ÜµÀµÄÍ´´¦¡£¡£¡£¡£ÕâÓë´Ëǰ²úÉúµÄ¹©¸øÁ´¹¥»÷ÊÂÎñ¸ß¶ÈÀàËÆ £¬£¬¼´±»µÁÓõĿª·¢Õ߯¾Ö¤±»ÓÃÓÚ½«Ä¾Âí»¯Èí¼þ°ü°ä²¼´ó¹«¹²´æ´¢¿â¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-stealthy-quasar-linux-malware-targets-software-developers/


2. DAEMON ToolsÔâÖ²ÈëľÂí £¬£¬ÊýǧϵͳÂÙÏÝ


5ÔÂ5ÈÕ £¬£¬ºÚ¿ÍÔÚDAEMON ToolsÈí¼þµÄ×°Ö÷¨Ê½ÖÐÖ²ÈëÁËľÂí £¬£¬×Ô4ÔÂ8ÈÕÒÔÀ´ÒÑÏòÊýǧ¸ö´Ó¹Ù·½ÍøÕ¾ÏÂÔØ¸Ã²úÆ·µÄϵͳֲÈëÁ˺óÃÅ¡£¡£¡£¡£Õâ´Î¹©¸øÁ´¹¥»÷µ¼ÖÂ100¶à¸ö¹ú¶È³öÏÖÊýǧÀýϰȾ £¬£¬µ«µÚ¶þ½×¶ÎµÄ¶ñÒâÔØºÉ½ö²¿ÊðÔÚÊ®¼¸Ì¨»úеÉÏ £¬£¬Åú×¢ÕâÊÇÒ»´ÎÕë¶Ô¸ß¼ÛÖµÖ¸±êµÄ¶¨Ïò¹¥»÷¡£¡£¡£¡£½Ó¹ÜÏÂÒ»½×¶ÎÓÐÐ§ÔØºÉµÄÊܺ¦ÕßÔ̺¬¶íÂÞ˹¡¢¡¢°×¶íÂÞ˹ºÍÌ©¹úµÄÁãÊÛ¡¢¡¢¿ÆÑС¢¡¢µ±¾ÖºÍÖÆ×÷×éÖ¯¡£¡£¡£¡£µ±Óû§ÏÂÔØ²¢Ö´Ðо­¹ýÊý×ÖÊðÃûµÄľÂí×°Ö÷¨Ê½ºó £¬£¬Ç¶ÈëÔÚ±»ÈëÇÖ¶þ½øÖÆÎļþÖеĶñÒâ´úÂë¼´±»´¥·¢¡£¡£¡£¡£¸Ã¶ñÒâ´úÂë»á³ÉÁ¢ÓƾÃÐÔ £¬£¬²¢ÔÚϵͳÆô¶¯Ê±¼¤»îºóÃÅ £¬£¬·þÎñÆ÷¿ÉÔ¶³ÌÅúʾϵͳÏÂÔØ²¢Ö´ÐжîÍâÓÐÐ§ÔØºÉ¡£¡£¡£¡£µÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þÊÇÒ»¸ö¸ù»ùÐÅÏ¢ÇÔÈ¡·¨Ê½ £¬£¬ÍøÂçÖ÷»úÃû¡¢¡¢MACµØÖ·¡¢¡¢ÕýÔÚÔËÐеĹý³Ì¡¢¡¢ÒÑ×°ÖÃÈí¼þºÍÏµÍ³ÇøÓòÉèÖõÈÊý¾Ý £¬£¬ÓÃÓÚÊܺ¦Õß»­Ïñ·ÖÎö¡£¡£¡£¡£Æ¾¾Ý²âÊÔÁË¾Ö £¬£¬²¿ÃÅϵͳ»á»ñµÃµÚ¶þ½×¶Î¡ª¡ªÒ»¸öÇáÁ¿¼¶ºóÃÅ £¬£¬¿ÉÖ±½ÓÔÚÄÚ´æÖÐÖ´ÐкÅÁî¡¢¡¢ÏÂÔØÎļþºÍÔËÐдúÂë¡£¡£¡£¡£ÔÚÖÁÉÙһ·Õë¶Ô¶íÂÞ˹½ÌÓý»ú¹¹µÄ°¸ÀýÖÐ £¬£¬¿¨°Í˹»ù¹Û²ìµ½²¿ÊðÁËÃûΪQUIC RATµÄ¸ü¸ß¼¶¶ñÒâÈí¼þ £¬£¬¸ÃÈí¼þÖ§³Ö¶àÖÖͨѶºÍ̸ £¬£¬²¢Äܽ«¶ñÒâ´úÂë×¢ÈëºÏ·¨¹ý³Ì¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/daemon-tools-trojanized-in-supply-chain-attack-to-deploy-backdoor/


3. Palo Alto Networks PAN-OS·ì϶ÔâÀûÓÃ


5ÔÂ6ÈÕ £¬£¬Palo Alto Networks½üÈÕ·¢³öÖÒ¸æ £¬£¬ÆäPAN-OSϵͳµÄÒ»¸öÑÏÖØ·ì϶£¨±àºÅCVE-2026-0300 £¬£¬CVSSÆÀ·Ö9.3£©Òѱ»¶ñÒâÀûÓᣡ£¡£¡£¸Ã·ì϶Ϊ»º³åÇøÒç³ö·ì϶ £¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆÊý¾Ý°ü £¬£¬ÔÚPAϵÁкÍVMϵÁзÀ»ðǽÉÏÒÔrootȨÏÞÖ´ÐÐËÁÒâ´úÂë £¬£¬ÓÈÆäµ±Óû§IDÉí·ÝÑéÖ¤ÃÅ»§Â¶³öÓÚ»¥ÁªÍøÊ±·çÏÕ¼«¸ß¡£¡£¡£¡£Palo Alto NetworksÔÚ°²È«²¼¸æÖÐÖ¸³ö £¬£¬¸Ã·ì϶λÓÚUser-IDÉí·ÝÑéÖ¤ÃÅ»§·þÎñÖÐ £¬£¬ÈôÒÀÕÕ×î¼Ñʵ¼ÊÖ¸ÄϽ«¸ÃÃÅ»§µÄ½Ó¼ûȨÏÞÏÞ¶ÈΪ½öÏÞÊÜÐÅÀµµÄÄÚ²¿IPµØÖ· £¬£¬Ôò¿É´ó·ù½µµÍ·çÏÕ¡£¡£¡£¡£¸ÃÎÊÌâ²»»áÓ°ÏìPrisma Access¡¢¡¢Cloud NGFWºÍPanoramaÉ豸¡£¡£¡£¡£Ä¿Ç° £¬£¬¸Ã·ì϶ÉÐδÐÞ¸´ £¬£¬Ô¤¼Æ½«ÓÚ2026Äê5ÔÂ13ÈÕ°ä²¼²¹¶¡¡£¡£¡£¡£Palo Alto Networks°µÊ¾ £¬£¬ÒÑ·¢ÏÖÕë¶ÔÓû§IDÉí·ÝÑéÖ¤ÃÅ»§Â¶³öÓÚ¹«¹²»¥ÁªÍøµÄϵͳµÄÓÐÏÞÁìÓò·ì϶ÀûÓÃÐÐΪ¡£¡£¡£¡£


https://securityaffairs.com/191748/security/palo-alto-networks-pan-os-flaw-exploited-for-remote-code-execution.html


4. ¹È¸è¸æ°×ÔâÀûÓà £¬£¬ManageWPÓû§Ôâ´¹µö¹¥»÷


5ÔÂ6ÈÕ £¬£¬Ò»³¡Í¨¹ý¹È¸èÔÞÖúËÑË÷Á˾ÖÌáÒéµÄÍøÂç´¹µö»î¶¯ £¬£¬ÕýÒÔ»ñÈ¡ManageWPƽ̨µÄµÇ¼ʹ´¦ÎªÖ¸±ê¡£¡£¡£¡£ManageWPÊÇGoDaddyÆìÏÂÓÃÓÚ¼¯ÖÐÖÎÀíWordPressÍøÕ¾ÈºµÄƽ̨ £¬£¬Óû§¿Éͨ¹ýÒ»¸ö½ÚÖÆÃæ°åÔ¶³ÌÖÎÀí¶à¸öÍøÕ¾ £¬£¬³£¼ûÓû§Ô̺¬ÍøÕ¾¿ª·¢ÈËÔ±¡¢¡¢ÍøÂç´úÀí»ú¹¹¼°ÆóÒµÓû§¡£¡£¡£¡£ÍþвÐÐΪÕßѡȡÖÐÑëÈ˹¥»÷²½Öè £¬£¬Í¨¹ýÐéαµÇÂ¼Ò³Ãæ³äÈÎÊܺ¦ÕߺͺϷ¨ManageWP·þÎñÖ®¼äµÄʵʱÆÚÀí¡£¡£¡£¡£¾ÝGuardio Labs×êÑÐÈËÔ±ÖÒ¸æ £¬£¬Õë¶Ô¡°managewp¡±µÄËÑË÷²éÎÊ £¬£¬ÐéαÁ˾ֻá³Ê´Ë¿ÌÕæÊµÁ˾ÖÉÏ·½ £¬£¬ÓÕʹÒÀÀµ¹È¸è²éÕҵǼURLµÄÓû§µã»÷¡£¡£¡£¡£¶ñÒâÁ´½Ó½«Óû§Êèµ¼ÖÁÓëÕæÊµµÇÂ¼Ò³ÃæÆëȫһÑùµÄαÔìÒ³Ãæ £¬£¬ÊäÈëµÄÈκÎÍ´´¦³ÇÊб»·¢ËÍÖÁ¹¥»÷Õß½ÚÖÆµÄTelegramƵµÀ¡£¡£¡£¡£ÓëͨÀý´¹µöÒ³Ãæ·ÖÆç £¬£¬¸Ã»î¶¯Ñ¡È¡ÊµÊ±AiTM»úÖÆ £¬£¬¹¥»÷ÕßʹÓÃÇÔÈ¡µÄƾ֤ʵʱµÇ¼ƽ̨ £¬£¬ËæºóÊܺ¦Õ߻ῴµ½ÐéαµÄË«³É·ÖÉí·ÝÑéÖ¤ÌáÐÑ £¬£¬ÍþвÐÐΪÕß½è´Ë»ñÈ¡¶ÔManageWPÕË»§µÄÆëÈ«½Ó¼ûȨÏÞ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing/


5. ÑÇÂíÑ·SESÔâÀÄÓà £¬£¬´¹µöÓʼþÈÆ¹ý°²È«¹ýÂË


5ÔÂ4ÈÕ £¬£¬¾Ý¿¨°Í˹»ù»ã±¨ £¬£¬ÑÇÂíÑ·µ¥Ò»µç×ÓÓʼþ·þÎñÕýÈÕÒæ±»ÀÄÓÃÓÚ·¢ËÍÓµÓкýŪÐÔµÄÍøÂç´¹µöµç×ÓÓʼþ £¬£¬ÕâЩÓʼþ¿ÉÄÜÈÆ¹ý³ß¶È°²È«¹ýÂËÆ÷²¢Ê¹»ùÓÚŵÑÔµÄ×èÖ¹»úÖÆÊ§Ð§¡£¡£¡£¡£ÓÉÓÚÑÇÂíÑ·SESÊÇÒ»¸öºÏ·¨ÇÒ¿ÉÐŵķþÎñ £¬£¬ÍøÂç´¹µö»î¶¯Äܹ»ÀûÓÃËü·¢ËÍ¿ÉÄÜͨ¹ýÉí·ÝÑéÖ¤²é³­µÄ¶ñÒâµç×ÓÓʼþ¡£¡£¡£¡£¿¨°Í˹»ù×êÑÐÈËÔ±¹Û²ìµ½ÀûÓÃÑÇÂíÑ·SES½øÐеÄÍøÂç´¹µö¹¥»÷ÓÐËùÔö³¤ £¬£¬ÕâЩ¹¥»÷½«Óû§Öض¨ÏòÖÁ¶ñÒâÍøÕ¾¡£¡£¡£¡£×êÑÐÈËÔ±ÒÔΪ £¬£¬ÕâÖÖÀÄÓõÄÖØÒªÇý¶¯³É·ÖÊÇGitHub´æ´¢¿â¡¢¡¢.ENVÎļþ¡¢¡¢Docker¾µÏñ¡¢¡¢±¸·ÝºÍ¿É¹«¿ª½Ó¼ûµÄS3´æ´¢Í°ÖÐAWSƾ֤µÄ¶³öˮƽԽÀ´Ô½¸ß¡£¡£¡£¡£¹¥»÷Õßͨ³£Ê¹ÓûùÓÚ¿ªÔ´TruffleHog¹¤¾ß¹¹½¨µÄ»úеÈË £¬£¬Í¨¹ý×Ô¶¯»¯·½Ê½É¨Ãèй¶µÄÃÜÔ¿¡£¡£¡£¡£´Ë¿Ì £¬£¬ÍþвÐÐΪÕßÒÀ¸½×Ô¶¯»¯¹¥»÷¼ò»¯°ÂÃØÉ¨Ãè¡¢¡¢È¨ÏÞÑéÖ¤ºÍµç×ÓÓʼþ·Ö·¢ £¬£¬ÊµÏÖÁËǰËùδÓеÄÀÄÓÃˮƽ¡£¡£¡£¡£ÔÚÑéÖ¤ÃÜԿȨÏ޺ͷ¢ËÍÏÞ¶Èºó £¬£¬¹¥»÷Õß¼´¿É´ó¹æÄ£É¢²¼ÍøÂç´¹µöÐÅÏ¢¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/researchers-report-amazon-ses-abused-in-phishing-to-evade-detection/


6. MuddyWater¼Ù×°ChaosÀÕË÷Èí¼þÖ´Ðмäµý»î¶¯


5ÔÂ6ÈÕ £¬£¬ÒÁÀʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯MuddyWater½üÆÚ½«Æä¹¥»÷Ðж¯¼Ù×°³ÉChaosÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£Ö»¹ÜÕâ´Î¹¥»÷Éæ¼°Æ¾Ö¤ÇÔÈ¡¡¢¡¢Óƾû¯¡¢¡¢Ô¶³Ì½Ó¼û¡¢¡¢Êý¾Ýй¶¡¢¡¢ÀÕË÷ÓʼþÒÔ¼°ÔÚChaosйÃÜÃÅ»§ÍøÕ¾ÉϵÄÌõ¿î £¬£¬µ«¹¥»÷ÕßʹÓõĻù´¡ÉèÊ©ºÍ¼¼ÊõÓëMuddyWaterÇ×êÇÓйء£¡£¡£¡£Rapid7µ÷²éµÄÈëÇÖÊÂÎñʼÓÚMicrosoft TeamsÉç½»¹¤³Ì £¬£¬¹¥»÷Õßͨ¹ýÓëÔ±¹¤Ì¸Ìì¡¢¡¢³ÉÁ¢ÆÁÄ»¹²Ïí»á»°¡¢¡¢ÇÔȡʹ´¦¡¢¡¢°Ñ³Ö¶à³É·ÖÉí·ÝÑéÖ¤ÉèÖà £¬£¬²¢ÔÚijЩÇé¿öϲ¿ÊðAnyDesk½øÐÐÔ¶³Ì½Ó¼û¡£¡£¡£¡£Æ¾Ö¤ÇÔȡͨ¹ý¼Ù×°³ÉMicrosoft Quick AssistµÄÍøÂç´¹µöÒ³Ãæ»òÓÕÆ­Êܺ¦Õß½«ÃÜÂëÊäÈë±¾µØÎı¾ÎļþʵÏÖ¡£¡£¡£¡£¹¥ÆÆÕË»§ºó £¬£¬¹¥»÷Õßͨ¹ýRDP¡¢¡¢DWAgentºÍAnyDeskµÈ¼¿Á©¶ÔÄÚ²¿ÏµÍ³½øÐÐÉí·ÝÑéÖ¤²¢³ÉÁ¢ÓƾÃÐÔ¡£¡£¡£¡£Ëæºó £¬£¬ËûÃÇÀûÓöñÒâÈí¼þ¼ÓÔØ·¨Ê½Í¶·Å×Ô½ç˵ºóÃÅ·¨Ê½ £¬£¬¸Ã·¨Ê½¼Ù×°³ÉMicrosoft WebView2ÀûÓ÷¨Ê½ £¬£¬¾ß±¸·´·ÖÎöºÍ·´Ðé¹¹»ú²é³­Ö°ÄÜ £¬£¬Ö§³ÖPowerShellºÍCMDºÅÁîÖ´ÐС¢¡¢ÎļþÉÏ´«ºÍɾ³ýÒÔ¼°ÓƾÃshell½Ó¼ûµÈ12¸öºÅÁî¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attacks/