¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷

Ðû²¼Ê±¼ä 2025-11-06

1. ¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷


11ÔÂ4ÈÕ£¬¶íÂÞ˹ºÚ¿Í×éÖ¯Curly COMrades±»ÆØ×Ô2024ÄêÄêÖÐÆð»îÔ¾£¬ÆäÔ˶¯Óë¶íÂÞ˹µØÔµÕþÖÎÀûÒæÇ×½üÏà¹Ø¡£¸Ã×é֯ͨ¹ýÀÄÓÃWindowsרҵ°æ/ÆóÒµ°æ¼°Windows ServerÖеÄMicrosoft Hyper-VÐéÄ⻯ÊÖÒÕ£¬½¨ÉèÒþ²ØµÄ»ùÓÚAlpine LinuxµÄÇáÁ¿¼¶ÐéÄâ»ú£¨½öÕ¼ÓÃ120MB´ÅÅ̿ռäºÍ256MBÄڴ棩ÔËÐжñÒâÈí¼þ£¬ÀÖ³ÉÈÆ¹ý¹Å°å»ùÓÚÖ÷»úµÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¼Æ»®¡£ÐéÄâ»úÄÚÍйÜÁË×Ô½ç˵¹¤¾ßCurlyShell·´ÏòshellºÍCurlCat·´ÏòÊðÀí£ºÇ°Õßͨ¹ýcron×÷Òµ¼á³Ö³¤ÆÚ»¯£¬ÒÔÎÞͷģʽÔËÐв¢Í¨¹ýHTTPSÅþÁ¬C2·þÎñÆ÷Ö´ÐÐÏÂÁºóÕß×÷ΪSOCKSÊðÀí·â×°SSHÁ÷Á¿ÎªHTTPSÇëÇó£¬ÊµÏÖÒþ²ØËíµÀ´«Ê䣬ʹ¶ñÒâÁ÷Á¿Î±×°³ÉÕýµ±Ö÷»úIPµØµã¡£¹¥»÷Àú³ÌÖУ¬ÍþвÐÐΪÕßÊ×ÏÈÔ¶³Ì»á¼ûÊܺ¦Õßϵͳ£¬ÆôÓÃHyper-V²¢½ûÓÃÆäÖÎÀí½çÃæ£¬°²ÅÅ»ùÓÚAlpine LinuxµÄ¼«¼òÐéÄâ»ú¡£BitdefenderÓë¸ñ³¼ªÑÇCERTÏàÖúÊӲ췢Ã÷£¬¸Ã×éÖ¯»¹Ê¹ÓÃÁ½¸öPowerShell¾ç±¾Ç¿»¯¹¥»÷£ºÆäÒ»½«KerberosƱ¾Ý×¢ÈëLSASSÒÔʵÏÖÔ¶³ÌϵͳÉí·ÝÑéÖ¤ºÍÏÂÁîÖ´ÐУ»Æä¶þͨ¹ý×éÕ½ÂÔÔÚÓòÄÚ¶ą̀ÅÌËã»ú½¨ÉèÍâµØÕË»§£¬Ö§³ÖºáÏòÒÆ¶¯¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/


2. ¡¶ÐûÑÔ±¨¡·Êý¾Ýй¶£¬ÕþÖÎÒþ˽Σº¦Í¹ÏÔ


11ÔÂ4ÈÕ£¬Òâ´óÀû×óÒí±ê¼ÇÐÔ±¨Ö½¡¶ÐûÑÔ±¨¡·£¨Il Manifesto£©ÒòδÉèÖÃÃÜÂë±£»¤µÄClickHouseÊý¾Ý¿â£¬µ¼ÖÂ15Íò¸¶·Ñ¶©ÔÄÓû§ÓÊÏä¼°1100ÍòÌõ·Ã¿ÍÐÐΪÈÕ־й¶¡£¸ÃÊý¾Ý¿â°üÀ¨×°±¸ÊÖÒÕϸ½Ú¡¢»á»°ÁîÅÆ¡¢IPµØµã¡¢¾«¶È´ï11Ã×µÄGeoIPÐÅÏ¢¼°ÎÄÕÂÍÆ¼öȪԴµÈÃô¸ÐÊý¾Ý£¬»¹Ì»Â¶ÁËÄÚ²¿ÍøÕ¾ÆÊÎöÊý¾Ý£¨ÈçÎÄÕÂÌåÏÖ¡¢ÊÜÖÚÐÐΪ¡¢Òý¼öȪԴ£©£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚÉÌÒµÇ鱨ÇÔÈ¡¡£×÷Ϊ1969Ä꽨ÉèµÄ¼¤½ø×óÒí¿¯Î¡¶ÐûÑÔ±¨¡·Ôø¼ÓÈë1972Äê´óÑ¡²¢ÔâÓö2000Äêз¨Î÷˹·Ö×ÓÕ¨µ¯Ï®»÷δË죬ÏÖΪ·ÇÓªÀûÏàÖúÉ磬ÈÕ¿¯ÐÐÁ¿Ô¼1.5Íò·Ý¡£´Ë´Îй¶ËäÎ´Éæ¼°ÃÜÂë»òÖ±½ÓÕË»§Æ¾Ö¤£¬µ«¶ÁÕßÔĶÁ¼Í¼Òò·´Ó¦ÕþÖÎÐËȤÓëÐÅÑö£¬ÊôÓÚÅ·ÖÞÒþ˽·¨ÖС°ÌØÊâÖÖ±ð¡±ÐÅÏ¢£¬ÃæÁÙ¸üÑϿᱣ»¤¡£ÈôÊý¾Ý±»ÕþÖÎÄîÍ·Õß»ñÈ¡£¬¶ÁÕßÓ뱨Éç¿ÉÄÜÔâÕþ¸®É§ÈÅ»ò¼àÊÓ¡£


https://cybernews.com/security/il-manifesto-data-leak-exposed-readers/


3. ÃÀ¹úSuper QuikÔâ¶í¹ØÁªÀÕË÷ÍŻ﹥»÷


11ÔÂ3ÈÕ£¬ÃÀ¹úÇøÓòÐÔ¼ÓÓÍÕ¾Á¬ËøµêSuper QuikÔâÓë¶íÂÞ˹ÓйصÄPlayÀÕË÷Èí¼þÍŻ﹥»÷£¬¹¥»÷ÕßÔÚ°µÍøÐ¹Â¶¼à¿ØÂ¼Ïñ¼°5.5GBÄÚ²¿Îļþ¡£´Ë´Îй¶°üÀ¨²ÆÎñ±¨¸æ£¨ÖðÈÕÏúÊÛ¶î¡¢ÀûÈ󱨸桢×ʲúÇ·Õ®±í¼°ÀúÄêÒµ¼¨½ÏÁ¿£©¡¢²É¹º·¢Æ±£¨ÊÖÒÕ×°±¸Óëά»¤±¾Ç®£©¡¢¼à¿ØÆ¬¶Ï£¨º¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢£©¡¢Ð½×ʱ任֪ͨ£¨Ô±¹¤ÐÕÃû¼°Ð½×ʱê×¼£©¡¢×°ÐÞÍýÏ루Ա¹¤ÁªÏµ·½·¨£©¡¢ÊÂÇéÆÀ¹À±ê×¼¡¢ÅàѵÖÊÁϼ°ÄÚ²¿Õþ²ßÎļþµÈÃô¸ÐÐÅÏ¢¡£PlayÍÅ»ïÒÔË«ÖØÀÕË÷ÊÖÒÕÖøÃû£¬ÒªÇóÖ§¸¶½âÃÜÓöȲ¢°ü¹Ü²»ÀÄÓñ»µÁÊý¾Ý¡£ÈôÆóÒµ¾Ü¾ø£¬ÆäÊý¾Ý½«±»¹ûÕæÒÔʩѹ¡£´Ë´ÎSuper QuikÊý¾Ýй¶¿ÉÄÜÒý·¢¶àÖØÎ£º¦£º²ÆÎñ±¨¸æÓ뷢Ʊ¿ÉÄÜ̻¶ÉÌÒµÇ鱨¡¢¹©Ó¦É̶¨¼Û¼°»ù´¡Éèʩϸ½Ú£¬±»¾ºÕùµÐÊÖʹÓã»¼à¿ØÆ¬¶Ï¿ÉÄÜ̻¶¼à¿ØÃ¤Çø£¬Ô±¹¤/Ö÷¹ËÃæ²¿ÐÅÏ¢Éæ¼°Òþ˽ÓëÖ´·¨ÎÊÌ⣻н×Ê¡¢ÁªÏµ·½·¨µÈÊý¾ÝÔöÌíÉí·Ý͵ÇÔÓëÉç»á¹¤³Ì¹¥»÷Σº¦£»ÄÚ²¿ÎļþÄ£°å¿ÉÄܱ»ÓÃÓÚÕ©Æ­£¬ÍþвÐÔÓïÑÔÎļþÔò¿ÉÄÜË𺦹«Ë¾¹«ÖÚÐÎÏó¡£


https://cybernews.com/security/ransomware-super-quik-data-leak/


4. Gootloader¶ñÒâÈí¼þ7¸öÔºó¾íÍÁÖØÀ´


11ÔÂ5ÈÕ£¬Gootloader¶ñÒâÈí¼þ¼ÓÔØÆ÷ÔÚÏûÊÅ7¸öÔºóÖØÏÖ£¬Í¨¹ýSEOͶ¶¾ÍƹãÐéÎ±ÍøÕ¾ÒÔÈö²¥¶ñÒâÈí¼þ¡£¸Ã»ùÓÚJavaScriptµÄ¼ÓÔØÆ÷ͨ¹ý±»ÈëÇÖ»ò¹¥»÷Õß¿ØÖƵÄÍøÕ¾£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâÎĵµ¡£Æä¹¥»÷Á´ÌõʼÓÚSEOͶ¶¾£¬Í¨¹ýÓÅ»¯Ìض¨Òªº¦´Ê£¨ÈçÖ´·¨ÎļþºÍЭÒ飩ÔÚËÑË÷ÒýÇæÖеÄÅÅÃû£¬ÎüÒýÓû§»á¼ûαװ³ÉÖ´·¨ÎļþÄ£°å·ÖÏíÆ½Ì¨µÄÍøÕ¾¡£µ±Óû§µã»÷¡°»ñÈ¡Îĵµ¡±°´Å¥Ê±£¬ÍøÕ¾»áÑéÖ¤ÊÇ·ñΪÕýµ±Óû§£¬ËæºóÏÂÔØ°üÀ¨.jsÀ©Õ¹ÃûµÄ¶ñÒâѹËõ°ü¡£Ö´Ðкó£¬Gootloader»áÏÂÔØCobalt Strike¡¢ºóÃųÌÐò¼°½©Ê¬³ÌÐòµÈ¶ñÒâÔØºÉ£¬Îª¹¥»÷ÕßÌṩÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ£¬×îÖÕ¿ÉÄܰ²ÅÅÀÕË÷Èí¼þ¡£´Ë´Î»Ø¹é£¬Gootloader½ÓÄɶàÏîÐÂÊÖÒÕ¹æ±Ü¼ì²â£ºÍ¨¹ýÌØÊâÍøÒ³×ÖÌåÌæ»»×ÖÐΣ¬ÔÚHTMLÔ´´úÂëÖÐÒþ²Ø¡°·¢Æ±¡±¡°ÌõÔ¼¡±µÈÒªº¦´Ê£»Ê¹ÓÃÃûÌùýʧµÄZIPÎļþ£¬Windows×ÊÔ´ÖÎÀíÆ÷½âѹʱÊͷŶñÒâJSÎļþ£¬¶øÇå¾²¹¤¾ß½âѹÔòÏÔʾÎÞº¦Îı¾Îļþ£¬×ÌÈÅÆÊÎö¡£±ðµÄ£¬¹¥»÷ÕßÖ²ÈëSupper SOCKS5ºóÃÅ£¬ÊµÏÖÔ¶³Ì»á¼û¡£


https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/


5. ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾ÔâºÚ¿ÍÈëÇÖÖÂСÎÒ˽¼ÒÐÅϢй¶


11ÔÂ5ÈÕ£¬¿ËÈÕ£¬ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾£¨HAEA£©ÔâÓöºÚ¿ÍÈëÇÖ£¬¹¥»÷Õßͨ¹ý²»·¨»á¼ûÆäITÇéÐÎÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂ루SSN£©¼°¼ÝʻִÕÕÔÚÄÚµÄСÎÒ˽¼ÒÐÅÏ¢¡£¸Ã¹«Ë¾ÓÚ3ÔÂ1ÈÕÊ״η¢Ã÷ÈëÇÖ¼£Ïó£¬ËæºóÁ¬Ã¦ÍŽáÍâ²¿ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÕö¿ªÊӲ죬ȷÈϹ¥»÷ʼÓÚ2ÔÂ22ÈÕÇÒÒÑ¿ØÖÆÊ±ÊÆ¡£HAEA×÷ΪÏÖ´úÆû³µ¼¯ÍÅ×Ó¹«Ë¾£¬ÈÏÕæÎªÆû³µÈ«ÉúÃüÖÜÆÚÌṩIT·þÎñ£¬º­¸ÇÔ¶³ÌÐÅÏ¢´¦Öóͷ£¡¢OTA¸üС¢×Ô¶¯¼Ýʻϵͳ¼°Êý×Ö»¯ÖÆÔìÆ½Ì¨µÈ£¬·þÎñ¹æÄ£ÁýÕÖ270ÍòÁ¾Æû³µ¡¢200ÍòÓû§¼°5000ÃûÔ±¹¤¡£´Ë´ÎÊÂÎñ̻¶ÆäϵͳÇå¾²ÐÔÎó²î£¬µ«ÏêϸÊÜÓ°ÏìÈËÊý¼°ÊÇ·ñÉæ¼°¿Í»§/Óû§Êý¾ÝÈÔ²»Ã÷È·¡£ÊÂÎñÊÓ²ìÏÔʾ£¬Ð¹Â¶ÐÅÏ¢ÀàÐͱ£´æ²î±ð£ºÍ¨ÖªÐŽöÌá¼°ÐÕÃû£¬¶øÂíÈøÖîÈûÖÝÕþ¸®ÃÅ»§ÍøÕ¾Ôö²¹ÁгöÁËSSNºÍ¼ÝÕÕÐÅÏ¢¡£×èÖ¹·¢¸å£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬ÕØÊÂÕßÉí·ÝÈÔ³ÉÃÕ¡£


https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/


6. CISA½ôÆÈת´ïCentOS Web Panel¸ßΣÎó²î


11ÔÂ5ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬ÍþвÐÐΪÕßÕýʹÓÃCentOS Web Panel£¨CWP£©ÖеÄCVE-2025-48703Ô¶³ÌÏÂÁîÖ´ÐÐÎó²îÌᳫ¹¥»÷¡£¸ÃÎó²îÔÊÐíδÊÚȨ¹¥»÷Õßͨ¹ýÓÐÓÃÓû§ÃûÔÚCWPʵÀýÉÏÖ´ÐÐí§ÒâshellÏÂÁӰÏì0.9.8.1204֮ǰËùÓа汾¡£CWP×÷ΪÃâ·Ñ¿ªÔ´µÄLinux·þÎñÆ÷ÖÎÀíÃæ°å£¬±»ÆÕ±éÓÃÓÚÍøÕ¾Íйܡ¢ÏµÍ³ÖÎÀí¼°VPS/×ÔÁ¦·þÎñÆ÷ÔËÓª£¬ÆäÎó²îΣº¦²¨¼°È«Çò´ó×ÚÆóÒµ¼°Ð¡ÎÒ˽¼ÒÓû§¡£Îó²îȪԴÔÚÓÚÎļþÖÎÀíÆ÷¡°changePerm¡±¶Ëµã±£´æÉè¼ÆÈ±ÏÝ£ºµ±ÇëÇóÖÐÊ¡ÂÔÓû§±êʶ·ûʱ£¬ÏµÍ³ÈԻᴦÖóͷ£Î´ÊÚȨÇëÇó£¬ÇÒ¡°t_total¡±²ÎÊýδ¾­Çå¾²¹ýÂËÖ±½Ó´«ÈëshellÏÂÁµ¼ÖÂÏÂÁî×¢ÈëΣº¦¡£Çå¾²Ñо¿Ô±Maxime RinaudoÓÚ6ÔÂÏÂÑ®ÔÚCentOS 7ÇéÐÎÖÐÀÖ³ÉÑÝʾÁËʹÓÃÀú³Ì£¬Í¨¹ýÏò¸Ã¶Ëµã·¢ËͶñÒâPOSTÇëÇ󣬿É×¢Èë·´ÏòshellÒÔÍêÈ«¿ØÖÆ·þÎñÆ÷¡£CISAÒѽ«¸ÃÎó²îÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬²¢ÒÀ¾ÝBOD 22-01Ö¸ÄÏÒªÇóÁª°î»ú¹¹ÔÚ11ÔÂ25ÈÕǰӦÓÃÐÞ¸´²¹¶¡£¨Ðû²¼ÓÚ6ÔÂ18ÈÕ£©£¬»ò×èֹʹÓÃÊÜÓ°Ïì²úÆ·¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/