¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷

°ä²¼¹¦·ò 2025-11-06

1. ¶íºÚ¿Í×éÖ¯Curly COMrades½èHyper-VÈÆ¹ýEDR¹¥»÷


11ÔÂ4ÈÕ£¬¶íÂÞ˹ºÚ¿Í×éÖ¯Curly COMrades±»ÆØ×Ô2024ÄêÄêÖÐÆð»îÔ¾£¬Æä»î¶¯Óë¶íÂÞ˹µØÔµÕþÖÎÀûÒæÇ×êÇÓйØ¡£¸Ã×é֯ͨ¹ýÀÄÓÃWindowsרҵ°æ/ÆóÒµ°æ¼°Windows ServerÖеÄMicrosoft Hyper-VÐé¹¹»¯¼¼Êõ£¬´´½¨°µ²ØµÄ»ùÓÚAlpine LinuxµÄÇáÁ¿¼¶Ðé¹¹»ú£¨½öÕ¼ÓÃ120MB´ÅÅ̿ռäºÍ256MBÄڴ棩ÔËÐжñÒâÈí¼þ£¬³É¹¦Èƹý´«Í³»ùÓÚÖ÷»úµÄ¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¹æ»®¡£Ðé¹¹»úÄÚÍйÜÁË×Ô½ç˵¹¤¾ßCurlyShell·´ÏòshellºÍCurlCat·´Ïò´úÀí£ºÇ°Õßͨ¹ýcron×÷ҵά³ÖÓÆ¾Ã»¯£¬ÒÔÎÞͷģʽÔËÐв¢Í¨¹ýHTTPSÏνÓC2·þÎñÆ÷Ö´ÐкÅÁî £»ºóÕß×÷ΪSOCKS´úÀí·â×°SSHÁ÷Á¿ÎªHTTPSÒªÇó£¬ÊµÏÖÒñ±ÎËí·´«Ê䣬ʹ¶ñÒâÁ÷Á¿¼Ù×°³ÉºÏ·¨Ö÷»úIPµØÖ·¡£¹¥»÷¹ý³ÌÖУ¬ÍþвÐÐΪÕßÊ×ÏÈÔ¶³Ì½Ó¼ûÊܺ¦Õßϵͳ£¬ÆôÓÃHyper-V²¢½ûÓÃÆäÖÎÀí½çÃæ£¬²¿Êð»ùÓÚAlpine LinuxµÄ¼«¼òÐé¹¹»ú¡£BitdefenderÓë¸ñ³¼ªÑÇCERTºÏ×÷µ÷²é·¢ÏÖ£¬¸Ã×éÖ¯»¹Ê¹ÓÃÁ½¸öPowerShell¾ç±¾Ç¿»¯¹¥»÷£ºÆäÒ»½«Kerberosµ¥¾Ý×¢ÈëLSASSÒÔʵÏÖÔ¶³ÌϵͳÉí·ÝÑéÖ¤ºÍºÅÁîÖ´ÐÐ £»Æä¶þͨ¹ý×éÕ½ÊõÔÚÓòÄÚ¶àÌ¨ÍÆËã»ú´´½¨±¾µØÕË»§£¬Ö§³ÖºáÏòÒÆ¶¯¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/


2. ¡¶ÐûÑÔ±¨¡·Êý¾Ýй¶£¬ÕþÖÎÒþÖÔ·çÏÕ͹ÏÔ


11ÔÂ4ÈÕ£¬Òâ´óÀû×óÒí±êÖ¾ÐÔ±¨Ö½¡¶ÐûÑÔ±¨¡·£¨Il Manifesto£©ÒòδÉèÖÃÃÜÂë± £»¤µÄClickHouseÊý¾Ý¿â£¬µ¼ÖÂ15Íò¸¶·Ñ¶©ÔÄÓû§ÓÊÏä¼°1100ÍòÌõ·Ã¿ÍÐÐΪÈÕ־й¶¡£¸ÃÊý¾Ý¿âÔ̺¬É豸¼¼Êõϸ½Ú¡¢»á»°ÁîÅÆ¡¢IPµØÖ·¡¢¾«¶È´ï11Ã×µÄGeoIPÐÅÏ¢¼°ÎÄÕÂÍÆ¼öÆðÔ´µÈÃô¸ÐÊý¾Ý£¬»¹Â¶³öÁËÄÚ²¿ÍøÕ¾·ÖÎöÊý¾Ý£¨ÈçÎÄÕ²û·¢¡¢ÊܶàÐÐΪ¡¢ÍƼöÆðÔ´£©£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚóÒ×µý±¨ÇÔÈ¡¡£×÷Ϊ1969ÄêµÞÔìµÄ¼¤½ø×óÒí¿¯Î¡¶ÐûÑÔ±¨¡·Ôø²Î¼Ó1972Äê´óÑ¡²¢Ôâ·ê2000Äêз¨Î÷˹·Ö×ÓÕ¨µ¯Ï®»÷δË죬ÏÖΪ·ÇͶ»úºÏ×÷É磬ÈÕ¿¯ÐÐÁ¿Ô¼1.5Íò·Ý¡£Õâ´Îй¶ËäÎ´Éæ¼°ÃÜÂë»òÖ±½ÓÕË»§Æ¾Ö¤£¬µ«¶ÁÕßÔĶÁ¼Í¼Òò·´Ó³ÕþÖÎÐËÖÂÓëÐÅÑö£¬ÊôÓÚÅ·ÖÞÒþÖÔ·¨ÖÓ×°ÌØÊâÀà±ð¡±ÐÅÏ¢£¬Ãæ¶Ô¸üÑϸñ± £»¤¡£ÈôÊý¾Ý±»ÕþÖζ¯»úÕß»ñÈ¡£¬¶ÁÕßÓ뱨Éç¿ÉÄÜÔâµ±¾ÖɧÈÅ»ò¼à¶½¡£


https://cybernews.com/security/il-manifesto-data-leak-exposed-readers/


3. ÃÀ¹úSuper QuikÔâ¶í¹ØÁªÀÕË÷ÍŻ﹥»÷


11ÔÂ3ÈÕ£¬ÃÀ¹úÇøÓòÐÔ¼ÓÓÍÕ¾Á¬ËøµêSuper QuikÔâÓë¶íÂÞ˹ÓйصÄPlayÀÕË÷Èí¼þÍŻ﹥»÷£¬¹¥»÷ÕßÔÚ°µÍøÐ¹Â¶¼à¿ØÂ¼Ïñ¼°5.5GBÄÚ²¿Îļþ¡£Õâ´Îй¶Ô̺¬²ÆÕþ»ã±¨£¨ÖðÈÕÏúÊÛ¶î¡¢ÀûÈó»ã±¨¡¢×ʲú¸ºÕ®±í¼°»ýÄêÒµ¼¨±ÈÁ¦£©¡¢²É¹º·¢Æ±£¨¼¼ÊõÉ豸ÓëÊØ»¤³É±¾£©¡¢¼à¿ØÆ¬¶Î£¨º¬Ô±¹¤/¹Ë¿ÍÃæ²¿ÐÅÏ¢£©¡¢Ð½×ʵ÷»»Í¨Öª£¨Ô±¹¤ÐÕÃû¼°Ð½×ʳ߶ȣ©¡¢×°½¨´òË㣨Ա¹¤ÁªÏµ·½Ê½£©¡¢¹¤×÷ÆÀ¹À³ß¶È¡¢Åàѵ×ÊÁϼ°ÄÚ²¿Õþ²ßÎļþµÈÃô¸ÐÐÅÏ¢¡£PlayÍÅ»ïÒÔË«³ÁÀÕË÷¼¼ÊõÎÅÃû£¬ÒªÇóÖ§¸¶½âÃÜÓöȲ¢±£Õϲ»ÀÄÓñ»µÁÊý¾Ý¡£ÈôÆóÒµ»Ø¾ø£¬ÆäÊý¾Ý½«±»¹«¿ªÒÔʩѹ¡£Õâ´ÎSuper QuikÊý¾Ýй¶¿ÉÄÜÒý·¢¶à³Á·çÏÕ£º²ÆÕþ»ã±¨Ó뷢Ʊ¿ÉÄܶ³öóÒ×µý±¨¡¢¹©¸øÔ¼¶¨¼Û¼°»ù´¡Éèʩϸ½Ú£¬±»¾ºÕùµÐÊÖÀûÓà £»¼à¿ØÆ¬¶Î¿ÉÄܶ³ö¼à¿ØÃ¤Çø£¬Ô±¹¤/¹Ë¿ÍÃæ²¿ÐÅÏ¢Éæ¼°ÒþÖÔÓë˾·¨ÎÊÌâ £»Ð½×Ê¡¢ÁªÏµ·½Ê½µÈÊý¾ÝÔö³¤Éí·Ý͵ÇÔÓëÉç»á¹¤³Ì¹¥»÷·çÏÕ £»ÄÚ²¿ÎļþÄ£°å¿ÉÄܱ»ÓÃÓÚÚ¿Æ­£¬ÍþвÐÔ´ë´ÇÎļþÔò¿ÉÄÜÇÖº¦¹«Ë¾¹«¼ÒÐÎÏó¡£


https://cybernews.com/security/ransomware-super-quik-data-leak/


4. Gootloader¶ñÒâÈí¼þ7¸öÔºó¾íÍÁ³ÁÀ´


11ÔÂ5ÈÕ£¬Gootloader¶ñÒâÈí¼þ¼ÓÔØÆ÷ÔÚÒþû7¸öÔºó³ÁÏÖ£¬Í¨¹ýSEOͶ¶¾ÍƹãÐéÎ±ÍøÕ¾ÒÔ´«²¼¶ñÒâÈí¼þ¡£¸Ã»ùÓÚJavaScriptµÄ¼ÓÔØÆ÷ͨ¹ý±»ÈëÇÖ»ò¹¥»÷Õß½ÚÔìµÄÍøÕ¾£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâÎĵµ¡£Æä¹¥»÷Á´ÌõʼÓÚSEOͶ¶¾£¬Í¨¹ýÓÅ»¯Ìض¨¹Ø¼ü´Ê£¨Èç˾·¨ÎļþºÍºÍ̸£©ÔÚËÑË÷ÒýÇæÖеÄÅÅÃû£¬ÎüÒýÓû§½Ó¼û¼Ù×°³É˾·¨ÎļþÄ£°å·ÖÏíÆ½Ì¨µÄÍøÕ¾¡£µ±Óû§µã»÷¡°»ñÈ¡Îĵµ¡±°´Å¥Ê±£¬ÍøÕ¾»áÑéÖ¤ÊÇ·ñΪºÏ·¨Óû§£¬ËæºóÏÂÔØÔ̺¬.jsÀ©´óÃûµÄ¶ñÒâѹËõ°ü¡£Ö´Ðкó£¬Gootloader»áÏÂÔØCobalt Strike¡¢ºóÃÅ·¨Ê½¼°½©Ê¬·¨Ê½µÈ¶ñÒâÔØºÉ£¬Îª¹¥»÷ÕßÌṩÆóÒµÍøÂç³õʼ½Ó¼ûȨÏÞ£¬×îÖÕ¿ÉÄܲ¿ÊðÀÕË÷Èí¼þ¡£Õâ´Î»Ø¹é£¬Gootloaderѡȡ¶àÏîм¼Êõ¶ã±Ü¼ì²â£ºÍ¨¹ýÌØÊâÍøÒ³×ÖÌå´úÌæ×ÖÐΣ¬ÔÚHTMLÔ´´úÂëÖаµ²Ø¡°·¢Æ±¡±¡°ºÏͬ¡±µÈ¹Ø¼ü´Ê £»ÀûÓÃÌåʽÃýÎóµÄZIPÎļþ£¬Windows×ÊÔ´ÖÎÀíÆ÷½âѹʱ¿ªÊͶñÒâJSÎļþ£¬¶ø°²È«¹¤¾ß½âѹÔòÏÔʾÎÞº¦Îı¾Îļþ£¬×ÌÈÅ·ÖÎö¡£´Ë±í£¬¹¥»÷ÕßÖ²ÈëSupper SOCKS5ºóÃÅ£¬ÊµÏÖÔ¶³Ì½Ó¼û¡£


https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/


5. ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾ÔâºÚ¿ÍÈëÇÖÖÂÓ×ÎÒÐÅϢй¶


11ÔÂ5ÈÕ£¬½üÈÕ£¬ÏÖ´úÆû³µÃÀ¹ú¹«Ë¾£¨HAEA£©Ôâ·êºÚ¿ÍÈëÇÖ£¬¹¥»÷Õßͨ¹ý·¸·¨½Ó¼ûÆäIT»·¾³ÇÔÈ¡ÁËÔ̺¬ÐÕÃû¡¢Éç»á±£ÏÕºÅÂ루SSN£©¼°¼ÝÊ»ÅÆÕÕÔÚÄÚµÄÓ×ÎÒÐÅÏ¢¡£¸Ã¹«Ë¾ÓÚ3ÔÂ1ÈÕ³õ´Î·¢ÏÖÈëÇÖ¼£Ïó£¬Ëæºóµ±¼´½áºÏ±í²¿ÍøÂ簲ȫר¼Ò¼°·¨Âɲ¿ÃÅ·¢Õ¹µ÷²é£¬È·ÈϹ¥»÷ʼÓÚ2ÔÂ22ÈÕÇÒÒѽÚÔì¾ÖÃæ¡£HAEA×÷ΪÏÖ´úÆû³µ¼¯ÍÅ×Ó¹«Ë¾£¬ÕƹÜΪÆû³µÈ«ÐÔÃüÖÜÆÚÌṩIT·þÎñ£¬º­¸ÇÔ¶³ÌÐÅÏ¢´¦Öá¢OTA¸üС¢×Ô¶¯¼Ýʻϵͳ¼°Êý×Ö»¯Ôì×÷ƽ̨µÈ£¬·þÎñÁìÓò¸²¸Ç270ÍòÁ¾Æû³µ¡¢200ÍòÓû§¼°5000ÃûÔ±¹¤¡£Õâ´ÎÊÂÎñ¶³öÆäϵͳ°²È«ÐÔ·ì϶£¬µ«¾ßÌåÊÜÓ°ÏìÈËÊý¼°ÊÇ·ñÉæ¼°¿Í»§/Óû§Êý¾ÝÈÔ²»Ã÷È·¡£ÊÂÎñµ÷²éÏÔʾ£¬Ð¹Â¶ÐÅÏ¢ÀàÐÍ´æÔÚ²î¾à£ºÍ¨ÖªÐŽöÌá¼°ÐÕÃû£¬¶øÂíÈøÖîÈûÖݵ±¾ÖÃÅ»§ÍøÕ¾²¹³äÁгöÁËSSNºÍ¼ÝÕÕÐÅÏ¢¡£½ØÖÁ·¢¸å£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü£¬ÕØÊÂÕßÉí·ÝÈÔ³ÉÃÕ¡£


https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/


6. CISA´¹Î£´«µÝCentOS Web Panel¸ßΣ·ì϶


11ÔÂ5ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ°ä²¼ÑϳÁÖҸ棬ÍþвÐÐΪÕßÕýÀûÓÃCentOS Web Panel£¨CWP£©ÖеÄCVE-2025-48703Ô¶³ÌºÅÁîÖ´Ðзì϶ÌáÒé¹¥»÷¡£¸Ã·ì϶ÔÊÐíδÊÚȨ¹¥»÷Õßͨ¹ýÓÐЧÓû§ÃûÔÚCWPÊ·ýÉÏÖ´ÐÐËÁÒâshellºÅÁӰÏì0.9.8.1204֮ǰËùÓа汾¡£CWP×÷ΪÃâ·Ñ¿ªÔ´µÄLinux·þÎñÆ÷ÖÎÀíÃæ°å£¬±»¿í·ºÓÃÓÚÍøÕ¾Íйܡ¢ÏµÍ³ÖÎÀí¼°VPS/¶ÀÁ¢·þÎñÆ÷ÔËÓª£¬Æä·ì϶·çÏÕ²¨¼°È«Çò´óÁ¿ÆóÒµ¼°Ó×ÎÒÓû§¡£·ì϶±¾Ô­ÔÚÓÚÎļþÖÎÀíÆ÷¡°changePerm¡±¶Ëµã´æÔÚÉè¼ÆÈ±µã£ºµ±ÒªÇóÖÐÊ¡ÂÔÓû§±êʶ·ûʱ£¬ÏµÍ³ÈԻᴦÖÃδÊÚȨҪÇó£¬ÇÒ¡°t_total¡±²ÎÊýδ¾­°²È«¹ýÂËÖ±½Ó´«ÈëshellºÅÁµ¼ÖºÅÁî×¢Èë·çÏÕ¡£°²È«×êÑÐÔ±Maxime RinaudoÓÚ6ÔÂÏÂÑ®ÔÚCentOS 7»·¾³Öгɹ¦ÑÝʾÁËÀûÓùý³Ì£¬Í¨¹ýÏò¸Ã¶Ëµã·¢ËͶñÒâPOSTÒªÇ󣬿É×¢Èë·´ÏòshellÒÔÆëÈ«½ÚÔì·þÎñÆ÷¡£CISAÒѽ«¸Ã·ì϶ÄÉÈëÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬²¢Æ¾¾ÝBOD 22-01Ö¸ÄÏÒªÇóÁª¹ú»ú¹¹ÔÚ11ÔÂ25ÈÕǰÀûÓý¨¸´²¹¶¡£¨°ä²¼ÓÚ6ÔÂ18ÈÕ£©£¬»òÖÕ³¡Ê¹ÓÃÊÜÓ°Ïì²úÆ·¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/