¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųɵö¶ü£¬ÀûÓÃTelegram´«²¼¶ñÒâÈí¼þ

°ä²¼¹¦·ò 2025-01-24

1. ¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųɵö¶ü£¬ÀûÓÃTelegram´«²¼¶ñÒâÈí¼þ


1ÔÂ22ÈÕ£¬ÍþвÐÐΪÕßÀûÓùØÓÚRoss Ulbricht£¨Ë¿³ñ֮·°µÍøÊг¡Ê×´´ÈË£©µÄÐÂÎÅ×÷Ϊµö¶ü£¬Í¨¹ýTelegramƵµÀÓÕÆ­Óû§ÔËÐÐPowerShell´úÂë¡£¡£¡£Õâ´Î¹¥»÷ÊÇ¡°Click-Fix¡±Õ½ÊõµÄбäÖÖ£¬ÓÉvx-underground·¢ÏÖ¡£¡£¡£·ÖÆçÓÚÒÔÍùµÄÃýÎóÐÞ¸´¼Ù×°£¬Õâ´Î¹¥»÷¼Ù°ç³É²ÎÓëÆµµÀʱµÄÑéÖ¤Âë»òÑé֤ϵͳ¡£¡£¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵÄÐéᵫ¾­¹ýÑéÖ¤µÄRoss UlbrichtÕË»§£¬½«Óû§Êèµ¼ÖÁ¿´Ëƹٷ½µÄTelegramƵµÀ¡£¡£¡£ÔÚÆµµÀÄÚ£¬Óû§»áÓöµ½ÃûΪ¡°Safeguard¡±µÄÐéαÉí·ÝÑéÖ¤ÒªÇó£¬×îÖջᱻÊèµ¼ÖÁÒ»¸öTelegramС·¨Ê½£¬¸Ã·¨Ê½»á×Ô¶¯¸´ÖÆPowerShellºÅÁîµ½¼ôÌù°å£¬²¢ÌáÐÑÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐС£¡£¡£Ö´ÐеĴúÂë»áÏÂÔØÒ»¸öÔ̺¬Cobalt Strike¼ÓÔØ·¨Ê½µÄZIPÎļþ£¬Cobalt Strike³£±»ÍþвÐÐΪÕßÓÃÓÚÔ¶³Ì½Ó¼ûÍÆËã»úºÍÍøÂ磬ÕâÀàϰȾÍùÍùÊÇÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ¹¥»÷µÄÔ¤Õס£¡£¡£Õû¸öÑéÖ¤¹ý³ÌµÄ˵»°Éè¼ÆµÃ¼«ÎªÉóÉ÷£¬ÒÔÔ¤·ÀÒýÆðÓû§Òɻ󡣡£¡£°²È«×¨¼ÒÖҸ棬Óû§Ó¦Ô¤·ÀÔÚ²»È·¶¨µÄÇé¿öÏÂÔÚWindows¡°ÔËÐС±¶Ô»°¿ò»òPowerShellÖÕ¶ËÖÐÖ´ÐÐÔÚÏ߸´ÖƵÄÄÚÈÝ£¬¶Ô¼ôÌù°åÄÚÈݸÐÓ¦²»È·°´Ê±£¬Ó¦Õ³Ìùµ½Îı¾ÔĶÁÆ÷ÉÏ·ÖÎö£¬ÈκλìºÏ¶¼ÊÇΣÏÕÐźš£¡£¡£


https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/


2. ChromeÀ©´ó·¨Ê½Ãæ¶Ô¹©¸øÁ´¹¥»÷Íþв£¬Êý°ÙÍòÓû§»òÊÜÓ°Ïì


1ÔÂ22ÈÕ£¬ÍøÂ簲ȫ»ú¹¹Sekoia·¢³öÖҸ棬ָ³öÕë¶ÔChromeÀ©·¢Õ¹·¢ÕߵĹ©¸øÁ´¹¥»÷¿ÉÄÜÒѾ­Ó°ÏìÁËÊýÊ®ÍòÈË¡£¡£¡£´ËÀ๥»÷ʼÓÚ2023Ä꣬×î½üµÄÒ»´Î»î¶¯²úÉúÔÚ2024Äê12ÔÂ30ÈÕ£¬Ö¼ÔÚÇÔÈ¡ÈçChatGPTºÍFacebook for BusinessµÈÍøÕ¾µÄAPIÃÜÔ¿¡¢¡¢¡¢»á»°cookieºÍÆäËûÉí·ÝÑéÖ¤ÁîÅÆ¡£¡£¡£¼ÓÀû¸£ÄáÑǵÄCyberhaven¹«Ë¾ÊÇÕâ´Î¹¥»÷µÄÊܺ¦ÕßÖ®Ò»£¬Æä¿ª·¢ÕßÕË»§ÔÚ2024Äê½ÚÀñÈÕÆÚ¼ä±»ÈëÇÖ¡£¡£¡£Booz Allen HamiltonµÄ·ÖÎöÏÔʾ£¬ºÜ¶àÆäËûChromeÀ©´óÒ²¿ÉÄÜÊܵ½Ó°Ï죬DZÔÚÊÜÓ°ÏìµÄ×îÖÕÓû§ÊýÁ¿¿ÉÄÜ´ïµ½Êý°ÙÍò¡£¡£¡£Ò»Ð©ÊÜÓ°ÏìµÄÀ©´óÒÑ´ÓChromeÍøÉÏÀûÓõ곷Ï£¬¶øÒ»Ð©À©´óµÄÒ³ÃæÏÔʾÒѽøÐиüС£¡£¡£Reader ModeÀ©´óµÄÊ×´´ÈËÏòÔ¼30ÍòÓû§·¢³ö¹«¿ªÐÅ£¬·î¸æËûÃÇÆäÀ©´óÔÚ2024Äê12ÔÂ5ÈÕÊܵ½ÈëÇÖ¡£¡£¡£¹¥»÷Õßͨ¹ý¼Ù×°³ÉChromeÍøÉÏÀûÓõ꿪·¢ÕßÖ§³ÖµÄ´¹µöÓʼþ£¬ÓÕÆ­¿ª·¢Õßµã»÷¶ñÒâÁ´½Ó²¢ºË×¼¶ñÒâOAuthÀûÓ÷¨Ê½µÄ½Ó¼ûȨÏÞ£¬´Ó¶ø»ñµÃÉÏ´«±»ÈëÇÖÀ©´óµ½ChromeÍøÉÏÀûÓõêµÄȨÏÞ¡£¡£¡£Sekoiaͨ¹ýµ÷²éÓëÍøÂç´¹µöÓʼþ¹ØÁªµÄÓòÃû£¬·¢ÏÖÁËÕâ´Î¹¥»÷ÖÐʹÓÃµÄÆäËûÓòÃû¼°¿ÉÄÜÉæ¼°µÄÏÈǰ¹¥»÷µÄÓòÃû£¬ÒÔΪÕâ¸öÍþвÐÐΪÕßרÃÅ´«²¼¶ñÒâChromeÀ©´óÒÔÍøÂçÃô¸ÐÊý¾Ý¡£¡£¡£


https://www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/


3. ǧÓà¶ñÒâÓòÃû·Âð³ÛÃûƽ̨´«²¼Lumma StealerÇÔÃÜľÂí


1ÔÂ22ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖ£¬³¬¹ý1000¸ö¶ñÒâÓòÃûÕýÔÚ·ÂðRedditºÍWeTransferµÈ³ÛÃûƽ̨£¬´«²¼½üÄêÀ´Ê¢ÐеÄLumma StealerÇÔÃÜľÂí£¬Í¹ÏÔÁËÍøÂç·¸×ï·Ö×ÓÀûÓÃÊÜÐÅÀµÆ·ÅƺýŪÓû§ÏÂÔØ¶ñÒâÈí¼þµÄ¸´ÔÓÐÔ¡£¡£¡£Lumma StealerÊÇÒ»ÖÖ׳´óµÄÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¡¢¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢ºÍä¯ÀÀÆ÷Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ÕâЩ¶ñÒâÓòÃûÓëºÏ·¨URL¼«ÎªÀàËÆ£¬ÉõÖÁ½¨ÉèÁËÓÐЧµÄSSLÖ¤Ê飬Îóµ¼Óû§ÒÔΪÕýÔÚ½Ó¼û°²È«ÍøÕ¾£¬Ôö³¤ÁËÓû§³ÉÎªÍøÂç´¹µö¹¥»÷Êܺ¦ÕߵķçÏÕ¡£¡£¡£Lumma Stealerѡȡ¶àÖÖ¼¼ÊõÖ´ÐжñÒâ¸ºÔØ£¬ÈçÍйÜÐéαµÄCAPTCHAÒ³ÃæÓÕʹÓû§Ö´ÐÐPowerShell¾ç±¾ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£ÕâЩ¶ñÒâÓòÃûµÄÔö³¤·´Ó³Á˹¥»÷ÕßÀûÓóÛÃûƽ̨ÃûÓþµÄÇ÷Ïò£¬Í¨¹ýÉç»á¹¤³ÌѧսÊõ·¢ËÍÔ̺¬Á´½ÓµÄµç×ÓÓʼþ£¬½«Óû§Êèµ¼ÖÁÚ²Æ­ÍøÕ¾¡£¡£¡£¹¥»÷Õß»¹ÀûÓÃÄÚÈÝ·Ö·¢ÍøÂçÍйܴ¹µöÍøÕ¾£¬Ìӱܼì²â²¢µ¢¸é¹¥»÷³ÖÐø¹¦·ò¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬ÍøÂ簲ȫר¼Ò½¨ÒéÑéÖ¤URL¡¢¡¢¡¢ÆôÓÃË«³É·ÖÈÏÖ¤ºÍ½øÐÐÓû§½ÌÓý¡£¡£¡£


https://cybersecuritynews.com/1000-malicious-domains-mimic-reddit-wetransfer/


4. CISA½«JQuery XSS·ì϶²ÎÓëÒÑÖª±»ÀûÓ÷ì϶Ŀ¼


1ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«jQueryÓÆ¾Ã¿çÕ¾µã¾ç±¾£¨XSS£©·ì϶£¨CVE-2020-11023£¬CVSSÆÀ·Ö£º6.9£©Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£¡£¡£¸Ã·ì϶´æÔÚÓÚjQuery 1.0.3ÖÁ3.4.1°æ±¾ÖУ¬µ±Ê¹ÓÃÔ̺¬²»ÊÜÐÅÀµµÄHTML <option>ÔªËØµÄDOM²½Öèʱ£¬¿ÉÄÜ»áÖ´ÐжñÒâ´úÂë¡£¡£¡£´ËÎÊÌâÒÑÔÚjQuery 3.5.0Öеõ½ÐÞ¸´¡£¡£¡£Õ÷ѯ»ã±¨Ö¸³ö£¬¼´±ã¶ÔÀ´×Ô²»ÊÜÐÅÀµÆðÔ´µÄÔªËØ½øÐÐÁËËãÕÊ£¬½«Æä´«µÝ¸øjQueryµÄDOM²Ù×÷²½Ö裨Èç.html()¡¢¡¢¡¢.append()µÈ£©ÈÔ¿ÉÄÜÒý·¢°²È«·çÏÕ¡£¡£¡£×÷Ϊһʱ»º½â´ëÊ©£¬½¨ÒéÔÚʹÓÃjQuery²½Öè´¦ÖÃHTMLǰ£¬Ê¹ÓÃDOMPurifyµÄSAFE_FOR_JQUERYÑ¡Ïî½øÐÐËãÕÊ¡£¡£¡£jQuery 3.5.0°æ±¾µÄÖØÒª±ä¶¯Êǰ²È«ÐÞ¸´£¬ÆäÖÐjQuery.htmlPrefilterº¯Êý²»ÔÙʹÓÃÕýÔò±í°×ʽ£¬¶øÊÇ´«µÝδ¸ü¸ÄµÄ×Ö·û´®¡£¡£¡£×êÑÐÔ±Masato Kinugawa»ã±¨ÁËÕâÒ»·ì϶¡£¡£¡£Æ¾¾ÝCISAµÄ²Ù×÷Ö¸ÁÁª°î»ú¹¹±ØÐëÔÚ2025Äê2ÔÂ13ÈÕǰÐÞ¸´´Ë·ì϶£¬ÒÔ±£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£Í¬Ê±£¬×¨¼ÒÒ²½¨Òé¸öÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÓйطì϶¡£¡£¡£


https://securityaffairs.com/173388/uncategorized/u-s-cisa-adds-jquery-flaw-known-exploited-vulnerabilities-catalog.html


5. Abnormal Security¸æ·¢£º×¨ÎªÍøÂç·¸×ï´òÔìµÄGhostGPT AI̸Ìì»úеÈË¹ÄÆð


1ÔÂ23ÈÕ£¬Abnormal SecurityÔÚ2024Ëêĺ·¢ÏÖÁËÒ»¿îÃûΪGhostGPTµÄ¶ñÒâAI̸Ìì»úеÈË£¬×¨ÎªÍøÂç·¸×ïÉè¼Æ¡£¡£¡£Õâ¿î¹¤¾ß¿Éͨ¹ýTelegramµÈƽ̨ÇáËÉ»ñÈ¡£¬ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁËǰËùδÓеÄÄÜÁ¦£¬Ô̺¬ÖÆ×÷¸´ÔÓµÄÍøÂç´¹µöµç×ÓÓʼþºÍ¿ª·¢¶ñÒâÈí¼þ¡£¡£¡£ÓëÊܵÀµÂºÍ°²È«´ëÊ©Ô¼ÊøµÄ´«Í³AIÄ£ÐÍ·ÖÆç£¬GhostGPT²»ÊÜÕâЩÏÞ¶È£¬¿ÉÄÜÒÔǰËùδÓеÄËٶȺÍÇáËÉˮƽÌìÉú¶ñÒâÄÚÈÝ¡£¡£¡£ËüºÜ¿ÉÄÜÊÇʹÓðü×°Æ÷Ïνӵ½ChatGPTµÄÔ½Óü°æ±¾»ò¿ªÔ´LLM£¬´Ó¶ø½â³ýÁ˵ÀµÂ±£ÏÕ¡£¡£¡£GhostGPT½µµÍÁËÍøÂç·¸×ïµÄÃż÷£¬Ê¹¾­Ñé²»¼°µÄ²Î¼ÓÕßÒ²ÄÜÀûÓÃAI½øÐжñÒâ»î¶¯£¬²¢ÒÔ¸ü¸ßµÄЧÄÜÌáÒé¸ü¸´ÔÓ¡¢¡¢¡¢¸ü¾ßÓ°ÏìÁ¦µÄ¹¥»÷¡£¡£¡£´ËÍ⣬Ëü»¹ÓÅÏÈ˼¿¼Óû§ÄäÃûÐÔ£¬¶ÔѰÇ󰵲ط¸·¨»î¶¯²¢Ìӱܼì²âµÄÍøÂç·¸×ï·Ö×ÓºÜÓÐÎüÒýÁ¦¡£¡£¡£Abnormal SecurityµÄ×êÑÐÈËÔ±²âÊÔÁËGhostGPTµÄÖ°ÄÜ£¬·¢ÏÖËüչʾÁ˺ýŪDZÔÚÊܺ¦ÕßµÄÄÜÁ¦¡£¡£¡£Ëæ×ÅÍøÂç·¸×ï·Ö×Ó¶ÔÈËΪÖÇÄܵÄÐËÖÂÈÕ񾁬ÃÜ£¬ÍøÂ簲ȫÉçÇø±ØÐë²»ÐÝ´´Ðºͷ¢Õ¹Æä·ÀÓù´ëÊ©£¬ÄÜÁ¦Î¬³Öµ±ÏÈְλ¡£¡£¡£


https://hackread.com/ghostgpt-malicious-ai-chatbot-fuel-cybercrime-scams/


6. J-magic¶ñÒâÈí¼þ£ºÕë¶ÔÕ°²©ÍøÂçÉ豸µÄ¡°Ä§°ü¡±¹¥»÷Ç÷Ïò·ÖÎö


1ÔÂ23ÈÕ£¬J-magicÊÇÒ»ÖÖÕë¶ÔÕ°²©ÍøÂç±ßÔµÉ豸µÄ¶ñÒâÈí¼þ£¬ÖØÒª¹¥»÷°ëµ¼Ìå¡¢¡¢¡¢ÄÜÔ´¡¢¡¢¡¢ÖÆ×÷ÒµºÍITÁìÓòµÄ×éÖ¯¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇcd00rºóÃŵ͍ÖƱäÌ壬ͨ¹ý¼à¶½TCPÁ÷Á¿Ñ°ÕÒÓµÓÐÌØ¶¨ÌصãµÄ¡°Ä§·¨Êõ¾Ý°ü¡±À´Æô¶¯·´Ïòshell¡£¡£¡£¾ÝLumenÍþв×êÑкÍÔËÓª²¿ÃÅBlack Lotus LabsµÄ×êÑÐÈËÔ±³Æ£¬J-magic»î¶¯ÔÚ2023ÄêÖÁ2024ÄêÆÚ¼ä»îÔ¾£¬Ö¼ÔÚʵÏֵͼì²â¶ÈºÍ³Ö¾Ã½Ó¼û¡£¡£¡£Ô¼ÄªÒ»°ëµÄÖ¸±êÉ豸ÅäÖÃΪ×éÖ¯µÄVPNÍø¹Ø¡£¡£¡£J-magic»á²é³­¸÷Àà×Ö¶ÎºÍÆ«ÒÆÁ¿£¬ÈôÊÇÊý¾Ý°üÂú×ãÌØ¶¨Ç°ÌáÖ®Ò»£¬¾Í»áÌìÉú·´Ïòshell£¬µ«·¢ËÍÕßÐèÏȽâ¾öRSAÌôÕ½ÄÜÁ¦½Ó¼ûÊÜϰȾÉ豸¡£¡£¡£Ö»¹ÜJ-magicÓëͬÑù»ùÓÚcd00rºóÃŵÄSeaSpy¶ñÒâÈí¼þÔÚ¼¼ÊõÉÏÀàËÆ£¬µ«´æÔÚһЩ²î¾à£¬Ê¹µÃÄÑÒÔ³ÉÁ¢ÁªÏµ¡£¡£¡£Black Lotus LabsµÄ×êÑÐÈËÔ±ÒÔΪ£¬J-magic¹¥»÷»î¶¯Åú×¢£¬Õë¶ÔÆóÒµ¼¶Â·ÓÉÆ÷µÄ¶ñÒâÈí¼þʹÓÃÕý³ÉΪһÖÖÇ÷Ïò£¬ÓÉÓÚ´ËÀàÉ豸ºÜÉÙ½øÐеçÔ´Ñ­»·£¬¶ñÒâÈí¼þפÁôÔÚÄÚ´æÖУ¬ÇÒͨ³£²»×ã»ùÓÚÖ÷»úµÄ¼à¿Ø¹¤¾ß¡£¡£¡£


https://www.bleepingcomputer.com/news/security/stealthy-magic-packet-malware-targets-juniper-vpn-gateways/