ÐÂÐÍLinux¶ñÒâÈí¼þQLNX¹¥»÷¿ª·¢Õßϵͳ
°ä²¼¹¦·ò 2026-05-071. ÐÂÐÍLinux¶ñÒâÈí¼þQLNX¹¥»÷¿ª·¢Õßϵͳ
5ÔÂ5ÈÕ£¬£¬Ò»ÖÖ´Ëǰδ±»¼Í¼µÄÃûΪQuasar Linux£¨QLNX£©µÄLinuxÖ²È뷨ʽ£¬£¬ÕýÀûÓÃrootkit¡¢¡¢ºóÃÅºÍÆ¾Ö¤ÇÔȡְÄܹ¥»÷¿ª·¢Õßϵͳ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒѲ¿ÊðÔÚnpm¡¢¡¢PyPI¡¢¡¢GitHub¡¢¡¢AWS¡¢¡¢DockerºÍKubernetesµÈ¿ª·¢ºÍDevOps»·¾³ÖУ¬£¬¿ÉÄܵ¼Ö¹©¸øÁ´¹¥»÷¡£¡£¡£¡£¾ÝÇ÷Ïò¿Æ¼¼×êÑÐÈËÔ±·ÖÎö£¬£¬QLNXʹÓÃgccÔÚÖ¸±êÖ÷»úÉ϶¯Ì¬±àÒërootkit¹²Ïí¶ÔÏóºÍPAMºóÃÅÄ£¿é¡£¡£¡£¡£ÆäÉè¼ÆÖ¼ÔÚʵÏÖÒñ±ÎÐԺͳ־ÃÓÆ¾ÃÐÔ£º£º£ºÔÚÄÚ´æÖÐÔËÐУ¬£¬É¾³ýÔʼ¶þ½øÖÆÎļþ£¬£¬²Á³ýÈÕÖ¾£¬£¬Î±Ôì¹ý³ÌÃû³Æ£¬£¬²¢¶Ï¸ùȡ֤»·¾³±äÁ¿¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þѡȡÆßÖÖ·ÖÆçµÄÓÆ¾Ã»¯»úÖÆ£¬£¬Ô̺¬LD_PRELOAD¡¢¡¢systemd¡¢¡¢crontab¡¢¡¢init.d¾ç±¾¡¢¡¢XDG×Ô¶¯Æô¶¯ºÍ.bashrc×¢È룬£¬È·±£Æä¼ÓÔØµ½Ã¿¸ö¶¯Ì¬Á´½Ó¹ý³ÌÖУ¬£¬²¢ÔÚ±»ÖÕÖ¹ºóÖØÐÂÌìÉú¡£¡£¡£¡£QLNXÔ̺¬¶à¸öרÓÃÓÚÌØ¶¨»î¶¯µÄÖ°ÄÜÄ£¿é£¬£¬ÊÇÒ»¿îÆëÈ«µÄ¹¥»÷¹¤¾ß¡£¡£¡£¡£»£»ñµÃ³õʼ½Ó¼ûȨÏ޺󣬣¬QLNX³ÉÁ¢ÎÞÎļþ°²Éíµã£¬£¬²¿ÊðÓÆ¾ÃÐÔºÍÒñ±Î»úÖÆ£¬£¬½ø¶øÍøÂ翪·¢ÕߺÍÔÆÆ¾Ö¤¡£¡£¡£¡£Í¨¹ý¹¥»÷¿ª·¢Õß¹¤×÷Õ¾£¬£¬¹¥»÷Õß¿ÉÈÆ¹ýÆóÒµ°²È«½ÚÖÆ£¬£¬»ñȡ֧³ÖÈí¼þ½»¸¶¹ÜµÀµÄÍ´´¦¡£¡£¡£¡£ÕâÓë´Ëǰ²úÉúµÄ¹©¸øÁ´¹¥»÷ÊÂÎñ¸ß¶ÈÀàËÆ£¬£¬¼´±»µÁÓõĿª·¢Õ߯¾Ö¤±»ÓÃÓÚ½«Ä¾Âí»¯Èí¼þ°ü°ä²¼´ó¹«¹²´æ´¢¿â¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-stealthy-quasar-linux-malware-targets-software-developers/
2. DAEMON ToolsÔâÖ²ÈëľÂí£¬£¬ÊýǧϵͳÂÙÏÝ
5ÔÂ5ÈÕ£¬£¬ºÚ¿ÍÔÚDAEMON ToolsÈí¼þµÄ×°Ö÷¨Ê½ÖÐÖ²ÈëÁËľÂí£¬£¬×Ô4ÔÂ8ÈÕÒÔÀ´ÒÑÏòÊýǧ¸ö´Ó¹Ù·½ÍøÕ¾ÏÂÔØ¸Ã²úÆ·µÄϵͳֲÈëÁ˺óÃÅ¡£¡£¡£¡£Õâ´Î¹©¸øÁ´¹¥»÷µ¼ÖÂ100¶à¸ö¹ú¶È³öÏÖÊýǧÀýϰȾ£¬£¬µ«µÚ¶þ½×¶ÎµÄ¶ñÒâÔØºÉ½ö²¿ÊðÔÚÊ®¼¸Ì¨»úеÉÏ£¬£¬Åú×¢ÕâÊÇÒ»´ÎÕë¶Ô¸ß¼ÛÖµÖ¸±êµÄ¶¨Ïò¹¥»÷¡£¡£¡£¡£½Ó¹ÜÏÂÒ»½×¶ÎÓÐÐ§ÔØºÉµÄÊܺ¦ÕßÔ̺¬¶íÂÞ˹¡¢¡¢°×¶íÂÞ˹ºÍÌ©¹úµÄÁãÊÛ¡¢¡¢¿ÆÑС¢¡¢µ±¾ÖºÍÖÆ×÷×éÖ¯¡£¡£¡£¡£µ±Óû§ÏÂÔØ²¢Ö´Ðо¹ýÊý×ÖÊðÃûµÄľÂí×°Ö÷¨Ê½ºó£¬£¬Ç¶ÈëÔÚ±»ÈëÇÖ¶þ½øÖÆÎļþÖеĶñÒâ´úÂë¼´±»´¥·¢¡£¡£¡£¡£¸Ã¶ñÒâ´úÂë»á³ÉÁ¢ÓƾÃÐÔ£¬£¬²¢ÔÚϵͳÆô¶¯Ê±¼¤»îºóÃÅ£¬£¬·þÎñÆ÷¿ÉÔ¶³ÌÅúʾϵͳÏÂÔØ²¢Ö´ÐжîÍâÓÐÐ§ÔØºÉ¡£¡£¡£¡£µÚÒ»½×¶ÎµÄ¶ñÒâÈí¼þÊÇÒ»¸ö¸ù»ùÐÅÏ¢ÇÔÈ¡·¨Ê½£¬£¬ÍøÂçÖ÷»úÃû¡¢¡¢MACµØÖ·¡¢¡¢ÕýÔÚÔËÐеĹý³Ì¡¢¡¢ÒÑ×°ÖÃÈí¼þºÍÏµÍ³ÇøÓòÉèÖõÈÊý¾Ý£¬£¬ÓÃÓÚÊܺ¦Õß»Ïñ·ÖÎö¡£¡£¡£¡£Æ¾¾Ý²âÊÔÁ˾֣¬£¬²¿ÃÅϵͳ»á»ñµÃµÚ¶þ½×¶Î¡ª¡ªÒ»¸öÇáÁ¿¼¶ºóÃÅ£¬£¬¿ÉÖ±½ÓÔÚÄÚ´æÖÐÖ´ÐкÅÁî¡¢¡¢ÏÂÔØÎļþºÍÔËÐдúÂë¡£¡£¡£¡£ÔÚÖÁÉÙһ·Õë¶Ô¶íÂÞ˹½ÌÓý»ú¹¹µÄ°¸ÀýÖУ¬£¬¿¨°Í˹»ù¹Û²ìµ½²¿ÊðÁËÃûΪQUIC RATµÄ¸ü¸ß¼¶¶ñÒâÈí¼þ£¬£¬¸ÃÈí¼þÖ§³Ö¶àÖÖͨѶºÍ̸£¬£¬²¢Äܽ«¶ñÒâ´úÂë×¢ÈëºÏ·¨¹ý³Ì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/daemon-tools-trojanized-in-supply-chain-attack-to-deploy-backdoor/
3. Palo Alto Networks PAN-OS·ì϶ÔâÀûÓÃ
5ÔÂ6ÈÕ£¬£¬Palo Alto Networks½üÈÕ·¢³öÖҸ棬£¬ÆäPAN-OSϵͳµÄÒ»¸öÑÏÖØ·ì϶£¨±àºÅCVE-2026-0300£¬£¬CVSSÆÀ·Ö9.3£©Òѱ»¶ñÒâÀûÓᣡ£¡£¡£¸Ã·ì϶Ϊ»º³åÇøÒç³ö·ì϶£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆÊý¾Ý°ü£¬£¬ÔÚPAϵÁкÍVMϵÁзÀ»ðǽÉÏÒÔrootȨÏÞÖ´ÐÐËÁÒâ´úÂ룬£¬ÓÈÆäµ±Óû§IDÉí·ÝÑéÖ¤ÃÅ»§Â¶³öÓÚ»¥ÁªÍøÊ±·çÏÕ¼«¸ß¡£¡£¡£¡£Palo Alto NetworksÔÚ°²È«²¼¸æÖÐÖ¸³ö£¬£¬¸Ã·ì϶λÓÚUser-IDÉí·ÝÑéÖ¤ÃÅ»§·þÎñÖУ¬£¬ÈôÒÀÕÕ×î¼Ñʵ¼ÊÖ¸ÄϽ«¸ÃÃÅ»§µÄ½Ó¼ûȨÏÞÏÞ¶ÈΪ½öÏÞÊÜÐÅÀµµÄÄÚ²¿IPµØÖ·£¬£¬Ôò¿É´ó·ù½µµÍ·çÏÕ¡£¡£¡£¡£¸ÃÎÊÌâ²»»áÓ°ÏìPrisma Access¡¢¡¢Cloud NGFWºÍPanoramaÉ豸¡£¡£¡£¡£Ä¿Ç°£¬£¬¸Ã·ì϶ÉÐδÐÞ¸´£¬£¬Ô¤¼Æ½«ÓÚ2026Äê5ÔÂ13ÈÕ°ä²¼²¹¶¡¡£¡£¡£¡£Palo Alto Networks°µÊ¾£¬£¬ÒÑ·¢ÏÖÕë¶ÔÓû§IDÉí·ÝÑéÖ¤ÃÅ»§Â¶³öÓÚ¹«¹²»¥ÁªÍøµÄϵͳµÄÓÐÏÞÁìÓò·ì϶ÀûÓÃÐÐΪ¡£¡£¡£¡£
https://securityaffairs.com/191748/security/palo-alto-networks-pan-os-flaw-exploited-for-remote-code-execution.html
4. ¹È¸è¸æ°×ÔâÀûÓ㬣¬ManageWPÓû§Ôâ´¹µö¹¥»÷
5ÔÂ6ÈÕ£¬£¬Ò»³¡Í¨¹ý¹È¸èÔÞÖúËÑË÷Á˾ÖÌáÒéµÄÍøÂç´¹µö»î¶¯£¬£¬ÕýÒÔ»ñÈ¡ManageWPƽ̨µÄµÇ¼ʹ´¦ÎªÖ¸±ê¡£¡£¡£¡£ManageWPÊÇGoDaddyÆìÏÂÓÃÓÚ¼¯ÖÐÖÎÀíWordPressÍøÕ¾ÈºµÄƽ̨£¬£¬Óû§¿Éͨ¹ýÒ»¸ö½ÚÖÆÃæ°åÔ¶³ÌÖÎÀí¶à¸öÍøÕ¾£¬£¬³£¼ûÓû§Ô̺¬ÍøÕ¾¿ª·¢ÈËÔ±¡¢¡¢ÍøÂç´úÀí»ú¹¹¼°ÆóÒµÓû§¡£¡£¡£¡£ÍþвÐÐΪÕßѡȡÖÐÑëÈ˹¥»÷²½Ö裬£¬Í¨¹ýÐéαµÇÂ¼Ò³Ãæ³äÈÎÊܺ¦ÕߺͺϷ¨ManageWP·þÎñÖ®¼äµÄʵʱÆÚÀí¡£¡£¡£¡£¾ÝGuardio Labs×êÑÐÈËÔ±ÖҸ棬£¬Õë¶Ô¡°managewp¡±µÄËÑË÷²éÎÊ£¬£¬ÐéαÁ˾ֻá³Ê´Ë¿ÌÕæÊµÁ˾ÖÉÏ·½£¬£¬ÓÕʹÒÀÀµ¹È¸è²éÕҵǼURLµÄÓû§µã»÷¡£¡£¡£¡£¶ñÒâÁ´½Ó½«Óû§Êèµ¼ÖÁÓëÕæÊµµÇÂ¼Ò³ÃæÆëȫһÑùµÄαÔìÒ³Ãæ£¬£¬ÊäÈëµÄÈκÎÍ´´¦³ÇÊб»·¢ËÍÖÁ¹¥»÷Õß½ÚÖÆµÄTelegramƵµÀ¡£¡£¡£¡£ÓëͨÀý´¹µöÒ³Ãæ·ÖÆç£¬£¬¸Ã»î¶¯Ñ¡È¡ÊµÊ±AiTM»úÖÆ£¬£¬¹¥»÷ÕßʹÓÃÇÔÈ¡µÄƾ֤ʵʱµÇ¼ƽ̨£¬£¬ËæºóÊܺ¦Õ߻ῴµ½ÐéαµÄË«³É·ÖÉí·ÝÑéÖ¤ÌáÐÑ£¬£¬ÍþвÐÐΪÕß½è´Ë»ñÈ¡¶ÔManageWPÕË»§µÄÆëÈ«½Ó¼ûȨÏÞ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing/
5. ÑÇÂíÑ·SESÔâÀÄÓ㬣¬´¹µöÓʼþÈÆ¹ý°²È«¹ýÂË
5ÔÂ4ÈÕ£¬£¬¾Ý¿¨°Í˹»ù»ã±¨£¬£¬ÑÇÂíÑ·µ¥Ò»µç×ÓÓʼþ·þÎñÕýÈÕÒæ±»ÀÄÓÃÓÚ·¢ËÍÓµÓкýŪÐÔµÄÍøÂç´¹µöµç×ÓÓʼþ£¬£¬ÕâЩÓʼþ¿ÉÄÜÈÆ¹ý³ß¶È°²È«¹ýÂËÆ÷²¢Ê¹»ùÓÚŵÑÔµÄ×èÖ¹»úÖÆÊ§Ð§¡£¡£¡£¡£ÓÉÓÚÑÇÂíÑ·SESÊÇÒ»¸öºÏ·¨ÇÒ¿ÉÐŵķþÎñ£¬£¬ÍøÂç´¹µö»î¶¯Äܹ»ÀûÓÃËü·¢ËÍ¿ÉÄÜͨ¹ýÉí·ÝÑéÖ¤²é³µÄ¶ñÒâµç×ÓÓʼþ¡£¡£¡£¡£¿¨°Í˹»ù×êÑÐÈËÔ±¹Û²ìµ½ÀûÓÃÑÇÂíÑ·SES½øÐеÄÍøÂç´¹µö¹¥»÷ÓÐËùÔö³¤£¬£¬ÕâЩ¹¥»÷½«Óû§Öض¨ÏòÖÁ¶ñÒâÍøÕ¾¡£¡£¡£¡£×êÑÐÈËÔ±ÒÔΪ£¬£¬ÕâÖÖÀÄÓõÄÖØÒªÇý¶¯³É·ÖÊÇGitHub´æ´¢¿â¡¢¡¢.ENVÎļþ¡¢¡¢Docker¾µÏñ¡¢¡¢±¸·ÝºÍ¿É¹«¿ª½Ó¼ûµÄS3´æ´¢Í°ÖÐAWSƾ֤µÄ¶³öˮƽԽÀ´Ô½¸ß¡£¡£¡£¡£¹¥»÷Õßͨ³£Ê¹ÓûùÓÚ¿ªÔ´TruffleHog¹¤¾ß¹¹½¨µÄ»úеÈË£¬£¬Í¨¹ý×Ô¶¯»¯·½Ê½É¨Ãèй¶µÄÃÜÔ¿¡£¡£¡£¡£´Ë¿Ì£¬£¬ÍþвÐÐΪÕßÒÀ¸½×Ô¶¯»¯¹¥»÷¼ò»¯°ÂÃØÉ¨Ãè¡¢¡¢È¨ÏÞÑéÖ¤ºÍµç×ÓÓʼþ·Ö·¢£¬£¬ÊµÏÖÁËǰËùδÓеÄÀÄÓÃˮƽ¡£¡£¡£¡£ÔÚÑéÖ¤ÃÜԿȨÏ޺ͷ¢ËÍÏ޶Ⱥ󣬣¬¹¥»÷Õß¼´¿É´ó¹æÄ£É¢²¼ÍøÂç´¹µöÐÅÏ¢¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/researchers-report-amazon-ses-abused-in-phishing-to-evade-detection/
6. MuddyWater¼Ù×°ChaosÀÕË÷Èí¼þÖ´Ðмäµý»î¶¯
5ÔÂ6ÈÕ£¬£¬ÒÁÀʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯MuddyWater½üÆÚ½«Æä¹¥»÷Ðж¯¼Ù×°³ÉChaosÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£Ö»¹ÜÕâ´Î¹¥»÷Éæ¼°Æ¾Ö¤ÇÔÈ¡¡¢¡¢Óƾû¯¡¢¡¢Ô¶³Ì½Ó¼û¡¢¡¢Êý¾Ýй¶¡¢¡¢ÀÕË÷ÓʼþÒÔ¼°ÔÚChaosйÃÜÃÅ»§ÍøÕ¾ÉϵÄÌõ¿î£¬£¬µ«¹¥»÷ÕßʹÓõĻù´¡ÉèÊ©ºÍ¼¼ÊõÓëMuddyWaterÇ×êÇÓйء£¡£¡£¡£Rapid7µ÷²éµÄÈëÇÖÊÂÎñʼÓÚMicrosoft TeamsÉç½»¹¤³Ì£¬£¬¹¥»÷Õßͨ¹ýÓëÔ±¹¤Ì¸Ìì¡¢¡¢³ÉÁ¢ÆÁÄ»¹²Ïí»á»°¡¢¡¢ÇÔȡʹ´¦¡¢¡¢°Ñ³Ö¶à³É·ÖÉí·ÝÑéÖ¤ÉèÖ㬣¬²¢ÔÚijЩÇé¿öϲ¿ÊðAnyDesk½øÐÐÔ¶³Ì½Ó¼û¡£¡£¡£¡£Æ¾Ö¤ÇÔȡͨ¹ý¼Ù×°³ÉMicrosoft Quick AssistµÄÍøÂç´¹µöÒ³Ãæ»òÓÕÆÊܺ¦Õß½«ÃÜÂëÊäÈë±¾µØÎı¾ÎļþʵÏÖ¡£¡£¡£¡£¹¥ÆÆÕË»§ºó£¬£¬¹¥»÷Õßͨ¹ýRDP¡¢¡¢DWAgentºÍAnyDeskµÈ¼¿Á©¶ÔÄÚ²¿ÏµÍ³½øÐÐÉí·ÝÑéÖ¤²¢³ÉÁ¢ÓƾÃÐÔ¡£¡£¡£¡£Ëæºó£¬£¬ËûÃÇÀûÓöñÒâÈí¼þ¼ÓÔØ·¨Ê½Í¶·Å×Ô½ç˵ºóÃÅ·¨Ê½£¬£¬¸Ã·¨Ê½¼Ù×°³ÉMicrosoft WebView2ÀûÓ÷¨Ê½£¬£¬¾ß±¸·´·ÖÎöºÍ·´Ðé¹¹»ú²é³Ö°ÄÜ£¬£¬Ö§³ÖPowerShellºÍCMDºÅÁîÖ´ÐС¢¡¢ÎļþÉÏ´«ºÍɾ³ýÒÔ¼°ÓƾÃshell½Ó¼ûµÈ12¸öºÅÁî¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ