¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųÉÓÕ¶ü£¬Ê¹ÓÃTelegramÈö²¥¶ñÒâÈí¼þ

Ðû²¼Ê±¼ä 2025-01-24

1. ¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųÉÓÕ¶ü£¬Ê¹ÓÃTelegramÈö²¥¶ñÒâÈí¼þ


1ÔÂ22ÈÕ£¬ÍþвÐÐΪÕßʹÓùØÓÚRoss Ulbricht£¨Ë¿³ñ֮·°µÍøÊг¡Ê×´´ÈË£©µÄÐÂÎÅ×÷ΪÓÕ¶ü£¬Í¨¹ýTelegramƵµÀÓÕÆ­Óû§ÔËÐÐPowerShell´úÂë¡£Õâ´Î¹¥»÷ÊÇ¡°Click-Fix¡±Õ½ÂÔµÄбäÖÖ£¬ÓÉvx-underground·¢Ã÷¡£²î±ðÓÚÒÔÍùµÄ¹ýʧÐÞ¸´Î±×°£¬´Ë´Î¹¥»÷¼Ù°ç³É¼ÓÈëƵµÀʱµÄÑéÖ¤Âë»òÑé֤ϵͳ¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵÄÐéᵫ¾­ÓÉÑéÖ¤µÄRoss UlbrichtÕË»§£¬½«Óû§Ö¸µ¼ÖÁ¿´Ëƹٷ½µÄTelegramƵµÀ¡£ÔÚƵµÀÄÚ£¬Óû§»áÓöµ½ÃûΪ¡°Safeguard¡±µÄÐéαÉí·ÝÑéÖ¤ÇëÇó£¬×îÖջᱻָµ¼ÖÁÒ»¸öTelegramС³ÌÐò£¬¸Ã³ÌÐò»á×Ô¶¯¸´ÖÆPowerShellÏÂÁîµ½¼ôÌù°å£¬²¢ÌáÐÑÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐС£Ö´ÐеĴúÂë»áÏÂÔØÒ»¸ö°üÀ¨Cobalt Strike¼ÓÔسÌÐòµÄZIPÎļþ£¬Cobalt Strike³£±»ÍþвÐÐΪÕßÓÃÓÚÔ¶³Ì»á¼ûÅÌËã»úºÍÍøÂ磬ÕâÀàѬȾÍùÍùÊÇÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ¹¥»÷µÄÏÈÕס£Õû¸öÑéÖ¤Àú³ÌµÄÓïÑÔÉè¼ÆµÃ¼«ÎªÉóÉ÷£¬ÒÔ×èÖ¹ÒýÆðÓû§ÏÓÒÉ¡£Ç徲ר¼ÒÖÒÑÔ£¬Óû§Ó¦×èÖ¹ÔÚ²»È·¶¨µÄÇéÐÎÏÂÔÚWindows¡°ÔËÐС±¶Ô»°¿ò»òPowerShellÖÕ¶ËÖÐÖ´ÐÐÔÚÏ߸´ÖƵÄÄÚÈÝ£¬¶Ô¼ôÌù°åÄÚÈݸÐÓ¦²»È·×¼Ê±£¬Ó¦Õ³Ìùµ½Îı¾ÔĶÁÆ÷ÉÏÆÊÎö£¬ÈκλìÏý¶¼ÊÇΣÏÕÐźÅ¡£


https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/


2. ChromeÀ©Õ¹³ÌÐòÃæÁÙ¹©Ó¦Á´¹¥»÷Íþв£¬Êý°ÙÍòÓû§»òÊÜÓ°Ïì


1ÔÂ22ÈÕ£¬ÍøÂçÇå¾²»ú¹¹Sekoia·¢³öÖÒÑÔ£¬Ö¸³öÕë¶ÔChromeÀ©Õö¿ª·¢ÕߵĹ©Ó¦Á´¹¥»÷¿ÉÄÜÒѾ­Ó°ÏìÁËÊýÊ®ÍòÈË¡£´ËÀ๥»÷ʼÓÚ2023Ä꣬×î½üµÄÒ»´ÎÔ˶¯±¬·¢ÔÚ2024Äê12ÔÂ30ÈÕ£¬Ö¼ÔÚÇÔÈ¡ÈçChatGPTºÍFacebook for BusinessµÈÍøÕ¾µÄAPIÃÜÔ¿¡¢»á»°cookieºÍÆäËûÉí·ÝÑéÖ¤ÁîÅÆ¡£¼ÓÀû¸£ÄáÑǵÄCyberhaven¹«Ë¾ÊǴ˴ι¥»÷µÄÊܺ¦ÕßÖ®Ò»£¬Æ俪·¢ÕßÕË»§ÔÚ2024Äê½ÚÀñÈÕʱ´ú±»ÈëÇÖ¡£Booz Allen HamiltonµÄÆÊÎöÏÔʾ£¬Ðí¶àÆäËûChromeÀ©Õ¹Ò²¿ÉÄÜÊܵ½Ó°Ï죬DZÔÚÊÜÓ°ÏìµÄ×îÖÕÓû§ÊýÄ¿¿ÉÄִܵïÊý°ÙÍò¡£Ò»Ð©ÊÜÓ°ÏìµÄÀ©Õ¹ÒÑ´ÓChromeÍøÉÏÓ¦Óõ곷Ï£¬¶øһЩÀ©Õ¹µÄÒ³ÃæÏÔʾÒѾÙÐиüС£Reader ModeÀ©Õ¹µÄÊ×´´ÈËÏòÔ¼30ÍòÓû§·¢³ö¹ûÕæÐÅ£¬¼û¸æËûÃÇÆäÀ©Õ¹ÔÚ2024Äê12ÔÂ5ÈÕÊܵ½ÈëÇÖ¡£¹¥»÷Õßͨ¹ýαװ³ÉChromeÍøÉÏÓ¦Óõ꿪·¢ÕßÖ§³ÖµÄ´¹ÂÚÓʼþ£¬ÓÕÆ­¿ª·¢Õßµã»÷¶ñÒâÁ´½Ó²¢Åú×¼¶ñÒâOAuthÓ¦ÓóÌÐòµÄ»á¼ûȨÏÞ£¬´Ó¶ø»ñµÃÉÏ´«±»ÈëÇÖÀ©Õ¹µ½ChromeÍøÉÏÓ¦ÓõêµÄȨÏÞ¡£Sekoiaͨ¹ýÊÓ²ìÓëÍøÂç´¹ÂÚÓʼþ¹ØÁªµÄÓòÃû£¬·¢Ã÷Á˴˴ι¥»÷ÖÐʹÓõÄÆäËûÓòÃû¼°¿ÉÄÜÉæ¼°µÄÏÈÇ°¹¥»÷µÄÓòÃû£¬ÒÔΪÕâ¸öÍþвÐÐΪÕßרÃÅÈö²¥¶ñÒâChromeÀ©Õ¹ÒÔÍøÂçÃô¸ÐÊý¾Ý¡£


https://www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/


3. ǧÓà¶ñÒâÓòÃû·Âð×ÅÃûƽ̨Èö²¥Lumma StealerÇÔÃÜľÂí


1ÔÂ22ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬Áè¼Ý1000¸ö¶ñÒâÓòÃûÕýÔÚ·ÂðRedditºÍWeTransferµÈ×ÅÃûƽ̨£¬Èö²¥½üÄêÀ´Ê¢ÐеÄLumma StealerÇÔÃÜľÂí£¬Í¹ÏÔÁËÍøÂç·¸·¨·Ö×ÓʹÓÃÊÜÐÅÍÐÆ·ÅÆÓÕÆ­Óû§ÏÂÔضñÒâÈí¼þµÄÖØ´óÐÔ¡£Lumma StealerÊÇÒ»ÖÖÇ¿Ê¢µÄÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢ºÍä¯ÀÀÆ÷Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£ÕâЩ¶ñÒâÓòÃûÓëÕýµ±URL¼«ÎªÏàËÆ£¬ÉõÖÁÅ䱸ÁËÓÐÓõÄSSLÖ¤Ê飬Îóµ¼Óû§ÒÔΪÕýÔÚ»á¼ûÇå¾²ÍøÕ¾£¬ÔöÌíÁËÓû§³ÉΪÍøÂç´¹ÂÚ¹¥»÷Êܺ¦ÕßµÄΣº¦¡£Lumma Stealer½ÓÄɶàÖÖÊÖÒÕÖ´ÐжñÒ⸺ÔØ£¬ÈçÍйÜÐéαµÄCAPTCHAÒ³ÃæÓÕʹÓû§Ö´ÐÐPowerShell¾ç±¾ÏÂÔضñÒâÈí¼þ¡£ÕâЩ¶ñÒâÓòÃûµÄÔöÌí·´Ó¦Á˹¥»÷ÕßʹÓÃ×ÅÃûƽ̨ÉùÓþµÄÇ÷ÊÆ£¬Í¨¹ýÉç»á¹¤³ÌѧսÂÔ·¢ËÍ°üÀ¨Á´½ÓµÄµç×ÓÓʼþ£¬½«Óû§Ö¸µ¼ÖÁڲƭÍøÕ¾¡£¹¥»÷Õß»¹Ê¹ÓÃÄÚÈÝ·Ö·¢ÍøÂçÍйܴ¹ÂÚÍøÕ¾£¬Ìӱܼì²â²¢ÑÓÉì¹¥»÷Ò»Á¬Ê±¼ä¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬ÍøÂçÇ徲ר¼Ò½¨ÒéÑéÖ¤URL¡¢ÆôÓÃË«ÒòËØÈÏÖ¤ºÍ¾ÙÐÐÓû§½ÌÓý¡£


https://cybersecuritynews.com/1000-malicious-domains-mimic-reddit-wetransfer/


4. CISA½«JQuery XSSÎó²î¼ÓÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼


1ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«jQuery³¤ÆÚ¿çÕ¾µã¾ç±¾£¨XSS£©Îó²î£¨CVE-2020-11023£¬CVSSÆÀ·Ö£º6.9£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¸ÃÎó²î±£´æÓÚjQuery 1.0.3ÖÁ3.4.1°æ±¾ÖУ¬µ±Ê¹ÓðüÀ¨²»ÊÜÐÅÍеÄHTML <option>ÔªËصÄDOMÒªÁìʱ£¬¿ÉÄÜ»áÖ´ÐжñÒâ´úÂë¡£´ËÎÊÌâÒÑÔÚjQuery 3.5.0ÖлñµÃÐÞ¸´¡£×Éѯ±¨¸æÖ¸³ö£¬×ÝÈ»¶ÔÀ´×Ô²»ÊÜÐÅÍÐȪԴµÄÔªËؾÙÐÐÁËÕûÀí£¬½«Æäת´ï¸øjQueryµÄDOM²Ù×÷ÒªÁ죨Èç.html()¡¢.append()µÈ£©ÈÔ¿ÉÄÜÒý·¢Ç徲Σº¦¡£×÷ΪÔÝʱ»º½â²½·¥£¬½¨ÒéÔÚʹÓÃjQueryÒªÁì´¦Öóͷ£HTMLÇ°£¬Ê¹ÓÃDOMPurifyµÄSAFE_FOR_JQUERYÑ¡Ïî¾ÙÐÐÕûÀí¡£jQuery 3.5.0°æ±¾µÄÖ÷Ҫת±äÊÇÇå¾²ÐÞ¸´£¬ÆäÖÐjQuery.htmlPrefilterº¯Êý²»ÔÙʹÓÃÕýÔò±í´ïʽ£¬¶øÊÇת´ïδ¸ü¸ÄµÄ×Ö·û´®¡£Ñо¿Ô±Masato Kinugawa±¨¸æÁËÕâÒ»Îó²î¡£Æ¾Ö¤CISAµÄ²Ù×÷Ö¸ÁÁª°î»ú¹¹±ØÐèÔÚ2025Äê2ÔÂ13ÈÕÇ°ÐÞ¸´´ËÎó²î£¬ÒÔ± £»¤ÆäÍøÂçÃâÊܹ¥»÷¡£Í¬Ê±£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÏà¹ØÎó²î¡£


https://securityaffairs.com/173388/uncategorized/u-s-cisa-adds-jquery-flaw-known-exploited-vulnerabilities-catalog.html


5. Abnormal Security½ÒÆÆ£º×¨ÎªÍøÂç·¸·¨´òÔìµÄGhostGPT AI̸Ìì»úеÈËÐËÆð


1ÔÂ23ÈÕ£¬Abnormal SecurityÔÚ2024Äêβ·¢Ã÷ÁËÒ»¿îÃûΪGhostGPTµÄ¶ñÒâAI̸Ìì»úеÈË£¬×¨ÎªÍøÂç·¸·¨Éè¼Æ¡£Õâ¿î¹¤¾ß¿Éͨ¹ýTelegramµÈƽ̨ÇáËÉ»ñÈ¡£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩÁËب¹ÅδÓеÄÄÜÁ¦£¬°üÀ¨ÖÆ×÷ÖØ´óµÄÍøÂç´¹ÂÚµç×ÓÓʼþºÍ¿ª·¢¶ñÒâÈí¼þ¡£ÓëÊÜÆ·µÂºÍÇå¾²²½·¥Ô¼ÊøµÄ¹Å°åAIÄ£×Ó²î±ð£¬GhostGPT²»ÊÜÕâЩÏÞÖÆ£¬Äܹ»ÒÔب¹ÅδÓеÄËÙÂʺÍÇáËÉˮһÌìÉú¶ñÒâÄÚÈÝ¡£ËüºÜ¿ÉÄÜÊÇʹÓðü×°Æ÷ÅþÁ¬µ½ChatGPTµÄÔ½Óü°æ±¾»ò¿ªÔ´LLM£¬´Ó¶øÏû³ýÁËÆ·µÂ°ü¹Ü¡£GhostGPT½µµÍÁËÍøÂç·¸·¨µÄÃż÷£¬Ê¹ÂÄÀúȱ·¦µÄ¼ÓÈëÕßÒ²ÄÜʹÓÃAI¾ÙÐжñÒâÔ˶¯£¬²¢ÒÔ¸ü¸ßµÄЧÂÊÌᳫ¸üÖش󡢸ü¾ßÓ°ÏìÁ¦µÄ¹¥»÷¡£±ðµÄ£¬Ëü»¹ÓÅÏÈ˼Á¿Óû§ÄäÃûÐÔ£¬¶Ô×·ÇóÒþ²Ø²»·¨Ô˶¯²¢Ìӱܼì²âµÄÍøÂç·¸·¨·Ö×ÓºÜÓÐÎüÒýÁ¦¡£Abnormal SecurityµÄÑо¿Ö°Ô±²âÊÔÁËGhostGPTµÄ¹¦Ð§£¬·¢Ã÷ËüչʾÁËÓÕƭDZÔÚÊܺ¦ÕßµÄÄÜÁ¦¡£Ëæ×ÅÍøÂç·¸·¨·Ö×Ó¶ÔÈ˹¤ÖÇÄܵÄÐËȤÈÕÒæŨÖØ£¬ÍøÂçÇå¾²ÉçÇø±ØÐèÒ»Ö±Á¢ÒìºÍÉú³¤Æä·ÀÓù²½·¥£¬²Å»ª¼á³ÖÁìÏÈְλ¡£


https://hackread.com/ghostgpt-malicious-ai-chatbot-fuel-cybercrime-scams/


6. J-magic¶ñÒâÈí¼þ£ºÕë¶ÔÕ°²©ÍøÂç×°±¸µÄ¡°Ä§°ü¡±¹¥»÷Ç÷ÊÆÆÊÎö


1ÔÂ23ÈÕ£¬J-magicÊÇÒ»ÖÖÕë¶ÔÕ°²©ÍøÂç±ßÑØ×°±¸µÄ¶ñÒâÈí¼þ£¬Ö÷Òª¹¥»÷°ëµ¼Ìå¡¢ÄÜÔ´¡¢ÖÆÔìÒµºÍITÁìÓòµÄ×éÖ¯¡£¸Ã¶ñÒâÈí¼þÊÇcd00rºóÃŵĶ¨ÖƱäÌ壬ͨ¹ý¼àÊÓTCPÁ÷Á¿Ñ°ÕÒ¾ßÓÐÌض¨ÌØÕ÷µÄ¡°Ä§ÊõÊý¾Ý°ü¡±À´Æô¶¯·´Ïòshell¡£¾ÝLumenÍþвÑо¿ºÍÔËÓª²¿·ÖBlack Lotus LabsµÄÑо¿Ö°Ô±³Æ£¬J-magicÔ˶¯ÔÚ2023ÄêÖÁ2024Äêʱ´ú»îÔ¾£¬Ö¼ÔÚʵÏֵͼì²â¶ÈºÍºã¾Ã»á¼û¡£Ô¼ÄªÒ»°ëµÄÄ¿µÄ×°±¸ÉèÖÃΪ×éÖ¯µÄVPNÍø¹Ø¡£J-magic»á¼ì²éÖÖÖÖ×ֶκÍÆ«ÒÆÁ¿£¬ÈôÊÇÊý¾Ý°üÖª×ãÌض¨Ìõ¼þÖ®Ò»£¬¾Í»áÌìÉú·´Ïòshell£¬µ«·¢ËÍÕßÐèÏȽâ¾öRSAÌôÕ½²Å»ª»á¼ûÊÜѬȾװ±¸¡£Ö»¹ÜJ-magicÓëͬÑù»ùÓÚcd00rºóÃŵÄSeaSpy¶ñÒâÈí¼þÔÚÊÖÒÕÉÏÏàËÆ£¬µ«±£´æһЩ²î±ð£¬Ê¹µÃÄÑÒÔ½¨ÉèÁªÏµ¡£Black Lotus LabsµÄÑо¿Ö°Ô±ÒÔΪ£¬J-magic¹¥»÷Ô˶¯Åú×¢£¬Õë¶ÔÆóÒµ¼¶Â·ÓÉÆ÷µÄ¶ñÒâÈí¼þʹÓÃÕý³ÉΪһÖÖÇ÷ÊÆ£¬ÓÉÓÚ´ËÀà×°±¸ºÜÉÙ¾ÙÐеçÔ´Ñ­»·£¬¶ñÒâÈí¼þפÁôÔÚÄÚ´æÖУ¬ÇÒͨ³£È±·¦»ùÓÚÖ÷»úµÄ¼à¿Ø¹¤¾ß¡£


https://www.bleepingcomputer.com/news/security/stealthy-magic-packet-malware-targets-juniper-vpn-gateways/