¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųÉÓÕ¶ü£¬ÀûÓÃTelegramÁ÷´«¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2025-01-241. ¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųÉÓÕ¶ü£¬ÀûÓÃTelegramÁ÷´«¶ñÒâÈí¼þ
1ÔÂ22ÈÕ£¬ÍþвÐÐΪÕßÀûÓùØÓÚRoss Ulbricht£¨Ë¿³ñ֮·°µÍøÊг¡Ê×´´ÈË£©µÄÐÂÎÅ×÷ΪÓÕ¶ü£¬Í¨¹ýTelegramƵµÀÓÕÆÓû§ÔËÐÐPowerShell´úÂë¡£Õâ´Î¹¥»÷ÊÇ¡°Click-Fix¡±¼ÆıµÄбäÖÖ£¬ÓÉvx-underground·¢ÏÖ¡£²îÒìÓÚÒÔÍùµÄ´íÎóÐÞ¸´Î±×°£¬´Ë´Î¹¥»÷¼Ù°ç³É¼ÓÈëƵµÀʱµÄÑéÖ¤Âë»òÑé֤ϵͳ¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵÄÐé¼Ùµ«¾¹ýÑéÖ¤µÄRoss UlbrichtÕË»§£¬½«Óû§Òýµ¼ÖÁ¿´Ëƹٷ½µÄTelegramƵµÀ¡£ÔÚƵµÀÄÚ£¬Óû§»áÓöµ½ÃûΪ¡°Safeguard¡±µÄÐé¼ÙÉí·ÝÑéÖ¤ÇëÇó£¬×îÖջᱻÒýµ¼ÖÁÒ»¸öTelegramС·¨Ê½£¬¸Ã·¨Ê½»á×Ô¶¯¸´ÖÆPowerShellÃüÁîµ½¼ôÌù°å£¬²¢ÌáʾÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐС£Ö´ÐеĴúÂë»áÏÂÔØÒ»¸ö°üÂÞCobalt Strike¼ÓÔØ·¨Ê½µÄZIPÎļþ£¬Cobalt Strike³£±»ÍþвÐÐΪÕßÓÃÓÚÔ¶³Ì·ÃÎʼÆËã»úºÍÍøÂ磬ÕâÀàѬȾÍùÍùÊÇÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ¹¥»÷µÄÇ°Õס£Õû¸öÑéÖ¤¹ý³ÌµÄÓïÑÔÉè¼ÆµÃ¼«Îª½÷É÷£¬ÒÔÖÆÖ¹ÒýÆðÓû§»³ÒÉ¡£Äþ¾²×¨¼Ò¾¯¸æ£¬Óû§Ó¦ÖÆÖ¹ÔÚ²»È·¶¨µÄÇé¿öÏÂÔÚWindows¡°ÔËÐС±¶Ô»°¿ò»òPowerShellÖÕ¶ËÖÐÖ´ÐÐÔÚÏ߸´ÖƵÄÄÚÈÝ£¬¶Ô¼ôÌù°åÄÚÈݸÐÓ¦²»È·¶¨Ê±£¬Ó¦Õ³Ìùµ½Îı¾ÔĶÁÆ÷ÉÏ·ÖÎö£¬ÈκλìÏý¶¼ÊÇΣÏÕÐźš£
https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/
2. ChromeÀ©Õ¹·¨Ê½ÃæÁÙ¹©Ó¦Á´¹¥»÷Íþв£¬Êý°ÙÍòÓû§»òÊÜÓ°Ïì
1ÔÂ22ÈÕ£¬ÍøÂçÄþ¾²»ú¹¹Sekoia·¢³ö¾¯¸æ£¬Ö¸³öÕë¶ÔChromeÀ©Õ¹¿ª·¢ÕߵĹ©Ó¦Á´¹¥»÷¿ÉÄÜÒѾӰÏìÁËÊýÊ®ÍòÈË¡£´ËÀ๥»÷ʼÓÚ2023Ä꣬×î½üµÄÒ»´Î»î¶¯·¢ÉúÔÚ2024Äê12ÔÂ30ÈÕ£¬Ö¼ÔÚÇÔÈ¡ÈçChatGPTºÍFacebook for BusinessµÈÍøÕ¾µÄAPIÃÜÔ¿¡¢»á»°cookieºÍÆäËûÉí·ÝÑéÖ¤ÁîÅÆ¡£¼ÓÀû¸£ÄáÑǵÄCyberhaven¹«Ë¾ÊǴ˴ι¥»÷µÄÊܺ¦ÕßÖ®Ò»£¬Æ俪·¢ÕßÕË»§ÔÚ2024Äê½ÚÀñÈÕÆڼ䱻ÈëÇÖ¡£Booz Allen HamiltonµÄ·ÖÎöÏÔʾ£¬Ðí¶àÆäËûChromeÀ©Õ¹Ò²¿ÉÄÜÊܵ½Ó°Ï죬DZÔÚÊÜÓ°ÏìµÄ×îÖÕÓû§ÊýÁ¿¿ÉÄܵ½´ïÊý°ÙÍò¡£Ò»Ð©ÊÜÓ°ÏìµÄÀ©Õ¹ÒÑ´ÓChromeÍøÉÏÓ¦Óõ곷Ï£¬¶øһЩÀ©Õ¹µÄÒ³ÃæÏÔʾÒѽøÐиüС£Reader ModeÀ©Õ¹µÄÊ×´´ÈËÏòÔ¼30ÍòÓû§·¢³ö¹ûÈ»ÐÅ£¬¼û¸æËûÃÇÆäÀ©Õ¹ÔÚ2024Äê12ÔÂ5ÈÕÊܵ½ÈëÇÖ¡£¹¥»÷Õßͨ¹ýαװ³ÉChromeÍøÉÏÓ¦Óõ꿪·¢ÕßÖ§³ÖµÄµöÓãÓʼþ£¬ÓÕÆ¿ª·¢Õßµã»÷¶ñÒâÁ´½Ó²¢Åú×¼¶ñÒâOAuthÓ¦Ó÷¨Ê½µÄ·ÃÎÊȨÏÞ£¬´Ó¶ø»ñµÃÉÏ´«±»ÈëÇÖÀ©Õ¹µ½ChromeÍøÉÏÓ¦ÓõêµÄȨÏÞ¡£Sekoiaͨ¹ýÊÓ²ìÓëÍøÂçµöÓãÓʼþ¹ØÁªµÄÓòÃû£¬·¢ÏÖÁ˴˴ι¥»÷ÖÐʹÓõÄÆäËûÓòÃû¼°¿ÉÄÜÉæ¼°µÄÏÈÇ°¹¥»÷µÄÓòÃû£¬ÈÏΪÕâ¸öÍþвÐÐΪÕßרÃÅÁ÷´«¶ñÒâChromeÀ©Õ¹ÒÔÊÕ¼¯Ãô¸ÐÊý¾Ý¡£
https://www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/
3. ǧÓà¶ñÒâÓòÃû·Âð֪Ãûƽ̨Á÷´«Lumma StealerÇÔÃÜľÂí
1ÔÂ22ÈÕ£¬ÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖ£¬Áè¼Ý1000¸ö¶ñÒâÓòÃûÕýÔÚ·ÂðRedditºÍWeTransferµÈÖªÃûƽ̨£¬Á÷´«½üÄêÀ´Á÷ÐеÄLumma StealerÇÔÃÜľÂí£¬Í¹ÏÔÁËÍøÂç·¸×ï·Ö×ÓÀûÓÃÊÜÐÅÈÎÆ·ÅÆÆÛÆÓû§ÏÂÔضñÒâÈí¼þµÄÅÓ´óÐÔ¡£Lumma StealerÊÇÒ»ÖÖÇ¿´óµÄÐÅÏ¢ÇÔÈ¡¹¤¾ß£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¼ÓÃÜ»õ±ÒÇ®°üÐÅÏ¢ºÍä¯ÀÀÆ÷Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£ÕâЩ¶ñÒâÓòÃûÓëºÏ·¨URL¼«ÎªÏàËÆ£¬ÉõÖÁÅ䱸ÁËÓÐЧµÄSSLÖ¤Ê飬Îóµ¼Óû§ÈÏΪÕýÔÚ·ÃÎÊÄþ¾²ÍøÕ¾£¬Ôö¼ÓÁËÓû§³ÉΪÍøÂçµöÓã¹¥»÷Êܺ¦ÕߵķçÏÕ¡£Lumma Stealer½ÓÄɶàÖÖ¼¼ÊõÖ´ÐжñÒ⸺ÔØ£¬ÈçÍйÜÐé¼ÙµÄCAPTCHAÒ³ÃæÓÕʹÓû§Ö´ÐÐPowerShell½Å±¾ÏÂÔضñÒâÈí¼þ¡£ÕâЩ¶ñÒâÓòÃûµÄÔö¼Ó·´Ó³Á˹¥»÷ÕßÀûÓÃÖªÃûƽ̨ÉùÓþµÄÇ÷ÊÆ£¬Í¨¹ýÉç»á¹¤³Ìѧ¼Æı·¢ËÍ°üÂÞÁ´½ÓµÄµç×ÓÓʼþ£¬½«Óû§Òýµ¼ÖÁÆÛÕ©ÍøÕ¾¡£¹¥»÷Õß»¹ÀûÓÃÄÚÈÝ·Ö·¢ÍøÂçÍйܵöÓãÍøÕ¾£¬Ìӱܼì²â²¢ÑÓ³¤¹¥»÷Á¬Ðøʱ¼ä¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬ÍøÂçÄþ¾²×¨¼Ò½¨ÒéÑéÖ¤URL¡¢ÆôÓÃË«ÒòËØÈÏÖ¤ºÍ½øÐÐÓû§½ÌÓý¡£
https://cybersecuritynews.com/1000-malicious-domains-mimic-reddit-wetransfer/
4. CISA½«JQuery XSS©¶´¼ÓÈëÒÑÖª±»ÀûÓ鶴Ŀ¼
1ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Òѽ«jQuery³Ö¾Ã¿çÕ¾µã½Å±¾£¨XSS£©Â©¶´£¨CVE-2020-11023£¬CVSSÆÀ·Ö£º6.9£©Ìí¼Óµ½ÆäÒÑÖª±»ÀûÓ鶴£¨KEV£©Ä¿Â¼ÖС£¸Ã©¶´´æÔÚÓÚjQuery 1.0.3ÖÁ3.4.1°æ±¾ÖУ¬µ±Ê¹ÓðüÂÞ²»ÊÜÐÅÈεÄHTML <option>ÔªËصÄDOMÒªÁìʱ£¬¿ÉÄÜ»áÖ´ÐжñÒâ´úÂë¡£´ËÎÊÌâÒÑÔÚjQuery 3.5.0Öеõ½ÐÞ¸´¡£×Éѯ³ÂËßÖ¸³ö£¬¼´Ê¹¶ÔÀ´×Ô²»ÊÜÐÅÈÎÀ´Ô´µÄÔªËؽøÐÐÁËÇåÀí£¬½«Æäͨ±¨¸øjQueryµÄDOM²Ù×÷ÒªÁ죨Èç.html()¡¢.append()µÈ£©ÈÔ¿ÉÄÜÒý·¢Äþ¾²·çÏÕ¡£×÷ΪÁÙʱ»º½â´ëÊ©£¬½¨ÒéÔÚʹÓÃjQueryÒªÁì´¦ÖÃHTMLÇ°£¬Ê¹ÓÃDOMPurifyµÄSAFE_FOR_JQUERYÑ¡Ïî½øÐÐÇåÀí¡£jQuery 3.5.0°æ±¾µÄÖ÷Òª±ä»¯ÊÇÄþ¾²ÐÞ¸´£¬ÆäÖÐjQuery.htmlPrefilterº¯Êý²»ÔÙʹÓÃÕýÔò±í´ïʽ£¬¶øÊÇͨ±¨Î´¸ü¸ÄµÄ×Ö·û´®¡£Ñо¿Ô±Masato Kinugawa³ÂËßÁËÕâһ©¶´¡£Æ¾¾ÝCISAµÄ²Ù×÷Ö¸ÁÁª°î»ú¹¹±ØÐëÔÚ2025Äê2ÔÂ13ÈÕÇ°ÐÞ¸´´Ë©¶´£¬ÒÔ±£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£Í¬Ê±£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÏà¹Ø©¶´¡£
https://securityaffairs.com/173388/uncategorized/u-s-cisa-adds-jquery-flaw-known-exploited-vulnerabilities-catalog.html
5. Abnormal Security½Ò¶£º×¨ÎªÍøÂç·¸×ï´òÔìµÄGhostGPT AIÁÄÌì»úÆ÷ÈËÐËÆð
1ÔÂ23ÈÕ£¬Abnormal SecurityÔÚ2024ÄêÄ©·¢ÏÖÁËÒ»¿îÃûΪGhostGPTµÄ¶ñÒâAIÁÄÌì»úÆ÷ÈË£¬×¨ÎªÍøÂç·¸×ïÉè¼Æ¡£Õâ¿î¹¤¾ß¿Éͨ¹ýTelegramµÈƽ̨ÇáËÉ»ñÈ¡£¬ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁËÇ°ËùδÓеÄÄÜÁ¦£¬°üÂÞÖÆ×÷ÅÓ´óµÄÍøÂçµöÓãµç×ÓÓʼþºÍ¿ª·¢¶ñÒâÈí¼þ¡£ÓëÊܵÀµÂºÍÄþ¾²´ëÊ©Ô¼ÊøµÄ´«Í³AIÄ£ÐͲîÒ죬GhostGPT²»ÊÜÕâЩÏÞÖÆ£¬Äܹ»ÒÔÇ°ËùδÓеÄËٶȺÍÇáËÉˮƽÉú³É¶ñÒâÄÚÈÝ¡£ËüºÜ¿ÉÄÜÊÇʹÓðü×°Æ÷Á¬½Óµ½ChatGPTµÄÔ½Óü°æ±¾»ò¿ªÔ´LLM£¬´Ó¶øÏû³ýÁ˵ÀµÂ±£ÕÏ¡£GhostGPT½µµÍÁËÍøÂç·¸×ïµÄÃż÷£¬Ê¹¾Ñé²»×ãµÄ¼ÓÈëÕßÒ²ÄÜÀûÓÃAI½øÐжñÒâ»î¶¯£¬²¢ÒÔ¸ü¸ßµÄЧÂÊÌᳫ¸üÅӴ󡢸ü¾ßÓ°ÏìÁ¦µÄ¹¥»÷¡£´ËÍ⣬Ëü»¹ÓÅÏÈ¿¼ÂÇÓû§ÄäÃûÐÔ£¬¶ÔÑ°ÇóÒþ²Ø·Ç·¨»î¶¯²¢Ìӱܼì²âµÄÍøÂç·¸×ï·Ö×ÓºÜÓÐÎüÒýÁ¦¡£Abnormal SecurityµÄÑо¿ÈËÔ±²âÊÔÁËGhostGPTµÄ¹¦Ð§£¬·¢ÏÖËüչʾÁËÆÛÆDZÔÚÊܺ¦ÕßµÄÄÜÁ¦¡£Ëæ×ÅÍøÂç·¸×ï·Ö×Ó¶ÔÈ˹¤ÖÇÄܵÄÐËȤÈÕÒæŨºñ£¬ÍøÂçÄþ¾²ÉçÇø±ØÐ벻ͣ´´ÐºÍÉú³¤Æä·ÀÓù´ëÊ©£¬²ÅÆø±£³ÖÁìÏÈְλ¡£
https://hackread.com/ghostgpt-malicious-ai-chatbot-fuel-cybercrime-scams/
6. J-magic¶ñÒâÈí¼þ£ºÕë¶ÔÕ°²©ÍøÂçÉ豸µÄ¡°Ä§°ü¡±¹¥»÷Ç÷ÊÆ·ÖÎö
1ÔÂ23ÈÕ£¬J-magicÊÇÒ»ÖÖÕë¶ÔÕ°²©ÍøÂç±ßÔµÉ豸µÄ¶ñÒâÈí¼þ£¬Ö÷Òª¹¥»÷°ëµ¼Ìå¡¢ÄÜÔ´¡¢ÖÆÔìÒµºÍITÁìÓòµÄ×éÖ¯¡£¸Ã¶ñÒâÈí¼þÊÇcd00rºóÃŵĶ¨ÖƱäÌ壬ͨ¹ý¼àÊÓTCPÁ÷Á¿Ñ°ÕÒ¾ßÓÐÌض¨ÌØÕ÷µÄ¡°Ä§ÊõÊý¾Ý°ü¡±À´Æô¶¯·´Ïòshell¡£¾ÝLumenÍþвÑо¿ºÍÔËÓª²¿ÃÅBlack Lotus LabsµÄÑо¿ÈËÔ±³Æ£¬J-magic»î¶¯ÔÚ2023ÄêÖÁ2024ÄêÆÚ¼ä»îÔ¾£¬Ö¼ÔÚʵÏֵͼì²â¶ÈºÍºã¾Ã·ÃÎÊ¡£Ô¼ÄªÒ»°ëµÄÄ¿±êÉ豸ÅäÖÃΪ×éÖ¯µÄVPNÍø¹Ø¡£J-magic»á¼ì²éÖÖÖÖ×ֶκÍÆ«ÒÆÁ¿£¬Èç¹ûÊý¾Ý°üÂú×ãÌض¨Ìõ¼þÖ®Ò»£¬¾Í»áÉú³É·´Ïòshell£¬µ«·¢ËÍÕßÐèÏȽâ¾öRSAÌôÕ½²ÅÆø·ÃÎÊÊÜѬȾÉ豸¡£¾¡¹ÜJ-magicÓëͬÑù»ùÓÚcd00rºóÃŵÄSeaSpy¶ñÒâÈí¼þÔÚ¼¼ÊõÉÏÏàËÆ£¬µ«´æÔÚһЩ²îÒ죬ʹµÃÄÑÒÔ½¨Á¢ÁªÏµ¡£Black Lotus LabsµÄÑо¿ÈËÔ±ÈÏΪ£¬J-magic¹¥»÷»î¶¯±íÃ÷£¬Õë¶ÔÆóÒµ¼¶Â·ÓÉÆ÷µÄ¶ñÒâÈí¼þʹÓÃÕý³ÉΪһÖÖÇ÷ÊÆ£¬ÒòΪ´ËÀàÉ豸ºÜÉÙ½øÐеçÔ´Ñ»·£¬¶ñÒâÈí¼þפÁôÔÚÄÚ´æÖУ¬ÇÒͨ³£È±·¦»ùÓÚÖ÷»úµÄ¼à¿Ø¹¤¾ß¡£
https://www.bleepingcomputer.com/news/security/stealthy-magic-packet-malware-targets-juniper-vpn-gateways/