Win 11×îв¹¶¡µ¼ÖÂMalwarebytesÓëChrome²»¼æÈÝ
Ðû²¼Ê±¼ä 2023-06-16¾ÝýÌå6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬±¾ÖܶþÐû²¼µÄWindows 11 22H2 KB5027231ÀÛ»ý¸üÐÂÓ°ÏìÁËMalwarebytes¿Í»§ÏµÍ³ÉϵÄGoogle Chrome¡£¡£¡£¡£¡£Ò»Î»ÖÎÀíԱ˵£¬£¬£¬£¬£¬£¬×°ÖøüкóChromeä¯ÀÀÆ÷·ºÆðÎÊÌ⣬£¬£¬£¬£¬£¬ÊÔͼͨ¹ýWSUS»Ø¹ö£¬£¬£¬£¬£¬£¬ÊÂÎñÉó²éÆ÷ÖÐÏÔʾ¡°catastrophic error¡±£¬£¬£¬£¬£¬£¬²¢ÇÒWSUSÏÔʾ²»¿É»Ø¹ö¡£¡£¡£¡£¡£ChromeÀú³ÌÏÖʵÉÏÕýÔÚÔËÐУ¬£¬£¬£¬£¬£¬µ«ÓÉÓÚ³åÍ»¶øÎÞ·¨ÍêÈ«Æô¶¯Ó¦ÓóÌÐòºÍ¼ÓÔØÓû§½çÃæ¡£¡£¡£¡£¡£MalwarebytesÌåÏÖ£¬£¬£¬£¬£¬£¬Win 11¸üе¼ÖÂChromeÓëÎó²îʹÓñ£»£»£»£»£»¤±¬·¢³åÍ»£¬£¬£¬£¬£¬£¬½ø¶øµ¼ÖÂä¯ÀÀÆ÷Í߽⡣¡£¡£¡£¡£Óöµ½´ËÎÊÌâµÄÓû§¿ÉÒÔ´ÓÆäMalwarebytesÊܱ£»£»£»£»£»¤Ó¦ÓóÌÐòÁбíÖйرÕÍøÂçä¯ÀÀÆ÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5027231-update-breaks-google-chrome-for-malwarebytes-users/
2¡¢ÃÀ¹ú¶à¸öÕþ¸®»ú¹¹Ôâµ½ÀÕË÷ÍÅ»ïClopµÄ¹¥»÷
¾Ý6ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¶à¸öÕþ¸®»ú¹¹Ôâµ½ÁËÀÕË÷ÍÅ»ïClopµÄ¹¥»÷¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËMOVEitÎļþ´«Ê乤¾ßÖеÄÎó²î£¬£¬£¬£¬£¬£¬CISA³ÆÆäÕýÔÚºÍFBIÆð¾¢ÎªÊ¹ÓÃMOVEitµÄÁª°î»ú¹¹Ìṩ×ÊÖú£¬£¬£¬£¬£¬£¬È·ÈϹ¥»÷µÄÓ°Ï첢ʵʱµ÷½â¡£¡£¡£¡£¡£¹Ù·½¾Ü¾øÍ¸Â¶ÊÜÓ°ÏìµÄ»ú¹¹µÄÃû³ÆºÍÊýÄ¿£¬£¬£¬£¬£¬£¬µ«Ò»Î»ÄÜÔ´²¿½²»°ÈË͸¶£¬£¬£¬£¬£¬£¬¸Ã²¿·ÖÊÇÔâµ½ÈëÇֵĶà¸öÁª°î»ú¹¹Ö®Ò»¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ó¢¹úʯÓͺÍ×ÔÈ»Æø¹«Ë¾¿ÇÅÆÔÚ±¾ÖÜËÄ͸¶ÆäÒ²Ôâµ½ÁËClopÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾È¥ÄêµÄÊÕÈëÁè¼Ý3810ÒÚÃÀÔª¡£¡£¡£¡£¡£
https://therecord.media/several-us-federal-agencies-affected-by-moveit-breach
3¡¢HP¹ûÕæÍ¨¹ý¶ñÒâÍøÕ¾·Ö·¢ChromeÀ©Õ¹ShampooµÄ»î¶¯
6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬HP¹ûÕæÁËÒ»¸öÕýÔÚ¾ÙÐÐÖеÄÐÂChromeLoader»î¶¯¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¼ÓÚ3Ô£¬£¬£¬£¬£¬£¬Í¨¹ýÉù³Æ¿ÉÃâ·ÑÏÂÔØµÁ°æÒôÀÖ¡¢Ó°Ï·»òÓÎÏ·µÄ¶ñÒâÍøÕ¾·Ö·¢ChromeLoader¡£¡£¡£¡£¡£ÓÕʹĿµÄÏÂÔØÖ´ÐÐPowerShell¾ç±¾µÄVBScript£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾ÉèÖÃÒÔ¡°chrome_¡±ÎªÇ°×ºµÄÍýÏëʹÃü¡£¡£¡£¡£¡£´ËʹÃü»á´¥·¢Ò»ÏµÁо籾£¬£¬£¬£¬£¬£¬½«ÐµÄPowerShell¾ç±¾ÏÂÔØ²¢ÉúÑĵ½×¢²á±íÖУ¬£¬£¬£¬£¬£¬Í¬Ê±»á»ñÈ¡¶ñÒâChromeÀ©Õ¹Shampoo¡£¡£¡£¡£¡£ShampooÊÇChromeLoaderµÄ±äÌ壬£¬£¬£¬£¬£¬Äܹ»ÔÚÄ¿µÄ»á¼ûµÄÍøÕ¾ÉÏ×¢Èë¹ã¸æ²¢Ö´ÐÐËÑË÷ÅÌÎÊÖØ¶¨Ïò¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites/
4¡¢Trellix³ÆÐÂÇÔÈ¡³ÌÐòSkuldÕë¶ÔÎ÷Å·ºÍ¶«ÄÏÑǵȵØ
TrellixÔÚ6ÔÂ13ÈÕ³ÆÆä·¢Ã÷ÁËÐÂÐÍGolangÇÔÈ¡³ÌÐòSkuld£¬£¬£¬£¬£¬£¬ÒÑÈëÇÖÅ·ÖÞ¡¢¶«ÄÏÑǺÍÃÀ¹úµÄWindowsϵͳ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô4ÔÂÏÂÑ®×îÏȱ¬·¢£¬£¬£¬£¬£¬£¬»áËÑË÷´æ´¢ÔÚDiscordºÍä¯ÀÀÆ÷µÈÓ¦ÓÃÖеÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÒÔ¼°ÏµÍ³µÄÐÅÏ¢ºÍÎļþ¼ÐÖеÄÎļþ¡£¡£¡£¡£¡£²¿·ÖÑù±¾ÉõÖÁ°üÀ¨ÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÄ£¿£¿£¿é£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ¸ÃÄ£¿£¿£¿éÈÔÔÚ¿ª·¢ÖС£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±Deathined´Ó¶à¸ö¿ªÔ´ÏîÄ¿ºÍ¶ñÒâÈí¼þÑù±¾ÖÐÂÞÖÂÁé¸Ð£¬£¬£¬£¬£¬£¬½«¹¦Ð§ÒÆÖ²µ½GolangÀ´¹¹½¨Skuld¡£¡£¡£¡£¡£
https://www.trellix.com/en-us/about/newsroom/stories/research/skuld-the-infostealer-that-speaks-golang.html
5¡¢Î¢ÈíÐû²¼¹ØÓÚºÚ¿ÍÍÅ»ïCadet BlizzardµÄÆÊÎö±¨¸æ
6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïCadet BlizzardµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¾ÝÐÅ£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÓÚ2020Äê×îÏÈÔËÓª£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹GRUÓйأ¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÎÚ¿ËÀ¼µÄÕþ¸®Ð§ÀÍ¡¢Ö´·¨»ú¹¹¡¢·ÇÓªÀû/·ÇÕþ¸®×éÖ¯¡¢ITЧÀÍÌṩÉÌ/×Éѯ¹«Ë¾ºÍ½ôÆÈЧÀÍ¡£¡£¡£¡£¡£²¢½«ÆäÓë2022Äê1ÔÂ13ÈÕÕë¶ÔÎÚ¿ËÀ¼µÄWhisperGate¹¥»÷ÁªÆðÀ´¡£¡£¡£¡£¡£¸ÃÍÅ»ïÔÚ2022Äê6ÔÂÖ®ºóÖð½¥µ³öÈËÃǵÄÊÓÏߣ¬£¬£¬£¬£¬£¬µ«ÔÚ2023ÄêÍ·ÖØÐ¸¡³öË®Ãæ¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬ÓëAPT28ºÍSandwormµÈÆäËüGRUÏà¹ØºÚ¿ÍÍÅ»ïÏà±È£¬£¬£¬£¬£¬£¬Cadet Blizzard¹¥»÷µÄÀÖ³ÉÂÊÏà¶Ô½ÏµÍ¡£¡£¡£¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/06/14/cadet-blizzard-emerges-as-a-novel-and-distinct-russian-threat-actor/
6¡¢StairwellÅû¶ChamelGangÖ²Èë³ÌÐòChamelDoHµÄϸ½Ú
6ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬StairwellÅû¶ºÚ¿ÍÍÅ»ïChamelGangµÄÐÂÖ²Èë³ÌÐòChamelDoHµÄϸ½Ú¡£¡£¡£¡£¡£ÕâÊÇÒ»ÖÖÓÃC++¿ª·¢µÄLinuxÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬ÓÃÓÚÔ¶³Ì»á¼ûÄ¿µÄϵͳ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýDNS-over-HTTPS (DoH)ËíµÀÓëÉèÖõÄC2»ù´¡ÉèʩͨѶ¡£¡£¡£¡£¡£ËùÓжñÒâÈí¼þµÄͨѶ¶¼Ê¹ÓÃAES128ºÍÐ޸ĺóµÄbase64±àÂë¼ÓÃÜ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨·Ç×ÖĸÊý×Ö×Ö·ûµÄÌæ»»¡£¡£¡£¡£¡£¸ÃÖ²Èë³ÌÐòÍøÂçϵͳµÄÐÅÏ¢À´ÆÊÎö±»Ñ¬È¾µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬²¢Äܹ»¾ÙÐлù±¾µÄÔ¶³Ì»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬ÀýÈçÎļþÉÏ´«¡¢ÏÂÔØ¡¢É¾³ýºÍÖ´ÐС£¡£¡£¡£¡£
https://stairwell.com/news/chamelgang-and-chameldoh-a-dns-over-https-implant/


¾©¹«Íø°²±¸11010802024551ºÅ