½©Ê¬ÍøÂçSSHStalkerʹÓùŰåµÄIRC¾ÙÐÐC2ͨѶ

Ðû²¼Ê±¼ä 2026-02-11

1. ½©Ê¬ÍøÂçSSHStalkerʹÓùŰåµÄIRC¾ÙÐÐC2ͨѶ


2ÔÂ10ÈÕ £¬£¬£¬£¬£¬£¬ÍþвÇ鱨¹«Ë¾FlareÅû¶ÁËÒ»¸öÃûΪSSHStalkerµÄÐÂÐÍLinux½©Ê¬ÍøÂç £¬£¬£¬£¬£¬£¬Æäͨ¹ý¾­µäµÄ»¥ÁªÍøÖмÌ̸Ì죨IRC£©Ð­ÒéʵÏÖÏÂÁîÓë¿ØÖÆ£¨C2£©²Ù×÷¡£¡£¡£¡£¡£¹¥»÷Á÷³Ì·½Ãæ £¬£¬£¬£¬£¬£¬SSHStalkerͨ¹ýαװ³Énmap¿ªÔ´¹¤¾ßµÄGo¶þ½øÖÆÎļþÌᳫ×Ô¶¯SSHɨÃèÓ뱩Á¦ÆÆ½â £¬£¬£¬£¬£¬£¬ÊµÏÖ³õʼ»á¼ûºó £¬£¬£¬£¬£¬£¬Ê¹Óñ»ÈëÇÖÖ÷»úɨÃèÆäËûSSHÄ¿µÄ £¬£¬£¬£¬£¬£¬ÐγÉÈä³æÊ½Èö²¥¡£¡£¡£¡£¡£Ñ¬È¾Ö÷»úºó £¬£¬£¬£¬£¬£¬Ëü»áÏÂÔØGCC¹¤¾ßÁ´ÔÚÍâµØ±àÒëÓÐÓÃÔØºÉ £¬£¬£¬£¬£¬£¬ÌáÉý¿ÉÒÆÖ²ÐÔÓë¹æ±ÜÄÜÁ¦¡£¡£¡£¡£¡£Ê×ÅúÓÐÓÃÔØºÉΪº¬Ó²±àÂëC2ЧÀÍÆ÷ºÍƵµÀµÄCÓïÑÔIRC»úеÈË £¬£¬£¬£¬£¬£¬ÓÃÓÚ×¢²áÐÂÊܺ¦ÕßÖÁ½©Ê¬ÍøÂç»ù´¡ÉèÊ©¡£¡£¡£¡£¡£Ëæºó £¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»á»ñÈ¡°üÀ¨±àÅűäÖÖµÄGSºÍbootbou¹éµµÎļþ £¬£¬£¬£¬£¬£¬²¢Í¨¹ýÿ·ÖÖÓÔËÐеÄcron×÷ҵʵÏÖ³¤ÆÚ»¯¡£¡£¡£¡£¡£ÎªÌáÉýȨÏÞ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃ2009-2010ÄêLinuxÄں˵Ä16¸öCVEÎó²î £¬£¬£¬£¬£¬£¬ÔÚ±©Á¦ÆÆ½â»ñµÃµÄµÍȨÏÞÓû§»ù´¡ÉϽøÒ»²½ÌáȨ¡£¡£¡£¡£¡£Ó¯Àûģʽ°üÀ¨AWSÃÜÔ¿ÇÔÈ¡¡¢ÍøÕ¾É¨Ãè¼°´îÔØPhoenixMinerµÈ¼ÓÃÜÇ®±ÒÍڿ󹤾߰ü £¬£¬£¬£¬£¬£¬Ëä¾ß±¸DDoSÄÜÁ¦µ«ÉÐδÊӲ쵽ÏÖʵ¹¥»÷ £¬£¬£¬£¬£¬£¬ÍƲâ¿ÉÄÜ´¦ÓÚ²âÊÔ»ò¶Ú»ý»á¼û½×¶Î¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-linux-botnet-sshstalker-uses-old-school-irc-for-c2-comms/


2. ÎÖ¶ûÎÖ±±ÃÀ¿Í»§Êý¾ÝÒòConduent¹¥»÷й¶


2ÔÂ10ÈÕ £¬£¬£¬£¬£¬£¬ÎÖ¶ûÎÖ¼¯ÍŽüÆÚ½ÓÁ¬ÆØ³ö¶àÆðÓɵÚÈý·½Ð§ÀÍÉÌÒý·¢µÄÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬Òý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¡£¡£¾ÝÅû¶ £¬£¬£¬£¬£¬£¬ÎÖ¶ûÎÖ¼¯Íű±ÃÀ¹«Ë¾ÒòÃÀ¹úÉÌҵЧÀ;ÞÍ·ConduentµÄITϵͳÔâÈëÇÖ £¬£¬£¬£¬£¬£¬µ¼Ö½ü17,000Ãû¿Í»§¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶ £¬£¬£¬£¬£¬£¬Éæ¼°È«Ãû¡¢Éç±£ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¿µ½¡°ü¹ÜÏêÇéµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£Conduent×÷ΪӪҵÁ÷³ÌÍâ°üЧÀÍÉÌ £¬£¬£¬£¬£¬£¬ÔÚ2024Äê10ÔÂÖÁ2025Äê1ÔÂʱ´úÔâÓöÇå¾²Îó²î £¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£º­¸Ç¶íÀÕ¸ÔÖÝ1050ÍòÈË¡¢µÂ¿ËÈøË¹ÖÝ1550ÍòÈË £¬£¬£¬£¬£¬£¬ÏÖÔÚÊÜÓ°Ïì×ÜÈËÊýÉÐδÍêȫȷ¶¨¡£¡£¡£¡£¡£ÁíÒ»ÆðÊÂÎñÓÉITЧÀÍÉÌMilj?dataµÄϵͳÎó²îÒý·¢ £¬£¬£¬£¬£¬£¬2025Äê8ÔÂй¶150ÍòÌõÐÅÏ¢ £¬£¬£¬£¬£¬£¬Éæ¼°Èðµä¡¢ÃÀ¹úÎÖ¶ûÎÖ¼¯ÍÅÔ±¹¤ÐÕÃû¼°Éç±£ºÅÂë¡£¡£¡£¡£¡£Õë¶ÔConduentÊÂÎñ £¬£¬£¬£¬£¬£¬ÎÖ¶ûÎÖ¼¯Íű±ÃÀ¹«Ë¾ÒÑÆô¶¯Ó¦¶Ô²½·¥£ºÎªÊÜÓ°Ïì·½ÌṩÖÁÉÙÒ»ÄêµÄÃâ·ÑÉí·Ý¼à¿Ø¡¢ÐÅÓü°°µÍø¼à¿ØÐ§ÀÍ £¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§ÉèÖÃÐÅÓñ¨¸æÚ²Æ­¾¯±¨»òÇå¾²¶³½á¡£¡£¡£¡£¡£¶øMilj?dataÊÂÎñµÄÏêϸӦ¶Ô²½·¥ÉÐδ¹ûÕæÅû¶¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/


3. ¿çƽ̨ÉÌÒµÌØ¹¤Èí¼þZeroDayRATÍþвСÎÒ˽¼ÒÓë×éÖ¯Çå¾²


2ÔÂ10ÈÕ £¬£¬£¬£¬£¬£¬Çå¾²»ú¹¹iVerifyÅû¶һ¿îÃûΪZeroDayRATµÄÐÂÐÍÉÌÒµÒÆ¶¯Ìع¤Èí¼þ¹¤¾ß°ü £¬£¬£¬£¬£¬£¬Æä¹¦Ð§Ö®ÖÜÈ«¡¢ÐÔÄÜ֮ǿʢ¿°±È¹ú¼Ò¼¶¿ª·¢¹¤¾ß £¬£¬£¬£¬£¬£¬ÇÒÒÑÔÚTelegramƽ̨¹ûÕæÏúÊÛ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ§³Ö°²×¿ÓëiOS˫ƽ̨ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÍêÈ«¿ØÖÆÊÜѬȾװ±¸ £¬£¬£¬£¬£¬£¬ÊµÏÖʵʱÉãÏñÍ·»á¼û¡¢¼üÅ̼ͼ¡¢GPS¶¨Î»×·×Ù¼°½ðÈÚÊý¾ÝÇÔÈ¡µÈ½¹µã¹¦Ð§¡£¡£¡£¡£¡£ZeroDayRATͨ¹ý¶ÌÐÅ/Óʼþ´¹ÂÚ¡¢ÐéαӦÓûò¼´Ê±Í¨Ñ¶Æ½Ì¨·ÖÏíµÄ¶ñÒâÁ´½ÓÈö²¥ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐè×ÔÐдЧÀÍÆ÷²¢ÌìÉú¶ñÒâÓ¦ÓÃѬȾÊܺ¦Õß¡£¡£¡£¡£¡£ÆäÅäÌ׿ØÖÆÃæ°åÌṩװ±¸È«Î¬¶È¸ÅÀÀ £¬£¬£¬£¬£¬£¬°üÀ¨ÊÖ»úÐͺš¢²Ù×÷ϵͳ¡¢µç³Ø×´Ì¬¡¢SIM¿¨ÐÅÏ¢¡¢Ó¦ÓÃʹÓüͼ¡¢¶ÌÐÅÔ¤ÀÀ¼°½üÆÚ»î¶¯¹ì¼£ £¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܾ«×¼ÆÊÎöÓû§Ï°¹ßÓëÉç½»¹ØÏµ¡£¡£¡£¡£¡£ÊµÊ±¼à¿ØÄ£¿£¿£¿£¿éÖ§³ÖǰÖÃ/ºóÖÃÉãÏñÍ·»­ÃæÖ±²¥¡¢ÆÁÄ»Â¼ÖÆ¡¢Âó¿Ë·ç¼àÌý¼°GPSÀúÊ·¹ì¼£×·×Ù £¬£¬£¬£¬£¬£¬Á¬ÏµÕË»§Ñ¡ÏÁгöµÄGoogle¡¢WhatsApp¡¢InstagramµÈƽ̨ע²áÕ˺Š£¬£¬£¬£¬£¬£¬¿ÉÌᳫÕë¶ÔÐÔÉç½»¹¤³Ì¹¥»÷»òÕË»§µÁÓᣡ£¡£¡£¡£½ðÈÚ͵ÇÔÄ£¿£¿£¿£¿é·ÖΪ¼ÓÃÜÇ®±ÒÓëÒøÐÐÁ½´ó·ÖÖ§£ºÇ°ÕßɨÃè×°±¸Ç®°üÓ¦ÓüͼID¡¢Óà¶î £¬£¬£¬£¬£¬£¬²¢Ð®ÖƼôÌù°åÌæ»»Ç®°üµØµã£»£» £»ºóÕßÕë¶ÔÒÆ¶¯ÒøÐС¢UPIЧÀͼ°PayPalµÈÖ§¸¶Æ½Ì¨ £¬£¬£¬£¬£¬£¬Í¨¹ýÁýÕÖ²ãÇÔÈ¡µÇ¼ƾ֤¡£¡£¡£¡£¡£


https://securityaffairs.com/187820/malware/zerodayrat-spyware-grants-attackers-total-access-to-mobile-devices.html


4. ð³ä7-ZipÍøÕ¾É¢²¼Ä¾Âí¹¹½¨×¡Õ¬ÊðÀíÍøÂç


2ÔÂ10ÈÕ £¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾MalwarebytesÅû¶һÆðʹÓÃð³ä7-ZipÍøÕ¾É¢²¼Ä¾Âí×°ÖóÌÐòµÄ¹¥»÷»î¶¯ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ½«Óû§ÅÌËã»úת»¯Îª×¡Õ¬ÊðÀí½Úµã £¬£¬£¬£¬£¬£¬ÓÃÓÚÖ´ÐÐÆ¾Ö¤Ìî³ä¡¢ÍøÂç´¹ÂÚ¡¢¶ñÒâÈí¼þÈö²¥µÈ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¹¥»÷Õß×¢²áÓòÃû7zip[.]com £¬£¬£¬£¬£¬£¬Í¨¹ý¸´ÖÆÕýµ±7-ZipÍøÕ¾µÄ½á¹¹¼°Îı¾ £¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâ×°ÖóÌÐò £¬£¬£¬£¬£¬£¬ÕâÒ»Îó²îÒòÓû§Í¨¹ýYouTubeµçÄÔ×é×°½Ì³ÌÖ¸µ¼ÖÁ¸ÃÍøÕ¾¶ø¹ãΪÈËÖª¡£¡£¡£¡£¡£¶ñÒâ×°ÖóÌÐòʹÓÃÒѵõÏúµÄJozeal Network Technology Co., LimitedÖ¤ÊéÊðÃû £¬£¬£¬£¬£¬£¬Ëä°üÀ¨7-ZipͨÀý¹¦Ð§ £¬£¬£¬£¬£¬£¬µ«»áÊÍ·ÅÈý¸ö¶ñÒâÎļþ£ºUphero.exe¡¢hero.exe¡¢hero.dll¡£¡£¡£¡£¡£ÕâЩÎļþ´æ·ÅÓÚ¡°C:\Windows\SysWOW64\hero\¡± £¬£¬£¬£¬£¬£¬²¢½¨ÉèÒÔSYSTEMÉí·ÝÔËÐеÄ×Ô¶¯Æô¶¯WindowsЧÀÍ £¬£¬£¬£¬£¬£¬Í¬Ê±Ð޸ķÀ»ðǽ¹æÔòÔÊÐíÈëÕ¾/³öÕ¾ÅþÁ¬¡£¡£¡£¡£¡£Í¨¹ý΢ÈíWMI¼°Windows API £¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þÍøÂçÖ÷»úÓ²¼þ¡¢ÄÚ´æ¡¢CPU¡¢´ÅÅÌ¡¢ÍøÂçÌØÕ÷ £¬£¬£¬£¬£¬£¬Êý¾Ý·¢ËÍÖÁiplogger[.]org¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-7-zip-site-distributes-installer-laced-with-proxy-tool/


5. ³¯ÏÊUNC1069ºÚ¿ÍAIÊÓÆµÓë¶à¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÇ®±Ò


2ÔÂ10ÈÕ £¬£¬£¬£¬£¬£¬¹È¸èMandiantÑо¿ÍŶӿËÈÕÅû¶ £¬£¬£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯UNC1069×Ô2018ÄêÆðÒ»Á¬½ø»¯ £¬£¬£¬£¬£¬£¬×Ô2023ÄêÆð½«Ä¿µÄתÏòWeb3¼°¼ÓÃÜÇ®±ÒÐÐÒµ £¬£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúÊÓÆµÓëClickFixÊÖÒÕÌᳫ¶¨ÖÆ»¯¹¥»÷ £¬£¬£¬£¬£¬£¬Ïò½ðÈڿƼ¼¹«Ë¾Í¶·ÅmacOS¼°Windows¶ñÒâÈí¼þÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò²¢Íƶ¯Éç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔÉç»á¹¤³ÌѧΪ½¹µã£ººÚ¿Íͨ¹ýTelegramµÁÓüÓÃÜÇ®±Ò¹«Ë¾¸ß¹ÜÕË»§ÁªÏµÊܺ¦Õß £¬£¬£¬£¬£¬£¬½¨ÉèÐÅÈκó·ÖÏíαװ³ÉCalendlyÁ´½ÓµÄαÔìZoom¾Û»áÒ³Ãæ¡£¡£¡£¡£¡£ÔÚ¡°¾Û»á¡±ÖÐ £¬£¬£¬£¬£¬£¬ºÚ¿Í²¥·ÅÁíÒ»¼ÓÃܹ«Ë¾CEOµÄÉî¶ÈαÔìÊÓÆµ £¬£¬£¬£¬£¬£¬»Ñ³ÆÊܺ¦ÕßÔâÓöÒôƵÎÊÌâ £¬£¬£¬£¬£¬£¬ÓÕµ¼ÆäÖ´ÐÐÍøÒ³ÏÂÁîÆô¶¯Ñ¬È¾Á´¡£¡£¡£¡£¡£HuntressÑо¿Ö°Ô±2025ÄêÖÐÆÚ¼Í¼µÄÀàËÆÊÖ·¨ÏÔʾ £¬£¬£¬£¬£¬£¬´ËÀ๥»÷Óɳ¯ÏÊBlueNoroff£¨ÓÖÃûSapphire Sleet/TA44£©ÊµÑé £¬£¬£¬£¬£¬£¬Õë¶ÔmacOSϵͳʹÓòî±ðÔØºÉ¡£¡£¡£¡£¡£Ñ¬È¾Á´Æô¶¯ºó £¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýAppleScriptÖ´ÐжñÒâMach-O¶þ½øÖÆÎļþ £¬£¬£¬£¬£¬£¬°²ÅůߏömacOS¶ñÒâÈí¼þ¼Ò×壺WAVESHAPER¡¢HYPERCALL¡¢HIDDENCALL¡¢SILENCELIFT¡¢DEEPBREATH¡¢SUGARLOADER¼°CHROMEPUSH¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/


6. Claude Opus 4.6 Ö÷Á÷¿ªÔ´¿â·¢Ã÷500+¸ßΣÎó²î


2ÔÂ6ÈÕ £¬£¬£¬£¬£¬£¬È˹¤ÖÇÄܹ«Ë¾Anthropic¿ËÈÕÐû²¼Æä×îдóÓïÑÔÄ£×ÓClaude Opus 4.6 £¬£¬£¬£¬£¬£¬¸ÃÄ£×ÓÔÚ´úÂëÉó²éÓëµ÷ÊÔÄÜÁ¦ÉÏʵÏÖÏÔÖøÉý¼¶ £¬£¬£¬£¬£¬£¬²¢ÔÚ½ðÈÚÆÊÎö¡¢Ñо¿¡¢ÎĵµÌìÉúµÈʹÃüÖÐÌåÏÖÓÅ»¯¡£¡£¡£¡£¡£ÓÈΪÖ÷ÒªµÄÊÇ £¬£¬£¬£¬£¬£¬Opus 4.6ÔÚÎÞÐèרÓù¤¾ß¡¢×Ô½ç˵¿ò¼Ü»òÌØ¶¨ÌáÐѴʵÄÇéÐÎÏ £¬£¬£¬£¬£¬£¬×ÔÖ÷·¢Ã÷ÁËGhostscript¡¢OpenSC¡¢CGIFµÈ¿ªÔ´¿âÖÐ500Óà¸ö´Ëǰδ֪µÄ¸ßΣÇå¾²Îó²î £¬£¬£¬£¬£¬£¬ÏÖÔÚÒѱ»ÓÃÓÚ¿ªÔ´Èí¼þÎó²îµÄ·¢Ã÷ÓëÐÞ¸´¸¨ÖúÊÂÇé¡£¡£¡£¡£¡£AnthropicÇ¿µ÷ £¬£¬£¬£¬£¬£¬Opus 4.6¾ß±¸ÀàËÆÈËÀàÑо¿Ô±µÄ´úÂëÍÆÀíÄÜÁ¦ £¬£¬£¬£¬£¬£¬Í¨Ì«¹ýÎö¹ýÍùÐÞ¸´¼Í¼ʶ±ðͬÀàδ½â¾öÎó²î £¬£¬£¬£¬£¬£¬¶¨Î»Ò×Òý·¢ÎÊÌâµÄ´úÂëģʽ £¬£¬£¬£¬£¬£¬²¢ÉîÈëÃ÷È·³ÌÐòÂß¼­ÒÔ¾«×¼ÅжÏÒì³£ÊäÈë´¥·¢Ìõ¼þ¡£¡£¡£¡£¡£ÔÚÕýʽÐû²¼Ç° £¬£¬£¬£¬£¬£¬¸ÃÄ£×Ó¾­Ç°Ñغì¶ÓÔÚÐéÄ⻯ÇéÐÎÖвâÊÔ £¬£¬£¬£¬£¬£¬Å䱸µ÷ÊÔÆ÷¡¢Ä£ºý²âÊÔÆ÷µÈ¹¤¾ß £¬£¬£¬£¬£¬£¬È«³ÌδÌṩ¹¤¾ßʹÓÃÖ¸µ¼»òÌØÊâÎó²îʶ±ðÐÅÏ¢ £¬£¬£¬£¬£¬£¬ÑéÖ¤ÁËÆä¿ªÏä¼´ÓõÄÎó²î·¢Ã÷ÄÜÁ¦¡£¡£¡£¡£¡£


https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html