½©Ê¬ÍøÂçSSHStalkerʹÓô«Í³µÄIRC½øÐÐC2ͨѶ

°ä²¼¹¦·ò 2026-02-11

1. ½©Ê¬ÍøÂçSSHStalkerʹÓô«Í³µÄIRC½øÐÐC2ͨѶ


2ÔÂ10ÈÕ£¬Íþвµý±¨¹«Ë¾FlareÅû¶ÁËÒ»¸öÃûΪSSHStalkerµÄÐÂÐÍLinux½©Ê¬ÍøÂ磬Æäͨ¹ý¾­µäµÄ»¥ÁªÍøÖмÌ̸Ì죨IRC£©ºÍ̸ʵÏÖºÅÁîÓë½ÚÔ죨C2£©²Ù×÷¡£¹¥»÷Á÷³Ì·½Ã棬SSHStalkerͨ¹ý¼Ù×°³Énmap¿ªÔ´¹¤¾ßµÄGo¶þ½øÔìÎļþÌáÒé×Ô¶¯SSHɨÃèÓ뱩Á¦ÆÆ½â£¬ÊµÏÖ³õʼ½Ó¼ûºó£¬ÀûÓñ»ÈëÇÖÖ÷»úɨÃèÆäËûSSHÖ¸±ê£¬ÐγÉÈä³æÊ½´«²¼¡£Ï°È¾Ö÷»úºó£¬Ëü»áÏÂÔØGCC¹¤¾ßÁ´ÔÚ±¾µØ±àÒëÓÐÐ§ÔØºÉ£¬ÌáÉý¿ÉÒÆÖ²ÐÔÓë¶ã±ÜÄÜÁ¦¡£Ê×ÅúÓÐÐ§ÔØºÉΪº¬Ó²±àÂëC2·þÎñÆ÷ºÍƵ·µÄC˵»°IRC»úеÈË£¬ÓÃÓÚ×¢²áÐÂÊܺ¦ÕßÖÁ½©Ê¬ÍøÂç»ù´¡ÉèÊ©¡£Ëæºó£¬¶ñÒâÈí¼þ»á»ñÈ¡Ô̺¬±àÅűäÖÖµÄGSºÍbootbou¹éµµÎļþ£¬²¢Í¨¹ýÿ·ÖÖÓÔËÐеÄcron×÷ҵʵÏÖÓÆ¾Ã»¯¡£ÎªÌáÉýȨÏÞ£¬¹¥»÷ÕßÀûÓÃ2009-2010ÄêLinuxÄں˵Ä16¸öCVE·ì϶£¬ÔÚ±©Á¦ÆÆ½â»ñµÃµÄµÍȨÏÞÓû§»ù´¡ÉϽøÒ»²½ÌáȨ¡£Ó¯ÀûģʽÔ̺¬AWSÃÜÔ¿ÇÔÈ¡¡¢ÍøÕ¾É¨Ãè¼°´îÔØPhoenixMinerµÈ¼ÓÃÜÇ®±ÒÍڿ󹤾߰ü£¬Ëä¾ß±¸DDoSÄÜÁ¦µ«ÉÐδ¹Û²ìµ½ÏÖʵ¹¥»÷£¬´§Ä¦¿ÉÄÜ´¦ÓÚ²âÊÔ»ò¶Ú»ý½Ó¼û½×¶Î¡£


https://www.bleepingcomputer.com/news/security/new-linux-botnet-sshstalker-uses-old-school-irc-for-c2-comms/


2. ÎÖ¶ûÎÖ±±ÃÀ¿Í»§Êý¾ÝÒòConduent¹¥»÷й¶


2ÔÂ10ÈÕ£¬ÎÖ¶ûÎÖ¼¯ÍŽüÆÚ½ÓÁ¬ÆØ³ö¶àÆðÓɵÚÈý·½·þÎñÉÌÒý·¢µÄÊý¾Ýй¶ÊÂÎñ£¬Òý¿¯ÐÐÒµ¹Ø×¢¡£¾ÝÅû¶£¬ÎÖ¶ûÎÖ¼¯Íű±ÃÀ¹«Ë¾ÒòÃÀ¹úóÒ×·þÎñ¾ÞÍ·ConduentµÄITϵͳÔâÈëÇÖ£¬µ¼Ö½ü17,000Ãû¿Í»§¼°Ô±¹¤Ó×ÎÒÐÅϢй¶£¬Éæ¼°È«Ãû¡¢Éç±£ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢½¡È«±£ÏÕÏêÇéµÈÃô¸ÐÊý¾Ý¡£Conduent×÷ΪҵÎñÁ÷³Ì±í°ü·þÎñÉÌ£¬ÔÚ2024Äê10ÔÂÖÁ2025Äê1ÔÂÆÚ¼äÔâ·ê°²È«·ì϶£¬Ó°ÏìÁìÓòº­¸Ç¶íÀÕ¸ÔÖÝ1050ÍòÈË¡¢µÂ¿ËÈøË¹ÖÝ1550ÍòÈË£¬Ä¿Ç°ÊÜÓ°Ïì×ÜÈËÊýÉÐδÆëȫȷ¶¨¡£Áíһ·ÊÂÎñÓÉIT·þÎñÉÌMilj?dataµÄϵͳ·ì϶Òý·¢£¬2025Äê8ÔÂй¶150ÍòÌõÐÅÏ¢£¬Éæ¼°Èðµä¡¢ÃÀ¹úÎÖ¶ûÎÖ¼¯ÍÅÔ±¹¤ÐÕÃû¼°Éç±£ºÅÂë¡£Õë¶ÔConduentÊÂÎñ£¬ÎÖ¶ûÎÖ¼¯Íű±ÃÀ¹«Ë¾ÒÑÆô¶¯Ó¦¶Ô´ëÊ©£ºÎªÊÜÓ°Ïì·½ÌṩÖÁÉÙÒ»ÄêµÄÃâ·ÑÉí·Ý¼à¿Ø¡¢ÐÅÓþ¼°°µÍø¼à¿Ø·þÎñ£¬²¢½¨ÒéÓû§ÉèÏàÐÅÓþ»ã±¨Ú²Æ­¾¯±¨»ò°²È«¶³½á¡£¶øMilj?dataÊÂÎñµÄ¾ßÌåÓ¦¶Ô´ëÊ©ÉÐδ¹«¿ªÅû¶¡£


https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/


3. ¿çƽ̨óÒ×¼äµýÈí¼þZeroDayRATÍþвÓ×ÎÒÓë×éÖ¯°²È«


2ÔÂ10ÈÕ£¬°²È«»ú¹¹iVerifyÅû¶һ¿îÃûΪZeroDayRATµÄÐÂÐÍóÒ×ÒÆ¶¯¼äµýÈí¼þ¹¤¾ß°ü£¬ÆäÖ°ÄÜÖ®È«Ãæ¡¢»úÄÜ֮׳´ó¿°±È¹ú¶È¼¶¿ª·¢¹¤¾ß£¬ÇÒÒÑÔÚTelegramƽ̨¹«¿ªÏúÊÛ¡£¸Ã¶ñÒâÈí¼þÖ§³Ö°²×¿ÓëiOS˫ƽ̨£¬¹¥»÷Õß¿ÉÆëÈ«½ÚÔìÊÜϰȾÉ豸£¬ÊµÏÖʵʱÉãÏñÍ·½Ó¼û¡¢¼üÅ̼ͼ¡¢GPS¶¨Î»×·×Ù¼°½ðÈÚÊý¾ÝÇÔÈ¡µÈÖ÷ÌâÖ°ÄÜ¡£ZeroDayRATͨ¹ý¶ÌÐÅ/Óʼþ´¹µö¡¢ÐéαÀûÓûò¼´Ê±Í¨Ñ¶Æ½Ì¨·ÖÏíµÄ¶ñÒâÁ´½Ó´«²¼£¬¹¥»÷ÕßÐè×ÔÐд·þÎñÆ÷²¢ÌìÉú¶ñÒâÀûÓÃϰȾÊܺ¦Õß¡£ÆäÅäÌ×½ÚÔìÃæ°åÌṩÉ豸ȫά¶È¸ÅÀÀ£¬Ô̺¬ÊÖ»úÐͺš¢²Ù×÷ϵͳ¡¢µç³Ø×´Ì¬¡¢SIM¿¨ÐÅÏ¢¡¢ÀûÓÃʹÓüͼ¡¢¶ÌÐÅÔ¤ÀÀ¼°½üÆÚ»î¶¯¹ì¼££¬Ê¹¹¥»÷ÕßÄܾ«×¼·ÖÎöÓû§Ï°¹ßÓëÉç½»¹ØÏµ¡£ÊµÊ±¼à¿ØÄ£¿éÖ§³ÖǰÖÃ/ºóÖÃÉãÏñÍ·»­ÃæÖ±²¥¡¢ÆÁϼÔì¡¢Âó¿Ë·ç¼àÌý¼°GPSº¹Çà¹ì¼£×·×Ù£¬½áºÏÕË»§Ñ¡ÏÁгöµÄGoogle¡¢WhatsApp¡¢InstagramµÈƽ̨ע²áÕ˺Å£¬¿ÉÌáÒéÕë¶ÔÐÔÉç½»¹¤³Ì¹¥»÷»òÕË»§µÁÓ᣽ðÈÚ͵ÇÔÄ£¿é·ÖΪ¼ÓÃÜÇ®±ÒÓëÒøÐÐÁ½´ó·ÖÖ§£ºÇ°ÕßɨÃèÉ豸Ǯ°üÀûÓüͼID¡¢Óà¶î£¬²¢½Ù³Ö¼ôÌù°å´úÌæÇ®°üµØÖ·£»ºóÕßÕë¶ÔÒÆ¶¯ÒøÐÓ×¢UPI·þÎñ¼°PayPalµÈÖ§¸¶Æ½Ì¨£¬Í¨¹ý¸²¸Ç²ãÇÔÈ¡µÇ¼ƾ֤¡£


https://securityaffairs.com/187820/malware/zerodayrat-spyware-grants-attackers-total-access-to-mobile-devices.html


4. ¼Ùð7-ZipÍøÕ¾É¢²¼Ä¾Âí¹¹½¨×¡Õ¬´úÀíÍøÂç


2ÔÂ10ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾MalwarebytesÅû¶һ·ÀûÓüÙð7-ZipÍøÕ¾É¢²¼Ä¾Âí×°Ö÷¨Ê½µÄ¹¥»÷»î¶¯£¬¸Ã¶ñÒâÈí¼þ½«Óû§ÍÆËã»úת»¯Îª×¡Õ¬´úÀí½Úµã£¬ÓÃÓÚÖ´ÐÐÆ¾Ö¤Ìî³ä¡¢ÍøÂç´¹µö¡¢¶ñÒâÈí¼þ´«²¼µÈ¶ñÒâ»î¶¯¡£¹¥»÷Õß×¢²áÓòÃû7zip[.]com£¬Í¨¹ý¸´ÔìºÏ·¨7-ZipÍøÕ¾µÄ½á¹¹¼°Îı¾£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâ×°Ö÷¨Ê½£¬ÕâÒ»·ì϶ÒòÓû§Í¨¹ýYouTubeµçÄÔ×é×°½Ì³ÌÊèµ¼ÖÁ¸ÃÍøÕ¾¶ø¹ãΪÈËÖª¡£¶ñÒâ×°Ö÷¨Ê½Ê¹ÓÃÒѳ·³ýµÄJozeal Network Technology Co., LimitedÖ¤ÊéÊðÃû£¬ËäÔ̺¬7-ZipͨÀýÖ°ÄÜ£¬µ«»á¿ªÊÍÈý¸ö¶ñÒâÎļþ£ºUphero.exe¡¢hero.exe¡¢hero.dll¡£ÕâЩÎļþ´æ·ÅÓÚ¡°C:\Windows\SysWOW64\hero\¡±£¬²¢´´½¨ÒÔSYSTEMÉí·ÝÔËÐеÄ×Ô¶¯Æô¶¯Windows·þÎñ£¬Í¬Ê±Åú¸Ä·À»ðǽ¹æ¶¨ÔÊÐíÈëÕ¾/³öÕ¾ÏνÓ¡£Í¨¹ý΢ÈíWMI¼°Windows API£¬¶ñÒâÈí¼þÍøÂçÖ÷»úÓ²¼þ¡¢ÄÚ´æ¡¢CPU¡¢´ÅÅÌ¡¢ÍøÂç¸öÐÔ£¬Êý¾Ý·¢ËÍÖÁiplogger[.]org¡£


https://www.bleepingcomputer.com/news/security/malicious-7-zip-site-distributes-installer-laced-with-proxy-tool/


5. ³¯ÏÊUNC1069ºÚ¿ÍAIÊÓÆµÓë¶à¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÇ®±Ò


2ÔÂ10ÈÕ£¬¹È¸èMandiant×êÑÐÍŶӽüÈÕÅû¶£¬³¯ÏʺڿÍ×éÖ¯UNC1069×Ô2018ÄêÆð³ÖÐø½ø»¯£¬×Ô2023ÄêÆð½«Ö¸±êתÏòWeb3¼°¼ÓÃÜÇ®±ÒÐÐÒµ£¬Í¨¹ýAIÌìÉúÊÓÆµÓëClickFix¼¼ÊõÌáÒ鶨Ô컯¹¥»÷£¬Ïò½ðÈڿƼ¼¹«Ë¾Í¶·ÅmacOS¼°Windows¶ñÒâÈí¼þÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò²¢Íƶ¯Éç»á¹¤³Ì¹¥»÷¡£¹¥»÷Á´ÒÔÉç»á¹¤³ÌѧΪÖ÷Ì⣺ºÚ¿Íͨ¹ýTelegramµÁÓüÓÃÜÇ®±Ò¹«Ë¾¸ß¹ÜÕË»§ÁªÏµÊܺ¦Õߣ¬³ÉÁ¢ÐÅÀµºó·ÖÏí¼Ù×°³ÉCalendlyÁ´½ÓµÄαÔìZoom»áÒéÒ³Ãæ¡£ÔÚ¡°»áÒ顱ÖУ¬ºÚ¿Í²¥·ÅÁíÒ»¼ÓÃܹ«Ë¾CEOµÄÉî¶ÈαÔìÊÓÆµ£¬»Ñ³ÆÊܺ¦ÕßÔâ·êÒôƵÎÊÌ⣬ÓÕµ¼ÆäÖ´ÐÐÍøÒ³ºÅÁîÆô¶¯Ï°È¾Á´¡£Huntress×êÑÐÈËÔ±2025ÄêÖÐÆÚ¼Í¼µÄÀàËÆÊÖ·¨ÏÔʾ£¬´ËÀ๥»÷Óɳ¯ÏÊBlueNoroff£¨±ðºÅSapphire Sleet/TA44£©Ö´ÐУ¬Õë¶ÔmacOSϵͳʹÓÃ·ÖÆçÔØºÉ¡£Ï°È¾Á´Æô¶¯ºó£¬¹¥»÷Õßͨ¹ýAppleScriptÖ´ÐжñÒâMach-O¶þ½øÔìÎļþ£¬²¿ÊðÆß¸ömacOS¶ñÒâÈí¼þ¼Ò×壺WAVESHAPER¡¢HYPERCALL¡¢HIDDENCALL¡¢SILENCELIFT¡¢DEEPBREATH¡¢SUGARLOADER¼°CHROMEPUSH¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/


6. Claude Opus 4.6 Ö÷Á÷¿ªÔ´¿â·¢ÏÖ500+¸ßΣ·ì϶


2ÔÂ6ÈÕ£¬ÈËΪÖÇÄܹ«Ë¾Anthropic½üÈÕ°ä²¼Æä×îдó˵»°Ä£ÐÍClaude Opus 4.6£¬¸ÃÄ£ÐÍÔÚ´úÂëÉó²éÓëµ÷ÊÔÄÜÁ¦ÉÏʵÏÖÏÔÖøÉý¼¶£¬²¢ÔÚ½ðÈÚ·ÖÎö¡¢×êÑÓ×¢ÎĵµÌìÉúµÈ¹¤×÷Öвû·¢ÓÅ»¯¡£ÓÈΪ³ÁÒªµÄÊÇ£¬Opus 4.6ÔÚÎÞÐèרÓù¤¾ß¡¢×Ô½ç˵¿ò¼Ü»òÌØ¶¨ÌáÐѴʵÄÇé¿öÏ£¬×ÔÖ÷·¢ÏÖÁËGhostscript¡¢OpenSC¡¢CGIFµÈ¿ªÔ´¿âÖÐ500Óà¸ö´Ëǰδ֪µÄ¸ßΣ°²È«·ì϶£¬Ä¿Ç°Òѱ»ÓÃÓÚ¿ªÔ´Èí¼þ·ì϶µÄ·¢ÏÖÓ뽨¸´¸¨Öú¹¤×÷¡£AnthropicÇ¿µ÷£¬Opus 4.6¾ß±¸ÀàËÆÈËÀà×êÑÐÔ±µÄ´úÂëÍÆÀíÄÜÁ¦£¬Í¨¹ý¶ÈÎö¹ýÍù½¨¸´¼Í¼¼ø±ðͬÀàδ½â¾ö·ì϶£¬¶¨Î»Ò×Òý·¢ÎÊÌâµÄ´úÂëģʽ£¬²¢Éî¿ÌÀí½â·¨Ê½Âß¼­ÒÔ¾«×¼ÅжÏÒì³£ÊäÈë´¥·¢Ç°Ìá¡£ÔÚÕýʽ°ä²¼Ç°£¬¸ÃÄ£Ð;­Ç°Ñغì¶ÓÔÚÐé¹¹»¯»·¾³ÖвâÊÔ£¬½¨Éèµ÷ÊÔÆ÷¡¢ÍÌͲâÊÔÆ÷µÈ¹¤¾ß£¬È«³ÌδÌṩ¹¤¾ßʹÓÃÁìµ¼»ò¶î±í·ì϶¼ø±ðÐÅÏ¢£¬ÑéÖ¤ÁËÆä¿ªÏä¼´Óõķì϶·¢ÏÖÄÜÁ¦¡£


https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html