¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųÉÓÕ¶ü £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹ÓÃTelegramÈö²¥¶ñÒâÈí¼þ

Ðû²¼Ê±¼ä 2025-01-24

1. ¡°Ë¿³ñ֮·¡±Ê×´´ÈËÐÂÎųÉÓÕ¶ü £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹ÓÃTelegramÈö²¥¶ñÒâÈí¼þ


1ÔÂ22ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßʹÓùØÓÚRoss Ulbricht£¨Ë¿³ñ֮·°µÍøÊг¡Ê×´´ÈË£©µÄÐÂÎÅ×÷ΪÓÕ¶ü £¬£¬£¬£¬£¬ £¬£¬£¬Í¨¹ýTelegramƵµÀÓÕÆ­Óû§ÔËÐÐPowerShell´úÂë¡£¡£¡£ ¡£¡£Õâ´Î¹¥»÷ÊÇ¡°Click-Fix¡±Õ½ÂÔµÄбäÖÖ £¬£¬£¬£¬£¬ £¬£¬£¬ÓÉvx-underground·¢Ã÷¡£¡£¡£ ¡£¡£²î±ðÓÚÒÔÍùµÄ¹ýʧÐÞ¸´Î±×° £¬£¬£¬£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷¼Ù°ç³É¼ÓÈëÆµµÀʱµÄÑéÖ¤Âë»òÑé֤ϵͳ¡£¡£¡£ ¡£¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵÄÐéᵫ¾­ÓÉÑéÖ¤µÄRoss UlbrichtÕË»§ £¬£¬£¬£¬£¬ £¬£¬£¬½«Óû§Ö¸µ¼ÖÁ¿´Ëƹٷ½µÄTelegramƵµÀ¡£¡£¡£ ¡£¡£ÔÚÆµµÀÄÚ £¬£¬£¬£¬£¬ £¬£¬£¬Óû§»áÓöµ½ÃûΪ¡°Safeguard¡±µÄÐéαÉí·ÝÑéÖ¤ÇëÇó £¬£¬£¬£¬£¬ £¬£¬£¬×îÖջᱻָµ¼ÖÁÒ»¸öTelegramС³ÌÐò £¬£¬£¬£¬£¬ £¬£¬£¬¸Ã³ÌÐò»á×Ô¶¯¸´ÖÆPowerShellÏÂÁîµ½¼ôÌù°å £¬£¬£¬£¬£¬ £¬£¬£¬²¢ÌáÐÑÓû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐС£¡£¡£ ¡£¡£Ö´ÐеĴúÂë»áÏÂÔØÒ»¸ö°üÀ¨Cobalt Strike¼ÓÔØ³ÌÐòµÄZIPÎļþ £¬£¬£¬£¬£¬ £¬£¬£¬Cobalt Strike³£±»ÍþвÐÐΪÕßÓÃÓÚÔ¶³Ì»á¼ûÅÌËã»úºÍÍøÂç £¬£¬£¬£¬£¬ £¬£¬£¬ÕâÀàѬȾÍùÍùÊÇÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ¹¥»÷µÄÏÈÕס£¡£¡£ ¡£¡£Õû¸öÑéÖ¤Àú³ÌµÄÓïÑÔÉè¼ÆµÃ¼«ÎªÉóÉ÷ £¬£¬£¬£¬£¬ £¬£¬£¬ÒÔ×èÖ¹ÒýÆðÓû§ÏÓÒÉ¡£¡£¡£ ¡£¡£Ç徲ר¼ÒÖÒÑÔ £¬£¬£¬£¬£¬ £¬£¬£¬Óû§Ó¦×èÖ¹ÔÚ²»È·¶¨µÄÇéÐÎÏÂÔÚWindows¡°ÔËÐС±¶Ô»°¿ò»òPowerShellÖÕ¶ËÖÐÖ´ÐÐÔÚÏ߸´ÖƵÄÄÚÈÝ £¬£¬£¬£¬£¬ £¬£¬£¬¶Ô¼ôÌù°åÄÚÈݸÐÓ¦²»È·×¼Ê± £¬£¬£¬£¬£¬ £¬£¬£¬Ó¦Õ³Ìùµ½Îı¾ÔĶÁÆ÷ÉÏÆÊÎö £¬£¬£¬£¬£¬ £¬£¬£¬ÈκλìÏý¶¼ÊÇΣÏÕÐźÅ¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/


2. ChromeÀ©Õ¹³ÌÐòÃæÁÙ¹©Ó¦Á´¹¥»÷Íþв £¬£¬£¬£¬£¬ £¬£¬£¬Êý°ÙÍòÓû§»òÊÜÓ°Ïì


1ÔÂ22ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬ÍøÂçÇå¾²»ú¹¹Sekoia·¢³öÖÒÑÔ £¬£¬£¬£¬£¬ £¬£¬£¬Ö¸³öÕë¶ÔChromeÀ©Õö¿ª·¢ÕߵũӦÁ´¹¥»÷¿ÉÄÜÒѾ­Ó°ÏìÁËÊýÊ®ÍòÈË¡£¡£¡£ ¡£¡£´ËÀ๥»÷ʼÓÚ2023Äê £¬£¬£¬£¬£¬ £¬£¬£¬×î½üµÄÒ»´Î»î¶¯±¬·¢ÔÚ2024Äê12ÔÂ30ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬Ö¼ÔÚÇÔÈ¡ÈçChatGPTºÍFacebook for BusinessµÈÍøÕ¾µÄAPIÃÜÔ¿¡¢»á»°cookieºÍÆäËûÉí·ÝÑéÖ¤ÁîÅÆ¡£¡£¡£ ¡£¡£¼ÓÀû¸£ÄáÑǵÄCyberhaven¹«Ë¾ÊǴ˴ι¥»÷µÄÊܺ¦ÕßÖ®Ò» £¬£¬£¬£¬£¬ £¬£¬£¬Æä¿ª·¢ÕßÕË»§ÔÚ2024Äê½ÚÀñÈÕʱ´ú±»ÈëÇÖ¡£¡£¡£ ¡£¡£Booz Allen HamiltonµÄÆÊÎöÏÔʾ £¬£¬£¬£¬£¬ £¬£¬£¬Ðí¶àÆäËûChromeÀ©Õ¹Ò²¿ÉÄÜÊܵ½Ó°Ïì £¬£¬£¬£¬£¬ £¬£¬£¬Ç±ÔÚÊÜÓ°ÏìµÄ×îÖÕÓû§ÊýÄ¿¿ÉÄִܵïÊý°ÙÍò¡£¡£¡£ ¡£¡£Ò»Ð©ÊÜÓ°ÏìµÄÀ©Õ¹ÒÑ´ÓChromeÍøÉÏÓ¦Óõ곷Ï £¬£¬£¬£¬£¬ £¬£¬£¬¶øÒ»Ð©À©Õ¹µÄÒ³ÃæÏÔʾÒѾÙÐиüС£¡£¡£ ¡£¡£Reader ModeÀ©Õ¹µÄÊ×´´ÈËÏòÔ¼30ÍòÓû§·¢³ö¹ûÕæÐÅ £¬£¬£¬£¬£¬ £¬£¬£¬¼û¸æËûÃÇÆäÀ©Õ¹ÔÚ2024Äê12ÔÂ5ÈÕÊܵ½ÈëÇÖ¡£¡£¡£ ¡£¡£¹¥»÷Õßͨ¹ýαװ³ÉChromeÍøÉÏÓ¦Óõ꿪·¢ÕßÖ§³ÖµÄ´¹ÂÚÓʼþ £¬£¬£¬£¬£¬ £¬£¬£¬ÓÕÆ­¿ª·¢Õßµã»÷¶ñÒâÁ´½Ó²¢Åú×¼¶ñÒâOAuthÓ¦ÓóÌÐòµÄ»á¼ûȨÏÞ £¬£¬£¬£¬£¬ £¬£¬£¬´Ó¶ø»ñµÃÉÏ´«±»ÈëÇÖÀ©Õ¹µ½ChromeÍøÉÏÓ¦ÓõêµÄȨÏÞ¡£¡£¡£ ¡£¡£Sekoiaͨ¹ýÊÓ²ìÓëÍøÂç´¹ÂÚÓʼþ¹ØÁªµÄÓòÃû £¬£¬£¬£¬£¬ £¬£¬£¬·¢Ã÷Á˴˴ι¥»÷ÖÐʹÓÃµÄÆäËûÓòÃû¼°¿ÉÄÜÉæ¼°µÄÏÈǰ¹¥»÷µÄÓòÃû £¬£¬£¬£¬£¬ £¬£¬£¬ÒÔΪÕâ¸öÍþвÐÐΪÕßרÃÅÈö²¥¶ñÒâChromeÀ©Õ¹ÒÔÍøÂçÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£¡£


https://www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/


3. ǧÓà¶ñÒâÓòÃû·Âð×ÅÃûƽ̨Èö²¥Lumma StealerÇÔÃÜľÂí


1ÔÂ22ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬ £¬£¬£¬Áè¼Ý1000¸ö¶ñÒâÓòÃûÕýÔÚ·ÂðRedditºÍWeTransferµÈ×ÅÃûƽ̨ £¬£¬£¬£¬£¬ £¬£¬£¬Èö²¥½üÄêÀ´Ê¢ÐеÄLumma StealerÇÔÃÜľÂí £¬£¬£¬£¬£¬ £¬£¬£¬Í¹ÏÔÁËÍøÂç·¸·¨·Ö×ÓʹÓÃÊÜÐÅÈÎÆ·ÅÆÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þµÄÖØ´óÐÔ¡£¡£¡£ ¡£¡£Lumma StealerÊÇÒ»ÖÖǿʢµÄÐÅÏ¢ÇÔÈ¡¹¤¾ß £¬£¬£¬£¬£¬ £¬£¬£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢ºÍä¯ÀÀÆ÷Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ ¡£¡£ÕâЩ¶ñÒâÓòÃûÓëÕýµ±URL¼«ÎªÏàËÆ £¬£¬£¬£¬£¬ £¬£¬£¬ÉõÖÁÅ䱸ÁËÓÐÓõÄSSLÖ¤Êé £¬£¬£¬£¬£¬ £¬£¬£¬Îóµ¼Óû§ÒÔΪÕýÔÚ»á¼ûÇå¾²ÍøÕ¾ £¬£¬£¬£¬£¬ £¬£¬£¬ÔöÌíÁËÓû§³ÉÎªÍøÂç´¹ÂÚ¹¥»÷Êܺ¦ÕßµÄΣº¦¡£¡£¡£ ¡£¡£Lumma Stealer½ÓÄɶàÖÖÊÖÒÕÖ´ÐжñÒâ¸ºÔØ £¬£¬£¬£¬£¬ £¬£¬£¬ÈçÍйÜÐéαµÄCAPTCHAÒ³ÃæÓÕʹÓû§Ö´ÐÐPowerShell¾ç±¾ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£ ¡£¡£ÕâЩ¶ñÒâÓòÃûµÄÔöÌí·´Ó¦Á˹¥»÷ÕßʹÓÃ×ÅÃûƽ̨ÉùÓþµÄÇ÷ÊÆ £¬£¬£¬£¬£¬ £¬£¬£¬Í¨¹ýÉç»á¹¤³ÌѧսÂÔ·¢ËͰüÀ¨Á´½ÓµÄµç×ÓÓʼþ £¬£¬£¬£¬£¬ £¬£¬£¬½«Óû§Ö¸µ¼ÖÁÚ²Æ­ÍøÕ¾¡£¡£¡£ ¡£¡£¹¥»÷Õß»¹Ê¹ÓÃÄÚÈÝ·Ö·¢ÍøÂçÍйܴ¹ÂÚÍøÕ¾ £¬£¬£¬£¬£¬ £¬£¬£¬Ìӱܼì²â²¢ÑÓÉì¹¥»÷Ò»Á¬Ê±¼ä¡£¡£¡£ ¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв £¬£¬£¬£¬£¬ £¬£¬£¬ÍøÂçÇ徲ר¼Ò½¨ÒéÑéÖ¤URL¡¢ÆôÓÃË«ÒòËØÈÏÖ¤ºÍ¾ÙÐÐÓû§½ÌÓý¡£¡£¡£ ¡£¡£


https://cybersecuritynews.com/1000-malicious-domains-mimic-reddit-wetransfer/


4. CISA½«JQuery XSSÎó²î¼ÓÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼


1ÔÂ23ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«jQuery³¤ÆÚ¿çÕ¾µã¾ç±¾£¨XSS£©Îó²î£¨CVE-2020-11023 £¬£¬£¬£¬£¬ £¬£¬£¬CVSSÆÀ·Ö£º6.9£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£ ¡£¡£¸ÃÎó²î±£´æÓÚjQuery 1.0.3ÖÁ3.4.1°æ±¾ÖÐ £¬£¬£¬£¬£¬ £¬£¬£¬µ±Ê¹ÓðüÀ¨²»ÊÜÐÅÈεÄHTML <option>ÔªËØµÄDOMÒªÁìʱ £¬£¬£¬£¬£¬ £¬£¬£¬¿ÉÄÜ»áÖ´ÐжñÒâ´úÂë¡£¡£¡£ ¡£¡£´ËÎÊÌâÒÑÔÚjQuery 3.5.0ÖлñµÃÐÞ¸´¡£¡£¡£ ¡£¡£×Éѯ±¨¸æÖ¸³ö £¬£¬£¬£¬£¬ £¬£¬£¬×ÝÈ»¶ÔÀ´×Ô²»ÊÜÐÅÈÎȪԴµÄÔªËØ¾ÙÐÐÁËÕûÀí £¬£¬£¬£¬£¬ £¬£¬£¬½«Æäת´ï¸øjQueryµÄDOM²Ù×÷ÒªÁ죨Èç.html()¡¢.append()µÈ£©ÈÔ¿ÉÄÜÒý·¢Ç徲Σº¦¡£¡£¡£ ¡£¡£×÷ΪÔÝʱ»º½â²½·¥ £¬£¬£¬£¬£¬ £¬£¬£¬½¨ÒéÔÚʹÓÃjQueryÒªÁì´¦Öóͷ£HTMLǰ £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹ÓÃDOMPurifyµÄSAFE_FOR_JQUERYÑ¡Ïî¾ÙÐÐÕûÀí¡£¡£¡£ ¡£¡£jQuery 3.5.0°æ±¾µÄÖ÷Ҫת±äÊÇÇå¾²ÐÞ¸´ £¬£¬£¬£¬£¬ £¬£¬£¬ÆäÖÐjQuery.htmlPrefilterº¯Êý²»ÔÙʹÓÃÕýÔò±í´ïʽ £¬£¬£¬£¬£¬ £¬£¬£¬¶øÊÇת´ïδ¸ü¸ÄµÄ×Ö·û´®¡£¡£¡£ ¡£¡£Ñо¿Ô±Masato Kinugawa±¨¸æÁËÕâÒ»Îó²î¡£¡£¡£ ¡£¡£Æ¾Ö¤CISAµÄ²Ù×÷Ö¸Áî £¬£¬£¬£¬£¬ £¬£¬£¬Áª°î»ú¹¹±ØÐèÔÚ2025Äê2ÔÂ13ÈÕǰÐÞ¸´´ËÎó²î £¬£¬£¬£¬£¬ £¬£¬£¬ÒÔ±£»£»£»£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£ ¡£¡£Í¬Ê± £¬£¬£¬£¬£¬ £¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÏà¹ØÎó²î¡£¡£¡£ ¡£¡£


https://securityaffairs.com/173388/uncategorized/u-s-cisa-adds-jquery-flaw-known-exploited-vulnerabilities-catalog.html


5. Abnormal Security½ÒÆÆ£º×¨ÎªÍøÂç·¸·¨´òÔìµÄGhostGPT AI̸Ìì»úеÈËÐËÆð


1ÔÂ23ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬Abnormal SecurityÔÚ2024Äêβ·¢Ã÷ÁËÒ»¿îÃûΪGhostGPTµÄ¶ñÒâAI̸Ìì»úеÈË £¬£¬£¬£¬£¬ £¬£¬£¬×¨ÎªÍøÂç·¸·¨Éè¼Æ¡£¡£¡£ ¡£¡£Õâ¿î¹¤¾ß¿Éͨ¹ýTelegramµÈƽ̨ÇáËÉ»ñÈ¡ £¬£¬£¬£¬£¬ £¬£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩÁËØ¨¹ÅδÓеÄÄÜÁ¦ £¬£¬£¬£¬£¬ £¬£¬£¬°üÀ¨ÖÆ×÷ÖØ´óµÄÍøÂç´¹ÂÚµç×ÓÓʼþºÍ¿ª·¢¶ñÒâÈí¼þ¡£¡£¡£ ¡£¡£ÓëÊÜÆ·µÂºÍÇå¾²²½·¥Ô¼ÊøµÄ¹Å°åAIÄ£×Ó²î±ð £¬£¬£¬£¬£¬ £¬£¬£¬GhostGPT²»ÊÜÕâЩÏÞÖÆ £¬£¬£¬£¬£¬ £¬£¬£¬Äܹ»ÒÔØ¨¹ÅδÓеÄËÙÂʺÍÇáËÉˮһÌìÉú¶ñÒâÄÚÈÝ¡£¡£¡£ ¡£¡£ËüºÜ¿ÉÄÜÊÇʹÓðü×°Æ÷ÅþÁ¬µ½ChatGPTµÄÔ½Óü°æ±¾»ò¿ªÔ´LLM £¬£¬£¬£¬£¬ £¬£¬£¬´Ó¶øÏû³ýÁËÆ·µÂ°ü¹Ü¡£¡£¡£ ¡£¡£GhostGPT½µµÍÁËÍøÂç·¸·¨µÄÃż÷ £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹ÂÄÀúȱ·¦µÄ¼ÓÈëÕßÒ²ÄÜʹÓÃAI¾ÙÐжñÒâ»î¶¯ £¬£¬£¬£¬£¬ £¬£¬£¬²¢ÒÔ¸ü¸ßµÄЧÂÊÌᳫ¸üÖØ´ó¡¢¸ü¾ßÓ°ÏìÁ¦µÄ¹¥»÷¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬£¬ £¬£¬£¬Ëü»¹ÓÅÏÈ˼Á¿Óû§ÄäÃûÐÔ £¬£¬£¬£¬£¬ £¬£¬£¬¶Ô×·ÇóÒþ²Ø²»·¨»î¶¯²¢Ìӱܼì²âµÄÍøÂç·¸·¨·Ö×ÓºÜÓÐÎüÒýÁ¦¡£¡£¡£ ¡£¡£Abnormal SecurityµÄÑо¿Ö°Ô±²âÊÔÁËGhostGPTµÄ¹¦Ð§ £¬£¬£¬£¬£¬ £¬£¬£¬·¢Ã÷ËüչʾÁËÓÕÆ­Ç±ÔÚÊܺ¦ÕßµÄÄÜÁ¦¡£¡£¡£ ¡£¡£Ëæ×ÅÍøÂç·¸·¨·Ö×Ó¶ÔÈ˹¤ÖÇÄܵÄÐËȤÈÕÒæÅ¨ÖØ £¬£¬£¬£¬£¬ £¬£¬£¬ÍøÂçÇå¾²ÉçÇø±ØÐèÒ»Ö±Á¢ÒìºÍÉú³¤Æä·ÀÓù²½·¥ £¬£¬£¬£¬£¬ £¬£¬£¬²Å»ª¼á³ÖÁìÏÈְλ¡£¡£¡£ ¡£¡£


https://hackread.com/ghostgpt-malicious-ai-chatbot-fuel-cybercrime-scams/


6. J-magic¶ñÒâÈí¼þ£ºÕë¶ÔÕ°²©ÍøÂç×°±¸µÄ¡°Ä§°ü¡±¹¥»÷Ç÷ÊÆÆÊÎö


1ÔÂ23ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬J-magicÊÇÒ»ÖÖÕë¶ÔÕ°²©ÍøÂç±ßÑØ×°±¸µÄ¶ñÒâÈí¼þ £¬£¬£¬£¬£¬ £¬£¬£¬Ö÷Òª¹¥»÷°ëµ¼Ìå¡¢ÄÜÔ´¡¢ÖÆÔìÒµºÍITÁìÓòµÄ×éÖ¯¡£¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þÊÇcd00rºóÃŵ͍ÖƱäÌå £¬£¬£¬£¬£¬ £¬£¬£¬Í¨¹ý¼àÊÓTCPÁ÷Á¿Ñ°ÕÒ¾ßÓÐÌØ¶¨ÌØÕ÷µÄ¡°Ä§ÊõÊý¾Ý°ü¡±À´Æô¶¯·´Ïòshell¡£¡£¡£ ¡£¡£¾ÝLumenÍþвÑо¿ºÍÔËÓª²¿·ÖBlack Lotus LabsµÄÑо¿Ö°Ô±³Æ £¬£¬£¬£¬£¬ £¬£¬£¬J-magic»î¶¯ÔÚ2023ÄêÖÁ2024Äêʱ´ú»îÔ¾ £¬£¬£¬£¬£¬ £¬£¬£¬Ö¼ÔÚʵÏֵͼì²â¶ÈºÍºã¾Ã»á¼û¡£¡£¡£ ¡£¡£Ô¼ÄªÒ»°ëµÄÄ¿µÄ×°±¸ÉèÖÃΪ×éÖ¯µÄVPNÍø¹Ø¡£¡£¡£ ¡£¡£J-magic»á¼ì²éÖÖÖÖ×Ö¶ÎºÍÆ«ÒÆÁ¿ £¬£¬£¬£¬£¬ £¬£¬£¬ÈôÊÇÊý¾Ý°üÖª×ãÌØ¶¨Ìõ¼þÖ®Ò» £¬£¬£¬£¬£¬ £¬£¬£¬¾Í»áÌìÉú·´Ïòshell £¬£¬£¬£¬£¬ £¬£¬£¬µ«·¢ËÍÕßÐèÏȽâ¾öRSAÌôÕ½²Å»ª»á¼ûÊÜѬȾװ±¸¡£¡£¡£ ¡£¡£Ö»¹ÜJ-magicÓëͬÑù»ùÓÚcd00rºóÃŵÄSeaSpy¶ñÒâÈí¼þÔÚÊÖÒÕÉÏÏàËÆ £¬£¬£¬£¬£¬ £¬£¬£¬µ«±£´æÒ»Ð©²î±ð £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹µÃÄÑÒÔ½¨ÉèÁªÏµ¡£¡£¡£ ¡£¡£Black Lotus LabsµÄÑо¿Ö°Ô±ÒÔΪ £¬£¬£¬£¬£¬ £¬£¬£¬J-magic¹¥»÷»î¶¯Åú×¢ £¬£¬£¬£¬£¬ £¬£¬£¬Õë¶ÔÆóÒµ¼¶Â·ÓÉÆ÷µÄ¶ñÒâÈí¼þʹÓÃÕý³ÉΪһÖÖÇ÷ÊÆ £¬£¬£¬£¬£¬ £¬£¬£¬ÓÉÓÚ´ËÀà×°±¸ºÜÉÙ¾ÙÐеçÔ´Ñ­»· £¬£¬£¬£¬£¬ £¬£¬£¬¶ñÒâÈí¼þפÁôÔÚÄÚ´æÖÐ £¬£¬£¬£¬£¬ £¬£¬£¬ÇÒͨ³£È±·¦»ùÓÚÖ÷»úµÄ¼à¿Ø¹¤¾ß¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/stealthy-magic-packet-malware-targets-juniper-vpn-gateways/