Breaking in with CrashFix, supply chain security, and CMMC phase 1 - David Zendzian, Anna Pham, Jacob Horne - ESW #449
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要仔细阅读文章内容。看起来这篇文章主要讨论了三个主题:CrashFix恶意软件、供应链攻击和CMMC合规要求。 CrashFix是由KongTuke开发的,通过恶意浏览器扩展来诱骗用户执行恶意PowerShell命令。这部分信息挺重要的,应该包含在内。 接下来是供应链攻击的部分,提到了Shai-Hulud攻击和SBOM的重要性。SBOM是软件物料清单,用于主动威胁缓解。这也是关键点之一。 然后是CMMC Phase 1的合规要求,特别是11月10日的截止日期对国防供应链的影响。这对企业和联邦机构来说非常重要。 现在要把这些信息浓缩到100字以内。需要简洁明了地涵盖这三个方面:CrashFix的机制、供应链攻击和SBOM的作用、以及CMMC的合规要求。 可能的结构是先介绍CrashFix,然后供应链攻击和SBOM,最后提到CMMC的截止日期和影响。 确保用词准确,比如“恶意浏览器扩展”、“诱导用户执行PowerShell命令”、“SBOM”等术语要保留。 检查字数是否在限制内,并且句子通顺自然。 </think> 文章介绍了CrashFix恶意软件通过虚假安全警告诱导用户执行恶意PowerShell命令的机制;讨论了供应链攻击的威胁及SBOM在主动威胁缓解中的作用;并强调了CMMC Phase 1合规要求对国防供应链的重要性及即将到来的截止日期对企业的影响。 2026-3-9 09:0:0 Author: sites.libsyn.com(查看原文) 阅读量:10 收藏

Mar 9, 2026

Interview with Anna Pham

Breaking in with ClickFix: Anatomy of a modern endpoint attack

Cybersecurity company Huntress just published a report on a new ClickFix variant they’ve discovered, which they’ve dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group.

In short, the team observed the threat actors using KongTuke’s malicious browser extension to display a fake security warning, claiming the browser had “stopped abnormally” and prompting users to run a “scan” to remediate the threats. Upon “running the scan,” the user is presented with a fake “Security issues detected” alert and instructed to manually “fix” the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter.

The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command.

Segment Resources:

Interview with David Zendzian

Continuous compliance and real security lifecycle management

Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable.

In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people.

Segment Resources:

Interview with Jacob Horne

CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain

With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits.

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw-449


文章来源: http://sites.libsyn.com/18678/breaking-in-with-crashfix-supply-chain-security-and-cmmc-phase-1-david-zendzian-anna-pham-jacob-horne-esw-449
如有侵权请联系:admin#unsafe.sh