npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬£¬ £¬ £¬¶ñÒâÈí¼þÃé×¼¿ª·¢Ö°Ô±

Ðû²¼Ê±¼ä 2024-11-07

1.npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬£¬ £¬ £¬¶ñÒâÈí¼þÃé×¼¿ª·¢Ö°Ô±


11ÔÂ5ÈÕ£¬£¬ £¬ £¬Ò»³¡Õë¶Ô¿ª·¢Ö°Ô±µÄÓòÃûÇÀ×¢»î¶¯ÕýÔÚͨ¹ýÊý°Ù¸öÊ¢ÐеÄJavaScript¿â£¨Ã¿ÖÜÏÂÔØÁ¿´ïÊýÍòÍò´Î£©Èö²¥¶ñÒâÈí¼þ£¬£¬ £¬ £¬ÒÔÇÔÈ¡ºÍ¼àÊÓÐÅÏ¢¡£¡£¡£¡£¡£¸Ãnpm¹©Ó¦Á´¹¥»÷ËÆºõÆðÔ´ÓÚ10Ô·Ý£¬£¬ £¬ £¬¶à¼ÒÇå¾²»ú¹¹ÒÑ·¢³ö¾¯±¨¡£¡£¡£¡£¡£¹¥»÷ÕßÐû²¼¿´ËÆÕýµ±µÄ¶ñÒânpm°ü£¬£¬ £¬ £¬Ãû³ÆÓëÕýµ±°üÏàËÆµ«ÂÔÓвî±ð£¬£¬ £¬ £¬ÓÕÆ­¿ª·¢Ö°Ô±×°Ö㬣¬ £¬ £¬´Ó¶ø»ñµÃ¶ÔÆä»úеµÄ³¤ÆÚ»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ°üʹÓÃÒÔÌ«·»ÖÇÄܺÏÔ¼¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©²Ù×÷£¬£¬ £¬ £¬Ê¹¹Å°åC2×èÖ¹ÒªÁìʧЧ£¬£¬ £¬ £¬ÔöÌíÁ˶ñÒâÈí¼þ·Ö·¢»î¶¯µÄÒþ²ØÐÔ¡£¡£¡£¡£¡£SocketºÍPhylumµÄÇå¾²Ñо¿Ö°Ô±ÔÚÍòÊ¥½Úʱ´ú·¢³öÖÒÑÔ£¬£¬ £¬ £¬Ö¸ÉíÊÀ·Ý²»Ã÷µÄ¶ñÒâ·Ö×ÓÕýÔÚʹÓÃαװ³ÉPuppeteer¡¢Bignum.jsºÍÖÖÖÖ¼ÓÃÜÇ®±Ò¿âµÄÓòÃûÇÀ×¢°ü£¨¹²287¸ö°ü£©¾ÙÐй¥»÷¡£¡£¡£¡£¡£CheckmarxÒ²Ðû²¼ÁËÀàËÆÖÒÑÔ£¬£¬ £¬ £¬Ö¸³ö¶ñÒâÈí¼þ¡°jest-fet-mock¡±Ö¼ÔÚð³äÕýµ±µÄJavaScript²âÊÔÊÊÓóÌÐò¡£¡£¡£¡£¡£Checkmarx·¢Ã÷£¬£¬ £¬ £¬¶ñÒâÈí¼þÔÚ×°Öúó»áÖ´ÐÐϵͳÕì̽£¬£¬ £¬ £¬Æ¾Ö¤Ö÷»ú²Ù×÷ϵͳÏÂÔØÊʵ±µÄÓÐÓøºÔØ£¬£¬ £¬ £¬ÇÔȡƾ֤²¢½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£


https://www.theregister.com/2024/11/05/typosquatting_npm_campaign/


2. Winos4.0¿ò¼Ü£ººÚ¿ÍʹÓÃÓÎÏ·Ó¦ÓÃÃé×¼WindowsÓû§¾ÙÐжñÒâ¹¥»÷


11ÔÂ6ÈÕ£¬£¬ £¬ £¬ºÚ¿Í½üÆÚƵÈÔʹÓöñÒâµÄWinos4.0¿ò¼Ü¹¥»÷WindowsÓû§£¬£¬ £¬ £¬¸Ã¿ò¼Üͨ¹ýαװ³ÉÎÞº¦µÄÓÎÏ·Ïà¹ØÓ¦ÓóÌÐò¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¾ÝÇ÷ÊÆ¿Æ¼¼½ñÏÄÐû²¼µÄ±¨¸æ£¬£¬ £¬ £¬Ò»¸öÃûΪVoid Arachne/Silver FoxµÄÍþвÐÐΪÕßÔøÊ¹ÓÃÐ޸IJ¢À¦°ó¶ñÒâ×é¼þµÄÈí¼þ£¨ÈçVPNºÍ¹È¸èChromeä¯ÀÀÆ÷£©Õë¶ÔÖйúÊг¡¡£¡£¡£¡£¡£ÏÖÍøÂçÇå¾²¹«Ë¾Fortinet·¢Ã÷£¬£¬ £¬ £¬ºÚ¿Í»î¶¯ÒÑÑݱ䣬£¬ £¬ £¬¼ÌÐøÒÀÀµÓÎÏ·ºÍÓÎÏ·Ïà¹ØÎļþ¹¥»÷ÖйúÓû§¡£¡£¡£¡£¡£µ±Ö´ÐÐαװ³ÉÕýµ±µÄ×°ÖóÌÐòʱ£¬£¬ £¬ £¬ËüÃÇ»á´ÓÌØ¶¨ÍøÖ·ÏÂÔØDLLÎļþ£¬£¬ £¬ £¬Æô¶¯¶à°ì·¨Ñ¬È¾Àú³Ì¡£¡£¡£¡£¡£Õâ°üÀ¨ÏÂÔØÆäËûÎļþ¡¢ÉèÖÃÖ´ÐÐÇéÐΡ¢½¨É賤ÆÚÐÔ¡¢¼ÓÔØAPI¡¢¼ìË÷ÉèÖÃÊý¾Ý¡¢½¨ÉèÓëC2ЧÀÍÆ÷µÄÅþÁ¬µÈ¡£¡£¡£¡£¡£×îÖÕ£¬£¬ £¬ £¬¼ÓÔØµÄµÇ¼Ä£¿£¿£¿£¿£¿£¿éÖ´ÐÐÖ÷Òª¶ñÒâ²Ù×÷£¬£¬ £¬ £¬ÈçÍøÂçϵͳÐÅÏ¢¡¢¼ì²éÇå¾²Èí¼þ¡¢ÍøÂç¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡¢Î¬³ÖÓëC2ЧÀÍÆ÷µÄÅþÁ¬£¬£¬ £¬ £¬ÒÔ¼°½ØÆÁ¡¢¼àÊÓ¼ôÌù°åת±äºÍÇÔÈ¡Îļþ¡£¡£¡£¡£¡£Winos4.0»¹Äܼì²é¶àÖÖÇå¾²¹¤¾ßÀú³Ì£¬£¬ £¬ £¬ÒÔÈ·¶¨ÊÇ·ñÔÚÊÜ¼à¿ØÇéÐÎÖÐÔËÐУ¬£¬ £¬ £¬²¢µ÷½âÐÐΪ¡£¡£¡£¡£¡£¸Ã¿ò¼Ü¹¦Ð§Ç¿Ê¢£¬£¬ £¬ £¬ÀàËÆCobalt StrikeºÍSliver£¬£¬ £¬ £¬ÇÒлµÄ·ºÆðÅú×¢ÆäÔÚ¶ñÒâ²Ù×÷ÖеÄ×÷ÓÃÒÑÀο¿¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/


3.VEILDriveÍþв»î¶¯£ºÊ¹ÓÃ΢ÈíSaaSЧÀ;ÙÐÐÍøÂç´¹ÂÚÓë¶ñÒâÈí¼þ°²ÅÅ


11ÔÂ6ÈÕ£¬£¬ £¬ £¬Ò»ÏîÃûΪVEILDriveµÄÒ»Á¬Íþв»î¶¯±»·¢Ã÷ʹÓÃ΢ÈíµÄÕýµ±Ð§ÀÍ£¬£¬ £¬ £¬ÈçTeams¡¢SharePoint¡¢Quick AssistºÍOneDrive£¬£¬ £¬ £¬¾ÙÐÐÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷²¢·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾HuntersÔÚÊÓ²ìÒ»ÆðÕë¶ÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©×éÖ¯µÄÍøÂçÊÂÎñʱ·¢Ã÷ÁËÕâÒ»»î¶¯¡£¡£¡£¡£¡£¹¥»÷Õßð³äITÍŶӳÉÔ±£¬£¬ £¬ £¬Í¨¹ýTeamsÐÂÎźͿìËÙÖúÊÖ¹¤¾ßÇëÇóÔ¶³Ì»á¼ûϵͳ£¬£¬ £¬ £¬²¢Ê¹ÓÃ֮ǰÊܵ½¹¥»÷µÄ×éÖ¯µÄ¿ÉÐÅ»ù´¡ÉèÊ©À´·Ö·¢¹¥»÷¡£¡£¡£¡£¡£ËûÃÇͨ¹ýSharePoint·ÖÏíÁËÒ»¸öÖ¸ÏòÍйÜÔÚ²î±ð×â»§ÉϵÄZIP´æµµÎļþµÄÏÂÔØÁ´½Ó£¬£¬ £¬ £¬¸Ã´æµµÖÐǶÈëÁËÔ¶³Ì»á¼û¹¤¾ßLiteManager¡£¡£¡£¡£¡£È»ºó£¬£¬ £¬ £¬Í¨¹ý¿ìËÙÖúÊÖ»ñµÃµÄÔ¶³Ì»á¼ûȨÏÞ£¬£¬ £¬ £¬ÔÚϵͳÉϽ¨ÉèÁ˰´ÆÚÖ´ÐÐLiteManagerµÄÍýÏëʹÃü¡£¡£¡£¡£¡£»£»£»£» £»£»£»¹ÏÂÔØÁ˵ڶþ¸öZIPÎļþ£¬£¬ £¬ £¬ÆäÖаüÀ¨»ùÓÚJavaµÄ¶ñÒâÈí¼þºÍÕû¸öJava¿ª·¢¹¤¾ß°ü¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÓ²±àÂëµÄƾ֤ÅþÁ¬µ½µÐÊÖ¿ØÖƵÄOneDriveÕÊ»§£¬£¬ £¬ £¬²¢½«ÆäÓÃ×÷ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬ £¬ £¬ÒÔÔÚÊÜѬȾµÄϵͳÉÏ»ñÈ¡ºÍÖ´ÐÐPowerShellÏÂÁî¡£¡£¡£¡£¡£ÕâÖÖÒÀÀµSaaSµÄÕ½ÂÔʹʵʱ¼ì²â±äµÃÖØ´ó£¬£¬ £¬ £¬²¢ÈƹýÁ˹Űå·ÀÓù²½·¥¡£¡£¡£¡£¡£


https://thehackernews.com/2024/11/veildrive-attack-exploits-microsoft.html


4.»ªÊ¢¶ÙÖÝ·¨ÔºÏµÍ³ÔâÍøÂç¹¥»÷̱»¾£¬£¬ £¬ £¬½ôÆÈ»Ö¸´ÖÐ


11ÔÂ6ÈÕ£¬£¬ £¬ £¬×ÔÖÜÈÕ¹ÙÔ±·¢Ã÷ÍøÂç±£´æ¡°Î´¾­ÊÚȨµÄ»î¶¯¡±ÒÔÀ´£¬£¬ £¬ £¬»ªÊ¢¶ÙÖݸ÷µØµÄ·¨ÔºÏµÍ³ÏÝÈë̱»¾£¬£¬ £¬ £¬ËùÓÐÖÝ·¨ÔºµÄ˾·¨ÐÅϢϵͳ¡¢ÍøÕ¾¼°Ïà¹ØÐ§À;ùÊÜÒ»Á¬Ó°Ïì¡£¡£¡£¡£¡£¾Ý¡¶Î÷ÑÅͼʱ±¨¡·±¨µÀ£¬£¬ £¬ £¬·¨ÔºÖÎÀí°ì¹«ÊÒ£¨AOC£©ÒÑѸËÙÐж¯£¬£¬ £¬ £¬È·±£Òªº¦ÏµÍ³Çå¾²²¢Æð¾¢»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£AOC¸±Ö÷ÈÎεϡ¤·ÑÀ×¶ûÌåÏÖ£¬£¬ £¬ £¬³öÓÚÇ徲˼Á¿£¬£¬ £¬ £¬ÏµÍ³ÒÑ×Ô¶¯¹Ø±Õ£¬£¬ £¬ £¬²¢Óëר¼ÒÏàÖúÖçÒ¹»Ö¸´¡£¡£¡£¡£¡£²¿·ÖÊз¨ÔººÍµØÇø·¨ÔºÈÔÔÚÌṩÓÐÏÞЧÀÍ£¬£¬ £¬ £¬¶øÆ¤¶ûË¹ÏØ¸ßµÈ·¨ÔºÊé¼ÇÔ±°ì¹«ÊÒËäЧÀÍÖÐÖ¹£¬£¬ £¬ £¬µ«ÈԿɾÙÐÐÔÚÏß»á¼û£¬£¬ £¬ £¬²¢ÕýÆð¾¢»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£Ô¤¼Æ·¨Ôº»ù±¾Ö°ÄܺÍËßËϳÌÐò½«°´ÍýÏë¾ÙÐУ¬£¬ £¬ £¬¿Í»§Ð§À͹ñ̨¿ª·Å£¬£¬ £¬ £¬µ«½¨ÒéÌáǰȷÈÏЧÀÍ¿ÉÓÃÐÔ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬ £¬ £¬²¿·ÖЧÀÍÈçѶ¶Ï/·£¿£¿£¿£¿£¿£¿îÓà¶îÐÅÏ¢ºÍµç×Ó·¨Í¥¼Í¼ËÑË÷ÔÚÆ¤¶ûË¹ÏØ·¨Ôº»Ö¸´Ç°Ôݲ»¿ÉÓᣡ£¡£¡£¡£ÀàËÆÊÂÎñÔøÔÚ¿°ÈøË¹Öݱ¬·¢£¬£¬ £¬ £¬2023Äê10ÔÂÖÐÑ®£¬£¬ £¬ £¬Æä·¨ÔºÖÎÀí¾ÖÍøÂçÔâÈëÇÖ£¬£¬ £¬ £¬ºÚ¿ÍÇÔÈ¡Ãô¸ÐÎļþ£¬£¬ £¬ £¬¾ßÓÐÀÕË÷Èí¼þ¹¥»÷¼£Ï󣬣¬ £¬ £¬ÆÈʹ˾·¨²¿·Ö¹Ø±Õ¶à¸öÐÅϢϵͳ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/washington-courts-systems-offline-following-weekend-cyberattack/


5.SteelFox¶ñÒâÈí¼þ£ºÊ¹ÓÃÒ×Êܹ¥»÷ÇýÏÂÊÖÒÕÇÔÊØÐÅÏ¢ÓëÍÚ¾ò¼ÓÃÜÇ®±Ò


11ÔÂ6ÈÕ£¬£¬ £¬ £¬ÃûΪ¡°SteelFox¡±µÄжñÒâÈí¼þʹÓá°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò¡±ÊÖÒÕ»ñÈ¡WindowsϵͳȨÏÞ£¬£¬ £¬ £¬ÒÔÍÚ¾ò¼ÓÃÜÇ®±Ò²¢ÇÔÊØÐÅÓÿ¨Êý¾ÝµÈÐÅÏ¢¡£¡£¡£¡£¡£¸ÃÈí¼þͨ¹ýÂÛ̳ºÍÖÖ×Ó×·×ÙÆ÷ÒÔÆÆ½â¹¤¾ßµÄÐÎʽ·Ö·¢£¬£¬ £¬ £¬¿É¼¤»î¶àÖÖÈí¼þµÄÕýµ±°æ±¾¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ùÑо¿Ö°Ô±ÓÚ8Ô·¢Ã÷¸Ã¹¥»÷»î¶¯£¬£¬ £¬ £¬µ«¶ñÒâÈí¼þ×Ô2023Äê2ÔÂÒѱ£´æ£¬£¬ £¬ £¬²¢Í¨¹ý¶àÖÖÇþµÀÔöÌíÁËÈö²¥¡£¡£¡£¡£¡£SteelFoxʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÌáÉýȨÏÞ£¬£¬ £¬ £¬½¨ÉèЧÀͲ¢Ê¹ÓÃÎó²î½«È¨ÏÞÌáÉýµ½×î¸ß¼¶±ð¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹ÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¾ò£¬£¬ £¬ £¬²¢¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ£¬£¬ £¬ £¬´ÓÍøÂçä¯ÀÀÆ÷ÖÐÌáÈ¡Êý¾Ý¡£¡£¡£¡£¡£Ö»¹ÜC2ÓòÊÇÓ²±àÂëµÄ£¬£¬ £¬ £¬µ«ÍþвÐÐΪÕßͨ¹ýÇл»IPµØµãºÍʹÓÃGoogle¹«¹²DNSºÍDoHÒþ²ØÆäλÖᣡ£¡£¡£¡£SteelFox¹¥»÷ûÓÐÌØ¶¨Ä¿µÄ£¬£¬ £¬ £¬µ«Ö÷ÒªÕë¶ÔAutoCAD¡¢JetBrainsºÍFoxit PDF EditorµÄÓû§£¬£¬ £¬ £¬ÒÑѬȾ¶à¸ö¹ú¼ÒµÄϵͳ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/


6.SelectBlindsÍøÕ¾ÔâºÚ¿Í¹¥»÷£¬£¬ £¬ £¬20ÍòÖ÷¹ËÐÅÓÿ¨ÐÅÏ¢±»µÁ


11ÔÂ7ÈÕ£¬£¬ £¬ £¬ºÚ¿ÍÔÚ´óÐÍÁãÊÛÉÌSelectBlindsµÄÍøÕ¾ÉÏÖ²ÈëÁ˶ñÒâÈí¼þ£¬£¬ £¬ £¬µ¼ÖÂ20¶àÍòÖ÷¹ËµÄÐÅÓÿ¨ÐÅÏ¢ºÍÆäËûÊý¾Ý±»µÁ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó1ÔÂ7ÈÕ¾ÍÒѱ£´æ£¬£¬ £¬ £¬ÓÚ9ÔÂ28ÈÕ±»Ô±¹¤·¢Ã÷¡£¡£¡£¡£¡£³ýÁ˵ǼÐÅÏ¢£¬£¬ £¬ £¬ºÚ¿Í»¹¿ÉÄÜ»ñÈ¡ÁËÖ÷¹ËµÄÐÕÃû¡¢µç×ÓÓʼþ¡¢ËÍ»õºÍÕ˵¥µØµã¡¢µç»°ºÅÂëÒÔ¼°Ö§¸¶¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÇå¾²/CVV´úÂë¡£¡£¡£¡£¡£ÎªÁËÆÈʹÓû§¸ü¸ÄÃÜÂ룬£¬ £¬ £¬SelectBlindsÒÑËø¶¨Óû§ÕË»§²¢É¾³ýÁ˶ñÒâÈí¼þ£¬£¬ £¬ £¬Í¬Ê±ÖÒÑÔÔÚÆäËûÍøÕ¾ÉÏÖØ¸´Ê¹ÓÃÏàͬµÇ¼ÐÅÏ¢µÄÈËÓ¦Á¬Ã¦¸ü¸ÄÃÜÂë¡£¡£¡£¡£¡£ºÚ¿ÍʹÓõç×ÓµÁË¢Æ÷ÇÔÊØÐÅÓÿ¨ÐÅÏ¢ÒѳÉΪºã¾Ã±£´æµÄÎÊÌ⣬£¬ £¬ £¬ËûÃÇͨ¹ýÏòÒ×Êܹ¥»÷µÄÍøÕ¾×¢Èë¶ñÒâ´úÂëÀ´²¶»ñÃô¸ÐÊý¾Ý£¬£¬ £¬ £¬²¢½«ÕâЩÐÅÏ¢³öÊÛ¸øÐÅÓÿ¨Ú²Æ­»ú¹¹¡£¡£¡£¡£¡£¾ÝRecorded FutureÔÚÉϸöÔµÄÒ»·Ý±¨¸æÖгÆ£¬£¬ £¬ £¬ºÚ¿ÍÔÚ°µÍøÐÅÓÿ¨ÊÐËÁÖÐÐû²¼ÁË1500ÍòÌõÐÅÓÿ¨¼Í¼ÒÔ¹©³öÊÛ¡£¡£¡£¡£¡£


https://therecord.media/selectblinds-customers-credit-card-info-data-breach-website-malware