STAC6565¹¥»÷¼ÓÄô󣬣¬£¬£¬£¬£¬£¬°²ÅÅQWCryptÀÕË÷Èí¼þ
Ðû²¼Ê±¼ä 2025-12-121. STAC6565¹¥»÷¼ÓÄô󣬣¬£¬£¬£¬£¬£¬°²ÅÅQWCryptÀÕË÷Èí¼þ
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾SophosÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬£¬2024Äê2ÔÂÖÁ2025Äê8ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬¼ÓÄôó×éÖ¯³ÉΪSTAC6565Íþв¼¯Èº²ß»®µÄÕë¶ÔÐÔÍøÂç¹¥»÷½¹µãÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬½ü80%µÄ¹¥»÷Ö¸Ïò¸Ã¹úʵÌå¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓëGold Blade£¨ÓÖÃûEarth Kapre¡¢RedCurl¡¢Red Wolf£©¸ß¶È¹ØÁª£¬£¬£¬£¬£¬£¬£¬×Ô2018Äêµ×Æð´Ó¶íÂÞ˹ʵÌåÀ©Õ¹ÖÁ¼ÓÄôó¡¢ÃÀ¹ú¡¢µÂ¹úµÈ¶à¹úÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ÐγÉ"ºÚ¿Í¹ÍÓ¶±ø"ÔË×÷ģʽ£¬£¬£¬£¬£¬£¬£¬ÒÔÉÌÒµÌØ¹¤»î¶¯Îª»ù´¡£¬£¬£¬£¬£¬£¬£¬ÈÚºÏÊý¾Ý͵ÇÔÓëÑ¡ÔñÐÔÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÕë¶ÔÈËÁ¦×ÊÔ´²¿·ÖµÄÓã²æÊ½ÍøÂç´¹ÂÚ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃIndeed¡¢JazzHRµÈÇóְƽ̨ÉÏ´«Î±×°³É¼òÀúµÄ¶ñÒâÎĵµ¡£¡£¡£¡£¡£¡£¡£2025Äê7ÔÂбäÖÖ½ÓÄÉZIP´æµµ+¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýrundll32.exe´ÓCloudflare WorkersÓòÃûºóµÄWebDAVЧÀÍÆ÷»ñÈ¡¶ñÒâ×é¼þ£¬£¬£¬£¬£¬£¬£¬×îÖÕ¼ÓÔØRedLoader DLLÖ´Ðжà½×¶Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßÁ´ÒÀÀµÎ¢Èí³ÌÐò¼æÈÝÐÔÖúÊÖÖ´ÐÐÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬£¬ÍøÂçActive DirectoryÇéÐÎÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃZemana AntiMalwareÇý¶¯Èƹý·À²¡¶¾Èí¼þ¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÎäÆ÷¿â°üÀ¨¶¨ÖƶñÒâÈí¼þQWCrypt¡¢¿ªÔ´·´ÏòÊðÀí¹¤¾ßRPivot¼°Chisel SOCKS5¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýSMB¹²Ïí·Ö·¢ÖØÃüÃû×é¼þ£¬£¬£¬£¬£¬£¬£¬ÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬£¬×îÖÕ°²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/12/stac6565-targets-canada-in-80-of.html
2. ËÕµ¤°ÍµÂ¶ûº½¿ÕÔâºÚ¿ÍÈëÇÖÖÂÃô¸ÐÊý¾Ýй¶
12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚÍøÂç·¸·¨ÂÛ̳Ðû³ÆÒÑÈëÇÖËÕµ¤°ÍµÂ¶ûº½¿Õ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Æä2.21GBÄÚ²¿Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨2025Äê6ÔÂÖÁ7ÔÂʱ´úµÄº½Ðе÷ÀíÊֲᡢÇå¾²ÍýÏëÊֲᡢÇå¾²ÖÎÀíϵͳÊֲᡢ×îµÍ×°±¸Çåµ¥¡¢µØÃæ²Ù×÷Êֲἰ¬Íú´ï»ù¼ÓÀûÕ¾µãÖ°Ô±ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£ÕâЩÎļþÏêϸº¸Ç²¨Òô737ÊÖÒÕ¹æ³Ì¡¢Çå¾²¼Ü¹¹¡¢»ú¶ÓÊý¾Ý¼°Ô±¹¤ÁªÏµ·½·¨£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýÒÔ¼ÓÃÜÇ®±Ò¶µÊÛÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢¸½ÉϺ½°àµ÷ÀíÊÖ²á½ØÍ¼×ôÖ¤¡£¡£¡£¡£¡£¡£¡£ÈôÊý¾ÝÊôʵ£¬£¬£¬£¬£¬£¬£¬CybernewsÍŶÓÖÒÑÔ¿ÉÄÜÒý·¢Éç»á¹¤³Ì¹¥»÷¼¤Ôö¼°²Ù×÷¹æ³Ìй¶Σº¦£¬£¬£¬£¬£¬£¬£¬ÎªºóÐøÀÕË÷´´Á¢Ìõ¼þ¡£¡£¡£¡£¡£¡£¡£°ÍµÂ¶ûº½¿Õ×÷ΪËÕµ¤ÎªÊýδ¼¸µÄÃñÓú½¿ÕÔËÓªÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬£¬½¨ÉèÓÚ2004Ä꣬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ¿¦ÍÁÄ£¬£¬£¬£¬£¬£¬£¬Ìṩº£ÄÚ/ÇøÓò¿ÍÔË¡¢»õÔ˼°VIP°ü»úЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÄêÊÕÈë´ï5600ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜËÕµ¤ÒòÕ½ÂÒµ¼ÖÂÃñº½»ù´¡ÉèÊ©¼¸½üÍ߽⣬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÈÔά³ÖÔËÓª²¢¼ç¸ºÈËÐÔÖ÷ÒåÔ®ÖúʹÃü¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Êý¾Ýй¶ÖÃÆÀÇëÇ󡣡£¡£¡£¡£¡£¡£
https://cybernews.com/security/badr-airlines-data-breach-sudan/
3. Cybernews½ÒÆÆ43ÒÚÌõ¼Í¼й¶ÊÂÎñ
12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬CybernewsÑо¿ÍŶÓ11Ô·¢Ã÷Ò»¸öδÉè·À»¤µÄMongoDBÊý¾Ý¿âʵÀý£¬£¬£¬£¬£¬£¬£¬ÆäÖд洢16.14Ì«×Ö½Ú¡¢½ü43ÒÚ·ÝÎĵµ£¬£¬£¬£¬£¬£¬£¬°üÀ¨À´×ÔÁìÓ¢µÄÖ°Òµ¼°ÆóÒµÇ鱨Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ÈçÈ«Ãû¡¢ÓÊÏä¡¢µç»°¡¢Ö°Î»¡¢½ÌÓýÅä¾°¡¢É罻ýÌåÕ˺ŵÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÆóÒµ¹ØÁª¹ØÏµ¡¢Ö°ÒµÂÄÀúµÈ¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÓÉÍøÂçÇå¾²Ñо¿Ô±±«²ª¡¤µÏÑÇÇÙ¿ÆÓÚ11ÔÂ23ÈÕ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Á½ÌìºóËùÓÐÕßÍê³ÉÇå¾²¼Ó¹Ì£¬£¬£¬£¬£¬£¬£¬µ«Ì»Â¶Ê±³¤Î´Öª£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÔçÒÑʹÓᣡ£¡£¡£¡£¡£¡£Êý¾Ý¿â°üÀ¨9¸öÊý¾ÝÜöÝÍ£¬£¬£¬£¬£¬£¬£¬ÆäÖС°profiles¡±¡°unique_profiles¡±¡°people¡±Èý¸öÜöÝͺ¬½ü20ÒÚÌõPII¼Í¼£¬£¬£¬£¬£¬£¬£¬º¬ÁìÓ¢ÍøÖ·¡¢Ð¡ÎÒ˽¼ÒÖ÷Ò³Õ˺𢵨ÀíλÖá¢ÊÖÒÕµÈ×ֶΣ¬£¬£¬£¬£¬£¬£¬²¿·Ö¼Í¼°üÀ¨Ð¡ÎÒ˽¼ÒÕÕÆ¬¼°ÓÊÏä¿ÉÐÅ¶ÈÆÀ·Ö¡£¡£¡£¡£¡£¡£¡£Êý¾Ý½á¹¹ÏÔʾÐÅÏ¢Ô´ÓÚ×Ô¶¯»¯ÅÀÈ¡£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÕûºÏ×ÔÏúÊÛÇ鱨¹¤¾ßApollo.io£¬£¬£¬£¬£¬£¬£¬µ«ËùÓÐÕßÉÐδȷÈÏ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬£¬£¬´ËÀà´ó¹æÄ£¡¢¸ßʱЧÐÔÊý¾Ý¼¯ÊǶñÒâ¹¥»÷Õߵġ°±¦²Ø¡±£¬£¬£¬£¬£¬£¬£¬¿É±»ÓÃÓÚ¶¨Ïò´¹ÂÚ¹¥»÷¡¢ÆóÒµÇ鱨Õì̽¡¢×Ô¶¯»¯¹¥»÷¼°ÐÅÏ¢²¹È«£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÆäËûй¶Êý¾Ý¿É¹¹½¨°üÀ¨ÃÜÂë¡¢×°±¸±êʶµÄÍêÕûСÎÒ˽¼ÒÐÅÏ¢¿â£¬£¬£¬£¬£¬£¬£¬½µµÍÉç»á¹¤³Ìѧ¹¥»÷Ãż÷¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/database-exposes-billions-records-linkedin-data/
4. Ƥ¶ûË¹ÏØÍ¼Êé¹ÝÊý¾Ýй¶ÊÂÎñÓ°Ïì34ÍòÈË
12ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú»ªÊ¢¶ÙÖÝÆ¤¶ûË¹ÏØÍ¼Êé¹Ýϵͳ£¨PCLS£©ÓÚ2025Äê4ÔÂ15ÈÕÖÁ21ÈÕʱ´úÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý34ÍòÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£PCLSÔÚ·¢Ã÷Òì³£ºóÁ¬Ã¦Æô¶¯ÊӲ죬£¬£¬£¬£¬£¬£¬È·ÈÏ´Ë´ÎÊÂÎñΪÍⲿ²»·¨·Ö×ÓÈëÇÖÆäÍøÂçϵͳËùÖ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¹Ù·½×ª´ï£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶²¨¼°¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬£¬²»µ«°üÀ¨Í¼Êé¹Ý¶ÁÕߣ¬£¬£¬£¬£¬£¬£¬»¹Éæ¼°ÏÖÈμ°Ç°ÈÎÔ±¹¤¼°Æä¾ìÊô¡£¡£¡£¡£¡£¡£¡£ÏêϸÀ´¿´£¬£¬£¬£¬£¬£¬£¬¶ÁÕßȺÌåй¶µÄÐÅÏ¢Ö÷ҪΪÐÕÃûºÍ³öÉúÈÕÆÚ£»£»£»£»£»£»¶øÔ±¹¤¼°Æä¼ÒÍ¥³ÉÔ±µÄÐÅϢй¶Ôò¸üΪÑÏÖØ£¬£¬£¬£¬£¬£¬£¬º¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢»¤ÕÕºÅÂë¡¢²ÆÎñÐÅÏ¢¡¢ÐÅÓÿ¨ÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¿µ½¡°ü¹ÜºÍÒ½ÁÆÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£PCLSÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¹²Ó°Ïì340,101ÈË£¬£¬£¬£¬£¬£¬£¬²¢½«ÏòËùÓÐÊÜÓ°ÏìÕß·¢ËÍÊéÃæÍ¨Öª¡£¡£¡£¡£¡£¡£¡£Îª¼õÇáDZÔÚΣº¦£¬£¬£¬£¬£¬£¬£¬PCLSΪÊÜÓ°ÏìÖ°Ô±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬PCLSÉÐδÐû²¼´Ë´ÎÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ò²Î´·¢Ã÷ÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÊÂÎñÈÏÕæ¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/pierce-county-library-data-breach-impacts-340000/
5. GogsÁãÈÕÎó²îÖ°ëÊý̻¶ЧÀÍÆ÷±»ÈëÇÖ
12ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬Gogs×÷Ϊ×ÔÍйÜGitЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÒÔÇáÁ¿¼¶¡¢Ò×°²ÅÅÌØÕ÷±»ÆÕ±éʹÓ㬣¬£¬£¬£¬£¬£¬Ö§³Ö°æ±¾¿ØÖÆ¡¢ÎÊÌâ¸ú×ٵȹ¦Ð§£¬£¬£¬£¬£¬£¬£¬Óû§¿ÉÍêÈ«ÕÆ¿ØÊý¾ÝÓë»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Î´ÐÞ¸´µÄÁãÈÕÎó²îCVE-2025-8110±»ÍþвÐÐΪÕßʹÓ㬣¬£¬£¬£¬£¬£¬Í¨¹ýÔ¶³Ì´úÂëÖ´ÐÐÈëÇÖÔ¼700̨»¥ÁªÍøÌ»Â¶µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚPutContents APIµÄ·¾¶±éÀúȱÏÝ£ºÖ»¹ÜGogsÐÞ¸´CVE-2024-55947ºóÔöǿ·¾¶ÃûÑéÖ¤£¬£¬£¬£¬£¬£¬£¬È´Î´¼ì²é·ûºÅÁ´½ÓÄ¿µÄλÖᣡ£¡£¡£¡£¡£¡£¹¥»÷Õ߿ɽ¨É躬Ãô¸ÐÎļþ·ûºÅÁ´½ÓµÄ´æ´¢¿â£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃPutContentsÁýÕÖÍⲿÎļþ£¬£¬£¬£¬£¬£¬£¬´¥·¢í§ÒâÏÂÁîÖ´ÐС£¡£¡£¡£¡£¡£¡£Wiz ResearchÔÚÊÓ²ì¿Í»§¶ñÒâÈí¼þѬȾʱ·¢Ã÷´ËÎó²î£¬£¬£¬£¬£¬£¬£¬É¨ÃèÏÔʾ³¬1400̨GogsЧÀÍÆ÷̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬£¬ÆäÖг¬50%µÄʵÀýÔ¼700̨Òѱ»ÈëÇÖ¡£¡£¡£¡£¡£¡£¡£ËùÓб»ÈëÇÖʵÀý·ºÆðÏÔ×Åģʽ£º7ÔÂ10ÈÕͳһʱ¶Î½¨ÉèµÄËæ»ú°Ë×Ö·û´æ´¢¿â£¬£¬£¬£¬£¬£¬£¬Åú×¢¹¥»÷ÓÉ×Ô¶¯»¯¹¤¾ßÇý¶¯µÄ¼òµ¥ÐÐΪÕß»òÕûÌåʵÑé¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ý¿ªÔ´C2¿ò¼ÜSupershell½¨Éè·´ÏòSSH shell£¬£¬£¬£¬£¬£¬£¬ÓëC2ЧÀÍÆ÷ͨѶ¡£¡£¡£¡£¡£¡£¡£Îó²îÅû¶ºó£¬£¬£¬£¬£¬£¬£¬Gogsά»¤ÕßÓÚ10ÔÂ30ÈÕÈÏ¿ÉȱÏÝ£¬£¬£¬£¬£¬£¬£¬µ«ÖÁ½ñδÐÞ¸´£¬£¬£¬£¬£¬£¬£¬11ÔÂ1ÈÕÒÑ·ºÆðµÚ¶þ²¨¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/185593/hacking/critical-gogs-zero-day-under-attack-700-servers-hacked.html
6. VSCode¹©Ó¦Á´¹¥»÷£º19¸ö¶ñÒâÀ©Õ¹Ö²ÈëľÂí
12ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬×Ô2ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Ò»³¡Õë¶ÔVSCode MarketplaceµÄÒþ²Ø¹©Ó¦Á´¹¥»÷Ò»Á¬¾ÙÐУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý19¸ö¶ñÒâÀ©Õ¹½«¶ñÒâÈí¼þÒþ²ØÔÚÒÀÀµÏîÎļþ¼ÐÖУ¬£¬£¬£¬£¬£¬£¬Ä¿µÄËø¶¨¿ª·¢ÕßȺÌå¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉReversingLabsÇå¾²ÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃαװ³É.PNGͼÏñµÄ¶ñÒâÎļþÈçbanner.png£¬£¬£¬£¬£¬£¬£¬ÔÚÀ©Õ¹µÄnode_modulesÎļþ¼ÐÖÐÔ¤ÖÃÐ޸ĺóµÄÒÀÀµÏîÈçpath-is-absolute»ò@actions/io£¬£¬£¬£¬£¬£¬£¬²¢ÔÚindex.jsÖÐÌí¼ÓÌØÊâÀ࣬£¬£¬£¬£¬£¬£¬ÊµÏÖVSCodeÆô¶¯Ê±×Ô¶¯Ö´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£Ïêϸ¹¥»÷Á÷³ÌÏÔʾ£¬£¬£¬£¬£¬£¬£¬¶ñÒâÀ©Õ¹Í¨¹ýÀ¦°ónode_modulesÎļþ¼Ð×èÖ¹VSCode´Ónpm×¢²á±í»ñÈ¡ÒÀÀµÏ£¬£¬£¬£¬£¬£¬ÒÀÀµÏîÖеÄlockÎļþ°üÀ¨»ìÏýµÄJavaScriptͶ·ÅÆ÷£¬£¬£¬£¬£¬£¬£¬¶øÎ±×°³ÉPNGµÄѹËõÎļþÔò°üÀ¨cmstp.exeºÍRustľÂí³ÌÐò¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜľÂíÏêϸ¹¦Ð§ÈÔÔÚÆÊÎöÖУ¬£¬£¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷ÒѶԿª·¢Õßϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£¡£Éæ¼°µÄ19¸ö¶ñÒâÀ©Õ¹¾ù½ÓÄÉ¡°Ö÷Ì⡱ÀàÃû³Æ±äÌ壬£¬£¬£¬£¬£¬£¬Èç¡°Âí¶û¿ÆÄ·Ö÷Ì⡱¡°PandaExpressÖ÷Ì⡱£¬£¬£¬£¬£¬£¬£¬°æ±¾Í³Ò»Îª1.0.0£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓÉReversingLabs±¨¸æÎ¢Èí²¢ËùÓÐÒÆ³ý¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬×°ÖùýÕâЩÀ©Õ¹µÄÓû§ÈÔÐèɨÃèϵͳÒÔÅŲéÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-vscode-marketplace-extensions-hid-trojan-in-fake-png-file/


¾©¹«Íø°²±¸11010802024551ºÅ