npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬¶ñÒâÈí¼þÃé×¼¿ª·¢ÈËÔ±

Ðû²¼Ê±¼ä 2024-11-07

1.npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬¶ñÒâÈí¼þÃé×¼¿ª·¢ÈËÔ±


11ÔÂ5ÈÕ£¬Ò»³¡Õë¶Ô¿ª·¢ÈËÔ±µÄÓòÃûÇÀ×¢»î¶¯ÕýÔÚͨ¹ýÊý°Ù¸öÁ÷ÐеÄJavaScript¿â£¨Ã¿ÖÜÏÂÔØÁ¿´ïÊýǧÍò´Î£©Á÷´«¶ñÒâÈí¼þ£¬ÒÔÇÔÈ¡ºÍ¼àÊÓÐÅÏ¢¡£¸Ãnpm¹©Ó¦Á´¹¥»÷ËƺõÆðÔ´ÓÚ10Ô·Ý£¬¶à¼ÒÄþ¾²»ú¹¹ÒÑ·¢³ö¾¯±¨¡£¹¥»÷ÕßÐû²¼¿´ËƺϷ¨µÄ¶ñÒânpm°ü£¬Ãû³ÆÓëºÏ·¨°üÏàËƵ«ÂÔÓвîÒ죬ÓÕÆ­¿ª·¢ÈËÔ±°²×°£¬´Ó¶ø»ñµÃ¶ÔÆä»úÆ÷µÄ³Ö¾Ã·ÃÎÊȨÏÞ¡£ÕâЩ¶ñÒâ°üʹÓÃÒÔÌ«·»ÖÇÄܺÏÔ¼½øÐÐÃüÁîºÍ¿ØÖÆ£¨C2£©²Ù×÷£¬Ê¹´«Í³C2×èÖ¹ÒªÁìʧЧ£¬Ôö¼ÓÁ˶ñÒâÈí¼þ·Ö·¢»î¶¯µÄÒþ±ÎÐÔ¡£SocketºÍPhylumµÄÄþ¾²Ñо¿ÈËÔ±ÔÚÍòÊ¥½ÚÆڼ䷢³ö¾¯¸æ£¬Ö¸ÉíÊÀ·Ý²»Ã÷µÄ¶ñÒâ·Ö×ÓÕýÔÚʹÓÃαװ³ÉPuppeteer¡¢Bignum.jsºÍÖÖÖÖ¼ÓÃÜ»õ±Ò¿âµÄÓòÃûÇÀ×¢°ü£¨¹²287¸ö°ü£©½øÐй¥»÷¡£CheckmarxÒ²Ðû²¼ÁËÀàËƾ¯¸æ£¬Ö¸³ö¶ñÒâÈí¼þ¡°jest-fet-mock¡±Ö¼ÔÚð³äºÏ·¨µÄJavaScript²âÊÔʵÓ÷¨Ê½¡£Checkmarx·¢ÏÖ£¬¶ñÒâÈí¼þÔÚ°²×°ºó»áÖ´ÐÐϵͳÕì²ì£¬Æ¾¾ÝÖ÷»ú²Ù×÷ϵͳÏÂÔØÊʵ±µÄÓÐЧ¸ºÔØ£¬ÇÔȡƾ¾Ý²¢½¨Á¢³Ö¾ÃÐÔ¡£


https://www.theregister.com/2024/11/05/typosquatting_npm_campaign/


2. Winos4.0¿ò¼Ü£ººÚ¿ÍÀûÓÃÓÎÏ·Ó¦ÓÃÃé×¼WindowsÓû§½øÐжñÒâ¹¥»÷


11ÔÂ6ÈÕ£¬ºÚ¿Í½üÆÚƵ·±ÀûÓöñÒâµÄWinos4.0¿ò¼Ü¹¥»÷WindowsÓû§£¬¸Ã¿ò¼Üͨ¹ýαװ³ÉÎÞº¦µÄÓÎÏ·Ïà¹ØÓ¦Ó÷¨Ê½½øÐÐÁ÷´«¡£¾ÝÇ÷ÊƿƼ¼½ñÏÄÐû²¼µÄ³ÂËߣ¬Ò»¸öÃûΪVoid Arachne/Silver FoxµÄÍþвÐÐΪÕßÔøÀûÓÃÐ޸IJ¢À¦°ó¶ñÒâ×é¼þµÄÈí¼þ£¨ÈçVPNºÍ¹È¸èChromeä¯ÀÀÆ÷£©Õë¶ÔÖйúÊг¡¡£ÏÖÍøÂçÄþ¾²¹«Ë¾Fortinet·¢ÏÖ£¬ºÚ¿Í»î¶¯ÒÑÑݱ䣬¼ÌÐøÒÀÀµÓÎÏ·ºÍÓÎÏ·Ïà¹ØÎļþ¹¥»÷ÖйúÓû§¡£µ±Ö´ÐÐαװ³ÉºÏ·¨µÄ°²×°·¨Ê½Ê±£¬ËüÃÇ»á´ÓÌض¨ÍøÖ·ÏÂÔØDLLÎļþ£¬Æô¶¯¶à²½ÖèѬȾ¹ý³Ì¡£Õâ°üÂÞÏÂÔØÆäËûÎļþ¡¢ÉèÖÃÖ´Ðл·¾³¡¢½¨Á¢³Ö¾ÃÐÔ¡¢¼ÓÔØAPI¡¢¼ìË÷ÅäÖÃÊý¾Ý¡¢½¨Á¢ÓëC2·þÎñÆ÷µÄÁ¬½ÓµÈ¡£×îÖÕ£¬¼ÓÔصĵǼÄ £¿éÖ´ÐÐÖ÷Òª¶ñÒâ²Ù×÷£¬ÈçÊÕ¼¯ÏµÍ³ÐÅÏ¢¡¢¼ì²éÄþ¾²Èí¼þ¡¢ÊÕ¼¯¼ÓÃÜ»õ±ÒÇ®°üÊý¾Ý¡¢Î¬³ÖÓëC2·þÎñÆ÷µÄÁ¬½Ó£¬ÒÔ¼°½ØÆÁ¡¢¼àÊÓ¼ôÌù°å±ä»¯ºÍÇÔÈ¡Îļþ¡£Winos4.0»¹Äܼì²é¶àÖÖÄþ¾²¹¤¾ß½ø³Ì£¬ÒÔÈ·¶¨ÊÇ·ñÔÚÊܼà¿Ø»·¾³ÖÐÔËÐУ¬²¢µ÷ÕûÐÐΪ¡£¸Ã¿ò¼Ü¹¦Ð§Ç¿´ó£¬ÀàËÆCobalt StrikeºÍSliver£¬ÇÒлµÄ·ºÆð±íÃ÷ÆäÔÚ¶ñÒâ²Ù×÷ÖеÄ×÷ÓÃÒÑÀιÌ¡£


https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/


3.VEILDriveÍþв»î¶¯£ºÀûÓÃ΢ÈíSaaS·þÎñ½øÐÐÍøÂçµöÓãÓë¶ñÒâÈí¼þ²¿Êð


11ÔÂ6ÈÕ£¬Ò»ÏîÃûΪVEILDriveµÄÁ¬ÐøÍþв»î¶¯±»·¢ÏÖÀûÓÃ΢ÈíµÄºÏ·¨·þÎñ£¬ÈçTeams¡¢SharePoint¡¢Quick AssistºÍOneDrive£¬½øÐÐÓã²æʽÍøÂçµöÓã¹¥»÷²¢·Ö·¢¶ñÒâÈí¼þ¡£ÒÔÉ«ÁÐÍøÂçÄþ¾²¹«Ë¾HuntersÔÚÊÓ²ìÒ»ÆðÕë¶ÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©×éÖ¯µÄÍøÂçʼþʱ·¢ÏÖÁËÕâÒ»»î¶¯¡£¹¥»÷Õßð³äITÍŶӳÉÔ±£¬Í¨¹ýTeamsÏûÏ¢ºÍ¿ìËÙÖúÊÖ¹¤¾ßÇëÇóÔ¶³Ì·ÃÎÊϵͳ£¬²¢ÀûÓÃ֮ǰÊܵ½¹¥»÷µÄ×éÖ¯µÄ¿ÉÐÅ»ù´¡ÉèÊ©À´·Ö·¢¹¥»÷¡£ËûÃÇͨ¹ýSharePoint·ÖÏíÁËÒ»¸öÖ¸ÏòÍйÜÔÚ²îÒì×⻧ÉϵÄZIP´æµµÎļþµÄÏÂÔØÁ´½Ó£¬¸Ã´æµµÖÐǶÈëÁËÔ¶³Ì·ÃÎʹ¤¾ßLiteManager¡£È»ºó£¬Í¨¹ý¿ìËÙÖúÊÖ»ñµÃµÄÔ¶³Ì·ÃÎÊȨÏÞ£¬ÔÚϵͳÉÏ´´½¨Á˶¨ÆÚÖ´ÐÐLiteManagerµÄ¼Æ»®ÈÎÎñ¡£»¹ÏÂÔØÁ˵ڶþ¸öZIPÎļþ£¬ÆäÖаüÂÞ»ùÓÚJavaµÄ¶ñÒâÈí¼þºÍÕû¸öJava¿ª·¢¹¤¾ß°ü¡£¸Ã¶ñÒâÈí¼þʹÓÃÓ²±àÂëµÄƾ¾ÝÁ¬½Óµ½¶ÔÊÖ¿ØÖƵÄOneDriveÕÊ»§£¬²¢½«ÆäÓÃ×÷ÃüÁîºÍ¿ØÖÆ·þÎñÆ÷£¬ÒÔÔÚÊÜѬȾµÄϵͳÉÏ»ñÈ¡ºÍÖ´ÐÐPowerShellÃüÁî¡£ÕâÖÖÒÀÀµSaaSµÄ¼Æıʹʵʱ¼ì²â±äµÃÅӴ󣬲¢ÈƹýÁË´«Í³·ÀÓù´ëÊ©¡£


https://thehackernews.com/2024/11/veildrive-attack-exploits-microsoft.html


4.»ªÊ¢¶ÙÖÝ·¨ÔºÏµÍ³ÔâÍøÂç¹¥»÷̱»¾£¬½ô¼±»Ö¸´ÖÐ


11ÔÂ6ÈÕ£¬×ÔÖÜÈÕ¹ÙÔ±·¢ÏÖÍøÂç´æÔÚ¡°Î´¾­ÊÚȨµÄ»î¶¯¡±ÒÔÀ´£¬»ªÊ¢¶ÙÖݸ÷µØµÄ·¨ÔºÏµÍ³ÏÝÈë̱»¾£¬ËùÓÐÖÝ·¨ÔºµÄ˾·¨ÐÅϢϵͳ¡¢ÍøÕ¾¼°Ïà¹Ø·þÎñ¾ùÊÜÁ¬ÐøÓ°Ïì¡£¾Ý¡¶Î÷ÑÅͼʱ±¨¡·±¨µÀ£¬·¨Ôº¹ÜÀí°ì¹«ÊÒ£¨AOC£©ÒÑѸËÙÐж¯£¬È·±£Òªº¦ÏµÍ³Äþ¾²²¢Å¬Á¦»Ö¸´·þÎñ¡£AOC¸±Ö÷ÈÎεϡ¤·ÑÀ׶ûÌåÏÖ£¬³öÓÚÄþ¾²¿¼ÂÇ£¬ÏµÍ³ÒÑÖ÷¶¯¹Ø±Õ£¬²¢Óëר¼ÒºÏ×÷ÖçÒ¹»Ö¸´¡£²¿ÃÅÊз¨ÔººÍµØÓò·¨ÔºÈÔÔÚÌṩÓÐÏÞ·þÎñ£¬¶øƤ¶û˹Ïظߵȷ¨ÔºÊé¼ÇÔ±°ì¹«ÊÒËä·þÎñÖжÏ£¬µ«ÈԿɽøÐÐÔÚÏß·ÃÎÊ£¬²¢Õý»ý¼«»Ö¸´·þÎñ¡£Ô¤¼Æ·¨Ôº»ù±¾Ö°ÄܺÍËßËÏ·¨Ê½½«°´¼Æ»®½øÐУ¬¿Í»§·þÎñ¹ñ̨¿ª·Å£¬µ«½¨ÒéÌáÇ°È·ÈÏ·þÎñ¿ÉÓÃÐÔ¡£Í¬Ê±£¬²¿ÃÅ·þÎñÈçÅоö/· £¿îÓà¶îÐÅÏ¢ºÍµç×Ó·¨Í¥¼Ç¼ËÑË÷ÔÚƤ¶û˹ÏØ·¨Ôº»Ö¸´Ç°Ôݲ»ÐÐÓá£ÀàËÆʼþÔøÔÚ¿°Èø˹ÖÝ·¢Éú£¬2023Äê10ÔÂÖÐÑ®£¬Æä·¨Ôº¹ÜÀí¾ÖÍøÂçÔâÈëÇÖ£¬ºÚ¿ÍÇÔÈ¡Ãô¸ÐÎļþ£¬¾ßÓÐÀÕË÷Èí¼þ¹¥»÷¼£Ïó£¬ÆÈʹ˾·¨²¿ÃŹرնà¸öÐÅϢϵͳ¡£


https://www.bleepingcomputer.com/news/security/washington-courts-systems-offline-following-weekend-cyberattack/


5.SteelFox¶ñÒâÈí¼þ£ºÀûÓÃÒ×Êܹ¥»÷Çý¶¯¼¼ÊõÇÔÈ¡ÐÅÏ¢ÓëÍÚ¾ò¼ÓÃÜ»õ±Ò


11ÔÂ6ÈÕ£¬ÃûΪ¡°SteelFox¡±µÄжñÒâÈí¼þÀûÓá°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯·¨Ê½¡±¼¼Êõ»ñÈ¡WindowsϵͳȨÏÞ£¬ÒÔÍÚ¾ò¼ÓÃÜ»õ±Ò²¢ÇÔÈ¡ÐÅÓÿ¨Êý¾ÝµÈÐÅÏ¢¡£¸ÃÈí¼þͨ¹ýÂÛ̳ºÍÖÖ×Ó×·×ÙÆ÷ÒÔÆƽ⹤¾ßµÄÐÎʽ·Ö·¢£¬¿É¼¤»î¶àÖÖÈí¼þµÄºÏ·¨°æ±¾¡ £¿¨°Í˹»ùÑо¿ÈËÔ±ÓÚ8Ô·¢Ïָù¥»÷»î¶¯£¬µ«¶ñÒâÈí¼þ×Ô2023Äê2ÔÂÒÑ´æÔÚ£¬²¢Í¨¹ý¶àÖÖÇþµÀÔö¼ÓÁËÁ÷´«¡£SteelFoxʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯·¨Ê½ÌáÉýȨÏÞ£¬´´½¨·þÎñ²¢ÀûÓ鶴½«È¨ÏÞÌáÉýµ½×î¸ß¼¶±ð¡£¸Ã¶ñÒâÈí¼þ»¹ÓÃÓÚ¼ÓÃÜ»õ±ÒÍÚ¾ò£¬²¢¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ£¬´ÓÍøÂçä¯ÀÀÆ÷ÖÐÌáÈ¡Êý¾Ý¡£¾¡¹ÜC2ÓòÊÇÓ²±àÂëµÄ£¬µ«ÍþвÐÐΪÕßͨ¹ýÇл»IPµØÖ·ºÍʹÓÃGoogle¹«¹²DNSºÍDoHÒþ²ØÆäλÖá£SteelFox¹¥»÷ûÓÐÌض¨Ä¿±ê£¬µ«Ö÷ÒªÕë¶ÔAutoCAD¡¢JetBrainsºÍFoxit PDF EditorµÄÓû§£¬ÒÑѬȾ¶à¸ö¹ú¼ÒµÄϵͳ¡£


https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/


6.SelectBlindsÍøÕ¾ÔâºÚ¿Í¹¥»÷£¬20ÍòÖ÷¹ËÐÅÓÿ¨ÐÅÏ¢±»µÁ


11ÔÂ7ÈÕ£¬ºÚ¿ÍÔÚ´óÐÍÁãÊÛÉÌSelectBlindsµÄÍøÕ¾ÉÏÖ²ÈëÁ˶ñÒâÈí¼þ£¬µ¼ÖÂ20¶àÍòÖ÷¹ËµÄÐÅÓÿ¨ÐÅÏ¢ºÍÆäËûÊý¾Ý±»µÁ¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó1ÔÂ7ÈÕ¾ÍÒÑ´æÔÚ£¬ÓÚ9ÔÂ28ÈÕ±»Ô±¹¤·¢ÏÖ¡£³ýÁ˵ǼÐÅÏ¢£¬ºÚ¿Í»¹¿ÉÄÜ»ñÈ¡ÁËÖ÷¹ËµÄÐÕÃû¡¢µç×ÓÓʼþ¡¢ËÍ»õºÍÕ˵¥µØÖ·¡¢µç»°ºÅÂëÒÔ¼°Ö§¸¶¿¨ºÅ¡¢ÓÐЧÆÚºÍÄþ¾²/CVV´úÂ롣ΪÁËÆÈʹÓû§¸ü¸ÄÃÜÂ룬SelectBlindsÒÑËø¶¨Óû§ÕË»§²¢É¾³ýÁ˶ñÒâÈí¼þ£¬Í¬Ê±¾¯¸æÔÚÆäËûÍøÕ¾ÉÏÖظ´Ê¹ÓÃÏàͬµÇ¼ÐÅÏ¢µÄÈËÓ¦Á¢¼´¸ü¸ÄÃÜÂë¡£ºÚ¿ÍÀûÓõç×ÓµÁË¢Æ÷ÇÔÈ¡ÐÅÓÿ¨ÐÅÏ¢ÒѳÉΪºã¾Ã´æÔÚµÄÎÊÌ⣬ËûÃÇͨ¹ýÏòÒ×Êܹ¥»÷µÄÍøÕ¾×¢Èë¶ñÒâ´úÂëÀ´²¶×½Ãô¸ÐÊý¾Ý£¬²¢½«ÕâЩÐÅÏ¢³öÊÛ¸øÐÅÓÿ¨ÆÛÕ©»ú¹¹¡£¾ÝRecorded FutureÔÚÉϸöÔµÄÒ»·Ý³ÂËßÖгÆ£¬ºÚ¿ÍÔÚ°µÍøÐÅÓÿ¨É̵êÖÐÐû²¼ÁË1500ÍòÌõÐÅÓÿ¨¼Ç¼ÒÔ¹©³öÊÛ¡£


https://therecord.media/selectblinds-customers-credit-card-info-data-breach-website-malware