npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷ £¬¶ñÒâÈí¼þÃé×¼¿ª·¢ÈËÔ±

Ðû²¼Ê±¼ä 2024-11-07

1.npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷ £¬¶ñÒâÈí¼þÃé×¼¿ª·¢ÈËÔ±


11ÔÂ5ÈÕ £¬Ò»³¡Õë¶Ô¿ª·¢ÈËÔ±µÄÓòÃûÇÀ×¢»î¶¯ÕýÔÚͨ¹ýÊý°Ù¸öÁ÷ÐеÄJavaScript¿â£¨Ã¿ÖÜÏÂÔØÁ¿´ïÊýǧÍò´Î£©Á÷´«¶ñÒâÈí¼þ £¬ÒÔÇÔÈ¡ºÍ¼àÊÓÐÅÏ¢ ¡£¸Ãnpm¹©Ó¦Á´¹¥»÷ËƺõÆðÔ´ÓÚ10Ô·Ý £¬¶à¼ÒÄþ¾²»ú¹¹ÒÑ·¢³ö¾¯±¨ ¡£¹¥»÷ÕßÐû²¼¿´ËƺϷ¨µÄ¶ñÒânpm°ü £¬Ãû³ÆÓëºÏ·¨°üÏàËƵ«ÂÔÓвîÒì £¬ÓÕÆ­¿ª·¢ÈËÔ±°²×° £¬´Ó¶ø»ñµÃ¶ÔÆä»úÆ÷µÄ³Ö¾Ã·ÃÎÊȨÏÞ ¡£ÕâЩ¶ñÒâ°üʹÓÃÒÔÌ«·»ÖÇÄܺÏÔ¼½øÐÐÃüÁîºÍ¿ØÖÆ£¨C2£©²Ù×÷ £¬Ê¹´«Í³C2×èÖ¹ÒªÁìʧЧ £¬Ôö¼ÓÁ˶ñÒâÈí¼þ·Ö·¢»î¶¯µÄÒþ±ÎÐÔ ¡£SocketºÍPhylumµÄÄþ¾²Ñо¿ÈËÔ±ÔÚÍòÊ¥½ÚÆڼ䷢³ö¾¯¸æ £¬Ö¸ÉíÊÀ·Ý²»Ã÷µÄ¶ñÒâ·Ö×ÓÕýÔÚʹÓÃαװ³ÉPuppeteer¡¢Bignum.jsºÍÖÖÖÖ¼ÓÃÜ»õ±Ò¿âµÄÓòÃûÇÀ×¢°ü£¨¹²287¸ö°ü£©½øÐй¥»÷ ¡£CheckmarxÒ²Ðû²¼ÁËÀàËƾ¯¸æ £¬Ö¸³ö¶ñÒâÈí¼þ¡°jest-fet-mock¡±Ö¼ÔÚð³äºÏ·¨µÄJavaScript²âÊÔʵÓ÷¨Ê½ ¡£Checkmarx·¢ÏÖ £¬¶ñÒâÈí¼þÔÚ°²×°ºó»áÖ´ÐÐϵͳÕì²ì £¬Æ¾¾ÝÖ÷»ú²Ù×÷ϵͳÏÂÔØÊʵ±µÄÓÐЧ¸ºÔØ £¬ÇÔȡƾ¾Ý²¢½¨Á¢³Ö¾ÃÐÔ ¡£


https://www.theregister.com/2024/11/05/typosquatting_npm_campaign/


2. Winos4.0¿ò¼Ü£ººÚ¿ÍÀûÓÃÓÎÏ·Ó¦ÓÃÃé×¼WindowsÓû§½øÐжñÒâ¹¥»÷


11ÔÂ6ÈÕ £¬ºÚ¿Í½üÆÚƵ·±ÀûÓöñÒâµÄWinos4.0¿ò¼Ü¹¥»÷WindowsÓû§ £¬¸Ã¿ò¼Üͨ¹ýαװ³ÉÎÞº¦µÄÓÎÏ·Ïà¹ØÓ¦Ó÷¨Ê½½øÐÐÁ÷´« ¡£¾ÝÇ÷ÊƿƼ¼½ñÏÄÐû²¼µÄ³ÂËß £¬Ò»¸öÃûΪVoid Arachne/Silver FoxµÄÍþвÐÐΪÕßÔøÀûÓÃÐ޸IJ¢À¦°ó¶ñÒâ×é¼þµÄÈí¼þ£¨ÈçVPNºÍ¹È¸èChromeä¯ÀÀÆ÷£©Õë¶ÔÖйúÊг¡ ¡£ÏÖÍøÂçÄþ¾²¹«Ë¾Fortinet·¢ÏÖ £¬ºÚ¿Í»î¶¯ÒÑÑݱä £¬¼ÌÐøÒÀÀµÓÎÏ·ºÍÓÎÏ·Ïà¹ØÎļþ¹¥»÷ÖйúÓû§ ¡£µ±Ö´ÐÐαװ³ÉºÏ·¨µÄ°²×°·¨Ê½Ê± £¬ËüÃÇ»á´ÓÌض¨ÍøÖ·ÏÂÔØDLLÎļþ £¬Æô¶¯¶à²½ÖèѬȾ¹ý³Ì ¡£Õâ°üÂÞÏÂÔØÆäËûÎļþ¡¢ÉèÖÃÖ´Ðл·¾³¡¢½¨Á¢³Ö¾ÃÐÔ¡¢¼ÓÔØAPI¡¢¼ìË÷ÅäÖÃÊý¾Ý¡¢½¨Á¢ÓëC2·þÎñÆ÷µÄÁ¬½ÓµÈ ¡£×îÖÕ £¬¼ÓÔصĵǼÄ£¿éÖ´ÐÐÖ÷Òª¶ñÒâ²Ù×÷ £¬ÈçÊÕ¼¯ÏµÍ³ÐÅÏ¢¡¢¼ì²éÄþ¾²Èí¼þ¡¢ÊÕ¼¯¼ÓÃÜ»õ±ÒÇ®°üÊý¾Ý¡¢Î¬³ÖÓëC2·þÎñÆ÷µÄÁ¬½Ó £¬ÒÔ¼°½ØÆÁ¡¢¼àÊÓ¼ôÌù°å±ä»¯ºÍÇÔÈ¡Îļþ ¡£Winos4.0»¹Äܼì²é¶àÖÖÄþ¾²¹¤¾ß½ø³Ì £¬ÒÔÈ·¶¨ÊÇ·ñÔÚÊܼà¿Ø»·¾³ÖÐÔËÐÐ £¬²¢µ÷ÕûÐÐΪ ¡£¸Ã¿ò¼Ü¹¦Ð§Ç¿´ó £¬ÀàËÆCobalt StrikeºÍSliver £¬ÇÒлµÄ·ºÆð±íÃ÷ÆäÔÚ¶ñÒâ²Ù×÷ÖеÄ×÷ÓÃÒÑÀιÌ ¡£


https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/


3.VEILDriveÍþв»î¶¯£ºÀûÓÃ΢ÈíSaaS·þÎñ½øÐÐÍøÂçµöÓãÓë¶ñÒâÈí¼þ²¿Êð


11ÔÂ6ÈÕ £¬Ò»ÏîÃûΪVEILDriveµÄÁ¬ÐøÍþв»î¶¯±»·¢ÏÖÀûÓÃ΢ÈíµÄºÏ·¨·þÎñ £¬ÈçTeams¡¢SharePoint¡¢Quick AssistºÍOneDrive £¬½øÐÐÓã²æʽÍøÂçµöÓã¹¥»÷²¢·Ö·¢¶ñÒâÈí¼þ ¡£ÒÔÉ«ÁÐÍøÂçÄþ¾²¹«Ë¾HuntersÔÚÊÓ²ìÒ»ÆðÕë¶ÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©×éÖ¯µÄÍøÂçʼþʱ·¢ÏÖÁËÕâÒ»»î¶¯ ¡£¹¥»÷Õßð³äITÍŶӳÉÔ± £¬Í¨¹ýTeamsÏûÏ¢ºÍ¿ìËÙÖúÊÖ¹¤¾ßÇëÇóÔ¶³Ì·ÃÎÊϵͳ £¬²¢ÀûÓÃ֮ǰÊܵ½¹¥»÷µÄ×éÖ¯µÄ¿ÉÐÅ»ù´¡ÉèÊ©À´·Ö·¢¹¥»÷ ¡£ËûÃÇͨ¹ýSharePoint·ÖÏíÁËÒ»¸öÖ¸ÏòÍйÜÔÚ²îÒì×⻧ÉϵÄZIP´æµµÎļþµÄÏÂÔØÁ´½Ó £¬¸Ã´æµµÖÐǶÈëÁËÔ¶³Ì·ÃÎʹ¤¾ßLiteManager ¡£È»ºó £¬Í¨¹ý¿ìËÙÖúÊÖ»ñµÃµÄÔ¶³Ì·ÃÎÊȨÏÞ £¬ÔÚϵͳÉÏ´´½¨Á˶¨ÆÚÖ´ÐÐLiteManagerµÄ¼Æ»®ÈÎÎñ ¡ £»¹ÏÂÔØÁ˵ڶþ¸öZIPÎļþ £¬ÆäÖаüÂÞ»ùÓÚJavaµÄ¶ñÒâÈí¼þºÍÕû¸öJava¿ª·¢¹¤¾ß°ü ¡£¸Ã¶ñÒâÈí¼þʹÓÃÓ²±àÂëµÄƾ¾ÝÁ¬½Óµ½¶ÔÊÖ¿ØÖƵÄOneDriveÕÊ»§ £¬²¢½«ÆäÓÃ×÷ÃüÁîºÍ¿ØÖÆ·þÎñÆ÷ £¬ÒÔÔÚÊÜѬȾµÄϵͳÉÏ»ñÈ¡ºÍÖ´ÐÐPowerShellÃüÁî ¡£ÕâÖÖÒÀÀµSaaSµÄ¼Æıʹʵʱ¼ì²â±äµÃÅÓ´ó £¬²¢ÈƹýÁË´«Í³·ÀÓù´ëÊ© ¡£


https://thehackernews.com/2024/11/veildrive-attack-exploits-microsoft.html


4.»ªÊ¢¶ÙÖÝ·¨ÔºÏµÍ³ÔâÍøÂç¹¥»÷̱»¾ £¬½ô¼±»Ö¸´ÖÐ


11ÔÂ6ÈÕ £¬×ÔÖÜÈÕ¹ÙÔ±·¢ÏÖÍøÂç´æÔÚ¡°Î´¾­ÊÚȨµÄ»î¶¯¡±ÒÔÀ´ £¬»ªÊ¢¶ÙÖݸ÷µØµÄ·¨ÔºÏµÍ³ÏÝÈë̱»¾ £¬ËùÓÐÖÝ·¨ÔºµÄ˾·¨ÐÅϢϵͳ¡¢ÍøÕ¾¼°Ïà¹Ø·þÎñ¾ùÊÜÁ¬ÐøÓ°Ïì ¡£¾Ý¡¶Î÷ÑÅͼʱ±¨¡·±¨µÀ £¬·¨Ôº¹ÜÀí°ì¹«ÊÒ£¨AOC£©ÒÑѸËÙÐж¯ £¬È·±£Òªº¦ÏµÍ³Äþ¾²²¢Å¬Á¦»Ö¸´·þÎñ ¡£AOC¸±Ö÷ÈÎεϡ¤·ÑÀ׶ûÌåÏÖ £¬³öÓÚÄþ¾²¿¼ÂÇ £¬ÏµÍ³ÒÑÖ÷¶¯¹Ø±Õ £¬²¢Óëר¼ÒºÏ×÷ÖçÒ¹»Ö¸´ ¡£²¿ÃÅÊз¨ÔººÍµØÓò·¨ÔºÈÔÔÚÌṩÓÐÏÞ·þÎñ £¬¶øƤ¶û˹Ïظߵȷ¨ÔºÊé¼ÇÔ±°ì¹«ÊÒËä·þÎñÖжÏ £¬µ«ÈԿɽøÐÐÔÚÏß·ÃÎÊ £¬²¢Õý»ý¼«»Ö¸´·þÎñ ¡£Ô¤¼Æ·¨Ôº»ù±¾Ö°ÄܺÍËßËÏ·¨Ê½½«°´¼Æ»®½øÐÐ £¬¿Í»§·þÎñ¹ñ̨¿ª·Å £¬µ«½¨ÒéÌáÇ°È·ÈÏ·þÎñ¿ÉÓÃÐÔ ¡£Í¬Ê± £¬²¿ÃÅ·þÎñÈçÅоö/·£¿îÓà¶îÐÅÏ¢ºÍµç×Ó·¨Í¥¼Ç¼ËÑË÷ÔÚƤ¶û˹ÏØ·¨Ôº»Ö¸´Ç°Ôݲ»ÐÐÓà ¡£ÀàËÆʼþÔøÔÚ¿°Èø˹ÖÝ·¢Éú £¬2023Äê10ÔÂÖÐÑ® £¬Æä·¨Ôº¹ÜÀí¾ÖÍøÂçÔâÈëÇÖ £¬ºÚ¿ÍÇÔÈ¡Ãô¸ÐÎļþ £¬¾ßÓÐÀÕË÷Èí¼þ¹¥»÷¼£Ïó £¬ÆÈʹ˾·¨²¿ÃŹرնà¸öÐÅϢϵͳ ¡£


https://www.bleepingcomputer.com/news/security/washington-courts-systems-offline-following-weekend-cyberattack/


5.SteelFox¶ñÒâÈí¼þ£ºÀûÓÃÒ×Êܹ¥»÷Çý¶¯¼¼ÊõÇÔÈ¡ÐÅÏ¢ÓëÍÚ¾ò¼ÓÃÜ»õ±Ò


11ÔÂ6ÈÕ £¬ÃûΪ¡°SteelFox¡±µÄжñÒâÈí¼þÀûÓá°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯·¨Ê½¡±¼¼Êõ»ñÈ¡WindowsϵͳȨÏÞ £¬ÒÔÍÚ¾ò¼ÓÃÜ»õ±Ò²¢ÇÔÈ¡ÐÅÓÿ¨Êý¾ÝµÈÐÅÏ¢ ¡£¸ÃÈí¼þͨ¹ýÂÛ̳ºÍÖÖ×Ó×·×ÙÆ÷ÒÔÆƽ⹤¾ßµÄÐÎʽ·Ö·¢ £¬¿É¼¤»î¶àÖÖÈí¼þµÄºÏ·¨°æ±¾ ¡£¿¨°Í˹»ùÑо¿ÈËÔ±ÓÚ8Ô·¢Ïָù¥»÷»î¶¯ £¬µ«¶ñÒâÈí¼þ×Ô2023Äê2ÔÂÒÑ´æÔÚ £¬²¢Í¨¹ý¶àÖÖÇþµÀÔö¼ÓÁËÁ÷´« ¡£SteelFoxʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯·¨Ê½ÌáÉýȨÏÞ £¬´´½¨·þÎñ²¢ÀûÓ鶴½«È¨ÏÞÌáÉýµ½×î¸ß¼¶±ð ¡£¸Ã¶ñÒâÈí¼þ»¹ÓÃÓÚ¼ÓÃÜ»õ±ÒÍÚ¾ò £¬²¢¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ £¬´ÓÍøÂçä¯ÀÀÆ÷ÖÐÌáÈ¡Êý¾Ý ¡£¾¡¹ÜC2ÓòÊÇÓ²±àÂëµÄ £¬µ«ÍþвÐÐΪÕßͨ¹ýÇл»IPµØÖ·ºÍʹÓÃGoogle¹«¹²DNSºÍDoHÒþ²ØÆäλÖà ¡£SteelFox¹¥»÷ûÓÐÌض¨Ä¿±ê £¬µ«Ö÷ÒªÕë¶ÔAutoCAD¡¢JetBrainsºÍFoxit PDF EditorµÄÓû§ £¬ÒÑѬȾ¶à¸ö¹ú¼ÒµÄϵͳ ¡£


https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/


6.SelectBlindsÍøÕ¾ÔâºÚ¿Í¹¥»÷ £¬20ÍòÖ÷¹ËÐÅÓÿ¨ÐÅÏ¢±»µÁ


11ÔÂ7ÈÕ £¬ºÚ¿ÍÔÚ´óÐÍÁãÊÛÉÌSelectBlindsµÄÍøÕ¾ÉÏÖ²ÈëÁ˶ñÒâÈí¼þ £¬µ¼ÖÂ20¶àÍòÖ÷¹ËµÄÐÅÓÿ¨ÐÅÏ¢ºÍÆäËûÊý¾Ý±»µÁ ¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó1ÔÂ7ÈÕ¾ÍÒÑ´æÔÚ £¬ÓÚ9ÔÂ28ÈÕ±»Ô±¹¤·¢ÏÖ ¡£³ýÁ˵ǼÐÅÏ¢ £¬ºÚ¿Í»¹¿ÉÄÜ»ñÈ¡ÁËÖ÷¹ËµÄÐÕÃû¡¢µç×ÓÓʼþ¡¢ËÍ»õºÍÕ˵¥µØÖ·¡¢µç»°ºÅÂëÒÔ¼°Ö§¸¶¿¨ºÅ¡¢ÓÐЧÆÚºÍÄþ¾²/CVV´úÂë ¡£ÎªÁËÆÈʹÓû§¸ü¸ÄÃÜÂë £¬SelectBlindsÒÑËø¶¨Óû§ÕË»§²¢É¾³ýÁ˶ñÒâÈí¼þ £¬Í¬Ê±¾¯¸æÔÚÆäËûÍøÕ¾ÉÏÖظ´Ê¹ÓÃÏàͬµÇ¼ÐÅÏ¢µÄÈËÓ¦Á¢¼´¸ü¸ÄÃÜÂë ¡£ºÚ¿ÍÀûÓõç×ÓµÁË¢Æ÷ÇÔÈ¡ÐÅÓÿ¨ÐÅÏ¢ÒѳÉΪºã¾Ã´æÔÚµÄÎÊÌâ £¬ËûÃÇͨ¹ýÏòÒ×Êܹ¥»÷µÄÍøÕ¾×¢Èë¶ñÒâ´úÂëÀ´²¶×½Ãô¸ÐÊý¾Ý £¬²¢½«ÕâЩÐÅÏ¢³öÊÛ¸øÐÅÓÿ¨ÆÛÕ©»ú¹¹ ¡£¾ÝRecorded FutureÔÚÉϸöÔµÄÒ»·Ý³ÂËßÖгÆ £¬ºÚ¿ÍÔÚ°µÍøÐÅÓÿ¨É̵êÖÐÐû²¼ÁË1500ÍòÌõÐÅÓÿ¨¼Ç¼ÒÔ¹©³öÊÛ ¡£


https://therecord.media/selectblinds-customers-credit-card-info-data-breach-website-malware