npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬£¬£¬£¬£¬¶ñÒâÈí¼þÃé×¼¿ª·¢Ö°Ô±
Ðû²¼Ê±¼ä 2024-11-071.npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬£¬£¬£¬£¬¶ñÒâÈí¼þÃé×¼¿ª·¢Ö°Ô±
https://www.theregister.com/2024/11/05/typosquatting_npm_campaign/
2. Winos4.0¿ò¼Ü£ººÚ¿ÍʹÓÃÓÎÏ·Ó¦ÓÃÃé×¼WindowsÓû§¾ÙÐжñÒâ¹¥»÷
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬ºÚ¿Í½üÆÚƵÈÔʹÓöñÒâµÄWinos4.0¿ò¼Ü¹¥»÷WindowsÓû§£¬£¬£¬£¬£¬¸Ã¿ò¼Üͨ¹ýαװ³ÉÎÞº¦µÄÓÎÏ·Ïà¹ØÓ¦ÓóÌÐò¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÇ÷ÊÆ¿Æ¼¼½ñÏÄÐû²¼µÄ±¨¸æ£¬£¬£¬£¬£¬Ò»¸öÃûΪVoid Arachne/Silver FoxµÄÍþвÐÐΪÕßÔøÊ¹ÓÃÐ޸IJ¢À¦°ó¶ñÒâ×é¼þµÄÈí¼þ£¨ÈçVPNºÍ¹È¸èChromeä¯ÀÀÆ÷£©Õë¶ÔÖйúÊг¡¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÍøÂçÇå¾²¹«Ë¾Fortinet·¢Ã÷£¬£¬£¬£¬£¬ºÚ¿Í»î¶¯ÒÑÑݱ䣬£¬£¬£¬£¬¼ÌÐøÒÀÀµÓÎÏ·ºÍÓÎÏ·Ïà¹ØÎļþ¹¥»÷ÖйúÓû§¡£¡£¡£¡£¡£¡£¡£¡£µ±Ö´ÐÐαװ³ÉÕýµ±µÄ×°ÖóÌÐòʱ£¬£¬£¬£¬£¬ËüÃÇ»á´ÓÌØ¶¨ÍøÖ·ÏÂÔØDLLÎļþ£¬£¬£¬£¬£¬Æô¶¯¶à°ì·¨Ñ¬È¾Àú³Ì¡£¡£¡£¡£¡£¡£¡£¡£Õâ°üÀ¨ÏÂÔØÆäËûÎļþ¡¢ÉèÖÃÖ´ÐÐÇéÐΡ¢½¨É賤ÆÚÐÔ¡¢¼ÓÔØAPI¡¢¼ìË÷ÉèÖÃÊý¾Ý¡¢½¨ÉèÓëC2ЧÀÍÆ÷µÄÅþÁ¬µÈ¡£¡£¡£¡£¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬¼ÓÔØµÄµÇ¼ģ¿£¿£¿éÖ´ÐÐÖ÷Òª¶ñÒâ²Ù×÷£¬£¬£¬£¬£¬ÈçÍøÂçϵͳÐÅÏ¢¡¢¼ì²éÇå¾²Èí¼þ¡¢ÍøÂç¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡¢Î¬³ÖÓëC2ЧÀÍÆ÷µÄÅþÁ¬£¬£¬£¬£¬£¬ÒÔ¼°½ØÆÁ¡¢¼àÊÓ¼ôÌù°åת±äºÍÇÔÈ¡Îļþ¡£¡£¡£¡£¡£¡£¡£¡£Winos4.0»¹Äܼì²é¶àÖÖÇå¾²¹¤¾ßÀú³Ì£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÊÇ·ñÔÚÊÜ¼à¿ØÇéÐÎÖÐÔËÐУ¬£¬£¬£¬£¬²¢µ÷½âÐÐΪ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¿ò¼Ü¹¦Ð§Ç¿Ê¢£¬£¬£¬£¬£¬ÀàËÆCobalt StrikeºÍSliver£¬£¬£¬£¬£¬ÇÒлµÄ·ºÆðÅú×¢ÆäÔÚ¶ñÒâ²Ù×÷ÖеÄ×÷ÓÃÒÑÀο¿¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/
3.VEILDriveÍþв»î¶¯£ºÊ¹ÓÃ΢ÈíSaaSЧÀ;ÙÐÐÍøÂç´¹ÂÚÓë¶ñÒâÈí¼þ°²ÅÅ
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬Ò»ÏîÃûΪVEILDriveµÄÒ»Á¬Íþв»î¶¯±»·¢Ã÷ʹÓÃ΢ÈíµÄÕýµ±Ð§ÀÍ£¬£¬£¬£¬£¬ÈçTeams¡¢SharePoint¡¢Quick AssistºÍOneDrive£¬£¬£¬£¬£¬¾ÙÐÐÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷²¢·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾HuntersÔÚÊÓ²ìÒ»ÆðÕë¶ÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©×éÖ¯µÄÍøÂçÊÂÎñʱ·¢Ã÷ÁËÕâÒ»»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßð³äITÍŶӳÉÔ±£¬£¬£¬£¬£¬Í¨¹ýTeamsÐÂÎźͿìËÙÖúÊÖ¹¤¾ßÇëÇóÔ¶³Ì»á¼ûϵͳ£¬£¬£¬£¬£¬²¢Ê¹ÓÃ֮ǰÊܵ½¹¥»÷µÄ×éÖ¯µÄ¿ÉÐÅ»ù´¡ÉèÊ©À´·Ö·¢¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ýSharePoint·ÖÏíÁËÒ»¸öÖ¸ÏòÍйÜÔÚ²î±ð×â»§ÉϵÄZIP´æµµÎļþµÄÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬¸Ã´æµµÖÐǶÈëÁËÔ¶³Ì»á¼û¹¤¾ßLiteManager¡£¡£¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬Í¨¹ý¿ìËÙÖúÊÖ»ñµÃµÄÔ¶³Ì»á¼ûȨÏÞ£¬£¬£¬£¬£¬ÔÚϵͳÉϽ¨ÉèÁ˰´ÆÚÖ´ÐÐLiteManagerµÄÍýÏëʹÃü¡£¡£¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£»£»¹ÏÂÔØÁ˵ڶþ¸öZIPÎļþ£¬£¬£¬£¬£¬ÆäÖаüÀ¨»ùÓÚJavaµÄ¶ñÒâÈí¼þºÍÕû¸öJava¿ª·¢¹¤¾ß°ü¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÓ²±àÂëµÄƾ֤ÅþÁ¬µ½µÐÊÖ¿ØÖƵÄOneDriveÕÊ»§£¬£¬£¬£¬£¬²¢½«ÆäÓÃ×÷ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬ÒÔÔÚÊÜѬȾµÄϵͳÉÏ»ñÈ¡ºÍÖ´ÐÐPowerShellÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÒÀÀµSaaSµÄÕ½ÂÔʹʵʱ¼ì²â±äµÃÖØ´ó£¬£¬£¬£¬£¬²¢ÈƹýÁ˹Űå·ÀÓù²½·¥¡£¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/11/veildrive-attack-exploits-microsoft.html
4.»ªÊ¢¶ÙÖÝ·¨ÔºÏµÍ³ÔâÍøÂç¹¥»÷̱»¾£¬£¬£¬£¬£¬½ôÆÈ»Ö¸´ÖÐ
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬×ÔÖÜÈÕ¹ÙÔ±·¢Ã÷ÍøÂç±£´æ¡°Î´¾ÊÚȨµÄ»î¶¯¡±ÒÔÀ´£¬£¬£¬£¬£¬»ªÊ¢¶ÙÖݸ÷µØµÄ·¨ÔºÏµÍ³ÏÝÈë̱»¾£¬£¬£¬£¬£¬ËùÓÐÖÝ·¨ÔºµÄ˾·¨ÐÅϢϵͳ¡¢ÍøÕ¾¼°Ïà¹ØÐ§À;ùÊÜÒ»Á¬Ó°Ïì¡£¡£¡£¡£¡£¡£¡£¡£¾Ý¡¶Î÷ÑÅͼʱ±¨¡·±¨µÀ£¬£¬£¬£¬£¬·¨ÔºÖÎÀí°ì¹«ÊÒ£¨AOC£©ÒÑѸËÙÐж¯£¬£¬£¬£¬£¬È·±£Òªº¦ÏµÍ³Çå¾²²¢Æð¾¢»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£AOC¸±Ö÷ÈÎεϡ¤·ÑÀ×¶ûÌåÏÖ£¬£¬£¬£¬£¬³öÓÚÇ徲˼Á¿£¬£¬£¬£¬£¬ÏµÍ³ÒÑ×Ô¶¯¹Ø±Õ£¬£¬£¬£¬£¬²¢Óëר¼ÒÏàÖúÖçÒ¹»Ö¸´¡£¡£¡£¡£¡£¡£¡£¡£²¿·ÖÊз¨ÔººÍµØÇø·¨ÔºÈÔÔÚÌṩÓÐÏÞЧÀÍ£¬£¬£¬£¬£¬¶øÆ¤¶ûË¹ÏØ¸ßµÈ·¨ÔºÊé¼ÇÔ±°ì¹«ÊÒËäЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬µ«ÈԿɾÙÐÐÔÚÏß»á¼û£¬£¬£¬£¬£¬²¢ÕýÆð¾¢»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£Ô¤¼Æ·¨Ôº»ù±¾Ö°ÄܺÍËßËϳÌÐò½«°´ÍýÏë¾ÙÐУ¬£¬£¬£¬£¬¿Í»§Ð§À͹ñ̨¿ª·Å£¬£¬£¬£¬£¬µ«½¨ÒéÌáǰȷÈÏЧÀÍ¿ÉÓÃÐÔ¡£¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬²¿·ÖЧÀÍÈçѶ¶Ï/·£¿£¿£¿îÓà¶îÐÅÏ¢ºÍµç×Ó·¨Í¥¼Í¼ËÑË÷ÔÚÆ¤¶ûË¹ÏØ·¨Ôº»Ö¸´Ç°Ôݲ»¿ÉÓᣡ£¡£¡£¡£¡£¡£¡£ÀàËÆÊÂÎñÔøÔÚ¿°ÈøË¹Öݱ¬·¢£¬£¬£¬£¬£¬2023Äê10ÔÂÖÐÑ®£¬£¬£¬£¬£¬Æä·¨ÔºÖÎÀí¾ÖÍøÂçÔâÈëÇÖ£¬£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡Ãô¸ÐÎļþ£¬£¬£¬£¬£¬¾ßÓÐÀÕË÷Èí¼þ¹¥»÷¼£Ï󣬣¬£¬£¬£¬ÆÈʹ˾·¨²¿·Ö¹Ø±Õ¶à¸öÐÅϢϵͳ¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/washington-courts-systems-offline-following-weekend-cyberattack/
5.SteelFox¶ñÒâÈí¼þ£ºÊ¹ÓÃÒ×Êܹ¥»÷ÇýÏÂÊÖÒÕÇÔÊØÐÅÏ¢ÓëÍÚ¾ò¼ÓÃÜÇ®±Ò
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬ÃûΪ¡°SteelFox¡±µÄжñÒâÈí¼þʹÓá°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò¡±ÊÖÒÕ»ñÈ¡WindowsϵͳȨÏÞ£¬£¬£¬£¬£¬ÒÔÍÚ¾ò¼ÓÃÜÇ®±Ò²¢ÇÔÊØÐÅÓÿ¨Êý¾ÝµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÈí¼þͨ¹ýÂÛ̳ºÍÖÖ×Ó×·×ÙÆ÷ÒÔÆÆ½â¹¤¾ßµÄÐÎʽ·Ö·¢£¬£¬£¬£¬£¬¿É¼¤»î¶àÖÖÈí¼þµÄÕýµ±°æ±¾¡£¡£¡£¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÑо¿Ö°Ô±ÓÚ8Ô·¢Ã÷¸Ã¹¥»÷»î¶¯£¬£¬£¬£¬£¬µ«¶ñÒâÈí¼þ×Ô2023Äê2ÔÂÒѱ£´æ£¬£¬£¬£¬£¬²¢Í¨¹ý¶àÖÖÇþµÀÔöÌíÁËÈö²¥¡£¡£¡£¡£¡£¡£¡£¡£SteelFoxʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÌáÉýȨÏÞ£¬£¬£¬£¬£¬½¨ÉèЧÀͲ¢Ê¹ÓÃÎó²î½«È¨ÏÞÌáÉýµ½×î¸ß¼¶±ð¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹ÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¾ò£¬£¬£¬£¬£¬²¢¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ£¬£¬£¬£¬£¬´ÓÍøÂçä¯ÀÀÆ÷ÖÐÌáÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜC2ÓòÊÇÓ²±àÂëµÄ£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕßͨ¹ýÇл»IPµØµãºÍʹÓÃGoogle¹«¹²DNSºÍDoHÒþ²ØÆäλÖᣡ£¡£¡£¡£¡£¡£¡£SteelFox¹¥»÷ûÓÐÌØ¶¨Ä¿µÄ£¬£¬£¬£¬£¬µ«Ö÷ÒªÕë¶ÔAutoCAD¡¢JetBrainsºÍFoxit PDF EditorµÄÓû§£¬£¬£¬£¬£¬ÒÑѬȾ¶à¸ö¹ú¼ÒµÄϵͳ¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/
6.SelectBlindsÍøÕ¾ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬20ÍòÖ÷¹ËÐÅÓÿ¨ÐÅÏ¢±»µÁ
11ÔÂ7ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ´óÐÍÁãÊÛÉÌSelectBlindsµÄÍøÕ¾ÉÏÖ²ÈëÁ˶ñÒâÈí¼þ£¬£¬£¬£¬£¬µ¼ÖÂ20¶àÍòÖ÷¹ËµÄÐÅÓÿ¨ÐÅÏ¢ºÍÆäËûÊý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó1ÔÂ7ÈÕ¾ÍÒѱ£´æ£¬£¬£¬£¬£¬ÓÚ9ÔÂ28ÈÕ±»Ô±¹¤·¢Ã÷¡£¡£¡£¡£¡£¡£¡£¡£³ýÁ˵ǼÐÅÏ¢£¬£¬£¬£¬£¬ºÚ¿Í»¹¿ÉÄÜ»ñÈ¡ÁËÖ÷¹ËµÄÐÕÃû¡¢µç×ÓÓʼþ¡¢ËÍ»õºÍÕ˵¥µØµã¡¢µç»°ºÅÂëÒÔ¼°Ö§¸¶¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÇå¾²/CVV´úÂë¡£¡£¡£¡£¡£¡£¡£¡£ÎªÁËÆÈʹÓû§¸ü¸ÄÃÜÂ룬£¬£¬£¬£¬SelectBlindsÒÑËø¶¨Óû§ÕË»§²¢É¾³ýÁ˶ñÒâÈí¼þ£¬£¬£¬£¬£¬Í¬Ê±ÖÒÑÔÔÚÆäËûÍøÕ¾ÉÏÖØ¸´Ê¹ÓÃÏàͬµÇ¼ÐÅÏ¢µÄÈËÓ¦Á¬Ã¦¸ü¸ÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍʹÓõç×ÓµÁË¢Æ÷ÇÔÊØÐÅÓÿ¨ÐÅÏ¢ÒѳÉΪºã¾Ã±£´æµÄÎÊÌ⣬£¬£¬£¬£¬ËûÃÇͨ¹ýÏòÒ×Êܹ¥»÷µÄÍøÕ¾×¢Èë¶ñÒâ´úÂëÀ´²¶»ñÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬²¢½«ÕâЩÐÅÏ¢³öÊÛ¸øÐÅÓÿ¨Ú²Æ»ú¹¹¡£¡£¡£¡£¡£¡£¡£¡£¾ÝRecorded FutureÔÚÉϸöÔµÄÒ»·Ý±¨¸æÖгƣ¬£¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍøÐÅÓÿ¨ÊÐËÁÖÐÐû²¼ÁË1500ÍòÌõÐÅÓÿ¨¼Í¼ÒÔ¹©³öÊÛ¡£¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/selectblinds-customers-credit-card-info-data-breach-website-malware


¾©¹«Íø°²±¸11010802024551ºÅ