npm¶ñÒâÈí¼þ¶Ô×¼AtomicºÍExodusÇ®°ü
°ä²¼¹¦·ò 2025-04-111. npm¶ñÒâÈí¼þ¶Ô×¼AtomicºÍExodusÇ®°ü
4ÔÂ10ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾ ReversingLabs£¨RL£©½üÆÚ·¢ÏÖÁËÒ»ÖÖÕë¶Ô¼ÓÃÜÇ®±ÒÓû§µÄÐÂÕ½Êõ£¬ÍøÂç·¸×ï·Ö×ÓÕýÀûÓà npm£¨½Úµã°üÖÎÀíÆ÷£©ÍøÂ磬Ïò±¾µØ×°ÖõļÓÃÜÇ®±ÒÇ®°üÈí¼þ£¨ÓÈÆäÊÇ Atomic Wallet ºÍ Exodus£©×¢Èë¶ñÒâ´úÂë¡£Õâ´Î¹¥»÷ͨ¹ý¶ñÒ⽨²¹ºÏ·¨Èí¼þÎļþʵÏÖ£¬¹¥»÷Õ߿ɽè´Ë͵͵»¥»»ÊÕ¼þÈËÇ®°üµØÖ·£¬´Ó¶øÀ¹½Ø¼ÓÃÜÇ®±Ò×ªÒÆ¡£RL ·¢ÏÖÁËÒ»¸öÃûΪ¡°pdf-to-office¡±µÄ¶ñÒâ npm °ü£¬¸Ã°ü¼Ù×°³É½« PDF Îļþת»»Îª Microsoft Office ÎĵµµÄʵÓ÷¨Ê½£¬µ«Ö´ÐÐʱ»á²¿Êð¶ñÒâ¸ºÔØ£¬Åú¸Ä Atomic Wallet ºÍ Exodus ×°ÖÃĿ¼ÖеĹؼüÎļþ¡£¶ñÒâÈí¼þÓÃľÂí°æ±¾¸²¸ÇºÏ·¨Îļþ£¬°ÂÃØ¸ü¸Ä¼ÓÃÜÇ®±ÒÂòÂôµÄÖ¸±êµØÖ·£¬ÇÒÄÑÒÔ±»¾õ²ì£¬ÓÉÓÚÇ®°üÖ÷ÌâÖ°ÄÜ¿´ËÆÎ´±ä¡£´Ë±í£¬Èí¼þ°üÖл¹·¢ÏÖÁËÒ»¸ö¾¹ý»ìºÏµÄ JavaScript Îļþ£¬Â¶³öÁËÆä¶ñÒâÒâͼ¡£Õâ´Î¹¥»÷ÓµÓÐÓÆ¾ÃÐÔ£¬¼´±ã¶ñÒâ¡°pdf-to-office¡±Èí¼þ°ü±»É¾³ý£¬ÊÜϰȾµÄ¼ÓÃÜÇ®±ÒÇ®°üÈí¼þÈÔ»áά³ÖϰȾ״̬£¬Ä¾ÂíÎļþÈÔÔÚÔËÐУ¬ÇÄÎÞÉùÏ¢µØ½«×ʽð³Á¶¨Ïòµ½¹¥»÷ÕßµÄ Web3 Ç®°ü¡£½â³ýÍþвµÄΨһÓÐЧ²½ÖèÊdz¹µ×ɾ³ý²¢³ÁÐÂ×°ÖÃÊÜÓ°ÏìµÄÇ®°üÈí¼þ¡£
https://hackread.com/npm-malware-atomic-exodus-wallets-hijack-crypto/
2. ¶íÀÕ¸ÔÖÝ»·¾³»ú¹¹ÔÚÔâ·êÍøÂç¹¥»÷ºó¹Ø¹ØÍøÂç
4ÔÂ11ÈÕ£¬½üÈÕ£¬¶íÀÕ¸ÔÖÝ»·¾³ÖÊÁ¿¾Ö£¨DEQ£©Ôâ·êÍøÂç¹¥»÷£¬µ¼ÖÂÆäÍøÂç±»ÆÈ¹Ø¹Ø¡£¸Ã»ú¹¹Õƹܼà¹Ü¶íÀÕ¸ÔÖÝµÄ¿ÕÆø¡¢µØÆ¤ºÍË®ÖÊÁ¿£¬Õâ´Î¹¥»÷¶ÔÆäÔËÓªÔì³ÉÁËÑϳÁÓ°Ïì¡£DEQ¹ÙÔ±°µÊ¾£¬³µÁ¾²é³Õ¾½«¹Ø¹ØÖÁÖÜÎ壬ÒÔÓ¦¶ÔÕâ´ÎÍøÂç¹¥»÷¡£Ä¿Ç°£¬¸Ã»ú¹¹ÔÚÈ«Á¦¸ôÀë·þÎñÆ÷ºÍÍøÂ磬ֱÖÁ¹¥»÷±»ÆëÈ«½ÚÔì²¢¿ÉÄܱ»¸ù³ý¡£DEQµÄIT¡¢ÆóÒµÐÅϢϵͳºÍ΢ÈíÍøÂ簲ȫÍŶÓÔÚçÇÃܺÏ×÷£¬¹²Í¬Ó¦¶ÔÕâ´ÎÍøÂ簲ȫÎÊÌâ¡£Óë´Ëͬʱ£¬ÆäËûÖÝÒ²°ä·¢Á˽üÆÚÓ°Ïì¹Ø¼üµ±¾Ö·þÎñµÄÍøÂçÊÂÎñ¡£ÑÇÀûÉ£ÄÇÖÝÁª¹ú¹«¹²±ç»¤È˰칫ÊÒÒòÀÕË÷Èí¼þ¹¥»÷Òѹعأ¬¶àÆð°¸¼þÉóÀí¹¦·òÒѸÄÖÁÎåÔ¡£°®´ïºÉÖݹŶ¡ÏØÍøÂçÒ²Ôâ·êÁËÀÕË÷Èí¼þ¹¥»÷£¬Ïظ¨µ¼ÒÑÁªÏµÁª¹ú·¨Âɲ¿ÃÅ£¬²¢ÀñÆ¸ÍøÂ簲ȫ¹«Ë¾ÐÖú½ÚÔìÊÂÎñ¡£´Ë±í£¬ÄÚ²¼À˹¼ÓÖݱ±ÆÕÀÌØÌìÈ»×ÊÔ´ÇøÒ²Ö¤ÊµÔâ·êÁËÍøÂç¹¥»÷ºÍÊý¾Ýй¶¡£ÖµÍ×ÌùÐĵÄÊÇ£¬½ØÖÁĿǰ£¬ÉÐÎÞÈκÎÀÕË÷Èí¼þÍÅ»ï»òºÚ¿Í×éÖ¯Ðû³Æ¶ÔÕâЩÊÂÎñÕÆ¹Ü¡£
https://therecord.media/oregon-department-environmental-quality-cyberattack
3. Gamaredon×éÖ¯Éý¼¶¹¥»÷¼¿Á©£¬Î÷·½ÍøÂçÃæ¶ÔÐÂÍþв
4ÔÂ10ÈÕ£¬¶íÂÞ˹µ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯Gamaredon£¨±ðÃû¡°Shuckworm¡±£©×Ô2025Äê2ÔÂÖÁ3Ô£¬³ÖÐøÕë¶ÔÎ÷·½¹ú¶ÈÔÚÎÚ¿ËÀ¼µÄ¾üʹ¤×÷·¢Æð¹¥»÷£¬¿ÉÄÜͨ¹ý¿ÉÒÆ¶¯Ó²Å̽øÐС£×êÑÐÈËÔ±Ö¸³ö£¬Õâ´Î¹¥»÷ÖУ¬ºÚ¿Í²¿ÊðÁ˸üа汾µÄGammaSteelÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý¡£¹¥»÷ʼÓÚÔ̺¬¶ñÒâ.LNKÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷£¬ÕâÊÇGamaredon´Óǰ³£ÓõĹ¥»÷¼¿Á©¡£Õâ´Î£¬×êÑÐÈËÔ±¹Û²ìµ½ÍþвÐÐΪÕßµÄÕ½ÊõÓÐËù±ä¶¯£¬Ô̺¬´ÓVBS¾ç±¾×ªÏò»ùÓÚPowerShellµÄ¹¤¾ß¡¢¶ÔÓÐÐ§ÔØºÉ½øÐиü¶à»ìºÏÒÔ¼°¸ü¶àµØÊ¹ÓúϷ¨·þÎñ½øÐÐÌӱܡ£ÔÚϰȾ¹ý³ÌÖУ¬Ò»¸ö¸ß¶È»ìºÏµÄ¾ç±¾»á´´½¨²¢ÔËÐÐÁ½¸öÎļþ£¬±ðÀë´¦ÖúÅÁîºÍ½ÚÔìͨѶ¼°´«²¼»úÔ죬ͬʱ°µ²ØÄ³Ð©Îļþ¼ÐºÍϵͳÎļþ¡£Gamaredon»¹Ê¹ÓÿúËÅPowerShell¾ç±¾²¶»ñºÍй¶É豸ÐÅÏ¢£¬²¢×îÖÕ²¿Êð»ùÓÚPowerShellµÄGammaSteel°æ±¾£¬ÇÔÈ¡×ÀÃæ¡¢ÎĵµºÍÏÂÔØµÈµØÎ»µÄÎĵµ¡£¸Ã¶ñÒâÈí¼þʹÓá°certutil.exe¡±¶ÔÎļþ½øÐйþÏ£´¦Ö㬲¢Í¨¹ýPowerShell WebÒªÇó»òTorÉϵÄcURL´«Êä±»µÁÊý¾Ý£¬Í¬Ê±ÔÚÖ¸±êÍÆËã»úÉϳÉÁ¢ÓƾÃÐÔ¡£
https://www.bleepingcomputer.com/news/security/russian-hackers-attack-western-military-mission-using-malicious-drive/
4. Medusa¹¥»÷Âö²«´¹Î£»¤ÀíÖÐÐÄ£¬Ð¹Â¶Êý¾Ý²¢Ë÷ÒªÊê½ð
4ÔÂ9ÈÕ£¬½üÈÕ£¬ºÚ¿Í×éÖ¯ÃÀ¶Åɯ£¨Medusa£©¶ÔÂö²«´¹Î£»¤ÀíÖÐÐÄ£¨Pulse Urgent Care Center£©·¢Æð¹¥»÷£¬¸ÃÖÐÐÄÌṩ´¹Î£»¤Àí¡¢ÁÙ´²Ò½Ñ§¡¢Å®ÐÔ½¡È«¡¢¹¤ÉËÅâ³¥ºÍ¹ÍÖ÷·þÎñµÈһϵÁÐÒ½ÁÆ·þÎñ£¬×ܲ¿Î»ÓÚ¼ÓÖÝÀ×¶¡£¬ÔÚÀ׵°ͷòÒ²ÉèÓзֲ¿¡£¾Ý±¨Â·£¬Medusa°ä²¼Á˲¿ÃÅÖ¤¾Ý£¬ÆäÖÐÔ̺¬Ò»¸öÎļþÊ÷£¬ÄÚÓг¬¹ý127,000ÐÐÎı¾ÌåʽµÄÊý¾Ý¡£Ð¹Â¶µÄÊý¾Ýº¸Ç»¼Õß²¡Àú£¨Ô̺¬Õï¶Ï¡¢Ò½ÖκͲé³Á˾ֵȣ©¡¢ÖÎÀíÊý¾Ý£¨ÓëÒ½ÁƱ£½¡ÌṩÕßÄÚ²¿ÖÎÀíÓйصÄÒµÎñÐÅÏ¢£©¡¢±£ÏÕÊý¾Ý£¨Óйػ¼Õß½¡È«±£ÏÕÕþ²ßµÄÐÅÏ¢£©¡¢ÌṩÕßÁÐ±í£¨ÓйØÒ½ÉúºÍÒ½ÁƱ£½¡×¨ÒµÈËÔ±µÄÊý¾Ý£©¡¢ÌṩÕ߼ͼ¸üÐÂ±í¡¢¹ÍÖ÷ÁªÏµºÍÕ˵¥ÐÅÏ¢±í£¬ÒÔ¼°Rapid Radiology, Inc.ÍøÕ¾µÄµÇ¼ƾ֤¡£MedusaÕë¶ÔÕâ´ÎÊÂÎñÁгöÁËÇåµ¥£¬ÒªÇóÖ§¸¶120,000ÃÀÔªµÄBTCÒÔÏÂÔØ»òɾ³ýËùº±¼û¾Ý¡£½ØÖÁĿǰ£¬Pulse Urgent Care CenterµÄÍøÕ¾ÉÏδÏÔʾÈκÎÒì³£¼£Ïó£¬ÇÒ¸ÃÖÐÐÄÉÐδ¶ÔÕâ´Î¹¥»÷×ö³öÈ·ÈÏ»ò·ñ¶¨¡£
https://databreaches.net/2025/04/09/__trashed-15/
5. OttoKit WordPress²å¼þ¸ßΣ·ì϶ÔâºÚ¿ÍѸ¿ìÀûÓÃ
4ÔÂ10ÈÕ£¬½üÈÕ£¬WordPressµÄOttoKit£¨Ç°³ÆSureTriggers£©²å¼þÆØ³ö¸ßÑϳÁÐÔÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2025-3102£©£¬¸Ã·ì϶ӰÏì1.0.78¼°ÒÔÉϰ汾¡£ÓÉÓÚauthenticating_user()º¯ÊýÖжÌȱ¿ÕÖµ²é³£¬µ±²å¼þδÅäÖÃAPIÃÜԿʱ£¬¹¥»÷Õß¿Éͨ¹ý·¢ËͿյÄst_authorization±êÍ·ÈÆ¹ýÉí·ÝÑéÖ¤£¬Î´¾ÊÚȨ½Ó¼ûÊܱ£»¤µÄAPI¶Ëµã£¬½ø¶ø´´½¨ÐµÄÖÎÀíÔ¹ØÊ»§£¬´æÔÚÆëȫվµãÊÕÊܵĸ߷çÏÕ¡£°²È«×êÑÐÔ±¡°mikemyers¡±ÓÚ3ÔÂÖÐÑ®·¢ÏÖ´Ë·ì϶²¢»ñµÃÉͽð£¬4ÔÂ3ÈÕ£¬²å¼þ¹©¸øḚ́䲼1.0.79°æ½¨¸´·¨Ê½¡£È»¶ø£¬·ì϶Åû¶ºó½öÊýÓ×ʱ£¬ºÚ¿Í±ãÆðÍ·ÀûÓô˷ì϶£¬³¢ÊÔ´´½¨ÐµÄÖÎÀíÔ¹ØÊ»§¡£Patchstack×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬ÕâÖÖѸ¿ìµÄÀûÓÃ͹ÏÔÁ˵±¼´ÀûÓò¹¶¡»ò»º½â´ëÊ©µÄ»ð¼±±ØÒª¡£¼øÓÚOttoKit²å¼þÒÑÔÚ10Íò¸öÍøÕ¾ÉÏ»îÔ¾£¬ÇҸ÷ì϶ӰÏì¿í·º£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìÉý¼¶µ½1.0.79°æ±¾£¬²¢²é³ÈÕÖ¾ÖÐÊÇ·ñ´æÔÚÒâ±íµÄÖÎÀíÔ¹ØÊ»§»òÆäËûÓû§½ÇÉ«¡¢²å¼þ/Ö÷ÌâµÄ×°Öá¢Êý¾Ý¿â½Ó¼ûÊÂÎñÒÔ¼°°²È«ÉèÖõÄÅú¸Ä£¬ÒÔÈ·±£ÍøÕ¾°²È«¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-auth-bypass-hours-after-disclosure/
6. Gladinet CentreStackÁãÈÕ·ì϶CVE-2025-30406ÔâÔÚÒ°ÀûÓÃ
4ÔÂ9ÈÕ£¬×Ô3ÔÂ·ÝÆð£¬ºÚ¿ÍÀûÓÃGladinet CentreStack°²È«Îļþ¹²ÏíÈí¼þÖеÄÁãÈÕ·ì϶£¨CVE-2025-30406£©ÈëÇÖ´æ´¢·þÎñÆ÷¡£¸Ã·ì϶ÊÇÒ»¸ö·´ÐòÁл¯·ì϶£¬Ó°Ïì16.1.10296.56315¼°ÒÔÉϰ汾¡£ÎÊÌâÔ´ÓÚCentreStackÃÅ»§ÅäÖÃÖÐʹÓÃÁËÓ²±àÂëµÄmachineKey£¬¹¥»÷ÕßÈôͨ´ï´ËÃÜÔ¿£¬¿É±àд²¢Ö´ÐжñÒâÐòÁл¯¸ºÔØ£¬ÈƹýÆëÈ«ÐԲ鳣¬×¢ÈëËÁÒâÐòÁл¯¶ÔÏó£¬×îÖÕÔÚ·þÎñÆ÷ÉÏÖ´ÐдúÂë¡£GladinetÒÑÓÚ2025Äê4ÔÂ3ÈÕ°ä²¼°²È«½¨¸´·¨Ê½£¬°æ±¾Îª16.4.10315.56368¡¢16.3.4763.56357£¨Windows£©ºÍ15.12.434£¨macOS£©¡£¹©¸øÉ̽¨ÒéÓû§¾¡¿ìÉý¼¶µ½×îа汾£¬¶ÔÓÚÎÞ·¨µ±¼´¸üеĿͻ§£¬½¨ÒéÂÖ»»machineKeyÖµ×÷Ϊһʱ»º½â´ëÊ©£¬²¢È·±£¶à·þÎñÆ÷²¿ÊðÖпç½ÚµãµÄÒ»ÖÂÐÔ£¬ÔÚ¸ü¸Äºó³ÁÐÂÆô¶¯IISÒÔÀûÓûº½â´ëÊ©¡£CISAÒѽ«¸Ã·ì϶Ôö³¤µ½ÆäÒÑÖªÀûÓ÷ì϶Ŀ¼ÖУ¬²¢ÒªÇóÊÜÓ°ÏìµÄÖݺÍÁª¹ú×éÖ¯ÔÚ2025Äê4ÔÂ29ÈÕ֮ǰÀûÓð²È«¸üлººÍ½â´ëÊ©£¬²»È»ÖÕ³¡Ê¹ÓøòúÆ·¡£¼øÓڸòúÆ·µÄÐÔÖÊ£¬ËüºÜ¿ÉÄܱ»ÀûÓÃÀ´½øÐÐÊý¾Ý͵ÇÔ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/


¾©¹«Íø°²±¸11010802024551ºÅ