APT28ÀûÓÃXSS·ì϶¶Ô¶àÓʼþϵͳ·¢ÆðÍøÂç¼äµýÐж¯

°ä²¼¹¦·ò 2025-05-16

1. APT28ÀûÓÃXSS·ì϶¶Ô¶àÓʼþϵͳ·¢ÆðÍøÂç¼äµýÐж¯


5ÔÂ15ÈÕ£¬Ë¹Âå·¥¿ËÍøÂ簲ȫ¹«Ë¾ESET×îÐÂ×êÑз¢ÏÖ£¬Óë¶íÂÞ˹ÓйØÁªµÄÍþв×éÖ¯Õë¶ÔRoundcube¡¢Horde¡¢MDaemonºÍZimbraµÈÖ÷Á÷ÓʼþϵͳִÐÐÁËÃûΪ¡°Operation RoundPress¡±µÄÍøÂç¼äµý»î¶¯¡£Õâ´ÎÐж¯Ö÷ÌâÖ¸±êÊÇÇÔÈ¡ÌØ¶¨ÓÊÏäÕË»§µÄ»úÃÜÊý¾Ý£¬ÖØÒªÊܺ¦ÕßΪ¶«Å·µ±¾Ö»ú¹¹¼°¾ü¹¤ÆóÒµ£¬Í¬Ê±·ÇÖÞ¡¢Å·ÖÞºÍÄÏÃÀÖÞÈ·µ±²¿ÃÅÃÅÒ²Ôâµ½¹¥»÷¡£×êÑÐÈËÔ±½«Æä¹éÒòÓÚ¶íÂÞ˹µ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯APT28£¬Æ¾¾ÝÔ̺¬´¹µöÓʼþ·¢¼þµØÖ·³ÁµþºÍ·þÎñÆ÷ÅäÖÃÊÖ·¨ÀàËÆ¡£¹¥»÷Õßͨ¹ýÓʼþϵͳµÄXSS·ì϶ÔÚÍøÒ³ÓÊÏä½çÃæÖ´ÐÐËÁÒâJavaScript´úÂë¡£ÆäÖУ¬MDaemonµÄXSS·ì϶ÔÚ¹¥»÷³õÆÚΪÁãÈÕ·ì϶£¬ËäºóÐøÒѽ¨¸´£¬µ«Æäʱ佨¸´¡£APT28ͨ¹ýµç×ÓÓʼþ·¢ËÍXSS·ì϶ÀûÓ÷¨Ê½£¬¶ñÒâ´úÂëÔÚä¯ÀÀÆ÷ÔËÐеÄÍøÒ³ÓÊÏä¿Í»§¶ËÖÐÖ´ÐС£·ì϶ÀûÓóɹ¦ºó£¬ÃûΪSpyPressµÄ»ìºÏJavaScriptÓÐÐ§ÔØºÉ»áÇÔÈ¡ÓÊÏ䯾֤¡¢ÓʼþÄÚÈݺÍÁªÏµÈËÐÅÏ¢£¬²¿ÃűäÖÖ»¹ÄÜ´´½¨Sieve¹æ¶¨£¬³ÖÐø×ª·¢ÐÂÓʼþÖÁ¹¥»÷ÕßÓÊÏä¡£ÇÔÈ¡µÄÊý¾Ýͨ¹ýHTTP POSTÒªÇó·¢ËÍÖÁC2·þÎñÆ÷£¬Ä³Ð©±äÖÖ»¹Äܲ¶»ñµÇ¼¼Í¼¡¢2FA´úÂ룬ÉõÖÁΪMDAEMON´´½¨ÀûÓÃÃÜÂë¡£


https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html


2. Coinbase¿Í»§Êý¾Ýй¶£¬Ô¤¼ÆËðʧ´ï4ÒÚ


5ÔÂ15ÈÕ£¬¼ÓÃÜÇ®±ÒÂòÂôËùCoinbaseÅû¶£¬ÍøÂç·¸×ï·Ö×ÓÓë¶ñÒ⺣±í¿Í·þÈËÔ±ºÏ×÷ÇÔÈ¡Á˿ͻ§Êý¾Ý£¬²¢Ë÷Òª2000ÍòÃÀÔªÊê½ðÒÔ²»¹«¿ª±»µÁÐÅÏ¢¡£Coinbase»Ø¾øÖ§¸¶Êê½ð£¬µ«ÉèÁ¢2000ÍòÃÀÔª¼Î½±»ù½ð£¬ÒÔ¼¤ÀøÌṩÓйع¥»÷ÕßµÄÏßË÷¡£´Ëǰ£¬ºÚ¿ÍÏòCoinbase·¢Ë͵ç×ÓÓʼþÍþв°ä²¼¿Í»§ÕË»§ºÍÄÚ²¿ÎļþÐÅÏ¢£¬Coinbaseµ÷²é·¢ÏÖ¹¥»÷ÕßÔÚÃÀ¹ú¾³±í³Ð°üÉÌ»òÖ§³ÖÈËÔ±µÄÔ®ÊÖÏ»ñÈ¡Á˿ͻ§Êý¾Ý£¬ÕâЩÈËÔ±ÊܹͽӼûÄÚ²¿ÏµÍ³£¬Coinbase·¢ÏÖºóÒÑ¿ª³ýÓйØÈËÔ±¡£Ö»¹ÜÍþвÐÐΪÕßÇÔÈ¡ÁËCoinbaseÔ¼1%¿Í»§µÄÓ×ÎÒÉí·ÝÐÅÏ¢£¬µ«ÎÞ·¨»ñÈ¡¿Í»§Ë½Ô¿¡¢ÃÜÂë»ò½Ó¼ûCoinbase PrimeÕË»§ºÍÇ®°ü¡£±»µÁÊý¾ÝÔ̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢µç×ÓÓʼþ¡¢²¿ÃÅÉç»á±£Ïպš¢ÒøÐÐÕ˺ÅÐÅÏ¢¡¢µ±¾ÖÉí·Ý֤ͼÏñ¡¢ÕË»§Êý¾Ý¼°ÓÐÏ޵Ĺ«Ë¾Êý¾Ý¡£CoinbaseÇ¿µ÷ûÓÐÃÜÂ롢˽Կ»ò×ʽðй¶£¬²¢½«Åâ³¥±»ÓÕÆ­Ïò¹¥»÷Õß»ã¿îµÄ¿Í»§¡£¹ÌÈ»²ÆÕþÓ°ÏìÈÔÔÚÆÀ¹ÀÖУ¬µ«Coinbase¹À¼Æ²¹¾ÈºÍ¿Í»§Åâ³¥ÓöȽ«ÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£ÎªÔ¤·À½«À´Î¥¹æÐÐΪ£¬Coinbase´òË㿪ÉèеÄÖ§³ÖÖÐÐÄÅâ³¥ÊÜÓ°Ïì¿Í»§£¬²¢Ôö³¤¶ÔÄÚ²¿Íþв¼ì²â¡¢°²È«Íþв·ÂÕÕºÍ×Ô¶¯ÏìÓ¦µÄͶ×Ê¡£


https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/


3. ¶ñÒâNPM°üʹÓÃUnicodeÒþдÊõÀ´Ìӱܼì²â


5ÔÂ15ÈÕ£¬´úÂ밲ȫÆÀ¹À¹«Ë¾Veracode·¢ÏÖ£¬Node°üÖÎÀíÆ÷Ë÷ÒýÖдæÔÚÃûΪ¡°os-info-checker-es6¡±µÄ¶ñÒâÈí¼þ°ü£¬¸Ã°ü×Ô±¾Ô³õÒÔÀ´Òѱ»ÏÂÔØ³¬¹ý1000´Î¡£¸ÃÈí¼þ°ü×î³õ°æ±¾ÓÚ3ÔÂ19ÈÕÉÏ´«ÖÁNPM£¬×î³õÖ°ÄܽöÊÇÍøÂç²Ù×÷ϵͳÐÅÏ¢£¬¿´ËÆÎÞº¦¡£È»¶ø£¬¼¸Ììºó£¬×÷Õß¶ÔÈí¼þ°ü½øÐÐÁËÅú¸Ä£¬Ôö³¤ÁËÌØ¶¨ÓÚÆ½Ì¨µÄ¶þ½øÔìÎļþºÍ»ìºÏµÄ×°Öþ籾¡£5ÔÂ7ÈÕ£¬¸ÃÈí¼þ°ü°ä²¼Ð°汾£¬ÆäÖÐÔ̺¬ÓÃÓÚ´«µÝ×îÖÕÓÐÐ§ÔØºÉµÄ¸´ÔÓC2£¨ºÅÁîºÍ½ÚÔ죩»úÔì´úÂë¡£VeracodeÖÒ¸æ³Æ£¬µ±Ç°npmÉÏ¿ÉÓõÄ×îа汾v1.0.8Ϊ¶ñÒâ°æ±¾¡£´Ë±í£¬¸ÃÈí¼þ°ü»¹±»ÁÐΪÆäËûËĸöNPMÈí¼þ°üµÄÒÀÀµÏµ«Ä¿Ç°Éв»Ã÷ÏÔÕâЩÈí¼þ°üÊÇ·ñ»òÈôºÎ±»ÍþвÐÐΪÕßÍÆ¹ã¡£ÔÚ¶ñÒâ°æ±¾ÖУ¬¹¥»÷ÕßÀûÓÃUnicodeÒþдÊõ£¬½«Êý¾ÝǶÈë¿´ËÆ¡°|¡±µÄ×Ö·û´®ÖУ¬¶øÊúÏߺ󰵲ØÁËÒ»³¤´®²»Ë½¼ûµÄUnicode×Ö·û£¬ÕâЩ×Ö·ûÓÃÓÚÍÆ½ø»ùÓÚÎı¾µÄÒþдÊõ¡£Veracodeͨ¹ý½âÂëºÍ·´»ìºÏ×Ö·û´®£¬ÕÒµ½Á˸´ÔÓC2»úÔìµÄÓÐÐ§ÔØºÉ£¬¸Ã»úÔìÒÀÀµGoogleÈÕÀú¶ÌÁ´½Ó´ïµ½ÍйÜ×îÖÕÓÐÐ§ÔØºÉµÄµØÎ»¡£×êÑÐÈËÔ±Ú¹ÊÏçË´Ó»ñÈ¡GoogleÈÕÀúÁ´½Óµ½×îÖÕ½âÂë»ñÈ¡¶ñÒâÈí¼þÓÐÐ§ÔØºÉµÄÕû¸ö¹ý³Ì£¬²¢Ö¸³ö×îÖÕÓÐÐ§ÔØºÉ¿ÉÄܾ­¹ý¼ÓÃÜ¡£


https://www.bleepingcomputer.com/news/security/malicious-npm-package-uses-unicode-steganography-to-evade-detection/


4. Ó¡µÚ°²ÄÉÖݵ±¾ÖÖҸ棺¾¯Ìè¼Ùð¹Ù·½ÓʼþµÄͨ³©·ÑÚ¿Æ­


5ÔÂ13ÈÕ£¬Ó¡µÚ°²ÄÉÖݵ±¾Ö»ú¹¹ÓÚÖܶþÏò¾ÓÃñ·¢³öÖҸ棬ҪÇóɾ³ýʹÓÃÖݵ±¾Ö¹Ù·½µç×ÓÓʼþµØÖ··¢Ë͵ÄÐéαµç×ÓÓʼþ¡£ÕâЩ´¹µöÓʼþÀ´×Ô¶à¸öÖݵ±²¿ÃÅÃÅ£¬Ô̺¬¶ùͯ·þÎñ²¿¡¢ÅÜÂíίԱ»áµÈ£¬ËüÃǺýŪÐÔµØ·î¸æÊÕ¼þÈË´æÔÚδ½ÉÄɵÄͨ³©·Ñ£¬²¢ÍþвÈô²»½ÉÄɽ«Ãæ¶Ô¾­¼Ã´¦· £»ò³µÁ¾µÇ¼Ç±»½ØÁô¡£Óʼþ½áβ³£ÒÔ¡°¸Ð¼¤Äú£¬TxTag ¿Í·þ¡±×÷ΪÊðÃû£¬²¢Ô̺¬ÒÉËÆ¶ñÒâÍøÕ¾µÄÁ´½Ó¡£Ó¡µÚ°²ÄÉÖݺÓɽ°²È«Êýͨ¹ý¼¼Êõ°ì¹«ÊÒÔÚXƽ̨°ä²¼ÐÂÎÅ£¬ÌáÐѹ«¼Ò¾¯Ìè´ËÀàÚ¿Æ­¡£ÉêÃ÷Ö¸³ö£¬Öݵ±¾Ö²»»áͨ¹ý¶ÌÐÅ»òµç×ÓÓʼþ·¢ËÍδ½Éͨ³©·Ñ֪ͨ£¬²¢°µÊ¾¼¼Êõ°ì¹«ÊÒÕýÓëÉæÊ¹«Ë¾ºÏ×÷£¬ÒÔ×èÖ¹ÈκνøÒ»²½µÄͨѶ¡£¾ÝÏàʶ£¬Öݵ±¾ÖÓÚÈ¥ÄêÄêµ×ÖÕÖ¹ÁËÓëÒ»¼Òδ¾ßÃû¹©¸øÉ̵ĺÏͬ£¬µ«Î´É¾³ý¸ÃÖݵÄÕË»§¡£Õâ´ÎÊÂÎñÖУ¬Ò»Ãû³Ð°üÉ̵ÄÕË»§Ôâµ½ºÚ¿Í¹¥»÷£¬²¢±»ÓÃÓÚ·¢ËÍÕâЩÐéαÐÅÏ¢£¬¶øÖÝϵͳ²¢Î´·¢ÏÖÈëÇÖ¼£Ïó¡£µç×ÓÓʼþ½ØÍ¼ÏÔʾ£¬ÕâЩÐÅÏ¢ÊÇͨ¹ýµ¤·ðÈí¼þ¹«Ë¾GranicusµÄÈí¼þGovDelivery Communications Cloud·Ö·¢µÄ¡£Granicus½²»°ÈËSharon Rushen°µÊ¾£¬¸ÃÊÂÎñ²¢Î´ÊæÕ¹ÖÁÆä×ÔÉíÆ½Ì¨£¬ÏµÍ³Êǰ²È«µÄ¡£ËýÖ¸³ö£¬ÎÊÌâÔ´ÓÚÖÎÀíÔ±Óû§ÕË»§±»ÈëÇÖ£¬¿ÉÄÜÊÇͨ¹ý²Â²âƾ֤»òÉç½»¹¤³Ì¼¿Á©»ñÈ¡¡£


https://statescoop.com/indiana-phishing-attack-contractor-hacked/


5. FrigidStealerͨ¹ýÐéαä¯ÀÀÆ÷¸üй¥»÷macOSÓû§


5ÔÂ15ÈÕ£¬FrigidStealer¶ñÒâÈí¼þÕýͨ¹ýÐéαä¯ÀÀÆ÷¸üÐÂÌáÐѹ¥»÷macOSÓû§£¬¸Ã±äÖÖÓÚ2025Äê2Ô³õ´Î±»·¢ÏÖ£¬²¢ÒѲ¨¼°±±ÃÀ¡¢Å·ÖÞºÍÑÇÖÞµÄÓû§¡£´Ë¶ñÒâÈí¼þ´ÓÊôÓÚFerret¶ñÒâÈí¼þ¼Ò×壬ÓëTA2726ºÍTA2727²¡¶¾ÓйØ£¬Á½Õß¾ùÒÔÀûÓÃÐéαä¯ÀÀÆ÷¸üÐÂΪ¹¥»÷¼¿Á©¶øÖø³Æ¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉSafari¸üеĴÅÅÌÓ³ÏñÎļþ£¨DMG£©£¬ÓÕÆ­Óû§ÏÂÔØ²¢×°Öá£×°Öùý³ÌÖУ¬Ëü»áÌáÐÑÓû§ÊäÈëÃÜÂ룬´Ó¶øÈƹýAppleµÄGatekeeper± £»¤»úÔ죬²¢½èÖúÄÚÖõÄAppleScriptÖ°ÄÜÖ´ÐжñÒâ²Ù×÷¡£×°Öúó£¬Ëü»á¼Ù×°³ÉÒ»¸ö´øÓÐÌØ¶¨bundle IDµÄ¶ñÒâÀûÓã¬ÓëºÏ·¨ÀûÓûìºÏÊÓÌý¡£Ò»µ©¼¤»î£¬FrigidStealer±ãÆðÍ·ÍøÂçÓû§µÄÃô¸ÐÊý¾Ý£¬Ô̺¬ä¯ÀÀÆ÷ƾ֤¡¢ÏµÍ³Îļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢¼°Apple NotesµÈ£¬²¢Í¨¹ýmacOSµÄmDNSResponder·ÓɵÄDNS²éÎÊ£¬½«ÕâЩÊý¾Ýй¶µ½ºÅÁîÓë½ÚÔì·þÎñÆ÷¡£ÇÔÈ¡Êý¾Ýºó£¬¸Ã¶ñÒâÈí¼þ»á×ÔÎÒÖÕÖ¹£¬ÒÔ½µµÍ±»·¢ÏֵķçÏÕ¡£¾Ý¿ªÔ´ÍøÂ簲ȫ¹«Ë¾WazuhÅû¶£¬FrigidStealer²¢²»ÒÀÀµ´«Í³µÄ·ì϶ÀûÓù¤¾ß°ü»ò·ì϶£¬¶øÊÇÀûÓÃÓû§¶Ôϵͳ֪ͨºÍä¯ÀÀÆ÷¸üÐÂÌáÐѵÄÐÅÀµ½øÐй¥»÷£¬ÕâʹµÃËü¸üΪΣÏÕÇÒÓÐЧ¡£´Ë±í£¬¸Ã¶ñÒâÈí¼þ»¹ÀûÓÃmacOSÌØÓеÄÐÐΪÀ´Î¬³ÖÓÆ¾ÃÐÔ£¬Í¨¹ý×¢²áΪǰ̨ÀûÓ÷¨Ê½µÈ·½Ê½Óëϵͳ½»»¥£¬²¢ÔÚÖ´Ðкóɾ³ý×ÔÉíºÛ¼££¬ÒÔά³Ö°µ²Ø¡£


https://hackread.com/frigidstealer-malware-macos-fake-safari-browser-update/


6. ÕÐÆ¸Æ½Ì¨HireClick570Íò·Ý¼òÀúÔâй¶


5ÔÂ15ÈÕ£¬Cybernews×êÑÐÈËÔ±½üÈÕ·¢ÏÖһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬±¾Ô­Ö¸ÏòÃæÏòÖÐÓ×ÐÍÆóÒµµÄÕÐÆ¸Æ½Ì¨HireClick¡£ÓÉÓÚÑÇÂíÑ·AWS S3´æ´¢Í°ÅäÖÃÃýÎ󣬸Ãƽ̨³¬¹ý570Íò·ÝÎļþ±»Â¶³öÔÚ»¥ÁªÍøÉÏ£¬ÆäÖÐÖØÒªÊÇÇóÖ°ÕߵļòÀú£¬ÕâЩÎļþй¶ÁËÇóÖ°ÕßµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¼°¾ÍÒµÐÅÏ¢µÈÃô¸ÐºÍ¸öÈËÊý¾Ý¡£Õâ´ÎÊý¾Ýй¶¶ÔHireClick¿Í»§µÄÓ°ÏìÉîÔ¶¡£Ð¹Â¶µÄÊý¾ÝÒ»µ©ÂäÈë·¸·¨·Ö×ÓÖ®ÊÖ£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¼ÙÒâ¡¢ÍøÂç´¹µöµÈ¶àÖ¶à¿Æ­»î¶¯¡£¹¥»÷Õß¿ÉÄٰܼçÕÐÆ¸¾­Àí£¬ÀûÓÃй¶µÄÐÅÏ¢ÓÕÆ­ÇóÖ°ÕßÌṩÉí·Ý֤ɨÃè¼þ¡¢Éç»á°²È«ºÅÂëÉõÖÁÒøÐÐÐÅÏ¢£¬»òͨ¹ýµç»°ÓÕÆ­ÇóÖ°ÕßÐ¹Â©ÒøÐÐÐÅÏ¢»ò×°ÖöñÒâÈí¼þ¡£´Ë±í£¬Ú¿Æ­Õß»¹¿ÉÀûÓÃй¶µÄ¼òÀú´´½¨ÐéαÉí·Ý½øÐоÍÒµÑéÖ¤Ú¿Æ­£¬ÉõÖÁ¼ÙÒâÇóÖ°Õß½øÈ빤×÷³¡Ëùϵͳ¡£ÕâÖÖÊý¾Ýй¶ÐÐΪµÄ·çÏÕ²»½öÏÞÓÚÊý¾Ý͵ÇÔ×ÔÉí£¬»¹¿ÉÄÜÒý·¢ÍøÂçÈËÈâËÑË÷£¬¼´¶ñÒâÆØ¹â¸öÈËÐÅÏ¢ÒÔɧÈÅ»ò¿ÖÏÅËûÈË¡£¹¥»÷Õß°ÑÎÕÁËÊܺ¦ÕßµÄÈ«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÏÖʵµØÖ·£¬¾ÍÄܵÈÏÐËø¶¨²¢É§ÈÅÊܺ¦Õß¡£


https://cybernews.com/security/hireclick-resume-database-data-leak/