Solana JavaScript SDKÔ⹩ӦÁ´¹¥»÷£¬£¬£¬£¬£¬£¬ £¬¶ñÒâ´úÂëÇÔÈ¡¼ÓÃÜÇ®±Ò˽Կ

Ðû²¼Ê±¼ä 2024-12-06

1. Solana JavaScript SDKÔ⹩ӦÁ´¹¥»÷£¬£¬£¬£¬£¬£¬ £¬¶ñÒâ´úÂëÇÔÈ¡¼ÓÃÜÇ®±Ò˽Կ


12ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬ £¬SolanaµÄJavaScript SDK¡°@solana/web3.js¡±ÔÚ½üÆÚµÄÒ»´Î¹©Ó¦Á´¹¥»÷ÖÐÔâµ½ÔÝʱÈëÇÖ£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÐû²¼ÁËÁ½¸ö°üÀ¨¶ñÒâ´úÂëµÄºóÃŰ汾£¨1.95.6ºÍ1.95.7£©£¬£¬£¬£¬£¬£¬ £¬Ö¼ÔÚÇÔÈ¡¼ÓÃÜÇ®±Ò˽Կ²¢ÌÍ¿ÕÇ®°ü¡£¡£¡£¡£¡£¡£¡£ÕâЩ±»ÈëÇֵİ汾ÔÚnpmÉÏÿÖÜÏÂÔØÁ¿Áè¼Ý350,000´Î£¬£¬£¬£¬£¬£¬ £¬¶Ô¿ª·¢Ö°Ô±ºÍÓû§×é³ÉÁËÑÏÖØÍþв¡£¡£¡£¡£¡£¡£¡£Solana֤ʵÁËÕâÒ»Îó²î£¬£¬£¬£¬£¬£¬ £¬²¢ÌåÏÖÊÇÓÉÓÚÆäÐû²¼»á¼ûÕË»§±»ÈëÇÖËùÖ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÐ޸ĿâÖеÄÒªº¦º¯Êý£¬£¬£¬£¬£¬£¬ £¬½«¶ñÒâ´úÂëÌí¼Óµ½¿âÖУ¬£¬£¬£¬£¬£¬ £¬ÒÔÇÔȡ˽Կ²¢½«Æä·¢Ë͵½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¾ÝDataDogÑо¿Ô±³Æ£¬£¬£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßÌí¼ÓÁËÒ»¸ö¶ñÒâµÄ¡°addToQueue¡±º¯Êý£¬£¬£¬£¬£¬£¬ £¬¸Ãº¯Êýͨ¹ý¿´ËÆÕýµ±µÄCloudFlare±êͷй¶˽Կ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÒÑ×·Ëݵ½Ìض¨µÄSolanaµØµã£¬£¬£¬£¬£¬£¬ £¬¸ÃµØµã°üÀ¨¶àÖÖ¼ÓÃÜÇ®±ÒºÍNFT£¬£¬£¬£¬£¬£¬ £¬Ô¤¼Æ¼ÛֵΪ184,000ÃÀÔª¡£¡£¡£¡£¡£¡£¡£SolanaÖÒÑÔÏÓÒÉ×Ô¼ºÊܵ½¹¥»÷µÄ¿ª·¢Ö°Ô±Á¬Ã¦Éý¼¶µ½×îеÄv1.95.8°æ±¾²¢ÂÖ»»ËùÓÐÃÜÔ¿£¬£¬£¬£¬£¬£¬ £¬Í¬Ê±½¨ÒéÇ®°ü±»µÁµÄÈËÁ¬Ã¦½«Ê£Óà×ʽð×ªÒÆµ½ÐÂÇ®°ü£¬£¬£¬£¬£¬£¬ £¬²¢×èֹʹÓþÉÇ®°ü¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/solana-web3js-library-backdoored-to-steal-secret-private-keys/


2. ¶íÂÞ˹ºÚ¿ÍÐ®ÖÆ°Í»ù˹̹ºÚ¿ÍЧÀÍÆ÷¾ÙÐй¥»÷


12ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬ £¬¶íÂÞË¹ÍøÂçÌØ¹¤×éÖ¯Turla£¬£¬£¬£¬£¬£¬ £¬ÓÖÃû¡°ÉñÃØ±©Ñ©¡±£¬£¬£¬£¬£¬£¬ £¬½üÆÚ½ÓÄÉÁËÒ»ÖÖÐµĹ¥»÷Õ½ÂÔ£¬£¬£¬£¬£¬£¬ £¬¼´¹¥»÷²¢Ð®ÖÆÆäËûºÚ¿Í×éÖ¯µÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬ £¬ÒÔÉñÃØÈëÇÖÒѾ­Êܵ½¹¥»÷µÄÍøÂç¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÀÖ³ÉÐ®ÖÆÁ˰ͻù˹̹ºÚ¿Í×éÖ¯Storm-0156µÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬ £¬²¢Ê¹ÓÃÆä»á¼ûÁËStorm-0156ÔøÈëÇÖ¹ýµÄ°¢¸»º¹ºÍÓ¡¶ÈÕþ¸®×éÖ¯ÍøÂ磬£¬£¬£¬£¬£¬ £¬°²ÅÅÁ˶ñÒâÈí¼þ¹¤¾ß¡£¡£¡£¡£¡£¡£¡£¾ÝLumenµÄBlack LotusʵÑéÊÒ±¨¸æ£¬£¬£¬£¬£¬£¬ £¬Turla×Ô2022Äê12ÔÂ×îÏȾÙÐд˴ÎÐж¯£¬£¬£¬£¬£¬£¬ £¬²¢Ò»Ö±Ò»Á¬ÖÁ2023Äê¡£¡£¡£¡£¡£¡£¡£TurlaÊÇÒ»¸öÊܶíÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬ £¬ºã¾ÃÕë¶ÔÈ«ÇòÕþ¸®¡¢×éÖ¯ºÍÑо¿»ú¹¹¾ÙÐÐÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ë´Î£¬£¬£¬£¬£¬£¬ £¬ËûÃÇÔÚStorm-0156µÄÍøÂçÖз¢Ã÷ÁËÏ£ÆæµÄÍøÂçÐÐΪ£¬£¬£¬£¬£¬£¬ £¬²¢Àֳɹ¥ÆÆÆä¶à¸öC2½Úµã£¬£¬£¬£¬£¬£¬ £¬°²ÅÅÁ˰üÀ¨TinyTurlaºóÃűäÖÖ¡¢TwoDashºóÃŵÈÔÚÄڵĶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£³ýÁË»ñÈ¡Storm-0156µÄ¶ñÒâÈí¼þ¹¤¾ßºÍ±»µÁÊý¾ÝÍ⣬£¬£¬£¬£¬£¬ £¬Turla»¹½øÒ»²½½«Ä¿µÄÃé×¼ÁËStorm-0156×Ô¼º£¬£¬£¬£¬£¬£¬ £¬ºáÏò½øÈëÁËÆäÊÂÇéÕ¾¡£¡£¡£¡£¡£¡£¡£TurlaµÄÕâÖÖÕ½ÂÔʹËûÃÇÄܹ»ÉñÃØÍøÂçÇ鱨£¬£¬£¬£¬£¬£¬ £¬×èֹ̻¶×Ô¼º»ò¹¤¾ß¼¯£¬£¬£¬£¬£¬£¬ £¬´Ó¶ø¼ò»¯¹éÒòÊÂÇé¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-turla-hackers-hijack-pakistani-apt-servers-for-cyber-espionage-attacks/


3. ¸ç˹´ïÀè¼ÓRECOPE¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷Òý·¢È¼ÁϹ©Ó¦µ£ÐÄ


12ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬ £¬¸ç˹´ïÀè¼ÓʯÓÍÁ¶Öƹ«Ë¾£¨RECOPE£©½üÆÚÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂÆäÔËÓªÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬ £¬²¢Òý·¢¹«ÖÚ¶Ô¿ÉÄÜ·ºÆðȼÁÏǷȱµÄµ£ÐÄ¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ11ÔÂ27ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬ÆÈʹRECOPEʵÑéÊÖ¶¯Á÷³Ì£¬£¬£¬£¬£¬£¬ £¬Êý×ÖÖ§¸¶ÏµÍ³ÊÜ×裬£¬£¬£¬£¬£¬ £¬È¼ÁÏ·ÖÅÉÒ²Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£RECOPEÈÏÕæÖÎÀíÌìÏÂȼÁÏÈë¿Ú¡¢ÌáÁ¶ºÍ·ÖÅÉ£¬£¬£¬£¬£¬£¬ £¬°üÀ¨Ö÷Òª¹ÜµÀ£¬£¬£¬£¬£¬£¬ £¬´Ë´Î¹¥»÷¶ÔÆäÔËÓª´øÀ´ÁËÌôÕ½£¬£¬£¬£¬£¬£¬ £¬ÓÈÆäÊÇÔÚÓ͹޳µÈ¼ÁÏÂëÍ·¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜRECOPEÈ·ÈÏȼÁÏ´¢±¸¸»×㣬£¬£¬£¬£¬£¬ £¬µ«¹«ÖÚµ£Ðĵ¼ÖÂȼÁÏÏúÊÛ¼¤Ôö£¬£¬£¬£¬£¬£¬ £¬¹«Ë¾²»µÃ²»ÑÓÉìÔËӪʱ¼ä¡£¡£¡£¡£¡£¡£¡£ÔÚÃÀ¹úÍøÂçÇ徲ר¼ÒµÄЭÖúÏ£¬£¬£¬£¬£¬£¬ £¬RECOPEÒÑ×îÏȲ¿·Ö»Ö¸´ÏµÍ³£¬£¬£¬£¬£¬£¬ £¬µ«ÔÚÖÜÈ«»Ö¸´Ç°ÐèÈ·±£»£»£» £»£»ù´¡ÉèÊ©Çå¾²¡£¡£¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñÊÇÕë¶Ô¸ç˹´ïÀè¼ÓÒªº¦»ù´¡ÉèÊ©ÍøÂç¹¥»÷Ç÷ÊÆµÄÑÓÐø£¬£¬£¬£¬£¬£¬ £¬Ö®Ç°ContiÀÕË÷Èí¼þ×éÖ¯ÒÑ·¢¶¯¹ýÀàËÆ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬µ¼Ö»ù±¾Ð§ÀÍ̱»¾£¬£¬£¬£¬£¬£¬ £¬ÆÈʹ×ÜͳÐû²¼½ôÆÈ״̬²¢»ñµÃÃÀ¹úÔ®Öú¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÓйز¿·Ö·ñ¶¨¸ü¶à¹¥»÷µÄÒ¥ÑÔ£¬£¬£¬£¬£¬£¬ £¬µ«RECOPEÊÂÎñ͹ÏÔÁËÒªº¦»ù´¡ÉèÊ©Ò×ÊÜÍøÂçÍþвµÄÏÖ×´£¬£¬£¬£¬£¬£¬ £¬Ïà¹Ø²¿·Ö½«Æð¾¢¼ÓÈëÖ§³ÖÆä»Ö¸´ÊÂÇé¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/recope-costa-ricas-state-owned-energy-provider-grapples-with-ransomware-attack-and-fuel-supply-disruption/


4. ÂÞÂíÄáÑÇÑ¡¾ÙϵͳÔâÊÜÁè¼Ý 85,000 ´ÎÍøÂç¹¥»÷


12ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÂÞÂíÄáÑÇÇ鱨¾ÖµÄÒ»·Ý½âÃܱ¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬¸Ã¹úÑ¡¾Ù»ù´¡ÉèÊ©ÔÚ×Üͳѡ¾Ùʱ´úÔâÊÜÁËÁè¼Ý85,000´ÎÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Ô´×Ô33¸ö¹ú¼Ò¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁËһ̨°üÀ¨µØÍ¼Êý¾ÝµÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ £¬²¢Ð¹Â¶ÁËÓëÑ¡¾ÙÏà¹ØµÄÍøÕ¾µÄÕË»§Æ¾Ö¤ÔÚ¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉÏ¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷Ò»Á¬µ½µÚÒ»ÂÖ×Üͳѡ¾ÙºóµÄµÚ¶þÌ죬£¬£¬£¬£¬£¬ £¬Ä¿µÄ°üÀ¨ÆÆËðÑ¡¾Ù»ù´¡ÉèÊ©¡¢¸ü¸Ä¹«ÖÚÑ¡¾ÙÐÅÏ¢ºÍ¾Ü¾ø»á¼ûϵͳ¡£¡£¡£¡£¡£¡£¡£ÂÞÂíÄáÑÇÇ鱨»ú¹¹ÖÒÑԳƣ¬£¬£¬£¬£¬£¬ £¬Ñ¡¾Ù»ù´¡ÉèÊ©ÈÔ±£´æÎó²î£¬£¬£¬£¬£¬£¬ £¬¿ÉÄܻᱻʹÓþÙÐÐÍøÂçºáÏòÒÆ¶¯ºÍ½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬±¨¸æ»¹Ö¸³ö£¬£¬£¬£¬£¬£¬ £¬Áè¼Ý100ÃûÂÞÂíÄáÑÇTikTokÓ°ÏìÕß±»Ê¹ÓÃÀ´·Ö·¢Ðû´«×ÜͳºòÑ¡ÈË¿¨ÁÖ¡¤ÇÇÖÎ˹¿âµÄÑ¡¾ÙÄÚÈÝ£¬£¬£¬£¬£¬£¬ £¬ÕâЩÕË»§ÔÚÑ¡¾ÙÈÕǰÁ½ÖܱäµÃºÜÊÇ»£»£» £»£»îÔ¾£¬£¬£¬£¬£¬£¬ £¬ÆäÖÐһЩÕË»§ÉõÖÁ´Ó2016Ä꽨É赫ֱµ½½üÆÚ²Å×îÏÈ»îÔ¾¡£¡£¡£¡£¡£¡£¡£ÂÞÂíÄáÑǶÔÍâÇ鱨¾ÖÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬¶íÂÞ˹½üÆÚÓиÉÔ¤ÆäËû¹ú¼ÒÑ¡¾ÙµÄÀúÊ·£¬£¬£¬£¬£¬£¬ £¬²¢½«ÂÞÂíÄáÑÇÊÓΪµÐ¹ú£¬£¬£¬£¬£¬£¬ £¬ÓÉÓÚÂÞÂíÄáÑÇÔÊÐí±±Ô¼ÔÚ±±Ô¼¶«²¿×¤¾ü¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/romanias-election-systems-targeted-in-over-85-000-cyberattacks/


5. ÀÕË÷Èí¼þ×éÖ¯Brain CipherÉù³ÆÈëÇÖµÂÇÚÓ¢¹ú


12ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÎÛÃûÕÑÖøµÄÀÕË÷Èí¼þ×éÖ¯Brain CipherÉù³ÆÒÑÀÖ³ÉÈëÇÖµÂÇÚÓ¢¹ú¹«Ë¾£¬£¬£¬£¬£¬£¬ £¬²¢ÇÔÈ¡ÁËÁè¼Ý1TBµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2024Äê6Ô·ºÆð£¬£¬£¬£¬£¬£¬ £¬Ôø¶ÔÈ«Çò¶à¸ö×éÖ¯¾ÙÐÐÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬°üÀ¨¶ÔÓ¡¶ÈÄáÎ÷Ñǹú¼ÒÊý¾ÝÖÐÐĵÄÖØ´ó¹¥»÷¡£¡£¡£¡£¡£¡£¡£¾ÝBrain CipherÐû²¼µÄÉùÃ÷£¬£¬£¬£¬£¬£¬ £¬´Ë´Î¹¥»÷̻¶Á˵ÂÇÚÓ¢¹úÍøÂçÇå¾²»ù´¡ÉèÊ©µÄÎó²î¡£¡£¡£¡£¡£¡£¡£ËûÃÇÍýÏëÐû²¼´Ë´ÎÈëÇÖµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬°üÀ¨ÉæÏÓÎ¥·´Ç徲ЭÒéµÄÖ¤¾Ý¡¢µÂÇÚÓë¿Í»§Ö®¼äµÄÌõԼЭÒéÆÊÎö¡¢¼à¿ØÏµÍ³ºÍÇå¾²¹¤¾ßµÄÏêϸÐÅÏ¢ÒÔ¼°ÊÜËðÊý¾ÝµÄʾÀý¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬¸Ã×éÖ¯ÒÑÔ¼ÇëµÂÇÚ´ú±í¾ÙÐÐ˽ÏÂÌÖÂÛ£¬£¬£¬£¬£¬£¬ £¬Õâ¿ÉÄÜÅú×¢±£´æÊê½ð̸ÅеÄÍýÏë¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶ÊÂÎñ¿ÉÄÜÓ°ÏìµÂÇÚÓ¢¹úµÄÆóÒµ¿Í»§¡¢ÉñÃØÉÌÒµÐÅÏ¢¡¢¿Í»§Êý¾ÝºÍ²ÆÎñ¼Í¼ÒÔ¼°¸Ã¹«Ë¾µÄרҵÉùÓþ¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ £¬µÂÇÚÓ¢¹úÉÐδ¹ûÕæÈ·ÈÏ»ò·ñ¶¨´Ë´ÎÈëÇÖÊÂÎñ£¬£¬£¬£¬£¬£¬ £¬ÍøÂçÇå¾²ÐÂÎÅÍŶÓÕýÔÚÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/deloitte-hacked/


6. ¶íÂÞ˹³ÌÐòÔ±ÊÖ»ú±»FSBËÍ»¹ºó·¢Ã÷ÔâÉñÃØ×°ÖÃÐÂÌØ¹¤Èí¼þ


12ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬ £¬Ò»Ãû¶íÂÞ˹³ÌÐòÔ±Kirill ParubetsÔÚ±»¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¾ÐÁô15Ì첢ûÊÕÊÖ»úºó£¬£¬£¬£¬£¬£¬ £¬·¢Ã÷×°±¸ÔÚËÍ»¹ºó±»ÉñÃØ×°ÖÃÁËеÄÌØ¹¤Èí¼þ¡£¡£¡£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þÄ£ÄâÁËÊ¢ÐеÄAndroidÓ¦ÓóÌÐò¡°Cube Call Recorder¡±£¬£¬£¬£¬£¬£¬ £¬µ«ÓµÓÐÆÕ±éµÄȨÏÞ£¬£¬£¬£¬£¬£¬ £¬¿ÉÒÔ²»ÊÜÏÞÖÆµØ»á¼û×°±¸£¬£¬£¬£¬£¬£¬ £¬²¢ÔÊÐí¹¥»÷Õß¼àÊÓÊÖ»úÉϵĻ¡£¡£¡£¡£¡£¡£¡£¾­Óɹ«ÃñʵÑéÊÒµÄȡ֤ÆÊÎö£¬£¬£¬£¬£¬£¬ £¬È·ÈϸöñÒâÈí¼þÊÇMonokleµÄа汾»òÓÉÏàͬ´úÂ뽨ÉèµÄÐÂÈí¼þ¡£¡£¡£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þʹÓüÓÃܵÄÁ½½×¶ÎÀú³Ì£¬£¬£¬£¬£¬£¬ £¬¾ßÓиú×ÙλÖᢻá¼û¶ÌÐÅ¡¢ÁªÏµÈË¡¢ÈÕÀú¡¢¼Í¼µç»°ºÍÊÓÆµ¡¢ÌáÈ¡ÐÂÎÅ¡¢ÎļþºÍÃÜÂëµÈ¶àÖÖ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬´úÂëÖз¢Ã÷Á˶ÔiOSµÄÒýÓ㬣¬£¬£¬£¬£¬ £¬Åú×¢¿ÉÄܱ£´æ¿ÉÔÚApple iPhone×°±¸ÉÏÔËÐеıäÌå¡£¡£¡£¡£¡£¡£¡£×°±¸±»Ö´·¨²¿·ÖûÊÕºóÓÖ±»ËÍ»¹µÄÈËӦ˼Á¿»»ÓÃÆäËû×°±¸»ò½»¸ø×¨¼ÒÆÊÎö£¬£¬£¬£¬£¬£¬ £¬ÉúÑÄÔÚեȡÐÔ¹ú¼ÒµÄÈËÓ¦½ÓÄɲ½·¥±£»£»£» £»£»¤×Ô¼ºµÄ×°±¸Çå¾²¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-android-spyware-found-on-phone-seized-by-russian-fsb/