Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ

Ðû²¼Ê±¼ä 2025-03-28

1. Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ


3ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬×÷Ϊ΢Èí365Éú̬µÄÆóÒµ¼¶ÊÓÆµÐ§ÀÍ£¬£¬ £¬£¬£¬£¬£¬Microsoft Stream¾­µä°æÓÚ2020ÄêÆô¶¯Ç¨áãÖÁSharePoint£¬£¬ £¬£¬£¬£¬£¬Ô­ÓòÃûmicrosoftstream.com°´ÍýÏëÓ¦ÓÚ2024ÄêÖÜÈ«ÍËÒÛ¡£¡£¡£È»¶ø2025Äê3Ô£¬£¬ £¬£¬£¬£¬£¬¸ÃÓòÃûÍ»ÔâÐ®ÖÆ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õ߸͝DNSÆÊÎöʹÆäÖ¸Ïò·ÂðÑÇÂíÑ·½çÃæµÄÌ©¹ú¶Ä³¡´¹ÂÚÒ³Ãæ£¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÈÔǶÈë¾É°æÊÓÆµÁ´½ÓµÄSharePointÒ³Ãæ±»À¬»øÄÚÈÝÎÛȾ¡£¡£¡£ÊÖÒÕÊÓ²ìÏÔʾ£¬£¬ £¬£¬£¬£¬£¬ÓòÃû×¢²áÐÅÏ¢ÓÚÊ·¢µ±ÈÕ±»²»·¨Ð޸쬣¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÉç»á¹¤³Ìѧ»òÎó²îʹÓûñÈ¡¿ØÖÆÈ¨¡£¡£¡£Ö»¹Ü΢ÈíÒѽôÆÈ¹Ø±ÕÓòÃûÆÊÎö£¬£¬ £¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñ¶ÔÓû§µÄDZÔÚΣº¦½ûÖ¹ºöÊÓ£ºÆóÒµÄÚÍøÓû§¿ÉÄÜÒò»á¼û±»Ð®ÖÆÒ³Ãæµ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬£¬¶øSharePointÉú̬ÖвÐÁôµÄǶÈëÁ´½Ó¸ü³ÉΪһÁ¬Íþв¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õßδ½øÒ»²½Ö²Èë¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬£¬Ö÷ҪΣº¦¼¯ÖÐÔÚÍøÂç´¹ÂÚ²ãÃæ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬´ËÀàÊÂÎñ·´Ó¦³öÆóÒµ¶ÔÍËÒÛÓòÃû´¦Öóͷ£µÄÆÕ±éÊè©£ºÊµÊ±¸üÐÂǶÈë×ÊÔ´¡¢È±·¦DNS¼à¿Ø»úÖÆ¡¢Î´°²ÅÅDNSSEC·À»¤µÈÎó²î£¬£¬ £¬£¬£¬£¬£¬¶¼¿ÉÄܱ»¹¥»÷ÕßʹÓÃʵÑéÖÐÐÄÈ˹¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/hijacked-microsoft-stream-classic-domain-spams-sharepoint-sites/


2. ¡¶°×Ñ©¹«Ö÷¡·Î´ÉÏÏßDisney+£¬£¬ £¬£¬£¬£¬£¬µÁ°æÏÝÚåDZÔÚ¶ñÒâÈí¼þ


3ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬µÏÊ¿ÄáÕæÈ˰桶°×Ñ©¹«Ö÷¡·Î´Í¨¹ýµÏÊ¿Äá×ÔÓÐÁ÷ýÌåÆ½Ì¨Disney+¿¯ÐУ¬£¬ £¬£¬£¬£¬£¬ÆÈʹ²¿·Ö¹ÛÖÚתÏòµÁ°æÇþµÀ£¬£¬ £¬£¬£¬£¬£¬È´Òò´ËÏÝÈëÍøÂçÕ©Æ­ÏÝÚå¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾VeritiÅû¶£¬£¬ £¬£¬£¬£¬£¬Õ©Æ­·Ö×ÓʹÓÃӰƬδÉÏÏßÕý¹æÆ½Ì¨µÄ¿ÕµµÆÚ£¬£¬ £¬£¬£¬£¬£¬ÔÚ"TeamEsteem"ÍøÕ¾Ðû²¼ÐéᲩ¿Í£¬£¬ £¬£¬£¬£¬£¬Î±×°³É¹Ù·½×ÊÔ´Ìṩ2025°æ¡¶°×Ñ©¹«Ö÷¡·µÁ°æÏÂÔØ¡£¡£¡£¸Ã´ÅÁ¦ÖÖ×ÓÁ´½Ó¿´ËÆÕýµ±£¬£¬ £¬£¬£¬£¬£¬ÊµÔòÀ¦°ó¶ñÒâÈí¼þ¡£¡£¡£ÒÑÓÐ45ÃûÓû§ÏÂÔØ²¢Èö²¥¸ÃÖÖ×ÓÎļþ£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨Î±×°³ÉÊÓÆµ±à½âÂëÆ÷µÄ"xmph_codec.exe"³ÌÐò¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬ £¬£¬£¬£¬£¬¸Ã³ÌÐò½«ÊµÑé¶àÖØ¶ñÒâ²Ù×÷£ºÊ×ÏȽûÓÃWindows DefenderµÈÇå¾²·À»¤£¬£¬ £¬£¬£¬£¬£¬ËæºóÖ²Èë±»50¿îÇå¾²¹¤¾ß±ê¼ÇΪ¶ñÒâµÄÎļþ£¬£¬ £¬£¬£¬£¬£¬²¢¾²Ä¬×°ÖÃTORä¯ÀÀÆ÷½¨Éè°µÍøÍ¨Ñ¶Í¨µÀ£¬£¬ £¬£¬£¬£¬£¬×îÖÕʹװ±¸Ì»Â¶ÓÚÊý¾Ý͵ÇÔºÍÀÕË÷Èí¼þ¹¥»÷Σº¦ÖС£¡£¡£¹¥»÷Õß¿ÉÄÜͨ¹ýÁ½ÖÖ·½·¨ÈëÇÖTeamEsteem¹ÙÍø£ºÒ»ÊÇʹÓÃYoast SEO²å¼þ¾É°æ±¾Îó²î£¨CVE-2023-40680£©£¬£¬ £¬£¬£¬£¬£¬¶þÊÇ͵ȡÖÎÀíԱƾֱ֤½ÓÐû²¼ÐéαÄÚÈÝ¡£¡£¡£Ç徲ר¼Ò½¨Ò飬£¬ £¬£¬£¬£¬£¬¹ÛÖÚÓ¦×èÖ¹ÏÂÔØÈªÔ´²»Ã÷µÄµÁ°æÄÚÈÝ£¬£¬ £¬£¬£¬£¬£¬°´ÆÚ¸üз´¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬£¬²¢¶ÔÒªÇó×°ÖÃÌØÊâ±à½âÂëÆ÷µÄ¿ÉÒÉÎļþ¼á³ÖСÐÄ£¬£¬ £¬£¬£¬£¬£¬ÒÔ·ÀÂäÈëÍøÂç·¸·¨ÏÝÚå¡£¡£¡£


https://hackread.com/fake-snow-white-movie-torrent-infects-device-malware/


3. COPAÊý¾Ýй¶ÊÂÎñ²¨¼°Á½Öݽü68,000Ãû»¼ÕßÃô¸ÐÐÅÏ¢


3ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬È¥Äê11Ô£¬£¬ £¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯Everest Team½«ÃÀ¹ú¹Ç¿ÆÒ½ÁÆ»ú¹¹Concord Orthopaedics£¨COPA£©ÁÐÈë°µÍøÐ¹ÃÜÍøÕ¾£¬£¬ £¬£¬£¬£¬£¬Ðû³ÆÕÆÎÕÆä×Ô2018ÄêÆðµÄËùÓл¼ÕßÒ½ÁƼͼ¼°Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢Ô¤Ô¼ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÏêÇé¼°²¿·Ö¼ÝʻִÕÕͼÏñ¡£¡£¡£¸Ã»ú¹¹ÓÚ2025Äê3ÔÂ25ÈÕÏòÊÜÓ°ÏìÕß¼ÄËÍÊéÃæÍ¨Öª£¬£¬ £¬£¬£¬£¬£¬È·ÈÏÆä»¼Õß¹ÒºÅÓëԤԼϵͳ¹©Ó¦ÉÌÔâÍøÂçÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬µ«Ç¿µ÷ÄÚ²¿ÇéÐÎδÊÜÓ°Ïì¡£¡£¡£Æ¾Ö¤COPAͨ¸æ£¬£¬ £¬£¬£¬£¬£¬Ð¹Â¶Ô´Í·ÎªµÚÈý·½¹©Ó¦É̵ÄÈí¼þÎó²î£¬£¬ £¬£¬£¬£¬£¬ÍâйÊý¾ÝÀàÐͺ­¸ÇÔ¤Ô¼¼Í¼£¨ÈçÊÖÊõÀàÐÍ¡¢Ò½ÉúÐÕÃû¡¢ÈÕÆÚËùÔÚ£©¡¢¿µ½¡°ü¹ÜÐÅÏ¢£¨º¬ÊÜÒæÈ˱àºÅ¡¢°ü¹Ü×ʸñ£©¼°²¿·ÖÉí·ÝÎļþ¡£¡£¡£¹©Ó¦ÉÌÓÚ2025Äê1ÔÂ28ÈÕÏòCOPAÌṩDZÔÚÓ°ÏìÊý¾Ý¹æÄ£¡£¡£¡£Ðº±²¼Ê²¶ûÖÝ×ÜÉó²é³¤°ì¹«ÊÒÅû¶£¬£¬ £¬£¬£¬£¬£¬¸ÃÖݹ²ÓÐ67,835ÃûסÃñÐÅÏ¢ÉæÏÕ£¬£¬ £¬£¬£¬£¬£¬ÂíÈøÖîÈûÖÝÉÐÓÐ1,517ÈËÊÜÓ°Ïì¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬£¬EverestÐû²¼µÄ2.9GBй¶Êý¾Ý°üÏÖʵ°üÀ¨2019-2024Äê¼ä¸üÆÕ±éµÄ»¼ÕßÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ÇÒDataBreaches·¢Ã÷¹©Ó¦ÉÌЧÀÍÆ÷´æ´¢´ó×Úδ¼ÓÃÜÃô¸ÐÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Áè¼Ý3ÍòÕżÝÕÕͼÏñ¼°ÆäËûCSVÃûÌÃÒ½ÁƼͼ£¬£¬ £¬£¬£¬£¬£¬Ê±¼ä¿ç¶ÈÔ¶³¬ºÚ¿Í×î³õÉù³ÆµÄ2018Äê¡£¡£¡£


https://databreaches.net/2025/03/27/four-months-after-learning-of-a-vendors-breach-concord-orthopaedics-notifies-almost-68000-patients/


4. Vroom by YouXÒòAWSÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶


3ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬°Ä´óÀûÑǽðÈڿƼ¼¹«Ë¾Vroom by YouX½üÆÚÔâÓöÃô¸ÐÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Jeremiah FowlerÔÚ¹ûÕæ¿É»á¼ûµÄAmazon S3´æ´¢Í°Öз¢Ã÷°üÀ¨27,000Ìõ¼Í¼µÄÎÞ±£»£»£»£»£»¤Êý¾Ý¿â£¬£¬ £¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º­¸Ç¼ÝÕÕ¡¢Ò½ÁƼͼ¡¢¾Íҵ֤ʵ¼°º¬²¿·ÖÐÅÓÿ¨ºÅµÄÒøÐжÔÕ˵¥µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬ £¬£¬£¬£¬£¬ÄÚ²¿½ØÍ¼ÏÔʾ±£´æÉúÑÄ320Íò·ÝÎĵµµÄMongoDBʵÀý£¬£¬ £¬£¬£¬£¬£¬Æä̻¶״̬¿ÉÄÜÐγÉÍøÂç¹¥»÷ÐÂÈë¿Ú¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬ £¬£¬£¬£¬£¬VroomѸËÙÏÞÖÆÊý¾Ý¿â»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬£¬ÈÏ¿ÉÇå¾²Îó²î²¢ÔÊÐí¿ªÕ¹ÊºóÉó²é¡£¡£¡£×÷ΪÈ˹¤ÖÇÄÜÇý¶¯µÄÆû³µÈÚ×ÊÆ½Ì¨£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾×Ô2022ÄêÔËÓªÒÔÀ´Ò»Á¬´¦Öóͷ£´ó×Ú¿Í»§Ãô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬´Ë´Îй¶¼Í¼ʱ¼ä¿ç¶È´ïÈýÄ꣬£¬ £¬£¬£¬£¬£¬Í¹ÏÔÊý¾Ý´¦Öóͷ£»·½ÚµÄÇå¾²Òþ»¼¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬´ËÀàÐÅϢй¶½«Ö±½Óµ¼ÖÂڲƭΣº¦¼¤Ôö£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Éç»á¹¤³Ì¹¥»÷¡¢ÐéαÕË»§¿ªÉè¼°¾«×¼ÍøÂç´¹Âڵȡ£¡£¡£ÆóÒµÓ¦½ÓÄÉMFAÉí·ÝÑéÖ¤¡¢RBACȨÏÞÖÎÀí¡¢¼ÓÃÜ´«ÊäÓë´æ´¢µÈ½¹µã²½·¥£¬£¬ £¬£¬£¬£¬£¬Á¬ÏµCloudTrailµÈ¼à¿Ø¹¤¾ßʵÏÖÍþвʵʱԤ¾¯£¬£¬ £¬£¬£¬£¬£¬°´ÆÚ¿ªÕ¹ÉøÍ¸²âÊÔÐÞ²¹Èõµã£¬£¬ £¬£¬£¬£¬£¬ÐÞ½¨È«ÉúÃüÖÜÆÚÇå¾²·À»¤Á´Ìõ¡£¡£¡£


https://hackread.com/aussie-fintech-vroom-pii-records-aws-misconfiguration/


5. CoffeeLoader¶ñÒâÈí¼þʹÓÃÁ¢ÒìÊÖÒÕ¹æ±Ü¼ì²âÍþвWindowsÓû§


3ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÐÂÐͶñÒâÈí¼þ¼Ò×å"CoffeeLoader"Õý¶ÔWindowsÓû§×é³ÉÑÏÖØÍþв£¬£¬ £¬£¬£¬£¬£¬Æä¸ß¶ÈÒþ²ØÐÔʹµÃ¹Å°å·À²¡¶¾Èí¼þÄÑÒÔ¼ì²â¡£¡£¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÉZscalerÇå¾²ÍŶÓÓÚ2024Äê9Ô·¢Ã÷£¬£¬ £¬£¬£¬£¬£¬Æä¹¥»÷Á´Ê¼ÓÚαװ³É»ªË¶Armoury Crateϵͳ¹¤¾ß£¬£¬ £¬£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØºóÖ²ÈëÐÅÏ¢ÇÔȡģ¿£¿ £¿£¿£¿£¿é£¬£¬ £¬£¬£¬£¬£¬ÒÑÖª¿É´îÔØRhadamanthysµÈ¸ßΣÇÔÃܳÌÐò¡£¡£¡£CoffeeLoaderÕ¹ÏÖ³ö¶àά¶È¹æ±Ü¼ì²âÊÖÒÕ£º½ÓÄÉArmoury Packer¼Ó¿ÇÊÖÒÕʵÑé³õʼÓÕÆ­£¬£¬ £¬£¬£¬£¬£¬¸üÁ¢ÒìµØ½«²¿·Ö¶ñÒâ´úÂë×ªÒÆÖÁGPUÖ´ÐУ¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÇå¾²Èí¼þ¶ÔͼÐδ¦Öóͷ£Æ÷µÄ¼à²âÃ¤ÇøÊµÏÖºã¾ÃDZÔÚ¡£¡£¡£ÆäŲÓÿÍÕ»¸ÄÏÂÊÖÒÕ¿ÉαÔ캯ÊýŲÓÃÁ´£¬£¬ £¬£¬£¬£¬£¬Ê¹Çå¾²ÆÊÎö¹¤¾ßÎóÅгÌÐòÐÐΪÊôÐÔ¡£¡£¡£µ±¼ì²âµ½Ç徲ɨÃèʱ£¬£¬ £¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»áÆô¶¯"˯Ãß»ìÏý"»úÖÆ£¬£¬ £¬£¬£¬£¬£¬½«×ÔÉí¼ÓÃÜ´æ´¢ÓÚÄÚ´æ·Ç»îÔ¾Çø¶Î£¬£¬ £¬£¬£¬£¬£¬ÓÐÓÃÌÓ±Üʵʱ¼ì²â¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬ £¬£¬£¬£¬£¬CoffeeLoader´´Á¢ÐÔµØÊ¹ÓÃWindows FibersÇáÁ¿¼¶Ïß³ÌÊÖÒÕʵÑéÀú³ÌÄÚ¶àʹÃüµ÷Àí£¬£¬ £¬£¬£¬£¬£¬ÕâÖַDZê×¼Ïß³ÌÖÎÀí·½·¨ÍùÍùÈÆ¹ýͨÀý¼à¿ØÏµÍ³¡£¡£¡£Í¨¹ýÕâÖÖ¸´ºÏʽÌÓÒÝÕ½ÂÔ£¬£¬ £¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÄÜÔÚÄ¿µÄϵͳºã¾ÃפÁô£¬£¬ £¬£¬£¬£¬£¬Ò»Á¬Ö´ÐÐδ¾­ÊÚȨµÄÊý¾ÝÊÕÂÞ»òºáÏòÉøÍ¸µÈ¶ñÒâ²Ù×÷¡£¡£¡£Ç徲ר¼Ò½¨ÒéÔöÇ¿ÖÕ¶ËÐÐΪ¼à¿Ø£¬£¬ £¬£¬£¬£¬£¬°²ÅÅ»ùÓÚGPU»î¶¯ÆÊÎöµÄ¼ì²â¼Æ»®£¬£¬ £¬£¬£¬£¬£¬²¢°´ÆÚÑé֤ϵͳ¹¤¾ßµÄÍêÕûÐÔÒÔÌá·À´ËÀà¸ß¼¶Ò»Á¬ÐÔÍþв¡£¡£¡£


https://cybernews.com/security/coffeeloader-malware-asus-windows/


6. Ê®¿înpm°üÔâ¶ñÒâ¸Ä¶¯£¬£¬ £¬£¬£¬£¬£¬¼ÓÃÜÇ®±Ò¿ª·¢ÕßÃô¸ÐÊý¾Ý±»ÍµÈ¡


3ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬Ê®¿înpmÈí¼þ°üÍ»·¢¶ñÒâ´úÂëÖ²ÈëÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¿ª·¢ÕßʵÑ鹩ӦÁ´¹¥»÷¡£¡£¡£Çå¾²³§ÉÌSonatypeµÄÑо¿Ô±°¢À°£¶ûɳ¿²»ùÀïÂÊÏÈ·¢Ã÷£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßʹÓûìÏý¾ç±¾ÔÚÈí¼þ°ü×°ÖÃʱÇÔȡϵͳÇéÐαäÁ¿£¬£¬ £¬£¬£¬£¬£¬Ãô¸ÐÊý¾Ý±»»Ø´«ÖÁÔ¶³ÌЧÀÍÆ÷¡£¡£¡£ÊÜÓ°ÏìÈí¼þ°üÖУ¬£¬ £¬£¬£¬£¬£¬ÈÈÃÅ¿â"country-currency-map"ÿÖÜÏÂÔØÁ¿´ïÊýǧ´Î£¬£¬ £¬£¬£¬£¬£¬Æä2.1.8°æ±¾±»Ö²Èë¶ñÒâ´úÂ룬£¬ £¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØ288´Î¡£¡£¡£¶ñÒâ´úÂëÒþ²ØÓÚÁ½¸ö¾­Óɸ߶ȻìÏýµÄ¾ç±¾Îļþ£¬£¬ £¬£¬£¬£¬£¬Í¨¹ýnpm°ü×°ÖûúÖÆ×Ô¶¯Ö´ÐУ¬£¬ £¬£¬£¬£¬£¬×¨ÃŲ¶»ñ°üÀ¨APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÐÅÏ¢µÄϵͳÇéÐαäÁ¿¡£¡£¡£Ç徲ר¼ÒÆÊÎöÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬´Ë´Î¹¥»÷¼«ÓпÉÄÜÊÇͨ¹ý½ÓÊܺã¾Ãδ»îÔ¾µÄά»¤ÕßÕË»§ÊµÑ飬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓôËǰй¶µÄƾ֤¾ÙÐÐ"ײ¿â"¹¥»÷£¬£¬ £¬£¬£¬£¬£¬»òʹÓÃÓâÆÚÓòÃû¿ØÖÆÈ¨ÏÞ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬£¬ËùÓб»¸Ä¶¯µÄ¿ÍÕ»ÖжñÒâ´úÂë°æ±¾ÍêȫһÖ£¬£¬ £¬£¬£¬£¬£¬ÇҴ󶼿ÍÕ»ÒÑÊýÄêδ¸üУ¬£¬ £¬£¬£¬£¬£¬½øÒ»²½×ôÖ¤ÁËÕË»§Ð®ÖƵÄÍÆ²â¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬³ý"country-currency-map"ÒÑÆúÓöñÒâ°æ±¾²¢Ö¸µ¼Óû§½µ¼¶ÖÁ2.1.7Çå¾²°æ±¾Í⣬£¬ £¬£¬£¬£¬£¬ÆäÓà±»¸Ä¶¯Èí¼þ°üÈÔЯ´ø¶ñÒâ´úÂëÔÚnpmƽ̨Á÷ͨ¡£¡£¡£Ö»¹ÜnpmÒѶԻîÔ¾ÏîÄ¿Ç¿ÖÆÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬ £¬£¬£¬£¬£¬µ«´Ë´ÎÉæÊÂÈí¼þ°ü¶àΪÀϾÉÏîÄ¿£¬£¬ £¬£¬£¬£¬£¬Î¬»¤Õß¿ÉÄÜÒÑÍÑÀëÖÎÀí£¬£¬ £¬£¬£¬£¬£¬ÐγÉÇå¾²·À»¤Ã¤Çø¡£¡£¡£


https://www.bleepingcomputer.com/news/security/infostealer-campaign-compromises-10-npm-packages-targets-devs/