npm¶ñÒâÈí¼þÃé×¼AtomicºÍExodusÇ®°ü

Ðû²¼Ê±¼ä 2025-04-11

1. npm¶ñÒâÈí¼þÃé×¼AtomicºÍExodusÇ®°ü


4ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ ReversingLabs£¨RL£©½üÆÚ·¢Ã÷ÁËÒ»ÖÖÕë¶Ô¼ÓÃÜÇ®±ÒÓû§µÄÐÂÕ½ÂÔ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓà npm£¨½Úµã°ü¹ÜÀíÆ÷£©ÍøÂ磬£¬£¬£¬£¬£¬ÏòÍâµØ×°ÖõļÓÃÜÇ®±ÒÇ®°üÈí¼þ£¨ÓÈÆäÊÇ Atomic Wallet ºÍ Exodus£©×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ͨ¹ý¶ñÒâÐÞ²¹Õýµ±Èí¼þÎļþʵÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÇÄÇĽ»Á÷ÊÕ¼þÈËÇ®°üµØµã£¬£¬£¬£¬£¬£¬´Ó¶ø×èµ²¼ÓÃÜÇ®±Ò×ªÒÆ¡£¡£¡£¡£¡£RL ·¢Ã÷ÁËÒ»¸öÃûΪ¡°pdf-to-office¡±µÄ¶ñÒâ npm °ü£¬£¬£¬£¬£¬£¬¸Ã°üαװ³É½« PDF Îļþת»»Îª Microsoft Office ÎĵµµÄÊÊÓóÌÐò£¬£¬£¬£¬£¬£¬µ«Ö´ÐÐʱ»á°²ÅŶñÒâ¸ºÔØ£¬£¬£¬£¬£¬£¬ÐÞ¸Ä Atomic Wallet ºÍ Exodus ×°ÖÃĿ¼ÖеÄÒªº¦Îļþ¡£¡£¡£¡£¡£¶ñÒâÈí¼þÓÃľÂí°æ±¾ÁýÕÖÕýµ±Îļþ£¬£¬£¬£¬£¬£¬ÉñÃØ¸ü¸Ä¼ÓÃÜÇ®±ÒÉúÒâµÄÄ¿µÄµØµã£¬£¬£¬£¬£¬£¬ÇÒÄÑÒÔ±»²ì¾õ£¬£¬£¬£¬£¬£¬ÓÉÓÚÇ®°ü½¹µã¹¦Ð§¿´ËÆÎ´±ä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Èí¼þ°üÖл¹·¢Ã÷ÁËÒ»¸ö¾­ÓÉ»ìÏýµÄ JavaScript Îļþ£¬£¬£¬£¬£¬£¬Ì»Â¶ÁËÆä¶ñÒâÒâͼ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¾ßÓг¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬×ÝÈ»¶ñÒâ¡°pdf-to-office¡±Èí¼þ°ü±»É¾³ý£¬£¬£¬£¬£¬£¬ÊÜѬȾµÄ¼ÓÃÜÇ®±ÒÇ®°üÈí¼þÈÔ»á¼á³ÖѬȾ״̬£¬£¬£¬£¬£¬£¬Ä¾ÂíÎļþÈÔÔÚÔËÐУ¬£¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØ½«×ʽðÖØ¶¨Ïòµ½¹¥»÷ÕßµÄ Web3 Ç®°ü¡£¡£¡£¡£¡£Ïû³ýÍþвµÄΨһÓÐÓÃÒªÁìÊdz¹µ×ɾ³ý²¢ÖØÐÂ×°ÖÃÊÜÓ°ÏìµÄÇ®°üÈí¼þ¡£¡£¡£¡£¡£


https://hackread.com/npm-malware-atomic-exodus-wallets-hijack-crypto/


2. ¶íÀÕ¸ÔÖÝÇéÐλú¹¹ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±ÕÍøÂç


4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬¶íÀÕ¸ÔÖÝÇéÐÎÖÊÁ¿¾Ö£¨DEQ£©ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÍøÂç±»ÆÈ¹Ø±Õ¡£¡£¡£¡£¡£¸Ã»ú¹¹ÈÏÕæî¿Ïµ¶íÀÕ¸ÔÖÝµÄ¿ÕÆø¡¢ÍÁµØºÍË®ÖÊÁ¿£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷¶ÔÆäÔËÓªÔì³ÉÁËÑÏÖØÓ°Ïì¡£¡£¡£¡£¡£DEQ¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬£¬£¬³µÁ¾¼ì²éÕ¾½«¹Ø±ÕÖÁÖÜÎ壬£¬£¬£¬£¬£¬ÒÔÓ¦¶Ô´Ë´ÎÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹ÕýÔÚÈ«Á¦¸ôÀëЧÀÍÆ÷ºÍÍøÂ磬£¬£¬£¬£¬£¬Ö±ÖÁ¹¥»÷±»ÍêÈ«¿ØÖƲ¢¿ÉÄܱ»¸ù³ý¡£¡£¡£¡£¡£DEQµÄIT¡¢ÆóÒµÐÅϢϵͳºÍ΢ÈíÍøÂçÇå¾²ÍŶÓÕýÔÚϸÃÜÏàÖú£¬£¬£¬£¬£¬£¬ÅäºÏÓ¦¶Ô´Ë´ÎÍøÂçÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬ÆäËûÖÝÒ²Ðû²¼Á˽üÆÚÓ°ÏìÒªº¦Õþ¸®Ð§À͵ÄÍøÂçÊÂÎñ¡£¡£¡£¡£¡£ÑÇÀûÉ£ÄÇÖÝÁª°î¹«¹²±ç»¤È˰칫ÊÒÒòÀÕË÷Èí¼þ¹¥»÷Òѹرգ¬£¬£¬£¬£¬£¬¶àÆð°¸¼þÉóÀíʱ¼äÒѸÄÖÁÎåÔ¡£¡£¡£¡£¡£°®´ïºÉÖݹŶ¡ÏØÍøÂçÒ²ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÏØÏòµ¼ÒÑÁªÏµÁª°îÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾Ð­Öú¿ØÖÆÊÂÎñ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÄÚ²¼À­Ë¹¼ÓÖݱ±ÆÕÀ­ÌØ×ÔÈ»×ÊÔ´ÇøÒ²Ö¤ÊµÔâÓöÁËÍøÂç¹¥»÷ºÍÊý¾Ýй¶¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐÎÞÈκÎÀÕË÷Èí¼þÍÅ»ï»òºÚ¿Í×éÖ¯Éù³Æ¶ÔÕâЩÊÂÎñÈÏÕæ¡£¡£¡£¡£¡£


https://therecord.media/oregon-department-environmental-quality-cyberattack


3. Gamaredon×éÖ¯Éý¼¶¹¥»÷ÊֶΣ¬£¬£¬£¬£¬£¬Î÷·½ÍøÂçÃæÁÙÐÂÍþв


4ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯Gamaredon£¨ÓÖÃû¡°Shuckworm¡±£©×Ô2025Äê2ÔÂÖÁ3Ô£¬£¬£¬£¬£¬£¬Ò»Á¬Õë¶ÔÎ÷·½¹ú¼ÒÔÚÎÚ¿ËÀ¼µÄ¾üÊÂʹÃü·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬¿ÉÄÜͨ¹ý¿ÉÒÆ¶¯Ó²Å̾ÙÐС£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Í°²ÅÅÁ˸üа汾µÄGammaSteelÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ°üÀ¨¶ñÒâ.LNKÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷£¬£¬£¬£¬£¬£¬ÕâÊÇGamaredonÒÑÍù³£ÓõĹ¥»÷ÊֶΡ£¡£¡£¡£¡£´Ë´Î£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽ÍþвÐÐΪÕßµÄÕ½ÂÔÓÐËùת±ä£¬£¬£¬£¬£¬£¬°üÀ¨´ÓVBS¾ç±¾×ªÏò»ùÓÚPowerShellµÄ¹¤¾ß¡¢¶ÔÓÐÓÃÔØºÉ¾ÙÐиü¶à»ìÏýÒÔ¼°¸ü¶àµØÊ¹ÓÃÕýµ±Ð§À;ÙÐÐÌӱܡ£¡£¡£¡£¡£ÔÚѬȾÀú³ÌÖУ¬£¬£¬£¬£¬£¬Ò»¸ö¸ß¶È»ìÏýµÄ¾ç±¾»á½¨Éè²¢ÔËÐÐÁ½¸öÎļþ£¬£¬£¬£¬£¬£¬»®·Ö´¦Öóͷ£ÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶¼°Èö²¥»úÖÆ£¬£¬£¬£¬£¬£¬Í¬Ê±Òþ²ØÄ³Ð©Îļþ¼ÐºÍϵͳÎļþ¡£¡£¡£¡£¡£Gamaredon»¹Ê¹ÓÃÕì̽PowerShell¾ç±¾²¶»ñºÍй¶װ±¸ÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢×îÖÕ°²ÅÅ»ùÓÚPowerShellµÄGammaSteel°æ±¾£¬£¬£¬£¬£¬£¬ÇÔÈ¡×ÀÃæ¡¢ÎĵµºÍÏÂÔØµÈλÖõÄÎĵµ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓá°certutil.exe¡±¶ÔÎļþ¾ÙÐйþÏ£´¦Öóͷ££¬£¬£¬£¬£¬£¬²¢Í¨¹ýPowerShell WebÇëÇó»òTorÉϵÄcURL´«Êä±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÚÄ¿µÄÅÌËã»úÉϽ¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-attack-western-military-mission-using-malicious-drive/


4. Medusa¹¥»÷Âö²«½ôÆÈÕչ˻¤Ê¿ÖÐÐÄ£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý²¢Ë÷ÒªÊê½ð


4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯ÃÀ¶Åɯ£¨Medusa£©¶ÔÂö²«½ôÆÈÕչ˻¤Ê¿ÖÐÐÄ£¨Pulse Urgent Care Center£©·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬¸ÃÖÐÐÄÌṩ½ôÆÈÕչ˻¤Ê¿¡¢ÁÙ´²Ò½Ñ§¡¢Å®ÐÔ¿µ½¡¡¢¹¤ÉËÅâ³¥ºÍ¹ÍÖ÷ЧÀ͵ÈһϵÁÐÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ¼ÓÖÝÀ×¶¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬ÔÚÀ׵°ͷòÒ²ÉèÓзֲ¿¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬MedusaÐû²¼Á˲¿·ÖÖ¤¾Ý£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÎļþÊ÷£¬£¬£¬£¬£¬£¬ÄÚÓÐÁè¼Ý127,000ÐÐÎı¾ÃûÌõÄÊý¾Ý¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ýº­¸Ç»¼Õß²¡Àú£¨°üÀ¨Õï¶Ï¡¢ÖÎÁƺͼì²éЧ¹ûµÈ£©¡¢ÖÎÀíÊý¾Ý£¨ÓëÒ½ÁƱ£½¡ÌṩÕßÄÚ²¿ÖÎÀíÓйصÄÓªÒµÐÅÏ¢£©¡¢°ü¹ÜÊý¾Ý£¨Óйػ¼Õß¿µ½¡°ü¹ÜÕþ²ßµÄÐÅÏ¢£©¡¢ÌṩÕßÁÐ±í£¨ÓйØÒ½ÉúºÍÒ½ÁƱ£½¡×¨ÒµÖ°Ô±µÄÊý¾Ý£©¡¢ÌṩÕ߼ͼ¸üÐÂ±í¡¢¹ÍÖ÷ÁªÏµºÍÕ˵¥ÐÅÏ¢±í£¬£¬£¬£¬£¬£¬ÒÔ¼°Rapid Radiology, Inc.ÍøÕ¾µÄµÇ¼ƾ֤¡£¡£¡£¡£¡£MedusaÕë¶Ô´Ë´ÎÊÂÎñÁгöÁËÇåµ¥£¬£¬£¬£¬£¬£¬ÒªÇóÖ§¸¶120,000ÃÀÔªµÄBTCÒÔÏÂÔØ»òɾ³ýËùÓÐÊý¾Ý¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬Pulse Urgent Care CenterµÄÍøÕ¾ÉÏδÏÔʾÈκÎÒì³£¼£Ï󣬣¬£¬£¬£¬£¬ÇÒ¸ÃÖÐÐÄÉÐδ¶Ô´Ë´Î¹¥»÷×ö³öÈ·ÈÏ»ò·ñ¶¨¡£¡£¡£¡£¡£


https://databreaches.net/2025/04/09/__trashed-15/


5. OttoKit WordPress²å¼þ¸ßΣÎó²îÔâºÚ¿ÍѸËÙʹÓÃ


4ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬WordPressµÄOttoKit£¨Ç°³ÆSureTriggers£©²å¼þÆØ³ö¸ßÑÏÖØÐÔÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-3102£©£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°Ïì1.0.78¼°ÒÔÉϰ汾¡£¡£¡£¡£¡£ÓÉÓÚauthenticating_user()º¯ÊýÖÐȱÉÙ¿ÕÖµ¼ì²é£¬£¬£¬£¬£¬£¬µ±²å¼þδÉèÖÃAPIÃÜԿʱ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËͿյÄst_authorization±êÍ·ÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨ»á¼ûÊܱ£»£»£»£»¤µÄAPI¶Ëµã£¬£¬£¬£¬£¬£¬½ø¶ø½¨ÉèеÄÖÎÀíÔ±ÕÊ»§£¬£¬£¬£¬£¬£¬±£´æÍêȫվµã½ÓÊܵĸßΣº¦¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±¡°mikemyers¡±ÓÚ3ÔÂÖÐÑ®·¢Ã÷´ËÎó²î²¢»ñµÃÉͽ𣬣¬£¬£¬£¬£¬4ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬²å¼þ¹©Ó¦ÉÌÐû²¼1.0.79°æÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Îó²îÅû¶ºó½öÊýСʱ£¬£¬£¬£¬£¬£¬ºÚ¿Í±ã×îÏÈʹÓôËÎó²î£¬£¬£¬£¬£¬£¬ÊµÑ齨ÉèеÄÖÎÀíÔ±ÕÊ»§¡£¡£¡£¡£¡£PatchstackÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬£¬£¬ÕâÖÖѸËÙµÄʹÓÃ͹ÏÔÁËÁ¬Ã¦Ó¦Óò¹¶¡»ò»º½â²½·¥µÄÆÈÇÐÐèÒª¡£¡£¡£¡£¡£¼øÓÚOttoKit²å¼þÒÑÔÚ10Íò¸öÍøÕ¾ÉÏ»îÔ¾£¬£¬£¬£¬£¬£¬ÇÒ¸ÃÎó²îÓ°ÏìÆÕ±é£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìÉý¼¶µ½1.0.79°æ±¾£¬£¬£¬£¬£¬£¬²¢¼ì²éÈÕÖ¾ÖÐÊÇ·ñ±£´æÒâÍâµÄÖÎÀíÔ±ÕÊ»§»òÆäËûÓû§½ÇÉ«¡¢²å¼þ/Ö÷ÌâµÄ×°Öá¢Êý¾Ý¿â»á¼ûÊÂÎñÒÔ¼°Çå¾²ÉèÖõÄÐ޸쬣¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÕ¾Çå¾²¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-auth-bypass-hours-after-disclosure/


6. Gladinet CentreStackÁãÈÕÎó²îCVE-2025-30406ÔâÔÚҰʹÓÃ


4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬×Ô3ÔÂ·ÝÆð£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃGladinet CentreStackÇå¾²Îļþ¹²ÏíÈí¼þÖеÄÁãÈÕÎó²î£¨CVE-2025-30406£©ÈëÇִ洢ЧÀÍÆ÷¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÒ»¸ö·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬Ó°Ïì16.1.10296.56315¼°ÒÔÉϰ汾¡£¡£¡£¡£¡£ÎÊÌâÔ´ÓÚCentreStackÃÅ»§ÉèÖÃÖÐʹÓÃÁËÓ²±àÂëµÄmachineKey£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈôÖªÏþ´ËÃÜÔ¿£¬£¬£¬£¬£¬£¬¿É±àд²¢Ö´ÐжñÒâÐòÁл¯¸ºÔØ£¬£¬£¬£¬£¬£¬ÈƹýÍêÕûÐÔ¼ì²é£¬£¬£¬£¬£¬£¬×¢Èëí§ÒâÐòÁл¯¹¤¾ß£¬£¬£¬£¬£¬£¬×îÖÕÔÚЧÀÍÆ÷ÉÏÖ´ÐдúÂë¡£¡£¡£¡£¡£GladinetÒÑÓÚ2025Äê4ÔÂ3ÈÕÐû²¼Çå¾²ÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬°æ±¾Îª16.4.10315.56368¡¢16.3.4763.56357£¨Windows£©ºÍ15.12.434£¨macOS£©¡£¡£¡£¡£¡£¹©Ó¦É̽¨ÒéÓû§¾¡¿ìÉý¼¶µ½×îа汾£¬£¬£¬£¬£¬£¬¹ØÓÚÎÞ·¨Á¬Ã¦¸üеĿͻ§£¬£¬£¬£¬£¬£¬½¨ÒéÂÖ»»machineKeyÖµ×÷ΪÔÝʱ»º½â²½·¥£¬£¬£¬£¬£¬£¬²¢È·±£¶àЧÀÍÆ÷°²ÅÅÖпç½ÚµãµÄÒ»ÖÂÐÔ£¬£¬£¬£¬£¬£¬ÔÚ¸ü¸ÄºóÖØÐÂÆô¶¯IISÒÔÓ¦Óûº½â²½·¥¡£¡£¡£¡£¡£CISAÒѽ«¸ÃÎó²îÌí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬£¬£¬²¢ÒªÇóÊÜÓ°ÏìµÄÖݺÍÁª°î×éÖ¯ÔÚ2025Äê4ÔÂ29ÈÕ֮ǰӦÓÃÇå¾²¸üлººÍ½â²½·¥£¬£¬£¬£¬£¬£¬²»È»×èֹʹÓøòúÆ·¡£¡£¡£¡£¡£¼øÓڸòúÆ·µÄÐÔ×Ó£¬£¬£¬£¬£¬£¬ËüºÜ¿ÉÄܱ»Ê¹ÓÃÀ´¾ÙÐÐÊý¾Ý͵ÇÔ¹¥»÷¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/