npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬¶ñÒâÈí¼þÃé×¼¿ª·¢Ö°Ô±
Ðû²¼Ê±¼ä 2024-11-071.npm¹©Ó¦Á´ÔâÓòÃûÇÀ×¢¹¥»÷£¬¶ñÒâÈí¼þÃé×¼¿ª·¢Ö°Ô±
https://www.theregister.com/2024/11/05/typosquatting_npm_campaign/
2. Winos4.0¿ò¼Ü£ººÚ¿ÍʹÓÃÓÎÏ·Ó¦ÓÃÃé×¼WindowsÓû§¾ÙÐжñÒâ¹¥»÷
11ÔÂ6ÈÕ£¬ºÚ¿Í½üÆÚƵÈÔʹÓöñÒâµÄWinos4.0¿ò¼Ü¹¥»÷WindowsÓû§£¬¸Ã¿ò¼Üͨ¹ýαװ³ÉÎÞº¦µÄÓÎÏ·Ïà¹ØÓ¦ÓóÌÐò¾ÙÐÐÈö²¥¡£¾ÝÇ÷ÊƿƼ¼½ñÏÄÐû²¼µÄ±¨¸æ£¬Ò»¸öÃûΪVoid Arachne/Silver FoxµÄÍþвÐÐΪÕßÔøʹÓÃÐ޸IJ¢À¦°ó¶ñÒâ×é¼þµÄÈí¼þ£¨ÈçVPNºÍ¹È¸èChromeä¯ÀÀÆ÷£©Õë¶ÔÖйúÊг¡¡£ÏÖÍøÂçÇå¾²¹«Ë¾Fortinet·¢Ã÷£¬ºÚ¿ÍÔ˶¯ÒÑÑݱ䣬¼ÌÐøÒÀÀµÓÎÏ·ºÍÓÎÏ·Ïà¹ØÎļþ¹¥»÷ÖйúÓû§¡£µ±Ö´ÐÐαװ³ÉÕýµ±µÄ×°ÖóÌÐòʱ£¬ËüÃÇ»á´ÓÌض¨ÍøÖ·ÏÂÔØDLLÎļþ£¬Æô¶¯¶à°ì·¨Ñ¬È¾Àú³Ì¡£Õâ°üÀ¨ÏÂÔØÆäËûÎļþ¡¢ÉèÖÃÖ´ÐÐÇéÐΡ¢½¨É賤ÆÚÐÔ¡¢¼ÓÔØAPI¡¢¼ìË÷ÉèÖÃÊý¾Ý¡¢½¨ÉèÓëC2·þÎñÆ÷µÄÅþÁ¬µÈ¡£×îÖÕ£¬¼ÓÔصĵǼģ¿éÖ´ÐÐÖ÷Òª¶ñÒâ²Ù×÷£¬ÈçÍøÂçϵͳÐÅÏ¢¡¢¼ì²éÇå¾²Èí¼þ¡¢ÍøÂç¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡¢Î¬³ÖÓëC2·þÎñÆ÷µÄÅþÁ¬£¬ÒÔ¼°½ØÆÁ¡¢¼àÊÓ¼ôÌù°åת±äºÍÇÔÈ¡Îļþ¡£Winos4.0»¹Äܼì²é¶àÖÖÇå¾²¹¤¾ßÀú³Ì£¬ÒÔÈ·¶¨ÊÇ·ñÔÚÊܼà¿ØÇéÐÎÖÐÔËÐУ¬²¢µ÷½âÐÐΪ¡£¸Ã¿ò¼Ü¹¦Ð§Ç¿Ê¢£¬ÀàËÆCobalt StrikeºÍSliver£¬ÇÒÐÂÔ˶¯µÄ·ºÆðÅú×¢ÆäÔÚ¶ñÒâ²Ù×÷ÖеÄ×÷ÓÃÒÑÀο¿¡£
https://www.bleepingcomputer.com/news/security/hackers-increasingly-use-winos40-post-exploitation-kit-in-attacks/
3.VEILDriveÍþвÔ˶¯£ºÊ¹ÓÃ΢ÈíSaaS·þÎñ¾ÙÐÐÍøÂç´¹ÂÚÓë¶ñÒâÈí¼þ°²ÅÅ
11ÔÂ6ÈÕ£¬Ò»ÏîÃûΪVEILDriveµÄÒ»Á¬ÍþвÔ˶¯±»·¢Ã÷ʹÓÃ΢ÈíµÄÕýµ±·þÎñ£¬ÈçTeams¡¢SharePoint¡¢Quick AssistºÍOneDrive£¬¾ÙÐÐÓã²æʽÍøÂç´¹ÂÚ¹¥»÷²¢·Ö·¢¶ñÒâÈí¼þ¡£ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾HuntersÔÚÊÓ²ìÒ»ÆðÕë¶ÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©×éÖ¯µÄÍøÂçÊÂÎñʱ·¢Ã÷ÁËÕâÒ»Ô˶¯¡£¹¥»÷Õßð³äITÍŶӳÉÔ±£¬Í¨¹ýTeamsÐÂÎźͿìËÙÖúÊÖ¹¤¾ßÇëÇóÔ¶³Ì»á¼ûϵͳ£¬²¢Ê¹ÓÃ֮ǰÊܵ½¹¥»÷µÄ×éÖ¯µÄ¿ÉÐÅ»ù´¡ÉèÊ©À´·Ö·¢¹¥»÷¡£ËûÃÇͨ¹ýSharePoint·ÖÏíÁËÒ»¸öÖ¸ÏòÍйÜÔÚ²î±ð×⻧ÉϵÄZIP´æµµÎļþµÄÏÂÔØÁ´½Ó£¬¸Ã´æµµÖÐǶÈëÁËÔ¶³Ì»á¼û¹¤¾ßLiteManager¡£È»ºó£¬Í¨¹ý¿ìËÙÖúÊÖ»ñµÃµÄÔ¶³Ì»á¼ûȨÏÞ£¬ÔÚϵͳÉϽ¨ÉèÁË°´ÆÚÖ´ÐÐLiteManagerµÄÍýÏëʹÃü¡£»¹ÏÂÔØÁ˵ڶþ¸öZIPÎļþ£¬ÆäÖаüÀ¨»ùÓÚJavaµÄ¶ñÒâÈí¼þºÍÕû¸öJava¿ª·¢¹¤¾ß°ü¡£¸Ã¶ñÒâÈí¼þʹÓÃÓ²±àÂëµÄƾ֤ÅþÁ¬µ½µÐÊÖ¿ØÖƵÄOneDriveÕÊ»§£¬²¢½«ÆäÓÃ×÷ÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷£¬ÒÔÔÚÊÜѬȾµÄϵͳÉÏ»ñÈ¡ºÍÖ´ÐÐPowerShellÏÂÁî¡£ÕâÖÖÒÀÀµSaaSµÄÕ½ÂÔʹʵʱ¼ì²â±äµÃÖش󣬲¢ÈƹýÁ˹Űå·ÀÓù²½·¥¡£
https://thehackernews.com/2024/11/veildrive-attack-exploits-microsoft.html
4.»ªÊ¢¶ÙÖÝ·¨ÔºÏµÍ³ÔâÍøÂç¹¥»÷̱»¾£¬½ôÆȻָ´ÖÐ
11ÔÂ6ÈÕ£¬×ÔÖÜÈÕ¹ÙÔ±·¢Ã÷ÍøÂç±£´æ¡°Î´¾ÊÚȨµÄÔ˶¯¡±ÒÔÀ´£¬»ªÊ¢¶ÙÖݸ÷µØµÄ·¨ÔºÏµÍ³ÏÝÈë̱»¾£¬ËùÓÐÖÝ·¨ÔºµÄ˾·¨ÐÅϢϵͳ¡¢ÍøÕ¾¼°Ïà¹Ø·þÎñ¾ùÊÜÒ»Á¬Ó°Ïì¡£¾Ý¡¶Î÷ÑÅͼʱ±¨¡·±¨µÀ£¬·¨ÔºÖÎÀí°ì¹«ÊÒ£¨AOC£©ÒÑѸËÙÐж¯£¬È·±£Òªº¦ÏµÍ³Çå¾²²¢Æð¾¢»Ö¸´·þÎñ¡£AOC¸±Ö÷ÈÎεϡ¤·ÑÀ׶ûÌåÏÖ£¬³öÓÚÇ徲˼Á¿£¬ÏµÍ³ÒÑ×Ô¶¯¹Ø±Õ£¬²¢Óëר¼ÒÏàÖúÖçÒ¹»Ö¸´¡£²¿·ÖÊз¨ÔººÍµØÇø·¨ÔºÈÔÔÚÌṩÓÐÏÞ·þÎñ£¬¶øƤ¶û˹Ïظߵȷ¨ÔºÊé¼ÇÔ±°ì¹«ÊÒËä·þÎñÖÐÖ¹£¬µ«ÈԿɾÙÐÐÔÚÏß»á¼û£¬²¢ÕýÆð¾¢»Ö¸´·þÎñ¡£Ô¤¼Æ·¨Ôº»ù±¾Ö°ÄܺÍËßËϳÌÐò½«°´ÍýÏë¾ÙÐУ¬¿Í»§·þÎñ¹ñ̨¿ª·Å£¬µ«½¨ÒéÌáÇ°È·ÈÏ·þÎñ¿ÉÓÃÐÔ¡£Í¬Ê±£¬²¿·Ö·þÎñÈçѶ¶Ï/·£¿îÓà¶îÐÅÏ¢ºÍµç×Ó·¨Í¥¼Í¼ËÑË÷ÔÚƤ¶û˹ÏØ·¨Ôº»Ö¸´Ç°Ôݲ»¿ÉÓá£ÀàËÆÊÂÎñÔøÔÚ¿°Èø˹Öݱ¬·¢£¬2023Äê10ÔÂÖÐÑ®£¬Æä·¨ÔºÖÎÀí¾ÖÍøÂçÔâÈëÇÖ£¬ºÚ¿ÍÇÔÈ¡Ãô¸ÐÎļþ£¬¾ßÓÐÀÕË÷Èí¼þ¹¥»÷¼£Ïó£¬ÆÈʹ˾·¨²¿·Ö¹Ø±Õ¶à¸öÐÅϢϵͳ¡£
https://www.bleepingcomputer.com/news/security/washington-courts-systems-offline-following-weekend-cyberattack/
5.SteelFox¶ñÒâÈí¼þ£ºÊ¹ÓÃÒ×Êܹ¥»÷ÇýÏÂÊÖÒÕÇÔÊØÐÅÏ¢ÓëÍÚ¾ò¼ÓÃÜÇ®±Ò
11ÔÂ6ÈÕ£¬ÃûΪ¡°SteelFox¡±µÄжñÒâÈí¼þʹÓá°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò¡±ÊÖÒÕ»ñÈ¡WindowsϵͳȨÏÞ£¬ÒÔÍÚ¾ò¼ÓÃÜÇ®±Ò²¢ÇÔÊØÐÅÓÿ¨Êý¾ÝµÈÐÅÏ¢¡£¸ÃÈí¼þͨ¹ýÂÛ̳ºÍÖÖ×Ó×·×ÙÆ÷ÒÔÆƽ⹤¾ßµÄÐÎʽ·Ö·¢£¬¿É¼¤»î¶àÖÖÈí¼þµÄÕýµ±°æ±¾¡£¿¨°Í˹»ùÑо¿Ö°Ô±ÓÚ8Ô·¢Ã÷¸Ã¹¥»÷Ô˶¯£¬µ«¶ñÒâÈí¼þ×Ô2023Äê2ÔÂÒѱ£´æ£¬²¢Í¨¹ý¶àÖÖÇþµÀÔöÌíÁËÈö²¥¡£SteelFoxʹÓÃÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐòÌáÉýȨÏÞ£¬½¨Éè·þÎñ²¢Ê¹ÓÃÎó²î½«È¨ÏÞÌáÉýµ½×î¸ß¼¶±ð¡£¸Ã¶ñÒâÈí¼þ»¹ÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¾ò£¬²¢¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ£¬´ÓÍøÂçä¯ÀÀÆ÷ÖÐÌáÈ¡Êý¾Ý¡£Ö»¹ÜC2ÓòÊÇÓ²±àÂëµÄ£¬µ«ÍþвÐÐΪÕßͨ¹ýÇл»IPµØµãºÍʹÓÃGoogle¹«¹²DNSºÍDoHÒþ²ØÆäλÖá£SteelFox¹¥»÷ûÓÐÌض¨Ä¿µÄ£¬µ«Ö÷ÒªÕë¶ÔAutoCAD¡¢JetBrainsºÍFoxit PDF EditorµÄÓû§£¬ÒÑѬȾ¶à¸ö¹ú¼ÒµÄϵͳ¡£
https://www.bleepingcomputer.com/news/security/new-steelfox-malware-hijacks-windows-pcs-using-vulnerable-driver/
6.SelectBlindsÍøÕ¾ÔâºÚ¿Í¹¥»÷£¬20ÍòÖ÷¹ËÐÅÓÿ¨ÐÅÏ¢±»µÁ
11ÔÂ7ÈÕ£¬ºÚ¿ÍÔÚ´óÐÍÁãÊÛÉÌSelectBlindsµÄÍøÕ¾ÉÏÖ²ÈëÁ˶ñÒâÈí¼þ£¬µ¼ÖÂ20¶àÍòÖ÷¹ËµÄÐÅÓÿ¨ÐÅÏ¢ºÍÆäËûÊý¾Ý±»µÁ¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ´Ó1ÔÂ7ÈÕ¾ÍÒѱ£´æ£¬ÓÚ9ÔÂ28ÈÕ±»Ô±¹¤·¢Ã÷¡£³ýÁ˵ǼÐÅÏ¢£¬ºÚ¿Í»¹¿ÉÄÜ»ñÈ¡ÁËÖ÷¹ËµÄÐÕÃû¡¢µç×ÓÓʼþ¡¢ËÍ»õºÍÕ˵¥µØµã¡¢µç»°ºÅÂëÒÔ¼°Ö§¸¶¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÇå¾²/CVV´úÂ롣ΪÁËÆÈʹÓû§¸ü¸ÄÃÜÂ룬SelectBlindsÒÑËø¶¨Óû§ÕË»§²¢É¾³ýÁ˶ñÒâÈí¼þ£¬Í¬Ê±ÖÒÑÔÔÚÆäËûÍøÕ¾ÉÏÖظ´Ê¹ÓÃÏàͬµÇ¼ÐÅÏ¢µÄÈËÓ¦Á¬Ã¦¸ü¸ÄÃÜÂë¡£ºÚ¿ÍʹÓõç×ÓµÁË¢Æ÷ÇÔÊØÐÅÓÿ¨ÐÅÏ¢ÒѳÉΪºã¾Ã±£´æµÄÎÊÌ⣬ËûÃÇͨ¹ýÏòÒ×Êܹ¥»÷µÄÍøÕ¾×¢Èë¶ñÒâ´úÂëÀ´²¶»ñÃô¸ÐÊý¾Ý£¬²¢½«ÕâЩÐÅÏ¢³öÊÛ¸øÐÅÓÿ¨Ú²Æ»ú¹¹¡£¾ÝRecorded FutureÔÚÉϸöÔµÄÒ»·Ý±¨¸æÖгƣ¬ºÚ¿ÍÔÚ°µÍøÐÅÓÿ¨ÊÐËÁÖÐÐû²¼ÁË1500ÍòÌõÐÅÓÿ¨¼Í¼ÒÔ¹©³öÊÛ¡£
https://therecord.media/selectblinds-customers-credit-card-info-data-breach-website-malware