Solana JavaScript SDKÔ⹩ӦÁ´¹¥»÷£¬¶ñÒâ´úÂëÇÔÈ¡¼ÓÃÜÇ®±Ò˽Կ

Ðû²¼Ê±¼ä 2024-12-06

1. Solana JavaScript SDKÔ⹩ӦÁ´¹¥»÷£¬¶ñÒâ´úÂëÇÔÈ¡¼ÓÃÜÇ®±Ò˽Կ


12ÔÂ4ÈÕ£¬SolanaµÄJavaScript SDK¡°@solana/web3.js¡±ÔÚ½üÆÚµÄÒ»´Î¹©Ó¦Á´¹¥»÷ÖÐÔâµ½ÔÝʱÈëÇÖ£¬¹¥»÷ÕßÐû²¼ÁËÁ½¸ö°üÀ¨¶ñÒâ´úÂëµÄºóÃÅ°æ±¾£¨1.95.6ºÍ1.95.7£©£¬Ö¼ÔÚÇÔÈ¡¼ÓÃÜÇ®±Ò˽Կ²¢ÌÍ¿ÕÇ®°ü¡£ÕâЩ±»ÈëÇֵİ汾ÔÚnpmÉÏÿÖÜÏÂÔØÁ¿Áè¼Ý350,000´Î£¬¶Ô¿ª·¢Ö°Ô±ºÍÓû§×é³ÉÁËÑÏÖØÍþв¡£Solana֤ʵÁËÕâÒ»Îó²î£¬²¢ÌåÏÖÊÇÓÉÓÚÆäÐû²¼»á¼ûÕË»§±»ÈëÇÖËùÖ¡£¹¥»÷Õßͨ¹ýÐ޸ĿâÖеÄÒªº¦º¯Êý£¬½«¶ñÒâ´úÂëÌí¼Óµ½¿âÖУ¬ÒÔÇÔȡ˽Կ²¢½«Æä·¢Ë͵½¹¥»÷ÕߵķþÎñÆ÷¡£¾ÝDataDogÑо¿Ô±³Æ£¬ÍþвÐÐΪÕßÌí¼ÓÁËÒ»¸ö¶ñÒâµÄ¡°addToQueue¡±º¯Êý£¬¸Ãº¯Êýͨ¹ý¿´ËÆÕýµ±µÄCloudFlare±êͷй¶˽Կ¡£´Ë´Î¹¥»÷ÒÑ×·Ëݵ½Ìض¨µÄSolanaµØµã£¬¸ÃµØµã°üÀ¨¶àÖÖ¼ÓÃÜÇ®±ÒºÍNFT£¬Ô¤¼Æ¼ÛֵΪ184,000ÃÀÔª¡£SolanaÖÒÑÔÏÓÒÉ×Ô¼ºÊܵ½¹¥»÷µÄ¿ª·¢Ö°Ô±Á¬Ã¦Éý¼¶µ½×îеÄv1.95.8°æ±¾²¢ÂÖ»»ËùÓÐÃÜÔ¿£¬Í¬Ê±½¨ÒéÇ®°ü±»µÁµÄÈËÁ¬Ã¦½«Ê£Óà×ʽðתÒƵ½ÐÂÇ®°ü£¬²¢×èֹʹÓþÉÇ®°ü¡£


https://www.bleepingcomputer.com/news/security/solana-web3js-library-backdoored-to-steal-secret-private-keys/


2. ¶íÂÞ˹ºÚ¿ÍЮÖÆ°Í»ù˹̹ºÚ¿Í·þÎñÆ÷¾ÙÐй¥»÷


12ÔÂ4ÈÕ£¬¶íÂÞ˹ÍøÂçÌع¤×éÖ¯Turla£¬ÓÖÃû¡°ÉñÃر©Ñ©¡±£¬½üÆÚ½ÓÄÉÁËÒ»ÖÖÐµĹ¥»÷Õ½ÂÔ£¬¼´¹¥»÷²¢Ð®ÖÆÆäËûºÚ¿Í×éÖ¯µÄ»ù´¡ÉèÊ©£¬ÒÔÉñÃØÈëÇÖÒѾ­Êܵ½¹¥»÷µÄÍøÂç¡£¸Ã×éÖ¯ÀÖ³ÉЮÖÆÁË°Í»ù˹̹ºÚ¿Í×éÖ¯Storm-0156µÄ»ù´¡ÉèÊ©£¬²¢Ê¹ÓÃÆä»á¼ûÁËStorm-0156ÔøÈëÇÖ¹ýµÄ°¢¸»º¹ºÍÓ¡¶ÈÕþ¸®×éÖ¯ÍøÂ磬°²ÅÅÁ˶ñÒâÈí¼þ¹¤¾ß¡£¾ÝLumenµÄBlack LotusʵÑéÊÒ±¨¸æ£¬Turla×Ô2022Äê12ÔÂ×îÏȾÙÐд˴ÎÐж¯£¬²¢Ò»Ö±Ò»Á¬ÖÁ2023Äê¡£TurlaÊÇÒ»¸öÊܶíÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯£¬ºã¾ÃÕë¶ÔÈ«ÇòÕþ¸®¡¢×éÖ¯ºÍÑо¿»ú¹¹¾ÙÐÐÍøÂçÌع¤Ô˶¯¡£´Ë´Î£¬ËûÃÇÔÚStorm-0156µÄÍøÂçÖз¢Ã÷ÁËÏ£ÆæµÄÍøÂçÐÐΪ£¬²¢Àֳɹ¥ÆÆÆä¶à¸öC2½Úµã£¬°²ÅÅÁË°üÀ¨TinyTurlaºóÃűäÖÖ¡¢TwoDashºóÃŵÈÔÚÄڵĶñÒâÈí¼þ¡£³ýÁË»ñÈ¡Storm-0156µÄ¶ñÒâÈí¼þ¹¤¾ßºÍ±»µÁÊý¾ÝÍ⣬Turla»¹½øÒ»²½½«Ä¿µÄÃé×¼ÁËStorm-0156×Ô¼º£¬ºáÏò½øÈëÁËÆäÊÂÇéÕ¾¡£TurlaµÄÕâÖÖÕ½ÂÔʹËûÃÇÄܹ»ÉñÃØÍøÂçÇ鱨£¬×èֹ̻¶×Ô¼º»ò¹¤¾ß¼¯£¬´Ó¶ø¼ò»¯¹éÒòÊÂÇé¡£


https://www.bleepingcomputer.com/news/security/russian-turla-hackers-hijack-pakistani-apt-servers-for-cyber-espionage-attacks/


3. ¸ç˹´ïÀè¼ÓRECOPE¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷Òý·¢È¼ÁϹ©Ó¦µ£ÐÄ


12ÔÂ4ÈÕ£¬¸ç˹´ïÀè¼ÓʯÓÍÁ¶Öƹ«Ë¾£¨RECOPE£©½üÆÚÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÔËÓªÊܵ½Ó°Ï죬²¢Òý·¢¹«ÖÚ¶Ô¿ÉÄÜ·ºÆðȼÁÏǷȱµÄµ£ÐÄ¡£¸ÃÊÂÎñÓÚ11ÔÂ27ÈÕ±»·¢Ã÷£¬ÆÈʹRECOPEʵÑéÊÖ¶¯Á÷³Ì£¬Êý×ÖÖ§¸¶ÏµÍ³ÊÜ×裬ȼÁÏ·ÖÅÉÒ²Êܵ½Ó°Ïì¡£RECOPEÈÏÕæÖÎÀíÌìÏÂȼÁÏÈë¿Ú¡¢ÌáÁ¶ºÍ·ÖÅÉ£¬°üÀ¨Ö÷Òª¹ÜµÀ£¬´Ë´Î¹¥»÷¶ÔÆäÔËÓª´øÀ´ÁËÌôÕ½£¬ÓÈÆäÊÇÔÚÓ͹޳µÈ¼ÁÏÂëÍ·¡£Ö»¹ÜRECOPEÈ·ÈÏȼÁÏ´¢±¸¸»×㣬µ«¹«ÖÚµ£Ðĵ¼ÖÂȼÁÏÏúÊÛ¼¤Ôö£¬¹«Ë¾²»µÃ²»ÑÓÉìÔËӪʱ¼ä¡£ÔÚÃÀ¹úÍøÂçÇ徲ר¼ÒµÄЭÖúÏ£¬RECOPEÒÑ×îÏȲ¿·Ö»Ö¸´ÏµÍ³£¬µ«ÔÚÖÜÈ«»Ö¸´Ç°ÐèÈ·±£»ù´¡ÉèÊ©Çå¾²¡£ÕâÒ»ÊÂÎñÊÇÕë¶Ô¸ç˹´ïÀè¼ÓÒªº¦»ù´¡ÉèÊ©ÍøÂç¹¥»÷Ç÷ÊƵÄÑÓÐø£¬Ö®Ç°ContiÀÕË÷Èí¼þ×éÖ¯ÒÑ·¢¶¯¹ýÀàËƹ¥»÷£¬µ¼Ö»ù±¾·þÎṉ̃»¾£¬ÆÈʹ×ÜͳÐû²¼½ôÆÈ״̬²¢»ñµÃÃÀ¹úÔ®Öú¡£Ö»¹ÜÓйز¿·Ö·ñ¶¨¸ü¶à¹¥»÷µÄÒ¥ÑÔ£¬µ«RECOPEÊÂÎñ͹ÏÔÁËÒªº¦»ù´¡ÉèÊ©Ò×ÊÜÍøÂçÍþвµÄÏÖ×´£¬Ïà¹Ø²¿·Ö½«Æð¾¢¼ÓÈëÖ§³ÖÆä»Ö¸´ÊÂÇé¡£


https://securityonline.info/recope-costa-ricas-state-owned-energy-provider-grapples-with-ransomware-attack-and-fuel-supply-disruption/


4. ÂÞÂíÄáÑÇÑ¡¾ÙϵͳÔâÊÜÁè¼Ý 85,000 ´ÎÍøÂç¹¥»÷


12ÔÂ5ÈÕ£¬ÂÞÂíÄáÑÇÇ鱨¾ÖµÄÒ»·Ý½âÃܱ¨¸æÖ¸³ö£¬¸Ã¹úÑ¡¾Ù»ù´¡ÉèÊ©ÔÚ×Üͳѡ¾Ùʱ´úÔâÊÜÁËÁè¼Ý85,000´ÎÍøÂç¹¥»÷£¬¹¥»÷Ô´×Ô33¸ö¹ú¼Ò¡£¹¥»÷ÕßÈëÇÖÁËһ̨°üÀ¨µØͼÊý¾ÝµÄ·þÎñÆ÷£¬²¢Ð¹Â¶ÁËÓëÑ¡¾ÙÏà¹ØµÄÍøÕ¾µÄÕË»§Æ¾Ö¤ÔÚ¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉÏ¡£ÕâЩ¹¥»÷Ò»Á¬µ½µÚÒ»ÂÖ×Üͳѡ¾ÙºóµÄµÚ¶þÌ죬ĿµÄ°üÀ¨ÆÆËðÑ¡¾Ù»ù´¡ÉèÊ©¡¢¸ü¸Ä¹«ÖÚÑ¡¾ÙÐÅÏ¢ºÍ¾Ü¾ø»á¼ûϵͳ¡£ÂÞÂíÄáÑÇÇ鱨»ú¹¹ÖÒÑԳƣ¬Ñ¡¾Ù»ù´¡ÉèÊ©ÈÔ±£´æÎó²î£¬¿ÉÄܻᱻʹÓþÙÐÐÍøÂçºáÏòÒƶ¯ºÍ½¨É賤ÆÚÐÔ¡£±ðµÄ£¬±¨¸æ»¹Ö¸³ö£¬Áè¼Ý100ÃûÂÞÂíÄáÑÇTikTokÓ°ÏìÕß±»Ê¹ÓÃÀ´·Ö·¢Ðû´«×ÜͳºòÑ¡ÈË¿¨ÁÖ¡¤ÇÇÖÎ˹¿âµÄÑ¡¾ÙÄÚÈÝ£¬ÕâЩÕË»§ÔÚÑ¡¾ÙÈÕÇ°Á½ÖܱäµÃ·Ç³£»îÔ¾£¬ÆäÖÐһЩÕË»§ÉõÖÁ´Ó2016Ä꽨É赫ֱµ½½üÆÚ²Å×îÏÈ»îÔ¾¡£ÂÞÂíÄáÑǶÔÍâÇ鱨¾ÖÖ¸³ö£¬¶íÂÞ˹½üÆÚÓиÉÔ¤ÆäËû¹ú¼ÒÑ¡¾ÙµÄÀúÊ·£¬²¢½«ÂÞÂíÄáÑÇÊÓΪµÐ¹ú£¬ÓÉÓÚÂÞÂíÄáÑÇÔÊÐí±±Ô¼ÔÚ±±Ô¼¶«²¿×¤¾ü¡£


https://www.bleepingcomputer.com/news/security/romanias-election-systems-targeted-in-over-85-000-cyberattacks/


5. ÀÕË÷Èí¼þ×éÖ¯Brain CipherÉù³ÆÈëÇÖµÂÇÚÓ¢¹ú


12ÔÂ4ÈÕ£¬ÎÛÃûÕÑÖøµÄÀÕË÷Èí¼þ×éÖ¯Brain CipherÉù³ÆÒÑÀÖ³ÉÈëÇÖµÂÇÚÓ¢¹ú¹«Ë¾£¬²¢ÇÔÈ¡ÁËÁè¼Ý1TBµÄÃô¸ÐÊý¾Ý¡£¸Ã×éÖ¯ÓÚ2024Äê6Ô·ºÆð£¬Ôø¶ÔÈ«Çò¶à¸ö×éÖ¯¾ÙÐÐÍøÂç¹¥»÷£¬°üÀ¨¶ÔÓ¡¶ÈÄáÎ÷Ñǹú¼ÒÊý¾ÝÖÐÐĵÄÖØ´ó¹¥»÷¡£¾ÝBrain CipherÐû²¼µÄÉùÃ÷£¬´Ë´Î¹¥»÷̻¶Á˵ÂÇÚÓ¢¹úÍøÂçÇå¾²»ù´¡ÉèÊ©µÄÎó²î¡£ËûÃÇÍýÏëÐû²¼´Ë´ÎÈëÇÖµÄÏêϸÐÅÏ¢£¬°üÀ¨ÉæÏÓÎ¥·´Ç徲ЭÒéµÄÖ¤¾Ý¡¢µÂÇÚÓë¿Í»§Ö®¼äµÄÌõԼЭÒéÆÊÎö¡¢¼à¿ØϵͳºÍÇå¾²¹¤¾ßµÄÏêϸÐÅÏ¢ÒÔ¼°ÊÜËðÊý¾ÝµÄʾÀý¡£±ðµÄ£¬¸Ã×éÖ¯ÒÑÔ¼ÇëµÂÇÚ´ú±í¾ÙÐÐ˽ÏÂÌÖÂÛ£¬Õâ¿ÉÄÜÅú×¢±£´æÊê½ð̸ÅеÄÍýÏë¡£´Ë´Îй¶ÊÂÎñ¿ÉÄÜÓ°ÏìµÂÇÚÓ¢¹úµÄÆóÒµ¿Í»§¡¢ÉñÃØÉÌÒµÐÅÏ¢¡¢¿Í»§Êý¾ÝºÍ²ÆÎñ¼Í¼ÒÔ¼°¸Ã¹«Ë¾µÄרҵÉùÓþ¡£È»¶ø£¬µÂÇÚÓ¢¹úÉÐδ¹ûÕæÈ·ÈÏ»ò·ñ¶¨´Ë´ÎÈëÇÖÊÂÎñ£¬ÍøÂçÇå¾²ÐÂÎÅÍŶÓÕýÔÚÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£


https://cybersecuritynews.com/deloitte-hacked/


6. ¶íÂÞ˹³ÌÐòÔ±ÊÖ»ú±»FSBËÍ»¹ºó·¢Ã÷ÔâÉñÃØ×°ÖÃÐÂÌع¤Èí¼þ


12ÔÂ5ÈÕ£¬Ò»Ãû¶íÂÞ˹³ÌÐòÔ±Kirill ParubetsÔÚ±»¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¾ÐÁô15Ì첢ûÊÕÊÖ»úºó£¬·¢Ã÷×°±¸ÔÚËÍ»¹ºó±»ÉñÃØ×°ÖÃÁËеÄÌع¤Èí¼þ¡£¸ÃÌع¤Èí¼þÄ£ÄâÁËÊ¢ÐеÄAndroidÓ¦ÓóÌÐò¡°Cube Call Recorder¡±£¬µ«ÓµÓÐÆÕ±éµÄȨÏÞ£¬¿ÉÒÔ²»ÊÜÏÞÖƵػá¼û×°±¸£¬²¢ÔÊÐí¹¥»÷Õß¼àÊÓÊÖ»úÉϵÄÔ˶¯¡£¾­Óɹ«ÃñʵÑéÊÒµÄÈ¡Ö¤ÆÊÎö£¬È·ÈϸöñÒâÈí¼þÊÇMonokleµÄа汾»òÓÉÏàͬ´úÂ뽨ÉèµÄÐÂÈí¼þ¡£¸ÃÌع¤Èí¼þʹÓüÓÃܵÄÁ½½×¶ÎÀú³Ì£¬¾ßÓиú×ÙλÖᢻá¼û¶ÌÐÅ¡¢ÁªÏµÈË¡¢ÈÕÀú¡¢¼Í¼µç»°ºÍÊÓƵ¡¢ÌáÈ¡ÐÂÎÅ¡¢ÎļþºÍÃÜÂëµÈ¶àÖÖ¹¦Ð§¡£±ðµÄ£¬´úÂëÖз¢Ã÷Á˶ÔiOSµÄÒýÓã¬Åú×¢¿ÉÄܱ£´æ¿ÉÔÚApple iPhone×°±¸ÉÏÔËÐеıäÌå¡£×°±¸±»Ö´·¨²¿·ÖûÊÕºóÓÖ±»ËÍ»¹µÄÈËӦ˼Á¿»»ÓÃÆäËû×°±¸»ò½»¸øר¼ÒÆÊÎö£¬ÉúÑÄÔÚեȡÐÔ¹ú¼ÒµÄÈËÓ¦½ÓÄɲ½·¥±£»¤×Ô¼ºµÄ×°±¸Çå¾²¡£


https://www.bleepingcomputer.com/news/security/new-android-spyware-found-on-phone-seized-by-russian-fsb/