npm¶ñÒâÈí¼þÃé×¼AtomicºÍExodusÇ®°ü

Ðû²¼Ê±¼ä 2025-04-11

1. npm¶ñÒâÈí¼þÃé×¼AtomicºÍExodusÇ®°ü


4ÔÂ10ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ ReversingLabs£¨RL£©½üÆÚ·¢Ã÷ÁËÒ»ÖÖÕë¶Ô¼ÓÃÜÇ®±ÒÓû§µÄÐÂÕ½ÂÔ£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓà npm£¨½Úµã°ü¹ÜÀíÆ÷£©ÍøÂ磬£¬£¬£¬ÏòÍâµØ×°ÖõļÓÃÜÇ®±ÒÇ®°üÈí¼þ£¨ÓÈÆäÊÇ Atomic Wallet ºÍ Exodus£©×¢Èë¶ñÒâ´úÂë ¡£¡£¡£´Ë´Î¹¥»÷ͨ¹ý¶ñÒâÐÞ²¹Õýµ±Èí¼þÎļþʵÏÖ£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÇÄÇĽ»Á÷ÊÕ¼þÈËÇ®°üµØµã£¬£¬£¬£¬´Ó¶ø×èµ²¼ÓÃÜÇ®±Ò×ªÒÆ ¡£¡£¡£RL ·¢Ã÷ÁËÒ»¸öÃûΪ¡°pdf-to-office¡±µÄ¶ñÒâ npm °ü£¬£¬£¬£¬¸Ã°üαװ³É½« PDF Îļþת»»Îª Microsoft Office ÎĵµµÄÊÊÓóÌÐò£¬£¬£¬£¬µ«Ö´ÐÐʱ»á°²ÅŶñÒâ¸ºÔØ£¬£¬£¬£¬ÐÞ¸Ä Atomic Wallet ºÍ Exodus ×°ÖÃĿ¼ÖеÄÒªº¦Îļþ ¡£¡£¡£¶ñÒâÈí¼þÓÃľÂí°æ±¾ÁýÕÖÕýµ±Îļþ£¬£¬£¬£¬ÉñÃØ¸ü¸Ä¼ÓÃÜÇ®±ÒÉúÒâµÄÄ¿µÄµØµã£¬£¬£¬£¬ÇÒÄÑÒÔ±»²ì¾õ£¬£¬£¬£¬ÓÉÓÚÇ®°ü½¹µã¹¦Ð§¿´ËÆÎ´±ä ¡£¡£¡£±ðµÄ£¬£¬£¬£¬Èí¼þ°üÖл¹·¢Ã÷ÁËÒ»¸ö¾­ÓÉ»ìÏýµÄ JavaScript Îļþ£¬£¬£¬£¬Ì»Â¶ÁËÆä¶ñÒâÒâͼ ¡£¡£¡£´Ë´Î¹¥»÷¾ßÓг¤ÆÚÐÔ£¬£¬£¬£¬×ÝÈ»¶ñÒâ¡°pdf-to-office¡±Èí¼þ°ü±»É¾³ý£¬£¬£¬£¬ÊÜѬȾµÄ¼ÓÃÜÇ®±ÒÇ®°üÈí¼þÈÔ»á¼á³ÖѬȾ״̬£¬£¬£¬£¬Ä¾ÂíÎļþÈÔÔÚÔËÐУ¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØ½«×ʽðÖØ¶¨Ïòµ½¹¥»÷ÕßµÄ Web3 Ç®°ü ¡£¡£¡£Ïû³ýÍþвµÄΨһÓÐÓÃÒªÁìÊdz¹µ×ɾ³ý²¢ÖØÐÂ×°ÖÃÊÜÓ°ÏìµÄÇ®°üÈí¼þ ¡£¡£¡£


https://hackread.com/npm-malware-atomic-exodus-wallets-hijack-crypto/


2. ¶íÀÕ¸ÔÖÝÇéÐλú¹¹ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±ÕÍøÂç


4ÔÂ11ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬¶íÀÕ¸ÔÖÝÇéÐÎÖÊÁ¿¾Ö£¨DEQ£©ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂÆäÍøÂç±»ÆÈ¹Ø±Õ ¡£¡£¡£¸Ã»ú¹¹ÈÏÕæî¿Ïµ¶íÀÕ¸ÔÖÝµÄ¿ÕÆø¡¢ÍÁµØºÍË®ÖÊÁ¿£¬£¬£¬£¬´Ë´Î¹¥»÷¶ÔÆäÔËÓªÔì³ÉÁËÑÏÖØÓ°Ïì ¡£¡£¡£DEQ¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬³µÁ¾¼ì²éÕ¾½«¹Ø±ÕÖÁÖÜÎ壬£¬£¬£¬ÒÔÓ¦¶Ô´Ë´ÎÍøÂç¹¥»÷ ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸Ã»ú¹¹ÕýÔÚÈ«Á¦¸ôÀëЧÀÍÆ÷ºÍÍøÂ磬£¬£¬£¬Ö±ÖÁ¹¥»÷±»ÍêÈ«¿ØÖƲ¢¿ÉÄܱ»¸ù³ý ¡£¡£¡£DEQµÄIT¡¢ÆóÒµÐÅϢϵͳºÍ΢ÈíÍøÂçÇå¾²ÍŶÓÕýÔÚϸÃÜÏàÖú£¬£¬£¬£¬ÅäºÏÓ¦¶Ô´Ë´ÎÍøÂçÇå¾²ÎÊÌâ ¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬ÆäËûÖÝÒ²Ðû²¼Á˽üÆÚÓ°ÏìÒªº¦Õþ¸®Ð§À͵ÄÍøÂçÊÂÎñ ¡£¡£¡£ÑÇÀûÉ£ÄÇÖÝÁª°î¹«¹²±ç»¤È˰칫ÊÒÒòÀÕË÷Èí¼þ¹¥»÷Òѹرգ¬£¬£¬£¬¶àÆð°¸¼þÉóÀíʱ¼äÒѸÄÖÁÎåÔ ¡£¡£¡£°®´ïºÉÖݹŶ¡ÏØÍøÂçÒ²ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÏØÏòµ¼ÒÑÁªÏµÁª°îÖ´·¨²¿·Ö£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾Ð­Öú¿ØÖÆÊÂÎñ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÄÚ²¼À­Ë¹¼ÓÖݱ±ÆÕÀ­ÌØ×ÔÈ»×ÊÔ´ÇøÒ²Ö¤ÊµÔâÓöÁËÍøÂç¹¥»÷ºÍÊý¾Ýй¶ ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ÉÐÎÞÈκÎÀÕË÷Èí¼þÍÅ»ï»òºÚ¿Í×éÖ¯Éù³Æ¶ÔÕâЩÊÂÎñÈÏÕæ ¡£¡£¡£


https://therecord.media/oregon-department-environmental-quality-cyberattack


3. Gamaredon×éÖ¯Éý¼¶¹¥»÷ÊֶΣ¬£¬£¬£¬Î÷·½ÍøÂçÃæÁÙÐÂÍþв


4ÔÂ10ÈÕ£¬£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯Gamaredon£¨ÓÖÃû¡°Shuckworm¡±£©×Ô2025Äê2ÔÂÖÁ3Ô£¬£¬£¬£¬Ò»Á¬Õë¶ÔÎ÷·½¹ú¼ÒÔÚÎÚ¿ËÀ¼µÄ¾üÊÂʹÃü·¢¶¯¹¥»÷£¬£¬£¬£¬¿ÉÄÜͨ¹ý¿ÉÒÆ¶¯Ó²Å̾ÙÐÐ ¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬ºÚ¿Í°²ÅÅÁ˸üа汾µÄGammaSteelÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý ¡£¡£¡£¹¥»÷ʼÓÚ°üÀ¨¶ñÒâ.LNKÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷£¬£¬£¬£¬ÕâÊÇGamaredonÒÑÍù³£ÓõĹ¥»÷ÊÖ¶Î ¡£¡£¡£´Ë´Î£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽ÍþвÐÐΪÕßµÄÕ½ÂÔÓÐËùת±ä£¬£¬£¬£¬°üÀ¨´ÓVBS¾ç±¾×ªÏò»ùÓÚPowerShellµÄ¹¤¾ß¡¢¶ÔÓÐÓÃÔØºÉ¾ÙÐиü¶à»ìÏýÒÔ¼°¸ü¶àµØÊ¹ÓÃÕýµ±Ð§À;ÙÐÐÌ ¡£¡£¡£ÔÚѬȾÀú³ÌÖУ¬£¬£¬£¬Ò»¸ö¸ß¶È»ìÏýµÄ¾ç±¾»á½¨Éè²¢ÔËÐÐÁ½¸öÎļþ£¬£¬£¬£¬»®·Ö´¦Öóͷ£ÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶¼°Èö²¥»úÖÆ£¬£¬£¬£¬Í¬Ê±Òþ²ØÄ³Ð©Îļþ¼ÐºÍϵͳÎļþ ¡£¡£¡£Gamaredon»¹Ê¹ÓÃÕì̽PowerShell¾ç±¾²¶»ñºÍй¶װ±¸ÐÅÏ¢£¬£¬£¬£¬²¢×îÖÕ°²ÅÅ»ùÓÚPowerShellµÄGammaSteel°æ±¾£¬£¬£¬£¬ÇÔÈ¡×ÀÃæ¡¢ÎĵµºÍÏÂÔØµÈλÖõÄÎĵµ ¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓá°certutil.exe¡±¶ÔÎļþ¾ÙÐйþÏ£´¦Öóͷ££¬£¬£¬£¬²¢Í¨¹ýPowerShell WebÇëÇó»òTorÉϵÄcURL´«Êä±»µÁÊý¾Ý£¬£¬£¬£¬Í¬Ê±ÔÚÄ¿µÄÅÌËã»úÉϽ¨É賤ÆÚÐÔ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-attack-western-military-mission-using-malicious-drive/


4. Medusa¹¥»÷Âö²«½ôÆÈÕչ˻¤Ê¿ÖÐÐÄ£¬£¬£¬£¬Ð¹Â¶Êý¾Ý²¢Ë÷ÒªÊê½ð


4ÔÂ9ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ºÚ¿Í×éÖ¯ÃÀ¶Åɯ£¨Medusa£©¶ÔÂö²«½ôÆÈÕչ˻¤Ê¿ÖÐÐÄ£¨Pulse Urgent Care Center£©·¢¶¯¹¥»÷£¬£¬£¬£¬¸ÃÖÐÐÄÌṩ½ôÆÈÕչ˻¤Ê¿¡¢ÁÙ´²Ò½Ñ§¡¢Å®ÐÔ¿µ½¡¡¢¹¤ÉËÅâ³¥ºÍ¹ÍÖ÷ЧÀ͵ÈһϵÁÐÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬×ܲ¿Î»ÓÚ¼ÓÖÝÀ×¶ ¡£¡£¡£¬£¬£¬£¬ÔÚÀ׵°ͷòÒ²ÉèÓзֲ¿ ¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬MedusaÐû²¼Á˲¿·ÖÖ¤¾Ý£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÎļþÊ÷£¬£¬£¬£¬ÄÚÓÐÁè¼Ý127,000ÐÐÎı¾ÃûÌõÄÊý¾Ý ¡£¡£¡£Ð¹Â¶µÄÊý¾Ýº­¸Ç»¼Õß²¡Àú£¨°üÀ¨Õï¶Ï¡¢ÖÎÁƺͼì²éЧ¹ûµÈ£©¡¢ÖÎÀíÊý¾Ý£¨ÓëÒ½ÁƱ£½¡ÌṩÕßÄÚ²¿ÖÎÀíÓйصÄÓªÒµÐÅÏ¢£©¡¢°ü¹ÜÊý¾Ý£¨Óйػ¼Õß¿µ½¡°ü¹ÜÕþ²ßµÄÐÅÏ¢£©¡¢ÌṩÕßÁÐ±í£¨ÓйØÒ½ÉúºÍÒ½ÁƱ£½¡×¨ÒµÖ°Ô±µÄÊý¾Ý£©¡¢ÌṩÕ߼ͼ¸üÐÂ±í¡¢¹ÍÖ÷ÁªÏµºÍÕ˵¥ÐÅÏ¢±í£¬£¬£¬£¬ÒÔ¼°Rapid Radiology, Inc.ÍøÕ¾µÄµÇ¼ƾ֤ ¡£¡£¡£MedusaÕë¶Ô´Ë´ÎÊÂÎñÁгöÁËÇåµ¥£¬£¬£¬£¬ÒªÇóÖ§¸¶120,000ÃÀÔªµÄBTCÒÔÏÂÔØ»òɾ³ýËùÓÐÊý¾Ý ¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬Pulse Urgent Care CenterµÄÍøÕ¾ÉÏδÏÔʾÈκÎÒì³£¼£Ï󣬣¬£¬£¬ÇÒ¸ÃÖÐÐÄÉÐδ¶Ô´Ë´Î¹¥»÷×ö³öÈ·ÈÏ»ò·ñ¶¨ ¡£¡£¡£


https://databreaches.net/2025/04/09/__trashed-15/


5. OttoKit WordPress²å¼þ¸ßΣÎó²îÔâºÚ¿ÍѸËÙʹÓÃ


4ÔÂ10ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬WordPressµÄOttoKit£¨Ç°³ÆSureTriggers£©²å¼þÆØ³ö¸ßÑÏÖØÐÔÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-3102£©£¬£¬£¬£¬¸ÃÎó²îÓ°Ïì1.0.78¼°ÒÔÉϰ汾 ¡£¡£¡£ÓÉÓÚauthenticating_user()º¯ÊýÖÐȱÉÙ¿ÕÖµ¼ì²é£¬£¬£¬£¬µ±²å¼þδÉèÖÃAPIÃÜԿʱ£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËͿյÄst_authorization±êÍ·ÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬£¬£¬Î´¾­ÊÚȨ»á¼ûÊܱ£»£»£»£»£»¤µÄAPI¶Ëµã£¬£¬£¬£¬½ø¶ø½¨ÉèеÄÖÎÀíÔ±ÕÊ»§£¬£¬£¬£¬±£´æÍêȫվµã½ÓÊܵĸßΣº¦ ¡£¡£¡£Çå¾²Ñо¿Ô±¡°mikemyers¡±ÓÚ3ÔÂÖÐÑ®·¢Ã÷´ËÎó²î²¢»ñµÃÉͽ𣬣¬£¬£¬4ÔÂ3ÈÕ£¬£¬£¬£¬²å¼þ¹©Ó¦ÉÌÐû²¼1.0.79°æÐÞ¸´³ÌÐò ¡£¡£¡£È»¶ø£¬£¬£¬£¬Îó²îÅû¶ºó½öÊýСʱ£¬£¬£¬£¬ºÚ¿Í±ã×îÏÈʹÓôËÎó²î£¬£¬£¬£¬ÊµÑ齨ÉèеÄÖÎÀíÔ±ÕÊ»§ ¡£¡£¡£PatchstackÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬ÕâÖÖѸËÙµÄʹÓÃ͹ÏÔÁËÁ¬Ã¦Ó¦Óò¹¶¡»ò»º½â²½·¥µÄÆÈÇÐÐèÒª ¡£¡£¡£¼øÓÚOttoKit²å¼þÒÑÔÚ10Íò¸öÍøÕ¾ÉÏ»îÔ¾£¬£¬£¬£¬ÇÒ¸ÃÎó²îÓ°ÏìÆÕ±é£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìÉý¼¶µ½1.0.79°æ±¾£¬£¬£¬£¬²¢¼ì²éÈÕÖ¾ÖÐÊÇ·ñ±£´æÒâÍâµÄÖÎÀíÔ±ÕÊ»§»òÆäËûÓû§½ÇÉ«¡¢²å¼þ/Ö÷ÌâµÄ×°Öá¢Êý¾Ý¿â»á¼ûÊÂÎñÒÔ¼°Çå¾²ÉèÖõÄÐ޸쬣¬£¬£¬ÒÔÈ·±£ÍøÕ¾Çå¾² ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-auth-bypass-hours-after-disclosure/


6. Gladinet CentreStackÁãÈÕÎó²îCVE-2025-30406ÔâÔÚҰʹÓÃ


4ÔÂ9ÈÕ£¬£¬£¬£¬×Ô3ÔÂ·ÝÆð£¬£¬£¬£¬ºÚ¿ÍʹÓÃGladinet CentreStackÇå¾²Îļþ¹²ÏíÈí¼þÖеÄÁãÈÕÎó²î£¨CVE-2025-30406£©ÈëÇִ洢ЧÀÍÆ÷ ¡£¡£¡£¸ÃÎó²îÊÇÒ»¸ö·´ÐòÁл¯Îó²î£¬£¬£¬£¬Ó°Ïì16.1.10296.56315¼°ÒÔÉϰ汾 ¡£¡£¡£ÎÊÌâÔ´ÓÚCentreStackÃÅ»§ÉèÖÃÖÐʹÓÃÁËÓ²±àÂëµÄmachineKey£¬£¬£¬£¬¹¥»÷ÕßÈôÖªÏþ´ËÃÜÔ¿£¬£¬£¬£¬¿É±àд²¢Ö´ÐжñÒâÐòÁл¯¸ºÔØ£¬£¬£¬£¬ÈƹýÍêÕûÐÔ¼ì²é£¬£¬£¬£¬×¢Èëí§ÒâÐòÁл¯¹¤¾ß£¬£¬£¬£¬×îÖÕÔÚЧÀÍÆ÷ÉÏÖ´ÐдúÂë ¡£¡£¡£GladinetÒÑÓÚ2025Äê4ÔÂ3ÈÕÐû²¼Çå¾²ÐÞ¸´³ÌÐò£¬£¬£¬£¬°æ±¾Îª16.4.10315.56368¡¢16.3.4763.56357£¨Windows£©ºÍ15.12.434£¨macOS£© ¡£¡£¡£¹©Ó¦É̽¨ÒéÓû§¾¡¿ìÉý¼¶µ½×îа汾£¬£¬£¬£¬¹ØÓÚÎÞ·¨Á¬Ã¦¸üеĿͻ§£¬£¬£¬£¬½¨ÒéÂÖ»»machineKeyÖµ×÷ΪÔÝʱ»º½â²½·¥£¬£¬£¬£¬²¢È·±£¶àЧÀÍÆ÷°²ÅÅÖпç½ÚµãµÄÒ»ÖÂÐÔ£¬£¬£¬£¬ÔÚ¸ü¸ÄºóÖØÐÂÆô¶¯IISÒÔÓ¦Óûº½â²½·¥ ¡£¡£¡£CISAÒѽ«¸ÃÎó²îÌí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬²¢ÒªÇóÊÜÓ°ÏìµÄÖݺÍÁª°î×éÖ¯ÔÚ2025Äê4ÔÂ29ÈÕ֮ǰӦÓÃÇå¾²¸üлººÍ½â²½·¥£¬£¬£¬£¬²»È»×èֹʹÓøòúÆ· ¡£¡£¡£¼øÓڸòúÆ·µÄÐÔ×Ó£¬£¬£¬£¬ËüºÜ¿ÉÄܱ»Ê¹ÓÃÀ´¾ÙÐÐÊý¾Ý͵ÇÔ¹¥»÷ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/