npm¶ñÒâÈí¼þÃé×¼AtomicºÍExodusÇ®°ü
Ðû²¼Ê±¼ä 2025-04-111. npm¶ñÒâÈí¼þÃé×¼AtomicºÍExodusÇ®°ü
4ÔÂ10ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ ReversingLabs£¨RL£©½üÆÚ·¢Ã÷ÁËÒ»ÖÖÕë¶Ô¼ÓÃÜÇ®±ÒÓû§µÄÐÂÕ½ÂÔ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓà npm£¨½Úµã°ü¹ÜÀíÆ÷£©ÍøÂ磬£¬£¬£¬£¬ÏòÍâµØ×°ÖõļÓÃÜÇ®±ÒÇ®°üÈí¼þ£¨ÓÈÆäÊÇ Atomic Wallet ºÍ Exodus£©×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ͨ¹ý¶ñÒâÐÞ²¹Õýµ±Èí¼þÎļþʵÏÖ£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÇÄÇĽ»Á÷ÊÕ¼þÈËÇ®°üµØµã£¬£¬£¬£¬£¬´Ó¶ø×èµ²¼ÓÃÜÇ®±Ò×ªÒÆ¡£¡£¡£¡£¡£¡£¡£RL ·¢Ã÷ÁËÒ»¸öÃûΪ¡°pdf-to-office¡±µÄ¶ñÒâ npm °ü£¬£¬£¬£¬£¬¸Ã°üαװ³É½« PDF Îļþת»»Îª Microsoft Office ÎĵµµÄÊÊÓóÌÐò£¬£¬£¬£¬£¬µ«Ö´ÐÐʱ»á°²ÅŶñÒâ¸ºÔØ£¬£¬£¬£¬£¬ÐÞ¸Ä Atomic Wallet ºÍ Exodus ×°ÖÃĿ¼ÖеÄÒªº¦Îļþ¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÓÃľÂí°æ±¾ÁýÕÖÕýµ±Îļþ£¬£¬£¬£¬£¬ÉñÃØ¸ü¸Ä¼ÓÃÜÇ®±ÒÉúÒâµÄÄ¿µÄµØµã£¬£¬£¬£¬£¬ÇÒÄÑÒÔ±»²ì¾õ£¬£¬£¬£¬£¬ÓÉÓÚÇ®°ü½¹µã¹¦Ð§¿´ËÆÎ´±ä¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Èí¼þ°üÖл¹·¢Ã÷ÁËÒ»¸ö¾ÓÉ»ìÏýµÄ JavaScript Îļþ£¬£¬£¬£¬£¬Ì»Â¶ÁËÆä¶ñÒâÒâͼ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¾ßÓг¤ÆÚÐÔ£¬£¬£¬£¬£¬×ÝÈ»¶ñÒâ¡°pdf-to-office¡±Èí¼þ°ü±»É¾³ý£¬£¬£¬£¬£¬ÊÜѬȾµÄ¼ÓÃÜÇ®±ÒÇ®°üÈí¼þÈÔ»á¼á³ÖѬȾ״̬£¬£¬£¬£¬£¬Ä¾ÂíÎļþÈÔÔÚÔËÐУ¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØ½«×ʽðÖØ¶¨Ïòµ½¹¥»÷ÕßµÄ Web3 Ç®°ü¡£¡£¡£¡£¡£¡£¡£Ïû³ýÍþвµÄΨһÓÐÓÃÒªÁìÊdz¹µ×ɾ³ý²¢ÖØÐÂ×°ÖÃÊÜÓ°ÏìµÄÇ®°üÈí¼þ¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/npm-malware-atomic-exodus-wallets-hijack-crypto/
2. ¶íÀÕ¸ÔÖÝÇéÐλú¹¹ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±ÕÍøÂç
4ÔÂ11ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬¶íÀÕ¸ÔÖÝÇéÐÎÖÊÁ¿¾Ö£¨DEQ£©ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆäÍøÂç±»ÆÈ¹Ø±Õ¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÈÏÕæî¿Ïµ¶íÀÕ¸ÔÖÝµÄ¿ÕÆø¡¢ÍÁµØºÍË®ÖÊÁ¿£¬£¬£¬£¬£¬´Ë´Î¹¥»÷¶ÔÆäÔËÓªÔì³ÉÁËÑÏÖØÓ°Ïì¡£¡£¡£¡£¡£¡£¡£DEQ¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬£¬³µÁ¾¼ì²éÕ¾½«¹Ø±ÕÖÁÖÜÎ壬£¬£¬£¬£¬ÒÔÓ¦¶Ô´Ë´ÎÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã»ú¹¹ÕýÔÚÈ«Á¦¸ôÀëЧÀÍÆ÷ºÍÍøÂ磬£¬£¬£¬£¬Ö±ÖÁ¹¥»÷±»ÍêÈ«¿ØÖƲ¢¿ÉÄܱ»¸ù³ý¡£¡£¡£¡£¡£¡£¡£DEQµÄIT¡¢ÆóÒµÐÅϢϵͳºÍ΢ÈíÍøÂçÇå¾²ÍŶÓÕýÔÚϸÃÜÏàÖú£¬£¬£¬£¬£¬ÅäºÏÓ¦¶Ô´Ë´ÎÍøÂçÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬ÆäËûÖÝÒ²Ðû²¼Á˽üÆÚÓ°ÏìÒªº¦Õþ¸®Ð§À͵ÄÍøÂçÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ÑÇÀûÉ£ÄÇÖÝÁª°î¹«¹²±ç»¤È˰칫ÊÒÒòÀÕË÷Èí¼þ¹¥»÷Òѹرգ¬£¬£¬£¬£¬¶àÆð°¸¼þÉóÀíʱ¼äÒѸÄÖÁÎåÔ¡£¡£¡£¡£¡£¡£¡£°®´ïºÉÖݹŶ¡ÏØÍøÂçÒ²ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ÏØÏòµ¼ÒÑÁªÏµÁª°îÖ´·¨²¿·Ö£¬£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾ÐÖú¿ØÖÆÊÂÎñ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÄÚ²¼À˹¼ÓÖݱ±ÆÕÀÌØ×ÔÈ»×ÊÔ´ÇøÒ²Ö¤ÊµÔâÓöÁËÍøÂç¹¥»÷ºÍÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐÎÞÈκÎÀÕË÷Èí¼þÍÅ»ï»òºÚ¿Í×éÖ¯Éù³Æ¶ÔÕâЩÊÂÎñÈÏÕæ¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/oregon-department-environmental-quality-cyberattack
3. Gamaredon×éÖ¯Éý¼¶¹¥»÷ÊֶΣ¬£¬£¬£¬£¬Î÷·½ÍøÂçÃæÁÙÐÂÍþв
4ÔÂ10ÈÕ£¬£¬£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯Gamaredon£¨ÓÖÃû¡°Shuckworm¡±£©×Ô2025Äê2ÔÂÖÁ3Ô£¬£¬£¬£¬£¬Ò»Á¬Õë¶ÔÎ÷·½¹ú¼ÒÔÚÎÚ¿ËÀ¼µÄ¾üÊÂʹÃü·¢¶¯¹¥»÷£¬£¬£¬£¬£¬¿ÉÄÜͨ¹ý¿ÉÒÆ¶¯Ó²Å̾ÙÐС£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬ºÚ¿Í°²ÅÅÁ˸üа汾µÄGammaSteelÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ°üÀ¨¶ñÒâ.LNKÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷£¬£¬£¬£¬£¬ÕâÊÇGamaredonÒÑÍù³£ÓõĹ¥»÷ÊֶΡ£¡£¡£¡£¡£¡£¡£´Ë´Î£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽ÍþвÐÐΪÕßµÄÕ½ÂÔÓÐËùת±ä£¬£¬£¬£¬£¬°üÀ¨´ÓVBS¾ç±¾×ªÏò»ùÓÚPowerShellµÄ¹¤¾ß¡¢¶ÔÓÐÓÃÔØºÉ¾ÙÐиü¶à»ìÏýÒÔ¼°¸ü¶àµØÊ¹ÓÃÕýµ±Ð§À;ÙÐÐÌӱܡ£¡£¡£¡£¡£¡£¡£ÔÚѬȾÀú³ÌÖУ¬£¬£¬£¬£¬Ò»¸ö¸ß¶È»ìÏýµÄ¾ç±¾»á½¨Éè²¢ÔËÐÐÁ½¸öÎļþ£¬£¬£¬£¬£¬»®·Ö´¦Öóͷ£ÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶¼°Èö²¥»úÖÆ£¬£¬£¬£¬£¬Í¬Ê±Òþ²ØÄ³Ð©Îļþ¼ÐºÍϵͳÎļþ¡£¡£¡£¡£¡£¡£¡£Gamaredon»¹Ê¹ÓÃÕì̽PowerShell¾ç±¾²¶»ñºÍй¶װ±¸ÐÅÏ¢£¬£¬£¬£¬£¬²¢×îÖÕ°²ÅÅ»ùÓÚPowerShellµÄGammaSteel°æ±¾£¬£¬£¬£¬£¬ÇÔÈ¡×ÀÃæ¡¢ÎĵµºÍÏÂÔØµÈλÖõÄÎĵµ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓá°certutil.exe¡±¶ÔÎļþ¾ÙÐйþÏ£´¦Öóͷ££¬£¬£¬£¬£¬²¢Í¨¹ýPowerShell WebÇëÇó»òTorÉϵÄcURL´«Êä±»µÁÊý¾Ý£¬£¬£¬£¬£¬Í¬Ê±ÔÚÄ¿µÄÅÌËã»úÉϽ¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-hackers-attack-western-military-mission-using-malicious-drive/
4. Medusa¹¥»÷Âö²«½ôÆÈÕչ˻¤Ê¿ÖÐÐÄ£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý²¢Ë÷ÒªÊê½ð
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯ÃÀ¶Åɯ£¨Medusa£©¶ÔÂö²«½ôÆÈÕչ˻¤Ê¿ÖÐÐÄ£¨Pulse Urgent Care Center£©·¢¶¯¹¥»÷£¬£¬£¬£¬£¬¸ÃÖÐÐÄÌṩ½ôÆÈÕչ˻¤Ê¿¡¢ÁÙ´²Ò½Ñ§¡¢Å®ÐÔ¿µ½¡¡¢¹¤ÉËÅâ³¥ºÍ¹ÍÖ÷ЧÀ͵ÈһϵÁÐÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ¼ÓÖÝÀ×¶¡£¬£¬£¬£¬£¬ÔÚÀ׵°ͷòÒ²ÉèÓзֲ¿¡£¡£¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬MedusaÐû²¼Á˲¿·ÖÖ¤¾Ý£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÎļþÊ÷£¬£¬£¬£¬£¬ÄÚÓÐÁè¼Ý127,000ÐÐÎı¾ÃûÌõÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ýº¸Ç»¼Õß²¡Àú£¨°üÀ¨Õï¶Ï¡¢ÖÎÁƺͼì²éЧ¹ûµÈ£©¡¢ÖÎÀíÊý¾Ý£¨ÓëÒ½ÁƱ£½¡ÌṩÕßÄÚ²¿ÖÎÀíÓйصÄÓªÒµÐÅÏ¢£©¡¢°ü¹ÜÊý¾Ý£¨Óйػ¼Õß¿µ½¡°ü¹ÜÕþ²ßµÄÐÅÏ¢£©¡¢ÌṩÕßÁÐ±í£¨ÓйØÒ½ÉúºÍÒ½ÁƱ£½¡×¨ÒµÖ°Ô±µÄÊý¾Ý£©¡¢ÌṩÕ߼ͼ¸üÐÂ±í¡¢¹ÍÖ÷ÁªÏµºÍÕ˵¥ÐÅÏ¢±í£¬£¬£¬£¬£¬ÒÔ¼°Rapid Radiology, Inc.ÍøÕ¾µÄµÇ¼ƾ֤¡£¡£¡£¡£¡£¡£¡£MedusaÕë¶Ô´Ë´ÎÊÂÎñÁгöÁËÇåµ¥£¬£¬£¬£¬£¬ÒªÇóÖ§¸¶120,000ÃÀÔªµÄBTCÒÔÏÂÔØ»òɾ³ýËùÓÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬Pulse Urgent Care CenterµÄÍøÕ¾ÉÏδÏÔʾÈκÎÒì³£¼£Ï󣬣¬£¬£¬£¬ÇÒ¸ÃÖÐÐÄÉÐδ¶Ô´Ë´Î¹¥»÷×ö³öÈ·ÈÏ»ò·ñ¶¨¡£¡£¡£¡£¡£¡£¡£
https://databreaches.net/2025/04/09/__trashed-15/
5. OttoKit WordPress²å¼þ¸ßΣÎó²îÔâºÚ¿ÍѸËÙʹÓÃ
4ÔÂ10ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬WordPressµÄOttoKit£¨Ç°³ÆSureTriggers£©²å¼þÆØ³ö¸ßÑÏÖØÐÔÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-3102£©£¬£¬£¬£¬£¬¸ÃÎó²îÓ°Ïì1.0.78¼°ÒÔÉϰ汾¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚauthenticating_user()º¯ÊýÖÐȱÉÙ¿ÕÖµ¼ì²é£¬£¬£¬£¬£¬µ±²å¼þδÉèÖÃAPIÃÜԿʱ£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËͿյÄst_authorization±êÍ·ÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬Î´¾ÊÚȨ»á¼ûÊܱ£»£»£»£»¤µÄAPI¶Ëµã£¬£¬£¬£¬£¬½ø¶ø½¨ÉèеÄÖÎÀíÔ±ÕÊ»§£¬£¬£¬£¬£¬±£´æÍêȫվµã½ÓÊܵĸßΣº¦¡£¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±¡°mikemyers¡±ÓÚ3ÔÂÖÐÑ®·¢Ã÷´ËÎó²î²¢»ñµÃÉͽ𣬣¬£¬£¬£¬4ÔÂ3ÈÕ£¬£¬£¬£¬£¬²å¼þ¹©Ó¦ÉÌÐû²¼1.0.79°æÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Îó²îÅû¶ºó½öÊýСʱ£¬£¬£¬£¬£¬ºÚ¿Í±ã×îÏÈʹÓôËÎó²î£¬£¬£¬£¬£¬ÊµÑ齨ÉèеÄÖÎÀíÔ±ÕÊ»§¡£¡£¡£¡£¡£¡£¡£PatchstackÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬£¬ÕâÖÖѸËÙµÄʹÓÃ͹ÏÔÁËÁ¬Ã¦Ó¦Óò¹¶¡»ò»º½â²½·¥µÄÆÈÇÐÐèÒª¡£¡£¡£¡£¡£¡£¡£¼øÓÚOttoKit²å¼þÒÑÔÚ10Íò¸öÍøÕ¾ÉÏ»îÔ¾£¬£¬£¬£¬£¬ÇÒ¸ÃÎó²îÓ°ÏìÆÕ±é£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìÉý¼¶µ½1.0.79°æ±¾£¬£¬£¬£¬£¬²¢¼ì²éÈÕÖ¾ÖÐÊÇ·ñ±£´æÒâÍâµÄÖÎÀíÔ±ÕÊ»§»òÆäËûÓû§½ÇÉ«¡¢²å¼þ/Ö÷ÌâµÄ×°Öá¢Êý¾Ý¿â»á¼ûÊÂÎñÒÔ¼°Çå¾²ÉèÖõÄÐ޸쬣¬£¬£¬£¬ÒÔÈ·±£ÍøÕ¾Çå¾²¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-auth-bypass-hours-after-disclosure/
6. Gladinet CentreStackÁãÈÕÎó²îCVE-2025-30406ÔâÔÚҰʹÓÃ
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬×Ô3ÔÂ·ÝÆð£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃGladinet CentreStackÇå¾²Îļþ¹²ÏíÈí¼þÖеÄÁãÈÕÎó²î£¨CVE-2025-30406£©ÈëÇִ洢ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÒ»¸ö·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬Ó°Ïì16.1.10296.56315¼°ÒÔÉϰ汾¡£¡£¡£¡£¡£¡£¡£ÎÊÌâÔ´ÓÚCentreStackÃÅ»§ÉèÖÃÖÐʹÓÃÁËÓ²±àÂëµÄmachineKey£¬£¬£¬£¬£¬¹¥»÷ÕßÈôÖªÏþ´ËÃÜÔ¿£¬£¬£¬£¬£¬¿É±àд²¢Ö´ÐжñÒâÐòÁл¯¸ºÔØ£¬£¬£¬£¬£¬ÈƹýÍêÕûÐÔ¼ì²é£¬£¬£¬£¬£¬×¢Èëí§ÒâÐòÁл¯¹¤¾ß£¬£¬£¬£¬£¬×îÖÕÔÚЧÀÍÆ÷ÉÏÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£GladinetÒÑÓÚ2025Äê4ÔÂ3ÈÕÐû²¼Çå¾²ÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬°æ±¾Îª16.4.10315.56368¡¢16.3.4763.56357£¨Windows£©ºÍ15.12.434£¨macOS£©¡£¡£¡£¡£¡£¡£¡£¹©Ó¦É̽¨ÒéÓû§¾¡¿ìÉý¼¶µ½×îа汾£¬£¬£¬£¬£¬¹ØÓÚÎÞ·¨Á¬Ã¦¸üеĿͻ§£¬£¬£¬£¬£¬½¨ÒéÂÖ»»machineKeyÖµ×÷ΪÔÝʱ»º½â²½·¥£¬£¬£¬£¬£¬²¢È·±£¶àЧÀÍÆ÷°²ÅÅÖпç½ÚµãµÄÒ»ÖÂÐÔ£¬£¬£¬£¬£¬ÔÚ¸ü¸ÄºóÖØÐÂÆô¶¯IISÒÔÓ¦Óûº½â²½·¥¡£¡£¡£¡£¡£¡£¡£CISAÒѽ«¸ÃÎó²îÌí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬£¬²¢ÒªÇóÊÜÓ°ÏìµÄÖݺÍÁª°î×éÖ¯ÔÚ2025Äê4ÔÂ29ÈÕ֮ǰӦÓÃÇå¾²¸üлººÍ½â²½·¥£¬£¬£¬£¬£¬²»È»×èֹʹÓøòúÆ·¡£¡£¡£¡£¡£¡£¡£¼øÓڸòúÆ·µÄÐÔ×Ó£¬£¬£¬£¬£¬ËüºÜ¿ÉÄܱ»Ê¹ÓÃÀ´¾ÙÐÐÊý¾Ý͵ÇÔ¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/