Brave¿ªÔ´CookiecrumblerÖÇÄܹýÂËCookie֪ͨ
Ðû²¼Ê±¼ä 2025-04-281. Brave¿ªÔ´CookiecrumblerÖÇÄܹýÂËCookie֪ͨ
4ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Brave¿ªÔ´ÁËÒ»¿îÃûΪ¡°Cookiecrumbler¡±µÄй¤¾ß£¬£¬£¬£¬£¬£¬ÓÃÓÚ¼ì²â²¢ÓÅ»¯´¦Öóͷ£cookieÔÞ³É֪ͨ¡£¡£¡£×Ô2022ÄêÆð£¬£¬£¬£¬£¬£¬Braveä¯ÀÀÆ÷±ãĬÈÏÔÚËùÓÐÍøÕ¾ÉÏ×èÖ¹cookieÔ޳ɺá·ù£¬£¬£¬£¬£¬£¬µ«·¢Ã÷´Ë¾Ù¿ÉÄܵ¼ÖÂÍøÕ¾·ºÆð¹¦Ð§ÎÊÌ⣬£¬£¬£¬£¬£¬Ó°Ïì¿ÉÓÃÐÔ¡£¡£¡£BraveÚ¹Êͳƣ¬£¬£¬£¬£¬£¬¹ýÓÚ¿í·º»ò²»×¼È·µÄ×èÖ¹Õ½ÂÔ¿ÉÄÜÆÆËðÍøÕ¾»ù±¾¹¦Ð§£¬£¬£¬£¬£¬£¬Èç½áÕËÁ÷³ÌºÍÒ³Ãæ½á¹¹¡£¡£¡£ÔÚÏÖʵӦÓÃÖУ¬£¬£¬£¬£¬£¬²»¼ÓÇø·ÖµØ×èÖ¹CookieÔÞ³É֪ͨÒÑÒý·¢×ª¶¯ÖÐÖ¹¡¢Ò³Ãæ¿ÕȱµÈÎÊÌâ¡£¡£¡£CookiecrumblerʹÓôóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÊÖÒÕ£¬£¬£¬£¬£¬£¬²éÕÒʹÓÃÔÞ³ÉÖÎÀíÆ½Ì¨£¨CMP£©µÄÍøÕ¾£¬£¬£¬£¬£¬£¬²¢ÆÊÎöÆäcookieÔÞ³É֪ͨ¡£¡£¡£¸Ã¹¤¾ßͨ¹ýÉçÇøÇý¶¯µÄ̸ÂÛ»úÖÆ£¬£¬£¬£¬£¬£¬×èÖ¹ÄÇЩ²»»áÆÆËðÍøÕ¾¹¦Ð§µÄ֪ͨ£¬£¬£¬£¬£¬£¬´Ó¶øÔÚ±£»£»£»£»£»£»£»¤Óû§Òþ˽µÄͬʱ£¬£¬£¬£¬£¬£¬ïÔ̶ÔÍøÕ¾Õý³£ÔËÐеÄ×ÌÈÅ¡£¡£¡£ÆäÊÂÇéÁ÷³Ì°üÀ¨£ºÊ¹ÓÃÇøÓòÊðÀíץȡ¶¥¼¶ÍøÕ¾£¬£¬£¬£¬£¬£¬Í¨¹ýPuppeteer¼ÓÔØÒ³ÃæÒÔʶ±ðDZÔÚcookie֪ͨ£¬£¬£¬£¬£¬£¬½«ÕâЩ֪ͨת´ï¸øLLM¾ÙÐзÖÀಢÌṩÐÞ¸´½¨Ò飬£¬£¬£¬£¬£¬×îºó½«¼ì²âЧ¹ûÐû²¼ÖÁGitHubÏîÄ¿£¬£¬£¬£¬£¬£¬¹©ÉçÇø·ÖÀàºÍˢС£¡£¡£ÕâÒ»Á÷³ÌÈ·±£ÁË´ó¹æÄ£¡¢ÇøÓò¸ÐÖªµÄcookieºá·ù¼ì²âºÍ×èÖ¹£¬£¬£¬£¬£¬£¬Í¬Ê±½µµÍÁËÎó±¨ÂʺÍÕ¾µãÎÊÌâ¡£¡£¡£ÔÚÒþ˽±£»£»£»£»£»£»£»¤·½Ã棬£¬£¬£¬£¬£¬CookiecrumblerÍêÈ«ÔÚBraveºó¶ËÔËÐУ¬£¬£¬£¬£¬£¬²»Éæ¼°ÈκÎÓû§Êý¾Ý¡£¡£¡£
https://www.bleepingcomputer.com/news/security/braves-cookiecrumbler-tool-taps-community-to-help-block-cookie-notices/
2. WooCommerceÓû§Ôâ·ÂðÇå¾²¾¯±¨´¹ÂÚ¹¥»÷
4ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬Ò»³¡´ó¹æÄ£ÍøÂç´¹ÂڻÕë¶ÔWooCommerceÓû§Õö¿ª£¬£¬£¬£¬£¬£¬Í¨¹ý·¢ËÍÐéαÇå¾²¾¯±¨Óʼþ£¬£¬£¬£¬£¬£¬ÓÕµ¼ÆäÏÂÔØËùν¡°Òªº¦²¹¶¡¡±ÒÔÐÞ¸´¡°Î´¾Éí·ÝÑéÖ¤µÄÖÎÆÊÎö¼û¡±Îó²î¡£¡£¡£Óʼþð³äWooCommerce¹Ù·½£¬£¬£¬£¬£¬£¬Ê¹Óá°help@security-woocommerce[.]com¡±µØµã£¬£¬£¬£¬£¬£¬Éù³ÆÍøÕ¾ÃæÁٺڿ͹¥»÷Σº¦£¬£¬£¬£¬£¬£¬²¢¸½ÓнôÆÈÏÂÔØ²¹¶¡µÄ°´Å¥¼°×°ÖÃ˵Ã÷£¬£¬£¬£¬£¬£¬ÒÔÖÆÔì½ôÆÈ¸Ð¡£¡£¡£Óû§µã»÷°´Å¥ºó£¬£¬£¬£¬£¬£¬½«±»Ö¸µ¼ÖÁÒ»¸ö·ÂðµÄ¡°woocomm?rce[.]com¡±ÍøÕ¾£¨¸ÃÓòÃûʹÓÃͬÐÎÒìÒå´Ê¹¥»÷ÊÖÒÕ£¬£¬£¬£¬£¬£¬½«×Öĸ¡°e¡±Ì滻ΪÁ¢ÌÕÍð×Ö·û¡°?¡±£©£¬£¬£¬£¬£¬£¬ÏÂÔØ²¢×°ÖÃÃûΪ¡°authbypass-update-31297-id.zip¡±µÄ¶ñÒâ²å¼þ¡£¡£¡£¸Ã²å¼þ×°Öú󣬣¬£¬£¬£¬£¬»á½¨ÉèÒ»¸öÿ·ÖÖÓÔËÐÐÒ»´ÎµÄËæ»úcronjob£¬£¬£¬£¬£¬£¬ÊÔͼÌí¼ÓÒþ²ØÖÎÀíÔ±ÕË»§£¬£¬£¬£¬£¬£¬²¢ÏòÌØ¶¨URL×¢²áÊÜѬȾվµã£¬£¬£¬£¬£¬£¬»ñÈ¡µÚ¶þ½×¶Î»ìÏýÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬½ø¶øÔÚÍøÕ¾Ä¿Â¼ÏÂ×°Ööà¸öPHP Web Shell£¨ÈçPAS-Form¡¢p0wnyºÍWSO£©£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»ÍêÈ«¿ØÖÆÍøÕ¾£¬£¬£¬£¬£¬£¬¾ÙÐÐ¹ã¸æ×¢Èë¡¢Óû§Öض¨Ïò¡¢DDoS¹¥»÷¡¢Ö§¸¶¿¨ÐÅÏ¢ÇÔÈ¡»òÀÕË÷Èí¼þ¼ÓÃܵȶñÒâ»î¶¯¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬£¬¸Ã²å¼þ»¹»á´Ó¿É¼û²å¼þÁбíÖÐɾ³ý×ÔÉí£¬£¬£¬£¬£¬£¬²¢Òþ²Ø¶ñÒâÕË»§¡£¡£¡£PatchstackÑо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯Óë2023ÄêβÕë¶ÔWordPressÓû§µÄÀàËÆ¹¥»÷±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬¾ùʹÓÃÁËÒ»×鲻Ѱ³£µÄWeb Shell¡¢ÏàͬµÄÓÐÓÃÔØºÉÒþ²ØÒªÁì¼°ÏàËÆµÄÓʼþÄÚÈÝ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/woocommerce-admins-targeted-by-fake-security-patches-that-hijack-sites/
3. Î÷ÐÂÄ«Î÷¸ç´óѧÔâ÷è÷ëºÚ¿Í×éÖ¯ÀÕË÷¹¥»÷
4ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬½üÁ½ÖÜÀ´£¬£¬£¬£¬£¬£¬Î÷ÐÂÄ«Î÷¸ç´óѧ£¨WNMU£©ÍøÕ¾¼°Êý×ÖϽµµÍ¬ÐøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¾ÝÐÂÄ«Î÷¸çÖÝ̽Õյƹ«Ë¾»ñÈ¡µÄÎļþÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒÉΪÎÛÃûÕÑÖøµÄ¶íÓïºÚ¿Í×éÖ¯¡°÷è÷롱£¨Qilin£©£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒòÔËÓª¡°ÀÕË÷Èí¼þ¼´Ð§ÀÍ¡±¶øÖøÃû£¬£¬£¬£¬£¬£¬Êֶα°ÁÓÇÒ²»ÔñÊֶΡ£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÑ§Ð£ÍøÕ¾ÎÞ·¨Ïò¹«ÖÚ¿ª·Å£¬£¬£¬£¬£¬£¬½ÌÖ°Ô±¹¤ºÍѧÉúËäÄÜͨ¹ýµÚÈý·½Æ½Ì¨ÈçCanvas¾ÙÐв¿·Ö½Ìѧ»î¶¯£¬£¬£¬£¬£¬£¬µ«ÅþÁ¬»¥ÁªÍøµÄ¿ÎÌù¤¾ßÈç´òÓ¡»ú¡¢Í¶Ó°ÒǵÈÎÞ·¨Ê¹Óᣡ£¡£Ò»ÃûÔ±¹¤µçÄÔÆÁÄ»ÏÔʾÀ´×Ô¡°÷è÷롱µÄÀÕË÷ÐÅÏ¢£¬£¬£¬£¬£¬£¬Éù³ÆÒÑ»ñÈ¡°üÀ¨Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý¡¢¼òÀú¡¢¼ÝÕÕ¡¢Éç±£ºÅÂë¼°ÍøÂçµØÍ¼µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢ÒªÇóÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬²»È»½«Ð¹Â¶Êý¾Ý¡£¡£¡£4ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬WNMU·¢Ð½ÈÕµ±Ì죬£¬£¬£¬£¬£¬¼ÆÊ±Ô±¹¤ºÍѧÉúÔ±¹¤ÌåÏÖδÊÕµ½Ö±½Ó´æ¿î£¬£¬£¬£¬£¬£¬Ð£·½³ÆÎÊÌâÔ´ÓÚÎļþÉÏ´«ÒøÐеÄÒâÍâÖØ´óÇéÐΣ¬£¬£¬£¬£¬£¬²¿·ÖÔ±¹¤¿ÉÄÜÃæÁÙ½øÒ»²½ÑÓ³Ù£¬£¬£¬£¬£¬£¬²¢ÔÊÐíÍË»¹ÒòÑÓ³Ù±¬·¢µÄ͸֧Óöȡ£¡£¡£¸ßµÈ½ÌÓý²¿·Ö½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬»ú¹¹ÕýÓëÖÝÐÅÏ¢ÊÖÒÕ²¿ÏàÖúÆÀ¹ÀÎÊÌ⣬£¬£¬£¬£¬£¬WNMUÒÑ¿ªÕ¹ÕýʽÊÓ²ìÒÔÈ·¶¨ÊÂÎñ¹æÄ£²¢½ÓÄɵ÷½â²½·¥¡£¡£¡£Ñ§Ð£ÒÑ×·Çó˽ÈËÍøÂçÇå¾²¹«Ë¾×ÊÖú£¬£¬£¬£¬£¬£¬²¢ÎªÑ§ÉúÌṩCanvas»á¼ûÖ¸µ¼£¬£¬£¬£¬£¬£¬Í¬Ê±¼á³ÖУ԰¿ª·Å£¬£¬£¬£¬£¬£¬µ«»¥ÁªÍø¡¢µç×ÓÓʼþµÈÅþÁ¬ÈÔÎÞ·¨Ê¹Óᣡ£¡£
https://databreaches.net/2025/04/27/russian-linked-hackers-appear-to-have-launched-a-crippling-cyberattack-on-western-new-mexico-university/
4. ΢Èí½ÒÆÆStorm-1977Õë¶Ô½ÌÓýÔÆ×â»§µÄÃÜÂëÅçÈ÷¹¥»÷
4ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Î¢Èí¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Æä×·×ÙµÄÍþвÐÐΪÕßStorm-1977ÔÚÒÑÍùÒ»ÄêÖÐÕë¶Ô½ÌÓýÁìÓòÔÆ×â»§ÌᳫÁËÃÜÂëÅçÈ÷¹¥»÷¡£¡£¡£Î¢ÈíÍþвÇ鱨ÍŶӯÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ʹÓÃÁËÃûΪAzureChecker.exeµÄÏÂÁîÐнçÃæ£¨CLI£©¹¤¾ß£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß±»¶à¸öÍþвÐÐΪÕ߯ձéʹÓᣡ£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬£¬£¬£¬¸Ã¶þ½øÖÆÎļþ»áÅþÁ¬ÖÁÍⲿЧÀÍÆ÷¡°sac-auth.nodefunction[.]vip¡±£¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡AES¼ÓÃܵÄÃÜÂëÅçÈ÷Ä¿µÄÁÐ±í¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß»¹½ÓÊܰüÀ¨Óû§ÃûºÍÃÜÂë×éºÏµÄ¡°accounts.txt¡±Îı¾Îļþ×÷ΪÊäÈ룬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÕâÁ½¸öÎļþÖеÄÐÅÏ¢£¬£¬£¬£¬£¬£¬¶ÔÄ¿µÄ×â»§¾ÙÐÐÆ¾Ö¤ÑéÖ¤¡£¡£¡£ÔÚÀ×µÂÃɵÂÊӲ쵽µÄÒ»ÆðÀÖ³ÉÈëÇÖ°¸ÀýÖУ¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÀ´±öÕÊ»§ÔÚÊÜѬȾ¶©ÔÄÖн¨Éè×ÊÔ´×飬£¬£¬£¬£¬£¬²¢½øÒ»²½ÔÚ×éÄÚ½¨Éè200¶à¸öÈÝÆ÷£¬£¬£¬£¬£¬£¬Òâͼ¾ÙÐв»·¨¼ÓÃÜÇ®±ÒÍÚ¾ò¡£¡£¡£Î¢ÈíÇ¿µ÷£¬£¬£¬£¬£¬£¬ÈÝÆ÷»¯×ʲúÈçKubernetes¼¯Èº¡¢ÈÝÆ÷×¢²á±íºÍ¾µÏñµÈÒ×ÊܶàÖÖ¹¥»÷£¬£¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÃй¶µÄÔÆÆ¾Ö¤¾ÙÐм¯Èº½ÓÊÜ¡¢Ê¹Óñ£´æÎó²îºÍ¹ýʧÉèÖõÄÈÝÆ÷¾µÏñÖ´ÐжñÒâ²Ù×÷¡¢Í¨¹ý¹ýʧÉèÖõÄÖÎÀí½Ó¿Ú»á¼ûKubernetes API²¢°²ÅŶñÒâÈÝÆ÷»òÐ®ÖÆÕû¸ö¼¯Èº£¬£¬£¬£¬£¬£¬ÒÔ¼°ÔÚ½ÚµãÉÏÔËÐÐÒ×Êܹ¥»÷µÄ´úÂë»òÈí¼þ¡£¡£¡£
https://thehackernews.com/2025/04/storm-1977-hits-education-clouds-with.html
5. Commvault Innovation ReleaseÑÏÖØÎó²îÐè½ôÆÈÐÞ¸´
4ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬ÆóÒµÐè½ôÆÈÓ¦¶ÔCommvault Innovation ReleaseÑÏÖØÎó²îCVE-2025-34028¡£¡£¡£¸ÃÎó²î±£´æÓÚCommvault Command CenterÆóÒµ¼¶±¸·ÝÓëÊý¾ÝÖÎÃ÷È·¾ö¼Æ»®ÄÚ£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.0£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÎÞÐèµÇ¼¼´¿ÉÔ¶³ÌÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬½ø¶ø»ñȡϵͳÍêÈ«¿ØÖÆÈ¨¡£¡£¡£Îó²î³ÉÒòÊÇ¡°deployWebpackage.do¡±Web½Ó¿Ú×é¼þδ¶ÔÍⲿЧÀÍÆ÷¾ÙÐÐÓÐÓÃÑéÖ¤£¬£¬£¬£¬£¬£¬Ê¹ÆäÒ×ÔâÊÜÔ¤ÈÏ֤ЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©¹¥»÷¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²î·¢ËÍÌØÖÆZIPѹËõ°ü£¨ÄÚº¬¶ñÒâ¡°.JSP¡±Îļþ£©£¬£¬£¬£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆÇëÇó²ÎÊý£¬£¬£¬£¬£¬£¬½«¶ñÒâÎļþ×ªÒÆÖÁ¿É¹ûÕæ»á¼ûλÖò¢´¥·¢Ö´ÐУ¬£¬£¬£¬£¬£¬¸æ¿¢Ô¶³Ì´úÂëÖ´ÐÐÄ¿µÄ¡£¡£¡£¸ÃÎó²îÓÉwatchTowr LabsÑо¿Ô±ÓÚ2025Äê4ÔÂ7ÈÕ·¢Ã÷²¢Éϱ¨£¬£¬£¬£¬£¬£¬CommvaultÔÚ4ÔÂ17ÈÕÇ徲ͨ¸æÖÐÈÏ¿ÉÆäÑÏÖØÐÔ£¬£¬£¬£¬£¬£¬Ö¸³ö¸ÃÎó²î¿ÉÄܵ¼ÖÂCommand CenterÇéÐÎÖÜȫʧÏÝ£¬£¬£¬£¬£¬£¬½ø¶øÐ¹Â¶Ãô¸ÐÊý¾Ý²¢ÖÐÖ¹Òªº¦ÓªÒµ¡£¡£¡£´ËÎó²î½öÓ°ÏìLinuxºÍWindowsƽ̨¡°Innovation Release¡±Èí¼þ°æ±¾11.38.0ÖÁ11.38.19£¬£¬£¬£¬£¬£¬ÆóÒµ½«ÏµÍ³Éý¼¶ÖÁ11.38.20»ò11.38.25°æ±¾¼´¿ÉÍê³ÉÐÞ¸´¡£¡£¡£
https://hackread.com/critical-commvault-flaw-allows-full-system-takeover/
6. ³¯ÏʺڿÍͨ¹ý¿Õ¿Ç¹«Ë¾Èö²¥¶ñÒâÈí¼þ
4ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬Ó볯ÏʹØÁªµÄÍþвÐÐΪ×éÖ¯¡°Contagious Interview¡±±»ÆØÍ¨¹ýÐéαÕÐÆ¸Á÷³ÌÉèÁ¢¿Õ¿Ç¹«Ë¾·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Silent PushÉî¶ÈÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚ×îлÖÐʹÓüÓÃÜÇ®±Ò×ÉѯÐÐÒµµÄBlockNovas LLC¡¢Angeloper AgencyºÍSoftGlide LLCÈý¼Ò¿Õ¿Ç¹«Ë¾£¬£¬£¬£¬£¬£¬ÒÔ¡°ÃæÊÔÓÕ¶ü¡±Èö²¥BeaverTail¡¢InvisibleFerretºÍOtterCookieÈýÖÖÒÑÖª¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£´Ë´Î¹¥»÷Êdz¯Ïʲ߻®µÄ¶àÆðÕÐÆ¸Ö÷ÌâÉç»á¹¤³Ì¹¥»÷Ö®Ò»£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒÔ±à³ÌʹÃü»ò½â¾öÊÓÆµÃæÊÔÊÖÒÕÎÊÌâΪÄó´Ê£¬£¬£¬£¬£¬£¬ÓÕµ¼Ä¿µÄÏÂÔØ¿çƽ̨¶ñÒâÈí¼þ¡£¡£¡£´Ë´Î¹¥»÷·ºÆðÉý¼¶Ì¬ÊÆ£º¿Õ¿Ç¹«Ë¾ÍøÂç·½Ãæ£¬£¬£¬£¬£¬£¬BlockNovas LLCËäÐû³ÆÓÐ14ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬µ«´ó¶¼µµ°¸Î±Ô죬£¬£¬£¬£¬£¬ÇÒ¹«Ë¾×¢²áʱ¼äÓëÐû³ÆµÄÔËÓªÄêÏÞ²»·û£»£»£»£»£»£»£»É罻ýÌåαװÉÏ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ¶à¸öƽ̨½¨ÉèÐéαÕË»§À©´óÈö²¥£»£»£»£»£»£»£»¹¥»÷Á´Ôò½ÓÄɶà½×¶ÎÉè¼Æ£¬£¬£¬£¬£¬£¬BeaverTail×÷ΪJavaScriptÇÔÈ¡Æ÷/¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬Í¨¹ýÌØ¶¨ÓòÃû½¨ÉèC2ͨѶ²¢Í¶µÝÏÂÒ»½×¶ÎÔØºÉ£¬£¬£¬£¬£¬£¬InvisibleFerretΪPythonºóÃÅ£¬£¬£¬£¬£¬£¬Ö§³Ö¶àƽ̨³¤ÆÚ»¯²¢¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬OtterCookieÔò²¿·Öͨ¹ýͳһJSÔØºÉ·Ö·¢¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬BlockNovas×ÓÓòÃûÍйܡ°×´Ì¬ÒDZíÅÌ¡±¼à¿ØÏà¹ØÓòÃû£¬£¬£¬£¬£¬£¬ÇÒ×ÓÓòÃûÔËÐпªÔ´ÃÜÂëÆÆ½âϵͳ£¬£¬£¬£¬£¬£¬²¿·ÖÓòÃû»¹ÍйܼÓÃÜÇ®±ÒÇ®°ü¹¤¾ß¡£¡£¡£
https://thehackernews.com/2025/04/north-korean-hackers-spread-malware-via.html