XRP Ledger SDKÔ⹩¸øÁ´¹¥»÷£¬¶ñÒâNPM°æ±¾ÇÔȡ˽Կ

°ä²¼¹¦·ò 2025-04-25

1. XRP Ledger SDKÔ⹩¸øÁ´¹¥»÷£¬¶ñÒâNPM°æ±¾ÇÔȡ˽Կ


4ÔÂ24ÈÕ£¬XRPLedgerSDK½üÈÕÔâ·êÁËÑϳÁµÄ¹©¸øÁ´¹¥»÷£¬¹¥»÷Õßͨ¹ýÈëÇÖ¹Ù·½xrpl½Úµã°üÖÎÀíÆ÷£¨NPM£©Èí¼þ°ü£¬Ö²Èë¶ñÒâ´úÂëÒÔÇÔÈ¡Óû§Ë½Ô¿£¬½ø¶ø½ÚÔìÆä¼ÓÃÜÇ®±ÒÇ®°ü¡£Õâ´Î¹¥»÷ÓÉAikidoÓ¢ÌØ¶ûÍþв¼ì²âϵͳ·¢ÏÖ£¬¸Ãϵͳ¼à²âµ½NPMÉÏа䲼µÄÎå¸öxrplÈí¼þ°ü°æ±¾£¨4.2.4¡¢4.2.3¡¢4.2.2¡¢4.2.1ºÍ2.14.2£©´æÔÚÒì³££¬ÆäÿÖÜÏÂÔØÁ¿³¬¹ý14Íò´Î£¬¶øÕâЩ°æ±¾ÔÚGitHubÉϲ¢ÎÞ¶ÔÓ¦ºÏ·¨°æ±¾£¬ÇÒÆäʱGitHubÉÏ×îкϷ¨°æ±¾ºÅΪ4.2.0£¬²î¾àÒý·¢Á˰²È«ÓÇÓô¡£½øÒ»´ëÊ©²é·¢ÏÖ£¬¶ñÒâÈí¼þ°ü4.2.4°æ±¾µÄsrc/index.tsÎļþÖУ¬´æÔÚÒ»¸öÃûΪcheckValidityOfSeedµÄÒì³£º¯Êý£¬¸Ãº¯Êý»áÏòÒ»¸öд´½¨µÄİÉúÓòÃû·¢ËÍHTTP POSTÒªÇ󣬴ËÓòÃû×¢²áÐÅÏ¢¿ÉÒÉ¡£¶ñÒâ´úÂëÔڹؼüº¯ÊýÖб»Å²Óã¬ÈçWalletÀàµÄ»ú¹Øº¯Êý£¬µ¼ÖÂÔÚÀûÓ÷¨Ê½Ê·ý»¯Wallet¶ÔÏóʱ£¬Óû§µÄ˽Կ¿ÉÄܱ»·¢ËÍÖÁ¹¥»÷Õß·þÎñÆ÷¡£ÔçÆÚ¶ñÒâ°æ±¾£¨4.2.1ºÍ4.2.2£©½«¶ñÒâ´úÂëÒýÈë¹¹½¨µÄJavaScriptÎļþÖУ¬²¢É¾³ýÁËpackage.jsonÎļþÖеľ籾ºÍPrettierÅäÖã»¶øºóÐø°æ±¾£¨4.2.3ºÍ4.2.4£©Ôò½«¶ñÒâ´úÂëÖ±½Ó¼¯³Éµ½TypeScriptÔ´´úÂëÖУ¬ÒÔ¶ã±Ü¼ì²â¡£¹Ù·½xrplÒѰ䲼Á½¸öÐµİ²È«°æ±¾£¨4.2.5ºÍ2.14.3£©£¬Ç¿ÁÒ½¨ÒéÓû§µ±¼´¸üÐÂÒÔ½µµÍ·çÏÕ¡£


https://hackread.com/backdoor-found-in-official-xrp-ledger-npm-package/


2. ºÚ¿ÍÀÄÓÃOAuth 2.0½Ù³ÖMicrosoft 365ÕË»§


4ÔÂ24ÈÕ£¬¶íÂÞ˹ÍþвÐÐΪÕß³ÖÐøÀûÓúϷ¨OAuth 2.0Éí·ÝÑéÖ¤Á÷³Ì£¬¶ÔÓëÎÚ¿ËÀ¼¼°ÈËȨÓйØ×éÖ¯Ô±¹¤µÄMicrosoft 365ÕÊ»§ÌáÒé¹¥»÷¡£ÍøÂ簲ȫ¹«Ë¾Volexity×Ô3Ô³õÆð±ã¼à²âµ½´ËÀà»î¶¯£¬´ËǰÆäÓë΢ÈíÔÚ2Ô¾ÍÔø»ã±¨¹ýÀûÓÃÉ豸´úÂëÉí·ÝÑéÖ¤ÍøÂç´¹µöÇÔÈ¡Microsoft 365ÕÊ»§µÄÀàËÆÐж¯¡£Volexity×·×Ù·¢ÏÖ£¬ÓйØÍþвÐÐΪÕßUTA0352ºÍUTA0355¾ùΪ¶íÂÞ˹ÈË¡£¹¥»÷ʼÓÚSignal»òWhatsAppµÄÒ»ÌõÐÂÎÅ£¬ÐÂÎÅ¿ÉÄÜÀ´×Ô±»µÁµÄÎÚ¿ËÀ¼µ±¾ÖÕË»§¡£UTA0352»áÒÔPDFÎļþ´ó¾Ö·ÖÏí»áÒé×¢Ã÷¼°¶ñÒâURL£¬Êèµ¼Óû§µÇ¼ʹÓÃMicrosoft 365 OAuth¹¤×÷Á÷µÄMicrosoftºÍµÚÈý·½ÀûÓ÷¨Ê½¡£Ö¸±êʵÏÖÉí·ÝÑéÖ¤ºó£¬»á±»³Á¶¨Ïòµ½Ìض¨Ò³Ã棬¸ÃÒ³Ãæ¿É½Ó¹Üº¬OAuthµÄµÇ¼²ÎÊý¡£¹¥»÷ÕßÀûÓÃÉç»á¹¤³ÌѧÓÕÆ­Êܺ¦Õß·¢»¹ÊÚȨÂ룬´Ë´úÂëÓÐЧÆÚ60Ì죬¿É»ñÈ¡Óû§¡°Í¨³£¿ÉÓõÄËùÓÐ×ÊÔ´¡±µÄ½Ó¼ûÁîÅÆ¡£´Ë±í£¬×êÑл¹·¢ÏÖ£¬4Ô¹éÒòÓÚUTA0355µÄ»î¶¯ÓëUTA0352ÀàËÆ£¬µ«³õʼͨѶÀ´×Ô±»ÈëÇÖµÄÎÚ¿ËÀ¼µ±¾Öµç×ÓÓʼþÕË»§£¬¹¥»÷Õß»áÀûÓÃÇÔÈ¡µÄOAuthÊÚȨÂ뽫ÐÂÉ豸ע²áµ½Êܺ¦ÕßµÄMicrosoft Entra ID£¬²¢Éè·¨ÈÃÖ¸±êºË׼˫³É·ÖÉí·ÝÑéÖ¤ÒªÇó£¬ÒÔ»ñÈ¡½Ó¼ûȨÏÞºÍά³Ö³Ö¾Ã·¸·¨½Ó¼û¡£


https://www.bleepingcomputer.com/news/security/hackers-abuse-oauth-20-workflows-to-hijack-microsoft-365-accounts/


3. ³¯ÏÊLazarus×éÖ¯Operation SyncHole¼äµý»î¶¯


4ÔÂ24ÈÕ£¬³ôÃûÔ¶ÑïµÄ³¯ÏÊÍþв×éÖ¯LazarusÌáÒéÁËÒ»´ÎÕë¶Ôº«¹ú¶àÁìÓòµÄ¼äµý»î¶¯£¬¿¨°Í˹»ù½«Æä¶¨ÃûΪ¡°Operation SyncHole¡±¡£Õâ´Î»î¶¯ÔÚ2024Äê11ÔÂÖÁ2025Äê2ÔÂÆÚ¼äÖÁÉÙ·çÏÕÁ˺«¹úÈí¼þ¡¢IT¡¢½ðÈÚ¡¢°ëµ¼ÌåÔì×÷ºÍµçÐŵÈÁìÓòµÄÁù¸ö×éÖ¯£¬ÇÒ¼øÓÚÆäÀûÓÃÈí¼þµÄÊ¢ÐÐˮƽ£¬ÊÜÓ°Ïì×éÖ¯»ò±é²¼¸ü¿í·ºÐÐÒµ¡£¹¥»÷ÒÁʼ£¬Ö¸±ê½Ó¼ûº«¹úºÏ·¨Ã½ÌåÃÅ»§ÍøÕ¾Ê±£¬LazarusÀûÓ÷þÎñÆ÷¶Ë¾ç±¾ÈëÇÖÕâÐ©ÍøÕ¾£¬·ÖÎö½Ó¼ûÕß²¢³Á¶¨ÏòÓÐЧָ±êÖÁ¶ñÒâÓò¡£Êܺ¦Õß³£±»³Á¶¨Ïòµ½·ÂÕÕÈí¼þ¹©¸øÉÌ£¨ÈçCross EX·ÖÏúÉÌ£©µÄÐéÎ±ÍøÕ¾£¬Cross EX¿Éʹº«¹úÈËÔÚÍøÂçä¯ÀÀÆ÷ÖÐʹÓð²È«Èí¼þ½øÐÐÍøÉÏÒøÐкÍÓëµ±¾ÖÍøÕ¾»¥¶¯¡£Ö»¹ÜÀûÓÃCross EX´«²¼¶ñÒâÈí¼þµÄ¾ßÌå²½ÖèÉв»Ã÷È·£¬µ«×êÑÐÈËԱȷÈϹ¥»÷¹ý³Ì¶àÒÔ¸ßÆëÈ«ÐÔ¼¶±ðÖ´ÐУ¬Åú×¢¹¥»÷ÕßÌáÉýÁËȨÏÞ¡£ÐéÎ±ÍøÕ¾ÉϵĶñÒâJavaScript½èÖúCross EXÈí¼þ´«²¼¶ñÒâÈí¼þ£¬·ì϶ÀûÓ÷¨Ê½»áÆô¶¯ºÏ·¨µÄ¡°SyncHost.exe¡±¹ý³Ì²¢×¢Èëshellcode£¬¼ÓÔØ¡°ThreatNeedle¡±ºóÃÅ£¬¸ÃºóÃÅÄÜÔÚÊÜϰȾÖ÷»úÉÏÖ´ÐÐ37ÌõºÅÁÓÃÓÚ²¿Êð¶àÖÖ¶ñÒⷨʽ¡£


https://www.bleepingcomputer.com/news/security/lazarus-hackers-breach-six-companies-in-watering-hole-attacks/


4. Ү³ŦºÚÎÄÒ½ÁÆÖÐÐÄÊý¾Ýй¶ӰÏì550Íò»¼Õß


4ÔÂ24ÈÕ£¬Ò®Â³Å¦ºÚÎĽ¡È«ÖÐÐÄ£¨YNHHS£©½üÆÚÔâ·êÍøÂç¹¥»÷£¬µ¼ÖÂ550ÓàÍòÃû»¼ÕßÓ×ÎÒÐÅϢй¶¡£2025Äê3ÔÂ8ÈÕ£¬YNHHS·¢ÏÔìäÐÅÏ¢¼¼Êõ£¨IT£©ÏµÍ³³öÏÖÒì³£»î¶¯£¬Ëæ¼´²ÉÈ¡´ëÊ©½ÚÔìÊÂÎñ²¢·¢Õ¹µ÷²é£¬»¹Ïò·¨Âɲ¿ÃŻ㱨¡£µ÷²é·¢ÏÖ£¬Î´¾­ÊÚȨµÄµÚÈý·½ÓÚµ±ÈÕ½Ó¼ûÆäÍøÂç²¢»ñÈ¡²¿ÃÅÊý¾Ý¸±±¾¡£ÔÚÍøÂ簲ȫ¹«Ë¾MandiantЭÖúÏ£¬3ÔÂ11ÈÕ¸ÃÍøÂ簲ȫÊÂÎñÓ°ÏìIT·þÎñµÄÎÊÌâѸ¿ìµÃµ½½ÚÔ죬»¼Õß»¤ÀíºÍÒ½ÁƼͼδÊÜÓ°Ï죬µ«¸´Ô­¹¤×÷ÖÐÈÔ´æÔÚһЩ»¥ÁªÍøºÍÀûÓ÷¨Ê½½Ó¼ûÎÊÌâ¡£4ÔÂ11ÈÕ£¬YNHHSÅû¶Êý¾Ýй¶ÊÂÎñ£¬³ÆÍþвÐÐΪÕßÇÔÈ¡ÁË»¼ÕßÃô¸ÐÐÅÏ¢£¬±»µÁÊý¾ÝÒò»¼Õß¶øÒ죬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢ÖÖ×å/Ãñ×å¡¢Éç»á°²È«ºÅÂ루SSN£©¡¢»¼ÕßÀàÐÍ¡¢²¡Àú±àºÅµÈ£¬µ«²»Ô̺¬²ÆÕþÐÅÏ¢¡¢Ò½ÁƼͼ»òÒ½ÖÎϸ½Ú¡£¸Ã»ú¹¹Ç¿µ÷ÊÂÎñδӰÏìÆäΪ»¼ÕßÌṩ»¤ÀíµÄÄÜÁ¦¡£×Ô4ÔÂ14ÈÕÆð£¬YNHHS½«ÏòÊÜÓ°Ï컼ÕßÓʼĺ¯¼þ¡£ËäĿǰδ»ã±¨Êý¾Ý±»ÀÄÓÃÇé¿ö£¬µ«ÒÑÎªÉæ¼°Éç±£ºÅÂëµÄ»¼ÕßÌṩÃâ·ÑÐÅÓþ¼à¿Ø£¬²¢ÉèÁ¢×¨Ãźô½ÐÖÐÐĽâ´ðÓйØÎÊÌâ¡£


https://securityaffairs.com/176937/data-breach/yale-new-haven-health-ynhhs-data-breach-impacted-5-5-million-patients.html


5. ¸¥À×µÂÀï¿Ë½¡È«ÖÐÐÄÊý¾Ýй¶ӰÏì½ü°ÙÍò»¼Õß


4ÔÂ24ÈÕ£¬½ñÄê1Ô£¬ÂíÀïÀ¼ÖÝ´óÐÍÒ½ÁƱ£½¡ÌṩÉ̸¥À×µÂÀï¿Ë½¡È«Ò½ÁƼ¯ÍÅÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬Òý·¢Êý¾Ýй¶£¬ÒÔÖÁ½ü°ÙÍò»¼ÕßÐÅÏ¢ÊÜÓ°Ïì¡£3Ôµ×£¬¸ÃÒ½ÁÆÏµÍ³Ïò»¼Õß·¢³ö֪ͨ£¬Ð¹Â©ÀÕË÷Èí¼þ¹¥»÷ÓÚ1ÔÂ27ÈÕ±»¼ì²âµ½¡£·¢ÏÖ¹¥»÷ºó£¬¸¥À×µÂÀï¿Ë½¡È«ÖÐÐÄѸ¿ìÐж¯£¬Í¨Öª·¨Âɲ¿ÃŲ¢ÀñƸµÚÈý·½È¡Ö¤¹«Ë¾£¬¶ÔÊÂÎñÓ°Ïì·¢Õ¹µ÷²é¡£ÆäÉêÃ÷Ö¸³ö£¬2025Äê1ÔÂ27ÈÕ£¬¸ÃÖÐÐÄÔâ·êÀÕË÷Èí¼þÊÂÎñ£¬ITϵͳÊÜÓ°Ï죬µ÷²é·¢ÏÖÒ»Ãûδ¾­ÊÚȨÈËÔ±½Ó¼ûÍøÂ磬²¢ÓÚµ±ÈÕ´ÓÎļþ¹²Ïí·þÎñÆ÷¸´ÔìÁ˲¿ÃÅÎļþ¡£Í¬Ê±£¬¸ÃÖÐÐݵʾÕýΪÐÅÏ¢¿ÉÄܱ»Ð¹Â¶ÇÒ°ÑÎÕ×ã¹»ÁªÏµÐÅÏ¢µÄÓ×ÎÒÓʼĺ¯¼þ¡£Õâ´ÎÊý¾ÝÐ¹Â¶Éæ¼°ÁìÓò¿í·º£¬¹¥»÷Õ߯¾¾ÝÊÜÓ°ÏìÈËÔ±·ÖÆç£¬ÇÔÈ¡ÁËÔ̺¬ÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÔÚÄÚµÄÃô¸ÐÓ×ÎÒÐÅÏ¢£¬ÒÔ¼°²¡ÀúºÅ¡¢½¡È«±£ÏÕÐÅÏ¢¡¢Ó뻼Õß»¤ÀíÓйصÄÁÙ´²ÐÅÏ¢µÈÓ×ÎÒ½¡È«ÐÅÏ¢¡£Ö»¹Ü¸¥À×µÂÀï¿Ë½¡È«ÖÐÐÄδ°ä²¼ÊÜÓ°Ïì¾ßÌåÈËÊý£¬µ«3ÔÂ28ÈÕÒÑÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿»ã±¨´ËÊ¡£Ä¿Ç°£¬ÎÀÉúÓ빫¼Ò·þÎñ²¿¸üл㱨й¶ÊÂÎñÁбí£¬È·ÈÏÕâ´ÎÊÂÎñÓ°Ïì934,326Ãû»¼Õß¡£


https://www.bleepingcomputer.com/news/security/frederick-health-data-breach-impacts-nearly-1-million-patients/


6. ÂíËþÂÞ¹©Ë®¹«Ë¾ÔâÍøÂç¹¥»÷£¬¿Í»§ÐÅÏ¢»òй¶


4ÔÂ24ÈÕ£¬Î÷°àÑÀÕÆ¹ÜÒûÓÃË®ºÍÎÛË®´¦Öõũˮ¹«Ë¾Aig¨¹es de Matar¨®£¨°¬¸ñ˹µÂÂíËþÂÞ£©ÓÚÖÜÈý°ä·¢£¬Æä¹«Ë¾ÍÆËã»úϵͳºÍÍøÕ¾Ôâ·êÍøÂç¹¥»÷¡£¸Ã¹«Ë¾·þÎñµÄÂíËþÂÞÊǼÓÌ©ÂÞÄáÑǵÄÒ»¸öÑØº£³ÇÕò£¬È˶¡Ô¼13Íò£¬Î»ÓÚ°ÍÈûÂÞÄÇÒÔ±±Ô¼19Ó¢Àï´¦£¬ÂíËþÂÞÊÐÕþ¹«Ë¾Ã÷È·°µÊ¾£¬Õâ´Î¹¥»÷δ¶Ô¹©Ë®×ÔÉíºÍÖÊÁ¿½ÚÔìϵͳÔì³ÉÓ°Ïì¡£°¬¸ñ˹µÂÂíËþÂÞÔÚ¹Ù·½ÉêÃ÷ÖгÆ£¬Õâ´Î¹¥»÷ÓÚÖÜÒ»±»·¢ÏÖ£¬¹«Ë¾ÒѵÚÒ»¹¦·òÏò¼ÓÌ©ÂÞÄáÑǾ¯·½ÒÔ¼°×ÔÖÎÇøÍøÂ簲ȫ»ú¹¹»ã±¨¡£×÷ΪÏÖÓÐÓ¦¼±´òËãµÄÒ»²¿ÃÅ£¬¸Ã¹«Ë¾Ñ¸¿ìÖ´ÐÐÄÚ²¿½ÚÔì´ëÊ©£¬ÒÔ¼õÇá¹¥»÷´øÀ´µÄÓ°Ï죬²¢»ý¼«Óë¼ÓÌ©ÂÞÄáÑǵ±¾ÖºÏ×÷£¬È«Á¦¸´Ô­ÊÜÓ°ÏìµÄ»ù´¡ÉèÊ©¡£²»Í⣬°¬¸ñ˹µÂÂíËþÂÞÒ²Ïò¿Í»§·¢³öÖҸ棬¹«Ë¾³ÖÓеÄһϵÁÐÓ×ÎÒÐÅÏ¢£¬º­¸Ç²ÆÕþºÍÓ×ÎÒÐÅÏ¢µÈ£¬¿ÉÄÜÒÑÔÚ¹¥»÷ÖÐй¶¡£Îª´Ë£¬¹«Ë¾¼¤Àø¿Í»§Î¬³Ö¾¯Ì裬·À±¸ÀûÓÃÕâЩй¶Êý¾ÝÌáÒéµÄÍøÂç´¹µö¹¥»÷¡£Í¬Ê±£¬¹«Ë¾Ì¹ÑÔÕâ´Î¹¥»÷»á¸øÄ¿Ç°ÎÞ·¨½Ó¼û¹«Ë¾·þÎñµÄÓû§´øÀ´²»±ã£¬Óû§¿ÉÄÜ»áÔâ·ê¼Æ·ÑºÍÆäËûÐÐÕþ·¨Ê½µÄÑÓ³¤¡£


https://therecord.media/cyberattack-water-supplier-barcelona-spain