ViciousTrapºÚ¿Í×éÖ¯ÀûÓ÷ì϶¹¹½¨ÀàÃÛ¹ÞÍøÂç
°ä²¼¹¦·ò 2025-05-261. ViciousTrapºÚ¿Í×éÖ¯ÀûÓ÷ì϶¹¹½¨ÀàÃÛ¹ÞÍøÂç
5ÔÂ23ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶£¬´úºÅViciousTrapµÄºÚ¿Í×éÖ¯ÒÑÈëÇÖÈ«Çò84¸ö¹ú¶È½ü5300Ì¨ÍøÂç±ßÔµÉ豸£¬½«ÆäˢгÉÀàÃÛ¹ÞÍøÂç¡£¸Ã×éÖ¯ÀûÓÃ˼¿ÆÓ×ÐÍÆóҵ·ÓÉÆ÷¶à¿îÐͺŵĹؼü·ì϶CVE-2023-20118Ö´Ðдó¹æÄ£ÈëÇÖ£¬ÆäÖÐ850̨ÊÜ¿ØÉ豸λÓÚ°ÄÃÅ¡£°²È«¹«Ë¾SekoiaÔÚ·ÖÎö»ã±¨ÖÐÖ¸³ö£¬Ï°È¾Á´Éæ¼°Ö´ÐÐÃûΪNetGhostµÄshell¾ç±¾£¬¸Ã¾ç±¾Äܽ«±»ÈëÇÖ·ÓÉÆ÷µÄÁ÷Á¿³Á¶¨ÏòÖÁ¹¥»÷Õß½ÚÔìµÄÀàÃÛ¹ÞÉèÊ©£¬ÊµÏÖÍøÂçÁ÷Á¿½Ù³Ö¡£´Ëǰ£¬·¨¹úÍøÂ簲ȫ¹«Ë¾Ôø½«¸Ã·ì϶ÀûÓùéÒòÓÚPolarEdge½©Ê¬ÍøÂ磬²»ÍâĿǰÉÐÎÞÖ¤¾ÝÅú×¢¶þÕßÓйØÁª¡£ViciousTrap±³ºóµÄ×éÖ¯Õýͨ¹ýÈëÇÖ´óÁ¿Â¶³öÓÚ»¥ÁªÍøµÄÉ豸¹¹½¨ÃÛ¹Þ»ù´¡ÉèÊ©£¬Éæ¼°50Óà¸ö³§É̵ÄSOHO·ÓÉÆ÷¡¢SSL VPNµÈ¶àÖÖÉ豸¡£ÕâÖּܹ¹Ê¹¹¥»÷ÕßÄܹ۲ì¶à»·¾³ÉøÈë³¢ÊÔ£¬¿ÉÄÜÍøÂçδ¹«¿ª»òÁãÈÕ·ì϶ÀûÓù滮£¬²¢½Ù³ÔìäËûÍþв×éÖ¯µÄÈëÇֳɾ͡£¹¥»÷Á´ÏÈͨ¹ý·ì϶ÀûÓÃÏÂÔØbash¾ç±¾£¬½ø¶øÖ´Ðеڶþ½×¶ÎµÄNetGhost¾ç±¾£¬¸Ã¾ç±¾¾ß±¸Á÷Á¿³Á¶¨ÏòÖ°ÄÜ£¬¿ÉÖ´ÐÐÖÐÑëÈ˹¥»÷£¬»¹¾ß±¸×Ôɾ³ýÄÜÁ¦ÒÔÏ÷¼õȡ֤ºÛ¼£¡£ËùÓй¥»÷³¢ÊÔ¾ùÔ´×Ôµ¥Ò»IPµØÖ·£¬×îÔç»î¶¯¿É×·ÒäÖÁ2025Äê3Ô£¬´ÎÔ¸Ã×éÖ¯»¹½«PolarEdge½©Ê¬ÍøÂçÔøÊ¹ÓõÄδ¹«¿ªWebShell¹¤¾ß¸Ä×÷¼ºÓᣱ¾ÔÂ×îй¥»÷»î¶¯×ªÏò»ªË¶Â·ÓÉÆ÷£¬Ê¹ÓÃÁíÒ»IPµØÖ·£¬µ«Î´²¿ÊðÃÛ¹Þ£¬ËùÓлîÔ¾IP¾ùλÓÚÂíÀ´Î÷ÑÇ£¬¹éÊôÍйܷþÎñÉÌShinjiruÔËÓªµÄ×ÔÖÎϵͳ¡£
https://thehackernews.com/2025/05/vicioustrap-uses-cisco-flaw-to-build.html
2. NPMÉϵÄÊýÊ®¸ö¶ñÒâÈí¼þ°üÍøÂçÖ÷»úºÍÍøÂçÊý¾Ý
5ÔÂ23ÈÕ£¬SocketÍþв×êÑÐÍŶÓÔÚNPMË÷ÒýÖз¢ÏÖÁËÁ½Æð¶ñÒâÈí¼þ°ü»î¶¯¡£µÚÒ»Â·Éæ¼°60¸ö¶ñÒâÈí¼þ°ü£¬ËüÃÇ×Ô5ÔÂ12ÈÕÆð´ÓÈý¸ö°ä²¼ÕßÕË»§ÉÏ´«ÖÁNPM´æ´¢¿â¡£ÕâЩÈí¼þ°üÔ̺¬×°Öúó¾ç±¾£¬ÔÚ¡°npm install¡±ÆÚ¼ä×Ô¶¯Ö´ÐУ¬ÍøÂçÔ̺¬Ö÷»úÃû¡¢ÄÚ²¿IPµØÖ·¡¢Óû§Ö÷Ŀ¼µÈÃô¸ÐÐÅÏ¢£¬²¢·¢Ë͵½ÍþвÐÐΪÕß½ÚÔìµÄDiscord webhook¡£¸Ã¾ç±¾»¹¾ß±¸»·¾³¼ì²âÖ°ÄÜ£¬ÒÔÈ·¶¨ÊÇ·ñÔÚ·ÖÎö»·¾³ÖÐÔËÐС£Ö»¹ÜĿǰδ¹Û²ìµ½µÚ¶þ½×¶ÎÓÐÐ§ÔØºÉµÄͶµÝ¡¢È¨ÏÞÌáÉý»òÓÆ¾Ã»úÔ죬µ«Ë¼¿¼µ½ËùÍøÂçÊý¾ÝµÄÃô¸ÐÐÔ£¬´ËÀ๥»÷µÄΣÏÕÐÔÏ൱¸ß¡£ÕâЩ¶ñÒâÈí¼þ°üÔøÀÛ¼ÆÏÂÔØ3000´Î£¬²»ÍâÔڻ㱨°ä²¼Ê±ÒÑ´ÓNPM´æ´¢¿âÖÐÒþû¡£ÎªÓÕÆ¿ª·¢ÈËÔ±£¬ÍþвÐÐΪÕßʹÓÃÁËÓëºÏ·¨Èí¼þ°üÀàËÆµÄÃû³Æ£¬¿ÉÄÜÕë¶ÔCI/CD¹Ü·¡£Áíһ·¶ñÒâ»î¶¯Éæ¼°°Ë¸öÈí¼þ°ü£¬ËüÃÇͨ¹ýÓòÃûÇÀ×¢·ÂÕÕReact¡¢Vue.js¡¢Vite¡¢Node.jsºÍQuillÉú̬ϵͳµÄºÏ·¨¹¤¾ß£¬µ«¾ß±¸Êý¾Ý²Á³ýÖ°ÄÜ£¬¿Éɾ³ýÎļþ¡¢°Ü»µÊý¾ÝºÍ¹Ø¹ØÏµÍ³¡£ÕâЩÈí¼þ°ü´ÓǰÁ½ÄêÒ»Ïò´æÔÚÓÚNPMÉÏ£¬ÏÂÔØÁ¿´ï6200´Î¡£ÆäÌӱܼì²âµÄ²¿ÃÅÔÒòÊÇÓÐÐ§ÔØºÉƾ¾ÝÓ²±àÂëµÄϵͳÈÕÆÚ¼¤»î£¬ÇÒÆä½á¹¹»áÖð²½·ÛËéϵͳ¡£Õâ´Î»î¶¯±³ºóµÄÍþвÐÐΪÕßÒÔ¡°xuxingfeng¡±ÃûÒå°ä²¼ÕâЩÎļþ£¬²¢ÁгöÁ˼¸¸öºÏ·¨Èí¼þ°üÒÔ³ÉÁ¢ÐÅÀµ¡£Ö»¹Üƾ¾ÝÓ²±àÂëÈÕÆÚ£¬Î£ÏÕÒÑ´Óǰ£¬µ«¼øÓÚ×÷Õß¿ÉÄÜÒýÈë¸üгÁд¥·¢²Á³ýÖ°ÄÜ£¬É¾³ýÕâЩÈí¼þ°üÖÁ¹Ø³ÁÒª¡£
https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/
3. Cetus ProtocolÔâºÚ¿ÍÇÔÈ¡2.23ÒÚ¼ÓÃÜÇ®±Ò
5ÔÂ23ÈÕ£¬È¥ÖÐÐÄ»¯ÂòÂôËùCetus Protocol½üÈÕ°ä·¢Ôâ·êºÚ¿Í¹¥»÷£¬¼ÛÖµ2.23ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£ÊÂÎñ²úÉúºó£¬¸ÃÏîÄ¿µ±¼´ÔÝÍ£ÖÇÄܺÏÔ¼·¢Õ¹µ÷²é£¬²¢È·ÈÏ¡°1.62ÒÚÃÀÔªµÄÊÜËð×ʽðÒѳɹ¦ÔÝÍ£¡±¡£Cetus ProtocolËæºóÖ¸³ö£¬ºÚ¿ÍÀûÓÃÁËÒ»¸öÒ×Êܹ¥»÷µÄÈí¼þ°üÖ´Ðй¥»÷£¬µ«Î´Åû¶¾ßÌåϸ½Ú¡£¸ÃÏîÄ¿°µÊ¾ÒÑÕÒµ½·ì϶µ××ÓÔÒò£¬½¨¸´ÁËÓйØÈí¼þ°ü£¬²¢Í¨ÖªÁËÉú̬ϵͳ½¨ÉèÕßÒÔÔ¤·ÀÆäËûÍŶÓÊÜÓ°Ïì¡£´Ë±í£¬Cetus Protocol¼ø±ð³ö¹¥»÷ÕßµÄÒÔÌ«·»Ç®°üµØÖ·ºÍÕË»§£¬ÕýÓëµÚÈý·½ºÏ×÷×·×ٺͶ³½á×ʽ𣬲¢ÒÑ֪ͨ·¨Âɲ¿ÃÅ¡£Îª´ÙʹºÚ¿ÍËÍ»¹×ʽð£¬Cetus ProtocolÌá³ö¡°ÓÐʱÏ޵İ×ñºÍ½âºÍ̸¡±£¬³ÐŵÈô×ʽðÍË»¹½«²»ÔÙ²Éȡ˾·¨Ðж¯¡£Í¬Ê±£¬¸ÃÏîÄ¿°ä·¢½«Ìṩ500ÍòÃÀÔªÉͽ𣬼ν±ÌṩÏßË÷¡¢Ô®ÊÖ¼ø±ðºÍ¿ÛÁôºÚ¿ÍµÄÐÅÏ¢ÌṩÕß¡£ÔÚÑéÖ¤Õß´¹Î£Í¶Æ±ºó£¬SuiÇø¿éÁ´ÉÏ1.62ÒÚÃÀÔªµÄ×ʽð±»ÔÝÍ£¡£Çø¿éÁ´·ÖÎö¹«Ë¾Elliptic°ä²¼»ã±¨Ö¸³ö£¬×Ô¶¯×öÊÐÉÌ£¨AMM£©Âß¼´æÔÚȱµã£¬¿ÉÄÜÉæ¼°³Ø¼ÛÖµ°Ñ³Ö£¬´Ó¶øÒý·¢ÉÁµç´ûʽ¹¥»÷¡£Elliptic»¹¸ÅÊöÁ˹¥»÷ÕßµÄ×ʽð×ªÒÆ³¢ÊÔ£¬²¢°µÊ¾ÔÚ»ý¼«×·×Ù´ÓSui³õʼ·ì϶µ½¹¥»÷ÕßÔÚÒÔÌ«·»ÉÏÇ®°üµÄÂòÂô¡£Ä¿Ç°£¬ºÚ¿ÍµÄµØÖ·ÒÑÔÚËùÓÐÖØÒªÂòÂôËùºÍÐé¹¹×ʲú·þÎñÌṩÉÌÉÏÏóÕ÷£¬ÒÔÔ¤·ÀÏ´Ç®»ò×ʽð×ªÒÆÌ°Í¼¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/
4. FBIÖÒ¸æSilent Ransom GroupÕë¶ÔÃÀÂÉËùÌáÒéÀÕË÷¹¥»÷
5ÔÂ23ÈÕ£¬ÃÀ¹úÁª¹úµ÷²é¾Ö½üÈÕ·¢³öÖҸ棬ָ³öÒ»¸öÃûΪSilent Ransom Group£¨SRG£©µÄÀÕË÷ÍÅ»ïÔÚ´ÓǰÁ½ÄêÀï³ÖÐøÕë¶ÔÃÀ¹úÂÉʦÊÂÎñËù·¢Æð»Ø²¦ÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷¡£¸ÃÍÅ»ï±ðÃûLuna Moth¡¢Chatty SpiderºÍUNC3753£¬×Ô2022ÄêÆð±ãÒ»Ïò»îÔ¾£¬ÊÇBazarCall»î¶¯µÄÄ»ºóÖ÷ʹ£¬ÎªRyukºÍContiÀÕË÷Èí¼þ¹¥»÷ÌṩÁ˳õÊ¼ÍøÂç½Ó¼ûȨÏÞ¡£ÔÚConti¹Ø¹Øºó£¬¸ÃÍþвÐÐΪÕßÍÑÀëÔÍøÂç·¸×OÍÅ£¬×齨ÁËSRG¡£ÔÚ×î½üµÄ¹¥»÷ÖУ¬SRGͨ¹ýµç×ÓÓʼþ¡¢ÐéÎ±ÍøÕ¾ºÍµç»°¼ÙÒâÖ¸±êITÖ§³ÖÈËÔ±£¬ÀûÓÃÉç»á¹¤³Ìѧ¼¿Á©»ñÈ¡ÍøÂç½Ó¼ûȨÏÞ¡£Óëͨ³£ÀÕË÷×éÖ¯·ÖÆç£¬SRG²¢²»¼ÓÃÜÊܺ¦Õßϵͳ£¬¶øÊÇÒÔË÷ÒªÊê½ðÔ¤·ÀÃô¸ÐÐÅϢй¶¶øÎÅÃû¡£ËûÃÇͨ¹ýÔ¶³Ì½Ó¼û»á»°½øÈëÊܺ¦ÕßÉ豸£¬½øÐÐ×îµÍÏ޶ȵÄȨÏÞÌáÉý£¬²¢Ñ¸¿ìתÏòÊý¾Ýй¶£¬ÀûÓá°WinSCP¡±»ò°µ²Ø/³Á¶¨ÃûµÄ¡°Rclone¡±°æ±¾ÇÔÈ¡Êý¾Ý¡£ÇÔÈ¡Êý¾Ýºó£¬SRGͨ¹ýÀÕË÷ÓʼþºÍµç»°ÍþвÏúÊÛ»ò¹«¿ªÐÅÏ¢£¬ÆÈʹÊܺ¦Õß½øÐÐÊê½ð½»Éæ¡£Ö»¹ÜËûÃÇÓÐרÃŵÄÍøÕ¾Ð¹Â¶Êܺ¦ÕßÊý¾Ý£¬µ«FBIÖ¸³ö£¬ÕâЩÀÕË÷ÍŻﲢ²»×Ü»á¶ÒÏÖÊý¾Ýй¶Íþв¡£Îª·ÀÓù´ËÀ๥»÷£¬FBI½¨ÒéʹÓÃÇ¿ÃÜÂë¡¢ÆôÓÃË«³É·ÖÉí·ÝÑéÖ¤¡¢¶¨ÆÚ±¸·ÝÊý¾Ý£¬²¢¶ÔÔ±¹¤½øÐÐÍøÂç´¹µö³¢ÊÔ¼ì²âÅàѵ¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-of-luna-moth-extortion-attacks-targeting-law-firms/
5. Marlboro-Chesterfield PathologyÊý¾Ýй¶ӰÏì23.5ÍòÈË
5ÔÂ22ÈÕ£¬ÃÀ¹ú±±¿¨ÂÞÀ´ÄÉÖÝÈ«·þÎñ½âÆÊ²¡Àí³¢ÊÔÊÒMarlboro-Chesterfield Pathology£¨MCP£©½üÆÚÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬ÒÔÖÁ´óÁ¿Ó×ÎÒÐÅÏ¢¼Í¼ʧÇÔ¡£¸Ã»ú¹¹ÔÚ¹ÙÍø°ä²¼µÄÊý¾Ýй¶֪ͨÅú×¢£¬2025Äê1ÔÂ16ÈÕÆäÄÚ²¿ITϵͳ³öÏÖδ¾ÊÚȨ»î¶¯£¬¾µ÷²éÈ·ÈϹ¥»÷ÕßÇÔÈ¡Á˲¿ÃÅÎļþ¡£Õâ´Îй¶µÄÊý¾Ýº¸ÇÐÕÃû¡¢×¡Ö·¡¢µ®ÉúÈÕÆÚ¡¢Ò½ÁÆÒ½ÖÎÐÅÏ¢¼°½¡È«±£ÏÕÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬¾ßÌåй¶×Ö¶ÎÒò¸ö±ð²î¾à¶øÓÐËù·ÖÆç¡£MCP±¾ÖÜÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿£¨HHS£©´«µÝ£¬Õâ´ÎÊÂÎñÓ°ÏìÁìÓòÉæ¼°235,911ÈË¡£ÀÕË÷Èí¼þ×éÖ¯SafePayÓÚÒ»ÔÂÏÂÑ®Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬¸ÃÍÅ»ï½üÆÚ»¹¶ÔóÒ×·þÎñÌṩÉÌConduentÌáÒé¹¥»÷¡£ÖµÍ×ÌùÐĵÄÊÇ£¬½ØÖÁ·¢¸åʱ£¬MCPÒÑ´ÓSafePayµÄйÃÜÍøÕ¾Ï¼ܣ¬ÕⰵʾÊܺ¦·½¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£
https://www.securityweek.com/marlboro-chesterfield-pathology-data-breach-impacts-235000-people/
6. ºÚ¿ÍÀûÓÃÐéαVPN¼°ä¯ÀÀÆ÷NSIS×°Öðü´«²¼Winos 4.0¶ñÒâÈí¼þ
5ÔÂ26ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶¶ñÒâÈí¼þ»î¶¯£¬¹¥»÷Õßͨ¹ý¼Ù×°³ÉLetsVPN¡¢QQä¯ÀÀÆ÷µÈÊ¢Ðй¤¾ßµÄÐéαװÖ÷¨Ê½£¬×îÖÕͶµÝWinos 4.0¿ò¼Ü¡£´Ë¹¥»÷Ðж¯ÓÉRapid7ÓÚ2025Äê2Ô³õ´Î¼à²âµ½£¬Ê¹ÓÃÁËÃûΪCatenaµÄ¶à½×¶ÎפÄÚ´æ¼ÓÔØÆ÷£¬½«ÓÐÐ§ÔØºÉÆëȫפÁôÄÚ´æÒÔ¶ã±Üɱ¶¾Èí¼þ¼ì²â¡£Ö²Èëºó£¬Catena»á¾²Ä¬Ïνӹ¥»÷Õß½ÚÔìµÄ·þÎñÆ÷£¬ÎÞÊýλÓÚÏã¸Û£¬ÒԽӹܺóÐøÖ¸Áî»ò¶î±í¶ñÒⷨʽ¡£¸Ã¹¥»÷ËÆºõרÃÅÕë¶ÔÖÐÎÄ»·¾³£¬Ä»ºó´æÔھ߱¸¸ß¶ÈÄÜÁ¦µÄÍþв×éÖ¯¡£Winos 4.0ÊÇ»ùÓÚ³ÛÃûÔ¶³ÌľÂíGh0st RAT´úÂë»ù´¡±àдµÄÏȽø¶ñÒâ¿ò¼Ü£¬¾ßº±¼û¾ÝÇÔÈ¡¡¢Ô¶³ÌShell½Ó¼û¼°·¢ÆðDDoS¹¥»÷µÈÖ°ÄÜ¡£2025Äê·¢ÏֵĻùÓÚQQä¯ÀÀÆ÷µÄϰȾÁ÷³ÌÏÔʾ£¬ËùÓÐÓйع¥»÷ÔØÌå¾ùÒÀÀµNSIS×°Ö÷¨Ê½£¬ÕâЩװÖðü°ó¸¿Á˾¹ýÊðÃûµÄµö¶üÀûÓã¬Í¨¹ý·´ÉäʽDLL×¢Èë¼¼ÊõʵÏÖÒñ±ÎפÁô¡£ÔÚ2025Äê4Ô·¢ÏÖµÄLetsVPN×°Öðü¹¥»÷°¸ÀýÖУ¬¶ñÒⷨʽͨ¹ý´´½¨´òË㹤×÷ʵÏÖÓÆ¾Ã»¯£¬ÇÒÔ̺¬¼ì²âϵͳÖÐÎÄ˵»°ÉèÖõÄÏÔÐÔУÑ飬µ«¼´±ãδ·¢ÏÖÖÐÎÄ»·¾³ÈÔ»á³ÖÐøÖ´ÐС£´Ë±í£¬¹¥»÷Õß»¹½øÐÐÁË¡°Õ½Êõµ÷Õû¡±£¬Åú¸ÄÁËCatenaÖ´ÐÐÁ´µÄijЩ×é¼þ£¬ÐÂÔö·´É±¶¾¼ì²â¶ã±ÜÖ°ÄÜ£¬ÈçΪËùÓÐÇý¶¯Æ÷Ôö³¤Microsoft DefenderÅųýÏ²¢Ê¹ÓùýÆÚÖ¤ÊéÊðÃûµÄ¶ñÒâÔØºÉ·´Éäʽ¼ÓÔØDLLÎļþÒÔÏνÓC2·þÎñÆ÷ÏÂÔØÖ´ÐÐWinos 4.0¡£
https://thehackernews.com/2025/05/hackers-use-fake-vpn-and-browser-nsis.html


¾©¹«Íø°²±¸11010802024551ºÅ