³¯ÏÊ¡°´«È¾ÐԲɷá°Ðж¯³ÖÐøÉý¼¶£¬npmƽ̨ÏÖ67¸ö¶ñÒâ°ü
°ä²¼¹¦·ò 2025-07-161. ³¯ÏÊ"´«È¾ÐԲɷÃ"Ðж¯³ÖÐøÉý¼¶£¬npmƽ̨ÏÖ67¸ö¶ñÒâ°ü
7ÔÂ15ÈÕ£¬½üÆÚ£¬³¯Ïʵ±¾ÖÖ§³ÖµÄ"´«È¾ÐԲɷÃ"ÍøÂç¹¥»÷Ðж¯ÔÚ¿ªÔ´Éú̬ÁìÓò³ÖÐøÉý¼¶¡£¾ÝÈí¼þ°ü°²È«Æ½Ì¨Socket×êÑÐÈËÔ±Åû¶£¬ÍþвÐÐΪÕßÏòNode.jsĬÈϰüÖÎÀíÆ÷npmÌá½»ÁË67¸ö¼Ù×°³ÉºÏ·¨ÏîÖ÷ÕŶñÒâÈí¼þ°ü£¬×ÜÏÂÔØÁ¿Í»ÆÆ17,000´Î¡£Õâ´Î¹¥»÷±»Ö¤ÊµÎª¸Ã×éÖ¯½ñÄê4ÔÂÒÔÀ´ÌáÒéµÄµÚ¶þ²¨´ó¹æÄ£Ðж¯£¬ÉÏÔÂÆäÔøÍ¨¹ý35¸önpm°üÖ²ÈëÐÅÏ¢ÇÔÈ¡·¨Ê½£¬Í¹ÏÔ³ö³¯ÏʺڿͶԿª·¢ÕßÉú̬µÄ³ÖÐøÐÔÉøÈëÕ½Êõ¡£¹¥»÷ÕßÒ»Á¬ÁË"Ðéα¹¤×÷»úÓö"µÄ¾µäÉ繤ÊÖ·¨£¬Í¨¹ý·ÂÕÕ³ÛÃûÏîÄ¿Ãû³Æ£¨Èçvite-meta-plugin¡¢postcss-preloaderµÈ£©ÓÕÆ¿ª·¢Õß×°ÖöñÒâ°ü¡£µ±Êܺ¦ÕßÖ´ÐÐ×°ÖÃʱ£¬°üÄÚÔ¤ÉèµÄ"postinstall"¾ç±¾»á´¥·¢ÐÂÐÍXORIndex¼ÓÔØÆ÷¡£¸Ã¹¤¾ßͨ¹ýÍøÂçÖ÷»úÐÅÏ¢²¢»Ø´«ÖÁÍйÜÓÚVercelÔÆÆ½Ì¨µÄºÅÁî½ÚÔì·þÎñÆ÷£¨C2£©£¬½ø¶ø½Ó¹ÜÔ̺¬BeaverTailºÍInvisibleFerretºóÃŵÄJavaScriptÔØºÉ¡£ÕâÁ½¸ö¶ñÒâÈí¼þ¼Ò×å¿ÉʵÏÖÔ¶³Ì´úÂëÖ´ÐÓ×¢Êý¾Ýй¶¼°ºóÐøÔØºÉͶ·Å£¬ÐÎ³ÉÆëÈ«µÄ¹¥»÷Á´¡£Õâ´ÎʹÓõÄXORIndex¼ÓÔØÆ÷Ó뺹Ç๥»÷ÖеÄHexEval¼ÓÔØÆ÷´æÔÚ¼¼Êõ¹ØÁª£¬ÏÔʾ¹¥»÷ÕßÕýͨ¹ý¹¤¾ß»ìÓúÍ΢µ÷ʵÏÖ¼ì²â¶ã±Ü¡£
https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/
2. ÐÂÐÍHazyBeaconºóÃÅÀûÓÃÔÆ·þÎñÇÔÈ¡¶«ÄÏÑǵ±¾ÖÃô¸ÐÊý¾Ý
7ÔÂ15ÈÕ£¬¶«ÄÏÑǵ±¾Ö»ú¹¹Õý³ÉΪһ³¡Óɹú¶ÈÖ§³ÖÐÍÍþвÐÐΪÕßÌáÒéµÄÐÂÐÍÍøÂç¼äµý»î¶¯µÄÖ¸±ê¡£¸Ã¹¥»÷¼¯Èº±»ÅÁÂå°¢¶ûÍÐÍøÂ繫˾Unit 42ÍŶӶ¨ÃûΪCL-STA-1020£¬ÆäÖ÷Ì⹤¾ßΪδ±»¼Í¼µÄWindowsºóÃÅ·¨Ê½HazyBeacon£¬Ö¼ÔÚͨ¹ýÒñ±Î¼¿Á©ÇÔÈ¡Éæ¼°ÒµÎñÕù¶Ë¡¢±í½»Õþ²ßµÈÕ½ÊõÁìÓòµÄÃô¸ÐÐÅÏ¢¡£¾Ý°²È«×êÑÐÔ±·ÖÎö£¬¹¥»÷Õßͨ¹ýDLL²àÔØ¼¼ÊõʵÏÖ³õʼÈëÇÖ£º½«¶ñÒ⶯̬Á´½Ó¿âÎļþmscorsvc.dllÓëºÏ·¨Windows¹ý³Ìmscorsvw.exe°ó¸¿Ö²ÈëÊܺ¦ÏµÍ³¡£¸Ã¶ñÒâDLLÔÚÆô¶¯ºó£¬»áÓë¹¥»÷Õß½ÚÔìµÄAWS Lambda URL³ÉÁ¢¼ÓÃÜͨѶÇþ·£¬ÀûÓÃÑÇÂíÑ·ÔÆ·þÎñµÄÎÞ·þÎñÆ÷º¯ÊýÖ°Äܰµ²ØºÅÁîÓë½ÚÔ죨C2£©Á÷Á¿¡£ÕâÖÖ¡°ÒÀ¸½¿ÉÕÛ·þÎñ£¨LOTS£©¡±µÄÕ½Êõ£¬Ê¹ÍþвÐÐΪÕßµÃÒÔÔÚ¹«¿ªÔÆÆ½Ì¨ÉϹ¹½¨ÄÑÒÔ×·ÒäµÄ¶ñÒâͨѶÁ´Â·£¬Í¬Ê±Í¨¹ýϵͳ·þÇóʵÏÖÓÆ¾Ã»¯×¤Áô£¬È·±£³ÁÆôºóÈÔ¿ÉÔËÐС£HazyBeaconµÄÖ÷ÌâÖ°ÄÜÊǶ¨ÏòÎļþÍøÂç¡£ÆäÓÐÐ§ÔØºÉ»áɨÃè²¢ÇÔÈ¡ÌØ°´¹¦·òÁìÓòÄÚ´´½¨µÄÎĵµ£¨Èç.doc¡¢.xls¡¢.pdfµÈ£©£¬ÓÈÆä¹Ø×¢ÓëÃÀ¹ú½üÆÚ¹ØË°´ëÊ©ÓйصÄÎļþ¡£Îª¶ã±Ü¼ì²â£¬¹¥»÷Õß½øÒ»²½ÀûÓùȸèÔÆ¶ËÓ²Å̺ÍDropboxµÈºÏ·¨ÔÆ´æ´¢·þÎñ×÷ΪÊý¾Ý±íйͨ·£¬½«ÇÔÊØÐÅÏ¢»ìÈëÕý³£Á÷Á¿´«Êä¡£
https://thehackernews.com/2025/07/state-backed-hazybeacon-malware-uses.html
3. ¹ú¼Ê·¨ÂÉÐж¯·ÛËéÂÞÂíÄáÑÇDiskstationÀÕË÷ÍÅ»ï
7ÔÂ15ÈÕ£¬ÓÉÅ·ÖÞÐ̾¯×é֯е÷µÄ"EliciusÐж¯"½üÈճɹ¦Íß½âÂÞÂíÄáÑÇ"Diskstation"ÀÕË÷Èí¼þÍŻ¸Ã×éÖ¯×Ô2021ÄêÆðÒÔSynologyÍøÂ總¼Ó´æ´¢£¨NAS£©É豸Ϊָ±ê£¬¶ÔÒâ´óÀûÂװ͵ڵØÓò¶à¼ÒÆóÒµÖ´ÐмÓÃܹ¥»÷£¬µ¼ÖÂÆäÒµÎñϵͳ̱»¾¡£·¨¹úÓëÂÞÂíÄáÑǾ¯·½½áºÏ²Î¼ÓµÄÕâ´ÎÐж¯£¬±ê־ȡ¿ç¹úÍøÂ簲ȫ·¨ÂɺÏ×÷»ñµÃ³Á´óÍ»ÆÆ¡£¸ÃÍÅ»ïרÃÅÕë¶Ô¶³öÔÚ»¥ÁªÍøÉϵÄNASÉ豸£¬ÕâÀàÉ豸³£±»ÆóÒµÓÃÓÚÎļþ´æ´¢¡¢±¸·Ý¼°¹²Ïí¡£ÆäÀÕË÷Èí¼þͨ¹ý¼ÓÃÜÊܺ¦ÕßÊý¾Ý£¬ÒªÇóÖ§¸¶1ÍòÖÁÊýÊ®ÍòÃÀÔª²»µÈµÄ¼ÓÃÜÇ®±ÒÊê½ð£¬Êܺ¦ÆóÒµÔ̺¬Í¼ÐÎÉè¼Æ¹«Ë¾¡¢Ó°ÊÓÔì×÷»ú¹¹¡¢»î¶¯²ß¶¯·½¼°¹ú¼Ê·Çµ±¾Ö×éÖ¯¡£Ã×À¼¼ì²ì¹Ù°ì¹«ÊÒ¸¨µ¼µÄµ÷²éÍŶÓͨ¹ýÇø¿éÁ´×·×ÙÊê½ðÁ÷Ïò£¬²¢½áºÏÊÜϰȾϵͳµÄȡ֤·ÖÎö£¬¿ÛÁôÒ»Ãû44ËêÂÞÂíÄáÑÇÄÐ×Ó£¬¸ÃÏÓÒÉÈ˱»Ö¸¿ØÎªÍÅ»ïÖ÷ı£¬Ä¿Ç°ÒòÉæÏÓ·¸·¨ÇÖÈëÍÆËã»úϵͳ¼°Ú²ÆÀÕË÷´¦ÓÚÉóǹú¿Ñº×´Ì¬¡£"Diskstation"ÀÕË÷Èí¼þÔøÒÔ"DiskStation Security""Quick Security"µÈ·ÖÆçÃû³Æ±äÌå»îÔ¾£¬Í¹ÏÔ·¸×ï·Ö×Óͨ¹ý¼¼Êõ¼Ù×°¶ã±Ü¼ì²âµÄ¹ßÓÃÊÖ·¨¡£
https://www.bleepingcomputer.com/news/security/police-disrupt-diskstation-ransomware-gang-attacking-nas-devices/
4. DragonForceÀÕË÷ÍÅ»ïÐû³Æ¹¥»÷ÃÀ¹ú°ÙÄêÁãÊÛÉÌBelk
7ÔÂ15ÈÕ£¬ÃÀ¹ú°ÙÄêÁãÊÛ¾ÞÍ·Belk½üÈÕÏÝÈëÍøÂ簲ȫΣ»ú¡£ÀÕË÷Èí¼þ×éÖ¯DragonForce¹«¿ªÐû³Æ¶Ô2025Äê5ÔÂ7ÈÕÖÁ11ÈÕÆÚ¼äÕë¶Ô¸Ã¹«Ë¾µÄ¹¥»÷ÕÆ¹Ü£¬²¢Ðû³ÆÇÔÈ¡ÁË156GBÄÚ²¿Êý¾Ý£¬Ô̺¬Ô±¹¤¼°¿Í»§µÄÐÕÃû¡¢Éç»á°²È«ºÅÂëµÈÃô¸ÐÓ×ÎÒÐÅÏ¢¡£Õâ´ÎÊÂÎñµ¼ÖÂBelk¹ÙÍøÒ»¶È̱»¾£¬ÆäÓ¦¶Ô´ëÊ©ÓëÊý¾Ýй¶ϸ½ÚÒý·¢¿í·º¹Ø×¢¡£Belk³ÉÁ¢ÓÚ1888Ä꣬×ܲ¿Î»ÓÚ±±¿¨ÂÞÀ´ÄÉÖÝÏÄÂåÌØ£¬ÔÚÃÀ¹ú16¸öÖÝÔËÓªÔ¼300¼ÒÃŵ꣬Ö÷Óª·þ×°¡¢¼Ò¾ÓÓÃÆ·¼°Ö鱦µÈÉÌÆ·¡£5ÔÂ8ÈÕ£¬Belk·¢ÏÖϵͳÒì³£ºó£¬µ±¼´½áºÏµÚÈý·½ÍøÂ簲ȫר¼Ò·¢Õ¹µ÷²é£¬È·ÈÏδ¾ÊÚȨµÄµÚÈý·½ÔÚ´ËǰËÄÌìÄÚ½Ó¼ûÁ˲¿ÃŹ«Ë¾ÏµÍ³²¢»ñÈ¡ÄÚ²¿Îļþ¡£Ö»¹ÜBelkѸ¿ì²ÉÈ¡ÏÞ¶ÈÍøÂç½Ó¼û¡¢³ÁÖÃÃÜÂë¡¢³Á½¨ÊÜÓ°Ïì·þÎñÆ÷¼°²¿Êð¼ÓÇ¿¼à¿Ø¹¤¾ßµÈ´ëÊ©£¬µ«²¿ÃÅÔ̺¬Ó×ÎÒÐÅÏ¢µÄÎļþÒѱ»±íй¡£Ä¿Ç°£¬¸Ã¹«Ë¾Õý¹²Í¬·¨Âɲ¿Ãŵ÷²é£¬²¢ÎªÊÜÓ°ÏìÓû§Ìṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØÓëÉí·Ý¸´Ô·þÎñ¡£
https://securityaffairs.com/179958/data-breach/belk-hit-by-may-cyberattack-dragonforce-stole-150gb-of-data.html
5. Konfety Android¶ñÒâÈí¼þʹÓÃÌåʽÃýÎóµÄAPKÌӱܼì²â
7ÔÂ15ÈÕ£¬Òƶ¯°²È«Æ½Ì¨Zimperium½üÈÕ·¢ÏÖKonfety Android¶ñÒâÈí¼þÍÆ³öÐÂÐͱäÖÖ£¬Í¨¹ý»ûÐÎZIP½á¹¹¡¢¼ÓÃܶ¯Ì¬´úÂë¼ÓÔØ¼°APKѹËõ»ìºÏµÈ¶à³Á¼¼Êõ£¬³É¹¦¶ã±Ü´«Í³°²È«¼ì²â¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉGoogle PlayÉϵĺϷ¨ÀûÓã¬ÓÕµ¼Óû§Í¨¹ýµÚÈý·½ÀûÓÃÉ̵êÏÂÔØ£¬ÊµÔò²»¾ß±¸ÈκγÐŵְÄÜ£¬×ª¶øÖ´Ðиæ°×ڲơ¢ÐÅÏ¢ÇÔÈ¡¼°Ç±ÔÚ¶ñÒâÐÐΪ¡£KonfetyµÄÖ÷Ìâ¶ñÒâÖ°ÄÜÔ̺¬£ºÍ¨¹ýCaramelAds SDK¼ÓÔØ°µ²Ø¸æ°×¡¢ÇÔÈ¡Óû§ÒÑ×°ÖÃÀûÓÃÁÐ±í¡¢ÍøÂçÅäÖü°É豸ϵͳÐÅÏ¢£»Í¬Ê±ÀûÓõØÀíΧÀ¸¼¼Êõƾ¾ÝÊܺ¦ÕßËù´¦µØÓòµ÷ÕûÐÐΪģʽ£¬ÀýÈ綨ÏòÍÆËÍÐéαä¯ÀÀÆ÷֪ͨ»òÓÕµ¼×°ÖöñÒâÀûÓá£ÖµÍ×ÌùÐĵÄÊÇ£¬ÆäAPKÎļþÄÚǶ¼ÓÃܵĸ¨ÖúDEXÄ£¿é£¬¸ÃÄ£¿éÔÚÔËÐÐʱ½âÃܲ¢¶¯Ì¬¼ÓÔØ£¬Ô̺¬AndroidManifestÖÐÉêÃ÷µÄ°µ²Ø·þÎñ£¬ÎªºóÐøÖ²Èë¸üΣÏÕÖ°ÄÜÔ¤Áô½Ó¿Ú¡£ÎªÌӱܷÖÎö£¬KonfetyѡȡÈý³Á»ìºÏÕ½Êõ£ºÆäÒ»£¬Í¨¹ýαÔìAPKµÄͨÓÃλ±êÖ¾£¬Îóµ¼¹¤¾ßÒÔΪÎļþÒѼÓÃÜ£¬´¥·¢ÃýÎóÃÜÂëÌáÐÑÒÔÑÓ³¤ÄæÏò¹¤³Ì£»Æä¶þ£¬ÔÚAPKÎļþÖÐÉêÃ÷²»Ö§³ÖµÄBZIPѹËõÌåʽ£¬µ¼ÖÂJADX¡¢APKToolµÈÖ÷Á÷·ÖÎö¹¤¾ß½âÎöʧ°Ü£»ÆäÈý£¬°µ²ØÀûÓÃͼ±êÓëÃû³Æ£¬½µµÍÓû§¾õ²ì·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/android-malware-konfety-uses-malformed-apks-to-evade-detection/
6. ShopifyºÏ¹æ²å¼þConsentik¶³öÊý°ÙÉ̼ÒÃô¸ÐÊý¾Ý
7ÔÂ15ÈÕ£¬Ò»¿îÖ¼ÔÚÔ®ÊÖµçÉÌÆóÒµ×ñÊØÒþÖÔÂÉÀýµÄShopify²å¼þConsentik£¬½üÆÚ±»ÆØ´æÔÚÑϳÁ°²È«·ì϶£¬µ¼ÖÂÊý°Ù¼ÒÔÚÏßÉ̵êµÄÃô¸ÐÊý¾ÝÔÚ»¥ÁªÍøÉϹ«¿ªÂ¶³ö³¤´ïËĸöÔ¡£Õâ¿îÓÉÔ½ÄÏ¿ª·¢¹«Ë¾OmegathemeÍÆ³öµÄ¹¤¾ß£¬Ëä»ñµÃShopify¹Ù·½"רΪShopify´òÔì"ÈÏÖ¤²¢Õ¼ÓÐ4.9ÐÇ¸ßÆÀ¼¶£¬È´ÒòÅäÖò»µ±µÄKafka·þÎñÆ÷£¬½«ÊµÊ±ÍøÕ¾·ÖÎöÊý¾Ý¡¢ShopifyÖÎÀíԱƾ֤¼°Facebook¸æ°×ÁîÅÆµÈ¹Ø¼üÐÅϢ¶³ö¸øÈκÎͨ´ïÆðÔ´µÄ½Ó¼ûÕß¡£Consentik²å¼þµÄÖ÷ÌâÖ°ÄÜÊÇÏò¿Í»§ÍøÕ¾Ôö³¤CookieÔ޳ɺá·ù£¬ÐÖúÉ̼ÒÂú×ãGDPR¡¢LGPDºÍCCPAµÈÒþÖԺϹæÒªÇó¡£È»¶ø£¬×êÑÐÍŶӷ¢ÏÖ£¬Æäºó¶Ü·þÎñÆ÷δÉèÖýӼûÏÞ¶È£¬µ¼ÖÂÔ̺¬ShopifyÓ×ÎÒ½Ó¼ûÁîÅÆºÍFacebookÉí·ÝÑéÖ¤ÁîÅÆµÄÊý¾Ý³ÖÐøÐ¹Â¶¡£ÕâЩƾ֤Èô±»¶ñÒâÀûÓ㬹¥»÷Õß¿ÉÄÜÒÔÖÎÀíԱȨÏÞÊÕÊܵçÉ̵êÆÌ£¬Ö´ÐÐÅú¸Ä¼ÛÖµ¡¢×¢Èë¶ñÒâ´úÂë¡¢ÇÔÈ¡¿Í»§Êý¾Ý£¬ÉõÖÁÓô¹µöÒ³Ãæ´úÌæÕý°æµêÃæµÈ²Ù×÷¡£´Ë±í£¬Facebook´ú±ÒµÄй¶»¹¿ÉÄÜʹÉ̼Ҹæ°×ÕË»§±»½Ù³Ö£¬Ôì³ÉÔ¤ËãËðºÄºÍÆ·ÅÆÐÅÀµÎ£»ú¡£Õâ´ÎÊÂÎñÓ°ÏìÁìÓò¿í·º£¬ÉæÊµÊ±ÉÓ×¢»¯×±Æ·¡¢½¡ÉíºÍÏû·Ñµç×ӵȶà¸öÁìÓòµÄÔÚÏßÉ̵ꡣ
https://cybernews.com/security/shopify-plugin-consentik-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ