Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©¸øÁ´¹¥»÷
°ä²¼¹¦·ò 2025-11-041. Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©¸øÁ´¹¥»÷
11ÔÂ2ÈÕ£¬½üÈÕ£¬Open VSX×¢²á±íÒò¿ª·¢ÕßÒâ±íй¶½Ó¼ûÁîÅÆ£¬µ¼ÖÂÍþвÐÐΪÕßÌáÒ鹩¸øÁ´¹¥»÷£¬ÔÚ¹«¹²´æ´¢¿âÖа䲼¶ñÒâÀ©´ó·¨Ê½¡£Á½ÖÜǰ£¬Wiz×êÑÐÈËÔ±·¢ÏÖMicrosoft VSCodeºÍOpen VSXÊг¡Öг¬550¸ö»úÃÜÐÅÏ¢Ôâй¶£¬²¿ÃŰÂÃØ¿É½Ó¼ûÏÂÔØÁ¿´ï15Íò´ÎµÄÏîÄ¿£¬Ê¹¹¥»÷ÕßÄÜÉÏ´«¶ñÒâÀ©´ó£¬×é³ÉÑϳÁ¹©¸øÁ´·çÏÕ¡£Open VSXÓÉEclipse»ù½ð»á¿ª·¢£¬ÊÇ΢ÈíVisual Studio MarketplaceµÄ¿ªÔ´´úÌæ¹æ»®£¬ÎªVS Code IDE¼°¼æÈÝ·ÖÖ§ÌṩÀ©´óÖ§³Ö¡£Õâ´ÎÊÂÎñÖУ¬Ð¹Â¶µÄÁîÅÆ±»ÓÃÓÚÃûΪ"GlassWorm"µÄ¶ñÒâÈí¼þ¹¥»÷£¬¸ÃÈí¼þÀûÓò»Ë½¼ûUnicode×Ö·û°µ²Ø×Ô´«²¼¶ñÒâ´úÂ룬ÊÔͼÇÔÈ¡¿ª·¢ÕßÍ´´¦²¢ÔڿɽӼûÏîÄ¿ÖÐÒý·¢¼¶Áª·ì϶£¬Ö¸±êÖ±Ö¸49¸öÀ©´ó·¨Ê½µÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬¶¯»úÒÉËÆ¾¼ÃÀûÒæ¡£½ØÖÁ10ÔÂ21ÈÕ£¬ËùÓжñÒâÀ©´óÒѱ»É¾³ý£¬ÓйØÁîÅÆÊµÏÖÂÖ»»»ò³·Ïú£¬ÊÂÎñÒÑÆëÈ«½ÚÔ졣Ȼ¶ø£¬Íþв²¢Î´ÖÕÖ¹¡£×êÑÐÈËÔ±·¢ÏÖ£¬GlassWorm±³ºóµÄͳһÍþвÐÐΪÕßÒÑ×ªÒÆÖÁGitHub£¬Ê¹ÓÃÒ»ÑùUnicodeÒþдÊõ¼¼Çɰµ²Ø¶ñÒâÔØºÉ£¬¹¥»÷ÁìÓòÀ©´óÖÁ¶à¸öJavaScriptÏîÄ¿´úÂë¿â¡£
https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/
2. ÐÂÐÍHttpTroyºóÃÅ·¨Ê½Õë¶Ôº«¹ú·¢Æð¶¨ÏòÍøÂç¹¥»÷
11ÔÂ3ÈÕ£¬½üÆÚ£¬Ó볯ÏʹØÁªµÄÍþвÐÐΪÕßKimsuky¼°Lazarus Group³ÖÐø¸üÐÂÆä¹¥»÷±øÆ÷¿â£¬Õ¹Ê¾¼¼ÊõÑݽøÇ÷Ïò¡£¾ÝGen Digital¹«Ë¾Åû¶£¬KimsukyÕë¶Ôº«¹úµ¥Ò»Ö¸±êÌáÒé´¹µö¹¥»÷£¬Í¨¹ý¼Ù×°³ÉVPNÕ˵¥µÄZIPѹËõÎļþ·Ö·¢ÐÂÐͺóÃÅ·¨Ê½¡°HttpTroy¡±¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈý½×¶Î¹¥»÷Á´Ö´ÐУº³õʼΪGo˵»°¶þ½øÔìÎļþ£¨ÄÚǶ¼Ù×°PDFÎĵµÒÔ½µµÍÊܺ¦Õß¾¯Ì裩£¬ËæºóÆô¶¯MemLoad¼ÓÔØ·¨Ê½³ÉÁ¢Óƾû¯»úÔ죬×îÖÕ²¿ÊðHttpTroyºóÃÅ¡£¸ÃºóÃÅÖ§³ÖÎļþ´«Êä¡¢½ØÆÁ¡¢¸ßȨÏÞºÅÁîÖ´ÐÓ×¢·´ÏòShell³ÉÁ¢µÈÖ°ÄÜ£¬Í¨¹ýHTTP POSTÓëC2·þÎñÆ÷ͨѶ£¬²¢Ñ¡È¡¶à²ã»ìºÏ¼¼Êõ¶ã±Ü¼ì²â¡£Í¬Ê±£¬Lazarus GroupÕë¶Ô¼ÓÄôóÁ½ÃûÊܺ¦ÕßÌáÒé¹¥»÷£¬²¿Êð¡°Comebacker¡±¶ñÒⷨʽ¼°ÆäÉý¼¶°æ¡°BLINDINGCAN¡±Ô¶³Ì½Ó¼ûľÂí¡£¹¥»÷Á´Öжα»¼ì²âµ½£¬³õʼ½Ó¼ûõè¾¶´§Ä¦Îª´¹µöÓʼþ¡£Comebacker´æÔÚDLLÓëEXEÁ½ÖÖ±äÌ壬ǰÕßͨ¹ýWindows·þÎñÆô¶¯£¬ºóÕß¾cmd.exeÖ´ÐУ¬×îÖÕ½âÃܲ¢²¿ÊðBLINDINGCAN£¬ºóÕßÓëC2·þÎñÆ÷ͨѶ£¬Ö§³ÖÎļþ²Ù×÷¡¢¹ý³ÌÖÎÀí¡¢½ØÆÁ¡¢ºÛ¼£¶Ï¸ùµÈ²Ù×÷¡£
https://thehackernews.com/2025/11/new-httptroy-backdoor-poses-as-vpn.html
3. ºÚ¿Í´ÓBalancer DeFi¼ÓÃܺÍ̸ÇÔÈ¡³¬¹ý1.2ÒÚÃÀÔª
11ÔÂ3ÈÕ£¬»ùÓÚÒÔÌ«·»µÄDeFiºÍ̸BalancerµÄV2¿É¶Ñ·Ê²»±ä³ØÔâ·ê³Á´óºÚ¿Í¹¥»÷£¬Ëðʧ³¬1.28ÒÚÃÀÔª£¬³ÉΪ½ñÄê¶È×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸Ö®Ò»¡£Balancer×÷Ϊ×Ô¶¯×öÊÐÉ̺ÍÁ÷¶¯ÐÔ»ù´¡ÉèÊ©£¬Ö§³Ö×Ô½ç˵´ú±Ò×éºÏ£¬ÆäV2³Ø´ËǰÒѽÓÊÜ11´Î°²È«É󼯣¬µ«ÈÔÒòDZÔÚ·ì϶±»ÀûÓá£ÊÂÎñ²úÉúºó£¬BalancerÍŶÓѸ¿ìÓë¶¥¼â°²È«×êÑлú¹¹ºÏ×÷µ÷²é£¬²¢ÖÒ¸æÓû§¾¯Ìè´¹µö·çÏÕ¡£·ì϶³ÉÒò´æÔÚÁ½ÖÖÖ÷Á÷´§Ä¦£ºÆäÒ»£¬GoPlus SecurityÖ¸³öV2½ð¿âµÄ»¥»»ÍÆËã´æÔÚ¾«¶ÈÉáÈëÎó²î£¬Ã¿´Î¶Ò»»²Ù×÷ÏòÏÂÈ¡Õû´ú±ÒÊýÁ¿£¬¹¥»÷Õßͨ¹ýbatchSwapº¯Êý·´¸´¶Ò»»£¬ÀÛ»ý΢Óײî¾àµ¼Ö¼ÛֵŤÇú£»Æä¶þ£¬°²È«×êÑÐÔ±Aditya BajajÒÔΪ£¬¶ñÒâºÏÔ¼ÔÚ×Ê½ð³Ø³õʼ»¯½×¶Î°Ñ³Ö½ð¿âŲÓã¬Èƹý°²È«´ëÊ©£¬ÊµÏÖ¿ç³ØÎ´¾ÊÚȨµÄÓà¶î°Ñ³Ö¡£Ö»¹Ü¼¼Êõϸ½ÚÉÐδÆëÈ«Ã÷È·£¬Balancer³Ðŵ½«°ä²¼ÆëÈ«¹ýºó·ÖÎö¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ÊÂÎñ²úÉúºó£¬Ú¿ÆÕß¼ÙÒâBalancerÏòºÚ¿ÍÌáÒé¡°°×ñÉͽ𡱽»É棬Ðû³ÆÈôËÍ»¹×ʽð¿É»ñ20%ÉâÃ⣬²»È»½«½áºÏÇø¿éÁ´È¡Ö¤»ú¹¹¡¢·¨Âɲ¿Ãż°¼à¹ÜºÏ×÷ͬ°é£¬Í¨¹ýIPµØÖ·¡¢ASNÏνÓÈÕÖ¾ºÍÁ´ÉÏÂòÂô¹¦·ò´Á¼ø±ð¹¥»÷ÕßÉí·Ý¡£
https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/
4. SesameOp¶ñÒâÈí¼þÀÄÓÃOpenAI Assistants APIÌáÒé¹¥»÷
11ÔÂ3ÈÕ£¬Î¢Èí°²È«ÍŶÓÔÚ2025Äê7Ôµ÷²éÍøÂç¹¥»÷ʱ£¬·¢ÏÖÃûΪSesameOpµÄÐÂÐͺóÃŶñÒâÈí¼þ£¬¸ÃÈí¼þͨ¹ýÀÄÓÃOpenAI Assistants API×÷ΪÒñ±ÎµÄºÅÁîÓë½ÚÔ죨C2£©Í¨Â·£¬ÊµÏÖ¹¥»÷Õß¶ÔÊÜϰȾ»·¾³µÄ³Ö¾Ã³ÖÐø½Ó¼û¡£Çø±ðÓÚ´«Í³ÒÀÀµ¶ñÒâ»ù´¡ÉèÊ©µÄ¹¥»÷·½Ê½£¬SesameOpÀûÓúϷ¨ÔÆ·þÎñ½øÐÐÔ¶³ÌÖÎÀí£¬ÓÐЧ¶ã±ÜÁËÊܺ¦Õß¾¯±¨¼°ÊÂÎñÏìÓ¦ÆÚ¼äµÄ¼ì²â·çÏÕ¡£¾Ý΢ÈíDARTÍŶӻ㱨£¬SesameOpºóÃÅ×é¼þ½«OpenAI Assistants API×÷Ϊ´æ´¢ºÍÖм̻úÔ죬»ñȡѹËõ¼ÓÃܵÄÖ¸Áîºó½âÃÜÖ´ÐУ»Í¬Ê±£¬¹¥»÷ÖÐÍøÂçµÄÐÅϢͨ¹ý¶Ô³ÆÓë·Ç¶Ô³Æ¼ÓÃܽáºÏµÄ·½Ê½£¬¾Í³Ò»APIͨ·»Ø´«¹¥»÷Õß¡£¸Ã¶ñÒâÈí¼þ¹¥»÷Á´Ô̺¬¸ß¶È»ìºÏµÄ¼ÓÔØÆ÷ºÍ»ùÓÚ.NETµÄºóÃÅ·¨Ê½£¬ºóÕßͨ¹ý.NET AppDomainManager×¢Èëµ½Microsoft Visual Studio¹¤¾ßÖУ¬½áºÏÄÚ²¿Web Shell¼°¡°Õ½ÊõÐÔ²¿Ê𡱵ĶñÒâ¹ý³Ì³ÉÁ¢ÓƾÃÐÔ£¬Ö§³Ö³Ö¾Ã¼äµý»î¶¯¡£Î¢ÈíÇ¿µ÷£¬Õâ´Î¹¥»÷²¢·ÇÀûÓÃOpenAIƽ̨·ì϶»òÅäÖÃÃýÎ󣬶øÊÇÀÄÓÃAssistants APIµÄÄÚÖÃÖ°ÄÜ¡£Î¢ÈíÓëOpenAIÒѺÏ×÷¼ø±ð²¢½ûÓù¥»÷ÖÐʹÓõÄÕË»§¼°APIÃÜÔ¿¡£
https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/
5. È«Çò»õÔËÐÐÒµÔâRMM¹¤¾ß¹¥»÷Òý·¢¹©¸øÁ´ÍµÇÔΣ»ú
11ÔÂ3ÈÕ£¬½üÆÚ£¬Õë¶Ô»õÔ˾¼ÍÈ˺Ϳ¨³µÔËÊ乫˾µÄÍøÂç¹¥»÷³öÏÖ¹æÄ£»¯Ç÷Ïò¡£¾ÝProofpoint×êÑУ¬×Ô2025Äê1ÔÂÆð£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÁ´½ÓºÍ´¹µöÓʼþ³ÖÐø²¿ÊðÔ¶³Ì¼à¿ØÖÎÀí£¨RMM£©¹¤¾ß£¨ÈçScreenConnect¡¢SimpleHelpµÈ£©£¬ÔÚ±±ÃÀ¡¢°ÍÎ÷¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢µÂ¹ú¡¢ÖÇÀû¼°ÄÏ·ÇµÈ¶àµØÖ´Ðй¥»÷¡£½ö8ÔÂÒÔÀ´ÒѼͼ½ü24Æð»î¶¯£¬µ¥´Î¹¥»÷×î¶à·¢ËÍ1000ÌõÐÅÏ¢¡£¹¥»÷Õßѡȡ˫³ÁÉøÈëÕ½Êõ£ºÒ»·½ÃæÀûÓñ»µÁ»õÔËÆ½Ì¨ÕË»§°ä²¼ÐéØÍÆ·ÔËÐÅÏ¢£¬ÁíÒ»·½ÃæÈëÇÖ»õÔ˾¼ÍÈ˼°µ÷¶ÈÔ±ÓÊÏ䣬½Ù³ÖÓʼþÏß³ÌÓÕµ¼Êܺ¦Õß½Ó¼ûαÔìÒ³Ãæ¡£ÕâÐ©Ò³ÃæÍ¨¹ý¾«×¼¸´ÔìÔËÓªÉÌÆ·ÅƱêʶ¼ÓÇ¿¿ÉÐŶȣ¬ÓÕÆÓû§ÏÂÔØ.exe»ò.msiÎļþ×°ÖÃRMM¹¤¾ß¡£Ò»µ©³É¹¦²¿Ê𣬹¥»÷Õß¼´¿ÉÆëÈ«½ÚÔìϵͳ£¬ÊµÏÖÅú¸ÄÔËÊä·Ïß¡¢ÆÁ±Îµ÷¶È֪ͨ¡¢¼ÙÒâºÏ·¨³ÐÔËÈ˵ȲÙ×÷£¬×îÖսٳָ߼ÛÖµ»õÎÈçʳƷ¡¢µç×Ó²úÆ·£©²¢×ªÊÛ»ò×ß˽¡£
https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/
6. ÈÕ±¾AskulÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶£¬¹©¸øÁ´Êܲ¨¼°
11ÔÂ3ÈÕ£¬ÈÕ±¾°ì¹«¼°¼Ò¾ÓÓÃÆ·ÁãÊÛÉÌAskul½üÈÕ֤ʵ£¬10Ô³õÔâ·êÀÕË÷Èí¼þ¹¥»÷ºó£¬¿Í»§Ó빩¸øÉÌÊý¾ÝÔâй¶£¬Æäµç×ÓÉÌÎñƽ̨ÔËÓªÖжϡ£Õâ´ÎÊÂÎñ²¨¼°ÆìÏÂÍøµê£¨Askul¡¢Lohaco¡¢Soloel Arena£©£¬Ð¹Â¶ÄÚÈÝÔ̺¬Óû§ÁªÏµ·½Ê½¡¢Ñ¯ÅÌÏêÇé¼°´æ´¢ÓÚÄÚ²¿·þÎñÆ÷µÄ¹©¸øÉÌÊý¾Ý¡£AskulÔÚÉêÃ÷ÖÐÖÂǸ£¬³ÆÕýµ÷²éRansomHouse×éÖ¯Ðû³ÆµÄ1.1TBÊý¾ÝÇÔÈ¡ÊÂÎñ¡£¹¥»÷Ó°ÏìÑÓ³¤ÖÁ¹©¸øÁ´ºÏ×÷ͬ°é£ºÒÀÀµAskulÎïÁ÷ÍøÂçµÄÈÕ±¾´óÐÍÁãÊÛÉÌÁ¼Æ·´òË㣨¾ÓªÎÞÓ¡Á¼Æ·Muji£©ºÍThe LoftËäδÃ÷È·×ÔÉíÊý¾ÝÊÇ·ñй¶£¬µ«¹©¸øÁ´ÒÑÊÜÇÖÈÅ¡£RansomHouse×éÖ¯ÒÔ¡°²»¼ÓÃܽöÍþв¹«¿ªÊý¾Ý¡±µÄÀÕË÷¼¿Á©ÎÅÃû£¬×Ô¿ä¡°ÕýÒåÁ¦Á¿¡±ÒԸ淢ÆóÒµ·ì϶¡£¸Ã×éÖ¯³ÉÁ¢ÓÚ2022Äê3Ô£¬ÍøÂ簲ȫ×êÑÐÒѽ«ÆäÓë¶íÂÞ˹¹ØÁªµÄÍþвÐÐΪÕߣ¨ÈçAlphv/BlackCat¡¢LockBit 3.0¡¢RagnarLocker£©¹Ò¹³¡£
https://therecord.media/askul-confirms-data-breach-ransomware-incident


¾©¹«Íø°²±¸11010802024551ºÅ