Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ

Ðû²¼Ê±¼ä 2025-03-28

1. Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ


3ÔÂ27ÈÕ £¬×÷Ϊ΢Èí365Éú̬µÄÆóÒµ¼¶ÊÓÆµ·þÎñ £¬Microsoft Stream¾­µä°æÓÚ2020ÄêÆô¶¯Ç¨áãÖÁSharePoint £¬Ô­ÓòÃûmicrosoftstream.com°´ÍýÏëÓ¦ÓÚ2024ÄêÖÜÈ«ÍËÒÛ¡£È»¶ø2025Äê3Ô £¬¸ÃÓòÃûÍ»ÔâÐ®ÖÆ £¬¹¥»÷Õ߸͝DNSÆÊÎöʹÆäÖ¸Ïò·ÂðÑÇÂíÑ·½çÃæµÄÌ©¹ú¶Ä³¡´¹ÂÚÒ³Ãæ £¬µ¼ÖÂÈÔǶÈë¾É°æÊÓÆµÁ´½ÓµÄSharePointÒ³Ãæ±»À¬»øÄÚÈÝÎÛȾ¡£ÊÖÒÕÊÓ²ìÏÔʾ £¬ÓòÃû×¢²áÐÅÏ¢ÓÚÊ·¢µ±ÈÕ±»²»·¨ÐÞ¸Ä £¬¹¥»÷Õß¿ÉÄÜͨ¹ýÉç»á¹¤³Ìѧ»òÎó²îʹÓûñÈ¡¿ØÖÆÈ¨¡£Ö»¹Ü΢ÈíÒѽôÆÈ¹Ø±ÕÓòÃûÆÊÎö £¬µ«´Ë´ÎÊÂÎñ¶ÔÓû§µÄDZÔÚΣº¦½ûÖ¹ºöÊÓ£ºÆóÒµÄÚÍøÓû§¿ÉÄÜÒò»á¼û±»Ð®ÖÆÒ³Ãæµ¼ÖÂÃô¸ÐÊý¾Ýй¶ £¬¶øSharePointÉú̬ÖвÐÁôµÄǶÈëÁ´½Ó¸ü³ÉΪһÁ¬Íþв¡£ÖµµÃ×¢ÖØµÄÊÇ £¬¹¥»÷Õßδ½øÒ»²½Ö²Èë¶ñÒâÈí¼þ £¬Ö÷ҪΣº¦¼¯ÖÐÔÚÍøÂç´¹ÂÚ²ãÃæ¡£Ç徲ר¼ÒÖ¸³ö £¬´ËÀàÊÂÎñ·´Ó¦³öÆóÒµ¶ÔÍËÒÛÓòÃû´¦Öóͷ£µÄÆÕ±éÊè©£ºÊµÊ±¸üÐÂǶÈë×ÊÔ´¡¢È±·¦DNS¼à¿Ø»úÖÆ¡¢Î´°²ÅÅDNSSEC·À»¤µÈÎó²î £¬¶¼¿ÉÄܱ»¹¥»÷ÕßʹÓÃʵÑéÖÐÐÄÈ˹¥»÷¡£


https://www.bleepingcomputer.com/news/microsoft/hijacked-microsoft-stream-classic-domain-spams-sharepoint-sites/


2. ¡¶°×Ñ©¹«Ö÷¡·Î´ÉÏÏßDisney+ £¬µÁ°æÏÝÚåDZÔÚ¶ñÒâÈí¼þ


3ÔÂ27ÈÕ £¬µÏÊ¿ÄáÕæÈ˰桶°×Ñ©¹«Ö÷¡·Î´Í¨¹ýµÏÊ¿Äá×ÔÓÐÁ÷ýÌåÆ½Ì¨Disney+¿¯ÐÐ £¬ÆÈʹ²¿·Ö¹ÛÖÚתÏòµÁ°æÇþµÀ £¬È´Òò´ËÏÝÈëÍøÂçÕ©Æ­ÏÝÚå¡£ÍøÂçÇå¾²¹«Ë¾VeritiÅû¶ £¬Õ©Æ­·Ö×ÓʹÓÃӰƬδÉÏÏßÕý¹æÆ½Ì¨µÄ¿ÕµµÆÚ £¬ÔÚ"TeamEsteem"ÍøÕ¾Ðû²¼ÐéᲩ¿Í £¬Î±×°³É¹Ù·½×ÊÔ´Ìṩ2025°æ¡¶°×Ñ©¹«Ö÷¡·µÁ°æÏÂÔØ¡£¸Ã´ÅÁ¦ÖÖ×ÓÁ´½Ó¿´ËÆÕýµ± £¬ÊµÔòÀ¦°ó¶ñÒâÈí¼þ¡£ÒÑÓÐ45ÃûÓû§ÏÂÔØ²¢Èö²¥¸ÃÖÖ×ÓÎļþ £¬ÆäÖаüÀ¨Î±×°³ÉÊÓÆµ±à½âÂëÆ÷µÄ"xmph_codec.exe"³ÌÐò¡£Ò»µ©Ö´ÐÐ £¬¸Ã³ÌÐò½«ÊµÑé¶àÖØ¶ñÒâ²Ù×÷£ºÊ×ÏȽûÓÃWindows DefenderµÈÇå¾²·À»¤ £¬ËæºóÖ²Èë±»50¿îÇå¾²¹¤¾ß±ê¼ÇΪ¶ñÒâµÄÎļþ £¬²¢¾²Ä¬×°ÖÃTORä¯ÀÀÆ÷½¨Éè°µÍøÍ¨Ñ¶Í¨µÀ £¬×îÖÕʹװ±¸Ì»Â¶ÓÚÊý¾Ý͵ÇÔºÍÀÕË÷Èí¼þ¹¥»÷Σº¦ÖС£¹¥»÷Õß¿ÉÄÜͨ¹ýÁ½ÖÖ·½·¨ÈëÇÖTeamEsteem¹ÙÍø£ºÒ»ÊÇʹÓÃYoast SEO²å¼þ¾É°æ±¾Îó²î£¨CVE-2023-40680£© £¬¶þÊÇ͵ȡÖÎÀíԱƾֱ֤½ÓÐû²¼ÐéαÄÚÈÝ¡£Ç徲ר¼Ò½¨Òé £¬¹ÛÖÚÓ¦×èÖ¹ÏÂÔØÈªÔ´²»Ã÷µÄµÁ°æÄÚÈÝ £¬°´ÆÚ¸üз´¶ñÒâÈí¼þ £¬²¢¶ÔÒªÇó×°ÖÃÌØÊâ±à½âÂëÆ÷µÄ¿ÉÒÉÎļþ¼á³ÖСÐÄ £¬ÒÔ·ÀÂäÈëÍøÂç·¸·¨ÏÝÚå¡£


https://hackread.com/fake-snow-white-movie-torrent-infects-device-malware/


3. COPAÊý¾Ýй¶ÊÂÎñ²¨¼°Á½Öݽü68,000Ãû»¼ÕßÃô¸ÐÐÅÏ¢


3ÔÂ27ÈÕ £¬È¥Äê11Ô £¬ºÚ¿Í×éÖ¯Everest Team½«ÃÀ¹ú¹Ç¿ÆÒ½ÁÆ»ú¹¹Concord Orthopaedics£¨COPA£©ÁÐÈë°µÍøÐ¹ÃÜÍøÕ¾ £¬Ðû³ÆÕÆÎÕÆä×Ô2018ÄêÆðµÄËùÓл¼ÕßÒ½ÁƼͼ¼°Ð¡ÎÒ˽¼ÒÊý¾Ý £¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢Ô¤Ô¼ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÏêÇé¼°²¿·Ö¼ÝʻִÕÕͼÏñ¡£¸Ã»ú¹¹ÓÚ2025Äê3ÔÂ25ÈÕÏòÊÜÓ°ÏìÕß¼ÄËÍÊéÃæÍ¨Öª £¬È·ÈÏÆä»¼Õß¹ÒºÅÓëԤԼϵͳ¹©Ó¦ÉÌÔâÍøÂçÈëÇÖ £¬µ«Ç¿µ÷ÄÚ²¿ÇéÐÎδÊÜÓ°Ï졣ƾ֤COPAͨ¸æ £¬Ð¹Â¶Ô´Í·ÎªµÚÈý·½¹©Ó¦É̵ÄÈí¼þÎó²î £¬ÍâйÊý¾ÝÀàÐͺ­¸ÇÔ¤Ô¼¼Í¼£¨ÈçÊÖÊõÀàÐÍ¡¢Ò½ÉúÐÕÃû¡¢ÈÕÆÚËùÔÚ£©¡¢¿µ½¡°ü¹ÜÐÅÏ¢£¨º¬ÊÜÒæÈ˱àºÅ¡¢°ü¹Ü×ʸñ£©¼°²¿·ÖÉí·ÝÎļþ¡£¹©Ó¦ÉÌÓÚ2025Äê1ÔÂ28ÈÕÏòCOPAÌṩDZÔÚÓ°ÏìÊý¾Ý¹æÄ£¡£Ðº±²¼Ê²¶ûÖÝ×ÜÉó²é³¤°ì¹«ÊÒÅû¶ £¬¸ÃÖݹ²ÓÐ67,835ÃûסÃñÐÅÏ¢ÉæÏÕ £¬ÂíÈøÖîÈûÖÝÉÐÓÐ1,517ÈËÊÜÓ°Ïì¡£ÖµµÃ×¢ÖØµÄÊÇ £¬EverestÐû²¼µÄ2.9GBй¶Êý¾Ý°üÏÖʵ°üÀ¨2019-2024Äê¼ä¸üÆÕ±éµÄ»¼ÕßÐÅÏ¢ £¬ÇÒDataBreaches·¢Ã÷¹©Ó¦ÉÌ·þÎñÆ÷´æ´¢´ó×Úδ¼ÓÃÜÃô¸ÐÊý¾Ý £¬°üÀ¨Áè¼Ý3ÍòÕżÝÕÕͼÏñ¼°ÆäËûCSVÃûÌÃÒ½ÁƼͼ £¬Ê±¼ä¿ç¶ÈÔ¶³¬ºÚ¿Í×î³õÉù³ÆµÄ2018Äê¡£


https://databreaches.net/2025/03/27/four-months-after-learning-of-a-vendors-breach-concord-orthopaedics-notifies-almost-68000-patients/


4. Vroom by YouXÒòAWSÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶


3ÔÂ27ÈÕ £¬°Ä´óÀûÑǽðÈڿƼ¼¹«Ë¾Vroom by YouX½üÆÚÔâÓöÃô¸ÐÊý¾Ýй¶ÊÂÎñ £¬Çå¾²Ñо¿Ô±Jeremiah FowlerÔÚ¹ûÕæ¿É»á¼ûµÄAmazon S3´æ´¢Í°Öз¢Ã÷°üÀ¨27,000Ìõ¼Í¼µÄÎÞ±£»¤Êý¾Ý¿â £¬Ð¹Â¶ÐÅÏ¢º­¸Ç¼ÝÕÕ¡¢Ò½ÁƼͼ¡¢¾Íҵ֤ʵ¼°º¬²¿·ÖÐÅÓÿ¨ºÅµÄÒøÐжÔÕ˵¥µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£¸üÁîÈ˵£ÐĵÄÊÇ £¬ÄÚ²¿½ØÍ¼ÏÔʾ±£´æÉúÑÄ320Íò·ÝÎĵµµÄMongoDBʵÀý £¬Æä̻¶״̬¿ÉÄÜÐγÉÍøÂç¹¥»÷ÐÂÈë¿Ú¡£ÊÂÎñÆØ¹âºó £¬VroomѸËÙÏÞÖÆÊý¾Ý¿â»á¼ûȨÏÞ £¬ÈÏ¿ÉÇå¾²Îó²î²¢ÔÊÐí¿ªÕ¹ÊºóÉó²é¡£×÷ΪÈ˹¤ÖÇÄÜÇý¶¯µÄÆû³µÈÚ×ÊÆ½Ì¨ £¬¸Ã¹«Ë¾×Ô2022ÄêÔËÓªÒÔÀ´Ò»Á¬´¦Öóͷ£´ó×Ú¿Í»§Ãô¸ÐÐÅÏ¢ £¬´Ë´Îй¶¼Í¼ʱ¼ä¿ç¶È´ïÈýÄê £¬Í¹ÏÔÊý¾Ý´¦Öóͷ£»·½ÚµÄÇå¾²Òþ»¼¡£Ç徲ר¼ÒÖ¸³ö £¬´ËÀàÐÅϢй¶½«Ö±½Óµ¼ÖÂڲƭΣº¦¼¤Ôö £¬°üÀ¨Éç»á¹¤³Ì¹¥»÷¡¢ÐéαÕË»§¿ªÉè¼°¾«×¼ÍøÂç´¹Âڵȡ£ÆóÒµÓ¦½ÓÄÉMFAÉí·ÝÑéÖ¤¡¢RBACȨÏÞÖÎÀí¡¢¼ÓÃÜ´«ÊäÓë´æ´¢µÈ½¹µã²½·¥ £¬ÍŽáCloudTrailµÈ¼à¿Ø¹¤¾ßʵÏÖÍþвʵʱԤ¾¯ £¬°´ÆÚ¿ªÕ¹ÉøÍ¸²âÊÔÐÞ²¹Èõµã £¬ÐÞ½¨È«ÉúÃüÖÜÆÚÇå¾²·À»¤Á´Ìõ¡£


https://hackread.com/aussie-fintech-vroom-pii-records-aws-misconfiguration/


5. CoffeeLoader¶ñÒâÈí¼þʹÓÃÁ¢ÒìÊÖÒÕ¹æ±Ü¼ì²âÍþвWindowsÓû§


3ÔÂ27ÈÕ £¬ÐÂÐͶñÒâÈí¼þ¼Ò×å"CoffeeLoader"Õý¶ÔWindowsÓû§×é³ÉÑÏÖØÍþв £¬Æä¸ß¶ÈÒþ²ØÐÔʹµÃ¹Å°å·À²¡¶¾Èí¼þÄÑÒÔ¼ì²â¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÉZscalerÇå¾²ÍŶÓÓÚ2024Äê9Ô·¢Ã÷ £¬Æä¹¥»÷Á´Ê¼ÓÚαװ³É»ªË¶Armoury Crateϵͳ¹¤¾ß £¬ÓÕµ¼Óû§ÏÂÔØºóÖ²ÈëÐÅÏ¢ÇÔÈ¡Ä £¿é £¬ÒÑÖª¿É´îÔØRhadamanthysµÈ¸ßΣÇÔÃܳÌÐò¡£CoffeeLoaderÕ¹ÏÖ³ö¶àά¶È¹æ±Ü¼ì²âÊÖÒÕ£º½ÓÄÉArmoury Packer¼Ó¿ÇÊÖÒÕʵÑé³õʼÓÕÆ­ £¬¸üÁ¢ÒìµØ½«²¿·Ö¶ñÒâ´úÂë×ªÒÆÖÁGPUÖ´ÐÐ £¬Ê¹ÓÃÇå¾²Èí¼þ¶ÔͼÐδ¦Öóͷ£Æ÷µÄ¼à²âÃ¤ÇøÊµÏÖºã¾ÃDZÔÚ¡£ÆäŲÓÿÍÕ»¸ÄÏÂÊÖÒÕ¿ÉαÔ캯ÊýŲÓÃÁ´ £¬Ê¹Çå¾²ÆÊÎö¹¤¾ßÎóÅгÌÐòÐÐΪÊôÐÔ¡£µ±¼ì²âµ½Ç徲ɨÃèʱ £¬¸Ã¶ñÒâÈí¼þ»áÆô¶¯"˯Ãß»ìÏý"»úÖÆ £¬½«×ÔÉí¼ÓÃÜ´æ´¢ÓÚÄÚ´æ·Ç»îÔ¾Çø¶Î £¬ÓÐÓÃÌÓ±Üʵʱ¼ì²â¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬CoffeeLoader´´Á¢ÐÔµØÊ¹ÓÃWindows FibersÇáÁ¿¼¶Ïß³ÌÊÖÒÕʵÑéÀú³ÌÄÚ¶àʹÃüµ÷Àí £¬ÕâÖַDZê×¼Ïß³ÌÖÎÀí·½·¨ÍùÍùÈÆ¹ýͨÀý¼à¿ØÏµÍ³¡£Í¨¹ýÕâÖÖ¸´ºÏʽÌÓÒÝÕ½ÂÔ £¬¸Ã¶ñÒâÈí¼þÄÜÔÚÄ¿µÄϵͳºã¾ÃפÁô £¬Ò»Á¬Ö´ÐÐδ¾­ÊÚȨµÄÊý¾ÝÊÕÂÞ»òºáÏòÉøÍ¸µÈ¶ñÒâ²Ù×÷¡£Ç徲ר¼Ò½¨ÒéÔöÇ¿ÖÕ¶ËÐÐΪ¼à¿Ø £¬°²ÅÅ»ùÓÚGPUÔ˶¯ÆÊÎöµÄ¼ì²â¼Æ»® £¬²¢°´ÆÚÑé֤ϵͳ¹¤¾ßµÄÍêÕûÐÔÒÔÌá·À´ËÀà¸ß¼¶Ò»Á¬ÐÔÍþв¡£


https://cybernews.com/security/coffeeloader-malware-asus-windows/


6. Ê®¿înpm°üÔâ¶ñÒâ¸Ä¶¯ £¬¼ÓÃÜÇ®±Ò¿ª·¢ÕßÃô¸ÐÊý¾Ý±»ÍµÈ¡


3ÔÂ27ÈÕ £¬¿ËÈÕ £¬Ê®¿înpmÈí¼þ°üÍ»·¢¶ñÒâ´úÂëÖ²ÈëÊÂÎñ £¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¿ª·¢ÕßʵÑ鹩ӦÁ´¹¥»÷¡£Çå¾²³§ÉÌSonatypeµÄÑо¿Ô±°¢À°£¶ûɳ¿²»ùÀïÂÊÏÈ·¢Ã÷ £¬¹¥»÷ÕßʹÓûìÏý¾ç±¾ÔÚÈí¼þ°ü×°ÖÃʱÇÔȡϵͳÇéÐαäÁ¿ £¬Ãô¸ÐÊý¾Ý±»»Ø´«ÖÁÔ¶³Ì·þÎñÆ÷¡£ÊÜÓ°ÏìÈí¼þ°üÖÐ £¬ÈÈÃÅ¿â"country-currency-map"ÿÖÜÏÂÔØÁ¿´ïÊýǧ´Î £¬Æä2.1.8°æ±¾±»Ö²Èë¶ñÒâ´úÂë £¬ÀÛ¼ÆÏÂÔØ288´Î¡£¶ñÒâ´úÂëÒþ²ØÓÚÁ½¸ö¾­Óɸ߶ȻìÏýµÄ¾ç±¾Îļþ £¬Í¨¹ýnpm°ü×°ÖûúÖÆ×Ô¶¯Ö´ÐÐ £¬×¨ÃŲ¶»ñ°üÀ¨APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÐÅÏ¢µÄϵͳÇéÐαäÁ¿¡£Ç徲ר¼ÒÆÊÎöÖ¸³ö £¬´Ë´Î¹¥»÷¼«ÓпÉÄÜÊÇͨ¹ý½ÓÊܺã¾Ãδ»îÔ¾µÄά»¤ÕßÕË»§ÊµÑé £¬¹¥»÷Õß¿ÉÄÜʹÓôËǰй¶µÄƾ֤¾ÙÐÐ"ײ¿â"¹¥»÷ £¬»òʹÓÃÓâÆÚÓòÃû¿ØÖÆÈ¨ÏÞ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬ËùÓб»¸Ä¶¯µÄ¿ÍÕ»ÖжñÒâ´úÂë°æ±¾ÍêȫһÖ £¬ÇҴ󶼿ÍÕ»ÒÑÊýÄêδ¸üР£¬½øÒ»²½×ôÖ¤ÁËÕË»§Ð®ÖƵÄÍÆ²â¡£ÏÖÔÚ £¬³ý"country-currency-map"ÒÑÆúÓöñÒâ°æ±¾²¢Ö¸µ¼Óû§½µ¼¶ÖÁ2.1.7Çå¾²°æ±¾Íâ £¬ÆäÓà±»¸Ä¶¯Èí¼þ°üÈÔЯ´ø¶ñÒâ´úÂëÔÚnpmƽ̨Á÷ͨ¡£Ö»¹ÜnpmÒѶԻîÔ¾ÏîÄ¿Ç¿ÖÆÆôÓÃË«ÒòËØÈÏÖ¤ £¬µ«´Ë´ÎÉæÊÂÈí¼þ°ü¶àΪÀϾÉÏîÄ¿ £¬Î¬»¤Õß¿ÉÄÜÒÑÍÑÀëÖÎÀí £¬ÐγÉÇå¾²·À»¤Ã¤Çø¡£


https://www.bleepingcomputer.com/news/security/infostealer-campaign-compromises-10-npm-packages-targets-devs/