APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯
Ðû²¼Ê±¼ä 2025-05-161. APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯
5ÔÂ15ÈÕ£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET×îÐÂÑо¿·¢Ã÷£¬Óë¶íÂÞ˹ÓйØÁªµÄÍþв×éÖ¯Õë¶ÔRoundcube¡¢Horde¡¢MDaemonºÍZimbraµÈÖ÷Á÷ÓʼþϵͳʵÑéÁËÃûΪ¡°Operation RoundPress¡±µÄÍøÂçÌØ¹¤Ô˶¯¡£´Ë´ÎÐж¯½¹µãÄ¿µÄÊÇÇÔÈ¡ÌØ¶¨ÓÊÏäÕË»§µÄÉñÃØÊý¾Ý£¬Ö÷ÒªÊܺ¦ÕßΪ¶«Å·Õþ¸®»ú¹¹¼°¾ü¹¤ÆóÒµ£¬Í¬Ê±·ÇÖÞ¡¢Å·ÖÞºÍÄÏÃÀÖÞµÄÕþ¸®²¿·ÖÒ²Ôâµ½¹¥»÷¡£Ñо¿Ö°Ô±½«Æä¹éÒòÓÚ¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT28£¬ÒÀ¾Ý°üÀ¨´¹ÂÚÓʼþ·¢¼þµØµãÖØµþºÍ·þÎñÆ÷ÉèÖÃÊÖ·¨ÏàËÆ¡£¹¥»÷Õßͨ¹ýÓʼþϵͳµÄXSSÎó²îÔÚÍøÒ³ÓÊÏä½çÃæÖ´ÐÐí§ÒâJavaScript´úÂë¡£ÆäÖУ¬MDaemonµÄXSSÎó²îÔÚ¹¥»÷³õÆÚΪÁãÈÕÎó²î£¬ËäºóÐøÒÑÐÞ¸´£¬µ«ÆäʱδÐÞ¸´¡£APT28ͨ¹ýµç×ÓÓʼþ·¢ËÍXSSÎó²îʹÓóÌÐò£¬¶ñÒâ´úÂëÔÚä¯ÀÀÆ÷ÔËÐеÄÍøÒ³ÓÊÏä¿Í»§¶ËÖÐÖ´ÐС£Îó²îʹÓÃÀֳɺó£¬ÃûΪSpyPressµÄ»ìÏýJavaScriptÓÐÓÃÔØºÉ»áÇÔÈ¡ÓÊÏ䯾֤¡¢ÓʼþÄÚÈݺÍÁªÏµÈËÐÅÏ¢£¬²¿·Ö±äÖÖ»¹Äܽ¨ÉèSieve¹æÔò£¬Ò»Á¬×ª·¢ÐÂÓʼþÖÁ¹¥»÷ÕßÓÊÏä¡£ÇÔÈ¡µÄÊý¾Ýͨ¹ýHTTP POSTÇëÇó·¢ËÍÖÁC2·þÎñÆ÷£¬Ä³Ð©±äÖÖ»¹Äܲ¶»ñµÇ¼¼Í¼¡¢2FA´úÂ룬ÉõÖÁΪMDAEMON½¨ÉèÓ¦ÓÃÃÜÂë¡£
https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html
2. Coinbase¿Í»§Êý¾Ýй¶£¬Ô¤¼ÆËðʧ´ï4ÒÚ
5ÔÂ15ÈÕ£¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbaseÅû¶£¬ÍøÂç·¸·¨·Ö×ÓÓë¶ñÒâÍâÑó¿Í·þÖ°Ô±ÏàÖúÇÔÈ¡Á˿ͻ§Êý¾Ý£¬²¢Ë÷Òª2000ÍòÃÀÔªÊê½ðÒÔ²»¹ûÕæ±»µÁÐÅÏ¢¡£Coinbase¾Ü¾øÖ§¸¶Êê½ð£¬µ«ÉèÁ¢2000ÍòÃÀÔª½±Àø»ù½ð£¬ÒÔÃãÀøÌṩÓйع¥»÷ÕßµÄÏßË÷¡£´Ëǰ£¬ºÚ¿ÍÏòCoinbase·¢Ë͵ç×ÓÓʼþÍþвÐû²¼¿Í»§ÕË»§ºÍÄÚ²¿ÎļþÐÅÏ¢£¬CoinbaseÊӲ췢Ã÷¹¥»÷ÕßÔÚÃÀ¹ú¾³Íâ³Ð°üÉÌ»òÖ§³ÖÖ°Ô±µÄ×ÊÖúÏ»ñÈ¡Á˿ͻ§Êý¾Ý£¬ÕâЩְԱÊܹͻá¼ûÄÚ²¿ÏµÍ³£¬Coinbase·¢Ã÷ºóÒÑ¿ª³ýÏà¹ØÖ°Ô±¡£Ö»¹ÜÍþвÐÐΪÕßÇÔÈ¡ÁËCoinbaseÔ¼1%¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬µ«ÎÞ·¨»ñÈ¡¿Í»§Ë½Ô¿¡¢ÃÜÂë»ò»á¼ûCoinbase PrimeÕË»§ºÍÇ®°ü¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢µç×ÓÓʼþ¡¢²¿·ÖÉç»á°ü¹ÜºÅ¡¢ÒøÐÐÕ˺ÅÐÅÏ¢¡¢Õþ¸®Éí·Ý֤ͼÏñ¡¢ÕË»§Êý¾Ý¼°ÓÐÏ޵Ĺ«Ë¾Êý¾Ý¡£CoinbaseÇ¿µ÷ûÓÐÃÜÂ롢˽Կ»ò×ʽðй¶£¬²¢½«Åâ³¥±»ÓÕÆÏò¹¥»÷Õß»ã¿îµÄ¿Í»§¡£ËäÈ»²ÆÎñÓ°ÏìÈÔÔÚÆÀ¹ÀÖУ¬µ«CoinbaseÔ¤¼Æµ÷½âºÍ¿Í»§Åâ³¥ÓöȽ«ÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£Îª±ÜÃâδÀ´Î¥¹æÐÐΪ£¬CoinbaseÍýÏ뿪ÉèеÄÖ§³ÖÖÐÐÄÅâ³¥ÊÜÓ°Ïì¿Í»§£¬²¢ÔöÌí¶ÔÄÚ²¿Íþв¼ì²â¡¢Çå¾²ÍþвģÄâºÍ×Ô¶¯ÏìÓ¦µÄͶ×Ê¡£
https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/
3. ¶ñÒâNPM°üʹÓÃUnicodeÒþдÊõÀ´Ìӱܼì²â
5ÔÂ15ÈÕ£¬´úÂëÇå¾²ÆÀ¹À¹«Ë¾Veracode·¢Ã÷£¬Node°ü¹ÜÀíÆ÷Ë÷ÒýÖб£´æÃûΪ¡°os-info-checker-es6¡±µÄ¶ñÒâÈí¼þ°ü£¬¸Ã°ü×Ô±¾Ô³õÒÔÀ´Òѱ»ÏÂÔØÁè¼Ý1000´Î¡£¸ÃÈí¼þ°ü×î³õ°æ±¾ÓÚ3ÔÂ19ÈÕÉÏ´«ÖÁNPM£¬×î³õ¹¦Ð§½öÊÇÍøÂç²Ù×÷ϵͳÐÅÏ¢£¬¿´ËÆÎÞº¦¡£È»¶ø£¬¼¸Ììºó£¬×÷Õß¶ÔÈí¼þ°ü¾ÙÐÐÁËÐ޸ģ¬Ìí¼ÓÁËÌØ¶¨ÓÚÆ½Ì¨µÄ¶þ½øÖÆÎļþºÍ»ìÏýµÄ×°Öþ籾¡£5ÔÂ7ÈÕ£¬¸ÃÈí¼þ°üÐû²¼Ð°汾£¬ÆäÖаüÀ¨ÓÃÓÚת´ï×îÖÕÓÐÓÃÔØºÉµÄÖØ´óC2£¨ÏÂÁîºÍ¿ØÖÆ£©»úÖÆ´úÂë¡£VeracodeÖÒÑԳƣ¬Ä¿½ñnpmÉÏ¿ÉÓõÄ×îа汾v1.0.8Ϊ¶ñÒâ°æ±¾¡£±ðµÄ£¬¸ÃÈí¼þ°ü»¹±»ÁÐΪÆäËûËĸöNPMÈí¼þ°üµÄÒÀÀµÏµ«ÏÖÔÚÉв»ÇåÎúÕâЩÈí¼þ°üÊÇ·ñ»òÔõÑù±»ÍþвÐÐΪÕßÍÆ¹ã¡£ÔÚ¶ñÒâ°æ±¾ÖУ¬¹¥»÷ÕßʹÓÃUnicodeÒþдÊõ£¬½«Êý¾ÝǶÈë¿´ËÆ¡°|¡±µÄ×Ö·û´®ÖУ¬¶øÊúÏߺóÒþ²ØÁËÒ»³¤´®²»¿É¼ûµÄUnicode×Ö·û£¬ÕâЩ×Ö·ûÓÃÓÚÔö½ø»ùÓÚÎı¾µÄÒþдÊõ¡£Veracodeͨ¹ý½âÂëºÍ·´»ìÏý×Ö·û´®£¬ÕÒµ½ÁËÖØ´óC2»úÖÆµÄÓÐÓÃÔØºÉ£¬¸Ã»úÖÆÒÀÀµGoogleÈÕÀú¶ÌÁ´½ÓµÖ´ïÍйÜ×îÖÕÓÐÓÃÔØºÉµÄλÖá£Ñо¿Ö°Ô±Ú¹ÊÍÁË´Ó»ñÈ¡GoogleÈÕÀúÁ´½Óµ½×îÖÕ½âÂë»ñÈ¡¶ñÒâÈí¼þÓÐÓÃÔØºÉµÄÕû¸öÀú³Ì£¬²¢Ö¸³ö×îÖÕÓÐÓÃÔØºÉ¿ÉÄܾÓɼÓÃÜ¡£
https://www.bleepingcomputer.com/news/security/malicious-npm-package-uses-unicode-steganography-to-evade-detection/
4. Ó¡µÚ°²ÄÉÖÝÕþ¸®ÖÒÑÔ£ºÐ¡ÐÄð³ä¹Ù·½ÓʼþµÄͨÐзÑÕ©Æ
5ÔÂ13ÈÕ£¬Ó¡µÚ°²ÄÉÖÝÕþ¸®»ú¹¹ÓÚÖܶþÏòסÃñ·¢³öÖÒÑÔ£¬ÒªÇóɾ³ýʹÓÃÖÝÕþ¸®¹Ù·½µç×ÓÓʼþµØµã·¢Ë͵ÄÐéαµç×ÓÓʼþ¡£ÕâЩ´¹ÂÚÓʼþÀ´×Ô¶à¸öÖÝÕþ¸®²¿·Ö£¬°üÀ¨¶ùͯ·þÎñ²¿¡¢ÈüÂíίԱ»áµÈ£¬ËüÃÇÓÕÆÐԵؼû¸æÊÕ¼þÈ˱£´æÎ´½ÉÄɵÄͨÐзѣ¬²¢ÍþвÈô²»½ÉÄɽ«ÃæÁÙ¾¼Ã´¦·£»ò³µÁ¾¹ÒºÅ±»¿ÛÁô¡£Óʼþ×îºó³£ÒÔ¡°Ð»Ð»Äú£¬TxTag ¿Í·þ¡±×÷ΪÊðÃû£¬²¢°üÀ¨ÒÉËÆ¶ñÒâÍøÕ¾µÄÁ´½Ó¡£Ó¡µÚ°²ÄÉÖÝÁìÍÁÇå¾²²¿Í¨¹ýÊÖÒհ칫ÊÒÔÚXƽ̨Ðû²¼ÐÂÎÅ£¬ÌáÐѹ«ÖÚСÐÄ´ËÀàÕ©Æ¡£ÉùÃ÷Ö¸³ö£¬ÖÝÕþ¸®²»»áͨ¹ý¶ÌÐÅ»òµç×ÓÓʼþ·¢ËÍδ½ÉͨÐзÑ֪ͨ£¬²¢ÌåÏÖÊÖÒհ칫ÊÒÕýÓëÉæÊ¹«Ë¾ÏàÖú£¬ÒÔ×èÖ¹ÈκνøÒ»²½µÄͨѶ¡£¾ÝÏàʶ£¬ÖÝÕþ¸®ÓÚÈ¥ÄêÄêµ×ÖÕÖ¹ÁËÓëÒ»¼Òδǩ×Ö¹©Ó¦É̵ÄÌõÔ¼£¬µ«Î´É¾³ý¸ÃÖݵÄÕË»§¡£´Ë´ÎÊÂÎñÖУ¬Ò»Ãû³Ð°üÉ̵ÄÕË»§Ôâµ½ºÚ¿Í¹¥»÷£¬²¢±»ÓÃÓÚ·¢ËÍÕâЩÐéαÐÅÏ¢£¬¶øÖÝϵͳ²¢Î´·¢Ã÷ÈëÇÖ¼£Ïó¡£µç×ÓÓʼþ½ØÍ¼ÏÔʾ£¬ÕâЩÐÅÏ¢ÊÇͨ¹ýµ¤·ðÈí¼þ¹«Ë¾GranicusµÄÈí¼þGovDelivery Communications Cloud·Ö·¢µÄ¡£Granicus½²»°ÈËSharon RushenÌåÏÖ£¬¸ÃÊÂÎñ²¢Î´ÉìÕÅÖÁÆä×ÔÉíÆ½Ì¨£¬ÏµÍ³ÊÇÇå¾²µÄ¡£ËýÖ¸³ö£¬ÎÊÌâÔ´ÓÚÖÎÀíÔ±Óû§ÕË»§±»ÈëÇÖ£¬¿ÉÄÜÊÇͨ¹ýÍÆ²âƾ֤»òÉç½»¹¤³ÌÊֶλñÈ¡¡£
https://statescoop.com/indiana-phishing-attack-contractor-hacked/
5. FrigidStealerͨ¹ýÐéαä¯ÀÀÆ÷¸üй¥»÷macOSÓû§
5ÔÂ15ÈÕ£¬FrigidStealer¶ñÒâÈí¼þÕýͨ¹ýÐéαä¯ÀÀÆ÷¸üÐÂÌáÐѹ¥»÷macOSÓû§£¬¸Ã±äÖÖÓÚ2025Äê2ÔÂÊ״α»·¢Ã÷£¬²¢ÒѲ¨¼°±±ÃÀ¡¢Å·ÖÞºÍÑÇÖÞµÄÓû§¡£´Ë¶ñÒâÈí¼þÁ¥ÊôÓÚFerret¶ñÒâÈí¼þ¼Ò×壬ÓëTA2726ºÍTA2727²¡¶¾Óйأ¬Á½Õß¾ùÒÔʹÓÃÐéαä¯ÀÀÆ÷¸üÐÂΪ¹¥»÷ÊֶζøÖø³Æ¡£¸Ã¶ñÒâÈí¼þαװ³ÉSafari¸üеĴÅÅÌÓ³ÏñÎļþ£¨DMG£©£¬ÓÕÆÓû§ÏÂÔØ²¢×°Öá£×°ÖÃÀú³ÌÖУ¬Ëü»áÌáÐÑÓû§ÊäÈëÃÜÂ룬´Ó¶øÈƹýAppleµÄGatekeeper±£»¤»úÖÆ£¬²¢½èÖúÄÚÖõÄAppleScript¹¦Ð§Ö´ÐжñÒâ²Ù×÷¡£×°Öúó£¬Ëü»áαװ³ÉÒ»¸ö´øÓÐÌØ¶¨bundle IDµÄ¶ñÒâÓ¦Óã¬ÓëÕýµ±Ó¦ÓûìÏýÊÓÌý¡£Ò»µ©¼¤»î£¬FrigidStealer±ã×îÏÈÍøÂçÓû§µÄÃô¸ÐÊý¾Ý£¬°üÀ¨ä¯ÀÀÆ÷ƾ֤¡¢ÏµÍ³Îļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢¼°Apple NotesµÈ£¬²¢Í¨¹ýmacOSµÄmDNSResponder·ÓɵÄDNSÅÌÎÊ£¬½«ÕâЩÊý¾Ýй¶µ½ÏÂÁîÓë¿ØÖÆ·þÎñÆ÷¡£ÇÔÈ¡Êý¾Ýºó£¬¸Ã¶ñÒâÈí¼þ»á×ÔÎÒÖÕÖ¹£¬ÒÔ½µµÍ±»·¢Ã÷µÄΣº¦¡£¾Ý¿ªÔ´ÍøÂçÇå¾²¹«Ë¾WazuhÅû¶£¬FrigidStealer²¢²»ÒÀÀµ¹Å°åµÄÎó²îʹÓù¤¾ß°ü»òÎó²î£¬¶øÊÇʹÓÃÓû§¶Ôϵͳ֪ͨºÍä¯ÀÀÆ÷¸üÐÂÌáÐѵÄÐÅÍоÙÐй¥»÷£¬ÕâʹµÃËü¸üΪΣÏÕÇÒÓÐÓᣱðµÄ£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃmacOSÌØÓеÄÐÐΪÀ´¼á³Ö³¤ÆÚÐÔ£¬Í¨¹ý×¢²áΪǰ̨ӦÓóÌÐòµÈ·½·¨Óëϵͳ½»»¥£¬²¢ÔÚÖ´Ðкóɾ³ý×ÔÉíºÛ¼££¬ÒÔ¼á³ÖÒþ²Ø¡£
https://hackread.com/frigidstealer-malware-macos-fake-safari-browser-update/
6. ÕÐÆ¸Æ½Ì¨HireClick570Íò·Ý¼òÀúÔâй¶
5ÔÂ15ÈÕ£¬CybernewsÑо¿Ö°Ô±¿ËÈÕ·¢Ã÷Ò»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬ÈªÔ´Ö¸ÏòÃæÏòÖÐСÐÍÆóÒµµÄÕÐÆ¸Æ½Ì¨HireClick¡£ÓÉÓÚÑÇÂíÑ·AWS S3´æ´¢Í°ÉèÖùýʧ£¬¸Ãƽ̨Áè¼Ý570Íò·ÝÎļþ±»Ì»Â¶ÔÚ»¥ÁªÍøÉÏ£¬ÆäÖÐÖ÷ÒªÊÇÇóÖ°ÕߵļòÀú£¬ÕâЩÎļþй¶ÁËÇóÖ°ÕßµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°¾ÍÒµÐÅÏ¢µÈÃô¸ÐºÍ˽ÈËÊý¾Ý¡£´Ë´ÎÊý¾Ýй¶¶ÔHireClick¿Í»§µÄÓ°ÏìÉîÔ¶¡£Ð¹Â¶µÄÊý¾ÝÒ»µ©ÂäÈë²»·¨·Ö×ÓÖ®ÊÖ£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢Ã°³ä¡¢ÍøÂç´¹ÂڵȶàÖÖÕ©ÆÔ˶¯¡£¹¥»÷Õß¿ÉÄٰܼçÕÐÆ¸Ë¾Àí£¬Ê¹ÓÃй¶µÄÐÅÏ¢ÓÕÆÇóÖ°ÕßÌṩÉí·Ý֤ɨÃè¼þ¡¢Éç»áÇå¾²ºÅÂëÉõÖÁÒøÐÐÐÅÏ¢£¬»òͨ¹ýµç»°ÓÕÆÇóÖ°ÕßÍ¸Â¶ÒøÐÐÐÅÏ¢»ò×°ÖöñÒâÈí¼þ¡£±ðµÄ£¬Õ©ÆÕß»¹¿ÉʹÓÃй¶µÄ¼òÀú½¨ÉèÐéαÉí·Ý¾ÙÐоÍÒµÑéÖ¤Õ©Æ£¬ÉõÖÁð³äÇóÖ°Õß½øÈëÊÂÇ鳡ºÏϵͳ¡£ÕâÖÖÊý¾Ýй¶ÐÐΪµÄΣº¦²»µ«ÏÞÓÚÊý¾Ý͵ÇÔ×Ô¼º£¬»¹¿ÉÄÜÒý·¢ÍøÂçÈËÈâËÑË÷£¬¼´¶ñÒâÆØ¹â˽ÈËÐÅÏ¢ÒÔɧÈÅ»òÏÅ»£ËûÈË¡£¹¥»÷ÕßÕÆÎÕÁËÊܺ¦ÕßµÄÈ«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÏÖʵµØµã£¬¾ÍÄÜÈÝÒ×Ëø¶¨²¢É§ÈÅÊܺ¦Õß¡£
https://cybernews.com/security/hireclick-resume-database-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ