ViciousTrapºÚ¿Í×é֯ʹÓÃÎó²î¹¹½¨ÀàÃÛ¹ÞÍøÂç
Ðû²¼Ê±¼ä 2025-05-261. ViciousTrapºÚ¿Í×é֯ʹÓÃÎó²î¹¹½¨ÀàÃÛ¹ÞÍøÂç
5ÔÂ23ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶£¬´úºÅViciousTrapµÄºÚ¿Í×éÖ¯ÒÑÈëÇÖÈ«Çò84¸ö¹ú¼Ò½ü5300Ì¨ÍøÂç±ßÑØ×°±¸£¬½«ÆäˢгÉÀàÃÛ¹ÞÍøÂç¡£¸Ã×é֯ʹÓÃ˼¿ÆÐ¡ÐÍÆóҵ·ÓÉÆ÷¶à¿îÐͺŵÄÒªº¦Îó²îCVE-2023-20118ʵÑé´ó¹æÄ£ÈëÇÖ£¬ÆäÖÐ850̨ÊÜ¿Ø×°±¸Î»ÓÚ°ÄÃÅ¡£Çå¾²¹«Ë¾SekoiaÔÚÆÊÎö±¨¸æÖÐÖ¸³ö£¬Ñ¬È¾Á´Éæ¼°Ö´ÐÐÃûΪNetGhostµÄshell¾ç±¾£¬¸Ã¾ç±¾Äܽ«±»ÈëÇÖ·ÓÉÆ÷µÄÁ÷Á¿Öض¨ÏòÖÁ¹¥»÷Õß¿ØÖƵÄÀàÃÛ¹ÞÉèÊ©£¬ÊµÏÖÍøÂçÁ÷Á¿Ð®ÖÆ¡£´Ëǰ£¬·¨¹úÍøÂçÇå¾²¹«Ë¾Ôø½«¸ÃÎó²îʹÓùéÒòÓÚPolarEdge½©Ê¬ÍøÂ磬²»¹ýÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢¶þÕßÓйØÁª¡£ViciousTrap±³ºóµÄ×éÖ¯Õýͨ¹ýÈëÇÖ´ó×Ú̻¶ÓÚ»¥ÁªÍøµÄ×°±¸¹¹½¨ÃÛ¹Þ»ù´¡ÉèÊ©£¬Éæ¼°50Óà¸ö³§É̵ÄSOHO·ÓÉÆ÷¡¢SSL VPNµÈ¶àÖÖ×°±¸¡£ÕâÖּܹ¹Ê¹¹¥»÷ÕßÄÜÊÓ²ì¶àÇéÐÎÉøÍ¸ÊµÑ飬¿ÉÄÜÍøÂçδ¹ûÕæ»òÁãÈÕÎó²îʹÓüƻ®£¬²¢Ð®ÖÆÆäËûÍþв×éÖ¯µÄÈëÇÖЧ¹û¡£¹¥»÷Á´ÏÈͨ¹ýÎó²îʹÓÃÏÂÔØbash¾ç±¾£¬½ø¶øÖ´Ðеڶþ½×¶ÎµÄNetGhost¾ç±¾£¬¸Ã¾ç±¾¾ß±¸Á÷Á¿Öض¨Ïò¹¦Ð§£¬¿ÉʵÑéÖÐÐÄÈ˹¥»÷£¬»¹¾ß±¸×Ôɾ³ýÄÜÁ¦ÒÔïÔÌȡ֤ºÛ¼£¡£ËùÓй¥»÷ʵÑé¾ùÔ´×Ô¼òµ¥IPµØµã£¬×îÔçÔ˶¯¿É×·ËÝÖÁ2025Äê3Ô£¬´ÎÔ¸Ã×éÖ¯»¹½«PolarEdge½©Ê¬ÍøÂçÔøÊ¹ÓõÄδ¹ûÕæWebShell¹¤¾ß¸Ä×÷¼ºÓᣱ¾ÔÂ×îй¥»÷Ô˶¯×ªÏò»ªË¶Â·ÓÉÆ÷£¬Ê¹ÓÃÁíÒ»IPµØµã£¬µ«Î´°²ÅÅÃÛ¹Þ£¬ËùÓлîÔ¾IP¾ùλÓÚÂíÀ´Î÷ÑÇ£¬¹éÊôÍйܷþÎñÉÌShinjiruÔËÓªµÄ×ÔÖÎϵͳ¡£
https://thehackernews.com/2025/05/vicioustrap-uses-cisco-flaw-to-build.html
2. NPMÉϵÄÊýÊ®¸ö¶ñÒâÈí¼þ°üÍøÂçÖ÷»úºÍÍøÂçÊý¾Ý
5ÔÂ23ÈÕ£¬SocketÍþвÑо¿ÍŶÓÔÚNPMË÷ÒýÖз¢Ã÷ÁËÁ½Æð¶ñÒâÈí¼þ°üÔ˶¯¡£µÚÒ»ÆðÉæ¼°60¸ö¶ñÒâÈí¼þ°ü£¬ËüÃÇ×Ô5ÔÂ12ÈÕÆð´ÓÈý¸öÐû²¼ÕßÕË»§ÉÏ´«ÖÁNPM´æ´¢¿â¡£ÕâЩÈí¼þ°ü°üÀ¨×°Öúó¾ç±¾£¬ÔÚ¡°npm install¡±Ê±´ú×Ô¶¯Ö´ÐУ¬ÍøÂç°üÀ¨Ö÷»úÃû¡¢ÄÚ²¿IPµØµã¡¢Óû§Ö÷Ŀ¼µÈÃô¸ÐÐÅÏ¢£¬²¢·¢Ë͵½ÍþвÐÐΪÕß¿ØÖƵÄDiscord webhook¡£¸Ã¾ç±¾»¹¾ß±¸ÇéÐμì²â¹¦Ð§£¬ÒÔÈ·¶¨ÊÇ·ñÔÚÆÊÎöÇéÐÎÖÐÔËÐС£Ö»¹ÜÏÖÔÚδÊӲ쵽µÚ¶þ½×¶ÎÓÐÓÃÔØºÉµÄͶµÝ¡¢È¨ÏÞÌáÉý»ò³¤ÆÚ»úÖÆ£¬µ«Ë¼Á¿µ½ËùÍøÂçÊý¾ÝµÄÃô¸ÐÐÔ£¬´ËÀ๥»÷µÄΣÏÕÐÔÏ൱¸ß¡£ÕâЩ¶ñÒâÈí¼þ°üÔøÀÛ¼ÆÏÂÔØ3000´Î£¬²»¹ýÔÚ±¨¸æÐû²¼Ê±ÒÑ´ÓNPM´æ´¢¿âÖÐÏûÊÅ¡£ÎªÓÕÆ¿ª·¢Ö°Ô±£¬ÍþвÐÐΪÕßʹÓÃÁËÓëÕýµ±Èí¼þ°üÏàËÆµÄÃû³Æ£¬¿ÉÄÜÕë¶ÔCI/CD¹ÜµÀ¡£ÁíÒ»Æð¶ñÒâÔ˶¯Éæ¼°°Ë¸öÈí¼þ°ü£¬ËüÃÇͨ¹ýÓòÃûÇÀעģÄâReact¡¢Vue.js¡¢Vite¡¢Node.jsºÍQuillÉú̬ϵͳµÄÕýµ±¹¤¾ß£¬µ«¾ß±¸Êý¾Ý²Á³ý¹¦Ð§£¬¿Éɾ³ýÎļþ¡¢Ëð»µÊý¾ÝºÍ¹Ø±Õϵͳ¡£ÕâЩÈí¼þ°üÒÑÍùÁ½ÄêÒ»Ö±±£´æÓÚNPMÉÏ£¬ÏÂÔØÁ¿´ï6200´Î¡£ÆäÌӱܼì²âµÄ²¿·ÖÔµ¹ÊÔÓÉÊÇÓÐÓÃÔØºÉƾ֤Ӳ±àÂëµÄϵͳÈÕÆÚ¼¤»î£¬ÇÒÆä½á¹¹»áÖð²½ÆÆËðϵͳ¡£´Ë´ÎÔ˶¯±³ºóµÄÍþвÐÐΪÕßÒÔ¡°xuxingfeng¡±ÃûÒåÐû²¼ÕâЩÎļþ£¬²¢ÁгöÁ˼¸¸öÕýµ±Èí¼þ°üÒÔ½¨ÉèÐÅÍС£Ö»¹Üƾ֤Ӳ±àÂëÈÕÆÚ£¬Î£ÏÕÒÑÒÑÍù£¬µ«¼øÓÚ×÷Õß¿ÉÄÜÒýÈë¸üÐÂÖØÐ´¥·¢²Á³ý¹¦Ð§£¬É¾³ýÕâЩÈí¼þ°üÖÁ¹ØÖ÷Òª¡£
https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/
3. Cetus ProtocolÔâºÚ¿ÍÇÔÈ¡2.23ÒÚ¼ÓÃÜÇ®±Ò
5ÔÂ23ÈÕ£¬È¥ÖÐÐÄ»¯ÉúÒâËùCetus Protocol¿ËÈÕÐû²¼ÔâÓöºÚ¿Í¹¥»÷£¬¼ÛÖµ2.23ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£ÊÂÎñ±¬·¢ºó£¬¸ÃÏîÄ¿Á¬Ã¦ÔÝÍ£ÖÇÄܺÏÔ¼Õö¿ªÊӲ죬²¢È·ÈÏ¡°1.62ÒÚÃÀÔªµÄÊÜËð×ʽðÒÑÀÖ³ÉÔÝÍ£¡±¡£Cetus ProtocolËæºóÖ¸³ö£¬ºÚ¿ÍʹÓÃÁËÒ»¸öÒ×Êܹ¥»÷µÄÈí¼þ°üʵÑé¹¥»÷£¬µ«Î´Åû¶Ïêϸϸ½Ú¡£¸ÃÏîÄ¿ÌåÏÖÒÑÕÒµ½Îó²î»ù´¡Ôµ¹ÊÔÓÉ£¬ÐÞ¸´ÁËÏà¹ØÈí¼þ°ü£¬²¢Í¨ÖªÁËÉú̬ϵͳ½¨ÉèÕßÒÔ±ÜÃâÆäËûÍŶÓÊÜÓ°Ïì¡£±ðµÄ£¬Cetus Protocolʶ±ð³ö¹¥»÷ÕßµÄÒÔÌ«·»Ç®°üµØµãºÍÕË»§£¬ÕýÓëµÚÈý·½ÏàÖú×·×ٺͶ³½á×ʽ𣬲¢ÒÑִ֪ͨ·¨²¿·Ö¡£Îª´ÙʹºÚ¿ÍËÍ»¹×ʽð£¬Cetus ProtocolÌá³ö¡°ÓÐʱÏ޵İ×ñϢÕùÐÒ顱£¬ÔÊÐíÈô×ʽðÍË»¹½«²»ÔÙ½ÓÄÉÖ´·¨Ðж¯¡£Í¬Ê±£¬¸ÃÏîÄ¿Ðû²¼½«Ìṩ500ÍòÃÀÔªÉͽ𣬽±ÀøÌṩÏßË÷¡¢×ÊÖúʶ±ðºÍ¾Ð²¶ºÚ¿ÍµÄÐÅÏ¢ÌṩÕß¡£ÔÚÑéÖ¤Õß½ôÆÈͶƱºó£¬SuiÇø¿éÁ´ÉÏ1.62ÒÚÃÀÔªµÄ×ʽð±»ÔÝÍ£¡£Çø¿éÁ´ÆÊÎö¹«Ë¾EllipticÐû²¼±¨¸æÖ¸³ö£¬×Ô¶¯×öÊÐÉÌ£¨AMM£©Âß¼±£´æÈ±ÏÝ£¬¿ÉÄÜÉæ¼°³Ø¼ÛǮʹÓ㬴ӶøÒý·¢ÉÁµç´ûʽ¹¥»÷¡£Elliptic»¹¸ÅÊöÁ˹¥»÷ÕßµÄ×ʽð×ªÒÆÊµÑ飬²¢ÌåÏÖÕýÔÚÆð¾¢×·×Ù´ÓSui³õʼÎó²îµ½¹¥»÷ÕßÔÚÒÔÌ«·»ÉÏÇ®°üµÄÉúÒâ¡£ÏÖÔÚ£¬ºÚ¿ÍµÄµØµãÒÑÔÚËùÓÐÖ÷ÒªÉúÒâËùºÍÐéÄâ×ʲú·þÎñÌṩÉÌÉϱê¼Ç£¬ÒÔ±ÜÃâÏ´Ç®»ò×ʽð×ªÒÆÍýÏë¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/
4. FBIÖÒÑÔSilent Ransom GroupÕë¶ÔÃÀÂÉËùÌᳫÀÕË÷¹¥»÷
5ÔÂ23ÈÕ£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö¿ËÈÕ·¢³öÖÒÑÔ£¬Ö¸³öÒ»¸öÃûΪSilent Ransom Group£¨SRG£©µÄÀÕË÷ÍÅ»ïÔÚÒÑÍùÁ½ÄêÀïÒ»Á¬Õë¶ÔÃÀ¹ú״ʦÊÂÎñËù·¢¶¯»Ø²¦ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷¡£¸ÃÍÅ»ïÓÖÃûLuna Moth¡¢Chatty SpiderºÍUNC3753£¬×Ô2022ÄêÆð±ãÒ»Ö±»îÔ¾£¬ÊÇBazarCallÔ˶¯µÄÄ»ºóÖ÷ʹ£¬ÎªRyukºÍContiÀÕË÷Èí¼þ¹¥»÷ÌṩÁ˳õÊ¼ÍøÂç»á¼ûȨÏÞ¡£ÔÚConti¹Ø±Õºó£¬¸ÃÍþвÐÐΪÕßÍÑÀëÔÍøÂç·¸·¨¼¯ÍÅ£¬×齨ÁËSRG¡£ÔÚ×î½üµÄ¹¥»÷ÖУ¬SRGͨ¹ýµç×ÓÓʼþ¡¢ÐéÎ±ÍøÕ¾ºÍµç»°Ã°³äÄ¿µÄITÖ§³ÖÖ°Ô±£¬Ê¹ÓÃÉç»á¹¤³ÌѧÊֶλñÈ¡ÍøÂç»á¼ûȨÏÞ¡£ÓëÒ»Ñùƽ³£ÀÕË÷×éÖ¯²î±ð£¬SRG²¢²»¼ÓÃÜÊܺ¦Õßϵͳ£¬¶øÊÇÒÔË÷ÒªÊê½ð±ÜÃâÃô¸ÐÐÅϢй¶¶øÖøÃû¡£ËûÃÇͨ¹ýÔ¶³Ì»á¼û»á»°½øÈëÊܺ¦Õß×°±¸£¬¾ÙÐÐ×îµÍÏ޶ȵÄȨÏÞÌáÉý£¬²¢Ñ¸ËÙתÏòÊý¾Ýй¶£¬Ê¹Óá°WinSCP¡±»òÒþ²Ø/ÖØÃüÃûµÄ¡°Rclone¡±°æ±¾ÇÔÈ¡Êý¾Ý¡£ÇÔÈ¡Êý¾Ýºó£¬SRGͨ¹ýÀÕË÷ÓʼþºÍµç»°Íþв³öÊÛ»ò¹ûÕæÐÅÏ¢£¬ÆÈʹÊܺ¦Õß¾ÙÐÐÊê½ð̸ÅС£Ö»¹ÜËûÃÇÓÐרÃŵÄÍøÕ¾Ð¹Â¶Êܺ¦ÕßÊý¾Ý£¬µ«FBIÖ¸³ö£¬ÕâЩÀÕË÷ÍŻﲢ²»×Ü»á¶ÒÏÖÊý¾Ýй¶Íþв¡£Îª·ÀÓù´ËÀ๥»÷£¬FBI½¨ÒéʹÓÃÇ¿ÃÜÂë¡¢ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤¡¢°´ÆÚ±¸·ÝÊý¾Ý£¬²¢¶ÔÔ±¹¤¾ÙÐÐÍøÂç´¹ÂÚʵÑé¼ì²âÅàѵ¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-of-luna-moth-extortion-attacks-targeting-law-firms/
5. Marlboro-Chesterfield PathologyÊý¾Ýй¶ӰÏì23.5ÍòÈË
5ÔÂ22ÈÕ£¬ÃÀ¹ú±±¿¨ÂÞÀ´ÄÉÖÝÈ«·þÎñÆÊ½â²¡ÀíʵÑéÊÒMarlboro-Chesterfield Pathology£¨MCP£©½üÆÚÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬ÖÂʹ´ó×ÚСÎÒ˽¼ÒÐÅÏ¢¼Í¼ʧÔô¡£¸Ã»ú¹¹ÔÚ¹ÙÍøÐû²¼µÄÊý¾Ýй¶֪ͨÅú×¢£¬2025Äê1ÔÂ16ÈÕÆäÄÚ²¿ITϵͳ·ºÆðδ¾ÊÚȨÔ˶¯£¬¾ÊÓ²ìÈ·ÈϹ¥»÷ÕßÇÔÈ¡Á˲¿·ÖÎļþ¡£´Ë´Îй¶µÄÊý¾Ýº¸ÇÐÕÃû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Ò½ÁÆÖÎÁÆÐÅÏ¢¼°¿µ½¡°ü¹ÜÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬Ïêϸй¶×Ö¶ÎÒò¸öÌå²î±ð¶øÓÐËù²î±ð¡£MCP±¾ÖÜÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿£¨HHS£©×ª´ï£¬´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£Éæ¼°235,911ÈË¡£ÀÕË÷Èí¼þ×éÖ¯SafePayÓÚÒ»ÔÂÏÂÑ®Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬¸ÃÍÅ»ï½üÆÚ»¹¶ÔÉÌÒµ·þÎñÌṩÉÌConduentÌᳫ¹¥»÷¡£ÖµµÃ×¢ÖØµÄÊÇ£¬×èÖ¹·¢¸åʱ£¬MCPÒÑ´ÓSafePayµÄйÃÜÍøÕ¾Ï¼ܣ¬ÕâÌåÏÖÊܺ¦·½¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£
https://www.securityweek.com/marlboro-chesterfield-pathology-data-breach-impacts-235000-people/
6. ºÚ¿ÍʹÓÃÐéαVPN¼°ä¯ÀÀÆ÷NSIS×°ÖðüÈö²¥Winos 4.0¶ñÒâÈí¼þ
5ÔÂ26ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶¶ñÒâÈí¼þÔ˶¯£¬¹¥»÷Õßͨ¹ýαװ³ÉLetsVPN¡¢QQä¯ÀÀÆ÷µÈÊ¢Ðй¤¾ßµÄÐéαװÖóÌÐò£¬×îÖÕͶµÝWinos 4.0¿ò¼Ü¡£´Ë¹¥»÷Ðж¯ÓÉRapid7ÓÚ2025Äê2ÔÂÊ״μà²âµ½£¬Ê¹ÓÃÁËÃûΪCatenaµÄ¶à½×¶ÎפÄÚ´æ¼ÓÔØÆ÷£¬½«ÓÐÓÃÔØºÉÍêȫפÁôÄÚ´æÒÔ¹æ±Üɱ¶¾Èí¼þ¼ì²â¡£Ö²Èëºó£¬Catena»á¾²Ä¬ÅþÁ¬¹¥»÷Õß¿ØÖƵķþÎñÆ÷£¬´ó¶¼Î»ÓÚÏã¸Û£¬ÒÔÎüÊÕºóÐøÖ¸Áî»òÌØÊâ¶ñÒâ³ÌÐò¡£¸Ã¹¥»÷ËÆºõרÃÅÕë¶ÔÖÐÎÄÇéÐΣ¬Ä»ºó±£´æ¾ß±¸¸ß¶ÈÄÜÁ¦µÄÍþв×éÖ¯¡£Winos 4.0ÊÇ»ùÓÚ×ÅÃûÔ¶³ÌľÂíGh0st RAT´úÂë»ù´¡±àдµÄÏȽø¶ñÒâ¿ò¼Ü£¬¾ßÓÐÊý¾ÝÇÔÈ¡¡¢Ô¶³ÌShell»á¼û¼°·¢¶¯DDoS¹¥»÷µÈ¹¦Ð§¡£2025Äê·¢Ã÷µÄ»ùÓÚQQä¯ÀÀÆ÷µÄѬȾÁ÷³ÌÏÔʾ£¬ËùÓÐÏà¹Ø¹¥»÷ÔØÌå¾ùÒÀÀµNSIS×°ÖóÌÐò£¬ÕâЩװÖðüÀ¦°óÁ˾ÓÉÊðÃûµÄÓÕ¶üÓ¦Óã¬Í¨¹ý·´ÉäʽDLL×¢ÈëÊÖÒÕʵÏÖÒþ²Ø×¤Áô¡£ÔÚ2025Äê4Ô·¢Ã÷µÄLetsVPN×°Öðü¹¥»÷°¸ÀýÖУ¬¶ñÒâ³ÌÐòͨ¹ý½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£¬ÇÒ°üÀ¨¼ì²âϵͳÖÐÎÄÓïÑÔÉèÖõÄÏÔÐÔУÑ飬µ«×ÝȻδ·¢Ã÷ÖÐÎÄÇéÐÎÈÔ»á¼ÌÐøÖ´ÐС£±ðµÄ£¬¹¥»÷Õß»¹¾ÙÐÐÁË¡°Õ½Êõµ÷½â¡±£¬ÐÞ¸ÄÁËCatenaÖ´ÐÐÁ´µÄijЩ×é¼þ£¬ÐÂÔö·´É±¶¾¼ì²â¹æ±Ü¹¦Ð§£¬ÈçΪËùÓÐÇý¶¯Æ÷Ìí¼ÓMicrosoft Defenderɨ³ýÏ²¢Ê¹ÓÃÓâÆÚÖ¤ÊéÊðÃûµÄ¶ñÒâÔØºÉ·´Éäʽ¼ÓÔØDLLÎļþÒÔÅþÁ¬C2·þÎñÆ÷ÏÂÔØÖ´ÐÐWinos 4.0¡£
https://thehackernews.com/2025/05/hackers-use-fake-vpn-and-browser-nsis.html


¾©¹«Íø°²±¸11010802024551ºÅ