Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©Ó¦Á´¹¥»÷
Ðû²¼Ê±¼ä 2025-11-041. Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©Ó¦Á´¹¥»÷
11ÔÂ2ÈÕ£¬¿ËÈÕ£¬Open VSX×¢²á±íÒò¿ª·¢ÕßÒâÍâй¶»á¼ûÁîÅÆ£¬µ¼ÖÂÍþвÐÐΪÕßÌᳫ¹©Ó¦Á´¹¥»÷£¬ÔÚ¹«¹²´æ´¢¿âÖÐÐû²¼¶ñÒâÀ©Õ¹³ÌÐò¡£Á½ÖÜǰ£¬WizÑо¿Ö°Ô±·¢Ã÷Microsoft VSCodeºÍOpen VSXÊг¡Öг¬550¸öÉñÃØÐÅÏ¢Ôâй¶£¬²¿·ÖÉñÃØ¿É»á¼ûÏÂÔØÁ¿´ï15Íò´ÎµÄÏîÄ¿£¬Ê¹¹¥»÷ÕßÄÜÉÏ´«¶ñÒâÀ©Õ¹£¬×é³ÉÑÏÖØ¹©Ó¦Á´Î£º¦¡£Open VSXÓÉEclipse»ù½ð»á¿ª·¢£¬ÊÇ΢ÈíVisual Studio MarketplaceµÄ¿ªÔ´Ìæ»»¼Æ»®£¬ÎªVS Code IDE¼°¼æÈÝ·ÖÖ§ÌṩÀ©Õ¹Ö§³Ö¡£´Ë´ÎÊÂÎñÖУ¬Ð¹Â¶µÄÁîÅÆ±»ÓÃÓÚÃûΪ"GlassWorm"µÄ¶ñÒâÈí¼þ¹¥»÷£¬¸ÃÈí¼þʹÓò»¿É¼ûUnicode×Ö·ûÒþ²Ø×ÔÈö²¥¶ñÒâ´úÂ룬ÊÔͼÇÔÈ¡¿ª·¢Õ߯¾Ö¤²¢ÔÚ¿É»á¼ûÏîÄ¿ÖÐÒý·¢¼¶ÁªÎó²î£¬Ä¿µÄÖ±Ö¸49¸öÀ©Õ¹³ÌÐòµÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬ÄîÍ·ÒÉËÆ¾¼ÃÀûÒæ¡£×èÖ¹10ÔÂ21ÈÕ£¬ËùÓжñÒâÀ©Õ¹Òѱ»É¾³ý£¬Ïà¹ØÁîÅÆÍê³ÉÂÖ»»»ò×÷·Ï£¬ÊÂÎñÒÑÍêÈ«¿ØÖÆ¡£È»¶ø£¬Íþв²¢Î´ÖÕÖ¹¡£Ñо¿Ö°Ô±·¢Ã÷£¬GlassWorm±³ºóµÄͳһÍþвÐÐΪÕßÒÑ×ªÒÆÖÁGitHub£¬Ê¹ÓÃÏàͬUnicodeÒþдÊõ¼¼ÇÉÒþ²Ø¶ñÒâÔØºÉ£¬¹¥»÷¹æÄ£À©Õ¹ÖÁ¶à¸öJavaScriptÏîÄ¿´úÂë¿â¡£
https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/
2. ÐÂÐÍHttpTroyºóÃųÌÐòÕë¶Ôº«¹ú·¢¶¯¶¨ÏòÍøÂç¹¥»÷
11ÔÂ3ÈÕ£¬½üÆÚ£¬Ó볯ÏʹØÁªµÄÍþвÐÐΪÕßKimsuky¼°Lazarus GroupÒ»Á¬¸üÐÂÆä¹¥»÷ÎäÆ÷¿â£¬Õ¹ÏÖÊÖÒÕÑݽøÇ÷ÊÆ¡£¾ÝGen Digital¹«Ë¾Åû¶£¬KimsukyÕë¶Ôº«¹ú¼òµ¥Ä¿µÄÌᳫ´¹ÂÚ¹¥»÷£¬Í¨¹ýαװ³ÉVPNÕ˵¥µÄZIPѹËõÎļþ·Ö·¢ÐÂÐͺóÃųÌÐò¡°HttpTroy¡±¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈý½×¶Î¹¥»÷Á´ÊµÑ飺³õʼΪGoÓïÑÔ¶þ½øÖÆÎļþ£¨ÄÚǶαװPDFÎĵµÒÔ½µµÍÊܺ¦ÕßСÐÄ£©£¬ËæºóÆô¶¯MemLoad¼ÓÔØ³ÌÐò½¨É賤ÆÚ»¯»úÖÆ£¬×îÖÕ°²ÅÅHttpTroyºóÃÅ¡£¸ÃºóÃÅÖ§³ÖÎļþ´«Êä¡¢½ØÆÁ¡¢¸ßȨÏÞÏÂÁîÖ´ÐС¢·´ÏòShell½¨ÉèµÈ¹¦Ð§£¬Í¨¹ýHTTP POSTÓëC2·þÎñÆ÷ͨѶ£¬²¢½ÓÄɶà²ã»ìÏýÊÖÒÕ¹æ±Ü¼ì²â¡£Í¬Ê±£¬Lazarus GroupÕë¶Ô¼ÓÄôóÁ½ÃûÊܺ¦ÕßÌᳫ¹¥»÷£¬°²ÅÅ¡°Comebacker¡±¶ñÒâ³ÌÐò¼°ÆäÉý¼¶°æ¡°BLINDINGCAN¡±Ô¶³Ì»á¼ûľÂí¡£¹¥»÷Á´Öжα»¼ì²âµ½£¬³õʼ»á¼û;¾¶ÍƲâΪ´¹ÂÚÓʼþ¡£Comebacker±£´æDLLÓëEXEÁ½ÖÖ±äÌ壬ǰÕßͨ¹ýWindows·þÎñÆô¶¯£¬ºóÕß¾cmd.exeÖ´ÐУ¬×îÖÕ½âÃܲ¢°²ÅÅBLINDINGCAN£¬ºóÕßÓëC2·þÎñÆ÷ͨѶ£¬Ö§³ÖÎļþ²Ù×÷¡¢Àú³ÌÖÎÀí¡¢½ØÆÁ¡¢ºÛ¼£É¨³ýµÈ²Ù×÷¡£
https://thehackernews.com/2025/11/new-httptroy-backdoor-poses-as-vpn.html
3. ºÚ¿Í´ÓBalancer DeFi¼ÓÃÜÐÒéÇÔÈ¡Áè¼Ý1.2ÒÚÃÀÔª
11ÔÂ3ÈÕ£¬»ùÓÚÒÔÌ«·»µÄDeFiÐÒéBalancerµÄV2¿É¶Ñ·ÊÎȹ̳ØÔâÓöÖØ´óºÚ¿Í¹¥»÷£¬Ëðʧ³¬1.28ÒÚÃÀÔª£¬³ÉΪ½ñÄê¶È×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸Ö®Ò»¡£Balancer×÷Ϊ×Ô¶¯×öÊÐÉ̺ÍÁ÷¶¯ÐÔ»ù´¡ÉèÊ©£¬Ö§³Ö×Ô½ç˵´ú±Ò×éºÏ£¬ÆäV2³Ø´ËǰÒѽÓÊÜ11´ÎÇå¾²É󼯣¬µ«ÈÔÒòDZÔÚÎó²î±»Ê¹Óá£ÊÂÎñ±¬·¢ºó£¬BalancerÍŶÓѸËÙÓë¶¥¼âÇå¾²Ñо¿»ú¹¹ÏàÖúÊӲ죬²¢ÖÒÑÔÓû§Ð¡ÐÄ´¹ÂÚΣº¦¡£Îó²î³ÉÒò±£´æÁ½ÖÖÖ÷Á÷ÍÆ²â£ºÆäÒ»£¬GoPlus SecurityÖ¸³öV2½ð¿âµÄ½»Á÷ÅÌËã±£´æ¾«¶ÈÉáÈëÎó²î£¬Ã¿´Î¶Ò»»²Ù×÷ÏòÏÂÈ¡Õû´ú±ÒÊýÄ¿£¬¹¥»÷Õßͨ¹ýbatchSwapº¯ÊýÖØ¸´¶Ò»»£¬ÀÛ»ýϸС²î±ðµ¼Ö¼ÛǮŤÇú£»Æä¶þ£¬Çå¾²Ñо¿Ô±Aditya BajajÒÔΪ£¬¶ñÒâºÏÔ¼ÔÚ×Ê½ð³Ø³õʼ»¯½×¶ÎʹÓýð¿âŲÓã¬ÈƹýÇå¾²²½·¥£¬ÊµÏÖ¿ç³ØÎ´¾ÊÚȨµÄÓà¶îʹÓá£Ö»¹ÜÊÖÒÕϸ½ÚÉÐδÍêÈ«Ã÷È·£¬BalancerÔÊÐí½«Ðû²¼ÍêÕûʺóÆÊÎö¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ÊÂÎñ±¬·¢ºó£¬Õ©ÆÕßð³äBalancerÏòºÚ¿ÍÌᳫ¡°°×ñÉͽð¡±Ì¸ÅУ¬Éù³ÆÈôËÍ»¹×ʽð¿É»ñ20%Éâå¶£¬²»È»½«ÍŽáÇø¿éÁ´È¡Ö¤»ú¹¹¡¢Ö´·¨²¿·Ö¼°î¿ÏµÏàÖúͬ°é£¬Í¨¹ýIPµØµã¡¢ASNÅþÁ¬ÈÕÖ¾ºÍÁ´ÉÏÉúÒâʱ¼ä´Áʶ±ð¹¥»÷ÕßÉí·Ý¡£
https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/
4. SesameOp¶ñÒâÈí¼þÀÄÓÃOpenAI Assistants APIÌᳫ¹¥»÷
11ÔÂ3ÈÕ£¬Î¢ÈíÇå¾²ÍŶÓÔÚ2025Äê7ÔÂÊÓ²ìÍøÂç¹¥»÷ʱ£¬·¢Ã÷ÃûΪSesameOpµÄÐÂÐͺóÃŶñÒâÈí¼þ£¬¸ÃÈí¼þͨ¹ýÀÄÓÃOpenAI Assistants API×÷ΪÒþ²ØµÄÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨µÀ£¬ÊµÏÖ¹¥»÷Õß¶ÔÊÜѬȾÇéÐεĺã¾ÃÒ»Á¬»á¼û¡£Çø±ðÓڹŰåÒÀÀµ¶ñÒâ»ù´¡ÉèÊ©µÄ¹¥»÷·½·¨£¬SesameOpʹÓÃÕýµ±ÔÆ·þÎñ¾ÙÐÐÔ¶³ÌÖÎÀí£¬ÓÐÓùæ±ÜÁËÊܺ¦Õß¾¯±¨¼°ÊÂÎñÏìӦʱ´úµÄ¼ì²âΣº¦¡£¾Ý΢ÈíDARTÍŶӱ¨¸æ£¬SesameOpºóÃÅ×é¼þ½«OpenAI Assistants API×÷Ϊ´æ´¢ºÍÖм̻úÖÆ£¬»ñȡѹËõ¼ÓÃܵÄÖ¸Áîºó½âÃÜÖ´ÐУ»Í¬Ê±£¬¹¥»÷ÖÐÍøÂçµÄÐÅϢͨ¹ý¶Ô³ÆÓë·Ç¶Ô³Æ¼ÓÃÜÍŽáµÄ·½·¨£¬¾Í³Ò»APIͨµÀ»Ø´«¹¥»÷Õß¡£¸Ã¶ñÒâÈí¼þ¹¥»÷Á´°üÀ¨¸ß¶È»ìÏýµÄ¼ÓÔØÆ÷ºÍ»ùÓÚ.NETµÄºóÃųÌÐò£¬ºóÕßͨ¹ý.NET AppDomainManager×¢Èëµ½Microsoft Visual Studio¹¤¾ßÖУ¬ÍŽáÄÚ²¿Web Shell¼°¡°Õ½ÂÔÐÔ°²ÅÅ¡±µÄ¶ñÒâÀú³Ì½¨É賤ÆÚÐÔ£¬Ö§³Öºã¾ÃÌØ¹¤Ô˶¯¡£Î¢ÈíÇ¿µ÷£¬´Ë´Î¹¥»÷²¢·ÇʹÓÃOpenAIƽ̨Îó²î»òÉèÖùýʧ£¬¶øÊÇÀÄÓÃAssistants APIµÄÄÚÖù¦Ð§¡£Î¢ÈíÓëOpenAIÒÑÏàÖúʶ±ð²¢½ûÓù¥»÷ÖÐʹÓõÄÕË»§¼°APIÃÜÔ¿¡£
https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/
5. È«Çò»õÔËÐÐÒµÔâRMM¹¤¾ß¹¥»÷Òý·¢¹©Ó¦Á´ÍµÇÔΣ»ú
11ÔÂ3ÈÕ£¬½üÆÚ£¬Õë¶Ô»õÔ˾¼ÍÈ˺Ϳ¨³µÔËÊ乫˾µÄÍøÂç¹¥»÷·ºÆð¹æÄ£»¯Ç÷ÊÆ¡£¾ÝProofpointÑо¿£¬×Ô2025Äê1ÔÂÆð£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÁ´½ÓºÍ´¹ÂÚÓʼþÒ»Á¬°²ÅÅÔ¶³Ì¼à¿ØÖÎÀí£¨RMM£©¹¤¾ß£¨ÈçScreenConnect¡¢SimpleHelpµÈ£©£¬ÔÚ±±ÃÀ¡¢°ÍÎ÷¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢µÂ¹ú¡¢ÖÇÀû¼°ÄÏ·ÇµÈ¶àµØÊµÑé¹¥»÷¡£½ö8ÔÂÒÔÀ´ÒѼͼ½ü24ÆðÔ˶¯£¬µ¥´Î¹¥»÷×î¶à·¢ËÍ1000ÌõÐÅÏ¢¡£¹¥»÷Õß½ÓÄÉË«ÖØÉøÍ¸Õ½ÂÔ£ºÒ»·½ÃæÊ¹Óñ»µÁ»õÔËÆ½Ì¨ÕË»§Ðû²¼ÐéØÍÆ·ÔËÐÅÏ¢£¬ÁíÒ»·½ÃæÈëÇÖ»õÔ˾¼ÍÈ˼°µ÷ÀíÔ±ÓÊÏä£¬Ð®ÖÆÓʼþÏß³ÌÓÕµ¼Êܺ¦Õß»á¼ûαÔìÒ³Ãæ¡£ÕâÐ©Ò³ÃæÍ¨¹ý¾«×¼¸´ÖÆÔËÓªÉÌÆ·ÅƱêʶÔöÇ¿¿ÉÐŶȣ¬ÓÕÆÓû§ÏÂÔØ.exe»ò.msiÎļþ×°ÖÃRMM¹¤¾ß¡£Ò»µ©Àֳɰ²ÅÅ£¬¹¥»÷Õß¼´¿ÉÍêÈ«¿ØÖÆÏµÍ³£¬ÊµÏÖÐÞ¸ÄÔËÊäõè¾¶¡¢ÆÁÕϵ÷Àí֪ͨ¡¢Ã°³äÕýµ±³ÐÔËÈ˵ȲÙ×÷£¬×îÖÕÐ®ÖÆ¸ß¼ÛÖµ»õÎÈçʳÎï¡¢µç×Ó²úÆ·£©²¢×ªÊÛ»ò×ß˽¡£
https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/
6. ÈÕ±¾AskulÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶£¬¹©Ó¦Á´Êܲ¨¼°
11ÔÂ3ÈÕ£¬ÈÕ±¾°ì¹«¼°¼Ò¾ÓÓÃÆ·ÁãÊÛÉÌAskul¿ËÈÕ֤ʵ£¬10Ô³õÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬¿Í»§Ó빩ӦÉÌÊý¾ÝÔâй¶£¬Æäµç×ÓÉÌÎñƽ̨ÔËÓªÖÐÖ¹¡£´Ë´ÎÊÂÎñ²¨¼°ÆìÏÂÍøµê£¨Askul¡¢Lohaco¡¢Soloel Arena£©£¬Ð¹Â¶ÄÚÈݰüÀ¨Óû§ÁªÏµ·½·¨¡¢Ñ¯ÅÌÏêÇé¼°´æ´¢ÓÚÄÚ²¿·þÎñÆ÷µÄ¹©Ó¦ÉÌÊý¾Ý¡£AskulÔÚÉùÃ÷ÖÐÖÂǸ£¬³ÆÕýÊÓ²ìRansomHouse×éÖ¯Éù³ÆµÄ1.1TBÊý¾ÝÇÔÈ¡ÊÂÎñ¡£¹¥»÷Ó°ÏìÑÓÉìÖÁ¹©Ó¦Á´ÏàÖúͬ°é£ºÒÀÀµAskulÎïÁ÷ÍøÂçµÄÈÕ±¾´óÐÍÁãÊÛÉÌÁ¼Æ·ÍýÏ루ı»®ÎÞÓ¡Á¼Æ·Muji£©ºÍThe LoftËäδÃ÷È·×ÔÉíÊý¾ÝÊÇ·ñй¶£¬µ«¹©Ó¦Á´ÒÑÊÜÈÅÂÒ¡£RansomHouse×éÖ¯ÒÔ¡°²»¼ÓÃܽöÍþв¹ûÕæÊý¾Ý¡±µÄÀÕË÷ÊÖ¶ÎÖøÃû£¬×ÔÚ¼¡°ÕýÒåʵÁ¦¡±ÒÔ½ÒÆÆÆóÒµÎó²î¡£¸Ã×éÖ¯½¨ÉèÓÚ2022Äê3Ô£¬ÍøÂçÇå¾²Ñо¿Òѽ«ÆäÓë¶íÂÞ˹¹ØÁªµÄÍþвÐÐΪÕߣ¨ÈçAlphv/BlackCat¡¢LockBit 3.0¡¢RagnarLocker£©¹Ò¹³¡£
https://therecord.media/askul-confirms-data-breach-ransomware-incident


¾©¹«Íø°²±¸11010802024551ºÅ