È«Çò70Óà×éÖ¯ÔâVoldemortÌØ¹¤Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-02

1. È«Çò70Óà×éÖ¯ÔâVoldemortÌØ¹¤Èí¼þ¹¥»÷


9ÔÂ1ÈÕ£¬£¬£¬£¬£¬ £¬£¬Proofpoint Ñо¿Ö°Ô±½ÒÆÆÁËÒ»ÆðÖØ´óµÄÌØ¹¤»î¶¯£¬£¬£¬£¬£¬ £¬£¬¸Ã»î¶¯Í¨¹ýÃûΪ¡°Voldemort¡±µÄ¶¨ÖƶñÒâÈí¼þ£¬£¬£¬£¬£¬ £¬£¬Ó°ÏìÈ«Çò70¶à¸ö×éÖ¯¡£¡£¡£¡£¡£¡£¡£¡£´Ë¶ñÒâÈí¼þͨ¹ýÁè¼Ý20,000·â´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬£¬ £¬£¬ÌØÊâÊÇ8ÔÂ17ÈÕ¼¤Ôö½ü6,000·â£¬£¬£¬£¬£¬ £¬£¬Óʼþαװ¶à¹ú˰Îñ»ú¹ØÓÕÆ­Óû§¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¹ÓÃGoogle AMP Cache URL¡¢CloudflareËíµÀ¡¢WebDAV¹²Ïí¼°Python¾ç±¾µÈÊÖÒÕ£¬£¬£¬£¬£¬ £¬£¬ÇÉÃîÖ¸µ¼Óû§ÏÂÔØ²¢Ö´ÐжñÒâLNK»òZIPÎļþ¡£¡£¡£¡£¡£¡£¡£¡£VoldemortµÄÒ»´óÌØµãÊÇʹÓÃGoogle±í¸ñ¾ÙÐÐÏÂÁîÓë¿ØÖÆ£¨C2£©£¬£¬£¬£¬£¬ £¬£¬¹æ±Ü¹Å°åÇå¾²¼ì²â£¬£¬£¬£¬£¬ £¬£¬ÏÔʾÁ˸߶ȵÄÒþ²ØÐÔºÍÁ¢ÒìÐÔ¡£¡£¡£¡£¡£¡£¡£¡£ÆäÄ¿µÄÖ÷ÒªËø¶¨ÔÚ°ü¹Ü¹«Ë¾¡¢º½¿Õº½Ìì¡¢½»Í¨ÔËÊä¼°´óѧµÈ18¸ö±ÊÖ±ÐÐÒµ£¬£¬£¬£¬£¬ £¬£¬ÇÒ¾«×¼¶¨Î»Êܺ¦ÕßÖÁÆäÆÜÉí¹ú£¬£¬£¬£¬£¬ £¬£¬ÏÔʾ³öÉîÌõÀíµÄÌØ¹¤ÄîÍ·¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬¸Ã¶ñÒâÈí¼þ»¹½ÓÄÉÓÐÊýµÄWindows .search-msÎļþÃûÌ㬣¬£¬£¬£¬ £¬£¬Î±×°Ô¶³ÌÎļþΪÍâµØÎļþ£¬£¬£¬£¬£¬ £¬£¬Á¬ÏµDLLÐ®ÖÆÊÖÒÕ£¬£¬£¬£¬£¬ £¬£¬½øÒ»²½ÔöÌíѬȾÀÖ³ÉÂÊ¡£¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ £¬£¬¹¥»÷»î¶¯ÖÐҲ̻¶³öһЩ¼òª֮´¦£¬£¬£¬£¬£¬ £¬£¬ÈçʹÓüòÆÓµÄÎļþÃüÃûÔ¼¶¨£¬£¬£¬£¬£¬ £¬£¬Ê¹µÃ¸Ã»î¶¯·ºÆð³ö¡°¸¥À¼¿Ï˹̹ÊÓÑìºÏÌ塱µÄÌØµã£¬£¬£¬£¬£¬ £¬£¬ÄÑÒÔÅжÏÍþвÐÐΪÕßµÄÕæÊµÊÖÒÕˮƽ¡£¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/cyber-espionage-campaign-leverages-novel-tactics-and-voldemort-malware-to-target-global-organizations/https://securityonline.info/cyber-espionage-campaign-leverages-novel-tactics-and-voldemort-malware-to-target-global-organizations/


2. APT×éÖ¯Citrine SleetʹÓÃChrome 0day°²ÅÅFudModule rootkit


8ÔÂ31ÈÕ£¬£¬£¬£¬£¬ £¬£¬Ó볯ÏÊÓйØÁªµÄAPT×éÖ¯Citrine Sleet£¨Òà³ÆAppleJeus¡¢Labyrinth ChollimaµÈ£©Ê¹ÓÃÐÂÐÞ²¹µÄGoogle ChromeÁãÈÕÎó²îCVE-2024-7971£¬£¬£¬£¬£¬ £¬£¬Àֳɰ²ÅÅÁËFudModule rootkit¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVSSÆÀ·Ö8.8£©Ó°ÏìÌØ¶¨°æ±¾µÄChromium£¬£¬£¬£¬£¬ £¬£¬ÔÊÐí¹¥»÷ÕßÔÚɳºÐ»¯µÄäÖȾÆ÷Àú³ÌÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£¡£¡£Citrine Sleetͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÕ½ÂÔ£¬£¬£¬£¬£¬ £¬£¬ÓÕʹÊܺ¦Õß»á¼ûÆä¿ØÖƵĶñÒâÓòÃû£¬£¬£¬£¬£¬ £¬£¬½ø¶ø´¥·¢CVE-2024-7971Îó²î£¬£¬£¬£¬£¬ £¬£¬ÏÂÔØ²¢Ö´ÐаüÀ¨WindowsɳºÐÌÓÒÝÎó²î£¨CVE-2024-38106£©ºÍFudModule rootkitµÄshellcode¡£¡£¡£¡£¡£¡£¡£¡£FudModule rootkit½ÓÄÉÖ±½ÓÄں˹¤¾ß²Ù×÷£¨DKOM£©ÊÖÒÕ£¬£¬£¬£¬£¬ £¬£¬´ÓÓû§Ä£Ê½ÔËÐв¢¸Ä¶¯Äںˣ¬£¬£¬£¬£¬ £¬£¬×ÌÈÅÇå¾²»úÖÆ£¬£¬£¬£¬£¬ £¬£¬Ö»¹ÜÔÚÄ¿µÄ×°±¸ÉÏδ¼ì²âµ½ºóÐø¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬£¬CVE-2024-38106ËäÒÑÐÞ¸´£¬£¬£¬£¬£¬ £¬£¬µ«¿ÉÄÜÓëCitrine SleetµÄʹÓûÎÞÖ±½Ó¹ØÁª£¬£¬£¬£¬£¬ £¬£¬ÌåÏÖ¿ÉÄܱ£´æ¡°Îó²îÅöײ¡±Õ÷Ï󡣡£¡£¡£¡£¡£¡£¡£MicrosoftÇ¿µ÷£¬£¬£¬£¬£¬ £¬£¬×é֯Ӧȷ±£ÏµÍ³ÊµÊ±¸üУ¬£¬£¬£¬£¬ £¬£¬°²Åž߱¸ÖÜÈ«ÍøÂç¹¥»÷Á´¿É¼ûÐÔµÄÇå¾²½â¾ö¼Æ»®£¬£¬£¬£¬£¬ £¬£¬²¢ÔöÇ¿²Ù×÷ÇéÐÎÉèÖ㬣¬£¬£¬£¬ £¬£¬ÒÔÓÐÓüì²âºÍ×èÖ¹´ËÀà¸ß¼¶Íþв¡£¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/167848/breaking-news/north-korea-linked-apt-exploited-chrome-zero-day-cve-2024-7971.html


3. GitHub ÔâÀÄÓãºÊýǧÌõÐéαÐÞ¸´Ì¸ÂÛ·Ö·¢Lumma Stealer¶ñÒâÈí¼þ


8ÔÂ31ÈÕ£¬£¬£¬£¬£¬ £¬£¬GitHub ƽ̨½üÆÚÔâÓöÁËÀÄÓ㬣¬£¬£¬£¬ £¬£¬²»·¨·Ö×Óͨ¹ýÔÚÏîĿ̸ÂÛÖÐÐû²¼ÐéαÐÞ¸´³ÌÐòµÄ·½·¨£¬£¬£¬£¬£¬ £¬£¬ÆÕ±é·Ö·¢ Lumma Stealer ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£ÕâÒ»»î¶¯×î³õÓÉteloxide rust¿âµÄТ˳ÕßÔÚRedditÉÏ½ÒÆÆ£¬£¬£¬£¬£¬ £¬£¬ËæºóBleepingComputerÉîÈëÊӲ췢Ã÷£¬£¬£¬£¬£¬ £¬£¬ÊýǧÌõÀàËÆÌ¸ÂÛÒѱ鲼GitHub¶à¸öÏîÄ¿£¬£¬£¬£¬£¬ £¬£¬ÓÕµ¼Óû§ÏÂÔØ²¢Ö´ÐаüÀ¨¶ñÒâÈí¼þµÄÎļþ¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ̸ÂÛαװ³ÉÎÊÌâ½â¾ö¼Æ»®£¬£¬£¬£¬£¬ £¬£¬ÓÕÆ­Óû§´Ómediafire.com»òbit.lyÁ´½ÓÏÂÔØÃûΪ¡°fix.zip¡±µÄ¼ÓÃÜ´æµµ£¬£¬£¬£¬£¬ £¬£¬²¢ÌáÐÑʹÓÃͳһÃÜÂë¡°changeme¡±½âËø¡£¡£¡£¡£¡£¡£¡£¡£ÈýÌìÄÚ£¬£¬£¬£¬£¬ £¬£¬´ËÀàÍÆ¹ã¶ñÒâÈí¼þµÄ̸ÂÛÊýÄ¿¼¤ÔöÖÁÁè¼Ý29,000Ìõ¡£¡£¡£¡£¡£¡£¡£¡£ÏÂÔØµÄ´æµµÖаüÀ¨DLLÎļþºÍ¿ÉÖ´ÐÐÎļþx86_64-w64-ranlib.exe£¬£¬£¬£¬£¬ £¬£¬¾­ÆÊÎöÈ·ÒÔΪLumma Stealer£¬£¬£¬£¬£¬ £¬£¬Ò»ÖÖÄܹ»ÉîÈëÓû§ä¯ÀÀÆ÷ÇÔÈ¡Ãô¸ÐÐÅÏ¢µÄ¸ß¼¶ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬Ëü»¹Õë¶Ô¼ÓÃÜÇ®±ÒÇ®°üºÍÌØ¶¨ÃüÃûµÄÎı¾Îļþ¾ÙÐÐËÑË÷£¬£¬£¬£¬£¬ £¬£¬ÍøÂç¿ÉÄܰüÀ¨Ë½Ô¿ºÍÃÜÂëµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜGitHubѸËÙÏìÓ¦²¢É¾³ýÁËÕâЩ¶ñÒâ̸ÂÛ£¬£¬£¬£¬£¬ £¬£¬µ«ÒÑÓÐÓû§Êܺ¦¡£¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÓû§ÐèÁ¬Ã¦ÎªËùÓÐÕË»§Ì滻ΨһÃÜÂ룬£¬£¬£¬£¬ £¬£¬²¢½«¼ÓÃÜÇ®±Ò×ªÒÆÖÁÐÂÇ®°ü¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-password-stealing-malware-masked-as-fixes/


4. ÖØ´óÍøÂç´¹ÂÚ¹¥»÷½ÒÆÆ£ºAsyncRATÓëInfostealerÁªÊÖÍþвÓû§Çå¾²


8ÔÂ31ÈÕ£¬£¬£¬£¬£¬ £¬£¬eSentire ÍþвÏìÓ¦²¿·Ö£¨TRU£©µÄÑо¿Ö°Ô±½ÒÆÆÁËÒ»ÏîÖØ´óµÄÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬¸Ã¹¥»÷ʹÓÃÈ«ÐÄÉè¼ÆµÄѬȾÁ´·Ö·¢ AsyncRAT Ô¶³Ì»á¼ûľÂí£¨RAT£©¼°ÆäÐÅÏ¢ÇÔÈ¡²å¼þ Infostealer¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»·â¿´ËÆÎÞº¦µÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬ £¬£¬ÄÚº¬Î±×°³ÉÕý³£ÎļþµÄ¶ñÒâ´æµµ¡£¡£¡£¡£¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬ £¬£¬ÕâÒ»´æµµ´¥·¢ÁËһϵÁÐÖØ´ó²Ù×÷£¬£¬£¬£¬£¬ £¬£¬°üÀ¨ÏÂÔØ²¢Ö´ÐлìÏýµÄ VBScript ºÍ PowerShell ¾ç±¾£¬£¬£¬£¬£¬ £¬£¬×îÖÕ°²ÅÅ AsyncRAT ¼°Æä²å¼þ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬£¬£¬ £¬£¬¶ñÒâÈí¼þͨ¹ýÏÂÔØ¿´ËÆÎÞº¦µÄͼÏñÎļþ£¨ÊµÎª ZIP ´æµµ£©²¢½âѹ³ö¸ü¶à¶ñÒâ¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬ £¬£¬ÔÚÊܺ¦ÕßϵͳÖÐÔú¸ù¡£¡£¡£¡£¡£¡£¡£¡£ËüʹÓÃÍýÏëʹÃüά³Ö³¤ÆÚÐÔ£¬£¬£¬£¬£¬ £¬£¬Ã¿Á½·ÖÖÓÖ´ÐÐÒ»´Î¶ñÒâ´úÂ룬£¬£¬£¬£¬ £¬£¬²¢Í¨¹ýÀú³Ì¿ÕÐÄ»¯ÊÖÒÕ½« AsyncRAT ×¢ÈëÕýµ±Àú³ÌÖÐÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£¡£AsyncRAT ²»µ«Îª¹¥»÷ÕßÌṩ¶ÔÊÜѬȾϵͳµÄÔ¶³Ì¿ØÖÆÈ¨£¬£¬£¬£¬£¬ £¬£¬»¹´îÔØÁË Infostealer ²å¼þ£¬£¬£¬£¬£¬ £¬£¬¸Ã²å¼þרÃÅÃé×¼ÍøÂçä¯ÀÀÆ÷ÖеļÓÃÜÇ®°üÀ©Õ¹ºÍ2FAÑéÖ¤¹¤¾ß£¬£¬£¬£¬£¬ £¬£¬Ö¼ÔÚÇÔÈ¡°üÀ¨ÃÜÂ롢ƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÔÚÄÚµÄÃû¹óÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£eSentire TRU ºôÓõÓû§¼á³Ö¸ß¶ÈСÐÄ¡£¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/evasive-phishing-campaign-delivers-asyncrat-and-infostealer/


5. People Data Labs1.7ÒÚÌõÃô¸ÐÐÅÏ¢ÎÞÃÜÂë̻¶


8ÔÂ30ÈÕ£¬£¬£¬£¬£¬ £¬£¬CybernewsÑо¿ÍŶӽüÆÚ·¢Ã÷ÁËÒ»ÏîÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ £¬£¬Éæ¼°Áè¼Ý1.7ÒÚÌõÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢ÔÚ»¥ÁªÍøÉϹûÕæÌ»Â¶£¬£¬£¬£¬£¬ £¬£¬Êý¾ÝÄÚÈÝÏ꾡£¬£¬£¬£¬£¬ £¬£¬°üÀ¨È«Ãû¡¢ÁªÏµ·½·¨¡¢µØµã¡¢½ÌÓýÅä¾°¼°ÊÂÇéÂÄÀúµÈ¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¼¯±êÓС°PDL¡±±êʶ£¬£¬£¬£¬£¬ £¬£¬Ö¸Ïò¾É½ðɽµÄÊý¾Ý¾­¼Í¹«Ë¾People Data Labs£¨PDL£©£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾×Ô³ÆÓµÓÐ15ÒÚСÎÒ˽¼Òµµ°¸Êý¾Ý¿â£¬£¬£¬£¬£¬ £¬£¬Ð§ÀÍÓÚÆóÒµÓªÏú¡¢ÏúÊÛ¼°ÕÐÆ¸µÈÁìÓò¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÊý¾Ýй¶ԴͷÉÐδÃ÷È·£¬£¬£¬£¬£¬ £¬£¬µ«ElasticsearchЧÀÍÆ÷δÉèÃÜÂëµÄÑÏÖØÇå¾²Îó²î³ÉΪ½¹µã£¬£¬£¬£¬£¬ £¬£¬ÕâÖÖÉèÖü«Ò×±»ºÚ¿ÍʹÓ㬣¬£¬£¬£¬ £¬£¬Ñ¸ËÙÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬ £¬£¬¶ÔСÎÒ˽¼ÒÒþ˽×é³ÉÖØ´óÍþв£¬£¬£¬£¬£¬ £¬£¬ÔöÌíÉí·Ý͵ÇÔ¡¢Ú²Æ­¼°ÍøÂç´¹ÂÚΣº¦¡£¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬£¬PDL´ËǰÒѱ¬·¢¹ýÀàËÆµÄÊý¾Ýй¶Ê¹Ê£¬£¬£¬£¬£¬ £¬£¬Í¬ÑùÒòδ±£»£»£»£»£»£»£»¤µÄElasticsearchЧÀÍÆ÷µ¼Ö£¬£¬£¬£¬£¬ £¬£¬Éæ¼°Êý¾Ý¹æÄ£¸üÎªÖØ´ó¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄ¡°Version 26.2¡±Êý¾Ý¼¯¿ÉÄÜÓë´ËǰÊÂÎñÓйØÁª£¬£¬£¬£¬£¬ £¬£¬ÔÙ´Î̻¶ÁËPDLÔÚÊý¾ÝÇå¾²·½ÃæµÄÖØ´óȱÏÝ¡£¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/people-data-labs-data-leak/


6. Roblox¿ª·¢Ö°Ô±ÆµÔâ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬Î±Ôìnpm°üÈö²¥¶ñÒâÈí¼þ


9ÔÂ2ÈÕ£¬£¬£¬£¬£¬ £¬£¬Roblox ¿ª·¢Ö°Ô±³ÉΪһϵÁжñÒâ¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬ £¬£¬ÕâЩ¹¥»÷ͨ¹ýαÔì npm °ü£¬£¬£¬£¬£¬ £¬£¬ÓÈÆäÊÇÄ£ÄâÊ¢ÐÐµÄ noblox.js ¿â£¬£¬£¬£¬£¬ £¬£¬ÍýÏëÇÔÈ¡Ãô¸ÐÊý¾ÝºÍÆÆËðϵͳ¡£¡£¡£¡£¡£¡£¡£¡£×Ô½ñÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬¶à¸öÃûΪ noblox.js ±äÖÖµÄÈí¼þ°ü±»È·ÒÔΪ¶ñÒ⣬£¬£¬£¬£¬ £¬£¬°üÀ¨ noblox.js-proxy-server ºÍ noblox-ts£¬£¬£¬£¬£¬ £¬£¬ËüÃÇͨ¹ýÆ·ÅÆÐ®ÖÆ¡¢×éºÏÇÀ×¢ºÍÐǺÅÐ®ÖÆµÈÊÖÒÕαװ³ÉÕýµ±¿â£¬£¬£¬£¬£¬ £¬£¬ÓÕµ¼¿ª·¢ÕßÏÂÔØ¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ°üÈç noblox.js-async¡¢noblox.js-thread µÈ£¬£¬£¬£¬£¬ £¬£¬Ö»¹ÜÏÂÔØÁ¿ÓÐÏÞ£¬£¬£¬£¬£¬ £¬£¬È´ÀÖ³ÉÓÕÆ­ÁËÓû§¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß»¹½ÓÄÉ starjacking ÊÖ·¨£¬£¬£¬£¬£¬ £¬£¬½«ÐéαÈí¼þ°üµÄÔ´´æ´¢¿â±ê¼ÇΪÏÖʵ noblox.js ¿â£¬£¬£¬£¬£¬ £¬£¬ÔöÇ¿ÐÅÈζÈ¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÄÚǶµÄ´úÂë²»µ«ÇÔÈ¡ Discord ÁîÅÆ£¬£¬£¬£¬£¬ £¬£¬»¹Í¨¹ýÐÞ¸Ä Windows ×¢²á±íºÍ¸üзÀ²¡¶¾É¨³ýÁбíÀ´Ìӱܼì²âºÍά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£¡£Ã¿µ±Óû§ÊµÑé·­¿ª Windows ÉèÖÃÓ¦ÓÃʱ£¬£¬£¬£¬£¬ £¬£¬¶ñÒâÈí¼þ±ã»á±»¼¤»î¡£¡£¡£¡£¡£¡£¡£¡£×îÖÕÄ¿µÄÊǰ²ÅÅ Quasar RAT£¬£¬£¬£¬£¬ £¬£¬Ê¹¹¥»÷ÕßÄÜÔ¶³Ì¿ØÖÆÊÜѬȾϵͳ£¬£¬£¬£¬£¬ £¬£¬²¢½«ÍøÂçµ½µÄÐÅϢͨ¹ý Discord webhook ·¢ËÍÖÁ C2 ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÒÑÓв½·¥É¨³ýÕâЩ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ £¬£¬µ«ÐÂÈí¼þ°üÈÔÒ»Ö±·ºÆð£¬£¬£¬£¬£¬ £¬£¬ÌáÐÑ¿ª·¢Ö°Ô±Ðè¼á³Ö¸ß¶ÈСÐÄ¡£¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/09/malicious-npm-packages-mimicking.html