ViciousTrapºÚ¿Í×éÖ¯ÀûÓ÷ì϶¹¹½¨ÀàÃÛ¹ÞÍøÂç
°ä²¼¹¦·ò 2025-05-261. ViciousTrapºÚ¿Í×éÖ¯ÀûÓ÷ì϶¹¹½¨ÀàÃÛ¹ÞÍøÂç
5ÔÂ23ÈÕ£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶£¬£¬´úºÅViciousTrapµÄºÚ¿Í×éÖ¯ÒÑÈëÇÖÈ«Çò84¸ö¹ú¶È½ü5300Ì¨ÍøÂç±ßÔµÉ豸£¬£¬½«ÆäˢгÉÀàÃÛ¹ÞÍøÂç¡£¸Ã×éÖ¯ÀûÓÃ˼¿ÆÐ¡ÐÍÆóҵ·ÓÉÆ÷¶à¿îÐͺŵĹؼü·ì϶CVE-2023-20118Ö´Ðдó¹æÄ£ÈëÇÖ£¬£¬ÆäÖÐ850̨ÊÜ¿ØÉ豸λÓÚ°ÄÃÅ¡£°²È«¹«Ë¾SekoiaÔÚ·ÖÎö»ã±¨ÖÐÖ¸³ö£¬£¬Ï°È¾Á´Éæ¼°Ö´ÐÐÃûΪNetGhostµÄshell¾ç±¾£¬£¬¸Ã¾ç±¾Äܽ«±»ÈëÇÖ·ÓÉÆ÷µÄÁ÷Á¿Öض¨ÏòÖÁ¹¥»÷Õß½ÚÖÆµÄÀàÃÛ¹ÞÉèÊ©£¬£¬ÊµÏÖÍøÂçÁ÷Á¿½Ù³Ö¡£´Ëǰ£¬£¬·¨¹úÍøÂ簲ȫ¹«Ë¾Ôø½«¸Ã·ì϶ÀûÓùéÒòÓÚPolarEdge½©Ê¬ÍøÂ磬£¬²»ÍâĿǰÉÐÎÞÖ¤¾ÝÅú×¢¶þÕßÓйØÁª¡£ViciousTrap±³ºóµÄ×éÖ¯Õýͨ¹ýÈëÇÖ´óÁ¿Â¶³öÓÚ»¥ÁªÍøµÄÉ豸¹¹½¨ÃÛ¹Þ»ù´¡ÉèÊ©£¬£¬Éæ¼°50Óà¸ö³§É̵ÄSOHO·ÓÉÆ÷¡¢¡¢SSL VPNµÈ¶àÖÖÉ豸¡£ÕâÖּܹ¹Ê¹¹¥»÷ÕßÄܹ۲ì¶à»·¾³ÉøÈë³¢ÊÔ£¬£¬¿ÉÄÜÍøÂçδ¹«¿ª»òÁãÈÕ·ì϶ÀûÓù滮£¬£¬²¢½Ù³ÖÆäËûÍþв×éÖ¯µÄÈëÇֳɾ͡£¹¥»÷Á´ÏÈͨ¹ý·ì϶ÀûÓÃÏÂÔØbash¾ç±¾£¬£¬½ø¶øÖ´Ðеڶþ½×¶ÎµÄNetGhost¾ç±¾£¬£¬¸Ã¾ç±¾¾ß±¸Á÷Á¿Öض¨ÏòÖ°ÄÜ£¬£¬¿ÉÖ´ÐÐÖÐÑëÈ˹¥»÷£¬£¬»¹¾ß±¸×Ôɾ³ýÄÜÁ¦ÒÔÏ÷¼õȡ֤ºÛ¼£¡£ËùÓй¥»÷³¢ÊÔ¾ùÔ´×Ôµ¥Ò»IPµØÖ·£¬£¬×îÔç»î¶¯¿É×·ÒäÖÁ2025Äê3Ô£¬£¬´ÎÔ¸Ã×éÖ¯»¹½«PolarEdge½©Ê¬ÍøÂçÔøÊ¹ÓõÄδ¹«¿ªWebShell¹¤¾ß¸Ä×÷¼ºÓᣱ¾ÔÂ×îй¥»÷»î¶¯×ªÏò»ªË¶Â·ÓÉÆ÷£¬£¬Ê¹ÓÃÁíÒ»IPµØÖ·£¬£¬µ«Î´²¿ÊðÃÛ¹Þ£¬£¬ËùÓлîÔ¾IP¾ùλÓÚÂíÀ´Î÷ÑÇ£¬£¬¹éÊôÍйܷþÎñÉÌShinjiruÔËÓªµÄ×ÔÖÎϵͳ¡£
https://thehackernews.com/2025/05/vicioustrap-uses-cisco-flaw-to-build.html
2. NPMÉϵÄÊýÊ®¸ö¶ñÒâÈí¼þ°üÍøÂçÖ÷»úºÍÍøÂçÊý¾Ý
5ÔÂ23ÈÕ£¬£¬SocketÍþв×êÑÐÍŶÓÔÚNPMË÷ÒýÖз¢ÏÖÁËÁ½Æð¶ñÒâÈí¼þ°ü»î¶¯¡£µÚÒ»Â·Éæ¼°60¸ö¶ñÒâÈí¼þ°ü£¬£¬ËüÃÇ×Ô5ÔÂ12ÈÕÆð´ÓÈý¸ö°ä²¼ÕßÕË»§ÉÏ´«ÖÁNPM´æ´¢¿â¡£ÕâЩÈí¼þ°üÔ̺¬×°Öúó¾ç±¾£¬£¬ÔÚ¡°npm install¡±ÆÚ¼ä×Ô¶¯Ö´ÐУ¬£¬ÍøÂçÔ̺¬Ö÷»úÃû¡¢¡¢ÄÚ²¿IPµØÖ·¡¢¡¢Óû§Ö÷Ŀ¼µÈÃô¸ÐÐÅÏ¢£¬£¬²¢·¢Ë͵½ÍþвÐÐΪÕß½ÚÖÆµÄDiscord webhook¡£¸Ã¾ç±¾»¹¾ß±¸»·¾³¼ì²âÖ°ÄÜ£¬£¬ÒÔÈ·¶¨ÊÇ·ñÔÚ·ÖÎö»·¾³ÖÐÔËÐС£Ö»¹ÜĿǰδ¹Û²ìµ½µÚ¶þ½×¶ÎÓÐÐ§ÔØºÉµÄͶµÝ¡¢¡¢È¨ÏÞÌáÉý»òÓÆ¾Ã»úÖÆ£¬£¬µ«Ë¼¿¼µ½ËùÍøÂçÊý¾ÝµÄÃô¸ÐÐÔ£¬£¬´ËÀ๥»÷µÄΣÏÕÐÔÏ൱¸ß¡£ÕâЩ¶ñÒâÈí¼þ°üÔøÀÛ¼ÆÏÂÔØ3000´Î£¬£¬²»ÍâÔڻ㱨°ä²¼Ê±ÒÑ´ÓNPM´æ´¢¿âÖÐÒþû¡£ÎªÓÕÆ¿ª·¢ÈËÔ±£¬£¬ÍþвÐÐΪÕßʹÓÃÁËÓëºÏ·¨Èí¼þ°üÀàËÆµÄÃû³Æ£¬£¬¿ÉÄÜÕë¶ÔCI/CD¹ÜµÀ¡£Áíһ·¶ñÒâ»î¶¯Éæ¼°°Ë¸öÈí¼þ°ü£¬£¬ËüÃÇͨ¹ýÓòÃûÇÀ×¢·ÂÕÕReact¡¢¡¢Vue.js¡¢¡¢Vite¡¢¡¢Node.jsºÍQuillÉú̬ϵͳµÄºÏ·¨¹¤¾ß£¬£¬µ«¾ß±¸Êý¾Ý²Á³ýÖ°ÄÜ£¬£¬¿Éɾ³ýÎļþ¡¢¡¢°Ü»µÊý¾ÝºÍ¹Ø±Õϵͳ¡£ÕâЩÈí¼þ°ü´ÓǰÁ½ÄêÒ»Ïò´æÔÚÓÚNPMÉÏ£¬£¬ÏÂÔØÁ¿´ï6200´Î¡£ÆäÌӱܼì²âµÄ²¿ÃÅÔÒòÊÇÓÐÐ§ÔØºÉƾ¾ÝÓ²±àÂëµÄϵͳÈÕÆÚ¼¤»î£¬£¬ÇÒÆä½á¹¹»áÖð²½·ÛËéϵͳ¡£Õâ´Î»î¶¯±³ºóµÄÍþвÐÐΪÕßÒÔ¡°xuxingfeng¡±ÃûÒå°ä²¼ÕâЩÎļþ£¬£¬²¢ÁгöÁ˼¸¸öºÏ·¨Èí¼þ°üÒÔ³ÉÁ¢ÐÅÀµ¡£Ö»¹Üƾ¾ÝÓ²±àÂëÈÕÆÚ£¬£¬Î£ÏÕÒÑ´Óǰ£¬£¬µ«¼øÓÚ×÷Õß¿ÉÄÜÒýÈë¸üÐÂÖØÐ´¥·¢²Á³ýÖ°ÄÜ£¬£¬É¾³ýÕâЩÈí¼þ°üÖÁ¹ØÖØÒª¡£
https://www.bleepingcomputer.com/news/security/dozens-of-malicious-packages-on-npm-collect-host-and-network-data/
3. Cetus ProtocolÔâºÚ¿ÍÇÔÈ¡2.23ÒÚ¼ÓÃÜÇ®±Ò
5ÔÂ23ÈÕ£¬£¬È¥ÖÐÐÄ»¯ÂòÂôËùCetus Protocol½üÈÕ°ä·¢Ôâ·êºÚ¿Í¹¥»÷£¬£¬¼ÛÖµ2.23ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£ÊÂÎñ²úÉúºó£¬£¬¸ÃÏîÄ¿Á¢¼´ÔÝÍ£ÖÇÄܺÏÔ¼·¢Õ¹µ÷²é£¬£¬²¢È·ÈÏ¡°1.62ÒÚÃÀÔªµÄÊÜËð×ʽðÒѳɹ¦ÔÝÍ£¡£¡±¡£Cetus ProtocolËæºóÖ¸³ö£¬£¬ºÚ¿ÍÀûÓÃÁËÒ»¸öÒ×Êܹ¥»÷µÄÈí¼þ°üÖ´Ðй¥»÷£¬£¬µ«Î´Åû¶¾ßÌåϸ½Ú¡£¸ÃÏîÄ¿°µÊ¾ÒÑÕÒµ½·ì϶µ××ÓÔÒò£¬£¬ÐÞ¸´ÁËÓйØÈí¼þ°ü£¬£¬²¢Í¨ÖªÁËÉú̬ϵͳ½¨ÉèÕßÒÔÔ¤·ÀÆäËûÍŶÓÊÜÓ°Ïì¡£´ËÍ⣬£¬Cetus Protocol¼ø±ð³ö¹¥»÷ÕßµÄÒÔÌ«·»Ç®°üµØÖ·ºÍÕË»§£¬£¬ÕýÓëµÚÈý·½ºÏ×÷×·×ٺͶ³½á×ʽ𣬣¬²¢ÒÑ֪ͨ·¨Âɲ¿ÃÅ¡£Îª´ÙʹºÚ¿ÍËÍ»¹×ʽ𣬣¬Cetus ProtocolÌá³ö¡°ÓÐʱÏ޵İ×ñºÍ½âºÍ̸¡±£¬£¬³ÐŵÈô×ʽðÍË»¹½«²»ÔÙ²Éȡ˾·¨Ðж¯¡£Í¬Ê±£¬£¬¸ÃÏîÄ¿°ä·¢½«Ìṩ500ÍòÃÀÔªÉͽ𣬣¬¼Î½±ÌṩÏßË÷¡¢¡¢Ô®ÊÖ¼ø±ðºÍ¿ÛÁôºÚ¿ÍµÄÐÅÏ¢ÌṩÕß¡£ÔÚÑéÖ¤Õß´¹Î£Í¶Æ±ºó£¬£¬SuiÇø¿éÁ´ÉÏ1.62ÒÚÃÀÔªµÄ×ʽð±»ÔÝÍ£¡£Çø¿éÁ´·ÖÎö¹«Ë¾Elliptic°ä²¼»ã±¨Ö¸³ö£¬£¬×Ô¶¯×öÊÐÉÌ£¨AMM£©Âß¼´æÔÚȱµã£¬£¬¿ÉÄÜÉæ¼°³Ø¼ÛÖµ°Ñ³Ö£¬£¬´Ó¶øÒý·¢ÉÁµç´ûʽ¹¥»÷¡£Elliptic»¹¸ÅÊöÁ˹¥»÷ÕßµÄ×ʽð×ªÒÆ³¢ÊÔ£¬£¬²¢°µÊ¾ÕýÔÚ»ý¼«×·×Ù´ÓSui³õʼ·ì϶µ½¹¥»÷ÕßÔÚÒÔÌ«·»ÉÏÇ®°üµÄÂòÂô¡£Ä¿Ç°£¬£¬ºÚ¿ÍµÄµØÖ·ÒÑÔÚËùÓÐÖØÒªÂòÂôËùºÍÐé¹¹×ʲú·þÎñÌṩÉÌÉÏÏóÕ÷£¬£¬ÒÔÔ¤·ÀÏ´Ç®»ò×ʽð×ªÒÆÌ°Í¼¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/
4. FBIÖÒ¸æSilent Ransom GroupÕë¶ÔÃÀÂÉËùÌáÒéÀÕË÷¹¥»÷
5ÔÂ23ÈÕ£¬£¬ÃÀ¹úÁª°îµ÷²é¾Ö½üÈÕ·¢³öÖҸ棬£¬Ö¸³öÒ»¸öÃûΪSilent Ransom Group£¨SRG£©µÄÀÕË÷ÍÅ»ïÔÚ´ÓǰÁ½ÄêÀï³ÖÐøÕë¶ÔÃÀ¹úÂÉʦÊÂÎñËù·¢Æð»Ø²¦ÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷¡£¸ÃÍÅ»ï±ðÃûLuna Moth¡¢¡¢Chatty SpiderºÍUNC3753£¬£¬×Ô2022ÄêÆð±ãÒ»Ïò»îÔ¾£¬£¬ÊÇBazarCall»î¶¯µÄÄ»ºóÖ÷ʹ£¬£¬ÎªRyukºÍContiÀÕË÷Èí¼þ¹¥»÷ÌṩÁ˳õÊ¼ÍøÂç½Ó¼ûȨÏÞ¡£ÔÚConti¹Ø±Õºó£¬£¬¸ÃÍþвÐÐΪÕßÍÑÀëÔÍøÂç·¸×OÍÅ£¬£¬×齨ÁËSRG¡£ÔÚ×î½üµÄ¹¥»÷ÖУ¬£¬SRGͨ¹ýµç×ÓÓʼþ¡¢¡¢ÐéÎ±ÍøÕ¾ºÍµç»°¼ÙÒâÖ¸±êITÖ§³ÖÈËÔ±£¬£¬ÀûÓÃÉç»á¹¤³Ìѧ¼¿Á©»ñÈ¡ÍøÂç½Ó¼ûȨÏÞ¡£Óëͨ³£ÀÕË÷×éÖ¯·ÖÆç£¬£¬SRG²¢²»¼ÓÃÜÊܺ¦Õßϵͳ£¬£¬¶øÊÇÒÔË÷ÒªÊê½ðÔ¤·ÀÃô¸ÐÐÅϢй¶¶øÎÅÃû¡£ËûÃÇͨ¹ýÔ¶³Ì½Ó¼û»á»°½øÈëÊܺ¦ÕßÉ豸£¬£¬½øÐÐ×îµÍÏ޶ȵÄȨÏÞÌáÉý£¬£¬²¢Ñ¸ËÙתÏòÊý¾Ýй¶£¬£¬ÀûÓá°WinSCP¡±»ò°µ²Ø/ÖØ¶¨ÃûµÄ¡°Rclone¡±°æ±¾ÇÔÈ¡Êý¾Ý¡£ÇÔÈ¡Êý¾Ýºó£¬£¬SRGͨ¹ýÀÕË÷ÓʼþºÍµç»°ÍþвÏúÊÛ»ò¹«¿ªÐÅÏ¢£¬£¬ÆÈʹÊܺ¦Õß½øÐÐÊê½ð½»Éæ¡£Ö»¹ÜËûÃÇÓÐרÃŵÄÍøÕ¾Ð¹Â¶Êܺ¦ÕßÊý¾Ý£¬£¬µ«FBIÖ¸³ö£¬£¬ÕâЩÀÕË÷ÍŻﲢ²»×Ü»á¶ÒÏÖÊý¾Ýй¶Íþв¡£Îª·ÀÓù´ËÀ๥»÷£¬£¬FBI½¨ÒéʹÓÃÇ¿ÃÜÂë¡¢¡¢ÆôÓÃË«³É·ÖÉí·ÝÑéÖ¤¡¢¡¢¶¨ÆÚ±¸·ÝÊý¾Ý£¬£¬²¢¶ÔÔ±¹¤½øÐÐÍøÂç´¹µö³¢ÊÔ¼ì²âÅàѵ¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-of-luna-moth-extortion-attacks-targeting-law-firms/
5. Marlboro-Chesterfield PathologyÊý¾Ýй¶ӰÏì23.5ÍòÈË
5ÔÂ22ÈÕ£¬£¬ÃÀ¹ú±±¿¨ÂÞÀ´ÄÉÖÝÈ«·þÎñ½âÆÊ²¡Àí³¢ÊÔÊÒMarlboro-Chesterfield Pathology£¨MCP£©½üÆÚÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬£¬ÒÔÖÁ´óÁ¿Ð¡ÎÒÐÅÏ¢¼Í¼ʧÇÔ¡£¸Ã»ú¹¹ÔÚ¹ÙÍø°ä²¼µÄÊý¾Ýй¶֪ͨÅú×¢£¬£¬2025Äê1ÔÂ16ÈÕÆäÄÚ²¿ITϵͳ³öÏÖδ¾ÊÚȨ»î¶¯£¬£¬¾µ÷²éÈ·ÈϹ¥»÷ÕßÇÔÈ¡Á˲¿ÃÅÎļþ¡£Õâ´Îй¶µÄÊý¾Ýº¸ÇÐÕÃû¡¢¡¢×¡Ö·¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢Ò½ÁÆÒ½ÖÎÐÅÏ¢¼°½¡¿µ±£ÏÕÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬£¬¾ßÌåй¶×Ö¶ÎÒò¸ö±ð²î¾à¶øÓÐËù·ÖÆç¡£MCP±¾ÖÜÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿£¨HHS£©´«µÝ£¬£¬Õâ´ÎÊÂÎñÓ°ÏìÁìÓòÉæ¼°235,911ÈË¡£ÀÕË÷Èí¼þ×éÖ¯SafePayÓÚÒ»ÔÂÏÂÑ®Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬£¬¸ÃÍÅ»ï½üÆÚ»¹¶ÔóÒ×·þÎñÌṩÉÌConduentÌáÒé¹¥»÷¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬½ØÖÁ·¢¸åʱ£¬£¬MCPÒÑ´ÓSafePayµÄйÃÜÍøÕ¾Ï¼ܣ¬£¬ÕⰵʾÊܺ¦·½¿ÉÄÜÒÑÖ§¸¶Êê½ð¡£
https://www.securityweek.com/marlboro-chesterfield-pathology-data-breach-impacts-235000-people/
6. ºÚ¿ÍÀûÓÃÐéαVPN¼°ä¯ÀÀÆ÷NSIS×°Öðü´«²¼Winos 4.0¶ñÒâÈí¼þ
5ÔÂ26ÈÕ£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶¶ñÒâÈí¼þ»î¶¯£¬£¬¹¥»÷Õßͨ¹ý¼Ù×°³ÉLetsVPN¡¢¡¢QQä¯ÀÀÆ÷µÈÊ¢Ðй¤¾ßµÄÐéαװÖ÷¨Ê½£¬£¬×îÖÕͶµÝWinos 4.0¿ò¼Ü¡£´Ë¹¥»÷Ðж¯ÓÉRapid7ÓÚ2025Äê2Ô³õ´Î¼à²âµ½£¬£¬Ê¹ÓÃÁËÃûΪCatenaµÄ¶à½×¶ÎפÄÚ´æ¼ÓÔØÆ÷£¬£¬½«ÓÐÐ§ÔØºÉÆëȫפÁôÄÚ´æÒÔ¶ã±Üɱ¶¾Èí¼þ¼ì²â¡£Ö²Èëºó£¬£¬Catena»á¾²Ä¬Ïνӹ¥»÷Õß½ÚÖÆµÄ·þÎñÆ÷£¬£¬ÎÞÊýλÓÚÏã¸Û£¬£¬ÒԽӹܺóÐøÖ¸Áî»ò¶îÍâ¶ñÒⷨʽ¡£¸Ã¹¥»÷ËÆºõרÃÅÕë¶ÔÖÐÎÄ»·¾³£¬£¬Ä»ºó´æÔھ߱¸¸ß¶ÈÄÜÁ¦µÄÍþв×éÖ¯¡£Winos 4.0ÊÇ»ùÓÚ³ÛÃûÔ¶³ÌľÂíGh0st RAT´úÂë»ù´¡±àдµÄÏȽø¶ñÒâ¿ò¼Ü£¬£¬¾ßº±¼û¾ÝÇÔÈ¡¡¢¡¢Ô¶³ÌShell½Ó¼û¼°·¢ÆðDDoS¹¥»÷µÈÖ°ÄÜ¡£2025Äê·¢ÏֵĻùÓÚQQä¯ÀÀÆ÷µÄϰȾÁ÷³ÌÏÔʾ£¬£¬ËùÓÐÓйع¥»÷ÔØÌå¾ùÒÀÀµNSIS×°Ö÷¨Ê½£¬£¬ÕâЩװÖðü°ó¸¿Á˾¹ýÊðÃûµÄµö¶üÀûÓ㬣¬Í¨¹ý·´ÉäʽDLL×¢Èë¼¼ÊõʵÏÖÒñ±ÎפÁô¡£ÔÚ2025Äê4Ô·¢ÏÖµÄLetsVPN×°Öðü¹¥»÷°¸ÀýÖУ¬£¬¶ñÒⷨʽͨ¹ý´´½¨´òË㹤×÷ʵÏÖÓÆ¾Ã»¯£¬£¬ÇÒÔ̺¬¼ì²âϵͳÖÐÎÄ˵»°ÉèÖõÄÏÔÐÔУÑ飬£¬µ«¼´±ãδ·¢ÏÖÖÐÎÄ»·¾³ÈÔ»á³ÖÐøÖ´ÐС£´ËÍ⣬£¬¹¥»÷Õß»¹½øÐÐÁË¡°Õ½Êõµ÷Õû¡±£¬£¬Åú¸ÄÁËCatenaÖ´ÐÐÁ´µÄijЩ×é¼þ£¬£¬ÐÂÔö·´É±¶¾¼ì²â¶ã±ÜÖ°ÄÜ£¬£¬ÈçΪËùÓÐÇý¶¯Æ÷Ôö³¤Microsoft DefenderÅųýÏ£¬²¢Ê¹ÓùýÆÚÖ¤ÊéÊðÃûµÄ¶ñÒâÔØºÉ·´Éäʽ¼ÓÔØDLLÎļþÒÔÏνÓC2·þÎñÆ÷ÏÂÔØÖ´ÐÐWinos 4.0¡£
https://thehackernews.com/2025/05/hackers-use-fake-vpn-and-browser-nsis.html


¾©¹«Íø°²±¸11010802024551ºÅ