Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©¸øÁ´¹¥»÷
°ä²¼¹¦·ò 2025-11-041. Open VSXÁîÅÆÐ¹Â¶Òý·¢¹©¸øÁ´¹¥»÷
11ÔÂ2ÈÕ£¬½üÈÕ£¬Open VSX×¢²á±íÒò¿ª·¢Õß²»²âй¶½Ó¼ûÁîÅÆ£¬µ¼ÖÂÍþвÐÐΪÕßÌáÒ鹩¸øÁ´¹¥»÷£¬ÔÚ¹«¹²´æ´¢¿âÖа䲼¶ñÒâÀ©´ó·¨Ê½¡£¡£Á½ÖÜǰ£¬Wiz×êÑÐÈËÔ±·¢ÏÖMicrosoft VSCodeºÍOpen VSXÊг¡Öг¬550¸ö»úÃÜÐÅÏ¢Ôâй¶£¬²¿ÃŰÂÃØ¿É½Ó¼ûÏÂÔØÁ¿´ï15Íò´ÎµÄÏîÄ¿£¬Ê¹¹¥»÷ÕßÄÜÉÏ´«¶ñÒâÀ©´ó£¬×é³ÉÑÏÖØ¹©¸øÁ´·çÏÕ¡£¡£Open VSXÓÉEclipse»ù½ð»á¿ª·¢£¬ÊÇ΢ÈíVisual Studio MarketplaceµÄ¿ªÔ´´úÌæ¹æ»®£¬ÎªVS Code IDE¼°¼æÈÝ·ÖÖ§ÌṩÀ©´óÖ§³Ö¡£¡£Õâ´ÎÊÂÎñÖУ¬Ð¹Â¶µÄÁîÅÆ±»ÓÃÓÚÃûΪ"GlassWorm"µÄ¶ñÒâÈí¼þ¹¥»÷£¬¸ÃÈí¼þÀûÓò»Ë½¼ûUnicode×Ö·û°µ²Ø×Ô´«²¼¶ñÒâ´úÂ룬ÊÔͼÇÔÈ¡¿ª·¢ÕßÍ´´¦²¢ÔڿɽӼûÏîÄ¿ÖÐÒý·¢¼¶Áª·ì϶£¬Ö¸±êÖ±Ö¸49¸öÀ©´ó·¨Ê½µÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬¶¯»úÒÉËÆ¾¼ÃÀûÒæ¡£¡£½ØÖÁ10ÔÂ21ÈÕ£¬ËùÓжñÒâÀ©´óÒѱ»É¾³ý£¬ÓйØÁîÅÆÊµÏÖÂÖ»»»ò³·Ïú£¬ÊÂÎñÒÑÆëÈ«½ÚÖÆ¡£¡£È»¶ø£¬Íþв²¢Î´ÖÕÖ¹¡£¡£×êÑÐÈËÔ±·¢ÏÖ£¬GlassWorm±³ºóµÄͳһÍþвÐÐΪÕßÒÑ×ªÒÆÖÁGitHub£¬Ê¹ÓÃÒ»ÑùUnicodeÒþдÊõ¼¼Çɰµ²Ø¶ñÒâÔØºÉ£¬¹¥»÷ÁìÓòÀ©´óÖÁ¶à¸öJavaScriptÏîÄ¿´úÂë¿â¡£¡£
https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/
2. ÐÂÐÍHttpTroyºóÃÅ·¨Ê½Õë¶Ôº«¹ú·¢Æð¶¨ÏòÍøÂç¹¥»÷
11ÔÂ3ÈÕ£¬½üÆÚ£¬Ó볯ÏʹØÁªµÄÍþвÐÐΪÕßKimsuky¼°Lazarus Group³ÖÐø¸üÐÂÆä¹¥»÷±øÆ÷¿â£¬Õ¹Ê¾¼¼ÊõÑݽøÇ÷Ïò¡£¡£¾ÝGen Digital¹«Ë¾Åû¶£¬KimsukyÕë¶Ôº«¹úµ¥Ò»Ö¸±êÌáÒé´¹µö¹¥»÷£¬Í¨¹ý¼Ù×°³ÉVPNÕ˵¥µÄZIPѹËõÎļþ·Ö·¢ÐÂÐͺóÃÅ·¨Ê½¡°HttpTroy¡±¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈý½×¶Î¹¥»÷Á´Ö´ÐУº³õʼΪGo˵»°¶þ½øÖÆÎļþ£¨ÄÚǶ¼Ù×°PDFÎĵµÒÔ½µµÍÊܺ¦Õß¾¯Ì裩£¬ËæºóÆô¶¯MemLoad¼ÓÔØ·¨Ê½³ÉÁ¢Óƾû¯»úÖÆ£¬×îÖÕ²¿ÊðHttpTroyºóÃÅ¡£¡£¸ÃºóÃÅÖ§³ÖÎļþ´«Êä¡¢½ØÆÁ¡¢¸ßȨÏÞºÅÁîÖ´ÐС¢·´ÏòShell³ÉÁ¢µÈÖ°ÄÜ£¬Í¨¹ýHTTP POSTÓëC2·þÎñÆ÷ͨѶ£¬²¢Ñ¡È¡¶à²ã»ìºÏ¼¼Êõ¶ã±Ü¼ì²â¡£¡£Í¬Ê±£¬Lazarus GroupÕë¶Ô¼ÓÄôóÁ½ÃûÊܺ¦ÕßÌáÒé¹¥»÷£¬²¿Êð¡°Comebacker¡±¶ñÒⷨʽ¼°ÆäÉý¼¶°æ¡°BLINDINGCAN¡±Ô¶³Ì½Ó¼ûľÂí¡£¡£¹¥»÷Á´Öжα»¼ì²âµ½£¬³õʼ½Ó¼ûõè¾¶´§Ä¦Îª´¹µöÓʼþ¡£¡£Comebacker´æÔÚDLLÓëEXEÁ½ÖÖ±äÌ壬ǰÕßͨ¹ýWindows·þÎñÆô¶¯£¬ºóÕß¾cmd.exeÖ´ÐУ¬×îÖÕ½âÃܲ¢²¿ÊðBLINDINGCAN£¬ºóÕßÓëC2·þÎñÆ÷ͨѶ£¬Ö§³ÖÎļþ²Ù×÷¡¢¹ý³ÌÖÎÀí¡¢½ØÆÁ¡¢ºÛ¼£¶Ï¸ùµÈ²Ù×÷¡£¡£
https://thehackernews.com/2025/11/new-httptroy-backdoor-poses-as-vpn.html
3. ºÚ¿Í´ÓBalancer DeFi¼ÓÃܺÍ̸ÇÔÈ¡³¬¹ý1.2ÒÚÃÀÔª
11ÔÂ3ÈÕ£¬»ùÓÚÒÔÌ«·»µÄDeFiºÍ̸BalancerµÄV2¿É¶Ñ·Ê²»±ä³ØÔâ·êÖØ´óºÚ¿Í¹¥»÷£¬Ëðʧ³¬1.28ÒÚÃÀÔª£¬³ÉΪ½ñÄê¶È×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸Ö®Ò»¡£¡£Balancer×÷Ϊ×Ô¶¯×öÊÐÉ̺ÍÁ÷¶¯ÐÔ»ù´¡ÉèÊ©£¬Ö§³Ö×Ô½ç˵´ú±Ò×éºÏ£¬ÆäV2³Ø´ËǰÒѽÓÊÜ11´Î°²È«É󼯣¬µ«ÈÔÒòDZÔÚ·ì϶±»ÀûÓᣡ£ÊÂÎñ²úÉúºó£¬BalancerÍŶÓѸËÙÓë¶¥¼â°²È«×êÑлú¹¹ºÏ×÷µ÷²é£¬²¢ÖÒ¸æÓû§¾¯Ìè´¹µö·çÏÕ¡£¡£·ì϶³ÉÒò´æÔÚÁ½ÖÖÖ÷Á÷´§Ä¦£ºÆäÒ»£¬GoPlus SecurityÖ¸³öV2½ð¿âµÄ»¥»»ÍÆËã´æÔÚ¾«¶ÈÉáÈëÎó²î£¬Ã¿´Î¶Ò»»²Ù×÷ÏòÏÂÈ¡Õû´ú±ÒÊýÁ¿£¬¹¥»÷Õßͨ¹ýbatchSwapº¯Êý·´¸´¶Ò»»£¬ÀÛ»ýϸС²î¾àµ¼Ö¼ÛֵŤÇú£»£»Æä¶þ£¬°²È«×êÑÐÔ±Aditya BajajÒÔΪ£¬¶ñÒâºÏÔ¼ÔÚ×Ê½ð³Ø³õʼ»¯½×¶Î°Ñ³Ö½ð¿âŲÓã¬Èƹý°²È«´ëÊ©£¬ÊµÏÖ¿ç³ØÎ´¾ÊÚȨµÄÓà¶î°Ñ³Ö¡£¡£Ö»¹Ü¼¼Êõϸ½ÚÉÐδÆëÈ«Ã÷È·£¬Balancer³Ðŵ½«°ä²¼ÆëÈ«¹ýºó·ÖÎö¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ÊÂÎñ²úÉúºó£¬Ú¿ÆÕß¼ÙÒâBalancerÏòºÚ¿ÍÌáÒé¡°°×ñÉͽ𡱽»É棬Ðû³ÆÈôËÍ»¹×ʽð¿É»ñ20%ÉâÃ⣬²»È»½«½áºÏÇø¿éÁ´È¡Ö¤»ú¹¹¡¢·¨Âɲ¿Ãż°¼à¹ÜºÏ×÷ͬ°é£¬Í¨¹ýIPµØÖ·¡¢ASNÏνÓÈÕÖ¾ºÍÁ´ÉÏÂòÂô¹¦·ò´Á¼ø±ð¹¥»÷ÕßÉí·Ý¡£¡£
https://www.bleepingcomputer.com/news/cryptocurrency/hacker-steals-over-120-million-from-balancer-defi-crypto-protocol/
4. SesameOp¶ñÒâÈí¼þÀÄÓÃOpenAI Assistants APIÌáÒé¹¥»÷
11ÔÂ3ÈÕ£¬Î¢Èí°²È«ÍŶÓÔÚ2025Äê7Ôµ÷²éÍøÂç¹¥»÷ʱ£¬·¢ÏÖÃûΪSesameOpµÄÐÂÐͺóÃŶñÒâÈí¼þ£¬¸ÃÈí¼þͨ¹ýÀÄÓÃOpenAI Assistants API×÷ΪÒñ±ÎµÄºÅÁîÓë½ÚÖÆ£¨C2£©Í¨µÀ£¬ÊµÏÖ¹¥»÷Õß¶ÔÊÜϰȾ»·¾³µÄ³Ö¾Ã³ÖÐø½Ó¼û¡£¡£Çø±ðÓÚ´«Í³ÒÀÀµ¶ñÒâ»ù´¡ÉèÊ©µÄ¹¥»÷·½Ê½£¬SesameOpÀûÓúϷ¨ÔÆ·þÎñ½øÐÐÔ¶³ÌÖÎÀí£¬ÓÐЧ¶ã±ÜÁËÊܺ¦Õß¾¯±¨¼°ÊÂÎñÏìÓ¦ÆÚ¼äµÄ¼ì²â·çÏÕ¡£¡£¾Ý΢ÈíDARTÍŶӻ㱨£¬SesameOpºóÃÅ×é¼þ½«OpenAI Assistants API×÷Ϊ´æ´¢ºÍÖм̻úÖÆ£¬»ñȡѹËõ¼ÓÃܵÄÖ¸Áîºó½âÃÜÖ´ÐУ»£»Í¬Ê±£¬¹¥»÷ÖÐÍøÂçµÄÐÅϢͨ¹ý¶Ô³ÆÓë·Ç¶Ô³Æ¼ÓÃܽáºÏµÄ·½Ê½£¬¾Í³Ò»APIͨµÀ»Ø´«¹¥»÷Õß¡£¡£¸Ã¶ñÒâÈí¼þ¹¥»÷Á´Ô̺¬¸ß¶È»ìºÏµÄ¼ÓÔØÆ÷ºÍ»ùÓÚ.NETµÄºóÃÅ·¨Ê½£¬ºóÕßͨ¹ý.NET AppDomainManager×¢Èëµ½Microsoft Visual Studio¹¤¾ßÖУ¬½áºÏÄÚ²¿Web Shell¼°¡°Õ½ÊõÐÔ²¿Ê𡱵ĶñÒâ¹ý³Ì³ÉÁ¢ÓƾÃÐÔ£¬Ö§³Ö³Ö¾Ã¼äµý»î¶¯¡£¡£Î¢ÈíÇ¿µ÷£¬Õâ´Î¹¥»÷²¢·ÇÀûÓÃOpenAIƽ̨·ì϶»òÅäÖÃÃýÎ󣬶øÊÇÀÄÓÃAssistants APIµÄÄÚÖÃÖ°ÄÜ¡£¡£Î¢ÈíÓëOpenAIÒѺÏ×÷¼ø±ð²¢½ûÓù¥»÷ÖÐʹÓõÄÕË»§¼°APIÃÜÔ¿¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/
5. È«Çò»õÔËÐÐÒµÔâRMM¹¤¾ß¹¥»÷Òý·¢¹©¸øÁ´ÍµÇÔΣ»£»ú
11ÔÂ3ÈÕ£¬½üÆÚ£¬Õë¶Ô»õÔ˾¼ÍÈ˺Ϳ¨³µÔËÊ乫˾µÄÍøÂç¹¥»÷³öÏÖ¹æÄ£»£»¯Ç÷Ïò¡£¡£¾ÝProofpoint×êÑУ¬×Ô2025Äê1ÔÂÆð£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÁ´½ÓºÍ´¹µöÓʼþ³ÖÐø²¿ÊðÔ¶³Ì¼à¿ØÖÎÀí£¨RMM£©¹¤¾ß£¨ÈçScreenConnect¡¢SimpleHelpµÈ£©£¬ÔÚ±±ÃÀ¡¢°ÍÎ÷¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢µÂ¹ú¡¢ÖÇÀû¼°ÄÏ·ÇµÈ¶àµØÖ´Ðй¥»÷¡£¡£½ö8ÔÂÒÔÀ´ÒѼͼ½ü24Æð»î¶¯£¬µ¥´Î¹¥»÷×î¶à·¢ËÍ1000ÌõÐÅÏ¢¡£¡£¹¥»÷ÕßÑ¡È¡Ë«ÖØÉøÈëÕ½Êõ£ºÒ»·½ÃæÀûÓñ»µÁ»õÔËÆ½Ì¨ÕË»§°ä²¼ÐéØÍÆ·ÔËÐÅÏ¢£¬ÁíÒ»·½ÃæÈëÇÖ»õÔ˾¼ÍÈ˼°µ÷¶ÈÔ±ÓÊÏ䣬½Ù³ÖÓʼþÏß³ÌÓÕµ¼Êܺ¦Õß½Ó¼ûαÔìÒ³Ãæ¡£¡£ÕâÐ©Ò³ÃæÍ¨¹ý¾«×¼¸´ÖÆÔËÓªÉÌÆ·ÅƱêʶ¼ÓÇ¿¿ÉÐŶȣ¬ÓÕÆÓû§ÏÂÔØ.exe»ò.msiÎļþ×°ÖÃRMM¹¤¾ß¡£¡£Ò»µ©³É¹¦²¿Ê𣬹¥»÷Õß¼´¿ÉÆëÈ«½ÚÖÆÏµÍ³£¬ÊµÏÖÅú¸ÄÔËÊä·Ïß¡¢ÆÁ±Îµ÷¶È֪ͨ¡¢¼ÙÒâºÏ·¨³ÐÔËÈ˵ȲÙ×÷£¬×îÖսٳָ߼ÛÖµ»õÎÈçʳƷ¡¢µç×Ó²úÆ·£©²¢×ªÊÛ»ò×ß˽¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/
6. ÈÕ±¾AskulÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶£¬¹©¸øÁ´Êܲ¨¼°
11ÔÂ3ÈÕ£¬ÈÕ±¾°ì¹«¼°¼Ò¾ÓÓÃÆ·ÁãÊÛÉÌAskul½üÈÕ֤ʵ£¬10Ô³õÔâ·êÀÕË÷Èí¼þ¹¥»÷ºó£¬¿Í»§Ó빩¸øÉÌÊý¾ÝÔâй¶£¬Æäµç×ÓÉÌÎñƽ̨ÔËÓªÖжϡ£¡£Õâ´ÎÊÂÎñ²¨¼°ÆìÏÂÍøµê£¨Askul¡¢Lohaco¡¢Soloel Arena£©£¬Ð¹Â¶ÄÚÈÝÔ̺¬Óû§ÁªÏµ·½Ê½¡¢Ñ¯ÅÌÏêÇé¼°´æ´¢ÓÚÄÚ²¿·þÎñÆ÷µÄ¹©¸øÉÌÊý¾Ý¡£¡£AskulÔÚÉêÃ÷ÖÐÖÂǸ£¬³ÆÕýµ÷²éRansomHouse×éÖ¯Ðû³ÆµÄ1.1TBÊý¾ÝÇÔÈ¡ÊÂÎñ¡£¡£¹¥»÷Ó°ÏìÑÓ³¤ÖÁ¹©¸øÁ´ºÏ×÷ͬ°é£ºÒÀÀµAskulÎïÁ÷ÍøÂçµÄÈÕ±¾´óÐÍÁãÊÛÉÌÁ¼Æ·´òË㣨¾ÓªÎÞÓ¡Á¼Æ·Muji£©ºÍThe LoftËäδÃ÷È·×ÔÉíÊý¾ÝÊÇ·ñй¶£¬µ«¹©¸øÁ´ÒÑÊÜÇÖÈÅ¡£¡£RansomHouse×éÖ¯ÒÔ¡°²»¼ÓÃܽöÍþв¹«¿ªÊý¾Ý¡±µÄÀÕË÷¼¿Á©ÎÅÃû£¬×Ô¿ä¡°ÕýÒåÁ¦Á¿¡±ÒԸ淢ÆóÒµ·ì϶¡£¡£¸Ã×éÖ¯³ÉÁ¢ÓÚ2022Äê3Ô£¬ÍøÂ簲ȫ×êÑÐÒѽ«ÆäÓë¶íÂÞ˹¹ØÁªµÄÍþвÐÐΪÕߣ¨ÈçAlphv/BlackCat¡¢LockBit 3.0¡¢RagnarLocker£©¹Ò¹³¡£¡£
https://therecord.media/askul-confirms-data-breach-ransomware-incident


¾©¹«Íø°²±¸11010802024551ºÅ