APT28ÀûÓÃXSS·ì϶¶Ô¶àÓʼþϵͳ·¢ÆðÍøÂç¼äµýÐж¯

°ä²¼¹¦·ò 2025-05-16

1. APT28ÀûÓÃXSS·ì϶¶Ô¶àÓʼþϵͳ·¢ÆðÍøÂç¼äµýÐж¯


5ÔÂ15ÈÕ £¬Ë¹Âå·¥¿ËÍøÂ簲ȫ¹«Ë¾ESET×îÐÂ×êÑз¢ÏÖ £¬Óë¶íÂÞ˹ÓйØÁªµÄÍþв×éÖ¯Õë¶ÔRoundcube¡¢Horde¡¢MDaemonºÍZimbraµÈÖ÷Á÷ÓʼþϵͳִÐÐÁËÃûΪ¡°Operation RoundPress¡±µÄÍøÂç¼äµý»î¶¯¡£Õâ´ÎÐж¯Ö÷ÌâÖ¸±êÊÇÇÔÈ¡ÌØ¶¨ÓÊÏäÕË»§µÄ»úÃÜÊý¾Ý £¬ÖØÒªÊܺ¦ÕßΪ¶«Å·µ±¾Ö»ú¹¹¼°¾ü¹¤ÆóÒµ £¬Í¬Ê±·ÇÖÞ¡¢Å·ÖÞºÍÄÏÃÀÖÞÈ·µ±²¿ÃÅÃÅÒ²Ôâµ½¹¥»÷¡£×êÑÐÈËÔ±½«Æä¹éÒòÓÚ¶íÂÞ˹µ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯APT28 £¬Æ¾¾ÝÔ̺¬´¹µöÓʼþ·¢¼þµØÖ·³ÁµþºÍ·þÎñÆ÷ÅäÖÃÊÖ·¨ÀàËÆ¡£¹¥»÷Õßͨ¹ýÓʼþϵͳµÄXSS·ì϶ÔÚÍøÒ³ÓÊÏä½çÃæÖ´ÐÐËÁÒâJavaScript´úÂë¡£ÆäÖÐ £¬MDaemonµÄXSS·ì϶ÔÚ¹¥»÷³õÆÚΪÁãÈÕ·ì϶ £¬ËäºóÐøÒѽ¨¸´ £¬µ«Æäʱ佨¸´¡£APT28ͨ¹ýµç×ÓÓʼþ·¢ËÍXSS·ì϶ÀûÓ÷¨Ê½ £¬¶ñÒâ´úÂëÔÚä¯ÀÀÆ÷ÔËÐеÄÍøÒ³ÓÊÏä¿Í»§¶ËÖÐÖ´ÐС£·ì϶ÀûÓóɹ¦ºó £¬ÃûΪSpyPressµÄ»ìºÏJavaScriptÓÐÐ§ÔØºÉ»áÇÔÈ¡ÓÊÏ䯾֤¡¢ÓʼþÄÚÈݺÍÁªÏµÈËÐÅÏ¢ £¬²¿ÃűäÖÖ»¹ÄÜ´´½¨Sieve¹æ¶¨ £¬³ÖÐø×ª·¢ÐÂÓʼþÖÁ¹¥»÷ÕßÓÊÏä¡£ÇÔÈ¡µÄÊý¾Ýͨ¹ýHTTP POSTÒªÇó·¢ËÍÖÁC2·þÎñÆ÷ £¬Ä³Ð©±äÖÖ»¹Äܲ¶»ñµÇ¼¼Í¼¡¢2FA´úÂë £¬ÉõÖÁΪMDAEMON´´½¨ÀûÓÃÃÜÂë¡£


https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html


2. Coinbase¿Í»§Êý¾Ýй¶ £¬Ô¤¼ÆËðʧ´ï4ÒÚ


5ÔÂ15ÈÕ £¬¼ÓÃÜÇ®±ÒÂòÂôËùCoinbaseÅû¶ £¬ÍøÂç·¸×ï·Ö×ÓÓë¶ñÒ⺣±í¿Í·þÈËÔ±ºÏ×÷ÇÔÈ¡Á˿ͻ§Êý¾Ý £¬²¢Ë÷Òª2000ÍòÃÀÔªÊê½ðÒÔ²»¹«¿ª±»µÁÐÅÏ¢¡£Coinbase»Ø¾øÖ§¸¶Êê½ð £¬µ«ÉèÁ¢2000ÍòÃÀÔª¼Î½±»ù½ð £¬ÒÔ¼¤ÀøÌṩÓйع¥»÷ÕßµÄÏßË÷¡£´Ëǰ £¬ºÚ¿ÍÏòCoinbase·¢Ë͵ç×ÓÓʼþÍþв°ä²¼¿Í»§ÕË»§ºÍÄÚ²¿ÎļþÐÅÏ¢ £¬Coinbaseµ÷²é·¢ÏÖ¹¥»÷ÕßÔÚÃÀ¹ú¾³±í³Ð°üÉÌ»òÖ§³ÖÈËÔ±µÄÔ®ÊÖÏ»ñÈ¡Á˿ͻ§Êý¾Ý £¬ÕâЩÈËÔ±ÊܹͽӼûÄÚ²¿ÏµÍ³ £¬Coinbase·¢ÏÖºóÒÑ¿ª³ýÓйØÈËÔ±¡£Ö»¹ÜÍþвÐÐΪÕßÇÔÈ¡ÁËCoinbaseÔ¼1%¿Í»§µÄÓ×ÎÒÉí·ÝÐÅÏ¢ £¬µ«ÎÞ·¨»ñÈ¡¿Í»§Ë½Ô¿¡¢ÃÜÂë»ò½Ó¼ûCoinbase PrimeÕË»§ºÍÇ®°ü¡£±»µÁÊý¾ÝÔ̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢µç×ÓÓʼþ¡¢²¿ÃÅÉç»á±£Ïպš¢ÒøÐÐÕ˺ÅÐÅÏ¢¡¢µ±¾ÖÉí·Ý֤ͼÏñ¡¢ÕË»§Êý¾Ý¼°ÓÐÏ޵Ĺ«Ë¾Êý¾Ý¡£CoinbaseÇ¿µ÷ûÓÐÃÜÂ롢˽Կ»ò×ʽðй¶ £¬²¢½«Åâ³¥±»ÓÕÆ­Ïò¹¥»÷Õß»ã¿îµÄ¿Í»§¡£¹ÌÈ»²ÆÕþÓ°ÏìÈÔÔÚÆÀ¹ÀÖÐ £¬µ«Coinbase¹À¼Æ²¹¾ÈºÍ¿Í»§Åâ³¥ÓöȽ«ÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£ÎªÔ¤·À½«À´Î¥¹æÐÐΪ £¬Coinbase´òË㿪ÉèеÄÖ§³ÖÖÐÐÄÅâ³¥ÊÜÓ°Ïì¿Í»§ £¬²¢Ôö³¤¶ÔÄÚ²¿Íþв¼ì²â¡¢°²È«Íþв·ÂÕÕºÍ×Ô¶¯ÏìÓ¦µÄͶ×Ê¡£


https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/


3. ¶ñÒâNPM°üʹÓÃUnicodeÒþдÊõÀ´Ìӱܼì²â


5ÔÂ15ÈÕ £¬´úÂ밲ȫÆÀ¹À¹«Ë¾Veracode·¢ÏÖ £¬Node°üÖÎÀíÆ÷Ë÷ÒýÖдæÔÚÃûΪ¡°os-info-checker-es6¡±µÄ¶ñÒâÈí¼þ°ü £¬¸Ã°ü×Ô±¾Ô³õÒÔÀ´Òѱ»ÏÂÔØ³¬¹ý1000´Î¡£¸ÃÈí¼þ°ü×î³õ°æ±¾ÓÚ3ÔÂ19ÈÕÉÏ´«ÖÁNPM £¬×î³õÖ°ÄܽöÊÇÍøÂç²Ù×÷ϵͳÐÅÏ¢ £¬¿´ËÆÎÞº¦¡£È»¶ø £¬¼¸Ììºó £¬×÷Õß¶ÔÈí¼þ°ü½øÐÐÁËÅú¸Ä £¬Ôö³¤ÁËÌØ¶¨ÓÚÆ½Ì¨µÄ¶þ½øÔìÎļþºÍ»ìºÏµÄ×°Öþ籾¡£5ÔÂ7ÈÕ £¬¸ÃÈí¼þ°ü°ä²¼Ð°汾 £¬ÆäÖÐÔ̺¬ÓÃÓÚ´«µÝ×îÖÕÓÐÐ§ÔØºÉµÄ¸´ÔÓC2£¨ºÅÁîºÍ½ÚÔ죩»úÔì´úÂë¡£VeracodeÖÒ¸æ³Æ £¬µ±Ç°npmÉÏ¿ÉÓõÄ×îа汾v1.0.8Ϊ¶ñÒâ°æ±¾¡£´Ë±í £¬¸ÃÈí¼þ°ü»¹±»ÁÐΪÆäËûËĸöNPMÈí¼þ°üµÄÒÀÀµÏî £¬µ«Ä¿Ç°Éв»Ã÷ÏÔÕâЩÈí¼þ°üÊÇ·ñ»òÈôºÎ±»ÍþвÐÐΪÕßÍÆ¹ã¡£ÔÚ¶ñÒâ°æ±¾ÖÐ £¬¹¥»÷ÕßÀûÓÃUnicodeÒþдÊõ £¬½«Êý¾ÝǶÈë¿´ËÆ¡°|¡±µÄ×Ö·û´®ÖÐ £¬¶øÊúÏߺ󰵲ØÁËÒ»³¤´®²»Ë½¼ûµÄUnicode×Ö·û £¬ÕâЩ×Ö·ûÓÃÓÚÍÆ½ø»ùÓÚÎı¾µÄÒþдÊõ¡£Veracodeͨ¹ý½âÂëºÍ·´»ìºÏ×Ö·û´® £¬ÕÒµ½Á˸´ÔÓC2»úÔìµÄÓÐÐ§ÔØºÉ £¬¸Ã»úÔìÒÀÀµGoogleÈÕÀú¶ÌÁ´½Ó´ïµ½ÍйÜ×îÖÕÓÐÐ§ÔØºÉµÄµØÎ»¡£×êÑÐÈËÔ±Ú¹ÊÏçË´Ó»ñÈ¡GoogleÈÕÀúÁ´½Óµ½×îÖÕ½âÂë»ñÈ¡¶ñÒâÈí¼þÓÐÐ§ÔØºÉµÄÕû¸ö¹ý³Ì £¬²¢Ö¸³ö×îÖÕÓÐÐ§ÔØºÉ¿ÉÄܾ­¹ý¼ÓÃÜ¡£


https://www.bleepingcomputer.com/news/security/malicious-npm-package-uses-unicode-steganography-to-evade-detection/


4. Ó¡µÚ°²ÄÉÖݵ±¾ÖÖҸ棺¾¯Ìè¼Ùð¹Ù·½ÓʼþµÄͨ³©·ÑÚ¿Æ­


5ÔÂ13ÈÕ £¬Ó¡µÚ°²ÄÉÖݵ±¾Ö»ú¹¹ÓÚÖܶþÏò¾ÓÃñ·¢³öÖÒ¸æ £¬ÒªÇóɾ³ýʹÓÃÖݵ±¾Ö¹Ù·½µç×ÓÓʼþµØÖ··¢Ë͵ÄÐéαµç×ÓÓʼþ¡£ÕâЩ´¹µöÓʼþÀ´×Ô¶à¸öÖݵ±²¿ÃÅÃÅ £¬Ô̺¬¶ùͯ·þÎñ²¿¡¢ÅÜÂíίԱ»áµÈ £¬ËüÃǺýŪÐÔµØ·î¸æÊÕ¼þÈË´æÔÚδ½ÉÄɵÄͨ³©·Ñ £¬²¢ÍþвÈô²»½ÉÄɽ«Ãæ¶Ô¾­¼Ã´¦·£»ò³µÁ¾µÇ¼Ç±»½ØÁô¡£Óʼþ½áβ³£ÒÔ¡°¸Ð¼¤Äú £¬TxTag ¿Í·þ¡±×÷ΪÊðÃû £¬²¢Ô̺¬ÒÉËÆ¶ñÒâÍøÕ¾µÄÁ´½Ó¡£Ó¡µÚ°²ÄÉÖݺÓɽ°²È«Êýͨ¹ý¼¼Êõ°ì¹«ÊÒÔÚXƽ̨°ä²¼ÐÂÎÅ £¬ÌáÐѹ«¼Ò¾¯Ìè´ËÀàÚ¿Æ­¡£ÉêÃ÷Ö¸³ö £¬Öݵ±¾Ö²»»áͨ¹ý¶ÌÐÅ»òµç×ÓÓʼþ·¢ËÍδ½Éͨ³©·Ñ֪ͨ £¬²¢°µÊ¾¼¼Êõ°ì¹«ÊÒÕýÓëÉæÊ¹«Ë¾ºÏ×÷ £¬ÒÔ×èÖ¹ÈκνøÒ»²½µÄͨѶ¡£¾ÝÏàʶ £¬Öݵ±¾ÖÓÚÈ¥ÄêÄêµ×ÖÕÖ¹ÁËÓëÒ»¼Òδ¾ßÃû¹©¸øÉ̵ĺÏͬ £¬µ«Î´É¾³ý¸ÃÖݵÄÕË»§¡£Õâ´ÎÊÂÎñÖÐ £¬Ò»Ãû³Ð°üÉ̵ÄÕË»§Ôâµ½ºÚ¿Í¹¥»÷ £¬²¢±»ÓÃÓÚ·¢ËÍÕâЩÐéαÐÅÏ¢ £¬¶øÖÝϵͳ²¢Î´·¢ÏÖÈëÇÖ¼£Ïó¡£µç×ÓÓʼþ½ØÍ¼ÏÔʾ £¬ÕâЩÐÅÏ¢ÊÇͨ¹ýµ¤·ðÈí¼þ¹«Ë¾GranicusµÄÈí¼þGovDelivery Communications Cloud·Ö·¢µÄ¡£Granicus½²»°ÈËSharon Rushen°µÊ¾ £¬¸ÃÊÂÎñ²¢Î´ÊæÕ¹ÖÁÆä×ÔÉíÆ½Ì¨ £¬ÏµÍ³Êǰ²È«µÄ¡£ËýÖ¸³ö £¬ÎÊÌâÔ´ÓÚÖÎÀíÔ±Óû§ÕË»§±»ÈëÇÖ £¬¿ÉÄÜÊÇͨ¹ý²Â²âƾ֤»òÉç½»¹¤³Ì¼¿Á©»ñÈ¡¡£


https://statescoop.com/indiana-phishing-attack-contractor-hacked/


5. FrigidStealerͨ¹ýÐéαä¯ÀÀÆ÷¸üй¥»÷macOSÓû§


5ÔÂ15ÈÕ £¬FrigidStealer¶ñÒâÈí¼þÕýͨ¹ýÐéαä¯ÀÀÆ÷¸üÐÂÌáÐѹ¥»÷macOSÓû§ £¬¸Ã±äÖÖÓÚ2025Äê2Ô³õ´Î±»·¢ÏÖ £¬²¢ÒѲ¨¼°±±ÃÀ¡¢Å·ÖÞºÍÑÇÖÞµÄÓû§¡£´Ë¶ñÒâÈí¼þ´ÓÊôÓÚFerret¶ñÒâÈí¼þ¼Ò×å £¬ÓëTA2726ºÍTA2727²¡¶¾ÓÐ¹Ø £¬Á½Õß¾ùÒÔÀûÓÃÐéαä¯ÀÀÆ÷¸üÐÂΪ¹¥»÷¼¿Á©¶øÖø³Æ¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉSafari¸üеĴÅÅÌÓ³ÏñÎļþ£¨DMG£© £¬ÓÕÆ­Óû§ÏÂÔØ²¢×°Öá£×°Öùý³ÌÖÐ £¬Ëü»áÌáÐÑÓû§ÊäÈëÃÜÂë £¬´Ó¶øÈƹýAppleµÄGatekeeper±£»¤»úÔì £¬²¢½èÖúÄÚÖõÄAppleScriptÖ°ÄÜÖ´ÐжñÒâ²Ù×÷¡£×°Öúó £¬Ëü»á¼Ù×°³ÉÒ»¸ö´øÓÐÌØ¶¨bundle IDµÄ¶ñÒâÀûÓà £¬ÓëºÏ·¨ÀûÓûìºÏÊÓÌý¡£Ò»µ©¼¤»î £¬FrigidStealer±ãÆðÍ·ÍøÂçÓû§µÄÃô¸ÐÊý¾Ý £¬Ô̺¬ä¯ÀÀÆ÷ƾ֤¡¢ÏµÍ³Îļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢¼°Apple NotesµÈ £¬²¢Í¨¹ýmacOSµÄmDNSResponder·ÓɵÄDNS²éÎÊ £¬½«ÕâЩÊý¾Ýй¶µ½ºÅÁîÓë½ÚÔì·þÎñÆ÷¡£ÇÔÈ¡Êý¾Ýºó £¬¸Ã¶ñÒâÈí¼þ»á×ÔÎÒÖÕÖ¹ £¬ÒÔ½µµÍ±»·¢ÏֵķçÏÕ¡£¾Ý¿ªÔ´ÍøÂ簲ȫ¹«Ë¾WazuhÅû¶ £¬FrigidStealer²¢²»ÒÀÀµ´«Í³µÄ·ì϶ÀûÓù¤¾ß°ü»ò·ì϶ £¬¶øÊÇÀûÓÃÓû§¶Ôϵͳ֪ͨºÍä¯ÀÀÆ÷¸üÐÂÌáÐѵÄÐÅÀµ½øÐй¥»÷ £¬ÕâʹµÃËü¸üΪΣÏÕÇÒÓÐЧ¡£´Ë±í £¬¸Ã¶ñÒâÈí¼þ»¹ÀûÓÃmacOSÌØÓеÄÐÐΪÀ´Î¬³ÖÓÆ¾ÃÐÔ £¬Í¨¹ý×¢²áΪǰ̨ÀûÓ÷¨Ê½µÈ·½Ê½Óëϵͳ½»»¥ £¬²¢ÔÚÖ´Ðкóɾ³ý×ÔÉíºÛ¼£ £¬ÒÔά³Ö°µ²Ø¡£


https://hackread.com/frigidstealer-malware-macos-fake-safari-browser-update/


6. ÕÐÆ¸Æ½Ì¨HireClick570Íò·Ý¼òÀúÔâй¶


5ÔÂ15ÈÕ £¬Cybernews×êÑÐÈËÔ±½üÈÕ·¢ÏÖһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ £¬±¾Ô­Ö¸ÏòÃæÏòÖÐÓ×ÐÍÆóÒµµÄÕÐÆ¸Æ½Ì¨HireClick¡£ÓÉÓÚÑÇÂíÑ·AWS S3´æ´¢Í°ÅäÖÃÃýÎó £¬¸Ãƽ̨³¬¹ý570Íò·ÝÎļþ±»Â¶³öÔÚ»¥ÁªÍøÉÏ £¬ÆäÖÐÖØÒªÊÇÇóÖ°ÕߵļòÀú £¬ÕâЩÎļþй¶ÁËÇóÖ°ÕßµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¼°¾ÍÒµÐÅÏ¢µÈÃô¸ÐºÍ¸öÈËÊý¾Ý¡£Õâ´ÎÊý¾Ýй¶¶ÔHireClick¿Í»§µÄÓ°ÏìÉîÔ¶¡£Ð¹Â¶µÄÊý¾ÝÒ»µ©ÂäÈë·¸·¨·Ö×ÓÖ®ÊÖ £¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¼ÙÒâ¡¢ÍøÂç´¹µöµÈ¶àÖ¶à¿Æ­»î¶¯¡£¹¥»÷Õß¿ÉÄٰܼçÕÐÆ¸¾­Àí £¬ÀûÓÃй¶µÄÐÅÏ¢ÓÕÆ­ÇóÖ°ÕßÌṩÉí·Ý֤ɨÃè¼þ¡¢Éç»á°²È«ºÅÂëÉõÖÁÒøÐÐÐÅÏ¢ £¬»òͨ¹ýµç»°ÓÕÆ­ÇóÖ°ÕßÐ¹Â©ÒøÐÐÐÅÏ¢»ò×°ÖöñÒâÈí¼þ¡£´Ë±í £¬Ú¿Æ­Õß»¹¿ÉÀûÓÃй¶µÄ¼òÀú´´½¨ÐéαÉí·Ý½øÐоÍÒµÑéÖ¤Ú¿Æ­ £¬ÉõÖÁ¼ÙÒâÇóÖ°Õß½øÈ빤×÷³¡Ëùϵͳ¡£ÕâÖÖÊý¾Ýй¶ÐÐΪµÄ·çÏÕ²»½öÏÞÓÚÊý¾Ý͵ÇÔ×ÔÉí £¬»¹¿ÉÄÜÒý·¢ÍøÂçÈËÈâËÑË÷ £¬¼´¶ñÒâÆØ¹â¸öÈËÐÅÏ¢ÒÔɧÈÅ»ò¿ÖÏÅËûÈË¡£¹¥»÷Õß°ÑÎÕÁËÊܺ¦ÕßµÄÈ«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÏÖʵµØÖ· £¬¾ÍÄܵÈÏÐËø¶¨²¢É§ÈÅÊܺ¦Õß¡£


https://cybernews.com/security/hireclick-resume-database-data-leak/