XRP Ledger SDKÔ⹩ӦÁ´¹¥»÷ £¬¶ñÒâNPM°æ±¾ÇÔȡ˽Կ

Ðû²¼Ê±¼ä 2025-04-25

1. XRP Ledger SDKÔ⹩ӦÁ´¹¥»÷ £¬¶ñÒâNPM°æ±¾ÇÔȡ˽Կ


4ÔÂ24ÈÕ £¬XRPLedgerSDK¿ËÈÕÔâÊÜÁËÑÏÖØµÄ¹©Ó¦Á´¹¥»÷ £¬¹¥»÷Õßͨ¹ýÈëÇÖ¹Ù·½xrpl½Úµã°ü¹ÜÀíÆ÷£¨NPM£©Èí¼þ°ü £¬Ö²Èë¶ñÒâ´úÂëÒÔÇÔÈ¡Óû§Ë½Ô¿ £¬½ø¶ø¿ØÖÆÆä¼ÓÃÜÇ®±ÒÇ®°ü ¡£´Ë´Î¹¥»÷ÓÉAikidoÓ¢ÌØ¶ûÍþв¼ì²âϵͳ·¢Ã÷ £¬¸Ãϵͳ¼à²âµ½NPMÉÏÐÂÐû²¼µÄÎå¸öxrplÈí¼þ°ü°æ±¾£¨4.2.4¡¢4.2.3¡¢4.2.2¡¢4.2.1ºÍ2.14.2£©±£´æÒì³£ £¬ÆäÿÖÜÏÂÔØÁ¿Áè¼Ý14Íò´Î £¬¶øÕâЩ°æ±¾ÔÚGitHubÉϲ¢ÎÞ¶ÔÓ¦Õýµ±°æ±¾ £¬ÇÒÆäʱGitHubÉÏ×îÐÂÕýµ±°æ±¾ºÅΪ4.2.0 £¬²î±ðÒý·¢ÁËÇå¾²µ£ÐÄ ¡£½øÒ»³ÌÐò²é·¢Ã÷ £¬¶ñÒâÈí¼þ°ü4.2.4°æ±¾µÄsrc/index.tsÎļþÖÐ £¬±£´æÒ»¸öÃûΪcheckValidityOfSeedµÄÒì³£º¯Êý £¬¸Ãº¯Êý»áÏòÒ»¸öн¨ÉèµÄÉúÊèÓòÃû·¢ËÍHTTP POSTÇëÇó £¬´ËÓòÃû×¢²áÐÅÏ¢¿ÉÒÉ ¡£¶ñÒâ´úÂëÔÚÒªº¦º¯ÊýÖб»Å²Óà £¬ÈçWalletÀàµÄ½á¹¹º¯Êý £¬µ¼ÖÂÔÚÓ¦ÓóÌÐòʵÀý»¯Wallet¹¤¾ßʱ £¬Óû§µÄ˽Կ¿ÉÄܱ»·¢ËÍÖÁ¹¥»÷Õß·þÎñÆ÷ ¡£ÔçÆÚ¶ñÒâ°æ±¾£¨4.2.1ºÍ4.2.2£©½«¶ñÒâ´úÂëÒýÈë¹¹½¨µÄJavaScriptÎļþÖÐ £¬²¢É¾³ýÁËpackage.jsonÎļþÖеľ籾ºÍPrettierÉèÖà £»´ËºóÐø°æ±¾£¨4.2.3ºÍ4.2.4£©Ôò½«¶ñÒâ´úÂëÖ±½Ó¼¯³Éµ½TypeScriptÔ´´úÂëÖÐ £¬ÒÔ¹æ±Ü¼ì²â ¡£¹Ù·½xrplÒÑÐû²¼Á½¸öеÄÇå¾²°æ±¾£¨4.2.5ºÍ2.14.3£© £¬Ç¿ÁÒ½¨ÒéÓû§Á¬Ã¦¸üÐÂÒÔ½µµÍΣº¦ ¡£


https://hackread.com/backdoor-found-in-official-xrp-ledger-npm-package/


2. ºÚ¿ÍÀÄÓÃOAuth 2.0Ð®ÖÆMicrosoft 365ÕË»§


4ÔÂ24ÈÕ £¬¶íÂÞ˹ÍþвÐÐΪÕßÒ»Á¬Ê¹ÓÃÕýµ±OAuth 2.0Éí·ÝÑéÖ¤Á÷³Ì £¬¶ÔÓëÎÚ¿ËÀ¼¼°ÈËȨÏà¹Ø×éÖ¯Ô±¹¤µÄMicrosoft 365ÕÊ»§Ìᳫ¹¥»÷ ¡£ÍøÂçÇå¾²¹«Ë¾Volexity×Ô3Ô³õÆð±ã¼à²âµ½´ËÀàÔ˶¯ £¬´ËǰÆäÓë΢ÈíÔÚ2Ô¾ÍÔø±¨¸æ¹ýʹÓÃ×°±¸´úÂëÉí·ÝÑéÖ¤ÍøÂç´¹ÂÚÇÔÈ¡Microsoft 365ÕÊ»§µÄÀàËÆÐж¯ ¡£Volexity×·×Ù·¢Ã÷ £¬Ïà¹ØÍþвÐÐΪÕßUTA0352ºÍUTA0355¾ùΪ¶íÂÞ˹ÈË ¡£¹¥»÷ʼÓÚSignal»òWhatsAppµÄÒ»ÌõÐÂÎÅ £¬ÐÂÎÅ¿ÉÄÜÀ´×Ô±»µÁµÄÎÚ¿ËÀ¼Õþ¸®ÕË»§ ¡£UTA0352»áÒÔPDFÎļþÐÎʽ·ÖÏí¾Û»á˵Ã÷¼°¶ñÒâURL £¬Ö¸µ¼Óû§µÇ¼ʹÓÃMicrosoft 365 OAuthÊÂÇéÁ÷µÄMicrosoftºÍµÚÈý·½Ó¦ÓóÌÐò ¡£Ä¿µÄÍê³ÉÉí·ÝÑéÖ¤ºó £¬»á±»Öض¨Ïòµ½Ìض¨Ò³Ãæ £¬¸ÃÒ³Ãæ¿ÉÎüÊÕº¬OAuthµÄµÇ¼²ÎÊý ¡£¹¥»÷ÕßʹÓÃÉç»á¹¤³ÌѧÓÕÆ­Êܺ¦Õß·¢»ØÊÚȨÂë £¬´Ë´úÂëÓÐÓÃÆÚ60Ìì £¬¿É»ñÈ¡Óû§¡°Í¨³£¿ÉÓõÄËùÓÐ×ÊÔ´¡±µÄ»á¼ûÁîÅÆ ¡£±ðµÄ £¬Ñо¿»¹·¢Ã÷ £¬4Ô¹éÒòÓÚUTA0355µÄÔ˶¯ÓëUTA0352ÀàËÆ £¬µ«³õʼͨѶÀ´×Ô±»ÈëÇÖµÄÎÚ¿ËÀ¼Õþ¸®µç×ÓÓʼþÕË»§ £¬¹¥»÷Õß»áʹÓÃÇÔÈ¡µÄOAuthÊÚȨÂ뽫ÐÂ×°±¸×¢²áµ½Êܺ¦ÕßµÄMicrosoft Entra ID £¬²¢Ïë·¨ÈÃÄ¿µÄÅú׼˫ÒòËØÉí·ÝÑéÖ¤ÇëÇó £¬ÒÔ»ñÈ¡»á¼ûȨÏÞºÍά³Öºã¾Ã²»·¨»á¼û ¡£


https://www.bleepingcomputer.com/news/security/hackers-abuse-oauth-20-workflows-to-hijack-microsoft-365-accounts/


3. ³¯ÏÊLazarus×éÖ¯Operation SyncHoleÌØ¹¤Ô˶¯


4ÔÂ24ÈÕ £¬ÎÛÃûÕÑÖøµÄ³¯ÏÊÍþв×éÖ¯LazarusÌᳫÁËÒ»´ÎÕë¶Ôº«¹ú¶àÁìÓòµÄÌØ¹¤Ô˶¯ £¬¿¨°Í˹»ù½«ÆäÃüÃûΪ¡°Operation SyncHole¡± ¡£´Ë´ÎÔ˶¯ÔÚ2024Äê11ÔÂÖÁ2025Äê2ÔÂʱ´úÖÁÉÙΣº¦Á˺«¹úÈí¼þ¡¢IT¡¢½ðÈÚ¡¢°ëµ¼ÌåÖÆÔìºÍµçÐŵÈÁìÓòµÄÁù¸ö×éÖ¯ £¬ÇÒ¼øÓÚÆäʹÓÃÈí¼þµÄÊ¢ÐÐˮƽ £¬ÊÜÓ°Ïì×éÖ¯»ò±é²¼¸üÆÕ±éÐÐÒµ ¡£¹¥»÷ÒÁʼ £¬Ä¿µÄ»á¼ûº«¹úÕýµ±Ã½ÌåÃÅ»§ÍøÕ¾Ê± £¬LazarusʹÓ÷þÎñÆ÷¶Ë¾ç±¾ÈëÇÖÕâÐ©ÍøÕ¾ £¬ÆÊÎö»á¼ûÕß²¢Öض¨ÏòÓÐÓÃÄ¿µÄÖÁ¶ñÒâÓò ¡£Êܺ¦Õß³£±»Öض¨Ïòµ½Ä£ÄâÈí¼þ¹©Ó¦ÉÌ£¨ÈçCross EX·ÖÏúÉÌ£©µÄÐéÎ±ÍøÕ¾ £¬Cross EX¿Éʹº«¹úÈËÔÚÍøÂçä¯ÀÀÆ÷ÖÐʹÓÃÇå¾²Èí¼þ¾ÙÐÐÍøÉÏÒøÐкÍÓëÕþ¸®ÍøÕ¾»¥¶¯ ¡£Ö»¹ÜʹÓÃCross EXÈö²¥¶ñÒâÈí¼þµÄÏêϸҪÁìÉв»Ã÷È· £¬µ«Ñо¿Ö°Ô±È·ÈϹ¥»÷Àú³Ì¶àÒÔ¸ßÍêÕûÐÔ¼¶±ðÖ´ÐÐ £¬Åú×¢¹¥»÷ÕßÌáÉýÁËȨÏÞ ¡£ÐéÎ±ÍøÕ¾ÉϵĶñÒâJavaScript½èÖúCross EXÈí¼þÈö²¥¶ñÒâÈí¼þ £¬Îó²îʹÓóÌÐò»áÆô¶¯Õýµ±µÄ¡°SyncHost.exe¡±Àú³Ì²¢×¢Èëshellcode £¬¼ÓÔØ¡°ThreatNeedle¡±ºóÃÅ £¬¸ÃºóÃÅÄÜÔÚÊÜѬȾÖ÷»úÉÏÖ´ÐÐ37ÌõÏÂÁî £¬ÓÃÓÚ°²ÅŶàÖÖ¶ñÒâ³ÌÐò ¡£


https://www.bleepingcomputer.com/news/security/lazarus-hackers-breach-six-companies-in-watering-hole-attacks/


4. Ү³ŦºÚÎÄÒ½ÁÆÖÐÐÄÊý¾Ýй¶ӰÏì550Íò»¼Õß


4ÔÂ24ÈÕ £¬Ò®Â³Å¦ºÚÎÄ¿µ½¡ÖÐÐÄ£¨YNHHS£©½üÆÚÔâÓöÍøÂç¹¥»÷ £¬µ¼ÖÂ550ÓàÍòÃû»¼ÕßСÎÒ˽¼ÒÐÅϢй¶ ¡£2025Äê3ÔÂ8ÈÕ £¬YNHHS·¢Ã÷ÆäÐÅÏ¢ÊÖÒÕ£¨IT£©ÏµÍ³·ºÆðÒì³ £Ô˶¯ £¬Ëæ¼´½ÓÄɲ½·¥¿ØÖÆÊÂÎñ²¢Õö¿ªÊÓ²ì £¬»¹ÏòÖ´·¨²¿·Ö±¨¸æ ¡£ÊӲ췢Ã÷ £¬Î´¾­ÊÚȨµÄµÚÈý·½ÓÚµ±ÈÕ»á¼ûÆäÍøÂç²¢»ñÈ¡²¿·ÖÊý¾Ý¸±±¾ ¡£ÔÚÍøÂçÇå¾²¹«Ë¾MandiantЭÖúÏ £¬3ÔÂ11ÈÕ¸ÃÍøÂçÇå¾²ÊÂÎñÓ°ÏìIT·þÎñµÄÎÊÌâѸËÙ»ñµÃ¿ØÖÆ £¬»¼ÕßÕչ˻¤Ê¿ºÍÒ½ÁƼͼδÊÜÓ°Ïì £¬µ«»Ö¸´ÊÂÇéÖÐÈÔ±£´æÒ»Ð©»¥ÁªÍøºÍÓ¦ÓóÌÐò»á¼ûÎÊÌâ ¡£4ÔÂ11ÈÕ £¬YNHHSÅû¶Êý¾Ýй¶ÊÂÎñ £¬³ÆÍþвÐÐΪÕßÇÔÈ¡ÁË»¼ÕßÃô¸ÐÐÅÏ¢ £¬±»µÁÊý¾ÝÒò»¼Õß¶øÒì £¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢ÖÖ×å/Ãñ×å¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢»¼ÕßÀàÐÍ¡¢²¡Àú±àºÅµÈ £¬µ«²»°üÀ¨²ÆÎñÐÅÏ¢¡¢Ò½ÁƼͼ»òÖÎÁÆÏ¸½Ú ¡£¸Ã»ú¹¹Ç¿µ÷ÊÂÎñδӰÏìÆäΪ»¼ÕßÌṩÕչ˻¤Ê¿µÄÄÜÁ¦ ¡£×Ô4ÔÂ14ÈÕÆð £¬YNHHS½«ÏòÊÜÓ°Ï컼ÕßÓʼÄÐżþ ¡£ËäÏÖÔÚ䱨¸æÊý¾Ý±»ÀÄÓÃÇéÐÎ £¬µ«ÒÑÎªÉæ¼°Éç±£ºÅÂëµÄ»¼ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿Ø £¬²¢ÉèÁ¢×¨Ãźô½ÐÖÐÐĽâ´ðÏà¹ØÎÊÌâ ¡£


https://securityaffairs.com/176937/data-breach/yale-new-haven-health-ynhhs-data-breach-impacted-5-5-million-patients.html


5. ¸¥À×µÂÀï¿Ë¿µ½¡ÖÐÐÄÊý¾Ýй¶ӰÏì½ü°ÙÍò»¼Õß


4ÔÂ24ÈÕ £¬½ñÄê1Ô £¬ÂíÀïÀ¼ÖÝ´óÐÍÒ½ÁƱ£½¡ÌṩÉ̸¥À×µÂÀï¿Ë¿µ½¡Ò½ÁƼ¯ÍÅÔâÓöÀÕË÷Èí¼þ¹¥»÷ £¬Òý·¢Êý¾Ýй¶ £¬ÖÂʹ½ü°ÙÍò»¼ÕßÐÅÏ¢ÊÜÓ°Ïì ¡£3ÔÂβ £¬¸ÃÒ½ÁÆÏµÍ³Ïò»¼Õß·¢³ö֪ͨ £¬Í¸Â¶ÀÕË÷Èí¼þ¹¥»÷ÓÚ1ÔÂ27ÈÕ±»¼ì²âµ½ ¡£·¢Ã÷¹¥»÷ºó £¬¸¥À×µÂÀï¿Ë¿µ½¡ÖÐÐÄѸËÙÐж¯ £¬Í¨ÖªÖ´·¨²¿·Ö²¢Ô¼ÇëµÚÈý·½È¡Ö¤¹«Ë¾ £¬¶ÔÊÂÎñÓ°ÏìÕö¿ªÊÓ²ì ¡£ÆäÉùÃ÷Ö¸³ö £¬2025Äê1ÔÂ27ÈÕ £¬¸ÃÖÐÐÄÔâÓöÀÕË÷Èí¼þÊÂÎñ £¬ITϵͳÊÜÓ°Ïì £¬ÊӲ췢Ã÷Ò»Ãûδ¾­ÊÚȨְԱ»á¼ûÍøÂç £¬²¢ÓÚµ±ÈÕ´ÓÎļþ¹²Ïí·þÎñÆ÷¸´ÖÆÁ˲¿·ÖÎļþ ¡£Í¬Ê± £¬¸ÃÖÐÐÄÌåÏÖÕýΪÐÅÏ¢¿ÉÄܱ»Ð¹Â¶ÇÒÕÆÎÕ×ã¹»ÁªÏµÐÅÏ¢µÄСÎÒ˽¼ÒÓʼÄÐżþ ¡£´Ë´ÎÊý¾ÝÐ¹Â¶Éæ¼°¹æÄ£ÆÕ±é £¬¹¥»÷Õ߯¾Ö¤ÊÜÓ°ÏìÖ°Ô±²î±ð £¬ÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÔÚÄÚµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢ £¬ÒÔ¼°²¡ÀúºÅ¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ó뻼ÕßÕչ˻¤Ê¿Ïà¹ØµÄÁÙ´²ÐÅÏ¢µÈСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢ ¡£Ö»¹Ü¸¥À×µÂÀï¿Ë¿µ½¡ÖÐÐÄδÐû²¼ÊÜÓ°ÏìÏêϸÈËÊý £¬µ«3ÔÂ28ÈÕÒÑÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿±¨¸æ´ËÊ ¡£ÏÖÔÚ £¬ÎÀÉúÓ빫ÖÚ·þÎñ²¿¸üб¨¸æÐ¹Â¶ÊÂÎñÁбí £¬È·ÈÏ´Ë´ÎÊÂÎñÓ°Ïì934,326Ãû»¼Õß ¡£


https://www.bleepingcomputer.com/news/security/frederick-health-data-breach-impacts-nearly-1-million-patients/


6. ÂíËþÂÞ¹©Ë®¹«Ë¾ÔâÍøÂç¹¥»÷ £¬¿Í»§ÐÅÏ¢»òй¶


4ÔÂ24ÈÕ £¬Î÷°àÑÀÈÏÕæÒûÓÃË®ºÍÎÛË®´¦Öóͷ£µÄ¹©Ë®¹«Ë¾Aig¨¹es de Matar¨®£¨°¬¸ñ˹µÂÂíËþÂÞ£©ÓÚÖÜÈýÐû²¼ £¬Æä¹«Ë¾ÅÌËã»úϵͳºÍÍøÕ¾ÔâÊÜÍøÂç¹¥»÷ ¡£¸Ã¹«Ë¾·þÎñµÄÂíËþÂÞÊǼÓÌ©ÂÞÄáÑǵÄÒ»¸öÑØº£³ÇÕò £¬Éú³ÝÔ¼13Íò £¬Î»ÓÚ°ÍÈûÂÞÄÇÒÔ±±Ô¼19Ó¢Àï´¦ £¬ÂíËþÂÞÊÐÕþ¹«Ë¾Ã÷È·ÌåÏÖ £¬´Ë´Î¹¥»÷δ¶Ô¹©Ë®×Ô¼ººÍÖÊÁ¿¿ØÖÆÏµÍ³Ôì³ÉÓ°Ïì ¡£°¬¸ñ˹µÂÂíËþÂÞÔÚ¹Ù·½ÉùÃ÷ÖгÆ £¬´Ë´Î¹¥»÷ÓÚÖÜÒ»±»·¢Ã÷ £¬¹«Ë¾ÒѵÚһʱ¼äÏò¼ÓÌ©ÂÞÄáÑǾ¯·½ÒÔ¼°×ÔÖÎÇøÍøÂçÇå¾²»ú¹¹±¨¸æ ¡£×÷ΪÏÖÓÐÓ¦¼±ÍýÏëµÄÒ»²¿·Ö £¬¸Ã¹«Ë¾Ñ¸ËÙʵÑéÄÚ²¿¿ØÖƲ½·¥ £¬ÒÔ¼õÇá¹¥»÷´øÀ´µÄÓ°Ïì £¬²¢Æð¾¢Óë¼ÓÌ©ÂÞÄáÑÇÕþ¸®ÏàÖú £¬È«Á¦»Ö¸´ÊÜÓ°ÏìµÄ»ù´¡ÉèÊ© ¡£²»¹ý £¬°¬¸ñ˹µÂÂíËþÂÞÒ²Ïò¿Í»§·¢³öÖÒÑÔ £¬¹«Ë¾³ÖÓеÄһϵÁÐСÎÒ˽¼ÒÐÅÏ¢ £¬º­¸Ç²ÆÎñºÍСÎÒ˽¼ÒÐÅÏ¢µÈ £¬¿ÉÄÜÒÑÔÚ¹¥»÷ÖÐй¶ ¡£Îª´Ë £¬¹«Ë¾ÃãÀø¿Í»§¼á³ÖСÐÄ £¬Ìá·ÀʹÓÃÕâЩй¶Êý¾ÝÌᳫµÄÍøÂç´¹ÂÚ¹¥»÷ ¡£Í¬Ê± £¬¹«Ë¾Ì¹ÑԴ˴ι¥»÷»á¸øÏÖÔÚÎÞ·¨»á¼û¹«Ë¾·þÎñµÄÓû§´øÀ´Î´±ã £¬Óû§¿ÉÄÜ»áÔâÓö¼Æ·ÑºÍÆäËûÐÐÕþ³ÌÐòµÄÑÓ³Ù ¡£


https://therecord.media/cyberattack-water-supplier-barcelona-spain