Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ

Ðû²¼Ê±¼ä 2025-03-28

1. Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬×÷Ϊ΢Èí365Éú̬µÄÆóÒµ¼¶ÊÓÆµÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬Microsoft Stream¾­µä°æÓÚ2020ÄêÆô¶¯Ç¨áãÖÁSharePoint£¬£¬£¬£¬£¬£¬£¬Ô­ÓòÃûmicrosoftstream.com°´ÍýÏëÓ¦ÓÚ2024ÄêÖÜÈ«ÍËÒÛ ¡£¡£¡£È»¶ø2025Äê3Ô£¬£¬£¬£¬£¬£¬£¬¸ÃÓòÃûÍ»ÔâÐ®ÖÆ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߸͝DNSÆÊÎöʹÆäÖ¸Ïò·ÂðÑÇÂíÑ·½çÃæµÄÌ©¹ú¶Ä³¡´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÈÔǶÈë¾É°æÊÓÆµÁ´½ÓµÄSharePointÒ³Ãæ±»À¬»øÄÚÈÝÎÛȾ ¡£¡£¡£ÊÖÒÕÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÓòÃû×¢²áÐÅÏ¢ÓÚÊ·¢µ±ÈÕ±»²»·¨Ð޸쬣¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÉç»á¹¤³Ìѧ»òÎó²îʹÓûñÈ¡¿ØÖÆÈ¨ ¡£¡£¡£Ö»¹Ü΢ÈíÒѽôÆÈ¹Ø±ÕÓòÃûÆÊÎö£¬£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñ¶ÔÓû§µÄDZÔÚΣº¦½ûÖ¹ºöÊÓ£ºÆóÒµÄÚÍøÓû§¿ÉÄÜÒò»á¼û±»Ð®ÖÆÒ³Ãæµ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬¶øSharePointÉú̬ÖвÐÁôµÄǶÈëÁ´½Ó¸ü³ÉΪһÁ¬Íþв ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßδ½øÒ»²½Ö²Èë¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ö÷ҪΣº¦¼¯ÖÐÔÚÍøÂç´¹ÂÚ²ãÃæ ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´ËÀàÊÂÎñ·´Ó¦³öÆóÒµ¶ÔÍËÒÛÓòÃû´¦Öóͷ£µÄÆÕ±éÊè©£ºÊµÊ±¸üÐÂǶÈë×ÊÔ´¡¢È±·¦DNS¼à¿Ø»úÖÆ¡¢Î´°²ÅÅDNSSEC·À»¤µÈÎó²î£¬£¬£¬£¬£¬£¬£¬¶¼¿ÉÄܱ»¹¥»÷ÕßʹÓÃʵÑéÖÐÐÄÈ˹¥»÷ ¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/hijacked-microsoft-stream-classic-domain-spams-sharepoint-sites/


2. ¡¶°×Ñ©¹«Ö÷¡·Î´ÉÏÏßDisney+£¬£¬£¬£¬£¬£¬£¬µÁ°æÏÝÚåDZÔÚ¶ñÒâÈí¼þ


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬µÏÊ¿ÄáÕæÈ˰桶°×Ñ©¹«Ö÷¡·Î´Í¨¹ýµÏÊ¿Äá×ÔÓÐÁ÷ýÌåÆ½Ì¨Disney+¿¯ÐУ¬£¬£¬£¬£¬£¬£¬ÆÈʹ²¿·Ö¹ÛÖÚתÏòµÁ°æÇþµÀ£¬£¬£¬£¬£¬£¬£¬È´Òò´ËÏÝÈëÍøÂçÕ©Æ­ÏÝÚå ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾VeritiÅû¶£¬£¬£¬£¬£¬£¬£¬Õ©Æ­·Ö×ÓʹÓÃӰƬδÉÏÏßÕý¹æÆ½Ì¨µÄ¿ÕµµÆÚ£¬£¬£¬£¬£¬£¬£¬ÔÚ"TeamEsteem"ÍøÕ¾Ðû²¼ÐéᲩ¿Í£¬£¬£¬£¬£¬£¬£¬Î±×°³É¹Ù·½×ÊÔ´Ìṩ2025°æ¡¶°×Ñ©¹«Ö÷¡·µÁ°æÏÂÔØ ¡£¡£¡£¸Ã´ÅÁ¦ÖÖ×ÓÁ´½Ó¿´ËÆÕýµ±£¬£¬£¬£¬£¬£¬£¬ÊµÔòÀ¦°ó¶ñÒâÈí¼þ ¡£¡£¡£ÒÑÓÐ45ÃûÓû§ÏÂÔØ²¢Èö²¥¸ÃÖÖ×ÓÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Î±×°³ÉÊÓÆµ±à½âÂëÆ÷µÄ"xmph_codec.exe"³ÌÐò ¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐò½«ÊµÑé¶àÖØ¶ñÒâ²Ù×÷£ºÊ×ÏȽûÓÃWindows DefenderµÈÇå¾²·À»¤£¬£¬£¬£¬£¬£¬£¬ËæºóÖ²Èë±»50¿îÇå¾²¹¤¾ß±ê¼ÇΪ¶ñÒâµÄÎļþ£¬£¬£¬£¬£¬£¬£¬²¢¾²Ä¬×°ÖÃTORä¯ÀÀÆ÷½¨Éè°µÍøÍ¨Ñ¶Í¨µÀ£¬£¬£¬£¬£¬£¬£¬×îÖÕʹװ±¸Ì»Â¶ÓÚÊý¾Ý͵ÇÔºÍÀÕË÷Èí¼þ¹¥»÷Σº¦ÖÐ ¡£¡£¡£¹¥»÷Õß¿ÉÄÜͨ¹ýÁ½ÖÖ·½·¨ÈëÇÖTeamEsteem¹ÙÍø£ºÒ»ÊÇʹÓÃYoast SEO²å¼þ¾É°æ±¾Îó²î£¨CVE-2023-40680£©£¬£¬£¬£¬£¬£¬£¬¶þÊÇ͵ȡÖÎÀíԱƾֱ֤½ÓÐû²¼ÐéαÄÚÈÝ ¡£¡£¡£Ç徲ר¼Ò½¨Ò飬£¬£¬£¬£¬£¬£¬¹ÛÖÚÓ¦×èÖ¹ÏÂÔØÈªÔ´²»Ã÷µÄµÁ°æÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬°´ÆÚ¸üз´¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬²¢¶ÔÒªÇó×°ÖÃÌØÊâ±à½âÂëÆ÷µÄ¿ÉÒÉÎļþ¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬ÒÔ·ÀÂäÈëÍøÂç·¸·¨ÏÝÚå ¡£¡£¡£


https://hackread.com/fake-snow-white-movie-torrent-infects-device-malware/


3. COPAÊý¾Ýй¶ÊÂÎñ²¨¼°Á½Öݽü68,000Ãû»¼ÕßÃô¸ÐÐÅÏ¢


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬È¥Äê11Ô£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯Everest Team½«ÃÀ¹ú¹Ç¿ÆÒ½ÁÆ»ú¹¹Concord Orthopaedics£¨COPA£©ÁÐÈë°µÍøÐ¹ÃÜÍøÕ¾£¬£¬£¬£¬£¬£¬£¬Ðû³ÆÕÆÎÕÆä×Ô2018ÄêÆðµÄËùÓл¼ÕßÒ½ÁƼͼ¼°Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢Ô¤Ô¼ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÏêÇé¼°²¿·Ö¼ÝʻִÕÕͼÏñ ¡£¡£¡£¸Ã»ú¹¹ÓÚ2025Äê3ÔÂ25ÈÕÏòÊÜÓ°ÏìÕß¼ÄËÍÊéÃæÍ¨Öª£¬£¬£¬£¬£¬£¬£¬È·ÈÏÆä»¼Õß¹ÒºÅÓëԤԼϵͳ¹©Ó¦ÉÌÔâÍøÂçÈëÇÖ£¬£¬£¬£¬£¬£¬£¬µ«Ç¿µ÷ÄÚ²¿ÇéÐÎδÊÜÓ°Ïì ¡£¡£¡£Æ¾Ö¤COPAͨ¸æ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Ô´Í·ÎªµÚÈý·½¹©Ó¦É̵ÄÈí¼þÎó²î£¬£¬£¬£¬£¬£¬£¬ÍâйÊý¾ÝÀàÐͺ­¸ÇÔ¤Ô¼¼Í¼£¨ÈçÊÖÊõÀàÐÍ¡¢Ò½ÉúÐÕÃû¡¢ÈÕÆÚËùÔÚ£©¡¢¿µ½¡°ü¹ÜÐÅÏ¢£¨º¬ÊÜÒæÈ˱àºÅ¡¢°ü¹Ü×ʸñ£©¼°²¿·ÖÉí·ÝÎļþ ¡£¡£¡£¹©Ó¦ÉÌÓÚ2025Äê1ÔÂ28ÈÕÏòCOPAÌṩDZÔÚÓ°ÏìÊý¾Ý¹æÄ£ ¡£¡£¡£Ðº±²¼Ê²¶ûÖÝ×ÜÉó²é³¤°ì¹«ÊÒÅû¶£¬£¬£¬£¬£¬£¬£¬¸ÃÖݹ²ÓÐ67,835ÃûסÃñÐÅÏ¢ÉæÏÕ£¬£¬£¬£¬£¬£¬£¬ÂíÈøÖîÈûÖÝÉÐÓÐ1,517ÈËÊÜÓ°Ïì ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬EverestÐû²¼µÄ2.9GBй¶Êý¾Ý°üÏÖʵ°üÀ¨2019-2024Äê¼ä¸üÆÕ±éµÄ»¼ÕßÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÇÒDataBreaches·¢Ã÷¹©Ó¦ÉÌЧÀÍÆ÷´æ´¢´ó×Úδ¼ÓÃÜÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨Áè¼Ý3ÍòÕżÝÕÕͼÏñ¼°ÆäËûCSVÃûÌÃÒ½ÁƼͼ£¬£¬£¬£¬£¬£¬£¬Ê±¼ä¿ç¶ÈÔ¶³¬ºÚ¿Í×î³õÉù³ÆµÄ2018Äê ¡£¡£¡£


https://databreaches.net/2025/03/27/four-months-after-learning-of-a-vendors-breach-concord-orthopaedics-notifies-almost-68000-patients/


4. Vroom by YouXÒòAWSÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬°Ä´óÀûÑǽðÈڿƼ¼¹«Ë¾Vroom by YouX½üÆÚÔâÓöÃô¸ÐÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Jeremiah FowlerÔÚ¹ûÕæ¿É»á¼ûµÄAmazon S3´æ´¢Í°Öз¢Ã÷°üÀ¨27,000Ìõ¼Í¼µÄÎÞ±£»£»£»£»¤Êý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º­¸Ç¼ÝÕÕ¡¢Ò½ÁƼͼ¡¢¾Íҵ֤ʵ¼°º¬²¿·ÖÐÅÓÿ¨ºÅµÄÒøÐжÔÕ˵¥µÈ¸ß¶ÈÃô¸ÐÊý¾Ý ¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬£¬£¬ÄÚ²¿½ØÍ¼ÏÔʾ±£´æÉúÑÄ320Íò·ÝÎĵµµÄMongoDBʵÀý£¬£¬£¬£¬£¬£¬£¬Æä̻¶״̬¿ÉÄÜÐγÉÍøÂç¹¥»÷ÐÂÈë¿Ú ¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬£¬VroomѸËÙÏÞÖÆÊý¾Ý¿â»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬ÈÏ¿ÉÇå¾²Îó²î²¢ÔÊÐí¿ªÕ¹ÊºóÉó²é ¡£¡£¡£×÷ΪÈ˹¤ÖÇÄÜÇý¶¯µÄÆû³µÈÚ×ÊÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾×Ô2022ÄêÔËÓªÒÔÀ´Ò»Á¬´¦Öóͷ£´ó×Ú¿Í»§Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶¼Í¼ʱ¼ä¿ç¶È´ïÈýÄ꣬£¬£¬£¬£¬£¬£¬Í¹ÏÔÊý¾Ý´¦Öóͷ£»·½ÚµÄÇå¾²Òþ»¼ ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´ËÀàÐÅϢй¶½«Ö±½Óµ¼ÖÂڲƭΣº¦¼¤Ôö£¬£¬£¬£¬£¬£¬£¬°üÀ¨Éç»á¹¤³Ì¹¥»÷¡¢ÐéαÕË»§¿ªÉè¼°¾«×¼ÍøÂç´¹ÂÚµÈ ¡£¡£¡£ÆóÒµÓ¦½ÓÄÉMFAÉí·ÝÑéÖ¤¡¢RBACȨÏÞÖÎÀí¡¢¼ÓÃÜ´«ÊäÓë´æ´¢µÈ½¹µã²½·¥£¬£¬£¬£¬£¬£¬£¬Á¬ÏµCloudTrailµÈ¼à¿Ø¹¤¾ßʵÏÖÍþвʵʱԤ¾¯£¬£¬£¬£¬£¬£¬£¬°´ÆÚ¿ªÕ¹ÉøÍ¸²âÊÔÐÞ²¹Èõµã£¬£¬£¬£¬£¬£¬£¬ÐÞ½¨È«ÉúÃüÖÜÆÚÇå¾²·À»¤Á´Ìõ ¡£¡£¡£


https://hackread.com/aussie-fintech-vroom-pii-records-aws-misconfiguration/


5. CoffeeLoader¶ñÒâÈí¼þʹÓÃÁ¢ÒìÊÖÒÕ¹æ±Ü¼ì²âÍþвWindowsÓû§


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ÐÂÐͶñÒâÈí¼þ¼Ò×å"CoffeeLoader"Õý¶ÔWindowsÓû§×é³ÉÑÏÖØÍþв£¬£¬£¬£¬£¬£¬£¬Æä¸ß¶ÈÒþ²ØÐÔʹµÃ¹Å°å·À²¡¶¾Èí¼þÄÑÒÔ¼ì²â ¡£¡£¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÉZscalerÇå¾²ÍŶÓÓÚ2024Äê9Ô·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Æä¹¥»÷Á´Ê¼ÓÚαװ³É»ªË¶Armoury Crateϵͳ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØºóÖ²ÈëÐÅÏ¢ÇÔȡģ¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬ÒÑÖª¿É´îÔØRhadamanthysµÈ¸ßΣÇÔÃܳÌÐò ¡£¡£¡£CoffeeLoaderÕ¹ÏÖ³ö¶àά¶È¹æ±Ü¼ì²âÊÖÒÕ£º½ÓÄÉArmoury Packer¼Ó¿ÇÊÖÒÕʵÑé³õʼÓÕÆ­£¬£¬£¬£¬£¬£¬£¬¸üÁ¢ÒìµØ½«²¿·Ö¶ñÒâ´úÂë×ªÒÆÖÁGPUÖ´ÐУ¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÇå¾²Èí¼þ¶ÔͼÐδ¦Öóͷ£Æ÷µÄ¼à²âÃ¤ÇøÊµÏÖºã¾ÃDZÔÚ ¡£¡£¡£ÆäŲÓÿÍÕ»¸ÄÏÂÊÖÒÕ¿ÉαÔ캯ÊýŲÓÃÁ´£¬£¬£¬£¬£¬£¬£¬Ê¹Çå¾²ÆÊÎö¹¤¾ßÎóÅгÌÐòÐÐΪÊôÐÔ ¡£¡£¡£µ±¼ì²âµ½Ç徲ɨÃèʱ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»áÆô¶¯"˯Ãß»ìÏý"»úÖÆ£¬£¬£¬£¬£¬£¬£¬½«×ÔÉí¼ÓÃÜ´æ´¢ÓÚÄÚ´æ·Ç»îÔ¾Çø¶Î£¬£¬£¬£¬£¬£¬£¬ÓÐÓÃÌÓ±Üʵʱ¼ì²â ¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬CoffeeLoader´´Á¢ÐÔµØÊ¹ÓÃWindows FibersÇáÁ¿¼¶Ïß³ÌÊÖÒÕʵÑéÀú³ÌÄÚ¶àʹÃüµ÷Àí£¬£¬£¬£¬£¬£¬£¬ÕâÖַDZê×¼Ïß³ÌÖÎÀí·½·¨ÍùÍùÈÆ¹ýͨÀý¼à¿ØÏµÍ³ ¡£¡£¡£Í¨¹ýÕâÖÖ¸´ºÏʽÌÓÒÝÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÄÜÔÚÄ¿µÄϵͳºã¾ÃפÁô£¬£¬£¬£¬£¬£¬£¬Ò»Á¬Ö´ÐÐδ¾­ÊÚȨµÄÊý¾ÝÊÕÂÞ»òºáÏòÉøÍ¸µÈ¶ñÒâ²Ù×÷ ¡£¡£¡£Ç徲ר¼Ò½¨ÒéÔöÇ¿ÖÕ¶ËÐÐΪ¼à¿Ø£¬£¬£¬£¬£¬£¬£¬°²ÅÅ»ùÓÚGPU»î¶¯ÆÊÎöµÄ¼ì²â¼Æ»®£¬£¬£¬£¬£¬£¬£¬²¢°´ÆÚÑé֤ϵͳ¹¤¾ßµÄÍêÕûÐÔÒÔÌá·À´ËÀà¸ß¼¶Ò»Á¬ÐÔÍþв ¡£¡£¡£


https://cybernews.com/security/coffeeloader-malware-asus-windows/


6. Ê®¿înpm°üÔâ¶ñÒâ¸Ä¶¯£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±Ò¿ª·¢ÕßÃô¸ÐÊý¾Ý±»ÍµÈ¡


3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ê®¿înpmÈí¼þ°üÍ»·¢¶ñÒâ´úÂëÖ²ÈëÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¿ª·¢ÕßʵÑ鹩ӦÁ´¹¥»÷ ¡£¡£¡£Çå¾²³§ÉÌSonatypeµÄÑо¿Ô±°¢À°£¶ûɳ¿²»ùÀïÂÊÏÈ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓûìÏý¾ç±¾ÔÚÈí¼þ°ü×°ÖÃʱÇÔȡϵͳÇéÐαäÁ¿£¬£¬£¬£¬£¬£¬£¬Ãô¸ÐÊý¾Ý±»»Ø´«ÖÁÔ¶³ÌЧÀÍÆ÷ ¡£¡£¡£ÊÜÓ°ÏìÈí¼þ°üÖУ¬£¬£¬£¬£¬£¬£¬ÈÈÃÅ¿â"country-currency-map"ÿÖÜÏÂÔØÁ¿´ïÊýǧ´Î£¬£¬£¬£¬£¬£¬£¬Æä2.1.8°æ±¾±»Ö²Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØ288´Î ¡£¡£¡£¶ñÒâ´úÂëÒþ²ØÓÚÁ½¸ö¾­Óɸ߶ȻìÏýµÄ¾ç±¾Îļþ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýnpm°ü×°ÖûúÖÆ×Ô¶¯Ö´ÐУ¬£¬£¬£¬£¬£¬£¬×¨ÃŲ¶»ñ°üÀ¨APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÐÅÏ¢µÄϵͳÇéÐαäÁ¿ ¡£¡£¡£Ç徲ר¼ÒÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷¼«ÓпÉÄÜÊÇͨ¹ý½ÓÊܺã¾Ãδ»îÔ¾µÄά»¤ÕßÕË»§ÊµÑ飬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓôËǰй¶µÄƾ֤¾ÙÐÐ"ײ¿â"¹¥»÷£¬£¬£¬£¬£¬£¬£¬»òʹÓÃÓâÆÚÓòÃû¿ØÖÆÈ¨ÏÞ ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬ËùÓб»¸Ä¶¯µÄ¿ÍÕ»ÖжñÒâ´úÂë°æ±¾ÍêȫһÖ£¬£¬£¬£¬£¬£¬£¬ÇҴ󶼿ÍÕ»ÒÑÊýÄêδ¸üУ¬£¬£¬£¬£¬£¬£¬½øÒ»²½×ôÖ¤ÁËÕË»§Ð®ÖƵÄÍÆ²â ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬³ý"country-currency-map"ÒÑÆúÓöñÒâ°æ±¾²¢Ö¸µ¼Óû§½µ¼¶ÖÁ2.1.7Çå¾²°æ±¾Í⣬£¬£¬£¬£¬£¬£¬ÆäÓà±»¸Ä¶¯Èí¼þ°üÈÔЯ´ø¶ñÒâ´úÂëÔÚnpmƽ̨Á÷ͨ ¡£¡£¡£Ö»¹ÜnpmÒѶԻîÔ¾ÏîÄ¿Ç¿ÖÆÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÉæÊÂÈí¼þ°ü¶àΪÀϾÉÏîÄ¿£¬£¬£¬£¬£¬£¬£¬Î¬»¤Õß¿ÉÄÜÒÑÍÑÀëÖÎÀí£¬£¬£¬£¬£¬£¬£¬ÐγÉÇå¾²·À»¤Ã¤Çø ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/infostealer-campaign-compromises-10-npm-packages-targets-devs/