Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ
Ðû²¼Ê±¼ä 2025-03-281. Microsoft Stream¾ÉÓòÃûÔâÐ®ÖÆÖÂSharePointÒ³ÃæÏÔʾ¶Ä³¡¹ã¸æ
3ÔÂ27ÈÕ£¬£¬×÷Ϊ΢Èí365Éú̬µÄÆóÒµ¼¶ÊÓÆµÐ§ÀÍ£¬£¬Microsoft Stream¾µä°æÓÚ2020ÄêÆô¶¯Ç¨áãÖÁSharePoint£¬£¬ÔÓòÃûmicrosoftstream.com°´ÍýÏëÓ¦ÓÚ2024ÄêÖÜÈ«ÍËÒÛ¡£¡£¡£¡£¡£¡£È»¶ø2025Äê3Ô£¬£¬¸ÃÓòÃûÍ»ÔâÐ®ÖÆ£¬£¬¹¥»÷Õ߸͝DNSÆÊÎöʹÆäÖ¸Ïò·ÂðÑÇÂíÑ·½çÃæµÄÌ©¹ú¶Ä³¡´¹ÂÚÒ³Ãæ£¬£¬µ¼ÖÂÈÔǶÈë¾É°æÊÓÆµÁ´½ÓµÄSharePointÒ³Ãæ±»À¬»øÄÚÈÝÎÛȾ¡£¡£¡£¡£¡£¡£ÊÖÒÕÊÓ²ìÏÔʾ£¬£¬ÓòÃû×¢²áÐÅÏ¢ÓÚÊ·¢µ±ÈÕ±»²»·¨Ð޸쬣¬¹¥»÷Õß¿ÉÄÜͨ¹ýÉç»á¹¤³Ìѧ»òÎó²îʹÓûñÈ¡¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£Ö»¹Ü΢ÈíÒѽôÆÈ¹Ø±ÕÓòÃûÆÊÎö£¬£¬µ«´Ë´ÎÊÂÎñ¶ÔÓû§µÄDZÔÚΣº¦½ûÖ¹ºöÊÓ£ºÆóÒµÄÚÍøÓû§¿ÉÄÜÒò»á¼û±»Ð®ÖÆÒ³Ãæµ¼ÖÂÃô¸ÐÊý¾Ýй¶£¬£¬¶øSharePointÉú̬ÖвÐÁôµÄǶÈëÁ´½Ó¸ü³ÉΪһÁ¬Íþв¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬¹¥»÷Õßδ½øÒ»²½Ö²Èë¶ñÒâÈí¼þ£¬£¬Ö÷ҪΣº¦¼¯ÖÐÔÚÍøÂç´¹ÂÚ²ãÃæ¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬´ËÀàÊÂÎñ·´Ó¦³öÆóÒµ¶ÔÍËÒÛÓòÃû´¦Öóͷ£µÄÆÕ±éÊè©£ºÊµÊ±¸üÐÂǶÈë×ÊÔ´¡¢È±·¦DNS¼à¿Ø»úÖÆ¡¢Î´°²ÅÅDNSSEC·À»¤µÈÎó²î£¬£¬¶¼¿ÉÄܱ»¹¥»÷ÕßʹÓÃʵÑéÖÐÐÄÈ˹¥»÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/hijacked-microsoft-stream-classic-domain-spams-sharepoint-sites/
2. ¡¶°×Ñ©¹«Ö÷¡·Î´ÉÏÏßDisney+£¬£¬µÁ°æÏÝÚåDZÔÚ¶ñÒâÈí¼þ
3ÔÂ27ÈÕ£¬£¬µÏÊ¿ÄáÕæÈ˰桶°×Ñ©¹«Ö÷¡·Î´Í¨¹ýµÏÊ¿Äá×ÔÓÐÁ÷ýÌåÆ½Ì¨Disney+¿¯ÐУ¬£¬ÆÈʹ²¿·Ö¹ÛÖÚתÏòµÁ°æÇþµÀ£¬£¬È´Òò´ËÏÝÈëÍøÂçÕ©ÆÏÝÚå¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾VeritiÅû¶£¬£¬Õ©Æ·Ö×ÓʹÓÃӰƬδÉÏÏßÕý¹æÆ½Ì¨µÄ¿ÕµµÆÚ£¬£¬ÔÚ"TeamEsteem"ÍøÕ¾Ðû²¼ÐéᲩ¿Í£¬£¬Î±×°³É¹Ù·½×ÊÔ´Ìṩ2025°æ¡¶°×Ñ©¹«Ö÷¡·µÁ°æÏÂÔØ¡£¡£¡£¡£¡£¡£¸Ã´ÅÁ¦ÖÖ×ÓÁ´½Ó¿´ËÆÕýµ±£¬£¬ÊµÔòÀ¦°ó¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÒÑÓÐ45ÃûÓû§ÏÂÔØ²¢Èö²¥¸ÃÖÖ×ÓÎļþ£¬£¬ÆäÖаüÀ¨Î±×°³ÉÊÓÆµ±à½âÂëÆ÷µÄ"xmph_codec.exe"³ÌÐò¡£¡£¡£¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬¸Ã³ÌÐò½«ÊµÑé¶àÖØ¶ñÒâ²Ù×÷£ºÊ×ÏȽûÓÃWindows DefenderµÈÇå¾²·À»¤£¬£¬ËæºóÖ²Èë±»50¿îÇå¾²¹¤¾ß±ê¼ÇΪ¶ñÒâµÄÎļþ£¬£¬²¢¾²Ä¬×°ÖÃTORä¯ÀÀÆ÷½¨Éè°µÍøÍ¨Ñ¶Í¨µÀ£¬£¬×îÖÕʹװ±¸Ì»Â¶ÓÚÊý¾Ý͵ÇÔºÍÀÕË÷Èí¼þ¹¥»÷Σº¦ÖС£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜͨ¹ýÁ½ÖÖ·½·¨ÈëÇÖTeamEsteem¹ÙÍø£ºÒ»ÊÇʹÓÃYoast SEO²å¼þ¾É°æ±¾Îó²î£¨CVE-2023-40680£©£¬£¬¶þÊÇ͵ȡÖÎÀíԱƾֱ֤½ÓÐû²¼ÐéαÄÚÈÝ¡£¡£¡£¡£¡£¡£Ç徲ר¼Ò½¨Ò飬£¬¹ÛÖÚÓ¦×èÖ¹ÏÂÔØÈªÔ´²»Ã÷µÄµÁ°æÄÚÈÝ£¬£¬°´ÆÚ¸üз´¶ñÒâÈí¼þ£¬£¬²¢¶ÔÒªÇó×°ÖÃÌØÊâ±à½âÂëÆ÷µÄ¿ÉÒÉÎļþ¼á³ÖСÐÄ£¬£¬ÒÔ·ÀÂäÈëÍøÂç·¸·¨ÏÝÚå¡£¡£¡£¡£¡£¡£
https://hackread.com/fake-snow-white-movie-torrent-infects-device-malware/
3. COPAÊý¾Ýй¶ÊÂÎñ²¨¼°Á½Öݽü68,000Ãû»¼ÕßÃô¸ÐÐÅÏ¢
3ÔÂ27ÈÕ£¬£¬È¥Äê11Ô£¬£¬ºÚ¿Í×éÖ¯Everest Team½«ÃÀ¹ú¹Ç¿ÆÒ½ÁÆ»ú¹¹Concord Orthopaedics£¨COPA£©ÁÐÈë°µÍøÐ¹ÃÜÍøÕ¾£¬£¬Ðû³ÆÕÆÎÕÆä×Ô2018ÄêÆðµÄËùÓл¼ÕßÒ½ÁƼͼ¼°Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢Ô¤Ô¼ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÏêÇé¼°²¿·Ö¼ÝʻִÕÕͼÏñ¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÓÚ2025Äê3ÔÂ25ÈÕÏòÊÜÓ°ÏìÕß¼ÄËÍÊéÃæÍ¨Öª£¬£¬È·ÈÏÆä»¼Õß¹ÒºÅÓëԤԼϵͳ¹©Ó¦ÉÌÔâÍøÂçÈëÇÖ£¬£¬µ«Ç¿µ÷ÄÚ²¿ÇéÐÎδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£Æ¾Ö¤COPAͨ¸æ£¬£¬Ð¹Â¶Ô´Í·ÎªµÚÈý·½¹©Ó¦É̵ÄÈí¼þÎó²î£¬£¬ÍâйÊý¾ÝÀàÐͺ¸ÇÔ¤Ô¼¼Í¼£¨ÈçÊÖÊõÀàÐÍ¡¢Ò½ÉúÐÕÃû¡¢ÈÕÆÚËùÔÚ£©¡¢¿µ½¡°ü¹ÜÐÅÏ¢£¨º¬ÊÜÒæÈ˱àºÅ¡¢°ü¹Ü×ʸñ£©¼°²¿·ÖÉí·ÝÎļþ¡£¡£¡£¡£¡£¡£¹©Ó¦ÉÌÓÚ2025Äê1ÔÂ28ÈÕÏòCOPAÌṩDZÔÚÓ°ÏìÊý¾Ý¹æÄ£¡£¡£¡£¡£¡£¡£Ðº±²¼Ê²¶ûÖÝ×ÜÉó²é³¤°ì¹«ÊÒÅû¶£¬£¬¸ÃÖݹ²ÓÐ67,835ÃûסÃñÐÅÏ¢ÉæÏÕ£¬£¬ÂíÈøÖîÈûÖÝÉÐÓÐ1,517ÈËÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬EverestÐû²¼µÄ2.9GBй¶Êý¾Ý°üÏÖʵ°üÀ¨2019-2024Äê¼ä¸üÆÕ±éµÄ»¼ÕßÐÅÏ¢£¬£¬ÇÒDataBreaches·¢Ã÷¹©Ó¦ÉÌЧÀÍÆ÷´æ´¢´ó×Úδ¼ÓÃÜÃô¸ÐÊý¾Ý£¬£¬°üÀ¨Áè¼Ý3ÍòÕżÝÕÕͼÏñ¼°ÆäËûCSVÃûÌÃÒ½ÁƼͼ£¬£¬Ê±¼ä¿ç¶ÈÔ¶³¬ºÚ¿Í×î³õÉù³ÆµÄ2018Äê¡£¡£¡£¡£¡£¡£
https://databreaches.net/2025/03/27/four-months-after-learning-of-a-vendors-breach-concord-orthopaedics-notifies-almost-68000-patients/
4. Vroom by YouXÒòAWSÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶
3ÔÂ27ÈÕ£¬£¬°Ä´óÀûÑǽðÈڿƼ¼¹«Ë¾Vroom by YouX½üÆÚÔâÓöÃô¸ÐÊý¾Ýй¶ÊÂÎñ£¬£¬Çå¾²Ñо¿Ô±Jeremiah FowlerÔÚ¹ûÕæ¿É»á¼ûµÄAmazon S3´æ´¢Í°Öз¢Ã÷°üÀ¨27,000Ìõ¼Í¼µÄÎÞ±£»£»£»£»£»£»¤Êý¾Ý¿â£¬£¬Ð¹Â¶ÐÅÏ¢º¸Ç¼ÝÕÕ¡¢Ò½ÁƼͼ¡¢¾Íҵ֤ʵ¼°º¬²¿·ÖÐÅÓÿ¨ºÅµÄÒøÐжÔÕ˵¥µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬ÄÚ²¿½ØÍ¼ÏÔʾ±£´æÉúÑÄ320Íò·ÝÎĵµµÄMongoDBʵÀý£¬£¬Æä̻¶״̬¿ÉÄÜÐγÉÍøÂç¹¥»÷ÐÂÈë¿Ú¡£¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬VroomѸËÙÏÞÖÆÊý¾Ý¿â»á¼ûȨÏÞ£¬£¬ÈÏ¿ÉÇå¾²Îó²î²¢ÔÊÐí¿ªÕ¹ÊºóÉó²é¡£¡£¡£¡£¡£¡£×÷ΪÈ˹¤ÖÇÄÜÇý¶¯µÄÆû³µÈÚ×ÊÆ½Ì¨£¬£¬¸Ã¹«Ë¾×Ô2022ÄêÔËÓªÒÔÀ´Ò»Á¬´¦Öóͷ£´ó×Ú¿Í»§Ãô¸ÐÐÅÏ¢£¬£¬´Ë´Îй¶¼Í¼ʱ¼ä¿ç¶È´ïÈýÄ꣬£¬Í¹ÏÔÊý¾Ý´¦Öóͷ£»·½ÚµÄÇå¾²Òþ»¼¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬´ËÀàÐÅϢй¶½«Ö±½Óµ¼ÖÂÚ²ÆÎ£º¦¼¤Ôö£¬£¬°üÀ¨Éç»á¹¤³Ì¹¥»÷¡¢ÐéαÕË»§¿ªÉè¼°¾«×¼ÍøÂç´¹Âڵȡ£¡£¡£¡£¡£¡£ÆóÒµÓ¦½ÓÄÉMFAÉí·ÝÑéÖ¤¡¢RBACȨÏÞÖÎÀí¡¢¼ÓÃÜ´«ÊäÓë´æ´¢µÈ½¹µã²½·¥£¬£¬Á¬ÏµCloudTrailµÈ¼à¿Ø¹¤¾ßʵÏÖÍþвʵʱԤ¾¯£¬£¬°´ÆÚ¿ªÕ¹ÉøÍ¸²âÊÔÐÞ²¹Èõµã£¬£¬ÐÞ½¨È«ÉúÃüÖÜÆÚÇå¾²·À»¤Á´Ìõ¡£¡£¡£¡£¡£¡£
https://hackread.com/aussie-fintech-vroom-pii-records-aws-misconfiguration/
5. CoffeeLoader¶ñÒâÈí¼þʹÓÃÁ¢ÒìÊÖÒÕ¹æ±Ü¼ì²âÍþвWindowsÓû§
3ÔÂ27ÈÕ£¬£¬ÐÂÐͶñÒâÈí¼þ¼Ò×å"CoffeeLoader"Õý¶ÔWindowsÓû§×é³ÉÑÏÖØÍþв£¬£¬Æä¸ß¶ÈÒþ²ØÐÔʹµÃ¹Å°å·À²¡¶¾Èí¼þÄÑÒÔ¼ì²â¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÉZscalerÇå¾²ÍŶÓÓÚ2024Äê9Ô·¢Ã÷£¬£¬Æä¹¥»÷Á´Ê¼ÓÚαװ³É»ªË¶Armoury Crateϵͳ¹¤¾ß£¬£¬ÓÕµ¼Óû§ÏÂÔØºóÖ²ÈëÐÅÏ¢ÇÔȡģ¿£¿£¿£¿é£¬£¬ÒÑÖª¿É´îÔØRhadamanthysµÈ¸ßΣÇÔÃܳÌÐò¡£¡£¡£¡£¡£¡£CoffeeLoaderÕ¹ÏÖ³ö¶àά¶È¹æ±Ü¼ì²âÊÖÒÕ£º½ÓÄÉArmoury Packer¼Ó¿ÇÊÖÒÕʵÑé³õʼÓÕÆ£¬£¬¸üÁ¢ÒìµØ½«²¿·Ö¶ñÒâ´úÂë×ªÒÆÖÁGPUÖ´ÐУ¬£¬Ê¹ÓÃÇå¾²Èí¼þ¶ÔͼÐδ¦Öóͷ£Æ÷µÄ¼à²âÃ¤ÇøÊµÏÖºã¾ÃDZÔÚ¡£¡£¡£¡£¡£¡£ÆäŲÓÿÍÕ»¸ÄÏÂÊÖÒÕ¿ÉαÔ캯ÊýŲÓÃÁ´£¬£¬Ê¹Çå¾²ÆÊÎö¹¤¾ßÎóÅгÌÐòÐÐΪÊôÐÔ¡£¡£¡£¡£¡£¡£µ±¼ì²âµ½Ç徲ɨÃèʱ£¬£¬¸Ã¶ñÒâÈí¼þ»áÆô¶¯"˯Ãß»ìÏý"»úÖÆ£¬£¬½«×ÔÉí¼ÓÃÜ´æ´¢ÓÚÄÚ´æ·Ç»îÔ¾Çø¶Î£¬£¬ÓÐÓÃÌÓ±Üʵʱ¼ì²â¡£¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬CoffeeLoader´´Á¢ÐÔµØÊ¹ÓÃWindows FibersÇáÁ¿¼¶Ïß³ÌÊÖÒÕʵÑéÀú³ÌÄÚ¶àʹÃüµ÷Àí£¬£¬ÕâÖַDZê×¼Ïß³ÌÖÎÀí·½·¨ÍùÍùÈÆ¹ýͨÀý¼à¿ØÏµÍ³¡£¡£¡£¡£¡£¡£Í¨¹ýÕâÖÖ¸´ºÏʽÌÓÒÝÕ½ÂÔ£¬£¬¸Ã¶ñÒâÈí¼þÄÜÔÚÄ¿µÄϵͳºã¾ÃפÁô£¬£¬Ò»Á¬Ö´ÐÐδ¾ÊÚȨµÄÊý¾ÝÊÕÂÞ»òºáÏòÉøÍ¸µÈ¶ñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£Ç徲ר¼Ò½¨ÒéÔöÇ¿ÖÕ¶ËÐÐΪ¼à¿Ø£¬£¬°²ÅÅ»ùÓÚGPU»î¶¯ÆÊÎöµÄ¼ì²â¼Æ»®£¬£¬²¢°´ÆÚÑé֤ϵͳ¹¤¾ßµÄÍêÕûÐÔÒÔÌá·À´ËÀà¸ß¼¶Ò»Á¬ÐÔÍþв¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/coffeeloader-malware-asus-windows/
6. Ê®¿înpm°üÔâ¶ñÒâ¸Ä¶¯£¬£¬¼ÓÃÜÇ®±Ò¿ª·¢ÕßÃô¸ÐÊý¾Ý±»ÍµÈ¡
3ÔÂ27ÈÕ£¬£¬¿ËÈÕ£¬£¬Ê®¿înpmÈí¼þ°üÍ»·¢¶ñÒâ´úÂëÖ²ÈëÊÂÎñ£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¿ª·¢ÕßʵÑ鹩ӦÁ´¹¥»÷¡£¡£¡£¡£¡£¡£Çå¾²³§ÉÌSonatypeµÄÑо¿Ô±°¢À°£¶ûɳ¿²»ùÀïÂÊÏÈ·¢Ã÷£¬£¬¹¥»÷ÕßʹÓûìÏý¾ç±¾ÔÚÈí¼þ°ü×°ÖÃʱÇÔȡϵͳÇéÐαäÁ¿£¬£¬Ãô¸ÐÊý¾Ý±»»Ø´«ÖÁÔ¶³ÌЧÀÍÆ÷¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÈí¼þ°üÖУ¬£¬ÈÈÃÅ¿â"country-currency-map"ÿÖÜÏÂÔØÁ¿´ïÊýǧ´Î£¬£¬Æä2.1.8°æ±¾±»Ö²Èë¶ñÒâ´úÂ룬£¬ÀÛ¼ÆÏÂÔØ288´Î¡£¡£¡£¡£¡£¡£¶ñÒâ´úÂëÒþ²ØÓÚÁ½¸ö¾Óɸ߶ȻìÏýµÄ¾ç±¾Îļþ£¬£¬Í¨¹ýnpm°ü×°ÖûúÖÆ×Ô¶¯Ö´ÐУ¬£¬×¨ÃŲ¶»ñ°üÀ¨APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÐÅÏ¢µÄϵͳÇéÐαäÁ¿¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÆÊÎöÖ¸³ö£¬£¬´Ë´Î¹¥»÷¼«ÓпÉÄÜÊÇͨ¹ý½ÓÊܺã¾Ãδ»îÔ¾µÄά»¤ÕßÕË»§ÊµÑ飬£¬¹¥»÷Õß¿ÉÄÜʹÓôËǰй¶µÄƾ֤¾ÙÐÐ"ײ¿â"¹¥»÷£¬£¬»òʹÓÃÓâÆÚÓòÃû¿ØÖÆÈ¨ÏÞ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ËùÓб»¸Ä¶¯µÄ¿ÍÕ»ÖжñÒâ´úÂë°æ±¾ÍêȫһÖ£¬£¬ÇҴ󶼿ÍÕ»ÒÑÊýÄêδ¸üУ¬£¬½øÒ»²½×ôÖ¤ÁËÕË»§Ð®ÖƵÄÍÆ²â¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬³ý"country-currency-map"ÒÑÆúÓöñÒâ°æ±¾²¢Ö¸µ¼Óû§½µ¼¶ÖÁ2.1.7Çå¾²°æ±¾Í⣬£¬ÆäÓà±»¸Ä¶¯Èí¼þ°üÈÔЯ´ø¶ñÒâ´úÂëÔÚnpmƽ̨Á÷ͨ¡£¡£¡£¡£¡£¡£Ö»¹ÜnpmÒѶԻîÔ¾ÏîÄ¿Ç¿ÖÆÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬µ«´Ë´ÎÉæÊÂÈí¼þ°ü¶àΪÀϾÉÏîÄ¿£¬£¬Î¬»¤Õß¿ÉÄÜÒÑÍÑÀëÖÎÀí£¬£¬ÐγÉÇå¾²·À»¤Ã¤Çø¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/infostealer-campaign-compromises-10-npm-packages-targets-devs/