iCloudÈÕÀú±»ÀÄÓôÓAppleЧÀÍÆ÷·¢ËÍ´¹ÂÚÓʼþ

Ðû²¼Ê±¼ä 2025-09-09

1. iCloudÈÕÀú±»ÀÄÓôÓAppleЧÀÍÆ÷·¢ËÍ´¹ÂÚÓʼþ


9ÔÂ7ÈÕ£¬£¬£¬£¬£¬ £¬£¬½üÆÚÒ»ÖÖʹÓÃiCloudÈÕÀúÔ¼Ç빦ЧµÄÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷ÆØ¹â¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý½¨Éè°üÀ¨´¹ÂÚÎı¾µÄiCloudÈÕÀúÊÂÎñ£¬£¬£¬£¬£¬ £¬£¬²¢Ô¼Çë¿ØÖÆµÄÍⲿÓÊÏ䵨µã£¬£¬£¬£¬£¬ £¬£¬µ¼ÖÂApple¹Ù·½Ð§ÀÍÆ÷×Ô¶¯·¢ËÍαװ³ÉPayPal¸¶¿î֪ͨµÄ´¹ÂÚÓʼþ¡£¡£¡£¡£¡£´ËÀàÓʼþÉù³ÆÓû§ÕË»§±»¿Û¿î599ÃÀÔª£¬£¬£¬£¬£¬ £¬£¬¸½ÓС°Ö§³Öµç»°¡±ÓÕµ¼Êܺ¦Õß²¦´òÕ©Æ­ºÅÂ룬£¬£¬£¬£¬ £¬£¬½ø¶øÍ¨¹ýÔ¶³Ì»á¼ûÇÔÈ¡×ʽ𡢰²ÅŶñÒâÈí¼þ»òÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¸Ã¹¥»÷ÇÉÃîʹÓÃÁËAppleÓʼþЧÀÍÆ÷µÄÐÅÈα³Ê飺Óʼþͨ¹ýSPF¡¢DMARCºÍDKIMÈýÖØÇå¾²ÈÏÖ¤£¬£¬£¬£¬£¬ £¬£¬ÏÔʾΪ¡°Õýµ±ÈªÔ´¡±£¬£¬£¬£¬£¬ £¬£¬¼«´ó½µµÍÁ˱»À¬»øÓʼþ¹ýÂËÆ÷×èµ²µÄ¸ÅÂÊ¡£¡£¡£¡£¡£Ïêϸ»úÖÆÏÔʾ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÔÚiCloudÈÕÀúµÄNotes×Ö¶ÎǶÈë´¹ÂÚÄÚÈÝ£¬£¬£¬£¬£¬ £¬£¬Ô¼ÇëMicrosoft 365ÓÊÏ䵨µã£¬£¬£¬£¬£¬ £¬£¬µ±Óʼþ¾­ÓÉMicrosoft 365ÓʼþÁбíת·¢Ê±£¬£¬£¬£¬£¬ £¬£¬ÏµÍ³Í¨¹ý·¢¼þÈËÖØÐ´¼Æ»®£¨SRS£©½«·µ»ØÂ·¾¶ÐÞ¸ÄΪ¹ØÁªµØµã£¬£¬£¬£¬£¬ £¬£¬Î¬³ÖSPF¼ì²éͨ¹ý£¬£¬£¬£¬£¬ £¬£¬È·±£ÓʼþÖ±´ïÊÕ¼þÏä¡£¡£¡£¡£¡£´ËÀ๥»÷ÓëPayPal¡°Ðµص㡱´¹ÂÚÊÖ·¨ÀàËÆ£¬£¬£¬£¬£¬ £¬£¬¾ùÒÀÀµÕýµ±Æ½Ì¨¹¦Ð§ÊµÑéÓÕÆ­¡£¡£¡£¡£¡£Ö»¹Ü´¹ÂÚÓÕ¶ü×Ô¼ºÎÞÁ¢Ò죬£¬£¬£¬£¬ £¬£¬µ«Á¬ÏµAppleЧÀÍÆ÷±³ÊéºÍÈÕÀúÔ¼ÇëµÄ¡°¹Ù·½ÊôÐÔ¡±£¬£¬£¬£¬£¬ £¬£¬¹¥»÷¸ü¾ßÒÉ»óÐÔ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/


2. AnuvuÔâºÚ¿Í¹¥»÷й¶Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ £¬£¬Ì»Â¶º½¿Õ¿Í»§StarlinkʹÓÃÐÅÏ¢


9ÔÂ5ÈÕ£¬£¬£¬£¬£¬ £¬£¬»úÉÏÓéÀÖÓëÅþÁ¬Ð§ÀÍÌṩÉÌAnuvu£¨Ô­Global Eagle£©ÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÔÚ°µÍøÂÛ̳Ðû³ÆÇÔÈ¡´ó×ÚÖÎÀíÔ±¼¶±ðƾ֤£¬£¬£¬£¬£¬ £¬£¬¿É»á¼ûÆäAWS¼°PostgresÊý¾Ý¿â¡£¡£¡£¡£¡£Ð¹Â¶ÄÚÈݰüÀ¨º£Ê¿ͻ§¹«Ë¾Ãû³Æ¡¢Salesforce±êʶ·û¼°Êг¡ÀàÐÍ £»£» £»£»£»£»2024ÄêÓû§Æ¾Ö¤£¨º¬È«Ãû¡¢ÓÊÏä¡¢ÃÜÂë¹þÏ£¡¢µØµã£© £»£» £»£»£»£»ÖÎÀíְԱСÎÒ˽¼ÒÐÅÏ¢¼°°ì¹«µØµã £»£» £»£»£»£»¸üÒªº¦µÄÊÇ£¬£¬£¬£¬£¬ £¬£¬StarlinkÌõÔ¼Ã÷ϸÔâ̻¶£¬£¬£¬£¬£¬ £¬£¬Ö±½ÓÏÔʾÄÄЩ¿Í»§Í¨¹ýAnuvuʹÓÃStarlinkЧÀÍ¡£¡£¡£¡£¡£Anuvu×÷ΪÄêÊÕÈëÔ¼3.7ÒÚÃÀÔª¡¢Ð§ÀÍÈ«Çò150Óà¼Òº½¿Õ¹«Ë¾¼°30¼ÒÓÊÂÖ¹«Ë¾µÄÐÐÒµ¾ÞÍ·£¬£¬£¬£¬£¬ £¬£¬ÆäÏàÖúͬ°éº­¸Ç·¨º½¡¢´ïÃÀº½¿ÕµÈ×ÅÃûº½Ë¾¡£¡£¡£¡£¡£´Ë´Î¹¥»÷̻¶µÄÃô¸ÐÐÅÏ¢±£´æ¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉÄÜʹÓÃδÐ޸ĵÄ2024ÄêÃÜÂëʵÑ鯾֤Ìî³ä¹¥»÷ £»£» £»£»£»£»Ð¹Â¶µÄ¿Í»§ÐÅÏ¢¿É±»ÓÃÓÚ¶¨Ïò´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬»òÌáÇ°Ëø¶¨¹¥»÷Ä¿µÄ £»£» £»£»£»£»ÖÎÀíÖ°Ô±¼°Óû§µØµãµÄ̻¶¸ü¿ÉÄÜÒý·¢¶þ´ÎÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£Anuvu·½ÃæÉÐδ¶Ô´ËÊÂ×÷³öÕýʽ»ØÓ¦¡£¡£¡£¡£¡£


https://cybernews.com/security/anuvu-airline-data-breach-credentials/


3. NPM¹©Ó¦Á´Ôâ´¹ÂÚ¹¥»÷£º¸ßÏÂÔØÁ¿°ü±»×¢Èë¼ÓÃÜÐ®ÖÆ¶ñÒâÈí¼þ


9ÔÂ8ÈÕ£¬£¬£¬£¬£¬ £¬£¬¿ËÈÕÒ»³¡Õë¶ÔNPMÈí¼þ°üµÄ¹©Ó¦Á´¹¥»÷Òý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþÈëÇÖÈí¼þ°üά»¤ÕßJosh Junon£¨qix£©µÈÕË»§£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓÃαÔìnpmjs.comÓòÃûµÄnpmjs[.]helpÍøÕ¾£¬£¬£¬£¬£¬ £¬£¬ÒÔ"2FAƾ֤ÓâÆÚ½«Ëø¶¨ÕË»§"ΪÓÉÓÕµ¼µã»÷Á´½Ó£¬£¬£¬£¬£¬ £¬£¬½ø¶ø×¢Èë¶ñÒâ´úÂëÖÁ¸ßÏÂÔØÁ¿NPM°üÖС£¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬ £¬£¬±»Ð®ÖƵÄ18¸öÈí¼þ°üÿÖÜ×ÜÏÂÔØÁ¿³¬26ÒڴΣ¬£¬£¬£¬£¬ £¬£¬°üÀ¨debug£¨3.576ÒڴΣ©¡¢chalk£¨2.9999ÒڴΣ©¡¢ansi-styles£¨3.7141ÒڴΣ©µÈ½¹µã¹¤¾ß¡£¡£¡£¡£¡£¶ñÒâ´úÂëͨ¹ý×¢Èëindex.jsÎļþ£¬£¬£¬£¬£¬ £¬£¬ÔÚä¯ÀÀÆ÷¶ËÔËÐлùÓÚä¯ÀÀÆ÷µÄ×èµ²Æ÷£¬£¬£¬£¬£¬ £¬£¬¼à¿ØÒÔÌ«·»¡¢±ÈÌØ±ÒµÈ¼ÓÃÜÇ®±ÒÉúÒ⣬£¬£¬£¬£¬ £¬£¬µ±¼ì²âµ½ÍøÂçÏìÓ¦°üÀ¨¼ÓÃÜÉúÒâʱ£¬£¬£¬£¬£¬ £¬£¬×Ô¶¯½«Ä¿µÄÇ®°üµØµãÌæ»»Îª¹¥»÷Õß¿ØÖƵص㣬£¬£¬£¬£¬ £¬£¬Ð®ÖÆÉúÒâÊðÃûǰµÄ×ʽðÁ÷Ïò£¬£¬£¬£¬£¬ £¬£¬ÇÒÓû§ÎÞÏÔןÐÖª¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¹Ò¹³JavaScriptº¯Êý¼°Ç®°üAPIʵÏÖÁ÷Á¿¸Ä¶¯£¬£¬£¬£¬£¬ £¬£¬²»µ«ÐÞ¸ÄÍøÒ³ÏÔʾÄÚÈÝ£¬£¬£¬£¬£¬ £¬£¬»¹Ö±½ÓʹÓÃAPIŲÓü°Óû§Ç©ÊðµÄÉúÒâÄÚÈÝ£¬£¬£¬£¬£¬ £¬£¬ÐγɶàÌõÀí¹¥»÷¡£¡£¡£¡£¡£NPMÍŶÓÒѽôÆÈɾ³ý²¿·Ö¶ñÒâ°æ±¾£¬£¬£¬£¬£¬ £¬£¬µ«²¿·Ö°üÈÔ±£´æÎ£º¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/


4. PlexÉí·ÝÑéÖ¤ÐÅϢʧÔô£¬£¬£¬£¬£¬ £¬£¬Óû§Ðè½ôÆÈÖØÖÃÃÜÂë


9ÔÂ8ÈÕ£¬£¬£¬£¬£¬ £¬£¬Ã½ÌåÁ÷ýÌåÆ½Ì¨Plex¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ £¬£¬ºÚ¿Í´ÓÆäÊý¾Ý¿âÖÐÇÔÈ¡Á˿ͻ§Éí·ÝÑéÖ¤Êý¾Ý£¬£¬£¬£¬£¬ £¬£¬Éæ¼°µç×ÓÓʼþµØµã¡¢Óû§Ãû¡¢Ç徲ɢÁÐÃÜÂë¼°Éí·ÝÑéÖ¤Êý¾Ý¡£¡£¡£¡£¡£PlexÔÚ֪ͨÖÐ֤ʵ£¬£¬£¬£¬£¬ £¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁË"ÓÐÏ޵Ŀͻ§Êý¾Ý×Ó¼¯"£¬£¬£¬£¬£¬ £¬£¬°üÀ¨µç×ÓÓʼþ¡¢Óû§ÃûºÍ¾­ÓÉÇ徲ɢÁд¦Öóͷ£µÄÃÜÂ룬£¬£¬£¬£¬ £¬£¬µ«Ç¿µ÷Ö§¸¶¿¨ÐÅϢδ´æ´¢ÓÚЧÀÍÆ÷¹ÊδÊܲ¨¼°¡£¡£¡£¡£¡£Ö»¹ÜPlexÐû³ÆÃÜÂëÒѰ´"×î¼Ñʵ¼ù"¾ÙÐÐÇ徲ɢÁУ¬£¬£¬£¬£¬ £¬£¬µ«Î´¹ûÕæÏêϸ¹þÏ£Ëã·¨£¬£¬£¬£¬£¬ £¬£¬ÕâÔöÌíÁ˹¥»÷ÕßʵÑ鯯½âÃÜÂëµÄΣº¦¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬ £¬£¬PlexÇ¿ÁÒ½¨ÒéÓû§Á¬Ã¦Í¨¹ý¹ÙÍøÖØÖÃÃÜÂ룬£¬£¬£¬£¬ £¬£¬²¢ÆôÓÃ"¸ü¸ÄÃÜÂëÍËÈ´³öÅþÁ¬×°±¸"Ñ¡Ï£¬£¬£¬£¬ £¬£¬´Ë²Ù×÷½«Ç¿ÖÆËùÓÐʹÓÃ¾ÉÆ¾Ö¤µÄ×°±¸ÖØÐµÇ¼¡£¡£¡£¡£¡£¹ØÓÚʹÓõ¥µãµÇ¼£¨SSO£©µÄÓû§£¬£¬£¬£¬£¬ £¬£¬Ðè»á¼ûÇå¾²Ò³Ãæµã»÷"Í˳öËùÓÐ×°±¸"°´Å¥£¬£¬£¬£¬£¬ £¬£¬ÖÕÖ¹ËùÓл»á»°ºóÖØÐÂÈÏÖ¤¡£¡£¡£¡£¡£PlexÌØÊâÌáÐÑÓû§ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤£¨2FA£©ÒÔÔöÇ¿ÕË»§± £»£» £»£»£»£»¤£¬£¬£¬£¬£¬ £¬£¬²¢ÖØÉê¾ø²»»áͨ¹ýµç×ÓÓʼþË÷ÒªÃÜÂë»òÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖÒÑÐÞ¸´Ð§ÀÍÆ÷ÈëÇÖÎó²î£¬£¬£¬£¬£¬ £¬£¬µ«Î´Åû¶ÏêϸÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/plex-tells-users-to-reset-passwords-after-new-data-breach/


5. ˼¿ÆASA×°±¸Ôâ´ó¹æÄ£ÍøÂçɨÃ裬£¬£¬£¬£¬ £¬£¬Ð¡ÐÄÐÂÎó²îΣº¦


9ÔÂ8ÈÕ£¬£¬£¬£¬£¬ £¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õë¶Ô˼¿ÆASA×°±¸µÄ´ó¹æÄ£ÍøÂçɨÃè»î¶¯·¢³öÔ¤¾¯£¬£¬£¬£¬£¬ £¬£¬¸ÃÕ÷Ïó»òԤʾ²úÆ·¼´½«·ºÆðÐÂÎó²î¡£¡£¡£¡£¡£¾ÝGreyNoise¼à²â£¬£¬£¬£¬£¬ £¬£¬8ÔÂβ·ºÆðÁ½´ÎÏÔָɍÃè·åÖµ£¬£¬£¬£¬£¬ £¬£¬Éæ¼°2.5Íò¸öΨһIPµØµã̽²âASAµÇ¼ÃÅ»§¼°Cisco IOS Telnet/SSHЧÀÍ¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬ £¬£¬8ÔÂ26ÈÕµÚ¶þ²¨¹¥»÷ÖУ¬£¬£¬£¬£¬ £¬£¬80%µÄɨÃèÁ÷Á¿Ô´×Ô°ÍÎ÷½©Ê¬ÍøÂ磬£¬£¬£¬£¬ £¬£¬Éæ¼°Ô¼1.7Íò¸öIPµØµã¡£¡£¡£¡£¡£Á½²¨¹¥»÷¾ùʹÓø߶ÈÏàËÆµÄChromeÓû§ÊðÀí£¬£¬£¬£¬£¬ £¬£¬ÌåÏÖ±£´æÅäºÏÍþвȪԴ¡£¡£¡£¡£¡£É¨Ãè»î¶¯Ö÷Òª¼¯ÖÐÔÚÃÀ¹ú£¬£¬£¬£¬£¬ £¬£¬Í¬Ê±ÁýÕÖÓ¢¹úºÍµÂ¹ú¡£¡£¡£¡£¡£É¨ÃèÐÐΪ¼È¿ÉÄÜÊÇÕë¶ÔÒÑÐÞ¸´Îó²îµÄʧ°ÜʹÓÃʵÑ飬£¬£¬£¬£¬ £¬£¬Ò²¿ÉÄÜÊÇΪÐÂÎó²îʹÓþÙÐеÄö¾ÙºÍÓ³ÉäÊÂÇé¡£¡£¡£¡£¡£ÏµÍ³ÖÎÀíÔ±"NadSec ¨C Rat5ak"µÄ±¨¸æÏÔʾ£¬£¬£¬£¬£¬ £¬£¬Ïà¹Ø»î¶¯×Ô7ÔÂ31ÈÕÆðÒÔµÍÆµÉ¨ÃèÆô¶¯£¬£¬£¬£¬£¬ £¬£¬8ÔÂÖÐÑ®Öð²½Éý¼¶£¬£¬£¬£¬£¬ £¬£¬8ÔÂ28ÈÕµÖ´ïµ¥ÈÕ20Íò´Îµã»÷µÄ·åÖµ£¬£¬£¬£¬£¬ £¬£¬Á÷Á¿·ºÆð¸ß¶È×Ô¶¯»¯ÌØÕ÷£¬£¬£¬£¬£¬ £¬£¬Ô´×ÔNybula¡¢Cheapy-HostºÍGlobal Connectivity Solutions LLPÈý¸öASN¡£¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬£¬£¬ £¬£¬½¨ÒéÖÎÀíÔ±Á¬Ã¦Ó¦ÓÃCisco ASA×îÐÂÇå¾²²¹¶¡£¬£¬£¬£¬£¬ £¬£¬¶ÔËùÓÐÔ¶³ÌµÇ¼ʵÑé¶àÒòËØÈÏÖ¤£¨MFA£©£¬£¬£¬£¬£¬ £¬£¬×èÖ¹Ö±½Ó̻¶/+CSCOE+/logon.html¡¢WebVPN¡¢Telnet»òSSHЧÀÍ¡£¡£¡£¡£¡£ÈçÐèÍⲿ»á¼û£¬£¬£¬£¬£¬ £¬£¬Ó¦Í¨¹ýVPN¼¯ÖÐÆ÷¡¢·´ÏòÊðÀí»ò»á¼ûÍø¹Ø½¨ÉèÌØÊâ¿ØÖÆ²ã¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ £¬£¬¿ÉʹÓÃGreyNoiseºÍRat5ak±¨¸æÖеÄɨÃèÖ¸±ê¾ÙÐзâ±ÕºÍÏÞÖÆ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/surge-in-networks-scans-targeting-cisco-asa-devices-raise-concerns/


6. GhostAction¹©Ó¦Á´¹¥»÷Ö³¬3300¸öÉñÃØÐ¹Â¶


9ÔÂ8ÈÕ£¬£¬£¬£¬£¬ £¬£¬GitGuardianÑо¿Ö°Ô±Åû¶һÆðÃûΪ¡°GhostAction¡±µÄGitHub¹©Ó¦Á´¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬ £¬£¬Òѵ¼ÖÂ3325¸öÉñÃØÐÅϢй¶£¬£¬£¬£¬£¬ £¬£¬º­¸ÇPyPI¡¢npm¡¢DockerHub¡¢GitHubÁîÅÆ¼°Cloudflare¡¢AWSµÈÒªº¦Æ¾Ö¤¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ2025Äê9ÔÂ2ÈÕ£¬£¬£¬£¬£¬ £¬£¬ÒÔFastUUIDÏîĿΪÊ׸öÄ¿µÄ£¬£¬£¬£¬£¬ £¬£¬Í¨¹ýÐ®ÖÆÎ¬»¤ÕßÕË»§Ìá½»¶ñÒâGitHub ActionsÊÂÇéÁ÷ÎļþʵÏÖ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓøÃÎļþÔÚ¡°ÍÆËÍ¡±»òÊÖ¶¯µ÷Àíʱ×Ô¶¯´¥·¢£¬£¬£¬£¬£¬ £¬£¬´ÓGitHub ActionsÇéÐζÁÈ¡ÉñÃØ£¬£¬£¬£¬£¬ £¬£¬²¢Í¨¹ýcurl POSTÇëÇó½«Êý¾Ýй¶ÖÁ¹¥»÷Õß¿ØÖƵÄÍⲿÓò¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷¹æÄ£Ô¶³¬FastUUID£¬£¬£¬£¬£¬ £¬£¬Éæ¼°ÖÁÉÙ817¸ö´æ´¢¿â£¬£¬£¬£¬£¬ £¬£¬ËùÓжñÒâÌá½»¾ùÖ¸Ïòͳһй¶¶Ëµã¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýö¾ÙÕýµ±ÊÂÇéÁ÷ÖеÄÉñÃØÃû³Æ²¢Ó²±àÂëÖÁ¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬ £¬£¬ÇÔÈ¡ÁËPyPIÁîÅÆ¡¢npmÁîÅÆ¡¢DockerHubÁîÅÆ¡¢GitHubÁîÅÆ¡¢Cloudflare APIÁîÅÆ¡¢AWS»á¼ûÃÜÔ¿¼°Êý¾Ý¿âƾ֤µÈ¶àÀàÉñÃØ¡£¡£¡£¡£¡£Ö»¹ÜFastUUIDµÄPyPIÁîÅÆ±»ÇÔ£¬£¬£¬£¬£¬ £¬£¬µ«Î´·¢Ã÷¶ñÒâÈí¼þ°üÐû²¼¡£¡£¡£¡£¡£GitGuardianÓÚ9ÔÂ5ÈÕÏò573¸öÊÜÓ°Ïì´æ´¢¿âÌá½»GitHubÎÊÌ⣬£¬£¬£¬£¬ £¬£¬²¢Í¬²½Í¨ÖªGitHub¡¢npm¡¢PyPIÇå¾²ÍŶÓ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ £¬£¬100¸ö´æ´¢¿âÒѼì²â²¢»Ö¸´¶ñÒâ¸ü¸Ä£¬£¬£¬£¬£¬ £¬£¬Ð¹Â¶¶ËµãÔÚÊÂÎñÆØ¹âºó×èÖ¹ÆÊÎö¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬ £¬£¬ÖÁÉÙ9¸önpm°üºÍ15¸öPyPI°ü¿ÉÄÜÒòÉñÃØÐ¹Â¶Ðû²¼¶ñÒâ°æ±¾£¬£¬£¬£¬£¬ £¬£¬Íþв¶à¸ö°üÉú̬ϵͳ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-3-325-secrets-in-ghostaction-github-supply-chain-attack/