Aggregator
CVE-2025-10201 | Google Chrome up to 140.0.7339.80 Mojo access control (ID 439305)
第十届上海市大学生网络安全大赛 暨“磐石行动”2025第三届全国高校网络安全攻防大赛复赛wp
Outlook заболел шизофренией — отправляет письма, о которых вы не знаете
The state of DMARC adoption: What 10M domains reveal
In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email spoofing, why misconfigurations like “+all” can be dangerous, and why so few organizations have strong DMARC policies in place even though the standard has been around since 2012. Wilson shares surprising statistics from his research, highlights … More →
The post The state of DMARC adoption: What 10M domains reveal appeared first on Help Net Security.
第十届上海市大学生网络交全大赛Web&数据安全全解(全网首发)
[ctf-PWN] house of orange 详细解析
xxl-job IDOR 0Day 漏洞挖掘
石破茂辞职后谁可能上任?日本政局与对华战略走向分析
电影制片人的手机被警方安装间谍软件
CEO为什么要重视企业安全?
Why organizations need a new approach to risk management
To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business leaders don’t just identify and manage risks after they occur, but instinctively recognize and respond to them as part of their daily decision-making. Rethink risk management At the opening keynote of the Gartner Enterprise Risk, Audit & Compliance Conference, Gartner experts highlighted how risks are now emerging … More →
The post Why organizations need a new approach to risk management appeared first on Help Net Security.
Going Deeper in Cyber Skills: Can You Spot the Not?
In their careers, cyber professionals are expected to move beyond clicking through alerts and develop more depth in the field. The "easy button" may feel efficient, but it could be your downfall if you don't push yourself to truly learn the ins and outs of cyber defense.
How Mitsubishi-Nozomi Deal Will Boost OT Cyber Capabilities
Japanese Industrial giant Mitsubishi Electric will acquire San Francisco-based cybersecurity firm Nozomi Networks for $883 million. The two companies aim to fuse industrial data insights with advanced threat detection while keeping Nozomi as an independent brand.
Feds Release Updated HIPAA Security Risk Analysis Tool
Federal regulators have updated their HIPAA security risk assessment tool that's long been aimed at helping small and midsized providers and business associates with risk analysis - an activity that many healthcare organizations can't seem to get right.
Koi Raises $48M to Safeguard AI Models, Code and Extensions
With $48 million in funding, Koi is scaling up efforts to help enterprises secure browser extensions, AI models and package code often missed by legacy tools. CEO Amit Assaraf says Koi is the only firm offering centralized governance for this fast-growing risk category.
Pentagon Releases Long-Awaited Contractor Cybersecurity Rule
The Department of War has published the final version of its Cybersecurity Maturity Model Certification Rule - dubbed CMMC 2.0 - following years of collaboration with defense vendors on a tiered-approach to developing standardized cybersecurity requirements across the Defense Industrial Base.
Теневой «Король хакеров»: как один IT-специалист построил империю, которой пользуется весь преступный мир
黑客发起供应链攻击 向周下载量达20亿次的NPM包植入恶意软件
黑客发起供应链攻击 向周下载量达20亿次的NPM包植入恶意软件
在一场供应链攻击中,攻击者通过钓鱼攻击攻陷一名维护者的账户后,向周下载量合计超26亿次的多个NPM包植入了恶意软件。
此次供应链攻击中账户遭劫持的软件包维护者Josh Junon已于今日早些时候确认了该事件。他表示钓鱼邮件来自“support [at] npmjs [dot] help”邮箱——该邮箱对应的域名搭建了仿冒正规npmjs.com的网站。
钓鱼邮件中,攻击者以“2025年9月10日锁定账户”相威胁,通过恐吓手段诱使目标点击链接进入钓鱼网站。邮件内容称:“为维护您账户的安全与完整,请您尽快完成更新。请注意,自2025年9月10日起,使用过期2FA凭证的账户将被临时锁定,以防止未授权访问。”
网络钓鱼电子邮件
据收到钓鱼邮件的人士透露,攻击者使用相同邮件针对其他包维护者及开发者发起了攻击。安全研究人员发现,npmjs[.]help网站上包含一个登录表单,用户输入的凭据会被窃取并发送至以下URL:
https://websocket-api2[.]publicvm.com/images/jpg-to-png.php?name=[name]&pass=[password]
事件发现后,NPM团队已移除攻击者发布的部分恶意版本包,其中包括周下载量达3.576亿次的“debug”包。
供应链攻击细节
安全公司Aikido Security对此次攻击进行分析后指出,攻击者接管账户后对相关包进行了更新,在index.js文件中植入了基于浏览器的拦截型恶意代码。该代码可劫持网络流量与应用程序接口(API)。
恶意代码仅影响通过网页访问受感染应用的用户:它会监控加密货币地址及交易,将其重定向至攻击者控制的钱包地址,导致交易被攻击者劫持,而非发送至预期地址。
这款恶意软件的工作原理是:注入用户的网页浏览器后,监控以太坊、比特币、索拉纳、波场、莱特币及比特币现金的钱包地址与转账行为;一旦检测到包含加密货币交易的网络响应,便将收款地址替换为攻击者控制的地址,在交易签名前完成劫持。
Aikido表示,恶意代码通过挂钩(hooking)JavaScript函数实现上述操作,涉及fetch、XMLHttpRequest以及钱包API(如window.ethereum、Solana相关API等)。
截至目前,遭劫持的包及其周下载量如下:
·backslash:26万次
·chalk-template:390万次
·supports-hyperlinks:1920万次
·has-ansi:1210万次
·simple-swizzle:2626万次
·color-string:2748万次
·error-ex:4717万次
·color-name:1.9171亿次
·is-arrayish:7380万次
·slice-ansi:5980万次
·color-convert:1.935亿次
·wrap-ansi:1.9799亿次
·ansi-regex:2.4364亿次
·supports-color:2.871亿次
·strip-ansi:2.6117亿次
·chalk:2.9999亿次
·debug:3.576亿次
·ansi-styles:3.7141亿次
Aikido Security研究员表示:“这些软件包被更新后植入了一段代码,该代码会在网站客户端执行,暗中拦截浏览器中的加密货币及Web3活动,操纵钱包交互,并篡改支付目的地——使得资金与授权被重定向至攻击者控制的账户,而用户毫无察觉。”其危险性在于多层面运作:既修改网站显示内容,又篡改API调用,还操纵用户应用程序对签名内容的认知。
攻击影响范围与背景
尽管这是一场供应链攻击,但应用程序受影响需满足特定条件,大幅降低了攻击的实际影响。具体条件包括:
1. 在软件包遭篡改时段进行了全新安装;
2. 在此期间生成了package-lock.json文件;
3. 直接或间接依赖了受漏洞影响的包。
近几个月来,已有多起类似攻击针对知名JavaScript库的开发者。例如,7月时,周下载量超3000万次的“eslint-config-prettier”包遭攻陷;3月时,另有10个广泛使用的NPM库被劫持并改造成信息窃取工具。
此次钓鱼攻击与植入的恶意软件均表明,网页浏览器已成为窃取凭据、篡改流量及入侵网络的巨大攻击面。