Aggregator
情报世界的游戏规则变了:比的不是谁更神秘,而是谁能更快拼成全景图
【热点研判】蒙古国总理辞职/朝公开特战部队高强度表演/特朗普被曝称可“拿走伊朗石油”甚至夺取哈尔克岛/
一句"严重关切",到底只是客套话,还是要出手了?一个外交辞令里,藏着多少层国家安全信号?
高危风险提示|又是供应链攻击!Axios npm包遭投毒,请尽快排查处置
Хакер заработал $53 млн на одной опечатке. Но то, как он потратил столь крупную сумму, удивило даже ФБР
Mercor AI Confirms Data Breach Following Lapsus$ Claims of 4TB Data Theft
Mercor AI has officially confirmed a severe data breach following claims by the notorious Lapsus$ hacking group that they stole 4 terabytes of sensitive company data. The incident, stemming from a recent supply chain attack on the open-source LiteLLM project, has exposed proprietary source code, internal databases, and massive amounts of user-verification data. The hacking […]
The post Mercor AI Confirms Data Breach Following Lapsus$ Claims of 4TB Data Theft appeared first on Cyber Security News.
Financial groups lay out a plan to fight AI identity attacks
Generative AI tools have brought the cost of deepfake production low enough that criminals and state-sponsored actors now use them routinely against financial institutions. A joint paper from the American Bankers Association, the Better Identity Coalition, and the Financial Services Sector Coordinating Council lays out the scale of the problem and calls on federal and state policymakers to act across various areas. Deepfake incidents in the fintech sector increased 700% in 2023 compared to 2022. … More →
The post Financial groups lay out a plan to fight AI identity attacks appeared first on Help Net Security.
《中国信息安全》杂志2026年第3期目录
中国信息安全测评中心主任彭涛:开启具身智能德智体协同发展新征程
中国 AI 公司,该怎么「抄 Claude Code 的作业」?
Прощай, ручная работа. Cloudflare автоматизировала поиск брешей в сетевых фильтрах
Google Now Allows You to Change Your @gmail.com Address in a Few Simple Steps
For over two decades, the permanence of a Google Account username has been a strict rule of the digital landscape. Many users found it frustrating to create new accounts and transfer data after outgrowing their childhood email addresses or changing their names. However, Google has recently updated its support documentation to announce that it will […]
The post Google Now Allows You to Change Your @gmail.com Address in a Few Simple Steps appeared first on Cyber Security News.
Malware detectors trained on one dataset often stumble on another
Machine learning models built to catch malware on Windows systems are typically evaluated on data that closely resembles their training set. In practice, the malware arriving on enterprise endpoints looks different, comes from different sources, and in many cases has been deliberately obfuscated to evade detection. A study from researchers at the Polytechnic of Porto tests what happens when that gap is made explicit, and the results have direct implications for organizations relying on static … More →
The post Malware detectors trained on one dataset often stumble on another appeared first on Help Net Security.
Trivy 供应链攻击持续扩散,波及Docker镜像与GitHub代码仓库
发动Trivy供应链攻击的TeamPCP黑客组织持续锁定Aqua Security( Trivy所属厂商)发起精准打击:恶意推送伪装Docker镜像、劫持企业GitHub组织账号,批量篡改数十个开源代码仓库。
本次连环入侵仍是此前高危供应链投毒事件:攻击者非法攻陷Aqua Security旗下安全扫描工具Trivy的GitHub自动化构建流水线,植入窃密后门恶意软件,攻击期间攻击链条进一步扩散污染至Docker Hub官方镜像仓库。
Trivy作为全球顶流开源安全检测工具,GitHub平台累计星标超33800颗,广泛用于精准扫描各类软件制品、底层基础设施中潜藏漏洞、高危配置错误、泄露密钥凭证,覆盖企业全链路安全防线。
Socket发布专项报告,正式确认Docker Hub官方镜像仓库已出现恶意篡改的Trivy污染制品包。
Socket安全研究员证实:“攻击者违规强行推送伪装镜像标签0.69.5与0.69.6版本,但GitHub平台无对应官方合规发布记录及版本标签备案。”深度分析判定,两款恶意镜像均携带专属入侵指纹特征,与TeamPCP攻陷Aqua Security GitHub组织后投放的云窃密后门恶意软件完全同源复用。
Trivy官方最终合规稳定版锁定为0.69.3版本,尽管暂未捕获旧版镜像、编译程序发布后遭二次篡改痕迹,但Docker Hub镜像版本标签不具备永久不可篡改属性,企业不能单纯依赖标签名称判定程序安全完整性。
攻陷劫持Aqua Security GitHub核心组织账号
Aqua Security官方通报结论:本次二次入侵核心诱因,系月初针对同款Trivy工具首轮泄露事件的溯源封堵、安全加固工作存在重大疏漏短板,未能彻底阻断攻击者权限链路。坦言:“我们虽批量紧急轮换重置全域密钥、身份令牌,但重置操作非原子一次性闭环执行,攻击者大概率同步窃取复刻更新后的全新合法令牌凭证。”
漏洞权限复用直接纵容攻击者向Trivy主程序底层植入TeamPCP专属云窃密后门代码,批量推送伪装篡改高危恶意版本。
应急响应层面,Aqua Security已于3月20日紧急发布全新安全纯净版Trivy安装包,同步联合专业应急溯源厂商Sygnia,深度介入漏洞修复、全链路取证调查闭环处置。
然而不久后官方紧急更新预警公告:3月22日后台监控捕获大量异常高危操作行为,判定同一TeamPCP攻击者已再次非法越权登录,违规篡改大量核心代码仓库配置、恶意删除篡改历史记录。
厂商补充说明:截至当前最新节点,Trivy开源主程序暂未遭受本轮二次恶意篡改波及。
开源恶意情报社区平台OpenSourceMalware深度拆解:TeamPCP精准攻陷Aqua Security专属私有代码托管组织账号aquasec-com,该账号独立隔离于公开开源仓库组织aquasecurity,核心承载企业闭源私有商业代码资产。
黑客全程依托自动化恶意脚本批量执行操作,耗时仅约两分钟:为组织内全部44个私有代码仓库统一强制添加tpcp-docs-前缀命名,批量篡改仓库简介公示嘲讽标语“TeamPCP掌控Aqua Security全域权限”。
攻击者核心入侵突破口为非法攻陷服务账号Argon-DevOps-Mgt,该账号默认配置全域最高权限,同步打通Aqua Security公开、私有两大GitHub组织后台管理权限。
OpenSourceMalware披露高危配置漏洞:目标攻陷服务账号依托普通用户个人访问令牌(PAT)完成身份鉴权登录,而非合规安全标准的GitHub应用授权鉴权模式。
致命安全短板凸显:个人访问令牌鉴权机制等同于静态明文密码,有效期远超GitHub应用临时动态令牌;且服务账号默认承载自动化后台调度任务,常规未启用双重多因素认证(MFA)防护,极易被窃取复用。
为精准验证攻陷账号是否具备两大GitHub组织全域管理员权限,TeamPCP恶意创建临时分支update-plugin-links-v0.218.2,推送至公开仓库aquasecurity/trivy-plugin-aqua,随即精准毫秒级一键删除无痕销毁痕迹。
锁定窃取链路:黑客依托自研TeamPCP云窃密后门,非法采集窃取该Argon-DevOps-Mgt服务账号个人访问令牌,恶意软件可精准从持续集成调度运行环境中批量窃取GitHub令牌、SSH密钥、云平台凭证、系统环境变量等高敏数据。
OpenSourceMalware对此解释:“该服务账号常态调度触发trivy-plugin-aqua流水线自动化任务,鉴权令牌长期明文驻留运行环境,极易被恶意软件一键批量采集窃取。”
目前,OpenSourceMalware已公开全套专属入侵妥协指纹特征库,助力企业安全运维人员快速自查研判,排查本机环境、业务链路是否已深陷本次高危供应链投毒入侵。
Aqua Security官方声明:暂未捕获任何证据证实企业商业付费产品内置Trivy检测引擎遭受篡改波及。