±ÏÂíÍþºÉÀ¼·Ö²¿ÔâNovaÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2026-01-29

1. ±ÏÂíÍþºÉÀ¼·Ö²¿ÔâNovaÀÕË÷Èí¼þ¹¥»÷


1ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ £¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ £¬ºÉÀ¼±ÏÂíÍþ»á¼ÆÊ¦ÊÂÎñËùºÉÀ¼·Ö²¿ÔâÓö»îÔ¾ÀÕË÷Èí¼þ×éÖ¯NovaµÄ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬ £¬³ÉΪ¸Ã×éÖ¯×îÐÂÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£¾ÝÀÕË÷Èí¼þ»î¶¯¸ú×ÙÆ½Ì¨Åû¶£¬£¬£¬£¬£¬£¬ £¬¹¥»÷±¬·¢Ê±¼äÓë·¢Ã÷ÈÕÆÚÏà½ü£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡´ó×ÚÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬²¢·¢³öΪÆÚ10ÌìµÄ×îºóͨ뺣¬£¬£¬£¬£¬£¬ £¬ÒªÇóÊܺ¦·½ÁªÏµÌ¸ÅÐÊê½ðÖ§¸¶¡£¡£¡£¡£¡£¡£¡£±ÏÂíÍþ×÷ΪȫÇòÁìÏȵÄרҵЧÀÍ»ú¹¹£¬£¬£¬£¬£¬£¬ £¬ºÉÀ¼·Ö²¿ÕÆÎÕן­¸Ç½ðÈÚЧÀÍ¡¢ºÏ¹æÉ󼯼°ÆóÒµÔËÓªµÄÃô¸Ð¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬ £¬´Ë´Î¹¥»÷ÇкÏNovaÒ»Ö±µÄ×÷°¸Ä£Ê½¡ª¡ª×¨×¢ÓÚרҵЧÀÍÓë½ðÈÚÐÐÒµµÄ×ÅÃûÆóÒµ¡£¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬ £¬ÍøÂçÇå¾²ÍŶӽ¨ÒéÁ¬Ã¦·â±ÕÒÑʶ±ðµÄÏà¹ØÓòÃû»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬ £¬²¢Ç×½ü¼à¿ØÍøÂçÄÚÊÇ·ñ±£´æÓëÀÕË÷Èí¼þ°²ÅÅÏà¹ØµÄºáÏòÒÆ¶¯»î¶¯¡£¡£¡£¡£¡£¡£¡£Ò»µ©·¢Ã÷ÓëNovaÏà¹ØµÄÈëÇÖºÛ¼£»£» £»ò¹¥»÷Ö¸±ê£¬£¬£¬£¬£¬£¬ £¬±ØÐèÁ¬Ã¦Æô¶¯Ó¦¼±Ô¤°¸¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ £¬±ÏÂíÍþ¹Ù·½ÉÐδ¾Í´ËÊÂÎñ¹ûÕæ½ÒÏþÉùÃ÷£¬£¬£¬£¬£¬£¬ £¬¿Í»§¼°Ïà¹Ø·½ÐèÇ×½ü¹Ø×¢Æä¹Ù·½ÇþµÀºóÐø×ª´ï£¬£¬£¬£¬£¬£¬ £¬ÒÔ»ñÈ¡ÊÂÎñÓ°ÏìÆÀ¹À¼°ÐÞ¸´Ï£Íûʱ¼ä±í¡£¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/nova-ransomware-breach-kpmg-netherlands/


2. TA584ʹÓÃTsundere BotÓëXWormľÂíʵÑéÀÕË÷¹¥»÷Á´


1ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ £¬×Ô2020ÄêÆð£¬£¬£¬£¬£¬£¬ £¬ProofpointÒ»Á¬×·×ÙµÄTA584³õʼ»á¼ûÊðÀí½üÆÚ»î¶¯¼¤Ôö£¬£¬£¬£¬£¬£¬ £¬Æäͨ¹ýTsundere BotÓëXWormÔ¶³Ì»á¼ûľÂí¹¹½¨ÖØ´ó¹¥»÷Á´£¬£¬£¬£¬£¬£¬ £¬ÏÔÖøÌáÉýÈÆ¹ý¾²Ì¬¼ì²âÄÜÁ¦£¬£¬£¬£¬£¬£¬ £¬¿ÉÄÜÒý·¢ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯2025Äêβ»î¶¯Á¿½ÏͬÄêµÚÒ»¼¾¶ÈÔöÌíÈý±¶£¬£¬£¬£¬£¬£¬ £¬¹¥»÷¹æÄ£´Ó¹Å°åÄ¿µÄÇø£¨±±ÃÀ¡¢Ó¢°®£©À©Õ¹ÖÁµÂ¹ú¡¢Å·ÖÞ¶à¹ú¼°°Ä´óÀûÑÇ¡£¡£¡£¡£¡£¡£¡£Tsundere BotÓÉ¿¨°Í˹»ù2023ÄêËê¼£¬£¬£¬£¬£¬£¬ £¬¹ØÁª¶íÓï²Ù×÷Ô±¼°123 Stealer¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ £¬¾ß±¸ºóÃÅ¡¢¼ÓÔØÆ÷¹¦Ð§£¬£¬£¬£¬£¬£¬ £¬ÐèNode.jsÇéÐÎÔËÐС£¡£¡£¡£¡£¡£¡£Æäͨ¹ýEtherHidingÊÖÒÕ´ÓÒÔÌ«·»Çø¿éÁ´»ñÈ¡C2µØµã£¬£¬£¬£¬£¬£¬ £¬²¢ÄÚÖÃÓ²±àÂ뱸Óõص㣬£¬£¬£¬£¬£¬ £¬Í¨¹ýWebSocketÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬ £¬Í¬Ê±¼ì²âϵͳÓïÑÔ£¬£¬£¬£¬£¬£¬ £¬ÈôΪ¶ÀÁªÌåÓïÑÔ£¨Èç¶íÓÔòÖÐÖ¹Ö´ÐС£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÍøÂçϵͳÐÅÏ¢¡¢Ö´ÐÐí§ÒâJS´úÂë¡¢³äµ±SOCKSÊðÀí£¬£¬£¬£¬£¬£¬ £¬²¢ÄÚÖÃÊг¡ÓÃÓÚ½©Ê¬³ÌÐòÉúÒâ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ±»ÈëÇÖÀϾÉÕË»§·¢Ë͵Ĵ¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ £¬Óʼþ°üÀ¨Ä¿µÄΨһURL¡¢µØÀíΧÀ¸¡¢IP¹ýÂ˼°Öض¨ÏòÁ´¡£¡£¡£¡£¡£¡£¡£Óû§¾­CAPTCHAÑéÖ¤ºó½øÈëClickFixÒ³Ãæ£¬£¬£¬£¬£¬£¬ £¬±»ÓÕµ¼Ö´ÐÐPowerShellÏÂÁ£¬£¬£¬£¬£¬ £¬¼ÓÔØ»ìÏý¾ç±¾½«XWorm»òTsundere Bot×¢ÈëÄڴ棬£¬£¬£¬£¬£¬ £¬×îÖÕä¯ÀÀÆ÷±»Öض¨ÏòÖÁÎÞº¦ÍøÕ¾ÒÔÑÚÊι¥»÷¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/


3. ²¨À¼µçÍøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬Ô¼30¸öÉèÊ©Êܵ½Ó°Ïì


1ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ £¬²¨À¼µçÍø12ÔÂÏÂÑ®ÔâÊÜЭͬ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸Ìì϶à¸öÂþÑÜʽÄÜÔ´×ÊÔ´£¨DER£©Õ¾µã£¬£¬£¬£¬£¬£¬ £¬°üÀ¨ÈȵçÁª²ú£¨CHP£©ÉèÊ©¡¢·çÄܼ°Ì«ÑôÄܵ÷Àíϵͳ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ËäδÖÐÖ¹µçÁ¦¹©Ó¦£¬£¬£¬£¬£¬£¬ £¬µ«µ¼ÖÂÒªº¦ÔËÓªÊÖÒÕ£¨OT£©ÏµÍ³ÊÜË𣬣¬£¬£¬£¬£¬ £¬Ë𻵡°ÎÞ·¨ÐÞ¸´µÄÒªº¦×°±¸¡±£¬£¬£¬£¬£¬£¬ £¬×ÜËðʧ´ï1.2¼ªÍߣ¬£¬£¬£¬£¬£¬ £¬Õ¼²¨À¼ÄÜÔ´¹©Ó¦µÄ5%¡£¡£¡£¡£¡£¡£¡£¾ÝÒªº¦¹¤Òµ»ù´¡ÉèÊ©Çå¾²¹«Ë¾DragosÅû¶£¬£¬£¬£¬£¬£¬ £¬ÊÜÓ°ÏìËùÔÚÏÖʵԼ30¸ö£¬£¬£¬£¬£¬£¬ £¬Ô¶³¬¹ûÕæ±¨µÀµÄ12¸ö¡£¡£¡£¡£¡£¡£¡£DragosÒÔÖеÈÐÅÐĽ«´Ë´Î¹¥»÷¹éÒòÓÚ¶íÂÞ˹ÍþвÐÐΪÌåElectrum¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ËäÓëSandworm£¨APT44£©±£´æÖصþ£¬£¬£¬£¬£¬£¬ £¬µ«±»ÊÓΪ×ÔÁ¦»î¶¯¼¯Èº¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬ £¬ESETÔø±¨¸æAPT44ʹÓÃDynoWiper¶ñÒâÈí¼þ¶Ô²¨À¼µçÍøÌᳫʧ°Ü¹¥»÷£¬£¬£¬£¬£¬£¬ £¬¶øElectrumµÄ¹¥»÷Ä¿µÄ¸ü¾Û½¹ÓÚÂþÑÜʽÄÜÔ´Õ¾µãµÄµ÷Àíϵͳ¡¢Ô¶³ÌÖն˵¥Î»£¨RTU£©¡¢ÍøÂç±ßÑØ×°±¸¡¢¼à¿ØÏµÍ³¼°»ùÓÚWindowsµÄ»úеµÈ̻¶ÇÒÒ×Êܹ¥»÷µÄϵͳ¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÏìÓ¦Ö¤¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¶Ô×°±¸°²ÅźͲÙ×÷·½·¨ÓÐÉî¿ÌÃ÷È·£¬£¬£¬£¬£¬£¬ £¬Öظ´ÈëÇÖ¶à¸öÕ¾µãµÄÀàËÆRTUºÍ±ßÑØ×°±¸ÉèÖᣡ£¡£¡£¡£¡£¡£ËûÃÇÀÖ³Éʹ¶àÕ¾µãͨѶװ±¸Ê§Ð§£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂÔ¶³Ì¼à¿ØºÍ¿ØÖƹ¦Ð§Ëðʧ£¬£¬£¬£¬£¬£¬ £¬µ«·¢µç¹¦Ð§Î´ÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£²¿·ÖOT/ICS×°±¸ÉèÖÃËð»µÖÁÎÞ·¨»Ö¸´£¬£¬£¬£¬£¬£¬ £¬Õ¾µãWindowsϵͳ±»²Á³ý¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cyberattack-on-polish-energy-grid-impacted-around-30-facilities/


4. eScan¸üÐÂЧÀÍÆ÷ÔâÈëÇÖÖ¶ñÒâ¸üзַ¢


1ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ £¬eScan·À²¡¶¾²úÆ·ÖÆÔìÉÌMicroWorld Technologies 1ÔÂ20ÈÕ֤ʵÆäÇøÓò¸üÐÂЧÀÍÆ÷ÔâÈëÇÖ£¬£¬£¬£¬£¬£¬ £¬ÔÚÁ½Ð¡Ê±´°¿°¢ÚÄÚÏò²¿·Ö¿Í»§·Ö·¢Á˶ñÒâ¸üС£¡£¡£¡£¡£¡£¡£¸Ã¸üб»ÆÊÎöΪ°üÀ¨¶à½×¶Î¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ £¬Í¨¹ý¸Ä¶¯eScanÕýµ±¸üÐÂ×é¼þ¡°Reload.exe¡±ÊµÏÖ³¤ÆÚ»¯ºóÃŰ²ÅÅ£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂϵͳhostsÎļþÐ޸ġ¢¸üÐÂЧÀÍÅþÁ¬×è¶Ï¼°ÐÂÇå¾²½ç˵ÎüÊÕʧ°Ü¡£¡£¡£¡£¡£¡£¡£eScanÌåÏÖ£¬£¬£¬£¬£¬£¬ £¬´Ë´ÎÊÂÎñÔ´ÓÚδ¾­ÊÚȨ»á¼ûÇøÓòЧÀÍÆ÷ÉèÖ㬣¬£¬£¬£¬£¬ £¬ÔÊÐí¶ñÒâÎļþ±»°²ÅÅÔÚ¸üзַ¢Â·¾¶ÖС£¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷¸ÃÊÂÎñÓë²úÆ·×Ô¼ºÎó²îÎ޹أ¬£¬£¬£¬£¬£¬ £¬½öÓ°Ïì´ÓÌØ¶¨ÇøÓò¼¯ÈºÏÂÔØ¸üеĿͻ§¡£¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬ £¬eScanѸËÙ¸ôÀëÊÜÓ°Ïì»ù´¡ÉèÊ©¡¢ÂÖ»»Éí·ÝÑé֤ƾ֤£¬£¬£¬£¬£¬£¬ £¬²¢ÓÚ1ÔÂ21ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬ £¬×Ô¶¯Í¨Öª²¢Ö±½ÓÁªÏµÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬£¬£¬ £¬Ìṩ°üÀ¨ÏµÍ³»Ö¸´¡¢¸üй¦Ð§ÖØÆôÓü°ÑéÖ¤µÄÐÞ¸´¸üгÌÐò¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/


5. FBI²é·âÀÕË÷Èí¼þÍÅ»ïʹÓõÄRAMPÍøÂç·¸·¨ÂÛ̳


1ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ £¬FBIÁªºÏÃÀ¹ú·ðÂÞÀï´ïÖÝÄÏÇøÉó²é¹Ù°ì¹«ÊÒ¼°Ë¾·¨²¿ÅÌËã»ú·¸·¨²¿·Ö²é·âÁËÎÛÃûÕÑÖøµÄRAMPÍøÂç·¸·¨ÂÛ̳¡£¡£¡£¡£¡£¡£¡£¸ÃÂÛ̳×÷Ϊ¶íÓïµØÏÂÍøÂçÖÐÉÙÊýÈÔ¹ûÕæÔÊÐíÍÆ¹ãÀÕË÷Èí¼þÐж¯µÄƽ̨£¬£¬£¬£¬£¬£¬ £¬ÆäTorÍøÕ¾¼°Ã÷ÍøÓòÃûramp4u.ioÏÖÒÑÏÔʾ²é·â֪ͨ£¬£¬£¬£¬£¬£¬ £¬²¢¼¥Ð¦Ê½ÒýÓÃ×ÔÉí¿ÚºÅ¡°Î¨Ò»ÔÊÐíÀÕË÷Èí¼þµÄµØ·½£¡¡±¼°¶íÂÞ˹¶¯»­½ÇÉ«ÂêɯգÑÛͼ°¸¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯Ê¹Ö´·¨²¿·Ö¿É»ñÈ¡ÂÛ̳Óû§Êý¾Ý£¬£¬£¬£¬£¬£¬ £¬°üÀ¨Óʼþ¡¢IPµØµã¡¢Ë½ÐŵÈDZÔÚ·¸·¨Ö¤¾Ý£¬£¬£¬£¬£¬£¬ £¬¿ÉÄܶԲÙ×÷Çå¾²ÊèºöµÄÍþвÐÐΪÕßʵÑéÉí·Ýʶ±ðÓë¾Ð²¶¡£¡£¡£¡£¡£¡£¡£RAMPÂÛ̳ÓɼÙÃûOrangeµÄMikhail MatveevÓÚ2021Äê7Ô½¨É裬£¬£¬£¬£¬£¬ £¬Ö¼ÔڳнÓÒòDarkSide¹¥»÷Colonial Pipelineºó¶íÓïÂÛ̳եȡÀÕË÷Èí¼þÍÆ¹ãµÄ¿Õȱ¡£¡£¡£¡£¡£¡£¡£Matveev´ËǰΪBabukÀÕË÷Èí¼þÖÎÀíÔ±£¬£¬£¬£¬£¬£¬ £¬¸Ã×éÖ¯Òò¹¥»÷»ªÊ¢¶ÙÌØÇø¾¯¾ÖºóÄÚ²¿·ÖÁÑ£¬£¬£¬£¬£¬£¬ £¬ËûʹÓÃBabukÔ­ÓÐTorÓòÃûÖØÐÞRAMP¡£¡£¡£¡£¡£¡£¡£ÂÛ̳ÉÏÏß³õÆÚÔâDDoS¹¥»÷£¬£¬£¬£¬£¬£¬ £¬OrangeÔøÖ¸ÔðBabukǰ³ÉÔ±£¬£¬£¬£¬£¬£¬ £¬µ«ºóÕß·ñ¶¨¡£¡£¡£¡£¡£¡£¡£MatveevÔڲɷÃÖÐ͸¶£¬£¬£¬£¬£¬£¬ £¬RAMPδʵÏÖÓ¯ÀûÇÒÒ»Á¬Êܹ¥»÷£¬£¬£¬£¬£¬£¬ £¬ºóÖð½¥Í˳öÖÎÀí¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/


6. PackageGateÎó²îÕ¹ÏÖJavaScript°ü¹ÜÀíÆ÷Ç徲ȱÏÝ


1ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ £¬Çå¾²¹«Ë¾Koi¿ËÈÕÅû¶ÃûΪ"PackageGate"µÄϵÁÐÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ £¬Ó°ÏìNPM¡¢PNPM¡¢VLTºÍBunµÈÖ÷Á÷JavaScript°ü¹ÜÀíÆ÷¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²î¿ÉÈÆ¹ý¹©Ó¦Á´·À»¤»úÖÆ£¬£¬£¬£¬£¬£¬ £¬ÔÊÐí¹¥»÷ÕßÔÚÒÀÀµÏîÖÐÖ²ÈëÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬ £¬×ÝÈ»ÆôÓýûÓÃÉúÃüÖÜÆÚ¾ç±¾£¨--ignore-scripts£©ºÍËø¶¨Îļþ±£»£» £»¤²½·¥ÈÔ¿ÉÄܱ»Ê¹Óᣡ£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬ £¬npm±£´æÑÏÖØÉè¼ÆÈ±ÏÝ£º¶ñÒâGitÒÀÀµÏî¿Éͨ¹ýαÔìµÄ.npmrcÎļþÌæ»»Git¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬ £¬´¥·¢Ô¶³Ì´úÂëÖ´ÐУ»£» £»pnpmËäĬÈϽûÓþ籾£¬£¬£¬£¬£¬£¬ £¬µ«»áÔÚGitÀ­È¡Ê±ÔËÐÐ×¼±¸¾ç±¾£»£» £»vltÔÊÐí±éÀútar°ü·¾¶£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉÁýÕÖϵͳÎļþ£»£» £»BunÔòÒòÐÅÈΰüÃû¶ø·ÇÔ´´úÂ룬£¬£¬£¬£¬£¬ £¬±£´æ°üÃûÖØÓÃΣº¦¡£¡£¡£¡£¡£¡£¡£¸üÑÏËàµÄÊÇ£¬£¬£¬£¬£¬£¬ £¬pnpmºÍvltµÄËø¶¨Îļþ»úÖÆÊ§Ð§£¬£¬£¬£¬£¬£¬ £¬ËüÃǽÓÊÜÎÞÍêÕûÐÔ¹þÏ£µÄÔ¶³Ìtar°ü£¬£¬£¬£¬£¬£¬ £¬Ê¹¹¥»÷ÕßÄÜÔÚ´úÂëÉó²éºóÐÞ¸ÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£Koi±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿Éͨ¹ýÉî¶ÈÒÀÀµÊ÷Ö²Èë¶ñÒâ°ü£¬£¬£¬£¬£¬£¬ £¬Æ¾Ö¤Ê±¼ä¡¢IPµÈÐźŶ¨ÏòͶ·Å¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬ £¬Ëø¶¨ÎļþÎÞ·¨Ìṩ·À»¤¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/187416/hacking/packagegate-bugs-let-attackers-bypass-protections-in-npm-pnpm-vlt-and-bun.html