注册并分享邀请链接,可获得视频播放与邀请奖励。

23pds (山哥) 的个人资料封面
23pds (山哥) 的头像

23pds (山哥) (@im23pds)

@im23pds
Dad/@SlowMist_Team Partner&CISO/#Web3# Security Researcher/RedTeam/Pentester/Ai安全猎人 #bitcoin#
6K 正在关注    15.1K 粉丝
🚨
🚨 SlowMist TI Alert 🚨 MistEye has received critical threat intelligence regarding an active supply chain attack compromising node-ipc, a foundational Node.js library. The malicious releases have been identified as versions 9.1.6, 9.2.3, and 12.0.1. Threat actors injected an obfuscated credential-stealing payload into the CommonJS bundle. Once loaded, it silently harvests over 90 categories of developer data—including AWS, Azure, GCP, SSH, K8s tokens, and Terraform states—and exfiltrates it to attacker-controlled infrastructure. We have synchronized this IOC with our clients immediately. Detection & Remediation: Please urgently audit your environments for exposure: • Dependencies: Run npm ls node-ipc --all to identify direct or transitive inclusions. • Lockfiles: Search package-lock.json, yarn.lock, or pnpm-lock.yaml for the affected version ranges. • CI/CD: Review pipeline jobs executed after May 14, 2026, that may have pulled loose semver updates (~9.1.x, ^12, etc.). ⚠️ Critical Action: If a compromised version was installed, assume certain compromise. Do not wait for exfiltration confirmation. Downgrade to a known safe version immediately and aggressively rotate all credentials, tokens, and environment secrets present on the affected machine or CI runner. As always, stay vigilant!
显示更多
已经拿到一些在野攻击样本了,目前可以肯定的这是针对旧版 iOS 的 iPhone,Safari 浏览器,有加密货币钱包的用户群体。 有假冒色情直播、波场能量站、退款流程、漏洞预警等等的网页,如果旧版本 iPhone 用户的 Safari 浏览器打开了这种网页,没有关闭的情况下,此时解锁钱包 App 准备使用,明文私钥就可能会被这种网页里的恶意 JavaScript 利用代码给盗走。 系统更新要重视,尤其看到有安全漏洞修复有关的更新。否则你的那些钱包怎么被盗的你都知道。 细节我们会看情况再决定披露。
显示更多
🚨 node-ipc 再次遭受入侵 今天发布的 node-ipc 三个恶意版本(9.1.6、9.2.3、12.0.1),它们携带相同的凭证窃取负载。 该包每周下载量超过 1000 万。
🚨 BREAKING: node-ipc compromised. Again. Three malicious versions of node-ipc (9.1.6, 9.2.3, 12.0.1) were published today carrying an identical credential-stealing payload. This package has 10M+ weekly downloads. Here's what happened: An attacker injected an 80KB obfuscated IIFE into the CommonJS bundle. It fires on every require('node-ipc') call. No special config needed, just importing the package is enough. What it steals: → AWS, Azure, GCP credentials → SSH private keys → Kubernetes configs → Docker tokens → GitHub CLI tokens → AI tool configs (including Claude) → Terraform state → 90+ credential file patterns in total Everything gets gzipped and exfiltrated to an attacker-controlled domain (sh[.]azurestaticprovider[.]net) via DNS TXT queries and HTTPS POST, designed to look like normal traffic. The attacker published across two major version lines simultaneously (9.x and 12.x) to maximize blast radius. Semver ranges like ^9, ~9.1.x, ~9.2.x, ^12, and ~12.0 all resolve to compromised versions automatically on the next install or lockfile refresh. Key details: Only the CommonJS bundle (node-ipc.cjs) is affected. ESM imports are clean. The 9.x releases are fabricated. The 9.x line never shipped a .cjs bundle before this attack. This is a different actor from the 2022 peacenotwar incident. Purely financial, credential-theft motivation. If you installed any of these versions, assume all secrets on that machine are compromised. Rotate everything. Our full technical breakdown covers the attack chain stage by stage, IOCs, and how to check if you're affected:
显示更多
凌晨刷到这条,我脊背瞬间发凉,全身鸡皮疙瘩都起来了。 @zcbenz,MLX维护者、Electron.js创始人,在Apple亲手把这个消息放了出来: MLX的CUDA后端,所有测试全部通过! 那个曾经被当成“苹果硅独占玩具”的MLX,现在直接杀进了NVIDIA的主场。 同一套代码。 Mac上极致丝滑,NVIDIA显卡上也全速狂飙。 以前大家还在PyTorch的兼容地狱里挣扎,Apple用MLX悄无声息打出一记王炸。 本地AI的跨平台时代,真的要来了。 而且来得比所有人想象的都要猛、都要狠。 我现在只剩下一个感觉——血脉喷张。 MLX的CUDA时代,正式拉开序幕。 你敢信!
显示更多
We have achieved a milestone in MLX that all tests are passing in CUDA backend now.
0
22
320
55
转发到社区
AI 加持下 Linux 和 Nginx 被打成了马蜂窝🤣
wtf 😂
NGINX rift: We autonomously discovered this 18 yr old heap overflow (CVE-2026-42945) in @nginx impacting version 0.6.27 to 1.30.0. If you use rewrite and set directive, you maybe impacted! Please update your NGINX or change the config to mitigate it. Read more at
显示更多
wtf.. 又一个…😅
#Fragnesia# 🚨: a new #Linux# kernel LPE in the Dirty Frag family lets unprivileged attackers gain root via ESP-in-TCP page-cache corruption. No host-level privileges required. Patch ASAP, disable esp4/esp6/rxrpc if unused, and restrict user namespaces.
显示更多
MistEye 🚨 NPM 蠕虫 Shai-Hulud 开源,供应链风险升高。 Shai-Hulud 是近期备受关注的 'Git 恶意蠕虫',现已被开源。 这意味着 TeamPCP 或其他方发布了完整可执行版本,潜在威胁显著增加。 各项目方和平台需提高警惕,立即加强防护,防范 NPM 供应链攻击。
显示更多
So proud of the @ledger team for making clear signing on Ethereum a reality. They built in the open, brought together stakeholders across the ecosystem, and created the 7730 standard as a public good for Ethereum.
显示更多
0/ Clear signing is now live. An open standard to end blind signing, making human-readable transactions default. This effort brings a major UX and Security upgrade to transaction signing on Ethereum.
显示更多
0
15
131
13
转发到社区
学习 干这么多年技术,现在回头看,一个很重要的点:一定要懂金融和投资。
阿里、美团、腾讯三家在这三家AI公司上的浮盈毛估估加起来已经超过 1000 亿,投资上猛赚,但和这三家蒸发的市值来比的话简直亏大发了。 但同样是投AI,三家的画风完全不一样。美团投得最少、赚得最猛,阿里撒网最广、有部分是以算力投进去,腾讯居中。 1、先看智谱:美团45倍,碾压全场 智谱现在市值约 3500 亿 RMB(港股02513,5月初盘中一度突破 1000 港元,总市值超 4000 亿港元),智谱的 GLM5.1 登顶全球大模型 TOP3,coding 套餐天天卖爆。 美团是最早下注的。2023年3月B2轮,3 亿 RMB 直接拍进去,投后估值 32 亿,占股超过 10%。之后美团再没追加,经过后面数轮融资和IPO稀释,美团还剩 3.91%,对应市值 137 亿。3亿变137亿,净赚 134 亿,回报 45 倍。这个数字放在整个中国一级市场都是顶级水准。 腾讯来得晚一些。2024年8月B4轮才进,投了 2 亿,投后估值已经到 72 亿,占股 2.7%。稀释后剩 1.58%,值 55 亿,回报 27 倍。也不差,但跟美团一比,晚了一年多,回报直接砍了一半。 阿里的路径最绕。蚂蚁旗下上海云玡先在B3轮用 1.5 亿认购了智谱 66.7 万元注册资本,IPO后持 1.54%,值 54 亿,回报 33 倍。阿里自己不算差,蚂蚁通过上海云玡和上海飞玡合计持 3.66%,值 128 亿,成本 4.9 亿(已扣掉转让给阿里的 1.1 亿),回报 25 倍。阿里系(阿里+蚂蚁)在智谱合计持股 5.2%,浮盈约 175 亿。 2、MiniMax:阿里重仓,腾讯跟投,美团缺席 阿里在MiniMax上下了重注。通过Alisoft持股 12.52%,按当前市值算约 37 亿美金。阿里参与了B轮和基石轮,但MiniMax没详细披露阿里的出资金额,按毛估估约 6 亿美金成本,增值约 5.2 倍,赚31 亿美金 210亿人民币 腾讯占 2.37%,值约 7 亿美金,参与轮次比阿里略早,成本应该更低,按 ~1 亿美金估算,增值约 6 倍。虽然绝对金额不如阿里,但成本控制得更好,倍数反而更高。 美团没参与MiniMax投资。 3、Kimi:阿里可能是最大赢家、美团也是重注 月之暗面还没上市,最新一轮 20 亿美元融资刚刚完成,投后估值突破 200 亿美元(~1400 亿 RMB),美团龙珠领投。 阿里是Kimi早期最重要的财务投资者。2024年以 8 亿美金购入约 36% 股权,不过其中部分以阿里云算力结算,现金大约 6 亿美金。2026年2月又参与了 7 亿美金融资,具体金额未披露。按 36% 股权算,当前市值约 72 亿美金,账面回报约 9 倍。但这个倍数的前提是:阿里没有在后续融资中被大幅稀释,以及 200 亿估值站得住。两个条件都有变数。 腾讯2024年8月参与了 3 亿美金融资按照 33 亿美金估值投资,2026年2月又联合领投了 7 亿美金融资,但两轮出资金额都没披露,没法算精确浮盈。按腾讯一贯风格,大概率是跟投而非重仓。 美团这边分成两笔。王慧文个人累计投资约 7000 万美金(~4.9 亿 RMB),按当前估值算回报约 5 倍,这笔投得早,赚得还行。美团龙珠则是本轮 20 亿融资的领投方,单笔出资超 2 亿美金,刚投完估值没涨多少,暂时没有浮盈。 几个有意思的点: 1、美团回报倍数碾压。3亿进去,134亿出来,45倍。原因很简单:进得早,出得少。B2轮就进去了。 2、阿里智谱、MiniMax、Kimi三家全投了,总浮盈金额最大,且每家投入金额大,还有很大一部分是用算力来投的。 3、腾讯最均衡。智谱27倍,MiniMax 6倍,综合回报11倍,kimi 预计 6 倍。 4、Kimi可能是阿里最大的单笔回报来源——36%股权按 200 亿美金估值值 72 亿美金,如果最终IPO定价更高,这个数字还会膨胀。 这三家AI公司股价波动剧烈。智谱从上市首日 131 港元涨到 840+ 港元,MiniMax从 165 港元涨到 1200+ 港元,但回调也很猛。这些浮盈在变现之前,都是纸面富贵。 还有一点值得说:这三家大厂投AI的逻辑不是纯财务投资。阿里需要算力客户,腾讯需要生态卡位,美团需要技术壁垒,三个各自投的目的不同但都是为了不被取代。
显示更多
👮‍♂️👮‍♂️👮‍♂️
1/ Meet Dritan Kapllani Jr, a US based threat actor tied to $19M from social engineering thefts targeting crypto holders. Dritan flexes luxury cars, watches, private jets, & clubs all over social media. Recently he was recorded on a call showing off a wallet with stolen funds.
显示更多
🚨 MistEye TI Alert 🚨 MistEye has detected a highly sophisticated npm worm, "Mini Shai-Hulud," spreading through trusted developer projects like TanStack, UiPath, and DraftLab. The attackers hijacked GitHub credentials to publish malicious, yet seemingly legitimate, package updates. The malware injects a heavily disguised hidden script (router_init.js) that runs silently in the background of CI/CD environments (like GitHub Actions). It is specifically designed to harvest highly sensitive data, including CI/CD secrets, cloud infrastructure keys, and cryptocurrency wallets. The stolen data is then stealthily smuggled out using GitHub's own infrastructure. We have synchronized these critical IOCs with our clients. If your projects utilize the affected packages, immediate action is required: please audit your CI/CD pipelines for the presence of the router_init.js file, rotate all exposed GitHub, cloud, and crypto credentials, and closely monitor your development environments for any unauthorized background activity. As always, stay vigilant!
显示更多
🚨SlowMist TI Alert🚨 💸 @Aurellion_Labs Loss: 455,003 USDC (~$455,003) 🔍 Root Cause: Unprotected initialize(address varg0) in SafeOwnable Facet. Diamond set owner via non-initialize path without updating _initialized version slot (bytes 0-7 of 0xf0c57e...) from 0, allowing re-init by attacker to overwrite owner, call diamondCut to inject malicious facet with pullERC20, and drain approved USDC. 📌 Victim Contract: 0x0adc63e71b035d5c7fdb1b4593999fa1f296f1b2 📌 Vulnerable Facet: 0x3ca79c1cf29b8d19f7c643bb6e6bc9c49762e70f 📌 Attacker EOA: 0x9f49591a3bf95b49cd8d9477b4481ce9da68d5ca Attacker seized Diamond ownership and drained USDC from approved victims including 0x2e933518..., 0xa90714a1..., 0xeced2d37.... Powered by #SlowMist#.AI
显示更多
0
2
37
11
转发到社区
🤪
选择永远比努力重要 这一轮如果死守币圈,又错过了 芯片、存储、CPU、光模块的,那会完美的避开了整个AI资产增值的大浪潮。 只能劝一句,回头是岸,大币种还有机会,而绝大部分山寨币会归零。别沉迷其中。踏实做好资产配置,搭上AI 5 到10年的大浪潮,人类最后一次工业革命! 看清楚前方方向很重要,选择永远比努力重要。
显示更多
🚨SlowMist TI Alert🚨 💸 Loss: 140,180 USDT (140,180,175,562 tokens) 🔍 Root Cause: Missing access control in addUsers (0x4777ff62) function of PayrollDistribution. Anyone can register users for existing drop and set arbitrary totalAmount. 📌 Attacker: 0x90b147592191388e955401af43842e19faa87ee2 📌 Victim: 0xa184af4b1c01815a4b57422a3419e4fb78a96ee4 📌 Vulnerable Contract: 0xef2c77f3b9b8aaa067239bc6b4588bae26433494 Attacker registered exploit contract via addUsers in constructor, flash loaned USDT deposit, claimed oversized payroll from drop #3#. Powered by #SlowMist#.AI
显示更多
0
1
37
13
转发到社区
币圈会搞钱的人执行力都非常惊人,币圈火就狂搞币赚钱,AI圈火就立马切到 AI 圈买港股美股各种AI、芯片热门股。 真心佩服
🔎 朝鲜黑客仍在用恶意的 Git Hook 攻击加密货币开发者 👉使用 vercel[.]app 来隐藏流量 😄
考古下,其实我当时发的这个也是一样:
🫤去年我发现某家全球Top 5的大所存在一个严重漏洞,价值在 $100,000+ 级别,为防止被黑客利用,我第一时间主动联系他们团队,快速通报并协助处理。 一句“谢谢”,然后就彻底没下文了.. 没有反馈、没有奖励、甚至没有公开致谢。 以后不客气,直接走 Bug Bounty 流程—修复、披露,公开透明。
显示更多
太逗了 Wasabi 被黑的入口点:Spring Boot Actuator 泄露.. RCE
攻击者利用 13 个账户,向 Hugging Face 和 ClawHub(OpenClaw)植入 575 个恶意 Skills。