<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>开源供应链攻击 on 办公AI智能小助手</title>
    <link>https://blog.qife122.com/tags/%E5%BC%80%E6%BA%90%E4%BE%9B%E5%BA%94%E9%93%BE%E6%94%BB%E5%87%BB/</link>
    <description>Recent content in 开源供应链攻击 on 办公AI智能小助手</description>
    <generator>Hugo</generator>
    <language>zh-cn</language>
    <copyright>qife</copyright>
    <lastBuildDate>Sat, 20 Sep 2025 10:56:33 +0800</lastBuildDate>
    <atom:link href="https://blog.qife122.com/tags/%E5%BC%80%E6%BA%90%E4%BE%9B%E5%BA%94%E9%93%BE%E6%94%BB%E5%87%BB/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>GitHub上的开源恶意软件陷阱：Water Curse组织利用虚假仓库传播多阶段恶意软件</title>
      <link>https://blog.qife122.com/p/github%E4%B8%8A%E7%9A%84%E5%BC%80%E6%BA%90%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6%E9%99%B7%E9%98%B1water-curse%E7%BB%84%E7%BB%87%E5%88%A9%E7%94%A8%E8%99%9A%E5%81%87%E4%BB%93%E5%BA%93%E4%BC%A0%E6%92%AD%E5%A4%9A%E9%98%B6%E6%AE%B5%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6/</link>
      <pubDate>Sat, 20 Sep 2025 10:56:33 +0800</pubDate>
      <guid>https://blog.qife122.com/p/github%E4%B8%8A%E7%9A%84%E5%BC%80%E6%BA%90%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6%E9%99%B7%E9%98%B1water-curse%E7%BB%84%E7%BB%87%E5%88%A9%E7%94%A8%E8%99%9A%E5%81%87%E4%BB%93%E5%BA%93%E4%BC%A0%E6%92%AD%E5%A4%9A%E9%98%B6%E6%AE%B5%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6/</guid>
      <description>&lt;h1 id=&#34;初始访问&#34;&gt;初始访问&lt;/h1&gt;&#xA;&lt;p&gt;在此次事件中，我们发现了托管在GitHub上的多个包含嵌入式恶意软件的开源项目文件。恶意载荷通过GitHub的codeload.github.com域下载ZIP存档交付，该域是用于仓库归档的标准端点。我们识别出两个显著的URL：第一个在撰写本文时仍处于活动状态并可访问，而第二个已被撤下或无法访问：&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
