ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷Á˾ִ«²¼¶ñÒâÈí¼þ
°ä²¼¹¦·ò 2025-01-161. ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷Á˾ִ«²¼¶ñÒâÈí¼þ
1ÔÂ14ÈÕ£¬¹¥»÷ÕßÀûÓÃYouTubeºÍGoogleËÑË÷Á˾֣¬Õë¶ÔѰÕÒµÁ°æºÍÆÆ½âÈí¼þÏÂÔØµÄÓû§Ö´ÐÐÍøÂç¹¥»÷¡£ËûÃÇÔÚYouTubeÊÓÆµÖÐÔ̺¬ÐéαÈí¼þÏÂÔØÁ´½Ó£¬ÓÕÆÓû§µã»÷²¢ÏÂÔØÔ̺¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ·¨Ê½¡£Í¬Ê±£¬ÔÚGoogleËÑË÷Á˾ÖÖÐÖ²Èë¿´ËÆºÏ·¨µÄµÁ°æÈí¼þÏÂÔØÁ´½Ó£¬ÊµÔòÒ²Ô̺¬¶ñÒâÈí¼þ¡£¹¥»÷Õß»¹ÀûÓÃMediafireºÍMega.nzµÈÎļþÍйܷþÎñ°µ²Ø¶ñÒâÈí¼þÆðÔ´£¬²¢Ê¹ÓÃÃÜÂë±£»¤ºÍ±àÂë¼¼Êõ¶ã±Ü°²È«¼ì²â¡£´Ë±í£¬¸Ã¹¥»÷»î¶¯ÓëÒ»Äêǰ³öÏÖµÄLumma StealerÀàËÆ£¬´«²¼¶àÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ÈçPrivateLoader¡¢MarsStealerµÈ¡£¹¥»÷ÕßÀÄÓÃÈËÃǶÔYouTubeºÍÎļþ¹²Ïí·þÎñµÄÐÅÀµ£¬ÓÈÆäÓ°ÏìÄÇЩѰÕÒµÁ°æÈí¼þµÄÓû§¡£ÎªÁË·ÀÓùÕâЩ¹¥»÷£¬×éÖ¯»ú¹¹Ó¦Ïàʶµ±Ç°Íþв£¬Î¬³Ö¾¯Ì裬²¢Ìá¸ßÔ±¹¤°²È«Òâʶ¡£
https://www.darkreading.com/threat-intelligence/cyberattackers-infostealers-youtube-comments-google-search
2. Fortinet·À»ðǽÔâ´ó¹æÄ£ÁãÈÕ·ì϶¹¥»÷
1ÔÂ14ÈÕ£¬È¥Äê12Ô£¬°²È«×êÑÐÈËÔ±¹Û²ìµ½Õë¶ÔFortinet·À»ðǽµÄ´ó¹æÄ£¹¥»÷»î¶¯£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÁËÉÐ佨²¹µÄÁãÈÕ·ì϶¡£ÕâЩ¹¥»÷µ¼ÖÂÊý°Ùµ½Êýǧ´Î¶ñÒâµÇ¼ÊÂÎñ£¬¹¥»÷Õßͨ¹ýÖÎÀí½çÃæ»ñµÃ½Ó¼ûȨÏÞ£¬²¢Åú¸ÄÁË·À»ðǽÅäÖã¬Ê¹ÓÃSSL VPNËí·ά³ÖÏνӣ¬ÇÔȡƾ֤ÒÔÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒÆ¶¯¡£Ö»¹Ü¾ßÌåϸ½ÚÈÔÔÚµ÷²éÖУ¬µ«±±¼«Àdz¢ÊÔÊҸ߶ÈÈ·ÐÅÁãÈÕ·ì϶±»´ó¹æÄ£ÀûÓá£ÊÜÓ°ÏìµÄ¹Ì¼þ°æ±¾Ô̺¬7.0.14ÖÁ7.0.16¡£¹¥»÷Õß»¹¿í·ºÊ¹ÓÃÁËÉ豸µÄ»ùÓÚWebµÄºÅÁîÐнçÃæ£¬²¢ÓëÒì³£Ô´IPµØÖ·³ÉÁ¢ÁË¿ÉÒÉÏνӡ£ÕâЩ¹¥»÷´Ó11ÔÂÖÐÑ®ÆðÍ·£¬µ«Ö±µ½12Ô²ŲúÉú´ó¹æÄ£·À»ðǽÅäÖøü¸Ä¡£¹¥»÷Õß´´½¨ÁËеij¬µÈÖÎÀíÔ¹ØË»§£¬´ò¿ªÁ˱¾µØÓû§ÕË»§£¬²¢½«ËüÃÇÔö³¤µ½ÓµÓÐVPN½Ó¼ûȨÏÞµÄ×éÖУ¬»òÕß½Ù³ÖÏÖÓÐÕË»§¡£ËûÃÇ»¹´´½¨ÁËеÄSSL VPNÃÅ»§£¬²¢½«Óû§ÕË»§Ö±½ÓÔö³¤µ½ÕâЩÃÅ»§ÖС£Ò»µ©³ÉÁ¢ÁËSSL VPNËí·£¬¹¥»÷Õ߾ͻáÍøÂçÍ´´¦½øÐкáÏòÒÆ¶¯£¬²¢Ê¹ÓÃÁËKali Linux¹¤¾ß¡£Ö»¹ÜÎÞ·¨È·¶¨¹¥»÷ÕßµÄ×îÖÕÖ¸±ê£¬µ«ÀÕË÷Èí¼þµÄ¿ÉÄÜÐÔ²¢²»ÄÜÅųý¡£
https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/
3. 5000¸öWordPressÍøÕ¾ÔâÐÂÐͶñÒâÈí¼þÈëÇÖ
1ÔÂ14ÈÕ£¬Ò»ÖÖÐÂÐͶñÒâÈí¼þ»î¶¯Òѳɹ¦ÈëÇÖ³¬¹ý5000¸öWordPressÍøÕ¾£¬ÆäÖØÒªÖ÷ÕÅΪ´´½¨ÖÎÀíÔ¹ØÊ»§¡¢×°ÖöñÒâ²å¼þ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£Webscript°²È«¹«Ë¾c/sideµÄ×êÑÐÈËÔ±ÔÚ¶Ô¿Í»§ÊÂÎñÏìÓ¦Öз¢ÏÖ£¬ÕâЩ¶ñÒâ»î¶¯ÀûÓÃÁËwp3[.]xyzÓòÃû½øÐÐÊý¾ÝÇÔÈ¡£¬µ«¾ßÌåµÄ³õʼϰȾõè¾¶ÉÐδÃ÷È·¡£Ò»µ©¹¥»÷µÃÊÖ£¬¶ñÒâ¾ç±¾±ã»á´Ówp3[.]xyz¼ÓÔØ£¬²¢ÀûÓÃÔ¤ÉèÍ´´¦´´½¨ÃûΪwpx_adminµÄ¶ñÒâÖÎÀíÔ¹ØÊ»§¡£Ëæºó£¬¸Ã¾ç±¾»á´ÓͳһÓòÃûÏÂÔØ²¢¼¤»îÒ»¸ö¶ñÒâ²å¼þ£¨plugin.php£©£¬¸Ã²å¼þÖ¼ÔÚÍøÂçÖÎÀíԱʹ´¦¡¢ÈÕÖ¾µÈÃô¸ÐÐÅÏ¢£¬²¢ÒÔ»ìºÏ·½Ê½½«Æä¼Ù×°³ÉͼÏñÒªÇó·¢ËÍÖÁ¹¥»÷Õß·þÎñÆ÷¡£´Ë±í£¬¹¥»÷¹ý³ÌÖл¹Ô̺¬¶à¸öÑéÖ¤²½Ö裬Èç¼Í¼¶ñÒâÖÎÀíÔ¹ØÊ»§´´½¨×´Ì¬¼°ÑéÖ¤¶ñÒâ²å¼þ×°Öõȡ£Îª×èÖ¹´ËÀ๥»÷£¬c/side½¨ÒéÍøÕ¾ËùÓÐÕßÀûÓ÷À»ðǽºÍ°²È«¹¤¾ß¹Ø±Õwp3[.]xyzÓòÃû¡£Í¬Ê±£¬ÖÎÀíÔ±Ó¦¶¨ÆÚ²é³ÌØÈ¨ÕÊ»§ºÍÒÑ×°Öòå¼þÁÐ±í£¬ÊµÊ±¼ø±ð²¢É¾³ýδ¾ÊÚȨµÄ»î¶¯¡£´Ë±í£¬¼ÓÇ¿WordPressÍøÕ¾µÄCSRF±£»¤Ò²ÖÁ¹Ø³ÁÒª£¬Ö´Ðжà³É·ÖÉí·ÝÑéÖ¤»¹¿ÉΪÒÑй¶ƾ֤µÄÕÊ»§Ìṩ¶î±í±£»¤¡£
https://www.bleepingcomputer.com/news/security/wp3xyz-malware-attacks-add-rogue-admins-to-5-000-plus-wordpress-sites/
4. Google OAuth·ì϶£ºÒѵ¹¹Ø²Ý´´¹«Ë¾ÓòÃû³É¹¥»÷ÕßÐÂÖ¸±ê
1ÔÂ14ÈÕ£¬GoogleµÄOAuthµÇ¼ְÄÜ´æÔÚÒ»¸ö³Á´ó°²È«Òþ»¼£¬¿ÉÄܱ»¹¥»÷ÕßÀûÓÃÀ´½Ó¼ûǰԱ¹¤ÔÚSaaSƽ̨ÉϵÄÃô¸ÐÊý¾Ý¡£ÕâÒ»·ì϶ÓÉTrufflesecurity×êÑÐÈËÔ±·¢ÏÖ£¬²¢Ïò¹È¸è»ã±¨£¬µ«×î³õ²¢Î´µÃµ½×ã¹»Æ÷³Á¡£Ö»¹Ü¹È¸èºóÀ´Ïò×êÑÐÈËÔ±Ðû¸æÁËÉͽ𲢳ÁпªÆôÁ˵÷²é£¬µ«½ØÖÁĿǰ£¬¸ÃÎÊÌâÈÔδµÃµ½½â¾ö¡£¹¥»÷ÕßÄܹ»Í¨¹ý×¢²áÒѵ¹¹Ø²Ý´´¹«Ë¾µÄÓòÃû£¬²¢ÀûÓÃÕâЩÓòÃûΪǰ¹ÍÔ±³Áд´½¨µç×ÓÓʼþÕÊ»§£¬´Ó¶ø½Ó¼ûËûÃÇÔÚSlack¡¢Notion¡¢Zoom¡¢ChatGPTµÈ·þÎñÉϵÄÕË»§¡£×êÑÐÈËÔ±·¢ÏÖ£¬Í¨¹ý²É°ìÒÑÍ£ÓõÄÓòÃû£¬¹¥»÷ÕßÄܹ»´ÓÈËÁ¦×ÊԴϵͳÖÐÌáÈ¡Ãô¸ÐÊý¾Ý£¬²¢µÇ¼¸÷Àà·þÎñ¡£Õâ¸öÎÊÌâÓ°ÏìÁËÊý°ÙÍòÈ˺ÍÊýǧ¼Ò¹«Ë¾£¬²¢ÇÒËæ×Ź¦·òµÄÍÆÒÆ£¬ÎÊÌâÖ»»á±äµÃÔ½À´Ô½ÑϳÁ¡£ÓÉÓÚ´óÎÞÊý¿Æ¼¼²Ý´´¹«Ë¾×¢¶¨»áµ¹¹Ø£¬¶øËûÃÇÖеĺܶàʹÓÃGoogle WorkspacesÀ´ÊÕ·¢µç×ÓÓʼþ£¬Òò¶øËûÃǵÄÔ±¹¤Ê¹ÓÃGmailÕÊ»§µÇ¼³ö²úÁ¦¹¤¾ß¡£ÎªÁË·À±¸´ËÀà·çÏÕ£¬½¨ÒéÍÑÀë²Ý´´¹«Ë¾Ê±´ÓÕÊ»§ÖÐɾ³ýÃô¸ÐÊý¾Ý£¬²¢Ô¤·ÀʹÓù¤×÷ÕÊ»§½øÐÐÓ×ÎÒÕÊ»§×¢²á¡£
https://www.bleepingcomputer.com/news/security/google-oauth-flaw-lets-attackers-gain-access-to-abandoned-accounts/
5. MIGÔâBlack BastaÀÕË÷Èí¼þ¹¥»÷£¬´óÁ¿¿Í»§ÐÅϢй¶
1ÔÂ14ÈÕ£¬ÃÀ¹ú¶«Äϲ¿×î´óµÄµÖѺ´û¿î»ú¹¹Ö®Ò»£¬×ܲ¿Î»ÓÚÌïÄÉÎ÷ÖݵĵÖѺ´û¿îͶ×ÊÕß¼¯ÍÅ£¨MIG£©ÉϸöÔÂÔâ·êÁËÒ»´ÎÍøÂ簲ȫÊÂÎñ£¬µ¼Ö´óÁ¿¿Í»§ÐÅÏ¢¿ÉÄÜй¶¡£MIGδй©¾ßÌåÊÜÓ°Ïì¿Í»§ÊýÁ¿£¬µ«ÒÑÀñƸ¹©¸øÉ̼ø±ðÊÜÓ°ÏìµÄÓ×ÎÒ£¬²¢´òËãÔÚ¼¸ÖÜÄÚʵÏÖ֪ͨ¹¤×÷¡£¾ÝMIGÍøÕ¾Í¨Öª£¬Õâ´ÎÍøÂç¹¥»÷ʼÓÚ12ÔÂ11ÈÕ£¬²¢ÓÚ´ÎÈÕ±»·¢ÏÖ£¬Ò»Ãûδ¾ÊÚȨµÄÓû§½øÈëÁËMIGµÄÍÆËã»ú»·¾³£¬µ¼Ö¶àÃûÓ×ÎÒµÄÃô¸ÐÓ×ÎÒÐÅÏ¢±»Ð¹Â¶¡£Õâ´Î¹¥»÷ÓÉBlack BastaÀÕË÷Èí¼þÍÅ»ïÌáÒ飬¸ÃÍÅ»ïÊÇĿǰ×î³ôÃûÔ¶ÑïµÄºÚ¿Í×éÖ¯Ö®Ò»£¬ÔøÏ®»÷¹ýÈ«ÇòÖÁÉÙ500¸ö×éÖ¯£¬²¢¶Ô×¼ÁË16¸ö¹Ø¼ü»ù´¡ÉèÊ©²¿ÃÅÖеÄ12¸ö¡£½üÄêÀ´£¬ÀÕË÷Èí¼þÍÅ»ïÿÿ½«Ö¸±ê¶Ô׼ɿ¼°×¡·¿ÐÐÒµµÄ½ðÈÚ»ú¹¹£¬ÒÑÓжà¼Ò´ó¹«Ë¾Ôâ·ê¹¥»÷£¬µ¼ÖÂס·¿²É°ìÅö±Ú¡£
https://therecord.media/tennessee-mortgage-lender-confirms-cyberattack
6. Î÷ºÚÎĵ±¾ÖITϵͳÔâÍøÂç¹¥»÷£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÕƹÜ
1ÔÂ14ÈÕ£¬¿µÄùµÒ¸ñÖÝÎ÷ºÚÎÄÊе±¾ÖÔÚµ÷²éһ·µ¼ÖÂÆäËùÓÐITϵÍÂäÙʱ¹Ø¹ØµÄÍøÂç¹¥»÷ÊÂÎñ¡£Ê㤶àÁմ²©À×¶ûÔÚ1ÔÂ11ÈÕ°µÊ¾£¬ÕâÆð¡°ITϵͳ°²È«±äÂÒ¡±ÒÔÖÁµ±¾Öϵͳ¹Ø¹Ø£¬¶øµ±¾Ö×î³õÔÚ12ÔÂ26ÈÕÓÚFacebookÉϽöÌá¼°Ôâ·ê¡°ÍøÂçÖжϡ±¡£Ä¿Ç°£¬¸ÃÊÐÈÔÔÚÆÀ¹ÀÄÄЩÊý¾Ý¿ÉÄÜÊܵ½Õâ´ÎÊÂÎñµÄÓ°Ï죬µ«ÒѳÉÁ¢Ó¦¶ÔͨÀýºÍ×ÜÌå³ï±¸£¬ÊÜÓ°ÏìϵͳÒÑÓб¸·Ý£¬Ô¤¼Æ¼¸ÌìÄڿɸ´ÔÔËÐС£Ö»¹ÜÓÐÆÀÂÛÒªÇóÈ·ÈÏÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬µ«Î÷ºÚÎÄÊÐδÓè»ØÓ¦¡£È»¶ø£¬1ÔÂ11ÈÕ£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¸Ã×éÖ¯Ôø¹¥»÷ѪҺ¼ì²â¾ÞÍ·Synnovis£¬µ¼ÖÂ100ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶¼°1100¶àÀýÊÖÊõÍÆ³Ù£¬Òý·¢¹ú¼ÊÄÕÅ¡£÷è÷ë×éÖ¯×Ô2022ÄêÆðÒÔÀÕË÷Èí¼þ¼´·þÎñ´ó¾Ö¹¥»÷ÃÀÅ·¶à¼Ò×éÖ¯£¬ÒÑÈ·ÈÏÌáÒéÖÁÉÙ25Æð¹¥»÷£¬»¹ÓÐ100¶àÆðδ¾Ö¤ÊµµÄ¹¥»÷¡£Óë´Ëͬʱ£¬ÃÀ¹ú¶à¸ö³ÇÊл㱨¼ÙÈÕÍøÂçÊÂÎñ£¬ÂíÈøÖîÈûÖݲ®¶÷ÕòÒ²ÓÚ1ÔÂ11Èջ㱨ÆäITÍøÂçÔâÈëÇÖ¡£
https://therecord.media/west-haven-connecticut-city-government-cyberattack


¾©¹«Íø°²±¸11010802024551ºÅ