¾¯ÌèBitB´¹µöÐÂÍþв£ºFacebookÓû§°²È«Ö¸ÄÏ
°ä²¼¹¦·ò 2026-01-131. ¾¯ÌèBitB´¹µöÐÂÍþв£ºFacebookÓû§°²È«Ö¸ÄÏ
1ÔÂ12ÈÕ£¬´ÓǰÁù¸öÔ£¬ºÚ¿ÍƵÈÔÀûÓÃä¯ÀÀÆ÷ÄÚä¯ÀÀÆ÷£¨BitB£©¼¼Êõ¶ÔFacebookÓû§ÌáÒé´¹µö¹¥»÷£¬¸Ã¼¼ÊõÓɰ²È«×êÑÐÔ±mr.d0xÓÚ2022Ä꿪·¢£¬ºó±»ÍøÂç·¸×ï·Ö×ÓÀ©´óÖÁSteamµÈƽ̨¡£Trellix×êÑÐÈËÔ±·¢ÏÖ£¬¹¥»÷Õßͨ¹ýαÔìÂÉʦÊÂÎñËù֪ͨ¡¢°æÈ¨ÇÖȨÖÒ¸æ»òMeta°²È«ÌáÐÑ£¬ÓÕµ¼Óû§µã»÷Ô̺¬ÐéαµÇ¼±íµ¥µÄµ¯³ö´°¿Ú¡£´ËÀà´°¿ÚÀûÓÃiframe¼¼Êõ·ÂÕÕ¹Ù·½ÈÏÖ¤½çÃæ£¬²¢Í¨¹ý×Ô½ç˵´°¿Ú±êÌâºÍURL¼ÓÇ¿ºýŪÐÔ£¬ÉõÖÁ²ÎÓëËõ¶ÌURLºÍÐéαMetaCAPTCHAÒ³ÃæÒÔ¶ã±Ü¼ì²â¡£¹¥»÷Á÷³ÌÖУ¬Êܺ¦Õß»áÔÚ¹¥»÷Õß½ÚÔìµÄÍøÒ³ÉÏ¿´µ½¿´ËƺϷ¨µÄä¯ÀÀÆ÷µ¯³ö´°¿Ú£¬ÒªÇóÊäÈëFacebookÍ´´¦¡£ÓÉÓÚiframeÓëµ×²ã´°¿Ú°ó¶¨£¬Óû§ÎÞ·¨½«ÆäÍϳöä¯ÀÀÆ÷´°¿Ú£¬ÕâÊǼø±ðBitB¹¥»÷µÄ¹Ø¼üÌØµã¡£×êÑÐÖ¸³ö£¬´óÁ¿´¹µöÒ³ÃæÍйÜÔÚNetlify¡¢VercelµÈºÏ·¨ÔÆÆ½Ì¨£¬¼Ù×°³ÉMetaÒþÖÔÖÐÐÄ»òÉêÊö±íµ¥£¬ÍøÂçÓû§Ó×ÎÒÐÅÏ¢¡£Ó봫ͳ´¹µöÏà±È£¬ÕâÖÖÊÖ·¨Í¨¹ýÀÄÓÃÊÜÐÅÀµµÄ»ù´¡ÉèÊ©ÈÆ¹ý°²È«¹ýÂËÆ÷£¬ÓªÔìÐéα°²È«¸Ð¡£
https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/
2. CISA´¹Î£ºÅÁ²¹Òѱ»ÀûÓõÄGogs¸ßΣ·ì϶
1ÔÂ12ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÒÑÒªÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅÔÚ2026Äê2ÔÂ2ÈÕǰ½¨²¹Gogs¸ßΣ·ì϶CVE-2025-8110¡£¸Ã·ì϶ԴÓÚPutContents APIµÄõè¾¶±éÀúȱµã£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷Õßͨ¹ý·ûºÅÁ´½Ó¸²¸Ç´æ´¢¿â±í²¿Îļþ£¬Èƹý´Ëǰ½¨¸´µÄCVE-2024-55947±£»¤´ëÊ©£¬½ø¶øÍ¨¹ýÅú¸ÄGitÅäÖÃÎļþ£¨ÈçsshCommand£©Ö´ÐÐËÁÒâºÅÁ×é³ÉÁãÈÕ¹¥»÷·çÏÕ¡£Gogs×÷ΪGo˵»°±àдµÄÇáÁ¿¼¶Git·þÎñ´úÌæ¹æ»®£¬³£ÓÃÓÚÔ¶³ÌºÏ×÷£¬µ«ÆäÊ¢¿ªÐÔʹÆä³ÉΪ¹¥»÷Ö¸±ê¡£Wiz ResearchÔÚ7Ôµ÷²é¿Í»§Gogs·þÎñÆ÷¶ñÒâÈí¼þϰȾʱ·¢Ïָ÷ì϶£¬²¢ÓÚ7ÔÂ17Èջ㱨£¬10ÔÂ30ÈÕ»ñGogsÈ·ÈÏ£¬ÉÏÖܰ䲼²¹¶¡¡£È»¶ø£¬11ÔÂ1ÈÕ¼´³öÏÖµÚ¶þ²¨ÁãÈÕ¹¥»÷¡£µ÷²éÏÔʾ£¬³¬1400̨Gogs·þÎñÆ÷¶³öÓÚ»¥ÁªÍø£¬ÆäÖÐ1250̨ÈԿɽӼû£¬700¸öÊ·ýÏÔʾ±»ÈëÇÖ¼£Ïó¡£CISAÒѽ«CVE-2025-8110ÁÐÈë¡°ÒÑÀûÓ÷ì϶Ŀ¼¡±£¬Ç¿µ÷´ËÀà·ì϶ÊǶñÒâÍøÂç¹¥»÷Õߵij£ÓÃõè¾¶£¬´ºÁª¹ú»ú¹¹×é³É³Á´ó·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/
3. TargetµÄ¿ª·¢·þÎñÆ÷ÔÚºÚ¿ÍÐû³ÆÇÔȡԴ´úÂëºóÀëÏß
1ÔÂ12ÈÕ£¬½üÈÕ£¬ºÚ¿ÍÔÚGiteaƽ̨°ä²¼¶à¸öÒÉËÆTarget¹«Ë¾ÄÚ²¿´úÂë¿âµÄÑù±¾£¬²¢Ðû³ÆÕýͨ¹ýµØÏÂÂÛ̳ÏúÊÛÆëÈ«Êý¾Ý¼¯¡£ÊÂÎñÆðÒòÓÚÉÏÖÜÒ»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÔÚGitea´´½¨´úÂë²Ö¿â£¬Ô̺¬Target²¿ÃÅÄÚ²¿´úÂë¡¢¿ª·¢ÕßÎĵµ¼°ÃûΪSALE.MDµÄÎļþ¡£¸ÃÎļþÏÔʾÆëÈ«Êý¾Ý¼¯Ô̺¬³¬5.7ÍòÐÐĿ¼ÁÐ±í£¬×ÜÈÝÁ¿Ô¼860GB£¬Éæ¼°"Ç®°ü·þÎñÉøÈë²âÊÔ""TargetIDM-TAPProvisioningAPI"µÈÃô¸ÐÏîÄ¿£¬ÇÒÌá½»ÔªÊý¾ÝÌá¼°¶àλTargetÏÖÈÎÊ×ϯ¹¤³ÌʦÐÕÃû¼°ÄÚ²¿API¶Ëµã£¨Èçconfluence.target.com£©£¬°µÊ¾Êý¾ÝÔ´×Ô˽Óпª·¢»ù´¡ÉèÊ©¡£TargetµÄGit·þÎñÆ÷£¨git.target.com£©ÒÑÎÞ·¨´Ó»¥ÁªÍø½Ó¼û£¬´Ëǰ¸ÃÓòÃûÔø³Á¶¨ÏòÖÁÔ±¹¤µÇÂ¼Ò³Ãæ£¬µ«ÏÖÒÑÆëȫ崻ú¡£ºÚ¿Í°ä²¼µÄGitea²Ö¿âÔÚýÌåÁªÏµTargetºó±»É¾³ý£¬·µ»Ø404ÃýÎó£¬ÓëϼÜÒªÇóÒ»Ö¡£ËÑË÷ÒýÇæ»º´æ¼Í¼ÏÔʾ£¬git.target.com²¿ÃÅ×ÊÔ´Ôø±»Ë÷Òý£¬µ«ÎÞ·¨È·ÈÏÊÇ·ñÓë½üÆÚ¶³öÊÂÎñÖ±½ÓÓйء£
https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/
4. Î÷°àÑÀÄÜÔ´¾ÞÍ·EndesaÅû¶Êý¾Ýй¶ÊÂÎñ
1ÔÂ12ÈÕ£¬Î÷°àÑÀ×î´óÄÜÔ´¹©¸øÉÌEndesa¼°ÆäÔËÓªÉÌEnerg¨ªa XXI½üÈÕÅû¶³Á´ó°²È«ÊÂÎñ£ººÚ¿Íͨ¹ý·¸·¨½Ó¼ûÆäóÒׯ½Ì¨£¬ÇÔÈ¡ÁËÓë¿Í»§ÄÜÔ´ºÏͬÓйصÄÃô¸ÐÓ×ÎÒÐÅÏ¢¡£×÷ΪEnel¼¯ÍÅÆìÏÂÆóÒµ£¬EndesaÔÚÎ÷°àÑÀºÍÆÏÌÑÑÀÕ¼Óг¬1000ÍòÓû§£¬×ܿͻ§»ùÊýÔ¼2200Íò¡£Õâ´Îй¶µÄÊý¾ÝÀàÐÍÔ̺¬»ù×ÔÉí·ÝÐÅÏ¢¡¢ÁªÏµÐÅÏ¢¡¢¹úÃñÉí·ÝÖ¤ºÅÂ루DNI£©¡¢ºÏͬÏêÇé¼°¸¶¿îÐÅÏ¢£¨ÈçIBANÕ˺ţ©£¬µ«¹«Ë¾Ç¿µ÷ÕË»§ÃÜÂëδ±»²¨¼°¡£ÊÂÎñ²úÉúºó£¬EndesaѸ¿ì²ÉÈ¡¶àÏî·À»¤´ëÊ©£º¹Ø±ÕÊÜÓ°ÏìÄÚ²¿ÕË»§¡¢µ¼³öÈÕÖ¾½øÐм¼Êõ·ÖÎö¡¢¼Óǿϵͳ¼à¿ØÒÔ¼ì²âºóÐø¿ÉÒɻ£¬²¢Í¬²½ÏòÎ÷°àÑÀÊý¾Ý±£»¤¾Ö¼°Óйؼà¹Ü»ú¹¹»ã±¨¡£¹«Ë¾Í¨¹ýÕýʽÇþ·֪ͨËùÓÐÊÜÓ°Ïì¿Í»§£¬²¢ÌáÐÑÓû§¾¯ÌèÉí·ÝðÓá¢Êý¾Ý͵ÇÔ¼°ÍøÂç´¹µö¹¥»÷·çÏÕ£¬½¨Ò齫¿ÉÒɻ»ã±¨ÖÁÖ¸¶¨ºÅÂë¡£EndesaÉêÃ÷³Æ£¬½ØÖÁĿǰÎÞÖ¤¾ÝÏÔʾй¶Êý¾ÝÒѱ»Ú²ÆÊ¹Óã¬Òò¶ø¶ÔÓû§È¨ÊƺÍ×ÔÓÉ×é³É¸ß·çÏյĿÉÄÜÐԽϵ͡£
https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/
5. APT28³ÖÐø·¢Õ¹µÍ³É±¾Æ¾Ö¤ÇÔÈ¡»î¶¯
1ÔÂ12ÈÕ£¬Óë¶íÂÞ˹¹ØÁªµÄAPT28×éÖ¯£¨±ðºÅFancy Bear¡¢BlueDeltaµÈ£©2025Äê2ÔÂÖÁ9Ô³ÖÐø·¢Õ¹µÍ³É±¾Æ¾Ö¤ÇÔÈ¡»î¶¯£¬Ö¸±êº¸ÇÍÁ¶úÆäÄÜÔ´ºÍºËÄÜ»ú¹¹¡¢Å·ÖÞÖǿ⡢±±ÂíÆä¶Ù¼°ÎÚ×ȱð¿Ë˹̹×éÖ¯£¬·´Ó³Æä¶ÔÄÜÔ´¡¢¹ú·À¡¢µ±¾ÖÁìÓòµÄ³ÖÐø¹Ø×¢£¬Óë¶íÂÞ˹µý±¨³Áµã¸ß¶È·ûºÏ¡£¸Ã×é֯ѡȡ¡°ÇøÓò¶¨Ôìµö¶ü+µÍ³É±¾»ù´¡ÉèÊ©¡±Õ½Êõ£ºÍ¨¹ý·ÂÕÕMicrosoft OWA¡¢Google¡¢Sophos VPNµÄÐéαµÇÂ¼Ò³ÃæÇÔȡʹ´¦£¬²¢ÀûÓÃWebhook.site¡¢InfinityFree¡¢Byet Internet Services¡¢ngrokµÈÃâ·ÑÍйܺÍËí··þÎñÍйܴ¹µöÒ³Ãæ¡¢Ð¹Â¶Êý¾Ý¼°ÊµÏÖ³Á¶¨Ïò¡£ÀýÈ磬6Ô²¿ÊðµÄSophos VPNÃÜÂë³ÁÖÃÒ³ÃæÍ¨¹ýJavaScriptÌáÈ¡URL±êʶ·û²¢·¢ËÍÖÁ¹¥»÷Õß½ÚÔì¶Ë£¬×îÖÕ³Á¶¨ÏòÖÁºÏ·¨VPNÃÅ»§£»9ÔÂÔòÀûÓÃInfinityFreeÍйܵÄOWA¹ýÆÚÃÜÂëÒ³Ãæ£¬½«Êܺ¦Õßµ¼Ïò±±ÂíÆä¶Ù¾üÊÂ×éÖ¯¼°ÎÚ×ȱð¿Ë˹̹IT¹«Ë¾µÄºÏ·¨µÇÂ¼Ò³Ãæ¡£´Ë±í£¬¹¥»÷ÕßǶÈ뺣Íå×êÑÐÖÐÐÄ¡¢ECCOµÈ¿ÉÐÅÖÇ¿âµÄºÏ·¨PDFµö¶ü£¬ÏÈÊèµ¼Óû§µã»÷£¬ÔÙÏÔʾαÔìµÇÂ¼Ò³Ãæ£¬Í¨¹ý°µ²ØHTML±íµ¥ºÍJavaScriptÐűêÇÔÈ¡ÓÊÏä¡¢ÃÜÂë¡¢IP¼°Óû§´úÀíÐÅÏ¢£¬×îºó³Á¶¨Ïò»ØÕæÊµPDF£¬¼ÓÇ¿ºýŪÐÔ¡£
https://securityaffairs.com/186801/apt/credential-harvesting-attacks-by-apt28-hit-turkish-european-and-central-asian-organizations.html
6. ÒÁÀÊMuddyWaterÓÃRustyWaterÌáÒé´¹µö¹¥»÷
1ÔÂ10ÈÕ£¬½üÈÕ£¬±»³ÆÎªMuddyWaterµÄÒÁÀʺڿÍ×éÖ¯±»Ö¸Õë¶ÔÖж«µØÓò±í½»¡¢º£Ê¡¢½ðÈÚ¼°µçÐÅʵÌå·¢ÆðÓã²æÊ½´¹µö¹¥»÷£¬ÆäʹÓûùÓÚRust˵»°¿ª·¢¡¢´úºÅΪRustyWaterµÄÖ²È뷨ʽִÐÐÈëÇÖ¡£CloudSEK×êÑÐÔ±Prajwal AwasthiÔڻ㱨ÖÐÖ¸³ö£¬¹¥»÷ͨ¹ý¼Ù×°³ÉÍøÂ簲ȫָÄϵĴ¹µöÓʼþ¸½´ø¶ñÒâWordÎĵµ£¬ÓÕµ¼Êܺ¦Õ߯ôÓÃÄÚÈݺ󼤻îVBAºê£¬½ø¶ø²¿ÊðRustyWater·¨Ê½¡£¸ÃÖ²È뷨ʽ¾ß±¸Òì²½ºÅÁîÓë½ÚÔ죨C2£©Í¨Ñ¶¡¢·´·ÖÎö¼ì²â¡¢Í¨¹ýWindows×¢²á±íʵÏÖÓÆ¾Ã»¯¼°Ä£¿é»¯À©´óÄÜÁ¦£¬¿ÉÍøÂçÍÆËã»úÐÅÏ¢¡¢¼ì²â°²È«Èí¼þ£¬²¢ÓëC2·þÎñÆ÷³ÉÁ¢ÁªÏµÒÔÖ´ÐÐÎļþ²Ù×÷ºÍºÅÁî¡£Õâ´Î¹¥»÷±ê־ȡMuddyWater¹¥»÷ÊÖ·¨µÄ³ÖÐøÑݱ䡣¸Ã×éÖ¯×Ô2017ÄêÆð±»ÆÀ¹À´ÓÊôÓÚÒÁÀʵý±¨Ó밲ȫÊý£¬½üÄêÀ´Öð²½Ï÷¼õ¶ÔºÏ·¨Ô¶³Ì½Ó¼ûÈí¼þµÄÒÀÀµ£¬×ª¶øÑ¡È¡¶àÑù»¯¶¨Ôì¶ñÒâÈí¼þ¿â£¬Ô̺¬Phoenix¡¢UDPGangster¡¢BugSleepºÍMuddyViperµÈ¹¤¾ß¡£Õâ´ÎÒýÈëRust˵»°¿ª·¢µÄÖ²È뷨ʽ£¬½øÒ»²½ÌåÏÖÁËÆä¹¤¾ßÁ´Ïò¸ü½á¹¹»¯¡¢Ä£¿é»¯ºÍµÍÔëÉùµÄÔ¶³Ì½Ó¼ûľÂíÄÜÁ¦Ñݽø¡£
https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html


¾©¹«Íø°²±¸11010802024551ºÅ