Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ

Ðû²¼Ê±¼ä 2025-01-02

1. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ


1ÔÂ1ÈÕ£¬£¬£¬£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒÑÔ£¬£¬£¬£¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£©¡£¡£¡£¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ°¡£¡£¡£¡£¾Ý0mid16BÉù³Æ£¬£¬£¬£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto£¬£¬£¬£¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÀ¨24ÍòÓà·Ýº¬ÏêϸСÎÒ˽¼ÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý£¬£¬£¬£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â¡£¡£¡£¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý£¬£¬£¬£¬ÏÔʾ±»»á¼ûµÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB¡£¡£¡£¡£0mid16BÌåÏÖ£¬£¬£¬£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto£¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´ÔöÇ¿±£»£»£»£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð£¬£¬£¬£¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷¡£¡£¡£¡£¾ÝTrustPilotÉϵÄ̸ÂÛÏÔʾ£¬£¬£¬£¬DEphotoÒÑ×îÏÈÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ£¬£¬£¬£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£´æÕþ²ßÌåÏÖ²»Âú£¬£¬£¬£¬ÒÔΪÆä±£´æÊý¾Ýʱ¼ä¹ý³¤¡£¡£¡£¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£¡£¡£¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â£¬£¬£¬£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí¡£¡£¡£¡£


https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/


2. EC2 Grouper£ºÊ¹ÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½ÂÔ


1ÔÂ1ÈÕ£¬£¬£¬£¬FortiGuardʵÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯£¬£¬£¬£¬¸Ã×é֯ƵÈÔʹÓÃAWS¹¤¾ßºÍÊÜËðƾ֤¾ÙÐй¥»÷¡£¡£¡£¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐÓÃÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤£¬£¬£¬£¬²¢Ê¹ÓÃAPI¾ÙÐÐÕì̽ºÍ×ÊÔ´½¨É裬£¬£¬£¬×èÖ¹ÊÖ¶¯»î¶¯¡£¡£¡£¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§ÇéÐÎÖз¢Ã÷ÁËÆäÆæÒìµÄÓû§ÊðÀíºÍÇå¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷£¬£¬£¬£¬µ«ÕâЩָ±ê¹ØÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»¿É¿¿£¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬Í¨Ì«¹ýÎöƾ֤й¶ºÍAPIʹÓõÈÐźÅ£¬£¬£¬£¬Çå¾²ÍŶӿÉÒÔÖÆ¶©¿É¿¿µÄ¼ì²âÕ½ÂÔÀ´µÖÓù´ËÀ๥»÷¡£¡£¡£¡£ÎªÁËÈ·±£Çå¾²£¬£¬£¬£¬×é֯ӦʹÓÃÔÆÇå¾²Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ßÒ»Á¬¼à¿ØºÍÆÀ¹ÀÔÆÇéÐεÄÇå¾²Ì¬ÊÆ£¬£¬£¬£¬²¢ÊµÑéÒì³£¼ì²âÊÖÒÕÀ´Ê¶±ðÔÆÇéÐÎÖеÄÒì³£ÐÐΪ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄʹÓÃAWS»ù´¡ÉèÊ©¾ÙÐй¥»÷£¬£¬£¬£¬ÕâÅú×¢ÔÆÇéÐÎÃæÁÙÒ»Á¬µÄÇå¾²Íþв¡£¡£¡£¡£


https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/


3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬Êý¾Ýй¶ÖÁ°µÍø


12ÔÂ31ÈÕ£¬£¬£¬£¬Â޵µºÖÝÒ½Áƺ͸£ÀûÍýÏëϵͳÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÒѽ«²¿·ÖÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ¡£¡£¡£¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ£¬£¬£¬£¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸£¬£¬£¬£¬²¢ÒÑÖÆ¶©ÍâÁªÕ½ÂÔ£¬£¬£¬£¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄסÃñ±£»£»£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÄÄЩÎļþ±»Ð¹Â¶£¬£¬£¬£¬ITÍŶÓÕýÔÚÆÊÎö¡£¡£¡£¡£ÈÏÕæ½¨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸·¨·Ö×ÓÈ¡µÃÁªÏµ£¬£¬£¬£¬²¢ÓëÖÝÕþ¸®ÏàÖúÁгöÊÜÓ°ÏìÖ°Ô±Ãûµ¥£¬£¬£¬£¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÔõÑù»ñµÃÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£ÊÜÓ°ÏìµÄÖÝÍýÏë°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏëµÈ¡£¡£¡£¡£Âó»ù±Þ²ßסÃñ½ÓÄÉһϵÁв½·¥±£»£»£»£»¤²ÆÎñÐÅÏ¢£¬£¬£¬£¬ÈçÁªÏµÐÅÓñ¨¸æ»ú¹¹¶³½áÐÅÓá¢ÉèÖÃڲƭ¾¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬²¢Ð¡ÐÄÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£¡£¡£¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС¡£¡£¡£¡£


https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/


4. Õ¹ÏÖºÚ¿ÍÔõÑùÐ®ÖÆ 35 ¸ö Google Chrome À©Õ¹³ÌÐò


12ÔÂ31ÈÕ£¬£¬£¬£¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹³ÌÐò¿ª·¢Ö°Ô±µÄÍøÂç´¹Âڻ¿ËÈÕ±»ÆØ¹â£¬£¬£¬£¬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹³ÌÐò±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂ룬£¬£¬£¬Ó°ÏìÔ¼260ÍòÓû§£¬£¬£¬£¬ÆäÖаüÀ¨ÍøÂçÇå¾²¹«Ë¾CyberhavenµÄÀ©Õ¹³ÌÐò¡£¡£¡£¡£»£»£»£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ£¬£¬£¬£¬µ«ÔçÆÚÏÂÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒѱ£´æ¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄ´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬Éù³ÆÀ©Õ¹³ÌÐòÎ¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß£¬£¬£¬£¬ÓÕµ¼¿ª·¢Ö°Ô±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò»á¼ûÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹³ÌÐò¡£¡£¡£¡£Ò»µ©»ñµÃ»á¼ûȨÏÞ£¬£¬£¬£¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹³ÌÐòÒÔ°üÀ¨¶ñÒâÎļþ£¬£¬£¬£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬°üÀ¨ID¡¢»á¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ÊÂÎñ¼àÌýÆ÷£¬£¬£¬£¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ£¬£¬£¬£¬ÒÔÈÆ¹ý2FA±£»£»£»£»¤²¢Ð®ÖÆÕË»§¡£¡£¡£¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶£¬£¬£¬£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϾÙÐÐÐéαÐÅÏ¢»òÍøÂç´¹Âڻ£¬£¬£¬£¬»ò½«»á¼ûȨÏÞ³öÊÛ¸øËûÈË¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/


5. GitHubÐéα¡°ÐÇÐÇ¡±ÂþÒ磺թƭÓë¶ñÒâÈí¼þ½èÊÆÈö²¥


12ÔÂ31ÈÕ£¬£¬£¬£¬GitHubÉϱ£´æÊ¹ÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌ⣬£¬£¬£¬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßÕ©Æ­ºÍ¶ñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ×ÅÃû¶È£¬£¬£¬£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£¡£¡£¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥£¬£¬£¬£¬¿ÉÓÃÓÚÕ䲨´æ´¢¿â£¬£¬£¬£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿·Ö£¬£¬£¬£¬ÍƼöÏà¹ØÄÚÈÝ¡£¡£¡£¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍЧÀÍʹÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý×ÅÃû¶È¡£¡£¡£¡£Ò»ÏîÐÂÑо¿·¢Ã÷£¬£¬£¬£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵÄ£¬£¬£¬£¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ßÆÊÎöÊý¾Ý£¬£¬£¬£¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ£¬£¬£¬£¬²¢·¢Ã÷2024ÄêÐéαÐÇÐǻ¼¤Ôö¡£¡£¡£¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ£¬£¬£¬£¬»áÏ÷ÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÈΡ£¡£¡£¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿£¬£¬£¬£¬²¢ÔÚ¿ÉÄܵÄÇéÐÎϼì²é´úÂ룬£¬£¬£¬ÒÔ×èÖ¹ÏÂÔØÓÕÆ­ÐÔµÄÈí¼þ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/


6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈ뱨¸æ


1ÔÂ1ÈÕ£¬£¬£¬£¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈ뱨¸æ¡£¡£¡£¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Ò»Á¬ÑݱäµÄÖØ´óÏÂÔØÆ÷¶ñÒâÈí¼þ£¬£¬£¬£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£¡£¡£¡£ËüÖ÷ÒªÓÃC/C++±àд£¬£¬£¬£¬Äܹ»°²ÅÅһϵÁжñÒ⹤¾ß£¬£¬£¬£¬°üÀ¨¿É½«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹³ÌÐò£¬£¬£¬£¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ»á¼û¡£¡£¡£¡£×Ô2024Äê8ÔÂÒÔÀ´£¬£¬£¬£¬LegionLoaderÈö²¥Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖóÌÐò¾ÙÐÐÈö²¥£¬£¬£¬£¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏýÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÉèÖø߶ȿɶ¨ÖÆ£¬£¬£¬£¬ÆäÓÐÓÃÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý£¬£¬£¬£¬ÈçChromeƾ֤ºÍÆäËû½âÃÜÃÜÔ¿¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬LegionLoaderͨ¹ýAPI¹¥»÷ÒÉ»óÇå¾²¹¤¾ß£¬£¬£¬£¬²¢Ê¹ÓüÓÃÜͨѶÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÁªÏµ¡£¡£¡£¡£TRAC LabsÌṩÁËÖÜÈ«µÄÈëÇÖÖ¸±êÁбí£¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ¡£¡£¡£¡£


https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/