ResecurityÃÛ¹ÞÏÝÚå½ÒÆÆÍøÂç¹¥»÷ÕæÏà

Ðû²¼Ê±¼ä 2026-01-04

1. ResecurityÃÛ¹ÞÏÝÚå½ÒÆÆÍøÂç¹¥»÷ÕæÏà


1ÔÂ3ÈÕ£¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ResecurityÓë¡°ÊèÉ¢µÄÎó²îÁÔÈË¡±£¨SLH£©ÍþвÐÐΪÕßÖ®¼äµÄ¹¥·ÀÊÂÎñÒý·¢¹Ø×¢¡£¡£ ¡£SLHÐû³ÆÒÑÀÖ³ÉÈëÇÖResecurityϵͳ²¢ÇÔȡԱ¹¤Êý¾Ý¡¢ÄÚ²¿Í¨Ñ¶¡¢ÍþвÇ鱨±¨¸æ¼°¿Í»§ÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬°üÀ¨MattermostЭ×÷ʵÀý½ØÍ¼ÏÔʾÓëPastebinµÄ¶ñÒâÄÚÈÝͨѶ£¬£¬ £¬£¬£¬£¬£¬²¢Éù³Æ´Ë´Î¹¥»÷ÊǶÔResecurityÉç»á¹¤³ÌÊֶεÄÅê»÷£¬£¬ £¬£¬£¬£¬£¬Éæ¼°ShinyHunters¡¢Lapsus$µÈ×éÖ¯¡£¡£ ¡£È»¶ø£¬£¬ £¬£¬£¬£¬£¬ShinyHunters½²»°ÈËËæºó·ñ¶¨¼ÓÈë´Ë´Î»î¶¯¡£¡£ ¡£Resecurity¶Ô´Ë»ØÓ¦³Æ£¬£¬ £¬£¬£¬£¬£¬±»¹¥»÷µÄϵͳʵΪ¾ÓÐݲÅŵÄÃÛ¹Þ£¬£¬ £¬£¬£¬£¬£¬ÓÃÓÚ¼à¿ØÍþвÐÐΪÕ߻¡£¡£ ¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬2025Äê11ÔÂ21ÈÕÊ״μì²âµ½ÍþвÐÐΪÕß̽²âÆä¹ûÕæÌ»Â¶ÏµÍ³£¬£¬ £¬£¬£¬£¬£¬ËæºóÔÚ¸ôÀëÇéÐÎÖа²ÅŰüÀ¨ÐéαÊý¾ÝµÄÃÛ¹ÞÕË»§£¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÓÉStripe APIÌìÉúµÄ28,000ÌõºÏ³ÉÏûºÄÕ߼ͼºÍ190,000ÌõºÏ³ÉÖ§¸¶ÉúÒâ¼Í¼¡£¡£ ¡£¹¥»÷ÕßÔÚ12ÔÂ12ÈÕÖÁ24ÈÕʱ´úͨ¹ý´ó×ÚסլÊðÀíIPÌìÉú³¬188,000¸öÇëÇ󣬣¬ £¬£¬£¬£¬£¬Ê±´úÒòÊðÀíÅþÁ¬¹ÊÕÏÌ»Â¶ÕæÊµIPµØµã£¬£¬ £¬£¬£¬£¬£¬Resecurity½è´ËÍøÂç¹¥»÷ÕßÕ½Êõ¡¢ÊÖÒÕ¼°»ù´¡ÉèÊ©ÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬²¢±¨¸æÖ´·¨²¿·Ö¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/


2. RondoDox½©Ê¬ÍøÂç½èReact2ShellÎó²îÌᳫȫÇò¹¥»÷


12ÔÂ31ÈÕ£¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Õ¹ÏÖ£¬£¬ £¬£¬£¬£¬£¬RondoDox½©Ê¬ÍøÂçÕýʹÓÃReact2ShellÑÏÖØÎó²î£¨CVE-2025-55182£©´ó¹æÄ£Ñ¬È¾Next.jsЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬°²ÅŶñÒâÈí¼þ¼°¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¡£¡£ ¡£¸ÃÎó²îΪδ¾­ÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬ £¬£¬£¬£¬£¬¿Éͨ¹ýµ¥¸öHTTPÇëÇó´¥·¢£¬£¬ £¬£¬£¬£¬£¬Ó°ÏìËùÓÐʵÏÖReact Server Components¡°Flight¡±Ð­ÒéµÄ¿ò¼Ü£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Next.js¡£¡£ ¡£×èÖ¹2025Äê12ÔÂ30ÈÕ£¬£¬ £¬£¬£¬£¬£¬Shadowserver»ù½ð»áÒѼì²âµ½³¬94,000¸ö̻¶ÓÚ»¥ÁªÍøµÄÒ×Êܹ¥»÷×ʲú¡£¡£ ¡£RondoDox×îÔçÓÉFortinetÓÚ2025Äê7Լͼ£¬£¬ £¬£¬£¬£¬£¬ÊÇÒ»¸öʹÓöànÌìÎó²îÌᳫȫÇò¹¥»÷µÄ´óÐͽ©Ê¬ÍøÂç¡£¡£ ¡£Æä2025ÄêÔËÓª·ÖΪÈý¸ö½×¶Î£º3ÔÂÖÁ4Ô¾ÙÐÐÕì̽ÓëÎó²î²âÊÔ£»£»£»£» £»£»£»4ÔÂÖÁ6ÔÂʵÑé×Ô¶¯»¯WebÓ¦ÓÃÎó²îʹÓ㻣»£»£» £»£»£»7ÔÂÖÁ½ñÔòתÏò´ó¹æÄ£ÎïÁªÍø½©Ê¬ÍøÂç°²ÅÅ¡£¡£ ¡£11Ô£¬£¬ £¬£¬£¬£¬£¬VulnCheck·¢Ã÷ÆäбäÖÖʹÓÃXWikiƽ̨µÄCVE-2025-24893Îó²î¡£¡£ ¡£CloudSEK±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬RondoDox×Ô12ÔÂ8ÈÕÆðɨÃè±£´æÎó²îµÄNext.jsЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬ÈýÌìºó×îÏȰ²ÅŽ©Ê¬ÍøÂç¿Í»§¶Ë£¬£¬ £¬£¬£¬£¬£¬²¢ÔÚ12ÔÂÁùÌìÄÚÌᳫ³¬40´Î¹¥»÷ʵÑ飬£¬ £¬£¬£¬£¬£¬Ã¿Ð¡Ê±Õë¶ÔLinksys¡¢WavlinkµÈÏûºÄ¼¶¼°ÆóÒµ¼¶Â·ÓÉÆ÷ÌᳫÎïÁªÍø¹¥»÷À˳±£¬£¬ £¬£¬£¬£¬£¬ÒÔÕÐļн©Ê¬½Úµã¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/rondodox-botnet-exploits-react2shell-flaw-to-breach-nextjs-servers/


3. Covenant HealthÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


1ÔÂ3ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÌìÖ÷½ÌÒ½ÁÆ»ú¹¹Covenant HealthÓÚ2025Äê5ÔÂÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂ478,188ÈËÃô¸ÐÐÅϢй¶£¬£¬ £¬£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Ò½ÁƼͼºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢¿µ½¡°ü¹ÜÐÅÏ¢¼°ÖÎÁÆÏêÇéµÈ¡£¡£ ¡£¸Ã×éÖ¯ÔÚÃåÒòÖÝ¡¢ÂíÈøÖîÈûÖÝ¡¢Ðº±²¼Ê²¶ûÖÝ¡¢±öϦ·¨ÄáÑÇÖÝ¡¢Â޵µºÖݺͷðÃÉÌØÖÝÔËÓªÈý¼ÒÒ½Ôº¼°¶à¼Ò¿µ¸´ÖÐÐÄ¡¢¸¨ÖúÉúÑÄסËùºÍÉçÇø¿µ½¡»ú¹¹¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬£¬ £¬£¬£¬£¬£¬ºÚ¿ÍÓÚ5ÔÂ18ÈÕÖÁ26ÈÕʱ´ú»á¼ûÆäITϵͳ£¬£¬ £¬£¬£¬£¬£¬ÊÂÎñÒÑÓÚ12ÔÂ10ÈÕÊӲ쿢ʲ¢×ª´ïÁª°îÖ´·¨²¿·Ö¡£¡£ ¡£´Ë´Î¹¥»÷¶ÔÃåÒòÖÝʥԼɪ·òÒ½Ôº¡¢Ê¥ÂêÀö¿µ½¡ÏµÍ³¼°Ðº±²¼Ê²¶ûÖÝʥԼɪ·òÒ½ÔºÔì³ÉÏÔÖøÓ°Ï죺ʥÂêÀöҽԺʵÑéÊÒ½öÄÜ´¦Öóͷ£Ö½ÖÊÒ½Öö£¬£¬ £¬£¬£¬£¬£¬Ðº±²¼Ê²¶ûÖÝʥԼɪ·òҽԺʵÑéÊÒЧÀÍÊÜÏÞÇÒÐèÖ½ÖÊÒ½Öö¡£¡£ ¡£Covenant HealthÓÚ³ýϦҹ×îÏÈÏòÊܺ¦Õß¼ÄËÍÎ¥¹æÍ¨ÖªÐÅ£¬£¬ £¬£¬£¬£¬£¬²¢ÌṩһÄêÆÚÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£ ¡£÷è÷ëÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£ ¡£


https://therecord.media/covenant-health-breach-qilin


4. ÐÂÎ÷À¼ManageMyHealthÊý¾Ýй¶ӰÏ쳬10ÍòÓû§


1ÔÂ2ÈÕ£¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬ÐÂÎ÷À¼Êý×Ö¿µ½¡Æ½Ì¨ManageMyHealth±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬Ô¼180Íò×¢²áÓû§ÖпÉÄÜÓÐ6%ÖÁ7%£¨¼´10.8ÍòÖÁ12.6ÍòÓû§£©Êܵ½Ó°Ïì¡£¡£ ¡£´Ë´ÎÊÂÎñÉæ¼°ÔÊÐíÁÙ´²Ò½Éú»á¼û»¼ÕßÒ½ÁƼͼµÄÔÚÏßЧÀÍ£¬£¬ £¬£¬£¬£¬£¬ÊÜÓ°Ïì¿Í»§½«ÔÚδÀ´48СʱÄÚÊÕµ½¹«Ë¾Í¨Öª£¬£¬ £¬£¬£¬£¬£¬Ã÷È·ÆäÐÅÏ¢ÊÇ·ñ¼°ÔõÑù±»»á¼û¡£¡£ ¡£ManageMyHealthÊ×ϯִÐйÙVino RamayahÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬¹«Ë¾Ê¼ÖÕ½«¿µ½¡ÐÅÏ¢±£»£»£»£» £»£»£»¤ÊÓΪ½¹µãÔðÈΡ£¡£ ¡£ËûÌåÏÖ£º¡°ÎÒÃÇÉîÖª¿µ½¡ÐÅÏ¢µÄ˽ÃÜÐÔÓëÃô¸ÐÐÔ£¬£¬ £¬£¬£¬£¬£¬´ËÀàÊÂÎñ¿ÉÄÜÒý·¢Óû§½¹ÂÇ¡£¡£ ¡£ÏÖÔÚÍŶÓÕýÈ«Á¦È·¶¨ÊÜÓ°ÏìÖ°Ô±£¬£¬ £¬£¬£¬£¬£¬²¢½«ÒÔÖ±½Ó¡¢Í¸Ã÷µÄ·½·¨ÓëÆäÏàͬ¡£¡£ ¡£¡±Òþ˽רԱ°ì¹«ÊÒÒÑ»ñϤÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬²¢ÕýÓëÆ½Ì¨ÏàÖúÍÆÐÐÒþ˽Á¢·¨ÒåÎñ¡£¡£ ¡£ÐÂÎ÷À¼ÎÀÉú²¿³¤Î÷ÃÉ¡¤²¼Àʳƴ˴ÎÎ¥¹æ¡°ÁîÈ˵£ÐÄ¡±£¬£¬ £¬£¬£¬£¬£¬µ«Ã÷È·ÌåÏÖ¡°ÏÖÔÚÎÞÖ¤¾ÝÅú×¢°üÀ¨ÎҵĿµ½¡ÕË»§ÔÚÄÚµÄÈκÎHNZ£¨ÐÂÎ÷À¼¿µ½¡Ôö½øÐ­»á£©ÏµÍ³Ôâµ½ÆÆË𣬣¬ £¬£¬£¬£¬£¬ÒòManageMyHealthÓµÓÐ×ÔÁ¦ÏµÍ³¡±¡£¡£ ¡£ËûÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬ÐÂÎ÷À¼ÎÀÉú²¿ÕýÓëÆ½Ì¨Ç×½üÏàÖú£¬£¬ £¬£¬£¬£¬£¬È·±£ÊÂÎñÍ×ÉÆ´¦Öóͷ££¬£¬ £¬£¬£¬£¬£¬ÇÒÒ½ÁÆÐ§Àͽ«Ò»Á¬Õý³£ÔËת£¬£¬ £¬£¬£¬£¬£¬ÎÞÁÙ´²Ó°Ïì¡£¡£ ¡£


https://www.1news.co.nz/2026/01/02/managemyhealth-data-breach-more-than-108k-users-potentially-affected/


5. ¶«¾©FMÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬£¬³¬300ÍòÓû§ÐÅÏ¢ÊÜÍþв


1ÔÂ1ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÈÕ±¾×ÅÃû¹ã²¥µç̨¶«¾©FM¹ã²¥Öêʽ»áÉçÔâÓöÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£ ¡£Ò»¸ö×Գơ°Êܺ¦Õß¡±µÄÕûÌåÐû³ÆÒÑÈëÇָù«Ë¾ÄÚ²¿ÅÌËã»úϵͳ£¬£¬ £¬£¬£¬£¬£¬²¢ÇÔÈ¡Áè¼Ý300ÍòÌõСÎÒ˽¼Ò¼°ÊÖÒÕÊý¾Ý¼Í¼¡£¡£ ¡£´Ë´ÎÊÂÎñÒòÉæ¼°Ãô¸ÐÐÅÏ¢Á¿ÖØ´óÇÒ±¬·¢ÔÚ¿çÄêÌØÊâʱ¶Î£¬£¬ £¬£¬£¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£ ¡£¾Ý¹¥»÷ÕßÅû¶£¬£¬ £¬£¬£¬£¬£¬±»µÁÊý¾Ýº­¸ÇÓû§È«Ãû¡¢ÉúÈÕ¡¢µç×ÓÓʼþµØµãµÈ»ù´¡Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°IPµØµã¡¢Óû§ÊðÀí£¨¿Éʶ±ð×°±¸ÀàÐÍ£©µÈÊÖÒÕϸ½Ú¡£¡£ ¡£¸üÑÏÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÉù³Æ»ñÈ¡Á˹«Ë¾ÄÚ²¿ÏµÍ³µÄµÇ¼ID¼°Ô±¹¤ÊÂÇéÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ÈôÊôʵ£¬£¬ £¬£¬£¬£¬£¬¿ÉÄÜÍþвÆóÒµÔËÓªÇå¾²¼°Ô±¹¤Òþ˽¡£¡£ ¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬Êý¾ÝÕæÊµÐÔÈÔ´¦ÓÚר¼ÒºËʵ½×¶Î£¬£¬ £¬£¬£¬£¬£¬µ«Ç±ÔÚΣº¦ÒÑÒý·¢Çå¾²»ú¹¹¾¯ÐÑ¡£¡£ ¡£¶«¾©FM×÷ΪÈÕ±¾×î¾ßÓ°ÏìÁ¦µÄ¹ã²¥µç̨֮һ£¬£¬ £¬£¬£¬£¬£¬ÕÆÎÕ´ó×ÚÌýÖÚ¼°Ô±¹¤ÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ºã¾Ã³ÉÎªÍøÂç·¸·¨·Ö×ÓÄ¿µÄ¡£¡£ ¡£Ö»¹Ü´Ë´ÎÊÂÎñ±»ÆðÔ´¶¨ÐÔΪͨË×ÍøÂç·¸·¨°¸¼þ£¬£¬ £¬£¬£¬£¬£¬µ«Êý¾Ýй¶¹æÄ£¼°É漰ά¶È£¨´ÓСÎÒ˽¼ÒÒþ˽µ½Æóҵϵͳƾ֤£©ÒÑÔ¶³¬Í¨ÀýÁìÓò¡£¡£ ¡£Ç徲ר¼ÒÌáÐÑ£¬£¬ £¬£¬£¬£¬£¬Èô¹¥»÷ÕßÕÆÎÕÕæÊµÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¾«×¼Õ©Æ­¡¢Éí·ÝµÁÓõȴÎÉúΣº¦¡£¡£ ¡£


https://hackread.com/tokyo-fm-data-breach-hacker-3-million-records-stolen/


6. Google Cloud¹¤¾ß±»ÀÄÓ÷¢¶¯ÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷


1ÔÂ2ÈÕ£¬£¬ £¬£¬£¬£¬£¬Check PointÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓÃGoogle Cloud Application IntegrationÖеÄÕýµ±¹¦Ð§Ìᳫ´ó¹æÄ£ÍøÂç´¹ÂÚ¹¥»÷¡£¡£ ¡£¸Ã¹¥»÷ͨ¹ý¶à²ãÖØ¶¨ÏòÊÖÒÕÈÆ¹ý¹Å°åÇå¾²¼ì²â£¬£¬ £¬£¬£¬£¬£¬Á½ÖÜÄÚ·¢Ëͽü9400·âαÔìÓʼþ£¬£¬ £¬£¬£¬£¬£¬Ó°ÏìÔ¼3200ÃûÓû§¡£¡£ ¡£¹¥»÷ÕßÀÄÓÃGoogle CloudµÄ"·¢Ë͵ç×ÓÓʼþ"×Ô¶¯»¯¹¤¾ß£¬£¬ £¬£¬£¬£¬£¬´Ó¹Ù·½ÓòÃûmailto:noreply-application-integration@google.com·¢ËÍÓʼþ£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÊÜÐÅÈεÄÔÆÐ§ÀÍ»ù´¡ÉèÊ©Ìá¸ß¿ÉÐŶÈ¡£¡£ ¡£Óʼþ¸ß¶ÈÄ£ÄâGoogle¹Ù·½Æø¸Å£¬£¬ £¬£¬£¬£¬£¬ÒÔÓïÒôÓʼþÌáÐÑ¡¢¹²ÏíÎļþ»á¼ûµÈͨÀý³¡¾°ÎªÓÕ¶üÓÕµ¼µã»÷¡£¡£ ¡£¹¥»÷Á´°üÀ¨Èý¸ö½×¶Î£ºÊ×ÏÈͨ¹ýstorage.cloud.google.comÁ´½Ó½¨Éè³õʼÐÅÈΣ»£»£»£» £»£»£»ËæºóÖØ¶¨ÏòÖÁgoogleusercontent.comÏÔʾÐéαÑéÖ¤Âë¹æ±Ü×Ô¶¯É¨Ã裻£»£»£» £»£»£»×îÖÕÖ¸Ïò·Ç΢ÈíÓòÃûµÄαÔì΢ÈíµÇÂ¼Ò³ÃæÇÔȡƾ֤¡£¡£ ¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔÖÆÔìÒµºÍ¹¤ÒµÆóÒµ£¬£¬ £¬£¬£¬£¬£¬¿Æ¼¼/SaaS¼°½ðÈÚ»ú¹¹´ÎÖ®£¬£¬ £¬£¬£¬£¬£¬×¨ÒµÐ§ÀÍ¡¢ÁãÊÛ¡¢Ã½Ìå¡¢½ÌÓý¡¢Ò½ÁÆ¡¢ÄÜÔ´¡¢Õþ¸®µÈÐÐÒµÒ²Êܵ½²î±ðˮƽӰÏì¡£¡£ ¡£µØÇøÂþÑÜÏÔʾ£¬£¬ £¬£¬£¬£¬£¬ÃÀ¹úÊܺ¦Õß×î¶à£¬£¬ £¬£¬£¬£¬£¬ÑÇÌ«ºÍÅ·Ö޻»îÔ¾£¬£¬ £¬£¬£¬£¬£¬À­¶¡ÃÀÖÞÖаÍÎ÷ºÍÄ«Î÷¸çÊÜÓ°Ïì×îÑÏÖØ¡£¡£ ¡£


https://securityaffairs.com/186425/cyber-crime/phishing-campaign-abuses-google-cloud-application-to-impersonate-legitimate-google-emails.html