ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷Ч¹ûÈö²¥¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2025-01-161. ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷Ч¹ûÈö²¥¶ñÒâÈí¼þ
1ÔÂ14ÈÕ£¬¹¥»÷ÕßʹÓÃYouTubeºÍGoogleËÑË÷Ч¹û£¬Õë¶ÔÑ°ÕÒµÁ°æºÍÆƽâÈí¼þÏÂÔصÄÓû§ÊµÑéÍøÂç¹¥»÷¡£ËûÃÇÔÚYouTubeÊÓƵÖаüÀ¨ÐéαÈí¼þÏÂÔØÁ´½Ó£¬ÓÕÆÓû§µã»÷²¢ÏÂÔØ°üÀ¨ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ³ÌÐò¡£Í¬Ê±£¬ÔÚGoogleËÑË÷Ч¹ûÖÐÖ²Èë¿´ËÆÕýµ±µÄµÁ°æÈí¼þÏÂÔØÁ´½Ó£¬ÊµÔòÒ²°üÀ¨¶ñÒâÈí¼þ¡£¹¥»÷Õß»¹Ê¹ÓÃMediafireºÍMega.nzµÈÎļþÍйܷþÎñÒþ²Ø¶ñÒâÈí¼þȪԴ£¬²¢Ê¹ÓÃÃÜÂë±£»¤ºÍ±àÂëÊÖÒÕ¹æ±ÜÇå¾²¼ì²â¡£±ðµÄ£¬¸Ã¹¥»÷Ô˶¯ÓëÒ»ÄêÇ°·ºÆðµÄLumma StealerÀàËÆ£¬Èö²¥¶àÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ÈçPrivateLoader¡¢MarsStealerµÈ¡£¹¥»÷ÕßÀÄÓÃÈËÃǶÔYouTubeºÍÎļþ¹²Ïí·þÎñµÄÐÅÍУ¬ÓÈÆäÓ°ÏìÄÇЩѰÕÒµÁ°æÈí¼þµÄÓû§¡£ÎªÁË·ÀÓùÕâЩ¹¥»÷£¬×éÖ¯»ú¹¹Ó¦ÏàʶĿ½ñÍþв£¬¼á³ÖСÐÄ£¬²¢Ìá¸ßÔ±¹¤Çå¾²Òâʶ¡£
https://www.darkreading.com/threat-intelligence/cyberattackers-infostealers-youtube-comments-google-search
2. Fortinet·À»ðǽÔâ´ó¹æÄ£ÁãÈÕÎó²î¹¥»÷
1ÔÂ14ÈÕ£¬È¥Äê12Ô£¬Çå¾²Ñо¿Ö°Ô±ÊӲ쵽Õë¶ÔFortinet·À»ðǽµÄ´ó¹æÄ£¹¥»÷Ô˶¯£¬¹¥»÷Õß¿ÉÄÜʹÓÃÁËÉÐδÐÞ²¹µÄÁãÈÕÎó²î¡£ÕâЩ¹¥»÷µ¼ÖÂÊý°Ùµ½Êýǧ´Î¶ñÒâµÇ¼ÊÂÎñ£¬¹¥»÷Õßͨ¹ýÖÎÀí½çÃæ»ñµÃ»á¼ûȨÏÞ£¬²¢ÐÞ¸ÄÁË·À»ðǽÉèÖã¬Ê¹ÓÃSSL VPNËíµÀά³ÖÅþÁ¬£¬ÇÔȡƾ֤ÒÔÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒƶ¯¡£Ö»¹ÜÏêϸϸ½ÚÈÔÔÚÊÓ²ìÖУ¬µ«±±¼«ÀÇʵÑéÊҸ߶ÈÈ·ÐÅÁãÈÕÎó²î±»´ó¹æģʹÓá£ÊÜÓ°ÏìµÄ¹Ì¼þ°æ±¾°üÀ¨7.0.14ÖÁ7.0.16¡£¹¥»÷Õß»¹ÆÕ±éʹÓÃÁË×°±¸µÄ»ùÓÚWebµÄÏÂÁîÐнçÃ棬²¢ÓëÒì³£Ô´IPµØµã½¨ÉèÁË¿ÉÒÉÅþÁ¬¡£ÕâЩ¹¥»÷´Ó11ÔÂÖÐÑ®×îÏÈ£¬µ«Ö±µ½12Ô²ű¬·¢´ó¹æÄ£·À»ðǽÉèÖøü¸Ä¡£¹¥»÷Õß½¨ÉèÁËеij¬µÈÖÎÀíÔ±ÕË»§£¬·¿ªÁËÍâµØÓû§ÕË»§£¬²¢½«ËüÃÇÌí¼Óµ½¾ßÓÐVPN»á¼ûȨÏÞµÄ×éÖУ¬»òÕßЮÖÆÏÖÓÐÕË»§¡£ËûÃÇ»¹½¨ÉèÁËеÄSSL VPNÃÅ»§£¬²¢½«Óû§ÕË»§Ö±½ÓÌí¼Óµ½ÕâЩÃÅ»§ÖС£Ò»µ©½¨ÉèÁËSSL VPNËíµÀ£¬¹¥»÷Õ߾ͻáÍøÂçƾ֤¾ÙÐкáÏòÒƶ¯£¬²¢Ê¹ÓÃÁËKali Linux¹¤¾ß¡£Ö»¹ÜÎÞ·¨È·¶¨¹¥»÷ÕßµÄ×îÖÕÄ¿µÄ£¬µ«ÀÕË÷Èí¼þµÄ¿ÉÄÜÐÔ²¢²»¿Éɨ³ý¡£
https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/
3. 5000¸öWordPressÍøÕ¾ÔâÐÂÐͶñÒâÈí¼þÈëÇÖ
1ÔÂ14ÈÕ£¬Ò»ÖÖÐÂÐͶñÒâÈí¼þÔ˶¯ÒÑÀÖ³ÉÈëÇÖÁè¼Ý5000¸öWordPressÍøÕ¾£¬ÆäÖ÷ҪĿµÄΪ½¨ÉèÖÎÀíÔ±ÕÊ»§¡¢×°ÖöñÒâ²å¼þ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£WebscriptÇå¾²¹«Ë¾c/sideµÄÑо¿Ö°Ô±ÔÚ¶Ô¿Í»§ÊÂÎñÏìÓ¦Öз¢Ã÷£¬ÕâЩ¶ñÒâÔ˶¯Ê¹ÓÃÁËwp3[.]xyzÓòÃû¾ÙÐÐÊý¾ÝÇÔÈ¡£¬µ«ÏêϸµÄ³õʼѬȾ;¾¶ÉÐδÃ÷È·¡£Ò»µ©¹¥»÷µ½ÊÖ£¬¶ñÒâ¾ç±¾±ã»á´Ówp3[.]xyz¼ÓÔØ£¬²¢Ê¹ÓÃÔ¤Éèƾ֤½¨ÉèÃûΪwpx_adminµÄ¶ñÒâÖÎÀíÔ±ÕÊ»§¡£Ëæºó£¬¸Ã¾ç±¾»á´ÓͳһÓòÃûÏÂÔز¢¼¤»îÒ»¸ö¶ñÒâ²å¼þ£¨plugin.php£©£¬¸Ã²å¼þÖ¼ÔÚÍøÂçÖÎÀíԱƾ֤¡¢ÈÕÖ¾µÈÃô¸ÐÐÅÏ¢£¬²¢ÒÔ»ìÏý·½·¨½«Æäαװ³ÉͼÏñÇëÇó·¢ËÍÖÁ¹¥»÷Õß·þÎñÆ÷¡£±ðµÄ£¬¹¥»÷Àú³ÌÖл¹°üÀ¨¶à¸öÑéÖ¤°ì·¨£¬Èç¼Í¼¶ñÒâÖÎÀíÔ±ÕÊ»§½¨Éè״̬¼°ÑéÖ¤¶ñÒâ²å¼þ×°Öõȡ£Îª×èÖ¹´ËÀ๥»÷£¬c/side½¨ÒéÍøÕ¾ËùÓÐÕßʹÓ÷À»ðǽºÍÇå¾²¹¤¾ß·â±Õwp3[.]xyzÓòÃû¡£Í¬Ê±£¬ÖÎÀíÔ±Ó¦°´ÆÚ¼ì²éÌØȨÕÊ»§ºÍÒÑ×°Öòå¼þÁÐ±í£¬ÊµÊ±Ê¶±ð²¢É¾³ýδ¾ÊÚȨµÄÔ˶¯¡£±ðµÄ£¬ÔöÇ¿WordPressÍøÕ¾µÄCSRF±£»¤Ò²ÖÁ¹ØÖ÷Òª£¬ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤»¹¿ÉΪÒÑй¶ƾ֤µÄÕÊ»§ÌṩÌØÊâ±£»¤¡£
https://www.bleepingcomputer.com/news/security/wp3xyz-malware-attacks-add-rogue-admins-to-5-000-plus-wordpress-sites/
4. Google OAuthÎó²î£ºÒѵ¹±ÕÊ×´´¹«Ë¾ÓòÃû³É¹¥»÷ÕßÐÂÄ¿µÄ
1ÔÂ14ÈÕ£¬GoogleµÄOAuthµÇ¼¹¦Ð§±£´æÒ»¸öÖØ´óÇå¾²Òþ»¼£¬¿ÉÄܱ»¹¥»÷ÕßʹÓÃÀ´»á¼ûÇ°Ô±¹¤ÔÚSaaSƽ̨ÉϵÄÃô¸ÐÊý¾Ý¡£ÕâÒ»Îó²îÓÉTrufflesecurityÑо¿Ö°Ô±·¢Ã÷£¬²¢Ïò¹È¸è±¨¸æ£¬µ«×î³õ²¢Î´»ñµÃ×ã¹»ÖØÊÓ¡£Ö»¹Ü¹È¸èØʺóÏòÑо¿Ö°Ô±½ÒÏþÁËÉͽð²¢ÖØпªÆôÁËÊӲ죬µ«×èÖ¹ÏÖÔÚ£¬¸ÃÎÊÌâÈÔδ»ñµÃ½â¾ö¡£¹¥»÷Õß¿ÉÒÔͨ¹ý×¢²áÒѵ¹±ÕÊ×´´¹«Ë¾µÄÓòÃû£¬²¢Ê¹ÓÃÕâЩÓòÃûΪǰ¹ÍÔ±ÖØн¨Éèµç×ÓÓʼþÕÊ»§£¬´Ó¶ø»á¼ûËûÃÇÔÚSlack¡¢Notion¡¢Zoom¡¢ChatGPTµÈ·þÎñÉϵÄÕË»§¡£Ñо¿Ö°Ô±·¢Ã÷£¬Í¨¹ý¹ºÖÃÒÑÍ£ÓõÄÓòÃû£¬¹¥»÷Õß¿ÉÒÔ´ÓÈËÁ¦×ÊԴϵͳÖÐÌáÈ¡Ãô¸ÐÊý¾Ý£¬²¢µÇ¼ÖÖÖÖ·þÎñ¡£Õâ¸öÎÊÌâÓ°ÏìÁËÊý°ÙÍòÈ˺ÍÊýǧ¼Ò¹«Ë¾£¬²¢ÇÒËæ×Åʱ¼äµÄÍÆÒÆ£¬ÎÊÌâÖ»»á±äµÃÔ½À´Ô½ÑÏÖØ¡£ÓÉÓÚ´ó´ó¶¼¿Æ¼¼Ê×´´¹«Ë¾×¢¶¨»áµ¹±Õ£¬¶øËûÃÇÖеÄÐí¶àʹÓÃGoogle WorkspacesÀ´ÊÕ·¢µç×ÓÓʼþ£¬Òò´ËËûÃǵÄÔ±¹¤Ê¹ÓÃGmailÕÊ»§µÇ¼Éú²úÁ¦¹¤¾ß¡£ÎªÁËÌá·À´ËÀàΣº¦£¬½¨ÒéÍÑÀëÊ×´´¹«Ë¾Ê±´ÓÕÊ»§ÖÐɾ³ýÃô¸ÐÊý¾Ý£¬²¢×èֹʹÓÃÊÂÇéÕÊ»§¾ÙÐÐСÎÒ˽¼ÒÕÊ»§×¢²á¡£
https://www.bleepingcomputer.com/news/security/google-oauth-flaw-lets-attackers-gain-access-to-abandoned-accounts/
5. MIGÔâBlack BastaÀÕË÷Èí¼þ¹¥»÷£¬´ó×Ú¿Í»§ÐÅϢй¶
1ÔÂ14ÈÕ£¬ÃÀ¹ú¶«Äϲ¿×î´óµÄµäÖÊ´û¿î»ú¹¹Ö®Ò»£¬×ܲ¿Î»ÓÚÌïÄÉÎ÷ÖݵĵäÖÊ´û¿îͶ×ÊÕß¼¯ÍÅ£¨MIG£©ÉϸöÔÂÔâÓöÁËÒ»´ÎÍøÂçÇå¾²ÊÂÎñ£¬µ¼Ö´ó×Ú¿Í»§ÐÅÏ¢¿ÉÄÜй¶¡£MIGδ͸¶ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿£¬µ«ÒÑÔ¼Ç빩ӦÉÌʶ±ðÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬²¢ÍýÏëÔÚ¼¸ÖÜÄÚÍê³É֪ͨÊÂÇé¡£¾ÝMIGÍøվ֪ͨ£¬´Ë´ÎÍøÂç¹¥»÷ʼÓÚ12ÔÂ11ÈÕ£¬²¢ÓÚÔ½ÈÕ±»·¢Ã÷£¬Ò»Ãûδ¾ÊÚȨµÄÓû§½øÈëÁËMIGµÄÅÌËã»úÇéÐΣ¬µ¼Ö¶àÃûСÎÒ˽¼ÒµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£´Ë´Î¹¥»÷ÓÉBlack BastaÀÕË÷Èí¼þÍÅ»ïÌᳫ£¬¸ÃÍÅ»ïÊÇÏÖÔÚ×îÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯Ö®Ò»£¬ÔøÏ®»÷¹ýÈ«ÇòÖÁÉÙ500¸ö×éÖ¯£¬²¢Ãé×¼ÁË16¸öÒªº¦»ù´¡ÉèÊ©²¿·ÖÖеÄ12¸ö¡£½üÄêÀ´£¬ÀÕË÷Èí¼þÍÅ»ïÒ»ÔÙ½«Ä¿µÄÃé×¼É漰ס·¿ÐÐÒµµÄ½ðÈÚ»ú¹¹£¬ÒÑÓжà¼ÒÖÁ¹«Ë¾ÔâÊܹ¥»÷£¬µ¼ÖÂס·¿¹ºÖÃÊÜ×è¡£
https://therecord.media/tennessee-mortgage-lender-confirms-cyberattack
6. Î÷ºÚÎÄÕþ¸®ITϵͳÔâÍøÂç¹¥»÷£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Éù³ÆÈÏÕæ
1ÔÂ14ÈÕ£¬¿µÄùµÒ¸ñÖÝÎ÷ºÚÎÄÊÐÕþ¸®ÕýÔÚÊÓ²ìÒ»Æðµ¼ÖÂÆäËùÓÐITϵͳÔÝʱ¹Ø±ÕµÄÍøÂç¹¥»÷ÊÂÎñ¡£Ê㤶àÁմ²©À׶ûÔÚ1ÔÂ11ÈÕÌåÏÖ£¬ÕâÆð¡°ITϵͳÇ徲ʹʡ±ÖÂʹÕþ¸®ÏµÍ³¹Ø±Õ£¬¶øÕþ¸®×î³õÔÚ12ÔÂ26ÈÕÓÚFacebookÉϽöÌá¼°ÔâÓö¡°ÍøÂçÖÐÖ¹¡±¡£ÏÖÔÚ£¬¸ÃÊÐÈÔÔÚÆÀ¹ÀÄÄЩÊý¾Ý¿ÉÄÜÊܵ½´Ë´ÎÊÂÎñµÄÓ°Ï죬µ«Òѽ¨ÉèÓ¦¶ÔÀÏÀýºÍ×ÜÌå×¼±¸£¬ÊÜÓ°ÏìϵͳÒÑÓб¸·Ý£¬Ô¤¼Æ¼¸ÌìÄڿɻָ´ÔËÐС£Ö»¹ÜÓÐ̸ÂÛÇëÇóÈ·ÈÏÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬µ«Î÷ºÚÎÄÊÐδÓè»ØÓ¦¡£È»¶ø£¬1ÔÂ11ÈÕ£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¸Ã×éÖ¯Ôø¹¥»÷ѪҺ¼ì²â¾ÞÍ·Synnovis£¬µ¼ÖÂ100ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶¼°1100¶àÀýÊÖÊõÍƳ٣¬Òý·¢¹ú¼ÊÄÕÅ¡£÷è÷ë×éÖ¯×Ô2022ÄêÆðÒÔÀÕË÷Èí¼þ¼´·þÎñÐÎʽ¹¥»÷ÃÀÅ·¶à¼Ò×éÖ¯£¬ÒÑÈ·ÈÏÌᳫÖÁÉÙ25Æð¹¥»÷£¬ÉÐÓÐ100¶àÆðδ¾Ö¤ÊµµÄ¹¥»÷¡£Óë´Ëͬʱ£¬ÃÀ¹ú¶à¸ö¶¼»á±¨¸æãåÈÕÍøÂçÊÂÎñ£¬ÂíÈøÖîÈûÖݲ®¶÷ÕòÒ²ÓÚ1ÔÂ11ÈÕ±¨¸æÆäITÍøÂçÔâÈëÇÖ¡£
https://therecord.media/west-haven-connecticut-city-government-cyberattack