Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ £¬£¬ £¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ

Ðû²¼Ê±¼ä 2025-01-02

1. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ £¬£¬ £¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ


1ÔÂ1ÈÕ £¬£¬ £¬£¬£¬£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒÑÔ £¬£¬ £¬£¬£¬£¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£©¡£¡£¡£¡£¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ°¡£¡£¡£¡£¡£¾Ý0mid16BÉù³Æ £¬£¬ £¬£¬£¬£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto £¬£¬ £¬£¬£¬£¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÀ¨24ÍòÓà·Ýº¬ÏêϸСÎÒ˽¼ÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬£¬£¬£¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý £¬£¬ £¬£¬£¬£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â¡£¡£¡£¡£¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý £¬£¬ £¬£¬£¬£¬ÏÔʾ±»»á¼ûµÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB¡£¡£¡£¡£¡£0mid16BÌåÏÖ £¬£¬ £¬£¬£¬£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto £¬£¬ £¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´ÔöÇ¿±£»£»£»£»£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð £¬£¬ £¬£¬£¬£¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷¡£¡£¡£¡£¡£¾ÝTrustPilotÉϵÄ̸ÂÛÏÔʾ £¬£¬ £¬£¬£¬£¬DEphotoÒÑ×îÏÈÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ £¬£¬ £¬£¬£¬£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£´æÕþ²ßÌåÏÖ²»Âú £¬£¬ £¬£¬£¬£¬ÒÔΪÆä±£´æÊý¾Ýʱ¼ä¹ý³¤¡£¡£¡£¡£¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£¡£¡£¡£¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â £¬£¬ £¬£¬£¬£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý £¬£¬ £¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí¡£¡£¡£¡£¡£


https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/


2. EC2 Grouper£ºÊ¹ÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½ÂÔ


1ÔÂ1ÈÕ £¬£¬ £¬£¬£¬£¬FortiGuardʵÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯ £¬£¬ £¬£¬£¬£¬¸Ã×é֯ƵÈÔʹÓÃAWS¹¤¾ßºÍÊÜËðƾ֤¾ÙÐй¥»÷¡£¡£¡£¡£¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐÓÃÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤ £¬£¬ £¬£¬£¬£¬²¢Ê¹ÓÃAPI¾ÙÐÐÕì̽ºÍ×ÊÔ´½¨Éè £¬£¬ £¬£¬£¬£¬×èÖ¹ÊÖ¶¯»î¶¯¡£¡£¡£¡£¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§ÇéÐÎÖз¢Ã÷ÁËÆäÆæÒìµÄÓû§ÊðÀíºÍÇå¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷ £¬£¬ £¬£¬£¬£¬µ«ÕâЩָ±ê¹ØÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»¿É¿¿ £¬£¬ £¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö £¬£¬ £¬£¬£¬£¬Í¨Ì«¹ýÎöƾ֤й¶ºÍAPIʹÓõÈÐźŠ£¬£¬ £¬£¬£¬£¬Çå¾²ÍŶӿÉÒÔÖÆ¶©¿É¿¿µÄ¼ì²âÕ½ÂÔÀ´µÖÓù´ËÀ๥»÷¡£¡£¡£¡£¡£ÎªÁËÈ·±£Çå¾² £¬£¬ £¬£¬£¬£¬×é֯ӦʹÓÃÔÆÇå¾²Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ßÒ»Á¬¼à¿ØºÍÆÀ¹ÀÔÆÇéÐεÄÇå¾²Ì¬ÊÆ £¬£¬ £¬£¬£¬£¬²¢ÊµÑéÒì³£¼ì²âÊÖÒÕÀ´Ê¶±ðÔÆÇéÐÎÖеÄÒì³£ÐÐΪ¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬£¬£¬£¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄʹÓÃAWS»ù´¡ÉèÊ©¾ÙÐй¥»÷ £¬£¬ £¬£¬£¬£¬ÕâÅú×¢ÔÆÇéÐÎÃæÁÙÒ»Á¬µÄÇå¾²Íþв¡£¡£¡£¡£¡£


https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/


3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷ £¬£¬ £¬£¬£¬£¬Êý¾Ýй¶ÖÁ°µÍø


12ÔÂ31ÈÕ £¬£¬ £¬£¬£¬£¬Â޵µºÖÝÒ½Áƺ͸£ÀûÍýÏëϵͳÔâµ½ÁËÍøÂç¹¥»÷ £¬£¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÒѽ«²¿·ÖÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ¡£¡£¡£¡£¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ £¬£¬ £¬£¬£¬£¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸ £¬£¬ £¬£¬£¬£¬²¢ÒÑÖÆ¶©ÍâÁªÕ½ÂÔ £¬£¬ £¬£¬£¬£¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄסÃñ±£»£»£»£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÄÄЩÎļþ±»Ð¹Â¶ £¬£¬ £¬£¬£¬£¬ITÍŶÓÕýÔÚÆÊÎö¡£¡£¡£¡£¡£ÈÏÕæ½¨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸·¨·Ö×ÓÈ¡µÃÁªÏµ £¬£¬ £¬£¬£¬£¬²¢ÓëÖÝÕþ¸®ÏàÖúÁгöÊÜÓ°ÏìÖ°Ô±Ãûµ¥ £¬£¬ £¬£¬£¬£¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÔõÑù»ñµÃÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÖÝÍýÏë°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏëµÈ¡£¡£¡£¡£¡£Âó»ù±Þ²ßסÃñ½ÓÄÉһϵÁв½·¥±£»£»£»£»£»¤²ÆÎñÐÅÏ¢ £¬£¬ £¬£¬£¬£¬ÈçÁªÏµÐÅÓñ¨¸æ»ú¹¹¶³½áÐÅÓá¢ÉèÖÃڲƭ¾¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤ £¬£¬ £¬£¬£¬£¬²¢Ð¡ÐÄÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£¡£¡£¡£¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶ÊÂÎñ £¬£¬ £¬£¬£¬£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС¡£¡£¡£¡£¡£


https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/


4. Õ¹ÏÖºÚ¿ÍÔõÑùÐ®ÖÆ 35 ¸ö Google Chrome À©Õ¹³ÌÐò


12ÔÂ31ÈÕ £¬£¬ £¬£¬£¬£¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹³ÌÐò¿ª·¢Ö°Ô±µÄÍøÂç´¹Âڻ¿ËÈÕ±»ÆØ¹â £¬£¬ £¬£¬£¬£¬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹³ÌÐò±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂë £¬£¬ £¬£¬£¬£¬Ó°ÏìÔ¼260ÍòÓû§ £¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨ÍøÂçÇå¾²¹«Ë¾CyberhavenµÄÀ©Õ¹³ÌÐò¡£¡£¡£¡£¡£»£»£»£»£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ £¬£¬ £¬£¬£¬£¬µ«ÔçÆÚÏÂÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒѱ£´æ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄ´¹ÂÚµç×ÓÓʼþ £¬£¬ £¬£¬£¬£¬Éù³ÆÀ©Õ¹³ÌÐòÎ¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß £¬£¬ £¬£¬£¬£¬ÓÕµ¼¿ª·¢Ö°Ô±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò»á¼ûÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹³ÌÐò¡£¡£¡£¡£¡£Ò»µ©»ñµÃ»á¼ûȨÏÞ £¬£¬ £¬£¬£¬£¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹³ÌÐòÒÔ°üÀ¨¶ñÒâÎļþ £¬£¬ £¬£¬£¬£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý £¬£¬ £¬£¬£¬£¬°üÀ¨ID¡¢»á¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬£¬£¬£¬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ÊÂÎñ¼àÌýÆ÷ £¬£¬ £¬£¬£¬£¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ £¬£¬ £¬£¬£¬£¬ÒÔÈÆ¹ý2FA±£»£»£»£»£»¤²¢Ð®ÖÆÕË»§¡£¡£¡£¡£¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ £¬£¬ £¬£¬£¬£¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶ £¬£¬ £¬£¬£¬£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϾÙÐÐÐéαÐÅÏ¢»òÍøÂç´¹Âڻ £¬£¬ £¬£¬£¬£¬»ò½«»á¼ûȨÏÞ³öÊÛ¸øËûÈË¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/


5. GitHubÐéα¡°ÐÇÐÇ¡±ÂþÒ磺թƭÓë¶ñÒâÈí¼þ½èÊÆÈö²¥


12ÔÂ31ÈÕ £¬£¬ £¬£¬£¬£¬GitHubÉϱ£´æÊ¹ÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌâ £¬£¬ £¬£¬£¬£¬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßÕ©Æ­ºÍ¶ñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ×ÅÃû¶È £¬£¬ £¬£¬£¬£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£¡£¡£¡£¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥ £¬£¬ £¬£¬£¬£¬¿ÉÓÃÓÚÕ䲨´æ´¢¿â £¬£¬ £¬£¬£¬£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿·Ö £¬£¬ £¬£¬£¬£¬ÍƼöÏà¹ØÄÚÈÝ¡£¡£¡£¡£¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍЧÀÍʹÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ £¬£¬ £¬£¬£¬£¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý×ÅÃû¶È¡£¡£¡£¡£¡£Ò»ÏîÐÂÑо¿·¢Ã÷ £¬£¬ £¬£¬£¬£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊÇ¼ÙµÄ £¬£¬ £¬£¬£¬£¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ßÆÊÎöÊý¾Ý £¬£¬ £¬£¬£¬£¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ £¬£¬ £¬£¬£¬£¬²¢·¢Ã÷2024ÄêÐéαÐÇÐǻ¼¤Ôö¡£¡£¡£¡£¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ £¬£¬ £¬£¬£¬£¬»áÏ÷ÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÈΡ£¡£¡£¡£¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿ £¬£¬ £¬£¬£¬£¬²¢ÔÚ¿ÉÄܵÄÇéÐÎϼì²é´úÂë £¬£¬ £¬£¬£¬£¬ÒÔ×èÖ¹ÏÂÔØÓÕÆ­ÐÔµÄÈí¼þ¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬ £¬£¬£¬£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/


6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈ뱨¸æ


1ÔÂ1ÈÕ £¬£¬ £¬£¬£¬£¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈ뱨¸æ¡£¡£¡£¡£¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Ò»Á¬ÑݱäµÄÖØ´óÏÂÔØÆ÷¶ñÒâÈí¼þ £¬£¬ £¬£¬£¬£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£¡£¡£¡£¡£ËüÖ÷ÒªÓÃC/C++±àд £¬£¬ £¬£¬£¬£¬Äܹ»°²ÅÅһϵÁжñÒ⹤¾ß £¬£¬ £¬£¬£¬£¬°üÀ¨¿É½«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹³ÌÐò £¬£¬ £¬£¬£¬£¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ»á¼û¡£¡£¡£¡£¡£×Ô2024Äê8ÔÂÒÔÀ´ £¬£¬ £¬£¬£¬£¬LegionLoaderÈö²¥Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖóÌÐò¾ÙÐÐÈö²¥ £¬£¬ £¬£¬£¬£¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏýÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÉèÖø߶ȿɶ¨ÖÆ £¬£¬ £¬£¬£¬£¬ÆäÓÐÓÃÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý £¬£¬ £¬£¬£¬£¬ÈçChromeƾ֤ºÍÆäËû½âÃÜÃÜÔ¿¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬£¬£¬£¬LegionLoaderͨ¹ýAPI¹¥»÷ÒÉ»óÇå¾²¹¤¾ß £¬£¬ £¬£¬£¬£¬²¢Ê¹ÓüÓÃÜͨѶÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÁªÏµ¡£¡£¡£¡£¡£TRAC LabsÌṩÁËÖÜÈ«µÄÈëÇÖÖ¸±êÁÐ±í £¬£¬ £¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ¡£¡£¡£¡£¡£


https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/