GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿

Ðû²¼Ê±¼ä 2026-01-08

1. GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿


1ÔÂ7ÈÕ £¬£¬£¬½üÆÚ £¬£¬£¬GoBruteforcer£¨ÓÖ³ÆGoBrut£©½©Ê¬ÍøÂçÕë¶Ô̻¶ЧÀÍÆ÷ÉϵļÓÃÜÇ®±Ò¼°Çø¿éÁ´ÏîÄ¿Êý¾Ý¿âÌᳫÐÂÒ»ÂÖ¹¥»÷ £¬£¬£¬Æä½¹µãÌØÕ÷ΪʹÓÃÈ˹¤ÖÇÄÜÌìÉúµÄЧÀÍÆ÷ÉèÖÃʾÀýµ¼ÖµÄÈõÃÜÂëÎó²î £¬£¬£¬ÒÔ¼°¹ýʱ¼Ü¹¹ÈçXAMPPµÄĬÈÏÆ¾Ö¤Î£º¦¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚGolang¿ª·¢ £¬£¬£¬Ö÷ÒªÃé×¼FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdminЧÀÍ £¬£¬£¬Í¨¹ý±»ÈëÇÖµÄLinuxЧÀÍÆ÷ɨÃèËæ»ú¹«¹²IPµØµã £¬£¬£¬Ö´Ðб©Á¦ÆÆ½âµÇ¼¹¥»÷¡£¡£¡£¡£¡£Check PointÑо¿ÏÔʾ £¬£¬£¬³¬50,000Ì¨ÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷Ò×Êܹ¥»÷ £¬£¬£¬³õʼÈëÇÖ¶àͨ¹ýXAMPPЧÀÍÆ÷µÄFTPʵÏÖ £¬£¬£¬ÒòÖÎÀíÔ±³£±£´æÄ¬ÈÏÈõÃÜÂë¡£¡£¡£¡£¡£¹¥»÷Õß»ñÈ¡»á¼ûȨÏÞºó £¬£¬£¬Í¨³£½«Web shellÉÏ´«ÖÁWeb¸ùĿ¼ £¬£¬£¬»òͨ¹ýÉèÖùýʧµÄMySQL/phpMyAdminÉÏ´« £¬£¬£¬ÐγÉѬȾÁ´£ºÏÂÔØÆ÷»ñÈ¡IRC»úеÈË £¬£¬£¬×îÖÕ¼ÓÔØ±©Á¦ÆÆ½âÄ£¿£¿£¿é¡£¡£¡£¡£¡£¹¥»÷Æô¶¯ºó £¬£¬£¬ÔÚx86_64¼Ü¹¹ÉÏ¿ÉÆô¶¯¶à´ï95¸öÏß³Ì £¬£¬£¬ÑÓ³Ù10-400ÃëºóɨÃèËæ»úIP¹æÄ£ £¬£¬£¬Ìø¹ý˽ÓÐÍøÂç¡¢AWSÔÆ¼°ÃÀ¹úÕþ¸®ÍøÂç¡£¡£¡£¡£¡£Ã¿¸öÊÂÇéÀú³ÌÌìÉúËæ»úIPv4µØµã £¬£¬£¬Ì½²âЧÀͶ˿ڲ¢±éÀúƾ֤ÁÐ±í £¬£¬£¬Î¬³ÖÉ趨²¢·¢¼¶±ð¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/


2. jsPDF¿âÏÖ¸ßΣÎó²îÍþвJavaScriptÓ¦ÓÃÇå¾²


1ÔÂ7ÈÕ £¬£¬£¬ÆÕ±éÓÃÓÚJavaScriptÓ¦ÓóÌÐòÌìÉúPDFµÄjsPDF¿â¿ËÈÕÆØ³öÑÏÖØÇå¾²Îó²î£¨±àºÅCVE-2025-68428£© £¬£¬£¬ÑÏÖØÐÔÆÀ·Ö´ï9.2¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ4.0°æ±¾Ç°jsPDFµÄNode.js¹¹½¨°æ±¾Öб£´æµÄÍâµØÎļþ°üÀ¨Óë·¾¶±éÀúΣº¦ £¬£¬£¬µ±Óû§¿É¿ØÊäÈëδÂÄÀúÖ¤¼´×÷ΪÎļþ·¾¶×ª´ï¸øloadFileº¯Êýʱ £¬£¬£¬¹¥»÷Õ߿ɽè´Ë¶ÁÈ¡ÍâµØÎļþϵͳÃô¸ÐÊý¾Ý²¢Ç¶ÈëÌìÉúµÄPDFÎļþ £¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£Îó²îÓ°Ïì¹æÄ£Ã÷È·Ö¸ÏòjsPDFµÄNode.js°æ±¾Îļþ £¬£¬£¬Éæ¼°loadFileº¯Êý¼°Å²Óøú¯ÊýµÄÆäËûÒªÁì¡£¡£¡£¡£¡£Ó¦ÓÃÇå¾²¹«Ë¾Endor LabsÆÊÎöÖ¸³ö £¬£¬£¬ÈôÎļþ·¾¶ÎªÓ²±àÂë¡¢Ô´×Ô¿ÉÐÅÉèÖûò½ÓÄÉÑÏ¿áÔÊÐíÁбíÑéÖ¤ £¬£¬£¬ÔòʹÓÃÄѶÈÏÔÖø½µµÍ £» £»£»µ«¼øÓÚjsPDFÔÚnpm×¢²á±íÿÖܳ¬350Íò´ÎÏÂÔØµÄÆÕ±éʹÓÃÁ¿ £¬£¬£¬¸ÃÎó²îÈÔ±»ÆÀ¹ÀΪÒ×±»Æð¾¢Ê¹ÓõĸßΣº¦È±ÏÝ¡£¡£¡£¡£¡£ÐÞ¸´¼Æ»®ÒÑÔÚjsPDF 4.0.0°æ±¾ÖÐʵÑé £¬£¬£¬Í¨¹ýĬÈÏÏÞÖÆÎļþϵͳ»á¼û²¢ÒÀÀµNode.jsȨÏÞģʽ×è¶ÏÎó²î·¾¶¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/


3. n8nƽ̨"Ni8mare"¸ßΣ©¶¼òª¶³Ì´úÂëÖ´ÐÐΣº¦


1ÔÂ7ÈÕ £¬£¬£¬¿ËÈÕ £¬£¬£¬¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨n8n±»ÆØ³ö±àºÅΪCVE-2026-21858µÄ"Ni8mare"¸ßΣÎó²î £¬£¬£¬ÑÏÖØË®Æ½ÆÀ·Ö´ïÂú·Ö10·Ö¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÈ«Çò³¬10Íǫ̀n8nЧÀÍÆ÷ʵÀý £¬£¬£¬¹¥»÷Õß¿ÉÎÞÐèÉí·ÝÑéÖ¤Ô¶³Ì¿ØÖÆÍâµØ°²ÅŵÄn8nƽ̨ £¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»òÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£n8n×÷ΪAIÁìÓòÈÈÃŹ¤¾ß £¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î £¬£¬£¬Docker HubÀ­È¡Á¿ÆÆÒÚ´Î £¬£¬£¬Ö÷ÒªÓÃÓÚÅþÁ¬Ó¦Óá¢API¼°Ð§À͹¹½¨×Ô¶¯»¯ÊÂÇéÁ÷ £¬£¬£¬²¢Ö§³ÖÓëLLMЧÀͼ¯³É¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚn8n´¦Öóͷ£webhookÇëÇóʱµÄÄÚÈÝÀàÐÍ»ìÏý»úÖÆ £¬£¬£¬µ±ÇëÇóµÄContent-Type±»Î±ÔìΪ·Çmultipart/form-data£¨Èçapplication/json£©Ê± £¬£¬£¬ÏµÍ³»áÈÆ¹ýÎļþÉÏ´«ÆÊÎöÆ÷µÄÇå¾²·À»¤ £¬£¬£¬Ö±½Ó´¦Öóͷ£Îļþ×ֶζøÎ´ÑéÖ¤ÊÇ·ñΪÓÐÓÃÉÏ´«¡£¡£¡£¡£¡£Õâʹ¹¥»÷Õß¿Éͨ¹ý²Ù¿Øreq.body.files¹¤¾ßµÄfilepath²ÎÊý £¬£¬£¬¶ÁÈ¡n8nʵÀýÉϵÄí§ÒâÍâµØÎļþ £¬£¬£¬°üÀ¨´æ´¢APIÃÜÔ¿¡¢OAuthÁîÅÆ¡¢Êý¾Ý¿âƾ֤¡¢ÔÆ´æ´¢»á¼ûȨÏÞµÈÃô¸ÐÐÅÏ¢µÄÉèÖÃÎļþ¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬n8nÒÑÐû²¼1.121.0¼°ÒÔÉÏÐÞ¸´°æ±¾ £¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/


4. °²×¿¶ñÒâÈí¼þʹÓÃNFCÊÖÒÕʵÏַǽӴ¥Ê½Ö§¸¶Ú²Æ­


1ÔÂ8ÈÕ £¬£¬£¬Group-IB×îб¨¸æÕ¹ÏÖ £¬£¬£¬Ò»ÖÖÐÂÐͰ²×¿¶ñÒâÈí¼þÕýͨ¹ýTelegramÖÐÎÄÍøÂç·¸·¨ÉçÇøÈö²¥ £¬£¬£¬Ê¹¹¥»÷ÕßÎÞÐèÎïÀí½Ó´¥Êܺ¦ÕßÒøÐп¨¼´¿ÉÍê³É·Ç½Ó´¥Ê½Ö§¸¶Ú²Æ­¡£¡£¡£¡£¡£ÏÖÔÚÒÑ·¢Ã÷54¸ö¶ñÒâAPKÑù±¾ £¬£¬£¬¶àαװ³ÉÕýµ±½ðÈÚ»òÖ§¸¶Ó¦Óà £¬£¬£¬Í¨¹ý¶ÌÐÅ/ÓïÒô´¹ÂÚÓÕÆ­Óû§×°Öà £¬£¬£¬²¢ÒªÇó½«Ö§¸¶¿¨Ìù½üÊÖ»úÒÔ¼¤»îNFCÊý¾Ý²¶»ñ¹¦Ð§¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ½ÓÄÉ¡°Ë«Ó¦ÓÃЭ×÷¡±Ä£Ê½£ºÊܺ¦ÕßÊÖ»úÖеġ°¶ÁÈ¡Æ÷¡±Ó¦Óò¶»ñNFC¿¨Êý¾Ýºó £¬£¬£¬Í¨¹ýC2ЧÀÍÆ÷´«ÊäÖÁ·¸·¨·Ö×Ó¿ØÖƵÄ×°±¸ £» £»£»¹¥»÷ÕßʹÓá°Çû÷Æ÷¡±Ó¦ÓÃÔÚ²»·¨POSÖÕ¶ËÍê³ÉÉúÒâ £¬£¬£¬»òͨ¹ýÒÆ¶¯Ç®°üÏ´Ç®ÍøÂçÔÚ¶à¹úʵÌåµê¹ºÎï £¬£¬£¬ÊµÏÖ×ʽð͵ȡ¡£¡£¡£¡£¡£²¿·Ö°¸ÀýÏÔʾ £¬£¬£¬·¸·¨·Ö×Ó¿ÉÍêÈ«ÈÆ¹ýÓëÊܺ¦ÕßÖ±½Ó½Ó´¥ £¬£¬£¬½öͨ¹ýÔ¤¼ÓÔØ±»µÁ¿¨Êý¾ÝµÄÒÆ¶¯Ç®°ü¼´¿ÉÍê³ÉÉúÒâ¡£¡£¡£¡£¡£TelegramÉϵÄTX-NFC¡¢X-NFC¡¢NFU PayµÈ¹©Ó¦É̹ûÕæÏúÊÛ´ËÀà¶ñÒâÈí¼þ £¬£¬£¬½ÓÄÉ¶ÌÆÚÊÔÓÃÖÁ¶àÔ¶©ÔĵÄÊÕ·Ñģʽ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/


5. µÂÖÝGulshan¹«Ë¾37.7Íò¿Í»§Êý¾ÝÔâй¶


1ÔÂ7ÈÕ £¬£¬£¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵÄGulshan Management Services, Inc.¹«Ë¾¿ËÈÕ֤ʵ±¬·¢´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ £¬£¬£¬Ó°ÏìÁè¼Ý377,000Ãû¿Í»§¼°Ô±¹¤¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔËÓª×ÅÈ«ÃÀ150Óà¼ÒHandi PlusºÍHandi StopÆ·ÅÆ¼ÓÓÍÕ¾Óë±ãµ±µê £¬£¬£¬ÒòÉæ¼°ÏûºÄÕßÖ§¸¶¡¢Ô±¹¤µµ°¸¼°¹©Ó¦Á´Êý¾Ý £¬£¬£¬³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎļþÅû¶ £¬£¬£¬2025Äê9ÔÂ17ÈÕÖÁ27ÈÕʱ´ú £¬£¬£¬¹¥»÷Õß²»·¨»á¼ûÁ˸ù«Ë¾Íⲿϵͳ £¬£¬£¬Îó²îÖ±ÖÁ27Èղű»·¢Ã÷¡£¡£¡£¡£¡£È»¶ø £¬£¬£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÖ±ÖÁ2026Äê1ÔÂ5ÈÕ²ÅÊÕµ½ÊéÃæÍ¨Öª £¬£¬£¬¾àÀëÊÂÎñ¿¢ÊÂÒѳ¬Èý¸öÔ £¬£¬£¬Ô¶³¬Ö´·¨»®¶¨µÄת´ïʱÏÞ¡£¡£¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°Ãô¸ÐÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼Ýʻ֤ºÅ¡¢Õþ¸®ID£¨È绤ÕÕ/ÖÝÉí·ÝÖ¤£©¡¢ÒøÐÐÕ˺ż°ÐÅÓÿ¨/½è¼Ç¿¨ºÅÂëµÈ £¬£¬£¬ÏÔÖøÔöÌíÉí·Ý͵ÇÔΣº¦¡£¡£¡£¡£¡£µÂ¿ËÈøË¹ÖÝ×ÜÉó²éÓŵãµÄ×ÔÁ¦±¨¸æ½øÒ»²½Ö¤Êµ £¬£¬£¬²ÆÎñÐÅÏ¢ÓëÉí·Ý±êʶÊý¾ÝµÄ̻¶ʹÊܺ¦ÕßÃæÁÙ½ðÈÚڲƭ¼°Éí·ÝðÓõÄË«ÖØÍþв¡£¡£¡£¡£¡£


https://hackread.com/data-breach-us-gas-stations-company/


6. Óʼþ·ÓÉÉèÖÃÎó²î³É´¹ÂÚ¹¥»÷ÐÂ;¾¶


1ÔÂ7ÈÕ £¬£¬£¬Î¢Èí×îб¨¸æÕ¹ÏÖ £¬£¬£¬×Ô2025Äê5ÔÂÆð £¬£¬£¬ÍøÂç´¹ÂÚ¹¥»÷ÕßÕýʹÓÃÉèÖùýʧµÄÓʼþ·ÓɺÍÓÕÆ­± £» £»£»¤²½·¥ £¬£¬£¬Î±Ôì×éÖ¯»ú¹¹ÓòÃû·¢ËÍ¿´ËÆÄÚ²¿ÓʼþµÄ´¹ÂÚÐÅÏ¢ £¬£¬£¬²¢Í¨¹ýTycoon2FAµÈÉí·ÝÈÏÖ¤¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨ÇÔȡƾ֤¡£¡£¡£¡£¡£´ËÀ๥»÷ͨ¹ýÖØºàáéÓɳ¡¾°ºÍ±¡Èõ·À»¤²½·¥ £¬£¬£¬Ê¹ÓʼþÖ÷ÌâαװÕëÑÔÒôÓʼþ¡¢¹²ÏíÎĵµ¡¢ÈËÁ¦×ÊԴ֪ͨ¡¢ÃÜÂëÖØÖõȳ£¼û³¡¾° £¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÐéαÑéÖ¤ÂëÒ³Ãæ £¬£¬£¬×îÖÕÌø×ªÖÁTycoon2FA´¹ÂÚ½çÃæ £¬£¬£¬²»µ«ÇÔÈ¡Õ˺ÅÃÜÂë £¬£¬£¬»¹¿ÉÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©ÊµÑé½ðÈÚÕ©Æ­¡£¡£¡£¡£¡£¹¥»÷ÀÖ³ÉÒªº¦ÔÚÓÚÄ¿µÄ×â»§µÄÓʼþϵͳ±£´æÉèÖÃȱÏÝ£ºMX¼Í¼δָÏòOffice 365¡¢DMARCÕ½ÂÔÉèΪ¡°ÎÞ¡±»ò¿íËÉģʽ¡¢SPFÑé֤δÆôÓÃӲʧ°Ü¡¢DKIMÊðÃûȱʧ»òµÚÈý·½ÅþÁ¬Æ÷ÉèÖùýʧ¡£¡£¡£¡£¡£ÕâЩÎó²îʹ¹¥»÷ÕßÄÜαÔì¡°·¢¼þÈË¡±Óë¡°ÊÕ¼þÈË¡±ÏàͬµØµãµÄÓʼþ £¬£¬£¬ÖÆÔì¡°ÄÚ²¿Í¨Ñ¶¡±¼ÙÏ󡣡£¡£¡£¡£Ö»¹ÜÓʼþÍ·¿ÉÄÜÏÔʾSPF/DMARCÑé֤ʧ°Ü¡¢È±ÉÙDKIMÊðÃû»òÀ´×ÔÄäÃûÍⲿЧÀÍÆ÷ £¬£¬£¬µ«ÔÚ·À»¤È±Ê§µÄÇéÐÎÖÐÈÔÄÜÖ±´ïÓû§ÊÕ¼þÏä¡£¡£¡£¡£¡£


https://securityaffairs.com/186638/hacking/misconfigured-email-routing-enables-internal-spoofed-phishing.html