СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ

Ðû²¼Ê±¼ä 2026-01-13

1. СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ


1ÔÂ12ÈÕ £¬£¬£¬ÒÑÍùÁù¸öÔ £¬£¬£¬ºÚ¿ÍƵÈÔʹÓÃä¯ÀÀÆ÷ÄÚä¯ÀÀÆ÷£¨BitB£©ÊÖÒÕ¶ÔFacebookÓû§Ìᳫ´¹ÂÚ¹¥»÷ £¬£¬£¬¸ÃÊÖÒÕÓÉÇå¾²Ñо¿Ô±mr.d0xÓÚ2022Ä꿪·¢ £¬£¬£¬ºó±»ÍøÂç·¸·¨·Ö×ÓÀ©Õ¹ÖÁSteamµÈƽ̨¡£¡£¡£¡£TrellixÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬¹¥»÷Õßͨ¹ýαÔì״ʦÊÂÎñËù֪ͨ¡¢°æÈ¨ÇÖȨÖÒÑÔ»òMetaÇå¾²ÌáÐÑ £¬£¬£¬ÓÕµ¼Óû§µã»÷°üÀ¨ÐéαµÇ¼±íµ¥µÄµ¯³ö´°¿Ú¡£¡£¡£¡£´ËÀà´°¿ÚʹÓÃiframeÊÖÒÕÄ£Äâ¹Ù·½ÈÏÖ¤½çÃæ £¬£¬£¬²¢Í¨¹ý×Ô½ç˵´°¿ÚÎÊÌâºÍURLÔöÇ¿ÓÕÆ­ÐÔ £¬£¬£¬ÉõÖÁ¼ÓÈëËõ¶ÌURLºÍÐéαMetaCAPTCHAÒ³ÃæÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¹¥»÷Á÷³ÌÖÐ £¬£¬£¬Êܺ¦Õß»áÔÚ¹¥»÷Õß¿ØÖƵÄÍøÒ³ÉÏ¿´µ½¿´ËÆÕýµ±µÄä¯ÀÀÆ÷µ¯³ö´°¿Ú £¬£¬£¬ÒªÇóÊäÈëFacebookƾ֤¡£¡£¡£¡£ÓÉÓÚiframeÓëµ×²ã´°¿Ú°ó¶¨ £¬£¬£¬Óû§ÎÞ·¨½«ÆäÍϳöä¯ÀÀÆ÷´°¿Ú £¬£¬£¬ÕâÊÇʶ±ðBitB¹¥»÷µÄÒªº¦ÌØÕ÷¡£¡£¡£¡£Ñо¿Ö¸³ö £¬£¬£¬´ó×Ú´¹ÂÚÒ³ÃæÍйÜÔÚNetlify¡¢VercelµÈÕýµ±ÔÆÆ½Ì¨ £¬£¬£¬Î±×°³ÉMetaÒþ˽ÖÐÐÄ»òÉêËß±íµ¥ £¬£¬£¬ÍøÂçÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£Óë¹Å°å´¹ÂÚÏà±È £¬£¬£¬ÕâÖÖÊÖ·¨Í¨¹ýÀÄÓÃÊÜÐÅÈεĻù´¡ÉèÊ©ÈÆ¹ýÇå¾²¹ýÂËÆ÷ £¬£¬£¬ÓªÔìÐéαÇå¾²¸Ð¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/


2. CISA½ôÆÈÏÂÁîÐÞ²¹Òѱ»Ê¹ÓõÄGogs¸ßΣÎó²î


1ÔÂ12ÈÕ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·ÖÔÚ2026Äê2ÔÂ2ÈÕǰÐÞ²¹Gogs¸ßΣÎó²îCVE-2025-8110¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚPutContents APIµÄ·¾¶±éÀúȱÏÝ £¬£¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷Õßͨ¹ý·ûºÅÁ´½ÓÁýÕÖ´æ´¢¿âÍⲿÎļþ £¬£¬£¬Èƹý´ËǰÐÞ¸´µÄCVE-2024-55947±£»£»£»¤²½·¥ £¬£¬£¬½ø¶øÍ¨¹ýÐÞ¸ÄGitÉèÖÃÎļþ£¨ÈçsshCommand£©Ö´ÐÐí§ÒâÏÂÁî £¬£¬£¬×é³ÉÁãÈÕ¹¥»÷Σº¦¡£¡£¡£¡£Gogs×÷ΪGoÓïÑÔ±àдµÄÇáÁ¿¼¶GitЧÀÍÌæ»»¼Æ»® £¬£¬£¬³£ÓÃÓÚÔ¶³ÌЭ×÷ £¬£¬£¬µ«Æä¿ª·ÅÐÔʹÆä³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£Wiz ResearchÔÚ7ÔÂÊÓ²ì¿Í»§GogsЧÀÍÆ÷¶ñÒâÈí¼þѬȾʱ·¢Ã÷¸ÃÎó²î £¬£¬£¬²¢ÓÚ7ÔÂ17ÈÕ±¨¸æ £¬£¬£¬10ÔÂ30ÈÕ»ñGogsÈ·ÈÏ £¬£¬£¬ÉÏÖÜÐû²¼²¹¶¡¡£¡£¡£¡£È»¶ø £¬£¬£¬11ÔÂ1ÈÕ¼´·ºÆðµÚ¶þ²¨ÁãÈÕ¹¥»÷¡£¡£¡£¡£ÊÓ²ìÏÔʾ £¬£¬£¬³¬1400̨GogsЧÀÍÆ÷̻¶ÓÚ»¥ÁªÍø £¬£¬£¬ÆäÖÐ1250̨ÈÔ¿É»á¼û £¬£¬£¬700¸öʵÀýÏÔʾ±»ÈëÇÖ¼£Ï󡣡£¡£¡£CISAÒѽ«CVE-2025-8110ÁÐÈë¡°ÒÑʹÓÃÎó²îĿ¼¡± £¬£¬£¬Ç¿µ÷´ËÀàÎó²îÊǶñÒâÍøÂç¹¥»÷Õߵij£ÓÃ;¾¶ £¬£¬£¬´ºÁª°î»ú¹¹×é³ÉÖØ´óΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/


3. TargetµÄ¿ª·¢Ð§ÀÍÆ÷ÔÚºÚ¿ÍÉù³ÆÇÔȡԴ´úÂëºóÀëÏß


1ÔÂ12ÈÕ £¬£¬£¬¿ËÈÕ £¬£¬£¬ºÚ¿ÍÔÚGiteaƽ̨Ðû²¼¶à¸öÒÉËÆTarget¹«Ë¾ÄÚ²¿´úÂë¿âµÄÑù±¾ £¬£¬£¬²¢Éù³ÆÕýͨ¹ýµØÏÂÂÛ̳³öÊÛÍêÕûÊý¾Ý¼¯¡£¡£¡£¡£ÊÂÎñÒòÓÉÓÚÉÏÖÜÒ»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÔÚGitea½¨Éè´úÂë¿ÍÕ» £¬£¬£¬°üÀ¨Target²¿·ÖÄÚ²¿´úÂë¡¢¿ª·¢ÕßÎĵµ¼°ÃûΪSALE.MDµÄÎļþ¡£¡£¡£¡£¸ÃÎļþÏÔʾÍêÕûÊý¾Ý¼¯°üÀ¨³¬5.7ÍòÐÐĿ¼ÁÐ±í £¬£¬£¬×ÜÈÝÁ¿Ô¼860GB £¬£¬£¬Éæ¼°"Ç®°üЧÀÍÉøÍ¸²âÊÔ""TargetIDM-TAPProvisioningAPI"µÈÃô¸ÐÏîÄ¿ £¬£¬£¬ÇÒÌá½»ÔªÊý¾ÝÌá¼°¶àλTargetÏÖÈÎÊ×ϯ¹¤³ÌʦÐÕÃû¼°ÄÚ²¿API¶Ëµã£¨Èçconfluence.target.com£© £¬£¬£¬ÌåÏÖÊý¾ÝÔ´×Ô˽Óпª·¢»ù´¡ÉèÊ©¡£¡£¡£¡£TargetµÄGitЧÀÍÆ÷£¨git.target.com£©ÒÑÎÞ·¨´Ó»¥ÁªÍø»á¼û £¬£¬£¬´Ëǰ¸ÃÓòÃûÔøÖØ¶¨ÏòÖÁÔ±¹¤µÇÂ¼Ò³Ãæ £¬£¬£¬µ«ÏÖÒÑÍêȫ崻ú¡£¡£¡£¡£ºÚ¿ÍÐû²¼µÄGitea¿ÍÕ»ÔÚýÌåÁªÏµTargetºó±»É¾³ý £¬£¬£¬·µ»Ø404¹ýʧ £¬£¬£¬ÓëϼÜÇëÇóÒ»Ö¡£¡£¡£¡£ËÑË÷ÒýÇæ»º´æ¼Í¼ÏÔʾ £¬£¬£¬git.target.com²¿·Ö×ÊÔ´Ôø±»Ë÷Òý £¬£¬£¬µ«ÎÞ·¨È·ÈÏÊÇ·ñÓë½üÆÚ̻¶ÊÂÎñÖ±½ÓÏà¹Ø¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/


4. Î÷°àÑÀÄÜÔ´¾ÞÍ·EndesaÅû¶Êý¾Ýй¶ÊÂÎñ


1ÔÂ12ÈÕ £¬£¬£¬Î÷°àÑÀ×î´óÄÜÔ´¹©Ó¦ÉÌEndesa¼°ÆäÔËÓªÉÌEnerg¨ªa XXI¿ËÈÕÅûÂ¶ÖØ´óÇå¾²ÊÂÎñ£ººÚ¿Íͨ¹ý²»·¨»á¼ûÆäÉÌҵƽ̨ £¬£¬£¬ÇÔÈ¡ÁËÓë¿Í»§ÄÜÔ´ÌõÔ¼Ïà¹ØµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£×÷ΪEnel¼¯ÍÅÆìÏÂÆóÒµ £¬£¬£¬EndesaÔÚÎ÷°àÑÀºÍÆÏÌÑÑÀÓµÓг¬1000ÍòÓû§ £¬£¬£¬×ܿͻ§»ùÊýÔ¼2200Íò¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÀàÐͰüÀ¨»ù×Ô¼º·ÝÐÅÏ¢¡¢ÁªÏµÐÅÏ¢¡¢¹úÃñÉí·ÝÖ¤ºÅÂ루DNI£©¡¢ÌõÔ¼ÏêÇé¼°¸¶¿îÐÅÏ¢£¨ÈçIBANÕ˺ţ© £¬£¬£¬µ«¹«Ë¾Ç¿µ÷ÕË»§ÃÜÂëδ±»²¨¼°¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó £¬£¬£¬EndesaѸËÙ½ÓÄɶàÏî·À»¤²½·¥£º·â±ÕÊÜÓ°ÏìÄÚ²¿ÕË»§¡¢µ¼³öÈÕÖ¾¾ÙÐÐÊÖÒÕÆÊÎö¡¢Ôöǿϵͳ¼à¿ØÒÔ¼ì²âºóÐø¿ÉÒɻ £¬£¬£¬²¢Í¬²½ÏòÎ÷°àÑÀÊý¾Ý±£»£»£»¤¾Ö¼°Ïà¹Øî¿Ïµ»ú¹¹±¨¸æ¡£¡£¡£¡£¹«Ë¾Í¨¹ýÕýʽÇþµÀ֪ͨËùÓÐÊÜÓ°Ïì¿Í»§ £¬£¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄÉí·ÝðÓá¢Êý¾Ý͵ÇÔ¼°ÍøÂç´¹ÂÚ¹¥»÷Σº¦ £¬£¬£¬½¨Ò齫¿ÉÒɻ±¨¸æÖÁÖ¸¶¨ºÅÂë¡£¡£¡£¡£EndesaÉùÃ÷³Æ £¬£¬£¬×èÖ¹ÏÖÔÚÎÞÖ¤¾ÝÏÔʾй¶Êý¾ÝÒѱ»Ú²Æ­Ê¹Óà £¬£¬£¬Òò´Ë¶ÔÓû§È¨Á¦ºÍ×ÔÓÉ×é³É¸ßΣº¦µÄ¿ÉÄÜÐԽϵÍ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/


5. APT28Ò»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡»î¶¯


1ÔÂ12ÈÕ £¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄAPT28×éÖ¯£¨ÓÖÃûFancy Bear¡¢BlueDeltaµÈ£©2025Äê2ÔÂÖÁ9ÔÂÒ»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡»î¶¯ £¬£¬£¬Ä¿µÄº­¸ÇÍÁ¶úÆäÄÜÔ´ºÍºËÄÜ»ú¹¹¡¢Å·ÖÞÖǿ⡢±±ÂíÆä¶Ù¼°ÎÚ×ȱð¿Ë˹̹×éÖ¯ £¬£¬£¬·´Ó¦Æä¶ÔÄÜÔ´¡¢¹ú·À¡¢Õþ¸®ÁìÓòµÄÒ»Á¬¹Ø×¢ £¬£¬£¬Óë¶íÂÞ˹Ç鱍֨µã¸ß¶ÈÆõºÏ¡£¡£¡£¡£¸Ã×éÖ¯½ÓÄÉ¡°ÇøÓò¶¨ÖÆÓÕ¶ü+µÍ±¾Ç®»ù´¡ÉèÊ©¡±Õ½ÂÔ£ºÍ¨¹ýÄ£ÄâMicrosoft OWA¡¢Google¡¢Sophos VPNµÄÐéαµÇÂ¼Ò³ÃæÇÔȡƾ֤ £¬£¬£¬²¢Ê¹ÓÃWebhook.site¡¢InfinityFree¡¢Byet Internet Services¡¢ngrokµÈÃâ·ÑÍйܺÍËíµÀЧÀÍÍйܴ¹ÂÚÒ³Ãæ¡¢Ð¹Â¶Êý¾Ý¼°ÊµÏÖÖØ¶¨Ïò¡£¡£¡£¡£ÀýÈç £¬£¬£¬6Ô°²ÅŵÄSophos VPNÃÜÂëÖØÖÃÒ³ÃæÍ¨¹ýJavaScriptÌáÈ¡URL±êʶ·û²¢·¢ËÍÖÁ¹¥»÷Õß¿ØÖÆ¶Ë £¬£¬£¬×îÖÕÖØ¶¨ÏòÖÁÕýµ±VPNÃÅ»§£»£»£»9ÔÂÔòʹÓÃInfinityFreeÍйܵÄOWAÓâÆÚÃÜÂëÒ³Ãæ £¬£¬£¬½«Êܺ¦Õßµ¼Ïò±±ÂíÆä¶Ù¾üÊÂ×éÖ¯¼°ÎÚ×ȱð¿Ë˹̹IT¹«Ë¾µÄÕýµ±µÇÂ¼Ò³Ãæ¡£¡£¡£¡£±ðµÄ £¬£¬£¬¹¥»÷ÕßǶÈ뺣ÍåÑо¿ÖÐÐÄ¡¢ECCOµÈ¿ÉÐÅÖÇ¿âµÄÕýµ±PDFÓÕ¶ü £¬£¬£¬ÏÈÖ¸µ¼Óû§µã»÷ £¬£¬£¬ÔÙÏÔʾαÔìµÇÂ¼Ò³Ãæ £¬£¬£¬Í¨¹ýÒþ²ØHTML±íµ¥ºÍJavaScriptÐűêÇÔÈ¡ÓÊÏä¡¢ÃÜÂë¡¢IP¼°Óû§ÊðÀíÐÅÏ¢ £¬£¬£¬×îºóÖØ¶¨Ïò»ØÕæÊµPDF £¬£¬£¬ÔöÇ¿ÓÕÆ­ÐÔ¡£¡£¡£¡£


https://securityaffairs.com/186801/apt/credential-harvesting-attacks-by-apt28-hit-turkish-european-and-central-asian-organizations.html


6. ÒÁÀÊMuddyWaterÓÃRustyWaterÌᳫ´¹ÂÚ¹¥»÷


1ÔÂ10ÈÕ £¬£¬£¬¿ËÈÕ £¬£¬£¬±»³ÆÎªMuddyWaterµÄÒÁÀʺڿÍ×éÖ¯±»Ö¸Õë¶ÔÖж«µØÇøÍâ½»¡¢º£Ê¡¢½ðÈÚ¼°µçÐÅʵÌå·¢¶¯Óã²æÊ½´¹ÂÚ¹¥»÷ £¬£¬£¬ÆäʹÓûùÓÚRustÓïÑÔ¿ª·¢¡¢´úºÅΪRustyWaterµÄÖ²Èë³ÌÐòʵÑéÈëÇÖ¡£¡£¡£¡£CloudSEKÑо¿Ô±Prajwal AwasthiÔÚ±¨¸æÖÐÖ¸³ö £¬£¬£¬¹¥»÷ͨ¹ýαװ³ÉÍøÂçÇå¾²Ö¸ÄϵĴ¹ÂÚÓʼþ¸½´ø¶ñÒâWordÎĵµ £¬£¬£¬ÓÕµ¼Êܺ¦Õ߯ôÓÃÄÚÈݺ󼤻îVBAºê £¬£¬£¬½ø¶ø°²ÅÅRustyWater³ÌÐò¡£¡£¡£¡£¸ÃÖ²Èë³ÌÐò¾ß±¸Òì²½ÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨Ñ¶¡¢·´ÆÊÎö¼ì²â¡¢Í¨¹ýWindows×¢²á±íʵÏÖ³¤ÆÚ»¯¼°Ä£¿£¿£¿£¿£¿é»¯À©Õ¹ÄÜÁ¦ £¬£¬£¬¿ÉÍøÂçÅÌËã»úÐÅÏ¢¡¢¼ì²âÇå¾²Èí¼þ £¬£¬£¬²¢ÓëC2ЧÀÍÆ÷½¨ÉèÁªÏµÒÔÖ´ÐÐÎļþ²Ù×÷ºÍÏÂÁî¡£¡£¡£¡£´Ë´Î¹¥»÷±ê¼Ç×ÅMuddyWater¹¥»÷ÊÖ·¨µÄÒ»Á¬Ñݱä¡£¡£¡£¡£¸Ã×éÖ¯×Ô2017ÄêÆð±»ÆÀ¹ÀÁ¥ÊôÓÚÒÁÀÊÇ鱨ÓëÇå¾²²¿ £¬£¬£¬½üÄêÀ´Öð²½ïÔÌ­¶ÔÕýµ±Ô¶³Ì»á¼ûÈí¼þµÄÒÀÀµ £¬£¬£¬×ª¶ø½ÓÄɶàÑù»¯¶¨ÖƶñÒâÈí¼þ¿â £¬£¬£¬°üÀ¨Phoenix¡¢UDPGangster¡¢BugSleepºÍMuddyViperµÈ¹¤¾ß¡£¡£¡£¡£´Ë´ÎÒýÈëRustÓïÑÔ¿ª·¢µÄÖ²Èë³ÌÐò £¬£¬£¬½øÒ»²½ÌåÏÖÁËÆä¹¤¾ßÁ´Ïò¸ü½á¹¹»¯¡¢Ä£¿£¿£¿£¿£¿é»¯ºÍµÍÔëÉùµÄÔ¶³Ì»á¼ûľÂíÄÜÁ¦Ñݽø¡£¡£¡£¡£


https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html