ÃÅÂÞ´óѧ32ÍòÈËÊý¾Ýй¶ÊÂÎñ

Ðû²¼Ê±¼ä 2026-01-16

1. ÃÅÂÞ´óѧ32ÍòÈËÊý¾Ýй¶ÊÂÎñ


1ÔÂ14ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÃÀ¹úÃÅÂÞ´óѧ2024Äê12ÔÂ9ÈÕÖÁ23ÈÕÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÍþвÐÐΪÕßÈëÇÖÆäϵͳ£¬£¬ £¬£¬£¬£¬£¬ÇÔÈ¡Áè¼Ý32ÍòÈ˵ÄСÎÒ˽¼Ò¡¢²ÆÎñ¼°¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¸ÃУÔÚ2025Äê9Ô¾­ÎļþÉó²éÈ·ÈÏ£¬£¬ £¬£¬£¬£¬£¬ÊÜÓ°ÏìÕßÉæ¼°Ä¿½ñ¼°Íù½ìѧÉú¡¢½ÌÖ°Ô±¹¤µÈ£¬£¬ £¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ýº­¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅÂë¡¢»¤ÕÕºÅÂë¡¢Ò½ÁÆÐÅÏ¢¡¢µç×ÓÕË»§ÃÜÂë¼°²ÆÎñÕË»§ÏêÇéµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬ £¬£¬£¬£¬£¬Ñ§Ð£×Ô2026Äê1ÔÂ2ÈÕÆðÏòÊÜÓ°ÏìÓû§ÓʼÄ֪ͨ£¬£¬ £¬£¬£¬£¬£¬ÌáÐÑ¼à¿ØÐÅÓñ¨¸æ¼°ÕË»§Òì³££¬£¬ £¬£¬£¬£¬£¬²¢ÌṩCyberScoutÌṩµÄΪÆÚÒ»ÄêÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£ÃÅÂÞ´óѧÀúÊ·¿É×·ËÝÖÁ1933Ä꣬£¬ £¬£¬£¬£¬£¬ÏÖÉú³¤ÎªÓµÓÐŦԼ²¼ÀÊ¿Ë˹¡¢ÐÂÂÞл¶û¼°Ê¥Â¬Î÷ÑÇÈý´óÐ£ÇøµÄ˽Á¢´óѧ£¬£¬ £¬£¬£¬£¬£¬ÔÚУÉú³¬9000ÈË¡£¡£¡£¡£¡£ÃÅÂÞ´óѧËäÆô¶¯ÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬ £¬£¬£¬£¬£¬µ«Òªº¦ÐÅÏ¢Èç¹¥»÷ÕßÉí·Ý¡¢ÏêϸÎó²îÀàÐÍÈÔδÅû¶£¬£¬ £¬£¬£¬£¬£¬Òý·¢¹«ÖÚ¶Ô͸Ã÷¶ÈµÄÖÊÒÉ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/monroe-university-says-2024-data-breach-affects-320-000-people/


2. ÍøÂç×ï·¸ÇÔÈ¡FacebookÓû§Æ¾Ö¤ÐÂÊÖ¶Î


1ÔÂ13ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕý´ó×Ú½ÓÄÉ¡°ä¯ÀÀÆ÷Ì×ä¯ÀÀÆ÷¡±ÊÖÒÕ¶ÔFacebookÓû§ÌᳫÒþ²Ø¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÍýÏëÇÔÈ¡ÆäµÇ¼ƾ֤²¢ÊµÑéºóÐøÚ²Æ­¡£¡£¡£¡£¡£¾ÝTrellixÍøÂçÇå¾²ÍŶÓÑо¿£¬£¬ £¬£¬£¬£¬£¬´ËÀ๥»÷ͨ¹ý´¹ÂÚÓʼþ¼¤Ôö£¬£¬ £¬£¬£¬£¬£¬Óʼþ³£Î±×°³É״ʦÊÂÎñËùÖÒÑÔ¡¢ÕË»§Ç徲֪ͨµÈ£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÓû§¶Ô°æÈ¨ÇÖȨË÷Å⡢δÊÚȨµÇ¼ÌáÐÑ»òÕË»§¹Ø±ÕÖÒÑԵĿֻÅÐÄÀí£¬£¬ £¬£¬£¬£¬£¬ÓÕʹÆäµã»÷αװ³ÉFacebook¹Ù·½Á´½ÓµÄÐéα¶ÌÁ´½Ó¡£¡£¡£¡£¡£¹¥»÷µÄ½¹µãÔÚÓÚ¡°ä¯ÀÀÆ÷Ì×ä¯ÀÀÆ÷¡±µ¯´°µÄ±ÆÕæÐÔ£º¹¥»÷ÕßÔÚÊܺ¦Õßä¯ÀÀÆ÷ÄÚ½¨Éè×Ô½ç˵ÐéαµÇ¼´°¿Ú£¬£¬ £¬£¬£¬£¬£¬¸Ã´°¿Ú°üÀ¨Ó²±àÂëµÄÕæÊµFacebookµÇÂ¼Ò³ÃæURL£¬£¬ £¬£¬£¬£¬£¬²¢Ô¤ÏȰ²ÅÅÐéαÑéÖ¤Âë´°¿Ú£¬£¬ £¬£¬£¬£¬£¬Ê¹Õû¸öÁ÷³ÌÓëÓû§ÊìϤµÄFacebookÈÏÖ¤½çÃæ¸ß¶ÈÒ»Ö£¬£¬ £¬£¬£¬£¬£¬ÊÓ¾õÉÏÄÑÒÔ²ì¾õÒì³£¡£¡£¡£¡£¡£Êܺ¦ÕßÔÚ¡°ÉêËß¡±Ò³ÃæÊ×Ïȱ»ÒªÇóÌîдÐÕÃû¡¢ÓÊÏä¡¢µç»°¡¢³öÉúÈÕÆÚµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ËæºóÔÚµÚ¶þÒ³Ãæ¡°È·ÈÏ¡±ÃÜÂ룬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÐÅÏ¢¼°Æ¾Ö¤±»ÇÔÈ¡¡£¡£¡£¡£¡£´ËÀ๥»÷µÄÄîÍ·°üÀ¨Ð®ÖÆÕË»§¡¢ÇÔȡСÎÒ˽¼ÒÊý¾Ý¡¢ÊµÑéÉí·Ýڲƭ»òÏòÓû§ÁªÏµÈËÈö²¥Õ©Æ­¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/phishing-scams-exploit-browser/


3. ΢ÈíÁªºÏ¶à¹úµ·»ÙRedVDSÍøÂç·¸·¨Æ½Ì¨


1ÔÂ15ÈÕ£¬£¬ £¬£¬£¬£¬£¬Î¢Èí¿ËÈÕÐû²¼ÀÖ³É̱»¾È«ÇòÍøÂç·¸·¨Æ½Ì¨RedVDS£¬£¬ £¬£¬£¬£¬£¬¸Ãƽ̨×Ô2025Äê3ÔÂÒÔÀ´½öÔÚÃÀ¹ú¾ÍÔì³É³¬4000ÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£×÷Ϊ"ÍøÂç·¸·¨¼´Ð§ÀÍ"£¨CaaS£©µä·¶´ú±í£¬£¬ £¬£¬£¬£¬£¬RedVDSͨ¹ýredvds[.]comµÈÓòÃûÏòStorm-0259µÈ·¸·¨¼¯ÍÅÌṩÿÔ½öÐè24ÃÀÔªµÄÐéÄâWindowsЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬Ö§³ÖÎÞÏÞÖÆÖÎÀíÔ±¿ØÖÆ£¬£¬ £¬£¬£¬£¬£¬Ê¹Ú²Æ­ÐÐΪʵÏֵͱ¾Ç®¡¢¹æÄ£»£»£»£»£»£»£»¯ÇÒÄÑÒÔ×·×Ù¡£¡£¡£¡£¡£ÔÚÅ·ÖÞÐ̾¯×éÖ¯ÓëµÂ¹úÕþ¸®ÅäºÏÏ£¬£¬ £¬£¬£¬£¬£¬Î¢ÈíÔÚÃÀ¹ú¡¢Ó¢¹úÌáÆðÃñÊÂËßËÏ£¬£¬ £¬£¬£¬£¬£¬²é·âÆä¶ñÒâ»ù´¡ÉèÊ©²¢ÏÂÏßÊг¡ÃÅ»§¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬£¬£¬£¬£¬RedVDS×Ô2019ÄêÔËÓªÖÁ½ñ£¬£¬ £¬£¬£¬£¬£¬ËùÓÐÐéÄâ»ú¾ùʹÓÿË¡µÄWindows Server 2022¾µÏñ£¬£¬ £¬£¬£¬£¬£¬¹²ÏíÅÌËã»úÃû³Æ"WIN-BUNS25TD77J"µÄÊÖÒÕÌØÕ÷³ÉΪ׷×ÙÒªº¦¡£¡£¡£¡£¡£ÆäЧÀÍÆ÷×âÓÃ×ÔÃÀ¡¢Ó¢¡¢·¨µÈÁù¹úµÚÈý·½ÍйÜÉÌ£¬£¬ £¬£¬£¬£¬£¬Ê¹·¸·¨·Ö×ÓÄÜ»ñȡĿµÄµØÇøIPµØµã£¬£¬ £¬£¬£¬£¬£¬ÇáËÉÈÆ¹ýµØÀíÇå¾²¹ýÂË¡£¡£¡£¡£¡£¹¥»÷ÕßÁ¬ÏµAI¹¤¾ßÌìÉú¸ß·ÂÕæ´¹ÂÚÓʼþ£¬£¬ £¬£¬£¬£¬£¬ÉõÖÁʹÓû»Á³¡¢ÓïÒô¿Ë¡ð³ä¿ÉÐÅ×éÖ¯¡£¡£¡£¡£¡£Êý¾ÝÏÔʾ£¬£¬ £¬£¬£¬£¬£¬¿ØÖÆ2600̨ÐéÄâ»úµÄ·¸·¨·Ö×ÓÈÕ¾ù·¢ËͰÙÍò·â´¹ÂÚÓʼþ£¬£¬ £¬£¬£¬£¬£¬ËĸöÔÂÄÚ¹¥ÆÆ½ü20Íò΢ÈíÕË»§£¬£¬ £¬£¬£¬£¬£¬È«Çò³¬19.1Íò×éÖ¯Êܲ¨¼°¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-seizes-servers-disrupts-massive-redvds-cybercrime-platform/


4. ²¨À¼´ì°ÜÕë¶ÔÄÜÔ´»ù´¡ÉèÊ©µÄÑÏÖØÍøÂç¹¥»÷


1ÔÂ15ÈÕ£¬£¬ £¬£¬£¬£¬£¬²¨À¼Õþ¸®Ðû²¼Àֳɴì°ÜÒ»ÆðÕë¶ÔÆäÄÜÔ´»ù´¡ÉèÊ©µÄÖØ´óÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬£¬³ÆÕâÊǽüÄêÀ´¶Ô¸Ã¹úÄÜԴϵͳ×îÑÏÖØµÄÍþв¡£¡£¡£¡£¡£¾ÝÄÜÔ´²¿³¤Ã×ÎÖʲ¡¤ÄªµÙ¿¨Åû¶£¬£¬ £¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÓÚ2025Äê12ÔÂ⣬£¬ £¬£¬£¬£¬£¬ºÚ¿Í½«Ä¿µÄËø¶¨ÔÚ²¨À¼ÌìÏ´󲿷ֵØÇø¿ÉÔÙÉúÄÜÔ´ÉèÊ©£¨°üÀ¨Ì«ÑôÄÜ·¢µç³¡ºÍ·çÁ¦ÎÐÂÖ»ú£©ÓëµçÁ¦ÅäµçÔËÓªÉÌÖ®¼äµÄͨѶϵͳ£¬£¬ £¬£¬£¬£¬£¬ÊÔͼͨ¹ýÆÆËðÒªº¦Í¨Ñ¶Á´Â·Òý·¢´ó¹æÄ£Í£µç¡£¡£¡£¡£¡£Êý×Ö»¯ÊÂÎñ²¿³¤¿ËÈÕʲÍзò¡¤¼Ó¶û¿Æ·ò˹»ùÔÚ1ÔÂ13ÈÕµÄÐÂÎÅÐû²¼»áÉÏÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬¸ÃÊÂÎñ¡°ºÜÊÇ¿¿½üµ¼ÖÂÌìÏÂÐÔÍ£µç¡±£¬£¬ £¬£¬£¬£¬£¬ÇÒ¹¥»÷·ºÆð¡°Ð­µ÷ÆÆËðÐж¯µÄÏÔ×ÅÌØÕ÷¡±¡£¡£¡£¡£¡£Ëû½øÒ»²½Ö¸³ö£¬£¬ £¬£¬£¬£¬£¬¹¥»÷µÄ¹æÄ£¡¢ÈëÇÖ·¾¶¼°Ä»ºó²ß»®¾ùÅú×¢ÕâÊÇÒ»´Î¡°ÐîÒâÇжϲ¨À¼¹«ÃñµçÁ¦¹©Ó¦µÄÆÆËðÐÐΪ¡±£¬£¬ £¬£¬£¬£¬£¬²¢Ö±Ö¸¶íÂÞ˹ΪĻºóºÚÊÖ¡£¡£¡£¡£¡£ÓëÒÔÍùÕë¶Ô´óÐÍ·¢µç³§»òÊäµçÍøÂçµÄÍøÂç¹¥»÷²î±ð£¬£¬ £¬£¬£¬£¬£¬±¾´ÎÊÂÎñÊ×´ÎͬʱÃé×¼¶à¸öÂþÑÜʽСÐÍÄÜÔ´ÉèÊ©£¬£¬ £¬£¬£¬£¬£¬ÕâÖÖÐÂÐ͹¥»÷ģʽÒý·¢²¨À¼¹Ù·½¸ß¶ÈСÐÄ¡£¡£¡£¡£¡£


https://therecord.media/poland-cyberattack-grid-russia


5. ÕùÒéÍøÕ¾¡°ICEÃûµ¥¡±ÔâDDoS¹¥»÷̱»¾


1ÔÂ15ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÃÀ¹úÁìÍÁÇå¾²²¿Êý¾Ýй¶ÊÂÎñÑÜÉú³öµÄÕùÒéÐÔÍøÕ¾¡°ICEÃûµ¥¡±ÒòÒ»Á¬DDoS¹¥»÷±»ÆÈÏÂÏß¡£¡£¡£¡£¡£¸ÃÍøÕ¾ÓÉÊ×´´È˶àÃ×Äá¿Ë¡¤Ë¹½ðÄÉÓÚ¿ËÈÕ͸¶£¬£¬ £¬£¬£¬£¬£¬×ÔÖܶþÍí¼äÆðÔâÊÜ¡°³¤ÆÚÇÒÖØ´ó¡±µÄÂþÑÜʽ¾Ü¾øÐ§À͹¥»÷£¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂЧÀÍÆ÷̱»¾£¬£¬ £¬£¬£¬£¬£¬Óû§ÎÞ·¨ÅÌÎÊÃÀ¹úÒÆÃñºÍº£¹ØÖ´·¨¾Ö£¨ICE£©¼°ÁìÍÁѲÂß¶Ó4500Ãû̽ԱµÄÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£Ë¹½ðÄÉÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Á÷Á¿ÒÉËÆÀ´×Ô¶íÂÞ˹½©Ê¬ÍøÂçÅ©³¡£¡£¡£¡£¡£¬£¬ £¬£¬£¬£¬£¬µ«Í¨¹ýÊðÀíIPÄÑÒÔ×·×ÙÕæÊµÈªÔ´¡£¡£¡£¡£¡£ËûÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬´ËÀ೤ʱ¼ä¡¢¸ßÖØÆ¯ºóµÄ¹¥»÷ÐèרҵÍŶӲ߻®¡£¡£¡£¡£¡£ÏÖÔÚÍŶÓÕýʵÑéÌæ»»Ð§ÀÍÆ÷»Ö¸´ÍøÕ¾£¬£¬ £¬£¬£¬£¬£¬µ«ÈÏ¿ÉÆä½«Ò»Á¬³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¸ÃÍøÕ¾½¨ÉèÓÚDHSÄÚ²¿¾Ù±¨ÈËй¶Êý¾ÝÖ®ºó£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Ì½Ô±µÄÐÕÃû¡¢ÊÂÇéÓÊÏä¡¢µç»°¡¢Ö°Î»Í·Ïμ°¼òÀúʽÅä¾°ÐÅÏ¢¡£¡£¡£¡£¡£Èô»Ö¸´ÉÏÏߣ¬£¬ £¬£¬£¬£¬£¬ÕâЩÊý¾Ý½«ÓëÏÖÓÐ2000ÃûÁª°îÒÆÃñ¹ÙÔ±ÐÅÏ¢¿âºÏ²¢¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/ice-agent-doxxing-site-ddosed/


6. Gootloader¶ñÒâÈí¼þÉý¼¶·´¼ì²âÊÖÒÕ


1ÔÂ15ÈÕ£¬£¬ £¬£¬£¬£¬£¬Gootloader¶ñÒâÈí¼þ×Ô2020ÄêÆðÒ»Á¬»îÔ¾£¬£¬ £¬£¬£¬£¬£¬±»ÓÃÓÚÀÕË÷Èí¼þ°²ÅŵÈÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£¡£½üÆÚ£¬£¬ £¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Æäͨ¹ýÅþÁ¬500ÖÁ1000¸ö»ûÐÎZIP´æµµÊµÏÖ·´¼ì²âÉý¼¶£¬£¬ £¬£¬£¬£¬£¬ÕâÖֽṹµ¼ÖÂÒÀÀµ7-Zip¡¢WinRARµÈ¹¤¾ßµÄÆÊÎö³ÌÐòÍ߽⣬£¬ £¬£¬£¬£¬£¬¶øWindowsĬÈϽâѹ¹¤¾ßÈÔ¿É´¦Öóͷ£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ½¹µãÊÇÒ»¸ö¹éµµµÄJScriptÎļþ£¬£¬ £¬£¬£¬£¬£¬Í¨¹ýWindows Script Host£¨WScript£©Ö´ÐУ¬£¬ £¬£¬£¬£¬£¬²¢Ê¹ÓÃÏòÆô¶¯Îļþ¼ÐÌí¼ÓËٽݷ½·¨£¨.LNK£©ÊµÏÖ³¤ÆÚÐÔ£¬£¬ £¬£¬£¬£¬£¬ÓÐÓÃÔØºÉÔÚϵͳÆô¶¯Ê±Í¨¹ýNTFS¶ÌÃû³Æ´¥·¢CScript£¬£¬ £¬£¬£¬£¬£¬½ø¶øÌìÉúPowerShellÀú³Ì¡£¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬ £¬£¬£¬£¬£¬ÍþвÐÐΪÕßʵÑéÁ˶àÖØ»ìÏýÊÖÒÕ£ºÊ¹ÓÃÆÊÎöÆ÷´ÓÎļþĩβ¶ÁÈ¡µÄÌØÕ÷ÅþÁ¬¶à¸öZIPÎļþ£»£»£»£»£»£»£»½Ø¶ÏÖÐÑëĿ¼¿¢Ê·û£¨EOCD£©È±ÉÙÁ½¸ö±ØÐè×Ö½Ú£¬£¬ £¬£¬£¬£¬£¬µ¼Ö´ó´ó¶¼¹¤¾ßÎÞ·¨ÆÊÎö£»£»£»£»£»£»£»Ëæ»ú»¯´ÅÅ̱àºÅ×Ö¶ÎÄ£Äâ²»±£´æµÄ¶à´ÅÅ̹鵵£»£»£»£»£»£»£»ÖÆÔìÍâµØÎļþÍ·ÓëÖÐÑëĿ¼ÌõÄ¿¼äµÄÔªÊý¾Ý²»Æ¥Å䣻£»£»£»£»£»£»ÎªÃ¿´ÎÏÂÔØÌìÉúΨһZIP/JScriptÑù±¾¹æ±Ü¾²Ì¬¼ì²â£»£»£»£»£»£»£»½«ZIP×÷ΪXOR±àÂëµÄblobת´ï£¬£¬ £¬£¬£¬£¬£¬ÔÚ¿Í»§¶Ë½âÂë²¢×·¼ÓÖÁËùÐè¾ÞϸÒÔ¹æ±ÜÍøÂç¼ì²â¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gootloader-now-uses-1-000-part-zip-archives-for-stealthy-delivery/