Ó¡¶È˰Îñ´¹ÂÚ¹¥»÷°²ÅŶà½×¶ÎÌØ¹¤¿ò¼Ü
Ðû²¼Ê±¼ä 2026-01-281. Ó¡¶È˰Îñ´¹ÂÚ¹¥»÷°²ÅŶà½×¶ÎÌØ¹¤¿ò¼Ü
1ÔÂ26ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»ÆðÕë¶ÔÓ¡¶ÈÓû§µÄÍøÂçÌØ¹¤¹¥»÷»î¶¯£¬£¬£¬¸Ã»î¶¯Í¨¹ýð³äÓ¡¶ÈËùµÃ˰²¿·ÖµÄ´¹ÂÚÓʼþÈö²¥¶à½×¶Î¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£¾ÝeSentireÍþвÏìÓ¦²¿·ÖÆÊÎö£¬£¬£¬¹¥»÷ÕßʹÓÃαÔìµÄ˰Îñ·£¿£¿£¿£¿î֪ͨ·Ö·¢º¬Òþ²ØÎļþµÄZIPѹËõ°ü£¬£¬£¬ÆäÖаüÀ¨Ò»¸ö¿ÉÖ´ÐÐÎļþ¼°¶ñÒâDLLÎļþ¡£¡£¡£¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþͨ¹ýDLL²àÔØÊÖÒÕ¼ÓÔØ¶ñÒâÄ£¿£¿£¿£¿é£¬£¬£¬ÔÚÔËÐÐʱ¼ì²âµ÷ÊÔÆ÷ÑÓ³Ù²¢ÁªÏµÍⲿЧÀÍÆ÷»ñÈ¡ºóÐøÔØºÉ¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÖУ¬£¬£¬ÏÂÔØµÄShellcodeʹÓÃCOMÊÖÒÕÈÆ¹ýÓû§ÕË»§¿ØÖÆ£¨UAC£©ÌáÐÑ»ñÈ¡ÖÎÀíԱȨÏÞ£¬£¬£¬Í¬Ê±ÐÞˢгÌÇéÐο飨PEB£©Î±×°³ÉÕýµ±WindowsÀú³Ì¡°explorer.exe¡±ÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬¶ñÒâÈí¼þÏÂÔØÒ»¸ö32λInno Setup×°ÖóÌÐò£¬£¬£¬¸Ã³ÌÐò»áƾ֤ĿµÄÖ÷»úÊÇ·ñÔËÐÐAvast·À²¡¶¾Èí¼þ¶¯Ì¬µ÷½âÐÐΪ¡£¡£¡£¡£¡£¡£×îÖÕ£¬£¬£¬¹¥»÷Õß°²ÅÅÁËBlackmoonÒøÐÐľÂí±äÖÖ¼°SyncFuture TSMÆóÒµ¹¤¾ß¡£¡£¡£¡£¡£¡£ºóÕß×÷ΪÕýµ±µÄÖÕ¶ËÇå¾²ÖÎÀí¹¤¾ß±»ÖØÐÂʹÓÃÎªÌØ¹¤¿ò¼Ü£¬£¬£¬ÌṩԶ³Ì¼à¿Ø¡¢Êý¾ÝÇÔÈ¡¼°Óû§»î¶¯¼Í¼¹¦Ð§¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
2. WinRAR¸ßΣÎó²îCVE-2025-8088Ôâ¶àÀ๥»÷ÕßÀÄÓÃ
1ÔÂ27ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ESETÓë¹È¸èÍþвÇ鱨С×飨GTIG£©½üÆÚÅû¶£¬£¬£¬WinRARÈí¼þÖеÄCVE-2025-8088¸ßΣ·¾¶±éÀúÎó²îÕý±»¹ú¼ÒÖ§³ÖÐÍÌØ¹¤×éÖ¯¼°¾¼ÃÀûÒæÇý¶¯µÄ·¸·¨ÍÅ»ï´ó¹æÄ£Ê¹Ó㬣¬£¬¾ÙÐгõʼ»á¼û²¢°²ÅŶñÒâÔØºÉ¡£¡£¡£¡£¡£¡£¸ÃÎó²îͨ¹ý±¸ÓÃÊý¾ÝÁ÷£¨ADS£©½«¶ñÒâÎļþдÈëí§ÒâλÖ㬣¬£¬¹¥»÷ÕßÔøÊ¹ÓÃÆäÔÚWindowsÆô¶¯Îļþ¼ÐÖ²È볤ÆÚ»¯¶ñÒâÈí¼þ£¬£¬£¬ÊµÏÖÖØÆôºóÒ»Á¬ÔËÐС£¡£¡£¡£¡£¡£GTIG±¨¸æÖ¸³ö£¬£¬£¬¹¥»÷»î¶¯×Ô2025Äê7ÔÂ18ÈÕÆðÒ»Á¬ÖÁ½ñ£¬£¬£¬Éæ¼°¶íÂÞ˹½áÃ˵ÄRomCom×éÖ¯£¨UNC4895£©¡¢ÒÁÀÊAPT44£¨FROZENBARENTS£©¡¢³¯ÏÊTEMP.Armageddon¼°Öйú¹ØÁª¹¥»÷Õߵȹú¼ÒÖ§³ÖʵÌ壬£¬£¬ÒÔ¼°·Ö·¢XWorm¡¢AsyncRATµÈÔ¶³Ì»á¼û¹¤¾ßµÄ¾¼Ã·¸·¨·Ö×Ó¡£¡£¡£¡£¡£¡£¹¥»÷Á´Í¨³£½«¶ñÒâÔØºÉÒþ²ØÔڹ鵵ÎļþÓÕ¶ü£¨ÈçPDF£©µÄADSÖУ¬£¬£¬Óû§·¿ªWinRARʱ£¬£¬£¬Îó²î»áÌáÈ¡ADSÓÐÓÃÔØºÉ£¬£¬£¬ÌìÉúLNK¡¢HTA¡¢BATµÈ¿ÉÖ´ÐÐÎļþ£¬£¬£¬ÔÚÓû§µÇ¼ʱ×Ô¶¯ÔËÐС£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ËùÓй¥»÷Õß¾ù´Ó¡°zeroplayer¡±µÈ¹©Ó¦ÉÌ´¦»ñÈ¡Îó²îʹÓóÌÐò¡£¡£¡£¡£¡£¡£¸Ã¹©Ó¦ÉÌÈ¥Äê7ÔÂÔø¶µÊÛ´ËÎó²î£¬£¬£¬²¢ÏúÊÛÆäËû¸ß¼ÛÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
3. ÄÍ¿ËÊÓ²ìÀÕË÷ÍÅ»ïÎļþй¶ÊÂÎñ
1ÔÂ27ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬Ô˶¯´ò°ç¾ÞÍ·ÄͿ˹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»Æð¡°Ç±ÔÚµÄÍøÂçÇå¾²ÊÂÎñ¡±¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬World LeaksÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû³ÆÇÔÈ¡ÁËÄÍ¿Ë1.4TBÎļþ£¬£¬£¬°üÀ¨½ü19Íò·ÝÆóÒµÊý¾Ý£¬£¬£¬Éæ¼°ÓªÒµÔËÓªÐÅÏ¢¡£¡£¡£¡£¡£¡£ÄÍ¿ËÔÚÉùÃ÷ÖÐÇ¿µ÷¡°Ê¼ÖÕÖØÊÓÏûºÄÕßÒþ˽ºÍÊý¾ÝÇå¾²¡±£¬£¬£¬²¢ÌåÏÖÕýÆð¾¢ÆÀ¹ÀÇéÐΡ£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬World LeaksËæºó´Óй¶ÁбíÖÐɾ³ýÁËÄÍ¿ËÌõÄ¿£¬£¬£¬Òý·¢Ì¸ÅлòÊê½ðÖ§¸¶ÍƲ⣬£¬£¬µ«ÄÍ¿Ëδ֤ʵÊý¾Ý±»µÁ£¬£¬£¬µÚÈý·½Ò²ÎÞ·¨ÑéÖ¤ÎļþÕæÊµÐÔ¡£¡£¡£¡£¡£¡£¾²é£¬£¬£¬World LeaksʵΪHunters InternationalÀÕË÷Èí¼þµÄ¸üÃû°æ±¾¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2023Äêβ·ºÆð£¬£¬£¬Òò´úÂëÏàËÆÐÔ±»ÊÓΪHiveÀÕË÷Èí¼þµÄ¿ÉÄܱäÌ壬£¬£¬ÔøÐû³Æ¶Ô280ÓàÆð¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£2025Äê1Ô£¬£¬£¬Hunters InternationalÐû²¼·ÅÆúÎļþ¼ÓÃÜÕ½ÂÔ£¬£¬£¬×ªÏòÊý¾ÝÇÔÈ¡ºÍÀÕË÷ģʽ£¬£¬£¬ÀíÓÉÊǹŰåÀÕË÷Èí¼þ²Ù×÷Σº¦¹ý¸ßÇÒÀûÈóϽµ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/
4. SmarterMailЧÀÍÆ÷¸ßΣÎó²îÍþвȫÇò
1ÔÂ27ÈÕ£¬£¬£¬·ÇÓªÀûÇå¾²×éÖ¯Shadowserver¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬Ö¸³öÈ«ÇòÁè¼Ý6000̨SmarterMailЧÀÍÆ÷Òò̻¶ÔÚ»¥ÁªÍøÉÏ£¬£¬£¬¿ÉÄÜÔâÊܱàºÅΪCVE-2026-23760µÄÑÏÖØÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¹¥»÷¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÍøÂçÇå¾²¹«Ë¾watchTowrÓÚ2026Äê1ÔÂ8ÈÕÊ×´ÎÅû¶£¬£¬£¬Éæ¼°SmarterToolsÆìÏÂSmarterMail 9511°æ±¾Ö®Ç°µÄÃÜÂëÖØÖÃAPI¹¦Ð§¡£¡£¡£¡£¡£¡£¾ÝÇ徲ͨ¸æÏÔʾ£¬£¬£¬Æä"force-reset-password"¶Ëµã±£´æÉè¼ÆÈ±ÏÝ£¬£¬£¬ÔÊÐíÄäÃûÇëÇóÇÒδÑéÖ¤ÏÖÓÐÃÜÂë»òÖØÖÃÁîÅÆ£¬£¬£¬¹¥»÷Õß½öÐèÌṩĿµÄÖÎÀíÔ±Óû§ÃûºÍÐÂÃÜÂë¼´¿ÉÖØÖÃÕË»§£¬£¬£¬´Ó¶øÍêÈ«»ñȡϵͳÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¡£watchTowrÑо¿Ö°Ô±ÒÑÐû²¼¿´·¨ÑéÖ¤Îó²îʹÓóÌÐò£¬£¬£¬Ö¤ÊµÎ´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓôËÎó²îÐ®ÖÆÖÎÀíÔ±ÕË»§£¬£¬£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬µ¼Ö¶ÔÊÜÓ°ÏìЧÀÍÆ÷µÄÍêÈ«¿ØÖÆ¡£¡£¡£¡£¡£¡£Shadowserverͨ¹ý°æ±¾¼ì²â·¢Ã÷£¬£¬£¬ÃÀ¹ú£¨4100̨£©¡¢ÂíÀ´Î÷ÑÇ£¨449̨£©¡¢Ó¡¶È£¨188̨£©¡¢¼ÓÄôó£¨166̨£©ºÍÓ¢¹ú£¨146̨£©ÊÇÊÜÓ°Ïì×îÑÏÖØµÄ¹ú¼Ò£¬£¬£¬ÇÒÏÖʵ¹¥»÷ʵÑéÒѱ»ÊӲ쵽¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/187394/hacking/shadowserver-finds-6000-likely-vulnerable-smartermail-servers-exposed-online.html
5. ¶íÂÞ˹Delta¹«Ë¾ÔâÍøÂç¹¥»÷Ö¶àϵͳ̱»¾
1ÔÂ27ÈÕ£¬£¬£¬¶íÂÞ˹±¨¾¯ÓëÇ徲ϵͳ¹©Ó¦ÉÌDelta¹«Ë¾¿ËÈÕÔâÓö¡°´ó¹æÄ£¡¢Ðµ÷ÇÒ×éÖ¯ÑÏÃÜ¡±µÄÍøÂç¹¥»÷£¬£¬£¬µ¼ÖÂÆä¼ÒÍ¥¡¢ÆóÒµ¼°³µÁ¾Ç徲ϵͳЧÀÍ´óÃæ»ýÖÐÖ¹£¬£¬£¬Òý·¢¿Í»§ÆÕ±éͶËß¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Êг¡×ܼàÍßÁÐÀÎÚʲ¿Æ·òÔÚÊÓÆµÉùÃ÷ÖÐÖ¸³ö£¬£¬£¬¹¥»÷Ô´×Ô¡°³ðÊÓÍâ¹ú¡±£¬£¬£¬²¢Ì¹ÑÔÆä¼Ü¹¹¡°ÎÞ·¨µÖÓùÍâÑóÈ«ÐIJ߻®µÄ¹¥»÷¡±¡£¡£¡£¡£¡£¡£×èÖ¹Öܶþ£¬£¬£¬DeltaÍøÕ¾¼°µç»°Ïß·ÈÔÎÞ·¨Ê¹Ó㬣¬£¬¹«Ë¾±»ÆÈͨ¹ýÉ罻ýÌåVKontakteÓëÊýÍòÃû¿Í»§Ïàͬ£¬£¬£¬²¢ÔÊÐíÊÖÒÕÍŶÓÕýÈ«Á¦»Ö¸´ÏµÍ³£¬£¬£¬Ô¤¼ÆºÜ¿ìÖÜÈ«»Ö¸´¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ôì³É¶àÖØÏÖʵӰÏ죺Óû§±¨¸æÆû³µ·ÀµÁ¾¯±¨ÎÞ·¨¹Ø±Õ¡¢³µÁ¾ÎÞ·¨½âËø¡¢Ô¶³ÌÆô¶¯ÏµÍ³¹ÊÕÏ¡¢³µÃÅÒâÍâËø±ÕÉõÖÁÐÐÊ»Öз¢ÄîͷϨ»ð£»£»£»£»£»×¡Õ¬¼°ÉÌÒµÐÞ½¨¾¯±¨ÏµÍ³Ôò×Ô¶¯Çл»ÖÁ½ôÆÈģʽÇÒÎÞ·¨¹Ø±Õ¡£¡£¡£¡£¡£¡£¶íÓïýÌåBazaÔÚTelegramÉÏÅû¶£¬£¬£¬ÊÂÎñ±¬·¢ºóÓû§Ñ¸ËÙ·´ÏìÉÏÊöÎÊÌ⣬£¬£¬¶ø¡¶ÉúÒâÈ˱¨¡·Òà֤ʵ±£´æ´ó¹æÄ£¹ÊÕÏ¡£¡£¡£¡£¡£¡£Ö»¹ÜDelta¼á³ÆÎÞ¿Í»§Êý¾Ýй¶£¬£¬£¬µ«Ò»¸ö×Գƹ¥»÷ÕßµÄTelegramƵµÀÐû²¼Á˾ݳưüÀ¨±»µÁÊý¾ÝµÄ´æµµÎļþ£¬£¬£¬ÆäÕæÊµÐÔ¼°¹¥»÷ÕßÉí·ÝÉÐδ»ñ×ÔÁ¦ºËʵ¡£¡£¡£¡£¡£¡£
https://therecord.media/russia-delta-security-alarm-company-cyberattack
6. SoundCloudÔâShinyHunters¹¥»÷ÖÂ2980ÍòÓû§Êý¾Ýй¶
1ÔÂ27ÈÕ£¬£¬£¬ÒôƵÁ÷ýÌåÆ½Ì¨SoundCloud 2025Äê12ÔÂÔâÓö´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬Ó°ÏìÁè¼Ý2980ÍòÓû§ÕË»§£¬£¬£¬Éæ¼°µç×ÓÓʼþµØµã¡¢µØÀíλÖá¢ÐÕÃû¡¢Óû§Ãû¡¢Í·Ïñ¡¢·ÛË¿Êý¡¢¹Ø×¢ÕßÊý¼°²¿·Ö¹ú¼ÒÐÅÏ¢µÈ¹ûÕæ×ÊÁÏ¡£¡£¡£¡£¡£¡£SoundCloud½¨ÉèÓÚ2007Ä꣬£¬£¬×÷ΪÒÕÊõ¼ÒÖÐÐÄÆ½Ì¨£¬£¬£¬ÏÖÓµÓÐÈ«Çò4000ÍòÒÕÊõ¼ÒÉÏ´«µÄ³¬4ÒÚÊ׸èÇú¡£¡£¡£¡£¡£¡£ÊÂÎñÒòÓÉÓÚºÚ¿ÍÈëÇ֯䏍ÖúЧÀÍÒDZí°å£¬£¬£¬´¥·¢Î´¾ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£SoundCloudÔÚ¼ì²âµ½Òì³£ºóÆô¶¯ÊÂÎñÏìÓ¦³ÌÐò£¬£¬£¬¾ÊÓ²ìÈ·ÈÏÎÞÃô¸ÐÊý¾Ýй¶£¬£¬£¬½öÉæ¼°¹ûÕæÐ¡ÎÒ˽¼Ò×ÊÁÏÐÅÏ¢¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ÀÕË÷ÍÅ»ïShinyHuntersÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬²¢ÏòSoundCloudÌá³öÀÕË÷ÒªÇ󣬣¬£¬Í¬Ê±Í¨¹ýµç×ÓÓʼþ¶ÔÓû§¡¢Ô±¹¤¼°ÏàÖúͬ°é·¢ËÍɧÈÅÐÅÏ¢¡£¡£¡£¡£¡£¡£1ÔÂ15ÈÕ£¬£¬£¬SoundCloud֤ʵ¹¥»÷Õß±£´æÀÕË÷ÐÐΪ£¬£¬£¬ÇÒÊý¾ÝÒѱ»¹ûÕæ¡£¡£¡£¡£¡£¡£´Ë´Îй¶ӰÏìÔ¼20%µÄSoundCloudÓû§£¬£¬£¬´ËǰÓû§Ôø±¨¸æÎÞ·¨»á¼ûƽ̨¼°Ê¹ÓÃVPNʱ·ºÆð403¹ýʧ¡£¡£¡£¡£¡£¡£Êý¾Ýй¶֪ͨЧÀÍHave I Been PwnedÅû¶£¬£¬£¬¹¥»÷ÕßÀֳɽ«¹ûÕæ×ÊÁÏÓëÓû§µç×ÓÓʼþµØµã¹ØÁª£¬£¬£¬Éæ¼°3000ÍòΨһµç×ÓÓʼþµØµã¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/have-i-been-pwned-soundcloud-data-breach-impacts-298-million-accounts/


¾©¹«Íø°²±¸11010802024551ºÅ