Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
°ä²¼¹¦·ò 2025-01-021. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
1ÔÂ1ÈÕ£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖҸ棬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£©¡£DEphotoרһÓÚѧÌá¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ°¡£¾Ý0mid16BÐû³Æ£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto£¬µÁÈ¡ÁË55ÍòÓàÃû¿Í»§µÄÓ×ÎÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨Ô̺¬24ÍòÓà·Ýº¬¾ßÌåÓ×ÎÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓþ¿¨ÐÅÏ¢¡£´Ë±í£¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý£¬ÏÔʾ±»½Ó¼ûµÄÊý¾Ý¿âÊý¾Ý³¬¹ý12GB¡£0mid16B°µÊ¾£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto£¬µ«¸Ã¹«Ë¾Î´¼ÓÇ¿±£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð£¬Òò¶øÓÚ12ÔÂ29ÈÕÔÙ´ÎÌáÒé¹¥»÷¡£¾ÝTrustPilotÉÏµÄÆÀÂÛÏÔʾ£¬DEphotoÒÑÆðÍ·ÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£ÁôÕþ²ß°µÊ¾²»Âú£¬ÒÔΪÆä±£ÁôÊý¾Ý¹¦·ò¹ý³¤¡£DEphotoµÄÒþÖÔÕþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£0mid16BÍþв½«ÏúÊÛ50Íò¿Í»§Êý¾Ý¿â£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý£¬µ«Ä¿Ç°Éв»Ã÷ÏÔËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»³Ðŵ¡£
https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/
2. EC2 Grouper£ºÀûÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½Êõ
1ÔÂ1ÈÕ£¬FortiGuard³¢ÊÔÊÒµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯£¬¸Ã×é֯ƵÈÔÀûÓÃAWS¹¤¾ßºÍÊÜËðƾ֤½øÐй¥»÷¡£¸Ã×éÖ¯ÖØÒªÍ¨¹ýÓëÓÐЧÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤£¬²¢Ê¹ÓÃAPI½øÐпúËźÍ×ÊÔ´´´½¨£¬Ô¤·ÀÊÖ¶¯»î¶¯¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§»·¾³Öз¢ÏÖÁËÆä¹ÖÒìµÄÓû§´úÀíºÍ°²È«×鶨ÃûÔ¼¶¨µÈÌØµã£¬µ«ÕâЩָ±ê¶ÔÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»³É¿¿£¬ÓÉÓÚ¹¥»÷ÕßÄܹ»ÇáËÉÅú¸ÄÓû§´úÀí²¢Æ«À붨ÃûÔ¼¶¨¡£×êÑÐÈËÔ±Ö¸³ö£¬Í¨¹ý¶ÈÎöƾ֤й¶ºÍAPIʹÓõÈÐźţ¬°²È«ÍŶÓÄܹ»Ôì¶©¿¿µÃסµÄ¼ì²âÕ½ÊõÀ´ÕмܴËÀ๥»÷¡£ÎªÁËÈ·±£°²È«£¬×éÖ¯Ó¦ÀûÓÃÔÆ°²È«Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ß³ÖÐø¼à¿ØºÍÆÀ¹ÀÔÆ»·¾³µÄ°²È«Ì¬ÊÆ£¬²¢Ö´ÐÐÒì³£¼ì²â¼¼ÊõÀ´¼ø±ðÔÆ»·¾³ÖеÄÒì³£ÐÐΪ¡£´Ë±í£¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄÀûÓÃAWS»ù´¡ÉèÊ©½øÐй¥»÷£¬ÕâÅú×¢ÔÆ»·¾³Ãæ¶Ô³ÖÐøµÄ°²È«Íþв¡£
https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/
3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷£¬Êý¾Ýй¶ÖÁ°µÍø
12ÔÂ31ÈÕ£¬Â޵µºÖÝÒ½Áƺ͸£Àû´òËãϵͳÔâµ½ÁËÍøÂç¹¥»÷£¬ÍøÂç·¸×ï·Ö×ÓÒѽ«²¿ÃÅÇÔÈ¡µÄÎļþ°ä²¼µ½°µÍøÉÏ¡£Öݳ¤µ¤Äá¶û¡¤Âó»ù°µÊ¾£¬¸ÃÖÝÒ»ÏòÔÚΪ´Ë×ö³ï±¸£¬²¢ÒÑÔì¶©±íÁªÕ½Êõ£¬¼¤Àø¿ÉÄÜÊÜÓ°ÏìµÄ¾ÓÃñ±£»¤Ó×ÎÒÐÅÏ¢¡£Ä¿Ç°Éв»Ã÷ÏÔÄÄЩÎļþ±»Ð¹Â¶£¬ITÍŶÓÔÚ·ÖÎö¡£Õƹܽ¨ÉèºÍÊØ»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸×ï·Ö×Ó»ñµÃÁªÏµ£¬²¢ÓëÖݵ±¾ÖºÏ×÷ÁгöÊÜÓ°ÏìÈËÔ±Ãûµ¥£¬½«ÏòËûÃÇ·¢ËÍÐź¯Áìµ¼ÈôºÎ»ñµÃÃâ·ÑÐÅÓþ¼à¿Ø¡£ÊÜÓ°ÏìµÄÖÝ´òËãÔ̺¬Ò½ÁƲ¹Öú¡¢²¹³äÓªÑøÔöÔ®´òËãµÈ¡£Âó»ù¶½´Ù¾ÓÃñ²ÉȡһϵÁдëÊ©±£»¤²ÆÕþÐÅÏ¢£¬ÈçÁªÏµÐÅÓþ»ã±¨»ú¹¹¶³½áÐÅÓþ¡¢ÉèÖÃڲƾ¯±¨¡¢Ê¹Óöà³É·ÖÉí·ÝÑéÖ¤£¬²¢¾¯ÌèÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£·¨ÂɹÙÔ¹ØýÔÚµ÷²éÕâ´ÎÊý¾Ýй¶ÊÂÎñ£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜÓס£
https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/
4. ½ÒʾºÚ¿ÍÈôºÎ½Ù³Ö 35 ¸ö Google Chrome À©´ó·¨Ê½
12ÔÂ31ÈÕ£¬Ò»Â·Õë¶ÔChromeä¯ÀÀÆ÷À©´ó·¨Ê½¿ª·¢ÈËÔ±µÄÍøÂç´¹µö»î¶¯½üÈÕ±»ÆØ¹â£¬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©´ó·¨Ê½±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂ룬ӰÏìÔ¼260ÍòÓû§£¬ÆäÖÐÔ̺¬ÍøÂ簲ȫ¹«Ë¾CyberhavenµÄÀ©´ó·¨Ê½¡£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ£¬µ«ÔçÆÚºÅÁîºÍ½ÚÔì×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒÑ´æÔÚ¡£¹¥»÷Õßͨ¹ý·¢ËͼÙ×°³É¹È¸èµÄ´¹µöµç×ÓÓʼþ£¬Ðû³ÆÀ©´ó·¨Ê½Î¥·´ÁËChromeÍøÉÏÀûÓõêÕþ²ß£¬ÓÕµ¼¿ª·¢ÈËÔ±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÀûÓ÷¨Ê½½Ó¼ûÆäChromeÍøÉÏÀûÓõêÀ©´ó·¨Ê½¡£Ò»µ©»ñµÃ½Ó¼ûȨÏÞ£¬¹¥»÷Õ߾ͻáÅú¸ÄÀ©´ó·¨Ê½ÒÔÔ̺¬¶ñÒâÎļþ£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý£¬Ô̺¬ID¡¢½Ó¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¸æ°×ÕÊ»§ÐÅÏ¢ºÍóÒ×ÕÊ»§µÈ¡£´Ë±í£¬¶ñÒâ´úÂ뻹Ôö³¤Êó±êµã»÷ÊÂÎñ¼àÌýÆ÷£¬²éÕÒÓëFacebookË«³É·ÖÉí·ÝÑéÖ¤»òCAPTCHA»úÔìÓйصĶþάÂëͼÏñ£¬ÒÔÈÆ¹ý2FA±£»¤²¢½Ù³ÖÕË»§¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕߵĺÅÁîºÍ½ÚÔì·þÎñÆ÷£¬ÓÃÓÚ¸÷À๥»÷õè¾¶£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓþ¶î¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϽøÐÐÐéαÐÅÏ¢»òÍøÂç´¹µö»î¶¯£¬»ò½«½Ó¼ûȨÏÞÏúÊÛ¸øËûÈË¡£
https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/
5. GitHubÐéα¡°ÐÇÐÇ¡±·ºÀÄ£ºÚ¿ÆÓë¶ñÒâÈí¼þ½èÊÆ´«²¼
12ÔÂ31ÈÕ£¬GitHubÉÏ´æÔÚʹÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌ⣬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßڿƺͶñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ³ÛÃû¶È£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥£¬¿ÉÓÃÓÚÕ䲨´æ´¢¿â£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿ÃÅ£¬ÍƼöÓйØÄÚÈÝ¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍ·þÎñÀûÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý³ÛÃû¶È¡£Ò»ÏîÐÂ×êÑз¢ÏÖ£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵģ¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£×êÑÐÈËԱʹÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ß·ÖÎöÊý¾Ý£¬¼ø±ð³ö¿ÉÒÉÐÇÐÇ£¬²¢·¢ÏÖ2024ÄêÐéαÐÇÐǻ¼¤Ôö¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ£¬»á¼õÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÀµ¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿£¬²¢ÔÚ¿ÉÄܵÄÇé¿öϲ鳴úÂ룬ÒÔÔ¤·ÀÏÂÔØºýŪÐÔµÄÈí¼þ¡£Ä¿Ç°£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£
https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/
6. TRAC Labs°ä²¼LegionLoader¶ñÒâÈí¼þÉî¿Ì»ã±¨
1ÔÂ1ÈÕ£¬TRAC Labs°ä²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉî¿Ì»ã±¨¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019Äê³õ´Î³öÏÖ²¢³ÖÐøÑݱäµÄ¸´ÔÓÏÂÔØÆ÷¶ñÒâÈí¼þ£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£ËüÖØÒªÓÃC/C++±àд£¬¿ÉÄܲ¿ÊðһϵÁжñÒ⹤¾ß£¬Ô̺¬¿É½«ÊÜϰȾä¯ÀÀÆ÷תΪHTTP´úÀíµÄChromeÀ©´ó·¨Ê½£¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ½Ó¼û¡£×Ô2024Äê8ÔÂÒÔÀ´£¬LegionLoader´«²¼Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡·¨Ê½¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖ÷¨Ê½½øÐд«²¼£¬²¢Ñ¡È¡¶à²ã¼ÓÃܺͻìºÏ¼¼ÊõÌӱܼì²â¡£¸Ã¶ñÒâÈí¼þµÄÅäÖø߶ȿɶ¨Ô죬ÆäÓÐÐ§ÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý£¬ÈçChromeÍ´´¦ºÍÆäËû½âÃÜÃÜÔ¿¡£´Ë±í£¬LegionLoaderͨ¹ýAPI¹¥»÷¹Æ»ó°²È«¹¤¾ß£¬²¢Ê¹ÓüÓÃÜͨѶÓëºÅÁîºÍ½ÚÔì·þÎñÆ÷ÁªÏµ¡£TRAC LabsÌṩÁËÈ«ÃæµÄÈëÇÖÖ¸±êÁÐ±í£¬ÒÔÔ®ÊÖ·ÀÓùÕß¼ø±ðºÍ¼õÇáLegionLoaderϰȾ¡£
https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/


¾©¹«Íø°²±¸11010802024551ºÅ