PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼ÒÓÇÓô£¬×¨¼Ò²Â²â»òÔâÍøÂç¹¥»÷

°ä²¼¹¦·ò 2025-02-10

1. PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼ÒÓÇÓô£¬×¨¼Ò²Â²â»òÔâÍøÂç¹¥»÷


2ÔÂ8ÈÕ£¬PlayStation Network ÔÚÈ«ÇòÁìÓòÄÚÒṈ̃»¾½üÒ»Ì죬Áî¶à¶àÍæ¼ÒÉî¸Ð¾ÚÉ¥¡£ÖÜËÄÍíÉÏ 11 µã×óÓÒ£¬´óÁ¿Óû§ÆðÍ·»ã±¨·þÎñ³öÏÖÎÊÌ⣬¶øË÷Äá¹ÌÈ»ÒÑÈ·ÈÏÕâ´ÎÈ«ÇòÐÔ̱»¾£¬µ«½ØÖÁĿǰÉÐδÌṩÈκξßÌåµÄ¼¼ÊõÐÅÏ¢¡£¾Ý PlayStation on X °ä²¼µÄһƪÎÄÕ¼°×´Ì¬Ò³ÃæÏÔʾ£¬¾­¹ý³¬¹ý 24 Ó×ʱ£¬ÕË»§ÖÎÀí¡¢ÓÎÏ·ºÍÉç½»Ö°ÄÜ¡¢PlayStation Video ÒÔ¼° PlayStation É̵êµÈÏÕЩËùÓÐÔÚÏß·þÎñ¾ù´æÔÚÎÊÌâ¡£ÕâÒ»ÊÂÎñÒý·¢ÁËר¼ÒµÄ²Â²â£¬ÓиÅÏëÒÔΪÎÊÌâµÄ±¾Ô­¿ÉÄÜÊÇÍøÂç¹¥»÷¡£ÊÂʵÉÏ£¬PlayStation Network º¹ÇàÉÏÔøÂÅ´ÎÃæ¶Ô³Á´óÖжÏ£¬ÓÈÆäÊÇ 2011 ÄêÄǴκڿÍÈëÇÖ£¬µ¼ÖÂÓû§Êý¾Ýй¶²¢ÆÈʹ·þÎñ¹Ø¹Ø 23 Ì죬Êý°ÙÍòÓû§Êý¾ÝÒò¶øÂ¶³ö£¬Ë÷Äá×îÖÕÖ§¸¶ÁË 1500 ÍòÃÀÔªµÄºÍ½â½ð£¬²¢ÎªÓû§ÌṩÁËÒ»ÄêµÄÉí·Ý͵ÇÔ±£»¤¡£²»Í⣬ÔÚ 2025 Äê 2 Ô 9 ÈյĸüÐÂÖУ¬×´Ì¬Ò³ÃæÏÔʾËùÓзþÎñ¾ùÒѸ´Ô­Õý³£ÔËÐС£Ö»¹Ü·þÎñÒѸ´Ô­£¬µ«Õâ´ÎÊÂÎñÎÞÒÉÔÙ´ÎÒý·¢ÁËÍæ¼Ò¶Ô PlayStation Network °²È«ÐÔµÄÓÇÓô¡£


https://securityaffairs.com/174005/hacking/playstation-network-global-outage.html


2. ½ü280Íò¸öIPÌáÒé´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷£¬Ö¸±êÖ±Ö¸ÍøÂçÉ豸ƾ֤


2ÔÂ8ÈÕ£¬½ü280Íò¸öIPµØÖ·Õý±»ÓÃÓÚÒ»³¡´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷£¬Ö¸±êÖ±Ö¸Ô̺¬Palo Alto Networks¡¢IvantiºÍSonicWallÔÚÄڵĶàÖÖÍøÂçÉ豸¡£ÕâÖÖ¹¥»÷·½Ê½Í¨¹ý·´¸´³¢ÊÔ·ÖÆçµÄÓû§ÃûºÍÃÜÂë×éºÏÀ´ÈëÇÖÕË»§»òÉ豸£¬Ò»µ©³É¹¦£¬¹¥»÷Õß¼´¿É½ÚÔìÉ豸»òÉøÈëÍøÂç¡£¾ÝShadowserver FoundationÍþв¼à¿ØÆ½Ì¨»ã±¨£¬´ËÀ๥»÷×ÔÉÏÔÂÆð³ÖÐøÖÁ½ñ£¬ÖðÈÕ¶¯Óýü280Íò¸öÔ´IPµØÖ·£¬ÆäÖаÍÎ÷Õ¼±È×î¸ß£¬Æä´ÎÊÇÍÁ¶úÆä¡¢¶íÂÞ˹¡¢°¢¸ùÍ¢¡¢Ä¦Âå¸çºÍÄ«Î÷¸çµÈ¹ú¡£Êܹ¥»÷µÄÉ豸¶àΪ·À»ðǽ¡¢VPN¡¢Íø¹ØµÈ±ßÔµ°²È«É豸£¬ÇÒ¹¥»÷Ô´Í·¶àΪMikroTik¡¢»ªÎª¡¢Ë¼¿Æ¡¢BoaºÍÖÐÐËµÈÆ·ÅƵÄ·ÓÉÆ÷¼°ÎïÁªÍøÉ豸¡£ShadowserverÖ¸³ö£¬¹¥»÷IP·ÖÉ¢ÓÚ¶à¶àÍøÂçºÍ×ÔÖÎϵͳ£¬»òÓë½©Ê¬ÍøÂ缰סլ´úÀíÍøÂçÓйØ¡£ÕâЩ´úÀíͨ¹ý×¡Õ¬ÍøÂç·ÓÉÁ÷Á¿£¬¼Ù×°³Éͨ³£¼ÒÍ¥Óû§£¬ÒÔ¶ã±Ü¼ì²â¡£Îª±£»¤±ßÔµÉ豸£¬½¨Òé¸ü¸ÄĬÈÏÃÜÂë¡¢Ö´Ðжà³É·ÖÉí·ÝÑéÖ¤¡¢ÉèÖÃÊÜÐÅÀµIPÔÊÐíÁÐ±í¡¢½ûÓ÷DZØÒªWebÖÎÀí½çÃæ£¬²¢ÊµÊ±¸üй̼þºÍ°²È«²¹¶¡¡£


https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/


3. 7-ZipÁãÈÕ·ì϶£º¶íÂÞ˹ºÚ¿ÍÀûÓÃMotWÈÆ¹ý¼¼Êõ·¢Æð¹¥»÷


2ÔÂ4ÈÕ£¬×Ô2024Äê9ÔÂÆð£¬¶íÂÞ˹ºÚ¿ÍÀûÓÃ7-ZipÖеÄÁãÈÕ·ì϶CVE-2025-0411£¬³É¹¦ÈƹýÁËWindowsµÄMark of the Web (MotW)°²È«Ö°ÄÜ£¬Õë¶ÔÎÚ¿ËÀ¼µ±¾ÖºÍ¸öÈË×éÖ¯·¢ÆðÁËSmokeLoader¶ñÒâÈí¼þ¹¥»÷¡£MotWÖ°ÄÜÕý±¾ÐÄÔÚÖÒ¸æÓû§¼´½«Ö´ÐеÄÎļþÆðÔ´²»³ÉÐÅ£¬²¢ÒªÇóÈ·ÈÏ£¬µ«ºÚ¿Íͨ¹ýË«³Á´æµµÎļþºÍͬÐÎÎÄ×Ö¼¼Êõ£¬Ê¹¶ñÒâÎļþÔÚ²»´¥·¢ÖÒ¸æµÄÇé¿öÏÂÖ´ÐС£ÕâÐ©ÌØÔìµÄ7-ZipÎļþͨ¹ý´¹µöÓʼþ·¢Ë͸øÖ¸±ê£¬ÀûÓõÄÊDZ»ÈëÇÖµÄÎÚ¿ËÀ¼µ±¾ÖÕË»§£¬ÒÔÈÆ¹ý°²È«¹ýÂËÆ÷¡£Ö»¹Ü7-ZipÔÚ2022ÄêÔö³¤Á˶ÔMotWµÄÖ§³Ö£¬µ«CVE-2025-0411·ì϶ʹµÃMotW±êÖ¾²»»á´«²¼µ½ÄÚ²¿µµ°¸ÄÚÈÝ£¬´Ó¶øÔÊÐí¶ñÒâ¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþÖ±½ÓÆô¶¯¡£×îºó£¬ÕâЩ¹¥»÷´¥·¢ÁËSmokeLoader¸ºÔØ£¬Ò»ÖÖÓÃÓÚ×°ÖÃÐÅÏ¢ÇÔÈ¡·¨Ê½¡¢Ä¾Âí¡¢ÀÕË÷Èí¼þ»ò´´½¨ºóÃŵĶñÒâÈí¼þͶ·ÅÆ÷¡£ÊÜÓ°ÏìµÄ×éÖ¯Ô̺¬ÎÚ¿ËÀ¼¹ú¶ÈÐÐÕþ¾Ö¡¢Ôú²¨ÂÞÈÈÆû³µÔì×÷³§µÈ¶à¸ö¹Ø¼ü²¿ÃÅ¡£Ö»¹ÜÇ÷Ïò¿Æ¼¼ÔÚ·¢ÏÖ·ì϶ºóÒÑÓë7-Zip¿ª·¢ÈËÔ±·ÖÏí¸ÅÏëÑéÖ¤·ì϶£¬²¢Í¨¹ý2024Äê11ÔÂ30ÈÕ°ä²¼µÄ24.09°æ±¾²¹¶¡½â¾öÁË·çÏÕ£¬µ«ÓÉÓÚ7-Zip²»×ã×Ô¶¯¸üÐÂÖ°ÄÜ£¬Óû§ÈÔÐèÊÖ¶¯ÏÂÔØ×îа汾ÒÔÈ·±£°²È«¡£


https://www.bleepingcomputer.com/news/security/7-zip-motw-bypass-exploited-in-zero-day-attacks-against-ukraine/


4. ³¯ÏÊ¡°FlexibleFerret¡±¶ñÒâÈí¼þ£ºÀûÓÃÐéαZoomºÍÇóÖ°Ú¿Æ­¹¥»÷macOSÓû§


2ÔÂ4ÈÕ£¬³¯ÏʶñÒâÈí¼þ¡°FlexibleFerret¡¹Øë¶ÔmacOSÉ豸ºÍ¿ª·¢ÈËÔ±ÌáÒéÁËÒ»³¡¿í·ºµÄ¹¥»÷¡£Õâ¿î¶ñÒâÈí¼þͨ¹ýÐéαµÄZoomÀûÓ÷¨Ê½¡¢ÇóÖ°Ú¿Æ­ºÍÃýÎó»ã±¨ÆÀÂ۵ȼ¿Á©ÓÕÆ­Óû§×°Öá£ËüʹÓõ󻬵ÄÉç»á¹¤³ÌѧսÊõ£¬ÈçÐéαµÄÇóÖ°¿ÚÊÔÁ÷³Ì£¬·¢ËÍ¿´ËÆÒªÇóÈí¼þ¸üеÄÁ´½Ó£¬ÓÕÆ­Ö¸±êÏÂÔØ¶ñÒâÈí¼þ¡£Ö»¹ÜApple×î½ü¼ÓÇ¿ÁËÆäXProtect°²È«¹¤¾ßÒÔÓ¦¶Ô´ËÀàÍþв£¬µ«FlexibleFerretÔÚ×î³õʱÈÔδ±»·¢ÏÖ¡£¸Ã¶ñÒâÈí¼þÔ̺¬Ò»¸ödropper£¬½«¶ñÒâÈí¼þ×°Öõ½ÏµÍ³ÖУ¬²¢´´½¨Î±ÔìµÄZoomÀûÓ÷¨Ê½°ÂÃØÏνӵ½¿ÉÒÉÓò¡£Ëü»¹»áÏÔʾÐéαµÄÃýÎóÐÅÏ¢ÒÔºýŪÊܺ¦Õߣ¬²¢ÔÚºó¶Ü×ÔÐÐ×°Ö㬳ÉÁ¢ÓƾÃÐÔ¡£´Ë±í£¬ºÚ¿Í»¹Ö±½Ó¶Ô×¼¿ª·¢ÈËÔ±£¬Ê¹ÓÃÐéαµÄÃýÎó»ã±¨»òGitHubµÈÍøÕ¾ÉÏµÄÆÀÂÛÀ´ÓÕÆ­ËûÃÇÏÂÔØ¶ñÒâÈí¼þ¡£°²È«×¨¼ÒÒÑ·¢ÏÖ¸ü¶àÓйصĶñÒâÈí¼þÑù±¾£¬²¢Ö¸³ö¹¥»÷ÕßÒѸü¸Ä´ÎÒªÔªËØÒÔÈÆ¹ý±£»¤´ëÊ©¡£Õⳡ³ÖÐø¶ø»îÔ¾µÄ¹¥»÷»î¶¯Åú×¢£¬ÍþвÐÐΪÕßÔÚ²»ÐÝŤת²½ÖèÒÔÔ¤·À±»·¢ÏÖ¡£


https://hackread.com/north-korea-flexibleferret-malware-macos-fake-zoom-job-scams/


5. ADFSÍøÂç´¹µö¹¥»÷£º¹¥»÷Õß¼ÙÒâITÍŶÓÇÔȡʹ´¦


2ÔÂ5ÈÕ£¬Abnormal Security·¢ÏÖÁËһ·Õë¶Ô½ÌÓý¡¢Ò½ÁƱ£½¡ºÍµ±¾Ö×éÖ¯µÄÍøÂç´¹µö»î¶¯£¬¸Ã»î¶¯ÒÔMicrosoft Active DirectoryÁª³ÆÉí·ÝÑéÖ¤·þÎñ£¨ADFS£©ÎªÖ¸±ê£¬Í¨¹ýºýŪÐÔµÇÂ¼Ò³ÃæÇÔÈ¡Óû§Í´´¦²¢Èƹý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©±£»¤¡£¹¥»÷Õß¼ÙÒ⹫˾ITÍŶӷ¢ËÍÓʼþ£¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÓëÕæÊµADFSµÇÂ¼Ò³ÃæÒ»ÖµĴ¹µöÍøÕ¾£¬²¢ÒªÇóÊäÈëÓû§Ãû¡¢ÃÜÂë¼°MFA´úÂë»òºË×¼ÍÆËÍ֪ͨ¡£ÕâЩ¹¥»÷Ö¼ÔÚ»ñÈ¡¹«Ë¾µç×ÓÓʼþÕË»§½Ó¼ûȨÏÞ£¬½ø¶ø½øÐо­¼Ã¶¯»úµÄ¹¥»÷£¬ÈçóÒ×µç×ÓÓʼþй¶£¨BEC£©¡£Abnormal SecurityÖ¸³ö£¬¹¥»÷ÕßʹÓÃÁ˸öÈËVPN°µ²ØµØÎ»£¬²¢·ÖÅä¸ü¿¿½ü×éÖ¯µÄIPµØÖ·¡£Ö»¹ÜÕâЩ¹¥»÷²»»áÖ±½Ó·ÛËéADFS£¬µ«ÀûÓÃÓû§¶ÔÊìϤµÇ¼Á÷³ÌµÄÐÅÀµ£¬Ç±ÔÚÓÐЧÐÔÒÀÈ»ÒýÈËÖõÄ¿¡£Abnormal½¨Òé×é֯Ǩáãµ½¸ü°²È«µÄ½â¾ö¹æ»®£¬ÈçMicrosoft Entra£¬²¢ÒýÈë¶î±íµÄµç×ÓÓʼþ¹ýÂËÆ÷ºÍÒì³£»î¶¯¼ì²â»úÔ죬ÒÔ¾¡Ôç×èÖ¹ÍøÂç´¹µö¹¥»÷¡£


https://bleepingcomputer.com/news/security/hackers-spoof-microsoft-adfs-login-pages-to-steal-credentials/


6. Ó¡¶ÈÒøÐÐÓû§Ôâ·ê´ó¹æÄ£Òƶ¯¶ñÒâÈí¼þ¹¥»÷


2ÔÂ5ÈÕ£¬zLabs×êÑÐÍŶӸ淢ÁËÒ»ÏîÕë¶ÔÓ¡¶ÈÒøÐÐÓû§µÄÒÆ¶¯¶ñÒâÈí¼þ»î¶¯£¬Éæ¼°½ü900¸ö¶ñÒâÈí¼þÑù±¾£¬ÖØÒªÕë¶ÔAndroidÉ豸¡£ÕâЩÑù±¾ÓµÓÐÒ»ÑùµÄ´úÂë½á¹¹¡¢Óû§½çÃæºÍÀûÓ÷¨Ê½»Õ±ê£¬Åú×¢Óɵ¥Ò»ÍþвÐÐΪÕßÌáÒé¡£¸Ã¶ñÒâÈí¼þ²»½öÇÔȡһ´ÎÐÔÃÜÂ룬»¹ÀûÓÃʵʱµç»°ºÅÂë³Á¶¨Ïò¶ÌÐÅ£¬ÁôÏ¿É×·×ÙµÄÊý×Ö×ÙÓ°¡£´Ë±í£¬×êÑÐÈËÔ±·¢ÏÖÁ˳¬¹ý222¸ö¿É½Ó¼ûµÄFirebase´æ´¢Í°£¬Ô̺¬Ô¼50,000ÃûÓû§µÄÃô¸ÐÊý¾Ý£¬ÈçÒøÐÐÏêÇé¡¢ÐÅÓþ¿¨ÐÅÏ¢ºÍÉí·ÝÖ¤Ã÷¡£¶ñÒâÈí¼þͨ¹ýWhatsApp´«²¼£¬¼Ù×°³ÉºÏ·¨ÀûÓÃÓÕÆ­Óû§Ð¹Â¶²ÆÕþÐÅÏ¢¡£¼¼Êõ·ÖÎöÏÔʾ£¬¸Ã¶ñÒâÈí¼þ¼Ò×åÓÐÈý¸ö±äÌ壺¶ÌÐÅת·¢¡¢Firebase-ExlysisºÍ»ìºÏ¡£Firebase¶Ëµã²»×ãÉí·ÝÑéÖ¤»úÔ죬µ¼ÖÂÊý¾Ý¿É¹«¿ª½Ó¼û£¬Ð¹Â¶µÄƾ֤ÔÊÐíδ¾­ÊÚȨ½Ó¼ûÖÎÀíÒDZí°å¡£¹¥»÷Õߵ绰ºÅÂëÖØÒª×¢²áÓÚÓ¡¶ÈÌØ¶¨µØÓò¡£Õâ´Î¹¥»÷ÀûÓÃÒøÐк͵±¾ÖŵÑÔ£¬½áºÏƾ֤͵ÇÔ¡¢¶ÌÐÅÀ¹½ØºÍÍøÂç´¹µö¼¼ÊõÖ´ÐÐδ¾­ÊÚȨÂòÂô¡£


https://securityboulevard.com/2025/02/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/