GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿

°ä²¼¹¦·ò 2026-01-08

1. GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿


1ÔÂ7ÈÕ£¬½üÆÚ£¬GoBruteforcer£¨ÓÖ³ÆGoBrut£©½©Ê¬ÍøÂçÕë¶Ô¶³ö·þÎñÆ÷ÉϵļÓÃÜÇ®±Ò¼°Çø¿éÁ´ÏîÄ¿Êý¾Ý¿âÌáÒéÐÂÒ»ÂÖ¹¥»÷£¬ÆäÖ÷ÌâÌØµãΪÀûÓÃÈËΪÖÇÄÜÌìÉúµÄ·þÎñÆ÷ÅäÖÃʾÀýµ¼ÖµÄÈõÃÜÂë·ì϶£¬ÒÔ¼°¹ýÆÚ¼Ü¹¹ÈçXAMPPµÄĬÈÏÍ´´¦·çÏÕ¡£¸Ã¶ñÒâÈí¼þ»ùÓÚGolang¿ª·¢£¬ÖØÒª¶Ô×¼FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdmin·þÎñ£¬Í¨¹ý±»ÈëÇÖµÄLinux·þÎñÆ÷ɨÃèËæ»ú¹«¹²IPµØÖ·£¬Ö´Ðб©Á¦ÆÆ½âµÇ¼¹¥»÷¡£Check Point×êÑÐÏÔʾ£¬³¬50,000Ì¨ÃæÏò»¥ÁªÍøµÄ·þÎñÆ÷Ò×Êܹ¥»÷£¬³õʼÈëÇÖ¶àͨ¹ýXAMPP·þÎñÆ÷µÄFTPʵÏÖ£¬ÒòÖÎÀíÔ±³£±£ÁôĬÈÏÈõÃÜÂë¡£¹¥»÷Õß»ñÈ¡½Ó¼ûȨÏÞºó£¬Í¨³£½«Web shellÉÏ´«ÖÁWeb¸ùĿ¼£¬»òͨ¹ýÅäÖÃÃýÎóµÄMySQL/phpMyAdminÉÏ´«£¬ÐγÉϰȾÁ´£ºÏÂÔØÆ÷»ñÈ¡IRC»úеÈË£¬×îÖÕ¼ÓÔØ±©Á¦ÆÆ½âÄ£¿é¡£¹¥»÷Æô¶¯ºó£¬ÔÚx86_64¼Ü¹¹ÉÏ¿ÉÆô¶¯¶à´ï95¸öỊ̈߳¬ÑÓ³¤10-400ÃëºóɨÃèËæ»úIPÁìÓò£¬Ìø¹ý˽ÓÐÍøÂç¡¢AWSÔÆ¼°ÃÀ¹úµ±¾ÖÍøÂ硣ÿ¸ö¹¤×÷¹ý³ÌÌìÉúËæ»úIPv4µØÖ·£¬Ì½²â·þÎñ¶Ë¿Ú²¢±éÀúƾ֤Áбí£¬Î¬³ÖÉ趨²¢·¢¼¶±ð¡£


https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/


2. jsPDF¿âÏÖ¸ßΣ·ì϶ÍþвJavaScriptÀûÓð²È«


1ÔÂ7ÈÕ£¬¿í·ºÓÃÓÚJavaScriptÀûÓ÷¨Ê½ÌìÉúPDFµÄjsPDF¿â½üÈÕÆØ³öÑϳÁ°²È«·ì϶£¨±àºÅCVE-2025-68428£©£¬ÑϳÁÐÔÆÀ·Ö´ï9.2¡£¸Ã·ì϶ԴÓÚ4.0°æ±¾Ç°jsPDFµÄNode.js¹¹½¨°æ±¾ÖдæÔڵı¾µØÎļþÔ̺¬Óëõè¾¶±éÀú·çÏÕ£¬µ±Óû§¿É¿ØÊäÈëδ¾­ÑéÖ¤¼´×÷ΪÎļþõè¾¶´«µÝ¸øloadFileº¯Êýʱ£¬¹¥»÷Õ߿ɽè´Ë¶ÁÈ¡±¾µØÎļþϵͳÃô¸ÐÊý¾Ý²¢Ç¶ÈëÌìÉúµÄPDFÎļþ£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡£·ì϶ӰÏìÁìÓòÃ÷È·Ö¸ÏòjsPDFµÄNode.js°æ±¾Îļþ£¬Éæ¼°loadFileº¯Êý¼°Å²Óøú¯ÊýµÄÆäËû²½Öè¡£ÀûÓð²È«¹«Ë¾Endor Labs·ÖÎöÖ¸³ö£¬ÈôÎļþõ辶ΪӲ±àÂë¡¢Ô´×Ô¿ÉÐÅÅäÖûòѡȡÑϸñÔÊÐíÁбíÑéÖ¤£¬ÔòÀûÓÃÄѶÈÏÔÖø½µµÍ £»µ«¼øÓÚjsPDFÔÚnpm×¢²á±íÿÖܳ¬350Íò´ÎÏÂÔØµÄ¿í·ºÊ¹ÓÃÁ¿£¬¸Ã·ì϶ÈÔ±»ÆÀ¹ÀΪÒ×±»»ý¼«ÀûÓõĸ߷çÏÕȱµã¡£½¨¸´¹æ»®ÒÑÔÚjsPDF 4.0.0°æ±¾ÖÐÖ´ÐУ¬Í¨¹ýĬÈÏÏÞ¶ÈÎļþϵͳ½Ó¼û²¢ÒÀÀµNode.jsȨÏÞģʽ×è¶Ï·ì϶õè¾¶¡£


https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/


3. n8nƽ̨"Ni8mare"¸ßΣ·ì϶ÖÂÔ¶³Ì´úÂëÖ´ÐзçÏÕ


1ÔÂ7ÈÕ£¬½üÈÕ£¬¿ªÔ´¹¤×÷Á÷×Ô¶¯»¯Æ½Ì¨n8n±»ÆØ³ö±àºÅΪCVE-2026-21858µÄ"Ni8mare"¸ßΣ·ì϶£¬ÑϳÁˮƽÆÀ·Ö´ïÂú·Ö10·Ö¡£¸Ã·ì϶ӰÏìÈ«Çò³¬10Íǫ̀n8n·þÎñÆ÷Ê·ý£¬¹¥»÷Õß¿ÉÎÞÐèÉí·ÝÑéÖ¤Ô¶³Ì½ÚÔì±¾µØ²¿ÊðµÄn8nƽ̨£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»òÖ´ÐÐËÁÒâºÅÁî¡£n8n×÷ΪAIÁìÓòÈȵ㹤¾ß£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬Docker HubÀ­È¡Á¿ÆÆÒڴΣ¬ÖØÒªÓÃÓÚÏνÓÀûÓá¢API¼°·þÎñ¹¹½¨×Ô¶¯»¯¹¤×÷Á÷£¬²¢Ö§³ÖÓëLLM·þÎñ¼¯³É¡£·ì϶±¾Ô­ÔÚÓÚn8n´¦ÖÃwebhookÒªÇóʱµÄÄÚÈÝÀàÐÍ»ìºÏ»úÔ죬µ±ÒªÇóµÄContent-Type±»Î±ÔìΪ·Çmultipart/form-data£¨Èçapplication/json£©Ê±£¬ÏµÍ³»áÈÆ¹ýÎļþÉÏ´«½âÎöÆ÷µÄ°²È«·À»¤£¬Ö±½Ó´¦ÖÃÎļþ×ֶζøÎ´ÑéÖ¤ÊÇ·ñΪÓÐЧÉÏ´«¡£Õâʹ¹¥»÷Õß¿Éͨ¹ý²Ù¿Øreq.body.files¶ÔÏóµÄfilepath²ÎÊý£¬¶ÁÈ¡n8nÊ·ýÉϵÄËÁÒâ±¾µØÎļþ£¬Ô̺¬´æ´¢APIÃÜÔ¿¡¢OAuthÁîÅÆ¡¢Êý¾Ý¿âƾ֤¡¢ÔÆ´æ´¢½Ó¼ûȨÏÞµÈÃô¸ÐÐÅÏ¢µÄÅäÖÃÎļþ¡£Ä¿Ç°£¬n8nÒѰ䲼1.121.0¼°ÒÔÉϽ¨¸´°æ±¾£¬½¨ÒéÓû§µ±¼´Éý¼¶¡£


https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/


4. °²×¿¶ñÒâÈí¼þÀûÓÃNFC¼¼ÊõʵÏַǽӴ¥Ê½Ö§¸¶Ú²Æ­


1ÔÂ8ÈÕ£¬Group-IB×îл㱨½Òʾ£¬Ò»ÖÖÐÂÐͰ²×¿¶ñÒâÈí¼þÕýͨ¹ýTelegramÖÐÎÄÍøÂç·¸×ïÉçÇø´«²¼£¬Ê¹¹¥»÷ÕßÎÞÐèÎïÀí½Ó´¥Êܺ¦ÕßÒøÐп¨¼´¿ÉʵÏַǽӴ¥Ê½Ö§¸¶Ú²Æ­¡£Ä¿Ç°ÒÑ·¢ÏÖ54¸ö¶ñÒâAPKÑù±¾£¬¶à¼Ù×°³ÉºÏ·¨½ðÈÚ»òÖ§¸¶ÀûÓã¬Í¨¹ý¶ÌÐÅ/ÓïÒô´¹µöÓÕÆ­Óû§×°Ö㬲¢ÒªÇó½«Ö§¸¶¿¨ÇнüÊÖ»úÒÔ¼¤»îNFCÊý¾Ý²¶»ñÖ°ÄÜ¡£¸Ã¶ñÒâÈí¼þѡȡ¡°Ë«ÀûÓúÏ×÷¡±Ä£Ê½£ºÊܺ¦ÕßÊÖ»úÖеġ°¶ÁÈ¡Æ÷¡±ÀûÓò¶»ñNFC¿¨Êý¾Ýºó£¬Í¨¹ýC2·þÎñÆ÷´«ÊäÖÁ·¸×ï·Ö×Ó½ÚÔìµÄÉ豸 £»¹¥»÷ÕßʹÓá°Çû÷Æ÷¡±ÀûÓÃÔÚ·¸·¨POSÖÕ¶ËʵÏÖÂòÂô£¬»òͨ¹ýÒÆ¶¯Ç®°üÏ´Ç®ÍøÂçÔÚ¶à¹úʵÌåµê¹ºÎʵÏÖ×ʽðµÁÈ¡¡£²¿Ã۸ÀýÏÔʾ£¬·¸×ï·Ö×Ó¿ÉÆëÈ«ÈÆ¹ýÓëÊܺ¦ÕßÖ±½Ó½Ó´¥£¬½öͨ¹ýÔ¤¼ÓÔØ±»µÁ¿¨Êý¾ÝµÄÒÆ¶¯Ç®°ü¼´¿ÉʵÏÖÂòÂô¡£TelegramÉϵÄTX-NFC¡¢X-NFC¡¢NFU PayµÈ¹©¸øÉ̹«¿ªÏúÊÛ´ËÀà¶ñÒâÈí¼þ£¬Ñ¡È¡¶ÌÆÚÊÔÓÃÖÁ¶àÔ¶©ÔĵÄÊÕ·Ñģʽ¡£


https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/


5. µÂÖÝGulshan¹«Ë¾37.7Íò¿Í»§Êý¾ÝÔâй¶


1ÔÂ7ÈÕ£¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵÄGulshan Management Services, Inc.¹«Ë¾½üÈÕ֤ʵ²úÉú´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Ó°Ï쳬¹ý377,000Ãû¿Í»§¼°Ô±¹¤¡£¸Ã¹«Ë¾ÔËÓª×ÅÈ«ÃÀ150Óà¼ÒHandi PlusºÍHandi StopÆ·ÅÆ¼ÓÓÍÕ¾Óë·½±ãµê£¬ÒòÉæ¼°Ïû·ÑÕßÖ§¸¶¡¢Ô±¹¤µµ°¸¼°¹©¸øÁ´Êý¾Ý£¬³ÉΪ¹¥»÷Ö¸±ê¡£¾ÝÏòÃåÒòÖÝ×ܼì²ì³¤Ìá½»µÄÎļþÅû¶£¬2025Äê9ÔÂ17ÈÕÖÁ27ÈÕÆÚ¼ä£¬¹¥»÷Õß·¸·¨½Ó¼ûÁ˸ù«Ë¾±í²¿ÏµÍ³£¬·ì϶ֱÖÁ27Èղű»·¢ÏÖ¡£È»¶ø£¬ÊÜÓ°ÏìÓ×ÎÒÖ±ÖÁ2026Äê1ÔÂ5ÈÕ²ÅÊÕµ½ÊéÃæÍ¨Öª£¬¾àÀëÊÂÎñʵÏÖÒѳ¬Èý¸öÔ£¬Ô¶³¬Ë¾ÂÉÀý¶¨µÄ´«µÝʱÏÞ¡£Õâ´ÎÐ¹Â¶Éæ¼°Ãô¸ÐÐÅÏ¢Ô̺¬ÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢¼Ýʻ֤ºÅ¡¢µ±¾ÖID£¨È绤ÕÕ/ÖÝÉí·ÝÖ¤£©¡¢ÒøÐÐÕ˺ż°ÐÅÓþ¿¨/½è¼Ç¿¨ºÅÂëµÈ£¬ÏÔÖøÔö³¤Éí·Ý͵ÇÔ·çÏÕ¡£µÂ¿ËÈøË¹ÖÝ×ܼì²ìÀûÒæµÄ¶ÀÁ¢»ã±¨½øÒ»²½Ö¤Êµ£¬²ÆÕþÐÅÏ¢ÓëÉí·Ý±êʶÊý¾ÝµÄ¶³öʹÊܺ¦ÕßÃæ¶Ô½ðÈÚڲƭ¼°Éí·ÝðÓõÄË«³ÁÍþв¡£


https://hackread.com/data-breach-us-gas-stations-company/


6. Óʼþ·ÓÉÅäÖ÷ì϶³É´¹µö¹¥»÷ÐÂõè¾¶


1ÔÂ7ÈÕ£¬Î¢Èí×îл㱨½Òʾ£¬×Ô2025Äê5ÔÂÆð£¬ÍøÂç´¹µö¹¥»÷ÕßÕýÀûÓÃÅäÖÃÃýÎóµÄÓʼþ·ÓɺͺýŪ± £»¤´ëÊ©£¬Î±Ôì×éÖ¯»ú¹¹ÓòÃû·¢ËÍ¿´ËÆÄÚ²¿ÓʼþµÄ´¹µöÐÅÏ¢£¬²¢Í¨¹ýTycoon2FAµÈÉí·ÝÈÏÖ¤¼´·þÎñ£¨PhaaS£©Æ½Ì¨ÇÔȡƾ֤¡£´ËÀ๥»÷ͨ¹ý¸´ÔÓ·Óɳ¡¾°ºÍÓÄ΢·À»¤´ëÊ©£¬Ê¹ÓʼþÖ÷Ìâ¼Ù×°³ÉÓïÒôÓʼþ¡¢¹²ÏíÎĵµ¡¢ÈËÁ¦×ÊԴ֪ͨ¡¢ÃÜÂë³ÁÖõȳ£¼û³¡¾°£¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÐéαÑéÖ¤ÂëÒ³Ãæ£¬×îÖÕÌø×ªÖÁTycoon2FA´¹µö½çÃæ£¬²»½öÇÔÈ¡Õ˺ÅÃÜÂ룬»¹¿ÉÈÆ¹ý¶à³É·ÖÈÏÖ¤£¨MFA£©Ö´ÐнðÈÚÚ¿Æ­¡£¹¥»÷³É¹¦¹Ø¼üÔÚÓÚÖ¸±ê×â»§µÄÓʼþϵͳ´æÔÚÅäÖÃȱµã£ºMX¼Í¼δָÏòOffice 365¡¢DMARCÕ½ÊõÉèΪ¡°ÎÞ¡±»ò¿íËÉģʽ¡¢SPFÑé֤δÆôÓÃӲʧ°Ü¡¢DKIMÊðÃûȱʧ»òµÚÈý·½ÏÎ½ÓÆ÷ÅäÖÃÃýÎó¡£ÕâЩ·ì϶ʹ¹¥»÷ÕßÄÜαÔì¡°·¢¼þÈË¡±Óë¡°ÊÕ¼þÈË¡±Ò»ÑùµØÖ·µÄÓʼþ£¬Ôì×÷¡°ÄÚ²¿Í¨Ñ¶¡±¼ÙÏó¡£Ö»¹ÜÓʼþÍ·¿ÉÄÜÏÔʾSPF/DMARCÑé֤ʧ°Ü¡¢¶ÌȱDKIMÊðÃû»òÀ´×ÔÄäÃû±í²¿·þÎñÆ÷£¬µ«ÔÚ·À»¤È±Ê§µÄ»·¾³ÖÐÈÔÄÜÖ±´ïÓû§ÊÕ¼þÏä¡£


https://securityaffairs.com/186638/hacking/misconfigured-email-routing-enables-internal-spoofed-phishing.html