Ó¡¶È˰Îñ´¹µö¹¥»÷²¿Êð¶à½×¶Î¼äµý¿ò¼Ü
°ä²¼¹¦·ò 2026-01-281. Ó¡¶È˰Îñ´¹µö¹¥»÷²¿Êð¶à½×¶Î¼äµý¿ò¼Ü
1ÔÂ26ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖһ·Õë¶ÔÓ¡¶Å×û§µÄÍøÂç¼äµý¹¥»÷»î¶¯£¬¸Ã»î¶¯Í¨¹ý¼ÙÒâÓ¡¶ÈËùµÃ˰²¿ÃŵĴ¹µöÓʼþ´«²¼¶à½×¶Î¶ñÒⷨʽ¡£¾ÝeSentireÍþвÏìÓ¦²¿ÃÅ·ÖÎö£¬¹¥»÷ÕßÀûÓÃαÔìµÄ˰Îñ·£¿î֪ͨ·Ö·¢º¬°µ²ØÎļþµÄZIPѹËõ°ü£¬ÆäÖÐÔ̺¬Ò»¸ö¿ÉÖ´ÐÐÎļþ¼°¶ñÒâDLLÎļþ¡£¸Ã¿ÉÖ´ÐÐÎļþͨ¹ýDLL²àÔØ¼¼Êõ¼ÓÔØ¶ñÒâÄ£¿é£¬ÔÚÔËÐÐʱ¼ì²âµ÷ÊÔÆ÷ÑÓ³¤²¢ÁªÏµ±í²¿·þÎñÆ÷»ñÈ¡ºóÐøÔØºÉ¡£¹¥»÷Á´ÖУ¬ÏÂÔØµÄShellcodeÀûÓÃCOM¼¼ÊõÈÆ¹ýÓû§ÕË»§½ÚÔ죨UAC£©ÌáÐÑ»ñÈ¡ÖÎÀíԱȨÏÞ£¬Í¬Ê±Åú¸Ä½ø³Ì»·¾³¿é£¨PEB£©¼Ù×°³ÉºÏ·¨Windows¹ý³Ì¡°explorer.exe¡±ÒÔÌӱܼì²â¡£Ëæºó£¬¶ñÒâÈí¼þÏÂÔØÒ»¸ö32λInno Setup×°Ö÷¨Ê½£¬¸Ã·¨Ê½»áƾ¾ÝÖ¸±êÖ÷»úÊÇ·ñÔËÐÐAvast·À²¡¶¾Èí¼þ¶¯Ì¬µ÷ÕûÐÐΪ¡£×îÖÕ£¬¹¥»÷Õß²¿ÊðÁËBlackmoonÒøÐÐľÂí±äÖÖ¼°SyncFuture TSMÆóÒµ¹¤¾ß¡£ºóÕß×÷ΪºÏ·¨µÄÖն˰²È«ÖÎÀí¹¤¾ß±»³ÁÐÂÀûÓÃΪ¼äµý¿ò¼Ü£¬ÌṩԶ³Ì¼à¿Ø¡¢Êý¾ÝÇÔÈ¡¼°Óû§»î¶¯¼Í¼ְÄÜ¡£
https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
2. WinRAR¸ßΣ·ì϶CVE-2025-8088Ôâ¶àÀ๥»÷ÕßÀÄÓÃ
1ÔÂ27ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾ESETÓë¹È¸èÍþвµý±¨Ó××飨GTIG£©½üÆÚÅû¶£¬WinRARÈí¼þÖеÄCVE-2025-8088¸ßΣõè¾¶±éÀú·ì϶Õý±»¹ú¶ÈÖ§³ÖÐͼäµý×éÖ¯¼°¾¼ÃÀûÒæÇý¶¯µÄ·¸×ïÍÅ»ï´ó¹æÄ£ÀûÓ㬽øÐгõʼ½Ó¼û²¢²¿Êð¶ñÒâÔØºÉ¡£¸Ã·ì϶ͨ¹ý±¸ÓÃÊý¾ÝÁ÷£¨ADS£©½«¶ñÒâÎļþдÈëËÁÒâµØÎ»£¬¹¥»÷ÕßÔøÀûÓÃÆäÔÚWindowsÆô¶¯Îļþ¼ÐÖ²ÈëÓÆ¾Ã»¯¶ñÒâÈí¼þ£¬ÊµÏÖ³ÁÆôºó³ÖÐøÔËÐС£GTIG»ã±¨Ö¸³ö£¬¹¥»÷»î¶¯×Ô2025Äê7ÔÂ18ÈÕÆð³ÖÐøÖÁ½ñ£¬Éæ¼°¶íÂÞ˹½áÃ˵ÄRomCom×éÖ¯£¨UNC4895£©¡¢ÒÁÀÊAPT44£¨FROZENBARENTS£©¡¢³¯ÏÊTEMP.Armageddon¼°Öйú¹ØÁª¹¥»÷Õߵȹú¶ÈÖ§³ÖʵÌ壬ÒÔ¼°·Ö·¢XWorm¡¢AsyncRATµÈÔ¶³Ì½Ó¼û¹¤¾ßµÄ¾¼Ã·¸×ï·Ö×Ó¡£¹¥»÷Á´Í¨³£½«¶ñÒâÔØºÉ°µ²ØÔڹ鵵Îļþµö¶ü£¨ÈçPDF£©µÄADSÖУ¬Óû§´ò¿ªWinRARʱ£¬·ì϶»áÌáÈ¡ADSÓÐÐ§ÔØºÉ£¬ÌìÉúLNK¡¢HTA¡¢BATµÈ¿ÉÖ´ÐÐÎļþ£¬ÔÚÓû§µÇ¼ʱ×Ô¶¯ÔËÐС£ÖµÍ×ÌùÐĵÄÊÇ£¬ËùÓй¥»÷Õß¾ù´Ó¡°zeroplayer¡±µÈ¹©¸øÉÌ´¦»ñÈ¡·ì϶ÀûÓ÷¨Ê½¡£¸Ã¹©¸øÉÌÈ¥Äê7ÔÂÔø¶µÏú´Ë·ì϶£¬²¢ÏúÊÛÆäËû¸ß¼ÛÁãÈÕ·ì϶¡£
https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
3. ÄͿ˵÷²éÀÕË÷ÍÅ»ïÎļþй¶ÊÂÎñ
1ÔÂ27ÈÕ£¬½üÈÕ£¬»î¶¯·þ×°¾ÞÍ·ÄͿ˹«Ë¾Ö¤ÊµÔÚµ÷²éһ·¡°Ç±ÔÚµÄÍøÂ簲ȫÊÂÎñ¡±¡£´Ëǰ£¬World LeaksÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû³ÆÇÔÈ¡ÁËÄÍ¿Ë1.4TBÎļþ£¬Ô̺¬½ü19Íò·ÝÆóÒµÊý¾Ý£¬Éæ¼°ÒµÎñÔËÓªÐÅÏ¢¡£ÄÍ¿ËÔÚÉêÃ÷ÖÐÇ¿µ÷¡°Ê¼ÖÕÆ÷³ÁÏû·ÑÕßÒþÖÔºÍÊý¾Ý°²È«¡±£¬²¢°µÊ¾Õý»ý¼«ÆÀ¹ÀÇé¿ö¡£ÖµÍ×ÌùÐĵÄÊÇ£¬World LeaksËæºó´Óй¶ÁбíÖÐɾ³ýÁËÄÍ¿ËÌõ¿î£¬Òý·¢½»Éæ»òÊê½ðÖ§¸¶²Â²â£¬µ«ÄÍ¿Ëδ֤ʵÊý¾Ý±»µÁ£¬µÚÈý·½Ò²ÎÞ·¨ÑéÖ¤ÎļþÕæÊµÐÔ¡£¾²é£¬World LeaksʵΪHunters InternationalÀÕË÷Èí¼þµÄ¸ÄÃû°æ±¾¡£¸Ã×éÖ¯ÓÚ2023Ëêĺ³öÏÖ£¬Òò´úÂëÀàËÆÐÔ±»ÊÓΪHiveÀÕË÷Èí¼þµÄ¿ÉÄܱäÌå£¬ÔøÐû³Æ¶Ô280ÓàÆð¹¥»÷ÕÆ¹Ü¡£2025Äê1Ô£¬Hunters International°ä·¢ÉÕ»ÙÎļþ¼ÓÃÜÕ½Êõ£¬×ªÏòÊý¾ÝÇÔÈ¡ºÍÀÕË÷ģʽ£¬ÀíÓÉÊÇ´«Í³ÀÕË÷Èí¼þ²Ù·ç¸ñÏÕ¹ý¸ßÇÒÀûÈó½µÂä¡£
https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/
4. SmarterMail·þÎñÆ÷¸ßΣ·ì϶ÍþвȫÇò
1ÔÂ27ÈÕ£¬·ÇͶ»ú°²È«×éÖ¯Shadowserver½üÈÕ°ä²¼»ã±¨£¬Ö¸³öÈ«Çò³¬¹ý6000̨SmarterMail·þÎñÆ÷Òò¶³öÔÚ»¥ÁªÍøÉÏ£¬¿ÉÄÜÔâ·ê±àºÅΪCVE-2026-23760µÄÑϳÁÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶¹¥»÷¡£¸Ã·ì϶ÓÉÍøÂ簲ȫ¹«Ë¾watchTowrÓÚ2026Äê1ÔÂ8ÈÕ³õ´ÎÅû¶£¬Éæ¼°SmarterToolsÆìÏÂSmarterMail 9511°æ±¾Ö®Ç°µÄÃÜÂë³ÁÖÃAPIÖ°ÄÜ¡£¾Ý°²È«²¼¸æÏÔʾ£¬Æä"force-reset-password"¶Ëµã´æÔÚÉè¼ÆÈ±µã£¬ÔÊÐíÄäÃûÒªÇóÇÒδÑéÖ¤ÏÖÓÐÃÜÂë»ò³ÁÖÃÁîÅÆ£¬¹¥»÷Õß½öÐèÌṩָ±êÖÎÀíÔ±Óû§ÃûºÍÐÂÃÜÂë¼´¿É³ÁÖÃÕË»§£¬´Ó¶øÆëÈ«»ñȡϵͳÖÎÀíȨÏÞ¡£watchTowr×êÑÐÈËÔ±ÒѰ䲼¸ÅÏëÑéÖ¤·ì϶ÀûÓ÷¨Ê½£¬Ö¤ÊµÎ´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÀûÓô˷ì϶½Ù³ÖÖÎÀíÔ¹ØË»§£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¬µ¼Ö¶ÔÊÜÓ°Ïì·þÎñÆ÷µÄÆëÈ«½ÚÔì¡£Shadowserverͨ¹ý°æ±¾¼ì²â·¢ÏÖ£¬ÃÀ¹ú£¨4100̨£©¡¢ÂíÀ´Î÷ÑÇ£¨449̨£©¡¢Ó¡¶È£¨188̨£©¡¢¼ÓÄôó£¨166̨£©ºÍÓ¢¹ú£¨146̨£©ÊÇÊÜÓ°Ïì×îÑϳÁµÄ¹ú¶È£¬ÇÒÏÖʵ¹¥»÷³¢ÊÔÒѱ»¹Û²âµ½¡£
https://securityaffairs.com/187394/hacking/shadowserver-finds-6000-likely-vulnerable-smartermail-servers-exposed-online.html
5. ¶íÂÞ˹Delta¹«Ë¾ÔâÍøÂç¹¥»÷Ö¶àϵͳ̱»¾
1ÔÂ27ÈÕ£¬¶íÂÞ˹±¨¾¯Óë°²Õûϵͳ¹©¸øÉÌDelta¹«Ë¾½üÈÕÔâ·ê¡°´ó¹æÄ£¡¢Ðµ÷ÇÒ×éÖ¯çÇÃÜ¡±µÄÍøÂç¹¥»÷£¬µ¼ÖÂÆä¼ÒÍ¥¡¢ÆóÒµ¼°³µÁ¾°²Õûϵͳ·þÎñ´óÃæ»ýÖжϣ¬Òý·¢¿Í»§¿í·ºÍ¶Ëß¡£¸Ã¹«Ë¾Êг¡×ܼàÍßÁÐÀÎÚʲ¿Æ·òÔÚÊÓÆµÉêÃ÷ÖÐÖ¸³ö£¬¹¥»÷Ô´×Ô¡°µÐ¶Ô±í¹ú¡±£¬²¢Ì¹ÑÔÆä¼Ü¹¹¡°ÎÞ·¨Õмܹú±í¾«ÐIJ߶¯µÄ¹¥»÷¡±¡£½ØÖÁÖܶþ£¬DeltaÍøÕ¾¼°µç»°Ïß·ÈÔÎÞ·¨Ê¹Ó㬹«Ë¾±»ÆÈͨ¹ýÉ罻ýÌåVKontakteÓëÊýÍòÃû¿Í»§¹µÍ¨£¬²¢³Ðŵ¼¼ÊõÍŶÓÕýÈ«Á¦¸´Ôϵͳ£¬Ô¤¼ÆºÜ¿ìÈ«Ãæ¸´Ô¡£Õâ´Î¹¥»÷Ôì³É¶à³ÁÏÖʵӰÏ죺Óû§»ã±¨Æû³µ·ÀµÁ¾¯±¨ÎÞ·¨¹Ø¹Ø¡¢³µÁ¾ÎÞ·¨½âËø¡¢Ô¶³ÌÆô¶¯ÏµÍ³¹ÊÕÏ¡¢³µÃÅÒâ±íËø¹ØÉõÖÁÐÐÊ»Öз¢Æð»úϨ»ð£»×¡Õ¬¼°Ã³Ò×¹¹Öþ¾¯±¨ÏµÍ³Ôò×Ô¶¯Çл»ÖÁ´¹Î£Ä£Ê½ÇÒÎÞ·¨¹Ø¹Ø¡£¶íÓïýÌåBazaÔÚTelegramÉÏÅû¶£¬ÊÂÎñ²úÉúºóÓû§Ñ¸¿ì·´À¡ÉÏÊöÎÊÌ⣬¶ø¡¶ÉúÒâÈ˱¨¡·Òà֤ʵ´æÔÚ´óÁìÓò¹ÊÕÏ¡£Ö»¹ÜDelta¼á³ÆÎÞ¿Í»§Êý¾Ýй¶£¬µ«Ò»¸ö×Գƹ¥»÷ÕßµÄTelegramƵ·°ä²¼Á˾ݳÆÔ̺¬±»µÁÊý¾ÝµÄ´æµµÎļþ£¬ÆäÕæÊµÐÔ¼°¹¥»÷ÕßÉí·ÝÉÐδ»ñ¶ÀÁ¢ºËʵ¡£
https://therecord.media/russia-delta-security-alarm-company-cyberattack
6. SoundCloudÔâShinyHunters¹¥»÷ÖÂ2980ÍòÓû§Êý¾Ýй¶
1ÔÂ27ÈÕ£¬ÒôƵÁ÷ýÌåÆ½Ì¨SoundCloud 2025Äê12ÔÂÔâ·ê´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Ó°Ï쳬¹ý2980ÍòÓû§ÕË»§£¬Éæ¼°µç×ÓÓʼþµØÖ·¡¢µØÀíµØÎ»¡¢ÐÕÃû¡¢Óû§Ãû¡¢Í·Ïñ¡¢·ÛË¿Êý¡¢¹Ø×¢ÕßÊý¼°²¿ÃŹú¶ÈÐÅÏ¢µÈ¹«¿ª×ÊÁÏ¡£SoundCloud³ÉÁ¢ÓÚ2007Ä꣬×÷ΪÒÕÊõ¼ÒÖÐÐÄÆ½Ì¨£¬ÏÖÕ¼ÓÐÈ«Çò4000ÍòÒÕÊõ¼ÒÉÏ´«µÄ³¬4ÒÚÊ׸èÇú¡£ÊÂÎñÆðÒòÓÚºÚ¿ÍÈëÇÔì丨Öú·þÎñÒDZí°å£¬´¥·¢Î´¾ÊÚȨ½Ó¼û¡£SoundCloudÔÚ¼ì²âµ½Òì³£ºóÆô¶¯ÊÂÎñÏìÓ¦·¨Ê½£¬¾µ÷²éÈ·ÈÏÎÞÃô¸ÐÊý¾Ýй¶£¬½öÉæ¼°¹«¿ªÓ×ÎÒ×ÊÁÏÐÅÏ¢¡£È»¶ø£¬ÀÕË÷ÍÅ»ïShinyHuntersÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢ÏòSoundCloudÌá³öÀÕË÷ÒªÇó£¬Í¬Ê±Í¨¹ýµç×ÓÓʼþ¶ÔÓû§¡¢Ô±¹¤¼°ºÏ×÷ͬ°é·¢ËÍɧÈÅÐÅÏ¢¡£1ÔÂ15ÈÕ£¬SoundCloud֤ʵ¹¥»÷Õß´æÔÚÀÕË÷ÐÐΪ£¬ÇÒÊý¾ÝÒѱ»¹«¿ª¡£Õâ´Îй¶ӰÏìÔ¼20%µÄSoundCloudÓû§£¬´ËǰÓû§Ôø»ã±¨ÎÞ·¨½Ó¼ûƽ̨¼°Ê¹ÓÃVPNʱ³öÏÖ403ÃýÎó¡£Êý¾Ýй¶֪ͨ·þÎñHave I Been PwnedÅû¶£¬¹¥»÷Õ߳ɹ¦½«¹«¿ª×ÊÁÏÓëÓû§µç×ÓÓʼþµØÖ·¹ØÁª£¬Éæ¼°3000ÍòΨһµç×ÓÓʼþµØÖ·¡£
https://www.bleepingcomputer.com/news/security/have-i-been-pwned-soundcloud-data-breach-impacts-298-million-accounts/


¾©¹«Íø°²±¸11010802024551ºÅ