Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ

Ðû²¼Ê±¼ä 2025-01-02

1. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ


1ÔÂ1ÈÕ£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒÑÔ£¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøַΪDEphoto[.]biz£©¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍÔ˶¯ÉãÓ°¡£¾Ý0mid16BÉù³Æ£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto£¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÀ¨24ÍòÓà·Ýº¬ÏêϸСÎÒ˽¼ÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢¡£±ðµÄ£¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕƬµÈÊý¾Ý£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕƬ¿â¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½Øͼ×÷Ϊ֤¾Ý£¬ÏÔʾ±»»á¼ûµÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB¡£0mid16BÌåÏÖ£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto£¬µ«¸Ã¹«Ë¾Î´ÔöÇ¿±£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð£¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷¡£¾ÝTrustPilotÉϵÄ̸ÂÛÏÔʾ£¬DEphotoÒÑ×îÏÈÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£´æÕþ²ßÌåÏÖ²»Âú£¬ÒÔΪÆä±£´æÊý¾Ýʱ¼ä¹ý³¤¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý£¬µ«ÏÖÔÚÉв»ÇåÎúËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí¡£


https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/


2. EC2 Grouper£ºÊ¹ÓÃAWSƾ֤µÄÔƹ¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½ÂÔ


1ÔÂ1ÈÕ£¬FortiGuardʵÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯£¬¸Ã×é֯ƵÈÔʹÓÃAWS¹¤¾ßºÍÊÜËðƾ֤¾ÙÐй¥»÷¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐÓÃÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤£¬²¢Ê¹ÓÃAPI¾ÙÐÐÕì̽ºÍ×ÊÔ´½¨É裬×èÖ¹ÊÖ¶¯Ô˶¯¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§ÇéÐÎÖз¢Ã÷ÁËÆäÆæÒìµÄÓû§ÊðÀíºÍÇå¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷£¬µ«ÕâЩָ±ê¹ØÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»¿É¿¿£¬ÓÉÓÚ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨¡£Ñо¿Ö°Ô±Ö¸³ö£¬Í¨Ì«¹ýÎöƾ֤й¶ºÍAPIʹÓõÈÐźÅ£¬Çå¾²ÍŶӿÉÒÔÖƶ©¿É¿¿µÄ¼ì²âÕ½ÂÔÀ´µÖÓù´ËÀ๥»÷¡£ÎªÁËÈ·±£Çå¾²£¬×é֯ӦʹÓÃÔÆÇ徲̬ÊÆÖÎÀí£¨CSPM£©¹¤¾ßÒ»Á¬¼à¿ØºÍÆÀ¹ÀÔÆÇéÐεÄÇ徲̬ÊÆ£¬²¢ÊµÑéÒì³£¼ì²âÊÖÒÕÀ´Ê¶±ðÔÆÇéÐÎÖеÄÒì³£ÐÐΪ¡£±ðµÄ£¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄʹÓÃAWS»ù´¡ÉèÊ©¾ÙÐй¥»÷£¬ÕâÅú×¢ÔÆÇéÐÎÃæÁÙÒ»Á¬µÄÇå¾²Íþв¡£


https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/


3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷£¬Êý¾Ýй¶ÖÁ°µÍø


12ÔÂ31ÈÕ£¬Â޵µºÖÝÒ½Áƺ͸£ÀûÍýÏëϵͳÔâµ½ÁËÍøÂç¹¥»÷£¬ÍøÂç·¸·¨·Ö×ÓÒѽ«²¿·ÖÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ£¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸£¬²¢ÒÑÖƶ©ÍâÁªÕ½ÂÔ£¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄסÃñ±£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£ÏÖÔÚÉв»ÇåÎúÄÄЩÎļþ±»Ð¹Â¶£¬ITÍŶÓÕýÔÚÆÊÎö¡£ÈÏÕ潨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸·¨·Ö×ÓÈ¡µÃÁªÏµ£¬²¢ÓëÖÝÕþ¸®ÏàÖúÁгöÊÜÓ°ÏìÖ°Ô±Ãûµ¥£¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÔõÑù»ñµÃÃâ·ÑÐÅÓüà¿Ø¡£ÊÜÓ°ÏìµÄÖÝÍýÏë°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏëµÈ¡£Âó»ù±Þ²ßסÃñ½ÓÄÉһϵÁв½·¥±£»¤²ÆÎñÐÅÏ¢£¬ÈçÁªÏµÐÅÓñ¨¸æ»ú¹¹¶³½áÐÅÓá¢ÉèÖÃڲƭ¾¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤£¬²¢Ð¡ÐÄÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС¡£


https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/


4. Õ¹ÏÖºÚ¿ÍÔõÑùЮÖÆ 35 ¸ö Google Chrome À©Õ¹³ÌÐò


12ÔÂ31ÈÕ£¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹³ÌÐò¿ª·¢Ö°Ô±µÄÍøÂç´¹ÂÚÔ˶¯¿ËÈÕ±»Æع⣬¸ÃÔ˶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹³ÌÐò±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂ룬ӰÏìÔ¼260ÍòÓû§£¬ÆäÖаüÀ¨ÍøÂçÇå¾²¹«Ë¾CyberhavenµÄÀ©Õ¹³ÌÐò¡£Ô˶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ£¬µ«ÔçÆÚÏÂÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒѱ£´æ¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄ´¹ÂÚµç×ÓÓʼþ£¬Éù³ÆÀ©Õ¹³ÌÐòÎ¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß£¬ÓÕµ¼¿ª·¢Ö°Ô±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò»á¼ûÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹³ÌÐò¡£Ò»µ©»ñµÃ»á¼ûȨÏÞ£¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹³ÌÐòÒÔ°üÀ¨¶ñÒâÎļþ£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý£¬°üÀ¨ID¡¢»á¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ¡£±ðµÄ£¬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ÊÂÎñ¼àÌýÆ÷£¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ£¬ÒÔÈƹý2FA±£»¤²¢Ð®ÖÆÕË»§¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷£¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåƽ̨ÉϾÙÐÐÐéαÐÅÏ¢»òÍøÂç´¹ÂÚÔ˶¯£¬»ò½«»á¼ûȨÏÞ³öÊÛ¸øËûÈË¡£


https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/


5. GitHubÐéα¡°ÐÇÐÇ¡±ÂþÒ磺թƭÓë¶ñÒâÈí¼þ½èÊÆÈö²¥


12ÔÂ31ÈÕ£¬GitHubÉϱ£´æʹÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌ⣬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßÕ©Æ­ºÍ¶ñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ×ÅÃû¶È£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥£¬¿ÉÓÃÓÚÊղش洢¿â£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿·Ö£¬ÍƼöÏà¹ØÄÚÈÝ¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍ·þÎñʹÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬Í¬Ê±·Ç¶ñÒâÏîÄ¿Ò²»áʹÓÃÐéαÐÇÐÇÌáÉý×ÅÃû¶È¡£Ò»ÏîÐÂÑо¿·¢Ã÷£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵÄ£¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£Ñо¿Ö°Ô±Ê¹ÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ßÆÊÎöÊý¾Ý£¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ£¬²¢·¢Ã÷2024ÄêÐéαÐÇÐÇÔ˶¯¼¤Ôö¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊǶ෽ÃæµÄ£¬»áÏ÷ÈõÈËÃǶԸÃƽ̨µÄÐÅÍС£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄÔ˶¯ºÍÖÊÁ¿£¬²¢ÔÚ¿ÉÄܵÄÇéÐÎϼì²é´úÂ룬ÒÔ×èÖ¹ÏÂÔØÓÕÆ­ÐÔµÄÈí¼þ¡£ÏÖÔÚ£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£


https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/


6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈ뱨¸æ


1ÔÂ1ÈÕ£¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈ뱨¸æ¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Ò»Á¬ÑݱäµÄÖØ´óÏÂÔØÆ÷¶ñÒâÈí¼þ£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£ËüÖ÷ÒªÓÃC/C++±àд£¬Äܹ»°²ÅÅһϵÁжñÒ⹤¾ß£¬°üÀ¨¿É½«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹³ÌÐò£¬´Ó¶ø²¶»ñÆÁÄ»½Øͼ²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ»á¼û¡£×Ô2024Äê8ÔÂÒÔÀ´£¬LegionLoaderÈö²¥Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£Ëüͨ¹ýÇý¶¯ÏÂÔغÍÐéαװÖóÌÐò¾ÙÐÐÈö²¥£¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏýÊÖÒÕÌӱܼì²â¡£¸Ã¶ñÒâÈí¼þµÄÉèÖø߶ȿɶ¨ÖÆ£¬ÆäÓÐÓÃÔغÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý£¬ÈçChromeƾ֤ºÍÆäËû½âÃÜÃÜÔ¿¡£±ðµÄ£¬LegionLoaderͨ¹ýAPI¹¥»÷ÒÉ»óÇå¾²¹¤¾ß£¬²¢Ê¹ÓüÓÃÜͨѶÓëÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ÁªÏµ¡£TRAC LabsÌṩÁËÖÜÈ«µÄÈëÇÖÖ¸±êÁбí£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ¡£


https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/