Willow PaysÊý¾Ý¿âÔâй¶£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢Æعâ

Ðû²¼Ê±¼ä 2025-01-22

1. Willow PaysÊý¾Ý¿âÔâй¶£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢Æعâ


1ÔÂ20ÈÕ£¬Çå¾²Ñо¿Ô±Jeremiah Fowler×î½ü·¢Ã÷Ò»¸öδÊÜÃÜÂë±£»¤µÄÊý¾Ý¿â£¬¸ÃÊý¾Ý¿â°üÀ¨ÃÀ¹ú½ðÈڿƼ¼Õ˵¥Ö§¸¶Æ½Ì¨Willow PaysµÄ240,000¶àÌõÃô¸Ð¼Í¼£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÐÅÓöî¶ÈºÍÄÚ²¿Õ˵¥ÏêϸÐÅÏ¢µÈ¡£Willow PaysÔÊÐíÓû§ÔÚÖÜΧÄÚÖ§¸¶Õ˵¥ºÍÆäËûÓöȣ¬µ«¸ÃÊý¾Ý¿âȴȱ·¦ÃÜÂë±£»¤»ò¼ÓÃÜ£¬Ê¹µÃÕâЩÐÅÏ¢ÈÝÒ×±»Ð¹Â¶¡£ËäÈ»Éв»ÇåÎúÏÖʵÊý¾Ý鶵Äˮƽ£¬µ«FowlerÒÔΪÕâЩÐÅÏ¢¿ÉÄܻᱻ·¸·¨·Ö×ÓÓÃÓÚÍøÂç´¹ÂÚ¹¥»÷»òδ¾­ÊÚȨ»á¼ûÆäËûÕË»§¡£FowlerÏòWillow Pays·¢³öÁËÒ»·ÝÈÏÕæÈεÄÅû¶֪ͨ£¬ºóÕßÁ¬Ã¦Õ¥È¡Á˹«ÖÚ¶Ô¸ÃÊý¾Ý¿âµÄ»á¼û¡£ÕâÒ»ÊÂÎñ͹ÏÔÁ˽ðÈÚ»ú¹¹ÃæÁÙµÄÍøÂç¹¥»÷ÍþвÈÕÒæÔöÌí£¬Ç徲ר¼ÒÇ¿µ÷½ðÈÚÈí¼þÌṩÉÌÐèҪʵÑéÓÐÓõÄÍøÂçÇå¾²²½·¥£¬°üÀ¨¼ÓÃÜÃô¸ÐÊý¾Ý¡¢°´ÆÚ¾ÙÐÐÇå¾²Éó¼ÆÒÔ¼°½ÓÄɶàÒòËØÉí·ÝÑéÖ¤µÈ£¬ÒÔ±ÜÃâÔÚÏß½ðÈÚڲƭ¡£


https://hackread.com/fintech-bill-pay-willow-pays-exposes-240000-records/


2. ¶àÖÖËíµÀЭÒéÇå¾²Îó²îÆع⣬420Íǫ̀Ö÷»úÃæÁÙ¹¥»÷Σº¦


1ÔÂ20ÈÕ£¬ÐÂÑо¿ÏÔʾ£¬¶àÖÖËíµÀЭÒé±£´æÇå¾²Îó²î£¬¿ÉÄÜʹ¹¥»÷ÕßʵÑé¶àÖÖ¹¥»÷¡£Top10VPNÓë³ãë´óѧ½ÌÊÚÂíµÙ¡¤·¶»ô·òÏàÖúµÄÑо¿Ö¸³ö£¬ÈôÍøÂçÖ÷»ú½ÓÊÜËíµÀÊý¾Ý°ü¶ø²»ÑéÖ¤·¢ËÍÕßÉí·Ý£¬Ôò¿ÉÄܱ»Ð®ÖÆÖ´ÐÐÄäÃû¹¥»÷²¢»ñµÃÍøÂç»á¼ûȨÏÞ¡£Ñо¿·¢Ã÷£¬¶à´ï420Íǫ̀Ö÷»úÒ×Êܹ¥»÷£¬°üÀ¨VPN¡¢ISP¼Òͥ·ÓÉÆ÷¡¢½¹µã»¥ÁªÍø·ÓÉÆ÷¡¢Òƶ¯ÍøÂçÍø¹ØºÍCDN½Úµã£¬ÊÜÓ°Ïì×îÑÏÖصĹú¼Ò°üÀ¨Öйú¡¢·¨¹ú¡¢ÈÕ±¾¡¢ÃÀ¹úºÍ°ÍÎ÷¡£ÕâЩÎó²îÔÊÐí¹¥»÷ÕßÀÄÓÃÒ×Êܹ¥»÷µÄϵͳ×÷Ϊµ¥ÏòÊðÀí£¬²¢·¢¶¯DoS¹¥»÷¡£CERTЭµ÷ÖÐÐÄÖ¸³ö£¬¹¥»÷Õß»¹¿ÉαÔìÔ´IPv4/6µØµã£¬»á¼û˽ÓÐÍøÂç»ò·¢¶¯DDoS¹¥»÷¡£Îó²îȪԴÔÚÓÚËíµÀЭÒéÈçIP6IP6¡¢GRE6µÈȱ·¦×ã¹»µÄÇ徲ЭÒ飬ÈçIPsec£¬²î³ØÁ÷Á¿¾ÙÐÐÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ¡£ÕâЩЭÒéÒѱ»·ÖÅÉÁËÏìÓ¦µÄCVE±àºÅ¡£×÷Ϊ·ÀÓù²½·¥£¬½¨ÒéʹÓÃIPSec»òWireGuardÌṩÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ£¬²¢½ö½ÓÊÜÀ´×Ô¿ÉÐÅÔ´µÄËíµÀÊý¾Ý°ü¡£Í¬Ê±£¬ÔÚÍøÂç²ãÃæʵÑéÁ÷Á¿¹ýÂË¡¢Éî¶È°ü¼ì²é£¬²¢×èÖ¹ËùÓÐδ¼ÓÃܵÄËíµÀÊý¾Ý°ü¡£


https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html


3. з¢Ã÷ÎïÁªÍø½©Ê¬ÍøÂçÈ«Çò²ß»®DDoS¹¥»÷


1ÔÂ20ÈÕ£¬×Ô2024Äêµ×ÒÔÀ´£¬Ò»¸öз¢Ã÷µÄÎïÁªÍø(IoT)½©Ê¬ÍøÂçÔÚÈ«Çò¹æÄ£Äڲ߻®´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ(DDoS)¹¥»÷£¬Ö÷ҪʹÓ÷ÓÉÆ÷¡¢IPÉãÏñÍ·µÈÎïÁªÍø×°±¸ÖеÄÎó²î¡£¸Ã½©Ê¬ÍøÂçÍŽáÁËMiraiºÍBashlite¶ñÒâÈí¼þ£¬Í¨¹ýÔ¶³Ì´úÂëÖ´ÐÐÎó²î»ò±©Á¦ÆƽâÈõÃÜÂëѬȾװ±¸£¬Ñ¬È¾Àú³Ì°üÀ¨Éø͸¡¢¸ºÔØת´ïºÍÅþÁ¬µ½ÏÂÁîÓë¿ØÖÆ(C&C)·þÎñÆ÷ÎüÊÕ¹¥»÷ÏÂÁî¡£¸Ã½©Ê¬ÍøÂç½ÓÄɶàÖÖDDoS¹¥»÷Ç°ÑÔ£¬ÈçSYNºéË®¡¢UDPºéË®¡¢GREЭÒéÎó²îºÍTCPÎÕÊÖºéË®µÈ£¬¶ÔÈ«Çò½ðÈÚ¡¢½»Í¨ºÍµçÐŵÈÐÐÒµ×é³ÉÖØ´óÍþв£¬±±ÃÀºÍÅ·ÖÞÓÈÆäÊÇÃÀ¹úºÍÈÕ±¾Êܵ½ÑÏÖØÓ°Ïì¡£ÊÜѬȾµÄ×°±¸´ó²¿·ÖÊÇÎÞÏß·ÓÉÆ÷ºÍIPÉãÏñÍ·£¬TP-LinkºÍZyxelµÈÆ·ÅÆÒòÆäÆÕ±éʹÓúÍÒÑÖªÎó²î¶øƵÈÔÊܵ½¹¥»÷¡£ÎªÁË×èÖ¹±»·¢Ã÷£¬¸Ã¶ñÒâÈí¼þ»á½ûÓÃÊÜѬȾÉè±¹ØÁ¬Ä¿´ÃŹ·¼ÆʱÆ÷ºÍʹÓÃiptables¹æÔò¡£×¨¼Ò½¨Òé½ÓÄɸü¸ÄĬÈÏÃÜÂë¡¢°´ÆÚ¸üй̼þ¡¢¸ôÀëÎïÁªÍø×°±¸¡¢½ÓÄÉÈëÇÖ¼ì²âϵͳºÍÓë·þÎñÌṩÉÌÏàÖú¹ýÂ˶ñÒâÁ÷Á¿µÈ²½·¥À´½µµÍѬȾΣº¦¡£


https://cybersecuritynews.com/new-iot-botnet-launching-large-scale-ddos-attacks/#google_vignette


4. ANWSDÍøÂçÇå¾²ÊÂÎñͨ¸æ¼°Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»¤²½·¥


1ÔÂ21ÈÕ£¬°¬µÏÉ­Î÷±±Ñ§Çø£¨ANWSD£©½üÆÚÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬ÆäÖÐһ̨´æ´¢2008ÄêÖÁ2022ÄêÔ±¹¤¼Í¼µÄ¾ÉÈËΪϵͳ·þÎñÆ÷±»ÈëÇÖ¡£Ö»¹ÜÕâЩÐÅÏ¢²¢·ÇÒÔÒ×ÓÚ»á¼ûµÄÃûÌô洢£¬µ«°üÀ¨Éç»áÇå¾²ºÅÂëºÍÖ±½Ó´æ¿îÒøÐеÈÃô¸ÐÊý¾Ý£¬Òò´ËANWSD¼ÙÉèËùÓÐÎļþ¿ÉÄÜÒÑ̻¶¡£ÎªÓ¦¶Ô´ËÊÂÎñ£¬ANWSDÐû²¼ÁËÇåÎúͨ¸æ£¬²¢ÌṩÁ˶àÏÒéÒÔ±£»¤ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÐÅÏ¢£¬°üÀ¨¼ÓÈëÐÅÓüà¿Ø·þÎñ¡¢Ë÷È¡Ãâ·ÑÐÅÓñ¨¸æ¡¢¼à¿Ø²ÆÎñÕË»§¡¢ÆôÓÃڲƭ¾¯±¨ÒÔ¼°¸ü¸ÄÃÜÂëµÈ¡£±ðµÄ£¬ANWSD»¹ÌṩÁËÁª°îÉÌҵίԱ»áÍøÕ¾www.IdentityTheft.gov×÷Ϊ»ñÈ¡¸ü¶à±£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄ×ÊÔ´¡£ANWSD¶Ô´Ë´ÎÊÂÎñ¿ÉÄÜ´øÀ´µÄδ±ã»òµ£ÐÄÌåÏÖǸÒ⣬²¢ÃãÀøÓÐÒÉÎÊ»òÐèÒª×ÊÖúµÄСÎÒ˽¼ÒÁªÏµ²ÆÎñºÍÔËÓª×ܼàElizabeth Jennings¡£ANWSDÕýÔÚÆð¾¢Ó¦¶Ô´ËÇéÐΣ¬²¢Æð¾¢È·±£ÀàËÆÊÂÎñ²»ÔÙ±¬·¢¡£


https://databreaches.net/2025/01/21/cybersecurity-incident-impacting-addison-northwest-school-district-anwsd/


5. ConduentÔâÍøÂç¹¥»÷ÖÂÓªÒµÖÐÖ¹£¬Ó°Ïì¶àÖÝÕþ¸®·þÎñ


1ÔÂ22ÈÕ£¬Õþ¸®ÊÖÒճаüÉÌConduent½üÆÚÔâÓöÁËÒ»´ÎÓÉÍøÂç¹¥»÷Òý·¢µÄÍ£µçÊÂÎñ£¬¹¥»÷ÆÆËðÁËÆä²Ù×÷ϵͳ¡£¾ÝConduent½²»°ÈË͸¶£¬´Ë´ÎÈëÇÖÒÑѸËÙ»ñµÃ¿ØÖÆ£¬²¢¾­µÚÈý·½Ç徲ר¼ÒÈ·ÈÏ£¬ÊÖÒÕÇéÐÎÏÖÔÚÎÞÒÑÖª¶ñÒâÔ˶¯¡£È»¶ø£¬ÑÏ¿áµÄ»Ö¸´Àú³Ìµ¼Ö¹«Ë¾¶àÏîÓªÒµÖÐÖ¹ÊýÈÕ£¬Ó°ÏìÁË°üÀ¨Ò½ÁƽòÌù¡¢¶ùͯ¸§Óý¡¢Ê³ÎïÔ®ÖúµÈÍýÏëÔÚÄÚµÄÕþ¸®·þÎñ¡£Íþ˹¿µÐÇÖÝÊÇÊÜÓ°ÏìµÄÖÝÖ®Ò»£¬×¡ÃñËß¿àÒòϵͳ¹ÊÕÏÎÞ·¨Ö§¸¶ÓöÈ¡£ÏµÍ³ÓÚÖÜÈÕ»Ö¸´£¬ConduentÌṩÁËÌØÊâÊÂÇéְԱЭÖú´¦Öóͷ£ÑÓ³Ù¸¶¿î¡£Ö»¹ÜÓÐËĸöÖÝÊܵ½Ó°Ï죬µ«Conduentδ͸¶ÆäËûÊÜÓ°ÏìÖݵÄÐÅÏ¢¡£±ðµÄ£¬ConduentÓë°¢À­Ë¹¼ÓÖÝÇ©ÊðÁË9200ÍòÃÀÔªµÄÌõÔ¼£¬ÓÃÓÚÒ½ÁƽòÌùÖÎÀíÐÅϢϵͳµÄÏÖ´ú»¯Ë¢Ð¡¢ÔËÓªºÍÖÎÀí¡£ÖµµÃ×¢ÖصÄÊÇ£¬ConduentÔÚ2020ÄêÔøÔâÊÜÀÕË÷Èí¼þ¹¥»÷¡£¸Ã¹«Ë¾Ã¿Äê´¦Öóͷ£Ô¼1000ÒÚÃÀÔªµÄÕþ¸®¿î×Ó£¬ÉÏÒ»²Æ¼¾ÓªÊÕÁè¼Ý8ÒÚÃÀÔª¡£


https://therecord.media/government-contractor-conduent-outage-compromise


6. Google¹ã¸æÔâºÚ¿ÍÀÄÓÃÈö²¥¶ñÒâÈí¼þ£¬HomebrewÓû§ÐèСÐÄ


1ÔÂ21ÈÕ£¬ºÚ¿ÍʹÓÃGoogle¹ã¸æÈö²¥¶ñÒâÈí¼þ£¬Í¨¹ýÐéαµÄHomebrewÍøվѬȾMacºÍLinux×°±¸£¬²¢ÇÔÈ¡Óû§µÄƾ֤¡¢ä¯ÀÀÆ÷Êý¾ÝºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£´Ë´Î¶ñÒâ¹ã¸æÔ˶¯ÖÐʹÓõĶñÒâÈí¼þÊÇAmosStealer£¨ÓÖÃû¡°Atomic¡±£©£¬ÕâÊÇÒ»ÖÖרΪmacOSϵͳÉè¼ÆµÄÐÅÏ¢ÇÔÈ¡³ÌÐò£¬Ã¿ÔÂÒÔ1000ÃÀÔªµÄ¼ÛÇ®³öÊÛ¸øÍøÂç·¸·¨·Ö×Ó¡£¹¥»÷ÕßʹÓÃURLÊÖÒÕ£¬ÔÚGoogle¹ã¸æÖÐÏÔʾ׼ȷµÄHomebrew URL£¬ÓÕÆ­Óû§µã»÷Öض¨Ïòµ½ÐéαµÄHomebrewÍøÕ¾£¬µ±Óû§ÔËÐÐÐéαÍøÕ¾ÏÔʾµÄÏÂÁîʱ£¬×°±¸¾Í»áÏÂÔز¢Ö´ÐжñÒâÈí¼þ¡£HomebrewÏîÄ¿ÈÏÕæÈËÆ·ÆÀ¹È¸èȱ·¦Éó²é£¬Ç¿µ÷´ËÇéÐÎÒÑÁè¼ÝÆä¿ØÖƹæÄ£¡£ËäÈ»¶ñÒâ¹ã¸æÒѱ»É¾³ý£¬µ«¸ÃÔ˶¯¿ÉÄÜ»áͨ¹ýÆäËûÖض¨ÏòÓò¼ÌÐø¾ÙÐУ¬Òò´ËHomebrewÓû§ÐèҪСÐÄ¡£ÎªÁ˽µµÍѬȾΣº¦£¬Óû§Ó¦È·±£µã»÷GoogleÁ´½ÓºóµÖ´ïµÄÊÇÏîÄ¿»ò¹«Ë¾µÄÕýµ±ÍøÕ¾£¬²¢½«³£ÓÃÍøÕ¾Ìí¼Óµ½ÊéÇ©ÖÐÒÔ»ñÈ¡Èí¼þ¡£


https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/