Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
Ðû²¼Ê±¼ä 2025-01-021. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
1ÔÂ1ÈÕ£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³ö¾¯¸æ£¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøַΪDEphoto[.]biz£©¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ°¡£¾Ý0mid16BÉù³Æ£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto£¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄ¸öÈËÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÂÞ24ÍòÓà·Ýº¬Ïêϸ¸öÈËÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢¡£´ËÍ⣬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕƬµÈÊý¾Ý£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕƬ¿â¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½Øͼ×÷Ϊ֤¾Ý£¬ÏÔʾ±»·ÃÎʵÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB¡£0mid16BÌåÏÖ£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto£¬µ«¸Ã¹«Ë¾Î´¼ÓÇ¿±£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð£¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷¡£¾ÝTrustPilotÉϵÄÆÀÂÛÏÔʾ£¬DEphotoÒÑ¿ªÊ¼ÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£ÁôÕþ²ßÌåÏÖ²»Âú£¬ÈÏΪÆä±£ÁôÊý¾Ýʱ¼ä¹ý³¤¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý£¬µ«Ä¿Ç°Éв»Çå³þËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí¡£
https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/
2. EC2 Grouper£ºÀûÓÃAWSƾ֤µÄÔƹ¥»÷Õß×éÖ¯¼°Æä¼ì²â¼Æı
1ÔÂ1ÈÕ£¬FortiGuardʵÑéÊÒµÄÑо¿ÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯£¬¸Ã×é֯Ƶ·±ÀûÓÃAWS¹¤¾ßºÍÊÜËðƾ֤½øÐй¥»÷¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐЧÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤£¬²¢Ê¹ÓÃAPI½øÐÐÕì²ìºÍ×ÊÔ´´´½¨£¬ÖÆÖ¹ÊÖ¶¯»î¶¯¡£¾¡¹ÜÔÚ¶à¸ö¿Í»§»·¾³Öз¢ÏÖÁËÆäÆæÌصÄÓû§ÊðÀíºÍÄþ¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷£¬µ«ÕâЩָ±ê¶ÔÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»Ðп¿£¬ÒòΪ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨¡£Ñо¿ÈËÔ±Ö¸³ö£¬Í¨¹ý·ÖÎöƾ֤й¶ºÍAPIʹÓõÈÐźţ¬Äþ¾²ÍŶӿÉÒÔÖƶ¨¿É¿¿µÄ¼ì²â¼ÆıÀ´µÖÓù´ËÀ๥»÷¡£ÎªÁËÈ·±£Äþ¾²£¬×éÖ¯Ó¦ÀûÓÃÔÆÄþ¾²Ì¬ÊƹÜÀí£¨CSPM£©¹¤¾ßÁ¬Ðø¼à¿ØºÍÆÀ¹ÀÔÆ»·¾³µÄÄþ¾²Ì¬ÊÆ£¬²¢ÊµÊ©Òì³£¼ì²â¼¼ÊõÀ´Ê¶±ðÔÆ»·¾³ÖеÄÒì³£ÐÐΪ¡£´ËÍ⣬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄÀûÓÃAWS»ù´¡ÉèÊ©½øÐй¥»÷£¬Õâ±íÃ÷ÔÆ»·¾³ÃæÁÙÁ¬ÐøµÄÄþ¾²Íþв¡£
https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/
3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷£¬Êý¾Ýй¶ÖÁ°µÍø
12ÔÂ31ÈÕ£¬Â޵µºÖÝÒ½Áƺ͸£Àû¼Æ»®ÏµÍ³Ôâµ½ÁËÍøÂç¹¥»÷£¬ÍøÂç·¸×ï·Ö×ÓÒѽ«²¿ÃÅÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ£¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸£¬²¢ÒÑÖƶ¨ÍâÁª¼Æı£¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄ¾ÓÃñ±£»¤¸öÈËÐÅÏ¢¡£Ä¿Ç°Éв»Çå³þÄÄЩÎļþ±»Ð¹Â¶£¬ITÍŶÓÕýÔÚ·ÖÎö¡£ÂôÁ¦½¨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸×ï·Ö×ÓÈ¡µÃÁªÏµ£¬²¢ÓëÖÝÕþ¸®ºÏ×÷ÁгöÊÜÓ°ÏìÈËÔ±Ãûµ¥£¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÈçºÎ»ñµÃÃâ·ÑÐÅÓüà¿Ø¡£ÊÜÓ°ÏìµÄÖݼƻ®°üÂÞÒ½ÁƲ¹Öú¡¢Ôö²¹ÓªÑøÔ®Öú¼Æ»®µÈ¡£Âó»ù¶Ø´Ù¾ÓÃñ½ÓÄÉһϵÁдëÊ©±£»¤²ÆÕþÐÅÏ¢£¬ÈçÁªÏµÐÅÓóÂËß»ú¹¹¶³½áÐÅÓá¢ÉèÖÃÆÛÕ©¾¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤£¬²¢¾¯ÌèÐé¼ÙÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶Ê¼þ£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС¡£
https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/
4. ½ÒʾºÚ¿ÍÈçºÎ½Ù³Ö 35 ¸ö Google Chrome À©Õ¹·¨Ê½
12ÔÂ31ÈÕ£¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹·¨Ê½¿ª·¢ÈËÔ±µÄÍøÂçµöÓã»î¶¯½üÈÕ±»Æع⣬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹·¨Ê½±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂ룬ӰÏìÔ¼260ÍòÓû§£¬ÆäÖаüÂÞÍøÂçÄþ¾²¹«Ë¾CyberhavenµÄÀ©Õ¹·¨Ê½¡£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ£¬µ«ÔçÆÚÃüÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒÑ´æÔÚ¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄµöÓãµç×ÓÓʼþ£¬Éù³ÆÀ©Õ¹·¨Ê½Î¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß£¬ÓÕµ¼¿ª·¢ÈËÔ±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦Ó÷¨Ê½·ÃÎÊÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹·¨Ê½¡£Ò»µ©»ñµÃ·ÃÎÊȨÏÞ£¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹·¨Ê½ÒÔ°üÂÞ¶ñÒâÎļþ£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý£¬°üÂÞID¡¢·ÃÎÊÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ¡£´ËÍ⣬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ʼþ¼àÌýÆ÷£¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ£¬ÒÔÈƹý2FA±£»¤²¢½Ù³ÖÕË»§¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÃüÁîºÍ¿ØÖÆ·þÎñÆ÷£¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåƽ̨ÉϽøÐÐÐé¼ÙÐÅÏ¢»òÍøÂçµöÓã»î¶¯£¬»ò½«·ÃÎÊȨÏÞ³öÊÛ¸øËûÈË¡£
https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/
5. GitHubÐé¼Ù¡°ÐÇÐÇ¡±·ºÀÄ£ºÕ©ÆÓë¶ñÒâÈí¼þ½èÊÆÁ÷´«
12ÔÂ31ÈÕ£¬GitHubÉÏ´æÔÚʹÓÃÐé¼Ù¡°ÐÇÐÇ¡±µÄÎÊÌ⣬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßթƺͶñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄÖªÃû¶È£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥£¬¿ÉÓÃÓÚÊղش洢¿â£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿ÃÅ£¬ÍƼöÏà¹ØÄÚÈÝ¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍ·þÎñÀûÓÃÐé¼ÙÐÇÐÇÍÆËÍÇÔÈ¡ÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬Í¬Ê±·Ç¶ñÒâÏîÄ¿Ò²»áʹÓÃÐé¼ÙÐÇÐÇÌáÉýÖªÃû¶È¡£Ò»ÏîÐÂÑо¿·¢ÏÖ£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵģ¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£Ñо¿ÈËԱʹÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ß·ÖÎöÊý¾Ý£¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ£¬²¢·¢ÏÖ2024ÄêÐé¼ÙÐÇÐǻ¼¤Ôö¡£Ðé¼ÙÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊǶ෽ÃæµÄ£¬»áÏ÷ÈõÈËÃǶԸÃƽ̨µÄÐÅÈΡ£Óû§Ó¦½÷É÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿£¬²¢ÔÚ¿ÉÄܵÄÇé¿öϼì²é´úÂ룬ÒÔÖÆÖ¹ÏÂÔØÆÛÆÐÔµÄÈí¼þ¡£Ä¿Ç°£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£
https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/
6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈë³ÂËß
1ÔÂ1ÈÕ£¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈë³ÂËß¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Á¬ÐøÑݱäµÄÅÓ´óÏÂÔØÆ÷¶ñÒâÈí¼þ£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£ËüÖ÷ÒªÓÃC/C++±àд£¬Äܹ»²¿ÊðһϵÁжñÒ⹤¾ß£¬°üÂ޿ɽ«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹·¨Ê½£¬´Ó¶ø²¶×½ÆÁÄ»½Øͼ²¢¹ÜÀí¶ÔÃô¸ÐÕË»§µÄ·ÃÎÊ¡£×Ô2024Äê8ÔÂÒÔÀ´£¬LegionLoaderÁ÷´«Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡·¨Ê½¡£Ëüͨ¹ýÇý¶¯ÏÂÔغÍÐé¼Ù°²×°·¨Ê½½øÐÐÁ÷´«£¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏý¼¼ÊõÌӱܼì²â¡£¸Ã¶ñÒâÈí¼þµÄÅäÖø߶ȿɶ¨ÖÆ£¬ÆäÓÐЧÔغÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý£¬ÈçChromeƾ¾ÝºÍÆäËû½âÃÜÃÜÔ¿¡£´ËÍ⣬LegionLoaderͨ¹ýAPI¹¥»÷ÃÔ»óÄþ¾²¹¤¾ß£¬²¢Ê¹ÓüÓÃÜͨÐÅÓëÃüÁîºÍ¿ØÖÆ·þÎñÆ÷ÁªÏµ¡£TRAC LabsÌṩÁËÈ«ÃæµÄÈëÇÖÖ¸±êÁÐ±í£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ¡£
https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/