ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷½á¹ûÁ÷´«¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2025-01-161. ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷½á¹ûÁ÷´«¶ñÒâÈí¼þ
1ÔÂ14ÈÕ£¬¹¥»÷ÕßÀûÓÃYouTubeºÍGoogleËÑË÷½á¹û£¬Õë¶ÔÑ°ÕÒµÁ°æºÍÆƽâÈí¼þÏÂÔصÄÓû§ÊµÊ©ÍøÂç¹¥»÷¡£ËûÃÇÔÚYouTubeÊÓƵÖаüÂÞÐé¼ÙÈí¼þÏÂÔØÁ´½Ó£¬ÓÕÆÓû§µã»÷²¢ÏÂÔØ°üÂÞÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ·¨Ê½¡£Í¬Ê±£¬ÔÚGoogleËÑË÷½á¹ûÖÐÖ²Èë¿´ËƺϷ¨µÄµÁ°æÈí¼þÏÂÔØÁ´½Ó£¬ÊµÔòÒ²°üÂÞ¶ñÒâÈí¼þ¡£¹¥»÷Õß»¹ÀûÓÃMediafireºÍMega.nzµÈÎļþÍйܷþÎñÒþ²Ø¶ñÒâÈí¼þÀ´Ô´£¬²¢Ê¹ÓÃÃÜÂë±£»¤ºÍ±àÂë¼¼Êõ¹æ±ÜÄþ¾²¼ì²â¡£´ËÍ⣬¸Ã¹¥»÷»î¶¯ÓëÒ»ÄêÇ°·ºÆðµÄLumma StealerÀàËÆ£¬Á÷´«¶àÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ÈçPrivateLoader¡¢MarsStealerµÈ¡£¹¥»÷ÕßÀÄÓÃÈËÃǶÔYouTubeºÍÎļþ¹²Ïí·þÎñµÄÐÅÈΣ¬ÓÈÆäÓ°ÏìÄÇЩѰÕÒµÁ°æÈí¼þµÄÓû§¡£ÎªÁË·ÀÓùÕâЩ¹¥»÷£¬×éÖ¯»ú¹¹Ó¦Á˽⵱ǰÍþв£¬±£³Ö¾¯Ì裬²¢Ìá¸ßÔ±¹¤Äþ¾²Òâʶ¡£
https://www.darkreading.com/threat-intelligence/cyberattackers-infostealers-youtube-comments-google-search
2. Fortinet·À»ðǽÔâ´ó¹æÄ£ÁãÈÕ©¶´¹¥»÷
1ÔÂ14ÈÕ£¬È¥Äê12Ô£¬Äþ¾²Ñо¿ÈËÔ±ÊӲ쵽Õë¶ÔFortinet·À»ðǽµÄ´ó¹æÄ£¹¥»÷»î¶¯£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÁËÉÐδÐÞ²¹µÄÁãÈÕ©¶´¡£ÕâЩ¹¥»÷µ¼ÖÂÊý°Ùµ½Êýǧ´Î¶ñÒâµÇ¼Ê¼þ£¬¹¥»÷Õßͨ¹ý¹ÜÀí½çÃæ»ñµÃ·ÃÎÊȨÏÞ£¬²¢ÐÞ¸ÄÁË·À»ðǽÅäÖã¬Ê¹ÓÃSSL VPNËíµÀά³ÖÁ¬½Ó£¬ÇÔȡƾ֤ÒÔÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒƶ¯¡£¾¡¹Ü¾ßÌåϸ½ÚÈÔÔÚÊÓ²ìÖУ¬µ«±±¼«ÀÇʵÑéÊҸ߶ÈÈ·ÐÅÁãÈÕ©¶´±»´ó¹æÄ£ÀûÓá£ÊÜÓ°ÏìµÄ¹Ì¼þ°æ±¾°üÂÞ7.0.14ÖÁ7.0.16¡£¹¥»÷Õß»¹¹ã·ºÊ¹ÓÃÁËÉ豸µÄ»ùÓÚWebµÄÃüÁîÐнçÃ棬²¢ÓëÒì³£Ô´IPµØÖ·½¨Á¢ÁË¿ÉÒÉÁ¬½Ó¡£ÕâЩ¹¥»÷´Ó11ÔÂÖÐÑ®¿ªÊ¼£¬µ«Ö±µ½12Ô²ŷ¢Éú´ó¹æÄ£·À»ðǽÅäÖøü¸Ä¡£¹¥»÷Õß´´½¨ÁËеij¬¼¶¹ÜÀíÔ±ÕË»§£¬´ò¿ªÁ˵±µØÓû§ÕË»§£¬²¢½«ËüÃÇÌí¼Óµ½¾ßÓÐVPN·ÃÎÊȨÏÞµÄ×éÖУ¬»òÕß½Ù³ÖÏÖÓÐÕË»§¡£ËûÃÇ»¹´´½¨ÁËеÄSSL VPNÃÅ»§£¬²¢½«Óû§ÕË»§Ö±½ÓÌí¼Óµ½ÕâЩÃÅ»§ÖС£Ò»µ©½¨Á¢ÁËSSL VPNËíµÀ£¬¹¥»÷Õ߾ͻáÊÕ¼¯Æ¾¾Ý½øÐкáÏòÒƶ¯£¬²¢Ê¹ÓÃÁËKali Linux¹¤¾ß¡£¾¡¹ÜÎÞ·¨È·¶¨¹¥»÷ÕßµÄ×îÖÕÄ¿±ê£¬µ«ÀÕË÷Èí¼þµÄ¿ÉÄÜÐÔ²¢²»ÄÜÅųý¡£
https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/
3. 5000¸öWordPressÍøÕ¾ÔâÐÂÐͶñÒâÈí¼þÈëÇÖ
1ÔÂ14ÈÕ£¬Ò»ÖÖÐÂÐͶñÒâÈí¼þ»î¶¯ÒÑÀÖ³ÉÈëÇÖÁè¼Ý5000¸öWordPressÍøÕ¾£¬ÆäÖ÷ҪĿµÄΪ´´½¨¹ÜÀíÔ±ÕÊ»§¡¢°²×°¶ñÒâ²å¼þ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£WebscriptÄþ¾²¹«Ë¾c/sideµÄÑо¿ÈËÔ±ÔÚ¶Ô¿Í»§Ê¼þÏìÓ¦Öз¢ÏÖ£¬ÕâЩ¶ñÒâ»î¶¯ÀûÓÃÁËwp3[.]xyzÓòÃû½øÐÐÊý¾ÝÇÔÈ¡£¬µ«¾ßÌåµÄ³õʼѬȾ;¾¶ÉÐδÃ÷È·¡£Ò»µ©¹¥»÷µÃÊÖ£¬¶ñÒâ½Å±¾±ã»á´Ówp3[.]xyz¼ÓÔØ£¬²¢ÀûÓÃÔ¤Éèƾ¾Ý´´½¨ÃûΪwpx_adminµÄ¶ñÒâ¹ÜÀíÔ±ÕÊ»§¡£Ëæºó£¬¸Ã½Å±¾»á´ÓͬһÓòÃûÏÂÔز¢¼¤»îÒ»¸ö¶ñÒâ²å¼þ£¨plugin.php£©£¬¸Ã²å¼þÖ¼ÔÚÊÕ¼¯¹ÜÀíԱƾ¾Ý¡¢ÈÕÖ¾µÈÃô¸ÐÐÅÏ¢£¬²¢ÒÔ»ìÏý·½Ê½½«Æäαװ³ÉͼÏñÇëÇó·¢ËÍÖÁ¹¥»÷Õß·þÎñÆ÷¡£´ËÍ⣬¹¥»÷¹ý³ÌÖл¹°üÂÞ¶à¸öÑéÖ¤²½Ö裬Èç¼Ç¼¶ñÒâ¹ÜÀíÔ±ÕÊ»§´´½¨×´Ì¬¼°ÑéÖ¤¶ñÒâ²å¼þ°²×°µÈ¡£Îª×èÖ¹´ËÀ๥»÷£¬c/side½¨ÒéÍøÕ¾ËùÓÐÕßÀûÓ÷À»ðǽºÍÄþ¾²¹¤¾ß·âËøwp3[.]xyzÓòÃû¡£Í¬Ê±£¬¹ÜÀíÔ±Ó¦¶¨ÆÚ¼ì²éÌØȨÕÊ»§ºÍÒÑ°²×°²å¼þÁÐ±í£¬¼°Ê±Ê¶±ð²¢É¾³ýδ¾ÊÚȨµÄ»î¶¯¡£´ËÍ⣬¼ÓÇ¿WordPressÍøÕ¾µÄCSRF±£»¤Ò²ÖÁ¹ØÖØÒª£¬ÊµÊ©¶àÒòËØÉí·ÝÑéÖ¤»¹¿ÉΪÒÑй¶ƾ֤µÄÕÊ»§ÌṩÌر𱣻¤¡£
https://www.bleepingcomputer.com/news/security/wp3xyz-malware-attacks-add-rogue-admins-to-5-000-plus-wordpress-sites/
4. Google OAuth©¶´£ºÒѵ¹±Õ³õ´´¹«Ë¾ÓòÃû³É¹¥»÷ÕßÐÂÄ¿±ê
1ÔÂ14ÈÕ£¬GoogleµÄOAuthµÇ¼¹¦Ð§´æÔÚÒ»¸öÖØ´óÄþ¾²Òþ»¼£¬¿ÉÄܱ»¹¥»÷ÕßÀûÓÃÀ´·ÃÎÊÇ°Ô±¹¤ÔÚSaaSƽ̨ÉϵÄÃô¸ÐÊý¾Ý¡£Õâһ©¶´ÓÉTrufflesecurityÑо¿ÈËÔ±·¢ÏÖ£¬²¢Ïò¹È¸è³ÂËߣ¬µ«×î³õ²¢Î´µÃµ½×ã¹»ÖØÊÓ¡£¾¡¹Ü¹È¸èºóÀ´ÏòÑо¿ÈËÔ±·¢±íÁËÉͽð²¢ÖØпªÆôÁËÊӲ죬µ«½ØÖÁÄ¿Ç°£¬¸ÃÎÊÌâÈÔδµÃµ½½â¾ö¡£¹¥»÷Õß¿ÉÒÔͨ¹ý×¢²áÒѵ¹±Õ³õ´´¹«Ë¾µÄÓòÃû£¬²¢ÀûÓÃÕâЩÓòÃûΪǰ¹ÍÔ±ÖØд´½¨µç×ÓÓʼþÕÊ»§£¬´Ó¶ø·ÃÎÊËûÃÇÔÚSlack¡¢Notion¡¢Zoom¡¢ChatGPTµÈ·þÎñÉϵÄÕË»§¡£Ñо¿ÈËÔ±·¢ÏÖ£¬Í¨¹ý¹ºÖÃÒÑÍ£ÓõÄÓòÃû£¬¹¥»÷Õß¿ÉÒÔ´ÓÈËÁ¦×ÊԴϵͳÖÐÌáÈ¡Ãô¸ÐÊý¾Ý£¬²¢µÇ¼ÖÖÖÖ·þÎñ¡£Õâ¸öÎÊÌâÓ°ÏìÁËÊý°ÙÍòÈ˺ÍÊýǧ¼Ò¹«Ë¾£¬¶øÇÒËæ×Åʱ¼äµÄÍÆÒÆ£¬ÎÊÌâÖ»»á±äµÃÔ½À´Ô½ÑÏÖØ¡£ÒòΪ´ó¶àÊý¿Æ¼¼³õ´´¹«Ë¾×¢¶¨»áµ¹±Õ£¬¶øËûÃÇÖеÄÐí¶àʹÓÃGoogle WorkspacesÀ´ÊÕ·¢µç×ÓÓʼþ£¬Òò´ËËûÃǵÄÔ±¹¤Ê¹ÓÃGmailÕÊ»§µÇ¼Éú²úÁ¦¹¤¾ß¡£ÎªÁË·À·¶´ËÀà·çÏÕ£¬½¨ÒéÀ뿪³õ´´¹«Ë¾Ê±´ÓÕÊ»§ÖÐɾ³ýÃô¸ÐÊý¾Ý£¬²¢ÖÆֹʹÓÃÊÂÇéÕÊ»§½øÐиöÈËÕÊ»§×¢²á¡£
https://www.bleepingcomputer.com/news/security/google-oauth-flaw-lets-attackers-gain-access-to-abandoned-accounts/
5. MIGÔâBlack BastaÀÕË÷Èí¼þ¹¥»÷£¬´óÁ¿¿Í»§ÐÅϢй¶
1ÔÂ14ÈÕ£¬ÃÀ¹ú¶«Äϲ¿×î´óµÄµÖѺ´û¿î»ú¹¹Ö®Ò»£¬×ܲ¿Î»ÓÚÌïÄÉÎ÷ÖݵĵÖѺ´û¿îͶ×ÊÕß¼¯ÍÅ£¨MIG£©ÉϸöÔÂÔâÓöÁËÒ»´ÎÍøÂçÄþ¾²Ê¼þ£¬µ¼Ö´óÁ¿¿Í»§ÐÅÏ¢¿ÉÄÜй¶¡£MIGδ͸¶¾ßÌåÊÜÓ°Ïì¿Í»§ÊýÁ¿£¬µ«ÒÑƸÇ빩ӦÉÌʶ±ðÊÜÓ°ÏìµÄ¸öÈË£¬²¢¼Æ»®ÔÚ¼¸ÖÜÄÚÍê³É֪ͨÊÂÇé¡£¾ÝMIGÍøվ֪ͨ£¬´Ë´ÎÍøÂç¹¥»÷ʼÓÚ12ÔÂ11ÈÕ£¬²¢ÓÚÔ½ÈÕ±»·¢ÏÖ£¬Ò»Ãûδ¾ÊÚȨµÄÓû§½øÈëÁËMIGµÄ¼ÆËã»ú»·¾³£¬µ¼Ö¶àÃû¸öÈ˵ÄÃô¸Ð¸öÈËÐÅÏ¢±»Ð¹Â¶¡£´Ë´Î¹¥»÷ÓÉBlack BastaÀÕË÷Èí¼þÍÅ»ïÌᳫ£¬¸ÃÍÅ»ïÊÇÄ¿Ç°×îÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯Ö®Ò»£¬ÔøÏ®»÷¹ýÈ«ÇòÖÁÉÙ500¸ö×éÖ¯£¬²¢Ãé×¼ÁË16¸öÒªº¦»ù´¡ÉèÊ©²¿ÃÅÖеÄ12¸ö¡£½üÄêÀ´£¬ÀÕË÷Èí¼þÍÅ»ïÂÅÂŽ«Ä¿±êÃé×¼É漰ס·¿ÐÐÒµµÄ½ðÈÚ»ú¹¹£¬ÒÑÓжà¼Ò´ó¹«Ë¾ÔâÊܹ¥»÷£¬µ¼ÖÂס·¿¹ºÖÃÊÜ×è¡£
https://therecord.media/tennessee-mortgage-lender-confirms-cyberattack
6. Î÷ºÚÎÄÕþ¸®ITϵͳÔâÍøÂç¹¥»÷£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Éù³ÆÂôÁ¦
1ÔÂ14ÈÕ£¬¿µÄùµÒ¸ñÖÝÎ÷ºÚÎÄÊÐÕþ¸®ÕýÔÚÊÓ²ìÒ»Æðµ¼ÖÂÆäËùÓÐITϵͳÔÝʱ¹Ø±ÕµÄÍøÂç¹¥»÷ʼþ¡£Ê㤶àÁմ²©À׶ûÔÚ1ÔÂ11ÈÕÌåÏÖ£¬ÕâÆð¡°ITϵͳÄþ¾²Ê¹ʡ±ÖÂʹÕþ¸®ÏµÍ³¹Ø±Õ£¬¶øÕþ¸®×î³õÔÚ12ÔÂ26ÈÕÓÚFacebookÉϽöÌá¼°ÔâÓö¡°ÍøÂçÖжϡ±¡£Ä¿Ç°£¬¸ÃÊÐÈÔÔÚÆÀ¹ÀÄÄЩÊý¾Ý¿ÉÄÜÊܵ½´Ë´ÎʼþµÄÓ°Ï죬µ«Òѽ¨Á¢Ó¦¶Ô¹ßÀýºÍ×ÜÌå×¼±¸£¬ÊÜÓ°ÏìϵͳÒÑÓб¸·Ý£¬Ô¤¼Æ¼¸ÌìÄڿɻָ´ÔËÐС£¾¡¹ÜÓÐÆÀÂÛÇëÇóÈ·ÈÏÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬µ«Î÷ºÚÎÄÊÐδÓè»ØÓ¦¡£È»¶ø£¬1ÔÂ11ÈÕ£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦¡£¸Ã×éÖ¯Ôø¹¥»÷ѪҺ¼ì²â¾ÞÍ·Synnovis£¬µ¼ÖÂ100ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶¼°1100¶àÀýÊÖÊõÍƳ٣¬Òý·¢¹ú¼ÊÄÕÅ¡£÷è÷ë×éÖ¯×Ô2022ÄêÆðÒÔÀÕË÷Èí¼þ¼´·þÎñÐÎʽ¹¥»÷ÃÀÅ·¶à¼Ò×éÖ¯£¬ÒÑÈ·ÈÏÌᳫÖÁÉÙ25Æð¹¥»÷£¬»¹ÓÐ100¶àÆðδ¾Ö¤ÊµµÄ¹¥»÷¡£Óë´Ëͬʱ£¬ÃÀ¹ú¶à¸ö¶¼ÊгÂËß¼ÙÈÕÍøÂçʼþ£¬ÂíÈøÖîÈûÖݲ®¶÷ÕòÒ²ÓÚ1ÔÂ11ÈÕ³ÂËßÆäITÍøÂçÔâÈëÇÖ¡£
https://therecord.media/west-haven-connecticut-city-government-cyberattack