Willow PaysÊý¾Ý¿âÔâй¶£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢Æعâ

Ðû²¼Ê±¼ä 2025-01-22

1. Willow PaysÊý¾Ý¿âÔâй¶£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢Æعâ


1ÔÂ20ÈÕ£¬Äþ¾²Ñо¿Ô±Jeremiah Fowler×î½ü·¢ÏÖÒ»¸öδÊÜÃÜÂë± £»¤µÄÊý¾Ý¿â£¬¸ÃÊý¾Ý¿â°üÂÞÃÀ¹ú½ðÈڿƼ¼Õ˵¥Ö§¸¶Æ½Ì¨Willow PaysµÄ240,000¶àÌõÃô¸Ð¼Ç¼£¬°üÂÞÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢ÐÅÓöî¶ÈºÍÄÚ²¿Õ˵¥ÏêϸÐÅÏ¢µÈ¡£Willow PaysÔÊÐíÓû§ÔÚËÄÖÜÄÚÖ§¸¶Õ˵¥ºÍÆäËûÓöÈ£¬µ«¸ÃÊý¾Ý¿âȴȱ·¦ÃÜÂë± £»¤»ò¼ÓÃÜ£¬Ê¹µÃÕâЩÐÅÏ¢ÈÝÒ×±»Ð¹Â¶¡£ËäÈ»Éв»Çå³þʵ¼ÊÊý¾Ý鶵Äˮƽ£¬µ«FowlerÈÏΪÕâЩÐÅÏ¢¿ÉÄܻᱻ·¸×ï·Ö×ÓÓÃÓÚÍøÂçµöÓã¹¥»÷»òδ¾­ÊÚȨ·ÃÎÊÆäËûÕË»§¡£FowlerÏòWillow Pays·¢³öÁËÒ»·ÝÂôÁ¦ÈεÄÅû¶֪ͨ£¬ºóÕßÁ¢¼´½ûÖ¹Á˹«ÖÚ¶Ô¸ÃÊý¾Ý¿âµÄ·ÃÎÊ¡£Õâһʼþ͹ÏÔÁ˽ðÈÚ»ú¹¹ÃæÁÙµÄÍøÂç¹¥»÷ÍþвÈÕÒæÔö¼Ó£¬Äþ¾²×¨¼ÒÇ¿µ÷½ðÈÚÈí¼þÌṩÉÌÐèҪʵʩÓÐЧµÄÍøÂçÄþ¾²´ëÊ©£¬°üÂÞ¼ÓÃÜÃô¸ÐÊý¾Ý¡¢¶¨ÆÚ½øÐÐÄþ¾²Éó¼ÆÒÔ¼°½ÓÄɶàÒòËØÉí·ÝÑéÖ¤µÈ£¬ÒÔ·ÀÖ¹ÔÚÏß½ðÈÚÆÛÕ©¡£


https://hackread.com/fintech-bill-pay-willow-pays-exposes-240000-records/


2. ¶àÖÖËíµÀЭÒéÄþ¾²Â©¶´Æع⣬420Íǫ̀Ö÷»úÃæÁÙ¹¥»÷·çÏÕ


1ÔÂ20ÈÕ£¬ÐÂÑо¿ÏÔʾ£¬¶àÖÖËíµÀЭÒé´æÔÚÄþ¾²Â©¶´£¬¿ÉÄÜʹ¹¥»÷Õßʵʩ¶àÖÖ¹¥»÷¡£Top10VPNÓë³ãë´óѧ½ÌÊÚÂíµÙ¡¤·¶»ô·òºÏ×÷µÄÑо¿Ö¸³ö£¬ÈôÍøÂçÖ÷»ú½ÓÊÜËíµÀÊý¾Ý°ü¶ø²»ÑéÖ¤·¢ËÍÕßÉí·Ý£¬Ôò¿ÉÄܱ»½Ù³ÖÖ´ÐÐÄäÃû¹¥»÷²¢»ñµÃÍøÂç·ÃÎÊȨÏÞ¡£Ñо¿·¢ÏÖ£¬¶à´ï420Íǫ̀Ö÷»úÒ×Êܹ¥»÷£¬°üÂÞVPN¡¢ISP¼Òͥ·ÓÉÆ÷¡¢ºËÐÄ»¥ÁªÍø·ÓÉÆ÷¡¢Òƶ¯ÍøÂçÍø¹ØºÍCDN½Úµã£¬ÊÜÓ°Ïì×îÑÏÖصĹú¼Ò°üÂÞÖйú¡¢·¨¹ú¡¢ÈÕ±¾¡¢ÃÀ¹úºÍ°ÍÎ÷¡£ÕâЩ©¶´ÔÊÐí¹¥»÷ÕßÀÄÓÃÒ×Êܹ¥»÷µÄϵͳ×÷Ϊµ¥ÏòÊðÀí£¬²¢·¢¶¯DoS¹¥»÷¡£CERTЭµ÷ÖÐÐÄÖ¸³ö£¬¹¥»÷Õß»¹¿ÉαÔìÔ´IPv4/6µØÖ·£¬·ÃÎÊ˽ÓÐÍøÂç»ò·¢¶¯DDoS¹¥»÷¡£Â©¶´ÈªÔ´ÔÚÓÚËíµÀЭÒéÈçIP6IP6¡¢GRE6µÈȱ·¦×ã¹»µÄÄþ¾²Ð­Ò飬ÈçIPsec£¬²î³ØÁ÷Á¿½øÐÐÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ¡£ÕâЩЭÒéÒѱ»·ÖÅäÁËÏàÓ¦µÄCVE±àºÅ¡£×÷Ϊ·ÀÓù´ëÊ©£¬½¨ÒéʹÓÃIPSec»òWireGuardÌṩÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ£¬²¢½ö½ÓÊÜÀ´×Ô¿ÉÐÅÔ´µÄËíµÀÊý¾Ý°ü¡£Í¬Ê±£¬ÔÚÍøÂç²ãÃæʵʩÁ÷Á¿¹ýÂË¡¢Éî¶È°ü¼ì²é£¬²¢×èÖ¹ËùÓÐδ¼ÓÃܵÄËíµÀÊý¾Ý°ü¡£


https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html


3. з¢ÏÖÎïÁªÍø½©Ê¬ÍøÂçÈ«Çò³ïıDDoS¹¥»÷


1ÔÂ20ÈÕ£¬×Ô2024Äêµ×ÒÔÀ´£¬Ò»¸öз¢ÏÖµÄÎïÁªÍø(IoT)½©Ê¬ÍøÂçÔÚÈ«Çò·¶Î§ÄÚ³ïı´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ(DDoS)¹¥»÷£¬Ö÷ÒªÀûÓ÷ÓÉÆ÷¡¢IPÉãÏñÍ·µÈÎïÁªÍøÉ豸ÖеÄ©¶´¡£¸Ã½©Ê¬ÍøÂç½áºÏÁËMiraiºÍBashlite¶ñÒâÈí¼þ£¬Í¨¹ýÔ¶³Ì´úÂëÖ´ÐЩ¶´»ò±©Á¦ÆƽâÈõÃÜÂëѬȾÉ豸£¬Ñ¬È¾¹ý³Ì°üÂÞÉø͸¡¢¸ºÔØͨ±¨ºÍÁ¬½Óµ½ÃüÁîÓë¿ØÖÆ(C&C)·þÎñÆ÷½ÓÊÕ¹¥»÷ÃüÁî¡£¸Ã½©Ê¬ÍøÂç½ÓÄɶàÖÖDDoS¹¥»÷ý½é£¬ÈçSYNºéË®¡¢UDPºéË®¡¢GREЭÒ驶´ºÍTCPÎÕÊÖºéË®µÈ£¬¶ÔÈ«Çò½ðÈÚ¡¢½»Í¨ºÍµçÐŵÈÐÐÒµ×é³ÉÖØ´óÍþв£¬±±ÃÀºÍÅ·ÖÞÓÈÆäÊÇÃÀ¹úºÍÈÕ±¾Êܵ½ÑÏÖØÓ°Ïì¡£ÊÜѬȾµÄÉ豸´ó²¿ÃÅÊÇÎÞÏß·ÓÉÆ÷ºÍIPÉãÏñÍ·£¬TP-LinkºÍZyxelµÈÆ·ÅÆÒòÆä¹ã·ºÊ¹ÓúÍÒÑ֪©¶´¶øƵ·±Êܵ½¹¥»÷¡£ÎªÁËÖÆÖ¹±»·¢ÏÖ£¬¸Ã¶ñÒâÈí¼þ»á½ûÓÃÊÜѬȾÉè±¹ØÁ¬Ä¿´ÃŹ·¼ÆʱÆ÷ºÍÀûÓÃiptables¹æÔò¡£×¨¼Ò½¨Òé½ÓÄɸü¸ÄĬÈÏÃÜÂë¡¢¶¨ÆÚ¸üй̼þ¡¢¸ôÀëÎïÁªÍøÉ豸¡¢½ÓÄÉÈëÇÖ¼ì²âϵͳºÍÓë·þÎñÌṩÉ̺Ï×÷¹ýÂ˶ñÒâÁ÷Á¿µÈ´ëÊ©À´½µµÍѬȾ·çÏÕ¡£


https://cybersecuritynews.com/new-iot-botnet-launching-large-scale-ddos-attacks/#google_vignette


4. ANWSDÍøÂçÄþ¾²Ê¼þͨ¸æ¼°¸öÈËÐÅÏ¢± £»¤´ëÊ©


1ÔÂ21ÈÕ£¬°¬µÏÉ­Î÷±±Ñ§Çø£¨ANWSD£©½üÆÚÔâÓöÁËÒ»ÆðÍøÂçÄþ¾²Ê¼þ£¬ÆäÖÐһ̨´æ´¢2008ÄêÖÁ2022ÄêÔ±¹¤¼Ç¼µÄ¾ÉÈËΪϵͳ·þÎñÆ÷±»ÈëÇÖ¡£¾¡¹ÜÕâЩÐÅÏ¢²¢·ÇÒÔÒ×ÓÚ·ÃÎʵĸñʽ´æ´¢£¬µ«°üÂÞÉç»áÄþ¾²ºÅÂëºÍÖ±½Ó´æ¿îÒøÐеÈÃô¸ÐÊý¾Ý£¬Òò´ËANWSD¼ÙÉèËùÓÐÎļþ¿ÉÄÜÒÑ̻¶¡£ÎªÓ¦¶Ô´Ëʼþ£¬ANWSDÐû²¼ÁËÇåÎúͨ¸æ£¬²¢ÌṩÁ˶àÏÒéÒÔ± £»¤ÊÜÓ°Ïì¸öÈ˵ÄÐÅÏ¢£¬°üÂÞ¼ÓÈëÐÅÓüà¿Ø·þÎñ¡¢Ë÷È¡Ãâ·ÑÐÅÓóÂËß¡¢¼à¿Ø²ÆÕþÕË»§¡¢ÆôÓÃÆÛÕ©¾¯±¨ÒÔ¼°¸ü¸ÄÃÜÂëµÈ¡£´ËÍ⣬ANWSD»¹ÌṩÁËÁª°îóÒ×ίԱ»áÍøÕ¾www.IdentityTheft.gov×÷Ϊ»ñÈ¡¸ü¶à± £»¤¸öÈËÐÅÏ¢µÄ×ÊÔ´¡£ANWSD¶Ô´Ë´Îʼþ¿ÉÄÜ´øÀ´µÄδ±ã»òµ£ÓÇÌåÏÖǸÒ⣬²¢ÃãÀøÓÐÒÉÎÊ»òÐèÒª×ÊÖúµÄ¸öÈËÁªÏµ²ÆÕþºÍÔËÓª×ܼàElizabeth Jennings¡£ANWSDÕýÔÚ»ý¼«Ó¦¶Ô´ËÇé¿ö£¬²¢Å¬Á¦È·±£ÀàËÆʼþ²»ÔÙ·¢Éú¡£


https://databreaches.net/2025/01/21/cybersecurity-incident-impacting-addison-northwest-school-district-anwsd/


5. ConduentÔâÍøÂç¹¥»÷ÖÂÒµÎñÖжÏ£¬Ó°Ïì¶àÖÝÕþ¸®·þÎñ


1ÔÂ22ÈÕ£¬Õþ¸®¼¼Êõ³Ð°üÉÌConduent½üÆÚÔâÓöÁËÒ»´ÎÓÉÍøÂç¹¥»÷Òý·¢µÄÍ£µçʼþ£¬¹¥»÷ÆÆ»µÁËÆä²Ù×÷ϵͳ¡£¾ÝConduent·¢ÑÔÈË͸¶£¬´Ë´ÎÈëÇÖÒÑѸËٵõ½¿ØÖÆ£¬²¢¾­µÚÈý·½Äþ¾²×¨¼ÒÈ·ÈÏ£¬¼¼Êõ»·¾³Ä¿Ç°ÎÞÒÑÖª¶ñÒâ»î¶¯¡£È»¶ø£¬ÑϸñµÄ»Ö¸´¹ý³Ìµ¼Ö¹«Ë¾¶àÏîÒµÎñÖжÏÊýÈÕ£¬Ó°ÏìÁË°üÂÞÒ½ÁƲ¹Öú¡¢¶ùͯ¸§Óý¡¢Ê³Æ·Ô®ÖúµÈ¼Æ»®ÔÚÄÚµÄÕþ¸®·þÎñ¡£Íþ˹¿µÐÇÖÝÊÇÊÜÓ°ÏìµÄÖÝÖ®Ò»£¬¾ÓÃñËß¿àÒòϵͳ¹ÊÕÏÎÞ·¨Ö§¸¶ÓöÈ¡£ÏµÍ³ÓÚÖÜÈÕ»Ö¸´£¬ConduentÌṩÁËÌرðÊÂÇéÈËԱЭÖú´¦ÖÃÑÓ³Ù¸¶¿î¡£¾¡¹ÜÓÐËĸöÖÝÊܵ½Ó°Ï죬µ«Conduentδ͸¶ÆäËûÊÜÓ°ÏìÖݵÄÐÅÏ¢¡£´ËÍ⣬ConduentÓë°¢À­Ë¹¼ÓÖÝÇ©ÊðÁË9200ÍòÃÀÔªµÄºÏͬ£¬ÓÃÓÚÒ½ÁƲ¹Öú¹ÜÀíÐÅϢϵͳµÄÏÖ´ú»¯¸ïС¢ÔËÓªºÍ¹ÜÀí¡£ÖµµÃ×¢ÒâµÄÊÇ£¬ConduentÔÚ2020ÄêÔøÔâÊÜÀÕË÷Èí¼þ¹¥»÷¡£¸Ã¹«Ë¾Ã¿Äê´¦ÖÃÔ¼1000ÒÚÃÀÔªµÄÕþ¸®¿îÏÉÏÒ»²Æ¼¾ÓªÊÕÁè¼Ý8ÒÚÃÀÔª¡£


https://therecord.media/government-contractor-conduent-outage-compromise


6. Google¹ã¸æÔâºÚ¿ÍÀÄÓÃÁ÷´«¶ñÒâÈí¼þ£¬HomebrewÓû§Ð辯Ìè


1ÔÂ21ÈÕ£¬ºÚ¿ÍÀûÓÃGoogle¹ã¸æÁ÷´«¶ñÒâÈí¼þ£¬Í¨¹ýÐé¼ÙµÄHomebrewÍøվѬȾMacºÍLinuxÉ豸£¬²¢ÇÔÈ¡Óû§µÄƾ֤¡¢ä¯ÀÀÆ÷Êý¾ÝºÍ¼ÓÃÜ»õ±ÒÇ®°ü¡£´Ë´Î¶ñÒâ¹ã¸æ»î¶¯ÖÐʹÓõĶñÒâÈí¼þÊÇAmosStealer£¨ÓÖÃû¡°Atomic¡±£©£¬ÕâÊÇÒ»ÖÖרΪmacOSϵͳÉè¼ÆµÄÐÅÏ¢ÇÔÈ¡·¨Ê½£¬Ã¿ÔÂÒÔ1000ÃÀÔªµÄ¼Û¸ñ³öÊÛ¸øÍøÂç·¸×ï·Ö×Ó¡£¹¥»÷ÕßÀûÓÃURL¼¼Êõ£¬ÔÚGoogle¹ã¸æÖÐÏÔʾÕýÈ·µÄHomebrew URL£¬ÓÕÆ­Óû§µã»÷Öض¨Ïòµ½Ðé¼ÙµÄHomebrewÍøÕ¾£¬µ±Óû§ÔËÐÐÐé¼ÙÍøÕ¾ÏÔʾµÄÃüÁîʱ£¬É豸¾Í»áÏÂÔز¢Ö´ÐжñÒâÈí¼þ¡£HomebrewÏîÄ¿ÂôÁ¦ÈËÅúÆÀ¹È¸èȱ·¦Éó²é£¬Ç¿µ÷´ËÇé¿öÒѳ¬³öÆä¿ØÖÆ·¶Î§¡£ËäÈ»¶ñÒâ¹ã¸æÒѱ»É¾³ý£¬µ«¸Ã»î¶¯¿ÉÄÜ»áͨ¹ýÆäËûÖض¨ÏòÓò¼ÌÐø½øÐУ¬Òò´ËHomebrewÓû§ÐèÒª¾¯Ì衣ΪÁ˽µµÍѬȾ·çÏÕ£¬Óû§Ó¦È·±£µã»÷GoogleÁ´½Óºóµ½´ïµÄÊÇÏîÄ¿»ò¹«Ë¾µÄºÏ·¨ÍøÕ¾£¬²¢½«³£ÓÃÍøÕ¾Ìí¼Óµ½ÊéÇ©ÖÐÒÔ»ñÈ¡Èí¼þ¡£


https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/