Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ

Ðû²¼Ê±¼ä 2025-01-02

1. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ


1ÔÂ1ÈÕ£¬£¬£¬ £¬£¬£¬£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒÑÔ£¬£¬£¬ £¬£¬£¬£¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£©¡£¡£¡£¡£¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ°¡£¡£¡£¡£¡£¾Ý0mid16BÉù³Æ£¬£¬£¬ £¬£¬£¬£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto£¬£¬£¬ £¬£¬£¬£¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÀ¨24ÍòÓà·Ýº¬ÏêϸСÎÒ˽¼ÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â¡£¡£¡£¡£¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý£¬£¬£¬ £¬£¬£¬£¬ÏÔʾ±»»á¼ûµÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB¡£¡£¡£¡£¡£0mid16BÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto£¬£¬£¬ £¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´ÔöÇ¿±£»£»£»£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð£¬£¬£¬ £¬£¬£¬£¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷¡£¡£¡£¡£¡£¾ÝTrustPilotÉϵÄ̸ÂÛÏÔʾ£¬£¬£¬ £¬£¬£¬£¬DEphotoÒÑ×îÏÈÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ£¬£¬£¬ £¬£¬£¬£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£´æÕþ²ßÌåÏÖ²»Âú£¬£¬£¬ £¬£¬£¬£¬ÒÔΪÆä±£´æÊý¾Ýʱ¼ä¹ý³¤¡£¡£¡£¡£¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£¡£¡£¡£¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â£¬£¬£¬ £¬£¬£¬£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí¡£¡£¡£¡£¡£


https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/


2. EC2 Grouper£ºÊ¹ÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½ÂÔ


1ÔÂ1ÈÕ£¬£¬£¬ £¬£¬£¬£¬FortiGuardʵÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯£¬£¬£¬ £¬£¬£¬£¬¸Ã×é֯ƵÈÔʹÓÃAWS¹¤¾ßºÍÊÜËðƾ֤¾ÙÐй¥»÷¡£¡£¡£¡£¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐÓÃÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤£¬£¬£¬ £¬£¬£¬£¬²¢Ê¹ÓÃAPI¾ÙÐÐÕì̽ºÍ×ÊÔ´½¨É裬£¬£¬ £¬£¬£¬£¬×èÖ¹ÊÖ¶¯»î¶¯¡£¡£¡£¡£¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§ÇéÐÎÖз¢Ã÷ÁËÆäÆæÒìµÄÓû§ÊðÀíºÍÇå¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷£¬£¬£¬ £¬£¬£¬£¬µ«ÕâЩָ±ê¹ØÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»¿É¿¿£¬£¬£¬ £¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬ £¬£¬£¬£¬Í¨Ì«¹ýÎöƾ֤й¶ºÍAPIʹÓõÈÐźÅ£¬£¬£¬ £¬£¬£¬£¬Çå¾²ÍŶӿÉÒÔÖÆ¶©¿É¿¿µÄ¼ì²âÕ½ÂÔÀ´µÖÓù´ËÀ๥»÷¡£¡£¡£¡£¡£ÎªÁËÈ·±£Çå¾²£¬£¬£¬ £¬£¬£¬£¬×é֯ӦʹÓÃÔÆÇå¾²Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ßÒ»Á¬¼à¿ØºÍÆÀ¹ÀÔÆÇéÐεÄÇå¾²Ì¬ÊÆ£¬£¬£¬ £¬£¬£¬£¬²¢ÊµÑéÒì³£¼ì²âÊÖÒÕÀ´Ê¶±ðÔÆÇéÐÎÖеÄÒì³£ÐÐΪ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄʹÓÃAWS»ù´¡ÉèÊ©¾ÙÐй¥»÷£¬£¬£¬ £¬£¬£¬£¬ÕâÅú×¢ÔÆÇéÐÎÃæÁÙÒ»Á¬µÄÇå¾²Íþв¡£¡£¡£¡£¡£


https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/


3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷£¬£¬£¬ £¬£¬£¬£¬Êý¾Ýй¶ÖÁ°µÍø


12ÔÂ31ÈÕ£¬£¬£¬ £¬£¬£¬£¬Â޵µºÖÝÒ½Áƺ͸£ÀûÍýÏëϵͳÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÒѽ«²¿·ÖÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ¡£¡£¡£¡£¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸£¬£¬£¬ £¬£¬£¬£¬²¢ÒÑÖÆ¶©ÍâÁªÕ½ÂÔ£¬£¬£¬ £¬£¬£¬£¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄסÃñ±£»£»£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÄÄЩÎļþ±»Ð¹Â¶£¬£¬£¬ £¬£¬£¬£¬ITÍŶÓÕýÔÚÆÊÎö¡£¡£¡£¡£¡£ÈÏÕæ½¨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸·¨·Ö×ÓÈ¡µÃÁªÏµ£¬£¬£¬ £¬£¬£¬£¬²¢ÓëÖÝÕþ¸®ÏàÖúÁгöÊÜÓ°ÏìÖ°Ô±Ãûµ¥£¬£¬£¬ £¬£¬£¬£¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÔõÑù»ñµÃÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÖÝÍýÏë°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏëµÈ¡£¡£¡£¡£¡£Âó»ù±Þ²ßסÃñ½ÓÄÉһϵÁв½·¥±£»£»£»£»¤²ÆÎñÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬ÈçÁªÏµÐÅÓñ¨¸æ»ú¹¹¶³½áÐÅÓá¢ÉèÖÃڲƭ¾¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤£¬£¬£¬ £¬£¬£¬£¬²¢Ð¡ÐÄÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£¡£¡£¡£¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС¡£¡£¡£¡£¡£


https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/


4. Õ¹ÏÖºÚ¿ÍÔõÑùÐ®ÖÆ 35 ¸ö Google Chrome À©Õ¹³ÌÐò


12ÔÂ31ÈÕ£¬£¬£¬ £¬£¬£¬£¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹³ÌÐò¿ª·¢Ö°Ô±µÄÍøÂç´¹Âڻ¿ËÈÕ±»ÆØ¹â£¬£¬£¬ £¬£¬£¬£¬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹³ÌÐò±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂ룬£¬£¬ £¬£¬£¬£¬Ó°ÏìÔ¼260ÍòÓû§£¬£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨ÍøÂçÇå¾²¹«Ë¾CyberhavenµÄÀ©Õ¹³ÌÐò¡£¡£¡£¡£¡£»£»£»£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ£¬£¬£¬ £¬£¬£¬£¬µ«ÔçÆÚÏÂÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒѱ£´æ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄ´¹ÂÚµç×ÓÓʼþ£¬£¬£¬ £¬£¬£¬£¬Éù³ÆÀ©Õ¹³ÌÐòÎ¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß£¬£¬£¬ £¬£¬£¬£¬ÓÕµ¼¿ª·¢Ö°Ô±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò»á¼ûÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹³ÌÐò¡£¡£¡£¡£¡£Ò»µ©»ñµÃ»á¼ûȨÏÞ£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹³ÌÐòÒÔ°üÀ¨¶ñÒâÎļþ£¬£¬£¬ £¬£¬£¬£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý£¬£¬£¬ £¬£¬£¬£¬°üÀ¨ID¡¢»á¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ÊÂÎñ¼àÌýÆ÷£¬£¬£¬ £¬£¬£¬£¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ£¬£¬£¬ £¬£¬£¬£¬ÒÔÈÆ¹ý2FA±£»£»£»£»¤²¢Ð®ÖÆÕË»§¡£¡£¡£¡£¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬ £¬£¬£¬£¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶£¬£¬£¬ £¬£¬£¬£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϾÙÐÐÐéαÐÅÏ¢»òÍøÂç´¹Âڻ£¬£¬£¬ £¬£¬£¬£¬»ò½«»á¼ûȨÏÞ³öÊÛ¸øËûÈË¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/


5. GitHubÐéα¡°ÐÇÐÇ¡±ÂþÒ磺թƭÓë¶ñÒâÈí¼þ½èÊÆÈö²¥


12ÔÂ31ÈÕ£¬£¬£¬ £¬£¬£¬£¬GitHubÉϱ£´æÊ¹ÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌ⣬£¬£¬ £¬£¬£¬£¬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßÕ©Æ­ºÍ¶ñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ×ÅÃû¶È£¬£¬£¬ £¬£¬£¬£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£¡£¡£¡£¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥£¬£¬£¬ £¬£¬£¬£¬¿ÉÓÃÓÚÕ䲨´æ´¢¿â£¬£¬£¬ £¬£¬£¬£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿·Ö£¬£¬£¬ £¬£¬£¬£¬ÍƼöÏà¹ØÄÚÈÝ¡£¡£¡£¡£¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍЧÀÍʹÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬£¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý×ÅÃû¶È¡£¡£¡£¡£¡£Ò»ÏîÐÂÑо¿·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵÄ£¬£¬£¬ £¬£¬£¬£¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ßÆÊÎöÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ£¬£¬£¬ £¬£¬£¬£¬²¢·¢Ã÷2024ÄêÐéαÐÇÐǻ¼¤Ôö¡£¡£¡£¡£¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ£¬£¬£¬ £¬£¬£¬£¬»áÏ÷ÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÈΡ£¡£¡£¡£¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿£¬£¬£¬ £¬£¬£¬£¬²¢ÔÚ¿ÉÄܵÄÇéÐÎϼì²é´úÂ룬£¬£¬ £¬£¬£¬£¬ÒÔ×èÖ¹ÏÂÔØÓÕÆ­ÐÔµÄÈí¼þ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/


6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈ뱨¸æ


1ÔÂ1ÈÕ£¬£¬£¬ £¬£¬£¬£¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈ뱨¸æ¡£¡£¡£¡£¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Ò»Á¬ÑݱäµÄÖØ´óÏÂÔØÆ÷¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£¡£¡£¡£¡£ËüÖ÷ÒªÓÃC/C++±àд£¬£¬£¬ £¬£¬£¬£¬Äܹ»°²ÅÅһϵÁжñÒ⹤¾ß£¬£¬£¬ £¬£¬£¬£¬°üÀ¨¿É½«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹³ÌÐò£¬£¬£¬ £¬£¬£¬£¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ»á¼û¡£¡£¡£¡£¡£×Ô2024Äê8ÔÂÒÔÀ´£¬£¬£¬ £¬£¬£¬£¬LegionLoaderÈö²¥Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖóÌÐò¾ÙÐÐÈö²¥£¬£¬£¬ £¬£¬£¬£¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏýÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÉèÖø߶ȿɶ¨ÖÆ£¬£¬£¬ £¬£¬£¬£¬ÆäÓÐÓÃÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý£¬£¬£¬ £¬£¬£¬£¬ÈçChromeƾ֤ºÍÆäËû½âÃÜÃÜÔ¿¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬LegionLoaderͨ¹ýAPI¹¥»÷ÒÉ»óÇå¾²¹¤¾ß£¬£¬£¬ £¬£¬£¬£¬²¢Ê¹ÓüÓÃÜͨѶÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÁªÏµ¡£¡£¡£¡£¡£TRAC LabsÌṩÁËÖÜÈ«µÄÈëÇÖÖ¸±êÁбí£¬£¬£¬ £¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ¡£¡£¡£¡£¡£


https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/