΢Èí365ÕË»§ÔâOAuth×°±¸´úÂë´¹ÂÚ¹¥»÷¼¤Ôö

Ðû²¼Ê±¼ä 2025-12-23

1. ΢Èí365ÕË»§ÔâOAuth×°±¸´úÂë´¹ÂÚ¹¥»÷¼¤Ôö


12ÔÂ19ÈÕ£¬£¬ £¬×Ô9ÔÂÆð£¬£¬ £¬µç×ÓÓʼþÇå¾²¹«Ë¾Proofpoint¼à²âµ½Ê¹ÓÃOAuth×°±¸´úÂëÊÚȨ»úÖÆµÄÍøÂç´¹ÂÚ¹¥»÷ÏÔÖøÔöÌí£¬£¬ £¬¹¥»÷Õßͨ¹ýÓÕÆ­Êܺ¦ÕßÔÚ΢ÈíÕýµ±×°±¸µÇÂ¼Ò³ÃæÊäÈë×°±¸´úÂ룬£¬ £¬ÎÞÐèÇÔȡƾ֤»òÈÆ¹ý¶àÖØÉí·ÝÑéÖ¤£¨MFA£©¼´¿É»ñÈ¡Microsoft 365ÕË»§¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£´ËÀ๥»÷²»µ«Éæ¼°¾­¼ÃÀûÒæÇý¶¯µÄÍøÂç·¸·¨·Ö×ÓÈçTA2723£¬£¬ £¬»¹°üÀ¨¹ú¼Ò½áÃ˵ÄÍþвÐÐΪÕßÈçÒÉËÆ¶íÂÞ˹¹ØÁªµÄUNK_AcademicFlare¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´Í¨³£Í¨¹ý´¹ÂÚÓʼþÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó»á¼û¹¥»÷Õß¿ØÖƵÄÍøÕ¾£¬£¬ £¬ËæºóÒªÇóÊäÈë¡°×°±¸´úÂ롱Íê³É¡°Çå¾²ÑéÖ¤¡±£¬£¬ £¬ÊµÔòÊÚȨ¶ñÒâÓ¦ÓóÌÐò»á¼ûÕË»§¡£¡£¡£¡£¡£¡£¡£ProofpointÊӲ쵽¹¥»÷ÕßʹÓÃSquarePhish v1/v2ºÍGraphishµÈ¹¤¾ß¼ò»¯´¹ÂÚÁ÷³Ì¡£¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬ £¬Ð½×ʽ±Àø¹¥»÷ʹÓÃÎĵµ¹²ÏíÓÕ¶üºÍÍâµØ»¯Æ·ÅƱêʶÒýÓÕµã»÷£»£»£»TA2723×Ô10ÔÂÆðתÏò´ËÀ๥»÷£¬£¬ £¬ÔçÆÚʹÓÃSquarePhish2£¬£¬ £¬ºóÆÚ¿ÉÄÜÇл»ÖÁGraphish£»£»£»UNK_AcademicFlareÔòʹÓñ»ÈëÇÖµÄÕþ¸®/¾ü·½ÓÊÏ佨ÉèÐÅÈΣ¬£¬ £¬Í¨¹ýαÔìOneDriveÁ´½ÓÓÕµ¼×°±¸´úÂëÊäÈ룬£¬ £¬Ö÷ÒªÕë¶ÔÃÀÅ·Õþ¸®¡¢Ñ§Êõ¡¢Öǿ⼰½»Í¨²¿·Ö¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-365-accounts-targeted-in-wave-of-oauth-phishing-attacks/


2. ºÓ´²¾º¼¼¾ãÀÖ²¿Ôâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


12ÔÂ21ÈÕ£¬£¬ £¬°¢¸ùÍ¢ºÓ´²¾º¼¼¾ãÀÖ²¿£¨CARP£©ÓÚÖÜÎåÔâÓö÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬ £¬¸Ã×éÖ¯½«ÆäÁÐΪ¡°»á¼ÆÐ§ÀÍ¡±Êܺ¦Õß²¢Ðû²¼°üÀ¨Êýǧ·ÝÎļþµÄÑó´ÐÁ´½Ó¡£¡£¡£¡£¡£¡£¡£ÎļþÀàÐͺ­¸ÇPDF¡¢Excel¡¢Word¡¢Í¼Ïñ¡¢µç×ÓÓʼþ¼°Ñ¹Ëõ´æµµ£¬£¬ £¬µ¥Îļþ¾Þϸ´Ó1KBÖÁ22MB²»µÈ£¬£¬ £¬Ê±¼ä¿ç¶ÈΪ2021ÖÁ2025Ä꣬£¬ £¬Éæ¼°·¢Æ±¡¢ÌõÔ¼¡¢ÊÖÒչ淶¡¢ÐÞ½¨Æ½ÃæÍ¼µÈÃô¸ÐÄÚÈÝ£¬£¬ £¬ÉõÖÁ°üÀ¨ÐÅÓÿ¨Õ˵¥ºÍ²É¹º¶©µ¥Ñù±¾¡£¡£¡£¡£¡£¡£¡£ºÓ´²×÷Ϊ°¢¸ùÍ¢×îÀÖ³É×ãÇò¶Ó£¨72¹Ú£©£¬£¬ £¬ÓµÓÐ35Íò»áÔ±¼°ÄÏÃÀÖÞ×î´óÇò³¡£¡£¡£¡£¡£¡£¡£¬£¬ £¬ÆäÇàÉÙÄ겿·Ö×îС¶ÓÔ±½ö7Ë꣬£¬ £¬´Ë´Î¹¥»÷̻¶³öÌåÓý»ú¹¹ÍøÂçÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×Ô2021Äê»îÔ¾£¬£¬ £¬2022ÄêÊ״μͼ¹¥»÷£¬£¬ £¬2025Äê³ÉΪ×î»îÔ¾ÍŻ£¬ £¬ÒÑÍù°ëÄê·¢¶¯³¬600Æð¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯½ÓÄÉ¡°ÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©¡±Ä£Ê½£¬£¬ £¬ÊµÑéË«ÖØÀÕË÷¡£¡£¡£¡£¡£¡£¡£Æä¹¥»÷Ä¿µÄº­¸ÇÖÆÔìÉÌ¡¢½ðÈÚ»ú¹¹¡¢Ò½ÁƱ£½¡¼°Õþ¸®»ú¹¹£¬£¬ £¬ÒòÕâЩÐÐÒµ´æ´¢Ãô¸ÐÐÅÏ¢Ò×ÊÜÊý¾Ýй¶ӰÏì¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/club-atletico-river-plate-football-club-qilin-ransomware/


3. ·¨¹úÓÊÕþ¾ÖÊ¥µ®Ç°Ï¦ÔâDDoS¹¥»÷Ö¶àӪҵ̱»¾


12ÔÂ23ÈÕ£¬£¬ £¬Ê¥µ®Ç°Ï¦£¬£¬ £¬·¨¹ú¹ú¼ÒÓÊÕþ¾Ö£¨La Poste£©ÔâÓö´ó¹æÄ£DDoS¹¥»÷£¬£¬ £¬µ¼ÖÂÆäÍøÕ¾¡¢Òƶ¯Ó¦Óü°½¹µãÊý×Öϵͳ̱»¾£¬£¬ £¬°ü¹üÅäËÍЧÀÍÏÔÖø·Å»º£¬£¬ £¬²¿·ÖÔÚÏßÓªÒµÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£¸Ã¾ÖÔÚÖÜÒ»ÉùÃ÷ÖÐÈ·ÈÏ£¬£¬ £¬´Ë´ÎÍøÂç¹¥»÷Ôì³ÉϵͳÐÔ¹ÊÕÏ£¬£¬ £¬µ«Ç¿µ÷ÏÖÔÚÎÞÖ¤¾ÝÏÔʾÓû§Êý¾Ýй¶£¬£¬ £¬½öÈÏ¿ÉÓÊÕþ¼°ÒøÐÐÓªÒµ£¨Èç°ü¹üÅäËÍ¡¢ÒøÐÐתÕË£©Êܲ¨¼°¡£¡£¡£¡£¡£¡£¡£ÆìÏ·¨¹úÓÊÕþÒøÐУ¨La Banque Postale£©Í¬²½ÊÜÓ°Ï죬£¬ £¬Óû§·´Ó¦ÍøÉÏÒøÐм°Òƶ¯Ó¦Óûá¼ûÄÑÌ⣬£¬ £¬²»¹ýÒøÐз½Ãæ³ÎÇ壬£¬ £¬ÊµÌåÍøµãPOS»úË¢¿¨¡¢ATMÈ¡¿î¼°¶ÌÐÅÑéÖ¤µÄÔÚÏßÖ§¸¶¹¦Ð§ÈÔÕý³£ÔË×÷£¬£¬ £¬¹ñ̨ӪҵÒàÒ»Á¬¿ª·Å¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ç¡·êÓÊÕþÓªÒµá¯ÁëÆÚ£¬£¬ £¬Òý·¢Óû§Ç¿ÁÒ²»Âú¡£¡£¡£¡£¡£¡£¡£É罻ýÌåÉÏ£¬£¬ £¬´ó×ÚÃñÖÚËß¿àÅäËÍÑÓ³Ù¿ÉÄܵ¼ÖÂÊ¥µ®°ü¹üÎÞ·¨ÊµÊ±Ëʹ£¬ £¬·¨¹úýÌåÒ౨µÀ²¿·ÖÓʾÖÒòϵͳ¹ÊÕϾܾøÓû§¼Ä¼þ»òÈ¡¼þÇëÇ󡣡£¡£¡£¡£¡£¡£Ö»¹Ü²¿·ÖÓʾÖÒÑËõ¼õÔËÓª¹æÄ££¬£¬ £¬µ«ÓÊÕþ¾ÖÇ¿µ÷¡°ÍŶÓȫԱ·¢¶¯¼ÓËÙЧÀͻָ´¡±£¬£¬ £¬Óû§ÈÔ¿Éͨ¹ý¹ñ̨°ìÀíÓÊÕþ¼°ÒøÐÐÓªÒµ¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/la-poste-france-ddos-disruption-days-before-christmas


4. ÂÞÂíÄáÑǹú¼ÒË®Îñ»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷


12ÔÂ22ÈÕ£¬£¬ £¬ÂÞÂíÄáÑǹú¼ÒË®ÎñÖÎÀí»ú¹¹ÓÚ¿ËÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬µ¼ÖÂÔ¼1000̨ÅÌËã»úϵͳ̱»¾£¬£¬ £¬ÊÂÇéÕ¾ÓëЧÀÍÆ÷ÎÞ·¨Ê¹Ó㬣¬ £¬µ«½¹µãË®ÀûÊÖÒÕ»ù´¡ÉèÊ©Èç´ó°Ó¡¢·ÀºéÉèʩδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÆÈʹԱ¹¤·ÅÆúµç×ÓÓʼþͨѶ£¬£¬ £¬×ª¶øÊ¹Óõ绰ºÍÎÞÏßµç¾ÙÐÐÄÚ²¿Ð­µ÷£¬£¬ £¬Í¹ÏÔÁËÍøÂç¹¥»÷¶ÔÒ»Ñùƽ³£ÔËÓªµÄ×ÌÈÅ¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬¹¥»÷Õß½ÓÄÉÁËÓë¹Å°åÀÕË÷Èí¼þ²î±ðµÄÊÖÒÕÊֶΣ¬£¬ £¬Ê¹ÓÃÕýµ±Windows¹¤¾ßBitLockerʵÑé¼ÓÃÜÀÕË÷¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ±»³ÆÎª¡°LOLBins¡±£¨Living-off-the-Land Binaries£©µÄÕ½Êõ£¬£¬ £¬Í¨¹ýŲÓÃϵͳ×Ô´ø¹¤¾ß£¨ÈçBitLocker£©ÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒÆ¶¯²¢¹æ±ÜÇå¾²¼ì²â£¬£¬ £¬ÔöÌíÁË·ÀÓùÄѶÈ¡£¡£¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùʵÑéÊÒ2024ÄêÑо¿ÏÔʾ£¬£¬ £¬Ä«Î÷¸ç¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢Ô¼µ©µÄ¸ÖÌúÆóÒµ¡¢ÒßÃçÖÆÔìÉ̼°Õþ¸®»ú¹¹ÔøÔâÓöÀàËÆ¹¥»÷£»£»£»ÍøÂçÇå¾²¹«Ë¾BitdefenderÒ²Ö¸³ö£¬£¬ £¬¡°ShrinkLocker¡±¶ñÒâÈí¼þÕý±»¶à¸öÍþв×éÖ¯ÓÃÓÚÕë¶ÔÀϾÉWindowsϵͳµÄ¼òÆÓ¹¥»÷£¬£¬ £¬Í¨¹ý¾ç±¾»¯²Ù×÷Õýµ±¹¤¾ßʵÏÖÀÕË÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/romania-national-water-agency-ransomware-attack


5. ÈÕ²úÆû³µÏݺìñÊý¾Ýй¶·ç²¨£¬£¬ £¬2.1Íò¿Í»§ÐÅÏ¢ÔâÇÔ


12ÔÂ22ÈÕ£¬£¬ £¬ÈÕ²úÆû³µÓÐÏÞ¹«Ë¾¿ËÈÕ֤ʵ£¬£¬ £¬ÒòÃÀ¹úÆóÒµÈí¼þ¹«Ë¾ºìñ£¨Red Hat£©9Ô±¬·¢µÄÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬ÆäÔ¼21,000ÃûÈÕ±¾¸£¸ÔµØÇø¿Í»§ÐÅÏ¢±»ÇÔÈ¡£¡£¡£¡£¡£¡£¡£¬£¬ £¬Éæ¼°È«Ãû¡¢ÎïÀíµØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¼°ÏúÊÛÔËÓªÊý¾Ý£¬£¬ £¬µ«ÐÅÓÿ¨µÈ²ÆÎñÐÅϢδÊܲ¨¼°¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚºìñ¹«Ë¾Êý¾ÝЧÀÍÆ÷Ôâδ¾­ÊÚȨ»á¼û£¬£¬ £¬µ¼ÖÂÈÕ²úίÍÐÆä¿ª·¢µÄ¿Í»§ÖÎÀíϵͳÊý¾Ýй¶£¬£¬ £¬³ÉΪÈÕ²ú½ñÄêµÚ¶þÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬´Ëǰ8Ô£¬£¬ £¬ÆäÉè¼Æ×Ó¹«Ë¾Creative Box Inc.ÔøÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ºìñÊý¾Ýй¶ÊÂÎñÓ°ÏìÉîÔ¶£¬£¬ £¬Éæ¼°28,000¸ö˽ÓÐGitLab´æ´¢¿â£¬£¬ £¬Ãô¸ÐÊý¾Ý´ïÊý°ÙGB¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯Crimson Collective×î³õÐû³Æ¶Ô´ËÈÏÕæ£¬£¬ £¬ËæºóShinyHuntersÒ²½éÈëÆäÖУ¬£¬ £¬ÔÚÀÕË÷ƽ̨Íйܱ»µÁÊý¾ÝÑù±¾ÒÔʩѹÊܺ¦¹«Ë¾¡£¡£¡£¡£¡£¡£¡£ÈÕ²úÇ¿µ÷£¬£¬ £¬±»ÈëÇֵĺìñÇéÐÎδ´æ´¢ÆäËûÊý¾Ý£¬£¬ £¬ÇÒÎÞÖ¤¾ÝÅúעй¶ÐÅÏ¢Òѱ»ÀÄÓ㬣¬ £¬µ«ÒÑÒý·¢¿Í»§¶ÔÒþ˽Çå¾²µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nissan-says-thousands-of-customers-exposed-in-red-hat-breach/


6. ÒÁÀÊAPT×éÖ¯InfyЯеĶñÒâÈí¼þ»î¶¯ÖØÏÖ


12ÔÂ21ÈÕ£¬£¬ £¬ÍþвÇ鱨»ú¹¹SafeBreachÅû¶£¬£¬ £¬ÒÁÀÊInfy£¨ÓÖ³ÆPrince of Persia£©APT×éÖ¯½üÆÚÖØÆô»îÔ¾£¬£¬ £¬ÕâÊǸÃ×éÖ¯×Ô2020ÄêÕë¶ÔÈðµä¡¢ºÉÀ¼¡¢ÍÁ¶úÆäÄ¿µÄºóÊ״δó¹æÄ£ÏÖÉí¡£¡£¡£¡£¡£¡£¡£×÷ΪÏÖ´æ×î¹ÅÀϵÄAPTÖ®Ò»£¬£¬ £¬Infy»î¶¯¿É×·ËÝÖÁ2004Äê12Ô£¬£¬ £¬ÆäÒþ²ØÐÔºã¾Ã¸ßÓÚCharming KittenµÈ×ÅÃûÒÁÀÊ×éÖ¯£¬£¬ £¬µ«´Ë´ÎÐж¯Õ¹ÏÖ¸üÖØ´óµÄ¹¥»÷Á´Éý¼¶¡£¡£¡£¡£¡£¡£¡£×îй¥»÷ÖУ¬£¬ £¬InfyʹÓÃÉý¼¶°æFoudreÏÂÔØÆ÷ÓëTonnerreÖ²Èë³ÌÐò£¬£¬ £¬Í¨¹ý´¹ÂÚÓʼþÈö²¥¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´´Ó¹Å°åExcelºêתÏòÎĵµÄÚǶ¿ÉÖ´ÐÐÎļþ£¬£¬ £¬Á¬ÏµÓòÃûÌìÉúËã·¨£¨DGA£©Ç¿»¯C2ЧÀÍÆ÷ÈÍÐÔ¡£¡£¡£¡£¡£¡£¡£ÓÈΪֵµÃ×¢ÖØµÄÊÇ£¬£¬ £¬¶ñÒâÈí¼þͨ¹ýRSAÊðÃûÑéÖ¤C2ÓòÃûÕæÊµÐÔ¡£¡£¡£¡£¡£¡£¡£2025Äê9Ô¼ì²âTonnerre×îа汾ÐÂÔöTelegramȺ×éͨѶ»úÖÆ£¬£¬ £¬Ïà¹ØÉèÖô洢ÔÚC2ЧÀÍÆ÷¡°t¡±Ä¿Â¼µÄtga.adrÎļþÖУ¬£¬ £¬½ö¶ÔÌØ¶¨Êܺ¦ÕßGUID´¥·¢ÏÂÔØ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬C2ЧÀÍÆ÷±£´æÎ´ÖªÓÃ;µÄ¡°download¡±Ä¿Â¼£¬£¬ £¬ÍƲâÓÃÓÚ¶ñÒâÈí¼þÉý¼¶¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html