Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ £¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ

Ðû²¼Ê±¼ä 2025-01-02

1. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ £¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ


1ÔÂ1ÈÕ £¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒÑÔ £¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£© ¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍÔ˶¯ÉãÓ° ¡£¾Ý0mid16BÉù³Æ £¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto £¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÀ¨24ÍòÓà·Ýº¬ÏêϸСÎÒ˽¼ÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢ ¡£±ðµÄ £¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý £¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â ¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý £¬ÏÔʾ±»»á¼ûµÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB ¡£0mid16BÌåÏÖ £¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto £¬µ«¸Ã¹«Ë¾Î´ÔöÇ¿±£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð £¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷ ¡£¾ÝTrustPilotÉϵÄ̸ÂÛÏÔʾ £¬DEphotoÒÑ×îÏÈÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ £¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£´æÕþ²ßÌåÏÖ²»Âú £¬ÒÔΪÆä±£´æÊý¾Ýʱ¼ä¹ý³¤ ¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ ¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â £¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý £¬µ«ÏÖÔÚÉв»ÇåÎúËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí ¡£


https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/


2. EC2 Grouper£ºÊ¹ÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½ÂÔ


1ÔÂ1ÈÕ £¬FortiGuardʵÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯ £¬¸Ã×é֯ƵÈÔʹÓÃAWS¹¤¾ßºÍÊÜËðƾ֤¾ÙÐй¥»÷ ¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐÓÃÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤ £¬²¢Ê¹ÓÃAPI¾ÙÐÐÕì̽ºÍ×ÊÔ´½¨Éè £¬×èÖ¹ÊÖ¶¯Ô˶¯ ¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§ÇéÐÎÖз¢Ã÷ÁËÆäÆæÒìµÄÓû§ÊðÀíºÍÇå¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷ £¬µ«ÕâЩָ±ê¹ØÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»¿É¿¿ £¬ÓÉÓÚ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨ ¡£Ñо¿Ö°Ô±Ö¸³ö £¬Í¨Ì«¹ýÎöƾ֤й¶ºÍAPIʹÓõÈÐźŠ£¬Çå¾²ÍŶӿÉÒÔÖÆ¶©¿É¿¿µÄ¼ì²âÕ½ÂÔÀ´µÖÓù´ËÀ๥»÷ ¡£ÎªÁËÈ·±£Çå¾² £¬×é֯ӦʹÓÃÔÆÇå¾²Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ßÒ»Á¬¼à¿ØºÍÆÀ¹ÀÔÆÇéÐεÄÇå¾²Ì¬ÊÆ £¬²¢ÊµÑéÒì³£¼ì²âÊÖÒÕÀ´Ê¶±ðÔÆÇéÐÎÖеÄÒì³£ÐÐΪ ¡£±ðµÄ £¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄʹÓÃAWS»ù´¡ÉèÊ©¾ÙÐй¥»÷ £¬ÕâÅú×¢ÔÆÇéÐÎÃæÁÙÒ»Á¬µÄÇå¾²Íþв ¡£


https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/


3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷ £¬Êý¾Ýй¶ÖÁ°µÍø


12ÔÂ31ÈÕ £¬Â޵µºÖÝÒ½Áƺ͸£ÀûÍýÏëϵͳÔâµ½ÁËÍøÂç¹¥»÷ £¬ÍøÂç·¸·¨·Ö×ÓÒѽ«²¿·ÖÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ ¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ £¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸ £¬²¢ÒÑÖÆ¶©ÍâÁªÕ½ÂÔ £¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄסÃñ±£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ ¡£ÏÖÔÚÉв»ÇåÎúÄÄЩÎļþ±»Ð¹Â¶ £¬ITÍŶÓÕýÔÚÆÊÎö ¡£ÈÏÕæ½¨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸·¨·Ö×ÓÈ¡µÃÁªÏµ £¬²¢ÓëÖÝÕþ¸®ÏàÖúÁгöÊÜÓ°ÏìÖ°Ô±Ãûµ¥ £¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÔõÑù»ñµÃÃâ·ÑÐÅÓÃ¼à¿Ø ¡£ÊÜÓ°ÏìµÄÖÝÍýÏë°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏëµÈ ¡£Âó»ù±Þ²ßסÃñ½ÓÄÉһϵÁв½·¥±£»¤²ÆÎñÐÅÏ¢ £¬ÈçÁªÏµÐÅÓñ¨¸æ»ú¹¹¶³½áÐÅÓá¢ÉèÖÃڲƭ¾¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤ £¬²¢Ð¡ÐÄÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ ¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶ÊÂÎñ £¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС ¡£


https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/


4. Õ¹ÏÖºÚ¿ÍÔõÑùÐ®ÖÆ 35 ¸ö Google Chrome À©Õ¹³ÌÐò


12ÔÂ31ÈÕ £¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹³ÌÐò¿ª·¢Ö°Ô±µÄÍøÂç´¹ÂÚÔ˶¯¿ËÈÕ±»ÆØ¹â £¬¸ÃÔ˶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹³ÌÐò±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂë £¬Ó°ÏìÔ¼260ÍòÓû§ £¬ÆäÖаüÀ¨ÍøÂçÇå¾²¹«Ë¾CyberhavenµÄÀ©Õ¹³ÌÐò ¡£Ô˶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ £¬µ«ÔçÆÚÏÂÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒѱ£´æ ¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄ´¹ÂÚµç×ÓÓʼþ £¬Éù³ÆÀ©Õ¹³ÌÐòÎ¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß £¬ÓÕµ¼¿ª·¢Ö°Ô±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò»á¼ûÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹³ÌÐò ¡£Ò»µ©»ñµÃ»á¼ûȨÏÞ £¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹³ÌÐòÒÔ°üÀ¨¶ñÒâÎļþ £¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý £¬°üÀ¨ID¡¢»á¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ ¡£±ðµÄ £¬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ÊÂÎñ¼àÌýÆ÷ £¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ £¬ÒÔÈÆ¹ý2FA±£»¤²¢Ð®ÖÆÕË»§ ¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ £¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶ £¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϾÙÐÐÐéαÐÅÏ¢»òÍøÂç´¹ÂÚÔ˶¯ £¬»ò½«»á¼ûȨÏÞ³öÊÛ¸øËûÈË ¡£


https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/


5. GitHubÐéα¡°ÐÇÐÇ¡±ÂþÒ磺թƭÓë¶ñÒâÈí¼þ½èÊÆÈö²¥


12ÔÂ31ÈÕ £¬GitHubÉϱ£´æÊ¹ÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌâ £¬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßÕ©Æ­ºÍ¶ñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ×ÅÃû¶È £¬½ø¶ø½Ó´¥¸ü¶àÓû§ ¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥ £¬¿ÉÓÃÓÚÊղش洢¿â £¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿·Ö £¬ÍƼöÏà¹ØÄÚÈÝ ¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍ·þÎñʹÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ £¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý×ÅÃû¶È ¡£Ò»ÏîÐÂÑо¿·¢Ã÷ £¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊÇ¼ÙµÄ £¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§ ¡£Ñо¿Ö°Ô±Ê¹ÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ßÆÊÎöÊý¾Ý £¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ £¬²¢·¢Ã÷2024ÄêÐéαÐÇÐÇÔ˶¯¼¤Ôö ¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ £¬»áÏ÷ÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÍÐ ¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄÔ˶¯ºÍÖÊÁ¿ £¬²¢ÔÚ¿ÉÄܵÄÇéÐÎϼì²é´úÂë £¬ÒÔ×èÖ¹ÏÂÔØÓÕÆ­ÐÔµÄÈí¼þ ¡£ÏÖÔÚ £¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦ ¡£


https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/


6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈ뱨¸æ


1ÔÂ1ÈÕ £¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈ뱨¸æ ¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Ò»Á¬ÑݱäµÄÖØ´óÏÂÔØÆ÷¶ñÒâÈí¼þ £¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate ¡£ËüÖ÷ÒªÓÃC/C++±àд £¬Äܹ»°²ÅÅһϵÁжñÒ⹤¾ß £¬°üÀ¨¿É½«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹³ÌÐò £¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ»á¼û ¡£×Ô2024Äê8ÔÂÒÔÀ´ £¬LegionLoaderÈö²¥Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡³ÌÐò ¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖóÌÐò¾ÙÐÐÈö²¥ £¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏýÊÖÒÕÌӱܼì²â ¡£¸Ã¶ñÒâÈí¼þµÄÉèÖø߶ȿɶ¨ÖÆ £¬ÆäÓÐÓÃÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý £¬ÈçChromeƾ֤ºÍÆäËû½âÃÜÃÜÔ¿ ¡£±ðµÄ £¬LegionLoaderͨ¹ýAPI¹¥»÷ÒÉ»óÇå¾²¹¤¾ß £¬²¢Ê¹ÓüÓÃÜͨѶÓëÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷ÁªÏµ ¡£TRAC LabsÌṩÁËÖÜÈ«µÄÈëÇÖÖ¸±êÁбí £¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ ¡£


https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/