ResecurityÃÛ¹ÞÏÝÚå½ÒÆÆÍøÂç¹¥»÷ÕæÏà

Ðû²¼Ê±¼ä 2026-01-04

1. ResecurityÃÛ¹ÞÏÝÚå½ÒÆÆÍøÂç¹¥»÷ÕæÏà


1ÔÂ3ÈÕ£¬¿ËÈÕ£¬ÍøÂçÇå¾²¹«Ë¾ResecurityÓë¡°ÊèÉ¢µÄÎó²îÁÔÈË¡±£¨SLH£©ÍþвÐÐΪÕßÖ®¼äµÄ¹¥·ÀÊÂÎñÒý·¢¹Ø×¢¡£SLHÐû³ÆÒÑÀÖ³ÉÈëÇÖResecurityϵͳ²¢ÇÔȡԱ¹¤Êý¾Ý¡¢ÄÚ²¿Í¨Ñ¶¡¢ÍþвÇ鱨±¨¸æ¼°¿Í»§ÐÅÏ¢£¬°üÀ¨MattermostЭ×÷ʵÀý½ØÍ¼ÏÔʾÓëPastebinµÄ¶ñÒâÄÚÈÝͨѶ£¬²¢Éù³Æ´Ë´Î¹¥»÷ÊǶÔResecurityÉç»á¹¤³ÌÊֶεÄÅê»÷£¬Éæ¼°ShinyHunters¡¢Lapsus$µÈ×éÖ¯¡£È»¶ø£¬ShinyHunters½²»°ÈËËæºó·ñ¶¨¼ÓÈë´Ë´ÎÔ˶¯¡£Resecurity¶Ô´Ë»ØÓ¦³Æ£¬±»¹¥»÷µÄϵͳʵΪ¾ÓÐݲÅŵÄÃÛ¹Þ£¬ÓÃÓÚ¼à¿ØÍþвÐÐΪÕßÔ˶¯¡£¸Ã¹«Ë¾ÌåÏÖ£¬2025Äê11ÔÂ21ÈÕÊ״μì²âµ½ÍþвÐÐΪÕß̽²âÆä¹ûÕæÌ»Â¶ÏµÍ³£¬ËæºóÔÚ¸ôÀëÇéÐÎÖа²ÅŰüÀ¨ÐéαÊý¾ÝµÄÃÛ¹ÞÕË»§£¬°üÀ¨ÓÉStripe APIÌìÉúµÄ28,000ÌõºÏ³ÉÏûºÄÕ߼ͼºÍ190,000ÌõºÏ³ÉÖ§¸¶ÉúÒâ¼Í¼¡£¹¥»÷ÕßÔÚ12ÔÂ12ÈÕÖÁ24ÈÕʱ´úͨ¹ý´ó×ÚסլÊðÀíIPÌìÉú³¬188,000¸öÇëÇó£¬Ê±´úÒòÊðÀíÅþÁ¬¹ÊÕÏÌ»Â¶ÕæÊµIPµØµã£¬Resecurity½è´ËÍøÂç¹¥»÷ÕßÕ½Êõ¡¢ÊÖÒÕ¼°»ù´¡ÉèÊ©ÐÅÏ¢£¬²¢±¨¸æÖ´·¨²¿·Ö¡£


https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/


2. RondoDox½©Ê¬ÍøÂç½èReact2ShellÎó²îÌᳫȫÇò¹¥»÷


12ÔÂ31ÈÕ£¬¿ËÈÕ£¬ÍøÂçÇå¾²Ñо¿Õ¹ÏÖ£¬RondoDox½©Ê¬ÍøÂçÕýʹÓÃReact2ShellÑÏÖØÎó²î£¨CVE-2025-55182£©´ó¹æÄ£Ñ¬È¾Next.js·þÎñÆ÷£¬°²ÅŶñÒâÈí¼þ¼°¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¡£¸ÃÎó²îΪδ¾­ÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬¿Éͨ¹ýµ¥¸öHTTPÇëÇó´¥·¢£¬Ó°ÏìËùÓÐʵÏÖReact Server Components¡°Flight¡±Ð­ÒéµÄ¿ò¼Ü£¬°üÀ¨Next.js¡£×èÖ¹2025Äê12ÔÂ30ÈÕ£¬Shadowserver»ù½ð»áÒѼì²âµ½³¬94,000¸ö̻¶ÓÚ»¥ÁªÍøµÄÒ×Êܹ¥»÷×ʲú¡£RondoDox×îÔçÓÉFortinetÓÚ2025Äê7Լͼ£¬ÊÇÒ»¸öʹÓöànÌìÎó²îÌᳫȫÇò¹¥»÷µÄ´óÐͽ©Ê¬ÍøÂç¡£Æä2025ÄêÔËÓª·ÖΪÈý¸ö½×¶Î£º3ÔÂÖÁ4Ô¾ÙÐÐÕì̽ÓëÎó²î²âÊÔ£»4ÔÂÖÁ6ÔÂʵÑé×Ô¶¯»¯WebÓ¦ÓÃÎó²îʹÓã»7ÔÂÖÁ½ñÔòתÏò´ó¹æÄ£ÎïÁªÍø½©Ê¬ÍøÂç°²ÅÅ¡£11Ô£¬VulnCheck·¢Ã÷ÆäбäÖÖʹÓÃXWikiƽ̨µÄCVE-2025-24893Îó²î¡£CloudSEK±¨¸æÖ¸³ö£¬RondoDox×Ô12ÔÂ8ÈÕÆðɨÃè±£´æÎó²îµÄNext.js·þÎñÆ÷£¬ÈýÌìºó×îÏȰ²ÅŽ©Ê¬ÍøÂç¿Í»§¶Ë£¬²¢ÔÚ12ÔÂÁùÌìÄÚÌᳫ³¬40´Î¹¥»÷ʵÑ飬ÿСʱÕë¶ÔLinksys¡¢WavlinkµÈÏûºÄ¼¶¼°ÆóÒµ¼¶Â·ÓÉÆ÷ÌᳫÎïÁªÍø¹¥»÷À˳±£¬ÒÔÕÐļн©Ê¬½Úµã¡£


https://www.bleepingcomputer.com/news/security/rondodox-botnet-exploits-react2shell-flaw-to-breach-nextjs-servers/


3. Covenant HealthÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


1ÔÂ3ÈÕ£¬ÌìÖ÷½ÌÒ½ÁÆ»ú¹¹Covenant HealthÓÚ2025Äê5ÔÂÔâÓöÑÏÖØÍøÂç¹¥»÷£¬µ¼ÖÂ478,188ÈËÃô¸ÐÐÅϢй¶£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Ò½ÁƼͼºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢¿µ½¡°ü¹ÜÐÅÏ¢¼°ÖÎÁÆÏêÇéµÈ¡£¸Ã×éÖ¯ÔÚÃåÒòÖÝ¡¢ÂíÈøÖîÈûÖÝ¡¢Ðº±²¼Ê²¶ûÖÝ¡¢±öϦ·¨ÄáÑÇÖÝ¡¢Â޵µºÖݺͷðÃÉÌØÖÝÔËÓªÈý¼ÒÒ½Ôº¼°¶à¼Ò¿µ¸´ÖÐÐÄ¡¢¸¨ÖúÉúÑÄסËùºÍÉçÇø¿µ½¡»ú¹¹¡£ÊÓ²ìÏÔʾ£¬ºÚ¿ÍÓÚ5ÔÂ18ÈÕÖÁ26ÈÕʱ´ú»á¼ûÆäITϵͳ£¬ÊÂÎñÒÑÓÚ12ÔÂ10ÈÕÊӲ쿢ʲ¢×ª´ïÁª°îÖ´·¨²¿·Ö¡£´Ë´Î¹¥»÷¶ÔÃåÒòÖÝʥԼɪ·òÒ½Ôº¡¢Ê¥ÂêÀö¿µ½¡ÏµÍ³¼°Ðº±²¼Ê²¶ûÖÝʥԼɪ·òÒ½ÔºÔì³ÉÏÔÖøÓ°Ï죺ʥÂêÀöҽԺʵÑéÊÒ½öÄÜ´¦Öóͷ£Ö½ÖÊÒ½Öö£¬Ðº±²¼Ê²¶ûÖÝʥԼɪ·òҽԺʵÑéÊÒ·þÎñÊÜÏÞÇÒÐèÖ½ÖÊÒ½Öö¡£Covenant HealthÓÚ³ýϦҹ×îÏÈÏòÊܺ¦Õß¼ÄËÍÎ¥¹æÍ¨ÖªÐÅ£¬²¢ÌṩһÄêÆÚÐÅÓÃ¼à¿Ø·þÎñ¡£÷è÷ëÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£


https://therecord.media/covenant-health-breach-qilin


4. ÐÂÎ÷À¼ManageMyHealthÊý¾Ýй¶ӰÏ쳬10ÍòÓû§


1ÔÂ2ÈÕ£¬¿ËÈÕ£¬ÐÂÎ÷À¼Êý×Ö¿µ½¡Æ½Ì¨ManageMyHealth±¬·¢Êý¾Ýй¶ÊÂÎñ£¬Ô¼180Íò×¢²áÓû§ÖпÉÄÜÓÐ6%ÖÁ7%£¨¼´10.8ÍòÖÁ12.6ÍòÓû§£©Êܵ½Ó°Ïì¡£´Ë´ÎÊÂÎñÉæ¼°ÔÊÐíÁÙ´²Ò½Éú»á¼û»¼ÕßÒ½ÁƼͼµÄÔÚÏß·þÎñ£¬ÊÜÓ°Ïì¿Í»§½«ÔÚδÀ´48СʱÄÚÊÕµ½¹«Ë¾Í¨Öª£¬Ã÷È·ÆäÐÅÏ¢ÊÇ·ñ¼°ÔõÑù±»»á¼û¡£ManageMyHealthÊ×ϯִÐйÙVino RamayahÇ¿µ÷£¬¹«Ë¾Ê¼ÖÕ½«¿µ½¡ÐÅÏ¢±£»¤ÊÓΪ½¹µãÔðÈΡ£ËûÌåÏÖ£º¡°ÎÒÃÇÉîÖª¿µ½¡ÐÅÏ¢µÄ˽ÃÜÐÔÓëÃô¸ÐÐÔ£¬´ËÀàÊÂÎñ¿ÉÄÜÒý·¢Óû§½¹ÂÇ¡£ÏÖÔÚÍŶÓÕýÈ«Á¦È·¶¨ÊÜÓ°ÏìÖ°Ô±£¬²¢½«ÒÔÖ±½Ó¡¢Í¸Ã÷µÄ·½·¨ÓëÆäÏàͬ¡£¡±Òþ˽רԱ°ì¹«ÊÒÒÑ»ñϤÊÂÎñ£¬²¢ÕýÓëÆ½Ì¨ÏàÖúÍÆÐÐÒþ˽Á¢·¨ÒåÎñ¡£ÐÂÎ÷À¼ÎÀÉú²¿³¤Î÷ÃÉ¡¤²¼Àʳƴ˴ÎÎ¥¹æ¡°ÁîÈ˵£ÐÄ¡±£¬µ«Ã÷È·ÌåÏÖ¡°ÏÖÔÚÎÞÖ¤¾ÝÅú×¢°üÀ¨ÎҵĿµ½¡ÕË»§ÔÚÄÚµÄÈκÎHNZ£¨ÐÂÎ÷À¼¿µ½¡Ôö½øÐ­»á£©ÏµÍ³Ôâµ½ÆÆËð£¬ÒòManageMyHealthÓµÓÐ×ÔÁ¦ÏµÍ³¡±¡£ËûÇ¿µ÷£¬ÐÂÎ÷À¼ÎÀÉú²¿ÕýÓëÆ½Ì¨Ç×½üÏàÖú£¬È·±£ÊÂÎñÍ×ÉÆ´¦Öóͷ££¬ÇÒÒ½ÁÆ·þÎñ½«Ò»Á¬Õý³£ÔËת£¬ÎÞÁÙ´²Ó°Ïì¡£


https://www.1news.co.nz/2026/01/02/managemyhealth-data-breach-more-than-108k-users-potentially-affected/


5. ¶«¾©FMÊý¾Ýй¶£¬³¬300ÍòÓû§ÐÅÏ¢ÊÜÍþв


1ÔÂ1ÈÕ£¬ÈÕ±¾×ÅÃû¹ã²¥µç̨¶«¾©FM¹ã²¥Öêʽ»áÉçÔâÓöÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£Ò»¸ö×Գơ°Êܺ¦Õß¡±µÄÕûÌåÐû³ÆÒÑÈëÇָù«Ë¾ÄÚ²¿ÅÌËã»úϵͳ£¬²¢ÇÔÈ¡Áè¼Ý300ÍòÌõСÎÒ˽¼Ò¼°ÊÖÒÕÊý¾Ý¼Í¼¡£´Ë´ÎÊÂÎñÒòÉæ¼°Ãô¸ÐÐÅÏ¢Á¿ÖØ´óÇÒ±¬·¢ÔÚ¿çÄêÌØÊâʱ¶Î£¬Òý·¢ÆÕ±é¹Ø×¢¡£¾Ý¹¥»÷ÕßÅû¶£¬±»µÁÊý¾Ýº­¸ÇÓû§È«Ãû¡¢ÉúÈÕ¡¢µç×ÓÓʼþµØµãµÈ»ù´¡Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬ÒÔ¼°IPµØµã¡¢Óû§ÊðÀí£¨¿Éʶ±ð×°±¸ÀàÐÍ£©µÈÊÖÒÕϸ½Ú¡£¸üÑÏÖØµÄÊÇ£¬¹¥»÷ÕßÉù³Æ»ñÈ¡Á˹«Ë¾ÄÚ²¿ÏµÍ³µÄµÇ¼ID¼°Ô±¹¤ÊÂÇéÐÅÏ¢£¬ÈôÊôʵ£¬¿ÉÄÜÍþвÆóÒµÔËÓªÇå¾²¼°Ô±¹¤Òþ˽¡£ÏÖÔÚ£¬Êý¾ÝÕæÊµÐÔÈÔ´¦ÓÚר¼ÒºËʵ½×¶Î£¬µ«Ç±ÔÚΣº¦ÒÑÒý·¢Çå¾²»ú¹¹¾¯ÐÑ¡£¶«¾©FM×÷ΪÈÕ±¾×î¾ßÓ°ÏìÁ¦µÄ¹ã²¥µç̨֮һ£¬ÕÆÎÕ´ó×ÚÌýÖÚ¼°Ô±¹¤ÐÅÏ¢£¬ºã¾Ã³ÉÎªÍøÂç·¸·¨·Ö×ÓÄ¿µÄ¡£Ö»¹Ü´Ë´ÎÊÂÎñ±»ÆðÔ´¶¨ÐÔΪͨË×ÍøÂç·¸·¨°¸¼þ£¬µ«Êý¾Ýй¶¹æÄ£¼°É漰ά¶È£¨´ÓСÎÒ˽¼ÒÒþ˽µ½Æóҵϵͳƾ֤£©ÒÑÔ¶³¬Í¨ÀýÁìÓò¡£Ç徲ר¼ÒÌáÐÑ£¬Èô¹¥»÷ÕßÕÆÎÕÕæÊµÊý¾Ý£¬¿ÉÄܵ¼Ö¾«×¼Õ©Æ­¡¢Éí·ÝµÁÓõȴÎÉúΣº¦¡£


https://hackread.com/tokyo-fm-data-breach-hacker-3-million-records-stolen/


6. Google Cloud¹¤¾ß±»ÀÄÓ÷¢¶¯ÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷


1ÔÂ2ÈÕ£¬Check PointÑо¿Ö°Ô±·¢Ã÷£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓÃGoogle Cloud Application IntegrationÖеÄÕýµ±¹¦Ð§Ìᳫ´ó¹æÄ£ÍøÂç´¹ÂÚ¹¥»÷¡£¸Ã¹¥»÷ͨ¹ý¶à²ãÖØ¶¨ÏòÊÖÒÕÈÆ¹ý¹Å°åÇå¾²¼ì²â£¬Á½ÖÜÄÚ·¢Ëͽü9400·âαÔìÓʼþ£¬Ó°ÏìÔ¼3200ÃûÓû§¡£¹¥»÷ÕßÀÄÓÃGoogle CloudµÄ"·¢Ë͵ç×ÓÓʼþ"×Ô¶¯»¯¹¤¾ß£¬´Ó¹Ù·½ÓòÃûmailto:noreply-application-integration@google.com·¢ËÍÓʼþ£¬Ê¹ÓÃÊÜÐÅÍеÄÔÆ·þÎñ»ù´¡ÉèÊ©Ìá¸ß¿ÉÐŶÈ¡£Óʼþ¸ß¶ÈÄ£ÄâGoogle¹Ù·½Æø¸Å£¬ÒÔÓïÒôÓʼþÌáÐÑ¡¢¹²ÏíÎļþ»á¼ûµÈͨÀý³¡¾°ÎªÓÕ¶üÓÕµ¼µã»÷¡£¹¥»÷Á´°üÀ¨Èý¸ö½×¶Î£ºÊ×ÏÈͨ¹ýstorage.cloud.google.comÁ´½Ó½¨Éè³õʼÐÅÍУ»ËæºóÖØ¶¨ÏòÖÁgoogleusercontent.comÏÔʾÐéαÑéÖ¤Âë¹æ±Ü×Ô¶¯É¨Ã裻×îÖÕÖ¸Ïò·Ç΢ÈíÓòÃûµÄαÔì΢ÈíµÇÂ¼Ò³ÃæÇÔȡƾ֤¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔÖÆÔìÒµºÍ¹¤ÒµÆóÒµ£¬¿Æ¼¼/SaaS¼°½ðÈÚ»ú¹¹´ÎÖ®£¬×¨Òµ·þÎñ¡¢ÁãÊÛ¡¢Ã½Ìå¡¢½ÌÓý¡¢Ò½ÁÆ¡¢ÄÜÔ´¡¢Õþ¸®µÈÐÐÒµÒ²Êܵ½²î±ðˮƽӰÏì¡£µØÇøÂþÑÜÏÔʾ£¬ÃÀ¹úÊܺ¦Õß×î¶à£¬ÑÇÌ«ºÍÅ·ÖÞÔ˶¯»îÔ¾£¬À­¶¡ÃÀÖÞÖаÍÎ÷ºÍÄ«Î÷¸çÊÜÓ°Ïì×îÑÏÖØ¡£


https://securityaffairs.com/186425/cyber-crime/phishing-campaign-abuses-google-cloud-application-to-impersonate-legitimate-google-emails.html