D-LinkÍ£²ú·ÓÉÆ÷ÏÖ¸ßΣÏÂÁî×¢ÈëÎó²î
Ðû²¼Ê±¼ä 2026-01-071. D-LinkÍ£²ú·ÓÉÆ÷ÏÖ¸ßΣÏÂÁî×¢ÈëÎó²î
1ÔÂ6ÈÕ£¬½üÆÚ£¬¶à¿îÒÑÍ£²úµÄD-Link DSLÍø¹ØÂ·ÓÉÆ÷±»·¢Ã÷±£´æ¸ßΣÏÂÁî×¢ÈëÎó²îCVE-2026-0625¡£¸ÃÎó²îÔ´ÓÚCGI¿âÖÐÊäÈëÕûÀí²»µ±£¬µ¼ÖÂdnscfg.cgi¶ËµãÒ×Êܹ¥»÷£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓÃDNSÉèÖòÎÊýÖ´ÐÐÔ¶³ÌÏÂÁ×îÖÕʵÏÖÔ¶³Ì´úÂëÖ´ÐС£Îó²îÇ鱨¹«Ë¾VulnCheckÓÚ2025Äê12ÔÂ15ÈÕÏòD-Link±¨¸æ´ËÎÊÌ⣬´ËǰShadowserver»ù½ð»áÃÛ¹ÞÒѲ¶»ñµ½Ïà¹Ø¹¥»÷¼£Ïó£¬ÇÒ¹¥»÷ÊÖÒÕδ¼û¹ûÕæ¼Í¼¡£¾È·ÈÏ£¬ÊÜÓ°Ïì×°±¸Ðͺż°¹Ì¼þ°æ±¾°üÀ¨£ºDSL-526B£¨¡Ü2.01£©¡¢DSL-2640B£¨¡Ü1.07£©¡¢DSL-2740R£¨<1.17£©¡¢DSL-2780B£¨¡Ü1.01.14£©¡£ÕâЩ²úÆ·×Ô2020ÄêÆðÒÑ×èÖ¹ÏúÊÛ£¬D-LinkÃ÷È·ÌåÏÖ²»»áΪÆäÌṩ¹Ì¼þ¸üÐÂÐÞ¸´Îó²î£¬½¨ÒéÓû§Á¬Ã¦Í£Óò¢Ì滻ΪÊÜÖ§³ÖÐͺš£D-LinkÇ¿µ÷£¬Í£²ú×°±¸½«²»ÔÙÎüÊչ̼þ¸üС¢Çå¾²²¹¶¡»òά»¤£¬½¨ÒéÓû§½«ÒÑÍ£²ú×°±¸Ì滻Ϊ¹©Ó¦ÉÌÆð¾¢Ö§³ÖµÄÐͺţ¬»ò°²ÅÅÔÚ·ÇÒªº¦ÍøÂ磬²¢Ê¹ÓÃ×îпÉÓù̼þ¼°ÑÏ¿áÇå¾²ÉèÖã¬ÒÔ½µµÍÇ徲Σº¦¡£
https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/
2. ÐÂÐÍVVS Stealer¶ñÒâÈí¼þÒ»Á¬ÍþвDiscordÓû§
1ÔÂ6ÈÕ£¬Ò»ÖÖÃûΪVVS Stealer£¨»òVVS $tealer£©µÄÐÂÐÍPython¶ñÒâÈí¼þ×Ô2025Äê4ÔÂÆðÒ»Á¬Õë¶ÔDiscordÓû§Ìᳫ¹¥»÷£¬ÆäÄÚ²¿ÔË×÷»úÖÆ½üÆÚÓÉPalo Alto Networks Unit 42ÍŶÓÊ×´ÎÅû¶¡£¸Ã¶ñÒâÈí¼þÒÔPyInstaller°üÐÎʽÈö²¥£¬¿ÉÔÚí§ÒâWindows×°±¸ÎÞÒÀÀµÔËÐУ¬ÎÞÐèÌØÊâÉèÖ᣹¥»÷½¹µã¾Û½¹ÓÚÇÔÈ¡DiscordÁîÅÆ£¬ÕâÖÖÊý×ÖÃÜÔ¿¿ÉÈúڿÍÈÆ¹ýÃÜÂëÖ±½Ó»á¼ûÓû§ÕË»§£¬½ø¶ø¶Áȡ˽ÐÅ¡¢»ñÈ¡Õ˵¥¼°ÐÅÓÿ¨ÐÅÏ¢¡£Æä¹¥»÷Á÷³Ì¼«¾ßÒÉ»óÐÔ£ºÍ¨¹ýαÔì"ÖÂÃü¹ýʧ"µ¯´°ÓÕµ¼Óû§ÖØÆôµçÄÔ£¬Ëæºó×¢Èë¶ñÒâ´úÂëÐÞ¸ÄDiscordÎļþ£¬½«¶ñÒâ¾ç±¾Ö²ÈëÓ¦ÓÃÎļþ¼Ð£¬ÊµÏÖÊµÊ±ÍøÂçÁ÷Á¿¼à¿Ø¡£¸üΣÏÕµÄÊÇ£¬Ëü»¹Äܽػñ±¸·Ý´úÂë¡¢¶àÒòËØÈÏÖ¤£¨MFA£©ÉèÖã¬ÉõÖÁÔÚÓû§ÐÞ¸ÄÃÜÂëʱ×èµ²µÇ¼ƾ֤¡£ËüͬʱÕë¶ÔChrome¡¢Edge¡¢Brave¡¢OperaµÈÖ÷Á÷ä¯ÀÀÆ÷£¬ÇÔÈ¡ÉúÑÄÃÜÂë¡¢Cookie¡¢×Ô¶¯Ìî³äÊý¾Ý£¬²¢½ØÈ¡×ÀÃæ½ØÍ¼¡£¸Ã¶ñÒâÈí¼þ½ÓÄɶ©ÔÄÖÆÏúÊÛģʽ£¬ÔÚTelegramƽ̨ÒÔÿÖÜ10Å·Ôª»òÖÕÉí199Å·ÔªµÄ¼ÛÇ®ÊÛÂô£¬±»Ðû´«Îª"×îÖÕÇÔÈ¡¹¤¾ß"¡£
https://hackread.com/vvs-stealer-malwar-discord-system-errors/
3. Ó¢¹úÎÖÀï¿Ë¿¤Ñ§Ð£ÔâÍøÂç¹¥»÷ÖÂÍ£¿Î
1ÔÂ6ÈÕ£¬Ó¢¹úÎÖÀï¿Ë¿¤Å¦Äá¶ÙµÄº£¶òÄ·ÏïѧУÒòÍøÂç¹¥»÷µ¼ÖÂITϵͳÖÜȫ̱»¾£¬±»ÆÈÓÚ2026Äê1ÔÂ5ÈÕ¼°6ÈÕÍ£¿Î£¬Ñ§ÉúÒò´Ë»ñµÃÑÓÉì°æÊ¥µ®¼ÙÆÚ¡£´Ë´ÎÊÂÎñÔì³ÉѧУµç»°¡¢µç×ÓÓʼþ¡¢·þÎñÆ÷¼°ÖÎÀíϵͳÍêÈ«ÎÞ·¨»á¼û£¬Ð£·½Æ¾Ö¤Íⲿר¼Ò½¨Òé×÷³öÍ£¿Î¾öÒ飬ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£Ð£³¤Âõ¿Ë¶û¡¤¸ÊÅ©ÔÚÖ¼ҳ¤ÐÅÖÐÌåÏÖ£¬Ñ§Ð£ÕýÓë½ÌÓý²¿ÍøÂçÊÂÎñÏìӦС×é¼°ËùÊô¶àѧԺÐÅÍлú¹¹Ó¢¸ñÀ¼Öв¿Ñ§ÔºÐÅÍлú¹¹µÄITר¼ÒÇ×½üÏàÖú£¬ÖÜÈ«ÊӲ첢½â¾öÎÊÌâ¡£×÷ΪԤ·À²½·¥£¬ËùÓнÌÖ°Ô±¹¤ºÍѧÉú±»ÒªÇóÔÚÁíÐÐ֪ͨǰ×èֹʹÓÃѧУϵͳ£¬°üÀ¨¹È¸è¿ÎÌúÍSharePoint¡£ÒѵǼϵͳµÄѧÉú±»¼û¸æÎÞÐèµ£ÐÄ£¬µ«·â±Õ»á¼ûȨÏÞÊÇÈ·±£ÊÓ²ìʱ´ú×î´óÇå¾²ÐÔµÄÐëÒª²½·¥¡£Ñ§Ð£ÔÚ1ÔÂ3ÈÕÐû²¼µÄÔçÆÚ֪ͨÖÐÃ÷È·Ö¸³ö£¬´Ë´ÎÊÂÎñÉæ¼°"ÈκÎÊý×Ö·þÎñ"µÄÖÐÖ¹£¬²¢ÈϿɱ£´æî¿ÏµºÏ¹æÎÊÌ⡣ƾ֤2018ÄêÊý¾Ý±£»¤·¨¼°GDPRÒªÇó£¬Ñ§Ð£ÒÑÔÚ72СʱÄÚÏòÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©±¨¸æÊÂÎñ£¬²¢½«ÓëÍâµØÕþ¸®Êý¾Ý±£»¤¹ÙÔ±ÏàÖúÍÆÐÐÒåÎñ¡£
https://www.theregister.com/2026/01/06/nuneaton_school_cyberattack/
4. UAC-0184ʹÓÃViberƽ̨¶ÔÎÚ·¢¶¯¶à½×¶ÎÍøÂç¹¥»÷
1ÔÂ5ÈÕ£¬¾ÝÇå¾²Ñо¿ÏÔʾ£¬Óë¶íÂÞ˹Ïà¹ØµÄÍþвÐÐΪÕßUAC-0184£¨ÓÖÃûHive0156£©Õýͨ¹ýViber¼´Ê±Í¨Ñ¶Æ½Ì¨ÏòÎÚ¿ËÀ¼¾ü·½¼°Õþ¸®ÊµÌåͶµÝαװ³ÉÎĵµµÄ¶ñÒâZIPѹËõ°ü£¬Ò»Á¬¿ªÕ¹¸ßÇ¿¶ÈÇ鱨ËѼ¯Ô˶¯¡£¸Ã×éÖ¯×Ô2024ÄêÍ·ÓÉÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×éÊ״μͼÒÔÀ´£¬ÒÑ´ÓʹÓÃSignal¡¢TelegramÈö²¥¶ñÒâÈí¼þÑݱäΪÒÔViberΪ³õʼÈëÇÖÔØÌ壬ÐγɸüÒþ²ØµÄ¹¥»÷Á´¡£¹¥»÷Á÷³Ì·ºÆð¶à½×¶ÎÌØÕ÷£º¶ñÒâZIP°üÄÚº¬¶à¸öWindows¿ì½Ý·½·¨Îļþ£¨.LNK£©£¬Î±×°³ÉMicrosoft Word/Excel¹Ù·½ÎĵµÓÕÆÓû§·¿ª¡£ÕâЩLNKÎļþÍâòչÊÕ¬Õ¶üÎĵµ½µµÍÊܺ¦ÕßСÐÄ£¬ºǫ́Ôòͨ¹ýPowerShell¾ç±¾´ÓÔ¶³Ì·þÎñÆ÷¾²Ä¬ÏÂÔØµÚ¶þ¸öZIP°ü£¬Ö´ÐÐHijack Loader¼ÓÔØÆ÷¡£¸Ã¼ÓÔØÆ÷½ÓÄÉDLL²à¼ÓÔØºÍÄ£¿é¶ÑµþÊÖÒÕ£¬ÔÚÄÚ´æÖÐÖØ¹¹²¢°²ÅÅ£¬¹æ±ÜÇå¾²¹¤¾ß¼ì²â¡£Ëæºó£¬¼ÓÔØÆ÷ͨ¹ýCRC32¹þϣֵɨÃèÇéÐÎÖеÄÇå¾²Èí¼þ£¨È翨°Í˹»ù¡¢Avast¡¢BitDefenderµÈ£©£¬²¢½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚÐÔ¡£×îÖÕ£¬Í¨¹ý×¢Èë¡°chime.exe¡±Àú³ÌÒþ²ØÖ´ÐÐRemcosÔ¶³Ì»á¼ûľÂí£¬Ê¹¹¥»÷Õß»ñµÃÖÕ¶ËÖÎÀí¡¢¸ºÔØÖ´ÐС¢Ô˶¯¼à¿Ø¼°Êý¾ÝÇÔÈ¡ÄÜÁ¦¡£
https://cybersecuritynews.com/whatsapp-device-fingerprinting/
5. WhatsApp¶à×°±¸¼ÓÃÜÎó²îÖ²Ù×÷ÏµÍ³Ö¸ÎÆÊ¶±ðΣº¦
1ÔÂ5ÈÕ£¬MetaÆìÏÂÓµÓг¬30ÒÚÔ»îÔ¾Óû§µÄ¼´Ê±Í¨Ñ¶Ó¦ÓÃWhatsApp£¬Æä¶Ëµ½¶Ë¼ÓÃܵĶà×°±¸¹¦Ð§ºã¾Ã±£´æÔªÊý¾Ýй¶Òþ»¼£¬Ê¹¹¥»÷ÕßÄܹ»Í¨¹ý×°±¸Ö¸ÎÆÊ¶±ð¾«×¼Í¶µÝ¶ñÒâÈí¼þ¡£½üÆÚÑо¿ÏÔʾ£¬Ö»¹ÜMetaÒÑʵÑ鲿·ÖÐÞ¸´²½·¥£¬µ«Í¸Ã÷¶Èȱ·¦µÄÎÊÌâÈÔÒý·¢Çå¾²ÉçÇø¹Ø×¢¡£WhatsApp¶à×°±¸¼Ü¹¹Ï£¬·¢ËÍ·½ÓëÎüÊÕ·½×°±¸½¨Éè×ÔÁ¦»á»°£¬½ÓÄÉ×°±¸ÍâµØÌìÉúµÄΨһ¼ÓÃÜÃÜÔ¿¡£ÃÜÔ¿IDʵÏÖ²î±ð»á̻¶װ±¸²Ù×÷ϵͳÀàÐÍ£¨ÈçAndroid»òiOS£©£¬¹¥»÷Õ߿ɱ»¶¯ÅÌÎÊWhatsApp·þÎñÆ÷»ñÈ¡»á»°ÃÜÔ¿£¬ÎÞÐèÓû§½»»¥¼´¿Éʶ±ð²Ù×÷ϵͳ£¬½ø¶øÏòAndroid×°±¸¶¨Ïò°²ÅÅÎó²îʹÓóÌÐò£¬Í¬Ê±¹æ±ÜiOS×°±¸ÒÔ¼á³ÖÒþ²ØÐÔ¡£ÎªÓ¦¶Ô´ËΣº¦£¬WhatsAppÒѽ«AndroidÊðÃûÔ¤ÃÜÔ¿ID·ÖÅÉ·½·¨¸ÄΪÔÚÕû¸ö24λ¹æÄ£ÄÚËæ»úȡֵ£¬×è¶Ï¸Ã¹¥»÷·¾¶¡£È»¶ø£¬iOSÒ»´ÎÐÔÔ¤ÃÜÔ¿ÈÔ¾ßÇø·Ö¶È£¬ÆäIDÆðʼֵ½ÏµÍÇÒÿ¸ô¼¸ÌìµÝÔö£¬¶øAndroidʹÓÃÍêÈ«Ëæ»ú¹æÄ££¬ÐÞ¸´ºó¹¤¾ßÈÔÄܿɿ¿¼ì²â²Ù×÷ϵͳ¡£ÕâÖÖ²î±ðʹ¸ß¼¶Ò»Á¬ÐÔÍþв¿ÉʹÓÃWhatsApp×÷ΪÒþ²ØÈö²¥ÇþµÀ£¬ÅÌÎÊÀú³Ì²»´¥·¢Óû§Í¨Öª¡£
https://cybersecuritynews.com/whatsapp-device-fingerprinting/
6. EverestÀÕË÷Èí¼þ¹¥»÷BolttechÇÔÈ¡186GBÃô¸ÐÊý¾Ý
1ÔÂ5ÈÕ£¬¿ËÈÕ£¬Óë¶íÂÞ˹¹ØÁªµÄEverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÒÑ´ÓÈ«Çò°ü¹Ü»ù´¡Éèʩƽ̨BolttechÇÔȡԼ186GB¸ß¶ÈÃô¸ÐÊý¾Ý£¬²¢ÒªÇó¸Ã¹«Ë¾Ö§¸¶Êê½ð¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼ÐÅÏ¢³Æ£¬ÇÔÈ¡ÄÚÈݰüÀ¨Ô±¹¤ºÍÊðÀíÕË»§£¨µç×ÓÓʼþ¡¢ÐÕÃû¡¢½ÇÉ«¡¢±êʶ·û£©¡¢¿Í»§ÐÅÏ¢¡¢ÁªÏµÏêÇé¡¢±£µ¥Êý¾Ý¡¢µäÖÊ´û¿î¼Í¼¡¢µç»°ºÅÂë¡¢±»°ü¹Ü¹¤ÒµµØµã¡¢²ÆÎñ²ÎÊý¼°ÄÚ²¿ÔËÓª±êʶ·û£¬²¢¸½ÕÕÆ¬Ñù±¾×ôÖ¤¡£ÍøÕ¾ÉèÓе¹¼ÆÊ±Æ÷£¬ÍþвÈô±¾ÖÜÍíЩʱ¼äδ»ñ»Ø¸´£¬½«¹ûÕæËùÓÐÊý¾Ý¡£Ñо¿ÍŶӯÊÎöºóÖ¸³ö£¬Êý¾ÝÀÄÓÃΣº¦ÑÏËࣺ¿Í»§¼°Ô±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢Éí·Ý»ÏñÆÊÎö£»±£µ¥±êʶ·û»ò±»ÓÃÓÚÌá½»Ú²ÆÐÔË÷Åâ¡£ÈôÊý¾Ý°üÀ¨ÍêÕûµØµã£¬ÈËÈâËÑË÷Σº¦½«½øÒ»²½¼Ó¾ç¡£Everest×éÖ¯×Ô2021ÄêÊ״α»Ê¶±ðÒÔÀ´£¬ÒѳÉΪ×î¾ß¹¥»÷ÐÔµÄÀÕË÷Èí¼þÍÅ»ïÖ®Ò»¡£ÒÑÍù12¸öÔÂÄÚEverestÒÑË𺦳¬100¼Ò×éÖ¯£¬½üÆÚ»¹¹¥»÷Á˰ÍÎ÷ʯÓ;ÞÍ·°ÍÎ÷¹ú¼ÒʯÓ͹«Ë¾¼°Ô˶¯Æ·ÅÆUnder Armour¡£
https://cybernews.com/security/everest-hack-bolttech-ransom-data/


¾©¹«Íø°²±¸11010802024551ºÅ