Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ £¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ

°ä²¼¹¦·ò 2025-01-02

1. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ £¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ


1ÔÂ1ÈÕ £¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒ¸æ £¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£© ¡£DEphotoרһÓÚѧÌá¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ° ¡£¾Ý0mid16BÐû³Æ £¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto £¬µÁÈ¡ÁË55ÍòÓàÃû¿Í»§µÄÓ×ÎÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨Ô̺¬24ÍòÓà·Ýº¬¾ßÌåÓ×ÎÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓþ¿¨ÐÅÏ¢ ¡£´Ë±í £¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý £¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â ¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý £¬ÏÔʾ±»½Ó¼ûµÄÊý¾Ý¿âÊý¾Ý³¬¹ý12GB ¡£0mid16B°µÊ¾ £¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto £¬µ«¸Ã¹«Ë¾Î´¼ÓÇ¿±£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð £¬Òò¶øÓÚ12ÔÂ29ÈÕÔÙ´ÎÌáÒé¹¥»÷ ¡£¾ÝTrustPilotÉÏµÄÆÀÂÛÏÔʾ £¬DEphotoÒÑÆðÍ·ÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ £¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£ÁôÕþ²ß°µÊ¾²»Âú £¬ÒÔΪÆä±£ÁôÊý¾Ý¹¦·ò¹ý³¤ ¡£DEphotoµÄÒþÖÔÕþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ ¡£0mid16BÍþв½«ÏúÊÛ50Íò¿Í»§Êý¾Ý¿â £¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý £¬µ«Ä¿Ç°Éв»Ã÷ÏÔËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»³Ðŵ ¡£


https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/


2. EC2 Grouper£ºÀûÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½Êõ


1ÔÂ1ÈÕ £¬FortiGuard³¢ÊÔÊÒµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯ £¬¸Ã×é֯ƵÈÔÀûÓÃAWS¹¤¾ßºÍÊÜËðƾ֤½øÐй¥»÷ ¡£¸Ã×éÖ¯ÖØÒªÍ¨¹ýÓëÓÐЧÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤ £¬²¢Ê¹ÓÃAPI½øÐпúËźÍ×ÊÔ´´´½¨ £¬Ô¤·ÀÊÖ¶¯»î¶¯ ¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§»·¾³Öз¢ÏÖÁËÆä¹ÖÒìµÄÓû§´úÀíºÍ°²È«×鶨ÃûÔ¼¶¨µÈÌØµã £¬µ«ÕâЩָ±ê¶ÔÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»³É¿¿ £¬ÓÉÓÚ¹¥»÷ÕßÄܹ»ÇáËÉÅú¸ÄÓû§´úÀí²¢Æ«À붨ÃûÔ¼¶¨ ¡£×êÑÐÈËÔ±Ö¸³ö £¬Í¨¹ý¶ÈÎöƾ֤й¶ºÍAPIʹÓõÈÐźÅ £¬°²È«ÍŶÓÄܹ»Ôì¶©¿¿µÃסµÄ¼ì²âÕ½ÊõÀ´ÕмܴËÀ๥»÷ ¡£ÎªÁËÈ·±£°²È« £¬×éÖ¯Ó¦ÀûÓÃÔÆ°²È«Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ß³ÖÐø¼à¿ØºÍÆÀ¹ÀÔÆ»·¾³µÄ°²È«Ì¬ÊÆ £¬²¢Ö´ÐÐÒì³£¼ì²â¼¼ÊõÀ´¼ø±ðÔÆ»·¾³ÖеÄÒì³£ÐÐΪ ¡£´Ë±í £¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄÀûÓÃAWS»ù´¡ÉèÊ©½øÐй¥»÷ £¬ÕâÅú×¢ÔÆ»·¾³Ãæ¶Ô³ÖÐøµÄ°²È«Íþв ¡£


https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/


3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷ £¬Êý¾Ýй¶ÖÁ°µÍø


12ÔÂ31ÈÕ £¬Â޵µºÖÝÒ½Áƺ͸£Àû´òËãϵͳÔâµ½ÁËÍøÂç¹¥»÷ £¬ÍøÂç·¸×ï·Ö×ÓÒѽ«²¿ÃÅÇÔÈ¡µÄÎļþ°ä²¼µ½°µÍøÉÏ ¡£Öݳ¤µ¤Äá¶û¡¤Âó»ù°µÊ¾ £¬¸ÃÖÝÒ»ÏòÔÚΪ´Ë×ö³ï±¸ £¬²¢ÒÑÔì¶©±íÁªÕ½Êõ £¬¼¤Àø¿ÉÄÜÊÜÓ°ÏìµÄ¾ÓÃñ±£»¤Ó×ÎÒÐÅÏ¢ ¡£Ä¿Ç°Éв»Ã÷ÏÔÄÄЩÎļþ±»Ð¹Â¶ £¬ITÍŶÓÔÚ·ÖÎö ¡£Õƹܽ¨ÉèºÍÊØ»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸×ï·Ö×Ó»ñµÃÁªÏµ £¬²¢ÓëÖݵ±¾ÖºÏ×÷ÁгöÊÜÓ°ÏìÈËÔ±Ãûµ¥ £¬½«ÏòËûÃÇ·¢ËÍÐź¯Áìµ¼ÈôºÎ»ñµÃÃâ·ÑÐÅÓþ¼à¿Ø ¡£ÊÜÓ°ÏìµÄÖÝ´òËãÔ̺¬Ò½ÁƲ¹Öú¡¢²¹³äÓªÑøÔöÔ®´òËãµÈ ¡£Âó»ù¶½´Ù¾ÓÃñ²ÉȡһϵÁдëÊ©±£»¤²ÆÕþÐÅÏ¢ £¬ÈçÁªÏµÐÅÓþ»ã±¨»ú¹¹¶³½áÐÅÓþ¡¢ÉèÖÃڲƭ¾¯±¨¡¢Ê¹Óöà³É·ÖÉí·ÝÑéÖ¤ £¬²¢¾¯ÌèÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ ¡£·¨ÂɹÙÔ¹ØýÔÚµ÷²éÕâ´ÎÊý¾Ýй¶ÊÂÎñ £¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜÓ× ¡£


https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/


4. ½ÒʾºÚ¿ÍÈôºÎ½Ù³Ö 35 ¸ö Google Chrome À©´ó·¨Ê½


12ÔÂ31ÈÕ £¬Ò»Â·Õë¶ÔChromeä¯ÀÀÆ÷À©´ó·¨Ê½¿ª·¢ÈËÔ±µÄÍøÂç´¹µö»î¶¯½üÈÕ±»ÆØ¹â £¬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©´ó·¨Ê½±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂë £¬Ó°ÏìÔ¼260ÍòÓû§ £¬ÆäÖÐÔ̺¬ÍøÂ簲ȫ¹«Ë¾CyberhavenµÄÀ©´ó·¨Ê½ ¡£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ £¬µ«ÔçÆÚºÅÁîºÍ½ÚÔì×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒÑ´æÔÚ ¡£¹¥»÷Õßͨ¹ý·¢ËͼÙ×°³É¹È¸èµÄ´¹µöµç×ÓÓʼþ £¬Ðû³ÆÀ©´ó·¨Ê½Î¥·´ÁËChromeÍøÉÏÀûÓõêÕþ²ß £¬ÓÕµ¼¿ª·¢ÈËÔ±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÀûÓ÷¨Ê½½Ó¼ûÆäChromeÍøÉÏÀûÓõêÀ©´ó·¨Ê½ ¡£Ò»µ©»ñµÃ½Ó¼ûȨÏÞ £¬¹¥»÷Õ߾ͻáÅú¸ÄÀ©´ó·¨Ê½ÒÔÔ̺¬¶ñÒâÎļþ £¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý £¬Ô̺¬ID¡¢½Ó¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¸æ°×ÕÊ»§ÐÅÏ¢ºÍóÒ×ÕÊ»§µÈ ¡£´Ë±í £¬¶ñÒâ´úÂ뻹Ôö³¤Êó±êµã»÷ÊÂÎñ¼àÌýÆ÷ £¬²éÕÒÓëFacebookË«³É·ÖÉí·ÝÑéÖ¤»òCAPTCHA»úÔìÓйصĶþάÂëͼÏñ £¬ÒÔÈÆ¹ý2FA±£»¤²¢½Ù³ÖÕË»§ ¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕߵĺÅÁîºÍ½ÚÔì·þÎñÆ÷ £¬ÓÃÓÚ¸÷À๥»÷õè¾¶ £¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓþ¶î¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϽøÐÐÐéαÐÅÏ¢»òÍøÂç´¹µö»î¶¯ £¬»ò½«½Ó¼ûȨÏÞÏúÊÛ¸øËûÈË ¡£


https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/


5. GitHubÐéα¡°ÐÇÐÇ¡±·ºÀÄ£ºÚ¿Æ­Óë¶ñÒâÈí¼þ½èÊÆ´«²¼


12ÔÂ31ÈÕ £¬GitHubÉÏ´æÔÚʹÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌâ £¬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßÚ¿Æ­ºÍ¶ñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ³ÛÃû¶È £¬½ø¶ø½Ó´¥¸ü¶àÓû§ ¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥ £¬¿ÉÓÃÓÚÕ䲨´æ´¢¿â £¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿ÃÅ £¬ÍƼöÓйØÄÚÈÝ ¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍ·þÎñÀûÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ £¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý³ÛÃû¶È ¡£Ò»ÏîÐÂ×êÑз¢ÏÖ £¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵÄ £¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§ ¡£×êÑÐÈËԱʹÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ß·ÖÎöÊý¾Ý £¬¼ø±ð³ö¿ÉÒÉÐÇÐÇ £¬²¢·¢ÏÖ2024ÄêÐéαÐÇÐǻ¼¤Ôö ¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ £¬»á¼õÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÀµ ¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿ £¬²¢ÔÚ¿ÉÄܵÄÇé¿öϲ鳭´úÂë £¬ÒÔÔ¤·ÀÏÂÔØºýŪÐÔµÄÈí¼þ ¡£Ä¿Ç° £¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦ ¡£


https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/


6. TRAC Labs°ä²¼LegionLoader¶ñÒâÈí¼þÉî¿Ì»ã±¨


1ÔÂ1ÈÕ £¬TRAC Labs°ä²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉî¿Ì»ã±¨ ¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019Äê³õ´Î³öÏÖ²¢³ÖÐøÑݱäµÄ¸´ÔÓÏÂÔØÆ÷¶ñÒâÈí¼þ £¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate ¡£ËüÖØÒªÓÃC/C++±àд £¬¿ÉÄܲ¿ÊðһϵÁжñÒ⹤¾ß £¬Ô̺¬¿É½«ÊÜϰȾä¯ÀÀÆ÷תΪHTTP´úÀíµÄChromeÀ©´ó·¨Ê½ £¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ½Ó¼û ¡£×Ô2024Äê8ÔÂÒÔÀ´ £¬LegionLoader´«²¼Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡·¨Ê½ ¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖ÷¨Ê½½øÐд«²¼ £¬²¢Ñ¡È¡¶à²ã¼ÓÃܺͻìºÏ¼¼ÊõÌӱܼì²â ¡£¸Ã¶ñÒâÈí¼þµÄÅäÖø߶ȿɶ¨Ôì £¬ÆäÓÐÐ§ÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý £¬ÈçChromeÍ´´¦ºÍÆäËû½âÃÜÃÜÔ¿ ¡£´Ë±í £¬LegionLoaderͨ¹ýAPI¹¥»÷¹Æ»ó°²È«¹¤¾ß £¬²¢Ê¹ÓüÓÃÜͨѶÓëºÅÁîºÍ½ÚÔì·þÎñÆ÷ÁªÏµ ¡£TRAC LabsÌṩÁËÈ«ÃæµÄÈëÇÖÖ¸±êÁбí £¬ÒÔÔ®ÊÖ·ÀÓùÕß¼ø±ðºÍ¼õÇáLegionLoaderϰȾ ¡£


https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/