ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷Ч¹ûÈö²¥¶ñÒâÈí¼þ

Ðû²¼Ê±¼ä 2025-01-16

1. ÍøÂç¹¥»÷ÕßÀÄÓÃYouTubeºÍGoogleËÑË÷Ч¹ûÈö²¥¶ñÒâÈí¼þ


1ÔÂ14ÈÕ£¬£¬ £¬¹¥»÷ÕßʹÓÃYouTubeºÍGoogleËÑË÷Ч¹û£¬£¬ £¬Õë¶ÔѰÕÒµÁ°æºÍÆÆ½âÈí¼þÏÂÔØµÄÓû§ÊµÑéÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ËûÃÇÔÚYouTubeÊÓÆµÖаüÀ¨ÐéαÈí¼þÏÂÔØÁ´½Ó£¬£¬ £¬ÓÕÆ­Óû§µã»÷²¢ÏÂÔØ°üÀ¨ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ³ÌÐò¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬ £¬ÔÚGoogleËÑË÷Ч¹ûÖÐÖ²Èë¿´ËÆÕýµ±µÄµÁ°æÈí¼þÏÂÔØÁ´½Ó£¬£¬ £¬ÊµÔòÒ²°üÀ¨¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃMediafireºÍMega.nzµÈÎļþÍйÜЧÀÍÒþ²Ø¶ñÒâÈí¼þȪԴ£¬£¬ £¬²¢Ê¹ÓÃÃÜÂë±£»£»£»£»£»£»£»¤ºÍ±àÂëÊÖÒÕ¹æ±ÜÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬¸Ã¹¥»÷»î¶¯ÓëÒ»Äêǰ·ºÆðµÄLumma StealerÀàËÆ£¬£¬ £¬Èö²¥¶àÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬ £¬ÈçPrivateLoader¡¢MarsStealerµÈ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÀÄÓÃÈËÃǶÔYouTubeºÍÎļþ¹²ÏíЧÀ͵ÄÐÅÈΣ¬£¬ £¬ÓÈÆäÓ°ÏìÄÇЩѰÕÒµÁ°æÈí¼þµÄÓû§¡£¡£¡£¡£¡£¡£ÎªÁË·ÀÓùÕâЩ¹¥»÷£¬£¬ £¬×éÖ¯»ú¹¹Ó¦ÏàʶĿ½ñÍþв£¬£¬ £¬¼á³ÖСÐÄ£¬£¬ £¬²¢Ìá¸ßÔ±¹¤Çå¾²Òâʶ¡£¡£¡£¡£¡£¡£


https://www.darkreading.com/threat-intelligence/cyberattackers-infostealers-youtube-comments-google-search


2. Fortinet·À»ðǽÔâ´ó¹æÄ£ÁãÈÕÎó²î¹¥»÷


1ÔÂ14ÈÕ£¬£¬ £¬È¥Äê12Ô£¬£¬ £¬Çå¾²Ñо¿Ö°Ô±ÊӲ쵽Õë¶ÔFortinet·À»ðǽµÄ´ó¹æÄ£¹¥»÷»î¶¯£¬£¬ £¬¹¥»÷Õß¿ÉÄÜʹÓÃÁËÉÐδÐÞ²¹µÄÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷µ¼ÖÂÊý°Ùµ½Êýǧ´Î¶ñÒâµÇ¼ÊÂÎñ£¬£¬ £¬¹¥»÷Õßͨ¹ýÖÎÀí½çÃæ»ñµÃ»á¼ûȨÏÞ£¬£¬ £¬²¢ÐÞ¸ÄÁË·À»ðǽÉèÖ㬣¬ £¬Ê¹ÓÃSSL VPNËíµÀά³ÖÅþÁ¬£¬£¬ £¬ÇÔȡƾ֤ÒÔÔÚÊܺ¦ÕßÍøÂçÖкáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£Ö»¹ÜÏêϸϸ½ÚÈÔÔÚÊÓ²ìÖУ¬£¬ £¬µ«±±¼«ÀÇʵÑéÊҸ߶ÈÈ·ÐÅÁãÈÕÎó²î±»´ó¹æÄ£Ê¹Óᣡ£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¹Ì¼þ°æ±¾°üÀ¨7.0.14ÖÁ7.0.16¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹ÆÕ±éʹÓÃÁË×°±¸µÄ»ùÓÚWebµÄÏÂÁîÐнçÃæ£¬£¬ £¬²¢ÓëÒì³£Ô´IPµØµã½¨ÉèÁË¿ÉÒÉÅþÁ¬¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷´Ó11ÔÂÖÐÑ®×îÏÈ£¬£¬ £¬µ«Ö±µ½12Ô²ű¬·¢´ó¹æÄ£·À»ðǽÉèÖøü¸Ä¡£¡£¡£¡£¡£¡£¹¥»÷Õß½¨ÉèÁËеij¬µÈÖÎÀíÔ±ÕË»§£¬£¬ £¬·­¿ªÁËÍâµØÓû§ÕË»§£¬£¬ £¬²¢½«ËüÃÇÌí¼Óµ½¾ßÓÐVPN»á¼ûȨÏÞµÄ×éÖУ¬£¬ £¬»òÕßÐ®ÖÆÏÖÓÐÕË»§¡£¡£¡£¡£¡£¡£ËûÃÇ»¹½¨ÉèÁËеÄSSL VPNÃÅ»§£¬£¬ £¬²¢½«Óû§ÕË»§Ö±½ÓÌí¼Óµ½ÕâЩÃÅ»§ÖС£¡£¡£¡£¡£¡£Ò»µ©½¨ÉèÁËSSL VPNËíµÀ£¬£¬ £¬¹¥»÷Õ߾ͻáÍøÂçÆ¾Ö¤¾ÙÐкáÏòÒÆ¶¯£¬£¬ £¬²¢Ê¹ÓÃÁËKali Linux¹¤¾ß¡£¡£¡£¡£¡£¡£Ö»¹ÜÎÞ·¨È·¶¨¹¥»÷ÕßµÄ×îÖÕÄ¿µÄ£¬£¬ £¬µ«ÀÕË÷Èí¼þµÄ¿ÉÄÜÐÔ²¢²»¿Éɨ³ý¡£¡£¡£¡£¡£¡£


https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/


3. 5000¸öWordPressÍøÕ¾ÔâÐÂÐͶñÒâÈí¼þÈëÇÖ


1ÔÂ14ÈÕ£¬£¬ £¬Ò»ÖÖÐÂÐͶñÒâÈí¼þ»î¶¯ÒÑÀÖ³ÉÈëÇÖÁè¼Ý5000¸öWordPressÍøÕ¾£¬£¬ £¬ÆäÖ÷ҪĿµÄΪ½¨ÉèÖÎÀíÔ±ÕÊ»§¡¢×°ÖöñÒâ²å¼þ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£WebscriptÇå¾²¹«Ë¾c/sideµÄÑо¿Ö°Ô±ÔÚ¶Ô¿Í»§ÊÂÎñÏìÓ¦Öз¢Ã÷£¬£¬ £¬ÕâЩ¶ñÒâ»î¶¯Ê¹ÓÃÁËwp3[.]xyzÓòÃû¾ÙÐÐÊý¾ÝÇÔÈ¡£¡£¡£¡£¡£¡£¬£¬ £¬µ«ÏêϸµÄ³õʼѬȾ;¾¶ÉÐδÃ÷È·¡£¡£¡£¡£¡£¡£Ò»µ©¹¥»÷µ½ÊÖ£¬£¬ £¬¶ñÒâ¾ç±¾±ã»á´Ówp3[.]xyz¼ÓÔØ£¬£¬ £¬²¢Ê¹ÓÃÔ¤ÉèÆ¾Ö¤½¨ÉèÃûΪwpx_adminµÄ¶ñÒâÖÎÀíÔ±ÕÊ»§¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬ £¬¸Ã¾ç±¾»á´ÓͳһÓòÃûÏÂÔØ²¢¼¤»îÒ»¸ö¶ñÒâ²å¼þ£¨plugin.php£©£¬£¬ £¬¸Ã²å¼þÖ¼ÔÚÍøÂçÖÎÀíԱƾ֤¡¢ÈÕÖ¾µÈÃô¸ÐÐÅÏ¢£¬£¬ £¬²¢ÒÔ»ìÏý·½·¨½«Æäαװ³ÉͼÏñÇëÇó·¢ËÍÖÁ¹¥»÷ÕßЧÀÍÆ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬¹¥»÷Àú³ÌÖл¹°üÀ¨¶à¸öÑéÖ¤°ì·¨£¬£¬ £¬Èç¼Í¼¶ñÒâÖÎÀíÔ±ÕÊ»§½¨Éè״̬¼°ÑéÖ¤¶ñÒâ²å¼þ×°ÖõÈ¡£¡£¡£¡£¡£¡£Îª×èÖ¹´ËÀ๥»÷£¬£¬ £¬c/side½¨ÒéÍøÕ¾ËùÓÐÕßʹÓ÷À»ðǽºÍÇå¾²¹¤¾ß·â±Õwp3[.]xyzÓòÃû¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬ £¬ÖÎÀíÔ±Ó¦°´ÆÚ¼ì²éÌØÈ¨ÕÊ»§ºÍÒÑ×°Öòå¼þÁÐ±í£¬£¬ £¬ÊµÊ±Ê¶±ð²¢É¾³ýδ¾­ÊÚȨµÄ»î¶¯¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬ÔöÇ¿WordPressÍøÕ¾µÄCSRF±£»£»£»£»£»£»£»¤Ò²ÖÁ¹ØÖ÷Òª£¬£¬ £¬ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤»¹¿ÉΪÒÑй¶ƾ֤µÄÕÊ»§Ìá¹©ÌØÊâ±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wp3xyz-malware-attacks-add-rogue-admins-to-5-000-plus-wordpress-sites/


4. Google OAuthÎó²î£ºÒѵ¹±ÕÊ×´´¹«Ë¾ÓòÃû³É¹¥»÷ÕßÐÂÄ¿µÄ


1ÔÂ14ÈÕ£¬£¬ £¬GoogleµÄOAuthµÇ¼¹¦Ð§±£´æÒ»¸öÖØ´óÇå¾²Òþ»¼£¬£¬ £¬¿ÉÄܱ»¹¥»÷ÕßʹÓÃÀ´»á¼ûǰԱ¹¤ÔÚSaaSƽ̨ÉϵÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£ÕâÒ»Îó²îÓÉTrufflesecurityÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬²¢Ïò¹È¸è±¨¸æ£¬£¬ £¬µ«×î³õ²¢Î´»ñµÃ×ã¹»ÖØÊÓ¡£¡£¡£¡£¡£¡£Ö»¹Ü¹È¸èØÊºóÏòÑо¿Ö°Ô±½ÒÏþÁËÉͽð²¢ÖØÐ¿ªÆôÁËÊӲ죬£¬ £¬µ«×èÖ¹ÏÖÔÚ£¬£¬ £¬¸ÃÎÊÌâÈÔδ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý×¢²áÒѵ¹±ÕÊ×´´¹«Ë¾µÄÓòÃû£¬£¬ £¬²¢Ê¹ÓÃÕâЩÓòÃûΪǰ¹ÍÔ±ÖØÐ½¨Éèµç×ÓÓʼþÕÊ»§£¬£¬ £¬´Ó¶ø»á¼ûËûÃÇÔÚSlack¡¢Notion¡¢Zoom¡¢ChatGPTµÈЧÀÍÉϵÄÕË»§¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬ £¬Í¨¹ý¹ºÖÃÒÑÍ£ÓõÄÓòÃû£¬£¬ £¬¹¥»÷Õß¿ÉÒÔ´ÓÈËÁ¦×ÊԴϵͳÖÐÌáÈ¡Ãô¸ÐÊý¾Ý£¬£¬ £¬²¢µÇ¼ÖÖÖÖЧÀÍ¡£¡£¡£¡£¡£¡£Õâ¸öÎÊÌâÓ°ÏìÁËÊý°ÙÍòÈ˺ÍÊýǧ¼Ò¹«Ë¾£¬£¬ £¬²¢ÇÒËæ×Åʱ¼äµÄÍÆÒÆ£¬£¬ £¬ÎÊÌâÖ»»á±äµÃÔ½À´Ô½ÑÏÖØ¡£¡£¡£¡£¡£¡£ÓÉÓÚ´ó´ó¶¼¿Æ¼¼Ê×´´¹«Ë¾×¢¶¨»áµ¹±Õ£¬£¬ £¬¶øËûÃÇÖеÄÐí¶àʹÓÃGoogle WorkspacesÀ´ÊÕ·¢µç×ÓÓʼþ£¬£¬ £¬Òò´ËËûÃǵÄÔ±¹¤Ê¹ÓÃGmailÕÊ»§µÇ¼Éú²úÁ¦¹¤¾ß¡£¡£¡£¡£¡£¡£ÎªÁËÌá·À´ËÀàΣº¦£¬£¬ £¬½¨ÒéÍÑÀëÊ×´´¹«Ë¾Ê±´ÓÕÊ»§ÖÐɾ³ýÃô¸ÐÊý¾Ý£¬£¬ £¬²¢×èֹʹÓÃÊÂÇéÕÊ»§¾ÙÐÐСÎÒ˽¼ÒÕÊ»§×¢²á¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/google-oauth-flaw-lets-attackers-gain-access-to-abandoned-accounts/


5. MIGÔâBlack BastaÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬´ó×Ú¿Í»§ÐÅϢй¶


1ÔÂ14ÈÕ£¬£¬ £¬ÃÀ¹ú¶«Äϲ¿×î´óµÄµäÖÊ´û¿î»ú¹¹Ö®Ò»£¬£¬ £¬×ܲ¿Î»ÓÚÌïÄÉÎ÷ÖݵĵäÖÊ´û¿îͶ×ÊÕß¼¯ÍÅ£¨MIG£©ÉϸöÔÂÔâÓöÁËÒ»´ÎÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬µ¼Ö´ó×Ú¿Í»§ÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£MIGδ͸¶ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿£¬£¬ £¬µ«ÒÑÔ¼Ç빩ӦÉÌʶ±ðÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬£¬ £¬²¢ÍýÏëÔÚ¼¸ÖÜÄÚÍê³É֪ͨÊÂÇé¡£¡£¡£¡£¡£¡£¾ÝMIGÍøÕ¾Í¨Öª£¬£¬ £¬´Ë´ÎÍøÂç¹¥»÷ʼÓÚ12ÔÂ11ÈÕ£¬£¬ £¬²¢ÓÚÔ½ÈÕ±»·¢Ã÷£¬£¬ £¬Ò»Ãûδ¾­ÊÚȨµÄÓû§½øÈëÁËMIGµÄÅÌËã»úÇéÐΣ¬£¬ £¬µ¼Ö¶àÃûСÎÒ˽¼ÒµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉBlack BastaÀÕË÷Èí¼þÍÅ»ïÌᳫ£¬£¬ £¬¸ÃÍÅ»ïÊÇÏÖÔÚ×îÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯Ö®Ò»£¬£¬ £¬ÔøÏ®»÷¹ýÈ«ÇòÖÁÉÙ500¸ö×éÖ¯£¬£¬ £¬²¢Ãé×¼ÁË16¸öÒªº¦»ù´¡ÉèÊ©²¿·ÖÖеÄ12¸ö¡£¡£¡£¡£¡£¡£½üÄêÀ´£¬£¬ £¬ÀÕË÷Èí¼þÍÅ»ïÒ»ÔÙ½«Ä¿µÄÃé׼ɿ¼°×¡·¿ÐÐÒµµÄ½ðÈÚ»ú¹¹£¬£¬ £¬ÒÑÓжà¼ÒÖÁ¹«Ë¾ÔâÊܹ¥»÷£¬£¬ £¬µ¼ÖÂס·¿¹ºÖÃÊÜ×è¡£¡£¡£¡£¡£¡£


https://therecord.media/tennessee-mortgage-lender-confirms-cyberattack


6. Î÷ºÚÎÄÕþ¸®ITϵͳÔâÍøÂç¹¥»÷£¬£¬ £¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Éù³ÆÈÏÕæ


1ÔÂ14ÈÕ£¬£¬ £¬¿µÄùµÒ¸ñÖÝÎ÷ºÚÎÄÊÐÕþ¸®ÕýÔÚÊÓ²ìÒ»Æðµ¼ÖÂÆäËùÓÐITϵͳÔÝʱ¹Ø±ÕµÄÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£Ê㤶àÁմ²©À×¶ûÔÚ1ÔÂ11ÈÕÌåÏÖ£¬£¬ £¬ÕâÆð¡°ITϵͳÇ徲ʹʡ±ÖÂʹÕþ¸®ÏµÍ³¹Ø±Õ£¬£¬ £¬¶øÕþ¸®×î³õÔÚ12ÔÂ26ÈÕÓÚFacebookÉϽöÌá¼°ÔâÓö¡°ÍøÂçÖÐÖ¹¡±¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬¸ÃÊÐÈÔÔÚÆÀ¹ÀÄÄЩÊý¾Ý¿ÉÄÜÊܵ½´Ë´ÎÊÂÎñµÄÓ°Ï죬£¬ £¬µ«Òѽ¨ÉèÓ¦¶ÔÀÏÀýºÍ×ÜÌå×¼±¸£¬£¬ £¬ÊÜÓ°ÏìϵͳÒÑÓб¸·Ý£¬£¬ £¬Ô¤¼Æ¼¸ÌìÄڿɻָ´ÔËÐС£¡£¡£¡£¡£¡£Ö»¹ÜÓÐ̸ÂÛÇëÇóÈ·ÈÏÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬µ«Î÷ºÚÎÄÊÐδÓè»ØÓ¦¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬1ÔÂ11ÈÕ£¬£¬ £¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Ôø¹¥»÷ѪҺ¼ì²â¾ÞÍ·Synnovis£¬£¬ £¬µ¼ÖÂ100ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶¼°1100¶àÀýÊÖÊõÍÆ³Ù£¬£¬ £¬Òý·¢¹ú¼ÊÄÕÅ­¡£¡£¡£¡£¡£¡£÷è÷ë×éÖ¯×Ô2022ÄêÆðÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍÐÎʽ¹¥»÷ÃÀÅ·¶à¼Ò×éÖ¯£¬£¬ £¬ÒÑÈ·ÈÏÌᳫÖÁÉÙ25Æð¹¥»÷£¬£¬ £¬ÉÐÓÐ100¶àÆðδ¾­Ö¤ÊµµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬ £¬ÃÀ¹ú¶à¸ö¶¼»á±¨¸æãåÈÕÍøÂçÊÂÎñ£¬£¬ £¬ÂíÈøÖîÈûÖݲ®¶÷ÕòÒ²ÓÚ1ÔÂ11ÈÕ±¨¸æÆäITÍøÂçÔâÈëÇÖ¡£¡£¡£¡£¡£¡£


https://therecord.media/west-haven-connecticut-city-government-cyberattack