PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼Òµ£ÐÄ £¬×¨¼ÒÍÆ²â»òÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2025-02-10

1. PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼Òµ£ÐÄ £¬×¨¼ÒÍÆ²â»òÔâÍøÂç¹¥»÷


2ÔÂ8ÈÕ £¬PlayStation Network ÔÚÈ«Çò¹æÄ£ÄÚÒṈ̃»¾½üÒ»Ìì £¬ÁîÖÚ¶àÍæ¼ÒÉî¸Ð¾ÚÉ¥¡£ÖÜËÄÍíÉÏ 11 µã×óÓÒ £¬´ó×ÚÓû§×îÏȱ¨¸æ·þÎñ·ºÆðÎÊÌâ £¬¶øË÷ÄáËäÈ»ÒÑÈ·ÈÏ´Ë´ÎÈ«ÇòÐÔ̱»¾ £¬µ«×èÖ¹ÏÖÔÚÉÐδÌṩÈκÎÏêϸµÄÊÖÒÕÐÅÏ¢¡£¾Ý PlayStation on X Ðû²¼µÄһƪÎÄÕ¼°×´Ì¬Ò³ÃæÏÔʾ £¬¾­ÓÉÁè¼Ý 24 Сʱ £¬ÕË»§ÖÎÀí¡¢ÓÎÏ·ºÍÉç½»¹¦Ð§¡¢PlayStation Video ÒÔ¼° PlayStation ÊÐËÁµÈÏÕЩËùÓÐÔÚÏß·þÎñ¾ù±£´æÎÊÌâ¡£ÕâÒ»ÊÂÎñÒý·¢ÁËר¼ÒµÄÍÆ²â £¬Óп´·¨ÒÔΪÎÊÌâµÄȪԴ¿ÉÄÜÊÇÍøÂç¹¥»÷¡£ÊÂʵÉÏ £¬PlayStation Network ÀúÊ·ÉÏÔø¶à´ÎÃæÁÙÖØ´óÖÐÖ¹ £¬ÓÈÆäÊÇ 2011 ÄêÄǴκڿÍÈëÇÖ £¬µ¼ÖÂÓû§Êý¾Ýй¶²¢ÆÈʹ·þÎñ¹Ø±Õ 23 Ìì £¬Êý°ÙÍòÓû§Êý¾ÝÒò´Ë̻¶ £¬Ë÷Äá×îÖÕÖ§¸¶ÁË 1500 ÍòÃÀÔªµÄÏ¢Õù½ð £¬²¢ÎªÓû§ÌṩÁËÒ»ÄêµÄÉí·Ý͵ÇÔ± £»¤¡£²»¹ý £¬ÔÚ 2025 Äê 2 Ô 9 ÈյĸüÐÂÖÐ £¬×´Ì¬Ò³ÃæÏÔʾËùÓзþÎñ¾ùÒѻָ´Õý³£ÔËÐС£Ö»¹Ü·þÎñÒѻָ´ £¬µ«´Ë´ÎÊÂÎñÎÞÒÉÔÙ´ÎÒý·¢ÁËÍæ¼Ò¶Ô PlayStation Network Çå¾²ÐԵĵ£ÐÄ¡£


https://securityaffairs.com/174005/hacking/playstation-network-global-outage.html


2. ½ü280Íò¸öIPÌᳫ´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷ £¬Ä¿µÄÖ±Ö¸ÍøÂç×°±¸Æ¾Ö¤


2ÔÂ8ÈÕ £¬½ü280Íò¸öIPµØµãÕý±»ÓÃÓÚÒ»³¡´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷ £¬Ä¿µÄÖ±Ö¸°üÀ¨Palo Alto Networks¡¢IvantiºÍSonicWallÔÚÄڵĶàÖÖÍøÂç×°±¸¡£ÕâÖÖ¹¥»÷·½·¨Í¨¹ýÖØ¸´ÊµÑé²î±ðµÄÓû§ÃûºÍÃÜÂë×éºÏÀ´ÈëÇÖÕË»§»ò×°±¸ £¬Ò»µ©ÀÖ³É £¬¹¥»÷Õß¼´¿É¿ØÖÆ×°±¸»òÉøÍ¸ÍøÂç¡£¾ÝShadowserver FoundationÍþв¼à¿ØÆ½Ì¨±¨¸æ £¬´ËÀ๥»÷×ÔÉÏÔÂÆðÒ»Á¬ÖÁ½ñ £¬ÖðÈÕ¶¯Óýü280Íò¸öÔ´IPµØµã £¬ÆäÖаÍÎ÷Õ¼±È×î¸ß £¬Æä´ÎÊÇÍÁ¶úÆä¡¢¶íÂÞ˹¡¢°¢¸ùÍ¢¡¢Ä¦Âå¸çºÍÄ«Î÷¸çµÈ¹ú¡£Êܹ¥»÷µÄ×°±¸¶àΪ·À»ðǽ¡¢VPN¡¢Íø¹ØµÈ±ßÑØÇå¾²×°±¸ £¬ÇÒ¹¥»÷Ô´Í·¶àΪMikroTik¡¢»ªÎª¡¢Ë¼¿Æ¡¢BoaºÍÖÐÐËµÈÆ·ÅƵÄ·ÓÉÆ÷¼°ÎïÁªÍø×°±¸¡£ShadowserverÖ¸³ö £¬¹¥»÷IPÊèÉ¢ÓÚÖÚ¶àÍøÂçºÍ×ÔÖÎϵͳ £¬»òÓë½©Ê¬ÍøÂ缰סլÊðÀíÍøÂçÓйØ¡£ÕâЩÊðÀíͨ¹ý×¡Õ¬ÍøÂç·ÓÉÁ÷Á¿ £¬Î±×°³ÉͨË×¼ÒÍ¥Óû§ £¬ÒÔ¹æ±Ü¼ì²â¡£Îª± £»¤±ßÑØ×°±¸ £¬½¨Òé¸ü¸ÄĬÈÏÃÜÂ롢ʵÑé¶àÒòËØÉí·ÝÑéÖ¤¡¢ÉèÖÃÊÜÐÅÍÐIPÔÊÐíÁÐ±í¡¢½ûÓ÷ÇÐëÒªWebÖÎÀí½çÃæ £¬²¢ÊµÊ±¸üй̼þºÍÇå¾²²¹¶¡¡£


https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/


3. 7-ZipÁãÈÕÎó²î£º¶íÂÞ˹ºÚ¿ÍʹÓÃMotWÈÆ¹ýÊÖÒÕ·¢¶¯¹¥»÷


2ÔÂ4ÈÕ £¬×Ô2024Äê9ÔÂÆð £¬¶íÂÞ˹ºÚ¿ÍʹÓÃ7-ZipÖеÄÁãÈÕÎó²îCVE-2025-0411 £¬ÀÖ³ÉÈÆ¹ýÁËWindowsµÄMark of the Web (MotW)Çå¾²¹¦Ð§ £¬Õë¶ÔÎÚ¿ËÀ¼Õþ¸®ºÍ˽ÈË×éÖ¯·¢¶¯ÁËSmokeLoader¶ñÒâÈí¼þ¹¥»÷¡£MotW¹¦Ð§Ô­±¾ÐÄÔÚÖÒÑÔÓû§¼´½«Ö´ÐеÄÎļþȪԴ²»¿ÉÐÅ £¬²¢ÒªÇóÈ·ÈÏ £¬µ«ºÚ¿Íͨ¹ýË«ÖØ´æµµÎļþºÍͬÐÎÎÄ×ÖÊÖÒÕ £¬Ê¹¶ñÒâÎļþÔÚ²»´¥·¢ÖÒÑÔµÄÇéÐÎÏÂÖ´ÐС£ÕâÐ©ÌØÖÆµÄ7-ZipÎļþͨ¹ý´¹ÂÚÓʼþ·¢Ë͸øÄ¿µÄ £¬Ê¹ÓõÄÊDZ»ÈëÇÖµÄÎÚ¿ËÀ¼Õþ¸®ÕË»§ £¬ÒÔÈÆ¹ýÇå¾²¹ýÂËÆ÷¡£Ö»¹Ü7-ZipÔÚ2022ÄêÌí¼ÓÁ˶ÔMotWµÄÖ§³Ö £¬µ«CVE-2025-0411Îó²îʹµÃMotW±ê¼Ç²»»áÈö²¥µ½ÄÚ²¿µµ°¸ÄÚÈÝ £¬´Ó¶øÔÊÐí¶ñÒâ¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþÖ±½ÓÆô¶¯¡£×îºó £¬ÕâЩ¹¥»÷´¥·¢ÁËSmokeLoader¸ºÔØ £¬Ò»ÖÖÓÃÓÚ×°ÖÃÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ä¾Âí¡¢ÀÕË÷Èí¼þ»ò½¨ÉèºóÃŵĶñÒâÈí¼þͶ·ÅÆ÷¡£ÊÜÓ°ÏìµÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼¹ú¼ÒÐÐÕþ¾Ö¡¢Ôú²¨ÂÞÈÈÆû³µÖÆÔì³§µÈ¶à¸öÒªº¦²¿·Ö¡£Ö»¹ÜÇ÷ÊÆ¿Æ¼¼ÔÚ·¢Ã÷Îó²îºóÒÑÓë7-Zip¿ª·¢Ö°Ô±·ÖÏí¿´·¨ÑéÖ¤Îó²î £¬²¢Í¨¹ý2024Äê11ÔÂ30ÈÕÐû²¼µÄ24.09°æ±¾²¹¶¡½â¾öÁËΣº¦ £¬µ«ÓÉÓÚ7-Zipȱ·¦×Ô¶¯¸üй¦Ð§ £¬Óû§ÈÔÐèÊÖ¶¯ÏÂÔØ×îа汾ÒÔÈ·±£Çå¾²¡£


https://www.bleepingcomputer.com/news/security/7-zip-motw-bypass-exploited-in-zero-day-attacks-against-ukraine/


4. ³¯ÏÊ¡°FlexibleFerret¡±¶ñÒâÈí¼þ£ºÊ¹ÓÃÐéαZoomºÍÇóÖ°Õ©Æ­¹¥»÷macOSÓû§


2ÔÂ4ÈÕ £¬³¯ÏʶñÒâÈí¼þ¡°FlexibleFerret¡±Õë¶ÔmacOS×°±¸ºÍ¿ª·¢Ö°Ô±ÌᳫÁËÒ»³¡ÆÕ±éµÄ¹¥»÷¡£Õâ¿î¶ñÒâÈí¼þͨ¹ýÐéαµÄZoomÓ¦ÓóÌÐò¡¢ÇóÖ°Õ©Æ­ºÍ¹ýʧ±¨¸æÌ¸ÂÛµÈÊÖ¶ÎÓÕÆ­Óû§×°Öá£ËüʹÓýÆÕ©µÄÉç»á¹¤³ÌѧսÂÔ £¬ÈçÐéαµÄÇóÖ°ÃæÊÔÁ÷³Ì £¬·¢ËÍ¿´ËÆÒªÇóÈí¼þ¸üеÄÁ´½Ó £¬ÓÕÆ­Ä¿µÄÏÂÔØ¶ñÒâÈí¼þ¡£Ö»¹ÜApple×î½üÔöÇ¿ÁËÆäXProtectÇå¾²¹¤¾ßÒÔÓ¦¶Ô´ËÀàÍþв £¬µ«FlexibleFerretÔÚ×î³õʱÈÔδ±»·¢Ã÷¡£¸Ã¶ñÒâÈí¼þ°üÀ¨Ò»¸ödropper £¬½«¶ñÒâÈí¼þ×°Öõ½ÏµÍ³ÖÐ £¬²¢½¨ÉèαÔìµÄZoomÓ¦ÓóÌÐòÉñÃØÅþÁ¬µ½¿ÉÒÉÓò¡£Ëü»¹»áÏÔʾÐéαµÄ¹ýʧÐÅÏ¢ÒÔÓÕÆ­Êܺ¦Õß £¬²¢ÔÚºǫ́×ÔÐÐ×°Öà £¬½¨É賤ÆÚÐÔ¡£±ðµÄ £¬ºÚ¿Í»¹Ö±½ÓÃé×¼¿ª·¢Ö°Ô± £¬Ê¹ÓÃÐéαµÄ¹ýʧ±¨¸æ»òGitHubµÈÍøÕ¾ÉϵÄ̸ÂÛÀ´ÓÕÆ­ËûÃÇÏÂÔØ¶ñÒâÈí¼þ¡£Ç徲ר¼ÒÒÑ·¢Ã÷¸ü¶àÏà¹ØµÄ¶ñÒâÈí¼þÑù±¾ £¬²¢Ö¸³ö¹¥»÷ÕßÒѸü¸Ä´ÎÒªÔªËØÒÔÈÆ¹ý± £»¤²½·¥¡£ÕⳡһÁ¬¶ø»îÔ¾µÄ¹¥»÷Ô˶¯Åú×¢ £¬ÍþвÐÐΪÕßÕýÔÚÒ»Ö±¸Ä±äÒªÁìÒÔ×èÖ¹±»·¢Ã÷¡£


https://hackread.com/north-korea-flexibleferret-malware-macos-fake-zoom-job-scams/


5. ADFSÍøÂç´¹ÂÚ¹¥»÷£º¹¥»÷Õßð³äITÍŶÓÇÔȡƾ֤


2ÔÂ5ÈÕ £¬Abnormal Security·¢Ã÷ÁËÒ»ÆðÕë¶Ô½ÌÓý¡¢Ò½ÁƱ£½¡ºÍÕþ¸®×éÖ¯µÄÍøÂç´¹ÂÚÔ˶¯ £¬¸ÃÔ˶¯ÒÔMicrosoft Active DirectoryÍŽáÉí·ÝÑéÖ¤·þÎñ£¨ADFS£©ÎªÄ¿µÄ £¬Í¨¹ýÓÕÆ­ÐÔµÇÂ¼Ò³ÃæÇÔÈ¡Óû§Æ¾Ö¤²¢Èƹý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©± £»¤¡£¹¥»÷ÕßðûÊÕ˾ITÍŶӷ¢ËÍÓʼþ £¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÓëÕæÊµADFSµÇÂ¼Ò³ÃæÒ»ÖµĴ¹ÂÚÍøÕ¾ £¬²¢ÒªÇóÊäÈëÓû§Ãû¡¢ÃÜÂë¼°MFA´úÂë»òÅú×¼ÍÆËÍ֪ͨ¡£ÕâЩ¹¥»÷Ö¼ÔÚ»ñÈ¡¹«Ë¾µç×ÓÓʼþÕË»§»á¼ûȨÏÞ £¬½ø¶ø¾ÙÐо­¼ÃÄîÍ·µÄ¹¥»÷ £¬ÈçÉÌÒµµç×ÓÓʼþй¶£¨BEC£©¡£Abnormal SecurityÖ¸³ö £¬¹¥»÷ÕßʹÓÃÁË˽ÈËVPNÒþ²ØÎ»Öà £¬²¢·ÖÅɸü¿¿½ü×éÖ¯µÄIPµØµã¡£Ö»¹ÜÕâЩ¹¥»÷²»»áÖ±½ÓÆÆËðADFS £¬µ«Ê¹ÓÃÓû§¶ÔÊìϤµÇ¼Á÷³ÌµÄÐÅÍÐ £¬Ç±ÔÚÓÐÓÃÐÔÈÔÈ»ÒýÈËעĿ¡£Abnormal½¨Òé×é֯Ǩáãµ½¸üÇå¾²µÄ½â¾ö¼Æ»® £¬ÈçMicrosoft Entra £¬²¢ÒýÈëÌØÁíÍâµç×ÓÓʼþ¹ýÂËÆ÷ºÍÒì³ £Ô˶¯¼ì²â»úÖÆ £¬ÒÔ¾¡Ôç×èÖ¹ÍøÂç´¹ÂÚ¹¥»÷¡£


https://bleepingcomputer.com/news/security/hackers-spoof-microsoft-adfs-login-pages-to-steal-credentials/


6. Ó¡¶ÈÒøÐÐÓû§ÔâÓö´ó¹æÄ£Òƶ¯¶ñÒâÈí¼þ¹¥»÷


2ÔÂ5ÈÕ £¬zLabsÑо¿ÍÅ¶Ó½ÒÆÆÁËÒ»ÏîÕë¶ÔÓ¡¶ÈÒøÐÐÓû§µÄÒÆ¶¯¶ñÒâÈí¼þÔ˶¯ £¬Éæ¼°½ü900¸ö¶ñÒâÈí¼þÑù±¾ £¬Ö÷ÒªÕë¶ÔAndroid×°±¸¡£ÕâЩÑù±¾¾ßÓÐÏàͬµÄ´úÂë½á¹¹¡¢Óû§½çÃæºÍÓ¦ÓóÌÐò»Õ±ê £¬Åú×¢Óɼòµ¥ÍþвÐÐΪÕßÌᳫ¡£¸Ã¶ñÒâÈí¼þ²»µ«ÇÔȡһ´ÎÐÔÃÜÂë £¬»¹Ê¹ÓÃʵʱµç»°ºÅÂëÖØ¶¨Ïò¶ÌÐÅ £¬ÁôÏ¿É×·×ÙµÄÊý×Ö×Ù¼£¡£±ðµÄ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÁè¼Ý222¸ö¿É»á¼ûµÄFirebase´æ´¢Í° £¬°üÀ¨Ô¼50,000ÃûÓû§µÄÃô¸ÐÊý¾Ý £¬ÈçÒøÐÐÏêÇé¡¢ÐÅÓÿ¨ÐÅÏ¢ºÍÉí·Ý֤ʵ¡£¶ñÒâÈí¼þͨ¹ýWhatsAppÈö²¥ £¬Î±×°³ÉÕýµ±Ó¦ÓÃÓÕÆ­Óû§Ð¹Â¶²ÆÎñÐÅÏ¢¡£ÊÖÒÕÆÊÎöÏÔʾ £¬¸Ã¶ñÒâÈí¼þ¼Ò×åÓÐÈý¸ö±äÌ壺¶ÌÐÅת·¢¡¢Firebase-ExlysisºÍ»ìÏý¡£Firebase¶Ëµãȱ·¦Éí·ÝÑéÖ¤»úÖÆ £¬µ¼ÖÂÊý¾Ý¿É¹ûÕæ»á¼û £¬Ð¹Â¶µÄƾ֤ÔÊÐíδ¾­ÊÚȨ»á¼ûÖÎÀíÒDZí°å¡£¹¥»÷Õߵ绰ºÅÂëÖ÷Ҫע²áÓÚÓ¡¶ÈÌØ¶¨µØÇø¡£´Ë´Î¹¥»÷ʹÓÃÒøÐкÍÕþ¸®ÐÅÓþ £¬ÍÅ½áÆ¾Ö¤ÍµÇÔ¡¢¶ÌÐÅ×èµ²ºÍÍøÂç´¹ÂÚÊÖÒÕÖ´ÐÐδ¾­ÊÚȨÉúÒâ¡£


https://securityboulevard.com/2025/02/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/