D-LinkÍ£²ú·ÓÉÆ÷ÏÖ¸ßΣÏÂÁî×¢ÈëÎó²î

Ðû²¼Ê±¼ä 2026-01-07

1. D-LinkÍ£²ú·ÓÉÆ÷ÏÖ¸ßΣÏÂÁî×¢ÈëÎó²î


1ÔÂ6ÈÕ £¬½üÆÚ £¬¶à¿îÒÑÍ£²úµÄD-Link DSLÍø¹ØÂ·ÓÉÆ÷±»·¢Ã÷±£´æ¸ßΣÏÂÁî×¢ÈëÎó²îCVE-2026-0625¡£¸ÃÎó²îÔ´ÓÚCGI¿âÖÐÊäÈëÕûÀí²»µ± £¬µ¼ÖÂdnscfg.cgi¶ËµãÒ×Êܹ¥»÷ £¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓÃDNSÉèÖòÎÊýÖ´ÐÐÔ¶³ÌÏÂÁî £¬×îÖÕʵÏÖÔ¶³Ì´úÂëÖ´ÐС£Îó²îÇ鱨¹«Ë¾VulnCheckÓÚ2025Äê12ÔÂ15ÈÕÏòD-Link±¨¸æ´ËÎÊÌâ £¬´ËǰShadowserver»ù½ð»áÃÛ¹ÞÒѲ¶»ñµ½Ïà¹Ø¹¥»÷¼£Ïó £¬ÇÒ¹¥»÷ÊÖÒÕδ¼û¹ûÕæ¼Í¼¡£¾­È·ÈÏ £¬ÊÜÓ°Ïì×°±¸Ðͺż°¹Ì¼þ°æ±¾°üÀ¨£ºDSL-526B£¨¡Ü2.01£©¡¢DSL-2640B£¨¡Ü1.07£©¡¢DSL-2740R£¨<1.17£©¡¢DSL-2780B£¨¡Ü1.01.14£©¡£ÕâЩ²úÆ·×Ô2020ÄêÆðÒÑ×èÖ¹ÏúÊÛ £¬D-LinkÃ÷È·ÌåÏÖ²»»áΪÆäÌṩ¹Ì¼þ¸üÐÂÐÞ¸´Îó²î £¬½¨ÒéÓû§Á¬Ã¦Í£Óò¢Ì滻ΪÊÜÖ§³ÖÐͺÅ¡£D-LinkÇ¿µ÷ £¬Í£²ú×°±¸½«²»ÔÙÎüÊչ̼þ¸üС¢Çå¾²²¹¶¡»òά»¤ £¬½¨ÒéÓû§½«ÒÑÍ£²ú×°±¸Ì滻Ϊ¹©Ó¦ÉÌÆð¾¢Ö§³ÖµÄÐͺŠ£¬»ò°²ÅÅÔÚ·ÇÒªº¦ÍøÂç £¬²¢Ê¹ÓÃ×îпÉÓù̼þ¼°ÑÏ¿áÇå¾²ÉèÖà £¬ÒÔ½µµÍÇ徲Σº¦¡£


https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/


2. ÐÂÐÍVVS Stealer¶ñÒâÈí¼þÒ»Á¬ÍþвDiscordÓû§


1ÔÂ6ÈÕ £¬Ò»ÖÖÃûΪVVS Stealer£¨»òVVS $tealer£©µÄÐÂÐÍPython¶ñÒâÈí¼þ×Ô2025Äê4ÔÂÆðÒ»Á¬Õë¶ÔDiscordÓû§Ìᳫ¹¥»÷ £¬ÆäÄÚ²¿ÔË×÷»úÖÆ½üÆÚÓÉPalo Alto Networks Unit 42ÍŶÓÊ×´ÎÅû¶¡£¸Ã¶ñÒâÈí¼þÒÔPyInstaller°üÐÎʽÈö²¥ £¬¿ÉÔÚí§ÒâWindows×°±¸ÎÞÒÀÀµÔËÐÐ £¬ÎÞÐèÌØÊâÉèÖ᣹¥»÷½¹µã¾Û½¹ÓÚÇÔÈ¡DiscordÁîÅÆ £¬ÕâÖÖÊý×ÖÃÜÔ¿¿ÉÈúڿÍÈÆ¹ýÃÜÂëÖ±½Ó»á¼ûÓû§ÕË»§ £¬½ø¶ø¶Áȡ˽ÐÅ¡¢»ñÈ¡Õ˵¥¼°ÐÅÓÿ¨ÐÅÏ¢¡£Æä¹¥»÷Á÷³Ì¼«¾ßÒÉ»óÐÔ£ºÍ¨¹ýαÔì"ÖÂÃü¹ýʧ"µ¯´°ÓÕµ¼Óû§ÖØÆôµçÄÔ £¬Ëæºó×¢Èë¶ñÒâ´úÂëÐÞ¸ÄDiscordÎļþ £¬½«¶ñÒâ¾ç±¾Ö²ÈëÓ¦ÓÃÎļþ¼Ð £¬ÊµÏÖÊµÊ±ÍøÂçÁ÷Á¿¼à¿Ø¡£¸üΣÏÕµÄÊÇ £¬Ëü»¹Äܽػñ±¸·Ý´úÂë¡¢¶àÒòËØÈÏÖ¤£¨MFA£©ÉèÖà £¬ÉõÖÁÔÚÓû§ÐÞ¸ÄÃÜÂëʱ×èµ²µÇ¼ƾ֤¡£ËüͬʱÕë¶ÔChrome¡¢Edge¡¢Brave¡¢OperaµÈÖ÷Á÷ä¯ÀÀÆ÷ £¬ÇÔÈ¡ÉúÑÄÃÜÂë¡¢Cookie¡¢×Ô¶¯Ìî³äÊý¾Ý £¬²¢½ØÈ¡×ÀÃæ½ØÍ¼¡£¸Ã¶ñÒâÈí¼þ½ÓÄɶ©ÔÄÖÆÏúÊÛģʽ £¬ÔÚTelegramƽ̨ÒÔÿÖÜ10Å·Ôª»òÖÕÉí199Å·ÔªµÄ¼ÛÇ®ÊÛÂô £¬±»Ðû´«Îª"×îÖÕÇÔÈ¡¹¤¾ß"¡£


https://hackread.com/vvs-stealer-malwar-discord-system-errors/


3. Ó¢¹úÎÖÀï¿Ë¿¤Ñ§Ð£ÔâÍøÂç¹¥»÷ÖÂÍ£¿Î


1ÔÂ6ÈÕ £¬Ó¢¹úÎÖÀï¿Ë¿¤Å¦Äá¶ÙµÄº£¶òÄ·ÏïѧУÒòÍøÂç¹¥»÷µ¼ÖÂITϵͳÖÜȫ̱»¾ £¬±»ÆÈÓÚ2026Äê1ÔÂ5ÈÕ¼°6ÈÕÍ£¿Î £¬Ñ§ÉúÒò´Ë»ñµÃÑÓÉì°æÊ¥µ®¼ÙÆÚ¡£´Ë´ÎÊÂÎñÔì³ÉѧУµç»°¡¢µç×ÓÓʼþ¡¢·þÎñÆ÷¼°ÖÎÀíϵͳÍêÈ«ÎÞ·¨»á¼û £¬Ð£·½Æ¾Ö¤Íⲿר¼Ò½¨Òé×÷³öÍ£¿Î¾öÒé £¬ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£Ð£³¤Âõ¿Ë¶û¡¤¸ÊÅ©ÔÚÖ¼ҳ¤ÐÅÖÐÌåÏÖ £¬Ñ§Ð£ÕýÓë½ÌÓý²¿ÍøÂçÊÂÎñÏìӦС×é¼°ËùÊô¶àѧԺÐÅÍлú¹¹Ó¢¸ñÀ¼Öв¿Ñ§ÔºÐÅÍлú¹¹µÄITר¼ÒÇ×½üÏàÖú £¬ÖÜÈ«ÊӲ첢½â¾öÎÊÌâ¡£×÷ΪԤ·À²½·¥ £¬ËùÓнÌÖ°Ô±¹¤ºÍѧÉú±»ÒªÇóÔÚÁíÐÐ֪ͨǰ×èֹʹÓÃѧУϵͳ £¬°üÀ¨¹È¸è¿ÎÌúÍSharePoint¡£ÒѵǼϵͳµÄѧÉú±»¼û¸æÎÞÐèµ£ÐÄ £¬µ«·â±Õ»á¼ûȨÏÞÊÇÈ·±£ÊÓ²ìʱ´ú×î´óÇå¾²ÐÔµÄÐëÒª²½·¥¡£Ñ§Ð£ÔÚ1ÔÂ3ÈÕÐû²¼µÄÔçÆÚ֪ͨÖÐÃ÷È·Ö¸³ö £¬´Ë´ÎÊÂÎñÉæ¼°"ÈκÎÊý×Ö·þÎñ"µÄÖÐÖ¹ £¬²¢ÈϿɱ£´æî¿ÏµºÏ¹æÎÊÌ⡣ƾ֤2018ÄêÊý¾Ý±£»¤·¨¼°GDPRÒªÇó £¬Ñ§Ð£ÒÑÔÚ72СʱÄÚÏòÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©±¨¸æÊÂÎñ £¬²¢½«ÓëÍâµØÕþ¸®Êý¾Ý±£»¤¹ÙÔ±ÏàÖúÍÆÐÐÒåÎñ¡£


https://www.theregister.com/2026/01/06/nuneaton_school_cyberattack/


4. UAC-0184ʹÓÃViberƽ̨¶ÔÎÚ·¢¶¯¶à½×¶ÎÍøÂç¹¥»÷


1ÔÂ5ÈÕ £¬¾ÝÇå¾²Ñо¿ÏÔʾ £¬Óë¶íÂÞ˹Ïà¹ØµÄÍþвÐÐΪÕßUAC-0184£¨ÓÖÃûHive0156£©Õýͨ¹ýViber¼´Ê±Í¨Ñ¶Æ½Ì¨ÏòÎÚ¿ËÀ¼¾ü·½¼°Õþ¸®ÊµÌåͶµÝαװ³ÉÎĵµµÄ¶ñÒâZIPѹËõ°ü £¬Ò»Á¬¿ªÕ¹¸ßÇ¿¶ÈÇ鱨ËѼ¯Ô˶¯¡£¸Ã×éÖ¯×Ô2024ÄêÍ·ÓÉÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×éÊ״μͼÒÔÀ´ £¬ÒÑ´ÓʹÓÃSignal¡¢TelegramÈö²¥¶ñÒâÈí¼þÑݱäΪÒÔViberΪ³õʼÈëÇÖÔØÌå £¬ÐγɸüÒþ²ØµÄ¹¥»÷Á´¡£¹¥»÷Á÷³Ì·ºÆð¶à½×¶ÎÌØÕ÷£º¶ñÒâZIP°üÄÚº¬¶à¸öWindows¿ì½Ý·½·¨Îļþ£¨.LNK£© £¬Î±×°³ÉMicrosoft Word/Excel¹Ù·½ÎĵµÓÕÆ­Óû§·­¿ª¡£ÕâЩLNKÎļþÍâòչÊÕ¬Õ¶üÎĵµ½µµÍÊܺ¦ÕßСÐÄ £¬ºǫ́Ôòͨ¹ýPowerShell¾ç±¾´ÓÔ¶³Ì·þÎñÆ÷¾²Ä¬ÏÂÔØµÚ¶þ¸öZIP°ü £¬Ö´ÐÐHijack Loader¼ÓÔØÆ÷¡£¸Ã¼ÓÔØÆ÷½ÓÄÉDLL²à¼ÓÔØºÍÄ£¿é¶ÑµþÊÖÒÕ £¬ÔÚÄÚ´æÖÐÖØ¹¹²¢°²ÅÅ £¬¹æ±ÜÇå¾²¹¤¾ß¼ì²â¡£Ëæºó £¬¼ÓÔØÆ÷ͨ¹ýCRC32¹þϣֵɨÃèÇéÐÎÖеÄÇå¾²Èí¼þ£¨È翨°Í˹»ù¡¢Avast¡¢BitDefenderµÈ£© £¬²¢½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚÐÔ¡£×îÖÕ £¬Í¨¹ý×¢Èë¡°chime.exe¡±Àú³ÌÒþ²ØÖ´ÐÐRemcosÔ¶³Ì»á¼ûľÂí £¬Ê¹¹¥»÷Õß»ñµÃÖÕ¶ËÖÎÀí¡¢¸ºÔØÖ´ÐС¢Ô˶¯¼à¿Ø¼°Êý¾ÝÇÔÈ¡ÄÜÁ¦¡£


https://cybersecuritynews.com/whatsapp-device-fingerprinting/


5. WhatsApp¶à×°±¸¼ÓÃÜÎó²îÖ²Ù×÷ÏµÍ³Ö¸ÎÆÊ¶±ðΣº¦


1ÔÂ5ÈÕ £¬MetaÆìÏÂÓµÓг¬30ÒÚÔ»îÔ¾Óû§µÄ¼´Ê±Í¨Ñ¶Ó¦ÓÃWhatsApp £¬Æä¶Ëµ½¶Ë¼ÓÃܵĶà×°±¸¹¦Ð§ºã¾Ã±£´æÔªÊý¾Ýй¶Òþ»¼ £¬Ê¹¹¥»÷ÕßÄܹ»Í¨¹ý×°±¸Ö¸ÎÆÊ¶±ð¾«×¼Í¶µÝ¶ñÒâÈí¼þ¡£½üÆÚÑо¿ÏÔʾ £¬Ö»¹ÜMetaÒÑʵÑ鲿·ÖÐÞ¸´²½·¥ £¬µ«Í¸Ã÷¶Èȱ·¦µÄÎÊÌâÈÔÒý·¢Çå¾²ÉçÇø¹Ø×¢¡£WhatsApp¶à×°±¸¼Ü¹¹Ï £¬·¢ËÍ·½ÓëÎüÊÕ·½×°±¸½¨Éè×ÔÁ¦»á»° £¬½ÓÄÉ×°±¸ÍâµØÌìÉúµÄΨһ¼ÓÃÜÃÜÔ¿¡£ÃÜÔ¿IDʵÏÖ²î±ð»á̻¶װ±¸²Ù×÷ϵͳÀàÐÍ£¨ÈçAndroid»òiOS£© £¬¹¥»÷Õ߿ɱ»¶¯ÅÌÎÊWhatsApp·þÎñÆ÷»ñÈ¡»á»°ÃÜÔ¿ £¬ÎÞÐèÓû§½»»¥¼´¿Éʶ±ð²Ù×÷ϵͳ £¬½ø¶øÏòAndroid×°±¸¶¨Ïò°²ÅÅÎó²îʹÓóÌÐò £¬Í¬Ê±¹æ±ÜiOS×°±¸ÒÔ¼á³ÖÒþ²ØÐÔ¡£ÎªÓ¦¶Ô´ËΣº¦ £¬WhatsAppÒѽ«AndroidÊðÃûÔ¤ÃÜÔ¿ID·ÖÅÉ·½·¨¸ÄΪÔÚÕû¸ö24λ¹æÄ£ÄÚËæ»úȡֵ £¬×è¶Ï¸Ã¹¥»÷·¾¶¡£È»¶ø £¬iOSÒ»´ÎÐÔÔ¤ÃÜÔ¿ÈÔ¾ßÇø·Ö¶È £¬ÆäIDÆðʼֵ½ÏµÍÇÒÿ¸ô¼¸ÌìµÝÔö £¬¶øAndroidʹÓÃÍêÈ«Ëæ»ú¹æÄ£ £¬ÐÞ¸´ºó¹¤¾ßÈÔÄܿɿ¿¼ì²â²Ù×÷ϵͳ¡£ÕâÖÖ²î±ðʹ¸ß¼¶Ò»Á¬ÐÔÍþв¿ÉʹÓÃWhatsApp×÷ΪÒþ²ØÈö²¥ÇþµÀ £¬ÅÌÎÊÀú³Ì²»´¥·¢Óû§Í¨Öª¡£


https://cybersecuritynews.com/whatsapp-device-fingerprinting/


6. EverestÀÕË÷Èí¼þ¹¥»÷BolttechÇÔÈ¡186GBÃô¸ÐÊý¾Ý


1ÔÂ5ÈÕ £¬¿ËÈÕ £¬Óë¶íÂÞ˹¹ØÁªµÄEverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÒÑ´ÓÈ«Çò°ü¹Ü»ù´¡Éèʩƽ̨BolttechÇÔȡԼ186GB¸ß¶ÈÃô¸ÐÊý¾Ý £¬²¢ÒªÇó¸Ã¹«Ë¾Ö§¸¶Êê½ð¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼ÐÅÏ¢³Æ £¬ÇÔÈ¡ÄÚÈݰüÀ¨Ô±¹¤ºÍÊðÀíÕË»§£¨µç×ÓÓʼþ¡¢ÐÕÃû¡¢½ÇÉ«¡¢±êʶ·û£©¡¢¿Í»§ÐÅÏ¢¡¢ÁªÏµÏêÇé¡¢±£µ¥Êý¾Ý¡¢µäÖÊ´û¿î¼Í¼¡¢µç»°ºÅÂë¡¢±»°ü¹Ü¹¤ÒµµØµã¡¢²ÆÎñ²ÎÊý¼°ÄÚ²¿ÔËÓª±êʶ·û £¬²¢¸½ÕÕÆ¬Ñù±¾×ôÖ¤¡£ÍøÕ¾ÉèÓе¹¼ÆÊ±Æ÷ £¬ÍþвÈô±¾ÖÜÍíЩʱ¼äδ»ñ»Ø¸´ £¬½«¹ûÕæËùÓÐÊý¾Ý¡£Ñо¿ÍŶӯÊÎöºóÖ¸³ö £¬Êý¾ÝÀÄÓÃΣº¦ÑÏËࣺ¿Í»§¼°Ô±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢Éí·Ý»­ÏñÆÊÎö£»±£µ¥±êʶ·û»ò±»ÓÃÓÚÌύڲƭÐÔË÷Åâ¡£ÈôÊý¾Ý°üÀ¨ÍêÕûµØµã £¬ÈËÈâËÑË÷Σº¦½«½øÒ»²½¼Ó¾ç¡£Everest×éÖ¯×Ô2021ÄêÊ״α»Ê¶±ðÒÔÀ´ £¬ÒѳÉΪ×î¾ß¹¥»÷ÐÔµÄÀÕË÷Èí¼þÍÅ»ïÖ®Ò»¡£ÒÑÍù12¸öÔÂÄÚEverestÒÑË𺦳¬100¼Ò×éÖ¯ £¬½üÆÚ»¹¹¥»÷Á˰ÍÎ÷ʯÓ;ÞÍ·°ÍÎ÷¹ú¼ÒʯÓ͹«Ë¾¼°Ô˶¯Æ·ÅÆUnder Armour¡£


https://cybernews.com/security/everest-hack-bolttech-ransom-data/