СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ
Ðû²¼Ê±¼ä 2026-01-131. СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ
1ÔÂ12ÈÕ£¬ÒÑÍùÁù¸öÔ£¬ºÚ¿ÍƵÈÔʹÓÃä¯ÀÀÆ÷ÄÚä¯ÀÀÆ÷£¨BitB£©ÊÖÒÕ¶ÔFacebookÓû§Ìᳫ´¹ÂÚ¹¥»÷£¬¸ÃÊÖÒÕÓÉÇå¾²Ñо¿Ô±mr.d0xÓÚ2022Ä꿪·¢£¬ºó±»ÍøÂç·¸·¨·Ö×ÓÀ©Õ¹ÖÁSteamµÈƽ̨¡£TrellixÑо¿Ö°Ô±·¢Ã÷£¬¹¥»÷Õßͨ¹ýαÔì״ʦÊÂÎñËù֪ͨ¡¢°æÈ¨ÇÖȨÖÒÑÔ»òMetaÇå¾²ÌáÐÑ£¬ÓÕµ¼Óû§µã»÷°üÀ¨ÐéαµÇ¼±íµ¥µÄµ¯³ö´°¿Ú¡£´ËÀà´°¿ÚʹÓÃiframeÊÖÒÕÄ£Äâ¹Ù·½ÈÏÖ¤½çÃæ£¬²¢Í¨¹ý×Ô½ç˵´°¿ÚÎÊÌâºÍURLÔöÇ¿ÓÕÆÐÔ£¬ÉõÖÁ¼ÓÈëËõ¶ÌURLºÍÐéαMetaCAPTCHAÒ³ÃæÒÔ¹æ±Ü¼ì²â¡£¹¥»÷Á÷³ÌÖУ¬Êܺ¦Õß»áÔÚ¹¥»÷Õß¿ØÖƵÄÍøÒ³ÉÏ¿´µ½¿´ËÆÕýµ±µÄä¯ÀÀÆ÷µ¯³ö´°¿Ú£¬ÒªÇóÊäÈëFacebookƾ֤¡£ÓÉÓÚiframeÓëµ×²ã´°¿Ú°ó¶¨£¬Óû§ÎÞ·¨½«ÆäÍϳöä¯ÀÀÆ÷´°¿Ú£¬ÕâÊÇʶ±ðBitB¹¥»÷µÄÒªº¦ÌØÕ÷¡£Ñо¿Ö¸³ö£¬´ó×Ú´¹ÂÚÒ³ÃæÍйÜÔÚNetlify¡¢VercelµÈÕýµ±ÔÆÆ½Ì¨£¬Î±×°³ÉMetaÒþ˽ÖÐÐÄ»òÉêËß±íµ¥£¬ÍøÂçÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£Óë¹Å°å´¹ÂÚÏà±È£¬ÕâÖÖÊÖ·¨Í¨¹ýÀÄÓÃÊÜÐÅÍеĻù´¡ÉèÊ©ÈÆ¹ýÇå¾²¹ýÂËÆ÷£¬ÓªÔìÐéαÇå¾²¸Ð¡£
https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/
2. CISA½ôÆÈÏÂÁîÐÞ²¹Òѱ»Ê¹ÓõÄGogs¸ßΣÎó²î
1ÔÂ12ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·ÖÔÚ2026Äê2ÔÂ2ÈÕǰÐÞ²¹Gogs¸ßΣÎó²îCVE-2025-8110¡£¸ÃÎó²îÔ´ÓÚPutContents APIµÄ·¾¶±éÀúȱÏÝ£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷Õßͨ¹ý·ûºÅÁ´½ÓÁýÕÖ´æ´¢¿âÍⲿÎļþ£¬Èƹý´ËǰÐÞ¸´µÄCVE-2024-55947±£»¤²½·¥£¬½ø¶øÍ¨¹ýÐÞ¸ÄGitÉèÖÃÎļþ£¨ÈçsshCommand£©Ö´ÐÐí§ÒâÏÂÁ×é³ÉÁãÈÕ¹¥»÷Σº¦¡£Gogs×÷ΪGoÓïÑÔ±àдµÄÇáÁ¿¼¶Git·þÎñÌæ»»¼Æ»®£¬³£ÓÃÓÚÔ¶³ÌÐ×÷£¬µ«Æä¿ª·ÅÐÔʹÆä³ÉΪ¹¥»÷Ä¿µÄ¡£Wiz ResearchÔÚ7ÔÂÊÓ²ì¿Í»§Gogs·þÎñÆ÷¶ñÒâÈí¼þѬȾʱ·¢Ã÷¸ÃÎó²î£¬²¢ÓÚ7ÔÂ17ÈÕ±¨¸æ£¬10ÔÂ30ÈÕ»ñGogsÈ·ÈÏ£¬ÉÏÖÜÐû²¼²¹¶¡¡£È»¶ø£¬11ÔÂ1ÈÕ¼´·ºÆðµÚ¶þ²¨ÁãÈÕ¹¥»÷¡£ÊÓ²ìÏÔʾ£¬³¬1400̨Gogs·þÎñÆ÷̻¶ÓÚ»¥ÁªÍø£¬ÆäÖÐ1250̨ÈÔ¿É»á¼û£¬700¸öʵÀýÏÔʾ±»ÈëÇÖ¼£Ïó¡£CISAÒѽ«CVE-2025-8110ÁÐÈë¡°ÒÑʹÓÃÎó²îĿ¼¡±£¬Ç¿µ÷´ËÀàÎó²îÊǶñÒâÍøÂç¹¥»÷Õߵij£ÓÃ;¾¶£¬´ºÁª°î»ú¹¹×é³ÉÖØ´óΣº¦¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/
3. TargetµÄ¿ª·¢·þÎñÆ÷ÔÚºÚ¿ÍÉù³ÆÇÔȡԴ´úÂëºóÀëÏß
1ÔÂ12ÈÕ£¬¿ËÈÕ£¬ºÚ¿ÍÔÚGiteaƽ̨Ðû²¼¶à¸öÒÉËÆTarget¹«Ë¾ÄÚ²¿´úÂë¿âµÄÑù±¾£¬²¢Éù³ÆÕýͨ¹ýµØÏÂÂÛ̳³öÊÛÍêÕûÊý¾Ý¼¯¡£ÊÂÎñÒòÓÉÓÚÉÏÖÜÒ»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÔÚGitea½¨Éè´úÂë¿ÍÕ»£¬°üÀ¨Target²¿·ÖÄÚ²¿´úÂë¡¢¿ª·¢ÕßÎĵµ¼°ÃûΪSALE.MDµÄÎļþ¡£¸ÃÎļþÏÔʾÍêÕûÊý¾Ý¼¯°üÀ¨³¬5.7ÍòÐÐĿ¼ÁÐ±í£¬×ÜÈÝÁ¿Ô¼860GB£¬Éæ¼°"Ç®°ü·þÎñÉøÍ¸²âÊÔ""TargetIDM-TAPProvisioningAPI"µÈÃô¸ÐÏîÄ¿£¬ÇÒÌá½»ÔªÊý¾ÝÌá¼°¶àλTargetÏÖÈÎÊ×ϯ¹¤³ÌʦÐÕÃû¼°ÄÚ²¿API¶Ëµã£¨Èçconfluence.target.com£©£¬ÌåÏÖÊý¾ÝÔ´×Ô˽Óпª·¢»ù´¡ÉèÊ©¡£TargetµÄGit·þÎñÆ÷£¨git.target.com£©ÒÑÎÞ·¨´Ó»¥ÁªÍø»á¼û£¬´Ëǰ¸ÃÓòÃûÔøÖØ¶¨ÏòÖÁÔ±¹¤µÇÂ¼Ò³Ãæ£¬µ«ÏÖÒÑÍêȫ崻ú¡£ºÚ¿ÍÐû²¼µÄGitea¿ÍÕ»ÔÚýÌåÁªÏµTargetºó±»É¾³ý£¬·µ»Ø404¹ýʧ£¬ÓëϼÜÇëÇóÒ»Ö¡£ËÑË÷ÒýÇæ»º´æ¼Í¼ÏÔʾ£¬git.target.com²¿·Ö×ÊÔ´Ôø±»Ë÷Òý£¬µ«ÎÞ·¨È·ÈÏÊÇ·ñÓë½üÆÚ̻¶ÊÂÎñÖ±½ÓÏà¹Ø¡£
https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/
4. Î÷°àÑÀÄÜÔ´¾ÞÍ·EndesaÅû¶Êý¾Ýй¶ÊÂÎñ
1ÔÂ12ÈÕ£¬Î÷°àÑÀ×î´óÄÜÔ´¹©Ó¦ÉÌEndesa¼°ÆäÔËÓªÉÌEnerg¨ªa XXI¿ËÈÕÅûÂ¶ÖØ´óÇå¾²ÊÂÎñ£ººÚ¿Íͨ¹ý²»·¨»á¼ûÆäÉÌҵƽ̨£¬ÇÔÈ¡ÁËÓë¿Í»§ÄÜÔ´ÌõÔ¼Ïà¹ØµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£×÷ΪEnel¼¯ÍÅÆìÏÂÆóÒµ£¬EndesaÔÚÎ÷°àÑÀºÍÆÏÌÑÑÀÓµÓг¬1000ÍòÓû§£¬×ܿͻ§»ùÊýÔ¼2200Íò¡£´Ë´Îй¶µÄÊý¾ÝÀàÐͰüÀ¨»ù×Ô¼º·ÝÐÅÏ¢¡¢ÁªÏµÐÅÏ¢¡¢¹úÃñÉí·ÝÖ¤ºÅÂ루DNI£©¡¢ÌõÔ¼ÏêÇé¼°¸¶¿îÐÅÏ¢£¨ÈçIBANÕ˺ţ©£¬µ«¹«Ë¾Ç¿µ÷ÕË»§ÃÜÂëδ±»²¨¼°¡£ÊÂÎñ±¬·¢ºó£¬EndesaѸËÙ½ÓÄɶàÏî·À»¤²½·¥£º·â±ÕÊÜÓ°ÏìÄÚ²¿ÕË»§¡¢µ¼³öÈÕÖ¾¾ÙÐÐÊÖÒÕÆÊÎö¡¢Ôöǿϵͳ¼à¿ØÒÔ¼ì²âºóÐø¿ÉÒÉÔ˶¯£¬²¢Í¬²½ÏòÎ÷°àÑÀÊý¾Ý±£»¤¾Ö¼°Ïà¹Øî¿Ïµ»ú¹¹±¨¸æ¡£¹«Ë¾Í¨¹ýÕýʽÇþµÀ֪ͨËùÓÐÊÜÓ°Ïì¿Í»§£¬²¢ÌáÐÑÓû§Ð¡ÐÄÉí·ÝðÓá¢Êý¾Ý͵ÇÔ¼°ÍøÂç´¹ÂÚ¹¥»÷Σº¦£¬½¨Ò齫¿ÉÒÉÔ˶¯±¨¸æÖÁÖ¸¶¨ºÅÂë¡£EndesaÉùÃ÷³Æ£¬×èÖ¹ÏÖÔÚÎÞÖ¤¾ÝÏÔʾй¶Êý¾ÝÒѱ»Ú²ÆÊ¹Óã¬Òò´Ë¶ÔÓû§È¨Á¦ºÍ×ÔÓÉ×é³É¸ßΣº¦µÄ¿ÉÄÜÐԽϵ͡£
https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/
5. APT28Ò»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡Ô˶¯
1ÔÂ12ÈÕ£¬Óë¶íÂÞ˹¹ØÁªµÄAPT28×éÖ¯£¨ÓÖÃûFancy Bear¡¢BlueDeltaµÈ£©2025Äê2ÔÂÖÁ9ÔÂÒ»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡Ô˶¯£¬Ä¿µÄº¸ÇÍÁ¶úÆäÄÜÔ´ºÍºËÄÜ»ú¹¹¡¢Å·ÖÞÖǿ⡢±±ÂíÆä¶Ù¼°ÎÚ×ȱð¿Ë˹̹×éÖ¯£¬·´Ó¦Æä¶ÔÄÜÔ´¡¢¹ú·À¡¢Õþ¸®ÁìÓòµÄÒ»Á¬¹Ø×¢£¬Óë¶íÂÞ˹Ç鱍֨µã¸ß¶ÈÆõºÏ¡£¸Ã×éÖ¯½ÓÄÉ¡°ÇøÓò¶¨ÖÆÓÕ¶ü+µÍ±¾Ç®»ù´¡ÉèÊ©¡±Õ½ÂÔ£ºÍ¨¹ýÄ£ÄâMicrosoft OWA¡¢Google¡¢Sophos VPNµÄÐéαµÇÂ¼Ò³ÃæÇÔȡƾ֤£¬²¢Ê¹ÓÃWebhook.site¡¢InfinityFree¡¢Byet Internet Services¡¢ngrokµÈÃâ·ÑÍйܺÍËíµÀ·þÎñÍйܴ¹ÂÚÒ³Ãæ¡¢Ð¹Â¶Êý¾Ý¼°ÊµÏÖÖØ¶¨Ïò¡£ÀýÈ磬6Ô°²ÅŵÄSophos VPNÃÜÂëÖØÖÃÒ³ÃæÍ¨¹ýJavaScriptÌáÈ¡URL±êʶ·û²¢·¢ËÍÖÁ¹¥»÷Õß¿ØÖƶˣ¬×îÖÕÖØ¶¨ÏòÖÁÕýµ±VPNÃÅ»§£»9ÔÂÔòʹÓÃInfinityFreeÍйܵÄOWAÓâÆÚÃÜÂëÒ³Ãæ£¬½«Êܺ¦Õßµ¼Ïò±±ÂíÆä¶Ù¾üÊÂ×éÖ¯¼°ÎÚ×ȱð¿Ë˹̹IT¹«Ë¾µÄÕýµ±µÇÂ¼Ò³Ãæ¡£±ðµÄ£¬¹¥»÷ÕßǶÈ뺣ÍåÑо¿ÖÐÐÄ¡¢ECCOµÈ¿ÉÐÅÖÇ¿âµÄÕýµ±PDFÓÕ¶ü£¬ÏÈÖ¸µ¼Óû§µã»÷£¬ÔÙÏÔʾαÔìµÇÂ¼Ò³Ãæ£¬Í¨¹ýÒþ²ØHTML±íµ¥ºÍJavaScriptÐűêÇÔÈ¡ÓÊÏä¡¢ÃÜÂë¡¢IP¼°Óû§ÊðÀíÐÅÏ¢£¬×îºóÖØ¶¨Ïò»ØÕæÊµPDF£¬ÔöÇ¿ÓÕÆÐÔ¡£
https://securityaffairs.com/186801/apt/credential-harvesting-attacks-by-apt28-hit-turkish-european-and-central-asian-organizations.html
6. ÒÁÀÊMuddyWaterÓÃRustyWaterÌᳫ´¹ÂÚ¹¥»÷
1ÔÂ10ÈÕ£¬¿ËÈÕ£¬±»³ÆÎªMuddyWaterµÄÒÁÀʺڿÍ×éÖ¯±»Ö¸Õë¶ÔÖж«µØÇøÍâ½»¡¢º£Ê¡¢½ðÈÚ¼°µçÐÅʵÌå·¢¶¯Óã²æÊ½´¹ÂÚ¹¥»÷£¬ÆäʹÓûùÓÚRustÓïÑÔ¿ª·¢¡¢´úºÅΪRustyWaterµÄÖ²Èë³ÌÐòʵÑéÈëÇÖ¡£CloudSEKÑо¿Ô±Prajwal AwasthiÔÚ±¨¸æÖÐÖ¸³ö£¬¹¥»÷ͨ¹ýαװ³ÉÍøÂçÇå¾²Ö¸ÄϵĴ¹ÂÚÓʼþ¸½´ø¶ñÒâWordÎĵµ£¬ÓÕµ¼Êܺ¦Õ߯ôÓÃÄÚÈݺ󼤻îVBAºê£¬½ø¶ø°²ÅÅRustyWater³ÌÐò¡£¸ÃÖ²Èë³ÌÐò¾ß±¸Òì²½ÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨Ñ¶¡¢·´ÆÊÎö¼ì²â¡¢Í¨¹ýWindows×¢²á±íʵÏÖ³¤ÆÚ»¯¼°Ä£¿é»¯À©Õ¹ÄÜÁ¦£¬¿ÉÍøÂçÅÌËã»úÐÅÏ¢¡¢¼ì²âÇå¾²Èí¼þ£¬²¢ÓëC2·þÎñÆ÷½¨ÉèÁªÏµÒÔÖ´ÐÐÎļþ²Ù×÷ºÍÏÂÁî¡£´Ë´Î¹¥»÷±ê¼Ç×ÅMuddyWater¹¥»÷ÊÖ·¨µÄÒ»Á¬Ñݱ䡣¸Ã×éÖ¯×Ô2017ÄêÆð±»ÆÀ¹ÀÁ¥ÊôÓÚÒÁÀÊÇ鱨ÓëÇå¾²²¿£¬½üÄêÀ´Öð²½ïÔ̶ÔÕýµ±Ô¶³Ì»á¼ûÈí¼þµÄÒÀÀµ£¬×ª¶ø½ÓÄɶàÑù»¯¶¨ÖƶñÒâÈí¼þ¿â£¬°üÀ¨Phoenix¡¢UDPGangster¡¢BugSleepºÍMuddyViperµÈ¹¤¾ß¡£´Ë´ÎÒýÈëRustÓïÑÔ¿ª·¢µÄÖ²Èë³ÌÐò£¬½øÒ»²½ÌåÏÖÁËÆä¹¤¾ßÁ´Ïò¸ü½á¹¹»¯¡¢Ä£¿é»¯ºÍµÍÔëÉùµÄÔ¶³Ì»á¼ûľÂíÄÜÁ¦Ñݽø¡£
https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html


¾©¹«Íø°²±¸11010802024551ºÅ