Ó¡¶È˰Îñ´¹ÂÚ¹¥»÷°²ÅŶà½×¶ÎÌØ¹¤¿ò¼Ü

Ðû²¼Ê±¼ä 2026-01-28

1. Ó¡¶È˰Îñ´¹ÂÚ¹¥»÷°²ÅŶà½×¶ÎÌØ¹¤¿ò¼Ü


1ÔÂ26ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»ÆðÕë¶ÔÓ¡¶ÈÓû§µÄÍøÂçÌØ¹¤¹¥»÷Ô˶¯£¬¸ÃÔ˶¯Í¨¹ýð³äÓ¡¶ÈËùµÃ˰²¿·ÖµÄ´¹ÂÚÓʼþÈö²¥¶à½×¶Î¶ñÒâ³ÌÐò¡£¾ÝeSentireÍþвÏìÓ¦²¿·ÖÆÊÎö£¬¹¥»÷ÕßʹÓÃαÔìµÄ˰Îñ· £¿î֪ͨ·Ö·¢º¬Òþ²ØÎļþµÄZIPѹËõ°ü£¬ÆäÖаüÀ¨Ò»¸ö¿ÉÖ´ÐÐÎļþ¼°¶ñÒâDLLÎļþ¡£¸Ã¿ÉÖ´ÐÐÎļþͨ¹ýDLL²àÔØÊÖÒÕ¼ÓÔØ¶ñÒâÄ £¿é£¬ÔÚÔËÐÐʱ¼ì²âµ÷ÊÔÆ÷ÑÓ³Ù²¢ÁªÏµÍⲿ·þÎñÆ÷»ñÈ¡ºóÐøÔØºÉ¡£¹¥»÷Á´ÖУ¬ÏÂÔØµÄShellcodeʹÓÃCOMÊÖÒÕÈÆ¹ýÓû§ÕË»§¿ØÖÆ£¨UAC£©ÌáÐÑ»ñÈ¡ÖÎÀíԱȨÏÞ£¬Í¬Ê±ÐÞˢгÌÇéÐο飨PEB£©Î±×°³ÉÕýµ±WindowsÀú³Ì¡°explorer.exe¡±ÒÔÌӱܼì²â¡£Ëæºó£¬¶ñÒâÈí¼þÏÂÔØÒ»¸ö32λInno Setup×°ÖóÌÐò£¬¸Ã³ÌÐò»áƾ֤ĿµÄÖ÷»úÊÇ·ñÔËÐÐAvast·À²¡¶¾Èí¼þ¶¯Ì¬µ÷½âÐÐΪ¡£×îÖÕ£¬¹¥»÷Õß°²ÅÅÁËBlackmoonÒøÐÐľÂí±äÖÖ¼°SyncFuture TSMÆóÒµ¹¤¾ß¡£ºóÕß×÷ΪÕýµ±µÄÖÕ¶ËÇå¾²ÖÎÀí¹¤¾ß±»ÖØÐÂʹÓÃÎªÌØ¹¤¿ò¼Ü£¬ÌṩԶ³Ì¼à¿Ø¡¢Êý¾ÝÇÔÈ¡¼°Óû§Ô˶¯¼Í¼¹¦Ð§¡£


https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html


2. WinRAR¸ßΣÎó²îCVE-2025-8088Ôâ¶àÀ๥»÷ÕßÀÄÓÃ


1ÔÂ27ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾ESETÓë¹È¸èÍþвÇ鱨С×飨GTIG£©½üÆÚÅû¶£¬WinRARÈí¼þÖеÄCVE-2025-8088¸ßΣ·¾¶±éÀúÎó²îÕý±»¹ú¼ÒÖ§³ÖÐÍÌØ¹¤×éÖ¯¼°¾­¼ÃÀûÒæÇý¶¯µÄ·¸·¨ÍÅ»ï´ó¹æÄ£Ê¹Ó㬾ÙÐгõʼ»á¼û²¢°²ÅŶñÒâÔØºÉ¡£¸ÃÎó²îͨ¹ý±¸ÓÃÊý¾ÝÁ÷£¨ADS£©½«¶ñÒâÎļþдÈëí§ÒâλÖ㬹¥»÷ÕßÔøÊ¹ÓÃÆäÔÚWindowsÆô¶¯Îļþ¼ÐÖ²È볤ÆÚ»¯¶ñÒâÈí¼þ£¬ÊµÏÖÖØÆôºóÒ»Á¬ÔËÐС£GTIG±¨¸æÖ¸³ö£¬¹¥»÷Ô˶¯×Ô2025Äê7ÔÂ18ÈÕÆðÒ»Á¬ÖÁ½ñ£¬Éæ¼°¶íÂÞ˹½áÃ˵ÄRomCom×éÖ¯£¨UNC4895£©¡¢ÒÁÀÊAPT44£¨FROZENBARENTS£©¡¢³¯ÏÊTEMP.Armageddon¼°Öйú¹ØÁª¹¥»÷Õߵȹú¼ÒÖ§³ÖʵÌ壬ÒÔ¼°·Ö·¢XWorm¡¢AsyncRATµÈÔ¶³Ì»á¼û¹¤¾ßµÄ¾­¼Ã·¸·¨·Ö×Ó¡£¹¥»÷Á´Í¨³£½«¶ñÒâÔØºÉÒþ²ØÔڹ鵵ÎļþÓÕ¶ü£¨ÈçPDF£©µÄADSÖУ¬Óû§·­¿ªWinRARʱ£¬Îó²î»áÌáÈ¡ADSÓÐÓÃÔØºÉ£¬ÌìÉúLNK¡¢HTA¡¢BATµÈ¿ÉÖ´ÐÐÎļþ£¬ÔÚÓû§µÇ¼ʱ×Ô¶¯ÔËÐС£ÖµµÃ×¢ÖØµÄÊÇ£¬ËùÓй¥»÷Õß¾ù´Ó¡°zeroplayer¡±µÈ¹©Ó¦ÉÌ´¦»ñÈ¡Îó²îʹÓóÌÐò¡£¸Ã¹©Ó¦ÉÌÈ¥Äê7ÔÂÔø¶µÊÛ´ËÎó²î£¬²¢ÏúÊÛÆäËû¸ß¼ÛÁãÈÕÎó²î¡£


https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/


3. ÄÍ¿ËÊÓ²ìÀÕË÷ÍÅ»ïÎļþй¶ÊÂÎñ


1ÔÂ27ÈÕ£¬¿ËÈÕ£¬Ô˶¯´ò°ç¾ÞÍ·ÄͿ˹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»Æð¡°Ç±ÔÚµÄÍøÂçÇå¾²ÊÂÎñ¡±¡£´Ëǰ£¬World LeaksÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû³ÆÇÔÈ¡ÁËÄÍ¿Ë1.4TBÎļþ£¬°üÀ¨½ü19Íò·ÝÆóÒµÊý¾Ý£¬Éæ¼°ÓªÒµÔËÓªÐÅÏ¢¡£ÄÍ¿ËÔÚÉùÃ÷ÖÐÇ¿µ÷¡°Ê¼ÖÕÖØÊÓÏûºÄÕßÒþ˽ºÍÊý¾ÝÇå¾²¡±£¬²¢ÌåÏÖÕýÆð¾¢ÆÀ¹ÀÇéÐΡ£ÖµµÃ×¢ÖØµÄÊÇ£¬World LeaksËæºó´Óй¶ÁбíÖÐɾ³ýÁËÄÍ¿ËÌõÄ¿£¬Òý·¢Ì¸ÅлòÊê½ðÖ§¸¶ÍƲ⣬µ«ÄÍ¿Ëδ֤ʵÊý¾Ý±»µÁ£¬µÚÈý·½Ò²ÎÞ·¨ÑéÖ¤ÎļþÕæÊµÐÔ¡£¾­²é£¬World LeaksʵΪHunters InternationalÀÕË÷Èí¼þµÄ¸üÃû°æ±¾¡£¸Ã×éÖ¯ÓÚ2023Äêβ·ºÆð£¬Òò´úÂëÏàËÆÐÔ±»ÊÓΪHiveÀÕË÷Èí¼þµÄ¿ÉÄܱäÌå£¬ÔøÐû³Æ¶Ô280ÓàÆð¹¥»÷ÈÏÕæ¡£2025Äê1Ô£¬Hunters InternationalÐû²¼·ÅÆúÎļþ¼ÓÃÜÕ½ÂÔ£¬×ªÏòÊý¾ÝÇÔÈ¡ºÍÀÕË÷ģʽ£¬ÀíÓÉÊǹŰåÀÕË÷Èí¼þ²Ù×÷Σº¦¹ý¸ßÇÒÀûÈóϽµ¡£


https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/


4. SmarterMail·þÎñÆ÷¸ßΣÎó²îÍþвȫÇò


1ÔÂ27ÈÕ£¬·ÇÓªÀûÇå¾²×éÖ¯Shadowserver¿ËÈÕÐû²¼±¨¸æ£¬Ö¸³öÈ«ÇòÁè¼Ý6000̨SmarterMail·þÎñÆ÷Òò̻¶ÔÚ»¥ÁªÍøÉÏ£¬¿ÉÄÜÔâÊܱàºÅΪCVE-2026-23760µÄÑÏÖØÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¹¥»÷¡£¸ÃÎó²îÓÉÍøÂçÇå¾²¹«Ë¾watchTowrÓÚ2026Äê1ÔÂ8ÈÕÊ×´ÎÅû¶£¬Éæ¼°SmarterToolsÆìÏÂSmarterMail 9511°æ±¾Ö®Ç°µÄÃÜÂëÖØÖÃAPI¹¦Ð§¡£¾ÝÇ徲ͨ¸æÏÔʾ£¬Æä"force-reset-password"¶Ëµã±£´æÉè¼ÆÈ±ÏÝ£¬ÔÊÐíÄäÃûÇëÇóÇÒδÑéÖ¤ÏÖÓÐÃÜÂë»òÖØÖÃÁîÅÆ£¬¹¥»÷Õß½öÐèÌṩĿµÄÖÎÀíÔ±Óû§ÃûºÍÐÂÃÜÂë¼´¿ÉÖØÖÃÕË»§£¬´Ó¶øÍêÈ«»ñȡϵͳÖÎÀíȨÏÞ¡£watchTowrÑо¿Ö°Ô±ÒÑÐû²¼¿´·¨ÑéÖ¤Îó²îʹÓóÌÐò£¬Ö¤ÊµÎ´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓôËÎó²îÐ®ÖÆÖÎÀíÔ±ÕË»§£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¬µ¼Ö¶ÔÊÜÓ°Ïì·þÎñÆ÷µÄÍêÈ«¿ØÖÆ¡£Shadowserverͨ¹ý°æ±¾¼ì²â·¢Ã÷£¬ÃÀ¹ú£¨4100̨£©¡¢ÂíÀ´Î÷ÑÇ£¨449̨£©¡¢Ó¡¶È£¨188̨£©¡¢¼ÓÄôó£¨166̨£©ºÍÓ¢¹ú£¨146̨£©ÊÇÊÜÓ°Ïì×îÑÏÖØµÄ¹ú¼Ò£¬ÇÒÏÖʵ¹¥»÷ʵÑéÒѱ»ÊӲ쵽¡£


https://securityaffairs.com/187394/hacking/shadowserver-finds-6000-likely-vulnerable-smartermail-servers-exposed-online.html


5. ¶íÂÞ˹Delta¹«Ë¾ÔâÍøÂç¹¥»÷Ö¶àϵͳ̱»¾


1ÔÂ27ÈÕ£¬¶íÂÞ˹±¨¾¯ÓëÇ徲ϵͳ¹©Ó¦ÉÌDelta¹«Ë¾¿ËÈÕÔâÓö¡°´ó¹æÄ£¡¢Ð­µ÷ÇÒ×éÖ¯ÑÏÃÜ¡±µÄÍøÂç¹¥»÷£¬µ¼ÖÂÆä¼ÒÍ¥¡¢ÆóÒµ¼°³µÁ¾Ç徲ϵͳ·þÎñ´óÃæ»ýÖÐÖ¹£¬Òý·¢¿Í»§ÆÕ±éͶËß¡£¸Ã¹«Ë¾Êг¡×ܼàÍßÁÐÀÎÚʲ¿Æ·òÔÚÊÓÆµÉùÃ÷ÖÐÖ¸³ö£¬¹¥»÷Ô´×Ô¡°³ðÊÓÍâ¹ú¡±£¬²¢Ì¹ÑÔÆä¼Ü¹¹¡°ÎÞ·¨µÖÓùÍâÑóÈ«ÐIJ߻®µÄ¹¥»÷¡±¡£×èÖ¹Öܶþ£¬DeltaÍøÕ¾¼°µç»°Ïß·ÈÔÎÞ·¨Ê¹Ó㬹«Ë¾±»ÆÈͨ¹ýÉ罻ýÌåVKontakteÓëÊýÍòÃû¿Í»§Ïàͬ£¬²¢ÔÊÐíÊÖÒÕÍŶÓÕýÈ«Á¦»Ö¸´ÏµÍ³£¬Ô¤¼ÆºÜ¿ìÖÜÈ«»Ö¸´¡£´Ë´Î¹¥»÷Ôì³É¶àÖØÏÖʵӰÏ죺Óû§±¨¸æÆû³µ·ÀµÁ¾¯±¨ÎÞ·¨¹Ø±Õ¡¢³µÁ¾ÎÞ·¨½âËø¡¢Ô¶³ÌÆô¶¯ÏµÍ³¹ÊÕÏ¡¢³µÃÅÒâÍâËø±ÕÉõÖÁÐÐÊ»Öз¢ÄîͷϨ»ð£»×¡Õ¬¼°ÉÌÒµÐÞ½¨¾¯±¨ÏµÍ³Ôò×Ô¶¯Çл»ÖÁ½ôÆÈģʽÇÒÎÞ·¨¹Ø±Õ¡£¶íÓïýÌåBazaÔÚTelegramÉÏÅû¶£¬ÊÂÎñ±¬·¢ºóÓû§Ñ¸ËÙ·´ÏìÉÏÊöÎÊÌ⣬¶ø¡¶ÉúÒâÈ˱¨¡·Òà֤ʵ±£´æ´ó¹æÄ£¹ÊÕÏ¡£Ö»¹ÜDelta¼á³ÆÎÞ¿Í»§Êý¾Ýй¶£¬µ«Ò»¸ö×Գƹ¥»÷ÕßµÄTelegramƵµÀÐû²¼Á˾ݳưüÀ¨±»µÁÊý¾ÝµÄ´æµµÎļþ£¬ÆäÕæÊµÐÔ¼°¹¥»÷ÕßÉí·ÝÉÐδ»ñ×ÔÁ¦ºËʵ¡£


https://therecord.media/russia-delta-security-alarm-company-cyberattack


6. SoundCloudÔâShinyHunters¹¥»÷ÖÂ2980ÍòÓû§Êý¾Ýй¶


1ÔÂ27ÈÕ£¬ÒôƵÁ÷ýÌåÆ½Ì¨SoundCloud 2025Äê12ÔÂÔâÓö´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÁè¼Ý2980ÍòÓû§ÕË»§£¬Éæ¼°µç×ÓÓʼþµØµã¡¢µØÀíλÖá¢ÐÕÃû¡¢Óû§Ãû¡¢Í·Ïñ¡¢·ÛË¿Êý¡¢¹Ø×¢ÕßÊý¼°²¿·Ö¹ú¼ÒÐÅÏ¢µÈ¹ûÕæ×ÊÁÏ¡£SoundCloud½¨ÉèÓÚ2007Ä꣬×÷ΪÒÕÊõ¼ÒÖÐÐÄÆ½Ì¨£¬ÏÖÓµÓÐÈ«Çò4000ÍòÒÕÊõ¼ÒÉÏ´«µÄ³¬4ÒÚÊ׸èÇú¡£ÊÂÎñÒòÓÉÓÚºÚ¿ÍÈëÇ֯䏍Öú·þÎñÒDZí°å£¬´¥·¢Î´¾­ÊÚȨ»á¼û¡£SoundCloudÔÚ¼ì²âµ½Òì³£ºóÆô¶¯ÊÂÎñÏìÓ¦³ÌÐò£¬¾­ÊÓ²ìÈ·ÈÏÎÞÃô¸ÐÊý¾Ýй¶£¬½öÉæ¼°¹ûÕæÐ¡ÎÒ˽¼Ò×ÊÁÏÐÅÏ¢¡£È»¶ø£¬ÀÕË÷ÍÅ»ïShinyHuntersÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬²¢ÏòSoundCloudÌá³öÀÕË÷ÒªÇó£¬Í¬Ê±Í¨¹ýµç×ÓÓʼþ¶ÔÓû§¡¢Ô±¹¤¼°ÏàÖúͬ°é·¢ËÍɧÈÅÐÅÏ¢¡£1ÔÂ15ÈÕ£¬SoundCloud֤ʵ¹¥»÷Õß±£´æÀÕË÷ÐÐΪ£¬ÇÒÊý¾ÝÒѱ»¹ûÕæ¡£´Ë´Îй¶ӰÏìÔ¼20%µÄSoundCloudÓû§£¬´ËǰÓû§Ôø±¨¸æÎÞ·¨»á¼ûƽ̨¼°Ê¹ÓÃVPNʱ·ºÆð403¹ýʧ¡£Êý¾Ýй¶֪ͨ·þÎñHave I Been PwnedÅû¶£¬¹¥»÷ÕßÀֳɽ«¹ûÕæ×ÊÁÏÓëÓû§µç×ÓÓʼþµØµã¹ØÁª£¬Éæ¼°3000ÍòΨһµç×ÓÓʼþµØµã¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-soundcloud-data-breach-impacts-298-million-accounts/