¾¯ÌèBitB´¹µöÐÂÍþв£º£º£ºFacebookÓû§°²È«Ö¸ÄÏ
°ä²¼¹¦·ò 2026-01-131. ¾¯ÌèBitB´¹µöÐÂÍþв£º£º£ºFacebookÓû§°²È«Ö¸ÄÏ
1ÔÂ12ÈÕ£¬£¬£¬´ÓǰÁù¸öÔ£¬£¬£¬ºÚ¿ÍƵÈÔÀûÓÃä¯ÀÀÆ÷ÄÚä¯ÀÀÆ÷£¨BitB£©¼¼Êõ¶ÔFacebookÓû§ÌáÒé´¹µö¹¥»÷£¬£¬£¬¸Ã¼¼ÊõÓɰ²È«×êÑÐÔ±mr.d0xÓÚ2022Ä꿪·¢£¬£¬£¬ºó±»ÍøÂç·¸×ï·Ö×ÓÀ©´óÖÁSteamµÈƽ̨¡£¡£Trellix×êÑÐÈËÔ±·¢ÏÖ£¬£¬£¬¹¥»÷Õßͨ¹ýαÔìÂÉʦÊÂÎñËù֪ͨ¡¢¡¢¡¢°æÈ¨ÇÖȨÖÒ¸æ»òMeta°²È«ÌáÐÑ£¬£¬£¬ÓÕµ¼Óû§µã»÷Ô̺¬ÐéαµÇ¼±íµ¥µÄµ¯³ö´°¿Ú¡£¡£´ËÀà´°¿ÚÀûÓÃiframe¼¼Êõ·ÂÕÕ¹Ù·½ÈÏÖ¤½çÃæ£¬£¬£¬²¢Í¨¹ý×Ô½ç˵´°¿Ú±êÌâºÍURL¼ÓÇ¿ºýŪÐÔ£¬£¬£¬ÉõÖÁ²ÎÓëËõ¶ÌURLºÍÐéαMetaCAPTCHAÒ³ÃæÒÔ¶ã±Ü¼ì²â¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬Êܺ¦Õß»áÔÚ¹¥»÷Õß½ÚÖÆµÄÍøÒ³ÉÏ¿´µ½¿´ËƺϷ¨µÄä¯ÀÀÆ÷µ¯³ö´°¿Ú£¬£¬£¬ÒªÇóÊäÈëFacebookÍ´´¦¡£¡£ÓÉÓÚiframeÓëµ×²ã´°¿Ú°ó¶¨£¬£¬£¬Óû§ÎÞ·¨½«ÆäÍϳöä¯ÀÀÆ÷´°¿Ú£¬£¬£¬ÕâÊǼø±ðBitB¹¥»÷µÄ¹Ø¼üÌØµã¡£¡£×êÑÐÖ¸³ö£¬£¬£¬´óÁ¿´¹µöÒ³ÃæÍйÜÔÚNetlify¡¢¡¢¡¢VercelµÈºÏ·¨ÔÆÆ½Ì¨£¬£¬£¬¼Ù×°³ÉMetaÒþÖÔÖÐÐÄ»òÉêÊö±íµ¥£¬£¬£¬ÍøÂçÓû§Ð¡ÎÒÐÅÏ¢¡£¡£Ó봫ͳ´¹µöÏà±È£¬£¬£¬ÕâÖÖÊÖ·¨Í¨¹ýÀÄÓÃÊÜÐÅÀµµÄ»ù´¡ÉèÊ©ÈÆ¹ý°²È«¹ýÂËÆ÷£¬£¬£¬ÓªÔìÐéα°²È«¸Ð¡£¡£
https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/
2. CISA´¹Î£ºÅÁîÐÞ²¹Òѱ»ÀûÓõÄGogs¸ßΣ·ì϶
1ÔÂ12ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿ÃÅÔÚ2026Äê2ÔÂ2ÈÕǰÐÞ²¹Gogs¸ßΣ·ì϶CVE-2025-8110¡£¡£¸Ã·ì϶ԴÓÚPutContents APIµÄõè¾¶±éÀúȱµã£¬£¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷Õßͨ¹ý·ûºÅÁ´½Ó¸²¸Ç´æ´¢¿âÍⲿÎļþ£¬£¬£¬Èƹý´ËǰÐÞ¸´µÄCVE-2024-55947±£»£»¤´ëÊ©£¬£¬£¬½ø¶øÍ¨¹ýÅú¸ÄGitÅäÖÃÎļþ£¨ÈçsshCommand£©Ö´ÐÐËÁÒâºÅÁ£¬£¬×é³ÉÁãÈÕ¹¥»÷·çÏÕ¡£¡£Gogs×÷ΪGo˵»°±àдµÄÇáÁ¿¼¶Git·þÎñ´úÌæ¹æ»®£¬£¬£¬³£ÓÃÓÚÔ¶³ÌºÏ×÷£¬£¬£¬µ«ÆäÊ¢¿ªÐÔʹÆä³ÉΪ¹¥»÷Ö¸±ê¡£¡£Wiz ResearchÔÚ7Ôµ÷²é¿Í»§Gogs·þÎñÆ÷¶ñÒâÈí¼þϰȾʱ·¢Ïָ÷ì϶£¬£¬£¬²¢ÓÚ7ÔÂ17Èջ㱨£¬£¬£¬10ÔÂ30ÈÕ»ñGogsÈ·ÈÏ£¬£¬£¬ÉÏÖܰ䲼²¹¶¡¡£¡£È»¶ø£¬£¬£¬11ÔÂ1ÈÕ¼´³öÏÖµÚ¶þ²¨ÁãÈÕ¹¥»÷¡£¡£µ÷²éÏÔʾ£¬£¬£¬³¬1400̨Gogs·þÎñÆ÷¶³öÓÚ»¥ÁªÍø£¬£¬£¬ÆäÖÐ1250̨ÈԿɽӼû£¬£¬£¬700¸öʵÀýÏÔʾ±»ÈëÇÖ¼£Ï󡣡£CISAÒѽ«CVE-2025-8110ÁÐÈë¡°ÒÑÀûÓ÷ì϶Ŀ¼¡±£¬£¬£¬Ç¿µ÷´ËÀà·ì϶ÊǶñÒâÍøÂç¹¥»÷Õߵij£ÓÃõè¾¶£¬£¬£¬´ºÁª°î»ú¹¹×é³ÉÖØ´ó·çÏÕ¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/
3. TargetµÄ¿ª·¢·þÎñÆ÷ÔÚºÚ¿ÍÐû³ÆÇÔȡԴ´úÂëºóÀëÏß
1ÔÂ12ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬ºÚ¿ÍÔÚGiteaƽ̨°ä²¼¶à¸öÒÉËÆTarget¹«Ë¾ÄÚ²¿´úÂë¿âµÄÑù±¾£¬£¬£¬²¢Ðû³ÆÕýͨ¹ýµØÏÂÂÛ̳ÏúÊÛÆëÈ«Êý¾Ý¼¯¡£¡£ÊÂÎñÆðÒòÓÚÉÏÖÜÒ»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÔÚGitea´´½¨´úÂë²Ö¿â£¬£¬£¬Ô̺¬Target²¿ÃÅÄÚ²¿´úÂë¡¢¡¢¡¢¿ª·¢ÕßÎĵµ¼°ÃûΪSALE.MDµÄÎļþ¡£¡£¸ÃÎļþÏÔʾÆëÈ«Êý¾Ý¼¯Ô̺¬³¬5.7ÍòÐÐĿ¼ÁÐ±í£¬£¬£¬×ÜÈÝÁ¿Ô¼860GB£¬£¬£¬Éæ¼°"Ç®°ü·þÎñÉøÈë²âÊÔ""TargetIDM-TAPProvisioningAPI"µÈÃô¸ÐÏîÄ¿£¬£¬£¬ÇÒÌá½»ÔªÊý¾ÝÌá¼°¶àλTargetÏÖÈÎÊ×ϯ¹¤³ÌʦÐÕÃû¼°ÄÚ²¿API¶Ëµã£¨Èçconfluence.target.com£©£¬£¬£¬°µÊ¾Êý¾ÝÔ´×Ô˽Óпª·¢»ù´¡ÉèÊ©¡£¡£TargetµÄGit·þÎñÆ÷£¨git.target.com£©ÒÑÎÞ·¨´Ó»¥ÁªÍø½Ó¼û£¬£¬£¬´Ëǰ¸ÃÓòÃûÔøÖØ¶¨ÏòÖÁÔ±¹¤µÇÂ¼Ò³Ãæ£¬£¬£¬µ«ÏÖÒÑÆëȫ崻ú¡£¡£º£º£ºÚ¿Í°ä²¼µÄGitea²Ö¿âÔÚýÌåÁªÏµTargetºó±»É¾³ý£¬£¬£¬·µ»Ø404ÃýÎ󣬣¬£¬ÓëϼÜÒªÇóÒ»Ö¡£¡£ËÑË÷ÒýÇæ»º´æ¼Í¼ÏÔʾ£¬£¬£¬git.target.com²¿ÃÅ×ÊÔ´Ôø±»Ë÷Òý£¬£¬£¬µ«ÎÞ·¨È·ÈÏÊÇ·ñÓë½üÆÚ¶³öÊÂÎñÖ±½ÓÓйء£¡£
https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/
4. Î÷°àÑÀÄÜÔ´¾ÞÍ·EndesaÅû¶Êý¾Ýй¶ÊÂÎñ
1ÔÂ12ÈÕ£¬£¬£¬Î÷°àÑÀ×î´óÄÜÔ´¹©¸øÉÌEndesa¼°ÆäÔËÓªÉÌEnerg¨ªa XXI½üÈÕÅûÂ¶ÖØ´ó°²È«ÊÂÎñ£º£º£ººÚ¿Íͨ¹ý·¸·¨½Ó¼ûÆäóÒׯ½Ì¨£¬£¬£¬ÇÔÈ¡ÁËÓë¿Í»§ÄÜÔ´ºÏͬÓйصÄÃô¸ÐСÎÒÐÅÏ¢¡£¡£×÷ΪEnel¼¯ÍÅÆìÏÂÆóÒµ£¬£¬£¬EndesaÔÚÎ÷°àÑÀºÍÆÏÌÑÑÀÕ¼Óг¬1000ÍòÓû§£¬£¬£¬×ܿͻ§»ùÊýÔ¼2200Íò¡£¡£Õâ´Îй¶µÄÊý¾ÝÀàÐÍÔ̺¬»ù×ÔÉí·ÝÐÅÏ¢¡¢¡¢¡¢ÁªÏµÐÅÏ¢¡¢¡¢¡¢¹úÃñÉí·ÝÖ¤ºÅÂ루DNI£©¡¢¡¢¡¢ºÏͬÏêÇé¼°¸¶¿îÐÅÏ¢£¨ÈçIBANÕ˺ţ©£¬£¬£¬µ«¹«Ë¾Ç¿µ÷ÕË»§ÃÜÂëδ±»²¨¼°¡£¡£ÊÂÎñ²úÉúºó£¬£¬£¬EndesaѸËÙ²ÉÈ¡¶àÏî·À»¤´ëÊ©£º£º£º¹Ø±ÕÊÜÓ°ÏìÄÚ²¿ÕË»§¡¢¡¢¡¢µ¼³öÈÕÖ¾½øÐм¼Êõ·ÖÎö¡¢¡¢¡¢¼Óǿϵͳ¼à¿ØÒÔ¼ì²âºóÐø¿ÉÒɻ£¬£¬£¬²¢Í¬²½ÏòÎ÷°àÑÀÊý¾Ý±£»£»¤¾Ö¼°Óйؼà¹Ü»ú¹¹»ã±¨¡£¡£¹«Ë¾Í¨¹ýÕýʽÇþµÀ֪ͨËùÓÐÊÜÓ°Ïì¿Í»§£¬£¬£¬²¢ÌáÐÑÓû§¾¯ÌèÉí·ÝðÓᢡ¢¡¢Êý¾Ý͵ÇÔ¼°ÍøÂç´¹µö¹¥»÷·çÏÕ£¬£¬£¬½¨Ò齫¿ÉÒɻ»ã±¨ÖÁÖ¸¶¨ºÅÂë¡£¡£EndesaÉêÃ÷³Æ£¬£¬£¬½ØÖÁĿǰÎÞÖ¤¾ÝÏÔʾй¶Êý¾ÝÒѱ»Ú²ÆÊ¹Ó㬣¬£¬Òò¶ø¶ÔÓû§È¨ÊƺÍ×ÔÓÉ×é³É¸ß·çÏյĿÉÄÜÐԽϵ͡£¡£
https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/
5. APT28³ÖÐø·¢Õ¹µÍ³É±¾Æ¾Ö¤ÇÔÈ¡»î¶¯
1ÔÂ12ÈÕ£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄAPT28×éÖ¯£¨±ðºÅFancy Bear¡¢¡¢¡¢BlueDeltaµÈ£©2025Äê2ÔÂÖÁ9Ô³ÖÐø·¢Õ¹µÍ³É±¾Æ¾Ö¤ÇÔÈ¡»î¶¯£¬£¬£¬Ö¸±êº¸ÇÍÁ¶úÆäÄÜÔ´ºÍºËÄÜ»ú¹¹¡¢¡¢¡¢Å·ÖÞÖǿ⡢¡¢¡¢±±ÂíÆä¶Ù¼°ÎÚ×ȱð¿Ë˹̹×éÖ¯£¬£¬£¬·´Ó³Æä¶ÔÄÜÔ´¡¢¡¢¡¢¹ú·À¡¢¡¢¡¢µ±¾ÖÁìÓòµÄ³ÖÐø¹Ø×¢£¬£¬£¬Óë¶íÂÞ˹µý±¨Öصã¸ß¶È·ûºÏ¡£¡£¸Ã×é֯ѡȡ¡°ÇøÓò¶¨ÖƵö¶ü+µÍ³É±¾»ù´¡ÉèÊ©¡±Õ½Êõ£º£º£ºÍ¨¹ý·ÂÕÕMicrosoft OWA¡¢¡¢¡¢Google¡¢¡¢¡¢Sophos VPNµÄÐéαµÇÂ¼Ò³ÃæÇÔȡʹ´¦£¬£¬£¬²¢ÀûÓÃWebhook.site¡¢¡¢¡¢InfinityFree¡¢¡¢¡¢Byet Internet Services¡¢¡¢¡¢ngrokµÈÃâ·ÑÍйܺÍËíµÀ·þÎñÍйܴ¹µöÒ³Ãæ¡¢¡¢¡¢Ð¹Â¶Êý¾Ý¼°ÊµÏÖÖØ¶¨Ïò¡£¡£ÀýÈ磬£¬£¬6Ô²¿ÊðµÄSophos VPNÃÜÂëÖØÖÃÒ³ÃæÍ¨¹ýJavaScriptÌáÈ¡URL±êʶ·û²¢·¢ËÍÖÁ¹¥»÷Õß½ÚÖÆ¶Ë£¬£¬£¬×îÖÕÖØ¶¨ÏòÖÁºÏ·¨VPNÃÅ»§£»£»9ÔÂÔòÀûÓÃInfinityFreeÍйܵÄOWA¹ýÆÚÃÜÂëÒ³Ãæ£¬£¬£¬½«Êܺ¦Õßµ¼Ïò±±ÂíÆä¶Ù¾üÊÂ×éÖ¯¼°ÎÚ×ȱð¿Ë˹̹IT¹«Ë¾µÄºÏ·¨µÇÂ¼Ò³Ãæ¡£¡£´ËÍ⣬£¬£¬¹¥»÷ÕßǶÈ뺣Íå×êÑÐÖÐÐÄ¡¢¡¢¡¢ECCOµÈ¿ÉÐÅÖÇ¿âµÄºÏ·¨PDFµö¶ü£¬£¬£¬ÏÈÊèµ¼Óû§µã»÷£¬£¬£¬ÔÙÏÔʾαÔìµÇÂ¼Ò³Ãæ£¬£¬£¬Í¨¹ý°µ²ØHTML±íµ¥ºÍJavaScriptÐűêÇÔÈ¡ÓÊÏä¡¢¡¢¡¢ÃÜÂë¡¢¡¢¡¢IP¼°Óû§´úÀíÐÅÏ¢£¬£¬£¬×îºóÖØ¶¨Ïò»ØÕæÊµPDF£¬£¬£¬¼ÓÇ¿ºýŪÐÔ¡£¡£
https://securityaffairs.com/186801/apt/credential-harvesting-attacks-by-apt28-hit-turkish-european-and-central-asian-organizations.html
6. ÒÁÀÊMuddyWaterÓÃRustyWaterÌáÒé´¹µö¹¥»÷
1ÔÂ10ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬±»³ÆÎªMuddyWaterµÄÒÁÀʺڿÍ×éÖ¯±»Ö¸Õë¶ÔÖж«µØÓòÍâ½»¡¢¡¢¡¢º£Ê¡¢¡¢¡¢½ðÈÚ¼°µçÐÅʵÌå·¢ÆðÓã²æÊ½´¹µö¹¥»÷£¬£¬£¬ÆäʹÓûùÓÚRust˵»°¿ª·¢¡¢¡¢¡¢´úºÅΪRustyWaterµÄÖ²È뷨ʽִÐÐÈëÇÖ¡£¡£CloudSEK×êÑÐÔ±Prajwal AwasthiÔڻ㱨ÖÐÖ¸³ö£¬£¬£¬¹¥»÷ͨ¹ý¼Ù×°³ÉÍøÂ簲ȫָÄϵĴ¹µöÓʼþ¸½´ø¶ñÒâWordÎĵµ£¬£¬£¬ÓÕµ¼Êܺ¦Õ߯ôÓÃÄÚÈݺ󼤻îVBAºê£¬£¬£¬½ø¶ø²¿ÊðRustyWater·¨Ê½¡£¡£¸ÃÖ²È뷨ʽ¾ß±¸Òì²½ºÅÁîÓë½ÚÖÆ£¨C2£©Í¨Ñ¶¡¢¡¢¡¢·´·ÖÎö¼ì²â¡¢¡¢¡¢Í¨¹ýWindows×¢²á±íʵÏÖÓÆ¾Ã»¯¼°Ä£¿£¿é»¯À©´óÄÜÁ¦£¬£¬£¬¿ÉÍøÂçÍÆËã»úÐÅÏ¢¡¢¡¢¡¢¼ì²â°²È«Èí¼þ£¬£¬£¬²¢ÓëC2·þÎñÆ÷³ÉÁ¢ÁªÏµÒÔÖ´ÐÐÎļþ²Ù×÷ºÍºÅÁî¡£¡£Õâ´Î¹¥»÷±ê־ȡMuddyWater¹¥»÷ÊÖ·¨µÄ³ÖÐøÑݱ䡣¡£¸Ã×éÖ¯×Ô2017ÄêÆð±»ÆÀ¹À´ÓÊôÓÚÒÁÀʵý±¨Ó밲ȫÊý£¬£¬£¬½üÄêÀ´Öð²½Ï÷¼õ¶ÔºÏ·¨Ô¶³Ì½Ó¼ûÈí¼þµÄÒÀÀµ£¬£¬£¬×ª¶øÑ¡È¡¶àÑù»¯¶¨ÖƶñÒâÈí¼þ¿â£¬£¬£¬Ô̺¬Phoenix¡¢¡¢¡¢UDPGangster¡¢¡¢¡¢BugSleepºÍMuddyViperµÈ¹¤¾ß¡£¡£Õâ´ÎÒýÈëRust˵»°¿ª·¢µÄÖ²È뷨ʽ£¬£¬£¬½øÒ»²½ÌåÏÖÁËÆä¹¤¾ßÁ´Ïò¸ü½á¹¹»¯¡¢¡¢¡¢Ä£¿£¿é»¯ºÍµÍÔëÉùµÄÔ¶³Ì½Ó¼ûľÂíÄÜÁ¦Ñݽø¡£¡£
https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html


¾©¹«Íø°²±¸11010802024551ºÅ