Ó¡¶È˰Îñ´¹µö¹¥»÷²¿Êð¶à½×¶Î¼äµý¿ò¼Ü
°ä²¼¹¦·ò 2026-01-281. Ó¡¶È˰Îñ´¹µö¹¥»÷²¿Êð¶à½×¶Î¼äµý¿ò¼Ü
1ÔÂ26ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖһ·Õë¶ÔÓ¡¶ÈÓû§µÄÍøÂç¼äµý¹¥»÷»î¶¯£¬¸Ã»î¶¯Í¨¹ý¼ÙÒâÓ¡¶ÈËùµÃ˰²¿ÃŵĴ¹µöÓʼþ´«²¼¶à½×¶Î¶ñÒⷨʽ¡£¡£¡£¾ÝeSentireÍþвÏìÓ¦²¿ÃÅ·ÖÎö£¬¹¥»÷ÕßÀûÓÃαÔìµÄ˰Îñ·£¿£¿£¿î֪ͨ·Ö·¢º¬°µ²ØÎļþµÄZIPѹËõ°ü£¬ÆäÖÐÔ̺¬Ò»¸ö¿ÉÖ´ÐÐÎļþ¼°¶ñÒâDLLÎļþ¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþͨ¹ýDLL²àÔØ¼¼Êõ¼ÓÔØ¶ñÒâÄ£¿£¿£¿é£¬ÔÚÔËÐÐʱ¼ì²âµ÷ÊÔÆ÷ÑÓ³¤²¢ÁªÏµÍⲿ·þÎñÆ÷»ñÈ¡ºóÐøÔØºÉ¡£¡£¡£¹¥»÷Á´ÖУ¬ÏÂÔØµÄShellcodeÀûÓÃCOM¼¼ÊõÈÆ¹ýÓû§ÕË»§½ÚÖÆ£¨UAC£©ÌáÐÑ»ñÈ¡ÖÎÀíԱȨÏÞ£¬Í¬Ê±Åú¸Ä½ø³Ì»·¾³¿é£¨PEB£©¼Ù×°³ÉºÏ·¨Windows¹ý³Ì¡°explorer.exe¡±ÒÔÌӱܼì²â¡£¡£¡£Ëæºó£¬¶ñÒâÈí¼þÏÂÔØÒ»¸ö32λInno Setup×°Ö÷¨Ê½£¬¸Ã·¨Ê½»áƾ¾ÝÖ¸±êÖ÷»úÊÇ·ñÔËÐÐAvast·À²¡¶¾Èí¼þ¶¯Ì¬µ÷ÕûÐÐΪ¡£¡£¡£×îÖÕ£¬¹¥»÷Õß²¿ÊðÁËBlackmoonÒøÐÐľÂí±äÖÖ¼°SyncFuture TSMÆóÒµ¹¤¾ß¡£¡£¡£º£º£ºóÕß×÷ΪºÏ·¨µÄÖն˰²È«ÖÎÀí¹¤¾ß±»ÖØÐÂÀûÓÃΪ¼äµý¿ò¼Ü£¬ÌṩԶ³Ì¼à¿Ø¡¢Êý¾ÝÇÔÈ¡¼°Óû§»î¶¯¼Í¼ְÄÜ¡£¡£¡£
https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
2. WinRAR¸ßΣ·ì϶CVE-2025-8088Ôâ¶àÀ๥»÷ÕßÀÄÓÃ
1ÔÂ27ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾ESETÓë¹È¸èÍþвµý±¨Ð¡×飨GTIG£©½üÆÚÅû¶£¬WinRARÈí¼þÖеÄCVE-2025-8088¸ßΣõè¾¶±éÀú·ì϶Õý±»¹ú¶ÈÖ§³ÖÐͼäµý×éÖ¯¼°¾¼ÃÀûÒæÇý¶¯µÄ·¸×ïÍÅ»ï´ó¹æÄ£ÀûÓ㬽øÐгõʼ½Ó¼û²¢²¿Êð¶ñÒâÔØºÉ¡£¡£¡£¸Ã·ì϶ͨ¹ý±¸ÓÃÊý¾ÝÁ÷£¨ADS£©½«¶ñÒâÎļþдÈëËÁÒâµØÎ»£¬¹¥»÷ÕßÔøÀûÓÃÆäÔÚWindowsÆô¶¯Îļþ¼ÐÖ²ÈëÓÆ¾Ã»¯¶ñÒâÈí¼þ£¬ÊµÏÖÖØÆôºó³ÖÐøÔËÐС£¡£¡£GTIG»ã±¨Ö¸³ö£¬¹¥»÷»î¶¯×Ô2025Äê7ÔÂ18ÈÕÆð³ÖÐøÖÁ½ñ£¬Éæ¼°¶íÂÞ˹½áÃ˵ÄRomCom×éÖ¯£¨UNC4895£©¡¢ÒÁÀÊAPT44£¨FROZENBARENTS£©¡¢³¯ÏÊTEMP.Armageddon¼°Öйú¹ØÁª¹¥»÷Õߵȹú¶ÈÖ§³ÖʵÌ壬ÒÔ¼°·Ö·¢XWorm¡¢AsyncRATµÈÔ¶³Ì½Ó¼û¹¤¾ßµÄ¾¼Ã·¸×ï·Ö×Ó¡£¡£¡£¹¥»÷Á´Í¨³£½«¶ñÒâÔØºÉ°µ²ØÔڹ鵵Îļþµö¶ü£¨ÈçPDF£©µÄADSÖУ¬Óû§´ò¿ªWinRARʱ£¬·ì϶»áÌáÈ¡ADSÓÐÐ§ÔØºÉ£¬ÌìÉúLNK¡¢HTA¡¢BATµÈ¿ÉÖ´ÐÐÎļþ£¬ÔÚÓû§µÇ¼ʱ×Ô¶¯ÔËÐС£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ËùÓй¥»÷Õß¾ù´Ó¡°zeroplayer¡±µÈ¹©¸øÉÌ´¦»ñÈ¡·ì϶ÀûÓ÷¨Ê½¡£¡£¡£¸Ã¹©¸øÉÌÈ¥Äê7ÔÂÔø¶µÏú´Ë·ì϶£¬²¢ÏúÊÛÆäËû¸ß¼ÛÁãÈÕ·ì϶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/
3. ÄͿ˵÷²éÀÕË÷ÍÅ»ïÎļþй¶ÊÂÎñ
1ÔÂ27ÈÕ£¬½üÈÕ£¬»î¶¯·þ×°¾ÞÍ·ÄͿ˹«Ë¾Ö¤ÊµÕýÔÚµ÷²éһ·¡°Ç±ÔÚµÄÍøÂ簲ȫÊÂÎñ¡±¡£¡£¡£´Ëǰ£¬World LeaksÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû³ÆÇÔÈ¡ÁËÄÍ¿Ë1.4TBÎļþ£¬Ô̺¬½ü19Íò·ÝÆóÒµÊý¾Ý£¬Éæ¼°ÒµÎñÔËÓªÐÅÏ¢¡£¡£¡£ÄÍ¿ËÔÚÉêÃ÷ÖÐÇ¿µ÷¡°Ê¼ÖÕÆ÷ÖØÏû·ÑÕßÒþÖÔºÍÊý¾Ý°²È«¡±£¬²¢°µÊ¾Õý»ý¼«ÆÀ¹ÀÇé¿ö¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬World LeaksËæºó´Óй¶ÁбíÖÐɾ³ýÁËÄÍ¿ËÌõ¿î£¬Òý·¢½»Éæ»òÊê½ðÖ§¸¶²Â²â£¬µ«ÄÍ¿Ëδ֤ʵÊý¾Ý±»µÁ£¬µÚÈý·½Ò²ÎÞ·¨ÑéÖ¤ÎļþÕæÊµÐÔ¡£¡£¡£¾²é£¬World LeaksʵΪHunters InternationalÀÕË÷Èí¼þµÄ¸ÄÃû°æ±¾¡£¡£¡£¸Ã×éÖ¯ÓÚ2023Ëêĺ³öÏÖ£¬Òò´úÂëÀàËÆÐÔ±»ÊÓΪHiveÀÕË÷Èí¼þµÄ¿ÉÄܱäÌå£¬ÔøÐû³Æ¶Ô280ÓàÆð¹¥»÷ÕÆ¹Ü¡£¡£¡£2025Äê1Ô£¬Hunters International°ä·¢ÉÕ»ÙÎļþ¼ÓÃÜÕ½Êõ£¬×ªÏòÊý¾ÝÇÔÈ¡ºÍÀÕË÷ģʽ£¬ÀíÓÉÊÇ´«Í³ÀÕË÷Èí¼þ²Ù·ç¸ñÏÕ¹ý¸ßÇÒÀûÈó½µÂä¡£¡£¡£
https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/
4. SmarterMail·þÎñÆ÷¸ßΣ·ì϶ÍþвȫÇò
1ÔÂ27ÈÕ£¬·ÇͶ»ú°²È«×éÖ¯Shadowserver½üÈÕ°ä²¼»ã±¨£¬Ö¸³öÈ«Çò³¬¹ý6000̨SmarterMail·þÎñÆ÷Òò¶³öÔÚ»¥ÁªÍøÉÏ£¬¿ÉÄÜÔâ·ê±àºÅΪCVE-2026-23760µÄÑÏÖØÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶¹¥»÷¡£¡£¡£¸Ã·ì϶ÓÉÍøÂ簲ȫ¹«Ë¾watchTowrÓÚ2026Äê1ÔÂ8ÈÕ³õ´ÎÅû¶£¬Éæ¼°SmarterToolsÆìÏÂSmarterMail 9511°æ±¾Ö®Ç°µÄÃÜÂëÖØÖÃAPIÖ°ÄÜ¡£¡£¡£¾Ý°²È«²¼¸æÏÔʾ£¬Æä"force-reset-password"¶Ëµã´æÔÚÉè¼ÆÈ±µã£¬ÔÊÐíÄäÃûÒªÇóÇÒδÑéÖ¤ÏÖÓÐÃÜÂë»òÖØÖÃÁîÅÆ£¬¹¥»÷Õß½öÐèÌṩָ±êÖÎÀíÔ±Óû§ÃûºÍÐÂÃÜÂë¼´¿ÉÖØÖÃÕË»§£¬´Ó¶øÆëÈ«»ñȡϵͳÖÎÀíȨÏÞ¡£¡£¡£watchTowr×êÑÐÈËÔ±ÒѰ䲼¸ÅÄîÑéÖ¤·ì϶ÀûÓ÷¨Ê½£¬Ö¤ÊµÎ´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÀûÓô˷ì϶½Ù³ÖÖÎÀíÔ±ÕË»§£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¬µ¼Ö¶ÔÊÜÓ°Ïì·þÎñÆ÷µÄÆëÈ«½ÚÖÆ¡£¡£¡£Shadowserverͨ¹ý°æ±¾¼ì²â·¢ÏÖ£¬ÃÀ¹ú£¨4100̨£©¡¢ÂíÀ´Î÷ÑÇ£¨449̨£©¡¢Ó¡¶È£¨188̨£©¡¢¼ÓÄôó£¨166̨£©ºÍÓ¢¹ú£¨146̨£©ÊÇÊÜÓ°Ïì×îÑÏÖØµÄ¹ú¶È£¬ÇÒÏÖʵ¹¥»÷³¢ÊÔÒѱ»¹Û²âµ½¡£¡£¡£
https://securityaffairs.com/187394/hacking/shadowserver-finds-6000-likely-vulnerable-smartermail-servers-exposed-online.html
5. ¶íÂÞ˹Delta¹«Ë¾ÔâÍøÂç¹¥»÷Ö¶àϵͳ̱»¾
1ÔÂ27ÈÕ£¬¶íÂÞ˹±¨¾¯Óë°²Õûϵͳ¹©¸øÉÌDelta¹«Ë¾½üÈÕÔâ·ê¡°´ó¹æÄ£¡£¡£¡¢Ðµ÷ÇÒ×éÖ¯çÇÃÜ¡±µÄÍøÂç¹¥»÷£¬µ¼ÖÂÆä¼ÒÍ¥¡¢ÆóÒµ¼°³µÁ¾°²Õûϵͳ·þÎñ´óÃæ»ýÖжϣ¬Òý·¢¿Í»§¿í·ºÍ¶Ëß¡£¡£¡£¸Ã¹«Ë¾Êг¡×ܼàÍßÁÐÀÎÚʲ¿Æ·òÔÚÊÓÆµÉêÃ÷ÖÐÖ¸³ö£¬¹¥»÷Ô´×Ô¡°µÐ¶ÔÍâ¹ú¡±£¬²¢Ì¹ÑÔÆä¼Ü¹¹¡°ÎÞ·¨ÕмܹúÍ⾫ÐIJ߶¯µÄ¹¥»÷¡±¡£¡£¡£½ØÖÁÖܶþ£¬DeltaÍøÕ¾¼°µç»°Ïß·ÈÔÎÞ·¨Ê¹Ó㬹«Ë¾±»ÆÈͨ¹ýÉ罻ýÌåVKontakteÓëÊýÍòÃû¿Í»§¹µÍ¨£¬²¢³Ðŵ¼¼ÊõÍŶÓÕýÈ«Á¦¸´Ôϵͳ£¬Ô¤¼ÆºÜ¿ìÈ«Ãæ¸´Ô¡£¡£¡£Õâ´Î¹¥»÷Ôì³É¶àÖØÏÖʵӰÏ죺£º£ºÓû§»ã±¨Æû³µ·ÀµÁ¾¯±¨ÎÞ·¨¹Ø±Õ¡¢³µÁ¾ÎÞ·¨½âËø¡¢Ô¶³ÌÆô¶¯ÏµÍ³¹ÊÕÏ¡¢³µÃŲ»²âËø±ÕÉõÖÁÐÐÊ»Öз¢Æð»úϨ»ð£»£»£»×¡Õ¬¼°Ã³Ò×¹¹Öþ¾¯±¨ÏµÍ³Ôò×Ô¶¯Çл»ÖÁ´¹Î£Ä£Ê½ÇÒÎÞ·¨¹Ø±Õ¡£¡£¡£¶íÓïýÌåBazaÔÚTelegramÉÏÅû¶£¬ÊÂÎñ²úÉúºóÓû§Ñ¸ËÙ·´À¡ÉÏÊöÎÊÌ⣬¶ø¡¶ÉúÒâÈ˱¨¡·Òà֤ʵ´æÔÚ´óÁìÓò¹ÊÕÏ¡£¡£¡£Ö»¹ÜDelta¼á³ÆÎÞ¿Í»§Êý¾Ýй¶£¬µ«Ò»¸ö×Գƹ¥»÷ÕßµÄTelegramƵµÀ°ä²¼Á˾ݳÆÔ̺¬±»µÁÊý¾ÝµÄ´æµµÎļþ£¬ÆäÕæÊµÐÔ¼°¹¥»÷ÕßÉí·ÝÉÐδ»ñ¶ÀÁ¢ºËʵ¡£¡£¡£
https://therecord.media/russia-delta-security-alarm-company-cyberattack
6. SoundCloudÔâShinyHunters¹¥»÷ÖÂ2980ÍòÓû§Êý¾Ýй¶
1ÔÂ27ÈÕ£¬ÒôƵÁ÷ýÌåÆ½Ì¨SoundCloud 2025Äê12ÔÂÔâ·ê´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Ó°Ï쳬¹ý2980ÍòÓû§ÕË»§£¬Éæ¼°µç×ÓÓʼþµØÖ·¡¢µØÀíµØÎ»¡¢ÐÕÃû¡¢Óû§Ãû¡¢Í·Ïñ¡¢·ÛË¿Êý¡¢¹Ø×¢ÕßÊý¼°²¿ÃŹú¶ÈÐÅÏ¢µÈ¹«¿ª×ÊÁÏ¡£¡£¡£SoundCloud³ÉÁ¢ÓÚ2007Ä꣬×÷ΪÒÕÊõ¼ÒÖÐÐÄÆ½Ì¨£¬ÏÖÕ¼ÓÐÈ«Çò4000ÍòÒÕÊõ¼ÒÉÏ´«µÄ³¬4ÒÚÊ׸èÇú¡£¡£¡£ÊÂÎñÆðÒòÓÚºÚ¿ÍÈëÇ֯䏍Öú·þÎñÒDZí°å£¬´¥·¢Î´¾ÊÚȨ½Ó¼û¡£¡£¡£SoundCloudÔÚ¼ì²âµ½Òì³£º£º£ºóÆô¶¯ÊÂÎñÏìÓ¦·¨Ê½£¬¾µ÷²éÈ·ÈÏÎÞÃô¸ÐÊý¾Ýй¶£¬½öÉæ¼°¹«¿ªÐ¡ÎÒ×ÊÁÏÐÅÏ¢¡£¡£¡£È»¶ø£¬ÀÕË÷ÍÅ»ïShinyHuntersÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢ÏòSoundCloudÌá³öÀÕË÷ÒªÇó£¬Í¬Ê±Í¨¹ýµç×ÓÓʼþ¶ÔÓû§¡¢Ô±¹¤¼°ºÏ×÷ͬ°é·¢ËÍɧÈÅÐÅÏ¢¡£¡£¡£1ÔÂ15ÈÕ£¬SoundCloud֤ʵ¹¥»÷Õß´æÔÚÀÕË÷ÐÐΪ£¬ÇÒÊý¾ÝÒѱ»¹«¿ª¡£¡£¡£Õâ´Îй¶ӰÏìÔ¼20%µÄSoundCloudÓû§£¬´ËǰÓû§Ôø»ã±¨ÎÞ·¨½Ó¼ûƽ̨¼°Ê¹ÓÃVPNʱ³öÏÖ403ÃýÎ󡣡£¡£Êý¾Ýй¶֪ͨ·þÎñHave I Been PwnedÅû¶£¬¹¥»÷Õ߳ɹ¦½«¹«¿ª×ÊÁÏÓëÓû§µç×ÓÓʼþµØÖ·¹ØÁª£¬Éæ¼°3000ÍòΨһµç×ÓÓʼþµØÖ·¡£¡£¡£
https://www.bleepingcomputer.com/news/security/have-i-been-pwned-soundcloud-data-breach-impacts-298-million-accounts/


¾©¹«Íø°²±¸11010802024551ºÅ