Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
Ðû²¼Ê±¼ä 2025-01-021. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
1ÔÂ1ÈÕ£¬£¬£¬£¬£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒÑÔ£¬£¬£¬£¬£¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£©¡£¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ°¡£¡£¾Ý0mid16BÉù³Æ£¬£¬£¬£¬£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto£¬£¬£¬£¬£¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÀ¨24ÍòÓà·Ýº¬ÏêϸСÎÒ˽¼ÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý£¬£¬£¬£¬£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â¡£¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý£¬£¬£¬£¬£¬ÏÔʾ±»»á¼ûµÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB¡£¡£0mid16BÌåÏÖ£¬£¬£¬£¬£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´ÔöÇ¿±£»£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð£¬£¬£¬£¬£¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷¡£¡£¾ÝTrustPilotÉϵÄ̸ÂÛÏÔʾ£¬£¬£¬£¬£¬DEphotoÒÑ×îÏÈÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ£¬£¬£¬£¬£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£´æÕþ²ßÌåÏÖ²»Âú£¬£¬£¬£¬£¬ÒÔΪÆä±£´æÊý¾Ýʱ¼ä¹ý³¤¡£¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â£¬£¬£¬£¬£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý£¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí¡£¡£
https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/
2. EC2 Grouper£ºÊ¹ÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½ÂÔ
1ÔÂ1ÈÕ£¬£¬£¬£¬£¬FortiGuardʵÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯£¬£¬£¬£¬£¬¸Ã×é֯ƵÈÔʹÓÃAWS¹¤¾ßºÍÊÜËðƾ֤¾ÙÐй¥»÷¡£¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐÓÃÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤£¬£¬£¬£¬£¬²¢Ê¹ÓÃAPI¾ÙÐÐÕì̽ºÍ×ÊÔ´½¨É裬£¬£¬£¬£¬×èÖ¹ÊÖ¶¯»î¶¯¡£¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§ÇéÐÎÖз¢Ã÷ÁËÆäÆæÒìµÄÓû§ÊðÀíºÍÇå¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷£¬£¬£¬£¬£¬µ«ÕâЩָ±ê¹ØÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»¿É¿¿£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬Í¨Ì«¹ýÎöƾ֤й¶ºÍAPIʹÓõÈÐźţ¬£¬£¬£¬£¬Çå¾²ÍŶӿÉÒÔÖÆ¶©¿É¿¿µÄ¼ì²âÕ½ÂÔÀ´µÖÓù´ËÀ๥»÷¡£¡£ÎªÁËÈ·±£Çå¾²£¬£¬£¬£¬£¬×é֯ӦʹÓÃÔÆÇå¾²Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ßÒ»Á¬¼à¿ØºÍÆÀ¹ÀÔÆÇéÐεÄÇå¾²Ì¬ÊÆ£¬£¬£¬£¬£¬²¢ÊµÑéÒì³£¼ì²âÊÖÒÕÀ´Ê¶±ðÔÆÇéÐÎÖеÄÒì³£ÐÐΪ¡£¡£±ðµÄ£¬£¬£¬£¬£¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄʹÓÃAWS»ù´¡ÉèÊ©¾ÙÐй¥»÷£¬£¬£¬£¬£¬ÕâÅú×¢ÔÆÇéÐÎÃæÁÙÒ»Á¬µÄÇå¾²Íþв¡£¡£
https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/
3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬Êý¾Ýй¶ÖÁ°µÍø
12ÔÂ31ÈÕ£¬£¬£¬£¬£¬Â޵µºÖÝÒ½Áƺ͸£ÀûÍýÏëϵͳÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÒѽ«²¿·ÖÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ¡£¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ£¬£¬£¬£¬£¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸£¬£¬£¬£¬£¬²¢ÒÑÖÆ¶©ÍâÁªÕ½ÂÔ£¬£¬£¬£¬£¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄסÃñ±£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£ÏÖÔÚÉв»ÇåÎúÄÄЩÎļþ±»Ð¹Â¶£¬£¬£¬£¬£¬ITÍŶÓÕýÔÚÆÊÎö¡£¡£ÈÏÕæ½¨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸·¨·Ö×ÓÈ¡µÃÁªÏµ£¬£¬£¬£¬£¬²¢ÓëÖÝÕþ¸®ÏàÖúÁгöÊÜÓ°ÏìÖ°Ô±Ãûµ¥£¬£¬£¬£¬£¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÔõÑù»ñµÃÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£ÊÜÓ°ÏìµÄÖÝÍýÏë°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏëµÈ¡£¡£Âó»ù±Þ²ßסÃñ½ÓÄÉһϵÁв½·¥±£»£»¤²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬ÈçÁªÏµÐÅÓñ¨¸æ»ú¹¹¶³½áÐÅÓá¢ÉèÖÃڲƾ¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬²¢Ð¡ÐÄÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС¡£¡£
https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/
4. Õ¹ÏÖºÚ¿ÍÔõÑùÐ®ÖÆ 35 ¸ö Google Chrome À©Õ¹³ÌÐò
12ÔÂ31ÈÕ£¬£¬£¬£¬£¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹³ÌÐò¿ª·¢Ö°Ô±µÄÍøÂç´¹Âڻ¿ËÈÕ±»ÆØ¹â£¬£¬£¬£¬£¬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹³ÌÐò±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂ룬£¬£¬£¬£¬Ó°ÏìÔ¼260ÍòÓû§£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÍøÂçÇå¾²¹«Ë¾CyberhavenµÄÀ©Õ¹³ÌÐò¡£¡£»£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ£¬£¬£¬£¬£¬µ«ÔçÆÚÏÂÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒѱ£´æ¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄ´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬Éù³ÆÀ©Õ¹³ÌÐòÎ¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß£¬£¬£¬£¬£¬ÓÕµ¼¿ª·¢Ö°Ô±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò»á¼ûÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹³ÌÐò¡£¡£Ò»µ©»ñµÃ»á¼ûȨÏÞ£¬£¬£¬£¬£¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹³ÌÐòÒÔ°üÀ¨¶ñÒâÎļþ£¬£¬£¬£¬£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬°üÀ¨ID¡¢»á¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ¡£¡£±ðµÄ£¬£¬£¬£¬£¬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ÊÂÎñ¼àÌýÆ÷£¬£¬£¬£¬£¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ£¬£¬£¬£¬£¬ÒÔÈÆ¹ý2FA±£»£»¤²¢Ð®ÖÆÕË»§¡£¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶£¬£¬£¬£¬£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϾÙÐÐÐéαÐÅÏ¢»òÍøÂç´¹Âڻ£¬£¬£¬£¬£¬»ò½«»á¼ûȨÏÞ³öÊÛ¸øËûÈË¡£¡£
https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/
5. GitHubÐéα¡°ÐÇÐÇ¡±ÂþÒ磺թÆÓë¶ñÒâÈí¼þ½èÊÆÈö²¥
12ÔÂ31ÈÕ£¬£¬£¬£¬£¬GitHubÉϱ£´æÊ¹ÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌ⣬£¬£¬£¬£¬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßթƺͶñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ×ÅÃû¶È£¬£¬£¬£¬£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥£¬£¬£¬£¬£¬¿ÉÓÃÓÚÕ䲨´æ´¢¿â£¬£¬£¬£¬£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿·Ö£¬£¬£¬£¬£¬ÍƼöÏà¹ØÄÚÈÝ¡£¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍЧÀÍʹÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý×ÅÃû¶È¡£¡£Ò»ÏîÐÂÑо¿·¢Ã÷£¬£¬£¬£¬£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵ쬣¬£¬£¬£¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ßÆÊÎöÊý¾Ý£¬£¬£¬£¬£¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ£¬£¬£¬£¬£¬²¢·¢Ã÷2024ÄêÐéαÐÇÐǻ¼¤Ôö¡£¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ£¬£¬£¬£¬£¬»áÏ÷ÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÈΡ£¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿£¬£¬£¬£¬£¬²¢ÔÚ¿ÉÄܵÄÇéÐÎϼì²é´úÂ룬£¬£¬£¬£¬ÒÔ×èÖ¹ÏÂÔØÓÕÆÐÔµÄÈí¼þ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£¡£
https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/
6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈ뱨¸æ
1ÔÂ1ÈÕ£¬£¬£¬£¬£¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈ뱨¸æ¡£¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Ò»Á¬ÑݱäµÄÖØ´óÏÂÔØÆ÷¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£¡£ËüÖ÷ÒªÓÃC/C++±àд£¬£¬£¬£¬£¬Äܹ»°²ÅÅһϵÁжñÒ⹤¾ß£¬£¬£¬£¬£¬°üÀ¨¿É½«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ»á¼û¡£¡£×Ô2024Äê8ÔÂÒÔÀ´£¬£¬£¬£¬£¬LegionLoaderÈö²¥Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖóÌÐò¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏýÊÖÒÕÌӱܼì²â¡£¡£¸Ã¶ñÒâÈí¼þµÄÉèÖø߶ȿɶ¨ÖÆ£¬£¬£¬£¬£¬ÆäÓÐÓÃÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý£¬£¬£¬£¬£¬ÈçChromeƾ֤ºÍÆäËû½âÃÜÃÜÔ¿¡£¡£±ðµÄ£¬£¬£¬£¬£¬LegionLoaderͨ¹ýAPI¹¥»÷ÒÉ»óÇå¾²¹¤¾ß£¬£¬£¬£¬£¬²¢Ê¹ÓüÓÃÜͨѶÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÁªÏµ¡£¡£TRAC LabsÌṩÁËÖÜÈ«µÄÈëÇÖÖ¸±êÁÐ±í£¬£¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ¡£¡£
https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/