Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
Ðû²¼Ê±¼ä 2025-01-021. Ó¢¹úÉãÓ°¹«Ë¾DEphotoÔâ0mid16BºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬Êý°ÙÍò¿Í»§Êý¾Ý±»µÁ
1ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬ÃûΪ0mid16BµÄÍþвÐÐΪÕßÏòDataBreachesÍøÕ¾·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬³ÆÒÑÈëÇÖÓ¢¹úÉãÓ°¹«Ë¾DEphoto£¨ÍøÖ·ÎªDEphoto[.]biz£©¡£¡£¡£¡£¡£¡£¡£DEphotoרעÓÚѧУ¡¢ÌåÓý¡¢¾ãÀÖ²¿ºÍ»î¶¯ÉãÓ°¡£¡£¡£¡£¡£¡£¡£¾Ý0mid16BÉù³Æ£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ12ÔÂ25ÈÕ¹¥»÷ÁËDEphoto£¬£¬£¬£¬£¬£¬ÍµÈ¡ÁË55ÍòÓàÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢42ÍòÓà·Ý¶©µ¥ÏêÇ飨°üÀ¨24ÍòÓà·Ýº¬ÏêϸСÎÒ˽¼ÒÐÅÏ¢µÄ¶©µ¥£©¼°1.6ÍòÓàÌõ´¿Îı¾ÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÇÔÈ¡ÁËÊý°ÙGBµÄÕÕÆ¬µÈÊý¾Ý£¬£¬£¬£¬£¬£¬ÆäÖÐÉæ¼°¿Í»§×ÓÅ®µÄÕÕÆ¬¿â¡£¡£¡£¡£¡£¡£¡£0mid16BÌṩÁ˶àÕÅ´ÓDEphotoÍøÂçÖÐÌáÈ¡µÄ½ØÍ¼×÷Ϊ֤¾Ý£¬£¬£¬£¬£¬£¬ÏÔʾ±»»á¼ûµÄÊý¾Ý¿âÊý¾ÝÁè¼Ý12GB¡£¡£¡£¡£¡£¡£¡£0mid16BÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ¹¥»÷ºó֪ͨÁËDEphoto£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´ÔöÇ¿±£»£»£»£»£»£»¤»òÖ§¸¶ËùÒªÇóµÄ5ÍòÓ¢°÷Åâ³¥½ð£¬£¬£¬£¬£¬£¬Òò´ËÓÚ12ÔÂ29ÈÕÔÙ´ÎÌᳫ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¾ÝTrustPilotÉϵÄ̸ÂÛÏÔʾ£¬£¬£¬£¬£¬£¬DEphotoÒÑ×îÏÈÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍ֪ͨ£¬£¬£¬£¬£¬£¬µ«¿Í»§¶Ô¹«Ë¾µÄÊý¾Ý±£´æÕþ²ßÌåÏÖ²»Âú£¬£¬£¬£¬£¬£¬ÒÔΪÆä±£´æÊý¾Ýʱ¼ä¹ý³¤¡£¡£¡£¡£¡£¡£¡£DEphotoµÄÒþ˽Õþ²ßÒ³Ãæ×îºóÒ»´Î¸üÐÂÊÇÔÚ2018Äê5ÔÂGDPRÉúЧʱ¡£¡£¡£¡£¡£¡£¡£0mid16BÍþв½«³öÊÛ50Íò¿Í»§Êý¾Ý¿â£¬£¬£¬£¬£¬£¬²¢Ãâ·Ñй¶ÆäÓàÊý¾Ý£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúËûÃÇÊÇ·ñ»á¶ÒÏÖÕâÒ»ÔÊÐí¡£¡£¡£¡£¡£¡£¡£
https://databreaches.net/2025/01/01/hacked-on-christmas-dephoto-starts-notifying-customers-only-to-be-attacked-again/
2. EC2 Grouper£ºÊ¹ÓÃAWSƾ֤µÄÔÆ¹¥»÷Õß×éÖ¯¼°Æä¼ì²âÕ½ÂÔ
1ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬FortiGuardʵÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪEC2 GrouperµÄ¶à²ú¹¥»÷Õß×éÖ¯£¬£¬£¬£¬£¬£¬¸Ã×é֯ƵÈÔʹÓÃAWS¹¤¾ßºÍÊÜËðƾ֤¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Ö÷Ҫͨ¹ýÓëÓÐÓÃÕË»§°ó¶¨µÄ´úÂë´æ´¢¿â»ñȡƾ֤£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃAPI¾ÙÐÐÕì̽ºÍ×ÊÔ´½¨É裬£¬£¬£¬£¬£¬×èÖ¹ÊÖ¶¯»î¶¯¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÔÚ¶à¸ö¿Í»§ÇéÐÎÖз¢Ã÷ÁËÆäÆæÒìµÄÓû§ÊðÀíºÍÇå¾²×éÃüÃûÔ¼¶¨µÈÌØÕ÷£¬£¬£¬£¬£¬£¬µ«ÕâЩָ±ê¹ØÓÚÒ»ÖÂÐÔ¼ì²â¶øÑÔ²¢²»¿É¿¿£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß¿ÉÒÔÇáËÉÐÞ¸ÄÓû§ÊðÀí²¢Æ«ÀëÃüÃûÔ¼¶¨¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬Í¨Ì«¹ýÎöƾ֤й¶ºÍAPIʹÓõÈÐźţ¬£¬£¬£¬£¬£¬Çå¾²ÍŶӿÉÒÔÖÆ¶©¿É¿¿µÄ¼ì²âÕ½ÂÔÀ´µÖÓù´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£ÎªÁËÈ·±£Çå¾²£¬£¬£¬£¬£¬£¬×é֯ӦʹÓÃÔÆÇå¾²Ì¬ÊÆÖÎÀí£¨CSPM£©¹¤¾ßÒ»Á¬¼à¿ØºÍÆÀ¹ÀÔÆÇéÐεÄÇå¾²Ì¬ÊÆ£¬£¬£¬£¬£¬£¬²¢ÊµÑéÒì³£¼ì²âÊÖÒÕÀ´Ê¶±ðÔÆÇéÐÎÖеÄÒì³£ÐÐΪ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¶¥¼¶ºÚ¿Í×éÖ¯ÈçShinyHuntersºÍNemesis GroupÒ²Ô½À´Ô½¶àµÄʹÓÃAWS»ù´¡ÉèÊ©¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬ÕâÅú×¢ÔÆÇéÐÎÃæÁÙÒ»Á¬µÄÇå¾²Íþв¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/fortiguard-labs-ec2-grouper-aws-credential-exploits/
3. Â޵µºÖÝÒ½ÁƸ£ÀûϵͳÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬Êý¾Ýй¶ÖÁ°µÍø
12ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬Â޵µºÖÝÒ½Áƺ͸£ÀûÍýÏëϵͳÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÒѽ«²¿·ÖÇÔÈ¡µÄÎļþÐû²¼µ½°µÍøÉÏ¡£¡£¡£¡£¡£¡£¡£Öݳ¤µ¤Äá¶û¡¤Âó»ùÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÖÝÒ»Ö±ÔÚΪ´Ë×ö×¼±¸£¬£¬£¬£¬£¬£¬²¢ÒÑÖÆ¶©ÍâÁªÕ½ÂÔ£¬£¬£¬£¬£¬£¬ÃãÀø¿ÉÄÜÊÜÓ°ÏìµÄסÃñ±£»£»£»£»£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÄÄЩÎļþ±»Ð¹Â¶£¬£¬£¬£¬£¬£¬ITÍŶÓÕýÔÚÆÊÎö¡£¡£¡£¡£¡£¡£¡£ÈÏÕæ½¨ÉèºÍά»¤¸ÃϵͳµÄµÂÇÚ¹«Ë¾ÒÑÓëÍøÂç·¸·¨·Ö×ÓÈ¡µÃÁªÏµ£¬£¬£¬£¬£¬£¬²¢ÓëÖÝÕþ¸®ÏàÖúÁгöÊÜÓ°ÏìÖ°Ô±Ãûµ¥£¬£¬£¬£¬£¬£¬½«ÏòËûÃÇ·¢ËÍÐź¯Ö¸µ¼ÔõÑù»ñµÃÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÖÝÍýÏë°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏëµÈ¡£¡£¡£¡£¡£¡£¡£Âó»ù±Þ²ßסÃñ½ÓÄÉһϵÁв½·¥±£»£»£»£»£»£»¤²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬ÈçÁªÏµÐÅÓñ¨¸æ»ú¹¹¶³½áÐÅÓá¢ÉèÖÃڲƾ¯±¨¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬²¢Ð¡ÐÄÐéαÓʼþ¡¢µç»°»ò¶ÌÐÅ¡£¡£¡£¡£¡£¡£¡£Ö´·¨¹ÙÔ±ÕýÔÚÊÓ²ì´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬µ«×¥»ñÔðÈÎÈ˵ĿÉÄÜÐÔºÜС¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/rhode-islanders-data-was-leaked-from-a-cyberattack-on-state-health-benefits-website/
4. Õ¹ÏÖºÚ¿ÍÔõÑùÐ®ÖÆ 35 ¸ö Google Chrome À©Õ¹³ÌÐò
12ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÆðÕë¶ÔChromeä¯ÀÀÆ÷À©Õ¹³ÌÐò¿ª·¢Ö°Ô±µÄÍøÂç´¹Âڻ¿ËÈÕ±»ÆØ¹â£¬£¬£¬£¬£¬£¬¸Ã»î¶¯µ¼ÖÂÖÁÉÙ35¸öÀ©Õ¹³ÌÐò±»×¢ÈëÊý¾ÝÇÔÈ¡´úÂ룬£¬£¬£¬£¬£¬Ó°ÏìÔ¼260ÍòÓû§£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÍøÂçÇå¾²¹«Ë¾CyberhavenµÄÀ©Õ¹³ÌÐò¡£¡£¡£¡£¡£¡£¡£»£»£»£»£»£»î¶¯Ê¼ÓÚ2024Äê12ÔÂ5ÈÕ×óÓÒ£¬£¬£¬£¬£¬£¬µ«ÔçÆÚÏÂÁîºÍ¿ØÖÆ×ÓÓòÔçÔÚ2024Äê3Ô¾ÍÒѱ£´æ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍαװ³É¹È¸èµÄ´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬Éù³ÆÀ©Õ¹³ÌÐòÎ¥·´ÁËChromeÍøÉÏÓ¦ÓõêÕþ²ß£¬£¬£¬£¬£¬£¬ÓÕµ¼¿ª·¢Ö°Ô±µã»÷¶ñÒâÁ´½Ó²¢ÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò»á¼ûÆäChromeÍøÉÏÓ¦ÓõêÀ©Õ¹³ÌÐò¡£¡£¡£¡£¡£¡£¡£Ò»µ©»ñµÃ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¹¥»÷Õ߾ͻáÐÞ¸ÄÀ©Õ¹³ÌÐòÒÔ°üÀ¨¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬´ÓÓû§FacebookÕË»§ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ID¡¢»á¼ûÁîÅÆ¡¢ÕÊ»§ÐÅÏ¢¡¢¹ã¸æÕÊ»§ÐÅÏ¢ºÍÉÌÒµÕÊ»§µÈ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂ뻹Ìí¼ÓÊó±êµã»÷ÊÂÎñ¼àÌýÆ÷£¬£¬£¬£¬£¬£¬²éÕÒÓëFacebookË«ÒòËØÉí·ÝÑéÖ¤»òCAPTCHA»úÖÆÏà¹ØµÄ¶þάÂëͼÏñ£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý2FA±£»£»£»£»£»£»¤²¢Ð®ÖÆÕË»§¡£¡£¡£¡£¡£¡£¡£±»µÁÐÅÏ¢½«±»Ð¹Â¶µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬£¬ÓÃÓÚÖÖÖÖ¹¥»÷;¾¶£¬£¬£¬£¬£¬£¬ÈçÖ±½Ó´ÓÊܺ¦ÕßµÄÐÅÓöî¶ÈÖ§¸¶µ½¹¥»÷ÕßÕË»§¡¢ÔÚÉ罻ýÌåÆ½Ì¨ÉϾÙÐÐÐéαÐÅÏ¢»òÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬»ò½«»á¼ûȨÏÞ³öÊÛ¸øËûÈË¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/
5. GitHubÐéα¡°ÐÇÐÇ¡±ÂþÒ磺թÆÓë¶ñÒâÈí¼þ½èÊÆÈö²¥
12ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬GitHubÉϱ£´æÊ¹ÓÃÐéα¡°ÐÇÐÇ¡±µÄÎÊÌ⣬£¬£¬£¬£¬£¬ÕâÒ»ÎÊÌâ±»ÓÃÀ´Ìá¸ßթƺͶñÒâÈí¼þ·Ö·¢´æ´¢¿âµÄ×ÅÃû¶È£¬£¬£¬£¬£¬£¬½ø¶ø½Ó´¥¸ü¶àÓû§¡£¡£¡£¡£¡£¡£¡£ÐǺÅÔÚGitHubÉÏÀàËÆÓÚ¡°ÔÞ¡±°´Å¥£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÕ䲨´æ´¢¿â£¬£¬£¬£¬£¬£¬²¢×÷ΪȫÇòÅÅÃûϵͳµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬ÍƼöÏà¹ØÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£Ö®Ç°ÒÑÓжñÒâÈí¼þ´«ËÍЧÀÍʹÓÃÐéαÐÇÐÇÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Í¬Ê±·Ç¶ñÒâÏîĿҲ»áʹÓÃÐéαÐÇÐÇÌáÉý×ÅÃû¶È¡£¡£¡£¡£¡£¡£¡£Ò»ÏîÐÂÑо¿·¢Ã÷£¬£¬£¬£¬£¬£¬GitHubÉÏÓÐ450Íò¸öÐÇÐÇÒÉËÆÊǼٵ쬣¬£¬£¬£¬£¬Éæ¼°22,915¸ö´æ´¢¿âºÍ1,320,000¸öÕË»§¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÃûΪ¡°StarScout¡±µÄ¹¤¾ßÆÊÎöÊý¾Ý£¬£¬£¬£¬£¬£¬Ê¶±ð³ö¿ÉÒÉÐÇÐÇ£¬£¬£¬£¬£¬£¬²¢·¢Ã÷2024ÄêÐéαÐÇÐǻ¼¤Ôö¡£¡£¡£¡£¡£¡£¡£ÐéαÐÇÐǶÔGitHub¼°ÆäÓû§µÄÓ°ÏìÊÇ¶à·½ÃæµÄ£¬£¬£¬£¬£¬£¬»áÏ÷ÈõÈËÃÇ¶Ô¸ÃÆ½Ì¨µÄÐÅÈΡ£¡£¡£¡£¡£¡£¡£Óû§Ó¦ÉóÉ÷ÆÀ¹À´æ´¢¿âµÄ»î¶¯ºÍÖÊÁ¿£¬£¬£¬£¬£¬£¬²¢ÔÚ¿ÉÄܵÄÇéÐÎϼì²é´úÂ룬£¬£¬£¬£¬£¬ÒÔ×èÖ¹ÏÂÔØÓÕÆÐÔµÄÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬GitHubÉÐδ¶ÔBleepingComputerµÄѯÎÊ×÷³ö»ØÓ¦¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-31-million-fake-stars-on-github-projects-used-to-boost-rankings/
6. TRAC LabsÐû²¼LegionLoader¶ñÒâÈí¼þÉîÈ뱨¸æ
1ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬TRAC LabsÐû²¼ÁËÒ»·Ý¹ØÓÚLegionLoader¶ñÒâÈí¼þµÄÉîÈ뱨¸æ¡£¡£¡£¡£¡£¡£¡£LegionLoaderÊÇÒ»ÖÖ×Ô2019ÄêÊ״ηºÆð²¢Ò»Á¬ÑݱäµÄÖØ´óÏÂÔØÆ÷¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ò²±»×·×ÙΪSatacom¡¢RobotDropperºÍCurlyGate¡£¡£¡£¡£¡£¡£¡£ËüÖ÷ÒªÓÃC/C++±àд£¬£¬£¬£¬£¬£¬Äܹ»°²ÅÅһϵÁжñÒ⹤¾ß£¬£¬£¬£¬£¬£¬°üÀ¨¿É½«ÊÜѬȾä¯ÀÀÆ÷תΪHTTPÊðÀíµÄChromeÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬´Ó¶ø²¶»ñÆÁÄ»½ØÍ¼²¢ÖÎÀí¶ÔÃô¸ÐÕË»§µÄ»á¼û¡£¡£¡£¡£¡£¡£¡£×Ô2024Äê8ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬LegionLoaderÈö²¥Á˶àÖָ߼¶ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£¡£Ëüͨ¹ýÇý¶¯ÏÂÔØºÍÐéαװÖóÌÐò¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬£¬²¢½ÓÄɶà²ã¼ÓÃܺͻìÏýÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÉèÖø߶ȿɶ¨ÖÆ£¬£¬£¬£¬£¬£¬ÆäÓÐÓÃÔØºÉÕë¶Ô½ðÈÚÕË»§ºÍÃô¸ÐÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬ÈçChromeƾ֤ºÍÆäËû½âÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬LegionLoaderͨ¹ýAPI¹¥»÷ÒÉ»óÇå¾²¹¤¾ß£¬£¬£¬£¬£¬£¬²¢Ê¹ÓüÓÃÜͨѶÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÁªÏµ¡£¡£¡£¡£¡£¡£¡£TRAC LabsÌṩÁËÖÜÈ«µÄÈëÇÖÖ¸±êÁÐ±í£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú·ÀÓùÕßʶ±ðºÍ¼õÇáLegionLoaderѬȾ¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/from-fake-installers-to-stolen-credentials-decoding-the-legionloader-threat/


¾©¹«Íø°²±¸11010802024551ºÅ