PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼Òµ£ÐÄ£¬£¬£¬ £¬×¨¼ÒÍÆ²â»òÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2025-02-10

1. PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼Òµ£ÐÄ£¬£¬£¬ £¬×¨¼ÒÍÆ²â»òÔâÍøÂç¹¥»÷


2ÔÂ8ÈÕ£¬£¬£¬ £¬PlayStation Network ÔÚÈ«Çò¹æÄ£ÄÚÒṈ̃»¾½üÒ»Ì죬£¬£¬ £¬ÁîÖÚ¶àÍæ¼ÒÉî¸Ð¾ÚÉ¥¡£¡£¡£¡£¡£ÖÜËÄÍíÉÏ 11 µã×óÓÒ£¬£¬£¬ £¬´ó×ÚÓû§×îÏȱ¨¸æÐ§ÀÍ·ºÆðÎÊÌ⣬£¬£¬ £¬¶øË÷ÄáËäÈ»ÒÑÈ·ÈÏ´Ë´ÎÈ«ÇòÐÔ̱»¾£¬£¬£¬ £¬µ«×èÖ¹ÏÖÔÚÉÐδÌṩÈκÎÏêϸµÄÊÖÒÕÐÅÏ¢¡£¡£¡£¡£¡£¾Ý PlayStation on X Ðû²¼µÄһƪÎÄÕ¼°×´Ì¬Ò³ÃæÏÔʾ£¬£¬£¬ £¬¾­ÓÉÁè¼Ý 24 Сʱ£¬£¬£¬ £¬ÕË»§ÖÎÀí¡¢ÓÎÏ·ºÍÉç½»¹¦Ð§¡¢PlayStation Video ÒÔ¼° PlayStation ÊÐËÁµÈÏÕЩËùÓÐÔÚÏßЧÀ;ù±£´æÎÊÌâ¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñÒý·¢ÁËר¼ÒµÄÍÆ²â£¬£¬£¬ £¬Óп´·¨ÒÔΪÎÊÌâµÄȪԴ¿ÉÄÜÊÇÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÊÂʵÉÏ£¬£¬£¬ £¬PlayStation Network ÀúÊ·ÉÏÔø¶à´ÎÃæÁÙÖØ´óÖÐÖ¹£¬£¬£¬ £¬ÓÈÆäÊÇ 2011 ÄêÄǴκڿÍÈëÇÖ£¬£¬£¬ £¬µ¼ÖÂÓû§Êý¾Ýй¶²¢ÆÈʹЧÀÍ¹Ø±Õ 23 Ì죬£¬£¬ £¬Êý°ÙÍòÓû§Êý¾ÝÒò´Ë̻¶£¬£¬£¬ £¬Ë÷Äá×îÖÕÖ§¸¶ÁË 1500 ÍòÃÀÔªµÄÏ¢Õù½ð£¬£¬£¬ £¬²¢ÎªÓû§ÌṩÁËÒ»ÄêµÄÉí·Ý͵ÇÔ±£»£»£»£»¤¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬ £¬ÔÚ 2025 Äê 2 Ô 9 ÈյĸüÐÂÖУ¬£¬£¬ £¬×´Ì¬Ò³ÃæÏÔʾËùÓÐЧÀ;ùÒѻָ´Õý³£ÔËÐС£¡£¡£¡£¡£Ö»¹ÜЧÀÍÒѻָ´£¬£¬£¬ £¬µ«´Ë´ÎÊÂÎñÎÞÒÉÔÙ´ÎÒý·¢ÁËÍæ¼Ò¶Ô PlayStation Network Çå¾²ÐԵĵ£ÐÄ¡£¡£¡£¡£¡£


https://securityaffairs.com/174005/hacking/playstation-network-global-outage.html


2. ½ü280Íò¸öIPÌᳫ´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸ÍøÂç×°±¸Æ¾Ö¤


2ÔÂ8ÈÕ£¬£¬£¬ £¬½ü280Íò¸öIPµØµãÕý±»ÓÃÓÚÒ»³¡´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸°üÀ¨Palo Alto Networks¡¢IvantiºÍSonicWallÔÚÄڵĶàÖÖÍøÂç×°±¸¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷·½·¨Í¨¹ýÖØ¸´ÊµÑé²î±ðµÄÓû§ÃûºÍÃÜÂë×éºÏÀ´ÈëÇÖÕË»§»ò×°±¸£¬£¬£¬ £¬Ò»µ©Àֳɣ¬£¬£¬ £¬¹¥»÷Õß¼´¿É¿ØÖÆ×°±¸»òÉøÍ¸ÍøÂç¡£¡£¡£¡£¡£¾ÝShadowserver FoundationÍþв¼à¿ØÆ½Ì¨±¨¸æ£¬£¬£¬ £¬´ËÀ๥»÷×ÔÉÏÔÂÆðÒ»Á¬ÖÁ½ñ£¬£¬£¬ £¬ÖðÈÕ¶¯Óýü280Íò¸öÔ´IPµØµã£¬£¬£¬ £¬ÆäÖаÍÎ÷Õ¼±È×î¸ß£¬£¬£¬ £¬Æä´ÎÊÇÍÁ¶úÆä¡¢¶íÂÞ˹¡¢°¢¸ùÍ¢¡¢Ä¦Âå¸çºÍÄ«Î÷¸çµÈ¹ú¡£¡£¡£¡£¡£Êܹ¥»÷µÄ×°±¸¶àΪ·À»ðǽ¡¢VPN¡¢Íø¹ØµÈ±ßÑØÇå¾²×°±¸£¬£¬£¬ £¬ÇÒ¹¥»÷Ô´Í·¶àΪMikroTik¡¢»ªÎª¡¢Ë¼¿Æ¡¢BoaºÍÖÐÐËµÈÆ·ÅƵÄ·ÓÉÆ÷¼°ÎïÁªÍø×°±¸¡£¡£¡£¡£¡£ShadowserverÖ¸³ö£¬£¬£¬ £¬¹¥»÷IPÊèÉ¢ÓÚÖÚ¶àÍøÂçºÍ×ÔÖÎϵͳ£¬£¬£¬ £¬»òÓë½©Ê¬ÍøÂ缰סլÊðÀíÍøÂçÓйØ¡£¡£¡£¡£¡£ÕâЩÊðÀíͨ¹ý×¡Õ¬ÍøÂç·ÓÉÁ÷Á¿£¬£¬£¬ £¬Î±×°³ÉͨË×¼ÒÍ¥Óû§£¬£¬£¬ £¬ÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¡£Îª±£»£»£»£»¤±ßÑØ×°±¸£¬£¬£¬ £¬½¨Òé¸ü¸ÄĬÈÏÃÜÂ롢ʵÑé¶àÒòËØÉí·ÝÑéÖ¤¡¢ÉèÖÃÊÜÐÅÈÎIPÔÊÐíÁÐ±í¡¢½ûÓ÷ÇÐëÒªWebÖÎÀí½çÃæ£¬£¬£¬ £¬²¢ÊµÊ±¸üй̼þºÍÇå¾²²¹¶¡¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/


3. 7-ZipÁãÈÕÎó²î£º¶íÂÞ˹ºÚ¿ÍʹÓÃMotWÈÆ¹ýÊÖÒÕ·¢¶¯¹¥»÷


2ÔÂ4ÈÕ£¬£¬£¬ £¬×Ô2024Äê9ÔÂÆð£¬£¬£¬ £¬¶íÂÞ˹ºÚ¿ÍʹÓÃ7-ZipÖеÄÁãÈÕÎó²îCVE-2025-0411£¬£¬£¬ £¬ÀÖ³ÉÈÆ¹ýÁËWindowsµÄMark of the Web (MotW)Çå¾²¹¦Ð§£¬£¬£¬ £¬Õë¶ÔÎÚ¿ËÀ¼Õþ¸®ºÍ˽ÈË×éÖ¯·¢¶¯ÁËSmokeLoader¶ñÒâÈí¼þ¹¥»÷¡£¡£¡£¡£¡£MotW¹¦Ð§Ô­±¾ÐÄÔÚÖÒÑÔÓû§¼´½«Ö´ÐеÄÎļþȪԴ²»¿ÉÐÅ£¬£¬£¬ £¬²¢ÒªÇóÈ·ÈÏ£¬£¬£¬ £¬µ«ºÚ¿Íͨ¹ýË«ÖØ´æµµÎļþºÍͬÐÎÎÄ×ÖÊÖÒÕ£¬£¬£¬ £¬Ê¹¶ñÒâÎļþÔÚ²»´¥·¢ÖÒÑÔµÄÇéÐÎÏÂÖ´ÐС£¡£¡£¡£¡£ÕâÐ©ÌØÖÆµÄ7-ZipÎļþͨ¹ý´¹ÂÚÓʼþ·¢Ë͸øÄ¿µÄ£¬£¬£¬ £¬Ê¹ÓõÄÊDZ»ÈëÇÖµÄÎÚ¿ËÀ¼Õþ¸®ÕË»§£¬£¬£¬ £¬ÒÔÈÆ¹ýÇå¾²¹ýÂËÆ÷¡£¡£¡£¡£¡£Ö»¹Ü7-ZipÔÚ2022ÄêÌí¼ÓÁ˶ÔMotWµÄÖ§³Ö£¬£¬£¬ £¬µ«CVE-2025-0411Îó²îʹµÃMotW±ê¼Ç²»»áÈö²¥µ½ÄÚ²¿µµ°¸ÄÚÈÝ£¬£¬£¬ £¬´Ó¶øÔÊÐí¶ñÒâ¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþÖ±½ÓÆô¶¯¡£¡£¡£¡£¡£×îºó£¬£¬£¬ £¬ÕâЩ¹¥»÷´¥·¢ÁËSmokeLoader¸ºÔØ£¬£¬£¬ £¬Ò»ÖÖÓÃÓÚ×°ÖÃÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ä¾Âí¡¢ÀÕË÷Èí¼þ»ò½¨ÉèºóÃŵĶñÒâÈí¼þͶ·ÅÆ÷¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼¹ú¼ÒÐÐÕþ¾Ö¡¢Ôú²¨ÂÞÈÈÆû³µÖÆÔì³§µÈ¶à¸öÒªº¦²¿·Ö¡£¡£¡£¡£¡£Ö»¹ÜÇ÷ÊÆ¿Æ¼¼ÔÚ·¢Ã÷Îó²îºóÒÑÓë7-Zip¿ª·¢Ö°Ô±·ÖÏí¿´·¨ÑéÖ¤Îó²î£¬£¬£¬ £¬²¢Í¨¹ý2024Äê11ÔÂ30ÈÕÐû²¼µÄ24.09°æ±¾²¹¶¡½â¾öÁËΣº¦£¬£¬£¬ £¬µ«ÓÉÓÚ7-Zipȱ·¦×Ô¶¯¸üй¦Ð§£¬£¬£¬ £¬Óû§ÈÔÐèÊÖ¶¯ÏÂÔØ×îа汾ÒÔÈ·±£Çå¾²¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/7-zip-motw-bypass-exploited-in-zero-day-attacks-against-ukraine/


4. ³¯ÏÊ¡°FlexibleFerret¡±¶ñÒâÈí¼þ£ºÊ¹ÓÃÐéαZoomºÍÇóÖ°Õ©Æ­¹¥»÷macOSÓû§


2ÔÂ4ÈÕ£¬£¬£¬ £¬³¯ÏʶñÒâÈí¼þ¡°FlexibleFerret¡±Õë¶ÔmacOS×°±¸ºÍ¿ª·¢Ö°Ô±ÌᳫÁËÒ»³¡ÆÕ±éµÄ¹¥»÷¡£¡£¡£¡£¡£Õâ¿î¶ñÒâÈí¼þͨ¹ýÐéαµÄZoomÓ¦ÓóÌÐò¡¢ÇóÖ°Õ©Æ­ºÍ¹ýʧ±¨¸æÌ¸ÂÛµÈÊÖ¶ÎÓÕÆ­Óû§×°Öᣡ£¡£¡£¡£ËüʹÓýÆÕ©µÄÉç»á¹¤³ÌѧսÂÔ£¬£¬£¬ £¬ÈçÐéαµÄÇóÖ°ÃæÊÔÁ÷³Ì£¬£¬£¬ £¬·¢ËÍ¿´ËÆÒªÇóÈí¼þ¸üеÄÁ´½Ó£¬£¬£¬ £¬ÓÕÆ­Ä¿µÄÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Ö»¹ÜApple×î½üÔöÇ¿ÁËÆäXProtectÇå¾²¹¤¾ßÒÔÓ¦¶Ô´ËÀàÍþв£¬£¬£¬ £¬µ«FlexibleFerretÔÚ×î³õʱÈÔδ±»·¢Ã÷¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ°üÀ¨Ò»¸ödropper£¬£¬£¬ £¬½«¶ñÒâÈí¼þ×°Öõ½ÏµÍ³ÖУ¬£¬£¬ £¬²¢½¨ÉèαÔìµÄZoomÓ¦ÓóÌÐòÉñÃØÅþÁ¬µ½¿ÉÒÉÓò¡£¡£¡£¡£¡£Ëü»¹»áÏÔʾÐéαµÄ¹ýʧÐÅÏ¢ÒÔÓÕÆ­Êܺ¦Õߣ¬£¬£¬ £¬²¢ÔÚºǫ́×ÔÐÐ×°Ö㬣¬£¬ £¬½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬ºÚ¿Í»¹Ö±½ÓÃé×¼¿ª·¢Ö°Ô±£¬£¬£¬ £¬Ê¹ÓÃÐéαµÄ¹ýʧ±¨¸æ»òGitHubµÈÍøÕ¾ÉϵÄ̸ÂÛÀ´ÓÕÆ­ËûÃÇÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Ç徲ר¼ÒÒÑ·¢Ã÷¸ü¶àÏà¹ØµÄ¶ñÒâÈí¼þÑù±¾£¬£¬£¬ £¬²¢Ö¸³ö¹¥»÷ÕßÒѸü¸Ä´ÎÒªÔªËØÒÔÈÆ¹ý±£»£»£»£»¤²½·¥¡£¡£¡£¡£¡£ÕⳡһÁ¬¶ø»îÔ¾µÄ¹¥»÷»î¶¯Åú×¢£¬£¬£¬ £¬ÍþвÐÐΪÕßÕýÔÚÒ»Ö±¸Ä±äÒªÁìÒÔ×èÖ¹±»·¢Ã÷¡£¡£¡£¡£¡£


https://hackread.com/north-korea-flexibleferret-malware-macos-fake-zoom-job-scams/


5. ADFSÍøÂç´¹ÂÚ¹¥»÷£º¹¥»÷Õßð³äITÍŶÓÇÔȡƾ֤


2ÔÂ5ÈÕ£¬£¬£¬ £¬Abnormal Security·¢Ã÷ÁËÒ»ÆðÕë¶Ô½ÌÓý¡¢Ò½ÁƱ£½¡ºÍÕþ¸®×éÖ¯µÄÍøÂç´¹Âڻ£¬£¬£¬ £¬¸Ã»î¶¯ÒÔMicrosoft Active DirectoryÁªºÏÉí·ÝÑé֤ЧÀÍ£¨ADFS£©ÎªÄ¿µÄ£¬£¬£¬ £¬Í¨¹ýÓÕÆ­ÐÔµÇÂ¼Ò³ÃæÇÔÈ¡Óû§Æ¾Ö¤²¢Èƹý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»¤¡£¡£¡£¡£¡£¹¥»÷ÕßðûÊÕ˾ITÍŶӷ¢ËÍÓʼþ£¬£¬£¬ £¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÓëÕæÊµADFSµÇÂ¼Ò³ÃæÒ»ÖµĴ¹ÂÚÍøÕ¾£¬£¬£¬ £¬²¢ÒªÇóÊäÈëÓû§Ãû¡¢ÃÜÂë¼°MFA´úÂë»òÅú×¼ÍÆËÍ֪ͨ¡£¡£¡£¡£¡£ÕâЩ¹¥»÷Ö¼ÔÚ»ñÈ¡¹«Ë¾µç×ÓÓʼþÕË»§»á¼ûȨÏÞ£¬£¬£¬ £¬½ø¶ø¾ÙÐо­¼ÃÄîÍ·µÄ¹¥»÷£¬£¬£¬ £¬ÈçÉÌÒµµç×ÓÓʼþй¶£¨BEC£©¡£¡£¡£¡£¡£Abnormal SecurityÖ¸³ö£¬£¬£¬ £¬¹¥»÷ÕßʹÓÃÁË˽ÈËVPNÒþ²ØÎ»Ö㬣¬£¬ £¬²¢·ÖÅɸü¿¿½ü×éÖ¯µÄIPµØµã¡£¡£¡£¡£¡£Ö»¹ÜÕâЩ¹¥»÷²»»áÖ±½ÓÆÆËðADFS£¬£¬£¬ £¬µ«Ê¹ÓÃÓû§¶ÔÊìϤµÇ¼Á÷³ÌµÄÐÅÈΣ¬£¬£¬ £¬Ç±ÔÚÓÐÓÃÐÔÈÔÈ»ÒýÈËעĿ¡£¡£¡£¡£¡£Abnormal½¨Òé×é֯Ǩáãµ½¸üÇå¾²µÄ½â¾ö¼Æ»®£¬£¬£¬ £¬ÈçMicrosoft Entra£¬£¬£¬ £¬²¢ÒýÈëÌØÁíÍâµç×ÓÓʼþ¹ýÂËÆ÷ºÍÒì³£»£»£»£»î¶¯¼ì²â»úÖÆ£¬£¬£¬ £¬ÒÔ¾¡Ôç×èÖ¹ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£


https://bleepingcomputer.com/news/security/hackers-spoof-microsoft-adfs-login-pages-to-steal-credentials/


6. Ó¡¶ÈÒøÐÐÓû§ÔâÓö´ó¹æÄ£Òƶ¯¶ñÒâÈí¼þ¹¥»÷


2ÔÂ5ÈÕ£¬£¬£¬ £¬zLabsÑо¿ÍÅ¶Ó½ÒÆÆÁËÒ»ÏîÕë¶ÔÓ¡¶ÈÒøÐÐÓû§µÄÒÆ¶¯¶ñÒâÈí¼þ»î¶¯£¬£¬£¬ £¬Éæ¼°½ü900¸ö¶ñÒâÈí¼þÑù±¾£¬£¬£¬ £¬Ö÷ÒªÕë¶ÔAndroid×°±¸¡£¡£¡£¡£¡£ÕâЩÑù±¾¾ßÓÐÏàͬµÄ´úÂë½á¹¹¡¢Óû§½çÃæºÍÓ¦ÓóÌÐò»Õ±ê£¬£¬£¬ £¬Åú×¢Óɼòµ¥ÍþвÐÐΪÕßÌᳫ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÇÔȡһ´ÎÐÔÃÜÂ룬£¬£¬ £¬»¹Ê¹ÓÃʵʱµç»°ºÅÂëÖØ¶¨Ïò¶ÌÐÅ£¬£¬£¬ £¬ÁôÏ¿É×·×ÙµÄÊý×Ö×Ù¼£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÁè¼Ý222¸ö¿É»á¼ûµÄFirebase´æ´¢Í°£¬£¬£¬ £¬°üÀ¨Ô¼50,000ÃûÓû§µÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬ÈçÒøÐÐÏêÇé¡¢ÐÅÓÿ¨ÐÅÏ¢ºÍÉí·Ý֤ʵ¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ýWhatsAppÈö²¥£¬£¬£¬ £¬Î±×°³ÉÕýµ±Ó¦ÓÃÓÕÆ­Óû§Ð¹Â¶²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ¼Ò×åÓÐÈý¸ö±äÌ壺¶ÌÐÅת·¢¡¢Firebase-ExlysisºÍ»ìÏý¡£¡£¡£¡£¡£Firebase¶Ëµãȱ·¦Éí·ÝÑéÖ¤»úÖÆ£¬£¬£¬ £¬µ¼ÖÂÊý¾Ý¿É¹ûÕæ»á¼û£¬£¬£¬ £¬Ð¹Â¶µÄƾ֤ÔÊÐíδ¾­ÊÚȨ»á¼ûÖÎÀíÒDZí°å¡£¡£¡£¡£¡£¹¥»÷Õߵ绰ºÅÂëÖ÷Ҫע²áÓÚÓ¡¶ÈÌØ¶¨µØÇø¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÒøÐкÍÕþ¸®ÐÅÓþ£¬£¬£¬ £¬Á¬ÏµÆ¾Ö¤ÍµÇÔ¡¢¶ÌÐÅ×èµ²ºÍÍøÂç´¹ÂÚÊÖÒÕÖ´ÐÐδ¾­ÊÚȨÉúÒâ¡£¡£¡£¡£¡£


https://securityboulevard.com/2025/02/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/