СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ

Ðû²¼Ê±¼ä 2026-01-13

1. СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ


1ÔÂ12ÈÕ£¬£¬£¬ÒÑÍùÁù¸öÔ£¬£¬£¬ºÚ¿ÍƵÈÔʹÓÃä¯ÀÀÆ÷ÄÚä¯ÀÀÆ÷£¨BitB£©ÊÖÒÕ¶ÔFacebookÓû§Ìᳫ´¹ÂÚ¹¥»÷£¬£¬£¬¸ÃÊÖÒÕÓÉÇå¾²Ñо¿Ô±mr.d0xÓÚ2022Ä꿪·¢£¬£¬£¬ºó±»ÍøÂç·¸·¨·Ö×ÓÀ©Õ¹ÖÁSteamµÈƽ̨¡£¡£¡£¡£TrellixÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬¹¥»÷Õßͨ¹ýαÔì״ʦÊÂÎñËù֪ͨ¡¢°æÈ¨ÇÖȨÖÒÑÔ»òMetaÇå¾²ÌáÐÑ£¬£¬£¬ÓÕµ¼Óû§µã»÷°üÀ¨ÐéαµÇ¼±íµ¥µÄµ¯³ö´°¿Ú¡£¡£¡£¡£´ËÀà´°¿ÚʹÓÃiframeÊÖÒÕÄ£Äâ¹Ù·½ÈÏÖ¤½çÃæ£¬£¬£¬²¢Í¨¹ý×Ô½ç˵´°¿ÚÎÊÌâºÍURLÔöÇ¿ÓÕÆ­ÐÔ£¬£¬£¬ÉõÖÁ¼ÓÈëËõ¶ÌURLºÍÐéαMetaCAPTCHAÒ³ÃæÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬Êܺ¦Õß»áÔÚ¹¥»÷Õß¿ØÖƵÄÍøÒ³ÉÏ¿´µ½¿´ËÆÕýµ±µÄä¯ÀÀÆ÷µ¯³ö´°¿Ú£¬£¬£¬ÒªÇóÊäÈëFacebookƾ֤¡£¡£¡£¡£ÓÉÓÚiframeÓëµ×²ã´°¿Ú°ó¶¨£¬£¬£¬Óû§ÎÞ·¨½«ÆäÍϳöä¯ÀÀÆ÷´°¿Ú£¬£¬£¬ÕâÊÇʶ±ðBitB¹¥»÷µÄÒªº¦ÌØÕ÷¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬´ó×Ú´¹ÂÚÒ³ÃæÍйÜÔÚNetlify¡¢VercelµÈÕýµ±ÔÆÆ½Ì¨£¬£¬£¬Î±×°³ÉMetaÒþ˽ÖÐÐÄ»òÉêËß±íµ¥£¬£¬£¬ÍøÂçÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£Óë¹Å°å´¹ÂÚÏà±È£¬£¬£¬ÕâÖÖÊÖ·¨Í¨¹ýÀÄÓÃÊÜÐÅÈεĻù´¡ÉèÊ©ÈÆ¹ýÇå¾²¹ýÂËÆ÷£¬£¬£¬ÓªÔìÐéαÇå¾²¸Ð¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/


2. CISA½ôÆÈÏÂÁîÐÞ²¹Òѱ»Ê¹ÓõÄGogs¸ßΣÎó²î


1ÔÂ12ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·ÖÔÚ2026Äê2ÔÂ2ÈÕǰÐÞ²¹Gogs¸ßΣÎó²îCVE-2025-8110¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚPutContents APIµÄ·¾¶±éÀúȱÏÝ£¬£¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷Õßͨ¹ý·ûºÅÁ´½ÓÁýÕÖ´æ´¢¿âÍⲿÎļþ£¬£¬£¬Èƹý´ËǰÐÞ¸´µÄCVE-2024-55947±£»£»£»¤²½·¥£¬£¬£¬½ø¶øÍ¨¹ýÐÞ¸ÄGitÉèÖÃÎļþ£¨ÈçsshCommand£©Ö´ÐÐí§ÒâÏÂÁ£¬£¬×é³ÉÁãÈÕ¹¥»÷Σº¦¡£¡£¡£¡£Gogs×÷ΪGoÓïÑÔ±àдµÄÇáÁ¿¼¶GitЧÀÍÌæ»»¼Æ»®£¬£¬£¬³£ÓÃÓÚÔ¶³ÌЭ×÷£¬£¬£¬µ«Æä¿ª·ÅÐÔʹÆä³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£Wiz ResearchÔÚ7ÔÂÊÓ²ì¿Í»§GogsЧÀÍÆ÷¶ñÒâÈí¼þѬȾʱ·¢Ã÷¸ÃÎó²î£¬£¬£¬²¢ÓÚ7ÔÂ17ÈÕ±¨¸æ£¬£¬£¬10ÔÂ30ÈÕ»ñGogsÈ·ÈÏ£¬£¬£¬ÉÏÖÜÐû²¼²¹¶¡¡£¡£¡£¡£È»¶ø£¬£¬£¬11ÔÂ1ÈÕ¼´·ºÆðµÚ¶þ²¨ÁãÈÕ¹¥»÷¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬³¬1400̨GogsЧÀÍÆ÷̻¶ÓÚ»¥ÁªÍø£¬£¬£¬ÆäÖÐ1250̨ÈÔ¿É»á¼û£¬£¬£¬700¸öʵÀýÏÔʾ±»ÈëÇÖ¼£Ï󡣡£¡£¡£CISAÒѽ«CVE-2025-8110ÁÐÈë¡°ÒÑʹÓÃÎó²îĿ¼¡±£¬£¬£¬Ç¿µ÷´ËÀàÎó²îÊǶñÒâÍøÂç¹¥»÷Õߵij£ÓÃ;¾¶£¬£¬£¬´ºÁª°î»ú¹¹×é³ÉÖØ´óΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/


3. TargetµÄ¿ª·¢Ð§ÀÍÆ÷ÔÚºÚ¿ÍÉù³ÆÇÔȡԴ´úÂëºóÀëÏß


1ÔÂ12ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ºÚ¿ÍÔÚGiteaƽ̨Ðû²¼¶à¸öÒÉËÆTarget¹«Ë¾ÄÚ²¿´úÂë¿âµÄÑù±¾£¬£¬£¬²¢Éù³ÆÕýͨ¹ýµØÏÂÂÛ̳³öÊÛÍêÕûÊý¾Ý¼¯¡£¡£¡£¡£ÊÂÎñÒòÓÉÓÚÉÏÖÜÒ»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÔÚGitea½¨Éè´úÂë¿ÍÕ»£¬£¬£¬°üÀ¨Target²¿·ÖÄÚ²¿´úÂë¡¢¿ª·¢ÕßÎĵµ¼°ÃûΪSALE.MDµÄÎļþ¡£¡£¡£¡£¸ÃÎļþÏÔʾÍêÕûÊý¾Ý¼¯°üÀ¨³¬5.7ÍòÐÐĿ¼ÁÐ±í£¬£¬£¬×ÜÈÝÁ¿Ô¼860GB£¬£¬£¬Éæ¼°"Ç®°üЧÀÍÉøÍ¸²âÊÔ""TargetIDM-TAPProvisioningAPI"µÈÃô¸ÐÏîÄ¿£¬£¬£¬ÇÒÌá½»ÔªÊý¾ÝÌá¼°¶àλTargetÏÖÈÎÊ×ϯ¹¤³ÌʦÐÕÃû¼°ÄÚ²¿API¶Ëµã£¨Èçconfluence.target.com£©£¬£¬£¬ÌåÏÖÊý¾ÝÔ´×Ô˽Óпª·¢»ù´¡ÉèÊ©¡£¡£¡£¡£TargetµÄGitЧÀÍÆ÷£¨git.target.com£©ÒÑÎÞ·¨´Ó»¥ÁªÍø»á¼û£¬£¬£¬´Ëǰ¸ÃÓòÃûÔøÖØ¶¨ÏòÖÁÔ±¹¤µÇÂ¼Ò³Ãæ£¬£¬£¬µ«ÏÖÒÑÍêȫ崻ú¡£¡£¡£¡£ºÚ¿ÍÐû²¼µÄGitea¿ÍÕ»ÔÚýÌåÁªÏµTargetºó±»É¾³ý£¬£¬£¬·µ»Ø404¹ýʧ£¬£¬£¬ÓëϼÜÇëÇóÒ»Ö¡£¡£¡£¡£ËÑË÷ÒýÇæ»º´æ¼Í¼ÏÔʾ£¬£¬£¬git.target.com²¿·Ö×ÊÔ´Ôø±»Ë÷Òý£¬£¬£¬µ«ÎÞ·¨È·ÈÏÊÇ·ñÓë½üÆÚ̻¶ÊÂÎñÖ±½ÓÏà¹Ø¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/


4. Î÷°àÑÀÄÜÔ´¾ÞÍ·EndesaÅû¶Êý¾Ýй¶ÊÂÎñ


1ÔÂ12ÈÕ£¬£¬£¬Î÷°àÑÀ×î´óÄÜÔ´¹©Ó¦ÉÌEndesa¼°ÆäÔËÓªÉÌEnerg¨ªa XXI¿ËÈÕÅûÂ¶ÖØ´óÇå¾²ÊÂÎñ£ººÚ¿Íͨ¹ý²»·¨»á¼ûÆäÉÌҵƽ̨£¬£¬£¬ÇÔÈ¡ÁËÓë¿Í»§ÄÜÔ´ÌõÔ¼Ïà¹ØµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£×÷ΪEnel¼¯ÍÅÆìÏÂÆóÒµ£¬£¬£¬EndesaÔÚÎ÷°àÑÀºÍÆÏÌÑÑÀÓµÓг¬1000ÍòÓû§£¬£¬£¬×ܿͻ§»ùÊýÔ¼2200Íò¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÀàÐͰüÀ¨»ù×Ô¼º·ÝÐÅÏ¢¡¢ÁªÏµÐÅÏ¢¡¢¹úÃñÉí·ÝÖ¤ºÅÂ루DNI£©¡¢ÌõÔ¼ÏêÇé¼°¸¶¿îÐÅÏ¢£¨ÈçIBANÕ˺ţ©£¬£¬£¬µ«¹«Ë¾Ç¿µ÷ÕË»§ÃÜÂëδ±»²¨¼°¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬EndesaѸËÙ½ÓÄɶàÏî·À»¤²½·¥£º·â±ÕÊÜÓ°ÏìÄÚ²¿ÕË»§¡¢µ¼³öÈÕÖ¾¾ÙÐÐÊÖÒÕÆÊÎö¡¢Ôöǿϵͳ¼à¿ØÒÔ¼ì²âºóÐø¿ÉÒɻ£¬£¬£¬²¢Í¬²½ÏòÎ÷°àÑÀÊý¾Ý±£»£»£»¤¾Ö¼°Ïà¹Øî¿Ïµ»ú¹¹±¨¸æ¡£¡£¡£¡£¹«Ë¾Í¨¹ýÕýʽÇþµÀ֪ͨËùÓÐÊÜÓ°Ïì¿Í»§£¬£¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄÉí·ÝðÓá¢Êý¾Ý͵ÇÔ¼°ÍøÂç´¹ÂÚ¹¥»÷Σº¦£¬£¬£¬½¨Ò齫¿ÉÒɻ±¨¸æÖÁÖ¸¶¨ºÅÂë¡£¡£¡£¡£EndesaÉùÃ÷³Æ£¬£¬£¬×èÖ¹ÏÖÔÚÎÞÖ¤¾ÝÏÔʾй¶Êý¾ÝÒѱ»Ú²Æ­Ê¹Ó㬣¬£¬Òò´Ë¶ÔÓû§È¨Á¦ºÍ×ÔÓÉ×é³É¸ßΣº¦µÄ¿ÉÄÜÐԽϵ͡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/


5. APT28Ò»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡»î¶¯


1ÔÂ12ÈÕ£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄAPT28×éÖ¯£¨ÓÖÃûFancy Bear¡¢BlueDeltaµÈ£©2025Äê2ÔÂÖÁ9ÔÂÒ»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡»î¶¯£¬£¬£¬Ä¿µÄº­¸ÇÍÁ¶úÆäÄÜÔ´ºÍºËÄÜ»ú¹¹¡¢Å·ÖÞÖǿ⡢±±ÂíÆä¶Ù¼°ÎÚ×ȱð¿Ë˹̹×éÖ¯£¬£¬£¬·´Ó¦Æä¶ÔÄÜÔ´¡¢¹ú·À¡¢Õþ¸®ÁìÓòµÄÒ»Á¬¹Ø×¢£¬£¬£¬Óë¶íÂÞ˹Ç鱍֨µã¸ß¶ÈÆõºÏ¡£¡£¡£¡£¸Ã×éÖ¯½ÓÄÉ¡°ÇøÓò¶¨ÖÆÓÕ¶ü+µÍ±¾Ç®»ù´¡ÉèÊ©¡±Õ½ÂÔ£ºÍ¨¹ýÄ£ÄâMicrosoft OWA¡¢Google¡¢Sophos VPNµÄÐéαµÇÂ¼Ò³ÃæÇÔȡƾ֤£¬£¬£¬²¢Ê¹ÓÃWebhook.site¡¢InfinityFree¡¢Byet Internet Services¡¢ngrokµÈÃâ·ÑÍйܺÍËíµÀЧÀÍÍйܴ¹ÂÚÒ³Ãæ¡¢Ð¹Â¶Êý¾Ý¼°ÊµÏÖÖØ¶¨Ïò¡£¡£¡£¡£ÀýÈ磬£¬£¬6Ô°²ÅŵÄSophos VPNÃÜÂëÖØÖÃÒ³ÃæÍ¨¹ýJavaScriptÌáÈ¡URL±êʶ·û²¢·¢ËÍÖÁ¹¥»÷Õß¿ØÖƶˣ¬£¬£¬×îÖÕÖØ¶¨ÏòÖÁÕýµ±VPNÃÅ»§£»£»£»9ÔÂÔòʹÓÃInfinityFreeÍйܵÄOWAÓâÆÚÃÜÂëÒ³Ãæ£¬£¬£¬½«Êܺ¦Õßµ¼Ïò±±ÂíÆä¶Ù¾üÊÂ×éÖ¯¼°ÎÚ×ȱð¿Ë˹̹IT¹«Ë¾µÄÕýµ±µÇÂ¼Ò³Ãæ¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷ÕßǶÈ뺣ÍåÑо¿ÖÐÐÄ¡¢ECCOµÈ¿ÉÐÅÖÇ¿âµÄÕýµ±PDFÓÕ¶ü£¬£¬£¬ÏÈÖ¸µ¼Óû§µã»÷£¬£¬£¬ÔÙÏÔʾαÔìµÇÂ¼Ò³Ãæ£¬£¬£¬Í¨¹ýÒþ²ØHTML±íµ¥ºÍJavaScriptÐűêÇÔÈ¡ÓÊÏä¡¢ÃÜÂë¡¢IP¼°Óû§ÊðÀíÐÅÏ¢£¬£¬£¬×îºóÖØ¶¨Ïò»ØÕæÊµPDF£¬£¬£¬ÔöÇ¿ÓÕÆ­ÐÔ¡£¡£¡£¡£


https://securityaffairs.com/186801/apt/credential-harvesting-attacks-by-apt28-hit-turkish-european-and-central-asian-organizations.html


6. ÒÁÀÊMuddyWaterÓÃRustyWaterÌᳫ´¹ÂÚ¹¥»÷


1ÔÂ10ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬±»³ÆÎªMuddyWaterµÄÒÁÀʺڿÍ×éÖ¯±»Ö¸Õë¶ÔÖж«µØÇøÍâ½»¡¢º£Ê¡¢½ðÈÚ¼°µçÐÅʵÌå·¢¶¯Óã²æÊ½´¹ÂÚ¹¥»÷£¬£¬£¬ÆäʹÓûùÓÚRustÓïÑÔ¿ª·¢¡¢´úºÅΪRustyWaterµÄÖ²Èë³ÌÐòʵÑéÈëÇÖ¡£¡£¡£¡£CloudSEKÑо¿Ô±Prajwal AwasthiÔÚ±¨¸æÖÐÖ¸³ö£¬£¬£¬¹¥»÷ͨ¹ýαװ³ÉÍøÂçÇå¾²Ö¸ÄϵĴ¹ÂÚÓʼþ¸½´ø¶ñÒâWordÎĵµ£¬£¬£¬ÓÕµ¼Êܺ¦Õ߯ôÓÃÄÚÈݺ󼤻îVBAºê£¬£¬£¬½ø¶ø°²ÅÅRustyWater³ÌÐò¡£¡£¡£¡£¸ÃÖ²Èë³ÌÐò¾ß±¸Òì²½ÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨Ñ¶¡¢·´ÆÊÎö¼ì²â¡¢Í¨¹ýWindows×¢²á±íʵÏÖ³¤ÆÚ»¯¼°Ä£¿£¿£¿£¿£¿é»¯À©Õ¹ÄÜÁ¦£¬£¬£¬¿ÉÍøÂçÅÌËã»úÐÅÏ¢¡¢¼ì²âÇå¾²Èí¼þ£¬£¬£¬²¢ÓëC2ЧÀÍÆ÷½¨ÉèÁªÏµÒÔÖ´ÐÐÎļþ²Ù×÷ºÍÏÂÁî¡£¡£¡£¡£´Ë´Î¹¥»÷±ê¼Ç×ÅMuddyWater¹¥»÷ÊÖ·¨µÄÒ»Á¬Ñݱ䡣¡£¡£¡£¸Ã×éÖ¯×Ô2017ÄêÆð±»ÆÀ¹ÀÁ¥ÊôÓÚÒÁÀÊÇ鱨ÓëÇå¾²²¿£¬£¬£¬½üÄêÀ´Öð²½ïÔÌ­¶ÔÕýµ±Ô¶³Ì»á¼ûÈí¼þµÄÒÀÀµ£¬£¬£¬×ª¶ø½ÓÄɶàÑù»¯¶¨ÖƶñÒâÈí¼þ¿â£¬£¬£¬°üÀ¨Phoenix¡¢UDPGangster¡¢BugSleepºÍMuddyViperµÈ¹¤¾ß¡£¡£¡£¡£´Ë´ÎÒýÈëRustÓïÑÔ¿ª·¢µÄÖ²Èë³ÌÐò£¬£¬£¬½øÒ»²½ÌåÏÖÁËÆä¹¤¾ßÁ´Ïò¸ü½á¹¹»¯¡¢Ä£¿£¿£¿£¿£¿é»¯ºÍµÍÔëÉùµÄÔ¶³Ì»á¼ûľÂíÄÜÁ¦Ñݽø¡£¡£¡£¡£


https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html