СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ

Ðû²¼Ê±¼ä 2026-01-13

1. СÐÄBitB´¹ÂÚÐÂÍþв£ºFacebookÓû§Çå¾²Ö¸ÄÏ


1ÔÂ12ÈÕ£¬£¬ £¬£¬ÒÑÍùÁù¸öÔ£¬£¬ £¬£¬ºÚ¿ÍƵÈÔʹÓÃä¯ÀÀÆ÷ÄÚä¯ÀÀÆ÷£¨BitB£©ÊÖÒÕ¶ÔFacebookÓû§Ìᳫ´¹ÂÚ¹¥»÷£¬£¬ £¬£¬¸ÃÊÖÒÕÓÉÇå¾²Ñо¿Ô±mr.d0xÓÚ2022Ä꿪·¢£¬£¬ £¬£¬ºó±»ÍøÂç·¸·¨·Ö×ÓÀ©Õ¹ÖÁSteamµÈƽ̨¡£ ¡£¡£¡£TrellixÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬¹¥»÷Õßͨ¹ýαÔì״ʦÊÂÎñËù֪ͨ¡¢°æÈ¨ÇÖȨÖÒÑÔ»òMetaÇå¾²ÌáÐÑ£¬£¬ £¬£¬ÓÕµ¼Óû§µã»÷°üÀ¨ÐéαµÇ¼±íµ¥µÄµ¯³ö´°¿Ú¡£ ¡£¡£¡£´ËÀà´°¿ÚʹÓÃiframeÊÖÒÕÄ£Äâ¹Ù·½ÈÏÖ¤½çÃæ£¬£¬ £¬£¬²¢Í¨¹ý×Ô½ç˵´°¿ÚÎÊÌâºÍURLÔöÇ¿ÓÕÆ­ÐÔ£¬£¬ £¬£¬ÉõÖÁ¼ÓÈëËõ¶ÌURLºÍÐéαMetaCAPTCHAÒ³ÃæÒÔ¹æ±Ü¼ì²â¡£ ¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬ £¬£¬Êܺ¦Õß»áÔÚ¹¥»÷Õß¿ØÖƵÄÍøÒ³ÉÏ¿´µ½¿´ËÆÕýµ±µÄä¯ÀÀÆ÷µ¯³ö´°¿Ú£¬£¬ £¬£¬ÒªÇóÊäÈëFacebookƾ֤¡£ ¡£¡£¡£ÓÉÓÚiframeÓëµ×²ã´°¿Ú°ó¶¨£¬£¬ £¬£¬Óû§ÎÞ·¨½«ÆäÍϳöä¯ÀÀÆ÷´°¿Ú£¬£¬ £¬£¬ÕâÊÇʶ±ðBitB¹¥»÷µÄÒªº¦ÌØÕ÷¡£ ¡£¡£¡£Ñо¿Ö¸³ö£¬£¬ £¬£¬´ó×Ú´¹ÂÚÒ³ÃæÍйÜÔÚNetlify¡¢VercelµÈÕýµ±ÔÆÆ½Ì¨£¬£¬ £¬£¬Î±×°³ÉMetaÒþ˽ÖÐÐÄ»òÉêËß±íµ¥£¬£¬ £¬£¬ÍøÂçÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£ ¡£¡£¡£Óë¹Å°å´¹ÂÚÏà±È£¬£¬ £¬£¬ÕâÖÖÊÖ·¨Í¨¹ýÀÄÓÃÊÜÐÅÈεĻù´¡ÉèÊ©ÈÆ¹ýÇå¾²¹ýÂËÆ÷£¬£¬ £¬£¬ÓªÔìÐéαÇå¾²¸Ð¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/


2. CISA½ôÆÈÏÂÁîÐÞ²¹Òѱ»Ê¹ÓõÄGogs¸ßΣÎó²î


1ÔÂ12ÈÕ£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·ÖÔÚ2026Äê2ÔÂ2ÈÕǰÐÞ²¹Gogs¸ßΣÎó²îCVE-2025-8110¡£ ¡£¡£¡£¸ÃÎó²îÔ´ÓÚPutContents APIµÄ·¾¶±éÀúȱÏÝ£¬£¬ £¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷Õßͨ¹ý·ûºÅÁ´½ÓÁýÕÖ´æ´¢¿âÍⲿÎļþ£¬£¬ £¬£¬Èƹý´ËǰÐÞ¸´µÄCVE-2024-55947±£»£»£» £»£»£»¤²½·¥£¬£¬ £¬£¬½ø¶øÍ¨¹ýÐÞ¸ÄGitÉèÖÃÎļþ£¨ÈçsshCommand£©Ö´ÐÐí§ÒâÏÂÁ£¬ £¬£¬×é³ÉÁãÈÕ¹¥»÷Σº¦¡£ ¡£¡£¡£Gogs×÷ΪGoÓïÑÔ±àдµÄÇáÁ¿¼¶GitЧÀÍÌæ»»¼Æ»®£¬£¬ £¬£¬³£ÓÃÓÚÔ¶³ÌЭ×÷£¬£¬ £¬£¬µ«Æä¿ª·ÅÐÔʹÆä³ÉΪ¹¥»÷Ä¿µÄ¡£ ¡£¡£¡£Wiz ResearchÔÚ7ÔÂÊÓ²ì¿Í»§GogsЧÀÍÆ÷¶ñÒâÈí¼þѬȾʱ·¢Ã÷¸ÃÎó²î£¬£¬ £¬£¬²¢ÓÚ7ÔÂ17ÈÕ±¨¸æ£¬£¬ £¬£¬10ÔÂ30ÈÕ»ñGogsÈ·ÈÏ£¬£¬ £¬£¬ÉÏÖÜÐû²¼²¹¶¡¡£ ¡£¡£¡£È»¶ø£¬£¬ £¬£¬11ÔÂ1ÈÕ¼´·ºÆðµÚ¶þ²¨ÁãÈÕ¹¥»÷¡£ ¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬£¬³¬1400̨GogsЧÀÍÆ÷̻¶ÓÚ»¥ÁªÍø£¬£¬ £¬£¬ÆäÖÐ1250̨ÈÔ¿É»á¼û£¬£¬ £¬£¬700¸öʵÀýÏÔʾ±»ÈëÇÖ¼£Ïó¡£ ¡£¡£¡£CISAÒѽ«CVE-2025-8110ÁÐÈë¡°ÒÑʹÓÃÎó²îĿ¼¡±£¬£¬ £¬£¬Ç¿µ÷´ËÀàÎó²îÊǶñÒâÍøÂç¹¥»÷Õߵij£ÓÃ;¾¶£¬£¬ £¬£¬´ºÁª°î»ú¹¹×é³ÉÖØ´óΣº¦¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/


3. TargetµÄ¿ª·¢Ð§ÀÍÆ÷ÔÚºÚ¿ÍÉù³ÆÇÔȡԴ´úÂëºóÀëÏß


1ÔÂ12ÈÕ£¬£¬ £¬£¬¿ËÈÕ£¬£¬ £¬£¬ºÚ¿ÍÔÚGiteaƽ̨Ðû²¼¶à¸öÒÉËÆTarget¹«Ë¾ÄÚ²¿´úÂë¿âµÄÑù±¾£¬£¬ £¬£¬²¢Éù³ÆÕýͨ¹ýµØÏÂÂÛ̳³öÊÛÍêÕûÊý¾Ý¼¯¡£ ¡£¡£¡£ÊÂÎñÒòÓÉÓÚÉÏÖÜÒ»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÔÚGitea½¨Éè´úÂë¿ÍÕ»£¬£¬ £¬£¬°üÀ¨Target²¿·ÖÄÚ²¿´úÂë¡¢¿ª·¢ÕßÎĵµ¼°ÃûΪSALE.MDµÄÎļþ¡£ ¡£¡£¡£¸ÃÎļþÏÔʾÍêÕûÊý¾Ý¼¯°üÀ¨³¬5.7ÍòÐÐĿ¼Áбí£¬£¬ £¬£¬×ÜÈÝÁ¿Ô¼860GB£¬£¬ £¬£¬Éæ¼°"Ç®°üЧÀÍÉøÍ¸²âÊÔ""TargetIDM-TAPProvisioningAPI"µÈÃô¸ÐÏîÄ¿£¬£¬ £¬£¬ÇÒÌá½»ÔªÊý¾ÝÌá¼°¶àλTargetÏÖÈÎÊ×ϯ¹¤³ÌʦÐÕÃû¼°ÄÚ²¿API¶Ëµã£¨Èçconfluence.target.com£©£¬£¬ £¬£¬ÌåÏÖÊý¾ÝÔ´×Ô˽Óпª·¢»ù´¡ÉèÊ©¡£ ¡£¡£¡£TargetµÄGitЧÀÍÆ÷£¨git.target.com£©ÒÑÎÞ·¨´Ó»¥ÁªÍø»á¼û£¬£¬ £¬£¬´Ëǰ¸ÃÓòÃûÔøÖØ¶¨ÏòÖÁÔ±¹¤µÇÂ¼Ò³Ãæ£¬£¬ £¬£¬µ«ÏÖÒÑÍêȫ崻ú¡£ ¡£¡£¡£ºÚ¿ÍÐû²¼µÄGitea¿ÍÕ»ÔÚýÌåÁªÏµTargetºó±»É¾³ý£¬£¬ £¬£¬·µ»Ø404¹ýʧ£¬£¬ £¬£¬ÓëϼÜÇëÇóÒ»Ö¡£ ¡£¡£¡£ËÑË÷ÒýÇæ»º´æ¼Í¼ÏÔʾ£¬£¬ £¬£¬git.target.com²¿·Ö×ÊÔ´Ôø±»Ë÷Òý£¬£¬ £¬£¬µ«ÎÞ·¨È·ÈÏÊÇ·ñÓë½üÆÚ̻¶ÊÂÎñÖ±½ÓÏà¹Ø¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/


4. Î÷°àÑÀÄÜÔ´¾ÞÍ·EndesaÅû¶Êý¾Ýй¶ÊÂÎñ


1ÔÂ12ÈÕ£¬£¬ £¬£¬Î÷°àÑÀ×î´óÄÜÔ´¹©Ó¦ÉÌEndesa¼°ÆäÔËÓªÉÌEnerg¨ªa XXI¿ËÈÕÅûÂ¶ÖØ´óÇå¾²ÊÂÎñ£ººÚ¿Íͨ¹ý²»·¨»á¼ûÆäÉÌҵƽ̨£¬£¬ £¬£¬ÇÔÈ¡ÁËÓë¿Í»§ÄÜÔ´ÌõÔ¼Ïà¹ØµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£ ¡£¡£¡£×÷ΪEnel¼¯ÍÅÆìÏÂÆóÒµ£¬£¬ £¬£¬EndesaÔÚÎ÷°àÑÀºÍÆÏÌÑÑÀÓµÓг¬1000ÍòÓû§£¬£¬ £¬£¬×ܿͻ§»ùÊýÔ¼2200Íò¡£ ¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÀàÐͰüÀ¨»ù×Ô¼º·ÝÐÅÏ¢¡¢ÁªÏµÐÅÏ¢¡¢¹úÃñÉí·ÝÖ¤ºÅÂ루DNI£©¡¢ÌõÔ¼ÏêÇé¼°¸¶¿îÐÅÏ¢£¨ÈçIBANÕ˺ţ©£¬£¬ £¬£¬µ«¹«Ë¾Ç¿µ÷ÕË»§ÃÜÂëδ±»²¨¼°¡£ ¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬ £¬£¬EndesaѸËÙ½ÓÄɶàÏî·À»¤²½·¥£º·â±ÕÊÜÓ°ÏìÄÚ²¿ÕË»§¡¢µ¼³öÈÕÖ¾¾ÙÐÐÊÖÒÕÆÊÎö¡¢Ôöǿϵͳ¼à¿ØÒÔ¼ì²âºóÐø¿ÉÒɻ£¬£¬ £¬£¬²¢Í¬²½ÏòÎ÷°àÑÀÊý¾Ý±£»£»£» £»£»£»¤¾Ö¼°Ïà¹Øî¿Ïµ»ú¹¹±¨¸æ¡£ ¡£¡£¡£¹«Ë¾Í¨¹ýÕýʽÇþµÀ֪ͨËùÓÐÊÜÓ°Ïì¿Í»§£¬£¬ £¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄÉí·ÝðÓá¢Êý¾Ý͵ÇÔ¼°ÍøÂç´¹ÂÚ¹¥»÷Σº¦£¬£¬ £¬£¬½¨Ò齫¿ÉÒɻ±¨¸æÖÁÖ¸¶¨ºÅÂë¡£ ¡£¡£¡£EndesaÉùÃ÷³Æ£¬£¬ £¬£¬×èÖ¹ÏÖÔÚÎÞÖ¤¾ÝÏÔʾй¶Êý¾ÝÒѱ»Ú²Æ­Ê¹Ó㬣¬ £¬£¬Òò´Ë¶ÔÓû§È¨Á¦ºÍ×ÔÓÉ×é³É¸ßΣº¦µÄ¿ÉÄÜÐԽϵÍ¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/


5. APT28Ò»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡»î¶¯


1ÔÂ12ÈÕ£¬£¬ £¬£¬Óë¶íÂÞ˹¹ØÁªµÄAPT28×éÖ¯£¨ÓÖÃûFancy Bear¡¢BlueDeltaµÈ£©2025Äê2ÔÂÖÁ9ÔÂÒ»Á¬¿ªÕ¹µÍ±¾Ç®Æ¾Ö¤ÇÔÈ¡»î¶¯£¬£¬ £¬£¬Ä¿µÄº­¸ÇÍÁ¶úÆäÄÜÔ´ºÍºËÄÜ»ú¹¹¡¢Å·ÖÞÖǿ⡢±±ÂíÆä¶Ù¼°ÎÚ×ȱð¿Ë˹̹×éÖ¯£¬£¬ £¬£¬·´Ó¦Æä¶ÔÄÜÔ´¡¢¹ú·À¡¢Õþ¸®ÁìÓòµÄÒ»Á¬¹Ø×¢£¬£¬ £¬£¬Óë¶íÂÞ˹Ç鱍֨µã¸ß¶ÈÆõºÏ¡£ ¡£¡£¡£¸Ã×éÖ¯½ÓÄÉ¡°ÇøÓò¶¨ÖÆÓÕ¶ü+µÍ±¾Ç®»ù´¡ÉèÊ©¡±Õ½ÂÔ£ºÍ¨¹ýÄ£ÄâMicrosoft OWA¡¢Google¡¢Sophos VPNµÄÐéαµÇÂ¼Ò³ÃæÇÔȡƾ֤£¬£¬ £¬£¬²¢Ê¹ÓÃWebhook.site¡¢InfinityFree¡¢Byet Internet Services¡¢ngrokµÈÃâ·ÑÍйܺÍËíµÀЧÀÍÍйܴ¹ÂÚÒ³Ãæ¡¢Ð¹Â¶Êý¾Ý¼°ÊµÏÖÖØ¶¨Ïò¡£ ¡£¡£¡£ÀýÈ磬£¬ £¬£¬6Ô°²ÅŵÄSophos VPNÃÜÂëÖØÖÃÒ³ÃæÍ¨¹ýJavaScriptÌáÈ¡URL±êʶ·û²¢·¢ËÍÖÁ¹¥»÷Õß¿ØÖƶË£¬£¬ £¬£¬×îÖÕÖØ¶¨ÏòÖÁÕýµ±VPNÃÅ»§£»£»£» £»£»£»9ÔÂÔòʹÓÃInfinityFreeÍйܵÄOWAÓâÆÚÃÜÂëÒ³Ãæ£¬£¬ £¬£¬½«Êܺ¦Õßµ¼Ïò±±ÂíÆä¶Ù¾üÊÂ×éÖ¯¼°ÎÚ×ȱð¿Ë˹̹IT¹«Ë¾µÄÕýµ±µÇÂ¼Ò³Ãæ¡£ ¡£¡£¡£±ðµÄ£¬£¬ £¬£¬¹¥»÷ÕßǶÈ뺣ÍåÑо¿ÖÐÐÄ¡¢ECCOµÈ¿ÉÐÅÖÇ¿âµÄÕýµ±PDFÓÕ¶ü£¬£¬ £¬£¬ÏÈÖ¸µ¼Óû§µã»÷£¬£¬ £¬£¬ÔÙÏÔʾαÔìµÇÂ¼Ò³Ãæ£¬£¬ £¬£¬Í¨¹ýÒþ²ØHTML±íµ¥ºÍJavaScriptÐűêÇÔÈ¡ÓÊÏä¡¢ÃÜÂë¡¢IP¼°Óû§ÊðÀíÐÅÏ¢£¬£¬ £¬£¬×îºóÖØ¶¨Ïò»ØÕæÊµPDF£¬£¬ £¬£¬ÔöÇ¿ÓÕÆ­ÐÔ¡£ ¡£¡£¡£


https://securityaffairs.com/186801/apt/credential-harvesting-attacks-by-apt28-hit-turkish-european-and-central-asian-organizations.html


6. ÒÁÀÊMuddyWaterÓÃRustyWaterÌᳫ´¹ÂÚ¹¥»÷


1ÔÂ10ÈÕ£¬£¬ £¬£¬¿ËÈÕ£¬£¬ £¬£¬±»³ÆÎªMuddyWaterµÄÒÁÀʺڿÍ×éÖ¯±»Ö¸Õë¶ÔÖж«µØÇøÍâ½»¡¢º£Ê¡¢½ðÈÚ¼°µçÐÅʵÌå·¢¶¯Óã²æÊ½´¹ÂÚ¹¥»÷£¬£¬ £¬£¬ÆäʹÓûùÓÚRustÓïÑÔ¿ª·¢¡¢´úºÅΪRustyWaterµÄÖ²Èë³ÌÐòʵÑéÈëÇÖ¡£ ¡£¡£¡£CloudSEKÑо¿Ô±Prajwal AwasthiÔÚ±¨¸æÖÐÖ¸³ö£¬£¬ £¬£¬¹¥»÷ͨ¹ýαװ³ÉÍøÂçÇå¾²Ö¸ÄϵĴ¹ÂÚÓʼþ¸½´ø¶ñÒâWordÎĵµ£¬£¬ £¬£¬ÓÕµ¼Êܺ¦Õ߯ôÓÃÄÚÈݺ󼤻îVBAºê£¬£¬ £¬£¬½ø¶ø°²ÅÅRustyWater³ÌÐò¡£ ¡£¡£¡£¸ÃÖ²Èë³ÌÐò¾ß±¸Òì²½ÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨Ñ¶¡¢·´ÆÊÎö¼ì²â¡¢Í¨¹ýWindows×¢²á±íʵÏÖ³¤ÆÚ»¯¼°Ä£¿£¿£¿£¿é»¯À©Õ¹ÄÜÁ¦£¬£¬ £¬£¬¿ÉÍøÂçÅÌËã»úÐÅÏ¢¡¢¼ì²âÇå¾²Èí¼þ£¬£¬ £¬£¬²¢ÓëC2ЧÀÍÆ÷½¨ÉèÁªÏµÒÔÖ´ÐÐÎļþ²Ù×÷ºÍÏÂÁî¡£ ¡£¡£¡£´Ë´Î¹¥»÷±ê¼Ç×ÅMuddyWater¹¥»÷ÊÖ·¨µÄÒ»Á¬Ñݱä¡£ ¡£¡£¡£¸Ã×éÖ¯×Ô2017ÄêÆð±»ÆÀ¹ÀÁ¥ÊôÓÚÒÁÀÊÇ鱨ÓëÇå¾²²¿£¬£¬ £¬£¬½üÄêÀ´Öð²½ïÔÌ­¶ÔÕýµ±Ô¶³Ì»á¼ûÈí¼þµÄÒÀÀµ£¬£¬ £¬£¬×ª¶ø½ÓÄɶàÑù»¯¶¨ÖƶñÒâÈí¼þ¿â£¬£¬ £¬£¬°üÀ¨Phoenix¡¢UDPGangster¡¢BugSleepºÍMuddyViperµÈ¹¤¾ß¡£ ¡£¡£¡£´Ë´ÎÒýÈëRustÓïÑÔ¿ª·¢µÄÖ²Èë³ÌÐò£¬£¬ £¬£¬½øÒ»²½ÌåÏÖÁËÆä¹¤¾ßÁ´Ïò¸ü½á¹¹»¯¡¢Ä£¿£¿£¿£¿é»¯ºÍµÍÔëÉùµÄÔ¶³Ì»á¼ûľÂíÄÜÁ¦Ñݽø¡£ ¡£¡£¡£


https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html