Willow PaysÊý¾Ý¿âÔâй¶ £¬£¬£¬£¬ £¬£¬£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢ÆØ¹â

Ðû²¼Ê±¼ä 2025-01-22

1. Willow PaysÊý¾Ý¿âÔâй¶ £¬£¬£¬£¬ £¬£¬£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢ÆØ¹â


1ÔÂ20ÈÕ £¬£¬£¬£¬ £¬£¬£¬Çå¾²Ñо¿Ô±Jeremiah Fowler×î½ü·¢Ã÷Ò»¸öδÊÜÃÜÂë±£»£»£» £»¤µÄÊý¾Ý¿â £¬£¬£¬£¬ £¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÃÀ¹ú½ðÈڿƼ¼Õ˵¥Ö§¸¶Æ½Ì¨Willow PaysµÄ240,000¶àÌõÃô¸Ð¼Í¼ £¬£¬£¬£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÐÅÓöî¶ÈºÍÄÚ²¿Õ˵¥ÏêϸÐÅÏ¢µÈ¡£¡£¡£¡£Willow PaysÔÊÐíÓû§ÔÚÖÜΧÄÚÖ§¸¶Õ˵¥ºÍÆäËûÓÃ¶È £¬£¬£¬£¬ £¬£¬£¬µ«¸ÃÊý¾Ý¿âȴȱ·¦ÃÜÂë±£»£»£» £»¤»ò¼ÓÃÜ £¬£¬£¬£¬ £¬£¬£¬Ê¹µÃÕâЩÐÅÏ¢ÈÝÒ×±»Ð¹Â¶¡£¡£¡£¡£ËäÈ»Éв»ÇåÎúÏÖʵÊý¾Ýй¶µÄˮƽ £¬£¬£¬£¬ £¬£¬£¬µ«FowlerÒÔΪÕâЩÐÅÏ¢¿ÉÄܻᱻ·¸·¨·Ö×ÓÓÃÓÚÍøÂç´¹ÂÚ¹¥»÷»òδ¾­ÊÚȨ»á¼ûÆäËûÕË»§¡£¡£¡£¡£FowlerÏòWillow Pays·¢³öÁËÒ»·ÝÈÏÕæÈεÄÅû¶֪ͨ £¬£¬£¬£¬ £¬£¬£¬ºóÕßÁ¬Ã¦Õ¥È¡Á˹«ÖÚ¶Ô¸ÃÊý¾Ý¿âµÄ»á¼û¡£¡£¡£¡£ÕâÒ»ÊÂÎñ͹ÏÔÁ˽ðÈÚ»ú¹¹ÃæÁÙµÄÍøÂç¹¥»÷ÍþвÈÕÒæÔöÌí £¬£¬£¬£¬ £¬£¬£¬Ç徲ר¼ÒÇ¿µ÷½ðÈÚÈí¼þÌṩÉÌÐèҪʵÑéÓÐÓõÄÍøÂçÇå¾²²½·¥ £¬£¬£¬£¬ £¬£¬£¬°üÀ¨¼ÓÃÜÃô¸ÐÊý¾Ý¡¢°´ÆÚ¾ÙÐÐÇå¾²Éó¼ÆÒÔ¼°½ÓÄɶàÒòËØÉí·ÝÑéÖ¤µÈ £¬£¬£¬£¬ £¬£¬£¬ÒÔ±ÜÃâÔÚÏß½ðÈÚڲƭ¡£¡£¡£¡£


https://hackread.com/fintech-bill-pay-willow-pays-exposes-240000-records/


2. ¶àÖÖËíµÀЭÒéÇå¾²Îó²îÆØ¹â £¬£¬£¬£¬ £¬£¬£¬420Íǫ̀Ö÷»úÃæÁÙ¹¥»÷Σº¦


1ÔÂ20ÈÕ £¬£¬£¬£¬ £¬£¬£¬ÐÂÑо¿ÏÔʾ £¬£¬£¬£¬ £¬£¬£¬¶àÖÖËíµÀЭÒé±£´æÇå¾²Îó²î £¬£¬£¬£¬ £¬£¬£¬¿ÉÄÜʹ¹¥»÷ÕßʵÑé¶àÖÖ¹¥»÷¡£¡£¡£¡£Top10VPNÓë³ãë´óѧ½ÌÊÚÂíµÙ¡¤·¶»ô·òÏàÖúµÄÑо¿Ö¸³ö £¬£¬£¬£¬ £¬£¬£¬ÈôÍøÂçÖ÷»ú½ÓÊÜËíµÀÊý¾Ý°ü¶ø²»ÑéÖ¤·¢ËÍÕßÉí·Ý £¬£¬£¬£¬ £¬£¬£¬Ôò¿ÉÄܱ»Ð®ÖÆÖ´ÐÐÄäÃû¹¥»÷²¢»ñµÃÍøÂç»á¼ûȨÏÞ¡£¡£¡£¡£Ñо¿·¢Ã÷ £¬£¬£¬£¬ £¬£¬£¬¶à´ï420Íǫ̀Ö÷»úÒ×Êܹ¥»÷ £¬£¬£¬£¬ £¬£¬£¬°üÀ¨VPN¡¢ISP¼Òͥ·ÓÉÆ÷¡¢½¹µã»¥ÁªÍøÂ·ÓÉÆ÷¡¢Òƶ¯ÍøÂçÍø¹ØºÍCDN½Úµã £¬£¬£¬£¬ £¬£¬£¬ÊÜÓ°Ïì×îÑÏÖØµÄ¹ú¼Ò°üÀ¨Öйú¡¢·¨¹ú¡¢ÈÕ±¾¡¢ÃÀ¹úºÍ°ÍÎ÷¡£¡£¡£¡£ÕâЩÎó²îÔÊÐí¹¥»÷ÕßÀÄÓÃÒ×Êܹ¥»÷µÄϵͳ×÷Ϊµ¥ÏòÊðÀí £¬£¬£¬£¬ £¬£¬£¬²¢·¢¶¯DoS¹¥»÷¡£¡£¡£¡£CERTЭµ÷ÖÐÐÄÖ¸³ö £¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß»¹¿ÉαÔìÔ´IPv4/6µØµã £¬£¬£¬£¬ £¬£¬£¬»á¼û˽ÓÐÍøÂç»ò·¢¶¯DDoS¹¥»÷¡£¡£¡£¡£Îó²îȪԴÔÚÓÚËíµÀЭÒéÈçIP6IP6¡¢GRE6µÈȱ·¦×ã¹»µÄÇ徲ЭÒé £¬£¬£¬£¬ £¬£¬£¬ÈçIPsec £¬£¬£¬£¬ £¬£¬£¬²î³ØÁ÷Á¿¾ÙÐÐÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ¡£¡£¡£¡£ÕâЩЭÒéÒѱ»·ÖÅÉÁËÏìÓ¦µÄCVE±àºÅ¡£¡£¡£¡£×÷Ϊ·ÀÓù²½·¥ £¬£¬£¬£¬ £¬£¬£¬½¨ÒéʹÓÃIPSec»òWireGuardÌṩÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ £¬£¬£¬£¬ £¬£¬£¬²¢½ö½ÓÊÜÀ´×Ô¿ÉÐÅÔ´µÄËíµÀÊý¾Ý°ü¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬ £¬£¬£¬ÔÚÍøÂç²ãÃæÊµÑéÁ÷Á¿¹ýÂË¡¢Éî¶È°ü¼ì²é £¬£¬£¬£¬ £¬£¬£¬²¢×èÖ¹ËùÓÐδ¼ÓÃܵÄËíµÀÊý¾Ý°ü¡£¡£¡£¡£


https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html


3. з¢Ã÷ÎïÁªÍø½©Ê¬ÍøÂçÈ«Çò²ß»®DDoS¹¥»÷


1ÔÂ20ÈÕ £¬£¬£¬£¬ £¬£¬£¬×Ô2024Äêµ×ÒÔÀ´ £¬£¬£¬£¬ £¬£¬£¬Ò»¸öз¢Ã÷µÄÎïÁªÍø(IoT)½©Ê¬ÍøÂçÔÚÈ«Çò¹æÄ£Äڲ߻®´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷ £¬£¬£¬£¬ £¬£¬£¬Ö÷ҪʹÓ÷ÓÉÆ÷¡¢IPÉãÏñÍ·µÈÎïÁªÍø×°±¸ÖеÄÎó²î¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÁ¬ÏµÁËMiraiºÍBashlite¶ñÒâÈí¼þ £¬£¬£¬£¬ £¬£¬£¬Í¨¹ýÔ¶³Ì´úÂëÖ´ÐÐÎó²î»ò±©Á¦ÆÆ½âÈõÃÜÂëѬȾװ±¸ £¬£¬£¬£¬ £¬£¬£¬Ñ¬È¾Àú³Ì°üÀ¨ÉøÍ¸¡¢¸ºÔØ×ª´ïºÍÅþÁ¬µ½ÏÂÁîÓë¿ØÖÆ(C&C)ЧÀÍÆ÷ÎüÊÕ¹¥»÷ÏÂÁî¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç½ÓÄɶàÖÖDDoS¹¥»÷ǰÑÔ £¬£¬£¬£¬ £¬£¬£¬ÈçSYNºéË®¡¢UDPºéË®¡¢GREЭÒéÎó²îºÍTCPÎÕÊÖºéË®µÈ £¬£¬£¬£¬ £¬£¬£¬¶ÔÈ«Çò½ðÈÚ¡¢½»Í¨ºÍµçÐŵÈÐÐÒµ×é³ÉÖØ´óÍþв £¬£¬£¬£¬ £¬£¬£¬±±ÃÀºÍÅ·ÖÞÓÈÆäÊÇÃÀ¹úºÍÈÕ±¾Êܵ½ÑÏÖØÓ°Ïì¡£¡£¡£¡£ÊÜѬȾµÄ×°±¸´ó²¿·ÖÊÇÎÞÏß·ÓÉÆ÷ºÍIPÉãÏñÍ· £¬£¬£¬£¬ £¬£¬£¬TP-LinkºÍZyxelµÈÆ·ÅÆÒòÆäÆÕ±éʹÓúÍÒÑÖªÎó²î¶øÆµÈÔÊܵ½¹¥»÷¡£¡£¡£¡£ÎªÁË×èÖ¹±»·¢Ã÷ £¬£¬£¬£¬ £¬£¬£¬¸Ã¶ñÒâÈí¼þ»á½ûÓÃÊÜѬȾÉè±¹ØÁ¬Ä¿´ÃŹ·¼ÆÊ±Æ÷ºÍʹÓÃiptables¹æÔò¡£¡£¡£¡£×¨¼Ò½¨Òé½ÓÄɸü¸ÄĬÈÏÃÜÂë¡¢°´ÆÚ¸üй̼þ¡¢¸ôÀëÎïÁªÍø×°±¸¡¢½ÓÄÉÈëÇÖ¼ì²âϵͳºÍÓëЧÀÍÌṩÉÌÏàÖú¹ýÂ˶ñÒâÁ÷Á¿µÈ²½·¥À´½µµÍѬȾΣº¦¡£¡£¡£¡£


https://cybersecuritynews.com/new-iot-botnet-launching-large-scale-ddos-attacks/#google_vignette


4. ANWSDÍøÂçÇå¾²ÊÂÎñͨ¸æ¼°Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»£»£» £»¤²½·¥


1ÔÂ21ÈÕ £¬£¬£¬£¬ £¬£¬£¬°¬µÏÉ­Î÷±±Ñ§Çø£¨ANWSD£©½üÆÚÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ £¬£¬£¬£¬ £¬£¬£¬ÆäÖÐһ̨´æ´¢2008ÄêÖÁ2022ÄêÔ±¹¤¼Í¼µÄ¾ÉÈËΪϵͳЧÀÍÆ÷±»ÈëÇÖ¡£¡£¡£¡£Ö»¹ÜÕâЩÐÅÏ¢²¢·ÇÒÔÒ×ÓÚ»á¼ûµÄÃûÌô洢 £¬£¬£¬£¬ £¬£¬£¬µ«°üÀ¨Éç»áÇå¾²ºÅÂëºÍÖ±½Ó´æ¿îÒøÐеÈÃô¸ÐÊý¾Ý £¬£¬£¬£¬ £¬£¬£¬Òò´ËANWSD¼ÙÉèËùÓÐÎļþ¿ÉÄÜÒÑ̻¶¡£¡£¡£¡£ÎªÓ¦¶Ô´ËÊÂÎñ £¬£¬£¬£¬ £¬£¬£¬ANWSDÐû²¼ÁËÇåÎúͨ¸æ £¬£¬£¬£¬ £¬£¬£¬²¢ÌṩÁ˶àÏÒéÒÔ±£»£»£» £»¤ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬°üÀ¨¼ÓÈëÐÅÓÃ¼à¿ØÐ§ÀÍ¡¢Ë÷È¡Ãâ·ÑÐÅÓñ¨¸æ¡¢¼à¿Ø²ÆÎñÕË»§¡¢ÆôÓÃڲƭ¾¯±¨ÒÔ¼°¸ü¸ÄÃÜÂëµÈ¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬ £¬£¬£¬ANWSD»¹ÌṩÁËÁª°îÉÌҵίԱ»áÍøÕ¾www.IdentityTheft.gov×÷Ϊ»ñÈ¡¸ü¶à±£»£»£» £»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄ×ÊÔ´¡£¡£¡£¡£ANWSD¶Ô´Ë´ÎÊÂÎñ¿ÉÄÜ´øÀ´µÄδ±ã»òµ£ÐÄÌåÏÖǸÒâ £¬£¬£¬£¬ £¬£¬£¬²¢ÃãÀøÓÐÒÉÎÊ»òÐèÒª×ÊÖúµÄСÎÒ˽¼ÒÁªÏµ²ÆÎñºÍÔËÓª×ܼàElizabeth Jennings¡£¡£¡£¡£ANWSDÕýÔÚÆð¾¢Ó¦¶Ô´ËÇéÐÎ £¬£¬£¬£¬ £¬£¬£¬²¢Æð¾¢È·±£ÀàËÆÊÂÎñ²»ÔÙ±¬·¢¡£¡£¡£¡£


https://databreaches.net/2025/01/21/cybersecurity-incident-impacting-addison-northwest-school-district-anwsd/


5. ConduentÔâÍøÂç¹¥»÷ÖÂÓªÒµÖÐÖ¹ £¬£¬£¬£¬ £¬£¬£¬Ó°Ïì¶àÖÝÕþ¸®Ð§ÀÍ


1ÔÂ22ÈÕ £¬£¬£¬£¬ £¬£¬£¬Õþ¸®ÊÖÒճаüÉÌConduent½üÆÚÔâÓöÁËÒ»´ÎÓÉÍøÂç¹¥»÷Òý·¢µÄÍ£µçÊÂÎñ £¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÆÆËðÁËÆä²Ù×÷ϵͳ¡£¡£¡£¡£¾ÝConduent½²»°ÈË͸¶ £¬£¬£¬£¬ £¬£¬£¬´Ë´ÎÈëÇÖÒÑѸËÙ»ñµÃ¿ØÖÆ £¬£¬£¬£¬ £¬£¬£¬²¢¾­µÚÈý·½Ç徲ר¼ÒÈ·ÈÏ £¬£¬£¬£¬ £¬£¬£¬ÊÖÒÕÇéÐÎÏÖÔÚÎÞÒÑÖª¶ñÒâ»î¶¯¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬ £¬£¬£¬ÑÏ¿áµÄ»Ö¸´Àú³Ìµ¼Ö¹«Ë¾¶àÏîÓªÒµÖÐÖ¹ÊýÈÕ £¬£¬£¬£¬ £¬£¬£¬Ó°ÏìÁ˰üÀ¨Ò½ÁƽòÌù¡¢¶ùͯ¸§Óý¡¢Ê³ÎïÔ®ÖúµÈÍýÏëÔÚÄÚµÄÕþ¸®Ð§ÀÍ¡£¡£¡£¡£Íþ˹¿µÐÇÖÝÊÇÊÜÓ°ÏìµÄÖÝÖ®Ò» £¬£¬£¬£¬ £¬£¬£¬×¡ÃñËß¿àÒòϵͳ¹ÊÕÏÎÞ·¨Ö§¸¶Óöȡ£¡£¡£¡£ÏµÍ³ÓÚÖÜÈÕ»Ö¸´ £¬£¬£¬£¬ £¬£¬£¬ConduentÌṩÁËÌØÊâÊÂÇéְԱЭÖú´¦Öóͷ£ÑÓ³Ù¸¶¿î¡£¡£¡£¡£Ö»¹ÜÓÐËĸöÖÝÊܵ½Ó°Ïì £¬£¬£¬£¬ £¬£¬£¬µ«Conduentδ͸¶ÆäËûÊÜÓ°ÏìÖݵÄÐÅÏ¢¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬ £¬£¬£¬ConduentÓë°¢À­Ë¹¼ÓÖÝÇ©ÊðÁË9200ÍòÃÀÔªµÄÌõÔ¼ £¬£¬£¬£¬ £¬£¬£¬ÓÃÓÚÒ½ÁƽòÌùÖÎÀíÐÅϢϵͳµÄÏÖ´ú»¯Ë¢Ð¡¢ÔËÓªºÍÖÎÀí¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬ £¬£¬£¬ConduentÔÚ2020ÄêÔøÔâÊÜÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¸Ã¹«Ë¾Ã¿Äê´¦Öóͷ£Ô¼1000ÒÚÃÀÔªµÄÕþ¸®¿î×Ó £¬£¬£¬£¬ £¬£¬£¬ÉÏÒ»²Æ¼¾ÓªÊÕÁè¼Ý8ÒÚÃÀÔª¡£¡£¡£¡£


https://therecord.media/government-contractor-conduent-outage-compromise


6. Google¹ã¸æÔâºÚ¿ÍÀÄÓÃÈö²¥¶ñÒâÈí¼þ £¬£¬£¬£¬ £¬£¬£¬HomebrewÓû§ÐèСÐÄ


1ÔÂ21ÈÕ £¬£¬£¬£¬ £¬£¬£¬ºÚ¿ÍʹÓÃGoogle¹ã¸æÈö²¥¶ñÒâÈí¼þ £¬£¬£¬£¬ £¬£¬£¬Í¨¹ýÐéαµÄHomebrewÍøÕ¾Ñ¬È¾MacºÍLinux×°±¸ £¬£¬£¬£¬ £¬£¬£¬²¢ÇÔÈ¡Óû§µÄƾ֤¡¢ä¯ÀÀÆ÷Êý¾ÝºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£´Ë´Î¶ñÒâ¹ã¸æ»î¶¯ÖÐʹÓõĶñÒâÈí¼þÊÇAmosStealer£¨ÓÖÃû¡°Atomic¡±£© £¬£¬£¬£¬ £¬£¬£¬ÕâÊÇÒ»ÖÖרΪmacOSϵͳÉè¼ÆµÄÐÅÏ¢ÇÔÈ¡³ÌÐò £¬£¬£¬£¬ £¬£¬£¬Ã¿ÔÂÒÔ1000ÃÀÔªµÄ¼ÛÇ®³öÊÛ¸øÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¹¥»÷ÕßʹÓÃURLÊÖÒÕ £¬£¬£¬£¬ £¬£¬£¬ÔÚGoogle¹ã¸æÖÐÏÔʾ׼ȷµÄHomebrew URL £¬£¬£¬£¬ £¬£¬£¬ÓÕÆ­Óû§µã»÷ÖØ¶¨Ïòµ½ÐéαµÄHomebrewÍøÕ¾ £¬£¬£¬£¬ £¬£¬£¬µ±Óû§ÔËÐÐÐéÎ±ÍøÕ¾ÏÔʾµÄÏÂÁîʱ £¬£¬£¬£¬ £¬£¬£¬×°±¸¾Í»áÏÂÔØ²¢Ö´ÐжñÒâÈí¼þ¡£¡£¡£¡£HomebrewÏîÄ¿ÈÏÕæÈËÆ·ÆÀ¹È¸èȱ·¦Éó²é £¬£¬£¬£¬ £¬£¬£¬Ç¿µ÷´ËÇéÐÎÒÑÁè¼ÝÆä¿ØÖƹæÄ£¡£¡£¡£¡£ËäÈ»¶ñÒâ¹ã¸æÒѱ»É¾³ý £¬£¬£¬£¬ £¬£¬£¬µ«¸Ã»î¶¯¿ÉÄÜ»áͨ¹ýÆäËûÖØ¶¨ÏòÓò¼ÌÐø¾ÙÐÐ £¬£¬£¬£¬ £¬£¬£¬Òò´ËHomebrewÓû§ÐèҪСÐÄ¡£¡£¡£¡£ÎªÁ˽µµÍѬȾΣº¦ £¬£¬£¬£¬ £¬£¬£¬Óû§Ó¦È·±£µã»÷GoogleÁ´½ÓºóµÖ´ïµÄÊÇÏîÄ¿»ò¹«Ë¾µÄÕýµ±ÍøÕ¾ £¬£¬£¬£¬ £¬£¬£¬²¢½«³£ÓÃÍøÕ¾Ìí¼Óµ½ÊéÇ©ÖÐÒÔ»ñÈ¡Èí¼þ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/