Willow PaysÊý¾Ý¿âÔâй¶£¬£¬£¬£¬£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢ÆØ¹â
Ðû²¼Ê±¼ä 2025-01-221. Willow PaysÊý¾Ý¿âÔâй¶£¬£¬£¬£¬£¬24ÍòÓû§Ãô¸ÐÐÅÏ¢ÆØ¹â
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Jeremiah Fowler×î½ü·¢Ã÷Ò»¸öδÊÜÃÜÂë±£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÃÀ¹ú½ðÈڿƼ¼Õ˵¥Ö§¸¶Æ½Ì¨Willow PaysµÄ240,000¶àÌõÃô¸Ð¼Í¼£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÐÅÓöî¶ÈºÍÄÚ²¿Õ˵¥ÏêϸÐÅÏ¢µÈ¡£¡£¡£¡£¡£Willow PaysÔÊÐíÓû§ÔÚÖÜΧÄÚÖ§¸¶Õ˵¥ºÍÆäËûÓöȣ¬£¬£¬£¬£¬µ«¸ÃÊý¾Ý¿âȴȱ·¦ÃÜÂë±£»£»¤»ò¼ÓÃÜ£¬£¬£¬£¬£¬Ê¹µÃÕâЩÐÅÏ¢ÈÝÒ×±»Ð¹Â¶¡£¡£¡£¡£¡£ËäÈ»Éв»ÇåÎúÏÖʵÊý¾Ýй¶µÄˮƽ£¬£¬£¬£¬£¬µ«FowlerÒÔΪÕâЩÐÅÏ¢¿ÉÄܻᱻ·¸·¨·Ö×ÓÓÃÓÚÍøÂç´¹ÂÚ¹¥»÷»òδ¾ÊÚȨ»á¼ûÆäËûÕË»§¡£¡£¡£¡£¡£FowlerÏòWillow Pays·¢³öÁËÒ»·ÝÈÏÕæÈεÄÅû¶֪ͨ£¬£¬£¬£¬£¬ºóÕßÁ¬Ã¦Õ¥È¡Á˹«ÖÚ¶Ô¸ÃÊý¾Ý¿âµÄ»á¼û¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñ͹ÏÔÁ˽ðÈÚ»ú¹¹ÃæÁÙµÄÍøÂç¹¥»÷ÍþвÈÕÒæÔöÌí£¬£¬£¬£¬£¬Ç徲ר¼ÒÇ¿µ÷½ðÈÚÈí¼þÌṩÉÌÐèҪʵÑéÓÐÓõÄÍøÂçÇå¾²²½·¥£¬£¬£¬£¬£¬°üÀ¨¼ÓÃÜÃô¸ÐÊý¾Ý¡¢°´ÆÚ¾ÙÐÐÇå¾²Éó¼ÆÒÔ¼°½ÓÄɶàÒòËØÉí·ÝÑéÖ¤µÈ£¬£¬£¬£¬£¬ÒÔ±ÜÃâÔÚÏß½ðÈÚڲơ£¡£¡£¡£¡£
https://hackread.com/fintech-bill-pay-willow-pays-exposes-240000-records/
2. ¶àÖÖËíµÀÐÒéÇå¾²Îó²îÆØ¹â£¬£¬£¬£¬£¬420Íǫ̀Ö÷»úÃæÁÙ¹¥»÷Σº¦
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬ÐÂÑо¿ÏÔʾ£¬£¬£¬£¬£¬¶àÖÖËíµÀÐÒé±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬¿ÉÄÜʹ¹¥»÷ÕßʵÑé¶àÖÖ¹¥»÷¡£¡£¡£¡£¡£Top10VPNÓë³ãë´óѧ½ÌÊÚÂíµÙ¡¤·¶»ô·òÏàÖúµÄÑо¿Ö¸³ö£¬£¬£¬£¬£¬ÈôÍøÂçÖ÷»ú½ÓÊÜËíµÀÊý¾Ý°ü¶ø²»ÑéÖ¤·¢ËÍÕßÉí·Ý£¬£¬£¬£¬£¬Ôò¿ÉÄܱ»Ð®ÖÆÖ´ÐÐÄäÃû¹¥»÷²¢»ñµÃÍøÂç»á¼ûȨÏÞ¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬¶à´ï420Íǫ̀Ö÷»úÒ×Êܹ¥»÷£¬£¬£¬£¬£¬°üÀ¨VPN¡¢ISP¼Òͥ·ÓÉÆ÷¡¢½¹µã»¥ÁªÍøÂ·ÓÉÆ÷¡¢Òƶ¯ÍøÂçÍø¹ØºÍCDN½Úµã£¬£¬£¬£¬£¬ÊÜÓ°Ïì×îÑÏÖØµÄ¹ú¼Ò°üÀ¨Öйú¡¢·¨¹ú¡¢ÈÕ±¾¡¢ÃÀ¹úºÍ°ÍÎ÷¡£¡£¡£¡£¡£ÕâЩÎó²îÔÊÐí¹¥»÷ÕßÀÄÓÃÒ×Êܹ¥»÷µÄϵͳ×÷Ϊµ¥ÏòÊðÀí£¬£¬£¬£¬£¬²¢·¢¶¯DoS¹¥»÷¡£¡£¡£¡£¡£CERTе÷ÖÐÐÄÖ¸³ö£¬£¬£¬£¬£¬¹¥»÷Õß»¹¿ÉαÔìÔ´IPv4/6µØµã£¬£¬£¬£¬£¬»á¼û˽ÓÐÍøÂç»ò·¢¶¯DDoS¹¥»÷¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚËíµÀÐÒéÈçIP6IP6¡¢GRE6µÈȱ·¦×ã¹»µÄÇå¾²ÐÒ飬£¬£¬£¬£¬ÈçIPsec£¬£¬£¬£¬£¬²î³ØÁ÷Á¿¾ÙÐÐÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ¡£¡£¡£¡£¡£ÕâЩÐÒéÒѱ»·ÖÅÉÁËÏìÓ¦µÄCVE±àºÅ¡£¡£¡£¡£¡£×÷Ϊ·ÀÓù²½·¥£¬£¬£¬£¬£¬½¨ÒéʹÓÃIPSec»òWireGuardÌṩÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ£¬£¬£¬£¬£¬²¢½ö½ÓÊÜÀ´×Ô¿ÉÐÅÔ´µÄËíµÀÊý¾Ý°ü¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ÔÚÍøÂç²ãÃæÊµÑéÁ÷Á¿¹ýÂË¡¢Éî¶È°ü¼ì²é£¬£¬£¬£¬£¬²¢×èÖ¹ËùÓÐδ¼ÓÃܵÄËíµÀÊý¾Ý°ü¡£¡£¡£¡£¡£
https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html
3. з¢Ã÷ÎïÁªÍø½©Ê¬ÍøÂçÈ«Çò²ß»®DDoS¹¥»÷
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬×Ô2024Äêµ×ÒÔÀ´£¬£¬£¬£¬£¬Ò»¸öз¢Ã÷µÄÎïÁªÍø(IoT)½©Ê¬ÍøÂçÔÚÈ«Çò¹æÄ£Äڲ߻®´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷£¬£¬£¬£¬£¬Ö÷ҪʹÓ÷ÓÉÆ÷¡¢IPÉãÏñÍ·µÈÎïÁªÍø×°±¸ÖеÄÎó²î¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÁ¬ÏµÁËMiraiºÍBashlite¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Í¨¹ýÔ¶³Ì´úÂëÖ´ÐÐÎó²î»ò±©Á¦ÆÆ½âÈõÃÜÂëѬȾװ±¸£¬£¬£¬£¬£¬Ñ¬È¾Àú³Ì°üÀ¨ÉøÍ¸¡¢¸ºÔØ×ª´ïºÍÅþÁ¬µ½ÏÂÁîÓë¿ØÖÆ(C&C)ЧÀÍÆ÷ÎüÊÕ¹¥»÷ÏÂÁî¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç½ÓÄɶàÖÖDDoS¹¥»÷ǰÑÔ£¬£¬£¬£¬£¬ÈçSYNºéË®¡¢UDPºéË®¡¢GREÐÒéÎó²îºÍTCPÎÕÊÖºéË®µÈ£¬£¬£¬£¬£¬¶ÔÈ«Çò½ðÈÚ¡¢½»Í¨ºÍµçÐŵÈÐÐÒµ×é³ÉÖØ´óÍþв£¬£¬£¬£¬£¬±±ÃÀºÍÅ·ÖÞÓÈÆäÊÇÃÀ¹úºÍÈÕ±¾Êܵ½ÑÏÖØÓ°Ïì¡£¡£¡£¡£¡£ÊÜѬȾµÄ×°±¸´ó²¿·ÖÊÇÎÞÏß·ÓÉÆ÷ºÍIPÉãÏñÍ·£¬£¬£¬£¬£¬TP-LinkºÍZyxelµÈÆ·ÅÆÒòÆäÆÕ±éʹÓúÍÒÑÖªÎó²î¶øÆµÈÔÊܵ½¹¥»÷¡£¡£¡£¡£¡£ÎªÁË×èÖ¹±»·¢Ã÷£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»á½ûÓÃÊÜѬȾÉè±¹ØÁ¬Ä¿´ÃŹ·¼ÆÊ±Æ÷ºÍʹÓÃiptables¹æÔò¡£¡£¡£¡£¡£×¨¼Ò½¨Òé½ÓÄɸü¸ÄĬÈÏÃÜÂë¡¢°´ÆÚ¸üй̼þ¡¢¸ôÀëÎïÁªÍø×°±¸¡¢½ÓÄÉÈëÇÖ¼ì²âϵͳºÍÓëЧÀÍÌṩÉÌÏàÖú¹ýÂ˶ñÒâÁ÷Á¿µÈ²½·¥À´½µµÍѬȾΣº¦¡£¡£¡£¡£¡£
https://cybersecuritynews.com/new-iot-botnet-launching-large-scale-ddos-attacks/#google_vignette
4. ANWSDÍøÂçÇå¾²ÊÂÎñͨ¸æ¼°Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»£»¤²½·¥
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬°¬µÏÉÎ÷±±Ñ§Çø£¨ANWSD£©½üÆÚÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬ÆäÖÐһ̨´æ´¢2008ÄêÖÁ2022ÄêÔ±¹¤¼Í¼µÄ¾ÉÈËΪϵͳЧÀÍÆ÷±»ÈëÇÖ¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÐÅÏ¢²¢·ÇÒÔÒ×ÓÚ»á¼ûµÄÃûÌô洢£¬£¬£¬£¬£¬µ«°üÀ¨Éç»áÇå¾²ºÅÂëºÍÖ±½Ó´æ¿îÒøÐеÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬Òò´ËANWSD¼ÙÉèËùÓÐÎļþ¿ÉÄÜÒÑ̻¶¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´ËÊÂÎñ£¬£¬£¬£¬£¬ANWSDÐû²¼ÁËÇåÎúͨ¸æ£¬£¬£¬£¬£¬²¢ÌṩÁ˶àÏÒéÒÔ±£»£»¤ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨¼ÓÈëÐÅÓÃ¼à¿ØÐ§ÀÍ¡¢Ë÷È¡Ãâ·ÑÐÅÓñ¨¸æ¡¢¼à¿Ø²ÆÎñÕË»§¡¢ÆôÓÃڲƾ¯±¨ÒÔ¼°¸ü¸ÄÃÜÂëµÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ANWSD»¹ÌṩÁËÁª°îÉÌҵίԱ»áÍøÕ¾www.IdentityTheft.gov×÷Ϊ»ñÈ¡¸ü¶à±£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄ×ÊÔ´¡£¡£¡£¡£¡£ANWSD¶Ô´Ë´ÎÊÂÎñ¿ÉÄÜ´øÀ´µÄδ±ã»òµ£ÐÄÌåÏÖǸÒ⣬£¬£¬£¬£¬²¢ÃãÀøÓÐÒÉÎÊ»òÐèÒª×ÊÖúµÄСÎÒ˽¼ÒÁªÏµ²ÆÎñºÍÔËÓª×ܼàElizabeth Jennings¡£¡£¡£¡£¡£ANWSDÕýÔÚÆð¾¢Ó¦¶Ô´ËÇéÐΣ¬£¬£¬£¬£¬²¢Æð¾¢È·±£ÀàËÆÊÂÎñ²»ÔÙ±¬·¢¡£¡£¡£¡£¡£
https://databreaches.net/2025/01/21/cybersecurity-incident-impacting-addison-northwest-school-district-anwsd/
5. ConduentÔâÍøÂç¹¥»÷ÖÂÓªÒµÖÐÖ¹£¬£¬£¬£¬£¬Ó°Ïì¶àÖÝÕþ¸®Ð§ÀÍ
1ÔÂ22ÈÕ£¬£¬£¬£¬£¬Õþ¸®ÊÖÒճаüÉÌConduent½üÆÚÔâÓöÁËÒ»´ÎÓÉÍøÂç¹¥»÷Òý·¢µÄÍ£µçÊÂÎñ£¬£¬£¬£¬£¬¹¥»÷ÆÆËðÁËÆä²Ù×÷ϵͳ¡£¡£¡£¡£¡£¾ÝConduent½²»°ÈË͸¶£¬£¬£¬£¬£¬´Ë´ÎÈëÇÖÒÑѸËÙ»ñµÃ¿ØÖÆ£¬£¬£¬£¬£¬²¢¾µÚÈý·½Ç徲ר¼ÒÈ·ÈÏ£¬£¬£¬£¬£¬ÊÖÒÕÇéÐÎÏÖÔÚÎÞÒÑÖª¶ñÒâ»î¶¯¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÑÏ¿áµÄ»Ö¸´Àú³Ìµ¼Ö¹«Ë¾¶àÏîÓªÒµÖÐÖ¹ÊýÈÕ£¬£¬£¬£¬£¬Ó°ÏìÁ˰üÀ¨Ò½ÁƽòÌù¡¢¶ùͯ¸§Óý¡¢Ê³ÎïÔ®ÖúµÈÍýÏëÔÚÄÚµÄÕþ¸®Ð§ÀÍ¡£¡£¡£¡£¡£Íþ˹¿µÐÇÖÝÊÇÊÜÓ°ÏìµÄÖÝÖ®Ò»£¬£¬£¬£¬£¬×¡ÃñËß¿àÒòϵͳ¹ÊÕÏÎÞ·¨Ö§¸¶Óöȡ£¡£¡£¡£¡£ÏµÍ³ÓÚÖÜÈÕ»Ö¸´£¬£¬£¬£¬£¬ConduentÌṩÁËÌØÊâÊÂÇéÖ°Ô±ÐÖú´¦Öóͷ£ÑÓ³Ù¸¶¿î¡£¡£¡£¡£¡£Ö»¹ÜÓÐËĸöÖÝÊܵ½Ó°Ï죬£¬£¬£¬£¬µ«Conduentδ͸¶ÆäËûÊÜÓ°ÏìÖݵÄÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ConduentÓë°¢À˹¼ÓÖÝÇ©ÊðÁË9200ÍòÃÀÔªµÄÌõÔ¼£¬£¬£¬£¬£¬ÓÃÓÚÒ½ÁƽòÌùÖÎÀíÐÅϢϵͳµÄÏÖ´ú»¯Ë¢Ð¡¢ÔËÓªºÍÖÎÀí¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ConduentÔÚ2020ÄêÔøÔâÊÜÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã¿Äê´¦Öóͷ£Ô¼1000ÒÚÃÀÔªµÄÕþ¸®¿î×Ó£¬£¬£¬£¬£¬ÉÏÒ»²Æ¼¾ÓªÊÕÁè¼Ý8ÒÚÃÀÔª¡£¡£¡£¡£¡£
https://therecord.media/government-contractor-conduent-outage-compromise
6. Google¹ã¸æÔâºÚ¿ÍÀÄÓÃÈö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬£¬HomebrewÓû§ÐèСÐÄ
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃGoogle¹ã¸æÈö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Í¨¹ýÐéαµÄHomebrewÍøÕ¾Ñ¬È¾MacºÍLinux×°±¸£¬£¬£¬£¬£¬²¢ÇÔÈ¡Óû§µÄƾ֤¡¢ä¯ÀÀÆ÷Êý¾ÝºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£¡£´Ë´Î¶ñÒâ¹ã¸æ»î¶¯ÖÐʹÓõĶñÒâÈí¼þÊÇAmosStealer£¨ÓÖÃû¡°Atomic¡±£©£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖרΪmacOSϵͳÉè¼ÆµÄÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬Ã¿ÔÂÒÔ1000ÃÀÔªµÄ¼ÛÇ®³öÊÛ¸øÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃURLÊÖÒÕ£¬£¬£¬£¬£¬ÔÚGoogle¹ã¸æÖÐÏÔʾ׼ȷµÄHomebrew URL£¬£¬£¬£¬£¬ÓÕÆÓû§µã»÷ÖØ¶¨Ïòµ½ÐéαµÄHomebrewÍøÕ¾£¬£¬£¬£¬£¬µ±Óû§ÔËÐÐÐéÎ±ÍøÕ¾ÏÔʾµÄÏÂÁîʱ£¬£¬£¬£¬£¬×°±¸¾Í»áÏÂÔØ²¢Ö´ÐжñÒâÈí¼þ¡£¡£¡£¡£¡£HomebrewÏîÄ¿ÈÏÕæÈËÆ·ÆÀ¹È¸èȱ·¦Éó²é£¬£¬£¬£¬£¬Ç¿µ÷´ËÇéÐÎÒÑÁè¼ÝÆä¿ØÖƹæÄ£¡£¡£¡£¡£¡£ËäÈ»¶ñÒâ¹ã¸æÒѱ»É¾³ý£¬£¬£¬£¬£¬µ«¸Ã»î¶¯¿ÉÄÜ»áͨ¹ýÆäËûÖØ¶¨ÏòÓò¼ÌÐø¾ÙÐУ¬£¬£¬£¬£¬Òò´ËHomebrewÓû§ÐèҪСÐÄ¡£¡£¡£¡£¡£ÎªÁ˽µµÍѬȾΣº¦£¬£¬£¬£¬£¬Óû§Ó¦È·±£µã»÷GoogleÁ´½ÓºóµÖ´ïµÄÊÇÏîÄ¿»ò¹«Ë¾µÄÕýµ±ÍøÕ¾£¬£¬£¬£¬£¬²¢½«³£ÓÃÍøÕ¾Ìí¼Óµ½ÊéÇ©ÖÐÒÔ»ñÈ¡Èí¼þ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/


¾©¹«Íø°²±¸11010802024551ºÅ