ResecurityÃÛ¹ÞÏÝÚå½ÒÆÆÍøÂç¹¥»÷ÕæÏà
Ðû²¼Ê±¼ä 2026-01-041. ResecurityÃÛ¹ÞÏÝÚå½ÒÆÆÍøÂç¹¥»÷ÕæÏà
1ÔÂ3ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ResecurityÓë¡°ÊèÉ¢µÄÎó²îÁÔÈË¡±£¨SLH£©ÍþвÐÐΪÕßÖ®¼äµÄ¹¥·ÀÊÂÎñÒý·¢¹Ø×¢¡£¡£¡£SLHÐû³ÆÒÑÀÖ³ÉÈëÇÖResecurityϵͳ²¢ÇÔȡԱ¹¤Êý¾Ý¡¢ÄÚ²¿Í¨Ñ¶¡¢ÍþвÇ鱨±¨¸æ¼°¿Í»§ÐÅÏ¢£¬£¬£¬£¬°üÀ¨MattermostÐ×÷ʵÀý½ØÍ¼ÏÔʾÓëPastebinµÄ¶ñÒâÄÚÈÝͨѶ£¬£¬£¬£¬²¢Éù³Æ´Ë´Î¹¥»÷ÊǶÔResecurityÉç»á¹¤³ÌÊֶεÄÅê»÷£¬£¬£¬£¬Éæ¼°ShinyHunters¡¢Lapsus$µÈ×éÖ¯¡£¡£¡£È»¶ø£¬£¬£¬£¬ShinyHunters½²»°ÈËËæºó·ñ¶¨¼ÓÈë´Ë´Î»î¶¯¡£¡£¡£Resecurity¶Ô´Ë»ØÓ¦³Æ£¬£¬£¬£¬±»¹¥»÷µÄϵͳʵΪ¾ÓÐݲÅŵÄÃÛ¹Þ£¬£¬£¬£¬ÓÃÓÚ¼à¿ØÍþвÐÐΪÕ߻¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬2025Äê11ÔÂ21ÈÕÊ״μì²âµ½ÍþвÐÐΪÕß̽²âÆä¹ûÕæÌ»Â¶ÏµÍ³£¬£¬£¬£¬ËæºóÔÚ¸ôÀëÇéÐÎÖа²ÅŰüÀ¨ÐéαÊý¾ÝµÄÃÛ¹ÞÕË»§£¬£¬£¬£¬°üÀ¨ÓÉStripe APIÌìÉúµÄ28,000ÌõºÏ³ÉÏûºÄÕ߼ͼºÍ190,000ÌõºÏ³ÉÖ§¸¶ÉúÒâ¼Í¼¡£¡£¡£¹¥»÷ÕßÔÚ12ÔÂ12ÈÕÖÁ24ÈÕʱ´úͨ¹ý´ó×ÚסլÊðÀíIPÌìÉú³¬188,000¸öÇëÇ󣬣¬£¬£¬Ê±´úÒòÊðÀíÅþÁ¬¹ÊÕÏÌ»Â¶ÕæÊµIPµØµã£¬£¬£¬£¬Resecurity½è´ËÍøÂç¹¥»÷ÕßÕ½Êõ¡¢ÊÖÒÕ¼°»ù´¡ÉèÊ©ÐÅÏ¢£¬£¬£¬£¬²¢±¨¸æÖ´·¨²¿·Ö¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/
2. RondoDox½©Ê¬ÍøÂç½èReact2ShellÎó²îÌᳫȫÇò¹¥»÷
12ÔÂ31ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Õ¹ÏÖ£¬£¬£¬£¬RondoDox½©Ê¬ÍøÂçÕýʹÓÃReact2ShellÑÏÖØÎó²î£¨CVE-2025-55182£©´ó¹æÄ£Ñ¬È¾Next.jsЧÀÍÆ÷£¬£¬£¬£¬°²ÅŶñÒâÈí¼þ¼°¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¡£¡£¡£¸ÃÎó²îΪδ¾ÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬¿Éͨ¹ýµ¥¸öHTTPÇëÇó´¥·¢£¬£¬£¬£¬Ó°ÏìËùÓÐʵÏÖReact Server Components¡°Flight¡±ÐÒéµÄ¿ò¼Ü£¬£¬£¬£¬°üÀ¨Next.js¡£¡£¡£×èÖ¹2025Äê12ÔÂ30ÈÕ£¬£¬£¬£¬Shadowserver»ù½ð»áÒѼì²âµ½³¬94,000¸ö̻¶ÓÚ»¥ÁªÍøµÄÒ×Êܹ¥»÷×ʲú¡£¡£¡£RondoDox×îÔçÓÉFortinetÓÚ2025Äê7Լͼ£¬£¬£¬£¬ÊÇÒ»¸öʹÓöànÌìÎó²îÌᳫȫÇò¹¥»÷µÄ´óÐͽ©Ê¬ÍøÂç¡£¡£¡£Æä2025ÄêÔËÓª·ÖΪÈý¸ö½×¶Î£º3ÔÂÖÁ4Ô¾ÙÐÐÕì̽ÓëÎó²î²âÊÔ£»£»£»4ÔÂÖÁ6ÔÂʵÑé×Ô¶¯»¯WebÓ¦ÓÃÎó²îʹÓ㻣»£»7ÔÂÖÁ½ñÔòתÏò´ó¹æÄ£ÎïÁªÍø½©Ê¬ÍøÂç°²ÅÅ¡£¡£¡£11Ô£¬£¬£¬£¬VulnCheck·¢Ã÷ÆäбäÖÖʹÓÃXWikiƽ̨µÄCVE-2025-24893Îó²î¡£¡£¡£CloudSEK±¨¸æÖ¸³ö£¬£¬£¬£¬RondoDox×Ô12ÔÂ8ÈÕÆðɨÃè±£´æÎó²îµÄNext.jsЧÀÍÆ÷£¬£¬£¬£¬ÈýÌìºó×îÏȰ²ÅŽ©Ê¬ÍøÂç¿Í»§¶Ë£¬£¬£¬£¬²¢ÔÚ12ÔÂÁùÌìÄÚÌᳫ³¬40´Î¹¥»÷ʵÑ飬£¬£¬£¬Ã¿Ð¡Ê±Õë¶ÔLinksys¡¢WavlinkµÈÏûºÄ¼¶¼°ÆóÒµ¼¶Â·ÓÉÆ÷ÌᳫÎïÁªÍø¹¥»÷À˳±£¬£¬£¬£¬ÒÔÕÐļн©Ê¬½Úµã¡£¡£¡£
https://www.bleepingcomputer.com/news/security/rondodox-botnet-exploits-react2shell-flaw-to-breach-nextjs-servers/
3. Covenant HealthÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷
1ÔÂ3ÈÕ£¬£¬£¬£¬ÌìÖ÷½ÌÒ½ÁÆ»ú¹¹Covenant HealthÓÚ2025Äê5ÔÂÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂ478,188ÈËÃô¸ÐÐÅϢй¶£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Ò½ÁƼͼºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢¿µ½¡°ü¹ÜÐÅÏ¢¼°ÖÎÁÆÏêÇéµÈ¡£¡£¡£¸Ã×éÖ¯ÔÚÃåÒòÖÝ¡¢ÂíÈøÖîÈûÖÝ¡¢Ðº±²¼Ê²¶ûÖÝ¡¢±öϦ·¨ÄáÑÇÖÝ¡¢Â޵µºÖݺͷðÃÉÌØÖÝÔËÓªÈý¼ÒÒ½Ôº¼°¶à¼Ò¿µ¸´ÖÐÐÄ¡¢¸¨ÖúÉúÑÄסËùºÍÉçÇø¿µ½¡»ú¹¹¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ºÚ¿ÍÓÚ5ÔÂ18ÈÕÖÁ26ÈÕʱ´ú»á¼ûÆäITϵͳ£¬£¬£¬£¬ÊÂÎñÒÑÓÚ12ÔÂ10ÈÕÊӲ쿢ʲ¢×ª´ïÁª°îÖ´·¨²¿·Ö¡£¡£¡£´Ë´Î¹¥»÷¶ÔÃåÒòÖÝʥԼɪ·òÒ½Ôº¡¢Ê¥ÂêÀö¿µ½¡ÏµÍ³¼°Ðº±²¼Ê²¶ûÖÝʥԼɪ·òÒ½ÔºÔì³ÉÏÔÖøÓ°Ï죺ʥÂêÀöҽԺʵÑéÊÒ½öÄÜ´¦Öóͷ£Ö½ÖÊÒ½Öö£¬£¬£¬£¬Ðº±²¼Ê²¶ûÖÝʥԼɪ·òҽԺʵÑéÊÒЧÀÍÊÜÏÞÇÒÐèÖ½ÖÊÒ½Öö¡£¡£¡£Covenant HealthÓÚ³ýϦҹ×îÏÈÏòÊܺ¦Õß¼ÄËÍÎ¥¹æÍ¨ÖªÐÅ£¬£¬£¬£¬²¢ÌṩһÄêÆÚÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£
https://therecord.media/covenant-health-breach-qilin
4. ÐÂÎ÷À¼ManageMyHealthÊý¾Ýй¶ӰÏ쳬10ÍòÓû§
1ÔÂ2ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ÐÂÎ÷À¼Êý×Ö¿µ½¡Æ½Ì¨ManageMyHealth±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ô¼180Íò×¢²áÓû§ÖпÉÄÜÓÐ6%ÖÁ7%£¨¼´10.8ÍòÖÁ12.6ÍòÓû§£©Êܵ½Ó°Ïì¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°ÔÊÐíÁÙ´²Ò½Éú»á¼û»¼ÕßÒ½ÁƼͼµÄÔÚÏßЧÀÍ£¬£¬£¬£¬ÊÜÓ°Ïì¿Í»§½«ÔÚδÀ´48СʱÄÚÊÕµ½¹«Ë¾Í¨Öª£¬£¬£¬£¬Ã÷È·ÆäÐÅÏ¢ÊÇ·ñ¼°ÔõÑù±»»á¼û¡£¡£¡£ManageMyHealthÊ×ϯִÐйÙVino RamayahÇ¿µ÷£¬£¬£¬£¬¹«Ë¾Ê¼ÖÕ½«¿µ½¡ÐÅÏ¢±£»£»£»¤ÊÓΪ½¹µãÔðÈΡ£¡£¡£ËûÌåÏÖ£º¡°ÎÒÃÇÉîÖª¿µ½¡ÐÅÏ¢µÄ˽ÃÜÐÔÓëÃô¸ÐÐÔ£¬£¬£¬£¬´ËÀàÊÂÎñ¿ÉÄÜÒý·¢Óû§½¹ÂÇ¡£¡£¡£ÏÖÔÚÍŶÓÕýÈ«Á¦È·¶¨ÊÜÓ°ÏìÖ°Ô±£¬£¬£¬£¬²¢½«ÒÔÖ±½Ó¡¢Í¸Ã÷µÄ·½·¨ÓëÆäÏàͬ¡£¡£¡£¡±Òþ˽רԱ°ì¹«ÊÒÒÑ»ñϤÊÂÎñ£¬£¬£¬£¬²¢ÕýÓëÆ½Ì¨ÏàÖúÍÆÐÐÒþ˽Á¢·¨ÒåÎñ¡£¡£¡£ÐÂÎ÷À¼ÎÀÉú²¿³¤Î÷ÃÉ¡¤²¼Àʳƴ˴ÎÎ¥¹æ¡°ÁîÈ˵£ÐÄ¡±£¬£¬£¬£¬µ«Ã÷È·ÌåÏÖ¡°ÏÖÔÚÎÞÖ¤¾ÝÅú×¢°üÀ¨ÎҵĿµ½¡ÕË»§ÔÚÄÚµÄÈκÎHNZ£¨ÐÂÎ÷À¼¿µ½¡Ôö½øÐ»á£©ÏµÍ³Ôâµ½ÆÆË𣬣¬£¬£¬ÒòManageMyHealthÓµÓÐ×ÔÁ¦ÏµÍ³¡±¡£¡£¡£ËûÇ¿µ÷£¬£¬£¬£¬ÐÂÎ÷À¼ÎÀÉú²¿ÕýÓëÆ½Ì¨Ç×½üÏàÖú£¬£¬£¬£¬È·±£ÊÂÎñÍ×ÉÆ´¦Öóͷ££¬£¬£¬£¬ÇÒÒ½ÁÆÐ§Àͽ«Ò»Á¬Õý³£ÔËת£¬£¬£¬£¬ÎÞÁÙ´²Ó°Ïì¡£¡£¡£
https://www.1news.co.nz/2026/01/02/managemyhealth-data-breach-more-than-108k-users-potentially-affected/
5. ¶«¾©FMÊý¾Ýй¶£¬£¬£¬£¬³¬300ÍòÓû§ÐÅÏ¢ÊÜÍþв
1ÔÂ1ÈÕ£¬£¬£¬£¬ÈÕ±¾×ÅÃû¹ã²¥µç̨¶«¾©FM¹ã²¥Öêʽ»áÉçÔâÓöÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£Ò»¸ö×Գơ°Êܺ¦Õß¡±µÄÕûÌåÐû³ÆÒÑÈëÇָù«Ë¾ÄÚ²¿ÅÌËã»úϵͳ£¬£¬£¬£¬²¢ÇÔÈ¡Áè¼Ý300ÍòÌõСÎÒ˽¼Ò¼°ÊÖÒÕÊý¾Ý¼Í¼¡£¡£¡£´Ë´ÎÊÂÎñÒòÉæ¼°Ãô¸ÐÐÅÏ¢Á¿ÖØ´óÇÒ±¬·¢ÔÚ¿çÄêÌØÊâʱ¶Î£¬£¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¾Ý¹¥»÷ÕßÅû¶£¬£¬£¬£¬±»µÁÊý¾Ýº¸ÇÓû§È«Ãû¡¢ÉúÈÕ¡¢µç×ÓÓʼþµØµãµÈ»ù´¡Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ÒÔ¼°IPµØµã¡¢Óû§ÊðÀí£¨¿Éʶ±ð×°±¸ÀàÐÍ£©µÈÊÖÒÕϸ½Ú¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬¹¥»÷ÕßÉù³Æ»ñÈ¡Á˹«Ë¾ÄÚ²¿ÏµÍ³µÄµÇ¼ID¼°Ô±¹¤ÊÂÇéÐÅÏ¢£¬£¬£¬£¬ÈôÊôʵ£¬£¬£¬£¬¿ÉÄÜÍþвÆóÒµÔËÓªÇå¾²¼°Ô±¹¤Òþ˽¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Êý¾ÝÕæÊµÐÔÈÔ´¦ÓÚר¼ÒºËʵ½×¶Î£¬£¬£¬£¬µ«Ç±ÔÚΣº¦ÒÑÒý·¢Çå¾²»ú¹¹¾¯ÐÑ¡£¡£¡£¶«¾©FM×÷ΪÈÕ±¾×î¾ßÓ°ÏìÁ¦µÄ¹ã²¥µç̨֮һ£¬£¬£¬£¬ÕÆÎÕ´ó×ÚÌýÖÚ¼°Ô±¹¤ÐÅÏ¢£¬£¬£¬£¬ºã¾Ã³ÉÎªÍøÂç·¸·¨·Ö×ÓÄ¿µÄ¡£¡£¡£Ö»¹Ü´Ë´ÎÊÂÎñ±»ÆðÔ´¶¨ÐÔΪͨË×ÍøÂç·¸·¨°¸¼þ£¬£¬£¬£¬µ«Êý¾Ýй¶¹æÄ£¼°É漰ά¶È£¨´ÓСÎÒ˽¼ÒÒþ˽µ½Æóҵϵͳƾ֤£©ÒÑÔ¶³¬Í¨ÀýÁìÓò¡£¡£¡£Ç徲ר¼ÒÌáÐÑ£¬£¬£¬£¬Èô¹¥»÷ÕßÕÆÎÕÕæÊµÊý¾Ý£¬£¬£¬£¬¿ÉÄܵ¼Ö¾«×¼Õ©Æ¡¢Éí·ÝµÁÓõȴÎÉúΣº¦¡£¡£¡£
https://hackread.com/tokyo-fm-data-breach-hacker-3-million-records-stolen/
6. Google Cloud¹¤¾ß±»ÀÄÓ÷¢¶¯ÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷
1ÔÂ2ÈÕ£¬£¬£¬£¬Check PointÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓÃGoogle Cloud Application IntegrationÖеÄÕýµ±¹¦Ð§Ìᳫ´ó¹æÄ£ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¸Ã¹¥»÷ͨ¹ý¶à²ãÖØ¶¨ÏòÊÖÒÕÈÆ¹ý¹Å°åÇå¾²¼ì²â£¬£¬£¬£¬Á½ÖÜÄÚ·¢Ëͽü9400·âαÔìÓʼþ£¬£¬£¬£¬Ó°ÏìÔ¼3200ÃûÓû§¡£¡£¡£¹¥»÷ÕßÀÄÓÃGoogle CloudµÄ"·¢Ë͵ç×ÓÓʼþ"×Ô¶¯»¯¹¤¾ß£¬£¬£¬£¬´Ó¹Ù·½ÓòÃûmailto:noreply-application-integration@google.com·¢ËÍÓʼþ£¬£¬£¬£¬Ê¹ÓÃÊÜÐÅÈεÄÔÆÐ§ÀÍ»ù´¡ÉèÊ©Ìá¸ß¿ÉÐŶȡ£¡£¡£Óʼþ¸ß¶ÈÄ£ÄâGoogle¹Ù·½Æø¸Å£¬£¬£¬£¬ÒÔÓïÒôÓʼþÌáÐÑ¡¢¹²ÏíÎļþ»á¼ûµÈͨÀý³¡¾°ÎªÓÕ¶üÓÕµ¼µã»÷¡£¡£¡£¹¥»÷Á´°üÀ¨Èý¸ö½×¶Î£ºÊ×ÏÈͨ¹ýstorage.cloud.google.comÁ´½Ó½¨Éè³õʼÐÅÈΣ»£»£»ËæºóÖØ¶¨ÏòÖÁgoogleusercontent.comÏÔʾÐéαÑéÖ¤Âë¹æ±Ü×Ô¶¯É¨Ã裻£»£»×îÖÕÖ¸Ïò·Ç΢ÈíÓòÃûµÄαÔì΢ÈíµÇÂ¼Ò³ÃæÇÔȡƾ֤¡£¡£¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔÖÆÔìÒµºÍ¹¤ÒµÆóÒµ£¬£¬£¬£¬¿Æ¼¼/SaaS¼°½ðÈÚ»ú¹¹´ÎÖ®£¬£¬£¬£¬×¨ÒµÐ§ÀÍ¡¢ÁãÊÛ¡¢Ã½Ìå¡¢½ÌÓý¡¢Ò½ÁÆ¡¢ÄÜÔ´¡¢Õþ¸®µÈÐÐÒµÒ²Êܵ½²î±ðˮƽӰÏì¡£¡£¡£µØÇøÂþÑÜÏÔʾ£¬£¬£¬£¬ÃÀ¹úÊܺ¦Õß×î¶à£¬£¬£¬£¬ÑÇÌ«ºÍÅ·Ö޻»îÔ¾£¬£¬£¬£¬À¶¡ÃÀÖÞÖаÍÎ÷ºÍÄ«Î÷¸çÊÜÓ°Ïì×îÑÏÖØ¡£¡£¡£
https://securityaffairs.com/186425/cyber-crime/phishing-campaign-abuses-google-cloud-application-to-impersonate-legitimate-google-emails.html


¾©¹«Íø°²±¸11010802024551ºÅ