PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼Òµ£ÐÄ£¬ £¬£¬£¬×¨¼ÒÍÆ²â»òÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2025-02-10

1. PlayStation NetworkÈ«Çò̱»¾Òý·¢Íæ¼Òµ£ÐÄ£¬ £¬£¬£¬×¨¼ÒÍÆ²â»òÔâÍøÂç¹¥»÷


2ÔÂ8ÈÕ£¬ £¬£¬£¬PlayStation Network ÔÚÈ«Çò¹æÄ£ÄÚÒṈ̃»¾½üÒ»Ì죬 £¬£¬£¬ÁîÖÚ¶àÍæ¼ÒÉî¸Ð¾ÚÉ¥¡£¡£¡£¡£¡£¡£ÖÜËÄÍíÉÏ 11 µã×óÓÒ£¬ £¬£¬£¬´ó×ÚÓû§×îÏȱ¨¸æÐ§ÀÍ·ºÆðÎÊÌ⣬ £¬£¬£¬¶øË÷ÄáËäÈ»ÒÑÈ·ÈÏ´Ë´ÎÈ«ÇòÐÔ̱»¾£¬ £¬£¬£¬µ«×èÖ¹ÏÖÔÚÉÐδÌṩÈκÎÏêϸµÄÊÖÒÕÐÅÏ¢¡£¡£¡£¡£¡£¡£¾Ý PlayStation on X Ðû²¼µÄһƪÎÄÕ¼°×´Ì¬Ò³ÃæÏÔʾ£¬ £¬£¬£¬¾­ÓÉÁè¼Ý 24 Сʱ£¬ £¬£¬£¬ÕË»§ÖÎÀí¡¢ÓÎÏ·ºÍÉç½»¹¦Ð§¡¢PlayStation Video ÒÔ¼° PlayStation ÊÐËÁµÈÏÕЩËùÓÐÔÚÏßЧÀ;ù±£´æÎÊÌâ¡£¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñÒý·¢ÁËר¼ÒµÄÍÆ²â£¬ £¬£¬£¬Óп´·¨ÒÔΪÎÊÌâµÄȪԴ¿ÉÄÜÊÇÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ÊÂʵÉÏ£¬ £¬£¬£¬PlayStation Network ÀúÊ·ÉÏÔø¶à´ÎÃæÁÙÖØ´óÖÐÖ¹£¬ £¬£¬£¬ÓÈÆäÊÇ 2011 ÄêÄǴκڿÍÈëÇÖ£¬ £¬£¬£¬µ¼ÖÂÓû§Êý¾Ýй¶²¢ÆÈʹЧÀÍ¹Ø±Õ 23 Ì죬 £¬£¬£¬Êý°ÙÍòÓû§Êý¾ÝÒò´Ë̻¶£¬ £¬£¬£¬Ë÷Äá×îÖÕÖ§¸¶ÁË 1500 ÍòÃÀÔªµÄÏ¢Õù½ð£¬ £¬£¬£¬²¢ÎªÓû§ÌṩÁËÒ»ÄêµÄÉí·Ý͵ÇÔ±£»£»£»¤¡£¡£¡£¡£¡£¡£²»¹ý£¬ £¬£¬£¬ÔÚ 2025 Äê 2 Ô 9 ÈյĸüÐÂÖУ¬ £¬£¬£¬×´Ì¬Ò³ÃæÏÔʾËùÓÐЧÀ;ùÒѻָ´Õý³£ÔËÐС£¡£¡£¡£¡£¡£Ö»¹ÜЧÀÍÒѻָ´£¬ £¬£¬£¬µ«´Ë´ÎÊÂÎñÎÞÒÉÔÙ´ÎÒý·¢ÁËÍæ¼Ò¶Ô PlayStation Network Çå¾²ÐԵĵ£ÐÄ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/174005/hacking/playstation-network-global-outage.html


2. ½ü280Íò¸öIPÌᳫ´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷£¬ £¬£¬£¬Ä¿µÄÖ±Ö¸ÍøÂç×°±¸Æ¾Ö¤


2ÔÂ8ÈÕ£¬ £¬£¬£¬½ü280Íò¸öIPµØµãÕý±»ÓÃÓÚÒ»³¡´ó¹æÄ£±©Á¦ÃÜÂë¹¥»÷£¬ £¬£¬£¬Ä¿µÄÖ±Ö¸°üÀ¨Palo Alto Networks¡¢IvantiºÍSonicWallÔÚÄڵĶàÖÖÍøÂç×°±¸¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷·½·¨Í¨¹ýÖØ¸´ÊµÑé²î±ðµÄÓû§ÃûºÍÃÜÂë×éºÏÀ´ÈëÇÖÕË»§»ò×°±¸£¬ £¬£¬£¬Ò»µ©Àֳɣ¬ £¬£¬£¬¹¥»÷Õß¼´¿É¿ØÖÆ×°±¸»òÉøÍ¸ÍøÂç¡£¡£¡£¡£¡£¡£¾ÝShadowserver FoundationÍþв¼à¿ØÆ½Ì¨±¨¸æ£¬ £¬£¬£¬´ËÀ๥»÷×ÔÉÏÔÂÆðÒ»Á¬ÖÁ½ñ£¬ £¬£¬£¬ÖðÈÕ¶¯Óýü280Íò¸öÔ´IPµØµã£¬ £¬£¬£¬ÆäÖаÍÎ÷Õ¼±È×î¸ß£¬ £¬£¬£¬Æä´ÎÊÇÍÁ¶úÆä¡¢¶íÂÞ˹¡¢°¢¸ùÍ¢¡¢Ä¦Âå¸çºÍÄ«Î÷¸çµÈ¹ú¡£¡£¡£¡£¡£¡£Êܹ¥»÷µÄ×°±¸¶àΪ·À»ðǽ¡¢VPN¡¢Íø¹ØµÈ±ßÑØÇå¾²×°±¸£¬ £¬£¬£¬ÇÒ¹¥»÷Ô´Í·¶àΪMikroTik¡¢»ªÎª¡¢Ë¼¿Æ¡¢BoaºÍÖÐÐËµÈÆ·ÅƵÄ·ÓÉÆ÷¼°ÎïÁªÍø×°±¸¡£¡£¡£¡£¡£¡£ShadowserverÖ¸³ö£¬ £¬£¬£¬¹¥»÷IPÊèÉ¢ÓÚÖÚ¶àÍøÂçºÍ×ÔÖÎϵͳ£¬ £¬£¬£¬»òÓë½©Ê¬ÍøÂ缰סլÊðÀíÍøÂçÓйء£¡£¡£¡£¡£¡£ÕâЩÊðÀíͨ¹ý×¡Õ¬ÍøÂç·ÓÉÁ÷Á¿£¬ £¬£¬£¬Î±×°³ÉͨË×¼ÒÍ¥Óû§£¬ £¬£¬£¬ÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¡£¡£Îª±£»£»£»¤±ßÑØ×°±¸£¬ £¬£¬£¬½¨Òé¸ü¸ÄĬÈÏÃÜÂ롢ʵÑé¶àÒòËØÉí·ÝÑéÖ¤¡¢ÉèÖÃÊÜÐÅÈÎIPÔÊÐíÁÐ±í¡¢½ûÓ÷ÇÐëÒªWebÖÎÀí½çÃæ£¬ £¬£¬£¬²¢ÊµÊ±¸üй̼þºÍÇå¾²²¹¶¡¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/


3. 7-ZipÁãÈÕÎó²î£º¶íÂÞ˹ºÚ¿ÍʹÓÃMotWÈÆ¹ýÊÖÒÕ·¢¶¯¹¥»÷


2ÔÂ4ÈÕ£¬ £¬£¬£¬×Ô2024Äê9ÔÂÆð£¬ £¬£¬£¬¶íÂÞ˹ºÚ¿ÍʹÓÃ7-ZipÖеÄÁãÈÕÎó²îCVE-2025-0411£¬ £¬£¬£¬ÀÖ³ÉÈÆ¹ýÁËWindowsµÄMark of the Web (MotW)Çå¾²¹¦Ð§£¬ £¬£¬£¬Õë¶ÔÎÚ¿ËÀ¼Õþ¸®ºÍ˽ÈË×éÖ¯·¢¶¯ÁËSmokeLoader¶ñÒâÈí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£MotW¹¦Ð§Ô­±¾ÐÄÔÚÖÒÑÔÓû§¼´½«Ö´ÐеÄÎļþȪԴ²»¿ÉÐÅ£¬ £¬£¬£¬²¢ÒªÇóÈ·ÈÏ£¬ £¬£¬£¬µ«ºÚ¿Íͨ¹ýË«ÖØ´æµµÎļþºÍͬÐÎÎÄ×ÖÊÖÒÕ£¬ £¬£¬£¬Ê¹¶ñÒâÎļþÔÚ²»´¥·¢ÖÒÑÔµÄÇéÐÎÏÂÖ´ÐС£¡£¡£¡£¡£¡£ÕâÐ©ÌØÖÆµÄ7-ZipÎļþͨ¹ý´¹ÂÚÓʼþ·¢Ë͸øÄ¿µÄ£¬ £¬£¬£¬Ê¹ÓõÄÊDZ»ÈëÇÖµÄÎÚ¿ËÀ¼Õþ¸®ÕË»§£¬ £¬£¬£¬ÒÔÈÆ¹ýÇå¾²¹ýÂËÆ÷¡£¡£¡£¡£¡£¡£Ö»¹Ü7-ZipÔÚ2022ÄêÌí¼ÓÁ˶ÔMotWµÄÖ§³Ö£¬ £¬£¬£¬µ«CVE-2025-0411Îó²îʹµÃMotW±ê¼Ç²»»áÈö²¥µ½ÄÚ²¿µµ°¸ÄÚÈÝ£¬ £¬£¬£¬´Ó¶øÔÊÐí¶ñÒâ¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþÖ±½ÓÆô¶¯¡£¡£¡£¡£¡£¡£×îºó£¬ £¬£¬£¬ÕâЩ¹¥»÷´¥·¢ÁËSmokeLoader¸ºÔØ£¬ £¬£¬£¬Ò»ÖÖÓÃÓÚ×°ÖÃÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ä¾Âí¡¢ÀÕË÷Èí¼þ»ò½¨ÉèºóÃŵĶñÒâÈí¼þͶ·ÅÆ÷¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼¹ú¼ÒÐÐÕþ¾Ö¡¢Ôú²¨ÂÞÈÈÆû³µÖÆÔì³§µÈ¶à¸öÒªº¦²¿·Ö¡£¡£¡£¡£¡£¡£Ö»¹ÜÇ÷ÊÆ¿Æ¼¼ÔÚ·¢Ã÷Îó²îºóÒÑÓë7-Zip¿ª·¢Ö°Ô±·ÖÏí¿´·¨ÑéÖ¤Îó²î£¬ £¬£¬£¬²¢Í¨¹ý2024Äê11ÔÂ30ÈÕÐû²¼µÄ24.09°æ±¾²¹¶¡½â¾öÁËΣº¦£¬ £¬£¬£¬µ«ÓÉÓÚ7-Zipȱ·¦×Ô¶¯¸üй¦Ð§£¬ £¬£¬£¬Óû§ÈÔÐèÊÖ¶¯ÏÂÔØ×îа汾ÒÔÈ·±£Çå¾²¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/7-zip-motw-bypass-exploited-in-zero-day-attacks-against-ukraine/


4. ³¯ÏÊ¡°FlexibleFerret¡±¶ñÒâÈí¼þ£ºÊ¹ÓÃÐéαZoomºÍÇóÖ°Õ©Æ­¹¥»÷macOSÓû§


2ÔÂ4ÈÕ£¬ £¬£¬£¬³¯ÏʶñÒâÈí¼þ¡°FlexibleFerret¡±Õë¶ÔmacOS×°±¸ºÍ¿ª·¢Ö°Ô±ÌᳫÁËÒ»³¡ÆÕ±éµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Õâ¿î¶ñÒâÈí¼þͨ¹ýÐéαµÄZoomÓ¦ÓóÌÐò¡¢ÇóÖ°Õ©Æ­ºÍ¹ýʧ±¨¸æÌ¸ÂÛµÈÊÖ¶ÎÓÕÆ­Óû§×°Öᣡ£¡£¡£¡£¡£ËüʹÓýÆÕ©µÄÉç»á¹¤³ÌѧսÂÔ£¬ £¬£¬£¬ÈçÐéαµÄÇóÖ°ÃæÊÔÁ÷³Ì£¬ £¬£¬£¬·¢ËÍ¿´ËÆÒªÇóÈí¼þ¸üеÄÁ´½Ó£¬ £¬£¬£¬ÓÕÆ­Ä¿µÄÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Ö»¹ÜApple×î½üÔöÇ¿ÁËÆäXProtectÇå¾²¹¤¾ßÒÔÓ¦¶Ô´ËÀàÍþв£¬ £¬£¬£¬µ«FlexibleFerretÔÚ×î³õʱÈÔδ±»·¢Ã÷¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ°üÀ¨Ò»¸ödropper£¬ £¬£¬£¬½«¶ñÒâÈí¼þ×°Öõ½ÏµÍ³ÖУ¬ £¬£¬£¬²¢½¨ÉèαÔìµÄZoomÓ¦ÓóÌÐòÉñÃØÅþÁ¬µ½¿ÉÒÉÓò¡£¡£¡£¡£¡£¡£Ëü»¹»áÏÔʾÐéαµÄ¹ýʧÐÅÏ¢ÒÔÓÕÆ­Êܺ¦Õߣ¬ £¬£¬£¬²¢ÔÚºǫ́×ÔÐÐ×°Ö㬠£¬£¬£¬½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬ºÚ¿Í»¹Ö±½ÓÃé×¼¿ª·¢Ö°Ô±£¬ £¬£¬£¬Ê¹ÓÃÐéαµÄ¹ýʧ±¨¸æ»òGitHubµÈÍøÕ¾ÉϵÄ̸ÂÛÀ´ÓÕÆ­ËûÃÇÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÒÑ·¢Ã÷¸ü¶àÏà¹ØµÄ¶ñÒâÈí¼þÑù±¾£¬ £¬£¬£¬²¢Ö¸³ö¹¥»÷ÕßÒѸü¸Ä´ÎÒªÔªËØÒÔÈÆ¹ý±£»£»£»¤²½·¥¡£¡£¡£¡£¡£¡£ÕⳡһÁ¬¶ø»îÔ¾µÄ¹¥»÷»î¶¯Åú×¢£¬ £¬£¬£¬ÍþвÐÐΪÕßÕýÔÚÒ»Ö±¸Ä±äÒªÁìÒÔ×èÖ¹±»·¢Ã÷¡£¡£¡£¡£¡£¡£


https://hackread.com/north-korea-flexibleferret-malware-macos-fake-zoom-job-scams/


5. ADFSÍøÂç´¹ÂÚ¹¥»÷£º¹¥»÷Õßð³äITÍŶÓÇÔȡƾ֤


2ÔÂ5ÈÕ£¬ £¬£¬£¬Abnormal Security·¢Ã÷ÁËÒ»ÆðÕë¶Ô½ÌÓý¡¢Ò½ÁƱ£½¡ºÍÕþ¸®×éÖ¯µÄÍøÂç´¹Âڻ£¬ £¬£¬£¬¸Ã»î¶¯ÒÔMicrosoft Active DirectoryÁªºÏÉí·ÝÑé֤ЧÀÍ£¨ADFS£©ÎªÄ¿µÄ£¬ £¬£¬£¬Í¨¹ýÓÕÆ­ÐÔµÇÂ¼Ò³ÃæÇÔÈ¡Óû§Æ¾Ö¤²¢Èƹý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»¤¡£¡£¡£¡£¡£¡£¹¥»÷ÕßðûÊÕ˾ITÍŶӷ¢ËÍÓʼþ£¬ £¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÓëÕæÊµADFSµÇÂ¼Ò³ÃæÒ»ÖµĴ¹ÂÚÍøÕ¾£¬ £¬£¬£¬²¢ÒªÇóÊäÈëÓû§Ãû¡¢ÃÜÂë¼°MFA´úÂë»òÅú×¼ÍÆËÍ֪ͨ¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷Ö¼ÔÚ»ñÈ¡¹«Ë¾µç×ÓÓʼþÕË»§»á¼ûȨÏÞ£¬ £¬£¬£¬½ø¶ø¾ÙÐо­¼ÃÄîÍ·µÄ¹¥»÷£¬ £¬£¬£¬ÈçÉÌÒµµç×ÓÓʼþй¶£¨BEC£©¡£¡£¡£¡£¡£¡£Abnormal SecurityÖ¸³ö£¬ £¬£¬£¬¹¥»÷ÕßʹÓÃÁË˽ÈËVPNÒþ²ØÎ»Ö㬠£¬£¬£¬²¢·ÖÅɸü¿¿½ü×éÖ¯µÄIPµØµã¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩ¹¥»÷²»»áÖ±½ÓÆÆËðADFS£¬ £¬£¬£¬µ«Ê¹ÓÃÓû§¶ÔÊìϤµÇ¼Á÷³ÌµÄÐÅÈΣ¬ £¬£¬£¬Ç±ÔÚÓÐÓÃÐÔÈÔÈ»ÒýÈËעĿ¡£¡£¡£¡£¡£¡£Abnormal½¨Òé×é֯Ǩáãµ½¸üÇå¾²µÄ½â¾ö¼Æ»®£¬ £¬£¬£¬ÈçMicrosoft Entra£¬ £¬£¬£¬²¢ÒýÈëÌØÁíÍâµç×ÓÓʼþ¹ýÂËÆ÷ºÍÒì³£»£»£»î¶¯¼ì²â»úÖÆ£¬ £¬£¬£¬ÒÔ¾¡Ôç×èÖ¹ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£


https://bleepingcomputer.com/news/security/hackers-spoof-microsoft-adfs-login-pages-to-steal-credentials/


6. Ó¡¶ÈÒøÐÐÓû§ÔâÓö´ó¹æÄ£Òƶ¯¶ñÒâÈí¼þ¹¥»÷


2ÔÂ5ÈÕ£¬ £¬£¬£¬zLabsÑо¿ÍÅ¶Ó½ÒÆÆÁËÒ»ÏîÕë¶ÔÓ¡¶ÈÒøÐÐÓû§µÄÒÆ¶¯¶ñÒâÈí¼þ»î¶¯£¬ £¬£¬£¬Éæ¼°½ü900¸ö¶ñÒâÈí¼þÑù±¾£¬ £¬£¬£¬Ö÷ÒªÕë¶ÔAndroid×°±¸¡£¡£¡£¡£¡£¡£ÕâЩÑù±¾¾ßÓÐÏàͬµÄ´úÂë½á¹¹¡¢Óû§½çÃæºÍÓ¦ÓóÌÐò»Õ±ê£¬ £¬£¬£¬Åú×¢Óɼòµ¥ÍþвÐÐΪÕßÌᳫ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÇÔȡһ´ÎÐÔÃÜÂ룬 £¬£¬£¬»¹Ê¹ÓÃʵʱµç»°ºÅÂëÖØ¶¨Ïò¶ÌÐÅ£¬ £¬£¬£¬ÁôÏ¿É×·×ÙµÄÊý×Ö×Ù¼£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÁè¼Ý222¸ö¿É»á¼ûµÄFirebase´æ´¢Í°£¬ £¬£¬£¬°üÀ¨Ô¼50,000ÃûÓû§µÄÃô¸ÐÊý¾Ý£¬ £¬£¬£¬ÈçÒøÐÐÏêÇé¡¢ÐÅÓÿ¨ÐÅÏ¢ºÍÉí·Ý֤ʵ¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ýWhatsAppÈö²¥£¬ £¬£¬£¬Î±×°³ÉÕýµ±Ó¦ÓÃÓÕÆ­Óû§Ð¹Â¶²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬ £¬£¬£¬¸Ã¶ñÒâÈí¼þ¼Ò×åÓÐÈý¸ö±äÌ壺¶ÌÐÅת·¢¡¢Firebase-ExlysisºÍ»ìÏý¡£¡£¡£¡£¡£¡£Firebase¶Ëµãȱ·¦Éí·ÝÑéÖ¤»úÖÆ£¬ £¬£¬£¬µ¼ÖÂÊý¾Ý¿É¹ûÕæ»á¼û£¬ £¬£¬£¬Ð¹Â¶µÄƾ֤ÔÊÐíδ¾­ÊÚȨ»á¼ûÖÎÀíÒDZí°å¡£¡£¡£¡£¡£¡£¹¥»÷Õߵ绰ºÅÂëÖ÷Ҫע²áÓÚÓ¡¶ÈÌØ¶¨µØÇø¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÒøÐкÍÕþ¸®ÐÅÓþ£¬ £¬£¬£¬Á¬ÏµÆ¾Ö¤ÍµÇÔ¡¢¶ÌÐÅ×èµ²ºÍÍøÂç´¹ÂÚÊÖÒÕÖ´ÐÐδ¾­ÊÚȨÉúÒâ¡£¡£¡£¡£¡£¡£


https://securityboulevard.com/2025/02/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/