HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬ÍƳöÐÂAPIÖú×éÖ¯·À·¶¶ñÒâ»î¶¯

Ðû²¼Ê±¼ä 2025-02-26

1. HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬ÍƳöÐÂAPIÖú×éÖ¯·À·¶¶ñÒâ»î¶¯


2ÔÂ25ÈÕ£¬¡°Have I Been Pwned¡±£¨HIBP£©Êý¾Ýй¶֪ͨ·þÎñ½üÆÚÐÂÔöÁËÁè¼Ý2.84ÒÚ¸ö±»µÁÕË»§ÐÅÏ¢£¬ÕâЩÐÅÏ¢ÊÇ´ÓÒ»¸öÃûΪ¡°ALIEN TXTBASE¡±µÄTelegramƵµÀÉÏ·¢Ïֵġ£HIBPÊ×´´ÈËÌØÂåÒÁ¡¤ºàÌØÔÚ·ÖÎö1.5TBµÄÇÔÈ¡ÕßÈÕ־ʱ·¢ÏÖÁËÕâЩ±»µÁÕË»§¡£ÕâЩÈÕÖ¾°üÂÞ230ÒÚÐÐÊý¾Ý£¬Éæ¼°4.93ÒÚ¸öÎ¨Ò»ÍøÕ¾ºÍµç×ÓÓʼþµØÖ·¶Ô£¬Ó°ÏìÁË2.84ÒÚ¸öΨһµç×ÓÓʼþµØÖ·¡£´ËÍ⣬HIBP»¹Ìí¼ÓÁË2.44ÒÚ¸ö´Óδ¼û¹ýµÄÃÜÂ룬²¢¶ÔÒÑÓеÄ1.99ÒÚ¸öÃÜÂë½øÐÐÁ˼ÆÊý¸üС£ÓÉÓÚÕË»§ÊýÁ¿ÅÓ´ó£¬ÕâЩÊý¾Ý¿ÉÄܰüÂÞÐÂ¾ÉÆ¾Ö¤¡£ÔÚÌí¼Ó±»µÁÕË»§µ½HIBPÊý¾Ý¿âǰ£¬ºàÌØÍ¨¹ý¼ì²éÃÜÂëÖØÖÃʵÑéÀ´È·ÈÏÕË»§µÄÕæÊµÐÔ¡£ÏÖÔÚ£¬ÓòÃûËùÓÐÕߺÍÍøÕ¾ÔËÓªÉÌ¿ÉÒÔͨ¹ýÐÂÌí¼ÓµÄAPI²éѯÇÔÈ¡ÕßÈÕÖ¾£¬ÒÔʶ±ðƾ¾Ý±»µÁµÄ¿Í»§¡£ÆÕͨÓû§Èç¹û¶©ÔÄÁËHIBP֪ͨ£¬Ò²ÄܲéÃ÷×Ô¼ºµÄÕË»§ÊÇ·ñ·ºÆðÔÚÈÕÖ¾ÖУ¬µ«ºàÌØÇ¿µ÷²»»á¹ûÈ»ÏÔʾÃô¸ÐÐÅÏ¢¡£ÕâЩÐÂAPI½«×ÊÖú×é֯ʶ±ð¶ñÒâ»î¶¯À´Ô´£¬²¢ÔÚË𺦷¢ÉúǰÓèÒÔ×èÖ¹¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/


2. GitVenom¶ñÒâÈí¼þ»î¶¯£ºÀûÓÃGitHub´æ´¢¿âÇÔÈ¡¼ÓÃÜ»õ±ÒºÍƾ֤


2ÔÂ25ÈÕ£¬GitVenomÊÇÒ»¸öÒÑ»îÔ¾ÖÁÉÙÁ½ÄêµÄÈ«ÇòÐÔ¶ñÒâÈí¼þ»î¶¯£¬ÖØµã¹Ø×¢¶íÂÞ˹¡¢°ÍÎ÷ºÍÍÁ¶úÆä¡£Ëüͨ¹ýGitHubÉϵÄÊý°Ù¸öÐé¼Ù´æ´¢¿âÓÕÆ­Óû§ÏÂÔØÐÅÏ¢ÇÔÈ¡·¨Ê½¡¢Ô¶³Ì·ÃÎÊľÂí£¨RAT£©ºÍ¼ôÌù°å½Ù³Ö·¨Ê½£¬ÒÔÇÔÈ¡¼ÓÃÜ»õ±ÒºÍƾ֤¡£ÕâЩÐé¼Ù´æ´¢¿â¾­¹ý¾«ÐÄÖÆ×÷£¬¾ßÓÐÏêϸÐÅÏ¢ºÍÊʵ±±àдµÄ×ÔÊöÎļþ£¬¿ÉÄܽèÖúÁËÈ˹¤ÖÇÄܹ¤¾ßµÄ×ÊÖú£¬²¢Í¨¹ýÈËΪÔö¼ÓÌá½»ÊýÁ¿À´Ìá¸ß¿ÉÐŶÈ¡£×¢ÈëÏîÄ¿µÄ¶ñÒâ´úÂëÓöàÖÖÓïÑÔ±àд£¬ÒÔÌÓ±ÜÌØ¶¨´úÂëÉó²é¹¤¾ßµÄ¼ì²â¡£Ò»µ©Êܺ¦ÕßÖ´ÐÐÓÐЧ¸ºÔØ£¬¾Í»áÏÂÔØµÚ¶þ½×¶Î¶ñÒâÈí¼þ¡£GitVenomÖÐʹÓõŤ¾ß°üÂÞNode.jsÇÔÈ¡·¨Ê½¡¢AsyncRAT¡¢QuasarºóÃźͼôÌù°å½Ù³Ö·¨Ê½¡£³ÂËßÖØµã½éÉÜÁËÒ»Æð°¸Àý£¬¹¥»÷Õßͨ¹ý´Ë»î¶¯»ñµÃÁ˼ÛÖµ50ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¾¡¹Ü´ËÀà»î¶¯²¢²»º±¼û£¬µ«GitVenomµÄÁ¬ÐøÊ±¼äºÍ¹æÄ£Ö¤Ã÷Á˺Ϸ¨Æ½Ì¨µÄÀÄÓÃÈÔÈ»·Ç³£ÓÐЧ¡£Òò´Ë£¬³¹µ×Éó²éÏîÄ¿¡¢Ê¹Ó÷À²¡¶¾¹¤¾ßɨÃèÎļþÒÔ¼°ÔÚ¸ôÀë»·¾³ÖÐÖ´ÐÐÏÂÔØµÄÎļþÖÁ¹ØÖØÒª¡£


https://www.bleepingcomputer.com/news/security/gitvenom-attacks-abuse-hundreds-of-github-repos-to-steal-crypto/


3. Auto-Color£ºÐ·¢ÏÖµÄLinuxºóÃŶñÒâÈí¼þÍþв


2ÔÂ25ÈÕ£¬2024Äê11ÔÂÖÁ12ÔÂÆÚ¼ä£¬Ò»ÖÖÃûΪ¡°Auto-Color¡±µÄδ¼Ç¼LinuxºóÃű»·¢ÏÖ£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĴóѧºÍÕþ¸®×éÖ¯¡£¸Ã¶ñÒâÈí¼þ¾ßÓм«Ç¿µÄÌÓ±ÜÐÔ£¬ÄÑÒÔ´ÓÊÜѬȾϵͳÖÐɾ³ý£¬²¢Äܳ¤Ê±¼ä±£³Ö·ÃÎÊ¡£ËüÓëSymbiote Linux¶ñÒâÈí¼þ¼Ò×åÓÐÏàËÆÖ®´¦£¬µ«Á½Õß²¢²»Ïàͬ¡£Auto-Colorͨ¹ýÖ´ÐÐαװ³ÉÁ¼ÐÔÃû³ÆµÄÎļþ¿ªÊ¼¹¥»÷£¬Èç¹ûÒÔrootȨÏÞÔËÐУ¬»á°²×°¶ñÒâ¿âÖ²ÈëÎï²¢ÐÞ¸ÄϵͳÎļþÒÔÈ·±£ÆäÖ´ÐС£ËüʹÓÃ×Ô½ç˵¼ÓÃÜËã·¨½âÃÜÃüÁîºÍ¿ØÖÆ·þÎñÆ÷ÐÅÏ¢£¬²¢Í¨¹ýËæ»úÖµÎÕÊÖÑéÖ¤½»»»¡£C2¿ÉÒÔÃüÁîAuto-ColorÖ´ÐжàÖÖ²Ù×÷£¬Èç´ò¿ª·´Ïòshell¡¢Ö´ÐÐÈÎÒâÃüÁî¡¢Ð޸Ļò´´½¨Îļþ¡¢³äµ±ÊðÀíÒÔ¼°¶¯Ì¬ÐÞ¸ÄÅäÖá£Auto-Color»¹¾ßÓÐÀàËÆrootkitµÄ¹¦Ð§£¬ÈçÀ¹½ØÏµÍ³µ÷ÓúÍÒþ²ØC2Á¬½Ó¡£Ëü»¹¾ßÓÐÄÚÖõġ°ÖÕÖ¹¿ª¹Ø¡±£¬ÔÊÐí¹¥»÷ÕßÁ¢¼´É¾³ýѬȾºÛ¼£¡£¼øÓÚÆäÒþÉíÐÔ¡¢Ä£¿é»¯Éè¼ÆºÍÔ¶³Ì¿ØÖƹ¦Ð§£¬Auto-Color¶ÔLinuxϵͳ×é³ÉÑÏÖØÍþв¡£½¨Òé¼à¿ØÒªº¦³Ö¾Ã»úÖÆµÄ±ä»¯£¬¼ì²éϵͳÈÕÖ¾ºÍÍøÂçÁ÷Á¿ÖÐÓëÁгöµÄC2 IPµÄÁ¬½Ó£¬²¢Ê¹ÓûùÓÚÐÐΪµÄÍþв¼ì²â½â¾ö·½°¸½øÐзÀÓù¡£


https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/


4. DISA Global SolutionsÊý¾Ýй¶Ê¼þÓ°Ïì330ÍòÈË


2ÔÂ25ÈÕ£¬DISA Global SolutionsÊÇÒ»¼ÒÃÀ¹úÁìÏȵÄÅ侰ɸ²éºÍÒ©Îï¼°¾Æ¾«²âÊÔ¹«Ë¾£¬½üÆÚÔâÓöÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶Ê¼þ£¬Ó°ÏìÁ˶à´ï330ÍòÈË¡£¸ÃʼþÊ×´ÎÓÚ½ñÄê1ÔÂÅû¶£¬Éæ¼°2024Äê2ÔÂ9ÈÕÖÁ4ÔÂ22ÈÕÆÚ¼ä·¢ÉúµÄÍøÂçÄþ¾²Ê¼þ¡£¾­¹ýÉîÈëÊӲ죬DISAÈ·ÈÏÃô¸ÐÊý¾ÝÔڴ˴ι¥»÷ÖÐÔ⵽й¶¡£×÷ΪӵÓÐ55,000¶à¼Ò¿Í»§£¬°üÂÞ30%µÄ²Æ¸»500Ç¿ÆóÒµµÄ·þÎñÉÌ£¬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔÚÈ«¹ú·¶Î§ÄÚ·¢Éú¹ã·ºÓ°Ï졣й¶µÄÐÅÏ¢°üÂÞÐÕÃû¡¢Éç»áÄþ¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂëÒÔ¼°²ÆÕþÕË»§ÐÅÏ¢µÈ¡£¾¡¹ÜDISAδ͸¶¾ßÌåÔâÊÜÁ˺ÎÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬µ«Óб¨µÀ³ÆËûÃÇÒÑÖ§¸¶Êê½ðÒÔ·ÀÖ¹Êý¾Ý±»¹ûÈ»Ðû²¼¡£Îª±£»¤ÊÜÓ°ÏìÈËȺ£¬DISAͨ¹ýExperianÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ£¬²¢½¨Òé¸öÈËÉèÖÃÆÛÕ©¾¯±¨ºÍÄþ¾²¶³½á¡£


https://www.bleepingcomputer.com/news/security/us-drug-testing-firm-disa-says-data-breach-impacts-33-million-people/


5. Orange GroupÔâºÚ¿ÍÈëÇÖ£¬ÊýǧÓû§¼°Ô±¹¤Êý¾ÝÔâй¶


2ÔÂ25ÈÕ£¬Ò»ÃûºÚ¿ÍÉù³ÆÀÖ³ÉÈëÇÖÁË·¨¹úµçÐÅÔËÓªÉ̺ÍÊý×Ö·þÎñÌṩÉÌ Orange Group µÄϵͳ£¬²¢ÇÔÈ¡ÁËÊýǧ·Ý°üÂÞÓû§¼Ç¼ºÍÔ±¹¤Êý¾ÝµÄÄÚ²¿Îļþ¡£¸ÃºÚ¿ÍʹÓû¯Ãû Rey£¬×Ô³ÆÊÇ HellCat ÀÕË÷Èí¼þ×éÖ¯µÄ³ÉÔ±£¬µ«ÌåÏÖ´Ë´ÎÈëÇÖ²¢·Ç HellCat µÄ²Ù×÷¡£¾Ý Rey Ëù³Æ£¬±»µÁÊý¾ÝÖ÷ÒªÀ´×Ô Orange µÄÂÞÂíÄáÑÇ·Ö¹«Ë¾£¬°üÂÞµç×ÓÓʼþµØÖ·¡¢Ô´´úÂë¡¢·¢Æ±¡¢ºÏͬ¡¢¿Í»§ºÍÔ±¹¤ÐÅÏ¢µÈ£¬×ÜÁ¿½ü 6.5GB¡£Orange ¹«Ë¾Ö¤ÊµÁË´Ë´ÎÈëÇÖʼþ£¬µ«ÌåÏÖËü·¢ÉúÔÚÒ»¸ö·ÇÒªº¦Ó¦Ó÷¨Ê½ÉÏ£¬²¢ÒÑÕ¹¿ªÊÓ²ìÒÔ×îС»¯Ó°Ï졣й¶µÄÊý¾ÝÖаüÂÞһЩ³Â¾ÉºÍÒѹýÆÚµÄÐÅÏ¢£¬µ« Orange Ç¿µ÷¿Í»§µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£Orange ·¢ÑÔÈËÌåÏÖ£¬¹«Ë¾µÄÍøÂçÄþ¾²ºÍ IT ÍŶÓÕýÔÚŬÁ¦ÆÀ¹ÀÎ¥¹æË®Æ½²¢½µµÍʼþÓ°Ï죬ͬʱÔÊÐí×ñÊØÏà¹ØÖ´·¨ÒåÎñ²¢ÓëÏà¹Ø²¿ÃźÏ×÷½â¾ö´ËÊ¡£Rey »¹Í¸Â¶£¬ËûÃÇÀûÓÃй¶µÄƾ֤ºÍ Jira Èí¼þ¼°ÄÚ²¿ÃÅ»§ÖеÄ©¶´ÇÖÈëÁË Orange ϵͳ£¬²¢ÔÚÊÜѬȾµÄϵͳÉÏ·ÅÖÃÁËÀÕË÷ÐÅ£¬µ« Orange ²¢Î´½øÐÐ̸ÅС£


https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/


6. µ×ÌØÂÉPBSÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷£¬Ãô¸ÐÐÅϢй¶


2ÔÂ25ÈÕ£¬µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾£¨PBS£©½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬÷è÷ëÀÕË÷Èí¼þÉù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬²¢Ðû²¼ÁË345GBµÄ±»µÁÎļþ¡£´Ë´ÎÊý¾Ýй¶ÓÚ2024Äê9ÔÂ1ÈÕ±»·¢ÏÖ£¬µ¼Öµ×ÌØÂÉPBSµÄijЩϵͳѬȾ¶ñÒâÈí¼þ£¬ÎÞ·¨·ÃÎʲ¿ÃÅÎļþ¡£±»µÁÐÅÏ¢°üÂÞÖÁÉÙ1694È˵ĸöÈËÐÅÏ¢£¬°üÂÞÐÕÃû¡¢µØÖ·ºÍÉç»á±£Ïպš£µ×ÌØÂÉPBSѸËÙ½ÓÄÉÐж¯£¬ÉîÈë²éѯÊÜÓ°Ïì¸öÈ˵Ä×îÐÂÁªÏµÐÅÏ¢£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿Ø·þÎñ¡£Í¬Ê±£¬¸ÃµçÊǪ́»¹ÏòÁª°îÖ´·¨²¿ÃÅͨ±¨Á˸Ãʼþ£¬²¢Å¬Á¦ÊµÊ©ÌرðµÄ±£ÕÏ´ëÊ©²¢ÅàѵԱ¹¤¡£÷è÷ëÀÕË÷Èí¼þÊÇÒ»¸ö¶íÓïºÚ¿Í×éÖ¯£¬×¨ÃŹ¥»÷×éÖ¯ÒÔ»ñÈ¡¾­¼ÃÀûÒæ£¬ÔøÕë¶ÔÂ׶صȵØÒ½Ôº·¢¶¯ÍøÂç¹¥»÷¡£´Ë´Î¹¥»÷ÖУ¬÷è÷ëÀÕË÷Èí¼þÀûÓÃCitrix BleedÁãÈÕ©¶´ÀûÓÃÊܺ¦Õߣ¬¶øµ×ÌØÂÉPBSËÆºõûÓÐÖ§¸¶Êê½ð£¬µ¼ÖÂÍøÂç·¸×ï·Ö×ÓÐû²¼Á˱»µÁÎļþ¡£


https://cybernews.com/security/television-station-detroit-pbs-hacked/