HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬ÍƳöÐÂAPIÖú×éÖ¯·À±¸¶ñÒâ»î¶¯

°ä²¼¹¦·ò 2025-02-26

1. HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬ÍƳöÐÂAPIÖú×éÖ¯·À±¸¶ñÒâ»î¶¯


2ÔÂ25ÈÕ£¬¡°Have I Been Pwned¡±£¨HIBP£©Êý¾Ýй¶֪ͨ·þÎñ½üÆÚÐÂÔöÁ˳¬¹ý2.84ÒÚ¸ö±»µÁÕË»§ÐÅÏ¢£¬ÕâЩÐÅÏ¢ÊÇ´ÓÒ»¸öÃûΪ¡°ALIEN TXTBASE¡±µÄTelegramƵ·ÉÏ·¢Ïֵġ£HIBPÊ×´´ÈËÌØÂåÒÁ¡¤ºàÌØÔÚ·ÖÎö1.5TBµÄÇÔÈ¡ÕßÈÕ־ʱ·¢ÏÖÁËÕâЩ±»µÁÕË»§¡£ÕâЩÈÕÖ¾Ô̺¬230ÒÚÐÐÊý¾Ý£¬Éæ¼°4.93ÒÚ¸öÎ¨Ò»ÍøÕ¾ºÍµç×ÓÓʼþµØÖ·¶Ô£¬Ó°ÏìÁË2.84ÒÚ¸öΨһµç×ÓÓʼþµØÖ·¡£´Ë±í£¬HIBP»¹Ôö³¤ÁË2.44ÒÚ¸ö´Óδ¼û¹ýµÄÃÜÂ룬²¢¶ÔÒÑÓеÄ1.99ÒÚ¸öÃÜÂë½øÐÐÁ˼ÆÊý¸üС£ÓÉÓÚÕË»§ÊýÁ¿ÖØ´ó£¬ÕâЩÊý¾Ý¿ÉÄÜÔ̺¬ÐÂ¾ÉÆ¾Ö¤¡£ÔÚÔö³¤±»µÁÕË»§µ½HIBPÊý¾Ý¿âǰ£¬ºàÌØÍ¨¹ý²é³­ÃÜÂë³ÁÖó¢ÊÔÀ´È·ÈÏÕË»§µÄÕæÊµÐÔ¡£´Ë¿Ì£¬ÓòÃûËùÓÐÕߺÍÍøÕ¾ÔËÓªÉÌÄܹ»Í¨¹ýÐÂÔö³¤µÄAPI²éÎÊÇÔÈ¡ÕßÈÕÖ¾£¬ÒÔ¼ø±ðÍ´´¦±»µÁµÄ¿Í»§¡£Í¨³£Óû§ÈôÊǶ©ÔÄÁËHIBP֪ͨ£¬Ò²ÄܲéÃ÷×Ô¼ºµÄÕË»§ÊÇ·ñ³Ê´Ë¿ÌÈÕÖ¾ÖУ¬µ«ºàÌØÇ¿µ÷²»»á¹«¿ªÏÔʾÃô¸ÐÐÅÏ¢¡£ÕâЩÐÂAPI½«Ô®ÊÖ×éÖ¯¼ø±ð¶ñÒâ»î¶¯ÆðÔ´£¬²¢ÔÚÇÖº¦²úÉúǰÓèÒÔ×èÖ¹¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/


2. GitVenom¶ñÒâÈí¼þ»î¶¯£ºÀûÓÃGitHub´æ´¢¿âÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤


2ÔÂ25ÈÕ£¬GitVenomÊÇÒ»¸öÒÑ»îÔ¾ÖÁÉÙÁ½ÄêµÄÈ«ÇòÐÔ¶ñÒâÈí¼þ»î¶¯£¬³Áµã¹Ø×¢¶íÂÞ˹¡¢°ÍÎ÷ºÍÍÁ¶úÆä¡£Ëüͨ¹ýGitHubÉϵÄÊý°Ù¸öÐéα´æ´¢¿âÓÕÆ­Óû§ÏÂÔØÐÅÏ¢ÇÔÈ¡·¨Ê½¡¢Ô¶³Ì½Ó¼ûľÂí£¨RAT£©ºÍ¼ôÌù°å½Ù³Ö·¨Ê½£¬ÒÔÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤¡£ÕâЩÐéα´æ´¢¿â¾­¹ý¾«ÐÄÔì×÷£¬ÓµÓоßÌåÐÅÏ¢ºÍÊʵ±±àдµÄ×ÔÊöÎļþ£¬¿ÉÄܽèÖúÁËÈËΪÖÇÄܹ¤¾ßµÄÔ®ÊÖ£¬²¢Í¨¹ý±¨´ðÔö³¤Ìá½»ÊýÁ¿À´Ìá¸ß¿ÉÐŶÈ¡£×¢ÈëÏîÖ÷ÕŶñÒâ´úÂëÓöàÖÖ˵»°±àд£¬ÒÔÌÓ±ÜÌØ¶¨´úÂëÉó²é¹¤¾ßµÄ¼ì²â¡£Ò»µ©Êܺ¦ÕßÖ´ÐÐÓÐЧ¸ºÔØ£¬¾Í»áÏÂÔØµÚ¶þ½×¶Î¶ñÒâÈí¼þ¡£GitVenomÖÐʹÓõŤ¾ßÔ̺¬Node.jsÇÔÈ¡·¨Ê½¡¢AsyncRAT¡¢QuasarºóÃźͼôÌù°å½Ù³Ö·¨Ê½¡£»ã±¨³Áµã½éÉÜÁËһ·°¸Àý£¬¹¥»÷Õßͨ¹ý´Ë»î¶¯»ñµÃÁ˼ÛÖµ50ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£Ö»¹Ü´ËÀà»î¶¯²¢²»º±¼û£¬µ«GitVenomµÄ³ÖÐø¹¦·òºÍ¹æÄ£Ö¤ÁËÈ»ºÏ·¨Æ½Ì¨µÄÀÄÓÃÒÀÈ»¼«¶ÈÓÐЧ¡£Òò¶ø£¬³¹µ×Éó²éÏîÄ¿¡¢Ê¹Ó÷À²¡¶¾¹¤¾ßɨÃèÎļþÒÔ¼°ÔÚ¸ôÀë»·¾³ÖÐÖ´ÐÐÏÂÔØµÄÎļþÖÁ¹Ø³ÁÒª¡£


https://www.bleepingcomputer.com/news/security/gitvenom-attacks-abuse-hundreds-of-github-repos-to-steal-crypto/


3. Auto-Color£ºÐ·¢ÏÖµÄLinuxºóÃŶñÒâÈí¼þÍþв


2ÔÂ25ÈÕ£¬2024Äê11ÔÂÖÁ12ÔÂÆÚ¼ä£¬Ò»ÖÖÃûΪ¡°Auto-Color¡±µÄδ¼Í¼LinuxºóÃű»·¢ÏÖ£¬ÖØÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĴóѧºÍµ±¾Ö×éÖ¯¡£¸Ã¶ñÒâÈí¼þÓµÓм«Ç¿µÄÌÓ±ÜÐÔ£¬ÄÑÒÔ´ÓÊÜϰȾϵͳÖÐɾ³ý£¬²¢Äܳ¤¹¦·òά³Ö½Ó¼û¡£ËüÓëSymbiote Linux¶ñÒâÈí¼þ¼Ò×åÓÐÀàËÆÖ®´¦£¬µ«Á½Õß²¢²»Ò»Ñù¡£Auto-Colorͨ¹ýÖ´ÐмÙ×°³ÉÁ¼ÐÔÃû³ÆµÄÎļþÆðÍ·¹¥»÷£¬ÈôÊÇÒÔrootȨÏÞÔËÐУ¬»á×°ÖöñÒâ¿âÖ²ÈëÎï²¢Åú¸ÄϵͳÎļþÒÔÈ·±£ÆäÖ´ÐС£ËüʹÓÃ×Ô½ç˵¼ÓÃÜËã·¨½âÃܺÅÁîºÍ½ÚÔì·þÎñÆ÷ÐÅÏ¢£¬²¢Í¨¹ýËæ»úÖµÎÕÊÖÑéÖ¤»¥»»¡£C2Äܹ»ºÅÁîAuto-ColorÖ´ÐжàÖÖ²Ù×÷£¬Èç´ò¿ª·´Ïòshell¡¢Ö´ÐÐËÁÒâºÅÁî¡¢Åú¸Ä»ò´´½¨Îļþ¡¢³äÈδúÀíÒÔ¼°¶¯Ì¬Åú¸ÄÅäÖá£Auto-Color»¹ÓµÓÐÀàËÆrootkitµÄÖ°ÄÜ£¬ÈçÀ¹½ØÏµÍ³Å²ÓúͰµ²ØC2ÏνÓ¡£Ëü»¹ÓµÓÐÄÚÖõġ°ÖÕÖ¹¿ª¹Ø¡±£¬ÔÊÐí¹¥»÷Õßµ±¼´É¾³ýϰȾºÛ¼£¡£¼øÓÚÆäÒþÉíÐÔ¡¢Ä£¿é»¯Éè¼ÆºÍÔ¶³Ì½ÚÔìÖ°ÄÜ£¬Auto-Color¶ÔLinuxϵͳ×é³ÉÑϳÁÍþв¡£½¨Òé¼à¿Ø¹Ø¼üÓÆ¾Ã»úÔìµÄ±ä¶¯£¬²é³­ÏµÍ³ÈÕÖ¾ºÍÍøÂçÁ÷Á¿ÖÐÓëÁгöµÄC2 IPµÄÏνÓ£¬²¢Ê¹ÓûùÓÚÐÐΪµÄÍþв¼ì²â½â¾ö¹æ»®½øÐзÀÓù¡£


https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/


4. DISA Global SolutionsÊý¾Ýй¶ÊÂÎñÓ°Ïì330ÍòÈË


2ÔÂ25ÈÕ£¬DISA Global SolutionsÊÇÒ»¼ÒÃÀ¹úµ±ÏȵIJ¼¾°É¸²éºÍÒ©Îï¼°¾Æ¾«²âÊÔ¹«Ë¾£¬½üÆÚÔâ·êÁËһ·³Á´óµÄÊý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÁ˶à´ï330ÍòÈË¡£¸ÃÊÂÎñ³õ´ÎÓÚ½ñÄê1ÔÂÅû¶£¬Éæ¼°2024Äê2ÔÂ9ÈÕÖÁ4ÔÂ22ÈÕÆÚ¼ä²úÉúµÄÍøÂ簲ȫÊÂÎñ¡£¾­¹ýÉî¿Ìµ÷²é£¬DISAÈ·ÈÏÃô¸ÐÊý¾ÝÔÚÕâ´Î¹¥»÷ÖÐÔ⵽й¶¡£×÷ΪռÓÐ55,000¶à¼Ò¿Í»§£¬Ô̺¬30%µÄ²Æ¸»500Ç¿ÆóÒµµÄ·þÎñÉÌ£¬Õâ´ÎÊý¾Ýй¶¿ÉÄÜÔÚÈ«¹úÁìÓòÄÚ²úÉú¿í·ºÓ°Ï졣й¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢µ±¾ÖÉí·ÝÖ¤ºÅÂëÒÔ¼°²ÆÕþÕË»§ÐÅÏ¢µÈ¡£Ö»¹ÜDISAδй©¾ßÌåÔâ·êÁ˺ÎÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬µ«Óб¨Â·³ÆËûÃÇÒÑÖ§¸¶Êê½ðÒÔÔ¤·ÀÊý¾Ý±»¹«¿ª°ä²¼¡£Îª±£»¤ÊÜÓ°ÏìÈËȺ£¬DISAͨ¹ýExperianÌṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ£¬²¢½¨ÒéÓ×ÎÒÉèÖÃڲƭ¾¯±¨ºÍ°²È«¶³½á¡£


https://www.bleepingcomputer.com/news/security/us-drug-testing-firm-disa-says-data-breach-impacts-33-million-people/


5. Orange GroupÔâºÚ¿ÍÈëÇÖ£¬ÊýǧÓû§¼°Ô±¹¤Êý¾ÝÔâй¶


2ÔÂ25ÈÕ£¬Ò»ÃûºÚ¿ÍÐû³Æ³É¹¦ÈëÇÖÁË·¨¹úµçÐÅÔËÓªÉ̺ÍÊý×Ö·þÎñÌṩÉÌ Orange Group µÄϵͳ£¬²¢ÇÔÈ¡ÁËÊýǧ·ÝÔ̺¬Óû§¼Í¼ºÍÔ±¹¤Êý¾ÝµÄÄÚ²¿Îļþ¡£¸ÃºÚ¿ÍʹÓû¯Ãû Rey£¬×Ô³ÆÊÇ HellCat ÀÕË÷Èí¼þ×éÖ¯µÄ³ÉÔ±£¬µ«°µÊ¾Õâ´ÎÈëÇÖ²¢·Ç HellCat µÄ²Ù×÷¡£¾Ý Rey Ëù³Æ£¬±»µÁÊý¾ÝÖØÒªÀ´×Ô Orange µÄÂÞÂíÄáÑÇ·Ö¹«Ë¾£¬Ô̺¬µç×ÓÓʼþµØÖ·¡¢Ô´´úÂë¡¢·¢Æ±¡¢ºÏͬ¡¢¿Í»§ºÍÔ±¹¤ÐÅÏ¢µÈ£¬×ÜÁ¿½ü 6.5GB¡£Orange ¹«Ë¾Ö¤ÊµÁËÕâ´ÎÈëÇÖÊÂÎñ£¬µ«°µÊ¾Ëü²úÉúÔÚÒ»¸ö·Ç¹Ø¼üÀûÓ÷¨Ê½ÉÏ£¬²¢ÒÑ·¢Õ¹µ÷²éÒÔ×îÓ×»¯Ó°Ï졣й¶µÄÊý¾ÝÖÐÔ̺¬Ò»Ð©³Â¾ÉºÍÒѹýÆÚµÄÐÅÏ¢£¬µ« Orange Ç¿µ÷¿Í»§µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£Orange ½²»°È˰µÊ¾£¬¹«Ë¾µÄÍøÂ簲ȫºÍ IT ÍŶÓÔÚÖÂÁ¦ÆÀ¹ÀÎ¥¹æË®Æ½²¢½µµÍÊÂÎñÓ°Ï죬ͬʱ³Ô¼µ×ñÊØÓйØË¾·¨Ê¹Ãü²¢ÓëÓйز¿ÃźÏ×÷½â¾ö´ËÊ¡£Rey »¹Ð¹Â©£¬ËûÃÇÀûÓÃй¶µÄƾ֤ºÍ Jira Èí¼þ¼°ÄÚ²¿ÃÅ»§Öеķì϶ÇÖÈëÁË Orange ϵͳ£¬²¢ÔÚÊÜϰȾµÄϵͳÉϸéÖÃÁËÀÕË÷ÐÅ£¬µ« Orange ²¢Î´½øÐн»Éæ¡£


https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/


6. µ×ÌØÂÉPBSÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷£¬Ãô¸ÐÐÅϢй¶


2ÔÂ25ÈÕ£¬µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾£¨PBS£©½üÆÚÔâ·êÁËÍøÂç¹¥»÷£¬÷è÷ëÀÕË÷Èí¼þÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢°ä²¼ÁË345GBµÄ±»µÁÎļþ¡£Õâ´ÎÊý¾Ýй¶ÓÚ2024Äê9ÔÂ1ÈÕ±»·¢ÏÖ£¬µ¼Öµ×ÌØÂÉPBSµÄijЩϵͳϰȾ¶ñÒâÈí¼þ£¬ÎÞ·¨½Ó¼û²¿ÃÅÎļþ¡£±»µÁÐÅÏ¢Ô̺¬ÖÁÉÙ1694È˵ÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µØÖ·ºÍÉç»á±£Ïպš£µ×ÌØÂÉPBSѸ¿ì²ÉÈ¡Ðж¯£¬Éî¿Ì²éÎÊÊÜÓ°ÏìÓ×ÎÒµÄ×îÐÂÁªÏµÐÅÏ¢£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓþ¼à¿Ø·þÎñ¡£Í¬Ê±£¬¸ÃµçÊǪ́»¹ÏòÁª¹ú·¨Âɲ¿ÃÅ´«µÝÁ˸ÃÊÂÎñ£¬²¢ÖÂÁ¦Ö´Ðжî±íµÄ±£ÏÕ´ëÊ©²¢ÅàѵԱ¹¤¡£÷è÷ëÀÕË÷Èí¼þÊÇÒ»¸ö¶íÓïºÚ¿Í×éÖ¯£¬×¨ÃŹ¥»÷×éÖ¯ÒÔ»ñÈ¡¾­¼ÃÀûÒæ£¬ÔøÕë¶ÔÂ׶صȵØÒ½Ôº·¢ÆðÍøÂç¹¥»÷¡£Õâ´Î¹¥»÷ÖУ¬÷è÷ëÀÕË÷Èí¼þÀûÓÃCitrix BleedÁãÈÕ·ì϶ÀûÓÃÊܺ¦Õߣ¬¶øµ×ÌØÂÉPBSËÆºõûÓÐÖ§¸¶Êê½ð£¬µ¼ÖÂÍøÂç·¸×ï·Ö×Ó°ä²¼Á˱»µÁÎļþ¡£


https://cybernews.com/security/television-station-detroit-pbs-hacked/