ÒÔÉ«ÁÐTeleMessage¹«Ë¾ÔâºÚ¿Í¹¥»÷ÔÝÍ£·þÎñ
°ä²¼¹¦·ò 2025-05-061. ÒÔÉ«ÁÐTeleMessage¹«Ë¾ÔâºÚ¿Í¹¥»÷ÔÝÍ£·þÎñ
5ÔÂ5ÈÕ£¬ÒÔÉ«Áй«Ë¾TeleMessageÒòÔâºÚ¿Í¹¥»÷ÒÑÔÝÍ£ËùÓзþÎñ£¬Æäĸ¹«Ë¾Smarsh֤ʵÁËÕâÒ»ÐÂÎÅ£¬²¢°µÊ¾ÔÚµ÷²éËùνµÄ¡°Ç±ÔÚ°²È«ÊÂÎñ¡±¡£TeleMessageΪÆóÒµÌṩ°²È«µÄÒÆ¶¯ÐÂÎÅ·þÎñ£¬ÆäÖÐÔ̺¬ÓÃÓڴ浵ͨ¹ý¶Ëµ½¶Ë¼ÓÃÜÐÂÎÅÀûÓ÷¨Ê½£¨ÈçTelegram¡¢WhatsAppºÍSignal£©»¥»»ÐÂÎŵŤ¾ß£¬Ò»Ð©ÃÀ¹úµ±¾Ö¹ÙÔ±ÔøÊ¹ÓÃÆä·Ç¹Ù·½SignalÐÂÎÅ´æµµ¹¤¾ßTM SGNL¡£Õâ´ÎÊÂÎñÔ´ÓÚ404 MediaµÄ±¨Â·£¬Ò»ÃûºÚ¿ÍÈëÇÖÁËTeleMessage£¬»ñÈ¡ÁËʹÓÃTM SGNL´æµµµÄÖ±½ÓÐÂÎźÍȺÁÄ¡£ºÚ¿Í³ÆÈëÇÖ¹ý³ÌÇáËÉ£¬½öÆÆ·Ñ15µ½20·ÖÖÓ£¬²¢ÓÇÓô¸Ã·ì϶¿ÉÄÜÒÑ´æÔڽϳ¤¹¦·ò¡£Ö»¹ÜºÚ¿Í°µÊ¾ÄÚ¸ó³ÉÔ±ºÍǰ¹ú¶È°²È«ÕÕ·÷µÄÐÅϢδ±»Ð¹Â¶£¬µ«ÌáÈ¡µÄÊý¾ÝÔ̺¬µ±¾Ö¹ÙÔ±µÄÁªÏµÐÅÏ¢¡¢²¿ÃÅÐÂÎÅÄÚÈÝÒÔ¼°TeleMessageºó¶ËµÇ¼ʹ´¦¡£´Ë±í£¬±»ÌáÈ¡µÄÊý¾Ý½ØÍ¼»¹ÏÔʾÓëÃÀ¹úº£¹ØºÍ±ßÚï±£»¤¾Ö¡¢¼ÓÃÜÇ®±ÒÂòÂôËùCoinbaseÒÔ¼°·áÒµÒøÐеȽðÈÚ·þÎñÓйØÁª¡£Èí¼þ¹¤³ÌʦMicah Lee·ÖÎöTM SGNLºóÃÅSignalÀûÓ÷¨Ê½Ô´´úÂëʱ£¬·¢ÏÖÁËÓ²±àÂëÍ´´¦µÈ¼¸¸ö·ì϶¡£Signal½²»°È˰µÊ¾ÎÞ·¨±£ÕϷǹٷ½°æ±¾SignalµÄÒþÖÔ»ò°²È«ÊôÐÔ£¬¶ø°×¹¬¸±ÐÂÎÅÃØÊéÔòÇ¿µ÷SignalÊǾºË×¼µÄµÐÔÖʹÓÃÀûÓ÷¨Ê½£¬²¢×°ÖÃÔÚµÐÔÖÊÖ»úÉÏ¡£
https://www.bleepingcomputer.com/news/security/unofficial-signal-app-used-by-trump-officials-investigates-hack/
2. ÃÀ¹ú¶àµØ½ÌÓý»ú¹¹ÆµÔâÍøÂç¹¥»÷£¬Ñ§Éú½ø½¨ÊÜÓ°Ïì
5ÔÂ6ÈÕ£¬½üÆÚ£¬ÃÀ¹ú¶àµØ½ÌÓý»ú¹¹ÆµÔâÍøÂç¹¥»÷£¬ÑϳÁÓ°ÏìÁËѧÌÃÔËÓª¼°Ñ§Éú½ø½¨¡£ÐÂÄ«Î÷¸çÖݶà¸öÑ§ÇøºÍÎ÷ÐÂÄ«Î÷¸ç´óѧ¾ÍÊÇÊܺ¦ÕßÖ®Ò»¡£Î÷ÐÂÄ«Î÷¸ç´óѧ×Ô4ÔÂ13ÈÕÆðÔâ·êÍøÂç¹¥»÷£¬ÍøÕ¾Ì±»¾£¬ÏµÍ³ºÍ·þÎñÖжϣ¬¹Ù·½ÍøÕ¾ºÎʱ¸´ÔÉÐÎÞÔ¤¼Æ£¬Ð£Ô°WiFiÒ²´¦ÓÚ̱»¾×´Ì¬£¬Ð£·½±»ÆÈÌṩ´úÌæ·þÎñ£¬²¢Í¨¹ý¶àÖÖ·½Ê½ÏòѧÉú¡¢ÀÏʦºÍ¹¤×÷ÈËÔ±´«µÝ×îÐÂÇé¿ö¡£Í¬Ê±£¬ÀÏʦÃÇͨ¹ýÌṩ×÷ÒµºÍÏîÄ¿ÑÓÆÚÀ´Ö§³ÖѧÉú£¬ÒÔ¼õÇáÍ£¿Î¶ÔѧҵµÄÓ°Ï죬µ«´Ë¾ÙÈÔÒý·¢ÁËѧÉú²»Âú¡£×ôÖÎÑÇÖÝ¿¼Î¬ËþÏØÑ§ÌÃϵͳҲÓÚÖÜÎåÍí¼äÔâ·êÍøÂç¹¥»÷£¬Ó°ÏìÁË29ËùK-12ѧÌõÄ23,000ÃûѧÉú£¬Ñ§ÌÃÏµÍ³ÍøÂçÁ÷³ÌÅö±Ú£¬Ô±¹¤±»½¨Òé²»Òª½Ó¼û×ÀÃæÉ豸¡£Õâ´Î¹¥»÷±»¸ÃУ¹ÙÔ±³ÆÎª¡°ÑϳÁ¡±£¬²¢ÒÑÏòÓйز¿ÃŻ㱨¡£´Ë±í£¬¶í¿ËÀºÉÂíÖݰÍÌØ¶û˹ά¶û¹«Á¢Ñ§ÌÃÒ²ÒòÍøÂç¹¥»÷µ¼ÖÂÍÆËã»úϵͳÎÞ·¨ÔËÐУ¬±»ÆÈÈ¡µÞÖݼ¶¿¼ÊÔ¡£½üÆÚ£¬´ËÀàÊÂÎñƵ·¢£¬Ô̺¬°Í¶ûµÄĦÊй«Á¢Ñ§ÌõĴóÁìÓòÀÕË÷Èí¼þ¹¥»÷¡¢ÄÏ¿¨ÂÞÀ´ÄÉÖݲé¶û˹¶ÙÏØÑ§ÇøµÄÍøÂçÊÂÎñÒÔ¼°µÂ¿ËÈøË¹Öݰ¢¶ûÎĶÀÁ¢Ñ§ÇøµÄÎ¥¹æÊÂÎñµÈ£¬¾ù¶ÔѧÌÃÔËÓªºÍѧÉúÐÅÏ¢°²È«Ôì³ÉÁËÍþв¡£
https://therecord.media/hackers-serious-georgia-new-mexico
3. Co-opºÏ×÷ÉçÔâDragonForceÀÕË÷Èí¼þ¹¥»÷
5ÔÂ2ÈÕ£¬Co-opºÏ×÷ÉçÔâ·êµÄÍøÂç¹¥»÷±È×î³õ±¨Â·µÄ¸üΪÑϳÁ£¬ÏÖÒÑÈ·ÈÏ´óÁ¿¿Í»§Êý¾Ý±»µÁ¡£Co-opÆð³õµ»¯¹¥»÷Ó°Ï죬³ÆÒѹعز¿ÃÅITϵͳ£¬µ«ºóÐøµ÷²éÏÔʾºÚ¿Í³É¹¦½Ó¼ûÆäϵͳ²¢ÌáÈ¡Êý¾Ý£¬Ô̺¬ÏÖÈκÍǰÈγÉÔ±µÄÐÕÃû¡¢ÁªÏµ·½Ê½µÈ£¬µ«²»Éæ¼°ÃÜÂë¡¢ÒøÐÐÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£ÐÂÎÅÈËʿй©£¬¹¥»÷²úÉúÔÚ4ÔÂ22ÈÕ£¬¹¥»÷ÕßÀûÓÃÉç»á¹¤³Ì¹¥»÷³ÁÖÃÔ±¹¤ÃÜÂ룬½ø¶øÈëÇÖÍøÂç²¢ÇÔÈ¡Windows NTDS.ditÎļþ¡£Co-opĿǰÔÚ³Á½¨WindowsÓò½ÚÔìÆ÷£¬²¢Ç¿»¯Entra ID°²È«£¬KPMGÐÖúÌṩAWSÖ§³Ö¡£BBC×îб¨Â·Ö¸³ö£¬DragonForceÀÕË÷Èí¼þÐж¯µÄ´ÓÊô»ú¹¹ÊÇÕâ´Î¹¥»÷µÄÄ»ºóºÚÊÖ£¬¸Ã×éÖ¯»¹Ðû³Æ°ÑÎÕÁË2000Íò×¢²áCo-op»áÔ±¼Î½±´òËãÓû§µÄÊý¾Ý£¬²¢Ê¹ÓÃMicrosoft TeamsÁªÏµCo-op¸ß¹Ü½øÐÐÀÕË÷¡£Co-opÒÑÏòÔ±¹¤·¢ËÍÄÚ²¿Óʼþ£¬ÖÒ¸æÔÚʹÓÃMicrosoft Teamsʱά³Ö¾¯Ìè¡£DragonForceÊÇÒ»¸ö¡°ÀÕË÷Èí¼þ¼´·þÎñ¡±×éÖ¯£¬ÆäËûÍøÂç·¸×ï·Ö×ӿɲÎÓëÆäÖУ¬Ê¹ÓÃÆäÀÕË÷Èí¼þ½øÐй¥»÷£¬²¢Ö§¸¶Êê½ð³é³É¡£
https://www.bleepingcomputer.com/news/security/co-op-confirms-data-theft-after-dragonforce-ransomware-claims-attack/
4. 21¸öMagentoÀ©´óºóÃÅÂñ·üÁùÄ꣬2025Ä꼤»îΣ¼°Ç§¼ÒµçÉÌ
5ÔÂ2ÈÕ£¬Ò»ÏîÉæ¼°21¸öºóÃÅMagentoÀ©´óµÄ¹©¸øÁ´¹¥»÷ÒÑΣ¼°500ÖÁ1000¼Òµç×ÓÉÌÎñÉ̵꣬ÆäÖÐÔ̺¬Ò»¼Ò¼ÛÖµ400ÒÚÃÀÔªµÄ¿ç¹ú¹«Ë¾É̵ꡣSansec×êÑÐÈËÔ±·¢ÏÖ£¬²¿ÃÅÀ©´ó·¨Ê½ÔçÔÚ2019Äê¾Í±»Ö²ÈëºóÃÅ£¬µ«¶ñÒâ´úÂëÖ±µ½2025Äê4Ô²ű»¼¤»î¡£SansecÖ¸³ö£¬ÔÚÒ»´ÎÐͬ¹©¸øÁ´¹¥»÷ÖУ¬¶à¼Ò¹©¸øÉÌÔâºÚ¿Í¹¥»÷£¬¹²·¢ÏÖ21¸öÀûÓ÷¨Ê½º¬Ò»ÑùºóÃÅ£¬¸Ã¶ñÒâÈí¼þ6Äêǰ±»×¢È룬±¾ÖÜËæ¹¥»÷Õ߯ëÈ«½ÚÔìµç×ÓÉÌÎñ·þÎñÆ÷¶øÆðÍ·»îÔ¾¡£±»ÈëÇÖµÄÀ©´ó·¨Ê½À´×ÔTigren¡¢MeetanshiºÍMGSÈý¼Ò¹©¸øÉÌ£¬¾ßÌåÔ̺¬Tigren AjaxÌ×¼þ¡¢Tigren AjaxÓûÍûÇåµ¥¡¢Meetanshi ImageClean¡¢MGSÆ·ÅÆµÈ¶à¸öÀ©´ó¡£´Ë±í£¬Sansec»¹·¢ÏÖÁËWeltpixel GoogleTagManagerÀ©´óµÄÊÜËð°æ±¾£¬µ«ÎÞ·¨È·ÈÏÊÜËðµã¡£ÔÚËùÓй۲쵽µÄ°¸ÀýÖУ¬À©´ó·¨Ê½¾ùÔ̺¬Ò»¸öÔö³¤µ½Ðí¿ÉÖ¤²é³ÎļþÖеÄPHPºóÃÅ£¬¸ÃºóÃÅͨ¹ý²é³Ìض¨HTTPÒªÇó²ÎÊýÀ´ÔÊÐíÔ¶³ÌÓû§ÉÏ´«ÐÂÐí¿ÉÖ¤²¢Ö´ÐÐËÁÒâPHP´úÂ룬¿ÉÄܵ¼ÖÂÊý¾Ý͵ÇÔ¡¢skimmer×¢ÈëµÈÑϳÁºó¹û¡£SansecÒÑÁªÏµÕâÈý¼Ò¹©¸øÉÌ£¬µ«MGSδ»ØÓ¦£¬Tigren·ñ¶¨·ì϶²¢³ÖÐø´«²¼´øºóÃŵÄÀ©´ó£¬MeetanshiÈϿɷþÎñÆ÷·ì϶µ«Î´ÈÏ¿ÉÀ©´óÈëÇÖ¡£
https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores/
5. ¶ñÒâPyPi°üÀûÓÃGmail¼°WebSocketsÇÔÃÜ
5ÔÂ1ÈÕ£¬SocketÍþв×êÑÐÍŶӽüÈÕ·¢ÏÖÁËÆß¸ö¶ñÒâPyPi°ü£¬ÕâЩ°üÀûÓÃGmailµÄSMTP·þÎñÆ÷ºÍWebSockets¼¼ÊõÖ´ÐÐÊý¾Ýй¶ºÍÔ¶³ÌºÅÁîÖ´Ðй¥»÷¡£ÕâЩ¶ñÒâ°üÔ̺¬Coffin-Codes-Pro¡¢Coffin-Codes-NET2¡¢Coffin-Codes-NET¡¢Coffin-Codes-2022¡¢Coffin2022¡¢Coffin-Grave¼°cfc-bsb£¬ÆäÖÐCoffin-Codes-2022µÄÏÂÔØÁ¿¸ß´ï18,100´Î£¬²¿ÃŰüÉõÖÁÒÑÔÚPyPIÉÏ´æÔÚËÄÄêÖ®¾Ã¡£ÕâЩ¶ñÒâ°ü¼ÙÒâºÏ·¨µÄCoffin°ü£¬ºóÕßÊÇÓÃÓÚ½«Jinja2Ä£°å¼¯³Éµ½DjangoÏîÖ÷ÕÅÇáÁ¿¼¶ÊÊÅäÆ÷¡£¶ñÒâÖ°ÄÜÖØÒª±í´Ë¿Ìͨ¹ýGmail½øÐÐÒñ±ÎÔ¶³Ì½Ó¼ûºÍÊý¾Ýй¶£¬ÀûÓÃÓ²±àÂëµÄGmailƾ֤µÇ¼SMTP·þÎñÆ÷·¢ËÍ¿úËÅÐÅÏ¢£¬ÒÔÔÊÐí¹¥»÷ÕßÔ¶³Ì½Ó¼ûÊÜϰȾϵͳ¡£ÓÉÓÚGmailÊÇ¿ÉÕÛ·þÎñ£¬´ËÀà»î¶¯ÄÑÒÔ±»·À»ðǽºÍÖն˼ì²âÓëÏìӦϵͳ£¨EDR£©ÏóÕ÷Ϊ¿ÉÒÉ¡£Ö®ºó£¬Ö²È뷨ʽͨ¹ýWebSocket³ÉÁ¢ÓƾᢼÓÃܵÄË«ÏòËí·£¬ÔÊÐí¹¥»÷Õß½øÐÐÄÚ²¿ÖÎÀíÃæ°åºÍAPI½Ó¼û¡¢Îļþ´«Êä¡¢µç×ÓÓʼþй¶¡¢shellºÅÁîÖ´ÐÓ×¢Æ¾Ö¤ÍøÂç¼°ºáÏòÒÆ¶¯µÈ²Ù×÷¡£SocketÖ¸³ö£¬ÕâЩ¶ñÒâ°ü¿ÉÄÜÓµÓÐÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÒâͼ£¬´ÓʹÓõĵç×ÓÓʼþµØÖ·¼°ÀàËÆÕ½ÊõÖÐÄܹ»¿´³ö¡£
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-abuse-gmail-websockets-to-hijack-systems/
6. TicketToCashÊý¾Ý¿âÅäÖÃÃýÎóÖÂ52Íò¿Í»§Êý¾Ýй¶
5ÔÂ1ÈÕ£¬ÍøÂ簲ȫ×êÑÐÔ±Jeremiah Fowler½üÈÕ·¢ÏÖ£¬»î¶¯ÃÅÆ±×ªÊÛÆ½Ì¨TicketToCashµÄÒ»¸öÅäÖÃÃýÎó¡¢ÎÞÃÜÂë±£»¤µÄ200GB¹«¿ªÊý¾Ý¿âй¶ÁË52ÍòÃû¿Í»§µÄÊý¾Ý¡£¸ÃÊý¾Ý¿âÔ̺¬³¬¹ý52Íò±Ê¼Í¼£¬Éæ¼°¿Í»§µÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¼°²¿ÃŲÆÕþ¾ßÌåÐÅÏ¢¡£Ð¹Â¶µÄÊý¾Ý²»½öÔ̺¬ÐÕÃûºÍµç×ÓÓʼþµØÖ·£¬»¹º¸ÇÁ˲¿ÃÅÐÅÓþ¿¨ºÅ¡¢ÏÖʵµØÖ·¡¢Æ±Ö¤¸±±¾ÒÔ¼°Ô̺¬PIIµÄÎļþ£¬Èç¼ÒͥסַºÍÐÅÓþ¿¨ºÅµÈ¡£Êý¾Ý¿âÃû³ÆÏÔʾÆäÒÔ¶àÖÖÊý×ÖÌåʽ±£Áô¿Í»§Îļþ£¬ÈçPDF¡¢JPG¡¢PNGºÍJSONµÈ¡£Fowler²é¿´Îļþʱ·¢ÏÖ£¬ÆäÖÐÔ̺¬´óÁ¿ÒôÀÖ»áºÍÆäËûÏÖ³¡»î¶¯µÄÃÅÆ±¡¢ÃÅÆ±ÈöÉÖ¤Ã÷¼°¸¶¿îÊÕÌõ½ØÍ¼£¬²¿ÃÅÎļþ»¹ÏÔʾÁËÐÅÓþ¿¨ºÅ¡¢È«Ãû¡¢µç×ÓÓʼþµØÖ·ºÍ¼ÒͥסַµÈÃô¸ÐÐÅÏ¢¡£Ö»¹ÜÄÚ²¿ÏßË÷Åú×¢ÕâЩÊý¾ÝÊôÓÚTicketToCash£¬µ«¸Ã¹«Ë¾ÔÚÊÕµ½Í¨Öªºóδ×ö³ö³õ²½»ØÓ¦£¬Êý¾Ý¿âÔÚµÚ¶þ´Î¾¯±¨Ç°Ò»Ïò´¦ÓÚ¶³ö״̬£¬µ¼ÖÂÎļþÔÚËÄÌìÄÚ³ÖÐøÂ¶³ö¡£FowlerÖÒ¸æ³Æ£¬ÕâЩÐÅÏ¢ÈôÂäÈë·¸·¨·Ö×ÓÖ®ÊÖ£¬¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µö¡¢Éí·Ý͵ÇÔ»òÔì×÷ºÍתÊÛ¼ÙÆ±µÈÚ²ÆÐÐΪ£¬ÇÒÓ×ÎÒÉí·ÝÐÅÏ¢ºÍ²ÆÕþÐÅÏ¢µÄÓÐЧÆÚ¿ÉÄܳ¤´ïÊýÄ꣬й¶ºó¹ûÑϳÁ¡£
https://hackread.com/ticket-resale-platform-tickettocash-exposed-user-data/


¾©¹«Íø°²±¸11010802024551ºÅ