HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯

Ðû²¼Ê±¼ä 2025-02-26

1. HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯


2ÔÂ25ÈÕ£¬£¬£¬£¬¡°Have I Been Pwned¡±£¨HIBP£©Êý¾Ýй¶֪ͨЧÀͽüÆÚÐÂÔöÁËÁè¼Ý2.84ÒÚ¸ö±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬ÕâЩÐÅÏ¢ÊÇ´ÓÒ»¸öÃûΪ¡°ALIEN TXTBASE¡±µÄTelegramƵµÀÉÏ·¢Ã÷µÄ¡£¡£¡£¡£HIBPÊ×´´ÈËÌØÂåÒÁ¡¤ºàÌØÔÚÆÊÎö1.5TBµÄÇÔÈ¡ÕßÈÕ־ʱ·¢Ã÷ÁËÕâЩ±»µÁÕË»§¡£¡£¡£¡£ÕâЩÈÕÖ¾°üÀ¨230ÒÚÐÐÊý¾Ý£¬£¬£¬£¬Éæ¼°4.93ÒÚ¸öÎ¨Ò»ÍøÕ¾ºÍµç×ÓÓʼþµØµã¶Ô£¬£¬£¬£¬Ó°ÏìÁË2.84ÒÚ¸öΨһµç×ÓÓʼþµØµã¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬HIBP»¹Ìí¼ÓÁË2.44ÒÚ¸ö´Óδ¼û¹ýµÄÃÜÂ룬£¬£¬£¬²¢¶ÔÒÑÓеÄ1.99ÒÚ¸öÃÜÂë¾ÙÐÐÁ˼ÆÊý¸üС£¡£¡£¡£ÓÉÓÚÕË»§ÊýÄ¿ÖØ´ó£¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܰüÀ¨ÐÂ¾ÉÆ¾Ö¤¡£¡£¡£¡£ÔÚÌí¼Ó±»µÁÕË»§µ½HIBPÊý¾Ý¿âǰ£¬£¬£¬£¬ºàÌØÍ¨¹ý¼ì²éÃÜÂëÖØÖÃʵÑéÀ´È·ÈÏÕË»§µÄÕæÊµÐÔ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÓòÃûËùÓÐÕߺÍÍøÕ¾ÔËÓªÉÌ¿ÉÒÔͨ¹ýÐÂÌí¼ÓµÄAPIÅÌÎÊÇÔÈ¡ÕßÈÕÖ¾£¬£¬£¬£¬ÒÔʶ±ðƾ֤±»µÁµÄ¿Í»§¡£¡£¡£¡£Í¨Ë×Óû§ÈôÊǶ©ÔÄÁËHIBP֪ͨ£¬£¬£¬£¬Ò²ÄܲéÃ÷×Ô¼ºµÄÕË»§ÊÇ·ñ·ºÆðÔÚÈÕÖ¾ÖУ¬£¬£¬£¬µ«ºàÌØÇ¿µ÷²»»á¹ûÕæÏÔʾÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÕâЩÐÂAPI½«×ÊÖú×é֯ʶ±ð¶ñÒâ»î¶¯ÈªÔ´£¬£¬£¬£¬²¢ÔÚË𺦱¬·¢Ç°ÓèÒÔ×èÖ¹¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/


2. GitVenom¶ñÒâÈí¼þ»î¶¯£ºÊ¹ÓÃGitHub´æ´¢¿âÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤


2ÔÂ25ÈÕ£¬£¬£¬£¬GitVenomÊÇÒ»¸öÒÑ»îÔ¾ÖÁÉÙÁ½ÄêµÄÈ«ÇòÐÔ¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬ÖØµã¹Ø×¢¶íÂÞ˹¡¢°ÍÎ÷ºÍÍÁ¶úÆä¡£¡£¡£¡£Ëüͨ¹ýGitHubÉϵÄÊý°Ù¸öÐéα´æ´¢¿âÓÕÆ­Óû§ÏÂÔØÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂí£¨RAT£©ºÍ¼ôÌù°åÐ®ÖÆ³ÌÐò£¬£¬£¬£¬ÒÔÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤¡£¡£¡£¡£ÕâЩÐéα´æ´¢¿â¾­ÓÉÈ«ÐÄÖÆ×÷£¬£¬£¬£¬¾ßÓÐÏêϸÐÅÏ¢ºÍÊʵ±±àдµÄ×ÔÊöÎļþ£¬£¬£¬£¬¿ÉÄܽèÖúÁËÈ˹¤ÖÇÄܹ¤¾ßµÄ×ÊÖú£¬£¬£¬£¬²¢Í¨¹ýÈËΪÔöÌíÌá½»ÊýÄ¿À´Ìá¸ß¿ÉÐŶȡ£¡£¡£¡£×¢ÈëÏîÄ¿µÄ¶ñÒâ´úÂëÓöàÖÖÓïÑÔ±àд£¬£¬£¬£¬ÒÔÌÓ±ÜÌØ¶¨´úÂëÉó²é¹¤¾ßµÄ¼ì²â¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÖ´ÐÐÓÐÓøºÔØ£¬£¬£¬£¬¾Í»áÏÂÔØµÚ¶þ½×¶Î¶ñÒâÈí¼þ¡£¡£¡£¡£GitVenomÖÐʹÓõŤ¾ß°üÀ¨Node.jsÇÔÈ¡³ÌÐò¡¢AsyncRAT¡¢QuasarºóÃźͼôÌù°åÐ®ÖÆ³ÌÐò¡£¡£¡£¡£±¨¸æÖصãÏÈÈÝÁËÒ»Æð°¸Àý£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´Ë»î¶¯»ñµÃÁ˼ÛÖµ50ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£Ö»¹Ü´ËÀà»î¶¯²¢²»ÓÐÊý£¬£¬£¬£¬µ«GitVenomµÄÒ»Á¬Ê±¼äºÍ¹æÄ£Ö¤ÊµÎúÕýµ±Æ½Ì¨µÄÀÄÓÃÈÔÈ»ºÜÊÇÓÐÓᣡ£¡£¡£Òò´Ë£¬£¬£¬£¬³¹µ×Éó²éÏîÄ¿¡¢Ê¹Ó÷À²¡¶¾¹¤¾ßɨÃèÎļþÒÔ¼°ÔÚ¸ôÀëÇéÐÎÖÐÖ´ÐÐÏÂÔØµÄÎļþÖÁ¹ØÖ÷Òª¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gitvenom-attacks-abuse-hundreds-of-github-repos-to-steal-crypto/


3. Auto-Color£ºÐ·¢Ã÷µÄLinuxºóÃŶñÒâÈí¼þÍþв


2ÔÂ25ÈÕ£¬£¬£¬£¬2024Äê11ÔÂÖÁ12ÔÂʱ´ú£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Auto-Color¡±µÄδ¼Í¼LinuxºóÃű»·¢Ã÷£¬£¬£¬£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĴóѧºÍÕþ¸®×éÖ¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ßÓм«Ç¿µÄÌÓ±ÜÐÔ£¬£¬£¬£¬ÄÑÒÔ´ÓÊÜѬȾϵͳÖÐɾ³ý£¬£¬£¬£¬²¢Äܳ¤Ê±¼ä¼á³Ö»á¼û¡£¡£¡£¡£ËüÓëSymbiote Linux¶ñÒâÈí¼þ¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬£¬£¬µ«Á½Õß²¢²»Ïàͬ¡£¡£¡£¡£Auto-Colorͨ¹ýÖ´ÐÐαװ³ÉÁ¼ÐÔÃû³ÆµÄÎļþ×îÏȹ¥»÷£¬£¬£¬£¬ÈôÊÇÒÔrootȨÏÞÔËÐУ¬£¬£¬£¬»á×°ÖöñÒâ¿âÖ²ÈëÎï²¢ÐÞ¸ÄϵͳÎļþÒÔÈ·±£ÆäÖ´ÐС£¡£¡£¡£ËüʹÓÃ×Ô½ç˵¼ÓÃÜËã·¨½âÃÜÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÐÅÏ¢£¬£¬£¬£¬²¢Í¨¹ýËæ»úÖµÎÕÊÖÑéÖ¤½»Á÷¡£¡£¡£¡£C2¿ÉÒÔÏÂÁîAuto-ColorÖ´ÐжàÖÖ²Ù×÷£¬£¬£¬£¬Èç·­¿ª·´Ïòshell¡¢Ö´ÐÐí§ÒâÏÂÁî¡¢Ð޸Ļò½¨ÉèÎļþ¡¢³äµ±ÊðÀíÒÔ¼°¶¯Ì¬ÐÞ¸ÄÉèÖᣡ£¡£¡£Auto-Color»¹¾ßÓÐÀàËÆrootkitµÄ¹¦Ð§£¬£¬£¬£¬Èç×赲ϵͳŲÓúÍÒþ²ØC2ÅþÁ¬¡£¡£¡£¡£Ëü»¹¾ßÓÐÄÚÖõġ°ÖÕÖ¹¿ª¹Ø¡±£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÁ¬Ã¦É¾³ýѬȾºÛ¼£¡£¡£¡£¡£¼øÓÚÆäÒþÉíÐÔ¡¢Ä£¿£¿£¿£¿£¿£¿£¿é»¯Éè¼ÆºÍÔ¶³Ì¿ØÖƹ¦Ð§£¬£¬£¬£¬Auto-Color¶ÔLinuxϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£¡£½¨Òé¼à¿ØÒªº¦³¤ÆÚ»úÖÆµÄת±ä£¬£¬£¬£¬¼ì²éϵͳÈÕÖ¾ºÍÍøÂçÁ÷Á¿ÖÐÓëÁгöµÄC2 IPµÄÅþÁ¬£¬£¬£¬£¬²¢Ê¹ÓûùÓÚÐÐΪµÄÍþв¼ì²â½â¾ö¼Æ»®¾ÙÐзÀÓù¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/


4. DISA Global SolutionsÊý¾Ýй¶ÊÂÎñÓ°Ïì330ÍòÈË


2ÔÂ25ÈÕ£¬£¬£¬£¬DISA Global SolutionsÊÇÒ»¼ÒÃÀ¹úÁìÏȵÄÅ侰ɸ²éºÍÒ©Îï¼°¾Æ¾«²âÊÔ¹«Ë¾£¬£¬£¬£¬½üÆÚÔâÓöÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°ÏìÁ˶à´ï330ÍòÈË¡£¡£¡£¡£¸ÃÊÂÎñÊ×´ÎÓÚ½ñÄê1ÔÂÅû¶£¬£¬£¬£¬Éæ¼°2024Äê2ÔÂ9ÈÕÖÁ4ÔÂ22ÈÕʱ´ú±¬·¢µÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¾­ÓÉÉîÈëÊӲ죬£¬£¬£¬DISAÈ·ÈÏÃô¸ÐÊý¾ÝÔڴ˴ι¥»÷ÖÐÔ⵽й¶¡£¡£¡£¡£×÷ΪӵÓÐ55,000¶à¼Ò¿Í»§£¬£¬£¬£¬°üÀ¨30%µÄ²Æ²ú500Ç¿ÆóÒµµÄЧÀÍÉÌ£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔÚÌìϹæÄ£ÄÚ±¬·¢ÆÕ±éÓ°Ïì¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂëÒÔ¼°²ÆÎñÕË»§ÐÅÏ¢µÈ¡£¡£¡£¡£Ö»¹ÜDISAδ͸¶ÏêϸÔâÊÜÁ˺ÎÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬£¬£¬£¬µ«Óб¨µÀ³ÆËûÃÇÒÑÖ§¸¶Êê½ðÒÔ±ÜÃâÊý¾Ý±»¹ûÕæÐû²¼¡£¡£¡£¡£Îª±£»£»£» £»£»£»¤ÊÜÓ°ÏìÈËȺ£¬£¬£¬£¬DISAͨ¹ýExperianÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£» £»£»£»¤Ð§ÀÍ£¬£¬£¬£¬²¢½¨ÒéСÎÒ˽¼ÒÉèÖÃڲƭ¾¯±¨ºÍÇå¾²¶³½á¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-drug-testing-firm-disa-says-data-breach-impacts-33-million-people/


5. Orange GroupÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ÊýǧÓû§¼°Ô±¹¤Êý¾ÝÔâй¶


2ÔÂ25ÈÕ£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÉù³ÆÀÖ³ÉÈëÇÖÁË·¨¹úµçÐÅÔËÓªÉ̺ÍÊý×ÖЧÀÍÌṩÉÌ Orange Group µÄϵͳ£¬£¬£¬£¬²¢ÇÔÈ¡ÁËÊýǧ·Ý°üÀ¨Óû§¼Í¼ºÍÔ±¹¤Êý¾ÝµÄÄÚ²¿Îļþ¡£¡£¡£¡£¸ÃºÚ¿ÍʹÓüÙÃû Rey£¬£¬£¬£¬×Ô³ÆÊÇ HellCat ÀÕË÷Èí¼þ×éÖ¯µÄ³ÉÔ±£¬£¬£¬£¬µ«ÌåÏÖ´Ë´ÎÈëÇÖ²¢·Ç HellCat µÄ²Ù×÷¡£¡£¡£¡£¾Ý Rey Ëù³Æ£¬£¬£¬£¬±»µÁÊý¾ÝÖ÷ÒªÀ´×Ô Orange µÄÂÞÂíÄáÑÇ·Ö¹«Ë¾£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢Ô´´úÂë¡¢·¢Æ±¡¢ÌõÔ¼¡¢¿Í»§ºÍÔ±¹¤ÐÅÏ¢µÈ£¬£¬£¬£¬×ÜÁ¿½ü 6.5GB¡£¡£¡£¡£Orange ¹«Ë¾Ö¤ÊµÁË´Ë´ÎÈëÇÖÊÂÎñ£¬£¬£¬£¬µ«ÌåÏÖËü±¬·¢ÔÚÒ»¸ö·ÇÒªº¦Ó¦ÓóÌÐòÉÏ£¬£¬£¬£¬²¢ÒÑÕö¿ªÊÓ²ìÒÔ×îС»¯Ó°Ïì¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖаüÀ¨Ò»Ð©³Â¸¯ºÍÒÑÓâÆÚµÄÐÅÏ¢£¬£¬£¬£¬µ« Orange Ç¿µ÷¿Í»§µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£Orange ½²»°ÈËÌåÏÖ£¬£¬£¬£¬¹«Ë¾µÄÍøÂçÇå¾²ºÍ IT ÍŶÓÕýÔÚÆð¾¢ÆÀ¹ÀÎ¥¹æË®Æ½²¢½µµÍÊÂÎñÓ°Ï죬£¬£¬£¬Í¬Ê±ÔÊÐí×ñÊØÏà¹ØÖ´·¨ÒåÎñ²¢ÓëÏà¹Ø²¿·ÖÏàÖú½â¾ö´ËÊ¡£¡£¡£¡£Rey »¹Í¸Â¶£¬£¬£¬£¬ËûÃÇʹÓÃй¶µÄƾ֤ºÍ Jira Èí¼þ¼°ÄÚ²¿·Ö»§ÖеÄÎó²îÇÖÈëÁË Orange ϵͳ£¬£¬£¬£¬²¢ÔÚÊÜѬȾµÄϵͳÉϰ²ÅÅÁËÀÕË÷ÐÅ£¬£¬£¬£¬µ« Orange ²¢Î´¾ÙÐÐ̸ÅС£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/


6. µ×ÌØÂÉPBSÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ãô¸ÐÐÅϢй¶


2ÔÂ25ÈÕ£¬£¬£¬£¬µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾£¨PBS£©½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬²¢Ðû²¼ÁË345GBµÄ±»µÁÎļþ¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÓÚ2024Äê9ÔÂ1ÈÕ±»·¢Ã÷£¬£¬£¬£¬µ¼Öµ×ÌØÂÉPBSµÄijЩϵͳѬȾ¶ñÒâÈí¼þ£¬£¬£¬£¬ÎÞ·¨»á¼û²¿·ÖÎļþ¡£¡£¡£¡£±»µÁÐÅÏ¢°üÀ¨ÖÁÉÙ1694È˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµãºÍÉç»á°ü¹ÜºÅ¡£¡£¡£¡£µ×ÌØÂÉPBSѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬ÉîÈëÅÌÎÊÊÜÓ°ÏìСÎÒ˽¼ÒµÄ×îÐÂÁªÏµÐÅÏ¢£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬¸ÃµçÊǪ́»¹ÏòÁª°îÖ´·¨²¿·Öת´ïÁ˸ÃÊÂÎñ£¬£¬£¬£¬²¢Æð¾¢ÊµÑéÌØÁíÍâ°ü¹Ü²½·¥²¢ÅàѵԱ¹¤¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÊÇÒ»¸ö¶íÓïºÚ¿Í×éÖ¯£¬£¬£¬£¬×¨ÃŹ¥»÷×éÖ¯ÒÔ»ñÈ¡¾­¼ÃÀûÒæ£¬£¬£¬£¬ÔøÕë¶ÔÂ׶صȵØÒ½Ôº·¢¶¯ÍøÂç¹¥»÷¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þʹÓÃCitrix BleedÁãÈÕÎó²îʹÓÃÊܺ¦Õߣ¬£¬£¬£¬¶øµ×ÌØÂÉPBSËÆºõûÓÐÖ§¸¶Êê½ð£¬£¬£¬£¬µ¼ÖÂÍøÂç·¸·¨·Ö×ÓÐû²¼Á˱»µÁÎļþ¡£¡£¡£¡£


https://cybernews.com/security/television-station-detroit-pbs-hacked/