HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬ £¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯

Ðû²¼Ê±¼ä 2025-02-26

1. HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬ £¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯


2ÔÂ25ÈÕ£¬ £¬£¬£¬¡°Have I Been Pwned¡±£¨HIBP£©Êý¾Ýй¶֪ͨЧÀͽüÆÚÐÂÔöÁËÁè¼Ý2.84ÒÚ¸ö±»µÁÕË»§ÐÅÏ¢£¬ £¬£¬£¬ÕâЩÐÅÏ¢ÊÇ´ÓÒ»¸öÃûΪ¡°ALIEN TXTBASE¡±µÄTelegramƵµÀÉÏ·¢Ã÷µÄ¡£¡£¡£¡£¡£¡£¡£HIBPÊ×´´ÈËÌØÂåÒÁ¡¤ºàÌØÔÚÆÊÎö1.5TBµÄÇÔÈ¡ÕßÈÕ־ʱ·¢Ã÷ÁËÕâЩ±»µÁÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâЩÈÕÖ¾°üÀ¨230ÒÚÐÐÊý¾Ý£¬ £¬£¬£¬Éæ¼°4.93ÒÚ¸öÎ¨Ò»ÍøÕ¾ºÍµç×ÓÓʼþµØµã¶Ô£¬ £¬£¬£¬Ó°ÏìÁË2.84ÒÚ¸öΨһµç×ÓÓʼþµØµã¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬HIBP»¹Ìí¼ÓÁË2.44ÒÚ¸ö´Óδ¼û¹ýµÄÃÜÂ룬 £¬£¬£¬²¢¶ÔÒÑÓеÄ1.99ÒÚ¸öÃÜÂë¾ÙÐÐÁ˼ÆÊý¸üС£¡£¡£¡£¡£¡£¡£ÓÉÓÚÕË»§ÊýÄ¿ÖØ´ó£¬ £¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܰüÀ¨ÐÂ¾ÉÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£ÔÚÌí¼Ó±»µÁÕË»§µ½HIBPÊý¾Ý¿âǰ£¬ £¬£¬£¬ºàÌØÍ¨¹ý¼ì²éÃÜÂëÖØÖÃʵÑéÀ´È·ÈÏÕË»§µÄÕæÊµÐÔ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬ÓòÃûËùÓÐÕߺÍÍøÕ¾ÔËÓªÉÌ¿ÉÒÔͨ¹ýÐÂÌí¼ÓµÄAPIÅÌÎÊÇÔÈ¡ÕßÈÕÖ¾£¬ £¬£¬£¬ÒÔʶ±ðƾ֤±»µÁµÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£Í¨Ë×Óû§ÈôÊǶ©ÔÄÁËHIBP֪ͨ£¬ £¬£¬£¬Ò²ÄܲéÃ÷×Ô¼ºµÄÕË»§ÊÇ·ñ·ºÆðÔÚÈÕÖ¾ÖУ¬ £¬£¬£¬µ«ºàÌØÇ¿µ÷²»»á¹ûÕæÏÔʾÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÕâЩÐÂAPI½«×ÊÖú×é֯ʶ±ð¶ñÒâ»î¶¯ÈªÔ´£¬ £¬£¬£¬²¢ÔÚË𺦱¬·¢Ç°ÓèÒÔ×èÖ¹¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/


2. GitVenom¶ñÒâÈí¼þ»î¶¯£ºÊ¹ÓÃGitHub´æ´¢¿âÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤


2ÔÂ25ÈÕ£¬ £¬£¬£¬GitVenomÊÇÒ»¸öÒÑ»îÔ¾ÖÁÉÙÁ½ÄêµÄÈ«ÇòÐÔ¶ñÒâÈí¼þ»î¶¯£¬ £¬£¬£¬ÖØµã¹Ø×¢¶íÂÞ˹¡¢°ÍÎ÷ºÍÍÁ¶úÆä¡£¡£¡£¡£¡£¡£¡£Ëüͨ¹ýGitHubÉϵÄÊý°Ù¸öÐéα´æ´¢¿âÓÕÆ­Óû§ÏÂÔØÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂí£¨RAT£©ºÍ¼ôÌù°åÐ®ÖÆ³ÌÐò£¬ £¬£¬£¬ÒÔÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤¡£¡£¡£¡£¡£¡£¡£ÕâЩÐéα´æ´¢¿â¾­ÓÉÈ«ÐÄÖÆ×÷£¬ £¬£¬£¬¾ßÓÐÏêϸÐÅÏ¢ºÍÊʵ±±àдµÄ×ÔÊöÎļþ£¬ £¬£¬£¬¿ÉÄܽèÖúÁËÈ˹¤ÖÇÄܹ¤¾ßµÄ×ÊÖú£¬ £¬£¬£¬²¢Í¨¹ýÈËΪÔöÌíÌá½»ÊýÄ¿À´Ìá¸ß¿ÉÐŶȡ£¡£¡£¡£¡£¡£¡£×¢ÈëÏîÄ¿µÄ¶ñÒâ´úÂëÓöàÖÖÓïÑÔ±àд£¬ £¬£¬£¬ÒÔÌÓ±ÜÌØ¶¨´úÂëÉó²é¹¤¾ßµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÖ´ÐÐÓÐÓøºÔØ£¬ £¬£¬£¬¾Í»áÏÂÔØµÚ¶þ½×¶Î¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£GitVenomÖÐʹÓõŤ¾ß°üÀ¨Node.jsÇÔÈ¡³ÌÐò¡¢AsyncRAT¡¢QuasarºóÃźͼôÌù°åÐ®ÖÆ³ÌÐò¡£¡£¡£¡£¡£¡£¡£±¨¸æÖصãÏÈÈÝÁËÒ»Æð°¸Àý£¬ £¬£¬£¬¹¥»÷Õßͨ¹ý´Ë»î¶¯»ñµÃÁ˼ÛÖµ50ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü´ËÀà»î¶¯²¢²»ÓÐÊý£¬ £¬£¬£¬µ«GitVenomµÄÒ»Á¬Ê±¼äºÍ¹æÄ£Ö¤ÊµÎúÕýµ±Æ½Ì¨µÄÀÄÓÃÈÔÈ»ºÜÊÇÓÐÓᣡ£¡£¡£¡£¡£¡£Òò´Ë£¬ £¬£¬£¬³¹µ×Éó²éÏîÄ¿¡¢Ê¹Ó÷À²¡¶¾¹¤¾ßɨÃèÎļþÒÔ¼°ÔÚ¸ôÀëÇéÐÎÖÐÖ´ÐÐÏÂÔØµÄÎļþÖÁ¹ØÖ÷Òª¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gitvenom-attacks-abuse-hundreds-of-github-repos-to-steal-crypto/


3. Auto-Color£ºÐ·¢Ã÷µÄLinuxºóÃŶñÒâÈí¼þÍþв


2ÔÂ25ÈÕ£¬ £¬£¬£¬2024Äê11ÔÂÖÁ12ÔÂʱ´ú£¬ £¬£¬£¬Ò»ÖÖÃûΪ¡°Auto-Color¡±µÄδ¼Í¼LinuxºóÃű»·¢Ã÷£¬ £¬£¬£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĴóѧºÍÕþ¸®×éÖ¯¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ßÓм«Ç¿µÄÌÓ±ÜÐÔ£¬ £¬£¬£¬ÄÑÒÔ´ÓÊÜѬȾϵͳÖÐɾ³ý£¬ £¬£¬£¬²¢Äܳ¤Ê±¼ä¼á³Ö»á¼û¡£¡£¡£¡£¡£¡£¡£ËüÓëSymbiote Linux¶ñÒâÈí¼þ¼Ò×åÓÐÏàËÆÖ®´¦£¬ £¬£¬£¬µ«Á½Õß²¢²»Ïàͬ¡£¡£¡£¡£¡£¡£¡£Auto-Colorͨ¹ýÖ´ÐÐαװ³ÉÁ¼ÐÔÃû³ÆµÄÎļþ×îÏȹ¥»÷£¬ £¬£¬£¬ÈôÊÇÒÔrootȨÏÞÔËÐУ¬ £¬£¬£¬»á×°ÖöñÒâ¿âÖ²ÈëÎï²¢ÐÞ¸ÄϵͳÎļþÒÔÈ·±£ÆäÖ´ÐС£¡£¡£¡£¡£¡£¡£ËüʹÓÃ×Ô½ç˵¼ÓÃÜËã·¨½âÃÜÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÐÅÏ¢£¬ £¬£¬£¬²¢Í¨¹ýËæ»úÖµÎÕÊÖÑéÖ¤½»Á÷¡£¡£¡£¡£¡£¡£¡£C2¿ÉÒÔÏÂÁîAuto-ColorÖ´ÐжàÖÖ²Ù×÷£¬ £¬£¬£¬Èç·­¿ª·´Ïòshell¡¢Ö´ÐÐí§ÒâÏÂÁî¡¢Ð޸Ļò½¨ÉèÎļþ¡¢³äµ±ÊðÀíÒÔ¼°¶¯Ì¬ÐÞ¸ÄÉèÖᣡ£¡£¡£¡£¡£¡£Auto-Color»¹¾ßÓÐÀàËÆrootkitµÄ¹¦Ð§£¬ £¬£¬£¬Èç×赲ϵͳŲÓúÍÒþ²ØC2ÅþÁ¬¡£¡£¡£¡£¡£¡£¡£Ëü»¹¾ßÓÐÄÚÖõġ°ÖÕÖ¹¿ª¹Ø¡±£¬ £¬£¬£¬ÔÊÐí¹¥»÷ÕßÁ¬Ã¦É¾³ýѬȾºÛ¼£¡£¡£¡£¡£¡£¡£¡£¼øÓÚÆäÒþÉíÐÔ¡¢Ä£¿£¿ £¿é»¯Éè¼ÆºÍÔ¶³Ì¿ØÖƹ¦Ð§£¬ £¬£¬£¬Auto-Color¶ÔLinuxϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£¡£½¨Òé¼à¿ØÒªº¦³¤ÆÚ»úÖÆµÄת±ä£¬ £¬£¬£¬¼ì²éϵͳÈÕÖ¾ºÍÍøÂçÁ÷Á¿ÖÐÓëÁгöµÄC2 IPµÄÅþÁ¬£¬ £¬£¬£¬²¢Ê¹ÓûùÓÚÐÐΪµÄÍþв¼ì²â½â¾ö¼Æ»®¾ÙÐзÀÓù¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/


4. DISA Global SolutionsÊý¾Ýй¶ÊÂÎñÓ°Ïì330ÍòÈË


2ÔÂ25ÈÕ£¬ £¬£¬£¬DISA Global SolutionsÊÇÒ»¼ÒÃÀ¹úÁìÏȵÄÅ侰ɸ²éºÍÒ©Îï¼°¾Æ¾«²âÊÔ¹«Ë¾£¬ £¬£¬£¬½üÆÚÔâÓöÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬Ó°ÏìÁ˶à´ï330ÍòÈË¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÊ×´ÎÓÚ½ñÄê1ÔÂÅû¶£¬ £¬£¬£¬Éæ¼°2024Äê2ÔÂ9ÈÕÖÁ4ÔÂ22ÈÕʱ´ú±¬·¢µÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¾­ÓÉÉîÈëÊӲ죬 £¬£¬£¬DISAÈ·ÈÏÃô¸ÐÊý¾ÝÔڴ˴ι¥»÷ÖÐÔ⵽й¶¡£¡£¡£¡£¡£¡£¡£×÷ΪӵÓÐ55,000¶à¼Ò¿Í»§£¬ £¬£¬£¬°üÀ¨30%µÄ²Æ²ú500Ç¿ÆóÒµµÄЧÀÍÉÌ£¬ £¬£¬£¬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔÚÌìϹæÄ£ÄÚ±¬·¢ÆÕ±éÓ°Ïì¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂëÒÔ¼°²ÆÎñÕË»§ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜDISAδ͸¶ÏêϸÔâÊÜÁ˺ÎÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬ £¬£¬£¬µ«Óб¨µÀ³ÆËûÃÇÒÑÖ§¸¶Êê½ðÒÔ±ÜÃâÊý¾Ý±»¹ûÕæÐû²¼¡£¡£¡£¡£¡£¡£¡£Îª±£»£»£»£»¤ÊÜÓ°ÏìÈËȺ£¬ £¬£¬£¬DISAͨ¹ýExperianÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍ£¬ £¬£¬£¬²¢½¨ÒéСÎÒ˽¼ÒÉèÖÃڲƭ¾¯±¨ºÍÇå¾²¶³½á¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-drug-testing-firm-disa-says-data-breach-impacts-33-million-people/


5. Orange GroupÔâºÚ¿ÍÈëÇÖ£¬ £¬£¬£¬ÊýǧÓû§¼°Ô±¹¤Êý¾ÝÔâй¶


2ÔÂ25ÈÕ£¬ £¬£¬£¬Ò»ÃûºÚ¿ÍÉù³ÆÀÖ³ÉÈëÇÖÁË·¨¹úµçÐÅÔËÓªÉ̺ÍÊý×ÖЧÀÍÌṩÉÌ Orange Group µÄϵͳ£¬ £¬£¬£¬²¢ÇÔÈ¡ÁËÊýǧ·Ý°üÀ¨Óû§¼Í¼ºÍÔ±¹¤Êý¾ÝµÄÄÚ²¿Îļþ¡£¡£¡£¡£¡£¡£¡£¸ÃºÚ¿ÍʹÓüÙÃû Rey£¬ £¬£¬£¬×Ô³ÆÊÇ HellCat ÀÕË÷Èí¼þ×éÖ¯µÄ³ÉÔ±£¬ £¬£¬£¬µ«ÌåÏÖ´Ë´ÎÈëÇÖ²¢·Ç HellCat µÄ²Ù×÷¡£¡£¡£¡£¡£¡£¡£¾Ý Rey Ëù³Æ£¬ £¬£¬£¬±»µÁÊý¾ÝÖ÷ÒªÀ´×Ô Orange µÄÂÞÂíÄáÑÇ·Ö¹«Ë¾£¬ £¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢Ô´´úÂë¡¢·¢Æ±¡¢ÌõÔ¼¡¢¿Í»§ºÍÔ±¹¤ÐÅÏ¢µÈ£¬ £¬£¬£¬×ÜÁ¿½ü 6.5GB¡£¡£¡£¡£¡£¡£¡£Orange ¹«Ë¾Ö¤ÊµÁË´Ë´ÎÈëÇÖÊÂÎñ£¬ £¬£¬£¬µ«ÌåÏÖËü±¬·¢ÔÚÒ»¸ö·ÇÒªº¦Ó¦ÓóÌÐòÉÏ£¬ £¬£¬£¬²¢ÒÑÕö¿ªÊÓ²ìÒÔ×îС»¯Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖаüÀ¨Ò»Ð©³Â¸¯ºÍÒÑÓâÆÚµÄÐÅÏ¢£¬ £¬£¬£¬µ« Orange Ç¿µ÷¿Í»§µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Orange ½²»°ÈËÌåÏÖ£¬ £¬£¬£¬¹«Ë¾µÄÍøÂçÇå¾²ºÍ IT ÍŶÓÕýÔÚÆð¾¢ÆÀ¹ÀÎ¥¹æË®Æ½²¢½µµÍÊÂÎñÓ°Ï죬 £¬£¬£¬Í¬Ê±ÔÊÐí×ñÊØÏà¹ØÖ´·¨ÒåÎñ²¢ÓëÏà¹Ø²¿·ÖÏàÖú½â¾ö´ËÊ¡£¡£¡£¡£¡£¡£¡£Rey »¹Í¸Â¶£¬ £¬£¬£¬ËûÃÇʹÓÃй¶µÄƾ֤ºÍ Jira Èí¼þ¼°ÄÚ²¿·Ö»§ÖеÄÎó²îÇÖÈëÁË Orange ϵͳ£¬ £¬£¬£¬²¢ÔÚÊÜѬȾµÄϵͳÉϰ²ÅÅÁËÀÕË÷ÐÅ£¬ £¬£¬£¬µ« Orange ²¢Î´¾ÙÐÐ̸ÅС£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/


6. µ×ÌØÂÉPBSÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬Ãô¸ÐÐÅϢй¶


2ÔÂ25ÈÕ£¬ £¬£¬£¬µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾£¨PBS£©½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬ £¬£¬£¬÷è÷ëÀÕË÷Èí¼þÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ £¬£¬£¬²¢Ðû²¼ÁË345GBµÄ±»µÁÎļþ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÓÚ2024Äê9ÔÂ1ÈÕ±»·¢Ã÷£¬ £¬£¬£¬µ¼Öµ×ÌØÂÉPBSµÄijЩϵͳѬȾ¶ñÒâÈí¼þ£¬ £¬£¬£¬ÎÞ·¨»á¼û²¿·ÖÎļþ¡£¡£¡£¡£¡£¡£¡£±»µÁÐÅÏ¢°üÀ¨ÖÁÉÙ1694È˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµãºÍÉç»á°ü¹ÜºÅ¡£¡£¡£¡£¡£¡£¡£µ×ÌØÂÉPBSѸËÙ½ÓÄÉÐж¯£¬ £¬£¬£¬ÉîÈëÅÌÎÊÊÜÓ°ÏìСÎÒ˽¼ÒµÄ×îÐÂÁªÏµÐÅÏ¢£¬ £¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬ £¬£¬£¬¸ÃµçÊǪ́»¹ÏòÁª°îÖ´·¨²¿·Öת´ïÁ˸ÃÊÂÎñ£¬ £¬£¬£¬²¢Æð¾¢ÊµÑéÌØÁíÍâ°ü¹Ü²½·¥²¢ÅàѵԱ¹¤¡£¡£¡£¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÊÇÒ»¸ö¶íÓïºÚ¿Í×éÖ¯£¬ £¬£¬£¬×¨ÃŹ¥»÷×éÖ¯ÒÔ»ñÈ¡¾­¼ÃÀûÒæ£¬ £¬£¬£¬ÔøÕë¶ÔÂ׶صȵØÒ½Ôº·¢¶¯ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬ £¬£¬£¬÷è÷ëÀÕË÷Èí¼þʹÓÃCitrix BleedÁãÈÕÎó²îʹÓÃÊܺ¦Õߣ¬ £¬£¬£¬¶øµ×ÌØÂÉPBSËÆºõûÓÐÖ§¸¶Êê½ð£¬ £¬£¬£¬µ¼ÖÂÍøÂç·¸·¨·Ö×ÓÐû²¼Á˱»µÁÎļþ¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/television-station-detroit-pbs-hacked/