HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯

Ðû²¼Ê±¼ä 2025-02-26

1. HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬¡°Have I Been Pwned¡±£¨HIBP£©Êý¾Ýй¶֪ͨЧÀͽüÆÚÐÂÔöÁËÁè¼Ý2.84ÒÚ¸ö±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢ÊÇ´ÓÒ»¸öÃûΪ¡°ALIEN TXTBASE¡±µÄTelegramƵµÀÉÏ·¢Ã÷µÄ¡£¡£¡£HIBPÊ×´´ÈËÌØÂåÒÁ¡¤ºàÌØÔÚÆÊÎö1.5TBµÄÇÔÈ¡ÕßÈÕ־ʱ·¢Ã÷ÁËÕâЩ±»µÁÕË»§¡£¡£¡£ÕâЩÈÕÖ¾°üÀ¨230ÒÚÐÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Éæ¼°4.93ÒÚ¸öÎ¨Ò»ÍøÕ¾ºÍµç×ÓÓʼþµØµã¶Ô£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁË2.84ÒÚ¸öΨһµç×ÓÓʼþµØµã¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬HIBP»¹Ìí¼ÓÁË2.44ÒÚ¸ö´Óδ¼û¹ýµÄÃÜÂ룬£¬£¬£¬£¬£¬£¬²¢¶ÔÒÑÓеÄ1.99ÒÚ¸öÃÜÂë¾ÙÐÐÁ˼ÆÊý¸üС£¡£¡£ÓÉÓÚÕË»§ÊýÄ¿ÖØ´ó£¬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܰüÀ¨ÐÂ¾ÉÆ¾Ö¤¡£¡£¡£ÔÚÌí¼Ó±»µÁÕË»§µ½HIBPÊý¾Ý¿âǰ£¬£¬£¬£¬£¬£¬£¬ºàÌØÍ¨¹ý¼ì²éÃÜÂëÖØÖÃʵÑéÀ´È·ÈÏÕË»§µÄÕæÊµÐÔ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÓòÃûËùÓÐÕߺÍÍøÕ¾ÔËÓªÉÌ¿ÉÒÔͨ¹ýÐÂÌí¼ÓµÄAPIÅÌÎÊÇÔÈ¡ÕßÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬ÒÔʶ±ðƾ֤±»µÁµÄ¿Í»§¡£¡£¡£Í¨Ë×Óû§ÈôÊǶ©ÔÄÁËHIBP֪ͨ£¬£¬£¬£¬£¬£¬£¬Ò²ÄܲéÃ÷×Ô¼ºµÄÕË»§ÊÇ·ñ·ºÆðÔÚÈÕÖ¾ÖУ¬£¬£¬£¬£¬£¬£¬µ«ºàÌØÇ¿µ÷²»»á¹ûÕæÏÔʾÃô¸ÐÐÅÏ¢¡£¡£¡£ÕâЩÐÂAPI½«×ÊÖú×é֯ʶ±ð¶ñÒâ»î¶¯ÈªÔ´£¬£¬£¬£¬£¬£¬£¬²¢ÔÚË𺦱¬·¢Ç°ÓèÒÔ×èÖ¹¡£¡£¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/


2. GitVenom¶ñÒâÈí¼þ»î¶¯£ºÊ¹ÓÃGitHub´æ´¢¿âÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬GitVenomÊÇÒ»¸öÒÑ»îÔ¾ÖÁÉÙÁ½ÄêµÄÈ«ÇòÐÔ¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬£¬£¬ÖØµã¹Ø×¢¶íÂÞ˹¡¢°ÍÎ÷ºÍÍÁ¶úÆä¡£¡£¡£Ëüͨ¹ýGitHubÉϵÄÊý°Ù¸öÐéα´æ´¢¿âÓÕÆ­Óû§ÏÂÔØÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂí£¨RAT£©ºÍ¼ôÌù°åÐ®ÖÆ³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÒÔÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤¡£¡£¡£ÕâЩÐéα´æ´¢¿â¾­ÓÉÈ«ÐÄÖÆ×÷£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÏêϸÐÅÏ¢ºÍÊʵ±±àдµÄ×ÔÊöÎļþ£¬£¬£¬£¬£¬£¬£¬¿ÉÄܽèÖúÁËÈ˹¤ÖÇÄܹ¤¾ßµÄ×ÊÖú£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÈËΪÔöÌíÌá½»ÊýÄ¿À´Ìá¸ß¿ÉÐŶȡ£¡£¡£×¢ÈëÏîÄ¿µÄ¶ñÒâ´úÂëÓöàÖÖÓïÑÔ±àд£¬£¬£¬£¬£¬£¬£¬ÒÔÌÓ±ÜÌØ¶¨´úÂëÉó²é¹¤¾ßµÄ¼ì²â¡£¡£¡£Ò»µ©Êܺ¦ÕßÖ´ÐÐÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬¾Í»áÏÂÔØµÚ¶þ½×¶Î¶ñÒâÈí¼þ¡£¡£¡£GitVenomÖÐʹÓõŤ¾ß°üÀ¨Node.jsÇÔÈ¡³ÌÐò¡¢AsyncRAT¡¢QuasarºóÃźͼôÌù°åÐ®ÖÆ³ÌÐò¡£¡£¡£±¨¸æÖصãÏÈÈÝÁËÒ»Æð°¸Àý£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´Ë»î¶¯»ñµÃÁ˼ÛÖµ50ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£Ö»¹Ü´ËÀà»î¶¯²¢²»ÓÐÊý£¬£¬£¬£¬£¬£¬£¬µ«GitVenomµÄÒ»Á¬Ê±¼äºÍ¹æÄ£Ö¤ÊµÎúÕýµ±Æ½Ì¨µÄÀÄÓÃÈÔÈ»ºÜÊÇÓÐÓᣡ£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬³¹µ×Éó²éÏîÄ¿¡¢Ê¹Ó÷À²¡¶¾¹¤¾ßɨÃèÎļþÒÔ¼°ÔÚ¸ôÀëÇéÐÎÖÐÖ´ÐÐÏÂÔØµÄÎļþÖÁ¹ØÖ÷Òª¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gitvenom-attacks-abuse-hundreds-of-github-repos-to-steal-crypto/


3. Auto-Color£ºÐ·¢Ã÷µÄLinuxºóÃŶñÒâÈí¼þÍþв


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬2024Äê11ÔÂÖÁ12ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Auto-Color¡±µÄδ¼Í¼LinuxºóÃű»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĴóѧºÍÕþ¸®×éÖ¯¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ßÓм«Ç¿µÄÌÓ±ÜÐÔ£¬£¬£¬£¬£¬£¬£¬ÄÑÒÔ´ÓÊÜѬȾϵͳÖÐɾ³ý£¬£¬£¬£¬£¬£¬£¬²¢Äܳ¤Ê±¼ä¼á³Ö»á¼û¡£¡£¡£ËüÓëSymbiote Linux¶ñÒâÈí¼þ¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬£¬£¬µ«Á½Õß²¢²»Ïàͬ¡£¡£¡£Auto-Colorͨ¹ýÖ´ÐÐαװ³ÉÁ¼ÐÔÃû³ÆµÄÎļþ×îÏȹ¥»÷£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÒÔrootȨÏÞÔËÐУ¬£¬£¬£¬£¬£¬£¬»á×°ÖöñÒâ¿âÖ²ÈëÎï²¢ÐÞ¸ÄϵͳÎļþÒÔÈ·±£ÆäÖ´ÐС£¡£¡£ËüʹÓÃ×Ô½ç˵¼ÓÃÜËã·¨½âÃÜÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýËæ»úÖµÎÕÊÖÑéÖ¤½»Á÷¡£¡£¡£C2¿ÉÒÔÏÂÁîAuto-ColorÖ´ÐжàÖÖ²Ù×÷£¬£¬£¬£¬£¬£¬£¬Èç·­¿ª·´Ïòshell¡¢Ö´ÐÐí§ÒâÏÂÁî¡¢Ð޸Ļò½¨ÉèÎļþ¡¢³äµ±ÊðÀíÒÔ¼°¶¯Ì¬ÐÞ¸ÄÉèÖᣡ£¡£Auto-Color»¹¾ßÓÐÀàËÆrootkitµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Èç×赲ϵͳŲÓúÍÒþ²ØC2ÅþÁ¬¡£¡£¡£Ëü»¹¾ßÓÐÄÚÖõġ°ÖÕÖ¹¿ª¹Ø¡±£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÁ¬Ã¦É¾³ýѬȾºÛ¼£¡£¡£¡£¼øÓÚÆäÒþÉíÐÔ¡¢Ä£¿£¿£¿£¿£¿£¿£¿é»¯Éè¼ÆºÍÔ¶³Ì¿ØÖƹ¦Ð§£¬£¬£¬£¬£¬£¬£¬Auto-Color¶ÔLinuxϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£½¨Òé¼à¿ØÒªº¦³¤ÆÚ»úÖÆµÄת±ä£¬£¬£¬£¬£¬£¬£¬¼ì²éϵͳÈÕÖ¾ºÍÍøÂçÁ÷Á¿ÖÐÓëÁгöµÄC2 IPµÄÅþÁ¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓûùÓÚÐÐΪµÄÍþв¼ì²â½â¾ö¼Æ»®¾ÙÐзÀÓù¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/


4. DISA Global SolutionsÊý¾Ýй¶ÊÂÎñÓ°Ïì330ÍòÈË


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬DISA Global SolutionsÊÇÒ»¼ÒÃÀ¹úÁìÏȵÄÅ侰ɸ²éºÍÒ©Îï¼°¾Æ¾«²âÊÔ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˶à´ï330ÍòÈË¡£¡£¡£¸ÃÊÂÎñÊ×´ÎÓÚ½ñÄê1ÔÂÅû¶£¬£¬£¬£¬£¬£¬£¬Éæ¼°2024Äê2ÔÂ9ÈÕÖÁ4ÔÂ22ÈÕʱ´ú±¬·¢µÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¾­ÓÉÉîÈëÊӲ죬£¬£¬£¬£¬£¬£¬DISAÈ·ÈÏÃô¸ÐÊý¾ÝÔڴ˴ι¥»÷ÖÐÔ⵽й¶¡£¡£¡£×÷ΪӵÓÐ55,000¶à¼Ò¿Í»§£¬£¬£¬£¬£¬£¬£¬°üÀ¨30%µÄ²Æ²ú500Ç¿ÆóÒµµÄЧÀÍÉÌ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔÚÌìϹæÄ£ÄÚ±¬·¢ÆÕ±éÓ°Ïì¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂëÒÔ¼°²ÆÎñÕË»§ÐÅÏ¢µÈ¡£¡£¡£Ö»¹ÜDISAδ͸¶ÏêϸÔâÊÜÁ˺ÎÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«Óб¨µÀ³ÆËûÃÇÒÑÖ§¸¶Êê½ðÒÔ±ÜÃâÊý¾Ý±»¹ûÕæÐû²¼¡£¡£¡£Îª±£»£»£»£»£»£»£»¤ÊÜÓ°ÏìÈËȺ£¬£¬£¬£¬£¬£¬£¬DISAͨ¹ýExperianÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéСÎÒ˽¼ÒÉèÖÃڲƭ¾¯±¨ºÍÇå¾²¶³½á¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-drug-testing-firm-disa-says-data-breach-impacts-33-million-people/


5. Orange GroupÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÊýǧÓû§¼°Ô±¹¤Êý¾ÝÔâй¶


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÉù³ÆÀÖ³ÉÈëÇÖÁË·¨¹úµçÐÅÔËÓªÉ̺ÍÊý×ÖЧÀÍÌṩÉÌ Orange Group µÄϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁËÊýǧ·Ý°üÀ¨Óû§¼Í¼ºÍÔ±¹¤Êý¾ÝµÄÄÚ²¿Îļþ¡£¡£¡£¸ÃºÚ¿ÍʹÓüÙÃû Rey£¬£¬£¬£¬£¬£¬£¬×Ô³ÆÊÇ HellCat ÀÕË÷Èí¼þ×éÖ¯µÄ³ÉÔ±£¬£¬£¬£¬£¬£¬£¬µ«ÌåÏÖ´Ë´ÎÈëÇÖ²¢·Ç HellCat µÄ²Ù×÷¡£¡£¡£¾Ý Rey Ëù³Æ£¬£¬£¬£¬£¬£¬£¬±»µÁÊý¾ÝÖ÷ÒªÀ´×Ô Orange µÄÂÞÂíÄáÑÇ·Ö¹«Ë¾£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢Ô´´úÂë¡¢·¢Æ±¡¢ÌõÔ¼¡¢¿Í»§ºÍÔ±¹¤ÐÅÏ¢µÈ£¬£¬£¬£¬£¬£¬£¬×ÜÁ¿½ü 6.5GB¡£¡£¡£Orange ¹«Ë¾Ö¤ÊµÁË´Ë´ÎÈëÇÖÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«ÌåÏÖËü±¬·¢ÔÚÒ»¸ö·ÇÒªº¦Ó¦ÓóÌÐòÉÏ£¬£¬£¬£¬£¬£¬£¬²¢ÒÑÕö¿ªÊÓ²ìÒÔ×îС»¯Ó°Ïì¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖаüÀ¨Ò»Ð©³Â¸¯ºÍÒÑÓâÆÚµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ« Orange Ç¿µ÷¿Í»§µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£¡£¡£Orange ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¹«Ë¾µÄÍøÂçÇå¾²ºÍ IT ÍŶÓÕýÔÚÆð¾¢ÆÀ¹ÀÎ¥¹æË®Æ½²¢½µµÍÊÂÎñÓ°Ï죬£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÊÐí×ñÊØÏà¹ØÖ´·¨ÒåÎñ²¢ÓëÏà¹Ø²¿·ÖÏàÖú½â¾ö´ËÊ¡£¡£¡£Rey »¹Í¸Â¶£¬£¬£¬£¬£¬£¬£¬ËûÃÇʹÓÃй¶µÄƾ֤ºÍ Jira Èí¼þ¼°ÄÚ²¿·Ö»§ÖеÄÎó²îÇÖÈëÁË Orange ϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÊÜѬȾµÄϵͳÉϰ²ÅÅÁËÀÕË÷ÐÅ£¬£¬£¬£¬£¬£¬£¬µ« Orange ²¢Î´¾ÙÐÐ̸ÅС£¡£¡£


https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/


6. µ×ÌØÂÉPBSÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ãô¸ÐÐÅϢй¶


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾£¨PBS£©½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁË345GBµÄ±»µÁÎļþ¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÓÚ2024Äê9ÔÂ1ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬µ¼Öµ×ÌØÂÉPBSµÄijЩϵͳѬȾ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÎÞ·¨»á¼û²¿·ÖÎļþ¡£¡£¡£±»µÁÐÅÏ¢°üÀ¨ÖÁÉÙ1694È˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµãºÍÉç»á°ü¹ÜºÅ¡£¡£¡£µ×ÌØÂÉPBSѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬ÉîÈëÅÌÎÊÊÜÓ°ÏìСÎÒ˽¼ÒµÄ×îÐÂÁªÏµÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬¸ÃµçÊǪ́»¹ÏòÁª°îÖ´·¨²¿·Öת´ïÁ˸ÃÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢Æð¾¢ÊµÑéÌØÁíÍâ°ü¹Ü²½·¥²¢ÅàѵԱ¹¤¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÊÇÒ»¸ö¶íÓïºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬£¬×¨ÃŹ¥»÷×éÖ¯ÒÔ»ñÈ¡¾­¼ÃÀûÒæ£¬£¬£¬£¬£¬£¬£¬ÔøÕë¶ÔÂ׶صȵØÒ½Ôº·¢¶¯ÍøÂç¹¥»÷¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þʹÓÃCitrix BleedÁãÈÕÎó²îʹÓÃÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬¶øµ×ÌØÂÉPBSËÆºõûÓÐÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÍøÂç·¸·¨·Ö×ÓÐû²¼Á˱»µÁÎļþ¡£¡£¡£


https://cybernews.com/security/television-station-detroit-pbs-hacked/