EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË

Ðû²¼Ê±¼ä 2026-04-10

1. EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË


4ÔÂ9ÈÕ£¬£¬£¬£¬Å·ÖÞÂÃÐй«Ë¾Eurail¿ËÈÕÏòÃÀ¹ú¶à¸öÖÝ˾·¨²¿³¤°ì¹«ÊÒÌύΥ¹æÍ¨Öª£¬£¬£¬£¬Åû¶2025Äê12Ô±¬·¢µÄÊý¾Ýй¶ÊÂÎñÏÖʵӰÏìÁè¼Ý30ÍòÈË£¬£¬£¬£¬ÐÕÃûºÍ»¤ÕÕºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¸ÃÊÂÎñ×î³õÓÚ½ñÄê1ÔÂÅû¶£¬£¬£¬£¬Æäʱ¹«Ë¾½öÖÒÑÔ³ÖÓÐÅ·ÖÞÌú·ͨƱµÄÖ÷¹Ë¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚºÉÀ¼µÄEurailÌåÏÖ£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÆäÍøÂçºóÇÔÈ¡Á˰üÀ¨»ù×Ô¼º·ÝºÍÁªÏµÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£½ñÄê2Ô£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚ¹ûÕæµÄÍøÂç·¸·¨ÍøÕ¾ÉÏ´µÅõ³Æ£¬£¬£¬£¬´ÓEurailµÄAWS S3¡¢ZendeskºÍGitLabʵÀýÖÐÇÔÈ¡ÁËÔ¼1.3TBÊý¾Ý£¬£¬£¬£¬°üÀ¨Ô´´úÂë¡¢Ö§³Ö¹¤µ¥ºÍÊý¾Ý¿â±¸·Ý¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÉù³ÆÇÔÈ¡ÁËÊý°ÙÍòÅ·ÖÞÌú·ͨƱÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬²¢³ÆÓëÂÃÐй«Ë¾µÄ̸ÅÐÒѾ­Ê§°Ü¡£¡£¡£¡£¡£3Ô³õ£¬£¬£¬£¬Eurail֤ʵºÚ¿ÍÒ»Ö±ÔÚ°µÍøÉ϶µÊÛÇÔÈ¡µÄÊý¾Ý£¬£¬£¬£¬²¢ÔÚTelegramƵµÀÉÏÐû²¼ÁËÑù±¾Êý¾Ý¼¯¡£¡£¡£¡£¡£¹«Ë¾Í¬Ê±³ÎÇ壬£¬£¬£¬ËûÃDz»´æ´¢ÒøÐлòÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬Ò²²»´æ´¢»¤Õյĵç×Ó°æÕÕÆ¬£¬£¬£¬£¬µ«ÔÊÐíÈôÊǿͻ§µÄСÎÒ˽¼ÒÊý¾Ý±»°üÀ¨ÔÚÑù±¾Êý¾Ý¼¯ÖУ¬£¬£¬£¬½«Ö±½Ó֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£ÉÏÖÜÏò¶íÀÕ¸ÔÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÏÖʵӰÏì308,777ÈË¡£¡£¡£¡£¡£


https://www.securityweek.com/300000-people-impacted-by-eurail-data-breach/


2. È«Çò×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin DepotÔâÈëÇÖ


4ÔÂ9ÈÕ£¬£¬£¬£¬ÔËÓª×ÅÈ«Çò×î´ó±ÈÌØ±ÒATMÍøÂçÖ®Ò»µÄBitcoin Depot¿ËÈÕÅû¶£¬£¬£¬£¬¹¥»÷ÕßÓÚÉϸöÔÂÈëÇÖÆäϵͳºó£¬£¬£¬£¬´ÓÆä¼ÓÃÜÇ®°üÖÐÇÔÈ¡Á˼ÛÖµ366.5ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÈ«ÇòÖÎÀí×ÅÁè¼Ý25,000̨±ÈÌØ±ÒATM»úºÍBDCheckoutÍøµã£¬£¬£¬£¬2025ÄêÊÕÈëµÖ´ï6.15ÒÚÃÀÔª¡£¡£¡£¡£¡£Æ¾Ö¤Ìá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþ£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ3ÔÂ23ÈÕ¼ì²âµ½Æä²¿·ÖITϵͳ±£´æ¿ÉÒɻºó·¢Ã÷Á˴˴ι¥»÷¡£¡£¡£¡£¡£Ö»¹ÜÁ¬Ã¦½ÓÄɲ½·¥¿ØÖƹ¥»÷£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔÓÐʱ¼äÇÔÈ¡Êý×Ö×ʲú½áËãÕË»§µÄƾ֤£¬£¬£¬£¬²¢ÔÚÆä»á¼ûȨÏÞ±»×èֹ֮ǰ´ÓBitcoin DepotµÄÇ®°üÖÐ×ªÒÆÁË50.903¸ö±ÈÌØ±Ò£¬£¬£¬£¬°´±¨¸æµ±ÈÕ¼ÛÖµÔ¼366.5ÍòÃÀÔª¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬£¬£¬·¢Ã÷ÎÊÌâºóÁ¬Ã¦Æô¶¯ÁËÊÂÎñÏìӦЭÒ飬£¬£¬£¬Ô¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬²¢Í¨ÖªÁËÖ´·¨²¿·Ö¡£¡£¡£¡£¡£Bitcoin Depot½øÒ»²½ÒÔΪ£¬£¬£¬£¬¸ÃÊÂÎñ½öÏÞÓÚ¹«Ë¾ÄÚ²¿ÇéÐΣ¬£¬£¬£¬²¢Î´Ó°Ïì¿Í»§Æ½Ì¨¡¢²¿·Ö¡¢ÏµÍ³¡¢Êý¾Ý»òÇéÐΡ£¡£¡£¡£¡£ËäÈ»¹«Ë¾ÓµÓÐÕë¶ÔÍøÂç¹¥»÷µÄ°ü¹Ü£¬£¬£¬£¬µ«Bitcoin DepotÌåÏÖÕâ¿ÉÄÜÎÞ·¨º­¸Ç¹¥»÷Ôì³ÉµÄËùÓÐËðʧ¡£¡£¡£¡£¡£¼øÓÚ¸ÃÊÂÎñ¿ÉÄÜÔì³ÉµÄÉùÓþË𺦡¢Ö´·¨¡¢î¿ÏµºÍÓ¦¶Ô±¾Ç®£¬£¬£¬£¬¹«Ë¾ÓÚ2026Äê4ÔÂ6ÈÕÈ϶¨¸ÃÊÂÎñ¾ßÓÐÖØ´óÒâÒå¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/crypto-atm-giant-bitcoin-depot-says-hackers-stole-36-million-from-its-wallets/


3. Âåɼí¶ÊÐ״ʦ°ì¹«ÊÒÔâºÚ¿ÍÈëÇÖ


4ÔÂ9ÈÕ£¬£¬£¬£¬ÂåÉ¼í¶¾¯Ô±¾ÖÖܶþÐû²¼£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËÂåɼí¶ÊÐ״ʦ°ì¹«ÊÒµÄÊý×ִ洢ϵͳ£¬£¬£¬£¬¸Ãϵͳ°üÀ¨´ó×ÚÃô¸Ð¾¯ÎñÎļþ¡£¡£¡£¡£¡£¾ÝÂåÉ¼í¶¾¯Ô±¾Ö³Æ£¬£¬£¬£¬ÕâЩÎļþÊÇ´ËǰÒѽâ¾ö»òÏ¢ÕùµÄÃñʰ¸¼þÖУ¬£¬£¬£¬ÔÚÖ¤¾Ý¿ªÊ¾½×¶ÎÒÆ½»µÄÖÊÁÏ¡£¡£¡£¡£¡£¾¯·½Ç¿µ÷£¬£¬£¬£¬´Ë´ÎÈëÇÖ²¢Î´Í»ÆÆÈκÎÂåÉ¼í¶¾¯Ô±¾Ö×ÔÉíµÄϵͳ»òÍøÂ磬£¬£¬£¬µ«ÊÂÎñÈÔÒýÆðÁ˶ÔÖ´·¨Ãô¸ÐÐÅÏ¢±£»£»£»£»£»£»¤µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Âåɼí¶ÊÐ״ʦ°ì¹«ÊÒ½²»°ÈËËæºóÐû²¼ÉùÃ÷³Æ£¬£¬£¬£¬°ì¹«ÊÒÓÚ3ÔÂ20ÈÕ·¢Ã÷ÁË´Ë´ÎÈëÇÖ¡£¡£¡£¡£¡£ºÚ¿Í»á¼ûµÄÊÇ¡°ÊÐ״ʦ°ì¹«ÊÒÓÃÓÚÏò¶Ô·½×´Ê¦ºÍËßËϵ±ÊÂÈË´«ÊäÖ¤¾ÝµÄµÚÈý·½¹¤¾ß¡±¡£¡£¡£¡£¡£ÉùÏÔ×ÅÈ·ÌåÏÖ£¬£¬£¬£¬Ã»ÓÐÆäËûÊÐÕþÓ¦ÓûòÏµÍ³Éæ¼°´Ë´ÎÊÂÎñ£¬£¬£¬£¬¸ÃµÚÈý·½¹¤¾ßÖеÄÐÅÏ¢ÓëÈκβ¿·Ö¼Í¼»òϵͳ¾ùÎÞÁ´½Ó»ò»á¼ûȨÏÞ¡£¡£¡£¡£¡£¾Ý¡¶Âåɼí¶Ê±±¨¡·±¨µÀ£¬£¬£¬£¬É罻ýÌåÉÏÒÑ·ºÆðÉù³Æ°üÀ¨±»µÁÖÊÁÏÐÅÏ¢µÄÌû×Ó£¬£¬£¬£¬²¿·ÖÌû×ÓÒѱ»É¾³ý¡£¡£¡£¡£¡£ÕâЩÌû×ÓÏÔʾ£¬£¬£¬£¬¹²ÓÐ7.7TBÊý¾Ý¿É¹©ÏÂÔØ£¬£¬£¬£¬Áè¼Ý33.7Íò·ÝÎļþ±»»á¼û¡£¡£¡£¡£¡£Ð¹Â¶µÄÖÊÁϰüÀ¨Ö¤ÈËÐÕÃû¡¢Ò½ÁÆÐÅÏ¢¡¢Î´±à¼­µÄÐÌÊÂͶËßÒÔ¼°ÊÓ²ìÎļþµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£


https://therecord.media/breach-exposes-lapd-files-city-attorney-systems


4. Masjesu½©Ê¬ÍøÂçÒþ²Ø¹¥»÷ÎïÁªÍø×°±¸


4ÔÂ8ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Trellix¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬ÉîÈëÆÊÎöÁËÃûΪMasjesuµÄÎïÁªÍø½©Ê¬ÍøÂçµÄÄÚ²¿ÔË×÷»úÖÆ¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç×Ô2023ÄêÆð»îÔ¾£¬£¬£¬£¬Ö÷ÒªÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§À͹¥»÷£¬£¬£¬£¬ÒÑѬȾ¶àÖÖÎïÁªÍø×°±¸¡£¡£¡£¡£¡£ÆäÔËÓªÕßÖ÷ÒªÔÚTelegramÉϾÙÐÐÐû´«£¬£¬£¬£¬Éù³ÆÄܹ»·¢¶¯Êý°ÙGB¹æÄ£µÄDDoS¹¥»÷£¬£¬£¬£¬Ìû×ÓͬʱÕë¶ÔÖÐÎĺÍÓ¢ÎÄÓû§£¬£¬£¬£¬Åú×¢ÆäЧÀͼÌÐøÃé×¼ÖÐÃÀ¿Í»§¡£¡£¡£¡£¡£ÏÖÔÚÔËÓªÕßµÄTelegramƵµÀÓµÓÐÁè¼Ý400Ãû¶©ÔÄÕߣ¬£¬£¬£¬µ«ÏÖÊÊÓû§Èº¿ÉÄܸü´ó¡£¡£¡£¡£¡£´ÓѬȾװ±¸µÄÂþÑÜÀ´¿´£¬£¬£¬£¬´ó´ó¶¼±»Ñ¬È¾µÄ×°±¸Î»ÓÚÔ½ÄÏ£¬£¬£¬£¬µ«°ÍÎ÷¡¢Ó¡¶È¡¢ÒÁÀÊ¡¢¿ÏÄáÑǺÍÎÚ¿ËÀ¼Ò²Óдó×Ú×°±¸±»Ñ¬È¾¡£¡£¡£¡£¡£TrellixÖ¸³ö£¬£¬£¬£¬Êý¾ÝÇ¿ÁÒÅú×¢¹¥»÷À´×Ô¶à¸ö×ÔÖÎϵͳ£¬£¬£¬£¬Éæ¼°ÖÖÖÖÍøÂ磬£¬£¬£¬¶ø·Ç½©Ê¬ÍøÂçÍêÈ«ÍйÜÓÚ¼òµ¥ÐéÄâרÓÃЧÀÍÆ÷ÌṩÉÌ¡£¡£¡£¡£¡£½üÆÚÆÊÎöµÄMasjesuÑù±¾ÏÔʾ£¬£¬£¬£¬Æä¿ÉÕë¶Ô¶àÖÖCPU¼Ü¹¹£¬£¬£¬£¬°üÀ¨i386¡¢MIPS¡¢ARM¡¢SPARC¡¢PPC¡¢68KºÍAMD64¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçͨ¹ýD-Link·ÓÉÆ÷¡¢GPON·ÓÉÆ÷¡¢»ªÎª¼ÒÍ¥Íø¹Ø¡¢MVPower DVR¡¢Netgear·ÓÉÆ÷¡¢UPnPЧÀͼ°ÆäËûÎïÁªÍø×°±¸µÄÒÑÖªÎó²î¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£


https://www.securityweek.com/evasive-masjesu-ddos-botnet-targets-iot-devices/


5. Adobe ReaderÁãÈÕÎó²îÔâºÚ¿ÍʹÓÃÊýÔÂ


4ÔÂ9ÈÕ£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ºÚ¿ÍÕýʹÓÃAdobe ReaderÖÐÒ»¸öÉÐδÐÞ¸´µÄÁãÈÕÎó²î£¬£¬£¬£¬Í¨¹ýÈ«ÐĽṹµÄ¶ñÒâPDFÎļþ·¢¶¯Ò»Á¬ÐÔ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÍøÂçÇå¾²Ñо¿Ô±ÓÚ3ÔÂ26ÈÕ·¢Ã÷£¬£¬£¬£¬ÆäʱÊÕµ½Ò»·Ý¿ÉÒÉÑù±¾¡£¡£¡£¡£¡£½øÒ»²½ÆÊÎöÏÔʾ£¬£¬£¬£¬¹¥»÷»î¶¯ÖÁÉÙ×Ô2025Äê11Ô¾ÍÒÑ×îÏÈ£¬£¬£¬£¬Ò»¸öÃûΪ¡°Invoice540.pdf¡±µÄÑù±¾ÓÚ2025Äê11ÔÂ28ÈÕÉÏ´«ÖÁVirusTotal£¬£¬£¬£¬Åú×¢ºÚ¿ÍÒÑÒ»Á¬¹¥»÷³¤´ïËĸöÔÂÖ®¾Ã¡£¡£¡£¡£¡£¸ÃÎó²î¼«ÎªÎ£ÏÕ£¬£¬£¬£¬Óû§½öÐè·­¿ª¶ñÒâPDFÎļþ¼´¿É´¥·¢¹¥»÷£¬£¬£¬£¬ÎÞÐèÈκÎÌØÊâµã»÷²Ù×÷£¬£¬£¬£¬ÇÒÈ·ÈÏ¿ÉÔÚ×îа汾µÄAdobe ReaderÉÏÀÖ³ÉÔËÐС£¡£¡£¡£¡£¹¥»÷¾ßÓÐÏÔ×ÅÕë¶ÔÐÔ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Gi7w0rmÆÊÎö·¢Ã÷£¬£¬£¬£¬¶ñÒâPDFÎļþÖаüÀ¨¶íÓïÓÕ¶üÄÚÈÝ£¬£¬£¬£¬Éæ¼°¶íÂÞ˹ʯÓͺÍ×ÔÈ»ÆøÐÐÒµµÄÊ±ÊÆÎÊÌ⣬£¬£¬£¬Åú×¢¹¥»÷Ä¿µÄ¿ÉÄÜÊǶíÓïµØÇøµÄÕþ¸®¡¢ÄÜÔ´»ò»ù´¡ÉèÊ©Ïà¹Ø»ú¹¹¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬AdobeÉÐδÐû²¼ÐÞ¸´²¹¶¡£¬£¬£¬£¬Ò²Î´¹ûÕæ»ØÓ¦´ËÊ¡£¡£¡£¡£¡£


https://securityaffairs.com/190558/hacking/malicious-pdf-reveals-active-adobe-reader-zero-day-in-the-wild.html


6. LucidRookÕë¶Ǫ̂Íå·ÇÕþ¸®×éÖ¯ºÍ´óѧ·¢¶¯´¹ÂÚ¹¥»÷


4ÔÂ9ÈÕ£¬£¬£¬£¬Ë¼¿ÆTalosÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬Ò»ÖÖÃûΪLucidRookµÄÐÂÐÍÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þÕý±»ÓÃÓÚÕë¶Ǫ̂ÍåµØÇø·ÇÕþ¸®×éÖ¯ºÍ´óѧµÄÓã²æÊ½ÍøÂç´¹Âڻ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚLuaÓïÑÔ¿ª·¢£¬£¬£¬£¬±»¹éÒòÓÚÄÚ²¿×·×ÙµÄÍþв×éÖ¯UAT-10362£¬£¬£¬£¬Ñо¿Ö°Ô±½«ÆäÐÎòΪ¡°ÓµÓгÉÊì×÷Õ½¼¼ÇÉ¡±µÄǿʢµÐÊÖ¡£¡£¡£¡£¡£LucidRookÓÚ2025Äê10Ô±»ÓÃÓÚÏÖʵ¹¥»÷£¬£¬£¬£¬¹¥»÷ÊÖ¶ÎÖ÷ÒªÒÀÀµÐ¯´øÊÜÃÜÂë±£»£»£»£»£»£»¤´æµµÎļþµÄÍøÂç´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖ²î±ðµÄѬȾÁ´¡£¡£¡£¡£¡£µÚÒ»ÖÖʹÓÃLNK¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬×îÖÕͶ·ÅÃûΪLucidPawnµÄ¶ñÒâÈí¼þͶ·ÅÆ÷£»£»£»£»£»£»µÚ¶þÖÖ»ùÓÚEXEµÄѬȾÁ´ÔòʹÓÃαװ³ÉÇ÷ÊÆ¿Æ¼¼Worry-Free Business Security ServicesµÄð³äɱ¶¾Èí¼þ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£LucidRookÔÚÖ´ÐÐÀú³ÌÖлá¾ÙÐÐϵͳÕì̽£¬£¬£¬£¬ÍøÂçÓû§ºÍÅÌËã»úÃû³Æ¡¢ÒÑ×°ÖÃÓ¦ÓóÌÐòºÍÕýÔÚÔËÐеÄÀú³ÌµÈÐÅÏ¢¡£¡£¡£¡£¡£ÍøÂçµ½µÄÊý¾ÝʹÓÃRSA¼ÓÃÜ£¬£¬£¬£¬´æ´¢ÔÚÊÜÃÜÂë±£»£»£»£»£»£»¤µÄ´æµµÖУ¬£¬£¬£¬²¢Í¨¹ýFTPй¶µ½¹¥»÷Õß¿ØÖƵĻù´¡ÉèÊ©¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/