HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯

Ðû²¼Ê±¼ä 2025-02-26

1. HIBPÐÂÔö2.84ÒÚ±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬ÍƳöÐÂAPIÖú×éÖ¯Ìá·À¶ñÒâ»î¶¯


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬¡°Have I Been Pwned¡±£¨HIBP£©Êý¾Ýй¶֪ͨЧÀͽüÆÚÐÂÔöÁËÁè¼Ý2.84ÒÚ¸ö±»µÁÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢ÊÇ´ÓÒ»¸öÃûΪ¡°ALIEN TXTBASE¡±µÄTelegramƵµÀÉÏ·¢Ã÷µÄ¡£¡£¡£¡£¡£¡£¡£HIBPÊ×´´ÈËÌØÂåÒÁ¡¤ºàÌØÔÚÆÊÎö1.5TBµÄÇÔÈ¡ÕßÈÕ־ʱ·¢Ã÷ÁËÕâЩ±»µÁÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâЩÈÕÖ¾°üÀ¨230ÒÚÐÐÊý¾Ý£¬£¬£¬£¬£¬Éæ¼°4.93ÒÚ¸öÎ¨Ò»ÍøÕ¾ºÍµç×ÓÓʼþµØµã¶Ô£¬£¬£¬£¬£¬Ó°ÏìÁË2.84ÒÚ¸öΨһµç×ÓÓʼþµØµã¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬HIBP»¹Ìí¼ÓÁË2.44ÒÚ¸ö´Óδ¼û¹ýµÄÃÜÂ룬£¬£¬£¬£¬²¢¶ÔÒÑÓеÄ1.99ÒÚ¸öÃÜÂë¾ÙÐÐÁ˼ÆÊý¸üС£¡£¡£¡£¡£¡£¡£ÓÉÓÚÕË»§ÊýÄ¿ÖØ´ó£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܰüÀ¨ÐÂ¾ÉÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£ÔÚÌí¼Ó±»µÁÕË»§µ½HIBPÊý¾Ý¿âǰ£¬£¬£¬£¬£¬ºàÌØÍ¨¹ý¼ì²éÃÜÂëÖØÖÃʵÑéÀ´È·ÈÏÕË»§µÄÕæÊµÐÔ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÓòÃûËùÓÐÕߺÍÍøÕ¾ÔËÓªÉÌ¿ÉÒÔͨ¹ýÐÂÌí¼ÓµÄAPIÅÌÎÊÇÔÈ¡ÕßÈÕÖ¾£¬£¬£¬£¬£¬ÒÔʶ±ðƾ֤±»µÁµÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£Í¨Ë×Óû§ÈôÊǶ©ÔÄÁËHIBP֪ͨ£¬£¬£¬£¬£¬Ò²ÄܲéÃ÷×Ô¼ºµÄÕË»§ÊÇ·ñ·ºÆðÔÚÈÕÖ¾ÖУ¬£¬£¬£¬£¬µ«ºàÌØÇ¿µ÷²»»á¹ûÕæÏÔʾÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÕâЩÐÂAPI½«×ÊÖú×é֯ʶ±ð¶ñÒâ»î¶¯ÈªÔ´£¬£¬£¬£¬£¬²¢ÔÚË𺦱¬·¢Ç°ÓèÒÔ×èÖ¹¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/


2. GitVenom¶ñÒâÈí¼þ»î¶¯£ºÊ¹ÓÃGitHub´æ´¢¿âÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬GitVenomÊÇÒ»¸öÒÑ»îÔ¾ÖÁÉÙÁ½ÄêµÄÈ«ÇòÐÔ¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬ÖØµã¹Ø×¢¶íÂÞ˹¡¢°ÍÎ÷ºÍÍÁ¶úÆä¡£¡£¡£¡£¡£¡£¡£Ëüͨ¹ýGitHubÉϵÄÊý°Ù¸öÐéα´æ´¢¿âÓÕÆ­Óû§ÏÂÔØÐÅÏ¢ÇÔÈ¡³ÌÐò¡¢Ô¶³Ì»á¼ûľÂí£¨RAT£©ºÍ¼ôÌù°åÐ®ÖÆ³ÌÐò£¬£¬£¬£¬£¬ÒÔÇÔÈ¡¼ÓÃÜÇ®±ÒºÍƾ֤¡£¡£¡£¡£¡£¡£¡£ÕâЩÐéα´æ´¢¿â¾­ÓÉÈ«ÐÄÖÆ×÷£¬£¬£¬£¬£¬¾ßÓÐÏêϸÐÅÏ¢ºÍÊʵ±±àдµÄ×ÔÊöÎļþ£¬£¬£¬£¬£¬¿ÉÄܽèÖúÁËÈ˹¤ÖÇÄܹ¤¾ßµÄ×ÊÖú£¬£¬£¬£¬£¬²¢Í¨¹ýÈËΪÔöÌíÌá½»ÊýÄ¿À´Ìá¸ß¿ÉÐŶÈ¡£¡£¡£¡£¡£¡£¡£×¢ÈëÏîÄ¿µÄ¶ñÒâ´úÂëÓöàÖÖÓïÑÔ±àд£¬£¬£¬£¬£¬ÒÔÌÓ±ÜÌØ¶¨´úÂëÉó²é¹¤¾ßµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÖ´ÐÐÓÐÓøºÔØ£¬£¬£¬£¬£¬¾Í»áÏÂÔØµÚ¶þ½×¶Î¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£GitVenomÖÐʹÓõŤ¾ß°üÀ¨Node.jsÇÔÈ¡³ÌÐò¡¢AsyncRAT¡¢QuasarºóÃźͼôÌù°åÐ®ÖÆ³ÌÐò¡£¡£¡£¡£¡£¡£¡£±¨¸æÖصãÏÈÈÝÁËÒ»Æð°¸Àý£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´Ë»î¶¯»ñµÃÁ˼ÛÖµ50ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü´ËÀà»î¶¯²¢²»ÓÐÊý£¬£¬£¬£¬£¬µ«GitVenomµÄÒ»Á¬Ê±¼äºÍ¹æÄ£Ö¤ÊµÎúÕýµ±Æ½Ì¨µÄÀÄÓÃÈÔÈ»ºÜÊÇÓÐÓᣡ£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬³¹µ×Éó²éÏîÄ¿¡¢Ê¹Ó÷À²¡¶¾¹¤¾ßɨÃèÎļþÒÔ¼°ÔÚ¸ôÀëÇéÐÎÖÐÖ´ÐÐÏÂÔØµÄÎļþÖÁ¹ØÖ÷Òª¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gitvenom-attacks-abuse-hundreds-of-github-repos-to-steal-crypto/


3. Auto-Color£ºÐ·¢Ã÷µÄLinuxºóÃŶñÒâÈí¼þÍþв


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬2024Äê11ÔÂÖÁ12ÔÂʱ´ú£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Auto-Color¡±µÄδ¼Í¼LinuxºóÃű»·¢Ã÷£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĴóѧºÍÕþ¸®×éÖ¯¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ßÓм«Ç¿µÄÌÓ±ÜÐÔ£¬£¬£¬£¬£¬ÄÑÒÔ´ÓÊÜѬȾϵͳÖÐɾ³ý£¬£¬£¬£¬£¬²¢Äܳ¤Ê±¼ä¼á³Ö»á¼û¡£¡£¡£¡£¡£¡£¡£ËüÓëSymbiote Linux¶ñÒâÈí¼þ¼Ò×åÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬µ«Á½Õß²¢²»Ïàͬ¡£¡£¡£¡£¡£¡£¡£Auto-Colorͨ¹ýÖ´ÐÐαװ³ÉÁ¼ÐÔÃû³ÆµÄÎļþ×îÏȹ¥»÷£¬£¬£¬£¬£¬ÈôÊÇÒÔrootȨÏÞÔËÐУ¬£¬£¬£¬£¬»á×°ÖöñÒâ¿âÖ²ÈëÎï²¢ÐÞ¸ÄϵͳÎļþÒÔÈ·±£ÆäÖ´ÐС£¡£¡£¡£¡£¡£¡£ËüʹÓÃ×Ô½ç˵¼ÓÃÜËã·¨½âÃÜÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÐÅÏ¢£¬£¬£¬£¬£¬²¢Í¨¹ýËæ»úÖµÎÕÊÖÑéÖ¤½»Á÷¡£¡£¡£¡£¡£¡£¡£C2¿ÉÒÔÏÂÁîAuto-ColorÖ´ÐжàÖÖ²Ù×÷£¬£¬£¬£¬£¬Èç·­¿ª·´Ïòshell¡¢Ö´ÐÐí§ÒâÏÂÁî¡¢Ð޸Ļò½¨ÉèÎļþ¡¢³äµ±ÊðÀíÒÔ¼°¶¯Ì¬ÐÞ¸ÄÉèÖᣡ£¡£¡£¡£¡£¡£Auto-Color»¹¾ßÓÐÀàËÆrootkitµÄ¹¦Ð§£¬£¬£¬£¬£¬Èç×赲ϵͳŲÓúÍÒþ²ØC2ÅþÁ¬¡£¡£¡£¡£¡£¡£¡£Ëü»¹¾ßÓÐÄÚÖõġ°ÖÕÖ¹¿ª¹Ø¡±£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÁ¬Ã¦É¾³ýѬȾºÛ¼£¡£¡£¡£¡£¡£¡£¡£¼øÓÚÆäÒþÉíÐÔ¡¢Ä£¿£¿£¿£¿£¿£¿£¿é»¯Éè¼ÆºÍÔ¶³Ì¿ØÖƹ¦Ð§£¬£¬£¬£¬£¬Auto-Color¶ÔLinuxϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£¡£½¨Òé¼à¿ØÒªº¦³¤ÆÚ»úÖÆµÄת±ä£¬£¬£¬£¬£¬¼ì²éϵͳÈÕÖ¾ºÍÍøÂçÁ÷Á¿ÖÐÓëÁгöµÄC2 IPµÄÅþÁ¬£¬£¬£¬£¬£¬²¢Ê¹ÓûùÓÚÐÐΪµÄÍþв¼ì²â½â¾ö¼Æ»®¾ÙÐзÀÓù¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-auto-color-linux-backdoor-targets-north-american-govts-universities/


4. DISA Global SolutionsÊý¾Ýй¶ÊÂÎñÓ°Ïì330ÍòÈË


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬DISA Global SolutionsÊÇÒ»¼ÒÃÀ¹úÁìÏȵÄÅ侰ɸ²éºÍÒ©Îï¼°¾Æ¾«²âÊÔ¹«Ë¾£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ó°ÏìÁ˶à´ï330ÍòÈË¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÊ×´ÎÓÚ½ñÄê1ÔÂÅû¶£¬£¬£¬£¬£¬Éæ¼°2024Äê2ÔÂ9ÈÕÖÁ4ÔÂ22ÈÕʱ´ú±¬·¢µÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¾­ÓÉÉîÈëÊӲ죬£¬£¬£¬£¬DISAÈ·ÈÏÃô¸ÐÊý¾ÝÔڴ˴ι¥»÷ÖÐÔ⵽й¶¡£¡£¡£¡£¡£¡£¡£×÷ΪӵÓÐ55,000¶à¼Ò¿Í»§£¬£¬£¬£¬£¬°üÀ¨30%µÄ²Æ²ú500Ç¿ÆóÒµµÄЧÀÍÉÌ£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔÚÌìϹæÄ£ÄÚ±¬·¢ÆÕ±éÓ°Ïì¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂëÒÔ¼°²ÆÎñÕË»§ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜDISAδ͸¶ÏêϸÔâÊÜÁ˺ÎÖÖÀàÐ͵ÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ«Óб¨µÀ³ÆËûÃÇÒÑÖ§¸¶Êê½ðÒÔ±ÜÃâÊý¾Ý±»¹ûÕæÐû²¼¡£¡£¡£¡£¡£¡£¡£Îª±£»£»£»£»£»£»£»¤ÊÜÓ°ÏìÈËȺ£¬£¬£¬£¬£¬DISAͨ¹ýExperianÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬²¢½¨ÒéСÎÒ˽¼ÒÉèÖÃڲƭ¾¯±¨ºÍÇå¾²¶³½á¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-drug-testing-firm-disa-says-data-breach-impacts-33-million-people/


5. Orange GroupÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ÊýǧÓû§¼°Ô±¹¤Êý¾ÝÔâй¶


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÉù³ÆÀÖ³ÉÈëÇÖÁË·¨¹úµçÐÅÔËÓªÉ̺ÍÊý×ÖЧÀÍÌṩÉÌ Orange Group µÄϵͳ£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁËÊýǧ·Ý°üÀ¨Óû§¼Í¼ºÍÔ±¹¤Êý¾ÝµÄÄÚ²¿Îļþ¡£¡£¡£¡£¡£¡£¡£¸ÃºÚ¿ÍʹÓüÙÃû Rey£¬£¬£¬£¬£¬×Ô³ÆÊÇ HellCat ÀÕË÷Èí¼þ×éÖ¯µÄ³ÉÔ±£¬£¬£¬£¬£¬µ«ÌåÏÖ´Ë´ÎÈëÇÖ²¢·Ç HellCat µÄ²Ù×÷¡£¡£¡£¡£¡£¡£¡£¾Ý Rey Ëù³Æ£¬£¬£¬£¬£¬±»µÁÊý¾ÝÖ÷ÒªÀ´×Ô Orange µÄÂÞÂíÄáÑÇ·Ö¹«Ë¾£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢Ô´´úÂë¡¢·¢Æ±¡¢ÌõÔ¼¡¢¿Í»§ºÍÔ±¹¤ÐÅÏ¢µÈ£¬£¬£¬£¬£¬×ÜÁ¿½ü 6.5GB¡£¡£¡£¡£¡£¡£¡£Orange ¹«Ë¾Ö¤ÊµÁË´Ë´ÎÈëÇÖÊÂÎñ£¬£¬£¬£¬£¬µ«ÌåÏÖËü±¬·¢ÔÚÒ»¸ö·ÇÒªº¦Ó¦ÓóÌÐòÉÏ£¬£¬£¬£¬£¬²¢ÒÑÕö¿ªÊÓ²ìÒÔ×îС»¯Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖаüÀ¨Ò»Ð©³Â¸¯ºÍÒÑÓâÆÚµÄÐÅÏ¢£¬£¬£¬£¬£¬µ« Orange Ç¿µ÷¿Í»§µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Orange ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬¹«Ë¾µÄÍøÂçÇå¾²ºÍ IT ÍŶÓÕýÔÚÆð¾¢ÆÀ¹ÀÎ¥¹æË®Æ½²¢½µµÍÊÂÎñÓ°Ï죬£¬£¬£¬£¬Í¬Ê±ÔÊÐí×ñÊØÏà¹ØÖ´·¨ÒåÎñ²¢ÓëÏà¹Ø²¿·ÖÏàÖú½â¾ö´ËÊ¡£¡£¡£¡£¡£¡£¡£Rey »¹Í¸Â¶£¬£¬£¬£¬£¬ËûÃÇʹÓÃй¶µÄƾ֤ºÍ Jira Èí¼þ¼°ÄÚ²¿·Ö»§ÖеÄÎó²îÇÖÈëÁË Orange ϵͳ£¬£¬£¬£¬£¬²¢ÔÚÊÜѬȾµÄϵͳÉϰ²ÅÅÁËÀÕË÷ÐÅ£¬£¬£¬£¬£¬µ« Orange ²¢Î´¾ÙÐÐ̸ÅС£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/


6. µ×ÌØÂÉPBSÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Ãô¸ÐÐÅϢй¶


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾£¨PBS£©½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢Ðû²¼ÁË345GBµÄ±»µÁÎļþ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÓÚ2024Äê9ÔÂ1ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬µ¼Öµ×ÌØÂÉPBSµÄijЩϵͳѬȾ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ÎÞ·¨»á¼û²¿·ÖÎļþ¡£¡£¡£¡£¡£¡£¡£±»µÁÐÅÏ¢°üÀ¨ÖÁÉÙ1694È˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµãºÍÉç»á°ü¹ÜºÅ¡£¡£¡£¡£¡£¡£¡£µ×ÌØÂÉPBSѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬ÉîÈëÅÌÎÊÊÜÓ°ÏìСÎÒ˽¼ÒµÄ×îÐÂÁªÏµÐÅÏ¢£¬£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¸ÃµçÊǪ́»¹ÏòÁª°îÖ´·¨²¿·Öת´ïÁ˸ÃÊÂÎñ£¬£¬£¬£¬£¬²¢Æð¾¢ÊµÑéÌØÁíÍâ°ü¹Ü²½·¥²¢ÅàѵԱ¹¤¡£¡£¡£¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÊÇÒ»¸ö¶íÓïºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬×¨ÃŹ¥»÷×éÖ¯ÒÔ»ñÈ¡¾­¼ÃÀûÒæ£¬£¬£¬£¬£¬ÔøÕë¶ÔÂ׶صȵØÒ½Ôº·¢¶¯ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þʹÓÃCitrix BleedÁãÈÕÎó²îʹÓÃÊܺ¦Õߣ¬£¬£¬£¬£¬¶øµ×ÌØÂÉPBSËÆºõûÓÐÖ§¸¶Êê½ð£¬£¬£¬£¬£¬µ¼ÖÂÍøÂç·¸·¨·Ö×ÓÐû²¼Á˱»µÁÎļþ¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/television-station-detroit-pbs-hacked/