°²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶
Ðû²¼Ê±¼ä 2025-10-311. °²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶
10ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÉÀ¼ÍøÂçÇå¾²¹«Ë¾Neo Security¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬ÆäÊ×ϯÑо¿Ô±·¢Ã÷°²ÓÀ»á¼ÆÊ¦ÊÂÎñËùÒ»¸öÁè¼Ý4TBµÄSQL Server±¸·ÝÎļþÒòÔÆ´æ´¢Í°ÉèÖùýʧ̻¶ÓÚ¹«¹²»¥ÁªÍø£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ¸Ã»á¼ÆÓë×Éѯ¾ÞÍ·µÄÉñÃØÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã±¸·ÝÎļþ£¨.BAKÃûÌã©°üÀ¨APIÃÜÔ¿¡¢»ºÁ¢×ã·ÝÑéÖ¤ÁîÅÆ¡¢»á»°ÁîÅÆ¡¢Ð§ÀÍÕË»§ÃÜÂë¼°Óû§Æ¾Ö¤µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÇÒδ¼ÓÃÜ¡£¡£¡£¡£¡£¡£Ñо¿ÍŶÓͨ¹ýÏÂÔØÎļþǰһǧ×Ö½ÚÑéÖ¤ÁËй¶ÊÂʵ£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³ö´ËÀàÎó²îÔ´Óڵ䷶µÄÔÆ´æ´¢ÉèÖÃʧÎ󣬣¬£¬£¬£¬£¬£¬ÀàËÆ°¸ÀýÖУ¬£¬£¬£¬£¬£¬£¬¹¤³ÌʦΪ¼ò»¯Êý¾Ý¿âǨáãÁ÷³Ì£¬£¬£¬£¬£¬£¬£¬Ôø½«´æ´¢Í°¶ÌÔÝÉèΪ¹ûÕæ£¨½öÎå·ÖÖÓ£©£¬£¬£¬£¬£¬£¬£¬È´Òò×Ô¶¯»¯É¨Ã蹤¾ßµÄ¿ìËÙ¼ì²âµ¼ÖÂÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÁËÏÖ´úÔÆÆ½Ì¨µÄÇå¾²Òþ»¼£ºÖ»¹ÜÊý¾Ý¿âµ¼³öÓ뱸·ÝÁ÷³Ì¸ß¶È±ã½Ý£¬£¬£¬£¬£¬£¬£¬µ«¹¤¾ßÉè¼Æ×ÅÖØ²Ù×÷±ãµ±ÐÔ¶ø·ÇÇå¾²·À»¤£¬£¬£¬£¬£¬£¬£¬Óû§ÈôÒòƴд¹ýʧ»ò²Ù×÷Êèºö½«´æ´¢Í°ÉèΪ¹ûÕæ£¬£¬£¬£¬£¬£¬£¬¼«Ò×µ¼ÖÂTB¼¶Ãô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£Neo SecurityÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬´ËÀàй¶ÍùÍùÔÚ±»·¢Ã÷ǰÒÑÔâ¶ñÒâ·½»ñÈ¡£¬£¬£¬£¬£¬£¬£¬ÆóҵӦĬÈÏÎļþ̻¶˲¼ä¼´ÒÑʧÔô¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2025/10/29/ey_exposes_4tb_sql_database/
2. PhantomRaven¹¥»÷»î¶¯Í¨¹ý¶ñÒânpm°üÇÔÈ¡¿ª·¢Æ¾Ö¤
10ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬Koi SecurityÑо¿Ö°Ô±Åû¶ÃûΪ¡°PhantomRaven¡±µÄ»îÔ¾¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯×Ô8ÔÂÆðÒѰ²ÅÅ126¸ö¶ñÒânpm°ü£¬£¬£¬£¬£¬£¬£¬ÏÂÔØÁ¿Áè¼Ý86,000´Î£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸JavaScript¿ª·¢ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆ¡¢CI/CDÃÜÔ¿¼°GitHubƾ֤¡£¡£¡£¡£¡£¡£Node.jsĬÈϰü¹ÜÀíÆ÷NPM×÷ΪȫÇò¿ª·¢Õß¹²Ïí´úÂëµÄ½¹µãƽ̨£¬£¬£¬£¬£¬£¬£¬³ÉΪ´Ë´Î¹¥»÷µÄÖ÷ÒªÔØÌå¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓá°ÓòÃûÇÀ×¢¡±Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉú¿´ËÆÕýµ±µ«ÏÖʵ²»±£´æµÄÈí¼þ°üÃû³Æ£¨ÈçÄ£ÄâGitLab»òApache¹¤¾ßµÄ°üÃû£©£¬£¬£¬£¬£¬£¬£¬ÓÕʹ¿ª·¢ÕßÔÚÒÀÀµLLMÍÆ¼öʱÎóÓᣡ£¡£¡£¡£¡£ÕâЩ¶ñÒâ°ü½ÓÄÉÔ¶³Ì¶¯Ì¬ÒÀÀµÏRDD£©ÏµÍ³£¬£¬£¬£¬£¬£¬£¬ËäÉùÃ÷ÎÞÒÀÀµÏ£¬£¬£¬£¬£¬£¬µ«×°ÖÃʱ»á×Ô¶¯´ÓÍⲿURL»ñÈ¡ÓÐÓÃÔØºÉ²¢Ö´ÐУ¬£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§½»»¥¡£¡£¡£¡£¡£¡£¸Ã»úÖÆÊ¹¶ñÒâ´úÂëÔÚ¡°npm install¡±Àú³ÌÖÐÇÄÈ»ÔËÐУ¬£¬£¬£¬£¬£¬£¬¶ÔÊÜѬȾװ±¸¾ÙÐÐÇéÐÎÆÊÎö£¬£¬£¬£¬£¬£¬£¬ËÑË÷µç×ÓÓʼþµØµã¼°ÇéÐαäÁ¿£¬£¬£¬£¬£¬£¬£¬ÖصãÇÔÈ¡NPM¡¢GitHub Actions¡¢GitLab¡¢JenkinsºÍCircleCIµÄÁîÅÆ£¬£¬£¬£¬£¬£¬£¬ÎªºóÐø¹©Ó¦Á´¹¥»÷£¨ÈçÏòÆäËûÏîĿֲÈë¶ñÒâ´úÂ룩ÆÌ·¡£¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉÈýÖÖÊý¾Ýй¶·½·¨£ºURL±àÂëÊý¾ÝµÄHTTP GETÇëÇó¡¢JSONÊý¾ÝµÄHTTP POSTÇëÇó¼°WebSocketÅþÁ¬£¬£¬£¬£¬£¬£¬£¬È·±£ÇÔÊØÐÅÏ¢¸ßЧÍâ´«¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phantomraven-attack-floods-npm-with-credential-stealing-packages/
3. Reputation.comй¶1.2ÒÚÌõÃô¸ÐÊý¾Ý
10ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬CybernewsÑо¿ÍŶӷ¢Ã÷×ÅÃûÔÚÏßÉùÓþÖÎÀí¹«Ë¾Reputation.comÒòЧÀÍÆ÷Î´Ç¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤ºÍ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý320GB¡¢½ü1.2ÒÚÌõ°üÀ¨ºó¶ËϵͳÊý¾ÝµÄ¼Í¼й¶£¬£¬£¬£¬£¬£¬£¬Éæ¼°»á»°cookie¡¢Î¨Ò»±êʶ·û£¨Èçcompany_uid¡¢session_id£©¡¢Ê±¼ä´Á¼°ÊÂÎñÈÕÖ¾µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÔ´×ÔÆäÊý¾Ý¿ÉÊÓ»¯Óë̽Ë÷¹¤¾ßµÄ¿É¹ûÕæ»á¼ûʵÀý£¬£¬£¬£¬£¬£¬£¬¼Í¼Á˽¨Éè¡¢¶ÁÈ¡¡¢¸üС¢É¾³ýµÈͨÀýÓ¦Óû£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÊý°Ù¼Ò²Æ²ú500Ç¿ÆóÒµ¼°Ö÷ÒªÆ·ÅÆ£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹úÒøÐС¢¸£ÌØ¡¢Í¨ÓÃÆû³µ¡¢±¦Âí¾ÏúÉ̵ȡ£¡£¡£¡£¡£¡£Ð¹Â¶µÄcookie×Ö·û´®¿ÉÄܱ»ÓÃÓÚµÁÓÿͻ§É罻ýÌåÕË»§£¨ÈçFacebook¡¢Instagram¡¢LinkedInµÈƽ̨¼¯ÀÖ³ÉÄÜ£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÐû²¼Óк¦ÄÚÈÝ¡¢Ê¹ÓÃÉ̼ÒÐÅÏ¢¡¢ÈÅÂÒÓªÏúÍýÏ룬£¬£¬£¬£¬£¬£¬ÉõÖÁ¸Ä¶¯¶àÇþµÀͨѶ£¨Èç¿Í»§ÊÓ²ì»Ø¸´¡¢¹«¹Ø»î¶¯Ëزģ©£¬£¬£¬£¬£¬£¬£¬¶ÔÆ·ÅÆÉùÓþºÍÔËÓªÔì³ÉÖØ´óË𺦡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬£¬Í¨¹ýÀÄÓÃÉç½»Ì×¼þ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉʵÑé¡°ÐéαÌû×Ó¡±¡¢¶ñÒâͨ¸æ»òʹÓÃÐÅÈÎÐźţ¬£¬£¬£¬£¬£¬£¬Ö±½Ó¹¥»÷ÆóÒµ¹«ÐÅÁ¦¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/reputation-com-leak-exposes-sensitive-data/
4. º«¹úµçОÞÍ·LG Uplus֤ʵÊý¾Ýй¶
10ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬º«¹úµçОÞÍ·LG Uplus֤ʵÒÉËÆ±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Éæ¼°Ô¼4.2ÍòÃû¿Í»§¼°167ÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬£¬º«¹ú»¥ÁªÍøÇå¾²ÕñÐËÔº£¨KISA£©Òѽӻñ֪ͨ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ËäÌá½»±¨¸æ£¬£¬£¬£¬£¬£¬£¬µ«Î´Ðû²¼ÄÚ²¿ÊÓ²ìЧ¹ûʱ¼ä±í¡£¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ°×ñºÚ¿Í7ÔÂÊ×´ÎÖÒÑÔµÄϵͳÎó²î£¬£¬£¬£¬£¬£¬£¬¶øLG UplusÔÚ8ÔÂÔøÏò¿Æ¼¼²¿ÌåÏÖδ·¢Ã÷È·Ôä¹¥»÷Ö¤¾Ý£¬£¬£¬£¬£¬£¬£¬ºóÒòÐÞ¸ÄÕË»§ÖÎÀíϵͳЧÀÍÆ÷±»Åú¿ÉÄÜÏú»ÙÒªº¦Ö¤¾Ý£¬£¬£¬£¬£¬£¬£¬Òý·¢î¿ÏµÓ빫ÖÚ¶ÔÖ¤¾ÝÉúÑĵÄÖÊÒÉ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¼Ó¾çÁ˺«¹úµçÐÅÐÐÒµÍøÂç¹¥»÷À˳±¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬SK TelecomÔâ¡°÷è÷롱ÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÇÔȡԼ1TBÎļþ£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾±»ÆÈÃâ·ÑÌæ»»ËùÓпͻ§SIM¿¨²¢ÔÝÍ£ÐÂÓû§×¢²á£¬£¬£¬£¬£¬£¬£¬Ê×ϯִÐйٹûÕæÖÂǸ¡£¡£¡£¡£¡£¡£Í¬ÆÚ£¬£¬£¬£¬£¬£¬£¬KT Telecom±¨¸æÍøÂç¹¥»÷Ôì³É³¬2.4ÒÚº«ÔªËðʧ¼°368ÃûÊܺ¦Õß¡£¡£¡£¡£¡£¡£10Ô£¬£¬£¬£¬£¬£¬£¬CoinbaseCartelÍÅ»ïÍþвй¶SK TelecomÉñÃØÔ´´úÂ룬£¬£¬£¬£¬£¬£¬Èô²»Ì¸Åн«¹ûÕæÊý¾Ý£¬£¬£¬£¬£¬£¬£¬½øÒ»²½Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/lg-uplus-data-breach-south-korea/
5. ConduentÊý¾Ýй¶ÊÂÎñ²¨¼°³¬ÍòÍòÈË
10ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·ConduentÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬2024Äê10ÔÂ21ÈÕ±¬·¢µÄϵͳÐÔÈëÇÖµ¼Ö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÈËÊý³¬1050Íò£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÃÀ¹ú¶àÖÝסÃñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾2017Äê´ÓÊ©Àֲַ𣬣¬£¬£¬£¬£¬£¬ÔÚ22¹úÓµÓÐ5.6ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬ÄêÊÕÈë34ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬ÎªÕþ¸®¼°ÆóÒµÌṩÊý×Ö»¯Ð§ÀÍÆ½Ì¨¡£¡£¡£¡£¡£¡£¾ÝÏò˾·¨²¿Ìá½»µÄ֪ͨ¼°¸÷ÖÝ×ÜÉó²é³¤Åû¶Êý¾Ý£¬£¬£¬£¬£¬£¬£¬¶íÀÕ¸ÔÖÝÊÜÓ°Ïì×îÑÏÖØ£¬£¬£¬£¬£¬£¬£¬´ï1050ÍòÈË£»£»£»£»µÂ¿ËÈøË¹ÖÝ400Íò¡¢»ªÊ¢¶ÙÖÝ7.6Íò¡¢ÃåÒòÖÝÊý°ÙÈË£¬£¬£¬£¬£¬£¬£¬ÏÖʵӰÏì¹æÄ£Òòδ¹ûÕæÊý¾ÝµÄÖÝ¿ÉÄܸü´ó¡£¡£¡£¡£¡£¡£Ð¹Â¶ÄÚÈݰüÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢£ºÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÍêÕû³öÉúÈÕÆÚ¡¢¿µ½¡°ü¹Üµ¥ºÅ¡¢Éí·ÝÖ¤ºÅ¼°Ò½ÁƼͼ¡£¡£¡£¡£¡£¡£ConduentÉùÃ÷×èÖ¹2025Äê10ÔÂ24ÈÕδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬µ«½¨ÒéÊÜÓ°ÏìÕß×Ô¶¯»ñÊØÐÅÓñ¨¸æ¡¢ÉèÖÃڲƾ¯±¨¼°ÕË»§¶³½á£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü¹«Ë¾Î´Ìṩ¹Ù·½Éí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£ÊÂÎñ×·ËÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬2025Äê1Ô·¢Ã÷й¶£¬£¬£¬£¬£¬£¬£¬µ«ÏµÍ³ÔçÔÚ2024Äê10ÔÂÒÑÔâÈëÇÖ¡£¡£¡£¡£¡£¡£½ñÄêÄêÍ·ConduentÔøÒòÍøÂçÇå¾²ÊÂÎñÒý·¢Ð§ÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬SafepayÀÕË÷Èí¼þÍÅ»ï2ÔÂÏÂÑ®ÈϿɶԴËÈÏÕæ¡£¡£¡£¡£¡£¡£4ÔÂSECÎļþ½øÒ»²½Åû¶£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨¿Í»§ÐÅÏ¢¼°¿Í»§Êý¾ÝµÄÎļþ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bpo-giant-conduent-confirms-data-breach-impacts-105-million-people/
6. Ribbon CommunicationsÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ
10ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úµçÐÅЧÀÍÌṩÉÌRibbon Communications¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬ÆäITÍøÂçÔçÔÚ2024Äê12Ô±ãÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬µ«Ö±ÖÁ2025Äê9Ô²żì²âµ½Òì³£»á¼û¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÈ«Çò68¸öЧÀÍ´¦µÄ3100ÓàÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬Ð§À͹¤¾ßº¸ÇÂåɼí¶ÊС¢µÂ¿ËÈøË¹´óѧ°Â˹͡·ÖУ¡¢ÃÀ¹ú¹ú·À²¿¼°Verizon¡¢µÂ¹úµçÐŵȵçÐÅÔËÓªÉÌ¡£¡£¡£¡£¡£¡£Æ¾Ö¤10ÔÂ23ÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþ£¬£¬£¬£¬£¬£¬£¬RibbonÈ·ÈϹ¥»÷Õß×îÔçÓÚ2024Äê12Ô»ñµÃϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬ËäÒÑÖÕÖ¹ÍþвÐÐΪÕß»á¼û£¬£¬£¬£¬£¬£¬£¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£³õ³ÌÐò²éÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁË´æ´¢ÔÚÖ÷ÍøÂçÍâµÄÁ½Ì¨Ìõ¼Ç±¾µçÄÔÉϵĿͻ§Îļþ£¬£¬£¬£¬£¬£¬£¬µ«ÉÐδ·¢Ã÷¡°ÊµÖÊÐÔÐÅÏ¢¡±±»ÇÔÈ¡µÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¹«Ë¾Ô¤¼Æ2025ÄêµÚËÄÐò¶È½«ÒòÊÓ²ìºÍÍøÂçÇ¿»¯±¬·¢ÌØÊâÓöȣ¬£¬£¬£¬£¬£¬£¬µ«¹æÄ£ÓÐÏÞ¡£¡£¡£¡£¡£¡£RibbonÕýÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Áª°îÖ´·¨²¿·ÖÏàÖú£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÈëÇÖ¹æÄ£¼°Ç±ÔÚÓ°Ïì¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ¹é×ïÓÚÌØ¶¨ÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬µ«ÊÂÎñÔÙ´Î͹ÏÔÒªº¦»ù´¡ÉèÊ©ÃæÁÙµÄÍøÂçÇ徲Σº¦¡£¡£¡£¡£¡£¡£¹«Ë¾ºôÓõÓû§¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷½«Ò»Á¬¸üÐÂÊÓ²ìÏ£Íû£¬£¬£¬£¬£¬£¬£¬ÒÔ°ü¹Ü¿Í»§Êý¾ÝÇå¾²¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/major-telecom-services-provider-ribbon-breached-by-state-hackers/


¾©¹«Íø°²±¸11010802024551ºÅ