°²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÅäÖÃÃýÎóй¶

°ä²¼¹¦·ò 2025-10-31

1. °²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÅäÖÃÃýÎóй¶


10ÔÂ29ÈÕ £¬ºÉÀ¼ÍøÂ簲ȫ¹«Ë¾Neo Security½üÈÕÅû¶ £¬ÆäÊ×ϯ×êÑÐÔ±·¢ÏÖ°²ÓÀ¹ÜÕÊʦÊÂÎñËùÒ»¸ö³¬¹ý4TBµÄSQL Server±¸·ÝÎļþÒòÔÆ´æ´¢Í°ÅäÖÃÃýÎó¶³öÓÚ¹«¹²»¥ÁªÍø £¬µ¼Ö¸ùÜÕÊÓëÕ÷ѯ¾ÞÍ·µÄ»úÃÜÐÅϢй¶ ¡£¸Ã±¸·ÝÎļþ£¨.BAKÌåʽ£©Ô̺¬APIÃÜÔ¿¡¢»º´æÉí·ÝÑéÖ¤ÁîÅÆ¡¢»á»°ÁîÅÆ¡¢·þÎñÕË»§ÃÜÂë¼°Óû§Í´´¦µÈÃô¸ÐÐÅÏ¢ £¬ÇÒδ¼ÓÃÜ ¡£×êÑÐÍŶÓͨ¹ýÏÂÔØÎļþǰһǧ×Ö½ÚÑéÖ¤ÁËй¶ÊÂʵ £¬²¢Ö¸³ö´ËÀà·ì϶ԴÓÚµäÐ͵ÄÔÆ´æ´¢ÅäÖÃʧÎó £¬ÀàËÆ°¸ÀýÖÐ £¬¹¤³ÌʦΪ¼ò»¯Êý¾Ý¿âǨáãÁ÷³Ì £¬Ôø½«´æ´¢Í°¶ÌÔÝÉèΪ¹«¿ª£¨½öÎå·ÖÖÓ£© £¬È´Òò×Ô¶¯»¯É¨Ã蹤¾ßµÄ¼±¾ç¼ì²âµ¼ÖÂÊý¾Ý±»ÇÔÈ¡ ¡£Õâ´ÎÊÂÎñ¶³öÁËÏÖ´úÔÆÆ½Ì¨µÄ°²È«Òþ»¼£ºÖ»¹ÜÊý¾Ý¿âµ¼³öÓ뱸·ÝÁ÷³Ì¸ß¶È±ã½Ý £¬µ«¹¤¾ßÉè¼Æ²à³Á²Ù×÷·½±ãÐÔ¶ø·Ç°²È«·À»¤ £¬Óû§ÈôÒòƴдÃýÎó»ò²Ù×÷ºöÂÔ½«´æ´¢Í°ÉèΪ¹«¿ª £¬¼«Ò×µ¼ÖÂTB¼¼ûô¸ÐÊý¾Ýй¶ ¡£Neo SecurityÇ¿µ÷ £¬´ËÀàй¶ÍùÍùÔÚ±»·¢ÏÖǰÒÑÔâ¶ñÒâ·½»ñÈ¡ £¬ÆóҵӦĬÈÏÎļþ¶³ö˲¼ä¼´ÒÑʧÇÔ ¡£


https://www.theregister.com/2025/10/29/ey_exposes_4tb_sql_database/


2. PhantomRaven¹¥»÷»î¶¯Í¨¹ý¶ñÒânpm°üÇÔÈ¡¿ª·¢Í´´¦


10ÔÂ29ÈÕ £¬Koi Security×êÑÐÈËÔ±Åû¼ûûΪ¡°PhantomRaven¡±µÄ»îÔ¾¹¥»÷»î¶¯ £¬¸Ã»î¶¯×Ô8ÔÂÆðÒѲ¿Êð126¸ö¶ñÒânpm°ü £¬ÏÂÔØÁ¿³¬¹ý86,000´Î £¬Ö¸±êÖ±Ö¸JavaScript¿ª·¢ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆ¡¢CI/CDÃÜÔ¿¼°GitHubÍ´´¦ ¡£Node.jsĬÈϰüÖÎÀíÆ÷NPM×÷ΪȫÇò¿ª·¢Õß¹²Ïí´úÂëµÄÖ÷ÌâÆ½Ì¨ £¬³ÉΪÕâ´Î¹¥»÷µÄÖØÒªÔØÌå ¡£¹¥»÷ÕßÀûÓá°ÓòÃûÇÀ×¢¡±Õ½Êõ £¬Í¨¹ýAIÌìÉú¿´ËƺϷ¨µ«ÏÖʵ²»´æÔÚµÄÈí¼þ°üÃû³Æ£¨Èç·ÂÕÕGitLab»òApache¹¤¾ßµÄ°üÃû£© £¬ÓÕʹ¿ª·¢ÕßÔÚÒÀÀµLLMÍÆ¼öʱÎóÓà ¡£ÕâЩ¶ñÒâ°üѡȡԶ³Ì¶¯Ì¬ÒÀÀµÏRDD£©ÏµÍ³ £¬ËäÉêÃ÷ÎÞÒÀÀµÏî £¬µ«×°ÖÃʱ»á×Ô¶¯´Ó±í²¿URL»ñÈ¡ÓÐÐ§ÔØºÉ²¢Ö´ÐÐ £¬ÎÞÐèÓû§½»»¥ ¡£¸Ã»úÔìʹ¶ñÒâ´úÂëÔÚ¡°npm install¡±¹ý³ÌÖÐÇÄÈ»ÔËÐÐ £¬¶ÔÊÜϰȾÉ豸½øÐл·¾³·ÖÎö £¬ËÑË÷µç×ÓÓʼþµØÖ·¼°»·¾³±äÁ¿ £¬³ÁµãÇÔÈ¡NPM¡¢GitHub Actions¡¢GitLab¡¢JenkinsºÍCircleCIµÄÁîÅÆ £¬ÎªºóÐø¹©¸øÁ´¹¥»÷£¨ÈçÏòÆäËûÏîĿֲÈë¶ñÒâ´úÂ룩ÆÌ· ¡£¹¥»÷ÕßѡȡÈýÖÖÊý¾Ýй¶·½Ê½£ºURL±àÂëÊý¾ÝµÄHTTP GETÒªÇó¡¢JSONÊý¾ÝµÄHTTP POSTÒªÇó¼°WebSocketÏνÓ £¬È·±£ÇÔÊØÐÅÏ¢¸ßЧ±í´« ¡£


https://www.bleepingcomputer.com/news/security/phantomraven-attack-floods-npm-with-credential-stealing-packages/


3. Reputation.comй¶1.2ÒÚÌõÃô¸ÐÊý¾Ý


10ÔÂ29ÈÕ £¬½üÈÕ £¬Cybernews×êÑÐÍŶӷ¢ÏÖ³ÛÃûÔÚÏßÃûÓþÖÎÀí¹«Ë¾Reputation.comÒò·þÎñÆ÷δǿÔìÖ´ÐÐÉí·ÝÑéÖ¤ºÍ½Ó¼û½ÚÔì £¬µ¼Ö³¬¹ý320GB¡¢½ü1.2ÒÚÌõÔ̺¬ºó¶ËϵͳÊý¾ÝµÄ¼Í¼й¶ £¬Éæ¼°»á»°cookie¡¢Î¨Ò»±êʶ·û£¨Èçcompany_uid¡¢session_id£©¡¢¹¦·ò´Á¼°ÊÂÎñÈÕÖ¾µÈÃô¸ÐÐÅÏ¢ ¡£ÕâЩÊý¾ÝÔ´×ÔÆäÊý¾Ý¿ÉÊÓ»¯ÓëË÷Ç󹤾ߵĿɹ«¿ª½Ó¼ûÊ·ý £¬¼Í¼ÁË´´½¨¡¢¶ÁÈ¡¡¢¸üС¢É¾³ýµÈͨÀýÀûÓû £¬¸²¸ÇÊý°Ù¼Ò²Æ¸»500Ç¿ÆóÒµ¼°ÖØÒªÆ·ÅÆ £¬Ô̺¬ÃÀ¹úÒøÐÓ×¢¸£ÌØ¡¢Í¨ÓÃÆû³µ¡¢±¦Âí¾­ÏúÉ̵È ¡£Ð¹Â¶µÄcookie×Ö·û´®¿ÉÄܱ»ÓÃÓÚµÁÓÿͻ§É罻ýÌåÕË»§£¨ÈçFacebook¡¢Instagram¡¢LinkedInµÈƽ̨¼¯³É¹¦ÄÜ£© £¬¹¥»÷Õ߿ɰ䲼Óк¦ÄÚÈÝ¡¢°Ñ³ÖÉ̼ÒÐÅÏ¢¡¢ÇÖÈÅÓªÏú´òËã £¬ÉõÖÁ´Û¸Ä¶àÇþ·ͨѶ£¨Èç¿Í»§µ÷²é»Ø¸´¡¢¹«¹Ø»î¶¯Ëزģ© £¬¶ÔÆ·ÅÆÃûÓþºÍÔËÓªÔì³É³Á´óÇÖº¦ ¡£ÀýÈç £¬Í¨¹ýÀÄÓÃÉç½»Ì×¼þÖ°ÄÜ £¬ºÚ¿Í¿ÉÊ©ÐÓ×°ÐéαÌû×Ó¡±¡¢¶ñÒâ²¼¸æ»ò°Ñ³ÖÐÅÀµÐźÅ £¬Ö±½Ó³å»÷ÆóÒµ¹«ÐÅÁ¦ ¡£


https://cybernews.com/security/reputation-com-leak-exposes-sensitive-data/


4. º«¹úµçОÞÍ·LG Uplus֤ʵÊý¾Ýй¶


10ÔÂ29ÈÕ £¬½üÈÕ £¬º«¹úµçОÞÍ·LG Uplus֤ʵÒÉËÆ²úÉúÊý¾Ýй¶ÊÂÎñ £¬Éæ¼°Ô¼4.2ÍòÃû¿Í»§¼°167ÃûÔ±¹¤Ó×ÎÒÊý¾Ý £¬º«¹ú»¥ÁªÍø°²È«ÕñÐËÔº£¨KISA£©Òѽӻñ֪ͨ ¡£¸Ã¹«Ë¾ËäÌá½»»ã±¨ £¬µ«Î´°ä²¼ÄÚ²¿µ÷²éÁ˾ֹ¦·ò±í ¡£ÊÂÎñÔ´ÓÚ°×ñºÚ¿Í7Ô³õ´ÎÖÒ¸æµÄϵͳ·ì϶ £¬¶øLG UplusÔÚ8ÔÂÔøÏò¿Æ¼¼²¿°µÊ¾Î´·¢ÏÖÈ·Ôä¹¥»÷Ö¤¾Ý £¬ºóÒòÅú¸ÄÕË»§ÖÎÀíϵͳ·þÎñÆ÷±»Åú¿ÉÄÜÏú»Ù¹Ø¼üÖ¤¾Ý £¬Òý·¢¼à¹ÜÓ빫¼Ò¶ÔÖ¤¾Ý±£ÁôµÄÖÊÒÉ ¡£Õâ´ÎÊÂÎñ¼Ó¾çÁ˺«¹úµçÐÅÐÐÒµÍøÂç¹¥»÷º£³± ¡£´Ëǰ £¬SK TelecomÔâ¡°÷è÷롱ÀÕË÷Èí¼þ×éÖ¯¹¥»÷ £¬ÇÔȡԼ1TBÎļþ £¬µ¼Ö¹«Ë¾±»ÆÈÃâ·Ñ¸ü»»ËùÓпͻ§SIM¿¨²¢ÔÝÍ£ÐÂÓû§×¢²á £¬Ê×ϯִÐйٹ«¿ªÂ·Ç¸ ¡£Í¬ÆÚ £¬KT Telecom»ã±¨ÍøÂç¹¥»÷Ôì³É³¬2.4ÒÚº«ÔªËðʧ¼°368ÃûÊܺ¦Õß ¡£10Ô £¬CoinbaseCartelÍÅ»ïÍþвй¶SK Telecom»úÃÜÔ´´úÂë £¬Èô²»½»É潫¹«¿ªÊý¾Ý £¬½øÒ»²½Í¹ÏÔ¹©¸øÁ´°²È«·çÏÕ ¡£


https://cybernews.com/security/lg-uplus-data-breach-south-korea/


5. ConduentÊý¾Ýй¶ÊÂÎñ²¨¼°³¬Ç§ÍòÈË


10ÔÂ30ÈÕ £¬ÃÀ¹úÒµÎñÁ÷³Ì±í°ü¾ÞÍ·ConduentÈ·ÈÏ £¬2024Äê10ÔÂ21ÈÕ²úÉúµÄϵͳÐÔÈëÇÖµ¼Ö´ó¹æÄ£Êý¾Ýй¶ £¬Ó°ÏìÈËÊý³¬1050Íò £¬Éæ¼°ÃÀ¹ú¶àÖݾÓÃñ ¡£¸Ã¹«Ë¾2017Äê´ÓÊ©Àֲַ𠣬ÔÚ22¹úÕ¼ÓÐ5.6ÍòÃûÔ±¹¤ £¬ÄêÊÕÈë34ÒÚÃÀÔª £¬Îªµ±¾ÐİÆóÒµÌṩÊý×Ö»¯·þÎñƽ̨ ¡£¾ÝÏò˾·¨²¿Ìá½»µÄ֪ͨ¼°¸÷ÖÝ×ܼì²ì³¤Åû¶Êý¾Ý £¬¶íÀÕ¸ÔÖÝÊÜÓ°Ïì×îÑϳÁ £¬´ï1050ÍòÈË£»µÂ¿ËÈøË¹ÖÝ400Íò¡¢»ªÊ¢¶ÙÖÝ7.6Íò¡¢ÃåÒòÖÝÊý°ÙÈË £¬ÏÖʵӰÏìÁìÓòÒòδ¹«¿ªÊý¾ÝµÄÖÝ¿ÉÄܸü´ó ¡£Ð¹Â¶ÄÚÈÝÔ̺¬Ãô¸ÐÓ×ÎÒÐÅÏ¢£ºÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢ÆëÈ«µ®ÉúÈÕÆÚ¡¢½¡È«±£ÏÕµ¥ºÅ¡¢Éí·ÝÖ¤ºÅ¼°Ò½ÁƼͼ ¡£ConduentÉêÃ÷½ØÖÁ2025Äê10ÔÂ24ÈÕδ·¢ÏÖÊý¾ÝÀÄÓÃÖ¤¾Ý £¬µ«½¨ÒéÊÜÓ°ÏìÕß×Ô¶¯»ñÊØÐÅÓþ»ã±¨¡¢ÉèÖÃڲƭ¾¯±¨¼°ÕË»§¶³½á £¬Ö»¹Ü¹«Ë¾Î´Ìṩ¹Ù·½Éí·Ý͵ÇÔ±£»¤·þÎñ ¡£ÊÂÎñ×·ÒäÏÔʾ £¬2025Äê1Ô·¢ÏÖй¶ £¬µ«ÏµÍ³ÔçÔÚ2024Äê10ÔÂÒÑÔâÈëÇÖ ¡£½ñÄêËêÊ×ConduentÔøÒòÍøÂ簲ȫÊÂÎñÒý·¢·þÎñÖжÏ £¬SafepayÀÕË÷Èí¼þÍÅ»ï2ÔÂÏÂÑ®ÈϿɶԴËÕÆ¹Ü ¡£4ÔÂSECÎļþ½øÒ»²½Åû¶ £¬¹¥»÷ÕßÇÔÈ¡ÁËÔ̺¬¿Í»§ÐÅÏ¢¼°¿Í»§Êý¾ÝµÄÎļþ ¡£


https://www.bleepingcomputer.com/news/security/bpo-giant-conduent-confirms-data-breach-impacts-105-million-people/


6. Ribbon CommunicationsÔâ¹ú¶È¼¶ºÚ¿ÍÈëÇÖ


10ÔÂ30ÈÕ £¬ÃÀ¹úµçÕÛ·þÎñÌṩÉÌRibbon Communications½üÈÕÅû¶ £¬ÆäITÍøÂçÔçÔÚ2024Äê12Ô±ãÔâ¹ú¶È¼¶ºÚ¿ÍÈëÇÖ £¬µ«Ö±ÖÁ2025Äê9Ô²żì²âµ½Òì³£½Ó¼û ¡£¸Ã¹«Ë¾ÎªÈ«Çò68¸ö´¦Ê´¦µÄ3100ÓàÃûÔ±¹¤ £¬·þÎñ¶ÔÏóº­¸ÇÂåɼí¶ÊÓ×¢µÂ¿ËÈøË¹´óѧ°Â˹͡·ÖУ¡¢ÃÀ¹ú¹ú·À²¿¼°Verizon¡¢µÂ¹úµçÐŵȵçÐÅÔËÓªÉÌ ¡£Æ¾¾Ý10ÔÂ23ÈÕÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄÎļþ £¬RibbonÈ·ÈϹ¥»÷Õß×îÔçÓÚ2024Äê12Ô»ñµÃϵͳ½Ó¼ûȨÏÞ £¬ËäÒÑÖÕÖ¹ÍþвÐÐΪÕß½Ó¼û £¬µ«µ÷²éÈÔÔÚ½øÐÐÖÐ ¡£³õ´ëÊ©²éÏÔʾ £¬¹¥»÷Õß»ñÈ¡ÁË´æ´¢ÔÚÖ÷ÍøÂç±íµÄÁ½Ì¨±Ê¼Ç±¾µçÄÔÉϵĿͻ§Îļþ £¬µ«ÉÐδ·¢ÏÖ¡°ÄÚÈÝÐÔÐÅÏ¢¡±±»ÇÔÈ¡µÄÖ¤¾Ý ¡£¹«Ë¾Ô¤¼Æ2025ÄêµÚËÄʱ¶È½«Òòµ÷²éºÍÍøÂçÇ¿»¯²úÉú¶î±íÓöÈ £¬µ«¹æÄ£ÓÐÏÞ ¡£RibbonÕýÓëµÚÈý·½ÍøÂ簲ȫר¼Ò¼°Áª¹ú·¨Âɲ¿ÃźÏ×÷ £¬ÒÔÈ·¶¨ÈëÇÖÁìÓò¼°Ç±ÔÚÓ°Ïì ¡£Ö»¹ÜĿǰδ¹é×ïÓÚÌØ¶¨ÍþвÐÐΪÕß £¬µ«ÊÂÎñÔÙ´Î͹ÏԹؼü»ù´¡ÉèÊ©Ãæ¶ÔµÄÍøÂ簲ȫ·çÏÕ ¡£¹«Ë¾ºôÓõÓû§Î¬³Ö¾¯Ìè £¬²¢Ç¿µ÷½«³ÖÐø¸üе÷²é½øÕ¹ £¬ÒÔ±£ÏÕ¿Í»§Êý¾Ý°²È« ¡£


https://www.bleepingcomputer.com/news/security/major-telecom-services-provider-ribbon-breached-by-state-hackers/