ÒÔÉ«ÁÐTeleMessage¹«Ë¾ÔâºÚ¿Í¹¥»÷ÔÝÍ£·þÎñ
Ðû²¼Ê±¼ä 2025-05-061. ÒÔÉ«ÁÐTeleMessage¹«Ë¾ÔâºÚ¿Í¹¥»÷ÔÝÍ£·þÎñ
5ÔÂ5ÈÕ£¬ÒÔÉ«Áй«Ë¾TeleMessageÒòÔâºÚ¿Í¹¥»÷ÒÑÔÝÍ£ËùÓзþÎñ£¬Æäĸ¹«Ë¾Smarsh֤ʵÁËÕâÒ»ÐÂÎÅ£¬²¢ÌåÏÖÕýÔÚÊÓ²ìËùνµÄ¡°Ç±ÔÚÇå¾²ÊÂÎñ¡±¡£TeleMessageΪÆóÒµÌṩÇå¾²µÄÒÆ¶¯ÐÂÎÅ·þÎñ£¬ÆäÖаüÀ¨ÓÃÓڴ浵ͨ¹ý¶Ëµ½¶Ë¼ÓÃÜÐÂÎÅÓ¦ÓóÌÐò£¨ÈçTelegram¡¢WhatsAppºÍSignal£©½»Á÷ÐÂÎŵŤ¾ß£¬Ò»Ð©ÃÀ¹úÕþ¸®¹ÙÔ±ÔøÊ¹ÓÃÆä·Ç¹Ù·½SignalÐÂÎÅ´æµµ¹¤¾ßTM SGNL¡£´Ë´ÎÊÂÎñÔ´ÓÚ404 MediaµÄ±¨µÀ£¬Ò»ÃûºÚ¿ÍÈëÇÖÁËTeleMessage£¬»ñÈ¡ÁËʹÓÃTM SGNL´æµµµÄÖ±½ÓÐÂÎźÍȺÁÄ¡£ºÚ¿Í³ÆÈëÇÖÀú³ÌÇáËÉ£¬½öÆÆ·Ñ15µ½20·ÖÖÓ£¬²¢µ£ÐĸÃÎó²î¿ÉÄÜÒѱ£´æ½Ï³¤Ê±¼ä¡£Ö»¹ÜºÚ¿ÍÌåÏÖÄÚ¸ó³ÉÔ±ºÍǰ¹ú¼ÒÇå¾²ÕÕÁϵÄÐÅϢδ±»Ð¹Â¶£¬µ«ÌáÈ¡µÄÊý¾Ý°üÀ¨Õþ¸®¹ÙÔ±µÄÁªÏµÐÅÏ¢¡¢²¿·ÖÐÂÎÅÄÚÈÝÒÔ¼°TeleMessageºó¶ËµÇ¼ƾ֤¡£±ðµÄ£¬±»ÌáÈ¡µÄÊý¾Ý½ØÍ¼»¹ÏÔʾÓëÃÀ¹úº£¹ØºÍÁìÍÁ±£»¤¾Ö¡¢¼ÓÃÜÇ®±ÒÉúÒâËùCoinbaseÒÔ¼°·áÒµÒøÐеȽðÈÚ·þÎñÓйØÁª¡£Èí¼þ¹¤³ÌʦMicah LeeÆÊÎöTM SGNLºóÃÅSignalÓ¦ÓóÌÐòÔ´´úÂëʱ£¬·¢Ã÷ÁËÓ²±àÂëÆ¾Ö¤µÈ¼¸¸öÎó²î¡£Signal½²»°ÈËÌåÏÖÎÞ·¨°ü¹Ü·Ç¹Ù·½°æ±¾SignalµÄÒþ˽»òÇå¾²ÊôÐÔ£¬¶ø°×¹¬¸±ÐÂÎÅÃØÊéÔòÇ¿µ÷SignalÊǾÅú×¼µÄÕþ¸®Ê¹ÓÃÓ¦ÓóÌÐò£¬²¢×°ÖÃÔÚÕþ¸®ÊÖ»úÉÏ¡£
https://www.bleepingcomputer.com/news/security/unofficial-signal-app-used-by-trump-officials-investigates-hack/
2. ÃÀ¹ú¶àµØ½ÌÓý»ú¹¹ÆµÔâÍøÂç¹¥»÷£¬Ñ§ÉúѧϰÊÜÓ°Ïì
5ÔÂ6ÈÕ£¬½üÆÚ£¬ÃÀ¹ú¶àµØ½ÌÓý»ú¹¹ÆµÔâÍøÂç¹¥»÷£¬ÑÏÖØÓ°ÏìÁËѧУÔËÓª¼°Ñ§Éúѧϰ¡£ÐÂÄ«Î÷¸çÖݶà¸öÑ§ÇøºÍÎ÷ÐÂÄ«Î÷¸ç´óѧ¼´ÊÇÊܺ¦ÕßÖ®Ò»¡£Î÷ÐÂÄ«Î÷¸ç´óѧ×Ô4ÔÂ13ÈÕÆðÔâÊÜÍøÂç¹¥»÷£¬ÍøÕ¾Ì±»¾£¬ÏµÍ³ºÍ·þÎñÖÐÖ¹£¬¹Ù·½ÍøÕ¾ºÎʱ»Ö¸´ÉÐÎÞÔ¤¼Æ£¬Ð£Ô°WiFiÒ²´¦ÓÚ̱»¾×´Ì¬£¬Ð£·½±»ÆÈÌá¹©Ìæ»»·þÎñ£¬²¢Í¨¹ý¶àÖÖ·½·¨ÏòѧÉú¡¢Î÷ϯºÍÊÂÇéְԱת´ï×îÐÂÇéÐΡ£Í¬Ê±£¬Î÷ϯÃÇͨ¹ýÌṩ×÷ÒµºÍÏîÄ¿ÑÓÆÚÀ´Ö§³ÖѧÉú£¬ÒÔ¼õÇáÍ£¿Î¶ÔѧҵµÄÓ°Ï죬µ«´Ë¾ÙÈÔÒý·¢ÁËѧÉú²»Âú¡£×ôÖÎÑÇÖÝ¿¼Î¬ËþÏØÑ§Ð£ÏµÍ³Ò²ÓÚÖÜÎåÍí¼äÔâÓöÍøÂç¹¥»÷£¬Ó°ÏìÁË29ËùK-12ѧУµÄ23,000ÃûѧÉú£¬Ñ§Ð£ÏµÍ³ÍøÂçÁ÷³ÌÊÜ×裬Ա¹¤±»½¨Òé²»Òª»á¼û×ÀÃæ×°±¸¡£´Ë´Î¹¥»÷±»¸ÃУ¹ÙÔ±³ÆÎª¡°ÑÏÖØ¡±£¬²¢ÒÑÏòÏà¹Ø²¿·Ö±¨¸æ¡£±ðµÄ£¬¶í¿ËÀºÉÂíÖݰÍÌØ¶û˹ά¶û¹«Á¢Ñ§Ð£Ò²ÒòÍøÂç¹¥»÷µ¼ÖÂÅÌËã»úϵͳÎÞ·¨ÔËÐУ¬±»ÆÈ×÷·ÏÖݼ¶¿¼ÊÔ¡£½üÆÚ£¬´ËÀàÊÂÎñƵ·¢£¬°üÀ¨°Í¶ûµÄĦÊй«Á¢Ñ§Ð£µÄ´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷¡¢ÄÏ¿¨ÂÞÀ´ÄÉÖݲé¶û˹¶ÙÏØÑ§ÇøµÄÍøÂçÊÂÎñÒÔ¼°µÂ¿ËÈøË¹Öݰ¢¶ûÎÄ×ÔÁ¦Ñ§ÇøµÄÎ¥¹æÊÂÎñµÈ£¬¾ù¶ÔѧУÔËÓªºÍѧÉúÐÅÏ¢Çå¾²Ôì³ÉÁËÍþв¡£
https://therecord.media/hackers-serious-georgia-new-mexico
3. Co-opÏàÖúÉçÔâDragonForceÀÕË÷Èí¼þ¹¥»÷
5ÔÂ2ÈÕ£¬Co-opÏàÖúÉçÔâÊܵÄÍøÂç¹¥»÷±È×î³õ±¨µÀµÄ¸üΪÑÏÖØ£¬ÏÖÒÑÈ·ÈÏ´ó×Ú¿Í»§Êý¾Ý±»µÁ¡£Co-opÔçÏȵ»¯¹¥»÷Ó°Ï죬³ÆÒѹرղ¿·ÖITϵͳ£¬µ«ºóÐøÊÓ²ìÏÔʾºÚ¿ÍÀֳɻá¼ûÆäϵͳ²¢ÌáÈ¡Êý¾Ý£¬°üÀ¨ÏÖÈκÍǰÈγÉÔ±µÄÐÕÃû¡¢ÁªÏµ·½·¨µÈ£¬µ«²»Éæ¼°ÃÜÂë¡¢ÒøÐÐÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£ÐÂÎÅÈËʿ͸¶£¬¹¥»÷±¬·¢ÔÚ4ÔÂ22ÈÕ£¬¹¥»÷ÕßʹÓÃÉç»á¹¤³Ì¹¥»÷ÖØÖÃÔ±¹¤ÃÜÂ룬½ø¶øÈëÇÖÍøÂç²¢ÇÔÈ¡Windows NTDS.ditÎļþ¡£Co-opÏÖÔÚÕýÔÚÖØÐÞWindowsÓò¿ØÖÆÆ÷£¬²¢Ç¿»¯Entra IDÇå¾²£¬KPMGÐÖúÌṩAWSÖ§³Ö¡£BBC×îб¨µÀÖ¸³ö£¬DragonForceÀÕË÷Èí¼þÐж¯µÄÁ¥Êô»ú¹¹ÊǴ˴ι¥»÷µÄÄ»ºóºÚÊÖ£¬¸Ã×éÖ¯»¹Éù³ÆÕÆÎÕÁË2000Íò×¢²áCo-op»áÔ±½±ÀøÍýÏëÓû§µÄÊý¾Ý£¬²¢Ê¹ÓÃMicrosoft TeamsÁªÏµCo-op¸ß¹Ü¾ÙÐÐÀÕË÷¡£Co-opÒÑÏòÔ±¹¤·¢ËÍÄÚ²¿Óʼþ£¬ÖÒÑÔÔÚʹÓÃMicrosoft Teamsʱ¼á³ÖСÐÄ¡£DragonForceÊÇÒ»¸ö¡°ÀÕË÷Èí¼þ¼´·þÎñ¡±×éÖ¯£¬ÆäËûÍøÂç·¸·¨·Ö×ӿɼÓÈëÆäÖУ¬Ê¹ÓÃÆäÀÕË÷Èí¼þ¾ÙÐй¥»÷£¬²¢Ö§¸¶Êê½ð³é³É¡£
https://www.bleepingcomputer.com/news/security/co-op-confirms-data-theft-after-dragonforce-ransomware-claims-attack/
4. 21¸öMagentoÀ©Õ¹ºóÃÅDZÔÚÁùÄ꣬2025Ä꼤»îΣ¼°Ç§¼ÒµçÉÌ
5ÔÂ2ÈÕ£¬Ò»ÏîÉæ¼°21¸öºóÃÅMagentoÀ©Õ¹µÄ¹©Ó¦Á´¹¥»÷ÒÑΣ¼°500ÖÁ1000¼Òµç×ÓÉÌÎñÊÐËÁ£¬ÆäÖаüÀ¨Ò»¼Ò¼ÛÖµ400ÒÚÃÀÔªµÄ¿ç¹ú¹«Ë¾ÊÐËÁ¡£SansecÑо¿Ö°Ô±·¢Ã÷£¬²¿·ÖÀ©Õ¹³ÌÐòÔçÔÚ2019Äê¾Í±»Ö²ÈëºóÃÅ£¬µ«¶ñÒâ´úÂëÖ±µ½2025Äê4Ô²ű»¼¤»î¡£SansecÖ¸³ö£¬ÔÚÒ»´ÎÐͬ¹©Ó¦Á´¹¥»÷ÖУ¬¶à¼Ò¹©Ó¦ÉÌÔâºÚ¿Í¹¥»÷£¬¹²·¢Ã÷21¸öÓ¦ÓóÌÐòº¬ÏàͬºóÃÅ£¬¸Ã¶ñÒâÈí¼þ6Äêǰ±»×¢È룬±¾ÖÜËæ¹¥»÷ÕßÍêÈ«¿ØÖƵç×ÓÉÌÎñ·þÎñÆ÷¶ø×îÏÈ»îÔ¾¡£±»ÈëÇÖµÄÀ©Õ¹³ÌÐòÀ´×ÔTigren¡¢MeetanshiºÍMGSÈý¼Ò¹©Ó¦ÉÌ£¬Ïêϸ°üÀ¨Tigren AjaxÌ×¼þ¡¢Tigren AjaxÔ¸ÍûÇåµ¥¡¢Meetanshi ImageClean¡¢MGSÆ·ÅÆµÈ¶à¸öÀ©Õ¹¡£±ðµÄ£¬Sansec»¹·¢Ã÷ÁËWeltpixel GoogleTagManagerÀ©Õ¹µÄÊÜËð°æ±¾£¬µ«ÎÞ·¨È·ÈÏÊÜËðµã¡£ÔÚËùÓÐÊӲ쵽µÄ°¸ÀýÖУ¬À©Õ¹³ÌÐò¾ù°üÀ¨Ò»¸öÌí¼Óµ½ÔÊÐíÖ¤¼ì²éÎļþÖеÄPHPºóÃÅ£¬¸ÃºóÃÅͨ¹ý¼ì²éÌØ¶¨HTTPÇëÇó²ÎÊýÀ´ÔÊÐíÔ¶³ÌÓû§ÉÏ´«ÐÂÔÊÐíÖ¤²¢Ö´ÐÐí§ÒâPHP´úÂ룬¿ÉÄܵ¼ÖÂÊý¾Ý͵ÇÔ¡¢skimmer×¢ÈëµÈÑÏÖØÐ§¹û¡£SansecÒÑÁªÏµÕâÈý¼Ò¹©Ó¦ÉÌ£¬µ«MGSδ»ØÓ¦£¬Tigren·ñ¶¨Îó²î²¢¼ÌÐøÈö²¥´øºóÃŵÄÀ©Õ¹£¬MeetanshiÈϿɷþÎñÆ÷Îó²îµ«Î´ÈÏ¿ÉÀ©Õ¹ÈëÇÖ¡£
https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores/
5. ¶ñÒâPyPi°üʹÓÃGmail¼°WebSocketsÇÔÃÜ
5ÔÂ1ÈÕ£¬SocketÍþвÑо¿ÍŶӿËÈÕ·¢Ã÷ÁËÆß¸ö¶ñÒâPyPi°ü£¬ÕâЩ°üʹÓÃGmailµÄSMTP·þÎñÆ÷ºÍWebSocketsÊÖÒÕʵÑéÊý¾Ýй¶ºÍÔ¶³ÌÏÂÁîÖ´Ðй¥»÷¡£ÕâЩ¶ñÒâ°ü°üÀ¨Coffin-Codes-Pro¡¢Coffin-Codes-NET2¡¢Coffin-Codes-NET¡¢Coffin-Codes-2022¡¢Coffin2022¡¢Coffin-Grave¼°cfc-bsb£¬ÆäÖÐCoffin-Codes-2022µÄÏÂÔØÁ¿¸ß´ï18,100´Î£¬²¿·Ö°üÉõÖÁÒÑÔÚPyPIÉϱ£´æËÄÄêÖ®¾Ã¡£ÕâЩ¶ñÒâ°üð³äÕýµ±µÄCoffin°ü£¬ºóÕßÊÇÓÃÓÚ½«Jinja2Ä£°å¼¯³Éµ½DjangoÏîÄ¿µÄÇáÁ¿¼¶ÊÊÅäÆ÷¡£¶ñÒ⹦ЧÖ÷ÒªÌåÏÖÔÚͨ¹ýGmail¾ÙÐÐÒþ²ØÔ¶³Ì»á¼ûºÍÊý¾Ýй¶£¬Ê¹ÓÃÓ²±àÂëµÄGmailƾ֤µÇ¼SMTP·þÎñÆ÷·¢ËÍÕì̽ÐÅÏ¢£¬ÒÔÔÊÐí¹¥»÷ÕßÔ¶³Ì»á¼ûÊÜѬȾϵͳ¡£ÓÉÓÚGmailÊÇ¿ÉÐÅ·þÎñ£¬´ËÀàÔ˶¯ÄÑÒÔ±»·À»ðǽºÍÖն˼ì²âÓëÏìӦϵͳ£¨EDR£©±ê¼ÇΪ¿ÉÒÉ¡£Ö®ºó£¬Ö²Èë³ÌÐòͨ¹ýWebSocket½¨É賤ÆÚ¡¢¼ÓÃܵÄË«ÏòËíµÀ£¬ÔÊÐí¹¥»÷Õß¾ÙÐÐÄÚ²¿ÖÎÀíÃæ°åºÍAPI»á¼û¡¢Îļþ´«Êä¡¢µç×ÓÓʼþй¶¡¢shellÏÂÁîÖ´ÐС¢Æ¾Ö¤ÍøÂç¼°ºáÏòÒÆ¶¯µÈ²Ù×÷¡£SocketÖ¸³ö£¬ÕâЩ¶ñÒâ°ü¿ÉÄܾßÓÐÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÒâͼ£¬´ÓʹÓõĵç×ÓÓʼþµØµã¼°ÀàËÆÕ½ÂÔÖпÉÒÔ¿´³ö¡£
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-abuse-gmail-websockets-to-hijack-systems/
6. TicketToCashÊý¾Ý¿âÉèÖùýʧÖÂ52Íò¿Í»§Êý¾Ýй¶
5ÔÂ1ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler¿ËÈÕ·¢Ã÷£¬Ô˶¯ÃÅÆ±×ªÊÛÆ½Ì¨TicketToCashµÄÒ»¸öÉèÖùýʧ¡¢ÎÞÃÜÂë±£»¤µÄ200GB¹ûÕæÊý¾Ý¿âй¶ÁË52ÍòÃû¿Í»§µÄÊý¾Ý¡£¸ÃÊý¾Ý¿â°üÀ¨Áè¼Ý52ÍòÌõ¼Í¼£¬Éæ¼°¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¼°²¿·Ö²ÆÎñÏêϸÐÅÏ¢¡£Ð¹Â¶µÄÊý¾Ý²»µ«°üÀ¨ÐÕÃûºÍµç×ÓÓʼþµØµã£¬»¹º¸ÇÁ˲¿·ÖÐÅÓÿ¨ºÅ¡¢ÏÖʵµØµã¡¢Æ±Ö¤¸±±¾ÒÔ¼°°üÀ¨PIIµÄÎļþ£¬Èç¼ÒͥסַºÍÐÅÓÿ¨ºÅµÈ¡£Êý¾Ý¿âÃû³ÆÏÔʾÆäÒÔ¶àÖÖÊý×ÖÃûÌÃÉúÑĿͻ§Îļþ£¬ÈçPDF¡¢JPG¡¢PNGºÍJSONµÈ¡£FowlerÉó²éÎļþʱ·¢Ã÷£¬ÆäÖаüÀ¨´ó×ÚÒôÀÖ»áºÍÆäËûÏÖ³¡Ô˶¯µÄÃÅÆ±¡¢ÃÅÆ±×ªÈÃ֤ʵ¼°¸¶¿îÊÕÌõ½ØÍ¼£¬²¿·ÖÎļþ»¹ÏÔʾÁËÐÅÓÿ¨ºÅ¡¢È«Ãû¡¢µç×ÓÓʼþµØµãºÍ¼ÒͥסַµÈÃô¸ÐÐÅÏ¢¡£Ö»¹ÜÄÚ²¿ÏßË÷Åú×¢ÕâЩÊý¾ÝÊôÓÚTicketToCash£¬µ«¸Ã¹«Ë¾ÔÚÊÕµ½Í¨Öªºóδ×ö³öÆðÔ´»ØÓ¦£¬Êý¾Ý¿âÔÚµÚ¶þ´Î¾¯±¨Ç°Ò»Ö±´¦ÓÚ̻¶״̬£¬µ¼ÖÂÎļþÔÚËÄÌìÄÚÒ»Á¬Ì»Â¶¡£FowlerÖÒÑԳƣ¬ÕâЩÐÅÏ¢ÈôÂäÈë²»·¨·Ö×ÓÖ®ÊÖ£¬¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ»òÖÆÔìºÍתÊÛα³®µÈÚ²ÆÐÐΪ£¬ÇÒСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢µÄÓÐÓÃÆÚ¿ÉÄܳ¤´ïÊýÄ꣬й¶Ч¹ûÑÏÖØ¡£
https://hackread.com/ticket-resale-platform-tickettocash-exposed-user-data/


¾©¹«Íø°²±¸11010802024551ºÅ