°²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶

Ðû²¼Ê±¼ä 2025-10-31

1. °²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶


10ÔÂ29ÈÕ£¬ºÉÀ¼ÍøÂçÇå¾²¹«Ë¾Neo Security¿ËÈÕÅû¶£¬ÆäÊ×ϯÑо¿Ô±·¢Ã÷°²ÓÀ»á¼ÆÊ¦ÊÂÎñËùÒ»¸öÁè¼Ý4TBµÄSQL Server±¸·ÝÎļþÒòÔÆ´æ´¢Í°ÉèÖùýʧ̻¶ÓÚ¹«¹²»¥ÁªÍø£¬µ¼ÖÂ¸Ã»á¼ÆÓë×Éѯ¾ÞÍ·µÄÉñÃØÐÅϢй¶¡£¸Ã±¸·ÝÎļþ£¨.BAKÃûÌã©°üÀ¨APIÃÜÔ¿¡¢»ºÁ¢×ã·ÝÑéÖ¤ÁîÅÆ¡¢»á»°ÁîÅÆ¡¢·þÎñÕË»§ÃÜÂë¼°Óû§Æ¾Ö¤µÈÃô¸ÐÐÅÏ¢£¬ÇÒδ¼ÓÃÜ¡£Ñо¿ÍŶÓͨ¹ýÏÂÔØÎļþǰһǧ×Ö½ÚÑéÖ¤ÁËй¶ÊÂʵ£¬²¢Ö¸³ö´ËÀàÎó²îÔ´Óڵ䷶µÄÔÆ´æ´¢ÉèÖÃʧÎó£¬ÀàËÆ°¸ÀýÖУ¬¹¤³ÌʦΪ¼ò»¯Êý¾Ý¿âǨáãÁ÷³Ì£¬Ôø½«´æ´¢Í°¶ÌÔÝÉèΪ¹ûÕæ£¨½öÎå·ÖÖÓ£©£¬È´Òò×Ô¶¯»¯É¨Ã蹤¾ßµÄ¿ìËÙ¼ì²âµ¼ÖÂÊý¾Ý±»ÇÔÈ¡¡£´Ë´ÎÊÂÎñ̻¶ÁËÏÖ´úÔÆÆ½Ì¨µÄÇå¾²Òþ»¼£ºÖ»¹ÜÊý¾Ý¿âµ¼³öÓ뱸·ÝÁ÷³Ì¸ß¶È±ã½Ý£¬µ«¹¤¾ßÉè¼Æ×ÅÖØ²Ù×÷±ãµ±ÐÔ¶ø·ÇÇå¾²·À»¤£¬Óû§ÈôÒòƴд¹ýʧ»ò²Ù×÷Êèºö½«´æ´¢Í°ÉèΪ¹ûÕæ£¬¼«Ò×µ¼ÖÂTB¼¶Ãô¸ÐÊý¾Ýй¶¡£Neo SecurityÇ¿µ÷£¬´ËÀàй¶ÍùÍùÔÚ±»·¢Ã÷ǰÒÑÔâ¶ñÒâ·½»ñÈ¡£¬ÆóҵӦĬÈÏÎļþ̻¶˲¼ä¼´ÒÑʧÔô¡£


https://www.theregister.com/2025/10/29/ey_exposes_4tb_sql_database/


2. PhantomRaven¹¥»÷Ô˶¯Í¨¹ý¶ñÒânpm°üÇÔÈ¡¿ª·¢Æ¾Ö¤


10ÔÂ29ÈÕ£¬Koi SecurityÑо¿Ö°Ô±Åû¶ÃûΪ¡°PhantomRaven¡±µÄ»îÔ¾¹¥»÷Ô˶¯£¬¸ÃÔ˶¯×Ô8ÔÂÆðÒѰ²ÅÅ126¸ö¶ñÒânpm°ü£¬ÏÂÔØÁ¿Áè¼Ý86,000´Î£¬Ä¿µÄÖ±Ö¸JavaScript¿ª·¢ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆ¡¢CI/CDÃÜÔ¿¼°GitHubƾ֤¡£Node.jsĬÈϰü¹ÜÀíÆ÷NPM×÷ΪȫÇò¿ª·¢Õß¹²Ïí´úÂëµÄ½¹µãƽ̨£¬³ÉΪ´Ë´Î¹¥»÷µÄÖ÷ÒªÔØÌå¡£¹¥»÷ÕßʹÓá°ÓòÃûÇÀ×¢¡±Õ½ÂÔ£¬Í¨¹ýAIÌìÉú¿´ËÆÕýµ±µ«ÏÖʵ²»±£´æµÄÈí¼þ°üÃû³Æ£¨ÈçÄ£ÄâGitLab»òApache¹¤¾ßµÄ°üÃû£©£¬ÓÕʹ¿ª·¢ÕßÔÚÒÀÀµLLMÍÆ¼öʱÎóÓá£ÕâЩ¶ñÒâ°ü½ÓÄÉÔ¶³Ì¶¯Ì¬ÒÀÀµÏRDD£©ÏµÍ³£¬ËäÉùÃ÷ÎÞÒÀÀµÏµ«×°ÖÃʱ»á×Ô¶¯´ÓÍⲿURL»ñÈ¡ÓÐÓÃÔØºÉ²¢Ö´ÐУ¬ÎÞÐèÓû§½»»¥¡£¸Ã»úÖÆÊ¹¶ñÒâ´úÂëÔÚ¡°npm install¡±Àú³ÌÖÐÇÄÈ»ÔËÐУ¬¶ÔÊÜѬȾװ±¸¾ÙÐÐÇéÐÎÆÊÎö£¬ËÑË÷µç×ÓÓʼþµØµã¼°ÇéÐαäÁ¿£¬ÖصãÇÔÈ¡NPM¡¢GitHub Actions¡¢GitLab¡¢JenkinsºÍCircleCIµÄÁîÅÆ£¬ÎªºóÐø¹©Ó¦Á´¹¥»÷£¨ÈçÏòÆäËûÏîĿֲÈë¶ñÒâ´úÂ룩ÆÌ·¡£¹¥»÷Õß½ÓÄÉÈýÖÖÊý¾Ýй¶·½·¨£ºURL±àÂëÊý¾ÝµÄHTTP GETÇëÇó¡¢JSONÊý¾ÝµÄHTTP POSTÇëÇó¼°WebSocketÅþÁ¬£¬È·±£ÇÔÊØÐÅÏ¢¸ßЧÍâ´«¡£


https://www.bleepingcomputer.com/news/security/phantomraven-attack-floods-npm-with-credential-stealing-packages/


3. Reputation.comй¶1.2ÒÚÌõÃô¸ÐÊý¾Ý


10ÔÂ29ÈÕ£¬¿ËÈÕ£¬CybernewsÑо¿ÍŶӷ¢Ã÷×ÅÃûÔÚÏßÉùÓþÖÎÀí¹«Ë¾Reputation.comÒò·þÎñÆ÷Î´Ç¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤ºÍ»á¼û¿ØÖÆ£¬µ¼ÖÂÁè¼Ý320GB¡¢½ü1.2ÒÚÌõ°üÀ¨ºó¶ËϵͳÊý¾ÝµÄ¼Í¼й¶£¬Éæ¼°»á»°cookie¡¢Î¨Ò»±êʶ·û£¨Èçcompany_uid¡¢session_id£©¡¢Ê±¼ä´Á¼°ÊÂÎñÈÕÖ¾µÈÃô¸ÐÐÅÏ¢¡£ÕâЩÊý¾ÝÔ´×ÔÆäÊý¾Ý¿ÉÊÓ»¯Óë̽Ë÷¹¤¾ßµÄ¿É¹ûÕæ»á¼ûʵÀý£¬¼Í¼Á˽¨Éè¡¢¶ÁÈ¡¡¢¸üС¢É¾³ýµÈͨÀýÓ¦ÓÃÔ˶¯£¬ÁýÕÖÊý°Ù¼Ò²Æ²ú500Ç¿ÆóÒµ¼°Ö÷ÒªÆ·ÅÆ£¬°üÀ¨ÃÀ¹úÒøÐС¢¸£ÌØ¡¢Í¨ÓÃÆû³µ¡¢±¦Âí¾­ÏúÉ̵È¡£Ð¹Â¶µÄcookie×Ö·û´®¿ÉÄܱ»ÓÃÓÚµÁÓÿͻ§É罻ýÌåÕË»§£¨ÈçFacebook¡¢Instagram¡¢LinkedInµÈƽ̨¼¯ÀÖ³ÉÄÜ£©£¬¹¥»÷Õß¿ÉÐû²¼Óк¦ÄÚÈÝ¡¢Ê¹ÓÃÉ̼ÒÐÅÏ¢¡¢ÈÅÂÒÓªÏúÍýÏ룬ÉõÖÁ¸Ä¶¯¶àÇþµÀͨѶ£¨Èç¿Í»§ÊÓ²ì»Ø¸´¡¢¹«¹ØÔ˶¯Ëزģ©£¬¶ÔÆ·ÅÆÉùÓþºÍÔËÓªÔì³ÉÖØ´óË𺦡£ÀýÈ磬ͨ¹ýÀÄÓÃÉç½»Ì×¼þ¹¦Ð§£¬ºÚ¿Í¿ÉʵÑé¡°ÐéαÌû×Ó¡±¡¢¶ñÒâͨ¸æ»òʹÓÃÐÅÍÐÐźÅ£¬Ö±½Ó¹¥»÷ÆóÒµ¹«ÐÅÁ¦¡£


https://cybernews.com/security/reputation-com-leak-exposes-sensitive-data/


4. º«¹úµçОÞÍ·LG Uplus֤ʵÊý¾Ýй¶


10ÔÂ29ÈÕ£¬¿ËÈÕ£¬º«¹úµçОÞÍ·LG Uplus֤ʵÒÉËÆ±¬·¢Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°Ô¼4.2ÍòÃû¿Í»§¼°167ÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý£¬º«¹ú»¥ÁªÍøÇå¾²ÕñÐËÔº£¨KISA£©Òѽӻñ֪ͨ¡£¸Ã¹«Ë¾ËäÌá½»±¨¸æ£¬µ«Î´Ðû²¼ÄÚ²¿ÊÓ²ìЧ¹ûʱ¼ä±í¡£ÊÂÎñÔ´ÓÚ°×ñºÚ¿Í7ÔÂÊ×´ÎÖÒÑÔµÄϵͳÎó²î£¬¶øLG UplusÔÚ8ÔÂÔøÏò¿Æ¼¼²¿ÌåÏÖδ·¢Ã÷È·Ôä¹¥»÷Ö¤¾Ý£¬ºóÒòÐÞ¸ÄÕË»§ÖÎÀíϵͳ·þÎñÆ÷±»Åú¿ÉÄÜÏú»ÙÒªº¦Ö¤¾Ý£¬Òý·¢î¿ÏµÓ빫ÖÚ¶ÔÖ¤¾ÝÉúÑĵÄÖÊÒÉ¡£´Ë´ÎÊÂÎñ¼Ó¾çÁ˺«¹úµçÐÅÐÐÒµÍøÂç¹¥»÷À˳±¡£´Ëǰ£¬SK TelecomÔâ¡°÷è÷롱ÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬ÇÔȡԼ1TBÎļþ£¬µ¼Ö¹«Ë¾±»ÆÈÃâ·ÑÌæ»»ËùÓпͻ§SIM¿¨²¢ÔÝÍ£ÐÂÓû§×¢²á£¬Ê×ϯִÐйٹûÕæÖÂǸ¡£Í¬ÆÚ£¬KT Telecom±¨¸æÍøÂç¹¥»÷Ôì³É³¬2.4ÒÚº«ÔªËðʧ¼°368ÃûÊܺ¦Õß¡£10Ô£¬CoinbaseCartelÍÅ»ïÍþвй¶SK TelecomÉñÃØÔ´´úÂ룬Èô²»Ì¸Åн«¹ûÕæÊý¾Ý£¬½øÒ»²½Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£


https://cybernews.com/security/lg-uplus-data-breach-south-korea/


5. ConduentÊý¾Ýй¶ÊÂÎñ²¨¼°³¬ÍòÍòÈË


10ÔÂ30ÈÕ£¬ÃÀ¹úÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·ConduentÈ·ÈÏ£¬2024Äê10ÔÂ21ÈÕ±¬·¢µÄϵͳÐÔÈëÇÖµ¼Ö´ó¹æÄ£Êý¾Ýй¶£¬Ó°ÏìÈËÊý³¬1050Íò£¬Éæ¼°ÃÀ¹ú¶àÖÝסÃñ¡£¸Ã¹«Ë¾2017Äê´ÓÊ©ÀÖ·Ö²ð£¬ÔÚ22¹úÓµÓÐ5.6ÍòÃûÔ±¹¤£¬ÄêÊÕÈë34ÒÚÃÀÔª£¬ÎªÕþ¸®¼°ÆóÒµÌṩÊý×Ö»¯·þÎñƽ̨¡£¾ÝÏò˾·¨²¿Ìá½»µÄ֪ͨ¼°¸÷ÖÝ×ÜÉó²é³¤Åû¶Êý¾Ý£¬¶íÀÕ¸ÔÖÝÊÜÓ°Ïì×îÑÏÖØ£¬´ï1050ÍòÈË£»µÂ¿ËÈøË¹ÖÝ400Íò¡¢»ªÊ¢¶ÙÖÝ7.6Íò¡¢ÃåÒòÖÝÊý°ÙÈË£¬ÏÖʵӰÏì¹æÄ£Òòδ¹ûÕæÊý¾ÝµÄÖÝ¿ÉÄܸü´ó¡£Ð¹Â¶ÄÚÈݰüÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢£ºÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÍêÕû³öÉúÈÕÆÚ¡¢¿µ½¡°ü¹Üµ¥ºÅ¡¢Éí·ÝÖ¤ºÅ¼°Ò½ÁƼͼ¡£ConduentÉùÃ÷×èÖ¹2025Äê10ÔÂ24ÈÕδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬µ«½¨ÒéÊÜÓ°ÏìÕß×Ô¶¯»ñÊØÐÅÓñ¨¸æ¡¢ÉèÖÃڲƭ¾¯±¨¼°ÕË»§¶³½á£¬Ö»¹Ü¹«Ë¾Î´Ìṩ¹Ù·½Éí·Ý͵ÇÔ±£»¤·þÎñ¡£ÊÂÎñ×·ËÝÏÔʾ£¬2025Äê1Ô·¢Ã÷й¶£¬µ«ÏµÍ³ÔçÔÚ2024Äê10ÔÂÒÑÔâÈëÇÖ¡£½ñÄêÄêÍ·ConduentÔøÒòÍøÂçÇå¾²ÊÂÎñÒý·¢·þÎñÖÐÖ¹£¬SafepayÀÕË÷Èí¼þÍÅ»ï2ÔÂÏÂÑ®ÈϿɶԴËÈÏÕæ¡£4ÔÂSECÎļþ½øÒ»²½Åû¶£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨¿Í»§ÐÅÏ¢¼°¿Í»§Êý¾ÝµÄÎļþ¡£


https://www.bleepingcomputer.com/news/security/bpo-giant-conduent-confirms-data-breach-impacts-105-million-people/


6. Ribbon CommunicationsÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ


10ÔÂ30ÈÕ£¬ÃÀ¹úµçÐÅ·þÎñÌṩÉÌRibbon Communications¿ËÈÕÅû¶£¬ÆäITÍøÂçÔçÔÚ2024Äê12Ô±ãÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬µ«Ö±ÖÁ2025Äê9Ô²żì²âµ½Òì³£»á¼û¡£¸Ã¹«Ë¾ÎªÈ«Çò68¸ö·þÎñ´¦µÄ3100ÓàÃûÔ±¹¤£¬·þÎñ¹¤¾ßº­¸ÇÂåɼí¶ÊС¢µÂ¿ËÈøË¹´óѧ°Â˹͡·ÖУ¡¢ÃÀ¹ú¹ú·À²¿¼°Verizon¡¢µÂ¹úµçÐŵȵçÐÅÔËÓªÉÌ¡£Æ¾Ö¤10ÔÂ23ÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþ£¬RibbonÈ·ÈϹ¥»÷Õß×îÔçÓÚ2024Äê12Ô»ñµÃϵͳ»á¼ûȨÏÞ£¬ËäÒÑÖÕÖ¹ÍþвÐÐΪÕß»á¼û£¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£³õ³ÌÐò²éÏÔʾ£¬¹¥»÷Õß»ñÈ¡ÁË´æ´¢ÔÚÖ÷ÍøÂçÍâµÄÁ½Ì¨Ìõ¼Ç±¾µçÄÔÉϵĿͻ§Îļþ£¬µ«ÉÐδ·¢Ã÷¡°ÊµÖÊÐÔÐÅÏ¢¡±±»ÇÔÈ¡µÄÖ¤¾Ý¡£¹«Ë¾Ô¤¼Æ2025ÄêµÚËÄÐò¶È½«ÒòÊÓ²ìºÍÍøÂçÇ¿»¯±¬·¢ÌØÊâÓöÈ£¬µ«¹æÄ£ÓÐÏÞ¡£RibbonÕýÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Áª°îÖ´·¨²¿·ÖÏàÖú£¬ÒÔÈ·¶¨ÈëÇÖ¹æÄ£¼°Ç±ÔÚÓ°Ïì¡£Ö»¹ÜÏÖÔÚδ¹é×ïÓÚÌØ¶¨ÍþвÐÐΪÕߣ¬µ«ÊÂÎñÔÙ´Î͹ÏÔÒªº¦»ù´¡ÉèÊ©ÃæÁÙµÄÍøÂçÇ徲Σº¦¡£¹«Ë¾ºôÓõÓû§¼á³ÖСÐÄ£¬²¢Ç¿µ÷½«Ò»Á¬¸üÐÂÊÓ²ìÏ£Íû£¬ÒÔ°ü¹Ü¿Í»§Êý¾ÝÇå¾²¡£


https://www.bleepingcomputer.com/news/security/major-telecom-services-provider-ribbon-breached-by-state-hackers/