¹ûÕæµÄGitLab´úÂë¿âй¶ÁËÁè¼Ý17,000¸öÃÜÔ¿
Ðû²¼Ê±¼ä 2025-12-011. ¹ûÕæµÄGitLab´úÂë¿âй¶ÁËÁè¼Ý17,000¸öÃÜÔ¿
11ÔÂ28ÈÕ£¬Çå¾²¹¤³ÌʦLuke Marshallͨ¹ýϵͳÐÔɨÃèGitLab CloudµÄ560Íò¸ö¹«¹²´æ´¢¿â£¬½ÒÆÆÁË´ó¹æÄ£Ãô¸ÐÐÅϢй¶ÎÊÌâ¡£´Ë´ÎÐж¯½ÓÄÉTruffleHog¿ªÔ´¹¤¾ßÍŽáGitLab¹«¹²API¶Ëµã£¬ÅäºÏ×Ô½ç˵Python¾ç±¾ÊµÏÖ´æ´¢¿â·ÖÒ³ÅÅÐò£¬²¢Í¨¹ýAWS SQSÓëLambdaº¯Êý¼Ü¹¹ÊµÏÖ²¢ÐÐɨÃ裬×îÖÕ½öºÄʱ24Сʱ¡¢±¾Ç®770ÃÀÔª¼´ÍêÓñ³ÉÁ¿É¨Ãè¡£ÊӲ췢Ã÷£¬ÔÚ2800Óà¸ö²î±ðÓòÃûÖб£´æ17,430¸öÓÐÓûîÔ¾ÃÜÔ¿£¬ÊýÄ¿ÊÇ´ËǰBitbucketɨÃèЧ¹û£¨6212¸ö£©µÄ½üÈý±¶£¬ÇÒÃÜÔ¿ÃܶȺá¿ç35%¡£ÀúÊ·Êý¾ÝÏÔʾ£¬´ó¶¼Ð¹Â¶ÃÜÔ¿±¬·¢ÓÚ2018Äêºó£¬µ«²¿·Ö2009ÄêÆðµÄ¹ÅÀÏÃÜÔ¿ÈÔ¾ßЧÁ¦¡£°´ÀàÐÍ»®·Ö£¬Google Cloud Platformƾ֤ռ±È×î¸ß£¨³¬5200¸ö£©£¬Æä´ÎΪMongoDBÃÜÔ¿¡¢Telegram»úеÈËÁîÅÆ¼°OpenAIÃÜÔ¿£¬Áí·¢Ã÷400Óà¸öGitLab×ÔÉíÃÜԿй¶¡£Marshall×ñÕÕÈÏÕæÈÎÅû¶ÔÔò£¬Ê¹ÓÃClaude Sonnet 3.7µÄÍøÂçËÑË÷¹¦Ð§ÓëPython¾ç±¾×Ô¶¯»¯ÌìÉú֪ͨÓʼþ£¬ÀÖ³ÉÁªÏµÊÜÓ°Ïì·½²¢Íƶ¯ÃÜÔ¿×÷·Ï¡£´Ë¾Ù²»µ«»ñµÃ9000ÃÀÔªÎó²îÉͽ𣬸ü´Ùʹ´ó×Ú×éÖ¯½ôÆÈ³·»ØÃô¸Ðƾ֤¡£È»¶ø£¬ÈÔÓв¿·ÖÃÜÔ¿Ò»Á¬´¦ÓÚ̻¶״̬¡£
https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/
2. ·¨¹ú×ãÇòÍŽá»áÅûÂ¶ÍøÂç¹¥»÷ºóÊý¾Ýй¶ÊÂÎñ
11ÔÂ28ÈÕ£¬·¨¹ú×ãÇòлᣨFFF£©ÓÚÖÜÎåÅû¶һÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷Õßͨ¹ý±»µÁÕË»§²»·¨»á¼û×ãÇò¾ãÀÖ²¿ÖÎÀíÈí¼þ£¬ÔÚϵͳɨ³ýǰÀÖ³ÉÇÔÈ¡´ó×Ú»áԱСÎÒ˽¼ÒÊý¾Ý¡£¾Çå¾²ÍŶӼì²â£¬FFFÁ¬Ã¦½ûÓñ»ÈëÇÖÕË»§²¢Ç¿ÖÆÖØÖÃËùÓÐÓû§ÃÜÂ룬µ«Ð¹Â¶¹æÄ£ÒѺ¸ÇÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¼°ËùÔÚ¡¢¹ú¼®¡¢ÓÊÕþµØµã¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂëºÍ¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢¡£Æ¾Ö¤Å·ÖÞÊý¾Ý±£»¤¹æÔò£¬FFFÒÑÆô¶¯ÐÌÊÂËßËϳÌÐò£¬²¢Ïò·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍ¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©Õýʽ±¨±¸¡£¸Ã×éÖ¯ÔÊÐí½«Ö±½Óͨ¹ýµç×ÓÓʼþ֪ͨËùÓÐÊÜÓ°ÏìСÎÒ˽¼Ò£¬²¢ÌØÊâÌáÐÑ»áԱСÐÄÈκÎÒªÇóÌṩÕË»§Æ¾Ö¤¡¢ÃÜÂë»òÒøÐÐÐÅÏ¢µÄ¿ÉÒÉͨѶ£¬°üÀ¨Éù³ÆÀ´×ÔÍŽá»á¡¢¾ãÀÖ²¿»òÆäËû·¢¼þÈ˵ÄÕ©ÆÓʼþ¡£FFFÌåÏÖ½«Í¨¹ýÊÖÒÕÉý¼¶ºÍÁ÷³ÌÓÅ»¯ÌáÉý·ÀÓùÄÜÁ¦£¬Í¬Ê±ºôÓõ»áÔ±¼á³ÖСÐÄ£¬×èÖ¹µã»÷¿ÉÒɸ½¼þ»ò͸¶Ãô¸ÐÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/french-football-federation-fff-discloses-data-breach-after-cyberattack/
3. ºÚ¿ÍÐ®ÖÆÃÀ¹úÎÞÏßµç×°±¸·¢ËÍÐéα¾¯±¨
11ÔÂ28ÈÕ£¬ÃÀ¹úÁª°îͨѶίԱ»á£¨FCC£©¿ËÈÕÐû²¼½ôÆÈ֪ͨ£¬Åû¶ºÚ¿Íͨ¹ýÐ®ÖÆBarixÍøÂçÒôƵװ±¸£¬ÔÚÃÀ¹ú¶àµØ¹ã²¥ÏµÍ³Öв»·¨²¥·ÅÐéαӦ¼±¾¯±¨Òô¼°Ã°·¸ÐÔÄÚÈÝ£¬Òý·¢ÑÏÖØ¹«¹²Ç徲Σº¦¡£´Ë´Î¹¥»÷¾Û½¹µÂ¿ËÈøË¹ÖÝÓ븥¼ªÄáÑÇÖÝ£¬ºÚ¿Íͨ¹ýÖØÐÂÉèÖÃ×°±¸Ê¹ÆäÎüÊÕ¹¥»÷Õß¿ØÖƵÄÁ÷ýÌåÄÚÈÝ£¬µ¼ÖÂÕý³£½ÚÄ¿±»Ä£Ä⾯±¨Òô¡¢EAS"×¢ÖØÐźÅ"¼°Òù»àÓïÑÔÖÐÖ¹¡£¸Ã"×¢ÖØÐźÅ"±¾Ó¦½öÓÃÓÚÁú¾í·ç¡¢ì«·çµÈ½ôÆÈÍþвԤ¾¯£¬ÆäÀÄÓÃÑÏÖØÈÅÂÒ¹«¹²Ó¦¼±ÏµÍ³¡£FCCÆÊÎöÖ¸³ö£¬ÊÂÎñȪԴÔÚÓڹ㲥װ±¸Çå¾²·À»¤±¡Èõ£¬Î´ÊÚȨÓû§¿ÉÈÝÒ×ÇÖÈë´«Êä·¾¶¡£²¿·Öµç̨ÉõÖÁÔÚÌýÖÚ±¨¸æÊÕµ½¼ÐÔÓÆ«Ö´ÑÔÂÛµÄÒì³£¾¯±¨ºó£¬²Å²ì¾õ×°±¸ÔâÈëÇÖ¡£Îª×èÖ¹ÀàËÆÊÂÎñ£¬FCCÔÚ±àºÅDA 25-996µÄ֪ͨÖÐÃ÷È·ÒªÇó¹ã²¥»ú¹¹Ç¿»¯»ù´¡Çå¾²²½·¥£ºÁ¬Ã¦×°Öó§ÉÌÇå¾²²¹¶¡²¢Éý¼¶¹Ì¼þ£»½«Ä¬ÈÏÃÜÂëÌæ»»Îª¸ßÇ¿¶ÈÃÜÂë²¢°´ÆÚ¸üУ»½«EAS¼°Barix×°±¸°²ÅÅÔÚ·À»ðǽºó£¬Í¨¹ýVPNÏÞÖÆ»á¼ûȨÏÞ£»Ò»Á¬¼à¿Ø×°±¸ÈÕÖ¾ÒÔ·¢Ã÷δÊÚȨÐÐΪ£»²Î¿¼CSRIC×î¼Ñʵ¼ùÖ¸ÄÏ¡£ÕâЩ²½·¥Óë2016ÄêBarix¹«Ë¾ÉùÃ÷Æä×°±¸"׼ȷÉèÖøßÇ¿¶ÈÃÜÂë¼´Çå¾²"µÄ̬¶ÈÒ»Ö¡£
https://www.infosecurity-magazine.com/news/fcc-hackers-hijacking-radio/
4. ×ôÖÎÑÇÖÝGSCCCAÔâÀÕË÷Èí¼þ¹¥»÷ÖÂϵͳ̱»¾
11ÔÂ26ÈÕ£¬×ôÖÎÑÇÖݸߵȷ¨ÔºÊé¼ÇÔ±ÏàÖúÖÎÀí¾Ö£¨GSCCCA£©ÒòÔâÓö¿ÉÐÅÇÒÒ»Á¬µÄÍøÂçÇå¾²Íþв£¬×ÔÖÜÎåÆðÏÝÈë̱»¾×´Ì¬£¬ÆäÍøÕ¾¼°·þÎñ»á¼û±»ÔÝʱÏÞÖÆ¡£¸Ã»ú¹¹ÈÏÕæÖÎÀíÈ«ÖÝ159¸öÏØµÄÉÌÒµ±¸°¸¡¢·¿µØ²ú¼°Ð¡ÎÒ˽¼Ò¹¤Òµ¼Í¼Ë÷Òý¡¢¹«Ö¤Ô±ÖÐÑëÊý¾Ý¿â¼°Ãñʰ¸¼þ±¸°¸µÈ½¹µãÖ°ÄÜ£¬Æä̱»¾Ö±½ÓÓ°ÏìÈ«ÖÝ·¿µØ²úÉúÒâ¡¢Ö´·¨Îļþ´¦Öóͷ£¼°¹«Ö¤·þÎñ¡£GSCCCAÍøÕ¾×Ô¹¥»÷±¬·¢ºóÒ»Á¬ÏÔʾ¡°ÏµÍ³Î¬»¤¾ÙÐÐÖС±ºá·ù£¬ÖÜÒ»Íí¸üÐÂÈ·ÈÏÕýÔÚ´¦Öóͷ£ÍøÂç¹¥»÷¡£»ú¹¹ÉùÃ÷³Æ£¬ÍŶÓÕýÒ¹ÒÔ¼ÌÈÕÆÀ¹À²âÊÔϵͳ£¬È·±£»Ö¸´Ê¹ÓÃǰµÖ´ï×î¸ßÇå¾²±ê×¼¡£´Ë´Î¹¥»÷µ¼Ö¸ûú¹¹´æ´¢µÄº£Á¿Êý¾ÝÃæÁÙΣº¦£¬°üÀ¨·¿µØ²ú×óȯ¡¢µäÖʼͼ¡¢µØÍ¼Êý¾Ý¡¢ÃñÊÂÐÌʰ¸¼þµµ°¸µÈ¡£ÀÕË÷Èí¼þÍÅ»ïDevmanÒѽ«GSCCCAÌí¼ÓÖÁÆäÐ¹Â¶ÍøÕ¾£¬Éù³ÆÇÔÈ¡500GBÊý¾Ý²¢ÒªÇó11ÔÂ27ÈÕǰ֧¸¶40ÍòÃÀÔªÊê½ð¡£DevmanΪ½ñÄê4ÔÂзºÆðµÄ×éÖ¯£¬Æä³ÉÔ±´ËǰΪQilin¡¢DragonForceµÈÍÅ»ïÁ¥Êô£¬9ÔÂתÐÍΪÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©×éÖ¯¡£
https://therecord.media/georgia-court-filing-org-ransomware-warning
5. ¶ñÒâLLMÖúÍø·¸Éý¼¶£ºWormGPTÓëKawaiiGPTʵ²âÍþÄÜ
11ÔÂ27ÈÕ£¬Palo Alto Networks Unit 42Ñо¿ÍŶÓÕ¹ÏÖ£¬Î´ÊÜÏÞÖÆµÄ¶ñÒâ´óÐÍÓïÑÔÄ£×Ó£¨LLM£©ÈçWormGPT 4ºÍKawaiiGPTÕýÏÔÖøÌáÉýÍøÂç·¸·¨ÄÜÁ¦£¬Í¨¹ýÌìÉú¸ß¹¦Ð§ÐÔ¶ñÒâ´úÂë½µµÍ¹¥»÷Ãż÷¡£WormGPT 4×÷Ϊ2023Äê¡°ÖØÉú¡±ÏîÄ¿£¬ÌṩÔ·Ñ50ÃÀÔª»òÖÕÉí220ÃÀÔª¶©ÔÄ·þÎñ£¬×¨Îª·¸·¨Ô˶¯ÑµÁ·£¬¿ÉÌìÉúÀÕË÷Èí¼þ¼ÓÃܾ籾¡£¸ÃÄ£×Ó»¹Äܰ´Ö¸ÁîÌìÉú¡°¾üÓü¶¼ÓÃÜ¡±Êê½ðÐÅ£¬ÉèÖÃ72Сʱ¸¶¿îÏÞÆÚ£¬Ç¿»¯ÀÕË÷¹¥»÷ÐÄÀíÍþÉå¡£KawaiiGPTÔòΪÃâ·ÑÉçÇøÇý¶¯ÐÍLLM£¬2.5°æ±¾ÔÚLinuxϵͳÎå·ÖÖÓ¼´¿É°²ÅÅ¡£ÆäÄÜÁ¦°üÀ¨ÌìÉúº¬±ÆÕæÓòÃûÓÕÆµÄ´¹ÂÚÓʼþ¡¢Ê¹ÓÃParamiko SSH¿âʵÏÖºáÏòÒÆ¶¯µÄPython¾ç±¾£¬ÒÔ¼°Í¨¹ýsmtplib¿â´ò°üÊý¾ÝÍâйµÄ¶ñÒâ³ÌÐò¡£Ëäδֱ½ÓÌìÉú¼ÓÃÜÀý³Ì£¬µ«ÆäÏÂÁîÖ´ÐÐÄÜÁ¦Ö§³ÖȨÏÞÌáÉý¡¢Êý¾ÝÇÔÈ¡¼°ÓÐÓÃÔØºÉͶ·Å¡£¶þÕß¾ùÔÚTelegramÓµÓÐÊý°Ù³ÉԱƵµÀ£¬ÐγÉÊÖÒÕ½»Á÷ÉçÇø¡£Ñо¿Ö¤Êµ£¬ÕâЩģ×ÓÒÑ´ÓÀíÂÛÍþвת»¯ÎªÏÖʵ¹¥»÷¹¤¾ß£ºµÍÊÖÒÕ¹¥»÷Õ߿ɿìËÙÌá³«ÖØ´ó¹¥»÷£¬Èç×Ô¶¯»¯ºáÏòÒÆ¶¯¡¢¶¨ÖÆ»¯´¹ÂÚÓÕ¶ü£¬²¢Ëõ¶Ì¹¤¾ß¿ª·¢ÖÜÆÚ¡£
https://www.bleepingcomputer.com/news/security/malicious-llms-empower-inexperienced-hackers-with-advanced-tools/
6. PyPI¹©Ó¦Á´Çå¾²¾¯±¨£ºÒÅÁôPython°üÒý·¢ÓòÃû½ÓÊÜΣº¦
11ÔÂ28ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÔÚÆÊÎöÒÅÁôPython°üʱ·¢Ã÷£¬¶à¸ö×ÅÃûPyPIÈí¼þ°ü±£´æÒòÓòÃû½ÓÊܵ¼ÖµĹ©Ó¦Á´Çå¾²Îó²î¡£ReversingLabsÔÚ¹¹½¨¹¤¾ßzc.buildoutµÄÖ¸µ¼¾ç±¾Öмì²âµ½Òªº¦Îó²î£¬¸Ã¾ç±¾»á´ÓÒÑʧЧµÄ¾ÉÓòÃûpython-distribute.orgÏÂÔØDistributeÈí¼þ°ü×°ÖóÌÐò£¬¶ø¸ÃÓòÃûÏÖÔÚ´¦ÓÚ¿ª·Å×¢²á״̬£¬¿É±»¹¥»÷Õß½ÓÊܲ¢Ö²Èë¶ñÒâ´úÂë¡£ÊÜÓ°ÏìµÄPyPI°ü°üÀ¨tornado¡¢pypiserver¡¢slapos.coreµÈ£¬ÆäÖ¸µ¼¾ç±¾bootstrap.pyÔÚÌØ¶¨Ìõ¼þÏ»ᴥ·¢ÓòÃû»á¼û¡£ÎÊÌâȪԴÔÚÓÚDistribute¹¤¾ßµÄÀúÊ·ÒÅÁôÎÊÌ⣺×÷ÎªÔø¶ÌÔݱ£´æµÄSetuptools·ÖÖ§£¬DistributeÔÚ2013Äê±»ÖØÐÂÕûºÏºóÖð½¥ïÔÌ£¬µ«²¿·ÖÈí¼þ°üÈÔ±£´æÁ˾ɰæÖ¸µ¼¾ç±¾¡£ÕâЩ¾ç±¾½ÓÄÉÓ²±àÂëÓòÃûÏÂÔØ»úÖÆ£¬Óë¶ñÒâÈí¼þÏÂÔØÆ÷ÐÐΪ¸ß¶ÈÏàËÆ£¬Ðγɡ°²»ÐëÒªµÄ¹¥»÷Ãæ¡±¡£
https://thehackernews.com/2025/11/legacy-python-bootstrap-scripts-create.html


¾©¹«Íø°²±¸11010802024551ºÅ