°²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÅäÖÃÃýÎóй¶

°ä²¼¹¦·ò 2025-10-31

1. °²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÅäÖÃÃýÎóй¶


10ÔÂ29ÈÕ£¬ºÉÀ¼ÍøÂ簲ȫ¹«Ë¾Neo Security½üÈÕÅû¶£¬ÆäÊ×ϯ×êÑÐÔ±·¢ÏÖ°²ÓÀ¹ÜÕÊʦÊÂÎñËùÒ»¸ö³¬¹ý4TBµÄSQL Server±¸·ÝÎļþÒòÔÆ´æ´¢Í°ÅäÖÃÃýÎó¶³öÓÚ¹«¹²»¥ÁªÍø£¬µ¼Ö¸ùÜÕÊÓëÕ÷ѯ¾ÞÍ·µÄ»úÃÜÐÅϢй¶¡£¸Ã±¸·ÝÎļþ£¨.BAKÌåʽ£©Ô̺¬APIÃÜÔ¿¡¢»º´æÉí·ÝÑéÖ¤ÁîÅÆ¡¢»á»°ÁîÅÆ¡¢·þÎñÕË»§ÃÜÂë¼°Óû§Í´´¦µÈÃô¸ÐÐÅÏ¢£¬ÇÒδ¼ÓÃÜ¡£×êÑÐÍŶÓͨ¹ýÏÂÔØÎļþǰһǧ×Ö½ÚÑéÖ¤ÁËй¶ÊÂʵ£¬²¢Ö¸³ö´ËÀà·ì϶ԴÓÚµäÐ͵ÄÔÆ´æ´¢ÅäÖÃʧÎó£¬ÀàËÆ°¸ÀýÖУ¬¹¤³ÌʦΪ¼ò»¯Êý¾Ý¿âǨáãÁ÷³Ì£¬Ôø½«´æ´¢Í°¶ÌÔÝÉèΪ¹«¿ª£¨½öÎå·ÖÖÓ£©£¬È´Òò×Ô¶¯»¯É¨Ã蹤¾ßµÄ¼±¾ç¼ì²âµ¼ÖÂÊý¾Ý±»ÇÔÈ¡¡£Õâ´ÎÊÂÎñ¶³öÁËÏÖ´úÔÆÆ½Ì¨µÄ°²È«Òþ»¼£ºÖ»¹ÜÊý¾Ý¿âµ¼³öÓ뱸·ÝÁ÷³Ì¸ß¶È±ã½Ý£¬µ«¹¤¾ßÉè¼Æ²à³Á²Ù×÷·½±ãÐÔ¶ø·Ç°²È«·À»¤£¬Óû§ÈôÒòƴдÃýÎó»ò²Ù×÷ºöÂÔ½«´æ´¢Í°ÉèΪ¹«¿ª£¬¼«Ò×µ¼ÖÂTB¼¼ûô¸ÐÊý¾Ýй¶¡£Neo SecurityÇ¿µ÷£¬´ËÀàй¶ÍùÍùÔÚ±»·¢ÏÖǰÒÑÔâ¶ñÒâ·½»ñÈ¡£¬ÆóҵӦĬÈÏÎļþ¶³ö˲¼ä¼´ÒÑʧÇÔ¡£


https://www.theregister.com/2025/10/29/ey_exposes_4tb_sql_database/


2. PhantomRaven¹¥»÷»î¶¯Í¨¹ý¶ñÒânpm°üÇÔÈ¡¿ª·¢Í´´¦


10ÔÂ29ÈÕ£¬Koi Security×êÑÐÈËÔ±Åû¼ûûΪ¡°PhantomRaven¡±µÄ»îÔ¾¹¥»÷»î¶¯£¬¸Ã»î¶¯×Ô8ÔÂÆðÒѲ¿Êð126¸ö¶ñÒânpm°ü£¬ÏÂÔØÁ¿³¬¹ý86,000´Î£¬Ö¸±êÖ±Ö¸JavaScript¿ª·¢ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆ¡¢CI/CDÃÜÔ¿¼°GitHubÍ´´¦¡£Node.jsĬÈϰüÖÎÀíÆ÷NPM×÷ΪȫÇò¿ª·¢Õß¹²Ïí´úÂëµÄÖ÷ÌâÆ½Ì¨£¬³ÉΪÕâ´Î¹¥»÷µÄÖØÒªÔØÌå¡£¹¥»÷ÕßÀûÓá°ÓòÃûÇÀ×¢¡±Õ½Êõ£¬Í¨¹ýAIÌìÉú¿´ËƺϷ¨µ«ÏÖʵ²»´æÔÚµÄÈí¼þ°üÃû³Æ£¨Èç·ÂÕÕGitLab»òApache¹¤¾ßµÄ°üÃû£©£¬ÓÕʹ¿ª·¢ÕßÔÚÒÀÀµLLMÍÆ¼öʱÎóÓá£ÕâЩ¶ñÒâ°üѡȡԶ³Ì¶¯Ì¬ÒÀÀµÏRDD£©ÏµÍ³£¬ËäÉêÃ÷ÎÞÒÀÀµÏµ«×°ÖÃʱ»á×Ô¶¯´Ó±í²¿URL»ñÈ¡ÓÐÐ§ÔØºÉ²¢Ö´ÐУ¬ÎÞÐèÓû§½»»¥¡£¸Ã»úÔìʹ¶ñÒâ´úÂëÔÚ¡°npm install¡±¹ý³ÌÖÐÇÄÈ»ÔËÐУ¬¶ÔÊÜϰȾÉ豸½øÐл·¾³·ÖÎö£¬ËÑË÷µç×ÓÓʼþµØÖ·¼°»·¾³±äÁ¿£¬³ÁµãÇÔÈ¡NPM¡¢GitHub Actions¡¢GitLab¡¢JenkinsºÍCircleCIµÄÁîÅÆ£¬ÎªºóÐø¹©¸øÁ´¹¥»÷£¨ÈçÏòÆäËûÏîĿֲÈë¶ñÒâ´úÂ룩ÆÌ·¡£¹¥»÷ÕßѡȡÈýÖÖÊý¾Ýй¶·½Ê½£ºURL±àÂëÊý¾ÝµÄHTTP GETÒªÇó¡¢JSONÊý¾ÝµÄHTTP POSTÒªÇó¼°WebSocketÏνÓ£¬È·±£ÇÔÊØÐÅÏ¢¸ßЧ±í´«¡£


https://www.bleepingcomputer.com/news/security/phantomraven-attack-floods-npm-with-credential-stealing-packages/


3. Reputation.comй¶1.2ÒÚÌõÃô¸ÐÊý¾Ý


10ÔÂ29ÈÕ£¬½üÈÕ£¬Cybernews×êÑÐÍŶӷ¢ÏÖ³ÛÃûÔÚÏßÃûÓþÖÎÀí¹«Ë¾Reputation.comÒò·þÎñÆ÷δǿÔìÖ´ÐÐÉí·ÝÑéÖ¤ºÍ½Ó¼û½ÚÔ죬µ¼Ö³¬¹ý320GB¡¢½ü1.2ÒÚÌõÔ̺¬ºó¶ËϵͳÊý¾ÝµÄ¼Í¼й¶£¬Éæ¼°»á»°cookie¡¢Î¨Ò»±êʶ·û£¨Èçcompany_uid¡¢session_id£©¡¢¹¦·ò´Á¼°ÊÂÎñÈÕÖ¾µÈÃô¸ÐÐÅÏ¢¡£ÕâЩÊý¾ÝÔ´×ÔÆäÊý¾Ý¿ÉÊÓ»¯ÓëË÷Ç󹤾ߵĿɹ«¿ª½Ó¼ûÊ·ý£¬¼Í¼ÁË´´½¨¡¢¶ÁÈ¡¡¢¸üС¢É¾³ýµÈͨÀýÀûÓû£¬¸²¸ÇÊý°Ù¼Ò²Æ¸»500Ç¿ÆóÒµ¼°ÖØÒªÆ·ÅÆ£¬Ô̺¬ÃÀ¹úÒøÐÓ×¢¸£ÌØ¡¢Í¨ÓÃÆû³µ¡¢±¦Âí¾­ÏúÉ̵È¡£Ð¹Â¶µÄcookie×Ö·û´®¿ÉÄܱ»ÓÃÓÚµÁÓÿͻ§É罻ýÌåÕË»§£¨ÈçFacebook¡¢Instagram¡¢LinkedInµÈƽ̨¼¯³É¹¦ÄÜ£©£¬¹¥»÷Õ߿ɰ䲼Óк¦ÄÚÈÝ¡¢°Ñ³ÖÉ̼ÒÐÅÏ¢¡¢ÇÖÈÅÓªÏú´òË㣬ÉõÖÁ´Û¸Ä¶àÇþ·ͨѶ£¨Èç¿Í»§µ÷²é»Ø¸´¡¢¹«¹Ø»î¶¯Ëزģ©£¬¶ÔÆ·ÅÆÃûÓþºÍÔËÓªÔì³É³Á´óÇÖº¦¡£ÀýÈ磬ͨ¹ýÀÄÓÃÉç½»Ì×¼þÖ°ÄÜ£¬ºÚ¿Í¿ÉÊ©ÐÓ×°ÐéαÌû×Ó¡±¡¢¶ñÒâ²¼¸æ»ò°Ñ³ÖÐÅÀµÐźÅ£¬Ö±½Ó³å»÷ÆóÒµ¹«ÐÅÁ¦¡£


https://cybernews.com/security/reputation-com-leak-exposes-sensitive-data/


4. º«¹úµçОÞÍ·LG Uplus֤ʵÊý¾Ýй¶


10ÔÂ29ÈÕ£¬½üÈÕ£¬º«¹úµçОÞÍ·LG Uplus֤ʵÒÉËÆ²úÉúÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°Ô¼4.2ÍòÃû¿Í»§¼°167ÃûÔ±¹¤Ó×ÎÒÊý¾Ý£¬º«¹ú»¥ÁªÍø°²È«ÕñÐËÔº£¨KISA£©Òѽӻñ֪ͨ¡£¸Ã¹«Ë¾ËäÌá½»»ã±¨£¬µ«Î´°ä²¼ÄÚ²¿µ÷²éÁ˾ֹ¦·ò±í¡£ÊÂÎñÔ´ÓÚ°×ñºÚ¿Í7Ô³õ´ÎÖÒ¸æµÄϵͳ·ì϶£¬¶øLG UplusÔÚ8ÔÂÔøÏò¿Æ¼¼²¿°µÊ¾Î´·¢ÏÖÈ·Ôä¹¥»÷Ö¤¾Ý£¬ºóÒòÅú¸ÄÕË»§ÖÎÀíϵͳ·þÎñÆ÷±»Åú¿ÉÄÜÏú»Ù¹Ø¼üÖ¤¾Ý£¬Òý·¢¼à¹ÜÓ빫¼Ò¶ÔÖ¤¾Ý±£ÁôµÄÖÊÒÉ¡£Õâ´ÎÊÂÎñ¼Ó¾çÁ˺«¹úµçÐÅÐÐÒµÍøÂç¹¥»÷º£³±¡£´Ëǰ£¬SK TelecomÔâ¡°÷è÷롱ÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬ÇÔȡԼ1TBÎļþ£¬µ¼Ö¹«Ë¾±»ÆÈÃâ·Ñ¸ü»»ËùÓпͻ§SIM¿¨²¢ÔÝÍ£ÐÂÓû§×¢²á£¬Ê×ϯִÐйٹ«¿ªÂ·Ç¸¡£Í¬ÆÚ£¬KT Telecom»ã±¨ÍøÂç¹¥»÷Ôì³É³¬2.4ÒÚº«ÔªËðʧ¼°368ÃûÊܺ¦Õß¡£10Ô£¬CoinbaseCartelÍÅ»ïÍþвй¶SK Telecom»úÃÜÔ´´úÂ룬Èô²»½»É潫¹«¿ªÊý¾Ý£¬½øÒ»²½Í¹ÏÔ¹©¸øÁ´°²È«·çÏÕ¡£


https://cybernews.com/security/lg-uplus-data-breach-south-korea/


5. ConduentÊý¾Ýй¶ÊÂÎñ²¨¼°³¬Ç§ÍòÈË


10ÔÂ30ÈÕ£¬ÃÀ¹úÒµÎñÁ÷³Ì±í°ü¾ÞÍ·ConduentÈ·ÈÏ£¬2024Äê10ÔÂ21ÈÕ²úÉúµÄϵͳÐÔÈëÇÖµ¼Ö´ó¹æÄ£Êý¾Ýй¶£¬Ó°ÏìÈËÊý³¬1050Íò£¬Éæ¼°ÃÀ¹ú¶àÖݾÓÃñ¡£¸Ã¹«Ë¾2017Äê´ÓÊ©ÀÖ·Ö²ð£¬ÔÚ22¹úÕ¼ÓÐ5.6ÍòÃûÔ±¹¤£¬ÄêÊÕÈë34ÒÚÃÀÔª£¬Îªµ±¾ÐİÆóÒµÌṩÊý×Ö»¯·þÎñƽ̨¡£¾ÝÏò˾·¨²¿Ìá½»µÄ֪ͨ¼°¸÷ÖÝ×ܼì²ì³¤Åû¶Êý¾Ý£¬¶íÀÕ¸ÔÖÝÊÜÓ°Ïì×îÑϳÁ£¬´ï1050ÍòÈË£»µÂ¿ËÈøË¹ÖÝ400Íò¡¢»ªÊ¢¶ÙÖÝ7.6Íò¡¢ÃåÒòÖÝÊý°ÙÈË£¬ÏÖʵӰÏìÁìÓòÒòδ¹«¿ªÊý¾ÝµÄÖÝ¿ÉÄܸü´ó¡£Ð¹Â¶ÄÚÈÝÔ̺¬Ãô¸ÐÓ×ÎÒÐÅÏ¢£ºÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢ÆëÈ«µ®ÉúÈÕÆÚ¡¢½¡È«±£ÏÕµ¥ºÅ¡¢Éí·ÝÖ¤ºÅ¼°Ò½ÁƼͼ¡£ConduentÉêÃ÷½ØÖÁ2025Äê10ÔÂ24ÈÕδ·¢ÏÖÊý¾ÝÀÄÓÃÖ¤¾Ý£¬µ«½¨ÒéÊÜÓ°ÏìÕß×Ô¶¯»ñÊØÐÅÓþ»ã±¨¡¢ÉèÖÃڲƭ¾¯±¨¼°ÕË»§¶³½á£¬Ö»¹Ü¹«Ë¾Î´Ìṩ¹Ù·½Éí·Ý͵ÇÔ±£»¤·þÎñ¡£ÊÂÎñ×·ÒäÏÔʾ£¬2025Äê1Ô·¢ÏÖй¶£¬µ«ÏµÍ³ÔçÔÚ2024Äê10ÔÂÒÑÔâÈëÇÖ¡£½ñÄêËêÊ×ConduentÔøÒòÍøÂ簲ȫÊÂÎñÒý·¢·þÎñÖжÏ£¬SafepayÀÕË÷Èí¼þÍÅ»ï2ÔÂÏÂÑ®ÈϿɶԴËÕÆ¹Ü¡£4ÔÂSECÎļþ½øÒ»²½Åû¶£¬¹¥»÷ÕßÇÔÈ¡ÁËÔ̺¬¿Í»§ÐÅÏ¢¼°¿Í»§Êý¾ÝµÄÎļþ¡£


https://www.bleepingcomputer.com/news/security/bpo-giant-conduent-confirms-data-breach-impacts-105-million-people/


6. Ribbon CommunicationsÔâ¹ú¶È¼¶ºÚ¿ÍÈëÇÖ


10ÔÂ30ÈÕ£¬ÃÀ¹úµçÕÛ·þÎñÌṩÉÌRibbon Communications½üÈÕÅû¶£¬ÆäITÍøÂçÔçÔÚ2024Äê12Ô±ãÔâ¹ú¶È¼¶ºÚ¿ÍÈëÇÖ£¬µ«Ö±ÖÁ2025Äê9Ô²żì²âµ½Òì³£½Ó¼û¡£¸Ã¹«Ë¾ÎªÈ«Çò68¸ö´¦Ê´¦µÄ3100ÓàÃûÔ±¹¤£¬·þÎñ¶ÔÏóº­¸ÇÂåɼí¶ÊÓ×¢µÂ¿ËÈøË¹´óѧ°Â˹͡·ÖУ¡¢ÃÀ¹ú¹ú·À²¿¼°Verizon¡¢µÂ¹úµçÐŵȵçÐÅÔËÓªÉÌ¡£Æ¾¾Ý10ÔÂ23ÈÕÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄÎļþ£¬RibbonÈ·ÈϹ¥»÷Õß×îÔçÓÚ2024Äê12Ô»ñµÃϵͳ½Ó¼ûȨÏÞ£¬ËäÒÑÖÕÖ¹ÍþвÐÐΪÕß½Ó¼û£¬µ«µ÷²éÈÔÔÚ½øÐÐÖС£³õ´ëÊ©²éÏÔʾ£¬¹¥»÷Õß»ñÈ¡ÁË´æ´¢ÔÚÖ÷ÍøÂç±íµÄÁ½Ì¨±Ê¼Ç±¾µçÄÔÉϵĿͻ§Îļþ£¬µ«ÉÐδ·¢ÏÖ¡°ÄÚÈÝÐÔÐÅÏ¢¡±±»ÇÔÈ¡µÄÖ¤¾Ý¡£¹«Ë¾Ô¤¼Æ2025ÄêµÚËÄʱ¶È½«Òòµ÷²éºÍÍøÂçÇ¿»¯²úÉú¶î±íÓöÈ£¬µ«¹æÄ£ÓÐÏÞ¡£RibbonÕýÓëµÚÈý·½ÍøÂ簲ȫר¼Ò¼°Áª¹ú·¨Âɲ¿ÃźÏ×÷£¬ÒÔÈ·¶¨ÈëÇÖÁìÓò¼°Ç±ÔÚÓ°Ïì¡£Ö»¹ÜĿǰδ¹é×ïÓÚÌØ¶¨ÍþвÐÐΪÕߣ¬µ«ÊÂÎñÔÙ´Î͹ÏԹؼü»ù´¡ÉèÊ©Ãæ¶ÔµÄÍøÂ簲ȫ·çÏÕ¡£¹«Ë¾ºôÓõÓû§Î¬³Ö¾¯Ì裬²¢Ç¿µ÷½«³ÖÐø¸üе÷²é½øÕ¹£¬ÒÔ±£ÏÕ¿Í»§Êý¾Ý°²È«¡£


https://www.bleepingcomputer.com/news/security/major-telecom-services-provider-ribbon-breached-by-state-hackers/