¹«¿ªµÄGitLab´úÂë¿âй¶Á˳¬¹ý17,000¸öÃÜÔ¿
°ä²¼¹¦·ò 2025-12-011. ¹«¿ªµÄGitLab´úÂë¿âй¶Á˳¬¹ý17,000¸öÃÜÔ¿
11ÔÂ28ÈÕ£¬°²È«¹¤³ÌʦLuke Marshallͨ¹ýϵͳÐÔɨÃèGitLab CloudµÄ560Íò¸ö¹«¹²´æ´¢¿â£¬¸æ·¢ÁË´ó¹æÄ£Ãô¸ÐÐÅϢй¶ÎÊÌâ¡£Õâ´ÎÐж¯Ñ¡È¡TruffleHog¿ªÔ´¹¤¾ß½áºÏGitLab¹«¹²API¶Ëµã£¬¹²Í¬×Ô½ç˵Python¾ç±¾ÊµÏÖ´æ´¢¿â·ÖÒ³ÅÅÐò£¬²¢Í¨¹ýAWS SQSÓëLambdaº¯Êý¼Ü¹¹ÊµÏÖ²¢ÐÐɨÃ裬×îÖÕ½öºÄʱ24Ó×ʱ¡¢³É±¾770ÃÀÔª¼´ÍêÓñ³ÉÁ¿É¨Ãè¡£µ÷²é·¢ÏÖ£¬ÔÚ2800Óà¸ö·ÖÆçÓòÃûÖдæÔÚ17,430¸öÓÐЧ»îÔ¾ÃÜÔ¿£¬ÊýÁ¿ÊÇ´ËǰBitbucketɨÃèÁ˾֣¨6212¸ö£©µÄ½üÈý±¶£¬ÇÒÃÜÔ¿ÃܶÈÓâÔ½35%¡£º¹ÇàÊý¾ÝÏÔʾ£¬ÎÞÊýй¼ûÜÔ¿²úÉúÓÚ2018Äêºó£¬µ«²¿ÃÅ2009ÄêÆðµÄ¹ÅÀÏÃÜÔ¿ÈÔ¾ßЧÁ¦¡£°´ÀàÐÍ»®·Ö£¬Google Cloud Platformƾ֤ռ±È×î¸ß£¨³¬5200¸ö£©£¬Æä´ÎΪMongoDBÃÜÔ¿¡¢Telegram»úеÈËÁîÅÆ¼°OpenAIÃÜÔ¿£¬Áí·¢ÏÖ400Óà¸öGitLab×ÔÉíÃÜԿй¶¡£Marshall×ñÑÕÆ¹ÜÈÎÅû¶׼Ôò£¬ÀûÓÃClaude Sonnet 3.7µÄÍøÂçËÑË÷Ö°ÄÜÓëPython¾ç±¾×Ô¶¯»¯ÌìÉú֪ͨÓʼþ£¬³É¹¦ÁªÏµÊÜÓ°Ïì·½²¢Íƶ¯ÃÜÔ¿³·Ïú¡£´Ë¾Ù²»½ö»ñµÃ9000ÃÀÔª·ì϶Éͽ𣬸ü´Ùʹ´óÁ¿×éÖ¯´¹Î£³·»ØÃô¸Ðƾ֤¡£È»¶ø£¬ÈÔÓв¿ÃÅÃÜÔ¿³ÖÐø´¦ÓÚ¶³ö״̬¡£
https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/
2. ·¨¹ú×ãÇò½áºÏ»áÅûÂ¶ÍøÂç¹¥»÷ºóÊý¾Ýй¶ÊÂÎñ
11ÔÂ28ÈÕ£¬·¨¹ú×ãÇòлᣨFFF£©ÓÚÖÜÎåÅû¶һ·ÑϳÁÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷Õßͨ¹ý±»µÁÕË»§·¸·¨½Ó¼û×ãÇò¾ãÀÖ²¿ÖÎÀíÈí¼þ£¬ÔÚϵͳ¶Ï¸ùǰ³É¹¦ÇÔÈ¡´óÁ¿»áÔ±Ó×ÎÒÊý¾Ý¡£¾°²È«ÍŶӼì²â£¬FFFµ±¼´½ûÓñ»ÈëÇÖÕË»§²¢Ç¿Ôì³ÁÖÃËùÓÐЧ»§ÃÜÂ룬µ«Ð¹Â¶ÁìÓòÒѺ¸ÇÐÕÃû¡¢ÐԱ𡢵®ÉúÈÕÆÚ¼°µØÖ·¡¢¹ú¼®¡¢ÓÊÕþµØÖ·¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂëºÍ¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢¡£Æ¾¾ÝÅ·ÖÞÊý¾Ý±£»¤ÂÉÀý£¬FFFÒÑÆô¶¯ÐÌÊÂËßËÏ·¨Ê½£¬²¢Ïò·¨¹ú¹ú¶ÈÍøÂ簲ȫ¾Ö£¨ANSSI£©ºÍ¹ú¶ÈÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©Õýʽ±¨±¸¡£¸Ã×éÖ¯³Ðŵ½«Ö±½Óͨ¹ýµç×ÓÓʼþ֪ͨËùÓÐÊÜÓ°ÏìÓ×ÎÒ£¬²¢³ö¸ñÌáÐÑ»áÔ±¾¯ÌèÈκÎÒªÇóÌṩÕË»§Æ¾Ö¤¡¢ÃÜÂë»òÒøÐÐÐÅÏ¢µÄ¿ÉÒÉͨѶ£¬Ô̺¬Ðû³ÆÀ´×Ô½áºÏ»á¡¢¾ãÀÖ²¿»òÆäËû·¢¼þÈ˵ÄÚ¿ÆÓʼþ¡£FFF°µÊ¾½«Í¨¹ý¼¼ÊõÉý¼¶ºÍÁ÷³ÌÓÅ»¯ÌáÉý·ÀÓùÄÜÁ¦£¬Í¬Ê±ºôÓõ»áԱά³Ö¾¯Ì裬Ԥ·Àµã»÷¿ÉÒɸ½¼þ»òй©Ãô¸ÐÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/french-football-federation-fff-discloses-data-breach-after-cyberattack/
3. ºÚ¿Í½Ù³ÖÃÀ¹úÎÞÏßµçÉ豸·¢ËÍÐéα¾¯±¨
11ÔÂ28ÈÕ£¬ÃÀ¹úÁª¹úͨѶίԱ»á£¨FCC£©½üÈÕ°ä²¼´¹Î£Í¨Öª£¬Åû¶ºÚ¿Íͨ¹ý½Ù³ÖBarixÍøÂçÒôƵÉ豸£¬ÔÚÃÀ¹ú¶àµØ¹ã²¥ÏµÍ³Öз¸·¨²¥·ÅÐéαӦ¼±¾¯±¨Òô¼°³å·¸ÐÔÄÚÈÝ£¬Òý·¢ÑϳÁ¹«¹²°²È«·çÏÕ¡£Õâ´Î¹¥»÷¾Û½¹µÂ¿ËÈøË¹ÖÝÓ븥¼ªÄáÑÇÖÝ£¬ºÚ¿Íͨ¹ý³ÁÐÂÅäÖÃÉ豸ʹÆä½Ó¹Ü¹¥»÷Õß½ÚÔìµÄÁ÷ýÌåÄÚÈÝ£¬µ¼ÖÂÕý³£½ÚÄ¿±»·ÂÕÕ¾¯±¨Òô¡¢EAS"°ÑÎÈÐźÅ"¼°Òù»à˵»°Öжϡ£¸Ã"°ÑÎÈÐźÅ"±¾Ó¦½öÓÃÓÚÁú¾í·ç¡¢ì«·çµÈ´¹Î£ÍþвԤ¾¯£¬ÆäÀÄÓÃÑϳÁÇÖÈŹ«¹²Ó¦¼±ÏµÍ³¡£FCC·ÖÎöÖ¸³ö£¬ÊÂÎñ±¾ÔÔÚÓڹ㲥É豸°²È«·À»¤ÓÄ΢£¬Î´ÊÚȨÓû§¿ÉµÈÏÐÇÖÈë´«Êäõè¾¶¡£²¿Ãŵç̨ÉõÖÁÔÚÌý¶à»ã±¨ÊÕµ½Í¬»¯Æ«Ö´ÓßÂÛµÄÒì³£¾¯±¨ºó£¬²Å¾õ²ìÉ豸ÔâÈëÇÖ¡£Îª¶ôÔìÀàËÆÊÂÎñ£¬FCCÔÚ±àºÅDA 25-996µÄ֪ͨÖÐÃ÷È·ÒªÇó¹ã²¥»ú¹¹Ç¿»¯»ù´¡°²È«´ëÊ©£ºµ±¼´×°Öó§Ḛ́²È«²¹¶¡²¢Éý¼¶¹Ì¼þ£»½«Ä¬ÈÏÃÜÂë´úÌæÎª¸ßÇ¿¶ÈÃÜÂë²¢¶¨ÆÚ¸üУ»½«EAS¼°BarixÉ豸²¿ÊðÔÚ·À»ðǽºó£¬Í¨¹ýVPNÏ޶ȽӼûȨÏÞ£»³ÖÐø¼à¿ØÉ豸ÈÕÖ¾ÒÔ·¢ÏÖδÊÚȨÐÐΪ£»²Î¿¼CSRIC×î¼Ñʵ¼ÊÖ¸ÄÏ¡£ÕâЩ´ëÊ©Óë2016ÄêBarix¹«Ë¾ÉêÃ÷ÆäÉ豸"ÕýÈ·ÅäÖøßÇ¿¶ÈÃÜÂë¼´°²È«"µÄ̬¶ÈÒ»Ö¡£
https://www.infosecurity-magazine.com/news/fcc-hackers-hijacking-radio/
4. ×ôÖÎÑÇÖÝGSCCCAÔâÀÕË÷Èí¼þ¹¥»÷ÖÂϵͳ̱»¾
11ÔÂ26ÈÕ£¬×ôÖÎÑÇÖݸߵµ·¨ÔºÊé¼ÇÔ±ºÏ×÷ÖÎÀí¾Ö£¨GSCCCA£©ÒòÔâ·ê¿ÉÐÅÇÒ³ÖÐøµÄÍøÂ簲ȫÍþв£¬×ÔÖÜÎåÆðÏÝÈë̱»¾×´Ì¬£¬ÆäÍøÕ¾¼°·þÎñ½Ó¼û±»Ò»Ê±ÏÞ¶È¡£¸Ã»ú¹¹ÕƹÜÖÎÀíÈ«ÖÝ159¸öÏØµÄóÒ׵Ǽǡ¢·¿µØ²ú¼°Ó×ÎҲƸ»¼Í¼Ë÷Òý¡¢¹«Ö¤Ô±ÖÐÑëÊý¾Ý¿â¼°Ãñʰ¸¼þµÇ¼ÇµÈÖ÷ÌâÖ°ÄÜ£¬Æä̱»¾Ö±½ÓÓ°ÏìÈ«ÖÝ·¿µØ²úÂòÂô¡¢Ë¾·¨Îļþ´¦Öü°¹«Ö¤·þÎñ¡£GSCCCAÍøÕ¾×Ô¹¥»÷²úÉúºó³ÖÐøÏÔʾ¡°ÏµÍ³ÊØ»¤½øÐÐÖÓ×±ºá·ù£¬ÖÜÒ»Íí¸üÐÂÈ·ÈÏÔÚ´¦ÖÃÍøÂç¹¥»÷¡£»ú¹¹ÉêÃ÷³Æ£¬ÍŶÓÕý×Î×β»¾ëÆÀ¹À²âÊÔϵͳ£¬È·±£¸´ÔʹÓÃǰ´ïµ½×î¸ß°²È«³ß¶È¡£Õâ´Î¹¥»÷µ¼Ö¸ûú¹¹´æ´¢µÄº£Á¿Êý¾ÝÃæ¶Ô·çÏÕ£¬Ô̺¬·¿µØ²ú×óȯ¡¢µÖѺ¼Í¼¡¢µØÍ¼Êý¾Ý¡¢ÃñÊÂÐÌʰ¸¼þµµ°¸µÈ¡£ÀÕË÷Èí¼þÍÅ»ïDevmanÒѽ«GSCCCAÔö³¤ÖÁÆäÐ¹Â¶ÍøÕ¾£¬Ðû³ÆÇÔÈ¡500GBÊý¾Ý²¢ÒªÇó11ÔÂ27ÈÕǰ֧¸¶40ÍòÃÀÔªÊê½ð¡£DevmanΪ½ñÄê4ÔÂгöÏÖµÄ×éÖ¯£¬Æä³ÉÔ±´ËǰΪQilin¡¢DragonForceµÈÍÅ»ï´ÓÊô£¬9ÔÂתÐÍΪÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©×éÖ¯¡£
https://therecord.media/georgia-court-filing-org-ransomware-warning
5. ¶ñÒâLLMÖúÍø·¸Éý¼¶£ºWormGPTÓëKawaiiGPTʵ²âÍþÄÜ
11ÔÂ27ÈÕ£¬Palo Alto Networks Unit 42×êÑÐÍŶӽÒʾ£¬Î´ÊÜÏ޶ȵĶñÒâ´óÐÍ˵»°Ä£ÐÍ£¨LLM£©ÈçWormGPT 4ºÍKawaiiGPTÕýÏÔÖøÌáÉýÍøÂç·¸×ïÄÜÁ¦£¬Í¨¹ýÌìÉú¸ßÖ°ÄÜÐÔ¶ñÒâ´úÂë½µµÍ¹¥»÷Ãż÷¡£WormGPT 4×÷Ϊ2023Äê¡°³ÁÉú¡±ÏîÄ¿£¬ÌṩÔ·Ñ50ÃÀÔª»òƽÉú220ÃÀÔª¶©ÔÄ·þÎñ£¬×¨Îª·¸×ï»î¶¯ÑµÁ·£¬¿ÉÌìÉúÀÕË÷Èí¼þ¼ÓÃܾ籾¡£¸ÃÄ£ÐÍ»¹Äܰ´Ö¸ÁîÌìÉú¡°¾üÓü¶¼ÓÃÜ¡±Êê½ðÐÅ£¬ÉèÖÃ72Ó×ʱ¸¶¿îÆÚÏÞ£¬Ç¿»¯ÀÕË÷¹¥»÷ÉúÀíÍþÉå¡£KawaiiGPTÔòΪÃâ·ÑÉçÇøÇý¶¯ÐÍLLM£¬2.5°æ±¾ÔÚLinuxϵͳÎå·ÖÖÓ¼´¿É²¿Êð¡£ÆäÄÜÁ¦Ô̺¬ÌìÉúº¬ÕæÇÐÓòÃûºý۵Ĵ¹µöÓʼþ¡¢ÀûÓÃParamiko SSH¿âʵÏÖºáÏòÒÆ¶¯µÄPython¾ç±¾£¬ÒÔ¼°Í¨¹ýsmtplib¿â´ò°üÊý¾Ý±íйµÄ¶ñÒⷨʽ¡£Ëäδֱ½ÓÌìÉú¼ÓÃÜÀý³Ì£¬µ«ÆäºÅÁîÖ´ÐÐÄÜÁ¦Ö§³ÖȨÏÞÌáÉý¡¢Êý¾ÝÇÔÈ¡¼°ÓÐÐ§ÔØºÉͶ·Å¡£¶þÕß¾ùÔÚTelegramÓµº±¼û°Ù³ÉԱƵ·£¬Ðγɼ¼Êõ»¥»»ÉçÇø¡£×êÑÐ֤ʵ£¬ÕâЩģÐÍÒÑ´ÓÀíÂÛÍþвת»¯ÎªÏÖʵ¹¥»÷¹¤¾ß£ºµÍ¼¼Êõ¹¥»÷Õ߿ɼ±¾çÌáÒ鸴ÔÓ¹¥»÷£¬Èç×Ô¶¯»¯ºáÏòÒÆ¶¯¡¢¶¨Ô컯´¹µöµö¶ü£¬²¢Ëõ¶Ì¹¤¾ß¿ª·¢ÖÜÆÚ¡£
https://www.bleepingcomputer.com/news/security/malicious-llms-empower-inexperienced-hackers-with-advanced-tools/
6. PyPI¹©¸øÁ´°²È«¾¯±¨£ºÒÅÁôPython°üÒý·¢ÓòÃûÊÕÊÜ·çÏÕ
11ÔÂ28ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±ÔÚ·ÖÎöÒÅÁôPython°üʱ·¢ÏÖ£¬¶à¸ö³ÛÃûPyPIÈí¼þ°ü´æÔÚÒòÓòÃûÊÕÊܵ¼ÖµĹ©¸øÁ´°²È«·ì϶¡£ReversingLabsÔÚ¹¹½¨¹¤¾ßzc.buildoutµÄÊèµ¼¾ç±¾Öмì²âµ½¹Ø¼ü·ì϶£¬¸Ã¾ç±¾»á´ÓÒÑʧЧµÄ¾ÉÓòÃûpython-distribute.orgÏÂÔØDistributeÈí¼þ°ü×°Ö÷¨Ê½£¬¶ø¸ÃÓòÃûĿǰ´¦ÓÚÊ¢¿ª×¢²á״̬£¬¿É±»¹¥»÷ÕßÊÕÊܲ¢Ö²Èë¶ñÒâ´úÂë¡£ÊÜÓ°ÏìµÄPyPI°üÔ̺¬tornado¡¢pypiserver¡¢slapos.coreµÈ£¬ÆäÊèµ¼¾ç±¾bootstrap.pyÔÚÌØ¶¨Ç°ÌáÏ»ᴥ·¢ÓòÃû½Ó¼û¡£ÎÊÌâ±¾ÔÔÚÓÚDistribute¹¤¾ßµÄº¹ÇàÒÅÁôÎÊÌ⣺×÷ÎªÔø¶ÌÔÝ´æÔÚµÄSetuptools·ÖÖ§£¬DistributeÔÚ2013Äê±»³ÁÐÂÕûºÏºóÖ𲽲üõ£¬µ«²¿ÃÅÈí¼þ°üÈÔ±£ÁôÁ˾ɰæÊèµ¼¾ç±¾¡£ÕâЩ¾ç±¾Ñ¡È¡Ó²±àÂëÓòÃûÏÂÔØ»úÔ죬Óë¶ñÒâÈí¼þÏÂÔØÆ÷ÐÐΪ¸ß¶ÈÀàËÆ£¬Ðγɡ°²»ÓÃÒªµÄ¹¥»÷Ãæ¡±¡£
https://thehackernews.com/2025/11/legacy-python-bootstrap-scripts-create.html


¾©¹«Íø°²±¸11010802024551ºÅ