°²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶
Ðû²¼Ê±¼ä 2025-10-311. °²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶
10ÔÂ29ÈÕ£¬£¬£¬ºÉÀ¼ÍøÂçÇå¾²¹«Ë¾Neo Security¿ËÈÕÅû¶£¬£¬£¬ÆäÊ×ϯÑо¿Ô±·¢Ã÷°²ÓÀ»á¼ÆÊ¦ÊÂÎñËùÒ»¸öÁè¼Ý4TBµÄSQL Server±¸·ÝÎļþÒòÔÆ´æ´¢Í°ÉèÖùýʧ̻¶ÓÚ¹«¹²»¥ÁªÍø£¬£¬£¬µ¼ÖÂ¸Ã»á¼ÆÓë×Éѯ¾ÞÍ·µÄÉñÃØÐÅϢй¶¡£¡£¡£¡£¡£¸Ã±¸·ÝÎļþ£¨.BAKÃûÌã©°üÀ¨APIÃÜÔ¿¡¢»ºÁ¢×ã·ÝÑéÖ¤ÁîÅÆ¡¢»á»°ÁîÅÆ¡¢Ð§ÀÍÕË»§ÃÜÂë¼°Óû§Æ¾Ö¤µÈÃô¸ÐÐÅÏ¢£¬£¬£¬ÇÒδ¼ÓÃÜ¡£¡£¡£¡£¡£Ñо¿ÍŶÓͨ¹ýÏÂÔØÎļþǰһǧ×Ö½ÚÑéÖ¤ÁËй¶ÊÂʵ£¬£¬£¬²¢Ö¸³ö´ËÀàÎó²îÔ´Óڵ䷶µÄÔÆ´æ´¢ÉèÖÃʧÎ󣬣¬£¬ÀàËÆ°¸ÀýÖУ¬£¬£¬¹¤³ÌʦΪ¼ò»¯Êý¾Ý¿âǨáãÁ÷³Ì£¬£¬£¬Ôø½«´æ´¢Í°¶ÌÔÝÉèΪ¹ûÕæ£¨½öÎå·ÖÖÓ£©£¬£¬£¬È´Òò×Ô¶¯»¯É¨Ã蹤¾ßµÄ¿ìËÙ¼ì²âµ¼ÖÂÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÁËÏÖ´úÔÆÆ½Ì¨µÄÇå¾²Òþ»¼£ºÖ»¹ÜÊý¾Ý¿âµ¼³öÓ뱸·ÝÁ÷³Ì¸ß¶È±ã½Ý£¬£¬£¬µ«¹¤¾ßÉè¼Æ×ÅÖØ²Ù×÷±ãµ±ÐÔ¶ø·ÇÇå¾²·À»¤£¬£¬£¬Óû§ÈôÒòƴд¹ýʧ»ò²Ù×÷Êèºö½«´æ´¢Í°ÉèΪ¹ûÕæ£¬£¬£¬¼«Ò×µ¼ÖÂTB¼¶Ãô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£Neo SecurityÇ¿µ÷£¬£¬£¬´ËÀàй¶ÍùÍùÔÚ±»·¢Ã÷ǰÒÑÔâ¶ñÒâ·½»ñÈ¡£¬£¬£¬ÆóҵӦĬÈÏÎļþ̻¶˲¼ä¼´ÒÑʧÔô¡£¡£¡£¡£¡£
https://www.theregister.com/2025/10/29/ey_exposes_4tb_sql_database/
2. PhantomRaven¹¥»÷»î¶¯Í¨¹ý¶ñÒânpm°üÇÔÈ¡¿ª·¢Æ¾Ö¤
10ÔÂ29ÈÕ£¬£¬£¬Koi SecurityÑо¿Ö°Ô±Åû¶ÃûΪ¡°PhantomRaven¡±µÄ»îÔ¾¹¥»÷»î¶¯£¬£¬£¬¸Ã»î¶¯×Ô8ÔÂÆðÒѰ²ÅÅ126¸ö¶ñÒânpm°ü£¬£¬£¬ÏÂÔØÁ¿Áè¼Ý86,000´Î£¬£¬£¬Ä¿µÄÖ±Ö¸JavaScript¿ª·¢ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆ¡¢CI/CDÃÜÔ¿¼°GitHubƾ֤¡£¡£¡£¡£¡£Node.jsĬÈϰü¹ÜÀíÆ÷NPM×÷ΪȫÇò¿ª·¢Õß¹²Ïí´úÂëµÄ½¹µãƽ̨£¬£¬£¬³ÉΪ´Ë´Î¹¥»÷µÄÖ÷ÒªÔØÌå¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓá°ÓòÃûÇÀ×¢¡±Õ½ÂÔ£¬£¬£¬Í¨¹ýAIÌìÉú¿´ËÆÕýµ±µ«ÏÖʵ²»±£´æµÄÈí¼þ°üÃû³Æ£¨ÈçÄ£ÄâGitLab»òApache¹¤¾ßµÄ°üÃû£©£¬£¬£¬ÓÕʹ¿ª·¢ÕßÔÚÒÀÀµLLMÍÆ¼öʱÎóÓᣡ£¡£¡£¡£ÕâЩ¶ñÒâ°ü½ÓÄÉÔ¶³Ì¶¯Ì¬ÒÀÀµÏRDD£©ÏµÍ³£¬£¬£¬ËäÉùÃ÷ÎÞÒÀÀµÏ£¬£¬µ«×°ÖÃʱ»á×Ô¶¯´ÓÍⲿURL»ñÈ¡ÓÐÓÃÔØºÉ²¢Ö´ÐУ¬£¬£¬ÎÞÐèÓû§½»»¥¡£¡£¡£¡£¡£¸Ã»úÖÆÊ¹¶ñÒâ´úÂëÔÚ¡°npm install¡±Àú³ÌÖÐÇÄÈ»ÔËÐУ¬£¬£¬¶ÔÊÜѬȾװ±¸¾ÙÐÐÇéÐÎÆÊÎö£¬£¬£¬ËÑË÷µç×ÓÓʼþµØµã¼°ÇéÐαäÁ¿£¬£¬£¬ÖصãÇÔÈ¡NPM¡¢GitHub Actions¡¢GitLab¡¢JenkinsºÍCircleCIµÄÁîÅÆ£¬£¬£¬ÎªºóÐø¹©Ó¦Á´¹¥»÷£¨ÈçÏòÆäËûÏîĿֲÈë¶ñÒâ´úÂ룩ÆÌ·¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉÈýÖÖÊý¾Ýй¶·½·¨£ºURL±àÂëÊý¾ÝµÄHTTP GETÇëÇó¡¢JSONÊý¾ÝµÄHTTP POSTÇëÇó¼°WebSocketÅþÁ¬£¬£¬£¬È·±£ÇÔÊØÐÅÏ¢¸ßЧÍâ´«¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phantomraven-attack-floods-npm-with-credential-stealing-packages/
3. Reputation.comй¶1.2ÒÚÌõÃô¸ÐÊý¾Ý
10ÔÂ29ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬CybernewsÑо¿ÍŶӷ¢Ã÷×ÅÃûÔÚÏßÉùÓþÖÎÀí¹«Ë¾Reputation.comÒòЧÀÍÆ÷Î´Ç¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤ºÍ»á¼û¿ØÖÆ£¬£¬£¬µ¼ÖÂÁè¼Ý320GB¡¢½ü1.2ÒÚÌõ°üÀ¨ºó¶ËϵͳÊý¾ÝµÄ¼Í¼й¶£¬£¬£¬Éæ¼°»á»°cookie¡¢Î¨Ò»±êʶ·û£¨Èçcompany_uid¡¢session_id£©¡¢Ê±¼ä´Á¼°ÊÂÎñÈÕÖ¾µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÔ´×ÔÆäÊý¾Ý¿ÉÊÓ»¯Óë̽Ë÷¹¤¾ßµÄ¿É¹ûÕæ»á¼ûʵÀý£¬£¬£¬¼Í¼Á˽¨Éè¡¢¶ÁÈ¡¡¢¸üС¢É¾³ýµÈͨÀýÓ¦Óû£¬£¬£¬ÁýÕÖÊý°Ù¼Ò²Æ²ú500Ç¿ÆóÒµ¼°Ö÷ÒªÆ·ÅÆ£¬£¬£¬°üÀ¨ÃÀ¹úÒøÐС¢¸£ÌØ¡¢Í¨ÓÃÆû³µ¡¢±¦Âí¾ÏúÉ̵ȡ£¡£¡£¡£¡£Ð¹Â¶µÄcookie×Ö·û´®¿ÉÄܱ»ÓÃÓÚµÁÓÿͻ§É罻ýÌåÕË»§£¨ÈçFacebook¡¢Instagram¡¢LinkedInµÈƽ̨¼¯ÀÖ³ÉÄÜ£©£¬£¬£¬¹¥»÷Õß¿ÉÐû²¼Óк¦ÄÚÈÝ¡¢Ê¹ÓÃÉ̼ÒÐÅÏ¢¡¢ÈÅÂÒÓªÏúÍýÏ룬£¬£¬ÉõÖÁ¸Ä¶¯¶àÇþµÀͨѶ£¨Èç¿Í»§ÊÓ²ì»Ø¸´¡¢¹«¹Ø»î¶¯Ëزģ©£¬£¬£¬¶ÔÆ·ÅÆÉùÓþºÍÔËÓªÔì³ÉÖØ´óË𺦡£¡£¡£¡£¡£ÀýÈ磬£¬£¬Í¨¹ýÀÄÓÃÉç½»Ì×¼þ¹¦Ð§£¬£¬£¬ºÚ¿Í¿ÉʵÑé¡°ÐéαÌû×Ó¡±¡¢¶ñÒâͨ¸æ»òʹÓÃÐÅÈÎÐźţ¬£¬£¬Ö±½Ó¹¥»÷ÆóÒµ¹«ÐÅÁ¦¡£¡£¡£¡£¡£
https://cybernews.com/security/reputation-com-leak-exposes-sensitive-data/
4. º«¹úµçОÞÍ·LG Uplus֤ʵÊý¾Ýй¶
10ÔÂ29ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬º«¹úµçОÞÍ·LG Uplus֤ʵÒÉËÆ±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬Éæ¼°Ô¼4.2ÍòÃû¿Í»§¼°167ÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬£¬º«¹ú»¥ÁªÍøÇå¾²ÕñÐËÔº£¨KISA£©Òѽӻñ֪ͨ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ËäÌá½»±¨¸æ£¬£¬£¬µ«Î´Ðû²¼ÄÚ²¿ÊÓ²ìЧ¹ûʱ¼ä±í¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ°×ñºÚ¿Í7ÔÂÊ×´ÎÖÒÑÔµÄϵͳÎó²î£¬£¬£¬¶øLG UplusÔÚ8ÔÂÔøÏò¿Æ¼¼²¿ÌåÏÖδ·¢Ã÷È·Ôä¹¥»÷Ö¤¾Ý£¬£¬£¬ºóÒòÐÞ¸ÄÕË»§ÖÎÀíϵͳЧÀÍÆ÷±»Åú¿ÉÄÜÏú»ÙÒªº¦Ö¤¾Ý£¬£¬£¬Òý·¢î¿ÏµÓ빫ÖÚ¶ÔÖ¤¾ÝÉúÑĵÄÖÊÒÉ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¼Ó¾çÁ˺«¹úµçÐÅÐÐÒµÍøÂç¹¥»÷À˳±¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬SK TelecomÔâ¡°÷è÷롱ÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬ÇÔȡԼ1TBÎļþ£¬£¬£¬µ¼Ö¹«Ë¾±»ÆÈÃâ·ÑÌæ»»ËùÓпͻ§SIM¿¨²¢ÔÝÍ£ÐÂÓû§×¢²á£¬£¬£¬Ê×ϯִÐйٹûÕæÖÂǸ¡£¡£¡£¡£¡£Í¬ÆÚ£¬£¬£¬KT Telecom±¨¸æÍøÂç¹¥»÷Ôì³É³¬2.4ÒÚº«ÔªËðʧ¼°368ÃûÊܺ¦Õß¡£¡£¡£¡£¡£10Ô£¬£¬£¬CoinbaseCartelÍÅ»ïÍþвй¶SK TelecomÉñÃØÔ´´úÂ룬£¬£¬Èô²»Ì¸Åн«¹ûÕæÊý¾Ý£¬£¬£¬½øÒ»²½Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£¡£
https://cybernews.com/security/lg-uplus-data-breach-south-korea/
5. ConduentÊý¾Ýй¶ÊÂÎñ²¨¼°³¬ÍòÍòÈË
10ÔÂ30ÈÕ£¬£¬£¬ÃÀ¹úÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·ConduentÈ·ÈÏ£¬£¬£¬2024Äê10ÔÂ21ÈÕ±¬·¢µÄϵͳÐÔÈëÇÖµ¼Ö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬Ó°ÏìÈËÊý³¬1050Íò£¬£¬£¬Éæ¼°ÃÀ¹ú¶àÖÝסÃñ¡£¡£¡£¡£¡£¸Ã¹«Ë¾2017Äê´ÓÊ©Àֲַ𣬣¬£¬ÔÚ22¹úÓµÓÐ5.6ÍòÃûÔ±¹¤£¬£¬£¬ÄêÊÕÈë34ÒÚÃÀÔª£¬£¬£¬ÎªÕþ¸®¼°ÆóÒµÌṩÊý×Ö»¯Ð§ÀÍÆ½Ì¨¡£¡£¡£¡£¡£¾ÝÏò˾·¨²¿Ìá½»µÄ֪ͨ¼°¸÷ÖÝ×ÜÉó²é³¤Åû¶Êý¾Ý£¬£¬£¬¶íÀÕ¸ÔÖÝÊÜÓ°Ïì×îÑÏÖØ£¬£¬£¬´ï1050ÍòÈË£»£»£»£»£»£»µÂ¿ËÈøË¹ÖÝ400Íò¡¢»ªÊ¢¶ÙÖÝ7.6Íò¡¢ÃåÒòÖÝÊý°ÙÈË£¬£¬£¬ÏÖʵӰÏì¹æÄ£Òòδ¹ûÕæÊý¾ÝµÄÖÝ¿ÉÄܸü´ó¡£¡£¡£¡£¡£Ð¹Â¶ÄÚÈݰüÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢£ºÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÍêÕû³öÉúÈÕÆÚ¡¢¿µ½¡°ü¹Üµ¥ºÅ¡¢Éí·ÝÖ¤ºÅ¼°Ò½ÁƼͼ¡£¡£¡£¡£¡£ConduentÉùÃ÷×èÖ¹2025Äê10ÔÂ24ÈÕδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬£¬µ«½¨ÒéÊÜÓ°ÏìÕß×Ô¶¯»ñÊØÐÅÓñ¨¸æ¡¢ÉèÖÃڲƾ¯±¨¼°ÕË»§¶³½á£¬£¬£¬Ö»¹Ü¹«Ë¾Î´Ìṩ¹Ù·½Éí·Ý͵ÇÔ±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£ÊÂÎñ×·ËÝÏÔʾ£¬£¬£¬2025Äê1Ô·¢Ã÷й¶£¬£¬£¬µ«ÏµÍ³ÔçÔÚ2024Äê10ÔÂÒÑÔâÈëÇÖ¡£¡£¡£¡£¡£½ñÄêÄêÍ·ConduentÔøÒòÍøÂçÇå¾²ÊÂÎñÒý·¢Ð§ÀÍÖÐÖ¹£¬£¬£¬SafepayÀÕË÷Èí¼þÍÅ»ï2ÔÂÏÂÑ®ÈϿɶԴËÈÏÕæ¡£¡£¡£¡£¡£4ÔÂSECÎļþ½øÒ»²½Åû¶£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨¿Í»§ÐÅÏ¢¼°¿Í»§Êý¾ÝµÄÎļþ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bpo-giant-conduent-confirms-data-breach-impacts-105-million-people/
6. Ribbon CommunicationsÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ
10ÔÂ30ÈÕ£¬£¬£¬ÃÀ¹úµçÐÅЧÀÍÌṩÉÌRibbon Communications¿ËÈÕÅû¶£¬£¬£¬ÆäITÍøÂçÔçÔÚ2024Äê12Ô±ãÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬£¬£¬µ«Ö±ÖÁ2025Äê9Ô²żì²âµ½Òì³£»á¼û¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÈ«Çò68¸öЧÀÍ´¦µÄ3100ÓàÃûÔ±¹¤£¬£¬£¬Ð§À͹¤¾ßº¸ÇÂåɼí¶ÊС¢µÂ¿ËÈøË¹´óѧ°Â˹͡·ÖУ¡¢ÃÀ¹ú¹ú·À²¿¼°Verizon¡¢µÂ¹úµçÐŵȵçÐÅÔËÓªÉÌ¡£¡£¡£¡£¡£Æ¾Ö¤10ÔÂ23ÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþ£¬£¬£¬RibbonÈ·ÈϹ¥»÷Õß×îÔçÓÚ2024Äê12Ô»ñµÃϵͳ»á¼ûȨÏÞ£¬£¬£¬ËäÒÑÖÕÖ¹ÍþвÐÐΪÕß»á¼û£¬£¬£¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£³õ³ÌÐò²éÏÔʾ£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁË´æ´¢ÔÚÖ÷ÍøÂçÍâµÄÁ½Ì¨Ìõ¼Ç±¾µçÄÔÉϵĿͻ§Îļþ£¬£¬£¬µ«ÉÐδ·¢Ã÷¡°ÊµÖÊÐÔÐÅÏ¢¡±±»ÇÔÈ¡µÄÖ¤¾Ý¡£¡£¡£¡£¡£¹«Ë¾Ô¤¼Æ2025ÄêµÚËÄÐò¶È½«ÒòÊÓ²ìºÍÍøÂçÇ¿»¯±¬·¢ÌØÊâÓöȣ¬£¬£¬µ«¹æÄ£ÓÐÏÞ¡£¡£¡£¡£¡£RibbonÕýÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Áª°îÖ´·¨²¿·ÖÏàÖú£¬£¬£¬ÒÔÈ·¶¨ÈëÇÖ¹æÄ£¼°Ç±ÔÚÓ°Ïì¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ¹é×ïÓÚÌØ¶¨ÍþвÐÐΪÕߣ¬£¬£¬µ«ÊÂÎñÔÙ´Î͹ÏÔÒªº¦»ù´¡ÉèÊ©ÃæÁÙµÄÍøÂçÇ徲Σº¦¡£¡£¡£¡£¡£¹«Ë¾ºôÓõÓû§¼á³ÖСÐÄ£¬£¬£¬²¢Ç¿µ÷½«Ò»Á¬¸üÐÂÊÓ²ìÏ£Íû£¬£¬£¬ÒÔ°ü¹Ü¿Í»§Êý¾ÝÇå¾²¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/major-telecom-services-provider-ribbon-breached-by-state-hackers/


¾©¹«Íø°²±¸11010802024551ºÅ