°²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶

Ðû²¼Ê±¼ä 2025-10-31

1. °²ÓÀ4TBÃô¸ÐÊý¾ÝÒòÔÆ´æ´¢ÉèÖùýʧй¶


10ÔÂ29ÈÕ£¬£¬ £¬ºÉÀ¼ÍøÂçÇå¾²¹«Ë¾Neo Security¿ËÈÕÅû¶£¬£¬ £¬ÆäÊ×ϯÑо¿Ô±·¢Ã÷°²ÓÀ»á¼ÆÊ¦ÊÂÎñËùÒ»¸öÁè¼Ý4TBµÄSQL Server±¸·ÝÎļþÒòÔÆ´æ´¢Í°ÉèÖùýʧ̻¶ÓÚ¹«¹²»¥ÁªÍø£¬£¬ £¬µ¼ÖÂ¸Ã»á¼ÆÓë×Éѯ¾ÞÍ·µÄÉñÃØÐÅϢй¶¡£¡£¡£¡£¡£¸Ã±¸·ÝÎļþ£¨.BAKÃûÌã©°üÀ¨APIÃÜÔ¿¡¢»ºÁ¢×ã·ÝÑéÖ¤ÁîÅÆ¡¢»á»°ÁîÅÆ¡¢Ð§ÀÍÕË»§ÃÜÂë¼°Óû§Æ¾Ö¤µÈÃô¸ÐÐÅÏ¢£¬£¬ £¬ÇÒδ¼ÓÃÜ¡£¡£¡£¡£¡£Ñо¿ÍŶÓͨ¹ýÏÂÔØÎļþǰһǧ×Ö½ÚÑéÖ¤ÁËй¶ÊÂʵ£¬£¬ £¬²¢Ö¸³ö´ËÀàÎó²îÔ´Óڵ䷶µÄÔÆ´æ´¢ÉèÖÃʧÎ󣬣¬ £¬ÀàËÆ°¸ÀýÖУ¬£¬ £¬¹¤³ÌʦΪ¼ò»¯Êý¾Ý¿âǨáãÁ÷³Ì£¬£¬ £¬Ôø½«´æ´¢Í°¶ÌÔÝÉèΪ¹ûÕæ£¨½öÎå·ÖÖÓ£©£¬£¬ £¬È´Òò×Ô¶¯»¯É¨Ã蹤¾ßµÄ¿ìËÙ¼ì²âµ¼ÖÂÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÁËÏÖ´úÔÆÆ½Ì¨µÄÇå¾²Òþ»¼£ºÖ»¹ÜÊý¾Ý¿âµ¼³öÓ뱸·ÝÁ÷³Ì¸ß¶È±ã½Ý£¬£¬ £¬µ«¹¤¾ßÉè¼Æ×ÅÖØ²Ù×÷±ãµ±ÐÔ¶ø·ÇÇå¾²·À»¤£¬£¬ £¬Óû§ÈôÒòƴд¹ýʧ»ò²Ù×÷Êèºö½«´æ´¢Í°ÉèΪ¹ûÕæ£¬£¬ £¬¼«Ò×µ¼ÖÂTB¼¶Ãô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£Neo SecurityÇ¿µ÷£¬£¬ £¬´ËÀàй¶ÍùÍùÔÚ±»·¢Ã÷ǰÒÑÔâ¶ñÒâ·½»ñÈ¡£¬£¬ £¬ÆóҵӦĬÈÏÎļþ̻¶˲¼ä¼´ÒÑʧÔô¡£¡£¡£¡£¡£


https://www.theregister.com/2025/10/29/ey_exposes_4tb_sql_database/


2. PhantomRaven¹¥»÷»î¶¯Í¨¹ý¶ñÒânpm°üÇÔÈ¡¿ª·¢Æ¾Ö¤


10ÔÂ29ÈÕ£¬£¬ £¬Koi SecurityÑо¿Ö°Ô±Åû¶ÃûΪ¡°PhantomRaven¡±µÄ»îÔ¾¹¥»÷»î¶¯£¬£¬ £¬¸Ã»î¶¯×Ô8ÔÂÆðÒѰ²ÅÅ126¸ö¶ñÒânpm°ü£¬£¬ £¬ÏÂÔØÁ¿Áè¼Ý86,000´Î£¬£¬ £¬Ä¿µÄÖ±Ö¸JavaScript¿ª·¢ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆ¡¢CI/CDÃÜÔ¿¼°GitHubƾ֤¡£¡£¡£¡£¡£Node.jsĬÈϰü¹ÜÀíÆ÷NPM×÷ΪȫÇò¿ª·¢Õß¹²Ïí´úÂëµÄ½¹µãƽ̨£¬£¬ £¬³ÉΪ´Ë´Î¹¥»÷µÄÖ÷ÒªÔØÌå¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓá°ÓòÃûÇÀ×¢¡±Õ½ÂÔ£¬£¬ £¬Í¨¹ýAIÌìÉú¿´ËÆÕýµ±µ«ÏÖʵ²»±£´æµÄÈí¼þ°üÃû³Æ£¨ÈçÄ£ÄâGitLab»òApache¹¤¾ßµÄ°üÃû£©£¬£¬ £¬ÓÕʹ¿ª·¢ÕßÔÚÒÀÀµLLMÍÆ¼öʱÎóÓᣡ£¡£¡£¡£ÕâЩ¶ñÒâ°ü½ÓÄÉÔ¶³Ì¶¯Ì¬ÒÀÀµÏRDD£©ÏµÍ³£¬£¬ £¬ËäÉùÃ÷ÎÞÒÀÀµÏ£¬ £¬µ«×°ÖÃʱ»á×Ô¶¯´ÓÍⲿURL»ñÈ¡ÓÐÓÃÔØºÉ²¢Ö´ÐУ¬£¬ £¬ÎÞÐèÓû§½»»¥¡£¡£¡£¡£¡£¸Ã»úÖÆÊ¹¶ñÒâ´úÂëÔÚ¡°npm install¡±Àú³ÌÖÐÇÄÈ»ÔËÐУ¬£¬ £¬¶ÔÊÜѬȾװ±¸¾ÙÐÐÇéÐÎÆÊÎö£¬£¬ £¬ËÑË÷µç×ÓÓʼþµØµã¼°ÇéÐαäÁ¿£¬£¬ £¬ÖصãÇÔÈ¡NPM¡¢GitHub Actions¡¢GitLab¡¢JenkinsºÍCircleCIµÄÁîÅÆ£¬£¬ £¬ÎªºóÐø¹©Ó¦Á´¹¥»÷£¨ÈçÏòÆäËûÏîĿֲÈë¶ñÒâ´úÂ룩ÆÌ·¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉÈýÖÖÊý¾Ýй¶·½·¨£ºURL±àÂëÊý¾ÝµÄHTTP GETÇëÇó¡¢JSONÊý¾ÝµÄHTTP POSTÇëÇó¼°WebSocketÅþÁ¬£¬£¬ £¬È·±£ÇÔÊØÐÅÏ¢¸ßЧÍâ´«¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/phantomraven-attack-floods-npm-with-credential-stealing-packages/


3. Reputation.comй¶1.2ÒÚÌõÃô¸ÐÊý¾Ý


10ÔÂ29ÈÕ£¬£¬ £¬¿ËÈÕ£¬£¬ £¬CybernewsÑо¿ÍŶӷ¢Ã÷×ÅÃûÔÚÏßÉùÓþÖÎÀí¹«Ë¾Reputation.comÒòЧÀÍÆ÷Î´Ç¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤ºÍ»á¼û¿ØÖÆ£¬£¬ £¬µ¼ÖÂÁè¼Ý320GB¡¢½ü1.2ÒÚÌõ°üÀ¨ºó¶ËϵͳÊý¾ÝµÄ¼Í¼й¶£¬£¬ £¬Éæ¼°»á»°cookie¡¢Î¨Ò»±êʶ·û£¨Èçcompany_uid¡¢session_id£©¡¢Ê±¼ä´Á¼°ÊÂÎñÈÕÖ¾µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÔ´×ÔÆäÊý¾Ý¿ÉÊÓ»¯Óë̽Ë÷¹¤¾ßµÄ¿É¹ûÕæ»á¼ûʵÀý£¬£¬ £¬¼Í¼Á˽¨Éè¡¢¶ÁÈ¡¡¢¸üС¢É¾³ýµÈͨÀýÓ¦Óû£¬£¬ £¬ÁýÕÖÊý°Ù¼Ò²Æ²ú500Ç¿ÆóÒµ¼°Ö÷ÒªÆ·ÅÆ£¬£¬ £¬°üÀ¨ÃÀ¹úÒøÐС¢¸£ÌØ¡¢Í¨ÓÃÆû³µ¡¢±¦Âí¾­ÏúÉ̵È¡£¡£¡£¡£¡£Ð¹Â¶µÄcookie×Ö·û´®¿ÉÄܱ»ÓÃÓÚµÁÓÿͻ§É罻ýÌåÕË»§£¨ÈçFacebook¡¢Instagram¡¢LinkedInµÈƽ̨¼¯ÀÖ³ÉÄÜ£©£¬£¬ £¬¹¥»÷Õß¿ÉÐû²¼Óк¦ÄÚÈÝ¡¢Ê¹ÓÃÉ̼ÒÐÅÏ¢¡¢ÈÅÂÒÓªÏúÍýÏ룬£¬ £¬ÉõÖÁ¸Ä¶¯¶àÇþµÀͨѶ£¨Èç¿Í»§ÊÓ²ì»Ø¸´¡¢¹«¹Ø»î¶¯Ëزģ©£¬£¬ £¬¶ÔÆ·ÅÆÉùÓþºÍÔËÓªÔì³ÉÖØ´óË𺦡£¡£¡£¡£¡£ÀýÈ磬£¬ £¬Í¨¹ýÀÄÓÃÉç½»Ì×¼þ¹¦Ð§£¬£¬ £¬ºÚ¿Í¿ÉʵÑé¡°ÐéαÌû×Ó¡±¡¢¶ñÒâͨ¸æ»òʹÓÃÐÅÈÎÐźÅ£¬£¬ £¬Ö±½Ó¹¥»÷ÆóÒµ¹«ÐÅÁ¦¡£¡£¡£¡£¡£


https://cybernews.com/security/reputation-com-leak-exposes-sensitive-data/


4. º«¹úµçОÞÍ·LG Uplus֤ʵÊý¾Ýй¶


10ÔÂ29ÈÕ£¬£¬ £¬¿ËÈÕ£¬£¬ £¬º«¹úµçОÞÍ·LG Uplus֤ʵÒÉËÆ±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬ £¬Éæ¼°Ô¼4.2ÍòÃû¿Í»§¼°167ÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬ £¬º«¹ú»¥ÁªÍøÇå¾²ÕñÐËÔº£¨KISA£©Òѽӻñ֪ͨ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ËäÌá½»±¨¸æ£¬£¬ £¬µ«Î´Ðû²¼ÄÚ²¿ÊÓ²ìЧ¹ûʱ¼ä±í¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ°×ñºÚ¿Í7ÔÂÊ×´ÎÖÒÑÔµÄϵͳÎó²î£¬£¬ £¬¶øLG UplusÔÚ8ÔÂÔøÏò¿Æ¼¼²¿ÌåÏÖδ·¢Ã÷È·Ôä¹¥»÷Ö¤¾Ý£¬£¬ £¬ºóÒòÐÞ¸ÄÕË»§ÖÎÀíϵͳЧÀÍÆ÷±»Åú¿ÉÄÜÏú»ÙÒªº¦Ö¤¾Ý£¬£¬ £¬Òý·¢î¿ÏµÓ빫ÖÚ¶ÔÖ¤¾ÝÉúÑĵÄÖÊÒÉ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¼Ó¾çÁ˺«¹úµçÐÅÐÐÒµÍøÂç¹¥»÷À˳±¡£¡£¡£¡£¡£´Ëǰ£¬£¬ £¬SK TelecomÔâ¡°÷è÷롱ÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬ £¬ÇÔȡԼ1TBÎļþ£¬£¬ £¬µ¼Ö¹«Ë¾±»ÆÈÃâ·ÑÌæ»»ËùÓпͻ§SIM¿¨²¢ÔÝÍ£ÐÂÓû§×¢²á£¬£¬ £¬Ê×ϯִÐйٹûÕæÖÂǸ¡£¡£¡£¡£¡£Í¬ÆÚ£¬£¬ £¬KT Telecom±¨¸æÍøÂç¹¥»÷Ôì³É³¬2.4ÒÚº«ÔªËðʧ¼°368ÃûÊܺ¦Õß¡£¡£¡£¡£¡£10Ô£¬£¬ £¬CoinbaseCartelÍÅ»ïÍþвй¶SK TelecomÉñÃØÔ´´úÂ룬£¬ £¬Èô²»Ì¸Åн«¹ûÕæÊý¾Ý£¬£¬ £¬½øÒ»²½Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£¡£


https://cybernews.com/security/lg-uplus-data-breach-south-korea/


5. ConduentÊý¾Ýй¶ÊÂÎñ²¨¼°³¬ÍòÍòÈË


10ÔÂ30ÈÕ£¬£¬ £¬ÃÀ¹úÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·ConduentÈ·ÈÏ£¬£¬ £¬2024Äê10ÔÂ21ÈÕ±¬·¢µÄϵͳÐÔÈëÇÖµ¼Ö´ó¹æÄ£Êý¾Ýй¶£¬£¬ £¬Ó°ÏìÈËÊý³¬1050Íò£¬£¬ £¬Éæ¼°ÃÀ¹ú¶àÖÝסÃñ¡£¡£¡£¡£¡£¸Ã¹«Ë¾2017Äê´ÓÊ©Àֲַ𣬣¬ £¬ÔÚ22¹úÓµÓÐ5.6ÍòÃûÔ±¹¤£¬£¬ £¬ÄêÊÕÈë34ÒÚÃÀÔª£¬£¬ £¬ÎªÕþ¸®¼°ÆóÒµÌṩÊý×Ö»¯Ð§ÀÍÆ½Ì¨¡£¡£¡£¡£¡£¾ÝÏò˾·¨²¿Ìá½»µÄ֪ͨ¼°¸÷ÖÝ×ÜÉó²é³¤Åû¶Êý¾Ý£¬£¬ £¬¶íÀÕ¸ÔÖÝÊÜÓ°Ïì×îÑÏÖØ£¬£¬ £¬´ï1050ÍòÈË£»£» £»£»£»£»µÂ¿ËÈøË¹ÖÝ400Íò¡¢»ªÊ¢¶ÙÖÝ7.6Íò¡¢ÃåÒòÖÝÊý°ÙÈË£¬£¬ £¬ÏÖʵӰÏì¹æÄ£Òòδ¹ûÕæÊý¾ÝµÄÖÝ¿ÉÄܸü´ó¡£¡£¡£¡£¡£Ð¹Â¶ÄÚÈݰüÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢£ºÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÍêÕû³öÉúÈÕÆÚ¡¢¿µ½¡°ü¹Üµ¥ºÅ¡¢Éí·ÝÖ¤ºÅ¼°Ò½ÁƼͼ¡£¡£¡£¡£¡£ConduentÉùÃ÷×èÖ¹2025Äê10ÔÂ24ÈÕδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬ £¬µ«½¨ÒéÊÜÓ°ÏìÕß×Ô¶¯»ñÊØÐÅÓñ¨¸æ¡¢ÉèÖÃڲƭ¾¯±¨¼°ÕË»§¶³½á£¬£¬ £¬Ö»¹Ü¹«Ë¾Î´Ìṩ¹Ù·½Éí·Ý͵ÇÔ±£»£» £»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£ÊÂÎñ×·ËÝÏÔʾ£¬£¬ £¬2025Äê1Ô·¢Ã÷й¶£¬£¬ £¬µ«ÏµÍ³ÔçÔÚ2024Äê10ÔÂÒÑÔâÈëÇÖ¡£¡£¡£¡£¡£½ñÄêÄêÍ·ConduentÔøÒòÍøÂçÇå¾²ÊÂÎñÒý·¢Ð§ÀÍÖÐÖ¹£¬£¬ £¬SafepayÀÕË÷Èí¼þÍÅ»ï2ÔÂÏÂÑ®ÈϿɶԴËÈÏÕæ¡£¡£¡£¡£¡£4ÔÂSECÎļþ½øÒ»²½Åû¶£¬£¬ £¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨¿Í»§ÐÅÏ¢¼°¿Í»§Êý¾ÝµÄÎļþ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bpo-giant-conduent-confirms-data-breach-impacts-105-million-people/


6. Ribbon CommunicationsÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ


10ÔÂ30ÈÕ£¬£¬ £¬ÃÀ¹úµçÐÅЧÀÍÌṩÉÌRibbon Communications¿ËÈÕÅû¶£¬£¬ £¬ÆäITÍøÂçÔçÔÚ2024Äê12Ô±ãÔâ¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬£¬ £¬µ«Ö±ÖÁ2025Äê9Ô²żì²âµ½Òì³£»á¼û¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÈ«Çò68¸öЧÀÍ´¦µÄ3100ÓàÃûÔ±¹¤£¬£¬ £¬Ð§À͹¤¾ßº­¸ÇÂåɼí¶ÊС¢µÂ¿ËÈøË¹´óѧ°Â˹͡·ÖУ¡¢ÃÀ¹ú¹ú·À²¿¼°Verizon¡¢µÂ¹úµçÐŵȵçÐÅÔËÓªÉÌ¡£¡£¡£¡£¡£Æ¾Ö¤10ÔÂ23ÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþ£¬£¬ £¬RibbonÈ·ÈϹ¥»÷Õß×îÔçÓÚ2024Äê12Ô»ñµÃϵͳ»á¼ûȨÏÞ£¬£¬ £¬ËäÒÑÖÕÖ¹ÍþвÐÐΪÕß»á¼û£¬£¬ £¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£³õ³ÌÐò²éÏÔʾ£¬£¬ £¬¹¥»÷Õß»ñÈ¡ÁË´æ´¢ÔÚÖ÷ÍøÂçÍâµÄÁ½Ì¨Ìõ¼Ç±¾µçÄÔÉϵĿͻ§Îļþ£¬£¬ £¬µ«ÉÐδ·¢Ã÷¡°ÊµÖÊÐÔÐÅÏ¢¡±±»ÇÔÈ¡µÄÖ¤¾Ý¡£¡£¡£¡£¡£¹«Ë¾Ô¤¼Æ2025ÄêµÚËÄÐò¶È½«ÒòÊÓ²ìºÍÍøÂçÇ¿»¯±¬·¢ÌØÊâÓöÈ£¬£¬ £¬µ«¹æÄ£ÓÐÏÞ¡£¡£¡£¡£¡£RibbonÕýÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Áª°îÖ´·¨²¿·ÖÏàÖú£¬£¬ £¬ÒÔÈ·¶¨ÈëÇÖ¹æÄ£¼°Ç±ÔÚÓ°Ïì¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ¹é×ïÓÚÌØ¶¨ÍþвÐÐΪÕߣ¬£¬ £¬µ«ÊÂÎñÔÙ´Î͹ÏÔÒªº¦»ù´¡ÉèÊ©ÃæÁÙµÄÍøÂçÇ徲Σº¦¡£¡£¡£¡£¡£¹«Ë¾ºôÓõÓû§¼á³ÖСÐÄ£¬£¬ £¬²¢Ç¿µ÷½«Ò»Á¬¸üÐÂÊÓ²ìÏ£Íû£¬£¬ £¬ÒÔ°ü¹Ü¿Í»§Êý¾ÝÇå¾²¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/major-telecom-services-provider-ribbon-breached-by-state-hackers/