EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË

Ðû²¼Ê±¼ä 2026-04-10

1. EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË


4ÔÂ9ÈÕ£¬£¬£¬£¬ £¬£¬Å·ÖÞÂÃÐй«Ë¾Eurail¿ËÈÕÏòÃÀ¹ú¶à¸öÖÝ˾·¨²¿³¤°ì¹«ÊÒÌύΥ¹æÍ¨Öª£¬£¬£¬£¬ £¬£¬Åû¶2025Äê12Ô±¬·¢µÄÊý¾Ýй¶ÊÂÎñÏÖʵӰÏìÁè¼Ý30ÍòÈË£¬£¬£¬£¬ £¬£¬ÐÕÃûºÍ»¤ÕÕºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¸ÃÊÂÎñ×î³õÓÚ½ñÄê1ÔÂÅû¶£¬£¬£¬£¬ £¬£¬Æäʱ¹«Ë¾½öÖÒÑÔ³ÖÓÐÅ·ÖÞÌú·ͨƱµÄÖ÷¹Ë¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚºÉÀ¼µÄEurailÌåÏÖ£¬£¬£¬£¬ £¬£¬ºÚ¿ÍÈëÇÖÆäÍøÂçºóÇÔÈ¡Á˰üÀ¨»ù×Ô¼º·ÝºÍÁªÏµÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£½ñÄê2Ô£¬£¬£¬£¬ £¬£¬Ò»ÃûºÚ¿ÍÔÚ¹ûÕæµÄÍøÂç·¸·¨ÍøÕ¾ÉÏ´µÅõ³Æ£¬£¬£¬£¬ £¬£¬´ÓEurailµÄAWS S3¡¢ZendeskºÍGitLabʵÀýÖÐÇÔÈ¡ÁËÔ¼1.3TBÊý¾Ý£¬£¬£¬£¬ £¬£¬°üÀ¨Ô´´úÂë¡¢Ö§³Ö¹¤µ¥ºÍÊý¾Ý¿â±¸·Ý¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÉù³ÆÇÔÈ¡ÁËÊý°ÙÍòÅ·ÖÞÌú·ͨƱÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ £¬£¬²¢³ÆÓëÂÃÐй«Ë¾µÄ̸ÅÐÒѾ­Ê§°Ü¡£¡£¡£¡£¡£3Ô³õ£¬£¬£¬£¬ £¬£¬Eurail֤ʵºÚ¿ÍÒ»Ö±ÔÚ°µÍøÉ϶µÊÛÇÔÈ¡µÄÊý¾Ý£¬£¬£¬£¬ £¬£¬²¢ÔÚTelegramƵµÀÉÏÐû²¼ÁËÑù±¾Êý¾Ý¼¯¡£¡£¡£¡£¡£¹«Ë¾Í¬Ê±³ÎÇ壬£¬£¬£¬ £¬£¬ËûÃDz»´æ´¢ÒøÐлòÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬ £¬£¬Ò²²»´æ´¢»¤Õյĵç×Ó°æÕÕÆ¬£¬£¬£¬£¬ £¬£¬µ«ÔÊÐíÈôÊǿͻ§µÄСÎÒ˽¼ÒÊý¾Ý±»°üÀ¨ÔÚÑù±¾Êý¾Ý¼¯ÖУ¬£¬£¬£¬ £¬£¬½«Ö±½Ó֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£ÉÏÖÜÏò¶íÀÕ¸ÔÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬£¬£¬£¬ £¬£¬´Ë´ÎÊý¾Ýй¶ÏÖʵӰÏì308,777ÈË¡£¡£¡£¡£¡£


https://www.securityweek.com/300000-people-impacted-by-eurail-data-breach/


2. È«Çò×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin DepotÔâÈëÇÖ


4ÔÂ9ÈÕ£¬£¬£¬£¬ £¬£¬ÔËÓª×ÅÈ«Çò×î´ó±ÈÌØ±ÒATMÍøÂçÖ®Ò»µÄBitcoin Depot¿ËÈÕÅû¶£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÓÚÉϸöÔÂÈëÇÖÆäϵͳºó£¬£¬£¬£¬ £¬£¬´ÓÆä¼ÓÃÜÇ®°üÖÐÇÔÈ¡Á˼ÛÖµ366.5ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÈ«ÇòÖÎÀí×ÅÁè¼Ý25,000̨±ÈÌØ±ÒATM»úºÍBDCheckoutÍøµã£¬£¬£¬£¬ £¬£¬2025ÄêÊÕÈëµÖ´ï6.15ÒÚÃÀÔª¡£¡£¡£¡£¡£Æ¾Ö¤Ìá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþ£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÔÚ3ÔÂ23ÈÕ¼ì²âµ½Æä²¿·ÖITϵͳ±£´æ¿ÉÒɻºó·¢Ã÷Á˴˴ι¥»÷¡£¡£¡£¡£¡£Ö»¹ÜÁ¬Ã¦½ÓÄɲ½·¥¿ØÖƹ¥»÷£¬£¬£¬£¬ £¬£¬µ«¹¥»÷ÕßÈÔÓÐʱ¼äÇÔÈ¡Êý×Ö×ʲú½áËãÕË»§µÄƾ֤£¬£¬£¬£¬ £¬£¬²¢ÔÚÆä»á¼ûȨÏÞ±»×èֹ֮ǰ´ÓBitcoin DepotµÄÇ®°üÖÐ×ªÒÆÁË50.903¸ö±ÈÌØ±Ò£¬£¬£¬£¬ £¬£¬°´±¨¸æµ±ÈÕ¼ÛÖµÔ¼366.5ÍòÃÀÔª¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ £¬£¬·¢Ã÷ÎÊÌâºóÁ¬Ã¦Æô¶¯ÁËÊÂÎñÏìӦЭÒ飬£¬£¬£¬ £¬£¬Ô¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬ £¬£¬²¢Í¨ÖªÁËÖ´·¨²¿·Ö¡£¡£¡£¡£¡£Bitcoin Depot½øÒ»²½ÒÔΪ£¬£¬£¬£¬ £¬£¬¸ÃÊÂÎñ½öÏÞÓÚ¹«Ë¾ÄÚ²¿ÇéÐΣ¬£¬£¬£¬ £¬£¬²¢Î´Ó°Ïì¿Í»§Æ½Ì¨¡¢²¿·Ö¡¢ÏµÍ³¡¢Êý¾Ý»òÇéÐΡ£¡£¡£¡£¡£ËäÈ»¹«Ë¾ÓµÓÐÕë¶ÔÍøÂç¹¥»÷µÄ°ü¹Ü£¬£¬£¬£¬ £¬£¬µ«Bitcoin DepotÌåÏÖÕâ¿ÉÄÜÎÞ·¨º­¸Ç¹¥»÷Ôì³ÉµÄËùÓÐËðʧ¡£¡£¡£¡£¡£¼øÓÚ¸ÃÊÂÎñ¿ÉÄÜÔì³ÉµÄÉùÓþË𺦡¢Ö´·¨¡¢î¿ÏµºÍÓ¦¶Ô±¾Ç®£¬£¬£¬£¬ £¬£¬¹«Ë¾ÓÚ2026Äê4ÔÂ6ÈÕÈ϶¨¸ÃÊÂÎñ¾ßÓÐÖØ´óÒâÒå¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/crypto-atm-giant-bitcoin-depot-says-hackers-stole-36-million-from-its-wallets/


3. Âåɼí¶ÊÐ״ʦ°ì¹«ÊÒÔâºÚ¿ÍÈëÇÖ


4ÔÂ9ÈÕ£¬£¬£¬£¬ £¬£¬ÂåÉ¼í¶¾¯Ô±¾ÖÖܶþÐû²¼£¬£¬£¬£¬ £¬£¬ºÚ¿ÍÈëÇÖÁËÂåɼí¶ÊÐ״ʦ°ì¹«ÊÒµÄÊý×ִ洢ϵͳ£¬£¬£¬£¬ £¬£¬¸Ãϵͳ°üÀ¨´ó×ÚÃô¸Ð¾¯ÎñÎļþ¡£¡£¡£¡£¡£¾ÝÂåÉ¼í¶¾¯Ô±¾Ö³Æ£¬£¬£¬£¬ £¬£¬ÕâЩÎļþÊÇ´ËǰÒѽâ¾ö»òÏ¢ÕùµÄÃñʰ¸¼þÖУ¬£¬£¬£¬ £¬£¬ÔÚÖ¤¾Ý¿ªÊ¾½×¶ÎÒÆ½»µÄÖÊÁÏ¡£¡£¡£¡£¡£¾¯·½Ç¿µ÷£¬£¬£¬£¬ £¬£¬´Ë´ÎÈëÇÖ²¢Î´Í»ÆÆÈκÎÂåÉ¼í¶¾¯Ô±¾Ö×ÔÉíµÄϵͳ»òÍøÂ磬£¬£¬£¬ £¬£¬µ«ÊÂÎñÈÔÒýÆðÁ˶ÔÖ´·¨Ãô¸ÐÐÅÏ¢±£»£»£»£»£»¤µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Âåɼí¶ÊÐ״ʦ°ì¹«ÊÒ½²»°ÈËËæºóÐû²¼ÉùÃ÷³Æ£¬£¬£¬£¬ £¬£¬°ì¹«ÊÒÓÚ3ÔÂ20ÈÕ·¢Ã÷ÁË´Ë´ÎÈëÇÖ¡£¡£¡£¡£¡£ºÚ¿Í»á¼ûµÄÊÇ¡°ÊÐ״ʦ°ì¹«ÊÒÓÃÓÚÏò¶Ô·½×´Ê¦ºÍËßËϵ±ÊÂÈË´«ÊäÖ¤¾ÝµÄµÚÈý·½¹¤¾ß¡±¡£¡£¡£¡£¡£ÉùÏÔ×ÅÈ·ÌåÏÖ£¬£¬£¬£¬ £¬£¬Ã»ÓÐÆäËûÊÐÕþÓ¦ÓûòÏµÍ³Éæ¼°´Ë´ÎÊÂÎñ£¬£¬£¬£¬ £¬£¬¸ÃµÚÈý·½¹¤¾ßÖеÄÐÅÏ¢ÓëÈκβ¿·Ö¼Í¼»òϵͳ¾ùÎÞÁ´½Ó»ò»á¼ûȨÏÞ¡£¡£¡£¡£¡£¾Ý¡¶Âåɼí¶Ê±±¨¡·±¨µÀ£¬£¬£¬£¬ £¬£¬É罻ýÌåÉÏÒÑ·ºÆðÉù³Æ°üÀ¨±»µÁÖÊÁÏÐÅÏ¢µÄÌû×Ó£¬£¬£¬£¬ £¬£¬²¿·ÖÌû×ÓÒѱ»É¾³ý¡£¡£¡£¡£¡£ÕâЩÌû×ÓÏÔʾ£¬£¬£¬£¬ £¬£¬¹²ÓÐ7.7TBÊý¾Ý¿É¹©ÏÂÔØ£¬£¬£¬£¬ £¬£¬Áè¼Ý33.7Íò·ÝÎļþ±»»á¼û¡£¡£¡£¡£¡£Ð¹Â¶µÄÖÊÁϰüÀ¨Ö¤ÈËÐÕÃû¡¢Ò½ÁÆÐÅÏ¢¡¢Î´±à¼­µÄÐÌÊÂͶËßÒÔ¼°ÊÓ²ìÎļþµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£


https://therecord.media/breach-exposes-lapd-files-city-attorney-systems


4. Masjesu½©Ê¬ÍøÂçÒþ²Ø¹¥»÷ÎïÁªÍø×°±¸


4ÔÂ8ÈÕ£¬£¬£¬£¬ £¬£¬ÍøÂçÇå¾²¹«Ë¾Trellix¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬ £¬£¬ÉîÈëÆÊÎöÁËÃûΪMasjesuµÄÎïÁªÍø½©Ê¬ÍøÂçµÄÄÚ²¿ÔË×÷»úÖÆ¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç×Ô2023ÄêÆð»îÔ¾£¬£¬£¬£¬ £¬£¬Ö÷ÒªÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§À͹¥»÷£¬£¬£¬£¬ £¬£¬ÒÑѬȾ¶àÖÖÎïÁªÍø×°±¸¡£¡£¡£¡£¡£ÆäÔËÓªÕßÖ÷ÒªÔÚTelegramÉϾÙÐÐÐû´«£¬£¬£¬£¬ £¬£¬Éù³ÆÄܹ»·¢¶¯Êý°ÙGB¹æÄ£µÄDDoS¹¥»÷£¬£¬£¬£¬ £¬£¬Ìû×ÓͬʱÕë¶ÔÖÐÎĺÍÓ¢ÎÄÓû§£¬£¬£¬£¬ £¬£¬Åú×¢ÆäЧÀͼÌÐøÃé×¼ÖÐÃÀ¿Í»§¡£¡£¡£¡£¡£ÏÖÔÚÔËÓªÕßµÄTelegramƵµÀÓµÓÐÁè¼Ý400Ãû¶©ÔÄÕߣ¬£¬£¬£¬ £¬£¬µ«ÏÖÊÊÓû§Èº¿ÉÄܸü´ó¡£¡£¡£¡£¡£´ÓѬȾװ±¸µÄÂþÑÜÀ´¿´£¬£¬£¬£¬ £¬£¬´ó´ó¶¼±»Ñ¬È¾µÄ×°±¸Î»ÓÚÔ½ÄÏ£¬£¬£¬£¬ £¬£¬µ«°ÍÎ÷¡¢Ó¡¶È¡¢ÒÁÀÊ¡¢¿ÏÄáÑǺÍÎÚ¿ËÀ¼Ò²Óдó×Ú×°±¸±»Ñ¬È¾¡£¡£¡£¡£¡£TrellixÖ¸³ö£¬£¬£¬£¬ £¬£¬Êý¾ÝÇ¿ÁÒÅú×¢¹¥»÷À´×Ô¶à¸ö×ÔÖÎϵͳ£¬£¬£¬£¬ £¬£¬Éæ¼°ÖÖÖÖÍøÂ磬£¬£¬£¬ £¬£¬¶ø·Ç½©Ê¬ÍøÂçÍêÈ«ÍйÜÓÚ¼òµ¥ÐéÄâרÓÃЧÀÍÆ÷ÌṩÉÌ¡£¡£¡£¡£¡£½üÆÚÆÊÎöµÄMasjesuÑù±¾ÏÔʾ£¬£¬£¬£¬ £¬£¬Æä¿ÉÕë¶Ô¶àÖÖCPU¼Ü¹¹£¬£¬£¬£¬ £¬£¬°üÀ¨i386¡¢MIPS¡¢ARM¡¢SPARC¡¢PPC¡¢68KºÍAMD64¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçͨ¹ýD-Link·ÓÉÆ÷¡¢GPON·ÓÉÆ÷¡¢»ªÎª¼ÒÍ¥Íø¹Ø¡¢MVPower DVR¡¢Netgear·ÓÉÆ÷¡¢UPnPЧÀͼ°ÆäËûÎïÁªÍø×°±¸µÄÒÑÖªÎó²î¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£


https://www.securityweek.com/evasive-masjesu-ddos-botnet-targets-iot-devices/


5. Adobe ReaderÁãÈÕÎó²îÔâºÚ¿ÍʹÓÃÊýÔÂ


4ÔÂ9ÈÕ£¬£¬£¬£¬ £¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ £¬£¬ºÚ¿ÍÕýʹÓÃAdobe ReaderÖÐÒ»¸öÉÐδÐÞ¸´µÄÁãÈÕÎó²î£¬£¬£¬£¬ £¬£¬Í¨¹ýÈ«ÐĽṹµÄ¶ñÒâPDFÎļþ·¢¶¯Ò»Á¬ÐÔ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÍøÂçÇå¾²Ñо¿Ô±ÓÚ3ÔÂ26ÈÕ·¢Ã÷£¬£¬£¬£¬ £¬£¬ÆäʱÊÕµ½Ò»·Ý¿ÉÒÉÑù±¾¡£¡£¡£¡£¡£½øÒ»²½ÆÊÎöÏÔʾ£¬£¬£¬£¬ £¬£¬¹¥»÷»î¶¯ÖÁÉÙ×Ô2025Äê11Ô¾ÍÒÑ×îÏÈ£¬£¬£¬£¬ £¬£¬Ò»¸öÃûΪ¡°Invoice540.pdf¡±µÄÑù±¾ÓÚ2025Äê11ÔÂ28ÈÕÉÏ´«ÖÁVirusTotal£¬£¬£¬£¬ £¬£¬Åú×¢ºÚ¿ÍÒÑÒ»Á¬¹¥»÷³¤´ïËĸöÔÂÖ®¾Ã¡£¡£¡£¡£¡£¸ÃÎó²î¼«ÎªÎ£ÏÕ£¬£¬£¬£¬ £¬£¬Óû§½öÐè·­¿ª¶ñÒâPDFÎļþ¼´¿É´¥·¢¹¥»÷£¬£¬£¬£¬ £¬£¬ÎÞÐèÈκÎÌØÊâµã»÷²Ù×÷£¬£¬£¬£¬ £¬£¬ÇÒÈ·ÈÏ¿ÉÔÚ×îа汾µÄAdobe ReaderÉÏÀÖ³ÉÔËÐС£¡£¡£¡£¡£¹¥»÷¾ßÓÐÏÔ×ÅÕë¶ÔÐÔ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Gi7w0rmÆÊÎö·¢Ã÷£¬£¬£¬£¬ £¬£¬¶ñÒâPDFÎļþÖаüÀ¨¶íÓïÓÕ¶üÄÚÈÝ£¬£¬£¬£¬ £¬£¬Éæ¼°¶íÂÞ˹ʯÓͺÍ×ÔÈ»ÆøÐÐÒµµÄÊ±ÊÆÎÊÌ⣬£¬£¬£¬ £¬£¬Åú×¢¹¥»÷Ä¿µÄ¿ÉÄÜÊǶíÓïµØÇøµÄÕþ¸®¡¢ÄÜÔ´»ò»ù´¡ÉèÊ©Ïà¹Ø»ú¹¹¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ £¬£¬AdobeÉÐδÐû²¼ÐÞ¸´²¹¶¡£¬£¬£¬£¬ £¬£¬Ò²Î´¹ûÕæ»ØÓ¦´ËÊ¡£¡£¡£¡£¡£


https://securityaffairs.com/190558/hacking/malicious-pdf-reveals-active-adobe-reader-zero-day-in-the-wild.html


6. LucidRookÕë¶Ǫ̂Íå·ÇÕþ¸®×éÖ¯ºÍ´óѧ·¢¶¯´¹ÂÚ¹¥»÷


4ÔÂ9ÈÕ£¬£¬£¬£¬ £¬£¬Ë¼¿ÆTalosÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬ £¬£¬Ò»ÖÖÃûΪLucidRookµÄÐÂÐÍÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þÕý±»ÓÃÓÚÕë¶Ǫ̂ÍåµØÇø·ÇÕþ¸®×éÖ¯ºÍ´óѧµÄÓã²æÊ½ÍøÂç´¹Âڻ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚLuaÓïÑÔ¿ª·¢£¬£¬£¬£¬ £¬£¬±»¹éÒòÓÚÄÚ²¿×·×ÙµÄÍþв×éÖ¯UAT-10362£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±½«ÆäÐÎòΪ¡°ÓµÓгÉÊì×÷Õ½¼¼ÇÉ¡±µÄǿʢµÐÊÖ¡£¡£¡£¡£¡£LucidRookÓÚ2025Äê10Ô±»ÓÃÓÚÏÖʵ¹¥»÷£¬£¬£¬£¬ £¬£¬¹¥»÷ÊÖ¶ÎÖ÷ÒªÒÀÀµÐ¯´øÊÜÃÜÂë±£»£»£»£»£»¤´æµµÎļþµÄÍøÂç´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖ²î±ðµÄѬȾÁ´¡£¡£¡£¡£¡£µÚÒ»ÖÖʹÓÃLNK¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬ £¬£¬×îÖÕͶ·ÅÃûΪLucidPawnµÄ¶ñÒâÈí¼þͶ·ÅÆ÷£»£»£»£»£»µÚ¶þÖÖ»ùÓÚEXEµÄѬȾÁ´ÔòʹÓÃαװ³ÉÇ÷ÊÆ¿Æ¼¼Worry-Free Business Security ServicesµÄð³äɱ¶¾Èí¼þ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£LucidRookÔÚÖ´ÐÐÀú³ÌÖлá¾ÙÐÐϵͳÕì̽£¬£¬£¬£¬ £¬£¬ÍøÂçÓû§ºÍÅÌËã»úÃû³Æ¡¢ÒÑ×°ÖÃÓ¦ÓóÌÐòºÍÕýÔÚÔËÐеÄÀú³ÌµÈÐÅÏ¢¡£¡£¡£¡£¡£ÍøÂçµ½µÄÊý¾ÝʹÓÃRSA¼ÓÃÜ£¬£¬£¬£¬ £¬£¬´æ´¢ÔÚÊÜÃÜÂë±£»£»£»£»£»¤µÄ´æµµÖУ¬£¬£¬£¬ £¬£¬²¢Í¨¹ýFTPй¶µ½¹¥»÷Õß¿ØÖƵĻù´¡ÉèÊ©¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/