ÒÔÉ«ÁÐTeleMessage¹«Ë¾ÔâºÚ¿Í¹¥»÷ÔÝͣЧÀÍ
Ðû²¼Ê±¼ä 2025-05-061. ÒÔÉ«ÁÐTeleMessage¹«Ë¾ÔâºÚ¿Í¹¥»÷ÔÝͣЧÀÍ
5ÔÂ5ÈÕ£¬£¬ÒÔÉ«Áй«Ë¾TeleMessageÒòÔâºÚ¿Í¹¥»÷ÒÑÔÝÍ£ËùÓÐЧÀÍ£¬£¬Æäĸ¹«Ë¾Smarsh֤ʵÁËÕâÒ»ÐÂÎÅ£¬£¬²¢ÌåÏÖÕýÔÚÊÓ²ìËùνµÄ¡°Ç±ÔÚÇå¾²ÊÂÎñ¡±¡£¡£¡£¡£¡£TeleMessageΪÆóÒµÌṩÇå¾²µÄÒÆ¶¯ÐÂÎÅЧÀÍ£¬£¬ÆäÖаüÀ¨ÓÃÓڴ浵ͨ¹ý¶Ëµ½¶Ë¼ÓÃÜÐÂÎÅÓ¦ÓóÌÐò£¨ÈçTelegram¡¢WhatsAppºÍSignal£©½»Á÷ÐÂÎŵŤ¾ß£¬£¬Ò»Ð©ÃÀ¹úÕþ¸®¹ÙÔ±ÔøÊ¹ÓÃÆä·Ç¹Ù·½SignalÐÂÎÅ´æµµ¹¤¾ßTM SGNL¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ404 MediaµÄ±¨µÀ£¬£¬Ò»ÃûºÚ¿ÍÈëÇÖÁËTeleMessage£¬£¬»ñÈ¡ÁËʹÓÃTM SGNL´æµµµÄÖ±½ÓÐÂÎźÍȺÁÄ¡£¡£¡£¡£¡£ºÚ¿Í³ÆÈëÇÖÀú³ÌÇáËÉ£¬£¬½öÆÆ·Ñ15µ½20·ÖÖÓ£¬£¬²¢µ£ÐĸÃÎó²î¿ÉÄÜÒѱ£´æ½Ï³¤Ê±¼ä¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿ÍÌåÏÖÄÚ¸ó³ÉÔ±ºÍǰ¹ú¼ÒÇå¾²ÕÕÁϵÄÐÅϢδ±»Ð¹Â¶£¬£¬µ«ÌáÈ¡µÄÊý¾Ý°üÀ¨Õþ¸®¹ÙÔ±µÄÁªÏµÐÅÏ¢¡¢²¿·ÖÐÂÎÅÄÚÈÝÒÔ¼°TeleMessageºó¶ËµÇ¼ƾ֤¡£¡£¡£¡£¡£±ðµÄ£¬£¬±»ÌáÈ¡µÄÊý¾Ý½ØÍ¼»¹ÏÔʾÓëÃÀ¹úº£¹ØºÍÁìÍÁ±£»£»£»£»¤¾Ö¡¢¼ÓÃÜÇ®±ÒÉúÒâËùCoinbaseÒÔ¼°·áÒµÒøÐеȽðÈÚЧÀÍÓйØÁª¡£¡£¡£¡£¡£Èí¼þ¹¤³ÌʦMicah LeeÆÊÎöTM SGNLºóÃÅSignalÓ¦ÓóÌÐòÔ´´úÂëʱ£¬£¬·¢Ã÷ÁËÓ²±àÂëÆ¾Ö¤µÈ¼¸¸öÎó²î¡£¡£¡£¡£¡£Signal½²»°ÈËÌåÏÖÎÞ·¨°ü¹Ü·Ç¹Ù·½°æ±¾SignalµÄÒþ˽»òÇå¾²ÊôÐÔ£¬£¬¶ø°×¹¬¸±ÐÂÎÅÃØÊéÔòÇ¿µ÷SignalÊǾÅú×¼µÄÕþ¸®Ê¹ÓÃÓ¦ÓóÌÐò£¬£¬²¢×°ÖÃÔÚÕþ¸®ÊÖ»úÉÏ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/unofficial-signal-app-used-by-trump-officials-investigates-hack/
2. ÃÀ¹ú¶àµØ½ÌÓý»ú¹¹ÆµÔâÍøÂç¹¥»÷£¬£¬Ñ§ÉúѧϰÊÜÓ°Ïì
5ÔÂ6ÈÕ£¬£¬½üÆÚ£¬£¬ÃÀ¹ú¶àµØ½ÌÓý»ú¹¹ÆµÔâÍøÂç¹¥»÷£¬£¬ÑÏÖØÓ°ÏìÁËѧУÔËÓª¼°Ñ§Éúѧϰ¡£¡£¡£¡£¡£ÐÂÄ«Î÷¸çÖݶà¸öÑ§ÇøºÍÎ÷ÐÂÄ«Î÷¸ç´óѧ¼´ÊÇÊܺ¦ÕßÖ®Ò»¡£¡£¡£¡£¡£Î÷ÐÂÄ«Î÷¸ç´óѧ×Ô4ÔÂ13ÈÕÆðÔâÊÜÍøÂç¹¥»÷£¬£¬ÍøÕ¾Ì±»¾£¬£¬ÏµÍ³ºÍЧÀÍÖÐÖ¹£¬£¬¹Ù·½ÍøÕ¾ºÎʱ»Ö¸´ÉÐÎÞÔ¤¼Æ£¬£¬Ð£Ô°WiFiÒ²´¦ÓÚ̱»¾×´Ì¬£¬£¬Ð£·½±»ÆÈÌá¹©Ìæ»»Ð§ÀÍ£¬£¬²¢Í¨¹ý¶àÖÖ·½·¨ÏòѧÉú¡¢Î÷ϯºÍÊÂÇéְԱת´ï×îÐÂÇéÐΡ£¡£¡£¡£¡£Í¬Ê±£¬£¬Î÷ϯÃÇͨ¹ýÌṩ×÷ÒµºÍÏîÄ¿ÑÓÆÚÀ´Ö§³ÖѧÉú£¬£¬ÒÔ¼õÇáÍ£¿£¿Î¶ÔѧҵµÄÓ°Ï죬£¬µ«´Ë¾ÙÈÔÒý·¢ÁËѧÉú²»Âú¡£¡£¡£¡£¡£×ôÖÎÑÇÖÝ¿¼Î¬ËþÏØÑ§Ð£ÏµÍ³Ò²ÓÚÖÜÎåÍí¼äÔâÓöÍøÂç¹¥»÷£¬£¬Ó°ÏìÁË29ËùK-12ѧУµÄ23,000ÃûѧÉú£¬£¬Ñ§Ð£ÏµÍ³ÍøÂçÁ÷³ÌÊÜ×裬£¬Ô±¹¤±»½¨Òé²»Òª»á¼û×ÀÃæ×°±¸¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»¸ÃУ¹ÙÔ±³ÆÎª¡°ÑÏÖØ¡±£¬£¬²¢ÒÑÏòÏà¹Ø²¿·Ö±¨¸æ¡£¡£¡£¡£¡£±ðµÄ£¬£¬¶í¿ËÀºÉÂíÖݰÍÌØ¶û˹ά¶û¹«Á¢Ñ§Ð£Ò²ÒòÍøÂç¹¥»÷µ¼ÖÂÅÌËã»úϵͳÎÞ·¨ÔËÐУ¬£¬±»ÆÈ×÷·ÏÖݼ¶¿¼ÊÔ¡£¡£¡£¡£¡£½üÆÚ£¬£¬´ËÀàÊÂÎñƵ·¢£¬£¬°üÀ¨°Í¶ûµÄĦÊй«Á¢Ñ§Ð£µÄ´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷¡¢ÄÏ¿¨ÂÞÀ´ÄÉÖݲé¶û˹¶ÙÏØÑ§ÇøµÄÍøÂçÊÂÎñÒÔ¼°µÂ¿ËÈøË¹Öݰ¢¶ûÎÄ×ÔÁ¦Ñ§ÇøµÄÎ¥¹æÊÂÎñµÈ£¬£¬¾ù¶ÔѧУÔËÓªºÍѧÉúÐÅÏ¢Çå¾²Ôì³ÉÁËÍþв¡£¡£¡£¡£¡£
https://therecord.media/hackers-serious-georgia-new-mexico
3. Co-opÏàÖúÉçÔâDragonForceÀÕË÷Èí¼þ¹¥»÷
5ÔÂ2ÈÕ£¬£¬Co-opÏàÖúÉçÔâÊܵÄÍøÂç¹¥»÷±È×î³õ±¨µÀµÄ¸üΪÑÏÖØ£¬£¬ÏÖÒÑÈ·ÈÏ´ó×Ú¿Í»§Êý¾Ý±»µÁ¡£¡£¡£¡£¡£Co-opÔçÏȵ»¯¹¥»÷Ó°Ï죬£¬³ÆÒѹرղ¿·ÖITϵͳ£¬£¬µ«ºóÐøÊÓ²ìÏÔʾºÚ¿ÍÀֳɻá¼ûÆäϵͳ²¢ÌáÈ¡Êý¾Ý£¬£¬°üÀ¨ÏÖÈκÍǰÈγÉÔ±µÄÐÕÃû¡¢ÁªÏµ·½·¨µÈ£¬£¬µ«²»Éæ¼°ÃÜÂë¡¢ÒøÐÐÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£ÐÂÎÅÈËʿ͸¶£¬£¬¹¥»÷±¬·¢ÔÚ4ÔÂ22ÈÕ£¬£¬¹¥»÷ÕßʹÓÃÉç»á¹¤³Ì¹¥»÷ÖØÖÃÔ±¹¤ÃÜÂ룬£¬½ø¶øÈëÇÖÍøÂç²¢ÇÔÈ¡Windows NTDS.ditÎļþ¡£¡£¡£¡£¡£Co-opÏÖÔÚÕýÔÚÖØÐÞWindowsÓò¿ØÖÆÆ÷£¬£¬²¢Ç¿»¯Entra IDÇå¾²£¬£¬KPMGÐÖúÌṩAWSÖ§³Ö¡£¡£¡£¡£¡£BBC×îб¨µÀÖ¸³ö£¬£¬DragonForceÀÕË÷Èí¼þÐж¯µÄÁ¥Êô»ú¹¹ÊǴ˴ι¥»÷µÄÄ»ºóºÚÊÖ£¬£¬¸Ã×éÖ¯»¹Éù³ÆÕÆÎÕÁË2000Íò×¢²áCo-op»áÔ±½±ÀøÍýÏëÓû§µÄÊý¾Ý£¬£¬²¢Ê¹ÓÃMicrosoft TeamsÁªÏµCo-op¸ß¹Ü¾ÙÐÐÀÕË÷¡£¡£¡£¡£¡£Co-opÒÑÏòÔ±¹¤·¢ËÍÄÚ²¿Óʼþ£¬£¬ÖÒÑÔÔÚʹÓÃMicrosoft Teamsʱ¼á³ÖСÐÄ¡£¡£¡£¡£¡£DragonForceÊÇÒ»¸ö¡°ÀÕË÷Èí¼þ¼´Ð§ÀÍ¡±×éÖ¯£¬£¬ÆäËûÍøÂç·¸·¨·Ö×ӿɼÓÈëÆäÖУ¬£¬Ê¹ÓÃÆäÀÕË÷Èí¼þ¾ÙÐй¥»÷£¬£¬²¢Ö§¸¶Êê½ð³é³É¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/co-op-confirms-data-theft-after-dragonforce-ransomware-claims-attack/
4. 21¸öMagentoÀ©Õ¹ºóÃÅDZÔÚÁùÄ꣬£¬2025Ä꼤»îΣ¼°Ç§¼ÒµçÉÌ
5ÔÂ2ÈÕ£¬£¬Ò»ÏîÉæ¼°21¸öºóÃÅMagentoÀ©Õ¹µÄ¹©Ó¦Á´¹¥»÷ÒÑΣ¼°500ÖÁ1000¼Òµç×ÓÉÌÎñÊÐËÁ£¬£¬ÆäÖаüÀ¨Ò»¼Ò¼ÛÖµ400ÒÚÃÀÔªµÄ¿ç¹ú¹«Ë¾ÊÐËÁ¡£¡£¡£¡£¡£SansecÑо¿Ö°Ô±·¢Ã÷£¬£¬²¿·ÖÀ©Õ¹³ÌÐòÔçÔÚ2019Äê¾Í±»Ö²ÈëºóÃÅ£¬£¬µ«¶ñÒâ´úÂëÖ±µ½2025Äê4Ô²ű»¼¤»î¡£¡£¡£¡£¡£SansecÖ¸³ö£¬£¬ÔÚÒ»´ÎÐͬ¹©Ó¦Á´¹¥»÷ÖУ¬£¬¶à¼Ò¹©Ó¦ÉÌÔâºÚ¿Í¹¥»÷£¬£¬¹²·¢Ã÷21¸öÓ¦ÓóÌÐòº¬ÏàͬºóÃÅ£¬£¬¸Ã¶ñÒâÈí¼þ6Äêǰ±»×¢È룬£¬±¾ÖÜËæ¹¥»÷ÕßÍêÈ«¿ØÖƵç×ÓÉÌÎñЧÀÍÆ÷¶ø×îÏÈ»îÔ¾¡£¡£¡£¡£¡£±»ÈëÇÖµÄÀ©Õ¹³ÌÐòÀ´×ÔTigren¡¢MeetanshiºÍMGSÈý¼Ò¹©Ó¦ÉÌ£¬£¬Ïêϸ°üÀ¨Tigren AjaxÌ×¼þ¡¢Tigren AjaxÔ¸ÍûÇåµ¥¡¢Meetanshi ImageClean¡¢MGSÆ·ÅÆµÈ¶à¸öÀ©Õ¹¡£¡£¡£¡£¡£±ðµÄ£¬£¬Sansec»¹·¢Ã÷ÁËWeltpixel GoogleTagManagerÀ©Õ¹µÄÊÜËð°æ±¾£¬£¬µ«ÎÞ·¨È·ÈÏÊÜËðµã¡£¡£¡£¡£¡£ÔÚËùÓÐÊӲ쵽µÄ°¸ÀýÖУ¬£¬À©Õ¹³ÌÐò¾ù°üÀ¨Ò»¸öÌí¼Óµ½ÔÊÐíÖ¤¼ì²éÎļþÖеÄPHPºóÃÅ£¬£¬¸ÃºóÃÅͨ¹ý¼ì²éÌØ¶¨HTTPÇëÇó²ÎÊýÀ´ÔÊÐíÔ¶³ÌÓû§ÉÏ´«ÐÂÔÊÐíÖ¤²¢Ö´ÐÐí§ÒâPHP´úÂ룬£¬¿ÉÄܵ¼ÖÂÊý¾Ý͵ÇÔ¡¢skimmer×¢ÈëµÈÑÏÖØÐ§¹û¡£¡£¡£¡£¡£SansecÒÑÁªÏµÕâÈý¼Ò¹©Ó¦ÉÌ£¬£¬µ«MGSδ»ØÓ¦£¬£¬Tigren·ñ¶¨Îó²î²¢¼ÌÐøÈö²¥´øºóÃŵÄÀ©Õ¹£¬£¬MeetanshiÈÏ¿ÉЧÀÍÆ÷Îó²îµ«Î´ÈÏ¿ÉÀ©Õ¹ÈëÇÖ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores/
5. ¶ñÒâPyPi°üʹÓÃGmail¼°WebSocketsÇÔÃÜ
5ÔÂ1ÈÕ£¬£¬SocketÍþвÑо¿ÍŶӿËÈÕ·¢Ã÷ÁËÆß¸ö¶ñÒâPyPi°ü£¬£¬ÕâЩ°üʹÓÃGmailµÄSMTPЧÀÍÆ÷ºÍWebSocketsÊÖÒÕʵÑéÊý¾Ýй¶ºÍÔ¶³ÌÏÂÁîÖ´Ðй¥»÷¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ°ü°üÀ¨Coffin-Codes-Pro¡¢Coffin-Codes-NET2¡¢Coffin-Codes-NET¡¢Coffin-Codes-2022¡¢Coffin2022¡¢Coffin-Grave¼°cfc-bsb£¬£¬ÆäÖÐCoffin-Codes-2022µÄÏÂÔØÁ¿¸ß´ï18,100´Î£¬£¬²¿·Ö°üÉõÖÁÒÑÔÚPyPIÉϱ£´æËÄÄêÖ®¾Ã¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ°üð³äÕýµ±µÄCoffin°ü£¬£¬ºóÕßÊÇÓÃÓÚ½«Jinja2Ä£°å¼¯³Éµ½DjangoÏîÄ¿µÄÇáÁ¿¼¶ÊÊÅäÆ÷¡£¡£¡£¡£¡£¶ñÒ⹦ЧÖ÷ÒªÌåÏÖÔÚͨ¹ýGmail¾ÙÐÐÒþ²ØÔ¶³Ì»á¼ûºÍÊý¾Ýй¶£¬£¬Ê¹ÓÃÓ²±àÂëµÄGmailƾ֤µÇ¼SMTPЧÀÍÆ÷·¢ËÍÕì̽ÐÅÏ¢£¬£¬ÒÔÔÊÐí¹¥»÷ÕßÔ¶³Ì»á¼ûÊÜѬȾϵͳ¡£¡£¡£¡£¡£ÓÉÓÚGmailÊÇ¿ÉÐÅЧÀÍ£¬£¬´ËÀà»î¶¯ÄÑÒÔ±»·À»ðǽºÍÖն˼ì²âÓëÏìӦϵͳ£¨EDR£©±ê¼ÇΪ¿ÉÒÉ¡£¡£¡£¡£¡£Ö®ºó£¬£¬Ö²Èë³ÌÐòͨ¹ýWebSocket½¨É賤ÆÚ¡¢¼ÓÃܵÄË«ÏòËíµÀ£¬£¬ÔÊÐí¹¥»÷Õß¾ÙÐÐÄÚ²¿ÖÎÀíÃæ°åºÍAPI»á¼û¡¢Îļþ´«Êä¡¢µç×ÓÓʼþй¶¡¢shellÏÂÁîÖ´ÐС¢Æ¾Ö¤ÍøÂç¼°ºáÏòÒÆ¶¯µÈ²Ù×÷¡£¡£¡£¡£¡£SocketÖ¸³ö£¬£¬ÕâЩ¶ñÒâ°ü¿ÉÄܾßÓÐÇÔÈ¡¼ÓÃÜÇ®±ÒµÄÒâͼ£¬£¬´ÓʹÓõĵç×ÓÓʼþµØµã¼°ÀàËÆÕ½ÂÔÖпÉÒÔ¿´³ö¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-abuse-gmail-websockets-to-hijack-systems/
6. TicketToCashÊý¾Ý¿âÉèÖùýʧÖÂ52Íò¿Í»§Êý¾Ýй¶
5ÔÂ1ÈÕ£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler¿ËÈÕ·¢Ã÷£¬£¬»î¶¯ÃÅÆ±×ªÊÛÆ½Ì¨TicketToCashµÄÒ»¸öÉèÖùýʧ¡¢ÎÞÃÜÂë±£»£»£»£»¤µÄ200GB¹ûÕæÊý¾Ý¿âй¶ÁË52ÍòÃû¿Í»§µÄÊý¾Ý¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨Áè¼Ý52ÍòÌõ¼Í¼£¬£¬Éæ¼°¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¼°²¿·Ö²ÆÎñÏêϸÐÅÏ¢¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý²»µ«°üÀ¨ÐÕÃûºÍµç×ÓÓʼþµØµã£¬£¬»¹º¸ÇÁ˲¿·ÖÐÅÓÿ¨ºÅ¡¢ÏÖʵµØµã¡¢Æ±Ö¤¸±±¾ÒÔ¼°°üÀ¨PIIµÄÎļþ£¬£¬Èç¼ÒͥסַºÍÐÅÓÿ¨ºÅµÈ¡£¡£¡£¡£¡£Êý¾Ý¿âÃû³ÆÏÔʾÆäÒÔ¶àÖÖÊý×ÖÃûÌÃÉúÑĿͻ§Îļþ£¬£¬ÈçPDF¡¢JPG¡¢PNGºÍJSONµÈ¡£¡£¡£¡£¡£FowlerÉó²éÎļþʱ·¢Ã÷£¬£¬ÆäÖаüÀ¨´ó×ÚÒôÀÖ»áºÍÆäËûÏÖ³¡»î¶¯µÄÃÅÆ±¡¢ÃÅÆ±×ªÈÃ֤ʵ¼°¸¶¿îÊÕÌõ½ØÍ¼£¬£¬²¿·ÖÎļþ»¹ÏÔʾÁËÐÅÓÿ¨ºÅ¡¢È«Ãû¡¢µç×ÓÓʼþµØµãºÍ¼ÒͥסַµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹ÜÄÚ²¿ÏßË÷Åú×¢ÕâЩÊý¾ÝÊôÓÚTicketToCash£¬£¬µ«¸Ã¹«Ë¾ÔÚÊÕµ½Í¨Öªºóδ×ö³öÆðÔ´»ØÓ¦£¬£¬Êý¾Ý¿âÔÚµÚ¶þ´Î¾¯±¨Ç°Ò»Ö±´¦ÓÚ̻¶״̬£¬£¬µ¼ÖÂÎļþÔÚËÄÌìÄÚÒ»Á¬Ì»Â¶¡£¡£¡£¡£¡£FowlerÖÒÑԳƣ¬£¬ÕâЩÐÅÏ¢ÈôÂäÈë²»·¨·Ö×ÓÖ®ÊÖ£¬£¬¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ»òÖÆÔìºÍתÊÛα³®µÈÚ²ÆÐÐΪ£¬£¬ÇÒСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢µÄÓÐÓÃÆÚ¿ÉÄܳ¤´ïÊýÄ꣬£¬Ð¹Â¶Ð§¹ûÑÏÖØ¡£¡£¡£¡£¡£
https://hackread.com/ticket-resale-platform-tickettocash-exposed-user-data/