FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2026-02-091. FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶
2ÔÂ9ÈÕ£¬£¬×÷ΪSmugMugÆìÏÂÓµÓг¬1ÒÚ×¢²áÓû§¡¢Êý°ÙÍò»îÔ¾ÉãӰʦµÄÕÕÆ¬·ÖÏíÆ½Ì¨£¬£¬FlickrÓÚ2026Äê2ÔÂ5ÈÕ·¢Ã÷ÆäµÚÈý·½µç×ÓÓʼþЧÀÍÌṩÉ̱£´æÏµÍ³Îó²î£¬£¬¿ÉÄÜÔì³É²¿·ÖÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Ôâδ¾ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¾Ý¹Ù·½×ª´ï£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Óû§ÐÕÃû¡¢µç×ÓÓÊÏ䵨µã¡¢IPµØµã¼°ÕË»§»î¶¯¼Í¼£¬£¬µ«Î´Éæ¼°ÃÜÂë¡¢Ö§¸¶Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£FlickrÔÚ»ñϤÎó²îºóÊýСʱÄÚ¼´¹Ø±ÕÊÜÓ°Ïìϵͳ£¬£¬ÇжÏÓë±£´æÎó²îµÄµÚÈý·½¶ËµãµÄÅþÁ¬£¬£¬²¢Í¬²½Æô¶¯ÖÜÈ«Çå¾²Éó²é¡£¡£¡£¡£¡£¡£Ö»¹ÜFlickrδÅûÂ¶ÉæÊÂЧÀÍÌṩÉÌÏêϸÉí·Ý¼°ÊÜÓ°ÏìÓû§¹æÄ££¬£¬µ«ÒѽÓÄɶàÏîÓ¦¼±²½·¥£ºÁ¬Ã¦Í¨ÖªµÚÈý·½Ð§ÀÍÉÌ¿ªÕ¹Éî¶ÈÊӲ죬£¬Ç¿»¯¶ÔµÚÈý·½Ð§À͵ĹܿØÁ÷³Ì£¬£¬Í¬Ê±ÏòÏà¹ØÊý¾Ý±£»£»£»£»¤»ú¹¹±¨±¸ÊÂÎñÏêÇé¡£¡£¡£¡£¡£¡£Æ½Ì¨·½Ç¿µ÷£¬£¬ÒÑͨ¹ýɾ³ý±£´æÎó²îµÄ¶ËµãÁ´½Ó¡¢ÊµÑéϵͳ¼Ü¹¹¼Ó¹ÌµÈ·½·¨ÌáÉýÇå¾²·À»¤Æ·¼¶£¬£¬²¢ÔÊÐí½«Ò»Á¬¼à¿ØµÚÈý·½Ð§ÀÍÌṩÉ̵ĺϹæÐÔ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/187753/data-breach/flickr-moves-to-contain-data-exposure-warns-users-of-phishing.html
2. ˼¿ÆTalosÆØ¹âDKnife£ºÖÐÎÄÓû§LinuxÍø¹Ø¹¥»÷¿ò¼Ü
2ÔÂ8ÈÕ£¬£¬Ë¼¿ÆTalosÓÚ½üÆÚÅû¶ÃûΪ¡°DKnife¡±µÄLinux¶ñÒ⹤¾ß°ü£¬£¬¸Ã¹¤¾ßÓɯߏö»ùÓÚLinuxµÄÖ²Èë³ÌÐò×é³É£¬£¬×¨ÎªÂ·ÓÉÆ÷ºÍ±ßÑØ×°±¸Éè¼Æ£¬£¬¿ÉÖ´ÐÐÉî¶È°ü¼ì²â¡¢Á÷Á¿Ê¹Óü°¶ñÒâÈí¼þÈö²¥¡£¡£¡£¡£¡£¡£¾Ý±¨¸æ£¬£¬DKnife×Ô2019ÄêÆð±»Ê¹Ó㬣¬ÆäC2ЧÀÍÆ÷ÖÁ2026Äê1ÔÂÈÔ»îÔ¾£¬£¬Ö÷ÒªÕë¶ÔÖÐÎÄÓû§£¬£¬Í¨¹ýÐ®ÖÆÈí¼þÏÂÔØ¡¢°²×¿Ó¦ÓøüУ¨Èç΢ÐÅ¡¢Öйú³ö×â³µ/ÍøÔ¼³µÓ¦Óã©Èö²¥ShadowPadºÍDarkNimbusºóÃÅ£¬£¬ÇÔÈ¡ÖйúЧÀÍÆ¾Ö¤¼°ÈÈÃÅÓ¦ÓÃÊý¾Ý¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬DKnifeÖ§³ÖÖÐÐÄÈ˹¥»÷£¨AitM£©£¬£¬¿É×èµ²Windows¡¢Android¸üм°¶þ½øÖÆÎļþÏÂÔØ£¬£¬½«Õýµ±ÇëÇóÖØ¶¨ÏòÖÁ¶ñÒâЧÀÍÆ÷£¬£¬Ì滻Ϊº¬ShadowPad/DarkNimbusµÄ×°ÖóÌÐò¡£¡£¡£¡£¡£¡£Æä¼ÓÃܹæÔò½ÓÄÉQQ TEAÃÜÔ¿½âÃÜ£¬£¬Ê¹Óúó×Ô¶¯É¾³ý¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ß»¹¾ß±¸Á÷Á¿¼ì²âÄ£¿£¿£¿é£¬£¬¿Éʶ±ð²¢×ÌÈÅ360Çå¾²Èí¼þ¡¢ÌÚѶЧÀ͵ÈÇå¾²²úÆ·µÄͨѶ£¬£¬Í¨¹ýαÔìTCP RSTÊý¾Ý°ü×è¶ÏÁ÷Á¿£¬£¬½µµÍÊܺ¦Õß×°±¸·À»¤ÄÜÁ¦¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/187716/malware/dknife-toolkit-abuses-routers-to-spy-and-deliver-malware-since-2019.html
3. BridgePayÖ§¸¶Íø¹ØÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÌìÏÂЧÀÍÖÐÖ¹
2ÔÂ6ÈÕ£¬£¬ÃÀ¹ú´óÐÍÖ§¸¶Íø¹ØÌṩÉÌBridgePay Network SolutionsÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬µ¼ÖÂÆä½¹µãÖ§¸¶ÏµÍ³ÌìÏÂÐÔ̱»¾£¬£¬Òý·¢´ó¹æÄ£Ð§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£ÊÂÎñʼÓÚÖÜÎ寯Ïþ£¬£¬¼à¿ØÏµÍ³ÂÊÏÈ·¢Ã÷¡°Gateway.Itstgate.com - ÐéÄâÖÕ¶Ë¡¢±¨¸æ¡¢API¡±µÈÒªº¦Ð§ÀÍÐÔÄÜϽµ£¬£¬Ëæºó¶à¸ö½¹µãÉú²úϵͳ£¨ÈçBridgePayÍø¹ØAPI¡¢PayGuardianÔÆAPI¡¢MyBridgePayÐéÄâÖÕ¶Ë¡¢ÍйÜÖ§¸¶Ò³Ãæ¼°PathwayLinkÃÅ»§£©·ºÆð¼äЪÐÔ½µ¼¶£¬£¬×îÖÕÑݱäΪÖÜȫ̱»¾¡£¡£¡£¡£¡£¡£BridgePayÔÚµ±ÈÕÍíЩʱ¼ä֤ʵ£¬£¬´Ë´ÎÖÐÖ¹ÓÉÀÕË÷Èí¼þ¹¥»÷Òý·¢£¬£¬²¢ÒÑÁªºÏÁª°îÊÓ²ì¾Ö¡¢ÃÀ¹úÌØÇÚ¾Ö¼°Íⲿȡ֤ÍŶÓÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬ÆðԴȡ֤ÏÔʾÎÞÖ§¸¶¿¨Êý¾Ýй¶£¬£¬±»»á¼ûÎļþ¾ùÒѼÓÃÜ£¬£¬ÏÖÔÚ¡°ÎÞÖ¤¾ÝÅú×¢±£´æ¿ÉÓÃÊý¾Ýй¶¡±¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÒÑÔì³ÉÑÏÖØÏÖʵӰÏ죬£¬ÌìÏÂ¶àµØÉ̼ÒÒòÒøÐп¨´¦Öóͷ£ÏµÍ³¹ÊÕϱ»ÆÈ½ö½ÓÊÜÏÖ½ðÖ§¸¶£¬£¬·ðÂÞÀï´ïÖÝרéµÍåÊÐÕþ¸®ÔÚÏßÕ˵¥Ö§¸¶ÃÅ»§Ì±»¾£¬£¬½¨ÒéÊÐÃñͨ¹ýÏÖ½ð¡¢ÒøÐп¨»ò֧ƱÏÖ³¡Ö§¸¶£¬£¬²¿·Ö»ú¹¹ÉõÖÁÐèµç»°Ö§¸¶¡£¡£¡£¡£¡£¡£Lightspeed Commerce¡¢ThriftTrac¼°µÂ¿ËÈøË¹Öݸ¥Àï˹¿ÆÊÐµÈÆäËû×éÖ¯Ò౨¸æÐ§ÀÍÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/
4. CISA½«React Native¼°SmarterMailÎó²îÌíÖÁKEVĿ¼
2ÔÂ6ÈÕ£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SmarterTools SmarterMailºÍReact Native Community CLIµÄÁ½¸ö¸ßΣÎó²îCVE-2025-11953ÓëCVE-2026-24423Ìí¼ÓÖÁÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê2ÔÂ26ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£CVE-2025-11953ÊÇReact Native Community CLIµÄMetro¿ª·¢Ð§ÀÍÆ÷±£´æµÄ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷ĬÈϰó¶¨Íⲿ½Ó¿Ú£¬£¬Ì»Â¶Ò×Êܹ¥»÷µÄ¶Ëµã£¬£¬Î´¾ÈÏÖ¤µÄ¹¥»÷Õ߿ɷ¢ËÍPOSTÇëÇóÔÚWindowsϵͳÉÏÖ´ÐÐí§ÒâÏÂÁ£¬ÉõÖÁÔËÐÐÍêÈ«¿É¿ØµÄshell¾ç±¾¡£¡£¡£¡£¡£¡£VulnCheckÑо¿ÏÔʾ£¬£¬¸ÃÎó²î×Ô2025Äê12ÔÂÆðÒѱ»Ò»Á¬Ê¹Ó㬣¬¹¥»÷Õßͨ¹ý¶à½×¶ÎBase64±àÂëµÄPowerShell¼ÓÔØÆ÷½ûÓÃÇå¾²Èí¼þ¡¢ÏÂÔØ²¢Ö´ÐжñÒâ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£¡£CVE-2026-24423ÊÇSmarterTools SmarterMail£¨9511°æ±¾Ç°£©µÄConnectToHub APIÒªÁìÖб£´æµÄδÈÏÖ¤Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬CVSSÆÀ·Ö¸ß´ï9.3¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÖ¸µ¼SmarterMailÅþÁ¬¶ñÒâHTTPЧÀÍÆ÷£¬£¬´¥·¢¶ñÒâÏÂÁîÖ´ÐС£¡£¡£¡£¡£¡£¸ÃÎó²îÓɶàÍŶÓÁªºÏ±¨¸æ£¬£¬SmarterToolsÒÑÔÚBuild 9511°æ±¾ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/187675/security/u-s-cisa-adds-smartertools-smartermail-and-react-native-community-cli-flaws-to-its-known-exploited-vulnerabilities-catalog.html
5. Ó¢¹úÐÞ½¨¹«Ë¾ÔâPrometei½©Ê¬ÍøÂç¹¥»÷
2ÔÂ8ÈÕ£¬£¬Ò»¼ÒÓ¢¹úÐÞ½¨¹«Ë¾ÔÚÆäWindowsЧÀÍÆ÷ÉÏ·¢Ã÷ÃûΪ"Êý×ÖµØÓü×â»§"µÄÒþ²ØÈëÇÖÕß¡£¡£¡£¡£¡£¡£¾eSentireÍþвÏìÓ¦²¿·Ö£¨TRU£©Åжϣ¬£¬ÈëÇÖÕßΪÓë¶íÂÞ˹¹ØÁªµÄPrometei½©Ê¬ÍøÂ磬£¬×Ô2016ÄêÆðÒ»Á¬»îÔ¾µÄ¶ñÒâ³ÌÐò£¬£¬Æä½¹µã¹¦Ð§ËäΪÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò£¬£¬µ«TRUÑо¿Ö¤ÊµÆäͬÑùÉÆÓÚÃÜÂëÇÔÈ¡ÓëÔ¶³Ì¿ØÖÆÏµÍ³¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷µÄÏÔÖøÌØÕ÷ÔÚÓÚµÍÊÖÒÕÃż÷£º¹¥»÷Õß½öͨ¹ýÍÆ²âÈõÃÜÂë»òĬÈÏÃÜÂ룬£¬±ãʹÓÃÔ¶³Ì×ÀÃæÐÒ飨RDP£©ÇáËÉ»ñȡϵͳ»á¼ûȨÏÞ£¬£¬Ó¡Ö¤ÁË"ÈõÃÜÂëÈ糨ÃÅ"µÄÇå¾²¾¯Ê¾¡£¡£¡£¡£¡£¡£PrometeiʵΪÍêÕû¹¤¾ß°ü£¬£¬×°ÖúóÔËÐÐUPlugPlayЧÀͲ¢½¨Éèsqhost.exeÎļþ£¬£¬È·±£¿£¿£¿ª»ú×ÔÆô¡£¡£¡£¡£¡£¡£Æä³õʼÓÐÓÃÔØºÉzsvc.exe´ÓPrimesoftex Ltd.¹ØÁªÐ§ÀÍÆ÷ÏÂÔØ£¬£¬¾¸ß¶È¼ÓÃÜαװ£¬£¬¾ß±¸Òþ²ØÐÔ¡£¡£¡£¡£¡£¡£Îª¹æ±Ü¼ì²â£¬£¬¸Ã¶ñÒâÈí¼þ½ÓÄÉË«ÖØÕ½ÂÔ£ºÒ»·½ÃæÍ¨¹ýWindowsÄÚÖù¤¾ßÍøÂçÅÌËã»úÃû³ÆÓëÊÖÒÕϸ½Ú£¬£¬°²ÅÅMimikatz£¨±ê¼ÇΪmiWalk£©ÇÔÈ¡ÍøÂçÃÜÂ룬£¬²¢Ê¹ÓÃTORÄäÃûÍøÂç·ÓÉÁ÷Á¿£»£»£»£»ÁíÒ»·½ÃæÊµÑé"ɳÏäÈÆ¹ý"£¬£¬ÈôÎÞ·¨ÕÒµ½mshlpda32.dll½â°üÎļþ£¬£¬ÔòÖ´ÐÐÐéαϵͳʹÃüαװÎÞº¦ÐÐΪ¡£¡£¡£¡£¡£¡£
https://hackread.com/uk-construction-firm-prometei-botnet-windows-server/
6. ¡°Ó°×ÓÐж¯¡±½ÒÃØ£º¹ú¼ÒÖ§³Ö×éÖ¯ÉøÍ¸¶à¹úÒªº¦ÉèÊ©
2ÔÂ7ÈÕ£¬£¬Óɹú¼ÒÖ§³ÖµÄÍþв×éÖ¯TGR-STA-1030/UNC6619ÌᳫµÄ¡°Ó°×ÓÐж¯¡±ÒÑÔÚÈ«Çò¹æÄ£ÄÚÕö¿ª´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬ÉøÍ¸37¸ö¹ú¼ÒµÄ70Óà¸öÕþ¸®¼°Òªº¦»ù´¡ÉèʩʵÌå¡£¡£¡£¡£¡£¡£¾ÝPalo Alto Networks Unit 42²¿·ÖÅû¶£¬£¬¸Ã×éÖ¯×Ô2024Äê1ÔÂÆð»îÔ¾ÓÚÑÇÖÞ£¬£¬Æä¹¥»÷Ä¿µÄº¸ÇÕþ¸®¡¢Ö´·¨¡¢ÁìÍÁ¹ÜÖÆ¡¢ÄÜÔ´¡¢½ðÈÚ¡¢Íâ½»µÈÕ½ÂÔÁìÓò£¬£¬°üÀ¨ÃÀÖÞÉÌÒµÕþ²ß»ú¹¹¡¢Å·ÖÞ¶à¹úÒé»á¡¢°Ä´óÀûÑDzÆÎñ²¿¼°Ì¨ÍåµçÁ¦×°±¸¹©Ó¦É̵ȡ£¡£¡£¡£¡£¡£¹¥»÷ÊֶηºÆð¸ß¶È¶¨ÖÆ»¯Óë¶àά¶ÈÌØÕ÷¡£¡£¡£¡£¡£¡£ÔçÆÚͨ¹ý´¹ÂÚÓʼþͶµÝº¬ÍâµØ¼ÙÃû³ÆµÄ¶ñÒâѹËõÎļþ£¬£¬Ê¹ÓÃMega.nz´æ´¢Ð§ÀÍÓÕµ¼Ä¿µÄÏÂÔØ£¬£¬Á¬ÏµÇéÐμì²é¹æ±ÜɳÏä¼ì²â£¬£¬²¢¼ÓÔØCobalt Strike¼°VShell¿ò¼ÜʵÑéÏÂÁî¿ØÖÆ¡£¡£¡£¡£¡£¡£×éÖ¯»¹Ê¹ÓÃ15¸öÒÑÖªÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬²¢°²ÅŶ¨ÖÆLinux rootkit¡°ShadowGuard¡±£¬£¬¸Ã¹¤¾ß»ùÓÚeBPFÄÚºËÊÖÒÕ£¬£¬¿ÉÒþ²Ø×î¶à32¸öPID¼°¡°swsecret¡±Îļþ£¬£¬Í¨¹ýϵͳŲÓÃ×èµ²ÌÓ±Ü¼à¿Ø£¬£¬Í¬Ê±ÔÊÐí²Ù×÷Õß½ç˵¿É¼ûÀú³ÌÒÔ»ìÏýÊӲ졣¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/


¾©¹«Íø°²±¸11010802024551ºÅ