FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶

Ðû²¼Ê±¼ä 2026-02-09

1. FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶


2ÔÂ9ÈÕ £¬£¬×÷ΪSmugMugÆìÏÂÓµÓг¬1ÒÚ×¢²áÓû§¡¢Êý°ÙÍò»îÔ¾ÉãӰʦµÄÕÕÆ¬·ÖÏíÆ½Ì¨ £¬£¬FlickrÓÚ2026Äê2ÔÂ5ÈÕ·¢Ã÷ÆäµÚÈý·½µç×ÓÓʼþЧÀÍÌṩÉ̱£´æÏµÍ³Îó²î £¬£¬¿ÉÄÜÔì³É²¿·ÖÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Ôâδ¾­ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¾Ý¹Ù·½×ª´ï £¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Óû§ÐÕÃû¡¢µç×ÓÓÊÏ䵨µã¡¢IPµØµã¼°ÕË»§»î¶¯¼Í¼ £¬£¬µ«Î´Éæ¼°ÃÜÂë¡¢Ö§¸¶Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£FlickrÔÚ»ñϤÎó²îºóÊýСʱÄÚ¼´¹Ø±ÕÊÜÓ°Ïìϵͳ £¬£¬ÇжÏÓë±£´æÎó²îµÄµÚÈý·½¶ËµãµÄÅþÁ¬ £¬£¬²¢Í¬²½Æô¶¯ÖÜÈ«Çå¾²Éó²é¡£¡£¡£¡£¡£¡£Ö»¹ÜFlickrδÅûÂ¶ÉæÊÂЧÀÍÌṩÉÌÏêϸÉí·Ý¼°ÊÜÓ°ÏìÓû§¹æÄ£ £¬£¬µ«ÒѽÓÄɶàÏîÓ¦¼±²½·¥£ºÁ¬Ã¦Í¨ÖªµÚÈý·½Ð§ÀÍÉÌ¿ªÕ¹Éî¶ÈÊÓ²ì £¬£¬Ç¿»¯¶ÔµÚÈý·½Ð§À͵ĹܿØÁ÷³Ì £¬£¬Í¬Ê±ÏòÏà¹ØÊý¾Ý±£»£»£»£»¤»ú¹¹±¨±¸ÊÂÎñÏêÇé¡£¡£¡£¡£¡£¡£Æ½Ì¨·½Ç¿µ÷ £¬£¬ÒÑͨ¹ýɾ³ý±£´æÎó²îµÄ¶ËµãÁ´½Ó¡¢ÊµÑéϵͳ¼Ü¹¹¼Ó¹ÌµÈ·½·¨ÌáÉýÇå¾²·À»¤Æ·¼¶ £¬£¬²¢ÔÊÐí½«Ò»Á¬¼à¿ØµÚÈý·½Ð§ÀÍÌṩÉ̵ĺϹæÐÔ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/187753/data-breach/flickr-moves-to-contain-data-exposure-warns-users-of-phishing.html


2. ˼¿ÆTalosÆØ¹âDKnife£ºÖÐÎÄÓû§LinuxÍø¹Ø¹¥»÷¿ò¼Ü


2ÔÂ8ÈÕ £¬£¬Ë¼¿ÆTalosÓÚ½üÆÚÅû¶ÃûΪ¡°DKnife¡±µÄLinux¶ñÒ⹤¾ß°ü £¬£¬¸Ã¹¤¾ßÓɯߏö»ùÓÚLinuxµÄÖ²Èë³ÌÐò×é³É £¬£¬×¨ÎªÂ·ÓÉÆ÷ºÍ±ßÑØ×°±¸Éè¼Æ £¬£¬¿ÉÖ´ÐÐÉî¶È°ü¼ì²â¡¢Á÷Á¿Ê¹Óü°¶ñÒâÈí¼þÈö²¥¡£¡£¡£¡£¡£¡£¾Ý±¨¸æ £¬£¬DKnife×Ô2019ÄêÆð±»Ê¹Óà £¬£¬ÆäC2ЧÀÍÆ÷ÖÁ2026Äê1ÔÂÈÔ»îÔ¾ £¬£¬Ö÷ÒªÕë¶ÔÖÐÎÄÓû§ £¬£¬Í¨¹ýÐ®ÖÆÈí¼þÏÂÔØ¡¢°²×¿Ó¦ÓøüУ¨Èç΢ÐÅ¡¢Öйú³ö×â³µ/ÍøÔ¼³µÓ¦Óã©Èö²¥ShadowPadºÍDarkNimbusºóÃÅ £¬£¬ÇÔÈ¡ÖйúЧÀÍÆ¾Ö¤¼°ÈÈÃÅÓ¦ÓÃÊý¾Ý¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ £¬£¬DKnifeÖ§³ÖÖÐÐÄÈ˹¥»÷£¨AitM£© £¬£¬¿É×èµ²Windows¡¢Android¸üм°¶þ½øÖÆÎļþÏÂÔØ £¬£¬½«Õýµ±ÇëÇóÖØ¶¨ÏòÖÁ¶ñÒâЧÀÍÆ÷ £¬£¬Ì滻Ϊº¬ShadowPad/DarkNimbusµÄ×°ÖóÌÐò¡£¡£¡£¡£¡£¡£Æä¼ÓÃܹæÔò½ÓÄÉQQ TEAÃÜÔ¿½âÃÜ £¬£¬Ê¹Óúó×Ô¶¯É¾³ý¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ß»¹¾ß±¸Á÷Á¿¼ì²âÄ£¿£¿£¿é £¬£¬¿Éʶ±ð²¢×ÌÈÅ360Çå¾²Èí¼þ¡¢ÌÚѶЧÀ͵ÈÇå¾²²úÆ·µÄͨѶ £¬£¬Í¨¹ýαÔìTCP RSTÊý¾Ý°ü×è¶ÏÁ÷Á¿ £¬£¬½µµÍÊܺ¦Õß×°±¸·À»¤ÄÜÁ¦¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/187716/malware/dknife-toolkit-abuses-routers-to-spy-and-deliver-malware-since-2019.html


3. BridgePayÖ§¸¶Íø¹ØÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÌìÏÂЧÀÍÖÐÖ¹


2ÔÂ6ÈÕ £¬£¬ÃÀ¹ú´óÐÍÖ§¸¶Íø¹ØÌṩÉÌBridgePay Network SolutionsÔâÓöÀÕË÷Èí¼þ¹¥»÷ £¬£¬µ¼ÖÂÆä½¹µãÖ§¸¶ÏµÍ³ÌìÏÂÐÔ̱»¾ £¬£¬Òý·¢´ó¹æÄ£Ð§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£ÊÂÎñʼÓÚÖÜÎ寯Ïþ £¬£¬¼à¿ØÏµÍ³ÂÊÏÈ·¢Ã÷¡°Gateway.Itstgate.com - ÐéÄâÖÕ¶Ë¡¢±¨¸æ¡¢API¡±µÈÒªº¦Ð§ÀÍÐÔÄÜϽµ £¬£¬Ëæºó¶à¸ö½¹µãÉú²úϵͳ£¨ÈçBridgePayÍø¹ØAPI¡¢PayGuardianÔÆAPI¡¢MyBridgePayÐéÄâÖÕ¶Ë¡¢ÍйÜÖ§¸¶Ò³Ãæ¼°PathwayLinkÃÅ»§£©·ºÆð¼äЪÐÔ½µ¼¶ £¬£¬×îÖÕÑݱäΪÖÜȫ̱»¾¡£¡£¡£¡£¡£¡£BridgePayÔÚµ±ÈÕÍíЩʱ¼ä֤ʵ £¬£¬´Ë´ÎÖÐÖ¹ÓÉÀÕË÷Èí¼þ¹¥»÷Òý·¢ £¬£¬²¢ÒÑÁªºÏÁª°îÊÓ²ì¾Ö¡¢ÃÀ¹úÌØÇÚ¾Ö¼°Íⲿȡ֤ÍŶÓÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷ £¬£¬ÆðԴȡ֤ÏÔʾÎÞÖ§¸¶¿¨Êý¾Ýй¶ £¬£¬±»»á¼ûÎļþ¾ùÒѼÓÃÜ £¬£¬ÏÖÔÚ¡°ÎÞÖ¤¾ÝÅú×¢±£´æ¿ÉÓÃÊý¾Ýй¶¡±¡£¡£¡£¡£¡£¡£È»¶ø £¬£¬ÀÕË÷Èí¼þ¹¥»÷ÒÑÔì³ÉÑÏÖØÏÖʵӰÏì £¬£¬ÌìÏÂ¶àµØÉ̼ÒÒòÒøÐп¨´¦Öóͷ£ÏµÍ³¹ÊÕϱ»ÆÈ½ö½ÓÊÜÏÖ½ðÖ§¸¶ £¬£¬·ðÂÞÀï´ïÖÝרéµÍåÊÐÕþ¸®ÔÚÏßÕ˵¥Ö§¸¶ÃÅ»§Ì±»¾ £¬£¬½¨ÒéÊÐÃñͨ¹ýÏÖ½ð¡¢ÒøÐп¨»ò֧ƱÏÖ³¡Ö§¸¶ £¬£¬²¿·Ö»ú¹¹ÉõÖÁÐèµç»°Ö§¸¶¡£¡£¡£¡£¡£¡£Lightspeed Commerce¡¢ThriftTrac¼°µÂ¿ËÈøË¹Öݸ¥Àï˹¿ÆÊÐµÈÆäËû×éÖ¯Ò౨¸æÐ§ÀÍÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/


4. CISA½«React Native¼°SmarterMailÎó²îÌíÖÁKEVĿ¼


2ÔÂ6ÈÕ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SmarterTools SmarterMailºÍReact Native Community CLIµÄÁ½¸ö¸ßΣÎó²îCVE-2025-11953ÓëCVE-2026-24423Ìí¼ÓÖÁÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼ £¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê2ÔÂ26ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£CVE-2025-11953ÊÇReact Native Community CLIµÄMetro¿ª·¢Ð§ÀÍÆ÷±£´æµÄ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷ĬÈϰó¶¨Íⲿ½Ó¿Ú £¬£¬Ì»Â¶Ò×Êܹ¥»÷µÄ¶Ëµã £¬£¬Î´¾­ÈÏÖ¤µÄ¹¥»÷Õ߿ɷ¢ËÍPOSTÇëÇóÔÚWindowsϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî £¬£¬ÉõÖÁÔËÐÐÍêÈ«¿É¿ØµÄshell¾ç±¾¡£¡£¡£¡£¡£¡£VulnCheckÑо¿ÏÔʾ £¬£¬¸ÃÎó²î×Ô2025Äê12ÔÂÆðÒѱ»Ò»Á¬Ê¹Óà £¬£¬¹¥»÷Õßͨ¹ý¶à½×¶ÎBase64±àÂëµÄPowerShell¼ÓÔØÆ÷½ûÓÃÇå¾²Èí¼þ¡¢ÏÂÔØ²¢Ö´ÐжñÒâ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£¡£CVE-2026-24423ÊÇSmarterTools SmarterMail£¨9511°æ±¾Ç°£©µÄConnectToHub APIÒªÁìÖб£´æµÄδÈÏÖ¤Ô¶³Ì´úÂëÖ´ÐÐÎó²î £¬£¬CVSSÆÀ·Ö¸ß´ï9.3¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÖ¸µ¼SmarterMailÅþÁ¬¶ñÒâHTTPЧÀÍÆ÷ £¬£¬´¥·¢¶ñÒâÏÂÁîÖ´ÐС£¡£¡£¡£¡£¡£¸ÃÎó²îÓɶàÍŶÓÁªºÏ±¨¸æ £¬£¬SmarterToolsÒÑÔÚBuild 9511°æ±¾ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/187675/security/u-s-cisa-adds-smartertools-smartermail-and-react-native-community-cli-flaws-to-its-known-exploited-vulnerabilities-catalog.html


5. Ó¢¹úÐÞ½¨¹«Ë¾ÔâPrometei½©Ê¬ÍøÂç¹¥»÷


2ÔÂ8ÈÕ £¬£¬Ò»¼ÒÓ¢¹úÐÞ½¨¹«Ë¾ÔÚÆäWindowsЧÀÍÆ÷ÉÏ·¢Ã÷ÃûΪ"Êý×ÖµØÓü×â»§"µÄÒþ²ØÈëÇÖÕß¡£¡£¡£¡£¡£¡£¾­eSentireÍþвÏìÓ¦²¿·Ö£¨TRU£©ÅÐ¶Ï £¬£¬ÈëÇÖÕßΪÓë¶íÂÞ˹¹ØÁªµÄPrometei½©Ê¬ÍøÂç £¬£¬×Ô2016ÄêÆðÒ»Á¬»îÔ¾µÄ¶ñÒâ³ÌÐò £¬£¬Æä½¹µã¹¦Ð§ËäΪÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò £¬£¬µ«TRUÑо¿Ö¤ÊµÆäͬÑùÉÆÓÚÃÜÂëÇÔÈ¡ÓëÔ¶³Ì¿ØÖÆÏµÍ³¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷µÄÏÔÖøÌØÕ÷ÔÚÓÚµÍÊÖÒÕÃż÷£º¹¥»÷Õß½öͨ¹ýÍÆ²âÈõÃÜÂë»òĬÈÏÃÜÂë £¬£¬±ãʹÓÃÔ¶³Ì×ÀÃæÐ­Ò飨RDP£©ÇáËÉ»ñȡϵͳ»á¼ûȨÏÞ £¬£¬Ó¡Ö¤ÁË"ÈõÃÜÂëÈ糨ÃÅ"µÄÇå¾²¾¯Ê¾¡£¡£¡£¡£¡£¡£PrometeiʵΪÍêÕû¹¤¾ß°ü £¬£¬×°ÖúóÔËÐÐUPlugPlayЧÀͲ¢½¨Éèsqhost.exeÎļþ £¬£¬È·±£¿£¿£¿ª»ú×ÔÆô¡£¡£¡£¡£¡£¡£Æä³õʼÓÐÓÃÔØºÉzsvc.exe´ÓPrimesoftex Ltd.¹ØÁªÐ§ÀÍÆ÷ÏÂÔØ £¬£¬¾­¸ß¶È¼ÓÃÜαװ £¬£¬¾ß±¸Òþ²ØÐÔ¡£¡£¡£¡£¡£¡£Îª¹æ±Ü¼ì²â £¬£¬¸Ã¶ñÒâÈí¼þ½ÓÄÉË«ÖØÕ½ÂÔ£ºÒ»·½ÃæÍ¨¹ýWindowsÄÚÖù¤¾ßÍøÂçÅÌËã»úÃû³ÆÓëÊÖÒÕϸ½Ú £¬£¬°²ÅÅMimikatz£¨±ê¼ÇΪmiWalk£©ÇÔÈ¡ÍøÂçÃÜÂë £¬£¬²¢Ê¹ÓÃTORÄäÃûÍøÂç·ÓÉÁ÷Á¿£»£»£»£»ÁíÒ»·½ÃæÊµÑé"ɳÏäÈÆ¹ý" £¬£¬ÈôÎÞ·¨ÕÒµ½mshlpda32.dll½â°üÎļþ £¬£¬ÔòÖ´ÐÐÐéαϵͳʹÃüαװÎÞº¦ÐÐΪ¡£¡£¡£¡£¡£¡£


https://hackread.com/uk-construction-firm-prometei-botnet-windows-server/


6. ¡°Ó°×ÓÐж¯¡±½ÒÃØ£º¹ú¼ÒÖ§³Ö×éÖ¯ÉøÍ¸¶à¹úÒªº¦ÉèÊ©


2ÔÂ7ÈÕ £¬£¬Óɹú¼ÒÖ§³ÖµÄÍþв×éÖ¯TGR-STA-1030/UNC6619ÌᳫµÄ¡°Ó°×ÓÐж¯¡±ÒÑÔÚÈ«Çò¹æÄ£ÄÚÕö¿ª´ó¹æÄ£ÍøÂç¹¥»÷ £¬£¬ÉøÍ¸37¸ö¹ú¼ÒµÄ70Óà¸öÕþ¸®¼°Òªº¦»ù´¡ÉèʩʵÌå¡£¡£¡£¡£¡£¡£¾ÝPalo Alto Networks Unit 42²¿·ÖÅû¶ £¬£¬¸Ã×éÖ¯×Ô2024Äê1ÔÂÆð»îÔ¾ÓÚÑÇÖÞ £¬£¬Æä¹¥»÷Ä¿µÄº­¸ÇÕþ¸®¡¢Ö´·¨¡¢ÁìÍÁ¹ÜÖÆ¡¢ÄÜÔ´¡¢½ðÈÚ¡¢Íâ½»µÈÕ½ÂÔÁìÓò £¬£¬°üÀ¨ÃÀÖÞÉÌÒµÕþ²ß»ú¹¹¡¢Å·ÖÞ¶à¹úÒé»á¡¢°Ä´óÀûÑDzÆÎñ²¿¼°Ì¨ÍåµçÁ¦×°±¸¹©Ó¦É̵ȡ£¡£¡£¡£¡£¡£¹¥»÷ÊֶηºÆð¸ß¶È¶¨ÖÆ»¯Óë¶àά¶ÈÌØÕ÷¡£¡£¡£¡£¡£¡£ÔçÆÚͨ¹ý´¹ÂÚÓʼþͶµÝº¬ÍâµØ¼ÙÃû³ÆµÄ¶ñÒâѹËõÎļþ £¬£¬Ê¹ÓÃMega.nz´æ´¢Ð§ÀÍÓÕµ¼Ä¿µÄÏÂÔØ £¬£¬Á¬ÏµÇéÐμì²é¹æ±ÜɳÏä¼ì²â £¬£¬²¢¼ÓÔØCobalt Strike¼°VShell¿ò¼ÜʵÑéÏÂÁî¿ØÖÆ¡£¡£¡£¡£¡£¡£×éÖ¯»¹Ê¹ÓÃ15¸öÒÑÖªÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ £¬£¬²¢°²ÅŶ¨ÖÆLinux rootkit¡°ShadowGuard¡± £¬£¬¸Ã¹¤¾ß»ùÓÚeBPFÄÚºËÊÖÒÕ £¬£¬¿ÉÒþ²Ø×î¶à32¸öPID¼°¡°swsecret¡±Îļþ £¬£¬Í¨¹ýϵͳŲÓÃ×èµ²ÌÓ±Ü¼à¿Ø £¬£¬Í¬Ê±ÔÊÐí²Ù×÷Õß½ç˵¿É¼ûÀú³ÌÒÔ»ìÏýÊӲ졣¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/