FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2026-02-091. FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶
2ÔÂ9ÈÕ£¬£¬£¬£¬×÷ΪSmugMugÆìÏÂÓµÓг¬1ÒÚ×¢²áÓû§¡¢Êý°ÙÍò»îÔ¾ÉãӰʦµÄÕÕÆ¬·ÖÏíÆ½Ì¨£¬£¬£¬£¬FlickrÓÚ2026Äê2ÔÂ5ÈÕ·¢Ã÷ÆäµÚÈý·½µç×ÓÓʼþЧÀÍÌṩÉ̱£´æÏµÍ³Îó²î£¬£¬£¬£¬¿ÉÄÜÔì³É²¿·ÖÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Ôâδ¾ÊÚȨ»á¼û¡£¡£¡£¾Ý¹Ù·½×ª´ï£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Óû§ÐÕÃû¡¢µç×ÓÓÊÏ䵨µã¡¢IPµØµã¼°ÕË»§»î¶¯¼Í¼£¬£¬£¬£¬µ«Î´Éæ¼°ÃÜÂë¡¢Ö§¸¶Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£FlickrÔÚ»ñϤÎó²îºóÊýСʱÄÚ¼´¹Ø±ÕÊÜÓ°Ïìϵͳ£¬£¬£¬£¬ÇжÏÓë±£´æÎó²îµÄµÚÈý·½¶ËµãµÄÅþÁ¬£¬£¬£¬£¬²¢Í¬²½Æô¶¯ÖÜÈ«Çå¾²Éó²é¡£¡£¡£Ö»¹ÜFlickrδÅûÂ¶ÉæÊÂЧÀÍÌṩÉÌÏêϸÉí·Ý¼°ÊÜÓ°ÏìÓû§¹æÄ££¬£¬£¬£¬µ«ÒѽÓÄɶàÏîÓ¦¼±²½·¥£ºÁ¬Ã¦Í¨ÖªµÚÈý·½Ð§ÀÍÉÌ¿ªÕ¹Éî¶ÈÊӲ죬£¬£¬£¬Ç¿»¯¶ÔµÚÈý·½Ð§À͵ĹܿØÁ÷³Ì£¬£¬£¬£¬Í¬Ê±ÏòÏà¹ØÊý¾Ý±£»£»£»£»£»£»£»¤»ú¹¹±¨±¸ÊÂÎñÏêÇé¡£¡£¡£Æ½Ì¨·½Ç¿µ÷£¬£¬£¬£¬ÒÑͨ¹ýɾ³ý±£´æÎó²îµÄ¶ËµãÁ´½Ó¡¢ÊµÑéϵͳ¼Ü¹¹¼Ó¹ÌµÈ·½·¨ÌáÉýÇå¾²·À»¤Æ·¼¶£¬£¬£¬£¬²¢ÔÊÐí½«Ò»Á¬¼à¿ØµÚÈý·½Ð§ÀÍÌṩÉ̵ĺϹæÐÔ¡£¡£¡£
https://securityaffairs.com/187753/data-breach/flickr-moves-to-contain-data-exposure-warns-users-of-phishing.html
2. ˼¿ÆTalosÆØ¹âDKnife£ºÖÐÎÄÓû§LinuxÍø¹Ø¹¥»÷¿ò¼Ü
2ÔÂ8ÈÕ£¬£¬£¬£¬Ë¼¿ÆTalosÓÚ½üÆÚÅû¶ÃûΪ¡°DKnife¡±µÄLinux¶ñÒ⹤¾ß°ü£¬£¬£¬£¬¸Ã¹¤¾ßÓɯߏö»ùÓÚLinuxµÄÖ²Èë³ÌÐò×é³É£¬£¬£¬£¬×¨ÎªÂ·ÓÉÆ÷ºÍ±ßÑØ×°±¸Éè¼Æ£¬£¬£¬£¬¿ÉÖ´ÐÐÉî¶È°ü¼ì²â¡¢Á÷Á¿Ê¹Óü°¶ñÒâÈí¼þÈö²¥¡£¡£¡£¾Ý±¨¸æ£¬£¬£¬£¬DKnife×Ô2019ÄêÆð±»Ê¹Ó㬣¬£¬£¬ÆäC2ЧÀÍÆ÷ÖÁ2026Äê1ÔÂÈÔ»îÔ¾£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÐÎÄÓû§£¬£¬£¬£¬Í¨¹ýÐ®ÖÆÈí¼þÏÂÔØ¡¢°²×¿Ó¦ÓøüУ¨Èç΢ÐÅ¡¢Öйú³ö×â³µ/ÍøÔ¼³µÓ¦Óã©Èö²¥ShadowPadºÍDarkNimbusºóÃÅ£¬£¬£¬£¬ÇÔÈ¡ÖйúЧÀÍÆ¾Ö¤¼°ÈÈÃÅÓ¦ÓÃÊý¾Ý¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬DKnifeÖ§³ÖÖÐÐÄÈ˹¥»÷£¨AitM£©£¬£¬£¬£¬¿É×èµ²Windows¡¢Android¸üм°¶þ½øÖÆÎļþÏÂÔØ£¬£¬£¬£¬½«Õýµ±ÇëÇóÖØ¶¨ÏòÖÁ¶ñÒâЧÀÍÆ÷£¬£¬£¬£¬Ì滻Ϊº¬ShadowPad/DarkNimbusµÄ×°ÖóÌÐò¡£¡£¡£Æä¼ÓÃܹæÔò½ÓÄÉQQ TEAÃÜÔ¿½âÃÜ£¬£¬£¬£¬Ê¹Óúó×Ô¶¯É¾³ý¡£¡£¡£¸Ã¹¤¾ß»¹¾ß±¸Á÷Á¿¼ì²âÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬¿Éʶ±ð²¢×ÌÈÅ360Çå¾²Èí¼þ¡¢ÌÚѶЧÀ͵ÈÇå¾²²úÆ·µÄͨѶ£¬£¬£¬£¬Í¨¹ýαÔìTCP RSTÊý¾Ý°ü×è¶ÏÁ÷Á¿£¬£¬£¬£¬½µµÍÊܺ¦Õß×°±¸·À»¤ÄÜÁ¦¡£¡£¡£
https://securityaffairs.com/187716/malware/dknife-toolkit-abuses-routers-to-spy-and-deliver-malware-since-2019.html
3. BridgePayÖ§¸¶Íø¹ØÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÌìÏÂЧÀÍÖÐÖ¹
2ÔÂ6ÈÕ£¬£¬£¬£¬ÃÀ¹ú´óÐÍÖ§¸¶Íø¹ØÌṩÉÌBridgePay Network SolutionsÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼ÖÂÆä½¹µãÖ§¸¶ÏµÍ³ÌìÏÂÐÔ̱»¾£¬£¬£¬£¬Òý·¢´ó¹æÄ£Ð§ÀÍÖÐÖ¹¡£¡£¡£ÊÂÎñʼÓÚÖÜÎ寯Ïþ£¬£¬£¬£¬¼à¿ØÏµÍ³ÂÊÏÈ·¢Ã÷¡°Gateway.Itstgate.com - ÐéÄâÖÕ¶Ë¡¢±¨¸æ¡¢API¡±µÈÒªº¦Ð§ÀÍÐÔÄÜϽµ£¬£¬£¬£¬Ëæºó¶à¸ö½¹µãÉú²úϵͳ£¨ÈçBridgePayÍø¹ØAPI¡¢PayGuardianÔÆAPI¡¢MyBridgePayÐéÄâÖÕ¶Ë¡¢ÍйÜÖ§¸¶Ò³Ãæ¼°PathwayLinkÃÅ»§£©·ºÆð¼äЪÐÔ½µ¼¶£¬£¬£¬£¬×îÖÕÑݱäΪÖÜȫ̱»¾¡£¡£¡£BridgePayÔÚµ±ÈÕÍíЩʱ¼ä֤ʵ£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉÀÕË÷Èí¼þ¹¥»÷Òý·¢£¬£¬£¬£¬²¢ÒÑÁªºÏÁª°îÊÓ²ì¾Ö¡¢ÃÀ¹úÌØÇÚ¾Ö¼°Íⲿȡ֤ÍŶÓÕö¿ªÊӲ졣¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬ÆðԴȡ֤ÏÔʾÎÞÖ§¸¶¿¨Êý¾Ýй¶£¬£¬£¬£¬±»»á¼ûÎļþ¾ùÒѼÓÃÜ£¬£¬£¬£¬ÏÖÔÚ¡°ÎÞÖ¤¾ÝÅú×¢±£´æ¿ÉÓÃÊý¾Ýй¶¡±¡£¡£¡£È»¶ø£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÒÑÔì³ÉÑÏÖØÏÖʵӰÏ죬£¬£¬£¬ÌìÏÂ¶àµØÉ̼ÒÒòÒøÐп¨´¦Öóͷ£ÏµÍ³¹ÊÕϱ»ÆÈ½ö½ÓÊÜÏÖ½ðÖ§¸¶£¬£¬£¬£¬·ðÂÞÀï´ïÖÝרéµÍåÊÐÕþ¸®ÔÚÏßÕ˵¥Ö§¸¶ÃÅ»§Ì±»¾£¬£¬£¬£¬½¨ÒéÊÐÃñͨ¹ýÏÖ½ð¡¢ÒøÐп¨»ò֧ƱÏÖ³¡Ö§¸¶£¬£¬£¬£¬²¿·Ö»ú¹¹ÉõÖÁÐèµç»°Ö§¸¶¡£¡£¡£Lightspeed Commerce¡¢ThriftTrac¼°µÂ¿ËÈøË¹Öݸ¥Àï˹¿ÆÊÐµÈÆäËû×éÖ¯Ò౨¸æÐ§ÀÍÊÜÓ°Ïì¡£¡£¡£
https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/
4. CISA½«React Native¼°SmarterMailÎó²îÌíÖÁKEVĿ¼
2ÔÂ6ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SmarterTools SmarterMailºÍReact Native Community CLIµÄÁ½¸ö¸ßΣÎó²îCVE-2025-11953ÓëCVE-2026-24423Ìí¼ÓÖÁÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê2ÔÂ26ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£CVE-2025-11953ÊÇReact Native Community CLIµÄMetro¿ª·¢Ð§ÀÍÆ÷±£´æµÄ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î¡£¡£¡£¸ÃЧÀÍÆ÷ĬÈϰó¶¨Íⲿ½Ó¿Ú£¬£¬£¬£¬Ì»Â¶Ò×Êܹ¥»÷µÄ¶Ëµã£¬£¬£¬£¬Î´¾ÈÏÖ¤µÄ¹¥»÷Õ߿ɷ¢ËÍPOSTÇëÇóÔÚWindowsϵͳÉÏÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬ÉõÖÁÔËÐÐÍêÈ«¿É¿ØµÄshell¾ç±¾¡£¡£¡£VulnCheckÑо¿ÏÔʾ£¬£¬£¬£¬¸ÃÎó²î×Ô2025Äê12ÔÂÆðÒѱ»Ò»Á¬Ê¹Ó㬣¬£¬£¬¹¥»÷Õßͨ¹ý¶à½×¶ÎBase64±àÂëµÄPowerShell¼ÓÔØÆ÷½ûÓÃÇå¾²Èí¼þ¡¢ÏÂÔØ²¢Ö´ÐжñÒâ¶þ½øÖÆÎļþ¡£¡£¡£CVE-2026-24423ÊÇSmarterTools SmarterMail£¨9511°æ±¾Ç°£©µÄConnectToHub APIÒªÁìÖб£´æµÄδÈÏÖ¤Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.3¡£¡£¡£¹¥»÷Õß¿ÉÖ¸µ¼SmarterMailÅþÁ¬¶ñÒâHTTPЧÀÍÆ÷£¬£¬£¬£¬´¥·¢¶ñÒâÏÂÁîÖ´ÐС£¡£¡£¸ÃÎó²îÓɶàÍŶÓÁªºÏ±¨¸æ£¬£¬£¬£¬SmarterToolsÒÑÔÚBuild 9511°æ±¾ÖÐÐÞ¸´¡£¡£¡£
https://securityaffairs.com/187675/security/u-s-cisa-adds-smartertools-smartermail-and-react-native-community-cli-flaws-to-its-known-exploited-vulnerabilities-catalog.html
5. Ó¢¹úÐÞ½¨¹«Ë¾ÔâPrometei½©Ê¬ÍøÂç¹¥»÷
2ÔÂ8ÈÕ£¬£¬£¬£¬Ò»¼ÒÓ¢¹úÐÞ½¨¹«Ë¾ÔÚÆäWindowsЧÀÍÆ÷ÉÏ·¢Ã÷ÃûΪ"Êý×ÖµØÓü×â»§"µÄÒþ²ØÈëÇÖÕß¡£¡£¡£¾eSentireÍþвÏìÓ¦²¿·Ö£¨TRU£©Åжϣ¬£¬£¬£¬ÈëÇÖÕßΪÓë¶íÂÞ˹¹ØÁªµÄPrometei½©Ê¬ÍøÂ磬£¬£¬£¬×Ô2016ÄêÆðÒ»Á¬»îÔ¾µÄ¶ñÒâ³ÌÐò£¬£¬£¬£¬Æä½¹µã¹¦Ð§ËäΪÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò£¬£¬£¬£¬µ«TRUÑо¿Ö¤ÊµÆäͬÑùÉÆÓÚÃÜÂëÇÔÈ¡ÓëÔ¶³Ì¿ØÖÆÏµÍ³¡£¡£¡£¸Ã¹¥»÷µÄÏÔÖøÌØÕ÷ÔÚÓÚµÍÊÖÒÕÃż÷£º¹¥»÷Õß½öͨ¹ýÍÆ²âÈõÃÜÂë»òĬÈÏÃÜÂ룬£¬£¬£¬±ãʹÓÃÔ¶³Ì×ÀÃæÐÒ飨RDP£©ÇáËÉ»ñȡϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬Ó¡Ö¤ÁË"ÈõÃÜÂëÈ糨ÃÅ"µÄÇå¾²¾¯Ê¾¡£¡£¡£PrometeiʵΪÍêÕû¹¤¾ß°ü£¬£¬£¬£¬×°ÖúóÔËÐÐUPlugPlayЧÀͲ¢½¨Éèsqhost.exeÎļþ£¬£¬£¬£¬È·±£¿£¿£¿£¿£¿£¿ª»ú×ÔÆô¡£¡£¡£Æä³õʼÓÐÓÃÔØºÉzsvc.exe´ÓPrimesoftex Ltd.¹ØÁªÐ§ÀÍÆ÷ÏÂÔØ£¬£¬£¬£¬¾¸ß¶È¼ÓÃÜαװ£¬£¬£¬£¬¾ß±¸Òþ²ØÐÔ¡£¡£¡£Îª¹æ±Ü¼ì²â£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ½ÓÄÉË«ÖØÕ½ÂÔ£ºÒ»·½ÃæÍ¨¹ýWindowsÄÚÖù¤¾ßÍøÂçÅÌËã»úÃû³ÆÓëÊÖÒÕϸ½Ú£¬£¬£¬£¬°²ÅÅMimikatz£¨±ê¼ÇΪmiWalk£©ÇÔÈ¡ÍøÂçÃÜÂ룬£¬£¬£¬²¢Ê¹ÓÃTORÄäÃûÍøÂç·ÓÉÁ÷Á¿£»£»£»£»£»£»£»ÁíÒ»·½ÃæÊµÑé"ɳÏäÈÆ¹ý"£¬£¬£¬£¬ÈôÎÞ·¨ÕÒµ½mshlpda32.dll½â°üÎļþ£¬£¬£¬£¬ÔòÖ´ÐÐÐéαϵͳʹÃüαװÎÞº¦ÐÐΪ¡£¡£¡£
https://hackread.com/uk-construction-firm-prometei-botnet-windows-server/
6. ¡°Ó°×ÓÐж¯¡±½ÒÃØ£º¹ú¼ÒÖ§³Ö×éÖ¯ÉøÍ¸¶à¹úÒªº¦ÉèÊ©
2ÔÂ7ÈÕ£¬£¬£¬£¬Óɹú¼ÒÖ§³ÖµÄÍþв×éÖ¯TGR-STA-1030/UNC6619ÌᳫµÄ¡°Ó°×ÓÐж¯¡±ÒÑÔÚÈ«Çò¹æÄ£ÄÚÕö¿ª´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬ÉøÍ¸37¸ö¹ú¼ÒµÄ70Óà¸öÕþ¸®¼°Òªº¦»ù´¡ÉèʩʵÌå¡£¡£¡£¾ÝPalo Alto Networks Unit 42²¿·ÖÅû¶£¬£¬£¬£¬¸Ã×éÖ¯×Ô2024Äê1ÔÂÆð»îÔ¾ÓÚÑÇÖÞ£¬£¬£¬£¬Æä¹¥»÷Ä¿µÄº¸ÇÕþ¸®¡¢Ö´·¨¡¢ÁìÍÁ¹ÜÖÆ¡¢ÄÜÔ´¡¢½ðÈÚ¡¢Íâ½»µÈÕ½ÂÔÁìÓò£¬£¬£¬£¬°üÀ¨ÃÀÖÞÉÌÒµÕþ²ß»ú¹¹¡¢Å·ÖÞ¶à¹úÒé»á¡¢°Ä´óÀûÑDzÆÎñ²¿¼°Ì¨ÍåµçÁ¦×°±¸¹©Ó¦É̵ȡ£¡£¡£¹¥»÷ÊֶηºÆð¸ß¶È¶¨ÖÆ»¯Óë¶àά¶ÈÌØÕ÷¡£¡£¡£ÔçÆÚͨ¹ý´¹ÂÚÓʼþͶµÝº¬ÍâµØ¼ÙÃû³ÆµÄ¶ñÒâѹËõÎļþ£¬£¬£¬£¬Ê¹ÓÃMega.nz´æ´¢Ð§ÀÍÓÕµ¼Ä¿µÄÏÂÔØ£¬£¬£¬£¬Á¬ÏµÇéÐμì²é¹æ±ÜɳÏä¼ì²â£¬£¬£¬£¬²¢¼ÓÔØCobalt Strike¼°VShell¿ò¼ÜʵÑéÏÂÁî¿ØÖÆ¡£¡£¡£×éÖ¯»¹Ê¹ÓÃ15¸öÒÑÖªÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬²¢°²ÅŶ¨ÖÆLinux rootkit¡°ShadowGuard¡±£¬£¬£¬£¬¸Ã¹¤¾ß»ùÓÚeBPFÄÚºËÊÖÒÕ£¬£¬£¬£¬¿ÉÒþ²Ø×î¶à32¸öPID¼°¡°swsecret¡±Îļþ£¬£¬£¬£¬Í¨¹ýϵͳŲÓÃ×èµ²ÌÓ±Ü¼à¿Ø£¬£¬£¬£¬Í¬Ê±ÔÊÐí²Ù×÷Õß½ç˵¿É¼ûÀú³ÌÒÔ»ìÏýÊӲ졣¡£¡£
https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/


¾©¹«Íø°²±¸11010802024551ºÅ