¹ûÕæµÄGitLab´úÂë¿âй¶ÁËÁè¼Ý17,000¸öÃÜÔ¿

Ðû²¼Ê±¼ä 2025-12-01

1. ¹ûÕæµÄGitLab´úÂë¿âй¶ÁËÁè¼Ý17,000¸öÃÜÔ¿


11ÔÂ28ÈÕ£¬£¬£¬Çå¾²¹¤³ÌʦLuke Marshallͨ¹ýϵͳÐÔɨÃèGitLab CloudµÄ560Íò¸ö¹«¹²´æ´¢¿â£¬£¬£¬½ÒÆÆÁË´ó¹æÄ£Ãô¸ÐÐÅϢй¶ÎÊÌâ¡£¡£¡£¡£¡£´Ë´ÎÐж¯½ÓÄÉTruffleHog¿ªÔ´¹¤¾ßÁ¬ÏµGitLab¹«¹²API¶Ëµã£¬£¬£¬ÅäºÏ×Ô½ç˵Python¾ç±¾ÊµÏÖ´æ´¢¿â·ÖÒ³ÅÅÐò£¬£¬£¬²¢Í¨¹ýAWS SQSÓëLambdaº¯Êý¼Ü¹¹ÊµÏÖ²¢ÐÐɨÃ裬£¬£¬×îÖÕ½öºÄʱ24Сʱ¡¢±¾Ç®770ÃÀÔª¼´ÍêÓñ³ÉÁ¿É¨Ãè¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬ÔÚ2800Óà¸ö²î±ðÓòÃûÖб£´æ17,430¸öÓÐÓûîÔ¾ÃÜÔ¿£¬£¬£¬ÊýÄ¿ÊÇ´ËǰBitbucketɨÃèЧ¹û£¨6212¸ö£©µÄ½üÈý±¶£¬£¬£¬ÇÒÃÜÔ¿ÃܶȺá¿ç35%¡£¡£¡£¡£¡£ÀúÊ·Êý¾ÝÏÔʾ£¬£¬£¬´ó¶¼Ð¹Â¶ÃÜÔ¿±¬·¢ÓÚ2018Äêºó£¬£¬£¬µ«²¿·Ö2009ÄêÆðµÄ¹ÅÀÏÃÜÔ¿ÈÔ¾ßЧÁ¦¡£¡£¡£¡£¡£°´ÀàÐÍ»®·Ö£¬£¬£¬Google Cloud Platformƾ֤ռ±È×î¸ß£¨³¬5200¸ö£©£¬£¬£¬Æä´ÎΪMongoDBÃÜÔ¿¡¢Telegram»úеÈËÁîÅÆ¼°OpenAIÃÜÔ¿£¬£¬£¬Áí·¢Ã÷400Óà¸öGitLab×ÔÉíÃÜԿй¶¡£¡£¡£¡£¡£Marshall×ñÕÕÈÏÕæÈÎÅû¶ԭÔò£¬£¬£¬Ê¹ÓÃClaude Sonnet 3.7µÄÍøÂçËÑË÷¹¦Ð§ÓëPython¾ç±¾×Ô¶¯»¯ÌìÉú֪ͨÓʼþ£¬£¬£¬ÀÖ³ÉÁªÏµÊÜÓ°Ïì·½²¢Íƶ¯ÃÜÔ¿×÷·Ï¡£¡£¡£¡£¡£´Ë¾Ù²»µ«»ñµÃ9000ÃÀÔªÎó²îÉͽ𣬣¬£¬¸ü´Ùʹ´ó×Ú×éÖ¯½ôÆÈ³·»ØÃô¸Ðƾ֤¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ÈÔÓв¿·ÖÃÜÔ¿Ò»Á¬´¦ÓÚ̻¶״̬¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/


2. ·¨¹ú×ãÇòÁªºÏ»áÅûÂ¶ÍøÂç¹¥»÷ºóÊý¾Ýй¶ÊÂÎñ


11ÔÂ28ÈÕ£¬£¬£¬·¨¹ú×ãÇòЭ»á£¨FFF£©ÓÚÖÜÎåÅû¶һÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý±»µÁÕË»§²»·¨»á¼û×ãÇò¾ãÀÖ²¿ÖÎÀíÈí¼þ£¬£¬£¬ÔÚϵͳɨ³ýǰÀÖ³ÉÇÔÈ¡´ó×Ú»áԱСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¾­Çå¾²ÍŶӼì²â£¬£¬£¬FFFÁ¬Ã¦½ûÓñ»ÈëÇÖÕË»§²¢Ç¿ÖÆÖØÖÃËùÓÐÓû§ÃÜÂ룬£¬£¬µ«Ð¹Â¶¹æÄ£ÒѺ­¸ÇÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¼°ËùÔÚ¡¢¹ú¼®¡¢ÓÊÕþµØµã¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂëºÍ¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Æ¾Ö¤Å·ÖÞÊý¾Ý±£»£»£»£»£»¤¹æÔò£¬£¬£¬FFFÒÑÆô¶¯ÐÌÊÂËßËϳÌÐò£¬£¬£¬²¢Ïò·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍ¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©Õýʽ±¨±¸¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÊÐí½«Ö±½Óͨ¹ýµç×ÓÓʼþ֪ͨËùÓÐÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬²¢ÌØÊâÌáÐÑ»áԱСÐÄÈκÎÒªÇóÌṩÕË»§Æ¾Ö¤¡¢ÃÜÂë»òÒøÐÐÐÅÏ¢µÄ¿ÉÒÉͨѶ£¬£¬£¬°üÀ¨Éù³ÆÀ´×ÔÁªºÏ»á¡¢¾ãÀÖ²¿»òÆäËû·¢¼þÈ˵ÄÕ©Æ­Óʼþ¡£¡£¡£¡£¡£FFFÌåÏÖ½«Í¨¹ýÊÖÒÕÉý¼¶ºÍÁ÷³ÌÓÅ»¯ÌáÉý·ÀÓùÄÜÁ¦£¬£¬£¬Í¬Ê±ºôÓõ»áÔ±¼á³ÖСÐÄ£¬£¬£¬×èÖ¹µã»÷¿ÉÒɸ½¼þ»ò͸¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/french-football-federation-fff-discloses-data-breach-after-cyberattack/


3. ºÚ¿ÍÐ®ÖÆÃÀ¹úÎÞÏßµç×°±¸·¢ËÍÐéα¾¯±¨


11ÔÂ28ÈÕ£¬£¬£¬ÃÀ¹úÁª°îͨѶίԱ»á£¨FCC£©¿ËÈÕÐû²¼½ôÆÈ֪ͨ£¬£¬£¬Åû¶ºÚ¿Íͨ¹ýÐ®ÖÆBarixÍøÂçÒôƵװ±¸£¬£¬£¬ÔÚÃÀ¹ú¶àµØ¹ã²¥ÏµÍ³Öв»·¨²¥·ÅÐéαӦ¼±¾¯±¨Òô¼°Ã°·¸ÐÔÄÚÈÝ£¬£¬£¬Òý·¢ÑÏÖØ¹«¹²Ç徲Σº¦¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¾Û½¹µÂ¿ËÈøË¹ÖÝÓ븥¼ªÄáÑÇÖÝ£¬£¬£¬ºÚ¿Íͨ¹ýÖØÐÂÉèÖÃ×°±¸Ê¹ÆäÎüÊÕ¹¥»÷Õß¿ØÖƵÄÁ÷ýÌåÄÚÈÝ£¬£¬£¬µ¼ÖÂÕý³£½ÚÄ¿±»Ä£Ä⾯±¨Òô¡¢EAS"×¢ÖØÐźÅ"¼°Òù»àÓïÑÔÖÐÖ¹¡£¡£¡£¡£¡£¸Ã"×¢ÖØÐźÅ"±¾Ó¦½öÓÃÓÚÁú¾í·ç¡¢ì«·çµÈ½ôÆÈÍþвԤ¾¯£¬£¬£¬ÆäÀÄÓÃÑÏÖØÈÅÂÒ¹«¹²Ó¦¼±ÏµÍ³¡£¡£¡£¡£¡£FCCÆÊÎöÖ¸³ö£¬£¬£¬ÊÂÎñȪԴÔÚÓڹ㲥װ±¸Çå¾²·À»¤±¡Èõ£¬£¬£¬Î´ÊÚȨÓû§¿ÉÈÝÒ×ÇÖÈë´«Êä·¾¶¡£¡£¡£¡£¡£²¿·Öµç̨ÉõÖÁÔÚÌýÖÚ±¨¸æÊÕµ½¼ÐÔÓÆ«Ö´ÑÔÂÛµÄÒì³£¾¯±¨ºó£¬£¬£¬²Å²ì¾õ×°±¸ÔâÈëÇÖ¡£¡£¡£¡£¡£Îª×èÖ¹ÀàËÆÊÂÎñ£¬£¬£¬FCCÔÚ±àºÅDA 25-996µÄ֪ͨÖÐÃ÷È·ÒªÇó¹ã²¥»ú¹¹Ç¿»¯»ù´¡Çå¾²²½·¥£ºÁ¬Ã¦×°Öó§ÉÌÇå¾²²¹¶¡²¢Éý¼¶¹Ì¼þ£»£»£»£»£»½«Ä¬ÈÏÃÜÂëÌæ»»Îª¸ßÇ¿¶ÈÃÜÂë²¢°´ÆÚ¸üУ»£»£»£»£»½«EAS¼°Barix×°±¸°²ÅÅÔÚ·À»ðǽºó£¬£¬£¬Í¨¹ýVPNÏÞÖÆ»á¼ûȨÏÞ£»£»£»£»£»Ò»Á¬¼à¿Ø×°±¸ÈÕÖ¾ÒÔ·¢Ã÷δÊÚȨÐÐΪ£»£»£»£»£»²Î¿¼CSRIC×î¼Ñʵ¼ùÖ¸ÄÏ¡£¡£¡£¡£¡£ÕâЩ²½·¥Óë2016ÄêBarix¹«Ë¾ÉùÃ÷Æä×°±¸"׼ȷÉèÖøßÇ¿¶ÈÃÜÂë¼´Çå¾²"µÄ̬¶ÈÒ»Ö¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/fcc-hackers-hijacking-radio/


4. ×ôÖÎÑÇÖÝGSCCCAÔâÀÕË÷Èí¼þ¹¥»÷ÖÂϵͳ̱»¾


11ÔÂ26ÈÕ£¬£¬£¬×ôÖÎÑÇÖݸߵȷ¨ÔºÊé¼ÇÔ±ÏàÖúÖÎÀí¾Ö£¨GSCCCA£©ÒòÔâÓö¿ÉÐÅÇÒÒ»Á¬µÄÍøÂçÇå¾²Íþв£¬£¬£¬×ÔÖÜÎåÆðÏÝÈë̱»¾×´Ì¬£¬£¬£¬ÆäÍøÕ¾¼°Ð§ÀÍ»á¼û±»ÔÝʱÏÞÖÆ¡£¡£¡£¡£¡£¸Ã»ú¹¹ÈÏÕæÖÎÀíÈ«ÖÝ159¸öÏØµÄÉÌÒµ±¸°¸¡¢·¿µØ²ú¼°Ð¡ÎÒ˽¼Ò¹¤Òµ¼Í¼Ë÷Òý¡¢¹«Ö¤Ô±ÖÐÑëÊý¾Ý¿â¼°Ãñʰ¸¼þ±¸°¸µÈ½¹µãÖ°ÄÜ£¬£¬£¬Æä̱»¾Ö±½ÓÓ°ÏìÈ«ÖÝ·¿µØ²úÉúÒâ¡¢Ö´·¨Îļþ´¦Öóͷ£¼°¹«Ö¤Ð§ÀÍ¡£¡£¡£¡£¡£GSCCCAÍøÕ¾×Ô¹¥»÷±¬·¢ºóÒ»Á¬ÏÔʾ¡°ÏµÍ³Î¬»¤¾ÙÐÐÖС±ºá·ù£¬£¬£¬ÖÜÒ»Íí¸üÐÂÈ·ÈÏÕýÔÚ´¦Öóͷ£ÍøÂç¹¥»÷¡£¡£¡£¡£¡£»£»£»£»£»ú¹¹ÉùÃ÷³Æ£¬£¬£¬ÍŶÓÕýÒ¹ÒÔ¼ÌÈÕÆÀ¹À²âÊÔϵͳ£¬£¬£¬È·±£»£»£»£»£»Ö¸´Ê¹ÓÃǰµÖ´ï×î¸ßÇå¾²±ê×¼¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö¸ûú¹¹´æ´¢µÄº£Á¿Êý¾ÝÃæÁÙΣº¦£¬£¬£¬°üÀ¨·¿µØ²ú×óȯ¡¢µäÖʼͼ¡¢µØÍ¼Êý¾Ý¡¢ÃñÊÂÐÌʰ¸¼þµµ°¸µÈ¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÍÅ»ïDevmanÒѽ«GSCCCAÌí¼ÓÖÁÆäÐ¹Â¶ÍøÕ¾£¬£¬£¬Éù³ÆÇÔÈ¡500GBÊý¾Ý²¢ÒªÇó11ÔÂ27ÈÕǰ֧¸¶40ÍòÃÀÔªÊê½ð¡£¡£¡£¡£¡£DevmanΪ½ñÄê4ÔÂзºÆðµÄ×éÖ¯£¬£¬£¬Æä³ÉÔ±´ËǰΪQilin¡¢DragonForceµÈÍÅ»ïÁ¥Êô£¬£¬£¬9ÔÂתÐÍΪÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©×éÖ¯¡£¡£¡£¡£¡£


https://therecord.media/georgia-court-filing-org-ransomware-warning


5. ¶ñÒâLLMÖúÍø·¸Éý¼¶£ºWormGPTÓëKawaiiGPTʵ²âÍþÄÜ


11ÔÂ27ÈÕ£¬£¬£¬Palo Alto Networks Unit 42Ñо¿ÍŶÓÕ¹ÏÖ£¬£¬£¬Î´ÊÜÏÞÖÆµÄ¶ñÒâ´óÐÍÓïÑÔÄ£×Ó£¨LLM£©ÈçWormGPT 4ºÍKawaiiGPTÕýÏÔÖøÌáÉýÍøÂç·¸·¨ÄÜÁ¦£¬£¬£¬Í¨¹ýÌìÉú¸ß¹¦Ð§ÐÔ¶ñÒâ´úÂë½µµÍ¹¥»÷Ãż÷¡£¡£¡£¡£¡£WormGPT 4×÷Ϊ2023Äê¡°ÖØÉú¡±ÏîÄ¿£¬£¬£¬ÌṩÔ·Ñ50ÃÀÔª»òÖÕÉí220ÃÀÔª¶©ÔÄЧÀÍ£¬£¬£¬×¨Îª·¸·¨»î¶¯ÑµÁ·£¬£¬£¬¿ÉÌìÉúÀÕË÷Èí¼þ¼ÓÃܾ籾¡£¡£¡£¡£¡£¸ÃÄ£×Ó»¹Äܰ´Ö¸ÁîÌìÉú¡°¾üÓü¶¼ÓÃÜ¡±Êê½ðÐÅ£¬£¬£¬ÉèÖÃ72Сʱ¸¶¿îÏÞÆÚ£¬£¬£¬Ç¿»¯ÀÕË÷¹¥»÷ÐÄÀíÍþÉå¡£¡£¡£¡£¡£KawaiiGPTÔòΪÃâ·ÑÉçÇøÇý¶¯ÐÍLLM£¬£¬£¬2.5°æ±¾ÔÚLinuxϵͳÎå·ÖÖÓ¼´¿É°²ÅÅ¡£¡£¡£¡£¡£ÆäÄÜÁ¦°üÀ¨ÌìÉúº¬±ÆÕæÓòÃûÓÕÆ­µÄ´¹ÂÚÓʼþ¡¢Ê¹ÓÃParamiko SSH¿âʵÏÖºáÏòÒÆ¶¯µÄPython¾ç±¾£¬£¬£¬ÒÔ¼°Í¨¹ýsmtplib¿â´ò°üÊý¾ÝÍâйµÄ¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£Ëäδֱ½ÓÌìÉú¼ÓÃÜÀý³Ì£¬£¬£¬µ«ÆäÏÂÁîÖ´ÐÐÄÜÁ¦Ö§³ÖȨÏÞÌáÉý¡¢Êý¾ÝÇÔÈ¡¼°ÓÐÓÃÔØºÉͶ·Å¡£¡£¡£¡£¡£¶þÕß¾ùÔÚTelegramÓµÓÐÊý°Ù³ÉԱƵµÀ£¬£¬£¬ÐγÉÊÖÒÕ½»Á÷ÉçÇø¡£¡£¡£¡£¡£Ñо¿Ö¤Êµ£¬£¬£¬ÕâЩģ×ÓÒÑ´ÓÀíÂÛÍþвת»¯ÎªÏÖʵ¹¥»÷¹¤¾ß£ºµÍÊÖÒÕ¹¥»÷Õ߿ɿìËÙÌá³«ÖØ´ó¹¥»÷£¬£¬£¬Èç×Ô¶¯»¯ºáÏòÒÆ¶¯¡¢¶¨ÖÆ»¯´¹ÂÚÓÕ¶ü£¬£¬£¬²¢Ëõ¶Ì¹¤¾ß¿ª·¢ÖÜÆÚ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-llms-empower-inexperienced-hackers-with-advanced-tools/


6. PyPI¹©Ó¦Á´Çå¾²¾¯±¨£ºÒÅÁôPython°üÒý·¢ÓòÃû½ÓÊÜΣº¦


11ÔÂ28ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÔÚÆÊÎöÒÅÁôPython°üʱ·¢Ã÷£¬£¬£¬¶à¸ö×ÅÃûPyPIÈí¼þ°ü±£´æÒòÓòÃû½ÓÊܵ¼ÖµĹ©Ó¦Á´Çå¾²Îó²î¡£¡£¡£¡£¡£ReversingLabsÔÚ¹¹½¨¹¤¾ßzc.buildoutµÄÖ¸µ¼¾ç±¾Öмì²âµ½Òªº¦Îó²î£¬£¬£¬¸Ã¾ç±¾»á´ÓÒÑʧЧµÄ¾ÉÓòÃûpython-distribute.orgÏÂÔØDistributeÈí¼þ°ü×°ÖóÌÐò£¬£¬£¬¶ø¸ÃÓòÃûÏÖÔÚ´¦ÓÚ¿ª·Å×¢²á״̬£¬£¬£¬¿É±»¹¥»÷Õß½ÓÊܲ¢Ö²Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄPyPI°ü°üÀ¨tornado¡¢pypiserver¡¢slapos.coreµÈ£¬£¬£¬ÆäÖ¸µ¼¾ç±¾bootstrap.pyÔÚÌØ¶¨Ìõ¼þÏ»ᴥ·¢ÓòÃû»á¼û¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚDistribute¹¤¾ßµÄÀúÊ·ÒÅÁôÎÊÌ⣺×÷ÎªÔø¶ÌÔݱ£´æµÄSetuptools·ÖÖ§£¬£¬£¬DistributeÔÚ2013Äê±»ÖØÐÂÕûºÏºóÖð½¥ïÔÌ­£¬£¬£¬µ«²¿·ÖÈí¼þ°üÈÔ±£´æÁ˾ɰæÖ¸µ¼¾ç±¾¡£¡£¡£¡£¡£ÕâЩ¾ç±¾½ÓÄÉÓ²±àÂëÓòÃûÏÂÔØ»úÖÆ£¬£¬£¬Óë¶ñÒâÈí¼þÏÂÔØÆ÷ÐÐΪ¸ß¶ÈÏàËÆ£¬£¬£¬Ðγɡ°²»ÐëÒªµÄ¹¥»÷Ãæ¡±¡£¡£¡£¡£¡£


https://thehackernews.com/2025/11/legacy-python-bootstrap-scripts-create.html