FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶

Ðû²¼Ê±¼ä 2026-02-09

1. FlickrÒòµÚÈý·½Ð§ÀÍÎó²îÖÂÓû§Êý¾Ýй¶


2ÔÂ9ÈÕ£¬ £¬£¬£¬£¬£¬×÷ΪSmugMugÆìÏÂÓµÓг¬1ÒÚ×¢²áÓû§¡¢Êý°ÙÍò»îÔ¾ÉãӰʦµÄÕÕÆ¬·ÖÏíÆ½Ì¨£¬ £¬£¬£¬£¬£¬FlickrÓÚ2026Äê2ÔÂ5ÈÕ·¢Ã÷ÆäµÚÈý·½µç×ÓÓʼþЧÀÍÌṩÉ̱£´æÏµÍ³Îó²î£¬ £¬£¬£¬£¬£¬¿ÉÄÜÔì³É²¿·ÖÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Ôâδ¾­ÊÚȨ»á¼û¡£¡£¡£¾Ý¹Ù·½×ª´ï£¬ £¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Óû§ÐÕÃû¡¢µç×ÓÓÊÏ䵨µã¡¢IPµØµã¼°ÕË»§»î¶¯¼Í¼£¬ £¬£¬£¬£¬£¬µ«Î´Éæ¼°ÃÜÂë¡¢Ö§¸¶Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£FlickrÔÚ»ñϤÎó²îºóÊýСʱÄÚ¼´¹Ø±ÕÊÜÓ°Ïìϵͳ£¬ £¬£¬£¬£¬£¬ÇжÏÓë±£´æÎó²îµÄµÚÈý·½¶ËµãµÄÅþÁ¬£¬ £¬£¬£¬£¬£¬²¢Í¬²½Æô¶¯ÖÜÈ«Çå¾²Éó²é¡£¡£¡£Ö»¹ÜFlickrδÅûÂ¶ÉæÊÂЧÀÍÌṩÉÌÏêϸÉí·Ý¼°ÊÜÓ°ÏìÓû§¹æÄ££¬ £¬£¬£¬£¬£¬µ«ÒѽÓÄɶàÏîÓ¦¼±²½·¥£ºÁ¬Ã¦Í¨ÖªµÚÈý·½Ð§ÀÍÉÌ¿ªÕ¹Éî¶ÈÊӲ죬 £¬£¬£¬£¬£¬Ç¿»¯¶ÔµÚÈý·½Ð§À͵ĹܿØÁ÷³Ì£¬ £¬£¬£¬£¬£¬Í¬Ê±ÏòÏà¹ØÊý¾Ý±£»£»£»£»£»£»£»¤»ú¹¹±¨±¸ÊÂÎñÏêÇé¡£¡£¡£Æ½Ì¨·½Ç¿µ÷£¬ £¬£¬£¬£¬£¬ÒÑͨ¹ýɾ³ý±£´æÎó²îµÄ¶ËµãÁ´½Ó¡¢ÊµÑéϵͳ¼Ü¹¹¼Ó¹ÌµÈ·½·¨ÌáÉýÇå¾²·À»¤Æ·¼¶£¬ £¬£¬£¬£¬£¬²¢ÔÊÐí½«Ò»Á¬¼à¿ØµÚÈý·½Ð§ÀÍÌṩÉ̵ĺϹæÐÔ¡£¡£¡£


https://securityaffairs.com/187753/data-breach/flickr-moves-to-contain-data-exposure-warns-users-of-phishing.html


2. ˼¿ÆTalosÆØ¹âDKnife£ºÖÐÎÄÓû§LinuxÍø¹Ø¹¥»÷¿ò¼Ü


2ÔÂ8ÈÕ£¬ £¬£¬£¬£¬£¬Ë¼¿ÆTalosÓÚ½üÆÚÅû¶ÃûΪ¡°DKnife¡±µÄLinux¶ñÒ⹤¾ß°ü£¬ £¬£¬£¬£¬£¬¸Ã¹¤¾ßÓɯߏö»ùÓÚLinuxµÄÖ²Èë³ÌÐò×é³É£¬ £¬£¬£¬£¬£¬×¨ÎªÂ·ÓÉÆ÷ºÍ±ßÑØ×°±¸Éè¼Æ£¬ £¬£¬£¬£¬£¬¿ÉÖ´ÐÐÉî¶È°ü¼ì²â¡¢Á÷Á¿Ê¹Óü°¶ñÒâÈí¼þÈö²¥¡£¡£¡£¾Ý±¨¸æ£¬ £¬£¬£¬£¬£¬DKnife×Ô2019ÄêÆð±»Ê¹Ó㬠£¬£¬£¬£¬£¬ÆäC2ЧÀÍÆ÷ÖÁ2026Äê1ÔÂÈÔ»îÔ¾£¬ £¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÐÎÄÓû§£¬ £¬£¬£¬£¬£¬Í¨¹ýÐ®ÖÆÈí¼þÏÂÔØ¡¢°²×¿Ó¦ÓøüУ¨Èç΢ÐÅ¡¢Öйú³ö×â³µ/ÍøÔ¼³µÓ¦Óã©Èö²¥ShadowPadºÍDarkNimbusºóÃÅ£¬ £¬£¬£¬£¬£¬ÇÔÈ¡ÖйúЧÀÍÆ¾Ö¤¼°ÈÈÃÅÓ¦ÓÃÊý¾Ý¡£¡£¡£ÊÖÒÕ²ãÃæ£¬ £¬£¬£¬£¬£¬DKnifeÖ§³ÖÖÐÐÄÈ˹¥»÷£¨AitM£©£¬ £¬£¬£¬£¬£¬¿É×èµ²Windows¡¢Android¸üм°¶þ½øÖÆÎļþÏÂÔØ£¬ £¬£¬£¬£¬£¬½«Õýµ±ÇëÇóÖØ¶¨ÏòÖÁ¶ñÒâЧÀÍÆ÷£¬ £¬£¬£¬£¬£¬Ì滻Ϊº¬ShadowPad/DarkNimbusµÄ×°ÖóÌÐò¡£¡£¡£Æä¼ÓÃܹæÔò½ÓÄÉQQ TEAÃÜÔ¿½âÃÜ£¬ £¬£¬£¬£¬£¬Ê¹Óúó×Ô¶¯É¾³ý¡£¡£¡£¸Ã¹¤¾ß»¹¾ß±¸Á÷Á¿¼ì²âÄ£¿ £¿£¿é£¬ £¬£¬£¬£¬£¬¿Éʶ±ð²¢×ÌÈÅ360Çå¾²Èí¼þ¡¢ÌÚѶЧÀ͵ÈÇå¾²²úÆ·µÄͨѶ£¬ £¬£¬£¬£¬£¬Í¨¹ýαÔìTCP RSTÊý¾Ý°ü×è¶ÏÁ÷Á¿£¬ £¬£¬£¬£¬£¬½µµÍÊܺ¦Õß×°±¸·À»¤ÄÜÁ¦¡£¡£¡£


https://securityaffairs.com/187716/malware/dknife-toolkit-abuses-routers-to-spy-and-deliver-malware-since-2019.html


3. BridgePayÖ§¸¶Íø¹ØÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÌìÏÂЧÀÍÖÐÖ¹


2ÔÂ6ÈÕ£¬ £¬£¬£¬£¬£¬ÃÀ¹ú´óÐÍÖ§¸¶Íø¹ØÌṩÉÌBridgePay Network SolutionsÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬µ¼ÖÂÆä½¹µãÖ§¸¶ÏµÍ³ÌìÏÂÐÔ̱»¾£¬ £¬£¬£¬£¬£¬Òý·¢´ó¹æÄ£Ð§ÀÍÖÐÖ¹¡£¡£¡£ÊÂÎñʼÓÚÖÜÎ寯Ïþ£¬ £¬£¬£¬£¬£¬¼à¿ØÏµÍ³ÂÊÏÈ·¢Ã÷¡°Gateway.Itstgate.com - ÐéÄâÖÕ¶Ë¡¢±¨¸æ¡¢API¡±µÈÒªº¦Ð§ÀÍÐÔÄÜϽµ£¬ £¬£¬£¬£¬£¬Ëæºó¶à¸ö½¹µãÉú²úϵͳ£¨ÈçBridgePayÍø¹ØAPI¡¢PayGuardianÔÆAPI¡¢MyBridgePayÐéÄâÖÕ¶Ë¡¢ÍйÜÖ§¸¶Ò³Ãæ¼°PathwayLinkÃÅ»§£©·ºÆð¼äЪÐÔ½µ¼¶£¬ £¬£¬£¬£¬£¬×îÖÕÑݱäΪÖÜȫ̱»¾¡£¡£¡£BridgePayÔÚµ±ÈÕÍíЩʱ¼ä֤ʵ£¬ £¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉÀÕË÷Èí¼þ¹¥»÷Òý·¢£¬ £¬£¬£¬£¬£¬²¢ÒÑÁªºÏÁª°îÊÓ²ì¾Ö¡¢ÃÀ¹úÌØÇÚ¾Ö¼°Íⲿȡ֤ÍŶÓÕö¿ªÊӲ졣¡£¡£¹«Ë¾Ç¿µ÷£¬ £¬£¬£¬£¬£¬ÆðԴȡ֤ÏÔʾÎÞÖ§¸¶¿¨Êý¾Ýй¶£¬ £¬£¬£¬£¬£¬±»»á¼ûÎļþ¾ùÒѼÓÃÜ£¬ £¬£¬£¬£¬£¬ÏÖÔÚ¡°ÎÞÖ¤¾ÝÅú×¢±£´æ¿ÉÓÃÊý¾Ýй¶¡±¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÒÑÔì³ÉÑÏÖØÏÖʵӰÏ죬 £¬£¬£¬£¬£¬ÌìÏÂ¶àµØÉ̼ÒÒòÒøÐп¨´¦Öóͷ£ÏµÍ³¹ÊÕϱ»ÆÈ½ö½ÓÊÜÏÖ½ðÖ§¸¶£¬ £¬£¬£¬£¬£¬·ðÂÞÀï´ïÖÝרéµÍåÊÐÕþ¸®ÔÚÏßÕ˵¥Ö§¸¶ÃÅ»§Ì±»¾£¬ £¬£¬£¬£¬£¬½¨ÒéÊÐÃñͨ¹ýÏÖ½ð¡¢ÒøÐп¨»ò֧ƱÏÖ³¡Ö§¸¶£¬ £¬£¬£¬£¬£¬²¿·Ö»ú¹¹ÉõÖÁÐèµç»°Ö§¸¶¡£¡£¡£Lightspeed Commerce¡¢ThriftTrac¼°µÂ¿ËÈøË¹Öݸ¥Àï˹¿ÆÊÐµÈÆäËû×éÖ¯Ò౨¸æÐ§ÀÍÊÜÓ°Ïì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/


4. CISA½«React Native¼°SmarterMailÎó²îÌíÖÁKEVĿ¼


2ÔÂ6ÈÕ£¬ £¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«SmarterTools SmarterMailºÍReact Native Community CLIµÄÁ½¸ö¸ßΣÎó²îCVE-2025-11953ÓëCVE-2026-24423Ìí¼ÓÖÁÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬ £¬£¬£¬£¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê2ÔÂ26ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£CVE-2025-11953ÊÇReact Native Community CLIµÄMetro¿ª·¢Ð§ÀÍÆ÷±£´æµÄ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î¡£¡£¡£¸ÃЧÀÍÆ÷ĬÈϰó¶¨Íⲿ½Ó¿Ú£¬ £¬£¬£¬£¬£¬Ì»Â¶Ò×Êܹ¥»÷µÄ¶Ëµã£¬ £¬£¬£¬£¬£¬Î´¾­ÈÏÖ¤µÄ¹¥»÷Õ߿ɷ¢ËÍPOSTÇëÇóÔÚWindowsϵͳÉÏÖ´ÐÐí§ÒâÏÂÁ £¬£¬£¬£¬£¬ÉõÖÁÔËÐÐÍêÈ«¿É¿ØµÄshell¾ç±¾¡£¡£¡£VulnCheckÑо¿ÏÔʾ£¬ £¬£¬£¬£¬£¬¸ÃÎó²î×Ô2025Äê12ÔÂÆðÒѱ»Ò»Á¬Ê¹Ó㬠£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¶à½×¶ÎBase64±àÂëµÄPowerShell¼ÓÔØÆ÷½ûÓÃÇå¾²Èí¼þ¡¢ÏÂÔØ²¢Ö´ÐжñÒâ¶þ½øÖÆÎļþ¡£¡£¡£CVE-2026-24423ÊÇSmarterTools SmarterMail£¨9511°æ±¾Ç°£©µÄConnectToHub APIÒªÁìÖб£´æµÄδÈÏÖ¤Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬ £¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.3¡£¡£¡£¹¥»÷Õß¿ÉÖ¸µ¼SmarterMailÅþÁ¬¶ñÒâHTTPЧÀÍÆ÷£¬ £¬£¬£¬£¬£¬´¥·¢¶ñÒâÏÂÁîÖ´ÐС£¡£¡£¸ÃÎó²îÓɶàÍŶÓÁªºÏ±¨¸æ£¬ £¬£¬£¬£¬£¬SmarterToolsÒÑÔÚBuild 9511°æ±¾ÖÐÐÞ¸´¡£¡£¡£


https://securityaffairs.com/187675/security/u-s-cisa-adds-smartertools-smartermail-and-react-native-community-cli-flaws-to-its-known-exploited-vulnerabilities-catalog.html


5. Ó¢¹úÐÞ½¨¹«Ë¾ÔâPrometei½©Ê¬ÍøÂç¹¥»÷


2ÔÂ8ÈÕ£¬ £¬£¬£¬£¬£¬Ò»¼ÒÓ¢¹úÐÞ½¨¹«Ë¾ÔÚÆäWindowsЧÀÍÆ÷ÉÏ·¢Ã÷ÃûΪ"Êý×ÖµØÓü×â»§"µÄÒþ²ØÈëÇÖÕß¡£¡£¡£¾­eSentireÍþвÏìÓ¦²¿·Ö£¨TRU£©Åжϣ¬ £¬£¬£¬£¬£¬ÈëÇÖÕßΪÓë¶íÂÞ˹¹ØÁªµÄPrometei½©Ê¬ÍøÂ磬 £¬£¬£¬£¬£¬×Ô2016ÄêÆðÒ»Á¬»îÔ¾µÄ¶ñÒâ³ÌÐò£¬ £¬£¬£¬£¬£¬Æä½¹µã¹¦Ð§ËäΪÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò£¬ £¬£¬£¬£¬£¬µ«TRUÑо¿Ö¤ÊµÆäͬÑùÉÆÓÚÃÜÂëÇÔÈ¡ÓëÔ¶³Ì¿ØÖÆÏµÍ³¡£¡£¡£¸Ã¹¥»÷µÄÏÔÖøÌØÕ÷ÔÚÓÚµÍÊÖÒÕÃż÷£º¹¥»÷Õß½öͨ¹ýÍÆ²âÈõÃÜÂë»òĬÈÏÃÜÂ룬 £¬£¬£¬£¬£¬±ãʹÓÃÔ¶³Ì×ÀÃæÐ­Ò飨RDP£©ÇáËÉ»ñȡϵͳ»á¼ûȨÏÞ£¬ £¬£¬£¬£¬£¬Ó¡Ö¤ÁË"ÈõÃÜÂëÈ糨ÃÅ"µÄÇå¾²¾¯Ê¾¡£¡£¡£PrometeiʵΪÍêÕû¹¤¾ß°ü£¬ £¬£¬£¬£¬£¬×°ÖúóÔËÐÐUPlugPlayЧÀͲ¢½¨Éèsqhost.exeÎļþ£¬ £¬£¬£¬£¬£¬È·±£¿ £¿£¿ª»ú×ÔÆô¡£¡£¡£Æä³õʼÓÐÓÃÔØºÉzsvc.exe´ÓPrimesoftex Ltd.¹ØÁªÐ§ÀÍÆ÷ÏÂÔØ£¬ £¬£¬£¬£¬£¬¾­¸ß¶È¼ÓÃÜαװ£¬ £¬£¬£¬£¬£¬¾ß±¸Òþ²ØÐÔ¡£¡£¡£Îª¹æ±Ü¼ì²â£¬ £¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ½ÓÄÉË«ÖØÕ½ÂÔ£ºÒ»·½ÃæÍ¨¹ýWindowsÄÚÖù¤¾ßÍøÂçÅÌËã»úÃû³ÆÓëÊÖÒÕϸ½Ú£¬ £¬£¬£¬£¬£¬°²ÅÅMimikatz£¨±ê¼ÇΪmiWalk£©ÇÔÈ¡ÍøÂçÃÜÂ룬 £¬£¬£¬£¬£¬²¢Ê¹ÓÃTORÄäÃûÍøÂç·ÓÉÁ÷Á¿£»£»£»£»£»£»£»ÁíÒ»·½ÃæÊµÑé"ɳÏäÈÆ¹ý"£¬ £¬£¬£¬£¬£¬ÈôÎÞ·¨ÕÒµ½mshlpda32.dll½â°üÎļþ£¬ £¬£¬£¬£¬£¬ÔòÖ´ÐÐÐéαϵͳʹÃüαװÎÞº¦ÐÐΪ¡£¡£¡£


https://hackread.com/uk-construction-firm-prometei-botnet-windows-server/


6. ¡°Ó°×ÓÐж¯¡±½ÒÃØ£º¹ú¼ÒÖ§³Ö×éÖ¯ÉøÍ¸¶à¹úÒªº¦ÉèÊ©


2ÔÂ7ÈÕ£¬ £¬£¬£¬£¬£¬Óɹú¼ÒÖ§³ÖµÄÍþв×éÖ¯TGR-STA-1030/UNC6619ÌᳫµÄ¡°Ó°×ÓÐж¯¡±ÒÑÔÚÈ«Çò¹æÄ£ÄÚÕö¿ª´ó¹æÄ£ÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬ÉøÍ¸37¸ö¹ú¼ÒµÄ70Óà¸öÕþ¸®¼°Òªº¦»ù´¡ÉèʩʵÌå¡£¡£¡£¾ÝPalo Alto Networks Unit 42²¿·ÖÅû¶£¬ £¬£¬£¬£¬£¬¸Ã×éÖ¯×Ô2024Äê1ÔÂÆð»îÔ¾ÓÚÑÇÖÞ£¬ £¬£¬£¬£¬£¬Æä¹¥»÷Ä¿µÄº­¸ÇÕþ¸®¡¢Ö´·¨¡¢ÁìÍÁ¹ÜÖÆ¡¢ÄÜÔ´¡¢½ðÈÚ¡¢Íâ½»µÈÕ½ÂÔÁìÓò£¬ £¬£¬£¬£¬£¬°üÀ¨ÃÀÖÞÉÌÒµÕþ²ß»ú¹¹¡¢Å·ÖÞ¶à¹úÒé»á¡¢°Ä´óÀûÑDzÆÎñ²¿¼°Ì¨ÍåµçÁ¦×°±¸¹©Ó¦É̵È¡£¡£¡£¹¥»÷ÊֶηºÆð¸ß¶È¶¨ÖÆ»¯Óë¶àά¶ÈÌØÕ÷¡£¡£¡£ÔçÆÚͨ¹ý´¹ÂÚÓʼþͶµÝº¬ÍâµØ¼ÙÃû³ÆµÄ¶ñÒâѹËõÎļþ£¬ £¬£¬£¬£¬£¬Ê¹ÓÃMega.nz´æ´¢Ð§ÀÍÓÕµ¼Ä¿µÄÏÂÔØ£¬ £¬£¬£¬£¬£¬Á¬ÏµÇéÐμì²é¹æ±ÜɳÏä¼ì²â£¬ £¬£¬£¬£¬£¬²¢¼ÓÔØCobalt Strike¼°VShell¿ò¼ÜʵÑéÏÂÁî¿ØÖÆ¡£¡£¡£×éÖ¯»¹Ê¹ÓÃ15¸öÒÑÖªÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ£¬ £¬£¬£¬£¬£¬²¢°²ÅŶ¨ÖÆLinux rootkit¡°ShadowGuard¡±£¬ £¬£¬£¬£¬£¬¸Ã¹¤¾ß»ùÓÚeBPFÄÚºËÊÖÒÕ£¬ £¬£¬£¬£¬£¬¿ÉÒþ²Ø×î¶à32¸öPID¼°¡°swsecret¡±Îļþ£¬ £¬£¬£¬£¬£¬Í¨¹ýϵͳŲÓÃ×èµ²ÌÓ±Ü¼à¿Ø£¬ £¬£¬£¬£¬£¬Í¬Ê±ÔÊÐí²Ù×÷Õß½ç˵¿É¼ûÀú³ÌÒÔ»ìÏýÊӲ졣¡£¡£


https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/