EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË
°ä²¼¹¦·ò 2026-04-101. EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË
4ÔÂ9ÈÕ£¬Å·Ö޹۹⹫˾Eurail½üÈÕÏòÃÀ¹ú¶à¸öÖÝ˾·¨²¿³¤°ì¹«ÊÒÌύΥ¹æÍ¨Öª£¬Åû¶2025Äê12Ô²úÉúµÄÊý¾Ýй¶ÊÂÎñÏÖʵӰÏ쳬¹ý30ÍòÈË£¬ÐÕÃûºÍ»¤ÕÕºÅÂëµÈСÎÒÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¸ÃÊÂÎñ×î³õÓÚ½ñÄê1ÔÂÅû¶£¬Æäʱ¹«Ë¾½öÖÒ¸æ³ÖÓÐÅ·ÖÞÌú·ͨƱµÄ¹Ë¿Í¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚºÉÀ¼µÄEurail°µÊ¾£¬ºÚ¿ÍÈëÇÖÆäÍøÂçºóÇÔÈ¡ÁËÔ̺¬»ù×ÔÉí·ÝºÍÁªÏµÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£½ñÄê2Ô£¬Ò»ÃûºÚ¿ÍÔÚ¹«¿ªµÄÍøÂç·¸×ïÍøÕ¾ÉÏ´µÅ£³Æ£¬´ÓEurailµÄAWS S3¡¢¡¢¡¢ZendeskºÍGitLabʵÀýÖÐÇÔÈ¡ÁËÔ¼1.3TBÊý¾Ý£¬Ô̺¬Ô´´úÂë¡¢¡¢¡¢Ö§³Ö¹¤µ¥ºÍÊý¾Ý¿â±¸·Ý¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÐû³ÆÇÔÈ¡ÁËÊý°ÙÍòÅ·ÖÞÌú·ͨƱÓû§µÄСÎÒÐÅÏ¢£¬²¢³ÆÓë¹Û¹â¹«Ë¾µÄ½»ÉæÒѾʧ°Ü¡£¡£¡£¡£¡£3Ô³õ£¬Eurail֤ʵºÚ¿ÍÒ»ÏòÔÚ°µÍøÉ϶µÏúÇÔÈ¡µÄÊý¾Ý£¬²¢ÔÚTelegramƵµÀÉϰ䲼ÁËÑù±¾Êý¾Ý¼¯¡£¡£¡£¡£¡£¹«Ë¾Í¬Ê±³ÎÇ壬ËûÃDz»´æ´¢ÒøÐлòÐÅÓþ¿¨ÐÅÏ¢£¬Ò²²»´æ´¢»¤Õյĵç×Ó°æÕÕÆ¬£¬µ«³ÐŵÈôÊǿͻ§µÄСÎÒÊý¾Ý±»Ô̺¬ÔÚÑù±¾Êý¾Ý¼¯ÖУ¬½«Ö±½Ó֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£ÉÏÖÜÏò¶íÀÕ¸ÔÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬Õâ´ÎÊý¾Ýй¶ÏÖʵӰÏì308,777ÈË¡£¡£¡£¡£¡£
https://www.securityweek.com/300000-people-impacted-by-eurail-data-breach/
2. È«Çò×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin DepotÔâÈëÇÖ
4ÔÂ9ÈÕ£¬ÔËÓª×ÅÈ«Çò×î´ó±ÈÌØ±ÒATMÍøÂçÖ®Ò»µÄBitcoin Depot½üÈÕÅû¶£¬¹¥»÷ÕßÓÚÉϸöÔÂÈëÇÖÆäϵͳºó£¬´ÓÆä¼ÓÃÜÇ®°üÖÐÇÔÈ¡Á˼ÛÖµ366.5ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÈ«ÇòÖÎÀí×ų¬¹ý25,000̨±ÈÌØ±ÒATM»úºÍBDCheckoutÍøµã£¬2025ÄêÊÕÈë´ïµ½6.15ÒÚÃÀÔª¡£¡£¡£¡£¡£Æ¾¾ÝÌá½»¸øÃÀ¹ú֤ȯÂòÂôίԱ»áµÄÎļþ£¬¸Ã¹«Ë¾ÔÚ3ÔÂ23ÈÕ¼ì²âµ½Æä²¿ÃÅITϵͳ´æÔÚ¿ÉÒɻºó·¢ÏÖÁËÕâ´Î¹¥»÷¡£¡£¡£¡£¡£Ö»¹ÜÁ¢¼´²ÉÈ¡´ëÊ©½ÚÖÆ¹¥»÷£¬µ«¹¥»÷ÕßÈÔÓй¦·òÇÔÈ¡Êý×Ö×ʲú½áËãÕË»§µÄƾ֤£¬²¢ÔÚÆä½Ó¼ûȨÏÞ±»×èֹ֮ǰ´ÓBitcoin DepotµÄÇ®°üÖÐ×ªÒÆÁË50.903¸ö±ÈÌØ±Ò£¬°´»ã±¨µ±ÈÕ¼ÛÖµÔ¼366.5ÍòÃÀÔª¡£¡£¡£¡£¡£¹«Ë¾°µÊ¾£¬·¢ÏÖÎÊÌâºóÁ¢¼´Æô¶¯ÁËÊÂÎñÏìÓ¦ºÍ̸£¬ÀñƸÁËÍâ²¿ÍøÂ簲ȫר¼Ò£¬²¢Í¨ÖªÁË·¨Âɲ¿ÃÅ¡£¡£¡£¡£¡£Bitcoin Depot½øÒ»²½ÒÔΪ£¬¸ÃÊÂÎñ½öÏÞÓÚ¹«Ë¾ÄÚ²¿»·¾³£¬²¢Î´Ó°Ïì¿Í»§Æ½Ì¨¡¢¡¢¡¢²¿ÃÅ¡¢¡¢¡¢ÏµÍ³¡¢¡¢¡¢Êý¾Ý»ò»·¾³¡£¡£¡£¡£¡£¹ÌÈ»¹«Ë¾Õ¼ÓÐÕë¶ÔÍøÂç¹¥»÷µÄ±£ÏÕ£¬µ«Bitcoin Depot°µÊ¾Õâ¿ÉÄÜÎÞ·¨º¸Ç¹¥»÷Ôì³ÉµÄÈ«ÊýËðʧ¡£¡£¡£¡£¡£¼øÓÚ¸ÃÊÂÎñ¿ÉÄÜÔì³ÉµÄÃûÓþÇÖº¦¡¢¡¢¡¢Ë¾·¨¡¢¡¢¡¢¼à¹ÜºÍÓ¦¶Ô³É±¾£¬¹«Ë¾ÓÚ2026Äê4ÔÂ6ÈÕÈ϶¨¸ÃÊÂÎñÓµÓÐÖØ´óÒâ˼¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/crypto-atm-giant-bitcoin-depot-says-hackers-stole-36-million-from-its-wallets/
3. Âåɼí¶ÊÐÂÉʦ°ì¹«ÊÒÔâºÚ¿ÍÈëÇÖ
4ÔÂ9ÈÕ£¬ÂåÉ¼í¶¾¯Ô±¾ÖÖܶþ°ä·¢£¬ºÚ¿ÍÈëÇÖÁËÂåɼí¶ÊÐÂÉʦ°ì¹«ÊÒµÄÊý×ִ洢ϵͳ£¬¸ÃϵͳÔ̺¬´óÁ¿Ãô¸Ð¾¯ÎñÎļþ¡£¡£¡£¡£¡£¾ÝÂåÉ¼í¶¾¯Ô±¾Ö³Æ£¬ÕâЩÎļþÊÇ´ËǰÒѽâ¾ö»òºÍ½âµÄÃñʰ¸¼þÖУ¬ÔÚÖ¤¾Ý¿ªÊ¾½×¶ÎÒÆ½»µÄ×ÊÁÏ¡£¡£¡£¡£¡£¾¯·½Ç¿µ÷£¬Õâ´ÎÈëÇÖ²¢Î´Í»ÆÆÈκÎÂåÉ¼í¶¾¯Ô±¾Ö×ÔÉíµÄϵͳ»òÍøÂ磬µ«ÊÂÎñÈÔÒýÆðÁ˶Է¨ÂÉÃô¸ÐÐÅÏ¢±£»£»¤µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Âåɼí¶ÊÐÂÉʦ°ì¹«ÊÒ½²»°ÈËËæºó°ä²¼ÉêÃ÷³Æ£¬°ì¹«ÊÒÓÚ3ÔÂ20ÈÕ·¢ÏÖÁËÕâ´ÎÈëÇÖ¡£¡£¡£¡£¡£º£ºÚ¿Í½Ó¼ûµÄÊÇ¡°ÊÐÂÉʦ°ì¹«ÊÒÓÃÓÚÏò¶Ô·½ÂÉʦºÍËßËϵ±ÊÂÈË´«ÊäÖ¤¾ÝµÄµÚÈý·½¹¤¾ß¡±¡£¡£¡£¡£¡£ÉêÃ÷Ã÷È·°µÊ¾£¬Ã»ÓÐÆäËûÊÐÕþÀûÓûòÏµÍ³Éæ¼°Õâ´ÎÊÂÎñ£¬¸ÃµÚÈý·½¹¤¾ßÖеÄÐÅÏ¢ÓëÈκβ¿ÃżÍ¼»òϵͳ¾ùÎÞÁ´½Ó»ò½Ó¼ûȨÏÞ¡£¡£¡£¡£¡£¾Ý¡¶Âåɼí¶Ê±±¨¡·±¨µÀ£¬É罻ýÌåÉÏÒѳöÏÖÐû³ÆÔ̺¬±»µÁ×ÊÁÏÐÅÏ¢µÄÌû×Ó£¬²¿ÃÅÌû×ÓÒѱ»É¾³ý¡£¡£¡£¡£¡£ÕâЩÌû×ÓÏÔʾ£¬¹²ÓÐ7.7TBÊý¾Ý¿É¹©ÏÂÔØ£¬³¬¹ý33.7Íò·ÝÎļþ±»½Ó¼û¡£¡£¡£¡£¡£Ð¹Â¶µÄ×ÊÁÏÔ̺¬Ö¤ÈËÐÕÃû¡¢¡¢¡¢Ò½ÁÆÐÅÏ¢¡¢¡¢¡¢Î´±à×ëµÄÐÌÊÂͶËßÒÔ¼°µ÷²éÎļþµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£
https://therecord.media/breach-exposes-lapd-files-city-attorney-systems
4. Masjesu½©Ê¬ÍøÂçÒñ±Î¹¥»÷ÎïÁªÍøÉ豸
4ÔÂ8ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Trellix½üÈÕ°ä²¼»ã±¨£¬Éî¿Ì·ÖÎöÁËÃûΪMasjesuµÄÎïÁªÍø½©Ê¬ÍøÂçµÄÄÚ²¿ÔË×÷»úÖÆ¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç×Ô2023ÄêÆð»îÔ¾£¬ÖØÒªÓÃÓÚ·¢ÆðÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷£¬ÒÑϰȾ¶àÖÖÎïÁªÍøÉ豸¡£¡£¡£¡£¡£ÆäÔËÓªÕßÖØÒªÔÚTelegramÉϽøÐÐÐû´«£¬Ðû³Æ¿ÉÄÜ·¢ÆðÊý°ÙGB¹æÄ£µÄDDoS¹¥»÷£¬Ìû×ÓͬʱÕë¶ÔÖÐÎĺÍÓ¢ÎÄÓû§£¬Åú×¢Æä·þÎñ³ÖÐø¶Ô×¼ÖÐÃÀ¿Í»§¡£¡£¡£¡£¡£Ä¿Ç°ÔËÓªÕßµÄTelegramƵµÀÕ¼Óг¬¹ý400Ãû¶©ÔÄÕߣ¬µ«ÏÖʵÓû§Èº¿ÉÄܸü´ó¡£¡£¡£¡£¡£´ÓϰȾÉ豸µÄÉ¢²¼À´¿´£¬´óÎÞÊý±»Ï°È¾µÄÉ豸λÓÚÔ½ÄÏ£¬µ«°ÍÎ÷¡¢¡¢¡¢Ó¡¶È¡¢¡¢¡¢ÒÁÀÊ¡¢¡¢¡¢¿ÏÄáÑǺÍÎÚ¿ËÀ¼Ò²ÓдóÁ¿É豸±»Ï°È¾¡£¡£¡£¡£¡£TrellixÖ¸³ö£¬Êý¾ÝÇ¿ÁÒÅú×¢¹¥»÷À´×Ô¶à¸ö×ÔÖÎϵͳ£¬Éæ¼°¸÷ÀàÍøÂ磬¶ø·Ç½©Ê¬ÍøÂçÆëÈ«ÍйÜÓÚµ¥Ò»Ð鹹רÓ÷þÎñÆ÷ÌṩÉÌ¡£¡£¡£¡£¡£½üÆÚ·ÖÎöµÄMasjesuÑù±¾ÏÔʾ£¬Æä¿ÉÕë¶Ô¶àÖÖCPU¼Ü¹¹£¬Ô̺¬i386¡¢¡¢¡¢MIPS¡¢¡¢¡¢ARM¡¢¡¢¡¢SPARC¡¢¡¢¡¢PPC¡¢¡¢¡¢68KºÍAMD64¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçͨ¹ýD-Link·ÓÉÆ÷¡¢¡¢¡¢GPON·ÓÉÆ÷¡¢¡¢¡¢»ªÎª¼ÒÍ¥Íø¹Ø¡¢¡¢¡¢MVPower DVR¡¢¡¢¡¢Netgear·ÓÉÆ÷¡¢¡¢¡¢UPnP·þÎñ¼°ÆäËûÎïÁªÍøÉ豸µÄÒÑÖª·ì϶½øÐд«²¼¡£¡£¡£¡£¡£
https://www.securityweek.com/evasive-masjesu-ddos-botnet-targets-iot-devices/
5. Adobe ReaderÁãÈÕ·ì϶ÔâºÚ¿ÍÀûÓÃÊýÔÂ
4ÔÂ9ÈÕ£¬°²È«×êÑÐÈËÔ±·¢ÏÖ£¬ºÚ¿ÍÕýÀûÓÃAdobe ReaderÖÐÒ»¸öÉÐδÐÞ¸´µÄÁãÈÕ·ì϶£¬Í¨¹ý¾«ÐÄ»ú¹ØµÄ¶ñÒâPDFÎļþ·¢Æð³ÖÐøÐÔ¹¥»÷¡£¡£¡£¡£¡£¸Ã·ì϶ÓÉÍøÂ簲ȫ×êÑÐÔ±ÓÚ3ÔÂ26ÈÕ·¢ÏÖ£¬ÆäʱÊÕµ½Ò»·Ý¿ÉÒÉÑù±¾¡£¡£¡£¡£¡£½øÒ»²½·ÖÎöÏÔʾ£¬¹¥»÷»î¶¯ÖÁÉÙ×Ô2025Äê11Ô¾ÍÒÑÆðÍ·£¬Ò»¸öÃûΪ¡°Invoice540.pdf¡±µÄÑù±¾ÓÚ2025Äê11ÔÂ28ÈÕÉÏ´«ÖÁVirusTotal£¬Åú×¢ºÚ¿ÍÒѳÖÐø¹¥»÷³¤´ïËĸöÔÂÖ®¾Ã¡£¡£¡£¡£¡£¸Ã·ì϶¼«ÎªÎ£ÏÕ£¬Óû§½öÐè´ò¿ª¶ñÒâPDFÎļþ¼´¿É´¥·¢¹¥»÷£¬ÎÞÐèÈκζîÍâµã»÷²Ù×÷£¬ÇÒÈ·ÈÏ¿ÉÔÚ×îа汾µÄAdobe ReaderÉϳɹ¦ÔËÐС£¡£¡£¡£¡£¹¥»÷ÓµÓÐÏÔÖøÕë¶ÔÐÔ¡£¡£¡£¡£¡£×êÑÐÈËÔ±Gi7w0rm·ÖÎö·¢ÏÖ£¬¶ñÒâPDFÎļþÖÐÔ̺¬¶íÓïµö¶üÄÚÈÝ£¬Éæ¼°¶íÂÞ˹ʯÓͺÍÌìÈ»ÆøÐÐÒµµÄʱÊÂÎÊÌ⣬Åú×¢¹¥»÷Ö¸±ê¿ÉÄÜÊǶíÓïµØÓòÈ·µ±¾Ö¡¢¡¢¡¢ÄÜÔ´»ò»ù´¡ÉèÊ©Óйػú¹¹¡£¡£¡£¡£¡£½ØÖÁĿǰ£¬AdobeÉÐδ°ä²¼ÐÞ¸´²¹¶¡£¡£¡£¡£¡£¬Ò²Î´¹«¿ª»ØÓ¦´ËÊ¡£¡£¡£¡£¡£
https://securityaffairs.com/190558/hacking/malicious-pdf-reveals-active-adobe-reader-zero-day-in-the-wild.html
6. LucidRookÕë¶Ǫ̂Íå·Çµ±¾Ö×éÖ¯ºÍ´óѧ·¢Æð´¹µö¹¥»÷
4ÔÂ9ÈÕ£¬Ë¼¿ÆTalos°²È«×êÑÐÈËÔ±½üÈÕÅû¶£¬Ò»ÖÖÃûΪLucidRookµÄÐÂÐÍÄ£¿£¿£¿é»¯¶ñÒâÈí¼þÕý±»ÓÃÓÚÕë¶Ǫ̂Í嵨Óò·Çµ±¾Ö×éÖ¯ºÍ´óѧµÄÓã²æÊ½ÍøÂç´¹µö»î¶¯¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚLua˵»°¿ª·¢£¬±»¹éÒòÓÚÄÚ²¿×·×ÙµÄÍþв×éÖ¯UAT-10362£¬×êÑÐÈËÔ±½«ÆäÃèÊöΪ¡°Õ¼ÓгÉÊì×÷Õ½¼¼ÇÉ¡±µÄ׳´óµÐÊÖ¡£¡£¡£¡£¡£LucidRookÓÚ2025Äê10Ô±»ÓÃÓÚÏÖʵ¹¥»÷£¬¹¥»÷¼¿Á©ÖØÒªÒÀÀµÐ¯´øÊÜÃÜÂë±£»£»¤´æµµÎļþµÄÍøÂç´¹µöµç×ÓÓʼþ¡£¡£¡£¡£¡£×êÑÐÈËÔ±·¢ÏÖÁËÁ½ÖÖ·ÖÆçµÄϰȾÁ´¡£¡£¡£¡£¡£µÚÒ»ÖÖʹÓÃLNK¿ì½Ý·½Ê½Îļþ£¬×îÖÕͶ·ÅÃûΪLucidPawnµÄ¶ñÒâÈí¼þͶ·ÅÆ÷£»£»µÚ¶þÖÖ»ùÓÚEXEµÄϰȾÁ´ÔòÀûÓüÙ×°³ÉÇ÷Ïò¿Æ¼¼Worry-Free Business Security ServicesµÄ¼Ùðɱ¶¾Èí¼þ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£LucidRookÔÚÖ´Ðйý³ÌÖÐ»á½øÐÐϵͳ¿úËÅ£¬ÍøÂçÓû§ºÍÍÆËã»úÃû³Æ¡¢¡¢¡¢ÒÑ×°ÖÃÀûÓ÷¨Ê½ºÍÕýÔÚÔËÐеĹý³ÌµÈÐÅÏ¢¡£¡£¡£¡£¡£ÍøÂçµ½µÄÊý¾ÝʹÓÃRSA¼ÓÃÜ£¬´æ´¢ÔÚÊÜÃÜÂë±£»£»¤µÄ´æµµÖУ¬²¢Í¨¹ýFTPй¶µ½¹¥»÷Õß½ÚÖÆµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/


¾©¹«Íø°²±¸11010802024551ºÅ