EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË
°ä²¼¹¦·ò 2026-04-101. EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË
4ÔÂ9ÈÕ£¬Å·Ö޹۹⹫˾Eurail½üÈÕÏòÃÀ¹ú¶à¸öÖÝ˾·¨²¿³¤°ì¹«ÊÒÌύΥ¹æÍ¨Öª£¬Åû¶2025Äê12Ô²úÉúµÄÊý¾Ýй¶ÊÂÎñÏÖʵӰÏ쳬¹ý30ÍòÈË£¬ÐÕÃûºÍ»¤ÕÕºÅÂëµÈÓ×ÎÒÐÅÏ¢±»µÁ¡£¸ÃÊÂÎñ×î³õÓÚ½ñÄê1ÔÂÅû¶£¬Æäʱ¹«Ë¾½öÖÒ¸æ³ÖÓÐÅ·ÖÞÌú·ͨƱµÄ¹Ë¿Í¿ÉÄÜÊܵ½Ó°Ïì¡£×ܲ¿Î»ÓÚºÉÀ¼µÄEurail°µÊ¾£¬ºÚ¿ÍÈëÇÔìäÍøÂçºóÇÔÈ¡ÁËÔ̺¬»ù×ÔÉí·ÝºÍÁªÏµÐÅÏ¢µÄÎļþ¡£½ñÄê2Ô£¬Ò»ÃûºÚ¿ÍÔÚ¹«¿ªµÄÍøÂç·¸×ïÍøÕ¾ÉÏ´µÅ£³Æ£¬´ÓEurailµÄAWS S3¡¢ZendeskºÍGitLabÊ·ýÖÐÇÔÈ¡ÁËÔ¼1.3TBÊý¾Ý£¬Ô̺¬Ô´´úÂë¡¢Ö§³Ö¹¤µ¥ºÍÊý¾Ý¿â±¸·Ý¡£¸ÃºÚ¿ÍÐû³ÆÇÔÈ¡ÁËÊý°ÙÍòÅ·ÖÞÌú·ͨƱÓû§µÄÓ×ÎÒÐÅÏ¢£¬²¢³ÆÓë¹Û¹â¹«Ë¾µÄ½»ÉæÒѾʧ°Ü¡£3Ô³õ£¬Eurail֤ʵºÚ¿ÍÒ»ÏòÔÚ°µÍøÉ϶µÏúÇÔÈ¡µÄÊý¾Ý£¬²¢ÔÚTelegramƵ·Éϰ䲼ÁËÑù±¾Êý¾Ý¼¯¡£¹«Ë¾Í¬Ê±³ÎÇ壬ËûÃDz»´æ´¢ÒøÐлòÐÅÓþ¿¨ÐÅÏ¢£¬Ò²²»´æ´¢»¤Õյĵç×Ó°æÕÕÆ¬£¬µ«³ÐŵÈôÊǿͻ§µÄÓ×ÎÒÊý¾Ý±»Ô̺¬ÔÚÑù±¾Êý¾Ý¼¯ÖУ¬½«Ö±½Ó֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£ÉÏÖÜÏò¶íÀÕ¸ÔÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬Õâ´ÎÊý¾Ýй¶ÏÖʵӰÏì308,777ÈË¡£
https://www.securityweek.com/300000-people-impacted-by-eurail-data-breach/
2. È«Çò×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin DepotÔâÈëÇÖ
4ÔÂ9ÈÕ£¬ÔËÓª×ÅÈ«Çò×î´ó±ÈÌØ±ÒATMÍøÂçÖ®Ò»µÄBitcoin Depot½üÈÕÅû¶£¬¹¥»÷ÕßÓÚÉϸöÔÂÈëÇÔìäϵͳºó£¬´ÓÆä¼ÓÃÜÇ®°üÖÐÇÔÈ¡Á˼ÛÖµ366.5ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¸Ã¹«Ë¾ÔÚÈ«ÇòÖÎÀí×ų¬¹ý25,000̨±ÈÌØ±ÒATM»úºÍBDCheckoutÍøµã£¬2025ÄêÊÕÈë´ïµ½6.15ÒÚÃÀÔª¡£Æ¾¾ÝÌá½»¸øÃÀ¹ú֤ȯÂòÂôίԱ»áµÄÎļþ£¬¸Ã¹«Ë¾ÔÚ3ÔÂ23ÈÕ¼ì²âµ½Æä²¿ÃÅITϵͳ´æÔÚ¿ÉÒɻºó·¢ÏÖÁËÕâ´Î¹¥»÷¡£Ö»¹ÜÁ¢¼´²ÉÈ¡´ëÊ©½ÚÔì¹¥»÷£¬µ«¹¥»÷ÕßÈÔÓй¦·òÇÔÈ¡Êý×Ö×ʲú½áËãÕË»§µÄƾ֤£¬²¢ÔÚÆä½Ó¼ûȨÏÞ±»×èֹ֮ǰ´ÓBitcoin DepotµÄÇ®°üÖÐ×ªÒÆÁË50.903¸ö±ÈÌØ±Ò£¬°´»ã±¨µ±ÈÕ¼ÛÖµÔ¼366.5ÍòÃÀÔª¡£¹«Ë¾°µÊ¾£¬·¢ÏÖÎÊÌâºóÁ¢¼´Æô¶¯ÁËÊÂÎñÏìÓ¦ºÍ̸£¬ÀñƸÁË±í²¿ÍøÂ簲ȫר¼Ò£¬²¢Í¨ÖªÁË·¨Âɲ¿ÃÅ¡£Bitcoin Depot½øÒ»²½ÒÔΪ£¬¸ÃÊÂÎñ½öÏÞÓÚ¹«Ë¾ÄÚ²¿»·¾³£¬²¢Î´Ó°Ïì¿Í»§Æ½Ì¨¡¢²¿ÃÅ¡¢ÏµÍ³¡¢Êý¾Ý»ò»·¾³¡£¹ÌÈ»¹«Ë¾Õ¼ÓÐÕë¶ÔÍøÂç¹¥»÷µÄ±£ÏÕ£¬µ«Bitcoin Depot°µÊ¾Õâ¿ÉÄÜÎÞ·¨º¸Ç¹¥»÷Ôì³ÉµÄÈ«ÊýËðʧ¡£¼øÓÚ¸ÃÊÂÎñ¿ÉÄÜÔì³ÉµÄÃûÓþÇÖº¦¡¢Ë¾·¨¡¢¼à¹ÜºÍÓ¦¶Ô³É±¾£¬¹«Ë¾ÓÚ2026Äê4ÔÂ6ÈÕÈ϶¨¸ÃÊÂÎñÓµÓгÁ´óÒâ˼¡£
https://www.bleepingcomputer.com/news/security/crypto-atm-giant-bitcoin-depot-says-hackers-stole-36-million-from-its-wallets/
3. Âåɼí¶ÊÐÂÉʦ°ì¹«ÊÒÔâºÚ¿ÍÈëÇÖ
4ÔÂ9ÈÕ£¬ÂåÉ¼í¶¾¯Ô±¾ÖÖܶþ°ä·¢£¬ºÚ¿ÍÈëÇÖÁËÂåɼí¶ÊÐÂÉʦ°ì¹«ÊÒµÄÊý×ִ洢ϵͳ£¬¸ÃϵͳÔ̺¬´óÁ¿Ãô¸Ð¾¯ÎñÎļþ¡£¾ÝÂåÉ¼í¶¾¯Ô±¾Ö³Æ£¬ÕâЩÎļþÊÇ´ËǰÒѽâ¾ö»òºÍ½âµÄÃñʰ¸¼þÖУ¬ÔÚÖ¤¾Ý¿ªÊ¾½×¶ÎÒÆ½»µÄ×ÊÁÏ¡£¾¯·½Ç¿µ÷£¬Õâ´ÎÈëÇÖ²¢Î´Í»ÆÆÈκÎÂåÉ¼í¶¾¯Ô±¾Ö×ÔÉíµÄϵͳ»òÍøÂ磬µ«ÊÂÎñÈÔÒýÆðÁ˶Է¨ÂÉÃô¸ÐÐÅÏ¢±£»¤µÄ¸ß¶È¹Ø×¢¡£Âåɼí¶ÊÐÂÉʦ°ì¹«ÊÒ½²»°ÈËËæºó°ä²¼ÉêÃ÷³Æ£¬°ì¹«ÊÒÓÚ3ÔÂ20ÈÕ·¢ÏÖÁËÕâ´ÎÈëÇÖ¡£ºÚ¿Í½Ó¼ûµÄÊÇ¡°ÊÐÂÉʦ°ì¹«ÊÒÓÃÓÚÏò¶Ô·½ÂÉʦºÍËßËϵ±ÊÂÈË´«ÊäÖ¤¾ÝµÄµÚÈý·½¹¤¾ß¡±¡£ÉêÃ÷Ã÷È·°µÊ¾£¬Ã»ÓÐÆäËûÊÐÕþÀûÓûòÏµÍ³Éæ¼°Õâ´ÎÊÂÎñ£¬¸ÃµÚÈý·½¹¤¾ßÖеÄÐÅÏ¢ÓëÈκβ¿ÃżÍ¼»òϵͳ¾ùÎÞÁ´½Ó»ò½Ó¼ûȨÏÞ¡£¾Ý¡¶Âåɼí¶Ê±±¨¡·±¨Â·£¬É罻ýÌåÉÏÒѳöÏÖÐû³ÆÔ̺¬±»µÁ×ÊÁÏÐÅÏ¢µÄÌû×Ó£¬²¿ÃÅÌû×ÓÒѱ»É¾³ý¡£ÕâЩÌû×ÓÏÔʾ£¬¹²ÓÐ7.7TBÊý¾Ý¿É¹©ÏÂÔØ£¬³¬¹ý33.7Íò·ÝÎļþ±»½Ó¼û¡£Ð¹Â¶µÄ×ÊÁÏÔ̺¬Ö¤ÈËÐÕÃû¡¢Ò½ÁÆÐÅÏ¢¡¢Î´±à×ëµÄÐÌÊÂͶËßÒÔ¼°µ÷²éÎļþµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ¡£
https://therecord.media/breach-exposes-lapd-files-city-attorney-systems
4. Masjesu½©Ê¬ÍøÂçÒñ±Î¹¥»÷ÎïÁªÍøÉ豸
4ÔÂ8ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Trellix½üÈÕ°ä²¼»ã±¨£¬Éî¿Ì·ÖÎöÁËÃûΪMasjesuµÄÎïÁªÍø½©Ê¬ÍøÂçµÄÄÚ²¿ÔË×÷»úÔì¡£¸Ã½©Ê¬ÍøÂç×Ô2023ÄêÆð»îÔ¾£¬ÖØÒªÓÃÓÚ·¢ÆðÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷£¬ÒÑϰȾ¶àÖÖÎïÁªÍøÉ豸¡£ÆäÔËÓªÕßÖØÒªÔÚTelegramÉϽøÐÐÐû´«£¬Ðû³Æ¿ÉÄÜ·¢ÆðÊý°ÙGB¹æÄ£µÄDDoS¹¥»÷£¬Ìû×ÓͬʹØë¶ÔÖÐÎĺÍÓ¢ÎÄÓû§£¬Åú×¢Æä·þÎñ³ÖÐø¶Ô×¼ÖÐÃÀ¿Í»§¡£Ä¿Ç°ÔËÓªÕßµÄTelegramƵ·ռÓг¬¹ý400Ãû¶©ÔÄÕߣ¬µ«ÏÖʵÓû§Èº¿ÉÄܸü´ó¡£´ÓϰȾÉ豸µÄÉ¢²¼À´¿´£¬´óÎÞÊý±»Ï°È¾µÄÉ豸λÓÚÔ½ÄÏ£¬µ«°ÍÎ÷¡¢Ó¡¶È¡¢ÒÁÀÊ¡¢¿ÏÄáÑǺÍÎÚ¿ËÀ¼Ò²ÓдóÁ¿É豸±»Ï°È¾¡£TrellixÖ¸³ö£¬Êý¾ÝÇ¿ÁÒÅú×¢¹¥»÷À´×Ô¶à¸ö×ÔÖÎϵͳ£¬Éæ¼°¸÷ÀàÍøÂ磬¶ø·Ç½©Ê¬ÍøÂçÆëÈ«ÍйÜÓÚµ¥Ò»Ð鹹רÓ÷þÎñÆ÷ÌṩÉÌ¡£½üÆÚ·ÖÎöµÄMasjesuÑù±¾ÏÔʾ£¬Æä¿ÉÕë¶Ô¶àÖÖCPU¼Ü¹¹£¬Ô̺¬i386¡¢MIPS¡¢ARM¡¢SPARC¡¢PPC¡¢68KºÍAMD64¡£¸Ã½©Ê¬ÍøÂçͨ¹ýD-Link·ÓÉÆ÷¡¢GPON·ÓÉÆ÷¡¢»ªÎª¼ÒÍ¥Íø¹Ø¡¢MVPower DVR¡¢Netgear·ÓÉÆ÷¡¢UPnP·þÎñ¼°ÆäËûÎïÁªÍøÉ豸µÄÒÑÖª·ì϶½øÐд«²¼¡£
https://www.securityweek.com/evasive-masjesu-ddos-botnet-targets-iot-devices/
5. Adobe ReaderÁãÈÕ·ì϶ÔâºÚ¿ÍÀûÓÃÊýÔÂ
4ÔÂ9ÈÕ£¬°²È«×êÑÐÈËÔ±·¢ÏÖ£¬ºÚ¿ÍÕýÀûÓÃAdobe ReaderÖÐÒ»¸öÉÐ佨¸´µÄÁãÈÕ·ì϶£¬Í¨¹ý¾«ÐÄ»ú¹ØµÄ¶ñÒâPDFÎļþ·¢Æð³ÖÐøÐÔ¹¥»÷¡£¸Ã·ì϶ÓÉÍøÂ簲ȫ×êÑÐÔ±ÓÚ3ÔÂ26ÈÕ·¢ÏÖ£¬ÆäʱÊÕµ½Ò»·Ý¿ÉÒÉÑù±¾¡£½øÒ»²½·ÖÎöÏÔʾ£¬¹¥»÷»î¶¯ÖÁÉÙ×Ô2025Äê11Ô¾ÍÒÑÆðÍ·£¬Ò»¸öÃûΪ¡°Invoice540.pdf¡±µÄÑù±¾ÓÚ2025Äê11ÔÂ28ÈÕÉÏ´«ÖÁVirusTotal£¬Åú×¢ºÚ¿ÍÒѳÖÐø¹¥»÷³¤´ïËĸöÔÂÖ®¾Ã¡£¸Ã·ì϶¼«ÎªÎ£ÏÕ£¬Óû§½öÐè´ò¿ª¶ñÒâPDFÎļþ¼´¿É´¥·¢¹¥»÷£¬ÎÞÐèÈκζî±íµã»÷²Ù×÷£¬ÇÒÈ·ÈÏ¿ÉÔÚ×îа汾µÄAdobe ReaderÉϳɹ¦ÔËÐС£¹¥»÷ÓµÓÐÏÔÖøÕë¶ÔÐÔ¡£×êÑÐÈËÔ±Gi7w0rm·ÖÎö·¢ÏÖ£¬¶ñÒâPDFÎļþÖÐÔ̺¬¶íÓïµö¶üÄÚÈÝ£¬Éæ¼°¶íÂÞ˹ʯÓͺÍÌìÈ»ÆøÐÐÒµµÄʱÊÂÎÊÌ⣬Åú×¢¹¥»÷Ö¸±ê¿ÉÄÜÊǶíÓïµØÓòÈ·µ±¾Ö¡¢ÄÜÔ´»ò»ù´¡ÉèÊ©Óйػú¹¹¡£½ØÖÁĿǰ£¬AdobeÉÐδ°ä²¼½¨¸´²¹¶¡£¬Ò²Î´¹«¿ª»ØÓ¦´ËÊ¡£
https://securityaffairs.com/190558/hacking/malicious-pdf-reveals-active-adobe-reader-zero-day-in-the-wild.html
6. LucidRookÕë¶Ǫ̂Íå·Çµ±¾Ö×éÖ¯ºÍ´óѧ·¢Æð´¹µö¹¥»÷
4ÔÂ9ÈÕ£¬Ë¼¿ÆTalos°²È«×êÑÐÈËÔ±½üÈÕÅû¶£¬Ò»ÖÖÃûΪLucidRookµÄÐÂÐÍÄ£¿é»¯¶ñÒâÈí¼þÕý±»ÓÃÓÚÕë¶Ǫ̂Í嵨Óò·Çµ±¾Ö×éÖ¯ºÍ´óѧµÄÓã²æÊ½ÍøÂç´¹µö»î¶¯¡£¸Ã¶ñÒâÈí¼þ»ùÓÚLua˵»°¿ª·¢£¬±»¹éÒòÓÚÄÚ²¿×·×ÙµÄÍþв×éÖ¯UAT-10362£¬×êÑÐÈËÔ±½«ÆäÃèÊöΪ¡°Õ¼ÓгÉÊì×÷Õ½¼¼ÇÉ¡±µÄ׳´óµÐÊÖ¡£LucidRookÓÚ2025Äê10Ô±»ÓÃÓÚÏÖʵ¹¥»÷£¬¹¥»÷¼¿Á©ÖØÒªÒÀÀµÐ¯´øÊÜÃÜÂë±£»¤´æµµÎļþµÄÍøÂç´¹µöµç×ÓÓʼþ¡£×êÑÐÈËÔ±·¢ÏÖÁËÁ½ÖÖ·ÖÆçµÄϰȾÁ´¡£µÚÒ»ÖÖʹÓÃLNK¿ì½Ý·½Ê½Îļþ£¬×îÖÕͶ·ÅÃûΪLucidPawnµÄ¶ñÒâÈí¼þͶ·ÅÆ÷£»µÚ¶þÖÖ»ùÓÚEXEµÄϰȾÁ´ÔòÀûÓüÙ×°³ÉÇ÷Ïò¿Æ¼¼Worry-Free Business Security ServicesµÄ¼Ùðɱ¶¾Èí¼þ¿ÉÖ´ÐÐÎļþ¡£LucidRookÔÚÖ´Ðйý³ÌÖÐ»á½øÐÐϵͳ¿úËÅ£¬ÍøÂçÓû§ºÍÍÆËã»úÃû³Æ¡¢ÒÑ×°ÖÃÀûÓ÷¨Ê½ºÍÔÚÔËÐеĹý³ÌµÈÐÅÏ¢¡£ÍøÂçµ½µÄÊý¾ÝʹÓÃRSA¼ÓÃÜ£¬´æ´¢ÔÚÊÜÃÜÂë±£»¤µÄ´æµµÖУ¬²¢Í¨¹ýFTPй¶µ½¹¥»÷Õß½ÚÔìµÄ»ù´¡ÉèÊ©¡£
https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/


¾©¹«Íø°²±¸11010802024551ºÅ