ShinyHunters¹¥»÷Ô½ÄÏÐÅÓþÖÖÂ1.6ÒÚÌõÃô¸ÐÐÅÓüͼй¶

Ðû²¼Ê±¼ä 2025-09-10

1. ShinyHunters¹¥»÷Ô½ÄÏÐÅÓþÖÖÂ1.6ÒÚÌõÃô¸ÐÐÅÓüͼй¶


9ÔÂ8ÈÕ £¬£¬£¬£¬ºÚ¿Í×éÖ¯ShinyHuntersÐû³ÆÀÖ³ÉÈëÇÖÔ½ÄÏÐÅÓþ֣¨Credit Institute of Vietnam£© £¬£¬£¬£¬ÇÔÈ¡Áè¼Ý1.6ÒÚÌõ¼Í¼ £¬£¬£¬£¬Éæ¼°Ô½ÄϹú¼ÒÐÅÓÃÐÅÏ¢ÖÐÐÄ£¨NCIC£©ÖÎÀíµÄº£Á¿Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¸ÃÖÐÐÄ×÷ΪԽÄϹú¼ÒÒøÐÐÖ±ÊôµÄ¹«¹²·ÇÉÌÒµ×éÖ¯ £¬£¬£¬£¬¼ç¸º¹ú¼ÒÐÅÓùҺÅÖ°ÄÜ £¬£¬£¬£¬ÈÏÕæÍøÂç¡¢´¦Öóͷ£¡¢´æ´¢ºÍÆÊÎöÐÅÓÃÐÅÏ¢ £¬£¬£¬£¬²¢¶Ô·¨È˺Í×ÔÈ»È˾ÙÐÐÐÅÓÃÆÀ·ÖÓëÆÀ¼¶¡£¡£¡£¡£¾ÝShinyHuntersÔÚTelegram¼°ºÚ¿ÍÂÛ̳Åû¶ £¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨¡°¼«ÆäÃô¸ÐµÄÐÅÏ¢¡± £¬£¬£¬£¬º­¸ÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡¢ÐÅÓÃÖ§¸¶¼Í¼¡¢Î£º¦ÆÊÎö±¨¸æ¡¢ÐÅÓÿ¨Êý¾Ý£¨Ðè×ÔÐнâÃÜFDEËã·¨£©¡¢ÎäÊ¿Éí·ÝÖ¤¡¢Õþ¸®Éí·ÝÖ¤¡¢Ë°ºÅ¡¢ËðÒæ±í¼°Ç·Õ®ÐÅÏ¢µÈ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬Ô½ÄÏ×ÜÉú³Ý½öÔ¼1.02ÒÚ £¬£¬£¬£¬¶øÊý¾Ý¼¯°üÀ¨ÀúÊ·¼Í¼ £¬£¬£¬£¬×ÜÐÐÊý´ï30ÒÚÌõ £¬£¬£¬£¬ShinyHuntersÉù³Æ»ñÈ¡ÁË¡°ÏÕЩËùÓÐÉú³ÝµÄÊý¾Ý¡±¡£¡£¡£¡£¹¥»÷Êֶη½Ãæ £¬£¬£¬£¬ShinyHunters͸¶ͨ¹ý¡°n-dayÎó²î¡±»ñÈ¡»á¼ûȨÏÞ £¬£¬£¬£¬ÓÉÓÚÄ¿µÄϵͳÈí¼þÒÑÍ£²ú £¬£¬£¬£¬ÎÞ¿ÉÓò¹¶¡ÐÞ¸´Îó²î¡£¡£¡£¡£¸Ã×éÖ¯Ã÷È·ÌåÏÖδÌᳫÀÕË÷ʵÑé £¬£¬£¬£¬ÒòÔ¤ÆÚ²»»á»ñµÃ»ØÓ¦¡£¡£¡£¡£ÏÖÔÚÔ½ÄÏÐÅÓþÖÉÐδ»Ø¸´ £¬£¬£¬£¬ÊÂÎñÕæÊµÐÔÈÔ´ýÈ·ÈÏ¡£¡£¡£¡£


https://databreaches.net/2025/09/08/vietnams-national-credit-registration-and-reporting-agency-hacked-most-of-the-population-affected/


2. LovesacÈ·ÈÏÔÚÀÕË÷Èí¼þ¹¥»÷ºó±¬·¢Êý¾Ýй¶


9ÔÂ8ÈÕ £¬£¬£¬£¬ÃÀ¹ú×ÅÃû¼Ò¾ßÆ·ÅÆLovesac¿ËÈÕÅû¶һÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬Ó°Ïì¹æÄ£¼°ÏêϸÈËÊýÉÐδÃ÷È·¡£¡£¡£¡£¸Ã¹«Ë¾×÷Ϊģ¿£¿£¿£¿£¿é»¯É³·¢¡°sactionals¡±ºÍ¶¹´ü¡°sacs¡±µÄÖÆÔìÉÌ £¬£¬£¬£¬ÔÚÃÀ¹úÓµÓÐ267¼ÒÕ¹Ìü £¬£¬£¬£¬Äê¾»ÏúÊÛ¶î´ï7.5ÒÚÃÀÔª¡£¡£¡£¡£¾Ý¹Ù·½Í¨Öª £¬£¬£¬£¬2025Äê2ÔÂ12ÈÕÖÁ3ÔÂ3ÈÕʱ´ú £¬£¬£¬£¬ºÚ¿Íδ¾­ÊÚȨ»á¼ûLovesacÄÚ²¿ÏµÍ³²¢ÇÔÈ¡ÍйÜÊý¾Ý¡£¡£¡£¡£¹«Ë¾ÓÚ2ÔÂ28ÈÕ·¢Ã÷Îó²î £¬£¬£¬£¬ºÄʱÈýÌìÍê³Éµ÷½â²¢×èÖ¹ÍþвÕß½øÒ»²½»á¼û¡£¡£¡£¡£±»µÁÊý¾Ý°üÀ¨È«Ãû¼°ÆäËûδÅû¶µÄСÎÒ˽¼ÒÐÅÏ¢ £¬£¬£¬£¬µ«LovesacδÃ÷È·ÊÜÓ°ÏìȺÌåÊǿͻ§¡¢Ô±¹¤»ò³Ð°üÉÌ £¬£¬£¬£¬Òàδ͸¶ÏêϸÊÜÓ°ÏìÈËÊý¡£¡£¡£¡£×÷Ϊµ÷½â²½·¥ £¬£¬£¬£¬¹«Ë¾ÎªÊÜÓ°ÏìСÎÒ˽¼ÒÌṩͨ¹ýExperian×¢²áµÄ24¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ £¬£¬£¬£¬ÓÐÓÃÆÚÖÁ2025Äê11ÔÂ28ÈÕ £¬£¬£¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÐÅÏ¢Òѱ»ÀÄÓᣡ£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïRansomHubÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ £¬£¬£¬£¬²¢ÓÚ3ÔÂ3ÈÕ½«LovesacÁÐÈëÆäÀÕË÷ÃÅ»§ÍøÕ¾ £¬£¬£¬£¬ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÊý¾Ý¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lovesac-confirms-data-breach-after-ransomware-attack-claims/


3. ¶à¹úÖ´·¨Áª¶¯¹Ø±ÕÈ«Çò×ͽ°æÌåÓýƽ̨Calcio


9ÔÂ8ÈÕ £¬£¬£¬£¬ÔÚ´´ÒâÓëÓéÀÖͬÃË£¨ACE£©ÓëDAZNµÄÁªºÏÐж¯Ï £¬£¬£¬£¬È«Çò×ÅÃûµÁ°æÌåÓýÁ÷ýÌåÆ½Ì¨Calcio±»Õýʽ¹Ø±Õ¡£¡£¡£¡£¸Ãƽ̨ÒÑÍù12¸öÔÂͨ¹ý134¸öÓòÃûÎüÒý³¬1.23Òڴλá¼û £¬£¬£¬£¬ÆäÖÐÒâ´óÀûÔ»á¼ûÁ¿Í»ÆÆ600Íò´Î £¬£¬£¬£¬Õ¼Æä×ÜÁ÷Á¿80%ÒÔÉÏ £¬£¬£¬£¬³ÉΪ¸Ã¹ú×îÊܽӴýµÄÌåÓýÁ÷ýÌåЧÀÍ £¬£¬£¬£¬Óû§»¹ÆÕ±éÂþÑÜÓÚÎ÷°àÑÀ¡¢ÃÀ¹ú¡¢µÂ¹úºÍ·¨¹ú¡£¡£¡£¡£Calcioͨ¹ý²»·¨×ª²¥°üÀ¨Òâ¼×¡¢Ó¢³¬¡¢Å·¹Ú¡¢NBA¡¢F1¡¢ÍøÇòµÈ¶¥¼¶ÈüÊ £¬£¬£¬£¬ÑÏÖØ¹¥»÷ÌåÓý°æÈ¨Éú̬¡£¡£¡£¡£ÆäλÓÚĦ¶û¶àÍßµÄÔËÓªÉÌÒÑÔÞ³É×èÖ¹ÔËÓª £¬£¬£¬£¬ËùÓÐÓòÃû±»×ªÒÆÖÁACE²¢Öض¨ÏòÖÁ¹Ù·½¡°Õýµ±¹ÛÈü¡±Æ½Ì¨¡£¡£¡£¡£´Ë´ÎÐж¯²»µ«ÇжÏÁ˵Á°æÄÚÈÝÈö²¥Á´ £¬£¬£¬£¬¸ü±£»£»£»£»£»£»¤Á˹㲥¹«Ë¾¡¢ÌåÓýͬÃ˼°ÇòÃÔµÄÈ¨Òæ¡£¡£¡£¡£×÷ΪÓÉ50Óà¼ÒýÌåÓéÀÖ¾ÞÍ·×é³ÉµÄ·´µÁ°æÍ¬ÃË £¬£¬£¬£¬ACEÔøÁªºÏÃÀ¹ú˾·¨²¿¡¢Å·ÖÞÐ̾¯×éÖ¯µÈ»ú¹¹¹¥»÷²»·¨ÍøÂç £¬£¬£¬£¬´ËǰÒÑÀֳɹرÕStreameast¡¢Rare Breed TVµÈ´óÐ͵Á°æÆ½Ì¨ £¬£¬£¬£¬²¢Íƶ¯JetflicksÍ·Ä¿±»ÅÐÆßÄêî¿Ïµ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/massive-calcio-sports-streaming-piracy-service-with-123m-yearly-visits-shut-down/


4. ÃÀ¹ú¼¦µ°¾ÞÍ·Rose Acre FarmsÔâLynxÀÕË÷Èí¼þ¹¥»÷


9ÔÂ8ÈÕ £¬£¬£¬£¬ÃÀ¹ú¶¥¼¶¼¦µ°Éú²úÉÌRose Acre Farms¿ËÈÕÔâÍøÂç·¸·¨¼¯ÍÅLynxÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÒѼÓÃܸù«Ë¾Êý¾Ý¡£¡£¡£¡£×÷ΪÄêÓªÊÕ½ü7ÒÚÃÀÔª¡¢Ô±¹¤³¬2000È˵ÄÐÐÒµ¾ÞÍ· £¬£¬£¬£¬Rose Acre FarmsÔÚ¶à¸öÖÝÉèÓй¤³§ £¬£¬£¬£¬Æä²úÆ·ÔøÍ¨¹ýÎÖ¶ûÂêÏúÊÛ £¬£¬£¬£¬ÏÖ¿ÉÄܽøÈë°ÂÀÖÆë¹©Ó¦Á´¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚÉÏÖÜÍíЩʱ¼ä £¬£¬£¬£¬LynxÔÚÆä°µÍø²©¿Í¹ûÕæÊܺ¦ÕßÐÅÏ¢ £¬£¬£¬£¬µ«ÉÐδÌṩÊý¾ÝÑù±¾ £¬£¬£¬£¬½öÇ¿µ÷Êý¾ÝÒѼÓÃܲ¢ÔÊÐíºóÐøÌṩ֤¾Ý¡£¡£¡£¡£ÀÕË÷Èí¼þ¹¥»÷¶ÔÅ©²úÆ·Éú²úÉÌÍþвÓÈΪÑÏÖØ¡£¡£¡£¡£CybernewsÑо¿ÍŶÓÖ¸³ö £¬£¬£¬£¬È±·¦±¸·ÝµÄÆóÒµ¿ÉÄÜÃæÁÙÔËÓªÖÐÖ¹ £¬£¬£¬£¬Ê³Îïδʵʱ½»¸¶½«µ¼Ö±äÖÊ £¬£¬£¬£¬Ôì³ÉÖØ´ó¾­¼ÃËðʧ²¢Òý·¢Êг¡²¨¶¯¡£¡£¡£¡£ÀúÊ·°¸ÀýÏÔʾ £¬£¬£¬£¬2021ÄêJBSÈâÁª³§Ôâ¹¥»÷ÔøÍÆ¸ßÈâÀà¼ÛÇ® £¬£¬£¬£¬Ö³ÃñÊäÓ͹ܵÀ¹¥»÷¸üµ¼ÖÂȼÓÍǷȱ¼°¼ÛÇ®ì­Éý¡£¡£¡£¡£´Ë´Î¹¥»÷Èôµ¼Ö¼¦µ°¹©Ó¦ïÔÌ­ £¬£¬£¬£¬¿ÉÄܹ¥»÷ÃÀ¹úʳÎ﹩ӦÁ´²¢Ó°ÏìÖն˼ÛÇ®¡£¡£¡£¡£


https://cybernews.com/security/rose-acre-farms-alleged-data-breach/


5. Docker¹¥»÷½øÉý¼¶£º´Ó¼ÓÃܿ󹤵½ÖØ´ó½©Ê¬ÍøÂçµÄÑݽø


9ÔÂ9ÈÕ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬Õë¶Ô̻¶µÄDocker APIµÄÍþвÐÐΪÕßÒÑ¶ÔÆä¶ñÒ⹤¾ß¾ÙÐÐÖØ´óÉý¼¶ £¬£¬£¬£¬ÐÂÔö¶àÏîΣÏÕ¹¦Ð§ £¬£¬£¬£¬»òÎªÖØ´ó½©Ê¬ÍøÂçµÓÚ¨»ù´¡¡£¡£¡£¡£¾ÝÇ÷ÊÆ¿Æ¼¼½ñÄê6ÔÂÊ×¶ÈÅû¶ £¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÖ²Èë¼ÓÃܿ󹤵ľ籾¼°TorÍøÂçÒþ²ØÉí·Ý£»£»£»£»£»£»¶øAkamai×îÐÂÑо¿ÔòÕ¹ÏÖÁ˸üÖØ´óµÄ¹¥»÷Á´ £¬£¬£¬£¬Ð¹¤¾ß²»ÔÙ´¿´â°²ÅÅ¿ó¹¤ £¬£¬£¬£¬¶øÊÇͨ¹ý¶à½×¶Î²Ù×÷ʵÏÖ³¤ÆÚ»¯¿ØÖÆÓëºáÏòÈö²¥¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÍþвÐÐΪÕßɨÃè̻¶µÄDocker API£¨¶Ë¿Ú2375£© £¬£¬£¬£¬Ê¹ÓÃÐ޸ĺóµÄAlpine Linux¾µÏñ·¢ËÍÈÝÆ÷½¨ÉèÇëÇ󡣡£¡£¡£ÈÝÆ÷Ö´ÐнâÂëºóµÄshellÏÂÁî £¬£¬£¬£¬×°ÖÃcurlºÍTor £¬£¬£¬£¬Æô¶¯TorÊØ»¤Àú³Ì²¢Í¨¹ýSOCKS5ÊðÀíÑéÖ¤ÅþÁ¬¡£¡£¡£¡£È·ÈÏTor»îÔ¾ºó £¬£¬£¬£¬ÈÝÆ÷´ÓTorÒþ²ØÐ§ÀÍÏÂÔØµÚ¶þ½×¶Î¾ç±¾£¨docker-init.sh£© £¬£¬£¬£¬¸Ã¾ç±¾ÊµÏÖ³¤ÆÚSSH»á¼û £¬£¬£¬£¬Í¬Ê±Ð´Èëbase64±àÂëµÄcron×÷ҵÿ·ÖÖÓÖ´ÐÐ £¬£¬£¬£¬²¢Ê¹Ó÷À»ðǽ¹¤¾ß£¨iptables¡¢nftablesµÈ£©·â±Õ¶Ë¿Ú2375µÄÍⲿ»á¼û¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬¾ç±¾×°ÖÃmasscan¡¢zstd¡¢torsocksµÈ¹¤¾ßÖ§³ÖɨÃèÓë¹æ±Ü¡£¡£¡£¡£Ëæºó £¬£¬£¬£¬¶ñÒâÈí¼þÏÂÔØZstandardѹËõµÄGo¶þ½øÖÆÎļþ £¬£¬£¬£¬½âѹÖÁ/tmp/system²¢Ö´ÐС£¡£¡£¡£Æä½¹µã¹¦Ð§ÊÇɨÃèÆäËû̻¶µÄDocker API £¬£¬£¬£¬Í¨¹ýÏàͬÈÝÆ÷½¨ÉèÒªÁìѬȾнڵ㠣¬£¬£¬£¬²¢É¾³ý¾ºÕùµÐÊÖÈÝÆ÷ £¬£¬£¬£¬ÐγÉ×ÔÎÒ¸´ÖƵĽ©Ê¬ÍøÂçÊðÀíÌØÕ÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-hide-behind-tor-in-exposed-docker-api-breaches/


6. ŦԼѪҺÖÐÐÄÔâÀÕË÷¹¥»÷Ö´ó¹æÄ£Êý¾Ýй¶ £¬£¬£¬£¬³¬ÍòÈËÊÜÓ°Ïì


9ÔÂ10ÈÕ £¬£¬£¬£¬ÃÀ¹ú×î´ó×ÔÁ¦ÑªÒºÖÐÐÄ֮һŦԼѪҺÖÐÐÄÔÚ2025Äê1ÔÂÔâÓöÀÕË÷Èí¼þ¹¥»÷ºó £¬£¬£¬£¬ÓÚ9ÔÂ5ÈÕÆô¶¯Êܺ¦ÕßÊý¾Ýй¶֪ͨ³ÌÐò¡£¡£¡£¡£¸ÃÖÐÐÄÕÛÎñÈ«ÃÀ³¬7500ÍòÈË £¬£¬£¬£¬ÖðÈÕÏò400Óà¼ÒÒ½Ôº¹©Ó¦Ô¼4000µ¥Î»ÑªÒºÖÆÆ·¡£¡£¡£¡£¾Ýî¿ÏµÎļþÅû¶ £¬£¬£¬£¬¹¥»÷ÓÚ1ÔÂ26ÈÕÊ״α»·¢Ã÷ £¬£¬£¬£¬ºÚ¿ÍÔÚ1ÔÂ20ÈÕÖÁ26ÈÕʱ´úÇÖÈëÆäÍøÂç £¬£¬£¬£¬¸´ÖÆÎļþºóʵÑéÀÕË÷¡£¡£¡£¡£´Ë´ÎÊÂÎñµ¼Ö¶àÖÝ»¼Õß¼°Ô±¹¤ÐÅϢй¶ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢¿µ½¡Êý¾Ý¡¢¼ì²âЧ¹û¡¢Éç±£ºÅÂë¡¢¼ÝÕÕ/Éí·ÝÖ¤ºÅ¼°½ðÈÚÕË»§ÐÅÏ¢¡£¡£¡£¡£ÏêϸÀ´¿´ £¬£¬£¬£¬µÂ¿ËÈøË¹ÖÝ10,557ÈËÊÜÓ°Ïì £¬£¬£¬£¬ÃåÒòÖÝ¡¢Ðº±²¼Ê²¶ûÖÝ¡¢¼ÓÀû¸£ÄáÑÇÖÝÒàÓÐÊܺ¦Õß £¬£¬£¬£¬×ÜÈËÊýδÍêÈ«¹ûÕæ¡£¡£¡£¡£×÷Ϊ½¨ÉèÓÚ1964ÄêµÄ·ÇÓªÀû»ú¹¹ £¬£¬£¬£¬Å¦Ô¼ÑªÒºÖÐÐÄÆìÏÂÓµÓжà¼ÒѪҺÏà¹ØÊµÌå £¬£¬£¬£¬ÓªÒµº­¸ÇÁÙ´²Ð§ÀÍ¡¢ÑªÒºÊèÉ¢¡¢Ï¸°ûÁÆ·¨¼°Õï¶Ï¼ì²â £¬£¬£¬£¬ÕâЩЧÀ;ùÐè´¦Öóͷ£Ãô¸ÐÒ½ÁÆÐÅÏ¢¡£¡£¡£¡£ÊÓ²ìÏÔʾ £¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸´ÖÆÎļþ»ñÈ¡Á˲¿·ÖÁÙ´²ÐÅÏ¢ £¬£¬£¬£¬ÊÓ²ìÓÚ6ÔÂ30ÈÕÍê³É £¬£¬£¬£¬8ÔÂ12ÈÕÈ·¶¨×îÖÕÊܺ¦ÕßÃûµ¥¡£¡£¡£¡£ÎªÓ¦¶ÔÊÂÎñ £¬£¬£¬£¬¸ÃÖÐÐÄÒÑÆô¶¯Í¨ÖªÁ÷³Ì£ºÍ¨¹ýÓʼÄÐź¯¡¢ÍøÕ¾Í¨¸æ¼°ÉèÁ¢ºô½ÐÖÐÐÄÏòÊܺ¦Õßת´ïÇéÐΡ£¡£¡£¡£


https://therecord.media/blood-center-discloses-details-on--january-ransomware-attack