TalentHookÇóְϵͳÉèÖùýʧÖÂ2600Íò·Ý¼òÀúй¶

Ðû²¼Ê±¼ä 2025-07-07

1. TalentHookÇóְϵͳÉèÖùýʧÖÂ2600Íò·Ý¼òÀúй¶


7ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÈËÁ¦×ÊԴЧÀÍÆ½Ì¨TalentHookÒòAzure Blob´æ´¢ÈÝÆ÷ÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬µ¼Ö½ü2600Íò·ÝÇóÖ°Õß¼òÀú±»¹ûÕæÌ»Â¶£¬£¬£¬£¬£¬£¬£¬Òý·¢ÑÏÖØÊý¾ÝÇå¾²ÊÂÎñ¡£¡£ ¡£Ì»Â¶µÄÈÝÆ÷Öд洢×Å´ó×ÚÃÀ¹úÇóÖ°ÕßµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢½ÌÓýÅä¾°¡¢ÊÂÇéÂÄÀú¼°¼ÒͥסַµÈ½¹µãСÎÒ˽¼ÒÐÅÏ¢¡£¡£ ¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾ÝµÄ¸ßÍêÕûÐÔʹ¹¥»÷ÕßÄܹ»ÊµÑ龫׼Éç»á¹¤³Ì¹¥»÷¡£¡£ ¡£ºÚ¿Í¿Éͨ¹ýÓʼþ¡¢¶ÌÐÅ·¢ËÍÐéαÊÂÇéÔ¼Çë»òÅä¾°ÊÓ²ìÒªÇ󣬣¬£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦ÕßÌá½»Éí·Ý֤ɨÃè¼þ¡¢ÒøÐÐÕË»§µÈ¸üÉî²ãÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÉõÖÁð³ä¹ÍÖ÷ÊÕÈ¡ÐéαÉêÇëÓöÈ¡£¡£ ¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¼ÒͥסַÓëÁªÏµ·½·¨µÄ̻¶´ó·ùÔöÌíÁË"ÈËÈâËÑË÷"Σº¦£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÏÖʵÌìÏÂÖеÄɧÈÅ»òÏÅ»£ÐÐΪ¡£¡£ ¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬£¬CybernewsÒÑÏòTalentHookĸ¹«Ë¾Resource Edge·¢³öÇå¾²¾¯Ê¾£¬£¬£¬£¬£¬£¬£¬½¨ÒéÆäÁ¬Ã¦½ÓÄÉÎåÏîÐÞ¸´²½·¥£ºÏÞÖÆÈÝÆ÷¹«¹²»á¼ûȨÏÞ¡¢ÆôÓÃЧÀÍÆ÷¶Ë¼ÓÃÜ¡¢Í¨¹ýAzure Key VaultÖÎÀíÃÜÔ¿¡¢½¨Éè»á¼ûÈÕÖ¾¼à¿Ø»úÖÆ£¬£¬£¬£¬£¬£¬£¬²¢¿ªÕ¹°´ÆÚÇå¾²Éó¼ÆÓëÔ±¹¤Åàѵ¡£¡£ ¡£×èÖ¹±¨¸æÐû²¼£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδ¹ûÕæ»ØÓ¦´¦Öóͷ£Ï£Íû¡£¡£ ¡£


https://cybernews.com/security/talenthook-data-leak-exposes-millions/


2. ¹ú¼ÊÖ´·¨Ðж¯´Ý»Ù×ÊÙ°µÍø¶¾Æ·Êг¡Archetyp Market


7ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬Å·ÖÞÐ̾¯×éÖ¯Ôڵ¹úÖ÷µ¼µÄ¶à¹úÁªºÏÐж¯ÖУ¬£¬£¬£¬£¬£¬£¬ÀֳɹرÕÁ˰µÍøÀúÊ·ÉÏÔËӪʱ¼ä×µÄ¶¾Æ·ÉúÒâÆ½Ì¨Archetyp Market£¬£¬£¬£¬£¬£¬£¬²¢¾Ð²¶Æä½¹µã³ÉÔ±¡£¡£ ¡£´Ë´Î´úºÅ"Deep Sentinel"µÄרÏîÐж¯ÓÚ6ÔÂ11ÈÕÖÁ13ÈÕÕö¿ª£¬£¬£¬£¬£¬£¬£¬ºá¿çµÂ¹ú¡¢ºÉÀ¼¡¢ÂÞÂíÄáÑÇ¡¢Î÷°àÑÀ¡¢ÈðµäµÈÁù¹ú£¬£¬£¬£¬£¬£¬£¬Ô¼300ÃûÖ´·¨Ö°Ô±Í¬²½ÊµÑé×¥²¶ÓëÖ¤¾Ý±£È«£¬£¬£¬£¬£¬£¬£¬×îÖÕÔÚÎ÷°àÑÀ¾³ÄÚ×¥»ñ¸ÃÊг¡ÖÎÀíÔ±£¬£¬£¬£¬£¬£¬£¬Èðµä·½ÃæÍ¬²½¹¥»÷¶¥¼¶¹©Ó¦ÉÌÍøÂç¡£¡£ ¡£×÷Ϊ°µÍø¶¾Æ·ÉúÒâÁìÓòµÄ"ÔªÀϼ¶"ƽ̨£¬£¬£¬£¬£¬£¬£¬Archetyp Market×Ô2019ÄêÆðÒ»Á¬ÔËÓªÁè¼ÝÎåÄ꣬£¬£¬£¬£¬£¬£¬ÀÛ¼Æ×¢²áÓû§Í»ÆÆ60Íò£¬£¬£¬£¬£¬£¬£¬×ÜÉúÒâ¶î¹ÀËã´ï2.5ÒÚÅ·Ôª¡£¡£ ¡£ÆäÉÌÆ·¿â°üÀ¨1.7ÍòÖÖ²»·¨ÎïÆ·£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÒÔÔÊÐíÉúÒâ·ÒÌ«ÄáµÈ¸ß´¿¶ÈºÏ³É°¢Æ¬ÀàÒ©ÎïÖø³Æ£¬£¬£¬£¬£¬£¬£¬ÕâÀàÎïÖÊÒѳÉΪŷÖÞÒÔÖÂÈ«ÇòÈÕÒæÑÏËàµÄ¹«¹²ÎÀÉúÍþв¡£¡£ ¡£Æ½Ì¨ÊÖÒռܹ¹½ÓÄɶàÖØÄäÃû»¯Éè¼Æ£¬£¬£¬£¬£¬£¬£¬ÓëÒѹرյÄDream Market¡¢Silk RoadµÈ°µÍøÆ½Ì¨ÆëÃû£¬£¬£¬£¬£¬£¬£¬ÐγÉÍêÕûµÄ²»·¨¹©Ó¦Á´¡£¡£ ¡£Ðж¯ÖУ¬£¬£¬£¬£¬£¬£¬Ö´·¨»ú¹¹Í¨¹ýºã¾Ã×ʽð×·×ÙÓëÊý×Öȡ֤£¬£¬£¬£¬£¬£¬£¬Àֳɶ¨Î»Òªº¦»ù´¡ÉèÊ©²¢¶³½á780ÍòÅ·ÔªÉæ°¸×ʲú¡£¡£ ¡£µÂ¹úÁª°îÐÌʾ¯Ô±¾Ö£¨BKA£©ÓëÅ·ÖÞ˾·¨×éÖ¯£¨Eurojust£©Ð­µ÷¿ç¹úÖ¤¾ÝÁ´£¬£¬£¬£¬£¬£¬£¬×îÖÕʵÏÖÊÖÒÕÍŶÓÓëÖÎÀí²ãµÄË«ÖØÍ»ÆÆ¡£¡£ ¡£


https://securityaffairs.com/179591/cyber-crime/europol-shuts-down-archetyp-market-longest-running-dark-web-drug-marketplace.html


3. IdeaLabÔâÓöHunters InternationalÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬262GBÊý¾Ýй¶


7ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¼ÓÖÝÀÏÅÆ¿Æ¼¼·õ»¯Æ÷IdeaLab¿ËÈÕÏòÊÜ2024Äê10ÔÂÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄСÎÒ˽¼Ò·¢³ö֪ͨ£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÆäÔâÓöHunters InternationalÀÕË÷Èí¼þ×éÖ¯¹¥»÷µÄϸ½Ú¡£¡£ ¡£¸ÃÊÂÎñµ¼ÖÂÁè¼Ý13.7Íò·ÝÎļþ£¨×ÜÁ¿´ï262.8GB£©±»ÇÔÈ¡£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£º­¸ÇÏÖÈÎ/ǰÈÎÔ±¹¤¡¢³Ð°üÉ̼°Æä¾ìÊô¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÓÚ2024Äê10ÔÂ4ÈÕÇÖÈëϵͳ£¬£¬£¬£¬£¬£¬£¬ÈýÌìºó±»¼ì²âµ½Òì³£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬£¬µ«Ö±ÖÁ2025Äê6ÔÂ26ÈÕµÚÈý·½ÊÓ²ìÍê³É²ÅÈ·ÈÏÊý¾ÝÔâÇÔ¡£¡£ ¡£Ö»¹ÜÏêϸй¶×Ö¶ÎδÍêÈ«¹ûÕæ£¬£¬£¬£¬£¬£¬£¬µ«È·ÈϰüÀ¨ÐÕÃûÓëÆäËûÃô¸ÐÐÅÏ¢×éºÏ£¬£¬£¬£¬£¬£¬£¬×ãÒÔÓÃÓÚÉí·Ý͵ÇÔ»ò¾«×¼Õ©Æ­¡£¡£ ¡£ÀÕË÷Èí¼þ×éÖ¯Hunters InternationalÔÚ°µÍø¹ûÕæÊý¾Ýºó£¬£¬£¬£¬£¬£¬£¬ÓÚ2025Äê6ÔÂͻȻÐû²¼¹Ø±ÕÆäÀÕË÷ÃÅ»§£¬£¬£¬£¬£¬£¬£¬²¢É¾³ýËùÓÐÊܺ¦ÆóÒµÌõÄ¿£¬£¬£¬£¬£¬£¬£¬×ª¶øÍÆ×ÅÃûΪWorld LeaksµÄÐÂÆ½Ì¨¼ÌÐøÊµÑéÍøÂçڲƭ¡£¡£ ¡£ÕâÒ»Æ·ÅÆÖØ×éÕ½ÂÔÓëÍøÂçÇå¾²¹«Ë¾Group-IB´ËǰµÄÆÊÎöÒ»Ö£¬£¬£¬£¬£¬£¬£¬ÏÔʾ¸ÃÍÅ»ïÕýͨ¹ý±ä»»Éí·Ý¹æ±ÜÖ´·¨×·×Ù¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍËäÉù³ÆÌṩÃ⺬»ìÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬µ«ÏÂÔØÁ´½ÓÒÑʧЧ£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÊý¾Ý¿ÉÄÜÒѱ»¶à¸ö·¸·¨ÕûÌå»ñÈ¡¡£¡£ ¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬£¬£¬£¬£¬IdeaLabΪÊÜÓ°ÏìÕßÌṩ24¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬×¢²á×èÖ¹ÈÕΪ2025Äê10ÔÂ1ÈÕ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/idealab-confirms-data-stolen-in-ransomware-attack-last-year/


4. BMW½ðÈÚЧÀ͹«Ë¾ÒòµÚÈý·½Êý¾Ýй¶ÊÂÎñÊÜÓÐÏÞÓ°Ïì


7ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬2025Äê2Ô£¬£¬£¬£¬£¬£¬£¬BMW½ðÈÚЧÀ͹«Ë¾ÒòµÚÈý·½ÏàÖúͬ°éAISÔâÓöÊý¾Ýй¶ÊÂÎñ¶ø¼ä½ÓÊܵ½Ó°Ïì¡£¡£ ¡£´Ë´ÎÊÂÎñÔ´ÓÚ×ܲ¿Î»ÓڵÿËÈøË¹ÖݵĽðÈڿƼ¼¹«Ë¾AISϵͳ±»¶ñÒâÐÐΪÕßÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÆäʱÕýΪBMW¼°ÆäÕË»§³ÖÓÐÈËÌṩ¼à¿Ø´¦Öóͷ£ÓëÖ´·¨¼à¿ØÐ§ÀÍ¡£¡£ ¡£AISÔÚ·¢Ã÷ÍøÂçÄÚ¿ÉÒɻºó£¬£¬£¬£¬£¬£¬£¬ÁªºÏȡ֤ר¼ÒÆô¶¯ÊӲ죬£¬£¬£¬£¬£¬£¬È·ÈϺڿÍÓÚ2ÔÂ16ÈÕÇÖÈëϵͳ²¢ÇÔÈ¡ÉÙÁ¿Êý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«Ïêϸй¶ÄÚÈÝÉв»Ã÷È·£¬£¬£¬£¬£¬£¬£¬Î¥¹æÍ¨Öª½öÌá¼°ÐÕÃûÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Î´Éæ¼°ÆäËûÃô¸ÐÊý¾Ý¡£¡£ ¡£ÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ£¬£¬£¬£¬£¬£¬£¬Áè¼Ý1950ÈËÊܲ¨¼°£¬£¬£¬£¬£¬£¬£¬ÆäÖнöÁ½ÃûÃåÒòÖÝסÃñ¡£¡£ ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚAISϵͳÄÚDZÔÚʱ¼ä´ïÁ½Ì죬£¬£¬£¬£¬£¬£¬Ö±ÖÁ2ÔÂ18Èղű»¼ì²â·¢Ã÷¡£¡£ ¡£AISÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÈëÇÖδ´¥¼°BMW½ðÈÚЧÀ͹«Ë¾×ÔÉíµÄϵͳÓëÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬Æä½¹µãÊý¾ÝÇ徲δÊÜÍþв¡£¡£ ¡£ÎªÓ¦¶ÔDZÔÚΣº¦£¬£¬£¬£¬£¬£¬£¬AISÒÑÔÊÐíΪÊÜÓ°ÏìÓû§ÌṩΪÆÚ12¸öÔµÄEquifaxÐÅÓÃ¼à¿Ø¼°Éí·Ý͵ÇÔÔ¤·ÀЧÀÍ£¬£¬£¬£¬£¬£¬£¬Á¦Õù½«Ëðʧ½µÖÁ×îµÍ¡£¡£ ¡£


https://cybernews.com/security/bmw-financial-services-third-party-breach/


5. Ingram MicroÈ·ÈÏÔâÊÜSafePayÀÕË÷Èí¼þ¹¥»÷


7ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬£¬2025Äê7Ô£¬£¬£¬£¬£¬£¬£¬È«ÇòIT¾ÞÍ·Ingram Micro£¨Ó¢Âõ¹ú¼Ê£©È·ÈÏÔâÓöSafePayÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÄÚ²¿ÏµÍ³¹Ø±Õ¼°ÍøÕ¾¡¢ÔÚÏß¶©¹ºÆ½Ì¨Ì±»¾¡£¡£ ¡£´Ë´Î¹¥»÷±¬·¢ÓÚÖÜËÄÆÆÏþ£¬£¬£¬£¬£¬£¬£¬Ô±¹¤×°±¸·ºÆðÀÕË÷ÐÅ£¬£¬£¬£¬£¬£¬£¬µ«¼ÓÃÜÇéÐÎÉÐδÃ÷È·¡£¡£ ¡£¹¥»÷;¾¶ÒÉËÆÍ¨¹ýGlobalProtect VPNƽ̨£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃй¶ƾ֤»òÃÜÂëÅçÈ÷¹¥»÷ÇÖÈëÍøÂç¡£¡£ ¡£ÊÜÓ°Ïìϵͳ°üÀ¨»ùÓÚAIµÄXvantage·Ö·¢Æ½Ì¨ºÍImpulseÔÊÐíÖ¤ÉèÖÃÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬¶øMicrosoft 365¡¢TeamsµÈЧÀÍÈÔÕý³£ÔËÐС£¡£ ¡£ÊÂÎñÒý·¢²¿·ÖµØÇøÔ±¹¤Ô¶³Ì°ì¹«£¬£¬£¬£¬£¬£¬£¬¹«Ë¾×Ô¶¯ÏÂÏß²¿·Öϵͳ²¢¹Ø±ÕVPN»á¼û£¬£¬£¬£¬£¬£¬£¬µ«Î´ÊµÊ±¹ûÕæÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬½öÒÔ"ITÎÊÌâ"¶ÔÍâ˵Ã÷¡£¡£ ¡£SafePayÍÅ»ï×Ô2024Äê11Ô·ºÆðºóÒѹ¥»÷³¬220¼ÒÆóÒµ£¬£¬£¬£¬£¬£¬£¬ÆäÀÕË÷֪ͨ³£º¬Í¨ÓÃÐÔÊý¾ÝÇÔÈ¡ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬Î´±ØÕë¶ÔÌØ¶¨Êܺ¦Õß¡£¡£ ¡£7ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬Ingram MicroÕýʽÈϿɹ¥»÷£¬£¬£¬£¬£¬£¬£¬Æô¶¯ÊӲ첢ִ֪ͨ·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÖÂǸ¿Í»§¼°ÏàÖúͬ°é£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÆð¾¢»Ö¸´ÏµÍ³¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/


6. Telef¨®nicaÔâHellcatºÚ¿Í×éÖ¯Êý¾Ýй¶Íþв£¬£¬£¬£¬£¬£¬£¬¹«Ë¾·ñ¶¨ÊÂÎñ


7ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬Î÷°àÑÀµçÐŹ«Ë¾Telef¨®nica½üÆÚÔâÓöHellcatÀÕË÷Èí¼þ×éÖ¯³ÉÔ±ReyµÄÊý¾Ýй¶Íþв£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÉù³ÆÇÔÈ¡ÁË106GBÊý¾Ý²¢ÒÑй¶5GBÑù±¾£¬£¬£¬£¬£¬£¬£¬µ«¹«Ë¾Ê¼ÖÕδÈÏ¿ÉÊÂÎñÕæÊµÐÔ¡£¡£ ¡£´Ë´ÎÈëÇ־ݳƱ¬·¢ÓÚ5ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃJiraЧÀÍÆ÷ÉèÖùýʧÇÖÈ룬£¬£¬£¬£¬£¬£¬Ò»Á¬12Сʱ»ñÈ¡°üÀ¨¿Í»§·¢Æ±¡¢Ô±¹¤ÓÊÏäµÈÎļþ£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÐÙÑÀÀû¡¢µÂ¹úµÈ¶à¹úÊý¾Ý¡£¡£ ¡£Ö»¹ÜÑù±¾ÖÐ×îÐÂÎļþΪ2021Ä꣬£¬£¬£¬£¬£¬£¬ÓëO2Ô±¹¤Éù³ÆµÄ"¹ýʱÐÅϢڲƭ"±£´æÃ¬¶Ü£¬£¬£¬£¬£¬£¬£¬µ«²¿·ÖÔÚÖ°Ô±¹¤ÓÊÏäÈ··ºÆðÔÚй¶Êý¾ÝÖУ¬£¬£¬£¬£¬£¬£¬ÌåÏÖ¿ÉÄܱ£´æÐÂÎó²î¡£¡£ ¡£Reyͨ¹ýPixelDrainºÍKotizadaÐû²¼Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ºóÕß±»Chrome±ê¼ÇΪΣÏÕÍøÕ¾¡£¡£ ¡£Telef¨®nica¶Ô¶à´ÎÁªÏµ¼á³ÖĬȻ£¬£¬£¬£¬£¬£¬£¬½öO2Æ·ÅÆ´ú±í·ñ¶¨ÊÂÎñ¡£¡£ ¡£Hellcat×éÖ¯ÒÔ¹¥»÷JiraЧÀÍÆ÷Öø³Æ£¬£¬£¬£¬£¬£¬£¬Ôø¹¥»÷¹ýAscom¡¢½Ý±ªÂ·»¢µÈÆóÒµ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hacker-leaks-telef-nica-data-allegedly-stolen-in-a-new-breach/