´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷

Ðû²¼Ê±¼ä 2025-07-22

1. ´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬´÷¶û¿Æ¼¼¹«Ë¾¿ËÈÕÈ·ÈÏÆä¿Í»§½â¾ö¼Æ»®ÖÐÐÄÆ½Ì¨ÔâÓöÍøÂçÇå¾²ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßΪ½üÆÚÖØ×éµÄÀÕË÷×éÖ¯World Leaks£¨Ç°ÉíΪHunters International£©¡£¡£ ¡£¡£¡£´Ë´ÎÊÂÎñ±¬·¢ÓÚ2025Äê7Ô³õ£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸´÷¶ûÓÃÓÚÉÌÒµ¿Í»§²úÆ·ÑÝʾ¼°¿´·¨ÑéÖ¤²âÊԵĸôÀëÇéÐΡ£¡£ ¡£¡£¡£Ö»¹ÜÍþвÐÐΪÕßÀÖ³ÉÍ»ÆÆ¸Ãƽ̨£¬£¬£¬£¬£¬£¬£¬µ«´÷¶ûÇ¿µ÷ÆäÑÏ¿áµÄÇå¾²¼Ü¹¹ÓÐÓÃÏÞÖÆÁËËðʧ¹æÄ££¬£¬£¬£¬£¬£¬£¬¿Í»§ÏµÍ³¼°ÄÚ²¿ÍøÂçδÊܲ¨¼°¡£¡£ ¡£¡£¡£¾ÝÅû¶£¬£¬£¬£¬£¬£¬£¬ÈëÇÖÊÂÎñÖб»µÁÊý¾ÝÖ÷Òª°üÀ¨ºÏ³É²âÊÔÊý¾Ý¡¢¹ûÕæÑÝʾÊý¾Ý¼¯¼°·ÇÃô¸ÐϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Î¨Ò»Éæ¼°ÕæÊµÄÚÈݵĽöΪһ·ÝÓâÆÚÁªÏµÈËÃûµ¥£¬£¬£¬£¬£¬£¬£¬´÷¶û³ÆÆä"ÔËÓª¼ÛÖµ¼«µÍ"¡£¡£ ¡£¡£¡£¸Ãƽ̨×÷Ϊ×ÔÁ¦ÔËÐеÄÑÝʾÇéÐΣ¬£¬£¬£¬£¬£¬£¬ÓëÉú²úÍøÂç¡¢¿Í»§Êý¾Ý´æ´¢¿â¼°ÏàÖúͬ°éϵͳÍêÈ«¸ôÀ룬£¬£¬£¬£¬£¬£¬²¢ÉèÓÐÃ÷ȷեȡÉÏ´«Ãô¸ÐÊý¾ÝµÄЭÒé¡£¡£ ¡£¡£¡£´÷¶ûÇå¾²ÍŶÓÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¶àÖØÍøÂç·Ö¶ÎºÍ¼à¿Ø»úÖÆÔÚÊÂÎñÖÐʩչÁËÒªº¦×÷Ó㬣¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÒ»Á¬ÊӲ칥»÷·¾¶£¬£¬£¬£¬£¬£¬£¬µ«ÉÐδ·¢Ã÷¿Í»§Êý¾Ý»ò½¹µãϵͳÊÜÓ°ÏìµÄÖ¤¾Ý¡£¡£ ¡£¡£¡£


https://cybersecuritynews.com/dell-data-breach/


2. µÏ°Â×îÏÈÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬·¨¹úÉÝ³ÞÆ·ÅƵϰ£¨Dior£©¿ËÈÕÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÆäÓÚ2025Äê1ÔÂ26ÈÕÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Î´¾­ÊÚȨ»á¼û¡£¡£ ¡£¡£¡£×÷ΪȫÇò×î´óÉÝ³ÞÆ·¼¯ÍÅLVMHÆìϽ¹µãÆ·ÅÆ£¬£¬£¬£¬£¬£¬£¬µÏ°ÂÄêÊÕÈ볬120ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬ÔÚÈ«ÇòÔËÓªÊý°Ù¼Ò¾«Æ·µê£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒý·¢¶ÔÆäÊý¾ÝÇå¾²ÖÎÀíµÄ¹Ø×¢¡£¡£ ¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬£¬£¬µÏ°ÂÓÚ2025Äê5ÔÂ7ÈÕ·¢Ã÷Êý¾Ý¿âÔâÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ëæ¼´Æô¶¯ÄÚ²¿ÊӲ졣¡£ ¡£¡£¡£ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡Á˰üÀ¨È«Ãû¡¢ÁªÏµ·½·¨¡¢ÏÖʵµØµã¡¢³öÉúÈÕÆÚ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄ»¤ÕÕ/Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢Éç»áÇå¾²ºÅÂëµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÒøÐÐÕË»§»òÖ§¸¶¿¨µÈ²ÆÎñÊý¾Ý¡£¡£ ¡£¡£¡£µÏ°ÂÇ¿µ÷ÒÑѸËÙ½ÓÄÉ¿ØÖƲ½·¥£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÎÞÖ¤¾ÝÅúעϵͳ±»Ò»Á¬ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬²¢ÒÑִ֪ͨ·¨²¿·Ö¼°Ô¼ÇëµÚÈý·½ÍøÂçÇ徲ר¼ÒЭÖúÓ¦¶Ô¡£¡£ ¡£¡£¡£Îª»º½âÓ°Ï죬£¬£¬£¬£¬£¬£¬µÏ°ÂΪÊÜÓ°ÏìÓû§ÌṩÃâ·Ñ24¸öÔÂÐÅÓÃ¼à¿ØÓëÉí·Ý͵ÇÔ± £»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±½¨Òé¿Í»§Ð¡ÐÄÕ©Æ­¡¢ÍøÂç´¹ÂÚ¼°½ðÈÚÕË»§Òì³ £»£»£»£»î¶¯¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/


3. Ó¡¶È¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX 4420ÍòÃÀÔª¼ÓÃÜ×ʲú±»µÁ


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Ó¡¶ÈÍ·²¿¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX¿ËÈÕÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬ÆäÒ»¸öÄÚ²¿ÔËÓªÕË»§ÔâÓöÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬µ¼Ö¼ÛÖµÔ¼4420ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¡£ ¡£¡£¡£¾ÝCoinDCXÁªºÏÊ×´´È˼æÊ×ϯִÐйÙSumit GuptaÔÚXƽ̨Åû¶£¬£¬£¬£¬£¬£¬£¬±»ÈëÇÖÕË»§½öÓÃÓÚÔÚÏàÖúÉúÒâËùÌṩÁ÷¶¯ÐÔ£¬£¬£¬£¬£¬£¬£¬ÊôÓÚÄÚ²¿ÔËÓªÕË»§£¬£¬£¬£¬£¬£¬£¬Óë¿Í»§×ʽðÍêÈ«¸ôÀë¡£¡£ ¡£¡£¡£ËûÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬ËùÓпͻ§×ʲú¾ùδÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬Î£º¦³¨¿ÚÓɹ«Ë¾×ÔÓÐ×ʽ𴢱¸¼ç¸º¡£¡£ ¡£¡£¡£¼ÓÃÜÇå¾²Ñо¿Ô±ZachXBTͨ¹ýTelegramƵµÀ½øÒ»²½ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õߵصã×î³õͨ¹ýTornado Cash»ì±ÒЧÀÍ»ñµÃ1öÒÔÌ«·»£¨ETH£©×ÊÖú£¬£¬£¬£¬£¬£¬£¬Ëæºó½«²¿·Ö±»µÁ×ʽð¾­Solana-ÒÔÌ«·»¿çÁ´ÇÅ×ªÒÆ£¬£¬£¬£¬£¬£¬£¬×îÖպϲ¢Îª4,443öETHºÍ155,830öSolana£¨SOL£©£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ´¦ÓÚÐÝÃß״̬¡£¡£ ¡£¡£¡£CoinDCXÌåÏÖÕýÓëÓ¡¶ÈÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-In£©¼°ÏàÖúÉúÒâËùЭͬÊӲ졣¡£ ¡£¡£¡£Îª¼ÓËÙ×ʽð×·»Ø£¬£¬£¬£¬£¬£¬£¬CoinDCXÓÚÖÜÒ»Æô¶¯¡°×·»ØÉͽð¡±ÍýÏ룬£¬£¬£¬£¬£¬£¬ÔÊÐíÏòЭÖú×·×Ù»òÕһر»µÁ×ʲúµÄСÎÒ˽¼Ò»ò»ú¹¹Ìṩ×î¸ß25%µÄ×·»Ø½ð¶î×÷Ϊ½±Àø¡£¡£ ¡£¡£¡£


https://techcrunch.com/2025/07/21/indian-crypto-exchange-coindcx-confirms-44-million-stolen-during-hack/


4. ÒÁÀʹØÁª°²×¿Ìع¤Èí¼þDCHSpyαװ³ÉVPN¼à¿ØÄ¿µÄÈËÊ¿


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һ¿îÓëÒÁÀÊÇ鱨ÓëÇå¾²²¿£¨MOIS£©Ïà¹ØµÄÐÂÐͰ²×¿Ìع¤Èí¼þDCHSpy£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þͨ¹ýαװ³ÉVPNÓ¦Óü°SpaceXÐÇÁ´£¨Starlink£©ÎÀÐÇ»¥ÁªÍøÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÖж«µØÇøÓû§ÊµÑ鶨Ïò¹¥»÷¡£¡£ ¡£¡£¡£Òƶ¯Çå¾²¹©Ó¦ÉÌLookoutÖ¸³ö£¬£¬£¬£¬£¬£¬£¬DCHSpyÑù±¾×îÔçÓÚ2024Äê7Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Æä¿ª·¢ÕßΪÒÁÀʹú¼ÒÅä¾°ºÚ¿Í×éÖ¯MuddyWater£¨ÓÖÃûBoggy Serpens¡¢TA450µÈ£©£¬£¬£¬£¬£¬£¬£¬½üÆÚÔÚÒÔÉ«ÁÐ-ÒÁÀʳåÍ»±¬·¢ºóÒ»ÖÜÄÚ·ºÆðбäÖÖ£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÆä»î¶¯ÓëµØÇøÊ±ÊÆÏ¸ÃܹØÁª¡£¡£ ¡£¡£¡£DCHSpyΪÄ£¿£¿£¿é»¯Ä¾Âí£¬£¬£¬£¬£¬£¬£¬¾ß±¸¶àÏîÊý¾ÝÇÔÈ¡¹¦Ð§£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÍøÂçWhatsAppÐÅÏ¢¡¢ÕË»§Æ¾Ö¤¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼¡¢Î»ÖÃÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÔ¶³Ì¼Òô¡¢ÕÕÏ༰ÇÔÈ¡Îļþ¡£¡£ ¡£¡£¡£ÔçÆÚ°æ±¾Í¨¹ýTelegramÇþµÀÈö²¥£¬£¬£¬£¬£¬£¬£¬ÒÔ×èµ²ÒÁÀÊÕþȨµÄÖ÷ÌâÄÚÈÝΪÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÓ¢ÓïºÍ²¨Ë¹ÓïÓû§£¬£¬£¬£¬£¬£¬£¬Ä¿µÄȺÌåÒÉËÆÎªÒìÒéÈËÊ¿¡¢»î¸ÐÈËÊ¿¼°¼ÇÕß¡£¡£ ¡£¡£¡£×îбäÖÖÔò½øÒ»²½Éý¼¶Èö²¥ÊֶΣ¬£¬£¬£¬£¬£¬£¬Î±×°³É¡°Earth VPN¡±¡°Comodo VPN¡±¡°Hide VPN¡±µÈ¿´ËÆÊÊÓõÄVPNÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÉõÖÁʹÓá°starlink_vpn(1.3.0).apk¡±ÎļþÃûÄ£ÄâÐÇÁ´Ð§À;ÙÐзַ¢¡£¡£ ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬ÐÇÁ´ÎÀÐÇ»¥ÁªÍøÐ§ÀÍÉÏÔ¸ÕÔÚÒÁÀÊÕþ¸®ÊµÑéÍøÂç·â±Õʱ´ú±»¼¤»î£¬£¬£¬£¬£¬£¬£¬Ëæºó¸Ã¹úÒé»á½«Æä²»·¨»¯£¬£¬£¬£¬£¬£¬£¬´Ë´Î¶ñÒâÈí¼þ½èÐÇÁ´ÃûÒåÈö²¥£¬£¬£¬£¬£¬£¬£¬»òÖ¼ÔÚʹÓÃÓû§¶ÔÊÜÏÞЧÀÍµÄÆÈÇÐÐèÇ󡣡£ ¡£¡£¡£


https://thehackernews.com/2025/07/iran-linked-dchspy-android-malware.html


5. ÍøÂç´¹ÂÚʹÓÃ.LNKÎļþÓëLOLBinÊÖÒÕÈö²¥DeerStealer¶ñÒâÈí¼þ


7ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÐÂÐÍÖØ´óÍøÂç´¹Âڻ±»ÆØ¹â£¬£¬£¬£¬£¬£¬£¬Æäͨ¹ýÎäÆ÷»¯µÄWindows¿ì½Ý·½·¨Îļþ£¨.LNK£©Èö²¥DeerStealer¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ê¹Óá°Living off the Land¡±£¨LOLBin£©ÊÖÒÕŲÓÃÕýµ±ÏµÍ³¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬£¬¹¹½¨¶à½×¶Î¹¥»÷Á´ÒÔÈÆ¹ý¹Å°åÇå¾²·À»¤¡£¡£ ¡£¡£¡£¸Ã»î¶¯ÓÉLinkedInÆÊÎöʦ¼°Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÒòÆä½ÓÄɸ߽׹æ±ÜÕ½ÂÔ²¢ÀÄÓÃ΢ÈíÔ­Éú¹¤¾ß£¬£¬£¬£¬£¬£¬£¬±»ÊÓΪ¶ñÒâÈí¼þת´ï»úÖÆµÄÖØ´óÑݽø¡£¡£ ¡£¡£¡£¹¥»÷ÒÔαװ³É¡°Report.lnk¡±µÄÕýµ±PDFÎĵµÎªÆðµã£¬£¬£¬£¬£¬£¬£¬ÏÖʵ´¥·¢È«ÐÄÉè¼ÆµÄÎå½×¶ÎÖ´ÐÐÁ´£º.LNKÎļþÊ×ÏÈÉñÃØÅ²ÓÃMicrosoft HTMLÓ¦ÓóÌÐòÖ÷»úmshta.exe£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¶¯Ì¬ÆÊÎöSystem32Ŀ¼·¾¶²¢×¢Èë»ìÏýµÄBase64¾ç±¾£¬£¬£¬£¬£¬£¬£¬½ûÓÃÈÕÖ¾¼Í¼ÓëÆÊÎö¹¦Ð§ÒÔ½µµÍ·¨Ò½¿É¼ûÐÔ¡£¡£ ¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷Á´ÒÀ´Î¾­cmd.exe¡¢PowerShell²ã²ãµÝ½ø£¬£¬£¬£¬£¬£¬£¬×îÖÕÔÚAppDataĿ¼¾²Ä¬°²ÅÅDeerStealerÖ÷³ÌÐò¡£¡£ ¡£¡£¡£ÎªÊèÉ¢Êܺ¦Õß×¢ÖØÁ¦£¬£¬£¬£¬£¬£¬£¬ÏµÍ³Í¬Ê±ÏÂÔØ²¢·­¿ªÕýµ±PDFÓÕ¶üÎļþ£¬£¬£¬£¬£¬£¬£¬ÑÚÊζñÒâÈí¼þ×°ÖÃÐÐΪ¡£¡£ ¡£¡£¡£


https://cybersecuritynews.com/deerstealer-malware-delivered/


6. °ÙÄêÎïÁ÷¾ÞÍ·ÒòÃÜÂëй¶ÔâÀÕË÷¹¥»÷ÐÝÒµ


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Ó¢¹ú±±°²ÆÕ¶Ø¿¤°ÙÄêÔËÊäÆóÒµKNP LogisticsÒòAkiraÀÕË÷Èí¼þ¹¥»÷ÏÝÈëÐÝÒµÖÎÀí£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ730ÃûÔ±¹¤Ê§Òµ£¬£¬£¬£¬£¬£¬£¬³ÉΪ2024ÄêÓ¢¹úÆóÒµÔâÓöÍøÂç¹¥»÷µÄ±ê¼ÇÐÔ°¸Àý¡£¡£ ¡£¡£¡£Õâ¼Ò½¨ÉèÓÚ1865ÄêµÄ¼Ò×åÆóÒµ£¬£¬£¬£¬£¬£¬£¬ÓÚÎôʱ6ÔÂÒòÔ±¹¤ÃÜÂëй¶±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÍÆ²â¼òµ¥ÕË»§Æ¾Ö¤ÀÖ³ÉÉøÍ¸ÏµÍ³£¬£¬£¬£¬£¬£¬£¬°²ÅÅÀÕË÷Èí¼þ¼ÓÃÜÒªº¦Êý¾Ý²¢Ë÷ÒªÔ¼500ÍòÓ¢°÷Êê½ð¡£¡£ ¡£¡£¡£Ö»¹ÜKNPδ֧¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÈÔ³¹µ×̱»¾ÆäÔËÓª¡¢²ÆÎñ¼Í¼»á¼û¼°ÐÂ×ʽð»ñÈ¡ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬×îÖÕÆÈʹÕâ¼ÒÓµÓÐ158ÄêÀúÊ·µÄÆóÒµµ¹±Õ¡£¡£ ¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÁËÖÐСÆóÒµÍøÂçÇå¾²·À»¤µÄÖÂÃüÈõµã¡£¡£ ¡£¡£¡£KNPÖ÷¹Ü±£ÂÞ¡¤°¢²©ÌØÍ¸Â¶£¬£¬£¬£¬£¬£¬£¬ÉæÊÂÔ±¹¤ÖÁ½ñδ±»¼û¸æÆäÃÜÂëй¶ֱ½Óµ¼Ö¹«Ë¾Í߽⣬£¬£¬£¬£¬£¬£¬Í¹ÏÔÍøÂç¹¥»÷¶ÔÔ±¹¤ÐÄÀíµÄ¶þ´ÎΣÏÕ¡£¡£ ¡£¡£¡£ÍøÂçÇ徲ר¼ÒÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬»ù´¡ÃÜÂëÇå¾²ÈÔÊÇÖ÷Òª·ÀµØ£¬£¬£¬£¬£¬£¬£¬96%µÄ³£ÓÃÃÜÂë¿ÉÔÚ1ÃëÄÚ±»ÆÆ½â¹¤¾ß¹¥ÆÆ£¬£¬£¬£¬£¬£¬£¬¶øÔ±¹¤¿çÕË»§Öظ´Ê¹ÓÃÃÜÂëµÄϰ¹ß½øÒ»²½¼Ó¾çΣº¦¡£¡£ ¡£¡£¡£


https://cybersecuritynews.com/weak-password-destroy-158-year-old-company/