ÒÔÉ«ÁÐɳÃ×¶ûÒ½ÁÆÖÐÐÄÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-10-10

1. ÒÔÉ«ÁÐɳÃ×¶ûÒ½ÁÆÖÐÐÄÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


10ÔÂ2ÈÕ £¬£¬£¬£¬£¬£¬ÒÔÉ«ÁÐɳÃ×¶ûÒ½ÁÆÖÐÐÄ£¨Assaf Harofeh£©ÔÚÊê×ïÈÕʱ´úÔâÓö¡°÷è÷롱ÀÕË÷Èí¼þ×éÖ¯´ó¹æÄ£ÍøÂç¹¥»÷¡£¡£¡£¡£¸Ã×éÖ¯Ðû³ÆÒÑÍêÈ«ÉøÍ¸Ò½ÔºITϵͳ £¬£¬£¬£¬£¬£¬ÇÔȡԼ8TBÃô¸ÐÊý¾Ý £¬£¬£¬£¬£¬£¬°üÀ¨»¼Õß˽ÈË¿µ½¡¼Í¼¡¢ÄÚ²¿Í¨Ñ¶¼°Òªº¦ÔËÓªÐÅÏ¢ £¬£¬£¬£¬£¬£¬²¢½öÌṩ4·ÝÑù±¾Îļþ×÷Ϊ֤¾Ý¡£¡£¡£¡£ºÚ¿ÍÒªÇóÒ½ÔºÔÚ72СʱÄÚ»ØÓ¦²¢Ð­ÉÌÊê½ðÖ§¸¶ £¬£¬£¬£¬£¬£¬²»È»½«¹ûÕæËùÓÐÊý¾Ý £¬£¬£¬£¬£¬£¬Íþв³ÆÈôÒýÈëÖ´·¨»òÇå¾²»ú¹¹½«¼ÓËÙÐÁæØêú³Ì¡£¡£¡£¡£É³Ã×¶ûÒ½ÁÆÖÐÐÄλÓÚÌØÀ­Î¬·òÒ°Íâ £¬£¬£¬£¬£¬£¬Ä껼ÕßÈÝÁ¿´ï90% £¬£¬£¬£¬£¬£¬Ð§ÀÍÒÔÉ«ÁÐÖв¿³¬°ÙÍòסÃñ £¬£¬£¬£¬£¬£¬º­¸ÇÃÅÕï¡¢¼±Õï¼°ÌØÊâÒ½ÁÆÐèÇó £¬£¬£¬£¬£¬£¬ÆäЧÀÍÉçÇø°üÀ¨¶àÔª×ڽ̡¢¾­¼ÃÅä¾°ÈËȺ¡£¡£¡£¡£´Ë´Î¹¥»÷Ç¡·êÓÌÌ«½ÌÖ÷ҪʥÈÕÊê×ïÈÕ£¨10ÔÂ1ÈÕ-2ÈÕ£© £¬£¬£¬£¬£¬£¬Òý·¢¶Ô¹¥»÷ÄîÍ·µÄÍÆ²â¡£¡£¡£¡£Ò½ÁÆÊý¾Ýй¶¿ÉÄÜÔì³ÉÑÏÖØÐ§¹û£º»¼ÕßÒþ˽̻¶¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔ¡¢Ú²Æ­¼°Éç»á¹¤³Ì¹¥»÷Σº¦£»£»£»£»£»£»£»Ò½ÁÆÁ÷³ÌÖÐÖ¹»òÑÓÎóΣ¼°ÉúÃü¾ÈÖΣ»£»£»£»£»£»£»»ú¹¹ÉùÓþ¼°²ÆÎñÊý¾ÝÊÜË𡣡£¡£¡£


https://cybernews.com/news/israel-shamir-medical-center-ransowmare-attack-qilin-8t-patient-data-stolen/


2. IntelliloanµäÖÊ´û¿îÎ¥¹æÊÂÎñ̻¶¿Í»§Ãô¸ÐÊý¾Ý


10ÔÂ2ÈÕ £¬£¬£¬£¬£¬£¬¼ÓÖݵäÖÊ´û¿î»ú¹¹Intelliloan¿ËÈÕÏò¿Í»§·¢ËÍÎ¥¹æÍ¨ÖªÐÅ £¬£¬£¬£¬£¬£¬Åû¶Æä2025Äê3ÔÂ29ÈÕ±¬·¢µÄºÚ¿Í¹¥»÷ÊÂÎñµ¼Ö´ó×ÚÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¸Ã¹«Ë¾×Ô1993Ä꽨ÉèÒÔÀ´ £¬£¬£¬£¬£¬£¬ÒÑΪ¶àÖÝÊýÍò±Ê´û¿îÌṩ×ʽ𠣬£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÖÐδ͸¶ÏêϸÊÜÓ°ÏìÈËÊý £¬£¬£¬£¬£¬£¬Òý·¢Êý¾Ýй¶״ʦ¼°¹ú¼Ò״ʦÊÂÎñËùÊӲ첢ÌáÆðÕûÌåËßËÏ¡£¡£¡£¡£Í¨ÖªÏÔʾ £¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜ»ñÈ¡µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¡¢Õþ¸®ID¡¢Õ˺ż°ÐÅÓÿ¨ÐÅÏ¢ £¬£¬£¬£¬£¬£¬ÉõÖÁÉæ¼°µäÖÊ´û¿îÉêÇëÈ˵ÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢¡£¡£¡£¡£ÕâЩÐÅϢʹ¿Í»§ÃæÁÙ½ðÈÚڲƭ¡¢Éí·Ý͵ÇÔ¼°Éç»á¹¤³Ì¹¥»÷Σº¦¡£¡£¡£¡£IntelliloanÔÚ9ÔÂ26ÈÕµÄÐź¯ÖÐ³Æ £¬£¬£¬£¬£¬£¬¹«Ë¾ÓÚ5ÔÂÒÑÏòµÂ¿ËÈøË¹ÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æÎ¥¹æÐÐΪ £¬£¬£¬£¬£¬£¬²¢Ò»Á¬ÓëÖ´·¨²¿·ÖÏàÖú £¬£¬£¬£¬£¬£¬ÔöǿϵͳÇå¾² £¬£¬£¬£¬£¬£¬¿ªÕ¹Ô±¹¤Çå¾²ÒâʶÅàѵ¼°Êý¾ÝÇå¾²ÆÀ¹À¡£¡£¡£¡£Îª¼õÇá¿Í»§Ëðʧ £¬£¬£¬£¬£¬£¬¹«Ë¾Í¨¹ýTransUnionÐÅÓþÖÌṩÃâ·ÑÐÅÓÃ¼à¿Ø¼°Éí·Ý»Ö¸´Ð§ÀÍ £¬£¬£¬£¬£¬£¬²¢½¨Òé¿Í»§Ç×½ü¼à¿ØÕË»§»î¶¯ £¬£¬£¬£¬£¬£¬ÊµÊ±±¨¸æ¿ÉÒÉÐÐΪ¡£¡£¡£¡£


https://cybernews.com/news/intelliloan-mortgage-breach-customer-data-exposed-social-security-numbers-drivers-licenses/


3. LynxÀÕË÷Èí¼þ¹¥»÷Ò½ÁƾÞÍ·ºàÀû¡¤Ê©¶÷×Ó¹«Ë¾TriMed


10ÔÂ3ÈÕ £¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄLynxÀÕË÷Èí¼þÍÅ»ïÐû³Æ¹¥ÆÆÒ½ÁƱ£½¡¾ÞÍ·ºàÀû¡¤Ê©¶÷£¨Henry Schein£©ÆìÏÂ×Ó¹«Ë¾TriMedϵͳ £¬£¬£¬£¬£¬£¬²¢½«Ãô¸ÐÊý¾Ýй¶ÖÁ°µÍø¡£¡£¡£¡£ºàÀû¡¤Ê©¶÷×÷ΪÄêÊÕÈë126.7ÒÚÃÀÔªµÄÈ«Çò×î´óÒ½ÁƱ£½¡²úƷЧÀÍ·ÖÏúÉÌ £¬£¬£¬£¬£¬£¬ÓªÒµÁýÕÖ33¹ú £¬£¬£¬£¬£¬£¬Æä×Ó¹«Ë¾TriMed´Ë´ÎÔâÓöÍøÂç¹¥»÷µ¼Ö²¿·ÖITϵͳ̱»¾ £¬£¬£¬£¬£¬£¬¹«Ë¾ÒÑÏÂÏßÏà¹ØÏµÍ³²¢Ô¼ÇëÍⲿר¼ÒÊÓ²ìÊÂÎñ¹æÄ£¡£¡£¡£¡£¾Ý°µÍøÊý¾ÝÑù±¾ÏÔʾ £¬£¬£¬£¬£¬£¬LynxÇÔÈ¡Á˰üÀ¨¸ß¹ÜͨѶ¡¢Ö´·¨Îļþ¡¢ÖªÊ¶²úȨ£¨ÈçÍâ¿Æ²úÆ·Ô­ÐÍÉè¼Æ£©¡¢Ð¡ÎÒ˽¼ÒÉí·ÝÎļþ£¨¼ÝÕÕ¡¢»¤ÕÕ£©¼°²ÆÎñÐÅÏ¢£¨IBAN¡¢ÒøÐÐÕ˺ţ©µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£ÆäÖÐÒ»·âй¶µÄ¸ß¹ÜÓʼþÅû¶ÁËÊý°ÙÍòÃÀÔª×ʽðÁ÷¶¯Ï¸½Ú £¬£¬£¬£¬£¬£¬´ËÀàÐÅÏ¢¼«Ò×±»ÓÃÓÚÕë¶Ô¸ß²ãµÄÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£LynxÍÅ»ï×Ô2024ÄêÖÐÆðÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©Ä£Ê½ÔËÓª £¬£¬£¬£¬£¬£¬Ö÷Òª¹¥»÷½ðÈÚ¡¢ÐÞ½¨¡¢ÖÆÔìÒµ¼°ÄÜÔ´ÁãÊÛÐÐÒµ £¬£¬£¬£¬£¬£¬ÒÑÁÐ196ÃûÊܺ¦Õß £¬£¬£¬£¬£¬£¬°üÀ¨Ó¢¹úDodd Group¡¢ÃÀ¹úTrue World GroupµÈ¡£¡£¡£¡£


https://cybernews.com/security/lynx-ransomware-trimed-henry-schein/


4. DraftKingsÔâÓöƾ֤Ìî³ä¹¥»÷ £¬£¬£¬£¬£¬£¬ÉÙÁ¿¿Í»§ÕË»§ÊÜÓ°Ïì


10ÔÂ7ÈÕ £¬£¬£¬£¬£¬£¬ÌåÓý²©²Ê¾ÞÍ·DraftKingsÏò²¿·Ö¿Í»§·¢³öÊý¾Ýй¶֪ͨ £¬£¬£¬£¬£¬£¬³ÆÆäÕË»§ÔÚ½üÆÚƾ֤Ìî³ä¹¥»÷ÖÐÔâºÚ¿ÍÈëÇÖ¡£¡£¡£¡£´Ë´Î¹¥»÷Ô´ÓÚ¹¥»÷ÕßʹÓÃ×Ô¶¯»¯¹¤¾ß £¬£¬£¬£¬£¬£¬Í¨¹ýÇÔÈ¡ÆäËûÔÚÏßЧÀ͵ÄÓû§Ãû/ÃÜÂë¶ÔʵÑ鯾֤Ìî³ä £¬£¬£¬£¬£¬£¬ÊÔͼ½ÓÊÜÕË»§ÒÔÇÔÊØÐÅÏ¢¡£¡£¡£¡£DraftKingsÇ¿µ÷ £¬£¬£¬£¬£¬£¬¹¥»÷Õß½öÄÜ»á¼û¡°ÓÐÏÞÁ¿¡±·ÇÃô¸ÐÊý¾Ý £¬£¬£¬£¬£¬£¬°üÀ¨¿Í»§ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢Ö§¸¶¿¨ºóËÄλ¡¢ÉúÒâ¼Í¼¡¢ÕË»§Óà¶î¼°ÃÜÂëÐÞËûÈÕÆÚ £¬£¬£¬£¬£¬£¬µ«Î´´¥¼°Õþ¸®Éí·ÝÖ¤ºÅ¡¢ÍêÕû½ðÈÚÕË»§ÐÅÏ¢µÈ¿ÉÖÂÉí·Ý͵ÇÔ»òÒøÐÐÕË»§ÈëÇÖµÄÒªº¦Êý¾Ý¡£¡£¡£¡£ÊÜÓ°Ïì¿Í»§È±·¦30ÈË £¬£¬£¬£¬£¬£¬ÇÒÊÓ²ìδ·¢Ã÷DraftKingsϵͳÔâÈëÇÖ»ò¿Í»§¾­¼ÃËðʧ¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥ £¬£¬£¬£¬£¬£¬DraftKingsÒªÇóÊÜÓ°Ïì¿Í»§ÖØÖÃÕË»§ÃÜÂë £¬£¬£¬£¬£¬£¬²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤£¨ÈçDK HorseÕË»§£©¡£¡£¡£¡£Í¬Ê±½¨ÒéÓû§×Ô¶¯¸ü¸ÄÕË»§ÃÜÂë¡¢¼ì²éÒøÐÐÕË»§ÓëÐÅÓñ¨¸æ¡¢¶³½áÐÅÓõµ°¸²¢ÉèÖÃڲƭ¾¯±¨ £¬£¬£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/draftkings-warns-of-account-breaches-in-credential-stuffing-attacks/


5. Salesforce¾Ü¾øÒò´ó¹æÄ£Êý¾Ý͵ÇÔ¹¥»÷Ö§¸¶Êê½ð


10ÔÂ7ÈÕ £¬£¬£¬£¬£¬£¬2025Äê £¬£¬£¬£¬£¬£¬SalesforceÔâÓö´ó¹æÄ£Êý¾Ý͵ÇÔÊÂÎñ £¬£¬£¬£¬£¬£¬Éæ¼°Á½´Î×ÔÁ¦¹¥»÷¡£¡£¡£¡£µÚÒ»´ÎʼÓÚ2024Äêµ× £¬£¬£¬£¬£¬£¬Íþв×éÖ¯"Scattered Lapsus$ Hunters"ͨ¹ýÉç»á¹¤³Ì¹¥»÷ð³äITÖ§³ÖÖ°Ô± £¬£¬£¬£¬£¬£¬ÓÕÆ­Ô±¹¤ÅþÁ¬¶ñÒâOAuthÓ¦ÓÃÖÁSalesforceʵÀý £¬£¬£¬£¬£¬£¬µ¼Ö¹ȸ衢˼¿Æ¡¢°¢µÏ´ï˹µÈÆóÒµÊý¾Ýй¶¡£¡£¡£¡£µÚ¶þ´ÎʼÓÚ2025Äê8Ô £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓñ»µÁµÄSalesLoft Drift OAuthÁîÅÆÈëÇÖ¿Í»§CRMÇéÐÎ £¬£¬£¬£¬£¬£¬ÇÔȡ֧³ÖƱ֤Êý¾Ý¼°Æ¾Ö¤¡¢APIÁîÅÆµÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬ShinyHuntersÐû³Æ´Ë´ÎÇÔÈ¡³¬760¼ÒÆóÒµÔ¼15ÒÚÌõ¼Í¼ £¬£¬£¬£¬£¬£¬Éæ¼°Google¡¢Cloudflare¡¢Palo Alto NetworksµÈ¿Æ¼¼¾ÞÍ·¡£¡£¡£¡£ÍþвÐÐΪÕß½¨ÉèÊý¾ÝÐ¹Â¶ÍøÕ¾breachforums[.]hn £¬£¬£¬£¬£¬£¬ÀÕË÷39¼ÒÊÜÓ°ÏìÆóÒµ £¬£¬£¬£¬£¬£¬°üÀ¨Áª°î¿ìµÝ¡¢µÏÊ¿Äá/Hulu¡¢ÍòºÀ¡¢ÏãÄζùµÈ×ÅÃûÆ·ÅÆ £¬£¬£¬£¬£¬£¬Éù³ÆÈô²»Ö§¸¶Êê½ð»òSalesforceÒ»´ÎÐÔÖ§¸¶ËùÓпͻ§Êê½ð £¬£¬£¬£¬£¬£¬½«¹ûÕæ½ü10ÒÚÌõÊý¾Ý¼Í¼¡£¡£¡£¡£SalesforceÃ÷È·¾Ü¾øÌ¸ÅлòÖ§¸¶Êê½ð £¬£¬£¬£¬£¬£¬²¢ÖÒÑÔ¿Í»§ÍþвÐÐΪÕßÕýÍýÏëй¶Êý¾Ý¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾ÓòÃûÒѱ»FBI²é·â £¬£¬£¬£¬£¬£¬ÓòÃûЧÀÍÆ÷Ö¸ÏòÔø±»FBIÓÃÓÚ²é·âÓòÃûµÄCloudflareЧÀÍÆ÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/salesforce-refuses-to-pay-ransom-over-widespread-data-theft-attacks/


6. Crimson CollectiveºÚ¿ÍÃé×¼AWSÔÆÊµÀýÇÔÈ¡Êý¾Ý


10ÔÂ8ÈÕ £¬£¬£¬£¬£¬£¬ÒÑÍùÊýÖÜ £¬£¬£¬£¬£¬£¬Íþв×éÖ¯¡°Crimson Collective¡±Ò»Á¬Õë¶ÔAWSÔÆÇéÐÎÌᳫ¹¥»÷ £¬£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Êý¾Ý²¢ÊµÑéÀÕË÷¡£¡£¡£¡£¸Ã×éÖ¯Ðû³Æ¶ÔRed HatÊÂÎñÈÏÕæ £¬£¬£¬£¬£¬£¬³Æ´ÓÊýǧ¸ö˽ÓÐGitLab¿ÍÕ»ÇÔÈ¡570GBÊý¾Ý £¬£¬£¬£¬£¬£¬²¢Í¨¹ýÓëScattered Lapsus$ HuntersÏàÖú¼Ó´óÀÕË÷Á¦¶È¡£¡£¡£¡£Rapid7Ñо¿ÏÔʾ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃTruffleHog¿ªÔ´¹¤¾ßɨÃè̻¶µÄAWSƾ֤ £¬£¬£¬£¬£¬£¬Í¨¹ýÆÆËðºã¾Ã»á¼ûÃÜÔ¿ºÍIAMÕË»§ÌáÉýȨÏÞ¡£¡£¡£¡£ÏêϸÊÖ·¨°üÀ¨£ºÍ¨¹ýAPI½¨ÉèÐÂIAMÓû§²¢¸½¼Ó¡°AdministratorAccess¡±Õ½ÂÔ»ñÈ¡ÍêÈ«¿ØÖÆÈ¨ £¬£¬£¬£¬£¬£¬Ëæºóö¾ÙÓû§¡¢ÊµÀý¡¢´æ´¢Í°¡¢Êý¾Ý¿â¼¯ÈºµÈ×ÊÔ´ £¬£¬£¬£¬£¬£¬ÍýÏëÊý¾ÝÇÔȡ·¾¶¡£¡£¡£¡£¹¥»÷ÕßÐÞ¸ÄRDSÖ÷ÃÜÂë»ñÈ¡Êý¾Ý¿â»á¼ûȨ £¬£¬£¬£¬£¬£¬½¨Éè¿ìÕÕµ¼³öÖÁS3´æ´¢Í°£»£»£»£»£»£»£»¶ÔEBS¾í¿ìÕÕºóÆô¶¯EC2ʵÀý £¬£¬£¬£¬£¬£¬¸½¼ÓÖÁÔÊÐíÇå¾²×éʵÏÖÊý¾Ý´«Êä¡£¡£¡£¡£Íê³ÉÊý¾ÝÇÔÈ¡ºó £¬£¬£¬£¬£¬£¬Í¨¹ýAWS SES¼°ÍⲿÓÊÏä·¢ËÍÀÕË÷ÐÅ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬£¬Crimson CollectiveÔÚÐж¯ÖÐÖØ¸´Ê¹Óò¿·ÖIPµØµã £¬£¬£¬£¬£¬£¬Ëä±ãÓÚ×·×Ùµ«Í¹ÏÔÆäÒ»Á¬»îÔ¾ÐÔ¡£¡£¡£¡£AWS¹Ù·½½¨Òé¿Í»§½ÓÄÉ¶ÌÆÚ¡¢×îµÍȨÏÞÆ¾Ö¤²¢ÊµÑéÏÞÖÆÐÔIAMÕ½ÂÔ £¬£¬£¬£¬£¬£¬ÈôÏÓÒÉÆ¾Ö¤Ð¹Â¶¿É°´Ö¸Òý²Ù×÷»òÁªÏµÖ§³ÖÍŶÓ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/crimson-collective-hackers-target-aws-cloud-instances-for-data-theft/