¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶
Ðû²¼Ê±¼ä 2026-03-131. ¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬¼ÓÄôó×î´óʳÎïÒ©Æ·ÁãÊÛÉÌLoblaw Companies Limited£¨¼ò³ÆLoblaw£©¿ËÈÕÔâÓöÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¸Ã¹«Ë¾Ðû²¼£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÆä²¿·ÖITÍøÂç²¢»ñÈ¡Á˿ͻ§µÄ»ù×Ô¼º·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØµã¡£¡£¡£¡£Loblaw×÷Ϊ¼ÓÄôóÁãÊÛÒµ¾ÞÍ·£¬£¬£¬£¬£¬ÔÚÌìÏÂÓµÓÐ2500¼ÒÃŵ꣬£¬£¬£¬£¬º¸ÇÌØÐíı»®³¬ÊС¢Ò©µê¡¢ÒøÐÐ×ÔÖúЧÀÍͤºÍ´ò°çµêµÈҵ̬£¬£¬£¬£¬£¬²¢ÍýÏëÔÚ2026ÄêÐÂÔö70¼ÒÃŵ꣬£¬£¬£¬£¬×÷ΪÆäµ½2030ÄêͶ×Ê100ÒÚÃÀÔªÎåÄêÍýÏëµÄÒ»²¿·Ö¡£¡£¡£¡£¹«Ë¾ÏÖÓµÓÐ22ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬ÄêÊÕÈë¸ß´ï450ÒÚÃÀÔª¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚ±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬£¬Loblaw¼ì²âµ½ÆäITÍøÂçÖÐÒ»¸ö·ÇÒªº¦¹Ø±ÕÇøÓò±£´æ¿ÉÒɻ£¬£¬£¬£¬£¬¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬·¸·¨µÚÈý·½ÒÑ»á¼ûÁ˲¿·Ö¿Í»§µÄ»ù±¾ÐÅÏ¢¡£¡£¡£¡£Ö»¹Üй¶Êý¾Ý²»°üÀ¨ÐÅÓÿ¨ÏêÇé¡¢¿µ½¡ÐÅÏ¢»òÕË»§ÃÜÂëµÈÃô¸Ð²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬µ«LoblawÈÔ³öÓÚÉóÉ÷˼Á¿£¬£¬£¬£¬£¬×Ô¶¯×¢ÏúÁËËùÓпͻ§µÄÕË»§£¬£¬£¬£¬£¬ÒªÇó»á¼ûÊý×ÖЧÀ͵ÄÓû§ÖØÐµÇ¼²¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬Æä½ðÈÚЧÀÍÆ·ÅÆPC FinancialδÊÜ´Ë´ÎÊÂÎñÓ°Ïì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/
2. Ó¢¸ñÀ¼Çú¹÷ÇòлáÔâAiLockÀÕË÷Èí¼þ¹¥»÷
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬Ó¢¸ñÀ¼Çú¹÷ÇòлáÕýÊÓ²ìÒ»ÆðDZÔÚÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ÒòÓÉÊÇAiLockÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÐ¹Â¶Æ½Ì¨½«ÆäÁÐΪÊܺ¦Õß¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÇÔÈ¡ÁËлá129GBÊý¾Ý£¬£¬£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÎļþ¡£¡£¡£¡£Ð»áÒÑÁªºÏÄÚ²¿ÍŶÓÓëÍⲿר¼ÒÕö¿ªÊӲ죬£¬£¬£¬£¬²¢Ç¿µ÷¡°Êý¾ÝÇå¾²ÊÇÄ¿½ñÖ÷ҪʹÃü¡±£¬£¬£¬£¬£¬ÏÖÔÚÕýÓëÖ´·¨²¿·ÖÏàÖúÒÔÀåÇåÊÂÎñÕæÏà¡£¡£¡£¡£Ð»á½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬ÒÑ×¢ÖØµ½ÍþвÐÐΪÕßÐû²¼µÄ¡°ÈÏÁ족Ìû×Ó£¬£¬£¬£¬£¬µ«ÒòÊÓ²ìÈÔÔÚ¾ÙÐУ¬£¬£¬£¬£¬ÔÝÎÞ·¨Åû¶Ïêϸϸ½Ú¡£¡£¡£¡£×÷ΪӢ¹úÇú¹÷ÇòÔ˶¯µÄ½¹µãÖÎÀí»ú¹¹£¬£¬£¬£¬£¬Ð»áÁýÕÖÌìÏÂ800Óà¼Ò¾ãÀÖ²¿¡¢15Íò×¢²áÇòÔ±¼°1.5ÍòÃû½ÌÁ·¡¢²ÃÅк͹ÙÔ±£¬£¬£¬£¬£¬ÔËÓª²ã¼¶´Óϲ㵽¾«Ó¢¹ú¼Ò¶Ó¡£¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄÜÓ°Ïì»áÔ±Òþ˽Êý¾Ý£¬£¬£¬£¬£¬Ð»áºôÓõÇòԱСÐÄÒì³£ÕË»§»î¶¯¼°ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ÉóÉ÷´¦Öóͷ£Î´ÂÄÀúÖ¤µÄͨѶ¡£¡£¡£¡£Ö»¹ÜлáÉÐδ֤ʵÊý¾ÝÏÖʵй¶£¬£¬£¬£¬£¬µ«ÒѽÓÄÉÔ¤·À²½·¥£¬£¬£¬£¬£¬°üÀ¨×Ô¶¯×¢ÏúËùÓÐÊý×ÖЧÀÍÕË»§²¢ÒªÇóÓû§ÖØÐµÇ¼¡¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/
3. ÐÂÐÍAIÌìÉú¶ñÒâÈí¼þSlopolyÇ¿»¯ÀÕË÷¹¥»÷Á´
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬IBM X-ForceÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪSlopolyµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬¼«¿ÉÄÜÓÉÌìÉúʽÈ˹¤ÖÇÄܹ¤¾ß½¨É裬£¬£¬£¬£¬ÆäÊÖÒÕÌØÕ÷°üÀ¨´ó×Ú´úÂë×¢ÊÍ¡¢½á¹¹»¯ÈÕÖ¾¼Í¼¡¢¹ýʧ´¦Öóͷ£¼°ÇåÎú±äÁ¿ÃüÃû£¬£¬£¬£¬£¬ÕâЩÔÚÈËÀà±àд¶ñÒâÈí¼þÖÐÓÐÊý¡£¡£¡£¡£¸ÃÈí¼þ×÷ΪPowerShell¾ç±¾ºóÃÅ£¬£¬£¬£¬£¬ÔÚInterlockÀÕË÷Èí¼þ¹¥»÷ÖÐÊÎÑÝC2¿Í»§¶Ë½ÇÉ«£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾЧÀÍÆ÷DZÔÚ³¬Ò»ÖÜ£¬£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢Î¬³Ö³¤ÆÚ»á¼û¡£¡£¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³ÌȦÌ×£¬£¬£¬£¬£¬ºóÆÚ°²ÅÅSlopoly¡£¡£¡£¡£IBMÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬¾ç±¾Ëä×Ô³Æ"¶à̬C2³¤ÆÚ»¯¿Í»§¶Ë"£¬£¬£¬£¬£¬µ«ÏÖʵȱ·¦Ö´ÐÐÆÚ´úÂë×ÔÐÞ¸ÄÄÜÁ¦£¬£¬£¬£¬£¬½öͨ¹ýÌìÉúËæ»úÉèÖÃÖµºÍº¯ÊýÃû³ÆÊµÏÖα¶à̬¡£¡£¡£¡£Æä°²ÅÅÓÚC:\ProgramData\Microsoft\Windows\Runtime\£¬£¬£¬£¬£¬½¹µã¹¦Ð§°üÀ¨£ºÃ¿30Ãë·¢ËÍÐÄÌøÐűêÖÁ/api/commands£¬£¬£¬£¬£¬Ã¿50ÃëÂÖѯÏÂÁ£¬£¬£¬£¬Í¨¹ýcmd.exeÖ´ÐÐÖ¸Áî²¢»Ø´«Ð§¹û£¬£¬£¬£¬£¬Î¬»¤persistence.logÈÕÖ¾£¬£¬£¬£¬£¬Í¨¹ý"ÔËÐÐʱÊðÀí"ÍýÏëʹÃü½¨É賤ÆÚÐÔ¡£¡£¡£¡£Ö§³ÖÏÂÁÇÏÂÔØÖ´ÐÐEXE/DLL/JSÓÐÓÃÔØºÉ¡¢ÔËÐÐshellÏÂÁî¡¢µ÷½âÐűê¾àÀë¡¢×Ô¸üм°Í˳öÀú³Ì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/
4. ÃÀÅ·´Ý»ÙÒÀÀµAVReconµÄSocksEscort·¸·¨ÊðÀíÍøÂç
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú˾·¨²¿ÁªºÏÅ·ÖÞ¶à¹úÖ´·¨»ú¹¹¼°Ë½ÈËÏàÖúͬ°éBlack Lotus Labs£¬£¬£¬£¬£¬ÀֳɯÆËðÁËÔËӪʮÓàÄêµÄSocksEscortÍøÂç·¸·¨ÊðÀíÍøÂç¡£¡£¡£¡£¸ÃÍøÂçÍêÈ«ÒÀÀµAVRecon Linux¶ñÒâÈí¼þÈëÇÖ±ßÑØ×°±¸£¬£¬£¬£¬£¬Í¨¹ý¡°Çå½à¡±IPµØµãÎªÍøÂç·¸·¨·Ö×ÓÌṩÁ÷Á¿Â·ÓÉЧÀÍ£¬£¬£¬£¬£¬¿ÉÈÆ¹ý¶àÖØºÚÃûµ¥£¬£¬£¬£¬£¬Ôø±»ÓÃÓÚÇÔȡŦԼÓû§100ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡¢Ôì³É±öϦ·¨ÄáÑÇÖÆÔìÆóÒµ70ÍòÃÀÔªÚ²ÆËðʧ¼°ÏÖÒÛ/ÍËÒÛÎäÊ¿10ÍòÃÀÔªÐÅÓÿ¨Ëðʧ¡£¡£¡£¡£¾ÝBlack Lotus LabsÊý¾Ý£¬£¬£¬£¬£¬SocksEscort×Ô2023Äê±»¼Í¼ÒÔÀ´£¬£¬£¬£¬£¬ÒÑÍù¼¸ÄêÆ½¾ùÿÖÜѬȾ2Íǫ̀װ±¸£¬£¬£¬£¬£¬ÀÛ¼ÆÌṩԼ36.9Íò¸öIPµØµã»á¼ûȨÏÞ¡£¡£¡£¡£×èÖ¹2026Äê2Ô£¬£¬£¬£¬£¬ÆäÓ¦ÓóÌÐòÈÔÁгöÔ¼8000̨ÊÜѬȾ·ÓÉÆ÷¡£¡£¡£¡£Ðж¯ÖУ¬£¬£¬£¬£¬Ö´·¨»ú¹¹²é·âÁË7¹ú34¸öÓòÃûºÍ23̨ЧÀÍÆ÷£¬£¬£¬£¬£¬ÃÀ¹ú¶³½á350ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬£¬£¬£¬£¬ËùÓÐÊÜѬȾװ±¸ÒÑÓëSocksEscortЧÀͶϿªÅþÁ¬¡£¡£¡£¡£AVRecon¶ñÒâÈí¼þ×Ô2021Äê5ÔÂÆð»îÔ¾£¬£¬£¬£¬£¬2023ÄêÖÐÆÚÒÑѬȾ³¬7Íǫ̀»ùÓÚLinuxµÄSOHO·ÓÉÆ÷£¬£¬£¬£¬£¬½öÓÃÓÚÀ©´óSocksEscort¹æÄ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/
5. ¼ÓÄôóTelus DigitalÔâShinyHuntersÇÔÈ¡1PBÊý¾Ý
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬¼ÓÄôóÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·Telus Digital¿ËÈÕ֤ʵÔâÓöÖØ´óÇå¾²ÊÂÎñ¡£¡£¡£¡£ÍþвÐÐΪÕßShinyHuntersÉù³ÆÔÚÒ»Á¬ÊýÔµĹ¥»÷ÖÐÇÔÈ¡½ü1PBÊý¾Ý£¬£¬£¬£¬£¬Éæ¼°TelusµÄBPOÔËÓª¼°ÏûºÄÕßµçÐŲ¿·Öͨ»°¼Í¼¡£¡£¡£¡£¾ÝShinyHuntersÅû¶£¬£¬£¬£¬£¬ÆäʹÓÃSalesloft DriftÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄGoogle Cloud Platformƾ֤ÈëÇÖTelus£¬£¬£¬£¬£¬²¢Í¨¹ýÍøÂçÇå¾²¹¤¾ßtrufflehogËÑË÷¸ü¶àƾ֤£¬£¬£¬£¬£¬½ø¶ø»á¼û°üÀ¨BigQueryʵÀýÔÚÄڵĶà¸öϵͳ¡£¡£¡£¡£±»µÁÊý¾Ýº¸Ç¿Í»§Ö§³Ö¹¤µ¥¡¢Í¨»°Â¼Òô¡¢Ô´´úÂë¡¢²ÆÎñÐÅÏ¢¡¢FBIÅä¾°ÊӲ졢SalesforceÊý¾Ý¼°ÓªÏú»î¶¯ÔªÊý¾ÝµÈ£¬£¬£¬£¬£¬Éæ¼°28¼Ò×ÅÃû¹«Ë¾£¬£¬£¬£¬£¬Êý¾ÝÀàÐÍÒò¹«Ë¾¶øÒ죬£¬£¬£¬£¬Ì»Â¶Á˿ͻ§Ö§³Ö¡¢ºô½ÐÖÐÐÄÍâ°ü¡¢AI¹¤¾ß¡¢Ú²Æ¼ì²âµÈ¶àÓªÒµ¹¦Ð§¡£¡£¡£¡£ShinyHunters×Ô½ñÄê2ÔÂÆðÏòTelusÀÕË÷6500ÍòÃÀÔª£¬£¬£¬£¬£¬µ«Î´»ñ»ØÓ¦¡£¡£¡£¡£Telus×òÈÕÕýʽȷÈÏϵͳÔâδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬²¢ÌåÏÖÒѽÓÄɲ½·¥Ó¦¶ÔÈëÇÖ¡¢±£»£»£»¤ÏµÍ³£¬£¬£¬£¬£¬Ô¼ÇëÍøÂçȡ֤ר¼ÒÐÖúÊӲ죬£¬£¬£¬£¬ÓëÖ´·¨²¿·ÖÏàÖú£¬£¬£¬£¬£¬Í¬Ê±Ç¿µ÷ÓªÒµÔËÓªÕý³££¬£¬£¬£¬£¬ÎÞÖ¤¾ÝÏÔʾ¿Í»§ÍøÂçЧÀÍÊÜÓ°Ï죬£¬£¬£¬£¬½«×ÃÇé֪ͨÊÜÓ°Ïì¿Í»§¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/
6. °¢¶û°ÍÄáÑÇÒé»áÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÒÁ·½×éÖ¯³ÆÅê»÷
3ÔÂ11ÈÕ£¬£¬£¬£¬£¬°¢¶û°ÍÄáÑÇÒé»áÓÚÖܶþÍí¼äÔâÓö¡°¸ß¼¶¡±ÍøÂç¹¥»÷£¬£¬£¬£¬£¬¹¥»÷Ä¿µÄÃ÷È·Ö¸Ïòɾ³ýÊý¾Ý²¢¹¥Ïݶà¸öÄÚ²¿ÏµÍ³¡£¡£¡£¡£¾ÝÒé»áÉùÃ÷£¬£¬£¬£¬£¬Æä½¹µãϵͳÓë¹Ù·½ÍøÕ¾ÈÔ¼á³ÖÕý³£ÔËÐУ¬£¬£¬£¬£¬µ«ÐÐÕþ²¿·ÖʹÓõÄÄÚ²¿µçÓÊЧÀÍÒѱ»ÔÝʱÔÝÍ££¬£¬£¬£¬£¬µ¼ÖÂÊÕ·¢Ë«ÏòͨѶÖÐÖ¹£¬£¬£¬£¬£¬ÊÂÇéÖ°Ô±ÓëÒéÔ±ÔÚ¹¥»÷±¬·¢ºóÊýСʱÄÚÎÞ·¨»á¼ûµçÄÔ¼°µçÓÊϵͳ¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬ÃûΪ¡°Homeland Justice¡±µÄºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬²¢ÔÚÆäTelegramƵµÀÐû²¼Á˾ݳÆÐ¹Â¶µÄÄÚ²¿Í¨Ñ¶Îļþ½ØÍ¼¡£¡£¡£¡£Ö»¹Ü°¢¶û°ÍÄáÑǹٷ½ÉÐδ¹ûÕæÖ¤Êµ¸Ã×é֯˵·¨£¬£¬£¬£¬£¬µ«Çå¾²Ñо¿Ö°Ô±ÓëÎ÷·½¹ÙÔ±´ËǰÒѽ«¡°Homeland Justice¡±ÓëÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¹ØÁª¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬£¬£¬¸Ã×éÖ¯¶à´ÎÐû³Æ¶Ô°¢¶û°ÍÄáÑǾ³ÄÚһϵÁÐÍøÂç¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬Ä¿µÄº¸ÇÒé»á¡¢¹ú¼Òº½¿Õ¹«Ë¾¡¢µçÐÅÆóÒµ¼°¹ú¼Òͳ¼Æ¾Ö¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÅä¾°Óë°¢¶û°ÍÄáÑÇÇå¾²ÐÎÊÆÏ¸ÃÜÏà¹Ø¡£¡£¡£¡£¡°Homeland Justice¡±ÔÚ¹¥»÷ÉùÃ÷ÖÐÃ÷È·ÌåÏÖ£¬£¬£¬£¬£¬´Ë´ÎÐж¯ÊǶ԰¢¶û°ÍÄáÑÇÖ§³ÖÒÁÀÊ×èµ²ÅÉ×éÖ¯¡°ÒÁÀÊÈËÃñÊ¥Õ½Õß×éÖ¯¡±£¨MEK£©µÄÅê»÷¡£¡£¡£¡£
https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament


¾©¹«Íø°²±¸11010802024551ºÅ