¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶

Ðû²¼Ê±¼ä 2026-03-13

1. ¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶


3ÔÂ12ÈÕ£¬ £¬£¬£¬£¬¼ÓÄôó×î´óʳÎïÒ©Æ·ÁãÊÛÉÌLoblaw Companies Limited£¨¼ò³ÆLoblaw£©¿ËÈÕÔâÓöÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¸Ã¹«Ë¾Ðû²¼£¬ £¬£¬£¬£¬ºÚ¿ÍÈëÇÖÆä²¿·ÖITÍøÂç²¢»ñÈ¡Á˿ͻ§µÄ»ù×Ô¼º·ÝÐÅÏ¢£¨PII£©£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØµã¡£¡£¡£¡£Loblaw×÷Ϊ¼ÓÄôóÁãÊÛÒµ¾ÞÍ·£¬ £¬£¬£¬£¬ÔÚÌìÏÂÓµÓÐ2500¼ÒÃŵ꣬ £¬£¬£¬£¬º­¸ÇÌØÐíı»®³¬ÊС¢Ò©µê¡¢ÒøÐÐ×ÔÖúЧÀÍͤºÍ´ò°çµêµÈҵ̬£¬ £¬£¬£¬£¬²¢ÍýÏëÔÚ2026ÄêÐÂÔö70¼ÒÃŵ꣬ £¬£¬£¬£¬×÷ΪÆäµ½2030ÄêͶ×Ê100ÒÚÃÀÔªÎåÄêÍýÏëµÄÒ»²¿·Ö¡£¡£¡£¡£¹«Ë¾ÏÖÓµÓÐ22ÍòÃûÔ±¹¤£¬ £¬£¬£¬£¬ÄêÊÕÈë¸ß´ï450ÒÚÃÀÔª¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚ±¾ÖÜÔçЩʱ¼ä£¬ £¬£¬£¬£¬Loblaw¼ì²âµ½ÆäITÍøÂçÖÐÒ»¸ö·ÇÒªº¦¹Ø±ÕÇøÓò±£´æ¿ÉÒɻ£¬ £¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏ£¬ £¬£¬£¬£¬·¸·¨µÚÈý·½ÒÑ»á¼ûÁ˲¿·Ö¿Í»§µÄ»ù±¾ÐÅÏ¢¡£¡£¡£¡£Ö»¹Üй¶Êý¾Ý²»°üÀ¨ÐÅÓÿ¨ÏêÇé¡¢¿µ½¡ÐÅÏ¢»òÕË»§ÃÜÂëµÈÃô¸Ð²ÆÎñÐÅÏ¢£¬ £¬£¬£¬£¬µ«LoblawÈÔ³öÓÚÉóÉ÷˼Á¿£¬ £¬£¬£¬£¬×Ô¶¯×¢ÏúÁËËùÓпͻ§µÄÕË»§£¬ £¬£¬£¬£¬ÒªÇó»á¼ûÊý×ÖЧÀ͵ÄÓû§ÖØÐµÇ¼²¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬ £¬£¬£¬£¬Æä½ðÈÚЧÀÍÆ·ÅÆPC FinancialδÊÜ´Ë´ÎÊÂÎñÓ°Ïì¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/


2. Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÔâAiLockÀÕË÷Èí¼þ¹¥»÷


3ÔÂ12ÈÕ£¬ £¬£¬£¬£¬Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÕýÊÓ²ìÒ»ÆðDZÔÚÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬ÒòÓÉÊÇAiLockÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÐ¹Â¶Æ½Ì¨½«ÆäÁÐΪÊܺ¦Õß¡£¡£¡£¡£¾Ý³Æ£¬ £¬£¬£¬£¬¸ÃÍÅ»ïÇÔÈ¡ÁËЭ»á129GBÊý¾Ý£¬ £¬£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÎļþ¡£¡£¡£¡£Ð­»áÒÑÁªºÏÄÚ²¿ÍŶÓÓëÍⲿר¼ÒÕö¿ªÊӲ죬 £¬£¬£¬£¬²¢Ç¿µ÷¡°Êý¾ÝÇå¾²ÊÇÄ¿½ñÖ÷ҪʹÃü¡±£¬ £¬£¬£¬£¬ÏÖÔÚÕýÓëÖ´·¨²¿·ÖÏàÖúÒÔÀåÇåÊÂÎñÕæÏà¡£¡£¡£¡£Ð­»á½²»°ÈËÌåÏÖ£¬ £¬£¬£¬£¬ÒÑ×¢ÖØµ½ÍþвÐÐΪÕßÐû²¼µÄ¡°ÈÏÁ족Ìû×Ó£¬ £¬£¬£¬£¬µ«ÒòÊÓ²ìÈÔÔÚ¾ÙÐУ¬ £¬£¬£¬£¬ÔÝÎÞ·¨Åû¶Ïêϸϸ½Ú¡£¡£¡£¡£×÷ΪӢ¹úÇú¹÷ÇòÔ˶¯µÄ½¹µãÖÎÀí»ú¹¹£¬ £¬£¬£¬£¬Ð­»áÁýÕÖÌìÏÂ800Óà¼Ò¾ãÀÖ²¿¡¢15Íò×¢²áÇòÔ±¼°1.5ÍòÃû½ÌÁ·¡¢²ÃÅк͹ÙÔ±£¬ £¬£¬£¬£¬ÔËÓª²ã¼¶´Óϲ㵽¾«Ó¢¹ú¼Ò¶Ó¡£¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄÜÓ°Ïì»áÔ±Òþ˽Êý¾Ý£¬ £¬£¬£¬£¬Ð­»áºôÓõÇòԱСÐÄÒì³£ÕË»§»î¶¯¼°ÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬£¬£¬ÉóÉ÷´¦Öóͷ£Î´ÂÄÀúÖ¤µÄͨѶ¡£¡£¡£¡£Ö»¹ÜЭ»áÉÐδ֤ʵÊý¾ÝÏÖʵй¶£¬ £¬£¬£¬£¬µ«ÒѽÓÄÉÔ¤·À²½·¥£¬ £¬£¬£¬£¬°üÀ¨×Ô¶¯×¢ÏúËùÓÐÊý×ÖЧÀÍÕË»§²¢ÒªÇóÓû§ÖØÐµÇ¼¡¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/


3. ÐÂÐÍAIÌìÉú¶ñÒâÈí¼þSlopolyÇ¿»¯ÀÕË÷¹¥»÷Á´


3ÔÂ12ÈÕ£¬ £¬£¬£¬£¬IBM X-ForceÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪSlopolyµÄÐÂÐͶñÒâÈí¼þ£¬ £¬£¬£¬£¬¼«¿ÉÄÜÓÉÌìÉúʽÈ˹¤ÖÇÄܹ¤¾ß½¨É裬 £¬£¬£¬£¬ÆäÊÖÒÕÌØÕ÷°üÀ¨´ó×Ú´úÂë×¢ÊÍ¡¢½á¹¹»¯ÈÕÖ¾¼Í¼¡¢¹ýʧ´¦Öóͷ£¼°ÇåÎú±äÁ¿ÃüÃû£¬ £¬£¬£¬£¬ÕâЩÔÚÈËÀà±àд¶ñÒâÈí¼þÖÐÓÐÊý¡£¡£¡£¡£¸ÃÈí¼þ×÷ΪPowerShell¾ç±¾ºóÃÅ£¬ £¬£¬£¬£¬ÔÚInterlockÀÕË÷Èí¼þ¹¥»÷ÖÐÊÎÑÝC2¿Í»§¶Ë½ÇÉ«£¬ £¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾЧÀÍÆ÷DZÔÚ³¬Ò»ÖÜ£¬ £¬£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢Î¬³Ö³¤ÆÚ»á¼û¡£¡£¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³ÌȦÌ×£¬ £¬£¬£¬£¬ºóÆÚ°²ÅÅSlopoly¡£¡£¡£¡£IBMÆÊÎöÖ¸³ö£¬ £¬£¬£¬£¬¾ç±¾Ëä×Ô³Æ"¶à̬C2³¤ÆÚ»¯¿Í»§¶Ë"£¬ £¬£¬£¬£¬µ«ÏÖʵȱ·¦Ö´ÐÐÆÚ´úÂë×ÔÐÞ¸ÄÄÜÁ¦£¬ £¬£¬£¬£¬½öͨ¹ýÌìÉúËæ»úÉèÖÃÖµºÍº¯ÊýÃû³ÆÊµÏÖα¶à̬¡£¡£¡£¡£Æä°²ÅÅÓÚC:\ProgramData\Microsoft\Windows\Runtime\£¬ £¬£¬£¬£¬½¹µã¹¦Ð§°üÀ¨£ºÃ¿30Ãë·¢ËÍÐÄÌøÐűêÖÁ/api/commands£¬ £¬£¬£¬£¬Ã¿50ÃëÂÖѯÏÂÁ £¬£¬£¬£¬Í¨¹ýcmd.exeÖ´ÐÐÖ¸Áî²¢»Ø´«Ð§¹û£¬ £¬£¬£¬£¬Î¬»¤persistence.logÈÕÖ¾£¬ £¬£¬£¬£¬Í¨¹ý"ÔËÐÐʱÊðÀí"ÍýÏëʹÃü½¨É賤ÆÚÐÔ¡£¡£¡£¡£Ö§³ÖÏÂÁ¸ÇÏÂÔØÖ´ÐÐEXE/DLL/JSÓÐÓÃÔØºÉ¡¢ÔËÐÐshellÏÂÁî¡¢µ÷½âÐűê¾àÀë¡¢×Ô¸üм°Í˳öÀú³Ì¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/


4. ÃÀÅ·´Ý»ÙÒÀÀµAVReconµÄSocksEscort·¸·¨ÊðÀíÍøÂç


3ÔÂ12ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹ú˾·¨²¿ÁªºÏÅ·ÖÞ¶à¹úÖ´·¨»ú¹¹¼°Ë½ÈËÏàÖúͬ°éBlack Lotus Labs£¬ £¬£¬£¬£¬ÀֳɯÆËðÁËÔËӪʮÓàÄêµÄSocksEscortÍøÂç·¸·¨ÊðÀíÍøÂç¡£¡£¡£¡£¸ÃÍøÂçÍêÈ«ÒÀÀµAVRecon Linux¶ñÒâÈí¼þÈëÇÖ±ßÑØ×°±¸£¬ £¬£¬£¬£¬Í¨¹ý¡°Çå½à¡±IPµØµãÎªÍøÂç·¸·¨·Ö×ÓÌṩÁ÷Á¿Â·ÓÉЧÀÍ£¬ £¬£¬£¬£¬¿ÉÈÆ¹ý¶àÖØºÚÃûµ¥£¬ £¬£¬£¬£¬Ôø±»ÓÃÓÚÇÔȡŦԼÓû§100ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡¢Ôì³É±öϦ·¨ÄáÑÇÖÆÔìÆóÒµ70ÍòÃÀԪڲƭËðʧ¼°ÏÖÒÛ/ÍËÒÛÎäÊ¿10ÍòÃÀÔªÐÅÓÿ¨Ëðʧ¡£¡£¡£¡£¾ÝBlack Lotus LabsÊý¾Ý£¬ £¬£¬£¬£¬SocksEscort×Ô2023Äê±»¼Í¼ÒÔÀ´£¬ £¬£¬£¬£¬ÒÑÍù¼¸ÄêÆ½¾ùÿÖÜѬȾ2Íǫ̀װ±¸£¬ £¬£¬£¬£¬ÀÛ¼ÆÌṩԼ36.9Íò¸öIPµØµã»á¼ûȨÏÞ¡£¡£¡£¡£×èÖ¹2026Äê2Ô£¬ £¬£¬£¬£¬ÆäÓ¦ÓóÌÐòÈÔÁгöÔ¼8000̨ÊÜѬȾ·ÓÉÆ÷¡£¡£¡£¡£Ðж¯ÖУ¬ £¬£¬£¬£¬Ö´·¨»ú¹¹²é·âÁË7¹ú34¸öÓòÃûºÍ23̨ЧÀÍÆ÷£¬ £¬£¬£¬£¬ÃÀ¹ú¶³½á350ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬ £¬£¬£¬£¬ËùÓÐÊÜѬȾװ±¸ÒÑÓëSocksEscortЧÀͶϿªÅþÁ¬¡£¡£¡£¡£AVRecon¶ñÒâÈí¼þ×Ô2021Äê5ÔÂÆð»îÔ¾£¬ £¬£¬£¬£¬2023ÄêÖÐÆÚÒÑѬȾ³¬7Íǫ̀»ùÓÚLinuxµÄSOHO·ÓÉÆ÷£¬ £¬£¬£¬£¬½öÓÃÓÚÀ©´óSocksEscort¹æÄ£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/


5. ¼ÓÄôóTelus DigitalÔâShinyHuntersÇÔÈ¡1PBÊý¾Ý


3ÔÂ12ÈÕ£¬ £¬£¬£¬£¬¼ÓÄôóÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·Telus Digital¿ËÈÕ֤ʵÔâÓöÖØ´óÇå¾²ÊÂÎñ¡£¡£¡£¡£ÍþвÐÐΪÕßShinyHuntersÉù³ÆÔÚÒ»Á¬ÊýÔµĹ¥»÷ÖÐÇÔÈ¡½ü1PBÊý¾Ý£¬ £¬£¬£¬£¬Éæ¼°TelusµÄBPOÔËÓª¼°ÏûºÄÕßµçÐŲ¿·Öͨ»°¼Í¼¡£¡£¡£¡£¾ÝShinyHuntersÅû¶£¬ £¬£¬£¬£¬ÆäʹÓÃSalesloft DriftÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄGoogle Cloud Platformƾ֤ÈëÇÖTelus£¬ £¬£¬£¬£¬²¢Í¨¹ýÍøÂçÇå¾²¹¤¾ßtrufflehogËÑË÷¸ü¶àƾ֤£¬ £¬£¬£¬£¬½ø¶ø»á¼û°üÀ¨BigQueryʵÀýÔÚÄڵĶà¸öϵͳ¡£¡£¡£¡£±»µÁÊý¾Ýº­¸Ç¿Í»§Ö§³Ö¹¤µ¥¡¢Í¨»°Â¼Òô¡¢Ô´´úÂë¡¢²ÆÎñÐÅÏ¢¡¢FBIÅä¾°ÊӲ졢SalesforceÊý¾Ý¼°ÓªÏú»î¶¯ÔªÊý¾ÝµÈ£¬ £¬£¬£¬£¬Éæ¼°28¼Ò×ÅÃû¹«Ë¾£¬ £¬£¬£¬£¬Êý¾ÝÀàÐÍÒò¹«Ë¾¶øÒ죬 £¬£¬£¬£¬Ì»Â¶Á˿ͻ§Ö§³Ö¡¢ºô½ÐÖÐÐÄÍâ°ü¡¢AI¹¤¾ß¡¢Ú²Æ­¼ì²âµÈ¶àÓªÒµ¹¦Ð§¡£¡£¡£¡£ShinyHunters×Ô½ñÄê2ÔÂÆðÏòTelusÀÕË÷6500ÍòÃÀÔª£¬ £¬£¬£¬£¬µ«Î´»ñ»ØÓ¦¡£¡£¡£¡£Telus×òÈÕÕýʽȷÈÏϵͳÔâδ¾­ÊÚȨ»á¼û£¬ £¬£¬£¬£¬²¢ÌåÏÖÒѽÓÄɲ½·¥Ó¦¶ÔÈëÇÖ¡¢±£»£»£»¤ÏµÍ³£¬ £¬£¬£¬£¬Ô¼ÇëÍøÂçȡ֤ר¼ÒЭÖúÊӲ죬 £¬£¬£¬£¬ÓëÖ´·¨²¿·ÖÏàÖú£¬ £¬£¬£¬£¬Í¬Ê±Ç¿µ÷ÓªÒµÔËÓªÕý³££¬ £¬£¬£¬£¬ÎÞÖ¤¾ÝÏÔʾ¿Í»§ÍøÂçЧÀÍÊÜÓ°Ï죬 £¬£¬£¬£¬½«×ÃÇé֪ͨÊÜÓ°Ïì¿Í»§¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/


6. °¢¶û°ÍÄáÑÇÒé»áÔâÍøÂç¹¥»÷£¬ £¬£¬£¬£¬ÒÁ·½×éÖ¯³ÆÅê»÷


3ÔÂ11ÈÕ£¬ £¬£¬£¬£¬°¢¶û°ÍÄáÑÇÒé»áÓÚÖܶþÍí¼äÔâÓö¡°¸ß¼¶¡±ÍøÂç¹¥»÷£¬ £¬£¬£¬£¬¹¥»÷Ä¿µÄÃ÷È·Ö¸Ïòɾ³ýÊý¾Ý²¢¹¥Ïݶà¸öÄÚ²¿ÏµÍ³¡£¡£¡£¡£¾ÝÒé»áÉùÃ÷£¬ £¬£¬£¬£¬Æä½¹µãϵͳÓë¹Ù·½ÍøÕ¾ÈÔ¼á³ÖÕý³£ÔËÐУ¬ £¬£¬£¬£¬µ«ÐÐÕþ²¿·ÖʹÓõÄÄÚ²¿µçÓÊЧÀÍÒѱ»ÔÝʱÔÝÍ££¬ £¬£¬£¬£¬µ¼ÖÂÊÕ·¢Ë«ÏòͨѶÖÐÖ¹£¬ £¬£¬£¬£¬ÊÂÇéÖ°Ô±ÓëÒéÔ±ÔÚ¹¥»÷±¬·¢ºóÊýСʱÄÚÎÞ·¨»á¼ûµçÄÔ¼°µçÓÊϵͳ¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬ £¬£¬£¬£¬ÃûΪ¡°Homeland Justice¡±µÄºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬ £¬£¬£¬£¬²¢ÔÚÆäTelegramƵµÀÐû²¼Á˾ݳÆÐ¹Â¶µÄÄÚ²¿Í¨Ñ¶Îļþ½ØÍ¼¡£¡£¡£¡£Ö»¹Ü°¢¶û°ÍÄáÑǹٷ½ÉÐδ¹ûÕæÖ¤Êµ¸Ã×é֯˵·¨£¬ £¬£¬£¬£¬µ«Çå¾²Ñо¿Ö°Ô±ÓëÎ÷·½¹ÙÔ±´ËǰÒѽ«¡°Homeland Justice¡±ÓëÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¹ØÁª¡£¡£¡£¡£½üÄêÀ´£¬ £¬£¬£¬£¬¸Ã×éÖ¯¶à´ÎÐû³Æ¶Ô°¢¶û°ÍÄáÑǾ³ÄÚһϵÁÐÍøÂç¹¥»÷ÈÏÕæ£¬ £¬£¬£¬£¬Ä¿µÄº­¸ÇÒé»á¡¢¹ú¼Òº½¿Õ¹«Ë¾¡¢µçÐÅÆóÒµ¼°¹ú¼Òͳ¼Æ¾Ö¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÅä¾°Óë°¢¶û°ÍÄáÑÇÇå¾²ÐÎÊÆÏ¸ÃÜÏà¹Ø¡£¡£¡£¡£¡°Homeland Justice¡±ÔÚ¹¥»÷ÉùÃ÷ÖÐÃ÷È·ÌåÏÖ£¬ £¬£¬£¬£¬´Ë´ÎÐж¯ÊǶ԰¢¶û°ÍÄáÑÇÖ§³ÖÒÁÀÊ×èµ²ÅÉ×éÖ¯¡°ÒÁÀÊÈËÃñÊ¥Õ½Õß×éÖ¯¡±£¨MEK£©µÄÅê»÷¡£¡£¡£¡£


https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament