ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬³¬4.7Íò»áÔ±ÐÅϢй¶
Ðû²¼Ê±¼ä 2026-01-261. ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬³¬4.7Íò»áÔ±ÐÅϢй¶
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬Å¦Ô¼Öݹ«ÎñÔ±¹¤»áϵͳ2025Äê5ÔÂ3ÈÕÖÁ31ÈÕÔâ¶ñÒâ¹¥»÷ÕßÇÖÈ벢DZÔÚ½üÒ»¸öÔ£¬£¬£¬£¬£¬µ¼Ö³¬4.7ÍòÃû»áԱСÎÒ˽¼ÒÐÅϢй¶¡£¡£¸Ã¹¤»á×÷ΪÃÀ¹ú×î´óµÄ¹«¹²²¿·Ö¹ÍÔ±¹¤»á¡ª¡ªÖÝ¡¢ÏØ¡¢ÊйÍÔ±ÁªºÏ»áµÄ½¹µã³ÉÔ±µ¥Î»£¬£¬£¬£¬£¬´ú±íÔ¼30ÍòÃûÖݼ°µØ·½Õþ¸®¹ÍÔ±ÀûÒæ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒý·¢È«ÃÀÀ͹¤×éÖ¯ÍøÂçÇå¾²¹Ø×¢¡£¡£¾Ý¹¤»áÏò»áÔ±·¢Ë͵Ä֪ͨº¯Åû¶£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚϵͳÄÚÒ»Á¬»î¶¯Ê±´ú£¬£¬£¬£¬£¬¿ÉÄÜ»ñÈ¡ÁË»áÔ±ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¹¤»áÓÚ5ÔÂÏÂÑ®·¢Ã÷δÊÚȨ»á¼ûºó£¬£¬£¬£¬£¬Á¬Ã¦Æô¶¯ÊӲ첢½ÓÄÉÏÂÏßϵͳ¡¢ÖØÖÃÃÜÂë¡¢°²ÅŸ߼¶Çå¾²¼ì²âÈí¼þµÈ²½·¥¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»ÓÃÓÚڲƻòÉí·ÝµÁÓõÄÖ±½ÓÖ¤¾Ý£¬£¬£¬£¬£¬µ«Éç»á°ü¹ÜºÅÂëµÄÖÕÉíΨһÐÔʹÆä³ÉΪºã¾ÃÍøÂçÇå¾²Òþ»¼£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÐÅÏ¢¿ªÉèÐéαÐÅ´ûÕË»§¡¢Ìá½»ÄÉ˰É걨µ¥»òÉêÁ츣Àû½òÌù£¬£¬£¬£¬£¬¸øÊܺ¦Õß´øÀ´Ò»Á¬Î£º¦¡£¡£¹¤»áÒÑÓë¶¥¼âÍøÂçÇå¾²¼°Òþ˽±£»£»¤»ú¹¹ÏàÖú¿ªÕ¹ÊÓ²ìÓëÓ¦¼±´¦Öóͷ££¬£¬£¬£¬£¬²¢È·ÈÏÉæÊÂÊý¾Ý¹æÄ£ºóʵʱ֪ͨÊÜÓ°Ïì»áÔ±¡£¡£¹Ù·½½¨ÒéÊÜÓ°ÏìÖ°Ô±°´ÆÚÉó²éÐÅÓñ¨¸æ¡¢ºË¶ÔÕË»§Õ˵¥Ã÷ϸ£¬£¬£¬£¬£¬Ç×½ü×¢ÖØ¿ÉÒɻ¡£¡£
https://cybernews.com/security/new-york-csea-union-data-breach/
2. º«¹úÖÆÒ©¾ÞÍ·³¬800ÍòÌõÄÚ²¿ÐÅÏ¢¼°Ô±¹¤µµ°¸Ôâй¶
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬º«¹ú×ÅÃûÒ©ÆóBoryungÖÆÒ©¿ËÈÕ±¬·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Æä̻¶µÄMongoDBÊý¾Ý¿âÒòÎÞÈκÎÊÚȨ·À»¤£¬£¬£¬£¬£¬µ¼Ö³¬800ÍòÌõÄÚ²¿Í¨Ñ¶¼Í¼¼°½ü3500·ÝÔ±¹¤µµ°¸Íâй¡£¡£¸ÃÊý¾Ý¿âÓÉÆóÒµ¼¶Í¨Ñ¶¹¤¾ßGW¼´Ê±Í¨Ñ¶Èí¼þʹÓ㬣¬£¬£¬£¬Ö±½ÓÃæÏò¹«¹²»¥ÁªÍø¿ª·ÅÍêÕû¶ÁȡȨÏÞ£¬£¬£¬£¬£¬Èκη¢Ã÷Õß¾ù¿ÉÎÞ×è°»á¼û¡£¡£Ð¹Â¶Êý¾Ý·ÖΪÈý´óÀࣺһÊÇÔ±¹¤Éí·ÝÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢ÆóÒµÓÊÏä¡¢Óû§Ãû¡¢¹þÏ£¼ÓÃÜÃÜÂë¼°×°±¸ÔªÊý¾Ý£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËʵÑéÉí·ÝµÁÓûòÉç»á¹¤³Ìѧ¹¥»÷£¬£¬£¬£¬£¬ÉõÖÁͨ¹ýÀëÏßÆÆ½âÆÆÒëÃÜÂëºóÌᳫײ¿â¹¥»÷£»£»¶þÊÇÄÚ²¿Í¨Ñ¶¼Í¼£¬£¬£¬£¬£¬º¸Ç800ÍòÌõÉæ¼°ÉÌҵǢ̸¡¢ÈËÁ¦×ÊÔ´¡¢²ÆÎñ¡¢ÏîÄ¿ÖÎÀí¼°Ô±¹¤Ë½È˶Ի°µÄ̸Ìì¼Í¼£¬£¬£¬£¬£¬ÆäÖаüÀ¨µÄÄÚ²¿Á´½Ó¡¢IPµØµã¡¢Ñз¢¶¯Ì¬µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÏµÍ³ÉøÍ¸»òαװԱ¹¤Éí·Ý£»£»ÈýÊÇϵͳԪÊý¾Ý£¬£¬£¬£¬£¬Èçʱ¼ä´Á¡¢ÐÂÎÅÇþµÀ¡¢Óû§-ÇþµÀ¶ÔÓ¦¹ØÏµµÈ£¬£¬£¬£¬£¬¿É¸¨Öú¹¥»÷Õß¹¹½¨¹¥»÷·¾¶¡£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬£¬£¬´ËÀàй¶¿ÉÄÜÒý·¢Á¬ËøÎ£º¦£º¹¥»÷Õß¿Éͨ¹ý̸Ìì¼Í¼ÖеÄϸ½Ú»ñÊØÐÅÈΣ¬£¬£¬£¬£¬ÊµÑ龫׼թƣ»£»»òʹÓÃÆÆ½âµÄÃÜÂëÈëÇÖÆóҵϵͳ£¬£¬£¬£¬£¬ÇÔÈ¡¸ü¶àÉÌÒµÉñÃØ¡£¡£Ö»¹ÜBoryungÉÐδ»ØÓ¦£¬£¬£¬£¬£¬µ«Ì»Â¶Êý¾Ý¿âÒѱ»¹Ø±Õ¡£¡£
https://cybernews.com/security/boryung-corporation-leaks-internal-messages/
3. ɳ³æ×éÖ¯¹¥»÷²¨À¼ÄÜÔ´ÉèÊ©£¬£¬£¬£¬£¬°²ÅÅÐÂÐÍÊý¾Ý²Á³ýÈí¼þ
1ÔÂ24ÈÕ£¬£¬£¬£¬£¬²¨À¼µçÍø2025Äê12ÔÂÏÂÑ®ÔâÓöÓë¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯¡°É³³æ¡±£¨Sandworm£©Ïà¹ØµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬¸Ã×éÖ¯ÊÔͼ°²ÅÅÃûΪ¡°DynoWiper¡±µÄÐÂÐÍÆÆËðÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þ¡£¡£¾ÝÇå¾²¹«Ë¾ESET֤ʵ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÓÚ12ÔÂ29ÈÕÖÁ30ÈÕ£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸²¨À¼Á½×ùÈȵçÁª²ú³§¼°¿ÉÔÙÉúÄÜÔ´·¢µçÖÎÀíϵͳ£¨°üÀ¨·çÁ¦ÎÐÂÖ»úºÍ¹â·üµçÕ¾£©¡£¡£²¨À¼×ÜÀíÌÆÄɵ¡¤Í¼Ë¹¿ËÔÚÐÂÎÅÐû²¼»áÉÏÃ÷È·Ö¸³ö£¬£¬£¬£¬£¬Ï®»÷ÓÉÓë¶íÂÞ˹Ç鱨²¿·ÖÖ±½Ó¹ØÁªµÄ×éÖ¯²ß»®¡£¡£¡°É³³æ¡±£¨ÓÖÃûUAC-0113¡¢APT44¡¢Seashell Blizzard£©ÊǶíÂÞ˹×ÜÕÕÁϲ¿Ç鱨×ܾ֣¨GRU£©ÏÂÊô74455¾üʵ¥Î»µÄÒ»²¿·Ö£¬£¬£¬£¬£¬×Ô2009ÄêÆð»îÔ¾£¬£¬£¬£¬£¬ÒÔʵÑ鯯ËðÐÔ¹¥»÷ÖøÃû¡£¡£ÆäÀúÊ·Õ½¼¨°üÀ¨2015Äê¶ÔÎÚ¿ËÀ¼µçÍøµÄ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÔ¼23ÍòÈ˶ϵ硣¡£±¾´Î¹¥»÷ÖÐʹÓõÄDynoWiper¶ñÒâÈí¼þ»á±éÀúÎļþϵͳɾ³ýÎļþ£¬£¬£¬£¬£¬µ¼Ö²Ù×÷ϵͳ̱»¾£¬£¬£¬£¬£¬Ðèͨ¹ý±¸·ÝÖØÐÞ»òÖØÐÂ×°Öᣡ£ESET½«Æä¼ì²âΪWin32/KillFiles.NMO£¬£¬£¬£¬£¬²¢Ðû²¼ÆäSHA-1¹þÏ£Öµ¡£¡£
https://www.bleepingcomputer.com/news/security/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/
4. Call-On-DocÊý¾Ýй¶£¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý100ÍòÃû»¼Õß
1ÔÂ24ÈÕ£¬£¬£¬£¬£¬Ô¶³ÌÒ½ÁÆÐ§ÀÍÌṩÉÌCall-On-DocÐû³ÆÓµÓÐ200Íò»îÔ¾Óû§£¬£¬£¬£¬£¬¿ÉÖÎÁÆ150ÓàÖÖ¼²²¡£¬£¬£¬£¬£¬²¢ÔÊÐí½ÓÄÉ¡°×îÏȽø¡±Êý¾ÝÇå¾²²½·¥¼°ÍêÈ«ÇкÏHIPAA±ê×¼¡£¡£È»¶ø£¬£¬£¬£¬£¬ºÚ¿ÍÂÛ̳Åû¶Æä12Ô³õÔâÈëÇÖ£¬£¬£¬£¬£¬1,144,223Ìõ»¼Õ߼ͼ±»ÇÔ£¬£¬£¬£¬£¬Éæ¼°»¼Õß´úÂë¡¢ÉúÒâ±àºÅ¡¢ÐÕÃû¡¢µØµã¡¢µç»°¡¢ÓÊÏä¡¢Ò½ÁÆÖÖ±ð¡¢Ïêϸ²¡Ö¢¡¢´¦·½¼°Ö§¸¶½ð¶îµÈÃô¸ÐÐÅÏ¢¡£¡£ºÚ¿ÍÌṩÈýÕŰüÀ¨ÊýÊ®Ãû»¼ÕßÐÅÏ¢µÄ½ØÍ¼¼°1000ÌõÑù±¾Îļþ£¬£¬£¬£¬£¬¾ºË²é²¿·Ö»¼ÕߵصãÈÔÓÐÓ㬣¬£¬£¬£¬ÇÒÂô¼Ò½ÓÊܵÚÈý·½ÍйÜÉúÒ⣬£¬£¬£¬£¬Êý¾ÝÕæÊµÐԽϸߡ£¡£´Ë´ÎÊÂÎñÒý·¢¶àÖØÕùÒé¡£¡£Call-On-Doc½ÓÄÉ×Ô·Ñģʽ£¬£¬£¬£¬£¬²»´æ´¢°ü¹ÜÐÅÏ¢»òÉç±£ºÅ£¬£¬£¬£¬£¬ÆäHIPAAºÏ¹æÐÔ´æÒÉ£¬£¬£¬£¬£¬Èô½öͨ¹ýµç×Ó´«Êä¾ÙÐÐÊܱ£»£»¤ÉúÒâÔò¿ÉÄÜÊÜî¿Ïµ£¬£¬£¬£¬£¬²»È»ÈÔÊÜÖÝÖ´·¨¼°FTCÔ¼Êø¡£¡£Èô±£´æ¡°ÔÊÐí׿ԽÇ徲ȴδ¶ÒÏÖ¡±µÄÓÕÆÐÐΪ£¬£¬£¬£¬£¬FTC¿ÉÒÀ¾Ý¡¶Áª°îÉÌҵίԱ»á·¨¡·ÊӲ졣¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Call-On-DocÍøÕ¾FAQÉù³ÆÆäEHRϵͳ¡°ÍêÈ«ÇкÏHIPAA¡±£¬£¬£¬£¬£¬µ«¹¥»÷Õß³ÆÎ´·¢Ã÷¼ÓÃÜÖ¤¾Ý£¬£¬£¬£¬£¬ÇÒ¹¥»÷ʱ´ú»ú¹¹Î´²ì¾õ¡£¡£
https://databreaches.net/2026/01/24/call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment/?pk_campaign=feed&pk_kwd=call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment
5. ShinyHuntersÀÕË÷ÍÅ»ïÌᳫSSOÓïÒô´¹ÂÚ¹¥»÷
1ÔÂ23ÈÕ£¬£¬£¬£¬£¬ShinyHuntersÀÕË÷ÍÅ»ï¿ËÈÕÐû³Æ£¬£¬£¬£¬£¬Õý¶ÔOkta¡¢Î¢Èí¼°¹È¸èµÄµ¥µãµÇ¼£¨SSO£©ÕË»§ÌᳫһÁ¬ÓïÒôÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ÒÔÇÔÈ¡ÆóÒµÊý¾Ý²¢ÊµÑéÀÕË÷¡£¡£¹¥»÷ÖУ¬£¬£¬£¬£¬ÍþвÐÐΪÕßð³äITÖ§³ÖÖ°Ô±£¬£¬£¬£¬£¬Í¨¹ýµç»°ÓÕÆÔ±¹¤ÔÚÄ£Ä⹫˾µÇ¼ÃÅ»§µÄ´¹ÂÚÍøÕ¾ÊäÈëÆ¾Ö¤ºÍ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©´úÂë¡£¡£Ò»µ©¹¥ÆÆÏµÍ³£¬£¬£¬£¬£¬¹¥»÷Õ߿ɻá¼ûÊܺ¦ÕßSSOÕË»§£¬£¬£¬£¬£¬½ø¶øÅþÁ¬µ½ÆäËûÆóÒµÓ¦ÓÃÈçSalesforce¡¢Microsoft 365¡¢Google Workspace¡¢DropboxµÈ£¬£¬£¬£¬£¬ÕâЩƽ̨ͨ¹ýSSO¿ØÖÆÃæ°å¼¯³É£¬£¬£¬£¬£¬³ÉΪ½øÈëÆóҵϵͳºÍÊý¾ÝµÄÈë¿Ú¡£¡£¹¥»÷ÕßʹÓÃÉç»á¹¤³ÌÊֶΣ¬£¬£¬£¬£¬ÔÚͨ»°ÖÐʵʱָµ¼Êܺ¦ÕßÍê³ÉµÇ¼ºÍMFAÑéÖ¤£¬£¬£¬£¬£¬ÉõÖÁ¶¯Ì¬µ÷½â´¹ÂÚÍøÕ¾ÄÚÈÝÒÔÆ¥ÅäÕæÊµÐ§À͵ÄÑéÖ¤°ì·¨¡£¡£OktaÒÑÐû²¼±¨¸æ£¬£¬£¬£¬£¬ÐÎòÁ˹¥»÷ÖÐʹÓõĴ¹ÂÚ¹¤¾ß°ü£¬£¬£¬£¬£¬°üÀ¨»ùÓÚWebµÄ¿ØÖÆÃæ°å£¬£¬£¬£¬£¬¿Éʵʱ¸Ä±äÊܺ¦Õß¿´µ½µÄÒ³ÃæÄÚÈÝ£¬£¬£¬£¬£¬¸¨ÖúÍê³ÉÑéÖ¤Àú³Ì¡£¡£ShinyHunters֤ʵ¶Ô²¿·Ö¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬³ÆSalesforceΪÖ÷ҪĿµÄ£¬£¬£¬£¬£¬ÆäËû¹«Ë¾Îª¡°ÊÜÒæÕß¡±£¬£¬£¬£¬£¬²¢Ê¹ÓôËǰÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄµç»°ºÅÂ롢ְλÐÅÏ¢µÈÔöǿթƿÉÐŶȡ£¡£
https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/
6. Under ArmourÔâEverestÀÕË÷Èí¼þ¹¥»÷
1ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÔ˶¯ÒÂÊξÞÍ·Under ArmourÕýÊÓ²ìÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Éæ¼°7200ÍòÌõ¿Í»§¼Í¼±»¹ûÕæÖÁºÚ¿ÍÂÛ̳¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬¸ÃÊÂÎñÓëEverestÀÕË÷Èí¼þÍÅ»ï2025Äê11ÔÂÌᳫµÄ¹¥»÷Ïà¹Ø£¬£¬£¬£¬£¬ºóÕßÔøÉù³ÆÇÔÈ¡343GBÊý¾Ý²¢ÊÔͼÀÕË÷Êê½ð¡£¡£2026Äê1Ô£¬£¬£¬£¬£¬¿Í»§Êý¾ÝÔÚÈÈÃźڿÍÂÛ̳й¶£¬£¬£¬£¬£¬°üÀ¨7200Íò¸öµç×ÓÓʼþµØµã¼°ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢵ØÀíλÖᢹºÖüͼµÈÃô¸ÐÐÅÏ¢¡£¡£×ÅÃûÊý¾Ýй¶׷×ÙÆ½Ì¨Have I Been Pwned֤ʵ£¬£¬£¬£¬£¬´Ë´Îй¶µÄÑù±¾Êý¾Ý°üÀ¨Êý°ÙÍòÌõUnder ArmourÖ÷¹Ë¹ºÖüͼ¼°Ô±¹¤µç×ÓÓʼþµØµã£¬£¬£¬£¬£¬Óë¸Ãƽ̨´Ëǰ±¨¸æÒ»Ö¡£¡£Ð¹Â¶Êý¾Ýͨ¹ýºÚ¿ÍÂÛ̳¹ûÕæºó£¬£¬£¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢£¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§ÒÑͨ¹ý¸Ãƽ̨ÊÕµ½Í¨Öª¡£¡£Under Armour»ØÓ¦³Æ£¬£¬£¬£¬£¬¹«Ë¾ÕýÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÊÓ²ìÖ¸¿Ø£¬£¬£¬£¬£¬²¢Ç¿µ÷Ö§¸¶ÏµÍ³¼°Óû§ÃÜÂëδÊÜÓ°Ïì¡£¡£¸Ã¹«Ë¾·ñ¶¨¡°ÊýÍòÍòÌõÃô¸Ð¼Í¼Ôâй¶¡±µÄ˵·¨£¬£¬£¬£¬£¬½öÈϿɡ°ÉÙÉÙÊý¿Í»§Ãô¸ÐÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡±£¬£¬£¬£¬£¬µ«Î´Ã÷È·ÏêϸÊýÄ¿¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¹«Ë¾Î´Åû¶¹¥»÷Èë¿Úµã»òÏêϸй¶Ե¹ÊÔÓÉ£¬£¬£¬£¬£¬Ò²Î´ËµÃ÷ÊÇ·ñÊÕµ½ÀÕË÷Êê½ðÒªÇ󡣡£
https://securityaffairs.com/187229/data-breach/investigation-underway-after-72m-under-armour-records-surface-online.html


¾©¹«Íø°²±¸11010802024551ºÅ