¿ÆÌصÏÍߺ½¿ÕÔâINCÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶
Ðû²¼Ê±¼ä 2026-02-271. ¿ÆÌصÏÍߺ½¿ÕÔâINCÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶
2ÔÂ24ÈÕ£¬£¬Ð§ÀÍÓÚÎ÷·Ç¹ú¼Ò¿ÆÌصÏÍßµÄÖ÷Òªº½¿Õ¹«Ë¾¿ÆÌصÏÍߺ½¿Õ¹«Ë¾ÔâÓöÍøÂç¹¥»÷£¬£¬±»ÆÈÆô¶¯ÓªÒµÒ»Á¬ÐÔÍýÏë¡£¡£¡£¡£¡£¡£¾Ý¹«Ë¾ÉùÃ÷֤ʵ£¬£¬ºÚ¿ÍÓÚ2ÔÂ8ÈÕÈëÇÖÆäϵͳ£¬£¬µ¼ÖÂÐÅϢϵͳ²¿·ÖÄÚÈÝÊÜÓ°Ï죬£¬ÊÖÒÕÍŶӽôÆÈÐÖúº½°à¼°ÆäËûÔËӪά»¤¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬INCÀÕË÷Èí¼þÍÅ»ïÉù³ÆÇÔÈ¡ÁË208GBÊý¾Ý£¬£¬É漰ЧÀÍÌṩÉÌ¡¢Âÿͼ°Ô±¹¤Ãô¸ÐÐÅÏ¢£¬£¬²¢ÍþвÔÚ2ÔÂ24ÈÕǰ֧¸¶Î´¹ûÕæÊê½ð£¬£¬²»È»½«Ð¹Â¶Êý¾Ý¡£¡£¡£¡£¡£¡£¿£¿ÆÌصÏÍߺ½¿Õ¹«Ë¾ÌåÏÖ£¬£¬Òѽ«ÊÂÎñ֪ͨ·¨¹ú¹ú¼ÒÐÅϢϵͳÇå¾²¾Ö£¨ANSSI£©ºÍ¿ÆÌصÏÍßµçÐÅî¿Ïµ¾Ö£¨ARTCI£©£¬£¬²¢ÕÙ¼¯¿ÆÌصÏÍßÅÌËã»úÓ¦¼±ÏìӦС×飨CI-CERT£©¼°¹ú¼Êר¼ÒÕö¿ªÊӲ죬£¬ÒÔÈ·¶¨Ãü¾Ýй¶¹æÄ£¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬Ö»¹ÜϵͳÊÜ´´£¬£¬µ«º½°àÍýÏë¼á³ÖÎȹ̣¬£¬½«¼ÌÐøÑÏ¿á×ñÊØ¹ú¼ÊÇå¾²±ê×¼ÔËÐУ¬£¬²¢¾¡Ò»ÇÐÆð¾¢¼õÇáÊÂÎñЧ¹û¡£¡£¡£¡£¡£¡£
https://therecord.media/air-cote-divoire-confirms-cyberattack
2. OptimizelyÔâÓïÒôÍøÂç´¹ÂÚ¹¥»÷ÖÂÊý¾Ýй¶
2ÔÂ23ÈÕ£¬£¬×ܲ¿Î»ÓÚŦԼµÄ¹ã¸æÊÖÒÕ¹«Ë¾Optimizely¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬ÍþвÐÐΪÕßͨ¹ýÖØ´óµÄÓïÒôÍøÂç´¹ÂÚ£¨vishing£©¹¥»÷ÈëÇÖÆä²¿·Öϵͳ£¬£¬ÇÔÈ¡ÁË¡°»ù±¾ÓªÒµÁªÏµÐÅÏ¢¡±¡£¡£¡£¡£¡£¡£OptimizelyÔÚÈ«ÇòÓµÓÐ21¸öЧÀÍ´¦¡¢½ü1500ÃûÔ±¹¤£¬£¬Ð§ÀÍÁè¼Ý10,000¼ÒÆóÒµ¿Í»§£¬£¬°üÀ¨H&M¡¢PayPal¡¢Zoom¡¢·áÌï¡¢ÎÖ´ï·á¡¢¿ÇÅÆ¡¢SalesforceºÍÄͿ˵È×ÅÃûÆ·ÅÆ¡£¡£¡£¡£¡£¡£¾ÝOptimizely·¢Ë͸øÊÜÓ°Ïì¿Í»§µÄÎ¥¹æÍ¨ÖªÐÅÏÔʾ£¬£¬2ÔÂ11ÈÕ£¬£¬¹¥»÷ÕßÁªÏµ¸Ã¹«Ë¾²¢Éù³ÆÒÑ»ñµÃϵͳ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¹«Ë¾ÉùÃ÷Ç¿µ÷£¬£¬¹¥»÷ÕßËäÀÖ³ÉÈëÇÖ²¿·ÖÄÚ²¿ÓªÒµÏµÍ³¡¢CRM¼Í¼¼°ºǫ́ÔËÓªÎĵµ£¬£¬µ«Î´ÄÜÌáÉýȨÏÞ¡¢×°ÖöñÒâÈí¼þ»ò½¨ÉèºóÃÅ£¬£¬ÇÒÎÞÖ¤¾ÝÅú×¢Æä»á¼ûÁËÃô¸Ð¿Í»§Êý¾Ý»òСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£OptimizelyÌåÏÖ£¬£¬ÓªÒµÔËӪδÊÜ×ÌÈÅ£¬£¬µ«ÖÒÑÔ¿Í»§Ð¡ÐÄʹÓñ»µÁÊý¾ÝÌᳫµÄ½øÒ»²½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ±»Ö¸ÓëShinyHuntersÀÕË÷×éÖ¯±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/
3. ³¯ÏÊLazarusÓÃMedusa¹¥»÷ÃÀÒ½ÁƼ°·ÇÓªÀû»ú¹¹
2ÔÂ24ÈÕ£¬£¬SymantecÓëCarbon BlackÍþвÁÔÈËÍŶÓ×îб¨¸æÏÔʾ£¬£¬Ó볯ÏʹØÁªµÄLazarus Group£¨ÓÖÃûDiamond Sleet¡¢Pompilus£©ÔÚÖж«Ò»¼Òδǩ×Ö»ú¹¹¹¥»÷Öа²ÅÅÁËMedusaÀÕË÷Èí¼þ£¬£¬²¢ÊÔͼ¹¥»÷ÃÀ¹úÒ½ÁÆ»ú¹¹Î´Ëì¡£¡£¡£¡£¡£¡£MedusaÓÉÍøÂç·¸·¨×éÖ¯SpearwingÓÚ2023ÄêÍÆ³ö£¬£¬×÷ΪÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÏîÄ¿£¬£¬ÒÑÐû³ÆÊµÑ鳬366Æð¹¥»÷¡£¡£¡£¡£¡£¡£ÆÊÎöMedusaÊý¾Ýй¶վµã·¢Ã÷£¬£¬2025Äê11Ô³õÒÔÀ´£¬£¬ÃÀ¹úËļÒÒ½ÁƼ°·ÇÓªÀû»ú¹¹ÔâÏ®£¬£¬°üÀ¨ÐÄÀí¿µ½¡ÁìÓò·ÇÓªÀû»ú¹¹ºÍ×Ô±ÕÖ¢¶ùͯ½ÌÓý»ú¹¹£¬£¬Æ½¾ùÀÕË÷½ð¶î´ï26ÍòÃÀÔª¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±ê¼Ç×ÅLazarusÕ½Êõת±ä¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÒÑÍù³£Ê¹Óö¨ÖÆÀÕË÷Èí¼þ£¨ÈçSHATTEREDGLASS¡¢Maui¡¢H0lyGh0st£©£¬£¬µ«2024Äê10ÔÂÆðתÏòÏֳɼÓÃܹ¤¾ß£¬£¬ÈçMedusaºÍQilin¡£¡£¡£¡£¡£¡£¹¥»÷ÖУ¬£¬LazarusʹÓÃÁ˶àÖÖ¹¤¾ß£º¶¨ÖÆÊðÀí¹¤¾ßRP_Proxy¡¢Æ¾Ö¤ÇÔÈ¡³ÌÐòMimikatz¡¢×¨ÓúóÃÅComebacker¡¢ÐÅÏ¢ÇÔÈ¡¹¤¾ßInfoHook¡¢Ô¶³Ì»á¼ûľÂíBLINDINGCAN£¨ÓÖÃûAIRDRY¡¢ZetaNile£©¼°ChromeÃÜÂëÌáÈ¡¹¤¾ßChromeStealer¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/02/lazarus-group-uses-medusa-ransomware-in.html
4. CarGurusÔâShinyHuntersй¶1200ÍòÕË»§Êý¾Ý
2ÔÂ25ÈÕ£¬£¬ÃÀ¹úÊý×ÖÆû³µÉúÒâÆ½Ì¨CarGurusÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬³¬1240ÍòÕË»§Ãô¸ÐÐÅÏ¢±»ShinyHunters×é֯й¶¡£¡£¡£¡£¡£¡£¸Ãƽ̨×÷ΪÏßÉϹº³µÁìÓò½¹µã¼ÓÈëÕߣ¬£¬Ã¿ÔÂÎüÒýÔ¼4000Íò·Ã¿Í£¬£¬ÓªÒµÁýÕÖÃÀ¹ú¡¢¼ÓÄôóºÍÓ¢¹ú£¬£¬Ìṩ³µÁ¾¶¨¼Û¡¢¾ÏúÉÌÆÀ¼Û¼°ÀúÊ·¼Í¼µÈ¹¤¾ß¡£¡£¡£¡£¡£¡£´Ë´Îй¶ԴÓÚÀÕË÷δË죬£¬Ð¹Â¶Êý¾Ý°üÀ¨µç×ÓÓʼþ¡¢ÕË»§ID¡¢½ðÈÚÉêÇëÏêÇé¡¢¾ÏúÉÌÐÅÏ¢¡¢ÐÕÃû¡¢µç»°ºÅÂë¡¢µØµã¡¢IPµØµã¼°Æû³µ½ðÈÚÉêÇëЧ¹û£¬£¬ÎļþѹËõºó´ï6.1GB£¬£¬Òѱ»Êý¾Ýй¶¼à¿ØÐ§ÀÍHaveIBeenPwnedÊÕ¼¡£¡£¡£¡£¡£¡£Ð¹Â¶ÊÂÎñ´øÀ´¶àÖØÎ£º¦£ºÐÕÃû¡¢ÓÊÏä¡¢µç»°µÈСÎÒ˽¼ÒÐÅÏ¢¿É±»ÓÃÓڸ߷ÂÕæÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£»£»£»£»£»½ðÈÚÉêÇëÊý¾Ýй¶ΪÉí·Ý͵ÇԺͽðÈÚÕ©ÆÌṩ±ãµ±£»£»£»£»£»ÕË»§ÐÅϢй¶¼Ó¾çÕË»§µÁÓÃΣº¦£¬£¬ÓÈÆäÊÇÃÜÂ븴Óó¡¾°£»£»£»£»£»ÎïÀíµØµãºÍIPÊý¾Ýй¶Òý·¢Òþ˽µ£ÐÄ£¬£¬¿ÉÄÜÕÐÖ¶¨ÏòÓªÏú¡¢¸ú×ÙɧÈŵȶñÒâÐÐΪ¡£¡£¡£¡£¡£¡£ShinyHunters½üÆÚƵÈÔÕë¶Ô´óÐÍÆóÒµ·¢¶¯¹¥»÷£¬£¬ÍÅ»ïÖ÷ҪʹÓÃÉç»á¹¤³ÌÊֶΣ¬£¬ÌØÊâÊÇÓïÒô´¹ÂÚ£¨vishing£©£¬£¬ÇÔȡƾ֤²¢»á¼ûSalesforce¡¢Okta¡¢Microsoft 365µÈSaaSƽ̨¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/188491/cyber-crime/shinyhunters-cyberattack-on-cargurus-impacts-12-4-million-users.html
5. ÓÀÀû¶È¼Ù´åÔâShinyHuntersÊý¾Ýй¶
2ÔÂ25ÈÕ£¬£¬ÓÀÀû¶È¼Ù´å֤ʵÆäЧÀÍÆ÷ÔâÍøÂç·¸·¨ÍÅ»ïShinyHunters¹¥»÷£¬£¬µ¼ÖÂÔ±¹¤Ãô¸ÐÊý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£ºÚ¿ÍÉù³ÆÒÑɾ³ýÊý¾Ý£¬£¬µ«ÓÀÀûÎÞ·¨ÑéÖ¤Õâһ˵·¨£¬£¬Òý·¢¶ÔÀÕË÷̸Åм°Êê½ðÖ§¸¶µÄÍÆ²â¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬ShinyHuntersÓÚ2ÔÂ20ÈÕÐû³Æ¹¥»÷£¬£¬²¢Åû¶ʹÓÃOracle PeopleSoftÎó²î¼°Ô±¹¤Æ¾Ö¤ÔÚ2025Äê9ÔÂÈëÇÖϵͳ£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨Ô±¹¤È«Ãû¡¢ÓÊÏä¡¢µç»°¡¢Ö°Î»¡¢Ð½Ë®¡¢ÈëÖ°ÈÕÆÚ¡¢³öÉúÈÕÆÚµÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£ÓÀÀû¶È¼Ù´å½²»°ÈËÌåÏÖ£¬£¬ÊÂÎñ±¬·¢ºóÁ¬Ã¦Æô¶¯ÏìÓ¦ÐÒ飬£¬ÁªºÏÍâ²¿ÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ죬£¬²¢Ç¿µ÷¡°Êý¾ÝÇå¾²ÊÇÖ÷ҪʹÃü¡±¡£¡£¡£¡£¡£¡£¹«Ë¾ÏòÔ±¹¤ÌṩÃâ·ÑÐÅÓÃ¼à¿Ø¼°Éí·Ý±£»£»£»£»£»¤Ð§ÀÍ£¬£¬µ«¾Ü¾øÌ¸ÂÛÊÇ·ñÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£HuntressÇ徲ר¼ÒDray AghaÖ¸³ö£¬£¬ºÚ¿Í¡°É¾³ýÊý¾Ý¡±µÄÔÊÐíͨ³£ÊÇÀÕË÷̸ÅÐÍê³ÉµÄ±ê¼Ç£¬£¬µ«²»¿ÉÐÅ£¬£¬Êý¾Ý¸±±¾¿ÉÄܱ»±£´æ¡¢¹²Ïí»ò³öÊÛ£¬£¬ÎÞ·¨Í¨¹ýÊÖÒÕÊÖ¶ÎÑéÖ¤³¹µ×ɾ³ý¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2026/02/25/wynn_resorts_shinyhunters/
6. UFP TechnologiesÔâÍøÂç¹¥»÷ÖÂÎļþ±»µÁ¼°ÏµÍ³ÖÐÖ¹
2ÔÂ25ÈÕ£¬£¬ÂíÈøÖîÈûÖÝÒ½ÁÆÆ÷ÐµÖÆÔìÉÌUFP TechnologiesÓÚ2026Äê2ÔÂ14ÈÕ¼ì²âµ½ITϵͳÈëÇÖÊÂÎñ£¬£¬ÖܶþÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-KÎļþÅû¶ϸ½Ú¡£¡£¡£¡£¡£¡£×÷ΪרעÓÚÒ½ÁÆÆ÷е¡¢ÎÞ¾ú°ü×°¼°Ò½ÁƱ£½¡×é¼þµÄÌõÔ¼ÖÆÔìÉÌ£¬£¬¸Ã¹«Ë¾´Ë´ÎÊÂÎñÉæ¼°Îļþ±»µÁ¡¢²¿·ÖITϵͳÖÐÖ¹£¬£¬²¢Ó°Ïì¼Æ·Ñ¼°¿Í»§ËÍ»õ±êÇ©ÌìÉúϵͳ¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÎļþ£¬£¬µ«Ïêϸй¶ÐÅÏ¢ÀàÐͼ°ÊÇ·ñ°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ÈÔÔÚÈ·ÈÏÖС£¡£¡£¡£¡£¡£UFPÇ¿µ÷£¬£¬¹«Ë¾ÒÑÆô¶¯Ó¦¼±Ô¤°¸²¢ÒÀÍÐÊý¾Ý±¸·Ýϵͳ£¬£¬×ÔÊÂÎñ·¢Ã÷ÒÔÀ´£¬£¬ÔËÓªÔÚËùÓÐʵÖÊÐÔ·½Ãæ¾ùÒѻָ´£¬£¬ÇÒÔ¤¼Æ´ó²¿·Ö¿ØÖÆÓëÊÓ²ìÓöȽ«Óɰü¹Ü¼ç¸º£¬£¬Î´¶Ô²ÆÎñÔì³ÉʵÖÊÐÔÓ°Ïì¡£¡£¡£¡£¡£¡£Ö»¹ÜÊÂÎñÌØÕ÷ÇкÏÀÕË÷Èí¼þ¹¥»÷ģʽ£¨Êý¾ÝÇÔÈ¡ÓëÎļþ¼ÓÃܶñÒâÈí¼þ°²ÅÅ£©£¬£¬µ«×èÖ¹ÏÖÔÚÉÐÎÞÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬´Ë´ÎÊÂÎñδµ¼Öºã¾ÃÔËÓªÖÐÖ¹£¬£¬Ó¦¼±²½·¥ÓÐÓðü¹ÜÁËÓªÒµÒ»Á¬ÐÔ¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/medical-device-maker-ufp-technologies-hit-by-cyberattack/


¾©¹«Íø°²±¸11010802024551ºÅ