AflacÅû¶ÃÀ¹úÍøÂç¿ÉÒɻµ¼ÖÂÐÅϢй¶

Ðû²¼Ê±¼ä 2025-06-24

1. AflacÅû¶ÃÀ¹úÍøÂç¿ÉÒɻµ¼ÖÂÐÅϢй¶


6ÔÂ21ÈÕ£¬£¬ £¬ÃÀ¹ú°ü¹Ü¹«Ë¾AflacÅû¶£¬£¬ £¬ÆäÃÀ¹úÍøÂç¼ì²âµ½¿ÉÒɻ£¬£¬ £¬¿ÉÄܵ¼ÖÂÉç»á°ü¹ÜºÅÂë¼°ÆäËûСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´ËÊÂÎñÊÇÕë¶Ô°ü¹ÜÐÐÒµµÄÍøÂç·¸·¨»î¶¯µÄÒ»²¿·Ö£¬£¬ £¬²¢ÒÑÓÚÖÜÎåÉùÃ÷ÈëÇÖÔÚÊýСʱÄÚ±»ÀÖ³É×èÖ¹¡£¡£¡£¡£¡£¡£¡£AflacÔÚͨ¸æÖÐÇ¿µ÷£¬£¬ £¬ÔÚÏìÓ¦ÊÂÎñµÄͬʱһÁ¬Ð§ÀͿͻ§£¬£¬ £¬±£µ¥³Ð±£¡¢ÀíÅâÉóºË¼°ÆäËûͨÀýÓªÒµ¾ùÕý³£ÔË×÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÊÂÎñÉó²é´¦ÓÚ³õÆÚ½×¶Î£¬£¬ £¬ÊÜÓ°Ïì×ÜÈËÊýÉÐδȷ¶¨¡£¡£¡£¡£¡£¡£¡£¾­ÊӲ죬£¬ £¬¿ÉÄÜÉæ¼°µÄÎļþ°üÀ¨ÃÀ¹úµØÇø¿Í»§¡¢ÊÜÒæÈË¡¢Ô±¹¤¡¢ÊðÀíÈ˵ÈȺÌåµÄÀíÅâÐÅÏ¢¡¢¿µ½¡Êý¾Ý¡¢Éç»á°ü¹ÜºÅÂë¼°ÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎÊÂÎñ£¬£¬ £¬AflacÐû²¼½«ÏòÖµç¿Í·þÖÐÐĵÄÊÜÓ°ÏìÈËȺÌṩ24¸öÔÂÃâ·ÑÐÅÓÃ¼à¿Ø¡¢Éí·Ý͵ÇÔ·À»¤¼°Ò½ÁƶÜÅÆÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/aflac-finds-suspicious-activity-on-us-network-that-may-impact-social-security-numbers-other-data/


2. ¶íÂÞ˹¶¯Îï²úÆ·ÈÏ֤ϵͳÔâÍøÂç¹¥»÷£¬£¬ £¬Ö¹©Ó¦Á´ÖÐÖ¹


6ÔÂ20ÈÕ£¬£¬ £¬¶íÂÞ˹¶¯Îï²úÆ·Êý×ÖÈÏ֤ϵͳMercuryƽ̨±¾ÖܳõÔâÍøÂç¹¥»÷̱»¾£¬£¬ £¬ÕâÊǽñÄêµÚÈý´ÎͬÀàÊÂÎñÇÒ×îΪÑÏÖØ¡£¡£¡£¡£¡£¡£¡£ÏµÍ³Ì±»¾ÆÈʹÉú²úÉ̺͹©Ó¦ÉÌÖØÐÂÆôÓÃÖ½ÖÊÊÞÒ½Ö¤Ê飬£¬ £¬µ«Òò´ó¶¼ÁãÊÛÉÌÒÀÀµ×¨Êôµç×ÓÎĵµÖÎÀíϵͳ£¬£¬ £¬ÎÞ·¨ÎüÊÕÖ½ÖÊÆ¾Ö¤£¬£¬ £¬µ¼ÖÂÎïÁ÷ÔÓÂÒ£¬£¬ £¬¶à¼ÒµØÇø·ÖÏúÖÐÐľܾøÎüÊÕ»õÎ£¬ £¬´óÐÍÁãÊÛÉÌLenta¡¢Yandex LavkaºÍMiratorg¾ùÔâÓö¹©Ó¦Á´ÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¶íÂÞ˹ִ·¨£¬£¬ £¬Éæ¼°ÈâÀà¡¢ÈéÖÆÆ·µÈ¶¯Îï²úÆ·µÄÆóÒµ±ØÐèÔÚMercuryϵͳע²á²¢Ç©·¢µç×ÓÊÞÒ½Îļþ£¬£¬ £¬È±ÉÙÈÏÖ¤¼Ó¹¤³§²»µÃÎüÊÕÖÊÁÏÄÌ¡£¡£¡£¡£¡£¡£¡£ÈéҵͬÃËЭ»áÖ¸³ö²¿·ÖÁãÊÛÉܾ̾øÎüÊÕÎÞµç×ÓÎļþµÄ²úÆ·£¬£¬ £¬ÇÒî¿Ïµ»ú¹¹Ö¸ÒýÄ£ºýÒý·¢¹©Ó¦ÉÌÔÓÂÒ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹ÊÕÏ»¹ÖÐÖ¹ÁËÓëÆäËûÕþ¸®Êý×ÖÆ½Ì¨µÄÊý¾Ý½»Á÷£¬£¬ £¬´ó¹æÄ£Éú²úÆóÒµÊÜÓ°ÏìÓÈΪÑÏÖØ£¬£¬ £¬ÐÐÒµ´ú±í³ÆÏÖÓÐÓ¦¼±Ô¤°¸ÎÞ·¨Ó¦¶Ôºã¾ÃÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ÊÞÒ½î¿Ïµ²¿·ÖÔ¤¼ÆÐÞ¸´ÊÂÇ齫һÁ¬ÖÁ±¾ÖÜÄ©£¬£¬ £¬ÏÖÔÚÉÐÎÞ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/russia-dairy-supply-disrupted-cyberattack


3. ·¿µØ²ú¹«Ë¾Ð¹Â¶Á˰üÀ¨17ÍòÌõÃ÷ÎÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÄÊý¾Ý¿â


6ÔÂ20ÈÕ£¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÎÞÒâ·¢Ã÷ÁËÒ»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£» £»¤µÄÊý¾Ý¿â£¬£¬ £¬¸ÃÊý¾Ý¿â¿ÉÄÜÊôÓÚÒ»¼Ò·¿µØ²úÖÎÀíºÍͶ×ʹ«Ë¾¡£¡£¡£¡£¡£¡£¡£¾ÝÍÆ²â£¬£¬ £¬Êý¾Ý¿âËùÊô¹«Ë¾ÎªÎ»ÓÚ¼ÓÀû¸£ÄáÑÇÖÝ¡¢×¨ÃÅ´¦Öóͷ£ÃÀ¹ú¸÷µØ·¿µØ¹¤ÓªÒµµÄIncome Property Investments£¬£¬ £¬µ«FowlerÎÞ·¨ÅжÏÎļþÊÇÓɸù«Ë¾ÕվɵÚÈý·½ÖÎÀí¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â¹æÄ£Öش󣬣¬ £¬¸ß´ï116.24GB£¬£¬ £¬°üÀ¨Ô¼170,000Ìõ¼Í¼£¬£¬ £¬ÇÒÈκÎÈ˶¼¿ÉÒÔʹÓᣡ£¡£¡£¡£¡£¡£Ì»Â¶µÄÊý¾ÝÖÖÀà·±¶à£¬£¬ £¬º­¸ÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÄÚ²¿Îļþ¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬ £¬Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢°üÀ¨Ãû×Ö¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÎïÀíµØµã¡¢µç×ÓÓʼþµØµãµÈ£»£» £»Óë¾ÍÒµÏà¹ØµÄÎļþÈçѵ³â¡¢¿ª³ý»ò¸æÍ˼ͼҲ°üÀ¨ÔÚÄÚ£»£» £»ÄÚ²¿ÎļþÔòÉæ¼°ÖÎÀí¡¢Çå¾²¡¢ÊÂÎñ±¨¸æ¡¢¾¯·½±¨¸æ¡¢Î¬»¤¡¢±¨ÏúµÈ¶à¸ö·½Ãæ¡£¡£¡£¡£¡£¡£¡£FowlerÔÚÊý¾ÝÑù±¾Öз¢Ã÷ÁËÏêϸ¼Í¼Æû³µÂùÝÔ±¹¤PIIµÄµç×Ó±í¸ñ£¬£¬ £¬ÇÒÕâЩÐÅÏ¢ËùÓÐÒÔ´¿Îı¾ÐÎʽ·ºÆð£¬£¬ £¬Î´¾ÙÐмÓÃÜ´¦Öóͷ£¡£¡£¡£¡£¡£¡£¡£ÔÚ·¢Ã÷´ËÎÊÌâºó£¬£¬ £¬Ïà¹ØÖ°Ô±ÏòIncome Property Investments·¢ËÍÁËÈÏÕæÈεÄÅû¶֪ͨ£¬£¬ £¬µ±Ìì¸ÃÊý¾Ý¿â¾Í±»ÏÞÖÆ»á¼û£¬£¬ £¬ÒÔ±ÜÃâ½øÒ»²½µÄÐÅϢй¶Σº¦¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/massive-170k-database-exposed/


4. Âõ¿­Â×Ò½ÁƱ£½¡ÔâINCÀÕË÷¹¥»÷ÖÂ74.3Íò»¼ÕßÊý¾Ýй¶


6ÔÂ23ÈÕ£¬£¬ £¬Âõ¿­Â×Ò½ÁƱ£½¡¹«Ë¾ÖÒÑÔ743,000Ãû»¼Õߣ¬£¬ £¬ÆäÒ½ÁÆÏµÍ³Òò2024Äê7ÔÂÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷¶øÔâÊÜÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÓÚ2024Äê8ÔÂ5ÈÕ±»·¢Ã÷£¬£¬ £¬µ«È·¶¨ÊÜÓ°ÏìÖ°Ô±µÄ·¨Ò½ÊÓ²ìÖ±ÖÁ2025Äê5ÔÂ5ÈÕ²ÅÍê³É£¬£¬ £¬²¢ÓÚÉÏÖÜÎå×îÏÈÐû²¼Í¨Öª¡£¡£¡£¡£¡£¡£¡£2024Äê8Ô³õ£¬£¬ £¬¸ÃÒ½ÁÆ»ú¹¹ÔâÓöITºÍµç»°ÏµÍ³ÖÐÖ¹£¬£¬ £¬¾­ÊӲ췢Ã÷»¼ÕßÊý¾Ý¿âÊÜÓ°Ï죬£¬ £¬»¼ÕßǰÍùҽԺʱ±»ÒªÇóЯ´øÔ¤Ô¼ºÍÓÃÒ©ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÂõ¿­Â×δÏêϸ˵Ã÷¹¥»÷ÕßÉí·Ý£¬£¬ £¬µ«ÓÐÔ±¹¤ÔÚÍøÉÏÐû²¼ÁËINCµÄÀÕË÷ÐÅ£¬£¬ £¬ÕâЩÀÕË÷ÐÅ»á×Ô¶¯ÔÚÒ½Ôº´òÓ¡»úÉÏ´òÓ¡¡£¡£¡£¡£¡£¡£¡£ÔÚ·¢Ë͸øÊÜÓ°ÏìСÎÒ˽¼ÒµÄ֪ͨÖУ¬£¬ £¬Âõ¿­Â×ÈÏ¿ÉÊÂÎñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬µ«ÈÔδÌá¼°INC¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÈ·¶¨£¬£¬ £¬¹¥»÷ÕßÔÚ2024Äê7ÔÂ17ÈÕÖÁ8ÔÂ3ÈÕʱ´ú¿É»á¼ûMcLarenºÍKarmanosµÄϵͳ¡£¡£¡£¡£¡£¡£¡£Âõ¿­Â×Ìá½»¸øÃÀ¹úÕþ¸®µÄÊý¾Ýй¶֪ͨÑù±¾ÏÔʾ£¬£¬ £¬Ð¹Â¶µÄÈ«ÃûÐÅÏ¢Òѱ»É¾³ý£¬£¬ £¬µ«ÆäËûÀàÐÍÊý¾Ý±»»ñÈ¡£¬£¬ £¬×ÜÌåй¶¹æÄ£Éв»Ã÷È·¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÂõ¿­Â×½üÄêÀ´ÔâÓöµÄµÚ¶þÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬ÉÏÒ»´Î±¬·¢ÔÚ2023Äê7Ô£¬£¬ £¬ÓÉALPHV/BlackCatÀÕË÷Èí¼þ×éÖ¯Ìᳫ£¬£¬ £¬ÍøÂç·¸·¨·Ö×ÓÇÔÈ¡ÁË220ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ý¡¢Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍÉç»áÇå¾²ºÅÂ룬£¬ £¬²¢ÓÚ2023Äê10Ô½«Êý¾ÝÑù±¾ÔÚÍøÉÏй¶£¬£¬ £¬ÆÈʹÂõ¿­Â×Ö§¸¶Î´¹ûÕæµÄÊê½ð½ð¶î¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mclaren-health-care-says-data-breach-impacts-743-000-patients/


5. ÃÀÍøÂçÇå¾²¹«Ë¾³ÆCyber FattahÐ¹Â¶É³ÌØÔ˶¯»áÃô¸ÐÊý¾Ý


6ÔÂ23ÈÕ£¬£¬ £¬¾ÝÃÀ¹úÍøÂçÇå¾²¹«Ë¾Resecurity³Æ£¬£¬ £¬ÓëCyber FattahÔ˶¯ÓйصÄÍþвÐÐΪÕßй¶ÁËÊýǧÌõÓëÍù½ìÉ³ÌØÔ˶¯»áÏà¹ØµÄ¼Í¼¡£¡£¡£¡£¡£¡£¡£ÕâЩ±»µÁÊý¾ÝÒÔSQLת´¢ÐÎʽй¶£¬£¬ £¬¹¥»÷Õßͨ¹ýδ¾­ÊÚȨ»á¼ûphpMyAdminÇÔÈ¡ÁË´æ´¢µÄ¼Í¼¡£¡£¡£¡£¡£¡£¡£Resecurity½«´Ë´ÎÊÂÎñ½â¶ÁΪÒÁÀʼ°ÆäÊðÀíÈË¿ªÕ¹µÄÒ»Ïî¸üÆÕ±éÐÅÏ¢Ðж¯µÄÒ»²¿·Ö£¬£¬ £¬Ö¼ÔÚÖÆÔì²»Çå¾²¸Ð²¢ÆÆËðµØÇøÇå¾²¡£¡£¡£¡£¡£¡£¡£¼øÓÚÒÔÉ«ÁÐÓëÒÁÀÊÖ÷Òª¹ØÏµ¼Ó¾ç£¬£¬ £¬ÍþвÐÐΪÕßÊÔͼʹÓÃÉ³ÌØ°¢À­²®Íõ¹úºÍÃÀ¹úÔÚµØÇø¹ØÏµºÍÇå¾²ÖеÄÖ÷Òª×÷Ó㬣¬ £¬ÒÁÀ­¿Ë¾³ÄÚһЩÓëÕæÖ÷µ³¡¢¹þÂí˹ºÍÇ×ÒÁÀʵÄ×é֯ҲʹÓøÃÊÂÎñ¾ÙÐÐÓÐÕë¶ÔÐÔµÄÐû´«»î¶¯£¬£¬ £¬½øÒ»²½·Å´óÁËÊÂÎñÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄÜÀ´×ÔÓë2024ÄêÉ³ÌØÔ˶¯»á¹Ù·½ÍøÕ¾Ïà¹ØµÄÊý¾Ý¿â£¬£¬ £¬·Ã¿Í¡¢ÔË·¢¶¯¼°ÆäÍŶӿÉÔÚ¸ÃÍøÕ¾×¢²á²¢·ÖÏíСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÔÆÔƹæÄ£µÄÐ¹Â¶Éæ¼°´ó×ÚÃô¸ÐÊý¾Ý£¬£¬ £¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡¢¹ú¼ÊÒøÐÐÕ˺ÅÒÔ¼°Ìå¼ì֤ʵµÈ¡£¡£¡£¡£¡£¡£¡£´óÐÍÌåÓýÈüÊÂÔâºÚ¿Í¹¥»÷ÒâÒåÖØ´ó£¬£¬ £¬¿ÉÄܶÔÍøÂçÇå¾²¡¢ÌåÓý³ÏÐÅÒÔ¼°È«Çò¹ÛÖڵȶà¸öÁìÓò±¬·¢ÆÕ±éÓ°Ïì¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/179239/cyber-warfare-2/iran-linked-threat-actors-cyber-fattah-leak-visitors-and-athletes-data-from-saudi-games.html


6. APT28ºÚ¿ÍÀûʹÓÃSignal¶ÔÎÚ¿ËÀ¼ÌᳫеĶñÒâÈí¼þ¹¥»÷


6ÔÂ23ÈÕ£¬£¬ £¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄAPT28Íþв×éÖ¯ÕýʹÓÃSignal̸ÌìÓ¦Óù¥»÷ÎÚ¿ËÀ¼Õþ¸®Ä¿µÄ£¬£¬ £¬Ê¹ÓÃÁËÁ½¸ö´Ëǰδ¼Í¼µÄ¶ñÒâÈí¼þ¼Ò×åBeardShellºÍSlimAgent¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²¢·ÇSignalƽ̨×Ô¼ºµÄÇå¾²ÎÊÌ⣬£¬ £¬¶øÊÇÍþвÐÐΪÕßʹÓÃ¸ÃÆ½Ì¨¾ÙÐÐÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£¡£¡£2024Äê3Ô£¬£¬ £¬ÎÚ¿ËÀ¼ÅÌËã»úºÍÓ¦¼±ÏìÓ¦²¿·Ö£¨CERT-UA£©Ê״η¢Ã÷ÕâЩ¹¥»÷£¬£¬ £¬µ«ÆäʱδÅû¶ѬȾǰÑÔϸ½Ú¡£¡£¡£¡£¡£¡£¡£2025Äê5Ô£¬£¬ £¬ÒòÓÐÈËδ¾­ÊÚȨ»á¼ûgov.uaµç×ÓÓʼþÕÊ»§Òý·¢ÐÂÊӲ죬£¬ £¬CERT-UA·¢Ã÷ͨ¹ýSignal·¢Ë͵ÄÐÂÎű»ÓÃÓÚת´ï¶ñÒâÎĵµ£¬£¬ £¬¸ÃÎĵµÊ¹Óúê¼ÓÔØCovenantÄÚ´æ×¤ÁôºóÃÅ¡£¡£¡£¡£¡£¡£¡£Covenant×÷Ϊ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬ £¬ÏÂÔØDLLºÍ°üÀ¨shellcodeµÄWAVÎļþÒÔ¼ÓÔØBeardShell¡£¡£¡£¡£¡£¡£¡£BeardShellÖ÷Òª¹¦Ð§ÊÇÏÂÔØ²¢Ö´ÐÐPowerShell¾ç±¾£¬£¬ £¬Ð§¹ûй¶µ½C2ЧÀÍÆ÷²¢Í¨¹ýIcedrive APIͨѶ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬ÔÚ2024ÄêµÄ¹¥»÷ÖУ¬£¬ £¬CERT-UA»¹·¢Ã÷ÁËÃûΪSlimAgentµÄÆÁÄ»½ØÍ¼×¥È¡¹¤¾ß£¬£¬ £¬¸Ã¹¤¾ßʹÓÃһϵÁÐWindows APIº¯Êý²¶»ñÆÁÄ»½ØÍ¼£¬£¬ £¬²¢Ê¹ÓÃAESºÍRSA¼ÓÃÜ´æ´¢ÔÚÍâµØ¡£¡£¡£¡£¡£¡£¡£CERT-UA½«´Ë»î¶¯¹é×ïÓÚAPT28£¬£¬ £¬²¢½¨ÒéDZÔÚÄ¿µÄ¼à¿ØÏà¹ØÍøÂç½»»¥¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/