ZestixÍþвÐÐΪÕßͨ¹ýÇÔȡƾ֤ÈëÇÖÆóÒµÔÆÆ½Ì¨

Ðû²¼Ê±¼ä 2026-01-06

1. ZestixÍþвÐÐΪÕßͨ¹ýÇÔȡƾ֤ÈëÇÖÆóÒµÔÆÆ½Ì¨


1ÔÂ5ÈÕ£¬£¬ £¬£¬£¬£¬£¬½üÆÚ£¬£¬ £¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Hudson RockÅû¶£¬£¬ £¬£¬£¬£¬£¬ÃûΪZestixµÄÍþвÐÐΪÕßÕýÔÚµØÏÂÂÛ̳¶µÊÛ´ÓÊýÊ®¼Ò¹«Ë¾ÇÔÈ¡µÄÆóÒµÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬Éæ¼°º½¿Õ¡¢¹ú·À¡¢Ò½ÁÆ¡¢¹«ÓÃÊÂÒµ¡¢µçÐÅ¡¢Õþ¸®µÈ¶à¸öÒªº¦ÐÐÒµ¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÒÉËÆÍ¨¹ýÈëÇÖÆóÒµÔÆÆ½Ì¨ÈçShareFile¡¢NextcloudºÍOwnCloud»ñÈ¡£¡£¡£¡£¡£¬£¬ £¬£¬£¬£¬£¬¶ø³õʼ»á¼ûȨÏÞ¿ÉÄÜÔ´ÓÚÔ±¹¤×°±¸°²ÅŵÄRedLine¡¢LummaºÍVidarµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍøÂçµÄƾ֤¡£¡£¡£¡£¡£´ËÀà¶ñÒâÈí¼þ³£Í¨¹ý¶ñÒâ¹ã¸æ»òClickFix¹¥»÷Èö²¥£¬£¬ £¬£¬£¬£¬£¬×¨ÃÅÇÔÈ¡ä¯ÀÀÆ÷ƾ֤¡¢ÐÅÓÿ¨ÐÅÏ¢¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¼°¼´Ê±Í¨Ñ¶Ó¦ÓÃÄÚÈÝ¡£¡£¡£¡£¡£Hudson RockÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬ÈôÆóҵδÆôÓöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÓÐÓÃÆ¾Ö¤Ö±½ÓµÇ¼Îļþ¹²ÏíЧÀÍ¡£¡£¡£¡£¡£ÆÊÎö·¢Ã÷£¬£¬ £¬£¬£¬£¬£¬²¿·Ö±»µÁƾ֤ÔÚ·¸·¨Êý¾Ý¿âÖб£´æ¶àÄ꣬£¬ £¬£¬£¬£¬£¬ÆóÒµºã¾ÃδÂÖ»»Æ¾Ö¤»òʹ»î¶¯»á»°Ê§Ð§£¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÒ»Á¬Ì»Â¶Î£º¦¡£¡£¡£¡£¡£Zestix×÷Ϊ³õʼ»á¼ûÊðÀí£¨IAB£©£¬£¬ £¬£¬£¬£¬£¬³öÊ۵ı»µÁÊý¾ÝÁ¿´Ó¼¸Ê®GBµ½ÊýTB²»µÈ£¬£¬ £¬£¬£¬£¬£¬º­¸Ç·É»úά»¤Êֲᡢ¹ú·À¹¤³ÌÎļþ¡¢¿Í»§Êý¾Ý¿â¡¢¿µ½¡¼Í¼¡¢¹«¹²½»Í¨Ê¾Òâͼ¡¢LiDARµØÍ¼¡¢ISPÍøÂçÉèÖá¢ÎÀÐÇÏîÄ¿Êý¾Ý¡¢ERPÔ´´úÂë¼°Õþ¸®ÌõÔ¼µÈÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬¿ÉÄÜÒý·¢Çå¾²¡¢Òþ˽й¶¼°ÉÌÒµÌØ¹¤Î£º¦£¬£¬ £¬£¬£¬£¬£¬ÉõÖÁ´¥¼°¹ú¼ÒÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cloud-file-sharing-sites-targeted-for-corporate-data-theft-attacks/


2. BrightspeedÔâCrimson CollectiveÀÕË÷ÍŻ﹥»÷


1ÔÂ5ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÃÀ¹ú×î´ó¹âÏË¿í´ø¹«Ë¾Ö®Ò»Brightspeed¿ËÈÕÕýÊÓ²ìCrimson CollectiveÀÕË÷ÍÅ»ïÌá³öµÄÇå¾²Îó²î¼°Êý¾Ý͵ÇÔÖ¸¿Ø¡£¡£¡£¡£¡£¸Ã¹«Ë¾½¨ÉèÓÚ2022Ä꣬£¬ £¬£¬£¬£¬£¬ÎªÃÀ¹ú20¸öÖݵÄÅ©´å¼°½¼ÇøÉçÇøÌṩµçÐÅÓ뻥ÁªÍøÐ§ÀÍ¡£¡£¡£¡£¡£Crimson CollectiveÔÚTelegramƵµÀÐû³Æ£¬£¬ £¬£¬£¬£¬£¬ÒÑÇÔÈ¡³¬100ÍòBrightspeed¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡¢µØµã¡¢ÕË»§ÏêÇ飨º¬ÐÕÃû¡¢ÓÊÏä¡¢µç»°£©¡¢Ö§¸¶ÀúÊ·¡¢²¿·ÖÖ§¸¶¿¨Êý¾Ý¼°º¬PIIµÄÔ¤Ô¼/¶©µ¥¼Í¼£¬£¬ £¬£¬£¬£¬£¬²¢Íþв½«¹ûÕæÑù±¾ÒÔʩѹ¡£¡£¡£¡£¡£Brightspeed»ØÓ¦³Æ¡°¸ß¶ÈÖØÊÓÍøÂçÇå¾²¼°¿Í»§ÐÅÏ¢±£»£»£»£»£»£»¤£¬£¬ £¬£¬£¬£¬£¬ÒÑÆô¶¯ÊӲ죬£¬ £¬£¬£¬£¬£¬ºóÐø½«Ïò¿Í»§¡¢Ô±¹¤¼°î¿Ïµ²¿·Öת´ïÏ£Íû¡±¡£¡£¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬ £¬£¬£¬£¬£¬Crimson CollectiveµÄ¹¥»÷ÊÖ·¨·ºÆðϵͳÐÔÌØÕ÷£ºÍ¨¹ýÇÔȡƾ֤¡¢Ê¹ÓÃÔÆÐ§ÀÍÉèÖÃÎó²î£¨ÈçδÆôÓöàÒòËØÈÏÖ¤£©¼°¶ñÒâÈí¼þÈö²¥£¨ÈçRedLine¡¢Lumma£©»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬£¬½ø¶øºáÏòÉøÍ¸ÆóÒµ½¹µãϵͳ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-broadband-provider-brightspeed-investigates-breach-claims/


3. Sedgwick֤ʵÆäÕþ¸®×Ó¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷


1ÔÂ5ÈÕ£¬£¬ £¬£¬£¬£¬£¬µÚÈý·½Ë÷ÅâºÍ¸£ÀûÖÎÀí»ú¹¹Sedgwick¿ËÈÕ֤ʵ£¬£¬ £¬£¬£¬£¬£¬Æä×Ó¹«Ë¾Sedgwick Government SolutionsÔâÓöÍøÂç¹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÃÀ¹úÕþ¸®»ú¹¹£¨°üÀ¨ÁìÍÁÇå¾²²¿¡¢ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£©¼°ÌìÏÂÊÐÕþÕþ¸®ÌṩË÷ÅâºÍΣº¦ÖÎÀíЧÀÍ¡£¡£¡£¡£¡£¾ÝSedgwick½²»°ÈËÉùÃ÷£¬£¬ £¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ºó£¬£¬ £¬£¬£¬£¬£¬¹«Ë¾Á¬Ã¦Æô¶¯ÊÂÎñÏìӦЭÒ飬£¬ £¬£¬£¬£¬£¬²¢ÓëÍøÂçÇ徲ר¼ÒÏàÖúÕö¿ªÊӲ졣¡£¡£¡£¡£¾­ÆðÔ´ÆÀ¹À£¬£¬ £¬£¬£¬£¬£¬¹¥»÷½öÓ°ÏìÁËÒ»¸öÁæØêµÄÎļþ´«Êäϵͳ£¬£¬ £¬£¬£¬£¬£¬Î´²¨¼°Sedgwick×ÔÉíÍøÂç»òÆä×Ó¹«Ë¾µÄÆäËûϵͳ£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Òªº¦µÄË÷ÅâÖÎÀíЧÀÍÆ÷¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬ £¬£¬£¬£¬£¬Sedgwick Government SolutionsÓªÒµÓëÆäËûÓªÒµÍêÈ«ÊèÉ¢£¬£¬ £¬£¬£¬£¬£¬ÆäËûϵͳ»òÊý¾Ý¾ùδÊÜÓ°Ï죬£¬ £¬£¬£¬£¬£¬ÇÒЧÀÍÄÜÁ¦Î´ÊÜ×ÌÈÅ£¬£¬ £¬£¬£¬£¬£¬ÒÑִ֪ͨ·¨²¿·Ö²¢Ò»Á¬Óë¿Í»§¼á³ÖÏàͬ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉTridentLockerÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÊµÑé¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚÐÂÄêÒ¹Éù³Æ´ÓSedgwick Government SolutionsÇÔȡԼ3.4GBÊý¾Ý²¢¹«Ö®ÓÚÖÚ¡£¡£¡£¡£¡£


https://www.securityweek.com/sedgwick-confirms-cyberattack-on-government-subsidiary/


4. Ledger¿Í»§Êý¾ÝÒòGlobal-eϵͳÔâÈëÇÖй¶


1ÔÂ5ÈÕ£¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬Çø¿éÁ´¹«Ë¾LedgerÏò²¿·Ö¿Í»§·¢³ö֪ͨ£¬£¬ £¬£¬£¬£¬£¬³ÆÆäµÚÈý·½Ö§¸¶´¦Öóͷ£ÉÌGlobal-eµÄϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£¡£¡£LedgerÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬Æä×ÔÉíÍøÂçδÊÜÓ°Ï죬£¬ £¬£¬£¬£¬£¬Ó²¼þÓëÈí¼þϵͳÈÔ¼á³ÖÇå¾²¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÉæ¼°ÔÚLedger.comʹÓÃGlobal-eÍê³É¹ºÖõĿͻ§£¬£¬ £¬£¬£¬£¬£¬Ïêϸ°üÀ¨ÐÕÃû¡¢ÁªÏµÐÅÏ¢µÈ¶©µ¥Êý¾Ý£¬£¬ £¬£¬£¬£¬£¬µ«Ã÷ȷɨ³ýÖ§¸¶ÐÅÏ¢¡¢²ÆÎñÊý¾Ý¡¢¼ÓÃÜÇ®°üÖú¼Ç´Ê¡¢Çø¿éÁ´Óà¶î¼°Êý×Ö×ʲúÏà¹ØÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£Global-e×÷Ϊ¶à¼Ò¹ú¼ÊÆ·ÅÆµÄÖ§¸¶Ð§ÀÍÉÌ£¬£¬ £¬£¬£¬£¬£¬ÆäЧÀͺ­¸Ç½áÕË¡¢¶©µ¥´¦Öóͷ£¡¢Ë°ÎñºÏ¹æµÈ»·½Ú£¬£¬ £¬£¬£¬£¬£¬Ðè´æ´¢¿Í»§¶©µ¥Êý¾Ý¡£¡£¡£¡£¡£¸Ã¹«Ë¾¿Í»§°üÀ¨Bang&Olufsen¡¢adidas¡¢DisneyµÈ×ÅÃûÆ·ÅÆ¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬ £¬£¬£¬£¬£¬Global-eѸËÙ¸ôÀëÊÜÓ°Ïìϵͳ²¢Æô¶¯·À»¤²½·¥£¬£¬ £¬£¬£¬£¬£¬ÏÖÔÚÕýÖ±½Ó֪ͨ¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼°î¿Ïµ»ú¹¹¡£¡£¡£¡£¡£Global-eÓëLedger¾ùÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õßδ»ñÈ¡ÈκÎÖ§¸¶Æ¾Ö¤»òÕË»§ÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬µ«¿ÉÄÜͨ¹ýй¶µÄÁªÏµ·½·¨Ìᳫ´¹ÂÚ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÊÔͼÇÔÈ¡Óû§ÃÜÂë»òÖú¼Ç´Ê¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/


5. NordVPN·ñ¶¨Êý¾Ýй¶ָ¿Ø£¬£¬ £¬£¬£¬£¬£¬³Æ¹¥»÷ÕßÓµÓÐÐéÄâÊý¾Ý


1ÔÂ5ÈÕ£¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬NordVPNÕë¶ÔÍøÂç·¸·¨·Ö×ÓÉù³ÆÆäÄÚ²¿Salesforce¿ª·¢Ð§ÀÍÆ÷ÔâÈëÇÖÒ»ÊÂ×÷³ö»ØÓ¦£¬£¬ £¬£¬£¬£¬£¬Ã÷È··ñ¶¨Ö¸¿Ø²¢³ÎÇåÊÂÎñÕæÏà¡£¡£¡£¡£¡£´Ëǰ£¬£¬ £¬£¬£¬£¬£¬ÍþвÐÐΪÕß¡°1011¡±ÔÚºÚ¿ÍÂÛ̳Ðû³Æ£¬£¬ £¬£¬£¬£¬£¬Í¨¹ý±©Á¦ÆÆ½âNordVPN¿ª·¢Ð§ÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨Salesforce APIÃÜÔ¿¡¢JiraÁîÅÆµÈÃô¸ÐÐÅÏ¢µÄ10Óà¸öÊý¾Ý¿â¡£¡£¡£¡£¡£¶Ô´Ë£¬£¬ £¬£¬£¬£¬£¬NordVPNÚ¹Êͳƣ¬£¬ £¬£¬£¬£¬£¬Ëùν¡°Ð¹Â¶Êý¾Ý¡±ÊµÎª¼¸¸öÔÂǰ¶ÔDZÔÚ×Ô¶¯»¯²âÊÔ¹©Ó¦É̾ÙÐÐÊÔÓòâÊÔʱ£¬£¬ £¬£¬£¬£¬£¬´ÓÔÝʱ²âÊÔÇéÐÎÖÐÇÔÈ¡µÄ²âÊÔÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬¸ÃÇéÐÎÓëÆä×ÔÉí»ù´¡ÉèÊ©ÎÞÈκιØÁª¡£¡£¡£¡£¡£NordVPNÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬²âÊÔÇéÐνö°üÀ¨ÓÃÓÚ¹¦Ð§¼ì²éµÄÐéÄâÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬´ÓδÉÏ´«ÕæÊµ¿Í»§Êý¾Ý¡¢Éú²úÔ´´úÂë»òÓÐÓÃÃô¸Ðƾ֤¡£¡£¡£¡£¡£ÓÉÓÚ²âÊÔ½öΪÆðÔ´ÆÀ¹ÀÇÒδǩÊðÌõÔ¼£¬£¬ £¬£¬£¬£¬£¬¸ÃÇéÐδÓδÓëÉú²úϽµµÍ¬½Ó£¬£¬ £¬£¬£¬£¬£¬×îÖÕҲδѡÔñ¸Ã¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¹«Ë¾ÒÑÁªÏµÉæÊ¹©Ó¦É̽øÒ»²½ºËÕæÏàÐΡ£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/


6. Å·ÖÞÂùÝÒµÔâ¶íÍøÂç·¸·¨·Ö×Ó¶ñÒâÈí¼þ¹¥»÷


1ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬ÒÉËÆ¶íÂÞË¹ÍøÂç·¸·¨·Ö×ÓÕë¶ÔÅ·ÖÞÂùݡ¢Âùݼ°¿ÍÕ»Ìᳫ¶ñÒâÈí¼þ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬Í¨¹ýαÔì¡°À¶ÆÁËÀ»ú¡±Ò³ÃæÓÕµ¼Êܺ¦ÕßÏÂÔØDCRat¶ñÒâÈí¼þ¡£¡£¡£¡£¡£SecuronixÑо¿Ö°Ô±×·×Ùµ½ÃûΪPHALT#BLYXµÄÒ»Á¬¶ñÒâÈí¼þ»î¶¯£¬£¬ £¬£¬£¬£¬£¬ÆäÒÔÂùÝËÑË÷ÒýÇæÓÕ¶üΪÆðµã£¬£¬ £¬£¬£¬£¬£¬Í¨¹ýαÔìÈÈÃÅÔ¤¶©ÍøÕ¾µÄ¡°×÷·ÏÔ¤¶©¡±Í¨ÖªÓʼþʵÑé´¹ÂÚ¡£¡£¡£¡£¡£Êܺ¦Õßµã»÷ÓʼþÖеġ°Éó²éÏêÇ顱°´Å¥ºó£¬£¬ £¬£¬£¬£¬£¬½«±»Ö¸µ¼ÖÁÐéαÂùÝÔ¤¶©Ò³Ã棬£¬ £¬£¬£¬£¬£¬ÏÔʾ¡°¼ÓÔØÊ±¼ä¹ý³¤¡±µÄä¯ÀÀÆ÷¹ýʧ£¬£¬ £¬£¬£¬£¬£¬²¢ÌáÐѵã»÷¡°Ë¢ÐÂÒ³Ãæ¡±Ìø×ªÖÁαÔìµÄÀ¶ÆÁËÀ»ú½çÃæ¡£¡£¡£¡£¡£ÎªÍ˳ö¸ÃÒ³Ãæ£¬£¬ £¬£¬£¬£¬£¬Êܺ¦Õß±»ÓÕµ¼½«¶ñÒâ¾ç±¾Õ³ÌùÖÁWindowsÔËÐжԻ°¿ò£¬£¬ £¬£¬£¬£¬£¬´¥·¢Ò»ÏµÁвÙ×÷£º½ûÓÃWindows Defender¡¢ºǫ́ÔËÐжñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬£¬Í¬Ê±·­¿ªÕæÊµÔ¤¶©Ò³Ãæ×÷ΪÓÕ¶ü¡£¡£¡£¡£¡£DCRat¶ñÒâÈí¼þ¿É¸ú×ÙÊܺ¦Õß»÷¼ü¡¢ÇÔÈ¡ÃÜÂë¼°¼ôÌù°åÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬²¢ÏÂÔØÆäËû¹¤¾ßÒÔʵÏÖºã¾ÃÒ»Á¬»á¼û¡£¡£¡£¡£¡£SecuronixÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬¸Ã¹¥»÷ʹÓá°ClickFix¡±ÊÖÒÕ£¬£¬ £¬£¬£¬£¬£¬Í¨¹ýÐéα¹ýʧÌáÐÑʹÓÃÓû§Ö´ÐÐÏÂÁ£¬ £¬£¬£¬£¬£¬ÊôÓÚ¶ñÒâÈí¼þÈö²¥µÄÖØ´óÑݱ䡣¡£¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Óë¶íÂÞ˹±£´æ¹ØÁª£¬£¬ £¬£¬£¬£¬£¬MS BuildÏîÄ¿Îļþº¬¶íÓïµ÷ÊÔ×Ö·û´®£¬£¬ £¬£¬£¬£¬£¬»ù´¡ÉèÊ©¼°¹¤¾ßµØÀíλÖþùÖ¸Ïò¶íÂÞ˹£¬£¬ £¬£¬£¬£¬£¬ÇÒDCRatÔÚ¶íµØÏÂÂÛ̳ÆÕ±éÏúÊÛ¡£¡£¡£¡£¡£


https://therecord.media/russian-hackers-europe-hospitality-blue-screen