AflacÅû¶ÃÀ¹úÍøÂç¿ÉÒɻµ¼ÖÂÐÅϢй¶
Ðû²¼Ê±¼ä 2025-06-241. AflacÅû¶ÃÀ¹úÍøÂç¿ÉÒɻµ¼ÖÂÐÅϢй¶
6ÔÂ21ÈÕ£¬£¬£¬£¬ÃÀ¹ú°ü¹Ü¹«Ë¾AflacÅû¶£¬£¬£¬£¬ÆäÃÀ¹úÍøÂç¼ì²âµ½¿ÉÒɻ£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÉç»á°ü¹ÜºÅÂë¼°ÆäËûСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´ËÊÂÎñÊÇÕë¶Ô°ü¹ÜÐÐÒµµÄÍøÂç·¸·¨»î¶¯µÄÒ»²¿·Ö£¬£¬£¬£¬²¢ÒÑÓÚÖÜÎåÉùÃ÷ÈëÇÖÔÚÊýСʱÄÚ±»ÀÖ³É×èÖ¹¡£¡£¡£¡£¡£¡£AflacÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬£¬ÔÚÏìÓ¦ÊÂÎñµÄͬʱһÁ¬Ð§ÀͿͻ§£¬£¬£¬£¬±£µ¥³Ð±£¡¢ÀíÅâÉóºË¼°ÆäËûͨÀýÓªÒµ¾ùÕý³£ÔË×÷¡£¡£¡£¡£¡£¡£ÏÖÔÚÊÂÎñÉó²é´¦ÓÚ³õÆÚ½×¶Î£¬£¬£¬£¬ÊÜÓ°Ïì×ÜÈËÊýÉÐδȷ¶¨¡£¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬¿ÉÄÜÉæ¼°µÄÎļþ°üÀ¨ÃÀ¹úµØÇø¿Í»§¡¢ÊÜÒæÈË¡¢Ô±¹¤¡¢ÊðÀíÈ˵ÈȺÌåµÄÀíÅâÐÅÏ¢¡¢¿µ½¡Êý¾Ý¡¢Éç»á°ü¹ÜºÅÂë¼°ÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎÊÂÎñ£¬£¬£¬£¬AflacÐû²¼½«ÏòÖµç¿Í·þÖÐÐĵÄÊÜÓ°ÏìÈËȺÌṩ24¸öÔÂÃâ·ÑÐÅÓÃ¼à¿Ø¡¢Éí·Ý͵ÇÔ·À»¤¼°Ò½ÁƶÜÅÆÐ§ÀÍ¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/aflac-finds-suspicious-activity-on-us-network-that-may-impact-social-security-numbers-other-data/
2. ¶íÂÞ˹¶¯Îï²úÆ·ÈÏ֤ϵͳÔâÍøÂç¹¥»÷£¬£¬£¬£¬Ö¹©Ó¦Á´ÖÐÖ¹
6ÔÂ20ÈÕ£¬£¬£¬£¬¶íÂÞ˹¶¯Îï²úÆ·Êý×ÖÈÏ֤ϵͳMercuryƽ̨±¾ÖܳõÔâÍøÂç¹¥»÷̱»¾£¬£¬£¬£¬ÕâÊǽñÄêµÚÈý´ÎͬÀàÊÂÎñÇÒ×îΪÑÏÖØ¡£¡£¡£¡£¡£¡£ÏµÍ³Ì±»¾ÆÈʹÉú²úÉ̺͹©Ó¦ÉÌÖØÐÂÆôÓÃÖ½ÖÊÊÞÒ½Ö¤Ê飬£¬£¬£¬µ«Òò´ó¶¼ÁãÊÛÉÌÒÀÀµ×¨Êôµç×ÓÎĵµÖÎÀíϵͳ£¬£¬£¬£¬ÎÞ·¨ÎüÊÕÖ½ÖÊÆ¾Ö¤£¬£¬£¬£¬µ¼ÖÂÎïÁ÷ÔÓÂÒ£¬£¬£¬£¬¶à¼ÒµØÇø·ÖÏúÖÐÐľܾøÎüÊÕ»õÎ£¬£¬£¬´óÐÍÁãÊÛÉÌLenta¡¢Yandex LavkaºÍMiratorg¾ùÔâÓö¹©Ó¦Á´ÖÐÖ¹¡£¡£¡£¡£¡£¡£Æ¾Ö¤¶íÂÞ˹ִ·¨£¬£¬£¬£¬Éæ¼°ÈâÀà¡¢ÈéÖÆÆ·µÈ¶¯Îï²úÆ·µÄÆóÒµ±ØÐèÔÚMercuryϵͳע²á²¢Ç©·¢µç×ÓÊÞÒ½Îļþ£¬£¬£¬£¬È±ÉÙÈÏÖ¤¼Ó¹¤³§²»µÃÎüÊÕÖÊÁÏÄÌ¡£¡£¡£¡£¡£¡£ÈéҵͬÃËлáÖ¸³ö²¿·ÖÁãÊÛÉܾ̾øÎüÊÕÎÞµç×ÓÎļþµÄ²úÆ·£¬£¬£¬£¬ÇÒî¿Ïµ»ú¹¹Ö¸ÒýÄ£ºýÒý·¢¹©Ó¦ÉÌÔÓÂÒ¡£¡£¡£¡£¡£¡£´Ë´Î¹ÊÕÏ»¹ÖÐÖ¹ÁËÓëÆäËûÕþ¸®Êý×ÖÆ½Ì¨µÄÊý¾Ý½»Á÷£¬£¬£¬£¬´ó¹æÄ£Éú²úÆóÒµÊÜÓ°ÏìÓÈΪÑÏÖØ£¬£¬£¬£¬ÐÐÒµ´ú±í³ÆÏÖÓÐÓ¦¼±Ô¤°¸ÎÞ·¨Ó¦¶Ôºã¾ÃÖÐÖ¹¡£¡£¡£¡£¡£¡£ÊÞÒ½î¿Ïµ²¿·ÖÔ¤¼ÆÐÞ¸´ÊÂÇ齫һÁ¬ÖÁ±¾ÖÜÄ©£¬£¬£¬£¬ÏÖÔÚÉÐÎÞ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£
https://therecord.media/russia-dairy-supply-disrupted-cyberattack
3. ·¿µØ²ú¹«Ë¾Ð¹Â¶Á˰üÀ¨17ÍòÌõÃ÷ÎÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÄÊý¾Ý¿â
6ÔÂ20ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÎÞÒâ·¢Ã÷ÁËÒ»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬¸ÃÊý¾Ý¿â¿ÉÄÜÊôÓÚÒ»¼Ò·¿µØ²úÖÎÀíºÍͶ×ʹ«Ë¾¡£¡£¡£¡£¡£¡£¾ÝÍÆ²â£¬£¬£¬£¬Êý¾Ý¿âËùÊô¹«Ë¾ÎªÎ»ÓÚ¼ÓÀû¸£ÄáÑÇÖÝ¡¢×¨ÃÅ´¦Öóͷ£ÃÀ¹ú¸÷µØ·¿µØ¹¤ÓªÒµµÄIncome Property Investments£¬£¬£¬£¬µ«FowlerÎÞ·¨ÅжÏÎļþÊÇÓɸù«Ë¾ÕվɵÚÈý·½ÖÎÀí¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â¹æÄ£Öش󣬣¬£¬£¬¸ß´ï116.24GB£¬£¬£¬£¬°üÀ¨Ô¼170,000Ìõ¼Í¼£¬£¬£¬£¬ÇÒÈκÎÈ˶¼¿ÉÒÔʹÓᣡ£¡£¡£¡£¡£Ì»Â¶µÄÊý¾ÝÖÖÀà·±¶à£¬£¬£¬£¬º¸ÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÄÚ²¿Îļþ¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢°üÀ¨Ãû×Ö¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÎïÀíµØµã¡¢µç×ÓÓʼþµØµãµÈ£»£»£»£»Óë¾ÍÒµÏà¹ØµÄÎļþÈçѵ³â¡¢¿ª³ý»ò¸æÍ˼ͼҲ°üÀ¨ÔÚÄÚ£»£»£»£»ÄÚ²¿ÎļþÔòÉæ¼°ÖÎÀí¡¢Çå¾²¡¢ÊÂÎñ±¨¸æ¡¢¾¯·½±¨¸æ¡¢Î¬»¤¡¢±¨ÏúµÈ¶à¸ö·½Ãæ¡£¡£¡£¡£¡£¡£FowlerÔÚÊý¾ÝÑù±¾Öз¢Ã÷ÁËÏêϸ¼Í¼Æû³µÂùÝÔ±¹¤PIIµÄµç×Ó±í¸ñ£¬£¬£¬£¬ÇÒÕâЩÐÅÏ¢ËùÓÐÒÔ´¿Îı¾ÐÎʽ·ºÆð£¬£¬£¬£¬Î´¾ÙÐмÓÃÜ´¦Öóͷ£¡£¡£¡£¡£¡£¡£ÔÚ·¢Ã÷´ËÎÊÌâºó£¬£¬£¬£¬Ïà¹ØÖ°Ô±ÏòIncome Property Investments·¢ËÍÁËÈÏÕæÈεÄÅû¶֪ͨ£¬£¬£¬£¬µ±Ìì¸ÃÊý¾Ý¿â¾Í±»ÏÞÖÆ»á¼û£¬£¬£¬£¬ÒÔ±ÜÃâ½øÒ»²½µÄÐÅϢй¶Σº¦¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/massive-170k-database-exposed/
4. Âõ¿Â×Ò½ÁƱ£½¡ÔâINCÀÕË÷¹¥»÷ÖÂ74.3Íò»¼ÕßÊý¾Ýй¶
6ÔÂ23ÈÕ£¬£¬£¬£¬Âõ¿Â×Ò½ÁƱ£½¡¹«Ë¾ÖÒÑÔ743,000Ãû»¼Õߣ¬£¬£¬£¬ÆäÒ½ÁÆÏµÍ³Òò2024Äê7ÔÂÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷¶øÔâÊÜÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÓÚ2024Äê8ÔÂ5ÈÕ±»·¢Ã÷£¬£¬£¬£¬µ«È·¶¨ÊÜÓ°ÏìÖ°Ô±µÄ·¨Ò½ÊÓ²ìÖ±ÖÁ2025Äê5ÔÂ5ÈÕ²ÅÍê³É£¬£¬£¬£¬²¢ÓÚÉÏÖÜÎå×îÏÈÐû²¼Í¨Öª¡£¡£¡£¡£¡£¡£2024Äê8Ô³õ£¬£¬£¬£¬¸ÃÒ½ÁÆ»ú¹¹ÔâÓöITºÍµç»°ÏµÍ³ÖÐÖ¹£¬£¬£¬£¬¾ÊӲ췢Ã÷»¼ÕßÊý¾Ý¿âÊÜÓ°Ï죬£¬£¬£¬»¼ÕßǰÍùҽԺʱ±»ÒªÇóЯ´øÔ¤Ô¼ºÍÓÃÒ©ÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜÂõ¿Â×δÏêϸ˵Ã÷¹¥»÷ÕßÉí·Ý£¬£¬£¬£¬µ«ÓÐÔ±¹¤ÔÚÍøÉÏÐû²¼ÁËINCµÄÀÕË÷ÐÅ£¬£¬£¬£¬ÕâЩÀÕË÷ÐÅ»á×Ô¶¯ÔÚÒ½Ôº´òÓ¡»úÉÏ´òÓ¡¡£¡£¡£¡£¡£¡£ÔÚ·¢Ë͸øÊÜÓ°ÏìСÎÒ˽¼ÒµÄ֪ͨÖУ¬£¬£¬£¬Âõ¿Â×ÈÏ¿ÉÊÂÎñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ«ÈÔδÌá¼°INC¡£¡£¡£¡£¡£¡£ÊÓ²ìÈ·¶¨£¬£¬£¬£¬¹¥»÷ÕßÔÚ2024Äê7ÔÂ17ÈÕÖÁ8ÔÂ3ÈÕʱ´ú¿É»á¼ûMcLarenºÍKarmanosµÄϵͳ¡£¡£¡£¡£¡£¡£Âõ¿Â×Ìá½»¸øÃÀ¹úÕþ¸®µÄÊý¾Ýй¶֪ͨÑù±¾ÏÔʾ£¬£¬£¬£¬Ð¹Â¶µÄÈ«ÃûÐÅÏ¢Òѱ»É¾³ý£¬£¬£¬£¬µ«ÆäËûÀàÐÍÊý¾Ý±»»ñÈ¡£¬£¬£¬£¬×ÜÌåй¶¹æÄ£Éв»Ã÷È·¡£¡£¡£¡£¡£¡£ÕâÊÇÂõ¿Â×½üÄêÀ´ÔâÓöµÄµÚ¶þÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ÉÏÒ»´Î±¬·¢ÔÚ2023Äê7Ô£¬£¬£¬£¬ÓÉALPHV/BlackCatÀÕË÷Èí¼þ×éÖ¯Ìᳫ£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÇÔÈ¡ÁË220ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ý¡¢Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍÉç»áÇå¾²ºÅÂ룬£¬£¬£¬²¢ÓÚ2023Äê10Ô½«Êý¾ÝÑù±¾ÔÚÍøÉÏй¶£¬£¬£¬£¬ÆÈʹÂõ¿Â×Ö§¸¶Î´¹ûÕæµÄÊê½ð½ð¶î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/mclaren-health-care-says-data-breach-impacts-743-000-patients/
5. ÃÀÍøÂçÇå¾²¹«Ë¾³ÆCyber FattahÐ¹Â¶É³ÌØÔ˶¯»áÃô¸ÐÊý¾Ý
6ÔÂ23ÈÕ£¬£¬£¬£¬¾ÝÃÀ¹úÍøÂçÇå¾²¹«Ë¾Resecurity³Æ£¬£¬£¬£¬ÓëCyber FattahÔ˶¯ÓйصÄÍþвÐÐΪÕßй¶ÁËÊýǧÌõÓëÍù½ìÉ³ÌØÔ˶¯»áÏà¹ØµÄ¼Í¼¡£¡£¡£¡£¡£¡£ÕâЩ±»µÁÊý¾ÝÒÔSQLת´¢ÐÎʽй¶£¬£¬£¬£¬¹¥»÷Õßͨ¹ýδ¾ÊÚȨ»á¼ûphpMyAdminÇÔÈ¡ÁË´æ´¢µÄ¼Í¼¡£¡£¡£¡£¡£¡£Resecurity½«´Ë´ÎÊÂÎñ½â¶ÁΪÒÁÀʼ°ÆäÊðÀíÈË¿ªÕ¹µÄÒ»Ïî¸üÆÕ±éÐÅÏ¢Ðж¯µÄÒ»²¿·Ö£¬£¬£¬£¬Ö¼ÔÚÖÆÔì²»Çå¾²¸Ð²¢ÆÆËðµØÇøÇå¾²¡£¡£¡£¡£¡£¡£¼øÓÚÒÔÉ«ÁÐÓëÒÁÀÊÖ÷Òª¹ØÏµ¼Ó¾ç£¬£¬£¬£¬ÍþвÐÐΪÕßÊÔͼʹÓÃÉ³ÌØ°¢À²®Íõ¹úºÍÃÀ¹úÔÚµØÇø¹ØÏµºÍÇå¾²ÖеÄÖ÷Òª×÷Ó㬣¬£¬£¬ÒÁÀ¿Ë¾³ÄÚһЩÓëÕæÖ÷µ³¡¢¹þÂí˹ºÍÇ×ÒÁÀʵÄ×é֯ҲʹÓøÃÊÂÎñ¾ÙÐÐÓÐÕë¶ÔÐÔµÄÐû´«»î¶¯£¬£¬£¬£¬½øÒ»²½·Å´óÁËÊÂÎñÓ°Ïì¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄÜÀ´×ÔÓë2024ÄêÉ³ÌØÔ˶¯»á¹Ù·½ÍøÕ¾Ïà¹ØµÄÊý¾Ý¿â£¬£¬£¬£¬·Ã¿Í¡¢ÔË·¢¶¯¼°ÆäÍŶӿÉÔÚ¸ÃÍøÕ¾×¢²á²¢·ÖÏíСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£ÔÆÔƹæÄ£µÄÐ¹Â¶Éæ¼°´ó×ÚÃô¸ÐÊý¾Ý£¬£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡¢¹ú¼ÊÒøÐÐÕ˺ÅÒÔ¼°Ìå¼ì֤ʵµÈ¡£¡£¡£¡£¡£¡£´óÐÍÌåÓýÈüÊÂÔâºÚ¿Í¹¥»÷ÒâÒåÖØ´ó£¬£¬£¬£¬¿ÉÄܶÔÍøÂçÇå¾²¡¢ÌåÓý³ÏÐÅÒÔ¼°È«Çò¹ÛÖڵȶà¸öÁìÓò±¬·¢ÆÕ±éÓ°Ïì¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/179239/cyber-warfare-2/iran-linked-threat-actors-cyber-fattah-leak-visitors-and-athletes-data-from-saudi-games.html
6. APT28ºÚ¿ÍÀûʹÓÃSignal¶ÔÎÚ¿ËÀ¼ÌᳫеĶñÒâÈí¼þ¹¥»÷
6ÔÂ23ÈÕ£¬£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄAPT28Íþв×éÖ¯ÕýʹÓÃSignal̸ÌìÓ¦Óù¥»÷ÎÚ¿ËÀ¼Õþ¸®Ä¿µÄ£¬£¬£¬£¬Ê¹ÓÃÁËÁ½¸ö´Ëǰδ¼Í¼µÄ¶ñÒâÈí¼þ¼Ò×åBeardShellºÍSlimAgent¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²¢·ÇSignalƽ̨×Ô¼ºµÄÇå¾²ÎÊÌ⣬£¬£¬£¬¶øÊÇÍþвÐÐΪÕßʹÓÃ¸ÃÆ½Ì¨¾ÙÐÐÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£¡£2024Äê3Ô£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úºÍÓ¦¼±ÏìÓ¦²¿·Ö£¨CERT-UA£©Ê״η¢Ã÷ÕâЩ¹¥»÷£¬£¬£¬£¬µ«ÆäʱδÅû¶ѬȾǰÑÔϸ½Ú¡£¡£¡£¡£¡£¡£2025Äê5Ô£¬£¬£¬£¬ÒòÓÐÈËδ¾ÊÚȨ»á¼ûgov.uaµç×ÓÓʼþÕÊ»§Òý·¢ÐÂÊӲ죬£¬£¬£¬CERT-UA·¢Ã÷ͨ¹ýSignal·¢Ë͵ÄÐÂÎű»ÓÃÓÚת´ï¶ñÒâÎĵµ£¬£¬£¬£¬¸ÃÎĵµÊ¹Óúê¼ÓÔØCovenantÄÚ´æ×¤ÁôºóÃÅ¡£¡£¡£¡£¡£¡£Covenant×÷Ϊ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬ÏÂÔØDLLºÍ°üÀ¨shellcodeµÄWAVÎļþÒÔ¼ÓÔØBeardShell¡£¡£¡£¡£¡£¡£BeardShellÖ÷Òª¹¦Ð§ÊÇÏÂÔØ²¢Ö´ÐÐPowerShell¾ç±¾£¬£¬£¬£¬Ð§¹ûй¶µ½C2ЧÀÍÆ÷²¢Í¨¹ýIcedrive APIͨѶ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÔÚ2024ÄêµÄ¹¥»÷ÖУ¬£¬£¬£¬CERT-UA»¹·¢Ã÷ÁËÃûΪSlimAgentµÄÆÁÄ»½ØÍ¼×¥È¡¹¤¾ß£¬£¬£¬£¬¸Ã¹¤¾ßʹÓÃһϵÁÐWindows APIº¯Êý²¶»ñÆÁÄ»½ØÍ¼£¬£¬£¬£¬²¢Ê¹ÓÃAESºÍRSA¼ÓÃÜ´æ´¢ÔÚÍâµØ¡£¡£¡£¡£¡£¡£CERT-UA½«´Ë»î¶¯¹é×ïÓÚAPT28£¬£¬£¬£¬²¢½¨ÒéDZÔÚÄ¿µÄ¼à¿ØÏà¹ØÍøÂç½»»¥¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/


¾©¹«Íø°²±¸11010802024551ºÅ