Ó¢¹ú»Ê¼ÒÓÊÕþÔâ³Á´óÊý¾Ýй¶£¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â
°ä²¼¹¦·ò 2025-04-031. Ó¢¹ú»Ê¼ÒÓÊÕþÔâ³Á´óÊý¾Ýй¶£¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â
4ÔÂ2ÈÕ£¬Ó¢¹ú»Ê¼ÒÓÊÕþ¼¯ÍÅ£¨Royal Mail Group£©½üÆÚÒÉËÆÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°144GBµÄÄÚ²¿Îļþ¡¢¿Í»§ÐÅÏ¢ºÍÓªÏúÊý¾Ý±»¹«¿ª¡£¸ÃÊÂÎñÓÉÍøÂç·¸×ïÂÛ̳Breach ForumµÄÓû§¡°GHNA¡±ÓÚ2025Äê3ÔÂ31ÈÕ³õ´ÎÅû¶£¬ÆäÉÏ´«ÁËÔ̺¬293¸öÎļþ¼ÐºÍ16,549¸öÎļþµÄÊý¾Ý°ü£¬²¢Ìá¼°¸Ð¼¤µÂ¹úÊý¾Ý·ÖÎö¹«Ë¾SpectosµÄ¡°ÐÖú¡±¡£Ð¹Â¶Êý¾Ýº¸Ç¿Í»§Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡¢ÄÚ²¿Í¨Ñ¶¼Í¼¡¢ÔËÓªÊý¾Ý¼°ÓªÏú»ù´¡ÉèÊ©ÐÅÏ¢£¬Òý°ä·¢½ç¶Ô¹¥»÷ÆðÔ´µÄ²Â²â£¬¼´¿ÉÄÜÊÇÖ±½ÓÈëÇֻʼÒÓÊÕþϵͳ»òͨ¹ýÆä¹©¸øÉÌSpectos½øÐеĵÚÈý·½¹¥»÷¡£GHNA×Ô2024Äêµ×»îÔ¾ÓÚBreach Forum£¬´ËǰÒÑй¶¶à¼Ò³ÛÃûÆóÒµÊý¾Ý£¬Ô̺¬ÈýÐǵç×Ó¡¢Touchworld Technology LLCµÈ£¬Õâ´Î»Ê¼ÒÓÊÕþÊý¾Ýй¶ÊÇÆä°ä²¼µÄ×î´ó¹æÄ£¹¥»÷Ö®Ò»£¬ÒÉËÆÎªÆä¡°½Ó¼û¼´·þÎñ¡±£¨Access-as-a-Service£©ÔËÓªµÄÒ»²¿ÃÅ¡£SpectosÂŴγʴ˿Ìй¶Êý¾ÝÖУ¬Ô̺¬ÄÚ²¿ÎļþºÍ»áÒéÊÓÆµ£¬Æä½ÇÉ«Éв»Ã÷È·£¬µ«ºÚ¿Í°µÊ¾Æäϵͳ»òΪ¹¥»÷ÇÐÈëµã¡£»Ê¼ÒÓÊÕþ¼¯ÍÅ»ØÓ¦³ÆÕýÓëSpectosºÏ×÷µ÷²éÊÂÎñ£¬ÆÀ¹ÀÊý¾ÝÓ°Ïì¡£
https://hackread.com/hacker-leaks-royal-mail-group-data-supplier-spectos/
2. FIN7ÍÅ»ïÀûÓÃAnubisºóÃŽٳÖWindowsϵͳ
4ÔÂ2ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½Òʾ£¬ÒÔ¾¼ÃÀûÒæÇý¶¯µÄÍøÂç·¸×ïÍÅ»ïFIN7£¨Òà³ÆCarbon SpiderµÈ¶à¸ö±ðºÅ£©ÕýÀûÓÃÒ»ÖÖÃûΪAnubisµÄPythonºóÃŶñÒâÈí¼þ£¬¶ÔWindowsϵͳִÐнٳ֡£ÈðÊ¿ÍøÂ簲ȫ¹«Ë¾PRODAFT¼¼Êõ»ã±¨ÏÔʾ£¬¸Ã¶ñÒâÈí¼þ¸³Óè¹¥»÷ÕßÔ¶³ÌÖ´ÐÐShellºÅÁϵͳ²Ù×÷ÄÜÁ¦£¬´Ó¶øÆëÈ«½ÚÔ챻ϰȾÉ豸¡£FIN7×÷Ϊһ¸öÓµÓжíÂÞ˹²¼¾°µÄÍøÂç·¸×ï×éÖ¯£¬³Ö¾ÃÒÔ¿ª·¢¸´ÔÓ¶à±äµÄ¶ñÒâÈí¼þ¼Ò×åÖø³Æ£¬Æä¹¤¾ßÁ´Ö¼ÔÚ»ñÈ¡³õʼ½Ó¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý¡£½üÄêÀ´£¬¸ÃÍŻﱻָתÏòÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©Ä£Ê½ÒÔÍØÕ¹·¸·¨ÊÕÒæÇþ·¡£AnubisºóÃÅͨ¹ý¾«ÐÄÉè¼ÆµÄ´¹µöÓʼþ½øÐд«²¼£¬ÓÕµ¼Êܺ¦ÕßÖ´ÐÐÍйÜÔÚÔâÈëÇÖSharePointÕ¾µãÉϵĶñÒâÔØºÉ¡£¶ñÒâÈí¼þÒÔZIPѹËõ°ü´ó¾Ö½»¸¶£¬ÄÚº¬Ö±½ÓÔÚÄÚ´æÖнâÃÜÖ´ÐеÄPython¾ç±¾£¬¼Ì¶ø¼ÓÔØÖ÷Ìâ»ìºÏ¸ºÔØ¡£³ÉÁ¢ÏνӺ󣬺óÃÅͨ¹ýTCPÌ×½Ó×ÖÒÔBase64±àÂëÓëÔ¶³Ì·þÎñÆ÷ͨѶ£¬Ö§³ÖÍøÂçÖ÷»úIP¡¢Îļþ´«Ê䡢Ŀ¼²Ù×÷¡¢»·¾³±äÁ¿»ñÈ¡¡¢×¢²á±íÅú¸ÄµÈÖ°ÄÜ£¬ÉõÖÁÄܼÓÔØDLLÖÁÄÚ´æÊµÏÖÎÞÎļþ¹¥»÷¡£
https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html
3. ÏÂËÕ×åÉçÇøÔâÍøÂç¹¥»÷£¬RansomHubÍÅ»ïÐû³ÆÕƹÜ
4ÔÂ3ÈÕ£¬Ã÷ÄáËÕ´ïÖÝÏÂËÕ×åÓ¡µÚ°²ÈËÉçÇøÏò¾ÓÃñ·¢³öÖҸ棬¸Ã²¿ÂäÔâ·êÍøÂç¹¥»÷£¬µ¼Ö±¾µØÒ½ÁÆ»ú¹¹¡¢µ±¾Ö·þÎñÖÐÐļ°²¿ÂäÔËÓªµÄJackpot Junction¶Ä³¡ÔËÓªÖжϡ£Õâ´ÎÊÂÎñÆÈʹ²¿ÂäÆô¶¯Ó¦¼±ÏìÓ¦»úÔ죬×Ô¶¯¹Ø¹Ø²¿ÃŹؼüϵͳÒÔ½ÚÔìÊÂ̬£¬Ô̺¬µç»°¡¢´«Õæ¼°Óʼþ·þÎñ¡£¹Ù·½Í¨¹ýÉ罻ýÌ尵ʾ£¬ÕýÓëÍøÂ簲ȫר¼ÒºÏ×÷£¬Á¦ÇóÔÚ°²È«Ç°ÌáϾ¡¿ì¸´ÔϵͳÕý³£ÔËÐУ¬²¢°ä²¼ÁËÎÀÉúÖÐÐÄ¡¢ÑÀ¿ÆÕïËùµÈ³¡ËùµÄһʱÁªÏµµç»°¡£ÍøÂç¹¥»÷Ó°ÏìÉîÔ¶£¬¶Ä³¡¾ÆµêÔ¤Ô¼ÏµÍ³È«ÃæÌ±»¾£¬ÎÞ·¨´¦ÖÃж©·¿¼°È¡µÞÒªÇ󣬵ç×ÓÓÎÏ·»ų́ÒàÒòÍøÂçÖжÏÖÕ³¡ÔË×÷¡£¸Ã²¿ÂäÕ¼ÓÐÔ¼982Ãû¾ÓÃñ£¬ÖØÒª¾Û¾ÓÔÚ1,743Ӣ͵ı£ÁôµØ¼°ÖܱßÇøÓò¡£ÖµÍ×ÌùÐĵÄÊÇ£¬RansomHubÀÕË÷Èí¼þÍÅ»ïÓÚ±¾ÖÜÒ»¹«¿ªÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¸ÃÍÅ»ï½ñÄê2ÔÂÔøÏ®»÷ÃÜЪ¸ùÖÝÁíÒ»Ô¾ÓÃñ²¿Â䣬²¢ÔÚÈ«ÇòÀÕË÷Èí¼þÁìÓòѸ¿ìáÈÆð£¬ÓÈÆäÔÚÈ¥ÄêLockBitºÍAlphVÔâ·¨Âɽø¹¥ºó£¬Æä»îÔ¾¶ÈÏÔÖøÉÏÉý¡£
https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino
4. ÊýǧAndroidÉ豸ԤװTriadaľÂí£¬¹©¸øÁ´°²È«ÏÖ³Á´óÍþв
4ÔÂ2ÈÕ£¬¿¨°Í˹»ù³¢ÊÔÊÒ½üÆÚÅû¶£¬Êýǧ̨ÐÂÐÍAndroidÉ豸ÔÚ³ö³§Ç°¼´±»Ö²Èë×îбäÖÖµÄTriadaľÂí£¬×é³ÉÑϳÁµÄ¹©¸øÁ´°²È«Íþв¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÚ2016ÄêÏÖÉí£¬ÒÔÆä¹ÖÒìµÄÄÚ´æ×¤Áô¼¼Êõ¶ã±Ü¼ì²â£¬Õâ´ÎбäÖÖ¸üչʾ³öÉî¶ÈÏµÍ³ÉøÈëÄÜÁ¦¡£¹¥»÷Õßͨ¹ý¼ÙðʢÐÐÊÖ»úÐͺţ¬Ôڷǹٷ½Çþ·ÒÔÁ®¼ÛÎüÒýÏû·ÑÕ߲ɰìÒÑϰȾµÄÖÕ¶ËÉ豸¡£2025Äê3ÔÂ13ÈÕÖÁ27Èռ䣬½ö¶íÂÞ˹¾ÍÓÐ2,600ÃûÓû§È·ÈÏϰȾ¡£¸ÃľÂí¾ß±¸¶àά¶È¹¥»÷ÄÜÁ¦£ºÇÔÈ¡¼´Ê±Í¨Ñ¶ÓëÉ罻ýÌåÕË»§¡¢´Û¸Ä¼ÓÃÜÇ®±ÒÇ®°üµØÖ·Ö´Ðнٳ֡¢²Ù¿ØÍ¨»°Â·Óɼ°¶ÌÐÅÖ°ÄÜ¡¢ÉõÖÁÔ¶³Ì¼ÓÔØ¶î±í¶ñÒⷨʽ¡£Æäͨ¹ý¼Ùװϵͳ¹ý³ÌʵÏÖÓÆ¾Ã»¯×¤Áô£¬¼´±ãÉ豸³ÁÆôÈÔÄÜά³Ö½ÚÔì¡£·ÖÎöÏÔʾ£¬¹¥»÷ÕßÒÑͨ¹ý´úÌæÇ®°üµØÖ·µÁÈ¡ÖÁÉÙ27ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬ÏÖʵËðʧ¿ÉÄÜÒòÉæ¼°ÃÅÂÞ±ÒµÈÄäÃû¼ÓÃÜ×ʲú¶ø¸ü¸ß¡£¿¨°Í˹»ùר¼Ò´§Ä¦Õâ´ÎÊÂÎñϵ¹©¸øÁ´»·½ÚÔâÉøÈ룬¶ñÒâÈí¼þÔÚÉ豸µ½´ïÓû§Ç°¼´±»Ö²Èë¹Ì¼þ£¬Á¬¾ÏúÉ̶¼¿ÉÄÜÃÉÔÚ¹ÄÖС£Îª½µµÍ·çÏÕ£¬°²È«×¨¼Ò½¨ÒéÏû·ÑÕß½öͨ¹ý¹Ù·½ÊÚȨÇþ·²É¹ºÉ豸£¬¶Ô´æÒÉÉ豸ӦʹÓÃGoogle¹Ù·½´¿¾»¾µÏñ»ò¿ÉÐÅ¿ªÔ´ÏµÍ³£¨ÈçLineageOS£©½øÐÐË¢»ú¡£
https://www.bleepingcomputer.com/news/security/counterfeit-android-devices-found-preloaded-with-triada-malware/
5. Outlaw½©Ê¬ÍøÂçÀûÓÃSSH·ì϶×Ô¶¯´«²¼£¬ÍþвLinuxϵͳ°²È«
4ÔÂ2ÈÕ£¬ÍøÂ簲ȫר¼Ò½üÈÕÅû¶ÁËÒ»¸öÃûΪOutlaw£¨±ðÃûDota£©µÄ×Ô¶¯»¯¼ÓÃÜÇ®±ÒÍÚ¿ó½©Ê¬ÍøÂ磬¸Ã¶ñÒâÈí¼þ³ÖÐø»îÔ¾ÒÑÓâËÄÄ꣬ͨ¹ýSSH±©Á¦ÆÆ½â¹¥»÷ºÍÈä³æÊ½´«²¼Ï°È¾Linuxϵͳ¡£Elastic°²È«³¢ÊÔÊÒ·ÖÎöÖ¸³ö£¬¸Ã¶ñÒâÈí¼þÓÉÂÞÂíÄáÑǺڿͼ¯Ì忪·¢£¬Æä¹¥»÷Á´Ê¼ÓÚÀûÓÃÈõÃÜÂëµÄSSH·þÎñÆ÷£¬Í¨¹ýÖ²Èë×ÔÉíSSHÃÜÔ¿³ÉÁ¢Óƾû¯½Ó¼û¡£¹¥»÷Õßѡȡ¶à½×¶ÎÉøÈëÕ½Êõ£¬Ê×ÏÈͨ¹ýÏÂÔØÆ÷¾ç±¾»ñÈ¡¼ÓÃÜѹËõ°ü£¬½âѹºóÆô¶¯ÍÚ¿ó·¨Ê½£¬²¢×Ô¶¯¶Ï¸ù¾ºÕùÍÚ¿ó¹ý³Ì¼°×ÔÉí¾É°æ±¾¡£Ö÷Ìâ×é¼þBLITZÕÆ¹ÜɨÃè´àÈõSSH·þÎñ£¬¹²Í¬±©Á¦ÆÆ½âÄ£¿éʵÏÖºáÏòÀ©É¢£¬ÆäÖ¸±êÁбíÓÉC2·þÎñÆ÷¶¯Ì¬¸üС£ÖµÍ×ÌùÐĵÄÊÇ£¬¸ÃÍŻﻹÀûÓÃDirty COWµÈº¹Çà·ì϶¼°ÈõTelnetƾ֤À©´ó¹¥»÷Ãæ¡£Ï°È¾³É¹¦ºó£¬¶ñÒâÈí¼þ²¿ÊðSHELLBOTÄ£¿é£¬Í¨¹ýIRCƵ·½Ó¹Ü½ÚÔìÖ¸Á¿ÉÖ´ÐÐËÁÒâϵͳºÅÁî¡¢ÌáÒéDDoS¹¥»÷¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÎªÌáÉýÍÚ¿óЧÄÜ£¬¶ñÒâÈí¼þ»á¼ì²âϵͳCPU¸öÐÔ²¢ÆôÓôóÒ³ÃæÄÚ´æÅäÖã¬Í¬Ê±Î¬³ÖÓë¹¥»÷Õß»ù´¡ÉèÊ©µÄ³ÖÐøÍ¨Ñ¶¡£
https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
6. »ùÒòÊý¾ÝÍøÕ¾openSNPÒòÒþÖÔ·çÏÕ½«¹Ø¹Ø²¢É¾³ýÊý¾Ý
4ÔÂ2ÈÕ£¬»ùÒòÊý¾Ý¹²ÏíÆ½Ì¨openSNP°ä·¢½«ÓÚ2025Äê4ÔÂ30ÈÕÖÕÖ¹·þÎñ²¢È«ÃæÉ¾³ýÓû§Êý¾Ý£¬¸Ã¾ö¶¨ÓɽáºÏÊ×´´ÈËBastian Greshake Tzovaras»ùÓÚÒþÖÔ±£»¤ÓëÂ×Àí·çÏÕ¿¼Á¿×÷³ö¡£×÷ΪÔËÐÐ14ÄêµÄ¿ªÔ´ÏîÄ¿£¬openSNPÖÂÁ¦ÓÚÍÆ¶¯»ùÒòÊý¾ÝÃñÖ÷»¯£¬Í»ÆÆÃ³Ò×»ú¹¹¶Ô»ùÒò×éÐÅÏ¢µÄ¢¶Ï£¬Àۼƴ洢Á˺£Á¿Óû§×ÔÔ¸Ìá½»µÄ»ùÒòÓë±íÐÍÊý¾Ý£¬Ö§³ÖÁ˶àÏî¶ÀÁ¢¿ÆÑм°¹«¹²½¡È«×êÑС£ÏîÄ¿¹Ø¹ØµÄÖ±½ÓÓÕÒòÊÇ23andMe¹«Ë¾ÆÆ²úµ¼ÖµÄÓû§Êý¾ÝÁ÷Èë¶Ï¾ø£¬µ«¸üÉî²ãÔÒòÔÚÓÚÈ«ÇòÊý¾ÝÀÄÓ÷çÏյļӾ硣TzovarasÖ¸³ö£¬µ±Ç°»ùÒòÊý¾Ý±»¸öÈË·¨Ò½»ú¹¹¡¢·¨Âɲ¿ÃÅÉõÖÁ²¿Ãŵ±¾ÖÒÔα¿ÆÌ¨¸¦Òå²»µ±»ñÈ¡µÄ·çÏÕÏÔÖøÉÏÉý£¬ÕâÓëÏîÄ¿Æô¶¯Ê±Ïà¶Ô¿íËɵÄÊý¾ÝÂ×Àí»·¾³ÒѲúÉúµ××ӱ䶯¡£Ö»¹ÜopenSNPʼÖջؾøÃ³Ò×ÊÕ¹º²¢Î¬³ÖÊý¾Ý½ÚÔìȨ£¬µ«Ãæ¶Ô²»ÐÝÑݱäµÄÒþÖÔÍþвºÍÕþÖλ·¾³£¬ÍŶÓÒÔΪ×Ô¶¯É¾³ýÊý¾ÝÊǸüÕÆ¹ÜÈεÄÑ¡Ôñ¡£×÷Ϊ¿ªÔ´ÉçÇøµÍ³É±¾ÔË×÷µÄ·¶Àý£¬¸ÃÆ½Ì¨ÔøÓÐÐ§ÍÆ½ø¹«¼Ò¶Ô»ùÒò×êÑеIJμӡ£¹Ø¹Ø²¼¸æ³ö¸ñÌáÐÑÓû§£¬ÈôÐè±£ÁôÓ×ÎÒÊý¾Ý¸±±¾ÐëÔÚ½ØÖ¹ÈÕÆÚǰ×ÔÐÐÏÂÔØ£¬¶ûºóËùÓй«¿ªÊý¾Ý½«±»ÓÀÔ¶¶Ï¸ù¡£
https://www.bleepingcomputer.com/news/security/genetic-data-site-opensnp-to-close-and-delete-data-over-privacy-concerns/


¾©¹«Íø°²±¸11010802024551ºÅ