ÄϷǵçÐŹ©¸øÉÌCell CÈ·ÈÏÍøÂç¹¥»÷ºó²úÉúÊý¾Ýй¶
°ä²¼¹¦·ò 2025-04-151. ÄϷǵçÐŹ©¸øÉÌCell CÈ·ÈÏÍøÂç¹¥»÷ºó²úÉúÊý¾Ýй¶
4ÔÂ14ÈÕ£¬ÄϷǵÚËÄ´óÒÆ¶¯ÍøÂçÔËÓªÉÌCell C£¬×÷Ϊ¸Ã¹ú×î´óµÄµçÐŹ©¸øÉÌÖ®Ò»£¬ÔÚ2024ÄêÔâ·êRansomHouseÍøÂç¹¥»÷ºóÈ·ÈϲúÉúÊý¾Ýй¶¡£¸ÃÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾Ð¹Â¶ÁËÐû³ÆÇÔÈ¡µÄ2TBÊý¾Ý£¬Ô̺¬È«Ãû¡¢ÁªÏµ·½Ê½¡¢Éí·ÝÖ¤ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£Cell C°µÊ¾£¬ÍþвÐÐΪÕßδ¾ÊÚȨ½Ó¼ûÁËÆä²¿ÃÅITϵͳ¡£Cell CѸ¿ì²ÉÈ¡Ðж¯£¬¶ôÔìÍøÂç¹¥»÷£¬±£»¤ÏµÍ³°²È«£¬²¢½µµÍÓ°Ïì¡£¹«Ë¾ÀñƸ¶¥¼¶ÍøÂ簲ȫºÍȡ֤ר¼Ò£¬Í¨ÖªÓйز¿ÃÅ£¬²¢»ý¼«Ö§³ÖÊÜÓ°ÏìµÄÀûÒæÓйØÕß¡£Í¬Ê±£¬³ÖÐø¼à¿ØÇ±ÔÚµÄÊý¾ÝÀÄÓ㬲¢¶½´Ù¾¯Ìèڲơ¢ÍøÂç´¹µöºÍÉí·Ý͵ÇÔ£¬·ÖÏí·ÀÚ²Æ×ÊÔ´¡£RansomHouse×÷ΪÊý¾ÝÀÕË÷ÍŻ×Ô2021Äê12ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬ÓëÆäËûÀÕË÷ÍÅ»ï·ÖÆç£¬×¨Ò»ÓÚÊý¾ÝÇÔÈ¡ÒÔ¼Ó¿ì»î¶¯£¬Í¨¹ýй¶Êý¾ÝÀ´ÐßÈè²»¸¶¿îµÄÓû§¡£
https://securityaffairs.com/176509/data-breach/south-african-telecom-provider-cell-c-disclosed-a-data-breach.html
2. Ë®Ðǹ«Ë¾ÔâÍøÂç¹¥»÷£¬³¬3000ÈËÐÅϢй¶
4ÔÂ11ÈÕ£¬×ܲ¿Î»ÓÚÃÀ¹úµÄÔì×÷¹«Ë¾Ë®Ðǹ«Ë¾£¨Mercury Corp.£©ÔøÔâ·ê°²È«Ï®»÷¡£¾Ý¸Ã¹«Ë¾·¢Ë͸øÇ±ÔÚÊÜÓ°ÏìÓû§µÄ°²È«·ì϶֪ͨÐÅ£¬¹¥»÷ÕßÓÚ½ñÄê2ÔÂÖÐÑ®Í»ÆÆÁËÆä·ÀÓùϵͳ£¬Ö»¹ÜÔÚ¹«Ë¾ÏµÍ³ÖеÄÍ£¶Ù¹¦·ò½öÔ¼Ò»Ì죬µ«Õâ´Îδ¾ÊÚȨµÄ½Ó¼ûȴ¶³öÁË´óÁ¿Ó×ÎÒÐÅÏ¢¡£ÐÅÖÐÅû¶£¬¹¥»÷Õß»ñÈ¡ÁËÔ̺¬Ãû×Ö¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕÒÔ¼°Éç»á°²È«ºÅÂ루SSN£©ÔÚÄڵĶàÏîÃô¸ÐÐÅÏ¢¡£Æ¾¾ÝË®Ðǹ«Ë¾ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢£¬Õâ´ÎÏ®»÷Ó°Ï쳬¹ý3,000ÈË¡£Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶¶ÔÓ×ÎÒ°²È«×é³ÉÑϳÁÍþв£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÊý¾Ý½øÐÐÉí·Ý͵ÇÔ£¬È翪ÉèÚ²ÆÐÔÐÅÓþÕË»§¡¢Ìá½»ÐéαÄÉ˰É걨µ¥£¬»òÀûÓñ»µÁÉí·ÝÖ´Ðз¸×ï¡£´Ë±í£¬¸ü¸ÉÁ·µÄ¹¥»÷Õß»¹¿ÉÄÜÀûÓÃÇÔÈ¡µÄÐÅÏ¢½øÐÐÍøÂç´¹µö»î¶¯£¬Í¨¹ý¾«ÐÄÉè¼ÆµÄµç×ÓÓʼþ»ò¶ÌÐÅÓÕÆÊܺ¦Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£È»¶ø£¬Ë®Ðǹ«Ë¾ÔÚÐÅÖÐÐû³Æ£¬ÊÂÎñµ÷²é¡°²¢Î´È·ÈÏÊÇ·ñÓÐÓ×ÎÒÐÅÏ¢Òò¸ÃÊÂÎñ¶ø±»½Ó¼û»òй¶¡±¡£Ë®Ðǹ«Ë¾£¬Ç°ÉíΪˮÐÇ·É»ú¹«Ë¾£¬ÔÚÔì×÷ÁìÓòÓÐ×ÅÓÆ¾ÃµÄº¹Ç࣬³ÉÁ¢ÓÚ20ÊÀ¼Í20Äê´ú£¬ÔøÎªÃÀ¹ú½¾ü¹©¸ø·É»ú¼°Á㲿¼þ£¬Õâ´Î°²È«ÊÂÎñÎÞÒÉ¶ÔÆäÃûÓþºÍÓû§ÐÅÀµ¶ÈÔì³ÉÁËÓ°Ïì¡£
https://cybernews.com/news/mercury-aircraft-data-breach-personal-information/
3. SK¼¯ÍÅÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷£¬1TBÎļþ±»µÁ
4ÔÂ11ÈÕ£¬È«ÇòÄÜÔ´ÓëÔì×÷Òµ¾ÞÍ·SK¼¯ÍÅÔâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬¸Ã×éÖ¯Ðû³ÆÇÔÈ¡Æä1TBÎļþ£¬²¢½«SK¼¯ÍÅÐÕÃû°ä²¼ÓÚ°µÍøÐ¹ÃÜÍøÕ¾£¬ÒªÇó48Ó×ʱÄÚÁªÏµ£¬µ«Î´Ìṩ֤¾Ý¡£SK¼¯ÍÅÒµÎñ¿í·º£¬Éæ¼°ÄÜÔ´¡¢µçÐŵȶàÁìÓò£¬Õ¼ÓÐ260Óà¼Ò¹ØÁª¹«Ë¾¼°8Íò¶àÃûÔ±¹¤£¬ÔÚÃÀ¹úͶ×ʳ¬500ÒÚÃÀÔª£¬ÔÚº«¹ú¾¼ÃÖÐְλ³ÁÒª£¬¹Ê³É¹¥»÷Ö¸±ê¡£÷è÷ëÀÕË÷Èí¼þ×éÖ¯³ôÃûÔ¶Ñï£¬ÔøÈëÇÖÓ¢¹úNHSºÏ×÷ͬ°é£¬µ¼Ö¶à¼ÒÒ½Ôº·þÎñ¹Ø¹Ø£¬2025Äê¹¥»÷Á¦¶È¼Ó´ó£¬³ÉΪÎå´ó»îÔ¾ÀÕË÷Èí¼þÍÅ»ïÖ®Ò»¡£¸Ã×é֯ѡȡÀÕË÷Èí¼þ¼´·þÎñģʽ£¬³£Ê¹ÓÃË«³ÁÀÕË÷¼¿Á©£¬´ÓǰÖÜΧÄÚÔì³ÉÖÁÉÙ68ÃûÊܺ¦Õߣ¬ÖØÒª²úÉúÔÚÃÀ¹ú¡£´Ë±í£¬÷è÷뻹Ðû³Æ¶ÔÐÝ˹¶Ù½»ÏìÀÖÍÅ¡¢µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾¼°Lee EnterprisesµÈÊܺ¦ÕßÕÆ¹Ü£¬´Óǰ12¸öÔÂÊܺ¦Õß×ÜÊýÒÑ´ï256ÈË¡£Æä»¹¶ÔÈÕ±¾Óî¶¼¹¬°©Ö¢Ò½ÖÎÖÐÐĺڿ͹¥»÷ÊÂÎñÕÆ¹Ü£¬Ð¹Â¶30ÍòÃû»¼ÕßÃô¸ÐÐÅÏ¢¡£÷è÷ë·¢Ô´ÓÚ¶íÂÞ˹£¬²»¹¥»÷¶ÀÁªÌå¹ú¶È£¬ÆäÀÕË÷Èí¼þ±äÖÖ¡°Qilin.B¡±¿ÉÕë¶Ô¹ØÁªÆóÒµ¶¨Ô죬Ìṩ¶àÖÖ¼ÓÃܲ½Ö裬²¢Ê¹ÓÃRust±à³Ì˵»°±àд¡£
https://cybernews.com/news/sk-group-ransomware-attack-qilin-gang-claims-stolen-data/
4. Wolters KluwerÔâ·êÊý¾Ýй¶£¬Ãô¸ÐÐÅÏ¢±»ÏúÊÛ
4ÔÂ12ÈÕ£¬½üÈÕ£¬ÓÐÍþвÐÐΪÕßÔÚÍøÂç·¸×ïÂÛÌÓð»¯ù³ÆÒÑÆÆ½â½ðÈÚÈí¼þ¾ÞÍ·Wolters KluwerµÄ±£Ïտ⣬²¢ÇÔÈ¡ÁËÐÂÊý¾Ý¼¯¡£Wolters KluwerÊÇÒ»¼ÒÄêÊÕÈë½ü70ÒÚÃÀÔªµÄ¹«Ë¾£¬ÎªÃÀ¹ú´óÁ¿¹ÜÕÊʦÊÂÎñËù¡¢ÒøÐкͲƸ»500Ç¿ÆóÒµÌṩ·þÎñ£¬ÒµÎñÁìÓò¿í·º£¬¿Í»§Ô̺¬Ó¢¹úº½¿Õ¡¢°¢ÁªÇõº½¿Õ¡¢²¨ÒôµÈ³ÛÃûÆóÒµ¡£ÈôÕâ´ÎÊý¾Ýй¶Êôʵ£¬½«Éæ¼°Óû§È«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¾Ý³Æ£¬Ð¹Â¶µÄÊý¾Ý¼¯´óÓ×ÔÚ3GBµ½6GBÖ®¼ä£¬Ëä²»Ô̺¬ÃÜÂ룬µ«°²È«×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߶ȸöÐÔ»¯µÄÍøÂç´¹µö»î¶¯ºÍ¼ÙÒâ̰ͼ¡£ºÚ¿Í¿ÉÄÜÀûÓÃÕâЩÊý¾Ý½øÐÐÉí·Ý¼ÙÒ⣬ÊÔͼ½Ù³ÖÊܺ¦ÕßÕË»§¡£Ä¿Ç°£¬¸ÃÊý¾Ý¼¯µÄÆðÅļÛΪ15,000ÃÀÔª£¬ÍþвÐÐΪÕßÐû³Æ±»µÁÊý¾ÝÖ»»áÏúÊÛÒ»´Î¡£¶Ô´Ë£¬Wolters KluwerÒѰ䷢ÉêÃ÷£¬°µÊ¾ÔÚµ÷²éÈκÎDZÔÚµÄÊý¾ÝÓ°Ï죬²¢Ö¸³öÊÜÓ°ÏìµÄÊý¾ÝËÆºõ½öÏÞÓÚ½¡È«ÆÚ¿¯ÒµÎñÖеÄÒµÎñÁªÏµÐÅÏ¢£¬Ã»ÓÐÖ¤¾ÝÅú×¢ÈκβÆÕþ»ò˰ÎñÊý¾ÝÊܵ½Ó°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ²¢·ÇWolters Kluwer³õ´Î³ÉΪ¹¥»÷Ö¸±ê£¬2019Äê¸Ã¹«Ë¾¾ÍÔøÔâ·êÍøÂç¹¥»÷¡£
https://cybernews.com/security/wolters-kluwer-data-breach-financial-security/
5. ºÕ×ȹ«Ë¾ÔâCleoÁãÈÕ·ì϶¹¥»÷£¬¿Í»§Êý¾Ýй¶
4ÔÂ14ÈÕ£¬Æû³µ×âÁÞ¾ÞÍ·ºÕ×ȹ«Ë¾Ôâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ¡£2025Äê2ÔÂ10ÈÕ£¬ºÕ×ÈÈ·ÈÏÆäÆìϺÕ×È¡¢ThriftyºÍDollarÆ·ÅÆ¿Í»§Êý¾ÝÔâδ¾ÊÚȨµÚÈý·½»ñÈ¡£¬¸ÃµÚÈý·½ÓÚ2024Äê10ÔºÍ12ÔÂÀûÓÃCleoƽ̨ÁãÈÕ·ì϶ִÐÐ͵ÇÔ¡£ºÕ×ȹ«Ë¾Ñ¸¿ì·¢Õ¹Êý¾Ý·ÖÎö£¬ÒÔÈ·¶¨ÊÂÎñÓ°ÏìÁìÓò¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬¿Í»§ÐÕÃû¡¢ÁªÏµÐÅÏ¢¡¢µ®ÉúÈÕÆÚ¡¢ÐÅÓþ¿¨ÐÅÏ¢¡¢¼ÝÊ»ÅÆÕÕÐÅÏ¢¼°¹¤ÈËÅâ³¥Ë÷ÅâÓйØÐÅÏ¢µÈ¡£´Ë±í£¬ÉÙÊýÈ˵ÄÉç»á°²È«ºÅÂë»òµ±¾ÖÉí·ÝÖ¤ºÅÂëÒ²Ãæ¶Ô±»µÁ·çÏÕ£¬¼«ÉÙÊýÈ˵ϤÕÕÐÅÏ¢¡¢Ò½ÁƱ£ÏÕ»òÒ½ÁƲ¹ÖúÉí·ÝÖ¤£¨Ó빤ÈËÅâ³¥Ë÷ÅâÓйأ©ÒÔ¼°³µÁ¾±äÂÒË÷ÅâÖÐÉËÐÅÏ¢Ò²¿ÉÄÜÊÜÓ°Ïì¡£Ö»¹ÜºÕ×ÈÉÐδ°ä²¼¾ßÌåÊÜÓ°Ïì¿Í»§ÊýÁ¿£¬µ«ÃåÒòÖÝ×ܼì²ì³¤°ì¹«Êһ㱨¸ÃÖÝÒÑÓÐ3409ÈËÊÕµ½Í¨Öª£¬¼ÓÀû¸£ÄáÑÇÖݺͷðÃÉÌØÖÝÒ²ÒÑ·ÖÏí֪ͨ£¬µ«Î´°ä²¼¾ßÌåÈËÊý¡£ÎªÓ¦¶ÔÕâ´ÎÊÂÎñ£¬ºÕ×ȹ«Ë¾ÎªÊÜÓ°Ïì¿Í»§ÌṩÁ½ÄêÃâ·ÑÉí·Ý¼à¿Ø·þÎñ£¬²¢½¨Òé¿Í»§¾¯ÌèDZÔÚÚ²ÆÐÐΪ¡£¹ÌÈ»ºÕ×ȰµÊ¾ÉÐδ·¢ÏÖÓ×ÎÒÐÅÏ¢±»ÀÄÓýøÐÐڲƵÄÐÐΪ£¬µ«ClopÀÕË÷Èí¼þÍÅ»ï´ËǰÒÑÔÚÆäÀÕË÷ÍøÕ¾ÉÏй¶ºÕ×ÈÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/hertz-confirms-customer-info-drivers-licenses-stolen-in-data-breach/
6. ConduentÔâÍøÂç¹¥»÷£¬¿Í»§Êý¾Ý±»µÁ
4ÔÂ14ÈÕ£¬ÃÀ¹úóÒ×·þÎñ¾ÞÍ·¼°µ±¾Ö³Ð°üÉÌConduentÓÚ½ñÈÕÅû¶£¬ÆäÔÚ2025Äê1ÔÂÔâ·êµÄÍøÂç¹¥»÷ÖУ¬¿Í»§Êý¾Ý²»ÐÒ±»µÁ¡£×÷Ϊһ¼ÒΪ½»Í¨¡¢Ò½ÁƱ£½¡¡¢¿Í»§ÂÄÀú¼°ÈËÁ¦×ÊÔ´ÁìÓòµ±¾ÖÓëóÒ׿ͻ§ÌṩÊý×Ôì½Ì¨Óë½â¾ö¹æ»®µÄóÒ×·þÎñ¹«Ë¾£¬ConduentÕ¼Óг¬¹ý33,000ÃûÔ±¹¤£¬·þÎñÁìÓò¸²¸ÇÒ»°ëµÄ²Æ¸»100Ç¿¹«Ë¾¼°³¬¹ý600¸öµ±¾ÖÓ뽻ͨ»ú¹¹¡£Õâ´ÎÍøÂç¹¥»÷²¨¼°ÃÀ¹ú¸÷µØ¿Í»§£¬Ô̺¬±¾µØµ±¾Ö»ú¹¹£¬¶ÔÔËÓªÔì³ÉÁ˿϶¨Ó°Ïì¡£ConduentÔÚÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄFORM-8KÎļþÖÐÈ·ÈÏ£¬ÍþвÐÐΪÕßÇÔÈ¡ÁËÔ̺¬¿Í»§ÐÅÏ¢µÄÎļþ¡£¾ÍøÂ簲ȫÊý¾ÝÍÚ¾òר¼ÒÆÀ¹À£¬È·ÈÏÊý¾Ý¼¯Ô̺¬´óÁ¿Óë¿Í»§×îÖÕÓû§ÓйصÄÓ×ÎÒÐÅÏ¢¡£¹«Ë¾ÔÚ½øÒ»²½·ÖÎöй¶Êý¾ÝµÄ¾ßÌåÓ°Ï죬²¢½«ÔÚÊÊÆäʱ³½Í¨Öª¿Í»§£¬ÒÔ±ãÆ¾¾ÝÁª¹úºÍÖÝ˾·¨µÄÒªÇóÈ·¶¨ºóÐø´ëÊ©¡£ÖµµÃÇìÐÒµÄÊÇ£¬Ä¿Ç°Ã»Óм£ÏóÅú×¢±»µÁÊý¾ÝÒÑÔÚ°µÍø»òÆäËû¹«¿ªÇþ·°ä²¼¡£Ö»¹ÜÕâ´Î¹¥»÷²¢Î´¶ÔConduentµÄÔËÓªÔì³ÉÄÚÈÝÐÔÓ°Ï죬µ«µÚÒ»¼¾¶ÈÒѲúÉúÓë¹¥»÷ÓйصÄÓöȡ£
https://www.bleepingcomputer.com/news/security/govtech-giant-conduent-confirms-client-data-stolen-in-january-cyberattack/


¾©¹«Íø°²±¸11010802024551ºÅ