°Í¶ûµÄĦÊй«Á¢Ñ§ÌÃÔâÀÕË÷Èí¼þ¹¥»÷£¬Ê¦ÉúÐÅϢй¶
°ä²¼¹¦·ò 2025-04-231. °Í¶ûµÄĦÊй«Á¢Ñ§ÌÃÔâÀÕË÷Èí¼þ¹¥»÷£¬Ê¦ÉúÐÅϢй¶
4ÔÂ23ÈÕ£¬½ñÄê2Ô£¬°Í¶ûµÄĦÊй«Á¢Ñ§ÌÃϵͳÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬ÊýǧÃûѧÉú¡¢ÀÏʦºÍÖÎÀíÈËÔ±ÐÅÏ¢±»µÁ¡£Öܶþ£¬Ñ§ÌùÙÔ±°ä²¼Î¥¹æÍ¨Öª£¬ÖÒ¸æ2ÔÂ13ÈÕ²úÉúµÄÍøÂçÊÂÎñ¶³öÁËijЩITϵͳ¡£µ÷²éÏÔʾ£¬Ò»Ð©Îļþ¿ÉÄÜÒѱ»·¸×ï·Ö×Óй¶£¬Éæ¼°ÏÖÈκÍǰÈιÍÔ±¡¢×ÔÔ¸ÕߺͳаüÉÌ£¬ÒÔ¼°²»µ½1.5%µÄѧÉú¡£°Í¶ûµÄĦÊй«Á¢Ñ§ÌùÙԱȷÈÏ£¬Õâ´ÎÊÂÎñΪÀÕË÷Èí¼þ¹¥»÷£¬µ«Î´Ö§¸¶Êê½ð¡£Ñ§ÌÃδй©¾ßÌåÊÜÓ°ÏìÈËÊý£¬µ«Ö¸³öÊÜÓ°ÏìѧÉú³¬¹ý1150ÈË¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÔ±¹¤Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂë»ò»¤ÕÕºÅÂ룬ÒÔ¼°Ñ§Éúͨ»°¼Í¼¡¢¿õ¿Î¼Í¼»òÉúÓýÇé¿öµÈÎļþ¡£Ñ§ÌÃϵͳÊ×ϯִÐйÙÉ£ÌØÀûÈû˹×Ô¼ºÒ²ÊÜÓ°Ï죬Ëý°µÊ¾Ñ§ÌÃ55%µÄÔ±¹¤Êܵ½Ó°Ïì¡£»¹Óб¨Â·³Æ£¬·¢ÏÖÁËÒ»·âÀ´×ÔCloakÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£Ñ§ÌùÙÔ±³Æ£¬Õâ´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼2.5ÍòÈË£¬Ô̺¬7000¶àÃûÏÖÈÎÀÏʦÒÔ¼°×Ô2010ÄêÒÔÀ´ÔÚ¸ÃÑ§Çø¹¤×÷µÄËùÓÐÈË¡£·¨Âɲ¿ÃÅÒѽӵ½Í¨Öª£¬²¢ÀñÆ¸ÍøÂ簲ȫ¹«Ë¾ÐÖú¸´Ô¡£Ñ§ÌÃÒÑÆðÍ·ÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬ÌṩÁ½ÄêÐÅÓþ¼à¿Ø·þÎñ£¬²¢ÉèÁ¢ºô½ÐÖÐÐĽâ´ðÎÊÌâ¡£
https://therecord.media/baltimore-public-schools-data-breach-ransomware
2. Âêɯ°Ù»õÔâÍøÂç¹¥»÷£¬µ¼Ö¹˿Ͷ©µ¥ÑÓ³¤
4ÔÂ22ÈÕ£¬Ó¢¹ú¿ç¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©½üÈÕÔâ·êÍøÂç¹¥»÷£¬¶ÔÆäÔËÓªÔì³É¿Ï¶¨×ÌÈÅ£¬ÓÈÆäÊÇClick and Collect¶©µ¥ÏµÍ³¡£Âêɯ°Ù»õÔÚÈ«ÇòÕ¼ÓÐ1400¶à¼ÒÃŵ꣬Ա¹¤×ÜÊý´ï6.4ÍòÃû£¬ÒÔÏúÊÛ·þ×°¡¢Ê³Æ·ºÍ¼Ò¾ÓÓÃÆ·µÈ¶àÑù»¯²úÆ·¶øÎÅÃû¡£ÔÚÂ×¶ØÖ¤È¯ÂòÂôËù°ä²¼µÄÐÂΟåÖУ¬Âêɯ°Ù»õ֤ʵÁËÕâ´ÎÍøÂ簲ȫÊÂÎñ£¬²¢°µÊ¾ÔÚÓëÍøÂ簲ȫר¼ÒçÇÃܺÏ×÷£¬ÒÔÖÎÀíºÍ½â¾öÕâÒ»´¹Î£Çé¿ö¡£¹«Ë¾ÒѲÉÈ¡Ó×¹æÄ£Ò»Ê±µ÷Õû´ëÊ©±£»¤¹Ë¿ÍºÍÒµÎñ°²È«£¬²¢¶Ô´ËÔì³ÉµÄ²»±ãÉî±íǸÒâ¡£Ö»¹ÜÃæ¶ÔÌôÕ½£¬Âêɯ°Ù»õµÄÃÅµê¡¢ÍøÕ¾ºÍÀûÓ÷¨Ê½ÈÔÔÚÕý³£ÔËÓª¡£¹«Ë¾ÒÑÀñƸ±í²¿ÍøÂ簲ȫר¼ÒÐÖúµ÷²é£¬²¢²ÉÈ¡´ëÊ©½øÒ»²½±£»¤ÆäÍøÂ磬ȷ±£¿Í»§·þÎñ²»ÊÜÓ°Ïì¡£Âêɯ°Ù»õÒÑ֪ͨÊý¾Ý±£»¤¼à¶½»ú¹¹ºÍ¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¬µ«Î´Ìá¹©ÍøÂçÊÂÎñµÄ¾ßÌåϸ½Ú¡£Ö»¹ÜĿǰÉÐÎÞÀÕË÷Èí¼þÍÅ»ï»òÆäËûÍþвÐÐΪÕßÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬µ«ÈôÕâ´Î¹¥»÷Éæ¼°ÀÕË÷Èí¼þ£¬Êý¾ÝºÜ¿ÉÄÜÒѱ»µÁÈ¡£¬²¢¿ÉÄܱ»ÓÃ×÷½øÒ»²½Ê©Ñ¹¹«Ë¾Ö§¸¶ÀÕË÷½ðµÄ³ïÂë¡£Âêɯ°Ù»õÒÑÏòÊÜÓ°Ïì¿Í»§ÖÂǸ£¬²¢³Ðŵ¾¡¿ì¸´ÔÕý³£·þÎñ¡£
https://www.bleepingcomputer.com/news/security/marks-and-spencer-confirms-a-cyberattack-as-customers-face-delayed-orders/
3. SK TelecomÔâ¶ñÒâÈí¼þ¹¥»÷£¬¿Í»§USIMÐÅÏ¢Ãæ¶Ô·çÏÕ
4ÔÂ22ÈÕ£¬º«¹ú×î´óÒÆ¶¯ÔËÓªÉÌSK Telecom½üÈÕÔâ·êÍøÂç¹¥»÷£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÈí¼þϰȾ»ñÈ¡Á˿ͻ§Ãô¸ÐµÄUSIMÓйØÐÅÏ¢¡£Õâ´Î¹¥»÷²úÉúÔÚ±¾µØ¹¦·ò2025Äê4ÔÂ19ÈÕÐÇÆÚÁùÍíÉÏ11µã£¬ÕýÖµÖÜÄ©ÇÒÎÞÊý×éÖ¯ÈËÊÖ²»¼°Ö®¼Ê¡£SK TelecomѸ¿ìÏìÓ¦£¬ÔÚ·¢ÏÖ¶ñÒâÈí¼þºóµ±¼´É¾³ý²¢¸ôÀëÁËÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄÉ豸¡£½ØÖÁĿǰ£¬ÉÐδȷÈÏй¶ÐÅÏ¢±»ÀÄÓõݸÀý¡£Õâ´ÎÊÂÎñÒýÆðÁ˺«¹ú»¥ÁªÍø°²È«¾Ö£¨KISA£©ºÍ¸Ã¹úÓ×ÎÒÐÅÏ¢±£»¤Î¯Ô±»áµÄ¸ß¶È¹Ø×¢£¬µ÷²éÔÚ½øÐÐÖУ¬ÈëÇֵľßÌåÔÒò¡¢¹æÄ£»òÁìÓòÉÐδȷ¶¨¡£USIMÊý¾ÝÔ̺¬¹ú¼ÊÒÆ¶¯Óû§¼ø±ðÂë¡¢ÒÆ¶¯Õ¾ISDNºÅÂëµÈÃô¸ÐÐÅÏ¢£¬ÕâЩÊý¾ÝÒ»µ©Ð¹Â¶£¬¿ÉÄܱ»ÓÃÓÚÓÐÕë¶ÔÐԵļල¡¢¸ú×ÙºÍSIM¿¨»¥»»¹¥»÷¡£ÎªÓ¦¶ÔÕâ´Î¹¥»÷£¬SK TelecomÒѼÓÇ¿¶ÔUSIM»¥»»ºÍÒì³£Éí·ÝÑéÖ¤³¢ÊÔµÄ×èÖ¹£¬²¢½«µ±¼´ÔÝÍ£Óë¿ÉÒɻÓйصÄÕË»§·þÎñ¡£Í¬Ê±£¬½¨ÒéÓû§Í¨¹ýÖ¸¶¨ÃÅ»§×¢²áUSIM±£»¤·þÎñ£¬ÒÔÔ¤·ÀÊÖ»úºÅÂë±»·¸·¨ÒÆÖ²µ½ÁíÒ»ÕÅSIM¿¨ÉÏ¡£Ä¿Ç°£¬ÉÐÎÞÍþвÐÐΪÕß¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£
https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/
4. Active! MailÁãÈÕ·ì϶Ôâ»ý¼«ÀûÓã¬ÈÕ±¾¶à»ú¹¹ÊÜÓ°Ïì
4ÔÂ22ÈÕ£¬Active! Mail´æÔÚÑϳÁÁãÈÕÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-42599£¬CVSS v3ÆÀ·Ö9.8£©£¬Õý±»»ý¼«ÀûÓÃÓÚÕë¶ÔÈÕ±¾´óÐÍ×éÖ¯µÄ¹¥»÷¡£¸Ã·ì϶ӰÏìËùÓа汾Active!£¬Ô̺¬ËùÓÐÊÜÖ§³Ö²Ù×÷ϵͳƽ̨Éϵġ°BuildInfo£º6.60.05008561¡±£¬ÈôÔ¶³ÌµÚÈý·½·¢ËͶñÒâÒªÇó£¬Ôò¿ÉÄÜÖ´ÐÐËÁÒâ´úÂë»ò´¥·¢»Ø¾ø·þÎñǰÌá¡£Active!mail×÷Ϊ»ùÓÚÍøÂçµÄµç×ÓÓʼþ¿Í»§¶Ë£¬ËäÔÚÈ«ÇòÁìÓòÄÚ²»ÈçGmail»òOutlook¿í·ºÊ¹Ó㬵«ÔÚÈÕ±¾´óÐÍÆóÒµ¡¢´óѧ¡¢µ±¾Ö»ú¹¹ºÍÒøÐеÄÈÕÓï»·¾³Öг£±»ÓÃ×÷Ⱥ¼þ×é¼þ£¬Òѱ»³¬¹ý2,250¸ö×é֯ѡȡ£¬Õ¼Óг¬¹ý11,000,000¸öÕÊ»§£¬ÊǸùúóÒ×ÍøÂçÓʼþÊг¡µÄ³ÁÒª²Î¼ÓÕß¡£ÈÕ±¾CERTÒÑÈ·Èϸ÷ì϶´¦ÓÚ»îÔ¾ÀûÓÃ״̬£¬²¢¶½´ÙËùÓÐЧ»§¾¡¿ì¸üÐÂÖÁActive!Mail 6 BuildInfo: 6.60.06008562¡£ÈÕ±¾ÍøÂçÍйܺÍIT·þÎñÌṩÉÌKagoya Japan¼°WADAX¾ù»ã±¨ÁËÒòÊÔIJÀûÓø÷ì϶Ôì³ÉµÄ·þÎñÖжϣ¬²¢ÒÑÁÙʱÖÕ³¡Active!Óʼþ·þÎñ¡£´Ë±í£¬Macnica°²È«×êÑÐÔ±Ö¸³ö£¬ÖÁÉÙÓÐ227̨¶³öÔÚ»¥ÁªÍøÉϵÄActive!·þÎñÆ÷¿ÉÄÜÊܵ½¹¥»÷£¬ÆäÖÐ63̨ÔÚ´óѧʹÓá£ÈÕ±¾CERTΪÎÞ·¨µ±¼´ÀûÓð²È«¸üеÄÓû§Ìá³öÁ˾ßÌ建½â´ëÊ©£¬ÒÔÓ¦¶Ô´Ë·ì϶´øÀ´µÄÍþв¡£
https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/
5. ÀÕË÷Èí¼þÖÂÁ½Ò½ÁƱ£½¡×éÖ¯Êý¾Ýй¶£¬³¬24ÍòÈËÊÜÓ°Ïì
4ÔÂ22ÈÕ£¬½üÆÚ£¬Á½¼ÒÒ½ÁƱ£½¡×éÖ¯Ïà¼ÌÈ·ÈÏÔÚÔâ·êÀÕË÷Èí¼þ¹¥»÷ºó³öÏÖÊý¾Ýй¶£¬Ó°ÏìÈËÊý¾ù³¬¹ý10Íò¡£Î»ÓÚÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ±´¶û¾È»¤³µ¹«Ë¾£¬ÔÚ2025Äê2ÔÂ13ÈÕ¼ì²âµ½ÍøÂçÈëÇÖ£¬ºÚ¿Í»ñÈ¡ÁËÔ̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂë¼°¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢µÄÎļþ£¬ÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿Êý¾ÝÏÔʾ£¬Õâ´ÎÊÂÎñÓ°ÏìÁË114,000ÈË¡£ÃÀ¶ÅɯÀÕË÷Èí¼þ×éÖ¯Ðû³Æ´Ó±´¶û¾È»¤³µÇÔÈ¡Á˳¬¹ý200GBµÄÊý¾Ý¡£ÁíÒ»¼ÒÊÜÓ°ÏìµÄÒ½ÁƱ£½¡×éÖ¯ÊÇλÓÚ°¢À°ÍÂíÖݲ®Ã÷º²µÄÑÛ¿ÆÕïËù°¢À°ÍÂíÑÛ¿ÆÐ»á¡£¸ÃÕïËùÓÚ4ÔÂ10ÈÕй©£¬ÏÖÓкÍÒÔǰ»¼ÕßµÄÓ×ÎÒ¼°Êܱ£»¤½¡È«ÐÅÏ¢Ô⵽й¶£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÕÕÐÅÏ¢¡¢Éç»á°²È«ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ½¡È«±£ÏÕÐÅÏ¢µÈ¡£¸Ã×éÖ¯ÓÚ1ÔÂ30ÈÕ·¢ÏÖÍøÂç·ì϶£¬ºÚ¿Í×Ô1ÔÂ22ÈÕÆð¼´¿É½Ó¼ûÆäϵͳ¡£BianLianÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬¾ÝÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿Êý¾ÝÏÔʾ£¬¸ÃÊÂÎñÓ°ÏìÁ˳¬¹ý131,000ÈË¡£È¥Ä꣬ÃÀ¹ú²úÉúÁË700¶àÆðÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ£¬Ð¹Â¶µÄ¼Í¼×ÜÊý³¬¹ý1.8ÒÚÌõ¡£
https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/
6. Elusive CometºÚ¿Í×éÖ¯ÀûÓÃZoomÖ´ÐÐÉç»á¹¤³Ì¹¥»÷
4ÔÂ22ÈÕ£¬½üÆÚ£¬Ò»¸öÃûΪ¡°Elusive Comet¡±µÄºÚ¿Í×éÖ¯Õë¶Ô¼ÓÃÜÇ®±ÒÓû§ÌáÒéÉç»á¹¤³Ì¹¥»÷£¬Í¨¹ýZoomµÄÔ¶³Ì½ÚÔìÖ°ÄÜÓÕÆÓû§ÊÚÓèÆä½Ó¼ûȨÏÞ¡£¸Ã×éÖ¯·ÂÕÕLazarusºÚ¿Í×éÖ¯ÔÚ15ÒÚÃÀÔªBybit¼ÓÃÜÇ®±Ò͵ÇÔ°¸ÖÐʹÓõļ¼Êõ£¬°Ñ³ÖºÏ·¨¹¤×÷Á÷³ÌÖ´Ðй¥»÷¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵĿþÀÜÕË»§»òµç×ÓÓʼþ£¬ÒÔ¡°Åí²©¼ÓÃÜÇ®±Ò¡±²É·ÃÔ¼ÇëΪ»Ï×Ó£¬Ïò¸ß¼ÛÖµÖ¸±ê·¢ËÍCalendlyÁ´½Ó£¬ÆÌÅÅZoom»áÒé¡£ÓÉÓÚÔ¼ÇëÁ´½ÓÕæÊµÓÐЧ£¬½µµÍÁËÖ¸±êµÄÒÉ»óˮƽ¡£ÔÚZoomͨ»°ÆÚ¼ä£¬¹¥»÷ÕßÌáÒéÆÁÄ»¹²Ïí»á»°£¬²¢½«ÆäZoomÏÔʾÃû³Æ³Á¶¨ÃûΪ¡°Zoom¡±£¬Ê¹Êܺ¦ÕßÎóÒÔΪҪÇóÀ´×ÔÀûÓ÷¨Ê½×ÔÉí£¬´Ó¶øºË×¼Ô¶³Ì½ÚÔìÒªÇó¡£Ò»µ©»ñµÃ½ÚÔìȨ£¬¹¥»÷Õß±ã¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢×°ÖöñÒâÈí¼þ¡¢½Ó¼ûÎļþ»òÌáÒé¼ÓÃÜÂòÂô¡£ËûÃÇ»¹¿ÉÄÜѸ¿ìÖ²ÈëÒþÃØºóÃÅ£¬³ÉÁ¢ÓƾýӼûȨÏÞ£¬ÒÔ±ãÈÕºóÀûÓá£Trail of Bits¹«Ë¾Ö¸³ö£¬Õâ´Î¹¥»÷µÄȨÏÞ¶Ô»°¿òÓëÆäËûÎÞº¦µÄZoom֪ͨÀàËÆ£¬Óû§¿ÉÄÜÔÚ²»Ïàʶºó¹ûµÄÇé¿öÏÂÊÚÓèÍÆËã»úÆëÈ«½ÚÔìȨ¡£Îª·ÀÓù´ËÀàÍþв£¬¸Ã¹«Ë¾½¨ÒéÖ´ÐÐϵͳÁìÓòµÄÒþÖÔÆ«ºÃÕ½Êõ½ÚÔìÅäÖÃÎļþ£¬Ô¤·À¿É½Ó¼ûÐÔ½Ó¼û£¬²¢½¨Ò鰲ȫ¹Ø¼üÐÍ»·¾³ºÍ´¦ÖùóÖØÊý×Ö×ʲúµÄ×éÖ¯ÆëÈ«ÒÆ³ýZoom¿Í»§¶Ë£¬ÒÔ½µµÍ·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/hackers-abuse-zoom-remote-control-feature-for-crypto-theft-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ