¼ÓÖÝÀ¶¶Ü±£ÏÕ¹«Ë¾Ïò¹È¸èй¶ÁË470ÍòÃû»áÔ±µÄ½¡È«Êý¾Ý

°ä²¼¹¦·ò 2025-04-24

1. ¼ÓÖÝÀ¶¶Ü±£ÏÕ¹«Ë¾Ïò¹È¸èй¶ÁË470ÍòÃû»áÔ±µÄ½¡È«Êý¾Ý


4ÔÂ23ÈÕ£¬¼ÓÖÝÀ¶¶Ü±£ÏÕ¹«Ë¾½üÆÚÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬Æä470Íò»áÔ±µÄÊܱ£»¤½¡È«ÐÅÏ¢±»Ð¹Â¶¸ø¹È¸èµÄ·ÖÎöºÍ¸æ°×ƽ̨¡£×÷ΪΪ¼ÓÖݽü600Íò»áÔ±Ìṩ·þÎñµÄ·ÇͶ»úÐÔ½¡È«´òË㣬À¶¶ÜÔÚÍøÕ¾Éϰ䲼ÁËÊý¾Ýй¶֪ͨ£¬Ö¸³ö»áÔ±Êý¾ÝÔÚ2021Äê4ÔÂÖÁ2024Äê1ÔÂÆÚ¼äÔ⵽й¶¡£ÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿Ð¹ÃÜÃÅ»§ÍøÕ¾Ò²¶ÔÕâ´ÎÊÂÎñ½øÐÐÁ˸üУ¬È·ÈÏÁË470ÍòÃû»áÔ±µÄÊܱ£»¤½¡È«Êý¾Ý¶³ö¡£Õâ´Îй¶ԴÓÚBlue ShieldÍøÕ¾ÉÏGoogle AnalyticsÅäÖÃÃýÎ󣬵¼ÖÂÃô¸ÐÊý¾Ý¿ÉÄܱ»¹²Ïí¸ø¹È¸è¸æ°×ƽ̨ºÍ¸æ°×ÉÌ¡£Í¨ÖªÖÐÃ÷È·Ìáµ½£¬2025Äê2ÔÂ11ÈÕ£¬À¶¶Ü·¢ÏÖGoogle AnalyticsµÄÅäÖ÷½Ê½ÔÊÐíijЩ»áÔ±Êý¾ÝÓëGoogle Ads¹²Ïí£¬ÆäÖпÉÄÜÔ̺¬Êܱ£»¤µÄ½¡È«ÐÅÏ¢£¬¹È¸è¿ÉÄÜÀûÓÃÕâЩÊý¾Ý·¢Õ¹ÓÐÕë¶ÔÐԵĸæ°×»î¶¯¡£Â¶³öµÄÊý¾ÝÀàÐÍÔ̺¬±£ÏÕ´òËãÃû³Æ¡¢ÀàÐͺÍ×éºÅ¡¢³ÇÊкÍÓÊÕþ±àÂë¡¢ÐԱ𡢼ÒÍ¥¹æÄ£µÈ£¬»¹ÓÐÒ½ÁÆË÷Åâ·þÎñÈÕÆÚ¡¢·þÎñÌṩÕß¡¢»¼ÕßÐÕÃû¼°²ÆÕþÔðÈεÈÒ½ÁÆÓйØÊý¾Ý£¬ÒÔ¼°¡°Ñ°ÕÒÒ½Éú¡±ËÑË÷ǰÌáºÍÁ˾ֵÈ¡£²»Í⣬À¶¶ÜÇ¿µ÷£¬ÆäËûÓ×ÎÒÐÅÏ¢ÈçÉç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢ÒøÐкÍÐÅÓþ¿¨ÐÅÏ¢²¢Î´Òò¶ø´ÎÊÂÎñй¶¡£


https://www.bleepingcomputer.com/news/security/blue-shield-of-california-leaked-health-data-of-47-million-members-to-google/


2. ¶íÂÞ˹¾ü¶ÓÔâµØÄ²ÀûÓÃÖаµ²ØµÄÐÂÐÍAndroid¶ñÒâÈí¼þ¹¥»÷


4ÔÂ23ÈÕ£¬½üÈÕ£¬×êÑÐÈËÔ±ÔÚAlpine QuestµØÄ²ÀûÓ÷¨Ê½µÄľÂí°æ±¾Öз¢ÏÖÁËÒ»ÖÖÐÂÐÍAndroid¶ñÒâÈí¼þ¡£¾ÝϤ£¬¶íÂÞ˹ʿ±øÔøÊ¹ÓøÃÀûÓ÷¨Ê½×÷ÎªÕ½Çø×÷Õ½¹æ»®¹¤¾ß¡£¹¥»÷Õß½«´ËľÂí¼Ù×°³É¸ß¼¶Alpine Quest ProµÄÃâ·ÑÆÆ½â°æ£¬²¢Í¨¹ýTelegramƵ·ºÍ¶íÂÞ˹ÀûÓ÷¨Ê½Ä¿Â¼½øÐд«²¼¡£AlpineQuestÊÇÒ»¿îºÏ·¨µÄAndroid GPSºÍµØÐÎ²â»æÀûÓã¬ÉîÊÜðÏÕ¼Ò¡¢»î´øÍ·¡¢ËѾȶӼ°¾üÊÂÈËÔ±Çàíù£¬ÒòÆäÀëÏßÖ°Äܺ;«È·¶È¶ø±¸ÊÜÔÞÃÀ¡£¸ÃÀûÓÃÌṩÁ½¸ö°æ±¾£ºÖ°ÄÜÊÜÏÞµÄÃâ·Ñ¾«¼ò°æºÍÎÞ¸ú×Ù¿â¡¢·ÖÎö¼°¸æ°×µÄÃâ·Ñרҵ°æ¡£Õâ¿î¼äµýÈí¼þÓɶíÂÞË¹ÒÆ¶¯·À²¡¶¾¹«Ë¾Doctor WebµÄ×êÑÐÈËÔ±·¢ÏÖ£¬ËüÆæÃîµØ°µ²ØÔÚÖ°ÄÜÆëÈ«µÄAlpine QuestÀûÓÃÖУ¬ÒԴ˽µµÍÓû§Òɻ󣬲¢ËÅ»úÇÔÈ¡Êý¾Ý¡£Ò»µ©Æô¶¯£¬¼äµýÈí¼þ±ãÊÔͼÇÔÈ¡É豸ÖеÄͨѶÊý¾ÝºÍÃô¸ÐÎļþ£¬¿ÉÄÜй¶¾ü¶ÓÐж¯Ï¸½Ú£¬Ô̺¬·¢ËÍÓû§µç»°ºÅÂë¡¢ÁªÏµÈË¡¢µØÀíµØÎ»¡¢ÎļþÐÅÏ¢¼°ÀûÓð汾ÖÁ¹¥»÷Õߣ¬ÊµÊ±¼à¿ØµØÎ»±ä¶¯²¢¸üÐÂÖÁTelegram»úеÈË£¬ÏÂÔØ¶î±íÄ£¿éÇÔÈ¡»úÃÜÎļþ£¬ÓÈÆäÊÇͨ¹ýTelegramºÍWhatsApp·¢Ë͵ÄÎļþ£¬ÒÔ¼°´ÓAlpine QuestÖÐÌáÈ¡Ô̺¬µØÎ»º¹ÇàÈÕÖ¾µÄ¡°locLog¡±Îļþ¡£


https://www.bleepingcomputer.com/news/security/russian-army-targeted-by-new-android-malware-hidden-in-mapping-app/


3. Kelly BenefitsÅû¶ӰÏ쳬26ÍòÈËÊý¾Ýй¶ÊÂÎñ


4ÔÂ23ÈÕ£¬×ܲ¿Î»ÓÚÂíÀïÀ¼Öݵĸ£ÀûºÍ¹¤×ʽâ¾ö¹æ»®ÌṩÉÌKelly & Associates Insurance Group£¨ÒÔdba Kelly BenefitsÔËÓª£©½üÈÕÅû¶ÁËһ·ӰÏ쳬¹ý26ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾ÎªÂíÀïÀ¼Öݼ°Öܱ߸÷ÖÝÌṩ¸£ÀûÖÎÀí¡¢¼¼Êõ¡¢¾­¼ÍºÍÕ÷ѯ·þÎñÒÔ¼°¹¤×ʽâ¾ö¹æ»®¡£ÆäÍøÕ¾Éϰ䲼µÄÊý¾Ý°²È«Í¨ÖªÏÔʾ£¬¹«Ë¾×î½ü¼ì²âµ½ÆäÍøÂçÉÏ´æÔÚ¿ÉÒɻ£¬µ÷²éÏÔʾºÚ¿ÍÔÚ2024Äê12ÔÂ12ÈÕÖÁ12ÔÂ17ÈÕÆÚ¼ä½Ó¼ûÁËÆäϵͳ£¬²¢ÔÚ´ËÆÚ¼äй¶ÁËijЩÎļþ£¬ÕâЩÎļþÔ̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂ롢˰ºÅ¡¢Ò½ÁÆÐÅÏ¢¡¢½¡È«±£ÏÕÐÅÏ¢ºÍ½ðÈÚÕË»§ÐÅÏ¢µÈÓ×ÎÒÐÅÏ¢¡£ÊÜÓ°ÏìµÄÓ×ÎÒÒÑÊÕµ½Í¨Öª£¬Kelly Benefits´ú±í¶à¼ÒÊÜÓ°ÏìµÄ¿Í»§·¢³ö֪ͨ£¬Ô̺¬Amergis¡¢Beam Benefits¡¢Beltway CompaniesµÈ¡£¸Ã¹«Ë¾ÏòÃåÒòÖÝ×ܼì²ì³¤°µÊ¾£¬Õâ´ÎÊý¾Ýй¶ӰÏìÁ˽ü264,000ÈË¡£Ö»¹Ü´Ë¹«Ë¾¿ÉÄÜÔâ·êÁËÀÕË÷Èí¼þ¹¥»÷£¬µ«Ä¿Ç°ÉÐÎÞÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶÔÕâ´ÎºÚ¿Í¹¥»÷ÕÆ¹Ü¡£Ë¼¿¼µ½ÊÂÎñ²úÉúÔÚ¼¸¸öÔÂǰ£¬ÈôÊǸù«Ë¾µÄÈ·Ôâ·êÁËÀÕË÷Èí¼þ¹¥»÷£¬ÄÇô¿ÉÄÜÒѾ­Ö§¸¶ÁËÊê½ðÒÔÔ¤·ÀÊý¾Ýй¶µÄ½øÒ»²½¹«¿ª¡£Ä¿Ç°£¬¸Ã¹«Ë¾ÔÚ²ÉÈ¡´ëÊ©¼ÓÇ¿ÆäÍøÂ簲ȫ·À»¤£¬ÒÔÔ¤·À½«À´²úÉúÀàËÆÊÂÎñ¡£


https://www.securityweek.com/kelly-benefits-data-breach-impacts-260000-people/


4. Onsite Mammography³¬35ÍòÈËÐÅÏ¢Ôâй¶


4ÔÂ23ÈÕ£¬ÂíÈøÖîÈûÖÝÒ½ÁÆ·þÎñÌṩÉÌOnsite Mammography£¨ÒÔOnsite Women's HealthÆ·ÅÆÔËÓª£©½üÈÕ֪ͨ³¬¹ý35ÍòÈË£¬ÆäÓ×ÎҺͽ¡È«ÐÅÏ¢ÔÚÊý¾Ýй¶ÖÐÔ⵽й¶¡£¸ÃÊÂÎñÓÚ2024Äê10Ô·¢ÏÖ£¬É漰δ¾­ÊÚȨ½Ó¼ûÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬µ¼ÖÂÊÕ¼þÏäÖеÄijЩµç×ÓÓʼþй¶ÁËÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÊܱ£»¤µÄ½¡È«ÐÅÏ¢£¨PHI£©¡£2025Äê2ÔÂʵÏֵĶÔй¶ÐÅÏ¢µÄÉó²éÈ·¶¨£¬ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢ÐÅÓþ¿¨ºÅÂëÒÔ¼°ÐÄÁéºÍÉí¶Î½¡È«ÐÅÏ¢µÈ¾ùÔ⵽й¶¡£Onsite°µÊ¾£¬µ÷²é½øÒ»²½ÏÔʾ£¬¸ÃÐÐΪÕßÖ»ÄܽӼûµç×ÓÓʼþÕÊ»§£¬¶øÎÞ·¨½Ó¼ûÍøÂçÖеÄÈÎºÎÆäËûϵͳ¡£¸ÃÒ½ÁÆ·þÎñÌṩÉÌÒÑ֪ͨÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ£¬ÓÐ357,265Ãû»¼ÕßÊܵ½Ó°Ï죬²¢ÎªËûÃÇÌṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£Onsite°µÊ¾£¬Ã»ÓÐÀíÓÉÏàÐÅÀµºÎÐÅÏ¢ÒòÕâÆðÊÂÎñ¶ø±»ÀÄÓûò½«±»ÀÄÓá£ÊÂÎñ²úÉúºó£¬Onsiteµ±¼´²ÉÈ¡ÁËÐж¯£¬ÀñƸÁËÍøÂ簲ȫר¼Ò£¬Í¨ÖªÁË·¨Âɲ¿ÃÅ£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄÓ×ÎÒ£¬½«³ÖÐøÈ«Á¦ÊØ»¤»¼ÕßµÄÒþÖÔºÍÊý¾Ý°²È«¡£


https://www.securityweek.com/data-breach-at-onsite-mammography-impacts-350000/


5. WorkComposer¼à¿Ø¹¤¾ßʵʱй¶Êý°ÙÍòÃô¸Ð½ØÍ¼


4ÔÂ23ÈÕ£¬Ò»ÖÖÓÃÓڼලԱ¹¤µÄ¼à¿Ø¹¤¾ßWorkComposerÕý½«Êý°ÙÍòÕÅʵʱ½ØÍ¼Ð¹Â¶µ½Ê¢¿ªÍøÂç¡£¸ÃÀûÓÃÖ¼ÔÚͨ¹ý¼Í¼»î¶¯ºÍ½ØÈ¡ÆÁÄ»¿ìÕÕÀ´¸ú×Ù¹¤×÷ЧÄÜ£¬È´½«³¬¹ý2100ÍòÕÅͼƬ¶³öÔÚ²»°²È«µÄAmazon S3´æ´¢Í°ÖУ¬ÖðÖ¡²¥·ÅÁËÔ±¹¤µÄÈÕ³£¹¤×÷¡£Ð¹Â¶Êý¾Ý¼«ÆäÃô¸Ð£¬Ô̺¬µç×ÓÓʼþ¡¢ÄÚ²¿Ì¸Ìì¡¢»úÃÜóÒ×ÎļþµÄÈ«ÆÁ½ØÍ¼£¬ÒÔ¼°µÇÂ¼Ò³Ãæ¡¢Í´´¦¡¢APIÃÜÔ¿µÈ¿ÉÄܱ»ÀûÓÃÀ´¹¥»÷È«ÇòÆóÒµµÄÃô¸ÐÐÅÏ¢¡£Õâ´ÎйÃÜÊÂÎñ͹ÏÔÁ˵±¸ù»ù°²È«´ëÊ©±»ºöÊÓʱ£¬¹¦·ò¸ú×Ù¹¤¾ß½«±äµÃ¶àôΣÏÕ£¬ÈÕ³£¹¤×÷»î¶¯Ôì³ÉÁËÍøÂç·¸×ï·Ö×ӵĽð¿ó¡£²¶»ñµÇÂ¼Ò³Ãæ¡¢µç×ÓÓʼþÊÕ¼þÏä¡¢ÄÚ²¿ÐÂÎÅÆ½Ì¨ºÍ²ÆÕþÎļþµÄÆÁÄ»½ØÍ¼£¬Äܹ»ÈÃÈËÏàʶ¹«Ë¾¼°ÆäÔ±¹¤µÄÄÚ²¿ÔË×÷Çé¿ö¡£Ò»ÕŶ³öµÄÆÁÄ»½ØÍ¼£¬ÏÔʾ¿É¼ûµÄÃÜÂë¡¢APIÃÜÔ¿»òÃô¸Ð¶Ô»°£¬¿ÉÄܻᵼÖÂÆ¾Ö¤ÍµÇÔ¡¢ÍøÂç´¹µö¹¥»÷£¬ÉõÖÁÆóÒµ¼äµý»î¶¯¡£Ð¹Â©µÄʵʱÐÔ·Å´óÁËΣÏÕ£¬ÍþвÐÐΪÕßÄܹ»ËæÊ±¼à¿ØÔÚ·¢Õ¹µÄÒµÎñÔËÓª£¬´Ó¶ø½Ó¼ûÕý±¾Ëø¶¨µÄ»·¾³¡£³ýÁËÖ±½ÓµÄÍøÂ簲ȫ·çÏÕ±í£¬»¹´æÔÚÑϳÁµÄÒþÖÔ¼Óº¦ÎÊÌâ¡£¹¦·ò×·×Ù¹¤¾ßÔçÒÑÏÝÈ뷵µÄÄà̶£¬ËüÃÇ´ò×ųö²úÁ¦µÄ°µºÅ£¬¾«È·¼Í¼Ա¹¤µÄÿһ·ÖÖÓÊý×ÖÐÐΪ¡£Ô±¹¤ÎÞ·¨½ÚÔìÕâЩ½ØÍ¼×îÖÕ»áÔ̺¬ÄÄЩÄÚÈÝ£¬Ò×Êܹ¥»÷µÄ²»½ö½öÊǹ«Ë¾Êý¾Ý£¬»¹ÓÐÓ×ÎÒ¡£


https://cybernews.com/security/employee-monitoring-app-leaks-millions-screenshots/


6. 2024ÄêÒÁÀÊÍþв×éÖ¯Õë¶ÔÒÔÉ«ÁеĶàά¶ÈÍøÂç¹¥»÷»î¶¯


4ÔÂ23ÈÕ£¬2024Ä꣬ÒÁÀÊÍþв×éÖ¯¶ÔÒÔÉ«Áз¢Õ¹¶àÂÖÍøÂç¹¥»÷£¬ÊÖ·¨¶àÑùÇÒÒñ±Î¡£ÓëÒÁÀʽáÃ˵ÄÍþв×éÖ¯UNC2428ÔÚ10ÔÂÒÔÕÐÆ¸Îª»Ï×Ó£¬Í¨¹ý·ÂðÒÔÉ«Áйú·À³Ð°üÉÌÀ­ì³¶û£¨Rafael£©ÍøÕ¾£¬ÓÕµ¼Óû§ÏÂÔØ¼Ù×°³É¡°ÇóÖ°¸¨Öú¹¤¾ß¡±µÄ¶ñÒâÈí¼þ¡°RafaelConnect.exe¡±£¬¸ÃÈí¼þʵΪLONEFLEET×°Ö÷¨Ê½£¬¿É¼¤»îMURKYTOURºóÃÅ£¬Ê¹¹¥»÷Õß»ñµÃ¶ÔÊÜϰȾÉ豸µÄ³ÖÐø½Ó¼ûȨÏÞ¡£´Ë±í£¬ÒÁÀÊÍþв×éÖ¯ºÚÓ°£¨Black Shadow£©ÒÔ¹¥»÷ÒÔÉ«ÁжàÁìÓò¶øÎÅÃû£¬Cyber Toufan×é֯ʹÓÃרÓвÁ³ýÆ÷POKYBLIGHT£¬UNC3313Ôòͨ¹ý´¹µö¹¥»÷½øÐмලºÍÐÅÏ¢ÍøÂ磬²¢·Ö·¢JELLYBEANͶ·ÅÆ÷ºÍCANDYBOXºóÃÅ£¬ÀÄÓÃ9ÖֺϷ¨Ô¶³Ì¼à¿Ø¹¤¾ß¶ã±Ü¼ì²â¡£7Ô£¬ÒÉËÆÒÁÀʲ¼¾°µÄ¹¥»÷Õß¼Ù×°³ÉPalo Alto NetworksµÄGlobalProtectÔ¶³Ì½Ó¼ûÈí¼þ×°Öðü£¬°µÖв¿Êð.NETºóÃÅCACTUSPAL¡£Í¬Ê±£¬ÒÁÀÊÍþв×éÖ¯»¹Í¨¹ýÔÆ»ù´¡ÉèÊ©¼ÓÇ¿Òñ±ÎÐÔ£¬ÈçÀûÓÃÆ´Ð´ÃýÎóÓòÃû»ò¸´ÓúϷ¨ÓòÃûÍйÜC2½Úµã£¬ÒÔ¼°Î±Ôì³ÛÃû¹«Ë¾µÇÂ¼Ò³ÃæÇÔȡƾ֤¡£MandiantÖҸ棬ÒÁÀÊÓйØÍþв×éÖ¯½«³ÖÐøµ÷ÕûÕ½Êõ¼¿Á©ÒÔÊʸõ±Ç°¾ÖÊÆ¡£


https://thehackernews.com/2025/04/iran-linked-hackers-target-israel-with.html