Urban OneÔâÉç»á¹¤³Ì¹¥»÷µ¼ÖÂÊý¾Ýй¶

°ä²¼¹¦·ò 2025-04-30

1. Urban OneÔâÉç»á¹¤³Ì¹¥»÷µ¼ÖÂÊý¾Ýй¶


4ÔÂ29ÈÕ£¬Ã½Ì弯ÍÅUrban One½üÈջ㱨ÁËһ·Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°Ô±¹¤µÈÓ×ÎÒÐÅÏ¢¡£Õâ¼Ò×ܲ¿Î»ÓÚÂíÀïÀ¼ÖݵÄýÌ幫˾ÏòµÂ¿ËÈøË¹ÖݺÍÂíÈøÖîÈûÖÝÌá½»µÄÎ¥¹æÍ¨ÖªÐÅÏÔʾ£¬ÍøÂç¹¥»÷ʼÓÚ2ÔÂ13ÈÕ£¬Í¨¹ý¡°¸´ÔÓµÄÉç»á¹¤³Ì»î¶¯¡±ÌáÒ飬ºÚ¿Í³É¹¦ÇÔÈ¡Á˹«Ë¾Êý¾Ý£¬µ«¹«Ë¾Ö±ÖÁ3ÔÂ15Èղŷ¢ÏÖ¡£Ö»¹Ü¸ÃÊÂÎñδ¶Ô¹«Ë¾ÔËÓªÔì³ÉÓ°Ï죬µ«3ÔÂ30Èյķ¨Ò½µ÷²é֤ʵÊý¾ÝÈ·Òѱ»ÇÔ¡£Õâ´Î¹¥»÷ÇÔÈ¡µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢µØÖ·¡¢Éç±£ºÅÂë¡¢Ö±½Ó´æ¿îÐÅÏ¢ºÍW-2±í¸ñÐÅÏ¢µÈ¡£¾Ý»ã±¨£¬µÂ¿ËÈøË¹ÖÝÓÐ355ÈËÊܵ½Ó°Ï죬¶ø¹«Ë¾ÉÐδ¶ÔÖÃÆÀÒªÇó×÷³ö»ØÓ¦¡£ÎªÌí²¹Êܺ¦ÕßËðʧ£¬¹«Ë¾½«ÎªÊܺ¦ÕßÌṩÁ½ÄêµÄÐÅÓþ¼à¿Ø·þÎñ£¬²¢ÒÑÁªÏµ·¨Âɲ¿ÃÅȾָµ÷²é¡£Urban One×÷ÎªÃæÏò·ÇÒáÃÀ¹úÈËȺÌåµÄ×î´óýÌ幫˾£¬ÔËÓª¶à¸öµçÊÓÆµÂ·¡¢ÊýÊ®¸ö¹ã²¥µç̨ºÍÐÂÎÅÍøÕ¾£¬2024ÄêÊÕÈëÔ¼4.5ÒÚÃÀÔª¡£3ÔÂ12ÈÕ£¬CactusÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶ÔUrban OneµÄ¹¥»÷ÕÆ¹Ü£¬¸Ã×éÖ¯ÓÚ2023Äê³öÏÖ£¬×î³õÒòʹÓÃͨ¹ýÔÚÏ߸æ°×·Ö·¢µÄ¶ñÒâÈí¼þϰȾÊܺ¦Õß¶øÊܵ½Î¢Èí¹Ø×¢¡£


https://therecord.media/urban-one-data-breach-african-amercian-media


2. GitÅäÖÃÎļþÔâ´ó¹æÄ£É¨Ã裬»úÃÜÓëÁîÅÆÐ¹Â¶·çÏÕ¼Ó¾ç


4ÔÂ29ÈÕÐÂÎÅ£¬ÍþвÐÐΪÕßÕý¼Ó´ó¶ÔGitÅäÖÃÎļþµÄ»¥ÁªÍøÁìÓòɨÃèÁ¦¶È£¬´ËÀàÎļþ¿ÉÄÜй¶ÓÃÓÚ·ÛËéÔÆ·þÎñºÍÔ´´úÂë´æ´¢¿âµÄÃô¸Ð»úÃÜÓëÉí·ÝÑéÖ¤ÁîÅÆ¡£Íþв¼à¿Ø¹«Ë¾GreyNoiseµÄл㱨ÏÔʾ£¬2025Äê4ÔÂ20ÈÕÖÁ21ÈÕÆÚ¼ä£¬Õë¶Ô¶³öGitÅäÖõÄËÑË÷Á¿¼¤Ôö£¬Ã¿Ìì¹Û²ìµ½½ü4800¸öΨһIPµØÖ·£¬ÓëµäÐÍˮƽÏà±È´ó·ùÔö³¤¡£Ö»¹Ü»î¶¯±é¼°È«Çò£¬µ«ÐÂ¼ÓÆÂÔÚ´ËÆÚ¼ä³ÉÎªÖØÒªÆðÔ´µØºÍÖ÷ÕŵØ£¬ÃÀ¹úºÍµÂ¹úÔòÊdz£¼ûÖ÷ÕŵØ¡£GitÅäÖÃÎļþÔ̺¬·ÖÖ§ÐÅÏ¢¡¢Ô¶³Ì´æ´¢¿âURLµÈ£¬×î³ÁÒªµÄÊÇ¿ÉÄÜÔ̺¬ÕÊ»§Í´´¦ºÍ½Ó¼ûÁîÅÆ¡ £¿ª·¢ÈËÔ±»ò¹«Ë¾²¿ÊðWebÀûÓ÷¨Ê½Ê±ÈôδÕýÈ·Åųý.git/Ŀ¼µÄ¹«¹²½Ó¼û£¬¾Í»áÎÞÒâÖж³öÕâЩÎļþ¡£É¨ÃèGitÅäÖÃÎļþÊÇÍþвÐÐΪÕߵij߶ȿúËŻ£¬ÄÜΪÆäÌṩ´óÁ¿»úÓö¡£Îª¼õÇáɨÃè´øÀ´µÄ·çÏÕ£¬½¨Òé×èÖ¹¶Ô.git/Ŀ¼µÄ½Ó¼û£¬ÅäÖÃWeb·þÎñÆ÷Ô¤·À½Ó¼û°µ²ØÎļþ£¬¼à¿Ø·þÎñÆ÷ÈÕÖ¾ÖпÉÒɵÄ.git/config½Ó¼û£¬²¢ÂÖ»»¿ÉÄܶ³öµÄÍ´´¦¡£


https://www.bleepingcomputer.com/news/security/hackers-ramp-up-scans-for-leaked-git-tokens-and-secrets/


3. ·¨¹ú³Æ¶íÂÞ˹APT28ºÚ¿Í¶Ô·¨¹úʵÌå·¢ÆðÍøÂç¹¥»÷


4ÔÂ29ÈÕ£¬·¨¹ú±í½»²¿Ôð¹ÖÓë¶íÂÞ˹¾üʵý±¨¾Ö£¨GRU£©ÓйØÁªµÄAPT28ºÚ¿Í×éÖ¯ÔÚ´ÓǰËÄÄêÕë¶Ô»òÈëÇÖÁËÊ®¼¸¸ö·¨¹úʵÌ壬²¢×îÇ¿ÁÒµØß³ÔðÁËGRUʹÓÃAPT28¹¥»÷·¨Ê½Õë¶Ô·¨¹úÀûÒæÌáÒéµÄ¶àÆðÍøÂç¹¥»÷£¬³ÆÕâЩ·ÛËé²»±äµÄ»î¶¯²»³É½ÓÊÜ£¬Î¥·´Á˶íÂÞ˹Ëù×ñÊØµÄ½áºÏ¹ú¹ØÓÚÍøÂç¿Õ¼äÕÆ¹ÜÈιú¶ÈÐÐΪµÄ³ß¶È£¬²»Åä³ÉΪ½áºÏ¹ú°²Àí²Ç³£ÈÎÀíʹú¡£·¨¹ú¹ú¶ÈÐÅϢϵͳ°²È«¾Ö£¨ANSSI£©µ±Ìì°ä²¼µÄ»ã±¨ÏÔʾ£¬ÔâAPT28¹¥»÷µÄ·¨¹ú×éÖ¯º­¸Ç²¿¼¶»ú¹¹¡¢´¦Ëùµ±¾ÖºÍÐÐÕþ²¿ÃÅ¡¢·¨¹ú¹ú·À¼¼ÊõºÍ¹¤Òµ»ùµØ×éÖ¯¡¢º½¿Õº½ÌìʵÌå¡¢×êÑÐ×éÖ¯¡¢ÖÇ¿âÒÔ¼°¾­¼ÃºÍ½ðÈÚ²¿ÃÅʵÌåµÈ¡£ANSSI»¹½éÉÜÁË2021ÄêÒÔÀ´APT28µÄ¼¸Æð»î¶¯£¬ÈçÂÅ´ÎÕë¶ÔRoundcubeµç×ÓÓʼþ·þÎñÆ÷µÄ¹¥»÷£¬ÒÔ¼°Ê¹ÓÃÃâ·ÑÍøÂç·þÎñ½øÐÐÍøÂç´¹µö¹¥»÷µÈ£¬ÇÒ¹¥»÷Õß´óÁ¿Ê¹Óᰵͳɱ¾ÇÒËæÊ±¿ÉÓõıí°ü»ù´¡ÉèÊ©¡±ÒÔÔö³¤½Ã½ÝÐÔºÍÒñ±ÎÐÔ¡£×Ô2024ËêÊ×ÒÔÀ´£¬APT28µÄ¹¥»÷ÖØÒª¼¯ÖÐÔÚÇÔÈ¡¶à¹úµ±¾Ö¡¢±í½»¡¢×êÑÐ×éÖ¯ºÍÖÇ¿âµÄ¡°Õ½Êõµý±¨¡±¡£


https://www.bleepingcomputer.com/news/security/france-ties-russian-apt28-hackers-to-12-cyberattacks-on-french-orgs/


4. ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾ÔâÍøÂç¹¥»÷µ¼Ö¿ͻ§·þÎñÅö±Ú


4ÔÂ29ÈÕ£¬ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾¼°Æäĸ¹«Ë¾Emera°µÊ¾£¬ÍøÂç¹¥»÷Ó°ÏìÁËÆä²¿ÃżÓÄôóÍøÂç¼°Ö§³Ö²¿ÃÅÒµÎñµÄ·þÎñÆ÷¡£ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾ÎªÐÂ˹¿ÆÉáÊ¡Ìṩ95%µÄµçÁ¦£¬·þÎñȫʡ³¬50Íò»§¼ÒÍ¥ºÍÉèÊ©¡£ÉÏÖÜÎ壬¸Ã¹«Ë¾·¢ÏÖϵͳÔâδ¾­ÊÚȨ½Ó¼û£¬³öÏÖÍøÂçÊÂÎñ¡£ÔÚÆäÍøÕ¾³£¼ûÎÊÌâ½â´ðÖУ¬ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾³ÆÍøÂç¹¥»÷Ó°ÏìÁ˿ͻ§·þÎñÈÈÏߺ͡°MyAccount¡±ÔÚÏ߿ͻ§ÃÅ»§¡£¹«Ë¾Ïò¿Í»§Ìṩµç»°ºÅÂëÓÃÓڻ㱨ͣµç»ò´¹Î£Çé¿ö£¬Í¬Ê±ÖҸ湥»÷µ¼ÖÂÖµç¿Í»§·þÎñÖÐÐÄµÄÆÚ´ý¹¦·òÔö³¤¡£µ±¼ÇÕß¾ÍÊÂÎñÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷Õ÷Ç󶨼ûʱ£¬EmeraºÍÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾»Ø¾øÐ¹Â©£¬µ«ÔÚÐÂΟåÖÐÚ¹Êͱ»ÆÈ¸ôÀëÊܹ¥»÷Ó°ÏìµÄijЩ·þÎñÆ÷£¬ÒÔÔ¤·À¡°½øÒ»²½ÈëÇÖ¡±¡£ÉêÃ÷Åú×¢£¬Ëä·þÎñÆ÷ÊÜÓ°Ï죬µ«ÎïÀíÔËӪδÖжÏ£¬Ô̺¬·¢µç¡¢ÊäµçºÍÅäµçÉèÊ©¡¢º£ÉÏÏνÓÏß»ò²¼Â×Èð¿ËÊäÓ͹Ü·µÈ¾ùÕý³£ÔËÐС£Emera¹«Ë¾»¹³Æ£¬Õâ´Î±äÂÒδ¶Ô¹«Ë¾ÔÚÃÀ¹ú»ò¼ÓÀձȵØÓòµÄ¹«ÓÃÊÂÒµÔì³ÉÓ°Ï죬Ԥ¼ÆÒ²²»»á¶Ô¹«Ë¾²ÆÕþÒµ¼¨Ôì³É³Á´óÓ°Ï졣Ŀǰ£¬¸Ã¹«Ë¾ITÍŶÓÕýÓë·¨Âɲ¿ÃźÍÍøÂçר¼ÒºÏ×÷£¬ÖÂÁ¦Ê¹ITϵͳ¸´Ô­ÔÚÏß¡£


https://therecord.media/nova-scotia-energy-provider-takes-servers-offline


5. ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡Á˳¬¹ý30,000·Ý°Ä´óÀûÑÇÒøÐÐÆ¾Ö¤


4ÔÂ29ÈÕ£¬Dvuln×êÑÐÈËÔ±Ö¸³ö£¬³¬¹ý30,000Ãû°Ä´óÀûÑÇÈ˵ÄÒøÐÐÆ¾Ö¤Òѱ»ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡¡£¸ÃÉøÈë²âÊÔ¹«Ë¾·ÖÎö2021ÄêÖÁ2025Äê¼äµÄÐÅÏ¢ÇÔÈ¡ÈÕÖ¾ºó£¬È·¶¨Á˰ĴóÀûÑÇËÄ´óÒøÐпͻ§µÄÓ×ÎÒÒøÐÐÆ¾Ö¤¡£Êý¾ÝÏÔʾ£¬¶Ôÿ¼Òδй©Ãû³ÆµÄÒøÐжøÑÔ£¬2021Äêµ½2023ÄêÆÚ¼ä±»µÁƾ֤ÊýÁ¿ÎȲ½Ôö³¤£¬2024ÄêÂÔÓнµÂä¡£ÕâÒ»µ÷²éÁ˾Ö͹ÏÔÁËÐÅÏ¢ÇÔÈ¡Õß¶ÔÍøÂç·¸×ï¸ñ¾ÖµÄÓ°Ï죬ËûÃÇÄÜÔÚ²»ÈëÇÖ»ú¹¹µÄÇé¿öÏ»ñÈ¡¶Ô¸÷Àà·þÎñµÄδ¾­ÊÚȨ½Ó¼û£¬ÔÚ½ðÈÚÁìÓòÖú³¤ÁËÕË»§ÊÕÊÜ¡¢Ú²Æ­ÂòÂôºÍ»ùÓÚÉí·ÝµÄ½ðÈÚڲƭµÈ¶ñÒâ»î¶¯¡£Òò¶ø£¬½ðÈÚµÈÐÐÒµ²»½öÒª±£»¤×ÔÉíÍøÂ磬»¹ÐèÈ·± £¿Í»§ÕË»§ÆëÈ«ÐÔ¡£×êÑÐÈËÔ±³Æ£¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÊǰĴóÀûÑǽðÈÚÒµÃæ¶ÔµÄ×îÆÕ±éµ«Î´±»³ä·Ö±¨Â·µÄÍþв֮һ¡£ÐÅÏ¢ÇÔÈ¡·¨Ê½×÷Ϊ¶ñÒâÈí¼þ±äÖÖ£¬Ö¼ÔÚϰȾÏû·ÑÕßÉ豸ÒÔÇÔȡƾ֤¡¢Éí·ÝÑéÖ¤cookieºÍ²ÆÕþÐÅÏ¢£¬ÕâЩÊý¾ÝÔÚÍøÂç·¸×ïÊг¡ÉÏÏúÊÛ£¬Îª½Ó¼û¾­¼ÍÈËÌṩ³õʼ½Ó¼ûȨÏÞ£¬ºóÐø»¹¿ÉÄܱ»´ò°üÏúÊÛ¸øÀÕË÷Èí¼þÔËÓªÉ̵ÈÍþвÐÐΪÕß¡£


https://www.infosecurity-magazine.com/news/infostealers-harvest-banking/


6. ÎÚ¿ËÀ¼EpicentrÔâÍøÂç¹¥»÷µ¼ÖÂÔËÓªÅö±Ú


4ÔÂ29ÈÕ£¬ÎÚ¿ËÀ¼×î´óµÄ¼Ò¾Ó½¨²ÄÁãÊÛÉÌEpicentrÔâ·ê´ó¹æÄ£ÍøÂç¹¥»÷£¬µ¼ÖÂÈ«¹úÊýÊ®¼ÒÃŵêÔËÓªÖжÏ£¬¹Ø¼üITϵͳÈçÊÕÒø»úºÍÎïÁ÷·þÎṉ̃»¾¡£Epicentr¹ÍÓ¶29,000ÃûÔ±¹¤£¬ÊÇÎÚ¿ËÀ¼×î´ó˽ӪÆóÒµÖ®Ò»¡£±¾ÖÜÒ»£¬¸÷µØÃŵê¹Ë¿ÍÒò½áÕËϵͳ崻úÎÞ·¨¹ºÎ»¹ÎÞ·¨½Ó¹Ü¶©µ¥¡¢½Ó¼û¹«Ë¾ÀûÓúÍÍøÕ¾¡£EpicentrÖܶþÉêÃ÷֤ʵÔâ·ê¶¨Ïò¹¥»÷£¬³Æ¶ñÒâÐÐΪÕßµÄÐîÒâ¹¥»÷¶Ô¹«Ë¾»ù´¡ÉèÊ©Ôì³ÉÑϳÁºó¹û£¬µ«Î´½«ÊÂÎñ¹éÒòÓÚÈκÎÌØ¶¨×éÖ¯£¬Ò²Î´Ã÷È·ºÚ¿ÍÈëÇÖ·½Ê½ºÍ×îÖÕÖ¸±ê£¬ÒÔ¼°ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¡£½ØÖÁÖܶþÏÂÎ磬ÎÞÊýÃŵêË临ԭÔËÓª£¬µ«²¿ÃÅϵͳÈÔÓйÊÕÏ£¬¹ÜÕÊϵͳ³ÖÐø´æÔÚÎÊÌ⣬¹Ø¼ü²ÆÕþ¼Í¼ºÍ×¢²áÐÅÏ¢ÃÔʧ£¬ÎÞ·¨ÌìÉú·¨¶¨²ÆÕþÓë˰Îñ»ã±¨¡£Í¬Ê±£¬EpicentrÖÒ¸æÉÌÆ·ÅäËÍÓÈÆäÊÇÔÚÏß¶©µ¥¿ÉÄܳöÏÖÑÓ³¤£¬¹Ë¿ÍÔÚ¹ºÎïÖÐÐÄ¿ÉÄÜÔâ·ê°ü¹ü×·×ÙÓë×ÔÌá·þÎñÎÊÌâ¡£Õâ´Î¹¥»÷ÊǽüÔÂÎÚ¿ËÀ¼ÆóÒµÔâ·êµÄµÚÈýÆð³Á´óÍøÂç¹¥»÷£¬´Ëǰ¸Ã¹úũҵ¾ÞÍ·MHPºÍ¹úÓÐÌú·¹«Ë¾UkrzaliznytsiaÒ²±ðÀëÔâ·êÍøÂçÊÂÎñºÍÒÉËÆ¶íÂÞ˹ºÚ¿Í¹¥»÷¡£


https://therecord.media/epicentr-ukraine-home-improvement-cyberattack