°¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ®£¬¿Í»§ÐÅÏ¢Ôâй¶
°ä²¼¹¦·ò 2025-05-221. °¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ®£¬¿Í»§ÐÅÏ¢Ôâй¶
5ÔÂ20ÈÕ£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾È·ÈÏÆäϵͳÔâδ¾ÊÚȨ½Ó¼û£¬µ¼Ö¿ͻ§ÐÅϢй¶¡£¾Ý¡¶×ÔÓɱ¨¡·±¨Â·£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÒÑÁªÏµ¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§£¬ÆäÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢µ®ÉúÈÕÆÚµÈÓ×ÎÒÐÅÏ¢ÒÉËÆÔںڿ͹¥»÷ÖÐй¶¡£5ÔÂ16ÈÕ°¢µÏ´ï˹º«¹ú¹«Ë¾Ò²Ïò¿Í»§°ä²¼ÁËÀàËÆÐÅÏ¢£¬¹¥»÷Õß»ñÈ¡ÁËÏÕЩһÑùµÄÒ»×麫¹ú¿Í»§ÐÅÏ¢¡£²»Í⣬ÔÚÕâÁ½ÆðÊÂÎñÖУ¬°¢µÏ´ï˹¾ùδÃ÷È·¹¥»÷ÀàÐͼ°ÊÜÓ°ÏìÈËÊý¡£±¨Â·Ö¸³ö£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾Ôâ·êµÄ¹¥»÷¶³öÁËÁªÏµ¹ý¿Í·þµÄ¿Í»§£¬¶øÕë¶Ôº«¹ú¹«Ë¾µÄ¹¥»÷ÊÂÎñÖУ¬Î¥¹æÍ¨ÖªÍ¬ÑùÖ¸Ïò¿Í·þ²¿ÃÅ£¬ÕâÅú×¢¸ÃÆ·ÅÆ¿Í»§¿ÉÄÜÃæ¶ÔÈ«ÇòÐÔ·çÏÕ¡£´Ë±í£¬°¢µÏ´ï˹ǿµ÷£¬ÔÚÕâÁ½ÆðÊÂÎñÖУ¬ÏµÍ³ÔâÈëÇÔìÚ¼ä²ÆÕþÐÅÏ¢ºÍÐÅÓþ¿¨Êý¾Ý²¢Î´Êܵ½Ó°Ïì¡£µ«ÃÔʧÓ×ÎÒÐÅÏ¢ÎÞÒÉ»áÔö³¤¿Í»§Ôâ·êÍøÂç¹¥»÷µÄ·çÏÕ£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢½øÐÐÉí·Ý͵ÇÔºÍÓÐÕë¶ÔÐÔµÄÍøÂç´¹µö¹¥»÷£¬Èç¼ÙÒâ³ÛÃûÆ·ÅÆÒªÇóÌṩ¶î±íÓ×ÎÒÐÅÏ¢»ò¸¶¿î£¬»òÓÕÆÓû§Ð¹Â©¸ü¶àÃô¸ÐÐÅÏ¢¡£
https://cybernews.com/privacy/adidas-second-data-breach-customers-exposed/
2. Ó¢ÎïÁ÷¹«Ë¾Peter Green ChilledÔâÀÕË÷¹¥»÷
5ÔÂ20ÈÕ£¬Peter Green Chilled×÷Ϊһ¼Ò×ܲ¿Î»ÓÚÓ¢¹úµÄÎïÁ÷¹«Ë¾£¬ÓëTesco¡¢AldiºÍSainsbury'sµÈ´óÐÍÁãÊÛÉ̺Ï×÷£¬Æä²¿ÃÅϵͳÔÚÂêɯ°Ù»õÔâ·êÍøÂç¹¥»÷ºó²»µ½Ò»¸öÔÂÒ²Ôâµ½Á˼ÓÃÜ¡£¾ÝÓ¢¹ú¹ã²¥¹«Ë¾±¨Â·£¬ÍþвÐÐΪÕßÓÚÖÜÈý¼ÓÃÜÁ˸ù«Ë¾Êý¾Ý£¬ÇÖÈÅÁËÆäÔËÓª£¬·ÛËéÁËÎïÁ÷ϵͳ¡£¸Ã¹«Ë¾ÔÚÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷£¬ÀÕË÷Èí¼þÍÅ»ïÈëÇÖϵͳ¡¢¼ÓÃÜÊý¾Ý²¢Ë÷ÒªÊê½ð¡£ÔËÓªÖж϶ÔÎïÁ÷¹«Ë¾Ó°ÏìÃô¸Ð£¬¿ÉÄܵ¼Ö½»¸¶ÑÓ³¤£¬½ø¶øÓ°ÏìÕû¸ö¹©¸øÁ´¡£ÐÅÏ¢°²È«×êÑÐÔ±Aras NazarovasÖ¸³ö£¬´ËÀ๥»÷¿ÉÄÜʹ¹«Ë¾ÏÝÈë̱»¾£¬ÉõÖÁÁÙʱÎÞ·¨Îª³ÛÃûÆ·ÅÆÌṩ·þÎñ£¬µ¼Ö³¬ÊÐÌØ¶¨²úÆ·ÁÙʱǷȱ¡£ÐÅÏ¢°²È«×¨ÒµÐ»áISACAµÄÊ×ϯȫÇòÕ½Êõ¹ÙChris DimitriadisÒÔΪ£¬Õâ´Î¹¥»÷±ê־ȡһ¸öÁîÈËÓÇÓôµÄÇ÷Ïò£¬ÍøÂç·¸×ï·Ö×Ó²»½ö¶Ô×¼´ó¹«Ë¾»ò¹Ø¼ü»ù´¡ÉèÊ©£¬»¹¹¥»÷¹©¸øÁ´£¬´øÀ´½»¸¶Öжϡ¢¿â´æÀ˷ѺͲÆÕþËðʧµÈÏÖʵºó¹û¡£
https://cybernews.com/security/retail-logistics-ransomware-tesco-aldi/
3. Lumma¶ñÒâÈí¼þÐж¯±»×è¶Ï£¬2300¸öÓòÃû±»²é·â
5ÔÂ21ÈÕ£¬È«ÇòÕë¶ÔLumma¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©ÐÅÏ¢ÇÔÈ¡Ðж¯·¢Õ¹Ðͬ·ÛË飬³É¹¦²é»ñÊýǧ¸öÓòÃûÒÔ¼°²¿ÃÅ»ù´¡ÉèÊ©Ö÷¸É¡£Õâ´ÎÐж¯¹æÄ£½Ï´ó£¬Éæ¼°¶à¼Ò¿Æ¼¼¹«Ë¾Óë·¨ÂÉ»ú¹¹¡£Î¢ÈíÓÚ2025Äê5ÔÂ13ÈÕ²Éȡ˾·¨Ðж¯£¬²é·âÁËÔ¼2300¸öÓòÃû¡£ÃÀ¹ú˾·¨²¿Ò²»ý¼«Ðж¯£¬²é·âÁËLummaµÄ½ÚÔìÃæ°å£¬²¢µ·»ÙÁËÏòÍøÂç·¸×ï·Ö×Ó³ö×â¶ñÒâÈí¼þµÄÊг¡¡£Óë´Ëͬʱ£¬Å·ÖÞÐ̾¯×é֯ŷÖÞÍøÂç·¸×ïÖÐÐĺÍÈÕ±¾ÍøÂç·¸×ï½ÚÔìÖÐÐÄÐÖú²é·âÁËλÓÚÅ·ÖÞºÍÈÕ±¾µÄ»ù´¡ÉèÊ©¡£Î¢ÈíÊý×Ö·¸×ﲿÃÅÖúÀí×Ü˾·¨ÕÕ·÷°µÊ¾£¬ÔÚ2025Äê3ÔÂ16ÈÕÖÁ5ÔÂ16ÈÕÆÚ¼ä£¬È«ÇòÓг¬¹ý39.4Íǫ̀WindowsÍÆËã»úϰȾÁ˸öñÒâÈí¼þ£¬Î¢ÈíÓë¶à²¿ÃÅçÇÃܺÏ×÷£¬³É¹¦¶Â½ØÁ˸öñÒâÈí¼þÓëÊܺ¦ÕßÖ®¼äµÄͨѶ¡£Cloudflare·½Ãæ³Æ£¬Õâ´ÎÐж¯Ê¹LummaÔËÓªÉÌÎÞ·¨½Ó¼û½ÚÔìÃæ°åµÈ¹Ø¼üÉèÊ©£¬¸øÆä´øÀ´ÁËÔËÓªºÍ²ÆÕþ³É±¾¡£²Î¼ÓÕâ´Î½áºÏÐж¯µÄ¹«Ë¾³ýÁË΢Èí±í£¬»¹ÓÐESET¡¢CleanDNSµÈ¡£Lumma×÷ΪһÖÖ¶ñÒâÈí¼þ¼´·þÎñÐÅÏ¢ÇÔÈ¡·¨Ê½£¬ÖØÒªÕë¶ÔWindowsºÍmacOSϵͳ£¬ÍøÂç·¸×ï·Ö×ÓÖ»ÐèÆÆ·Ñ250ÃÀÔªµ½1000ÃÀÔª¼´¿É¶©ÔÄ×âÓá£Ëü¾ß±¸ÏȽøµÄÌӱܺÍÊý¾ÝÇÔȡְÄÜ£¬Í¨¹ý¶àÖÖÇþ·´«²¼²¢Ï°È¾Êܺ¦Õߣ¬ÈëÇÖϵͳºó¿ÉÇÔÈ¡¶àÖÖÊý¾Ý£¬ÍøÂçºó·¢Ëͻع¥»÷Õß·þÎñÆ÷½øÐÐÏúÊÛ»òÓÃÓÚÆäËû¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-operation-disrupted-2-300-domains-seized/
4. 3AMÀÕË÷Èí¼þÀûÓõç×ÓÓʼþºäÕ¨ÓëαÔìµç»°½øÐй¥»÷
5ÔÂ21ÈÕ£¬3AMÀÕË÷Èí¼þ´ÓÊô»ú¹¹Õýѡȡ¸ß¶ÈÕë¶ÔÐԵĹ¥»÷¼¿Á©£¬Í¨¹ýµç×ÓÓʼþºäÕ¨ºÍαÔìµÄITÖ§³Öµç»°£¬ÀûÓÃÉç»á¹¤³ÌѧÓÕÆÔ±¹¤ÌṩԶ³Ì½Ó¼û¹«Ë¾ÏµÍ³µÄƾ֤¡£Sophos»ã±¨ÏÔʾ£¬ÔÚ2024Äê11ÔÂÖÁ2025Äê1ÔÂÆÚ¼ä£¬ÖÁÉÙÓÐ55Æð¹¥»÷ÀûÓÃÁ˸ü¼Êõ£¬Éæ¼°Á½¸ö·ÖÆçµÄÍþв¼¯Èº¡£ÕâЩ¹¥»÷ÒòÑÁËBlackBastaµÄ¹ßÓÃÊÖ·¨£¬Ô̺¬µç×ÓÓʼþºäÕ¨¡¢Í¨¹ýMicrosoft Teams½øÐÐÓïÒô´¹µö¼°ÀÄÓÃQuick Assist¡£Black BastaÄÚ²¿¶Ô»°µÄй¶ΪÆäËûÍþвÐÐΪÕßÌṩÁË¿ÉÀûÓõÄÄ£°å£¬ÖúÆä¼±¾ç°ÑÎÕÇé¿ö¡£2025ÄêµÚÒ»¼¾¶È£¬3AMÀÕË÷Èí¼þÕë¶ÔSophos¿Í»§¶ËÌáÒé¹¥»÷£¬Ñ¡È¡ÀàËÆ²½Ö赫¸ÄÓÃÕæÊµµç»°ÍøÂç´¹µö¡£¹¥»÷ÕßαÔìÖ¸±êÕæÊµIT²¿Ãŵ绰ºÅÂ룬ÔÚÈý·ÖÖÓÄÚ·¢ËÍ24·âδҪÇóÓʼþ½øÐкäÕ¨£¬²¢Ëµ·þÔ±¹¤´ò¿ªMicrosoft Quick AssistÊÚÓèÔ¶³Ì½Ó¼ûȨÏÞ¡£Ëæºó£¬¹¥»÷Õß´ÓºýŪÓòÏÂÔØ²¢ÌáÈ¡¶ñÒâµµ°¸£¬Ô̺¬VBS¾ç±¾¡¢QEMU·ÂÕÕÆ÷ºÍԤװQDoorºóÃŵÄWindows 7Ó³Ïñ£¬ÀûÓÃQEMUÌӱܼì²â£¬ÊµÏÖ³ÖÐøÇÒδ±»·¢ÏÖµÄÍøÂç½Ó¼û¡£¹¥»÷Õßͨ¹ýWMICºÍPowerShell½øÐпúËÅ£¬´´½¨±¾µØÖÎÀíÔ¹ØÊ»§¡¢×°ÖÃóÒ×RMM¹¤¾ßXEOXRemote²¢·ÛËéÓòÖÎÀíÔ¹ØÊ»§¡£Ö»¹ÜSophos²úÆ·×èÖ¹Á˺áÏòÒÆ¶¯ºÍ·ÀÓùÍ£Óó¢ÊÔ£¬µ«¹¥»÷ÕßÈÔʹÓÃGoodSync¹¤¾ß½«868GBÊý¾Ýй¶µ½BackblazeÔÆ´æ´¢ÖС£
https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/
5. Coinbase³Æ½üÆÚÊý¾Ýй¶ӰÏìÁË69461Ãû¿Í»§
5ÔÂ21ÈÕ£¬¼ÓÃÜÇ®±ÒÂòÂôËùCoinbase½üÈÕÅû¶ÁËһ·Êý¾Ýй¶ÊÂÎñ£¬Ó°Ïì69461Ãû¿Í»§¡£CoinbaseÔÚÌá½»¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄ֪ͨÖаµÊ¾£¬Æäº£±íÁãÊÛÖ§³ÖµØÖ·µÄÉÙÊýÈËÔ±²»µ±½Ó¼ûÁ˿ͻ§ÐÅÏ¢¡£Ð¹Â¶µÄÊý¾ÝËä²»Ô̺¬ÃÜÂ롢˽ԿµÈ¿ÉÖ±½Ó½Ó¼û×ʽð»òÕË»§µÄÐÅÏ¢£¬µ«Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂëºóËÄλ¡¢ÒøÐÐÕ˺ŵÈÓ×ÎÒ±êʶ·û£¬ÒÔ¼°¿ÉÄÜÈ·µ±¾ÖÉí·ÝÐÅÏ¢ºÍÕË»§ÐÅϢͼÏñ¡£CoinbaseÖÒ¸æ³Æ£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢½øÐÐÉç»á¹¤³Ì¹¥»÷£¬ÓÕʹÊܺ¦Õß×ªÒÆ×ʽ𡣴Ëǰ£¬ÓÐÈËÓÇÓôÍøÂç·¸×ï·Ö×Ó»ñÈ¡ÕË»§Óà¶îºÍµØÖ·ºó¿ÉÄÜÒý·¢ÑϳÁºó¹û¡£CoinbaseÔÚÌá½»¸øÃÀ¹ú֤ȯÂòÂôίԱ»áµÄÎļþÖÐй©£¬ÍþвÐÐΪÕßÔÚº£±íÖ§³ÖÈËÔ±»ò³Ð°üÉ̵ÄÔ®ÊÖÏ»ñÈ¡Á˸ߴï1% Coinbase¿Í»§ÈºµÄÊý¾Ý£¬²¢ÓÚ5ÔÂ11ÈÕ·¢ËÍÀÕË÷Óʼþ£¬ÒªÇóÖ§¸¶2000ÍòÃÀÔªÊê½ðÒÔÔ¤·ÀÐÅÏ¢±»¹«¿ª¡£È»¶ø£¬Coinbase»Ø¾øÖ§¸¶Êê½ð£¬¶øÊÇÉèÁ¢ÁË2000ÍòÃÀÔªµÄ¼Î½±»ù½ð£¬¼¤ÀøÌṩÓÐÖúÓÚÕÒµ½²¢ÉþÖ®ÒÔ·¨¹¥»÷ÕßµÄÏßË÷¡£Ä¿Ç°£¬CoinbaseÈÔÔÚÆÀ¹ÀÕâ´Î¹¥»÷µÄ²ÆÕþÓ°Ï죬Ô̺¬²¹¾ÈºÍ¿Í»§ÍË¿îÓöȣ¬Ô¤¼Æ¿ÉÄÜÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£¸Ã¹«Ë¾°µÊ¾½«Åâ³¥Òò¸ÃÊÂÎñ¶øÎó½«×ʽð»ã¸øÚ¿ÆÕßµÄÁãÊÛ¿Í»§£¬²¢½øÐÐÉó²éÒÔÈ·ÈÏÊÂʵ¡£
https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/
6. KrebsOnSecurityÔâ6.3Tbps DDoS¹¥»÷
5ÔÂ21ÈÕ£¬³ÛÃûÍøÂ簲ȫ²©¿ÍKrebsOnSecurity½üÈÕÔâ·ê´ó¹æÄ£DDoS¹¥»÷£¬·åÖµÁ÷Á¿´ïÿÃë6.3Õ×Õ×±ÈÌØ£¬³ÉΪÓмͼÒÔÀ´¹æÄ£×î´óµÄ¹¥»÷Ö®Ò»¡£Õâ´Î¹¥»÷¾ÝÐÅÔ´×ÔÃûΪ¡°Aisuru¡±µÄÐÂÐÍÎïÁªÍø½©Ê¬ÍøÂ磬¸ÃÍøÂçÓÚ2024Äê8Ô³õ´Î·¢ÏÖ£¬ÖØÒªÓÉÊÜϰȾµÄÎïÁªÍøÉ豸Èç·ÓÉÆ÷¡¢IPÉãÏñÍ·ºÍÊý×ÖÊÓÆµÂ¼Ïñ»ú×é³É¡£ÕâЩÉ豸±»½Ù³ÖºóÐͬ¹¥»÷£¬ÏòKrebsOnSecurityÕ¾µã·¢ËÍ´óÁ¿Á÷Á¿¡£Ö»¹Ü¹¥»÷½ö³ÖÐøÔ¼45Ã룬µ«ÍþÁ¦¾Þ´ó£¬²»ÍâÍøÕ¾ÒòÊܹȸ衰¶ÜÅÆ´òË㡱±£»¤¶øÎ¬³ÖÔÚÏß¡£¡°Aisuru¡±½©Ê¬ÍøÂçµÄÃû×Ö½ñÄêÔçЩʱ³½Òѳʴ˿̵ØÏÂÂÛ̳£¬ÓëDDoS¹ÍÓ¶·þÎñÓйأ¬Õâ´Î¹¥»÷¿ÉÄÜÊÇ¶ÔÆäÖ°ÄܵÄѹÁ¦²âÊÔ£¬»òÒԸߵ÷Ö¸±êչʾʵÁ¦¡£¹¥»÷ÕßÉí·ÝÉв»Ã÷È·£¬µ«KrebsÔÚ²©¿ÍÖÐÖ¸³ö£¬¹¥»÷Õß¿ÉÄÜÓëÌṩDDoS·þÎñºÍ½©Ê¬ÍøÂç×âÁÞµÄÍøÃñ¡°Forky¡±Óйأ¬Ö»¹ÜForky·ñ¶¨²ß¶¯ÁËÕâ´Î¹¥»÷£¬µ«ÈϿɲμÓÁËAisuru½©Ê¬ÍøÂçµÄ¿ª·¢ºÍÍÆ¹ã¡£
https://hackread.com/krebsonsecurity-6-3-tbps-ddos-attack-aisuru-botnet/


¾©¹«Íø°²±¸11010802024551ºÅ