Freedman HealthcareÔâWorld LeaksÀÕË÷Èí¼þ¹¥»÷

°ä²¼¹¦·ò 2025-06-19

1. Freedman HealthcareÔâWorld LeaksÀÕË÷Èí¼þ¹¥»÷


6ÔÂ17ÈÕ£¬ÃÀ¹ú½¡È«Êý¾ÝÖÎÀíÈí¼þ¹«Ë¾Freedman HealthcareÔâ·êÁËWorld LeaksµÄÀÕË÷Èí¼þ¹¥»÷£¬¸Ã¹¥»÷ÊÇÓÉHunter's International¿ª·¢µÄÀÕË÷Èí¼þÏîÄ¿¡£¸ÃÀÕË÷Èí¼þ¼¯ÍÅÖÜÒ»ÔÚÆäÊܺ¦ÕßÒ³ÃæÉÏÐû³Æ¹¥»÷ÁËλÓÚÂíÈøÖîÈûÖݵÄFreedman Healthcare¡£Freedman HealthcareÓë¶þÊ®¶à¸öÖݵ±¾Ö¡¢¶à¸ö·ÇͶ»ú×éÖ¯ºÍ±£ÏÕ¹«Ë¾ºÏ×÷£¬Îª¶à¸öÖݵÄÖÝÁ¢¹«¹²ÎÀÉú²¿ÃÅºÍÆäËû¹«¹²ÔÞÖúÏîÄ¿Éè¼Æ¡¢Ö´ÐкÍÊØ»¤×ÛºÏÊý¾Ýϵͳ£¬Êý°ÙÍòÃÀ¹úÈ˵ÄÓ×ÎÒ½¡È«ÐÅÏ¢ÓÉÆä×ÛºÏÊý¾ÝÖÎÀíÆ½Ì¨´¦Öá£World LeaksÐû³Æ´Ó¸Ã¹«Ë¾·þÎñÆ÷ÇÔȡԼ52.4GBÊý¾Ý£¬Ô¼42204¸öÎļþ£¬µ«½ØÖÁÖÜÒ»ÍíÉÏÉÐδÉÏ´«ÎļþÑù±¾¡£ÆäÍøÕ¾µ¹¼ÆÊ±ÖÓÏÔʾ×îºóÆÚÏÞ²»µ½°ëÌ죬ÒÉËÆÎªÖ§¸¶Êê½ðÒªÇó¡£ÈôFreedman Healthcare²»¸¶¿î£¬World Leaks¿ÉÄÜÏñ֮ǰ¶Ô²»Ô¸½»ÉæµÄÊܺ¦ÕßÒ»Ñù£¬ÔÚÆäйÃÜÍøÕ¾°ä²¼±»µÁÊý¾Ý¡£


https://cybernews.com/news/freedman-healthcare-ransomware-attack-data-27-state-public-health-departments/


2. Ò½ÁÆ·þÎñ¹«Ë¾EpisourceÊý¾Ýй¶ӰÏì540ÍòÈË


6ÔÂ18ÈÕ£¬Ò½ÁƱ£½¡¹«Ë¾EpisourceÔâ·êÍøÂç¹¥»÷£¬µ¼ÖÂÊý¾Ýй¶£¬³¬¹ý540ÍòÈ˵ÄÓ×ÎҺͽ¡È«Êý¾Ýй¶¡£EpisourceÊÇÒ»¼ÒÃÀ¹úÒ½ÁÆ·þÎñºÍ¼¼Êõ¹«Ë¾£¬ÖØÒªÎªÔÚMedicare Advantage¡¢MedicaidºÍACAÊг¡ÔËÓªµÄ½¡È«´òËãºÍÒ½ÁƱ£½¡×éÖ¯Ìṩ·çÏÕµ÷Õû·þÎñ¡¢ÁÙ´²Êý¾Ý·ÖÎöºÍÒ½ÁƼͼÉó²é½â¾ö¹æ»®¡£2025Äê2ÔÂ6ÈÕ£¬Episource¼ì²âµ½ÆäϵͳÖдæÔÚ¿ÉÒɻ£¬¾­µ÷²é·¢ÏÖ£¬ÔÚ1ÔÂ27ÈÕÖÁ2ÔÂ6ÈÕÆÚ¼ä£¬Ò»ÃûÍþвÐÐΪÕß½Ó¼û²¢¸´ÔìÁËÊý¾Ý¡£ÎªÓ¦¶ÔÕâ´Î°²È«·ì϶£¬EpisourceѸ¿ì¹Ø¹ØÏµÍ³£¬ÀñƸר¼ÒÍŶÓЭÖúµ÷²é£¬²¢ÁªÏµÁË·¨Âɲ¿ÃÅ¡£½ØÖÁĿǰ£¬ÉÐδ·¢ÏÖÊý¾Ý±»ÀÄÓõĻ㱨¡£Õâ´Îй¶µÄÊý¾ÝÒòÈ˶øÒ죬¿ÉÄܺ­¸ÇÁªÏµ·½Ê½£¨ÈçÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂëºÍµç×ÓÓʼþ£©¡¢½¡È«±£ÏÕÐÅÏ¢£¨È罡ȫ´òËã/±£µ¥¡¢±£ÏÕ¹«Ë¾¡¢»áÔ±/¼¯ÌåIDºÅµÈ£©¡¢Ò½ÁƼͼ£¨È粡ÀúºÅ¡¢Ò½Éú¡¢Õï¶Ï¡¢Ò©ÎïµÈ£©£¬ÔÚÓÐÏÞÇé¿öÏ»¹Ô̺¬Éç»á°²È«ºÅÂë»òµ®ÉúÈÕÆÚ¡£Episource×Ô4ÔÂ23ÈÕÆðÆðͷ֪ͨ¿Í»§¿ÉÄÜÊÜÓ°ÏìµÄÓ×ÎҺ;ßÌåÊý¾Ý¡£Ö»¹Ü²ÆÕþÊý¾Ý¸ù»ùδÊÜÓ°Ï죬µ«EpisourceÈÔ½¨ÒéÓ×ÎÒ¼à¿Ø½¡È«¡¢²ÆÕþºÍ˰Îñ¼Í¼ÖеĿÉÒɻ£¬²¢ÊµÊ±ÏòÓйػú¹¹»ã±¨Òì³£Çé¿ö¡£


https://securityaffairs.com/179115/data-breach/healthcare-services-company-episource-data-breach-impacts-5-4-million-people.html


3. Ç×ÒÔºÚ¿Í¡°ÂÓʳÂéȸ¡±ÇÔÈ¡²¢Ïú»ÙNobitex³¬9000ÍòÃÀÔª¼ÓÃÜÇ®±Ò


6ÔÂ18ÈÕ£¬Ç×ÒÔÉ«Áеġ°ÂÓʳÂéȸ¡±£¨Predatory Sparrow£©ºÚ¿Í×éÖ¯¶ÔÒÁÀÊ×î´óµÄ¼ÓÃÜÇ®±ÒÂòÂôËùNobitex·¢ÆðÁËÒ»´Î³öÓÚÕþÖζ¯»úµÄÍøÂç¹¥»÷¡£NobitexÓÚÃÀ¹ú¶«²¿¹¦·òÁ賿2:24³õ´ÎÔÚXÉϻ㱨ÁËÕâ´Î¹¥»÷£¬Æä¼¼ÊõÍŶӼì²âµ½²¿ÃŻ㱨»ù´¡ÉèÊ©ºÍÈÈÇ®°ü±»Î´¾­ÊÚȨ½Ó¼û£¬Ëæ¼´ÔÝÍ£ËùÓнӼû£¬ÄÚ²¿°²È«ÍŶӷ¢Õ¹µ÷²é¡£²»¾Ãºó£¬Predatory Sparrowͨ¹ýÆäGonjeshke Darande XÕË»§Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢Íþв°ä²¼Nobitex±»µÁµÄÔ´´úÂëºÍÄÚ²¿ÐÅÏ¢¡£¾ÝÇø¿éÁ´·ÖÎö¹«Ë¾Elliptic»ã±¨£¬³¬¹ý9000ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò´ÓNobitexÇ®°üÖб»µÁ£¬µ«ºÚ¿Í²¢Î´ÊÔͼ¾ÝΪ¼ºÓУ¬¶øÊǽ«ÏÕЩËùÓмÓÃÜÇ®±Ò·¢Ë͵½Ç¶ÈëÁË·´ÒÁ˹À¼¹²ºÍ¹úÎÀ¶Ó£¨IRGC£©ÐÅÏ¢µÄÐéÈÙµØÖ·£¬ÕâЩµØÖ·±ØÒª´óÁ¿ÍÆËãÄÜÁ¦ÄÜÁ¦ÌìÉú£¬ÇÒ´´½¨Èç´Ë³¤µÄ×Ö·û´®Ãû³ÆÔÚÍÆËãÉϲ»³ÉÐУ¬ÒâζןڿÍÓÐÒâÏú»ÙÁ˼ÓÃÜÇ®±Ò£¬Ê¹ÆäÎÞ·¨±»ÔٴνӼû¡£EllipticÖ¸³ö£¬Õâ´ÎºÚ¿Í¹¥»÷²¢·Ç³öÓÚ¾­¼Ã¶¯»ú¡£´Ë±í£¬EllipticµÄµ÷²éÏÔʾNobitexÓëÒÁÀʸïÃüÎÀ¶ÓºÍÒÁÀʸ¨µ¼²ãÓÐÁªÏµ£¬ÆäËû×êÑÐÈËÔ±Ò²Ôø½«¸ÃÂòÂôËùÓëÒÁÀÊ×î¸ßÇ̳þÇ×Êô¡¢¸ïÃüÎÀ¶Ó´ÓÊôÉÌÒ·ûÒæ¼¯Íż°ÊÜÔì²ÃÓ×ÎÒÁªÏµÆðÀ´£¬ÕâЩÈ˾ݱ¨Â·Ê¹ÓÃNobitex×ªÒÆÀÕË÷Èí¼þ²Ù×÷²úÉúµÄ×ʽð¡£


https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/


4. ¶íÏÖÊ×Àý±¾ÍÁ»¯NFCÊý¾ÝÇÔÈ¡¹¥»÷£¬SuperCard¶ñÒâÈí¼þÏÖÉí


6ÔÂ17ÈÕ£¬¶íÂÞË¹ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÊ×Àý±¾ÍÁ»¯Êý¾ÝÇÔÈ¡¹¥»÷£¬¹¥»÷ÕßÀûÓþ­´Û¸ÄµÄ½ü³¡Í¨Ñ¶£¨NFC£©ºÏ·¨Èí¼þÖ´Ðз¸×Õâ»òΪ¸ü¿í·º¹¥»÷»î¶¯µÄ²âÊԽ׶Ρ£Õâ´Î¹¥»÷Éæ¼°µÄ¶ñÒâÈí¼þΪSuperCard£¬ËüÊÇ´ËǰÒÑÖªºÏ·¨Èí¼þNFCGateµÄ±äÖÖ¡£NFCGateÕý±¾ÓÃÓÚÔÚÁÚ½üÉ豸¼äÖм̴«ÊäNFCÊý¾Ý£¬µ«³£±»ÍøÂç·¸×ï·Ö×ÓÀÄÓÃÒÔµÁÈ¡ÒøÐÐ×ʽð¡£ÔÚÏÈǰÕë¶ÔÅ·ÖÞÒøÐеÄSuperCard¹¥»÷ÖУ¬ºÚ¿Íͨ¹ý±»ÈëÇֵݲ׿ÊÖ»ú£¬½«Êܺ¦ÕßʵÌåÖ§¸¶¿¨Êý¾ÝÖм̴«ÊäÖÁ¹¥»÷Õß½ÚÔìµÄÉ豸£¬½ø¶øÖ´ÐÐATMÂòÂô»òÖ±½Ó×ªÒÆÕË»§×ʽð¡£ÄªË¹¿ÆÍøÂ簲ȫ¹«Ë¾F6ÔÚ6ÔÂ17ÈյĻ㱨ÖÐÖ¸³ö£¬SuperCardÓÚ2025Äê5Ô³õ´ÎÔÚ¶íÂÞ˹¾³ÄÚÕë¶Ô°²×¿Óû§²¿Ê𣬶ø¸Ã¶ñÒâÈí¼þ×î³õÓÚͬÄê4ÔÂÔÚÒâ´óÀû±»·¢ÏÖ£¬ÆäʱÒâ´óÀû°²È«¹«Ë¾CleafyÅû¶ÆäÒÔ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©´ó¾Ö·Ö·¢£¬ÓÉ¡°ÖÐÎÄʹÓÃÕß¡±²Ù×÷¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÓÕÆ­Êܺ¦ÕßÏÂÔØ¼Ù×°³ÉºÏ·¨ÀûÓõÄSuperCard£¬¸Ã¶ñÒâÈí¼þÄܼø±ðÊܺ¦ÕßʹÓõÄÖ§¸¶ÏµÍ³£¬½ø¶øÖ§³Ö·¸×ï·Ö×ÓÖ´ÐÐڲƭÂòÂô¡£ÓëÒÔÍù»ùÓÚNFCGateµÄ¶ñÒâÈí¼þ·ÖÆç£¬SuperCardѡȡóÒ×»¯·Ö·¢Õ½Êõ£¬³õ´Îͨ¹ýTelegramÖÐÎÄÆµÂ·¹«¿ªÍƹ㣬ѡȡ¶©ÔÄÔìÏúÊÛ²¢Ìṩ¿Í»§Ö§³Ö£¬¸æ°×Ðû³Æ¿ÉÕë¶ÔÃÀ¹ú¡¢°Ä´óÀûÑǼ°Å·ÖÞÖØÒªÒøÐеĿͻ§¡£


https://therecord.media/supercard-nfc-banking-malware-russia


5. ³¯ÏÊBlueNoroff×éÖ¯½èZoomÉî¶ÈαÔì´«²¼macOS¶ñÒâÈí¼þ


6ÔÂ18ÈÕ£¬Huntress×êÑÐÈËÔ±ÔÚµ÷²éºÏ×÷ͬ°éÍøÂç¿ÉÄÜÔâ·êµÄÈëÇÖʱ£¬·¢ÏÖ³¯Ïʸ߼¶³ÖÐøÐÔÍþв×éÖ¯BlueNoroff£¨±ðÃûSapphire Sleet»òTA444£©ÌáÒéµÄÒ»´Îй¥»÷¡£¸Ã×éÖ¯ÒÔʹÓÃWindowsºÍMac¶ñÒâÈí¼þ½øÐмÓÃÜÇ®±Ò͵ÇÔ¹¥»÷Öø³Æ£¬Õâ´Î¹¥»÷Ö¸±êºÜ¿ÉÄÜÊÇ͵ÇÔ¼ÓÃÜÇ®±Ò¡£¹¥»÷Õßͨ¹ýTelegram¼Ù°ç±í²¿×¨ÒµÈËÊ¿£¬ÏòÒ»¼Ò¿Æ¼¼¹«Ë¾Ô±¹¤·¢ËÍÔ̺¬ÐéαZoomÓòµÄCalendlyÁ´½Ó£¬ÓÕʹÆä²ÎÓë»áÒé¡£»áÒéÖÐÔ̺¬Éî¶ÈαÔìµÄ¹«Ë¾¸ß²ã¸¨µ¼ºÍ±í²¿²Î¼ÓÕßÊÓÆµ£¬ÒÔÔö³¤¿ÉÐŶȡ£ÆÚ¼ä£¬¹¥»÷ÕßÒÔÂó¿Ë·ç¹ÊÕÏΪÓÉ£¬Êèµ¼Êܺ¦ÕßÏÂÔØËùνµÄZoomÀ©´ó·¨Ê½£¬ÊµÎª¶ñÒâAppleScriptÎļþ¡£¸ÃÎļþÔÚ½âÎö´óÁ¿¿ÕȱÐкó£¬Ö´ÐжñÒâºÅÁ´Ó±í²¿ÆðÔ´ÏÂÔØ²¢Ö´Ðи¨ÖúÓÐÐ§ÔØºÉ¡£HuntressÔÚµ÷²éʱ·¢ÏÖ£¬×îÖÕÓÐÐ§ÔØºÉËäÒѱ»ÌáÈ¡£¬µ«ÔÚVirusTotalÉÏÕÒµ½ÁËÒ»¸ö°æ±¾£¬ÌṩÁËÏßË÷¡£¸Ã¾ç±¾»á½ûÓÃbashº¹Çà¼Í¼£¬²é³­²¢×°ÖÃRosetta 2ÒÔÈ·±£x86_64¸ºÔØÔËÐУ¬»¹»á´´½¨°µ²ØÎļþ²¢ÏÂÔØ¸ºÔØ¡£×êÑÐÈËÔ±ÔÚ±»ÈëÇÖÖ÷»úÉÏ·¢ÏÖÁ˰˸ö·ÖÆçµÄ¶ñÒâ¶þ½øÔìÎļþ¡£Õâ´Î¹¥»÷·´Ó³ÁËBlueNoroffÈÕÒæÔö³¤µÄ¸´ÔÓÐÔ£¬ÀûÓÃAIÉî¶ÈαÔì½øÐÐÉç»á¹¤³ÌºÍ¶¨ÔìmacOS¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-deepfake-execs-in-zoom-call-to-spread-mac-malware/


6. GitHub¶ñÒâÄ£×éÉøÈë¡¶ÎÒµÄÊÀ½ç¡·£¬³¬1500ÃûÍæ¼ÒÖÐÕÐ


6ÔÂ18ÈÕ£¬Check Point¹«Ë¾×êÑÐÈËÔ±·¢ÏÖÒ»³¡Õë¶Ô¡¶ÎÒµÄÊÀ½ç¡·Íæ¼ÒµÄ¶à½×¶Î¶ñÒâÈí¼þ»î¶¯£¬¸Ã»î¶¯ÀûÓá°Stargazers Ghost Network¡¹ØâÒ»·Ö·¢¼´·þÎñ£¨DaaS£©Æ½Ì¨£¬Ê¹ÓûùÓÚJavaµÄ¶ñÒâÈí¼þ´«²¼¡£¶ñÒâÈí¼þ¼Ù𡰾籾ºÍºê¹¤¾ß¡±£¨Îè±×¹¤¾ß£©OringoºÍTaunahi£¬µÚÒ»ºÍµÚ¶þ½×¶Î¶ñÒⷨʽ¾ùÓÃJava¿ª·¢£¬ÐèÔÚ×°Öá¶ÎÒµÄÊÀ½ç¡·ÔËÐл·¾³µÄÖ÷»úÉÏÖ´ÐÓ×£¹¥»÷×îÖÕÖ÷ÕÅÊÇÓÕÆ­Íæ¼Ò´ÓGitHubÏÂÔØ¡¶ÎÒµÄÊÀ½ç¡·Ä£×飬½ø¶øÍ¶·ÅÓµÓÐÈ«ÃæÊý¾ÝÇÔÈ¡ÄÜÁ¦µÄ.NETÐÅÏ¢ÇÔÈ¡·¨Ê½¡£¸Ã»î¶¯ÀûÓÃÊýǧ¸öGitHubÕÊ»§³ÉÁ¢±»´«È¾µÄ´úÂë²Ö¿â£¬¼Ù×°³ÉÆÆ½âÈí¼þºÍÓÎÏ·Îè±×¹¤¾ß¡£×êÑÐÈËÔ±ÏóÕ÷Ô¼500¸öGitHub²Ö¿â£¬¹Û²ìµ½Ô¼70¸öÕÊ»§²úÉú700¸öµãÔÞ¡£¼Ù×°³ÉÄ£×éµÄ¶ñÒâ²Ö¿â»áͶ·Åδ±»·À²¡¶¾ÒýÇæ¼ì²âµ½µÄJava¼ÓÔØÆ÷£¬Ö´Ðз´Ðé¹¹»úºÍ·´·ÖÎö¼¼Êõ£¬ÖØÒªÖ÷ÕÅÊÇÏÂÔØ²¢ÔËÐеڶþ½×¶ÎÇÔÈ¡·¨Ê½£¬×îÖÕ»ñÈ¡²¢Ö´ÐÐ.NETÇÔÈ¡·¨Ê½×÷ΪÓÐÐ§ÔØºÉ¡£.NETÇÔÈ¡·¨Ê½ÄÜ´Óä¯ÀÀÆ÷ÇÔȡƾ֤£¬ÍøÂçÎļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üµÈÐÅÏ¢£¬²¢½ØÈ¡ÆÁÄ»½ØÍ¼µÈ£¬²¶»ñÐÅϢͨ¹ýDiscordµÄWebhook´«Ê仨¹¥»÷Õß¡£×êÑÐÈËÔ±ÒÉ»ó»î¶¯ÓɶíÓïÍþвÐÐΪÕßÌáÒ飬¹À¼Æ³¬1500̨É豸Êܺ¦¡£


https://thehackernews.com/2025/06/1500-minecraft-players-infected-by-java.html