SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬¶ñÒâÈí¼þDZÔÚ½üÈýÄê

Ðû²¼Ê±¼ä 2025-05-21

1. SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬¶ñÒâÈí¼þDZÔÚ½üÈýÄê


5ÔÂ20ÈÕ£¬SK TelecomÊǺ«¹ú×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ£¬Õ¼ÓÐÔ¼Ò»°ëÊг¡·Ý¶î¡£¸Ã¹«Ë¾¿ËÈÕÅû¶£¬2025Äê4ÔÂ19ÈÕÔÚÆäÍøÂçÉϼì²âµ½¶ñÒâÈí¼þ£¬²¢¸ôÀëÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£´Ë´ÎÊÂÎñ×îÔç¿É×·ËÝÖÁ2022Ä꣬×îÖÕµ¼ÖÂ2700ÍòÓû§µÄUSIMÊý¾Ýй¶¡£¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨IMSI¡¢USIMÈÏÖ¤ÃÜÔ¿¡¢ÍøÂçʹÓÃÊý¾Ý¼°´æ´¢ÔÚSIM¿¨ÖеĶÌÐźÍÁªÏµÈ˵ÈÊý¾Ý£¬ÔöÌíÁËSIM¿¨½»Á÷¹¥»÷µÄΣº¦¡£Îª´Ë£¬SK Telecom¾öÒéΪËùÓÐÓû§·¢·ÅSIM¿¨Ìæ»»¼þ£¬²¢ÔöÇ¿Çå¾²²½·¥ÒÔ±ÜÃâδ¾­ÊÚȨµÄºÅÂëÒÆÖ²¡£2025Äê5ÔÂ8ÈÕ£¬Õþ¸®Î¯Ô±»áÐû²¼¶ñÒâÈí¼þѬȾΣ¼°25ÖÖÊý¾ÝÀàÐÍ¡£ÆäʱSK TelecomÐû²¼×èÖ¹½ÓÊÜÐÂÓû§ÒÔÓ¦¶ÔЧ¹û¡£SK Telecom×îÐÂÐÂÎųƽ«ºÜ¿ì֪ͨ2695ÍòÊÜÓ°ÏìµÄ¿Í»§ÆäÃô¸ÐÊý¾Ýй¶¡£¸Ã¹«Ë¾Ìáµ½ÔÚ23̨ÊÜѬȾ·þÎñÆ÷Öз¢Ã÷25ÖÖ²î±ð¶ñÒâÈí¼þÀàÐÍ£¬ÈëÇÖˮƽÁè¼Ý×î³õÔ¤ÆÚ¡£Óë´Ëͬʱ£¬¹«Ë½ÍŽáÊÓ²ìС×é¶ÔSK TelecomµÄ30000̨Linux·þÎñÆ÷¼ì²éºó³Æ£¬×î³õWeb ShellѬȾ±¬·¢ÔÚ2022Äê6ÔÂ15ÈÕ£¬Òâζ×ŶñÒâÈí¼þÔÚ½üÈýÄêʱ¼äÀïδ±»·¢Ã÷£¬¹¥»÷ÕßÔÚ23̨·þÎñÆ÷ÉÏÖ²Èë¶à¸öÓÐÓÃÔØºÉ¡£ÊÓ²ìÉù³Æ15̨ÊÜѬȾ·þÎñÆ÷º¬Ð¡ÎÒ˽¼Ò¿Í»§ÐÅÏ¢£¬°üÀ¨291831¸öIMEIºÅÂ룬µ«SK Telecom·ñ¶¨¡£ÊÓ²ìС×黹ָ³ö£¬SK TelecomÓÚ2024Äê12ÔÂ3ÈÕ²Å×îÏȼͼÊÜÓ°Ïì·þÎñÆ÷Ô˶¯£¬Òò´Ë´Ëǰ¿ÉÄܱ¬·¢µÄÊý¾Ýй¶ÎÞ·¨±»¼ì²âµ½¡£


https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/


2. Hazy HawkÍÅ»ïʹÓÃDNSÉèÖùýÊ§Ð®ÖÆÊÜÐÅÍÐÓòÃû


5ÔÂ20ÈÕ£¬±»×·×ÙΪ¡°Hazy Hawk¡±µÄÍþвÐÐΪÕßÕýʹÓñ»ÒÅÍüµÄDNS CNAME¼Í¼ʵÑéÍøÂç¹¥»÷¡£¸ÃÍþвÐÐΪÕßÐ®ÖÆÖ¸Ïò·ÅÆúÔÆ·þÎñµÄCNAME¼Í¼£¬½ÓÊÜÕþ¸®¡¢´óѧºÍ²Æ²ú500Ç¿¹«Ë¾µÈ»ú¹¹µÄÊÜÐÅÍÐ×ÓÓò£¬ÓÃÓÚ·Ö·¢Õ©Æ­¡¢ÐéαӦÓóÌÐòºÍ¶ñÒâ¹ã¸æ¡£InfobloxÑо¿Ö°Ô±Ö¸³ö£¬Hazy HawkÊ×ÏÈɨÃèCNAME¼Í¼ָÏò·ÅÆúÔÆ¶ËµãµÄÓò£¬²¢Í¨¹ý±»¶¯DNSÊý¾ÝÑé֤ȷ¶¨ÕâЩÓò£¬È»ºó×¢²áÓë·ÅÆúCNAMEÖÐÃû³ÆÏàͬµÄÐÂÔÆ×ÊÔ´£¬Ê¹Ô­Ê¼ÓòµÄ×ÓÓòÆÊÎöµ½ÍþвÐÐΪÕßµÄÐÂÔÆÍйÜÕ¾µã¡£½èÖúÕâÒ»ÊÖÒÕ£¬Hazy HawkÐ®ÖÆÁ˶à¸ö×ÅÃûÓòÃû£¬ÈçÃÀ¹ú¼²²¡¿ØÖÆÓëÔ¤·ÀÖÐÐĵÄcdc.gov¡¢¿ç¹úÆóÒµ¼¯ÍÅhoneywell.comµÈ¡ £¿ØÖÆ×ÓÓòÃûºó£¬ÍþвÐÐΪÕßÌìÉúÊý°Ù¸ö¶ñÒâURL£¬Òò¸¸ÓòÃûÐÅÍжȸߣ¬ÕâЩURLÔÚËÑË÷ÒýÇæÖп´ËÆÕýµ±¡£Êܺ¦Õßµã»÷URLºó£¬»á±»Öض¨Ïòµ½¶à²ãÓòÃûºÍTDS»ù´¡ÉèÊ©£¬ÕâЩÉèÊ©»áƾ֤װ±¸ÀàÐÍ¡¢IPµØµãµÈÐÅÏ¢ÆÊÎöÊܺ¦ÕßÉí·Ý¡£Infoblox±¨¸æ³Æ£¬ÕâÐ©ÍøÕ¾±»ÓÃÓÚÊÖÒÕÖ§³ÖÕ©Æ­¡¢Ðéα·À²¡¶¾¾¯±¨¡¢ÐéαÁ÷ýÌå/É«ÇéÍøÕ¾ºÍÍøÂç´¹ÂÚÒ³Ãæ¡£±ðµÄ£¬ÊÜÆ­Óû§×ÝÈ»ÍÑÀëÕ©Æ­ÍøÕ¾£¬ÈÔ»áÒòÔÊÐíä¯ÀÀÆ÷ÍÆËÍ֪ͨ¶øÊÕµ½Ò»Á¬¾¯±¨£¬ÎªHazy Hawk´øÀ´¿É¹ÛÊÕÈë¡£


https://www.bleepingcomputer.com/news/security/hazy-hawk-gang-exploits-dns-misconfigs-to-hijack-trusted-domains/


3. RVToolsÔâÓö¹©Ó¦Á´¹¥»÷£¬Èö²¥Bumblebee¶ñÒâÈí¼þ


5ÔÂ20ÈÕ£¬¿ËÈÕ£¬RVTools VMwareÖÎÀí¹¤¾ßÔâÓö¹©Ó¦Á´¹¥»÷£¬¸Ã¹¤¾ß×î³õÓÉRobware¿ª·¢£¬ÏÖ¹é´÷¶ûËùÓУ¬ÊÇVMwareÖÎÀíÔ±³£Óù¤¾ß¡£¹¥»÷ÊÂÎñÒý·¢ÆÕ±é¹Ø×¢£¬´÷¶ûÓÚ2025Äê5ÔÂ20ÈÕÐû²¼ÉùÃ÷£¬³Æ¶ñÒâRVTools×°ÖóÌÐò²¢·Ç´ÓÆä¹Ù·½ÍøÕ¾·Ö·¢£¬¶øÊÇÀ´×ÔÐéαÓòÃû£¬Í¬Ê±ÆäÖÎÀíµÄRobware.netºÍRVTools.comÍøÕ¾ÒòÔâÊÜDDoS¹¥»÷¶øÏÂÏß¡£´Ëǰ£¬ZeroDay LabsÑо¿Ô±Aidan LeonÔÚRedditÉÏ·¢Ìû³Æ£¬´ÓRVToolsÍøÕ¾ÏÂÔØµÄÎļþ±»Ö²ÈëBumblebee¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬Îļþ¹þÏ£ÖµÓëÏÖʵÏÂÔØµÄ²»Æ¥Å䣬ÏÂÔØ°æ±¾ÏÔןü´óÇÒ°üÀ¨¶ñÒâÎļþ¡£¾­½øÒ»³ÌÐò²é£¬ÕâÒ»¹¥»÷ÐÐΪ±»Ö¤Êµ¡£BumblebeeÊÇÒ»ÖÖͨ¹ýSEOÖж¾¡¢¶ñÒâ¹ã¸æºÍÍøÂç´¹ÂÚ¹¥»÷ÍÆ¹ãµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬×°Öúó»áÔÚÊÜѬȾװ±¸ÉÏÏÂÔØ²¢Ö´ÐÐÆäËû¶ñÒâÓÐÓøºÔØ£¬ÈçCobalt StrikeÐűꡢÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þµÈ£¬ÇÒÓëContiÀÕË÷Èí¼þÐж¯ÓйØ¡£ÍøÂçÇå¾²¹«Ë¾Arctic WolfÒ²±¨¸æ·¢Ã÷±»Ä¾ÂíѬȾµÄRVTools×°ÖóÌÐòͨ¹ý¶ñÒâÓòÃûÇÀ×¢Èö²¥£¬¸ÃÓòÃûÓëÕýµ±ÓòÃûÏàËÆ£¬½ö¶¥¼¶ÓòÃû²î±ð¡£±ðµÄ£¬ÉÐÓÐÕë¶ÔRVToolsÆ·ÅÆµÄSEOÖж¾ºÍ¶ñÒâ¹ã¸æÔ˶¯£¬Ö¼ÔÚÓÕÆ­Óû§ÏÂÔØ¶ñÒâ×°ÖóÌÐò¡£


https://www.bleepingcomputer.com/news/security/rvtools-hit-in-supply-chain-attack-to-deliver-bumblebee-malware/


4. ¶íº¥¶íÖÝ¿­ÌØÁÕ¿µ½¡ÖÐÐÄÔâÍøÂç¹¥»÷µ¼ÖÂϵͳÖÐÖ¹


5ÔÂ21ÈÕ£¬¶íº¥¶íÖÝ¿­ÌØÁÕ¿µ½¡ÖÐÐÄÆìÏÂÒ½ÔºÓëÒ½ÁÆÉèÊ©¿ËÈÕÔâÊÜÍøÂç¹¥»÷£¬µ¼ÖÂȫϵͳÊÖÒÕÖÐÖ¹¡ £¿­ÌØÁÕ¿µ½¡ÖÐÐÄ×Ô³ÆÊÇÒ»¸ö»ùÓÚÐÅÑöµÄ»ù¶½¸´ÁÙЪϢÈÕ»áϵͳ£¬Ö÷ÒªÔÚ´ú¶ÙµØÇøÔËÓª¶à¸öÒ½ÁÆÖÐÐĺÍÕïËù£¬Ã¿Äê´¦Öóͷ£´ó×Ú¼±ÕïÊÒ¾ÍÕï¡£¸Ã·ÇÓªÀûÐÔÒ½ÔºÍøÂç½²»°ÈËÌåÏÖ£¬ÏÖÔÚÕýÔÚÂÄÀúÒòδ¾­ÊÚȨ»á¼û¶øÒý·¢µÄÍøÂçÇå¾²ÊÂÎñ£¬ÊÂÎñʼÓÚÖܶþÔçÉÏ£¬ÏÞÖÆÁËÊÂÇéÖ°Ô±»á¼û²¿·Ö»¼ÕßÕչ˻¤Ê¿ÏµÍ³µÄÄÜÁ¦¡ £¿­ÌØÁÕÒ½ÁÆÖÐÐÄÒѽÓÄɲ½·¥×èÖ¹»ººÍ½â´ËÀàÔ˶¯£¬²¢Æð¾¢ÊÓ²ìºÍ¼à²âÇéÐΣ¬Í¬Ê±×÷·Ï²¢ÖØÐ°²ÅÅÁËÖܶþµÄסԺºÍÃÅÕïÔñÆÚÊÖÊõ¡£´Ë´Î¹¥»÷»¹µ¼Ö¸ÃÒ½ÔºÍøÂçµÄºô½ÐÖÐÐÄ̱»¾¡£²»¹ý£¬ËùÓм±ÕïÊÒºÍÕïËùÈÔ¼á³Ö¿ª·Å£¬¼ÌÐø½ÓÊÜ»¼ÕßÕïÖΡ£½²»°ÈËδ¾ÍÒ½ÔºÍøÂçÊÇ·ñÔâÊÜÀÕË÷Èí¼þ¹¥»÷µÄÎÊÌâ×÷³ö»ØÓ¦£¬µ«¾ÝCNN±¨µÀ£¬Ò½ÔºÍøÂçITÊÂÇéÖ°Ô±·¢Ã÷Ò»ÕžݳÆÀ´×ÔInterlockÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¸ÃÍÅ»ïÉϸöÔÂÔø¹Ø±Õ͸ÎöÖÎÁƹ«Ë¾DaVitaµÄÍøÂ磬´Ëǰ»¹¹¥»÷¹ýµÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ¡£


https://therecord.media/kettering-health-system-ohio-cyberattack


5. CellcomÈ·ÈÏÍøÂç¹¥»÷ÊÇÔìÉú³¤Ê±¼äÖÐÖ¹µÄÔµ¹ÊÔ­ÓÉ


5ÔÂ20ÈÕ£¬Íþ˹¿µÐÇÖÝÎÞÏß·þÎñÌṩÉÌCellcomÒÑÈ·ÈÏ£¬2025Äê5ÔÂ14ÈÕÍí×îÏȵĴóÃæ»ý·þÎñÖÐÖ¹ÊÇÓÉÍøÂç¹¥»÷µ¼ÖµÄ¡£´Ë´ÎÊÂÎñÓ°ÏìÁËÍþ˹¿µÐÇÖݺÍÃÜЪ¸ùÖݱ±²¿µØÇøµÄ¿Í»§£¬µ¼ÖÂËûÃǵÄÓïÒôºÍ¶ÌÐÅ·þÎñÖÐÖ¹£¬ÎÞ·¨²¦´òµç»°»ò·¢ËͶÌÐÅ¡£CellcomÊ×ϯִÐйÙBrighid RiordanÔÚ¿ËÈÕ֤ʵÁËÍøÂç¹¥»÷µÄÊÂʵ£¬²¢ÌåÏÖ¹«Ë¾ÒÑÖÆ¶©Ó¦¶Ô´ËÀàÇéÐεĹæ³ÌºÍÍýÏë¡£ÊÂÎñ±¬·¢ºó£¬CellcomÑÏ¿á×ñÕÕÍýÏ룬°üÀ¨Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼Ò¡¢Í¨ÖªÁª°îÊÓ²ì¾ÖºÍÍþ˹¿µÐÇÖݹÙÔ±£¬²¢È«Á¦ÒÔ¸°È·±£ÏµÍ³Çå¾²»Ö¸´ÉÏÏß¡£CellcomÇ¿µ÷£¬´Ë´Î¹¥»÷±¬·¢ÔÚ¹«Ë¾ÍøÂçµÄÒ»¸öÇøÓò£¬Óë´æ´¢Óû§Ãô¸ÐÐÅÏ¢µÄÇøÓò²î±ð£¬ÇÒûÓÐÖ¤¾ÝÅú×¢Óû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Êܵ½Ó°Ïì¡£×î³õ£¬CellcomÉù³ÆÖÐÖ¹ÊÇÓÉÊÖÒÕÎÊÌâÒýÆðµÄ£¬²¢ÌåÏÖ²¿·ÖÊý¾Ý·þÎñÈÔÔÚÔËÐС£È»¶ø£¬ÓÉÓÚÆ½Ì¨·ºÆðÎÊÌ⣬Óû§¶Ô·þÎñÖÐÖ¹ºÍÎÞ·¨ÒÆÖ²ºÅÂë¸ÐÓ¦¾ÚÉ¥¡£5ÔÂ19ÈÕ£¬Cellcom×îÏȻָ´²¿·Ö·þÎñ£¬°üÀ¨¶ÌÐÅÒÔ¼°²¦´òºÍ½ÓÌýÆäËûCellcomÓû§µÄµç»°¡£Ö»¹ÜÎÞ·¨°ü¹ÜºÎʱÖÜÈ«»Ö¸´·þÎñ£¬µ«¹«Ë¾ÕýÆð¾¢ÔÚ±¾ÖÜĩǰʵÏÖÕâһĿµÄ¡£


https://www.bleepingcomputer.com/news/security/mobile-carrier-cellcom-confirms-cyberattack-behind-extended-outages/


6. SideWinder APT×éÖ¯¾«×¼¹¥»÷ÄÏÑǶà¹úÕþ¸®»ú¹¹


5ÔÂ20ÈÕ£¬Ë¹ÀïÀ¼¿¨¡¢ÃϼÓÀ­¹úÓë°Í»ù˹̹µÄ¸ß¼¶±ðÕþ¸®»ú¹¹½üÆÚ³ÉΪAPT×éÖ¯SideWinderÐÂÒ»ÂÖ¹¥»÷µÄÖØµã¡£¹¥»÷ÕßÔËÓÃÓã²æÊ½´¹ÂÚÓʼþÍÅ½áµØÀíΧÀ¸ÊÖÒÕ£¬È·±£¶ñÒâÔØºÉ½öÕë¶ÔÌØ¶¨¹ú¼ÒÄ¿µÄ¡£¹¥»÷Á´Í¨¹ýÓÕ¶üÎĵµ¼¤»î£¬×îÖÕ°²ÅÅStealerBot¶ñÒâÈí¼þ£¬ÊÖ·¨ÓëSideWinder´ËǰÔ˶¯ÌØÕ÷Ïà·û¡£´Ë´Î¹¥»÷Ãé×¼ÄÏÑǶà¹úÒªº¦²¿·Ö£¬ÈçÃϼÓÀ­¹úµçÐÅî¿ÏµÎ¯Ô±»á¡¢¹ú·À²¿¡¢²ÆÎñ²¿£¬°Í»ù˹̹±¾ÍÁÊÖÒÕÉú³¤¾Ö£¬ÒÔ¼°Ë¹ÀïÀ¼¿¨ÍâÕ®ÖÎÀí¾Ö¡¢¹ú·À²¿¡¢ÖÐÑëÒøÐеÈ¡£¹¥»÷ÕßʹÓÃ΢ÈíOfficeÖеÄÀúÊ·Îó²îCVE-2017-0199ÓëCVE-2017-11882×÷Ϊ³õʼ¹¥»÷ǰÑÔ£¬°²Åž߱¸³¤ÆÚ»¯»á¼ûÄÜÁ¦µÄ¶ñÒâ³ÌÐò¡£¶ñÒâÎĵµ´¥·¢CVE-2017-0199Îó²îºó£¬Í¨¹ýDLL²àÔØÊÖÒÕÊͷźóÐøÔØºÉ£¬¶øµØÀíΧÀ¸ÊÖÒÕÔòÈ·±£½öÔ¤Éè¹ú¼Ò¹æÄ£ÄÚµÄÊܺ¦Õß»áÊÕµ½ÏÖʵ¶ñÒâRTFÎļþ£¬¸ÃÎļþʹÓù«Ê½±à¼­Æ÷Îó²îCVE-2017-11882´¥·¢ÄÚ´æÆÆËð£¬Ö´ÐлùÓÚshellcodeµÄ¼ÓÔØÆ÷ÒÔÔËÐÐStealerBot¡£StealerBot×÷ΪÄ £¿é»¯Ö²Èë³ÌÐò£¬Äܹ»ÇÔÈ¡ÆÁÄ»½ØÍ¼¡¢¼üÅ̼ͼ¡¢ÃÜÂë¡¢ÎļþµÈÃô¸ÐÊý¾Ý¡£


https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html