°¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ® £¬¿Í»§ÐÅÏ¢Ôâй¶

Ðû²¼Ê±¼ä 2025-05-22

1. °¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ® £¬¿Í»§ÐÅÏ¢Ôâй¶


5ÔÂ20ÈÕ £¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾È·ÈÏÆäϵͳÔâδ¾­ÊÚȨ»á¼û £¬µ¼Ö¿ͻ§ÐÅϢй¶¡£¾Ý¡¶×ÔÓɱ¨¡·±¨µÀ £¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÒÑÁªÏµ¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§ £¬ÆäÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚµÈСÎÒ˽¼ÒÐÅÏ¢ÒÉËÆÔںڿ͹¥»÷ÖÐй¶¡£5ÔÂ16ÈÕ°¢µÏ´ï˹º«¹ú¹«Ë¾Ò²Ïò¿Í»§Ðû²¼ÁËÀàËÆÐÅÏ¢ £¬¹¥»÷Õß»ñÈ¡ÁËÏÕЩÏàͬµÄÒ»×麫¹ú¿Í»§ÐÅÏ¢¡£²»¹ý £¬ÔÚÕâÁ½ÆðÊÂÎñÖÐ £¬°¢µÏ´ï˹¾ùδÃ÷È·¹¥»÷ÀàÐͼ°ÊÜÓ°ÏìÈËÊý¡£±¨µÀÖ¸³ö £¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÔâÊܵĹ¥»÷̻¶ÁËÁªÏµ¹ý¿Í·þµÄ¿Í»§ £¬¶øÕë¶Ôº«¹ú¹«Ë¾µÄ¹¥»÷ÊÂÎñÖÐ £¬Î¥¹æÍ¨ÖªÍ¬ÑùÖ¸Ïò¿Í·þ²¿·Ö £¬ÕâÅú×¢¸ÃÆ·ÅÆ¿Í»§¿ÉÄÜÃæÁÙÈ«ÇòÐÔΣº¦¡£±ðµÄ £¬°¢µÏ´ï˹ǿµ÷ £¬ÔÚÕâÁ½ÆðÊÂÎñÖÐ £¬ÏµÍ³ÔâÈëÇÖʱ´ú²ÆÎñÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý²¢Î´Êܵ½Ó°Ïì¡£µ«É¥Ê§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÎÞÒÉ»áÔöÌí¿Í»§ÔâÊÜÍøÂç¹¥»÷µÄΣº¦ £¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÉí·Ý͵ÇÔºÍÓÐÕë¶ÔÐÔµÄÍøÂç´¹ÂÚ¹¥»÷ £¬Èçð³ä×ÅÃûÆ·ÅÆÒªÇóÌá¹©ÌØÊâСÎÒ˽¼ÒÐÅÏ¢»ò¸¶¿î £¬»òÓÕÆ­Óû§Í¸Â¶¸ü¶àÃô¸ÐÐÅÏ¢¡£


https://cybernews.com/privacy/adidas-second-data-breach-customers-exposed/


2. Ó¢ÎïÁ÷¹«Ë¾Peter Green ChilledÔâÀÕË÷¹¥»÷


5ÔÂ20ÈÕ £¬Peter Green Chilled×÷Ϊһ¼Ò×ܲ¿Î»ÓÚÓ¢¹úµÄÎïÁ÷¹«Ë¾ £¬ÓëTesco¡¢AldiºÍSainsbury'sµÈ´óÐÍÁãÊÛÉÌÏàÖú £¬Æä²¿·ÖϵͳÔÚÂêɯ°Ù»õÔâÊÜÍøÂç¹¥»÷ºó²»µ½Ò»¸öÔÂÒ²Ôâµ½Á˼ÓÃÜ¡£¾ÝÓ¢¹ú¹ã²¥¹«Ë¾±¨µÀ £¬ÍþвÐÐΪÕßÓÚÖÜÈý¼ÓÃÜÁ˸ù«Ë¾Êý¾Ý £¬ÈÅÂÒÁËÆäÔËÓª £¬ÆÆËðÁËÎïÁ÷ϵͳ¡£¸Ã¹«Ë¾ÕýÔÚÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷ £¬ÀÕË÷Èí¼þÍÅ»ïÈëÇÖϵͳ¡¢¼ÓÃÜÊý¾Ý²¢Ë÷ÒªÊê½ð¡£ÔËÓªÖÐÖ¹¶ÔÎïÁ÷¹«Ë¾Ó°ÏìÃô¸Ð £¬¿ÉÄܵ¼Ö½»¸¶ÑÓ³Ù £¬½ø¶øÓ°ÏìÕû¸ö¹©Ó¦Á´¡£ÐÅÏ¢Çå¾²Ñо¿Ô±Aras NazarovasÖ¸³ö £¬´ËÀ๥»÷¿ÉÄÜʹ¹«Ë¾ÏÝÈë̱»¾ £¬ÉõÖÁÔÝʱÎÞ·¨Îª×ÅÃûÆ·ÅÆÌṩ·þÎñ £¬µ¼Ö³¬ÊÐÌØ¶¨²úÆ·ÔÝʱǷȱ¡£ÐÅÏ¢Ç徲רҵЭ»áISACAµÄÊ×ϯȫÇòÕ½ÂÔ¹ÙChris DimitriadisÒÔΪ £¬´Ë´Î¹¥»÷±ê¼Ç×ÅÒ»¸öÁîÈ˵£ÐĵÄÇ÷ÊÆ £¬ÍøÂç·¸·¨·Ö×Ó²»µ«Ãé×¼ÖÁ¹«Ë¾»òÒªº¦»ù´¡ÉèÊ© £¬»¹¹¥»÷¹©Ó¦Á´ £¬´øÀ´½»¸¶ÖÐÖ¹¡¢¿â´æÆÌÕźͲÆÎñËðʧµÈÏÖʵЧ¹û¡£


https://cybernews.com/security/retail-logistics-ransomware-tesco-aldi/


3. Lumma¶ñÒâÈí¼þÐж¯±»×è¶Ï £¬2300¸öÓòÃû±»²é·â


5ÔÂ21ÈÕ £¬È«ÇòÕë¶ÔLumma¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©ÐÅÏ¢ÇÔÈ¡Ðж¯Õö¿ªÐ­Í¬ÆÆË𠣬Àֳɲé»ñÊýǧ¸öÓòÃûÒÔ¼°²¿·Ö»ù´¡ÉèÊ©Ö÷¸É¡£´Ë´ÎÐж¯¹æÄ£½Ï´ó £¬Éæ¼°¶à¼Ò¿Æ¼¼¹«Ë¾ÓëÖ´·¨»ú¹¹¡£Î¢ÈíÓÚ2025Äê5ÔÂ13ÈÕ½ÓÄÉÖ´·¨Ðж¯ £¬²é·âÁËÔ¼2300¸öÓòÃû¡£ÃÀ¹ú˾·¨²¿Ò²Æð¾¢Ðж¯ £¬²é·âÁËLummaµÄ¿ØÖÆÃæ°å £¬²¢µ·»ÙÁËÏòÍøÂç·¸·¨·Ö×Ó³ö×â¶ñÒâÈí¼þµÄÊг¡¡£Óë´Ëͬʱ £¬Å·ÖÞÐ̾¯×é֯ŷÖÞÍøÂç·¸·¨ÖÐÐĺÍÈÕ±¾ÍøÂç·¸·¨¿ØÖÆÖÐÐÄЭÖú²é·âÁËλÓÚÅ·ÖÞºÍÈÕ±¾µÄ»ù´¡ÉèÊ©¡£Î¢ÈíÊý×Ö·¸·¨²¿·ÖÖúÀí×ÜÖ´·¨ÕÕÁÏÌåÏÖ £¬ÔÚ2025Äê3ÔÂ16ÈÕÖÁ5ÔÂ16ÈÕʱ´ú £¬È«ÇòÓÐÁè¼Ý39.4Íǫ̀WindowsÅÌËã»úѬȾÁ˸öñÒâÈí¼þ £¬Î¢ÈíÓë¶à²¿·ÖϸÃÜÏàÖú £¬ÀÖ³ÉÇжÏÁ˸öñÒâÈí¼þÓëÊܺ¦ÕßÖ®¼äµÄͨѶ¡£Cloudflare·½Ãæ³Æ £¬´Ë´ÎÐж¯Ê¹LummaÔËÓªÉÌÎÞ·¨»á¼û¿ØÖÆÃæ°åµÈÒªº¦ÉèÊ© £¬¸øÆä´øÀ´ÁËÔËÓªºÍ²ÆÎñ±¾Ç®¡£¼ÓÈë´Ë´ÎÍŽáÐж¯µÄ¹«Ë¾³ýÁË΢ÈíÍâ £¬ÉÐÓÐESET¡¢CleanDNSµÈ¡£Lumma×÷ΪһÖÖ¶ñÒâÈí¼þ¼´·þÎñÐÅÏ¢ÇÔÈ¡³ÌÐò £¬Ö÷ÒªÕë¶ÔWindowsºÍmacOSϵͳ £¬ÍøÂç·¸·¨·Ö×ÓÖ»ÐèÆÆ·Ñ250ÃÀÔªµ½1000ÃÀÔª¼´¿É¶©ÔÄ×âÓá£Ëü¾ß±¸ÏȽøµÄÌӱܺÍÊý¾ÝÇÔÈ¡¹¦Ð§ £¬Í¨¹ý¶àÖÖÇþµÀÈö²¥²¢Ñ¬È¾Êܺ¦Õß £¬ÈëÇÖϵͳºó¿ÉÇÔÈ¡¶àÖÖÊý¾Ý £¬ÍøÂçºó·¢Ëͻع¥»÷Õß·þÎñÆ÷¾ÙÐгöÊÛ»òÓÃÓÚÆäËû¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-operation-disrupted-2-300-domains-seized/


4. 3AMÀÕË÷Èí¼þʹÓõç×ÓÓʼþºäÕ¨ÓëαÔìµç»°¾ÙÐй¥»÷


5ÔÂ21ÈÕ £¬3AMÀÕË÷Èí¼þÁ¥Êô»ú¹¹Õý½ÓÄɸ߶ÈÕë¶ÔÐԵĹ¥»÷ÊÖ¶Î £¬Í¨¹ýµç×ÓÓʼþºäÕ¨ºÍαÔìµÄITÖ§³Öµç»° £¬Ê¹ÓÃÉç»á¹¤³ÌѧÓÕÆ­Ô±¹¤ÌṩԶ³Ì»á¼û¹«Ë¾ÏµÍ³µÄƾ֤¡£Sophos±¨¸æÏÔʾ £¬ÔÚ2024Äê11ÔÂÖÁ2025Äê1ÔÂʱ´ú £¬ÖÁÉÙÓÐ55Æð¹¥»÷ʹÓÃÁ˸ÃÊÖÒÕ £¬Éæ¼°Á½¸ö²î±ðµÄÍþв¼¯Èº¡£ÕâЩ¹¥»÷ÑØÏ®ÁËBlackBastaµÄϰÓÃÊÖ·¨ £¬°üÀ¨µç×ÓÓʼþºäÕ¨¡¢Í¨¹ýMicrosoft Teams¾ÙÐÐÓïÒô´¹ÂÚ¼°ÀÄÓÃQuick Assist¡£Black BastaÄÚ²¿¶Ô»°µÄй¶ΪÆäËûÍþвÐÐΪÕßÌṩÁË¿ÉʹÓõÄÄ£°å £¬ÖúÆä¿ìËÙÕÆÎÕÇéÐΡ£2025ÄêµÚÒ»¼¾¶È £¬3AMÀÕË÷Èí¼þÕë¶ÔSophos¿Í»§¶ËÌᳫ¹¥»÷ £¬½ÓÄÉÀàËÆÒªÁ쵫¸ÄÓÃÕæÊµµç»°ÍøÂç´¹ÂÚ¡£¹¥»÷ÕßαÔìÄ¿µÄÕæÊµIT²¿·Öµç»°ºÅÂë £¬ÔÚÈý·ÖÖÓÄÚ·¢ËÍ24·âδÇëÇóÓʼþ¾ÙÐкäÕ¨ £¬²¢Ëµ·þÔ±¹¤·­¿ªMicrosoft Quick AssistÊÚÓèÔ¶³Ì»á¼ûȨÏÞ¡£Ëæºó £¬¹¥»÷Õß´ÓÓÕÆ­ÓòÏÂÔØ²¢ÌáÈ¡¶ñÒâµµ°¸ £¬°üÀ¨VBS¾ç±¾¡¢QEMUÄ£ÄâÆ÷ºÍԤװQDoorºóÃŵÄWindows 7Ó³Ïñ £¬Ê¹ÓÃQEMUÌӱܼì²â £¬ÊµÏÖÒ»Á¬ÇÒδ±»·¢Ã÷µÄÍøÂç»á¼û¡£¹¥»÷Õßͨ¹ýWMICºÍPowerShell¾ÙÐÐÕì̽ £¬½¨ÉèÍâµØÖÎÀíÔ±ÕÊ»§¡¢×°ÖÃÉÌÒµRMM¹¤¾ßXEOXRemote²¢ÆÆËðÓòÖÎÀíÔ±ÕÊ»§¡£Ö»¹ÜSophos²úÆ·×èÖ¹Á˺áÏòÒÆ¶¯ºÍ·ÀÓùÍ£ÓÃʵÑé £¬µ«¹¥»÷ÕßÈÔʹÓÃGoodSync¹¤¾ß½«868GBÊý¾Ýй¶µ½BackblazeÔÆ´æ´¢ÖС£


https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/


5. Coinbase³Æ½üÆÚÊý¾Ýй¶ӰÏìÁË69461Ãû¿Í»§


5ÔÂ21ÈÕ £¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ £¬Ó°Ïì69461Ãû¿Í»§¡£CoinbaseÔÚÌá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨÖÐÌåÏÖ £¬ÆäÍâÑóÁãÊÛÖ§³ÖËùÔÚµÄÉÙÊýÖ°Ô±²»µ±»á¼ûÁ˿ͻ§ÐÅÏ¢¡£Ð¹Â¶µÄÊý¾ÝËä²»°üÀ¨ÃÜÂ롢˽ԿµÈ¿ÉÖ±½Ó»á¼û×ʽð»òÕË»§µÄÐÅÏ¢ £¬µ«°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºóËÄλ¡¢ÒøÐÐÕ˺ŵÈСÎÒ˽¼Ò±êʶ·û £¬ÒÔ¼°¿ÉÄܵÄÕþ¸®Éí·ÝÐÅÏ¢ºÍÕË»§ÐÅϢͼÏñ¡£CoinbaseÖÒÑÔ³Æ £¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÉç»á¹¤³Ì¹¥»÷ £¬ÓÕʹÊܺ¦Õß×ªÒÆ×ʽð¡£´Ëǰ £¬ÓÐÈ˵£ÐÄÍøÂç·¸·¨·Ö×Ó»ñÈ¡ÕË»§Óà¶îºÍµØµãºó¿ÉÄÜÒý·¢ÑÏÖØÐ§¹û¡£CoinbaseÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþÖÐ͸¶ £¬ÍþвÐÐΪÕßÔÚÍâÑóÖ§³ÖÖ°Ô±»ò³Ð°üÉ̵Ä×ÊÖúÏ»ñÈ¡Á˸ߴï1% Coinbase¿Í»§ÈºµÄÊý¾Ý £¬²¢ÓÚ5ÔÂ11ÈÕ·¢ËÍÀÕË÷Óʼþ £¬ÒªÇóÖ§¸¶2000ÍòÃÀÔªÊê½ðÒÔ×èÖ¹ÐÅÏ¢±»¹ûÕæ¡£È»¶ø £¬Coinbase¾Ü¾øÖ§¸¶Êê½ð £¬¶øÊÇÉèÁ¢ÁË2000ÍòÃÀÔªµÄ½±Àø»ù½ð £¬ÃãÀøÌṩÓÐÖúÓÚÕÒµ½²¢ÉþÖ®ÒÔ·¨¹¥»÷ÕßµÄÏßË÷¡£ÏÖÔÚ £¬CoinbaseÈÔÔÚÆÀ¹À´Ë´Î¹¥»÷µÄ²ÆÎñÓ°Ïì £¬°üÀ¨µ÷½âºÍ¿Í»§ÍË¿îÓÃ¶È £¬Ô¤¼Æ¿ÉÄÜÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£¸Ã¹«Ë¾ÌåÏÖ½«Åâ³¥Òò¸ÃÊÂÎñ¶øÎó½«×ʽð»ã¸øÕ©Æ­ÕßµÄÁãÊÛ¿Í»§ £¬²¢¾ÙÐÐÉó²éÒÔÈ·ÈÏÊÂʵ¡£


https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/


6. KrebsOnSecurityÔâ6.3Tbps DDoS¹¥»÷


5ÔÂ21ÈÕ £¬×ÅÃûÍøÂçÇå¾²²©¿ÍKrebsOnSecurity¿ËÈÕÔâÊÜ´ó¹æÄ£DDoS¹¥»÷ £¬·åÖµÁ÷Á¿´ïÿÃë6.3Õ×Õ×±ÈÌØ £¬³ÉΪÓмͼÒÔÀ´¹æÄ£×î´óµÄ¹¥»÷Ö®Ò»¡£´Ë´Î¹¥»÷¾ÝÐÅÔ´×ÔÃûΪ¡°Aisuru¡±µÄÐÂÐÍÎïÁªÍø½©Ê¬ÍøÂç £¬¸ÃÍøÂçÓÚ2024Äê8ÔÂÊ״η¢Ã÷ £¬Ö÷ÒªÓÉÊÜѬȾµÄÎïÁªÍø×°±¸Èç·ÓÉÆ÷¡¢IPÉãÏñÍ·ºÍÊý×ÖÊÓÆµÂ¼Ïñ»ú×é³É¡£ÕâЩװ±¸±»Ð®ÖƺóЭͬ¹¥»÷ £¬ÏòKrebsOnSecurityÕ¾µã·¢ËÍ´ó×ÚÁ÷Á¿¡£Ö»¹Ü¹¥»÷½öÒ»Á¬Ô¼45Ãë £¬µ«ÍþÁ¦ÖØ´ó £¬²»¹ýÍøÕ¾ÒòÊܹȸ衰¶ÜÅÆÍýÏ롱± £»¤¶ø¼á³ÖÔÚÏß¡£¡°Aisuru¡±½©Ê¬ÍøÂçµÄÃû×Ö½ñÄêÔçЩʱ¼äÒÑ·ºÆðÔÚµØÏÂÂÛ̳ £¬ÓëDDoS¹ÍÓ¶·þÎñÏà¹Ø £¬´Ë´Î¹¥»÷¿ÉÄÜÊÇ¶ÔÆä¹¦Ð§µÄѹÁ¦²âÊÔ £¬»òÒԸߵ÷Ä¿µÄչʾʵÁ¦¡£¹¥»÷ÕßÉí·ÝÉв»Ã÷È· £¬µ«KrebsÔÚ²©¿ÍÖÐÖ¸³ö £¬¹¥»÷Õß¿ÉÄÜÓëÌṩDDoS·þÎñºÍ½©Ê¬ÍøÂç×âÁÞµÄÍøÃñ¡°Forky¡±ÓÐ¹Ø £¬Ö»¹ÜForky·ñ¶¨²ß»®Á˴˴ι¥»÷ £¬µ«ÈϿɼÓÈëÁËAisuru½©Ê¬ÍøÂçµÄ¿ª·¢ºÍÍÆ¹ã¡£


https://hackread.com/krebsonsecurity-6-3-tbps-ddos-attack-aisuru-botnet/