ZestixÍþвÐÐΪÕßͨ¹ýÇÔȡƾ֤ÈëÇÖÆóÒµÔÆÆ½Ì¨
Ðû²¼Ê±¼ä 2026-01-061. ZestixÍþвÐÐΪÕßͨ¹ýÇÔȡƾ֤ÈëÇÖÆóÒµÔÆÆ½Ì¨
1ÔÂ5ÈÕ£¬½üÆÚ£¬ÍøÂçÇå¾²¹«Ë¾Hudson RockÅû¶£¬ÃûΪZestixµÄÍþвÐÐΪÕßÕýÔÚµØÏÂÂÛ̳¶µÊÛ´ÓÊýÊ®¼Ò¹«Ë¾ÇÔÈ¡µÄÆóÒµÊý¾Ý£¬Éæ¼°º½¿Õ¡¢¹ú·À¡¢Ò½ÁÆ¡¢¹«ÓÃÊÂÒµ¡¢µçÐÅ¡¢Õþ¸®µÈ¶à¸öÒªº¦ÐÐÒµ¡£ÕâЩÊý¾ÝÒÉËÆÍ¨¹ýÈëÇÖÆóÒµÔÆÆ½Ì¨ÈçShareFile¡¢NextcloudºÍOwnCloud»ñÈ¡£¬¶ø³õʼ»á¼ûȨÏÞ¿ÉÄÜÔ´ÓÚÔ±¹¤×°±¸°²ÅŵÄRedLine¡¢LummaºÍVidarµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍøÂçµÄƾ֤¡£´ËÀà¶ñÒâÈí¼þ³£Í¨¹ý¶ñÒâ¹ã¸æ»òClickFix¹¥»÷Èö²¥£¬×¨ÃÅÇÔÈ¡ä¯ÀÀÆ÷ƾ֤¡¢ÐÅÓÿ¨ÐÅÏ¢¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¼°¼´Ê±Í¨Ñ¶Ó¦ÓÃÄÚÈÝ¡£Hudson RockÖ¸³ö£¬ÈôÆóҵδÆôÓöàÒòËØÉí·ÝÑéÖ¤£¨MFA£©£¬¹¥»÷Õß¿ÉʹÓÃÓÐÓÃÆ¾Ö¤Ö±½ÓµÇ¼Îļþ¹²Ïí·þÎñ¡£ÆÊÎö·¢Ã÷£¬²¿·Ö±»µÁƾ֤ÔÚ·¸·¨Êý¾Ý¿âÖб£´æ¶àÄ꣬ÆóÒµºã¾ÃδÂÖ»»Æ¾Ö¤»òʹÔ˶¯»á»°Ê§Ð§£¬µ¼ÖÂÒ»Á¬Ì»Â¶Î£º¦¡£Zestix×÷Ϊ³õʼ»á¼ûÊðÀí£¨IAB£©£¬³öÊ۵ı»µÁÊý¾ÝÁ¿´Ó¼¸Ê®GBµ½ÊýTB²»µÈ£¬º¸Ç·É»úά»¤Êֲᡢ¹ú·À¹¤³ÌÎļþ¡¢¿Í»§Êý¾Ý¿â¡¢¿µ½¡¼Í¼¡¢¹«¹²½»Í¨Ê¾Òâͼ¡¢LiDARµØÍ¼¡¢ISPÍøÂçÉèÖá¢ÎÀÐÇÏîÄ¿Êý¾Ý¡¢ERPÔ´´úÂë¼°Õþ¸®ÌõÔ¼µÈÃô¸ÐÐÅÏ¢£¬¿ÉÄÜÒý·¢Çå¾²¡¢Òþ˽й¶¼°ÉÌÒµÌØ¹¤Î£º¦£¬ÉõÖÁ´¥¼°¹ú¼ÒÇå¾²ÎÊÌâ¡£
https://www.bleepingcomputer.com/news/security/cloud-file-sharing-sites-targeted-for-corporate-data-theft-attacks/
2. BrightspeedÔâCrimson CollectiveÀÕË÷ÍŻ﹥»÷
1ÔÂ5ÈÕ£¬ÃÀ¹ú×î´ó¹âÏË¿í´ø¹«Ë¾Ö®Ò»Brightspeed¿ËÈÕÕýÊÓ²ìCrimson CollectiveÀÕË÷ÍÅ»ïÌá³öµÄÇå¾²Îó²î¼°Êý¾Ý͵ÇÔÖ¸¿Ø¡£¸Ã¹«Ë¾½¨ÉèÓÚ2022Ä꣬ΪÃÀ¹ú20¸öÖݵÄÅ©´å¼°½¼ÇøÉçÇøÌṩµçÐÅÓ뻥ÁªÍø·þÎñ¡£Crimson CollectiveÔÚTelegramƵµÀÐû³Æ£¬ÒÑÇÔÈ¡³¬100ÍòBrightspeed¿Í»§µÄÃô¸ÐÐÅÏ¢£¬°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡¢µØµã¡¢ÕË»§ÏêÇ飨º¬ÐÕÃû¡¢ÓÊÏä¡¢µç»°£©¡¢Ö§¸¶ÀúÊ·¡¢²¿·ÖÖ§¸¶¿¨Êý¾Ý¼°º¬PIIµÄÔ¤Ô¼/¶©µ¥¼Í¼£¬²¢Íþв½«¹ûÕæÑù±¾ÒÔʩѹ¡£Brightspeed»ØÓ¦³Æ¡°¸ß¶ÈÖØÊÓÍøÂçÇå¾²¼°¿Í»§ÐÅÏ¢±£»¤£¬ÒÑÆô¶¯ÊӲ죬ºóÐø½«Ïò¿Í»§¡¢Ô±¹¤¼°î¿Ïµ²¿·Öת´ïÏ£Íû¡±¡£ÆÊÎöÏÔʾ£¬Crimson CollectiveµÄ¹¥»÷ÊÖ·¨·ºÆðϵͳÐÔÌØÕ÷£ºÍ¨¹ýÇÔȡƾ֤¡¢Ê¹ÓÃÔÆ·þÎñÉèÖÃÎó²î£¨ÈçδÆôÓöàÒòËØÈÏÖ¤£©¼°¶ñÒâÈí¼þÈö²¥£¨ÈçRedLine¡¢Lumma£©»ñÈ¡³õʼ»á¼ûȨÏÞ£¬½ø¶øºáÏòÉøÍ¸ÆóÒµ½¹µãϵͳ¡£
https://www.bleepingcomputer.com/news/security/us-broadband-provider-brightspeed-investigates-breach-claims/
3. Sedgwick֤ʵÆäÕþ¸®×Ó¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷
1ÔÂ5ÈÕ£¬µÚÈý·½Ë÷ÅâºÍ¸£ÀûÖÎÀí»ú¹¹Sedgwick¿ËÈÕ֤ʵ£¬Æä×Ó¹«Ë¾Sedgwick Government SolutionsÔâÓöÍøÂç¹¥»÷¡£¸Ã¹«Ë¾ÎªÃÀ¹úÕþ¸®»ú¹¹£¨°üÀ¨ÁìÍÁÇå¾²²¿¡¢ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£©¼°ÌìÏÂÊÐÕþÕþ¸®ÌṩË÷ÅâºÍΣº¦ÖÎÀí·þÎñ¡£¾ÝSedgwick½²»°ÈËÉùÃ÷£¬ÊÂÎñ±¬·¢ºó£¬¹«Ë¾Á¬Ã¦Æô¶¯ÊÂÎñÏìÓ¦ÐÒ飬²¢ÓëÍøÂçÇ徲ר¼ÒÏàÖúÕö¿ªÊӲ졣¾ÆðÔ´ÆÀ¹À£¬¹¥»÷½öÓ°ÏìÁËÒ»¸öÁæØêµÄÎļþ´«Êäϵͳ£¬Î´²¨¼°Sedgwick×ÔÉíÍøÂç»òÆä×Ó¹«Ë¾µÄÆäËûϵͳ£¬°üÀ¨Òªº¦µÄË÷ÅâÖÎÀí·þÎñÆ÷¡£¹«Ë¾Ç¿µ÷£¬Sedgwick Government SolutionsÓªÒµÓëÆäËûÓªÒµÍêÈ«ÊèÉ¢£¬ÆäËûϵͳ»òÊý¾Ý¾ùδÊÜÓ°Ï죬ÇÒ·þÎñÄÜÁ¦Î´ÊÜ×ÌÈÅ£¬ÒÑִ֪ͨ·¨²¿·Ö²¢Ò»Á¬Óë¿Í»§¼á³ÖÏàͬ¡£´Ë´Î¹¥»÷ÓÉTridentLockerÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÊµÑé¡£¸Ã×éÖ¯ÓÚÐÂÄêÒ¹Éù³Æ´ÓSedgwick Government SolutionsÇÔȡԼ3.4GBÊý¾Ý²¢¹«Ö®ÓÚÖÚ¡£
https://www.securityweek.com/sedgwick-confirms-cyberattack-on-government-subsidiary/
4. Ledger¿Í»§Êý¾ÝÒòGlobal-eϵͳÔâÈëÇÖй¶
1ÔÂ5ÈÕ£¬¿ËÈÕ£¬Çø¿éÁ´¹«Ë¾LedgerÏò²¿·Ö¿Í»§·¢³ö֪ͨ£¬³ÆÆäµÚÈý·½Ö§¸¶´¦Öóͷ£ÉÌGlobal-eµÄϵͳÔâºÚ¿ÍÈëÇÖ£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÊý¾Ýй¶¡£LedgerÇ¿µ÷£¬Æä×ÔÉíÍøÂçδÊÜÓ°Ï죬Ӳ¼þÓëÈí¼þϵͳÈÔ¼á³ÖÇå¾²¡£´Ë´Îй¶µÄÊý¾ÝÉæ¼°ÔÚLedger.comʹÓÃGlobal-eÍê³É¹ºÖõĿͻ§£¬Ïêϸ°üÀ¨ÐÕÃû¡¢ÁªÏµÐÅÏ¢µÈ¶©µ¥Êý¾Ý£¬µ«Ã÷ȷɨ³ýÖ§¸¶ÐÅÏ¢¡¢²ÆÎñÊý¾Ý¡¢¼ÓÃÜÇ®°üÖú¼Ç´Ê¡¢Çø¿éÁ´Óà¶î¼°Êý×Ö×ʲúÏà¹ØÉñÃØÐÅÏ¢¡£Global-e×÷Ϊ¶à¼Ò¹ú¼ÊÆ·ÅÆµÄÖ§¸¶·þÎñÉÌ£¬Æä·þÎñº¸Ç½áÕË¡¢¶©µ¥´¦Öóͷ£¡¢Ë°ÎñºÏ¹æµÈ»·½Ú£¬Ðè´æ´¢¿Í»§¶©µ¥Êý¾Ý¡£¸Ã¹«Ë¾¿Í»§°üÀ¨Bang&Olufsen¡¢adidas¡¢DisneyµÈ×ÅÃûÆ·ÅÆ¡£ÊÂÎñ±¬·¢ºó£¬Global-eѸËÙ¸ôÀëÊÜÓ°Ïìϵͳ²¢Æô¶¯·À»¤²½·¥£¬ÏÖÔÚÕýÖ±½Ó֪ͨ¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼°î¿Ïµ»ú¹¹¡£Global-eÓëLedger¾ùÇ¿µ÷£¬¹¥»÷Õßδ»ñÈ¡ÈκÎÖ§¸¶Æ¾Ö¤»òÕË»§ÐÅÏ¢£¬µ«¿ÉÄÜͨ¹ýй¶µÄÁªÏµ·½·¨Ìᳫ´¹ÂÚ¹¥»÷£¬ÊÔͼÇÔÈ¡Óû§ÃÜÂë»òÖú¼Ç´Ê¡£
https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/
5. NordVPN·ñ¶¨Êý¾Ýй¶ָ¿Ø£¬³Æ¹¥»÷ÕßÓµÓÐÐéÄâÊý¾Ý
1ÔÂ5ÈÕ£¬¿ËÈÕ£¬NordVPNÕë¶ÔÍøÂç·¸·¨·Ö×ÓÉù³ÆÆäÄÚ²¿Salesforce¿ª·¢·þÎñÆ÷ÔâÈëÇÖÒ»ÊÂ×÷³ö»ØÓ¦£¬Ã÷È··ñ¶¨Ö¸¿Ø²¢³ÎÇåÊÂÎñÕæÏà¡£´Ëǰ£¬ÍþвÐÐΪÕß¡°1011¡±ÔÚºÚ¿ÍÂÛ̳Ðû³Æ£¬Í¨¹ý±©Á¦ÆÆ½âNordVPN¿ª·¢·þÎñÆ÷£¬ÇÔÈ¡Á˰üÀ¨Salesforce APIÃÜÔ¿¡¢JiraÁîÅÆµÈÃô¸ÐÐÅÏ¢µÄ10Óà¸öÊý¾Ý¿â¡£¶Ô´Ë£¬NordVPNÚ¹Êͳƣ¬Ëùν¡°Ð¹Â¶Êý¾Ý¡±ÊµÎª¼¸¸öÔÂǰ¶ÔDZÔÚ×Ô¶¯»¯²âÊÔ¹©Ó¦É̾ÙÐÐÊÔÓòâÊÔʱ£¬´ÓÔÝʱ²âÊÔÇéÐÎÖÐÇÔÈ¡µÄ²âÊÔÊý¾Ý£¬¸ÃÇéÐÎÓëÆä×ÔÉí»ù´¡ÉèÊ©ÎÞÈκιØÁª¡£NordVPNÇ¿µ÷£¬²âÊÔÇéÐνö°üÀ¨ÓÃÓÚ¹¦Ð§¼ì²éµÄÐéÄâÊý¾Ý£¬´ÓδÉÏ´«ÕæÊµ¿Í»§Êý¾Ý¡¢Éú²úÔ´´úÂë»òÓÐÓÃÃô¸Ðƾ֤¡£ÓÉÓÚ²âÊÔ½öΪÆðÔ´ÆÀ¹ÀÇÒδǩÊðÌõÔ¼£¬¸ÃÇéÐδÓδÓëÉú²úϽµµÍ¬½Ó£¬×îÖÕҲδѡÔñ¸Ã¹©Ó¦ÉÌ¡£¹«Ë¾ÒÑÁªÏµÉæÊ¹©Ó¦É̽øÒ»²½ºËÕæÏàÐΡ£
https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/
6. Å·ÖÞÂùÝÒµÔâ¶íÍøÂç·¸·¨·Ö×Ó¶ñÒâÈí¼þ¹¥»÷
1ÔÂ6ÈÕ£¬¿ËÈÕ£¬ÒÉËÆ¶íÂÞË¹ÍøÂç·¸·¨·Ö×ÓÕë¶ÔÅ·ÖÞÂùݡ¢Âùݼ°¿ÍÕ»Ìᳫ¶ñÒâÈí¼þ¹¥»÷£¬Í¨¹ýαÔì¡°À¶ÆÁËÀ»ú¡±Ò³ÃæÓÕµ¼Êܺ¦ÕßÏÂÔØDCRat¶ñÒâÈí¼þ¡£SecuronixÑо¿Ö°Ô±×·×Ùµ½ÃûΪPHALT#BLYXµÄÒ»Á¬¶ñÒâÈí¼þÔ˶¯£¬ÆäÒÔÂùÝËÑË÷ÒýÇæÓÕ¶üΪÆðµã£¬Í¨¹ýαÔìÈÈÃÅÔ¤¶©ÍøÕ¾µÄ¡°×÷·ÏÔ¤¶©¡±Í¨ÖªÓʼþʵÑé´¹ÂÚ¡£Êܺ¦Õßµã»÷ÓʼþÖеġ°Éó²éÏêÇ顱°´Å¥ºó£¬½«±»Ö¸µ¼ÖÁÐéαÂùÝÔ¤¶©Ò³Ã棬ÏÔʾ¡°¼ÓÔØÊ±¼ä¹ý³¤¡±µÄä¯ÀÀÆ÷¹ýʧ£¬²¢ÌáÐѵã»÷¡°Ë¢ÐÂÒ³Ãæ¡±Ìø×ªÖÁαÔìµÄÀ¶ÆÁËÀ»ú½çÃæ¡£ÎªÍ˳ö¸ÃÒ³Ãæ£¬Êܺ¦Õß±»ÓÕµ¼½«¶ñÒâ¾ç±¾Õ³ÌùÖÁWindowsÔËÐжԻ°¿ò£¬´¥·¢Ò»ÏµÁвÙ×÷£º½ûÓÃWindows Defender¡¢ºǫ́ÔËÐжñÒâÈí¼þ£¬Í¬Ê±·¿ªÕæÊµÔ¤¶©Ò³Ãæ×÷ΪÓÕ¶ü¡£DCRat¶ñÒâÈí¼þ¿É¸ú×ÙÊܺ¦Õß»÷¼ü¡¢ÇÔÈ¡ÃÜÂë¼°¼ôÌù°åÊý¾Ý£¬²¢ÏÂÔØÆäËû¹¤¾ßÒÔʵÏÖºã¾ÃÒ»Á¬»á¼û¡£SecuronixÖ¸³ö£¬¸Ã¹¥»÷ʹÓá°ClickFix¡±ÊÖÒÕ£¬Í¨¹ýÐéα¹ýʧÌáÐÑʹÓÃÓû§Ö´ÐÐÏÂÁÊôÓÚ¶ñÒâÈí¼þÈö²¥µÄÖØ´óÑݱ䡣ÊÖÒÕϸ½ÚÏÔʾ£¬¹¥»÷Óë¶íÂÞ˹±£´æ¹ØÁª£¬MS BuildÏîÄ¿Îļþº¬¶íÓïµ÷ÊÔ×Ö·û´®£¬»ù´¡ÉèÊ©¼°¹¤¾ßµØÀíλÖþùÖ¸Ïò¶íÂÞ˹£¬ÇÒDCRatÔÚ¶íµØÏÂÂÛ̳ÆÕ±éÏúÊÛ¡£
https://therecord.media/russian-hackers-europe-hospitality-blue-screen


¾©¹«Íø°²±¸11010802024551ºÅ