Ó¢¹ú»Ê¼ÒÓÊÕþÔâÖØ´óÊý¾Ýй¶£¬£¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â
°ä²¼¹¦·ò 2025-04-031. Ó¢¹ú»Ê¼ÒÓÊÕþÔâÖØ´óÊý¾Ýй¶£¬£¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â
4ÔÂ2ÈÕ£¬£¬Ó¢¹ú»Ê¼ÒÓÊÕþ¼¯ÍÅ£¨Royal Mail Group£©½üÆÚÒÉËÆÔâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬Éæ¼°144GBµÄÄÚ²¿Îļþ¡¢¡¢¿Í»§ÐÅÏ¢ºÍÓªÏúÊý¾Ý±»¹«¿ª¡£¸ÃÊÂÎñÓÉÍøÂç·¸×ïÂÛ̳Breach ForumµÄÓû§¡°GHNA¡±ÓÚ2025Äê3ÔÂ31ÈÕ³õ´ÎÅû¶£¬£¬ÆäÉÏ´«ÁËÔ̺¬293¸öÎļþ¼ÐºÍ16,549¸öÎļþµÄÊý¾Ý°ü£¬£¬²¢Ìá¼°¸Ð¼¤µÂ¹úÊý¾Ý·ÖÎö¹«Ë¾SpectosµÄ¡°ÐÖú¡±¡£Ð¹Â¶Êý¾Ýº¸Ç¿Í»§Ð¡ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡¢¡¢ÄÚ²¿Í¨Ñ¶¼Í¼¡¢¡¢ÔËÓªÊý¾Ý¼°ÓªÏú»ù´¡ÉèÊ©ÐÅÏ¢£¬£¬Òý·¢Íâ½ç¶Ô¹¥»÷ÆðÔ´µÄ²Â²â£¬£¬¼´¿ÉÄÜÊÇÖ±½ÓÈëÇֻʼÒÓÊÕþϵͳ»òͨ¹ýÆä¹©¸øÉÌSpectos½øÐеĵÚÈý·½¹¥»÷¡£GHNA×Ô2024Äêµ×»îÔ¾ÓÚBreach Forum£¬£¬´ËǰÒÑй¶¶à¼Ò³ÛÃûÆóÒµÊý¾Ý£¬£¬Ô̺¬ÈýÐǵç×Ó¡¢¡¢Touchworld Technology LLCµÈ£¬£¬Õâ´Î»Ê¼ÒÓÊÕþÊý¾Ýй¶ÊÇÆä°ä²¼µÄ×î´ó¹æÄ£¹¥»÷Ö®Ò»£¬£¬ÒÉËÆÎªÆä¡°½Ó¼û¼´·þÎñ¡±£¨Access-as-a-Service£©ÔËÓªµÄÒ»²¿ÃÅ¡£SpectosÂŴγʴ˿Ìй¶Êý¾ÝÖУ¬£¬Ô̺¬ÄÚ²¿ÎļþºÍ»áÒéÊÓÆµ£¬£¬Æä½ÇÉ«Éв»Ã÷È·£¬£¬µ«ºÚ¿Í°µÊ¾Æäϵͳ»òΪ¹¥»÷ÇÐÈëµã¡£»£»Ê¼ÒÓÊÕþ¼¯ÍÅ»ØÓ¦³ÆÕýÓëSpectosºÏ×÷µ÷²éÊÂÎñ£¬£¬ÆÀ¹ÀÊý¾ÝÓ°Ïì¡£
https://hackread.com/hacker-leaks-royal-mail-group-data-supplier-spectos/
2. FIN7ÍÅ»ïÀûÓÃAnubisºóÃŽٳÖWindowsϵͳ
4ÔÂ2ÈÕ£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½Òʾ£¬£¬ÒÔ¾¼ÃÀûÒæÇý¶¯µÄÍøÂç·¸×ïÍÅ»ïFIN7£¨Òà³ÆCarbon SpiderµÈ¶à¸ö±ðºÅ£©ÕýÀûÓÃÒ»ÖÖÃûΪAnubisµÄPythonºóÃŶñÒâÈí¼þ£¬£¬¶ÔWindowsϵͳִÐнٳ֡£ÈðÊ¿ÍøÂ簲ȫ¹«Ë¾PRODAFT¼¼Êõ»ã±¨ÏÔʾ£¬£¬¸Ã¶ñÒâÈí¼þ¸³Óè¹¥»÷ÕßÔ¶³ÌÖ´ÐÐShellºÅÁϵͳ²Ù×÷ÄÜÁ¦£¬£¬´Ó¶øÆëÈ«½ÚÖÆ±»Ï°È¾É豸¡£FIN7×÷Ϊһ¸öÓµÓжíÂÞ˹²¼¾°µÄÍøÂç·¸×ï×éÖ¯£¬£¬³Ö¾ÃÒÔ¿ª·¢¸´ÔÓ¶à±äµÄ¶ñÒâÈí¼þ¼Ò×åÖø³Æ£¬£¬Æä¹¤¾ßÁ´Ö¼ÔÚ»ñÈ¡³õʼ½Ó¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý¡£½üÄêÀ´£¬£¬¸ÃÍŻﱻָתÏòÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©Ä£Ê½ÒÔÍØÕ¹·¸·¨ÊÕÒæÇþµÀ¡£AnubisºóÃÅͨ¹ý¾«ÐÄÉè¼ÆµÄ´¹µöÓʼþ½øÐд«²¼£¬£¬ÓÕµ¼Êܺ¦ÕßÖ´ÐÐÍйÜÔÚÔâÈëÇÖSharePointÕ¾µãÉϵĶñÒâÔØºÉ¡£¶ñÒâÈí¼þÒÔZIPѹËõ°ü´ó¾Ö½»¸¶£¬£¬ÄÚº¬Ö±½ÓÔÚÄÚ´æÖнâÃÜÖ´ÐеÄPython¾ç±¾£¬£¬¼Ì¶ø¼ÓÔØÖ÷Ìâ»ìºÏ¸ºÔØ¡£³ÉÁ¢ÏνӺ󣬣¬ºóÃÅͨ¹ýTCPÌ×½Ó×ÖÒÔBase64±àÂëÓëÔ¶³Ì·þÎñÆ÷ͨѶ£¬£¬Ö§³ÖÍøÂçÖ÷»úIP¡¢¡¢Îļþ´«Êä¡¢¡¢Ä¿Â¼²Ù×÷¡¢¡¢»·¾³±äÁ¿»ñÈ¡¡¢¡¢×¢²á±íÅú¸ÄµÈÖ°ÄÜ£¬£¬ÉõÖÁÄܼÓÔØDLLÖÁÄÚ´æÊµÏÖÎÞÎļþ¹¥»÷¡£
https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html
3. ÏÂËÕ×åÉçÇøÔâÍøÂç¹¥»÷£¬£¬RansomHubÍÅ»ïÐû³ÆÕƹÜ
4ÔÂ3ÈÕ£¬£¬Ã÷ÄáËÕ´ïÖÝÏÂËÕ×åÓ¡µÚ°²ÈËÉçÇøÏò¾ÓÃñ·¢³öÖҸ棬£¬¸Ã²¿ÂäÔâ·êÍøÂç¹¥»÷£¬£¬µ¼Ö±¾µØÒ½ÁÆ»ú¹¹¡¢¡¢µ±¾Ö·þÎñÖÐÐļ°²¿ÂäÔËÓªµÄJackpot Junction¶Ä³¡ÔËÓªÖжϡ£Õâ´ÎÊÂÎñÆÈʹ²¿ÂäÆô¶¯Ó¦¼±ÏìÓ¦»úÖÆ£¬£¬×Ô¶¯¹Ø±Õ²¿ÃŹؼüϵͳÒÔ½ÚÖÆÊÂ̬£¬£¬Ô̺¬µç»°¡¢¡¢´«Õæ¼°Óʼþ·þÎñ¡£¹Ù·½Í¨¹ýÉ罻ýÌ尵ʾ£¬£¬ÕýÓëÍøÂ簲ȫר¼ÒºÏ×÷£¬£¬Á¦ÇóÔÚ°²È«Ç°ÌáϾ¡¿ì¸´ÔϵͳÕý³£ÔËÐУ¬£¬²¢°ä²¼ÁËÎÀÉúÖÐÐÄ¡¢¡¢ÑÀ¿ÆÕïËùµÈ³¡ËùµÄһʱÁªÏµµç»°¡£ÍøÂç¹¥»÷Ó°ÏìÉîÔ¶£¬£¬¶Ä³¡¾ÆµêÔ¤Ô¼ÏµÍ³È«ÃæÌ±»¾£¬£¬ÎÞ·¨´¦ÖÃж©·¿¼°È¡µÞÒªÇ󣬣¬µç×ÓÓÎÏ·»ų́ÒàÒòÍøÂçÖжÏÖÕ³¡ÔË×÷¡£¸Ã²¿ÂäÕ¼ÓÐÔ¼982Ãû¾ÓÃñ£¬£¬ÖØÒª¾Û¾ÓÔÚ1,743Ӣ͵ı£ÁôµØ¼°ÖܱßÇøÓò¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬RansomHubÀÕË÷Èí¼þÍÅ»ïÓÚ±¾ÖÜÒ»¹«¿ªÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¸ÃÍÅ»ï½ñÄê2ÔÂÔøÏ®»÷ÃÜЪ¸ùÖÝÁíÒ»Ô¾ÓÃñ²¿Â䣬£¬²¢ÔÚÈ«ÇòÀÕË÷Èí¼þÁìÓòѸËÙáÈÆð£¬£¬ÓÈÆäÔÚÈ¥ÄêLockBitºÍAlphVÔâ·¨Âɽø¹¥ºó£¬£¬Æä»îÔ¾¶ÈÏÔÖøÉÏÉý¡£
https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino
4. ÊýǧAndroidÉ豸ԤװTriadaľÂí£¬£¬¹©¸øÁ´°²È«ÏÖÖØ´óÍþв
4ÔÂ2ÈÕ£¬£¬¿¨°Í˹»ù³¢ÊÔÊÒ½üÆÚÅû¶£¬£¬Êýǧ̨ÐÂÐÍAndroidÉ豸ÔÚ³ö³§Ç°¼´±»Ö²Èë×îбäÖÖµÄTriadaľÂí£¬£¬×é³ÉÑÏÖØµÄ¹©¸øÁ´°²È«Íþв¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÚ2016ÄêÏÖÉí£¬£¬ÒÔÆä¹ÖÒìµÄÄÚ´æ×¤Áô¼¼Êõ¶ã±Ü¼ì²â£¬£¬Õâ´ÎбäÖÖ¸üչʾ³öÉî¶ÈÏµÍ³ÉøÈëÄÜÁ¦¡£¹¥»÷Õßͨ¹ý¼ÙðʢÐÐÊÖ»úÐͺţ¬£¬Ôڷǹٷ½ÇþµÀÒÔÁ®¼ÛÎüÒýÏû·ÑÕ߲ɰìÒÑϰȾµÄÖÕ¶ËÉ豸¡£2025Äê3ÔÂ13ÈÕÖÁ27Èռ䣬£¬½ö¶íÂÞ˹¾ÍÓÐ2,600ÃûÓû§È·ÈÏϰȾ¡£¸ÃľÂí¾ß±¸¶àά¶È¹¥»÷ÄÜÁ¦£º£º£ºÇÔÈ¡¼´Ê±Í¨Ñ¶ÓëÉ罻ýÌåÕË»§¡¢¡¢´Û¸Ä¼ÓÃÜÇ®±ÒÇ®°üµØÖ·Ö´Ðнٳ֡¢¡¢²Ù¿ØÍ¨»°Â·Óɼ°¶ÌÐÅÖ°ÄÜ¡¢¡¢ÉõÖÁÔ¶³Ì¼ÓÔØ¶îÍâ¶ñÒⷨʽ¡£Æäͨ¹ý¼Ùװϵͳ¹ý³ÌʵÏÖÓÆ¾Ã»¯×¤Áô£¬£¬¼´±ãÉè±¸ÖØÆôÈÔÄÜά³Ö½ÚÖÆ¡£·ÖÎöÏÔʾ£¬£¬¹¥»÷ÕßÒÑͨ¹ý´úÌæÇ®°üµØÖ·µÁÈ¡ÖÁÉÙ27ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬£¬ÏÖʵËðʧ¿ÉÄÜÒòÉæ¼°ÃÅÂÞ±ÒµÈÄäÃû¼ÓÃÜ×ʲú¶ø¸ü¸ß¡£¿¨°Í˹»ùר¼Ò´§Ä¦Õâ´ÎÊÂÎñϵ¹©¸øÁ´»·½ÚÔâÉøÈ룬£¬¶ñÒâÈí¼þÔÚÉ豸µ½´ïÓû§Ç°¼´±»Ö²Èë¹Ì¼þ£¬£¬Á¬¾ÏúÉ̶¼¿ÉÄÜÃÉÔÚ¹ÄÖС£Îª½µµÍ·çÏÕ£¬£¬°²È«×¨¼Ò½¨ÒéÏû·ÑÕß½öͨ¹ý¹Ù·½ÊÚȨÇþµÀ²É¹ºÉ豸£¬£¬¶Ô´æÒÉÉ豸ӦʹÓÃGoogle¹Ù·½´¿¾»¾µÏñ»ò¿ÉÐÅ¿ªÔ´ÏµÍ³£¨ÈçLineageOS£©½øÐÐË¢»ú¡£
https://www.bleepingcomputer.com/news/security/counterfeit-android-devices-found-preloaded-with-triada-malware/
5. Outlaw½©Ê¬ÍøÂçÀûÓÃSSH·ì϶×Ô¶¯´«²¼£¬£¬ÍþвLinuxϵͳ°²È«
4ÔÂ2ÈÕ£¬£¬ÍøÂ簲ȫר¼Ò½üÈÕÅû¶ÁËÒ»¸öÃûΪOutlaw£¨±ðÃûDota£©µÄ×Ô¶¯»¯¼ÓÃÜÇ®±ÒÍÚ¿ó½©Ê¬ÍøÂ磬£¬¸Ã¶ñÒâÈí¼þ³ÖÐø»îÔ¾ÒÑÓâËÄÄ꣬£¬Í¨¹ýSSH±©Á¦ÆÆ½â¹¥»÷ºÍÈä³æÊ½´«²¼Ï°È¾Linuxϵͳ¡£Elastic°²È«³¢ÊÔÊÒ·ÖÎöÖ¸³ö£¬£¬¸Ã¶ñÒâÈí¼þÓÉÂÞÂíÄáÑǺڿͼ¯Ì忪·¢£¬£¬Æä¹¥»÷Á´Ê¼ÓÚÀûÓÃÈõÃÜÂëµÄSSH·þÎñÆ÷£¬£¬Í¨¹ýÖ²Èë×ÔÉíSSHÃÜÔ¿³ÉÁ¢Óƾû¯½Ó¼û¡£¹¥»÷Õßѡȡ¶à½×¶ÎÉøÈëÕ½Êõ£¬£¬Ê×ÏÈͨ¹ýÏÂÔØÆ÷¾ç±¾»ñÈ¡¼ÓÃÜѹËõ°ü£¬£¬½âѹºóÆô¶¯ÍÚ¿ó·¨Ê½£¬£¬²¢×Ô¶¯¶Ï¸ù¾ºÕùÍÚ¿ó¹ý³Ì¼°×ÔÉí¾É°æ±¾¡£º£º£Ö÷Ìâ×é¼þBLITZÕÆ¹ÜɨÃè´àÈõSSH·þÎñ£¬£¬¹²Í¬±©Á¦ÆÆ½âÄ£¿éʵÏÖºáÏòÀ©É¢£¬£¬ÆäÖ¸±êÁбíÓÉC2·þÎñÆ÷¶¯Ì¬¸üС£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬¸ÃÍŻﻹÀûÓÃDirty COWµÈº¹Çà·ì϶¼°ÈõTelnetƾ֤À©´ó¹¥»÷Ãæ¡£Ï°È¾³É¹¦ºó£¬£¬¶ñÒâÈí¼þ²¿ÊðSHELLBOTÄ£¿é£¬£¬Í¨¹ýIRCƵµÀ½Ó¹Ü½ÚÖÆÖ¸Á£¬¿ÉÖ´ÐÐËÁÒâϵͳºÅÁî¡¢¡¢ÌáÒéDDoS¹¥»÷¡¢¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÎªÌáÉýÍÚ¿óЧÄÜ£¬£¬¶ñÒâÈí¼þ»á¼ì²âϵͳCPU¸öÐÔ²¢ÆôÓôóÒ³ÃæÄÚ´æÅäÖ㬣¬Í¬Ê±Î¬³ÖÓë¹¥»÷Õß»ù´¡ÉèÊ©µÄ³ÖÐøÍ¨Ñ¶¡£
https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
6. »ùÒòÊý¾ÝÍøÕ¾openSNPÒòÒþÖÔ·çÏÕ½«¹Ø±Õ²¢É¾³ýÊý¾Ý
4ÔÂ2ÈÕ£¬£¬»ùÒòÊý¾Ý¹²ÏíÆ½Ì¨openSNP°ä·¢½«ÓÚ2025Äê4ÔÂ30ÈÕÖÕÖ¹·þÎñ²¢È«ÃæÉ¾³ýÓû§Êý¾Ý£¬£¬¸Ã¾ö¶¨ÓɽáºÏÊ×´´ÈËBastian Greshake Tzovaras»ùÓÚÒþÖÔ±£»£»¤ÓëÂ×Àí·çÏÕ¿¼Á¿×÷³ö¡£×÷ΪÔËÐÐ14ÄêµÄ¿ªÔ´ÏîÄ¿£¬£¬openSNPÖÂÁ¦ÓÚÍÆ¶¯»ùÒòÊý¾ÝÃñÖ÷»¯£¬£¬Í»ÆÆÃ³Ò×»ú¹¹¶Ô»ùÒò×éÐÅÏ¢µÄ¢¶Ï£¬£¬Àۼƴ洢Á˺£Á¿Óû§×ÔÔ¸Ìá½»µÄ»ùÒòÓë±íÐÍÊý¾Ý£¬£¬Ö§³ÖÁ˶àÏî¶ÀÁ¢¿ÆÑм°¹«¹²½¡¿µ×êÑС£ÏîÄ¿¹Ø±ÕµÄÖ±½ÓÓÕÒòÊÇ23andMe¹«Ë¾ÆÆ²úµ¼ÖµÄÓû§Êý¾ÝÁ÷Èë¶Ï¾ø£¬£¬µ«¸üÉî²ãÔÒòÔÚÓÚÈ«ÇòÊý¾ÝÀÄÓ÷çÏյļӾ硣TzovarasÖ¸³ö£¬£¬µ±Ç°»ùÒòÊý¾Ý±»¸öÈË·¨Ò½»ú¹¹¡¢¡¢·¨Âɲ¿ÃÅÉõÖÁ²¿Ãŵ±¾ÖÒÔα¿ÆÌ¨¸¦Òå²»µ±»ñÈ¡µÄ·çÏÕÏÔÖøÉÏÉý£¬£¬ÕâÓëÏîÄ¿Æô¶¯Ê±Ïà¶Ô¿íËɵÄÊý¾ÝÂ×Àí»·¾³ÒѲúÉúµ××ӱ䶯¡£Ö»¹ÜopenSNPʼÖջؾøÃ³Ò×ÊÕ¹º²¢Î¬³ÖÊý¾Ý½ÚÖÆÈ¨£¬£¬µ«Ãæ¶Ô²»ÐÝÑݱäµÄÒþÖÔÍþвºÍÕþÖλ·¾³£¬£¬ÍŶÓÒÔΪ×Ô¶¯É¾³ýÊý¾ÝÊǸüÕÆ¹ÜÈεÄÑ¡Ôñ¡£×÷Ϊ¿ªÔ´ÉçÇøµÍ³É±¾ÔË×÷µÄ·¶Àý£¬£¬¸ÃÆ½Ì¨ÔøÓÐÐ§ÍÆ½ø¹«¼Ò¶Ô»ùÒò×êÑеIJμӡ£¹Ø±Õ²¼¸æ³ö¸ñÌáÐÑÓû§£¬£¬ÈôÐè±£ÁôСÎÒÊý¾Ý¸±±¾ÐëÔÚ½ØÖ¹ÈÕÆÚǰ×ÔÐÐÏÂÔØ£¬£¬¶ûºóËùÓй«¿ªÊý¾Ý½«±»ÓÀÔ¶¶Ï¸ù¡£
https://www.bleepingcomputer.com/news/security/genetic-data-site-opensnp-to-close-and-delete-data-over-privacy-concerns/


¾©¹«Íø°²±¸11010802024551ºÅ