SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬£¬£¬¶ñÒâÈí¼þÂñ·ü½üÈýÄê
°ä²¼¹¦·ò 2025-05-211. SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬£¬£¬¶ñÒâÈí¼þÂñ·ü½üÈýÄê
5ÔÂ20ÈÕ£¬£¬£¬SK TelecomÊǺ«¹ú×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ£¬£¬£¬Õ¼¾ÝÔ¼Ò»°ëÊг¡·Ý¶î¡£¡£¸Ã¹«Ë¾½üÈÕÅû¶£¬£¬£¬2025Äê4ÔÂ19ÈÕÔÚÆäÍøÂçÉϼì²âµ½¶ñÒâÈí¼þ£¬£¬£¬²¢¸ôÀëÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄÉ豸¡£¡£Õâ´ÎÊÂÎñ×îÔç¿É×·ÒäÖÁ2022Ä꣬£¬£¬×îÖÕµ¼ÖÂ2700ÍòÓû§µÄUSIMÊý¾Ýй¶¡£¡£¹¥»÷ÕßÇÔÈ¡ÁËÔ̺¬IMSI¡¢¡¢¡¢USIMÈÏÖ¤ÃÜÔ¿¡¢¡¢¡¢ÍøÂçʹÓÃÊý¾Ý¼°´æ´¢ÔÚSIM¿¨ÖеĶÌÐźÍÁªÏµÈ˵ÈÊý¾Ý£¬£¬£¬Ôö³¤ÁËSIM¿¨»¥»»¹¥»÷µÄ·çÏÕ¡£¡£Îª´Ë£¬£¬£¬SK Telecom¾ö¶¨ÎªËùÓÐЧ»§·¢·ÅSIM¿¨´úÌæ¼þ£¬£¬£¬²¢¼ÓÇ¿°²È«´ëÊ©ÒÔÔ¤·Àδ¾ÊÚȨµÄºÅÂëÒÆÖ²¡£¡£2025Äê5ÔÂ8ÈÕ£¬£¬£¬µ±¾ÖίԱ»á°ä·¢¶ñÒâÈí¼þϰȾΣ¼°25ÖÖÊý¾ÝÀàÐÍ¡£¡£ÆäʱSK Telecom°ä·¢ÖÕ³¡½ÓÊÜÐÂÓû§ÒÔÓ¦¶Ôºó¹û¡£¡£SK Telecom×îÐÂÐÂÎųƽ«ºÜ¿ì֪ͨ2695ÍòÊÜÓ°ÏìµÄ¿Í»§ÆäÃô¸ÐÊý¾Ýй¶¡£¡£¸Ã¹«Ë¾Ìáµ½ÔÚ23̨ÊÜϰȾ·þÎñÆ÷Öз¢ÏÖ25ÖÖ·ÖÆç¶ñÒâÈí¼þÀàÐÍ£¬£¬£¬ÈëÇÖˮƽ³¬³ö×î³õÔ¤ÆÚ¡£¡£Óë´Ëͬʱ£¬£¬£¬¹«Ë½½áºÏµ÷²éС×é¶ÔSK TelecomµÄ30000̨Linux·þÎñÆ÷²é³ºó³Æ£¬£¬£¬×î³õWeb ShellϰȾ²úÉúÔÚ2022Äê6ÔÂ15ÈÕ£¬£¬£¬Òâζ×ŶñÒâÈí¼þÔÚ½üÈýÄ깦·òÀïδ±»·¢ÏÖ£¬£¬£¬¹¥»÷ÕßÔÚ23̨·þÎñÆ÷ÉÏÖ²Èë¶à¸öÓÐÐ§ÔØºÉ¡£¡£µ÷²éÐû³Æ15̨ÊÜϰȾ·þÎñÆ÷º¬Ð¡ÎÒ¿Í»§ÐÅÏ¢£¬£¬£¬Ô̺¬291831¸öIMEIºÅÂ룬£¬£¬µ«SK Telecom·ñ¶¨¡£¡£µ÷²éС×黹ָ³ö£¬£¬£¬SK TelecomÓÚ2024Äê12ÔÂ3ÈղůðÍ·¼Í¼ÊÜÓ°Ïì·þÎñÆ÷»î¶¯£¬£¬£¬Òò¶ø´Ëǰ¿ÉÄܲúÉúµÄÊý¾Ýй¶ÎÞ·¨±»¼ì²âµ½¡£¡£
https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/
2. Hazy HawkÍÅ»ïÀûÓÃDNSÅäÖÃÃýÎó½Ù³ÖÊÜÐÅÀµÓòÃû
5ÔÂ20ÈÕ£¬£¬£¬±»×·×ÙΪ¡°Hazy Hawk¡±µÄÍþвÐÐΪÕßÕýÀûÓñ»ÍüÈ´µÄDNS CNAME¼Í¼ִÐÐÍøÂç¹¥»÷¡£¡£¸ÃÍþвÐÐΪÕß½Ù³ÖÖ¸Ïò°Î³ýÔÆ·þÎñµÄCNAME¼Í¼£¬£¬£¬ÊÕÊܵ±¾Ö¡¢¡¢¡¢´óѧºÍ²Æ¸»500Ç¿¹«Ë¾µÈ»ú¹¹µÄÊÜÐÅÀµ×ÓÓò£¬£¬£¬ÓÃÓÚ·Ö·¢Ú¿Æ¡¢¡¢¡¢ÐéαÀûÓ÷¨Ê½ºÍ¶ñÒâ¸æ°×¡£¡£Infoblox×êÑÐÈËÔ±Ö¸³ö£¬£¬£¬Hazy HawkÊ×ÏÈɨÃèCNAME¼Í¼ָÏò°Î³ýÔÆ¶ËµãµÄÓò£¬£¬£¬²¢Í¨¹ý±»¶¯DNSÊý¾ÝÑé֤ȷ¶¨ÕâЩÓò£¬£¬£¬¶øºó×¢²áÓë°Î³ýCNAMEÖÐÃû³ÆÒ»ÑùµÄÐÂÔÆ×ÊÔ´£¬£¬£¬Ê¹ÔʼÓòµÄ×ÓÓò½âÎöµ½ÍþвÐÐΪÕßµÄÐÂÔÆÍйÜÕ¾µã¡£¡£½èÖúÕâÒ»¼¼Êõ£¬£¬£¬Hazy Hawk½Ù³ÖÁ˶à¸ö³ÛÃûÓòÃû£¬£¬£¬ÈçÃÀ¹ú¼²²¡½ÚÖÆÓëÔ¤·ÀÖÐÐĵÄcdc.gov¡¢¡¢¡¢¿ç¹úÆóÒµ¼¯ÍÅhoneywell.comµÈ¡£¡£¿£¿£½ÚÖÆ×ÓÓòÃûºó£¬£¬£¬ÍþвÐÐΪÕßÌìÉúÊý°Ù¸ö¶ñÒâURL£¬£¬£¬Òò¸¸ÓòÃûÐÅÀµ¶È¸ß£¬£¬£¬ÕâЩURLÔÚËÑË÷ÒýÇæÖп´ËƺϷ¨¡£¡£Êܺ¦Õßµã»÷URLºó£¬£¬£¬»á±»Öض¨Ïòµ½¶à²ãÓòÃûºÍTDS»ù´¡ÉèÊ©£¬£¬£¬ÕâЩÉèÊ©»áƾ¾ÝÉ豸ÀàÐÍ¡¢¡¢¡¢IPµØÖ·µÈÐÅÏ¢·ÖÎöÊܺ¦ÕßÉí·Ý¡£¡£Infoblox»ã±¨³Æ£¬£¬£¬ÕâÐ©ÍøÕ¾±»ÓÃÓÚ¼¼ÊõÖ§³ÖÚ¿Æ¡¢¡¢¡¢Ðéα·À²¡¶¾¾¯±¨¡¢¡¢¡¢ÐéαÁ÷ýÌå/É«ÇéÍøÕ¾ºÍÍøÂç´¹µöÒ³Ãæ¡£¡£´ËÍ⣬£¬£¬ÊÜÆÓû§¼´±ãÍÑÀëÚ¿ÆÍøÕ¾£¬£¬£¬ÈÔ»áÒòÔÊÐíä¯ÀÀÆ÷ÍÆËÍ֪ͨ¶øÊÕµ½³ÖÐø¾¯±¨£¬£¬£¬ÎªHazy Hawk´øÀ´¿É¹ÛÊÕÈë¡£¡£
https://www.bleepingcomputer.com/news/security/hazy-hawk-gang-exploits-dns-misconfigs-to-hijack-trusted-domains/
3. RVToolsÔâ·ê¹©¸øÁ´¹¥»÷£¬£¬£¬´«²¼Bumblebee¶ñÒâÈí¼þ
5ÔÂ20ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬RVTools VMwareÖÎÀí¹¤¾ßÔâ·ê¹©¸øÁ´¹¥»÷£¬£¬£¬¸Ã¹¤¾ß×î³õÓÉRobware¿ª·¢£¬£¬£¬ÏÖ¹é´÷¶ûËùÓУ¬£¬£¬ÊÇVMwareÖÎÀíÔ±³£Óù¤¾ß¡£¡£¹¥»÷ÊÂÎñÒý·¢¿í·º¹Ø×¢£¬£¬£¬´÷¶ûÓÚ2025Äê5ÔÂ20ÈÕ°ä²¼ÉêÃ÷£¬£¬£¬³Æ¶ñÒâRVTools×°Ö÷¨Ê½²¢·Ç´ÓÆä¹Ù·½ÍøÕ¾·Ö·¢£¬£¬£¬¶øÊÇÀ´×ÔÐéαÓòÃû£¬£¬£¬Í¬Ê±ÆäÖÎÀíµÄRobware.netºÍRVTools.comÍøÕ¾ÒòÔâ·êDDoS¹¥»÷¶øÏÂÏß¡£¡£´Ëǰ£¬£¬£¬ZeroDay Labs×êÑÐÔ±Aidan LeonÔÚRedditÉÏ·¢Ìû³Æ£¬£¬£¬´ÓRVToolsÍøÕ¾ÏÂÔØµÄÎļþ±»Ö²ÈëBumblebee¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬Îļþ¹þÏ£ÖµÓëÏÖʵÏÂÔØµÄ²»Æ¥Å䣬£¬£¬ÏÂÔØ°æ±¾ÏÔÖø¸ü´óÇÒÔ̺¬¶ñÒâÎļþ¡£¡£¾½øÒ»´ëÊ©²é£¬£¬£¬ÕâÒ»¹¥»÷ÐÐΪ±»Ö¤Êµ¡£¡£BumblebeeÊÇÒ»ÖÖͨ¹ýSEOÖж¾¡¢¡¢¡¢¶ñÒâ¸æ°×ºÍÍøÂç´¹µö¹¥»÷ÍÆ¹ãµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬×°Öúó»áÔÚÊÜϰȾÉ豸¸ßµÍÔØ²¢Ö´ÐÐÆäËû¶ñÒâÓÐЧ¸ºÔØ£¬£¬£¬ÈçCobalt StrikeÐűꡢ¡¢¡¢ÐÅÏ¢ÇÔÈ¡·¨Ê½ºÍÀÕË÷Èí¼þµÈ£¬£¬£¬ÇÒÓëContiÀÕË÷Èí¼þÐж¯Óйء£¡£ÍøÂ簲ȫ¹«Ë¾Arctic WolfÒ²»ã±¨·¢ÏÖ±»Ä¾ÂíϰȾµÄRVTools×°Ö÷¨Ê½Í¨¹ý¶ñÒâÓòÃûÇÀ×¢´«²¼£¬£¬£¬¸ÃÓòÃûÓëºÏ·¨ÓòÃûÀàËÆ£¬£¬£¬½ö¶¥¼¶ÓòÃû·ÖÆç¡£¡£´ËÍ⣬£¬£¬»¹ÓÐÕë¶ÔRVToolsÆ·ÅÆµÄSEOÖж¾ºÍ¶ñÒâ¸æ°×»î¶¯£¬£¬£¬Ö¼ÔÚÓÕÆÓû§ÏÂÔØ¶ñÒâ×°Ö÷¨Ê½¡£¡£
https://www.bleepingcomputer.com/news/security/rvtools-hit-in-supply-chain-attack-to-deliver-bumblebee-malware/
4. ¶íº¥¶íÖÝ¿ÌØÁÕ½¡¿µÖÐÐÄÔâÍøÂç¹¥»÷µ¼ÖÂϵͳÖжÏ
5ÔÂ21ÈÕ£¬£¬£¬¶íº¥¶íÖÝ¿ÌØÁÕ½¡¿µÖÐÐÄÆìÏÂÒ½ÔºÓëÒ½ÁÆÉèÊ©½üÈÕÔâ·êÍøÂç¹¥»÷£¬£¬£¬µ¼ÖÂÕûϵͳ¼¼ÊõÖжϡ£¡£¿£¿£¿ÌØÁÕ½¡¿µÖÐÐÄ×Ô³ÆÊÇÒ»¸ö»ùÓÚÐÅÑöµÄ»ù¶½¸´ÁÙ°²ÃßÈÕ»áϵͳ£¬£¬£¬ÖØÒªÔÚ´ú¶ÙµØÓòÔËÓª¶à¸öÒ½ÁÆÖÐÐĺÍÕïËù£¬£¬£¬Ã¿Äê´¦ÖôóÁ¿¼±ÕïÊÒ¾ÍÕï¡£¡£¸Ã·ÇͶ»úÐÔÒ½ÔºÍøÂç½²»°È˰µÊ¾£¬£¬£¬Ä¿Ç°ÕýÔÚ¾ÀúÒòδ¾ÊÚȨ½Ó¼û¶øÒý·¢µÄÍøÂ簲ȫÊÂÎñ£¬£¬£¬ÊÂÎñʼÓÚÖܶþÔçÉÏ£¬£¬£¬ÏÞ¶ÈÁ˹¤×÷ÈËÔ±½Ó¼û²¿ÃÅ»¼Õß»¤ÀíϵͳµÄÄÜÁ¦¡£¡£¿£¿£¿ÌØÁÕÒ½ÁÆÖÐÐÄÒѲÉÈ¡´ëÊ©¶ôÖÆ»ººÍ½â´ËÀà»î¶¯£¬£¬£¬²¢»ý¼«µ÷²éºÍ¼à²âÇé¿ö£¬£¬£¬Í¬Ê±È¡µÞ²¢ÖØÐÂÆÌÅÅÁËÖܶþµÄסԺºÍÃÅÕïÔñÆÚÊÖÊõ¡£¡£Õâ´Î¹¥»÷»¹µ¼Ö¸ÃÒ½ÔºÍøÂçµÄºô½ÐÖÐÐÄ̱»¾¡£¡£²»Í⣬£¬£¬ËùÓм±ÕïÊÒºÍÕïËùÈÔά³ÖÊ¢¿ª£¬£¬£¬³ÖÐø½ÓÊÜ»¼ÕßÕïÖΡ£¡£½²»°ÈËδ¾ÍÒ½ÔºÍøÂçÊÇ·ñÔâ·êÀÕË÷Èí¼þ¹¥»÷µÄÎÊÌâ×÷³ö»ØÓ¦£¬£¬£¬µ«¾ÝCNN±¨µÀ£¬£¬£¬Ò½ÔºÍøÂçIT¹¤×÷ÈËÔ±·¢ÏÖÒ»ÕžݳÆÀ´×ÔInterlockÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£¸ÃÍÅ»ïÉϸöÔÂÔø¹Ø±Õ͸ÎöÒ½Öι«Ë¾DaVitaµÄÍøÂ磬£¬£¬´Ëǰ»¹¹¥»÷¹ýµÂ¿ËÈøË¹Àí¹¤´óѧ½¡¿µ¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ¡£¡£
https://therecord.media/kettering-health-system-ohio-cyberattack
5. CellcomÈ·ÈÏÍøÂç¹¥»÷ÊÇÔì³É³¤¹¦·òÖжϵÄÔÒò
5ÔÂ20ÈÕ£¬£¬£¬Íþ˹¿µÐÇÖÝÎÞÏß·þÎñÌṩÉÌCellcomÒÑÈ·ÈÏ£¬£¬£¬2025Äê5ÔÂ14ÈÕÍíÆðÍ·µÄ´óÃæ»ý·þÎñÖжÏÊÇÓÉÍøÂç¹¥»÷µ¼Öµġ£¡£Õâ´ÎÊÂÎñÓ°ÏìÁËÍþ˹¿µÐÇÖݺÍÃÜЪ¸ùÖݱ±²¿µØÓòµÄ¿Í»§£¬£¬£¬µ¼ÖÂËûÃǵÄÓïÒôºÍ¶ÌÕÛ·þÎñÖжϣ¬£¬£¬ÎÞ·¨²¦´òµç»°»ò·¢ËͶÌÐÅ¡£¡£CellcomÊ×ϯִÐйÙBrighid RiordanÔÚ½üÈÕ֤ʵÁËÍøÂç¹¥»÷µÄÊÂʵ£¬£¬£¬²¢°µÊ¾¹«Ë¾ÒÑÖÆ¶©Ó¦¶Ô´ËÀàÇé¿öµÄ¹æ³ÌºÍ´òËã¡£¡£ÊÂÎñ²úÉúºó£¬£¬£¬CellcomÑϸñ×ñÑ´òË㣬£¬£¬Ô̺¬ÀñƸÍâ²¿ÍøÂ簲ȫר¼Ò¡¢¡¢¡¢Í¨ÖªÁª°îµ÷²é¾ÖºÍÍþ˹¿µÐÇÖݹÙÔ±£¬£¬£¬²¢È«Á¦ÒÔ¸°È·±£ÏµÍ³°²È«¸´ÔÉÏÏß¡£¡£CellcomÇ¿µ÷£¬£¬£¬Õâ´Î¹¥»÷²úÉúÔÚ¹«Ë¾ÍøÂçµÄÒ»¸öÇøÓò£¬£¬£¬Óë´æ´¢Óû§Ãô¸ÐÐÅÏ¢µÄÇøÓò·ÖÆç£¬£¬£¬ÇÒûÓÐÖ¤¾ÝÅú×¢Óû§Ð¡ÎÒÐÅÏ¢Êܵ½Ó°Ïì¡£¡£×î³õ£¬£¬£¬CellcomÐû³ÆÖжÏÊÇÓɼ¼ÊõÎÊÌâÒýÆðµÄ£¬£¬£¬²¢°µÊ¾²¿ÃÅÊý¾Ý·þÎñÈÔÔÚÔËÐС£¡£È»¶ø£¬£¬£¬ÓÉÓÚÆ½Ì¨³öÏÖÎÊÌ⣬£¬£¬Óû§¶Ô·þÎñÖжϺÍÎÞ·¨ÒÆÖ²ºÅÂë¸ÐÓ¦¾ÚÉ¥¡£¡£5ÔÂ19ÈÕ£¬£¬£¬CellcomÆðÍ·¸´Ô²¿ÃÅ·þÎñ£¬£¬£¬Ô̺¬¶ÌÐÅÒÔ¼°²¦´òºÍ½ÓÌýÆäËûCellcomÓû§µÄµç»°¡£¡£Ö»¹ÜÎÞ·¨±£ÕϺÎÊ±È«Ãæ¸´Ô·þÎñ£¬£¬£¬µ«¹«Ë¾ÕýÖÂÁ¦ÔÚ±¾ÖÜĩǰʵÏÖÕâÒ»Ö¸±ê¡£¡£
https://www.bleepingcomputer.com/news/security/mobile-carrier-cellcom-confirms-cyberattack-behind-extended-outages/
6. SideWinder APT×éÖ¯¾«×¼¹¥»÷ÄÏÑǶà¹úµ±¾Ö»ú¹¹
5ÔÂ20ÈÕ£¬£¬£¬Ë¹ÀïÀ¼¿¨¡¢¡¢¡¢ÃϼÓÀ¹úÓë°Í»ù˹̹µÄ¸ß¼¶±ðµ±¾Ö»ú¹¹½üÆÚ³ÉΪAPT×éÖ¯SideWinderÐÂÒ»ÂÖ¹¥»÷µÄÖØµã¡£¡£¹¥»÷ÕßʹÓÃÓã²æÊ½´¹µöÓʼþ½áºÏµØÀíΧÀ¸¼¼Êõ£¬£¬£¬È·±£¶ñÒâÔØºÉ½öÕë¶ÔÌØ¶¨¹ú¶ÈÖ¸±ê¡£¡£¹¥»÷Á´Í¨¹ýµö¶üÎĵµ¼¤»î£¬£¬£¬×îÖÕ²¿ÊðStealerBot¶ñÒâÈí¼þ£¬£¬£¬ÊÖ·¨ÓëSideWinder´Ëǰ»î¶¯ÌصãÏà·û¡£¡£Õâ´Î¹¥»÷¶Ô×¼ÄÏÑǶà¹ú¹Ø¼ü²¿ÃÅ£¬£¬£¬ÈçÃϼÓÀ¹úµçÐżà¹ÜίԱ»á¡¢¡¢¡¢¹ú·À²¿¡¢¡¢¡¢²ÆÕþ²¿£¬£¬£¬°Í»ù˹̹±¾ÍÁ¼¼Êõ·¢Õ¹¾Ö£¬£¬£¬ÒÔ¼°Ë¹ÀïÀ¼¿¨ÍâÕ®ÖÎÀí¾Ö¡¢¡¢¡¢¹ú·À²¿¡¢¡¢¡¢ÖÐÑëÒøÐеȡ£¡£¹¥»÷ÕßÀûÓÃ΢ÈíOfficeÖеĺ¹Çà·ì϶CVE-2017-0199ÓëCVE-2017-11882×÷Ϊ³õʼ¹¥»÷ý½é£¬£¬£¬²¿Êð¾ß±¸Óƾû¯½Ó¼ûÄÜÁ¦µÄ¶ñÒⷨʽ¡£¡£¶ñÒâÎĵµ´¥·¢CVE-2017-0199·ì϶ºó£¬£¬£¬Í¨¹ýDLL²àÔØ¼¼Êõ¿ªÊͺóÐøÔØºÉ£¬£¬£¬¶øµØÀíΧÀ¸¼¼ÊõÔòÈ·±£½öÔ¤Éè¹ú¶ÈÁìÓòÄÚµÄÊܺ¦Õß»áÊÕµ½ÏÖʵ¶ñÒâRTFÎļþ£¬£¬£¬¸ÃÎļþÀûÓù«Ê½±à×ëÆ÷·ì϶CVE-2017-11882´¥·¢ÄÚ´æ·ÛË飬£¬£¬Ö´ÐлùÓÚshellcodeµÄ¼ÓÔØÆ÷ÒÔÔËÐÐStealerBot¡£¡£StealerBot×÷Ϊģ¿£¿£¿é»¯Ö²È뷨ʽ£¬£¬£¬¿ÉÄÜÇÔÈ¡ÆÁÄ»½ØÍ¼¡¢¡¢¡¢¼üÅ̼ͼ¡¢¡¢¡¢ÃÜÂë¡¢¡¢¡¢ÎļþµÈÃô¸ÐÊý¾Ý¡£¡£
https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html


¾©¹«Íø°²±¸11010802024551ºÅ