°¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ®£¬£¬£¬¿Í»§ÐÅÏ¢Ôâй¶

°ä²¼¹¦·ò 2025-05-22

1. °¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ®£¬£¬£¬¿Í»§ÐÅÏ¢Ôâй¶


5ÔÂ20ÈÕ£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾È·ÈÏÆäϵͳÔâδ¾­ÊÚȨ½Ó¼û£¬£¬£¬µ¼Ö¿ͻ§ÐÅϢй¶¡£¡£¡£¾Ý¡¶×ÔÓɱ¨¡·±¨µÀ£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÒÑÁªÏµ¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§£¬£¬£¬ÆäÐÕÃû ¡¢µç×ÓÓʼþµØÖ· ¡¢µç»°ºÅÂë ¡¢µ®ÉúÈÕÆÚµÈСÎÒÐÅÏ¢ÒÉËÆÔںڿ͹¥»÷ÖÐй¶¡£¡£¡£5ÔÂ16ÈÕ°¢µÏ´ï˹º«¹ú¹«Ë¾Ò²Ïò¿Í»§°ä²¼ÁËÀàËÆÐÅÏ¢£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁËÏÕЩһÑùµÄÒ»×麫¹ú¿Í»§ÐÅÏ¢¡£¡£¡£²»Í⣬£¬£¬ÔÚÕâÁ½ÆðÊÂÎñÖУ¬£¬£¬°¢µÏ´ï˹¾ùδÃ÷È·¹¥»÷ÀàÐͼ°ÊÜÓ°ÏìÈËÊý¡£¡£¡£±¨µÀÖ¸³ö£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾Ôâ·êµÄ¹¥»÷¶³öÁËÁªÏµ¹ý¿Í·þµÄ¿Í»§£¬£¬£¬¶øÕë¶Ôº«¹ú¹«Ë¾µÄ¹¥»÷ÊÂÎñÖУ¬£¬£¬Î¥¹æÍ¨ÖªÍ¬ÑùÖ¸Ïò¿Í·þ²¿ÃÅ£¬£¬£¬ÕâÅú×¢¸ÃÆ·ÅÆ¿Í»§¿ÉÄÜÃæ¶ÔÈ«ÇòÐÔ·çÏÕ¡£¡£¡£´ËÍ⣬£¬£¬°¢µÏ´ï˹ǿµ÷£¬£¬£¬ÔÚÕâÁ½ÆðÊÂÎñÖУ¬£¬£¬ÏµÍ³ÔâÈëÇÖÆÚ¼ä²ÆÕþÐÅÏ¢ºÍÐÅÓþ¿¨Êý¾Ý²¢Î´Êܵ½Ó°Ïì¡£¡£¡£µ«ÃÔʧСÎÒÐÅÏ¢ÎÞÒÉ»áÔö³¤¿Í»§Ôâ·êÍøÂç¹¥»÷µÄ·çÏÕ£¬£¬£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢½øÐÐÉí·Ý͵ÇÔºÍÓÐÕë¶ÔÐÔµÄÍøÂç´¹µö¹¥»÷£¬£¬£¬Èç¼ÙÒâ³ÛÃûÆ·ÅÆÒªÇóÌṩ¶îÍâСÎÒÐÅÏ¢»ò¸¶¿î£¬£¬£¬»òÓÕÆ­Óû§Ð¹Â©¸ü¶àÃô¸ÐÐÅÏ¢¡£¡£¡£


https://cybernews.com/privacy/adidas-second-data-breach-customers-exposed/


2. Ó¢ÎïÁ÷¹«Ë¾Peter Green ChilledÔâÀÕË÷¹¥»÷


5ÔÂ20ÈÕ£¬£¬£¬Peter Green Chilled×÷Ϊһ¼Ò×ܲ¿Î»ÓÚÓ¢¹úµÄÎïÁ÷¹«Ë¾£¬£¬£¬ÓëTesco ¡¢AldiºÍSainsbury'sµÈ´óÐÍÁãÊÛÉ̺Ï×÷£¬£¬£¬Æä²¿ÃÅϵͳÔÚÂêɯ°Ù»õÔâ·êÍøÂç¹¥»÷ºó²»µ½Ò»¸öÔÂÒ²Ôâµ½Á˼ÓÃÜ¡£¡£¡£¾ÝÓ¢¹ú¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬ÍþвÐÐΪÕßÓÚÖÜÈý¼ÓÃÜÁ˸ù«Ë¾Êý¾Ý£¬£¬£¬ÇÖÈÅÁËÆäÔËÓª£¬£¬£¬·ÛËéÁËÎïÁ÷ϵͳ¡£¡£¡£¸Ã¹«Ë¾ÕýÔÚÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÈëÇÖϵͳ ¡¢¼ÓÃÜÊý¾Ý²¢Ë÷ÒªÊê½ð¡£¡£¡£ÔËÓªÖж϶ÔÎïÁ÷¹«Ë¾Ó°ÏìÃô¸Ð£¬£¬£¬¿ÉÄܵ¼Ö½»¸¶ÑÓ³¤£¬£¬£¬½ø¶øÓ°ÏìÕû¸ö¹©¸øÁ´¡£¡£¡£ÐÅÏ¢°²È«×êÑÐÔ±Aras NazarovasÖ¸³ö£¬£¬£¬´ËÀ๥»÷¿ÉÄÜʹ¹«Ë¾ÏÝÈë̱»¾£¬£¬£¬ÉõÖÁÁÙʱÎÞ·¨Îª³ÛÃûÆ·ÅÆÌṩ·þÎñ£¬£¬£¬µ¼Ö³¬ÊÐÌØ¶¨²úÆ·ÁÙʱǷȱ¡£¡£¡£ÐÅÏ¢°²È«×¨ÒµÐ­»áISACAµÄÊ×ϯȫÇòÕ½Êõ¹ÙChris DimitriadisÒÔΪ£¬£¬£¬Õâ´Î¹¥»÷±ê־ȡһ¸öÁîÈËÓÇÓôµÄÇ÷Ïò£¬£¬£¬ÍøÂç·¸×ï·Ö×Ó²»½ö¶Ô×¼´ó¹«Ë¾»ò¹Ø¼ü»ù´¡ÉèÊ©£¬£¬£¬»¹¹¥»÷¹©¸øÁ´£¬£¬£¬´øÀ´½»¸¶ÖÐ¶Ï ¡¢¿â´æÀ˷ѺͲÆÕþËðʧµÈÏÖʵºó¹û¡£¡£¡£


https://cybernews.com/security/retail-logistics-ransomware-tesco-aldi/


3. Lumma¶ñÒâÈí¼þÐж¯±»×è¶Ï£¬£¬£¬2300¸öÓòÃû±»²é·â


5ÔÂ21ÈÕ£¬£¬£¬È«ÇòÕë¶ÔLumma¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©ÐÅÏ¢ÇÔÈ¡Ðж¯·¢Õ¹Ð­Í¬·ÛË飬£¬£¬³É¹¦²é»ñÊýǧ¸öÓòÃûÒÔ¼°²¿ÃÅ»ù´¡ÉèÊ©Ö÷¸É¡£¡£¡£Õâ´ÎÐж¯¹æÄ£½Ï´ó£¬£¬£¬Éæ¼°¶à¼Ò¿Æ¼¼¹«Ë¾Óë·¨ÂÉ»ú¹¹¡£¡£¡£Î¢ÈíÓÚ2025Äê5ÔÂ13ÈÕ²Éȡ˾·¨Ðж¯£¬£¬£¬²é·âÁËÔ¼2300¸öÓòÃû¡£¡£¡£ÃÀ¹ú˾·¨²¿Ò²»ý¼«Ðж¯£¬£¬£¬²é·âÁËLummaµÄ½ÚÖÆÃæ°å£¬£¬£¬²¢µ·»ÙÁËÏòÍøÂç·¸×ï·Ö×Ó³ö×â¶ñÒâÈí¼þµÄÊг¡¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬Å·ÖÞÐ̾¯×é֯ŷÖÞÍøÂç·¸×ïÖÐÐĺÍÈÕ±¾ÍøÂç·¸×ï½ÚÖÆÖÐÐÄЭÖú²é·âÁËλÓÚÅ·ÖÞºÍÈÕ±¾µÄ»ù´¡ÉèÊ©¡£¡£¡£Î¢ÈíÊý×Ö·¸×ﲿÃÅÖúÀí×Ü˾·¨ÕÕ·÷°µÊ¾£¬£¬£¬ÔÚ2025Äê3ÔÂ16ÈÕÖÁ5ÔÂ16ÈÕÆÚ¼ä£¬£¬£¬È«ÇòÓг¬¹ý39.4Íǫ̀WindowsÍÆËã»úϰȾÁ˸öñÒâÈí¼þ£¬£¬£¬Î¢ÈíÓë¶à²¿ÃÅçÇÃܺÏ×÷£¬£¬£¬³É¹¦¶Â½ØÁ˸öñÒâÈí¼þÓëÊܺ¦ÕßÖ®¼äµÄͨѶ¡£¡£¡£Cloudflare·½Ãæ³Æ£¬£¬£¬Õâ´ÎÐж¯Ê¹LummaÔËÓªÉÌÎÞ·¨½Ó¼û½ÚÖÆÃæ°åµÈ¹Ø¼üÉèÊ©£¬£¬£¬¸øÆä´øÀ´ÁËÔËÓªºÍ²ÆÕþ³É±¾¡£¡£¡£²Î¼ÓÕâ´Î½áºÏÐж¯µÄ¹«Ë¾³ýÁË΢ÈíÍ⣬£¬£¬»¹ÓÐESET ¡¢CleanDNSµÈ¡£¡£¡£Lumma×÷ΪһÖÖ¶ñÒâÈí¼þ¼´·þÎñÐÅÏ¢ÇÔÈ¡·¨Ê½£¬£¬£¬ÖØÒªÕë¶ÔWindowsºÍmacOSϵͳ£¬£¬£¬ÍøÂç·¸×ï·Ö×ÓÖ»ÐèÆÆ·Ñ250ÃÀÔªµ½1000ÃÀÔª¼´¿É¶©ÔÄ×âÓᣡ£¡£Ëü¾ß±¸ÏȽøµÄÌӱܺÍÊý¾ÝÇÔȡְÄÜ£¬£¬£¬Í¨¹ý¶àÖÖÇþµÀ´«²¼²¢Ï°È¾Êܺ¦Õߣ¬£¬£¬ÈëÇÖϵͳºó¿ÉÇÔÈ¡¶àÖÖÊý¾Ý£¬£¬£¬ÍøÂçºó·¢Ëͻع¥»÷Õß·þÎñÆ÷½øÐÐÏúÊÛ»òÓÃÓÚÆäËû¹¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-operation-disrupted-2-300-domains-seized/


4. 3AMÀÕË÷Èí¼þÀûÓõç×ÓÓʼþºäÕ¨ÓëαÔìµç»°½øÐй¥»÷


5ÔÂ21ÈÕ£¬£¬£¬3AMÀÕË÷Èí¼þ´ÓÊô»ú¹¹Õýѡȡ¸ß¶ÈÕë¶ÔÐԵĹ¥»÷¼¿Á©£¬£¬£¬Í¨¹ýµç×ÓÓʼþºäÕ¨ºÍαÔìµÄITÖ§³Öµç»°£¬£¬£¬ÀûÓÃÉç»á¹¤³ÌѧÓÕÆ­Ô±¹¤ÌṩԶ³Ì½Ó¼û¹«Ë¾ÏµÍ³µÄƾ֤¡£¡£¡£Sophos»ã±¨ÏÔʾ£¬£¬£¬ÔÚ2024Äê11ÔÂÖÁ2025Äê1ÔÂÆÚ¼ä£¬£¬£¬ÖÁÉÙÓÐ55Æð¹¥»÷ÀûÓÃÁ˸ü¼Êõ£¬£¬£¬Éæ¼°Á½¸ö·ÖÆçµÄÍþв¼¯Èº¡£¡£¡£ÕâЩ¹¥»÷ÒòÑ­ÁËBlackBastaµÄ¹ßÓÃÊÖ·¨£¬£¬£¬Ô̺¬µç×ÓÓʼþºäÕ¨ ¡¢Í¨¹ýMicrosoft Teams½øÐÐÓïÒô´¹µö¼°ÀÄÓÃQuick Assist¡£¡£¡£Black BastaÄÚ²¿¶Ô»°µÄй¶ΪÆäËûÍþвÐÐΪÕßÌṩÁË¿ÉÀûÓõÄÄ£°å£¬£¬£¬ÖúÆä¼±¾ç°ÑÎÕÇé¿ö¡£¡£¡£2025ÄêµÚÒ»¼¾¶È£¬£¬£¬3AMÀÕË÷Èí¼þÕë¶ÔSophos¿Í»§¶ËÌáÒé¹¥»÷£¬£¬£¬Ñ¡È¡ÀàËÆ²½Ö赫¸ÄÓÃÕæÊµµç»°ÍøÂç´¹µö¡£¡£¡£¹¥»÷ÕßαÔìÖ¸±êÕæÊµIT²¿Ãŵ绰ºÅÂ룬£¬£¬ÔÚÈý·ÖÖÓÄÚ·¢ËÍ24·âδҪÇóÓʼþ½øÐкäÕ¨£¬£¬£¬²¢Ëµ·þÔ±¹¤´ò¿ªMicrosoft Quick AssistÊÚÓèÔ¶³Ì½Ó¼ûȨÏÞ¡£¡£¡£Ëæºó£¬£¬£¬¹¥»÷Õß´ÓºýŪÓòÏÂÔØ²¢ÌáÈ¡¶ñÒâµµ°¸£¬£¬£¬Ô̺¬VBS¾ç±¾ ¡¢QEMU·ÂÕÕÆ÷ºÍԤװQDoorºóÃŵÄWindows 7Ó³Ïñ£¬£¬£¬ÀûÓÃQEMUÌӱܼì²â£¬£¬£¬ÊµÏÖ³ÖÐøÇÒδ±»·¢ÏÖµÄÍøÂç½Ó¼û¡£¡£¡£¹¥»÷Õßͨ¹ýWMICºÍPowerShell½øÐпúËÅ£¬£¬£¬´´½¨±¾µØÖÎÀíÔ±ÕÊ»§ ¡¢×°ÖÃóÒ×RMM¹¤¾ßXEOXRemote²¢·ÛËéÓòÖÎÀíÔ±ÕÊ»§¡£¡£¡£Ö»¹ÜSophos²úÆ·×èÖ¹Á˺áÏòÒÆ¶¯ºÍ·ÀÓùÍ£Óó¢ÊÔ£¬£¬£¬µ«¹¥»÷ÕßÈÔʹÓÃGoodSync¹¤¾ß½«868GBÊý¾Ýй¶µ½BackblazeÔÆ´æ´¢ÖС£¡£¡£


https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/


5. Coinbase³Æ½üÆÚÊý¾Ýй¶ӰÏìÁË69461Ãû¿Í»§


5ÔÂ21ÈÕ£¬£¬£¬¼ÓÃÜÇ®±ÒÂòÂôËùCoinbase½üÈÕÅû¶ÁËһ·Êý¾Ýй¶ÊÂÎñ£¬£¬£¬Ó°Ïì69461Ãû¿Í»§¡£¡£¡£CoinbaseÔÚÌá½»¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄ֪ͨÖаµÊ¾£¬£¬£¬ÆäÍâÑóÁãÊÛÖ§³ÖµØÖ·µÄÉÙÊýÈËÔ±²»µ±½Ó¼ûÁ˿ͻ§ÐÅÏ¢¡£¡£¡£Ð¹Â¶µÄÊý¾ÝËä²»Ô̺¬ÃÜÂë ¡¢Ë½Ô¿µÈ¿ÉÖ±½Ó½Ó¼û×ʽð»òÕË»§µÄÐÅÏ¢£¬£¬£¬µ«Ô̺¬ÐÕÃû ¡¢µ®ÉúÈÕÆÚ ¡¢Éç»á°²È«ºÅÂëºóËÄλ ¡¢ÒøÐÐÕ˺ŵÈСÎÒ±êʶ·û£¬£¬£¬ÒÔ¼°¿ÉÄÜÈ·µ±¾ÖÉí·ÝÐÅÏ¢ºÍÕË»§ÐÅϢͼÏñ¡£¡£¡£CoinbaseÖÒ¸æ³Æ£¬£¬£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢½øÐÐÉç»á¹¤³Ì¹¥»÷£¬£¬£¬ÓÕʹÊܺ¦Õß×ªÒÆ×ʽ𡣡£¡£´Ëǰ£¬£¬£¬ÓÐÈËÓÇÓôÍøÂç·¸×ï·Ö×Ó»ñÈ¡ÕË»§Óà¶îºÍµØÖ·ºó¿ÉÄÜÒý·¢ÑÏÖØºó¹û¡£¡£¡£CoinbaseÔÚÌá½»¸øÃÀ¹ú֤ȯÂòÂôίԱ»áµÄÎļþÖÐй©£¬£¬£¬ÍþвÐÐΪÕßÔÚÍâÑóÖ§³ÖÈËÔ±»ò³Ð°üÉ̵ÄÔ®ÊÖÏ»ñÈ¡Á˸ߴï1% Coinbase¿Í»§ÈºµÄÊý¾Ý£¬£¬£¬²¢ÓÚ5ÔÂ11ÈÕ·¢ËÍÀÕË÷Óʼþ£¬£¬£¬ÒªÇóÖ§¸¶2000ÍòÃÀÔªÊê½ðÒÔÔ¤·ÀÐÅÏ¢±»¹«¿ª¡£¡£¡£È»¶ø£¬£¬£¬Coinbase»Ø¾øÖ§¸¶Êê½ð£¬£¬£¬¶øÊÇÉèÁ¢ÁË2000ÍòÃÀÔªµÄ¼Î½±»ù½ð£¬£¬£¬¼¤ÀøÌṩÓÐÖúÓÚÕÒµ½²¢ÉþÖ®ÒÔ·¨¹¥»÷ÕßµÄÏßË÷¡£¡£¡£Ä¿Ç°£¬£¬£¬CoinbaseÈÔÔÚÆÀ¹ÀÕâ´Î¹¥»÷µÄ²ÆÕþÓ°Ï죬£¬£¬Ô̺¬²¹¾ÈºÍ¿Í»§ÍË¿îÓöÈ£¬£¬£¬Ô¤¼Æ¿ÉÄÜÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£¡£¡£¸Ã¹«Ë¾°µÊ¾½«Åâ³¥Òò¸ÃÊÂÎñ¶øÎó½«×ʽð»ã¸øÚ¿Æ­ÕßµÄÁãÊÛ¿Í»§£¬£¬£¬²¢½øÐÐÉó²éÒÔÈ·ÈÏÊÂʵ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/


6. KrebsOnSecurityÔâ6.3Tbps DDoS¹¥»÷


5ÔÂ21ÈÕ£¬£¬£¬³ÛÃûÍøÂ簲ȫ²©¿ÍKrebsOnSecurity½üÈÕÔâ·ê´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬·åÖµÁ÷Á¿´ïÿÃë6.3Õ×Õ×±ÈÌØ£¬£¬£¬³ÉΪÓмͼÒÔÀ´¹æÄ£×î´óµÄ¹¥»÷Ö®Ò»¡£¡£¡£Õâ´Î¹¥»÷¾ÝÐÅÔ´×ÔÃûΪ¡°Aisuru¡±µÄÐÂÐÍÎïÁªÍø½©Ê¬ÍøÂ磬£¬£¬¸ÃÍøÂçÓÚ2024Äê8Ô³õ´Î·¢ÏÖ£¬£¬£¬ÖØÒªÓÉÊÜϰȾµÄÎïÁªÍøÉ豸Èç·ÓÉÆ÷ ¡¢IPÉãÏñÍ·ºÍÊý×ÖÊÓÆµÂ¼Ïñ»ú×é³É¡£¡£¡£ÕâЩÉ豸±»½Ù³ÖºóЭͬ¹¥»÷£¬£¬£¬ÏòKrebsOnSecurityÕ¾µã·¢ËÍ´óÁ¿Á÷Á¿¡£¡£¡£Ö»¹Ü¹¥»÷½ö³ÖÐøÔ¼45Ã룬£¬£¬µ«ÍþÁ¦¾Þ´ó£¬£¬£¬²»ÍâÍøÕ¾ÒòÊܹȸ衰¶ÜÅÆ´òË㡱± £»£»¤¶øÎ¬³ÖÔÚÏß¡£¡£¡ £¡£¡£¡°Aisuru¡±½©Ê¬ÍøÂçµÄÃû×Ö½ñÄêÔçЩʱ³½Òѳʴ˿̵ØÏÂÂÛ̳£¬£¬£¬ÓëDDoS¹ÍÓ¶·þÎñÓйØ£¬£¬£¬Õâ´Î¹¥»÷¿ÉÄÜÊÇ¶ÔÆäÖ°ÄܵÄѹÁ¦²âÊÔ£¬£¬£¬»òÒԸߵ÷Ö¸±êչʾʵÁ¦¡£¡£¡£¹¥»÷ÕßÉí·ÝÉв»Ã÷È·£¬£¬£¬µ«KrebsÔÚ²©¿ÍÖÐÖ¸³ö£¬£¬£¬¹¥»÷Õß¿ÉÄÜÓëÌṩDDoS·þÎñºÍ½©Ê¬ÍøÂç×âÁÞµÄÍøÃñ¡°Forky¡±ÓйØ£¬£¬£¬Ö»¹ÜForky·ñ¶¨²ß¶¯ÁËÕâ´Î¹¥»÷£¬£¬£¬µ«ÈϿɲμÓÁËAisuru½©Ê¬ÍøÂçµÄ¿ª·¢ºÍÍÆ¹ã¡£¡£¡£


https://hackread.com/krebsonsecurity-6-3-tbps-ddos-attack-aisuru-botnet/