ZestixÍþвÐÐΪÕßͨ¹ýÇÔȡƾ֤ÈëÇÖÆóÒµÔÆÆ½Ì¨
°ä²¼¹¦·ò 2026-01-061. ZestixÍþвÐÐΪÕßͨ¹ýÇÔȡƾ֤ÈëÇÖÆóÒµÔÆÆ½Ì¨
1ÔÂ5ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬ÍøÂ簲ȫ¹«Ë¾Hudson RockÅû¶£¬£¬£¬ÃûΪZestixµÄÍþвÐÐΪÕßÕýÔÚµØÏÂÂÛ̳¶µÏú´ÓÊýÊ®¼Ò¹«Ë¾ÇÔÈ¡µÄÆóÒµÊý¾Ý£¬£¬£¬Éæ¼°º½¿Õ¡¢¡¢¡¢¹ú·À¡¢¡¢¡¢Ò½ÁÆ¡¢¡¢¡¢¹«ÓÃÊÂÒµ¡¢¡¢¡¢µçÐÅ¡¢¡¢¡¢µ±¾ÖµÈ¶à¸ö¹Ø¼üÐÐÒµ¡£ÕâЩÊý¾ÝÒÉËÆÍ¨¹ýÈëÇÖÆóÒµÔÆÆ½Ì¨ÈçShareFile¡¢¡¢¡¢NextcloudºÍOwnCloud»ñÈ¡£¬£¬£¬¶ø³õʼ½Ó¼ûȨÏÞ¿ÉÄÜÔ´ÓÚÔ±¹¤É豸²¿ÊðµÄRedLine¡¢¡¢¡¢LummaºÍVidarµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍøÂçµÄƾ֤¡£´ËÀà¶ñÒâÈí¼þ³£Í¨¹ý¶ñÒâ¸æ°×»òClickFix¹¥»÷´«²¼£¬£¬£¬×¨ÃÅÇÔÈ¡ä¯ÀÀÆ÷ƾ֤¡¢¡¢¡¢ÐÅÓþ¿¨ÐÅÏ¢¡¢¡¢¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¼°¼´Ê±Í¨Ñ¶ÀûÓÃÄÚÈÝ¡£Hudson RockÖ¸³ö£¬£¬£¬ÈôÆóҵδÆôÓöà³É·ÖÉí·ÝÑéÖ¤£¨MFA£©£¬£¬£¬¹¥»÷Õß¿ÉÀûÓÃÓÐЧƾֱ֤½ÓµÇ¼Îļþ¹²Ïí·þÎñ¡£·ÖÎö·¢ÏÖ£¬£¬£¬²¿Ãű»µÁƾ֤ÔÚ·¸×ïÊý¾Ý¿âÖдæÔÚ¶àÄ꣬£¬£¬ÆóÒµ³Ö¾ÃδÂÖ»»Æ¾Ö¤»òʹ»î¶¯»á»°Ê§Ð§£¬£¬£¬µ¼Ö³ÖÐøÂ¶³ö·çÏÕ¡£Zestix×÷Ϊ³õʼ½Ó¼û´úÀí£¨IAB£©£¬£¬£¬ÏúÊ۵ı»µÁÊý¾ÝÁ¿´Ó¼¸Ê®GBµ½ÊýTB²»µÈ£¬£¬£¬º¸Ç·É»úÊØ»¤Êֲᡢ¡¢¡¢¹ú·À¹¤³ÌÎļþ¡¢¡¢¡¢¿Í»§Êý¾Ý¿â¡¢¡¢¡¢½¡¿µ¼Í¼¡¢¡¢¡¢¹«¹²½»Í¨Ê¾Òâͼ¡¢¡¢¡¢LiDARµØÍ¼¡¢¡¢¡¢ISPÍøÂçÅäÖᢡ¢¡¢ÎÀÐÇÏîÄ¿Êý¾Ý¡¢¡¢¡¢ERPÔ´´úÂë¼°µ±¾ÖºÏÒ»ÖÂÃô¸ÐÐÅÏ¢£¬£¬£¬¿ÉÄÜÒý·¢°²È«¡¢¡¢¡¢ÒþÖÔй¶¼°Ã³Ò×¼äµý·çÏÕ£¬£¬£¬ÉõÖÁ´¥¼°¹ú¶È°²È«ÎÊÌâ¡£
https://www.bleepingcomputer.com/news/security/cloud-file-sharing-sites-targeted-for-corporate-data-theft-attacks/
2. BrightspeedÔâCrimson CollectiveÀÕË÷ÍŻ﹥»÷
1ÔÂ5ÈÕ£¬£¬£¬ÃÀ¹ú×î´ó¹âÏË¿í´ø¹«Ë¾Ö®Ò»Brightspeed½üÈÕÕýµ÷²éCrimson CollectiveÀÕË÷ÍÅ»ïÌá³öµÄ°²È«·ì϶¼°Êý¾Ý͵ÇÔÖ¸¿Ø¡£¸Ã¹«Ë¾³ÉÁ¢ÓÚ2022Ä꣬£¬£¬ÎªÃÀ¹ú20¸öÖݵĴåÂä¼°½¼ÇøÉçÇøÌṩµçÐÅÓ뻥ÁªÍø·þÎñ¡£Crimson CollectiveÔÚTelegramƵµÀÐû³Æ£¬£¬£¬ÒÑÇÔÈ¡³¬100ÍòBrightspeed¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬Ô̺¬Ð¡ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡¢¡¢¡¢µØÖ·¡¢¡¢¡¢ÕË»§ÏêÇ飨º¬ÐÕÃû¡¢¡¢¡¢ÓÊÏä¡¢¡¢¡¢µç»°£©¡¢¡¢¡¢Ö§¸¶º¹Çà¡¢¡¢¡¢²¿ÃÅÖ§¸¶¿¨Êý¾Ý¼°º¬PIIµÄÔ¤Ô¼/¶©µ¥¼Í¼£¬£¬£¬²¢Íþв½«¹«¿ªÑù±¾ÒÔʩѹ¡£Brightspeed»ØÓ¦³Æ¡°¸ß¶ÈÆ÷ÖØÍøÂ簲ȫ¼°¿Í»§ÐÅÏ¢±£»£»¤£¬£¬£¬ÒÑÆô¶¯µ÷²é£¬£¬£¬ºóÐø½«Ïò¿Í»§¡¢¡¢¡¢Ô±¹¤¼°¼à¹Ü²¿ÃÅ´«µÝ½øÕ¹¡±¡£·ÖÎöÏÔʾ£¬£¬£¬Crimson CollectiveµÄ¹¥»÷ÊÖ·¨³öÏÖϵͳÐÔÌØµã£º£º£ºÍ¨¹ýÇÔȡƾ֤¡¢¡¢¡¢ÀûÓÃÔÆ·þÎñÅäÖ÷ì϶£¨ÈçδÆôÓöà³É·ÖÈÏÖ¤£©¼°¶ñÒâÈí¼þ´«²¼£¨ÈçRedLine¡¢¡¢¡¢Lumma£©»ñÈ¡³õʼ½Ó¼ûȨÏÞ£¬£¬£¬½ø¶øºáÏòÉøÈëÆóÒµÖ÷Ìâϵͳ¡£
https://www.bleepingcomputer.com/news/security/us-broadband-provider-brightspeed-investigates-breach-claims/
3. Sedgwick֤ʵÆäµ±¾Ö×Ó¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷
1ÔÂ5ÈÕ£¬£¬£¬µÚÈý·½Ë÷ÅâºÍ¸£ÀûÖÎÀí»ú¹¹Sedgwick½üÈÕ֤ʵ£¬£¬£¬Æä×Ó¹«Ë¾Sedgwick Government SolutionsÔâ·êÍøÂç¹¥»÷¡£¸Ã¹«Ë¾ÎªÃÀ¹úµ±¾Ö»ú¹¹£¨Ô̺¬ºÓɽ°²È«Êý¡¢¡¢¡¢ÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£©¼°È«¹úÊÐÕþµ±¾ÖÌṩË÷Åâ΢·çÏÕÖÎÀí·þÎñ¡£¾ÝSedgwick½²»°ÈËÉêÃ÷£¬£¬£¬ÊÂÎñ²úÉúºó£¬£¬£¬¹«Ë¾Á¢¼´Æô¶¯ÊÂÎñÏìÓ¦ºÍ̸£¬£¬£¬²¢ÓëÍøÂ簲ȫר¼ÒºÏ×÷·¢Õ¹µ÷²é¡£¾³õ²½ÆÀ¹À£¬£¬£¬¹¥»÷½öÓ°ÏìÁËÒ»¸ö¹ÂÁ¢µÄÎļþ´«Êäϵͳ£¬£¬£¬Î´²¨¼°Sedgwick×ÔÉíÍøÂç»òÆä×Ó¹«Ë¾µÄÆäËûϵͳ£¬£¬£¬Ô̺¬¹Ø¼üµÄË÷ÅâÖÎÀí·þÎñÆ÷¡£¹«Ë¾Ç¿µ÷£¬£¬£¬Sedgwick Government SolutionsÒµÎñÓëÆäËûÒµÎñÆëÈ«·ÖÀ룬£¬£¬ÆäËûϵͳ»òÊý¾Ý¾ùδÊÜÓ°Ï죬£¬£¬ÇÒ·þÎñÄÜÁ¦Î´ÊÜ×ÌÈÅ£¬£¬£¬ÒÑ֪ͨ·¨Âɲ¿ÃŲ¢³ÖÐøÓë¿Í»§Î¬³Ö¹µÍ¨¡£Õâ´Î¹¥»÷ÓÉTridentLockerÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÖ´ÐС£¸Ã×éÖ¯ÓÚгýϦÐû³Æ´ÓSedgwick Government SolutionsÇÔȡԼ3.4GBÊý¾Ý²¢¹«Ö®ÓÚÖÚ¡£
https://www.securityweek.com/sedgwick-confirms-cyberattack-on-government-subsidiary/
4. Ledger¿Í»§Êý¾ÝÒòGlobal-eϵͳÔâÈëÇÖй¶
1ÔÂ5ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬Çø¿éÁ´¹«Ë¾LedgerÏò²¿Ãſͻ§·¢³ö֪ͨ£¬£¬£¬³ÆÆäµÚÈý·½Ö§¸¶´¦ÖÃÉÌGlobal-eµÄϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒÊý¾Ýй¶¡£LedgerÇ¿µ÷£¬£¬£¬Æä×ÔÉíÍøÂçδÊÜÓ°Ï죬£¬£¬Ó²¼þÓëÈí¼þϵͳÈÔά³Ö°²È«¡£Õâ´Îй¶µÄÊý¾ÝÉæ¼°ÔÚLedger.comʹÓÃGlobal-eʵÏֲɰìµÄ¿Í»§£¬£¬£¬¾ßÌåÔ̺¬ÐÕÃû¡¢¡¢¡¢ÁªÏµÐÅÏ¢µÈ¶©µ¥Êý¾Ý£¬£¬£¬µ«Ã÷È·ÅųýÖ§¸¶ÐÅÏ¢¡¢¡¢¡¢²ÆÕþÊý¾Ý¡¢¡¢¡¢¼ÓÃÜÇ®°üÖú¼Ç´Ê¡¢¡¢¡¢Çø¿éÁ´Óà¶î¼°Êý×Ö×ʲúÓйذÂÃØÐÅÏ¢¡£Global-e×÷Ϊ¶à¼Ò¹ú¼ÊÆ·ÅÆµÄÖ§¸¶·þÎñÉÌ£¬£¬£¬Æä·þÎñº¸Ç½áÕË¡¢¡¢¡¢¶©µ¥´¦Öᢡ¢¡¢Ë°ÎñºÏ¹æµÈ»·½Ú£¬£¬£¬Ðè´æ´¢¿Í»§¶©µ¥Êý¾Ý¡£¸Ã¹«Ë¾¿Í»§Ô̺¬Bang&Olufsen¡¢¡¢¡¢adidas¡¢¡¢¡¢DisneyµÈ³ÛÃûÆ·ÅÆ¡£ÊÂÎñ²úÉúºó£¬£¬£¬Global-eѸËÙ¸ôÀëÊÜÓ°Ïìϵͳ²¢Æô¶¯·À»¤´ëÊ©£¬£¬£¬Ä¿Ç°ÕýÅɽÓ֪ͨ¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ¼°¼à¹Ü»ú¹¹¡£Global-eÓëLedger¾ùÇ¿µ÷£¬£¬£¬¹¥»÷Õßδ»ñÈ¡ÈκÎÖ§¸¶Æ¾Ö¤»òÕË»§ÐÅÏ¢£¬£¬£¬µ«¿ÉÄÜͨ¹ýй¶µÄÁªÏµ·½Ê½ÌáÒé´¹µö¹¥»÷£¬£¬£¬ÊÔͼÇÔÈ¡Óû§ÃÜÂë»òÖú¼Ç´Ê¡£
https://www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/
5. NordVPN·ñ¶¨Êý¾Ýй¶ָ¿Ø£¬£¬£¬³Æ¹¥»÷ÕßÕ¼ÓÐÐé¹¹Êý¾Ý
1ÔÂ5ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬NordVPNÕë¶ÔÍøÂç·¸×ï·Ö×ÓÐû³ÆÆäÄÚ²¿Salesforce¿ª·¢·þÎñÆ÷ÔâÈëÇÖÒ»ÊÂ×÷³ö»ØÓ¦£¬£¬£¬Ã÷È··ñ¶¨Ö¸¿Ø²¢³ÎÇåÊÂÎñÕæÏà¡£´Ëǰ£¬£¬£¬ÍþвÐÐΪÕß¡°1011¡±ÔÚºÚ¿ÍÂÛ̳Ðû³Æ£¬£¬£¬Í¨¹ý±©Á¦ÆÆ½âNordVPN¿ª·¢·þÎñÆ÷£¬£¬£¬ÇÔÈ¡ÁËÔ̺¬Salesforce APIÃÜÔ¿¡¢¡¢¡¢JiraÁîÅÆµÈÃô¸ÐÐÅÏ¢µÄ10Óà¸öÊý¾Ý¿â¡£¶Ô´Ë£¬£¬£¬NordVPNÚ¹Êͳƣ¬£¬£¬Ëùν¡°Ð¹Â¶Êý¾Ý¡±ÊµÎª¼¸¸öÔÂǰ¶ÔDZÔÚ×Ô¶¯»¯²âÊÔ¹©¸øÉ̽øÐÐÊÔÓòâÊÔʱ£¬£¬£¬´Óһʱ²âÊÔ»·¾³ÖÐÇÔÈ¡µÄ²âÊÔÊý¾Ý£¬£¬£¬¸Ã»·¾³ÓëÆä×ÔÉí»ù´¡ÉèÊ©ÎÞÈκθÉÁª¡£NordVPNÇ¿µ÷£¬£¬£¬²âÊÔ»·¾³½öÔ̺¬ÓÃÓÚÖ°Äܲ鳵ÄÐé¹¹Êý¾Ý£¬£¬£¬´ÓδÉÏ´«ÕæÊµ¿Í»§Êý¾Ý¡¢¡¢¡¢³ö²úÔ´´úÂë»òÓÐЧÃô¸Ðƾ֤¡£ÓÉÓÚ²âÊÔ½öΪ³õ²½ÆÀ¹ÀÇÒδǩÊðºÏͬ£¬£¬£¬¸Ã»·¾³´ÓδÓë³ö²úϵÍÂ䬽ӣ¬£¬£¬×îÖÕҲδѡÔñ¸Ã¹©¸øÉÌ¡£¹«Ë¾ÒÑÁªÏµÉæÊ¹©¸øÉ̽øÒ»²½ºËʵÇé¿ö¡£
https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/
6. Å·Ö޾ƵêÒµÔâ¶íÍøÂç·¸×ï·Ö×Ó¶ñÒâÈí¼þ¹¥»÷
1ÔÂ6ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬ÒÉËÆ¶íÂÞË¹ÍøÂç·¸×ï·Ö×ÓÕë¶ÔÅ·Ö޾Ƶꡢ¡¢¡¢Âõ꼰¿ÍÕ»ÌáÒé¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬Í¨¹ýαÔì¡°À¶ÆÁËÀ»ú¡±Ò³ÃæÓÕµ¼Êܺ¦ÕßÏÂÔØDCRat¶ñÒâÈí¼þ¡£Securonix×êÑÐÈËÔ±×·×Ùµ½ÃûΪPHALT#BLYXµÄ³ÖÐø¶ñÒâÈí¼þ»î¶¯£¬£¬£¬ÆäÒԾƵêËÑË÷ÒýÇæµö¶üΪÆðµã£¬£¬£¬Í¨¹ýαÔìÈȵãÔ¤Ô¼ÍøÕ¾µÄ¡°È¡µÞÔ¤Ô¼¡±Í¨ÖªÓʼþÖ´Ðд¹µö¡£Êܺ¦Õßµã»÷ÓʼþÖеġ°²é¿´ÏêÇ顱°´Å¥ºó£¬£¬£¬½«±»Êèµ¼ÖÁÐéα¾ÆµêÔ¤Ô¼Ò³Ãæ£¬£¬£¬ÏÔʾ¡°¼ÓÔØ¹¦·ò¹ý³¤¡±µÄä¯ÀÀÆ÷ÃýÎ󣬣¬£¬²¢ÌáÐѵã»÷¡°Ë¢ÐÂÒ³Ãæ¡±Ìø×ªÖÁαÔìµÄÀ¶ÆÁËÀ»ú½çÃæ¡£ÎªÍ˳ö¸ÃÒ³Ãæ£¬£¬£¬Êܺ¦Õß±»ÓÕµ¼½«¶ñÒâ¾ç±¾Õ³ÌùÖÁWindowsÔËÐжԻ°¿ò£¬£¬£¬´¥·¢Ò»ÏµÁвÙ×÷£º£º£º½ûÓÃWindows Defender¡¢¡¢¡¢ºó¶ÜÔËÐжñÒâÈí¼þ£¬£¬£¬Í¬Ê±´ò¿ªÕæÊµÔ¤Ô¼Ò³Ãæ×÷Ϊµö¶ü¡£DCRat¶ñÒâÈí¼þ¿É¸ú×ÙÊܺ¦Õß»÷¼ü¡¢¡¢¡¢ÇÔÈ¡ÃÜÂë¼°¼ôÌù°åÊý¾Ý£¬£¬£¬²¢ÏÂÔØÆäËû¹¤¾ßÒÔʵÏֳ־óÖÐø½Ó¼û¡£SecuronixÖ¸³ö£¬£¬£¬¸Ã¹¥»÷ÀûÓá°ClickFix¡±¼¼Êõ£¬£¬£¬Í¨¹ýÐéαÃýÎóÌáÐѰѳÖÓû§Ö´ÐкÅÁ£¬£¬ÊôÓÚ¶ñÒâÈí¼þ´«²¼µÄ¸´ÔÓÑݱ䡣¼¼Êõϸ½ÚÏÔʾ£¬£¬£¬¹¥»÷Óë¶íÂÞ˹´æÔÚ¹ØÁª£¬£¬£¬MS BuildÏîÄ¿Îļþº¬¶íÓïµ÷ÊÔ×Ö·û´®£¬£¬£¬»ù´¡ÉèÊ©¼°¹¤¾ßµØÀíµØÎ»¾ùÖ¸Ïò¶íÂÞ˹£¬£¬£¬ÇÒDCRatÔÚ¶íµØÏÂÂÛ̳¿í·ºÏúÊÛ¡£
https://therecord.media/russian-hackers-europe-hospitality-blue-screen


¾©¹«Íø°²±¸11010802024551ºÅ