ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬³¬4.7Íò»áÔ±ÐÅϢй¶

°ä²¼¹¦·ò 2026-01-26

1. ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬³¬4.7Íò»áÔ±ÐÅϢй¶


1ÔÂ21ÈÕ£¬Å¦Ô¼Öݹ«ÎñÔ±¹¤»áϵͳ2025Äê5ÔÂ3ÈÕÖÁ31ÈÕÔâ¶ñÒâ¹¥»÷ÕßÇÖÈë²¢Âñ·ü½üÒ»¸öÔ£¬µ¼Ö³¬4.7ÍòÃû»áԱСÎÒÐÅϢй¶¡£¡£¡£¸Ã¹¤»á×÷ΪÃÀ¹ú×î´óµÄ¹«¹²²¿ÃŹÍÔ±¹¤»á¡ª¡ªÖÝ¡¢¡¢ÏØ¡¢¡¢ÊйÍÔ±½áºÏ»áµÄÖ÷Ìâ³ÉÔ±µ¥Ôª£¬´ú±íÔ¼30ÍòÃûÖݼ°´¦Ëùµ±¾Ö¹ÍÔ±ÀûÒæ£¬Õâ´ÎÊÂÎñÒý·¢È«ÃÀÀ͹¤×éÖ¯ÍøÂ簲ȫ¹Ø×¢¡£¡£¡£¾Ý¹¤»áÏò»áÔ±·¢Ë͵Ä֪ͨº¯Åû¶£¬¹¥»÷ÕßÔÚϵͳÄÚ³ÖÐø»î¶¯ÆÚ¼ä£¬¿ÉÄÜ»ñÈ¡ÁË»áÔ±ÐÕÃû¡¢¡¢Éç»á±£ÏÕºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¹¤»áÓÚ5ÔÂÏÂÑ®·¢ÏÖδÊÚȨ½Ó¼ûºó£¬Á¢¼´Æô¶¯µ÷²é²¢²ÉÈ¡ÏÂÏßϵͳ¡¢¡¢ÖØÖÃÃÜÂë¡¢¡¢²¿Êð¸ß¼¶°²È«¼ì²âÈí¼þµÈ´ëÊ©¡£¡£¡£Ö»¹ÜĿǰδ·¢ÏÖÐÅÏ¢±»ÓÃÓÚڲƭ»òÉí·ÝµÁÓõÄÖ±½ÓÖ¤¾Ý£¬µ«Éç»á±£ÏÕºÅÂëµÄƽÉúΨһÐÔʹÆä³ÉΪ³Ö¾ÃÍøÂ簲ȫÒþ»¼£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩÐÅÏ¢¿ªÉèÐéαÐÅ´ûÕË»§¡¢¡¢Ìá½»ÄÉ˰É걨µ¥»òÉêÁ츣Àû²¹Öú£¬¸øÊܺ¦Õß´øÀ´³ÖÐø·çÏÕ¡£¡£¡£¹¤»áÒÑÓë¶¥¼âÍøÂ簲ȫ¼°ÒþÖÔ±£»£»¤»ú¹¹ºÏ×÷·¢Õ¹µ÷²éÓëÓ¦¼±´ëÖ㬲¢È·ÈÏÉæÊÂÊý¾ÝÁìÓòºóʵʱ֪ͨÊÜÓ°Ïì»áÔ±¡£¡£¡£¹Ù·½½¨ÒéÊÜÓ°ÏìÈËÔ±¶¨ÆÚ²é¿´ÐÅÓþ»ã±¨¡¢¡¢²é¶ÔÕË»§Õ˵¥Ã÷ϸ£¬Ç×êÇ×¢Òâ¿ÉÒɻ¡£¡£¡£


https://cybernews.com/security/new-york-csea-union-data-breach/


2. º«¹úÖÆÒ©¾ÞÍ·³¬800ÍòÌõÄÚ²¿ÐÅÏ¢¼°Ô±¹¤µµ°¸Ôâй¶


1ÔÂ21ÈÕ£¬º«¹ú³ÛÃûÒ©ÆóBoryungÖÆÒ©½üÈÕ²úÉúÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬Æä¶³öµÄMongoDBÊý¾Ý¿âÒòÎÞÈκÎÊÚȨ·À»¤£¬µ¼Ö³¬800ÍòÌõÄÚ²¿Í¨Ñ¶¼Í¼¼°½ü3500·ÝÔ±¹¤µµ°¸Íâй¡£¡£¡£¸ÃÊý¾Ý¿âÓÉÆóÒµ¼¶Í¨Ñ¶¹¤¾ßGW¼´Ê±Í¨Ñ¶Èí¼þʹÓã¬Ö±½ÓÃæÏò¹«¹²»¥ÁªÍøÊ¢¿ªÆëÈ«¶ÁȡȨÏÞ£¬Èκη¢ÏÖÕß¾ù¿É²»¹ÊÕϽӼû¡£¡£¡£Ð¹Â¶Êý¾Ý·ÖΪÈý´óÀࣺһÊÇÔ±¹¤Éí·ÝÊý¾Ý£¬Ô̺¬È«Ãû¡¢¡¢ÆóÒµÓÊÏä¡¢¡¢Óû§Ãû¡¢¡¢¹þÏ£¼ÓÃÜÃÜÂë¼°É豸ԪÊý¾Ý£¬¹¥»÷Õ߿ɽè´ËÖ´ÐÐÉí·ÝµÁÓûòÉç»á¹¤³Ìѧ¹¥»÷£¬ÉõÖÁͨ¹ýÀëÏßÆÆ½âÆÆÒëÃÜÂëºóÌáÒéײ¿â¹¥»÷£»£»¶þÊÇÄÚ²¿Í¨Ñ¶¼Í¼£¬º­¸Ç800ÍòÌõÉæ¼°Ã³Ò×Ǣ̸¡¢¡¢ÈËÁ¦×ÊÔ´¡¢¡¢²ÆÕþ¡¢¡¢ÏîÄ¿ÖÎÀí¼°Ô±¹¤¸öÈ˶Ի°µÄ̸Ìì¼Í¼£¬ÆäÖÐÔ̺¬µÄÄÚ²¿Á´½Ó¡¢¡¢IPµØÖ·¡¢¡¢Ñз¢Æð̬µÈÃô¸ÐÐÅÏ¢£¬¿ÉÄܱ»ÓÃÓÚÏµÍ³ÉøÈë»ò¼Ù×°Ô±¹¤Éí·Ý£»£»ÈýÊÇϵͳԪÊý¾Ý£¬È繦·ò´Á¡¢¡¢ÐÂÎÅÇþµÀ¡¢¡¢Óû§-ÇþµÀ¶ÔÓ¦¹ØÏµµÈ£¬¿É¸¨Öú¹¥»÷Õß¹¹½¨¹¥»÷õè¾¶¡£¡£¡£×êÑÐÍŶÓÖ¸³ö£¬´ËÀàй¶¿ÉÄÜÒý·¢Á¬Ëø·çÏÕ£º¹¥»÷Õß¿Éͨ¹ý̸Ìì¼Í¼ÖеÄϸ½Ú»ñÊØÐÅÀµ£¬Ö´Ðо«×¼Ú¿Æ­£»£»»òÀûÓÃÆÆ½âµÄÃÜÂëÈëÇÖÆóҵϵͳ£¬ÇÔÈ¡¸ü¶àóÒ×»úÃÜ¡£¡£¡£Ö»¹ÜBoryungÉÐδ»ØÓ¦£¬µ«Â¶³öÊý¾Ý¿âÒѱ»¹Ø±Õ¡£¡£¡£


https://cybernews.com/security/boryung-corporation-leaks-internal-messages/


3. ɳ³æ×éÖ¯¹¥»÷²¨À¼ÄÜÔ´ÉèÊ©£¬²¿ÊðÐÂÐÍÊý¾Ý²Á³ýÈí¼þ


1ÔÂ24ÈÕ£¬²¨À¼µçÍø2025Äê12ÔÂÏÂÑ®Ôâ·êÓë¶íÂÞ˹¹ú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯¡°É³³æ¡±£¨Sandworm£©ÓйصÄÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÊÔͼ²¿ÊðÃûΪ¡°DynoWiper¡±µÄÐÂÐÍ·ÛËéÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þ¡£¡£¡£¾Ý°²È«¹«Ë¾ESET֤ʵ£¬Õâ´Î¹¥»÷²úÉúÓÚ12ÔÂ29ÈÕÖÁ30ÈÕ£¬Ö¸±êÖ±Ö¸²¨À¼Á½×ùÈȵçÁª²ú³§¼°¿ÉÔÙÉúÄÜÔ´·¢µçÖÎÀíϵͳ£¨Ô̺¬·çÁ¦ÎÐÂÖ»úºÍ¹â·üµçÕ¾£©¡£¡£¡£²¨À¼×ÜÀíÌÆÄɵ¡¤Í¼Ë¹¿ËÔÚÐÂÎŰ䲼»áÉÏÃ÷È·Ö¸³ö£¬Ï®»÷ÓÉÓë¶íÂÞ˹µý±¨²¿ÃÅÖ±½Ó¹ØÁªµÄ×éÖ¯²ß¶¯¡£¡£¡£¡£¡°É³³æ¡±£¨±ðºÅUAC-0113¡¢¡¢APT44¡¢¡¢Seashell Blizzard£©ÊǶíÂÞ˹×ÜÕÕ·÷²¿µý±¨×ܾ֣¨GRU£©ÏÂÊô74455¾üʵ¥ÔªµÄÒ»²¿ÃÅ£¬×Ô2009ÄêÆð»îÔ¾£¬ÒÔÖ´ÐзÛËéÐÔ¹¥»÷ÎÅÃû¡£¡£¡£Æäº¹ÇàÕ½¼¨Ô̺¬2015Äê¶ÔÎÚ¿ËÀ¼µçÍøµÄ¹¥»÷£¬µ¼ÖÂÔ¼23ÍòÈ˶ϵç¡£¡£¡£±¾´Î¹¥»÷ÖÐʹÓõÄDynoWiper¶ñÒâÈí¼þ»á±éÀúÎļþϵͳɾ³ýÎļþ£¬µ¼Ö²Ù×÷ϵͳ̱»¾£¬Ðèͨ¹ý±¸·ÝÖØ½¨»òÖØÐÂ×°Öᣡ£¡£ESET½«Æä¼ì²âΪWin32/KillFiles.NMO£¬²¢°ä²¼ÆäSHA-1¹þÏ£Öµ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/


4. Call-On-DocÊý¾Ýй¶£¬Ó°Ï쳬¹ý100ÍòÃû»¼Õß


1ÔÂ24ÈÕ£¬Ô¶³ÌÒ½ÁÆ·þÎñÌṩÉÌCall-On-DocÐû³ÆÕ¼ÓÐ200Íò»îÔ¾Óû§£¬¿ÉÒ½ÖÎ150ÓàÖÖ¼²²¡£¬²¢³Ðŵѡȡ¡°×îÏȽø¡±Êý¾Ý°²È«´ëÊ©¼°ÆëÈ«ÇкÏHIPAA³ß¶È¡£¡£¡£È»¶ø£¬ºÚ¿ÍÂÛ̳Åû¶Æä12Ô³õÔâÈëÇÖ£¬1,144,223Ìõ»¼Õ߼ͼ±»ÇÔ£¬Éæ¼°»¼Õß´úÂë¡¢¡¢ÂòÂô±àºÅ¡¢¡¢ÐÕÃû¡¢¡¢µØÖ·¡¢¡¢µç»°¡¢¡¢ÓÊÏä¡¢¡¢Ò½ÁÆÀà±ð¡¢¡¢¾ßÌ岡֢¡¢¡¢´¦·½¼°Ö§¸¶½ð¶îµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ºÚ¿ÍÌṩÈýÕÅÔ̺¬ÊýÊ®Ãû»¼ÕßÐÅÏ¢µÄ½ØÍ¼¼°1000ÌõÑù±¾Îļþ£¬¾­ºË²é²¿ÃÅ»¼ÕßµØÖ·ÈÔÓÐЧ£¬ÇÒÂô¼Ò½ÓÊܵÚÈý·½ÍйÜÂòÂô£¬Êý¾ÝÕæÊµÐԽϸß¡£¡£¡£Õâ´ÎÊÂÎñÒý·¢¶àÖØÕùÒé¡£¡£¡£Call-On-Docѡȡ×Ô·Ñģʽ£¬²»´æ´¢±£ÏÕÐÅÏ¢»òÉç±£ºÅ£¬ÆäHIPAAºÏ¹æÐÔ´æÒÉ£¬Èô½öͨ¹ýµç×Ó´«Êä½øÐÐÊܱ£»£»¤ÂòÂôÔò¿ÉÄÜÊܼà¹Ü£¬²»È»ÈÔÊÜÖÝ˾·¨¼°FTCÔ¼Êø¡£¡£¡£Èô´æÔÚ¡°³Ðŵ׿Խ°²È«È´Î´¶ÒÏÖ¡±µÄºýŪÐÐΪ£¬FTC¿Éƾ¾Ý¡¶Áª°îÒµÎñίԱ»á·¨¡·µ÷²é¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Call-On-DocÍøÕ¾FAQÐû³ÆÆäEHRϵͳ¡°ÆëÈ«ÇкÏHIPAA¡±£¬µ«¹¥»÷Õß³ÆÎ´·¢ÏÖ¼ÓÃÜÖ¤¾Ý£¬ÇÒ¹¥»÷ÆÚ¼ä»ú¹¹Î´¾õ²ì¡£¡£¡£


https://databreaches.net/2026/01/24/call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment/?pk_campaign=feed&pk_kwd=call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment


5. ShinyHuntersÀÕË÷ÍÅ»ïÌáÒéSSOÓïÒô´¹µö¹¥»÷


1ÔÂ23ÈÕ£¬ShinyHuntersÀÕË÷ÍÅ»ï½üÈÕÐû³Æ£¬Õý¶ÔOkta¡¢¡¢Î¢Èí¼°¹È¸èµÄµ¥µãµÇ¼£¨SSO£©ÕË»§ÌáÒé³ÖÐøÓïÒôÍøÂç´¹µö¹¥»÷£¬ÒÔÇÔÈ¡ÆóÒµÊý¾Ý²¢Ö´ÐÐÀÕË÷¡£¡£¡£¹¥»÷ÖУ¬ÍþвÐÐΪÕß¼ÙÒâITÖ§³ÖÈËÔ±£¬Í¨¹ýµç»°ÓÕÆ­Ô±¹¤ÔÚ·ÂÕÕ¹«Ë¾µÇ¼ÃÅ»§µÄ´¹µöÍøÕ¾ÊäÈëÍ´´¦ºÍ¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©´úÂë¡£¡£¡£Ò»µ©¹¥ÆÆÏµÍ³£¬¹¥»÷Õ߿ɽӼûÊܺ¦ÕßSSOÕË»§£¬½ø¶øÏνӵ½ÆäËûÆóÒµÀûÓÃÈçSalesforce¡¢¡¢Microsoft 365¡¢¡¢Google Workspace¡¢¡¢DropboxµÈ£¬ÕâЩƽ̨ͨ¹ýSSO½ÚÖÆÃæ°å¼¯³É£¬³ÉΪ½øÈëÆóҵϵͳºÍÊý¾ÝµÄÈë¿Ú¡£¡£¡£¹¥»÷ÕßÀûÓÃÉç»á¹¤³Ì¼¿Á©£¬ÔÚͨ»°ÖÐʵʱÊèµ¼Êܺ¦ÕßʵÏֵǼºÍMFAÑéÖ¤£¬ÉõÖÁ¶¯Ì¬µ÷Õû´¹µöÍøÕ¾ÄÚÈÝÒÔÆ¥ÅäÕæÊµ·þÎñµÄÑéÖ¤²½Öè¡£¡£¡£OktaÒѰ䲼»ã±¨£¬ÃèÊöÁ˹¥»÷ÖÐʹÓõĴ¹µö¹¤¾ß°ü£¬Ô̺¬»ùÓÚWebµÄ½ÚÖÆÃæ°å£¬¿ÉʵʱŤתÊܺ¦Õß¿´µ½µÄÒ³ÃæÄÚÈÝ£¬¸¨ÖúʵÏÖÑéÖ¤¹ý³Ì¡£¡£¡£ShinyHunters֤ʵ¶Ô²¿ÃŹ¥»÷ÕÆ¹Ü£¬³ÆSalesforceÎªÖØÒªÖ¸±ê£¬ÆäËû¹«Ë¾Îª¡°ÊÜÒæÕß¡±£¬²¢ÀûÓôËǰÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄµç»°ºÅÂë¡¢¡¢Ö°Î»ÐÅÏ¢µÈ¼Óǿڿƭ¿ÉÐŶÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/


6. Under ArmourÔâEverestÀÕË÷Èí¼þ¹¥»÷


1ÔÂ23ÈÕ£¬ÃÀ¹ú»î¶¯ÒÂÊξÞÍ·Under ArmourÕýµ÷²éһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°7200ÍòÌõ¿Í»§¼Í¼±»¹«¿ªÖÁºÚ¿ÍÂÛ̳¡£¡£¡£¾Ý±¨µÀ£¬¸ÃÊÂÎñÓëEverestÀÕË÷Èí¼þÍÅ»ï2025Äê11ÔÂÌáÒéµÄ¹¥»÷ÓйØ£¬ºóÕßÔøÐû³ÆÇÔÈ¡343GBÊý¾Ý²¢ÊÔͼÀÕË÷Êê½ð¡£¡£¡£2026Äê1Ô£¬¿Í»§Êý¾ÝÔÚÈȵãºÚ¿ÍÂÛ̳й¶£¬Ô̺¬7200Íò¸öµç×ÓÓʼþµØÖ·¼°ÐÕÃû¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢ÐԱ𡢡¢µØÀíµØÎ»¡¢¡¢²É°ì¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£¡£³ÛÃûÊý¾Ýй¶׷×ÙÆ½Ì¨Have I Been Pwned֤ʵ£¬Õâ´Îй¶µÄÑù±¾Êý¾ÝÔ̺¬Êý°ÙÍòÌõUnder Armour¹Ë¿Í²É°ì¼Í¼¼°Ô±¹¤µç×ÓÓʼþµØÖ·£¬Óë¸Ãƽ̨´Ëǰ»ã±¨Ò»Ö¡£¡£¡£Ð¹Â¶Êý¾Ýͨ¹ýºÚ¿ÍÂÛ̳¹«¿ªºó£¬Òý·¢¿í·º¹Ø×¢£¬ÊÜÓ°ÏìÓû§ÒÑͨ¹ý¸Ãƽ̨ÊÕµ½Í¨Öª¡£¡£¡£Under Armour»ØÓ¦³Æ£¬¹«Ë¾ÕýÓëÍâ²¿ÍøÂ簲ȫר¼ÒºÏ×÷µ÷²éÖ¸¿Ø£¬²¢Ç¿µ÷Ö§¸¶ÏµÍ³¼°Óû§ÃÜÂëδÊÜÓ°Ïì¡£¡£¡£¸Ã¹«Ë¾·ñ¶¨¡°ÊýǧÍòÌõÃô¸Ð¼Í¼Ôâй¶¡±µÄ˵·¨£¬½öÈϿɡ°¼«ÉÙÊý¿Í»§Ãô¸ÐÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡±£¬µ«Î´Ã÷È·¾ßÌåÊýÁ¿¡£¡£¡£Ä¿Ç°£¬¹«Ë¾Î´Åû¶¹¥»÷Èë¿Úµã»ò¾ßÌåй¶ԭÒò£¬Ò²Î´×¢Ã÷ÊÇ·ñÊÕµ½ÀÕË÷Êê½ðÒªÇ󡣡£¡£


https://securityaffairs.com/187229/data-breach/investigation-underway-after-72m-under-armour-records-surface-online.html