ÂíÈøÖîÈûÖݳÛÃûҽԺϵͳÔâÍøÂç¹¥»÷

°ä²¼¹¦·ò 2026-04-09

1. ÂíÈøÖîÈûÖݳÛÃûҽԺϵͳÔâÍøÂç¹¥»÷


4ÔÂ7ÈÕ£¬£¬ÃÀ¹úÂíÈøÖîÈûÖݳÛÃûÒ½ÁÆ»ú¹¹Signature Healthcare¼°Æä²¼Â޿˶ÙÒ½Ôº½üÈÕÔâ·êÍøÂç¹¥»÷£¬£¬µ¼Ö¶à¸öÐÅϢϵͳÊÜË𣬣¬Ò½Ôº±»ÆÈ»Ø¾ø¾È»¤³µ½øÈ룬£¬²¢Æô¶¯ÁËÍ £»£»úÊØ»¤·¨Ê½¡£¸ÃҽԺϵͳÒÑÔËÓª³¬¹ý125Ä꣬£¬Îª²¼Â޿˶ټ°²¨Ê¿¶Ù½¼Çø¶à¸ö³ÇÊеÄÊýÊ®Íò¾ÓÃñÌṩ·þÎñ¡£Ôº·½°µÊ¾£¬£¬ÔÚ·¢ÏÖÍøÂ粿ÃÅÇøÓò´æÔÚ¿ÉÒɻºó£¬£¬Á¢¼´Æô¶¯ÁËÊÂÎñÏìÓ¦ºÍ̸£¬£¬ÒÔÈ·±£¸ßÖÊÁ¿µÄ»¼Õß»¤ÀíºÍ°²È«¡£ÊÜÕâ´Î¹¥»÷Ó°Ï죬£¬¹ÌȻסԺ¡¢¼±Õï·þÎñºÍÔ¤Ô¼ÊÖÊõÈÔ³ÖÐø½øÐУ¬£¬µ«Ò½ÔºÔÚÖܶþ²»µÃ²»È¡µÞÁ˰©Ö¢»¼ÕߵϝÁÆÊäÒº·þÎñ£¬£¬²¢ÖÒ¸æ³ÆÓÉÓÚ¼¼Êõ¹ÊÕÏ£¬£¬»¼Õß¾ÍÕï½«Ãæ¶ÔÑÓÎó¡£½ØÖÁÖܶþ£¬£¬ÉÐÎÞÈκκڿÍ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£ÕâÆðÊÂÎñ²¢·Ç¹ÂÁ¢°¸Àý£¬£¬½ñÄêÒÔÀ´£¬£¬ÃÀ¹ú¶à¼ÒÒ½ÔºÒÑÒòÍøÂç¹¥»÷±»ÆÈÈ¡µÞÔ¤Ô¼²¢ÏÞ¶È·þÎñ¡£Ä¿Ç°£¬£¬Health ISAC³ÖÐøÓëÎÀÉúÓ빫¼Ò·þÎñ²¿ºÍÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾ÖµÈÁª°î»ú¹¹Î¬³ÖÐÅÏ¢¹²ÏíÇþµÀ£¬£¬ÒÔÈ·±£Ò½ÁƱ£½¡¹«Ë¾¿ÉÄÜʵʱ»ñµÃÓйØÍþвµý±¨¡£


https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack


2. ÒÁÀʹØÁªºÚ¿Í´ó¹æÄ£¶Ô×¼ÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©PLC


4ÔÂ7ÈÕ£¬£¬ÃÀ¹ú¶à¸öÁª°î»ú¹¹Ô̺¬Áª°îµ÷²é¾Ö£¨FBI£©¡¢ÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©¡¢¹ú¶È°²È«¾Ö£¨NSA£©¡¢»·¾³± £»£»¤Êð£¨EPA£©¡¢ÄÜÔ´²¿£¨DOE£©ÒÔ¼°ÃÀ¹úÍøÂç˾ÁîÊÖÏÂÊôµÄÍøÂç¹ú¶È¹¤×÷¶ÓÁУ¨CNMF£©½áºÏ°ä²¼ÁËÒ»·ÝÖҸ沼¸æ£¬£¬Ö¸³öÓëÒÁÀÊÓйØÁªµÄ¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯ÕýÒÔÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©ÍøÂçÖж³öÓÚ»¥ÁªÍøµÄÂÞ¿ËΤ¶û/°¬Â×-²¼À­µÂÀû¿É±à³ÌÂß¼­½ÚÖÆÆ÷£¨PLC£©ÎªÖ¸±ê£¬£¬·¢Æð³ÖÐø¹¥»÷¡£²¼¸æ³Æ£¬£¬×Ô2026Äê3ÔÂÒÔÀ´£¬£¬ÕâЩ¹¥»÷ÒѶÔÃÀ¹úµ±¾Ö·þÎñºÍÉèÊ©¡¢Ë®ºÍ·Ïˮϵͳ¡¢ÄÜÔ´µÈ¶à¸ö¹Ø¼ü»ù´¡ÉèÊ©²¿ÃÅÔì³ÉÁ˾­¼ÃËðʧºÍÔËÓªÖжÏ¡£¹¥»÷ÕßµÄÒâͼÔ̺¬¶ñÒâ´Û¸ÄÏîÄ¿Îļþ£¬£¬ÒÔ¼°°Ñ³ÖÈË»ú½çÃæ£¨HMI£©ºÍ¼à¿ØÓëÊý¾Ý²É¼¯£¨SCADA£©ÏµÍ³ÏÔʾÆÁÉÏÏÔʾµÄÊý¾Ý¡£FBIÆÀ¹ÀÒÔΪ£¬£¬Õë¶ÔÃÀ¹ú×éÖ¯µÄÕâЩ¹¥»÷»î¶¯×î½üÓÐËùÉý¼¶£¬£¬ºÜ¿ÉÄÜÊǶÔÒÁÀÊÓëÃÀ¹úºÍÒÔÉ«ÁÐÖ®¼äµÐ¶ÔÐж¯µÄ»ØÓ¦¡£Îª·ÀÓù´ËÀ๥»÷£¬£¬½áºÏ²¼¸æÏòÍøÂç·ÀÓùÈËÔ±Ìá³öÁËһϵÁн¨Ò飺£º£ºÓ¦½«PLCÓ뻥ÁªÍø¶Ï¿ªÏνӻòʹÓ÷À»ðǽ¼ÓÒÔ± £»£»¤µÈ¡£


https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/


3. SaaS¼¯³ÉÉÌAnodotÈëÇÖÊÂÎñ²¨¼°¶à¼Ò¹«Ë¾


4ÔÂ7ÈÕ£¬£¬Ò»¼ÒÈí¼þ¼´·þÎñ£¨SaaS£©¼¯³ÉÌṩÉÌÔâ·ê°²È«ÈëÇÖ£¬£¬µ¼ÖÂÉí·ÝÑéÖ¤ÁîÅÆ±»µÁ£¬£¬ËæºóÊ®Óà¼Ò¹«Ë¾Ôâ·êÁËÊý¾Ý͵ÇÔ¹¥»÷¡£¹ÌÈ»¶à¼ÒÔÆ´æ´¢ºÍSaaS¹©¸øÉ̾ù³ÉΪ±»µÁÁîÅÆµÄ¹¥»÷Ö¸±ê£¬£¬µ«´óÎÞÊýÊý¾Ý͵ÇÔ¹¥»÷ÖØÒªÕë¶ÔÔÆÊý¾Ýƽ̨Snowflake¡£Snowflake֤ʵÁË¡°Òì³ £»£»î¶¯¡±µÄ´æÔÚ£¬£¬²¢°µÊ¾ÆäÉÙÊý¿Í»§Êܵ½ÁËÓ°Ïì¡£¸Ã¹«Ë¾³Æ£¬£¬×î½üÔÚÉÙÊý¿Í»§ÕË»§Öмì²âµ½ÓëÌØ¶¨µÚÈý·½¼¯³ÉÓйصÄÒì³ £»£»î¶¯£¬£¬Ëæ¼´Á¢¼´·¢Õ¹µ÷²é£¬£¬²¢³öÓÚÉóÉ÷˼¿¼¶³½áÁË¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§ÕË»§£¬£¬Í¬Ê±Í¨ÖªÁËÓйؿͻ§²¢ÌṩԤ·ÀÐÔÁìµ¼¡£SnowflakeÇ¿µ÷£¬£¬ÕâЩ¹¥»÷²¢Î´Ôì³ÉÆä×ÔÉíϵͳµÄÈκηì϶»òÇÖº¦¡£¾Ý³Æ£¬£¬¹¥»÷ÕßÔøÊÔͼʹÓñ»µÁµÄÉí·ÝÑéÖ¤ÁîÅÆ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬£¬µ«Ôڳɹ¦Ö®Ç°¼´±»¼ì²â·¢ÏÖ¡£¾Ý¶à¸öÐÂÎÅÆðÔ´»ñϤ£¬£¬ÕâЩ¹¥»÷Ô´ÓÚÊý¾ÝÒì³£¼ì²â¹«Ë¾AnodotµÄһ·°²È«ÊÂÎñ¡£ShinyHunters×é֤֯ʵÁËÆäÐÐΪ£¬£¬Ðû³ÆÉÏÖÜÎå´ÓÊýÊ®¼Ò¹«Ë¾ÇÔÈ¡ÁËÊý¾Ý£¬£¬²¢È·ÈÏÔøÊÔͼ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬£¬µ«°µÊ¾±»ÈËΪÖÇÄܼì²âϵͳÀ¹½Ø¡£¹¥»÷Õß»¹Ðû³ÆÕâ´Î¹¥»÷Ô´ÓÚAnodotµÄ°²È«ÊÂÎñ£¬£¬°µÊ¾ËûÃÇ¿ÉÄÜÒÑÈëÇָù«Ë¾Ò»¶Î¹¦·ò¡£


https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/


4. UNC6783ÍþвÐÐΪÕßÈëÇÖBPOÌṩÉÌ


4ÔÂ8ÈÕ£¬£¬Ò»¸öÃûΪUNC6783µÄÍþвÐÐΪÕßÕýͨ¹ýÈëÇÖÒµÎñÁ÷³ÌÍâ°ü£¨BPO£©ÌṩÉÌ£¬£¬»ñÈ¡¶Ô¶à¸öÐÐÒµ¸ß¼ÛÖµ¹«Ë¾µÄ´ó¹æÄ£½Ó¼ûȨÏÞ¡£¾Ý¹È¸èÍþвµý±¨Ð¡×飨GTIG£©Åû¶£¬£¬ÒѺ±¼ûÊ®¼ÒÆóҵʵÌå³ÉΪÕâÖÖ¹¥»÷¼¿Á©µÄÖ¸±ê£¬£¬Ãô¸ÐÊý¾Ý±»ÇÔÈ¡²¢ÓÃÓÚÀÕË÷¡£GTIGÊ×ϯÍþв·ÖÎöʦAustin Larsen°µÊ¾£¬£¬UNC6783ͨ³£ÒÀ¸½Éç»á¹¤³ÌºÍÍøÂç´¹µö»î¶¯À´ÈëÇÖÓëÖ¸±ê¹«Ë¾ºÏ×÷µÄBPO¹«Ë¾£¬£¬ÓÐʱҲ»áÖ±½ÓÁªÏµÖ¸±ê×éÖ¯ÄÚ²¿µÄÖ§³ÖºÍÔ®ÊǪ̈ÈËÔ±£¬£¬ÊÔͼ»ñȡֱ½Ó½Ó¼ûȨÏÞ¡£×êÑÐÈËÔ±ÒÔΪ£¬£¬UNC6783¿ÉÄÜÓëÒ»¸ö»¯Ãû¡°Raccoon¡±µÄÄäÃûÍþвÐÐΪÕßÓйأ¬£¬ºóÕß´ËÇ°ÔøÒÔ¶à¼ÒΪ´óÐ͹«Ë¾Ìṩ·þÎñµÄBPO¹«Ë¾ÎªÖ¸±ê¡£ÔÚͨ¹ýʵʱ̸ÌìÌáÒéµÄÉç»á¹¤³Ì¹¥»÷ÖУ¬£¬¹¥»÷Õß»áÅúʾ֧³ÖÈËÔ±½Ó¼ûÍйÜÔÚ·ÂÕÕÖ¸±ê¹«Ë¾ÓòÃûÉϵÄαÔìOktaµÇÂ¼Ò³Ãæ£¬£¬ÕâЩÓòÃû×ñÑ­ÌØ¶¨Ä£Ê½¡£LarsenÖ¸³ö£¬£¬ÕâЩ¹¥»÷Öв¿ÊðµÄÍøÂç´¹µö¹¤¾ß°ü¿ÉÄÜÇÔÈ¡¼ôÌù°åÄÚÈÝ£¬£¬´Ó¶øÈƹý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©± £»£»¤£¬£¬Ê¹¹¥»÷Õß¿ÉÄܽ«ÆäÉ豸ע²áµ½×éÖ¯ÖС£´ËÍ⣬£¬¹È¸è»¹¹Û²ìµ½UNC6783É¢²¼Ðéα°²È«¸üÐÂÒÔ´«²¼Ô¶³Ì½Ó¼û¶ñÒâÈí¼þ¡£Ôڳɹ¦ÇÔÈ¡Ãô¸ÐÊý¾Ýºó£¬£¬¹¥»÷Õß»áͨ¹ýProtonMailµØÖ·ÁªÏµÊܺ¦ÕßË÷Òª²Æ²¯£¬£¬ÒԴ˽øÐÐÀÕË÷¡£


https://www.bleepingcomputer.com/news/security/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets/


5. CISA½«Ivanti EPMMÑÏÖØ·ì϶²ÎÓëÒÑÖªÀûÓÃĿ¼


4ÔÂ8ÈÕ£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Ivanti Endpoint Manager Mobile£¨EPMM£©Öз¢ÏÖµÄÒ»¸öÑÏÖØ·ì϶ÄÉÈëÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬£¬¸Ã·ì϶±àºÅΪCVE-2026-1340£¬£¬CVSSÆÀ·Ö¸ß´ï9.8¡£ÕâÒ»´úÂë×¢Èë·ì϶ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬ÇÒIvanti¹«Ë¾ÒÑÈ·Èϸ÷ì϶ĿǰÒѱ»¹¥»÷Õß»ý¼«ÀûÓ᣾ÝIvantiÅû¶£¬£¬ÔÚ·ì϶¹«¿ªÖ®Ê±Ö»Óм«ÉÙÊý¿Í»§Êܵ½Ó°Ï죬£¬µ«µÚÈý·½ÔÚ·ì϶Åû¶ºó²»¾Ã±ãÌṩÁ˸ÅÄîÑéÖ¤·¨Ê½£¬£¬´ó´óÔö³¤ÁËÕûÌå·çÏÕ¡£Îª´Ë£¬£¬Ivanti¶½´ÙËùÓпͻ§¾¡¿ìÀûÓò¹¶¡£¬£¬²¢°ä²¼ÁËÒ»¿îȫеÄRPM¼ì²â¹¤¾ß£¬£¬Ô®ÊÖ¿Í»§²é³­ÊÇ·ñ´æÔÚDZÔڵķì϶ÀûÓ᣸ù¤¾ßͨ¹ýɨÃèÒÑÖªÈëÇÖÖ¸±ê²¢ÌìÉú¹©°²È«ÍŶÓÉó²éµÄÈÕÖ¾£¬£¬¸¨ÖúÅжÏϵͳÊÇ·ñÒѱ»ÈëÇÖ¡£Æ¾¾ÝÓµÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁîBOD 22-01£¬£¬Áª°î»ú¹¹±ØÐëÔÚ2026Äê4ÔÂ11ÈÕ֮ǰʵÏָ÷ì϶µÄÐÞ¸´¹¤×÷£¬£¬ÒÔ± £»£»¤ÆäÍøÂçÃâÊÜÀûÓá£


https://securityaffairs.com/190519/security/u-s-cisa-adds-a-flaw-in-ivanti-epmm-to-its-known-exploited-vulnerabilities-catalog-2.html


6. ºÉÀ¼Ò½ÁÆÈí¼þ¹©¸øÉÌChipSoftÔâÀÕË÷¹¥»÷


4ÔÂ8ÈÕ£¬£¬ºÉÀ¼Ò½ÁƱ£½¡Èí¼þ¹©¸øÉÌChipSoft½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬£¬µ¼ÖÂÆäϵͳ̱»¾£¬£¬¹Ù·½ÍøÕ¾×Ô4ÔÂ7ÈÕÆð³ÖÐøå´»úÎÞ·¨½Ó¼û¡£¸Ã¹«Ë¾ÎªÒ½ÔºÌṩ»¼Õ߼ͼÈí¼þ£¬£¬·þÎñÁìÓò¸²¸ÇºÉÀ¼È«¹úÔ¼80%µÄÒ½ÁÆ»ú¹¹£¬£¬Õâ´Î¹¥»÷¶Ô±¾¹úÒ½ÁÆÏµÍ³Ôì³ÉÁË¿í·º³å»÷¡£º£º£ºÉÀ¼Ò½ÁƱ£½¡ÐÐÒµÍÆËã»úÓ¦¼±ÏìӦС×éZ-CERTÔÚÒ»·ÝÕ÷ѯ»ã±¨ÖÐ֤ʵÁËÕâ´Î¹¥»÷µÄÀÕË÷Èí¼þÐÔÖÊ£¬£¬²¢°µÊ¾ÕýÓëChipSoft¡¢Ò½ÁÆ»ú¹¹¼°ºÏ×÷ͬ°éά³ÖÁªÏµ£¬£¬ÖÂÁ¦ÆÀ¹ÀÊÂÎñµÄÓ°ÏìÁìÓò¡£Ö»¹ÜChipSoftÃæÏò¹«¼ÒµÄ·þÎñÊܵ½ÑÏÖØ×ÌÈÅ£¬£¬µ«´óÎÞÊýÒ½ÔºÈÔ¿ÉÄÜʹÓÃÆä»¼ÕßÃÅ»§ÍøÕ¾¡£ÓÉÓÚChipSoftÈí¼þµÄʹÓ÷½Ê½Òò¿Í»§¶øÒ죬£¬²¿ÃÅÒ½Ôº½«ÆäÓÃÓÚ¸üÈ«ÃæµÄ¼Í¼±£Áô£¬£¬ÊÜÓ°Ïìˮƽ¸üÉî¡£¾Ý±¾µØÐÂÎÅýÌåNOSµ÷²é£¬£¬¹²ÓÐ11¼ÒÒ½Ôº½«ÆäÈí¼þÏÂÏߣ¬£¬ÆäÖÐ9¼ÒÊǸÃÈí¼þʹÓýÏΪ¿í·ºµÄ»ú¹¹¡£Ä¿Ç°£¬£¬Õâ´Î¹¥»÷±³ºóµÄÀÕË÷×éÖ¯Éв»Ã÷È·¡£Õë¶Ô²»°²ÈëÇÖµÄÒ½ÔººÍÆäËûÒ½ÁƱ£½¡ºÏ×÷ͬ°é£¬£¬Z-CERT½¨ÒéÉóºËChipSoftϵͳÊÇ·ñ´æÔÚÒì³£Á÷Á¿£¬£¬²¢Í¨¹ýÆä»ã±¨ÈÈÏßÅû¶ÈκοÉÒÉÇé¿ö¡£


https://www.theregister.com/2026/04/08/chipsoft_ransomware/