ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬³¬4.7Íò»áÔ±ÐÅϢй¶

Ðû²¼Ê±¼ä 2026-01-26

1. ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬³¬4.7Íò»áÔ±ÐÅϢй¶


1ÔÂ21ÈÕ£¬£¬ £¬£¬£¬Å¦Ô¼Öݹ«ÎñÔ±¹¤»áϵͳ2025Äê5ÔÂ3ÈÕÖÁ31ÈÕÔâ¶ñÒâ¹¥»÷ÕßÇÖÈ벢DZÔÚ½üÒ»¸öÔ£¬£¬ £¬£¬£¬µ¼Ö³¬4.7ÍòÃû»áԱСÎÒ˽¼ÒÐÅϢй¶¡£¡£ ¡£¡£¸Ã¹¤»á×÷ΪÃÀ¹ú×î´óµÄ¹«¹²²¿·Ö¹ÍÔ±¹¤»á¡ª¡ªÖÝ¡¢ÏØ¡¢ÊйÍÔ±ÁªºÏ»áµÄ½¹µã³ÉÔ±µ¥Î»£¬£¬ £¬£¬£¬´ú±íÔ¼30ÍòÃûÖݼ°µØ·½Õþ¸®¹ÍÔ±ÀûÒæ£¬£¬ £¬£¬£¬´Ë´ÎÊÂÎñÒý·¢È«ÃÀÀ͹¤×éÖ¯ÍøÂçÇå¾²¹Ø×¢¡£¡£ ¡£¡£¾Ý¹¤»áÏò»áÔ±·¢Ë͵Ä֪ͨº¯Åû¶£¬£¬ £¬£¬£¬¹¥»÷ÕßÔÚϵͳÄÚÒ»Á¬»î¶¯Ê±´ú£¬£¬ £¬£¬£¬¿ÉÄÜ»ñÈ¡ÁË»áÔ±ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£ ¡£¡£¹¤»áÓÚ5ÔÂÏÂÑ®·¢Ã÷δÊÚȨ»á¼ûºó£¬£¬ £¬£¬£¬Á¬Ã¦Æô¶¯ÊӲ첢½ÓÄÉÏÂÏßϵͳ¡¢ÖØÖÃÃÜÂë¡¢°²ÅŸ߼¶Çå¾²¼ì²âÈí¼þµÈ²½·¥¡£¡£ ¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»ÓÃÓÚڲƭ»òÉí·ÝµÁÓõÄÖ±½ÓÖ¤¾Ý£¬£¬ £¬£¬£¬µ«Éç»á°ü¹ÜºÅÂëµÄÖÕÉíΨһÐÔʹÆä³ÉΪºã¾ÃÍøÂçÇå¾²Òþ»¼£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÐÅÏ¢¿ªÉèÐéαÐÅ´ûÕË»§¡¢Ìá½»ÄÉ˰É걨µ¥»òÉêÁ츣Àû½òÌù£¬£¬ £¬£¬£¬¸øÊܺ¦Õß´øÀ´Ò»Á¬Î£º¦¡£¡£ ¡£¡£¹¤»áÒÑÓë¶¥¼âÍøÂçÇå¾²¼°Òþ˽± £»£»£»£»¤»ú¹¹ÏàÖú¿ªÕ¹ÊÓ²ìÓëÓ¦¼±´¦Öóͷ££¬£¬ £¬£¬£¬²¢È·ÈÏÉæÊÂÊý¾Ý¹æÄ£ºóʵʱ֪ͨÊÜÓ°Ïì»áÔ±¡£¡£ ¡£¡£¹Ù·½½¨ÒéÊÜÓ°ÏìÖ°Ô±°´ÆÚÉó²éÐÅÓñ¨¸æ¡¢ºË¶ÔÕË»§Õ˵¥Ã÷ϸ£¬£¬ £¬£¬£¬Ç×½ü×¢ÖØ¿ÉÒɻ¡£¡£ ¡£¡£


https://cybernews.com/security/new-york-csea-union-data-breach/


2. º«¹úÖÆÒ©¾ÞÍ·³¬800ÍòÌõÄÚ²¿ÐÅÏ¢¼°Ô±¹¤µµ°¸Ôâй¶


1ÔÂ21ÈÕ£¬£¬ £¬£¬£¬º«¹ú×ÅÃûÒ©ÆóBoryungÖÆÒ©¿ËÈÕ±¬·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬Æä̻¶µÄMongoDBÊý¾Ý¿âÒòÎÞÈκÎÊÚȨ·À»¤£¬£¬ £¬£¬£¬µ¼Ö³¬800ÍòÌõÄÚ²¿Í¨Ñ¶¼Í¼¼°½ü3500·ÝÔ±¹¤µµ°¸Íâй¡£¡£ ¡£¡£¸ÃÊý¾Ý¿âÓÉÆóÒµ¼¶Í¨Ñ¶¹¤¾ßGW¼´Ê±Í¨Ñ¶Èí¼þʹÓ㬣¬ £¬£¬£¬Ö±½ÓÃæÏò¹«¹²»¥ÁªÍø¿ª·ÅÍêÕû¶ÁȡȨÏÞ£¬£¬ £¬£¬£¬Èκη¢Ã÷Õß¾ù¿ÉÎÞ×è°­»á¼û¡£¡£ ¡£¡£Ð¹Â¶Êý¾Ý·ÖΪÈý´óÀࣺһÊÇÔ±¹¤Éí·ÝÊý¾Ý£¬£¬ £¬£¬£¬°üÀ¨È«Ãû¡¢ÆóÒµÓÊÏä¡¢Óû§Ãû¡¢¹þÏ£¼ÓÃÜÃÜÂë¼°×°±¸ÔªÊý¾Ý£¬£¬ £¬£¬£¬¹¥»÷Õ߿ɽè´ËʵÑéÉí·ÝµÁÓûòÉç»á¹¤³Ìѧ¹¥»÷£¬£¬ £¬£¬£¬ÉõÖÁͨ¹ýÀëÏßÆÆ½âÆÆÒëÃÜÂëºóÌᳫײ¿â¹¥»÷ £»£»£»£»¶þÊÇÄÚ²¿Í¨Ñ¶¼Í¼£¬£¬ £¬£¬£¬º­¸Ç800ÍòÌõÉæ¼°ÉÌҵǢ̸¡¢ÈËÁ¦×ÊÔ´¡¢²ÆÎñ¡¢ÏîÄ¿ÖÎÀí¼°Ô±¹¤Ë½È˶Ի°µÄ̸Ìì¼Í¼£¬£¬ £¬£¬£¬ÆäÖаüÀ¨µÄÄÚ²¿Á´½Ó¡¢IPµØµã¡¢Ñз¢¶¯Ì¬µÈÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬¿ÉÄܱ»ÓÃÓÚÏµÍ³ÉøÍ¸»òαװԱ¹¤Éí·Ý £»£»£»£»ÈýÊÇϵͳԪÊý¾Ý£¬£¬ £¬£¬£¬Èçʱ¼ä´Á¡¢ÐÂÎÅÇþµÀ¡¢Óû§-ÇþµÀ¶ÔÓ¦¹ØÏµµÈ£¬£¬ £¬£¬£¬¿É¸¨Öú¹¥»÷Õß¹¹½¨¹¥»÷·¾¶¡£¡£ ¡£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬ £¬£¬£¬´ËÀàй¶¿ÉÄÜÒý·¢Á¬ËøÎ£º¦£º¹¥»÷Õß¿Éͨ¹ý̸Ìì¼Í¼ÖеÄϸ½Ú»ñÊØÐÅÈΣ¬£¬ £¬£¬£¬ÊµÑ龫׼թƭ £»£»£»£»»òʹÓÃÆÆ½âµÄÃÜÂëÈëÇÖÆóҵϵͳ£¬£¬ £¬£¬£¬ÇÔÈ¡¸ü¶àÉÌÒµÉñÃØ¡£¡£ ¡£¡£Ö»¹ÜBoryungÉÐδ»ØÓ¦£¬£¬ £¬£¬£¬µ«Ì»Â¶Êý¾Ý¿âÒѱ»¹Ø±Õ¡£¡£ ¡£¡£


https://cybernews.com/security/boryung-corporation-leaks-internal-messages/


3. ɳ³æ×éÖ¯¹¥»÷²¨À¼ÄÜÔ´ÉèÊ©£¬£¬ £¬£¬£¬°²ÅÅÐÂÐÍÊý¾Ý²Á³ýÈí¼þ


1ÔÂ24ÈÕ£¬£¬ £¬£¬£¬²¨À¼µçÍø2025Äê12ÔÂÏÂÑ®ÔâÓöÓë¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯¡°É³³æ¡±£¨Sandworm£©Ïà¹ØµÄÍøÂç¹¥»÷£¬£¬ £¬£¬£¬¸Ã×éÖ¯ÊÔͼ°²ÅÅÃûΪ¡°DynoWiper¡±µÄÐÂÐÍÆÆËðÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þ¡£¡£ ¡£¡£¾ÝÇå¾²¹«Ë¾ESET֤ʵ£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÓÚ12ÔÂ29ÈÕÖÁ30ÈÕ£¬£¬ £¬£¬£¬Ä¿µÄÖ±Ö¸²¨À¼Á½×ùÈȵçÁª²ú³§¼°¿ÉÔÙÉúÄÜÔ´·¢µçÖÎÀíϵͳ£¨°üÀ¨·çÁ¦ÎÐÂÖ»úºÍ¹â·üµçÕ¾£©¡£¡£ ¡£¡£²¨À¼×ÜÀíÌÆÄɵ¡¤Í¼Ë¹¿ËÔÚÐÂÎÅÐû²¼»áÉÏÃ÷È·Ö¸³ö£¬£¬ £¬£¬£¬Ï®»÷ÓÉÓë¶íÂÞ˹Ç鱨²¿·ÖÖ±½Ó¹ØÁªµÄ×éÖ¯²ß»®¡£¡£ ¡£¡£¡°É³³æ¡±£¨ÓÖÃûUAC-0113¡¢APT44¡¢Seashell Blizzard£©ÊǶíÂÞ˹×ÜÕÕÁϲ¿Ç鱨×ܾ֣¨GRU£©ÏÂÊô74455¾üʵ¥Î»µÄÒ»²¿·Ö£¬£¬ £¬£¬£¬×Ô2009ÄêÆð»îÔ¾£¬£¬ £¬£¬£¬ÒÔʵÑ鯯ËðÐÔ¹¥»÷ÖøÃû¡£¡£ ¡£¡£ÆäÀúÊ·Õ½¼¨°üÀ¨2015Äê¶ÔÎÚ¿ËÀ¼µçÍøµÄ¹¥»÷£¬£¬ £¬£¬£¬µ¼ÖÂÔ¼23ÍòÈ˶ϵ硣¡£ ¡£¡£±¾´Î¹¥»÷ÖÐʹÓõÄDynoWiper¶ñÒâÈí¼þ»á±éÀúÎļþϵͳɾ³ýÎļþ£¬£¬ £¬£¬£¬µ¼Ö²Ù×÷ϵͳ̱»¾£¬£¬ £¬£¬£¬Ðèͨ¹ý±¸·ÝÖØÐÞ»òÖØÐÂ×°Öᣡ£ ¡£¡£ESET½«Æä¼ì²âΪWin32/KillFiles.NMO£¬£¬ £¬£¬£¬²¢Ðû²¼ÆäSHA-1¹þÏ£Öµ¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/


4. Call-On-DocÊý¾Ýй¶£¬£¬ £¬£¬£¬Ó°ÏìÁè¼Ý100ÍòÃû»¼Õß


1ÔÂ24ÈÕ£¬£¬ £¬£¬£¬Ô¶³ÌÒ½ÁÆÐ§ÀÍÌṩÉÌCall-On-DocÐû³ÆÓµÓÐ200Íò»îÔ¾Óû§£¬£¬ £¬£¬£¬¿ÉÖÎÁÆ150ÓàÖÖ¼²²¡£¬£¬ £¬£¬£¬²¢ÔÊÐí½ÓÄÉ¡°×îÏȽø¡±Êý¾ÝÇå¾²²½·¥¼°ÍêÈ«ÇкÏHIPAA±ê×¼¡£¡£ ¡£¡£È»¶ø£¬£¬ £¬£¬£¬ºÚ¿ÍÂÛ̳Åû¶Æä12Ô³õÔâÈëÇÖ£¬£¬ £¬£¬£¬1,144,223Ìõ»¼Õ߼ͼ±»ÇÔ£¬£¬ £¬£¬£¬Éæ¼°»¼Õß´úÂë¡¢ÉúÒâ±àºÅ¡¢ÐÕÃû¡¢µØµã¡¢µç»°¡¢ÓÊÏä¡¢Ò½ÁÆÖÖ±ð¡¢Ïêϸ²¡Ö¢¡¢´¦·½¼°Ö§¸¶½ð¶îµÈÃô¸ÐÐÅÏ¢¡£¡£ ¡£¡£ºÚ¿ÍÌṩÈýÕŰüÀ¨ÊýÊ®Ãû»¼ÕßÐÅÏ¢µÄ½ØÍ¼¼°1000ÌõÑù±¾Îļþ£¬£¬ £¬£¬£¬¾­ºË²é²¿·Ö»¼ÕߵصãÈÔÓÐÓ㬣¬ £¬£¬£¬ÇÒÂô¼Ò½ÓÊܵÚÈý·½ÍйÜÉúÒ⣬£¬ £¬£¬£¬Êý¾ÝÕæÊµÐԽϸߡ£¡£ ¡£¡£´Ë´ÎÊÂÎñÒý·¢¶àÖØÕùÒé¡£¡£ ¡£¡£Call-On-Doc½ÓÄÉ×Ô·Ñģʽ£¬£¬ £¬£¬£¬²»´æ´¢°ü¹ÜÐÅÏ¢»òÉç±£ºÅ£¬£¬ £¬£¬£¬ÆäHIPAAºÏ¹æÐÔ´æÒÉ£¬£¬ £¬£¬£¬Èô½öͨ¹ýµç×Ó´«Êä¾ÙÐÐÊܱ £»£»£»£»¤ÉúÒâÔò¿ÉÄÜÊÜî¿Ïµ£¬£¬ £¬£¬£¬²»È»ÈÔÊÜÖÝÖ´·¨¼°FTCÔ¼Êø¡£¡£ ¡£¡£Èô±£´æ¡°ÔÊÐí׿ԽÇ徲ȴδ¶ÒÏÖ¡±µÄÓÕÆ­ÐÐΪ£¬£¬ £¬£¬£¬FTC¿ÉÒÀ¾Ý¡¶Áª°îÉÌҵίԱ»á·¨¡·ÊӲ졣¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬Call-On-DocÍøÕ¾FAQÉù³ÆÆäEHRϵͳ¡°ÍêÈ«ÇкÏHIPAA¡±£¬£¬ £¬£¬£¬µ«¹¥»÷Õß³ÆÎ´·¢Ã÷¼ÓÃÜÖ¤¾Ý£¬£¬ £¬£¬£¬ÇÒ¹¥»÷ʱ´ú»ú¹¹Î´²ì¾õ¡£¡£ ¡£¡£


https://databreaches.net/2026/01/24/call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment/?pk_campaign=feed&pk_kwd=call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment


5. ShinyHuntersÀÕË÷ÍÅ»ïÌᳫSSOÓïÒô´¹ÂÚ¹¥»÷


1ÔÂ23ÈÕ£¬£¬ £¬£¬£¬ShinyHuntersÀÕË÷ÍÅ»ï¿ËÈÕÐû³Æ£¬£¬ £¬£¬£¬Õý¶ÔOkta¡¢Î¢Èí¼°¹È¸èµÄµ¥µãµÇ¼£¨SSO£©ÕË»§ÌᳫһÁ¬ÓïÒôÍøÂç´¹ÂÚ¹¥»÷£¬£¬ £¬£¬£¬ÒÔÇÔÈ¡ÆóÒµÊý¾Ý²¢ÊµÑéÀÕË÷¡£¡£ ¡£¡£¹¥»÷ÖУ¬£¬ £¬£¬£¬ÍþвÐÐΪÕßð³äITÖ§³ÖÖ°Ô±£¬£¬ £¬£¬£¬Í¨¹ýµç»°ÓÕÆ­Ô±¹¤ÔÚÄ£Ä⹫˾µÇ¼ÃÅ»§µÄ´¹ÂÚÍøÕ¾ÊäÈëÆ¾Ö¤ºÍ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©´úÂë¡£¡£ ¡£¡£Ò»µ©¹¥ÆÆÏµÍ³£¬£¬ £¬£¬£¬¹¥»÷Õ߿ɻá¼ûÊܺ¦ÕßSSOÕË»§£¬£¬ £¬£¬£¬½ø¶øÅþÁ¬µ½ÆäËûÆóÒµÓ¦ÓÃÈçSalesforce¡¢Microsoft 365¡¢Google Workspace¡¢DropboxµÈ£¬£¬ £¬£¬£¬ÕâЩƽ̨ͨ¹ýSSO¿ØÖÆÃæ°å¼¯³É£¬£¬ £¬£¬£¬³ÉΪ½øÈëÆóҵϵͳºÍÊý¾ÝµÄÈë¿Ú¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃÉç»á¹¤³ÌÊֶΣ¬£¬ £¬£¬£¬ÔÚͨ»°ÖÐʵʱָµ¼Êܺ¦ÕßÍê³ÉµÇ¼ºÍMFAÑéÖ¤£¬£¬ £¬£¬£¬ÉõÖÁ¶¯Ì¬µ÷½â´¹ÂÚÍøÕ¾ÄÚÈÝÒÔÆ¥ÅäÕæÊµÐ§À͵ÄÑéÖ¤°ì·¨¡£¡£ ¡£¡£OktaÒÑÐû²¼±¨¸æ£¬£¬ £¬£¬£¬ÐÎòÁ˹¥»÷ÖÐʹÓõĴ¹ÂÚ¹¤¾ß°ü£¬£¬ £¬£¬£¬°üÀ¨»ùÓÚWebµÄ¿ØÖÆÃæ°å£¬£¬ £¬£¬£¬¿Éʵʱ¸Ä±äÊܺ¦Õß¿´µ½µÄÒ³ÃæÄÚÈÝ£¬£¬ £¬£¬£¬¸¨ÖúÍê³ÉÑéÖ¤Àú³Ì¡£¡£ ¡£¡£ShinyHunters֤ʵ¶Ô²¿·Ö¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬³ÆSalesforceΪÖ÷ҪĿµÄ£¬£¬ £¬£¬£¬ÆäËû¹«Ë¾Îª¡°ÊÜÒæÕß¡±£¬£¬ £¬£¬£¬²¢Ê¹ÓôËǰÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄµç»°ºÅÂ롢ְλÐÅÏ¢µÈÔöǿթƭ¿ÉÐŶȡ£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/


6. Under ArmourÔâEverestÀÕË÷Èí¼þ¹¥»÷


1ÔÂ23ÈÕ£¬£¬ £¬£¬£¬ÃÀ¹úÔ˶¯ÒÂÊξÞÍ·Under ArmourÕýÊÓ²ìÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬Éæ¼°7200ÍòÌõ¿Í»§¼Í¼±»¹ûÕæÖÁºÚ¿ÍÂÛ̳¡£¡£ ¡£¡£¾Ý±¨µÀ£¬£¬ £¬£¬£¬¸ÃÊÂÎñÓëEverestÀÕË÷Èí¼þÍÅ»ï2025Äê11ÔÂÌᳫµÄ¹¥»÷Ïà¹Ø£¬£¬ £¬£¬£¬ºóÕßÔøÉù³ÆÇÔÈ¡343GBÊý¾Ý²¢ÊÔͼÀÕË÷Êê½ð¡£¡£ ¡£¡£2026Äê1Ô£¬£¬ £¬£¬£¬¿Í»§Êý¾ÝÔÚÈÈÃźڿÍÂÛ̳й¶£¬£¬ £¬£¬£¬°üÀ¨7200Íò¸öµç×ÓÓʼþµØµã¼°ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢵ØÀíλÖᢹºÖüͼµÈÃô¸ÐÐÅÏ¢¡£¡£ ¡£¡£×ÅÃûÊý¾Ýй¶׷×ÙÆ½Ì¨Have I Been Pwned֤ʵ£¬£¬ £¬£¬£¬´Ë´Îй¶µÄÑù±¾Êý¾Ý°üÀ¨Êý°ÙÍòÌõUnder ArmourÖ÷¹Ë¹ºÖüͼ¼°Ô±¹¤µç×ÓÓʼþµØµã£¬£¬ £¬£¬£¬Óë¸Ãƽ̨´Ëǰ±¨¸æÒ»Ö¡£¡£ ¡£¡£Ð¹Â¶Êý¾Ýͨ¹ýºÚ¿ÍÂÛ̳¹ûÕæºó£¬£¬ £¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢£¬£¬ £¬£¬£¬ÊÜÓ°ÏìÓû§ÒÑͨ¹ý¸Ãƽ̨ÊÕµ½Í¨Öª¡£¡£ ¡£¡£Under Armour»ØÓ¦³Æ£¬£¬ £¬£¬£¬¹«Ë¾ÕýÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÊÓ²ìÖ¸¿Ø£¬£¬ £¬£¬£¬²¢Ç¿µ÷Ö§¸¶ÏµÍ³¼°Óû§ÃÜÂëδÊÜÓ°Ïì¡£¡£ ¡£¡£¸Ã¹«Ë¾·ñ¶¨¡°ÊýÍòÍòÌõÃô¸Ð¼Í¼Ôâй¶¡±µÄ˵·¨£¬£¬ £¬£¬£¬½öÈϿɡ°ÉÙÉÙÊý¿Í»§Ãô¸ÐÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡±£¬£¬ £¬£¬£¬µ«Î´Ã÷È·ÏêϸÊýÄ¿¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬¹«Ë¾Î´Åû¶¹¥»÷Èë¿Úµã»òÏêϸй¶Ե¹ÊÔ­ÓÉ£¬£¬ £¬£¬£¬Ò²Î´ËµÃ÷ÊÇ·ñÊÕµ½ÀÕË÷Êê½ðÒªÇ󡣡£ ¡£¡£


https://securityaffairs.com/187229/data-breach/investigation-underway-after-72m-under-armour-records-surface-online.html