SubstackÊý¾Ýй¶£º69ÍòÓû§ÐÅÏ¢ÔâÇÔ
Ðû²¼Ê±¼ä 2026-02-061. SubstackÊý¾Ýй¶£º69ÍòÓû§ÐÅÏ¢ÔâÇÔ
2ÔÂ5ÈÕ£¬£¬£¬ÐÂÎÅͨѶƽ̨SubstackÅû¶£¬£¬£¬ÆäϵͳÔÚ2025Äê10ÔÂÔâÓöÊý¾Ýй¶£¬£¬£¬¹¥»÷Õß²»·¨»á¼ûÁ˰üÀ¨µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°ÄÚ²¿ÔªÊý¾ÝÔÚÄÚµÄÓÐÏÞÓû§Êý¾Ý£¬£¬£¬µ«Î´»ñÊØÐÅÓÿ¨ºÅ¡¢ÃÜÂëµÈÃô¸Ð²ÆÎñÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÊÂÎñ±¬·¢ËĸöÔºó²Å±»·¢Ã÷£¬£¬£¬Ê×ϯִÐйٿËÀï˹¡¤±´Ë¹ÌØÔÚ֪ͨÖÐÇ¿µ÷ÒÑÐÞ¸´ÏµÍ³Îó²î£¬£¬£¬²¢ÖÒÑÔÓû§Ð¡ÐÄDZÔÚÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¾ÝÍþвÐÐΪÕßÔÚBreachForumsºÚ¿ÍÂÛ̳¹ûÕæµÄÐÅÏ¢£¬£¬£¬´Ë´ÎÐ¹Â¶Éæ¼°697,313ÌõÊý¾Ý¼Í¼£¬£¬£¬¹¥»÷Õ߳ơ°×¥È¡ÒªÁì±£´æÔëÉùÇÒÒÑ¿ìËÙÐÞ¸´¡±¡£¡£¡£¡£SubstackËäδÐû²¼ÊÜÓ°ÏìÓû§×ÜÊý£¬£¬£¬µ«ÈϿɱ£´æÊý¾Ýй¶Σº¦£¬£¬£¬²¢ºôÓõÓû§¶Ô¿ÉÒÉÓʼþ»ò¶ÌÐżá³Ö¸ß¶ÈСÐÄ¡£¡£¡£¡£¹«Ë¾ÌåÏÖÎÞÖ¤¾ÝÏÔʾ±»µÁÐÅÏ¢Òѱ»ÀÄÓ㬣¬£¬µ«ÒѽÓÄɲ½·¥ÔöǿϵͳÇå¾²¡£¡£¡£¡£Õâ²¢·ÇSubstackÊ״ηºÆðÊý¾ÝÇå¾²ÎÊÌâ¡£¡£¡£¡£2020Äê7Ô£¬£¬£¬¸Ãƽ̨ÔÚ·¢ËÍÒþ˽Õþ²ß¸üÐÂÓʼþʱ£¬£¬£¬Òò¹ýʧʹÓá°ÊÕ¼þÈË¡±×ֶζø·Ç¡°ÃÜËÍ¡±£¬£¬£¬µ¼Ö²¿·ÖÓû§ÓÊÏ䵨µã±»¹ûÕæÐ¹Â¶¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/newsletter-platform-substack-notifies-users-of-data-breach/
2. Î÷°àÑÀ¿ÆÑ§²¿ÒòÍøÂç¹¥»÷²¿·Ö¹Ø±ÕITϵͳ
2ÔÂ5ÈÕ£¬£¬£¬Î÷°àÑÀ¿ÆÑ§¡¢Á¢ÒìºÍ´óѧ²¿¿ËÈÕÐû²¼²¿·Ö¹Ø±ÕÆäITϵͳ£¬£¬£¬´Ë¾Ù½«Ó°Ïì¶à¸öÃæÏò¹«ÃñºÍÆóÒµµÄЧÀÍ¡£¡£¡£¡£×÷ΪÈÏÕæ¿ÆÑ§Õþ²ß¡¢Ñо¿¡¢Á¢Òì¼°¸ßµÈ½ÌÓýµÄÕþ¸®»ú¹¹£¬£¬£¬¸Ã²¿·Ö»¹Î¬»¤×Å´¦Öóͷ£Ñо¿Ö°Ô±¡¢´óѧºÍѧÉúÃô¸ÐÐÅÏ¢µÄÐÐÕþϵͳ¡£¡£¡£¡£´Ë´Î¹Ø±ÕÊǶÔÒ»Æð¡°ÊÖÒÕÊÂÎñ¡±µÄ»ØÓ¦£¬£¬£¬µ«¹Ù·½Î´Í¸Â¶¸ü¶àϸ½Ú¡£¡£¡£¡£¾ÝÍøÂç¹¥»÷Õß¡°¸êµÇ¡¤¸¥ÀïÂü¡±Éù³Æ£¬£¬£¬ÆäʹÓÃÑÏÖØµÄ¡°²»Çå¾²Ö±½Ó¹¤¾ßÒýÓã¨IDOR£©¡±Îó²îÈëÇÖÁ˸ò¿·Öϵͳ£¬£¬£¬²¢»ñµÃÁË¡°ÍêÈ«ÖÎÀíÔ±¼¶±ð»á¼ûȨÏÞ¡±¡£¡£¡£¡£¸Ã¹¥»÷ÕßÔÚµØÏÂÂÛ̳¶µÊ۾ݳƴÓÎ÷°àÑÀ¿ÆÑ§²¿ÇÔÈ¡µÄÊý¾Ý£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼Ò¼Í¼¡¢µç×ÓÓʼþµØµã¡¢ÈëѧÉêÇë¼°¹Ù·½Îļþ½ØÍ¼¡£¡£¡£¡£ÎªÖ¤ÊµÈëÇÖÊÂʵ£¬£¬£¬¹¥»÷Õß»¹Ðû²¼ÁËÊý¾ÝÑù±¾¡£¡£¡£¡£È»¶ø£¬£¬£¬Ïà¹ØÂÛ̳ÏÖÔÚÒÑÏÂÏߣ¬£¬£¬ÇÒÊý¾ÝÉÐδ·ºÆðÔÚÆäËûƽ̨¡£¡£¡£¡£Î÷°àÑÀ¿ÆÑ§²¿ÍøÕ¾Ö÷ҳͨ¸æÏÔʾ£¬£¬£¬ÓÉÓÚ¡°ÊÖÒÕʹʡ±£¬£¬£¬Æäµç×Ó×ܲ¿ÒѲ¿·Ö¹Ø±Õ£¬£¬£¬ËùÓÐÐÐÕþ³ÌÐòÔÝÍ££¬£¬£¬µ«»á°ü¹ÜÊÜÓ°ÏìÕßµÄȨÁ¦ºÍÕýµ±È¨Òæ¡£¡£¡£¡£Î÷°àÑÀýÌ屨µÀ³Æ£¬£¬£¬¸Ã²¿·Ö½²»°ÈËÒÑ֤ʵ´Ë´ÎITϵͳÖÐÖ¹ÓëÍøÂç¹¥»÷Óйء£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/spains-ministry-of-science-shuts-down-systems-after-breach-claims/
3. ÀÕË÷Èí¼þÀÄÓÃÕýµ±ÐéÄâÆ½Ì¨ÍйܶñÒâÔØºÉ
2ÔÂ5ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾SophosÔÚÊÓ²ì"WantToCry"ÀÕË÷Èí¼þ¹¥»÷ʱ·¢Ã÷£¬£¬£¬ÀÕË÷Èí¼þÔËÓªÕßÕý´ó¹æÄ£ÀÄÓÃÕýµ±ÐéÄâ»ù´¡ÉèÊ©ÖÎÀíÌṩÉÌISPsystemµÄÐéÄâ»ú£¨VM£©ÍйܺÍͶ·Å¶ñÒâÔØºÉ¡£¡£¡£¡£Ñо¿Ö°Ô±×¢Öص½£¬£¬£¬¹¥»÷ÕßʹÓõÄWindowsÐéÄâ»úÖ÷»úÃû¸ß¶ÈÒ»Ö£¬£¬£¬Ö¸ÏòISPsystemÆìÏÂVMmanagerƽ̨µÄĬÈÏÄ£°å£¬£¬£¬¸Ãƽ̨ΪÖ÷»úÍйÜЧÀÍÉÌÌṩÐéÄâЧÀÍÆ÷ÖÎÀí¹¦Ð§£¬£¬£¬Ö§³Ö¿ìËÙ°²ÅÅWindows»òLinuxÐéÄâ»ú¡£¡£¡£¡£½øÒ»³ÌÐò²éÏÔʾ£¬£¬£¬LockBit¡¢Qilin¡¢Conti¡¢BlackCat/ALPHVµÈ×ÅÃûÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬ÒÔ¼°RedLine¡¢LummarÐÅÏ¢ÇÔÈ¡³ÌÐò»î¶¯£¬£¬£¬¾ùÔÚÆä»ù´¡ÉèÊ©ÖÐʹÓÃÁËÏàͬµÄVMmanagerĬÈÏÖ÷»úÃû¡£¡£¡£¡£SophosÖ¸³ö£¬£¬£¬VMmanagerµÄĬÈÏWindowsÄ£°åÔÚÿ´Î°²ÅÅʱ»áÖØ¸´Ê¹ÓÃÏàͬÖ÷»úÃûºÍϵͳ±êʶ·û£¬£¬£¬ÕâÒ»Éè¼ÆÎó²î±»²¿·ÖÍйÜЧÀÍÉ̶ñÒâʹÓ㬣¬£¬ËûÃÇÃ÷Öª¿Í»§´ÓÊÂÍøÂç·¸·¨»î¶¯£¬£¬£¬ÈÔÌṩЧÀͲ¢ºöÊÓϼÜÇëÇ󣬣¬£¬½«¶ñÒâϵͳÒþ²ØÔÚ´ó×ÚÎÞº¦ÐéÄâ»úÖУ¬£¬£¬Ê¹ËÝÔ´ºÍɨ³ý±äµÃÄÑÌâ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-ispsystem-vms-for-stealthy-payload-delivery/
4. ÂÞÂíLa Sapienza´óѧÔâÀÕË÷Èí¼þ¹¥»÷ÖÂϵͳ̱»¾
2ÔÂ5ÈÕ£¬£¬£¬ÂÞÂíLa Sapienza´óѧ¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬ÆäITϵͳÔâÊÜÑÏÖØÆÆË𣬣¬£¬µ¼Ö½ÌÓý»ú¹¹ÔËÓª´ó¹æÄ£ÖÐÖ¹¡£¡£¡£¡£×÷ΪŷÖÞÔÚУѧÉúÈËÊý×î¶àµÄ´óѧ£¬£¬£¬¸ÃУӵÓÐÁè¼Ý112,500Ãû×¢²áѧÉú£¬£¬£¬´Ë´ÎÊÂÎñ¶ÔÆä½Ìѧ¡¢ÐÐÕþ¼°¿ÆÑлÔì³ÉÖØ´óÓ°Ïì¡£¡£¡£¡£¸ÃУ±¾ÖÜÔçЩʱ¼äÔÚÉ罻ýÌåÊ×´ÎÅû¶ÊÂÎñ£¬£¬£¬³ÆÆäIT»ù´¡ÉèÊ©¡°ÒѳÉÎªÍøÂç¹¥»÷µÄÄ¿µÄ¡±£¬£¬£¬²¢×÷ΪԤ·À²½·¥Á¬Ã¦¹Ø±ÕÍøÂçϵͳÒÔ°ü¹ÜÊý¾ÝÍêÕûÐÔºÍÇå¾²ÐÔ¡£¡£¡£¡£×èÖ¹·¢¸åʱ£¬£¬£¬´óÑ§ÍøÕ¾ÈÔÎÞ·¨»á¼û£¬£¬£¬Instagram×îÐÂ״̬ÏÔʾѧУÕýÈ«Á¦´Ó¹¥»÷Öлָ´£¬£¬£¬²¢ÉèÁ¢ÔÝʱ¡°ÐÅÏ¢µã¡±ÎªÑ§ÉúÌṩÎÞ·¨Í¨¹ýÊý×Öϵͳ»á¼ûµÄÐÅÏ¢¡£¡£¡£¡£¾ÝÒâ´óÀû¡¶ÍíÓʱ¨¡·±¨µÀ£¬£¬£¬´Ë´Î¹¥»÷ÓÉÇ×¶íÍþвÐÐΪÕßFemwar02ʵÑ飬£¬£¬ÏµÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÊý¾Ý¼ÓÃÜ¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÌØÕ÷ÓëBablock/RorschachÀàËÆ£¬£¬£¬×îÔç·ºÆðÓÚ2023Ä꣬£¬£¬ÒÔ¼ÓÃÜËÙÂʿ졢×Ô½ç˵ѡÏºñÖø³Æ£¬£¬£¬ÓÉй¶µÄBabuk¡¢LockBit v2.0ºÍDarkSide²¿·ÖÔ´´úÂë¹¹½¨¶ø³É¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃУÊÖÒÕÖ°Ô±ÕýÓëÒâ´óÀûÍøÂçÇå¾²ÊÂÎñÏìӦС×飨CSIRT£©¡¢¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ACN£©¼°ÓÊÕþ¾¯Ô±×¨¼ÒÏàÖú£¬£¬£¬´ÓδÊÜÓ°ÏìµÄ±¸·ÝÖлָ´ÏµÍ³¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/italian-university-la-sapienza-goes-offline-after-cyberattack/
5. ÂÞÂíÄáÑÇConpetʯÓ͹ܵÀÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷
2ÔÂ5ÈÕ£¬£¬£¬ÂÞÂíÄáÑǹú¼ÒʯÓ͹ܵÀÔËÓªÉÌConpet¿ËÈÕÅû¶£¬£¬£¬Öܶþ±¬·¢µÄÍøÂç¹¥»÷µ¼ÖÂÆäÆóÒµIT»ù´¡ÉèÊ©ÊÜËð¡¢ÍøÕ¾Ì±»¾£¬£¬£¬µ«½¹µãӪҵϵͳÈçSCADAºÍµçÐÅϵͳδÊÜÓ°Ï죬£¬£¬ÔÓͼ°ÆûÓÍÔËÊäµÈ½¹µãÔËÓªÈÔÕý³£ÔË×÷¡£¡£¡£¡£¸Ã¹«Ë¾ÔËÓª½ü4000¹«Àï¹ÜµÀÍøÂ磬£¬£¬ÏòÌìÏÂÁ¶Óͳ§¹©Ó¦ÔÓͼ°ÆäÑÜÉúÎ£¬£¬ÊÂÎñδÖÐÖ¹ÆäÌõÔ¼ÍÆÐÐÄÜÁ¦¡£¡£¡£¡£ConpetÔÚÖÜÈýÐÂΟåÖÐÌåÏÖ£¬£¬£¬ÕýÓë¹ú¼ÒÍøÂçÇå¾²»ú¹¹ÏàÖúÊÓ²ìÊÂÎñ²¢»Ö¸´ÏµÍ³£¬£¬£¬Í¬Ê±ÒÑÏòÓÐ×éÖ¯·¸·¨ºÍ¿Ö²ÀÖ÷ÒåÊÓ²ì¾Ö£¨DIICOT£©ÌáÆðÐÌÊÂËßËÏ¡£¡£¡£¡£Ö»¹ÜÔËÓªÊÖÒÕϵͳÇå¾²£¬£¬£¬µ«¹«Ë¾ÍøÕ¾www.conpet.roÈÔÎÞ·¨»á¼û£¬£¬£¬»Ö¸´Ê±¼ä䶨¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÍÅ»ïÒÑÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬²¢ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Öн«ConpetÁÐΪÊܺ¦Õß¡£¡£¡£¡£ÍþвÐÐΪÕßÐû³ÆÇÔÈ¡½ü1TBÎļþ£¬£¬£¬°üÀ¨²ÆÎñÐÅÏ¢¡¢»¤ÕÕɨÃè¼þµÈÄÚ²¿ÎļþÕÕÆ¬×÷Ϊ֤¾Ý¡£¡£¡£¡£ÈôÊý¾Ý±»½øÒ»²½Èö²¥»ò³öÊÛ£¬£¬£¬¿ÉÄÜÒý·¢¶þ´ÎÇ徲Σº¦¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/romanian-oil-pipeline-operator-conpet-discloses-cyberattack-qilin-ransomware/
6. SystemBC¶ñÒâÈí¼þ½©Ê¬ÍøÂç¾íÍÁÖØÀ´
2ÔÂ5ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Silent Push¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬SystemBC¶ñÒâÈí¼þ¼ÓÔØ³ÌÐòÔÚÖ´·¨²¿·Ö¡°ÖÕ¾ÖÐж¯¡±¹¥»÷ºóÈÔ´æÐø£¬£¬£¬²¢Òѽ«³¬10,000̨ÅÌËã»úÄÉÈë½©Ê¬ÍøÂç¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô2019ÄêÆð»îÔ¾£¬£¬£¬ÓÖÃûCoroxyºÍDroxiDat£¬£¬£¬ÒԳ䵱ºóÃÅ¡¢ÀÄÓÃÊÜѬȾ»úе¾ÙÐÐÁ÷Á¿ÊðÀí¼°Èö²¥ÀÕË÷Èí¼þµÈ¶ñÒâÔØºÉÖøÃû£¬£¬£¬ÔøÓÚ2024Äê5Ô³ÉΪ¹ú¼ÊÖ´·¨²¿·ÖÖØµã¹¥»÷Ä¿µÄ¡£¡£¡£¡£Ö»¹ÜÖ´·¨²¿·Öе÷Ðж¯£¬£¬£¬µ«SystemBC¿ª·¢ÕßÈÔÔÚ¶íÓïµØÏÂÂÛ̳Ðû²¼¸üÐÂÐÅÏ¢£¬£¬£¬½©Ê¬ÍøÂç»î¶¯Î´×èÖ¹¡£¡£¡£¡£Ä¿½ñ³¬1Íò¸öIPµØµã¹ØÁªSystemBCÁ÷Á¿£¬£¬£¬ÆäÖÐÃÀ¹úÕ¼±È×î¸ß£¨4300¸ö£©£¬£¬£¬µÂ¹ú£¨829¸ö£©¡¢·¨¹ú£¨448¸ö£©¡¢ÐÂ¼ÓÆÂ£¨419¸ö£©ºÍÓ¡¶È£¨294¸ö£©Òà·¢Ã÷´ó×ÚÊܺ¦Õß¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔÍйÜЧÀÍÌṩÉÌ£¬£¬£¬²¼»ùÄÉ·¨Ë÷ºÍÔ½ÄϹٷ½ÓòÃûÍйܵÄIPµØµãÖУ¬£¬£¬SystemBCѬȾÃܶÈÏÔÖø¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬SystemBC½ÓÄÉÂÖ»»¼Ü¹¹£¬£¬£¬¿Í»§¶ËÅþÁ¬Ì»Â¶ÓÚ»¥ÁªÍøµÄC&CЧÀÍÆ÷£¬£¬£¬Í¨¹ýÊÜѬȾÖ÷»úÊðÀíÁ÷Á¿£¬£¬£¬½«»úеת»¯ÎªSOCKS5ÊðÀíÒÔÒþ²Ø¶ñÒâ»ù´¡ÉèÊ©²¢»ñÈ¡¾¼ÃÀûÒæ¡£¡£¡£¡£
https://www.securityweek.com/systembc-infects-10000-devices-after-defying-law-enforcement-takedown/


¾©¹«Íø°²±¸11010802024551ºÅ