¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶

Ðû²¼Ê±¼ä 2026-03-13

1. ¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶


3ÔÂ12ÈÕ£¬£¬£¬¼ÓÄôó×î´óʳÎïÒ©Æ·ÁãÊÛÉÌLoblaw Companies Limited£¨¼ò³ÆLoblaw£©¿ËÈÕÔâÓöÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¸Ã¹«Ë¾Ðû²¼£¬£¬£¬ºÚ¿ÍÈëÇÖÆä²¿·ÖITÍøÂç²¢»ñÈ¡Á˿ͻ§µÄ»ù×Ô¼º·ÝÐÅÏ¢£¨PII£©£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØµã¡£¡£¡£Loblaw×÷Ϊ¼ÓÄôóÁãÊÛÒµ¾ÞÍ·£¬£¬£¬ÔÚÌìÏÂÓµÓÐ2500¼ÒÃŵ꣬£¬£¬º­¸ÇÌØÐíı»®³¬ÊС¢Ò©µê¡¢ÒøÐÐ×ÔÖúЧÀÍͤºÍ´ò°çµêµÈҵ̬£¬£¬£¬²¢ÍýÏëÔÚ2026ÄêÐÂÔö70¼ÒÃŵ꣬£¬£¬×÷ΪÆäµ½2030ÄêͶ×Ê100ÒÚÃÀÔªÎåÄêÍýÏëµÄÒ»²¿·Ö¡£¡£¡£¹«Ë¾ÏÖÓµÓÐ22ÍòÃûÔ±¹¤£¬£¬£¬ÄêÊÕÈë¸ß´ï450ÒÚÃÀÔª¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚ±¾ÖÜÔçЩʱ¼ä£¬£¬£¬Loblaw¼ì²âµ½ÆäITÍøÂçÖÐÒ»¸ö·ÇÒªº¦¹Ø±ÕÇøÓò±£´æ¿ÉÒɻ£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏ£¬£¬£¬·¸·¨µÚÈý·½ÒÑ»á¼ûÁ˲¿·Ö¿Í»§µÄ»ù±¾ÐÅÏ¢¡£¡£¡£Ö»¹Üй¶Êý¾Ý²»°üÀ¨ÐÅÓÿ¨ÏêÇé¡¢¿µ½¡ÐÅÏ¢»òÕË»§ÃÜÂëµÈÃô¸Ð²ÆÎñÐÅÏ¢£¬£¬£¬µ«LoblawÈÔ³öÓÚÉóÉ÷˼Á¿£¬£¬£¬×Ô¶¯×¢ÏúÁËËùÓпͻ§µÄÕË»§£¬£¬£¬ÒªÇó»á¼ûÊý×ÖЧÀ͵ÄÓû§ÖØÐµÇ¼²¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬Æä½ðÈÚЧÀÍÆ·ÅÆPC FinancialδÊÜ´Ë´ÎÊÂÎñÓ°Ïì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/


2. Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÔâAiLockÀÕË÷Èí¼þ¹¥»÷


3ÔÂ12ÈÕ£¬£¬£¬Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÕýÊÓ²ìÒ»ÆðDZÔÚÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ÒòÓÉÊÇAiLockÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÐ¹Â¶Æ½Ì¨½«ÆäÁÐΪÊܺ¦Õß¡£¡£¡£¾Ý³Æ£¬£¬£¬¸ÃÍÅ»ïÇÔÈ¡ÁËЭ»á129GBÊý¾Ý£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÎļþ¡£¡£¡£Ð­»áÒÑÁªºÏÄÚ²¿ÍŶÓÓëÍⲿר¼ÒÕö¿ªÊӲ죬£¬£¬²¢Ç¿µ÷¡°Êý¾ÝÇå¾²ÊÇÄ¿½ñÖ÷ҪʹÃü¡±£¬£¬£¬ÏÖÔÚÕýÓëÖ´·¨²¿·ÖÏàÖúÒÔÀåÇåÊÂÎñÕæÏà¡£¡£¡£Ð­»á½²»°ÈËÌåÏÖ£¬£¬£¬ÒÑ×¢ÖØµ½ÍþвÐÐΪÕßÐû²¼µÄ¡°ÈÏÁ족Ìû×Ó£¬£¬£¬µ«ÒòÊÓ²ìÈÔÔÚ¾ÙÐУ¬£¬£¬ÔÝÎÞ·¨Åû¶Ïêϸϸ½Ú¡£¡£¡£×÷ΪӢ¹úÇú¹÷ÇòÔ˶¯µÄ½¹µãÖÎÀí»ú¹¹£¬£¬£¬Ð­»áÁýÕÖÌìÏÂ800Óà¼Ò¾ãÀÖ²¿¡¢15Íò×¢²áÇòÔ±¼°1.5ÍòÃû½ÌÁ·¡¢²ÃÅк͹ÙÔ±£¬£¬£¬ÔËÓª²ã¼¶´Óϲ㵽¾«Ó¢¹ú¼Ò¶Ó¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄÜÓ°Ïì»áÔ±Òþ˽Êý¾Ý£¬£¬£¬Ð­»áºôÓõÇòԱСÐÄÒì³£ÕË»§»î¶¯¼°ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬ÉóÉ÷´¦Öóͷ£Î´ÂÄÀúÖ¤µÄͨѶ¡£¡£¡£Ö»¹ÜЭ»áÉÐδ֤ʵÊý¾ÝÏÖʵй¶£¬£¬£¬µ«ÒѽÓÄÉÔ¤·À²½·¥£¬£¬£¬°üÀ¨×Ô¶¯×¢ÏúËùÓÐÊý×ÖЧÀÍÕË»§²¢ÒªÇóÓû§ÖØÐµÇ¼¡¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£


https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/


3. ÐÂÐÍAIÌìÉú¶ñÒâÈí¼þSlopolyÇ¿»¯ÀÕË÷¹¥»÷Á´


3ÔÂ12ÈÕ£¬£¬£¬IBM X-ForceÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪSlopolyµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬¼«¿ÉÄÜÓÉÌìÉúʽÈ˹¤ÖÇÄܹ¤¾ß½¨É裬£¬£¬ÆäÊÖÒÕÌØÕ÷°üÀ¨´ó×Ú´úÂë×¢ÊÍ¡¢½á¹¹»¯ÈÕÖ¾¼Í¼¡¢¹ýʧ´¦Öóͷ£¼°ÇåÎú±äÁ¿ÃüÃû£¬£¬£¬ÕâЩÔÚÈËÀà±àд¶ñÒâÈí¼þÖÐÓÐÊý¡£¡£¡£¸ÃÈí¼þ×÷ΪPowerShell¾ç±¾ºóÃÅ£¬£¬£¬ÔÚInterlockÀÕË÷Èí¼þ¹¥»÷ÖÐÊÎÑÝC2¿Í»§¶Ë½ÇÉ«£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾЧÀÍÆ÷DZÔÚ³¬Ò»ÖÜ£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢Î¬³Ö³¤ÆÚ»á¼û¡£¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³ÌȦÌ×£¬£¬£¬ºóÆÚ°²ÅÅSlopoly¡£¡£¡£IBMÆÊÎöÖ¸³ö£¬£¬£¬¾ç±¾Ëä×Ô³Æ"¶à̬C2³¤ÆÚ»¯¿Í»§¶Ë"£¬£¬£¬µ«ÏÖʵȱ·¦Ö´ÐÐÆÚ´úÂë×ÔÐÞ¸ÄÄÜÁ¦£¬£¬£¬½öͨ¹ýÌìÉúËæ»úÉèÖÃÖµºÍº¯ÊýÃû³ÆÊµÏÖα¶à̬¡£¡£¡£Æä°²ÅÅÓÚC:\ProgramData\Microsoft\Windows\Runtime\£¬£¬£¬½¹µã¹¦Ð§°üÀ¨£ºÃ¿30Ãë·¢ËÍÐÄÌøÐűêÖÁ/api/commands£¬£¬£¬Ã¿50ÃëÂÖѯÏÂÁ£¬£¬Í¨¹ýcmd.exeÖ´ÐÐÖ¸Áî²¢»Ø´«Ð§¹û£¬£¬£¬Î¬»¤persistence.logÈÕÖ¾£¬£¬£¬Í¨¹ý"ÔËÐÐʱÊðÀí"ÍýÏëʹÃü½¨É賤ÆÚÐÔ¡£¡£¡£Ö§³ÖÏÂÁ¸ÇÏÂÔØÖ´ÐÐEXE/DLL/JSÓÐÓÃÔØºÉ¡¢ÔËÐÐshellÏÂÁî¡¢µ÷½âÐűê¾àÀë¡¢×Ô¸üм°Í˳öÀú³Ì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/


4. ÃÀÅ·´Ý»ÙÒÀÀµAVReconµÄSocksEscort·¸·¨ÊðÀíÍøÂç


3ÔÂ12ÈÕ£¬£¬£¬ÃÀ¹ú˾·¨²¿ÁªºÏÅ·ÖÞ¶à¹úÖ´·¨»ú¹¹¼°Ë½ÈËÏàÖúͬ°éBlack Lotus Labs£¬£¬£¬ÀֳɯÆËðÁËÔËӪʮÓàÄêµÄSocksEscortÍøÂç·¸·¨ÊðÀíÍøÂç¡£¡£¡£¸ÃÍøÂçÍêÈ«ÒÀÀµAVRecon Linux¶ñÒâÈí¼þÈëÇÖ±ßÑØ×°±¸£¬£¬£¬Í¨¹ý¡°Çå½à¡±IPµØµãÎªÍøÂç·¸·¨·Ö×ÓÌṩÁ÷Á¿Â·ÓÉЧÀÍ£¬£¬£¬¿ÉÈÆ¹ý¶àÖØºÚÃûµ¥£¬£¬£¬Ôø±»ÓÃÓÚÇÔȡŦԼÓû§100ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡¢Ôì³É±öϦ·¨ÄáÑÇÖÆÔìÆóÒµ70ÍòÃÀԪڲƭËðʧ¼°ÏÖÒÛ/ÍËÒÛÎäÊ¿10ÍòÃÀÔªÐÅÓÿ¨Ëðʧ¡£¡£¡£¾ÝBlack Lotus LabsÊý¾Ý£¬£¬£¬SocksEscort×Ô2023Äê±»¼Í¼ÒÔÀ´£¬£¬£¬ÒÑÍù¼¸ÄêÆ½¾ùÿÖÜѬȾ2Íǫ̀װ±¸£¬£¬£¬ÀÛ¼ÆÌṩԼ36.9Íò¸öIPµØµã»á¼ûȨÏÞ¡£¡£¡£×èÖ¹2026Äê2Ô£¬£¬£¬ÆäÓ¦ÓóÌÐòÈÔÁгöÔ¼8000̨ÊÜѬȾ·ÓÉÆ÷¡£¡£¡£Ðж¯ÖУ¬£¬£¬Ö´·¨»ú¹¹²é·âÁË7¹ú34¸öÓòÃûºÍ23̨ЧÀÍÆ÷£¬£¬£¬ÃÀ¹ú¶³½á350ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬£¬£¬ËùÓÐÊÜѬȾװ±¸ÒÑÓëSocksEscortЧÀͶϿªÅþÁ¬¡£¡£¡£AVRecon¶ñÒâÈí¼þ×Ô2021Äê5ÔÂÆð»îÔ¾£¬£¬£¬2023ÄêÖÐÆÚÒÑѬȾ³¬7Íǫ̀»ùÓÚLinuxµÄSOHO·ÓÉÆ÷£¬£¬£¬½öÓÃÓÚÀ©´óSocksEscort¹æÄ£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/


5. ¼ÓÄôóTelus DigitalÔâShinyHuntersÇÔÈ¡1PBÊý¾Ý


3ÔÂ12ÈÕ£¬£¬£¬¼ÓÄôóÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·Telus Digital¿ËÈÕ֤ʵÔâÓöÖØ´óÇå¾²ÊÂÎñ¡£¡£¡£ÍþвÐÐΪÕßShinyHuntersÉù³ÆÔÚÒ»Á¬ÊýÔµĹ¥»÷ÖÐÇÔÈ¡½ü1PBÊý¾Ý£¬£¬£¬Éæ¼°TelusµÄBPOÔËÓª¼°ÏûºÄÕßµçÐŲ¿·Öͨ»°¼Í¼¡£¡£¡£¾ÝShinyHuntersÅû¶£¬£¬£¬ÆäʹÓÃSalesloft DriftÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄGoogle Cloud Platformƾ֤ÈëÇÖTelus£¬£¬£¬²¢Í¨¹ýÍøÂçÇå¾²¹¤¾ßtrufflehogËÑË÷¸ü¶àƾ֤£¬£¬£¬½ø¶ø»á¼û°üÀ¨BigQueryʵÀýÔÚÄڵĶà¸öϵͳ¡£¡£¡£±»µÁÊý¾Ýº­¸Ç¿Í»§Ö§³Ö¹¤µ¥¡¢Í¨»°Â¼Òô¡¢Ô´´úÂë¡¢²ÆÎñÐÅÏ¢¡¢FBIÅä¾°ÊӲ졢SalesforceÊý¾Ý¼°ÓªÏú»î¶¯ÔªÊý¾ÝµÈ£¬£¬£¬Éæ¼°28¼Ò×ÅÃû¹«Ë¾£¬£¬£¬Êý¾ÝÀàÐÍÒò¹«Ë¾¶øÒ죬£¬£¬Ì»Â¶Á˿ͻ§Ö§³Ö¡¢ºô½ÐÖÐÐÄÍâ°ü¡¢AI¹¤¾ß¡¢Ú²Æ­¼ì²âµÈ¶àÓªÒµ¹¦Ð§¡£¡£¡£ShinyHunters×Ô½ñÄê2ÔÂÆðÏòTelusÀÕË÷6500ÍòÃÀÔª£¬£¬£¬µ«Î´»ñ»ØÓ¦¡£¡£¡£Telus×òÈÕÕýʽȷÈÏϵͳÔâδ¾­ÊÚȨ»á¼û£¬£¬£¬²¢ÌåÏÖÒѽÓÄɲ½·¥Ó¦¶ÔÈëÇÖ¡¢±£»£»£»£»£»£»¤ÏµÍ³£¬£¬£¬Ô¼ÇëÍøÂçȡ֤ר¼ÒЭÖúÊӲ죬£¬£¬ÓëÖ´·¨²¿·ÖÏàÖú£¬£¬£¬Í¬Ê±Ç¿µ÷ÓªÒµÔËÓªÕý³££¬£¬£¬ÎÞÖ¤¾ÝÏÔʾ¿Í»§ÍøÂçЧÀÍÊÜÓ°Ï죬£¬£¬½«×ÃÇé֪ͨÊÜÓ°Ïì¿Í»§¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/


6. °¢¶û°ÍÄáÑÇÒé»áÔâÍøÂç¹¥»÷£¬£¬£¬ÒÁ·½×éÖ¯³ÆÅê»÷


3ÔÂ11ÈÕ£¬£¬£¬°¢¶û°ÍÄáÑÇÒé»áÓÚÖܶþÍí¼äÔâÓö¡°¸ß¼¶¡±ÍøÂç¹¥»÷£¬£¬£¬¹¥»÷Ä¿µÄÃ÷È·Ö¸Ïòɾ³ýÊý¾Ý²¢¹¥Ïݶà¸öÄÚ²¿ÏµÍ³¡£¡£¡£¾ÝÒé»áÉùÃ÷£¬£¬£¬Æä½¹µãϵͳÓë¹Ù·½ÍøÕ¾ÈÔ¼á³ÖÕý³£ÔËÐУ¬£¬£¬µ«ÐÐÕþ²¿·ÖʹÓõÄÄÚ²¿µçÓÊЧÀÍÒѱ»ÔÝʱÔÝÍ££¬£¬£¬µ¼ÖÂÊÕ·¢Ë«ÏòͨѶÖÐÖ¹£¬£¬£¬ÊÂÇéÖ°Ô±ÓëÒéÔ±ÔÚ¹¥»÷±¬·¢ºóÊýСʱÄÚÎÞ·¨»á¼ûµçÄÔ¼°µçÓÊϵͳ¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬ÃûΪ¡°Homeland Justice¡±µÄºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬²¢ÔÚÆäTelegramƵµÀÐû²¼Á˾ݳÆÐ¹Â¶µÄÄÚ²¿Í¨Ñ¶Îļþ½ØÍ¼¡£¡£¡£Ö»¹Ü°¢¶û°ÍÄáÑǹٷ½ÉÐδ¹ûÕæÖ¤Êµ¸Ã×é֯˵·¨£¬£¬£¬µ«Çå¾²Ñо¿Ö°Ô±ÓëÎ÷·½¹ÙÔ±´ËǰÒѽ«¡°Homeland Justice¡±ÓëÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¹ØÁª¡£¡£¡£½üÄêÀ´£¬£¬£¬¸Ã×éÖ¯¶à´ÎÐû³Æ¶Ô°¢¶û°ÍÄáÑǾ³ÄÚһϵÁÐÍøÂç¹¥»÷ÈÏÕæ£¬£¬£¬Ä¿µÄº­¸ÇÒé»á¡¢¹ú¼Òº½¿Õ¹«Ë¾¡¢µçÐÅÆóÒµ¼°¹ú¼Òͳ¼Æ¾Ö¡£¡£¡£´Ë´Î¹¥»÷µÄÅä¾°Óë°¢¶û°ÍÄáÑÇÇå¾²ÐÎÊÆÏ¸ÃÜÏà¹Ø¡£¡£¡£¡°Homeland Justice¡±ÔÚ¹¥»÷ÉùÃ÷ÖÐÃ÷È·ÌåÏÖ£¬£¬£¬´Ë´ÎÐж¯ÊǶ԰¢¶û°ÍÄáÑÇÖ§³ÖÒÁÀÊ×èµ²ÅÉ×éÖ¯¡°ÒÁÀÊÈËÃñÊ¥Õ½Õß×éÖ¯¡±£¨MEK£©µÄÅê»÷¡£¡£¡£


https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament