Ó¢¹ú»Ê¼ÒÓÊÕþÔâÖØ´óÊý¾Ýй¶£¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â
Ðû²¼Ê±¼ä 2025-04-031. Ó¢¹ú»Ê¼ÒÓÊÕþÔâÖØ´óÊý¾Ýй¶£¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â
4ÔÂ2ÈÕ£¬Ó¢¹ú»Ê¼ÒÓÊÕþ¼¯ÍÅ£¨Royal Mail Group£©½üÆÚÒÉËÆÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°144GBµÄÄÚ²¿Îļþ¡¢¿Í»§ÐÅÏ¢ºÍÓªÏúÊý¾Ý±»¹ûÕæ¡£¸ÃÊÂÎñÓÉÍøÂç·¸·¨ÂÛ̳Breach ForumµÄÓû§¡°GHNA¡±ÓÚ2025Äê3ÔÂ31ÈÕÊ×´ÎÅû¶£¬ÆäÉÏ´«Á˰üÀ¨293¸öÎļþ¼ÐºÍ16,549¸öÎļþµÄÊý¾Ý°ü£¬²¢ÌἰллµÂ¹úÊý¾ÝÆÊÎö¹«Ë¾SpectosµÄ¡°ÐÖú¡±¡£Ð¹Â¶Êý¾Ýº¸Ç¿Í»§Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡¢ÄÚ²¿Í¨Ñ¶¼Í¼¡¢ÔËÓªÊý¾Ý¼°ÓªÏú»ù´¡ÉèÊ©ÐÅÏ¢£¬Òý·¢Íâ½ç¶Ô¹¥»÷ȪԴµÄÍÆ²â£¬¼´¿ÉÄÜÊÇÖ±½ÓÈëÇֻʼÒÓÊÕþϵͳ»òͨ¹ýÆä¹©Ó¦ÉÌSpectos¾ÙÐеĵÚÈý·½¹¥»÷¡£GHNA×Ô2024Äêµ×»îÔ¾ÓÚBreach Forum£¬´ËǰÒÑй¶¶à¼Ò×ÅÃûÆóÒµÊý¾Ý£¬°üÀ¨ÈýÐǵç×Ó¡¢Touchworld Technology LLCµÈ£¬´Ë´Î»Ê¼ÒÓÊÕþÊý¾Ýй¶ÊÇÆäÐû²¼µÄ×î´ó¹æÄ£¹¥»÷Ö®Ò»£¬ÒÉËÆÎªÆä¡°»á¼û¼´·þÎñ¡±£¨Access-as-a-Service£©ÔËÓªµÄÒ»²¿·Ö¡£Spectos¶à´Î·ºÆðÔÚй¶Êý¾ÝÖУ¬°üÀ¨ÄÚ²¿ÎļþºÍ¾Û»áÊÓÆµ£¬Æä½ÇÉ«Éв»Ã÷È·£¬µ«ºÚ¿ÍÌåÏÖÆäϵͳ»òΪ¹¥»÷ÇÐÈëµã¡£»Ê¼ÒÓÊÕþ¼¯ÍÅ»ØÓ¦³ÆÕýÓëSpectosÏàÖúÊÓ²ìÊÂÎñ£¬ÆÀ¹ÀÊý¾ÝÓ°Ïì¡£
https://hackread.com/hacker-leaks-royal-mail-group-data-supplier-spectos/
2. FIN7ÍÅ»ïʹÓÃAnubisºóÃÅÐ®ÖÆWindowsϵͳ
4ÔÂ2ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õ¹ÏÖ£¬ÒÔ¾¼ÃÀûÒæÇý¶¯µÄÍøÂç·¸·¨ÍÅ»ïFIN7£¨Òà³ÆCarbon SpiderµÈ¶à¸öÌåÃû£©ÕýʹÓÃÒ»ÖÖÃûΪAnubisµÄPythonºóÃŶñÒâÈí¼þ£¬¶ÔWindowsϵͳʵÑéÐ®ÖÆ¡£ÈðÊ¿ÍøÂçÇå¾²¹«Ë¾PRODAFTÊÖÒÕ±¨¸æÏÔʾ£¬¸Ã¶ñÒâÈí¼þ¸¶Óë¹¥»÷ÕßÔ¶³ÌÖ´ÐÐShellÏÂÁϵͳ²Ù×÷ÄÜÁ¦£¬´Ó¶øÍêÈ«¿ØÖƱ»Ñ¬È¾×°±¸¡£FIN7×÷Ϊһ¸ö¾ßÓжíÂÞ˹Åä¾°µÄÍøÂç·¸·¨×éÖ¯£¬ºã¾ÃÒÔ¿ª·¢ÖØ´ó¶à±äµÄ¶ñÒâÈí¼þ¼Ò×åÖø³Æ£¬Æä¹¤¾ßÁ´Ö¼ÔÚ»ñÈ¡³õʼ»á¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý¡£½üÄêÀ´£¬¸ÃÍŻﱻָתÏòÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©Ä£Ê½ÒÔÍØÕ¹²»·¨ÊÕÒæÇþµÀ¡£AnubisºóÃÅͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬ÓÕµ¼Êܺ¦ÕßÖ´ÐÐÍйÜÔÚÔâÈëÇÖSharePointÕ¾µãÉϵĶñÒâÔØºÉ¡£¶ñÒâÈí¼þÒÔZIPѹËõ°üÐÎʽ½»¸¶£¬ÄÚº¬Ö±½ÓÔÚÄÚ´æÖнâÃÜÖ´ÐеÄPython¾ç±¾£¬¼Ì¶ø¼ÓÔØ½¹µã»ìÏý¸ºÔØ¡£½¨ÉèÅþÁ¬ºó£¬ºóÃÅͨ¹ýTCPÌ×½Ó×ÖÒÔBase64±àÂëÓëÔ¶³Ì·þÎñÆ÷ͨѶ£¬Ö§³ÖÍøÂçÖ÷»úIP¡¢Îļþ´«Ê䡢Ŀ¼²Ù×÷¡¢ÇéÐαäÁ¿»ñÈ¡¡¢×¢²á±íÐ޸ĵȹ¦Ð§£¬ÉõÖÁÄܼÓÔØDLLÖÁÄÚ´æÊµÏÖÎÞÎļþ¹¥»÷¡£
https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html
3. ÏÂËÕ×åÉçÇøÔâÍøÂç¹¥»÷£¬RansomHubÍÅ»ïÐû³ÆÈÏÕæ
4ÔÂ3ÈÕ£¬Ã÷ÄáËÕ´ïÖÝÏÂËÕ×åÓ¡µÚ°²ÈËÉçÇøÏòסÃñ·¢³öÖÒÑÔ£¬¸Ã²¿ÂäÔâÊÜÍøÂç¹¥»÷£¬µ¼ÖÂÍâµØÒ½ÁÆ»ú¹¹¡¢Õþ¸®·þÎñÖÐÐļ°²¿ÂäÔËÓªµÄJackpot Junction¶Ä³¡ÔËÓªÖÐÖ¹¡£´Ë´ÎÊÂÎñÆÈʹ²¿ÂäÆô¶¯Ó¦¼±ÏìÓ¦»úÖÆ£¬×Ô¶¯¹Ø±Õ²¿·ÖÒªº¦ÏµÍ³ÒÔ¿ØÖÆÊÂ̬£¬°üÀ¨µç»°¡¢´«Õæ¼°Óʼþ·þÎñ¡£¹Ù·½Í¨¹ýÉ罻ýÌåÌåÏÖ£¬ÕýÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬Á¦ÕùÔÚÇå¾²Ìõ¼þϾ¡¿ì»Ö¸´ÏµÍ³Õý³£ÔËÐУ¬²¢Ðû²¼ÁËÎÀÉúÖÐÐÄ¡¢ÑÀ¿ÆÕïËùµÈ³¡ºÏµÄÔÝʱÁªÏµµç»°¡£ÍøÂç¹¥»÷Ó°ÏìÉîÔ¶£¬¶Ä³¡ÂùÝÔ¤¶©ÏµÍ³ÖÜȫ̱»¾£¬ÎÞ·¨´¦Öóͷ£Ð¶©·¿¼°×÷·ÏÇëÇ󣬵ç×ÓÓÎÏ·»ų́ÒàÒòÍøÂçÖÐÖ¹×èÖ¹ÔË×÷¡£¸Ã²¿ÂäÓµÓÐÔ¼982ÃûסÃñ£¬Ö÷Òª¾Û¾ÓÔÚ1,743Ӣ͵ı£´æµØ¼°ÖܱßÇøÓò¡£ÖµµÃ×¢ÖØµÄÊÇ£¬RansomHubÀÕË÷Èí¼þÍÅ»ïÓÚ±¾ÖÜÒ»¹ûÕæÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¸ÃÍÅ»ï½ñÄê2ÔÂÔøÏ®»÷ÃÜЪ¸ùÖÝÁíÒ»ÔסÃñ²¿Â䣬²¢ÔÚÈ«ÇòÀÕË÷Èí¼þÁìÓòѸËÙáÈÆð£¬ÓÈÆäÔÚÈ¥ÄêLockBitºÍAlphVÔâÖ´·¨¹¥»÷ºó£¬Æä»îÔ¾¶ÈÏÔÖøÉÏÉý¡£
https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino
4. ÊýǧAndroid×°±¸Ô¤×°TriadaľÂí£¬¹©Ó¦Á´Çå¾²ÏÖÖØ´óÍþв
4ÔÂ2ÈÕ£¬¿¨°Í˹»ùʵÑéÊÒ½üÆÚÅû¶£¬Êýǧ̨ÐÂÐÍAndroid×°±¸ÔÚ³ö³§Ç°¼´±»Ö²Èë×îбäÖÖµÄTriadaľÂí£¬×é³ÉÑÏÖØµÄ¹©Ó¦Á´Çå¾²Íþв¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÚ2016ÄêÏÖÉí£¬ÒÔÆäÆæÒìµÄÄÚ´æ×¤ÁôÊÖÒÕ¹æ±Ü¼ì²â£¬´Ë´ÎбäÖÖ¸üÕ¹ÏÖ³öÉî¶ÈÏµÍ³ÉøÍ¸ÄÜÁ¦¡£¹¥»÷Õßͨ¹ýð³äÊ¢ÐÐÊÖ»úÐͺţ¬Ôڷǹٷ½ÇþµÀÒԵͼÛÎüÒýÏûºÄÕß¹ºÖÃÒÑѬȾµÄÖÕ¶Ë×°±¸¡£2025Äê3ÔÂ13ÈÕÖÁ27Èռ䣬½ö¶íÂÞ˹¾ÍÓÐ2,600ÃûÓû§È·ÈÏѬȾ¡£¸ÃľÂí¾ß±¸¶àά¶È¹¥»÷ÄÜÁ¦£ºÇÔÈ¡¼´Ê±Í¨Ñ¶ÓëÉ罻ýÌåÕË»§¡¢¸Ä¶¯¼ÓÃÜÇ®±ÒÇ®°üµØµãʵÑéÐ®ÖÆ¡¢²Ù¿ØÍ¨»°Â·Óɼ°¶ÌÐŹ¦Ð§¡¢ÉõÖÁÔ¶³Ì¼ÓÔØÌØÊâ¶ñÒâ³ÌÐò¡£Æäͨ¹ýαװϵͳÀú³ÌʵÏÖ³¤ÆÚ»¯×¤Áô£¬¼´±ã×°±¸ÖØÆôÈÔÄÜά³Ö¿ØÖÆ¡£ÆÊÎöÏÔʾ£¬¹¥»÷ÕßÒÑͨ¹ýÌæ»»Ç®°üµØµã͵ȡÖÁÉÙ27ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬ÏÖʵËðʧ¿ÉÄÜÒòÉæ¼°ÃÅÂÞ±ÒµÈÄäÃû¼ÓÃÜ×ʲú¶ø¸ü¸ß¡£¿¨°Í˹»ùר¼ÒÍÆ²â´Ë´ÎÊÂÎñϵ¹©Ó¦Á´»·½ÚÔâÉøÍ¸£¬¶ñÒâÈí¼þÔÚ×°±¸µÖ´ïÓû§Ç°¼´±»Ö²Èë¹Ì¼þ£¬Á¬¾ÏúÉ̶¼¿ÉÄÜÃÉÔÚ¹ÄÖС£Îª½µµÍΣº¦£¬Ç徲ר¼Ò½¨ÒéÏûºÄÕß½öͨ¹ý¹Ù·½ÊÚȨÇþµÀ²É¹º×°±¸£¬¶Ô´æÒÉ×°±¸Ó¦Ê¹ÓÃGoogle¹Ù·½´¿¾»¾µÏñ»ò¿ÉÐÅ¿ªÔ´ÏµÍ³£¨ÈçLineageOS£©¾ÙÐÐË¢»ú¡£
https://www.bleepingcomputer.com/news/security/counterfeit-android-devices-found-preloaded-with-triada-malware/
5. Outlaw½©Ê¬ÍøÂçʹÓÃSSHÎó²î×Ô¶¯Èö²¥£¬ÍþвLinuxϵͳÇå¾²
4ÔÂ2ÈÕ£¬ÍøÂçÇ徲ר¼Ò¿ËÈÕÅû¶ÁËÒ»¸öÃûΪOutlaw£¨ÓÖÃûDota£©µÄ×Ô¶¯»¯¼ÓÃÜÇ®±ÒÍÚ¿ó½©Ê¬ÍøÂ磬¸Ã¶ñÒâÈí¼þÒ»Á¬»îÔ¾ÒÑÓâËÄÄ꣬ͨ¹ýSSH±©Á¦ÆÆ½â¹¥»÷ºÍÈä³æÊ½Èö²¥Ñ¬È¾Linuxϵͳ¡£ElasticÇ徲ʵÑéÊÒÆÊÎöÖ¸³ö£¬¸Ã¶ñÒâÈí¼þÓÉÂÞÂíÄáÑǺڿÍÕûÌ忪·¢£¬Æä¹¥»÷Á´Ê¼ÓÚʹÓÃÈõÃÜÂëµÄSSH·þÎñÆ÷£¬Í¨¹ýÖ²Èë×ÔÉíSSHÃÜÔ¿½¨É賤ÆÚ»¯»á¼û¡£¹¥»÷Õß½ÓÄɶà½×¶ÎÉøÍ¸Õ½ÂÔ£¬Ê×ÏÈͨ¹ýÏÂÔØÆ÷¾ç±¾»ñÈ¡¼ÓÃÜѹËõ°ü£¬½âѹºóÆô¶¯ÍÚ¿ó³ÌÐò£¬²¢×Ô¶¯É¨³ý¾ºÕùÍÚ¿óÀú³Ì¼°×ÔÉí¾É°æ±¾¡£½¹µã×é¼þBLITZÈÏտɍÃèųÈõSSH·þÎñ£¬ÅäºÏ±©Á¦ÆÆ½âÄ£¿éʵÏÖºáÏòÀ©É¢£¬ÆäÄ¿µÄÁбíÓÉC2·þÎñÆ÷¶¯Ì¬¸üС£ÖµµÃ×¢ÖØµÄÊÇ£¬¸ÃÍŻﻹʹÓÃDirty COWµÈÀúÊ·Îó²î¼°ÈõTelnetƾ֤À©´ó¹¥»÷Ãæ¡£Ñ¬È¾Àֳɺ󣬶ñÒâÈí¼þ°²ÅÅSHELLBOTÄ£¿é£¬Í¨¹ýIRCƵµÀÎüÊÕ¿ØÖÆÖ¸Á¿ÉÖ´ÐÐí§ÒâϵͳÏÂÁî¡¢ÌᳫDDoS¹¥»÷¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£ÎªÌáÉýÍÚ¿óЧÂÊ£¬¶ñÒâÈí¼þ»á¼ì²âϵͳCPUÌØÕ÷²¢ÆôÓôóÒ³ÃæÄÚ´æÉèÖã¬Í¬Ê±Î¬³ÖÓë¹¥»÷Õß»ù´¡ÉèÊ©µÄÒ»Á¬Í¨Ñ¶¡£
https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
6. »ùÒòÊý¾ÝÍøÕ¾openSNPÒòÒþ˽Σº¦½«¹Ø±Õ²¢É¾³ýÊý¾Ý
4ÔÂ2ÈÕ£¬»ùÒòÊý¾Ý¹²ÏíÆ½Ì¨openSNPÐû²¼½«ÓÚ2025Äê4ÔÂ30ÈÕÖÕÖ¹·þÎñ²¢ÖÜȫɾ³ýÓû§Êý¾Ý£¬¸Ã¾öÒéÓÉÍŽáÊ×´´ÈËBastian Greshake Tzovaras»ùÓÚÒþ˽±£»¤ÓëÂ×ÀíΣº¦¿¼Á¿×÷³ö¡£×÷ΪÔËÐÐ14ÄêµÄ¿ªÔ´ÏîÄ¿£¬openSNPÖÂÁ¦ÓÚÍÆ¶¯»ùÒòÊý¾ÝÃñÖ÷»¯£¬Í»ÆÆÉÌÒµ»ú¹¹¶Ô»ùÒò×éÐÅÏ¢µÄ¢¶Ï£¬Àۼƴ洢Á˺£Á¿Óû§×ÔÔ¸Ìá½»µÄ»ùÒòÓë±íÐÍÊý¾Ý£¬Ö§³ÖÁ˶àÏî×ÔÁ¦¿ÆÑм°¹«¹²¿µ½¡Ñо¿¡£ÏîÄ¿¹Ø±ÕµÄÖ±½ÓÓÕÒòÊÇ23andMe¹«Ë¾ÐÝÒµµ¼ÖµÄÓû§Êý¾ÝÁ÷Èë¸ôÀ룬µ«¸üÉî²ãÔµ¹ÊÔÓÉÔÚÓÚÈ«ÇòÊý¾ÝÀÄÓÃΣº¦µÄ¼Ó¾ç¡£TzovarasÖ¸³ö£¬Ä¿½ñ»ùÒòÊý¾Ý±»Ë½ÈË·¨Ò½»ú¹¹¡¢Ö´·¨²¿·ÖÒÔÖ²¿·ÖÕþ¸®ÒÔα¿ÆÑ§ÃûÒå²»µ±»ñÈ¡µÄΣº¦ÏÔÖøÉÏÉý£¬ÕâÓëÏîÄ¿Æô¶¯Ê±Ïà¶Ô¿íËɵÄÊý¾ÝÂ×ÀíÇéÐÎÒѱ¬·¢»ù´¡×ª±ä¡£Ö»¹ÜopenSNPʼÖվܾøÉÌÒµÊÕ¹º²¢¼á³ÖÊý¾Ý¿ØÖÆÈ¨£¬µ«ÃæÁÙÒ»Ö±ÑݱäµÄÒþ˽ÍþвºÍÕþÖÎÇéÐΣ¬ÍŶÓÒÔΪ×Ô¶¯É¾³ýÊý¾ÝÊǸüÈÏÕæÈεÄÑ¡Ôñ¡£×÷Ϊ¿ªÔ´ÉçÇøµÍ±¾Ç®ÔË×÷µÄ¹æ·¶£¬¸ÃÆ½Ì¨ÔøÓÐÓÃÔö½ø¹«ÖÚ¶Ô»ùÒòÑо¿µÄ¼ÓÈë¡£¹Ø±Õͨ¸æÌØÊâÌáÐÑÓû§£¬ÈôÐè±£´æÐ¡ÎÒ˽¼ÒÊý¾Ý¸±±¾ÐëÔÚ×èÖ¹ÈÕÆÚǰ×ÔÐÐÏÂÔØ£¬ÒÔºóËùÓйûÕæÊý¾Ý½«±»ÓÀÊÀɨ³ý¡£
https://www.bleepingcomputer.com/news/security/genetic-data-site-opensnp-to-close-and-delete-data-over-privacy-concerns/


¾©¹«Íø°²±¸11010802024551ºÅ