Urban OneÔâÉç»á¹¤³Ì¹¥»÷µ¼ÖÂÊý¾Ýй¶
Ðû²¼Ê±¼ä 2025-04-301. Urban OneÔâÉç»á¹¤³Ì¹¥»÷µ¼ÖÂÊý¾Ýй¶
4ÔÂ29ÈÕ£¬Ã½Ì弯ÍÅUrban One¿ËÈÕ±¨¸æÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°Ô±¹¤µÈСÎÒ˽¼ÒÐÅÏ¢¡£Õâ¼Ò×ܲ¿Î»ÓÚÂíÀïÀ¼ÖݵÄýÌ幫˾ÏòµÂ¿ËÈøË¹ÖݺÍÂíÈøÖîÈûÖÝÌá½»µÄÎ¥¹æÍ¨ÖªÐÅÏÔʾ£¬ÍøÂç¹¥»÷ʼÓÚ2ÔÂ13ÈÕ£¬Í¨¹ý¡°ÖØ´óµÄÉç»á¹¤³ÌÔ˶¯¡±Ìᳫ£¬ºÚ¿ÍÀÖ³ÉÇÔÈ¡Á˹«Ë¾Êý¾Ý£¬µ«¹«Ë¾Ö±ÖÁ3ÔÂ15Èղŷ¢Ã÷¡£Ö»¹Ü¸ÃÊÂÎñδ¶Ô¹«Ë¾ÔËÓªÔì³ÉÓ°Ï죬µ«3ÔÂ30Èյķ¨Ò½ÊÓ²ì֤ʵÊý¾ÝÈ·Òѱ»ÇÔ¡£´Ë´Î¹¥»÷ÇÔÈ¡µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢Éç±£ºÅÂë¡¢Ö±½Ó´æ¿îÐÅÏ¢ºÍW-2±í¸ñÐÅÏ¢µÈ¡£¾Ý±¨¸æ£¬µÂ¿ËÈøË¹ÖÝÓÐ355ÈËÊܵ½Ó°Ï죬¶ø¹«Ë¾ÉÐδ¶ÔÖÃÆÀÇëÇó×÷³ö»ØÓ¦¡£ÎªÌî²¹Êܺ¦ÕßËðʧ£¬¹«Ë¾½«ÎªÊܺ¦ÕßÌṩÁ½ÄêµÄÐÅÓÃ¼à¿Ø·þÎñ£¬²¢ÒÑÁªÏµÖ´·¨²¿·Ö½éÈëÊӲ졣Urban One×÷ÎªÃæÏò·ÇÒáÃÀ¹úÈËȺÌåµÄ×î´óýÌ幫˾£¬ÔËÓª¶à¸öµçÊÓÆµµÀ¡¢ÊýÊ®¸ö¹ã²¥µç̨ºÍÐÂÎÅÍøÕ¾£¬2024ÄêÊÕÈëÔ¼4.5ÒÚÃÀÔª¡£3ÔÂ12ÈÕ£¬CactusÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶ÔUrban OneµÄ¹¥»÷ÈÏÕæ£¬¸Ã×éÖ¯ÓÚ2023Äê·ºÆð£¬×î³õÒòʹÓÃͨ¹ýÔÚÏß¹ã¸æ·Ö·¢µÄ¶ñÒâÈí¼þѬȾÊܺ¦Õß¶øÊܵ½Î¢Èí¹Ø×¢¡£
https://therecord.media/urban-one-data-breach-african-amercian-media
2. GitÉèÖÃÎļþÔâ´ó¹æÄ£É¨Ã裬ÉñÃØÓëÁîÅÆÐ¹Â¶Î£º¦¼Ó¾ç
4ÔÂ29ÈÕÐÂÎÅ£¬ÍþвÐÐΪÕßÕý¼Ó´ó¶ÔGitÉèÖÃÎļþµÄ»¥ÁªÍø¹æÄ£É¨ÃèÁ¦¶È£¬´ËÀàÎļþ¿ÉÄÜй¶ÓÃÓÚÆÆËðÔÆ·þÎñºÍÔ´´úÂë´æ´¢¿âµÄÃô¸ÐÉñÃØÓëÉí·ÝÑéÖ¤ÁîÅÆ¡£Íþв¼à¿Ø¹«Ë¾GreyNoiseµÄб¨¸æÏÔʾ£¬2025Äê4ÔÂ20ÈÕÖÁ21ÈÕʱ´ú£¬Õë¶Ô̻¶GitÉèÖõÄËÑË÷Á¿¼¤Ôö£¬ÌìÌìÊӲ쵽½ü4800¸öΨһIPµØµã£¬Óëµä·¶Ë®Æ½Ïà±È´ó·ùÔöÌí¡£Ö»¹ÜÔ˶¯ÆÕ±éÈ«Çò£¬µ«ÐÂ¼ÓÆÂÔÚ´Ëʱ´ú³ÉΪÖ÷ҪȪԴµØºÍÄ¿µÄµØ£¬ÃÀ¹úºÍµÂ¹úÔòÊdz£¼ûÄ¿µÄµØ¡£GitÉèÖÃÎļþ°üÀ¨·ÖÖ§ÐÅÏ¢¡¢Ô¶³Ì´æ´¢¿âURLµÈ£¬×îÖ÷ÒªµÄÊÇ¿ÉÄܰüÀ¨ÕÊ»§Æ¾Ö¤ºÍ»á¼ûÁîÅÆ¡£¿ª·¢Ö°Ô±»ò¹«Ë¾°²ÅÅWebÓ¦ÓóÌÐòʱÈôδ׼ȷɨ³ý.git/Ŀ¼µÄ¹«¹²»á¼û£¬¾Í»áÎÞÒâÖÐ̻¶ÕâЩÎļþ¡£É¨ÃèGitÉèÖÃÎļþÊÇÍþвÐÐΪÕߵıê×¼Õì̽Ô˶¯£¬ÄÜΪÆäÌṩ´ó×Úʱ»ú¡£Îª¼õÇáɨÃè´øÀ´µÄΣº¦£¬½¨Òé×èÖ¹¶Ô.git/Ŀ¼µÄ»á¼û£¬ÉèÖÃWeb·þÎñÆ÷±ÜÃâ»á¼ûÒþ²ØÎļþ£¬¼à¿Ø·þÎñÆ÷ÈÕÖ¾ÖпÉÒɵÄ.git/config»á¼û£¬²¢ÂÖ»»¿ÉÄÜ̻¶µÄƾ֤¡£
https://www.bleepingcomputer.com/news/security/hackers-ramp-up-scans-for-leaked-git-tokens-and-secrets/
3. ·¨¹ú³Æ¶íÂÞ˹APT28ºÚ¿Í¶Ô·¨¹úʵÌå·¢¶¯ÍøÂç¹¥»÷
4ÔÂ29ÈÕ£¬·¨ÍâÑó½»²¿Ö¸ÔðÓë¶íÂÞ˹¾üÊÂÇ鱨¾Ö£¨GRU£©ÓйØÁªµÄAPT28ºÚ¿Í×éÖ¯ÔÚÒÑÍùËÄÄêÕë¶Ô»òÈëÇÖÁËÊ®¼¸¸ö·¨¹úʵÌ壬²¢×îÇ¿ÁÒµØÑµ³âÁËGRUʹÓÃAPT28¹¥»÷³ÌÐòÕë¶Ô·¨¹úÀûÒæÌᳫµÄ¶àÆðÍøÂç¹¥»÷£¬³ÆÕâÐ©ÆÆËðÎȹ̵ÄÔ˶¯²»¿É½ÓÊÜ£¬Î¥·´Á˶íÂÞ˹Ëù×ñÊØµÄÍŽá¹ú¹ØÓÚÍøÂç¿Õ¼äÈÏÕæÈιú¼ÒÐÐΪµÄ±ê×¼£¬²»Åä³ÉΪÍŽá¹ú°²ÆÊÎö³£ÈÎÀíʹú¡£·¨¹ú¹ú¼ÒÐÅϢϵͳÇå¾²¾Ö£¨ANSSI£©µ±ÌìÐû²¼µÄ±¨¸æÏÔʾ£¬ÔâAPT28¹¥»÷µÄ·¨¹ú×éÖ¯º¸Ç²¿¼¶»ú¹¹¡¢µØ·½Õþ¸®ºÍÐÐÕþ²¿·Ö¡¢·¨¹ú¹ú·ÀÊÖÒպ͹¤Òµ»ùµØ×éÖ¯¡¢º½¿Õº½ÌìʵÌå¡¢Ñо¿×éÖ¯¡¢ÖÇ¿âÒÔ¼°¾¼ÃºÍ½ðÈÚ²¿·ÖʵÌåµÈ¡£ANSSI»¹ÏÈÈÝÁË2021ÄêÒÔÀ´APT28µÄ¼¸ÆðÔ˶¯£¬Èç¶à´ÎÕë¶ÔRoundcubeµç×ÓÓʼþ·þÎñÆ÷µÄ¹¥»÷£¬ÒÔ¼°Ê¹ÓÃÃâ·ÑÍøÂç·þÎñ¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷µÈ£¬ÇÒ¹¥»÷Õß´ó×ÚʹÓᰵͱ¾Ç®ÇÒËæÊ±¿ÉÓõÄÍâ°ü»ù´¡ÉèÊ©¡±ÒÔÔöÌíÎÞаÐÔºÍÒþ²ØÐÔ¡£×Ô2024ÄêÍ·ÒÔÀ´£¬APT28µÄ¹¥»÷Ö÷Òª¼¯ÖÐÔÚÇÔÈ¡¶à¹úÕþ¸®¡¢Íâ½»¡¢Ñо¿×éÖ¯ºÍÖÇ¿âµÄ¡°Õ½ÂÔÇ鱨¡±¡£
https://www.bleepingcomputer.com/news/security/france-ties-russian-apt28-hackers-to-12-cyberattacks-on-french-orgs/
4. ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾ÔâÍøÂç¹¥»÷µ¼Ö¿ͻ§·þÎñÊÜ×è
4ÔÂ29ÈÕ£¬ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾¼°Æäĸ¹«Ë¾EmeraÌåÏÖ£¬ÍøÂç¹¥»÷Ó°ÏìÁËÆä²¿·Ö¼ÓÄôóÍøÂç¼°Ö§³Ö²¿·ÖÓªÒµµÄ·þÎñÆ÷¡£ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾ÎªÐÂ˹¿ÆÉáÊ¡Ìṩ95%µÄµçÁ¦£¬·þÎñȫʡ³¬50Íò»§¼ÒÍ¥ºÍÉèÊ©¡£ÉÏÖÜÎ壬¸Ã¹«Ë¾·¢Ã÷ϵͳÔâδ¾ÊÚȨ»á¼û£¬·ºÆðÍøÂçÊÂÎñ¡£ÔÚÆäÍøÕ¾³£¼ûÎÊÌâ½â´ðÖУ¬ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾³ÆÍøÂç¹¥»÷Ó°ÏìÁ˿ͻ§·þÎñÈÈÏߺ͡°MyAccount¡±ÔÚÏ߿ͻ§ÃÅ»§¡£¹«Ë¾Ïò¿Í»§Ìṩµç»°ºÅÂëÓÃÓÚ±¨¸æÍ£µç»ò½ôÆÈÇéÐΣ¬Í¬Ê±ÖÒÑÔ¹¥»÷µ¼ÖÂÖµç¿Í»§·þÎñÖÐÐÄµÄÆÚ´ýʱ¼äÔöÌí¡£µ±¼ÇÕß¾ÍÊÂÎñÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷Õ÷ÇóÒâ¼ûʱ£¬EmeraºÍÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾¾Ü¾øÍ¸Â¶£¬µ«ÔÚÐÂΟåÖÐÚ¹Êͱ»ÆÈ¸ôÀëÊܹ¥»÷Ó°ÏìµÄijЩ·þÎñÆ÷£¬ÒÔ±ÜÃâ¡°½øÒ»²½ÈëÇÖ¡±¡£ÉùÃ÷Åú×¢£¬Ëä·þÎñÆ÷ÊÜÓ°Ï죬µ«ÎïÀíÔËӪδÖÐÖ¹£¬°üÀ¨·¢µç¡¢ÊäµçºÍÅäµçÉèÊ©¡¢º£ÉÏÅþÁ¬Ïß»ò²¼Â×Èð¿ËÊäÓ͹ܵÀµÈ¾ùÕý³£ÔËÐС£Emera¹«Ë¾»¹³Æ£¬´Ë´ÎʹÊδ¶Ô¹«Ë¾ÔÚÃÀ¹ú»ò¼ÓÀձȵØÇøµÄ¹«ÓÃÊÂÒµÔì³ÉÓ°Ï죬Ԥ¼ÆÒ²²»»á¶Ô¹«Ë¾²ÆÎñÒµ¼¨Ôì³ÉÖØ´óÓ°Ïì¡£ÏÖÔÚ£¬¸Ã¹«Ë¾ITÍŶÓÕýÓëÖ´·¨²¿·ÖºÍÍøÂçר¼ÒÏàÖú£¬Æð¾¢Ê¹ITϵͳ»Ö¸´ÔÚÏß¡£
https://therecord.media/nova-scotia-energy-provider-takes-servers-offline
5. ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡ÁËÁè¼Ý30,000·Ý°Ä´óÀûÑÇÒøÐÐÆ¾Ö¤
4ÔÂ29ÈÕ£¬DvulnÑо¿Ö°Ô±Ö¸³ö£¬Áè¼Ý30,000Ãû°Ä´óÀûÑÇÈ˵ÄÒøÐÐÆ¾Ö¤Òѱ»ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡¡£¸ÃÉøÍ¸²âÊÔ¹«Ë¾ÆÊÎö2021ÄêÖÁ2025Äê¼äµÄÐÅÏ¢ÇÔÈ¡ÈÕÖ¾ºó£¬È·¶¨Á˰ĴóÀûÑÇËÄ´óÒøÐпͻ§µÄСÎÒ˽¼ÒÒøÐÐÆ¾Ö¤¡£Êý¾ÝÏÔʾ£¬¶Ôÿ¼Òδ͸¶Ãû³ÆµÄÒøÐжøÑÔ£¬2021Äêµ½2023Äêʱ´ú±»µÁƾ֤ÊýÄ¿ÎȲ½ÔöÌí£¬2024ÄêÂÔÓÐϽµ¡£ÕâÒ»ÊÓ²ìЧ¹û͹ÏÔÁËÐÅÏ¢ÇÔÈ¡Õß¶ÔÍøÂç·¸·¨ÃûÌõÄÓ°Ï죬ËûÃÇÄÜÔÚ²»ÈëÇÖ»ú¹¹µÄÇéÐÎÏ»ñÈ¡¶ÔÖÖÖÖ·þÎñµÄδ¾ÊÚȨ»á¼û£¬ÔÚ½ðÈÚÁìÓòÖú³¤ÁËÕË»§½ÓÊÜ¡¢Ú²ÆÉúÒâºÍ»ùÓÚÉí·ÝµÄ½ðÈÚڲƵȶñÒâÔ˶¯¡£Òò´Ë£¬½ðÈÚµÈÐÐÒµ²»µ«Òª±£»¤×ÔÉíÍøÂ磬»¹ÐèÈ·±£¿Í»§ÕË»§ÍêÕûÐÔ¡£Ñо¿Ö°Ô±³Æ£¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÊǰĴóÀûÑǽðÈÚÒµÃæÁÙµÄ×îÆÕ±éµ«Î´±»³ä·Ö±¨µÀµÄÍþв֮һ¡£ÐÅÏ¢ÇÔÈ¡³ÌÐò×÷Ϊ¶ñÒâÈí¼þ±äÖÖ£¬Ö¼ÔÚѬȾÏûºÄÕß×°±¸ÒÔÇÔȡƾ֤¡¢Éí·ÝÑéÖ¤cookieºÍ²ÆÎñÐÅÏ¢£¬ÕâЩÊý¾ÝÔÚÍøÂç·¸·¨Êг¡ÉϳöÊÛ£¬Îª»á¼û¾¼ÍÈËÌṩ³õʼ»á¼ûȨÏÞ£¬ºóÐø»¹¿ÉÄܱ»´ò°ü³öÊÛ¸øÀÕË÷Èí¼þÔËÓªÉ̵ÈÍþвÐÐΪÕß¡£
https://www.infosecurity-magazine.com/news/infostealers-harvest-banking/
6. ÎÚ¿ËÀ¼EpicentrÔâÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊÜ×è
4ÔÂ29ÈÕ£¬ÎÚ¿ËÀ¼×î´óµÄ¼Ò¾Ó½¨²ÄÁãÊÛÉÌEpicentrÔâÊÜ´ó¹æÄ£ÍøÂç¹¥»÷£¬µ¼ÖÂÌìÏÂÊýÊ®¼ÒÃŵêÔËÓªÖÐÖ¹£¬Òªº¦ITϵͳÈçÊÕÒø»úºÍÎïÁ÷·þÎṉ̃»¾¡£Epicentr¹ÍÓ¶29,000ÃûÔ±¹¤£¬ÊÇÎÚ¿ËÀ¼×î´ó˽ӪÆóÒµÖ®Ò»¡£±¾ÖÜÒ»£¬¸÷µØÃŹÍÖ÷¹ËÒò½áÕËϵͳ崻úÎÞ·¨¹ºÎ»¹ÎÞ·¨ÎüÊÕ¶©µ¥¡¢»á¼û¹«Ë¾Ó¦ÓúÍÍøÕ¾¡£EpicentrÖܶþÉùÃ÷֤ʵÔâÊܶ¨Ïò¹¥»÷£¬³Æ¶ñÒâÐÐΪÕßµÄÐîÒâ¹¥»÷¶Ô¹«Ë¾»ù´¡ÉèÊ©Ôì³ÉÑÏÖØÐ§¹û£¬µ«Î´½«ÊÂÎñ¹éÒòÓÚÈκÎÌØ¶¨×éÖ¯£¬Ò²Î´Ã÷È·ºÚ¿ÍÈëÇÖ·½·¨ºÍ×îÖÕÄ¿µÄ£¬ÒÔ¼°ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¡£×èÖ¹ÖܶþÏÂÖ磬´ó¶¼ÃŵêËä»Ö¸´ÔËÓª£¬µ«²¿·ÖϵͳÈÔÓйÊÕÏ£¬»á¼ÆÏ½µµÍ¬Ðø±£´æÎÊÌ⣬Ҫº¦²ÆÎñ¼Í¼ºÍ×¢²áÐÅϢɥʧ£¬ÎÞ·¨ÌìÉú·¨¶¨²ÆÎñÓë˰Îñ±¨¸æ¡£Í¬Ê±£¬EpicentrÖÒÑÔÉÌÆ·ÅäËÍÓÈÆäÊÇÔÚÏß¶©µ¥¿ÉÄÜ·ºÆðÑÓ³Ù£¬Ö÷¹ËÔÚ¹ºÎïÖÐÐÄ¿ÉÄÜÔâÓö°ü¹ü×·×ÙÓë×ÔÌá·þÎñÎÊÌâ¡£´Ë´Î¹¥»÷ÊǽüÔÂÎÚ¿ËÀ¼ÆóÒµÔâÓöµÄµÚÈýÆðÖØ´óÍøÂç¹¥»÷£¬´Ëǰ¸Ã¹úũҵ¾ÞÍ·MHPºÍ¹úÓÐÌú·¹«Ë¾UkrzaliznytsiaÒ²»®·ÖÔâÓöÍøÂçÊÂÎñºÍÒÉËÆ¶íÂÞ˹ºÚ¿Í¹¥»÷¡£
https://therecord.media/epicentr-ukraine-home-improvement-cyberattack


¾©¹«Íø°²±¸11010802024551ºÅ