Ï£²©ÒÁ¸ùÊÐÔâChortÀÕË÷ÍŻ﹥»÷£¬ÖÂ6.7ÍòÈËÐÅϢй¶
Ðû²¼Ê±¼ä 2025-05-301. Ï£²©ÒÁ¸ùÊÐÔâChortÀÕË÷ÍŻ﹥»÷£¬ÖÂ6.7ÍòÈËÐÅϢй¶
5ÔÂ28ÈÕ£¬ÃÀ¹úÍþ˹¿µÐÇÖÝÏ£²©ÒÁ¸ùÊÐÔ¼6.7ÍòÈËÊÕµ½ÖÒÑÔ£¬2024Äê10ÔµÄÀÕË÷Èí¼þ¹¥»÷ÖÂʹºÚ¿Í»ñÈ¡ÁËËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢¡£ÊÐÕþ¸®ÓÚÖÜÎåÏòî¿Ïµ»ú¹¹Ìá½»Êý¾Ýй¶֪ͨÐÅ£¬È·ÈϺڿÍÔÚ2024Äê10ÔÂ31ÈÕÈëÇÖÊÐÕþϵͳʱÇÔÈ¡ÁËÉç±£ºÅÂë¡¢ÖÝÉí·ÝÖ¤¼°³µÅƺŵÈÖ÷ÒªÐÅÏ¢¡£Ï£²©ÒÁ¸ùÊÐÕþ¸®´ËǰίÍÐÍøÂçÇå¾²¹«Ë¾Õö¿ªÊӲ죬×îÖÕÓÚ5ÔÂ14ÈÕÈ·ÈÏÊý¾ÝÔâÇÔÈ¡¡£¸ÃÊÐÉú³ÝÔ¼5Íò£¬´ËǰËäÈÏ¿ÉÀÕË÷Èí¼þÍÅ»ïChortÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬µ«ÔøÌåÏÖÎÞÖ¤¾ÝÅú×¢Ãô¸ÐÊý¾Ý±»ÇÔ¡£È»¶ø£¬2024Äê11Ô£¬ChortÍÅ»ï¹ûÕæÁËÎļþµµ°¸½ØÍ¼²¢Ë÷ÒªÊê½ð¡£ÊÐÕþ¸®ÒÑÏòÖ´·¨²¿·Ö±¨¸æ´ËÊ£¬²¢ÔÚÓ¦¶ÔÀú³ÌÖÐ×ñÕÕÆäÖ¸µ¼Òâ¼û¡£¹ÙÔ±³ÆÓ¦¼±·þÎñÕý³£ÔËÐУ¬µ«×Ô11ÔÂ22ÈÕºóδÔÙÐû²¼½øÒ»²½¸üС£ÊÐÕþ¸®ÔÚ֪ͨÐÅÖÐÔÊÐíΪÊÜÓ°ÏìסÃñÌṩΪÆÚÒ»ÄêµÄÉí·Ý±£»¤·þÎñ¡£ChortÀÕË÷ÍÅ»ï×Ô2024Äê11ÔÂո¶ͷ½ÇÒÔÀ´£¬ÒÑÐû³Æ¹¥»÷Á˰üÀ¨¿ÆÍþÌØ¹«¹²Å©ÒµÓëÓæÒµ×ÊÔ´¾Ö¡¢ÇÇÖÎÑÇÖÝij¹«Á¢Ñ§Ð£ÔÚÄڵĶà¼Ò»ú¹¹¡£
https://therecord.media/ransomware-sheboygan-breach-notice
2. Azure Blob´æ´¢Ð¹Â¶£º³¬160Íò·ÝµçÉ̿ͻ§ÐÅϢй¶
5ÔÂ28ÈÕ£¬ÍøÂçÇå¾²Ñо¿ÍŶӿËÈÕ·¢Ã÷Á½¸öδÊܱ£»¤µÄAzure Blob´æ´¢ÈÝÆ÷±¬·¢Êý¾Ýй¶£¬Éæ¼°Áè¼Ý160Íò·ÝÎļþ£¬Ö÷Òª°üÀ¨Etsy¡¢Poshmark¼°TikTokµêËÁµÄ¿Í»§ÐÅÏ¢¡£´Ë´Îй¶ÒÔÃÀ¹úÓû§ÎªÖ÷£¬²¿·Ö¼ÓÄôóÓë°Ä´óÀûÑÇÓû§Ò²Êܵ½Ó°Ïì¡£Ö»¹ÜÔÚÏß¹ºÎïÒѾ߱¸½Ï¸ßÇå¾²ÐÔ£¬µ«´Ë´ÎÊÂÎñÕ¹ÏÖÁËÊý×ÖÒõÓ°ÖÐDZ²ØµÄΣº¦¡£Ð¹Â¶µÄHTMLÃûÌÃÎïÁ÷È·ÈÏÓʼþÖаüÀ¨Óû§È«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓÊÏä¼°ÎïÁ÷¶©µ¥ÏêÇéµÈÃô¸ÐÐÅÏ¢¡£Ñо¿ÍŶÓÖ¸³ö£¬Etsy×÷ΪȫÇòÊý°ÙÍòС΢ÆóÒµµÄÉúÒâÆ½Ì¨£¬ÆäÎïÁ÷È·ÈÏÓʼþÊý¾Ýй¶¶Ô¿Í»§Òþ˽ÓëÇå¾²×é³ÉÖØ´óÍþв¡£´ó²¿·Öй¶ÎļþÀ´×ÔEtsy£¬²¿·ÖÊý¾Ý»¹¹ØÁªTikTokµêËÁ¡¢Poshmark¼°Embrolyƽ̨¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩй¶ÐÅϢʵÑ龫׼´¹ÂÚ¹¥»÷¡¢Éç½»¹¤³Ì¹¥»÷»ò¶ñÒâÈí¼þÈö²¥µÈ¶ñÒâÔ˶¯¡£ËäÈ»ÎÞ·¨È·ÈÏ̻¶ʵÀýµÄÏêϸËùÓÐÕߣ¬µ«ÆÊÎöÏÔʾÊÜÓ°Ïì¶©µ¥Ö÷񻃾¼°Ô½ÄϵØÇøµÄ´ÌÐå·þÎñÌṩÉÌ£¬¿ÉÄÜΪ¼òµ¥ÊµÌåÔÚ¶à¸öµçÉÌÆ½Ì¨¿ªÉèµêËÁËùÖ¡£Ñо¿ÍŶÓÌØÊ⾯ʾ£¬ÕÆÎÕÓû§È«ÃûÓëµØµãÐÅÏ¢ºó£¬¹¥»÷Õß¿ÉÄÜαװ³É¿ÉÐÅÎïÁ÷·þÎñÉÌʵÑé¶ñÒâ²Ù×÷£¬¼«´óÌáÉý¹¥»÷ÀÖ³ÉÂÊ¡£
https://cybernews.com/security/etsy-tiktok-shop-customer-data-leak/
3. RE/MAXÔâMedusaÀÕË÷Èí¼þ¹¥»÷£¬150GBÊý¾Ýй¶
5ÔÂ28ÈÕ£¬RE/MAXÊÇÒ»¼ÒÔÚÈ«ÇòÓµÓÐ9000¶à¼Ò·þÎñ´¦µÄ¹ú¼Ê·¿µØ²úÍøÂ磬¾Ý³ÆÔâµ½ÁËMedusaÀÕË÷Èí¼þµÄ¹¥»÷¡£MedusaÊÇÒ»¸öÕë¶Ô´óÐÍ×éÖ¯µÄÖ÷ÒªÍþвÐÐΪÕߣ¬´Ë´Î¹¥»÷ÖУ¬¸ÃÀÕË÷Èí¼þ×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼ÁËRE/MAXµÄÏà¹ØÐÅÏ¢£¬Éù³ÆÒÑÇÔÈ¡150GBÊý¾Ý£¬²¢Ë÷Òª20ÍòÃÀÔªÊê½ðÒÔɾ³ýÊ£ÓàÊý¾Ý£¬Í¬Ê±É趨Á˲»µ½18ÌìµÄÊê½ðÖ§¸¶µ¹¼ÆÊ±¡£Ëù¸½½ØÍ¼ÏÔʾ£¬±»Ð¹Â¶µÄÊý¾ÝÉæ¼°À´×Ô²î±ð¹ú¼ÒµÄ·¿µØ²ú¾¼ÍÈË£¬°üÀ¨Ð¡ÎÒ˽¼ÒÊý¾ÝÈçÈ«Ãû¡¢ÕÕÆ¬¡¢Ó¶½ð¼Í¼¡¢Õ˵¥Êý¾Ý¼°ÁªÏµ·½·¨µÈ£¬±ðµÄÉÐÓÐÄÚ²¿Îļþ£¬Õ¹ÏÖÁËÖ§¸¶¸ø¾¼ÍÈ˵Ľð¶î¡¢·ÖÀà¡¢Åä¶îºÍÓöȽṹ£¬ÎļþÈÕÆÚÏÔʾÊý¾Ý¿ç¶ÈΪ2021ÄêÖÁ2023Äê¡£Ö»¹ÜÏÖÔÚй¶µÄÊý¾ÝÑù±¾¿´ÆðÀ´²¢·Ç³¬µÈÃô¸Ð£¬µ«¼øÓÚÊý¾Ý¹æÄ£ÖØ´ó£¬Ê£Óàй¶Êý¾ÝÖпÉÄܰüÀ¨¸üÃô¸ÐµÄÐÅÏ¢¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬ÕâÒ»´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÅú×¢RE/MAXÔÚÊý¾ÝÖÎÀí·½Ãæ±£´æÑÏÖØÈ±ÏÝ¡£±»µÁÊý¾Ý¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢½ðÈÚڲƺ͸߶ÈÕë¶ÔÐÔµÄÍøÂç´¹ÂÚ£¬ÉõÖÁ¿ÉÄܵ¼ÖÂRE/MAX¿Í»§ÔâÓö·¿µØ²úÕ©Æ¡£Òò´Ë£¬RE/MAX¿ÉÄÜÃæÁÙ²ÆÎñËðʧ¡¢ÔËÓªÖÐÖ¹ºÍÉùÓþÊÜËðµÈ¶àÖØÎ£º¦¡£MedusaÀÕË÷Èí¼þ×éÖ¯³ýË÷ÒªÊê½ðÍ⣬»¹ÌṩÁ˽«×èÖ¹ÈÕÆÚÑÓÉìÒ»Ìì¡¢Ö§¸¶1ÍòÃÀÔªµÄÑ¡Ïî¡£
https://cybernews.com/security/medusa-ransomware-threatens-release-remax-data/
4. Ô¼µ©¿ÆÍþÌØÒøÐÐÔâÀÕË÷¹¥»÷£¬Ô±¹¤Êý¾Ý¼°ÄÚ²¿×ÊÁÏй¶
5ÔÂ27ÈÕ£¬Ô¼µ©¿ÆÍþÌØÒøÐУ¨JKB£©¿ËÈÕÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬ºÚ¿ÍÍþвÈô²»Ö§¸¶Êê½ð½«Ðû²¼ÉñÃØÊý¾Ý¡£JKBÊÇÔ¼µ©ÒøÐÐϵͳµÄÖ÷Òª¼ÓÈëÕߣ¬ÒÔÆäÊý×Ö»¯»ù´¡ÉèÊ©ÖøÃû£¬ÔÚÔ¼µ©¸÷µØÓµÓÐ64¼Ò·ÖÐкͷþÎñ´¦£¬²¢ÔÚÈûÆÖ·˹ÉèÓзÖÐС£¾Ý°µÍø±¨¸æ£¬EverestÀÕË÷Èí¼þ¼¯ÍÅÇÔÈ¡ÁË1003ÃûJKBÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¼°11.7GBµÄ¹«Ë¾ÄÚ²¿Êý¾Ý£¬²¢¸øÓèÒøÐÐÎåÌìʱ¼äÁªÏµÌ¸ÅÐÒÔÖ§¸¶Êê½ð¡£ËäÈ»ÎÞÊý¾ÝÑù±¾¿É¹©ÏÂÔØ£¬µ«ÍÅ»ï·ÖÏíµÄ½ØÍ¼Ì»Â¶ÁËÔ±¹¤Ãô¸ÐµÄ˽ÈËÐÅÏ¢£¬°üÀ¨È«Ãû¡¢¼ÒÍ¥ÏêÇ顢ְλÃû³Æ¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢ÊÂÇéÓÊÏäºÍµç»°·Ö»úºÅÒÔ¼°ÒøÐÐÕË»§ÏêϸÐÅÏ¢µÈ¡£Ô±¹¤Ð¡ÎÒ˽¼Ò×ÊÁϵÄй¶²»µ«ÇÖÕ¼Òþ˽£¬»¹ÎªÉí·Ý͵ÇÔ¡¢½ðÈÚڲƺͶ¨Ïò¹¥»÷ÌṩÁ˱㵱£¬Í¬Ê±¿ÉÄܶԹ«Ë¾ÄÚ²¿ÏµÍ³ºÍÒøÐлù´¡ÉèÊ©×é³ÉºóÃÅÍþв¡£Ñо¿Ð¡×éÖ¸³ö£¬Ð¹Â¶µÄÐÅϢʹÍþвÐÐΪÕßÄܹ»Ìᳫ¸ß¶ÈÕë¶ÔÐÔµÄÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬²¢¿ÉÄܵ¼ÖÂÒøÐÐÄÚ²¿ÏµÍ³±»ÈëÇÖ¡£¼ÒÍ¥ÏêϸÐÅÏ¢µÄй¶½øÒ»²½ÔöÌíÁËΣº¦£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢ÈÆ¹ýÇå¾²ÎÊÌâ»á¼ûÕË»§¡£
https://cybernews.com/security/jordan-kuwait-bank-data-breach-everest-ransomware/
5. ConnectWiseÔâÍøÂç¹¥»÷£¬»ò¹ØÁªScreenConnectÎó²î
5ÔÂ29ÈÕ£¬ITÖÎÀíÈí¼þ¹«Ë¾ConnectWise³ÆÒÉËÆÔâÓö¹ú¼ÒÖ§³ÖµÄÍøÂç¹¥»÷£¬Ó°ÏìÓÐÏÞÊýÄ¿µÄScreenConnect¿Í»§¡£ConnectWiseÔÚͨ¸æÖÐÌåÏÖ£¬½üÆÚ·¢Ã÷ÇéÐÎÖб£´æ¿ÉÒÉÔ˶¯£¬ÒÔΪÓëÖØ´ó¹ú¼ÒÐÐΪÕßÓйء£¸Ã¹«Ë¾ÒÑÓëȡ֤ר¼ÒMandiantÕö¿ªÊӲ죬ÁªÏµÊÜÓ°Ïì¿Í»§²¢Ðµ÷Ö´·¨²¿·Ö¡£ConnectWiseλÓÚ·ðÂÞÀï´ïÖÝ£¬ÎªÍйܷþÎñÌṩÉÌ£¨MSP£©ºÍIT²¿·ÖÌṩ¶àÖÖ½â¾ö¼Æ»®£¬ScreenConnectÊÇÆäÔ¶³Ì»á¼ûºÍÖ§³Ö¹¤¾ß¡£¾ÝCRN±¨µÀ£¬ConnectWiseÒÑÔöÇ¿¼à¿Ø²¢Ç¿»¯ÍøÂçÇå¾²£¬ÇÒδÔÚ¿Í»§°¸ÀýÖп´µ½½øÒ»²½¿ÉÒÉÔ˶¯¡£ÓÐÐÂÎÅÈËʿ͸¶£¬ÈëÇÖ±¬·¢ÔÚ2024Äê8Ô£¬ConnectWiseÓÚ2025Äê5Ô·¢Ã÷¿ÉÒÉÔ˶¯£¬½öÓ°Ïì»ùÓÚÔÆµÄScreenConnectʵÀý¡£ÍйܷþÎñÌṩÉÌCNWR×ܲÃÌåÏÖ£¬Ö»ÓÐÉÙÉÙÊý¿Í»§ÊÜÓ°Ï죬ÌåÏÖÍþвÐÐΪÕß¾ÙÐÐÁËÕë¶ÔÐÔ¹¥»÷¡£RedditÌû×ÓÖ¸³ö£¬¸ÃÊÂÎñÓëScreenConnectÎó²î£¨CVE-2025-3935£©Óйأ¬´ËÎó²îΪ¸ßÑÏÖØÐÔViewState´úÂë×¢ÈëÎó²î£¬Óɲ»Çå¾²·´ÐòÁл¯ÒýÆð£¬ÌØÈ¨ÍþвÐÐΪÕß¿ÉÇÔÈ¡»úеÃÜÔ¿ÖÆ×÷¶ñÒâ¸ºÔØ¡£
https://www.bleepingcomputer.com/news/security/connectwise-breached-in-cyberattack-linked-to-nation-state-hackers/
6. ά¶àÀûÑǵÄÉñÃØÒòÇå¾²ÊÂÎñ¹Ø±ÕÍøÕ¾
5ÔÂ29ÈÕ£¬ÒòÒ»Á¬Çå¾²ÊÂÎñ£¬Ê±ÉоÞͷά¶àÀûÑǵÄÉñÃØ¹Ø±ÕÁËÆäÍøÕ¾¼°²¿·ÖÊÐËÁ·þÎñ¡£Î¬¶àÀûÑǵÄÉñÃØÔÚÈ«Çò½ü70¸ö¹ú¼Ò/µØÇøÖÎÀí×ÅÔ¼1380¼ÒÁãÊ۵꣬2025²ÆÄêÄêÊÕÈë´ï62.3ÒÚÃÀÔª¡£¸Ã¹«Ë¾ÔÚÌæ»»ÍøÕ¾µÄÐÂÎÅÖмû¸æ¿Í»§£¬Æäά¶àÀûÑǵÄÉñÃØºÍPINKÊÐËÁÔÚ»Ö¸´ÔËӪʱ´úÈÔÕý³£ÓªÒµ£¬µ«Òò·¢Ã÷Çå¾²ÊÂÎñ²¢½ÓÄɲ½·¥½â¾ö£¬ÎªÇå¾²Æð¼û¹Ø±ÕÁËÍøÕ¾ºÍ²¿·ÖµêÄÚ·þÎñ£¬ÍŶÓÕýÒ¹ÒÔ¼ÌÈÕÊÂÇéÒÔÖÜÈ«»Ö¸´ÔËÓª£¬²¢¶Ô¿Í»§ÄÍÐÄÆÚ´ýÌåÏÖлл¡£Î¬¶àÀûÑǵÄÉñÃØ½²»°ÈËÌåÏÖ£¬¹«Ë¾ÒÑÔ¼ÇëÍⲿר¼ÒÊÓ²ì´ËÊÂÓ°Ï죬µ«ÉÐδ͸¶ÊÂÎñÐÔ×Ó£¬Í¬Ê±ÌåÏÖÒÑÁ¬Ã¦Æô¶¯Ó¦¶Ô¼Æ»®£¬¹Ø±ÕÍøÕ¾ºÍ²¿·ÖµêÄÚ·þÎñÒÔ·ÀÍòÒ»£¬ÕýÆð¾¢¿ìËÙÇå¾²»Ö¸´ÔËÓª£¬»á¼ÌÐøÎªÃŹÍÖ÷¹ËÌṩ·þÎñ¡£Åí²©ÐÂÎÅÉç¿´µ½µÄ·¢¸øÔ±¹¤µÄ֪ͨÖУ¬¸ÃÁãÊÛÉÌÊ×ϯִÐйÙÏ£ÀÀËÕÅåÆÕÒ²¼û¸æÔ±¹¤¡°ËÕÐÑÐèÒªÒ»¶Îʱ¼ä¡±¡£
https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/


¾©¹«Íø°²±¸11010802024551ºÅ