´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷

Ðû²¼Ê±¼ä 2025-07-22

1. ´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷


7ÔÂ21ÈÕ£¬´÷¶û¿Æ¼¼¹«Ë¾¿ËÈÕÈ·ÈÏÆä¿Í»§½â¾ö¼Æ»®ÖÐÐÄÆ½Ì¨ÔâÓöÍøÂçÇå¾²ÈëÇÖ£¬¹¥»÷ÕßΪ½üÆÚÖØ×éµÄÀÕË÷×éÖ¯World Leaks£¨Ç°ÉíΪHunters International£©¡£´Ë´ÎÊÂÎñ±¬·¢ÓÚ2025Äê7Ô³õ£¬Ä¿µÄÖ±Ö¸´÷¶ûÓÃÓÚÉÌÒµ¿Í»§²úÆ·ÑÝʾ¼°¿´·¨ÑéÖ¤²âÊԵĸôÀëÇéÐΡ£Ö»¹ÜÍþвÐÐΪÕßÀÖ³ÉÍ»ÆÆ¸Ãƽ̨£¬µ«´÷¶ûÇ¿µ÷ÆäÑÏ¿áµÄÇå¾²¼Ü¹¹ÓÐÓÃÏÞÖÆÁËËðʧ¹æÄ££¬¿Í»§ÏµÍ³¼°ÄÚ²¿ÍøÂçδÊܲ¨¼°¡£¾ÝÅû¶£¬ÈëÇÖÊÂÎñÖб»µÁÊý¾ÝÖ÷Òª°üÀ¨ºÏ³É²âÊÔÊý¾Ý¡¢¹ûÕæÑÝʾÊý¾Ý¼¯¼°·ÇÃô¸ÐϵͳÐÅÏ¢£¬Î¨Ò»Éæ¼°ÕæÊµÄÚÈݵĽöΪһ·ÝÓâÆÚÁªÏµÈËÃûµ¥£¬´÷¶û³ÆÆä"ÔËÓª¼ÛÖµ¼«µÍ"¡£¸Ãƽ̨×÷Ϊ×ÔÁ¦ÔËÐеÄÑÝʾÇéÐΣ¬ÓëÉú²úÍøÂç¡¢¿Í»§Êý¾Ý´æ´¢¿â¼°ÏàÖúͬ°éϵͳÍêÈ«¸ôÀ룬²¢ÉèÓÐÃ÷ȷեȡÉÏ´«Ãô¸ÐÊý¾ÝµÄЭÒé¡£´÷¶ûÇå¾²ÍŶÓÌåÏÖ£¬¶àÖØÍøÂç·Ö¶ÎºÍ¼à¿Ø»úÖÆÔÚÊÂÎñÖÐʩչÁËÒªº¦×÷Óã¬ÏÖÔÚÕýÒ»Á¬ÊӲ칥»÷·¾¶£¬µ«ÉÐδ·¢Ã÷¿Í»§Êý¾Ý»ò½¹µãϵͳÊÜÓ°ÏìµÄÖ¤¾Ý¡£


https://cybersecuritynews.com/dell-data-breach/


2. µÏ°Â×îÏÈÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ


7ÔÂ21ÈÕ£¬·¨¹úÉÝ³ÞÆ·ÅƵϰ£¨Dior£©¿ËÈÕÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬Õ¹ÏÖÆäÓÚ2025Äê1ÔÂ26ÈÕÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Î´¾­ÊÚȨ»á¼û¡£×÷ΪȫÇò×î´óÉÝ³ÞÆ·¼¯ÍÅLVMHÆìϽ¹µãÆ·ÅÆ£¬µÏ°ÂÄêÊÕÈ볬120ÒÚÃÀÔª£¬ÔÚÈ«ÇòÔËÓªÊý°Ù¼Ò¾«Æ·µê£¬´Ë´ÎÊÂÎñÒý·¢¶ÔÆäÊý¾ÝÇå¾²ÖÎÀíµÄ¹Ø×¢¡£Æ¾Ö¤Í¨Öª£¬µÏ°ÂÓÚ2025Äê5ÔÂ7ÈÕ·¢Ã÷Êý¾Ý¿âÔâÈëÇÖ£¬Ëæ¼´Æô¶¯ÄÚ²¿ÊӲ졣ÊÓ²ìÈ·ÈÏ£¬¹¥»÷Õß»ñÈ¡Á˰üÀ¨È«Ãû¡¢ÁªÏµ·½·¨¡¢ÏÖʵµØµã¡¢³öÉúÈÕÆÚ£¬ÒÔ¼°²¿·Ö¿Í»§µÄ»¤ÕÕ/Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢Éç»áÇå¾²ºÅÂëµÄÐÅÏ¢£¬µ«Î´Éæ¼°ÒøÐÐÕË»§»òÖ§¸¶¿¨µÈ²ÆÎñÊý¾Ý¡£µÏ°ÂÇ¿µ÷ÒÑѸËÙ½ÓÄÉ¿ØÖƲ½·¥£¬ÏÖÔÚÎÞÖ¤¾ÝÅúעϵͳ±»Ò»Á¬ÈëÇÖ£¬²¢ÒÑִ֪ͨ·¨²¿·Ö¼°Ô¼ÇëµÚÈý·½ÍøÂçÇ徲ר¼ÒЭÖúÓ¦¶Ô¡£Îª»º½âÓ°Ï죬µÏ°ÂΪÊÜÓ°ÏìÓû§ÌṩÃâ·Ñ24¸öÔÂÐÅÓÃ¼à¿ØÓëÉí·Ý͵ÇÔ±£»¤·þÎñ£¬Í¬Ê±½¨Òé¿Í»§Ð¡ÐÄÕ©Æ­¡¢ÍøÂç´¹ÂÚ¼°½ðÈÚÕË»§Òì³£Ô˶¯¡£


https://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/


3. Ó¡¶È¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX 4420ÍòÃÀÔª¼ÓÃÜ×ʲú±»µÁ


7ÔÂ21ÈÕ£¬Ó¡¶ÈÍ·²¿¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX¿ËÈÕÈ·ÈÏ£¬ÆäÒ»¸öÄÚ²¿ÔËÓªÕË»§ÔâÓöÇå¾²Îó²î£¬µ¼Ö¼ÛÖµÔ¼4420ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¾ÝCoinDCXÍŽáÊ×´´È˼æÊ×ϯִÐйÙSumit GuptaÔÚXƽ̨Åû¶£¬±»ÈëÇÖÕË»§½öÓÃÓÚÔÚÏàÖúÉúÒâËùÌṩÁ÷¶¯ÐÔ£¬ÊôÓÚÄÚ²¿ÔËÓªÕË»§£¬Óë¿Í»§×ʽðÍêÈ«¸ôÀë¡£ËûÇ¿µ÷£¬ËùÓпͻ§×ʲú¾ùδÊÜÓ°Ï죬Σº¦³¨¿ÚÓɹ«Ë¾×ÔÓÐ×ʽ𴢱¸¼ç¸º¡£¼ÓÃÜÇå¾²Ñо¿Ô±ZachXBTͨ¹ýTelegramƵµÀ½øÒ»²½ÆÊÎö£¬¹¥»÷Õߵصã×î³õͨ¹ýTornado Cash»ì±Ò·þÎñ»ñµÃ1öÒÔÌ«·»£¨ETH£©×ÊÖú£¬Ëæºó½«²¿·Ö±»µÁ×ʽð¾­Solana-ÒÔÌ«·»¿çÁ´ÇÅ×ªÒÆ£¬×îÖպϲ¢Îª4,443öETHºÍ155,830öSolana£¨SOL£©£¬ÏÖÔÚ´¦ÓÚÐÝÃß״̬¡£CoinDCXÌåÏÖÕýÓëÓ¡¶ÈÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-In£©¼°ÏàÖúÉúÒâËùЭͬÊӲ졣Ϊ¼ÓËÙ×ʽð×·»Ø£¬CoinDCXÓÚÖÜÒ»Æô¶¯¡°×·»ØÉͽð¡±ÍýÏ룬ÔÊÐíÏòЭÖú×·×Ù»òÕһر»µÁ×ʲúµÄСÎÒ˽¼Ò»ò»ú¹¹Ìṩ×î¸ß25%µÄ×·»Ø½ð¶î×÷Ϊ½±Àø¡£


https://techcrunch.com/2025/07/21/indian-crypto-exchange-coindcx-confirms-44-million-stolen-during-hack/


4. ÒÁÀʹØÁª°²×¿Ìع¤Èí¼þDCHSpyαװ³ÉVPN¼à¿ØÄ¿µÄÈËÊ¿


7ÔÂ21ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һ¿îÓëÒÁÀÊÇ鱨ÓëÇå¾²²¿£¨MOIS£©Ïà¹ØµÄÐÂÐͰ²×¿Ìع¤Èí¼þDCHSpy£¬¸ÃÈí¼þͨ¹ýαװ³ÉVPNÓ¦Óü°SpaceXÐÇÁ´£¨Starlink£©ÎÀÐÇ»¥ÁªÍø·þÎñ£¬Õë¶ÔÖж«µØÇøÓû§ÊµÑ鶨Ïò¹¥»÷¡£Òƶ¯Çå¾²¹©Ó¦ÉÌLookoutÖ¸³ö£¬DCHSpyÑù±¾×îÔçÓÚ2024Äê7Ô±»·¢Ã÷£¬Æä¿ª·¢ÕßΪÒÁÀʹú¼ÒÅä¾°ºÚ¿Í×éÖ¯MuddyWater£¨ÓÖÃûBoggy Serpens¡¢TA450µÈ£©£¬½üÆÚÔÚÒÔÉ«ÁÐ-ÒÁÀʳåÍ»±¬·¢ºóÒ»ÖÜÄÚ·ºÆðбäÖÖ£¬ÌåÏÖÆäÔ˶¯ÓëµØÇøÊ±ÊÆÏ¸ÃܹØÁª¡£DCHSpyΪÄ£¿é»¯Ä¾Âí£¬¾ß±¸¶àÏîÊý¾ÝÇÔÈ¡¹¦Ð§£¬°üÀ¨ÍøÂçWhatsAppÐÅÏ¢¡¢ÕË»§Æ¾Ö¤¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼¡¢Î»ÖÃÊý¾Ý£¬²¢¿ÉÔ¶³Ì¼Òô¡¢ÕÕÏ༰ÇÔÈ¡Îļþ¡£ÔçÆÚ°æ±¾Í¨¹ýTelegramÇþµÀÈö²¥£¬ÒÔ×èµ²ÒÁÀÊÕþȨµÄÖ÷ÌâÄÚÈÝΪÓÕ¶ü£¬Õë¶ÔÓ¢ÓïºÍ²¨Ë¹ÓïÓû§£¬Ä¿µÄȺÌåÒÉËÆÎªÒìÒéÈËÊ¿¡¢»î¸ÐÈËÊ¿¼°¼ÇÕß¡£×îбäÖÖÔò½øÒ»²½Éý¼¶Èö²¥ÊֶΣ¬Î±×°³É¡°Earth VPN¡±¡°Comodo VPN¡±¡°Hide VPN¡±µÈ¿´ËÆÊÊÓõÄVPNÓ¦Óã¬ÉõÖÁʹÓá°starlink_vpn(1.3.0).apk¡±ÎļþÃûÄ£ÄâÐÇÁ´·þÎñ¾ÙÐзַ¢¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ÐÇÁ´ÎÀÐÇ»¥ÁªÍø·þÎñÉÏÔ¸ÕÔÚÒÁÀÊÕþ¸®ÊµÑéÍøÂç·â±Õʱ´ú±»¼¤»î£¬Ëæºó¸Ã¹úÒé»á½«Æä²»·¨»¯£¬´Ë´Î¶ñÒâÈí¼þ½èÐÇÁ´ÃûÒåÈö²¥£¬»òÖ¼ÔÚʹÓÃÓû§¶ÔÊÜÏÞ·þÎñµÄÆÈÇÐÐèÇó¡£


https://thehackernews.com/2025/07/iran-linked-dchspy-android-malware.html


5. ÍøÂç´¹ÂÚʹÓÃ.LNKÎļþÓëLOLBinÊÖÒÕÈö²¥DeerStealer¶ñÒâÈí¼þ


7ÔÂ22ÈÕ£¬¿ËÈÕ£¬Ò»ÖÖÐÂÐÍÖØ´óÍøÂç´¹ÂÚÔ˶¯±»ÆØ¹â£¬Æäͨ¹ýÎäÆ÷»¯µÄWindows¿ì½Ý·½·¨Îļþ£¨.LNK£©Èö²¥DeerStealer¶ñÒâÈí¼þ£¬Ê¹Óá°Living off the Land¡±£¨LOLBin£©ÊÖÒÕŲÓÃÕýµ±ÏµÍ³¶þ½øÖÆÎļþ£¬¹¹½¨¶à½×¶Î¹¥»÷Á´ÒÔÈÆ¹ý¹Å°åÇå¾²·À»¤¡£¸ÃÔ˶¯ÓÉLinkedInÆÊÎöʦ¼°Ñо¿Ö°Ô±·¢Ã÷£¬ÒòÆä½ÓÄɸ߽׹æ±ÜÕ½ÂÔ²¢ÀÄÓÃ΢ÈíÔ­Éú¹¤¾ß£¬±»ÊÓΪ¶ñÒâÈí¼þת´ï»úÖÆµÄÖØ´óÑݽø¡£¹¥»÷ÒÔαװ³É¡°Report.lnk¡±µÄÕýµ±PDFÎĵµÎªÆðµã£¬ÏÖʵ´¥·¢È«ÐÄÉè¼ÆµÄÎå½×¶ÎÖ´ÐÐÁ´£º.LNKÎļþÊ×ÏÈÉñÃØÅ²ÓÃMicrosoft HTMLÓ¦ÓóÌÐòÖ÷»úmshta.exe£¬Í¨¹ý¶¯Ì¬ÆÊÎöSystem32Ŀ¼·¾¶²¢×¢Èë»ìÏýµÄBase64¾ç±¾£¬½ûÓÃÈÕÖ¾¼Í¼ÓëÆÊÎö¹¦Ð§ÒÔ½µµÍ·¨Ò½¿É¼ûÐÔ¡£Ëæºó£¬¹¥»÷Á´ÒÀ´Î¾­cmd.exe¡¢PowerShell²ã²ãµÝ½ø£¬×îÖÕÔÚAppDataĿ¼¾²Ä¬°²ÅÅDeerStealerÖ÷³ÌÐò¡£ÎªÊèÉ¢Êܺ¦Õß×¢ÖØÁ¦£¬ÏµÍ³Í¬Ê±ÏÂÔØ²¢·­¿ªÕýµ±PDFÓÕ¶üÎļþ£¬ÑÚÊζñÒâÈí¼þ×°ÖÃÐÐΪ¡£


https://cybersecuritynews.com/deerstealer-malware-delivered/


6. °ÙÄêÎïÁ÷¾ÞÍ·ÒòÃÜÂëй¶ÔâÀÕË÷¹¥»÷ÐÝÒµ


7ÔÂ21ÈÕ£¬Ó¢¹ú±±°²ÆÕ¶Ø¿¤°ÙÄêÔËÊäÆóÒµKNP LogisticsÒòAkiraÀÕË÷Èí¼þ¹¥»÷ÏÝÈëÐÝÒµÖÎÀí£¬µ¼ÖÂ730ÃûÔ±¹¤Ê§Òµ£¬³ÉΪ2024ÄêÓ¢¹úÆóÒµÔâÓöÍøÂç¹¥»÷µÄ±ê¼ÇÐÔ°¸Àý¡£Õâ¼Ò½¨ÉèÓÚ1865ÄêµÄ¼Ò×åÆóÒµ£¬ÓÚÎôʱ6ÔÂÒòÔ±¹¤ÃÜÂëй¶±»ºÚ¿ÍÈëÇÖ£¬¹¥»÷Õßͨ¹ýÍÆ²â¼òµ¥ÕË»§Æ¾Ö¤ÀÖ³ÉÉøÍ¸ÏµÍ³£¬°²ÅÅÀÕË÷Èí¼þ¼ÓÃÜÒªº¦Êý¾Ý²¢Ë÷ÒªÔ¼500ÍòÓ¢°÷Êê½ð¡£Ö»¹ÜKNPδ֧¸¶Êê½ð£¬µ«¹¥»÷ÈÔ³¹µ×̱»¾ÆäÔËÓª¡¢²ÆÎñ¼Í¼»á¼û¼°ÐÂ×ʽð»ñÈ¡ÄÜÁ¦£¬×îÖÕÆÈʹÕâ¼ÒÓµÓÐ158ÄêÀúÊ·µÄÆóÒµµ¹±Õ¡£´Ë´ÎÊÂÎñ̻¶ÁËÖÐСÆóÒµÍøÂçÇå¾²·À»¤µÄÖÂÃüÈõµã¡£KNPÖ÷¹Ü±£ÂÞ¡¤°¢²©ÌØÍ¸Â¶£¬ÉæÊÂÔ±¹¤ÖÁ½ñδ±»¼û¸æÆäÃÜÂëй¶ֱ½Óµ¼Ö¹«Ë¾Í߽⣬͹ÏÔÍøÂç¹¥»÷¶ÔÔ±¹¤ÐÄÀíµÄ¶þ´ÎΣÏÕ¡£ÍøÂçÇ徲ר¼ÒÇ¿µ÷£¬»ù´¡ÃÜÂëÇå¾²ÈÔÊÇÖ÷Òª·ÀµØ£¬96%µÄ³£ÓÃÃÜÂë¿ÉÔÚ1ÃëÄÚ±»ÆÆ½â¹¤¾ß¹¥ÆÆ£¬¶øÔ±¹¤¿çÕË»§Öظ´Ê¹ÓÃÃÜÂëµÄϰ¹ß½øÒ»²½¼Ó¾çΣº¦¡£


https://cybersecuritynews.com/weak-password-destroy-158-year-old-company/