ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬³¬4.7Íò»áÔ±ÐÅϢй¶
Ðû²¼Ê±¼ä 2026-01-261. ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬³¬4.7Íò»áÔ±ÐÅϢй¶
1ÔÂ21ÈÕ£¬Å¦Ô¼Öݹ«ÎñÔ±¹¤»áϵͳ2025Äê5ÔÂ3ÈÕÖÁ31ÈÕÔâ¶ñÒâ¹¥»÷ÕßÇÖÈ벢DZÔÚ½üÒ»¸öÔ£¬µ¼Ö³¬4.7ÍòÃû»áԱСÎÒ˽¼ÒÐÅϢй¶¡£¸Ã¹¤»á×÷ΪÃÀ¹ú×î´óµÄ¹«¹²²¿·Ö¹ÍÔ±¹¤»á¡ª¡ªÖÝ¡¢ÏØ¡¢ÊйÍԱ͎á»áµÄ½¹µã³ÉÔ±µ¥Î»£¬´ú±íÔ¼30ÍòÃûÖݼ°µØ·½Õþ¸®¹ÍÔ±ÀûÒæ£¬´Ë´ÎÊÂÎñÒý·¢È«ÃÀÀ͹¤×éÖ¯ÍøÂçÇå¾²¹Ø×¢¡£¾Ý¹¤»áÏò»áÔ±·¢Ë͵Ä֪ͨº¯Åû¶£¬¹¥»÷ÕßÔÚϵͳÄÚÒ»Á¬Ô˶¯Ê±´ú£¬¿ÉÄÜ»ñÈ¡ÁË»áÔ±ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¹¤»áÓÚ5ÔÂÏÂÑ®·¢Ã÷δÊÚȨ»á¼ûºó£¬Á¬Ã¦Æô¶¯ÊӲ첢½ÓÄÉÏÂÏßϵͳ¡¢ÖØÖÃÃÜÂë¡¢°²ÅŸ߼¶Çå¾²¼ì²âÈí¼þµÈ²½·¥¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»ÓÃÓÚڲƻòÉí·ÝµÁÓõÄÖ±½ÓÖ¤¾Ý£¬µ«Éç»á°ü¹ÜºÅÂëµÄÖÕÉíΨһÐÔʹÆä³ÉΪºã¾ÃÍøÂçÇå¾²Òþ»¼£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÐÅÏ¢¿ªÉèÐéαÐÅ´ûÕË»§¡¢Ìá½»ÄÉ˰É걨µ¥»òÉêÁ츣Àû½òÌù£¬¸øÊܺ¦Õß´øÀ´Ò»Á¬Î£º¦¡£¹¤»áÒÑÓë¶¥¼âÍøÂçÇå¾²¼°Òþ˽±£»¤»ú¹¹ÏàÖú¿ªÕ¹ÊÓ²ìÓëÓ¦¼±´¦Öóͷ££¬²¢È·ÈÏÉæÊÂÊý¾Ý¹æÄ£ºóʵʱ֪ͨÊÜÓ°Ïì»áÔ±¡£¹Ù·½½¨ÒéÊÜÓ°ÏìÖ°Ô±°´ÆÚÉó²éÐÅÓñ¨¸æ¡¢ºË¶ÔÕË»§Õ˵¥Ã÷ϸ£¬Ç×½ü×¢ÖØ¿ÉÒÉÔ˶¯¡£
https://cybernews.com/security/new-york-csea-union-data-breach/
2. º«¹úÖÆÒ©¾ÞÍ·³¬800ÍòÌõÄÚ²¿ÐÅÏ¢¼°Ô±¹¤µµ°¸Ôâй¶
1ÔÂ21ÈÕ£¬º«¹ú×ÅÃûÒ©ÆóBoryungÖÆÒ©¿ËÈÕ±¬·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬Æä̻¶µÄMongoDBÊý¾Ý¿âÒòÎÞÈκÎÊÚȨ·À»¤£¬µ¼Ö³¬800ÍòÌõÄÚ²¿Í¨Ñ¶¼Í¼¼°½ü3500·ÝÔ±¹¤µµ°¸Íâй¡£¸ÃÊý¾Ý¿âÓÉÆóÒµ¼¶Í¨Ñ¶¹¤¾ßGW¼´Ê±Í¨Ñ¶Èí¼þʹÓã¬Ö±½ÓÃæÏò¹«¹²»¥ÁªÍø¿ª·ÅÍêÕû¶ÁȡȨÏÞ£¬Èκη¢Ã÷Õß¾ù¿ÉÎÞ×è°»á¼û¡£Ð¹Â¶Êý¾Ý·ÖΪÈý´óÀࣺһÊÇÔ±¹¤Éí·ÝÊý¾Ý£¬°üÀ¨È«Ãû¡¢ÆóÒµÓÊÏä¡¢Óû§Ãû¡¢¹þÏ£¼ÓÃÜÃÜÂë¼°×°±¸ÔªÊý¾Ý£¬¹¥»÷Õ߿ɽè´ËʵÑéÉí·ÝµÁÓûòÉç»á¹¤³Ìѧ¹¥»÷£¬ÉõÖÁͨ¹ýÀëÏßÆÆ½âÆÆÒëÃÜÂëºóÌᳫײ¿â¹¥»÷£»¶þÊÇÄÚ²¿Í¨Ñ¶¼Í¼£¬º¸Ç800ÍòÌõÉæ¼°ÉÌҵǢ̸¡¢ÈËÁ¦×ÊÔ´¡¢²ÆÎñ¡¢ÏîÄ¿ÖÎÀí¼°Ô±¹¤Ë½È˶Ի°µÄ̸Ìì¼Í¼£¬ÆäÖаüÀ¨µÄÄÚ²¿Á´½Ó¡¢IPµØµã¡¢Ñз¢¶¯Ì¬µÈÃô¸ÐÐÅÏ¢£¬¿ÉÄܱ»ÓÃÓÚÏµÍ³ÉøÍ¸»òαװԱ¹¤Éí·Ý£»ÈýÊÇϵͳԪÊý¾Ý£¬Èçʱ¼ä´Á¡¢ÐÂÎÅÇþµÀ¡¢Óû§-ÇþµÀ¶ÔÓ¦¹ØÏµµÈ£¬¿É¸¨Öú¹¥»÷Õß¹¹½¨¹¥»÷·¾¶¡£Ñо¿ÍŶÓÖ¸³ö£¬´ËÀàй¶¿ÉÄÜÒý·¢Á¬ËøÎ£º¦£º¹¥»÷Õß¿Éͨ¹ý̸Ìì¼Í¼ÖеÄϸ½Ú»ñÊØÐÅÍУ¬ÊµÑ龫׼թƣ»»òʹÓÃÆÆ½âµÄÃÜÂëÈëÇÖÆóҵϵͳ£¬ÇÔÈ¡¸ü¶àÉÌÒµÉñÃØ¡£Ö»¹ÜBoryungÉÐδ»ØÓ¦£¬µ«Ì»Â¶Êý¾Ý¿âÒѱ»¹Ø±Õ¡£
https://cybernews.com/security/boryung-corporation-leaks-internal-messages/
3. ɳ³æ×éÖ¯¹¥»÷²¨À¼ÄÜÔ´ÉèÊ©£¬°²ÅÅÐÂÐÍÊý¾Ý²Á³ýÈí¼þ
1ÔÂ24ÈÕ£¬²¨À¼µçÍø2025Äê12ÔÂÏÂÑ®ÔâÓöÓë¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯¡°É³³æ¡±£¨Sandworm£©Ïà¹ØµÄÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÊÔͼ°²ÅÅÃûΪ¡°DynoWiper¡±µÄÐÂÐÍÆÆËðÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þ¡£¾ÝÇå¾²¹«Ë¾ESET֤ʵ£¬´Ë´Î¹¥»÷±¬·¢ÓÚ12ÔÂ29ÈÕÖÁ30ÈÕ£¬Ä¿µÄÖ±Ö¸²¨À¼Á½×ùÈȵçÁª²ú³§¼°¿ÉÔÙÉúÄÜÔ´·¢µçÖÎÀíϵͳ£¨°üÀ¨·çÁ¦ÎÐÂÖ»úºÍ¹â·üµçÕ¾£©¡£²¨À¼×ÜÀíÌÆÄɵ¡¤Í¼Ë¹¿ËÔÚÐÂÎÅÐû²¼»áÉÏÃ÷È·Ö¸³ö£¬Ï®»÷ÓÉÓë¶íÂÞ˹Ç鱨²¿·ÖÖ±½Ó¹ØÁªµÄ×éÖ¯²ß»®¡£¡°É³³æ¡±£¨ÓÖÃûUAC-0113¡¢APT44¡¢Seashell Blizzard£©ÊǶíÂÞ˹×ÜÕÕÁϲ¿Ç鱨×ܾ֣¨GRU£©ÏÂÊô74455¾üʵ¥Î»µÄÒ»²¿·Ö£¬×Ô2009ÄêÆð»îÔ¾£¬ÒÔʵÑ鯯ËðÐÔ¹¥»÷ÖøÃû¡£ÆäÀúÊ·Õ½¼¨°üÀ¨2015Äê¶ÔÎÚ¿ËÀ¼µçÍøµÄ¹¥»÷£¬µ¼ÖÂÔ¼23ÍòÈ˶ϵ硣±¾´Î¹¥»÷ÖÐʹÓõÄDynoWiper¶ñÒâÈí¼þ»á±éÀúÎļþϵͳɾ³ýÎļþ£¬µ¼Ö²Ù×÷ϵͳ̱»¾£¬Ðèͨ¹ý±¸·ÝÖØÐÞ»òÖØÐÂ×°Öá£ESET½«Æä¼ì²âΪWin32/KillFiles.NMO£¬²¢Ðû²¼ÆäSHA-1¹þÏ£Öµ¡£
https://www.bleepingcomputer.com/news/security/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/
4. Call-On-DocÊý¾Ýй¶£¬Ó°ÏìÁè¼Ý100ÍòÃû»¼Õß
1ÔÂ24ÈÕ£¬Ô¶³ÌÒ½ÁÆ·þÎñÌṩÉÌCall-On-DocÐû³ÆÓµÓÐ200Íò»îÔ¾Óû§£¬¿ÉÖÎÁÆ150ÓàÖÖ¼²²¡£¬²¢ÔÊÐí½ÓÄÉ¡°×îÏȽø¡±Êý¾ÝÇå¾²²½·¥¼°ÍêÈ«ÇкÏHIPAA±ê×¼¡£È»¶ø£¬ºÚ¿ÍÂÛ̳Åû¶Æä12Ô³õÔâÈëÇÖ£¬1,144,223Ìõ»¼Õ߼ͼ±»ÇÔ£¬Éæ¼°»¼Õß´úÂë¡¢ÉúÒâ±àºÅ¡¢ÐÕÃû¡¢µØµã¡¢µç»°¡¢ÓÊÏä¡¢Ò½ÁÆÖÖ±ð¡¢Ïêϸ²¡Ö¢¡¢´¦·½¼°Ö§¸¶½ð¶îµÈÃô¸ÐÐÅÏ¢¡£ºÚ¿ÍÌṩÈýÕŰüÀ¨ÊýÊ®Ãû»¼ÕßÐÅÏ¢µÄ½ØÍ¼¼°1000ÌõÑù±¾Îļþ£¬¾ºË²é²¿·Ö»¼ÕߵصãÈÔÓÐÓã¬ÇÒÂô¼Ò½ÓÊܵÚÈý·½ÍйÜÉúÒ⣬Êý¾ÝÕæÊµÐԽϸߡ£´Ë´ÎÊÂÎñÒý·¢¶àÖØÕùÒé¡£Call-On-Doc½ÓÄÉ×Ô·Ñģʽ£¬²»´æ´¢°ü¹ÜÐÅÏ¢»òÉç±£ºÅ£¬ÆäHIPAAºÏ¹æÐÔ´æÒÉ£¬Èô½öͨ¹ýµç×Ó´«Êä¾ÙÐÐÊܱ£»¤ÉúÒâÔò¿ÉÄÜÊÜî¿Ïµ£¬²»È»ÈÔÊÜÖÝÖ´·¨¼°FTCÔ¼Êø¡£Èô±£´æ¡°ÔÊÐí׿ԽÇ徲ȴδ¶ÒÏÖ¡±µÄÓÕÆÐÐΪ£¬FTC¿ÉÒÀ¾Ý¡¶Áª°îÉÌҵίԱ»á·¨¡·ÊӲ졣ֵµÃ×¢ÖØµÄÊÇ£¬Call-On-DocÍøÕ¾FAQÉù³ÆÆäEHRϵͳ¡°ÍêÈ«ÇкÏHIPAA¡±£¬µ«¹¥»÷Õß³ÆÎ´·¢Ã÷¼ÓÃÜÖ¤¾Ý£¬ÇÒ¹¥»÷ʱ´ú»ú¹¹Î´²ì¾õ¡£
https://databreaches.net/2026/01/24/call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment/?pk_campaign=feed&pk_kwd=call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment
5. ShinyHuntersÀÕË÷ÍÅ»ïÌᳫSSOÓïÒô´¹ÂÚ¹¥»÷
1ÔÂ23ÈÕ£¬ShinyHuntersÀÕË÷ÍÅ»ï¿ËÈÕÐû³Æ£¬Õý¶ÔOkta¡¢Î¢Èí¼°¹È¸èµÄµ¥µãµÇ¼£¨SSO£©ÕË»§ÌᳫһÁ¬ÓïÒôÍøÂç´¹ÂÚ¹¥»÷£¬ÒÔÇÔÈ¡ÆóÒµÊý¾Ý²¢ÊµÑéÀÕË÷¡£¹¥»÷ÖУ¬ÍþвÐÐΪÕßð³äITÖ§³ÖÖ°Ô±£¬Í¨¹ýµç»°ÓÕÆÔ±¹¤ÔÚÄ£Ä⹫˾µÇ¼ÃÅ»§µÄ´¹ÂÚÍøÕ¾ÊäÈëÆ¾Ö¤ºÍ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©´úÂë¡£Ò»µ©¹¥ÆÆÏµÍ³£¬¹¥»÷Õ߿ɻá¼ûÊܺ¦ÕßSSOÕË»§£¬½ø¶øÅþÁ¬µ½ÆäËûÆóÒµÓ¦ÓÃÈçSalesforce¡¢Microsoft 365¡¢Google Workspace¡¢DropboxµÈ£¬ÕâЩƽ̨ͨ¹ýSSO¿ØÖÆÃæ°å¼¯³É£¬³ÉΪ½øÈëÆóҵϵͳºÍÊý¾ÝµÄÈë¿Ú¡£¹¥»÷ÕßʹÓÃÉç»á¹¤³ÌÊֶΣ¬ÔÚͨ»°ÖÐʵʱָµ¼Êܺ¦ÕßÍê³ÉµÇ¼ºÍMFAÑéÖ¤£¬ÉõÖÁ¶¯Ì¬µ÷½â´¹ÂÚÍøÕ¾ÄÚÈÝÒÔÆ¥ÅäÕæÊµ·þÎñµÄÑéÖ¤°ì·¨¡£OktaÒÑÐû²¼±¨¸æ£¬ÐÎòÁ˹¥»÷ÖÐʹÓõĴ¹ÂÚ¹¤¾ß°ü£¬°üÀ¨»ùÓÚWebµÄ¿ØÖÆÃæ°å£¬¿Éʵʱ¸Ä±äÊܺ¦Õß¿´µ½µÄÒ³ÃæÄÚÈÝ£¬¸¨ÖúÍê³ÉÑéÖ¤Àú³Ì¡£ShinyHunters֤ʵ¶Ô²¿·Ö¹¥»÷ÈÏÕæ£¬³ÆSalesforceΪÖ÷ҪĿµÄ£¬ÆäËû¹«Ë¾Îª¡°ÊÜÒæÕß¡±£¬²¢Ê¹ÓôËǰÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄµç»°ºÅÂ롢ְλÐÅÏ¢µÈÔöǿթƿÉÐŶȡ£
https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/
6. Under ArmourÔâEverestÀÕË÷Èí¼þ¹¥»÷
1ÔÂ23ÈÕ£¬ÃÀ¹úÔ˶¯ÒÂÊξÞÍ·Under ArmourÕýÊÓ²ìÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°7200ÍòÌõ¿Í»§¼Í¼±»¹ûÕæÖÁºÚ¿ÍÂÛ̳¡£¾Ý±¨µÀ£¬¸ÃÊÂÎñÓëEverestÀÕË÷Èí¼þÍÅ»ï2025Äê11ÔÂÌᳫµÄ¹¥»÷Ïà¹Ø£¬ºóÕßÔøÉù³ÆÇÔÈ¡343GBÊý¾Ý²¢ÊÔͼÀÕË÷Êê½ð¡£2026Äê1Ô£¬¿Í»§Êý¾ÝÔÚÈÈÃźڿÍÂÛ̳й¶£¬°üÀ¨7200Íò¸öµç×ÓÓʼþµØµã¼°ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢵ØÀíλÖᢹºÖüͼµÈÃô¸ÐÐÅÏ¢¡£×ÅÃûÊý¾Ýй¶׷×ÙÆ½Ì¨Have I Been Pwned֤ʵ£¬´Ë´Îй¶µÄÑù±¾Êý¾Ý°üÀ¨Êý°ÙÍòÌõUnder ArmourÖ÷¹Ë¹ºÖüͼ¼°Ô±¹¤µç×ÓÓʼþµØµã£¬Óë¸Ãƽ̨´Ëǰ±¨¸æÒ»Ö¡£Ð¹Â¶Êý¾Ýͨ¹ýºÚ¿ÍÂÛ̳¹ûÕæºó£¬Òý·¢ÆÕ±é¹Ø×¢£¬ÊÜÓ°ÏìÓû§ÒÑͨ¹ý¸Ãƽ̨ÊÕµ½Í¨Öª¡£Under Armour»ØÓ¦³Æ£¬¹«Ë¾ÕýÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÊÓ²ìÖ¸¿Ø£¬²¢Ç¿µ÷Ö§¸¶ÏµÍ³¼°Óû§ÃÜÂëδÊÜÓ°Ïì¡£¸Ã¹«Ë¾·ñ¶¨¡°ÊýÍòÍòÌõÃô¸Ð¼Í¼Ôâй¶¡±µÄ˵·¨£¬½öÈϿɡ°ÉÙÉÙÊý¿Í»§Ãô¸ÐÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡±£¬µ«Î´Ã÷È·ÏêϸÊýÄ¿¡£ÏÖÔÚ£¬¹«Ë¾Î´Åû¶¹¥»÷Èë¿Úµã»òÏêϸй¶Ե¹ÊÔÓÉ£¬Ò²Î´ËµÃ÷ÊÇ·ñÊÕµ½ÀÕË÷Êê½ðÒªÇó¡£
https://securityaffairs.com/187229/data-breach/investigation-underway-after-72m-under-armour-records-surface-online.html


¾©¹«Íø°²±¸11010802024551ºÅ