ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ £¬³¬4.7Íò»áÔ±ÐÅϢй¶

Ðû²¼Ê±¼ä 2026-01-26

1. ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ £¬³¬4.7Íò»áÔ±ÐÅϢй¶


1ÔÂ21ÈÕ £¬Å¦Ô¼Öݹ«ÎñÔ±¹¤»áϵͳ2025Äê5ÔÂ3ÈÕÖÁ31ÈÕÔâ¶ñÒâ¹¥»÷ÕßÇÖÈ벢DZÔÚ½üÒ»¸öÔ £¬µ¼Ö³¬4.7ÍòÃû»áԱСÎÒ˽¼ÒÐÅϢй¶¡£¸Ã¹¤»á×÷ΪÃÀ¹ú×î´óµÄ¹«¹²²¿·Ö¹ÍÔ±¹¤»á¡ª¡ªÖÝ¡¢ÏØ¡¢ÊйÍԱ͎á»áµÄ½¹µã³ÉÔ±µ¥Î» £¬´ú±íÔ¼30ÍòÃûÖݼ°µØ·½Õþ¸®¹ÍÔ±ÀûÒæ £¬´Ë´ÎÊÂÎñÒý·¢È«ÃÀÀ͹¤×éÖ¯ÍøÂçÇå¾²¹Ø×¢¡£¾Ý¹¤»áÏò»áÔ±·¢Ë͵Ä֪ͨº¯Åû¶ £¬¹¥»÷ÕßÔÚϵͳÄÚÒ»Á¬Ô˶¯Ê±´ú £¬¿ÉÄÜ»ñÈ¡ÁË»áÔ±ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¹¤»áÓÚ5ÔÂÏÂÑ®·¢Ã÷δÊÚȨ»á¼ûºó £¬Á¬Ã¦Æô¶¯ÊӲ첢½ÓÄÉÏÂÏßϵͳ¡¢ÖØÖÃÃÜÂë¡¢°²ÅŸ߼¶Çå¾²¼ì²âÈí¼þµÈ²½·¥¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»ÓÃÓÚڲƭ»òÉí·ÝµÁÓõÄÖ±½ÓÖ¤¾Ý £¬µ«Éç»á°ü¹ÜºÅÂëµÄÖÕÉíΨһÐÔʹÆä³ÉΪºã¾ÃÍøÂçÇå¾²Òþ»¼ £¬¹¥»÷Õß¿ÉʹÓÃÕâЩÐÅÏ¢¿ªÉèÐéαÐÅ´ûÕË»§¡¢Ìá½»ÄÉ˰É걨µ¥»òÉêÁ츣Àû½òÌù £¬¸øÊܺ¦Õß´øÀ´Ò»Á¬Î£º¦¡£¹¤»áÒÑÓë¶¥¼âÍøÂçÇå¾²¼°Òþ˽±£»¤»ú¹¹ÏàÖú¿ªÕ¹ÊÓ²ìÓëÓ¦¼±´¦Öóͷ£ £¬²¢È·ÈÏÉæÊÂÊý¾Ý¹æÄ£ºóʵʱ֪ͨÊÜÓ°Ïì»áÔ±¡£¹Ù·½½¨ÒéÊÜÓ°ÏìÖ°Ô±°´ÆÚÉó²éÐÅÓñ¨¸æ¡¢ºË¶ÔÕË»§Õ˵¥Ã÷ϸ £¬Ç×½ü×¢ÖØ¿ÉÒÉÔ˶¯¡£


https://cybernews.com/security/new-york-csea-union-data-breach/


2. º«¹úÖÆÒ©¾ÞÍ·³¬800ÍòÌõÄÚ²¿ÐÅÏ¢¼°Ô±¹¤µµ°¸Ôâй¶


1ÔÂ21ÈÕ £¬º«¹ú×ÅÃûÒ©ÆóBoryungÖÆÒ©¿ËÈÕ±¬·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ £¬Æä̻¶µÄMongoDBÊý¾Ý¿âÒòÎÞÈκÎÊÚȨ·À»¤ £¬µ¼Ö³¬800ÍòÌõÄÚ²¿Í¨Ñ¶¼Í¼¼°½ü3500·ÝÔ±¹¤µµ°¸Íâй¡£¸ÃÊý¾Ý¿âÓÉÆóÒµ¼¶Í¨Ñ¶¹¤¾ßGW¼´Ê±Í¨Ñ¶Èí¼þʹÓà £¬Ö±½ÓÃæÏò¹«¹²»¥ÁªÍø¿ª·ÅÍêÕû¶ÁȡȨÏÞ £¬Èκη¢Ã÷Õß¾ù¿ÉÎÞ×è°­»á¼û¡£Ð¹Â¶Êý¾Ý·ÖΪÈý´óÀࣺһÊÇÔ±¹¤Éí·ÝÊý¾Ý £¬°üÀ¨È«Ãû¡¢ÆóÒµÓÊÏä¡¢Óû§Ãû¡¢¹þÏ£¼ÓÃÜÃÜÂë¼°×°±¸ÔªÊý¾Ý £¬¹¥»÷Õ߿ɽè´ËʵÑéÉí·ÝµÁÓûòÉç»á¹¤³Ìѧ¹¥»÷ £¬ÉõÖÁͨ¹ýÀëÏßÆÆ½âÆÆÒëÃÜÂëºóÌᳫײ¿â¹¥»÷£»¶þÊÇÄÚ²¿Í¨Ñ¶¼Í¼ £¬º­¸Ç800ÍòÌõÉæ¼°ÉÌҵǢ̸¡¢ÈËÁ¦×ÊÔ´¡¢²ÆÎñ¡¢ÏîÄ¿ÖÎÀí¼°Ô±¹¤Ë½È˶Ի°µÄ̸Ìì¼Í¼ £¬ÆäÖаüÀ¨µÄÄÚ²¿Á´½Ó¡¢IPµØµã¡¢Ñз¢¶¯Ì¬µÈÃô¸ÐÐÅÏ¢ £¬¿ÉÄܱ»ÓÃÓÚÏµÍ³ÉøÍ¸»òαװԱ¹¤Éí·Ý£»ÈýÊÇϵͳԪÊý¾Ý £¬Èçʱ¼ä´Á¡¢ÐÂÎÅÇþµÀ¡¢Óû§-ÇþµÀ¶ÔÓ¦¹ØÏµµÈ £¬¿É¸¨Öú¹¥»÷Õß¹¹½¨¹¥»÷·¾¶¡£Ñо¿ÍŶÓÖ¸³ö £¬´ËÀàй¶¿ÉÄÜÒý·¢Á¬ËøÎ£º¦£º¹¥»÷Õß¿Éͨ¹ý̸Ìì¼Í¼ÖеÄϸ½Ú»ñÊØÐÅÍÐ £¬ÊµÑ龫׼թƭ£»»òʹÓÃÆÆ½âµÄÃÜÂëÈëÇÖÆóҵϵͳ £¬ÇÔÈ¡¸ü¶àÉÌÒµÉñÃØ¡£Ö»¹ÜBoryungÉÐδ»ØÓ¦ £¬µ«Ì»Â¶Êý¾Ý¿âÒѱ»¹Ø±Õ¡£


https://cybernews.com/security/boryung-corporation-leaks-internal-messages/


3. ɳ³æ×éÖ¯¹¥»÷²¨À¼ÄÜÔ´ÉèÊ© £¬°²ÅÅÐÂÐÍÊý¾Ý²Á³ýÈí¼þ


1ÔÂ24ÈÕ £¬²¨À¼µçÍø2025Äê12ÔÂÏÂÑ®ÔâÓöÓë¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯¡°É³³æ¡±£¨Sandworm£©Ïà¹ØµÄÍøÂç¹¥»÷ £¬¸Ã×éÖ¯ÊÔͼ°²ÅÅÃûΪ¡°DynoWiper¡±µÄÐÂÐÍÆÆËðÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þ¡£¾ÝÇå¾²¹«Ë¾ESET֤ʵ £¬´Ë´Î¹¥»÷±¬·¢ÓÚ12ÔÂ29ÈÕÖÁ30ÈÕ £¬Ä¿µÄÖ±Ö¸²¨À¼Á½×ùÈȵçÁª²ú³§¼°¿ÉÔÙÉúÄÜÔ´·¢µçÖÎÀíϵͳ£¨°üÀ¨·çÁ¦ÎÐÂÖ»úºÍ¹â·üµçÕ¾£©¡£²¨À¼×ÜÀíÌÆÄɵ¡¤Í¼Ë¹¿ËÔÚÐÂÎÅÐû²¼»áÉÏÃ÷È·Ö¸³ö £¬Ï®»÷ÓÉÓë¶íÂÞ˹Ç鱨²¿·ÖÖ±½Ó¹ØÁªµÄ×éÖ¯²ß»®¡£¡°É³³æ¡±£¨ÓÖÃûUAC-0113¡¢APT44¡¢Seashell Blizzard£©ÊǶíÂÞ˹×ÜÕÕÁϲ¿Ç鱨×ܾ֣¨GRU£©ÏÂÊô74455¾üʵ¥Î»µÄÒ»²¿·Ö £¬×Ô2009ÄêÆð»îÔ¾ £¬ÒÔʵÑ鯯ËðÐÔ¹¥»÷ÖøÃû¡£ÆäÀúÊ·Õ½¼¨°üÀ¨2015Äê¶ÔÎÚ¿ËÀ¼µçÍøµÄ¹¥»÷ £¬µ¼ÖÂÔ¼23ÍòÈ˶ϵç¡£±¾´Î¹¥»÷ÖÐʹÓõÄDynoWiper¶ñÒâÈí¼þ»á±éÀúÎļþϵͳɾ³ýÎļþ £¬µ¼Ö²Ù×÷ϵͳ̱»¾ £¬Ðèͨ¹ý±¸·ÝÖØÐÞ»òÖØÐÂ×°Öá£ESET½«Æä¼ì²âΪWin32/KillFiles.NMO £¬²¢Ðû²¼ÆäSHA-1¹þÏ£Öµ¡£


https://www.bleepingcomputer.com/news/security/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/


4. Call-On-DocÊý¾Ýй¶ £¬Ó°ÏìÁè¼Ý100ÍòÃû»¼Õß


1ÔÂ24ÈÕ £¬Ô¶³ÌÒ½ÁÆ·þÎñÌṩÉÌCall-On-DocÐû³ÆÓµÓÐ200Íò»îÔ¾Óû§ £¬¿ÉÖÎÁÆ150ÓàÖÖ¼²²¡ £¬²¢ÔÊÐí½ÓÄÉ¡°×îÏȽø¡±Êý¾ÝÇå¾²²½·¥¼°ÍêÈ«ÇкÏHIPAA±ê×¼¡£È»¶ø £¬ºÚ¿ÍÂÛ̳Åû¶Æä12Ô³õÔâÈëÇÖ £¬1,144,223Ìõ»¼Õ߼ͼ±»ÇÔ £¬Éæ¼°»¼Õß´úÂë¡¢ÉúÒâ±àºÅ¡¢ÐÕÃû¡¢µØµã¡¢µç»°¡¢ÓÊÏä¡¢Ò½ÁÆÖÖ±ð¡¢Ïêϸ²¡Ö¢¡¢´¦·½¼°Ö§¸¶½ð¶îµÈÃô¸ÐÐÅÏ¢¡£ºÚ¿ÍÌṩÈýÕŰüÀ¨ÊýÊ®Ãû»¼ÕßÐÅÏ¢µÄ½ØÍ¼¼°1000ÌõÑù±¾Îļþ £¬¾­ºË²é²¿·Ö»¼ÕߵصãÈÔÓÐÓà £¬ÇÒÂô¼Ò½ÓÊܵÚÈý·½ÍйÜÉúÒâ £¬Êý¾ÝÕæÊµÐԽϸß¡£´Ë´ÎÊÂÎñÒý·¢¶àÖØÕùÒé¡£Call-On-Doc½ÓÄÉ×Ô·Ñģʽ £¬²»´æ´¢°ü¹ÜÐÅÏ¢»òÉç±£ºÅ £¬ÆäHIPAAºÏ¹æÐÔ´æÒÉ £¬Èô½öͨ¹ýµç×Ó´«Êä¾ÙÐÐÊܱ£»¤ÉúÒâÔò¿ÉÄÜÊÜî¿Ïµ £¬²»È»ÈÔÊÜÖÝÖ´·¨¼°FTCÔ¼Êø¡£Èô±£´æ¡°ÔÊÐí׿ԽÇ徲ȴδ¶ÒÏÖ¡±µÄÓÕÆ­ÐÐΪ £¬FTC¿ÉÒÀ¾Ý¡¶Áª°îÉÌҵίԱ»á·¨¡·ÊӲ졣ֵµÃ×¢ÖØµÄÊÇ £¬Call-On-DocÍøÕ¾FAQÉù³ÆÆäEHRϵͳ¡°ÍêÈ«ÇкÏHIPAA¡± £¬µ«¹¥»÷Õß³ÆÎ´·¢Ã÷¼ÓÃÜÖ¤¾Ý £¬ÇÒ¹¥»÷ʱ´ú»ú¹¹Î´²ì¾õ¡£


https://databreaches.net/2026/01/24/call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment/?pk_campaign=feed&pk_kwd=call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment


5. ShinyHuntersÀÕË÷ÍÅ»ïÌᳫSSOÓïÒô´¹ÂÚ¹¥»÷


1ÔÂ23ÈÕ £¬ShinyHuntersÀÕË÷ÍÅ»ï¿ËÈÕÐû³Æ £¬Õý¶ÔOkta¡¢Î¢Èí¼°¹È¸èµÄµ¥µãµÇ¼£¨SSO£©ÕË»§ÌᳫһÁ¬ÓïÒôÍøÂç´¹ÂÚ¹¥»÷ £¬ÒÔÇÔÈ¡ÆóÒµÊý¾Ý²¢ÊµÑéÀÕË÷¡£¹¥»÷ÖÐ £¬ÍþвÐÐΪÕßð³äITÖ§³ÖÖ°Ô± £¬Í¨¹ýµç»°ÓÕÆ­Ô±¹¤ÔÚÄ£Ä⹫˾µÇ¼ÃÅ»§µÄ´¹ÂÚÍøÕ¾ÊäÈëÆ¾Ö¤ºÍ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©´úÂë¡£Ò»µ©¹¥ÆÆÏµÍ³ £¬¹¥»÷Õ߿ɻá¼ûÊܺ¦ÕßSSOÕË»§ £¬½ø¶øÅþÁ¬µ½ÆäËûÆóÒµÓ¦ÓÃÈçSalesforce¡¢Microsoft 365¡¢Google Workspace¡¢DropboxµÈ £¬ÕâЩƽ̨ͨ¹ýSSO¿ØÖÆÃæ°å¼¯³É £¬³ÉΪ½øÈëÆóҵϵͳºÍÊý¾ÝµÄÈë¿Ú¡£¹¥»÷ÕßʹÓÃÉç»á¹¤³ÌÊÖ¶Î £¬ÔÚͨ»°ÖÐʵʱָµ¼Êܺ¦ÕßÍê³ÉµÇ¼ºÍMFAÑéÖ¤ £¬ÉõÖÁ¶¯Ì¬µ÷½â´¹ÂÚÍøÕ¾ÄÚÈÝÒÔÆ¥ÅäÕæÊµ·þÎñµÄÑéÖ¤°ì·¨¡£OktaÒÑÐû²¼±¨¸æ £¬ÐÎòÁ˹¥»÷ÖÐʹÓõĴ¹ÂÚ¹¤¾ß°ü £¬°üÀ¨»ùÓÚWebµÄ¿ØÖÆÃæ°å £¬¿Éʵʱ¸Ä±äÊܺ¦Õß¿´µ½µÄÒ³ÃæÄÚÈÝ £¬¸¨ÖúÍê³ÉÑéÖ¤Àú³Ì¡£ShinyHunters֤ʵ¶Ô²¿·Ö¹¥»÷ÈÏÕæ £¬³ÆSalesforceΪÖ÷ҪĿµÄ £¬ÆäËû¹«Ë¾Îª¡°ÊÜÒæÕß¡± £¬²¢Ê¹ÓôËǰÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄµç»°ºÅÂ롢ְλÐÅÏ¢µÈÔöǿթƭ¿ÉÐŶÈ¡£


https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/


6. Under ArmourÔâEverestÀÕË÷Èí¼þ¹¥»÷


1ÔÂ23ÈÕ £¬ÃÀ¹úÔ˶¯ÒÂÊξÞÍ·Under ArmourÕýÊÓ²ìÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ £¬Éæ¼°7200ÍòÌõ¿Í»§¼Í¼±»¹ûÕæÖÁºÚ¿ÍÂÛ̳¡£¾Ý±¨µÀ £¬¸ÃÊÂÎñÓëEverestÀÕË÷Èí¼þÍÅ»ï2025Äê11ÔÂÌᳫµÄ¹¥»÷Ïà¹Ø £¬ºóÕßÔøÉù³ÆÇÔÈ¡343GBÊý¾Ý²¢ÊÔͼÀÕË÷Êê½ð¡£2026Äê1Ô £¬¿Í»§Êý¾ÝÔÚÈÈÃźڿÍÂÛ̳й¶ £¬°üÀ¨7200Íò¸öµç×ÓÓʼþµØµã¼°ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢵ØÀíλÖᢹºÖüͼµÈÃô¸ÐÐÅÏ¢¡£×ÅÃûÊý¾Ýй¶׷×ÙÆ½Ì¨Have I Been Pwned֤ʵ £¬´Ë´Îй¶µÄÑù±¾Êý¾Ý°üÀ¨Êý°ÙÍòÌõUnder ArmourÖ÷¹Ë¹ºÖüͼ¼°Ô±¹¤µç×ÓÓʼþµØµã £¬Óë¸Ãƽ̨´Ëǰ±¨¸æÒ»Ö¡£Ð¹Â¶Êý¾Ýͨ¹ýºÚ¿ÍÂÛ̳¹ûÕæºó £¬Òý·¢ÆÕ±é¹Ø×¢ £¬ÊÜÓ°ÏìÓû§ÒÑͨ¹ý¸Ãƽ̨ÊÕµ½Í¨Öª¡£Under Armour»ØÓ¦³Æ £¬¹«Ë¾ÕýÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÊÓ²ìÖ¸¿Ø £¬²¢Ç¿µ÷Ö§¸¶ÏµÍ³¼°Óû§ÃÜÂëδÊÜÓ°Ïì¡£¸Ã¹«Ë¾·ñ¶¨¡°ÊýÍòÍòÌõÃô¸Ð¼Í¼Ôâй¶¡±µÄ˵·¨ £¬½öÈϿɡ°ÉÙÉÙÊý¿Í»§Ãô¸ÐÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡± £¬µ«Î´Ã÷È·ÏêϸÊýÄ¿¡£ÏÖÔÚ £¬¹«Ë¾Î´Åû¶¹¥»÷Èë¿Úµã»òÏêϸй¶Ե¹ÊÔ­ÓÉ £¬Ò²Î´ËµÃ÷ÊÇ·ñÊÕµ½ÀÕË÷Êê½ðÒªÇó¡£


https://securityaffairs.com/187229/data-breach/investigation-underway-after-72m-under-armour-records-surface-online.html