Ó¢¹ú»Ê¼ÒÓÊÕþÔâ³Á´óÊý¾Ýй¶ £¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â

°ä²¼¹¦·ò 2025-04-03

1. Ó¢¹ú»Ê¼ÒÓÊÕþÔâ³Á´óÊý¾Ýй¶ £¬144GBÃô¸ÐÐÅÏ¢ÆØ¹â


4ÔÂ2ÈÕ £¬Ó¢¹ú»Ê¼ÒÓÊÕþ¼¯ÍÅ£¨Royal Mail Group£©½üÆÚÒÉËÆÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ £¬Éæ¼°144GBµÄÄÚ²¿Îļþ¡¢¿Í»§ÐÅÏ¢ºÍÓªÏúÊý¾Ý±»¹«¿ª ¡£¸ÃÊÂÎñÓÉÍøÂç·¸×ïÂÛ̳Breach ForumµÄÓû§¡°GHNA¡±ÓÚ2025Äê3ÔÂ31ÈÕ³õ´ÎÅû¶ £¬ÆäÉÏ´«ÁËÔ̺¬293¸öÎļþ¼ÐºÍ16,549¸öÎļþµÄÊý¾Ý°ü £¬²¢Ìá¼°¸Ð¼¤µÂ¹úÊý¾Ý·ÖÎö¹«Ë¾SpectosµÄ¡°Ð­Öú¡± ¡£Ð¹Â¶Êý¾Ýº­¸Ç¿Í»§Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡¢ÄÚ²¿Í¨Ñ¶¼Í¼¡¢ÔËÓªÊý¾Ý¼°ÓªÏú»ù´¡ÉèÊ©ÐÅÏ¢ £¬Òý°ä·¢½ç¶Ô¹¥»÷ÆðÔ´µÄ²Â²â £¬¼´¿ÉÄÜÊÇÖ±½ÓÈëÇֻʼÒÓÊÕþϵͳ»òͨ¹ýÆä¹©¸øÉÌSpectos½øÐеĵÚÈý·½¹¥»÷ ¡£GHNA×Ô2024Äêµ×»îÔ¾ÓÚBreach Forum £¬´ËǰÒÑй¶¶à¼Ò³ÛÃûÆóÒµÊý¾Ý £¬Ô̺¬ÈýÐǵç×Ó¡¢Touchworld Technology LLCµÈ £¬Õâ´Î»Ê¼ÒÓÊÕþÊý¾Ýй¶ÊÇÆä°ä²¼µÄ×î´ó¹æÄ£¹¥»÷Ö®Ò» £¬ÒÉËÆÎªÆä¡°½Ó¼û¼´·þÎñ¡±£¨Access-as-a-Service£©ÔËÓªµÄÒ»²¿ÃÅ ¡£SpectosÂŴγʴ˿Ìй¶Êý¾ÝÖÐ £¬Ô̺¬ÄÚ²¿ÎļþºÍ»áÒéÊÓÆµ £¬Æä½ÇÉ«Éв»Ã÷È· £¬µ«ºÚ¿Í°µÊ¾Æäϵͳ»òΪ¹¥»÷ÇÐÈëµã ¡£»Ê¼ÒÓÊÕþ¼¯ÍÅ»ØÓ¦³ÆÕýÓëSpectosºÏ×÷µ÷²éÊÂÎñ £¬ÆÀ¹ÀÊý¾ÝÓ°Ïì ¡£


https://hackread.com/hacker-leaks-royal-mail-group-data-supplier-spectos/


2. FIN7ÍÅ»ïÀûÓÃAnubisºóÃŽٳÖWindowsϵͳ


4ÔÂ2ÈÕ £¬ÍøÂ簲ȫ×êÑÐÈËÔ±½Òʾ £¬ÒÔ¾­¼ÃÀûÒæÇý¶¯µÄÍøÂç·¸×ïÍÅ»ïFIN7£¨Òà³ÆCarbon SpiderµÈ¶à¸ö±ðºÅ£©ÕýÀûÓÃÒ»ÖÖÃûΪAnubisµÄPythonºóÃŶñÒâÈí¼þ £¬¶ÔWindowsϵͳִÐнٳÖ ¡£ÈðÊ¿ÍøÂ簲ȫ¹«Ë¾PRODAFT¼¼Êõ»ã±¨ÏÔʾ £¬¸Ã¶ñÒâÈí¼þ¸³Óè¹¥»÷ÕßÔ¶³ÌÖ´ÐÐShellºÅÁϵͳ²Ù×÷ÄÜÁ¦ £¬´Ó¶øÆëÈ«½ÚÔ챻ϰȾÉ豸 ¡£FIN7×÷Ϊһ¸öÓµÓжíÂÞ˹²¼¾°µÄÍøÂç·¸×ï×éÖ¯ £¬³Ö¾ÃÒÔ¿ª·¢¸´ÔÓ¶à±äµÄ¶ñÒâÈí¼þ¼Ò×åÖø³Æ £¬Æä¹¤¾ßÁ´Ö¼ÔÚ»ñÈ¡³õʼ½Ó¼ûȨÏÞ²¢ÇÔÈ¡Êý¾Ý ¡£½üÄêÀ´ £¬¸ÃÍŻﱻָתÏòÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©Ä£Ê½ÒÔÍØÕ¹·¸·¨ÊÕÒæÇþ· ¡£AnubisºóÃÅͨ¹ý¾«ÐÄÉè¼ÆµÄ´¹µöÓʼþ½øÐд«²¼ £¬ÓÕµ¼Êܺ¦ÕßÖ´ÐÐÍйÜÔÚÔâÈëÇÖSharePointÕ¾µãÉϵĶñÒâÔØºÉ ¡£¶ñÒâÈí¼þÒÔZIPѹËõ°ü´ó¾Ö½»¸¶ £¬ÄÚº¬Ö±½ÓÔÚÄÚ´æÖнâÃÜÖ´ÐеÄPython¾ç±¾ £¬¼Ì¶ø¼ÓÔØÖ÷Ìâ»ìºÏ¸ºÔØ ¡£³ÉÁ¢ÏνӺó £¬ºóÃÅͨ¹ýTCPÌ×½Ó×ÖÒÔBase64±àÂëÓëÔ¶³Ì·þÎñÆ÷ͨѶ £¬Ö§³ÖÍøÂçÖ÷»úIP¡¢Îļþ´«Ê䡢Ŀ¼²Ù×÷¡¢»·¾³±äÁ¿»ñÈ¡¡¢×¢²á±íÅú¸ÄµÈÖ°ÄÜ £¬ÉõÖÁÄܼÓÔØDLLÖÁÄÚ´æÊµÏÖÎÞÎļþ¹¥»÷ ¡£


https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html


3. ÏÂËÕ×åÉçÇøÔâÍøÂç¹¥»÷ £¬RansomHubÍÅ»ïÐû³ÆÕƹÜ


4ÔÂ3ÈÕ £¬Ã÷ÄáËÕ´ïÖÝÏÂËÕ×åÓ¡µÚ°²ÈËÉçÇøÏò¾ÓÃñ·¢³öÖÒ¸æ £¬¸Ã²¿ÂäÔâ·êÍøÂç¹¥»÷ £¬µ¼Ö±¾µØÒ½ÁÆ»ú¹¹¡¢µ±¾Ö·þÎñÖÐÐļ°²¿ÂäÔËÓªµÄJackpot Junction¶Ä³¡ÔËÓªÖжÏ ¡£Õâ´ÎÊÂÎñÆÈʹ²¿ÂäÆô¶¯Ó¦¼±ÏìÓ¦»úÔì £¬×Ô¶¯¹Ø¹Ø²¿ÃŹؼüϵͳÒÔ½ÚÔìÊÂ̬ £¬Ô̺¬µç»°¡¢´«Õæ¼°Óʼþ·þÎñ ¡£¹Ù·½Í¨¹ýÉ罻ýÌ尵ʾ £¬ÕýÓëÍøÂ簲ȫר¼ÒºÏ×÷ £¬Á¦ÇóÔÚ°²È«Ç°ÌáϾ¡¿ì¸´Ô­ÏµÍ³Õý³£ÔËÐÐ £¬²¢°ä²¼ÁËÎÀÉúÖÐÐÄ¡¢ÑÀ¿ÆÕïËùµÈ³¡ËùµÄһʱÁªÏµµç»° ¡£ÍøÂç¹¥»÷Ó°ÏìÉîÔ¶ £¬¶Ä³¡¾ÆµêÔ¤Ô¼ÏµÍ³È«ÃæÌ±»¾ £¬ÎÞ·¨´¦ÖÃж©·¿¼°È¡µÞÒªÇó £¬µç×ÓÓÎÏ·»ų́ÒàÒòÍøÂçÖжÏÖÕ³¡ÔË×÷ ¡£¸Ã²¿ÂäÕ¼ÓÐÔ¼982Ãû¾ÓÃñ £¬ÖØÒª¾Û¾ÓÔÚ1,743Ӣ͵ı£ÁôµØ¼°ÖܱßÇøÓò ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬RansomHubÀÕË÷Èí¼þÍÅ»ïÓÚ±¾ÖÜÒ»¹«¿ªÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü ¡£¸ÃÍÅ»ï½ñÄê2ÔÂÔøÏ®»÷ÃÜЪ¸ùÖÝÁíÒ»Ô­¾ÓÃñ²¿Âä £¬²¢ÔÚÈ«ÇòÀÕË÷Èí¼þÁìÓòѸ¿ìáÈÆð £¬ÓÈÆäÔÚÈ¥ÄêLockBitºÍAlphVÔâ·¨Âɽø¹¥ºó £¬Æä»îÔ¾¶ÈÏÔÖøÉÏÉý ¡£


https://therecord.media/native-minnesota-tribe-says-cyber-incident-disrupted-healthcare-casino


4. ÊýǧAndroidÉ豸ԤװTriadaľÂí £¬¹©¸øÁ´°²È«ÏÖ³Á´óÍþв


4ÔÂ2ÈÕ £¬¿¨°Í˹»ù³¢ÊÔÊÒ½üÆÚÅû¶ £¬Êýǧ̨ÐÂÐÍAndroidÉ豸ÔÚ³ö³§Ç°¼´±»Ö²Èë×îбäÖÖµÄTriadaľÂí £¬×é³ÉÑϳÁµÄ¹©¸øÁ´°²È«Íþв ¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÚ2016ÄêÏÖÉí £¬ÒÔÆä¹ÖÒìµÄÄÚ´æ×¤Áô¼¼Êõ¶ã±Ü¼ì²â £¬Õâ´ÎбäÖÖ¸üչʾ³öÉî¶ÈÏµÍ³ÉøÈëÄÜÁ¦ ¡£¹¥»÷Õßͨ¹ý¼ÙðʢÐÐÊÖ»úÐͺÅ £¬Ôڷǹٷ½Çþ·ÒÔÁ®¼ÛÎüÒýÏû·ÑÕ߲ɰìÒÑϰȾµÄÖÕ¶ËÉ豸 ¡£2025Äê3ÔÂ13ÈÕÖÁ27ÈÕ¼ä £¬½ö¶íÂÞ˹¾ÍÓÐ2,600ÃûÓû§È·ÈÏϰȾ ¡£¸ÃľÂí¾ß±¸¶àά¶È¹¥»÷ÄÜÁ¦£ºÇÔÈ¡¼´Ê±Í¨Ñ¶ÓëÉ罻ýÌåÕË»§¡¢´Û¸Ä¼ÓÃÜÇ®±ÒÇ®°üµØÖ·Ö´Ðнٳ֡¢²Ù¿ØÍ¨»°Â·Óɼ°¶ÌÐÅÖ°ÄÜ¡¢ÉõÖÁÔ¶³Ì¼ÓÔØ¶î±í¶ñÒⷨʽ ¡£Æäͨ¹ý¼Ùװϵͳ¹ý³ÌʵÏÖÓÆ¾Ã»¯×¤Áô £¬¼´±ãÉ豸³ÁÆôÈÔÄÜά³Ö½ÚÔì ¡£·ÖÎöÏÔʾ £¬¹¥»÷ÕßÒÑͨ¹ý´úÌæÇ®°üµØÖ·µÁÈ¡ÖÁÉÙ27ÍòÃÀÔª¼ÓÃÜÇ®±Ò £¬ÏÖʵËðʧ¿ÉÄÜÒòÉæ¼°ÃÅÂÞ±ÒµÈÄäÃû¼ÓÃÜ×ʲú¶ø¸ü¸ß ¡ £¿¨°Í˹»ùר¼Ò´§Ä¦Õâ´ÎÊÂÎñϵ¹©¸øÁ´»·½ÚÔâÉøÈë £¬¶ñÒâÈí¼þÔÚÉ豸µ½´ïÓû§Ç°¼´±»Ö²Èë¹Ì¼þ £¬Á¬¾­ÏúÉ̶¼¿ÉÄÜÃÉÔÚ¹ÄÖÐ ¡£Îª½µµÍ·çÏÕ £¬°²È«×¨¼Ò½¨ÒéÏû·ÑÕß½öͨ¹ý¹Ù·½ÊÚȨÇþ·²É¹ºÉ豸 £¬¶Ô´æÒÉÉ豸ӦʹÓÃGoogle¹Ù·½´¿¾»¾µÏñ»ò¿ÉÐÅ¿ªÔ´ÏµÍ³£¨ÈçLineageOS£©½øÐÐË¢»ú ¡£


https://www.bleepingcomputer.com/news/security/counterfeit-android-devices-found-preloaded-with-triada-malware/


5. Outlaw½©Ê¬ÍøÂçÀûÓÃSSH·ì϶×Ô¶¯´«²¼ £¬ÍþвLinuxϵͳ°²È«


4ÔÂ2ÈÕ £¬ÍøÂ簲ȫר¼Ò½üÈÕÅû¶ÁËÒ»¸öÃûΪOutlaw£¨±ðÃûDota£©µÄ×Ô¶¯»¯¼ÓÃÜÇ®±ÒÍÚ¿ó½©Ê¬ÍøÂç £¬¸Ã¶ñÒâÈí¼þ³ÖÐø»îÔ¾ÒÑÓâËÄÄê £¬Í¨¹ýSSH±©Á¦ÆÆ½â¹¥»÷ºÍÈä³æÊ½´«²¼Ï°È¾Linuxϵͳ ¡£Elastic°²È«³¢ÊÔÊÒ·ÖÎöÖ¸³ö £¬¸Ã¶ñÒâÈí¼þÓÉÂÞÂíÄáÑǺڿͼ¯Ì忪·¢ £¬Æä¹¥»÷Á´Ê¼ÓÚÀûÓÃÈõÃÜÂëµÄSSH·þÎñÆ÷ £¬Í¨¹ýÖ²Èë×ÔÉíSSHÃÜÔ¿³ÉÁ¢Óƾû¯½Ó¼û ¡£¹¥»÷Õßѡȡ¶à½×¶ÎÉøÈëÕ½Êõ £¬Ê×ÏÈͨ¹ýÏÂÔØÆ÷¾ç±¾»ñÈ¡¼ÓÃÜѹËõ°ü £¬½âѹºóÆô¶¯ÍÚ¿ó·¨Ê½ £¬²¢×Ô¶¯¶Ï¸ù¾ºÕùÍÚ¿ó¹ý³Ì¼°×ÔÉí¾É°æ±¾ ¡£Ö÷Ìâ×é¼þBLITZÕÆ¹ÜɨÃè´àÈõSSH·þÎñ £¬¹²Í¬±©Á¦ÆÆ½âÄ £¿éʵÏÖºáÏòÀ©É¢ £¬ÆäÖ¸±êÁбíÓÉC2·þÎñÆ÷¶¯Ì¬¸üР¡£ÖµÍ×ÌùÐĵÄÊÇ £¬¸ÃÍŻﻹÀûÓÃDirty COWµÈº¹Çà·ì϶¼°ÈõTelnetƾ֤À©´ó¹¥»÷Ãæ ¡£Ï°È¾³É¹¦ºó £¬¶ñÒâÈí¼þ²¿ÊðSHELLBOTÄ £¿é £¬Í¨¹ýIRCƵ·½Ó¹Ü½ÚÔìÖ¸Áî £¬¿ÉÖ´ÐÐËÁÒâϵͳºÅÁî¡¢ÌáÒéDDoS¹¥»÷¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£ÎªÌáÉýÍÚ¿óЧÄÜ £¬¶ñÒâÈí¼þ»á¼ì²âϵͳCPU¸öÐÔ²¢ÆôÓôóÒ³ÃæÄÚ´æÅäÖà £¬Í¬Ê±Î¬³ÖÓë¹¥»÷Õß»ù´¡ÉèÊ©µÄ³ÖÐøÍ¨Ñ¶ ¡£


https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html


6. »ùÒòÊý¾ÝÍøÕ¾openSNPÒòÒþÖÔ·çÏÕ½«¹Ø¹Ø²¢É¾³ýÊý¾Ý


4ÔÂ2ÈÕ £¬»ùÒòÊý¾Ý¹²ÏíÆ½Ì¨openSNP°ä·¢½«ÓÚ2025Äê4ÔÂ30ÈÕÖÕÖ¹·þÎñ²¢È«ÃæÉ¾³ýÓû§Êý¾Ý £¬¸Ã¾ö¶¨ÓɽáºÏÊ×´´ÈËBastian Greshake Tzovaras»ùÓÚÒþÖÔ±£»¤ÓëÂ×Àí·çÏÕ¿¼Á¿×÷³ö ¡£×÷ΪÔËÐÐ14ÄêµÄ¿ªÔ´ÏîÄ¿ £¬openSNPÖÂÁ¦ÓÚÍÆ¶¯»ùÒòÊý¾ÝÃñÖ÷»¯ £¬Í»ÆÆÃ³Ò×»ú¹¹¶Ô»ùÒò×éÐÅÏ¢µÄ¢¶Ï £¬Àۼƴ洢Á˺£Á¿Óû§×ÔÔ¸Ìá½»µÄ»ùÒòÓë±íÐÍÊý¾Ý £¬Ö§³ÖÁ˶àÏî¶ÀÁ¢¿ÆÑм°¹«¹²½¡È«×êÑÐ ¡£ÏîÄ¿¹Ø¹ØµÄÖ±½ÓÓÕÒòÊÇ23andMe¹«Ë¾ÆÆ²úµ¼ÖµÄÓû§Êý¾ÝÁ÷Èë¶Ï¾ø £¬µ«¸üÉî²ãÔ­ÒòÔÚÓÚÈ«ÇòÊý¾ÝÀÄÓ÷çÏյļӾç ¡£TzovarasÖ¸³ö £¬µ±Ç°»ùÒòÊý¾Ý±»¸öÈË·¨Ò½»ú¹¹¡¢·¨Âɲ¿ÃÅÉõÖÁ²¿Ãŵ±¾ÖÒÔα¿ÆÌ¨¸¦Òå²»µ±»ñÈ¡µÄ·çÏÕÏÔÖøÉÏÉý £¬ÕâÓëÏîÄ¿Æô¶¯Ê±Ïà¶Ô¿íËɵÄÊý¾ÝÂ×Àí»·¾³ÒѲúÉúµ××ӱ䶯 ¡£Ö»¹ÜopenSNPʼÖջؾøÃ³Ò×ÊÕ¹º²¢Î¬³ÖÊý¾Ý½ÚÔìȨ £¬µ«Ãæ¶Ô²»ÐÝÑݱäµÄÒþÖÔÍþвºÍÕþÖλ·¾³ £¬ÍŶÓÒÔΪ×Ô¶¯É¾³ýÊý¾ÝÊǸüÕÆ¹ÜÈεÄÑ¡Ôñ ¡£×÷Ϊ¿ªÔ´ÉçÇøµÍ³É±¾ÔË×÷µÄ·¶Àý £¬¸ÃÆ½Ì¨ÔøÓÐÐ§ÍÆ½ø¹«¼Ò¶Ô»ùÒò×êÑеIJμÓ ¡£¹Ø¹Ø²¼¸æ³ö¸ñÌáÐÑÓû§ £¬ÈôÐè±£ÁôÓ×ÎÒÊý¾Ý¸±±¾ÐëÔÚ½ØÖ¹ÈÕÆÚǰ×ÔÐÐÏÂÔØ £¬¶ûºóËùÓй«¿ªÊý¾Ý½«±»ÓÀÔ¶¶Ï¸ù ¡£


https://www.bleepingcomputer.com/news/security/genetic-data-site-opensnp-to-close-and-delete-data-over-privacy-concerns/