ÄϷǵçÐŹ©¸øÉÌCell CÈ·ÈÏÍøÂç¹¥»÷ºó²úÉúÊý¾Ýй¶

°ä²¼¹¦·ò 2025-04-15

1. ÄϷǵçÐŹ©¸øÉÌCell CÈ·ÈÏÍøÂç¹¥»÷ºó²úÉúÊý¾Ýй¶


4ÔÂ14ÈÕ £¬ÄϷǵÚËÄ´óÒÆ¶¯ÍøÂçÔËÓªÉÌCell C £¬×÷Ϊ¸Ã¹ú×î´óµÄµçÐŹ©¸øÉÌÖ®Ò» £¬ÔÚ2024ÄêÔâ·êRansomHouseÍøÂç¹¥»÷ºóÈ·ÈϲúÉúÊý¾Ýй¶¡£¸ÃÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾Ð¹Â¶ÁËÐû³ÆÇÔÈ¡µÄ2TBÊý¾Ý £¬Ô̺¬È«Ãû¡¢ÁªÏµ·½Ê½¡¢Éí·ÝÖ¤ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£Cell C°µÊ¾ £¬ÍþвÐÐΪÕßδ¾­ÊÚȨ½Ó¼ûÁËÆä²¿ÃÅITϵͳ¡£Cell CѸ¿ì²ÉÈ¡Ðж¯ £¬¶ôÔìÍøÂç¹¥»÷ £¬±£»¤ÏµÍ³°²È« £¬²¢½µµÍÓ°Ïì¡£¹«Ë¾ÀñƸ¶¥¼¶ÍøÂ簲ȫºÍȡ֤ר¼Ò £¬Í¨ÖªÓйز¿ÃÅ £¬²¢»ý¼«Ö§³ÖÊÜÓ°ÏìµÄÀûÒæÓйØÕß¡£Í¬Ê± £¬³ÖÐø¼à¿ØÇ±ÔÚµÄÊý¾ÝÀÄÓà £¬²¢¶½´Ù¾¯Ìèڲƭ¡¢ÍøÂç´¹µöºÍÉí·Ý͵ÇÔ £¬·ÖÏí·Àڲƭ×ÊÔ´¡£RansomHouse×÷ΪÊý¾ÝÀÕË÷ÍÅ»ï £¬×Ô2021Äê12ÔÂÒÔÀ´Ò»Ïò»îÔ¾ £¬ÓëÆäËûÀÕË÷ÍÅ»ï·ÖÆç £¬×¨Ò»ÓÚÊý¾ÝÇÔÈ¡ÒÔ¼Ó¿ì»î¶¯ £¬Í¨¹ýй¶Êý¾ÝÀ´ÐßÈè²»¸¶¿îµÄÓû§¡£


https://securityaffairs.com/176509/data-breach/south-african-telecom-provider-cell-c-disclosed-a-data-breach.html


2. Ë®Ðǹ«Ë¾ÔâÍøÂç¹¥»÷ £¬³¬3000ÈËÐÅϢй¶


4ÔÂ11ÈÕ £¬×ܲ¿Î»ÓÚÃÀ¹úµÄÔì×÷¹«Ë¾Ë®Ðǹ«Ë¾£¨Mercury Corp.£©ÔøÔâ·ê°²È«Ï®»÷¡£¾Ý¸Ã¹«Ë¾·¢Ë͸øÇ±ÔÚÊÜÓ°ÏìÓû§µÄ°²È«·ì϶֪ͨÐÅ £¬¹¥»÷ÕßÓÚ½ñÄê2ÔÂÖÐÑ®Í»ÆÆÁËÆä·ÀÓùϵͳ £¬Ö»¹ÜÔÚ¹«Ë¾ÏµÍ³ÖеÄÍ£¶Ù¹¦·ò½öÔ¼Ò»Ìì £¬µ«Õâ´Îδ¾­ÊÚȨµÄ½Ó¼ûȴ¶³öÁË´óÁ¿Ó×ÎÒÐÅÏ¢¡£ÐÅÖÐÅû¶ £¬¹¥»÷Õß»ñÈ¡ÁËÔ̺¬Ãû×Ö¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕÒÔ¼°Éç»á°²È«ºÅÂ루SSN£©ÔÚÄڵĶàÏîÃô¸ÐÐÅÏ¢¡£Æ¾¾ÝË®Ðǹ«Ë¾ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢ £¬Õâ´ÎÏ®»÷Ó°Ï쳬¹ý3,000ÈË¡£Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶¶ÔÓ×ÎÒ°²È«×é³ÉÑϳÁÍþв £¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÊý¾Ý½øÐÐÉí·Ý͵ÇÔ £¬È翪ÉèڲƭÐÔÐÅÓþÕË»§¡¢Ìá½»ÐéαÄÉ˰É걨µ¥ £¬»òÀûÓñ»µÁÉí·ÝÖ´Ðз¸×ï¡£´Ë±í £¬¸ü¸ÉÁ·µÄ¹¥»÷Õß»¹¿ÉÄÜÀûÓÃÇÔÈ¡µÄÐÅÏ¢½øÐÐÍøÂç´¹µö»î¶¯ £¬Í¨¹ý¾«ÐÄÉè¼ÆµÄµç×ÓÓʼþ»ò¶ÌÐÅÓÕÆ­Êܺ¦Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£È»¶ø £¬Ë®Ðǹ«Ë¾ÔÚÐÅÖÐÐû³Æ £¬ÊÂÎñµ÷²é¡°²¢Î´È·ÈÏÊÇ·ñÓÐÓ×ÎÒÐÅÏ¢Òò¸ÃÊÂÎñ¶ø±»½Ó¼û»òй¶¡±¡£Ë®Ðǹ«Ë¾ £¬Ç°ÉíΪˮÐÇ·É»ú¹«Ë¾ £¬ÔÚÔì×÷ÁìÓòÓÐ×ÅÓÆ¾ÃµÄº¹Çà £¬³ÉÁ¢ÓÚ20ÊÀ¼Í20Äê´ú £¬ÔøÎªÃÀ¹ú½¾ü¹©¸ø·É»ú¼°Á㲿¼þ £¬Õâ´Î°²È«ÊÂÎñÎÞÒÉ¶ÔÆäÃûÓþºÍÓû§ÐÅÀµ¶ÈÔì³ÉÁËÓ°Ïì¡£


https://cybernews.com/news/mercury-aircraft-data-breach-personal-information/


3. SK¼¯ÍÅÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷ £¬1TBÎļþ±»µÁ


4ÔÂ11ÈÕ £¬È«ÇòÄÜÔ´ÓëÔì×÷Òµ¾ÞÍ·SK¼¯ÍÅÔâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷ £¬¸Ã×éÖ¯Ðû³ÆÇÔÈ¡Æä1TBÎļþ £¬²¢½«SK¼¯ÍÅÐÕÃû°ä²¼ÓÚ°µÍøÐ¹ÃÜÍøÕ¾ £¬ÒªÇó48Ó×ʱÄÚÁªÏµ £¬µ«Î´Ìṩ֤¾Ý¡£SK¼¯ÍÅÒµÎñ¿í·º £¬Éæ¼°ÄÜÔ´¡¢µçÐŵȶàÁìÓò £¬Õ¼ÓÐ260Óà¼Ò¹ØÁª¹«Ë¾¼°8Íò¶àÃûÔ±¹¤ £¬ÔÚÃÀ¹úͶ×ʳ¬500ÒÚÃÀÔª £¬ÔÚº«¹ú¾­¼ÃÖÐְλ³ÁÒª £¬¹Ê³É¹¥»÷Ö¸±ê¡£÷è÷ëÀÕË÷Èí¼þ×éÖ¯³ôÃûÔ¶Ñï £¬ÔøÈëÇÖÓ¢¹úNHSºÏ×÷ͬ°é £¬µ¼Ö¶à¼ÒÒ½Ôº·þÎñ¹Ø¹Ø £¬2025Äê¹¥»÷Á¦¶È¼Ó´ó £¬³ÉΪÎå´ó»îÔ¾ÀÕË÷Èí¼þÍÅ»ïÖ®Ò»¡£¸Ã×é֯ѡȡÀÕË÷Èí¼þ¼´·þÎñģʽ £¬³£Ê¹ÓÃË«³ÁÀÕË÷¼¿Á© £¬´ÓǰÖÜΧÄÚÔì³ÉÖÁÉÙ68ÃûÊܺ¦Õß £¬ÖØÒª²úÉúÔÚÃÀ¹ú¡£´Ë±í £¬÷è÷뻹Ðû³Æ¶ÔÐÝ˹¶Ù½»ÏìÀÖÍÅ¡¢µ×ÌØÂɹ«¹²¹ã²¥¹«Ë¾¼°Lee EnterprisesµÈÊܺ¦ÕßÕÆ¹Ü £¬´Óǰ12¸öÔÂÊܺ¦Õß×ÜÊýÒÑ´ï256ÈË¡£Æä»¹¶ÔÈÕ±¾Óî¶¼¹¬°©Ö¢Ò½ÖÎÖÐÐĺڿ͹¥»÷ÊÂÎñÕÆ¹Ü £¬Ð¹Â¶30ÍòÃû»¼ÕßÃô¸ÐÐÅÏ¢¡£÷è÷ë·¢Ô´ÓÚ¶íÂÞ˹ £¬²»¹¥»÷¶ÀÁªÌå¹ú¶È £¬ÆäÀÕË÷Èí¼þ±äÖÖ¡°Qilin.B¡±¿ÉÕë¶Ô¹ØÁªÆóÒµ¶¨Ôì £¬Ìṩ¶àÖÖ¼ÓÃܲ½Öè £¬²¢Ê¹ÓÃRust±à³Ì˵»°±àд¡£


https://cybernews.com/news/sk-group-ransomware-attack-qilin-gang-claims-stolen-data/


4. Wolters KluwerÔâ·êÊý¾Ýй¶ £¬Ãô¸ÐÐÅÏ¢±»ÏúÊÛ


4ÔÂ12ÈÕ £¬½üÈÕ £¬ÓÐÍþвÐÐΪÕßÔÚÍøÂç·¸×ïÂÛÌÓð»¯ù³ÆÒÑÆÆ½â½ðÈÚÈí¼þ¾ÞÍ·Wolters KluwerµÄ±£ÏÕ¿â £¬²¢ÇÔÈ¡ÁËÐÂÊý¾Ý¼¯¡£Wolters KluwerÊÇÒ»¼ÒÄêÊÕÈë½ü70ÒÚÃÀÔªµÄ¹«Ë¾ £¬ÎªÃÀ¹ú´óÁ¿¹ÜÕÊʦÊÂÎñËù¡¢ÒøÐкͲƸ»500Ç¿ÆóÒµÌṩ·þÎñ £¬ÒµÎñÁìÓò¿í·º £¬¿Í»§Ô̺¬Ó¢¹úº½¿Õ¡¢°¢ÁªÇõº½¿Õ¡¢²¨ÒôµÈ³ÛÃûÆóÒµ¡£ÈôÕâ´ÎÊý¾Ýй¶Êôʵ £¬½«Éæ¼°Óû§È«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¾Ý³Æ £¬Ð¹Â¶µÄÊý¾Ý¼¯´óÓ×ÔÚ3GBµ½6GBÖ®¼ä £¬Ëä²»Ô̺¬ÃÜÂë £¬µ«°²È«×êÑÐÈËÔ±ÖÒ¸æ³Æ £¬ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߶ȸöÐÔ»¯µÄÍøÂç´¹µö»î¶¯ºÍ¼ÙÒâ̰ͼ¡£ºÚ¿Í¿ÉÄÜÀûÓÃÕâЩÊý¾Ý½øÐÐÉí·Ý¼ÙÒâ £¬ÊÔͼ½Ù³ÖÊܺ¦ÕßÕË»§¡£Ä¿Ç° £¬¸ÃÊý¾Ý¼¯µÄÆðÅļÛΪ15,000ÃÀÔª £¬ÍþвÐÐΪÕßÐû³Æ±»µÁÊý¾ÝÖ»»áÏúÊÛÒ»´Î¡£¶Ô´Ë £¬Wolters KluwerÒѰ䷢ÉêÃ÷ £¬°µÊ¾ÔÚµ÷²éÈκÎDZÔÚµÄÊý¾ÝÓ°Ïì £¬²¢Ö¸³öÊÜÓ°ÏìµÄÊý¾ÝËÆºõ½öÏÞÓÚ½¡È«ÆÚ¿¯ÒµÎñÖеÄÒµÎñÁªÏµÐÅÏ¢ £¬Ã»ÓÐÖ¤¾ÝÅú×¢ÈκβÆÕþ»ò˰ÎñÊý¾ÝÊܵ½Ó°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Õâ²¢·ÇWolters Kluwer³õ´Î³ÉΪ¹¥»÷Ö¸±ê £¬2019Äê¸Ã¹«Ë¾¾ÍÔøÔâ·êÍøÂç¹¥»÷¡£


https://cybernews.com/security/wolters-kluwer-data-breach-financial-security/


5. ºÕ×ȹ«Ë¾ÔâCleoÁãÈÕ·ì϶¹¥»÷ £¬¿Í»§Êý¾Ýй¶


4ÔÂ14ÈÕ £¬Æû³µ×âÁÞ¾ÞÍ·ºÕ×ȹ«Ë¾Ôâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ¡£2025Äê2ÔÂ10ÈÕ £¬ºÕ×ÈÈ·ÈÏÆäÆìϺÕ×È¡¢ThriftyºÍDollarÆ·ÅÆ¿Í»§Êý¾ÝÔâδ¾­ÊÚȨµÚÈý·½»ñÈ¡ £¬¸ÃµÚÈý·½ÓÚ2024Äê10ÔºÍ12ÔÂÀûÓÃCleoƽ̨ÁãÈÕ·ì϶ִÐÐ͵ÇÔ¡£ºÕ×ȹ«Ë¾Ñ¸¿ì·¢Õ¹Êý¾Ý·ÖÎö £¬ÒÔÈ·¶¨ÊÂÎñÓ°ÏìÁìÓò¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬¿Í»§ÐÕÃû¡¢ÁªÏµÐÅÏ¢¡¢µ®ÉúÈÕÆÚ¡¢ÐÅÓþ¿¨ÐÅÏ¢¡¢¼ÝÊ»ÅÆÕÕÐÅÏ¢¼°¹¤ÈËÅâ³¥Ë÷ÅâÓйØÐÅÏ¢µÈ¡£´Ë±í £¬ÉÙÊýÈ˵ÄÉç»á°²È«ºÅÂë»òµ±¾ÖÉí·ÝÖ¤ºÅÂëÒ²Ãæ¶Ô±»µÁ·çÏÕ £¬¼«ÉÙÊýÈ˵ϤÕÕÐÅÏ¢¡¢Ò½ÁƱ£ÏÕ»òÒ½ÁƲ¹ÖúÉí·ÝÖ¤£¨Ó빤ÈËÅâ³¥Ë÷ÅâÓйأ©ÒÔ¼°³µÁ¾±äÂÒË÷ÅâÖÐÉËÐÅÏ¢Ò²¿ÉÄÜÊÜÓ°Ïì¡£Ö»¹ÜºÕ×ÈÉÐδ°ä²¼¾ßÌåÊÜÓ°Ïì¿Í»§ÊýÁ¿ £¬µ«ÃåÒòÖÝ×ܼì²ì³¤°ì¹«Êһ㱨¸ÃÖÝÒÑÓÐ3409ÈËÊÕµ½Í¨Öª £¬¼ÓÀû¸£ÄáÑÇÖݺͷðÃÉÌØÖÝÒ²ÒÑ·ÖÏí֪ͨ £¬µ«Î´°ä²¼¾ßÌåÈËÊý¡£ÎªÓ¦¶ÔÕâ´ÎÊÂÎñ £¬ºÕ×ȹ«Ë¾ÎªÊÜÓ°Ïì¿Í»§ÌṩÁ½ÄêÃâ·ÑÉí·Ý¼à¿Ø·þÎñ £¬²¢½¨Òé¿Í»§¾¯ÌèDZÔÚڲƭÐÐΪ¡£¹ÌÈ»ºÕ×ȰµÊ¾ÉÐδ·¢ÏÖÓ×ÎÒÐÅÏ¢±»ÀÄÓýøÐÐڲƭµÄÐÐΪ £¬µ«ClopÀÕË÷Èí¼þÍÅ»ï´ËǰÒÑÔÚÆäÀÕË÷ÍøÕ¾ÉÏй¶ºÕ×ÈÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/hertz-confirms-customer-info-drivers-licenses-stolen-in-data-breach/


6. ConduentÔâÍøÂç¹¥»÷ £¬¿Í»§Êý¾Ý±»µÁ


4ÔÂ14ÈÕ £¬ÃÀ¹úóÒ×·þÎñ¾ÞÍ·¼°µ±¾Ö³Ð°üÉÌConduentÓÚ½ñÈÕÅû¶ £¬ÆäÔÚ2025Äê1ÔÂÔâ·êµÄÍøÂç¹¥»÷ÖÐ £¬¿Í»§Êý¾Ý²»ÐÒ±»µÁ¡£×÷Ϊһ¼ÒΪ½»Í¨¡¢Ò½ÁƱ£½¡¡¢¿Í»§ÂÄÀú¼°ÈËÁ¦×ÊÔ´ÁìÓòµ±¾ÖÓëóÒ׿ͻ§ÌṩÊý×Ôì½Ì¨Óë½â¾ö¹æ»®µÄóÒ×·þÎñ¹«Ë¾ £¬ConduentÕ¼Óг¬¹ý33,000ÃûÔ±¹¤ £¬·þÎñÁìÓò¸²¸ÇÒ»°ëµÄ²Æ¸»100Ç¿¹«Ë¾¼°³¬¹ý600¸öµ±¾ÖÓ뽻ͨ»ú¹¹¡£Õâ´ÎÍøÂç¹¥»÷²¨¼°ÃÀ¹ú¸÷µØ¿Í»§ £¬Ô̺¬±¾µØµ±¾Ö»ú¹¹ £¬¶ÔÔËÓªÔì³ÉÁ˿϶¨Ó°Ïì¡£ConduentÔÚÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄFORM-8KÎļþÖÐÈ·ÈÏ £¬ÍþвÐÐΪÕßÇÔÈ¡ÁËÔ̺¬¿Í»§ÐÅÏ¢µÄÎļþ¡£¾­ÍøÂ簲ȫÊý¾ÝÍÚ¾òר¼ÒÆÀ¹À £¬È·ÈÏÊý¾Ý¼¯Ô̺¬´óÁ¿Óë¿Í»§×îÖÕÓû§ÓйصÄÓ×ÎÒÐÅÏ¢¡£¹«Ë¾ÔÚ½øÒ»²½·ÖÎöй¶Êý¾ÝµÄ¾ßÌåÓ°Ïì £¬²¢½«ÔÚÊÊÆäʱ³½Í¨Öª¿Í»§ £¬ÒÔ±ãÆ¾¾ÝÁª¹úºÍÖÝ˾·¨µÄÒªÇóÈ·¶¨ºóÐø´ëÊ©¡£ÖµµÃÇìÐÒµÄÊÇ £¬Ä¿Ç°Ã»Óм£ÏóÅú×¢±»µÁÊý¾ÝÒÑÔÚ°µÍø»òÆäËû¹«¿ªÇþ·°ä²¼¡£Ö»¹ÜÕâ´Î¹¥»÷²¢Î´¶ÔConduentµÄÔËÓªÔì³ÉÄÚÈÝÐÔÓ°Ïì £¬µ«µÚÒ»¼¾¶ÈÒѲúÉúÓë¹¥»÷ÓйصÄÓöÈ¡£


https://www.bleepingcomputer.com/news/security/govtech-giant-conduent-confirms-client-data-stolen-in-january-cyberattack/