SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬¶ñÒâÈí¼þÂñ·ü½üÈýÄê

°ä²¼¹¦·ò 2025-05-21

1. SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬¶ñÒâÈí¼þÂñ·ü½üÈýÄê


5ÔÂ20ÈÕ£¬SK TelecomÊǺ«¹ú×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ£¬Õ¼¾ÝÔ¼Ò»°ëÊг¡·Ý¶î¡£¸Ã¹«Ë¾½üÈÕÅû¶£¬2025Äê4ÔÂ19ÈÕÔÚÆäÍøÂçÉϼì²âµ½¶ñÒâÈí¼þ£¬²¢¸ôÀëÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄÉ豸¡£Õâ´ÎÊÂÎñ×îÔç¿É×·ÒäÖÁ2022Ä꣬×îÖÕµ¼ÖÂ2700ÍòÓû§µÄUSIMÊý¾Ýй¶¡£¹¥»÷ÕßÇÔÈ¡ÁËÔ̺¬IMSI¡¢USIMÈÏÖ¤ÃÜÔ¿¡¢ÍøÂçʹÓÃÊý¾Ý¼°´æ´¢ÔÚSIM¿¨ÖеĶÌÐźÍÁªÏµÈ˵ÈÊý¾Ý£¬Ôö³¤ÁËSIM¿¨»¥»»¹¥»÷µÄ·çÏÕ¡£Îª´Ë£¬SK Telecom¾ö¶¨ÎªËùÓÐЧ»§·¢·ÅSIM¿¨´úÌæ¼þ£¬²¢¼ÓÇ¿°²È«´ëÊ©ÒÔÔ¤·Àδ¾­ÊÚȨµÄºÅÂëÒÆÖ²¡£2025Äê5ÔÂ8ÈÕ£¬µ±¾ÖίԱ»á°ä·¢¶ñÒâÈí¼þϰȾΣ¼°25ÖÖÊý¾ÝÀàÐÍ¡£ÆäʱSK Telecom°ä·¢ÖÕ³¡½ÓÊÜÐÂÓû§ÒÔÓ¦¶Ôºó¹û¡£SK Telecom×îÐÂÐÂÎųƽ«ºÜ¿ì֪ͨ2695ÍòÊÜÓ°ÏìµÄ¿Í»§ÆäÃô¸ÐÊý¾Ýй¶¡£¸Ã¹«Ë¾Ìáµ½ÔÚ23̨ÊÜϰȾ·þÎñÆ÷Öз¢ÏÖ25ÖÖ·ÖÆç¶ñÒâÈí¼þÀàÐÍ£¬ÈëÇÖˮƽ³¬³ö×î³õÔ¤ÆÚ¡£Óë´Ëͬʱ£¬¹«Ë½½áºÏµ÷²éÓ××é¶ÔSK TelecomµÄ30000̨Linux·þÎñÆ÷²é³­ºó³Æ£¬×î³õWeb ShellϰȾ²úÉúÔÚ2022Äê6ÔÂ15ÈÕ£¬Òâζ×ŶñÒâÈí¼þÔÚ½üÈýÄ깦·òÀïδ±»·¢ÏÖ£¬¹¥»÷ÕßÔÚ23̨·þÎñÆ÷ÉÏÖ²Èë¶à¸öÓÐÐ§ÔØºÉ¡£µ÷²éÐû³Æ15̨ÊÜϰȾ·þÎñÆ÷º¬Ó×ÎÒ¿Í»§ÐÅÏ¢£¬Ô̺¬291831¸öIMEIºÅÂ룬µ«SK Telecom·ñ¶¨¡£µ÷²éÓ××黹ָ³ö£¬SK TelecomÓÚ2024Äê12ÔÂ3ÈղůðÍ·¼Í¼ÊÜÓ°Ïì·þÎñÆ÷»î¶¯£¬Òò¶ø´Ëǰ¿ÉÄܲúÉúµÄÊý¾Ýй¶ÎÞ·¨±»¼ì²âµ½¡£


https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/


2. Hazy HawkÍÅ»ïÀûÓÃDNSÅäÖÃÃýÎó½Ù³ÖÊÜÐÅÀµÓòÃû


5ÔÂ20ÈÕ£¬±»×·×ÙΪ¡°Hazy Hawk¡±µÄÍþвÐÐΪÕßÕýÀûÓñ»ÍüÈ´µÄDNS CNAME¼Í¼ִÐÐÍøÂç¹¥»÷¡£¸ÃÍþвÐÐΪÕß½Ù³ÖÖ¸Ïò°Î³ýÔÆ·þÎñµÄCNAME¼Í¼£¬ÊÕÊܵ±¾Ö¡¢´óѧºÍ²Æ¸»500Ç¿¹«Ë¾µÈ»ú¹¹µÄÊÜÐÅÀµ×ÓÓò£¬ÓÃÓÚ·Ö·¢Ú¿Æ­¡¢ÐéαÀûÓ÷¨Ê½ºÍ¶ñÒâ¸æ°×¡£Infoblox×êÑÐÈËÔ±Ö¸³ö£¬Hazy HawkÊ×ÏÈɨÃèCNAME¼Í¼ָÏò°Î³ýÔÆ¶ËµãµÄÓò£¬²¢Í¨¹ý±»¶¯DNSÊý¾ÝÑé֤ȷ¶¨ÕâЩÓò£¬¶øºó×¢²áÓë°Î³ýCNAMEÖÐÃû³ÆÒ»ÑùµÄÐÂÔÆ×ÊÔ´£¬Ê¹Ô­Ê¼ÓòµÄ×ÓÓò½âÎöµ½ÍþвÐÐΪÕßµÄÐÂÔÆÍйÜÕ¾µã¡£½èÖúÕâÒ»¼¼Êõ£¬Hazy Hawk½Ù³ÖÁ˶à¸ö³ÛÃûÓòÃû£¬ÈçÃÀ¹ú¼²²¡½ÚÔìÓëÔ¤·ÀÖÐÐĵÄcdc.gov¡¢¿ç¹úÆóÒµ¼¯ÍÅhoneywell.comµÈ¡£½ÚÔì×ÓÓòÃûºó£¬ÍþвÐÐΪÕßÌìÉúÊý°Ù¸ö¶ñÒâURL£¬Òò¸¸ÓòÃûÐÅÀµ¶È¸ß£¬ÕâЩURLÔÚËÑË÷ÒýÇæÖп´ËƺϷ¨¡£Êܺ¦Õßµã»÷URLºó£¬»á±»³Á¶¨Ïòµ½¶à²ãÓòÃûºÍTDS»ù´¡ÉèÊ©£¬ÕâЩÉèÊ©»áƾ¾ÝÉ豸ÀàÐÍ¡¢IPµØÖ·µÈÐÅÏ¢·ÖÎöÊܺ¦ÕßÉí·Ý¡£Infoblox»ã±¨³Æ£¬ÕâÐ©ÍøÕ¾±»ÓÃÓÚ¼¼ÊõÖ§³¶à¿Æ­¡¢Ðéα·À²¡¶¾¾¯±¨¡¢ÐéαÁ÷ýÌå/É«ÇéÍøÕ¾ºÍÍøÂç´¹µöÒ³Ãæ¡£´Ë±í£¬ÊÜÆ­Óû§¼´±ãÍÑÀëÚ¿Æ­ÍøÕ¾£¬ÈÔ»áÒòÔÊÐíä¯ÀÀÆ÷ÍÆËÍ֪ͨ¶øÊÕµ½³ÖÐø¾¯±¨£¬ÎªHazy Hawk´øÀ´¿É¹ÛÊÕÈë¡£


https://www.bleepingcomputer.com/news/security/hazy-hawk-gang-exploits-dns-misconfigs-to-hijack-trusted-domains/


3. RVToolsÔâ·ê¹©¸øÁ´¹¥»÷£¬´«²¼Bumblebee¶ñÒâÈí¼þ


5ÔÂ20ÈÕ£¬½üÈÕ£¬RVTools VMwareÖÎÀí¹¤¾ßÔâ·ê¹©¸øÁ´¹¥»÷£¬¸Ã¹¤¾ß×î³õÓÉRobware¿ª·¢£¬ÏÖ¹é´÷¶ûËùÓУ¬ÊÇVMwareÖÎÀíÔ±³£Óù¤¾ß¡£¹¥»÷ÊÂÎñÒý·¢¿í·º¹Ø×¢£¬´÷¶ûÓÚ2025Äê5ÔÂ20ÈÕ°ä²¼ÉêÃ÷£¬³Æ¶ñÒâRVTools×°Ö÷¨Ê½²¢·Ç´ÓÆä¹Ù·½ÍøÕ¾·Ö·¢£¬¶øÊÇÀ´×ÔÐéαÓòÃû£¬Í¬Ê±ÆäÖÎÀíµÄRobware.netºÍRVTools.comÍøÕ¾ÒòÔâ·êDDoS¹¥»÷¶øÏÂÏß¡£´Ëǰ£¬ZeroDay Labs×êÑÐÔ±Aidan LeonÔÚRedditÉÏ·¢Ìû³Æ£¬´ÓRVToolsÍøÕ¾ÏÂÔØµÄÎļþ±»Ö²ÈëBumblebee¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬Îļþ¹þÏ£ÖµÓëÏÖʵÏÂÔØµÄ²»Æ¥Å䣬ÏÂÔØ°æ±¾ÏÔÖø¸ü´óÇÒÔ̺¬¶ñÒâÎļþ¡£¾­½øÒ»´ëÊ©²é£¬ÕâÒ»¹¥»÷ÐÐΪ±»Ö¤Êµ¡£BumblebeeÊÇÒ»ÖÖͨ¹ýSEOÖж¾¡¢¶ñÒâ¸æ°×ºÍÍøÂç´¹µö¹¥»÷ÍÆ¹ãµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬×°Öúó»áÔÚÊÜϰȾÉ豸¸ßµÍÔØ²¢Ö´ÐÐÆäËû¶ñÒâÓÐЧ¸ºÔØ£¬ÈçCobalt StrikeÐűꡢÐÅÏ¢ÇÔÈ¡·¨Ê½ºÍÀÕË÷Èí¼þµÈ£¬ÇÒÓëContiÀÕË÷Èí¼þÐж¯ÓйØ¡£ÍøÂ簲ȫ¹«Ë¾Arctic WolfÒ²»ã±¨·¢ÏÖ±»Ä¾ÂíϰȾµÄRVTools×°Ö÷¨Ê½Í¨¹ý¶ñÒâÓòÃûÇÀ×¢´«²¼£¬¸ÃÓòÃûÓëºÏ·¨ÓòÃûÀàËÆ£¬½ö¶¥¼¶ÓòÃû·ÖÆç¡£´Ë±í£¬»¹ÓÐÕë¶ÔRVToolsÆ·ÅÆµÄSEOÖж¾ºÍ¶ñÒâ¸æ°×»î¶¯£¬Ö¼ÔÚÓÕÆ­Óû§ÏÂÔØ¶ñÒâ×°Ö÷¨Ê½¡£


https://www.bleepingcomputer.com/news/security/rvtools-hit-in-supply-chain-attack-to-deliver-bumblebee-malware/


4. ¶íº¥¶íÖÝ¿­ÌØÁÕ½¡È«ÖÐÐÄÔâÍøÂç¹¥»÷µ¼ÖÂϵͳÖжÏ


5ÔÂ21ÈÕ£¬¶íº¥¶íÖÝ¿­ÌØÁÕ½¡È«ÖÐÐÄÆìÏÂÒ½ÔºÓëÒ½ÁÆÉèÊ©½üÈÕÔâ·êÍøÂç¹¥»÷£¬µ¼ÖÂÕûϵͳ¼¼ÊõÖжÏ¡£¿­ÌØÁÕ½¡È«ÖÐÐÄ×Ô³ÆÊÇÒ»¸ö»ùÓÚÐÅÑöµÄ»ù¶½¸´ÁÙ°²ÃßÈÕ»áϵͳ£¬ÖØÒªÔÚ´ú¶ÙµØÓòÔËÓª¶à¸öÒ½ÁÆÖÐÐĺÍÕïËù£¬Ã¿Äê´¦ÖôóÁ¿¼¹ØïÊÒ¾ÍÕï¡£¸Ã·ÇͶ»úÐÔÒ½ÔºÍøÂç½²»°È˰µÊ¾£¬Ä¿Ç°ÔÚ¾­ÀúÒòδ¾­ÊÚȨ½Ó¼û¶øÒý·¢µÄÍøÂ簲ȫÊÂÎñ£¬ÊÂÎñʼÓÚÖܶþÔçÉÏ£¬ÏÞ¶ÈÁ˹¤×÷ÈËÔ±½Ó¼û²¿ÃÅ»¼Õß»¤ÀíϵͳµÄÄÜÁ¦¡£¿­ÌØÁÕÒ½ÁÆÖÐÐÄÒѲÉÈ¡´ëÊ©¶ôÔ컺ºÍ½â´ËÀà»î¶¯£¬²¢»ý¼«µ÷²éºÍ¼à²âÇé¿ö£¬Í¬Ê±È¡µÞ²¢³ÁÐÂÆÌÅÅÁËÖܶþµÄסԺºÍÃÅÕïÔñÆÚÊÖÊõ¡£Õâ´Î¹¥»÷»¹µ¼Ö¸ÃÒ½ÔºÍøÂçµÄºô½ÐÖÐÐÄ̱»¾¡£²»Í⣬ËùÓм¹ØïÊÒºÍÕïËùÈÔά³ÖÊ¢¿ª£¬³ÖÐø½ÓÊÜ»¼ÕßÕïÖΡ£½²»°ÈËδ¾ÍÒ½ÔºÍøÂçÊÇ·ñÔâ·êÀÕË÷Èí¼þ¹¥»÷µÄÎÊÌâ×÷³ö»ØÓ¦£¬µ«¾ÝCNN±¨Â·£¬Ò½ÔºÍøÂçIT¹¤×÷ÈËÔ±·¢ÏÖÒ»ÕžݳÆÀ´×ÔInterlockÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¸ÃÍÅ»ïÉϸöÔÂÔø¹Ø¹ØÍ¸ÎöÒ½Öι«Ë¾DaVitaµÄÍøÂ磬´Ëǰ»¹¹¥»÷¹ýµÂ¿ËÈøË¹Àí¹¤´óѧ½¡È«¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ¡£


https://therecord.media/kettering-health-system-ohio-cyberattack


5. CellcomÈ·ÈÏÍøÂç¹¥»÷ÊÇÔì³É³¤¹¦·òÖжϵÄÔ­Òò


5ÔÂ20ÈÕ£¬Íþ˹¿µÐÇÖÝÎÞÏß·þÎñÌṩÉÌCellcomÒÑÈ·ÈÏ£¬2025Äê5ÔÂ14ÈÕÍíÆðÍ·µÄ´óÃæ»ý·þÎñÖжÏÊÇÓÉÍøÂç¹¥»÷µ¼ÖµÄ¡£Õâ´ÎÊÂÎñÓ°ÏìÁËÍþ˹¿µÐÇÖݺÍÃÜЪ¸ùÖݱ±²¿µØÓòµÄ¿Í»§£¬µ¼ÖÂËûÃǵÄÓïÒôºÍ¶ÌÕÛ·þÎñÖжÏ£¬ÎÞ·¨²¦´òµç»°»ò·¢ËͶÌÐÅ¡£CellcomÊ×ϯִÐйÙBrighid RiordanÔÚ½üÈÕ֤ʵÁËÍøÂç¹¥»÷µÄÊÂʵ£¬²¢°µÊ¾¹«Ë¾ÒÑÔì¶©Ó¦¶Ô´ËÀàÇé¿öµÄ¹æ³ÌºÍ´òËã¡£ÊÂÎñ²úÉúºó£¬CellcomÑϸñ×ñÑ­´òË㣬Ô̺¬ÀñƸ±í²¿ÍøÂ簲ȫר¼Ò¡¢Í¨ÖªÁª¹úµ÷²é¾ÖºÍÍþ˹¿µÐÇÖݹÙÔ±£¬²¢È«Á¦ÒÔ¸°È·±£ÏµÍ³°²È«¸´Ô­ÉÏÏß¡£CellcomÇ¿µ÷£¬Õâ´Î¹¥»÷²úÉúÔÚ¹«Ë¾ÍøÂçµÄÒ»¸öÇøÓò£¬Óë´æ´¢Óû§Ãô¸ÐÐÅÏ¢µÄÇøÓò·ÖÆç£¬ÇÒûÓÐÖ¤¾ÝÅú×¢Óû§Ó×ÎÒÐÅÏ¢Êܵ½Ó°Ïì¡£×î³õ£¬CellcomÐû³ÆÖжÏÊÇÓɼ¼ÊõÎÊÌâÒýÆðµÄ£¬²¢°µÊ¾²¿ÃÅÊý¾Ý·þÎñÈÔÔÚÔËÐС£È»¶ø£¬ÓÉÓÚÆ½Ì¨³öÏÖÎÊÌ⣬Óû§¶Ô·þÎñÖжϺÍÎÞ·¨ÒÆÖ²ºÅÂë¸ÐÓ¦¾ÚÉ¥¡£5ÔÂ19ÈÕ£¬CellcomÆðÍ·¸´Ô­²¿ÃÅ·þÎñ£¬Ô̺¬¶ÌÐÅÒÔ¼°²¦´òºÍ½ÓÌýÆäËûCellcomÓû§µÄµç»°¡£Ö»¹ÜÎÞ·¨±£ÕϺÎÊ±È«Ãæ¸´Ô­·þÎñ£¬µ«¹«Ë¾ÕýÖÂÁ¦ÔÚ±¾ÖÜĩǰʵÏÖÕâÒ»Ö¸±ê¡£


https://www.bleepingcomputer.com/news/security/mobile-carrier-cellcom-confirms-cyberattack-behind-extended-outages/


6. SideWinder APT×éÖ¯¾«×¼¹¥»÷ÄÏÑǶà¹úµ±¾Ö»ú¹¹


5ÔÂ20ÈÕ£¬Ë¹ÀïÀ¼¿¨¡¢ÃϼÓÀ­¹úÓë°Í»ù˹̹µÄ¸ß¼¶±ðµ±¾Ö»ú¹¹½üÆÚ³ÉΪAPT×éÖ¯SideWinderÐÂÒ»ÂÖ¹¥»÷µÄ³Áµã¡£¹¥»÷ÕßʹÓÃÓã²æÊ½´¹µöÓʼþ½áºÏµØÀíΧÀ¸¼¼Êõ£¬È·±£¶ñÒâÔØºÉ½öÕë¶ÔÌØ¶¨¹ú¶ÈÖ¸±ê¡£¹¥»÷Á´Í¨¹ýµö¶üÎĵµ¼¤»î£¬×îÖÕ²¿ÊðStealerBot¶ñÒâÈí¼þ£¬ÊÖ·¨ÓëSideWinder´Ëǰ»î¶¯ÌصãÏà·û¡£Õâ´Î¹¥»÷¶Ô×¼ÄÏÑǶà¹ú¹Ø¼ü²¿ÃÅ£¬ÈçÃϼÓÀ­¹úµçÐżà¹ÜίԱ»á¡¢¹ú·À²¿¡¢²ÆÕþ²¿£¬°Í»ù˹̹±¾ÍÁ¼¼Êõ·¢Õ¹¾Ö£¬ÒÔ¼°Ë¹ÀïÀ¼¿¨±íÕ®ÖÎÀí¾Ö¡¢¹ú·À²¿¡¢ÖÐÑëÒøÐеÈ¡£¹¥»÷ÕßÀûÓÃ΢ÈíOfficeÖеĺ¹Çà·ì϶CVE-2017-0199ÓëCVE-2017-11882×÷Ϊ³õʼ¹¥»÷ý½é£¬²¿Êð¾ß±¸Óƾû¯½Ó¼ûÄÜÁ¦µÄ¶ñÒⷨʽ¡£¶ñÒâÎĵµ´¥·¢CVE-2017-0199·ì϶ºó£¬Í¨¹ýDLL²àÔØ¼¼Êõ¿ªÊͺóÐøÔØºÉ£¬¶øµØÀíΧÀ¸¼¼ÊõÔòÈ·±£½öÔ¤Éè¹ú¶ÈÁìÓòÄÚµÄÊܺ¦Õß»áÊÕµ½ÏÖʵ¶ñÒâRTFÎļþ£¬¸ÃÎļþÀûÓù«Ê½±à×ëÆ÷·ì϶CVE-2017-11882´¥·¢ÄÚ´æ·ÛË飬ִÐлùÓÚshellcodeµÄ¼ÓÔØÆ÷ÒÔÔËÐÐStealerBot¡£StealerBot×÷ΪÄ£¿é»¯Ö²È뷨ʽ£¬¿ÉÄÜÇÔÈ¡ÆÁÄ»½ØÍ¼¡¢¼üÅ̼ͼ¡¢ÃÜÂë¡¢ÎļþµÈÃô¸ÐÊý¾Ý¡£


https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html