Ï£²©ÒÁ¸ùÊÐÔâChortÀÕË÷ÍŻ﹥»÷£¬ÖÂ6.7ÍòÈËÐÅϢй¶

°ä²¼¹¦·ò 2025-05-30

1. Ï£²©ÒÁ¸ùÊÐÔâChortÀÕË÷ÍŻ﹥»÷£¬ÖÂ6.7ÍòÈËÐÅϢй¶


5ÔÂ28ÈÕ£¬ÃÀ¹úÍþ˹¿µÐÇÖÝÏ£²©ÒÁ¸ùÊÐÔ¼6.7ÍòÈËÊÕµ½ÖҸ棬2024Äê10ÔµÄÀÕË÷Èí¼þ¹¥»÷ÒÔÖÁºÚ¿Í»ñÈ¡ÁËËûÃǵÄÓ×ÎÒÐÅÏ¢¡£Êе±¾ÖÓÚÖÜÎåÏò¼à¹Ü»ú¹¹Ìá½»Êý¾Ýй¶֪ͨÐÅ£¬È·ÈϺڿÍÔÚ2024Äê10ÔÂ31ÈÕÈëÇÖÊÐÕþϵͳʱÇÔÈ¡ÁËÉç±£ºÅÂë¡¢ÖÝÉí·ÝÖ¤¼°³µÉ̱êµÈ³ÁÒªÐÅÏ¢¡£Ï£²©ÒÁ¸ùÊе±¾Ö´ËǰίÍÐÍøÂ簲ȫ¹«Ë¾·¢Õ¹µ÷²é£¬×îÖÕÓÚ5ÔÂ14ÈÕÈ·ÈÏÊý¾ÝÔâÇÔÈ¡¡£¸ÃÊÐÈ˶¡Ô¼5Íò£¬´ËǰËäÈÏ¿ÉÀÕË÷Èí¼þÍÅ»ïChortÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬µ«Ôø°µÊ¾ÎÞÖ¤¾ÝÅú×¢Ãô¸ÐÊý¾Ý±»ÇÔ¡£È»¶ø£¬2024Äê11Ô£¬ChortÍŻ﹫¿ªÁËÎļþµµ°¸½ØÍ¼²¢Ë÷ÒªÊê½ð¡£Êе±¾ÖÒÑÏò·¨Âɲ¿ÃŻ㱨´ËÊ£¬²¢ÔÚÓ¦¶Ô¹ý³ÌÖÐ×ñÑ­ÆäÁìµ¼¶¨¼û¡£¹ÙÔ±³ÆÓ¦¼±·þÎñÕý³£ÔËÐУ¬µ«×Ô11ÔÂ22ÈÕºóδÔÙ°ä²¼½øÒ»²½¸üС£Êе±¾ÖÔÚ֪ͨÐÅÖгÐŵΪÊÜÓ°Ïì¾ÓÃñÌṩΪÆÚÒ»ÄêµÄÉí·Ý±£»¤·þÎñ¡£ChortÀÕË÷ÍÅ»ï×Ô2024Äê11ÔÂո¶ͷ½ÇÒÔÀ´£¬ÒÑÐû³Æ¹¥»÷ÁËÔ̺¬¿ÆÍþÌØ¹«¹²Å©ÒµÓëÓæÒµ×ÊÔ´¾Ö¡¢ÇÇÖÎÑÇÖÝij¹«Á¢Ñ§ÌÃÔÚÄڵĶà¼Ò»ú¹¹¡£


https://therecord.media/ransomware-sheboygan-breach-notice


2. Azure Blob´æ´¢Ð¹Â¶£º³¬160Íò·ÝµçÉ̿ͻ§ÐÅϢй¶


5ÔÂ28ÈÕ£¬ÍøÂ簲ȫ×êÑÐÍŶӽüÈÕ·¢ÏÖÁ½¸öδÊܱ£»¤µÄAzure Blob´æ´¢ÈÝÆ÷²úÉúÊý¾Ýй¶£¬Éæ¼°³¬¹ý160Íò·ÝÎļþ£¬ÖØÒªÔ̺¬Etsy¡¢Poshmark¼°TikTokµêÆÌµÄ¿Í»§ÐÅÏ¢¡£Õâ´Îй¶ÒÔÃÀ¹úÓû§ÎªÖ÷£¬²¿ÃżÓÄôóÓë°Ä´óÀûÑÇÓû§Ò²Êܵ½Ó°Ïì¡£Ö»¹ÜÔÚÏß¹ºÎïÒѾ߱¸½Ï¸ß°²È«ÐÔ£¬µ«Õâ´ÎÊÂÎñ½ÒʾÁËÊý×ÖÒõÓ°ÖÐDZ²ØµÄ·çÏÕ¡£Ð¹Â¶µÄHTMLÌåʽÎïÁ÷È·ÈÏÓʼþÖÐÔ̺¬Óû§È«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓÊÏä¼°ÎïÁ÷¶©µ¥ÏêÇéµÈÃô¸ÐÐÅÏ¢¡£×êÑÐÍŶÓÖ¸³ö£¬Etsy×÷ΪȫÇòÊý°ÙÍòÓ×΢ÆóÒµµÄÂòÂôƽ̨£¬ÆäÎïÁ÷È·ÈÏÓʼþÊý¾Ýй¶¶Ô¿Í»§ÒþÖÔÓ밲ȫ×é³É³Á´óÍþв¡£´ó²¿ÃÅй¶ÎļþÀ´×ÔEtsy£¬²¿ÃÅÊý¾Ý»¹¹ØÁªTikTokµêÆÌ¡¢Poshmark¼°Embrolyƽ̨¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩй¶ÐÅÏ¢Ö´Ðо«×¼´¹µö¹¥»÷¡¢Éç½»¹¤³Ì¹¥»÷»ò¶ñÒâÈí¼þ´«²¼µÈ¶ñÒâ»î¶¯¡£¹ÌÈ»ÎÞ·¨È·È϶³öÊ·ýµÄ¾ßÌåËùÓÐÕߣ¬µ«·ÖÎöÏÔʾÊÜÓ°Ïì¶©µ¥ÖØÒªÉæ¼°Ô½ÄϵØÓòµÄ´ÌÐå·þÎñÌṩÉÌ£¬¿ÉÄÜΪµ¥Ò»ÊµÌåÔÚ¶à¸öµçÉÌÆ½Ì¨¿ªÉèµêÆÌËùÖ¡£×êÑÐÍŶӳö¸ñ¾¯Ê¾£¬°ÑÎÕÓû§È«ÃûÓëµØÖ·ÐÅÏ¢ºó£¬¹¥»÷Õß¿ÉÄܼÙ×°³É¿ÉÐÅÎïÁ÷·þÎñÉÌÖ´ÐжñÒâ²Ù×÷£¬¼«´óÌáÉý¹¥»÷³É¹¦ÂÊ¡£


https://cybernews.com/security/etsy-tiktok-shop-customer-data-leak/


3. RE/MAXÔâMedusaÀÕË÷Èí¼þ¹¥»÷£¬150GBÊý¾Ýй¶


5ÔÂ28ÈÕ£¬RE/MAXÊÇÒ»¼ÒÔÚÈ«ÇòÕ¼ÓÐ9000¶à¼Ò´¦Ê´¦µÄ¹ú¼Ê·¿µØ²úÍøÂ磬¾Ý³ÆÔâµ½ÁËMedusaÀÕË÷Èí¼þµÄ¹¥»÷¡£MedusaÊÇÒ»¸öÕë¶Ô´óÐÍ×éÖ¯µÄ³ÁÒªÍþвÐÐΪÕߣ¬Õâ´Î¹¥»÷ÖУ¬¸ÃÀÕË÷Èí¼þ×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾Éϰ䲼ÁËRE/MAXµÄÓйØÐÅÏ¢£¬Ðû³ÆÒÑÇÔÈ¡150GBÊý¾Ý£¬²¢Ë÷Òª20ÍòÃÀÔªÊê½ðÒÔɾ³ýÔü×ÒÊý¾Ý£¬Í¬Ê±É趨Á˲»µ½18ÌìµÄÊê½ðÖ§¸¶µ¹¼ÆÊ±¡£Ëù¸½½ØÍ¼ÏÔʾ£¬±»Ð¹Â¶µÄÊý¾ÝÉæ¼°À´×Ô·ÖÆç¹ú¶ÈµÄ·¿µØ²ú¾­¼ÍÈË£¬Ô̺¬Ó×ÎÒÊý¾ÝÈçÈ«Ãû¡¢ÕÕÆ¬¡¢Ó¶½ð¼Í¼¡¢Õ˵¥Êý¾Ý¼°ÁªÏµ·½Ê½µÈ£¬´Ë±í»¹ÓÐÄÚ²¿Îļþ£¬½ÒʾÁËÖ§¸¶¸ø¾­¼ÍÈ˵Ľð¶î¡¢·ÖÀà¡¢Åä¶îºÍÓöȽṹ£¬ÎļþÈÕÆÚÏÔʾÊý¾Ý¿ç¶ÈΪ2021ÄêÖÁ2023Äê¡£Ö»¹ÜĿǰй¶µÄÊý¾ÝÑù±¾¿´ÆðÀ´²¢·Ç³¬µÈÃô¸Ð£¬µ«¼øÓÚÊý¾Ý¹æÄ£ÖØ´ó£¬Ôü×Òй¶Êý¾ÝÖпÉÄÜÔ̺¬¸üÃô¸ÐµÄÐÅÏ¢¡£°²È«×êÑÐÔ±Ö¸³ö£¬ÕâÒ»´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÅú×¢RE/MAXÔÚÊý¾ÝÖÎÀí·½Ãæ´æÔÚÑϳÁȱµã¡£±»µÁÊý¾Ý¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢½ðÈÚڲƭºÍ¸ß¶ÈÕë¶ÔÐÔµÄÍøÂç´¹µö£¬ÉõÖÁ¿ÉÄܵ¼ÖÂRE/MAX¿Í»§Ôâ·ê·¿µØ²úÚ¿Æ­¡£Òò¶ø£¬RE/MAX¿ÉÄÜÃæ¶Ô²ÆÕþËðʧ¡¢ÔËÓªÖжϺÍÃûÓþÊÜËðµÈ¶à³Á·çÏÕ¡£MedusaÀÕË÷Èí¼þ×éÖ¯³ýË÷ÒªÊê½ð±í£¬»¹ÌṩÁ˽«½ØÖ¹ÈÕÆÚµ¢¸éÒ»Ìì¡¢Ö§¸¶1ÍòÃÀÔªµÄÑ¡Ïî¡£


https://cybernews.com/security/medusa-ransomware-threatens-release-remax-data/


4. Ô¼µ©¿ÆÍþÌØÒøÐÐÔâÀÕË÷¹¥»÷£¬Ô±¹¤Êý¾Ý¼°ÄÚ²¿×ÊÁÏй¶


5ÔÂ27ÈÕ£¬Ô¼µ©¿ÆÍþÌØÒøÐУ¨JKB£©½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬ºÚ¿ÍÍþвÈô²»Ö§¸¶Êê½ð½«°ä²¼»úÃÜÊý¾Ý¡£JKBÊÇÔ¼µ©ÒøÐÐϵͳµÄÖØÒª²Î¼ÓÕߣ¬ÒÔÆäÊý×Ö»¯»ù´¡ÉèÊ©ÎÅÃû£¬ÔÚÔ¼µ©¸÷µØÕ¼ÓÐ64¼Ò·ÖÐкʹ¦Ê´¦£¬²¢ÔÚÈûÆÖ·˹ÉèÓзÖÐС£¾Ý°µÍø»ã±¨£¬EverestÀÕË÷Èí¼þ¼¯ÍÅÇÔÈ¡ÁË1003ÃûJKBÔ±¹¤µÄÓ×ÎÒÊý¾Ý¼°11.7GBµÄ¹«Ë¾ÄÚ²¿Êý¾Ý£¬²¢´ÍÓëÒøÐÐÎåÌ칦·òÁªÏµ½»ÉæÒÔÖ§¸¶Êê½ð¡£¹ÌÈ»ÎÞÊý¾ÝÑù±¾¿É¹©ÏÂÔØ£¬µ«ÍÅ»ï·ÖÏíµÄ½ØÍ¼Â¶³öÁËÔ±¹¤Ãô¸ÐµÄ¸öÈËÐÅÏ¢£¬Ô̺¬È«Ãû¡¢¼ÒÍ¥ÏêÇ顢ְλÃû³Æ¡¢µ®ÉúÈÕÆÚ¡¢¹ú¼®¡¢¹¤×÷ÓÊÏäºÍµç»°·Ö»úºÅÒÔ¼°ÒøÐÐÕË»§¾ßÌåÐÅÏ¢µÈ¡£Ô±¹¤Ó×ÎÒ×ÊÁϵÄй¶²»½ö¼Óº¦ÒþÖÔ£¬»¹ÎªÉí·Ý͵ÇÔ¡¢½ðÈÚڲƭºÍ¶¨Ïò¹¥»÷ÌṩÁË·½±ã£¬Í¬Ê±¿ÉÄܶԹ«Ë¾ÄÚ²¿ÏµÍ³ºÍÒøÐлù´¡ÉèÊ©×é³ÉºóÃÅÍþв¡£×êÑÐÓ××éÖ¸³ö£¬Ð¹Â¶µÄÐÅϢʹÍþвÐÐΪÕß¿ÉÄÜÌáÒé¸ß¶ÈÕë¶ÔÐÔµÄÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷£¬²¢¿ÉÄܵ¼ÖÂÒøÐÐÄÚ²¿ÏµÍ³±»ÈëÇÖ¡£¼ÒÍ¥¾ßÌåÐÅÏ¢µÄй¶½øÒ»²½Ôö³¤ÁË·çÏÕ£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢ÈÆ¹ý°²È«ÎÊÌâ½Ó¼ûÕË»§¡£


https://cybernews.com/security/jordan-kuwait-bank-data-breach-everest-ransomware/


5. ConnectWiseÔâÍøÂç¹¥»÷£¬»ò¹ØÁªScreenConnect·ì϶


5ÔÂ29ÈÕ£¬ITÖÎÀíÈí¼þ¹«Ë¾ConnectWise³ÆÒÉËÆÔâ·ê¹ú¶ÈÖ§³ÖµÄÍøÂç¹¥»÷£¬Ó°ÏìÓÐÏÞÊýÁ¿µÄScreenConnect¿Í»§¡£ConnectWiseÔÚ²¼¸æÖаµÊ¾£¬½üÆÚ·¢ÏÖ»·¾³ÖдæÔÚ¿ÉÒɻ£¬ÒÔΪÓ븴ÔÓ¹ú¶ÈÐÐΪÕßÓйØ¡£¸Ã¹«Ë¾ÒÑÓëȡ֤ר¼ÒMandiant·¢Õ¹µ÷²é£¬ÁªÏµÊÜÓ°Ïì¿Í»§²¢Ð­µ÷·¨Âɲ¿ÃÅ¡£ConnectWiseλÓÚ·ðÂÞÀï´ïÖÝ£¬ÎªÍйܷþÎñÌṩÉÌ£¨MSP£©ºÍIT²¿ÃÅÌṩ¶àÖÖ½â¾ö¹æ»®£¬ScreenConnectÊÇÆäÔ¶³Ì½Ó¼ûºÍÖ§³Ö¹¤¾ß¡£¾ÝCRN±¨Â·£¬ConnectWiseÒѼÓÇ¿¼à¿Ø²¢Ç¿»¯ÍøÂ簲ȫ£¬ÇÒδÔÚ¿Í»§°¸ÀýÖп´µ½½øÒ»²½¿ÉÒɻ¡£ÓÐÐÂÎÅÈËʿй©£¬ÈëÇÖ²úÉúÔÚ2024Äê8Ô£¬ConnectWiseÓÚ2025Äê5Ô·¢ÏÖ¿ÉÒɻ£¬½öÓ°Ïì»ùÓÚÔÆµÄScreenConnectÊ·ý¡£ÍйܷþÎñÌṩÉÌCNWR×ܲðµÊ¾£¬Ö»Óм«ÉÙÊý¿Í»§ÊÜÓ°Ï죬°µÊ¾ÍþвÐÐΪÕß½øÐÐÁËÕë¶ÔÐÔ¹¥»÷¡£RedditÌû×ÓÖ¸³ö£¬¸ÃÊÂÎñÓëScreenConnect·ì϶£¨CVE-2025-3935£©ÓйØ£¬´Ë·ì϶Ϊ¸ßÑϳÁÐÔViewState´úÂë×¢Èë·ì϶£¬Óɲ»°²È«·´ÐòÁл¯ÒýÆð£¬ÌØÈ¨ÍþвÐÐΪÕß¿ÉÇÔÈ¡»úеÃÜÔ¿Ôì×÷¶ñÒâ¸ºÔØ¡£


https://www.bleepingcomputer.com/news/security/connectwise-breached-in-cyberattack-linked-to-nation-state-hackers/


6. ά¶àÀûÑǵİÂÃØÒò°²È«ÊÂÎñ¹Ø¹ØÍøÕ¾


5ÔÂ29ÈÕ£¬Òò³ÖÐø°²È«ÊÂÎñ£¬Ê±ÉоÞͷά¶àÀûÑǵİÂÃØ¹Ø¹ØÁËÆäÍøÕ¾¼°²¿ÃÅÉ̵ê·þÎñ¡£Î¬¶àÀûÑǵİÂÃØÔÚÈ«Çò½ü70¸ö¹ú¶È/µØÓòÖÎÀí×ÅÔ¼1380¼ÒÁãÊ۵꣬2025²ÆÄêÄêÊÕÈë´ï62.3ÒÚÃÀÔª¡£¸Ã¹«Ë¾ÔÚ´úÌæÍøÕ¾µÄÐÂÎÅÖÐ·î¸æ¿Í»§£¬Æäά¶àÀûÑǵİÂÃØºÍPINKÉ̵êÔÚ¸´Ô­ÔËÓªÆÚ¼äÈÔÕý³£½»Ò×£¬µ«Òò·¢ÏÖ°²È«ÊÂÎñ²¢²ÉÈ¡´ëÊ©½â¾ö£¬Îª°²È«Æð¼û¹Ø¹ØÁËÍøÕ¾ºÍ²¿ÃŵêÄÚ·þÎñ£¬ÍŶÓÕý×Î×β»¾ë¹¤×÷ÒÔÈ«Ãæ¸´Ô­ÔËÓª£¬²¢¶Ô¿Í»§ÄÍÐÄÆÚ´ý°µÊ¾¸Ð¼¤¡£Î¬¶àÀûÑǵİÂÃØ½²»°È˰µÊ¾£¬¹«Ë¾ÒÑÀñƸ±í²¿×¨¼Òµ÷²é´ËÊÂÓ°Ï죬µ«ÉÐδй©ÊÂÎñÐÔÖÊ£¬Í¬Ê±°µÊ¾Òѵ±¼´Æô¶¯Ó¦¶Ô¹æ»®£¬¹Ø¹ØÍøÕ¾ºÍ²¿ÃŵêÄÚ·þÎñÒÔ·ÀÍòÒ»£¬ÕýÖÂÁ¦¼±¾ç°²È«¸´Ô­ÔËÓª£¬»á³ÖÐøÎªÃŵê¹Ë¿ÍÌṩ·þÎñ¡£Åí²©ÐÂÎÅÉç¿´µ½µÄ·¢¸øÔ±¹¤µÄ֪ͨÖУ¬¸ÃÁãÊÛÉÌÊ×ϯִÐйÙÏ£À­ÀËÕÅåÆÕÒ²·î¸æÔ±¹¤¡°¸´ËÕ±ØÒªÒ»¶Î¹¦·ò¡±¡£


https://www.bleepingcomputer.com/news/security/victorias-secret-takes-down-website-after-security-incident/