ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬³¬4.7Íò»áÔ±ÐÅϢй¶
°ä²¼¹¦·ò 2026-01-261. ŦԼÖݹ«ÎñÔ±¹¤»áÔâºÚ¿ÍÈëÇÖ£¬³¬4.7Íò»áÔ±ÐÅϢй¶
1ÔÂ21ÈÕ£¬Å¦Ô¼Öݹ«ÎñÔ±¹¤»áϵͳ2025Äê5ÔÂ3ÈÕÖÁ31ÈÕÔâ¶ñÒâ¹¥»÷ÕßÇÖÈë²¢Âñ·ü½üÒ»¸öÔ£¬µ¼Ö³¬4.7ÍòÃû»áÔ±Ó×ÎÒÐÅϢй¶¡£¸Ã¹¤»á×÷ΪÃÀ¹ú×î´óµÄ¹«¹²²¿ÃŹÍÔ±¹¤»á¡ª¡ªÖÝ¡¢ÏØ¡¢ÊйÍÔ±½áºÏ»áµÄÖ÷Ìâ³ÉÔ±µ¥Ôª£¬´ú±íÔ¼30ÍòÃûÖݼ°´¦Ëùµ±¾Ö¹ÍÔ±ÀûÒæ£¬Õâ´ÎÊÂÎñÒý·¢È«ÃÀÀ͹¤×éÖ¯ÍøÂ簲ȫ¹Ø×¢¡£¾Ý¹¤»áÏò»áÔ±·¢Ë͵Ä֪ͨº¯Åû¶£¬¹¥»÷ÕßÔÚϵͳÄÚ³ÖÐø»î¶¯ÆÚ¼ä£¬¿ÉÄÜ»ñÈ¡ÁË»áÔ±ÐÕÃû¡¢Éç»á±£ÏÕºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¹¤»áÓÚ5ÔÂÏÂÑ®·¢ÏÖδÊÚȨ½Ó¼ûºó£¬µ±¼´Æô¶¯µ÷²é²¢²ÉÈ¡ÏÂÏßϵͳ¡¢³ÁÖÃÃÜÂë¡¢²¿Êð¸ß¼¶°²È«¼ì²âÈí¼þµÈ´ëÊ©¡£Ö»¹ÜĿǰδ·¢ÏÖÐÅÏ¢±»ÓÃÓÚڲƻòÉí·ÝµÁÓõÄÖ±½ÓÖ¤¾Ý£¬µ«Éç»á±£ÏÕºÅÂëµÄƽÉúΨһÐÔʹÆä³ÉΪ³Ö¾ÃÍøÂ簲ȫÒþ»¼£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩÐÅÏ¢¿ªÉèÐéαÐÅ´ûÕË»§¡¢Ìá½»ÄÉ˰É걨µ¥»òÉêÁ츣Àû²¹Öú£¬¸øÊܺ¦Õß´øÀ´³ÖÐø·çÏÕ¡£¹¤»áÒÑÓë¶¥¼âÍøÂ簲ȫ¼°ÒþÖÔ±£»¤»ú¹¹ºÏ×÷·¢Õ¹µ÷²éÓëÓ¦¼±´ëÖ㬲¢È·ÈÏÉæÊÂÊý¾ÝÁìÓòºóʵʱ֪ͨÊÜÓ°Ïì»áÔ±¡£¹Ù·½½¨ÒéÊÜÓ°ÏìÈËÔ±¶¨ÆÚ²é¿´ÐÅÓþ»ã±¨¡¢²é¶ÔÕË»§Õ˵¥Ã÷ϸ£¬Ç×êÇ×¢Òâ¿ÉÒɻ¡£
https://cybernews.com/security/new-york-csea-union-data-breach/
2. º«¹úÔìÒ©¾ÞÍ·³¬800ÍòÌõÄÚ²¿ÐÅÏ¢¼°Ô±¹¤µµ°¸Ôâй¶
1ÔÂ21ÈÕ£¬º«¹ú³ÛÃûÒ©ÆóBoryungÔìÒ©½üÈÕ²úÉúÑϳÁÊý¾Ýй¶ÊÂÎñ£¬Æä¶³öµÄMongoDBÊý¾Ý¿âÒòÎÞÈκÎÊÚȨ·À»¤£¬µ¼Ö³¬800ÍòÌõÄÚ²¿Í¨Ñ¶¼Í¼¼°½ü3500·ÝÔ±¹¤µµ°¸±íй¡£¸ÃÊý¾Ý¿âÓÉÆóÒµ¼¶Í¨Ñ¶¹¤¾ßGW¼´Ê±Í¨Ñ¶Èí¼þʹÓã¬Ö±½ÓÃæÏò¹«¹²»¥ÁªÍøÊ¢¿ªÆëÈ«¶ÁȡȨÏÞ£¬Èκη¢ÏÖÕß¾ù¿É²»¹ÊÕϽӼû¡£Ð¹Â¶Êý¾Ý·ÖΪÈý´óÀࣺһÊÇÔ±¹¤Éí·ÝÊý¾Ý£¬Ô̺¬È«Ãû¡¢ÆóÒµÓÊÏä¡¢Óû§Ãû¡¢¹þÏ£¼ÓÃÜÃÜÂë¼°É豸ԪÊý¾Ý£¬¹¥»÷Õ߿ɽè´ËÖ´ÐÐÉí·ÝµÁÓûòÉç»á¹¤³Ìѧ¹¥»÷£¬ÉõÖÁͨ¹ýÀëÏßÆÆ½âÆÆÒëÃÜÂëºóÌáÒéײ¿â¹¥»÷£»¶þÊÇÄÚ²¿Í¨Ñ¶¼Í¼£¬º¸Ç800ÍòÌõÉæ¼°Ã³Ò×Ǣ̸¡¢ÈËÁ¦×ÊÔ´¡¢²ÆÕþ¡¢ÏîÄ¿ÖÎÀí¼°Ô±¹¤¸öÈ˶Ի°µÄ̸Ìì¼Í¼£¬ÆäÖÐÔ̺¬µÄÄÚ²¿Á´½Ó¡¢IPµØÖ·¡¢Ñз¢Æð̬µÈÃô¸ÐÐÅÏ¢£¬¿ÉÄܱ»ÓÃÓÚÏµÍ³ÉøÈë»ò¼Ù×°Ô±¹¤Éí·Ý£»ÈýÊÇϵͳԪÊý¾Ý£¬È繦·ò´Á¡¢ÐÂÎÅÇþ·¡¢Óû§-Çþ·¶ÔÓ¦¹ØÏµµÈ£¬¿É¸¨Öú¹¥»÷Õß¹¹½¨¹¥»÷õè¾¶¡£×êÑÐÍŶÓÖ¸³ö£¬´ËÀàй¶¿ÉÄÜÒý·¢Á¬Ëø·çÏÕ£º¹¥»÷Õß¿Éͨ¹ý̸Ìì¼Í¼ÖеÄϸ½Ú»ñÊØÐÅÀµ£¬Ö´Ðо«×¼Ú¿Æ£»»òÀûÓÃÆÆ½âµÄÃÜÂëÈëÇÔìóҵϵͳ£¬ÇÔÈ¡¸ü¶àóÒ×»úÃÜ¡£Ö»¹ÜBoryungÉÐδ»ØÓ¦£¬µ«Â¶³öÊý¾Ý¿âÒѱ»¹Ø¹Ø¡£
https://cybernews.com/security/boryung-corporation-leaks-internal-messages/
3. ɳ³æ×éÖ¯¹¥»÷²¨À¼ÄÜÔ´ÉèÊ©£¬²¿ÊðÐÂÐÍÊý¾Ý²Á³ýÈí¼þ
1ÔÂ24ÈÕ£¬²¨À¼µçÍø2025Äê12ÔÂÏÂÑ®Ôâ·êÓë¶íÂÞ˹¹ú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯¡°É³³æ¡±£¨Sandworm£©ÓйصÄÍøÂç¹¥»÷£¬¸Ã×éÖ¯ÊÔͼ²¿ÊðÃûΪ¡°DynoWiper¡±µÄÐÂÐÍ·ÛËéÐÔÊý¾Ý²Á³ý¶ñÒâÈí¼þ¡£¾Ý°²È«¹«Ë¾ESET֤ʵ£¬Õâ´Î¹¥»÷²úÉúÓÚ12ÔÂ29ÈÕÖÁ30ÈÕ£¬Ö¸±êÖ±Ö¸²¨À¼Á½×ùÈȵçÁª²ú³§¼°¿ÉÔÙÉúÄÜÔ´·¢µçÖÎÀíϵͳ£¨Ô̺¬·çÁ¦ÎÐÂÖ»úºÍ¹â·üµçÕ¾£©¡£²¨À¼×ÜÀíÌÆÄɵ¡¤Í¼Ë¹¿ËÔÚÐÂÎŰ䲼»áÉÏÃ÷È·Ö¸³ö£¬Ï®»÷ÓÉÓë¶íÂÞ˹µý±¨²¿ÃÅÖ±½Ó¹ØÁªµÄ×éÖ¯²ß¶¯¡£¡°É³³æ¡±£¨±ðºÅUAC-0113¡¢APT44¡¢Seashell Blizzard£©ÊǶíÂÞ˹×ÜÕÕ·÷²¿µý±¨×ܾ֣¨GRU£©ÏÂÊô74455¾üʵ¥ÔªµÄÒ»²¿ÃÅ£¬×Ô2009ÄêÆð»îÔ¾£¬ÒÔÖ´ÐзÛËéÐÔ¹¥»÷ÎÅÃû¡£Æäº¹ÇàÕ½¼¨Ô̺¬2015Äê¶ÔÎÚ¿ËÀ¼µçÍøµÄ¹¥»÷£¬µ¼ÖÂÔ¼23ÍòÈ˶ϵ硣±¾´Î¹¥»÷ÖÐʹÓõÄDynoWiper¶ñÒâÈí¼þ»á±éÀúÎļþϵͳɾ³ýÎļþ£¬µ¼Ö²Ù×÷ϵͳ̱»¾£¬Ðèͨ¹ý±¸·Ý³Á½¨»ò³ÁÐÂ×°Öá£ESET½«Æä¼ì²âΪWin32/KillFiles.NMO£¬²¢°ä²¼ÆäSHA-1¹þÏ£Öµ¡£
https://www.bleepingcomputer.com/news/security/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/
4. Call-On-DocÊý¾Ýй¶£¬Ó°Ï쳬¹ý100ÍòÃû»¼Õß
1ÔÂ24ÈÕ£¬Ô¶³ÌÒ½ÁÆ·þÎñÌṩÉÌCall-On-DocÐû³ÆÕ¼ÓÐ200Íò»îÔ¾Óû§£¬¿ÉÒ½ÖÎ150ÓàÖÖ¼²²¡£¬²¢³Ðŵѡȡ¡°×îÏȽø¡±Êý¾Ý°²È«´ëÊ©¼°ÆëÈ«ÇкÏHIPAA³ß¶È¡£È»¶ø£¬ºÚ¿ÍÂÛ̳Åû¶Æä12Ô³õÔâÈëÇÖ£¬1,144,223Ìõ»¼Õ߼ͼ±»ÇÔ£¬Éæ¼°»¼Õß´úÂë¡¢ÂòÂô±àºÅ¡¢ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢ÓÊÏä¡¢Ò½ÁÆÀà±ð¡¢¾ßÌ岡֢¡¢´¦·½¼°Ö§¸¶½ð¶îµÈÃô¸ÐÐÅÏ¢¡£ºÚ¿ÍÌṩÈýÕÅÔ̺¬ÊýÊ®Ãû»¼ÕßÐÅÏ¢µÄ½ØÍ¼¼°1000ÌõÑù±¾Îļþ£¬¾ºË²é²¿ÃÅ»¼ÕßµØÖ·ÈÔÓÐЧ£¬ÇÒÂô¼Ò½ÓÊܵÚÈý·½ÍйÜÂòÂô£¬Êý¾ÝÕæÊµÐԽϸߡ£Õâ´ÎÊÂÎñÒý·¢¶à³ÁÕùÒé¡£Call-On-Docѡȡ×Ô·Ñģʽ£¬²»´æ´¢±£ÏÕÐÅÏ¢»òÉç±£ºÅ£¬ÆäHIPAAºÏ¹æÐÔ´æÒÉ£¬Èô½öͨ¹ýµç×Ó´«Êä½øÐÐÊܱ£»¤ÂòÂôÔò¿ÉÄÜÊܼà¹Ü£¬²»È»ÈÔÊÜÖÝ˾·¨¼°FTCÔ¼Êø¡£Èô´æÔÚ¡°³Ðŵ׿Խ°²È«È´Î´¶ÒÏÖ¡±µÄºýŪÐÐΪ£¬FTC¿Éƾ¾Ý¡¶Áª¹úÒµÎñίԱ»á·¨¡·µ÷²é¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Call-On-DocÍøÕ¾FAQÐû³ÆÆäEHRϵͳ¡°ÆëÈ«ÇкÏHIPAA¡±£¬µ«¹¥»÷Õß³ÆÎ´·¢ÏÖ¼ÓÃÜÖ¤¾Ý£¬ÇÒ¹¥»÷ÆÚ¼ä»ú¹¹Î´¾õ²ì¡£
https://databreaches.net/2026/01/24/call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment/?pk_campaign=feed&pk_kwd=call-on-doc-allegedly-had-a-breach-affecting-more-than-1-million-patients-theyve-yet-to-comment
5. ShinyHuntersÀÕË÷ÍÅ»ïÌáÒéSSOÓïÒô´¹µö¹¥»÷
1ÔÂ23ÈÕ£¬ShinyHuntersÀÕË÷ÍÅ»ï½üÈÕÐû³Æ£¬Õý¶ÔOkta¡¢Î¢Èí¼°¹È¸èµÄµ¥µãµÇ¼£¨SSO£©ÕË»§ÌáÒé³ÖÐøÓïÒôÍøÂç´¹µö¹¥»÷£¬ÒÔÇÔÈ¡ÆóÒµÊý¾Ý²¢Ö´ÐÐÀÕË÷¡£¹¥»÷ÖУ¬ÍþвÐÐΪÕß¼ÙÒâITÖ§³ÖÈËÔ±£¬Í¨¹ýµç»°ÓÕÆÔ±¹¤ÔÚ·ÂÕÕ¹«Ë¾µÇ¼ÃÅ»§µÄ´¹µöÍøÕ¾ÊäÈëÍ´´¦ºÍ¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©´úÂë¡£Ò»µ©¹¥ÆÆÏµÍ³£¬¹¥»÷Õ߿ɽӼûÊܺ¦ÕßSSOÕË»§£¬½ø¶øÏνӵ½ÆäËûÆóÒµÀûÓÃÈçSalesforce¡¢Microsoft 365¡¢Google Workspace¡¢DropboxµÈ£¬ÕâЩƽ̨ͨ¹ýSSO½ÚÔìÃæ°å¼¯³É£¬³ÉΪ½øÈëÆóҵϵͳºÍÊý¾ÝµÄÈë¿Ú¡£¹¥»÷ÕßÀûÓÃÉç»á¹¤³Ì¼¿Á©£¬ÔÚͨ»°ÖÐʵʱÊèµ¼Êܺ¦ÕßʵÏֵǼºÍMFAÑéÖ¤£¬ÉõÖÁ¶¯Ì¬µ÷Õû´¹µöÍøÕ¾ÄÚÈÝÒÔÆ¥ÅäÕæÊµ·þÎñµÄÑéÖ¤²½Öè¡£OktaÒѰ䲼»ã±¨£¬ÃèÊöÁ˹¥»÷ÖÐʹÓõĴ¹µö¹¤¾ß°ü£¬Ô̺¬»ùÓÚWebµÄ½ÚÔìÃæ°å£¬¿ÉʵʱŤתÊܺ¦Õß¿´µ½µÄÒ³ÃæÄÚÈÝ£¬¸¨ÖúʵÏÖÑéÖ¤¹ý³Ì¡£ShinyHunters֤ʵ¶Ô²¿ÃŹ¥»÷ÕÆ¹Ü£¬³ÆSalesforceÎªÖØÒªÖ¸±ê£¬ÆäËû¹«Ë¾Îª¡°ÊÜÒæÕß¡±£¬²¢ÀûÓôËǰÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄµç»°ºÅÂ롢ְλÐÅÏ¢µÈ¼ÓǿڿƿÉÐŶȡ£
https://www.bleepingcomputer.com/news/security/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/
6. Under ArmourÔâEverestÀÕË÷Èí¼þ¹¥»÷
1ÔÂ23ÈÕ£¬ÃÀ¹ú»î¶¯ÒÂÊξÞÍ·Under ArmourÕýµ÷²éһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°7200ÍòÌõ¿Í»§¼Í¼±»¹«¿ªÖÁºÚ¿ÍÂÛ̳¡£¾Ý±¨Â·£¬¸ÃÊÂÎñÓëEverestÀÕË÷Èí¼þÍÅ»ï2025Äê11ÔÂÌáÒéµÄ¹¥»÷Óйأ¬ºóÕßÔøÐû³ÆÇÔÈ¡343GBÊý¾Ý²¢ÊÔͼÀÕË÷Êê½ð¡£2026Äê1Ô£¬¿Í»§Êý¾ÝÔÚÈȵãºÚ¿ÍÂÛ̳й¶£¬Ô̺¬7200Íò¸öµç×ÓÓʼþµØÖ·¼°ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢ÐԱ𡢵ØÀíµØÎ»¡¢²É°ì¼Í¼µÈÃô¸ÐÐÅÏ¢¡£³ÛÃûÊý¾Ýй¶׷×ÙÆ½Ì¨Have I Been Pwned֤ʵ£¬Õâ´Îй¶µÄÑù±¾Êý¾ÝÔ̺¬Êý°ÙÍòÌõUnder Armour¹Ë¿Í²É°ì¼Í¼¼°Ô±¹¤µç×ÓÓʼþµØÖ·£¬Óë¸Ãƽ̨´Ëǰ»ã±¨Ò»Ö¡£Ð¹Â¶Êý¾Ýͨ¹ýºÚ¿ÍÂÛ̳¹«¿ªºó£¬Òý·¢¿í·º¹Ø×¢£¬ÊÜÓ°ÏìÓû§ÒÑͨ¹ý¸Ãƽ̨ÊÕµ½Í¨Öª¡£Under Armour»ØÓ¦³Æ£¬¹«Ë¾ÕýÓë±í²¿ÍøÂ簲ȫר¼ÒºÏ×÷µ÷²éÖ¸¿Ø£¬²¢Ç¿µ÷Ö§¸¶ÏµÍ³¼°Óû§ÃÜÂëδÊÜÓ°Ïì¡£¸Ã¹«Ë¾·ñ¶¨¡°ÊýǧÍòÌõÃô¸Ð¼Í¼Ôâй¶¡±µÄ˵·¨£¬½öÈϿɡ°¼«ÉÙÊý¿Í»§Ãô¸ÐÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡±£¬µ«Î´Ã÷È·¾ßÌåÊýÁ¿¡£Ä¿Ç°£¬¹«Ë¾Î´Åû¶¹¥»÷Èë¿Úµã»ò¾ßÌåй¶ÔÒò£¬Ò²Î´×¢Ã÷ÊÇ·ñÊÕµ½ÀÕË÷Êê½ðÒªÇó¡£
https://securityaffairs.com/187229/data-breach/investigation-underway-after-72m-under-armour-records-surface-online.html


¾©¹«Íø°²±¸11010802024551ºÅ