TalentHookÇóְϵͳÉèÖùýʧÖÂ2600Íò·Ý¼òÀúй¶

Ðû²¼Ê±¼ä 2025-07-07

1. TalentHookÇóְϵͳÉèÖùýʧÖÂ2600Íò·Ý¼òÀúй¶


7ÔÂ3ÈÕ£¬£¬£¬ £¬£¬ £¬ÃÀ¹úÈËÁ¦×ÊԴЧÀÍÆ½Ì¨TalentHookÒòAzure Blob´æ´¢ÈÝÆ÷ÉèÖùýʧ£¬£¬£¬ £¬£¬ £¬µ¼Ö½ü2600Íò·ÝÇóÖ°Õß¼òÀú±»¹ûÕæÌ»Â¶£¬£¬£¬ £¬£¬ £¬Òý·¢ÑÏÖØÊý¾ÝÇå¾²ÊÂÎñ ¡£¡£¡£¡£Ì»Â¶µÄÈÝÆ÷Öд洢×Å´ó×ÚÃÀ¹úÇóÖ°ÕßµÄÃô¸ÐÐÅÏ¢£¬£¬£¬ £¬£¬ £¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢½ÌÓýÅä¾°¡¢ÊÂÇéÂÄÀú¼°¼ÒͥסַµÈ½¹µãСÎÒ˽¼ÒÐÅÏ¢ ¡£¡£¡£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬ £¬£¬ £¬Ð¹Â¶Êý¾ÝµÄ¸ßÍêÕûÐÔʹ¹¥»÷ÕßÄܹ»ÊµÑ龫׼Éç»á¹¤³Ì¹¥»÷ ¡£¡£¡£¡£ºÚ¿Í¿Éͨ¹ýÓʼþ¡¢¶ÌÐÅ·¢ËÍÐéαÊÂÇéÔ¼Çë»òÅä¾°ÊÓ²ìÒªÇ󣬣¬£¬ £¬£¬ £¬ÓÕµ¼Êܺ¦ÕßÌá½»Éí·Ý֤ɨÃè¼þ¡¢ÒøÐÐÕË»§µÈ¸üÉî²ãÐÅÏ¢£¬£¬£¬ £¬£¬ £¬ÉõÖÁð³ä¹ÍÖ÷ÊÕÈ¡ÐéαÉêÇëÓÃ¶È ¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬ £¬£¬ £¬¼ÒͥסַÓëÁªÏµ·½·¨µÄ̻¶´ó·ùÔöÌíÁË"ÈËÈâËÑË÷"Σº¦£¬£¬£¬ £¬£¬ £¬¿ÉÄܵ¼ÖÂÏÖʵÌìÏÂÖеÄɧÈÅ»òÏÅ»£ÐÐΪ ¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬ £¬£¬ £¬CybernewsÒÑÏòTalentHookĸ¹«Ë¾Resource Edge·¢³öÇå¾²¾¯Ê¾£¬£¬£¬ £¬£¬ £¬½¨ÒéÆäÁ¬Ã¦½ÓÄÉÎåÏîÐÞ¸´²½·¥£ºÏÞÖÆÈÝÆ÷¹«¹²»á¼ûȨÏÞ¡¢ÆôÓÃЧÀÍÆ÷¶Ë¼ÓÃÜ¡¢Í¨¹ýAzure Key VaultÖÎÀíÃÜÔ¿¡¢½¨Éè»á¼ûÈÕÖ¾¼à¿Ø»úÖÆ£¬£¬£¬ £¬£¬ £¬²¢¿ªÕ¹°´ÆÚÇå¾²Éó¼ÆÓëÔ±¹¤Åàѵ ¡£¡£¡£¡£×èÖ¹±¨¸æÐû²¼£¬£¬£¬ £¬£¬ £¬¸Ã¹«Ë¾ÉÐδ¹ûÕæ»ØÓ¦´¦Öóͷ£Ï£Íû ¡£¡£¡£¡£


https://cybernews.com/security/talenthook-data-leak-exposes-millions/


2. ¹ú¼ÊÖ´·¨Ðж¯´Ý»Ù×ÊÙ°µÍø¶¾Æ·Êг¡Archetyp Market


7ÔÂ3ÈÕ£¬£¬£¬ £¬£¬ £¬Å·ÖÞÐ̾¯×éÖ¯Ôڵ¹úÖ÷µ¼µÄ¶à¹úÁªºÏÐж¯ÖУ¬£¬£¬ £¬£¬ £¬ÀֳɹرÕÁ˰µÍøÀúÊ·ÉÏÔËӪʱ¼ä×µÄ¶¾Æ·ÉúÒâÆ½Ì¨Archetyp Market£¬£¬£¬ £¬£¬ £¬²¢¾Ð²¶Æä½¹µã³ÉÔ± ¡£¡£¡£¡£´Ë´Î´úºÅ"Deep Sentinel"µÄרÏîÐж¯ÓÚ6ÔÂ11ÈÕÖÁ13ÈÕÕö¿ª£¬£¬£¬ £¬£¬ £¬ºá¿çµÂ¹ú¡¢ºÉÀ¼¡¢ÂÞÂíÄáÑÇ¡¢Î÷°àÑÀ¡¢ÈðµäµÈÁù¹ú£¬£¬£¬ £¬£¬ £¬Ô¼300ÃûÖ´·¨Ö°Ô±Í¬²½ÊµÑé×¥²¶ÓëÖ¤¾Ý±£È«£¬£¬£¬ £¬£¬ £¬×îÖÕÔÚÎ÷°àÑÀ¾³ÄÚ×¥»ñ¸ÃÊг¡ÖÎÀíÔ±£¬£¬£¬ £¬£¬ £¬Èðµä·½ÃæÍ¬²½¹¥»÷¶¥¼¶¹©Ó¦ÉÌÍøÂç ¡£¡£¡£¡£×÷Ϊ°µÍø¶¾Æ·ÉúÒâÁìÓòµÄ"ÔªÀϼ¶"ƽ̨£¬£¬£¬ £¬£¬ £¬Archetyp Market×Ô2019ÄêÆðÒ»Á¬ÔËÓªÁè¼ÝÎåÄ꣬£¬£¬ £¬£¬ £¬ÀÛ¼Æ×¢²áÓû§Í»ÆÆ60Íò£¬£¬£¬ £¬£¬ £¬×ÜÉúÒâ¶î¹ÀËã´ï2.5ÒÚÅ·Ôª ¡£¡£¡£¡£ÆäÉÌÆ·¿â°üÀ¨1.7ÍòÖÖ²»·¨ÎïÆ·£¬£¬£¬ £¬£¬ £¬ÓÈÆäÒÔÔÊÐíÉúÒâ·ÒÌ«ÄáµÈ¸ß´¿¶ÈºÏ³É°¢Æ¬ÀàÒ©ÎïÖø³Æ£¬£¬£¬ £¬£¬ £¬ÕâÀàÎïÖÊÒѳÉΪŷÖÞÒÔÖÂÈ«ÇòÈÕÒæÑÏËàµÄ¹«¹²ÎÀÉúÍþв ¡£¡£¡£¡£Æ½Ì¨ÊÖÒռܹ¹½ÓÄɶàÖØÄäÃû»¯Éè¼Æ£¬£¬£¬ £¬£¬ £¬ÓëÒѹرյÄDream Market¡¢Silk RoadµÈ°µÍøÆ½Ì¨ÆëÃû£¬£¬£¬ £¬£¬ £¬ÐγÉÍêÕûµÄ²»·¨¹©Ó¦Á´ ¡£¡£¡£¡£Ðж¯ÖУ¬£¬£¬ £¬£¬ £¬Ö´·¨»ú¹¹Í¨¹ýºã¾Ã×ʽð×·×ÙÓëÊý×Öȡ֤£¬£¬£¬ £¬£¬ £¬Àֳɶ¨Î»Òªº¦»ù´¡ÉèÊ©²¢¶³½á780ÍòÅ·ÔªÉæ°¸×ʲú ¡£¡£¡£¡£µÂ¹úÁª°îÐÌʾ¯Ô±¾Ö£¨BKA£©ÓëÅ·ÖÞ˾·¨×éÖ¯£¨Eurojust£©Ð­µ÷¿ç¹úÖ¤¾ÝÁ´£¬£¬£¬ £¬£¬ £¬×îÖÕʵÏÖÊÖÒÕÍŶÓÓëÖÎÀí²ãµÄË«ÖØÍ»ÆÆ ¡£¡£¡£¡£


https://securityaffairs.com/179591/cyber-crime/europol-shuts-down-archetyp-market-longest-running-dark-web-drug-marketplace.html


3. IdeaLabÔâÓöHunters InternationalÀÕË÷¹¥»÷£¬£¬£¬ £¬£¬ £¬262GBÊý¾Ýй¶


7ÔÂ3ÈÕ£¬£¬£¬ £¬£¬ £¬ÃÀ¹ú¼ÓÖÝÀÏÅÆ¿Æ¼¼·õ»¯Æ÷IdeaLab¿ËÈÕÏòÊÜ2024Äê10ÔÂÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄСÎÒ˽¼Ò·¢³ö֪ͨ£¬£¬£¬ £¬£¬ £¬Õ¹ÏÖÆäÔâÓöHunters InternationalÀÕË÷Èí¼þ×éÖ¯¹¥»÷µÄϸ½Ú ¡£¡£¡£¡£¸ÃÊÂÎñµ¼ÖÂÁè¼Ý13.7Íò·ÝÎļþ£¨×ÜÁ¿´ï262.8GB£©±»ÇÔÈ ¡£¡£¡£¡£¬£¬£¬ £¬£¬ £¬Ó°Ïì¹æÄ£º­¸ÇÏÖÈÎ/ǰÈÎÔ±¹¤¡¢³Ð°üÉ̼°Æä¾ìÊô ¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬ £¬£¬ £¬¹¥»÷ÕßÓÚ2024Äê10ÔÂ4ÈÕÇÖÈëϵͳ£¬£¬£¬ £¬£¬ £¬ÈýÌìºó±»¼ì²âµ½Òì³£»£»£»î¶¯£¬£¬£¬ £¬£¬ £¬µ«Ö±ÖÁ2025Äê6ÔÂ26ÈÕµÚÈý·½ÊÓ²ìÍê³É²ÅÈ·ÈÏÊý¾ÝÔâÇÔ ¡£¡£¡£¡£Ö»¹ÜÏêϸй¶×Ö¶ÎδÍêÈ«¹ûÕæ£¬£¬£¬ £¬£¬ £¬µ«È·ÈϰüÀ¨ÐÕÃûÓëÆäËûÃô¸ÐÐÅÏ¢×éºÏ£¬£¬£¬ £¬£¬ £¬×ãÒÔÓÃÓÚÉí·Ý͵ÇÔ»ò¾«×¼Õ©Æ­ ¡£¡£¡£¡£ÀÕË÷Èí¼þ×éÖ¯Hunters InternationalÔÚ°µÍø¹ûÕæÊý¾Ýºó£¬£¬£¬ £¬£¬ £¬ÓÚ2025Äê6ÔÂͻȻÐû²¼¹Ø±ÕÆäÀÕË÷ÃÅ»§£¬£¬£¬ £¬£¬ £¬²¢É¾³ýËùÓÐÊܺ¦ÆóÒµÌõÄ¿£¬£¬£¬ £¬£¬ £¬×ª¶øÍÆ×ÅÃûΪWorld LeaksµÄÐÂÆ½Ì¨¼ÌÐøÊµÑéÍøÂçڲƭ ¡£¡£¡£¡£ÕâÒ»Æ·ÅÆÖØ×éÕ½ÂÔÓëÍøÂçÇå¾²¹«Ë¾Group-IB´ËǰµÄÆÊÎöÒ»Ö£¬£¬£¬ £¬£¬ £¬ÏÔʾ¸ÃÍÅ»ïÕýͨ¹ý±ä»»Éí·Ý¹æ±ÜÖ´·¨×·×Ù ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬ £¬ºÚ¿ÍËäÉù³ÆÌṩÃ⺬»ìÃÜÃÜÔ¿£¬£¬£¬ £¬£¬ £¬µ«ÏÂÔØÁ´½ÓÒÑʧЧ£¬£¬£¬ £¬£¬ £¬ÌåÏÖÊý¾Ý¿ÉÄÜÒѱ»¶à¸ö·¸·¨ÕûÌå»ñÈ¡ ¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬ £¬£¬ £¬IdeaLabΪÊÜÓ°ÏìÕßÌṩ24¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬ £¬£¬ £¬×¢²á×èÖ¹ÈÕΪ2025Äê10ÔÂ1ÈÕ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/idealab-confirms-data-stolen-in-ransomware-attack-last-year/


4. BMW½ðÈÚЧÀ͹«Ë¾ÒòµÚÈý·½Êý¾Ýй¶ÊÂÎñÊÜÓÐÏÞÓ°Ïì


7ÔÂ4ÈÕ£¬£¬£¬ £¬£¬ £¬2025Äê2Ô£¬£¬£¬ £¬£¬ £¬BMW½ðÈÚЧÀ͹«Ë¾ÒòµÚÈý·½ÏàÖúͬ°éAISÔâÓöÊý¾Ýй¶ÊÂÎñ¶ø¼ä½ÓÊܵ½Ó°Ïì ¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ×ܲ¿Î»ÓڵÿËÈøË¹ÖݵĽðÈڿƼ¼¹«Ë¾AISϵͳ±»¶ñÒâÐÐΪÕßÈëÇÖ£¬£¬£¬ £¬£¬ £¬¸Ã¹«Ë¾ÆäʱÕýΪBMW¼°ÆäÕË»§³ÖÓÐÈËÌṩ¼à¿Ø´¦Öóͷ£ÓëÖ´·¨¼à¿ØÐ§ÀÍ ¡£¡£¡£¡£AISÔÚ·¢Ã÷ÍøÂçÄÚ¿ÉÒɻºó£¬£¬£¬ £¬£¬ £¬ÁªºÏȡ֤ר¼ÒÆô¶¯ÊӲ죬£¬£¬ £¬£¬ £¬È·ÈϺڿÍÓÚ2ÔÂ16ÈÕÇÖÈëϵͳ²¢ÇÔÈ¡ÉÙÁ¿Êý¾Ý£¬£¬£¬ £¬£¬ £¬µ«Ïêϸй¶ÄÚÈÝÉв»Ã÷È·£¬£¬£¬ £¬£¬ £¬Î¥¹æÍ¨Öª½öÌá¼°ÐÕÃûÐÅÏ¢£¬£¬£¬ £¬£¬ £¬Î´Éæ¼°ÆäËûÃô¸ÐÊý¾Ý ¡£¡£¡£¡£ÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ£¬£¬£¬ £¬£¬ £¬Áè¼Ý1950ÈËÊܲ¨¼°£¬£¬£¬ £¬£¬ £¬ÆäÖнöÁ½ÃûÃåÒòÖÝסÃñ ¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬ £¬£¬ £¬ºÚ¿ÍÔÚAISϵͳÄÚDZÔÚʱ¼ä´ïÁ½Ì죬£¬£¬ £¬£¬ £¬Ö±ÖÁ2ÔÂ18Èղű»¼ì²â·¢Ã÷ ¡£¡£¡£¡£AISÇ¿µ÷£¬£¬£¬ £¬£¬ £¬´Ë´ÎÈëÇÖδ´¥¼°BMW½ðÈÚЧÀ͹«Ë¾×ÔÉíµÄϵͳÓëÊý¾Ý¿â£¬£¬£¬ £¬£¬ £¬Æä½¹µãÊý¾ÝÇ徲δÊÜÍþв ¡£¡£¡£¡£ÎªÓ¦¶ÔDZÔÚΣº¦£¬£¬£¬ £¬£¬ £¬AISÒÑÔÊÐíΪÊÜÓ°ÏìÓû§ÌṩΪÆÚ12¸öÔµÄEquifaxÐÅÓÃ¼à¿Ø¼°Éí·Ý͵ÇÔÔ¤·ÀЧÀÍ£¬£¬£¬ £¬£¬ £¬Á¦Õù½«Ëðʧ½µÖÁ×îµÍ ¡£¡£¡£¡£


https://cybernews.com/security/bmw-financial-services-third-party-breach/


5. Ingram MicroÈ·ÈÏÔâÊÜSafePayÀÕË÷Èí¼þ¹¥»÷


7ÔÂ5ÈÕ£¬£¬£¬ £¬£¬ £¬2025Äê7Ô£¬£¬£¬ £¬£¬ £¬È«ÇòIT¾ÞÍ·Ingram Micro£¨Ó¢Âõ¹ú¼Ê£©È·ÈÏÔâÓöSafePayÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬ £¬µ¼ÖÂÆäÄÚ²¿ÏµÍ³¹Ø±Õ¼°ÍøÕ¾¡¢ÔÚÏß¶©¹ºÆ½Ì¨Ì±»¾ ¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÓÚÖÜËÄÆÆÏþ£¬£¬£¬ £¬£¬ £¬Ô±¹¤×°±¸·ºÆðÀÕË÷ÐÅ£¬£¬£¬ £¬£¬ £¬µ«¼ÓÃÜÇéÐÎÉÐδÃ÷È· ¡£¡£¡£¡£¹¥»÷;¾¶ÒÉËÆÍ¨¹ýGlobalProtect VPNƽ̨£¬£¬£¬ £¬£¬ £¬Ê¹ÓÃй¶ƾ֤»òÃÜÂëÅçÈ÷¹¥»÷ÇÖÈëÍøÂç ¡£¡£¡£¡£ÊÜÓ°Ïìϵͳ°üÀ¨»ùÓÚAIµÄXvantage·Ö·¢Æ½Ì¨ºÍImpulseÔÊÐíÖ¤ÉèÖÃÆ½Ì¨£¬£¬£¬ £¬£¬ £¬¶øMicrosoft 365¡¢TeamsµÈЧÀÍÈÔÕý³£ÔËÐÐ ¡£¡£¡£¡£ÊÂÎñÒý·¢²¿·ÖµØÇøÔ±¹¤Ô¶³Ì°ì¹«£¬£¬£¬ £¬£¬ £¬¹«Ë¾×Ô¶¯ÏÂÏß²¿·Öϵͳ²¢¹Ø±ÕVPN»á¼û£¬£¬£¬ £¬£¬ £¬µ«Î´ÊµÊ±¹ûÕæÐÅÏ¢£¬£¬£¬ £¬£¬ £¬½öÒÔ"ITÎÊÌâ"¶ÔÍâ˵Ã÷ ¡£¡£¡£¡£SafePayÍÅ»ï×Ô2024Äê11Ô·ºÆðºóÒѹ¥»÷³¬220¼ÒÆóÒµ£¬£¬£¬ £¬£¬ £¬ÆäÀÕË÷֪ͨ³£º¬Í¨ÓÃÐÔÊý¾ÝÇÔÈ¡ÉùÃ÷£¬£¬£¬ £¬£¬ £¬Î´±ØÕë¶ÔÌØ¶¨Êܺ¦Õß ¡£¡£¡£¡£7ÔÂ6ÈÕ£¬£¬£¬ £¬£¬ £¬Ingram MicroÕýʽÈϿɹ¥»÷£¬£¬£¬ £¬£¬ £¬Æô¶¯ÊӲ첢ִ֪ͨ·¨²¿·Ö£¬£¬£¬ £¬£¬ £¬Í¬Ê±ÖÂǸ¿Í»§¼°ÏàÖúͬ°é£¬£¬£¬ £¬£¬ £¬ÏÖÔÚÕýÆð¾¢»Ö¸´ÏµÍ³ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/


6. Telef¨®nicaÔâHellcatºÚ¿Í×éÖ¯Êý¾Ýй¶Íþв£¬£¬£¬ £¬£¬ £¬¹«Ë¾·ñ¶¨ÊÂÎñ


7ÔÂ4ÈÕ£¬£¬£¬ £¬£¬ £¬Î÷°àÑÀµçÐŹ«Ë¾Telef¨®nica½üÆÚÔâÓöHellcatÀÕË÷Èí¼þ×éÖ¯³ÉÔ±ReyµÄÊý¾Ýй¶Íþв£¬£¬£¬ £¬£¬ £¬ºÚ¿ÍÉù³ÆÇÔÈ¡ÁË106GBÊý¾Ý²¢ÒÑй¶5GBÑù±¾£¬£¬£¬ £¬£¬ £¬µ«¹«Ë¾Ê¼ÖÕδÈÏ¿ÉÊÂÎñÕæÊµÐÔ ¡£¡£¡£¡£´Ë´ÎÈëÇ־ݳƱ¬·¢ÓÚ5ÔÂ30ÈÕ£¬£¬£¬ £¬£¬ £¬ºÚ¿ÍʹÓÃJiraЧÀÍÆ÷ÉèÖùýʧÇÖÈ룬£¬£¬ £¬£¬ £¬Ò»Á¬12Сʱ»ñÈ¡°üÀ¨¿Í»§·¢Æ±¡¢Ô±¹¤ÓÊÏäµÈÎļþ£¬£¬£¬ £¬£¬ £¬Éæ¼°ÐÙÑÀÀû¡¢µÂ¹úµÈ¶à¹úÊý¾Ý ¡£¡£¡£¡£Ö»¹ÜÑù±¾ÖÐ×îÐÂÎļþΪ2021Ä꣬£¬£¬ £¬£¬ £¬ÓëO2Ô±¹¤Éù³ÆµÄ"¹ýʱÐÅϢڲƭ"±£´æÃ¬¶Ü£¬£¬£¬ £¬£¬ £¬µ«²¿·ÖÔÚÖ°Ô±¹¤ÓÊÏäÈ··ºÆðÔÚй¶Êý¾ÝÖУ¬£¬£¬ £¬£¬ £¬ÌåÏÖ¿ÉÄܱ£´æÐÂÎó²î ¡£¡£¡£¡£Reyͨ¹ýPixelDrainºÍKotizadaÐû²¼Êý¾Ý£¬£¬£¬ £¬£¬ £¬ºóÕß±»Chrome±ê¼ÇΪΣÏÕÍøÕ¾ ¡£¡£¡£¡£Telef¨®nica¶Ô¶à´ÎÁªÏµ¼á³ÖĬȻ£¬£¬£¬ £¬£¬ £¬½öO2Æ·ÅÆ´ú±í·ñ¶¨ÊÂÎñ ¡£¡£¡£¡£Hellcat×éÖ¯ÒÔ¹¥»÷JiraЧÀÍÆ÷Öø³Æ£¬£¬£¬ £¬£¬ £¬Ôø¹¥»÷¹ýAscom¡¢½Ý±ªÂ·»¢µÈÆóÒµ£¬£¬£¬ £¬£¬ £¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔ¹©Ó¦Á´Ç徲Σº¦ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hacker-leaks-telef-nica-data-allegedly-stolen-in-a-new-breach/