TalentHookÇóְϵͳÉèÖùýʧÖÂ2600Íò·Ý¼òÀúй¶

Ðû²¼Ê±¼ä 2025-07-07

1. TalentHookÇóְϵͳÉèÖùýʧÖÂ2600Íò·Ý¼òÀúй¶


7ÔÂ3ÈÕ£¬£¬£¬£¬£¬ £¬£¬ÃÀ¹úÈËÁ¦×ÊԴЧÀÍÆ½Ì¨TalentHookÒòAzure Blob´æ´¢ÈÝÆ÷ÉèÖùýʧ£¬£¬£¬£¬£¬ £¬£¬µ¼Ö½ü2600Íò·ÝÇóÖ°Õß¼òÀú±»¹ûÕæÌ»Â¶£¬£¬£¬£¬£¬ £¬£¬Òý·¢ÑÏÖØÊý¾ÝÇå¾²ÊÂÎñ¡£¡£¡£¡£Ì»Â¶µÄÈÝÆ÷Öд洢×Å´ó×ÚÃÀ¹úÇóÖ°ÕßµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢½ÌÓýÅä¾°¡¢ÊÂÇéÂÄÀú¼°¼ÒͥסַµÈ½¹µãСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬£¬£¬ £¬£¬Ð¹Â¶Êý¾ÝµÄ¸ßÍêÕûÐÔʹ¹¥»÷ÕßÄܹ»ÊµÑ龫׼Éç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£ºÚ¿Í¿Éͨ¹ýÓʼþ¡¢¶ÌÐÅ·¢ËÍÐéαÊÂÇéÔ¼Çë»òÅä¾°ÊÓ²ìÒªÇ󣬣¬£¬£¬£¬ £¬£¬ÓÕµ¼Êܺ¦ÕßÌá½»Éí·Ý֤ɨÃè¼þ¡¢ÒøÐÐÕË»§µÈ¸üÉî²ãÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬ÉõÖÁð³ä¹ÍÖ÷ÊÕÈ¡ÐéαÉêÇëÓöÈ¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬£¬¼ÒͥסַÓëÁªÏµ·½·¨µÄ̻¶´ó·ùÔöÌíÁË"ÈËÈâËÑË÷"Σº¦£¬£¬£¬£¬£¬ £¬£¬¿ÉÄܵ¼ÖÂÏÖʵÌìÏÂÖеÄɧÈÅ»òÏÅ»£ÐÐΪ¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬ £¬£¬CybernewsÒÑÏòTalentHookĸ¹«Ë¾Resource Edge·¢³öÇå¾²¾¯Ê¾£¬£¬£¬£¬£¬ £¬£¬½¨ÒéÆäÁ¬Ã¦½ÓÄÉÎåÏîÐÞ¸´²½·¥£ºÏÞÖÆÈÝÆ÷¹«¹²»á¼ûȨÏÞ¡¢ÆôÓÃЧÀÍÆ÷¶Ë¼ÓÃÜ¡¢Í¨¹ýAzure Key VaultÖÎÀíÃÜÔ¿¡¢½¨Éè»á¼ûÈÕÖ¾¼à¿Ø»úÖÆ£¬£¬£¬£¬£¬ £¬£¬²¢¿ªÕ¹°´ÆÚÇå¾²Éó¼ÆÓëÔ±¹¤Åàѵ¡£¡£¡£¡£×èÖ¹±¨¸æÐû²¼£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÉÐδ¹ûÕæ»ØÓ¦´¦Öóͷ£Ï£Íû¡£¡£¡£¡£


https://cybernews.com/security/talenthook-data-leak-exposes-millions/


2. ¹ú¼ÊÖ´·¨Ðж¯´Ý»Ù×ÊÙ°µÍø¶¾Æ·Êг¡Archetyp Market


7ÔÂ3ÈÕ£¬£¬£¬£¬£¬ £¬£¬Å·ÖÞÐ̾¯×éÖ¯Ôڵ¹úÖ÷µ¼µÄ¶à¹úÁªºÏÐж¯ÖУ¬£¬£¬£¬£¬ £¬£¬ÀֳɹرÕÁ˰µÍøÀúÊ·ÉÏÔËӪʱ¼ä×µÄ¶¾Æ·ÉúÒâÆ½Ì¨Archetyp Market£¬£¬£¬£¬£¬ £¬£¬²¢¾Ð²¶Æä½¹µã³ÉÔ±¡£¡£¡£¡£´Ë´Î´úºÅ"Deep Sentinel"µÄרÏîÐж¯ÓÚ6ÔÂ11ÈÕÖÁ13ÈÕÕö¿ª£¬£¬£¬£¬£¬ £¬£¬ºá¿çµÂ¹ú¡¢ºÉÀ¼¡¢ÂÞÂíÄáÑÇ¡¢Î÷°àÑÀ¡¢ÈðµäµÈÁù¹ú£¬£¬£¬£¬£¬ £¬£¬Ô¼300ÃûÖ´·¨Ö°Ô±Í¬²½ÊµÑé×¥²¶ÓëÖ¤¾Ý±£È«£¬£¬£¬£¬£¬ £¬£¬×îÖÕÔÚÎ÷°àÑÀ¾³ÄÚ×¥»ñ¸ÃÊг¡ÖÎÀíÔ±£¬£¬£¬£¬£¬ £¬£¬Èðµä·½ÃæÍ¬²½¹¥»÷¶¥¼¶¹©Ó¦ÉÌÍøÂç¡£¡£¡£¡£×÷Ϊ°µÍø¶¾Æ·ÉúÒâÁìÓòµÄ"ÔªÀϼ¶"ƽ̨£¬£¬£¬£¬£¬ £¬£¬Archetyp Market×Ô2019ÄêÆðÒ»Á¬ÔËÓªÁè¼ÝÎåÄ꣬£¬£¬£¬£¬ £¬£¬ÀÛ¼Æ×¢²áÓû§Í»ÆÆ60Íò£¬£¬£¬£¬£¬ £¬£¬×ÜÉúÒâ¶î¹ÀËã´ï2.5ÒÚÅ·Ôª¡£¡£¡£¡£ÆäÉÌÆ·¿â°üÀ¨1.7ÍòÖÖ²»·¨ÎïÆ·£¬£¬£¬£¬£¬ £¬£¬ÓÈÆäÒÔÔÊÐíÉúÒâ·ÒÌ«ÄáµÈ¸ß´¿¶ÈºÏ³É°¢Æ¬ÀàÒ©ÎïÖø³Æ£¬£¬£¬£¬£¬ £¬£¬ÕâÀàÎïÖÊÒѳÉΪŷÖÞÒÔÖÂÈ«ÇòÈÕÒæÑÏËàµÄ¹«¹²ÎÀÉúÍþв¡£¡£¡£¡£Æ½Ì¨ÊÖÒռܹ¹½ÓÄɶàÖØÄäÃû»¯Éè¼Æ£¬£¬£¬£¬£¬ £¬£¬ÓëÒѹرյÄDream Market¡¢Silk RoadµÈ°µÍøÆ½Ì¨ÆëÃû£¬£¬£¬£¬£¬ £¬£¬ÐγÉÍêÕûµÄ²»·¨¹©Ó¦Á´¡£¡£¡£¡£Ðж¯ÖУ¬£¬£¬£¬£¬ £¬£¬Ö´·¨»ú¹¹Í¨¹ýºã¾Ã×ʽð×·×ÙÓëÊý×Öȡ֤£¬£¬£¬£¬£¬ £¬£¬Àֳɶ¨Î»Òªº¦»ù´¡ÉèÊ©²¢¶³½á780ÍòÅ·ÔªÉæ°¸×ʲú¡£¡£¡£¡£µÂ¹úÁª°îÐÌʾ¯Ô±¾Ö£¨BKA£©ÓëÅ·ÖÞ˾·¨×éÖ¯£¨Eurojust£©Ð­µ÷¿ç¹úÖ¤¾ÝÁ´£¬£¬£¬£¬£¬ £¬£¬×îÖÕʵÏÖÊÖÒÕÍŶÓÓëÖÎÀí²ãµÄË«ÖØÍ»ÆÆ¡£¡£¡£¡£


https://securityaffairs.com/179591/cyber-crime/europol-shuts-down-archetyp-market-longest-running-dark-web-drug-marketplace.html


3. IdeaLabÔâÓöHunters InternationalÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ £¬£¬262GBÊý¾Ýй¶


7ÔÂ3ÈÕ£¬£¬£¬£¬£¬ £¬£¬ÃÀ¹ú¼ÓÖÝÀÏÅÆ¿Æ¼¼·õ»¯Æ÷IdeaLab¿ËÈÕÏòÊÜ2024Äê10ÔÂÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄСÎÒ˽¼Ò·¢³ö֪ͨ£¬£¬£¬£¬£¬ £¬£¬Õ¹ÏÖÆäÔâÓöHunters InternationalÀÕË÷Èí¼þ×éÖ¯¹¥»÷µÄϸ½Ú¡£¡£¡£¡£¸ÃÊÂÎñµ¼ÖÂÁè¼Ý13.7Íò·ÝÎļþ£¨×ÜÁ¿´ï262.8GB£©±»ÇÔÈ¡£¬£¬£¬£¬£¬ £¬£¬Ó°Ïì¹æÄ£º­¸ÇÏÖÈÎ/ǰÈÎÔ±¹¤¡¢³Ð°üÉ̼°Æä¾ìÊô¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÓÚ2024Äê10ÔÂ4ÈÕÇÖÈëϵͳ£¬£¬£¬£¬£¬ £¬£¬ÈýÌìºó±»¼ì²âµ½Òì³£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬ £¬£¬µ«Ö±ÖÁ2025Äê6ÔÂ26ÈÕµÚÈý·½ÊÓ²ìÍê³É²ÅÈ·ÈÏÊý¾ÝÔâÇÔ¡£¡£¡£¡£Ö»¹ÜÏêϸй¶×Ö¶ÎδÍêÈ«¹ûÕæ£¬£¬£¬£¬£¬ £¬£¬µ«È·ÈϰüÀ¨ÐÕÃûÓëÆäËûÃô¸ÐÐÅÏ¢×éºÏ£¬£¬£¬£¬£¬ £¬£¬×ãÒÔÓÃÓÚÉí·Ý͵ÇÔ»ò¾«×¼Õ©Æ­¡£¡£¡£¡£ÀÕË÷Èí¼þ×éÖ¯Hunters InternationalÔÚ°µÍø¹ûÕæÊý¾Ýºó£¬£¬£¬£¬£¬ £¬£¬ÓÚ2025Äê6ÔÂͻȻÐû²¼¹Ø±ÕÆäÀÕË÷ÃÅ»§£¬£¬£¬£¬£¬ £¬£¬²¢É¾³ýËùÓÐÊܺ¦ÆóÒµÌõÄ¿£¬£¬£¬£¬£¬ £¬£¬×ª¶øÍÆ×ÅÃûΪWorld LeaksµÄÐÂÆ½Ì¨¼ÌÐøÊµÑéÍøÂçڲƭ¡£¡£¡£¡£ÕâÒ»Æ·ÅÆÖØ×éÕ½ÂÔÓëÍøÂçÇå¾²¹«Ë¾Group-IB´ËǰµÄÆÊÎöÒ»Ö£¬£¬£¬£¬£¬ £¬£¬ÏÔʾ¸ÃÍÅ»ïÕýͨ¹ý±ä»»Éí·Ý¹æ±ÜÖ´·¨×·×Ù¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬£¬ºÚ¿ÍËäÉù³ÆÌṩÃ⺬»ìÃÜÃÜÔ¿£¬£¬£¬£¬£¬ £¬£¬µ«ÏÂÔØÁ´½ÓÒÑʧЧ£¬£¬£¬£¬£¬ £¬£¬ÌåÏÖÊý¾Ý¿ÉÄÜÒѱ»¶à¸ö·¸·¨ÕûÌå»ñÈ¡¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬£¬£¬ £¬£¬IdeaLabΪÊÜÓ°ÏìÕßÌṩ24¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬ £¬£¬×¢²á×èÖ¹ÈÕΪ2025Äê10ÔÂ1ÈÕ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/idealab-confirms-data-stolen-in-ransomware-attack-last-year/


4. BMW½ðÈÚЧÀ͹«Ë¾ÒòµÚÈý·½Êý¾Ýй¶ÊÂÎñÊÜÓÐÏÞÓ°Ïì


7ÔÂ4ÈÕ£¬£¬£¬£¬£¬ £¬£¬2025Äê2Ô£¬£¬£¬£¬£¬ £¬£¬BMW½ðÈÚЧÀ͹«Ë¾ÒòµÚÈý·½ÏàÖúͬ°éAISÔâÓöÊý¾Ýй¶ÊÂÎñ¶ø¼ä½ÓÊܵ½Ó°Ïì¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ×ܲ¿Î»ÓڵÿËÈøË¹ÖݵĽðÈڿƼ¼¹«Ë¾AISϵͳ±»¶ñÒâÐÐΪÕßÈëÇÖ£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÆäʱÕýΪBMW¼°ÆäÕË»§³ÖÓÐÈËÌṩ¼à¿Ø´¦Öóͷ£ÓëÖ´·¨¼à¿ØÐ§ÀÍ¡£¡£¡£¡£AISÔÚ·¢Ã÷ÍøÂçÄÚ¿ÉÒɻºó£¬£¬£¬£¬£¬ £¬£¬ÁªºÏȡ֤ר¼ÒÆô¶¯ÊӲ죬£¬£¬£¬£¬ £¬£¬È·ÈϺڿÍÓÚ2ÔÂ16ÈÕÇÖÈëϵͳ²¢ÇÔÈ¡ÉÙÁ¿Êý¾Ý£¬£¬£¬£¬£¬ £¬£¬µ«Ïêϸй¶ÄÚÈÝÉв»Ã÷È·£¬£¬£¬£¬£¬ £¬£¬Î¥¹æÍ¨Öª½öÌá¼°ÐÕÃûÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬Î´Éæ¼°ÆäËûÃô¸ÐÊý¾Ý¡£¡£¡£¡£ÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ£¬£¬£¬£¬£¬ £¬£¬Áè¼Ý1950ÈËÊܲ¨¼°£¬£¬£¬£¬£¬ £¬£¬ÆäÖнöÁ½ÃûÃåÒòÖÝסÃñ¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬ £¬£¬ºÚ¿ÍÔÚAISϵͳÄÚDZÔÚʱ¼ä´ïÁ½Ì죬£¬£¬£¬£¬ £¬£¬Ö±ÖÁ2ÔÂ18Èղű»¼ì²â·¢Ã÷¡£¡£¡£¡£AISÇ¿µ÷£¬£¬£¬£¬£¬ £¬£¬´Ë´ÎÈëÇÖδ´¥¼°BMW½ðÈÚЧÀ͹«Ë¾×ÔÉíµÄϵͳÓëÊý¾Ý¿â£¬£¬£¬£¬£¬ £¬£¬Æä½¹µãÊý¾ÝÇ徲δÊÜÍþв¡£¡£¡£¡£ÎªÓ¦¶ÔDZÔÚΣº¦£¬£¬£¬£¬£¬ £¬£¬AISÒÑÔÊÐíΪÊÜÓ°ÏìÓû§ÌṩΪÆÚ12¸öÔµÄEquifaxÐÅÓÃ¼à¿Ø¼°Éí·Ý͵ÇÔÔ¤·ÀЧÀÍ£¬£¬£¬£¬£¬ £¬£¬Á¦Õù½«Ëðʧ½µÖÁ×îµÍ¡£¡£¡£¡£


https://cybernews.com/security/bmw-financial-services-third-party-breach/


5. Ingram MicroÈ·ÈÏÔâÊÜSafePayÀÕË÷Èí¼þ¹¥»÷


7ÔÂ5ÈÕ£¬£¬£¬£¬£¬ £¬£¬2025Äê7Ô£¬£¬£¬£¬£¬ £¬£¬È«ÇòIT¾ÞÍ·Ingram Micro£¨Ó¢Âõ¹ú¼Ê£©È·ÈÏÔâÓöSafePayÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬µ¼ÖÂÆäÄÚ²¿ÏµÍ³¹Ø±Õ¼°ÍøÕ¾¡¢ÔÚÏß¶©¹ºÆ½Ì¨Ì±»¾¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÓÚÖÜËÄÆÆÏþ£¬£¬£¬£¬£¬ £¬£¬Ô±¹¤×°±¸·ºÆðÀÕË÷ÐÅ£¬£¬£¬£¬£¬ £¬£¬µ«¼ÓÃÜÇéÐÎÉÐδÃ÷È·¡£¡£¡£¡£¹¥»÷;¾¶ÒÉËÆÍ¨¹ýGlobalProtect VPNƽ̨£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓÃй¶ƾ֤»òÃÜÂëÅçÈ÷¹¥»÷ÇÖÈëÍøÂç¡£¡£¡£¡£ÊÜÓ°Ïìϵͳ°üÀ¨»ùÓÚAIµÄXvantage·Ö·¢Æ½Ì¨ºÍImpulseÔÊÐíÖ¤ÉèÖÃÆ½Ì¨£¬£¬£¬£¬£¬ £¬£¬¶øMicrosoft 365¡¢TeamsµÈЧÀÍÈÔÕý³£ÔËÐС£¡£¡£¡£ÊÂÎñÒý·¢²¿·ÖµØÇøÔ±¹¤Ô¶³Ì°ì¹«£¬£¬£¬£¬£¬ £¬£¬¹«Ë¾×Ô¶¯ÏÂÏß²¿·Öϵͳ²¢¹Ø±ÕVPN»á¼û£¬£¬£¬£¬£¬ £¬£¬µ«Î´ÊµÊ±¹ûÕæÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬½öÒÔ"ITÎÊÌâ"¶ÔÍâ˵Ã÷¡£¡£¡£¡£SafePayÍÅ»ï×Ô2024Äê11Ô·ºÆðºóÒѹ¥»÷³¬220¼ÒÆóÒµ£¬£¬£¬£¬£¬ £¬£¬ÆäÀÕË÷֪ͨ³£º¬Í¨ÓÃÐÔÊý¾ÝÇÔÈ¡ÉùÃ÷£¬£¬£¬£¬£¬ £¬£¬Î´±ØÕë¶ÔÌØ¶¨Êܺ¦Õß¡£¡£¡£¡£7ÔÂ6ÈÕ£¬£¬£¬£¬£¬ £¬£¬Ingram MicroÕýʽÈϿɹ¥»÷£¬£¬£¬£¬£¬ £¬£¬Æô¶¯ÊӲ첢ִ֪ͨ·¨²¿·Ö£¬£¬£¬£¬£¬ £¬£¬Í¬Ê±ÖÂǸ¿Í»§¼°ÏàÖúͬ°é£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÕýÆð¾¢»Ö¸´ÏµÍ³¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/


6. Telef¨®nicaÔâHellcatºÚ¿Í×éÖ¯Êý¾Ýй¶Íþв£¬£¬£¬£¬£¬ £¬£¬¹«Ë¾·ñ¶¨ÊÂÎñ


7ÔÂ4ÈÕ£¬£¬£¬£¬£¬ £¬£¬Î÷°àÑÀµçÐŹ«Ë¾Telef¨®nica½üÆÚÔâÓöHellcatÀÕË÷Èí¼þ×éÖ¯³ÉÔ±ReyµÄÊý¾Ýй¶Íþв£¬£¬£¬£¬£¬ £¬£¬ºÚ¿ÍÉù³ÆÇÔÈ¡ÁË106GBÊý¾Ý²¢ÒÑй¶5GBÑù±¾£¬£¬£¬£¬£¬ £¬£¬µ«¹«Ë¾Ê¼ÖÕδÈÏ¿ÉÊÂÎñÕæÊµÐÔ¡£¡£¡£¡£´Ë´ÎÈëÇ־ݳƱ¬·¢ÓÚ5ÔÂ30ÈÕ£¬£¬£¬£¬£¬ £¬£¬ºÚ¿ÍʹÓÃJiraЧÀÍÆ÷ÉèÖùýʧÇÖÈ룬£¬£¬£¬£¬ £¬£¬Ò»Á¬12Сʱ»ñÈ¡°üÀ¨¿Í»§·¢Æ±¡¢Ô±¹¤ÓÊÏäµÈÎļþ£¬£¬£¬£¬£¬ £¬£¬Éæ¼°ÐÙÑÀÀû¡¢µÂ¹úµÈ¶à¹úÊý¾Ý¡£¡£¡£¡£Ö»¹ÜÑù±¾ÖÐ×îÐÂÎļþΪ2021Ä꣬£¬£¬£¬£¬ £¬£¬ÓëO2Ô±¹¤Éù³ÆµÄ"¹ýʱÐÅϢڲƭ"±£´æÃ¬¶Ü£¬£¬£¬£¬£¬ £¬£¬µ«²¿·ÖÔÚÖ°Ô±¹¤ÓÊÏäÈ··ºÆðÔÚй¶Êý¾ÝÖУ¬£¬£¬£¬£¬ £¬£¬ÌåÏÖ¿ÉÄܱ£´æÐÂÎó²î¡£¡£¡£¡£Reyͨ¹ýPixelDrainºÍKotizadaÐû²¼Êý¾Ý£¬£¬£¬£¬£¬ £¬£¬ºóÕß±»Chrome±ê¼ÇΪΣÏÕÍøÕ¾¡£¡£¡£¡£Telef¨®nica¶Ô¶à´ÎÁªÏµ¼á³ÖĬȻ£¬£¬£¬£¬£¬ £¬£¬½öO2Æ·ÅÆ´ú±í·ñ¶¨ÊÂÎñ¡£¡£¡£¡£Hellcat×éÖ¯ÒÔ¹¥»÷JiraЧÀÍÆ÷Öø³Æ£¬£¬£¬£¬£¬ £¬£¬Ôø¹¥»÷¹ýAscom¡¢½Ý±ªÂ·»¢µÈÆóÒµ£¬£¬£¬£¬£¬ £¬£¬´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hacker-leaks-telef-nica-data-allegedly-stolen-in-a-new-breach/