¹þÂ޵°ٻõÅû¶¹©Ó¦Á´Î¥¹æÊÂÎñ £¬£¬ £¬£¬£¬£¬£¬Ó°ÏìÏßÉϿͻ§

Ðû²¼Ê±¼ä 2025-09-30

1. ¹þÂ޵°ٻõÅû¶¹©Ó¦Á´Î¥¹æÊÂÎñ £¬£¬ £¬£¬£¬£¬£¬Ó°ÏìÏßÉϿͻ§


9ÔÂ28ÈÕ £¬£¬ £¬£¬£¬£¬£¬Ó¢¹úÉÝ³ÞÆ·°Ù»õ¹«Ë¾¹þÂ޵°ٻõ¿ËÈÕÏòÖ÷¹Ë·¢³öÖÒÑÔ £¬£¬ £¬£¬£¬£¬£¬³ÆÆä²¿·ÖÔÚÏ߿ͻ§µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒòµÚÈý·½¹©Ó¦É̵ÄITϵͳÎó²î±»µÁ¡£¡£¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾ÉùÃ÷ £¬£¬ £¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý½öÉæ¼°ÐÕÃûºÍÁªÏµ·½·¨µÈ»ù±¾Ð¡ÎÒ˽¼Ò±êʶ·û £¬£¬ £¬£¬£¬£¬£¬ÕË»§ÃÜÂë¼°¸¶¿îÐÅϢδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¹þÂÞµÂÇ¿µ÷´Ë´ÎÊÂÎñΪ¡°ÁæØêÊÂÎñ¡± £¬£¬ £¬£¬£¬£¬£¬ÆäÄÚ²¿ÏµÍ³Î´ÔâÈëÇÖ £¬£¬ £¬£¬£¬£¬£¬ÇÒÓë½ñÄê5Ô±¬·¢µÄÍøÕ¾»á¼ûÏÞÖÆÊÂÎñÎ޹ء£¡£¡£¡£¡£¡£¹þÂ޵°ٻõÏÖÔÚÓÉ¿¨Ëþ¶ûͶ×ʾֿعɡ£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ £¬£¬ £¬£¬£¬£¬£¬ÒÑ´ÓµÚÈý·½¹©Ó¦ÉÌ´¦»ñϤÊý¾ÝÇÔÈ¡ÇéÐÎ £¬£¬ £¬£¬£¬£¬£¬²¢Á¬Ã¦Í¨ÖªÊÜÓ°Ïì¿Í»§¡£¡£¡£¡£¡£¡£¹©Ó¦ÉÌÒÑÈ·ÈÏÊÂÎñÒÑ»ñµÃ¿ØÖÆ £¬£¬ £¬£¬£¬£¬£¬Ë«ÆÓÖ±ÏàÖú½ÓÄÉÒ»ÇÐÐëÒª²½·¥ £¬£¬ £¬£¬£¬£¬£¬Í¬Ê±ÒÑÏòËùÓÐÏà¹Ø²¿·Öת´ï¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬ £¬£¬£¬£¬£¬Scattered SpiderÀÕË÷Èí¼þ×éÖ¯ÔøÉù³Æ¶Ô½ñÄêÔçЩʱ¼äÕë¶Ô¹þÂ޵°ٻõ¡¢Âêɯ°Ù»õ¼°ÏàÖúÉçµÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÊÂÎñÔÙ´Î͹ÏÔÆóÒµ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/harrods-luxury-department-store-warns-customers-of-data-breach/


2. Kido SchoolsÔâÀÕË÷Èí¼þ¹¥»÷ £¬£¬ £¬£¬£¬£¬£¬8000Ãû¶ùͯÃô¸ÐÐÅϢй¶


9ÔÂ26ÈÕ £¬£¬ £¬£¬£¬£¬£¬×ܲ¿Î»ÓÚÂ׶صÄÓ×¶ùÔ°Á¬Ëø»ú¹¹Kido Schools¿ËÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷ £¬£¬ £¬£¬£¬£¬£¬ÐÂÐ˺ڿÍ×éÖ¯RadiantÉù³Æ¶Ô´ËÈÏÕæ £¬£¬ £¬£¬£¬£¬£¬²¢ÔÚ°µÍøÐ¹ÃÜÍøÕ¾¹ûÕæÁ˾ݳÆÊôÓÚÓ¢¹ú18ËùÍжùËù8000ÃûѧÁäǰ¶ùͯ¼°ÆäÖ§ÊôµÄÃô¸ÐÐÅÏ¢ £¬£¬ £¬£¬£¬£¬£¬°üÀ¨¶ùͯÁ³²¿ÌØÐ´Í¼Ïñ¡¢È«Ãû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢³öÉúµØ¡¢Í¬×¡ÈËÐÅÏ¢¡¢âïÊÑÐÕÃû¡¢ÊÂÇéËùÔÚ¡¢ÁªÏµ·½·¨ £¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°×æâïÊÑ¡¢ÆäËûÇ×ÆÝ»òÁÚÈ˵ÄÁªÏµ·½·¨µÈ¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬£¬£¬£¬£¬Ô±¹¤Êý¾Ý¿âÒ²±»Ð¹Â¶ £¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢ÍêÕûµØµã¡¢µç×ÓÓʼþ¡¢¹úÃñ°ü¹ÜºÅÂ롢Ψһ¹¤ÈËID¼°ÈëÖ°ÈÕÆÚµÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£Radiant×Ô³ÆÒÑDZÔÚKidoÍøÂçÊýÖÜ £¬£¬ £¬£¬£¬£¬£¬²¢Éù³ÆÀ´×Ô¶íÂÞ˹¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ̸ÅÐÆÆËéºó×îÏÈÐû²¼Ñù±¾×ÊÁÏ £¬£¬ £¬£¬£¬£¬£¬ÏÖÔÚÒÑÐû²¼20Ãû¶ùͯСÎÒ˽¼Ò×ÊÁϼ°50ÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ £¬£¬ £¬£¬£¬£¬£¬²¢Íþв¡°»¹»áÓиü¶à¡±¡£¡£¡£¡£¡£¡£ºÚ¿ÍÆ·ÆÀKido¡°´ÖÐÄ¡± £¬£¬ £¬£¬£¬£¬£¬²¢ÃãÀø¼Ò³¤Í¨¹ý¡°¼ÓÈëË÷Åâ¡±ÍøÕ¾¶ÔÓ×¶ùÔ°ÌáÆðËßËÏ¡£¡£¡£¡£¡£¡£Â׶ؾ¯Ô±ÌüÒѽéÈëÊÓ²ì £¬£¬ £¬£¬£¬£¬£¬ÏÖÔÚ´¦ÓÚÔçÆÚ½×¶Î¡£¡£¡£¡£¡£¡£Kido SchoolsÒÑ֪ͨÓйز¿·Ö¼°¼Ò³¤ £¬£¬ £¬£¬£¬£¬£¬µ«Î´½ÒÏþ¹ûÕæÉùÃ÷¡£¡£¡£¡£¡£¡£


https://cybernews.com/cybercrime/kido-nursery-schools-ransomware-attack-8000-children-images-compromised/


3. ÈÕ±¾³¯ÈÕ¼¯ÍÅÔâÍøÂç¹¥»÷Ö±¾ÍÁÓªÒµÖÐÖ¹


9ÔÂ29ÈÕ £¬£¬ £¬£¬£¬£¬£¬ÈÕ±¾×îÍÑÏúÆ¡¾ÆÖÆÔìÉ̳¯ÈÕ¼¯ÍſعÉÓÐÏÞ¹«Ë¾£¨¼ò³Æ"³¯ÈÕ"£©¿ËÈÕÅû¶ÔâÓöÑÏÖØÍøÂç¹¥»÷ £¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÆäÈÕ±¾±¾ÍÁ¶àÏî½¹µãÓªÒµÏÝÈë̱»¾¡£¡£¡£¡£¡£¡£×÷ΪռÓÐÈÕ±¾Æ¡¾ÆÊг¡Ô¼Èý·ÖÖ®Ò»·Ý¶îµÄÐÐÒµ¾ÞÍ· £¬£¬ £¬£¬£¬£¬£¬³¯ÈÕÓµÓÐ3ÍòÃûÔ±¹¤¡¢Äê²úÁ¿´ï1ÒÚ°ÙÉý £¬£¬ £¬£¬£¬£¬£¬2024ÄêÔ¤¼ÆÄêÊÕÈë½ü200ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷×ÔÇåÔç7ʱÆô¶¯ £¬£¬ £¬£¬£¬£¬£¬ÒÑÍêÈ«ÖÐÖ¹Æä¶©¹ºÓë·¢»õϵͳ £¬£¬ £¬£¬£¬£¬£¬ºô½ÐÖÐÐļ°¿Í»§Ð§ÀĮ́ÒàÎÞ·¨¶ÔÍ⿪·Å £¬£¬ £¬£¬£¬£¬£¬¶ÔÒ»Ñùƽ³£ÔËÓªÔì³ÉÖØ´ó¹¥»÷¡£¡£¡£¡£¡£¡£³¯ÈÕ¼¯ÍÅÔÚ¹ÙÍøÉùÃ÷ÖÐ֤ʵ £¬£¬ £¬£¬£¬£¬£¬±¾´ÎÍøÂç¹¥»÷Òý·¢µÄϵͳ¹ÊÕϽöÓ°ÏìÈÕ±¾±¾ÍÁÓªÒµ £¬£¬ £¬£¬£¬£¬£¬ÏÖÔÚÉÐδ·¢Ã÷СÎÒ˽¼ÒÐÅÏ¢»ò¿Í»§Êý¾ÝÍâйÖÁÍⲿ¡£¡£¡£¡£¡£¡£¹«Ë¾ÕýÈ«Á¦ÊÓ²ìÖÐֹȪԴ²¢ÍƽøÓªÒµ»Ö¸´ £¬£¬ £¬£¬£¬£¬£¬µ«Î´Ðû²¼Ïêϸ»Ö¸´Ê±¼ä±í¡£¡£¡£¡£¡£¡£Ö»¹Ü¹ú¼Ê·ÖÖ§»ú¹¹£¨Å·ÖÞ¡¢´óÑóÖÞ¡¢¶«ÄÏÑÇ£©¼°ÆìÏÂPeroni¡¢Pilsner UrquellµÈ×ÅÃûÆ·ÅÆÎ´Êܲ¨¼° £¬£¬ £¬£¬£¬£¬£¬µ«±¾ÍÁÓªÒµÕϰ­ÒÑÒý·¢¹©Ó¦Á´Á¬Ëø·´Ó¦¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ £¬£¬ £¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶Ô´ËÈÏÕæ £¬£¬ £¬£¬£¬£¬£¬ÍþвÐÐΪÕßÉí·Ý¼°³õʼ¹¥»÷·¾¶ÒàδÃ÷È·¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/japans-largest-brewer-suspends-operations-due-to-cyberattack/


4. ÀÕË÷Èí¼þÍÅ»ï×·ÇóBBC¼ÇÕßµÄ×ÊÖú £¬£¬ £¬£¬£¬£¬£¬ÒÔ¹¥»÷ýÌå¾ÞÍ·


9ÔÂ29ÈÕ £¬£¬ £¬£¬£¬£¬£¬×Գƴú±íMedusaÀÕË÷Èí¼þÍÅ»ïµÄÍþвÐÐΪÕß7ÔÂͨ¹ý¼ÓÃÜͨѶ¹¤¾ßSignalÁªÏµBBCÍøÂçÇå¾²¼ÇÕßÇÇ¡¤Ì©µÏ £¬£¬ £¬£¬£¬£¬£¬ÊÔͼÓÕʹÆä³ÉΪÄÚ²¿ÍþвÒÔÈëÇÖÓ¢¹ú¹«¹²Ð§À͹㲥¹«Ë¾ÍøÂç¡£¡£¡£¡£¡£¡£ÍþвÕß¡°Syn¡±ÔÊÐí £¬£¬ £¬£¬£¬£¬£¬ÈôÌ©µÏÔÊÐíMedusa»á¼ûBBCϵͳ £¬£¬ £¬£¬£¬£¬£¬½«»ñµÃÊê½ð×ܶîµÄ15%×÷Ϊ³ê½ð £¬£¬ £¬£¬£¬£¬£¬ºóÊÔͼ½«·Ö³É±ÈÀýÌá¸ßÖÁ25% £¬£¬ £¬£¬£¬£¬£¬²¢Ç¿µ÷ÀÖ³ÉÈëÇÖºó¿ÉË÷È¡¡°ÊýÍòÍòÃÀÔª¡±Êê½ð¡£¡£¡£¡£¡£¡£MedusaÍÅ»ï×Ô2021Äê1Ô·ºÆðÒÔÀ´ £¬£¬ £¬£¬£¬£¬£¬ÒÔË«ÖØÀÕË÷¹¥»÷ºÍ2023ÄêÍÆ³öµÄÀÕË÷ÃÅ»§ÖøÃû £¬£¬ £¬£¬£¬£¬£¬Ôø±»ÃÀ¹úCISA±¨¸æ¶ÔÒªº¦»ù´¡ÉèÊ©·¢¶¯³¬300´Î¹¥»÷ £¬£¬ £¬£¬£¬£¬£¬Æä½¹µã³ÉÔ±³£Í¨¹ý°µÍøÕÐļ¡°³õʼ»á¼û¾­¼ÍÈË¡±ÊµÑé¹¥»÷¡£¡£¡£¡£¡£¡£ÎªÓÕʹ̩µÏÏàÖú £¬£¬ £¬£¬£¬£¬£¬ÍþвÕßö¾Ù¹ýÍùÄÚ²¿Ö°Ô±Ð­Öú¹¥»÷µÄ°¸Àý £¬£¬ £¬£¬£¬£¬£¬²¢ÊÔͼͨ¹ýMFAºäÕ¨£¨¼´ÆµÈÔ·¢ËÍË«ÖØÉí·ÝÑéÖ¤ÇëÇ󣩯Èʹ¼ÇÕßÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£È»¶ø £¬£¬ £¬£¬£¬£¬£¬Ì©µÏδÍ×Э £¬£¬ £¬£¬£¬£¬£¬·´¶øÁªÏµBBCÐÅÏ¢Çå¾²ÍÅ¶Ó £¬£¬ £¬£¬£¬£¬£¬²¢×Ô¶¯ÇжÏÓë»ú¹¹»ù´¡ÉèÊ©µÄÅþÁ¬¡£¡£¡£¡£¡£¡£Ëæºó £¬£¬ £¬£¬£¬£¬£¬ÍþвÕßͨ¹ýSignalÖÂǸ £¬£¬ £¬£¬£¬£¬£¬³Æ¡°ÓŻݻ¡±ÊýÈÕÄÚÓÐÓà £¬£¬ £¬£¬£¬£¬£¬µ«Òò¼ÇÕßÊýÈÕδ»ØÓ¦ £¬£¬ £¬£¬£¬£¬£¬×îÖÕɾ³ýÕË»§¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-gang-sought-bbc-reporters-help-in-hacking-media-giant/


5. Ó¢¹ú15ÒÚÓ¢°÷´û¿îµ£±£ÖúÁ¦½Ý±ªÂ·»¢Ó¦¶ÔÍøÂç¹¥»÷


9ÔÂ29ÈÕ £¬£¬ £¬£¬£¬£¬£¬¿ËÈÕ £¬£¬ £¬£¬£¬£¬£¬Ó¢¹ú×î´óÆû³µ³ö¿ÚÉ̽ݱªÂ·»¢£¨JLR£©ÒòÔâÓöÑÏÖØÍøÂç¹¥»÷µ¼Ö¶๤³§Í£²ú¡¢¹©Ó¦Á´ÖÐÖ¹ºó £¬£¬ £¬£¬£¬£¬£¬Ó¢¹úÕþ¸®Í¨¹ýÓ¢¹ú³ö¿ÚÈÚ×ʾ֣¨UKEF£©µÄ³ö¿ÚÉú³¤µ£±££¨EDG£©ÍýÏë £¬£¬ £¬£¬£¬£¬£¬ÎªÆäÌṩ15ÒÚÓ¢°÷´û¿îµ£±£¡£¡£¡£¡£¡£¡£¸Ã»úÖÆÍ¨¹ý¼ç¸ºÉÌÒµÒøÐдû¿îµÄ´ó²¿·ÖΣº¦ £¬£¬ £¬£¬£¬£¬£¬Ê¹JLR»ñµÃ±È×ÔÉíÔÚÖØ´óÊÂÎñºó¸üÓźñ¡¢½ð¶î¸ü´óµÄ´û¿î £¬£¬ £¬£¬£¬£¬£¬´û¿î½«ÔÚÎåÄêÄÚËÍ»¹ £¬£¬ £¬£¬£¬£¬£¬×¨ÏîÓÃÓÚÖ§¸¶¹©Ó¦ÉÌ¿î×Ó¼°»Ö¸´¹©Ó¦Á´ÔËÓª¡£¡£¡£¡£¡£¡£Ó¢¹úÉÌÒµºÍÉÌÒµ´ó³¼±ËµÃ¡¤¿­¶ûÇ¿µ÷ £¬£¬ £¬£¬£¬£¬£¬´Ë´Î¹¥»÷²»µ«Õë¶ÔÓ¢¹ú±ê¼ÇÐÔÆû³µÆ·ÅÆ £¬£¬ £¬£¬£¬£¬£¬¸üÍþвµ½Õû¸öÆû³µÐÐÒµ¼°ÒÀÀµÆäÉúÑĵĴÓÒµÕß¡£¡£¡£¡£¡£¡£´û¿îµ£±£½«Ö§³ÖÎ÷Ã×µÂÀ¼×È¿¤¡¢Ä¬Î÷ÈûµÂ¿¤¼°È«Ó¢ÊÖÒÕ¸Úλ £¬£¬ £¬£¬£¬£¬£¬²¢Í¨¹ýÏÖ´ú¹¤ÒµÕ½ÂÔ¼°ÉÌҵЭÒéºã¾ÃÖ§³ÖÆû³µÐÐÒµÉú³¤¡£¡£¡£¡£¡£¡£¾ÝÅû¶ £¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÑÏÖØÈÅÂÒJLRµÄITϵͳ¼°ÖÆÔìÔËÓª £¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ý±»µÁ £¬£¬ £¬£¬£¬£¬£¬¹¤³§Í£²úʱ¼ä±»ÆÈÑÓÉì¡£¡£¡£¡£¡£¡£×Գơ°Scattered Lapsus$ Hunters¡±µÄºÚ¿Í×éÖ¯Éù³Æ¶Ô´ËÈÏÕæ £¬£¬ £¬£¬£¬£¬£¬²¢ÔÚTelegramÐû²¼JLR SAPϵͳÄÚ²¿Îļþ½ØÍ¼ £¬£¬ £¬£¬£¬£¬£¬Ðû³ÆÒѰ²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/uk-govt-backs-jlr-with-15-billion-loan-guarantee-after-cyberattack/


6. ¿ÆÂÞÀ­¶àÖݽüÍòÃûNRAÖ§³ÖÕßÃô¸ÐÐÅÏ¢ÔâÒâÍâ×ß©


9ÔÂ29ÈÕ £¬£¬ £¬£¬£¬£¬£¬¿ÆÂÞÀ­¶àÖݽü10,000ÃûÃÀ¹úÌìϲ½Ç¹Ð­»á£¨NRA£©Ö§³ÖÕßµÄÐÕÃû¼°¼Òͥסַ±»ÒâÍâÐû²¼ÖÁÍøÂç £¬£¬ £¬£¬£¬£¬£¬Í¨¹ýGoogleËÑË÷¼´¿É¹ûÕæ»á¼û¡£¡£¡£¡£¡£¡£¾ÝÍøÂçÇ徲ýÌåÊÓ²ì £¬£¬ £¬£¬£¬£¬£¬¸ÃÊý¾Ý¼¯Ô´×Ô·ÇÓªÀû×éÖ¯"ÃÀ¹ú²½Ç¹Ð­»áÖ®ÓÑ"£¨Friends of NRA£©¹ÙÍø £¬£¬ £¬£¬£¬£¬£¬°üÀ¨1.1MBµÄÓʼþÁÐ±í £¬£¬ £¬£¬£¬£¬£¬¼Í¼ÁË2018ÄêǰºóÔÚ¸ÃÍøÕ¾×¢²á³é½±»òЧÀ͵ÄÓû§ÁªÏµÐÅÏ¢¡£¡£¡£¡£¡£¡£×ß©Ե¹ÊÔ­Óɱ»¹é×ïÓÚ³£¼ûµÄÈËΪÉèÖùýʧ £¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂËÑË÷ÒýÇæË÷ÒýÁ˱¾Ó¦±£ÃܵÄÊý¾Ý¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö £¬£¬ £¬£¬£¬£¬£¬Ö»¹ÜÊý¾Ý½ö°üÀ¨ÐÕÃûºÍסַÇÒÒÑÒÑÍùÆßÄê £¬£¬ £¬£¬£¬£¬£¬Ê±Ð§ÐÔÓÐÏÞ £¬£¬ £¬£¬£¬£¬£¬µ«ÈÔ¿ÉÄÜÒý·¢¸ú×ÙɧÈŵÈΣº¦¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×÷ΪNRA»ù½ð»áµÄÖ÷Òª³ï¿î·½ £¬£¬ £¬£¬£¬£¬£¬ºã¾ÃÖ§³ÖÉä»÷Ô˶¯ºÍǹе½ÌÓýÏîÄ¿ £¬£¬ £¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñ̻¶ÆäÊý¾ÝÖÎÀí±£´æÑÏÖØÎó²î¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬ £¬£¬£¬£¬£¬2021ÄêÔøÓжíÂÞ˹¹ØÁªµÄºÚ¿Í×éÖ¯"¸ñÀï·ò"½«NRAÁÐΪ¹¥»÷Ä¿µÄ £¬£¬ £¬£¬£¬£¬£¬¶øNRAÆäʱδÈÏ¿ÉÇå¾²Îó²î £¬£¬ £¬£¬£¬£¬£¬²¢»Ø±Üµç×ÓÇå¾²ÎÊÌâÌÖÂÛ¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/friends-nra-data-leak-colorado/