LogezyÊý¾Ý¿âÅäÖÃÃýÎóÖÂ800ÍòÒ½Áƹ¤×÷ÕßÊý¾Ýй¶

°ä²¼¹¦·ò 2025-04-17

1. LogezyÊý¾Ý¿âÅäÖÃÃýÎóÖÂ800ÍòÒ½Áƹ¤×÷ÕßÊý¾Ýй¶


4ÔÂ15ÈÕ£¬£¬Ó¢¹úÈí¼þ¹«Ë¾LogezyÒòÔ±¹¤ÖÎÀíÊý¾Ý¿âÅäÖÃÃýÎ󣬣¬µ¼Ö½ü800ÍòÌõÒ½ÁƱ£½¡¹¤×÷Õ߼ͼй¶£¬£¬Êý¾Ý×ÜÁ¿´ï1.1TB£¬£¬Ô̺¬Éí·ÝÖ¤¡¢²ÆÕþÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ÕâЩÐÅÏ¢´æ´¢ÔÚδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»¤µÄÊý¾Ý¿âÖУ¬£¬Â¶³öµÄÊý¾Ý¿âº­¸Ç¹¤×÷ÊÚȨÎļþ¡¢¹úÃñ±£ÏÕºÅÂëµÈ£¬£¬Éæ¼°656¸öĿ¼Ìõ¿î£¬£¬¶àΪҽÁƱ£½¡ÌṩÉÌ¡¢ÕÐÆ¸»ú¹¹»òһʱ¾ÍÒµ·þÎñ¡£¡£¡£ÊÂÎñ·¢Ïֺ󣬣¬LogezyѸËÙÏÞ¶ÈÁËÊý¾Ý¿â½Ó¼û£¬£¬µ«¹ØÓÚÊý¾Ý¿â¹«¿ªÊ±³¤¡¢ÊÇ·ñÔâδ¾­ÊÚȨ½Ó¼û¼°ÖÎÀí·½µÈÎÊÌâÈÔ´æÒÉ¡£¡£¡£LogezyµÄÔ±¹¤ÖÎÀíÈí¼þÖ¼ÔÚ¼ò»¯Ô±¹¤ÖÎÀí£¬£¬Ìṩ²¿Êð¡¢Ö§¸¶¡¢¼Æ·ÑµÈÖ°ÄÜ£¬£¬Ö»¹ÜÆäÐû³Æ·þÎñ¸÷ÐÐÒµ£¬£¬µ«Ð¹Â¶¼ÍÂ¼ÖØÒªÉæ¼°Ò½ÁƱ£½¡ÐÐÒµºÍÒ½»¤ÈËÔ±¡£¡£¡£Õâ´ÎÊý¾Ýй¶·çÏվ޴󣬣¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÍøÂç¹¥»÷Ö¸±ê£¬£¬Ð¹Â¶ÐÅÏ¢»ò±»ÓÃÓÚÉí·Ý͵ÇÔ¡¢»ñÈ¡¾­¼ÃÀûÒæ£¬£¬»¹¿ÉÄÜÖú³¤Î´¾­ÊÚȨ½Ó¼ûÄÚ²¿Ò½ÁÆÏµÍ³£¬£¬Ð¹Â¶»¼ÕßÊý¾Ý¡£¡£¡£´ËÍ⣬£¬Ð¡ÎÒÐÅÏ¢»ò±»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷£¬£¬Ôö³¤ÀÕË÷Èí¼þ¹¥»÷·çÏÕ¡£¡£¡£


https://hackread.com/uk-software-firm-exposed-healthcare-worker-records/


2. ºÚ¿ÍÇÔÈ¡ÎäÌïÖÆÒ©Êý¾Ý£¬£¬Ë÷Òª75,000ÃÀÔªÅâ³¥


4ÔÂ15ÈÕ£¬£¬ÎäÌïÖÆÒ©ÊÐÖµ450ÒÚÃÀÔª£¬£¬×¨Ò»ÓÚ¶à¸ö¹Ø¼üÁìÓòµÄÒ©ÎïÑз¢£¬£¬Õ¼Óг¬4.9ÍòÃûÔ±¹¤¡£¡£¡£½üÈÕ£¬£¬Ò»ÃûÍþвÐÐΪÕßÔÚ·¸·¨ÂÛ̳beltwayÉÏÏúÊ۾ݳÆÊôÓÚÈÕ±¾ÉÏÊÐÉúÎïÖÆÒ©¹«Ë¾ÎäÌïµÄÖØ´óÊý¾Ý¿â£¬£¬Õâ´ÎÊý¾Ýй¶ÊÂÎñÉÐδµÃµ½¹Ù·½Ö¤Êµ¡£¡£¡£¸ÃÐÂÕË»§Ðû³ÆÓÚ2025Äê4Ô´ÓTakeda.comµ¼³öÁËÔ¼200ÍòÐÐÓû§ÐÅÏ¢£¬£¬²¢¹«¿ªÏúÊÛ£¬£¬±¨¼ÛÆð¼Û7.5ÍòÃÀÔªÇÒÖ»ÂôÒ»´Î£¬£¬»¹³ÆÎäÌ﹤×÷ÈËÔ±ÔøÁªÏµÆä³·ÏÂÐÅÏ¢¡£¡£¡£ÍþвÐÐΪÕßÌṩµÄÊý¾ÝÑù±¾¿´ËÆÐ¡ÎÒÐÅÏ¢¡¢×¨Òµ¾ßÌåÐÅÏ¢ºÍÄÚ²¿ÏµÍ³±êʶ·ûµÄ×éºÏ£¬£¬¿ÉÄÜÀ´×ÔCRM»òÊý¾ÝÖÎÀíϵͳVeeva£¬£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂ롢ְλ¡¢×éÖ¯´ÓÊô¹ØÏµÒÔ¼°¸÷ÀàϵͳÊý¾ÝµÈ¡£¡£¡£È»¶ø£¬£¬ÕâЩÑù±¾²»¼°ÒÔÈ·ÈÏÊý¾Ýй¶µÄÕæÊµÐÔ¡£¡£¡£ÎäÌ﹫˾¶Ô´Ë¸ß¶ÈÆ÷ÖØ£¬£¬ÒÑÆô¶¯ÄÚ²¿µ÷²é²¢ÆÀ¹ÀÖ¸¿ØµÄÓÐЧÐÔ¡£¡£¡£ÎäÌï½²»°È˰µÊ¾¹«Ë¾¼«¶ÈÆ÷ÖØÊý¾ÝºÍÒþÖÔÆëÈ«ÐÔ¡£¡£¡£°²È«×êÑÐÔ±Ö¸³ö£¬£¬Ö»¹ÜVeevaϵͳÔÚÖÆÒ©µÈÐÐÒµÀûÓÃ¿í·º£¬£¬µ«Ñù±¾½öÔ̺¬¼¸¸öÓû§£¬£¬ÄÑÒÔÅÐ¶ÏÆäºÏ·¨ÐÔ¡£¡£¡£Õâ´ÎÊÂÎñÖÐÌáµ½µÄ¡°Ò½Éú¡±ºÍ¡°Ò©¼Áʦ¡±ºÜ¿ÉÄÜÊǿͻ§£¬£¬Ñù±¾Êý¾ÝÔ̺¬×¨ÒµÖ°³ÆµÈÊôÐÔ¡£¡£¡£ÈôÊý¾Ýй¶Êôʵ£¬£¬ÊÜÓ°Ïì¿Í»§½«Ãæ¶ÔóÒ×µç×ÓÓʼþÈëÇÖ·çÏÕ¡£¡£¡£


https://cybernews.com/security/takeda-data-breach-claimed-by-cybercriminals/


3. ¾È»¤³µ¹«Ë¾MedExÔâÍøÂç¹¥»÷£¬£¬³¬10Íò»¼ÕßÊý¾Ýй¶


4ÔÂ15ÈÕ£¬£¬½üÈÕ£¬£¬ÃÀ¹úÖÐÎ÷²¿Ò»¼Ò¾È»¤³µ¹«Ë¾Ò½ÁÆ¿ìÔ˾Ȼ¤³µ£¨MedEx£©Ôâ·ê´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬µ¼ÖÂÑÏÖØÊý¾Ýй¶¡£¡£¡£MedEx×ܲ¿Î»ÓÚÒÁÀûŵÒÁÖÝ˹¿Æ»ù£¬£¬Õ¼ÓÐ80¶àÁ¾¾È»¤³µºÍ375¶àÃûÔ±¹¤£¬£¬Õâ´ÎÊÂÎñ¿ÉÄÜй¶Á˳¬¹ý118,418Ãû»¼ÕßµÄÃô¸ÐÐÅÏ¢£¬£¬Ô̺¬È«Ãû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢Ò½Áƺͱ£ÏÕÐÅÏ¢¡¢µÇ¼ƾ֤£¬£¬ÉõÖÁ»¤ÕÕÐÅÏ¢¡£¡£¡£¸ÃÎ¥¹æÐÐΪ²úÉúÔÚ2024Ä꣬£¬µ÷²éʵÏÖºó²Åͨ¹ýÓйØÎļþ¹«¿ª¡£¡£¡£3ÔÂ18ÈÕ£¬£¬MedEx·¢ÏÖÍøÂçÖжϺ󣬣¬Á¢¼´¹Ø±Õϵͳ£¬£¬²¢ÒýÈëµÚÈý·½ÍøÂ簲ȫÍŶӽøÐÐÓ¦¶Ô¡£¡£¡£Ä¿Ç°£¬£¬ÉÐδ·¢ÏÖ±»µÁÊý¾Ý±»ÀÄÓõļ£Ï󣬣¬ÇҸù«Ë¾ÒÑΪÊܺ¦ÕßÌṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»¤¡£¡£¡£½üÄêÀ´£¬£¬Ò½ÁƱ£½¡ºÍ´¹Î£·þÎñÁìÓòÒѳÉÎªÍøÂç·¸×ï·Ö×ÓµÄÖØÒªÖ¸±ê£¬£¬ÕâÖØÒªÔ´ÓÚ¸ÃÐÐÒµ¶ÔIT°²È«Æ÷ÖØ²»¼°¡£¡£¡£


https://cybernews.com/security/medex-ambulance-data-breach-patient-details-compromised/


4. EndueSoftwareÔâºÚ¿Í¹¥»÷£¬£¬³¬11.8ÍòÈËÃô¸ÐÐÅϢй¶


4ÔÂ15ÈÕ£¬£¬×ܲ¿Î»ÓÚŦԼµÄÊäÒºÕïËù·þÎñ¿Æ¼¼¹«Ë¾EndueSoftwareÒÑÈ·ÈϲúÉúÊý¾Ýй¶ÊÂÎñ£¬£¬Ð¹Â¶Á˳¬¹ý118,000È˵ÄÃô¸ÐÐÅÏ¢£¬£¬Ô̺¬Éç»á°²È«ºÅÂ롢ȫÃû¡¢µ®ÉúÈÕÆÚºÍÒ½ÁƼͼ±àºÅµÈ¡£¡£¡£Õâ´ÎÏ®»÷²úÉúÔÚ2025Äê2ÔÂ16ÈÕ£¬£¬µ«Ï¸½ÚÒò˾·¨ÒªÇóÏò¼à¹Ü»ú¹¹ºÍÊÜÓ°ÏìСÎÒ·¢³ö֪ͨ¶ø¸Õ¸Õ¸¡³öË®Ãæ¡£¡£¡£EndueÊÇÒ»¼Ò¿ª·¢ÓÃÓÚÖÎÀíÊäÒºÖÐÐĵϼÕ߯ÌÅÅ¡¢½Ó¹Ü¡¢¿â´æºÍ¼Í¼µÄÈí¼þµÄ¹«Ë¾£¬£¬¹¥»÷Õ߳ɹ¦ÉøÈëÁËÆäϵͳ²¢¸´ÖÆÁË´óÁ¿Ð¡ÎÒÊý¾Ý¡£¡£¡£Ö»¹ÜĿǰÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÊý¾ÝÒѱ»ÀÄÓ㬣¬µ«Êܺ¦ÕßÈÔÐèÉóÉ÷´¦Öᣡ£¡£¸Ã¹«Ë¾ÒÑΪÊܺ¦ÕßÌṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»¤£¬£¬²¢Ö´ÐÐÁ˶îÍâµÄ°²È«´ëÊ©ÒÔ¼õÇá·çÏÕ¡£¡£¡£Õâ´ÎÊý¾Ýй¶ÊÂÎñ͹ÏÔÁËÒ½ÁƱ£½¡ÁìÓòÊý×ÖÉí·Ý°²È«µÄ´àÈõÐÔ£¬£¬³ö¸ñÊǶÔÓÚÄÇЩ»¼Óи´ÔÓÇÒÂýÐÔ¼²²¡µÄÊäÒºÖÐÐÄ»¼Õß¶øÑÔ¡£¡£¡£


https://cybernews.com/security/infusion-center-software-breach-exposes-patient-data/


5. BidenCash°µÍøÐÅÓþ¿¨Ú²Æ­Êг¡ÔÙй´óÁ¿±»µÁ¼Í¼


4ÔÂ16ÈÕ£¬£¬°µÍøÐÅÓþ¿¨Ú²Æ­Êг¡BidenCashÒÔ¼¤½øÕ½ÊõÎÅÃû£¬£¬½üÈÕÔÚ¶íÓïÍøÂç·¸×ïÂÛ̳XSSй¶һÅúеÄ910,380Ìõ±»µÁÐÅÓþ¿¨¼Í¼£¬£¬ÓÚ4ÔÂ14ÈÕÏÂÎç6:37£¨UTC£©°ä²¼£¬£¬Ô̺¬¿¨ºÅ¡¢CVVÂëºÍÓÐЧÆÚ£¬£¬ËäÎÞÐÕÃûµÈСÎÒÉí·ÝÐÅÏ¢£¬£¬µ«ÈÔ´æÔÚÍøÂçڲƭ·çÏÕ£¬£¬ÓÈÆäÔÚÎÞ¿¨ÂòÂôÖС£¡£¡£Õâ²¢·ÇBidenCash³õ´Î´óÁ¿°ä²¼±»µÁÊý¾Ý£¬£¬´Ëǰ¸Ãƽ̨¾Í³£Í¨¹ý°ä²¼Ãâ·ÑйÃÜÐÅÏ¢ÎüÒý¹Ø×¢¡¢³ÉÁ¢ÅµÑÔ»òÐû³ÆÖ´ÐÐÊг¡¹æ¶¨¡£¡£¡£2023Äê3Ô£¬£¬Æäй¶200ÍòÕÅÐÅÓþ¿¨¾ßÌåÐÅÏ¢£¬£¬º­¸Ç³Ö¿¨ÈËÈ«Ãû¡¢¿¨ºÅ¡¢ÒøÐоßÌåÐÅÏ¢µÈ£»£»2023Äê12Ô£¬£¬ÓÖ°ä²¼³¬160ÍòÌõÐÅÓþ¿¨¼Í¼£¬£¬¾ùÒÔ´¿Îı¾Ìåʽ´æ´¢¡£¡£¡£Õâ´Îй¶ʱ£¬£¬BidenCashÔÚ¶íÂÞ˹ÂÛ̳°ä²¼Ìû×ӳƣ¬£¬Êý¾ÝÊÇ´Óǰһ¸öÔÂ´Ó·ÖÆçÂÛ̳ºÍTelegramȺ×éץȡµÄ£¬£¬Ö÷ÕÅÊÇչʾÆä¡°·´¹«¿ªÏµÍ³¡±£¬£¬¸ÃϵͳּÔÚ¼ø±ð²¢ÒƳýÊг¡ÉÏÒÑÁ÷ͨµÄ¿¨Æ¬¡£¡£¡£Èô·¢ÏÖÂô¼ÒÏúÊÛÒÑÔÚÁ÷ͨµÄ¿¨Æ¬£¬£¬ÓйØÁÐ±í½«±»Ï¼Ü£¬£¬Âô¼ÒÒ²½«ÊÜËÄ´¦·££¬£¬Õâ¼ÈÊÇÒ»ÖÖÖÊÁ¿½ÚÖÆ³¢ÊÔ£¬£¬Ò²ÊÇÒ»ÖÖÍÆ¹ã¼¿Á©£¬£¬Í¨¹ýÃâ·ÑÌṩº£Á¿Êý¾Ý¼¯£¬£¬Ìá¸ßÔÚ¿¨Æ¬³ÖÓÐÕßÖÐµÄÆØ¹â¶È£¬£¬ÎüÒýÁ÷Á¿»Øµ½ÍøÕ¾¡£¡£¡£


https://hackread.com/bidencash-market-leak-credit-cards-russian-forum/


6. InterlockÀÕË÷Èí¼þͨ¹ýºÏ·¨ÍøÕ¾´«²¼¶ñÒâä¯ÀÀÆ÷¸üÐÂ


4ÔÂ16ÈÕ£¬£¬ÍøÂ簲ȫר¼Ò·¢ÏÖÁËÒ»ÖÖ×Ô2024Äê9ÔÂÆðÇÄÈ»À©´ó»î¶¯ÁìÓòµÄ¸´ÔÓÀÕË÷Èí¼þÍþвInterlock¡£¡£¡£¸Ã¶ñÒâÈí¼þѡȡ¶à½×¶Î¹¥»÷Á´£¬£¬ÏÈÈëÇֺϷ¨ÍøÕ¾£¬£¬ÒÔÐéαä¯ÀÀÆ÷¸üÐÂÓÕÆ­ºÁÎÞ½äÐĵÄÓû§¡£¡£¡£×ÔInterlock³öÏÖÒÔÀ´£¬£¬ÆäÕ½Êõ²úÉúÖØ´ó±ä¶¯¡£¡£¡£ÔËÓªÉ̸Ľø¹¤¾ß¼¯£¬£¬Ñ¡È¡ClickFixµÈм¼Êõ²¿ÊðÀÕË÷Èí¼þ¸ºÔØ£¬£¬²¢Ñ¡È¡LummaStealerºÍBerserkStealerµÈ¹¤¾ß¼ÓÇ¿ÄÜÁ¦¡£¡£¡£×î³õµÄϰȾý½éÒÀÀµÉç»á¹¤³Ìѧ£¬£¬Ðéαä¯ÀÀÆ÷¸üз¨Ê½ÊǾ«ÐÄÖÆ×÷µÄPyInstallerÎļþ£¬£¬Æô¶¯Ê±ÏÂÔØ²¢Ö´ÐÐÏÖʵºÏ·¨×°Ö÷¨Ê½£¬£¬Í¬Ê±ÔËÐÐǶÈëµÄPowerShellºóÞ籾¡£¡£¡£¸Ã¾ç±¾×÷Ϊ¹¥»÷µÚÒ»½×¶Î£¬£¬ÒÔÎÞÏÞÑ­»·ÔËÐУ¬£¬ÍøÂç´óÁ¿ÏµÍ³ÐÅÏ¢£¬£¬¾­¼ÓÃÜ¡¢Ñ¹Ëõºó´«Êäµ½C2·þÎñÆ÷¡£¡£¡£ºóÐøµü´úʵÏÖÓÆ¾ÃÐÔ»úÖÆ£¬£¬¿ÉÖ´ÐÐËÁÒâWindowsºÅÁî¡£¡£¡£C2»ù´¡Éèʩͨ¹ý¾«ÐÄÉ¢²¼Õ¹Ê¾Æäµ¯ÐÔ¡£¡£¡£2025ËêÊ×£¬£¬ÔËÓªÉÌÕ½ÊõÀ©´ó£¬£¬´Óä¯ÀÀÆ÷¸üеö¶üתÏò°²È«Èí¼þ¸üз¨Ê½£¬£¬¼Ù×°³ÉFortiClientµÈ°²È«²úÆ·¡£¡£¡£Õâ´Î¸Ä±àÅú×¢¸Ã×éÖ¯ÕýÔÚ²»ÐݸĽø¼¼Êõ£¬£¬ÒÔ±ãÔںܶలȫÐж¯µÄ¼à¶½ÏÂÔË×÷¡£¡£¡£


https://cybersecuritynews.com/interlock-ransomware-employs-multi-stage-attack/