¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶

°ä²¼¹¦·ò 2026-03-13

1. ¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶


3ÔÂ12ÈÕ£¬¼ÓÄôó×î´óʳƷҩƷÁãÊÛÉÌLoblaw Companies Limited£¨¼ò³ÆLoblaw£©½üÈÕÔâ·êÖØ´óÍøÂ簲ȫÊÂÎñ¡£¡£¡£¸Ã¹«Ë¾°ä·¢£¬ºÚ¿ÍÈëÇÖÆä²¿ÃÅITÍøÂç²¢»ñÈ¡Á˿ͻ§µÄ»ù×ÔÉí·ÝÐÅÏ¢£¨PII£©£¬Ô̺¬ÐÕÃû¡¢¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØÖ·¡£¡£¡£Loblaw×÷Ϊ¼ÓÄôóÁãÊÛÒµ¾ÞÍ·£¬ÔÚÈ«¹úÕ¼ÓÐ2500¼ÒÃŵ꣬º­¸ÇÌØÐí¾­Óª³¬ÊС¢¡¢Ò©µê¡¢¡¢ÒøÐÐ×ÔÖ÷·þÎñͤºÍ·þ×°µêµÈҵ̬£¬²¢´òËãÔÚ2026ÄêÐÂÔö70¼ÒÃŵ꣬×÷ΪÆäµ½2030ÄêͶ×Ê100ÒÚÃÀÔªÎåÄê´òËãµÄÒ»²¿ÃÅ¡£¡£¡£¹«Ë¾ÏÖÕ¼ÓÐ22ÍòÃûÔ±¹¤£¬ÄêÊÕÈë¸ß´ï450ÒÚÃÀÔª¡£¡£¡£Õâ´ÎÊÂÎñʼÓÚ±¾ÖÜÔçЩʱ³½£¬Loblaw¼ì²âµ½ÆäITÍøÂçÖÐÒ»¸ö·Ç¹Ø¼ü¹Ø±ÕÇøÓò´æÔÚ¿ÉÒɻ£¬¾­µ÷²éÈ·ÈÏ£¬·¸×ïµÚÈý·½ÒѽӼûÁ˲¿Ãſͻ§µÄ¸ù»ùÐÅÏ¢¡£¡£¡£Ö»¹Üй¶Êý¾Ý²»Ô̺¬ÐÅÓþ¿¨ÏêÇé¡¢¡¢½¡¿µÐÅÏ¢»òÕË»§ÃÜÂëµÈÃô¸Ð²ÆÕþÐÅÏ¢£¬µ«LoblawÈÔ³öÓÚÉóÉ÷˼¿¼£¬×Ô¶¯×¢ÏúÁËËùÓпͻ§µÄÕË»§£¬ÒªÇó½Ó¼ûÊý×Ö·þÎñµÄÓû§ÖØÐµÇ¼²¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¹«Ë¾Ç¿µ÷£¬Æä½ðÈÚ·þÎñÆ·ÅÆPC FinancialδÊÜÕâ´ÎÊÂÎñÓ°Ïì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/


2. Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÔâAiLockÀÕË÷Èí¼þ¹¥»÷


3ÔÂ12ÈÕ£¬Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÕýµ÷²éһ·DZÔÚÊý¾Ýй¶ÊÂÎñ£¬ÆðÒòÊÇAiLockÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÐ¹Â¶Æ½Ì¨½«ÆäÁÐΪÊܺ¦Õß¡£¡£¡£¾Ý³Æ£¬¸ÃÍÅ»ïÇÔÈ¡ÁËЭ»á129GBÊý¾Ý£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹«¿ªÎļþ¡£¡£¡£Ð­»áÒѽáºÏÄÚ²¿ÍŶÓÓëÍⲿר¼Ò·¢Õ¹µ÷²é£¬²¢Ç¿µ÷¡°Êý¾Ý°²ÂúÊǵ±Ç°Ê×Òª¹¤×÷¡±£¬Ä¿Ç°ÕýÓë·¨Âɲ¿ÃźÏ×÷ÒÔÀåÇåÊÂÎñÕæÏà¡£¡£¡£Ð­»á½²»°È˰µÊ¾£¬ÒѰÑÎȵ½ÍþвÐÐΪÕß°ä²¼µÄ¡°ÈÏÁ족Ìû×Ó£¬µ«Òòµ÷²éÈÔÔÚ½øÐУ¬ÔÝÎÞ·¨Åû¶¾ßÌåϸ½Ú¡£¡£¡£×÷ΪӢ¹úÇú¹÷Çò»î¶¯µÄÖ÷ÌâÖÎÀí»ú¹¹£¬Ð­»á¸²¸ÇÈ«¹ú800Óà¼Ò¾ãÀÖ²¿¡¢¡¢15Íò×¢²áÇòÔ±¼°1.5ÍòÃû¶ÍÁ·¡¢¡¢²ÃÅк͹ÙÔ±£¬ÔËÓª²ã¼¶´Ó»ù²ãµ½¾«Ó¢¹ú¶È¶Ó¡£¡£¡£Õâ´ÎÊÂÎñ¿ÉÄÜÓ°Ïì»áÔ±ÒþÖÔÊý¾Ý£¬Ð­»áºôÓõÇòÔ±¾¯ÌèÒì³£ÕË»§»î¶¯¼°ÍøÂç´¹µö¹¥»÷£¬ÉóÉ÷´¦ÖÃδ¾­ÑéÖ¤µÄͨѶ¡£¡£¡£Ö»¹ÜЭ»áÉÐδ֤ʵÊý¾ÝÏÖʵй¶£¬µ«ÒѲÉȡԤ·À´ëÊ©£¬Ô̺¬×Ô¶¯×¢ÏúËùº±¼û×Ö·þÎñÕË»§²¢ÒªÇóÓû§ÖØÐµÇ¼¡¢¡¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£


https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/


3. ÐÂÐÍAIÌìÉú¶ñÒâÈí¼þSlopolyÇ¿»¯ÀÕË÷¹¥»÷Á´


3ÔÂ12ÈÕ£¬IBM X-Force×êÑÐÈËÔ±·¢ÏÖÒ»ÖÖÃûΪSlopolyµÄÐÂÐͶñÒâÈí¼þ£¬¼«¿ÉÄÜÓÉÌìÉúʽÈËΪÖÇÄܹ¤¾ß´´½¨£¬Æä¼¼ÊõÌØµãÔ̺¬´óÁ¿´úÂë×¢½â¡¢¡¢½á¹¹»¯ÈÕÖ¾¼Í¼¡¢¡¢ÃýÎó´¦Öü°Ç峺±äÁ¿¶¨Ãû£¬ÕâЩÔÚÈËÀà±àд¶ñÒâÈí¼þÖк±¼û¡£¡£¡£¸ÃÈí¼þ×÷ΪPowerShell¾ç±¾ºóÃÅ£¬ÔÚInterlockÀÕË÷Èí¼þ¹¥»÷ÖбíÑÝC2¿Í»§¶Ë½ÇÉ«£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜϰȾ·þÎñÆ÷Âñ·ü³¬Ò»ÖÜ£¬ÇÔÈ¡Êý¾Ý²¢Î¬³ÖÓÆ¾Ã½Ó¼û¡£¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³ÌȦÌ×£¬ºóÆÚ²¿ÊðSlopoly¡£¡£¡£IBM·ÖÎöÖ¸³ö£¬¾ç±¾Ëä×Ô³Æ"¶à̬C2ÓÆ¾Ã»¯¿Í»§¶Ë"£¬µ«ÏÖʵ²»×ãÖ´ÐÐÆÚ´úÂë×ÔÅú¸ÄÄÜÁ¦£¬½öͨ¹ýÌìÉúËæ»úÅäÖÃÖµºÍº¯ÊýÃû³ÆÊµÏÖα¶à̬¡£¡£¡£Æä²¿ÊðÓÚC:\ProgramData\Microsoft\Windows\Runtime\£¬Ö÷ÌâÖ°ÄÜÔ̺¬£ºÃ¿30Ãë·¢ËÍÐÄÌøÐűêÖÁ/api/commands£¬Ã¿50ÃëÂÖѯºÅÁͨ¹ýcmd.exeÖ´ÐÐÖ¸Áî²¢»Ø´«Á˾Ö£¬ÊØ»¤persistence.logÈÕÖ¾£¬Í¨¹ý"ÔËÐÐʱÆÚÀí"´òË㹤×÷³ÉÁ¢ÓƾÃÐÔ¡£¡£¡£Ö§³ÖºÅÁ¸ÇÏÂÔØÖ´ÐÐEXE/DLL/JSÓÐÐ§ÔØºÉ¡¢¡¢ÔËÐÐshellºÅÁî¡¢¡¢µ÷ÕûÐűê¾àÀë¡¢¡¢×Ô¸üм°Í˳ö¹ý³Ì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/


4. ÃÀÅ··ÛËéÒÀÀµAVReconµÄSocksEscort·¸×ï´úÀíÍøÂç


3ÔÂ12ÈÕ£¬ÃÀ¹ú˾·¨²¿½áºÏÅ·ÖÞ¶à¹ú·¨ÂÉ»ú¹¹¼°¸öÈ˺Ï×÷ͬ°éBlack Lotus Labs£¬³É¹¦·ÛËéÁËÔËӪʮÓàÄêµÄSocksEscortÍøÂç·¸×ï´úÀíÍøÂç¡£¡£¡£¸ÃÍøÂçÆëÈ«ÒÀÀµAVRecon Linux¶ñÒâÈí¼þÈëÇÖ±ßÔµÉ豸£¬Í¨¹ý¡°¸É¾»¡±IPµØÖ·ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁ÷Á¿Â·ÓÉ·þÎñ£¬¿ÉÈÆ¹ý¶àÖØºÚÃûµ¥£¬Ôø±»ÓÃÓÚÇÔȡŦԼÓû§100ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡¢¡¢Ôì³É±öϦ·¨ÄáÑÇÖÆ×÷ÆóÒµ70ÍòÃÀԪڲƭËðʧ¼°ÏÖÒÛ/ÍËÒÛÎäÊ¿10ÍòÃÀÔªÐÅÓþ¿¨Ëðʧ¡£¡£¡£¾ÝBlack Lotus LabsÊý¾Ý£¬SocksEscort×Ô2023Äê±»¼Í¼ÒÔÀ´£¬´Óǰ¼¸Äê¾ùÔÈÿÖÜϰȾ2Íǫ̀É豸£¬ÀÛ¼ÆÌṩԼ36.9Íò¸öIPµØÖ·½Ó¼ûȨÏÞ¡£¡£¡£½ØÖÁ2026Äê2Ô£¬ÆäÀûÓ÷¨Ê½ÈÔÁгöÔ¼8000̨ÊÜϰȾ·ÓÉÆ÷¡£¡£¡£Ðж¯ÖУ¬·¨ÂÉ»ú¹¹²é·âÁË7¹ú34¸öÓòÃûºÍ23̨·þÎñÆ÷£¬ÃÀ¹ú¶³½á350ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬ËùÓÐÊÜϰȾÉ豸ÒÑÓëSocksEscort·þÎñ¶Ï¿ªÏνӡ£¡£¡£AVRecon¶ñÒâÈí¼þ×Ô2021Äê5ÔÂÆð»îÔ¾£¬2023ÄêÖÐÆÚÒÑϰȾ³¬7Íǫ̀»ùÓÚLinuxµÄSOHO·ÓÉÆ÷£¬½öÓÃÓÚÀ©´óSocksEscort¹æÄ£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/


5. ¼ÓÄôóTelus DigitalÔâShinyHuntersÇÔÈ¡1PBÊý¾Ý


3ÔÂ12ÈÕ£¬¼ÓÄôóÒµÎñÁ÷³ÌÍâ°ü¾ÞÍ·Telus Digital½üÈÕ֤ʵÔâ·êÖØ´ó°²È«ÊÂÎñ¡£¡£¡£ÍþвÐÐΪÕßShinyHuntersÐû³ÆÔÚ³ÖÐøÊýÔµĹ¥»÷ÖÐÇÔÈ¡½ü1PBÊý¾Ý£¬Éæ¼°TelusµÄBPOÔËÓª¼°Ïû·ÑÕßµçÐŲ¿ÃÅͨ»°¼Í¼¡£¡£¡£¾ÝShinyHuntersÅû¶£¬ÆäÀûÓÃSalesloft DriftÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄGoogle Cloud Platformƾ֤ÈëÇÖTelus£¬²¢Í¨¹ýÍøÂ簲ȫ¹¤¾ßtrufflehogËÑË÷¸ü¶àƾ֤£¬½ø¶ø½Ó¼ûÔ̺¬BigQueryʵÀýÔÚÄڵĶà¸öϵͳ¡£¡£¡£±»µÁÊý¾Ýº­¸Ç¿Í»§Ö§³Ö¹¤µ¥¡¢¡¢Í¨»°¹àÒô¡¢¡¢Ô´´úÂë¡¢¡¢²ÆÕþÐÅÏ¢¡¢¡¢FBI²¼¾°µ÷²é¡¢¡¢SalesforceÊý¾Ý¼°ÓªÏú»î¶¯ÔªÊý¾ÝµÈ£¬Éæ¼°28¼Ò³ÛÃû¹«Ë¾£¬Êý¾ÝÀàÐÍÒò¹«Ë¾¶øÒ죬¶³öÁ˿ͻ§Ö§³Ö¡¢¡¢ºô½ÐÖÐÐÄÍâ°ü¡¢¡¢AI¹¤¾ß¡¢¡¢Ú²Æ­¼ì²âµÈ¶àÒµÎñÖ°ÄÜ¡£¡£¡£ShinyHunters×Ô½ñÄê2ÔÂÆðÏòTelusÀÕË÷6500ÍòÃÀÔª£¬µ«Î´»ñ»ØÓ¦¡£¡£¡£Telus×òÈÕÕýʽȷÈÏϵͳÔâδ¾­ÊÚȨ½Ó¼û£¬²¢°µÊ¾ÒѲÉÈ¡´ëʩӦ¶ÔÈëÇÖ¡¢¡¢±£»£»¤ÏµÍ³£¬ÀñÆ¸ÍøÂçȡ֤ר¼ÒЭÖúµ÷²é£¬Óë·¨Âɲ¿ÃźÏ×÷£¬Í¬Ê±Ç¿µ÷ÒµÎñÔËÓªÕý³££¬ÎÞÖ¤¾ÝÏÔʾ¿Í»§ÍøÂç·þÎñÊÜÓ°Ï죬½«×ÃÇé֪ͨÊÜÓ°Ïì¿Í»§¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/


6. °¢¶û°ÍÄáÑÇÒé»áÔâÍøÂç¹¥»÷£¬ÒÁ·½×éÖ¯³Æ±¨³ð


3ÔÂ11ÈÕ£¬°¢¶û°ÍÄáÑÇÒé»áÓÚÖܶþÍí¼äÔâ·ê¡°¸ß¼¶¡±ÍøÂç¹¥»÷£¬¹¥»÷Ö¸±íÃ÷È·Ö¸Ïòɾ³ýÊý¾Ý²¢¹¥Ï¶à¸öÄÚ²¿ÏµÍ³¡£¡£¡£¾ÝÒé»áÉêÃ÷£¬ÆäÖ÷ÌâϵͳÓë¹Ù·½ÍøÕ¾ÈÔά³ÖÕý³£ÔËÐУ¬µ«ÐÐÕþ²¿ÃÅʹÓõÄÄÚ²¿µçÓÊ·þÎñÒѱ»Ò»Ê±ÔÝÍ££¬µ¼ÖÂÊÕ·¢Ë«ÏòͨѶÖжÏ£¬¹¤×÷ÈËÔ±ÓëÒéÔ±ÔÚ¹¥»÷²úÉúºóÊýСʱÄÚÎÞ·¨½Ó¼ûµçÄÔ¼°µçÓÊϵͳ¡£¡£¡£Õâ´ÎÊÂÎñÖУ¬ÃûΪ¡°Homeland Justice¡±µÄºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü£¬²¢ÔÚÆäTelegramƵµÀ°ä²¼Á˾ݳÆÐ¹Â¶µÄÄÚ²¿Í¨Ñ¶Îļþ½ØÍ¼¡£¡£¡£Ö»¹Ü°¢¶û°ÍÄáÑǹٷ½ÉÐδ¹«¿ªÖ¤Êµ¸Ã×é֯˵·¨£¬µ«°²È«×êÑÐÈËÔ±ÓëÎ÷·½¹ÙÔ±´ËǰÒѽ«¡°Homeland Justice¡±ÓëÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¹ØÁª¡£¡£¡£½üÄêÀ´£¬¸Ã×éÖ¯ÂÅ´ÎÐû³Æ¶Ô°¢¶û°ÍÄáÑǾ³ÄÚһϵÁÐÍøÂç¹¥»÷ÕÆ¹Ü£¬Ö¸±êº­¸ÇÒé»á¡¢¡¢¹ú¶Èº½¿Õ¹«Ë¾¡¢¡¢µçÐÅÆóÒµ¼°¹ú¶Èͳ¼Æ¾Ö¡£¡£¡£Õâ´Î¹¥»÷µÄ²¼¾°Óë°¢¶û°ÍÄáÑǰ²È«¾ÖÊÆçÇÃÜÓйء£¡£¡£¡£¡£¡°Homeland Justice¡±ÔÚ¹¥»÷ÉêÃ÷ÖÐÃ÷È·°µÊ¾£¬Õâ´ÎÐж¯ÊǶ԰¢¶û°ÍÄáÑÇÖ§³ÖÒÁÀÊ·ñ¾öÅÉ×éÖ¯¡°ÒÁÀÊÈËÃñÊ¥Õ½Õß×éÖ¯¡±£¨MEK£©µÄ±¨³ð¡£¡£¡£


https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament