LogezyÊý¾Ý¿âÉèÖùýʧÖÂ800ÍòÒ½ÁÆÊÂÇéÕßÊý¾Ýй¶
Ðû²¼Ê±¼ä 2025-04-171. LogezyÊý¾Ý¿âÉèÖùýʧÖÂ800ÍòÒ½ÁÆÊÂÇéÕßÊý¾Ýй¶
4ÔÂ15ÈÕ£¬£¬£¬Ó¢¹úÈí¼þ¹«Ë¾LogezyÒòÔ±¹¤ÖÎÀíÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬µ¼Ö½ü800ÍòÌõÒ½ÁƱ£½¡ÊÂÇéÕß¼Í¼й¶£¬£¬£¬Êý¾Ý×ÜÁ¿´ï1.1TB£¬£¬£¬°üÀ¨Éí·ÝÖ¤¡¢²ÆÎñÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ÕâЩÐÅÏ¢´æ´¢ÔÚδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»£»¤µÄÊý¾Ý¿âÖУ¬£¬£¬Ì»Â¶µÄÊý¾Ý¿âº¸ÇÊÂÇéÊÚȨÎļþ¡¢¹úÃñ°ü¹ÜºÅÂëµÈ£¬£¬£¬Éæ¼°656¸öĿ¼ÌõÄ¿£¬£¬£¬¶àΪҽÁƱ£½¡ÌṩÉÌ¡¢ÕÐÆ¸»ú¹¹»òÔÝʱ¾ÍҵЧÀÍ¡£¡£¡£ÊÂÎñ·¢Ã÷ºó£¬£¬£¬LogezyѸËÙÏÞÖÆÁËÊý¾Ý¿â»á¼û£¬£¬£¬µ«¹ØÓÚÊý¾Ý¿â¹ûÕæÊ±³¤¡¢ÊÇ·ñÔâδ¾ÊÚȨ»á¼û¼°ÖÎÀí·½µÈÎÊÌâÈÔ´æÒÉ¡£¡£¡£LogezyµÄÔ±¹¤ÖÎÀíÈí¼þÖ¼ÔÚ¼ò»¯Ô±¹¤ÖÎÀí£¬£¬£¬Ìṩ°²ÅÅ¡¢Ö§¸¶¡¢¼Æ·ÑµÈ¹¦Ð§£¬£¬£¬Ö»¹ÜÆäÉù³ÆÐ§À͸÷ÐÐÒµ£¬£¬£¬µ«Ð¹Â¶¼Í¼Ö÷񻃾¼°Ò½ÁƱ£½¡ÐÐÒµºÍÒ½»¤Ö°Ô±¡£¡£¡£´Ë´ÎÊý¾Ýй¶Σº¦Öش󣬣¬£¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÍøÂç¹¥»÷Ä¿µÄ£¬£¬£¬Ð¹Â¶ÐÅÏ¢»ò±»ÓÃÓÚÉí·Ý͵ÇÔ¡¢»ñÈ¡¾¼ÃÀûÒæ£¬£¬£¬»¹¿ÉÄÜÖú³¤Î´¾ÊÚȨ»á¼ûÄÚ²¿Ò½ÁÆÏµÍ³£¬£¬£¬Ð¹Â¶»¼ÕßÊý¾Ý¡£¡£¡£±ðµÄ£¬£¬£¬Ð¡ÎÒ˽¼ÒÐÅÏ¢»ò±»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷£¬£¬£¬ÔöÌíÀÕË÷Èí¼þ¹¥»÷Σº¦¡£¡£¡£
https://hackread.com/uk-software-firm-exposed-healthcare-worker-records/
2. ºÚ¿ÍÇÔÈ¡ÎäÌïÖÆÒ©Êý¾Ý£¬£¬£¬Ë÷Òª75,000ÃÀÔªÅâ³¥
4ÔÂ15ÈÕ£¬£¬£¬ÎäÌïÖÆÒ©ÊÐÖµ450ÒÚÃÀÔª£¬£¬£¬×¨×¢ÓÚ¶à¸öÒªº¦ÁìÓòµÄÒ©ÎïÑз¢£¬£¬£¬ÓµÓг¬4.9ÍòÃûÔ±¹¤¡£¡£¡£¿ËÈÕ£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÔÚ²»·¨ÂÛ̳beltwayÉϳöÊ۾ݳÆÊôÓÚÈÕ±¾ÉÏÊÐÉúÎïÖÆÒ©¹«Ë¾ÎäÌïµÄÖØ´óÊý¾Ý¿â£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÉÐδ»ñµÃ¹Ù·½Ö¤Êµ¡£¡£¡£¸ÃÐÂÕË»§Éù³ÆÓÚ2025Äê4Ô´ÓTakeda.comµ¼³öÁËÔ¼200ÍòÐÐÓû§ÐÅÏ¢£¬£¬£¬²¢¹ûÕæ³öÊÛ£¬£¬£¬±¨¼ÛÆð¼Û7.5ÍòÃÀÔªÇÒÖ»ÂôÒ»´Î£¬£¬£¬»¹³ÆÎäÌïÊÂÇéÖ°Ô±ÔøÁªÏµÆä³·ÏÂÐÅÏ¢¡£¡£¡£ÍþвÐÐΪÕßÌṩµÄÊý¾ÝÑù±¾¿´ËÆÐ¡ÎÒ˽¼ÒÐÅÏ¢¡¢×¨ÒµÏêϸÐÅÏ¢ºÍÄÚ²¿ÏµÍ³±êʶ·ûµÄ×éºÏ£¬£¬£¬¿ÉÄÜÀ´×ÔCRM»òÊý¾ÝÖÎÀíϵͳVeeva£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ롢ְλ¡¢×éÖ¯Á¥Êô¹ØÏµÒÔ¼°ÖÖÖÖϵͳÊý¾ÝµÈ¡£¡£¡£È»¶ø£¬£¬£¬ÕâЩÑù±¾È±·¦ÒÔÈ·ÈÏÊý¾Ýй¶µÄÕæÊµÐÔ¡£¡£¡£ÎäÌ﹫˾¶Ô´Ë¸ß¶ÈÖØÊÓ£¬£¬£¬ÒÑÆô¶¯ÄÚ²¿ÊӲ첢ÆÀ¹ÀÖ¸¿ØµÄÓÐÓÃÐÔ¡£¡£¡£ÎäÌï½²»°ÈËÌåÏÖ¹«Ë¾ºÜÊÇÖØÊÓÊý¾ÝºÍÒþ˽ÍêÕûÐÔ¡£¡£¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬Ö»¹ÜVeevaϵͳÔÚÖÆÒ©µÈÐÐÒµÓ¦ÓÃÆÕ±é£¬£¬£¬µ«Ñù±¾½ö°üÀ¨¼¸¸öÓû§£¬£¬£¬ÄÑÒÔÅÐ¶ÏÆäÕýµ±ÐÔ¡£¡£¡£´Ë´ÎÊÂÎñÖÐÌáµ½µÄ¡°Ò½Éú¡±ºÍ¡°Ò©¼Áʦ¡±ºÜ¿ÉÄÜÊǿͻ§£¬£¬£¬Ñù±¾Êý¾Ý°üÀ¨×¨ÒµÖ°³ÆµÈÊôÐÔ¡£¡£¡£ÈôÊý¾Ýй¶Êôʵ£¬£¬£¬ÊÜÓ°Ïì¿Í»§½«ÃæÁÙÉÌÒµµç×ÓÓʼþÈëÇÖΣº¦¡£¡£¡£
https://cybernews.com/security/takeda-data-breach-claimed-by-cybercriminals/
3. ¾È»¤³µ¹«Ë¾MedExÔâÍøÂç¹¥»÷£¬£¬£¬³¬10Íò»¼ÕßÊý¾Ýй¶
4ÔÂ15ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÃÀ¹úÖÐÎ÷²¿Ò»¼Ò¾È»¤³µ¹«Ë¾Ò½ÁÆ¿ìÔ˾Ȼ¤³µ£¨MedEx£©ÔâÊÜ´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬µ¼ÖÂÑÏÖØÊý¾Ýй¶¡£¡£¡£MedEx×ܲ¿Î»ÓÚÒÁÀûŵÒÁÖÝ˹¿Æ»ù£¬£¬£¬ÓµÓÐ80¶àÁ¾¾È»¤³µºÍ375¶àÃûÔ±¹¤£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÁè¼Ý118,418Ãû»¼ÕßµÄÃô¸ÐÐÅÏ¢£¬£¬£¬°üÀ¨È«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Ò½ÁƺͰü¹ÜÐÅÏ¢¡¢µÇ¼ƾ֤£¬£¬£¬ÉõÖÁ»¤ÕÕÐÅÏ¢¡£¡£¡£¸ÃÎ¥¹æÐÐΪ±¬·¢ÔÚ2024Ä꣬£¬£¬ÊӲ쿢ʺó²Åͨ¹ýÏà¹ØÎļþ¹ûÕæ¡£¡£¡£3ÔÂ18ÈÕ£¬£¬£¬MedEx·¢Ã÷ÍøÂçÖÐÖ¹ºó£¬£¬£¬Á¬Ã¦¹Ø±Õϵͳ£¬£¬£¬²¢ÒýÈëµÚÈý·½ÍøÂçÇå¾²ÍŶӾÙÐÐÓ¦¶Ô¡£¡£¡£ÏÖÔÚ£¬£¬£¬ÉÐδ·¢Ã÷±»µÁÊý¾Ý±»ÀÄÓõļ£Ï󣬣¬£¬ÇҸù«Ë¾ÒÑΪÊܺ¦ÕßÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤¡£¡£¡£½üÄêÀ´£¬£¬£¬Ò½ÁƱ£½¡ºÍ½ôÆÈЧÀÍÁìÓòÒѳÉÎªÍøÂç·¸·¨·Ö×ÓµÄÖ÷ҪĿµÄ£¬£¬£¬ÕâÖ÷ÒªÔ´ÓÚ¸ÃÐÐÒµ¶ÔITÇå¾²ÖØÊÓȱ·¦¡£¡£¡£
https://cybernews.com/security/medex-ambulance-data-breach-patient-details-compromised/
4. EndueSoftwareÔâºÚ¿Í¹¥»÷£¬£¬£¬³¬11.8ÍòÈËÃô¸ÐÐÅϢй¶
4ÔÂ15ÈÕ£¬£¬£¬×ܲ¿Î»ÓÚŦԼµÄÊäÒºÕïËùЧÀͿƼ¼¹«Ë¾EndueSoftwareÒÑÈ·Èϱ¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬Ð¹Â¶ÁËÁè¼Ý118,000È˵ÄÃô¸ÐÐÅÏ¢£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂ롢ȫÃû¡¢³öÉúÈÕÆÚºÍÒ½ÁƼͼ±àºÅµÈ¡£¡£¡£´Ë´ÎÏ®»÷±¬·¢ÔÚ2025Äê2ÔÂ16ÈÕ£¬£¬£¬µ«Ï¸½ÚÒòÖ´·¨ÒªÇóÏòî¿Ïµ»ú¹¹ºÍÊÜÓ°ÏìСÎÒ˽¼Ò·¢³ö֪ͨ¶ø¸Õ¸Õ¸¡³öË®Ãæ¡£¡£¡£EndueÊÇÒ»¼Ò¿ª·¢ÓÃÓÚÖÎÀíÊäÒºÖÐÐĵϼÕß°²ÅÅ¡¢ÎüÊÕ¡¢¿â´æºÍ¼Í¼µÄÈí¼þµÄ¹«Ë¾£¬£¬£¬¹¥»÷ÕßÀÖ³ÉÉøÍ¸ÁËÆäϵͳ²¢¸´ÖÆÁË´ó×ÚСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÊý¾ÝÒѱ»ÀÄÓ㬣¬£¬µ«Êܺ¦ÕßÈÔÐèÉóÉ÷´¦Öóͷ£¡£¡£¡£¸Ã¹«Ë¾ÒÑΪÊܺ¦ÕßÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤£¬£¬£¬²¢ÊµÑéÁËÌØÁíÍâÇå¾²²½·¥ÒÔ¼õ΢Σº¦¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÊÂÎñ͹ÏÔÁËÒ½ÁƱ£½¡ÁìÓòÊý×ÖÉí·ÝÇå¾²µÄųÈõÐÔ£¬£¬£¬ÌØÊâÊǹØÓÚÄÇЩ»¼ÓÐÖØ´óÇÒÂýÐÔ¼²²¡µÄÊäÒºÖÐÐÄ»¼Õß¶øÑÔ¡£¡£¡£
https://cybernews.com/security/infusion-center-software-breach-exposes-patient-data/
5. BidenCash°µÍøÐÅÓÿ¨Ú²ÆÊг¡ÔÙй´ó×Ú±»µÁ¼Í¼
4ÔÂ16ÈÕ£¬£¬£¬°µÍøÐÅÓÿ¨Ú²ÆÊг¡BidenCashÒÔ¼¤½øÕ½ÂÔÖøÃû£¬£¬£¬¿ËÈÕÔÚ¶íÓïÍøÂç·¸·¨ÂÛ̳XSSй¶һÅúеÄ910,380Ìõ±»µÁÐÅÓÿ¨¼Í¼£¬£¬£¬ÓÚ4ÔÂ14ÈÕÏÂÖç6:37£¨UTC£©Ðû²¼£¬£¬£¬°üÀ¨¿¨ºÅ¡¢CVVÂëºÍÓÐÓÃÆÚ£¬£¬£¬ËäÎÞÐÕÃûµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬µ«ÈÔ±£´æÍøÂçÚ²ÆÎ£º¦£¬£¬£¬ÓÈÆäÔÚÎÞ¿¨ÉúÒâÖС£¡£¡£Õâ²¢·ÇBidenCashÊ״δó×ÚÐû²¼±»µÁÊý¾Ý£¬£¬£¬´Ëǰ¸Ãƽ̨¾Í³£Í¨¹ýÐû²¼Ãâ·ÑйÃÜÐÅÏ¢ÎüÒý¹Ø×¢¡¢½¨ÉèÐÅÓþ»òÉù³ÆÖ´ÐÐÊг¡¹æÔò¡£¡£¡£2023Äê3Ô£¬£¬£¬Æäй¶200ÍòÕÅÐÅÓÿ¨ÏêϸÐÅÏ¢£¬£¬£¬º¸Ç³Ö¿¨ÈËÈ«Ãû¡¢¿¨ºÅ¡¢ÒøÐÐÏêϸÐÅÏ¢µÈ£»£»£»2023Äê12Ô£¬£¬£¬ÓÖÐû²¼³¬160ÍòÌõÐÅÓÿ¨¼Í¼£¬£¬£¬¾ùÒÔ´¿Îı¾ÃûÌô洢¡£¡£¡£´Ë´Îй¶ʱ£¬£¬£¬BidenCashÔÚ¶íÂÞ˹ÂÛ̳Ðû²¼Ìû×ӳƣ¬£¬£¬Êý¾ÝÊÇÒÑÍùÒ»¸öÔ´Ӳî±ðÂÛ̳ºÍTelegramȺ×éץȡµÄ£¬£¬£¬Ä¿µÄÊÇչʾÆä¡°·´¹ûÕæÏµÍ³¡±£¬£¬£¬¸ÃϵͳּÔÚʶ±ð²¢ÒƳýÊг¡ÉÏÒÑÁ÷ͨµÄ¿¨Æ¬¡£¡£¡£Èô·¢Ã÷Âô¼Ò³öÊÛÒÑÔÚÁ÷ͨµÄ¿¨Æ¬£¬£¬£¬Ïà¹ØÁÐ±í½«±»Ï¼ܣ¬£¬£¬Âô¼ÒÒ²½«ÊÜËæ´¦·Ö£¬£¬£¬Õâ¼ÈÊÇÒ»ÖÖÖÊÁ¿¿ØÖÆÊµÑ飬£¬£¬Ò²ÊÇÒ»ÖÖÍÆ¹ãÊֶΣ¬£¬£¬Í¨¹ýÃâ·ÑÌṩº£Á¿Êý¾Ý¼¯£¬£¬£¬Ìá¸ßÔÚ¿¨Æ¬³ÖÓÐÕßÖÐµÄÆØ¹â¶È£¬£¬£¬ÎüÒýÁ÷Á¿»Øµ½ÍøÕ¾¡£¡£¡£
https://hackread.com/bidencash-market-leak-credit-cards-russian-forum/
6. InterlockÀÕË÷Èí¼þͨ¹ýÕýµ±ÍøÕ¾Èö²¥¶ñÒâä¯ÀÀÆ÷¸üÐÂ
4ÔÂ16ÈÕ£¬£¬£¬ÍøÂçÇ徲ר¼Ò·¢Ã÷ÁËÒ»ÖÖ×Ô2024Äê9ÔÂÆðÇÄÈ»À©´ó»î¶¯¹æÄ£µÄÖØ´óÀÕË÷Èí¼þÍþвInterlock¡£¡£¡£¸Ã¶ñÒâÈí¼þ½ÓÄɶà½×¶Î¹¥»÷Á´£¬£¬£¬ÏÈÈëÇÖÕýµ±ÍøÕ¾£¬£¬£¬ÒÔÐéαä¯ÀÀÆ÷¸üÐÂÓÕÆºÁÎÞ½äÐĵÄÓû§¡£¡£¡£×ÔInterlock·ºÆðÒÔÀ´£¬£¬£¬ÆäÕ½ÂÔ±¬·¢ÖØ´óת±ä¡£¡£¡£ÔËÓªÉÌˢй¤¾ß¼¯£¬£¬£¬½ÓÄÉClickFixµÈÐÂÊÖÒÕ°²ÅÅÀÕË÷Èí¼þ¸ºÔØ£¬£¬£¬²¢½ÓÄÉLummaStealerºÍBerserkStealerµÈ¹¤¾ßÔöÇ¿ÄÜÁ¦¡£¡£¡£×î³õµÄѬȾǰÑÔÒÀÀµÉç»á¹¤³Ìѧ£¬£¬£¬Ðéαä¯ÀÀÆ÷¸üгÌÐòÊÇÈ«ÐÄÖÆ×÷µÄPyInstallerÎļþ£¬£¬£¬Æô¶¯Ê±ÏÂÔØ²¢Ö´ÐÐÏÖʵÕýµ±×°ÖóÌÐò£¬£¬£¬Í¬Ê±ÔËÐÐǶÈëµÄPowerShellºóÞ籾¡£¡£¡£¸Ã¾ç±¾×÷Ϊ¹¥»÷µÚÒ»½×¶Î£¬£¬£¬ÒÔÎÞÏÞÑ»·ÔËÐУ¬£¬£¬ÍøÂç´ó×ÚϵͳÐÅÏ¢£¬£¬£¬¾¼ÓÃÜ¡¢Ñ¹Ëõºó´«Êäµ½C2ЧÀÍÆ÷¡£¡£¡£ºóÐøµü´úʵÏÖ³¤ÆÚÐÔ»úÖÆ£¬£¬£¬¿ÉÖ´ÐÐí§ÒâWindowsÏÂÁî¡£¡£¡£C2»ù´¡Éèʩͨ¹ýÈ«ÐÄÂþÑÜչʾÆäµ¯ÐÔ¡£¡£¡£2025ÄêÍ·£¬£¬£¬ÔËÓªÉÌÕ½ÂÔÀ©´ó£¬£¬£¬´Óä¯ÀÀÆ÷¸üÐÂÓÕ¶üתÏòÇå¾²Èí¼þ¸üгÌÐò£¬£¬£¬Î±×°³ÉFortiClientµÈÇå¾²²úÆ·¡£¡£¡£´Ë´Î¸Ä±àÅú×¢¸Ã×éÖ¯ÕýÔÚһֱˢÐÂÊÖÒÕ£¬£¬£¬ÒÔ±ãÔÚÐí¶àÇå¾²Ðж¯µÄ¼àÊÓÏÂÔË×÷¡£¡£¡£
https://cybersecuritynews.com/interlock-ransomware-employs-multi-stage-attack/


¾©¹«Íø°²±¸11010802024551ºÅ