¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶

Ðû²¼Ê±¼ä 2026-03-13

1. ¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶


3ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬£¬¼ÓÄôó×î´óʳÎïÒ©Æ·ÁãÊÛÉÌLoblaw Companies Limited£¨¼ò³ÆLoblaw£©¿ËÈÕÔâÓöÖØ´óÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ðû²¼£¬£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÈëÇÖÆä²¿·ÖITÍøÂç²¢»ñÈ¡Á˿ͻ§µÄ»ù×Ô¼º·ÝÐÅÏ¢£¨PII£©£¬£¬£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØµã¡£¡£¡£¡£¡£¡£Loblaw×÷Ϊ¼ÓÄôóÁãÊÛÒµ¾ÞÍ·£¬£¬£¬ £¬£¬£¬£¬ÔÚÌìÏÂÓµÓÐ2500¼ÒÃŵ꣬£¬£¬ £¬£¬£¬£¬º­¸ÇÌØÐíı»®³¬ÊС¢Ò©µê¡¢ÒøÐÐ×ÔÖúЧÀÍͤºÍ´ò°çµêµÈҵ̬£¬£¬£¬ £¬£¬£¬£¬²¢ÍýÏëÔÚ2026ÄêÐÂÔö70¼ÒÃŵ꣬£¬£¬ £¬£¬£¬£¬×÷ΪÆäµ½2030ÄêͶ×Ê100ÒÚÃÀÔªÎåÄêÍýÏëµÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¹«Ë¾ÏÖÓµÓÐ22ÍòÃûÔ±¹¤£¬£¬£¬ £¬£¬£¬£¬ÄêÊÕÈë¸ß´ï450ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚ±¾ÖÜÔçЩʱ¼ä£¬£¬£¬ £¬£¬£¬£¬Loblaw¼ì²âµ½ÆäITÍøÂçÖÐÒ»¸ö·ÇÒªº¦¹Ø±ÕÇøÓò±£´æ¿ÉÒɻ£¬£¬£¬ £¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏ£¬£¬£¬ £¬£¬£¬£¬·¸·¨µÚÈý·½ÒÑ»á¼ûÁ˲¿·Ö¿Í»§µÄ»ù±¾ÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹Üй¶Êý¾Ý²»°üÀ¨ÐÅÓÿ¨ÏêÇé¡¢¿µ½¡ÐÅÏ¢»òÕË»§ÃÜÂëµÈÃô¸Ð²ÆÎñÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬µ«LoblawÈÔ³öÓÚÉóÉ÷˼Á¿£¬£¬£¬ £¬£¬£¬£¬×Ô¶¯×¢ÏúÁËËùÓпͻ§µÄÕË»§£¬£¬£¬ £¬£¬£¬£¬ÒªÇó»á¼ûÊý×ÖЧÀ͵ÄÓû§ÖØÐµÇ¼²¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬ £¬£¬£¬£¬Æä½ðÈÚЧÀÍÆ·ÅÆPC FinancialδÊÜ´Ë´ÎÊÂÎñÓ°Ïì¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/


2. Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÔâAiLockÀÕË÷Èí¼þ¹¥»÷


3ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬£¬Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÕýÊÓ²ìÒ»ÆðDZÔÚÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬ÒòÓÉÊÇAiLockÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÐ¹Â¶Æ½Ì¨½«ÆäÁÐΪÊܺ¦Õß¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬ £¬£¬£¬£¬¸ÃÍÅ»ïÇÔÈ¡ÁËЭ»á129GBÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÎļþ¡£¡£¡£¡£¡£¡£Ð­»áÒÑÁªºÏÄÚ²¿ÍŶÓÓëÍⲿר¼ÒÕö¿ªÊӲ죬£¬£¬ £¬£¬£¬£¬²¢Ç¿µ÷¡°Êý¾ÝÇå¾²ÊÇÄ¿½ñÖ÷ҪʹÃü¡±£¬£¬£¬ £¬£¬£¬£¬ÏÖÔÚÕýÓëÖ´·¨²¿·ÖÏàÖúÒÔÀåÇåÊÂÎñÕæÏà¡£¡£¡£¡£¡£¡£Ð­»á½²»°ÈËÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬ÒÑ×¢ÖØµ½ÍþвÐÐΪÕßÐû²¼µÄ¡°ÈÏÁ족Ìû×Ó£¬£¬£¬ £¬£¬£¬£¬µ«ÒòÊÓ²ìÈÔÔÚ¾ÙÐУ¬£¬£¬ £¬£¬£¬£¬ÔÝÎÞ·¨Åû¶Ïêϸϸ½Ú¡£¡£¡£¡£¡£¡£×÷ΪӢ¹úÇú¹÷ÇòÔ˶¯µÄ½¹µãÖÎÀí»ú¹¹£¬£¬£¬ £¬£¬£¬£¬Ð­»áÁýÕÖÌìÏÂ800Óà¼Ò¾ãÀÖ²¿¡¢15Íò×¢²áÇòÔ±¼°1.5ÍòÃû½ÌÁ·¡¢²ÃÅк͹ÙÔ±£¬£¬£¬ £¬£¬£¬£¬ÔËÓª²ã¼¶´Óϲ㵽¾«Ó¢¹ú¼Ò¶Ó¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄÜÓ°Ïì»áÔ±Òþ˽Êý¾Ý£¬£¬£¬ £¬£¬£¬£¬Ð­»áºôÓõÇòԱСÐÄÒì³£ÕË»§»î¶¯¼°ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÉóÉ÷´¦Öóͷ£Î´ÂÄÀúÖ¤µÄͨѶ¡£¡£¡£¡£¡£¡£Ö»¹ÜЭ»áÉÐδ֤ʵÊý¾ÝÏÖʵй¶£¬£¬£¬ £¬£¬£¬£¬µ«ÒѽÓÄÉÔ¤·À²½·¥£¬£¬£¬ £¬£¬£¬£¬°üÀ¨×Ô¶¯×¢ÏúËùÓÐÊý×ÖЧÀÍÕË»§²¢ÒªÇóÓû§ÖØÐµÇ¼¡¢½¨Òé¸ü¸ÄÃÜÂë¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/


3. ÐÂÐÍAIÌìÉú¶ñÒâÈí¼þSlopolyÇ¿»¯ÀÕË÷¹¥»÷Á´


3ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬£¬IBM X-ForceÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪSlopolyµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬£¬¼«¿ÉÄÜÓÉÌìÉúʽÈ˹¤ÖÇÄܹ¤¾ß½¨É裬£¬£¬ £¬£¬£¬£¬ÆäÊÖÒÕÌØÕ÷°üÀ¨´ó×Ú´úÂë×¢ÊÍ¡¢½á¹¹»¯ÈÕÖ¾¼Í¼¡¢¹ýʧ´¦Öóͷ£¼°ÇåÎú±äÁ¿ÃüÃû£¬£¬£¬ £¬£¬£¬£¬ÕâЩÔÚÈËÀà±àд¶ñÒâÈí¼þÖÐÓÐÊý¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ×÷ΪPowerShell¾ç±¾ºóÃÅ£¬£¬£¬ £¬£¬£¬£¬ÔÚInterlockÀÕË÷Èí¼þ¹¥»÷ÖÐÊÎÑÝC2¿Í»§¶Ë½ÇÉ«£¬£¬£¬ £¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾЧÀÍÆ÷DZÔÚ³¬Ò»ÖÜ£¬£¬£¬ £¬£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢Î¬³Ö³¤ÆÚ»á¼û¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³ÌȦÌ×£¬£¬£¬ £¬£¬£¬£¬ºóÆÚ°²ÅÅSlopoly¡£¡£¡£¡£¡£¡£IBMÆÊÎöÖ¸³ö£¬£¬£¬ £¬£¬£¬£¬¾ç±¾Ëä×Ô³Æ"¶à̬C2³¤ÆÚ»¯¿Í»§¶Ë"£¬£¬£¬ £¬£¬£¬£¬µ«ÏÖʵȱ·¦Ö´ÐÐÆÚ´úÂë×ÔÐÞ¸ÄÄÜÁ¦£¬£¬£¬ £¬£¬£¬£¬½öͨ¹ýÌìÉúËæ»úÉèÖÃÖµºÍº¯ÊýÃû³ÆÊµÏÖα¶à̬¡£¡£¡£¡£¡£¡£Æä°²ÅÅÓÚC:\ProgramData\Microsoft\Windows\Runtime\£¬£¬£¬ £¬£¬£¬£¬½¹µã¹¦Ð§°üÀ¨£ºÃ¿30Ãë·¢ËÍÐÄÌøÐűêÖÁ/api/commands£¬£¬£¬ £¬£¬£¬£¬Ã¿50ÃëÂÖѯÏÂÁ£¬£¬ £¬£¬£¬£¬Í¨¹ýcmd.exeÖ´ÐÐÖ¸Áî²¢»Ø´«Ð§¹û£¬£¬£¬ £¬£¬£¬£¬Î¬»¤persistence.logÈÕÖ¾£¬£¬£¬ £¬£¬£¬£¬Í¨¹ý"ÔËÐÐʱÊðÀí"ÍýÏëʹÃü½¨É賤ÆÚÐÔ¡£¡£¡£¡£¡£¡£Ö§³ÖÏÂÁ¸ÇÏÂÔØÖ´ÐÐEXE/DLL/JSÓÐÓÃÔØºÉ¡¢ÔËÐÐshellÏÂÁî¡¢µ÷½âÐűê¾àÀë¡¢×Ô¸üм°Í˳öÀú³Ì¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/


4. ÃÀÅ·´Ý»ÙÒÀÀµAVReconµÄSocksEscort·¸·¨ÊðÀíÍøÂç


3ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬£¬ÃÀ¹ú˾·¨²¿ÁªºÏÅ·ÖÞ¶à¹úÖ´·¨»ú¹¹¼°Ë½ÈËÏàÖúͬ°éBlack Lotus Labs£¬£¬£¬ £¬£¬£¬£¬ÀֳɯÆËðÁËÔËӪʮÓàÄêµÄSocksEscortÍøÂç·¸·¨ÊðÀíÍøÂç¡£¡£¡£¡£¡£¡£¸ÃÍøÂçÍêÈ«ÒÀÀµAVRecon Linux¶ñÒâÈí¼þÈëÇÖ±ßÑØ×°±¸£¬£¬£¬ £¬£¬£¬£¬Í¨¹ý¡°Çå½à¡±IPµØµãÎªÍøÂç·¸·¨·Ö×ÓÌṩÁ÷Á¿Â·ÓÉЧÀÍ£¬£¬£¬ £¬£¬£¬£¬¿ÉÈÆ¹ý¶àÖØºÚÃûµ¥£¬£¬£¬ £¬£¬£¬£¬Ôø±»ÓÃÓÚÇÔȡŦԼÓû§100ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡¢Ôì³É±öϦ·¨ÄáÑÇÖÆÔìÆóÒµ70ÍòÃÀԪڲƭËðʧ¼°ÏÖÒÛ/ÍËÒÛÎäÊ¿10ÍòÃÀÔªÐÅÓÿ¨Ëðʧ¡£¡£¡£¡£¡£¡£¾ÝBlack Lotus LabsÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬SocksEscort×Ô2023Äê±»¼Í¼ÒÔÀ´£¬£¬£¬ £¬£¬£¬£¬ÒÑÍù¼¸ÄêÆ½¾ùÿÖÜѬȾ2Íǫ̀װ±¸£¬£¬£¬ £¬£¬£¬£¬ÀÛ¼ÆÌṩԼ36.9Íò¸öIPµØµã»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£×èÖ¹2026Äê2Ô£¬£¬£¬ £¬£¬£¬£¬ÆäÓ¦ÓóÌÐòÈÔÁгöÔ¼8000̨ÊÜѬȾ·ÓÉÆ÷¡£¡£¡£¡£¡£¡£Ðж¯ÖУ¬£¬£¬ £¬£¬£¬£¬Ö´·¨»ú¹¹²é·âÁË7¹ú34¸öÓòÃûºÍ23̨ЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬£¬ÃÀ¹ú¶³½á350ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬£¬£¬ £¬£¬£¬£¬ËùÓÐÊÜѬȾװ±¸ÒÑÓëSocksEscortЧÀͶϿªÅþÁ¬¡£¡£¡£¡£¡£¡£AVRecon¶ñÒâÈí¼þ×Ô2021Äê5ÔÂÆð»îÔ¾£¬£¬£¬ £¬£¬£¬£¬2023ÄêÖÐÆÚÒÑѬȾ³¬7Íǫ̀»ùÓÚLinuxµÄSOHO·ÓÉÆ÷£¬£¬£¬ £¬£¬£¬£¬½öÓÃÓÚÀ©´óSocksEscort¹æÄ£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/


5. ¼ÓÄôóTelus DigitalÔâShinyHuntersÇÔÈ¡1PBÊý¾Ý


3ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬£¬¼ÓÄôóÓªÒµÁ÷³ÌÍâ°ü¾ÞÍ·Telus Digital¿ËÈÕ֤ʵÔâÓöÖØ´óÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßShinyHuntersÉù³ÆÔÚÒ»Á¬ÊýÔµĹ¥»÷ÖÐÇÔÈ¡½ü1PBÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬Éæ¼°TelusµÄBPOÔËÓª¼°ÏûºÄÕßµçÐŲ¿·Öͨ»°¼Í¼¡£¡£¡£¡£¡£¡£¾ÝShinyHuntersÅû¶£¬£¬£¬ £¬£¬£¬£¬ÆäʹÓÃSalesloft DriftÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄGoogle Cloud Platformƾ֤ÈëÇÖTelus£¬£¬£¬ £¬£¬£¬£¬²¢Í¨¹ýÍøÂçÇå¾²¹¤¾ßtrufflehogËÑË÷¸ü¶àƾ֤£¬£¬£¬ £¬£¬£¬£¬½ø¶ø»á¼û°üÀ¨BigQueryʵÀýÔÚÄڵĶà¸öϵͳ¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ýº­¸Ç¿Í»§Ö§³Ö¹¤µ¥¡¢Í¨»°Â¼Òô¡¢Ô´´úÂë¡¢²ÆÎñÐÅÏ¢¡¢FBIÅä¾°ÊӲ졢SalesforceÊý¾Ý¼°ÓªÏú»î¶¯ÔªÊý¾ÝµÈ£¬£¬£¬ £¬£¬£¬£¬Éæ¼°28¼Ò×ÅÃû¹«Ë¾£¬£¬£¬ £¬£¬£¬£¬Êý¾ÝÀàÐÍÒò¹«Ë¾¶øÒ죬£¬£¬ £¬£¬£¬£¬Ì»Â¶Á˿ͻ§Ö§³Ö¡¢ºô½ÐÖÐÐÄÍâ°ü¡¢AI¹¤¾ß¡¢Ú²Æ­¼ì²âµÈ¶àÓªÒµ¹¦Ð§¡£¡£¡£¡£¡£¡£ShinyHunters×Ô½ñÄê2ÔÂÆðÏòTelusÀÕË÷6500ÍòÃÀÔª£¬£¬£¬ £¬£¬£¬£¬µ«Î´»ñ»ØÓ¦¡£¡£¡£¡£¡£¡£Telus×òÈÕÕýʽȷÈÏϵͳÔâδ¾­ÊÚȨ»á¼û£¬£¬£¬ £¬£¬£¬£¬²¢ÌåÏÖÒѽÓÄɲ½·¥Ó¦¶ÔÈëÇÖ¡¢±£» £»£»£»£»¤ÏµÍ³£¬£¬£¬ £¬£¬£¬£¬Ô¼ÇëÍøÂçȡ֤ר¼ÒЭÖúÊӲ죬£¬£¬ £¬£¬£¬£¬ÓëÖ´·¨²¿·ÖÏàÖú£¬£¬£¬ £¬£¬£¬£¬Í¬Ê±Ç¿µ÷ÓªÒµÔËÓªÕý³££¬£¬£¬ £¬£¬£¬£¬ÎÞÖ¤¾ÝÏÔʾ¿Í»§ÍøÂçЧÀÍÊÜÓ°Ï죬£¬£¬ £¬£¬£¬£¬½«×ÃÇé֪ͨÊÜÓ°Ïì¿Í»§¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/


6. °¢¶û°ÍÄáÑÇÒé»áÔâÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÒÁ·½×éÖ¯³ÆÅê»÷


3ÔÂ11ÈÕ£¬£¬£¬ £¬£¬£¬£¬°¢¶û°ÍÄáÑÇÒé»áÓÚÖܶþÍí¼äÔâÓö¡°¸ß¼¶¡±ÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Ä¿µÄÃ÷È·Ö¸Ïòɾ³ýÊý¾Ý²¢¹¥Ïݶà¸öÄÚ²¿ÏµÍ³¡£¡£¡£¡£¡£¡£¾ÝÒé»áÉùÃ÷£¬£¬£¬ £¬£¬£¬£¬Æä½¹µãϵͳÓë¹Ù·½ÍøÕ¾ÈÔ¼á³ÖÕý³£ÔËÐУ¬£¬£¬ £¬£¬£¬£¬µ«ÐÐÕþ²¿·ÖʹÓõÄÄÚ²¿µçÓÊЧÀÍÒѱ»ÔÝʱÔÝÍ££¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÊÕ·¢Ë«ÏòͨѶÖÐÖ¹£¬£¬£¬ £¬£¬£¬£¬ÊÂÇéÖ°Ô±ÓëÒéÔ±ÔÚ¹¥»÷±¬·¢ºóÊýСʱÄÚÎÞ·¨»á¼ûµçÄÔ¼°µçÓÊϵͳ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬ £¬£¬£¬£¬ÃûΪ¡°Homeland Justice¡±µÄºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬ £¬£¬£¬£¬²¢ÔÚÆäTelegramƵµÀÐû²¼Á˾ݳÆÐ¹Â¶µÄÄÚ²¿Í¨Ñ¶Îļþ½ØÍ¼¡£¡£¡£¡£¡£¡£Ö»¹Ü°¢¶û°ÍÄáÑǹٷ½ÉÐδ¹ûÕæÖ¤Êµ¸Ã×é֯˵·¨£¬£¬£¬ £¬£¬£¬£¬µ«Çå¾²Ñо¿Ö°Ô±ÓëÎ÷·½¹ÙÔ±´ËǰÒѽ«¡°Homeland Justice¡±ÓëÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¹ØÁª¡£¡£¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬ £¬£¬£¬£¬¸Ã×éÖ¯¶à´ÎÐû³Æ¶Ô°¢¶û°ÍÄáÑǾ³ÄÚһϵÁÐÍøÂç¹¥»÷ÈÏÕæ£¬£¬£¬ £¬£¬£¬£¬Ä¿µÄº­¸ÇÒé»á¡¢¹ú¼Òº½¿Õ¹«Ë¾¡¢µçÐÅÆóÒµ¼°¹ú¼Òͳ¼Æ¾Ö¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÅä¾°Óë°¢¶û°ÍÄáÑÇÇå¾²ÐÎÊÆÏ¸ÃÜÏà¹Ø¡£¡£¡£¡£¡£¡£¡°Homeland Justice¡±ÔÚ¹¥»÷ÉùÃ÷ÖÐÃ÷È·ÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬´Ë´ÎÐж¯ÊǶ԰¢¶û°ÍÄáÑÇÖ§³ÖÒÁÀÊ×èµ²ÅÉ×éÖ¯¡°ÒÁÀÊÈËÃñÊ¥Õ½Õß×éÖ¯¡±£¨MEK£©µÄÅê»÷¡£¡£¡£¡£¡£¡£


https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament