¿ÆÌصÏÍߺ½¿ÕÔâINCÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶

Ðû²¼Ê±¼ä 2026-02-27

1. ¿ÆÌصÏÍߺ½¿ÕÔâINCÀÕË÷Èí¼þ¹¥»÷ÖÂÊý¾Ýй¶


2ÔÂ24ÈÕ £¬£¬Ð§ÀÍÓÚÎ÷·Ç¹ú¼Ò¿ÆÌصÏÍßµÄÖ÷Òªº½¿Õ¹«Ë¾¿ÆÌصÏÍߺ½¿Õ¹«Ë¾ÔâÓöÍøÂç¹¥»÷ £¬£¬±»ÆÈÆô¶¯ÓªÒµÒ»Á¬ÐÔÍýÏë¡£¡£¡£¡£¡£¡£¾Ý¹«Ë¾ÉùÃ÷֤ʵ £¬£¬ºÚ¿ÍÓÚ2ÔÂ8ÈÕÈëÇÖÆäϵͳ £¬£¬µ¼ÖÂÐÅϢϵͳ²¿·ÖÄÚÈÝÊÜÓ°Ïì £¬£¬ÊÖÒÕÍŶӽôÆÈЭÖúº½°à¼°ÆäËûÔËӪά»¤¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖÐ £¬£¬INCÀÕË÷Èí¼þÍÅ»ïÉù³ÆÇÔÈ¡ÁË208GBÊý¾Ý £¬£¬É漰ЧÀÍÌṩÉÌ¡¢Âÿͼ°Ô±¹¤Ãô¸ÐÐÅÏ¢ £¬£¬²¢ÍþвÔÚ2ÔÂ24ÈÕǰ֧¸¶Î´¹ûÕæÊê½ð £¬£¬²»È»½«Ð¹Â¶Êý¾Ý¡£¡£¡£¡£¡£¡£¿£¿ÆÌصÏÍߺ½¿Õ¹«Ë¾ÌåÏÖ £¬£¬Òѽ«ÊÂÎñ֪ͨ·¨¹ú¹ú¼ÒÐÅϢϵͳÇå¾²¾Ö£¨ANSSI£©ºÍ¿ÆÌصÏÍßµçÐÅî¿Ïµ¾Ö£¨ARTCI£© £¬£¬²¢ÕÙ¼¯¿ÆÌصÏÍßÅÌËã»úÓ¦¼±ÏìӦС×飨CI-CERT£©¼°¹ú¼Êר¼ÒÕö¿ªÊÓ²ì £¬£¬ÒÔÈ·¶¨Ãü¾Ýй¶¹æÄ£¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷ £¬£¬Ö»¹ÜϵͳÊÜ´´ £¬£¬µ«º½°àÍýÏë¼á³ÖÎÈ¹Ì £¬£¬½«¼ÌÐøÑÏ¿á×ñÊØ¹ú¼ÊÇå¾²±ê×¼ÔËÐÐ £¬£¬²¢¾¡Ò»ÇÐÆð¾¢¼õÇáÊÂÎñЧ¹û¡£¡£¡£¡£¡£¡£


https://therecord.media/air-cote-divoire-confirms-cyberattack


2. OptimizelyÔâÓïÒôÍøÂç´¹ÂÚ¹¥»÷ÖÂÊý¾Ýй¶


2ÔÂ23ÈÕ £¬£¬×ܲ¿Î»ÓÚŦԼµÄ¹ã¸æÊÖÒÕ¹«Ë¾Optimizely¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ £¬£¬ÍþвÐÐΪÕßͨ¹ýÖØ´óµÄÓïÒôÍøÂç´¹ÂÚ£¨vishing£©¹¥»÷ÈëÇÖÆä²¿·Öϵͳ £¬£¬ÇÔÈ¡ÁË¡°»ù±¾ÓªÒµÁªÏµÐÅÏ¢¡±¡£¡£¡£¡£¡£¡£OptimizelyÔÚÈ«ÇòÓµÓÐ21¸öЧÀÍ´¦¡¢½ü1500ÃûÔ±¹¤ £¬£¬Ð§ÀÍÁè¼Ý10,000¼ÒÆóÒµ¿Í»§ £¬£¬°üÀ¨H&M¡¢PayPal¡¢Zoom¡¢·áÌï¡¢ÎÖ´ï·á¡¢¿ÇÅÆ¡¢SalesforceºÍÄͿ˵È×ÅÃûÆ·ÅÆ¡£¡£¡£¡£¡£¡£¾ÝOptimizely·¢Ë͸øÊÜÓ°Ïì¿Í»§µÄÎ¥¹æÍ¨ÖªÐÅÏÔʾ £¬£¬2ÔÂ11ÈÕ £¬£¬¹¥»÷ÕßÁªÏµ¸Ã¹«Ë¾²¢Éù³ÆÒÑ»ñµÃϵͳ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¹«Ë¾ÉùÃ÷Ç¿µ÷ £¬£¬¹¥»÷ÕßËäÀÖ³ÉÈëÇÖ²¿·ÖÄÚ²¿ÓªÒµÏµÍ³¡¢CRM¼Í¼¼°ºǫ́ÔËÓªÎĵµ £¬£¬µ«Î´ÄÜÌáÉýȨÏÞ¡¢×°ÖöñÒâÈí¼þ»ò½¨ÉèºóÃÅ £¬£¬ÇÒÎÞÖ¤¾ÝÅú×¢Æä»á¼ûÁËÃô¸Ð¿Í»§Êý¾Ý»òСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£OptimizelyÌåÏÖ £¬£¬ÓªÒµÔËӪδÊÜ×ÌÈÅ £¬£¬µ«ÖÒÑÔ¿Í»§Ð¡ÐÄʹÓñ»µÁÊý¾ÝÌᳫµÄ½øÒ»²½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ±»Ö¸ÓëShinyHuntersÀÕË÷×éÖ¯±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/


3. ³¯ÏÊLazarusÓÃMedusa¹¥»÷ÃÀÒ½ÁƼ°·ÇÓªÀû»ú¹¹


2ÔÂ24ÈÕ £¬£¬SymantecÓëCarbon BlackÍþвÁÔÈËÍŶÓ×îб¨¸æÏÔʾ £¬£¬Ó볯ÏʹØÁªµÄLazarus Group£¨ÓÖÃûDiamond Sleet¡¢Pompilus£©ÔÚÖж«Ò»¼Òδǩ×Ö»ú¹¹¹¥»÷Öа²ÅÅÁËMedusaÀÕË÷Èí¼þ £¬£¬²¢ÊÔͼ¹¥»÷ÃÀ¹úÒ½ÁÆ»ú¹¹Î´Ëì¡£¡£¡£¡£¡£¡£MedusaÓÉÍøÂç·¸·¨×éÖ¯SpearwingÓÚ2023ÄêÍÆ³ö £¬£¬×÷ΪÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÏîÄ¿ £¬£¬ÒÑÐû³ÆÊµÑ鳬366Æð¹¥»÷¡£¡£¡£¡£¡£¡£ÆÊÎöMedusaÊý¾Ýй¶վµã·¢Ã÷ £¬£¬2025Äê11Ô³õÒÔÀ´ £¬£¬ÃÀ¹úËļÒÒ½ÁƼ°·ÇÓªÀû»ú¹¹ÔâÏ® £¬£¬°üÀ¨ÐÄÀí¿µ½¡ÁìÓò·ÇÓªÀû»ú¹¹ºÍ×Ô±ÕÖ¢¶ùͯ½ÌÓý»ú¹¹ £¬£¬Æ½¾ùÀÕË÷½ð¶î´ï26ÍòÃÀÔª¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±ê¼Ç×ÅLazarusÕ½Êõת±ä¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÒÑÍù³£Ê¹Óö¨ÖÆÀÕË÷Èí¼þ£¨ÈçSHATTEREDGLASS¡¢Maui¡¢H0lyGh0st£© £¬£¬µ«2024Äê10ÔÂÆðתÏòÏֳɼÓÃܹ¤¾ß £¬£¬ÈçMedusaºÍQilin¡£¡£¡£¡£¡£¡£¹¥»÷ÖÐ £¬£¬LazarusʹÓÃÁ˶àÖÖ¹¤¾ß£º¶¨ÖÆÊðÀí¹¤¾ßRP_Proxy¡¢Æ¾Ö¤ÇÔÈ¡³ÌÐòMimikatz¡¢×¨ÓúóÃÅComebacker¡¢ÐÅÏ¢ÇÔÈ¡¹¤¾ßInfoHook¡¢Ô¶³Ì»á¼ûľÂíBLINDINGCAN£¨ÓÖÃûAIRDRY¡¢ZetaNile£©¼°ChromeÃÜÂëÌáÈ¡¹¤¾ßChromeStealer¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2026/02/lazarus-group-uses-medusa-ransomware-in.html


4. CarGurusÔâShinyHuntersй¶1200ÍòÕË»§Êý¾Ý


2ÔÂ25ÈÕ £¬£¬ÃÀ¹úÊý×ÖÆû³µÉúÒâÆ½Ì¨CarGurusÔâÓö´ó¹æÄ£Êý¾Ýй¶ £¬£¬³¬1240ÍòÕË»§Ãô¸ÐÐÅÏ¢±»ShinyHunters×é֯й¶¡£¡£¡£¡£¡£¡£¸Ãƽ̨×÷ΪÏßÉϹº³µÁìÓò½¹µã¼ÓÈëÕß £¬£¬Ã¿ÔÂÎüÒýÔ¼4000Íò·Ã¿Í £¬£¬ÓªÒµÁýÕÖÃÀ¹ú¡¢¼ÓÄôóºÍÓ¢¹ú £¬£¬Ìṩ³µÁ¾¶¨¼Û¡¢¾­ÏúÉÌÆÀ¼Û¼°ÀúÊ·¼Í¼µÈ¹¤¾ß¡£¡£¡£¡£¡£¡£´Ë´Îй¶ԴÓÚÀÕË÷δËì £¬£¬Ð¹Â¶Êý¾Ý°üÀ¨µç×ÓÓʼþ¡¢ÕË»§ID¡¢½ðÈÚÉêÇëÏêÇé¡¢¾­ÏúÉÌÐÅÏ¢¡¢ÐÕÃû¡¢µç»°ºÅÂë¡¢µØµã¡¢IPµØµã¼°Æû³µ½ðÈÚÉêÇëЧ¹û £¬£¬ÎļþѹËõºó´ï6.1GB £¬£¬Òѱ»Êý¾Ýй¶¼à¿ØÐ§ÀÍHaveIBeenPwnedÊÕ¼¡£¡£¡£¡£¡£¡£Ð¹Â¶ÊÂÎñ´øÀ´¶àÖØÎ£º¦£ºÐÕÃû¡¢ÓÊÏä¡¢µç»°µÈСÎÒ˽¼ÒÐÅÏ¢¿É±»ÓÃÓڸ߷ÂÕæÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£»£» £»£»£»½ðÈÚÉêÇëÊý¾Ýй¶ΪÉí·Ý͵ÇԺͽðÈÚÕ©Æ­Ìṩ±ãµ±£»£» £»£»£»ÕË»§ÐÅϢй¶¼Ó¾çÕË»§µÁÓÃΣº¦ £¬£¬ÓÈÆäÊÇÃÜÂ븴Óó¡¾°£»£» £»£»£»ÎïÀíµØµãºÍIPÊý¾Ýй¶Òý·¢Òþ˽µ£ÐÄ £¬£¬¿ÉÄÜÕÐÖ¶¨ÏòÓªÏú¡¢¸ú×ÙɧÈŵȶñÒâÐÐΪ¡£¡£¡£¡£¡£¡£ShinyHunters½üÆÚƵÈÔÕë¶Ô´óÐÍÆóÒµ·¢¶¯¹¥»÷ £¬£¬ÍÅ»ïÖ÷ҪʹÓÃÉç»á¹¤³ÌÊÖ¶Î £¬£¬ÌØÊâÊÇÓïÒô´¹ÂÚ£¨vishing£© £¬£¬ÇÔȡƾ֤²¢»á¼ûSalesforce¡¢Okta¡¢Microsoft 365µÈSaaSƽ̨¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/188491/cyber-crime/shinyhunters-cyberattack-on-cargurus-impacts-12-4-million-users.html


5. ÓÀÀû¶È¼Ù´åÔâShinyHuntersÊý¾Ýй¶


2ÔÂ25ÈÕ £¬£¬ÓÀÀû¶È¼Ù´å֤ʵÆäЧÀÍÆ÷ÔâÍøÂç·¸·¨ÍÅ»ïShinyHunters¹¥»÷ £¬£¬µ¼ÖÂÔ±¹¤Ãô¸ÐÊý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£ºÚ¿ÍÉù³ÆÒÑɾ³ýÊý¾Ý £¬£¬µ«ÓÀÀûÎÞ·¨ÑéÖ¤Õâһ˵·¨ £¬£¬Òý·¢¶ÔÀÕË÷̸Åм°Êê½ðÖ§¸¶µÄÍÆ²â¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖÐ £¬£¬ShinyHuntersÓÚ2ÔÂ20ÈÕÐû³Æ¹¥»÷ £¬£¬²¢Åû¶ʹÓÃOracle PeopleSoftÎó²î¼°Ô±¹¤Æ¾Ö¤ÔÚ2025Äê9ÔÂÈëÇÖϵͳ £¬£¬Ð¹Â¶Êý¾Ý°üÀ¨Ô±¹¤È«Ãû¡¢ÓÊÏä¡¢µç»°¡¢Ö°Î»¡¢Ð½Ë®¡¢ÈëÖ°ÈÕÆÚ¡¢³öÉúÈÕÆÚµÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£ÓÀÀû¶È¼Ù´å½²»°ÈËÌåÏÖ £¬£¬ÊÂÎñ±¬·¢ºóÁ¬Ã¦Æô¶¯ÏìӦЭÒé £¬£¬ÁªºÏÍâ²¿ÍøÂçÇ徲ר¼ÒÕö¿ªÊÓ²ì £¬£¬²¢Ç¿µ÷¡°Êý¾ÝÇå¾²ÊÇÖ÷ҪʹÃü¡±¡£¡£¡£¡£¡£¡£¹«Ë¾ÏòÔ±¹¤ÌṩÃâ·ÑÐÅÓÃ¼à¿Ø¼°Éí·Ý±£»£» £»£»£»¤Ð§ÀÍ £¬£¬µ«¾Ü¾øÌ¸ÂÛÊÇ·ñÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£HuntressÇ徲ר¼ÒDray AghaÖ¸³ö £¬£¬ºÚ¿Í¡°É¾³ýÊý¾Ý¡±µÄÔÊÐíͨ³£ÊÇÀÕË÷̸ÅÐÍê³ÉµÄ±ê¼Ç £¬£¬µ«²»¿ÉÐÅ £¬£¬Êý¾Ý¸±±¾¿ÉÄܱ»±£´æ¡¢¹²Ïí»ò³öÊÛ £¬£¬ÎÞ·¨Í¨¹ýÊÖÒÕÊÖ¶ÎÑéÖ¤³¹µ×ɾ³ý¡£¡£¡£¡£¡£¡£


https://www.theregister.com/2026/02/25/wynn_resorts_shinyhunters/


6. UFP TechnologiesÔâÍøÂç¹¥»÷ÖÂÎļþ±»µÁ¼°ÏµÍ³ÖÐÖ¹


2ÔÂ25ÈÕ £¬£¬ÂíÈøÖîÈûÖÝÒ½ÁÆÆ÷ÐµÖÆÔìÉÌUFP TechnologiesÓÚ2026Äê2ÔÂ14ÈÕ¼ì²âµ½ITϵͳÈëÇÖÊÂÎñ £¬£¬ÖܶþÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-KÎļþÅû¶ϸ½Ú¡£¡£¡£¡£¡£¡£×÷ΪרעÓÚÒ½ÁÆÆ÷е¡¢ÎÞ¾ú°ü×°¼°Ò½ÁƱ£½¡×é¼þµÄÌõÔ¼ÖÆÔìÉÌ £¬£¬¸Ã¹«Ë¾´Ë´ÎÊÂÎñÉæ¼°Îļþ±»µÁ¡¢²¿·ÖITϵͳÖÐÖ¹ £¬£¬²¢Ó°Ïì¼Æ·Ñ¼°¿Í»§ËÍ»õ±êÇ©ÌìÉúϵͳ¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ £¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÎļþ £¬£¬µ«Ïêϸй¶ÐÅÏ¢ÀàÐͼ°ÊÇ·ñ°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ÈÔÔÚÈ·ÈÏÖС£¡£¡£¡£¡£¡£UFPÇ¿µ÷ £¬£¬¹«Ë¾ÒÑÆô¶¯Ó¦¼±Ô¤°¸²¢ÒÀÍÐÊý¾Ý±¸·Ýϵͳ £¬£¬×ÔÊÂÎñ·¢Ã÷ÒÔÀ´ £¬£¬ÔËÓªÔÚËùÓÐʵÖÊÐÔ·½Ãæ¾ùÒѻָ´ £¬£¬ÇÒÔ¤¼Æ´ó²¿·Ö¿ØÖÆÓëÊÓ²ìÓöȽ«Óɰü¹Ü¼ç¸º £¬£¬Î´¶Ô²ÆÎñÔì³ÉʵÖÊÐÔÓ°Ïì¡£¡£¡£¡£¡£¡£Ö»¹ÜÊÂÎñÌØÕ÷ÇкÏÀÕË÷Èí¼þ¹¥»÷ģʽ£¨Êý¾ÝÇÔÈ¡ÓëÎļþ¼ÓÃܶñÒâÈí¼þ°²ÅÅ£© £¬£¬µ«×èÖ¹ÏÖÔÚÉÐÎÞÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖ £¬£¬´Ë´ÎÊÂÎñδµ¼Öºã¾ÃÔËÓªÖÐÖ¹ £¬£¬Ó¦¼±²½·¥ÓÐÓðü¹ÜÁËÓªÒµÒ»Á¬ÐÔ¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/medical-device-maker-ufp-technologies-hit-by-cyberattack/