¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶

°ä²¼¹¦·ò 2026-03-13

1. ¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶


3ÔÂ12ÈÕ £¬¼ÓÄôó×î´óʳƷҩƷÁãÊÛÉÌLoblaw Companies Limited£¨¼ò³ÆLoblaw£©½üÈÕÔâ·ê³Á´óÍøÂ簲ȫÊÂÎñ ¡£¸Ã¹«Ë¾°ä·¢ £¬ºÚ¿ÍÈëÇÔì䲿ÃÅITÍøÂç²¢»ñÈ¡Á˿ͻ§µÄ»ù×ÔÉí·ÝÐÅÏ¢£¨PII£© £¬Ô̺¬ÐÕÃû¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØÖ· ¡£Loblaw×÷Ϊ¼ÓÄôóÁãÊÛÒµ¾ÞÍ· £¬ÔÚÈ«¹úÕ¼ÓÐ2500¼ÒÃŵê £¬º­¸ÇÌØÐí¾­Óª³¬ÊÓ×¢Ò©µê¡¢ÒøÐÐ×ÔÖ÷·þÎñͤºÍ·þ×°µêµÈҵ̬ £¬²¢´òËãÔÚ2026ÄêÐÂÔö70¼ÒÃŵê £¬×÷ΪÆäµ½2030ÄêͶ×Ê100ÒÚÃÀÔªÎåÄê´òËãµÄÒ»²¿ÃÅ ¡£¹«Ë¾ÏÖÕ¼ÓÐ22ÍòÃûÔ±¹¤ £¬ÄêÊÕÈë¸ß´ï450ÒÚÃÀÔª ¡£Õâ´ÎÊÂÎñʼÓÚ±¾ÖÜÔçЩʱ³½ £¬Loblaw¼ì²âµ½ÆäITÍøÂçÖÐÒ»¸ö·Ç¹Ø¼ü·â¹ØÇøÓò´æÔÚ¿ÉÒɻ £¬¾­µ÷²éÈ·ÈÏ £¬·¸×ïµÚÈý·½ÒѽӼûÁ˲¿Ãſͻ§µÄ¸ù»ùÐÅÏ¢ ¡£Ö»¹Üй¶Êý¾Ý²»Ô̺¬ÐÅÓþ¿¨ÏêÇé¡¢½¡È«ÐÅÏ¢»òÕË»§ÃÜÂëµÈÃô¸Ð²ÆÕþÐÅÏ¢ £¬µ«LoblawÈÔ³öÓÚÉóÉ÷˼¿¼ £¬×Ô¶¯×¢ÏúÁËËùÓпͻ§µÄÕË»§ £¬ÒªÇó½Ó¼ûÊý×Ö·þÎñµÄÓû§³ÁеǼ²¢½¨Òé¸ü¸ÄÃÜÂë ¡£¹«Ë¾Ç¿µ÷ £¬Æä½ðÈÚ·þÎñÆ·ÅÆPC FinancialδÊÜÕâ´ÎÊÂÎñÓ°Ïì ¡£


https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/


2. Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÔâAiLockÀÕË÷Èí¼þ¹¥»÷


3ÔÂ12ÈÕ £¬Ó¢¸ñÀ¼Çú¹÷ÇòЭ»áÕýµ÷²éһ·DZÔÚÊý¾Ýй¶ÊÂÎñ £¬ÆðÒòÊÇAiLockÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÐ¹Â¶Æ½Ì¨½«ÆäÁÐΪÊܺ¦Õß ¡£¾Ý³Æ £¬¸ÃÍÅ»ïÇÔÈ¡ÁËЭ»á129GBÊý¾Ý £¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹«¿ªÎļþ ¡£Ð­»áÒѽáºÏÄÚ²¿ÍŶÓÓë±í²¿×¨¼Ò·¢Õ¹µ÷²é £¬²¢Ç¿µ÷¡°Êý¾Ý°²ÂúÊǵ±Ç°Ê×Òª¹¤×÷¡± £¬Ä¿Ç°ÕýÓë·¨Âɲ¿ÃźÏ×÷ÒÔÀåÇåÊÂÎñÕæÏà ¡£Ð­»á½²»°È˰µÊ¾ £¬ÒѰÑÎȵ½ÍþвÐÐΪÕß°ä²¼µÄ¡°ÈÏÁ족Ìû×Ó £¬µ«Òòµ÷²éÈÔÔÚ½øÐÐ £¬ÔÝÎÞ·¨Åû¶¾ßÌåϸ½Ú ¡£×÷ΪӢ¹úÇú¹÷Çò»î¶¯µÄÖ÷ÌâÖÎÀí»ú¹¹ £¬Ð­»á¸²¸ÇÈ«¹ú800Óà¼Ò¾ãÀÖ²¿¡¢15Íò×¢²áÇòÔ±¼°1.5ÍòÃû¶ÍÁ·¡¢²ÃÅк͹ÙÔ± £¬ÔËÓª²ã¼¶´Ó»ù²ãµ½¾«Ó¢¹ú¶È¶Ó ¡£Õâ´ÎÊÂÎñ¿ÉÄÜÓ°Ïì»áÔ±ÒþÖÔÊý¾Ý £¬Ð­»áºôÓõÇòÔ±¾¯ÌèÒì³£ÕË»§»î¶¯¼°ÍøÂç´¹µö¹¥»÷ £¬ÉóÉ÷´¦ÖÃδ¾­ÑéÖ¤µÄͨѶ ¡£Ö»¹ÜЭ»áÉÐδ֤ʵÊý¾ÝÏÖʵй¶ £¬µ«ÒѲÉȡԤ·À´ëÊ© £¬Ô̺¬×Ô¶¯×¢ÏúËùº±¼û×Ö·þÎñÕË»§²¢ÒªÇóÓû§³ÁеǼ¡¢½¨Òé¸ü¸ÄÃÜÂë ¡£


https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/


3. ÐÂÐÍAIÌìÉú¶ñÒâÈí¼þSlopolyÇ¿»¯ÀÕË÷¹¥»÷Á´


3ÔÂ12ÈÕ £¬IBM X-Force×êÑÐÈËÔ±·¢ÏÖÒ»ÖÖÃûΪSlopolyµÄÐÂÐͶñÒâÈí¼þ £¬¼«¿ÉÄÜÓÉÌìÉúʽÈËΪÖÇÄܹ¤¾ß´´½¨ £¬Æä¼¼ÊõÌØµãÔ̺¬´óÁ¿´úÂë×¢½â¡¢½á¹¹»¯ÈÕÖ¾¼Í¼¡¢ÃýÎó´¦Öü°Ç峺±äÁ¿¶¨Ãû £¬ÕâЩÔÚÈËÀà±àд¶ñÒâÈí¼þÖк±¼û ¡£¸ÃÈí¼þ×÷ΪPowerShell¾ç±¾ºóÃÅ £¬ÔÚInterlockÀÕË÷Èí¼þ¹¥»÷ÖбíÑÝC2¿Í»§¶Ë½ÇÉ« £¬ÔÊÐí¹¥»÷ÕßÔÚÊÜϰȾ·þÎñÆ÷Âñ·ü³¬Ò»ÖÜ £¬ÇÔÈ¡Êý¾Ý²¢Î¬³ÖÓÆ¾Ã½Ó¼û ¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³ÌȦÌ× £¬ºóÆÚ²¿ÊðSlopoly ¡£IBM·ÖÎöÖ¸³ö £¬¾ç±¾Ëä×Ô³Æ"¶à̬C2ÓÆ¾Ã»¯¿Í»§¶Ë" £¬µ«ÏÖʵ²»×ãÖ´ÐÐÆÚ´úÂë×ÔÅú¸ÄÄÜÁ¦ £¬½öͨ¹ýÌìÉúËæ»úÅäÖÃÖµºÍº¯ÊýÃû³ÆÊµÏÖα¶à̬ ¡£Æä²¿ÊðÓÚC:\ProgramData\Microsoft\Windows\Runtime\ £¬Ö÷ÌâÖ°ÄÜÔ̺¬£ºÃ¿30Ãë·¢ËÍÐÄÌøÐűêÖÁ/api/commands £¬Ã¿50ÃëÂÖѯºÅÁî £¬Í¨¹ýcmd.exeÖ´ÐÐÖ¸Áî²¢»Ø´«ÁË¾Ö £¬ÊØ»¤persistence.logÈÕÖ¾ £¬Í¨¹ý"ÔËÐÐʱÆÚÀí"´òË㹤×÷³ÉÁ¢ÓƾÃÐÔ ¡£Ö§³ÖºÅÁ¸ÇÏÂÔØÖ´ÐÐEXE/DLL/JSÓÐÐ§ÔØºÉ¡¢ÔËÐÐshellºÅÁî¡¢µ÷ÕûÐűê¾àÀë¡¢×Ô¸üм°Í˳ö¹ý³Ì ¡£


https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/


4. ÃÀÅ··ÛËéÒÀÀµAVReconµÄSocksEscort·¸×ï´úÀíÍøÂç


3ÔÂ12ÈÕ £¬ÃÀ¹ú˾·¨²¿½áºÏÅ·ÖÞ¶à¹ú·¨ÂÉ»ú¹¹¼°¸öÈ˺Ï×÷ͬ°éBlack Lotus Labs £¬³É¹¦·ÛËéÁËÔËӪʮÓàÄêµÄSocksEscortÍøÂç·¸×ï´úÀíÍøÂç ¡£¸ÃÍøÂçÆëÈ«ÒÀÀµAVRecon Linux¶ñÒâÈí¼þÈëÇÖ±ßÔµÉ豸 £¬Í¨¹ý¡°¸É¾»¡±IPµØÖ·ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁ÷Á¿Â·ÓÉ·þÎñ £¬¿ÉÈÆ¹ý¶à³ÁºÚÃûµ¥ £¬Ôø±»ÓÃÓÚÇÔȡŦԼÓû§100ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡¢Ôì³É±öϦ·¨ÄáÑÇÔì×÷ÆóÒµ70ÍòÃÀԪڲƭËðʧ¼°ÏÖÒÛ/ÍËÒÛÎäÊ¿10ÍòÃÀÔªÐÅÓþ¿¨Ëðʧ ¡£¾ÝBlack Lotus LabsÊý¾Ý £¬SocksEscort×Ô2023Äê±»¼Í¼ÒÔÀ´ £¬´Óǰ¼¸Äê¾ùÔÈÿÖÜϰȾ2Íǫ̀É豸 £¬ÀÛ¼ÆÌṩԼ36.9Íò¸öIPµØÖ·½Ó¼ûȨÏÞ ¡£½ØÖÁ2026Äê2Ô £¬ÆäÀûÓ÷¨Ê½ÈÔÁгöÔ¼8000̨ÊÜϰȾ·ÓÉÆ÷ ¡£Ðж¯ÖÐ £¬·¨ÂÉ»ú¹¹²é·âÁË7¹ú34¸öÓòÃûºÍ23̨·þÎñÆ÷ £¬ÃÀ¹ú¶³½á350ÍòÃÀÔª¼ÓÃÜÇ®±Ò £¬ËùÓÐÊÜϰȾÉ豸ÒÑÓëSocksEscort·þÎñ¶Ï¿ªÏνÓ ¡£AVRecon¶ñÒâÈí¼þ×Ô2021Äê5ÔÂÆð»îÔ¾ £¬2023ÄêÖÐÆÚÒÑϰȾ³¬7Íǫ̀»ùÓÚLinuxµÄSOHO·ÓÉÆ÷ £¬½öÓÃÓÚÀ©´óSocksEscort¹æÄ£ ¡£


https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/


5. ¼ÓÄôóTelus DigitalÔâShinyHuntersÇÔÈ¡1PBÊý¾Ý


3ÔÂ12ÈÕ £¬¼ÓÄôóÒµÎñÁ÷³Ì±í°ü¾ÞÍ·Telus Digital½üÈÕ֤ʵÔâ·ê³Á´ó°²È«ÊÂÎñ ¡£ÍþвÐÐΪÕßShinyHuntersÐû³ÆÔÚ³ÖÐøÊýÔµĹ¥»÷ÖÐÇÔÈ¡½ü1PBÊý¾Ý £¬Éæ¼°TelusµÄBPOÔËÓª¼°Ïû·ÑÕßµçÐŲ¿ÃÅͨ»°¼Í¼ ¡£¾ÝShinyHuntersÅû¶ £¬ÆäÀûÓÃSalesloft DriftÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄGoogle Cloud Platformƾ֤ÈëÇÖTelus £¬²¢Í¨¹ýÍøÂ簲ȫ¹¤¾ßtrufflehogËÑË÷¸ü¶àƾ֤ £¬½ø¶ø½Ó¼ûÔ̺¬BigQueryÊ·ýÔÚÄڵĶà¸öϵͳ ¡£±»µÁÊý¾Ýº­¸Ç¿Í»§Ö§³Ö¹¤µ¥¡¢Í¨»°¹àÒô¡¢Ô´´úÂë¡¢²ÆÕþÐÅÏ¢¡¢FBI²¼¾°µ÷²é¡¢SalesforceÊý¾Ý¼°ÓªÏú»î¶¯ÔªÊý¾ÝµÈ £¬Éæ¼°28¼Ò³ÛÃû¹«Ë¾ £¬Êý¾ÝÀàÐÍÒò¹«Ë¾¶øÒì £¬Â¶³öÁ˿ͻ§Ö§³Ö¡¢ºô½ÐÖÐÐıí°ü¡¢AI¹¤¾ß¡¢Ú²Æ­¼ì²âµÈ¶àÒµÎñÖ°ÄÜ ¡£ShinyHunters×Ô½ñÄê2ÔÂÆðÏòTelusÀÕË÷6500ÍòÃÀÔª £¬µ«Î´»ñ»ØÓ¦ ¡£Telus×òÈÕÕýʽȷÈÏϵͳÔâδ¾­ÊÚȨ½Ó¼û £¬²¢°µÊ¾ÒѲÉÈ¡´ëʩӦ¶ÔÈëÇÖ¡¢±£»¤ÏµÍ³ £¬ÀñÆ¸ÍøÂçȡ֤ר¼ÒЭÖúµ÷²é £¬Óë·¨Âɲ¿ÃźÏ×÷ £¬Í¬Ê±Ç¿µ÷ÒµÎñÔËÓªÕý³£ £¬ÎÞÖ¤¾ÝÏÔʾ¿Í»§ÍøÂç·þÎñÊÜÓ°Ïì £¬½«×ÃÇé֪ͨÊÜÓ°Ïì¿Í»§ ¡£


https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/


6. °¢¶û°ÍÄáÑÇÒé»áÔâÍøÂç¹¥»÷ £¬ÒÁ·½×éÖ¯³Æ±¨³ð


3ÔÂ11ÈÕ £¬°¢¶û°ÍÄáÑÇÒé»áÓÚÖܶþÍí¼äÔâ·ê¡°¸ß¼¶¡±ÍøÂç¹¥»÷ £¬¹¥»÷Ö¸±íÃ÷È·Ö¸Ïòɾ³ýÊý¾Ý²¢¹¥Ï¶à¸öÄÚ²¿ÏµÍ³ ¡£¾ÝÒé»áÉêÃ÷ £¬ÆäÖ÷ÌâϵͳÓë¹Ù·½ÍøÕ¾ÈÔά³ÖÕý³£ÔËÐÐ £¬µ«ÐÐÕþ²¿ÃÅʹÓõÄÄÚ²¿µçÓÊ·þÎñÒѱ»Ò»Ê±ÔÝÍ£ £¬µ¼ÖÂÊÕ·¢Ë«ÏòͨѶÖÐ¶Ï £¬¹¤×÷ÈËÔ±ÓëÒéÔ±ÔÚ¹¥»÷²úÉúºóÊýÓ×ʱÄÚÎÞ·¨½Ó¼ûµçÄÔ¼°µçÓÊϵͳ ¡£Õâ´ÎÊÂÎñÖÐ £¬ÃûΪ¡°Homeland Justice¡±µÄºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü £¬²¢ÔÚÆäTelegramƵ·°ä²¼Á˾ݳÆÐ¹Â¶µÄÄÚ²¿Í¨Ñ¶Îļþ½ØÍ¼ ¡£Ö»¹Ü°¢¶û°ÍÄáÑǹٷ½ÉÐδ¹«¿ªÖ¤Êµ¸Ã×é֯˵·¨ £¬µ«°²È«×êÑÐÈËÔ±ÓëÎ÷·½¹ÙÔ±´ËǰÒѽ«¡°Homeland Justice¡±ÓëÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¹ØÁª ¡£½üÄêÀ´ £¬¸Ã×éÖ¯ÂÅ´ÎÐû³Æ¶Ô°¢¶û°ÍÄáÑǾ³ÄÚһϵÁÐÍøÂç¹¥»÷ÕÆ¹Ü £¬Ö¸±êº­¸ÇÒé»á¡¢¹ú¶Èº½¿Õ¹«Ë¾¡¢µçÐÅÆóÒµ¼°¹ú¶Èͳ¼Æ¾Ö ¡£Õâ´Î¹¥»÷µÄ²¼¾°Óë°¢¶û°ÍÄáÑǰ²È«¾ÖÊÆçÇÃÜÓйØ ¡£¡°Homeland Justice¡±ÔÚ¹¥»÷ÉêÃ÷ÖÐÃ÷È·°µÊ¾ £¬Õâ´ÎÐж¯ÊǶ԰¢¶û°ÍÄáÑÇÖ§³ÖÒÁÀÊ·ñ¾öÅÉ×éÖ¯¡°ÒÁÀÊÈËÃñÊ¥Õ½Õß×éÖ¯¡±£¨MEK£©µÄ±¨³ð ¡£


https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament