¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶
°ä²¼¹¦·ò 2026-03-131. ¼ÓÄôóLoblawÔâºÚ¿ÍÈëÇÖÖ¿ͻ§ÐÅϢй¶
3ÔÂ12ÈÕ£¬¼ÓÄôó×î´óʳƷҩƷÁãÊÛÉÌLoblaw Companies Limited£¨¼ò³ÆLoblaw£©½üÈÕÔâ·ê³Á´óÍøÂ簲ȫÊÂÎñ¡£¸Ã¹«Ë¾°ä·¢£¬ºÚ¿ÍÈëÇÔì䲿ÃÅITÍøÂç²¢»ñÈ¡Á˿ͻ§µÄ»ù×ÔÉí·ÝÐÅÏ¢£¨PII£©£¬Ô̺¬ÐÕÃû¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØÖ·¡£Loblaw×÷Ϊ¼ÓÄôóÁãÊÛÒµ¾ÞÍ·£¬ÔÚÈ«¹úÕ¼ÓÐ2500¼ÒÃŵ꣬º¸ÇÌØÐí¾Óª³¬ÊÓ×¢Ò©µê¡¢ÒøÐÐ×ÔÖ÷·þÎñͤºÍ·þ×°µêµÈҵ̬£¬²¢´òËãÔÚ2026ÄêÐÂÔö70¼ÒÃŵ꣬×÷ΪÆäµ½2030ÄêͶ×Ê100ÒÚÃÀÔªÎåÄê´òËãµÄÒ»²¿ÃÅ¡£¹«Ë¾ÏÖÕ¼ÓÐ22ÍòÃûÔ±¹¤£¬ÄêÊÕÈë¸ß´ï450ÒÚÃÀÔª¡£Õâ´ÎÊÂÎñʼÓÚ±¾ÖÜÔçЩʱ³½£¬Loblaw¼ì²âµ½ÆäITÍøÂçÖÐÒ»¸ö·Ç¹Ø¼ü·â¹ØÇøÓò´æÔÚ¿ÉÒɻ£¬¾µ÷²éÈ·ÈÏ£¬·¸×ïµÚÈý·½ÒѽӼûÁ˲¿Ãſͻ§µÄ¸ù»ùÐÅÏ¢¡£Ö»¹Üй¶Êý¾Ý²»Ô̺¬ÐÅÓþ¿¨ÏêÇé¡¢½¡È«ÐÅÏ¢»òÕË»§ÃÜÂëµÈÃô¸Ð²ÆÕþÐÅÏ¢£¬µ«LoblawÈÔ³öÓÚÉóÉ÷˼¿¼£¬×Ô¶¯×¢ÏúÁËËùÓпͻ§µÄÕË»§£¬ÒªÇó½Ó¼ûÊý×Ö·þÎñµÄÓû§³ÁеǼ²¢½¨Òé¸ü¸ÄÃÜÂë¡£¹«Ë¾Ç¿µ÷£¬Æä½ðÈÚ·þÎñÆ·ÅÆPC FinancialδÊÜÕâ´ÎÊÂÎñÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/
2. Ó¢¸ñÀ¼Çú¹÷ÇòлáÔâAiLockÀÕË÷Èí¼þ¹¥»÷
3ÔÂ12ÈÕ£¬Ó¢¸ñÀ¼Çú¹÷ÇòлáÕýµ÷²éһ·DZÔÚÊý¾Ýй¶ÊÂÎñ£¬ÆðÒòÊÇAiLockÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÐ¹Â¶Æ½Ì¨½«ÆäÁÐΪÊܺ¦Õß¡£¾Ý³Æ£¬¸ÃÍÅ»ïÇÔÈ¡ÁËлá129GBÊý¾Ý£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹«¿ªÎļþ¡£Ð»áÒѽáºÏÄÚ²¿ÍŶÓÓë±í²¿×¨¼Ò·¢Õ¹µ÷²é£¬²¢Ç¿µ÷¡°Êý¾Ý°²ÂúÊǵ±Ç°Ê×Òª¹¤×÷¡±£¬Ä¿Ç°ÕýÓë·¨Âɲ¿ÃźÏ×÷ÒÔÀåÇåÊÂÎñÕæÏࡣлὲ»°È˰µÊ¾£¬ÒѰÑÎȵ½ÍþвÐÐΪÕß°ä²¼µÄ¡°ÈÏÁ족Ìû×Ó£¬µ«Òòµ÷²éÈÔÔÚ½øÐУ¬ÔÝÎÞ·¨Åû¶¾ßÌåϸ½Ú¡£×÷ΪӢ¹úÇú¹÷Çò»î¶¯µÄÖ÷ÌâÖÎÀí»ú¹¹£¬Ð»á¸²¸ÇÈ«¹ú800Óà¼Ò¾ãÀÖ²¿¡¢15Íò×¢²áÇòÔ±¼°1.5ÍòÃû¶ÍÁ·¡¢²ÃÅк͹ÙÔ±£¬ÔËÓª²ã¼¶´Ó»ù²ãµ½¾«Ó¢¹ú¶È¶Ó¡£Õâ´ÎÊÂÎñ¿ÉÄÜÓ°Ïì»áÔ±ÒþÖÔÊý¾Ý£¬Ð»áºôÓõÇòÔ±¾¯ÌèÒì³£ÕË»§»î¶¯¼°ÍøÂç´¹µö¹¥»÷£¬ÉóÉ÷´¦ÖÃδ¾ÑéÖ¤µÄͨѶ¡£Ö»¹ÜлáÉÐδ֤ʵÊý¾ÝÏÖʵй¶£¬µ«ÒѲÉȡԤ·À´ëÊ©£¬Ô̺¬×Ô¶¯×¢ÏúËùº±¼û×Ö·þÎñÕË»§²¢ÒªÇóÓû§³ÁеǼ¡¢½¨Òé¸ü¸ÄÃÜÂë¡£
https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/
3. ÐÂÐÍAIÌìÉú¶ñÒâÈí¼þSlopolyÇ¿»¯ÀÕË÷¹¥»÷Á´
3ÔÂ12ÈÕ£¬IBM X-Force×êÑÐÈËÔ±·¢ÏÖÒ»ÖÖÃûΪSlopolyµÄÐÂÐͶñÒâÈí¼þ£¬¼«¿ÉÄÜÓÉÌìÉúʽÈËΪÖÇÄܹ¤¾ß´´½¨£¬Æä¼¼ÊõÌØµãÔ̺¬´óÁ¿´úÂë×¢½â¡¢½á¹¹»¯ÈÕÖ¾¼Í¼¡¢ÃýÎó´¦Öü°Ç峺±äÁ¿¶¨Ãû£¬ÕâЩÔÚÈËÀà±àд¶ñÒâÈí¼þÖк±¼û¡£¸ÃÈí¼þ×÷ΪPowerShell¾ç±¾ºóÃÅ£¬ÔÚInterlockÀÕË÷Èí¼þ¹¥»÷ÖбíÑÝC2¿Í»§¶Ë½ÇÉ«£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜϰȾ·þÎñÆ÷Âñ·ü³¬Ò»ÖÜ£¬ÇÔÈ¡Êý¾Ý²¢Î¬³ÖÓÆ¾Ã½Ó¼û¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³ÌȦÌ×£¬ºóÆÚ²¿ÊðSlopoly¡£IBM·ÖÎöÖ¸³ö£¬¾ç±¾Ëä×Ô³Æ"¶à̬C2ÓÆ¾Ã»¯¿Í»§¶Ë"£¬µ«ÏÖʵ²»×ãÖ´ÐÐÆÚ´úÂë×ÔÅú¸ÄÄÜÁ¦£¬½öͨ¹ýÌìÉúËæ»úÅäÖÃÖµºÍº¯ÊýÃû³ÆÊµÏÖα¶à̬¡£Æä²¿ÊðÓÚC:\ProgramData\Microsoft\Windows\Runtime\£¬Ö÷ÌâÖ°ÄÜÔ̺¬£ºÃ¿30Ãë·¢ËÍÐÄÌøÐűêÖÁ/api/commands£¬Ã¿50ÃëÂÖѯºÅÁͨ¹ýcmd.exeÖ´ÐÐÖ¸Áî²¢»Ø´«Á˾֣¬ÊØ»¤persistence.logÈÕÖ¾£¬Í¨¹ý"ÔËÐÐʱÆÚÀí"´òË㹤×÷³ÉÁ¢ÓƾÃÐÔ¡£Ö§³ÖºÅÁÇÏÂÔØÖ´ÐÐEXE/DLL/JSÓÐÐ§ÔØºÉ¡¢ÔËÐÐshellºÅÁî¡¢µ÷ÕûÐűê¾àÀë¡¢×Ô¸üм°Í˳ö¹ý³Ì¡£
https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/
4. ÃÀÅ··ÛËéÒÀÀµAVReconµÄSocksEscort·¸×ï´úÀíÍøÂç
3ÔÂ12ÈÕ£¬ÃÀ¹ú˾·¨²¿½áºÏÅ·ÖÞ¶à¹ú·¨ÂÉ»ú¹¹¼°¸öÈ˺Ï×÷ͬ°éBlack Lotus Labs£¬³É¹¦·ÛËéÁËÔËӪʮÓàÄêµÄSocksEscortÍøÂç·¸×ï´úÀíÍøÂç¡£¸ÃÍøÂçÆëÈ«ÒÀÀµAVRecon Linux¶ñÒâÈí¼þÈëÇÖ±ßÔµÉ豸£¬Í¨¹ý¡°¸É¾»¡±IPµØÖ·ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁ÷Á¿Â·ÓÉ·þÎñ£¬¿ÉÈÆ¹ý¶à³ÁºÚÃûµ¥£¬Ôø±»ÓÃÓÚÇÔȡŦԼÓû§100ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡¢Ôì³É±öϦ·¨ÄáÑÇÔì×÷ÆóÒµ70ÍòÃÀÔªÚ²ÆËðʧ¼°ÏÖÒÛ/ÍËÒÛÎäÊ¿10ÍòÃÀÔªÐÅÓþ¿¨Ëðʧ¡£¾ÝBlack Lotus LabsÊý¾Ý£¬SocksEscort×Ô2023Äê±»¼Í¼ÒÔÀ´£¬´Óǰ¼¸Äê¾ùÔÈÿÖÜϰȾ2Íǫ̀É豸£¬ÀÛ¼ÆÌṩԼ36.9Íò¸öIPµØÖ·½Ó¼ûȨÏÞ¡£½ØÖÁ2026Äê2Ô£¬ÆäÀûÓ÷¨Ê½ÈÔÁгöÔ¼8000̨ÊÜϰȾ·ÓÉÆ÷¡£Ðж¯ÖУ¬·¨ÂÉ»ú¹¹²é·âÁË7¹ú34¸öÓòÃûºÍ23̨·þÎñÆ÷£¬ÃÀ¹ú¶³½á350ÍòÃÀÔª¼ÓÃÜÇ®±Ò£¬ËùÓÐÊÜϰȾÉ豸ÒÑÓëSocksEscort·þÎñ¶Ï¿ªÏνӡ£AVRecon¶ñÒâÈí¼þ×Ô2021Äê5ÔÂÆð»îÔ¾£¬2023ÄêÖÐÆÚÒÑϰȾ³¬7Íǫ̀»ùÓÚLinuxµÄSOHO·ÓÉÆ÷£¬½öÓÃÓÚÀ©´óSocksEscort¹æÄ£¡£
https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/
5. ¼ÓÄôóTelus DigitalÔâShinyHuntersÇÔÈ¡1PBÊý¾Ý
3ÔÂ12ÈÕ£¬¼ÓÄôóÒµÎñÁ÷³Ì±í°ü¾ÞÍ·Telus Digital½üÈÕ֤ʵÔâ·ê³Á´ó°²È«ÊÂÎñ¡£ÍþвÐÐΪÕßShinyHuntersÐû³ÆÔÚ³ÖÐøÊýÔµĹ¥»÷ÖÐÇÔÈ¡½ü1PBÊý¾Ý£¬Éæ¼°TelusµÄBPOÔËÓª¼°Ïû·ÑÕßµçÐŲ¿ÃÅͨ»°¼Í¼¡£¾ÝShinyHuntersÅû¶£¬ÆäÀûÓÃSalesloft DriftÊý¾Ýй¶ÊÂÎñÖлñÈ¡µÄGoogle Cloud Platformƾ֤ÈëÇÖTelus£¬²¢Í¨¹ýÍøÂ簲ȫ¹¤¾ßtrufflehogËÑË÷¸ü¶àƾ֤£¬½ø¶ø½Ó¼ûÔ̺¬BigQueryÊ·ýÔÚÄڵĶà¸öϵͳ¡£±»µÁÊý¾Ýº¸Ç¿Í»§Ö§³Ö¹¤µ¥¡¢Í¨»°¹àÒô¡¢Ô´´úÂë¡¢²ÆÕþÐÅÏ¢¡¢FBI²¼¾°µ÷²é¡¢SalesforceÊý¾Ý¼°ÓªÏú»î¶¯ÔªÊý¾ÝµÈ£¬Éæ¼°28¼Ò³ÛÃû¹«Ë¾£¬Êý¾ÝÀàÐÍÒò¹«Ë¾¶øÒ죬¶³öÁ˿ͻ§Ö§³Ö¡¢ºô½ÐÖÐÐıí°ü¡¢AI¹¤¾ß¡¢Ú²Æ¼ì²âµÈ¶àÒµÎñÖ°ÄÜ¡£ShinyHunters×Ô½ñÄê2ÔÂÆðÏòTelusÀÕË÷6500ÍòÃÀÔª£¬µ«Î´»ñ»ØÓ¦¡£Telus×òÈÕÕýʽȷÈÏϵͳÔâδ¾ÊÚȨ½Ó¼û£¬²¢°µÊ¾ÒѲÉÈ¡´ëʩӦ¶ÔÈëÇÖ¡¢±£»¤ÏµÍ³£¬ÀñÆ¸ÍøÂçȡ֤ר¼ÒÐÖúµ÷²é£¬Óë·¨Âɲ¿ÃźÏ×÷£¬Í¬Ê±Ç¿µ÷ÒµÎñÔËÓªÕý³££¬ÎÞÖ¤¾ÝÏÔʾ¿Í»§ÍøÂç·þÎñÊÜÓ°Ï죬½«×ÃÇé֪ͨÊÜÓ°Ïì¿Í»§¡£
https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/
6. °¢¶û°ÍÄáÑÇÒé»áÔâÍøÂç¹¥»÷£¬ÒÁ·½×éÖ¯³Æ±¨³ð
3ÔÂ11ÈÕ£¬°¢¶û°ÍÄáÑÇÒé»áÓÚÖܶþÍí¼äÔâ·ê¡°¸ß¼¶¡±ÍøÂç¹¥»÷£¬¹¥»÷Ö¸±íÃ÷È·Ö¸Ïòɾ³ýÊý¾Ý²¢¹¥Ï¶à¸öÄÚ²¿ÏµÍ³¡£¾ÝÒé»áÉêÃ÷£¬ÆäÖ÷ÌâϵͳÓë¹Ù·½ÍøÕ¾ÈÔά³ÖÕý³£ÔËÐУ¬µ«ÐÐÕþ²¿ÃÅʹÓõÄÄÚ²¿µçÓÊ·þÎñÒѱ»Ò»Ê±ÔÝÍ££¬µ¼ÖÂÊÕ·¢Ë«ÏòͨѶÖжϣ¬¹¤×÷ÈËÔ±ÓëÒéÔ±ÔÚ¹¥»÷²úÉúºóÊýÓ×ʱÄÚÎÞ·¨½Ó¼ûµçÄÔ¼°µçÓÊϵͳ¡£Õâ´ÎÊÂÎñÖУ¬ÃûΪ¡°Homeland Justice¡±µÄºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü£¬²¢ÔÚÆäTelegramƵ·°ä²¼Á˾ݳÆÐ¹Â¶µÄÄÚ²¿Í¨Ñ¶Îļþ½ØÍ¼¡£Ö»¹Ü°¢¶û°ÍÄáÑǹٷ½ÉÐδ¹«¿ªÖ¤Êµ¸Ã×é֯˵·¨£¬µ«°²È«×êÑÐÈËÔ±ÓëÎ÷·½¹ÙÔ±´ËǰÒѽ«¡°Homeland Justice¡±ÓëÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¹ØÁª¡£½üÄêÀ´£¬¸Ã×éÖ¯ÂÅ´ÎÐû³Æ¶Ô°¢¶û°ÍÄáÑǾ³ÄÚһϵÁÐÍøÂç¹¥»÷ÕÆ¹Ü£¬Ö¸±êº¸ÇÒé»á¡¢¹ú¶Èº½¿Õ¹«Ë¾¡¢µçÐÅÆóÒµ¼°¹ú¶Èͳ¼Æ¾Ö¡£Õâ´Î¹¥»÷µÄ²¼¾°Óë°¢¶û°ÍÄáÑǰ²È«¾ÖÊÆçÇÃÜÓйء£¡°Homeland Justice¡±ÔÚ¹¥»÷ÉêÃ÷ÖÐÃ÷È·°µÊ¾£¬Õâ´ÎÐж¯ÊǶ԰¢¶û°ÍÄáÑÇÖ§³ÖÒÁÀÊ·ñ¾öÅÉ×éÖ¯¡°ÒÁÀÊÈËÃñÊ¥Õ½Õß×éÖ¯¡±£¨MEK£©µÄ±¨³ð¡£
https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament


¾©¹«Íø°²±¸11010802024551ºÅ