ÂíÈøÖîÈûÖݳÛÃûҽԺϵͳÔâÍøÂç¹¥»÷
°ä²¼¹¦·ò 2026-04-091. ÂíÈøÖîÈûÖݳÛÃûҽԺϵͳÔâÍøÂç¹¥»÷
4ÔÂ7ÈÕ£¬ÃÀ¹úÂíÈøÖîÈûÖݳÛÃûÒ½ÁÆ»ú¹¹Signature Healthcare¼°Æä²¼Â޿˶ÙÒ½Ôº½üÈÕÔâ·êÍøÂç¹¥»÷£¬µ¼Ö¶à¸öÐÅϢϵͳÊÜËð£¬Ò½Ôº±»ÆÈ»Ø¾ø¾È»¤³µ½øÈ룬²¢Æô¶¯ÁËÍ£»úÊØ»¤·¨Ê½¡£¸ÃҽԺϵͳÒÑÔËÓª³¬¹ý125Ä꣬Ϊ²¼Â޿˶ټ°²¨Ê¿¶Ù½¼Çø¶à¸ö³ÇÊеÄÊýÊ®Íò¾ÓÃñÌṩ·þÎñ¡£Ôº·½°µÊ¾£¬ÔÚ·¢ÏÖÍøÂ粿ÃÅÇøÓò´æÔÚ¿ÉÒɻºó£¬Á¢¼´Æô¶¯ÁËÊÂÎñÏìÓ¦ºÍ̸£¬ÒÔÈ·±£¸ßÖÊÁ¿µÄ»¼Õß»¤ÀíºÍ°²È«¡£ÊÜÕâ´Î¹¥»÷Ó°Ï죬¹ÌȻסԺ¡¢¼¹Øï·þÎñºÍÔ¤Ô¼ÊÖÊõÈÔ³ÖÐø½øÐУ¬µ«Ò½ÔºÔÚÖܶþ²»µÃ²»È¡µÞÁ˰©Ö¢»¼ÕߵϝÁÆÊäÒº·þÎñ£¬²¢ÖÒ¸æ³ÆÓÉÓÚ¼¼Êõ¹ÊÕÏ£¬»¼Õß¾ÍÕï½«Ãæ¶ÔÑÓÎó¡£½ØÖÁÖܶþ£¬ÉÐÎÞÈκκڿÍ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£ÕâÆðÊÂÎñ²¢·Ç¹ÂÁ¢°¸Àý£¬½ñÄêÒÔÀ´£¬ÃÀ¹ú¶à¼ÒÒ½ÔºÒÑÒòÍøÂç¹¥»÷±»ÆÈÈ¡µÞÔ¤Ô¼²¢ÏÞ¶È·þÎñ¡£Ä¿Ç°£¬Health ISAC³ÖÐøÓëÎÀÉúÓ빫¼Ò·þÎñ²¿ºÍÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾ÖµÈÁª¹ú»ú¹¹Î¬³ÖÐÅÏ¢¹²ÏíÇþ·£¬ÒÔÈ·±£Ò½ÁƱ£½¡¹«Ë¾¿ÉÄÜʵʱ»ñµÃÓйØÍþвµý±¨¡£
https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack
2. ÒÁÀʹØÁªºÚ¿Í´ó¹æÄ£¶Ô×¼ÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©PLC
4ÔÂ7ÈÕ£¬ÃÀ¹ú¶à¸öÁª¹ú»ú¹¹Ô̺¬Áª¹úµ÷²é¾Ö£¨FBI£©¡¢ÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©¡¢¹ú¶È°²È«¾Ö£¨NSA£©¡¢»·¾³±£»¤Êð£¨EPA£©¡¢ÄÜÔ´²¿£¨DOE£©ÒÔ¼°ÃÀ¹úÍøÂç˾ÁîÊÖÏÂÊôµÄÍøÂç¹ú¶È¹¤×÷¶ÓÁУ¨CNMF£©½áºÏ°ä²¼ÁËÒ»·ÝÖҸ沼¸æ£¬Ö¸³öÓëÒÁÀÊÓйØÁªµÄ¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯ÕýÒÔÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©ÍøÂçÖж³öÓÚ»¥ÁªÍøµÄÂÞ¿ËΤ¶û/°¬Â×-²¼ÀµÂÀû¿É±à³ÌÂß¼½ÚÔìÆ÷£¨PLC£©ÎªÖ¸±ê£¬·¢Æð³ÖÐø¹¥»÷¡£²¼¸æ³Æ£¬×Ô2026Äê3ÔÂÒÔÀ´£¬ÕâЩ¹¥»÷ÒѶÔÃÀ¹úµ±¾Ö·þÎñºÍÉèÊ©¡¢Ë®ºÍ·Ïˮϵͳ¡¢ÄÜÔ´µÈ¶à¸ö¹Ø¼ü»ù´¡ÉèÊ©²¿ÃÅÔì³ÉÁ˾¼ÃËðʧºÍÔËÓªÖжϡ£¹¥»÷ÕßµÄÒâͼÔ̺¬¶ñÒâ´Û¸ÄÏîÄ¿Îļþ£¬ÒÔ¼°°Ñ³ÖÈË»ú½çÃæ£¨HMI£©ºÍ¼à¿ØÓëÊý¾Ý²É¼¯£¨SCADA£©ÏµÍ³ÏÔʾÆÁÉÏÏÔʾµÄÊý¾Ý¡£FBIÆÀ¹ÀÒÔΪ£¬Õë¶ÔÃÀ¹ú×éÖ¯µÄÕâЩ¹¥»÷»î¶¯×î½üÓÐËùÉý¼¶£¬ºÜ¿ÉÄÜÊǶÔÒÁÀÊÓëÃÀ¹úºÍÒÔÉ«ÁÐÖ®¼äµÐ¶ÔÐж¯µÄ»ØÓ¦¡£Îª·ÀÓù´ËÀ๥»÷£¬½áºÏ²¼¸æÏòÍøÂç·ÀÓùÈËÔ±Ìá³öÁËһϵÁн¨Ò飺Ӧ½«PLCÓ뻥ÁªÍø¶Ï¿ªÏνӻòʹÓ÷À»ðǽ¼ÓÒÔ±£»¤µÈ¡£
https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/
3. SaaS¼¯³ÉÉÌAnodotÈëÇÖÊÂÎñ²¨¼°¶à¼Ò¹«Ë¾
4ÔÂ7ÈÕ£¬Ò»¼ÒÈí¼þ¼´·þÎñ£¨SaaS£©¼¯³ÉÌṩÉÌÔâ·ê°²È«ÈëÇÖ£¬µ¼ÖÂÉí·ÝÑéÖ¤ÁîÅÆ±»µÁ£¬ËæºóÊ®Óà¼Ò¹«Ë¾Ôâ·êÁËÊý¾Ý͵ÇÔ¹¥»÷¡£¹ÌÈ»¶à¼ÒÔÆ´æ´¢ºÍSaaS¹©¸øÉ̾ù³ÉΪ±»µÁÁîÅÆµÄ¹¥»÷Ö¸±ê£¬µ«´óÎÞÊýÊý¾Ý͵ÇÔ¹¥»÷ÖØÒªÕë¶ÔÔÆÊý¾Ýƽ̨Snowflake¡£Snowflake֤ʵÁË¡°Òì³£»î¶¯¡±µÄ´æÔÚ£¬²¢°µÊ¾ÆäÉÙÊý¿Í»§Êܵ½ÁËÓ°Ïì¡£¸Ã¹«Ë¾³Æ£¬×î½üÔÚÉÙÊý¿Í»§ÕË»§Öмì²âµ½ÓëÌØ¶¨µÚÈý·½¼¯³ÉÓйصÄÒì³£»î¶¯£¬Ëæ¼´Á¢¼´·¢Õ¹µ÷²é£¬²¢³öÓÚÉóÉ÷˼¿¼¶³½áÁË¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§ÕË»§£¬Í¬Ê±Í¨ÖªÁËÓйؿͻ§²¢ÌṩԤ·ÀÐÔÁìµ¼¡£SnowflakeÇ¿µ÷£¬ÕâЩ¹¥»÷²¢Î´Ôì³ÉÆä×ÔÉíϵͳµÄÈκηì϶»òÇÖº¦¡£¾Ý³Æ£¬¹¥»÷ÕßÔøÊÔͼʹÓñ»µÁµÄÉí·ÝÑéÖ¤ÁîÅÆ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬µ«Ôڳɹ¦Ö®Ç°¼´±»¼ì²â·¢ÏÖ¡£¾Ý¶à¸öÐÂÎÅÆðÔ´»ñϤ£¬ÕâЩ¹¥»÷Ô´ÓÚÊý¾ÝÒì³£¼ì²â¹«Ë¾AnodotµÄһ·°²È«ÊÂÎñ¡£ShinyHunters×é֤֯ʵÁËÆäÐÐΪ£¬Ðû³ÆÉÏÖÜÎå´ÓÊýÊ®¼Ò¹«Ë¾ÇÔÈ¡ÁËÊý¾Ý£¬²¢È·ÈÏÔøÊÔͼ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬µ«°µÊ¾±»ÈËΪÖÇÄܼì²âϵͳÀ¹½Ø¡£¹¥»÷Õß»¹Ðû³ÆÕâ´Î¹¥»÷Ô´ÓÚAnodotµÄ°²È«ÊÂÎñ£¬°µÊ¾ËûÃÇ¿ÉÄÜÒÑÈëÇָù«Ë¾Ò»¶Î¹¦·ò¡£
https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/
4. UNC6783ÍþвÐÐΪÕßÈëÇÖBPOÌṩÉÌ
4ÔÂ8ÈÕ£¬Ò»¸öÃûΪUNC6783µÄÍþвÐÐΪÕßÕýͨ¹ýÈëÇÖÒµÎñÁ÷³Ì±í°ü£¨BPO£©ÌṩÉÌ£¬»ñÈ¡¶Ô¶à¸öÐÐÒµ¸ß¼ÛÖµ¹«Ë¾µÄ´ó¹æÄ£½Ó¼ûȨÏÞ¡£¾Ý¹È¸èÍþвµý±¨Ó××飨GTIG£©Åû¶£¬ÒѺ±¼ûÊ®¼ÒÆóҵʵÌå³ÉΪÕâÖÖ¹¥»÷¼¿Á©µÄÖ¸±ê£¬Ãô¸ÐÊý¾Ý±»ÇÔÈ¡²¢ÓÃÓÚÀÕË÷¡£GTIGÊ×ϯÍþв·ÖÎöʦAustin Larsen°µÊ¾£¬UNC6783ͨ³£ÒÀ¸½Éç»á¹¤³ÌºÍÍøÂç´¹µö»î¶¯À´ÈëÇÖÓëÖ¸±ê¹«Ë¾ºÏ×÷µÄBPO¹«Ë¾£¬ÓÐʱҲ»áÖ±½ÓÁªÏµÖ¸±ê×éÖ¯ÄÚ²¿µÄÖ§³ÖºÍÔ®ÊǪ̈ÈËÔ±£¬ÊÔͼ»ñȡֱ½Ó½Ó¼ûȨÏÞ¡£×êÑÐÈËÔ±ÒÔΪ£¬UNC6783¿ÉÄÜÓëÒ»¸ö»¯Ãû¡°Raccoon¡±µÄÄäÃûÍþвÐÐΪÕßÓйأ¬ºóÕß´ËÇ°ÔøÒÔ¶à¼ÒΪ´óÐ͹«Ë¾Ìṩ·þÎñµÄBPO¹«Ë¾ÎªÖ¸±ê¡£ÔÚͨ¹ýʵʱ̸ÌìÌáÒéµÄÉç»á¹¤³Ì¹¥»÷ÖУ¬¹¥»÷Õß»áÅúʾ֧³ÖÈËÔ±½Ó¼ûÍйÜÔÚ·ÂÕÕÖ¸±ê¹«Ë¾ÓòÃûÉϵÄαÔìOktaµÇÂ¼Ò³Ãæ£¬ÕâЩÓòÃû×ñÑÌØ¶¨Ä£Ê½¡£LarsenÖ¸³ö£¬ÕâЩ¹¥»÷Öв¿ÊðµÄÍøÂç´¹µö¹¤¾ß°ü¿ÉÄÜÇÔÈ¡¼ôÌù°åÄÚÈÝ£¬´Ó¶øÈƹý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©±£»¤£¬Ê¹¹¥»÷Õß¿ÉÄܽ«ÆäÉ豸ע²áµ½×éÖ¯ÖС£´Ë±í£¬¹È¸è»¹¹Û²ìµ½UNC6783É¢²¼Ðéα°²È«¸üÐÂÒÔ´«²¼Ô¶³Ì½Ó¼û¶ñÒâÈí¼þ¡£Ôڳɹ¦ÇÔÈ¡Ãô¸ÐÊý¾Ýºó£¬¹¥»÷Õß»áͨ¹ýProtonMailµØÖ·ÁªÏµÊܺ¦ÕßË÷Òª²Æ²¯£¬ÒԴ˽øÐÐÀÕË÷¡£
https://www.bleepingcomputer.com/news/security/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets/
5. CISA½«Ivanti EPMMÑϳÁ·ì϶²ÎÓëÒÑÖªÀûÓÃĿ¼
4ÔÂ8ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Ivanti Endpoint Manager Mobile£¨EPMM£©Öз¢ÏÖµÄÒ»¸öÑϳÁ·ì϶ÄÉÈëÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬¸Ã·ì϶±àºÅΪCVE-2026-1340£¬CVSSÆÀ·Ö¸ß´ï9.8¡£ÕâÒ»´úÂë×¢Èë·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬ÇÒIvanti¹«Ë¾ÒÑÈ·Èϸ÷ì϶ĿǰÒѱ»¹¥»÷Õß»ý¼«ÀûÓ᣾ÝIvantiÅû¶£¬ÔÚ·ì϶¹«¿ªÖ®Ê±Ö»Óм«ÉÙÊý¿Í»§Êܵ½Ó°Ï죬µ«µÚÈý·½ÔÚ·ì϶Åû¶ºó²»¾Ã±ãÌṩÁ˸ÅÏëÑéÖ¤·¨Ê½£¬´ó´óÔö³¤ÁËÕûÌå·çÏÕ¡£Îª´Ë£¬Ivanti¶½´ÙËùÓпͻ§¾¡¿ìÀûÓò¹¶¡£¬²¢°ä²¼ÁËÒ»¿îȫеÄRPM¼ì²â¹¤¾ß£¬Ô®ÊÖ¿Í»§²é³ÊÇ·ñ´æÔÚDZÔڵķì϶ÀûÓ᣸ù¤¾ßͨ¹ýɨÃèÒÑÖªÈëÇÖÖ¸±ê²¢ÌìÉú¹©°²È«ÍŶÓÉó²éµÄÈÕÖ¾£¬¸¨ÖúÅжÏϵͳÊÇ·ñÒѱ»ÈëÇÖ¡£Æ¾¾ÝÓµÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁîBOD 22-01£¬Áª¹ú»ú¹¹±ØÐëÔÚ2026Äê4ÔÂ11ÈÕ֮ǰʵÏָ÷ì϶µÄ½¨¸´¹¤×÷£¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜÀûÓá£
https://securityaffairs.com/190519/security/u-s-cisa-adds-a-flaw-in-ivanti-epmm-to-its-known-exploited-vulnerabilities-catalog-2.html
6. ºÉÀ¼Ò½ÁÆÈí¼þ¹©¸øÉÌChipSoftÔâÀÕË÷¹¥»÷
4ÔÂ8ÈÕ£¬ºÉÀ¼Ò½ÁƱ£½¡Èí¼þ¹©¸øÉÌChipSoft½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäϵͳ̱»¾£¬¹Ù·½ÍøÕ¾×Ô4ÔÂ7ÈÕÆð³ÖÐøå´»úÎÞ·¨½Ó¼û¡£¸Ã¹«Ë¾ÎªÒ½ÔºÌṩ»¼Õ߼ͼÈí¼þ£¬·þÎñÁìÓò¸²¸ÇºÉÀ¼È«¹úÔ¼80%µÄÒ½ÁÆ»ú¹¹£¬Õâ´Î¹¥»÷¶Ô±¾¹úÒ½ÁÆÏµÍ³Ôì³ÉÁË¿í·º³å»÷¡£ºÉÀ¼Ò½ÁƱ£½¡ÐÐÒµÍÆËã»úÓ¦¼±ÏìÓ¦Ó××éZ-CERTÔÚÒ»·ÝÕ÷ѯ»ã±¨ÖÐ֤ʵÁËÕâ´Î¹¥»÷µÄÀÕË÷Èí¼þÐÔÖÊ£¬²¢°µÊ¾ÕýÓëChipSoft¡¢Ò½ÁÆ»ú¹¹¼°ºÏ×÷ͬ°éά³ÖÁªÏµ£¬ÖÂÁ¦ÆÀ¹ÀÊÂÎñµÄÓ°ÏìÁìÓò¡£Ö»¹ÜChipSoftÃæÏò¹«¼ÒµÄ·þÎñÊܵ½ÑϳÁ×ÌÈÅ£¬µ«´óÎÞÊýÒ½ÔºÈÔ¿ÉÄÜʹÓÃÆä»¼ÕßÃÅ»§ÍøÕ¾¡£ÓÉÓÚChipSoftÈí¼þµÄʹÓ÷½Ê½Òò¿Í»§¶øÒ죬²¿ÃÅÒ½Ôº½«ÆäÓÃÓÚ¸üÈ«ÃæµÄ¼Í¼±£Áô£¬ÊÜÓ°Ïìˮƽ¸üÉî¡£¾Ý±¾µØÐÂÎÅýÌåNOSµ÷²é£¬¹²ÓÐ11¼ÒÒ½Ôº½«ÆäÈí¼þÏÂÏߣ¬ÆäÖÐ9¼ÒÊǸÃÈí¼þʹÓýÏΪ¿í·ºµÄ»ú¹¹¡£Ä¿Ç°£¬Õâ´Î¹¥»÷±³ºóµÄÀÕË÷×éÖ¯Éв»Ã÷È·¡£Õë¶Ô²»°²ÈëÇÖµÄÒ½ÔººÍÆäËûÒ½ÁƱ£½¡ºÏ×÷ͬ°é£¬Z-CERT½¨ÒéÉóºËChipSoftϵͳÊÇ·ñ´æÔÚÒì³£Á÷Á¿£¬²¢Í¨¹ýÆä»ã±¨ÈÈÏßÅû¶ÈκοÉÒÉÇé¿ö¡£
https://www.theregister.com/2026/04/08/chipsoft_ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ