´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷

Ðû²¼Ê±¼ä 2025-07-22

1. ´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬´÷¶û¿Æ¼¼¹«Ë¾¿ËÈÕÈ·ÈÏÆä¿Í»§½â¾ö¼Æ»®ÖÐÐÄÆ½Ì¨ÔâÓöÍøÂçÇå¾²ÈëÇÖ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßΪ½üÆÚÖØ×éµÄÀÕË÷×éÖ¯World Leaks£¨Ç°ÉíΪHunters International£©¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ±¬·¢ÓÚ2025Äê7Ô³õ£¬£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸´÷¶ûÓÃÓÚÉÌÒµ¿Í»§²úÆ·ÑÝʾ¼°¿´·¨ÑéÖ¤²âÊԵĸôÀëÇéÐΡ£¡£¡£¡£¡£¡£Ö»¹ÜÍþвÐÐΪÕßÀÖ³ÉÍ»ÆÆ¸Ãƽ̨£¬£¬£¬£¬£¬£¬µ«´÷¶ûÇ¿µ÷ÆäÑÏ¿áµÄÇå¾²¼Ü¹¹ÓÐÓÃÏÞÖÆÁËËðʧ¹æÄ££¬£¬£¬£¬£¬£¬¿Í»§ÏµÍ³¼°ÄÚ²¿ÍøÂçδÊܲ¨¼°¡£¡£¡£¡£¡£¡£¾ÝÅû¶£¬£¬£¬£¬£¬£¬ÈëÇÖÊÂÎñÖб»µÁÊý¾ÝÖ÷Òª°üÀ¨ºÏ³É²âÊÔÊý¾Ý¡¢¹ûÕæÑÝʾÊý¾Ý¼¯¼°·ÇÃô¸ÐϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬Î¨Ò»Éæ¼°ÕæÊµÄÚÈݵĽöΪһ·ÝÓâÆÚÁªÏµÈËÃûµ¥£¬£¬£¬£¬£¬£¬´÷¶û³ÆÆä"ÔËÓª¼ÛÖµ¼«µÍ"¡£¡£¡£¡£¡£¡£¸Ãƽ̨×÷Ϊ×ÔÁ¦ÔËÐеÄÑÝʾÇéÐΣ¬£¬£¬£¬£¬£¬ÓëÉú²úÍøÂç¡¢¿Í»§Êý¾Ý´æ´¢¿â¼°ÏàÖúͬ°éϵͳÍêÈ«¸ôÀ룬£¬£¬£¬£¬£¬²¢ÉèÓÐÃ÷ȷեȡÉÏ´«Ãô¸ÐÊý¾ÝµÄЭÒé¡£¡£¡£¡£¡£¡£´÷¶ûÇå¾²ÍŶÓÌåÏÖ£¬£¬£¬£¬£¬£¬¶àÖØÍøÂç·Ö¶ÎºÍ¼à¿Ø»úÖÆÔÚÊÂÎñÖÐʩչÁËÒªº¦×÷Ó㬣¬£¬£¬£¬£¬ÏÖÔÚÕýÒ»Á¬ÊӲ칥»÷·¾¶£¬£¬£¬£¬£¬£¬µ«ÉÐδ·¢Ã÷¿Í»§Êý¾Ý»ò½¹µãϵͳÊÜÓ°ÏìµÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/dell-data-breach/


2. µÏ°Â×îÏÈÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úÉÝ³ÞÆ·ÅƵϰ£¨Dior£©¿ËÈÕÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬Õ¹ÏÖÆäÓÚ2025Äê1ÔÂ26ÈÕÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Î´¾­ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£×÷ΪȫÇò×î´óÉÝ³ÞÆ·¼¯ÍÅLVMHÆìϽ¹µãÆ·ÅÆ£¬£¬£¬£¬£¬£¬µÏ°ÂÄêÊÕÈ볬120ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬ÔÚÈ«ÇòÔËÓªÊý°Ù¼Ò¾«Æ·µê£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒý·¢¶ÔÆäÊý¾ÝÇå¾²ÖÎÀíµÄ¹Ø×¢¡£¡£¡£¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬£¬µÏ°ÂÓÚ2025Äê5ÔÂ7ÈÕ·¢Ã÷Êý¾Ý¿âÔâÈëÇÖ£¬£¬£¬£¬£¬£¬Ëæ¼´Æô¶¯ÄÚ²¿ÊӲ졣¡£¡£¡£¡£¡£ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡Á˰üÀ¨È«Ãû¡¢ÁªÏµ·½·¨¡¢ÏÖʵµØµã¡¢³öÉúÈÕÆÚ£¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄ»¤ÕÕ/Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢Éç»áÇå¾²ºÅÂëµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÒøÐÐÕË»§»òÖ§¸¶¿¨µÈ²ÆÎñÊý¾Ý¡£¡£¡£¡£¡£¡£µÏ°ÂÇ¿µ÷ÒÑѸËÙ½ÓÄÉ¿ØÖƲ½·¥£¬£¬£¬£¬£¬£¬ÏÖÔÚÎÞÖ¤¾ÝÅúעϵͳ±»Ò»Á¬ÈëÇÖ£¬£¬£¬£¬£¬£¬²¢ÒÑִ֪ͨ·¨²¿·Ö¼°Ô¼ÇëµÚÈý·½ÍøÂçÇ徲ר¼ÒЭÖúÓ¦¶Ô¡£¡£¡£¡£¡£¡£Îª»º½âÓ°Ï죬£¬£¬£¬£¬£¬µÏ°ÂΪÊÜÓ°ÏìÓû§ÌṩÃâ·Ñ24¸öÔÂÐÅÓÃ¼à¿ØÓëÉí·Ý͵ÇÔ±£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬Í¬Ê±½¨Òé¿Í»§Ð¡ÐÄÕ©Æ­¡¢ÍøÂç´¹ÂÚ¼°½ðÈÚÕË»§Òì³£»£»£»£»£»î¶¯¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/


3. Ó¡¶È¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX 4420ÍòÃÀÔª¼ÓÃÜ×ʲú±»µÁ


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ó¡¶ÈÍ·²¿¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX¿ËÈÕÈ·ÈÏ£¬£¬£¬£¬£¬£¬ÆäÒ»¸öÄÚ²¿ÔËÓªÕË»§ÔâÓöÇå¾²Îó²î£¬£¬£¬£¬£¬£¬µ¼Ö¼ÛÖµÔ¼4420ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¡£¡£¡£¡£¡£¾ÝCoinDCXÁªºÏÊ×´´È˼æÊ×ϯִÐйÙSumit GuptaÔÚXƽ̨Åû¶£¬£¬£¬£¬£¬£¬±»ÈëÇÖÕË»§½öÓÃÓÚÔÚÏàÖúÉúÒâËùÌṩÁ÷¶¯ÐÔ£¬£¬£¬£¬£¬£¬ÊôÓÚÄÚ²¿ÔËÓªÕË»§£¬£¬£¬£¬£¬£¬Óë¿Í»§×ʽðÍêÈ«¸ôÀë¡£¡£¡£¡£¡£¡£ËûÇ¿µ÷£¬£¬£¬£¬£¬£¬ËùÓпͻ§×ʲú¾ùδÊÜÓ°Ï죬£¬£¬£¬£¬£¬Î£º¦³¨¿ÚÓɹ«Ë¾×ÔÓÐ×ʽ𴢱¸¼ç¸º¡£¡£¡£¡£¡£¡£¼ÓÃÜÇå¾²Ñо¿Ô±ZachXBTͨ¹ýTelegramƵµÀ½øÒ»²½ÆÊÎö£¬£¬£¬£¬£¬£¬¹¥»÷Õߵصã×î³õͨ¹ýTornado Cash»ì±ÒЧÀÍ»ñµÃ1öÒÔÌ«·»£¨ETH£©×ÊÖú£¬£¬£¬£¬£¬£¬Ëæºó½«²¿·Ö±»µÁ×ʽð¾­Solana-ÒÔÌ«·»¿çÁ´ÇÅ×ªÒÆ£¬£¬£¬£¬£¬£¬×îÖպϲ¢Îª4,443öETHºÍ155,830öSolana£¨SOL£©£¬£¬£¬£¬£¬£¬ÏÖÔÚ´¦ÓÚÐÝÃß״̬¡£¡£¡£¡£¡£¡£CoinDCXÌåÏÖÕýÓëÓ¡¶ÈÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-In£©¼°ÏàÖúÉúÒâËùЭͬÊӲ졣¡£¡£¡£¡£¡£Îª¼ÓËÙ×ʽð×·»Ø£¬£¬£¬£¬£¬£¬CoinDCXÓÚÖÜÒ»Æô¶¯¡°×·»ØÉͽð¡±ÍýÏ룬£¬£¬£¬£¬£¬ÔÊÐíÏòЭÖú×·×Ù»òÕһر»µÁ×ʲúµÄСÎÒ˽¼Ò»ò»ú¹¹Ìṩ×î¸ß25%µÄ×·»Ø½ð¶î×÷Ϊ½±Àø¡£¡£¡£¡£¡£¡£


https://techcrunch.com/2025/07/21/indian-crypto-exchange-coindcx-confirms-44-million-stolen-during-hack/


4. ÒÁÀʹØÁª°²×¿Ìع¤Èí¼þDCHSpyαװ³ÉVPN¼à¿ØÄ¿µÄÈËÊ¿


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һ¿îÓëÒÁÀÊÇ鱨ÓëÇå¾²²¿£¨MOIS£©Ïà¹ØµÄÐÂÐͰ²×¿Ìع¤Èí¼þDCHSpy£¬£¬£¬£¬£¬£¬¸ÃÈí¼þͨ¹ýαװ³ÉVPNÓ¦Óü°SpaceXÐÇÁ´£¨Starlink£©ÎÀÐÇ»¥ÁªÍøÐ§ÀÍ£¬£¬£¬£¬£¬£¬Õë¶ÔÖж«µØÇøÓû§ÊµÑ鶨Ïò¹¥»÷¡£¡£¡£¡£¡£¡£Òƶ¯Çå¾²¹©Ó¦ÉÌLookoutÖ¸³ö£¬£¬£¬£¬£¬£¬DCHSpyÑù±¾×îÔçÓÚ2024Äê7Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬Æä¿ª·¢ÕßΪÒÁÀʹú¼ÒÅä¾°ºÚ¿Í×éÖ¯MuddyWater£¨ÓÖÃûBoggy Serpens¡¢TA450µÈ£©£¬£¬£¬£¬£¬£¬½üÆÚÔÚÒÔÉ«ÁÐ-ÒÁÀʳåÍ»±¬·¢ºóÒ»ÖÜÄÚ·ºÆðбäÖÖ£¬£¬£¬£¬£¬£¬ÌåÏÖÆä»î¶¯ÓëµØÇøÊ±ÊÆÏ¸ÃܹØÁª¡£¡£¡£¡£¡£¡£DCHSpy뻀 £¿£¿£¿£¿£¿£¿é»¯Ä¾Âí£¬£¬£¬£¬£¬£¬¾ß±¸¶àÏîÊý¾ÝÇÔÈ¡¹¦Ð§£¬£¬£¬£¬£¬£¬°üÀ¨ÍøÂçWhatsAppÐÅÏ¢¡¢ÕË»§Æ¾Ö¤¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼¡¢Î»ÖÃÊý¾Ý£¬£¬£¬£¬£¬£¬²¢¿ÉÔ¶³Ì¼Òô¡¢ÕÕÏ༰ÇÔÈ¡Îļþ¡£¡£¡£¡£¡£¡£ÔçÆÚ°æ±¾Í¨¹ýTelegramÇþµÀÈö²¥£¬£¬£¬£¬£¬£¬ÒÔ×èµ²ÒÁÀÊÕþȨµÄÖ÷ÌâÄÚÈÝΪÓÕ¶ü£¬£¬£¬£¬£¬£¬Õë¶ÔÓ¢ÓïºÍ²¨Ë¹ÓïÓû§£¬£¬£¬£¬£¬£¬Ä¿µÄȺÌåÒÉËÆÎªÒìÒéÈËÊ¿¡¢»î¸ÐÈËÊ¿¼°¼ÇÕß¡£¡£¡£¡£¡£¡£×îбäÖÖÔò½øÒ»²½Éý¼¶Èö²¥ÊֶΣ¬£¬£¬£¬£¬£¬Î±×°³É¡°Earth VPN¡±¡°Comodo VPN¡±¡°Hide VPN¡±µÈ¿´ËÆÊÊÓõÄVPNÓ¦Ó㬣¬£¬£¬£¬£¬ÉõÖÁʹÓá°starlink_vpn(1.3.0).apk¡±ÎļþÃûÄ£ÄâÐÇÁ´Ð§À;ÙÐзַ¢¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬ÐÇÁ´ÎÀÐÇ»¥ÁªÍøÐ§ÀÍÉÏÔ¸ÕÔÚÒÁÀÊÕþ¸®ÊµÑéÍøÂç·â±Õʱ´ú±»¼¤»î£¬£¬£¬£¬£¬£¬Ëæºó¸Ã¹úÒé»á½«Æä²»·¨»¯£¬£¬£¬£¬£¬£¬´Ë´Î¶ñÒâÈí¼þ½èÐÇÁ´ÃûÒåÈö²¥£¬£¬£¬£¬£¬£¬»òÖ¼ÔÚʹÓÃÓû§¶ÔÊÜÏÞЧÀÍµÄÆÈÇÐÐèÇ󡣡£¡£¡£¡£¡£


https://thehackernews.com/2025/07/iran-linked-dchspy-android-malware.html


5. ÍøÂç´¹ÂÚʹÓÃ.LNKÎļþÓëLOLBinÊÖÒÕÈö²¥DeerStealer¶ñÒâÈí¼þ


7ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÐÂÐÍÖØ´óÍøÂç´¹Âڻ±»ÆØ¹â£¬£¬£¬£¬£¬£¬Æäͨ¹ýÎäÆ÷»¯µÄWindows¿ì½Ý·½·¨Îļþ£¨.LNK£©Èö²¥DeerStealer¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ê¹Óá°Living off the Land¡±£¨LOLBin£©ÊÖÒÕŲÓÃÕýµ±ÏµÍ³¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬¹¹½¨¶à½×¶Î¹¥»÷Á´ÒÔÈÆ¹ý¹Å°åÇå¾²·À»¤¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÉLinkedInÆÊÎöʦ¼°Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÒòÆä½ÓÄɸ߽׹æ±ÜÕ½ÂÔ²¢ÀÄÓÃ΢ÈíÔ­Éú¹¤¾ß£¬£¬£¬£¬£¬£¬±»ÊÓΪ¶ñÒâÈí¼þת´ï»úÖÆµÄÖØ´óÑݽø¡£¡£¡£¡£¡£¡£¹¥»÷ÒÔαװ³É¡°Report.lnk¡±µÄÕýµ±PDFÎĵµÎªÆðµã£¬£¬£¬£¬£¬£¬ÏÖʵ´¥·¢È«ÐÄÉè¼ÆµÄÎå½×¶ÎÖ´ÐÐÁ´£º.LNKÎļþÊ×ÏÈÉñÃØÅ²ÓÃMicrosoft HTMLÓ¦ÓóÌÐòÖ÷»úmshta.exe£¬£¬£¬£¬£¬£¬Í¨¹ý¶¯Ì¬ÆÊÎöSystem32Ŀ¼·¾¶²¢×¢Èë»ìÏýµÄBase64¾ç±¾£¬£¬£¬£¬£¬£¬½ûÓÃÈÕÖ¾¼Í¼ÓëÆÊÎö¹¦Ð§ÒÔ½µµÍ·¨Ò½¿É¼ûÐÔ¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬¹¥»÷Á´ÒÀ´Î¾­cmd.exe¡¢PowerShell²ã²ãµÝ½ø£¬£¬£¬£¬£¬£¬×îÖÕÔÚAppDataĿ¼¾²Ä¬°²ÅÅDeerStealerÖ÷³ÌÐò¡£¡£¡£¡£¡£¡£ÎªÊèÉ¢Êܺ¦Õß×¢ÖØÁ¦£¬£¬£¬£¬£¬£¬ÏµÍ³Í¬Ê±ÏÂÔØ²¢·­¿ªÕýµ±PDFÓÕ¶üÎļþ£¬£¬£¬£¬£¬£¬ÑÚÊζñÒâÈí¼þ×°ÖÃÐÐΪ¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/deerstealer-malware-delivered/


6. °ÙÄêÎïÁ÷¾ÞÍ·ÒòÃÜÂëй¶ÔâÀÕË÷¹¥»÷ÐÝÒµ


7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ó¢¹ú±±°²ÆÕ¶Ø¿¤°ÙÄêÔËÊäÆóÒµKNP LogisticsÒòAkiraÀÕË÷Èí¼þ¹¥»÷ÏÝÈëÐÝÒµÖÎÀí£¬£¬£¬£¬£¬£¬µ¼ÖÂ730ÃûÔ±¹¤Ê§Òµ£¬£¬£¬£¬£¬£¬³ÉΪ2024ÄêÓ¢¹úÆóÒµÔâÓöÍøÂç¹¥»÷µÄ±ê¼ÇÐÔ°¸Àý¡£¡£¡£¡£¡£¡£Õâ¼Ò½¨ÉèÓÚ1865ÄêµÄ¼Ò×åÆóÒµ£¬£¬£¬£¬£¬£¬ÓÚÎôʱ6ÔÂÒòÔ±¹¤ÃÜÂëй¶±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÍÆ²â¼òµ¥ÕË»§Æ¾Ö¤ÀÖ³ÉÉøÍ¸ÏµÍ³£¬£¬£¬£¬£¬£¬°²ÅÅÀÕË÷Èí¼þ¼ÓÃÜÒªº¦Êý¾Ý²¢Ë÷ÒªÔ¼500ÍòÓ¢°÷Êê½ð¡£¡£¡£¡£¡£¡£Ö»¹ÜKNPδ֧¸¶Êê½ð£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÈÔ³¹µ×̱»¾ÆäÔËÓª¡¢²ÆÎñ¼Í¼»á¼û¼°ÐÂ×ʽð»ñÈ¡ÄÜÁ¦£¬£¬£¬£¬£¬£¬×îÖÕÆÈʹÕâ¼ÒÓµÓÐ158ÄêÀúÊ·µÄÆóÒµµ¹±Õ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÁËÖÐСÆóÒµÍøÂçÇå¾²·À»¤µÄÖÂÃüÈõµã¡£¡£¡£¡£¡£¡£KNPÖ÷¹Ü±£ÂÞ¡¤°¢²©ÌØÍ¸Â¶£¬£¬£¬£¬£¬£¬ÉæÊÂÔ±¹¤ÖÁ½ñδ±»¼û¸æÆäÃÜÂëй¶ֱ½Óµ¼Ö¹«Ë¾Í߽⣬£¬£¬£¬£¬£¬Í¹ÏÔÍøÂç¹¥»÷¶ÔÔ±¹¤ÐÄÀíµÄ¶þ´ÎΣÏÕ¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÇ¿µ÷£¬£¬£¬£¬£¬£¬»ù´¡ÃÜÂëÇå¾²ÈÔÊÇÖ÷Òª·ÀµØ£¬£¬£¬£¬£¬£¬96%µÄ³£ÓÃÃÜÂë¿ÉÔÚ1ÃëÄÚ±»ÆÆ½â¹¤¾ß¹¥ÆÆ£¬£¬£¬£¬£¬£¬¶øÔ±¹¤¿çÕË»§Öظ´Ê¹ÓÃÃÜÂëµÄϰ¹ß½øÒ»²½¼Ó¾çΣº¦¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/weak-password-destroy-158-year-old-company/