ÂíÈøÖîÈûÖÝ×ÅÃûҽԺϵͳÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2026-04-09

1. ÂíÈøÖîÈûÖÝ×ÅÃûҽԺϵͳÔâÍøÂç¹¥»÷


4ÔÂ7ÈÕ£¬£¬ £¬£¬£¬ÃÀ¹úÂíÈøÖîÈûÖÝ×ÅÃûÒ½ÁÆ»ú¹¹Signature Healthcare¼°Æä²¼Â޿˶ÙÒ½Ôº¿ËÈÕÔâÊÜÍøÂç¹¥»÷£¬£¬ £¬£¬£¬µ¼Ö¶à¸öÐÅϢϵͳÊÜË𣬣¬ £¬£¬£¬Ò½Ôº±»ÆÈ¾Ü¾ø¾È»¤³µ½øÈ룬£¬ £¬£¬£¬²¢Æô¶¯ÁËÍ £»£»£»£»£»£»£»úά»¤³ÌÐò¡£¡£¡£¸ÃҽԺϵͳÒÑÔËÓªÁè¼Ý125Ä꣬£¬ £¬£¬£¬Îª²¼Â޿˶ټ°²¨Ê¿¶Ù½¼Çø¶à¸ö¶¼»áµÄÊýÊ®ÍòסÃñÌṩЧÀÍ¡£¡£¡£Ôº·½ÌåÏÖ£¬£¬ £¬£¬£¬ÔÚ·¢Ã÷ÍøÂ粿·ÖÇøÓò±£´æ¿ÉÒɻºó£¬£¬ £¬£¬£¬Á¬Ã¦Æô¶¯ÁËÊÂÎñÏìӦЭÒ飬£¬ £¬£¬£¬ÒÔÈ·±£¸ßÖÊÁ¿µÄ»¼ÕßÕչ˻¤Ê¿ºÍÇå¾²¡£¡£¡£Êܴ˴ι¥»÷Ó°Ï죬£¬ £¬£¬£¬ËäȻסԺ¡¢¼±ÕïЧÀͺÍÔ¤Ô¼ÊÖÊõÈÔ¼ÌÐø¾ÙÐУ¬£¬ £¬£¬£¬µ«Ò½ÔºÔÚÖܶþ²»µÃ²»×÷·ÏÁ˰©Ö¢»¼ÕߵϝÁÆÊäҺЧÀÍ£¬£¬ £¬£¬£¬²¢ÖÒÑÔ³ÆÓÉÓÚÊÖÒÕ¹ÊÕÏ£¬£¬ £¬£¬£¬»¼Õß¾ÍÕï½«ÃæÁÙÑÓÎ󡣡£¡£×èÖ¹Öܶþ£¬£¬ £¬£¬£¬ÉÐÎÞÈκκڿÍ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£ÕâÆðÊÂÎñ²¢·ÇÁæØê°¸Àý£¬£¬ £¬£¬£¬½ñÄêÒÔÀ´£¬£¬ £¬£¬£¬ÃÀ¹ú¶à¼ÒÒ½ÔºÒÑÒòÍøÂç¹¥»÷±»ÆÈ×÷·ÏÔ¤Ô¼²¢ÏÞÖÆÐ§ÀÍ¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬Health ISAC¼ÌÐøÓëÎÀÉúÓ빫ÖÚЧÀͲ¿ºÍÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾ÖµÈÁª°î»ú¹¹¼á³ÖÐÅÏ¢¹²ÏíÇþµÀ£¬£¬ £¬£¬£¬ÒÔÈ·±£Ò½ÁƱ£½¡¹«Ë¾Äܹ»ÊµÊ±»ñµÃÏà¹ØÍþвÇ鱨¡£¡£¡£


https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack


2. ÒÁÀʹØÁªºÚ¿Í´ó¹æÄ£Ãé×¼ÃÀ¹úÒªº¦»ù´¡ÉèÊ©PLC


4ÔÂ7ÈÕ£¬£¬ £¬£¬£¬ÃÀ¹ú¶à¸öÁª°î»ú¹¹°üÀ¨Áª°îÊÓ²ì¾Ö£¨FBI£©¡¢ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¡¢¹ú¼ÒÇå¾²¾Ö£¨NSA£©¡¢ÇéÐα £»£»£»£»£»£»£»¤Êð£¨EPA£©¡¢ÄÜÔ´²¿£¨DOE£©ÒÔ¼°ÃÀ¹úÍøÂç˾ÁîÊÖÏÂÊôµÄÍøÂç¹ú¼ÒʹÃü²½¶Ó£¨CNMF£©ÁªºÏÐû²¼ÁËÒ»·ÝÖÒÑÔͨ¸æ£¬£¬ £¬£¬£¬Ö¸³öÓëÒÁÀÊÓйØÁªµÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯ÕýÒÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©ÍøÂçÖÐ̻¶ÓÚ»¥ÁªÍøµÄÂÞ¿ËΤ¶û/°¬Â×-²¼À­µÂÀû¿É±à³ÌÂß¼­¿ØÖÆÆ÷£¨PLC£©ÎªÄ¿µÄ£¬£¬ £¬£¬£¬·¢¶¯Ò»Á¬¹¥»÷¡£¡£¡£Í¨¸æ³Æ£¬£¬ £¬£¬£¬×Ô2026Äê3ÔÂÒÔÀ´£¬£¬ £¬£¬£¬ÕâЩ¹¥»÷ÒѶÔÃÀ¹úÕþ¸®Ð§ÀͺÍÉèÊ©¡¢Ë®ºÍ·Ïˮϵͳ¡¢ÄÜÔ´µÈ¶à¸öÒªº¦»ù´¡ÉèÊ©²¿·ÖÔì³ÉÁ˾­¼ÃËðʧºÍÔËÓªÖÐÖ¹¡£¡£¡£¹¥»÷ÕßµÄÒâͼ°üÀ¨¶ñÒâ¸Ä¶¯ÏîÄ¿Îļþ£¬£¬ £¬£¬£¬ÒÔ¼°Ê¹ÓÃÈË»ú½çÃæ£¨HMI£©ºÍ¼à¿ØÓëÊý¾ÝÊÕÂÞ£¨SCADA£©ÏµÍ³ÏÔʾÆÁÉÏÏÔʾµÄÊý¾Ý¡£¡£¡£FBIÆÀ¹ÀÒÔΪ£¬£¬ £¬£¬£¬Õë¶ÔÃÀ¹ú×éÖ¯µÄÕâЩ¹¥»÷»î¶¯×î½üÓÐËùÉý¼¶£¬£¬ £¬£¬£¬ºÜ¿ÉÄÜÊǶÔÒÁÀÊÓëÃÀ¹úºÍÒÔÉ«ÁÐÖ®¼ä³ðÊÓÐж¯µÄ»ØÓ¦¡£¡£¡£Îª·ÀÓù´ËÀ๥»÷£¬£¬ £¬£¬£¬ÁªºÏͨ¸æÏòÍøÂç·ÀÓùÖ°Ô±Ìá³öÁËһϵÁн¨Ò飺Ӧ½«PLCÓ뻥ÁªÍø¶Ï¿ªÅþÁ¬»òʹÓ÷À»ðǽ¼ÓÒÔ± £»£»£»£»£»£»£»¤µÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/


3. SaaS¼¯³ÉÉÌAnodotÈëÇÖÊÂÎñ²¨¼°¶à¼Ò¹«Ë¾


4ÔÂ7ÈÕ£¬£¬ £¬£¬£¬Ò»¼ÒÈí¼þ¼´Ð§ÀÍ£¨SaaS£©¼¯³ÉÌṩÉÌÔâÓöÇå¾²ÈëÇÖ£¬£¬ £¬£¬£¬µ¼ÖÂÉí·ÝÑéÖ¤ÁîÅÆ±»µÁ£¬£¬ £¬£¬£¬ËæºóÊ®Óà¼Ò¹«Ë¾ÔâÊÜÁËÊý¾Ý͵ÇÔ¹¥»÷¡£¡£¡£ËäÈ»¶à¼ÒÔÆ´æ´¢ºÍSaaS¹©Ó¦É̾ù³ÉΪ±»µÁÁîÅÆµÄ¹¥»÷Ä¿µÄ£¬£¬ £¬£¬£¬µ«´ó´ó¶¼Êý¾Ý͵ÇÔ¹¥»÷Ö÷ÒªÕë¶ÔÔÆÊý¾Ýƽ̨Snowflake¡£¡£¡£Snowflake֤ʵÁË¡°Òì³ £»£»£»£»£»£»£»î¶¯¡±µÄ±£´æ£¬£¬ £¬£¬£¬²¢ÌåÏÖÆäÉÙÊý¿Í»§Êܵ½ÁËÓ°Ïì¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬ £¬£¬£¬×î½üÔÚÉÙÊý¿Í»§ÕË»§Öмì²âµ½ÓëÌØ¶¨µÚÈý·½¼¯³ÉÏà¹ØµÄÒì³ £»£»£»£»£»£»£»î¶¯£¬£¬ £¬£¬£¬Ëæ¼´Á¬Ã¦Õö¿ªÊӲ죬£¬ £¬£¬£¬²¢³öÓÚÉóÉ÷˼Á¿¶³½áÁË¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§ÕË»§£¬£¬ £¬£¬£¬Í¬Ê±Í¨ÖªÁËÏà¹Ø¿Í»§²¢ÌṩԤ·ÀÐÔÖ¸µ¼¡£¡£¡£SnowflakeÇ¿µ÷£¬£¬ £¬£¬£¬ÕâЩ¹¥»÷²¢Î´Ôì³ÉÆä×ÔÉíϵͳµÄÈκÎÎó²î»òË𺦡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬£¬¹¥»÷ÕßÔøÊÔͼʹÓñ»µÁµÄÉí·ÝÑéÖ¤ÁîÅÆ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬£¬µ«ÔÚÀÖ³É֮ǰ¼´±»¼ì²â·¢Ã÷¡£¡£¡£¾Ý¶à¸öÐÂÎÅȪԴ»ñϤ£¬£¬ £¬£¬£¬ÕâЩ¹¥»÷Ô´ÓÚÊý¾ÝÒì³£¼ì²â¹«Ë¾AnodotµÄÒ»ÆðÇå¾²ÊÂÎñ¡£¡£¡£ShinyHunters×é֤֯ʵÁËÆäÐÐΪ£¬£¬ £¬£¬£¬Éù³ÆÉÏÖÜÎå´ÓÊýÊ®¼Ò¹«Ë¾ÇÔÈ¡ÁËÊý¾Ý£¬£¬ £¬£¬£¬²¢È·ÈÏÔøÊÔͼ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬£¬µ«ÌåÏÖ±»È˹¤ÖÇÄܼì²âϵͳ×èµ²¡£¡£¡£¹¥»÷Õß»¹Éù³Æ´Ë´Î¹¥»÷Ô´ÓÚAnodotµÄÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬ÌåÏÖËûÃÇ¿ÉÄÜÒÑÈëÇָù«Ë¾Ò»¶Îʱ¼ä¡£¡£¡£


https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/


4. UNC6783ÍþвÐÐΪÕßÈëÇÖBPOÌṩÉÌ


4ÔÂ8ÈÕ£¬£¬ £¬£¬£¬Ò»¸öÃûΪUNC6783µÄÍþвÐÐΪÕßÕýͨ¹ýÈëÇÖÓªÒµÁ÷³ÌÍâ°ü£¨BPO£©ÌṩÉÌ£¬£¬ £¬£¬£¬»ñÈ¡¶Ô¶à¸öÐÐÒµ¸ß¼ÛÖµ¹«Ë¾µÄ´ó¹æÄ£»á¼ûȨÏÞ¡£¡£¡£¾Ý¹È¸èÍþвÇ鱨С×飨GTIG£©Åû¶£¬£¬ £¬£¬£¬ÒÑÓÐÊýÊ®¼ÒÆóҵʵÌå³ÉΪÕâÖÖ¹¥»÷ÊֶεÄÄ¿µÄ£¬£¬ £¬£¬£¬Ãô¸ÐÊý¾Ý±»ÇÔÈ¡²¢ÓÃÓÚÀÕË÷¡£¡£¡£GTIGÊ×ϯÍþвÆÊÎöʦAustin LarsenÌåÏÖ£¬£¬ £¬£¬£¬UNC6783ͨ³£ÒÀÀµÉç»á¹¤³ÌºÍÍøÂç´¹ÂڻÀ´ÈëÇÖÓëÄ¿µÄ¹«Ë¾ÏàÖúµÄBPO¹«Ë¾£¬£¬ £¬£¬£¬ÓÐʱҲ»áÖ±½ÓÁªÏµÄ¿µÄ×éÖ¯ÄÚ²¿µÄÖ§³ÖºÍ×ÊÖųְ́Ա£¬£¬ £¬£¬£¬ÊÔͼ»ñȡֱ½Ó»á¼ûȨÏÞ¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬ £¬£¬£¬UNC6783¿ÉÄÜÓëÒ»¸ö¼ÙÃû¡°Raccoon¡±µÄÄäÃûÍþвÐÐΪÕßÓйØ£¬£¬ £¬£¬£¬ºóÕß´ËÇ°ÔøÒÔ¶à¼ÒΪ´óÐ͹«Ë¾ÌṩЧÀ͵ÄBPO¹«Ë¾ÎªÄ¿µÄ¡£¡£¡£ÔÚͨ¹ýʵʱ̸ÌìÌᳫµÄÉç»á¹¤³Ì¹¥»÷ÖУ¬£¬ £¬£¬£¬¹¥»÷Õß»áָʾ֧³ÖÖ°Ô±»á¼ûÍйÜÔÚÄ£ÄâÄ¿µÄ¹«Ë¾ÓòÃûÉϵÄαÔìOktaµÇÂ¼Ò³Ãæ£¬£¬ £¬£¬£¬ÕâЩÓòÃû×ñÕÕÌØ¶¨Ä£Ê½¡£¡£¡£LarsenÖ¸³ö£¬£¬ £¬£¬£¬ÕâЩ¹¥»÷Öа²ÅŵÄÍøÂç´¹ÂÚ¹¤¾ß°üÄܹ»ÇÔÈ¡¼ôÌù°åÄÚÈÝ£¬£¬ £¬£¬£¬´Ó¶øÈƹý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©± £»£»£»£»£»£»£»¤£¬£¬ £¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»½«Æä×°±¸×¢²áµ½×éÖ¯ÖС£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬¹È¸è»¹ÊӲ쵽UNC6783É¢²¼ÐéαÇå¾²¸üÐÂÒÔÈö²¥Ô¶³Ì»á¼û¶ñÒâÈí¼þ¡£¡£¡£ÔÚÀÖ³ÉÇÔÈ¡Ãô¸ÐÊý¾Ýºó£¬£¬ £¬£¬£¬¹¥»÷Õß»áͨ¹ýProtonMailµØµãÁªÏµÊܺ¦ÕßË÷ҪǮ²Æ£¬£¬ £¬£¬£¬ÒԴ˾ÙÐÐÀÕË÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets/


5. CISA½«Ivanti EPMMÑÏÖØÎó²î¼ÓÈëÒÑ֪ʹÓÃĿ¼


4ÔÂ8ÈÕ£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ivanti Endpoint Manager Mobile£¨EPMM£©Öз¢Ã÷µÄÒ»¸öÑÏÖØÎó²îÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬ £¬£¬£¬¸ÃÎó²î±àºÅΪCVE-2026-1340£¬£¬ £¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.8¡£¡£¡£ÕâÒ»´úÂë×¢ÈëÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬ £¬£¬£¬ÇÒIvanti¹«Ë¾ÒÑÈ·ÈϸÃÎó²îÏÖÔÚÒѱ»¹¥»÷Õ߯ð¾¢Ê¹Óᣡ£¡£¾ÝIvantiÅû¶£¬£¬ £¬£¬£¬ÔÚÎó²î¹ûÕæÖ®Ê±Ö»ÓÐÉÙÉÙÊý¿Í»§Êܵ½Ó°Ï죬£¬ £¬£¬£¬µ«µÚÈý·½ÔÚÎó²îÅû¶ºó²»¾Ã±ãÌṩÁË¿´·¨ÑéÖ¤³ÌÐò£¬£¬ £¬£¬£¬´ó´óÔöÌíÁËÕûÌåΣº¦¡£¡£¡£Îª´Ë£¬£¬ £¬£¬£¬Ivanti±Þ²ßËùÓпͻ§¾¡¿ìÓ¦Óò¹¶¡£¬£¬ £¬£¬£¬²¢Ðû²¼ÁËÒ»¿îȫеÄRPM¼ì²â¹¤¾ß£¬£¬ £¬£¬£¬×ÊÖú¿Í»§¼ì²éÊÇ·ñ±£´æÇ±ÔÚµÄÎó²îʹÓᣡ£¡£¸Ã¹¤¾ßͨ¹ýɨÃèÒÑÖªÈëÇÖÖ¸±ê²¢ÌìÉú¹©Çå¾²ÍŶÓÉó²éµÄÈÕÖ¾£¬£¬ £¬£¬£¬¸¨ÖúÅжÏϵͳÊÇ·ñÒѱ»ÈëÇÖ¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁîBOD 22-01£¬£¬ £¬£¬£¬Áª°î»ú¹¹±ØÐèÔÚ2026Äê4ÔÂ11ÈÕ֮ǰÍê³É¸ÃÎó²îµÄÐÞ¸´ÊÂÇ飬£¬ £¬£¬£¬ÒÔ± £»£»£»£»£»£»£»¤ÆäÍøÂçÃâÊÜʹÓᣡ£¡£


https://securityaffairs.com/190519/security/u-s-cisa-adds-a-flaw-in-ivanti-epmm-to-its-known-exploited-vulnerabilities-catalog-2.html


6. ºÉÀ¼Ò½ÁÆÈí¼þ¹©Ó¦ÉÌChipSoftÔâÀÕË÷¹¥»÷


4ÔÂ8ÈÕ£¬£¬ £¬£¬£¬ºÉÀ¼Ò½ÁƱ£½¡Èí¼þ¹©Ó¦ÉÌChipSoft¿ËÈÕÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬µ¼ÖÂÆäϵͳ̱»¾£¬£¬ £¬£¬£¬¹Ù·½ÍøÕ¾×Ô4ÔÂ7ÈÕÆðÒ»Á¬å´»úÎÞ·¨»á¼û¡£¡£¡£¸Ã¹«Ë¾ÎªÒ½ÔºÌṩ»¼Õ߼ͼÈí¼þ£¬£¬ £¬£¬£¬Ð§À͹æÄ£ÁýÕÖºÉÀ¼ÌìÏÂÔ¼80%µÄÒ½ÁÆ»ú¹¹£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷¶Ô±¾¹úÒ½ÁÆÏµÍ³Ôì³ÉÁËÆÕ±é¹¥»÷¡£¡£¡£ºÉÀ¼Ò½ÁƱ£½¡ÐÐÒµÅÌËã»úÓ¦¼±ÏìӦС×éZ-CERTÔÚÒ»·Ý×Éѯ±¨¸æÖÐ֤ʵÁ˴˴ι¥»÷µÄÀÕË÷Èí¼þÐÔ×Ó£¬£¬ £¬£¬£¬²¢ÌåÏÖÕýÓëChipSoft¡¢Ò½ÁÆ»ú¹¹¼°ÏàÖúͬ°é¼á³ÖÁªÏµ£¬£¬ £¬£¬£¬Æð¾¢ÆÀ¹ÀÊÂÎñµÄÓ°Ïì¹æÄ£¡£¡£¡£Ö»¹ÜChipSoftÃæÏò¹«ÖÚµÄЧÀÍÊܵ½ÑÏÖØ×ÌÈÅ£¬£¬ £¬£¬£¬µ«´ó´ó¶¼Ò½ÔºÈÔÄܹ»Ê¹ÓÃÆä»¼ÕßÃÅ»§ÍøÕ¾¡£¡£¡£ÓÉÓÚChipSoftÈí¼þµÄʹÓ÷½·¨Òò¿Í»§¶øÒ죬£¬ £¬£¬£¬²¿·ÖÒ½Ôº½«ÆäÓÃÓÚ¸üÖÜÈ«µÄ¼Í¼ÉúÑÄ£¬£¬ £¬£¬£¬ÊÜÓ°Ïìˮƽ¸üÉî¡£¡£¡£¾ÝÍâµØÐÂÎÅýÌåNOSÊӲ죬£¬ £¬£¬£¬¹²ÓÐ11¼ÒÒ½Ôº½«ÆäÈí¼þÏÂÏߣ¬£¬ £¬£¬£¬ÆäÖÐ9¼ÒÊǸÃÈí¼þʹÓýÏΪÆÕ±éµÄ»ú¹¹¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷±³ºóµÄÀÕË÷×éÖ¯Éв»Ã÷È·¡£¡£¡£Õë¶Ôµ£ÐÄÈëÇÖµÄÒ½ÔººÍÆäËûÒ½ÁƱ£½¡ÏàÖúͬ°é£¬£¬ £¬£¬£¬Z-CERT½¨ÒéÉóºËChipSoftϵͳÊÇ·ñ±£´æÒì³£Á÷Á¿£¬£¬ £¬£¬£¬²¢Í¨¹ýÆä±¨¸æÈÈÏßÅû¶ÈκοÉÒÉÇéÐΡ£¡£¡£


https://www.theregister.com/2026/04/08/chipsoft_ransomware/