ÂíÈøÖîÈûÖÝ×ÅÃûҽԺϵͳÔâÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2026-04-091. ÂíÈøÖîÈûÖÝ×ÅÃûҽԺϵͳÔâÍøÂç¹¥»÷
4ÔÂ7ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÂíÈøÖîÈûÖÝ×ÅÃûÒ½ÁÆ»ú¹¹Signature Healthcare¼°Æä²¼Â޿˶ÙÒ½Ôº¿ËÈÕÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼Ö¶à¸öÐÅϢϵͳÊÜË𣬣¬£¬£¬£¬Ò½Ôº±»ÆÈ¾Ü¾ø¾È»¤³µ½øÈ룬£¬£¬£¬£¬²¢Æô¶¯ÁËÍ£»£»£»£»£»£»£»úά»¤³ÌÐò¡£¡£¡£¸ÃҽԺϵͳÒÑÔËÓªÁè¼Ý125Ä꣬£¬£¬£¬£¬Îª²¼Â޿˶ټ°²¨Ê¿¶Ù½¼Çø¶à¸ö¶¼»áµÄÊýÊ®ÍòסÃñÌṩЧÀÍ¡£¡£¡£Ôº·½ÌåÏÖ£¬£¬£¬£¬£¬ÔÚ·¢Ã÷ÍøÂ粿·ÖÇøÓò±£´æ¿ÉÒɻºó£¬£¬£¬£¬£¬Á¬Ã¦Æô¶¯ÁËÊÂÎñÏìÓ¦ÐÒ飬£¬£¬£¬£¬ÒÔÈ·±£¸ßÖÊÁ¿µÄ»¼ÕßÕչ˻¤Ê¿ºÍÇå¾²¡£¡£¡£Êܴ˴ι¥»÷Ó°Ï죬£¬£¬£¬£¬ËäȻסԺ¡¢¼±ÕïЧÀͺÍÔ¤Ô¼ÊÖÊõÈÔ¼ÌÐø¾ÙÐУ¬£¬£¬£¬£¬µ«Ò½ÔºÔÚÖܶþ²»µÃ²»×÷·ÏÁ˰©Ö¢»¼ÕߵϝÁÆÊäҺЧÀÍ£¬£¬£¬£¬£¬²¢ÖÒÑÔ³ÆÓÉÓÚÊÖÒÕ¹ÊÕÏ£¬£¬£¬£¬£¬»¼Õß¾ÍÕï½«ÃæÁÙÑÓÎ󡣡£¡£×èÖ¹Öܶþ£¬£¬£¬£¬£¬ÉÐÎÞÈκκڿÍ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£ÕâÆðÊÂÎñ²¢·ÇÁæØê°¸Àý£¬£¬£¬£¬£¬½ñÄêÒÔÀ´£¬£¬£¬£¬£¬ÃÀ¹ú¶à¼ÒÒ½ÔºÒÑÒòÍøÂç¹¥»÷±»ÆÈ×÷·ÏÔ¤Ô¼²¢ÏÞÖÆÐ§ÀÍ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Health ISAC¼ÌÐøÓëÎÀÉúÓ빫ÖÚЧÀͲ¿ºÍÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾ÖµÈÁª°î»ú¹¹¼á³ÖÐÅÏ¢¹²ÏíÇþµÀ£¬£¬£¬£¬£¬ÒÔÈ·±£Ò½ÁƱ£½¡¹«Ë¾Äܹ»ÊµÊ±»ñµÃÏà¹ØÍþвÇ鱨¡£¡£¡£
https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack
2. ÒÁÀʹØÁªºÚ¿Í´ó¹æÄ£Ãé×¼ÃÀ¹úÒªº¦»ù´¡ÉèÊ©PLC
4ÔÂ7ÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú¶à¸öÁª°î»ú¹¹°üÀ¨Áª°îÊÓ²ì¾Ö£¨FBI£©¡¢ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¡¢¹ú¼ÒÇå¾²¾Ö£¨NSA£©¡¢ÇéÐα£»£»£»£»£»£»£»¤Êð£¨EPA£©¡¢ÄÜÔ´²¿£¨DOE£©ÒÔ¼°ÃÀ¹úÍøÂç˾ÁîÊÖÏÂÊôµÄÍøÂç¹ú¼ÒʹÃü²½¶Ó£¨CNMF£©ÁªºÏÐû²¼ÁËÒ»·ÝÖÒÑÔͨ¸æ£¬£¬£¬£¬£¬Ö¸³öÓëÒÁÀÊÓйØÁªµÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯ÕýÒÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©ÍøÂçÖÐ̻¶ÓÚ»¥ÁªÍøµÄÂÞ¿ËΤ¶û/°¬Â×-²¼ÀµÂÀû¿É±à³ÌÂß¼¿ØÖÆÆ÷£¨PLC£©ÎªÄ¿µÄ£¬£¬£¬£¬£¬·¢¶¯Ò»Á¬¹¥»÷¡£¡£¡£Í¨¸æ³Æ£¬£¬£¬£¬£¬×Ô2026Äê3ÔÂÒÔÀ´£¬£¬£¬£¬£¬ÕâЩ¹¥»÷ÒѶÔÃÀ¹úÕþ¸®Ð§ÀͺÍÉèÊ©¡¢Ë®ºÍ·Ïˮϵͳ¡¢ÄÜÔ´µÈ¶à¸öÒªº¦»ù´¡ÉèÊ©²¿·ÖÔì³ÉÁ˾¼ÃËðʧºÍÔËÓªÖÐÖ¹¡£¡£¡£¹¥»÷ÕßµÄÒâͼ°üÀ¨¶ñÒâ¸Ä¶¯ÏîÄ¿Îļþ£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃÈË»ú½çÃæ£¨HMI£©ºÍ¼à¿ØÓëÊý¾ÝÊÕÂÞ£¨SCADA£©ÏµÍ³ÏÔʾÆÁÉÏÏÔʾµÄÊý¾Ý¡£¡£¡£FBIÆÀ¹ÀÒÔΪ£¬£¬£¬£¬£¬Õë¶ÔÃÀ¹ú×éÖ¯µÄÕâЩ¹¥»÷»î¶¯×î½üÓÐËùÉý¼¶£¬£¬£¬£¬£¬ºÜ¿ÉÄÜÊǶÔÒÁÀÊÓëÃÀ¹úºÍÒÔÉ«ÁÐÖ®¼ä³ðÊÓÐж¯µÄ»ØÓ¦¡£¡£¡£Îª·ÀÓù´ËÀ๥»÷£¬£¬£¬£¬£¬ÁªºÏͨ¸æÏòÍøÂç·ÀÓùÖ°Ô±Ìá³öÁËһϵÁн¨Ò飺Ӧ½«PLCÓ뻥ÁªÍø¶Ï¿ªÅþÁ¬»òʹÓ÷À»ðǽ¼ÓÒÔ±£»£»£»£»£»£»£»¤µÈ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/
3. SaaS¼¯³ÉÉÌAnodotÈëÇÖÊÂÎñ²¨¼°¶à¼Ò¹«Ë¾
4ÔÂ7ÈÕ£¬£¬£¬£¬£¬Ò»¼ÒÈí¼þ¼´Ð§ÀÍ£¨SaaS£©¼¯³ÉÌṩÉÌÔâÓöÇå¾²ÈëÇÖ£¬£¬£¬£¬£¬µ¼ÖÂÉí·ÝÑéÖ¤ÁîÅÆ±»µÁ£¬£¬£¬£¬£¬ËæºóÊ®Óà¼Ò¹«Ë¾ÔâÊÜÁËÊý¾Ý͵ÇÔ¹¥»÷¡£¡£¡£ËäÈ»¶à¼ÒÔÆ´æ´¢ºÍSaaS¹©Ó¦É̾ù³ÉΪ±»µÁÁîÅÆµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬µ«´ó´ó¶¼Êý¾Ý͵ÇÔ¹¥»÷Ö÷ÒªÕë¶ÔÔÆÊý¾Ýƽ̨Snowflake¡£¡£¡£Snowflake֤ʵÁË¡°Òì³£»£»£»£»£»£»£»î¶¯¡±µÄ±£´æ£¬£¬£¬£¬£¬²¢ÌåÏÖÆäÉÙÊý¿Í»§Êܵ½ÁËÓ°Ïì¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬×î½üÔÚÉÙÊý¿Í»§ÕË»§Öмì²âµ½ÓëÌØ¶¨µÚÈý·½¼¯³ÉÏà¹ØµÄÒì³£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬Ëæ¼´Á¬Ã¦Õö¿ªÊӲ죬£¬£¬£¬£¬²¢³öÓÚÉóÉ÷˼Á¿¶³½áÁË¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§ÕË»§£¬£¬£¬£¬£¬Í¬Ê±Í¨ÖªÁËÏà¹Ø¿Í»§²¢ÌṩԤ·ÀÐÔÖ¸µ¼¡£¡£¡£SnowflakeÇ¿µ÷£¬£¬£¬£¬£¬ÕâЩ¹¥»÷²¢Î´Ôì³ÉÆä×ÔÉíϵͳµÄÈκÎÎó²î»òË𺦡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬¹¥»÷ÕßÔøÊÔͼʹÓñ»µÁµÄÉí·ÝÑéÖ¤ÁîÅÆ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬µ«ÔÚÀÖ³É֮ǰ¼´±»¼ì²â·¢Ã÷¡£¡£¡£¾Ý¶à¸öÐÂÎÅȪԴ»ñϤ£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Ô´ÓÚÊý¾ÝÒì³£¼ì²â¹«Ë¾AnodotµÄÒ»ÆðÇå¾²ÊÂÎñ¡£¡£¡£ShinyHunters×é֤֯ʵÁËÆäÐÐΪ£¬£¬£¬£¬£¬Éù³ÆÉÏÖÜÎå´ÓÊýÊ®¼Ò¹«Ë¾ÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬²¢È·ÈÏÔøÊÔͼ´ÓSalesforceÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬µ«ÌåÏÖ±»È˹¤ÖÇÄܼì²âϵͳ×èµ²¡£¡£¡£¹¥»÷Õß»¹Éù³Æ´Ë´Î¹¥»÷Ô´ÓÚAnodotµÄÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬ÌåÏÖËûÃÇ¿ÉÄÜÒÑÈëÇָù«Ë¾Ò»¶Îʱ¼ä¡£¡£¡£
https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/
4. UNC6783ÍþвÐÐΪÕßÈëÇÖBPOÌṩÉÌ
4ÔÂ8ÈÕ£¬£¬£¬£¬£¬Ò»¸öÃûΪUNC6783µÄÍþвÐÐΪÕßÕýͨ¹ýÈëÇÖÓªÒµÁ÷³ÌÍâ°ü£¨BPO£©ÌṩÉÌ£¬£¬£¬£¬£¬»ñÈ¡¶Ô¶à¸öÐÐÒµ¸ß¼ÛÖµ¹«Ë¾µÄ´ó¹æÄ£»á¼ûȨÏÞ¡£¡£¡£¾Ý¹È¸èÍþвÇ鱨С×飨GTIG£©Åû¶£¬£¬£¬£¬£¬ÒÑÓÐÊýÊ®¼ÒÆóҵʵÌå³ÉΪÕâÖÖ¹¥»÷ÊֶεÄÄ¿µÄ£¬£¬£¬£¬£¬Ãô¸ÐÊý¾Ý±»ÇÔÈ¡²¢ÓÃÓÚÀÕË÷¡£¡£¡£GTIGÊ×ϯÍþвÆÊÎöʦAustin LarsenÌåÏÖ£¬£¬£¬£¬£¬UNC6783ͨ³£ÒÀÀµÉç»á¹¤³ÌºÍÍøÂç´¹ÂڻÀ´ÈëÇÖÓëÄ¿µÄ¹«Ë¾ÏàÖúµÄBPO¹«Ë¾£¬£¬£¬£¬£¬ÓÐʱҲ»áÖ±½ÓÁªÏµÄ¿µÄ×éÖ¯ÄÚ²¿µÄÖ§³ÖºÍ×ÊÖųְ́Ա£¬£¬£¬£¬£¬ÊÔͼ»ñȡֱ½Ó»á¼ûȨÏÞ¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬UNC6783¿ÉÄÜÓëÒ»¸ö¼ÙÃû¡°Raccoon¡±µÄÄäÃûÍþвÐÐΪÕßÓйأ¬£¬£¬£¬£¬ºóÕß´ËÇ°ÔøÒÔ¶à¼ÒΪ´óÐ͹«Ë¾ÌṩЧÀ͵ÄBPO¹«Ë¾ÎªÄ¿µÄ¡£¡£¡£ÔÚͨ¹ýʵʱ̸ÌìÌᳫµÄÉç»á¹¤³Ì¹¥»÷ÖУ¬£¬£¬£¬£¬¹¥»÷Õß»áָʾ֧³ÖÖ°Ô±»á¼ûÍйÜÔÚÄ£ÄâÄ¿µÄ¹«Ë¾ÓòÃûÉϵÄαÔìOktaµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬ÕâЩÓòÃû×ñÕÕÌØ¶¨Ä£Ê½¡£¡£¡£LarsenÖ¸³ö£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Öа²ÅŵÄÍøÂç´¹ÂÚ¹¤¾ß°üÄܹ»ÇÔÈ¡¼ôÌù°åÄÚÈÝ£¬£¬£¬£¬£¬´Ó¶øÈƹý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»½«Æä×°±¸×¢²áµ½×éÖ¯ÖС£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹È¸è»¹ÊӲ쵽UNC6783É¢²¼ÐéαÇå¾²¸üÐÂÒÔÈö²¥Ô¶³Ì»á¼û¶ñÒâÈí¼þ¡£¡£¡£ÔÚÀÖ³ÉÇÔÈ¡Ãô¸ÐÊý¾Ýºó£¬£¬£¬£¬£¬¹¥»÷Õß»áͨ¹ýProtonMailµØµãÁªÏµÊܺ¦ÕßË÷ҪǮ²Æ£¬£¬£¬£¬£¬ÒԴ˾ÙÐÐÀÕË÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets/
5. CISA½«Ivanti EPMMÑÏÖØÎó²î¼ÓÈëÒÑ֪ʹÓÃĿ¼
4ÔÂ8ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ivanti Endpoint Manager Mobile£¨EPMM£©Öз¢Ã÷µÄÒ»¸öÑÏÖØÎó²îÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬¸ÃÎó²î±àºÅΪCVE-2026-1340£¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.8¡£¡£¡£ÕâÒ»´úÂë×¢ÈëÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬ÇÒIvanti¹«Ë¾ÒÑÈ·ÈϸÃÎó²îÏÖÔÚÒѱ»¹¥»÷Õ߯ð¾¢Ê¹Óᣡ£¡£¾ÝIvantiÅû¶£¬£¬£¬£¬£¬ÔÚÎó²î¹ûÕæÖ®Ê±Ö»ÓÐÉÙÉÙÊý¿Í»§Êܵ½Ó°Ï죬£¬£¬£¬£¬µ«µÚÈý·½ÔÚÎó²îÅû¶ºó²»¾Ã±ãÌṩÁË¿´·¨ÑéÖ¤³ÌÐò£¬£¬£¬£¬£¬´ó´óÔöÌíÁËÕûÌåΣº¦¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬Ivanti±Þ²ßËùÓпͻ§¾¡¿ìÓ¦Óò¹¶¡£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÒ»¿îȫеÄRPM¼ì²â¹¤¾ß£¬£¬£¬£¬£¬×ÊÖú¿Í»§¼ì²éÊÇ·ñ±£´æÇ±ÔÚµÄÎó²îʹÓᣡ£¡£¸Ã¹¤¾ßͨ¹ýɨÃèÒÑÖªÈëÇÖÖ¸±ê²¢ÌìÉú¹©Çå¾²ÍŶÓÉó²éµÄÈÕÖ¾£¬£¬£¬£¬£¬¸¨ÖúÅжÏϵͳÊÇ·ñÒѱ»ÈëÇÖ¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁîBOD 22-01£¬£¬£¬£¬£¬Áª°î»ú¹¹±ØÐèÔÚ2026Äê4ÔÂ11ÈÕ֮ǰÍê³É¸ÃÎó²îµÄÐÞ¸´ÊÂÇ飬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»£»¤ÆäÍøÂçÃâÊÜʹÓᣡ£¡£
https://securityaffairs.com/190519/security/u-s-cisa-adds-a-flaw-in-ivanti-epmm-to-its-known-exploited-vulnerabilities-catalog-2.html
6. ºÉÀ¼Ò½ÁÆÈí¼þ¹©Ó¦ÉÌChipSoftÔâÀÕË÷¹¥»÷
4ÔÂ8ÈÕ£¬£¬£¬£¬£¬ºÉÀ¼Ò½ÁƱ£½¡Èí¼þ¹©Ó¦ÉÌChipSoft¿ËÈÕÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆäϵͳ̱»¾£¬£¬£¬£¬£¬¹Ù·½ÍøÕ¾×Ô4ÔÂ7ÈÕÆðÒ»Á¬å´»úÎÞ·¨»á¼û¡£¡£¡£¸Ã¹«Ë¾ÎªÒ½ÔºÌṩ»¼Õ߼ͼÈí¼þ£¬£¬£¬£¬£¬Ð§À͹æÄ£ÁýÕÖºÉÀ¼ÌìÏÂÔ¼80%µÄÒ½ÁÆ»ú¹¹£¬£¬£¬£¬£¬´Ë´Î¹¥»÷¶Ô±¾¹úÒ½ÁÆÏµÍ³Ôì³ÉÁËÆÕ±é¹¥»÷¡£¡£¡£ºÉÀ¼Ò½ÁƱ£½¡ÐÐÒµÅÌËã»úÓ¦¼±ÏìӦС×éZ-CERTÔÚÒ»·Ý×Éѯ±¨¸æÖÐ֤ʵÁ˴˴ι¥»÷µÄÀÕË÷Èí¼þÐÔ×Ó£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÓëChipSoft¡¢Ò½ÁÆ»ú¹¹¼°ÏàÖúͬ°é¼á³ÖÁªÏµ£¬£¬£¬£¬£¬Æð¾¢ÆÀ¹ÀÊÂÎñµÄÓ°Ïì¹æÄ£¡£¡£¡£Ö»¹ÜChipSoftÃæÏò¹«ÖÚµÄЧÀÍÊܵ½ÑÏÖØ×ÌÈÅ£¬£¬£¬£¬£¬µ«´ó´ó¶¼Ò½ÔºÈÔÄܹ»Ê¹ÓÃÆä»¼ÕßÃÅ»§ÍøÕ¾¡£¡£¡£ÓÉÓÚChipSoftÈí¼þµÄʹÓ÷½·¨Òò¿Í»§¶øÒ죬£¬£¬£¬£¬²¿·ÖÒ½Ôº½«ÆäÓÃÓÚ¸üÖÜÈ«µÄ¼Í¼ÉúÑÄ£¬£¬£¬£¬£¬ÊÜÓ°Ïìˮƽ¸üÉî¡£¡£¡£¾ÝÍâµØÐÂÎÅýÌåNOSÊӲ죬£¬£¬£¬£¬¹²ÓÐ11¼ÒÒ½Ôº½«ÆäÈí¼þÏÂÏߣ¬£¬£¬£¬£¬ÆäÖÐ9¼ÒÊǸÃÈí¼þʹÓýÏΪÆÕ±éµÄ»ú¹¹¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±³ºóµÄÀÕË÷×éÖ¯Éв»Ã÷È·¡£¡£¡£Õë¶Ôµ£ÐÄÈëÇÖµÄÒ½ÔººÍÆäËûÒ½ÁƱ£½¡ÏàÖúͬ°é£¬£¬£¬£¬£¬Z-CERT½¨ÒéÉóºËChipSoftϵͳÊÇ·ñ±£´æÒì³£Á÷Á¿£¬£¬£¬£¬£¬²¢Í¨¹ýÆä±¨¸æÈÈÏßÅû¶ÈκοÉÒÉÇéÐΡ£¡£¡£
https://www.theregister.com/2026/04/08/chipsoft_ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ