¶àÂ×¶à½ÌÓý¾ÖÔâLockBitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Ñ§ÉúÐÅϢй¶
Ðû²¼Ê±¼ä 2024-09-038ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬¶àÂ×¶àµØÇø½ÌÓý¾Ö£¨TDSB£©±¾ÖÜÈ·ÈÏÁË6Ô·ݱ¬·¢µÄÒ»´ÎÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÉæ¼°Ñ§ÉúÐÅÏ¢µÄй¶¡£¡£¡£¡£¡£¡£Ö»¹Ü×î³õ½ÌÓý¾ÖÌåÏÖ¹¥»÷½öÕë¶ÔÒ»¸öÊÖÒÕ²âÊÔÇéÐΣ¬£¬£¬£¬£¬£¬Óë¹Ù·½ÍøÂç¸ôÀ룬£¬£¬£¬£¬£¬µ«ºóÐøÖ¤Êµ2023/2024ѧÄêÖв¿·ÖѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢Ñ§Ð£ÏêÇé¡¢Äê¼¶¡¢ÓÊÏ䵨µã¡¢Ñ§ºÅ¼°³öÉúÈÕÆÚµÈ£¬£¬£¬£¬£¬£¬È·×Åʵ²âÊÔÇéÐÎÖб»Ð¹Â¶¡£¡£¡£¡£¡£¡£½ÌÓý¾ÖÇ¿µ÷£¬£¬£¬£¬£¬£¬¾ÍøÂçÇå¾²ÍŶӺÍÍⲿר¼ÒÆÀ¹À£¬£¬£¬£¬£¬£¬Ñ§ÉúÃæÁÙµÄΣº¦¡°ºÜµÍ¡±£¬£¬£¬£¬£¬£¬ÇÒδ·¢Ã÷Êý¾Ý¹ûÕæÅû¶µÄÇéÐΡ£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬LockBitÀÕË÷Èí¼þÍÅ»ïËæºóÈÏ¿ÉÁ˴˴ι¥»÷£¬£¬£¬£¬£¬£¬²¢ÔÚÆäйÃÜÍøÕ¾Éϸø½ÌÓý¾ÖÉ趨ÁËÖ§¸¶Êê½ðµÄÏÞÆÚ£¬£¬£¬£¬£¬£¬µ«Î´¹ûÕæÏêϸÊê½ðÊý¶î¡£¡£¡£¡£¡£¡£TDSBÉÐδ¾ÍLockBitµÄÉùÃ÷×÷³ö»ØÓ¦£¬£¬£¬£¬£¬£¬µ«ÒÑÖÂÐżҳ¤ËµÃ÷ÇéÐΣ¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ÒѽÓÄɶàÏî²½·¥ÔöǿѧÉúÐÅÏ¢Çå¾²£¬£¬£¬£¬£¬£¬Í¬Ê±ÅäºÏÖ´·¨²¿·ÖÊӲ졣¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ±¬·¢ÔÚLockBitÍÅ»ïÖÙ´º·ÝÔâ¹¥»÷ºóÊÔͼ¸´³öµÄÅä¾°Ï£¬£¬£¬£¬£¬£¬ÆäÐû²¼µÄÊܺ¦ÕßÐÅÏ¢Öб£´æ²»ÉÙ¹ýʧ»òÖØ¸´ÌõÄ¿£¬£¬£¬£¬£¬£¬Òý·¢×¨¼ÒÖÊÒÉ¡£¡£¡£¡£¡£¡£
https://therecord.media/toronto-school-district-board-ransomware
2. ÐÂÐÍÀÕË÷Èí¼þCicada3301»îÔ¾£¬£¬£¬£¬£¬£¬»òÓëALPHVÓйØÁª
9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬ÐÂÐÍÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©Cicada3301½üÆÚÔÚÍþвÁìÓòո¶ͷ½Ç£¬£¬£¬£¬£¬£¬Õë¶Ô¶à¼Ò¹«Ë¾Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬Æä»îÔ¾ÐÔÁîÈËÖõÄ¿¡£¡£¡£¡£¡£¡£×Ô6ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬Cicada3301ͨ¹ýRAMPÍøÂç·¸·¨ÂÛ̳ÕÐļ³ÉÔ±£¬£¬£¬£¬£¬£¬½ÓÄÉRustÓïÑÔ±àд£¬£¬£¬£¬£¬£¬Ö§³ÖWindows¼°Linux/ESXiϵͳ£¬£¬£¬£¬£¬£¬ÏÔʾ³öÓëÒÑÇýÖðµÄBlackCat/ALPHV×éÖ¯ÔÚÊÖÒÕÉϵÄÏàËÆÐÔ£¬£¬£¬£¬£¬£¬°üÀ¨¼ÓÃÜËã·¨¡¢ÏÂÁîʹÓúÍÎļþÃüÃûÔ¼¶¨¡£¡£¡£¡£¡£¡£Cicada3301ͨ¹ýÇÔÈ¡»ò±©Á¦ÆÆ½âƾ֤µÇ¼ϵͳ£¬£¬£¬£¬£¬£¬Ê¹ÓõÄIPµØµãÓëBrutus½©Ê¬ÍøÂçÏà¹ØÁª£¬£¬£¬£¬£¬£¬¿ÉÄÜÅú×¢Á½Õß¼äµÄijÖÖÁªÏµ¡£¡£¡£¡£¡£¡£Æä³õʼ¹¥»÷ÊֶζàÑù£¬£¬£¬£¬£¬£¬°üÀ¨Õë¶ÔVMware ESXiϵͳµÄÌØÊâ±äÌå¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þ¾ß±¸¸ß¶È¿ÉÉèÖÃÐÔ£¬£¬£¬£¬£¬£¬ÔÊÐí²Ù×÷Ô±ÔÚÖ´ÐÐÀú³ÌÖе÷½âÆäÐÐΪ£¬£¬£¬£¬£¬£¬ÈçÑÓ³ÙÖ´ÐС¢ÏÔʾ¼ÓÃܽø¶È¼°ÔÚ¼ÓÃÜESXiÖ÷»úÎļþʱÎÞÐè¹Ø±ÕÐéÄâ»úµÈ£¬£¬£¬£¬£¬£¬ÕâЩ¹¦Ð§ÔöÇ¿ÁËÆä˳ӦÐÔºÍÎÞаÐÔ¡£¡£¡£¡£¡£¡£¼ÓÃÜÀú³ÌÖУ¬£¬£¬£¬£¬£¬Cicada3301ʹÓÃOsRngËæ»úÊýÌìÉúÆ÷ÌìÉú¶Ô³ÆÃÜÔ¿£¬£¬£¬£¬£¬£¬²¢Í¨¹ýPGP¹«Ô¿¼ÓÃÜÕâЩÃÜÔ¿£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÚÿ¸ö¼ÓÃÜÎļþ¼ÐÖÐÁôÏÂÊê½ð˵Ã÷Îļþ¡£¡£¡£¡£¡£¡£¼ÓÃÜÍê³Éºó£¬£¬£¬£¬£¬£¬ChaCha20ÃÜÔ¿±»RSA¼ÓÃÜ£¬£¬£¬£¬£¬£¬²¢Óë¼ÓÃÜÎļþÀ©Õ¹Ãûһͬ¸½¼Óµ½Îļþĩ⣬£¬£¬£¬£¬£¬ÐγÉÍêÕûµÄÀÕË÷ÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/167897/cyber-crime/a-new-variant-of-cicada-ransomware-targets-vmware-esxi-systems.html
3. Â׶ؽ»Í¨¾ÖÓ¦¶ÔÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÉÐÎÞÖ¤¾ÝÏÔʾ¿Í»§Êý¾Ýй¶
9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬Â׶ؽ»Í¨¾Ö£¨TfL£©ÕýÈ«Á¦Ó¦¶ÔÒ»ÆðÕýÔÚ¾ÙÐÐÖеÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Í¬Ê±Ïò¹«ÖÚ°ü¹Ü£¬£¬£¬£¬£¬£¬ÏÖÔÚÉÐÎÞÈ·ÔäÖ¤¾ÝÅú×¢¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÒÑÒò´Ë´ÎÊÂÎñ¶øÐ¹Â¶£¬£¬£¬£¬£¬£¬ÇÒTfLµÄ¸÷ÏîЧÀÍÔË×÷Õý³££¬£¬£¬£¬£¬£¬Î´ÊÜÏÔ×ÅÓ°Ïì¡£¡£¡£¡£¡£¡£×÷ΪÂ׶صØÇø½»Í¨ÍøÂçµÄÖ÷ÒªÖÎÀí»ú¹¹£¬£¬£¬£¬£¬£¬TfLѸËÙÏìÓ¦£¬£¬£¬£¬£¬£¬Óë¹ú¼Ò·¸·¨¾Ö£¨NCA£©¼°¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ï¸ÃÜÏàÖú£¬£¬£¬£¬£¬£¬½ÓÄÉÁËһϵÁÐÄÚ²¿²½·¥ÒÔÔöÇ¿ÍøÂçÇå¾²·À»¤¡£¡£¡£¡£¡£¡£¾ÝÄÚ²¿ÐÂÎÅ͸¶£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷Ö÷Òª¼¯ÖÐÓÚTfL×ܲ¿µÄºǫ́ϵͳ£¬£¬£¬£¬£¬£¬´Ùʹ²¿·ÖÔ±¹¤±»½¨Òé¾Ó¼Ò°ì¹«ÒÔïÔÌDZÔÚΣº¦¡£¡£¡£¡£¡£¡£TfLÊ×ϯÊÖÒÕ¹ÙShashi VermaÇ¿µ÷£¬£¬£¬£¬£¬£¬±£»£»£»¤ÏµÍ³Óë¿Í»§Êý¾ÝµÄÇå¾²ÊÇÖ÷ҪʹÃü£¬£¬£¬£¬£¬£¬ÍŶӽ«Ò»Á¬¼à¿Ø²¢ÆÀ¹ÀÊÂ̬Éú³¤£¬£¬£¬£¬£¬£¬È·±£¹«ÖÚ³öÐÐÇå¾²ÓëÐÅÈβ»ÊÜË𺦡£¡£¡£¡£¡£¡£×ÜÌå¶øÑÔ£¬£¬£¬£¬£¬£¬Ö»¹ÜÃæÁÙÌôÕ½£¬£¬£¬£¬£¬£¬TfLÕ¹ÏÖ³öÆð¾¢Ó¦¶ÔµÄ̬¶È£¬£¬£¬£¬£¬£¬Á¦Õù½«Ç±ÔÚÓ°Ïì½µÖÁ×îµÍ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/167946/hacking/transport-for-london-tfl-ongoing-cyberattack.html
4. µØÀí¶¨Î»×·×ÙЧÀÍTracelo³¬140ÍòÈËÐÅÏ¢ÔâºÚ¿Íй¶
9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬ÖÇÄÜÊÖ»úµØÀí¶¨Î»×·×ÙЧÀÍTraceloÔÚ9ÔÂ1ÈÕÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ºÚ¿Í¡°Satanic¡±Éù³Æ¹¥ÆÆÁËÆäϵͳ£¬£¬£¬£¬£¬£¬²¢ÔÚÍøÂçºÚÊÐÉϹûÕæÁËÁè¼Ý140ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£Tracelo×÷ΪÐÂÐËЧÀÍ£¬£¬£¬£¬£¬£¬Ëä±ê°ñÆ·µÂ¹æ·¶µÄ¶¨Î»×·×Ù£¬£¬£¬£¬£¬£¬µ«ÆäÔÚÊý¾ÝÍøÂçÓëÔÞ³ÉÑéÖ¤ÉϵÄ͸Ã÷¶Èȱ·¦£¬£¬£¬£¬£¬£¬Òý·¢ÁËÒþ˽±£»£»£»¤ÕùÒé¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨Óû§È«Ãû¡¢µç»°ºÅÂë¡¢ÎïÀíµØµã¡¢µç×ÓÓʼþµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒÔ¼°´ó×Ú¿Í»§µÄGoogle IDºÅ£¬£¬£¬£¬£¬£¬ºóÕß¿ÉÄܽøÒ»²½Ì»Â¶Óû§µÄÒ»Ñùƽ³£»£»£»î¶¯¹ì¼£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ö»¹ÜTraceloÖ¼ÔÚ×ÊÖúÓû§×·×ÙËûÈËλÖ㬣¬£¬£¬£¬£¬µ«Ð¹Â¶µÄÊý¾ÝÖв¢Î´°üÀ¨Ä¿µÄСÎÒ˽¼ÒµÄλÖÃÐÅÏ¢£¬£¬£¬£¬£¬£¬·´¶øÖ÷ÒªÊǿͻ§×ÔÉíµÄÏêϸ×ÊÁÏ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§ÃæÁÙÍøÂç´¹ÂÚºÍÓïÒô´¹ÂÚթƵÄÍþвÔöÌí£¬£¬£¬£¬£¬£¬Òò´ËÐè¸ß¶ÈСÐÄÀ´×Ô²»Ã÷ȪԴµÄÓʼþºÍµç»°£¬£¬£¬£¬£¬£¬×èֹй¶¸ü¶àСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://hackread.com/tracelo-location-tracker-data-breach-user-records-leak/
5. CBIZÊý¾Ýй¶ÊÂÎñÆØ¹â£¬£¬£¬£¬£¬£¬½ü36,000¿Í»§ÐÅÏ¢ÔâÇÔ
9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬CBIZ¸£ÀûÓë°ü¹ÜЧÀ͹«Ë¾Åû¶ÁËÒ»ÆðÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÉæ¼°½ü36,000Ãû¿Í»§µÄÃô¸ÐÐÅÏ¢±»Î´¾ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßʹÓÃCBIZÍøÒ³ÖеÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÚ6ÔÂ2ÈÕÖÁ21ÈÕʱ´úDZÈëϵͳ²¢ÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢ÁªÏµ·½·¨¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉú/éæÃüÈÕÆÚ¡¢ÍËÐÝÖ°Ô±¿µ½¡ÐÅÏ¢¼°¸£ÀûÍýÏëÐÅÏ¢ÔÚÄڵĿͻ§Êý¾Ý¡£¡£¡£¡£¡£¡£CBIZ×÷ΪÃÀ¹úÁìÏȵÄ×ÛºÏÐÔЧÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬ÓªÒµ¹æÄ£º¸Ç»á¼ÆË°Îñ¡¢°ü¹Ü¡¢ÉÌÒµ×Éѯ¼°ÈËÁ¦×ÊÔ´µÈ¶à¸öÁìÓò£¬£¬£¬£¬£¬£¬ÔÚÌìÏÂÓµÓÐ120¸öЧÀÍ´¦¼°6,700ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬2023ÄêÊÕÈë¸ß´ï15.9ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑÓÚ6ÔÂ24ÈÕ·¢Ã÷´Ë´ÎÈëÇÖ£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦×ÅÊÖÊӲ졣¡£¡£¡£¡£¡£ÊÜÓ°Ïì¿Í»§×Ô8ÔÂ28ÈÕÆðÂ½ÐøÊÕµ½¸öÐÔ»¯Í¨Öª£¬£¬£¬£¬£¬£¬CBIZËäδ·¢Ã÷Êý¾ÝÀÄÓü£Ï󣬣¬£¬£¬£¬£¬µ«ÈÔÌṩΪÆÚÁ½ÄêµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬²¢½¨Òé¿Í»§½ÓÄÉÌØÊâ²½·¥ÈçÐÅÓö³½á¼°Ìí¼Óڲƾ¯±¨£¬£¬£¬£¬£¬£¬ÒÔ½µµÍDZÔÚΣº¦¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/business-services-giant-cbiz-discloses-customer-data-breach/
6. Prasarana Malaysia BhdÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬³¬300GBÊý¾Ýй¶
8ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬ÂíÀ´Î÷Ñǹ«¹²½»Í¨¾ÞÍ·¹ú¼Ò»ù½¨¹«Ë¾£¨Prasarana Malaysia Bhd£©¿ËÈÕÈ·ÈÏÁËÉ罻ýÌåÉÏÈö²¥µÄÒ»ÔòÍøÂçÇå¾²ÊÂÎñ±¨µÀµÄÕæÊµÐÔ£¬£¬£¬£¬£¬£¬Ö¸³öÆäÄÚ²¿ÏµÍ³È·ÒÑÔâÊÜδÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£Ö»¹Ü´Ë´ÎÊÂÎñÉÐδ¶Ô¹«Ë¾µÄÒ»Ñùƽ³£ÔËÓªÔì³ÉÓ°Ï죬£¬£¬£¬£¬£¬µ«¹«Ë¾ÒÑѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬ÁªºÏÍøÂçÇ徲ר¼ÒÕö¿ªÖÜÈ«ÊӲ죬£¬£¬£¬£¬£¬²¢×ÅÊÖ»º½âDZÔÚÍþв¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¹ú¼Ò»ù½¨¹«Ë¾ÒÑÓëÂíÀ´Î÷Ñǹú¼ÒÍøÂçÇå¾²¾Ö£¨Nacsa£©¼°ÍøÂçÇå¾²»ú¹¹£¨CyberSecurity Malaysia£©Ï¸ÃÜÏàÖú£¬£¬£¬£¬£¬£¬ÅäºÏÖÆ¶©²¢ÊµÑéÖÜÈ«µÄÇå¾²·ÀÓùÕ½ÂÔ£¬£¬£¬£¬£¬£¬ÒÔ°ü¹ÜÆä½»Í¨Ð§ÀÍϵͳµÄÇå¾²ÎȹÌÔËÐС£¡£¡£¡£¡£¡£×÷ΪÂíÀ´Î÷Ñǹ«¹²½»Í¨ÏµÍ³µÄÖ÷Òª×é³É²¿·Ö£¬£¬£¬£¬£¬£¬¹ú¼Ò»ù½¨¹«Ë¾²»µ«ÔËÓªRapidKLÆìϵÄÇá¹ì¡¢½ÝÔË¡¢°ÍÊ¿¿ìËÙ½»Í¨ÏµÍ³£¬£¬£¬£¬£¬£¬»¹ÖÎÀí¼ªÂ¡ÆÂµ¥¹ìÁгµ¼°ÖØ´óµÄ¹«½»³µ¶Ó¡£¡£¡£¡£¡£¡£ÕâÒ»ÉùÃ÷Ö¼ÔÚ»ØÓ¦Íâ½ç¹ØÓÚ¹«Ë¾ÍøÕ¾¿ÉÄÜÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂ316GBÊý¾Ýй¶µÄ´«ÑÔ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯RansomHubÒÑ·¢³öÍþв£¬£¬£¬£¬£¬£¬Éù³Æ½«ÔÚÁùµ½ÆßÌìÄÚ¹ûÕæ¹ú¼Ò»ù½¨¹«Ë¾µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.freemalaysiatoday.com/category/nation/2024/08/26/prasarana-confirms-cybersecurity-incident/