´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷
Ðû²¼Ê±¼ä 2025-07-221. ´÷¶û²âÊÔʵÑéÊÒÆ½Ì¨ÔâWorld LeaksºÚ¿Í×éÖ¯¹¥»÷
7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬´÷¶û¿Æ¼¼¹«Ë¾¿ËÈÕÈ·ÈÏÆä¿Í»§½â¾ö¼Æ»®ÖÐÐÄÆ½Ì¨ÔâÓöÍøÂçÇå¾²ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßΪ½üÆÚÖØ×éµÄÀÕË÷×éÖ¯World Leaks£¨Ç°ÉíΪHunters International£©¡£¡£¡£¡£´Ë´ÎÊÂÎñ±¬·¢ÓÚ2025Äê7Ô³õ£¬£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸´÷¶ûÓÃÓÚÉÌÒµ¿Í»§²úÆ·ÑÝʾ¼°¿´·¨ÑéÖ¤²âÊԵĸôÀëÇéÐΡ£¡£¡£¡£Ö»¹ÜÍþвÐÐΪÕßÀÖ³ÉÍ»ÆÆ¸Ãƽ̨£¬£¬£¬£¬£¬£¬£¬£¬µ«´÷¶ûÇ¿µ÷ÆäÑÏ¿áµÄÇå¾²¼Ü¹¹ÓÐÓÃÏÞÖÆÁËËðʧ¹æÄ££¬£¬£¬£¬£¬£¬£¬£¬¿Í»§ÏµÍ³¼°ÄÚ²¿ÍøÂçδÊܲ¨¼°¡£¡£¡£¡£¾ÝÅû¶£¬£¬£¬£¬£¬£¬£¬£¬ÈëÇÖÊÂÎñÖб»µÁÊý¾ÝÖ÷Òª°üÀ¨ºÏ³É²âÊÔÊý¾Ý¡¢¹ûÕæÑÝʾÊý¾Ý¼¯¼°·ÇÃô¸ÐϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬Î¨Ò»Éæ¼°ÕæÊµÄÚÈݵĽöΪһ·ÝÓâÆÚÁªÏµÈËÃûµ¥£¬£¬£¬£¬£¬£¬£¬£¬´÷¶û³ÆÆä"ÔËÓª¼ÛÖµ¼«µÍ"¡£¡£¡£¡£¸Ãƽ̨×÷Ϊ×ÔÁ¦ÔËÐеÄÑÝʾÇéÐΣ¬£¬£¬£¬£¬£¬£¬£¬ÓëÉú²úÍøÂç¡¢¿Í»§Êý¾Ý´æ´¢¿â¼°ÏàÖúͬ°éϵͳÍêÈ«¸ôÀ룬£¬£¬£¬£¬£¬£¬£¬²¢ÉèÓÐÃ÷ȷեȡÉÏ´«Ãô¸ÐÊý¾ÝµÄÐÒé¡£¡£¡£¡£´÷¶ûÇå¾²ÍŶÓÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¶àÖØÍøÂç·Ö¶ÎºÍ¼à¿Ø»úÖÆÔÚÊÂÎñÖÐʩչÁËÒªº¦×÷Ó㬣¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÒ»Á¬ÊӲ칥»÷·¾¶£¬£¬£¬£¬£¬£¬£¬£¬µ«ÉÐδ·¢Ã÷¿Í»§Êý¾Ý»ò½¹µãϵͳÊÜÓ°ÏìµÄÖ¤¾Ý¡£¡£¡£¡£
https://cybersecuritynews.com/dell-data-breach/
2. µÏ°Â×îÏÈÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ
7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬·¨¹úÉÝ³ÞÆ·ÅƵϰ£¨Dior£©¿ËÈÕÏòÃÀ¹ú¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÆäÓÚ2025Äê1ÔÂ26ÈÕÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Î´¾ÊÚȨ»á¼û¡£¡£¡£¡£×÷ΪȫÇò×î´óÉÝ³ÞÆ·¼¯ÍÅLVMHÆìϽ¹µãÆ·ÅÆ£¬£¬£¬£¬£¬£¬£¬£¬µÏ°ÂÄêÊÕÈ볬120ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÈ«ÇòÔËÓªÊý°Ù¼Ò¾«Æ·µê£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒý·¢¶ÔÆäÊý¾ÝÇå¾²ÖÎÀíµÄ¹Ø×¢¡£¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬£¬£¬£¬µÏ°ÂÓÚ2025Äê5ÔÂ7ÈÕ·¢Ã÷Êý¾Ý¿âÔâÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬Ëæ¼´Æô¶¯ÄÚ²¿ÊӲ졣¡£¡£¡£ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡Á˰üÀ¨È«Ãû¡¢ÁªÏµ·½·¨¡¢ÏÖʵµØµã¡¢³öÉúÈÕÆÚ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄ»¤ÕÕ/Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢Éç»áÇå¾²ºÅÂëµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÒøÐÐÕË»§»òÖ§¸¶¿¨µÈ²ÆÎñÊý¾Ý¡£¡£¡£¡£µÏ°ÂÇ¿µ÷ÒÑѸËÙ½ÓÄÉ¿ØÖƲ½·¥£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÎÞÖ¤¾ÝÅúעϵͳ±»Ò»Á¬ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÒÑִ֪ͨ·¨²¿·Ö¼°Ô¼ÇëµÚÈý·½ÍøÂçÇ徲ר¼ÒÐÖúÓ¦¶Ô¡£¡£¡£¡£Îª»º½âÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬µÏ°ÂΪÊÜÓ°ÏìÓû§ÌṩÃâ·Ñ24¸öÔÂÐÅÓÃ¼à¿ØÓëÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±½¨Òé¿Í»§Ð¡ÐÄÕ©Æ¡¢ÍøÂç´¹ÂÚ¼°½ðÈÚÕË»§Òì³£»£»£»£»£»£»£»î¶¯¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/
3. Ó¡¶È¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX 4420ÍòÃÀÔª¼ÓÃÜ×ʲú±»µÁ
7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ó¡¶ÈÍ·²¿¼ÓÃÜÇ®±ÒÉúÒâËùCoinDCX¿ËÈÕÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÒ»¸öÄÚ²¿ÔËÓªÕË»§ÔâÓöÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö¼ÛÖµÔ¼4420ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¡£¡£¡£¾ÝCoinDCXÁªºÏÊ×´´È˼æÊ×ϯִÐйÙSumit GuptaÔÚXƽ̨Åû¶£¬£¬£¬£¬£¬£¬£¬£¬±»ÈëÇÖÕË»§½öÓÃÓÚÔÚÏàÖúÉúÒâËùÌṩÁ÷¶¯ÐÔ£¬£¬£¬£¬£¬£¬£¬£¬ÊôÓÚÄÚ²¿ÔËÓªÕË»§£¬£¬£¬£¬£¬£¬£¬£¬Óë¿Í»§×ʽðÍêÈ«¸ôÀë¡£¡£¡£¡£ËûÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬£¬ËùÓпͻ§×ʲú¾ùδÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬Î£º¦³¨¿ÚÓɹ«Ë¾×ÔÓÐ×ʽ𴢱¸¼ç¸º¡£¡£¡£¡£¼ÓÃÜÇå¾²Ñо¿Ô±ZachXBTͨ¹ýTelegramƵµÀ½øÒ»²½ÆÊÎö£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õߵصã×î³õͨ¹ýTornado Cash»ì±ÒЧÀÍ»ñµÃ1öÒÔÌ«·»£¨ETH£©×ÊÖú£¬£¬£¬£¬£¬£¬£¬£¬Ëæºó½«²¿·Ö±»µÁ×ʽð¾Solana-ÒÔÌ«·»¿çÁ´ÇÅ×ªÒÆ£¬£¬£¬£¬£¬£¬£¬£¬×îÖպϲ¢Îª4,443öETHºÍ155,830öSolana£¨SOL£©£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ´¦ÓÚÐÝÃß״̬¡£¡£¡£¡£CoinDCXÌåÏÖÕýÓëÓ¡¶ÈÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-In£©¼°ÏàÖúÉúÒâËùÐͬÊӲ졣¡£¡£¡£Îª¼ÓËÙ×ʽð×·»Ø£¬£¬£¬£¬£¬£¬£¬£¬CoinDCXÓÚÖÜÒ»Æô¶¯¡°×·»ØÉͽð¡±ÍýÏ룬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÏòÐÖú×·×Ù»òÕһر»µÁ×ʲúµÄСÎÒ˽¼Ò»ò»ú¹¹Ìṩ×î¸ß25%µÄ×·»Ø½ð¶î×÷Ϊ½±Àø¡£¡£¡£¡£
https://techcrunch.com/2025/07/21/indian-crypto-exchange-coindcx-confirms-44-million-stolen-during-hack/
4. ÒÁÀʹØÁª°²×¿Ìع¤Èí¼þDCHSpyαװ³ÉVPN¼à¿ØÄ¿µÄÈËÊ¿
7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һ¿îÓëÒÁÀÊÇ鱨ÓëÇå¾²²¿£¨MOIS£©Ïà¹ØµÄÐÂÐͰ²×¿Ìع¤Èí¼þDCHSpy£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þͨ¹ýαװ³ÉVPNÓ¦Óü°SpaceXÐÇÁ´£¨Starlink£©ÎÀÐÇ»¥ÁªÍøÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÖж«µØÇøÓû§ÊµÑ鶨Ïò¹¥»÷¡£¡£¡£¡£Òƶ¯Çå¾²¹©Ó¦ÉÌLookoutÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬DCHSpyÑù±¾×îÔçÓÚ2024Äê7Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Æä¿ª·¢ÕßΪÒÁÀʹú¼ÒÅä¾°ºÚ¿Í×éÖ¯MuddyWater£¨ÓÖÃûBoggy Serpens¡¢TA450µÈ£©£¬£¬£¬£¬£¬£¬£¬£¬½üÆÚÔÚÒÔÉ«ÁÐ-ÒÁÀʳåÍ»±¬·¢ºóÒ»ÖÜÄÚ·ºÆðбäÖÖ£¬£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÆä»î¶¯ÓëµØÇøÊ±ÊÆÏ¸ÃܹØÁª¡£¡£¡£¡£DCHSpyΪģ¿£¿£¿£¿£¿£¿é»¯Ä¾Âí£¬£¬£¬£¬£¬£¬£¬£¬¾ß±¸¶àÏîÊý¾ÝÇÔÈ¡¹¦Ð§£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÍøÂçWhatsAppÐÅÏ¢¡¢ÕË»§Æ¾Ö¤¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼¡¢Î»ÖÃÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÔ¶³Ì¼Òô¡¢ÕÕÏ༰ÇÔÈ¡Îļþ¡£¡£¡£¡£ÔçÆÚ°æ±¾Í¨¹ýTelegramÇþµÀÈö²¥£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ×èµ²ÒÁÀÊÕþȨµÄÖ÷ÌâÄÚÈÝΪÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÓ¢ÓïºÍ²¨Ë¹ÓïÓû§£¬£¬£¬£¬£¬£¬£¬£¬Ä¿µÄȺÌåÒÉËÆÎªÒìÒéÈËÊ¿¡¢»î¸ÐÈËÊ¿¼°¼ÇÕß¡£¡£¡£¡£×îбäÖÖÔò½øÒ»²½Éý¼¶Èö²¥ÊֶΣ¬£¬£¬£¬£¬£¬£¬£¬Î±×°³É¡°Earth VPN¡±¡°Comodo VPN¡±¡°Hide VPN¡±µÈ¿´ËÆÊÊÓõÄVPNÓ¦Ó㬣¬£¬£¬£¬£¬£¬£¬ÉõÖÁʹÓá°starlink_vpn(1.3.0).apk¡±ÎļþÃûÄ£ÄâÐÇÁ´Ð§À;ÙÐзַ¢¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬ÐÇÁ´ÎÀÐÇ»¥ÁªÍøÐ§ÀÍÉÏÔ¸ÕÔÚÒÁÀÊÕþ¸®ÊµÑéÍøÂç·â±Õʱ´ú±»¼¤»î£¬£¬£¬£¬£¬£¬£¬£¬Ëæºó¸Ã¹úÒé»á½«Æä²»·¨»¯£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Î¶ñÒâÈí¼þ½èÐÇÁ´ÃûÒåÈö²¥£¬£¬£¬£¬£¬£¬£¬£¬»òÖ¼ÔÚʹÓÃÓû§¶ÔÊÜÏÞЧÀÍµÄÆÈÇÐÐèÇ󡣡£¡£¡£
https://thehackernews.com/2025/07/iran-linked-dchspy-android-malware.html
5. ÍøÂç´¹ÂÚʹÓÃ.LNKÎļþÓëLOLBinÊÖÒÕÈö²¥DeerStealer¶ñÒâÈí¼þ
7ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÐÂÐÍÖØ´óÍøÂç´¹Âڻ±»ÆØ¹â£¬£¬£¬£¬£¬£¬£¬£¬Æäͨ¹ýÎäÆ÷»¯µÄWindows¿ì½Ý·½·¨Îļþ£¨.LNK£©Èö²¥DeerStealer¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Óá°Living off the Land¡±£¨LOLBin£©ÊÖÒÕŲÓÃÕýµ±ÏµÍ³¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬£¬£¬¹¹½¨¶à½×¶Î¹¥»÷Á´ÒÔÈÆ¹ý¹Å°åÇå¾²·À»¤¡£¡£¡£¡£¸Ã»î¶¯ÓÉLinkedInÆÊÎöʦ¼°Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÒòÆä½ÓÄɸ߽׹æ±ÜÕ½ÂÔ²¢ÀÄÓÃ΢ÈíÔÉú¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬±»ÊÓΪ¶ñÒâÈí¼þת´ï»úÖÆµÄÖØ´óÑݽø¡£¡£¡£¡£¹¥»÷ÒÔαװ³É¡°Report.lnk¡±µÄÕýµ±PDFÎĵµÎªÆðµã£¬£¬£¬£¬£¬£¬£¬£¬ÏÖʵ´¥·¢È«ÐÄÉè¼ÆµÄÎå½×¶ÎÖ´ÐÐÁ´£º.LNKÎļþÊ×ÏÈÉñÃØÅ²ÓÃMicrosoft HTMLÓ¦ÓóÌÐòÖ÷»úmshta.exe£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¶¯Ì¬ÆÊÎöSystem32Ŀ¼·¾¶²¢×¢Èë»ìÏýµÄBase64¾ç±¾£¬£¬£¬£¬£¬£¬£¬£¬½ûÓÃÈÕÖ¾¼Í¼ÓëÆÊÎö¹¦Ð§ÒÔ½µµÍ·¨Ò½¿É¼ûÐÔ¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Á´ÒÀ´Î¾cmd.exe¡¢PowerShell²ã²ãµÝ½ø£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕÔÚAppDataĿ¼¾²Ä¬°²ÅÅDeerStealerÖ÷³ÌÐò¡£¡£¡£¡£ÎªÊèÉ¢Êܺ¦Õß×¢ÖØÁ¦£¬£¬£¬£¬£¬£¬£¬£¬ÏµÍ³Í¬Ê±ÏÂÔØ²¢·¿ªÕýµ±PDFÓÕ¶üÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÑÚÊζñÒâÈí¼þ×°ÖÃÐÐΪ¡£¡£¡£¡£
https://cybersecuritynews.com/deerstealer-malware-delivered/
6. °ÙÄêÎïÁ÷¾ÞÍ·ÒòÃÜÂëй¶ÔâÀÕË÷¹¥»÷ÐÝÒµ
7ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ó¢¹ú±±°²ÆÕ¶Ø¿¤°ÙÄêÔËÊäÆóÒµKNP LogisticsÒòAkiraÀÕË÷Èí¼þ¹¥»÷ÏÝÈëÐÝÒµÖÎÀí£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ730ÃûÔ±¹¤Ê§Òµ£¬£¬£¬£¬£¬£¬£¬£¬³ÉΪ2024ÄêÓ¢¹úÆóÒµÔâÓöÍøÂç¹¥»÷µÄ±ê¼ÇÐÔ°¸Àý¡£¡£¡£¡£Õâ¼Ò½¨ÉèÓÚ1865ÄêµÄ¼Ò×åÆóÒµ£¬£¬£¬£¬£¬£¬£¬£¬ÓÚÎôʱ6ÔÂÒòÔ±¹¤ÃÜÂëй¶±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÍÆ²â¼òµ¥ÕË»§Æ¾Ö¤ÀÖ³ÉÉøÍ¸ÏµÍ³£¬£¬£¬£¬£¬£¬£¬£¬°²ÅÅÀÕË÷Èí¼þ¼ÓÃÜÒªº¦Êý¾Ý²¢Ë÷ÒªÔ¼500ÍòÓ¢°÷Êê½ð¡£¡£¡£¡£Ö»¹ÜKNPδ֧¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÈÔ³¹µ×̱»¾ÆäÔËÓª¡¢²ÆÎñ¼Í¼»á¼û¼°ÐÂ×ʽð»ñÈ¡ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕÆÈʹÕâ¼ÒÓµÓÐ158ÄêÀúÊ·µÄÆóÒµµ¹±Õ¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶ÁËÖÐСÆóÒµÍøÂçÇå¾²·À»¤µÄÖÂÃüÈõµã¡£¡£¡£¡£KNPÖ÷¹Ü±£ÂÞ¡¤°¢²©ÌØÍ¸Â¶£¬£¬£¬£¬£¬£¬£¬£¬ÉæÊÂÔ±¹¤ÖÁ½ñδ±»¼û¸æÆäÃÜÂëй¶ֱ½Óµ¼Ö¹«Ë¾Í߽⣬£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÍøÂç¹¥»÷¶ÔÔ±¹¤ÐÄÀíµÄ¶þ´ÎΣÏÕ¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬£¬»ù´¡ÃÜÂëÇå¾²ÈÔÊÇÖ÷Òª·ÀµØ£¬£¬£¬£¬£¬£¬£¬£¬96%µÄ³£ÓÃÃÜÂë¿ÉÔÚ1ÃëÄÚ±»ÆÆ½â¹¤¾ß¹¥ÆÆ£¬£¬£¬£¬£¬£¬£¬£¬¶øÔ±¹¤¿çÕË»§Öظ´Ê¹ÓÃÃÜÂëµÄϰ¹ß½øÒ»²½¼Ó¾çΣº¦¡£¡£¡£¡£
https://cybersecuritynews.com/weak-password-destroy-158-year-old-company/


¾©¹«Íø°²±¸11010802024551ºÅ