ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§

Ðû²¼Ê±¼ä 2025-10-29

1. ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§


10ÔÂ26ÈÕ £¬¿ËÈÕ £¬¹¥»÷ÕßÕýʹÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡³ÌÐò £¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌᳫ¶¨Ïò¹¥»÷¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢ £¬¼æÈÝWindowsºÍLinuxϵͳ £¬Í¨¹ýPyInstaller±àÒëΪ×ÔÁ¦¶þ½øÖÆÎļþ £¬²¢Î±×°³ÉÓÎÏ·»òDiscordÏà¹Ø¹¤¾ßÓÕµ¼Óû§ÏÂÔØ¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸Ç¿Ê¢¹¦Ð§ £¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¼ÓÃÜÇ®°üÎļþ¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢ £¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼¡£Æä¹¥»÷Á÷³Ì°üÀ¨É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ £¬Í¨¹ýÕýÔò±í´ïʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ £¬½ø¶ø»ñÈ¡Óû§Ð¡ÎÒ˽¼Ò×ÊÁÏ¡¢ÓÊÏä¡¢¶àÒòËØÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé¡£¸üÒþ²ØµÄÊÇ £¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ £¬×èµ²µÇ¼ʵÑé¡¢¹ºÖü°ÃÜÂë¸ü¸ÄµÈÊÂÎñ £¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢ÐÅÓÿ¨Êý¾Ý¡£±ðµÄ £¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ £¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢·þÎñGoFile £¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/


2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷ £¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹ûÕæ


10ÔÂ27ÈÕ £¬¿ËÈÕ £¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ £¬ÍøÂç·¸·¨·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡°üÀ¨¿Í»§ÒøÐÐÕ˺š¢ÉúÒâ¼Í¼µÈÃô¸ÐÐÅÏ¢¡£´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢ £¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò» £¬Äê¶ÈÓªÊÕ³¬620ÒÚÃÀÔª £¬È«Çò¹ÍÔ±Ô¼22ÍòÈË £¬ÆäÃÀ¹úÊг¡Õ½ÂÔ½ñÄêÍ·Òѵ÷½â £¬Öð²½Í˳öÉÌÒµÒøÐÐÓªÒµ¡£¾ÝÑо¿ÍŶӶԺڿ͹ûÕæµÄÊý¾ÝÑùÌìÖ°Îö £¬Ð¹Â¶ÐÅÏ¢º­¸ÇÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢ÉúÒâ¼Í¼¡¢¹ÉƱÉúÒâÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ¡£ÍøÂçÇ徲ר¼Ò¾¯Ê¾ £¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèڲƭÕË»§¡¢Ðéα±¨Ë°£©¡¢»ùÓÚÏûºÄϰ¹ß²ß»®¾«×¼ÍøÂçÕ©Æ­ £¬»òð³ä½ðÈÚ»ú¹¹ÊµÑéµçÐÅÕ©Æ­ £¬×é³É¶àÖØ²»·¨Ô˶¯Î£º¦¡£ÒµÄÚÈËʿָ³ö £¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³ÉÖØ´´ £¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´ÍêÕûչʾ±»µÁÊý¾Ý¼¯È«Ã² £¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üР£¬ÌåÏÖ±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§ £¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÓªÒµ¡£


https://cybernews.com/security/hsbc-usa-data-breach-claims/


3. °ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶


10ÔÂ25ÈÕ £¬¿ËÈÕ £¬°ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷ÕßÔÚ×ÅÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯ £¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý £¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈСÎÒ˽¼ÒÐÅÏ¢¡£Gerar×÷ΪÖÂÁ¦ÓÚ×ÊÖúÄêÇáÈË»ñµÃʵϰºÍ¾Íҵʱ»úµÄ·ÇÓªÀû»ú¹¹ £¬´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢¡£Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ £¬Ð¹Â¶ÐÅÏ¢º­¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ £¬°üÀ¨Ò½ÁƼì²éÕªÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄÌõÔ¼¡¢±øÒÛÎļþµÈ¡£Ïêϸй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢µØµã¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢½ÌÓý¼Í¼µÈ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬Ñù±¾Öл¹°üÀ¨ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥ £¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓá¢Ú²Æ­ÕË»§¿ªÉè¡¢´û¿îÉêÇëµÈ²»·¨Ô˶¯¡£ÏÖÔÚ £¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£


https://cybernews.com/security/gerar-youth-nonprofit-data-breach/


4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶


10ÔÂ28ÈÕ £¬ÈÕ±¾¹ã¸æ¾ÞÍ·µçͨ¼¯ÍÅÅû¶ £¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©ÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ £¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶¡£×÷ΪӦ¶Ô²½·¥ £¬µçͨÒѹرղ¿·Öϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦³ÌÐò £¬Í¬Ê±Ïò¶à¹úÏà¹Ø²¿·ÖÒÀ·¨±¨¸æ £¬µ«ÏêϸӰÏì¹æÄ£ÉÐδÃ÷È·¡£ÃÀ¿â¶ûÊǵçͨ¼¯ÍÅÍâÑóÓªÒµÖпͻ§ÌåÑéÖÎÀí£¨CXM£©ÁìÓòµÄ½¹µã×Ó¹«Ë¾ £¬ÔÚ±±ÃÀ¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¼°ÑÇÌ«µØÇøÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹ £¬ÓµÓÐ1.6ÍòÃûÔ±¹¤ £¬ÄêÊÕÈë´ï20ÒÚÃÀÔª £¬·þÎñ¿Í»§°üÀ¨È¸³²¡¢Î¢Èí¡¢±¦½à¡¢Ó¢ÌضûµÈÈ«Çò×ÅÃûÆóÒµ¡£´Ë´ÎÊÂÎñÖÐ £¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¹©Ó¦É̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢ £¬Ïêϸ°üÀ¨ÒøÐÐÕË»§¡¢ÈËΪµ¥ÏêÇ顢нˮ¡¢¹úÃñ°ü¹ÜºÅÂ뼰СÎÒ˽¼ÒÁªÏµ·½·¨µÈ¡£µçͨ½²»°ÈË֤ʵ £¬ÊÜÓ°ÏìСÎÒ˽¼ÒÒÑÊÕµ½Í¨Öª £¬¹«Ë¾ÕýÍŽáµÚÈý·½»ú¹¹ÊÓ²ìÊÂÎñ¹æÄ£¼°ÖÜȫӰÏì¡£µçͨ¼¯ÍÅÇ¿µ÷ £¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼° £¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´Ò»¶¨²ÆÎñËðʧ¡£ÏÖÔÚ £¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ £¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£


https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/


5. еÄAtroposia¶ñÒâÈí¼þ¸½´øÍâµØÎó²îɨÃè³ÌÐò


10ÔÂ28ÈÕ £¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂçÇå¾²½ç¸ß¶È¹Ø×¢¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸·¨·Ö×ÓÌṩÄ£¿é»¯Ô¶³Ì»á¼ûľÂí£¨RAT£© £¬¼¯³ÉÒ»Á¬»á¼û¡¢Ìӱܼì²â¡¢Êý¾Ý͵ÇÔºÍÍâµØÎó²îɨÃèËĴ󽹵㹦Ч £¬³ÉΪ¼ÌSpamGPT¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸·¨¹¤¾ß°ü´ú±í¡£VaronisÇå¾²ÍŶÓÑо¿·¢Ã÷ £¬Atroposiaͨ¹ý¼ÓÃÜͨµÀÓëÏÂÁî¿ØÖÆ£¨C2£©·þÎñÆ÷ͨѶ £¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§¿ØÖÆ£¨UAC£©ÌáÉýȨÏÞ £¬ÔÚÊÜѬȾÖ÷»ú½¨É賤ÆÚÒþÃØ»á¼û¡£Æä¹¦Ð§Ä£¿é°üÀ¨£ºHRDP ConnectÄ£¿é¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢×¥È¡×é¼þ¡¢ÇÔȡģ¿é¡¢¼ôÌù°åÖÎÀíÆ÷¡¢DNSÐ®ÖÆÄ£¿é £¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõÄÎó²îɨÃèÆ÷ £¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢²»Çå¾²ÉèÖü°¹ýʱÈí¼þ°æ±¾ £¬ÌìÉúÎó²îÓÅÏȼ¶ÆÀ·Ö £¬Öú¹¥»÷Õß¿ìËÙ¶¨Î»¿ÉʹÓõÄȨÏÞÌáÉýÎó²î»ò¹ýʱVPN¿Í»§¶ËµÈ±¡Èõµã¡£


https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/


6. CISAÖÒÑÔ´ïË÷ϵͳDELMIA AprisoÎó²îÔâÒ°ÍâʹÓÃ


10ÔÂ28ÈÕ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÑÏÖØÇå¾²Ô¤¾¯ £¬Ö¸³ö¹¥»÷ÕßÕýÆð¾¢Ê¹ÓôïË÷ϵͳDELMIA AprisoÖÆÔìÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¼Æ»®ÖеÄÁ½¸ö¸ßΣÎó²î¡£ÕâÁ½¸öÎó²î»®·ÖΪCVE-2025-6205£¨È±Ê§ÊÚȨÎó²î £¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨»á¼û£©ºÍCVE-2025-6204£¨¸ßÑÏÖØË®Æ½´úÂë×¢ÈëÎó²î £¬¿ÉÖ´ÐÐí§Òâ´úÂ룩 £¬Ó°Ïì2020ÖÁ2025°æ²úÆ·¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õÐû²¼²¹¶¡ÐÞ¸´ £¬µ«CISAÇ¿µ÷Îó²îÒÑÔÚÒ°Íâ±»ÏÖʵʹÓà £¬²¢½«ÆäÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£Æ¾Ö¤2021Äê11ÔÂÐû²¼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01 £¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©Íê³ÉÎó²îÐÞ²¹ £¬²»È»½«ÃæÁÙÖØ´óÍøÂçÇ徲Σº¦¡£ÖµµÃ×¢ÖØµÄÊÇ £¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯Ê¹ÓÃÎó²îĿ¼ £¬ÍþвÑо¿Ô±Johannes Ullrich´ËǰÒÑ·¢Ã÷ÆäÊ׸öʹÓü£Ïó¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/