ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§
Ðû²¼Ê±¼ä 2025-10-291. ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§
10ÔÂ26ÈÕ£¬¿ËÈÕ£¬¹¥»÷ÕßÕýʹÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌᳫ¶¨Ïò¹¥»÷¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢£¬¼æÈÝWindowsºÍLinuxϵͳ£¬Í¨¹ýPyInstaller±àÒëΪ×ÔÁ¦¶þ½øÖÆÎļþ£¬²¢Î±×°³ÉÓÎÏ·»òDiscordÏà¹Ø¹¤¾ßÓÕµ¼Óû§ÏÂÔØ¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸Ç¿Ê¢¹¦Ð§£¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¼ÓÃÜÇ®°üÎļþ¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢£¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼¡£Æä¹¥»÷Á÷³Ì°üÀ¨É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ£¬Í¨¹ýÕýÔò±í´ïʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ£¬½ø¶ø»ñÈ¡Óû§Ð¡ÎÒ˽¼Ò×ÊÁÏ¡¢ÓÊÏä¡¢¶àÒòËØÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé¡£¸üÒþ²ØµÄÊÇ£¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ£¬×èµ²µÇ¼ʵÑé¡¢¹ºÖü°ÃÜÂë¸ü¸ÄµÈÊÂÎñ£¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢ÐÅÓÿ¨Êý¾Ý¡£±ðµÄ£¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ£¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢·þÎñGoFile£¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/
2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷£¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹ûÕæ
10ÔÂ27ÈÕ£¬¿ËÈÕ£¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬ÍøÂç·¸·¨·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡°üÀ¨¿Í»§ÒøÐÐÕ˺š¢ÉúÒâ¼Í¼µÈÃô¸ÐÐÅÏ¢¡£´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢£¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò»£¬Äê¶ÈÓªÊÕ³¬620ÒÚÃÀÔª£¬È«Çò¹ÍÔ±Ô¼22ÍòÈË£¬ÆäÃÀ¹úÊг¡Õ½ÂÔ½ñÄêÍ·Òѵ÷½â£¬Öð²½Í˳öÉÌÒµÒøÐÐÓªÒµ¡£¾ÝÑо¿ÍŶӶԺڿ͹ûÕæµÄÊý¾ÝÑùÌìÖ°Îö£¬Ð¹Â¶ÐÅÏ¢º¸ÇÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢ÉúÒâ¼Í¼¡¢¹ÉƱÉúÒâÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ¡£ÍøÂçÇ徲ר¼Ò¾¯Ê¾£¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèÚ²ÆÕË»§¡¢Ðéα±¨Ë°£©¡¢»ùÓÚÏûºÄϰ¹ß²ß»®¾«×¼ÍøÂçÕ©Æ£¬»òð³ä½ðÈÚ»ú¹¹ÊµÑéµçÐÅÕ©Æ£¬×é³É¶àÖØ²»·¨Ô˶¯Î£º¦¡£ÒµÄÚÈËʿָ³ö£¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³ÉÖØ´´£¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´ÍêÕûչʾ±»µÁÊý¾Ý¼¯È«Ã²£¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üУ¬ÌåÏÖ±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§£¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÓªÒµ¡£
https://cybernews.com/security/hsbc-usa-data-breach-claims/
3. °ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶
10ÔÂ25ÈÕ£¬¿ËÈÕ£¬°ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷ÕßÔÚ×ÅÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯£¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý£¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈСÎÒ˽¼ÒÐÅÏ¢¡£Gerar×÷ΪÖÂÁ¦ÓÚ×ÊÖúÄêÇáÈË»ñµÃʵϰºÍ¾Íҵʱ»úµÄ·ÇÓªÀû»ú¹¹£¬´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢¡£Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬Ð¹Â¶ÐÅÏ¢º¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ£¬°üÀ¨Ò½ÁƼì²éÕªÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄÌõÔ¼¡¢±øÒÛÎļþµÈ¡£Ïêϸй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢µØµã¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢½ÌÓý¼Í¼µÈ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Ñù±¾Öл¹°üÀ¨ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥£¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓá¢Ú²ÆÕË»§¿ªÉè¡¢´û¿îÉêÇëµÈ²»·¨Ô˶¯¡£ÏÖÔÚ£¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£
https://cybernews.com/security/gerar-youth-nonprofit-data-breach/
4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶
10ÔÂ28ÈÕ£¬ÈÕ±¾¹ã¸æ¾ÞÍ·µçͨ¼¯ÍÅÅû¶£¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©ÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶¡£×÷ΪӦ¶Ô²½·¥£¬µçͨÒѹرղ¿·Öϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦³ÌÐò£¬Í¬Ê±Ïò¶à¹úÏà¹Ø²¿·ÖÒÀ·¨±¨¸æ£¬µ«ÏêϸӰÏì¹æÄ£ÉÐδÃ÷È·¡£ÃÀ¿â¶ûÊǵçͨ¼¯ÍÅÍâÑóÓªÒµÖпͻ§ÌåÑéÖÎÀí£¨CXM£©ÁìÓòµÄ½¹µã×Ó¹«Ë¾£¬ÔÚ±±ÃÀ¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¼°ÑÇÌ«µØÇøÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹£¬ÓµÓÐ1.6ÍòÃûÔ±¹¤£¬ÄêÊÕÈë´ï20ÒÚÃÀÔª£¬·þÎñ¿Í»§°üÀ¨È¸³²¡¢Î¢Èí¡¢±¦½à¡¢Ó¢ÌضûµÈÈ«Çò×ÅÃûÆóÒµ¡£´Ë´ÎÊÂÎñÖУ¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¹©Ó¦É̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢£¬Ïêϸ°üÀ¨ÒøÐÐÕË»§¡¢ÈËΪµ¥ÏêÇ顢нˮ¡¢¹úÃñ°ü¹ÜºÅÂ뼰СÎÒ˽¼ÒÁªÏµ·½·¨µÈ¡£µçͨ½²»°ÈË֤ʵ£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÒÑÊÕµ½Í¨Öª£¬¹«Ë¾ÕýÍŽáµÚÈý·½»ú¹¹ÊÓ²ìÊÂÎñ¹æÄ£¼°ÖÜȫӰÏì¡£µçͨ¼¯ÍÅÇ¿µ÷£¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼°£¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´Ò»¶¨²ÆÎñËðʧ¡£ÏÖÔÚ£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£
https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/
5. еÄAtroposia¶ñÒâÈí¼þ¸½´øÍâµØÎó²îɨÃè³ÌÐò
10ÔÂ28ÈÕ£¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂçÇå¾²½ç¸ß¶È¹Ø×¢¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸·¨·Ö×ÓÌṩģ¿é»¯Ô¶³Ì»á¼ûľÂí£¨RAT£©£¬¼¯³ÉÒ»Á¬»á¼û¡¢Ìӱܼì²â¡¢Êý¾Ý͵ÇÔºÍÍâµØÎó²îɨÃèËĴ󽹵㹦Ч£¬³ÉΪ¼ÌSpamGPT¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸·¨¹¤¾ß°ü´ú±í¡£VaronisÇå¾²ÍŶÓÑо¿·¢Ã÷£¬Atroposiaͨ¹ý¼ÓÃÜͨµÀÓëÏÂÁî¿ØÖÆ£¨C2£©·þÎñÆ÷ͨѶ£¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§¿ØÖÆ£¨UAC£©ÌáÉýȨÏÞ£¬ÔÚÊÜѬȾÖ÷»ú½¨É賤ÆÚÒþÃØ»á¼û¡£Æä¹¦Ð§Ä£¿é°üÀ¨£ºHRDP ConnectÄ£¿é¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢×¥È¡×é¼þ¡¢ÇÔȡģ¿é¡¢¼ôÌù°åÖÎÀíÆ÷¡¢DNSÐ®ÖÆÄ£¿é£¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõÄÎó²îɨÃèÆ÷£¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢²»Çå¾²ÉèÖü°¹ýʱÈí¼þ°æ±¾£¬ÌìÉúÎó²îÓÅÏȼ¶ÆÀ·Ö£¬Öú¹¥»÷Õß¿ìËÙ¶¨Î»¿ÉʹÓõÄȨÏÞÌáÉýÎó²î»ò¹ýʱVPN¿Í»§¶ËµÈ±¡Èõµã¡£
https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
6. CISAÖÒÑÔ´ïË÷ϵͳDELMIA AprisoÎó²îÔâÒ°ÍâʹÓÃ
10ÔÂ28ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÑÏÖØÇå¾²Ô¤¾¯£¬Ö¸³ö¹¥»÷ÕßÕýÆð¾¢Ê¹ÓôïË÷ϵͳDELMIA AprisoÖÆÔìÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¼Æ»®ÖеÄÁ½¸ö¸ßΣÎó²î¡£ÕâÁ½¸öÎó²î»®·ÖΪCVE-2025-6205£¨È±Ê§ÊÚȨÎó²î£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨»á¼û£©ºÍCVE-2025-6204£¨¸ßÑÏÖØË®Æ½´úÂë×¢ÈëÎó²î£¬¿ÉÖ´ÐÐí§Òâ´úÂ룩£¬Ó°Ïì2020ÖÁ2025°æ²úÆ·¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õÐû²¼²¹¶¡ÐÞ¸´£¬µ«CISAÇ¿µ÷Îó²îÒÑÔÚÒ°Íâ±»ÏÖʵʹÓ㬲¢½«ÆäÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£Æ¾Ö¤2021Äê11ÔÂÐû²¼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©Íê³ÉÎó²îÐÞ²¹£¬²»È»½«ÃæÁÙÖØ´óÍøÂçÇ徲Σº¦¡£ÖµµÃ×¢ÖØµÄÊÇ£¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯Ê¹ÓÃÎó²îĿ¼£¬ÍþвÑо¿Ô±Johannes Ullrich´ËǰÒÑ·¢Ã÷ÆäÊ׸öʹÓü£Ïó¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/


¾©¹«Íø°²±¸11010802024551ºÅ