Netflix¡¶¹ÔìæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
°ä²¼¹¦·ò 2025-02-271. Netflix¡¶¹ÔìæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
2ÔÂ25ÈÕ£¬2025Äê¶ÔNetflixÀ´Ëµ¿ÉνÊǶàÊÂÖ®Çï¡£Ê×ÏÈ£¬Ãæ¶ÔÀ´×ÔDisney+¡¢HuluºÍMaxµÈ¾ºÕùƽ̨µÄÇ¿ÁÒ¾ºÕù£¬Óû§Áô´æÂÊÏ»¬£¬ÄÚÈÝÎüÒýÁ¦¼õÈõ£¬¼ÓÖ®ÃÜÂë¹²ÏíÏ޶ȺͶ©ÔļÛÖµÉÏÕÇÒý·¢Óû§²»Âú¡£½üÈÕ£¬NetflixµÄÆì½¢¾ç¼¯¡¶¹ÔìæÎïÓï¡·×îºóÒ»¼¾£¨µÚÎå¼¾£©µÄÃô¸Ðϸ½ÚÒ²Ôâ·êÁËй¶¡£¾ÝNetflixƵ·±¨Â·£¬Õâ´ÎйÃÜ¿ÉÄÜÔ´×ÔÒ»¸öÄÚ²¿Æ½Ì¨£¬¸Ãƽ̨ËäÊÜ»¥ÁªÍø½Ó¼ûÏÞ¶È£¬µ«ÈÔ±»Î´ÖªÈËÔ±»ñÈ¡²¢Ð¹Â¶ÁËÔ̺¬ÏÖʵͼƬ¡¢½ÇɫָÄÏ¡¢»Õ±ê¼°ÒÕÊõ¼ÒÒÕÊõÎÄÕµÈÔÚÄڵı£ÃÜÐÅÏ¢¡£Ð¹Â¶µÄÄÚÈÝÔÚÍøÉÏѸ¿ì´«²¼£¬ÉõÖÁ½ÒʾÁËÖØÒªÈËÎïµÄÃüÔË¡£Ö»¹ÜNetflixÕýͨ¹ý˾·¨¼¿Á©ºÍDMCAɾ³ýÒªÇóÀ´ÏÞ¶ÈËðʧ£¬µ«Ò»Ð©×¨ÃÅ»áÉÌ¡¶¹ÔìæÎïÓï¡·µÄÉ罻ýÌåÕË»§ÒÑ·ÖÏíÁËй¶ÐÅÏ¢£¬ÇÒNetflixÒ»ÏòæÓÚÒªÇóÓû§É¾³ý¸æ·¢Ìû×Ó¡£ÖµÍ×ÌùÐĵÄÊÇ£¬NetflixÈ¥ÄêÒ²ÔøÔâ·ê¹ýйÃÜÊÂÎñ£¬Æäʱ¼¸²¿¶¯»ÏµÁеÄÕû¼¯±»·¸·¨°ä²¼ÔÚÍøÉÏ¡£
https://cybernews.com/news/netflix-stranger-things-leaks/
2. Southern Water³ÆBlack BastaÀÕË÷Èí¼þ¹¥»÷Ôì³É450ÍòÓ¢°÷Ëðʧ
2ÔÂ26ÈÕ£¬Ó¢¹ú¹©Ë®ÉÌSouthern WaterÔÚ2024Äê2ÔÂÔâ·êÁËÍøÂç¹¥»÷£¬Ëðʧ¸ß´ï450ÍòÓ¢°÷¡£×÷Ϊһ¼ÒΪӢ¸ñÀ¼Äϲ¿µØÓòÌṩ¹©Ë®ÓëÎÛË®´¦Ö÷þÎñµÄ˽Ӫ¹«ÓÃÊÂÒµ¹«Ë¾£¬Southern Waterͨ¹ýÖØ´óµÄ¹ÜÍøÏµÍ³ÖðÈÕΪ270Íò¿Í»§Ìṩ¹©Ë®·þÎñ£¬²¢Îª³¬¹ý470Íò¿Í»§ÌṩÎÛË®´¦Ö÷þÎñ¡£Õâ´Î¹¥»÷ÓɳôÃûÔ¶ÑïµÄBlack BastaÀÕË÷Èí¼þÍÅ»ïÐû³ÆÕƹܣ¬¸ÃÍÅ»ïÒÔ¹¥»÷¹Ø¼ü»ù´¡ÉèÊ©¶øÖø³Æ¡£Ö»¹ÜSouthern Water´ËÇ°Ôø°ä·¢Ôâ·ê°²È«·ì϶£¬µ«²¢Î´Ó°ÏìÆäÔËÓª¡¢²ÆÕþ»òÃæÏò¿Í»§µÄϵͳ¡£Õâ´Î¹¥»÷µ¼Ö²¿ÃÅ·þÎñÆ÷Êý¾Ý±»ÇÔÈ¡£¬¹«Ë¾Îª´ËÀñƸÁË±í²¿ÍøÂ簲ȫר¼ÒºÍ˾·¨ÕÕ·÷£¬²¢Í¨ÖªÁË¿ÉÄÜÊÜÓ°ÏìµÄÓ×ÎÒ¡£³ýÁËÖ±½Ó¾¼ÃËðʧ±í£¬¸ÃÊÂÎñ»¹¿ÉÄÜ´øÀ´ÃûÓþÇÖº¦¡¢Ë¾·¨ÓöȺͼà¹ÜÉó²éµÈDZÔÚ·çÏÕ¡£¾Ý·ÖÎö£¬Southern Water¾Ý³ÆÔøÌáÒéÏòÀÕË÷Èí¼þ·¸×ï·Ö×ÓÖ§¸¶75ÍòÓ¢°÷£¬Ö»¹Ü¹¥»÷Õß×î³õÒªÇóÖ§¸¶¸ü¸ß½ð¶î¡£È»¶ø£¬µ½2024Äê2Ôµף¬¸Ã¹«Ë¾µÄÌõ¿îÒÑ´ÓBlack BastaµÄÀÕË÷ÍøÕ¾ÉÑþ³Øý£¬Õâ¿ÉÄÜÅúע˫·½ÒÑ´ï³ÉijÖÖºÍ̸¡£
https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/
3. GrassCallÉç»á¹¤³Ì¹¥»÷£ºÊý°ÙÈ˼ÓÃÜÇ®±ÒÇ®°ü±»µÁ
2ÔÂ26ÈÕ£¬½üÆÚ£¬Ò»¸öÃûΪCrazy EvilµÄ¶íÓïÍøÂç·¸×ïÍÅ»ïͨ¹ý¶ñÒâµÄ¡°GrassCall¡±»áÒéÀûÓ÷¨Ê½ÌáÒéÁËÒ»ÏîÕë¶ÔWeb3ÁìÓòÇóÖ°ÕßµÄÉç»á¹¤³Ì¹¥»÷¡£¸ÃÍÅ»ïÓÕÆÇóÖ°ÕßÔÚWindowsºÍMacÉ豸¸ßµÍÔØ¶ñÒâÈí¼þ£¬¸ÃÈí¼þ¿ÉÄÜÇÔÈ¡ÃÜÂë¡¢Éí·ÝÑéÖ¤cookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£Êý°ÙÈËÒò¶øÊܺ¦£¬Ò»Ð©È˵ÄÇ®°ü±»ÌͿա£¹¥»÷Õß´´½¨ÁËÒ»¸öÐéαµÄÔÚÏß½ÇÉ«£¬Ô̺¬ÍøÕ¾ºÍÉ罻ýÌå×ÊÁÏ£¬¼Ù×°ÊÇÒ»¼ÒÃûΪ¡°ChainSeeker.io¡±µÄ¹«Ë¾£¬²¢ÔÚLinkedInµÈÇóÖ°ÍøÕ¾Éϰ䲼ÐéαÕÐÆ¸ÐÅÏ¢¡£Êܺ¦Õß»áÊÕµ½¿ÚÊÔÔ¼Ç룬²¢±»ÒªÇóͨ¹ýTelegramÁªÏµÊ×ϯӪÏú¹Ù£¬ÏÂÔØ²¢Ê¹ÓÃGrassCallÊÓÆµ»áÒéÈí¼þ¡£È»¶ø£¬¸ÃÈí¼þÏÖʵÉÏÊÇ֮ǰ»î¶¯ÖÐʹÓõġ°Gatherum¡±ÍøÕ¾µÄ¿Ë¡°æ£¬»á×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»òÔ¶³Ì½Ó¼ûľÂí¡£ÔÚWindowsÉ豸ÉÏ£¬»á×°ÖÃRATºÍÐÅÏ¢ÇÔÈ¡·¨Ê½£¬ÈçRhadamanthys£»ÔÚMacÉÏ£¬»á×°ÖÃAtomic (AMOS) Stealer¶ñÒâÈí¼þ¡£ÕâЩ¶ñÒâÈí¼þ»á³¢ÊÔÆ¾¾Ý¹Ø¼ü×Ö¡¢¼ÓÃÜÇ®±ÒÇ®°üµÈÐÅÏ¢À´ÇÔÈ¡Îļþ£¬²¢½«±»µÁÐÅÏ¢ÉÏ´«ÖÁ·þÎñÆ÷µÄTelegramƵ·¡£Crazy Evil³ÉÔ±´Óÿ¸ö³É¹¦ÆÈ¡µÄÊܺ¦ÕßÉíÉÏ׬ȡÊýÍòÉõÖÁÊýÊ®ÍòÃÀÔª¡£
https://www.bleepingcomputer.com/news/security/grasscall-malware-campaign-drains-crypto-wallets-via-fake-job-interviews/
4. °Ä´óÀûÑÇIVF¾ÞÍ·GeneaÔâTermiteÀÕË÷Èí¼þ¹¥»÷
2ÔÂ26ÈÕ£¬½üÆÚ£¬°Ä´óÀûÑÇ×î´óµÄÉúÓý·þÎñÌṩÉÌÖ®Ò»GeneaÔâ·êÁËÒ»Â·ÍøÂç¹¥»÷ÊÂÎñ£¬¹¥»÷ÕßÇÔÈ¡ÁËÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡£¾Ý°Ä´óÀûÑǹú¶È¹ã²¥¹«Ë¾±¨Â·£¬GeneaÔڸùúÉúÓý·þÎñÐÐÒµÖÐÕ¼¾Ý³ÁҪְ룬ÓëÁí±íÁ½¼Ò¹«Ë¾¹²Í¬Õ¼Óг¬¹ý80%µÄÊг¡·Ý¶î¡£Õâ´Î¹¥»÷ÊÂÎñºó£¬GeneaÈ·ÈϹ¥»÷ÕßÒÑÇÔÈ¡ÆäϵͳÖеÄÊý¾Ý£¬²¢ÔÚÍøÉϰ䲼¡£¾Ýµ÷²é£¬¹¥»÷Õßͨ¹ýCitrix·þÎñÆ÷ÓÚ2025Äê1ÔÂ31ÈÕ½øÈëGeneaÍøÂç£¬Ëæºó»ñÈ¡ÁËÖ÷Îļþ·þÎñÆ÷¡¢Óò½ÚÔìÆ÷µÈµÄ½Ó¼ûȨÏÞ£¬²¢ÔÚ2ÔÂ14ÈÕ½«940.7GBµÄÊý¾ÝÇÔÈ¡ÖÁÆä½ÚÔìµÄÔÆ·þÎñÆ÷ÖС£ÊÜËðµÄ»¼ÕßÖÎÀíϵͳÖÐÔ̺¬Ó×ÎҺͽ¡È«Êý¾Ý£¬ÈçÈ«Ãû¡¢µØÖ·¡¢Ò½ÁƼͼµÈ£¬µ«ÐÅÓþ¿¨ÐÅÏ¢µÈ²ÆÕþÐÅϢδÊÜÓ°Ïì¡£¹ÌÈ»GeneaδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬µ«TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶Ô´ËÕÆ¹Ü£¬²¢ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾Éϰ䲼Á˾ݳƴÓGeneaÍøÂçÖÐÇÔÈ¡µÄÊý¾Ý½ØÍ¼¡£TermiteÀÕË÷Èí¼þÍÅ»ï×ÔÈ¥Äê10ÔÂÖÐÑ®³öÏÖÒÔÀ´£¬ÒÑÓжàÃûÊܺ¦Õߣ¬»¹ÔøÐû³Æ¹¥ÆÆÁËÈ«Çò¹©¸øÁ´Èí¼þÌṩÉÌBlue YonderµÄÍøÂç¡£
https://www.bleepingcomputer.com/news/security/australian-ivf-giant-genea-breached-by-termite-ransomware-gang/
5. automslc¶ñÒâPyPi°ü£ºÀÄÓÃDeezerƾ֤ʵÏÖ´ó¹æÄ£ÒôÀÖµÁ°æ
2ÔÂ26ÈÕ£¬×Ô2019ÄêÒÔÀ´£¬Ò»¸öÃûΪ¡°automslc¡±µÄ¶ñÒâPyPi°üÒѱ»ÏÂÔØ³¬¹ý10Íò´Î£¬¸Ã°üÀÄÓÃÓ²±àÂëÍ´´¦´ÓDeezerÒôÀÖÁ÷ýÌå·þÎñÖеÁ°æÒôÀÖ¡£DeezerÊÇÒ»Ï¸Ç180¸ö¹ú¶È/µØÓò¡¢Ìṩ³¬¹ý9000ÍòÊ×ÇúÖ÷ÕÅ·þÎñ¡£°²È«¹«Ë¾Socket·¢ÏÖÁËÕâ¸ö¶ñÒâ°ü£¬Ëüͨ¹ýÓ²±àÂëµÄDeezerƾ֤ÏÂÔØÃ½Ì岢ץȡԪÊý¾Ý£¬Î¥·´ÁËDeezerµÄ·þÎñÌõ¿îºÍ°æÈ¨·¨¡£automslcʹÓúÅÁîºÍ½ÚÔ죨C2£©»ù´¡ÉèÊ©½øÐм¯ÖнÚÔ죬¿ÉÄܽ«Óû§ÄÉÈëÉ¢²¼Ê½ÍøÂ磬²¢ÈÝÒ×±»ÓÃÓÚÆäËû¶ñÒâ»î¶¯¡£¸Ã¶ñÒâÈí¼þ°üÔ̺¬Ó²±àÂëµÄDeezerÕÊ»§Í´´¦£¬ÓÃÓڵǼ·þÎñ²¢ÒªÇóÈ«³¤Á÷ýÌåURL£¬Èƹý30ÃëÔ¤ÀÀÏÞ¶È£¬ÒÔ¸ßÖÊÁ¿Ìåʽ±¾µØ´æ´¢ÒôƵÎļþ£¬ÔÊÐíÀëÏßÊÕÌýºÍ·Ö·¢¡£Ö»¹ÜµÁ°æ¹¤¾ßͨ³£²»±»ÊÓΪ¶ñÒâÈí¼þ£¬µ«automslcµÄʹÓÿÉÄÜÈÃÓû§Ãæ¶Ô˾·¨·çÏպͽ«À´¸ü¶à¶ñÒâÐÐΪµÄ·çÏÕ¡£SocketÔÚ¸÷ÀàÕË»§ºÍGitHub´æ´¢¿âÖз¢ÏÖÁËÓë¸ÃÈí¼þ°üÓйصıðºÅ£¬µ«Ö÷ıµÄÉí·ÝÉв»Ã÷ÏÔ¡£Òò¶ø£¬½¨ÒéÓû§Ô¤·ÀʹÓÃautomslc£¬ÒÔÃâ¾íÈë·¸·¨»î¶¯¡£
https://www.bleepingcomputer.com/news/security/pypi-package-with-100k-installs-pirated-music-from-deezer-for-years/
6. EncryptHubÈëÇÖ618¸ö×éÖ¯£¬²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½ºÍÀÕË÷Èí¼þ
2ÔÂ26ÈÕ£¬×Ô2024Äê6ÔÂÒÔÀ´£¬Ò»¸öÃûΪEncryptHub£¨±ðÃûLarva-208£©µÄÍþвÐÐΪÕßͨ¹ýÓã²æÊ½ÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷£¬¶Ô׼ȫÇò×éÖ¯ÒÔ»ñÈ¡ÆóÒµÍøÂç½Ó¼ûȨÏÞ¡£¾ÝProdaft»ã±¨£¬EncryptHubÒѹ¥»÷ÖÁÉÙ618¸ö×éÖ¯£¬²¢ÔÚ»ñµÃ½Ó¼ûȨÏÞºó×°ÖÃÔ¶³Ì¼à¿ØºÍÖÎÀíÈí¼þ£¬²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½ºÍÀÕË÷Èí¼þ¡£¸ÃÍþв×éÖ¯ÓëRansomHubºÍBlackSuitÓйØÁª£¬²¢ÊØ»¤ÁË×Ô¼ºµÄ×Ô½ç˵PowerShellÊý¾Ý¼ÓÃÜÆ÷¡£EncryptHubʹÓöÌÐÅ¡¢ÓïÒôÍøÂç´¹µöºÍÐéαµÇÂ¼Ò³ÃæµÈ¼¿Á©»ñÈ¡³õʼ½Ó¼ûȨÏÞ£¬²É°ìÁ˳¬¹ý70¸ö·ÂÕÕÆóÒµVPN²úÆ·µÄÓòÃûÀ´Ôö³¤´¹µöÒ³ÃæµÄºÏ·¨ÐÔ¡£ÁíÒ»¸ö±»×·×ÙΪLarva-148µÄ×Ó×éÖ¯¿ÉÄÜÏòEncryptHubÏúÊÛÓòÃûºÍÍøÂç´¹µö¹¤¾ß°ü¡£Ò»µ©¹¥ÆÆÖ¸±êϵͳ£¬EncryptHub»á²¿Êð¸÷ÀàPowerShell¾ç±¾ºÍ¶ñÒâÈí¼þÀ´ÇÔÈ¡Êý¾ÝºÍ¼ÓÃÜÎļþ£¬Ô̺¬¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN¿Í»§¶ËÅäÖÃÊý¾Ý¡¢ÃÜÂëÖÎÀíÆ÷Êý¾ÝºÍÌØ¶¨Îļþ¡£×îºó£¬EncryptHubʹÓûùÓÚPowerShellµÄ×Ô½ç˵¼ÓÃÜÆ÷´ó¾ÖµÄÀÕË÷Èí¼þ£¬ÒªÇóÊܺ¦Õßͨ¹ýTelegramÖ§¸¶Êê½ð¡£ProdaftÖÒ¸æËµ£¬EncryptHubÊÇÒ»¸ö¸ÉÁ·µÄÍþвÐÐΪÕߣ¬¿ÉÄܶ¨Ôì¹¥»÷ÒÔÌá¸ßЧÄÜ£¬¶Ô´óÐÍ×éÖ¯Ôì³É¸ß¼ÛÖµµÄ·ÛËé¡£
https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ