ºÚ¿ÍÀûÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÇÔÈ¡DiscordÕË»§
°ä²¼¹¦·ò 2025-10-291. ºÚ¿ÍÀûÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÇÔÈ¡DiscordÕË»§
10ÔÂ26ÈÕ£¬½üÈÕ£¬¹¥»÷ÕßÕýÀûÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌáÒ鶨Ïò¹¥»÷¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢£¬¼æÈÝWindowsºÍLinuxϵͳ£¬Í¨¹ýPyInstaller±àÒëΪ¶ÀÁ¢¶þ½øÔìÎļþ£¬²¢¼Ù×°³ÉÓÎÏ·»òDiscordÓйع¤¾ßÓÕµ¼Óû§ÏÂÔØ¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸×³´óÖ°ÄÜ£¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¼ÓÃÜÇ®°üÎļþ¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢£¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼¡£Æä¹¥»÷Á÷³ÌÔ̺¬É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ£¬Í¨¹ýÕýÔò±í°×ʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ£¬½ø¶ø»ñÈ¡Óû§Ó×ÎÒ×ÊÁÏ¡¢ÓÊÏä¡¢¶à³É·ÖÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé¡£¸üÒñ±ÎµÄÊÇ£¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ£¬À¹½ØµÇ¼³¢ÊÔ¡¢²É°ì¼°ÃÜÂë¸ü¸ÄµÈÊÂÎñ£¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢ÐÅÓþ¿¨Êý¾Ý¡£´Ë±í£¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ£¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢·þÎñGoFile£¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/
2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷£¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹«¿ª
10ÔÂ27ÈÕ£¬½üÈÕ£¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬ÍøÂç·¸×ï·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡Ô̺¬¿Í»§ÒøÐÐÕ˺š¢ÂòÂô¼Í¼µÈÃô¸ÐÐÅÏ¢¡£Õâ´ÎÊÂÎñÒý·¢¿í·º¹Ø×¢£¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò»£¬Äê¶ÅתÊÕ³¬620ÒÚÃÀÔª£¬È«Çò¹ÍÔ±Ô¼22ÍòÈË£¬ÆäÃÀ¹úÊг¡Õ½Êõ½ñËêÊ×Òѵ÷Õû£¬Öð²½Í˳öóÒ×ÒøÐÐÒµÎñ¡£¾Ý×êÑÐÍŶӶԺڿ͹«¿ªµÄÊý¾ÝÑù±¾·ÖÎö£¬Ð¹Â¶ÐÅÏ¢º¸ÇÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢ÂòÂô¼Í¼¡¢¹ÉƱÂòÂôÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ¡£ÍøÂ簲ȫר¼Ò¾¯Ê¾£¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸×ï·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèÚ²ÆÕË»§¡¢Ðéα±¨Ë°£©¡¢»ùÓÚÏû·Ñϰ¹ß²ß¶¯¾«×¼ÍøÂçÚ¿Æ£¬»ò¼ÙÒâ½ðÈÚ»ú¹¹Ö´ÐеçÐÅÚ¿Æ£¬×é³É¶à³Á·¸·¨»î¶¯·çÏÕ¡£ÒµÄÚÈËʿָ³ö£¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³É³Á´´£¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´Æëȫչʾ±»µÁÊý¾Ý¼¯È«Ã²£¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üУ¬°µÊ¾±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§£¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÒµÎñ¡£
https://cybernews.com/security/hsbc-usa-data-breach-claims/
3. °ÍÎ÷·ÇͶ»ú×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶
10ÔÂ25ÈÕ£¬½üÈÕ£¬°ÍÎ÷·ÇͶ»ú×éÖ¯GerarÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷ÕßÔÚ³ÛÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯£¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý£¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈÓ×ÎÒÐÅÏ¢¡£Gerar×÷ΪÖÂÁ¦ÓÚÔ®ÊÖÄêÇáÈË»ñµÃʵϰºÍ¾ÍÒµ»úÓöµÄ·ÇͶ»ú»ú¹¹£¬Õâ´ÎÊÂÎñÒý·¢¿í·º¹Ø×¢¡£×êÑÐÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾½øÐзÖÎöºóÈ·ÈÏ£¬Ð¹Â¶ÐÅÏ¢º¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ£¬Ô̺¬Ò½ÁƲé³ÌáÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄºÏͬ¡¢±øÒÛÎļþµÈ¡£¾ßÌåй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢µØÖ·¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢½ÌÓý¼Í¼µÈ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Ñù±¾Öл¹Ô̺¬ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥£¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸×ï·Ö×ÓÓÃÓÚÉí·ÝµÁÓá¢Ú²ÆÕË»§¿ªÉè¡¢´û¿îÉêÇëµÈ·¸·¨»î¶¯¡£Ä¿Ç°£¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£
https://cybernews.com/security/gerar-youth-nonprofit-data-breach/
4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶
10ÔÂ28ÈÕ£¬ÈÕ±¾¸æ°×¾ÞÍ·µçͨ¼¯ÍÅÅû¶£¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©Ôâ·êÑϳÁÍøÂ簲ȫÊÂÎñ£¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶¡£×÷ΪӦ¶Ô´ëÊ©£¬µçͨÒѹعز¿ÃÅϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦·¨Ê½£¬Í¬Ê±Ïò¶à¹úÓйز¿ÃÅÒÀ·¨»ã±¨£¬µ«¾ßÌåÓ°ÏìÁìÓòÉÐδÃ÷È·¡£ÃÀ¿â¶ûÊǵçͨ¼¯Í꣱íÒµÎñÖпͻ§ÂÄÀúÖÎÀí£¨CXM£©ÁìÓòµÄÖ÷Ìâ×Ó¹«Ë¾£¬ÔÚ±±ÃÀ¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¼°ÑÇÌ«µØÓòÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹£¬Õ¼ÓÐ1.6ÍòÃûÔ±¹¤£¬ÄêÊÕÈë´ï20ÒÚÃÀÔª£¬·þÎñ¿Í»§Ô̺¬È¸³²¡¢Î¢Èí¡¢±¦½à¡¢Ó¢ÌضûµÈÈ«Çò³ÛÃûÆóÒµ¡£Õâ´ÎÊÂÎñÖУ¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¹©¸øÉ̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢£¬¾ßÌåÔ̺¬ÒøÐÐÕË»§¡¢¹¤×ʵ¥ÏêÇ顢нˮ¡¢¹úÃñ±£ÏÕºÅÂë¼°Ó×ÎÒÁªÏµ·½Ê½µÈ¡£µçͨ½²»°ÈË֤ʵ£¬ÊÜÓ°ÏìÓ×ÎÒÒÑÊÕµ½Í¨Öª£¬¹«Ë¾Õý½áºÏµÚÈý·½»ú¹¹µ÷²éÊÂÎñ¹æÄ£¼°È«ÃæÓ°Ïì¡£µçͨ¼¯ÍÅÇ¿µ÷£¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼°£¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´¿Ï¶¨²ÆÕþËðʧ¡£Ä¿Ç°£¬µ÷²éÈÔÔÚ½øÐÐÖУ¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£
https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/
5. еÄAtroposia¶ñÒâÈí¼þ¸½´ø±¾µØ·ì϶ɨÃ跨ʽ
10ÔÂ28ÈÕ£¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂ簲ȫ½ç¸ß¶È¹Ø×¢¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸×ï·Ö×ÓÌṩģ¿é»¯Ô¶³Ì½Ó¼ûľÂí£¨RAT£©£¬¼¯³É³ÖÐø½Ó¼û¡¢Ìӱܼì²â¡¢Êý¾Ý͵ÇԺͱ¾µØ·ì϶ɨÃèËÄ´óÖ÷ÌâÖ°ÄÜ£¬³ÉΪ¼ÌSpamGPT¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸×﹤¾ß°ü´ú±í¡£Varonis°²È«ÍŶÓ×êÑз¢ÏÖ£¬Atroposiaͨ¹ý¼ÓÃÜͨ·ÓëºÅÁî½ÚÔ죨C2£©·þÎñÆ÷ͨѶ£¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§½ÚÔ죨UAC£©ÌáÉýȨÏÞ£¬ÔÚÊÜϰȾÖ÷»ú³ÉÁ¢ÓƾÃÒþÃØ½Ó¼û¡£ÆäÖ°ÄÜÄ£¿éÔ̺¬£ºHRDP ConnectÄ£¿é¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢×¥È¡×é¼þ¡¢ÇÔȡģ¿é¡¢¼ôÌù°åÖÎÀíÆ÷¡¢DNS½Ù³ÖÄ£¿é£¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõķì϶ɨÃèÆ÷£¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢²»°²È«ÅäÖü°¹ýÆÚÈí¼þ°æ±¾£¬ÌìÉú·ì϶ÓÅÏȼ¶ÆÀ·Ö£¬Öú¹¥»÷Õß¼±¾ç¶¨Î»¿ÉÀûÓõÄȨÏÞÌáÉý·ì϶»ò¹ýÆÚVPN¿Í»§¶ËµÈÓÄ΢µã¡£
https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
6. CISAÖÒ¸æ´ïË÷ϵͳDELMIA Apriso·ì϶ÔâÒ°±íÀûÓÃ
10ÔÂ28ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©°ä²¼ÑϳÁ°²È«Ô¤¾¯£¬Ö¸³ö¹¥»÷ÕßÕý»ý¼«ÀûÓôïË÷ϵͳDELMIA AprisoÔì×÷ÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¹æ»®ÖеÄÁ½¸ö¸ßΣ·ì϶¡£ÕâÁ½¸ö·ì϶±ðÀëΪCVE-2025-6205£¨È±Ê§ÊÚȨ·ì϶£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨½Ó¼û£©ºÍCVE-2025-6204£¨¸ßÑϳÁˮƽ´úÂë×¢Èë·ì϶£¬¿ÉÖ´ÐÐËÁÒâ´úÂ룩£¬Ó°Ïì2020ÖÁ2025°æ²úÆ·¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õ°ä²¼²¹¶¡½¨¸´£¬µ«CISAÇ¿µ÷·ì϶ÒÑÔÚÒ°±í±»ÏÖʵÀûÓ㬲¢½«ÆäÄÉÈëÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼¡£Æ¾¾Ý2021Äê11Ô°䲼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01£¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©ÊµÏÖ·ì϶½¨²¹£¬²»È»½«Ãæ¶Ô³Á´óÍøÂ簲ȫ·çÏÕ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯ÀûÓ÷ì϶Ŀ¼£¬Íþв×êÑÐÔ±Johannes Ullrich´ËǰÒÑ·¢ÏÔìäÊ׸öÀûÓü£Ïó¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/


¾©¹«Íø°²±¸11010802024551ºÅ