ºÚ¿ÍÀûÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÇÔÈ¡DiscordÕË»§
°ä²¼¹¦·ò 2025-10-291. ºÚ¿ÍÀûÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÇÔÈ¡DiscordÕË»§
10ÔÂ26ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬¹¥»÷ÕßÕýÀûÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡·¨Ê½£¬£¬£¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌáÒ鶨Ïò¹¥»÷¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢£¬£¬£¬¼æÈÝWindowsºÍLinuxϵͳ£¬£¬£¬Í¨¹ýPyInstaller±àÒëΪ¶ÀÁ¢¶þ½øÖÆÎļþ£¬£¬£¬²¢¼Ù×°³ÉÓÎÏ·»òDiscordÓйع¤¾ßÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸×³´óÖ°ÄÜ£¬£¬£¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¡¢¼ÓÃÜÇ®°üÎļþ¡¢¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢£¬£¬£¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼¡£¡£¡£Æä¹¥»÷Á÷³ÌÔ̺¬É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ£¬£¬£¬Í¨¹ýÕýÔò±í°×ʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ£¬£¬£¬½ø¶ø»ñÈ¡Óû§Ð¡ÎÒ×ÊÁÏ¡¢¡¢ÓÊÏä¡¢¡¢¶à³É·ÖÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé¡£¡£¡£¸üÒñ±ÎµÄÊÇ£¬£¬£¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ£¬£¬£¬À¹½ØµÇ¼³¢ÊÔ¡¢¡¢²É°ì¼°ÃÜÂë¸ü¸ÄµÈÊÂÎñ£¬£¬£¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢¡¢ÐÅÓþ¿¨Êý¾Ý¡£¡£¡£´ËÍ⣬£¬£¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ£¬£¬£¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢·þÎñGoFile£¬£¬£¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/
2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬£¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹«¿ª
10ÔÂ27ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ÍøÂç·¸×ï·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡Ô̺¬¿Í»§ÒøÐÐÕ˺𢡢ÂòÂô¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£¡£Õâ´ÎÊÂÎñÒý·¢¿í·º¹Ø×¢£¬£¬£¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò»£¬£¬£¬Äê¶ÈÓªÊÕ³¬620ÒÚÃÀÔª£¬£¬£¬È«Çò¹ÍÔ±Ô¼22ÍòÈË£¬£¬£¬ÆäÃÀ¹úÊг¡Õ½Êõ½ñËêÊ×Òѵ÷Õû£¬£¬£¬Öð²½Í˳öóÒ×ÒøÐÐÒµÎñ¡£¡£¡£¾Ý×êÑÐÍŶӶԺڿ͹«¿ªµÄÊý¾ÝÑù±¾·ÖÎö£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸ÇÐÕÃû¡¢¡¢µØÖ·¡¢¡¢Éç»á°²È«ºÅÂë¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢µç»°ºÅÂë¡¢¡¢µç×ÓÓÊÏä¡¢¡¢ÂòÂô¼Í¼¡¢¡¢¹ÉƱÂòÂôÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ¡£¡£¡£ÍøÂ簲ȫר¼Ò¾¯Ê¾£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸×ï·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèÚ²ÆÕË»§¡¢¡¢Ðéα±¨Ë°£©¡¢¡¢»ùÓÚÏû·Ñϰ¹ß²ß¶¯¾«×¼ÍøÂçÚ¿Æ£¬£¬£¬»ò¼ÙÒâ½ðÈÚ»ú¹¹Ö´ÐеçÐÅÚ¿Æ£¬£¬£¬×é³É¶àÖØ·¸·¨»î¶¯·çÏÕ¡£¡£¡£ÒµÄÚÈËʿָ³ö£¬£¬£¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³ÉÖØ´´£¬£¬£¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´Æëȫչʾ±»µÁÊý¾Ý¼¯È«Ã²£¬£¬£¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üУ¬£¬£¬°µÊ¾±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§£¬£¬£¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÒµÎñ¡£¡£¡£
https://cybernews.com/security/hsbc-usa-data-breach-claims/
3. °ÍÎ÷·ÇͶ»ú×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶
10ÔÂ25ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬°ÍÎ÷·ÇͶ»ú×éÖ¯GerarÔâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¹¥»÷ÕßÔÚ³ÛÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯£¬£¬£¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý£¬£¬£¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈСÎÒÐÅÏ¢¡£¡£¡£Gerar×÷ΪÖÂÁ¦ÓÚÔ®ÊÖÄêÇáÈË»ñµÃʵϰºÍ¾ÍÒµ»úÓöµÄ·ÇͶ»ú»ú¹¹£¬£¬£¬Õâ´ÎÊÂÎñÒý·¢¿í·º¹Ø×¢¡£¡£¡£×êÑÐÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾½øÐзÖÎöºóÈ·ÈÏ£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬£¬Ô̺¬Ò½ÁƲé³ÌáÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄºÏͬ¡¢¡¢±øÒÛÎļþµÈ¡£¡£¡£¾ßÌåй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢¡¢µç×ÓÓʼþ¡¢¡¢µç»°ºÅÂë¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢¡¢µØÖ·¡¢¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢¡¢½ÌÓý¼Í¼µÈ¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬Ñù±¾Öл¹Ô̺¬ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸×ï·Ö×ÓÓÃÓÚÉí·ÝµÁÓᢡ¢Ú²ÆÕË»§¿ªÉè¡¢¡¢´û¿îÉêÇëµÈ·¸·¨»î¶¯¡£¡£¡£Ä¿Ç°£¬£¬£¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£¡£¡£
https://cybernews.com/security/gerar-youth-nonprofit-data-breach/
4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶
10ÔÂ28ÈÕ£¬£¬£¬ÈÕ±¾¸æ°×¾ÞÍ·µçͨ¼¯ÍÅÅû¶£¬£¬£¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©Ôâ·êÑÏÖØÍøÂ簲ȫÊÂÎñ£¬£¬£¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶¡£¡£¡£×÷ΪӦ¶Ô´ëÊ©£¬£¬£¬µçͨÒѹرղ¿ÃÅϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦·¨Ê½£¬£¬£¬Í¬Ê±Ïò¶à¹úÓйز¿ÃÅÒÀ·¨»ã±¨£¬£¬£¬µ«¾ßÌåÓ°ÏìÁìÓòÉÐδÃ÷È·¡£¡£¡£ÃÀ¿â¶ûÊǵçͨ¼¯ÍÅÍâÑóÒµÎñÖпͻ§ÂÄÀúÖÎÀí£¨CXM£©ÁìÓòµÄÖ÷Ìâ×Ó¹«Ë¾£¬£¬£¬ÔÚ±±ÃÀ¡¢¡¢Å·ÖÞ¡¢¡¢Öж«¡¢¡¢·ÇÖÞ¼°ÑÇÌ«µØÓòÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹£¬£¬£¬Õ¼ÓÐ1.6ÍòÃûÔ±¹¤£¬£¬£¬ÄêÊÕÈë´ï20ÒÚÃÀÔª£¬£¬£¬·þÎñ¿Í»§Ô̺¬È¸³²¡¢¡¢Î¢Èí¡¢¡¢±¦½à¡¢¡¢Ó¢ÌضûµÈÈ«Çò³ÛÃûÆóÒµ¡£¡£¡£Õâ´ÎÊÂÎñÖУ¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¡¢¹©¸øÉ̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢£¬£¬£¬¾ßÌåÔ̺¬ÒøÐÐÕË»§¡¢¡¢¹¤×ʵ¥ÏêÇé¡¢¡¢Ð½Ë®¡¢¡¢¹úÃñ±£ÏÕºÅÂ뼰СÎÒÁªÏµ·½Ê½µÈ¡£¡£¡£µçͨ½²»°ÈË֤ʵ£¬£¬£¬ÊÜÓ°ÏìСÎÒÒÑÊÕµ½Í¨Öª£¬£¬£¬¹«Ë¾Õý½áºÏµÚÈý·½»ú¹¹µ÷²éÊÂÎñ¹æÄ£¼°È«ÃæÓ°Ïì¡£¡£¡£µçͨ¼¯ÍÅÇ¿µ÷£¬£¬£¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼°£¬£¬£¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´¿Ï¶¨²ÆÕþËðʧ¡£¡£¡£Ä¿Ç°£¬£¬£¬µ÷²éÈÔÔÚ½øÐÐÖУ¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¡£¡£
https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/
5. еÄAtroposia¶ñÒâÈí¼þ¸½´ø±¾µØ·ì϶ɨÃ跨ʽ
10ÔÂ28ÈÕ£¬£¬£¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂ簲ȫ½ç¸ß¶È¹Ø×¢¡£¡£¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸×ï·Ö×ÓÌṩģ¿é»¯Ô¶³Ì½Ó¼ûľÂí£¨RAT£©£¬£¬£¬¼¯³É³ÖÐø½Ó¼û¡¢¡¢Ìӱܼì²â¡¢¡¢Êý¾Ý͵ÇԺͱ¾µØ·ì϶ɨÃèËÄ´óÖ÷ÌâÖ°ÄÜ£¬£¬£¬³ÉΪ¼ÌSpamGPT¡¢¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸×﹤¾ß°ü´ú±í¡£¡£¡£Varonis°²È«ÍŶÓ×êÑз¢ÏÖ£¬£¬£¬Atroposiaͨ¹ý¼ÓÃÜͨµÀÓëºÅÁî½ÚÖÆ£¨C2£©·þÎñÆ÷ͨѶ£¬£¬£¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§½ÚÖÆ£¨UAC£©ÌáÉýȨÏÞ£¬£¬£¬ÔÚÊÜϰȾÖ÷»ú³ÉÁ¢ÓƾÃÒþÃØ½Ó¼û¡£¡£¡£ÆäÖ°ÄÜÄ£¿éÔ̺¬£ºHRDP ConnectÄ£¿é¡¢¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢¡¢×¥È¡×é¼þ¡¢¡¢ÇÔȡģ¿é¡¢¡¢¼ôÌù°åÖÎÀíÆ÷¡¢¡¢DNS½Ù³ÖÄ£¿é£¬£¬£¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõķì϶ɨÃèÆ÷£¬£¬£¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢¡¢²»°²È«ÅäÖü°¹ýÆÚÈí¼þ°æ±¾£¬£¬£¬ÌìÉú·ì϶ÓÅÏȼ¶ÆÀ·Ö£¬£¬£¬Öú¹¥»÷Õß¼±¾ç¶¨Î»¿ÉÀûÓõÄȨÏÞÌáÉý·ì϶»ò¹ýÆÚVPN¿Í»§¶ËµÈÓÄ΢µã¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
6. CISAÖÒ¸æ´ïË÷ϵͳDELMIA Apriso·ì϶ÔâÒ°ÍâÀûÓÃ
10ÔÂ28ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©°ä²¼ÑÏÖØ°²È«Ô¤¾¯£¬£¬£¬Ö¸³ö¹¥»÷ÕßÕý»ý¼«ÀûÓôïË÷ϵͳDELMIA AprisoÖÆ×÷ÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¹æ»®ÖеÄÁ½¸ö¸ßΣ·ì϶¡£¡£¡£ÕâÁ½¸ö·ì϶±ðÀëΪCVE-2025-6205£¨È±Ê§ÊÚȨ·ì϶£¬£¬£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨½Ó¼û£©ºÍCVE-2025-6204£¨¸ßÑÏÖØË®Æ½´úÂë×¢Èë·ì϶£¬£¬£¬¿ÉÖ´ÐÐËÁÒâ´úÂ룩£¬£¬£¬Ó°Ïì2020ÖÁ2025°æ²úÆ·¡£¡£¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õ°ä²¼²¹¶¡ÐÞ¸´£¬£¬£¬µ«CISAÇ¿µ÷·ì϶ÒÑÔÚÒ°Íâ±»ÏÖʵÀûÓ㬣¬£¬²¢½«ÆäÄÉÈëÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼¡£¡£¡£Æ¾¾Ý2021Äê11Ô°䲼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©ÊµÏÖ·ì϶ÐÞ²¹£¬£¬£¬²»È»½«Ãæ¶ÔÖØ´óÍøÂ簲ȫ·çÏÕ¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯ÀûÓ÷ì϶Ŀ¼£¬£¬£¬Íþв×êÑÐÔ±Johannes Ullrich´ËǰÒÑ·¢ÏÖÆäÊ׸öÀûÓü£Ï󡣡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/


¾©¹«Íø°²±¸11010802024551ºÅ