ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§

Ðû²¼Ê±¼ä 2025-10-29

1. ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§


10ÔÂ26ÈÕ£¬£¬ £¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬ £¬£¬£¬¹¥»÷ÕßÕýʹÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬ £¬ £¬£¬£¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌᳫ¶¨Ïò¹¥»÷ ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢£¬£¬ £¬ £¬£¬£¬¼æÈÝWindowsºÍLinuxϵͳ£¬£¬ £¬ £¬£¬£¬Í¨¹ýPyInstaller±àÒëΪ×ÔÁ¦¶þ½øÖÆÎļþ£¬£¬ £¬ £¬£¬£¬²¢Î±×°³ÉÓÎÏ·»òDiscordÏà¹Ø¹¤¾ßÓÕµ¼Óû§ÏÂÔØ ¡£¡£¡£¡£¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸Ç¿Ê¢¹¦Ð§£¬£¬ £¬ £¬£¬£¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¼ÓÃÜÇ®°üÎļþ¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢£¬£¬ £¬ £¬£¬£¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼ ¡£¡£¡£¡£¡£Æä¹¥»÷Á÷³Ì°üÀ¨É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ£¬£¬ £¬ £¬£¬£¬Í¨¹ýÕýÔò±í´ïʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ£¬£¬ £¬ £¬£¬£¬½ø¶ø»ñÈ¡Óû§Ð¡ÎÒ˽¼Ò×ÊÁÏ¡¢ÓÊÏä¡¢¶àÒòËØÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé ¡£¡£¡£¡£¡£¸üÒþ²ØµÄÊÇ£¬£¬ £¬ £¬£¬£¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ£¬£¬ £¬ £¬£¬£¬×èµ²µÇ¼ʵÑé¡¢¹ºÖü°ÃÜÂë¸ü¸ÄµÈÊÂÎñ£¬£¬ £¬ £¬£¬£¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢ÐÅÓÿ¨Êý¾Ý ¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬£¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ£¬£¬ £¬ £¬£¬£¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢Ð§ÀÍGoFile£¬£¬ £¬ £¬£¬£¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/


2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬ £¬ £¬£¬£¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹ûÕæ


10ÔÂ27ÈÕ£¬£¬ £¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬ £¬£¬£¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬ £¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡°üÀ¨¿Í»§ÒøÐÐÕ˺š¢ÉúÒâ¼Í¼µÈÃô¸ÐÐÅÏ¢ ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢£¬£¬ £¬ £¬£¬£¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò»£¬£¬ £¬ £¬£¬£¬Äê¶ÈÓªÊÕ³¬620ÒÚÃÀÔª£¬£¬ £¬ £¬£¬£¬È«Çò¹ÍÔ±Ô¼22ÍòÈË£¬£¬ £¬ £¬£¬£¬ÆäÃÀ¹úÊг¡Õ½ÂÔ½ñÄêÍ·Òѵ÷½â£¬£¬ £¬ £¬£¬£¬Öð²½Í˳öÉÌÒµÒøÐÐÓªÒµ ¡£¡£¡£¡£¡£¾ÝÑо¿ÍŶӶԺڿ͹ûÕæµÄÊý¾ÝÑùÌìÖ°Îö£¬£¬ £¬ £¬£¬£¬Ð¹Â¶ÐÅÏ¢º­¸ÇÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢ÉúÒâ¼Í¼¡¢¹ÉƱÉúÒâÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ ¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò¾¯Ê¾£¬£¬ £¬ £¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèڲƭÕË»§¡¢Ðéα±¨Ë°£©¡¢»ùÓÚÏûºÄϰ¹ß²ß»®¾«×¼ÍøÂçÕ©Æ­£¬£¬ £¬ £¬£¬£¬»òð³ä½ðÈÚ»ú¹¹ÊµÑéµçÐÅÕ©Æ­£¬£¬ £¬ £¬£¬£¬×é³É¶àÖØ²»·¨»î¶¯Î£º¦ ¡£¡£¡£¡£¡£ÒµÄÚÈËʿָ³ö£¬£¬ £¬ £¬£¬£¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³ÉÖØ´´£¬£¬ £¬ £¬£¬£¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬ £¬£¬£¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´ÍêÕûչʾ±»µÁÊý¾Ý¼¯È«Ã²£¬£¬ £¬ £¬£¬£¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üУ¬£¬ £¬ £¬£¬£¬ÌåÏÖ±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§£¬£¬ £¬ £¬£¬£¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÓªÒµ ¡£¡£¡£¡£¡£


https://cybernews.com/security/hsbc-usa-data-breach-claims/


3. °ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶


10ÔÂ25ÈÕ£¬£¬ £¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬ £¬£¬£¬°ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ ¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚ×ÅÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯£¬£¬ £¬ £¬£¬£¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý£¬£¬ £¬ £¬£¬£¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈСÎÒ˽¼ÒÐÅÏ¢ ¡£¡£¡£¡£¡£Gerar×÷ΪÖÂÁ¦ÓÚ×ÊÖúÄêÇáÈË»ñµÃʵϰºÍ¾Íҵʱ»úµÄ·ÇÓªÀû»ú¹¹£¬£¬ £¬ £¬£¬£¬´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢ ¡£¡£¡£¡£¡£Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬£¬ £¬ £¬£¬£¬Ð¹Â¶ÐÅÏ¢º­¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬ £¬ £¬£¬£¬°üÀ¨Ò½ÁƼì²éÕªÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄÌõÔ¼¡¢±øÒÛÎļþµÈ ¡£¡£¡£¡£¡£Ïêϸй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢µØµã¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢½ÌÓý¼Í¼µÈ ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬ £¬£¬£¬Ñù±¾Öл¹°üÀ¨ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥£¬£¬ £¬ £¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓá¢Ú²Æ­ÕË»§¿ªÉè¡¢´û¿îÉêÇëµÈ²»·¨»î¶¯ ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬ £¬£¬£¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦ ¡£¡£¡£¡£¡£


https://cybernews.com/security/gerar-youth-nonprofit-data-breach/


4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶


10ÔÂ28ÈÕ£¬£¬ £¬ £¬£¬£¬ÈÕ±¾¹ã¸æ¾ÞÍ·µçͨ¼¯ÍÅÅû¶£¬£¬ £¬ £¬£¬£¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©ÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬ £¬£¬£¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶ ¡£¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬ £¬ £¬£¬£¬µçͨÒѹرղ¿·Öϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦³ÌÐò£¬£¬ £¬ £¬£¬£¬Í¬Ê±Ïò¶à¹úÏà¹Ø²¿·ÖÒÀ·¨±¨¸æ£¬£¬ £¬ £¬£¬£¬µ«ÏêϸӰÏì¹æÄ£ÉÐδÃ÷È· ¡£¡£¡£¡£¡£ÃÀ¿â¶ûÊǵçͨ¼¯ÍÅÍâÑóÓªÒµÖпͻ§ÌåÑéÖÎÀí£¨CXM£©ÁìÓòµÄ½¹µã×Ó¹«Ë¾£¬£¬ £¬ £¬£¬£¬ÔÚ±±ÃÀ¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¼°ÑÇÌ«µØÇøÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹£¬£¬ £¬ £¬£¬£¬ÓµÓÐ1.6ÍòÃûÔ±¹¤£¬£¬ £¬ £¬£¬£¬ÄêÊÕÈë´ï20ÒÚÃÀÔª£¬£¬ £¬ £¬£¬£¬Ð§ÀͿͻ§°üÀ¨È¸³²¡¢Î¢Èí¡¢±¦½à¡¢Ó¢ÌضûµÈÈ«Çò×ÅÃûÆóÒµ ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬ £¬ £¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¹©Ó¦É̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢£¬£¬ £¬ £¬£¬£¬Ïêϸ°üÀ¨ÒøÐÐÕË»§¡¢ÈËΪµ¥ÏêÇ顢нˮ¡¢¹úÃñ°ü¹ÜºÅÂ뼰СÎÒ˽¼ÒÁªÏµ·½·¨µÈ ¡£¡£¡£¡£¡£µçͨ½²»°ÈË֤ʵ£¬£¬ £¬ £¬£¬£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÒÑÊÕµ½Í¨Öª£¬£¬ £¬ £¬£¬£¬¹«Ë¾ÕýÁªºÏµÚÈý·½»ú¹¹ÊÓ²ìÊÂÎñ¹æÄ£¼°ÖÜȫӰÏì ¡£¡£¡£¡£¡£µçͨ¼¯ÍÅÇ¿µ÷£¬£¬ £¬ £¬£¬£¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼°£¬£¬ £¬ £¬£¬£¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´Ò»¶¨²ÆÎñËðʧ ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬ £¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬ £¬ £¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/


5. еÄAtroposia¶ñÒâÈí¼þ¸½´øÍâµØÎó²îɨÃè³ÌÐò


10ÔÂ28ÈÕ£¬£¬ £¬ £¬£¬£¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂçÇå¾²½ç¸ß¶È¹Ø×¢ ¡£¡£¡£¡£¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸·¨·Ö×ÓÌṩÄ£¿£¿£¿£¿£¿£¿£¿é»¯Ô¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬ £¬ £¬£¬£¬¼¯³ÉÒ»Á¬»á¼û¡¢Ìӱܼì²â¡¢Êý¾Ý͵ÇÔºÍÍâµØÎó²îɨÃèËĴ󽹵㹦Ч£¬£¬ £¬ £¬£¬£¬³ÉΪ¼ÌSpamGPT¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸·¨¹¤¾ß°ü´ú±í ¡£¡£¡£¡£¡£VaronisÇå¾²ÍŶÓÑо¿·¢Ã÷£¬£¬ £¬ £¬£¬£¬Atroposiaͨ¹ý¼ÓÃÜͨµÀÓëÏÂÁî¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷ͨѶ£¬£¬ £¬ £¬£¬£¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§¿ØÖÆ£¨UAC£©ÌáÉýȨÏÞ£¬£¬ £¬ £¬£¬£¬ÔÚÊÜѬȾÖ÷»ú½¨É賤ÆÚÒþÃØ»á¼û ¡£¡£¡£¡£¡£Æä¹¦Ð§Ä£¿£¿£¿£¿£¿£¿£¿é°üÀ¨£ºHRDP ConnectÄ£¿£¿£¿£¿£¿£¿£¿é¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢×¥È¡×é¼þ¡¢ÇÔȡģ¿£¿£¿£¿£¿£¿£¿é¡¢¼ôÌù°åÖÎÀíÆ÷¡¢DNSÐ®ÖÆÄ£¿£¿£¿£¿£¿£¿£¿é£¬£¬ £¬ £¬£¬£¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõÄÎó²îɨÃèÆ÷£¬£¬ £¬ £¬£¬£¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢²»Çå¾²ÉèÖü°¹ýʱÈí¼þ°æ±¾£¬£¬ £¬ £¬£¬£¬ÌìÉúÎó²îÓÅÏȼ¶ÆÀ·Ö£¬£¬ £¬ £¬£¬£¬Öú¹¥»÷Õß¿ìËÙ¶¨Î»¿ÉʹÓõÄȨÏÞÌáÉýÎó²î»ò¹ýʱVPN¿Í»§¶ËµÈ±¡Èõµã ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/


6. CISAÖÒÑÔ´ïË÷ϵͳDELMIA AprisoÎó²îÔâÒ°ÍâʹÓÃ


10ÔÂ28ÈÕ£¬£¬ £¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÑÏÖØÇå¾²Ô¤¾¯£¬£¬ £¬ £¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÆð¾¢Ê¹ÓôïË÷ϵͳDELMIA AprisoÖÆÔìÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¼Æ»®ÖеÄÁ½¸ö¸ßΣÎó²î ¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î»®·ÖΪCVE-2025-6205£¨È±Ê§ÊÚȨÎó²î£¬£¬ £¬ £¬£¬£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨»á¼û£©ºÍCVE-2025-6204£¨¸ßÑÏÖØË®Æ½´úÂë×¢ÈëÎó²î£¬£¬ £¬ £¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂ룩£¬£¬ £¬ £¬£¬£¬Ó°Ïì2020ÖÁ2025°æ²úÆ· ¡£¡£¡£¡£¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õÐû²¼²¹¶¡ÐÞ¸´£¬£¬ £¬ £¬£¬£¬µ«CISAÇ¿µ÷Îó²îÒÑÔÚÒ°Íâ±»ÏÖʵʹÓ㬣¬ £¬ £¬£¬£¬²¢½«ÆäÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ ¡£¡£¡£¡£¡£Æ¾Ö¤2021Äê11ÔÂÐû²¼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01£¬£¬ £¬ £¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©Íê³ÉÎó²îÐÞ²¹£¬£¬ £¬ £¬£¬£¬²»È»½«ÃæÁÙÖØ´óÍøÂçÇ徲Σº¦ ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬ £¬£¬£¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯Ê¹ÓÃÎó²îĿ¼£¬£¬ £¬ £¬£¬£¬ÍþвÑо¿Ô±Johannes Ullrich´ËǰÒÑ·¢Ã÷ÆäÊ׸öʹÓü£Ïó ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/