ºÚ¿ÍÀûÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÇÔÈ¡DiscordÕË»§

°ä²¼¹¦·ò 2025-10-29

1. ºÚ¿ÍÀûÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡·¨Ê½ÇÔÈ¡DiscordÕË»§


10ÔÂ26ÈÕ £¬½üÈÕ £¬¹¥»÷ÕßÕýÀûÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡·¨Ê½ £¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌáÒ鶨Ïò¹¥»÷ ¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢ £¬¼æÈÝWindowsºÍLinuxϵͳ £¬Í¨¹ýPyInstaller±àÒëΪ¶ÀÁ¢¶þ½øÔìÎļþ £¬²¢¼Ù×°³ÉÓÎÏ·»òDiscordÓйع¤¾ßÓÕµ¼Óû§ÏÂÔØ ¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸×³´óÖ°ÄÜ £¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¼ÓÃÜÇ®°üÎļþ¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢ £¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼ ¡£Æä¹¥»÷Á÷³ÌÔ̺¬É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ £¬Í¨¹ýÕýÔò±í°×ʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ £¬½ø¶ø»ñÈ¡Óû§Ó×ÎÒ×ÊÁÏ¡¢ÓÊÏä¡¢¶à³É·ÖÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé ¡£¸üÒñ±ÎµÄÊÇ £¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ £¬À¹½ØµÇ¼³¢ÊÔ¡¢²É°ì¼°ÃÜÂë¸ü¸ÄµÈÊÂÎñ £¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢ÐÅÓþ¿¨Êý¾Ý ¡£´Ë±í £¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ £¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢·þÎñGoFile £¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß ¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/


2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷ £¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹«¿ª


10ÔÂ27ÈÕ £¬½üÈÕ £¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ £¬ÍøÂç·¸×ï·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡Ô̺¬¿Í»§ÒøÐÐÕ˺š¢ÂòÂô¼Í¼µÈÃô¸ÐÐÅÏ¢ ¡£Õâ´ÎÊÂÎñÒý·¢¿í·º¹Ø×¢ £¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò» £¬Äê¶ÅתÊÕ³¬620ÒÚÃÀÔª £¬È«Çò¹ÍÔ±Ô¼22ÍòÈË £¬ÆäÃÀ¹úÊг¡Õ½Êõ½ñËêÊ×Òѵ÷Õû £¬Öð²½Í˳öóÒ×ÒøÐÐÒµÎñ ¡£¾Ý×êÑÐÍŶӶԺڿ͹«¿ªµÄÊý¾ÝÑù±¾·ÖÎö £¬Ð¹Â¶ÐÅÏ¢º­¸ÇÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢ÂòÂô¼Í¼¡¢¹ÉƱÂòÂôÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ ¡£ÍøÂ簲ȫר¼Ò¾¯Ê¾ £¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸×ï·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèڲƭÕË»§¡¢Ðéα±¨Ë°£©¡¢»ùÓÚÏû·Ñϰ¹ß²ß¶¯¾«×¼ÍøÂçÚ¿Æ­ £¬»ò¼ÙÒâ½ðÈÚ»ú¹¹Ö´ÐеçÐÅÚ¿Æ­ £¬×é³É¶à³Á·¸·¨»î¶¯·çÏÕ ¡£ÒµÄÚÈËʿָ³ö £¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³É³Á´´ £¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´Æëȫչʾ±»µÁÊý¾Ý¼¯È«Ã² £¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üР£¬°µÊ¾±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§ £¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÒµÎñ ¡£


https://cybernews.com/security/hsbc-usa-data-breach-claims/


3. °ÍÎ÷·ÇͶ»ú×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶


10ÔÂ25ÈÕ £¬½üÈÕ £¬°ÍÎ÷·ÇͶ»ú×éÖ¯GerarÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ ¡£¹¥»÷ÕßÔÚ³ÛÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯ £¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý £¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈÓ×ÎÒÐÅÏ¢ ¡£Gerar×÷ΪÖÂÁ¦ÓÚÔ®ÊÖÄêÇáÈË»ñµÃʵϰºÍ¾ÍÒµ»úÓöµÄ·ÇͶ»ú»ú¹¹ £¬Õâ´ÎÊÂÎñÒý·¢¿í·º¹Ø×¢ ¡£×êÑÐÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾½øÐзÖÎöºóÈ·ÈÏ £¬Ð¹Â¶ÐÅÏ¢º­¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ £¬Ô̺¬Ò½ÁƲ鳭ÌáÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄºÏͬ¡¢±øÒÛÎļþµÈ ¡£¾ßÌåй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢µØÖ·¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢½ÌÓý¼Í¼µÈ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Ñù±¾Öл¹Ô̺¬ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥ £¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸×ï·Ö×ÓÓÃÓÚÉí·ÝµÁÓá¢Ú²Æ­ÕË»§¿ªÉè¡¢´û¿îÉêÇëµÈ·¸·¨»î¶¯ ¡£Ä¿Ç° £¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦ ¡£


https://cybernews.com/security/gerar-youth-nonprofit-data-breach/


4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶


10ÔÂ28ÈÕ £¬ÈÕ±¾¸æ°×¾ÞÍ·µçͨ¼¯ÍÅÅû¶ £¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©Ôâ·êÑϳÁÍøÂ簲ȫÊÂÎñ £¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶ ¡£×÷ΪӦ¶Ô´ëÊ© £¬µçͨÒѹعز¿ÃÅϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦·¨Ê½ £¬Í¬Ê±Ïò¶à¹úÓйز¿ÃÅÒÀ·¨»ã±¨ £¬µ«¾ßÌåÓ°ÏìÁìÓòÉÐδÃ÷È· ¡£ÃÀ¿â¶ûÊǵçͨ¼¯Í꣱íÒµÎñÖпͻ§ÂÄÀúÖÎÀí£¨CXM£©ÁìÓòµÄÖ÷Ìâ×Ó¹«Ë¾ £¬ÔÚ±±ÃÀ¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¼°ÑÇÌ«µØÓòÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹ £¬Õ¼ÓÐ1.6ÍòÃûÔ±¹¤ £¬ÄêÊÕÈë´ï20ÒÚÃÀÔª £¬·þÎñ¿Í»§Ô̺¬È¸³²¡¢Î¢Èí¡¢±¦½à¡¢Ó¢ÌضûµÈÈ«Çò³ÛÃûÆóÒµ ¡£Õâ´ÎÊÂÎñÖÐ £¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¹©¸øÉ̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢ £¬¾ßÌåÔ̺¬ÒøÐÐÕË»§¡¢¹¤×ʵ¥ÏêÇ顢нˮ¡¢¹úÃñ±£ÏÕºÅÂë¼°Ó×ÎÒÁªÏµ·½Ê½µÈ ¡£µçͨ½²»°ÈË֤ʵ £¬ÊÜÓ°ÏìÓ×ÎÒÒÑÊÕµ½Í¨Öª £¬¹«Ë¾Õý½áºÏµÚÈý·½»ú¹¹µ÷²éÊÂÎñ¹æÄ£¼°È«ÃæÓ°Ïì ¡£µçͨ¼¯ÍÅÇ¿µ÷ £¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼° £¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´¿Ï¶¨²ÆÕþËðʧ ¡£Ä¿Ç° £¬µ÷²éÈÔÔÚ½øÐÐÖÐ £¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü ¡£


https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/


5. еÄAtroposia¶ñÒâÈí¼þ¸½´ø±¾µØ·ì϶ɨÃ跨ʽ


10ÔÂ28ÈÕ £¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂ簲ȫ½ç¸ß¶È¹Ø×¢ ¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸×ï·Ö×ÓÌṩÄ£¿é»¯Ô¶³Ì½Ó¼ûľÂí£¨RAT£© £¬¼¯³É³ÖÐø½Ó¼û¡¢Ìӱܼì²â¡¢Êý¾Ý͵ÇԺͱ¾µØ·ì϶ɨÃèËÄ´óÖ÷ÌâÖ°ÄÜ £¬³ÉΪ¼ÌSpamGPT¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸×﹤¾ß°ü´ú±í ¡£Varonis°²È«ÍŶÓ×êÑз¢ÏÖ £¬Atroposiaͨ¹ý¼ÓÃÜͨ·ÓëºÅÁî½ÚÔ죨C2£©·þÎñÆ÷ͨѶ £¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§½ÚÔ죨UAC£©ÌáÉýȨÏÞ £¬ÔÚÊÜϰȾÖ÷»ú³ÉÁ¢ÓƾÃÒþÃØ½Ó¼û ¡£ÆäÖ°ÄÜÄ£¿éÔ̺¬£ºHRDP ConnectÄ£¿é¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢×¥È¡×é¼þ¡¢ÇÔȡģ¿é¡¢¼ôÌù°åÖÎÀíÆ÷¡¢DNS½Ù³ÖÄ£¿é £¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõķì϶ɨÃèÆ÷ £¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢²»°²È«ÅäÖü°¹ýÆÚÈí¼þ°æ±¾ £¬ÌìÉú·ì϶ÓÅÏȼ¶ÆÀ·Ö £¬Öú¹¥»÷Õß¼±¾ç¶¨Î»¿ÉÀûÓõÄȨÏÞÌáÉý·ì϶»ò¹ýÆÚVPN¿Í»§¶ËµÈÓÄ΢µã ¡£


https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/


6. CISAÖÒ¸æ´ïË÷ϵͳDELMIA Apriso·ì϶ÔâÒ°±íÀûÓÃ


10ÔÂ28ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©°ä²¼ÑϳÁ°²È«Ô¤¾¯ £¬Ö¸³ö¹¥»÷ÕßÕý»ý¼«ÀûÓôïË÷ϵͳDELMIA AprisoÔì×÷ÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¹æ»®ÖеÄÁ½¸ö¸ßΣ·ì϶ ¡£ÕâÁ½¸ö·ì϶±ðÀëΪCVE-2025-6205£¨È±Ê§ÊÚȨ·ì϶ £¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨½Ó¼û£©ºÍCVE-2025-6204£¨¸ßÑϳÁˮƽ´úÂë×¢Èë·ì϶ £¬¿ÉÖ´ÐÐËÁÒâ´úÂ룩 £¬Ó°Ïì2020ÖÁ2025°æ²úÆ· ¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õ°ä²¼²¹¶¡½¨¸´ £¬µ«CISAÇ¿µ÷·ì϶ÒÑÔÚÒ°±í±»ÏÖʵÀûÓà £¬²¢½«ÆäÄÉÈëÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ ¡£Æ¾¾Ý2021Äê11Ô°䲼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01 £¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©ÊµÏÖ·ì϶½¨²¹ £¬²»È»½«Ãæ¶Ô³Á´óÍøÂ簲ȫ·çÏÕ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯ÀûÓ÷ì϶Ŀ¼ £¬Íþв×êÑÐÔ±Johannes Ullrich´ËǰÒÑ·¢ÏÔìäÊ׸öÀûÓü£Ïó ¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/