RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡

Ðû²¼Ê±¼ä 2024-12-10

1. RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬×Ô2024Äê1ÔÂÆð£¬£¬£¬£¬£¬£¬RedLineÐÅÏ¢ÇÔÈ¡»î¶¯×îÏÈÕë¶ÔʹÓõÁ°æÆóÒµÈí¼þµÄ¶íÂÞ˹ÆóÒµ¡£¡£ ¡£¡£¡£¡£¡£ÕâЩµÁ°æÈí¼þͨ¹ý¶íÂÞ˹ÔÚÏßÂÛ̳·Ö·¢£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÉÃîµØ½«¶ñÒâÈí¼þαװ³É¿ÉÈÆ¹ýÓªÒµ×Ô¶¯»¯Èí¼þÔÊÐíµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬ÌØÊâÊÇ̫ͨ¹ý·¢¶ñÒâ°æ±¾µÄHPDxLIB¼¤»îÆ÷¡£¡£ ¡£¡£¡£¡£¡£ÓëÕýµ±°æ±¾²î±ð£¬£¬£¬£¬£¬£¬¶ñÒâ°æ±¾ÔÚ.NETÖй¹½¨£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ×ÔÊðÃûÖ¤Êé¡£¡£ ¡£¡£¡£¡£¡£¿£¿£¿ £¿£¿£¿¨°Í˹»ù±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÕâЩδ¾­ÊÚȨµÄÆóÒµÓªÒµÁ÷³Ì×Ô¶¯»¯Èí¼þÓû§³ÉΪ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ»á¼ÆÂÛ̳ÉÏ·Ö·¢º¬ÓÐRedLineÇÔÈ¡³ÌÐòµÄ¶ñÒ⼤»î³ÌÐò¡£¡£ ¡£¡£¡£¡£¡£¸Ã³ÌÐòʹÓÃ.NET Reactor¾ÙÐлìÏý£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂë¾­Óɶà²ãѹËõºÍ¼ÓÃÜ£¬£¬£¬£¬£¬£¬Òþ²Ø·½·¨ºÜÊDz»Ñ°³£¡£¡£ ¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÏà¹ØÂÛ̳ÉÏÐû²¼¶ñÒ⼤»îÆ÷Á´½Ó£¬£¬£¬£¬£¬£¬²¢Ìṩ½ûÓÃÇå¾²Èí¼þÒÔÔËÐ줻îÆ÷µÄÏêϸ˵Ã÷£¬£¬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£ ¡£¡£¡£¡£¡£Óû§±»ÓÕÆ­Óü¤»îÆ÷ÖеĶñÒâ¿âÌæ»»Õýµ±µÄtechsys.dll¿â£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÖ´ÐÐÈí¼þʱͨ¹ýÕýµ±Àú³Ì¼ÓÔØ¶ñÒâ¿â£¬£¬£¬£¬£¬£¬ÔËÐÐÇÔÈ¡³ÌÐò¡£¡£ ¡£¡£¡£¡£¡£RedLineÇÔÈ¡³ÌÐò×Ô2020ÄêÍ·±ã»îÔ¾£¬£¬£¬£¬£¬£¬ÄÜ´ÓϵͳÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨Æ¾Ö¤¡¢cookie¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢ÐÅÓÿ¨Êý¾ÝºÍ¼ÓÃÜÇ®°üµÈ¡£¡£ ¡£¡£¡£¡£¡£


https://securityaffairs.com/171771/cyber-crime/redline-info-stealer-campaign-targets-russian-businesses.html


2. °²ÄÈÑÅ¿ËÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬31ÍòÓ໼ÕßÊý¾Ýй¶


12ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬°²ÄÈÑÅ¿ËÒ½ÔºÊÇÒ»¼ÒλÓÚÂíÈøÖîÈûÖݵķÇÓªÀûÐÔÉçÇøÒ½Ôº£¬£¬£¬£¬£¬£¬ÓµÓÐ83ÕÅ´²Î»¡¢200ÃûҽʦºÍ1200ÃûÊÂÇéÖ°Ô±£¬£¬£¬£¬£¬£¬ÎªÍâµØ×¡ÃñÌṩ»ù±¾Ò½ÁÆÐ§ÀÍ¡£¡£ ¡£¡£¡£¡£¡£2023Äê12ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬¸ÃÒ½ÔºÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý310,000Ãû»¼ÕßµÄÃô¸Ð¿µ½¡Êý¾Ý±»Ð¹Â¶¡£¡£ ¡£¡£¡£¡£¡£Ò½ÔºÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬ÏÂÏßϵͳ²¢ÏòÖ´·¨²¿·Ö·¢³ö¾¯±¨¡£¡£ ¡£¡£¡£¡£¡£2024Äê1ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬¡°Money Message¡±ÀÕË÷Èí¼þÍÅ»ï×îÏȹûÕæÀÕË÷¸ÃÒ½Ôº£¬£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍøÀÕË÷ÍøÕ¾ÉÏй¶Á˾ݳƴÓÒ½ÔºÇÔÈ¡µÄÊý¾ÝÑù±¾¡£¡£ ¡£¡£¡£¡£¡£Ò½ÔºÖÎÀíÖ°Ô±²¢Î´ÓëÍþвÐÐΪÕß̸ÅУ¬£¬£¬£¬£¬£¬×îÖÕÓÚ1ÔÂ26ÈÕÐû²¼ÁËËùÓÐÊý¾Ý¡£¡£ ¡£¡£¡£¡£¡£¾­Óɳ¹µ×µÄȡ֤ÊӲ죬£¬£¬£¬£¬£¬Ò½ÔºÓÚ2024Äê11ÔÂ5ÈÕÍê³ÉÁ˶Ôй¶Êý¾ÝµÄÉó²é£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£ ¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éú³Ýͳ¼ÆÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢²ÆÎñÐÅÏ¢µÈ¡£¡£ ¡£¡£¡£¡£¡£Ö»¹ÜҽԺûÓм£ÏóÅú×¢ÕâÆðÊÂÎñµ¼ÖÂÁËÈκÎڲƭÐÐΪ£¬£¬£¬£¬£¬£¬µ«ÕÕ¾ÉÌáÐÑÔ±¹¤ºÍ»¼ÕßÒª¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬²¢ÌṩÁËΪÆÚ24¸öÔµÄÉí·Ý±£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/anna-jaques-hospital-ransomware-breach-exposed-data-of-300k-patients/


3. ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÔâÊÜÀÕË÷Èí¼þ¹¥»÷


12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÕýÃæÁÙÒ»ÆðÒ»Á¬µÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÒÑÏòͶ×ÊÕß°ü¹Ü£¬£¬£¬£¬£¬£¬ÆäÒªº¦ÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£ ¡£¡£¡£¡£¡£ÎªÁ˰ü¹ÜÔËÓªºÍСÎÒ˽¼ÒÊý¾ÝµÄÇå¾²£¬£¬£¬£¬£¬£¬ElectricaÒÑÆô¶¯ÄÚ²¿ÍøÂçÇ徲ЭÒ飬£¬£¬£¬£¬£¬²¢Óë¹ú¼ÒÍøÂçÇå¾²»ú¹¹ÏàÖú£¬£¬£¬£¬£¬£¬Ö¼ÔÚʶ±ð¹¥»÷Ô´²¢¿ØÖÆÆäÓ°Ïì¡£¡£ ¡£¡£¡£¡£¡£ElectricaÊÇÂÞÂíÄáÑǵçÁ¦ÅäËͺ͹©Ó¦Êг¡µÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬ÎªÁè¼Ý380Íò¿Í»§ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬²¢ÔÚ²¼¼ÓÀÕË¹ÌØºÍÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊС£¡£ ¡£¡£¡£¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼Í¨Öª£¬£¬£¬£¬£¬£¬¼û¸æÍ¶×ÊÕßÕýÔÚ±¬·¢µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ËùÓÐÌØ¶¨µÄÏìӦЭÒéÒÑÆ¾Ö¤ÄÚ²¿³ÌÐòºÍÏÖÐйæÔòÆô¶¯¡£¡£ ¡£¡£¡£¡£¡£ÂÞÂíÄáÑÇÄÜÔ´²¿Ö¤Êµ¸Ã¹«Ë¾È·ÊµÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ«¹¥»÷²¢Î´Ó°Ïì¸Ã¹«Ë¾µÄSCADAϵͳ¡£¡£ ¡£¡£¡£¡£¡£Ç鱨ÆÊÎöÈËÊ¿ÒÔΪ£¬£¬£¬£¬£¬£¬´Ë´ÎÏ®»÷¿ÉÄÜÊÇÇ×¶íÕûÌå·¢¶¯µÄ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÂÞÂíÄáÑÇÒò¶íÂÞË¹ÉæÏÓ¸ÉÔ¤¶ø×÷·Ï×Üͳѡ¾Ù¡£¡£ ¡£¡£¡£¡£¡£ÂÞÂíÄáÑÇÇ鱨¾Ö͸¶£¬£¬£¬£¬£¬£¬Áè¼Ý85,000´ÎÍøÂç¹¥»÷Õë¶Ô¸Ã¹úÑ¡¾Ùϵͳ£¬£¬£¬£¬£¬£¬µ«ÄªË¹¿Æ·ñ¶¨¶Ô´Ë¾ÙÐÐÈκι¥»÷¡£¡£ ¡£¡£¡£¡£¡£Electrica Group½¨Òé¿Í»§¶ÔDZÔÚµÄÍøÂç´¹ÂÚʵÑéºÍ¿ÉÒÉͨѶ¼á³ÖСÐÄ¡£¡£ ¡£¡£¡£¡£¡£


https://securityaffairs.com/171832/hacking/electrica-group-ransomware-attack.html


4. ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔâÀÕË÷Èí¼þ¹¥»÷


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔÚ11ÔÂ21ÈÕÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÈÅÂÒÁËÆäÔËÓª²¢µ¼Ö²¿·Öϵͳ¹Ø±Õ¡£¡£ ¡£¡£¡£¡£¡£Artivion×ܲ¿Î»ÓÚÑÇÌØÀ¼´ó£¬£¬£¬£¬£¬£¬È«ÇòÔ±¹¤Áè¼Ý1,250Ãû£¬£¬£¬£¬£¬£¬ÔÚ100¶à¸ö¹ú¼ÒÉèÓÐÏúÊÛ´ú±í£¬£¬£¬£¬£¬£¬²¢ÔÚÑÇÌØÀ¼´ó¡¢°Â˹͡ºÍºÚÐÀ¸ùÉèÓÐÖÆÔ칤³§¡£¡£ ¡£¡£¡£¡£¡£¾ÝArtivionÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ±¨¸æ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼ÓÃÜÁËÆä²¿·Öϵͳ²¢ÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÔËÓª¡¢¶©µ¥´¦Öóͷ£ºÍÔËÊäÖÐÖ¹ÎÊÌâÒÑ»ù±¾»ñµÃ½â¾ö¡£¡£ ¡£¡£¡£¡£¡£ËäÈ»ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬µ«ArtivionÒÔΪ¿ÉÄܻᱬ·¢°ü¹Üδº­¸ÇµÄÌØÊâÓöÈ¡£¡£ ¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÒ²ÔâÓöÁ˶àÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬°üÀ¨Boston Children's Health PhysiciansºÍUMCÒ½ÁÆÏµÍ³£¬£¬£¬£¬£¬£¬ÒÔ¼°È¥ÄêÊ¥µ®½ÚÔâÊܹ¥»÷µÄ°²ÄÈÑÅ¿ËÒ½Ôº£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷¶¼µ¼ÖÂÁËÃô¸ÐÊý¾ÝµÄй¶ºÍÔËÓªµÄÖÐÖ¹¡£¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/


5. ΢Èíɨ³ý¶ÔUbisoftÓÎÏ·Windows 24H2¸üÐÂÏÞÖÆ


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÒѲ¿·Öɨ³ýÁ˶ÔWindows 24H2¸üÐÂÓëijЩUbisoftÓÎϷϵͳ¼æÈÝÐÔµÄÏÞÖÆ¡£¡£ ¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬ÓÉÓÚ¡¶´Ì¿ÍÐÅÌõ¡·¡¢¡¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÈÓÎÏ·ÔÚWindows 11 24H2Ô¤ÀÀ°æÖзºÆðÍ߽⡢ËÀ»úºÍÒôƵÎÊÌ⣬£¬£¬£¬£¬£¬Î¢Èí×èÖ¹ÁË×°ÓÐÕâЩÓÎÏ·µÄPC¾ÙÐÐWindows 24H2Éý¼¶¡£¡£ ¡£¡£¡£¡£¡£Óû§·´ÏìÏÔʾ£¬£¬£¬£¬£¬£¬ÓÎÏ·±£´æ²»ÎȹÌÇéÐΣ¬£¬£¬£¬£¬£¬ÈçÆô¶¯ºóÁ¬Ã¦±ÀÀ£»£»£»ò¼ÓÔØÉúÑÄÓÎÏ·ºó¼¸·ÖÖÓÄÚÍ߽⡢¶³½á»òºÚÆÁ¡£¡£ ¡£¡£¡£¡£¡£Îª±ÜÃâÎÊÌâÀ©É¢£¬£¬£¬£¬£¬£¬Î¢Èí½ÓÄÉÁ˱£»£»£»¤²½·¥¡£¡£ ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÔÚUbisoftÐû²¼ÔÝʱÐÞ²¹³ÌÐò»º½âÍß½âÎÊÌâºó£¬£¬£¬£¬£¬£¬Î¢Èíɨ³ýÁ˶ԡ¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÄÉý¼¶ÏÞÖÆ£¬£¬£¬£¬£¬£¬µ«½¨ÒéÍæ¼ÒÔÚÎÊÌâ½â¾öǰ²»ÒªÊ¹ÓÃWindows 11×°ÖÃÖúÊÖ»òýÌ彨É蹤¾ßÉý¼¶ÊÜÓ°ÏìPC¡£¡£ ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Î¢Èí»¹Ðû²¼×èÖ¹×°ÖÃÁ˹ýʱGoogle Workspace SyncµÄϵͳºÍ¾ßÓв»¼æÈÝÓ¢ÌØ¶ûÖÇÄÜÉùÒôÊÖÒÕÒôƵÇý¶¯³ÌÐòµÄ×°±¸¾ÙÐÐWindows 11 24H2¸üУ¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩ»áµ¼ÖÂOutlookÆô¶¯ÎÊÌâºÍÀ¶ÆÁËÀ»úÎÊÌâ¡£¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/ubisoft-fixes-windows-11-24h2-conflicts-causing-game-crashes/


6. ³¯ÏʺڿÍCitrine Sleet͵ȡRadiant Capital 5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯½ðÈÚ(DeFi)ƽ̨Radiant CapitalÔÚ10ÔÂ16ÈÕÐû²¼ÆäϵͳÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂ5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ¡£¡£ ¡£¡£¡£¡£¡£ÔÚMandiantÍøÂçÇ徲ר¼ÒµÄЭÖúÏ£¬£¬£¬£¬£¬£¬Radiant¶Ô´Ë´Î¹¥»÷¾ÙÐÐÁËÉîÈëÊӲ죬£¬£¬£¬£¬£¬²¢È·¶¨Ä»ºóºÚÊÖΪ³¯Ïʹú¼ÒÁ¥ÊôºÚ¿Í×éÖ¯Citrine Sleet£¨ÓÖÃû¡°UNC4736¡±ºÍ¡°AppleJeus¡±£©¡£¡£ ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýTelegram·¢ËÍð³äǰ³Ð°üÉ̵ĶñÒâÐÂÎÅ£¬£¬£¬£¬£¬£¬ÓÕÆ­¿ª·¢Ö°Ô±ÏÂÔØ°üÀ¨¡°InletDrift¡±macOS¶ñÒâÈí¼þ¸ºÔصÄZIPÎļþ£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÊÜѬȾµÄ×°±¸ÉϽ¨ÉèºóÃÅ¡£¡£ ¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃͨÀýµÄ¶àÖØÊðÃûÊ¿³Ì£¬£¬£¬£¬£¬£¬ÒÔÉúÒâ¹ýʧµÄÃûÒåÍøÂçÓÐÓÃÊðÃû£¬£¬£¬£¬£¬£¬²¢´ÓArbitrumºÍ±Ò°²ÖÇÄÜÁ´(BSC)Êг¡ÇÔÈ¡×ʽ𡣡£ ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Éè¼ÆÓÅÒ죬£¬£¬£¬£¬£¬ÈƹýÁËÓ²¼þÇ®°üÇå¾²ºÍ¶à²ãÑéÖ¤£¬£¬£¬£¬£¬£¬ÉúÒâÔÚÊÖ¶¯ºÍÄ£Äâ¼ì²éÖп´ÆðÀ´¶¼ºÜÕý³££¬£¬£¬£¬£¬£¬ÏÔʾ³ö¼«¸ßµÄÖØ´óÐÔ¡£¡£ ¡£¡£¡£¡£¡£RadiantÕýÔÚÓëÃÀ¹úÖ´·¨²¿·ÖºÍzeroShadowÏàÖú£¬£¬£¬£¬£¬£¬×·»Ø¾¡¿ÉÄܶàµÄ±»µÁ×ʽ𣬣¬£¬£¬£¬£¬²¢Ç¿µ÷ÐèÒª¸üǿʢµÄ×°±¸¼¶½â¾ö¼Æ»®À´ÔöÇ¿ÉúÒâÇå¾²ÐÔ¡£¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers