ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§
Ðû²¼Ê±¼ä 2025-10-291. ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§
10ÔÂ26ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌᳫ¶¨Ïò¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢£¬£¬£¬£¬£¬¼æÈÝWindowsºÍLinuxϵͳ£¬£¬£¬£¬£¬Í¨¹ýPyInstaller±àÒëΪ×ÔÁ¦¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬²¢Î±×°³ÉÓÎÏ·»òDiscordÏà¹Ø¹¤¾ßÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£¡£¡£¡£¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸Ç¿Ê¢¹¦Ð§£¬£¬£¬£¬£¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¼ÓÃÜÇ®°üÎļþ¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢£¬£¬£¬£¬£¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼¡£¡£¡£¡£¡£¡£¡£Æä¹¥»÷Á÷³Ì°üÀ¨É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ£¬£¬£¬£¬£¬Í¨¹ýÕýÔò±í´ïʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬½ø¶ø»ñÈ¡Óû§Ð¡ÎÒ˽¼Ò×ÊÁÏ¡¢ÓÊÏä¡¢¶àÒòËØÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé¡£¡£¡£¡£¡£¡£¡£¸üÒþ²ØµÄÊÇ£¬£¬£¬£¬£¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ£¬£¬£¬£¬£¬×èµ²µÇ¼ʵÑé¡¢¹ºÖü°ÃÜÂë¸ü¸ÄµÈÊÂÎñ£¬£¬£¬£¬£¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢ÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ£¬£¬£¬£¬£¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢Ð§ÀÍGoFile£¬£¬£¬£¬£¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/
2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹ûÕæ
10ÔÂ27ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡°üÀ¨¿Í»§ÒøÐÐÕ˺š¢ÉúÒâ¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢£¬£¬£¬£¬£¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò»£¬£¬£¬£¬£¬Äê¶ÈÓªÊÕ³¬620ÒÚÃÀÔª£¬£¬£¬£¬£¬È«Çò¹ÍÔ±Ô¼22ÍòÈË£¬£¬£¬£¬£¬ÆäÃÀ¹úÊг¡Õ½ÂÔ½ñÄêÍ·Òѵ÷½â£¬£¬£¬£¬£¬Öð²½Í˳öÉÌÒµÒøÐÐÓªÒµ¡£¡£¡£¡£¡£¡£¡£¾ÝÑо¿ÍŶӶԺڿ͹ûÕæµÄÊý¾ÝÑùÌìÖ°Îö£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸ÇÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢ÉúÒâ¼Í¼¡¢¹ÉƱÉúÒâÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò¾¯Ê¾£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèÚ²ÆÕË»§¡¢Ðéα±¨Ë°£©¡¢»ùÓÚÏûºÄϰ¹ß²ß»®¾«×¼ÍøÂçÕ©Æ£¬£¬£¬£¬£¬»òð³ä½ðÈÚ»ú¹¹ÊµÑéµçÐÅÕ©Æ£¬£¬£¬£¬£¬×é³É¶àÖØ²»·¨»î¶¯Î£º¦¡£¡£¡£¡£¡£¡£¡£ÒµÄÚÈËʿָ³ö£¬£¬£¬£¬£¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³ÉÖØ´´£¬£¬£¬£¬£¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´ÍêÕûչʾ±»µÁÊý¾Ý¼¯È«Ã²£¬£¬£¬£¬£¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üУ¬£¬£¬£¬£¬ÌåÏÖ±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§£¬£¬£¬£¬£¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÓªÒµ¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/hsbc-usa-data-breach-claims/
3. °ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶
10ÔÂ25ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬°ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚ×ÅÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯£¬£¬£¬£¬£¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Gerar×÷ΪÖÂÁ¦ÓÚ×ÊÖúÄêÇáÈË»ñµÃʵϰºÍ¾Íҵʱ»úµÄ·ÇÓªÀû»ú¹¹£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£¡£Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬°üÀ¨Ò½ÁƼì²éÕªÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄÌõÔ¼¡¢±øÒÛÎļþµÈ¡£¡£¡£¡£¡£¡£¡£Ïêϸй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢µØµã¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢½ÌÓý¼Í¼µÈ¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Ñù±¾Öл¹°üÀ¨ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓá¢Ú²ÆÕË»§¿ªÉè¡¢´û¿îÉêÇëµÈ²»·¨»î¶¯¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/gerar-youth-nonprofit-data-breach/
4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶
10ÔÂ28ÈÕ£¬£¬£¬£¬£¬ÈÕ±¾¹ã¸æ¾ÞÍ·µçͨ¼¯ÍÅÅû¶£¬£¬£¬£¬£¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©ÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬£¬£¬£¬µçͨÒѹرղ¿·Öϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦³ÌÐò£¬£¬£¬£¬£¬Í¬Ê±Ïò¶à¹úÏà¹Ø²¿·ÖÒÀ·¨±¨¸æ£¬£¬£¬£¬£¬µ«ÏêϸӰÏì¹æÄ£ÉÐδÃ÷È·¡£¡£¡£¡£¡£¡£¡£ÃÀ¿â¶ûÊǵçͨ¼¯ÍÅÍâÑóÓªÒµÖпͻ§ÌåÑéÖÎÀí£¨CXM£©ÁìÓòµÄ½¹µã×Ó¹«Ë¾£¬£¬£¬£¬£¬ÔÚ±±ÃÀ¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¼°ÑÇÌ«µØÇøÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹£¬£¬£¬£¬£¬ÓµÓÐ1.6ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬ÄêÊÕÈë´ï20ÒÚÃÀÔª£¬£¬£¬£¬£¬Ð§ÀͿͻ§°üÀ¨È¸³²¡¢Î¢Èí¡¢±¦½à¡¢Ó¢ÌضûµÈÈ«Çò×ÅÃûÆóÒµ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¹©Ó¦É̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬Ïêϸ°üÀ¨ÒøÐÐÕË»§¡¢ÈËΪµ¥ÏêÇ顢нˮ¡¢¹úÃñ°ü¹ÜºÅÂ뼰СÎÒ˽¼ÒÁªÏµ·½·¨µÈ¡£¡£¡£¡£¡£¡£¡£µçͨ½²»°ÈË֤ʵ£¬£¬£¬£¬£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÒÑÊÕµ½Í¨Öª£¬£¬£¬£¬£¬¹«Ë¾ÕýÁªºÏµÚÈý·½»ú¹¹ÊÓ²ìÊÂÎñ¹æÄ£¼°ÖÜȫӰÏì¡£¡£¡£¡£¡£¡£¡£µçͨ¼¯ÍÅÇ¿µ÷£¬£¬£¬£¬£¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼°£¬£¬£¬£¬£¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´Ò»¶¨²ÆÎñËðʧ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/
5. еÄAtroposia¶ñÒâÈí¼þ¸½´øÍâµØÎó²îɨÃè³ÌÐò
10ÔÂ28ÈÕ£¬£¬£¬£¬£¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂçÇå¾²½ç¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸·¨·Ö×ÓÌṩģ¿£¿£¿£¿é»¯Ô¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬£¬£¬¼¯³ÉÒ»Á¬»á¼û¡¢Ìӱܼì²â¡¢Êý¾Ý͵ÇÔºÍÍâµØÎó²îɨÃèËĴ󽹵㹦Ч£¬£¬£¬£¬£¬³ÉΪ¼ÌSpamGPT¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸·¨¹¤¾ß°ü´ú±í¡£¡£¡£¡£¡£¡£¡£VaronisÇå¾²ÍŶÓÑо¿·¢Ã÷£¬£¬£¬£¬£¬Atroposiaͨ¹ý¼ÓÃÜͨµÀÓëÏÂÁî¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§¿ØÖÆ£¨UAC£©ÌáÉýȨÏÞ£¬£¬£¬£¬£¬ÔÚÊÜѬȾÖ÷»ú½¨É賤ÆÚÒþÃØ»á¼û¡£¡£¡£¡£¡£¡£¡£Æä¹¦Ð§Ä£¿£¿£¿£¿é°üÀ¨£ºHRDP ConnectÄ£¿£¿£¿£¿é¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢×¥È¡×é¼þ¡¢ÇÔȡģ¿£¿£¿£¿é¡¢¼ôÌù°åÖÎÀíÆ÷¡¢DNSÐ®ÖÆÄ£¿£¿£¿£¿é£¬£¬£¬£¬£¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõÄÎó²îɨÃèÆ÷£¬£¬£¬£¬£¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢²»Çå¾²ÉèÖü°¹ýʱÈí¼þ°æ±¾£¬£¬£¬£¬£¬ÌìÉúÎó²îÓÅÏȼ¶ÆÀ·Ö£¬£¬£¬£¬£¬Öú¹¥»÷Õß¿ìËÙ¶¨Î»¿ÉʹÓõÄȨÏÞÌáÉýÎó²î»ò¹ýʱVPN¿Í»§¶ËµÈ±¡Èõµã¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
6. CISAÖÒÑÔ´ïË÷ϵͳDELMIA AprisoÎó²îÔâÒ°ÍâʹÓÃ
10ÔÂ28ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÑÏÖØÇå¾²Ô¤¾¯£¬£¬£¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÆð¾¢Ê¹ÓôïË÷ϵͳDELMIA AprisoÖÆÔìÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¼Æ»®ÖеÄÁ½¸ö¸ßΣÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î»®·ÖΪCVE-2025-6205£¨È±Ê§ÊÚȨÎó²î£¬£¬£¬£¬£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨»á¼û£©ºÍCVE-2025-6204£¨¸ßÑÏÖØË®Æ½´úÂë×¢ÈëÎó²î£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂ룩£¬£¬£¬£¬£¬Ó°Ïì2020ÖÁ2025°æ²úÆ·¡£¡£¡£¡£¡£¡£¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õÐû²¼²¹¶¡ÐÞ¸´£¬£¬£¬£¬£¬µ«CISAÇ¿µ÷Îó²îÒÑÔÚÒ°Íâ±»ÏÖʵʹÓ㬣¬£¬£¬£¬²¢½«ÆäÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤2021Äê11ÔÂÐû²¼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©Íê³ÉÎó²îÐÞ²¹£¬£¬£¬£¬£¬²»È»½«ÃæÁÙÖØ´óÍøÂçÇ徲Σº¦¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬ÍþвÑо¿Ô±Johannes Ullrich´ËǰÒÑ·¢Ã÷ÆäÊ׸öʹÓü£Ï󡣡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/


¾©¹«Íø°²±¸11010802024551ºÅ