ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§
Ðû²¼Ê±¼ä 2025-10-291. ºÚ¿ÍʹÓûùÓÚRedTigerµÄÐÅÏ¢ÇÔÈ¡³ÌÐòÇÔÈ¡DiscordÕË»§
10ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓÿªÔ´ºì¶Ó¹¤¾ßRedTiger¹¹½¨ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬¶Ô·¨¹úDiscordÕË»§³ÖÓÐÕßÌᳫ¶¨Ïò¹¥»÷¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚPython¿ª·¢£¬£¬£¬£¬£¬£¬¼æÈÝWindowsºÍLinuxϵͳ£¬£¬£¬£¬£¬£¬Í¨¹ýPyInstaller±àÒëΪ×ÔÁ¦¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬²¢Î±×°³ÉÓÎÏ·»òDiscordÏà¹Ø¹¤¾ßÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£¡£¡£RedTigerµÄÐÅÏ¢ÇÔÈ¡×é¼þ¾ß±¸Ç¿Ê¢¹¦Ð§£¬£¬£¬£¬£¬£¬¿ÉÇÔȡϵͳÐÅÏ¢¡¢ä¯ÀÀÆ÷Cookie/ÃÜÂë¡¢¼ÓÃÜÇ®°üÎļþ¡¢ÓÎÏ·ÕË»§Êý¾Ý¼°Roblox/DiscordÐÅÏ¢£¬£¬£¬£¬£¬£¬»¹Äܲ¶»ñÍøÂçÉãÏñÍ·¿ìÕÕºÍÆÁÄ»½ØÍ¼¡£¡£¡£¡£¡£Æä¹¥»÷Á÷³Ì°üÀ¨É¨ÃèDiscordºÍä¯ÀÀÆ÷Êý¾Ý¿âÎļþ£¬£¬£¬£¬£¬£¬Í¨¹ýÕýÔò±í´ïʽÌáÈ¡²¢ÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬£¬½ø¶ø»ñÈ¡Óû§Ð¡ÎÒ˽¼Ò×ÊÁÏ¡¢ÓÊÏä¡¢¶àÒòËØÈÏÖ¤ÐÅÏ¢¼°¶©ÔÄÏêÇé¡£¡£¡£¡£¡£¸üÒþ²ØµÄÊÇ£¬£¬£¬£¬£¬£¬Ëüͨ¹ý×¢Èë×Ô½ç˵JavaScriptµ½DiscordµÄindex.jsÎļþ£¬£¬£¬£¬£¬£¬×èµ²µÇ¼ʵÑé¡¢¹ºÖü°ÃÜÂë¸ü¸ÄµÈÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÌáÈ¡´æ´¢µÄÖ§¸¶ÐÅÏ¢ÈçPayPal¡¢ÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ»¹»áɨÃèÎļþϵͳÉϵÄ.TXT/.SQL/.ZIPÎļþ£¬£¬£¬£¬£¬£¬½«ËùÓÐÇÔÈ¡Êý¾Ý´ò°üÉÏ´«ÖÁÄäÃûÔÆ´æ´¢Ð§ÀÍGoFile£¬£¬£¬£¬£¬£¬²¢Í¨¹ýDiscord webhook½«ÏÂÔØÁ´½Ó¼°Êܺ¦ÕßÔªÊý¾Ý·¢Ë͸ø¹¥»÷Õß¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/
2. »ã·áÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬ÕË»§Á÷Ë®Óë¹ÉƱ¶©µ¥±»¹ûÕæ
10ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬»ã·áÒøÐÐÃÀ¹ú·ÖÐÐÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÔÚºÚ¿ÍÂÛ̳Ðû³ÆÒÑÇÔÈ¡°üÀ¨¿Í»§ÒøÐÐÕ˺š¢ÉúÒâ¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢£¬£¬£¬£¬£¬£¬Òò»ã·áÒøÐÐ×÷ΪȫÇò×î´ó½ðÈÚ»ú¹¹Ö®Ò»£¬£¬£¬£¬£¬£¬Äê¶ÈÓªÊÕ³¬620ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬È«Çò¹ÍÔ±Ô¼22ÍòÈË£¬£¬£¬£¬£¬£¬ÆäÃÀ¹úÊг¡Õ½ÂÔ½ñÄêÍ·Òѵ÷½â£¬£¬£¬£¬£¬£¬Öð²½Í˳öÉÌÒµÒøÐÐÓªÒµ¡£¡£¡£¡£¡£¾ÝÑо¿ÍŶӶԺڿ͹ûÕæµÄÊý¾ÝÑùÌìÖ°Îö£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸ÇÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢ÉúÒâ¼Í¼¡¢¹ÉƱÉúÒâÖ¸Áî¼°ÒøÐÐÕ˺ŵȸßÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò¾¯Ê¾£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓã¨È翪ÉèÚ²ÆÕË»§¡¢Ðéα±¨Ë°£©¡¢»ùÓÚÏûºÄϰ¹ß²ß»®¾«×¼ÍøÂçÕ©Æ£¬£¬£¬£¬£¬£¬»òð³ä½ðÈÚ»ú¹¹ÊµÑéµçÐÅÕ©Æ£¬£¬£¬£¬£¬£¬×é³É¶àÖØ²»·¨»î¶¯Î£º¦¡£¡£¡£¡£¡£ÒµÄÚÈËʿָ³ö£¬£¬£¬£¬£¬£¬ÊÂÎñ¿ÉÄܶԻã·áÃÀ¹úÉÌÓþÔì³ÉÖØ´´£¬£¬£¬£¬£¬£¬²¢µ¼Ö¿ͻ§×ʲú×ªÒÆ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÌṩµÄÊý¾ÝÑù±¾Î´ÍêÕûչʾ±»µÁÊý¾Ý¼¯È«Ã²£¬£¬£¬£¬£¬£¬Ñù±¾ÖеÄÈÕÆÚÏÔʾÐÅϢΪ¼¸ÖÜǰ¸üУ¬£¬£¬£¬£¬£¬ÌåÏÖ±»µÁÊý¾Ý¿â¿ÉÄÜÉæ¼°ÆóÒµ¼°»ú¹¹¿Í»§£¬£¬£¬£¬£¬£¬¶ø·Ç½öÏÞÒÑÍ˳öµÄÁãÊÛÓªÒµ¡£¡£¡£¡£¡£
https://cybernews.com/security/hsbc-usa-data-breach-claims/
3. °ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâ´ó¹æÄ£Êý¾Ýй¶
10ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬°ÍÎ÷·ÇÓªÀû×éÖ¯GerarÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚ×ÅÃûÊý¾Ýй¶ÂÛ̳Ðû³ÆÒÑÈëÇÖ¸Ã×éÖ¯£¬£¬£¬£¬£¬£¬»ñÈ¡×ܼÆ546GBµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬Éæ¼°´ÓÐÕÃûµ½±øÒÛÎļþµÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£Gerar×÷ΪÖÂÁ¦ÓÚ×ÊÖúÄêÇáÈË»ñµÃʵϰºÍ¾Íҵʱ»úµÄ·ÇÓªÀû»ú¹¹£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸Ç¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬£¬°üÀ¨Ò½ÁƼì²éÕªÒª£¨º¬Ò½»¼ÐÕÃû£©¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢GerarÓëѧͽ¼°½ÌÓý»ú¹¹µÄÌõÔ¼¡¢±øÒÛÎļþµÈ¡£¡£¡£¡£¡£Ïêϸй¶×Ö¶ÎÉæ¼°ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÄÉ˰ÈËÉí·ÝÖ¤¡¢µØµã¡¢¼ÒÍ¥ÊÕÈëÊý¾Ý¡¢½ÌÓý¼Í¼µÈ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ñù±¾Öл¹°üÀ¨ÒÉËÆ¶àÄêǰGerarѧͽµÄÃô¸ÐÐÅÏ¢Çåµ¥£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܱ»·¸·¨·Ö×ÓÓÃÓÚÉí·ÝµÁÓá¢Ú²ÆÕË»§¿ªÉè¡¢´û¿îÉêÇëµÈ²»·¨»î¶¯¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬GerarÉÐδ¶ÔÊý¾Ýй¶ÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£¡£¡£¡£¡£
https://cybernews.com/security/gerar-youth-nonprofit-data-breach/
4. ÈÕ±¾µçͨ¼¯ÍÅÃÀ¿â¶û×Ó¹«Ë¾ÔâÍøÂç¹¥»÷ÖÂÊý¾Ýй¶
10ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ÈÕ±¾¹ã¸æ¾ÞÍ·µçͨ¼¯ÍÅÅû¶£¬£¬£¬£¬£¬£¬ÆäÃÀ¹ú×Ó¹«Ë¾ÃÀ¿â¶û£¨Merkle£©ÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤¼°¿Í»§Êý¾Ýй¶¡£¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬£¬£¬£¬£¬µçͨÒѹرղ¿·Öϵͳ²¢Æô¶¯ÊÂÎñÏìÓ¦³ÌÐò£¬£¬£¬£¬£¬£¬Í¬Ê±Ïò¶à¹úÏà¹Ø²¿·ÖÒÀ·¨±¨¸æ£¬£¬£¬£¬£¬£¬µ«ÏêϸӰÏì¹æÄ£ÉÐδÃ÷È·¡£¡£¡£¡£¡£ÃÀ¿â¶ûÊǵçͨ¼¯ÍÅÍâÑóÓªÒµÖпͻ§ÌåÑéÖÎÀí£¨CXM£©ÁìÓòµÄ½¹µã×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬ÔÚ±±ÃÀ¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¼°ÑÇÌ«µØÇøÔËÓªÊý¾ÝÇý¶¯ÓªÏú»ú¹¹£¬£¬£¬£¬£¬£¬ÓµÓÐ1.6ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬£¬ÄêÊÕÈë´ï20ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬Ð§ÀͿͻ§°üÀ¨È¸³²¡¢Î¢Èí¡¢±¦½à¡¢Ó¢ÌضûµÈÈ«Çò×ÅÃûÆóÒµ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÉæ¼°¿Í»§¡¢¹©Ó¦É̼°ÏÖÈÎ/ǰÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬Ïêϸ°üÀ¨ÒøÐÐÕË»§¡¢ÈËΪµ¥ÏêÇ顢нˮ¡¢¹úÃñ°ü¹ÜºÅÂ뼰СÎÒ˽¼ÒÁªÏµ·½·¨µÈ¡£¡£¡£¡£¡£µçͨ½²»°ÈË֤ʵ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÒÑÊÕµ½Í¨Öª£¬£¬£¬£¬£¬£¬¹«Ë¾ÕýÁªºÏµÚÈý·½»ú¹¹ÊÓ²ìÊÂÎñ¹æÄ£¼°ÖÜȫӰÏì¡£¡£¡£¡£¡£µçͨ¼¯ÍÅÇ¿µ÷£¬£¬£¬£¬£¬£¬ÆäÈÕ±¾±¾ÍÁÍøÂçϵͳδÊܲ¨¼°£¬£¬£¬£¬£¬£¬µ«Ô¤¼ÆÊÂÎñ½«´øÀ´Ò»¶¨²ÆÎñËðʧ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/
5. еÄAtroposia¶ñÒâÈí¼þ¸½´øÍâµØÎó²îɨÃè³ÌÐò
10ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪAtroposiaµÄÐÂÐͶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Æ½Ì¨ÕýÒý·¢ÍøÂçÇå¾²½ç¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¸Ãƽ̨ÒÔÿÔÂ200ÃÀÔªµÄ¶©ÔÄ·ÑÏòÍøÂç·¸·¨·Ö×ÓÌṩģ¿£¿£¿£¿£¿£¿é»¯Ô¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬£¬£¬£¬¼¯³ÉÒ»Á¬»á¼û¡¢Ìӱܼì²â¡¢Êý¾Ý͵ÇÔºÍÍâµØÎó²îɨÃèËĴ󽹵㹦Ч£¬£¬£¬£¬£¬£¬³ÉΪ¼ÌSpamGPT¡¢MatrixPDFºóÓÖÒ»"¼´²å¼´ÓÃ"ÐÍ·¸·¨¹¤¾ß°ü´ú±í¡£¡£¡£¡£¡£VaronisÇå¾²ÍŶÓÑо¿·¢Ã÷£¬£¬£¬£¬£¬£¬Atroposiaͨ¹ý¼ÓÃÜͨµÀÓëÏÂÁî¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýWindowsÓû§ÕË»§¿ØÖÆ£¨UAC£©ÌáÉýȨÏÞ£¬£¬£¬£¬£¬£¬ÔÚÊÜѬȾÖ÷»ú½¨É賤ÆÚÒþÃØ»á¼û¡£¡£¡£¡£¡£Æä¹¦Ð§Ä£¿£¿£¿£¿£¿£¿é°üÀ¨£ºHRDP ConnectÄ£¿£¿£¿£¿£¿£¿é¡¢×ÊÔ´ÖÎÀíÆ÷ʽÎļþϵͳ¡¢×¥È¡×é¼þ¡¢ÇÔȡģ¿£¿£¿£¿£¿£¿é¡¢¼ôÌù°åÖÎÀíÆ÷¡¢DNSÐ®ÖÆÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬ÓÈΪΣÏÕµÄÊÇÆäÄÚÖõÄÎó²îɨÃèÆ÷£¬£¬£¬£¬£¬£¬¿É×Ô¶¯¼ì²âϵͳȱʧ²¹¶¡¡¢²»Çå¾²ÉèÖü°¹ýʱÈí¼þ°æ±¾£¬£¬£¬£¬£¬£¬ÌìÉúÎó²îÓÅÏȼ¶ÆÀ·Ö£¬£¬£¬£¬£¬£¬Öú¹¥»÷Õß¿ìËÙ¶¨Î»¿ÉʹÓõÄȨÏÞÌáÉýÎó²î»ò¹ýʱVPN¿Í»§¶ËµÈ±¡Èõµã¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-atroposia-malware-comes-with-a-local-vulnerability-scanner/
6. CISAÖÒÑÔ´ïË÷ϵͳDELMIA AprisoÎó²îÔâÒ°ÍâʹÓÃ
10ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÑÏÖØÇå¾²Ô¤¾¯£¬£¬£¬£¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÆð¾¢Ê¹ÓôïË÷ϵͳDELMIA AprisoÖÆÔìÔËÓªÖÎÀí£¨MOM£©ºÍÖ´ÐУ¨MES£©½â¾ö¼Æ»®ÖеÄÁ½¸ö¸ßΣÎó²î¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î»®·ÖΪCVE-2025-6205£¨È±Ê§ÊÚȨÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíδÊÚȨ¹¥»÷ÕßÔ¶³Ì»ñÈ¡ÌØÈ¨»á¼û£©ºÍCVE-2025-6204£¨¸ßÑÏÖØË®Æ½´úÂë×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂ룩£¬£¬£¬£¬£¬£¬Ó°Ïì2020ÖÁ2025°æ²úÆ·¡£¡£¡£¡£¡£´ïË÷ϵͳÒÑÓÚ2025Äê8Ô³õÐû²¼²¹¶¡ÐÞ¸´£¬£¬£¬£¬£¬£¬µ«CISAÇ¿µ÷Îó²îÒÑÔÚÒ°Íâ±»ÏÖʵʹÓ㬣¬£¬£¬£¬£¬²¢½«ÆäÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£Æ¾Ö¤2021Äê11ÔÂÐû²¼µÄÔ¼ÊøÐÔÐж¯Ö¸ÁBOD£©22-01£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐëÔÚÈýÖÜÄÚ£¨¼´11ÔÂ18ÈÕǰ£©Íê³ÉÎó²îÐÞ²¹£¬£¬£¬£¬£¬£¬²»È»½«ÃæÁÙÖØ´óÍøÂçÇ徲Σº¦¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬9ÔÂCISA»¹Ôø½«ÁíÒ»DELMIA AprisoÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-5086£©ÁÐÈë×Ô¶¯Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬ÍþвÑо¿Ô±Johannes Ullrich´ËǰÒÑ·¢Ã÷ÆäÊ׸öʹÓü£Ï󡣡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-two-more-actively-exploited-dassault-vulnerabilities/


¾©¹«Íø°²±¸11010802024551ºÅ