RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡
Ðû²¼Ê±¼ä 2024-12-101. RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡
12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬×Ô2024Äê1ÔÂÆð£¬£¬£¬£¬£¬£¬£¬RedLineÐÅÏ¢ÇÔÈ¡»î¶¯×îÏÈÕë¶ÔʹÓõÁ°æÆóÒµÈí¼þµÄ¶íÂÞ˹ÆóÒµ¡£¡£¡£¡£¡£¡£ÕâЩµÁ°æÈí¼þͨ¹ý¶íÂÞ˹ÔÚÏßÂÛ̳·Ö·¢£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÉÃîµØ½«¶ñÒâÈí¼þαװ³É¿ÉÈÆ¹ýÓªÒµ×Ô¶¯»¯Èí¼þÔÊÐíµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇ̫ͨ¹ý·¢¶ñÒâ°æ±¾µÄHPDxLIB¼¤»îÆ÷¡£¡£¡£¡£¡£¡£ÓëÕýµ±°æ±¾²î±ð£¬£¬£¬£¬£¬£¬£¬¶ñÒâ°æ±¾ÔÚ.NETÖй¹½¨£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ×ÔÊðÃûÖ¤Êé¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ù±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÕâЩδ¾ÊÚȨµÄÆóÒµÓªÒµÁ÷³Ì×Ô¶¯»¯Èí¼þÓû§³ÉΪ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ»á¼ÆÂÛ̳ÉÏ·Ö·¢º¬ÓÐRedLineÇÔÈ¡³ÌÐòµÄ¶ñÒ⼤»î³ÌÐò¡£¡£¡£¡£¡£¡£¸Ã³ÌÐòʹÓÃ.NET Reactor¾ÙÐлìÏý£¬£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂë¾Óɶà²ãѹËõºÍ¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬Òþ²Ø·½·¨ºÜÊDz»Ñ°³£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÏà¹ØÂÛ̳ÉÏÐû²¼¶ñÒ⼤»îÆ÷Á´½Ó£¬£¬£¬£¬£¬£¬£¬²¢Ìṩ½ûÓÃÇå¾²Èí¼þÒÔÔËÐ줻îÆ÷µÄÏêϸ˵Ã÷£¬£¬£¬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£Óû§±»ÓÕÆÓü¤»îÆ÷ÖеĶñÒâ¿âÌæ»»Õýµ±µÄtechsys.dll¿â£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÖ´ÐÐÈí¼þʱͨ¹ýÕýµ±Àú³Ì¼ÓÔØ¶ñÒâ¿â£¬£¬£¬£¬£¬£¬£¬ÔËÐÐÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£RedLineÇÔÈ¡³ÌÐò×Ô2020ÄêÍ·±ã»îÔ¾£¬£¬£¬£¬£¬£¬£¬ÄÜ´ÓϵͳÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨Æ¾Ö¤¡¢cookie¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢ÐÅÓÿ¨Êý¾ÝºÍ¼ÓÃÜÇ®°üµÈ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/171771/cyber-crime/redline-info-stealer-campaign-targets-russian-businesses.html
2. °²ÄÈÑÅ¿ËÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬31ÍòÓ໼ÕßÊý¾Ýй¶
12ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬°²ÄÈÑÅ¿ËÒ½ÔºÊÇÒ»¼ÒλÓÚÂíÈøÖîÈûÖݵķÇÓªÀûÐÔÉçÇøÒ½Ôº£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ83ÕÅ´²Î»¡¢200ÃûҽʦºÍ1200ÃûÊÂÇéÖ°Ô±£¬£¬£¬£¬£¬£¬£¬ÎªÍâµØ×¡ÃñÌṩ»ù±¾Ò½ÁÆÐ§ÀÍ¡£¡£¡£¡£¡£¡£2023Äê12ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬¸ÃÒ½ÔºÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý310,000Ãû»¼ÕßµÄÃô¸Ð¿µ½¡Êý¾Ý±»Ð¹Â¶¡£¡£¡£¡£¡£¡£Ò½ÔºÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬ÏÂÏßϵͳ²¢ÏòÖ´·¨²¿·Ö·¢³ö¾¯±¨¡£¡£¡£¡£¡£¡£2024Äê1ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬¡°Money Message¡±ÀÕË÷Èí¼þÍÅ»ï×îÏȹûÕæÀÕË÷¸ÃÒ½Ôº£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍøÀÕË÷ÍøÕ¾ÉÏй¶Á˾ݳƴÓÒ½ÔºÇÔÈ¡µÄÊý¾ÝÑù±¾¡£¡£¡£¡£¡£¡£Ò½ÔºÖÎÀíÖ°Ô±²¢Î´ÓëÍþвÐÐΪÕß̸ÅУ¬£¬£¬£¬£¬£¬£¬×îÖÕÓÚ1ÔÂ26ÈÕÐû²¼ÁËËùÓÐÊý¾Ý¡£¡£¡£¡£¡£¡£¾Óɳ¹µ×µÄȡ֤ÊӲ죬£¬£¬£¬£¬£¬£¬Ò½ÔºÓÚ2024Äê11ÔÂ5ÈÕÍê³ÉÁ˶Ôй¶Êý¾ÝµÄÉó²é£¬£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éú³Ýͳ¼ÆÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢²ÆÎñÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£Ö»¹ÜҽԺûÓм£ÏóÅú×¢ÕâÆðÊÂÎñµ¼ÖÂÁËÈκÎÚ²ÆÐÐΪ£¬£¬£¬£¬£¬£¬£¬µ«ÕÕ¾ÉÌáÐÑÔ±¹¤ºÍ»¼ÕßÒª¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬²¢ÌṩÁËΪÆÚ24¸öÔµÄÉí·Ý±£»£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/anna-jaques-hospital-ransomware-breach-exposed-data-of-300k-patients/
3. ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÔâÊÜÀÕË÷Èí¼þ¹¥»÷
12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÕýÃæÁÙÒ»ÆðÒ»Á¬µÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÒÑÏòͶ×ÊÕß°ü¹Ü£¬£¬£¬£¬£¬£¬£¬ÆäÒªº¦ÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£ÎªÁ˰ü¹ÜÔËÓªºÍСÎÒ˽¼ÒÊý¾ÝµÄÇå¾²£¬£¬£¬£¬£¬£¬£¬ElectricaÒÑÆô¶¯ÄÚ²¿ÍøÂçÇå¾²ÐÒ飬£¬£¬£¬£¬£¬£¬²¢Óë¹ú¼ÒÍøÂçÇå¾²»ú¹¹ÏàÖú£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚʶ±ð¹¥»÷Ô´²¢¿ØÖÆÆäÓ°Ïì¡£¡£¡£¡£¡£¡£ElectricaÊÇÂÞÂíÄáÑǵçÁ¦ÅäËͺ͹©Ó¦Êг¡µÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬£¬ÎªÁè¼Ý380Íò¿Í»§ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ²¼¼ÓÀÕË¹ÌØºÍÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊС£¡£¡£¡£¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼Í¨Öª£¬£¬£¬£¬£¬£¬£¬¼û¸æÍ¶×ÊÕßÕýÔÚ±¬·¢µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ËùÓÐÌØ¶¨µÄÏìÓ¦ÐÒéÒÑÆ¾Ö¤ÄÚ²¿³ÌÐòºÍÏÖÐйæÔòÆô¶¯¡£¡£¡£¡£¡£¡£ÂÞÂíÄáÑÇÄÜÔ´²¿Ö¤Êµ¸Ã¹«Ë¾È·ÊµÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷²¢Î´Ó°Ïì¸Ã¹«Ë¾µÄSCADAϵͳ¡£¡£¡£¡£¡£¡£Ç鱨ÆÊÎöÈËÊ¿ÒÔΪ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÏ®»÷¿ÉÄÜÊÇÇ×¶íÕûÌå·¢¶¯µÄ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÂÞÂíÄáÑÇÒò¶íÂÞË¹ÉæÏÓ¸ÉÔ¤¶ø×÷·Ï×Üͳѡ¾Ù¡£¡£¡£¡£¡£¡£ÂÞÂíÄáÑÇÇ鱨¾Ö͸¶£¬£¬£¬£¬£¬£¬£¬Áè¼Ý85,000´ÎÍøÂç¹¥»÷Õë¶Ô¸Ã¹úÑ¡¾Ùϵͳ£¬£¬£¬£¬£¬£¬£¬µ«ÄªË¹¿Æ·ñ¶¨¶Ô´Ë¾ÙÐÐÈκι¥»÷¡£¡£¡£¡£¡£¡£Electrica Group½¨Òé¿Í»§¶ÔDZÔÚµÄÍøÂç´¹ÂÚʵÑéºÍ¿ÉÒÉͨѶ¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/171832/hacking/electrica-group-ransomware-attack.html
4. ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔâÀÕË÷Èí¼þ¹¥»÷
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔÚ11ÔÂ21ÈÕÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÈÅÂÒÁËÆäÔËÓª²¢µ¼Ö²¿·Öϵͳ¹Ø±Õ¡£¡£¡£¡£¡£¡£Artivion×ܲ¿Î»ÓÚÑÇÌØÀ¼´ó£¬£¬£¬£¬£¬£¬£¬È«ÇòÔ±¹¤Áè¼Ý1,250Ãû£¬£¬£¬£¬£¬£¬£¬ÔÚ100¶à¸ö¹ú¼ÒÉèÓÐÏúÊÛ´ú±í£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÑÇÌØÀ¼´ó¡¢°Â˹͡ºÍºÚÐÀ¸ùÉèÓÐÖÆÔ칤³§¡£¡£¡£¡£¡£¡£¾ÝArtivionÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼ÓÃÜÁËÆä²¿·Öϵͳ²¢ÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÔËÓª¡¢¶©µ¥´¦Öóͷ£ºÍÔËÊäÖÐÖ¹ÎÊÌâÒÑ»ù±¾»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£ËäÈ»ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬µ«ArtivionÒÔΪ¿ÉÄܻᱬ·¢°ü¹Üδº¸ÇµÄÌØÊâÓöȡ£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÒ²ÔâÓöÁ˶àÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬°üÀ¨Boston Children's Health PhysiciansºÍUMCÒ½ÁÆÏµÍ³£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°È¥ÄêÊ¥µ®½ÚÔâÊܹ¥»÷µÄ°²ÄÈÑÅ¿ËÒ½Ôº£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷¶¼µ¼ÖÂÁËÃô¸ÐÊý¾ÝµÄй¶ºÍÔËÓªµÄÖÐÖ¹¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/
5. ΢Èíɨ³ý¶ÔUbisoftÓÎÏ·Windows 24H2¸üÐÂÏÞÖÆ
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÒѲ¿·Öɨ³ýÁ˶ÔWindows 24H2¸üÐÂÓëijЩUbisoftÓÎϷϵͳ¼æÈÝÐÔµÄÏÞÖÆ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¡¶´Ì¿ÍÐÅÌõ¡·¡¢¡¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ±ß½®¡·µÈÓÎÏ·ÔÚWindows 11 24H2Ô¤ÀÀ°æÖзºÆðÍ߽⡢ËÀ»úºÍÒôƵÎÊÌ⣬£¬£¬£¬£¬£¬£¬Î¢Èí×èÖ¹ÁË×°ÓÐÕâЩÓÎÏ·µÄPC¾ÙÐÐWindows 24H2Éý¼¶¡£¡£¡£¡£¡£¡£Óû§·´ÏìÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÓÎÏ·±£´æ²»ÎȹÌÇéÐΣ¬£¬£¬£¬£¬£¬£¬ÈçÆô¶¯ºóÁ¬Ã¦±ÀÀ£»£»£»£»£»£»ò¼ÓÔØÉúÑÄÓÎÏ·ºó¼¸·ÖÖÓÄÚÍ߽⡢¶³½á»òºÚÆÁ¡£¡£¡£¡£¡£¡£Îª±ÜÃâÎÊÌâÀ©É¢£¬£¬£¬£¬£¬£¬£¬Î¢Èí½ÓÄÉÁ˱£»£»£»£»£»£»¤²½·¥¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÔÚUbisoftÐû²¼ÔÝʱÐÞ²¹³ÌÐò»º½âÍß½âÎÊÌâºó£¬£¬£¬£¬£¬£¬£¬Î¢Èíɨ³ýÁ˶ԡ¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ±ß½®¡·µÄÉý¼¶ÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬µ«½¨ÒéÍæ¼ÒÔÚÎÊÌâ½â¾öǰ²»ÒªÊ¹ÓÃWindows 11×°ÖÃÖúÊÖ»òýÌ彨É蹤¾ßÉý¼¶ÊÜÓ°ÏìPC¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Î¢Èí»¹Ðû²¼×èÖ¹×°ÖÃÁ˹ýʱGoogle Workspace SyncµÄϵͳºÍ¾ßÓв»¼æÈÝÓ¢ÌØ¶ûÖÇÄÜÉùÒôÊÖÒÕÒôƵÇý¶¯³ÌÐòµÄ×°±¸¾ÙÐÐWindows 11 24H2¸üУ¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩ»áµ¼ÖÂOutlookÆô¶¯ÎÊÌâºÍÀ¶ÆÁËÀ»úÎÊÌâ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/ubisoft-fixes-windows-11-24h2-conflicts-causing-game-crashes/
6. ³¯ÏʺڿÍCitrine Sleet͵ȡRadiant Capital 5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯½ðÈÚ(DeFi)ƽ̨Radiant CapitalÔÚ10ÔÂ16ÈÕÐû²¼ÆäϵͳÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ¡£¡£¡£¡£¡£¡£ÔÚMandiantÍøÂçÇ徲ר¼ÒµÄÐÖúÏ£¬£¬£¬£¬£¬£¬£¬Radiant¶Ô´Ë´Î¹¥»÷¾ÙÐÐÁËÉîÈëÊӲ죬£¬£¬£¬£¬£¬£¬²¢È·¶¨Ä»ºóºÚÊÖΪ³¯Ïʹú¼ÒÁ¥ÊôºÚ¿Í×éÖ¯Citrine Sleet£¨ÓÖÃû¡°UNC4736¡±ºÍ¡°AppleJeus¡±£©¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýTelegram·¢ËÍð³äǰ³Ð°üÉ̵ĶñÒâÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬ÓÕÆ¿ª·¢Ö°Ô±ÏÂÔØ°üÀ¨¡°InletDrift¡±macOS¶ñÒâÈí¼þ¸ºÔصÄZIPÎļþ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÊÜѬȾµÄ×°±¸ÉϽ¨ÉèºóÃÅ¡£¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃͨÀýµÄ¶àÖØÊðÃûÊ¿³Ì£¬£¬£¬£¬£¬£¬£¬ÒÔÉúÒâ¹ýʧµÄÃûÒåÍøÂçÓÐÓÃÊðÃû£¬£¬£¬£¬£¬£¬£¬²¢´ÓArbitrumºÍ±Ò°²ÖÇÄÜÁ´(BSC)Êг¡ÇÔÈ¡×ʽ𡣡£¡£¡£¡£¡£´Ë´Î¹¥»÷Éè¼ÆÓÅÒ죬£¬£¬£¬£¬£¬£¬ÈƹýÁËÓ²¼þÇ®°üÇå¾²ºÍ¶à²ãÑéÖ¤£¬£¬£¬£¬£¬£¬£¬ÉúÒâÔÚÊÖ¶¯ºÍÄ£Äâ¼ì²éÖп´ÆðÀ´¶¼ºÜÕý³££¬£¬£¬£¬£¬£¬£¬ÏÔʾ³ö¼«¸ßµÄÖØ´óÐÔ¡£¡£¡£¡£¡£¡£RadiantÕýÔÚÓëÃÀ¹úÖ´·¨²¿·ÖºÍzeroShadowÏàÖú£¬£¬£¬£¬£¬£¬£¬×·»Ø¾¡¿ÉÄܶàµÄ±»µÁ×ʽ𣬣¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ÐèÒª¸üǿʢµÄ×°±¸¼¶½â¾ö¼Æ»®À´ÔöÇ¿ÉúÒâÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers


¾©¹«Íø°²±¸11010802024551ºÅ