RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡

Ðû²¼Ê±¼ä 2024-12-10

1. RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬×Ô2024Äê1ÔÂÆð£¬£¬£¬£¬£¬£¬£¬£¬RedLineÐÅÏ¢ÇÔÈ¡»î¶¯×îÏÈÕë¶ÔʹÓõÁ°æÆóÒµÈí¼þµÄ¶íÂÞ˹ÆóÒµ¡£¡£¡£ÕâЩµÁ°æÈí¼þͨ¹ý¶íÂÞ˹ÔÚÏßÂÛ̳·Ö·¢£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÉÃîµØ½«¶ñÒâÈí¼þαװ³É¿ÉÈÆ¹ýÓªÒµ×Ô¶¯»¯Èí¼þÔÊÐíµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇ̫ͨ¹ý·¢¶ñÒâ°æ±¾µÄHPDxLIB¼¤»îÆ÷¡£¡£¡£ÓëÕýµ±°æ±¾²î±ð£¬£¬£¬£¬£¬£¬£¬£¬¶ñÒâ°æ±¾ÔÚ.NETÖй¹½¨£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ×ÔÊðÃûÖ¤Êé¡£¡£¡£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ù±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩδ¾­ÊÚȨµÄÆóÒµÓªÒµÁ÷³Ì×Ô¶¯»¯Èí¼þÓû§³ÉΪ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ»á¼ÆÂÛ̳ÉÏ·Ö·¢º¬ÓÐRedLineÇÔÈ¡³ÌÐòµÄ¶ñÒ⼤»î³ÌÐò¡£¡£¡£¸Ã³ÌÐòʹÓÃ.NET Reactor¾ÙÐлìÏý£¬£¬£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂë¾­Óɶà²ãѹËõºÍ¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬£¬Òþ²Ø·½·¨ºÜÊDz»Ñ°³£¡£¡£¡£¹¥»÷ÕßÔÚÏà¹ØÂÛ̳ÉÏÐû²¼¶ñÒ⼤»îÆ÷Á´½Ó£¬£¬£¬£¬£¬£¬£¬£¬²¢Ìṩ½ûÓÃÇå¾²Èí¼þÒÔÔËÐ줻îÆ÷µÄÏêϸ˵Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£Óû§±»ÓÕÆ­Óü¤»îÆ÷ÖеĶñÒâ¿âÌæ»»Õýµ±µÄtechsys.dll¿â£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÖ´ÐÐÈí¼þʱͨ¹ýÕýµ±Àú³Ì¼ÓÔØ¶ñÒâ¿â£¬£¬£¬£¬£¬£¬£¬£¬ÔËÐÐÇÔÈ¡³ÌÐò¡£¡£¡£RedLineÇÔÈ¡³ÌÐò×Ô2020ÄêÍ·±ã»îÔ¾£¬£¬£¬£¬£¬£¬£¬£¬ÄÜ´ÓϵͳÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Æ¾Ö¤¡¢cookie¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢ÐÅÓÿ¨Êý¾ÝºÍ¼ÓÃÜÇ®°üµÈ¡£¡£¡£


https://securityaffairs.com/171771/cyber-crime/redline-info-stealer-campaign-targets-russian-businesses.html


2. °²ÄÈÑÅ¿ËÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬31ÍòÓ໼ÕßÊý¾Ýй¶


12ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬°²ÄÈÑÅ¿ËÒ½ÔºÊÇÒ»¼ÒλÓÚÂíÈøÖîÈûÖݵķÇÓªÀûÐÔÉçÇøÒ½Ôº£¬£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ83ÕÅ´²Î»¡¢200ÃûҽʦºÍ1200ÃûÊÂÇéÖ°Ô±£¬£¬£¬£¬£¬£¬£¬£¬ÎªÍâµØ×¡ÃñÌṩ»ù±¾Ò½ÁÆÐ§ÀÍ¡£¡£¡£2023Äê12ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÒ½ÔºÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý310,000Ãû»¼ÕßµÄÃô¸Ð¿µ½¡Êý¾Ý±»Ð¹Â¶¡£¡£¡£Ò½ÔºÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬£¬ÏÂÏßϵͳ²¢ÏòÖ´·¨²¿·Ö·¢³ö¾¯±¨¡£¡£¡£2024Äê1ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¡°Money Message¡±ÀÕË÷Èí¼þÍÅ»ï×îÏȹûÕæÀÕË÷¸ÃÒ½Ôº£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍøÀÕË÷ÍøÕ¾ÉÏй¶Á˾ݳƴÓÒ½ÔºÇÔÈ¡µÄÊý¾ÝÑù±¾¡£¡£¡£Ò½ÔºÖÎÀíÖ°Ô±²¢Î´ÓëÍþвÐÐΪÕß̸ÅУ¬£¬£¬£¬£¬£¬£¬£¬×îÖÕÓÚ1ÔÂ26ÈÕÐû²¼ÁËËùÓÐÊý¾Ý¡£¡£¡£¾­Óɳ¹µ×µÄȡ֤ÊӲ죬£¬£¬£¬£¬£¬£¬£¬Ò½ÔºÓÚ2024Äê11ÔÂ5ÈÕÍê³ÉÁ˶Ôй¶Êý¾ÝµÄÉó²é£¬£¬£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éú³Ýͳ¼ÆÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢²ÆÎñÐÅÏ¢µÈ¡£¡£¡£Ö»¹ÜҽԺûÓм£ÏóÅú×¢ÕâÆðÊÂÎñµ¼ÖÂÁËÈκÎڲƭÐÐΪ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÕÕ¾ÉÌáÐÑÔ±¹¤ºÍ»¼ÕßÒª¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌṩÁËΪÆÚ24¸öÔµÄÉí·Ý±£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/anna-jaques-hospital-ransomware-breach-exposed-data-of-300k-patients/


3. ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÔâÊÜÀÕË÷Èí¼þ¹¥»÷


12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÕýÃæÁÙÒ»ÆðÒ»Á¬µÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÒÑÏòͶ×ÊÕß°ü¹Ü£¬£¬£¬£¬£¬£¬£¬£¬ÆäÒªº¦ÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£¡£ÎªÁ˰ü¹ÜÔËÓªºÍСÎÒ˽¼ÒÊý¾ÝµÄÇå¾²£¬£¬£¬£¬£¬£¬£¬£¬ElectricaÒÑÆô¶¯ÄÚ²¿ÍøÂçÇ徲ЭÒ飬£¬£¬£¬£¬£¬£¬£¬²¢Óë¹ú¼ÒÍøÂçÇå¾²»ú¹¹ÏàÖú£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚʶ±ð¹¥»÷Ô´²¢¿ØÖÆÆäÓ°Ïì¡£¡£¡£ElectricaÊÇÂÞÂíÄáÑǵçÁ¦ÅäËͺ͹©Ó¦Êг¡µÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬£¬£¬ÎªÁè¼Ý380Íò¿Í»§ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ²¼¼ÓÀÕË¹ÌØºÍÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊС£¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼Í¨Öª£¬£¬£¬£¬£¬£¬£¬£¬¼û¸æÍ¶×ÊÕßÕýÔÚ±¬·¢µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ËùÓÐÌØ¶¨µÄÏìӦЭÒéÒÑÆ¾Ö¤ÄÚ²¿³ÌÐòºÍÏÖÐйæÔòÆô¶¯¡£¡£¡£ÂÞÂíÄáÑÇÄÜÔ´²¿Ö¤Êµ¸Ã¹«Ë¾È·ÊµÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷²¢Î´Ó°Ïì¸Ã¹«Ë¾µÄSCADAϵͳ¡£¡£¡£Ç鱨ÆÊÎöÈËÊ¿ÒÔΪ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÏ®»÷¿ÉÄÜÊÇÇ×¶íÕûÌå·¢¶¯µÄ£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÂÞÂíÄáÑÇÒò¶íÂÞË¹ÉæÏÓ¸ÉÔ¤¶ø×÷·Ï×Üͳѡ¾Ù¡£¡£¡£ÂÞÂíÄáÑÇÇ鱨¾Ö͸¶£¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý85,000´ÎÍøÂç¹¥»÷Õë¶Ô¸Ã¹úÑ¡¾Ùϵͳ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÄªË¹¿Æ·ñ¶¨¶Ô´Ë¾ÙÐÐÈκι¥»÷¡£¡£¡£Electrica Group½¨Òé¿Í»§¶ÔDZÔÚµÄÍøÂç´¹ÂÚʵÑéºÍ¿ÉÒÉͨѶ¼á³ÖСÐÄ¡£¡£¡£


https://securityaffairs.com/171832/hacking/electrica-group-ransomware-attack.html


4. ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔâÀÕË÷Èí¼þ¹¥»÷


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔÚ11ÔÂ21ÈÕÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÈÅÂÒÁËÆäÔËÓª²¢µ¼Ö²¿·Öϵͳ¹Ø±Õ¡£¡£¡£Artivion×ܲ¿Î»ÓÚÑÇÌØÀ¼´ó£¬£¬£¬£¬£¬£¬£¬£¬È«ÇòÔ±¹¤Áè¼Ý1,250Ãû£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ100¶à¸ö¹ú¼ÒÉèÓÐÏúÊÛ´ú±í£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÑÇÌØÀ¼´ó¡¢°Â˹͡ºÍºÚÐÀ¸ùÉèÓÐÖÆÔ칤³§¡£¡£¡£¾ÝArtivionÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼ÓÃÜÁËÆä²¿·Öϵͳ²¢ÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÔËÓª¡¢¶©µ¥´¦Öóͷ£ºÍÔËÊäÖÐÖ¹ÎÊÌâÒÑ»ù±¾»ñµÃ½â¾ö¡£¡£¡£ËäÈ»ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬£¬µ«ArtivionÒÔΪ¿ÉÄܻᱬ·¢°ü¹Üδº­¸ÇµÄÌØÊâÓöÈ¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÒ²ÔâÓöÁ˶àÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Boston Children's Health PhysiciansºÍUMCÒ½ÁÆÏµÍ³£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°È¥ÄêÊ¥µ®½ÚÔâÊܹ¥»÷µÄ°²ÄÈÑÅ¿ËÒ½Ôº£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷¶¼µ¼ÖÂÁËÃô¸ÐÊý¾ÝµÄй¶ºÍÔËÓªµÄÖÐÖ¹¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/


5. ΢Èíɨ³ý¶ÔUbisoftÓÎÏ·Windows 24H2¸üÐÂÏÞÖÆ


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÒѲ¿·Öɨ³ýÁ˶ÔWindows 24H2¸üÐÂÓëijЩUbisoftÓÎϷϵͳ¼æÈÝÐÔµÄÏÞÖÆ¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¡¶´Ì¿ÍÐÅÌõ¡·¡¢¡¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÈÓÎÏ·ÔÚWindows 11 24H2Ô¤ÀÀ°æÖзºÆðÍ߽⡢ËÀ»úºÍÒôƵÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬Î¢Èí×èÖ¹ÁË×°ÓÐÕâЩÓÎÏ·µÄPC¾ÙÐÐWindows 24H2Éý¼¶¡£¡£¡£Óû§·´ÏìÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬ÓÎÏ·±£´æ²»ÎȹÌÇéÐΣ¬£¬£¬£¬£¬£¬£¬£¬ÈçÆô¶¯ºóÁ¬Ã¦±ÀÀ£»£»£»£»ò¼ÓÔØÉúÑÄÓÎÏ·ºó¼¸·ÖÖÓÄÚÍ߽⡢¶³½á»òºÚÆÁ¡£¡£¡£Îª±ÜÃâÎÊÌâÀ©É¢£¬£¬£¬£¬£¬£¬£¬£¬Î¢Èí½ÓÄÉÁ˱£»£»£»£»¤²½·¥¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚUbisoftÐû²¼ÔÝʱÐÞ²¹³ÌÐò»º½âÍß½âÎÊÌâºó£¬£¬£¬£¬£¬£¬£¬£¬Î¢Èíɨ³ýÁ˶ԡ¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÄÉý¼¶ÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬£¬µ«½¨ÒéÍæ¼ÒÔÚÎÊÌâ½â¾öǰ²»ÒªÊ¹ÓÃWindows 11×°ÖÃÖúÊÖ»òýÌ彨É蹤¾ßÉý¼¶ÊÜÓ°ÏìPC¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬£¬Î¢Èí»¹Ðû²¼×èÖ¹×°ÖÃÁ˹ýʱGoogle Workspace SyncµÄϵͳºÍ¾ßÓв»¼æÈÝÓ¢ÌØ¶ûÖÇÄÜÉùÒôÊÖÒÕÒôƵÇý¶¯³ÌÐòµÄ×°±¸¾ÙÐÐWindows 11 24H2¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩ»áµ¼ÖÂOutlookÆô¶¯ÎÊÌâºÍÀ¶ÆÁËÀ»úÎÊÌâ¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/ubisoft-fixes-windows-11-24h2-conflicts-causing-game-crashes/


6. ³¯ÏʺڿÍCitrine Sleet͵ȡRadiant Capital 5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯½ðÈÚ(DeFi)ƽ̨Radiant CapitalÔÚ10ÔÂ16ÈÕÐû²¼ÆäϵͳÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ¡£¡£¡£ÔÚMandiantÍøÂçÇ徲ר¼ÒµÄЭÖúÏ£¬£¬£¬£¬£¬£¬£¬£¬Radiant¶Ô´Ë´Î¹¥»÷¾ÙÐÐÁËÉîÈëÊӲ죬£¬£¬£¬£¬£¬£¬£¬²¢È·¶¨Ä»ºóºÚÊÖΪ³¯Ïʹú¼ÒÁ¥ÊôºÚ¿Í×éÖ¯Citrine Sleet£¨ÓÖÃû¡°UNC4736¡±ºÍ¡°AppleJeus¡±£©¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýTelegram·¢ËÍð³äǰ³Ð°üÉ̵ĶñÒâÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­¿ª·¢Ö°Ô±ÏÂÔØ°üÀ¨¡°InletDrift¡±macOS¶ñÒâÈí¼þ¸ºÔصÄZIPÎļþ£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÊÜѬȾµÄ×°±¸ÉϽ¨ÉèºóÃÅ¡£¡£¡£ºÚ¿ÍʹÓÃͨÀýµÄ¶àÖØÊðÃûÊ¿³Ì£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÉúÒâ¹ýʧµÄÃûÒåÍøÂçÓÐÓÃÊðÃû£¬£¬£¬£¬£¬£¬£¬£¬²¢´ÓArbitrumºÍ±Ò°²ÖÇÄÜÁ´(BSC)Êг¡ÇÔÈ¡×ʽ𡣡£¡£´Ë´Î¹¥»÷Éè¼ÆÓÅÒ죬£¬£¬£¬£¬£¬£¬£¬ÈƹýÁËÓ²¼þÇ®°üÇå¾²ºÍ¶à²ãÑéÖ¤£¬£¬£¬£¬£¬£¬£¬£¬ÉúÒâÔÚÊÖ¶¯ºÍÄ£Äâ¼ì²éÖп´ÆðÀ´¶¼ºÜÕý³££¬£¬£¬£¬£¬£¬£¬£¬ÏÔʾ³ö¼«¸ßµÄÖØ´óÐÔ¡£¡£¡£RadiantÕýÔÚÓëÃÀ¹úÖ´·¨²¿·ÖºÍzeroShadowÏàÖú£¬£¬£¬£¬£¬£¬£¬£¬×·»Ø¾¡¿ÉÄܶàµÄ±»µÁ×ʽ𣬣¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ÐèÒª¸üǿʢµÄ×°±¸¼¶½â¾ö¼Æ»®À´ÔöÇ¿ÉúÒâÇå¾²ÐÔ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers