RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡

Ðû²¼Ê±¼ä 2024-12-10

1. RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬×Ô2024Äê1ÔÂÆð£¬£¬£¬£¬£¬£¬£¬RedLineÐÅÏ¢ÇÔÈ¡»î¶¯×îÏÈÕë¶ÔʹÓõÁ°æÆóÒµÈí¼þµÄ¶íÂÞ˹ÆóÒµ¡£¡£¡£¡£¡£ÕâЩµÁ°æÈí¼þͨ¹ý¶íÂÞ˹ÔÚÏßÂÛ̳·Ö·¢£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÉÃîµØ½«¶ñÒâÈí¼þαװ³É¿ÉÈÆ¹ýÓªÒµ×Ô¶¯»¯Èí¼þÔÊÐíµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇ̫ͨ¹ý·¢¶ñÒâ°æ±¾µÄHPDxLIB¼¤»îÆ÷¡£¡£¡£¡£¡£ÓëÕýµ±°æ±¾²î±ð£¬£¬£¬£¬£¬£¬£¬¶ñÒâ°æ±¾ÔÚ.NETÖй¹½¨£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ×ÔÊðÃûÖ¤Êé¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ù±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÕâЩδ¾­ÊÚȨµÄÆóÒµÓªÒµÁ÷³Ì×Ô¶¯»¯Èí¼þÓû§³ÉΪ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ»á¼ÆÂÛ̳ÉÏ·Ö·¢º¬ÓÐRedLineÇÔÈ¡³ÌÐòµÄ¶ñÒ⼤»î³ÌÐò¡£¡£¡£¡£¡£¸Ã³ÌÐòʹÓÃ.NET Reactor¾ÙÐлìÏý£¬£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂë¾­Óɶà²ãѹËõºÍ¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬Òþ²Ø·½·¨ºÜÊDz»Ñ°³£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÏà¹ØÂÛ̳ÉÏÐû²¼¶ñÒ⼤»îÆ÷Á´½Ó£¬£¬£¬£¬£¬£¬£¬²¢Ìṩ½ûÓÃÇå¾²Èí¼þÒÔÔËÐ줻îÆ÷µÄÏêϸ˵Ã÷£¬£¬£¬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£¡£Óû§±»ÓÕÆ­Óü¤»îÆ÷ÖеĶñÒâ¿âÌæ»»Õýµ±µÄtechsys.dll¿â£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÖ´ÐÐÈí¼þʱͨ¹ýÕýµ±Àú³Ì¼ÓÔØ¶ñÒâ¿â£¬£¬£¬£¬£¬£¬£¬ÔËÐÐÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£RedLineÇÔÈ¡³ÌÐò×Ô2020ÄêÍ·±ã»îÔ¾£¬£¬£¬£¬£¬£¬£¬ÄÜ´ÓϵͳÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨Æ¾Ö¤¡¢cookie¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢ÐÅÓÿ¨Êý¾ÝºÍ¼ÓÃÜÇ®°üµÈ¡£¡£¡£¡£¡£


https://securityaffairs.com/171771/cyber-crime/redline-info-stealer-campaign-targets-russian-businesses.html


2. °²ÄÈÑÅ¿ËÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬31ÍòÓ໼ÕßÊý¾Ýй¶


12ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬°²ÄÈÑÅ¿ËÒ½ÔºÊÇÒ»¼ÒλÓÚÂíÈøÖîÈûÖݵķÇÓªÀûÐÔÉçÇøÒ½Ôº£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ83ÕÅ´²Î»¡¢200ÃûҽʦºÍ1200ÃûÊÂÇéÖ°Ô±£¬£¬£¬£¬£¬£¬£¬ÎªÍâµØ×¡ÃñÌṩ»ù±¾Ò½ÁÆÐ§ÀÍ¡£¡£¡£¡£¡£2023Äê12ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬¸ÃÒ½ÔºÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý310,000Ãû»¼ÕßµÄÃô¸Ð¿µ½¡Êý¾Ý±»Ð¹Â¶¡£¡£¡£¡£¡£Ò½ÔºÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬ÏÂÏßϵͳ²¢ÏòÖ´·¨²¿·Ö·¢³ö¾¯±¨¡£¡£¡£¡£¡£2024Äê1ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬¡°Money Message¡±ÀÕË÷Èí¼þÍÅ»ï×îÏȹûÕæÀÕË÷¸ÃÒ½Ôº£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍøÀÕË÷ÍøÕ¾ÉÏй¶Á˾ݳƴÓÒ½ÔºÇÔÈ¡µÄÊý¾ÝÑù±¾¡£¡£¡£¡£¡£Ò½ÔºÖÎÀíÖ°Ô±²¢Î´ÓëÍþвÐÐΪÕß̸ÅУ¬£¬£¬£¬£¬£¬£¬×îÖÕÓÚ1ÔÂ26ÈÕÐû²¼ÁËËùÓÐÊý¾Ý¡£¡£¡£¡£¡£¾­Óɳ¹µ×µÄȡ֤ÊӲ죬£¬£¬£¬£¬£¬£¬Ò½ÔºÓÚ2024Äê11ÔÂ5ÈÕÍê³ÉÁ˶Ôй¶Êý¾ÝµÄÉó²é£¬£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éú³Ýͳ¼ÆÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢²ÆÎñÐÅÏ¢µÈ¡£¡£¡£¡£¡£Ö»¹ÜҽԺûÓм£ÏóÅú×¢ÕâÆðÊÂÎñµ¼ÖÂÁËÈκÎڲƭÐÐΪ£¬£¬£¬£¬£¬£¬£¬µ«ÕÕ¾ÉÌáÐÑÔ±¹¤ºÍ»¼ÕßÒª¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬²¢ÌṩÁËΪÆÚ24¸öÔµÄÉí·Ý±£»£»£»£» £»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/anna-jaques-hospital-ransomware-breach-exposed-data-of-300k-patients/


3. ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÔâÊÜÀÕË÷Èí¼þ¹¥»÷


12ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÕýÃæÁÙÒ»ÆðÒ»Á¬µÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÒÑÏòͶ×ÊÕß°ü¹Ü£¬£¬£¬£¬£¬£¬£¬ÆäÒªº¦ÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¡£ÎªÁ˰ü¹ÜÔËÓªºÍСÎÒ˽¼ÒÊý¾ÝµÄÇå¾²£¬£¬£¬£¬£¬£¬£¬ElectricaÒÑÆô¶¯ÄÚ²¿ÍøÂçÇ徲ЭÒ飬£¬£¬£¬£¬£¬£¬²¢Óë¹ú¼ÒÍøÂçÇå¾²»ú¹¹ÏàÖú£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚʶ±ð¹¥»÷Ô´²¢¿ØÖÆÆäÓ°Ïì¡£¡£¡£¡£¡£ElectricaÊÇÂÞÂíÄáÑǵçÁ¦ÅäËͺ͹©Ó¦Êг¡µÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬£¬ÎªÁè¼Ý380Íò¿Í»§ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ²¼¼ÓÀÕË¹ÌØºÍÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊС£¡£¡£¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼Í¨Öª£¬£¬£¬£¬£¬£¬£¬¼û¸æÍ¶×ÊÕßÕýÔÚ±¬·¢µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ËùÓÐÌØ¶¨µÄÏìӦЭÒéÒÑÆ¾Ö¤ÄÚ²¿³ÌÐòºÍÏÖÐйæÔòÆô¶¯¡£¡£¡£¡£¡£ÂÞÂíÄáÑÇÄÜÔ´²¿Ö¤Êµ¸Ã¹«Ë¾È·ÊµÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷²¢Î´Ó°Ïì¸Ã¹«Ë¾µÄSCADAϵͳ¡£¡£¡£¡£¡£Ç鱨ÆÊÎöÈËÊ¿ÒÔΪ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÏ®»÷¿ÉÄÜÊÇÇ×¶íÕûÌå·¢¶¯µÄ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÂÞÂíÄáÑÇÒò¶íÂÞË¹ÉæÏÓ¸ÉÔ¤¶ø×÷·Ï×Üͳѡ¾Ù¡£¡£¡£¡£¡£ÂÞÂíÄáÑÇÇ鱨¾Ö͸¶£¬£¬£¬£¬£¬£¬£¬Áè¼Ý85,000´ÎÍøÂç¹¥»÷Õë¶Ô¸Ã¹úÑ¡¾Ùϵͳ£¬£¬£¬£¬£¬£¬£¬µ«ÄªË¹¿Æ·ñ¶¨¶Ô´Ë¾ÙÐÐÈκι¥»÷¡£¡£¡£¡£¡£Electrica Group½¨Òé¿Í»§¶ÔDZÔÚµÄÍøÂç´¹ÂÚʵÑéºÍ¿ÉÒÉͨѶ¼á³ÖСÐÄ¡£¡£¡£¡£¡£


https://securityaffairs.com/171832/hacking/electrica-group-ransomware-attack.html


4. ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔâÀÕË÷Èí¼þ¹¥»÷


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔÚ11ÔÂ21ÈÕÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÈÅÂÒÁËÆäÔËÓª²¢µ¼Ö²¿·Öϵͳ¹Ø±Õ¡£¡£¡£¡£¡£Artivion×ܲ¿Î»ÓÚÑÇÌØÀ¼´ó£¬£¬£¬£¬£¬£¬£¬È«ÇòÔ±¹¤Áè¼Ý1,250Ãû£¬£¬£¬£¬£¬£¬£¬ÔÚ100¶à¸ö¹ú¼ÒÉèÓÐÏúÊÛ´ú±í£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÑÇÌØÀ¼´ó¡¢°Â˹͡ºÍºÚÐÀ¸ùÉèÓÐÖÆÔ칤³§¡£¡£¡£¡£¡£¾ÝArtivionÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼ÓÃÜÁËÆä²¿·Öϵͳ²¢ÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÔËÓª¡¢¶©µ¥´¦Öóͷ£ºÍÔËÊäÖÐÖ¹ÎÊÌâÒÑ»ù±¾»ñµÃ½â¾ö¡£¡£¡£¡£¡£ËäÈ»ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬µ«ArtivionÒÔΪ¿ÉÄܻᱬ·¢°ü¹Üδº­¸ÇµÄÌØÊâÓöÈ¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÒ²ÔâÓöÁ˶àÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬°üÀ¨Boston Children's Health PhysiciansºÍUMCÒ½ÁÆÏµÍ³£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°È¥ÄêÊ¥µ®½ÚÔâÊܹ¥»÷µÄ°²ÄÈÑÅ¿ËÒ½Ôº£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷¶¼µ¼ÖÂÁËÃô¸ÐÊý¾ÝµÄй¶ºÍÔËÓªµÄÖÐÖ¹¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/


5. ΢Èíɨ³ý¶ÔUbisoftÓÎÏ·Windows 24H2¸üÐÂÏÞÖÆ


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÒѲ¿·Öɨ³ýÁ˶ÔWindows 24H2¸üÐÂÓëijЩUbisoftÓÎϷϵͳ¼æÈÝÐÔµÄÏÞÖÆ¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¡¶´Ì¿ÍÐÅÌõ¡·¡¢¡¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÈÓÎÏ·ÔÚWindows 11 24H2Ô¤ÀÀ°æÖзºÆðÍ߽⡢ËÀ»úºÍÒôƵÎÊÌ⣬£¬£¬£¬£¬£¬£¬Î¢Èí×èÖ¹ÁË×°ÓÐÕâЩÓÎÏ·µÄPC¾ÙÐÐWindows 24H2Éý¼¶¡£¡£¡£¡£¡£Óû§·´ÏìÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÓÎÏ·±£´æ²»ÎȹÌÇéÐΣ¬£¬£¬£¬£¬£¬£¬ÈçÆô¶¯ºóÁ¬Ã¦Í߽⻣»£»£» £»£»£»ò¼ÓÔØÉúÑÄÓÎÏ·ºó¼¸·ÖÖÓÄÚÍ߽⡢¶³½á»òºÚÆÁ¡£¡£¡£¡£¡£Îª±ÜÃâÎÊÌâÀ©É¢£¬£¬£¬£¬£¬£¬£¬Î¢Èí½ÓÄÉÁ˱£»£»£»£» £»£»£»¤²½·¥¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÔÚUbisoftÐû²¼ÔÝʱÐÞ²¹³ÌÐò»º½âÍß½âÎÊÌâºó£¬£¬£¬£¬£¬£¬£¬Î¢Èíɨ³ýÁ˶ԡ¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÄÉý¼¶ÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬µ«½¨ÒéÍæ¼ÒÔÚÎÊÌâ½â¾öǰ²»ÒªÊ¹ÓÃWindows 11×°ÖÃÖúÊÖ»òýÌ彨É蹤¾ßÉý¼¶ÊÜÓ°ÏìPC¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Î¢Èí»¹Ðû²¼×èÖ¹×°ÖÃÁ˹ýʱGoogle Workspace SyncµÄϵͳºÍ¾ßÓв»¼æÈÝÓ¢ÌØ¶ûÖÇÄÜÉùÒôÊÖÒÕÒôƵÇý¶¯³ÌÐòµÄ×°±¸¾ÙÐÐWindows 11 24H2¸üУ¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩ»áµ¼ÖÂOutlookÆô¶¯ÎÊÌâºÍÀ¶ÆÁËÀ»úÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/ubisoft-fixes-windows-11-24h2-conflicts-causing-game-crashes/


6. ³¯ÏʺڿÍCitrine Sleet͵ȡRadiant Capital 5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯½ðÈÚ(DeFi)ƽ̨Radiant CapitalÔÚ10ÔÂ16ÈÕÐû²¼ÆäϵͳÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ¡£¡£¡£¡£¡£ÔÚMandiantÍøÂçÇ徲ר¼ÒµÄЭÖúÏ£¬£¬£¬£¬£¬£¬£¬Radiant¶Ô´Ë´Î¹¥»÷¾ÙÐÐÁËÉîÈëÊӲ죬£¬£¬£¬£¬£¬£¬²¢È·¶¨Ä»ºóºÚÊÖΪ³¯Ïʹú¼ÒÁ¥ÊôºÚ¿Í×éÖ¯Citrine Sleet£¨ÓÖÃû¡°UNC4736¡±ºÍ¡°AppleJeus¡±£©¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýTelegram·¢ËÍð³äǰ³Ð°üÉ̵ĶñÒâÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­¿ª·¢Ö°Ô±ÏÂÔØ°üÀ¨¡°InletDrift¡±macOS¶ñÒâÈí¼þ¸ºÔصÄZIPÎļþ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÊÜѬȾµÄ×°±¸ÉϽ¨ÉèºóÃÅ¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃͨÀýµÄ¶àÖØÊðÃûÊ¿³Ì£¬£¬£¬£¬£¬£¬£¬ÒÔÉúÒâ¹ýʧµÄÃûÒåÍøÂçÓÐÓÃÊðÃû£¬£¬£¬£¬£¬£¬£¬²¢´ÓArbitrumºÍ±Ò°²ÖÇÄÜÁ´(BSC)Êг¡ÇÔÈ¡×ʽ𡣡£¡£¡£¡£´Ë´Î¹¥»÷Éè¼ÆÓÅÒ죬£¬£¬£¬£¬£¬£¬ÈƹýÁËÓ²¼þÇ®°üÇå¾²ºÍ¶à²ãÑéÖ¤£¬£¬£¬£¬£¬£¬£¬ÉúÒâÔÚÊÖ¶¯ºÍÄ£Äâ¼ì²éÖп´ÆðÀ´¶¼ºÜÕý³££¬£¬£¬£¬£¬£¬£¬ÏÔʾ³ö¼«¸ßµÄÖØ´óÐÔ¡£¡£¡£¡£¡£RadiantÕýÔÚÓëÃÀ¹úÖ´·¨²¿·ÖºÍzeroShadowÏàÖú£¬£¬£¬£¬£¬£¬£¬×·»Ø¾¡¿ÉÄܶàµÄ±»µÁ×ʽ𣬣¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ÐèÒª¸üǿʢµÄ×°±¸¼¶½â¾ö¼Æ»®À´ÔöÇ¿ÉúÒâÇå¾²ÐÔ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers