RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡

Ðû²¼Ê±¼ä 2024-12-10

1. RedLineÃé×¼¶íÂÞ˹µÁ°æÆóÒµÈí¼þÓû§¾ÙÐÐÐÅÏ¢ÇÔÈ¡


12ÔÂ8ÈÕ£¬£¬£¬£¬×Ô2024Äê1ÔÂÆð£¬£¬£¬£¬RedLineÐÅÏ¢ÇÔÈ¡»î¶¯×îÏÈÕë¶ÔʹÓõÁ°æÆóÒµÈí¼þµÄ¶íÂÞ˹ÆóÒµ¡£¡£¡£ÕâЩµÁ°æÈí¼þͨ¹ý¶íÂÞ˹ÔÚÏßÂÛ̳·Ö·¢£¬£¬£¬£¬¹¥»÷ÕßÇÉÃîµØ½«¶ñÒâÈí¼þαװ³É¿ÉÈÆ¹ýÓªÒµ×Ô¶¯»¯Èí¼þÔÊÐíµÄ¹¤¾ß£¬£¬£¬£¬ÌØÊâÊÇ̫ͨ¹ý·¢¶ñÒâ°æ±¾µÄHPDxLIB¼¤»îÆ÷¡£¡£¡£ÓëÕýµ±°æ±¾²î±ð£¬£¬£¬£¬¶ñÒâ°æ±¾ÔÚ.NETÖй¹½¨£¬£¬£¬£¬²¢Ê¹ÓÃ×ÔÊðÃûÖ¤Êé¡£¡£¡£¿£¿£¿£¿¨°Í˹»ù±¨¸æÖ¸³ö£¬£¬£¬£¬ÕâЩδ¾­ÊÚȨµÄÆóÒµÓªÒµÁ÷³Ì×Ô¶¯»¯Èí¼þÓû§³ÉΪ¹¥»÷Ä¿µÄ£¬£¬£¬£¬¹¥»÷ÕßÔÚ»á¼ÆÂÛ̳ÉÏ·Ö·¢º¬ÓÐRedLineÇÔÈ¡³ÌÐòµÄ¶ñÒ⼤»î³ÌÐò¡£¡£¡£¸Ã³ÌÐòʹÓÃ.NET Reactor¾ÙÐлìÏý£¬£¬£¬£¬¶ñÒâ´úÂë¾­Óɶà²ãѹËõºÍ¼ÓÃÜ£¬£¬£¬£¬Òþ²Ø·½·¨ºÜÊDz»Ñ°³£¡£¡£¡£¹¥»÷ÕßÔÚÏà¹ØÂÛ̳ÉÏÐû²¼¶ñÒ⼤»îÆ÷Á´½Ó£¬£¬£¬£¬²¢Ìṩ½ûÓÃÇå¾²Èí¼þÒÔÔËÐ줻îÆ÷µÄÏêϸ˵Ã÷£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£Óû§±»ÓÕÆ­Óü¤»îÆ÷ÖеĶñÒâ¿âÌæ»»Õýµ±µÄtechsys.dll¿â£¬£¬£¬£¬´Ó¶øÔÚÖ´ÐÐÈí¼þʱͨ¹ýÕýµ±Àú³Ì¼ÓÔØ¶ñÒâ¿â£¬£¬£¬£¬ÔËÐÐÇÔÈ¡³ÌÐò¡£¡£¡£RedLineÇÔÈ¡³ÌÐò×Ô2020ÄêÍ·±ã»îÔ¾£¬£¬£¬£¬ÄÜ´ÓϵͳÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬°üÀ¨Æ¾Ö¤¡¢cookie¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼¡¢ÐÅÓÿ¨Êý¾ÝºÍ¼ÓÃÜÇ®°üµÈ¡£¡£¡£


https://securityaffairs.com/171771/cyber-crime/redline-info-stealer-campaign-targets-russian-businesses.html


2. °²ÄÈÑÅ¿ËÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬31ÍòÓ໼ÕßÊý¾Ýй¶


12ÔÂ7ÈÕ£¬£¬£¬£¬°²ÄÈÑÅ¿ËÒ½ÔºÊÇÒ»¼ÒλÓÚÂíÈøÖîÈûÖݵķÇÓªÀûÐÔÉçÇøÒ½Ôº£¬£¬£¬£¬ÓµÓÐ83ÕÅ´²Î»¡¢200ÃûҽʦºÍ1200ÃûÊÂÇéÖ°Ô±£¬£¬£¬£¬ÎªÍâµØ×¡ÃñÌṩ»ù±¾Ò½ÁÆÐ§ÀÍ¡£¡£¡£2023Äê12ÔÂ25ÈÕ£¬£¬£¬£¬¸ÃÒ½ÔºÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼ÖÂÁè¼Ý310,000Ãû»¼ÕßµÄÃô¸Ð¿µ½¡Êý¾Ý±»Ð¹Â¶¡£¡£¡£Ò½ÔºÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬ÏÂÏßϵͳ²¢ÏòÖ´·¨²¿·Ö·¢³ö¾¯±¨¡£¡£¡£2024Äê1ÔÂ19ÈÕ£¬£¬£¬£¬¡°Money Message¡±ÀÕË÷Èí¼þÍÅ»ï×îÏȹûÕæÀÕË÷¸ÃÒ½Ôº£¬£¬£¬£¬²¢ÔÚÆä°µÍøÀÕË÷ÍøÕ¾ÉÏй¶Á˾ݳƴÓÒ½ÔºÇÔÈ¡µÄÊý¾ÝÑù±¾¡£¡£¡£Ò½ÔºÖÎÀíÖ°Ô±²¢Î´ÓëÍþвÐÐΪÕß̸ÅУ¬£¬£¬£¬×îÖÕÓÚ1ÔÂ26ÈÕÐû²¼ÁËËùÓÐÊý¾Ý¡£¡£¡£¾­Óɳ¹µ×µÄȡ֤ÊӲ죬£¬£¬£¬Ò½ÔºÓÚ2024Äê11ÔÂ5ÈÕÍê³ÉÁ˶Ôй¶Êý¾ÝµÄÉó²é£¬£¬£¬£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éú³Ýͳ¼ÆÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢²ÆÎñÐÅÏ¢µÈ¡£¡£¡£Ö»¹ÜҽԺûÓм£ÏóÅú×¢ÕâÆðÊÂÎñµ¼ÖÂÁËÈκÎڲƭÐÐΪ£¬£¬£¬£¬µ«ÕÕ¾ÉÌáÐÑÔ±¹¤ºÍ»¼ÕßÒª¼á³ÖСÐÄ£¬£¬£¬£¬²¢ÌṩÁËΪÆÚ24¸öÔµÄÉí·Ý±£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/anna-jaques-hospital-ransomware-breach-exposed-data-of-300k-patients/


3. ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÔâÊÜÀÕË÷Èí¼þ¹¥»÷


12ÔÂ10ÈÕ£¬£¬£¬£¬ÂÞÂíÄáÑÇÄÜÔ´¹©Ó¦ÉÌElectrica GroupÕýÃæÁÙÒ»ÆðÒ»Á¬µÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÒÑÏòͶ×ÊÕß°ü¹Ü£¬£¬£¬£¬ÆäÒªº¦ÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£¡£ÎªÁ˰ü¹ÜÔËÓªºÍСÎÒ˽¼ÒÊý¾ÝµÄÇå¾²£¬£¬£¬£¬ElectricaÒÑÆô¶¯ÄÚ²¿ÍøÂçÇ徲ЭÒ飬£¬£¬£¬²¢Óë¹ú¼ÒÍøÂçÇå¾²»ú¹¹ÏàÖú£¬£¬£¬£¬Ö¼ÔÚʶ±ð¹¥»÷Ô´²¢¿ØÖÆÆäÓ°Ïì¡£¡£¡£ElectricaÊÇÂÞÂíÄáÑǵçÁ¦ÅäËͺ͹©Ó¦Êг¡µÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬ÎªÁè¼Ý380Íò¿Í»§ÌṩЧÀÍ£¬£¬£¬£¬²¢ÔÚ²¼¼ÓÀÕË¹ÌØºÍÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊС£¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼Í¨Öª£¬£¬£¬£¬¼û¸æÍ¶×ÊÕßÕýÔÚ±¬·¢µÄÍøÂç¹¥»÷£¬£¬£¬£¬²¢Ç¿µ÷ËùÓÐÌØ¶¨µÄÏìӦЭÒéÒÑÆ¾Ö¤ÄÚ²¿³ÌÐòºÍÏÖÐйæÔòÆô¶¯¡£¡£¡£ÂÞÂíÄáÑÇÄÜÔ´²¿Ö¤Êµ¸Ã¹«Ë¾È·ÊµÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ«¹¥»÷²¢Î´Ó°Ïì¸Ã¹«Ë¾µÄSCADAϵͳ¡£¡£¡£Ç鱨ÆÊÎöÈËÊ¿ÒÔΪ£¬£¬£¬£¬´Ë´ÎÏ®»÷¿ÉÄÜÊÇÇ×¶íÕûÌå·¢¶¯µÄ£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÂÞÂíÄáÑÇÒò¶íÂÞË¹ÉæÏÓ¸ÉÔ¤¶ø×÷·Ï×Üͳѡ¾Ù¡£¡£¡£ÂÞÂíÄáÑÇÇ鱨¾Ö͸¶£¬£¬£¬£¬Áè¼Ý85,000´ÎÍøÂç¹¥»÷Õë¶Ô¸Ã¹úÑ¡¾Ùϵͳ£¬£¬£¬£¬µ«ÄªË¹¿Æ·ñ¶¨¶Ô´Ë¾ÙÐÐÈκι¥»÷¡£¡£¡£Electrica Group½¨Òé¿Í»§¶ÔDZÔÚµÄÍøÂç´¹ÂÚʵÑéºÍ¿ÉÒÉͨѶ¼á³ÖСÐÄ¡£¡£¡£


https://securityaffairs.com/171832/hacking/electrica-group-ransomware-attack.html


4. ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔâÀÕË÷Èí¼þ¹¥»÷


12ÔÂ9ÈÕ£¬£¬£¬£¬ÐÄÔàÍâ¿ÆÒ½ÁÆ×°±¸ÖÆÔìÉÌArtivionÔÚ11ÔÂ21ÈÕÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬¸Ã¹¥»÷ÈÅÂÒÁËÆäÔËÓª²¢µ¼Ö²¿·Öϵͳ¹Ø±Õ¡£¡£¡£Artivion×ܲ¿Î»ÓÚÑÇÌØÀ¼´ó£¬£¬£¬£¬È«ÇòÔ±¹¤Áè¼Ý1,250Ãû£¬£¬£¬£¬ÔÚ100¶à¸ö¹ú¼ÒÉèÓÐÏúÊÛ´ú±í£¬£¬£¬£¬²¢ÔÚÑÇÌØÀ¼´ó¡¢°Â˹͡ºÍºÚÐÀ¸ùÉèÓÐÖÆÔ칤³§¡£¡£¡£¾ÝArtivionÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ±¨¸æ£¬£¬£¬£¬¹¥»÷Õß¼ÓÃÜÁËÆä²¿·Öϵͳ²¢ÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬µ«¹«Ë¾ÔËÓª¡¢¶©µ¥´¦Öóͷ£ºÍÔËÊäÖÐÖ¹ÎÊÌâÒÑ»ù±¾»ñµÃ½â¾ö¡£¡£¡£ËäÈ»ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬µ«ArtivionÒÔΪ¿ÉÄܻᱬ·¢°ü¹Üδº­¸ÇµÄÌØÊâÓöÈ¡£¡£¡£½üÆÚ£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÒ²ÔâÓöÁ˶àÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬°üÀ¨Boston Children's Health PhysiciansºÍUMCÒ½ÁÆÏµÍ³£¬£¬£¬£¬ÒÔ¼°È¥ÄêÊ¥µ®½ÚÔâÊܹ¥»÷µÄ°²ÄÈÑÅ¿ËÒ½Ôº£¬£¬£¬£¬ÕâЩ¹¥»÷¶¼µ¼ÖÂÁËÃô¸ÐÊý¾ÝµÄй¶ºÍÔËÓªµÄÖÐÖ¹¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-leading-heart-surgery-device-maker/


5. ΢Èíɨ³ý¶ÔUbisoftÓÎÏ·Windows 24H2¸üÐÂÏÞÖÆ


12ÔÂ9ÈÕ£¬£¬£¬£¬Î¢ÈíÒѲ¿·Öɨ³ýÁ˶ÔWindows 24H2¸üÐÂÓëijЩUbisoftÓÎϷϵͳ¼æÈÝÐÔµÄÏÞÖÆ¡£¡£¡£´Ëǰ£¬£¬£¬£¬ÓÉÓÚ¡¶´Ì¿ÍÐÅÌõ¡·¡¢¡¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÈÓÎÏ·ÔÚWindows 11 24H2Ô¤ÀÀ°æÖзºÆðÍ߽⡢ËÀ»úºÍÒôƵÎÊÌ⣬£¬£¬£¬Î¢Èí×èÖ¹ÁË×°ÓÐÕâЩÓÎÏ·µÄPC¾ÙÐÐWindows 24H2Éý¼¶¡£¡£¡£Óû§·´ÏìÏÔʾ£¬£¬£¬£¬ÓÎÏ·±£´æ²»ÎȹÌÇéÐΣ¬£¬£¬£¬ÈçÆô¶¯ºóÁ¬Ã¦Í߽⻣»£»£»£»ò¼ÓÔØÉúÑÄÓÎÏ·ºó¼¸·ÖÖÓÄÚÍ߽⡢¶³½á»òºÚÆÁ¡£¡£¡£Îª±ÜÃâÎÊÌâÀ©É¢£¬£¬£¬£¬Î¢Èí½ÓÄÉÁ˱£»£»£»£»£»¤²½·¥¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÔÚUbisoftÐû²¼ÔÝʱÐÞ²¹³ÌÐò»º½âÍß½âÎÊÌâºó£¬£¬£¬£¬Î¢Èíɨ³ýÁ˶ԡ¶ÐÇÇò´óÕ½£º·¨Íâ¿ñͽ¡·ºÍ¡¶°¢·²´ï£ºÅ˶àÀ­±ß½®¡·µÄÉý¼¶ÏÞÖÆ£¬£¬£¬£¬µ«½¨ÒéÍæ¼ÒÔÚÎÊÌâ½â¾öǰ²»ÒªÊ¹ÓÃWindows 11×°ÖÃÖúÊÖ»òýÌ彨É蹤¾ßÉý¼¶ÊÜÓ°ÏìPC¡£¡£¡£Í¬Ê±£¬£¬£¬£¬Î¢Èí»¹Ðû²¼×èÖ¹×°ÖÃÁ˹ýʱGoogle Workspace SyncµÄϵͳºÍ¾ßÓв»¼æÈÝÓ¢ÌØ¶ûÖÇÄÜÉùÒôÊÖÒÕÒôƵÇý¶¯³ÌÐòµÄ×°±¸¾ÙÐÐWindows 11 24H2¸üУ¬£¬£¬£¬ÓÉÓÚÕâЩ»áµ¼ÖÂOutlookÆô¶¯ÎÊÌâºÍÀ¶ÆÁËÀ»úÎÊÌâ¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/ubisoft-fixes-windows-11-24h2-conflicts-causing-game-crashes/


6. ³¯ÏʺڿÍCitrine Sleet͵ȡRadiant Capital 5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò


12ÔÂ9ÈÕ£¬£¬£¬£¬È¥ÖÐÐÄ»¯½ðÈÚ(DeFi)ƽ̨Radiant CapitalÔÚ10ÔÂ16ÈÕÐû²¼ÆäϵͳÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂ5000ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ¡£¡£¡£ÔÚMandiantÍøÂçÇ徲ר¼ÒµÄЭÖúÏ£¬£¬£¬£¬Radiant¶Ô´Ë´Î¹¥»÷¾ÙÐÐÁËÉîÈëÊӲ죬£¬£¬£¬²¢È·¶¨Ä»ºóºÚÊÖΪ³¯Ïʹú¼ÒÁ¥ÊôºÚ¿Í×éÖ¯Citrine Sleet£¨ÓÖÃû¡°UNC4736¡±ºÍ¡°AppleJeus¡±£©¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ11ÈÕ£¬£¬£¬£¬ºÚ¿Íͨ¹ýTelegram·¢ËÍð³äǰ³Ð°üÉ̵ĶñÒâÐÂÎÅ£¬£¬£¬£¬ÓÕÆ­¿ª·¢Ö°Ô±ÏÂÔØ°üÀ¨¡°InletDrift¡±macOS¶ñÒâÈí¼þ¸ºÔصÄZIPÎļþ£¬£¬£¬£¬´Ó¶øÔÚÊÜѬȾµÄ×°±¸ÉϽ¨ÉèºóÃÅ¡£¡£¡£ºÚ¿ÍʹÓÃͨÀýµÄ¶àÖØÊðÃûÊ¿³Ì£¬£¬£¬£¬ÒÔÉúÒâ¹ýʧµÄÃûÒåÍøÂçÓÐÓÃÊðÃû£¬£¬£¬£¬²¢´ÓArbitrumºÍ±Ò°²ÖÇÄÜÁ´(BSC)Êг¡ÇÔÈ¡×ʽ𡣡£¡£´Ë´Î¹¥»÷Éè¼ÆÓÅÒ죬£¬£¬£¬ÈƹýÁËÓ²¼þÇ®°üÇå¾²ºÍ¶à²ãÑéÖ¤£¬£¬£¬£¬ÉúÒâÔÚÊÖ¶¯ºÍÄ£Äâ¼ì²éÖп´ÆðÀ´¶¼ºÜÕý³££¬£¬£¬£¬ÏÔʾ³ö¼«¸ßµÄÖØ´óÐÔ¡£¡£¡£RadiantÕýÔÚÓëÃÀ¹úÖ´·¨²¿·ÖºÍzeroShadowÏàÖú£¬£¬£¬£¬×·»Ø¾¡¿ÉÄܶàµÄ±»µÁ×ʽ𣬣¬£¬£¬²¢Ç¿µ÷ÐèÒª¸üǿʢµÄ×°±¸¼¶½â¾ö¼Æ»®À´ÔöÇ¿ÉúÒâÇå¾²ÐÔ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers