Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
Ðû²¼Ê±¼ä 2025-02-271. Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
2ÔÂ25ÈÕ£¬£¬2025Äê¶ÔNetflixÀ´Ëµ¿ÉνÊǼèÍÍÖ®¼Ê¡£¡£¡£Ê×ÏÈ£¬£¬ÃæÁÙÀ´×ÔDisney+¡¢HuluºÍMaxµÈ¾ºÕùƽ̨µÄÇ¿ÁÒ¾ºÕù£¬£¬Óû§Áô´æÂÊÏ»¬£¬£¬ÄÚÈÝÎüÒýÁ¦Ï÷Èõ£¬£¬¼ÓÖ®ÃÜÂë¹²ÏíÏÞÖÆºÍ¶©ÔļÛÇ®ÉÏÕÇÒý·¢Óû§²»Âú¡£¡£¡£¿ËÈÕ£¬£¬NetflixµÄÆì½¢¾ç¼¯¡¶¹ÖÆæÎïÓï¡·×îºóÒ»¼¾£¨µÚÎå¼¾£©µÄÃô¸Ðϸ½ÚÒ²ÔâÓöÁËй¶¡£¡£¡£¾ÝNetflixƵµÀ±¨µÀ£¬£¬´Ë´ÎйÃÜ¿ÉÄÜÔ´×ÔÒ»¸öÄÚ²¿Æ½Ì¨£¬£¬¸Ãƽ̨ËäÊÜ»¥ÁªÍø»á¼ûÏÞÖÆ£¬£¬µ«ÈÔ±»Î´ÖªÖ°Ô±»ñÈ¡²¢Ð¹Â¶Á˰üÀ¨ÏÖʵͼƬ¡¢½ÇɫָÄÏ¡¢»Õ±ê¼°ÒÕÊõ¼ÒÒÕÊõ×÷Æ·µÈÔÚÄڵı£ÃÜÐÅÏ¢¡£¡£¡£Ð¹Â¶µÄÄÚÈÝÔÚÍøÉÏѸËÙÈö²¥£¬£¬ÉõÖÁÕ¹ÏÖÁËÖ÷ÒªÈËÎïµÄÔËÆø¡£¡£¡£Ö»¹ÜNetflixÕýͨ¹ýÖ´·¨ÊֶκÍDMCAɾ³ýÇëÇóÀ´ÏÞÖÆËðʧ£¬£¬µ«Ò»Ð©×¨ÃÅÌÖÂÛ¡¶¹ÖÆæÎïÓï¡·µÄÉ罻ýÌåÕË»§ÒÑ·ÖÏíÁËй¶ÐÅÏ¢£¬£¬ÇÒNetflixһֱæÓÚÒªÇóÓû§É¾³ý½ÒÆÆÌû×Ó¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬NetflixÈ¥ÄêÒ²ÔøÔâÓö¹ýйÃÜÊÂÎñ£¬£¬Æäʱ¼¸²¿¶¯»ÏµÁеÄÕû¼¯±»²»·¨Ðû²¼ÔÚÍøÉÏ¡£¡£¡£
https://cybernews.com/news/netflix-stranger-things-leaks/
2. Southern Water³ÆBlack BastaÀÕË÷Èí¼þ¹¥»÷Ôì³É450ÍòÓ¢°÷Ëðʧ
2ÔÂ26ÈÕ£¬£¬Ó¢¹ú¹©Ë®ÉÌSouthern WaterÔÚ2024Äê2ÔÂÔâÊÜÁËÍøÂç¹¥»÷£¬£¬Ëðʧ¸ß´ï450ÍòÓ¢°÷¡£¡£¡£×÷Ϊһ¼ÒΪӢ¸ñÀ¼Äϲ¿µØÇøÌṩ¹©Ë®ÓëÎÛË®´¦Öóͷ£Ð§À͵Ä˽Ӫ¹«ÓÃÊÂÒµ¹«Ë¾£¬£¬Southern Waterͨ¹ýÖØ´óµÄ¹ÜÍøÏµÍ³ÖðÈÕΪ270Íò¿Í»§Ìṩ¹©Ë®Ð§ÀÍ£¬£¬²¢ÎªÁè¼Ý470Íò¿Í»§ÌṩÎÛË®´¦Öóͷ£Ð§ÀÍ¡£¡£¡£´Ë´Î¹¥»÷ÓÉÎÛÃûÕÑÖøµÄBlack BastaÀÕË÷Èí¼þÍÅ»ïÉù³ÆÈÏÕæ£¬£¬¸ÃÍÅ»ïÒÔ¹¥»÷Òªº¦»ù´¡ÉèÊ©¶øÖø³Æ¡£¡£¡£Ö»¹ÜSouthern Water´ËÇ°ÔøÐû²¼ÔâÓöÇå¾²Îó²î£¬£¬µ«²¢Î´Ó°ÏìÆäÔËÓª¡¢²ÆÎñ»òÃæÏò¿Í»§µÄϵͳ¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö²¿·ÖЧÀÍÆ÷Êý¾Ý±»ÇÔÈ¡£¬£¬¹«Ë¾Îª´ËÔ¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼ÒºÍÖ´·¨ÕÕÁÏ£¬£¬²¢Í¨ÖªÁË¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£³ýÁËÖ±½Ó¾¼ÃËðʧÍ⣬£¬¸ÃÊÂÎñ»¹¿ÉÄÜ´øÀ´ÉùÓþË𺦡¢Ö´·¨ÓöȺÍî¿ÏµÉó²éµÈDZÔÚΣº¦¡£¡£¡£¾ÝÆÊÎö£¬£¬Southern Water¾Ý³ÆÔøÌáÒéÏòÀÕË÷Èí¼þ·¸·¨·Ö×ÓÖ§¸¶75ÍòÓ¢°÷£¬£¬Ö»¹Ü¹¥»÷Õß×î³õÒªÇóÖ§¸¶¸ü¸ß½ð¶î¡£¡£¡£È»¶ø£¬£¬µ½2024Äê2ÔÂ⣬£¬¸Ã¹«Ë¾µÄÌõÄ¿ÒÑ´ÓBlack BastaµÄÀÕË÷ÍøÕ¾ÉÑþ³Øý£¬£¬Õâ¿ÉÄÜÅúע˫·½ÒѸ濢ijÖÖÐÒé¡£¡£¡£
https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/
3. GrassCallÉç»á¹¤³Ì¹¥»÷£ºÊý°ÙÈ˼ÓÃÜÇ®±ÒÇ®°ü±»µÁ
2ÔÂ26ÈÕ£¬£¬½üÆÚ£¬£¬Ò»¸öÃûΪCrazy EvilµÄ¶íÓïÍøÂç·¸·¨ÍÅ»ïͨ¹ý¶ñÒâµÄ¡°GrassCall¡±¾Û»áÓ¦ÓóÌÐòÌᳫÁËÒ»ÏîÕë¶ÔWeb3ÁìÓòÇóÖ°ÕßµÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¸ÃÍÅ»ïÓÕÆÇóÖ°ÕßÔÚWindowsºÍMac×°±¸ÉÏÏÂÔØ¶ñÒâÈí¼þ£¬£¬¸ÃÈí¼þÄܹ»ÇÔÈ¡ÃÜÂë¡¢Éí·ÝÑéÖ¤cookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£Êý°ÙÈËÒò´ËÊܺ¦£¬£¬Ò»Ð©È˵ÄÇ®°ü±»ÌͿա£¡£¡£¹¥»÷Õß½¨ÉèÁËÒ»¸öÐéαµÄÔÚÏß½ÇÉ«£¬£¬°üÀ¨ÍøÕ¾ºÍÉ罻ýÌå×ÊÁÏ£¬£¬Ã°³äÊÇÒ»¼ÒÃûΪ¡°ChainSeeker.io¡±µÄ¹«Ë¾£¬£¬²¢ÔÚLinkedInµÈÇóÖ°ÍøÕ¾ÉÏÐû²¼ÐéαÕÐÆ¸ÐÅÏ¢¡£¡£¡£Êܺ¦Õß»áÊÕµ½ÃæÊÔÔ¼Ç룬£¬²¢±»ÒªÇóͨ¹ýTelegramÁªÏµÊ×ϯӪÏú¹Ù£¬£¬ÏÂÔØ²¢Ê¹ÓÃGrassCallÊÓÆµ¾Û»áÈí¼þ¡£¡£¡£È»¶ø£¬£¬¸ÃÈí¼þÏÖʵÉÏÊÇ֮ǰ»î¶¯ÖÐʹÓõġ°Gatherum¡±ÍøÕ¾µÄ¿Ë¡°æ£¬£¬»á×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»òÔ¶³Ì»á¼ûľÂí¡£¡£¡£ÔÚWindows×°±¸ÉÏ£¬£¬»á×°ÖÃRATºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬ÈçRhadamanthys£»£»£»£»£»ÔÚMacÉÏ£¬£¬»á×°ÖÃAtomic (AMOS) Stealer¶ñÒâÈí¼þ¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ»áʵÑéÆ¾Ö¤Òªº¦×Ö¡¢¼ÓÃÜÇ®±ÒÇ®°üµÈÐÅÏ¢À´ÇÔÈ¡Îļþ£¬£¬²¢½«±»µÁÐÅÏ¢ÉÏ´«ÖÁЧÀÍÆ÷µÄTelegramƵµÀ¡£¡£¡£Crazy Evil³ÉÔ±´Óÿ¸öÀÖ³ÉÆÈ¡µÄÊܺ¦ÕßÉíÉÏ׬ȡÊýÍòÉõÖÁÊýÊ®ÍòÃÀÔª¡£¡£¡£
https://www.bleepingcomputer.com/news/security/grasscall-malware-campaign-drains-crypto-wallets-via-fake-job-interviews/
4. °Ä´óÀûÑÇIVF¾ÞÍ·GeneaÔâTermiteÀÕË÷Èí¼þ¹¥»÷
2ÔÂ26ÈÕ£¬£¬½üÆÚ£¬£¬°Ä´óÀûÑÇ×î´óµÄÉúÓýЧÀÍÌṩÉÌÖ®Ò»GeneaÔâÓöÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡£¡£¡£¾Ý°Ä´óÀûÑǹú¼Ò¹ã²¥¹«Ë¾±¨µÀ£¬£¬GeneaÔڸùúÉúÓýЧÀÍÐÐÒµÖÐÕ¼ÓÐÖ÷Ҫְ룬£¬ÓëÁíÍâÁ½¼Ò¹«Ë¾ÅäºÏÕ¼ÓÐÁè¼Ý80%µÄÊг¡·Ý¶î¡£¡£¡£´Ë´Î¹¥»÷ÊÂÎñºó£¬£¬GeneaÈ·ÈϹ¥»÷ÕßÒÑÇÔÈ¡ÆäϵͳÖеÄÊý¾Ý£¬£¬²¢ÔÚÍøÉÏÐû²¼¡£¡£¡£¾ÝÊӲ죬£¬¹¥»÷Õßͨ¹ýCitrixЧÀÍÆ÷ÓÚ2025Äê1ÔÂ31ÈÕ½øÈëGeneaÍøÂ磬£¬Ëæºó»ñÈ¡ÁËÖ÷ÎļþЧÀÍÆ÷¡¢Óò¿ØÖÆÆ÷µÈµÄ»á¼ûȨÏÞ£¬£¬²¢ÔÚ2ÔÂ14ÈÕ½«940.7GBµÄÊý¾ÝÇÔÈ¡ÖÁÆä¿ØÖƵÄÔÆÐ§ÀÍÆ÷ÖС£¡£¡£ÊÜËðµÄ»¼ÕßÖÎÀíϵͳÖаüÀ¨Ð¡ÎÒ˽¼ÒºÍ¿µ½¡Êý¾Ý£¬£¬ÈçÈ«Ãû¡¢µØµã¡¢Ò½ÁƼͼµÈ£¬£¬µ«ÐÅÓÿ¨ÐÅÏ¢µÈ²ÆÎñÐÅϢδÊÜÓ°Ïì¡£¡£¡£ËäÈ»GeneaδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬£¬µ«TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÉù³Æ¶Ô´ËÈÏÕæ£¬£¬²¢ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˾ݳƴÓGeneaÍøÂçÖÐÇÔÈ¡µÄÊý¾Ý½ØÍ¼¡£¡£¡£TermiteÀÕË÷Èí¼þÍÅ»ï×ÔÈ¥Äê10ÔÂÖÐÑ®·ºÆðÒÔÀ´£¬£¬ÒÑÓжàÃûÊܺ¦Õߣ¬£¬»¹ÔøÉù³Æ¹¥ÆÆÁËÈ«Çò¹©Ó¦Á´Èí¼þÌṩÉÌBlue YonderµÄÍøÂç¡£¡£¡£
https://www.bleepingcomputer.com/news/security/australian-ivf-giant-genea-breached-by-termite-ransomware-gang/
5. automslc¶ñÒâPyPi°ü£ºÀÄÓÃDeezerƾ֤ʵÏÖ´ó¹æÄ£ÒôÀÖµÁ°æ
2ÔÂ26ÈÕ£¬£¬×Ô2019ÄêÒÔÀ´£¬£¬Ò»¸öÃûΪ¡°automslc¡±µÄ¶ñÒâPyPi°üÒѱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬¸Ã°üÀÄÓÃÓ²±àÂëÆ¾Ö¤´ÓDeezerÒôÀÖÁ÷ýÌåЧÀÍÖеÁ°æÒôÀÖ¡£¡£¡£DeezerÊÇÒ»ÏîÁýÕÖ180¸ö¹ú¼Ò/µØÇø¡¢ÌṩÁè¼Ý9000ÍòÊ×ÇúÄ¿µÄЧÀÍ¡£¡£¡£Çå¾²¹«Ë¾Socket·¢Ã÷ÁËÕâ¸ö¶ñÒâ°ü£¬£¬Ëüͨ¹ýÓ²±àÂëµÄDeezerƾ֤ÏÂÔØÃ½Ì岢ץȡԪÊý¾Ý£¬£¬Î¥·´ÁËDeezerµÄЧÀÍÌõ¿îºÍ°æÈ¨·¨¡£¡£¡£automslcʹÓÃÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¾ÙÐм¯ÖпØÖÆ£¬£¬¿ÉÄܽ«Óû§ÄÉÈëÂþÑÜÊ½ÍøÂ磬£¬²¢ÈÝÒ×±»ÓÃÓÚÆäËû¶ñÒâ»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þ°ü°üÀ¨Ó²±àÂëµÄDeezerÕÊ»§Æ¾Ö¤£¬£¬ÓÃÓڵǼЧÀͲ¢ÇëÇ´Ôð³¤Á÷ýÌåURL£¬£¬Èƹý30ÃëÔ¤ÀÀÏÞÖÆ£¬£¬ÒÔ¸ßÖÊÁ¿ÃûÌÃÍâµØ´æ´¢ÒôƵÎļþ£¬£¬ÔÊÐíÀëÏßÊÕÌýºÍ·Ö·¢¡£¡£¡£Ö»¹ÜµÁ°æ¹¤¾ßͨ³£²»±»ÊÓΪ¶ñÒâÈí¼þ£¬£¬µ«automslcµÄʹÓÿÉÄÜÈÃÓû§ÃæÁÙÖ´·¨Î£º¦ºÍδÀ´¸ü¶à¶ñÒâÐÐΪµÄΣº¦¡£¡£¡£SocketÔÚÖÖÖÖÕË»§ºÍGitHub´æ´¢¿âÖз¢Ã÷ÁËÓë¸ÃÈí¼þ°üÏà¹ØµÄÓÖÃû£¬£¬µ«Ö÷ıµÄÉí·ÝÉв»ÇåÎú¡£¡£¡£Òò´Ë£¬£¬½¨ÒéÓû§×èֹʹÓÃautomslc£¬£¬ÒÔÃâ¾íÈë²»·¨»î¶¯¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pypi-package-with-100k-installs-pirated-music-from-deezer-for-years/
6. EncryptHubÈëÇÖ618¸ö×éÖ¯£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ
2ÔÂ26ÈÕ£¬£¬×Ô2024Äê6ÔÂÒÔÀ´£¬£¬Ò»¸öÃûΪEncryptHub£¨ÓÖÃûLarva-208£©µÄÍþвÐÐΪÕßͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬Ãé׼ȫÇò×éÖ¯ÒÔ»ñÈ¡ÆóÒµÍøÂç»á¼ûȨÏÞ¡£¡£¡£¾ÝProdaft±¨¸æ£¬£¬EncryptHubÒѹ¥»÷ÖÁÉÙ618¸ö×éÖ¯£¬£¬²¢ÔÚ»ñµÃ»á¼ûȨÏÞºó×°ÖÃÔ¶³Ì¼à¿ØºÍÖÎÀíÈí¼þ£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ¡£¡£¡£¸ÃÍþв×éÖ¯ÓëRansomHubºÍBlackSuitÓйØÁª£¬£¬²¢Î¬»¤ÁË×Ô¼ºµÄ×Ô½ç˵PowerShellÊý¾Ý¼ÓÃÜÆ÷¡£¡£¡£EncryptHubʹÓöÌÐÅ¡¢ÓïÒôÍøÂç´¹ÂÚºÍÐéαµÇÂ¼Ò³ÃæµÈÊֶλñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬¹ºÖÃÁËÁè¼Ý70¸öÄ£ÄâÆóÒµVPN²úÆ·µÄÓòÃûÀ´ÔöÌí´¹ÂÚÒ³ÃæµÄÕýµ±ÐÔ¡£¡£¡£ÁíÒ»¸ö±»×·×ÙΪLarva-148µÄ×Ó×éÖ¯¿ÉÄÜÏòEncryptHub³öÊÛÓòÃûºÍÍøÂç´¹ÂÚ¹¤¾ß°ü¡£¡£¡£Ò»µ©¹¥ÆÆÄ¿µÄϵͳ£¬£¬EncryptHub»á°²ÅÅÖÖÖÖPowerShell¾ç±¾ºÍ¶ñÒâÈí¼þÀ´ÇÔÈ¡Êý¾ÝºÍ¼ÓÃÜÎļþ£¬£¬°üÀ¨¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN¿Í»§¶ËÉèÖÃÊý¾Ý¡¢ÃÜÂëÖÎÀíÆ÷Êý¾ÝºÍÌØ¶¨Îļþ¡£¡£¡£×îºó£¬£¬EncryptHubʹÓûùÓÚPowerShellµÄ×Ô½ç˵¼ÓÃÜÆ÷ÐÎʽµÄÀÕË÷Èí¼þ£¬£¬ÒªÇóÊܺ¦Õßͨ¹ýTelegramÖ§¸¶Êê½ð¡£¡£¡£ProdaftÖÒÑÔ˵£¬£¬EncryptHubÊÇÒ»¸öÀÏÁ·µÄÍþвÐÐΪÕߣ¬£¬Äܹ»¶¨Öƹ¥»÷ÒÔÌá¸ßЧÂÊ£¬£¬¶Ô´óÐÍ×éÖ¯Ôì³É¸ß¼ÛÖµµÄÆÆË𡣡£¡£
https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/