Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
Ðû²¼Ê±¼ä 2025-02-271. Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
2ÔÂ25ÈÕ£¬2025Äê¶ÔNetflixÀ´Ëµ¿ÉνÊǶàÊÂÖ®Çï¡£Ê×ÏÈ£¬ÃæÁÙÀ´×ÔDisney+¡¢HuluºÍMaxµÈ¾ºÕùƽ̨µÄ¼¤ÁÒ¾ºÕù£¬Óû§Áô´æÂÊÏ»¬£¬ÄÚÈÝÎüÒýÁ¦¼õÈõ£¬¼ÓÖ®ÃÜÂë¹²ÏíÏÞÖÆºÍ¶©Ôļ۸ñÉÏÕÇÒý·¢Óû§²»Âú¡£½üÈÕ£¬NetflixµÄÆì½¢¾ç¼¯¡¶¹ÖÆæÎïÓï¡·×îºóÒ»¼¾£¨µÚÎå¼¾£©µÄÃô¸Ðϸ½ÚÒ²ÔâÓöÁËй¶¡£¾ÝNetflixƵµÀ±¨µÀ£¬´Ë´ÎйÃÜ¿ÉÄÜÔ´×ÔÒ»¸öÄÚ²¿Æ½Ì¨£¬¸Ãƽ̨ËäÊÜ»¥ÁªÍø·ÃÎÊÏÞÖÆ£¬µ«ÈÔ±»Î´ÖªÈËÔ±»ñÈ¡²¢Ð¹Â¶Á˰üÂÞʵ¼ÊͼƬ¡¢½ÇɫָÄÏ¡¢»Õ±ê¼°ÒÕÊõ¼ÒÒÕÊõ×÷Æ·µÈÔÚÄڵı£ÃÜÐÅÏ¢¡£Ð¹Â¶µÄÄÚÈÝÔÚÍøÉÏѸËÙÁ÷´«£¬ÉõÖÁ½ÒʾÁËÖ÷ÒªÈËÎïµÄÃüÔË¡£¾¡¹ÜNetflixÕýͨ¹ýÖ´·¨ÊֶκÍDMCAɾ³ýÇëÇóÀ´ÏÞÖÆËðʧ£¬µ«Ò»Ð©×¨ÃÅÌÖÂÛ¡¶¹ÖÆæÎïÓï¡·µÄÉ罻ýÌåÕË»§ÒÑ·ÖÏíÁËй¶ÐÅÏ¢£¬ÇÒNetflixһֱæÓÚÒªÇóÓû§É¾³ý½Ò¶Ìû×Ó¡£ÖµµÃ×¢ÒâµÄÊÇ£¬NetflixÈ¥ÄêÒ²ÔøÔâÓö¹ýйÃÜʼþ£¬Æäʱ¼¸²¿¶¯»ÏµÁеÄÕû¼¯±»·Ç·¨Ðû²¼ÔÚÍøÉÏ¡£
https://cybernews.com/news/netflix-stranger-things-leaks/
2. Southern Water³ÆBlack BastaÀÕË÷Èí¼þ¹¥»÷Ôì³É450ÍòÓ¢°÷Ëðʧ
2ÔÂ26ÈÕ£¬Ó¢¹ú¹©Ë®ÉÌSouthern WaterÔÚ2024Äê2ÔÂÔâÊÜÁËÍøÂç¹¥»÷£¬Ëðʧ¸ß´ï450ÍòÓ¢°÷¡£×÷Ϊһ¼ÒΪӢ¸ñÀ¼Äϲ¿µØÓòÌṩ¹©Ë®ÓëÎÛË®´¦Ö÷þÎñµÄ˽Ӫ¹«ÓÃÊÂÒµ¹«Ë¾£¬Southern Waterͨ¹ýÅÓ´óµÄ¹ÜÍøÏµÍ³Ã¿ÈÕΪ270Íò¿Í»§Ìṩ¹©Ë®·þÎñ£¬²¢ÎªÁè¼Ý470Íò¿Í»§ÌṩÎÛË®´¦Ö÷þÎñ¡£´Ë´Î¹¥»÷ÓÉÎÛÃûÕÑÖøµÄBlack BastaÀÕË÷Èí¼þÍÅ»ïÉù³ÆÂôÁ¦£¬¸ÃÍÅ»ïÒÔ¹¥»÷Òªº¦»ù´¡ÉèÊ©¶øÖø³Æ¡£¾¡¹ÜSouthern Water´ËÇ°ÔøÐû²¼ÔâÓöÄþ¾²Â©¶´£¬µ«²¢Î´Ó°ÏìÆäÔËÓª¡¢²ÆÕþ»òÃæÏò¿Í»§µÄϵͳ¡£´Ë´Î¹¥»÷µ¼Ö²¿ÃÅ·þÎñÆ÷Êý¾Ý±»ÇÔÈ¡£¬¹«Ë¾Îª´ËƸÇëÁËÍâ²¿ÍøÂçÄþ¾²×¨¼ÒºÍÖ´·¨ÕÕÁÏ£¬²¢Í¨ÖªÁË¿ÉÄÜÊÜÓ°ÏìµÄ¸öÈË¡£³ýÁËÖ±½Ó¾¼ÃËðʧÍ⣬¸Ãʼþ»¹¿ÉÄÜ´øÀ´ÉùÓþË𺦡¢Ö´·¨ÓöȺͼà¹ÜÉó²éµÈDZÔÚ·çÏÕ¡£¾Ý·ÖÎö£¬Southern Water¾Ý³ÆÔøÌáÒéÏòÀÕË÷Èí¼þ·¸×ï·Ö×ÓÖ§¸¶75ÍòÓ¢°÷£¬¾¡¹Ü¹¥»÷Õß×î³õÒªÇóÖ§¸¶¸ü¸ß½ð¶î¡£È»¶ø£¬µ½2024Äê2Ôµף¬¸Ã¹«Ë¾µÄÌõÄ¿ÒÑ´ÓBlack BastaµÄÀÕË÷ÍøÕ¾ÉÏɾ³ý£¬Õâ¿ÉÄܱíÃ÷Ë«·½ÒѸ濢ijÖÖÐÒé¡£
https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/
3. GrassCallÉç»á¹¤³Ì¹¥»÷£ºÊý°ÙÈ˼ÓÃÜ»õ±ÒÇ®°ü±»µÁ
2ÔÂ26ÈÕ£¬½üÆÚ£¬Ò»¸öÃûΪCrazy EvilµÄ¶íÓïÍøÂç·¸×ïÍÅ»ïͨ¹ý¶ñÒâµÄ¡°GrassCall¡±»áÒéÓ¦Ó÷¨Ê½ÌᳫÁËÒ»ÏîÕë¶ÔWeb3ÁìÓòÇóÖ°ÕßµÄÉç»á¹¤³Ì¹¥»÷¡£¸ÃÍÅ»ïÓÕÆÇóÖ°ÕßÔÚWindowsºÍMacÉ豸ÉÏÏÂÔØ¶ñÒâÈí¼þ£¬¸ÃÈí¼þÄܹ»ÇÔÈ¡ÃÜÂë¡¢Éí·ÝÑéÖ¤cookieºÍ¼ÓÃÜ»õ±ÒÇ®°ü¡£Êý°ÙÈËÒò´ËÊܺ¦£¬Ò»Ð©È˵ÄÇ®°ü±»ÌͿա£¹¥»÷Õß´´½¨ÁËÒ»¸öÐé¼ÙµÄÔÚÏß½ÇÉ«£¬°üÂÞÍøÕ¾ºÍÉ罻ýÌå×ÊÁÏ£¬¼Ù×°ÊÇÒ»¼ÒÃûΪ¡°ChainSeeker.io¡±µÄ¹«Ë¾£¬²¢ÔÚLinkedInµÈÇóÖ°ÍøÕ¾ÉÏÐû²¼Ðé¼ÙÕÐÆ¸ÐÅÏ¢¡£Êܺ¦Õß»áÊÕµ½ÃæÊÔÑûÇ룬²¢±»ÒªÇóͨ¹ýTelegramÁªÏµÊ×ϯӪÏú¹Ù£¬ÏÂÔØ²¢Ê¹ÓÃGrassCallÊÓÆµ»áÒéÈí¼þ¡£È»¶ø£¬¸ÃÈí¼þʵ¼ÊÉÏÊÇ֮ǰ»î¶¯ÖÐʹÓõġ°Gatherum¡±ÍøÕ¾µÄ¿Ë¡°æ£¬»á°²×°ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»òÔ¶³Ì·ÃÎÊľÂí¡£ÔÚWindowsÉ豸ÉÏ£¬»á°²×°RATºÍÐÅÏ¢ÇÔÈ¡·¨Ê½£¬ÈçRhadamanthys£»ÔÚMacÉÏ£¬»á°²×°Atomic (AMOS) Stealer¶ñÒâÈí¼þ¡£ÕâЩ¶ñÒâÈí¼þ»áʵÑ鯾¾ÝÒªº¦×Ö¡¢¼ÓÃÜ»õ±ÒÇ®°üµÈÐÅÏ¢À´ÇÔÈ¡Îļþ£¬²¢½«±»µÁÐÅÏ¢ÉÏ´«ÖÁ·þÎñÆ÷µÄTelegramƵµÀ¡£Crazy Evil³ÉÔ±´Óÿ¸öÀÖ³ÉÆÈ¡µÄÊܺ¦ÕßÉíÉÏ׬ȡÊýÍòÉõÖÁÊýÊ®ÍòÃÀÔª¡£
https://www.bleepingcomputer.com/news/security/grasscall-malware-campaign-drains-crypto-wallets-via-fake-job-interviews/
4. °Ä´óÀûÑÇIVF¾ÞÍ·GeneaÔâTermiteÀÕË÷Èí¼þ¹¥»÷
2ÔÂ26ÈÕ£¬½üÆÚ£¬°Ä´óÀûÑÇ×î´óµÄÉúÓý·þÎñÌṩÉÌÖ®Ò»GeneaÔâÓöÁËÒ»ÆðÍøÂç¹¥»÷ʼþ£¬¹¥»÷ÕßÇÔÈ¡ÁËÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡£¾Ý°Ä´óÀûÑǹú¼Ò¹ã²¥¹«Ë¾±¨µÀ£¬GeneaÔڸùúÉúÓý·þÎñÐÐÒµÖÐÕ¼¾ÝÖØÒªÖ°Î»£¬ÓëÁíÍâÁ½¼Ò¹«Ë¾ÅäºÏÕ¼ÓÐÁè¼Ý80%µÄÊг¡·Ý¶î¡£´Ë´Î¹¥»÷ʼþºó£¬GeneaÈ·ÈϹ¥»÷ÕßÒÑÇÔÈ¡ÆäϵͳÖеÄÊý¾Ý£¬²¢ÔÚÍøÉÏÐû²¼¡£¾ÝÊӲ죬¹¥»÷Õßͨ¹ýCitrix·þÎñÆ÷ÓÚ2025Äê1ÔÂ31ÈÕ½øÈëGeneaÍøÂç£¬Ëæºó»ñÈ¡ÁËÖ÷Îļþ·þÎñÆ÷¡¢Óò¿ØÖÆÆ÷µÈµÄ·ÃÎÊȨÏÞ£¬²¢ÔÚ2ÔÂ14ÈÕ½«940.7GBµÄÊý¾ÝÇÔÈ¡ÖÁÆä¿ØÖƵÄÔÆ·þÎñÆ÷ÖС£ÊÜËðµÄ»¼Õß¹ÜÀíϵͳÖаüÂÞ¸öÈ˺ͽ¡¿µÊý¾Ý£¬ÈçÈ«Ãû¡¢µØÖ·¡¢Ò½ÁƼǼµÈ£¬µ«ÐÅÓÿ¨ÐÅÏ¢µÈ²ÆÕþÐÅϢδÊÜÓ°Ïì¡£ËäÈ»GeneaδÃ÷È·¹é¾ÌÓÚÌØ¶¨Íþв×éÖ¯£¬µ«TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÉù³Æ¶Ô´ËÂôÁ¦£¬²¢ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˾ݳƴÓGeneaÍøÂçÖÐÇÔÈ¡µÄÊý¾Ý½ØÍ¼¡£TermiteÀÕË÷Èí¼þÍÅ»ï×ÔÈ¥Äê10ÔÂÖÐÑ®·ºÆðÒÔÀ´£¬ÒÑÓжàÃûÊܺ¦Õߣ¬»¹ÔøÉù³Æ¹¥ÆÆÁËÈ«Çò¹©Ó¦Á´Èí¼þÌṩÉÌBlue YonderµÄÍøÂç¡£
https://www.bleepingcomputer.com/news/security/australian-ivf-giant-genea-breached-by-termite-ransomware-gang/
5. automslc¶ñÒâPyPi°ü£ºÀÄÓÃDeezerƾ֤ʵÏÖ´ó¹æÄ£ÒôÀÖµÁ°æ
2ÔÂ26ÈÕ£¬×Ô2019ÄêÒÔÀ´£¬Ò»¸öÃûΪ¡°automslc¡±µÄ¶ñÒâPyPi°üÒѱ»ÏÂÔØÁè¼Ý10Íò´Î£¬¸Ã°üÀÄÓÃÓ²±àÂëÆ¾¾Ý´ÓDeezerÒôÀÖÁ÷ýÌå·þÎñÖеÁ°æÒôÀÖ¡£DeezerÊÇÒ»ÏîÁýÕÖ180¸ö¹ú¼Ò/µØÓò¡¢ÌṩÁè¼Ý9000ÍòÊ×ÇúÄ¿µÄ·þÎñ¡£Äþ¾²¹«Ë¾Socket·¢ÏÖÁËÕâ¸ö¶ñÒâ°ü£¬Ëüͨ¹ýÓ²±àÂëµÄDeezerƾ֤ÏÂÔØÃ½Ì岢ץȡԪÊý¾Ý£¬Î¥·´ÁËDeezerµÄ·þÎñÌõ¿îºÍ°æÈ¨·¨¡£automslcʹÓÃÃüÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©½øÐм¯ÖпØÖÆ£¬¿ÉÄܽ«Óû§ÄÉÈëÂþÑÜÊ½ÍøÂ磬²¢ÈÝÒ×±»ÓÃÓÚÆäËû¶ñÒâ»î¶¯¡£¸Ã¶ñÒâÈí¼þ°ü°üÂÞÓ²±àÂëµÄDeezerÕÊ»§Æ¾¾Ý£¬ÓÃÓڵǼ·þÎñ²¢ÇëÇóÈ«³¤Á÷ýÌåURL£¬Èƹý30ÃëÔ¤ÀÀÏÞÖÆ£¬ÒÔ¸ßÖÊÁ¿¸ñʽµ±µØ´æ´¢ÒôƵÎļþ£¬ÔÊÐíÀëÏßÊÕÌýºÍ·Ö·¢¡£¾¡¹ÜµÁ°æ¹¤¾ßͨ³£²»±»ÊÓΪ¶ñÒâÈí¼þ£¬µ«automslcµÄʹÓÿÉÄÜÈÃÓû§ÃæÁÙÖ´·¨·çÏÕºÍδÀ´¸ü¶à¶ñÒâÐÐΪµÄ·çÏÕ¡£SocketÔÚÖÖÖÖÕË»§ºÍGitHub´æ´¢¿âÖз¢ÏÖÁËÓë¸ÃÈí¼þ°üÏà¹ØµÄ±ðÃû£¬µ«Ö÷ıµÄÉí·ÝÉв»Çå³þ¡£Òò´Ë£¬½¨ÒéÓû§ÖÆÖ¹Ê¹ÓÃautomslc£¬ÒÔÃâ¾íÈë·Ç·¨»î¶¯¡£
https://www.bleepingcomputer.com/news/security/pypi-package-with-100k-installs-pirated-music-from-deezer-for-years/
6. EncryptHubÈëÇÖ618¸ö×éÖ¯£¬²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½ºÍÀÕË÷Èí¼þ
2ÔÂ26ÈÕ£¬×Ô2024Äê6ÔÂÒÔÀ´£¬Ò»¸öÃûΪEncryptHub£¨ÓÖÃûLarva-208£©µÄÍþвÐÐΪÕßͨ¹ýÓã²æÊ½ÍøÂçµöÓãºÍÉç»á¹¤³Ì¹¥»÷£¬Ãé׼ȫÇò×éÖ¯ÒÔ»ñÈ¡ÆóÒµÍøÂç·ÃÎÊȨÏÞ¡£¾ÝProdaft³ÂËߣ¬EncryptHubÒѹ¥»÷ÖÁÉÙ618¸ö×éÖ¯£¬²¢ÔÚ»ñµÃ·ÃÎÊȨÏÞºó°²×°Ô¶³Ì¼à¿ØºÍ¹ÜÀíÈí¼þ£¬²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½ºÍÀÕË÷Èí¼þ¡£¸ÃÍþв×éÖ¯ÓëRansomHubºÍBlackSuitÓйØÁª£¬²¢Î¬»¤ÁË×Ô¼ºµÄ×Ô½ç˵PowerShellÊý¾Ý¼ÓÃÜÆ÷¡£EncryptHubʹÓöÌÐÅ¡¢ÓïÒôÍøÂçµöÓãºÍÐé¼ÙµÇÂ¼Ò³ÃæµÈÊֶλñÈ¡³õʼ·ÃÎÊȨÏÞ£¬¹ºÖÃÁËÁè¼Ý70¸öÄ£·ÂÆóÒµVPN²úÎïµÄÓòÃûÀ´Ôö¼ÓµöÓãÒ³ÃæµÄºÏ·¨ÐÔ¡£ÁíÒ»¸ö±»×·×ÙΪLarva-148µÄ×Ó×éÖ¯¿ÉÄÜÏòEncryptHub³öÊÛÓòÃûºÍÍøÂçµöÓ㹤¾ß°ü¡£Ò»µ©¹¥ÆÆÄ¿±êϵͳ£¬EncryptHub»á²¿ÊðÖÖÖÖPowerShell½Å±¾ºÍ¶ñÒâÈí¼þÀ´ÇÔÈ¡Êý¾ÝºÍ¼ÓÃÜÎļþ£¬°üÂÞ¼ÓÃÜ»õ±ÒÇ®°ü¡¢VPN¿Í»§¶ËÅäÖÃÊý¾Ý¡¢ÃÜÂë¹ÜÀíÆ÷Êý¾ÝºÍÌØ¶¨Îļþ¡£×îºó£¬EncryptHubʹÓûùÓÚPowerShellµÄ×Ô½ç˵¼ÓÃÜÆ÷ÐÎʽµÄÀÕË÷Èí¼þ£¬ÒªÇóÊܺ¦Õßͨ¹ýTelegramÖ§¸¶Êê½ð¡£Prodaft¾¯¸æËµ£¬EncryptHubÊÇÒ»¸öÀÏÁ·µÄÍþвÐÐΪÕߣ¬Äܹ»¶¨Öƹ¥»÷ÒÔÌá¸ßЧÂÊ£¬¶Ô´óÐÍ×éÖ¯Ôì³É¸ß¼ÛÖµµÄÆÆ»µ¡£
https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/