Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
Ðû²¼Ê±¼ä 2025-02-271. Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶
2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬2025Äê¶ÔNetflixÀ´Ëµ¿ÉνÊǼèÍÍÖ®¼Ê¡£¡£¡£Ê×ÏÈ£¬£¬£¬£¬£¬£¬ÃæÁÙÀ´×ÔDisney+¡¢HuluºÍMaxµÈ¾ºÕùƽ̨µÄÇ¿ÁÒ¾ºÕù£¬£¬£¬£¬£¬£¬Óû§Áô´æÂÊÏ»¬£¬£¬£¬£¬£¬£¬ÄÚÈÝÎüÒýÁ¦Ï÷Èõ£¬£¬£¬£¬£¬£¬¼ÓÖ®ÃÜÂë¹²ÏíÏÞÖÆºÍ¶©ÔļÛÇ®ÉÏÕÇÒý·¢Óû§²»Âú¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬£¬£¬NetflixµÄÆì½¢¾ç¼¯¡¶¹ÖÆæÎïÓï¡·×îºóÒ»¼¾£¨µÚÎå¼¾£©µÄÃô¸Ðϸ½ÚÒ²ÔâÓöÁËй¶¡£¡£¡£¾ÝNetflixƵµÀ±¨µÀ£¬£¬£¬£¬£¬£¬´Ë´ÎйÃÜ¿ÉÄÜÔ´×ÔÒ»¸öÄÚ²¿Æ½Ì¨£¬£¬£¬£¬£¬£¬¸Ãƽ̨ËäÊÜ»¥ÁªÍø»á¼ûÏÞÖÆ£¬£¬£¬£¬£¬£¬µ«ÈÔ±»Î´ÖªÖ°Ô±»ñÈ¡²¢Ð¹Â¶Á˰üÀ¨ÏÖʵͼƬ¡¢½ÇɫָÄÏ¡¢»Õ±ê¼°ÒÕÊõ¼ÒÒÕÊõ×÷Æ·µÈÔÚÄڵı£ÃÜÐÅÏ¢¡£¡£¡£Ð¹Â¶µÄÄÚÈÝÔÚÍøÉÏѸËÙÈö²¥£¬£¬£¬£¬£¬£¬ÉõÖÁÕ¹ÏÖÁËÖ÷ÒªÈËÎïµÄÔËÆø¡£¡£¡£Ö»¹ÜNetflixÕýͨ¹ýÖ´·¨ÊֶκÍDMCAɾ³ýÇëÇóÀ´ÏÞÖÆËðʧ£¬£¬£¬£¬£¬£¬µ«Ò»Ð©×¨ÃÅÌÖÂÛ¡¶¹ÖÆæÎïÓï¡·µÄÉ罻ýÌåÕË»§ÒÑ·ÖÏíÁËй¶ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÇÒNetflixһֱæÓÚÒªÇóÓû§É¾³ý½ÒÆÆÌû×Ó¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬NetflixÈ¥ÄêÒ²ÔøÔâÓö¹ýйÃÜÊÂÎñ£¬£¬£¬£¬£¬£¬Æäʱ¼¸²¿¶¯»ÏµÁеÄÕû¼¯±»²»·¨Ðû²¼ÔÚÍøÉÏ¡£¡£¡£
https://cybernews.com/news/netflix-stranger-things-leaks/
2. Southern Water³ÆBlack BastaÀÕË÷Èí¼þ¹¥»÷Ôì³É450ÍòÓ¢°÷Ëðʧ
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Ó¢¹ú¹©Ë®ÉÌSouthern WaterÔÚ2024Äê2ÔÂÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ëðʧ¸ß´ï450ÍòÓ¢°÷¡£¡£¡£×÷Ϊһ¼ÒΪӢ¸ñÀ¼Äϲ¿µØÇøÌṩ¹©Ë®ÓëÎÛË®´¦Öóͷ£Ð§À͵Ä˽Ӫ¹«ÓÃÊÂÒµ¹«Ë¾£¬£¬£¬£¬£¬£¬Southern Waterͨ¹ýÖØ´óµÄ¹ÜÍøÏµÍ³ÖðÈÕΪ270Íò¿Í»§Ìṩ¹©Ë®Ð§ÀÍ£¬£¬£¬£¬£¬£¬²¢ÎªÁè¼Ý470Íò¿Í»§ÌṩÎÛË®´¦Öóͷ£Ð§ÀÍ¡£¡£¡£´Ë´Î¹¥»÷ÓÉÎÛÃûÕÑÖøµÄBlack BastaÀÕË÷Èí¼þÍÅ»ïÉù³ÆÈÏÕæ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÒÔ¹¥»÷Òªº¦»ù´¡ÉèÊ©¶øÖø³Æ¡£¡£¡£Ö»¹ÜSouthern Water´ËÇ°ÔøÐû²¼ÔâÓöÇå¾²Îó²î£¬£¬£¬£¬£¬£¬µ«²¢Î´Ó°ÏìÆäÔËÓª¡¢²ÆÎñ»òÃæÏò¿Í»§µÄϵͳ¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö²¿·ÖЧÀÍÆ÷Êý¾Ý±»ÇÔÈ¡£¬£¬£¬£¬£¬£¬¹«Ë¾Îª´ËÔ¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼ÒºÍÖ´·¨ÕÕÁÏ£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁË¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£³ýÁËÖ±½Ó¾¼ÃËðʧÍ⣬£¬£¬£¬£¬£¬¸ÃÊÂÎñ»¹¿ÉÄÜ´øÀ´ÉùÓþË𺦡¢Ö´·¨ÓöȺÍî¿ÏµÉó²éµÈDZÔÚΣº¦¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬£¬Southern Water¾Ý³ÆÔøÌáÒéÏòÀÕË÷Èí¼þ·¸·¨·Ö×ÓÖ§¸¶75ÍòÓ¢°÷£¬£¬£¬£¬£¬£¬Ö»¹Ü¹¥»÷Õß×î³õÒªÇóÖ§¸¶¸ü¸ß½ð¶î¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬µ½2024Äê2ÔÂ⣬£¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄÌõÄ¿ÒÑ´ÓBlack BastaµÄÀÕË÷ÍøÕ¾ÉÑþ³Øý£¬£¬£¬£¬£¬£¬Õâ¿ÉÄÜÅúע˫·½ÒѸ濢ijÖÖÐÒé¡£¡£¡£
https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/
3. GrassCallÉç»á¹¤³Ì¹¥»÷£ºÊý°ÙÈ˼ÓÃÜÇ®±ÒÇ®°ü±»µÁ
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪCrazy EvilµÄ¶íÓïÍøÂç·¸·¨ÍÅ»ïͨ¹ý¶ñÒâµÄ¡°GrassCall¡±¾Û»áÓ¦ÓóÌÐòÌᳫÁËÒ»ÏîÕë¶ÔWeb3ÁìÓòÇóÖ°ÕßµÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¸ÃÍÅ»ïÓÕÆÇóÖ°ÕßÔÚWindowsºÍMac×°±¸ÉÏÏÂÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¸ÃÈí¼þÄܹ»ÇÔÈ¡ÃÜÂë¡¢Éí·ÝÑéÖ¤cookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£Êý°ÙÈËÒò´ËÊܺ¦£¬£¬£¬£¬£¬£¬Ò»Ð©È˵ÄÇ®°ü±»ÌͿա£¡£¡£¹¥»÷Õß½¨ÉèÁËÒ»¸öÐéαµÄÔÚÏß½ÇÉ«£¬£¬£¬£¬£¬£¬°üÀ¨ÍøÕ¾ºÍÉ罻ýÌå×ÊÁÏ£¬£¬£¬£¬£¬£¬Ã°³äÊÇÒ»¼ÒÃûΪ¡°ChainSeeker.io¡±µÄ¹«Ë¾£¬£¬£¬£¬£¬£¬²¢ÔÚLinkedInµÈÇóÖ°ÍøÕ¾ÉÏÐû²¼ÐéαÕÐÆ¸ÐÅÏ¢¡£¡£¡£Êܺ¦Õß»áÊÕµ½ÃæÊÔÔ¼Ç룬£¬£¬£¬£¬£¬²¢±»ÒªÇóͨ¹ýTelegramÁªÏµÊ×ϯӪÏú¹Ù£¬£¬£¬£¬£¬£¬ÏÂÔØ²¢Ê¹ÓÃGrassCallÊÓÆµ¾Û»áÈí¼þ¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¸ÃÈí¼þÏÖʵÉÏÊÇ֮ǰ»î¶¯ÖÐʹÓõġ°Gatherum¡±ÍøÕ¾µÄ¿Ë¡°æ£¬£¬£¬£¬£¬£¬»á×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»òÔ¶³Ì»á¼ûľÂí¡£¡£¡£ÔÚWindows×°±¸ÉÏ£¬£¬£¬£¬£¬£¬»á×°ÖÃRATºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬ÈçRhadamanthys£»£»£»ÔÚMacÉÏ£¬£¬£¬£¬£¬£¬»á×°ÖÃAtomic (AMOS) Stealer¶ñÒâÈí¼þ¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ»áʵÑéÆ¾Ö¤Òªº¦×Ö¡¢¼ÓÃÜÇ®±ÒÇ®°üµÈÐÅÏ¢À´ÇÔÈ¡Îļþ£¬£¬£¬£¬£¬£¬²¢½«±»µÁÐÅÏ¢ÉÏ´«ÖÁЧÀÍÆ÷µÄTelegramƵµÀ¡£¡£¡£Crazy Evil³ÉÔ±´Óÿ¸öÀÖ³ÉÆÈ¡µÄÊܺ¦ÕßÉíÉÏ׬ȡÊýÍòÉõÖÁÊýÊ®ÍòÃÀÔª¡£¡£¡£
https://www.bleepingcomputer.com/news/security/grasscall-malware-campaign-drains-crypto-wallets-via-fake-job-interviews/
4. °Ä´óÀûÑÇIVF¾ÞÍ·GeneaÔâTermiteÀÕË÷Èí¼þ¹¥»÷
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬°Ä´óÀûÑÇ×î´óµÄÉúÓýЧÀÍÌṩÉÌÖ®Ò»GeneaÔâÓöÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡£¡£¡£¾Ý°Ä´óÀûÑǹú¼Ò¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬£¬£¬£¬GeneaÔڸùúÉúÓýЧÀÍÐÐÒµÖÐÕ¼ÓÐÖ÷Ҫְ룬£¬£¬£¬£¬£¬ÓëÁíÍâÁ½¼Ò¹«Ë¾ÅäºÏÕ¼ÓÐÁè¼Ý80%µÄÊг¡·Ý¶î¡£¡£¡£´Ë´Î¹¥»÷ÊÂÎñºó£¬£¬£¬£¬£¬£¬GeneaÈ·ÈϹ¥»÷ÕßÒÑÇÔÈ¡ÆäϵͳÖеÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÔÚÍøÉÏÐû²¼¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýCitrixЧÀÍÆ÷ÓÚ2025Äê1ÔÂ31ÈÕ½øÈëGeneaÍøÂ磬£¬£¬£¬£¬£¬Ëæºó»ñÈ¡ÁËÖ÷ÎļþЧÀÍÆ÷¡¢Óò¿ØÖÆÆ÷µÈµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢ÔÚ2ÔÂ14ÈÕ½«940.7GBµÄÊý¾ÝÇÔÈ¡ÖÁÆä¿ØÖƵÄÔÆÐ§ÀÍÆ÷ÖС£¡£¡£ÊÜËðµÄ»¼ÕßÖÎÀíϵͳÖаüÀ¨Ð¡ÎÒ˽¼ÒºÍ¿µ½¡Êý¾Ý£¬£¬£¬£¬£¬£¬ÈçÈ«Ãû¡¢µØµã¡¢Ò½ÁƼͼµÈ£¬£¬£¬£¬£¬£¬µ«ÐÅÓÿ¨ÐÅÏ¢µÈ²ÆÎñÐÅϢδÊÜÓ°Ïì¡£¡£¡£ËäÈ»GeneaδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬£¬£¬£¬µ«TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÉù³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˾ݳƴÓGeneaÍøÂçÖÐÇÔÈ¡µÄÊý¾Ý½ØÍ¼¡£¡£¡£TermiteÀÕË÷Èí¼þÍÅ»ï×ÔÈ¥Äê10ÔÂÖÐÑ®·ºÆðÒÔÀ´£¬£¬£¬£¬£¬£¬ÒÑÓжàÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬»¹ÔøÉù³Æ¹¥ÆÆÁËÈ«Çò¹©Ó¦Á´Èí¼þÌṩÉÌBlue YonderµÄÍøÂç¡£¡£¡£
https://www.bleepingcomputer.com/news/security/australian-ivf-giant-genea-breached-by-termite-ransomware-gang/
5. automslc¶ñÒâPyPi°ü£ºÀÄÓÃDeezerƾ֤ʵÏÖ´ó¹æÄ£ÒôÀÖµÁ°æ
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬×Ô2019ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°automslc¡±µÄ¶ñÒâPyPi°üÒѱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬£¬£¬£¬£¬¸Ã°üÀÄÓÃÓ²±àÂëÆ¾Ö¤´ÓDeezerÒôÀÖÁ÷ýÌåЧÀÍÖеÁ°æÒôÀÖ¡£¡£¡£DeezerÊÇÒ»ÏîÁýÕÖ180¸ö¹ú¼Ò/µØÇø¡¢ÌṩÁè¼Ý9000ÍòÊ×ÇúÄ¿µÄЧÀÍ¡£¡£¡£Çå¾²¹«Ë¾Socket·¢Ã÷ÁËÕâ¸ö¶ñÒâ°ü£¬£¬£¬£¬£¬£¬Ëüͨ¹ýÓ²±àÂëµÄDeezerƾ֤ÏÂÔØÃ½Ì岢ץȡԪÊý¾Ý£¬£¬£¬£¬£¬£¬Î¥·´ÁËDeezerµÄЧÀÍÌõ¿îºÍ°æÈ¨·¨¡£¡£¡£automslcʹÓÃÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¾ÙÐм¯ÖпØÖÆ£¬£¬£¬£¬£¬£¬¿ÉÄܽ«Óû§ÄÉÈëÂþÑÜÊ½ÍøÂ磬£¬£¬£¬£¬£¬²¢ÈÝÒ×±»ÓÃÓÚÆäËû¶ñÒâ»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þ°ü°üÀ¨Ó²±àÂëµÄDeezerÕÊ»§Æ¾Ö¤£¬£¬£¬£¬£¬£¬ÓÃÓڵǼЧÀͲ¢ÇëÇ´Ôð³¤Á÷ýÌåURL£¬£¬£¬£¬£¬£¬Èƹý30ÃëÔ¤ÀÀÏÞÖÆ£¬£¬£¬£¬£¬£¬ÒÔ¸ßÖÊÁ¿ÃûÌÃÍâµØ´æ´¢ÒôƵÎļþ£¬£¬£¬£¬£¬£¬ÔÊÐíÀëÏßÊÕÌýºÍ·Ö·¢¡£¡£¡£Ö»¹ÜµÁ°æ¹¤¾ßͨ³£²»±»ÊÓΪ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬µ«automslcµÄʹÓÿÉÄÜÈÃÓû§ÃæÁÙÖ´·¨Î£º¦ºÍδÀ´¸ü¶à¶ñÒâÐÐΪµÄΣº¦¡£¡£¡£SocketÔÚÖÖÖÖÕË»§ºÍGitHub´æ´¢¿âÖз¢Ã÷ÁËÓë¸ÃÈí¼þ°üÏà¹ØµÄÓÖÃû£¬£¬£¬£¬£¬£¬µ«Ö÷ıµÄÉí·ÝÉв»ÇåÎú¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬½¨ÒéÓû§×èֹʹÓÃautomslc£¬£¬£¬£¬£¬£¬ÒÔÃâ¾íÈë²»·¨»î¶¯¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pypi-package-with-100k-installs-pirated-music-from-deezer-for-years/
6. EncryptHubÈëÇÖ618¸ö×éÖ¯£¬£¬£¬£¬£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬×Ô2024Äê6ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪEncryptHub£¨ÓÖÃûLarva-208£©µÄÍþвÐÐΪÕßͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬Ãé׼ȫÇò×éÖ¯ÒÔ»ñÈ¡ÆóÒµÍøÂç»á¼ûȨÏÞ¡£¡£¡£¾ÝProdaft±¨¸æ£¬£¬£¬£¬£¬£¬EncryptHubÒѹ¥»÷ÖÁÉÙ618¸ö×éÖ¯£¬£¬£¬£¬£¬£¬²¢ÔÚ»ñµÃ»á¼ûȨÏÞºó×°ÖÃÔ¶³Ì¼à¿ØºÍÖÎÀíÈí¼þ£¬£¬£¬£¬£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ¡£¡£¡£¸ÃÍþв×éÖ¯ÓëRansomHubºÍBlackSuitÓйØÁª£¬£¬£¬£¬£¬£¬²¢Î¬»¤ÁË×Ô¼ºµÄ×Ô½ç˵PowerShellÊý¾Ý¼ÓÃÜÆ÷¡£¡£¡£EncryptHubʹÓöÌÐÅ¡¢ÓïÒôÍøÂç´¹ÂÚºÍÐéαµÇÂ¼Ò³ÃæµÈÊֶλñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¹ºÖÃÁËÁè¼Ý70¸öÄ£ÄâÆóÒµVPN²úÆ·µÄÓòÃûÀ´ÔöÌí´¹ÂÚÒ³ÃæµÄÕýµ±ÐÔ¡£¡£¡£ÁíÒ»¸ö±»×·×ÙΪLarva-148µÄ×Ó×éÖ¯¿ÉÄÜÏòEncryptHub³öÊÛÓòÃûºÍÍøÂç´¹ÂÚ¹¤¾ß°ü¡£¡£¡£Ò»µ©¹¥ÆÆÄ¿µÄϵͳ£¬£¬£¬£¬£¬£¬EncryptHub»á°²ÅÅÖÖÖÖPowerShell¾ç±¾ºÍ¶ñÒâÈí¼þÀ´ÇÔÈ¡Êý¾ÝºÍ¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬°üÀ¨¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN¿Í»§¶ËÉèÖÃÊý¾Ý¡¢ÃÜÂëÖÎÀíÆ÷Êý¾ÝºÍÌØ¶¨Îļþ¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬EncryptHubʹÓûùÓÚPowerShellµÄ×Ô½ç˵¼ÓÃÜÆ÷ÐÎʽµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬ÒªÇóÊܺ¦Õßͨ¹ýTelegramÖ§¸¶Êê½ð¡£¡£¡£ProdaftÖÒÑÔ˵£¬£¬£¬£¬£¬£¬EncryptHubÊÇÒ»¸öÀÏÁ·µÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬Äܹ»¶¨Öƹ¥»÷ÒÔÌá¸ßЧÂÊ£¬£¬£¬£¬£¬£¬¶Ô´óÐÍ×éÖ¯Ôì³É¸ß¼ÛÖµµÄÆÆË𡣡£¡£
https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ