Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶

Ðû²¼Ê±¼ä 2025-02-27

1. Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶


2ÔÂ25ÈÕ£¬£¬£¬2025Äê¶ÔNetflixÀ´Ëµ¿ÉνÊǼèÍÍÖ®¼Ê¡£¡£¡£Ê×ÏÈ£¬£¬£¬ÃæÁÙÀ´×ÔDisney+¡¢HuluºÍMaxµÈ¾ºÕùƽ̨µÄÇ¿ÁÒ¾ºÕù£¬£¬£¬Óû§Áô´æÂÊÏ»¬£¬£¬£¬ÄÚÈÝÎüÒýÁ¦Ï÷Èõ£¬£¬£¬¼ÓÖ®ÃÜÂë¹²ÏíÏÞÖÆºÍ¶©ÔļÛÇ®ÉÏÕÇÒý·¢Óû§²»Âú¡£¡£¡£¿ËÈÕ£¬£¬£¬NetflixµÄÆì½¢¾ç¼¯¡¶¹ÖÆæÎïÓï¡·×îºóÒ»¼¾£¨µÚÎå¼¾£©µÄÃô¸Ðϸ½ÚÒ²ÔâÓöÁËй¶¡£¡£¡£¾ÝNetflixƵµÀ±¨µÀ£¬£¬£¬´Ë´ÎйÃÜ¿ÉÄÜÔ´×ÔÒ»¸öÄÚ²¿Æ½Ì¨£¬£¬£¬¸Ãƽ̨ËäÊÜ»¥ÁªÍø»á¼ûÏÞÖÆ£¬£¬£¬µ«ÈÔ±»Î´ÖªÖ°Ô±»ñÈ¡²¢Ð¹Â¶Á˰üÀ¨ÏÖʵͼƬ¡¢½ÇɫָÄÏ¡¢»Õ±ê¼°ÒÕÊõ¼ÒÒÕÊõ×÷Æ·µÈÔÚÄڵı£ÃÜÐÅÏ¢¡£¡£¡£Ð¹Â¶µÄÄÚÈÝÔÚÍøÉÏѸËÙÈö²¥£¬£¬£¬ÉõÖÁÕ¹ÏÖÁËÖ÷ÒªÈËÎïµÄÔËÆø¡£¡£¡£Ö»¹ÜNetflixÕýͨ¹ýÖ´·¨ÊֶκÍDMCAɾ³ýÇëÇóÀ´ÏÞÖÆËðʧ£¬£¬£¬µ«Ò»Ð©×¨ÃÅÌÖÂÛ¡¶¹ÖÆæÎïÓï¡·µÄÉ罻ýÌåÕË»§ÒÑ·ÖÏíÁËй¶ÐÅÏ¢£¬£¬£¬ÇÒNetflixһֱæÓÚÒªÇóÓû§É¾³ý½ÒÆÆÌû×Ó¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬NetflixÈ¥ÄêÒ²ÔøÔâÓö¹ýйÃÜÊÂÎñ£¬£¬£¬Æäʱ¼¸²¿¶¯»­ÏµÁеÄÕû¼¯±»²»·¨Ðû²¼ÔÚÍøÉÏ¡£¡£¡£


https://cybernews.com/news/netflix-stranger-things-leaks/


2. Southern Water³ÆBlack BastaÀÕË÷Èí¼þ¹¥»÷Ôì³É450ÍòÓ¢°÷Ëðʧ


2ÔÂ26ÈÕ£¬£¬£¬Ó¢¹ú¹©Ë®ÉÌSouthern WaterÔÚ2024Äê2ÔÂÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬Ëðʧ¸ß´ï450ÍòÓ¢°÷¡£¡£¡£×÷Ϊһ¼ÒΪӢ¸ñÀ¼Äϲ¿µØÇøÌṩ¹©Ë®ÓëÎÛË®´¦Öóͷ£Ð§À͵Ä˽Ӫ¹«ÓÃÊÂÒµ¹«Ë¾£¬£¬£¬Southern Waterͨ¹ýÖØ´óµÄ¹ÜÍøÏµÍ³ÖðÈÕΪ270Íò¿Í»§Ìṩ¹©Ë®Ð§ÀÍ£¬£¬£¬²¢ÎªÁè¼Ý470Íò¿Í»§ÌṩÎÛË®´¦Öóͷ£Ð§ÀÍ¡£¡£¡£´Ë´Î¹¥»÷ÓÉÎÛÃûÕÑÖøµÄBlack BastaÀÕË÷Èí¼þÍÅ»ïÉù³ÆÈÏÕæ£¬£¬£¬¸ÃÍÅ»ïÒÔ¹¥»÷Òªº¦»ù´¡ÉèÊ©¶øÖø³Æ¡£¡£¡£Ö»¹ÜSouthern Water´ËÇ°ÔøÐû²¼ÔâÓöÇå¾²Îó²î£¬£¬£¬µ«²¢Î´Ó°ÏìÆäÔËÓª¡¢²ÆÎñ»òÃæÏò¿Í»§µÄϵͳ¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö²¿·ÖЧÀÍÆ÷Êý¾Ý±»ÇÔÈ¡£¬£¬£¬¹«Ë¾Îª´ËÔ¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼ÒºÍÖ´·¨ÕÕÁÏ£¬£¬£¬²¢Í¨ÖªÁË¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£³ýÁËÖ±½Ó¾­¼ÃËðʧÍ⣬£¬£¬¸ÃÊÂÎñ»¹¿ÉÄÜ´øÀ´ÉùÓþË𺦡¢Ö´·¨ÓöȺÍî¿ÏµÉó²éµÈDZÔÚΣº¦¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬Southern Water¾Ý³ÆÔøÌáÒéÏòÀÕË÷Èí¼þ·¸·¨·Ö×ÓÖ§¸¶75ÍòÓ¢°÷£¬£¬£¬Ö»¹Ü¹¥»÷Õß×î³õÒªÇóÖ§¸¶¸ü¸ß½ð¶î¡£¡£¡£È»¶ø£¬£¬£¬µ½2024Äê2ÔÂ⣬£¬£¬¸Ã¹«Ë¾µÄÌõÄ¿ÒÑ´ÓBlack BastaµÄÀÕË÷ÍøÕ¾ÉÑþ³Øý£¬£¬£¬Õâ¿ÉÄÜÅúע˫·½ÒѸ濢ijÖÖЭÒé¡£¡£¡£


https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/


3. GrassCallÉç»á¹¤³Ì¹¥»÷£ºÊý°ÙÈ˼ÓÃÜÇ®±ÒÇ®°ü±»µÁ


2ÔÂ26ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Ò»¸öÃûΪCrazy EvilµÄ¶íÓïÍøÂç·¸·¨ÍÅ»ïͨ¹ý¶ñÒâµÄ¡°GrassCall¡±¾Û»áÓ¦ÓóÌÐòÌᳫÁËÒ»ÏîÕë¶ÔWeb3ÁìÓòÇóÖ°ÕßµÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¸ÃÍÅ»ïÓÕÆ­ÇóÖ°ÕßÔÚWindowsºÍMac×°±¸ÉÏÏÂÔØ¶ñÒâÈí¼þ£¬£¬£¬¸ÃÈí¼þÄܹ»ÇÔÈ¡ÃÜÂë¡¢Éí·ÝÑéÖ¤cookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£Êý°ÙÈËÒò´ËÊܺ¦£¬£¬£¬Ò»Ð©È˵ÄÇ®°ü±»ÌͿա£¡£¡£¹¥»÷Õß½¨ÉèÁËÒ»¸öÐéαµÄÔÚÏß½ÇÉ«£¬£¬£¬°üÀ¨ÍøÕ¾ºÍÉ罻ýÌå×ÊÁÏ£¬£¬£¬Ã°³äÊÇÒ»¼ÒÃûΪ¡°ChainSeeker.io¡±µÄ¹«Ë¾£¬£¬£¬²¢ÔÚLinkedInµÈÇóÖ°ÍøÕ¾ÉÏÐû²¼ÐéαÕÐÆ¸ÐÅÏ¢¡£¡£¡£Êܺ¦Õß»áÊÕµ½ÃæÊÔÔ¼Ç룬£¬£¬²¢±»ÒªÇóͨ¹ýTelegramÁªÏµÊ×ϯӪÏú¹Ù£¬£¬£¬ÏÂÔØ²¢Ê¹ÓÃGrassCallÊÓÆµ¾Û»áÈí¼þ¡£¡£¡£È»¶ø£¬£¬£¬¸ÃÈí¼þÏÖʵÉÏÊÇ֮ǰ»î¶¯ÖÐʹÓõġ°Gatherum¡±ÍøÕ¾µÄ¿Ë¡°æ£¬£¬£¬»á×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»òÔ¶³Ì»á¼ûľÂí¡£¡£¡£ÔÚWindows×°±¸ÉÏ£¬£¬£¬»á×°ÖÃRATºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬ÈçRhadamanthys£»£»£»ÔÚMacÉÏ£¬£¬£¬»á×°ÖÃAtomic (AMOS) Stealer¶ñÒâÈí¼þ¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ»áʵÑéÆ¾Ö¤Òªº¦×Ö¡¢¼ÓÃÜÇ®±ÒÇ®°üµÈÐÅÏ¢À´ÇÔÈ¡Îļþ£¬£¬£¬²¢½«±»µÁÐÅÏ¢ÉÏ´«ÖÁЧÀÍÆ÷µÄTelegramƵµÀ¡£¡£¡£Crazy Evil³ÉÔ±´Óÿ¸öÀֳɯ­È¡µÄÊܺ¦ÕßÉíÉÏ׬ȡÊýÍòÉõÖÁÊýÊ®ÍòÃÀÔª¡£¡£¡£


https://www.bleepingcomputer.com/news/security/grasscall-malware-campaign-drains-crypto-wallets-via-fake-job-interviews/


4. °Ä´óÀûÑÇIVF¾ÞÍ·GeneaÔâTermiteÀÕË÷Èí¼þ¹¥»÷


2ÔÂ26ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬°Ä´óÀûÑÇ×î´óµÄÉúÓýЧÀÍÌṩÉÌÖ®Ò»GeneaÔâÓöÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡£¡£¡£¾Ý°Ä´óÀûÑǹú¼Ò¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬GeneaÔڸùúÉúÓýЧÀÍÐÐÒµÖÐÕ¼ÓÐÖ÷Ҫְ룬£¬£¬ÓëÁíÍâÁ½¼Ò¹«Ë¾ÅäºÏÕ¼ÓÐÁè¼Ý80%µÄÊг¡·Ý¶î¡£¡£¡£´Ë´Î¹¥»÷ÊÂÎñºó£¬£¬£¬GeneaÈ·ÈϹ¥»÷ÕßÒÑÇÔÈ¡ÆäϵͳÖеÄÊý¾Ý£¬£¬£¬²¢ÔÚÍøÉÏÐû²¼¡£¡£¡£¾ÝÊӲ죬£¬£¬¹¥»÷Õßͨ¹ýCitrixЧÀÍÆ÷ÓÚ2025Äê1ÔÂ31ÈÕ½øÈëGeneaÍøÂ磬£¬£¬Ëæºó»ñÈ¡ÁËÖ÷ÎļþЧÀÍÆ÷¡¢Óò¿ØÖÆÆ÷µÈµÄ»á¼ûȨÏÞ£¬£¬£¬²¢ÔÚ2ÔÂ14ÈÕ½«940.7GBµÄÊý¾ÝÇÔÈ¡ÖÁÆä¿ØÖƵÄÔÆÐ§ÀÍÆ÷ÖС£¡£¡£ÊÜËðµÄ»¼ÕßÖÎÀíϵͳÖаüÀ¨Ð¡ÎÒ˽¼ÒºÍ¿µ½¡Êý¾Ý£¬£¬£¬ÈçÈ«Ãû¡¢µØµã¡¢Ò½ÁƼͼµÈ£¬£¬£¬µ«ÐÅÓÿ¨ÐÅÏ¢µÈ²ÆÎñÐÅϢδÊÜÓ°Ïì¡£¡£¡£ËäÈ»GeneaδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬µ«TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÉù³Æ¶Ô´ËÈÏÕæ£¬£¬£¬²¢ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˾ݳƴÓGeneaÍøÂçÖÐÇÔÈ¡µÄÊý¾Ý½ØÍ¼¡£¡£¡£TermiteÀÕË÷Èí¼þÍÅ»ï×ÔÈ¥Äê10ÔÂÖÐÑ®·ºÆðÒÔÀ´£¬£¬£¬ÒÑÓжàÃûÊܺ¦Õߣ¬£¬£¬»¹ÔøÉù³Æ¹¥ÆÆÁËÈ«Çò¹©Ó¦Á´Èí¼þÌṩÉÌBlue YonderµÄÍøÂç¡£¡£¡£


https://www.bleepingcomputer.com/news/security/australian-ivf-giant-genea-breached-by-termite-ransomware-gang/


5. automslc¶ñÒâPyPi°ü£ºÀÄÓÃDeezerƾ֤ʵÏÖ´ó¹æÄ£ÒôÀÖµÁ°æ


2ÔÂ26ÈÕ£¬£¬£¬×Ô2019ÄêÒÔÀ´£¬£¬£¬Ò»¸öÃûΪ¡°automslc¡±µÄ¶ñÒâPyPi°üÒѱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬£¬¸Ã°üÀÄÓÃÓ²±àÂëÆ¾Ö¤´ÓDeezerÒôÀÖÁ÷ýÌåЧÀÍÖеÁ°æÒôÀÖ¡£¡£¡£DeezerÊÇÒ»ÏîÁýÕÖ180¸ö¹ú¼Ò/µØÇø¡¢ÌṩÁè¼Ý9000ÍòÊ×ÇúÄ¿µÄЧÀÍ¡£¡£¡£Çå¾²¹«Ë¾Socket·¢Ã÷ÁËÕâ¸ö¶ñÒâ°ü£¬£¬£¬Ëüͨ¹ýÓ²±àÂëµÄDeezerƾ֤ÏÂÔØÃ½Ì岢ץȡԪÊý¾Ý£¬£¬£¬Î¥·´ÁËDeezerµÄЧÀÍÌõ¿îºÍ°æÈ¨·¨¡£¡£¡£automslcʹÓÃÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¾ÙÐм¯ÖпØÖÆ£¬£¬£¬¿ÉÄܽ«Óû§ÄÉÈëÂþÑÜÊ½ÍøÂ磬£¬£¬²¢ÈÝÒ×±»ÓÃÓÚÆäËû¶ñÒâ»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þ°ü°üÀ¨Ó²±àÂëµÄDeezerÕÊ»§Æ¾Ö¤£¬£¬£¬ÓÃÓڵǼЧÀͲ¢ÇëÇ´Ôð³¤Á÷ýÌåURL£¬£¬£¬Èƹý30ÃëÔ¤ÀÀÏÞÖÆ£¬£¬£¬ÒÔ¸ßÖÊÁ¿ÃûÌÃÍâµØ´æ´¢ÒôƵÎļþ£¬£¬£¬ÔÊÐíÀëÏßÊÕÌýºÍ·Ö·¢¡£¡£¡£Ö»¹ÜµÁ°æ¹¤¾ßͨ³£²»±»ÊÓΪ¶ñÒâÈí¼þ£¬£¬£¬µ«automslcµÄʹÓÿÉÄÜÈÃÓû§ÃæÁÙÖ´·¨Î£º¦ºÍδÀ´¸ü¶à¶ñÒâÐÐΪµÄΣº¦¡£¡£¡£SocketÔÚÖÖÖÖÕË»§ºÍGitHub´æ´¢¿âÖз¢Ã÷ÁËÓë¸ÃÈí¼þ°üÏà¹ØµÄÓÖÃû£¬£¬£¬µ«Ö÷ıµÄÉí·ÝÉв»ÇåÎú¡£¡£¡£Òò´Ë£¬£¬£¬½¨ÒéÓû§×èֹʹÓÃautomslc£¬£¬£¬ÒÔÃâ¾íÈë²»·¨»î¶¯¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pypi-package-with-100k-installs-pirated-music-from-deezer-for-years/


6. EncryptHubÈëÇÖ618¸ö×éÖ¯£¬£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ


2ÔÂ26ÈÕ£¬£¬£¬×Ô2024Äê6ÔÂÒÔÀ´£¬£¬£¬Ò»¸öÃûΪEncryptHub£¨ÓÖÃûLarva-208£©µÄÍþвÐÐΪÕßͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬Ãé׼ȫÇò×éÖ¯ÒÔ»ñÈ¡ÆóÒµÍøÂç»á¼ûȨÏÞ¡£¡£¡£¾ÝProdaft±¨¸æ£¬£¬£¬EncryptHubÒѹ¥»÷ÖÁÉÙ618¸ö×éÖ¯£¬£¬£¬²¢ÔÚ»ñµÃ»á¼ûȨÏÞºó×°ÖÃÔ¶³Ì¼à¿ØºÍÖÎÀíÈí¼þ£¬£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ¡£¡£¡£¸ÃÍþв×éÖ¯ÓëRansomHubºÍBlackSuitÓйØÁª£¬£¬£¬²¢Î¬»¤ÁË×Ô¼ºµÄ×Ô½ç˵PowerShellÊý¾Ý¼ÓÃÜÆ÷¡£¡£¡£EncryptHubʹÓöÌÐÅ¡¢ÓïÒôÍøÂç´¹ÂÚºÍÐéαµÇÂ¼Ò³ÃæµÈÊֶλñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬¹ºÖÃÁËÁè¼Ý70¸öÄ£ÄâÆóÒµVPN²úÆ·µÄÓòÃûÀ´ÔöÌí´¹ÂÚÒ³ÃæµÄÕýµ±ÐÔ¡£¡£¡£ÁíÒ»¸ö±»×·×ÙΪLarva-148µÄ×Ó×éÖ¯¿ÉÄÜÏòEncryptHub³öÊÛÓòÃûºÍÍøÂç´¹ÂÚ¹¤¾ß°ü¡£¡£¡£Ò»µ©¹¥ÆÆÄ¿µÄϵͳ£¬£¬£¬EncryptHub»á°²ÅÅÖÖÖÖPowerShell¾ç±¾ºÍ¶ñÒâÈí¼þÀ´ÇÔÈ¡Êý¾ÝºÍ¼ÓÃÜÎļþ£¬£¬£¬°üÀ¨¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN¿Í»§¶ËÉèÖÃÊý¾Ý¡¢ÃÜÂëÖÎÀíÆ÷Êý¾ÝºÍÌØ¶¨Îļþ¡£¡£¡£×îºó£¬£¬£¬EncryptHubʹÓûùÓÚPowerShellµÄ×Ô½ç˵¼ÓÃÜÆ÷ÐÎʽµÄÀÕË÷Èí¼þ£¬£¬£¬ÒªÇóÊܺ¦Õßͨ¹ýTelegramÖ§¸¶Êê½ð¡£¡£¡£ProdaftÖÒÑÔ˵£¬£¬£¬EncryptHubÊÇÒ»¸öÀÏÁ·µÄÍþвÐÐΪÕߣ¬£¬£¬Äܹ»¶¨Öƹ¥»÷ÒÔÌá¸ßЧÂÊ£¬£¬£¬¶Ô´óÐÍ×éÖ¯Ôì³É¸ß¼ÛÖµµÄÆÆË𡣡£¡£


https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/