Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶

Ðû²¼Ê±¼ä 2025-02-27

1. Netflix¡¶¹ÖÆæÎïÓï¡·×îÖÕ¼¾Ãô¸Ðϸ½ÚÔâй¶


2ÔÂ25ÈÕ£¬£¬£¬£¬£¬ £¬2025Äê¶ÔNetflixÀ´Ëµ¿ÉνÊǼèÍÍÖ®¼Ê¡£¡£¡£Ê×ÏÈ£¬£¬£¬£¬£¬ £¬ÃæÁÙÀ´×ÔDisney+¡¢HuluºÍMaxµÈ¾ºÕùƽ̨µÄÇ¿ÁÒ¾ºÕù£¬£¬£¬£¬£¬ £¬Óû§Áô´æÂÊÏ»¬£¬£¬£¬£¬£¬ £¬ÄÚÈÝÎüÒýÁ¦Ï÷Èõ£¬£¬£¬£¬£¬ £¬¼ÓÖ®ÃÜÂë¹²ÏíÏÞÖÆºÍ¶©ÔļÛÇ®ÉÏÕÇÒý·¢Óû§²»Âú¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬£¬ £¬NetflixµÄÆì½¢¾ç¼¯¡¶¹ÖÆæÎïÓï¡·×îºóÒ»¼¾£¨µÚÎå¼¾£©µÄÃô¸Ðϸ½ÚÒ²ÔâÓöÁËй¶¡£¡£¡£¾ÝNetflixƵµÀ±¨µÀ£¬£¬£¬£¬£¬ £¬´Ë´ÎйÃÜ¿ÉÄÜÔ´×ÔÒ»¸öÄÚ²¿Æ½Ì¨£¬£¬£¬£¬£¬ £¬¸Ãƽ̨ËäÊÜ»¥ÁªÍø»á¼ûÏÞÖÆ£¬£¬£¬£¬£¬ £¬µ«ÈÔ±»Î´ÖªÖ°Ô±»ñÈ¡²¢Ð¹Â¶Á˰üÀ¨ÏÖʵͼƬ¡¢½ÇɫָÄÏ¡¢»Õ±ê¼°ÒÕÊõ¼ÒÒÕÊõ×÷Æ·µÈÔÚÄڵı£ÃÜÐÅÏ¢¡£¡£¡£Ð¹Â¶µÄÄÚÈÝÔÚÍøÉÏѸËÙÈö²¥£¬£¬£¬£¬£¬ £¬ÉõÖÁÕ¹ÏÖÁËÖ÷ÒªÈËÎïµÄÔËÆø¡£¡£¡£Ö»¹ÜNetflixÕýͨ¹ýÖ´·¨ÊֶκÍDMCAɾ³ýÇëÇóÀ´ÏÞÖÆËðʧ£¬£¬£¬£¬£¬ £¬µ«Ò»Ð©×¨ÃÅÌÖÂÛ¡¶¹ÖÆæÎïÓï¡·µÄÉ罻ýÌåÕË»§ÒÑ·ÖÏíÁËй¶ÐÅÏ¢£¬£¬£¬£¬£¬ £¬ÇÒNetflixһֱæÓÚÒªÇóÓû§É¾³ý½ÒÆÆÌû×Ó¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬NetflixÈ¥ÄêÒ²ÔøÔâÓö¹ýйÃÜÊÂÎñ£¬£¬£¬£¬£¬ £¬Æäʱ¼¸²¿¶¯»­ÏµÁеÄÕû¼¯±»²»·¨Ðû²¼ÔÚÍøÉÏ¡£¡£¡£


https://cybernews.com/news/netflix-stranger-things-leaks/


2. Southern Water³ÆBlack BastaÀÕË÷Èí¼þ¹¥»÷Ôì³É450ÍòÓ¢°÷Ëðʧ


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬Ó¢¹ú¹©Ë®ÉÌSouthern WaterÔÚ2024Äê2ÔÂÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬Ëðʧ¸ß´ï450ÍòÓ¢°÷¡£¡£¡£×÷Ϊһ¼ÒΪӢ¸ñÀ¼Äϲ¿µØÇøÌṩ¹©Ë®ÓëÎÛË®´¦Öóͷ£Ð§À͵Ä˽Ӫ¹«ÓÃÊÂÒµ¹«Ë¾£¬£¬£¬£¬£¬ £¬Southern Waterͨ¹ýÖØ´óµÄ¹ÜÍøÏµÍ³ÖðÈÕΪ270Íò¿Í»§Ìṩ¹©Ë®Ð§ÀÍ£¬£¬£¬£¬£¬ £¬²¢ÎªÁè¼Ý470Íò¿Í»§ÌṩÎÛË®´¦Öóͷ£Ð§ÀÍ¡£¡£¡£´Ë´Î¹¥»÷ÓÉÎÛÃûÕÑÖøµÄBlack BastaÀÕË÷Èí¼þÍÅ»ïÉù³ÆÈÏÕæ£¬£¬£¬£¬£¬ £¬¸ÃÍÅ»ïÒÔ¹¥»÷Òªº¦»ù´¡ÉèÊ©¶øÖø³Æ¡£¡£¡£Ö»¹ÜSouthern Water´ËÇ°ÔøÐû²¼ÔâÓöÇå¾²Îó²î£¬£¬£¬£¬£¬ £¬µ«²¢Î´Ó°ÏìÆäÔËÓª¡¢²ÆÎñ»òÃæÏò¿Í»§µÄϵͳ¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö²¿·ÖЧÀÍÆ÷Êý¾Ý±»ÇÔÈ¡£¬£¬£¬£¬£¬ £¬¹«Ë¾Îª´ËÔ¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼ÒºÍÖ´·¨ÕÕÁÏ£¬£¬£¬£¬£¬ £¬²¢Í¨ÖªÁË¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£³ýÁËÖ±½Ó¾­¼ÃËðʧÍ⣬£¬£¬£¬£¬ £¬¸ÃÊÂÎñ»¹¿ÉÄÜ´øÀ´ÉùÓþË𺦡¢Ö´·¨ÓöȺÍî¿ÏµÉó²éµÈDZÔÚΣº¦¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬ £¬Southern Water¾Ý³ÆÔøÌáÒéÏòÀÕË÷Èí¼þ·¸·¨·Ö×ÓÖ§¸¶75ÍòÓ¢°÷£¬£¬£¬£¬£¬ £¬Ö»¹Ü¹¥»÷Õß×î³õÒªÇóÖ§¸¶¸ü¸ß½ð¶î¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ £¬µ½2024Äê2ÔÂ⣬£¬£¬£¬£¬ £¬¸Ã¹«Ë¾µÄÌõÄ¿ÒÑ´ÓBlack BastaµÄÀÕË÷ÍøÕ¾ÉÑþ³Øý£¬£¬£¬£¬£¬ £¬Õâ¿ÉÄÜÅúע˫·½ÒѸ濢ijÖÖЭÒé¡£¡£¡£


https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/


3. GrassCallÉç»á¹¤³Ì¹¥»÷£ºÊý°ÙÈ˼ÓÃÜÇ®±ÒÇ®°ü±»µÁ


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬½üÆÚ£¬£¬£¬£¬£¬ £¬Ò»¸öÃûΪCrazy EvilµÄ¶íÓïÍøÂç·¸·¨ÍÅ»ïͨ¹ý¶ñÒâµÄ¡°GrassCall¡±¾Û»áÓ¦ÓóÌÐòÌᳫÁËÒ»ÏîÕë¶ÔWeb3ÁìÓòÇóÖ°ÕßµÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¸ÃÍÅ»ïÓÕÆ­ÇóÖ°ÕßÔÚWindowsºÍMac×°±¸ÉÏÏÂÔØ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ £¬¸ÃÈí¼þÄܹ»ÇÔÈ¡ÃÜÂë¡¢Éí·ÝÑéÖ¤cookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£Êý°ÙÈËÒò´ËÊܺ¦£¬£¬£¬£¬£¬ £¬Ò»Ð©È˵ÄÇ®°ü±»ÌͿա£¡£¡£¹¥»÷Õß½¨ÉèÁËÒ»¸öÐéαµÄÔÚÏß½ÇÉ«£¬£¬£¬£¬£¬ £¬°üÀ¨ÍøÕ¾ºÍÉ罻ýÌå×ÊÁÏ£¬£¬£¬£¬£¬ £¬Ã°³äÊÇÒ»¼ÒÃûΪ¡°ChainSeeker.io¡±µÄ¹«Ë¾£¬£¬£¬£¬£¬ £¬²¢ÔÚLinkedInµÈÇóÖ°ÍøÕ¾ÉÏÐû²¼ÐéαÕÐÆ¸ÐÅÏ¢¡£¡£¡£Êܺ¦Õß»áÊÕµ½ÃæÊÔÔ¼Ç룬£¬£¬£¬£¬ £¬²¢±»ÒªÇóͨ¹ýTelegramÁªÏµÊ×ϯӪÏú¹Ù£¬£¬£¬£¬£¬ £¬ÏÂÔØ²¢Ê¹ÓÃGrassCallÊÓÆµ¾Û»áÈí¼þ¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ £¬¸ÃÈí¼þÏÖʵÉÏÊÇ֮ǰ»î¶¯ÖÐʹÓõġ°Gatherum¡±ÍøÕ¾µÄ¿Ë¡°æ£¬£¬£¬£¬£¬ £¬»á×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»òÔ¶³Ì»á¼ûľÂí¡£¡£¡£ÔÚWindows×°±¸ÉÏ£¬£¬£¬£¬£¬ £¬»á×°ÖÃRATºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬ £¬ÈçRhadamanthys£» £»£»ÔÚMacÉÏ£¬£¬£¬£¬£¬ £¬»á×°ÖÃAtomic (AMOS) Stealer¶ñÒâÈí¼þ¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ»áʵÑéÆ¾Ö¤Òªº¦×Ö¡¢¼ÓÃÜÇ®±ÒÇ®°üµÈÐÅÏ¢À´ÇÔÈ¡Îļþ£¬£¬£¬£¬£¬ £¬²¢½«±»µÁÐÅÏ¢ÉÏ´«ÖÁЧÀÍÆ÷µÄTelegramƵµÀ¡£¡£¡£Crazy Evil³ÉÔ±´Óÿ¸öÀֳɯ­È¡µÄÊܺ¦ÕßÉíÉÏ׬ȡÊýÍòÉõÖÁÊýÊ®ÍòÃÀÔª¡£¡£¡£


https://www.bleepingcomputer.com/news/security/grasscall-malware-campaign-drains-crypto-wallets-via-fake-job-interviews/


4. °Ä´óÀûÑÇIVF¾ÞÍ·GeneaÔâTermiteÀÕË÷Èí¼þ¹¥»÷


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬½üÆÚ£¬£¬£¬£¬£¬ £¬°Ä´óÀûÑÇ×î´óµÄÉúÓýЧÀÍÌṩÉÌÖ®Ò»GeneaÔâÓöÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÇÔÈ¡ÁËÃô¸ÐµÄÒ½ÁÆÊý¾Ý¡£¡£¡£¾Ý°Ä´óÀûÑǹú¼Ò¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬£¬£¬ £¬GeneaÔڸùúÉúÓýЧÀÍÐÐÒµÖÐÕ¼ÓÐÖ÷Ҫְ룬£¬£¬£¬£¬ £¬ÓëÁíÍâÁ½¼Ò¹«Ë¾ÅäºÏÕ¼ÓÐÁè¼Ý80%µÄÊг¡·Ý¶î¡£¡£¡£´Ë´Î¹¥»÷ÊÂÎñºó£¬£¬£¬£¬£¬ £¬GeneaÈ·ÈϹ¥»÷ÕßÒÑÇÔÈ¡ÆäϵͳÖеÄÊý¾Ý£¬£¬£¬£¬£¬ £¬²¢ÔÚÍøÉÏÐû²¼¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýCitrixЧÀÍÆ÷ÓÚ2025Äê1ÔÂ31ÈÕ½øÈëGeneaÍøÂ磬£¬£¬£¬£¬ £¬Ëæºó»ñÈ¡ÁËÖ÷ÎļþЧÀÍÆ÷¡¢Óò¿ØÖÆÆ÷µÈµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ £¬²¢ÔÚ2ÔÂ14ÈÕ½«940.7GBµÄÊý¾ÝÇÔÈ¡ÖÁÆä¿ØÖƵÄÔÆÐ§ÀÍÆ÷ÖС£¡£¡£ÊÜËðµÄ»¼ÕßÖÎÀíϵͳÖаüÀ¨Ð¡ÎÒ˽¼ÒºÍ¿µ½¡Êý¾Ý£¬£¬£¬£¬£¬ £¬ÈçÈ«Ãû¡¢µØµã¡¢Ò½ÁƼͼµÈ£¬£¬£¬£¬£¬ £¬µ«ÐÅÓÿ¨ÐÅÏ¢µÈ²ÆÎñÐÅϢδÊÜÓ°Ïì¡£¡£¡£ËäÈ»GeneaδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬£¬£¬ £¬µ«TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÉù³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬ £¬²¢ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˾ݳƴÓGeneaÍøÂçÖÐÇÔÈ¡µÄÊý¾Ý½ØÍ¼¡£¡£¡£TermiteÀÕË÷Èí¼þÍÅ»ï×ÔÈ¥Äê10ÔÂÖÐÑ®·ºÆðÒÔÀ´£¬£¬£¬£¬£¬ £¬ÒÑÓжàÃûÊܺ¦Õߣ¬£¬£¬£¬£¬ £¬»¹ÔøÉù³Æ¹¥ÆÆÁËÈ«Çò¹©Ó¦Á´Èí¼þÌṩÉÌBlue YonderµÄÍøÂç¡£¡£¡£


https://www.bleepingcomputer.com/news/security/australian-ivf-giant-genea-breached-by-termite-ransomware-gang/


5. automslc¶ñÒâPyPi°ü£ºÀÄÓÃDeezerƾ֤ʵÏÖ´ó¹æÄ£ÒôÀÖµÁ°æ


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬×Ô2019ÄêÒÔÀ´£¬£¬£¬£¬£¬ £¬Ò»¸öÃûΪ¡°automslc¡±µÄ¶ñÒâPyPi°üÒѱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬£¬£¬£¬ £¬¸Ã°üÀÄÓÃÓ²±àÂëÆ¾Ö¤´ÓDeezerÒôÀÖÁ÷ýÌåЧÀÍÖеÁ°æÒôÀÖ¡£¡£¡£DeezerÊÇÒ»ÏîÁýÕÖ180¸ö¹ú¼Ò/µØÇø¡¢ÌṩÁè¼Ý9000ÍòÊ×ÇúÄ¿µÄЧÀÍ¡£¡£¡£Çå¾²¹«Ë¾Socket·¢Ã÷ÁËÕâ¸ö¶ñÒâ°ü£¬£¬£¬£¬£¬ £¬Ëüͨ¹ýÓ²±àÂëµÄDeezerƾ֤ÏÂÔØÃ½Ì岢ץȡԪÊý¾Ý£¬£¬£¬£¬£¬ £¬Î¥·´ÁËDeezerµÄЧÀÍÌõ¿îºÍ°æÈ¨·¨¡£¡£¡£automslcʹÓÃÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¾ÙÐм¯ÖпØÖÆ£¬£¬£¬£¬£¬ £¬¿ÉÄܽ«Óû§ÄÉÈëÂþÑÜÊ½ÍøÂ磬£¬£¬£¬£¬ £¬²¢ÈÝÒ×±»ÓÃÓÚÆäËû¶ñÒâ»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þ°ü°üÀ¨Ó²±àÂëµÄDeezerÕÊ»§Æ¾Ö¤£¬£¬£¬£¬£¬ £¬ÓÃÓڵǼЧÀͲ¢ÇëÇ´Ôð³¤Á÷ýÌåURL£¬£¬£¬£¬£¬ £¬Èƹý30ÃëÔ¤ÀÀÏÞÖÆ£¬£¬£¬£¬£¬ £¬ÒÔ¸ßÖÊÁ¿ÃûÌÃÍâµØ´æ´¢ÒôƵÎļþ£¬£¬£¬£¬£¬ £¬ÔÊÐíÀëÏßÊÕÌýºÍ·Ö·¢¡£¡£¡£Ö»¹ÜµÁ°æ¹¤¾ßͨ³£²»±»ÊÓΪ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ £¬µ«automslcµÄʹÓÿÉÄÜÈÃÓû§ÃæÁÙÖ´·¨Î£º¦ºÍδÀ´¸ü¶à¶ñÒâÐÐΪµÄΣº¦¡£¡£¡£SocketÔÚÖÖÖÖÕË»§ºÍGitHub´æ´¢¿âÖз¢Ã÷ÁËÓë¸ÃÈí¼þ°üÏà¹ØµÄÓÖÃû£¬£¬£¬£¬£¬ £¬µ«Ö÷ıµÄÉí·ÝÉв»ÇåÎú¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ £¬½¨ÒéÓû§×èֹʹÓÃautomslc£¬£¬£¬£¬£¬ £¬ÒÔÃâ¾íÈë²»·¨»î¶¯¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pypi-package-with-100k-installs-pirated-music-from-deezer-for-years/


6. EncryptHubÈëÇÖ618¸ö×éÖ¯£¬£¬£¬£¬£¬ £¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬×Ô2024Äê6ÔÂÒÔÀ´£¬£¬£¬£¬£¬ £¬Ò»¸öÃûΪEncryptHub£¨ÓÖÃûLarva-208£©µÄÍþвÐÐΪÕßͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬ £¬Ãé׼ȫÇò×éÖ¯ÒÔ»ñÈ¡ÆóÒµÍøÂç»á¼ûȨÏÞ¡£¡£¡£¾ÝProdaft±¨¸æ£¬£¬£¬£¬£¬ £¬EncryptHubÒѹ¥»÷ÖÁÉÙ618¸ö×éÖ¯£¬£¬£¬£¬£¬ £¬²¢ÔÚ»ñµÃ»á¼ûȨÏÞºó×°ÖÃÔ¶³Ì¼à¿ØºÍÖÎÀíÈí¼þ£¬£¬£¬£¬£¬ £¬°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þ¡£¡£¡£¸ÃÍþв×éÖ¯ÓëRansomHubºÍBlackSuitÓйØÁª£¬£¬£¬£¬£¬ £¬²¢Î¬»¤ÁË×Ô¼ºµÄ×Ô½ç˵PowerShellÊý¾Ý¼ÓÃÜÆ÷¡£¡£¡£EncryptHubʹÓöÌÐÅ¡¢ÓïÒôÍøÂç´¹ÂÚºÍÐéαµÇÂ¼Ò³ÃæµÈÊֶλñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ £¬¹ºÖÃÁËÁè¼Ý70¸öÄ£ÄâÆóÒµVPN²úÆ·µÄÓòÃûÀ´ÔöÌí´¹ÂÚÒ³ÃæµÄÕýµ±ÐÔ¡£¡£¡£ÁíÒ»¸ö±»×·×ÙΪLarva-148µÄ×Ó×éÖ¯¿ÉÄÜÏòEncryptHub³öÊÛÓòÃûºÍÍøÂç´¹ÂÚ¹¤¾ß°ü¡£¡£¡£Ò»µ©¹¥ÆÆÄ¿µÄϵͳ£¬£¬£¬£¬£¬ £¬EncryptHub»á°²ÅÅÖÖÖÖPowerShell¾ç±¾ºÍ¶ñÒâÈí¼þÀ´ÇÔÈ¡Êý¾ÝºÍ¼ÓÃÜÎļþ£¬£¬£¬£¬£¬ £¬°üÀ¨¼ÓÃÜÇ®±ÒÇ®°ü¡¢VPN¿Í»§¶ËÉèÖÃÊý¾Ý¡¢ÃÜÂëÖÎÀíÆ÷Êý¾ÝºÍÌØ¶¨Îļþ¡£¡£¡£×îºó£¬£¬£¬£¬£¬ £¬EncryptHubʹÓûùÓÚPowerShellµÄ×Ô½ç˵¼ÓÃÜÆ÷ÐÎʽµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬ £¬ÒªÇóÊܺ¦Õßͨ¹ýTelegramÖ§¸¶Êê½ð¡£¡£¡£ProdaftÖÒÑÔ˵£¬£¬£¬£¬£¬ £¬EncryptHubÊÇÒ»¸öÀÏÁ·µÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬ £¬Äܹ»¶¨Öƹ¥»÷ÒÔÌá¸ßЧÂÊ£¬£¬£¬£¬£¬ £¬¶Ô´óÐÍ×éÖ¯Ôì³É¸ß¼ÛÖµµÄÆÆË𡣡£¡£


https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/