Cl0pÀÕË÷Èí¼þÍÅ»ïÔÙÏÖ£¬£¬ £¬£¬£¬Éù³Æ¹¥»÷47¼Ò¹«Ë¾

Ðû²¼Ê±¼ä 2025-02-19

1. Cl0pÀÕË÷Èí¼þÍÅ»ïÔÙÏÖ£¬£¬ £¬£¬£¬Éù³Æ¹¥»÷47¼Ò¹«Ë¾


2ÔÂ13ÈÕ£¬£¬ £¬£¬£¬Óë¶íÂÞ˹ÓйصÄÀÕË÷Èí¼þÍÅ»ïCl0p½üÆÚÔٴλîÔ¾£¬£¬ £¬£¬£¬Éù³Æ¶Ô°üÀ¨DXC TechnologyºÍÖ¥¼Ó¸ç¹«Á¢Ñ§Ð£ÔÚÄÚµÄ47¼Ò¹«Ë¾·¢¶¯Á˹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹«Ë¾±é²¼ÃÀ¹ú¡¢¼ÓÄôó¡¢Ä«Î÷¸ç¡¢Ó¢¹úºÍ°®¶ûÀ¼¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬ £¬£¬£¬DXC TechnologyÊÇÒ»¼ÒÓµÓÐ130,000ÃûÔ±¹¤µÄ¿ç¹úITЧÀͺÍ×Éѯ¹«Ë¾£¬£¬ £¬£¬£¬¶øÖ¥¼Ó¸ç¹«Á¢Ñ§Ð£ÔòÊÇÃÀ¹úµÚÈý´óÑ§Çø£¬£¬ £¬£¬£¬Ð§ÀÍ330,000¶àÃûѧÉú¡£¡£¡£¡£¡£¡£¡£Cl0pÍÅ»ï½ÓÄÉÆæÒìµÄÏàͬ·½·¨£¬£¬ £¬£¬£¬²»ÔÚ°µÍøÉÏÖ±½ÓÁªÏµÊܺ¦Õߣ¬£¬ £¬£¬£¬¶øÊÇÐû²¼ÐÂÎÅ´ÙʹÊܺ¦Õß×Ô¶¯ÁªÏµ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©Ä£Ê½ºÍ¡°Ë«ÖØÀÕË÷¡±Õ½ÂÔ£¬£¬ £¬£¬£¬¼È¼ÓÃÜÊý¾ÝÓÖÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬£¬²¢ÔÚÊܺ¦Õß²»Ö§¸¶Êê½ðʱÐû²¼ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¾ÝÍþвÇ鱨ƽ̨FalconFeeds·ÖÏí£¬£¬ £¬£¬£¬Êܺ¦ÕßÃûµ¥Öл¹°üÀ¨¿¨¶ûÉ­·ÖÏú¹«Ë¾¡¢É­±¤ËѼ¯Íŵȶà¼ÒÆóÒµºÍ×éÖ¯¡£¡£¡£¡£¡£¡£¡£Cl0pÍÅ»ïÀúÊ·ÉÏÔø²ß»®¹ý°üÀ¨MOVEitºÍFortra GoAnywhereÎļþÖÎÀíÈí¼þºÚ¿Í¹¥»÷ÔÚÄڵĶàÆð´ó¹æÄ£ºÚ¿ÍÊÂÎñ£¬£¬ £¬£¬£¬²¢´ÓÖÐ׬Ǯ·á¸»¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü2021ÄêÎÚ¿ËÀ¼Ö´·¨²¿·ÖÔø´Ý»ÙÆäIT»ù´¡ÉèÊ©²¢¾Ð²¶¶àÃûÏÓÒÉÈË£¬£¬ £¬£¬£¬µ«¸ÃÍÅ»ïÈÔÔÚÆð¾¢Ñ°ÕÒеÄÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/cybercrime/chicago-schools-dxc-technology-cl0p-ransomware/


2. ÐÂÈÕÌú¹«Ë¾ÔâBianLianÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬Ãô¸ÐÊý¾ÝÔâÇÔÈ¡


2ÔÂ14ÈÕ£¬£¬ £¬£¬£¬È«ÇòµÚËÄ´ó´Ö¸ÖÉú²úÉÌÐÂÈÕÌú¹«Ë¾£¨Nippon Steel£©¾Ý³ÆÔâµ½ÁËBianLianÀÕË÷Èí¼þ¼¯ÍŵĹ¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÆä°µÍøÍøÕ¾ÉÏÐû²¼ÐÅÏ¢£¬£¬ £¬£¬£¬Éù³ÆÖØÐÂÈÕÌúÃÀ¹ú·Ö²¿ÍøÂçÇÔÈ¡ÁË500GBµÄÊý¾Ý£¬£¬ £¬£¬£¬°üÀ¨»á¼ÆÊý¾Ý¡¢¿Í»§²ÆÎñºÍСÎÒ˽¼ÒÐÅÏ¢¡¢Éú²úÊý¾ÝµÈÃô¸Ð×ÊÁÏ£¬£¬ £¬£¬£¬²¢Ïò¹«Ë¾¸ß¹ÜÐû²¼ÁËСÎÒ˽¼ÒÁªÏµÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÏ®»÷¶ÔÐÂÈÕÌúÀ´ËµÊ±»úÔã¸â£¬£¬ £¬£¬£¬ÓÉÓÚ×ÔÃÀ¹ú×Üͳ°ÝµÇ×èÖ¹ÆäÓëÃÀ¹ú¸ÖÌú¹«Ë¾µÄºÏ²¢ÍýÏëÒÔÀ´£¬£¬ £¬£¬£¬¸Ã¹«Ë¾Ò»Ö±±¸ÊܹØ×¢¡£¡£¡£¡£¡£¡£¡£BianLian»¹ÔÚÆä°µÍøÉÏÐû²¼ÁËÒ»¸öÊý¾ÝÑù±¾£¬£¬ £¬£¬£¬ËƺõÐÎòÁËÐÂÈÕÌúÓëÃÀ¹ú¸ÖÌú¹«Ë¾ºÏ²¢Ç°ºóµÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬µ±Cybernews»á¼ûBianLianµÄÑó´ÐÍøÕ¾Ê±£¬£¬ £¬£¬£¬È´·¢Ã÷Nippon²¢Î´·ºÆðÔÚÊܺ¦ÕßÃûµ¥ÉÏ£¬£¬ £¬£¬£¬BianLian³ÆÐÂÈÕÌúµÄÊý¾Ý¡°ºÜ¿ì¾Í»áÐû²¼¡±£¬£¬ £¬£¬£¬ÍƲâÈÕ±¾¹«Ë¾¿ÉÄÜÕýÔÚ̸ÅÐÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯×Ô2022Äê6Ô·ºÆðÒÔÀ´£¬£¬ £¬£¬£¬ÒÑÕë¶ÔÒªº¦»ù´¡ÉèÊ©²¿·Ö¡¢ÖÐСÐÍÆóÒµÒÔ¼°Ò½ÁÆ¡¢×¨ÒµºÍ·¿µØ²úÐÐÒµ·¢¶¯Á˶à´Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£¾ÝCISAºÍFBIµÄÁªºÏͨ¸æ£¬£¬ £¬£¬£¬¸ÃÍÅ»ï¾Ý³ÆÀ´×Ô¶íÂÞ˹£¬£¬ £¬£¬£¬½ÓÄÉË«ÖØÀÕË÷ģʽ£¬£¬ £¬£¬£¬Ê×ÏÈÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬£¬È»ºó¼ÓÃÜÊܺ¦Õßϵͳ£¬£¬ £¬£¬£¬ÒÔʵÏÖ³¤ÆÚÐÔÏÂÁîºÍ¿ØÖÆ¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/nippon-steel-claimed-by-bianlian-ransomware-group/


3. StaryDobry¶ñÒâÈí¼þ»î¶¯£ºÊ¹ÓÃÆÆ½âÓÎÏ·Èö²¥XMRigÍڿ󲡶¾


2ÔÂ18ÈÕ£¬£¬ £¬£¬£¬StaryDobryÊÇÒ»¸öÕë¶ÔÈ«ÇòÓÎÏ·Íæ¼ÒµÄ´ó¹æÄ£¶ñÒâÈí¼þ»î¶¯£¬£¬ £¬£¬£¬ËüʹÓÃÆÆ½âµÄÓÎÏ·°æ±¾£¬£¬ £¬£¬£¬ÈçGarry's Mod¡¢BeamNG.driveºÍDyson Sphere ProgramµÈSteamÉÏ¸ßÆÀ·ÖµÄÓÎÏ·£¬£¬ £¬£¬£¬×÷ΪÈö²¥¶ñÒâÈí¼þµÄÔØÌå¡£¡£¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬ £¬£¬£¬¸Ã»î¶¯ÔÚ2024Äê12ÔÂÏÂÑ®ÖÁ2025Äê1ÔÂ27ÈÕʱ´ú»îÔ¾£¬£¬ £¬£¬£¬Ö÷ÒªÓ°ÏìµÂ¹ú¡¢¶íÂÞ˹¡¢°ÍÎ÷¡¢°×¶íÂÞ˹ºÍ¹þÈø¿Ë˹̹µÄÓû§¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÌáǰÊýÔÂÉÏ´«ÊÜѬȾµÄÓÎÏ·×°ÖóÌÐòµ½ÖÖ×ÓÍøÕ¾£¬£¬ £¬£¬£¬ÔÚ¼ÙÆÚʱ´ú´¥·¢ÓÐÓÃÔØºÉÒÔ½µµÍ±»·¢Ã÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£StaryDobry½ÓÄɶà½×¶ÎѬȾÁ´£¬£¬ £¬£¬£¬×îÖÕÄ¿µÄÊÇÔÚÓû§ÏµÍ³ÖÐ×°ÖÃXMRig¼ÓÃܿ󹤡£¡£¡£¡£¡£¡£¡£Óû§ÏÂÔØ¿´ËÆÕý³£µÄÓÎÏ·×°ÖóÌÐòºó£¬£¬ £¬£¬£¬¶ñÒâÈí¼þÖ²Èë³ÌÐò»áÔÚºǫ́½âѹ²¢Æô¶¯£¬£¬ £¬£¬£¬ÍøÂçϵͳÐÅÏ¢ºó·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬ £¬£¬£¬¶ñÒâÈí¼þ¼ÓÔØ³ÌÐò»áαװ³ÉWindowsϵͳÎļþ£¬£¬ £¬£¬£¬½¨ÉèÍýÏëʹÃüÒÔÒ»Á¬±£´æ£¬£¬ £¬£¬£¬²¢ÔÚÖª×ãÌõ¼þʱÏÂÔØ²¢ÔËÐÐXMRigÍÚ¿ó³ÌÐò¡£¡£¡£¡£¡£¡£¡£XMRig¿ó¹¤ÊÇMonero¿ó¹¤µÄÐ޸İ汾£¬£¬ £¬£¬£¬ËüÅþÁ¬µ½Ë½ÈËÍÚ¿óЧÀÍÆ÷£¬£¬ £¬£¬£¬Ê¹µÃÊÕÒæ¸üÄÑ×·×Ù¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿ £¿£¿£¿¨°Í˹»ùÖ¸³ö£¬£¬ £¬£¬£¬ÕâЩ¹¥»÷¿ÉÄÜÀ´×ÔÒ»Ãû½²¶íÓïµÄ¹¥»÷Õߣ¬£¬ £¬£¬£¬ÇÒStaryDobryÇãÏòÓÚÒ»´ÎÐԻ£¬£¬ £¬£¬£¬Ö¼ÔÚͨ¹ýÃé׼ǿʢµÄÓÎÏ·»úÀ´×î´ó»¯ÍÚ¿óÊÕÒæ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cracked-garrys-mod-beamngdrive-games-infect-gamers-with-miners/


4. Σº¦Í¶×ʾÞÍ· Insight Partners ÔâÓöÍøÂç¹¥»÷


2ÔÂ18ÈÕ£¬£¬ £¬£¬£¬×ܲ¿Î»ÓÚŦԼµÄΣº¦Í¶×ʺÍ˽ļ¹ÉȨ¹«Ë¾Insight Partners£¬£¬ £¬£¬£¬ÔÚÆä30ÄêµÄÓªÒµÔËӪʱ´úÒÑͶ×ÊÁËÈ«Çò800¶à¼ÒÈí¼þºÍÊÖÒÕÊ×´´ÆóÒµ£¬£¬ £¬£¬£¬ÖÎÀí×ÅÁè¼Ý900ÒÚÃÀÔªµÄî¿Ïµ×ʲú¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÔÚ1Ô·ÝÔâÊÜÁËÒ»´ÎÖØ´óµÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾ÖܶþÐû²¼µÄÉùÃ÷£¬£¬ £¬£¬£¬Æä²¿·ÖÐÅϢϵͳÓÚ1ÔÂ16ÈÕÔâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£·¢Ã÷Î¥¹æÐÐΪºó£¬£¬ £¬£¬£¬Insight PartnersѸËÙ½ÓÄÉÐж¯£¬£¬ £¬£¬£¬ÔÚ¼¸Ð¡Ê±ÄÚ¿ØÖÆÁËÊ±ÊÆ²¢×îÏÈÊӲ죬£¬ £¬£¬£¬Í¬Ê±Í¨ÖªÁËÏà¹ØÖ´·¨²¿·ÖºÍÀûÒæÏà¹ØÕߣ¬£¬ £¬£¬£¬²¢Ô¼ÇëÁ˵ÚÈý·½ÍøÂçÇ徲ר¼ÒÀ´ÆÀ¹ÀÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ËäÈ»¸Ã¹«Ë¾ÉÐδ·ÖÏíÓйع¥»÷ÐÔ×ӵĸü¶àÐÅÏ¢£¬£¬ £¬£¬£¬ÒÔ¼°Êý¾ÝÊÇ·ñÔÚ¹¥»÷Öб»»á¼û»òÇÔÈ¡£¬£¬ £¬£¬£¬µ«ÌåÏÖûÓÐÖ¤¾ÝÅú×¢¹¥»÷ÕßÔÚ±»·¢Ã÷ºóÈÔÄÜ»á¼ûÆäÍøÂ磬£¬ £¬£¬£¬ÇÒ´Ë´ÎÊÂÎñ²¢Î´¶Ô¹«Ë¾µÄÔËÓªÔì³É½øÒ»²½µÄ×ÌÈÅ¡£¡£¡£¡£¡£¡£¡£Insight PartnersÕýÔÚÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¡¢È¡Ö¤×¨¼ÒÒÔ¼°Íⲿִ·¨ÕÕÁÏÏàÖú£¬£¬ £¬£¬£¬Æð¾¢È·¶¨ÊÂÎñµÄ¹æÄ££¬£¬ £¬£¬£¬²¢ÓëÀûÒæÏà¹ØÕß·ÖÏíÐÅÏ¢£¬£¬ £¬£¬£¬Ô¤¼ÆÕâÒ»Àú³Ì½«ÐèÒªÊýÖÜʱ¼ä¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÒÔΪ´Ë´Î¹¥»÷²»»á¶ÔͶ×Ê×éºÏ¹«Ë¾¡¢Insight»ù½ð»òÆäËûÀûÒæÏà¹ØÕß±¬·¢ÖØ´óÓ°Ï죬£¬ £¬£¬£¬²¢ÔÊÐíÔÚÊÓ²ìÀú³ÌÖлñµÃÏà¹ØÐÅÏ¢ºó£¬£¬ £¬£¬£¬½«ÏòÊÜÓ°ÏìµÄСÎÒ˽¼Òת´ï×îÐÂÇéÐΡ£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/venture-capital-giant-insight-partners-hit-by-cyberattack/


5. ±¨Òµ¾ÞÍ·Lee EnterprisesÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÔËÓªÖÐÖ¹


2ÔÂ18ÈÕ£¬£¬ £¬£¬£¬±¨Òµ³öÊé¾ÞÍ·Lee EnterprisesÈ·ÈÏ£¬£¬ £¬£¬£¬ÆäÔâÓöµÄÀÕË÷Èí¼þ¹¥»÷Êǵ¼Ö¼¯ÍÅÔËÓªÒ»Á¬ÖÐÖ¹Áè¼ÝÁ½ÖܵĻù´¡Ôµ¹ÊÔ­ÓÉ¡£¡£¡£¡£¡£¡£¡£¸Ã¼¯ÍÅÔÚ26¸öÖݳöÊé77·ÝÈÕ±¨¡¢350·ÝÖÜ¿¯¼°×¨Òµ¿¯Î£¬ £¬£¬£¬ÓµÓÐÁè¼Ý120ÍòµÄÈÕ±¨¿¯ÐÐÁ¿ºÍ4400ÍòµÄÊý×Ö°æ×ÔÁ¦·Ã¿Í¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂ2ÔÂ3ÈÕϵͳÖÐÖ¹£¬£¬ £¬£¬£¬Ó°ÏìÁ˲úÆ··ÖÏú¡¢Õ˵¥¡¢ÊÕ¿îºÍ¹©Ó¦É̸¶¿îµÈÔËÓª£¬£¬ £¬£¬£¬Ó¡Ë¢³öÊéÎï·ÖÏúÑÓ³Ù£¬£¬ £¬£¬£¬ÔÚÏßÔËÓªÊÜÏÞ¡£¡£¡£¡£¡£¡£¡£×èÖ¹2ÔÂ12ÈÕ£¬£¬ £¬£¬£¬ËùÓн¹µã²úÆ·Òѻָ´Õý³£·Ö·¢£¬£¬ £¬£¬£¬µ«ÖܶȺ͸¨Öú²úÆ·ÉÐδ»Ö¸´£¬£¬ £¬£¬£¬Õ¼¹«Ë¾×ÜÓªÒµÊÕÈëµÄ5%¡£¡£¡£¡£¡£¡£¡£LeeÕýÔÚÊÓ²ìÃô¸ÐÊý¾ÝÊÇ·ñй¶£¬£¬ £¬£¬£¬Í¬Ê±ÊµÑéÔÝʱ²½·¥Î¬³ÖÒªº¦ÓªÒµ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö±¨Òµ¼¯ÍÅÏÝÈëÔÓÂÒ£¬£¬ £¬£¬£¬¼ÇÕߺͱ༭ÎÞ·¨»á¼ûÎļþ¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬ £¬£¬£¬¸Ã¼¯ÍÅÔøÔÚ2020ÄêÃÀ¹ú×Üͳ´óѡǰÔâÊÜÒÁÀʺڿ͵ÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lee-enterprises-newspaper-disruptions-caused-by-ransomware-attack/


6. Snake KeyloggerбäÖÖ£ºÒþÉí¹¥»÷WindowsÓû§²¢ÇÔȡƾ֤


2ÔÂ18ÈÕ£¬£¬ £¬£¬£¬New Snake Keylogger±äÖÖ£¬£¬ £¬£¬£¬Ò²±»³ÆÎª404 Keylogger£¬£¬ £¬£¬£¬ÊÇÒ»ÖÖÕë¶ÔWindowsÓû§µÄ¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬Ö÷Ҫͨ¹ýÍøÂç´¹ÂÚµç×ÓÓʼþÈö²¥¡£¡£¡£¡£¡£¡£¡£ËüʹÓÃAutoIt¾ç±¾ÓïÑÔ¾ÙÐÐÒþÉí¹¥»÷£¬£¬ £¬£¬£¬Äܹ»Èƹý±ê×¼·À²¡¶¾½â¾ö¼Æ»®£¬£¬ £¬£¬£¬ÔöÌí¼ì²âÄѶȡ£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¼Í¼»÷¼ü¡¢²¶»ñƾ֤¡¢¼àÊÓ¼ôÌù°å£¬£¬ £¬£¬£¬²¢½«±»µÁÊý¾Ýͨ¹ýµç×ÓÓʼþºÍTelegram»úеÈËй¶µ½ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ÔÚ¹¥»÷Àú³ÌÖУ¬£¬ £¬£¬£¬Ëü½«×ÔÉí¸±±¾Òþ²ØÔÚϵͳÆô¶¯Îļþ¼ÐÖУ¬£¬ £¬£¬£¬²¢Ê¹ÓÃÀú³ÌÍÚ¿ÕÊÖÒÕ½«¶ñÒâ¸ºÔØ×¢ÈëÕýµ±µÄ.NETÀú³Ì£¬£¬ £¬£¬£¬´Ó¶øÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬Ëü»¹ÄܼìË÷Êܺ¦ÕßµØÀíλÖ㬣¬ £¬£¬£¬¼ì²â¶Ô°üÀ¨Ãô¸ÐÊý¾ÝµÄÎļþ¼ÐµÄ»á¼û£¬£¬ £¬£¬£¬²¢´Óä¯ÀÀÆ÷×Ô¶¯Ìî³äϵͳÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»ÖÖÖØ´óÇÒ¹¦Ð§¸»ºñµÄ¶ñÒâÈí¼þ±äÌ壬£¬ £¬£¬£¬¶ÔÈ«ÇòWindowsÓû§×é³ÉÑÏÖØÍþв£¬£¬ £¬£¬£¬ÐèÒª×éÖ¯ºÍСÎÒ˽¼Ò½ÓÄɸ߼¶Íþв·À»¤ºÍ×Ô¶¯Çå¾²²½·¥À´·ÀÓù¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/snake-keylogger-variant-windows-data-telegram-bots/