΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©
Ðû²¼Ê±¼ä 2025-09-181. ΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©
9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÊý×Ö·¸·¨²¿·ÖÓëCloudflareÏàÖú£¬£¬£¬£¬£¬£¬£¬ÓÚ2025Äê9Ô²é·âÁËRaccoonO365ʹÓõÄ338¸öÓòÃû£¬£¬£¬£¬£¬£¬£¬³¹µ×ÆÆËðÁËÕâÒ»¾¼ÃÇý¶¯ÐÍÍþв×éÖ¯µÄÊÖÒÕ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2024Äê7ÔÂÆðͨ¹ý¡°ÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©¡±¹¤¾ß°ü£¬£¬£¬£¬£¬£¬£¬´Ó94¸ö¹ú¼ÒÇÔÈ¡³¬5000¸öMicrosoft 365ƾ֤£¬£¬£¬£¬£¬£¬£¬Æä¶©ÔÄģʽ£¨30Ìì355ÃÀÔª¡¢90Ìì999ÃÀÔª£©Ê¹µÍÊÖÒÕÃż÷·¸·¨ÕßÄÜ´ó¹æÄ£Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£RaccoonO365£¨Î¢Èí×·×ÙΪStorm-2246£©µÄ¹¥»÷³£Î±×°³ÉMicrosoft¡¢DocuSignµÈ¿ÉÐÅÆ·ÅÆ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÚ²ÆÓʼþÓÕµ¼Êܺ¦ÕßÊäÈëÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬³£×÷Ϊ¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÄÏÈÕס£¡£¡£¡£¡£¡£Æä·ÀÓù¹æ±ÜÕ½ÂÔ°üÀ¨Ê¹ÓÃÕýµ±¹¤¾ßCloudflare Turnstile×÷ΪCAPTCHA£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýCloudflare Workers¾ç±¾ÊµÑé»úеÈ˼ì²â£¬£¬£¬£¬£¬£¬£¬È·±£½öÄ¿µÄÓû§¿É»á¼û´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£2024Äê9ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÒÑÕë¶Ô³¬2300¸öÃÀ¹ú×éÖ¯Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¥ÈÕ¿ÉÊäÈë9000¸öÄ¿µÄÓÊÏ䣬£¬£¬£¬£¬£¬£¬²¢Ðû³ÆÄÜÈÆ¹ý¶àÒòËØÈÏÖ¤¡£¡£¡£¡£¡£¡£Ä»ºóÖ÷ıΪÄáÈÕÀûÑÇÈËJoshua Ogundipe£¬£¬£¬£¬£¬£¬£¬Æäͨ¹ý850ÈËTelegramƵµÀÍÆ¹ã¹¤¾ß£¬£¬£¬£¬£¬£¬£¬»ñ³¬10ÍòÃÀÔª¼ÓÃÜÇ®±ÒÊÕÈë¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/09/raccoono365-phishing-network-shut-down.html
2. ÀÕË÷×é֯ʹÓÃÊÜËðOAuthÁîÅÆÇÔÈ¡³¬15ÒÚÌõSalesforceÊý¾Ý
9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÒÔShinyHunters¡¢Scattered SpiderºÍLapsusΪ½¹µãµÄ¡°Scattered Lapsus$ Hunters¡±ÀÕË÷×éÖ¯£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÊÜËðµÄSalesloft Drift OAuthÁîÅÆ£¬£¬£¬£¬£¬£¬£¬´Ó760¼Ò¹«Ë¾ÇÔÈ¡ÁËÁè¼Ý15ÒÚÌõSalesforce¼Í¼£¬£¬£¬£¬£¬£¬£¬Éæ¼°¿Í»§¡¢ÁªÏµÈË¡¢ÉÌ»ú¡¢Óû§¼°°¸ÀýµÈ½¹µã¹¤¾ß±í¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬°¸Àý±í°üÀ¨¿Æ¼¼¹«Ë¾¿Í»§Ìá½»µÄÖ§³ÖƱÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÁ˽øÒ»²½ºáÏòÉøÍ¸µÄ¡°ÉñÃØ¡±£¨ÈçAWS»á¼ûÃÜÔ¿¡¢SnowflakeÁîÅÆµÈ£©¡£¡£¡£¡£¡£¡£¹¥»÷·¾¶Ê¼ÓÚ½ñÄê3Ô£ºÍþвÐÐΪÕßÈëÇÖSalesloftµÄGitHub´æ´¢¿â»ñȡ˽ÓÐÔ´´úÂ룬£¬£¬£¬£¬£¬£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃè·¢Ã÷Driftƽ̨OAuthÁîÅÆ£¬£¬£¬£¬£¬£¬£¬½ø¶øÍ¨¹ýµÚÈý·½Æ½Ì¨ÅþÁ¬SalesforceʵÀý£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ´ó¹æÄ£Êý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ý±»ÓÃÓÚÀÕË÷£¬£¬£¬£¬£¬£¬£¬ÆÈʹÆóÒµÖ§¸¶Êê½ðÒÔ×èÖ¹¹ûÕæÐ¹Â¶¡£¡£¡£¡£¡£¡£GoogleÍþвÇ鱨£¨Mandiant£©½«´Ë»î¶¯×·×ÙΪUNC6040ºÍUNC6395£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³ö¹¥»÷Õß»áÆÊÎö°¸ÀýÊý¾ÝÍÚ¾òÒþ²ØÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÒÔÈëÇÖÆäËûÇéÐΡ£¡£¡£¡£¡£¡£FBIÒÑÐû²¼Ïà¹ØIOCÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬µ«SalesloftÉÐδ»ØÓ¦Êý¾ÝÁ¿¼°¹«Ë¾×ÜÊýÎÊÌ⣬£¬£¬£¬£¬£¬£¬½öÐÂÎÅÈËʿ֤ʵÊý×Ö׼ȷ¡£¡£¡£¡£¡£¡£ÎªÌá·À´ËÀ๥»÷£¬£¬£¬£¬£¬£¬£¬Salesforce½¨Òé¿Í»§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡¢Ö´ÐÐ×îÐ¡ÌØÈ¨ÔÔò£¬£¬£¬£¬£¬£¬£¬²¢ÑÏ¿áÖÎÀíµÚÈý·½Ó¦ÓÃÅþÁ¬¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/
3. ÐÂÐͶñÒâÈí¼þRaven Stealerͨ¹ýTelegramʵʱÇÔÈ¡Êý¾Ý
9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Point WildµÄLat61ÍþвÇ鱨ÍŶӷ¢Ã÷ÃûΪRaven StealerµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýµØÏÂÂÛ̳¼°µÁ°æÈí¼þÀ¦°óÈö²¥£¬£¬£¬£¬£¬£¬£¬½ÓÄÉDelphiÓëC++±àд£¬£¬£¬£¬£¬£¬£¬ÒÔСÇÉ¿ìËÙÎªÌØµã¡£¡£¡£¡£¡£¡£Æä½¹µã¹¥»÷ÊÖ¶ÎΪ¡°Àú³ÌÍÚ¿Õ¡±£¨process hollowing£©ÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬ÍêÈ«ÔÚÄÚ´æÖÐÔËÐжø²»Ð´ÈëÓ²ÅÌ£¬£¬£¬£¬£¬£¬£¬Î±×°³ÉÕý³£ä¯ÀÀÆ÷³ÌÐòÒÔ¹æ±Ü¹Å°åɱ¶¾Èí¼þ¼ì²â¡£¡£¡£¡£¡£¡£Raven StealerÕë¶ÔChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÃÜÂë¡¢Cookie¡¢Ö§¸¶ÐÅÏ¢¼°ÉúÑĵÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸üΣÏÕµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Ëüͨ¹ýTelegram»úеÈ˽«Êý¾Ýʵʱ´«ÊäÖÁ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬£¬Ðγɡ°¼´µÁ¼´´«¡±µÄÍþвÁ´Ìõ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃdzÒ×¹¹½¨¹¤¾ßÌìÉúΨһÃüÃûµÄ¼ÓÃܹ¥»÷Îļþ£¬£¬£¬£¬£¬£¬£¬ÈëÇÖºóÍøÂçÆÁÄ»½ØÍ¼ÓëÊý¾ÝÖÁZIPÎļþʵÑé·¢ËÍ£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü²âÊÔÖÐÒò»úеÈËÁîÅÆÎÊÌâ´«Êäʧ°Ü£¬£¬£¬£¬£¬£¬£¬µ«Êý¾Ýй¶Σº¦ÒÀÈ»±£´æ¡£¡£¡£¡£¡£¡£ÎªÌá·À´ËÀàÍþв£¬£¬£¬£¬£¬£¬£¬×¨¼Ò½¨Ò飺ʹÓþ߱¸ÊµÊ±·À»¤µÄ×îаæ·À²¡¶¾Èí¼þ£»£»£»£»£»£»×èÖ¹ÏÂÔØµÁ°æÈí¼þ£»£»£»£»£»£»ÉóÉ÷µã»÷¿ÉÒÉÁ´½Ó»ò¸½¼þ¡£¡£¡£¡£¡£¡£
https://hackread.com/raven-stealer-malware-browsers-passwords-payment-data/
4. SonicWallÖÒÑÔ¿Í»§Òò·À»ðǽÉèÖñ¸·Ýй¶ÐèÖØÖÃÆ¾Ö¤
9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾SonicWall¿ËÈÕÐû²¼½ôÆÈ֪ͨ£¬£¬£¬£¬£¬£¬£¬ÒªÇó¿Í»§ÖØÖÃÏà¹ØÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÒòÆäMySonicWallÕË»§ÖеķÀ»ðǽÉèÖñ¸·ÝÎļþÔÚÇå¾²Îó²îÖÐÔâ̻¶£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜʹÍþвÐÐΪÕßʹÓñ¸·ÝÐÅÏ¢»á¼û×°±¸Ãô¸ÐЧÀÍ¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬£¬SonicWallÁ¬Ã¦ÇжϹ¥»÷Õßϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢ÁªºÏÍøÂçÇå¾²»ú¹¹¼°Ö´·¨²¿·ÖÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¾ÝSonicWallÅû¶£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄ±¸·ÝÎļþ°üÀ¨¼ÓÃÜÃÜÂë¼°¿ÉÄܸ¨Öú¹¥»÷ÕßʹÓ÷À»ðǽµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜÎļþÒѼÓÃÜ£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔ¿ÉÄÜͨ¹ý±©Á¦ÆÆ½â»ñÈ¡ÔÆ±¸·ÝAPIЧÀÍȨÏÞ£¬£¬£¬£¬£¬£¬£¬½ø¶ø»á¼û×°±¸ÉèÖᣡ£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ£¬£¬£¬£¬£¬£¬£¬½ö²¨¼°²»µ½5%µÄSonicWall·À»ðǽװ±¸£¬£¬£¬£¬£¬£¬£¬ÕâЩװ±¸ÔÚÔÆ¶Ë´æ´¢Á˱¸·ÝÊ×Ñ¡ÏîÎļþ£¬£¬£¬£¬£¬£¬£¬¶ø¹¥»÷ÕßÕýÊÇͨ¹ý±©Á¦¹¥»÷Õë¶ÔÕâЩÎļþµÄAPIЧÀÍʵÑéÈëÇÖ¡£¡£¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬£¬£¬£¬£¬SonicWallÐû²¼ÏêϸָÄÏ£¬£¬£¬£¬£¬£¬£¬½¨ÒéÖÎÀíÔ±½ÓÄɽṹ»¯²½·¥£ºÊ×ÏȽûÓûòÏÞÖÆWAN»á¼ûЧÀÍ£¬£¬£¬£¬£¬£¬£¬ËæºóÖØÖÃÓû§¡¢VPNÕË»§¼°Ð§ÀÍʹÓõÄËùÓÐÆ¾Ö¤¡¢APIÃÜÔ¿ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬£¬£¬²¢¸üÐÂÆäËû¹ØÁªÏµÍ³ÖеĹ²ÏíÃÜÔ¿ºÍ¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/
5. TA558ʹÓÃAIÌìÉúÍøÂç´¹ÂÚ¹¥»÷ÂùÝÒµ
9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹¿¨°Í˹»ùʵÑéÊÒ×·×Ù·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßTA558£¨¹ØÁªRevengeHotels¼¯Èº£©×Ô2025ÄêÏÄÈÕÆðÕë¶Ô°ÍÎ÷¼°Î÷°àÑÀÓïÊг¡ÂùÝÌᳫÐÂÐ͹¥»÷£¬£¬£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúµÄÍøÂç´¹ÂÚÓʼþÈö²¥Venom RATµÈÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡¿ÍÈ˼°ÔÚÏßÂÃÐÐÉ磨ÈçBooking.com£©µÄÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔ·¢Æ±¡¢ÂùÝÔ¤¶©»òÇóÖ°ÉêÇëΪÓÕ¶üµÄÆÏÌÑÑÀÓï/Î÷°àÑÀÓï´¹ÂÚÓʼþÆô¶¯£¬£¬£¬£¬£¬£¬£¬ÄÚº¬AIÌìÉúµÄJavaScript¼ÓÔØÆ÷¼°PowerShellÏÂÔØÆ÷¡£¡£¡£¡£¡£¡£¾ç±¾×¢Ê͸»ºñ¡¢ÃûÌù淶£¬£¬£¬£¬£¬£¬£¬ÇкϴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÌìÉúÌØÕ÷£¬£¬£¬£¬£¬£¬£¬¿É¼ÓÔØºóÐø¾ç±¾ÊµÏÖ¶à½×¶ÎѬȾ¡£¡£¡£¡£¡£¡£×îÖÕÔØºÉ°üÀ¨»ùÓÚ¿ªÔ´Quasar RATˢеÄVenom RATÉÌÒµ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬¾ß±¸Êý¾ÝÇÔÈ¡¡¢·´ÏòÊðÀí¡¢·ÀÖÕÖ¹±£»£»£»£»£»£»¤¼°³¤ÆÚ»¯¹¦Ð§¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÐÞˢгÌ×ÔÖ÷»á¼û¿ØÖÆÁÐ±í£¨DACL£©°þ¶áÇå¾²Àú³ÌȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢Ã¿50ºÁÃëÑ»·É¨ÃèÀú³ÌÁÐ±í£¬£¬£¬£¬£¬£¬£¬ÖÕÖ¹Çå¾²ÆÊÎöʦ³£ÓÃµÄ¼à¿Ø¹¤¾ß¡£¡£¡£¡£¡£¡£ÈôÒÔÖÎÀíԱȨÏÞÔËÐУ¬£¬£¬£¬£¬£¬£¬¿ÉÉèÖÃSeDebugPrivilegeÁîÅÆ±ê¼ÇΪϵͳҪº¦Àú³Ì£¬£¬£¬£¬£¬£¬£¬Ç¿ÖÆÆÁÄ»³£ÁÁ·À˯Ãߣ¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýUSBÇý¶¯Æ÷Èö²¥¡¢½ûÓÃMicrosoft Defender¼°¸Ä¶¯×¢²á±íά³Ö±£´æ¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/09/ta558-uses-ai-generated-scripts-to.html
6. µÙܽÄáÔâÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬³¬2500Ãû¿Í»§ÀñÎ│ÐÅÏ¢±»µÁ
9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÉݳÞÖ鱦¾ÞÍ·µÙܽÄṫ˾ÓÚ2025Äê5Ô³õÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÆäϵͳµ¼Ö³¬2500Ãû¿Í»§Éí·Ý¼°ÀñÎ│ÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£Æ¾Ö¤µÙܽÄáÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢¼°Êý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÄÚÈݰüÀ¨¿Í»§ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÏúÊÛÊý¾Ý¡¢¿Í»§²Î¿¼±àºÅ¼°µÙܽÄáÀñÎ│ºÅÓëPINÂë¡£¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚµÁË¢ÀñÎ│¹ºÖÃÖ鱦£¬£¬£¬£¬£¬£¬£¬»ò³ÉÎªÍøÂç´¹ÂÚ¹¥»÷µÄÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬ÓÕÆ¿Í»§Ð¹Â¶¸ü¶àÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£µÙܽÄáÔÚ·¢Ã÷δ¾ÊÚȨ»á¼ûºó£¬£¬£¬£¬£¬£¬£¬ÒÑÆô¶¯ÓÉÍâ²¿ÍøÂçÇå¾²¹«Ë¾Ö÷µ¼µÄÊӲ죬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷¡°ÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»½øÒ»²½ÀÄÓᱡ£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Õâ²¢·Ç¸Ã¹«Ë¾Ê×´ÎÃæÁÙÊý¾ÝÇå¾²ÎÊÌ⣬£¬£¬£¬£¬£¬£¬5ÔÂ⣬£¬£¬£¬£¬£¬£¬Æäº«¹ú·Ö¹«Ë¾ÔøÒò¹©Ó¦ÉÌÊý¾Ýй¶µ¼Ö¿ͻ§ÐÅÏ¢ÍâÁ÷¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬µÙܽÄáĸ¹«Ë¾LVMHÆìÏÂÁíÒ»Æ·ÅÆµÏ°Â´ËǰҲÔâÓöÀàËÆÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¶ø¿ªÔƼ¯ÍŽüÆÚ¸ü±»ÆØ³ö740Íò·Ý¿Í»§Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÉÝ³ÞÆ·ÐÐÒµ³ÉÎªÍøÂç·¸·¨ÖØÔÖÇø¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/tiffany-data-breach-gift-cards-exposed/


¾©¹«Íø°²±¸11010802024551ºÅ