΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©

Ðû²¼Ê±¼ä 2025-09-18

1. ΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©


9ÔÂ17ÈÕ £¬£¬£¬£¬£¬£¬£¬Î¢ÈíÊý×Ö·¸·¨²¿·ÖÓëCloudflareÏàÖú £¬£¬£¬£¬£¬£¬£¬ÓÚ2025Äê9Ô²é·âÁËRaccoonO365ʹÓõÄ338¸öÓòÃû £¬£¬£¬£¬£¬£¬£¬³¹µ×ÆÆËðÁËÕâÒ»¾­¼ÃÇý¶¯ÐÍÍþв×éÖ¯µÄÊÖÒÕ»ù´¡ÉèÊ©¡£¡£ ¡£¡£¡£¡£¸Ã×éÖ¯×Ô2024Äê7ÔÂÆðͨ¹ý¡°ÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©¡±¹¤¾ß°ü £¬£¬£¬£¬£¬£¬£¬´Ó94¸ö¹ú¼ÒÇÔÈ¡³¬5000¸öMicrosoft 365ƾ֤ £¬£¬£¬£¬£¬£¬£¬Æä¶©ÔÄģʽ£¨30Ìì355ÃÀÔª¡¢90Ìì999ÃÀÔª£©Ê¹µÍÊÖÒÕÃż÷·¸·¨ÕßÄÜ´ó¹æÄ£Ìᳫ¹¥»÷¡£¡£ ¡£¡£¡£¡£RaccoonO365£¨Î¢Èí×·×ÙΪStorm-2246£©µÄ¹¥»÷³£Î±×°³ÉMicrosoft¡¢DocuSignµÈ¿ÉÐÅÆ·ÅÆ £¬£¬£¬£¬£¬£¬£¬Í¨¹ýڲƭÓʼþÓÕµ¼Êܺ¦ÕßÊäÈëÆ¾Ö¤ £¬£¬£¬£¬£¬£¬£¬³£×÷Ϊ¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÄÏÈÕס£¡£ ¡£¡£¡£¡£Æä·ÀÓù¹æ±ÜÕ½ÂÔ°üÀ¨Ê¹ÓÃÕýµ±¹¤¾ßCloudflare Turnstile×÷ΪCAPTCHA £¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýCloudflare Workers¾ç±¾ÊµÑé»úеÈ˼ì²â £¬£¬£¬£¬£¬£¬£¬È·±£½öÄ¿µÄÓû§¿É»á¼û´¹ÂÚÒ³Ãæ¡£¡£ ¡£¡£¡£¡£2024Äê9ÔÂÒÔÀ´ £¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÒÑÕë¶Ô³¬2300¸öÃÀ¹ú×éÖ¯Ìᳫ¹¥»÷ £¬£¬£¬£¬£¬£¬£¬µ¥ÈÕ¿ÉÊäÈë9000¸öÄ¿µÄÓÊÏä £¬£¬£¬£¬£¬£¬£¬²¢Ðû³ÆÄÜÈÆ¹ý¶àÒòËØÈÏÖ¤¡£¡£ ¡£¡£¡£¡£Ä»ºóÖ÷ıΪÄáÈÕÀûÑÇÈËJoshua Ogundipe £¬£¬£¬£¬£¬£¬£¬Æäͨ¹ý850ÈËTelegramƵµÀÍÆ¹ã¹¤¾ß £¬£¬£¬£¬£¬£¬£¬»ñ³¬10ÍòÃÀÔª¼ÓÃÜÇ®±ÒÊÕÈë¡£¡£ ¡£¡£¡£¡£


https://thehackernews.com/2025/09/raccoono365-phishing-network-shut-down.html


2. ÀÕË÷×é֯ʹÓÃÊÜËðOAuthÁîÅÆÇÔÈ¡³¬15ÒÚÌõSalesforceÊý¾Ý


9ÔÂ17ÈÕ £¬£¬£¬£¬£¬£¬£¬ÒÔShinyHunters¡¢Scattered SpiderºÍLapsusΪ½¹µãµÄ¡°Scattered Lapsus$ Hunters¡±ÀÕË÷×éÖ¯ £¬£¬£¬£¬£¬£¬£¬Í¨¹ýÊÜËðµÄSalesloft Drift OAuthÁîÅÆ £¬£¬£¬£¬£¬£¬£¬´Ó760¼Ò¹«Ë¾ÇÔÈ¡ÁËÁè¼Ý15ÒÚÌõSalesforce¼Í¼ £¬£¬£¬£¬£¬£¬£¬Éæ¼°¿Í»§¡¢ÁªÏµÈË¡¢ÉÌ»ú¡¢Óû§¼°°¸ÀýµÈ½¹µã¹¤¾ß±í¡£¡£ ¡£¡£¡£¡£ÆäÖÐ £¬£¬£¬£¬£¬£¬£¬°¸Àý±í°üÀ¨¿Æ¼¼¹«Ë¾¿Í»§Ìá½»µÄÖ§³ÖƱÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÁ˽øÒ»²½ºáÏòÉøÍ¸µÄ¡°ÉñÃØ¡±£¨ÈçAWS»á¼ûÃÜÔ¿¡¢SnowflakeÁîÅÆµÈ£©¡£¡£ ¡£¡£¡£¡£¹¥»÷·¾¶Ê¼ÓÚ½ñÄê3Ô£ºÍþвÐÐΪÕßÈëÇÖSalesloftµÄGitHub´æ´¢¿â»ñȡ˽ÓÐÔ´´úÂë £¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃè·¢Ã÷Driftƽ̨OAuthÁîÅÆ £¬£¬£¬£¬£¬£¬£¬½ø¶øÍ¨¹ýµÚÈý·½Æ½Ì¨ÅþÁ¬SalesforceʵÀý £¬£¬£¬£¬£¬£¬£¬ÊµÏÖ´ó¹æÄ£Êý¾ÝÇÔÈ¡¡£¡£ ¡£¡£¡£¡£±»µÁÊý¾Ý±»ÓÃÓÚÀÕË÷ £¬£¬£¬£¬£¬£¬£¬ÆÈʹÆóÒµÖ§¸¶Êê½ðÒÔ×èÖ¹¹ûÕæÐ¹Â¶¡£¡£ ¡£¡£¡£¡£GoogleÍþвÇ鱨£¨Mandiant£©½«´Ë»î¶¯×·×ÙΪUNC6040ºÍUNC6395 £¬£¬£¬£¬£¬£¬£¬²¢Ö¸³ö¹¥»÷Õß»áÆÊÎö°¸ÀýÊý¾ÝÍÚ¾òÒþ²ØÆ¾Ö¤ £¬£¬£¬£¬£¬£¬£¬ÒÔÈëÇÖÆäËûÇéÐΡ£¡£ ¡£¡£¡£¡£FBIÒÑÐû²¼Ïà¹ØIOCÖÒÑÔ £¬£¬£¬£¬£¬£¬£¬µ«SalesloftÉÐδ»ØÓ¦Êý¾ÝÁ¿¼°¹«Ë¾×ÜÊýÎÊÌâ £¬£¬£¬£¬£¬£¬£¬½öÐÂÎÅÈËʿ֤ʵÊý×Ö׼ȷ¡£¡£ ¡£¡£¡£¡£ÎªÌá·À´ËÀ๥»÷ £¬£¬£¬£¬£¬£¬£¬Salesforce½¨Òé¿Í»§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡¢Ö´ÐÐ×îÐ¡ÌØÈ¨Ô­Ôò £¬£¬£¬£¬£¬£¬£¬²¢ÑÏ¿áÖÎÀíµÚÈý·½Ó¦ÓÃÅþÁ¬¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/


3. ÐÂÐͶñÒâÈí¼þRaven Stealerͨ¹ýTelegramʵʱÇÔÈ¡Êý¾Ý


9ÔÂ17ÈÕ £¬£¬£¬£¬£¬£¬£¬Point WildµÄLat61ÍþвÇ鱨ÍŶӷ¢Ã÷ÃûΪRaven StealerµÄÐÂÐͶñÒâÈí¼þ £¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýµØÏÂÂÛ̳¼°µÁ°æÈí¼þÀ¦°óÈö²¥ £¬£¬£¬£¬£¬£¬£¬½ÓÄÉDelphiÓëC++±àд £¬£¬£¬£¬£¬£¬£¬ÒÔСÇÉ¿ìËÙÎªÌØµã¡£¡£ ¡£¡£¡£¡£Æä½¹µã¹¥»÷ÊÖ¶ÎΪ¡°Àú³ÌÍÚ¿Õ¡±£¨process hollowing£©ÊÖÒÕ £¬£¬£¬£¬£¬£¬£¬ÍêÈ«ÔÚÄÚ´æÖÐÔËÐжø²»Ð´ÈëÓ²ÅÌ £¬£¬£¬£¬£¬£¬£¬Î±×°³ÉÕý³£ä¯ÀÀÆ÷³ÌÐòÒÔ¹æ±Ü¹Å°åɱ¶¾Èí¼þ¼ì²â¡£¡£ ¡£¡£¡£¡£Raven StealerÕë¶ÔChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷ £¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÃÜÂë¡¢Cookie¡¢Ö§¸¶ÐÅÏ¢¼°ÉúÑĵÄÃô¸ÐÊý¾Ý¡£¡£ ¡£¡£¡£¡£¸üΣÏÕµÄÊÇ £¬£¬£¬£¬£¬£¬£¬Ëüͨ¹ýTelegram»úеÈ˽«Êý¾Ýʵʱ´«ÊäÖÁ¹¥»÷Õß £¬£¬£¬£¬£¬£¬£¬Ðγɡ°¼´µÁ¼´´«¡±µÄÍþвÁ´Ìõ¡£¡£ ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃdzÒ×¹¹½¨¹¤¾ßÌìÉúΨһÃüÃûµÄ¼ÓÃܹ¥»÷Îļþ £¬£¬£¬£¬£¬£¬£¬ÈëÇÖºóÍøÂçÆÁÄ»½ØÍ¼ÓëÊý¾ÝÖÁZIPÎļþʵÑé·¢ËÍ £¬£¬£¬£¬£¬£¬£¬Ö»¹Ü²âÊÔÖÐÒò»úеÈËÁîÅÆÎÊÌâ´«Êäʧ°Ü £¬£¬£¬£¬£¬£¬£¬µ«Êý¾Ýй¶Σº¦ÒÀÈ»±£´æ¡£¡£ ¡£¡£¡£¡£ÎªÌá·À´ËÀàÍþв £¬£¬£¬£¬£¬£¬£¬×¨¼Ò½¨Ò飺ʹÓþ߱¸ÊµÊ±·À»¤µÄ×îаæ·À²¡¶¾Èí¼þ£»£»£»£»£»£»×èÖ¹ÏÂÔØµÁ°æÈí¼þ£»£»£»£»£»£»ÉóÉ÷µã»÷¿ÉÒÉÁ´½Ó»ò¸½¼þ¡£¡£ ¡£¡£¡£¡£


https://hackread.com/raven-stealer-malware-browsers-passwords-payment-data/


4. SonicWallÖÒÑÔ¿Í»§Òò·À»ðǽÉèÖñ¸·Ýй¶ÐèÖØÖÃÆ¾Ö¤


9ÔÂ17ÈÕ £¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾SonicWall¿ËÈÕÐû²¼½ôÆÈ֪ͨ £¬£¬£¬£¬£¬£¬£¬ÒªÇó¿Í»§ÖØÖÃÏà¹ØÆ¾Ö¤ £¬£¬£¬£¬£¬£¬£¬ÒòÆäMySonicWallÕË»§ÖеķÀ»ðǽÉèÖñ¸·ÝÎļþÔÚÇå¾²Îó²îÖÐÔâ̻¶ £¬£¬£¬£¬£¬£¬£¬¿ÉÄÜʹÍþвÐÐΪÕßʹÓñ¸·ÝÐÅÏ¢»á¼û×°±¸Ãô¸ÐЧÀÍ¡£¡£ ¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó £¬£¬£¬£¬£¬£¬£¬SonicWallÁ¬Ã¦ÇжϹ¥»÷Õßϵͳ»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬£¬²¢ÁªºÏÍøÂçÇå¾²»ú¹¹¼°Ö´·¨²¿·ÖÕö¿ªÊӲ졣¡£ ¡£¡£¡£¡£¾ÝSonicWallÅû¶ £¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄ±¸·ÝÎļþ°üÀ¨¼ÓÃÜÃÜÂë¼°¿ÉÄܸ¨Öú¹¥»÷ÕßʹÓ÷À»ðǽµÄÐÅÏ¢¡£¡£ ¡£¡£¡£¡£Ö»¹ÜÎļþÒѼÓÃÜ £¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔ¿ÉÄÜͨ¹ý±©Á¦ÆÆ½â»ñÈ¡ÔÆ±¸·ÝAPIЧÀÍȨÏÞ £¬£¬£¬£¬£¬£¬£¬½ø¶ø»á¼û×°±¸ÉèÖᣡ£ ¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ £¬£¬£¬£¬£¬£¬£¬½ö²¨¼°²»µ½5%µÄSonicWall·À»ðǽװ±¸ £¬£¬£¬£¬£¬£¬£¬ÕâЩװ±¸ÔÚÔÆ¶Ë´æ´¢Á˱¸·ÝÊ×Ñ¡ÏîÎļþ £¬£¬£¬£¬£¬£¬£¬¶ø¹¥»÷ÕßÕýÊÇͨ¹ý±©Á¦¹¥»÷Õë¶ÔÕâЩÎļþµÄAPIЧÀÍʵÑéÈëÇÖ¡£¡£ ¡£¡£¡£¡£Îª½µµÍΣº¦ £¬£¬£¬£¬£¬£¬£¬SonicWallÐû²¼ÏêϸָÄÏ £¬£¬£¬£¬£¬£¬£¬½¨ÒéÖÎÀíÔ±½ÓÄɽṹ»¯²½·¥£ºÊ×ÏȽûÓûòÏÞÖÆWAN»á¼ûЧÀÍ £¬£¬£¬£¬£¬£¬£¬ËæºóÖØÖÃÓû§¡¢VPNÕË»§¼°Ð§ÀÍʹÓõÄËùÓÐÆ¾Ö¤¡¢APIÃÜÔ¿ºÍÉí·ÝÑéÖ¤ÁîÅÆ £¬£¬£¬£¬£¬£¬£¬²¢¸üÐÂÆäËû¹ØÁªÏµÍ³ÖеĹ²ÏíÃÜÔ¿ºÍ¼ÓÃÜÃÜÔ¿¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/


5. TA558ʹÓÃAIÌìÉúÍøÂç´¹ÂÚ¹¥»÷ÂùÝÒµ


9ÔÂ17ÈÕ £¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹¿¨°Í˹»ùʵÑéÊÒ×·×Ù·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßTA558£¨¹ØÁªRevengeHotels¼¯Èº£©×Ô2025ÄêÏÄÈÕÆðÕë¶Ô°ÍÎ÷¼°Î÷°àÑÀÓïÊг¡ÂùÝÌᳫÐÂÐ͹¥»÷ £¬£¬£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúµÄÍøÂç´¹ÂÚÓʼþÈö²¥Venom RATµÈÔ¶³Ì»á¼ûľÂí £¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡¿ÍÈ˼°ÔÚÏßÂÃÐÐÉ磨ÈçBooking.com£©µÄÐÅÓÿ¨Êý¾Ý¡£¡£ ¡£¡£¡£¡£¹¥»÷Á´ÒÔ·¢Æ±¡¢ÂùÝÔ¤¶©»òÇóÖ°ÉêÇëΪÓÕ¶üµÄÆÏÌÑÑÀÓï/Î÷°àÑÀÓï´¹ÂÚÓʼþÆô¶¯ £¬£¬£¬£¬£¬£¬£¬ÄÚº¬AIÌìÉúµÄJavaScript¼ÓÔØÆ÷¼°PowerShellÏÂÔØÆ÷¡£¡£ ¡£¡£¡£¡£¾ç±¾×¢Ê͸»ºñ¡¢ÃûÌù淶 £¬£¬£¬£¬£¬£¬£¬ÇкϴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÌìÉúÌØÕ÷ £¬£¬£¬£¬£¬£¬£¬¿É¼ÓÔØºóÐø¾ç±¾ÊµÏÖ¶à½×¶ÎѬȾ¡£¡£ ¡£¡£¡£¡£×îÖÕÔØºÉ°üÀ¨»ùÓÚ¿ªÔ´Quasar RATˢеÄVenom RATÉÌÒµ¹¤¾ß £¬£¬£¬£¬£¬£¬£¬¾ß±¸Êý¾ÝÇÔÈ¡¡¢·´ÏòÊðÀí¡¢·ÀÖÕÖ¹±£»£»£»£»£»£»¤¼°³¤ÆÚ»¯¹¦Ð§¡£¡£ ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÐÞˢгÌ×ÔÖ÷»á¼û¿ØÖÆÁÐ±í£¨DACL£©°þ¶áÇå¾²Àú³ÌȨÏÞ £¬£¬£¬£¬£¬£¬£¬²¢Ã¿50ºÁÃëÑ­»·É¨ÃèÀú³ÌÁÐ±í £¬£¬£¬£¬£¬£¬£¬ÖÕÖ¹Çå¾²ÆÊÎöʦ³£ÓÃµÄ¼à¿Ø¹¤¾ß¡£¡£ ¡£¡£¡£¡£ÈôÒÔÖÎÀíԱȨÏÞÔËÐÐ £¬£¬£¬£¬£¬£¬£¬¿ÉÉèÖÃSeDebugPrivilegeÁîÅÆ±ê¼ÇΪϵͳҪº¦Àú³Ì £¬£¬£¬£¬£¬£¬£¬Ç¿ÖÆÆÁÄ»³£ÁÁ·À˯Ãß £¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýUSBÇý¶¯Æ÷Èö²¥¡¢½ûÓÃMicrosoft Defender¼°¸Ä¶¯×¢²á±íά³Ö±£´æ¡£¡£ ¡£¡£¡£¡£


https://thehackernews.com/2025/09/ta558-uses-ai-generated-scripts-to.html


6. µÙܽÄáÔâÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬³¬2500Ãû¿Í»§ÀñÎ│ÐÅÏ¢±»µÁ


9ÔÂ17ÈÕ £¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÉݳÞÖ鱦¾ÞÍ·µÙܽÄṫ˾ÓÚ2025Äê5Ô³õÔâÓöÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÆäϵͳµ¼Ö³¬2500Ãû¿Í»§Éí·Ý¼°ÀñÎ│ÐÅÏ¢±»ÇÔÈ¡¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤µÙܽÄáÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢¼°Êý¾Ýй¶֪ͨ £¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÄÚÈݰüÀ¨¿Í»§ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÏúÊÛÊý¾Ý¡¢¿Í»§²Î¿¼±àºÅ¼°µÙܽÄáÀñÎ│ºÅÓëPINÂë¡£¡£ ¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚµÁË¢ÀñÎ│¹ºÖÃÖ鱦 £¬£¬£¬£¬£¬£¬£¬»ò³ÉÎªÍøÂç´¹ÂÚ¹¥»÷µÄÓÕ¶ü £¬£¬£¬£¬£¬£¬£¬ÓÕÆ­¿Í»§Ð¹Â¶¸ü¶àÃô¸ÐÊý¾Ý¡£¡£ ¡£¡£¡£¡£µÙܽÄáÔÚ·¢Ã÷δ¾­ÊÚȨ»á¼ûºó £¬£¬£¬£¬£¬£¬£¬ÒÑÆô¶¯ÓÉÍâ²¿ÍøÂçÇå¾²¹«Ë¾Ö÷µ¼µÄÊÓ²ì £¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷¡°ÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»½øÒ»²½ÀÄÓᱡ£¡£ ¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬£¬£¬Õâ²¢·Ç¸Ã¹«Ë¾Ê×´ÎÃæÁÙÊý¾ÝÇå¾²ÎÊÌâ £¬£¬£¬£¬£¬£¬£¬5ÔÂβ £¬£¬£¬£¬£¬£¬£¬Æäº«¹ú·Ö¹«Ë¾ÔøÒò¹©Ó¦ÉÌÊý¾Ýй¶µ¼Ö¿ͻ§ÐÅÏ¢ÍâÁ÷¡£¡£ ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬£¬£¬µÙܽÄáĸ¹«Ë¾LVMHÆìÏÂÁíÒ»Æ·ÅÆµÏ°Â´ËǰҲÔâÓöÀàËÆÊÂÎñ £¬£¬£¬£¬£¬£¬£¬¶ø¿ªÔƼ¯ÍŽüÆÚ¸ü±»ÆØ³ö740Íò·Ý¿Í»§Êý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÉÝ³ÞÆ·ÐÐÒµ³ÉÎªÍøÂç·¸·¨ÖØÔÖÇø¡£¡£ ¡£¡£¡£¡£


https://cybernews.com/security/tiffany-data-breach-gift-cards-exposed/