΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©

Ðû²¼Ê±¼ä 2025-09-18

1. ΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©


9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÊý×Ö·¸·¨²¿·ÖÓëCloudflareÏàÖú£¬£¬£¬£¬£¬£¬ÓÚ2025Äê9Ô²é·âÁËRaccoonO365ʹÓõÄ338¸öÓòÃû£¬£¬£¬£¬£¬£¬³¹µ×ÆÆËðÁËÕâÒ»¾­¼ÃÇý¶¯ÐÍÍþв×éÖ¯µÄÊÖÒÕ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2024Äê7ÔÂÆðͨ¹ý¡°ÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©¡±¹¤¾ß°ü£¬£¬£¬£¬£¬£¬´Ó94¸ö¹ú¼ÒÇÔÈ¡³¬5000¸öMicrosoft 365ƾ֤£¬£¬£¬£¬£¬£¬Æä¶©ÔÄģʽ£¨30Ìì355ÃÀÔª¡¢90Ìì999ÃÀÔª£©Ê¹µÍÊÖÒÕÃż÷·¸·¨ÕßÄÜ´ó¹æÄ£Ìᳫ¹¥»÷¡£¡£¡£¡£¡£RaccoonO365£¨Î¢Èí×·×ÙΪStorm-2246£©µÄ¹¥»÷³£Î±×°³ÉMicrosoft¡¢DocuSignµÈ¿ÉÐÅÆ·ÅÆ£¬£¬£¬£¬£¬£¬Í¨¹ýڲƭÓʼþÓÕµ¼Êܺ¦ÕßÊäÈëÆ¾Ö¤£¬£¬£¬£¬£¬£¬³£×÷Ϊ¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÄÏÈÕס£¡£¡£¡£¡£Æä·ÀÓù¹æ±ÜÕ½ÂÔ°üÀ¨Ê¹ÓÃÕýµ±¹¤¾ßCloudflare Turnstile×÷ΪCAPTCHA£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýCloudflare Workers¾ç±¾ÊµÑé»úеÈ˼ì²â£¬£¬£¬£¬£¬£¬È·±£½öÄ¿µÄÓû§¿É»á¼û´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£2024Äê9ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÒÑÕë¶Ô³¬2300¸öÃÀ¹ú×éÖ¯Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬µ¥ÈÕ¿ÉÊäÈë9000¸öÄ¿µÄÓÊÏ䣬£¬£¬£¬£¬£¬²¢Ðû³ÆÄÜÈÆ¹ý¶àÒòËØÈÏÖ¤¡£¡£¡£¡£¡£Ä»ºóÖ÷ıΪÄáÈÕÀûÑÇÈËJoshua Ogundipe£¬£¬£¬£¬£¬£¬Æäͨ¹ý850ÈËTelegramƵµÀÍÆ¹ã¹¤¾ß£¬£¬£¬£¬£¬£¬»ñ³¬10ÍòÃÀÔª¼ÓÃÜÇ®±ÒÊÕÈë¡£¡£¡£¡£¡£


https://thehackernews.com/2025/09/raccoono365-phishing-network-shut-down.html


2. ÀÕË÷×é֯ʹÓÃÊÜËðOAuthÁîÅÆÇÔÈ¡³¬15ÒÚÌõSalesforceÊý¾Ý


9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ÒÔShinyHunters¡¢Scattered SpiderºÍLapsusΪ½¹µãµÄ¡°Scattered Lapsus$ Hunters¡±ÀÕË÷×éÖ¯£¬£¬£¬£¬£¬£¬Í¨¹ýÊÜËðµÄSalesloft Drift OAuthÁîÅÆ£¬£¬£¬£¬£¬£¬´Ó760¼Ò¹«Ë¾ÇÔÈ¡ÁËÁè¼Ý15ÒÚÌõSalesforce¼Í¼£¬£¬£¬£¬£¬£¬Éæ¼°¿Í»§¡¢ÁªÏµÈË¡¢ÉÌ»ú¡¢Óû§¼°°¸ÀýµÈ½¹µã¹¤¾ß±í¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬°¸Àý±í°üÀ¨¿Æ¼¼¹«Ë¾¿Í»§Ìá½»µÄÖ§³ÖƱÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÁ˽øÒ»²½ºáÏòÉøÍ¸µÄ¡°ÉñÃØ¡±£¨ÈçAWS»á¼ûÃÜÔ¿¡¢SnowflakeÁîÅÆµÈ£©¡£¡£¡£¡£¡£¹¥»÷·¾¶Ê¼ÓÚ½ñÄê3Ô£ºÍþвÐÐΪÕßÈëÇÖSalesloftµÄGitHub´æ´¢¿â»ñȡ˽ÓÐÔ´´úÂ룬£¬£¬£¬£¬£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃè·¢Ã÷Driftƽ̨OAuthÁîÅÆ£¬£¬£¬£¬£¬£¬½ø¶øÍ¨¹ýµÚÈý·½Æ½Ì¨ÅþÁ¬SalesforceʵÀý£¬£¬£¬£¬£¬£¬ÊµÏÖ´ó¹æÄ£Êý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£±»µÁÊý¾Ý±»ÓÃÓÚÀÕË÷£¬£¬£¬£¬£¬£¬ÆÈʹÆóÒµÖ§¸¶Êê½ðÒÔ×èÖ¹¹ûÕæÐ¹Â¶¡£¡£¡£¡£¡£GoogleÍþвÇ鱨£¨Mandiant£©½«´Ë»î¶¯×·×ÙΪUNC6040ºÍUNC6395£¬£¬£¬£¬£¬£¬²¢Ö¸³ö¹¥»÷Õß»áÆÊÎö°¸ÀýÊý¾ÝÍÚ¾òÒþ²ØÆ¾Ö¤£¬£¬£¬£¬£¬£¬ÒÔÈëÇÖÆäËûÇéÐΡ£¡£¡£¡£¡£FBIÒÑÐû²¼Ïà¹ØIOCÖÒÑÔ£¬£¬£¬£¬£¬£¬µ«SalesloftÉÐδ»ØÓ¦Êý¾ÝÁ¿¼°¹«Ë¾×ÜÊýÎÊÌ⣬£¬£¬£¬£¬£¬½öÐÂÎÅÈËʿ֤ʵÊý×Ö׼ȷ¡£¡£¡£¡£¡£ÎªÌá·À´ËÀ๥»÷£¬£¬£¬£¬£¬£¬Salesforce½¨Òé¿Í»§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡¢Ö´ÐÐ×îÐ¡ÌØÈ¨Ô­Ôò£¬£¬£¬£¬£¬£¬²¢ÑÏ¿áÖÎÀíµÚÈý·½Ó¦ÓÃÅþÁ¬¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/


3. ÐÂÐͶñÒâÈí¼þRaven Stealerͨ¹ýTelegramʵʱÇÔÈ¡Êý¾Ý


9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Point WildµÄLat61ÍþвÇ鱨ÍŶӷ¢Ã÷ÃûΪRaven StealerµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýµØÏÂÂÛ̳¼°µÁ°æÈí¼þÀ¦°óÈö²¥£¬£¬£¬£¬£¬£¬½ÓÄÉDelphiÓëC++±àд£¬£¬£¬£¬£¬£¬ÒÔСÇÉ¿ìËÙÎªÌØµã¡£¡£¡£¡£¡£Æä½¹µã¹¥»÷ÊÖ¶ÎΪ¡°Àú³ÌÍÚ¿Õ¡±£¨process hollowing£©ÊÖÒÕ£¬£¬£¬£¬£¬£¬ÍêÈ«ÔÚÄÚ´æÖÐÔËÐжø²»Ð´ÈëÓ²ÅÌ£¬£¬£¬£¬£¬£¬Î±×°³ÉÕý³£ä¯ÀÀÆ÷³ÌÐòÒÔ¹æ±Ü¹Å°åɱ¶¾Èí¼þ¼ì²â¡£¡£¡£¡£¡£Raven StealerÕë¶ÔChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÃÜÂë¡¢Cookie¡¢Ö§¸¶ÐÅÏ¢¼°ÉúÑĵÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸üΣÏÕµÄÊÇ£¬£¬£¬£¬£¬£¬Ëüͨ¹ýTelegram»úеÈ˽«Êý¾Ýʵʱ´«ÊäÖÁ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬Ðγɡ°¼´µÁ¼´´«¡±µÄÍþвÁ´Ìõ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃdzÒ×¹¹½¨¹¤¾ßÌìÉúΨһÃüÃûµÄ¼ÓÃܹ¥»÷Îļþ£¬£¬£¬£¬£¬£¬ÈëÇÖºóÍøÂçÆÁÄ»½ØÍ¼ÓëÊý¾ÝÖÁZIPÎļþʵÑé·¢ËÍ£¬£¬£¬£¬£¬£¬Ö»¹Ü²âÊÔÖÐÒò»úеÈËÁîÅÆÎÊÌâ´«Êäʧ°Ü£¬£¬£¬£¬£¬£¬µ«Êý¾Ýй¶Σº¦ÒÀÈ»±£´æ¡£¡£¡£¡£¡£ÎªÌá·À´ËÀàÍþв£¬£¬£¬£¬£¬£¬×¨¼Ò½¨Ò飺ʹÓþ߱¸ÊµÊ±·À»¤µÄ×îаæ·À²¡¶¾Èí¼þ£»£»£»£»£»£»×èÖ¹ÏÂÔØµÁ°æÈí¼þ£»£»£»£»£»£»ÉóÉ÷µã»÷¿ÉÒÉÁ´½Ó»ò¸½¼þ¡£¡£¡£¡£¡£


https://hackread.com/raven-stealer-malware-browsers-passwords-payment-data/


4. SonicWallÖÒÑÔ¿Í»§Òò·À»ðǽÉèÖñ¸·Ýй¶ÐèÖØÖÃÆ¾Ö¤


9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾SonicWall¿ËÈÕÐû²¼½ôÆÈ֪ͨ£¬£¬£¬£¬£¬£¬ÒªÇó¿Í»§ÖØÖÃÏà¹ØÆ¾Ö¤£¬£¬£¬£¬£¬£¬ÒòÆäMySonicWallÕË»§ÖеķÀ»ðǽÉèÖñ¸·ÝÎļþÔÚÇå¾²Îó²îÖÐÔâ̻¶£¬£¬£¬£¬£¬£¬¿ÉÄÜʹÍþвÐÐΪÕßʹÓñ¸·ÝÐÅÏ¢»á¼û×°±¸Ãô¸ÐЧÀÍ¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬SonicWallÁ¬Ã¦ÇжϹ¥»÷Õßϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢ÁªºÏÍøÂçÇå¾²»ú¹¹¼°Ö´·¨²¿·ÖÕö¿ªÊӲ졣¡£¡£¡£¡£¾ÝSonicWallÅû¶£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄ±¸·ÝÎļþ°üÀ¨¼ÓÃÜÃÜÂë¼°¿ÉÄܸ¨Öú¹¥»÷ÕßʹÓ÷À»ðǽµÄÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹ÜÎļþÒѼÓÃÜ£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔ¿ÉÄÜͨ¹ý±©Á¦ÆÆ½â»ñÈ¡ÔÆ±¸·ÝAPIЧÀÍȨÏÞ£¬£¬£¬£¬£¬£¬½ø¶ø»á¼û×°±¸ÉèÖᣡ£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ£¬£¬£¬£¬£¬£¬½ö²¨¼°²»µ½5%µÄSonicWall·À»ðǽװ±¸£¬£¬£¬£¬£¬£¬ÕâЩװ±¸ÔÚÔÆ¶Ë´æ´¢Á˱¸·ÝÊ×Ñ¡ÏîÎļþ£¬£¬£¬£¬£¬£¬¶ø¹¥»÷ÕßÕýÊÇͨ¹ý±©Á¦¹¥»÷Õë¶ÔÕâЩÎļþµÄAPIЧÀÍʵÑéÈëÇÖ¡£¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬£¬£¬£¬SonicWallÐû²¼ÏêϸָÄÏ£¬£¬£¬£¬£¬£¬½¨ÒéÖÎÀíÔ±½ÓÄɽṹ»¯²½·¥£ºÊ×ÏȽûÓûòÏÞÖÆWAN»á¼ûЧÀÍ£¬£¬£¬£¬£¬£¬ËæºóÖØÖÃÓû§¡¢VPNÕË»§¼°Ð§ÀÍʹÓõÄËùÓÐÆ¾Ö¤¡¢APIÃÜÔ¿ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬£¬²¢¸üÐÂÆäËû¹ØÁªÏµÍ³ÖеĹ²ÏíÃÜÔ¿ºÍ¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/


5. TA558ʹÓÃAIÌìÉúÍøÂç´¹ÂÚ¹¥»÷ÂùÝÒµ


9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬¶íÂÞ˹¿¨°Í˹»ùʵÑéÊÒ×·×Ù·¢Ã÷£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßTA558£¨¹ØÁªRevengeHotels¼¯Èº£©×Ô2025ÄêÏÄÈÕÆðÕë¶Ô°ÍÎ÷¼°Î÷°àÑÀÓïÊг¡ÂùÝÌᳫÐÂÐ͹¥»÷£¬£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúµÄÍøÂç´¹ÂÚÓʼþÈö²¥Venom RATµÈÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬£¬£¬ÇÔÈ¡¿ÍÈ˼°ÔÚÏßÂÃÐÐÉ磨ÈçBooking.com£©µÄÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔ·¢Æ±¡¢ÂùÝÔ¤¶©»òÇóÖ°ÉêÇëΪÓÕ¶üµÄÆÏÌÑÑÀÓï/Î÷°àÑÀÓï´¹ÂÚÓʼþÆô¶¯£¬£¬£¬£¬£¬£¬ÄÚº¬AIÌìÉúµÄJavaScript¼ÓÔØÆ÷¼°PowerShellÏÂÔØÆ÷¡£¡£¡£¡£¡£¾ç±¾×¢Ê͸»ºñ¡¢ÃûÌù淶£¬£¬£¬£¬£¬£¬ÇкϴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÌìÉúÌØÕ÷£¬£¬£¬£¬£¬£¬¿É¼ÓÔØºóÐø¾ç±¾ÊµÏÖ¶à½×¶ÎѬȾ¡£¡£¡£¡£¡£×îÖÕÔØºÉ°üÀ¨»ùÓÚ¿ªÔ´Quasar RATˢеÄVenom RATÉÌÒµ¹¤¾ß£¬£¬£¬£¬£¬£¬¾ß±¸Êý¾ÝÇÔÈ¡¡¢·´ÏòÊðÀí¡¢·ÀÖÕÖ¹±£»£»£»£»£»£»¤¼°³¤ÆÚ»¯¹¦Ð§¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÐÞˢгÌ×ÔÖ÷»á¼û¿ØÖÆÁÐ±í£¨DACL£©°þ¶áÇå¾²Àú³ÌȨÏÞ£¬£¬£¬£¬£¬£¬²¢Ã¿50ºÁÃëÑ­»·É¨ÃèÀú³ÌÁбí£¬£¬£¬£¬£¬£¬ÖÕÖ¹Çå¾²ÆÊÎöʦ³£ÓÃµÄ¼à¿Ø¹¤¾ß¡£¡£¡£¡£¡£ÈôÒÔÖÎÀíԱȨÏÞÔËÐУ¬£¬£¬£¬£¬£¬¿ÉÉèÖÃSeDebugPrivilegeÁîÅÆ±ê¼ÇΪϵͳҪº¦Àú³Ì£¬£¬£¬£¬£¬£¬Ç¿ÖÆÆÁÄ»³£ÁÁ·À˯Ãߣ¬£¬£¬£¬£¬£¬²¢Í¨¹ýUSBÇý¶¯Æ÷Èö²¥¡¢½ûÓÃMicrosoft Defender¼°¸Ä¶¯×¢²á±íά³Ö±£´æ¡£¡£¡£¡£¡£


https://thehackernews.com/2025/09/ta558-uses-ai-generated-scripts-to.html


6. µÙܽÄáÔâÊý¾Ýй¶£¬£¬£¬£¬£¬£¬³¬2500Ãû¿Í»§ÀñÎ│ÐÅÏ¢±»µÁ


9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÉݳÞÖ鱦¾ÞÍ·µÙܽÄṫ˾ÓÚ2025Äê5Ô³õÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÆäϵͳµ¼Ö³¬2500Ãû¿Í»§Éí·Ý¼°ÀñÎ│ÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¡£¡£Æ¾Ö¤µÙܽÄáÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢¼°Êý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÄÚÈݰüÀ¨¿Í»§ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÏúÊÛÊý¾Ý¡¢¿Í»§²Î¿¼±àºÅ¼°µÙܽÄáÀñÎ│ºÅÓëPINÂë¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚµÁË¢ÀñÎ│¹ºÖÃÖ鱦£¬£¬£¬£¬£¬£¬»ò³ÉÎªÍøÂç´¹ÂÚ¹¥»÷µÄÓÕ¶ü£¬£¬£¬£¬£¬£¬ÓÕÆ­¿Í»§Ð¹Â¶¸ü¶àÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£µÙܽÄáÔÚ·¢Ã÷δ¾­ÊÚȨ»á¼ûºó£¬£¬£¬£¬£¬£¬ÒÑÆô¶¯ÓÉÍâ²¿ÍøÂçÇå¾²¹«Ë¾Ö÷µ¼µÄÊӲ죬£¬£¬£¬£¬£¬²¢Ç¿µ÷¡°ÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»½øÒ»²½ÀÄÓᱡ£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Õâ²¢·Ç¸Ã¹«Ë¾Ê×´ÎÃæÁÙÊý¾ÝÇå¾²ÎÊÌ⣬£¬£¬£¬£¬£¬5ÔÂ⣬£¬£¬£¬£¬£¬Æäº«¹ú·Ö¹«Ë¾ÔøÒò¹©Ó¦ÉÌÊý¾Ýй¶µ¼Ö¿ͻ§ÐÅÏ¢ÍâÁ÷¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬µÙܽÄáĸ¹«Ë¾LVMHÆìÏÂÁíÒ»Æ·ÅÆµÏ°Â´ËǰҲÔâÓöÀàËÆÊÂÎñ£¬£¬£¬£¬£¬£¬¶ø¿ªÔƼ¯ÍŽüÆÚ¸ü±»ÆØ³ö740Íò·Ý¿Í»§Êý¾Ýй¶£¬£¬£¬£¬£¬£¬Í¹ÏÔÉÝ³ÞÆ·ÐÐÒµ³ÉÎªÍøÂç·¸·¨ÖØÔÖÇø¡£¡£¡£¡£¡£


https://cybernews.com/security/tiffany-data-breach-gift-cards-exposed/