΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©

Ðû²¼Ê±¼ä 2025-09-18

1. ΢ÈíÁªºÏCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©


9ÔÂ17ÈÕ£¬£¬ £¬£¬Î¢ÈíÊý×Ö·¸·¨²¿·ÖÓëCloudflareÏàÖú£¬£¬ £¬£¬ÓÚ2025Äê9Ô²é·âÁËRaccoonO365ʹÓõÄ338¸öÓòÃû£¬£¬ £¬£¬³¹µ×ÆÆËðÁËÕâÒ»¾­¼ÃÇý¶¯ÐÍÍþв×éÖ¯µÄÊÖÒÕ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2024Äê7ÔÂÆðͨ¹ý¡°ÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©¡±¹¤¾ß°ü£¬£¬ £¬£¬´Ó94¸ö¹ú¼ÒÇÔÈ¡³¬5000¸öMicrosoft 365ƾ֤£¬£¬ £¬£¬Æä¶©ÔÄģʽ£¨30Ìì355ÃÀÔª¡¢90Ìì999ÃÀÔª£©Ê¹µÍÊÖÒÕÃż÷·¸·¨ÕßÄÜ´ó¹æÄ£Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£RaccoonO365£¨Î¢Èí×·×ÙΪStorm-2246£©µÄ¹¥»÷³£Î±×°³ÉMicrosoft¡¢DocuSignµÈ¿ÉÐÅÆ·ÅÆ£¬£¬ £¬£¬Í¨¹ýڲƭÓʼþÓÕµ¼Êܺ¦ÕßÊäÈëÆ¾Ö¤£¬£¬ £¬£¬³£×÷Ϊ¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÄÏÈÕס£¡£¡£¡£¡£¡£Æä·ÀÓù¹æ±ÜÕ½ÂÔ°üÀ¨Ê¹ÓÃÕýµ±¹¤¾ßCloudflare Turnstile×÷ΪCAPTCHA£¬£¬ £¬£¬ÒÔ¼°Í¨¹ýCloudflare Workers¾ç±¾ÊµÑé»úеÈ˼ì²â£¬£¬ £¬£¬È·±£½öÄ¿µÄÓû§¿É»á¼û´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£2024Äê9ÔÂÒÔÀ´£¬£¬ £¬£¬¸Ã¹¤¾ßÒÑÕë¶Ô³¬2300¸öÃÀ¹ú×éÖ¯Ìᳫ¹¥»÷£¬£¬ £¬£¬µ¥ÈÕ¿ÉÊäÈë9000¸öÄ¿µÄÓÊÏ䣬£¬ £¬£¬²¢Ðû³ÆÄÜÈÆ¹ý¶àÒòËØÈÏÖ¤¡£¡£¡£¡£¡£¡£Ä»ºóÖ÷ıΪÄáÈÕÀûÑÇÈËJoshua Ogundipe£¬£¬ £¬£¬Æäͨ¹ý850ÈËTelegramƵµÀÍÆ¹ã¹¤¾ß£¬£¬ £¬£¬»ñ³¬10ÍòÃÀÔª¼ÓÃÜÇ®±ÒÊÕÈë¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/09/raccoono365-phishing-network-shut-down.html


2. ÀÕË÷×é֯ʹÓÃÊÜËðOAuthÁîÅÆÇÔÈ¡³¬15ÒÚÌõSalesforceÊý¾Ý


9ÔÂ17ÈÕ£¬£¬ £¬£¬ÒÔShinyHunters¡¢Scattered SpiderºÍLapsusΪ½¹µãµÄ¡°Scattered Lapsus$ Hunters¡±ÀÕË÷×éÖ¯£¬£¬ £¬£¬Í¨¹ýÊÜËðµÄSalesloft Drift OAuthÁîÅÆ£¬£¬ £¬£¬´Ó760¼Ò¹«Ë¾ÇÔÈ¡ÁËÁè¼Ý15ÒÚÌõSalesforce¼Í¼£¬£¬ £¬£¬Éæ¼°¿Í»§¡¢ÁªÏµÈË¡¢ÉÌ»ú¡¢Óû§¼°°¸ÀýµÈ½¹µã¹¤¾ß±í¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬ £¬£¬°¸Àý±í°üÀ¨¿Æ¼¼¹«Ë¾¿Í»§Ìá½»µÄÖ§³ÖƱÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬Îª¹¥»÷ÕßÌṩÁ˽øÒ»²½ºáÏòÉøÍ¸µÄ¡°ÉñÃØ¡±£¨ÈçAWS»á¼ûÃÜÔ¿¡¢SnowflakeÁîÅÆµÈ£©¡£¡£¡£¡£¡£¡£¹¥»÷·¾¶Ê¼ÓÚ½ñÄê3Ô£ºÍþвÐÐΪÕßÈëÇÖSalesloftµÄGitHub´æ´¢¿â»ñȡ˽ÓÐÔ´´úÂ룬£¬ £¬£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃè·¢Ã÷Driftƽ̨OAuthÁîÅÆ£¬£¬ £¬£¬½ø¶øÍ¨¹ýµÚÈý·½Æ½Ì¨ÅþÁ¬SalesforceʵÀý£¬£¬ £¬£¬ÊµÏÖ´ó¹æÄ£Êý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ý±»ÓÃÓÚÀÕË÷£¬£¬ £¬£¬ÆÈʹÆóÒµÖ§¸¶Êê½ðÒÔ×èÖ¹¹ûÕæÐ¹Â¶¡£¡£¡£¡£¡£¡£GoogleÍþвÇ鱨£¨Mandiant£©½«´Ë»î¶¯×·×ÙΪUNC6040ºÍUNC6395£¬£¬ £¬£¬²¢Ö¸³ö¹¥»÷Õß»áÆÊÎö°¸ÀýÊý¾ÝÍÚ¾òÒþ²ØÆ¾Ö¤£¬£¬ £¬£¬ÒÔÈëÇÖÆäËûÇéÐΡ£¡£¡£¡£¡£¡£FBIÒÑÐû²¼Ïà¹ØIOCÖÒÑÔ£¬£¬ £¬£¬µ«SalesloftÉÐδ»ØÓ¦Êý¾ÝÁ¿¼°¹«Ë¾×ÜÊýÎÊÌ⣬£¬ £¬£¬½öÐÂÎÅÈËʿ֤ʵÊý×Ö׼ȷ¡£¡£¡£¡£¡£¡£ÎªÌá·À´ËÀ๥»÷£¬£¬ £¬£¬Salesforce½¨Òé¿Í»§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡¢Ö´ÐÐ×îÐ¡ÌØÈ¨Ô­Ôò£¬£¬ £¬£¬²¢ÑÏ¿áÖÎÀíµÚÈý·½Ó¦ÓÃÅþÁ¬¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/


3. ÐÂÐͶñÒâÈí¼þRaven Stealerͨ¹ýTelegramʵʱÇÔÈ¡Êý¾Ý


9ÔÂ17ÈÕ£¬£¬ £¬£¬Point WildµÄLat61ÍþвÇ鱨ÍŶӷ¢Ã÷ÃûΪRaven StealerµÄÐÂÐͶñÒâÈí¼þ£¬£¬ £¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýµØÏÂÂÛ̳¼°µÁ°æÈí¼þÀ¦°óÈö²¥£¬£¬ £¬£¬½ÓÄÉDelphiÓëC++±àд£¬£¬ £¬£¬ÒÔСÇÉ¿ìËÙÎªÌØµã¡£¡£¡£¡£¡£¡£Æä½¹µã¹¥»÷ÊÖ¶ÎΪ¡°Àú³ÌÍÚ¿Õ¡±£¨process hollowing£©ÊÖÒÕ£¬£¬ £¬£¬ÍêÈ«ÔÚÄÚ´æÖÐÔËÐжø²»Ð´ÈëÓ²ÅÌ£¬£¬ £¬£¬Î±×°³ÉÕý³£ä¯ÀÀÆ÷³ÌÐòÒÔ¹æ±Ü¹Å°åɱ¶¾Èí¼þ¼ì²â¡£¡£¡£¡£¡£¡£Raven StealerÕë¶ÔChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷£¬£¬ £¬£¬ÇÔÈ¡ÃÜÂë¡¢Cookie¡¢Ö§¸¶ÐÅÏ¢¼°ÉúÑĵÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸üΣÏÕµÄÊÇ£¬£¬ £¬£¬Ëüͨ¹ýTelegram»úеÈ˽«Êý¾Ýʵʱ´«ÊäÖÁ¹¥»÷Õߣ¬£¬ £¬£¬Ðγɡ°¼´µÁ¼´´«¡±µÄÍþвÁ´Ìõ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃdzÒ×¹¹½¨¹¤¾ßÌìÉúΨһÃüÃûµÄ¼ÓÃܹ¥»÷Îļþ£¬£¬ £¬£¬ÈëÇÖºóÍøÂçÆÁÄ»½ØÍ¼ÓëÊý¾ÝÖÁZIPÎļþʵÑé·¢ËÍ£¬£¬ £¬£¬Ö»¹Ü²âÊÔÖÐÒò»úеÈËÁîÅÆÎÊÌâ´«Êäʧ°Ü£¬£¬ £¬£¬µ«Êý¾Ýй¶Σº¦ÒÀÈ»±£´æ¡£¡£¡£¡£¡£¡£ÎªÌá·À´ËÀàÍþв£¬£¬ £¬£¬×¨¼Ò½¨Ò飺ʹÓþ߱¸ÊµÊ±·À»¤µÄ×îаæ·À²¡¶¾Èí¼þ£»£»£»£»×èÖ¹ÏÂÔØµÁ°æÈí¼þ£»£»£»£»ÉóÉ÷µã»÷¿ÉÒÉÁ´½Ó»ò¸½¼þ¡£¡£¡£¡£¡£¡£


https://hackread.com/raven-stealer-malware-browsers-passwords-payment-data/


4. SonicWallÖÒÑÔ¿Í»§Òò·À»ðǽÉèÖñ¸·Ýй¶ÐèÖØÖÃÆ¾Ö¤


9ÔÂ17ÈÕ£¬£¬ £¬£¬ÍøÂçÇå¾²¹«Ë¾SonicWall¿ËÈÕÐû²¼½ôÆÈ֪ͨ£¬£¬ £¬£¬ÒªÇó¿Í»§ÖØÖÃÏà¹ØÆ¾Ö¤£¬£¬ £¬£¬ÒòÆäMySonicWallÕË»§ÖеķÀ»ðǽÉèÖñ¸·ÝÎļþÔÚÇå¾²Îó²îÖÐÔâ̻¶£¬£¬ £¬£¬¿ÉÄÜʹÍþвÐÐΪÕßʹÓñ¸·ÝÐÅÏ¢»á¼û×°±¸Ãô¸ÐЧÀÍ¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬ £¬£¬SonicWallÁ¬Ã¦ÇжϹ¥»÷Õßϵͳ»á¼ûȨÏÞ£¬£¬ £¬£¬²¢ÁªºÏÍøÂçÇå¾²»ú¹¹¼°Ö´·¨²¿·ÖÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¾ÝSonicWallÅû¶£¬£¬ £¬£¬Ð¹Â¶µÄ±¸·ÝÎļþ°üÀ¨¼ÓÃÜÃÜÂë¼°¿ÉÄܸ¨Öú¹¥»÷ÕßʹÓ÷À»ðǽµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜÎļþÒѼÓÃÜ£¬£¬ £¬£¬µ«¹¥»÷ÕßÈÔ¿ÉÄÜͨ¹ý±©Á¦ÆÆ½â»ñÈ¡ÔÆ±¸·ÝAPIЧÀÍȨÏÞ£¬£¬ £¬£¬½ø¶ø»á¼û×°±¸ÉèÖᣡ£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ£¬£¬ £¬£¬½ö²¨¼°²»µ½5%µÄSonicWall·À»ðǽװ±¸£¬£¬ £¬£¬ÕâЩװ±¸ÔÚÔÆ¶Ë´æ´¢Á˱¸·ÝÊ×Ñ¡ÏîÎļþ£¬£¬ £¬£¬¶ø¹¥»÷ÕßÕýÊÇͨ¹ý±©Á¦¹¥»÷Õë¶ÔÕâЩÎļþµÄAPIЧÀÍʵÑéÈëÇÖ¡£¡£¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬ £¬£¬SonicWallÐû²¼ÏêϸָÄÏ£¬£¬ £¬£¬½¨ÒéÖÎÀíÔ±½ÓÄɽṹ»¯²½·¥£ºÊ×ÏȽûÓûòÏÞÖÆWAN»á¼ûЧÀÍ£¬£¬ £¬£¬ËæºóÖØÖÃÓû§¡¢VPNÕË»§¼°Ð§ÀÍʹÓõÄËùÓÐÆ¾Ö¤¡¢APIÃÜÔ¿ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬ £¬£¬²¢¸üÐÂÆäËû¹ØÁªÏµÍ³ÖеĹ²ÏíÃÜÔ¿ºÍ¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/


5. TA558ʹÓÃAIÌìÉúÍøÂç´¹ÂÚ¹¥»÷ÂùÝÒµ


9ÔÂ17ÈÕ£¬£¬ £¬£¬¶íÂÞ˹¿¨°Í˹»ùʵÑéÊÒ×·×Ù·¢Ã÷£¬£¬ £¬£¬ÍþвÐÐΪÕßTA558£¨¹ØÁªRevengeHotels¼¯Èº£©×Ô2025ÄêÏÄÈÕÆðÕë¶Ô°ÍÎ÷¼°Î÷°àÑÀÓïÊг¡ÂùÝÌᳫÐÂÐ͹¥»÷£¬£¬ £¬£¬Í¨¹ýAIÌìÉúµÄÍøÂç´¹ÂÚÓʼþÈö²¥Venom RATµÈÔ¶³Ì»á¼ûľÂí£¬£¬ £¬£¬ÇÔÈ¡¿ÍÈ˼°ÔÚÏßÂÃÐÐÉ磨ÈçBooking.com£©µÄÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÒÔ·¢Æ±¡¢ÂùÝÔ¤¶©»òÇóÖ°ÉêÇëΪÓÕ¶üµÄÆÏÌÑÑÀÓï/Î÷°àÑÀÓï´¹ÂÚÓʼþÆô¶¯£¬£¬ £¬£¬ÄÚº¬AIÌìÉúµÄJavaScript¼ÓÔØÆ÷¼°PowerShellÏÂÔØÆ÷¡£¡£¡£¡£¡£¡£¾ç±¾×¢Ê͸»ºñ¡¢ÃûÌù淶£¬£¬ £¬£¬ÇкϴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÌìÉúÌØÕ÷£¬£¬ £¬£¬¿É¼ÓÔØºóÐø¾ç±¾ÊµÏÖ¶à½×¶ÎѬȾ¡£¡£¡£¡£¡£¡£×îÖÕÔØºÉ°üÀ¨»ùÓÚ¿ªÔ´Quasar RATˢеÄVenom RATÉÌÒµ¹¤¾ß£¬£¬ £¬£¬¾ß±¸Êý¾ÝÇÔÈ¡¡¢·´ÏòÊðÀí¡¢·ÀÖÕÖ¹±£»£»£»£»¤¼°³¤ÆÚ»¯¹¦Ð§¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÐÞˢгÌ×ÔÖ÷»á¼û¿ØÖÆÁÐ±í£¨DACL£©°þ¶áÇå¾²Àú³ÌȨÏÞ£¬£¬ £¬£¬²¢Ã¿50ºÁÃëÑ­»·É¨ÃèÀú³ÌÁбí£¬£¬ £¬£¬ÖÕÖ¹Çå¾²ÆÊÎöʦ³£ÓÃµÄ¼à¿Ø¹¤¾ß¡£¡£¡£¡£¡£¡£ÈôÒÔÖÎÀíԱȨÏÞÔËÐУ¬£¬ £¬£¬¿ÉÉèÖÃSeDebugPrivilegeÁîÅÆ±ê¼ÇΪϵͳҪº¦Àú³Ì£¬£¬ £¬£¬Ç¿ÖÆÆÁÄ»³£ÁÁ·À˯Ãߣ¬£¬ £¬£¬²¢Í¨¹ýUSBÇý¶¯Æ÷Èö²¥¡¢½ûÓÃMicrosoft Defender¼°¸Ä¶¯×¢²á±íά³Ö±£´æ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/09/ta558-uses-ai-generated-scripts-to.html


6. µÙܽÄáÔâÊý¾Ýй¶£¬£¬ £¬£¬³¬2500Ãû¿Í»§ÀñÎ│ÐÅÏ¢±»µÁ


9ÔÂ17ÈÕ£¬£¬ £¬£¬ÃÀ¹úÉݳÞÖ鱦¾ÞÍ·µÙܽÄṫ˾ÓÚ2025Äê5Ô³õÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬¹¥»÷ÕßÈëÇÖÆäϵͳµ¼Ö³¬2500Ãû¿Í»§Éí·Ý¼°ÀñÎ│ÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£Æ¾Ö¤µÙܽÄáÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢¼°Êý¾Ýй¶֪ͨ£¬£¬ £¬£¬Ð¹Â¶ÄÚÈݰüÀ¨¿Í»§ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÏúÊÛÊý¾Ý¡¢¿Í»§²Î¿¼±àºÅ¼°µÙܽÄáÀñÎ│ºÅÓëPINÂë¡£¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚµÁË¢ÀñÎ│¹ºÖÃÖ鱦£¬£¬ £¬£¬»ò³ÉÎªÍøÂç´¹ÂÚ¹¥»÷µÄÓÕ¶ü£¬£¬ £¬£¬ÓÕÆ­¿Í»§Ð¹Â¶¸ü¶àÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£µÙܽÄáÔÚ·¢Ã÷δ¾­ÊÚȨ»á¼ûºó£¬£¬ £¬£¬ÒÑÆô¶¯ÓÉÍâ²¿ÍøÂçÇå¾²¹«Ë¾Ö÷µ¼µÄÊӲ죬£¬ £¬£¬²¢Ç¿µ÷¡°ÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»½øÒ»²½ÀÄÓᱡ£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬Õâ²¢·Ç¸Ã¹«Ë¾Ê×´ÎÃæÁÙÊý¾ÝÇå¾²ÎÊÌ⣬£¬ £¬£¬5ÔÂ⣬£¬ £¬£¬Æäº«¹ú·Ö¹«Ë¾ÔøÒò¹©Ó¦ÉÌÊý¾Ýй¶µ¼Ö¿ͻ§ÐÅÏ¢ÍâÁ÷¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬µÙܽÄáĸ¹«Ë¾LVMHÆìÏÂÁíÒ»Æ·ÅÆµÏ°Â´ËǰҲÔâÓöÀàËÆÊÂÎñ£¬£¬ £¬£¬¶ø¿ªÔƼ¯ÍŽüÆÚ¸ü±»ÆØ³ö740Íò·Ý¿Í»§Êý¾Ýй¶£¬£¬ £¬£¬Í¹ÏÔÉÝ³ÞÆ·ÐÐÒµ³ÉÎªÍøÂç·¸·¨ÖØÔÖÇø¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/tiffany-data-breach-gift-cards-exposed/