΢ÈíÍŽáCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©
Ðû²¼Ê±¼ä 2025-09-181. ΢ÈíÍŽáCloudflare´Ý»ÙRaccoonO365ÍøÂç´¹ÂÚ»ù´¡ÉèÊ©
9ÔÂ17ÈÕ£¬Î¢ÈíÊý×Ö·¸·¨²¿·ÖÓëCloudflareÏàÖú£¬ÓÚ2025Äê9Ô²é·âÁËRaccoonO365ʹÓõÄ338¸öÓòÃû£¬³¹µ×ÆÆËðÁËÕâÒ»¾¼ÃÇý¶¯ÐÍÍþв×éÖ¯µÄÊÖÒÕ»ù´¡ÉèÊ©¡£¸Ã×éÖ¯×Ô2024Äê7ÔÂÆðͨ¹ý¡°ÍøÂç´¹ÂÚ¼´·þÎñ£¨PhaaS£©¡±¹¤¾ß°ü£¬´Ó94¸ö¹ú¼ÒÇÔÈ¡³¬5000¸öMicrosoft 365ƾ֤£¬Æä¶©ÔÄģʽ£¨30Ìì355ÃÀÔª¡¢90Ìì999ÃÀÔª£©Ê¹µÍÊÖÒÕÃż÷·¸·¨ÕßÄÜ´ó¹æÄ£Ìᳫ¹¥»÷¡£RaccoonO365£¨Î¢Èí×·×ÙΪStorm-2246£©µÄ¹¥»÷³£Î±×°³ÉMicrosoft¡¢DocuSignµÈ¿ÉÐÅÆ·ÅÆ£¬Í¨¹ýÚ²ÆÓʼþÓÕµ¼Êܺ¦ÕßÊäÈëÆ¾Ö¤£¬³£×÷Ϊ¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÄÏÈÕס£Æä·ÀÓù¹æ±ÜÕ½ÂÔ°üÀ¨Ê¹ÓÃÕýµ±¹¤¾ßCloudflare Turnstile×÷ΪCAPTCHA£¬ÒÔ¼°Í¨¹ýCloudflare Workers¾ç±¾ÊµÑé»úеÈ˼ì²â£¬È·±£½öÄ¿µÄÓû§¿É»á¼û´¹ÂÚÒ³Ãæ¡£2024Äê9ÔÂÒÔÀ´£¬¸Ã¹¤¾ßÒÑÕë¶Ô³¬2300¸öÃÀ¹ú×éÖ¯Ìᳫ¹¥»÷£¬µ¥ÈÕ¿ÉÊäÈë9000¸öÄ¿µÄÓÊÏ䣬²¢Ðû³ÆÄÜÈÆ¹ý¶àÒòËØÈÏÖ¤¡£Ä»ºóÖ÷ıΪÄáÈÕÀûÑÇÈËJoshua Ogundipe£¬Æäͨ¹ý850ÈËTelegramƵµÀÍÆ¹ã¹¤¾ß£¬»ñ³¬10ÍòÃÀÔª¼ÓÃÜÇ®±ÒÊÕÈë¡£
https://thehackernews.com/2025/09/raccoono365-phishing-network-shut-down.html
2. ÀÕË÷×é֯ʹÓÃÊÜËðOAuthÁîÅÆÇÔÈ¡³¬15ÒÚÌõSalesforceÊý¾Ý
9ÔÂ17ÈÕ£¬ÒÔShinyHunters¡¢Scattered SpiderºÍLapsusΪ½¹µãµÄ¡°Scattered Lapsus$ Hunters¡±ÀÕË÷×éÖ¯£¬Í¨¹ýÊÜËðµÄSalesloft Drift OAuthÁîÅÆ£¬´Ó760¼Ò¹«Ë¾ÇÔÈ¡ÁËÁè¼Ý15ÒÚÌõSalesforce¼Í¼£¬Éæ¼°¿Í»§¡¢ÁªÏµÈË¡¢ÉÌ»ú¡¢Óû§¼°°¸ÀýµÈ½¹µã¹¤¾ß±í¡£ÆäÖУ¬°¸Àý±í°üÀ¨¿Æ¼¼¹«Ë¾¿Í»§Ìá½»µÄÖ§³ÖƱÃô¸ÐÐÅÏ¢£¬Îª¹¥»÷ÕßÌṩÁ˽øÒ»²½ºáÏòÉøÍ¸µÄ¡°ÉñÃØ¡±£¨ÈçAWS»á¼ûÃÜÔ¿¡¢SnowflakeÁîÅÆµÈ£©¡£¹¥»÷·¾¶Ê¼ÓÚ½ñÄê3Ô£ºÍþвÐÐΪÕßÈëÇÖSalesloftµÄGitHub´æ´¢¿â»ñȡ˽ÓÐÔ´´úÂ룬ʹÓÃTruffleHog¹¤¾ßɨÃè·¢Ã÷Driftƽ̨OAuthÁîÅÆ£¬½ø¶øÍ¨¹ýµÚÈý·½Æ½Ì¨ÅþÁ¬SalesforceʵÀý£¬ÊµÏÖ´ó¹æÄ£Êý¾ÝÇÔÈ¡¡£±»µÁÊý¾Ý±»ÓÃÓÚÀÕË÷£¬ÆÈʹÆóÒµÖ§¸¶Êê½ðÒÔ×èÖ¹¹ûÕæÐ¹Â¶¡£GoogleÍþвÇ鱨£¨Mandiant£©½«´ËÔ˶¯×·×ÙΪUNC6040ºÍUNC6395£¬²¢Ö¸³ö¹¥»÷Õß»áÆÊÎö°¸ÀýÊý¾ÝÍÚ¾òÒþ²ØÆ¾Ö¤£¬ÒÔÈëÇÖÆäËûÇéÐΡ£FBIÒÑÐû²¼Ïà¹ØIOCÖÒÑÔ£¬µ«SalesloftÉÐδ»ØÓ¦Êý¾ÝÁ¿¼°¹«Ë¾×ÜÊýÎÊÌ⣬½öÐÂÎÅÈËʿ֤ʵÊý×Ö׼ȷ¡£ÎªÌá·À´ËÀ๥»÷£¬Salesforce½¨Òé¿Í»§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡¢Ö´ÐÐ×îÐ¡ÌØÈ¨ÔÔò£¬²¢ÑÏ¿áÖÎÀíµÚÈý·½Ó¦ÓÃÅþÁ¬¡£
https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/
3. ÐÂÐͶñÒâÈí¼þRaven Stealerͨ¹ýTelegramʵʱÇÔÈ¡Êý¾Ý
9ÔÂ17ÈÕ£¬Point WildµÄLat61ÍþвÇ鱨ÍŶӷ¢Ã÷ÃûΪRaven StealerµÄÐÂÐͶñÒâÈí¼þ£¬¸Ã¶ñÒâÈí¼þͨ¹ýµØÏÂÂÛ̳¼°µÁ°æÈí¼þÀ¦°óÈö²¥£¬½ÓÄÉDelphiÓëC++±àд£¬ÒÔСÇÉ¿ìËÙÎªÌØµã¡£Æä½¹µã¹¥»÷ÊÖ¶ÎΪ¡°Àú³ÌÍÚ¿Õ¡±£¨process hollowing£©ÊÖÒÕ£¬ÍêÈ«ÔÚÄÚ´æÖÐÔËÐжø²»Ð´ÈëÓ²ÅÌ£¬Î±×°³ÉÕý³£ä¯ÀÀÆ÷³ÌÐòÒÔ¹æ±Ü¹Å°åɱ¶¾Èí¼þ¼ì²â¡£Raven StealerÕë¶ÔChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷£¬ÇÔÈ¡ÃÜÂë¡¢Cookie¡¢Ö§¸¶ÐÅÏ¢¼°ÉúÑĵÄÃô¸ÐÊý¾Ý¡£¸üΣÏÕµÄÊÇ£¬Ëüͨ¹ýTelegram»úеÈ˽«Êý¾Ýʵʱ´«ÊäÖÁ¹¥»÷Õߣ¬Ðγɡ°¼´µÁ¼´´«¡±µÄÍþвÁ´Ìõ¡£¹¥»÷ÕßʹÓÃdzÒ×¹¹½¨¹¤¾ßÌìÉúΨһÃüÃûµÄ¼ÓÃܹ¥»÷Îļþ£¬ÈëÇÖºóÍøÂçÆÁÄ»½ØÍ¼ÓëÊý¾ÝÖÁZIPÎļþʵÑé·¢ËÍ£¬Ö»¹Ü²âÊÔÖÐÒò»úеÈËÁîÅÆÎÊÌâ´«Êäʧ°Ü£¬µ«Êý¾Ýй¶Σº¦ÒÀÈ»±£´æ¡£ÎªÌá·À´ËÀàÍþв£¬×¨¼Ò½¨Ò飺ʹÓþ߱¸ÊµÊ±·À»¤µÄ×îаæ·À²¡¶¾Èí¼þ£»×èÖ¹ÏÂÔØµÁ°æÈí¼þ£»ÉóÉ÷µã»÷¿ÉÒÉÁ´½Ó»ò¸½¼þ¡£
https://hackread.com/raven-stealer-malware-browsers-passwords-payment-data/
4. SonicWallÖÒÑÔ¿Í»§Òò·À»ðǽÉèÖñ¸·Ýй¶ÐèÖØÖÃÆ¾Ö¤
9ÔÂ17ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾SonicWall¿ËÈÕÐû²¼½ôÆÈ֪ͨ£¬ÒªÇó¿Í»§ÖØÖÃÏà¹ØÆ¾Ö¤£¬ÒòÆäMySonicWallÕË»§ÖеķÀ»ðǽÉèÖñ¸·ÝÎļþÔÚÇå¾²Îó²îÖÐÔâ̻¶£¬¿ÉÄÜʹÍþвÐÐΪÕßʹÓñ¸·ÝÐÅÏ¢»á¼û×°±¸Ãô¸Ð·þÎñ¡£ÊÂÎñ±¬·¢ºó£¬SonicWallÁ¬Ã¦ÇжϹ¥»÷Õßϵͳ»á¼ûȨÏÞ£¬²¢ÍŽáÍøÂçÇå¾²»ú¹¹¼°Ö´·¨²¿·ÖÕö¿ªÊӲ졣¾ÝSonicWallÅû¶£¬Ð¹Â¶µÄ±¸·ÝÎļþ°üÀ¨¼ÓÃÜÃÜÂë¼°¿ÉÄܸ¨Öú¹¥»÷ÕßʹÓ÷À»ðǽµÄÐÅÏ¢¡£Ö»¹ÜÎļþÒѼÓÃÜ£¬µ«¹¥»÷ÕßÈÔ¿ÉÄÜͨ¹ý±©Á¦ÆÆ½â»ñÈ¡ÔÆ±¸·ÝAPI·þÎñȨÏÞ£¬½ø¶ø»á¼û×°±¸ÉèÖᣴ˴ÎÊÂÎñÓ°Ïì¹æÄ£ÓÐÏÞ£¬½ö²¨¼°²»µ½5%µÄSonicWall·À»ðǽװ±¸£¬ÕâЩװ±¸ÔÚÔÆ¶Ë´æ´¢Á˱¸·ÝÊ×Ñ¡ÏîÎļþ£¬¶ø¹¥»÷ÕßÕýÊÇͨ¹ý±©Á¦¹¥»÷Õë¶ÔÕâЩÎļþµÄAPI·þÎñʵÑéÈëÇÖ¡£Îª½µµÍΣº¦£¬SonicWallÐû²¼ÏêϸָÄÏ£¬½¨ÒéÖÎÀíÔ±½ÓÄɽṹ»¯²½·¥£ºÊ×ÏȽûÓûòÏÞÖÆWAN»á¼û·þÎñ£¬ËæºóÖØÖÃÓû§¡¢VPNÕË»§¼°·þÎñʹÓõÄËùÓÐÆ¾Ö¤¡¢APIÃÜÔ¿ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬²¢¸üÐÂÆäËû¹ØÁªÏµÍ³ÖеĹ²ÏíÃÜÔ¿ºÍ¼ÓÃÜÃÜÔ¿¡£
https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/
5. TA558ʹÓÃAIÌìÉúÍøÂç´¹ÂÚ¹¥»÷ÂùÝÒµ
9ÔÂ17ÈÕ£¬¶íÂÞ˹¿¨°Í˹»ùʵÑéÊÒ×·×Ù·¢Ã÷£¬ÍþвÐÐΪÕßTA558£¨¹ØÁªRevengeHotels¼¯Èº£©×Ô2025ÄêÏÄÈÕÆðÕë¶Ô°ÍÎ÷¼°Î÷°àÑÀÓïÊг¡ÂùÝÌᳫÐÂÐ͹¥»÷£¬Í¨¹ýAIÌìÉúµÄÍøÂç´¹ÂÚÓʼþÈö²¥Venom RATµÈÔ¶³Ì»á¼ûľÂí£¬ÇÔÈ¡¿ÍÈ˼°ÔÚÏßÂÃÐÐÉ磨ÈçBooking.com£©µÄÐÅÓÿ¨Êý¾Ý¡£¹¥»÷Á´ÒÔ·¢Æ±¡¢ÂùÝÔ¤¶©»òÇóÖ°ÉêÇëΪÓÕ¶üµÄÆÏÌÑÑÀÓï/Î÷°àÑÀÓï´¹ÂÚÓʼþÆô¶¯£¬ÄÚº¬AIÌìÉúµÄJavaScript¼ÓÔØÆ÷¼°PowerShellÏÂÔØÆ÷¡£¾ç±¾×¢Ê͸»ºñ¡¢ÃûÌù淶£¬ÇкϴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÌìÉúÌØÕ÷£¬¿É¼ÓÔØºóÐø¾ç±¾ÊµÏÖ¶à½×¶ÎѬȾ¡£×îÖÕÔØºÉ°üÀ¨»ùÓÚ¿ªÔ´Quasar RATˢеÄVenom RATÉÌÒµ¹¤¾ß£¬¾ß±¸Êý¾ÝÇÔÈ¡¡¢·´ÏòÊðÀí¡¢·ÀÖÕÖ¹±£»¤¼°³¤ÆÚ»¯¹¦Ð§¡£¸Ã¶ñÒâÈí¼þͨ¹ýÐÞˢгÌ×ÔÖ÷»á¼û¿ØÖÆÁÐ±í£¨DACL£©°þ¶áÇå¾²Àú³ÌȨÏÞ£¬²¢Ã¿50ºÁÃëÑ»·É¨ÃèÀú³ÌÁÐ±í£¬ÖÕÖ¹Çå¾²ÆÊÎöʦ³£ÓÃµÄ¼à¿Ø¹¤¾ß¡£ÈôÒÔÖÎÀíԱȨÏÞÔËÐУ¬¿ÉÉèÖÃSeDebugPrivilegeÁîÅÆ±ê¼ÇΪϵͳҪº¦Àú³Ì£¬Ç¿ÖÆÆÁÄ»³£ÁÁ·À˯Ãߣ¬²¢Í¨¹ýUSBÇý¶¯Æ÷Èö²¥¡¢½ûÓÃMicrosoft Defender¼°¸Ä¶¯×¢²á±íά³Ö±£´æ¡£
https://thehackernews.com/2025/09/ta558-uses-ai-generated-scripts-to.html
6. µÙܽÄáÔâÊý¾Ýй¶£¬³¬2500Ãû¿Í»§ÀñÎ│ÐÅÏ¢±»µÁ
9ÔÂ17ÈÕ£¬ÃÀ¹úÉݳÞÖ鱦¾ÞÍ·µÙܽÄṫ˾ÓÚ2025Äê5Ô³õÔâÓöÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÈëÇÖÆäϵͳµ¼Ö³¬2500Ãû¿Í»§Éí·Ý¼°ÀñÎ│ÐÅÏ¢±»ÇÔÈ¡¡£Æ¾Ö¤µÙܽÄáÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢¼°Êý¾Ýй¶֪ͨ£¬Ð¹Â¶ÄÚÈݰüÀ¨¿Í»§ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÏúÊÛÊý¾Ý¡¢¿Í»§²Î¿¼±àºÅ¼°µÙܽÄáÀñÎ│ºÅÓëPINÂë¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚµÁË¢ÀñÎ│¹ºÖÃÖ鱦£¬»ò³ÉÎªÍøÂç´¹ÂÚ¹¥»÷µÄÓÕ¶ü£¬ÓÕÆ¿Í»§Ð¹Â¶¸ü¶àÃô¸ÐÊý¾Ý¡£µÙܽÄáÔÚ·¢Ã÷δ¾ÊÚȨ»á¼ûºó£¬ÒÑÆô¶¯ÓÉÍâ²¿ÍøÂçÇå¾²¹«Ë¾Ö÷µ¼µÄÊӲ죬²¢Ç¿µ÷¡°ÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»½øÒ»²½ÀÄÓᱡ£È»¶ø£¬Õâ²¢·Ç¸Ã¹«Ë¾Ê×´ÎÃæÁÙÊý¾ÝÇå¾²ÎÊÌ⣬5ÔÂ⣬Æäº«¹ú·Ö¹«Ë¾ÔøÒò¹©Ó¦ÉÌÊý¾Ýй¶µ¼Ö¿ͻ§ÐÅÏ¢ÍâÁ÷¡£ÖµµÃ×¢ÖØµÄÊÇ£¬µÙܽÄáĸ¹«Ë¾LVMHÆìÏÂÁíÒ»Æ·ÅÆµÏ°Â´ËǰҲÔâÓöÀàËÆÊÂÎñ£¬¶ø¿ªÔƼ¯ÍŽüÆÚ¸ü±»ÆØ³ö740Íò·Ý¿Í»§Êý¾Ýй¶£¬Í¹ÏÔÉÝ³ÞÆ·ÐÐÒµ³ÉÎªÍøÂç·¸·¨ÖØÔÖÇø¡£
https://cybernews.com/security/tiffany-data-breach-gift-cards-exposed/


¾©¹«Íø°²±¸11010802024551ºÅ