΢Èí½áºÏCloudflare·ÛËéRaccoonO365ÍøÂç´¹µö»ù´¡ÉèÊ©
°ä²¼¹¦·ò 2025-09-181. ΢Èí½áºÏCloudflare·ÛËéRaccoonO365ÍøÂç´¹µö»ù´¡ÉèÊ©
9ÔÂ17ÈÕ£¬Î¢ÈíÊý×Ö·¸×ﲿÃÅÓëCloudflareºÏ×÷£¬ÓÚ2025Äê9Ô²é·âÁËRaccoonO365ʹÓõÄ338¸öÓòÃû£¬³¹µ×·ÛËéÁËÕâÒѾ¼ÃÇý¶¯ÐÍÍþв×éÖ¯µÄ¼¼Êõ»ù´¡ÉèÊ©¡£¸Ã×éÖ¯×Ô2024Äê7ÔÂÆðͨ¹ý¡°ÍøÂç´¹µö¼´·þÎñ£¨PhaaS£©¡±¹¤¾ß°ü£¬´Ó94¸ö¹ú¶ÈÇÔÈ¡³¬5000¸öMicrosoft 365ƾ֤£¬Æä¶©ÔÄģʽ£¨30Ìì355ÃÀÔª¡¢90Ìì999ÃÀÔª£©Ê¹µÍ¼¼ÊõÃż÷·¸×ïÕßÄÜ´ó¹æÄ£ÌáÒé¹¥»÷¡£RaccoonO365£¨Î¢Èí×·×ÙΪStorm-2246£©µÄ¹¥»÷³£¼Ù×°³ÉMicrosoft¡¢DocuSignµÈ¿ÉÐÅÆ·ÅÆ£¬Í¨¹ýÚ²ÆÓʼþÓÕµ¼Êܺ¦ÕßÊäÈëÆ¾Ö¤£¬³£×÷Ϊ¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÄÔ¤Õס£Æä·ÀÓù¶ã±ÜÕ½ÊõÔ̺¬Ê¹ÓúϷ¨¹¤¾ßCloudflare Turnstile×÷ΪCAPTCHA£¬ÒÔ¼°Í¨¹ýCloudflare Workers¾ç±¾Ö´ÐлúеÈ˼ì²â£¬È·±£½öÖ¸±êÓû§¿É½Ó¼û´¹µöÒ³Ãæ¡£2024Äê9ÔÂÒÔÀ´£¬¸Ã¹¤¾ßÒÑÕë¶Ô³¬2300¸öÃÀ¹ú×éÖ¯ÌáÒé¹¥»÷£¬µ¥ÈÕ¿ÉÊäÈë9000¸öÖ¸±êÓÊÏ䣬²¢Ðû³ÆÄÜÈÆ¹ý¶à³É·ÖÈÏÖ¤¡£Ä»ºóÖ÷ıΪÄáÈÕÀûÑÇÈËJoshua Ogundipe£¬Æäͨ¹ý850ÈËTelegramÆµÂ·ÍÆ¹ã¹¤¾ß£¬»ñ³¬10ÍòÃÀÔª¼ÓÃÜÇ®±ÒÊÕÈë¡£
https://thehackernews.com/2025/09/raccoono365-phishing-network-shut-down.html
2. ÀÕË÷×éÖ¯ÀûÓÃÊÜËðOAuthÁîÅÆÇÔÈ¡³¬15ÒÚÌõSalesforceÊý¾Ý
9ÔÂ17ÈÕ£¬ÒÔShinyHunters¡¢Scattered SpiderºÍLapsusΪÖ÷ÌâµÄ¡°Scattered Lapsus$ Hunters¡±ÀÕË÷×éÖ¯£¬Í¨¹ýÊÜËðµÄSalesloft Drift OAuthÁîÅÆ£¬´Ó760¼Ò¹«Ë¾ÇÔÈ¡Á˳¬¹ý15ÒÚÌõSalesforce¼Í¼£¬Éæ¼°¿Í»§¡¢ÁªÏµÈË¡¢ÉÌ»ú¡¢Óû§¼°°¸ÀýµÈÖ÷Ìâ¶ÔÏó±í¡£ÆäÖУ¬°¸Àý±íÔ̺¬¿Æ¼¼¹«Ë¾¿Í»§Ìá½»µÄÖ§³Ôì±Ãô¸ÐÐÅÏ¢£¬Îª¹¥»÷ÕßÌṩÁ˽øÒ»²½ºáÏòÉøÈëµÄ¡°°ÂÃØ¡±£¨ÈçAWS½Ó¼ûÃÜÔ¿¡¢SnowflakeÁîÅÆµÈ£©¡£¹¥»÷õ辶ʼÓÚ½ñÄê3Ô£ºÍþвÐÐΪÕßÈëÇÖSalesloftµÄGitHub´æ´¢¿â»ñȡ˽ÓÐÔ´´úÂ룬ÀûÓÃTruffleHog¹¤¾ßɨÃè·¢ÏÖDriftƽ̨OAuthÁîÅÆ£¬½ø¶øÍ¨¹ýµÚÈý·½Æ½Ì¨ÏνÓSalesforceÊ·ý£¬ÊµÏÖ´ó¹æÄ£Êý¾ÝÇÔÈ¡¡£±»µÁÊý¾Ý±»ÓÃÓÚÀÕË÷£¬ÆÈʹÆóÒµÖ§¸¶Êê½ðÒÔÔ¤·À¹«¿ªÐ¹Â¶¡£GoogleÍþвµý±¨£¨Mandiant£©½«´Ë»î¶¯×·×ÙΪUNC6040ºÍUNC6395£¬²¢Ö¸³ö¹¥»÷Õß»á·ÖÎö°¸ÀýÊý¾ÝÍÚ¾ò°µ²ØÆ¾Ö¤£¬ÒÔÈëÇÔìäËû»·¾³¡£FBIÒѰ䲼ÓйØIOCÖҸ棬µ«SalesloftÉÐδ»ØÓ¦Êý¾ÝÁ¿¼°¹«Ë¾×ÜÊýÎÊÌ⣬½öÐÂÎÅÈËʿ֤ʵÊý×ÖÕýÈ·¡£Îª·À±¸´ËÀ๥»÷£¬Salesforce½¨Òé¿Í»§ÆôÓöà³É·ÖÈÏÖ¤£¨MFA£©¡¢Ö´ÐÐ×îÓ×ÌØÈ¨×¼Ôò£¬²¢ÑϸñÖÎÀíµÚÈý·½ÀûÓÃÏνӡ£
https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/
3. ÐÂÐͶñÒâÈí¼þRaven Stealerͨ¹ýTelegramʵʱÇÔÈ¡Êý¾Ý
9ÔÂ17ÈÕ£¬Point WildµÄLat61Íþвµý±¨ÍŶӷ¢ÏÖÃûΪRaven StealerµÄÐÂÐͶñÒâÈí¼þ£¬¸Ã¶ñÒâÈí¼þͨ¹ýµØÏÂÂÛ̳¼°µÁ°æÈí¼þ°ó¸¿´«²¼£¬Ñ¡È¡DelphiÓëC++±àд£¬ÒÔÓ×Çɼ±¾çÎªÌØµã¡£ÆäÖ÷Ìâ¹¥»÷¼¿Á©Îª¡°¹ý³ÌÍÚ¿Õ¡±£¨process hollowing£©¼¼Êõ£¬ÆëÈ«ÔÚÄÚ´æÖÐÔËÐжø²»Ð´ÈëÓ²ÅÌ£¬¼Ù×°³ÉÕý³£ä¯ÀÀÆ÷·¨Ê½ÒÔ¶ã±Ü´«Í³É±¶¾Èí¼þ¼ì²â¡£Raven StealerÕë¶ÔChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷£¬ÇÔÈ¡ÃÜÂë¡¢Cookie¡¢Ö§¸¶ÐÅÏ¢¼°±£ÁôµÄÃô¸ÐÊý¾Ý¡£¸üΣÏÕµÄÊÇ£¬Ëüͨ¹ýTelegram»úеÈ˽«Êý¾Ýʵʱ´«ÊäÖÁ¹¥»÷Õߣ¬Ðγɡ°¼´µÁ¼´´«¡±µÄÍþвÁ´Ìõ¡£¹¥»÷ÕßʹÓüòÒ×¹¹½¨¹¤¾ßÌìÉúΨһ¶¨ÃûµÄ¼ÓÃܹ¥»÷Îļþ£¬ÈëÇÖºóÍøÂçÆÁÄ»½ØÍ¼ÓëÊý¾ÝÖÁZIPÎļþ³¢ÊÔ·¢ËÍ£¬Ö»¹Ü²âÊÔÖÐÒò»úеÈËÁîÅÆÎÊÌâ´«Êäʧ°Ü£¬µ«Êý¾Ýй¶·çÏÕÒÀÈ»´æÔÚ¡£Îª·À±¸´ËÀàÍþв£¬×¨¼Ò½¨Ò飺ÀûÓþ߱¸ÊµÊ±·À»¤µÄ×îаæ·À²¡¶¾Èí¼þ£»Ô¤·ÀÏÂÔØµÁ°æÈí¼þ£»ÉóÉ÷µã»÷¿ÉÒÉÁ´½Ó»ò¸½¼þ¡£
https://hackread.com/raven-stealer-malware-browsers-passwords-payment-data/
4. SonicWallÖÒ¸æ¿Í»§Òò·À»ðǽÅäÖñ¸·Ýй¶Ðè³ÁÖÃÍ´´¦
9ÔÂ17ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾SonicWall½üÈÕ°ä²¼´¹Î£Í¨Öª£¬ÒªÇó¿Í»§³ÁÖÃÓйØÍ´´¦£¬ÒòÆäMySonicWallÕË»§ÖеķÀ»ðǽÅäÖñ¸·ÝÎļþÔÚ°²È«·ì϶ÖÐÔâ¶³ö£¬¿ÉÄÜʹÍþвÐÐΪÕßÀûÓñ¸·ÝÐÅÏ¢½Ó¼ûÉ豸Ãô¸Ð·þÎñ¡£ÊÂÎñ²úÉúºó£¬SonicWallµ±¼´¶Â½Ø¹¥»÷Õßϵͳ½Ó¼ûȨÏÞ£¬²¢½áºÏÍøÂ簲ȫ»ú¹¹¼°·¨Âɲ¿ÃÅ·¢Õ¹µ÷²é¡£¾ÝSonicWallÅû¶£¬Ð¹Â¶µÄ±¸·ÝÎļþÔ̺¬¼ÓÃÜÃÜÂë¼°¿ÉÄܸ¨Öú¹¥»÷ÕßÀûÓ÷À»ðǽµÄÐÅÏ¢¡£Ö»¹ÜÎļþÒѼÓÃÜ£¬µ«¹¥»÷ÕßÈÔ¿ÉÄÜͨ¹ý±©Á¦ÆÆ½â»ñÈ¡ÔÆ±¸·ÝAPI·þÎñȨÏÞ£¬½ø¶ø½Ó¼ûÉ豸ÅäÖá£Õâ´ÎÊÂÎñÓ°ÏìÁìÓòÓÐÏÞ£¬½ö²¨¼°²»µ½5%µÄSonicWall·À»ðǽÉ豸£¬ÕâЩÉ豸ÔÚÔÆ¶Ë´æ´¢Á˱¸·ÝÊ×Ñ¡ÏîÎļþ£¬¶ø¹¥»÷ÕßÕýÊÇͨ¹ý±©Á¦¹¥»÷Õë¶ÔÕâЩÎļþµÄAPI·þÎñÖ´ÐÐÈëÇÖ¡£Îª½µµÍ·çÏÕ£¬SonicWall°ä²¼¾ßÌåÖ¸ÄÏ£¬½¨ÒéÖÎÀíÔ±²ÉÈ¡½á¹¹»¯´ëÊ©£ºÊ×ÏȽûÓûòÏÞ¶ÈWAN½Ó¼û·þÎñ£¬Ëæºó³ÁÖÃÓû§¡¢VPNÕË»§¼°·þÎñʹÓõÄËùÓÐÍ´´¦¡¢APIÃÜÔ¿ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬²¢¸üÐÂÆäËû¹ØÁªÏµÍ³ÖеĹ²ÏíÃÜÔ¿ºÍ¼ÓÃÜÃÜÔ¿¡£
https://www.bleepingcomputer.com/news/security/sonicwall-warns-customers-to-reset-credentials-after-MySonicWall-breach/
5. TA558ÀûÓÃAIÌìÉúÍøÂç´¹µö¹¥»÷¾ÆµêÒµ
9ÔÂ17ÈÕ£¬¶íÂÞ˹¿¨°Í˹»ù³¢ÊÔÊÒ×·×Ù·¢ÏÖ£¬ÍþвÐÐΪÕßTA558£¨¹ØÁªRevengeHotels¼¯Èº£©×Ô2025ÄêÏᆵðÕë¶Ô°ÍÎ÷¼°Î÷°àÑÀÓïÊг¡¾ÆµêÌáÒéÐÂÐ͹¥»÷£¬Í¨¹ýAIÌìÉúµÄÍøÂç´¹µöÓʼþ´«²¼Venom RATµÈÔ¶³Ì½Ó¼ûľÂí£¬ÇÔÈ¡¿ÍÈ˼°ÔÚÏß¹Û¹âÉ磨ÈçBooking.com£©µÄÐÅÓþ¿¨Êý¾Ý¡£¹¥»÷Á´ÒÔ·¢Æ±¡¢¾ÆµêÔ¤Ô¼»òÇóÖ°ÉêÇëΪµö¶üµÄÆÏÌÑÑÀÓï/Î÷°àÑÀÓï´¹µöÓʼþÆô¶¯£¬ÄÚº¬AIÌìÉúµÄJavaScript¼ÓÔØÆ÷¼°PowerShellÏÂÔØÆ÷¡£¾ç±¾×¢½â·á˶¡¢Ìåʽ¹æ·¶£¬ÇкϴóÐÍ˵»°Ä£ÐÍ£¨LLM£©ÌìÉúÌØµã£¬¿É¼ÓÔØºóÐø¾ç±¾ÊµÏÖ¶à½×¶ÎϰȾ¡£×îÖÕÔØºÉÔ̺¬»ùÓÚ¿ªÔ´Quasar RATˢеÄVenom RATóÒ×¹¤¾ß£¬¾ß±¸Êý¾ÝÇÔÈ¡¡¢·´Ïò´úÀí¡¢·ÀÖÕÖ¹±£»¤¼°Óƾû¯Ö°ÄÜ¡£¸Ã¶ñÒâÈí¼þͨ¹ýÅú¸Ä½ø³Ì×ÔÖ÷½Ó¼û½ÚÔìÁÐ±í£¨DACL£©ñݶᰲȫ¹ý³ÌȨÏÞ£¬²¢Ã¿50ºÁÃëÑ»·É¨Ãè¹ý³ÌÁÐ±í£¬ÖÕÖ¹°²È«·ÖÎöʦ³£ÓÃµÄ¼à¿Ø¹¤¾ß¡£ÈôÒÔÖÎÀíԱȨÏÞÔËÐУ¬¿ÉÉèÖÃSeDebugPrivilegeÁîÅÆÏóÕ÷Ϊϵͳ¹Ø¼ü¹ý³Ì£¬Ç¿ÔìÆÁÄ»³£ÁÁ·À˯Ãߣ¬²¢Í¨¹ýUSBÇý¶¯Æ÷´«²¼¡¢½ûÓÃMicrosoft Defender¼°´Û¸Ä×¢²á±íά³Ö´æÔÚ¡£
https://thehackernews.com/2025/09/ta558-uses-ai-generated-scripts-to.html
6. µÙܽÄáÔâÊý¾Ýй¶£¬³¬2500Ãû¿Í»§ÀñÎ│ÐÅÏ¢±»µÁ
9ÔÂ17ÈÕ£¬ÃÀ¹úÉݳÞÖ鱦¾ÞÍ·µÙܽÄṫ˾ÓÚ2025Äê5Ô³õÔâ·êÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÈëÇÔìäϵͳµ¼Ö³¬2500Ãû¿Í»§Éí·Ý¼°ÀñÎ│ÐÅÏ¢±»ÇÔÈ¡¡£Æ¾¾ÝµÙܽÄáÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄÐÅÏ¢¼°Êý¾Ýй¶֪ͨ£¬Ð¹Â¶ÄÚÈÝÔ̺¬¿Í»§ÐÕÃû¡¢µØÖ·¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢ÏúÊÛÊý¾Ý¡¢¿Í»§²Î¿¼±àºÅ¼°µÙܽÄáÀñÎ│ºÅÓëPINÂë¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚµÁË¢ÀñÎ│²É°ìÖ鱦£¬»ò³ÉÎªÍøÂç´¹µö¹¥»÷µÄµö¶ü£¬ÓÕÆ¿Í»§Ð¹Â¶¸ü¶àÃô¸ÐÊý¾Ý¡£µÙܽÄáÔÚ·¢ÏÖδ¾ÊÚȨ½Ó¼ûºó£¬ÒÑÆô¶¯ÓÉ±í²¿ÍøÂ簲ȫ¹«Ë¾Ö÷µ¼µÄµ÷²é£¬²¢Ç¿µ÷¡°ÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»½øÒ»²½ÀÄÓᱡ£È»¶ø£¬Õâ²¢·Ç¸Ã¹«Ë¾³õ´ÎÃæ¶ÔÊý¾Ý°²È«ÎÊÌ⣬5Ôµף¬Æäº«¹ú·Ö¹«Ë¾ÔøÒò¹©¸øÉÌÊý¾Ýй¶µ¼Ö¿ͻ§ÐÅÏ¢±íÁ÷¡£ÖµÍ×ÌùÐĵÄÊÇ£¬µÙܽÄáĸ¹«Ë¾LVMHÆìÏÂÁíÒ»Æ·ÅÆµÏ°Â´ËǰҲÔâ·êÀàËÆÊÂÎñ£¬¶ø¿ªÔƼ¯ÍŽüÆÚ¸ü±»ÆØ³ö740Íò·Ý¿Í»§Êý¾Ýй¶£¬Í¹ÏÔÉÝ³ÞÆ·¸ñÒµ³ÉÎªÍøÂç·¸×ï³ÁÔÖÇø¡£
https://cybernews.com/security/tiffany-data-breach-gift-cards-exposed/


¾©¹«Íø°²±¸11010802024551ºÅ