Ñо¿Ö°Ô±Åû¶ʷÉÏ×î´ó¹æÄ£Êý¾Ýй¶£¬£¬ £¬£¬£¬160ÒڵǼƾ֤ÔâÇÔÈ¡

Ðû²¼Ê±¼ä 2025-06-20

1. Ñо¿Ö°Ô±Åû¶ʷÉÏ×î´ó¹æÄ£Êý¾Ýй¶£¬£¬ £¬£¬£¬160ÒڵǼƾ֤ÔâÇÔÈ¡


6ÔÂ19ÈÕ£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±Ðû²¼·¢Ã÷Ê·ÉÏ×î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬Ð¹Â¶µÇ¼ƾ֤ÊýÄ¿¸ß´ï160ÒÚ·Ý¡£¡£¡£¸ÃÊÓ²ìÓÚ½ñÄêÔçЩʱ¼äÆô¶¯£¬£¬ £¬£¬£¬ÏÔʾÕâЩƾ֤ÊÇͨ¹ý¶àÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍøÂç¶øÀ´¡£¡£¡£CybernewsÑо¿Ö°Ô±±¨¸æ³Æ£¬£¬ £¬£¬£¬´Ë´Îй¶ÓÉÀ´×Ô¸÷ƽ̨µÄ30¸öº£Á¿Ð¹Â¶Êý¾Ý¼¯×é³É£¬£¬ £¬£¬£¬×ܼÆÌ»Â¶160ÒÚÌõµÇ¼¼Í¼¡£¡£¡£³ýÒ»Æð´ËǰÒѱ¨¸æµÄ°¸ÆÆÀý£¬£¬ £¬£¬£¬ÆäÓà29¸öй¶Êý¾Ý¼¯¾ùΪз¢Ã÷£¬£¬ £¬£¬£¬ÇÒÐÂй¶ÊÂÎñÒ»Ö±Ó¿ÏÖ£¬£¬ £¬£¬£¬Í¹ÏÔÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÈö²¥¹æÄ£Ö®¹ã¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬Ì»Â¶µÄÊý¾Ý¼¯Ö»ÄܶÌÔÝ»á¼û£¬£¬ £¬£¬£¬´ó²¿·Ö̻¶ÔÚ²»Çå¾²µÄElasticsearch»ò´æ´¢ÊµÀýÉÏ¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬ £¬£¬£¬Õâ²»µ«ÊÇйÃÜ£¬£¬ £¬£¬£¬¸üÊÇ´ó¹æÄ£Ê¹ÓõÄÀ¶Í¼£¬£¬ £¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÏÖÔÚÓµÓÐØ¨¹ÅδÓеÄСÎÒ˽¼Òƾ֤»á¼ûȨÏÞ£¬£¬ £¬£¬£¬¿ÉÓÃÓÚÕË»§½ÓÊÜ¡¢Éí·Ý͵ÇԺ;«×¼ÍøÂç´¹ÂÚ¡£¡£¡£ÓÈÆäÁîÈ˵£ÐĵÄÊÇÕâЩÊý¾Ý¼¯µÄ½á¹¹ºÍнüÐÔ£¬£¬ £¬£¬£¬ËüÃDz¢·ÇÖ»ÊǾÉÎó²î±»ÖØÐÂʹÓ㬣¬ £¬£¬£¬¶øÊÇȫеġ¢¿É´ó¹æÄ£ÎäÆ÷»¯µÄÇ鱨¡£¡£¡£CyberNewsÍÆ²â£¬£¬ £¬£¬£¬Ð¹Â¶µÄ160ÒÚÌõ¼Í¼´ó²¿·ÖÀ´×ÔÇÔÈ¡¶ñÒâÈí¼þ¡¢Æ¾Ö¤Ìî³äºÍ֮ǰµÄÎ¥¹æÐÐΪ£¬£¬ £¬£¬£¬ÕâЩÊý¾ÝÕë¶ÔApple¡¢Google¡¢FacebookµÈЧÀÍ¡£¡£¡£


https://securityaffairs.com/179149/data-breach/researchers-discovered-the-largest-data-breach-ever-exposing-16-billion-login-credentials.html


2. а汾Android¶ñÒâÈí¼þGodfather½èÐéÄ⻯ÇÔÈ¡Êý¾Ý


6ÔÂ19ÈÕ£¬£¬ £¬£¬£¬Ð°汾Android¶ñÒâÈí¼þGodfatherͨ¹ý½¨Éè¸ôÀëÐéÄâÇéÐΣ¬£¬ £¬£¬£¬¶ÔÈ«Çò500¶à¸öÒøÐС¢¼ÓÃÜÇ®±ÒºÍµç×ÓÉÌÎñÓ¦ÓóÌÐòÌᳫ¹¥»÷¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔAPKÐÎʽ·ºÆð£¬£¬ £¬£¬£¬ÄÚÖÃÐéÄ⻯¿ò¼Ü£¬£¬ £¬£¬£¬Ê¹ÓÃVirtualAppÒýÇæºÍXposedµÈ¹¤¾ß¾ÙÐйҹ³£¬£¬ £¬£¬£¬ÔÚ×°±¸Éϼ¤»îºó£¬£¬ £¬£¬£¬»á¼ì²é²¢°²ÅÅÒÑ×°ÖõÄÄ¿µÄÓ¦ÓóÌÐòµ½ÐéÄâÇéÐÎÖУ¬£¬ £¬£¬£¬Í¨¹ýStubActivityÔÚÖ÷»úÈÝÆ÷ÄÚÆô¶¯Ëü£¬£¬ £¬£¬£¬´Ó¶ø×èµ²²¢¿ØÖÆÕýµ±Ó¦ÓóÌÐòµÄÔËÐС£¡£¡£Êܺ¦Õ߯ô¶¯ÕæÕýµÄÒøÐÐÓ¦ÓóÌÐòʱ£¬£¬ £¬£¬£¬¶ñÒâÈí¼þ»á×èµ²²¢Öض¨Ïò¡°Intent¡±£¬£¬ £¬£¬£¬Æô¶¯ÐéÄâ°æ±¾£¬£¬ £¬£¬£¬Óû§¿´µ½µÄËäÊÇÕæÊµ½çÃæ£¬£¬ £¬£¬£¬µ«ËùÓÐÃô¸ÐÊý¾Ý¶¼¿ÉÄܱ»Ð®ÖÆ¡£¡£¡£Í¨¹ýAPI¹Ò¹³£¬£¬ £¬£¬£¬¶ñÒâÈí¼þÄܼͼÕË»§Æ¾Ö¤¡¢ÃÜÂë¡¢PIN¡¢´¥ÃþÊÂÎñµÈ£¬£¬ £¬£¬£¬²¢ÔÚÒªº¦Ê±¿ÌÏÔʾÐéÎ±ËøÆÁÁýÕÖ£¬£¬ £¬£¬£¬ÓÕÆ­Êܺ¦ÕßÊäÈëPIN/ÃÜÂë¡£¡£¡£Ò»µ©Êý¾ÝÍøÂçÍê±Ï£¬£¬ £¬£¬£¬Ëü»áÆÚ´ý²Ù×÷Ô±ÏÂÁîÖ´Ðи¶¿î/תÕ˵ȲÙ×÷£¬£¬ £¬£¬£¬Ê±´úÏÔʾÐéα¡°¸üС±ÆÁÄ»»òºÚÆÁÒÔ×èÖ¹ÏÓÒÉ¡£¡£¡£×Ô2021Äê3ÔÂÊ״ηºÆðÒÔÀ´£¬£¬ £¬£¬£¬GodfatherÒ»Ö±½ø»¯£¬£¬ £¬£¬£¬×îа汾Óë֮ǰÏà±ÈÓÐÁËÖØ´óˢС£¡£¡£


https://www.bleepingcomputer.com/news/security/godfather-android-malware-now-uses-virtualization-to-hijack-banking-apps/


3. ³¯ÏÊ×é֯ʹÓÃPylangGhost¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÐÐÒµÈËÊ¿


6ÔÂ19ÈÕ£¬£¬ £¬£¬£¬Ë¼¿ÆTalos×îÐÂÑо¿ÏÔʾ£¬£¬ £¬£¬£¬Ò»ÏµÁÐÐÂÍøÂç¹¥»÷ÕýʹÓÃÐéαÕÐÆ¸È¦Ì×£¬£¬ £¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒºÍÇø¿éÁ´ÐÐҵרҵÈËÊ¿¡£¡£¡£ÕâЩ¹¥»÷ÓëºÍ³¯ÏʽáÃ˵ġ°Famous Chollima¡±×éÖ¯ÓйØ£¬£¬ £¬£¬£¬¸Ã×é֯ð³äÕýµ±¹«Ë¾£¬£¬ £¬£¬£¬ÓÕÆ­Êܺ¦Õß×°ÖÃαװ³ÉÊÓÆµÇý¶¯³ÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¸Ã×éÖ¯×Ô2024ÄêÖÐÆÚÒÔÀ´Ò»Ö±»îÔ¾£¬£¬ £¬£¬£¬´Ëǰ¾ÍÒÔÐéαÕÐÆ¸ÐÅÏ¢ºÍڲƭÐÔÃæÊÔÁ÷³ÌµÈÊÖ¶ÎÖøÃû£¬£¬ £¬£¬£¬ÏÖÔÚÐж¯Óú·¢Öش󣬣¬ £¬£¬£¬·ºÆðÐÂÐÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þPylangGhost£¬£¬ £¬£¬£¬ËüÊÇ֮ǰGolangGhostľÂíµÄ±äÖÖ¡£¡£¡£¹¥»÷Õßͨ¹ýÁªÏµÄ¿µÄÇóÖ°Õߣ¬£¬ £¬£¬£¬Ìṩ¿´ËƼÓÃÜÇ®±ÒÐÐÒµµÄְ룬£¬ £¬£¬£¬ÓÕµ¼Æä½øÈëÐéαÊÖÒÕÆÀ¹ÀÒ³Ãæ£¬£¬ £¬£¬£¬¸ÃÒ³Ãæ¸ß¶ÈÄ£ÄâÕæÊµÆóÒµ½çÃæ£¬£¬ £¬£¬£¬ÈçCoinbase¡¢RobinhoodµÈ×ÅÃû¹«Ë¾¡£¡£¡£Êܺ¦ÕßÍê³É²âÊԺ󣬣¬ £¬£¬£¬»á±»ÒªÇóÂ¼ÖÆÊÓÆµÏÈÈÝ£¬£¬ £¬£¬£¬²¢Í¨¹ý¸´ÖÆÕ³ÌùÏÂÁîµ½ÖÕ¶Ë×°Öá°ÊÓÆµÇý¶¯³ÌÐò¡±£¬£¬ £¬£¬£¬½ø¶øÏÂÔØ°üÀ¨PylangGhostľÂíµÄ¶ñÒâZIPÎļþ¡£¡£¡£¸Ã¶ñÒâÈí¼þ»á×ÔÐнâѹ²¢ÔÚºǫ́ÔËÐУ¬£¬ £¬£¬£¬ÔÊÐí¹¥»÷ÕßÔ¶³Ì»á¼û×°±¸£¬£¬ £¬£¬£¬ÍøÂçϵͳÐÅÏ¢¡¢ÅþÁ¬ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬ £¬£¬£¬ÎüÊÕ²¢Ö´ÐÐÔ¶³ÌÏÂÁî¡¢»ñȡƾ֤¡¢ÇÔÈ¡ä¯ÀÀÆ÷Êý¾Ý£¬£¬ £¬£¬£¬°üÀ¨ÃÜÂëºÍ¼ÓÃÜÇ®°üÃÜÔ¿£¬£¬ £¬£¬£¬Õë¶Ô80¶àÖÖ²î±ðä¯ÀÀÆ÷À©Õ¹³ÌÐò£¬£¬ £¬£¬£¬ÇÒʹÓÃRC4¼ÓÃÜÓëЧÀÍÆ÷ͨѶ£¬£¬ £¬£¬£¬¼ÓÃÜÃÜÔ¿ËæÊý¾Ý·¢ËÍ£¬£¬ £¬£¬£¬ËäÏÞÖÆÁËÇå¾²ÐÔ£¬£¬ £¬£¬£¬µ«ÓÐÖúÓÚÈÚÈëͨÀýÁ÷Á¿£¬£¬ £¬£¬£¬ÔöÌí¼ì²âÄѶÈ¡£¡£¡£


https://hackread.com/n-korean-hackers-pylangghost-malware-crypo-job-scam/


4. Krispy KremeÔâPlayÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬³¬16ÍòÈËÐÅÏ¢ÔâÇÔ


6ÔÂ19ÈÕ£¬£¬ £¬£¬£¬ÃÀ¹úÌðÌðȦÁ¬ËøµêKrispy Kreme֤ʵ£¬£¬ £¬£¬£¬2024Äê11Ô±¬·¢µÄÒ»ÆðÍøÂç¹¥»÷µ¼ÖÂÁè¼Ý16ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¸Ã¹«Ë¾ÔÚÈ«Çò40¸ö¹ú¼Ò/µØÇøÓµÓдó×ÚÔ±¹¤¡¢ÃŵêºÍ½ÓÈëµã£¬£¬ £¬£¬£¬²¢ÓëÂóµ±ÀÍÏàÖúÔÚÈ«ÇòÊýǧ¼ÒÃŵêÏúÊÛ²úÆ·¡£¡£¡£ÔÚÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÖУ¬£¬ £¬£¬£¬Krispy Kreme͸¶´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁË161,676ÈË£¬£¬ £¬£¬£¬µ«ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÐÅÏ¢±»ÀÄÓ㬣¬ £¬£¬£¬Ò²Î´½Óµ½Éí·Ý͵ÇÔ»òڲƭµÄ±¨¸æ¡£¡£¡£Ö»¹Ü¹«Ë¾Î´Í¸Â¶Ïêϸй¶µÄÊý¾ÝÀàÐÍ£¬£¬ £¬£¬£¬µ«Ìá½»¸øÂíÈøÖîÈûÖÝ×ÜÉó²é³¤µÄÎļþÏÔʾ£¬£¬ £¬£¬£¬±»µÁÎļþ°üÀ¨Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢ºÍ¼ÝʻִÕÕÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£Krispy KremeÓÚ11ÔÂ29ÈÕ¼ì²âµ½ITϵͳÉϵÄδ¾­ÊÚȨ»î¶¯£¬£¬ £¬£¬£¬²¢ÓÚ12ÔÂ11ÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÅû¶ÁËÕâÒ»ÊÂÎñ¼°ÔÚÏß¶©¹ºÖÐÖ¹µÄÇéÐΡ£¡£¡£¹«Ë¾½ÓÄɲ½·¥×èֹΥ¹æÐÐΪ£¬£¬ £¬£¬£¬²¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÆÀ¹À¹¥»÷Ó°Ïì¡£¡£¡£PlayÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬²¢³Æ´Ó¹«Ë¾ÍøÂçÖÐÇÔÈ¡ÁËÊý¾Ý£¬£¬ £¬£¬£¬°üÀ¨¡°Ë½È˺ÍСÎÒ˽¼ÒÉñÃØÊý¾Ý¡±µÈ£¬£¬ £¬£¬£¬ÔÚÓëKrispy Kreme̸ÅÐʧ°Üºó£¬£¬ £¬£¬£¬ÓÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˰üÀ¨Êý°ÙGBÎĵµµÄµµ°¸¡£¡£¡£


https://www.bleepingcomputer.com/news/security/krispy-kreme-says-november-data-breach-impacts-over-160-000-people/


5. Banana Squad½«¶ñÒâÈí¼þÒþ²ØÔÚÐéαµÄGitHub´æ´¢¿âÖÐ


6ÔÂ19ÈÕ£¬£¬ £¬£¬£¬ReversingLabsÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÓÉ¡°Ï㽶С¶Ó¡±£¨Banana Squad£©×éÖ¯Ïòµ¼µÄÐÂÐ͹¥»÷ÒªÁì¡£¡£¡£¸Ã×éÖ¯ÓÚ2023Äê10ÔÂÊ״α»CheckmarxÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬ÒÔ½ÆÕ©¹¥»÷ÊÖ¶ÎÖø³Æ¡£¡£¡£ReversingLabsÍŶÓÔÚGitHubÉÏ·¢Ã÷60¶à¸öÐéαÏîÄ¿Îļþ¼Ð£¬£¬ £¬£¬£¬ÕâЩ¿´ËÆPython±àдµÄºÚ¿Í¹¤¾ßʵÔò±»Ä¾Âí²¡¶¾Ñ¬È¾£¬£¬ £¬£¬£¬°üÀ¨Òþ²Ø¶ñÒâ´úÂë¡£¡£¡£ÔçÔÚ2023Äê4Ô£¬£¬ £¬£¬£¬Ï㽶С¶Ó¾ÍÒÔÖÖÖÖÓû§ÃûÐû²¼ÁËÊý°Ù¸ö¶ñÒâÈí¼þ°ü£¬£¬ £¬£¬£¬×¨ÎªWindowsµçÄÔÉè¼Æ£¬£¬ £¬£¬£¬Ö¼ÔÚÇÔÈ¡´ó×ÚÃô¸ÐÊý¾Ý£¬£¬ £¬£¬£¬°üÀ¨µçÄÔ¡¢Ó¦ÓóÌÐò¡¢ÍøÂçä¯ÀÀÆ÷ÐÅÏ¢£¬£¬ £¬£¬£¬ÉõÖÁͨ¹ý×ªÒÆ×ʽðÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢£¬£¬ £¬£¬£¬ÕâЩ¶ñÒâÈí¼þ°üÔÚ±»·¢Ã÷²¢ÒƳýǰ±»ÏÂÔØ½ü75,000´Î¡£¡£¡£2024Äê11Ô£¬£¬ £¬£¬£¬¸Ã×éÖ¯ÓÖʹÓÃGitHub³¤´úÂëÐв»»»Ðм°Ìí¼Ó¿Õ¸ñµÄÌØÕ÷£¬£¬ £¬£¬£¬½«¶ñÒâ´úÂëÍÆµ½ÆÁÄ»Í⣬£¬ £¬£¬£¬ÔöÌí·¢Ã÷ÄѶÈ£¬£¬ £¬£¬£¬ÇÒͨ³£Ê¹ÓÃÐéαÓû§ÕË»§ÍйÜÓк¦´æ´¢¿â¡£¡£¡£


https://hackread.com/banana-squad-data-stealing-malware-github-repositories/


6. ÈðÒøÒòµÚÈý·½¹©Ó¦ÉÌÔâÍøÂç¹¥»÷ÖÂ13ÍòÔ±¹¤ÐÅϢй¶


6ÔÂ19ÈÕ£¬£¬ £¬£¬£¬È«ÇòÒøÐÐÒµ¾ÞÍ·ÈðÒø¼¯ÍÅ£¨UBS£©ÒòµÚÈý·½¹©Ó¦ÉÌChain IQÔâÍøÂç¹¥»÷¶ø±¬·¢Êý¾Ýй¶¡£¡£¡£ÈðÒø½²»°ÈËÈ·ÈÏÊÂÎñ±¬·¢£¬£¬ £¬£¬£¬µ«Ç¿µ÷¿Í»§Êý¾Ý¼°ÓªÒµÔËӪδÊÜÓ°Ï죬£¬ £¬£¬£¬²¢³ÆÒÑѸËÙ½ÓÄÉÐж¯×èÖ¹Ó°Ïì¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬ÈðʿýÌ塶ʱ´ú±¨¡·±¨µÀ£¬£¬ £¬£¬£¬ÀÕË÷×éÖ¯World LeaksÔÚ°µÍø¹ûÕæÁËÔ¼13ÍòÃûÈðÒøÔ±¹¤µÄÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬°üÀ¨µç»°ºÅÂ롢ְλ½ÇÉ«¡¢°ì¹«ËùÔڵȣ¬£¬ £¬£¬£¬ÉõÖÁÉæ¼°Ê×ϯִÐйٵÄÖ±½Óµç»°ºÅÂë¡£¡£¡£ÈðÒøÖ¤ÊµÉæÊ¹©Ó¦ÉÌΪChain IQ£¬£¬ £¬£¬£¬ÁíÒ»¼Ò¿Í»§°Ù´ïÒøÐÐҲȷÈÏÔâÓöÊý¾Ýй¶£¬£¬ £¬£¬£¬µ«³Æ±»µÁÐÅÏ¢½öÉæ¼°ÒøÐй©Ó¦É̵ķ¢Æ±Êý¾Ý£¬£¬ £¬£¬£¬²»º¬¿Í»§×ÊÁÏ¡£¡£¡£Chain IQÔÚÉùÃ÷ÖÐÌåÏÖ£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÓëÁíÍâ19¼ÒÆóÒµÓÚ6ÔÂ12ÈÕÔâÊÜ¡°È«Çò¹æÄ£ÄÚǰËùδ¼û¡±µÄÍøÂç¹¥»÷£¬£¬ £¬£¬£¬²¿·Ö¿Í»§Êý¾Ý±»Ðû²¼ÖÁ°µÍø¡£¡£¡£ÍøÂçÇ徲ר¼ÒÕë¶ÔÊÂÎñÓ°ÏìÌá³ö¶àÖØ¾¯Ê¾£¬£¬ £¬£¬£¬°üÀ¨Êý¾Ýй¶µÄDZÔÚΣº¦¿ÉÄÜÊýÖܺó²ÅÕ¹ÏÖ¡¢¹ûÕæÔ±¹¤ÐÅÏ¢¿ÉÄÜËðº¦ÒøÐÐÉùÓþÓë¿Í»§ÐÅÈΣ¬£¬ £¬£¬£¬ÒÔ¼°Ð¹Â¶Êý¾Ý¿ÉÄܱ»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷ºÍ½ðÈÚڲƭ¡£¡£¡£


https://www.infosecurity-magazine.com/news/ubs-employee-data-exposed-third/