BoryptGrabͨ¹ýGitHub¿ÍջαװÈö²¥
Ðû²¼Ê±¼ä 2026-03-091. BoryptGrabͨ¹ýGitHub¿ÍջαװÈö²¥
3ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶һÆðͨ¹ý100Óà¸öGitHub´úÂë¿â´ó¹æÄ£·Ö·¢BoryptGrabÐÅÏ¢ÇÔÈ¡³ÌÐòµÄ¹¥»÷»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔC/C++±àд£¬£¬£¬£¬£¬£¬½¹µã¹¦Ð§ÊÇÇÔÈ¡ä¯ÀÀÆ÷¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡¢ÏµÍ³ÏêÇé¼°³£ÓÃÎļþ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýѹËõÎļþÉÏ´«ÖÁ¹¥»÷ÕßЧÀÍÆ÷¡£¡£¡£²¿·Ö±äÖֻᰲÅÅTunnesshClient PyInstallerºóÃÅ£¬£¬£¬£¬£¬£¬½¨Éè·´ÏòSSHËíµÀʵÏÖÔ¶³Ì¿ØÖÆ¡£¡£¡£¹¥»÷Õß½ÓÄɶà²ãαװսÂÔ£º½«¶ñÒâ´úÂëǶÈëαװ³ÉÈí¼þ¹¤¾ß¡¢ÓÎÏ·×÷±×Æ÷µÄZIPѹËõ°ü£¬£¬£¬£¬£¬£¬Á´½ÓÖÁGitHub´æ´¢¿â¡£¡£¡£Í¨¹ýÔÚREADMEÖÐÌî³äSEOÒªº¦´Ê£¬£¬£¬£¬£¬£¬Ê¹¶ñÒâ¿ÍÕ»ÔÚËÑË÷ÒýÇæÖÐÅÅÃû¿¿Ç°£¬£¬£¬£¬£¬£¬ÀýÈçÄ£ÄâVoicemod ProÏÂÔØÒ³Ãæ£¬£¬£¬£¬£¬£¬Ê¹Óú¬"github-io"µÄZIPÎļþÃûÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£Ñ¬È¾Á´°üÀ¨¶àÖÖÆô¶¯·½·¨¡£¡£¡£BoryptGrab¾ß±¸·´ÆÊÎö»úÖÆ£ºÍ¨¹ý×¢²á±íÅÌÎʺÍÐéÄâ»úÎļþ¼ì²âÐéÄâÇéÐΣ¬£¬£¬£¬£¬£¬±È¶ÔÔËÐÐÀú³ÌÁÐ±í£¬£¬£¬£¬£¬£¬²¢ÊµÑéÌáÉýȨÏÞ¡£¡£¡£Èôδָ¶¨Êä³ö·¾¶£¬£¬£¬£¬£¬£¬½«°´Ä¿½ñʱ¼ä¡¢¹«ÍøIPºÍ¹ú¼Ò´úÂëÌìÉúÑÄ´¢Ä¿Â¼¡£¡£¡£Æä"ÎļþץȡÆ÷"Ä£¿£¿£¿£¿£¿é¿ÉÍøÂçÌØ¶¨À©Õ¹ÃûµÄ³£ÓÃĿ¼Îļþ£¬£¬£¬£¬£¬£¬Ð±äÖÖ»¹ÔöÌíÁËDiscord´ú±ÒÇÔÈ¡¹¦Ð§¡£¡£¡£
https://securityaffairs.com/189110/malware/massive-github-malware-operation-spreads-boryptgrab-stealer.html
2. Velvet TempestʹÓÃClickFixÊÖÒÕ°²ÅŶñÒâÈí¼þ
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬±»×·×ÙΪ"Velvet Tempest"£¨ÓÖÃûDEV-0504£©µÄÀÕË÷Èí¼þÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬Õýͨ¹ýClickFixÊÖÒÕºÍÕýµ±WindowsÊÊÓóÌÐò°²ÅÅDonutLoader¶ñÒâÈí¼þ¼°CastleRATºóÃÅ¡£¡£¡£¸Ã×éÖ¯×÷ΪÀÕË÷Èí¼þ¹¥»÷µÄÁ¥Êô×éÖ¯ÒÑ»îÔ¾ÖÁÉÙÎåÄ꣬£¬£¬£¬£¬£¬Ôø¼ÓÈë°²ÅÅRyuk¡¢REvil¡¢Conti¡¢BlackMatter¡¢BlackCat/ALPHV¡¢LockBitºÍRansomHubµÈ¶à¿îÆÆËðÐÔÀÕË÷Èí¼þ¡£¡£¡£ÍøÂçÓÕÆÍþвÇ鱨¹«Ë¾MalBeaconÔÚÄ£Äâ·ÇÓªÀû×éÖ¯ÇéÐÎÖÐÊӲ쵽¸Ã×éÖ¯12ÌìµÄ¹¥»÷ÐÐΪ¡£¡£¡£¹¥»÷³õʼ½×¶Îͨ¹ý¶ñÒâ¹ã¸æ»î¶¯ÊµÑ飬£¬£¬£¬£¬£¬Ê¹ÓÃClickFixÓëCAPTCHA»ìÏýÓÕÆ£¬£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õß½«»ìÏýÏÂÁîÕ³ÌùÖÁWindowsÔËÐжԻ°¿ò£¬£¬£¬£¬£¬£¬´¥·¢Ç¶Ì×cmd.exeÁ´²¢Å²ÓÃfinger.exe»ñÈ¡Ê׸öαװ³ÉPDFѹËõÎļþµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷¡£¡£¡£»£»£»ñÈ¡»á¼ûȨÏ޺󣬣¬£¬£¬£¬£¬¹¥»÷ÕßÖ´ÐмüÅ̲Ù×÷¾ÙÐÐActive DirectoryÕì̽¡¢Ö÷»ú·¢Ã÷¼°ÇéÐÎÆÊÎö£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÍйÜÓÚ¹ØÁªTermiteÀÕË÷Èí¼þ¹¤¾ß°²ÅÅÇéÐεÄPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬ÌáÈ¡Chrome´æ´¢µÄƾ֤¡£¡£¡£ºóÐø½×¶Îͨ¹ýPowerShellÏÂÔØÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬×îÖÕ°²ÅÅDonutLoader²¢»ñÈ¡ÓëCastleLoader¹ØÁªµÄCastleRATÔ¶³Ì»á¼ûľÂí¡£¡£¡£
https://www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/
3. ÒÁÀÊMuddyWater APT×éÖ¯¶ÔÃÀ»ú¹¹·¢¶¯»ìÏý¹¥»÷
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬²©Í¨ÈüÃÅÌú¿ËÍŶӿËÈÕÅû¶£¬£¬£¬£¬£¬£¬ÓëÒÁÀÊÇ鱨ºÍÇå¾²²¿£¨MOIS£©¹ØÁªµÄMuddyWater£¨ÓÖÃûSeedWorm¡¢TEMP.ZagrosµÈ£©APT×éÖ¯Õý¶ÔÃÀ¹ú¶à¼Ò»ú¹¹·¢¶¯Ò»Á¬¹¥»÷¡£¡£¡£¸Ã»î¶¯×Ô2026Äê2ÔÂÆô¶¯£¬£¬£¬£¬£¬£¬ÖÁ½ñÈÔÔÚ»îÔ¾£¬£¬£¬£¬£¬£¬Ä¿µÄº¸ÇÃÀ¹úÒøÐС¢»ú³¡¡¢·ÇÓªÀû×éÖ¯¼°Ò»¼ÒÒÔÉ«Áйú·Àº½¿Õº½ÌìÈí¼þ¹©Ó¦ÉÌ¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬MuddyWater°²ÅÅÁËÐÂÐͺóÃÅDindoor£¬£¬£¬£¬£¬£¬ÆäÒÀÀµDenoÔËÐÐʱִÐÐJavaScript/TypeScript´úÂ룬£¬£¬£¬£¬£¬²¢Ê¹Óá°Amy Cherne¡±Ö¤ÊéÊðÃû¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßÊÔͼͨ¹ýRclone¹¤¾ß½«Ä¿µÄÈí¼þ¹«Ë¾Êý¾ÝÇÔÈ¡ÖÁWasabiÔÆ´æ´¢Í°£¬£¬£¬£¬£¬£¬µ«´«ÊäЧ¹ûδÃ÷¡£¡£¡£ÃÀ¹ú»ú³¡ºÍ·ÇÓªÀû×éÖ¯ÍøÂçÖл¹·ºÆðÁË×ÔÁ¦µÄPythonºóÃÅFakeset£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓÃÓëSeedworm¹ØÁªµÄÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬£¬ÍйÜÓÚBackblazeЧÀÍÆ÷£¬£¬£¬£¬£¬£¬½øÒ»²½Ó¡Ö¤ÒÁÀÊÅä¾°¡£¡£¡£
https://securityaffairs.com/189060/apt/iran-linked-muddywater-deploys-dindoor-malware-against-u-s-organizations.html
4. TriZettoÒ½ÁÆÊý¾Ýй¶ÊÂÎñÓ°Ï쳬340ÍòÈË
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬Ò½ÁƱ£½¡IT¹«Ë¾TriZetto Provider SolutionsÔâÓöÖØ´óÊý¾Ýй¶£¬£¬£¬£¬£¬£¬µ¼Ö³¬340ÍòÈ˵ÄÃô¸ÐÐÅϢ̻¶¡£¡£¡£ÊÂÎñʼÓÚ2024Äê11ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßδ¾ÊÚȨ»á¼û°ü¹Ü×ʸñÑéÖ¤ÉúÒâ¼Í¼£¬£¬£¬£¬£¬£¬ÕâÊÇÒ½ÁÆÐ§ÀÍÌṩ·½ÖÎÁÆÇ°È·ÈÏ»¼Õß°ü¹Ü¹æÄ£µÄÒªº¦Á÷³Ì¡£¡£¡£Ö±ÖÁ2025Äê10ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾²ÅÔÚÃÅ»§ÍøÕ¾¼ì²âµ½¿ÉÒɻ²¢Æô¶¯ÊӲ죬£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾ»á¼ûÐÐΪһÁ¬½üÒ»Äê¡£¡£¡£Ð¹Â¶Êý¾ÝÒòÈ˸÷Ò죬£¬£¬£¬£¬£¬¿ÉÄܰüÀ¨È«Ãû¡¢ÏÖʵµØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¿µ½¡°ü¹Ü»áÔ±±àºÅ¡¢Ò½Áưü¹ÜÊÜÒæÈ˱êʶ·û¡¢ÌṩÉ̼°°ü¹Ü¹«Ë¾Ãû³Æ£¬£¬£¬£¬£¬£¬ÒÔ¼°Éú³Ýͳ¼Æ¡¢¿µ½¡ºÍ°ü¹ÜÐÅÏ¢¡£¡£¡£µ«Ö§¸¶¿¨¡¢ÒøÐÐÕË»§»òÆäËû²ÆÎñÐÅϢδ±»Ð¹Â¶£¬£¬£¬£¬£¬£¬ÇÒÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£¡£ÊÜÓ°ÏìЧÀÍÌṩÉÌÓÚ2025Äê12ÔÂ9ÈÕ»ñ֪ͨ£¬£¬£¬£¬£¬£¬¿Í»§Í¨ÖªÊÂÇéÔò´Ó2026Äê2Ô³õÆô¶¯¡£¡£¡£Æ¾Ö¤ÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎļþ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊý´ï3,433,965ÈË¡£¡£¡£TriZettoÒѽÓÄɲ½·¥ÔöǿϵͳÇå¾²£¬£¬£¬£¬£¬£¬²¢×ª´ïÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬Í¬Ê±ÎªÊÜÓ°ÏìÕßÌṩKrollµÄ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»¤Ð§ÀÍ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/
5. CISA½ôÆÈÒªÇóÁª°î»ú¹¹ÐÞ¸´iOS¸ßΣÎó²î
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Ç¿ÖÆÐÔÖ¸Á£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê3ÔÂ26ÈÕǰÐÞ¸´Èý¸ö±»CorunaÎó²îʹÓù¤¾ß°ü¹¥»÷µÄiOSÇå¾²Îó²î¡£¡£¡£ÕâЩÎó²îÒѱ»ÄÉÈëCISAÒÑ֪ʹÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬ÊôÓÚÔ¼ÊøÐÔ²Ù×÷Ö¸ÁBOD£©22-01µÄ¹Ü¿Ø¹æÄ£¡£¡£¡£¹È¸èÍþвÇ鱨С×飨GTIG£©Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬Coruna¹¤¾ß°üͨ¹ý23¸öiOSÎó²îÁ´ÊµÑé¹¥»÷£¬£¬£¬£¬£¬£¬ÆäÖдó¶¼ÎªÁãÈÕÎó²î¡£¡£¡£¸Ã¹¤¾ß°ü¾ß±¸Ö¸ÕëÈÏÖ¤Â루PAC£©Èƹý¡¢É³ÏäÌÓÒݺÍÒ³Ãæ±£»£»£»¤²ã£¨PPL£©ÈƹýÄÜÁ¦£¬£¬£¬£¬£¬£¬¿ÉʵÏÖWebKitÔ¶³Ì´úÂëÖ´Ðв¢ÌáÉýÖÁÄÚºËȨÏÞ¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬×îаæiOSϵͳ¡¢Òþ˽ä¯ÀÀģʽ»òÆ»¹ûËø¶¨Ä£Ê½¿ÉÓÐÓÃ×è¶Ï´ËÀ๥»÷¡£¡£¡£Coruna¹¥»÷Á´Òѱ»¶à¸öÍþвÐÐΪÕßʹÓ㺰üÀ¨¼à¿Ø¹©Ó¦É̿ͻ§¡¢ÒÉËÆ¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯UNC6353£¬£¬£¬£¬£¬£¬ÒÔ¼°¾¼ÃÇý¶¯µÄÖйúÍþвÐÐΪÕßUNC6691¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-apple-flaws-exploited-in-spyware-crypto-theft-attacks/
6. ÒÁÀÊDust Specter½èAI¹¥»÷ÒÁÀ¿ËÕþ¸®
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬Zscaler ThreatLabz¿ËÈÕ½ÒÆÆ£¬£¬£¬£¬£¬£¬ÓëÒÁÀʹØÁªµÄºÚ¿Í×éÖ¯Dust SpecterÕë¶ÔÒÁÀ¿ËÕþ¸®¹ÙÔ±ÌᳫϸÃÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Í¨¹ýð³äÒÁÀ¿ËÍâ½»²¿µÄ´¹ÂÚÓʼþÈö²¥ÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬°üÀ¨SPLITDROP¡¢TWINTASK¡¢TWINTALK¼°GHOSTFORM¡£¡£¡£´Ë´ÎÐж¯±»ÖиßÖÃÐŶȹéÒòÓÚDust Specter£¬£¬£¬£¬£¬£¬ÆäTTPÌØÕ÷ÓëÒÁÀÊÀúÊ·ÍøÂçÌØ¹¤»î¶¯¸ß¶ÈÎǺϡ£¡£¡£¹¥»÷Á´1ÒÔÃÜÂë±£»£»£»¤µÄRARÎļþÎªÔØÌ壬£¬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉWinRARµÄSPLITDROPͶ·ÅÆ÷¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬£¬¸Ã¶þ½øÖÆÎļþ½âÃܲ¢°²ÅÅTWINTASKÓëTWINTALK¡£¡£¡£¶ñÒâÈí¼þͨ¹ý×¢²á±íÏÉ賤ÆÚÐÔ£¬£¬£¬£¬£¬£¬Ê¹ÓÃVLC¡¢WingetUIµÈÕýµ±Èí¼þ¾ÙÐÐDLL²à¼ÓÔØ¡£¡£¡£TWINTALK½ÓÄÉËæ»úÑÓ³Ù¡¢×Ô½ç˵URI·¾¶¼°JWTÁîÅÆÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬Ö§³ÖÏÂÁîÖ´ÐС¢ÎļþÉÏ´«¼°ÓÐÓÃÔØºÉÏÂÔØ¡£¡£¡£¹¥»÷Á´2ÕûºÏ¹¦Ð§ÖÁ¼òµ¥¶þ½øÖÆÎļþGHOSTFORM£¬£¬£¬£¬£¬£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐÐÏÂÁîÒÔïÔÌÎļþϵͳºÛ¼£¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉÒÁÀ¿ËÍâ½»²¿ÊÓ²ìµÄGoogle±íµ¥ÓÕÆÊܺ¦Õߣ¬£¬£¬£¬£¬£¬²¢½ÓÄÉÒþÐδ°ÌåÑÓ³ÙÖ´ÐС¢»¥³âËø¼ì²é×èÖ¹¶àʵÀý¡£¡£¡£´úÂëÆÊÎö·¢Ã÷Òì³£ÔªËØ£ºÇ¶ÈëÐÄÇé·ûºÅ¡¢UnicodeÎı¾¼°Õ¼Î»·ûÖµ£¬£¬£¬£¬£¬£¬ÕâÐ©ÌØÕ÷ÓëÌìÉúʽAIÌìÉúµÄ´úÂëģʽÏà·û¡£¡£¡£
https://securityaffairs.com/189033/apt/iran-nexus-apt-dust-specter-targets-iraq-officials-with-new-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ