RECORDSTEALER¶ñÒâÈí¼þÒ»Á¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢

Ðû²¼Ê±¼ä 2024-09-24
1. RECORDSTEALER¶ñÒâÈí¼þÒ»Á¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢


9ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬GoogleÇå¾²Ñо¿ÍŶӽüÆÚ¾Û½¹ÓÚÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÒ»Á¬Íþв£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇRECORDSTEALER£¨ÓÖ³ÆRecordBreakerºÍRaccoon Stealer V2£©£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖ½ÓÄÉCÓïÑÔ±àдµÄ¸ß¼¶Êý¾Ý͵ÇÔ¹¤¾ß¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þרÃÅÕë¶ÔÐÅÓÿ¨ÐÅÏ¢¡¢ÃÜÂë¡¢cookies¼°¼ÓÃÜÇ®±ÒÇ®°üµÈÃô¸ÐÊý¾Ý¾ÙÐÐ͵ȡ¡£¡£¡£¡£¡£¡£ËüʹÓöñÒâ¹ã¸æ¼°Î±×°³ÉÕýµ±Ó¦ÓÃµÄÆÆ½âÈí¼þ×÷ΪÈö²¥ÇþµÀ£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§ÊäÈëÃÜÂëÒÔ¼¤»îÊܱ£»£»£»¤µÄ´æµµÎļþ£¬£¬£¬£¬£¬£¬£¬½ø¶øÖ´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£Ò»µ©¼¤»î£¬£¬£¬£¬£¬£¬£¬RECORDSTEALERͨ¹ý¼ÓÃÜRC4ЭÒ齫Êý¾Ý´«ËÍÖÁC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÍøÂç×°±¸ID¡¢Óû§ÃûµÈÒªº¦ÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜRECORDSTEALERÒ»¶ÈÒò´´Á¢Õß±»²¶¼°»ù´¡ÉèÊ©±»´Ý»Ù¶øÇÄÈ»£¬£¬£¬£¬£¬£¬£¬µ«ÆäÈö²¥Õ½ÂÔÒѱ»ÏÖ´úÐÅÏ¢ÇÔÈ¡Õ߯ձé½ÓÄÉ£¬£¬£¬£¬£¬£¬£¬¼ÌÐøÍ¨¹ýÎ±×°ÆÆ½âÈí¼þÍþвÓû§Çå¾²¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÂÓ¶áä¯ÀÀÆ÷ÖеÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬»¹ÉîÈë¼ÓÃÜÇ®±ÒÇ®°ü¡¢½ØÈ¡ÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬£¬£¬²¢ÍøÂ缴ʱͨѶӦÓõÄÃô¸ÐÎļþ¡£¡£¡£¡£¡£¡£RECORDSTEALERµÄÊÖÒÕÊÖ·¨ÓëVIDAR¡¢STEALCµÈÆäËûÐÅÏ¢ÇÔÈ¡³ÌÐò±£´æ¹²ÐÔ£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÁ˶ñÒâÈí¼þÊÖÒյĸ߶ȸ´ÓÃÐԺͼì²âÄѶȡ£¡£¡£¡£¡£¡£


https://securityonline.info/recordstealer-a-case-study-in-the-persistent-threat-of-info-stealing-malware/


2. Twilioͨ»°¼Í¼й¶£º12,000ÌõÒôƵÊý¾Ý̻¶Òþ˽Σº¦


9ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÒÔ¡°grep¡±ÎªÓÖÃû£¬£¬£¬£¬£¬£¬£¬½üÆÚй¶ÁËÉù³ÆÎªTwilioÔÆÍ¨Ñ¶Æ½Ì¨¿Í»§µÄÁè¼Ý12,000Ìõͨ»°¼Í¼£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç»°ºÅÂ롢ͨ»°Â¼Òô¼°Ïêϸ»á»°ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ê±¼ä¿ç¶È´Ó2019ÄêÖÁ2024Äê¡£¡£¡£¡£¡£¡£´ËÊÂÎñÑÏÖØÇÖÕ¼ÁËСÎÒ˽¼Ò¼°ÆóÒµÓû§µÄÒþ˽£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚй¶µÄͨ»°¼Í¼²»µ«°üÀ¨ÔªÊý¾ÝÈçµç»°ºÅÂ롢ͨ»°Ê±¼äºÍʱ³¤£¬£¬£¬£¬£¬£¬£¬»¹Éæ¼°ÏÖʵµÄ¶Ô»°ÄÚÈÝ¡£¡£¡£¡£¡£¡£TwilioÊÇÒ»¼ÒЧÀÍÓÚ350,000¶à¸ö¿Í»§ÕË»§µÄ¼ÓÖÝÔÆÍ¨Ñ¶¹«Ë¾£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶ԼռÆä×ܿͻ§ÊýµÄ3.37%¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿ÍδÃ÷ȷ˵Ã÷ÈëÇÖ·½·¨£¬£¬£¬£¬£¬£¬£¬µ«Ð¹Â¶µÄͨ»°¼Í¼Ïêϸ¼Í¼ÁËͨ»°Ë«·½ºÅÂ롢״̬¡¢Ê±³¤¼°ÔÚ¿ÚÒëЧÀÍÖеÄÌØ¶¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÈçÓïÑÔ¡¢·ÑÂʺͻỰÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´Îй¶ÊÂÎñ²»µ«Õ¹ÏÖÁËͨ»°µÄÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬»¹ÔöÌíÁËÊܺ¦ÕßÔâÊÜÀÕË÷¡¢Ú²Æ­ºÍÉí·Ýð³äµÄΣº¦¡£¡£¡£¡£¡£¡£ÆóÒµ¿ÉÄÜÒò´ËÃæÁÙGDPR»òCCPAµÈÒþ˽±£»£»£»¤¹æÔòµÄ´¦·Ö¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄµç»°ºÅÂëÒ²³ÉΪ¶ÌÐźÍÓïÒôÍøÂç´¹ÂÚ¹¥»÷µÄÐÂÄ¿µÄ¡£¡£¡£¡£¡£¡£ÎªÁËÓ¦¶ÔÕâһΣ»£»£»ú£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì·½ÐèѸËÙÐж¯£¬£¬£¬£¬£¬£¬£¬Í¨ÖªÓû§¡¢±£»£»£»¤Â¼ÒôÊý¾Ý²¢×Éѯִ·¨½¨Òé¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿»á¼û¿ØÖÆ¡¢Êý¾Ý¼ÓÃܺÍÓ¦¼±ÏìÓ¦»úÖÆÒ²ÊÇÌá·ÀδÀ´ÀàËÆÊÂÎñµÄÒªº¦²½·¥¡£¡£¡£¡£¡£¡£


https://hackread.com/hacker-leaks-twilio-call-records-audio-recordings/


3. Android¶ñÒâÈí¼þNecroͨ¹ýGoogle PlayѬȾ1100Íǫ̀װ±¸


9ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬Android Óû§ÃæÁÙÑÏÖØµÄ¶ñÒâÈí¼þÍþв£¬£¬£¬£¬£¬£¬£¬ÃûΪNecroµÄаæÄ¾Âí¼ÓÔØÆ÷ͨ¹ýGoogle PlayÉϵÄÕýµ±Ó¦Óü°·Ç¹Ù·½ÇþµÀÈö²¥µÄÐ޸İæÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÒÑDZÈëÁè¼Ý1100Íǫ̀װ±¸¡£¡£¡£¡£¡£¡£NecroʹÓöñÒâ¹ã¸æÈí¼þ¿ª·¢¹¤¾ß°ü£¨SDK£©Ç±ÔÚÓÚÕÕÆ¬±à¼­Ó¦Óá°ÎÞËûÏà»ú¡±¼°ÍøÂçä¯ÀÀÆ÷¡°Max Browser¡±µÈÊ¢ÐÐÈí¼þÖУ¬£¬£¬£¬£¬£¬£¬ÕâЩSDKαװ³ÉÕý³£¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÊµÔò×°ÖÃ¹ã¸æÈí¼þ¡¢Ö´ÐÐJavaScriptºÍDEXÎļþ¡¢Ôö½ø¶©ÔÄڲƭ£¬£¬£¬£¬£¬£¬£¬²¢×÷Ϊ¶ñÒâÁ÷Á¿ÊðÀí¡£¡£¡£¡£¡£¡£Ö»¹Ü²¿·ÖÓ¦ÓÃÒѸüÐÂÒÔÒÆ³ýNecro£¬£¬£¬£¬£¬£¬£¬µ«¾É°æ±¾ÒÅÁôµÄ¶ñÒâ¸ºÔØÈÔ¿ÉÄܶÔ×°±¸×é³ÉÍþв¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Necro»¹Í¨¹ý·Ç¹Ù·½ÇþµÀÈö²¥µÄWhatsApp¡¢Spotify¼°MinecraftµÈÈÈÃÅÈí¼þµÄÐ޸İæÆÕ±éÀ©É¢£¬£¬£¬£¬£¬£¬£¬ÊµÑéڲƭÐÔ¹ã¸æÕ¹Ê¾¡¢Î´¾­ÊÚȨµÄÓ¦ÓóÌÐò×°Öü°Ó븶·ÑЧÀͽ»»¥µÈ¶ñÒâÐÐΪ¡£¡£¡£¡£¡£¡£ÓÉÓڷǹٷ½ÇþµÀÄÑÒÔ×·×ÙÏêϸѬȾÊýÄ¿£¬£¬£¬£¬£¬£¬£¬µ«ÒÑÖªGoogle Playƽ̨µÄѬȾ¹æÄ£ÒÑÏàµ±ÖØ´ó¡£¡£¡£¡£¡£¡£¹È¸èÒѶԴËÀà¾Ù±¨Õö¿ªÊӲ죬£¬£¬£¬£¬£¬£¬¶øÇ徲ר¼Ò½¨ÒéÓû§¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬ÊµÊ±Ð¶ÔØÊÜѬȾӦÓò¢×ªÏòÇ徲ȪԴ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-malware-necro-infects-11-million-devices-via-google-play/


4. MC2 DataÊý¾Ýй¶£º2.2TBСÎÒ˽¼ÒÐÅϢ̻¶£¬£¬£¬£¬£¬£¬£¬Ó°Ï쳬1ÒÚÃÀ¹úÈË


9ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬¾ÝCybernewsµÄÑо¿£¬£¬£¬£¬£¬£¬£¬Åä¾°ÊӲ칫˾MC2 DataµÄÒ»¸ö´óÐÍÔÚÏßÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÄÚº¬2.2TBµÄÃÀ¹úÈËСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÒòδÉèÃÜÂë±£»£»£»¤¶øÌ»Â¶ÔÚ»¥ÁªÍøÉÏ£¬£¬£¬£¬£¬£¬£¬ÈκÎÈ˾ù¿ÉÇáËÉ»á¼û¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÆÕ±éÍøÂçÁ˰üÀ¨·¸·¨¼Í¼¡¢¾ÍÒµÀúÊ·¡¢¼ÒÍ¥Êý¾ÝºÍÁªÏµ·½·¨µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬£¬¾ÝÔ¤¼ÆÖÁÉÙÓÐ1ÒÚÃÀ¹úÈË£¨Ô¼Õ¼ÌìÏÂÉú³ÝµÄÈý·ÖÖ®Ò»£©µÄÊý¾ÝÔâй¶¡£¡£¡£¡£¡£¡£¸üÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐÁè¼Ý230ÍòµÄMC2 DataЧÀͶ©ÔÄÕßµÄÊý¾ÝҲδÄÜÐÒÃâ¡£¡£¡£¡£¡£¡£´ËÊÂÎñÔÙ´Î͹ÏÔÁËijЩÆóÒµÔÚÊý¾ÝÇå¾²·½ÃæµÄÑÏÖØÊèºö£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÕâЩÆóÒµÀíÓ¦×ñÊØÏà¹Ø¹æÔò£¬£¬£¬£¬£¬£¬£¬µ«ÆäÇå¾²²½·¥È´ÏÔ×Åȱ·¦¡£¡£¡£¡£¡£¡£×¨¼ÒÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬´ËÀàÊý¾Ýй¶¶ÔÍøÂç·¸·¨·Ö×Ó¶øÑÔÓÌÈç½ð¿ó£¬£¬£¬£¬£¬£¬£¬Îª×Åʵʩթƭ¡¢Éí·Ý͵ÇԵȷ¸·¨»î¶¯ÌṩÁ˼«´ó±ãµ±¡£¡£¡£¡£¡£¡£ÃæÁÙDZÔÚµÄÊý¾Ýй¶Σº¦£¬£¬£¬£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÓ¦Ìá¸ßСÐÄ£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÐëÒª²½·¥±£»£»£»¤×ÔÉíÐÅÏ¢Çå¾²¡£¡£¡£¡£¡£¡£


https://www.malwarebytes.com/blog/news/2024/09/100-million-us-citizens-have-records-leaked-by-background-check-service


5. ¿°ÈøË¹Öݸ»À¼¿ËÁÖÏØ½ü3ÍòסÃñÊý¾ÝÔâÀÕË÷Èí¼þ¹¥»÷й¶


9ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬¿°ÈøË¹Öݵĸ»À¼¿ËÁÖÏØ×î½üÔâÓöÁËÑÏÖØµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ¼Ö½ü30,000ÃûסÃñµÄÃô¸ÐÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷±¬·¢ÔÚ½ñÄê5ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÀÖ³ÉÇÖÈëÁËÏØÊé¼Ç¹Ù°ì¹«ÊÒµÄϵͳ£¬£¬£¬£¬£¬£¬£¬ÍµÈ¡Á˰üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢½ðÈÚÕË»§ºÅÂë¼°Ò½ÁÆÐÅÏ¢µÈÔÚÄÚµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý»¹º­¸ÇÁËÒ½ÁƼͼ¡¢ÒßÃç½ÓÖÖ¡¢COVID-19Ïà¹ØÐÅÏ¢ÒÔ¼°°ü¹ÜʶÓÖÃûµÈÃô¸ÐЧÀÍÐÅÏ¢¡£¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬£¬¸»À¼¿ËÁÖÏØÑ¸ËÙÁªÏµÍøÂçÇ徲ר¼ÒºÍÁª°îÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ7ÔÂ19ÈÕÏò¹«ÖÚת´ïÁËÊÓ²ìÏ£Íû¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚûÓÐÀÕË÷Èí¼þÍÅ»ïÈÏ¿ÉÔðÈΣ¬£¬£¬£¬£¬£¬£¬ÇÒÏØ·½ÔÚ°µÍøËÑË÷ÖÐδ·¢Ã÷Êý¾Ý±»Ðû²¼»ò³öÊ۵ļ£Ï󣬣¬£¬£¬£¬£¬£¬µ«¸ÃÊÂÎñÈÔÒýÆðÁËÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡ £¿£¿£¿°ÈøË¹ÖÝÖÝÎñÇä°ì¹«ÊÒµÈî¿Ïµ»ú¹¹ÒÑ»ñÖª´ËÊ£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇó¸ÃÏØÔöÇ¿Çå¾²²½·¥£¬£¬£¬£¬£¬£¬£¬ÒÔÌá·ÀδÀ´ÀàËÆÊÂÎñµÄ±¬·¢¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬£¬¸»À¼¿ËÁÖÏØÒѽÓÄÉһϵÁв½·¥£¬£¬£¬£¬£¬£¬£¬°üÀ¨½ûÓò»»îÔ¾µÄÓû§ÕÊ»§£¬£¬£¬£¬£¬£¬£¬ÒÔÌá¸ßÊý¾Ý±£»£»£»¤Ë®Æ½¡£¡£¡£¡£¡£¡£


https://therecord.media/kansas-ransomware-attack-thousands-residents


6. µÂ¹úÖ´·¨²¿·ÖÀֳɽÓÊÜVanirÀÕË÷Èí¼þйÃÜÍøÕ¾


9ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬µÂ¹úÖ´·¨²¿·ÖÔÚ½üÆÚÐж¯ÖÐÀֳɴݻÙÁËÒ»¸öÃûΪVanirµÄÀÕË÷Èí¼þ×éÖ¯µÄ²¿·Ö»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬²¢½ÓÊÜÁËÆäÓÃÓÚй¶Êܺ¦ÕßÊý¾ÝµÄÍøÕ¾¡£¡£¡£¡£¡£¡£¸ÃÍøÕ¾ÓÚ7ÔÂÉÏÏߣ¬£¬£¬£¬£¬£¬£¬ÔçÏÈÅû¶ÁËÈýÃûÊܺ¦ÕßµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ò»¼ÒµÂ¹ú¹«Ë¾¡£¡£¡£¡£¡£¡ £¿£¿£¿¨¶û˹³¶òÊм°°ÍµÇ-·ûÌÚ±¤Öݵľ¯·½ÓëÉó²é¹Ù°ì¹«ÊÒ×ÔÁùÔÂÆð±ãÕë¶Ô´Ë×éÖ¯Õö¿ªÊӲ죬£¬£¬£¬£¬£¬£¬²¢ÔÚ8ÔÂÀֳɶ¨Î»²¢·â±ÕÁËÆäÔÚTORÍøÂçÉÏµÄ»î¶¯Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬×èÖ¹Á˸ü´ó¶¼¾Ýй¶¡£¡£¡£¡£¡£¡£Ö»¹ÜÈ¡µÃ´Ë´ÎʤÀû£¬£¬£¬£¬£¬£¬£¬µ«¹ØÓÚÏÓÒÉÈËÊÇ·ñ±»²¶¼°ËùÁе¹ú¹«Ë¾ÏêϸÊÜËðÇéÐΣ¬£¬£¬£¬£¬£¬£¬¹Ù·½Î´Óè͸¶£¬£¬£¬£¬£¬£¬£¬½öÌåÏÖÏà¹ØÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£ÆÊÎöÈËʿָ³ö£¬£¬£¬£¬£¬£¬£¬Vanir×éÖ¯ÓëÏÈǰÒÑÖªµÄAkiraÀÕË÷Èí¼þÐж¯ÔÚйÃÜÍøÕ¾Éè¼ÆÉϱ£´æÏàËÆÐÔ£¬£¬£¬£¬£¬£¬£¬»ò±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯¾ÝÐÅÓɶ«Å·³ÉÔ±×é³É£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜÓëKarakurt¡¢LockBitµÈ¾ÉÓÐÀÕË÷Èí¼þÍÅ»ïµÄǰ³ÉÔ±Ïà¹Ø¡£¡£¡£¡£¡£¡£´ËÊÂÎñÔÙ´Î̻¶ÁËÈ«ÇòÖ´·¨»ú¹¹ÔÚ¹¥»÷ÀÕË÷Èí¼þ·¸·¨Ê±ËùÃæÁٵġ°´òµØÊó¡±Äæ¾³£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ·¸·¨·Ö×Ó¶àÒþ²ØÓÚÄÑÒÔ´¥¼°µÄ¹ú¼Ò£¬£¬£¬£¬£¬£¬£¬ÆäѸËÙÖØ×éºÍ±äÖÖµÄÄÜÁ¦¸øÖ´·¨´øÀ´ÁËÖØ´óÌôÕ½¡£¡£¡£¡£¡£¡£


https://therecord.media/germany-seizes-vanir-ransomware-leak?&web_view=true