Ñо¿Ö°Ô±Åû¶ʷÉÏ×î´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬160ÒڵǼƾ֤ÔâÇÔÈ¡

Ðû²¼Ê±¼ä 2025-06-20

1. Ñо¿Ö°Ô±Åû¶ʷÉÏ×î´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬160ÒڵǼƾ֤ÔâÇÔÈ¡


6ÔÂ19ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼·¢Ã÷Ê·ÉÏ×î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ð¹Â¶µÇ¼ƾ֤ÊýÄ¿¸ß´ï160ÒÚ·Ý¡£¡£¡£¡£¡£¸ÃÊÓ²ìÓÚ½ñÄêÔçЩʱ¼äÆô¶¯£¬£¬£¬£¬ÏÔʾÕâЩƾ֤ÊÇͨ¹ý¶àÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍøÂç¶øÀ´¡£¡£¡£¡£¡£CybernewsÑо¿Ö°Ô±±¨¸æ³Æ£¬£¬£¬£¬´Ë´Îй¶ÓÉÀ´×Ô¸÷ƽ̨µÄ30¸öº£Á¿Ð¹Â¶Êý¾Ý¼¯×é³É£¬£¬£¬£¬×ܼÆÌ»Â¶160ÒÚÌõµÇ¼¼Í¼¡£¡£¡£¡£¡£³ýÒ»Æð´ËǰÒѱ¨¸æµÄ°¸ÆÆÀý£¬£¬£¬£¬ÆäÓà29¸öй¶Êý¾Ý¼¯¾ùΪз¢Ã÷£¬£¬£¬£¬ÇÒÐÂй¶ÊÂÎñÒ»Ö±Ó¿ÏÖ£¬£¬£¬£¬Í¹ÏÔÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÈö²¥¹æÄ£Ö®¹ã¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Ì»Â¶µÄÊý¾Ý¼¯Ö»ÄܶÌÔÝ»á¼û£¬£¬£¬£¬´ó²¿·Ö̻¶ÔÚ²»Çå¾²µÄElasticsearch»ò´æ´¢ÊµÀýÉÏ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬Õâ²»µ«ÊÇйÃÜ£¬£¬£¬£¬¸üÊÇ´ó¹æÄ£Ê¹ÓõÄÀ¶Í¼£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÏÖÔÚÓµÓÐØ¨¹ÅδÓеÄСÎÒ˽¼Òƾ֤»á¼ûȨÏÞ£¬£¬£¬£¬¿ÉÓÃÓÚÕË»§½ÓÊÜ¡¢Éí·Ý͵ÇԺ;«×¼ÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£ÓÈÆäÁîÈ˵£ÐĵÄÊÇÕâЩÊý¾Ý¼¯µÄ½á¹¹ºÍнüÐÔ£¬£¬£¬£¬ËüÃDz¢·ÇÖ»ÊǾÉÎó²î±»ÖØÐÂʹÓ㬣¬£¬£¬¶øÊÇȫеġ¢¿É´ó¹æÄ£ÎäÆ÷»¯µÄÇ鱨¡£¡£¡£¡£¡£CyberNewsÍÆ²â£¬£¬£¬£¬Ð¹Â¶µÄ160ÒÚÌõ¼Í¼´ó²¿·ÖÀ´×ÔÇÔÈ¡¶ñÒâÈí¼þ¡¢Æ¾Ö¤Ìî³äºÍ֮ǰµÄÎ¥¹æÐÐΪ£¬£¬£¬£¬ÕâЩÊý¾ÝÕë¶ÔApple¡¢Google¡¢FacebookµÈЧÀÍ¡£¡£¡£¡£¡£


https://securityaffairs.com/179149/data-breach/researchers-discovered-the-largest-data-breach-ever-exposing-16-billion-login-credentials.html


2. а汾Android¶ñÒâÈí¼þGodfather½èÐéÄ⻯ÇÔÈ¡Êý¾Ý


6ÔÂ19ÈÕ£¬£¬£¬£¬Ð°汾Android¶ñÒâÈí¼þGodfatherͨ¹ý½¨Éè¸ôÀëÐéÄâÇéÐΣ¬£¬£¬£¬¶ÔÈ«Çò500¶à¸öÒøÐС¢¼ÓÃÜÇ®±ÒºÍµç×ÓÉÌÎñÓ¦ÓóÌÐòÌᳫ¹¥»÷¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔAPKÐÎʽ·ºÆð£¬£¬£¬£¬ÄÚÖÃÐéÄ⻯¿ò¼Ü£¬£¬£¬£¬Ê¹ÓÃVirtualAppÒýÇæºÍXposedµÈ¹¤¾ß¾ÙÐйҹ³£¬£¬£¬£¬ÔÚ×°±¸Éϼ¤»îºó£¬£¬£¬£¬»á¼ì²é²¢°²ÅÅÒÑ×°ÖõÄÄ¿µÄÓ¦ÓóÌÐòµ½ÐéÄâÇéÐÎÖУ¬£¬£¬£¬Í¨¹ýStubActivityÔÚÖ÷»úÈÝÆ÷ÄÚÆô¶¯Ëü£¬£¬£¬£¬´Ó¶ø×èµ²²¢¿ØÖÆÕýµ±Ó¦ÓóÌÐòµÄÔËÐС£¡£¡£¡£¡£Êܺ¦Õ߯ô¶¯ÕæÕýµÄÒøÐÐÓ¦ÓóÌÐòʱ£¬£¬£¬£¬¶ñÒâÈí¼þ»á×èµ²²¢Öض¨Ïò¡°Intent¡±£¬£¬£¬£¬Æô¶¯ÐéÄâ°æ±¾£¬£¬£¬£¬Óû§¿´µ½µÄËäÊÇÕæÊµ½çÃæ£¬£¬£¬£¬µ«ËùÓÐÃô¸ÐÊý¾Ý¶¼¿ÉÄܱ»Ð®ÖÆ¡£¡£¡£¡£¡£Í¨¹ýAPI¹Ò¹³£¬£¬£¬£¬¶ñÒâÈí¼þÄܼͼÕË»§Æ¾Ö¤¡¢ÃÜÂë¡¢PIN¡¢´¥ÃþÊÂÎñµÈ£¬£¬£¬£¬²¢ÔÚÒªº¦Ê±¿ÌÏÔʾÐéÎ±ËøÆÁÁýÕÖ£¬£¬£¬£¬ÓÕÆ­Êܺ¦ÕßÊäÈëPIN/ÃÜÂë¡£¡£¡£¡£¡£Ò»µ©Êý¾ÝÍøÂçÍê±Ï£¬£¬£¬£¬Ëü»áÆÚ´ý²Ù×÷Ô±ÏÂÁîÖ´Ðи¶¿î/תÕ˵ȲÙ×÷£¬£¬£¬£¬Ê±´úÏÔʾÐéα¡°¸üС±ÆÁÄ»»òºÚÆÁÒÔ×èÖ¹ÏÓÒÉ¡£¡£¡£¡£¡£×Ô2021Äê3ÔÂÊ״ηºÆðÒÔÀ´£¬£¬£¬£¬GodfatherÒ»Ö±½ø»¯£¬£¬£¬£¬×îа汾Óë֮ǰÏà±ÈÓÐÁËÖØ´óˢС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/godfather-android-malware-now-uses-virtualization-to-hijack-banking-apps/


3. ³¯ÏÊ×é֯ʹÓÃPylangGhost¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÐÐÒµÈËÊ¿


6ÔÂ19ÈÕ£¬£¬£¬£¬Ë¼¿ÆTalos×îÐÂÑо¿ÏÔʾ£¬£¬£¬£¬Ò»ÏµÁÐÐÂÍøÂç¹¥»÷ÕýʹÓÃÐéαÕÐÆ¸È¦Ì×£¬£¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒºÍÇø¿éÁ´ÐÐҵרҵÈËÊ¿¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÓëºÍ³¯ÏʽáÃ˵ġ°Famous Chollima¡±×éÖ¯ÓйØ£¬£¬£¬£¬¸Ã×é֯ð³äÕýµ±¹«Ë¾£¬£¬£¬£¬ÓÕÆ­Êܺ¦Õß×°ÖÃαװ³ÉÊÓÆµÇý¶¯³ÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2024ÄêÖÐÆÚÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬´Ëǰ¾ÍÒÔÐéαÕÐÆ¸ÐÅÏ¢ºÍڲƭÐÔÃæÊÔÁ÷³ÌµÈÊÖ¶ÎÖøÃû£¬£¬£¬£¬ÏÖÔÚÐж¯Óú·¢Öش󣬣¬£¬£¬·ºÆðÐÂÐÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þPylangGhost£¬£¬£¬£¬ËüÊÇ֮ǰGolangGhostľÂíµÄ±äÖÖ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÁªÏµÄ¿µÄÇóÖ°Õߣ¬£¬£¬£¬Ìṩ¿´ËƼÓÃÜÇ®±ÒÐÐÒµµÄְ룬£¬£¬£¬ÓÕµ¼Æä½øÈëÐéαÊÖÒÕÆÀ¹ÀÒ³Ãæ£¬£¬£¬£¬¸ÃÒ³Ãæ¸ß¶ÈÄ£ÄâÕæÊµÆóÒµ½çÃæ£¬£¬£¬£¬ÈçCoinbase¡¢RobinhoodµÈ×ÅÃû¹«Ë¾¡£¡£¡£¡£¡£Êܺ¦ÕßÍê³É²âÊԺ󣬣¬£¬£¬»á±»ÒªÇóÂ¼ÖÆÊÓÆµÏÈÈÝ£¬£¬£¬£¬²¢Í¨¹ý¸´ÖÆÕ³ÌùÏÂÁîµ½ÖÕ¶Ë×°Öá°ÊÓÆµÇý¶¯³ÌÐò¡±£¬£¬£¬£¬½ø¶øÏÂÔØ°üÀ¨PylangGhostľÂíµÄ¶ñÒâZIPÎļþ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»á×ÔÐнâѹ²¢ÔÚºǫ́ÔËÐУ¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔ¶³Ì»á¼û×°±¸£¬£¬£¬£¬ÍøÂçϵͳÐÅÏ¢¡¢ÅþÁ¬ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬ÎüÊÕ²¢Ö´ÐÐÔ¶³ÌÏÂÁî¡¢»ñȡƾ֤¡¢ÇÔÈ¡ä¯ÀÀÆ÷Êý¾Ý£¬£¬£¬£¬°üÀ¨ÃÜÂëºÍ¼ÓÃÜÇ®°üÃÜÔ¿£¬£¬£¬£¬Õë¶Ô80¶àÖÖ²î±ðä¯ÀÀÆ÷À©Õ¹³ÌÐò£¬£¬£¬£¬ÇÒʹÓÃRC4¼ÓÃÜÓëЧÀÍÆ÷ͨѶ£¬£¬£¬£¬¼ÓÃÜÃÜÔ¿ËæÊý¾Ý·¢ËÍ£¬£¬£¬£¬ËäÏÞÖÆÁËÇå¾²ÐÔ£¬£¬£¬£¬µ«ÓÐÖúÓÚÈÚÈëͨÀýÁ÷Á¿£¬£¬£¬£¬ÔöÌí¼ì²âÄѶȡ£¡£¡£¡£¡£


https://hackread.com/n-korean-hackers-pylangghost-malware-crypo-job-scam/


4. Krispy KremeÔâPlayÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬³¬16ÍòÈËÐÅÏ¢ÔâÇÔ


6ÔÂ19ÈÕ£¬£¬£¬£¬ÃÀ¹úÌðÌðȦÁ¬ËøµêKrispy Kreme֤ʵ£¬£¬£¬£¬2024Äê11Ô±¬·¢µÄÒ»ÆðÍøÂç¹¥»÷µ¼ÖÂÁè¼Ý16ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÈ«Çò40¸ö¹ú¼Ò/µØÇøÓµÓдó×ÚÔ±¹¤¡¢ÃŵêºÍ½ÓÈëµã£¬£¬£¬£¬²¢ÓëÂóµ±ÀÍÏàÖúÔÚÈ«ÇòÊýǧ¼ÒÃŵêÏúÊÛ²úÆ·¡£¡£¡£¡£¡£ÔÚÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÖУ¬£¬£¬£¬Krispy Kreme͸¶´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁË161,676ÈË£¬£¬£¬£¬µ«ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÐÅÏ¢±»ÀÄÓ㬣¬£¬£¬Ò²Î´½Óµ½Éí·Ý͵ÇÔ»òڲƭµÄ±¨¸æ¡£¡£¡£¡£¡£Ö»¹Ü¹«Ë¾Î´Í¸Â¶Ïêϸй¶µÄÊý¾ÝÀàÐÍ£¬£¬£¬£¬µ«Ìá½»¸øÂíÈøÖîÈûÖÝ×ÜÉó²é³¤µÄÎļþÏÔʾ£¬£¬£¬£¬±»µÁÎļþ°üÀ¨Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢ºÍ¼ÝʻִÕÕÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£Krispy KremeÓÚ11ÔÂ29ÈÕ¼ì²âµ½ITϵͳÉϵÄδ¾­ÊÚȨ»î¶¯£¬£¬£¬£¬²¢ÓÚ12ÔÂ11ÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÅû¶ÁËÕâÒ»ÊÂÎñ¼°ÔÚÏß¶©¹ºÖÐÖ¹µÄÇéÐΡ£¡£¡£¡£¡£¹«Ë¾½ÓÄɲ½·¥×èֹΥ¹æÐÐΪ£¬£¬£¬£¬²¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÆÀ¹À¹¥»÷Ó°Ïì¡£¡£¡£¡£¡£PlayÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬²¢³Æ´Ó¹«Ë¾ÍøÂçÖÐÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬°üÀ¨¡°Ë½È˺ÍСÎÒ˽¼ÒÉñÃØÊý¾Ý¡±µÈ£¬£¬£¬£¬ÔÚÓëKrispy Kreme̸ÅÐʧ°Üºó£¬£¬£¬£¬ÓÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˰üÀ¨Êý°ÙGBÎĵµµÄµµ°¸¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/krispy-kreme-says-november-data-breach-impacts-over-160-000-people/


5. Banana Squad½«¶ñÒâÈí¼þÒþ²ØÔÚÐéαµÄGitHub´æ´¢¿âÖÐ


6ÔÂ19ÈÕ£¬£¬£¬£¬ReversingLabsÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÓÉ¡°Ï㽶С¶Ó¡±£¨Banana Squad£©×éÖ¯Ïòµ¼µÄÐÂÐ͹¥»÷ÒªÁì¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2023Äê10ÔÂÊ״α»CheckmarxÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ÒÔ½ÆÕ©¹¥»÷ÊÖ¶ÎÖø³Æ¡£¡£¡£¡£¡£ReversingLabsÍŶÓÔÚGitHubÉÏ·¢Ã÷60¶à¸öÐéαÏîÄ¿Îļþ¼Ð£¬£¬£¬£¬ÕâЩ¿´ËÆPython±àдµÄºÚ¿Í¹¤¾ßʵÔò±»Ä¾Âí²¡¶¾Ñ¬È¾£¬£¬£¬£¬°üÀ¨Òþ²Ø¶ñÒâ´úÂë¡£¡£¡£¡£¡£ÔçÔÚ2023Äê4Ô£¬£¬£¬£¬Ï㽶С¶Ó¾ÍÒÔÖÖÖÖÓû§ÃûÐû²¼ÁËÊý°Ù¸ö¶ñÒâÈí¼þ°ü£¬£¬£¬£¬×¨ÎªWindowsµçÄÔÉè¼Æ£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡´ó×ÚÃô¸ÐÊý¾Ý£¬£¬£¬£¬°üÀ¨µçÄÔ¡¢Ó¦ÓóÌÐò¡¢ÍøÂçä¯ÀÀÆ÷ÐÅÏ¢£¬£¬£¬£¬ÉõÖÁͨ¹ý×ªÒÆ×ʽðÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢£¬£¬£¬£¬ÕâЩ¶ñÒâÈí¼þ°üÔÚ±»·¢Ã÷²¢ÒƳýǰ±»ÏÂÔØ½ü75,000´Î¡£¡£¡£¡£¡£2024Äê11Ô£¬£¬£¬£¬¸Ã×éÖ¯ÓÖʹÓÃGitHub³¤´úÂëÐв»»»Ðм°Ìí¼Ó¿Õ¸ñµÄÌØÕ÷£¬£¬£¬£¬½«¶ñÒâ´úÂëÍÆµ½ÆÁÄ»Í⣬£¬£¬£¬ÔöÌí·¢Ã÷ÄѶÈ£¬£¬£¬£¬ÇÒͨ³£Ê¹ÓÃÐéαÓû§ÕË»§ÍйÜÓк¦´æ´¢¿â¡£¡£¡£¡£¡£


https://hackread.com/banana-squad-data-stealing-malware-github-repositories/


6. ÈðÒøÒòµÚÈý·½¹©Ó¦ÉÌÔâÍøÂç¹¥»÷ÖÂ13ÍòÔ±¹¤ÐÅϢй¶


6ÔÂ19ÈÕ£¬£¬£¬£¬È«ÇòÒøÐÐÒµ¾ÞÍ·ÈðÒø¼¯ÍÅ£¨UBS£©ÒòµÚÈý·½¹©Ó¦ÉÌChain IQÔâÍøÂç¹¥»÷¶ø±¬·¢Êý¾Ýй¶¡£¡£¡£¡£¡£ÈðÒø½²»°ÈËÈ·ÈÏÊÂÎñ±¬·¢£¬£¬£¬£¬µ«Ç¿µ÷¿Í»§Êý¾Ý¼°ÓªÒµÔËӪδÊÜÓ°Ï죬£¬£¬£¬²¢³ÆÒÑѸËÙ½ÓÄÉÐж¯×èÖ¹Ó°Ïì¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ÈðʿýÌ塶ʱ´ú±¨¡·±¨µÀ£¬£¬£¬£¬ÀÕË÷×éÖ¯World LeaksÔÚ°µÍø¹ûÕæÁËÔ¼13ÍòÃûÈðÒøÔ±¹¤µÄÏêϸÐÅÏ¢£¬£¬£¬£¬°üÀ¨µç»°ºÅÂ롢ְλ½ÇÉ«¡¢°ì¹«ËùÔڵȣ¬£¬£¬£¬ÉõÖÁÉæ¼°Ê×ϯִÐйٵÄÖ±½Óµç»°ºÅÂë¡£¡£¡£¡£¡£ÈðÒøÖ¤ÊµÉæÊ¹©Ó¦ÉÌΪChain IQ£¬£¬£¬£¬ÁíÒ»¼Ò¿Í»§°Ù´ïÒøÐÐҲȷÈÏÔâÓöÊý¾Ýй¶£¬£¬£¬£¬µ«³Æ±»µÁÐÅÏ¢½öÉæ¼°ÒøÐй©Ó¦É̵ķ¢Æ±Êý¾Ý£¬£¬£¬£¬²»º¬¿Í»§×ÊÁÏ¡£¡£¡£¡£¡£Chain IQÔÚÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬¸Ã¹«Ë¾ÓëÁíÍâ19¼ÒÆóÒµÓÚ6ÔÂ12ÈÕÔâÊÜ¡°È«Çò¹æÄ£ÄÚǰËùδ¼û¡±µÄÍøÂç¹¥»÷£¬£¬£¬£¬²¿·Ö¿Í»§Êý¾Ý±»Ðû²¼ÖÁ°µÍø¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÕë¶ÔÊÂÎñÓ°ÏìÌá³ö¶àÖØ¾¯Ê¾£¬£¬£¬£¬°üÀ¨Êý¾Ýй¶µÄDZÔÚΣº¦¿ÉÄÜÊýÖܺó²ÅÕ¹ÏÖ¡¢¹ûÕæÔ±¹¤ÐÅÏ¢¿ÉÄÜËðº¦ÒøÐÐÉùÓþÓë¿Í»§ÐÅÈΣ¬£¬£¬£¬ÒÔ¼°Ð¹Â¶Êý¾Ý¿ÉÄܱ»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷ºÍ½ðÈÚڲƭ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/ubs-employee-data-exposed-third/