Ñо¿Ö°Ô±Åû¶ʷÉÏ×î´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬160ÒڵǼƾ֤ÔâÇÔÈ¡
Ðû²¼Ê±¼ä 2025-06-201. Ñо¿Ö°Ô±Åû¶ʷÉÏ×î´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬160ÒڵǼƾ֤ÔâÇÔÈ¡
6ÔÂ19ÈÕ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼·¢Ã÷Ê·ÉÏ×î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ð¹Â¶µÇ¼ƾ֤ÊýÄ¿¸ß´ï160ÒÚ·Ý¡£¡£¡£¸ÃÊÓ²ìÓÚ½ñÄêÔçЩʱ¼äÆô¶¯£¬£¬£¬£¬£¬ÏÔʾÕâЩƾ֤ÊÇͨ¹ý¶àÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍøÂç¶øÀ´¡£¡£¡£CybernewsÑо¿Ö°Ô±±¨¸æ³Æ£¬£¬£¬£¬£¬´Ë´Îй¶ÓÉÀ´×Ô¸÷ƽ̨µÄ30¸öº£Á¿Ð¹Â¶Êý¾Ý¼¯×é³É£¬£¬£¬£¬£¬×ܼÆÌ»Â¶160ÒÚÌõµÇ¼¼Í¼¡£¡£¡£³ýÒ»Æð´ËǰÒѱ¨¸æµÄ°¸ÆÆÀý£¬£¬£¬£¬£¬ÆäÓà29¸öй¶Êý¾Ý¼¯¾ùΪз¢Ã÷£¬£¬£¬£¬£¬ÇÒÐÂй¶ÊÂÎñÒ»Ö±Ó¿ÏÖ£¬£¬£¬£¬£¬Í¹ÏÔÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÈö²¥¹æÄ£Ö®¹ã¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Ì»Â¶µÄÊý¾Ý¼¯Ö»ÄܶÌÔÝ»á¼û£¬£¬£¬£¬£¬´ó²¿·Ö̻¶ÔÚ²»Çå¾²µÄElasticsearch»ò´æ´¢ÊµÀýÉÏ¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬Õâ²»µ«ÊÇйÃÜ£¬£¬£¬£¬£¬¸üÊÇ´ó¹æÄ£Ê¹ÓõÄÀ¶Í¼£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÏÖÔÚÓµÓÐØ¨¹ÅδÓеÄСÎÒ˽¼Òƾ֤»á¼ûȨÏÞ£¬£¬£¬£¬£¬¿ÉÓÃÓÚÕË»§½ÓÊÜ¡¢Éí·Ý͵ÇԺ;«×¼ÍøÂç´¹ÂÚ¡£¡£¡£ÓÈÆäÁîÈ˵£ÐĵÄÊÇÕâЩÊý¾Ý¼¯µÄ½á¹¹ºÍнüÐÔ£¬£¬£¬£¬£¬ËüÃDz¢·ÇÖ»ÊǾÉÎó²î±»ÖØÐÂʹÓ㬣¬£¬£¬£¬¶øÊÇȫеġ¢¿É´ó¹æÄ£ÎäÆ÷»¯µÄÇ鱨¡£¡£¡£CyberNewsÍÆ²â£¬£¬£¬£¬£¬Ð¹Â¶µÄ160ÒÚÌõ¼Í¼´ó²¿·ÖÀ´×ÔÇÔÈ¡¶ñÒâÈí¼þ¡¢Æ¾Ö¤Ìî³äºÍ֮ǰµÄÎ¥¹æÐÐΪ£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÕë¶ÔApple¡¢Google¡¢FacebookµÈЧÀÍ¡£¡£¡£
https://securityaffairs.com/179149/data-breach/researchers-discovered-the-largest-data-breach-ever-exposing-16-billion-login-credentials.html
2. а汾Android¶ñÒâÈí¼þGodfather½èÐéÄ⻯ÇÔÈ¡Êý¾Ý
6ÔÂ19ÈÕ£¬£¬£¬£¬£¬Ð°汾Android¶ñÒâÈí¼þGodfatherͨ¹ý½¨Éè¸ôÀëÐéÄâÇéÐΣ¬£¬£¬£¬£¬¶ÔÈ«Çò500¶à¸öÒøÐС¢¼ÓÃÜÇ®±ÒºÍµç×ÓÉÌÎñÓ¦ÓóÌÐòÌᳫ¹¥»÷¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔAPKÐÎʽ·ºÆð£¬£¬£¬£¬£¬ÄÚÖÃÐéÄ⻯¿ò¼Ü£¬£¬£¬£¬£¬Ê¹ÓÃVirtualAppÒýÇæºÍXposedµÈ¹¤¾ß¾ÙÐйҹ³£¬£¬£¬£¬£¬ÔÚ×°±¸Éϼ¤»îºó£¬£¬£¬£¬£¬»á¼ì²é²¢°²ÅÅÒÑ×°ÖõÄÄ¿µÄÓ¦ÓóÌÐòµ½ÐéÄâÇéÐÎÖУ¬£¬£¬£¬£¬Í¨¹ýStubActivityÔÚÖ÷»úÈÝÆ÷ÄÚÆô¶¯Ëü£¬£¬£¬£¬£¬´Ó¶ø×èµ²²¢¿ØÖÆÕýµ±Ó¦ÓóÌÐòµÄÔËÐС£¡£¡£Êܺ¦Õ߯ô¶¯ÕæÕýµÄÒøÐÐÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»á×èµ²²¢Öض¨Ïò¡°Intent¡±£¬£¬£¬£¬£¬Æô¶¯ÐéÄâ°æ±¾£¬£¬£¬£¬£¬Óû§¿´µ½µÄËäÊÇÕæÊµ½çÃæ£¬£¬£¬£¬£¬µ«ËùÓÐÃô¸ÐÊý¾Ý¶¼¿ÉÄܱ»Ð®ÖÆ¡£¡£¡£Í¨¹ýAPI¹Ò¹³£¬£¬£¬£¬£¬¶ñÒâÈí¼þÄܼͼÕË»§Æ¾Ö¤¡¢ÃÜÂë¡¢PIN¡¢´¥ÃþÊÂÎñµÈ£¬£¬£¬£¬£¬²¢ÔÚÒªº¦Ê±¿ÌÏÔʾÐéÎ±ËøÆÁÁýÕÖ£¬£¬£¬£¬£¬ÓÕÆÊܺ¦ÕßÊäÈëPIN/ÃÜÂë¡£¡£¡£Ò»µ©Êý¾ÝÍøÂçÍê±Ï£¬£¬£¬£¬£¬Ëü»áÆÚ´ý²Ù×÷Ô±ÏÂÁîÖ´Ðи¶¿î/תÕ˵ȲÙ×÷£¬£¬£¬£¬£¬Ê±´úÏÔʾÐéα¡°¸üС±ÆÁÄ»»òºÚÆÁÒÔ×èÖ¹ÏÓÒÉ¡£¡£¡£×Ô2021Äê3ÔÂÊ״ηºÆðÒÔÀ´£¬£¬£¬£¬£¬GodfatherÒ»Ö±½ø»¯£¬£¬£¬£¬£¬×îа汾Óë֮ǰÏà±ÈÓÐÁËÖØ´óˢС£¡£¡£
https://www.bleepingcomputer.com/news/security/godfather-android-malware-now-uses-virtualization-to-hijack-banking-apps/
3. ³¯ÏÊ×é֯ʹÓÃPylangGhost¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÐÐÒµÈËÊ¿
6ÔÂ19ÈÕ£¬£¬£¬£¬£¬Ë¼¿ÆTalos×îÐÂÑо¿ÏÔʾ£¬£¬£¬£¬£¬Ò»ÏµÁÐÐÂÍøÂç¹¥»÷ÕýʹÓÃÐéαÕÐÆ¸È¦Ì×£¬£¬£¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒºÍÇø¿éÁ´ÐÐҵרҵÈËÊ¿¡£¡£¡£ÕâЩ¹¥»÷ÓëºÍ³¯ÏʽáÃ˵ġ°Famous Chollima¡±×éÖ¯Óйأ¬£¬£¬£¬£¬¸Ã×é֯ð³äÕýµ±¹«Ë¾£¬£¬£¬£¬£¬ÓÕÆÊܺ¦Õß×°ÖÃαװ³ÉÊÓÆµÇý¶¯³ÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¸Ã×éÖ¯×Ô2024ÄêÖÐÆÚÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬´Ëǰ¾ÍÒÔÐéαÕÐÆ¸ÐÅÏ¢ºÍÚ²ÆÐÔÃæÊÔÁ÷³ÌµÈÊÖ¶ÎÖøÃû£¬£¬£¬£¬£¬ÏÖÔÚÐж¯Óú·¢Öش󣬣¬£¬£¬£¬·ºÆðÐÂÐÍ»ùÓÚPythonµÄ¶ñÒâÈí¼þPylangGhost£¬£¬£¬£¬£¬ËüÊÇ֮ǰGolangGhostľÂíµÄ±äÖÖ¡£¡£¡£¹¥»÷Õßͨ¹ýÁªÏµÄ¿µÄÇóÖ°Õߣ¬£¬£¬£¬£¬Ìṩ¿´ËƼÓÃÜÇ®±ÒÐÐÒµµÄְ룬£¬£¬£¬£¬ÓÕµ¼Æä½øÈëÐéαÊÖÒÕÆÀ¹ÀÒ³Ãæ£¬£¬£¬£¬£¬¸ÃÒ³Ãæ¸ß¶ÈÄ£ÄâÕæÊµÆóÒµ½çÃæ£¬£¬£¬£¬£¬ÈçCoinbase¡¢RobinhoodµÈ×ÅÃû¹«Ë¾¡£¡£¡£Êܺ¦ÕßÍê³É²âÊԺ󣬣¬£¬£¬£¬»á±»ÒªÇóÂ¼ÖÆÊÓÆµÏÈÈÝ£¬£¬£¬£¬£¬²¢Í¨¹ý¸´ÖÆÕ³ÌùÏÂÁîµ½ÖÕ¶Ë×°Öá°ÊÓÆµÇý¶¯³ÌÐò¡±£¬£¬£¬£¬£¬½ø¶øÏÂÔØ°üÀ¨PylangGhostľÂíµÄ¶ñÒâZIPÎļþ¡£¡£¡£¸Ã¶ñÒâÈí¼þ»á×ÔÐнâѹ²¢ÔÚºǫ́ÔËÐУ¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔ¶³Ì»á¼û×°±¸£¬£¬£¬£¬£¬ÍøÂçϵͳÐÅÏ¢¡¢ÅþÁ¬ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬ÎüÊÕ²¢Ö´ÐÐÔ¶³ÌÏÂÁî¡¢»ñȡƾ֤¡¢ÇÔÈ¡ä¯ÀÀÆ÷Êý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÃÜÂëºÍ¼ÓÃÜÇ®°üÃÜÔ¿£¬£¬£¬£¬£¬Õë¶Ô80¶àÖÖ²î±ðä¯ÀÀÆ÷À©Õ¹³ÌÐò£¬£¬£¬£¬£¬ÇÒʹÓÃRC4¼ÓÃÜÓëЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬¼ÓÃÜÃÜÔ¿ËæÊý¾Ý·¢ËÍ£¬£¬£¬£¬£¬ËäÏÞÖÆÁËÇå¾²ÐÔ£¬£¬£¬£¬£¬µ«ÓÐÖúÓÚÈÚÈëͨÀýÁ÷Á¿£¬£¬£¬£¬£¬ÔöÌí¼ì²âÄѶȡ£¡£¡£
https://hackread.com/n-korean-hackers-pylangghost-malware-crypo-job-scam/
4. Krispy KremeÔâPlayÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬³¬16ÍòÈËÐÅÏ¢ÔâÇÔ
6ÔÂ19ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÌðÌðȦÁ¬ËøµêKrispy Kreme֤ʵ£¬£¬£¬£¬£¬2024Äê11Ô±¬·¢µÄÒ»ÆðÍøÂç¹¥»÷µ¼ÖÂÁè¼Ý16ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¸Ã¹«Ë¾ÔÚÈ«Çò40¸ö¹ú¼Ò/µØÇøÓµÓдó×ÚÔ±¹¤¡¢ÃŵêºÍ½ÓÈëµã£¬£¬£¬£¬£¬²¢ÓëÂóµ±ÀÍÏàÖúÔÚÈ«ÇòÊýǧ¼ÒÃŵêÏúÊÛ²úÆ·¡£¡£¡£ÔÚÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÖУ¬£¬£¬£¬£¬Krispy Kreme͸¶´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁË161,676ÈË£¬£¬£¬£¬£¬µ«ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÐÅÏ¢±»ÀÄÓ㬣¬£¬£¬£¬Ò²Î´½Óµ½Éí·Ý͵ÇÔ»òڲƵı¨¸æ¡£¡£¡£Ö»¹Ü¹«Ë¾Î´Í¸Â¶Ïêϸй¶µÄÊý¾ÝÀàÐÍ£¬£¬£¬£¬£¬µ«Ìá½»¸øÂíÈøÖîÈûÖÝ×ÜÉó²é³¤µÄÎļþÏÔʾ£¬£¬£¬£¬£¬±»µÁÎļþ°üÀ¨Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢ºÍ¼ÝʻִÕÕÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£Krispy KremeÓÚ11ÔÂ29ÈÕ¼ì²âµ½ITϵͳÉϵÄδ¾ÊÚȨ»î¶¯£¬£¬£¬£¬£¬²¢ÓÚ12ÔÂ11ÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÅû¶ÁËÕâÒ»ÊÂÎñ¼°ÔÚÏß¶©¹ºÖÐÖ¹µÄÇéÐΡ£¡£¡£¹«Ë¾½ÓÄɲ½·¥×èֹΥ¹æÐÐΪ£¬£¬£¬£¬£¬²¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÆÀ¹À¹¥»÷Ó°Ïì¡£¡£¡£PlayÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢³Æ´Ó¹«Ë¾ÍøÂçÖÐÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨¡°Ë½È˺ÍСÎÒ˽¼ÒÉñÃØÊý¾Ý¡±µÈ£¬£¬£¬£¬£¬ÔÚÓëKrispy Kreme̸ÅÐʧ°Üºó£¬£¬£¬£¬£¬ÓÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Á˰üÀ¨Êý°ÙGBÎĵµµÄµµ°¸¡£¡£¡£
https://www.bleepingcomputer.com/news/security/krispy-kreme-says-november-data-breach-impacts-over-160-000-people/
5. Banana Squad½«¶ñÒâÈí¼þÒþ²ØÔÚÐéαµÄGitHub´æ´¢¿âÖÐ
6ÔÂ19ÈÕ£¬£¬£¬£¬£¬ReversingLabsÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÓÉ¡°Ï㽶С¶Ó¡±£¨Banana Squad£©×éÖ¯Ïòµ¼µÄÐÂÐ͹¥»÷ÒªÁì¡£¡£¡£¸Ã×éÖ¯ÓÚ2023Äê10ÔÂÊ״α»CheckmarxÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬ÒÔ½ÆÕ©¹¥»÷ÊÖ¶ÎÖø³Æ¡£¡£¡£ReversingLabsÍŶÓÔÚGitHubÉÏ·¢Ã÷60¶à¸öÐéαÏîÄ¿Îļþ¼Ð£¬£¬£¬£¬£¬ÕâЩ¿´ËÆPython±àдµÄºÚ¿Í¹¤¾ßʵÔò±»Ä¾Âí²¡¶¾Ñ¬È¾£¬£¬£¬£¬£¬°üÀ¨Òþ²Ø¶ñÒâ´úÂë¡£¡£¡£ÔçÔÚ2023Äê4Ô£¬£¬£¬£¬£¬Ï㽶С¶Ó¾ÍÒÔÖÖÖÖÓû§ÃûÐû²¼ÁËÊý°Ù¸ö¶ñÒâÈí¼þ°ü£¬£¬£¬£¬£¬×¨ÎªWindowsµçÄÔÉè¼Æ£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡´ó×ÚÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨µçÄÔ¡¢Ó¦ÓóÌÐò¡¢ÍøÂçä¯ÀÀÆ÷ÐÅÏ¢£¬£¬£¬£¬£¬ÉõÖÁͨ¹ý×ªÒÆ×ʽðÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢£¬£¬£¬£¬£¬ÕâЩ¶ñÒâÈí¼þ°üÔÚ±»·¢Ã÷²¢ÒƳýǰ±»ÏÂÔØ½ü75,000´Î¡£¡£¡£2024Äê11Ô£¬£¬£¬£¬£¬¸Ã×éÖ¯ÓÖʹÓÃGitHub³¤´úÂëÐв»»»Ðм°Ìí¼Ó¿Õ¸ñµÄÌØÕ÷£¬£¬£¬£¬£¬½«¶ñÒâ´úÂëÍÆµ½ÆÁÄ»Í⣬£¬£¬£¬£¬ÔöÌí·¢Ã÷ÄѶȣ¬£¬£¬£¬£¬ÇÒͨ³£Ê¹ÓÃÐéαÓû§ÕË»§ÍйÜÓк¦´æ´¢¿â¡£¡£¡£
https://hackread.com/banana-squad-data-stealing-malware-github-repositories/
6. ÈðÒøÒòµÚÈý·½¹©Ó¦ÉÌÔâÍøÂç¹¥»÷ÖÂ13ÍòÔ±¹¤ÐÅϢй¶
6ÔÂ19ÈÕ£¬£¬£¬£¬£¬È«ÇòÒøÐÐÒµ¾ÞÍ·ÈðÒø¼¯ÍÅ£¨UBS£©ÒòµÚÈý·½¹©Ó¦ÉÌChain IQÔâÍøÂç¹¥»÷¶ø±¬·¢Êý¾Ýй¶¡£¡£¡£ÈðÒø½²»°ÈËÈ·ÈÏÊÂÎñ±¬·¢£¬£¬£¬£¬£¬µ«Ç¿µ÷¿Í»§Êý¾Ý¼°ÓªÒµÔËӪδÊÜÓ°Ï죬£¬£¬£¬£¬²¢³ÆÒÑѸËÙ½ÓÄÉÐж¯×èÖ¹Ó°Ïì¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÈðʿýÌ塶ʱ´ú±¨¡·±¨µÀ£¬£¬£¬£¬£¬ÀÕË÷×éÖ¯World LeaksÔÚ°µÍø¹ûÕæÁËÔ¼13ÍòÃûÈðÒøÔ±¹¤µÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨µç»°ºÅÂ롢ְλ½ÇÉ«¡¢°ì¹«ËùÔڵȣ¬£¬£¬£¬£¬ÉõÖÁÉæ¼°Ê×ϯִÐйٵÄÖ±½Óµç»°ºÅÂë¡£¡£¡£ÈðÒøÖ¤ÊµÉæÊ¹©Ó¦ÉÌΪChain IQ£¬£¬£¬£¬£¬ÁíÒ»¼Ò¿Í»§°Ù´ïÒøÐÐҲȷÈÏÔâÓöÊý¾Ýй¶£¬£¬£¬£¬£¬µ«³Æ±»µÁÐÅÏ¢½öÉæ¼°ÒøÐй©Ó¦É̵ķ¢Æ±Êý¾Ý£¬£¬£¬£¬£¬²»º¬¿Í»§×ÊÁÏ¡£¡£¡£Chain IQÔÚÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓëÁíÍâ19¼ÒÆóÒµÓÚ6ÔÂ12ÈÕÔâÊÜ¡°È«Çò¹æÄ£ÄÚǰËùδ¼û¡±µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬²¿·Ö¿Í»§Êý¾Ý±»Ðû²¼ÖÁ°µÍø¡£¡£¡£ÍøÂçÇ徲ר¼ÒÕë¶ÔÊÂÎñÓ°ÏìÌá³ö¶àÖØ¾¯Ê¾£¬£¬£¬£¬£¬°üÀ¨Êý¾Ýй¶µÄDZÔÚΣº¦¿ÉÄÜÊýÖܺó²ÅÕ¹ÏÖ¡¢¹ûÕæÔ±¹¤ÐÅÏ¢¿ÉÄÜËðº¦ÒøÐÐÉùÓþÓë¿Í»§ÐÅÈΣ¬£¬£¬£¬£¬ÒÔ¼°Ð¹Â¶Êý¾Ý¿ÉÄܱ»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷ºÍ½ðÈÚڲơ£¡£¡£
https://www.infosecurity-magazine.com/news/ubs-employee-data-exposed-third/


¾©¹«Íø°²±¸11010802024551ºÅ