BoryptGrabͨ¹ýGitHub¿ÍջαװÈö²¥
Ðû²¼Ê±¼ä 2026-03-091. BoryptGrabͨ¹ýGitHub¿ÍջαװÈö²¥
3ÔÂ8ÈÕ£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶һÆðͨ¹ý100Óà¸öGitHub´úÂë¿â´ó¹æÄ£·Ö·¢BoryptGrabÐÅÏ¢ÇÔÈ¡³ÌÐòµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔC/C++±àд£¬£¬£¬£¬£¬½¹µã¹¦Ð§ÊÇÇÔÈ¡ä¯ÀÀÆ÷¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡¢ÏµÍ³ÏêÇé¼°³£ÓÃÎļþ£¬£¬£¬£¬£¬²¢Í¨¹ýѹËõÎļþÉÏ´«ÖÁ¹¥»÷ÕßЧÀÍÆ÷¡£¡£¡£¡£²¿·Ö±äÖֻᰲÅÅTunnesshClient PyInstallerºóÃÅ£¬£¬£¬£¬£¬½¨Éè·´ÏòSSHËíµÀʵÏÖÔ¶³Ì¿ØÖÆ¡£¡£¡£¡£¹¥»÷Õß½ÓÄɶà²ãαװսÂÔ£º½«¶ñÒâ´úÂëǶÈëαװ³ÉÈí¼þ¹¤¾ß¡¢ÓÎÏ·×÷±×Æ÷µÄZIPѹËõ°ü£¬£¬£¬£¬£¬Á´½ÓÖÁGitHub´æ´¢¿â¡£¡£¡£¡£Í¨¹ýÔÚREADMEÖÐÌî³äSEOÒªº¦´Ê£¬£¬£¬£¬£¬Ê¹¶ñÒâ¿ÍÕ»ÔÚËÑË÷ÒýÇæÖÐÅÅÃû¿¿Ç°£¬£¬£¬£¬£¬ÀýÈçÄ£ÄâVoicemod ProÏÂÔØÒ³Ãæ£¬£¬£¬£¬£¬Ê¹Óú¬"github-io"µÄZIPÎļþÃûÓÕµ¼Óû§ÏÂÔØ¡£¡£¡£¡£Ñ¬È¾Á´°üÀ¨¶àÖÖÆô¶¯·½·¨¡£¡£¡£¡£BoryptGrab¾ß±¸·´ÆÊÎö»úÖÆ£ºÍ¨¹ý×¢²á±íÅÌÎʺÍÐéÄâ»úÎļþ¼ì²âÐéÄâÇéÐΣ¬£¬£¬£¬£¬±È¶ÔÔËÐÐÀú³ÌÁÐ±í£¬£¬£¬£¬£¬²¢ÊµÑéÌáÉýȨÏÞ¡£¡£¡£¡£Èôδָ¶¨Êä³ö·¾¶£¬£¬£¬£¬£¬½«°´Ä¿½ñʱ¼ä¡¢¹«ÍøIPºÍ¹ú¼Ò´úÂëÌìÉúÑÄ´¢Ä¿Â¼¡£¡£¡£¡£Æä"ÎļþץȡÆ÷"Ä£¿£¿£¿£¿£¿é¿ÉÍøÂçÌØ¶¨À©Õ¹ÃûµÄ³£ÓÃĿ¼Îļþ£¬£¬£¬£¬£¬Ð±äÖÖ»¹ÔöÌíÁËDiscord´ú±ÒÇÔÈ¡¹¦Ð§¡£¡£¡£¡£
https://securityaffairs.com/189110/malware/massive-github-malware-operation-spreads-boryptgrab-stealer.html
2. Velvet TempestʹÓÃClickFixÊÖÒÕ°²ÅŶñÒâÈí¼þ
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬±»×·×ÙΪ"Velvet Tempest"£¨ÓÖÃûDEV-0504£©µÄÀÕË÷Èí¼þÍþвÐÐΪÕߣ¬£¬£¬£¬£¬Õýͨ¹ýClickFixÊÖÒÕºÍÕýµ±WindowsÊÊÓóÌÐò°²ÅÅDonutLoader¶ñÒâÈí¼þ¼°CastleRATºóÃÅ¡£¡£¡£¡£¸Ã×éÖ¯×÷ΪÀÕË÷Èí¼þ¹¥»÷µÄÁ¥Êô×éÖ¯ÒÑ»îÔ¾ÖÁÉÙÎåÄ꣬£¬£¬£¬£¬Ôø¼ÓÈë°²ÅÅRyuk¡¢REvil¡¢Conti¡¢BlackMatter¡¢BlackCat/ALPHV¡¢LockBitºÍRansomHubµÈ¶à¿îÆÆËðÐÔÀÕË÷Èí¼þ¡£¡£¡£¡£ÍøÂçÓÕÆÍþвÇ鱨¹«Ë¾MalBeaconÔÚÄ£Äâ·ÇÓªÀû×éÖ¯ÇéÐÎÖÐÊӲ쵽¸Ã×éÖ¯12ÌìµÄ¹¥»÷ÐÐΪ¡£¡£¡£¡£¹¥»÷³õʼ½×¶Îͨ¹ý¶ñÒâ¹ã¸æ»î¶¯ÊµÑ飬£¬£¬£¬£¬Ê¹ÓÃClickFixÓëCAPTCHA»ìÏýÓÕÆ£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õß½«»ìÏýÏÂÁîÕ³ÌùÖÁWindowsÔËÐжԻ°¿ò£¬£¬£¬£¬£¬´¥·¢Ç¶Ì×cmd.exeÁ´²¢Å²ÓÃfinger.exe»ñÈ¡Ê׸öαװ³ÉPDFѹËõÎļþµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷¡£¡£¡£¡£»£»£»£»£»ñÈ¡»á¼ûȨÏ޺󣬣¬£¬£¬£¬¹¥»÷ÕßÖ´ÐмüÅ̲Ù×÷¾ÙÐÐActive DirectoryÕì̽¡¢Ö÷»ú·¢Ã÷¼°ÇéÐÎÆÊÎö£¬£¬£¬£¬£¬²¢Ê¹ÓÃÍйÜÓÚ¹ØÁªTermiteÀÕË÷Èí¼þ¹¤¾ß°²ÅÅÇéÐεÄPowerShell¾ç±¾£¬£¬£¬£¬£¬ÌáÈ¡Chrome´æ´¢µÄƾ֤¡£¡£¡£¡£ºóÐø½×¶Îͨ¹ýPowerShellÏÂÔØÖ´ÐÐÏÂÁ£¬£¬£¬£¬×îÖÕ°²ÅÅDonutLoader²¢»ñÈ¡ÓëCastleLoader¹ØÁªµÄCastleRATÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/
3. ÒÁÀÊMuddyWater APT×éÖ¯¶ÔÃÀ»ú¹¹·¢¶¯»ìÏý¹¥»÷
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬²©Í¨ÈüÃÅÌú¿ËÍŶӿËÈÕÅû¶£¬£¬£¬£¬£¬ÓëÒÁÀÊÇ鱨ºÍÇå¾²²¿£¨MOIS£©¹ØÁªµÄMuddyWater£¨ÓÖÃûSeedWorm¡¢TEMP.ZagrosµÈ£©APT×éÖ¯Õý¶ÔÃÀ¹ú¶à¼Ò»ú¹¹·¢¶¯Ò»Á¬¹¥»÷¡£¡£¡£¡£¸Ã»î¶¯×Ô2026Äê2ÔÂÆô¶¯£¬£¬£¬£¬£¬ÖÁ½ñÈÔÔÚ»îÔ¾£¬£¬£¬£¬£¬Ä¿µÄº¸ÇÃÀ¹úÒøÐС¢»ú³¡¡¢·ÇÓªÀû×éÖ¯¼°Ò»¼ÒÒÔÉ«Áйú·Àº½¿Õº½ÌìÈí¼þ¹©Ó¦ÉÌ¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬MuddyWater°²ÅÅÁËÐÂÐͺóÃÅDindoor£¬£¬£¬£¬£¬ÆäÒÀÀµDenoÔËÐÐʱִÐÐJavaScript/TypeScript´úÂ룬£¬£¬£¬£¬²¢Ê¹Óá°Amy Cherne¡±Ö¤ÊéÊðÃû¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßÊÔͼͨ¹ýRclone¹¤¾ß½«Ä¿µÄÈí¼þ¹«Ë¾Êý¾ÝÇÔÈ¡ÖÁWasabiÔÆ´æ´¢Í°£¬£¬£¬£¬£¬µ«´«ÊäЧ¹ûδÃ÷¡£¡£¡£¡£ÃÀ¹ú»ú³¡ºÍ·ÇÓªÀû×éÖ¯ÍøÂçÖл¹·ºÆðÁË×ÔÁ¦µÄPythonºóÃÅFakeset£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓÃÓëSeedworm¹ØÁªµÄÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬ÍйÜÓÚBackblazeЧÀÍÆ÷£¬£¬£¬£¬£¬½øÒ»²½Ó¡Ö¤ÒÁÀÊÅä¾°¡£¡£¡£¡£
https://securityaffairs.com/189060/apt/iran-linked-muddywater-deploys-dindoor-malware-against-u-s-organizations.html
4. TriZettoÒ½ÁÆÊý¾Ýй¶ÊÂÎñÓ°Ï쳬340ÍòÈË
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬Ò½ÁƱ£½¡IT¹«Ë¾TriZetto Provider SolutionsÔâÓöÖØ´óÊý¾Ýй¶£¬£¬£¬£¬£¬µ¼Ö³¬340ÍòÈ˵ÄÃô¸ÐÐÅϢ̻¶¡£¡£¡£¡£ÊÂÎñʼÓÚ2024Äê11ÔÂ19ÈÕ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßδ¾ÊÚȨ»á¼û°ü¹Ü×ʸñÑéÖ¤ÉúÒâ¼Í¼£¬£¬£¬£¬£¬ÕâÊÇÒ½ÁÆÐ§ÀÍÌṩ·½ÖÎÁÆÇ°È·ÈÏ»¼Õß°ü¹Ü¹æÄ£µÄÒªº¦Á÷³Ì¡£¡£¡£¡£Ö±ÖÁ2025Äê10ÔÂ2ÈÕ£¬£¬£¬£¬£¬¸Ã¹«Ë¾²ÅÔÚÃÅ»§ÍøÕ¾¼ì²âµ½¿ÉÒɻ²¢Æô¶¯ÊӲ죬£¬£¬£¬£¬ÊÓ²ìÏÔʾ»á¼ûÐÐΪһÁ¬½üÒ»Äê¡£¡£¡£¡£Ð¹Â¶Êý¾ÝÒòÈ˸÷Ò죬£¬£¬£¬£¬¿ÉÄܰüÀ¨È«Ãû¡¢ÏÖʵµØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¿µ½¡°ü¹Ü»áÔ±±àºÅ¡¢Ò½Áưü¹ÜÊÜÒæÈ˱êʶ·û¡¢ÌṩÉ̼°°ü¹Ü¹«Ë¾Ãû³Æ£¬£¬£¬£¬£¬ÒÔ¼°Éú³Ýͳ¼Æ¡¢¿µ½¡ºÍ°ü¹ÜÐÅÏ¢¡£¡£¡£¡£µ«Ö§¸¶¿¨¡¢ÒøÐÐÕË»§»òÆäËû²ÆÎñÐÅϢδ±»Ð¹Â¶£¬£¬£¬£¬£¬ÇÒÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£¡£¡£ÊÜÓ°ÏìЧÀÍÌṩÉÌÓÚ2025Äê12ÔÂ9ÈÕ»ñ֪ͨ£¬£¬£¬£¬£¬¿Í»§Í¨ÖªÊÂÇéÔò´Ó2026Äê2Ô³õÆô¶¯¡£¡£¡£¡£Æ¾Ö¤ÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎļþ£¬£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊý´ï3,433,965ÈË¡£¡£¡£¡£TriZettoÒѽÓÄɲ½·¥ÔöǿϵͳÇå¾²£¬£¬£¬£¬£¬²¢×ª´ïÖ´·¨²¿·Ö£¬£¬£¬£¬£¬Í¬Ê±ÎªÊÜÓ°ÏìÕßÌṩKrollµÄ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/
5. CISA½ôÆÈÒªÇóÁª°î»ú¹¹ÐÞ¸´iOS¸ßΣÎó²î
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Ç¿ÖÆÐÔÖ¸Á£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê3ÔÂ26ÈÕǰÐÞ¸´Èý¸ö±»CorunaÎó²îʹÓù¤¾ß°ü¹¥»÷µÄiOSÇå¾²Îó²î¡£¡£¡£¡£ÕâЩÎó²îÒѱ»ÄÉÈëCISAÒÑ֪ʹÓÃÎó²îĿ¼£¬£¬£¬£¬£¬ÊôÓÚÔ¼ÊøÐÔ²Ù×÷Ö¸ÁBOD£©22-01µÄ¹Ü¿Ø¹æÄ£¡£¡£¡£¡£¹È¸èÍþвÇ鱨С×飨GTIG£©Ñо¿ÏÔʾ£¬£¬£¬£¬£¬Coruna¹¤¾ß°üͨ¹ý23¸öiOSÎó²îÁ´ÊµÑé¹¥»÷£¬£¬£¬£¬£¬ÆäÖдó¶¼ÎªÁãÈÕÎó²î¡£¡£¡£¡£¸Ã¹¤¾ß°ü¾ß±¸Ö¸ÕëÈÏÖ¤Â루PAC£©Èƹý¡¢É³ÏäÌÓÒݺÍÒ³Ãæ±£»£»£»£»£»¤²ã£¨PPL£©ÈƹýÄÜÁ¦£¬£¬£¬£¬£¬¿ÉʵÏÖWebKitÔ¶³Ì´úÂëÖ´Ðв¢ÌáÉýÖÁÄÚºËȨÏÞ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬×îаæiOSϵͳ¡¢Òþ˽ä¯ÀÀģʽ»òÆ»¹ûËø¶¨Ä£Ê½¿ÉÓÐÓÃ×è¶Ï´ËÀ๥»÷¡£¡£¡£¡£Coruna¹¥»÷Á´Òѱ»¶à¸öÍþвÐÐΪÕßʹÓ㺰üÀ¨¼à¿Ø¹©Ó¦É̿ͻ§¡¢ÒÉËÆ¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯UNC6353£¬£¬£¬£¬£¬ÒÔ¼°¾¼ÃÇý¶¯µÄÖйúÍþвÐÐΪÕßUNC6691¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-apple-flaws-exploited-in-spyware-crypto-theft-attacks/
6. ÒÁÀÊDust Specter½èAI¹¥»÷ÒÁÀ¿ËÕþ¸®
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬Zscaler ThreatLabz¿ËÈÕ½ÒÆÆ£¬£¬£¬£¬£¬ÓëÒÁÀʹØÁªµÄºÚ¿Í×éÖ¯Dust SpecterÕë¶ÔÒÁÀ¿ËÕþ¸®¹ÙÔ±ÌᳫϸÃÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬Í¨¹ýð³äÒÁÀ¿ËÍâ½»²¿µÄ´¹ÂÚÓʼþÈö²¥ÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬°üÀ¨SPLITDROP¡¢TWINTASK¡¢TWINTALK¼°GHOSTFORM¡£¡£¡£¡£´Ë´ÎÐж¯±»ÖиßÖÃÐŶȹéÒòÓÚDust Specter£¬£¬£¬£¬£¬ÆäTTPÌØÕ÷ÓëÒÁÀÊÀúÊ·ÍøÂçÌØ¹¤»î¶¯¸ß¶ÈÎǺϡ£¡£¡£¡£¹¥»÷Á´1ÒÔÃÜÂë±£»£»£»£»£»¤µÄRARÎļþÎªÔØÌ壬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉWinRARµÄSPLITDROPͶ·ÅÆ÷¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬¸Ã¶þ½øÖÆÎļþ½âÃܲ¢°²ÅÅTWINTASKÓëTWINTALK¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ý×¢²á±íÏÉ賤ÆÚÐÔ£¬£¬£¬£¬£¬Ê¹ÓÃVLC¡¢WingetUIµÈÕýµ±Èí¼þ¾ÙÐÐDLL²à¼ÓÔØ¡£¡£¡£¡£TWINTALK½ÓÄÉËæ»úÑÓ³Ù¡¢×Ô½ç˵URI·¾¶¼°JWTÁîÅÆÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬Ö§³ÖÏÂÁîÖ´ÐС¢ÎļþÉÏ´«¼°ÓÐÓÃÔØºÉÏÂÔØ¡£¡£¡£¡£¹¥»÷Á´2ÕûºÏ¹¦Ð§ÖÁ¼òµ¥¶þ½øÖÆÎļþGHOSTFORM£¬£¬£¬£¬£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐÐÏÂÁîÒÔïÔÌÎļþϵͳºÛ¼£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉÒÁÀ¿ËÍâ½»²¿ÊÓ²ìµÄGoogle±íµ¥ÓÕÆÊܺ¦Õߣ¬£¬£¬£¬£¬²¢½ÓÄÉÒþÐδ°ÌåÑÓ³ÙÖ´ÐС¢»¥³âËø¼ì²é×èÖ¹¶àʵÀý¡£¡£¡£¡£´úÂëÆÊÎö·¢Ã÷Òì³£ÔªËØ£ºÇ¶ÈëÐÄÇé·ûºÅ¡¢UnicodeÎı¾¼°Õ¼Î»·ûÖµ£¬£¬£¬£¬£¬ÕâÐ©ÌØÕ÷ÓëÌìÉúʽAIÌìÉúµÄ´úÂëģʽÏà·û¡£¡£¡£¡£
https://securityaffairs.com/189033/apt/iran-nexus-apt-dust-specter-targets-iraq-officials-with-new-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ