ºÚ¿ÍʹÓÃ˼¿ÆSNMPÎó²îÔÚ½»Á÷»úÉϰ²ÅÅrootkit
Ðû²¼Ê±¼ä 2025-10-201. ºÚ¿ÍʹÓÃ˼¿ÆSNMPÎó²îÔÚ½»Á÷»úÉϰ²ÅÅrootkit
10ÔÂ16ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼Åû¶£¬ÍþвÐÐΪÕßÕýʹÓÃ˼¿ÆIOS/IOS XEϵͳÖÐÒÑÐÞ²¹µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2025-20352£¬Õë¶Ô9400¡¢9300¼°¹Å°å3750GϵÁÐδ°²ÅŶ˵ã¼ì²âÏìÓ¦½â¾ö¼Æ»®µÄ×°±¸Ìᳫ¹¥»÷¡£¸ÃÎó²îÉæ¼°SNMPÐÒ飬¹¥»÷Õßͨ¹ý»ñÈ¡rootȨÏÞ¿ÉʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬Ë¼¿ÆÒÑÔÚ10ÔÂ6ÈÕ¸üÐÂͨ¸æÖн«Æä±ê¼ÇΪÁãÈÕÎó²î²¢È·Èϱ£´æÀÖ³ÉʹÓð¸Àý¡£¹¥»÷±»×·×ÙΪ"Operation Zero Disco"£¬ÒòÖ²Èë¶ñÒâÈí¼þʱÉèÖÃÁ˰üÀ¨"disco"µÄͨÓûá¼ûÃÜÂë¡£Ñо¿ÏÔʾ£¬¹¥»÷Õß²»µ«Ê¹ÓÃÐÂÎó²î£¬»¹ÊµÑ鸴ÓÃÆßÄêǰ¾ÉÎó²îCVE-2017-3881À©´ó¹¥»÷Ãæ¡£ÀÖ³ÉÉøÍ¸ºó£¬¹¥»÷ÕßÔÚÄ¿µÄϵͳ°²Åž߱¸³¤ÆÚ»¯ÄÜÁ¦µÄLinux Rootkit£¬¸Ã¹¤¾ß°ü¼¯³ÉUDP¿ØÖÆÆ÷£¬¿ÉʵÏֶ˿ڼàÌý¡¢ÈÕÖ¾¸Ä¶¯¡¢ÈƹýAAAÈÏÖ¤ºÍVTY»á¼û¿ØÖÆÁÐ±í¡¢¶¯Ì¬ÐÞ¸ÄͨÓÃÃÜÂë¡¢Òþ²ØÉèÖÃÏî¼°ÖØÖÃʱ¼ä´ÁµÈ²Ù×÷¡£Ñо¿Ö°Ô±Ç¿µ÷£¬Ä¿½ñȱ·¦¿É¿¿¹¤¾ß±ê¼ÇÊÜѬȾװ±¸£¬½¨ÒéÏÓÒÉÔâÈëÇÖµÄ×éÖ¯Ö´Ðгõ¼¶¹Ì¼þ¼°ROMÇøÓòÉî¶ÈÊӲ졣
https://www.bleepingcomputer.com/news/security/hackers-exploit-cisco-snmp-flaw-to-deploy-rootkit-on-switches/
2. µÃ¿ËÈøË¹ÖݵçÁ¦ÏàÖúÉçÔâ¡°÷è÷롱ÀÕË÷Èí¼þ¹¥»÷
10ÔÂ14ÈÕ£¬ÍøÂç·¸·¨ÍŻ÷è÷롱£¨Qilin£©ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇֵÿËÈøË¹ÖÝÁ½¼ÒµçÁ¦·ÖÏúÏàÖúÉ磬ʥ²®ÄɵµçÁ¦ÏàÖúÉçÓ뿨¶÷˹µçÁ¦ÏàÖúÉ磬²¢Ð¹Â¶Ãô¸Ð²ÆÎñÎļþ¡£Ê¥²®ÄɵÂÏàÖúÉçÓµÓÐ3900Ó¢ÀïÅäµçÏß·£¬·þÎñ8ÏØÔ¼2.8Íò»§¼ÒÍ¥£¬ÄêÊÕÈë9250ÍòÃÀÔª£»¿¨¶÷˹ÏàÖúÉçÔËÓª½ü5000Ó¢ÀïÏß·£¬ÁýÕÖ12ÏØ2.3Íò»§¼ÒÍ¥£¬ÄêÊÕÈë7580ÍòÃÀÔª¡£Á½¼Ò»ú¹¹¾ùÊôÃÀ¹úÒªº¦»ù´¡ÉèÊ©£¬ÆäÇå¾²Ö±½Ó¹ØÏµ¹ú¼ÒÇå¾²¡£¡°÷è÷롱ÔÚÐ¹Â¶ÍøÕ¾Ðû²¼ÁËÊý¾ÝÑù±¾£¬°üÀ¨Ê¥²®ÄɵµÄÊ×´ÎÊÂÎñ±¨¸æ£¨º¬Ö°Ô±È«Ãû¡¢µç»°¼°ÊÂÎñÏêÇ飩¡¢Äê¶ÈÔ¤Ëã¡¢°ü¹ÜÎļþ¡¢·ÑÂʰ¸Óöȱ¨¸æµÈ£»¿¨¶÷˹·½ÃæÔòй¶Á˶Ê»á³ÉÔ±Ãûµ¥£¨º¬µØµã¡¢ÁªÏµ·½·¨£©¡¢ÊÕÖ§Óà¶î±¨¸æ¡¢×éÖ¯³ÉÔ±Êý¾ÝµÈ¡£Ö»¹ÜÊý¾ÝÕæÊµÐÔÉÐδºËʵ£¬µ«ÈôÊôʵ£¬½«Ì»Â¶ÆóÒµ¶¨¼ÛÕ½ÂÔ¡¢Òý·¢ÐÅÍÐΣ»ú»ò¾ºÕùÁÓÊÆ£¬Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¸ü¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢É§Èż°Éç»á¹¤³Ì¹¥»÷£¬ÓÈÆä¶Ô¶Ê»á³ÉԱΣº¦¼«¸ß¡£
https://cybernews.com/security/texas-electric-coops-ransomware-attack/
3. F5ÅûÂ¶ÖØ´óÇå¾²Îó²î£¬È«Çò³¬26ÍòBIG-IP×°±¸ÃæÁÙΣº¦
10ÔÂ17ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾F5¿ËÈÕÅû¶£¬·ÇÓªÀû×éÖ¯Shadowserver Foundation·¢Ã÷È«ÇòÁè¼Ý26.6Íò¸öF5 BIG-IPʵÀý̻¶ÓÚ»¥ÁªÍø£¬ÆäÖÐÃÀ¹úÕ¼14.2Íò¸ö£¬Å·ÖÞºÍÑÇÖÞ¹²Ô¼10Íò¸ö¡£F5֤ʵÆäÍøÂçÔâ¹ú¼ÒºÚ¿ÍÈëÇÖ£¬ÇÔÈ¡ÁËδ¹ûÕæµÄBIG-IPÇå¾²Îó²îÔ´´úÂë¼°Ïà¹ØÐÅÏ¢£¬µ«Î´·¢Ã÷¹¥»÷ÕßʹÓÃÕâЩÎó²îµÄÖ¤¾Ý¡£ÎªÓ¦¶ÔÍþв£¬F5½ôÆÈÐû²¼²¹¶¡ÐÞ¸´44¸öÎó²î£¨º¬±»ÇÔÈ¡Îó²î£©£¬²¢±Þ²ß¿Í»§¸üÐÂBIG-IP¡¢F5OS¡¢BIG-IP Next for KubernetesµÈϵÁвúÆ·¡£F5 »¹Ò»Ö±ÔÚÓëÆä¿Í»§·ÖÏíÒ»·ÝÍþвÕ÷²ÉÖ¸ÄÏ£¬Éæ¼°BrickstormºóÃųÌÐò¼°UNC5291Íþв×éÖ¯¡£ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Í¬²½Ðû²¼½ôÆÈÖ¸ÁҪÇóÁª°î»ú¹¹ÔÚ10ÔÂ22ÈÕǰΪF5OS¡¢BIG-IP TMOS¡¢BIG-IQºÍBNK/CNF²úÆ·×°ÖÃ×îв¹¶¡£¬²¢½«ÆäËûF5×°±¸µÄ¸üÐÂ×èÖ¹ÈÕÆÚÑÓÉìÖÁ10ÔÂ31ÈÕ¡£CISAÇ¿µ÷£¬»ú¹¹ÐèÅÌ»õËùÓÐF5 BIG-IP×°±¸£¬ÆÀ¹ÀÍøÂçÖÎÀí½Ó¿ÚµÄ»¥ÁªÍøÌ»Â¶ÇéÐΣ¬²¢Í£ÓÃÒÑÖÕÖ¹Ö§³ÖµÄ×°±¸¡£
https://www.bleepingcomputer.com/news/security/over-266-000-f5-big-ip-instances-exposed-to-remote-attacks/
4. Å·ÖÞµ·»Ù¿ç¹ú²»·¨SIM¿¨ºÐÍøÂç£¬ÆÆ»ñ³¬3200Æðڲư¸
10ÔÂ17ÈÕ£¬Å·ÖÞÐ̾¯×é͎֯á¶à¹úÖ´·¨²¿·Ö¿ªÕ¹µÄ"SIMCARTEL"Ðж¯ÖУ¬Àֳɵ·»ÙÒ»¸öÉæ¼°80Óà¹úµÄ²»·¨SIM¿¨ºÐ·þÎñÍøÂç¡£¸Ã·¸·¨×éÖ¯ÔËÓªgogetsms.comºÍapisim.comÁ½¸öÍøÕ¾£¬°²ÅÅ1,200̨SIMºÐ×°±¸¼°40,000ÕÅSIM¿¨£¬ÎªÈ«Çò·¸·¨·Ö×ÓÌṩÐéαµç»°ºÅÂëÒÔ½¨ÉèºÍÑéÖ¤Ú²ÆÐÔÔÚÏßÕË»§£¬ÓÃÓÚʵÑéÍøÂç´¹ÂÚ¡¢Í¶×ÊÕ©Æ¡¢Ã°Ã»Êռ취¡¢ÀÕË÷¼°ÍµÔËÒÆÃñµÈ·¸·¨Ô˶¯¡£¾ÝÅ·ÖÞÐ̾¯×é֯ת´ï£¬¸Ã·þÎñÖ±½Ó¹ØÁª°ÂµØÀû1,700Æð¡¢ÀÍÑάÑÇ1,500Æðڲư¸¼þ£¬ÀÛ¼ÆÔì³É¾¼ÃËðʧ³¬450ÍòÅ·Ôª¡£ÆäÊÖÒռܹ¹Öش󣬿ÉÒþ²ØÓû§ÕæÊµÉí·ÝºÍλÖã¬Öú³¤½¨Éè4,900Íò¸öÐéÎ±ÍøÂçÕË»§£¬Éæ¼°µçÐÅÕ©Æ¡¢WhatsApp"Ö§ÊôÕ©Æ"¡¢ÐéαͶ×ÊÆ½Ì¨Õ©ÆµÈ¶àÖÖ·¸·¨ÐÎ̬¡£10ÔÂ10ÈÕÐж¯ÖУ¬¾¯·½ÔڰµØÀû¡¢°®É³ÄáÑÇ¡¢·ÒÀ¼¡¢ÀÍÑάÑÇËĹúͬ²½¿ªÕ¹26´ÎËѲ飬¾Ð²¶5ÃûÀÍÑάÑǼ®Ö÷·¸¼°2Ãû¹²·¸£¬½É»ñ¼ÛÖµÊý°ÙÍòÅ·ÔªµÄ×ʲú£º°üÀ¨1,200̨SIMºÐ×°±¸¡¢ÊýÊ®ÍòÕÅSIM¿¨¡¢5̨·þÎñÆ÷¡¢¶³½áÒøÐÐÕË»§43.1ÍòÅ·Ôª¼°¼ÓÃÜÇ®±ÒÕË»§33.3ÍòÃÀÔª£¬²¢¿ÛѺ4Á¾ºÀ»ª³µ¡£ÏÖÔÚ£¬±»²é·âµÄ·þÎñÆ÷Õý¾ÙÐÐȡ֤ÆÊÎöÒÔ×·Ëݿͻ§Éí·Ý¡£
https://www.bleepingcomputer.com/news/security/europol-dismantles-sim-box-operation-renting-numbers-for-cybercrime/
5. ÃÀ¹úº½¿Õ×Ó¹«Ë¾Envoy AirÔâClopÀÕË÷ÍŻ﹥»÷
10ÔÂ17ÈÕ£¬ÃÀ¹úº½¿ÕÆìÏÂÇøÓòº½¿Õ¹«Ë¾Envoy Air֤ʵ£¬ÆäOracle E-Business SuiteÓ¦ÓóÌÐòÊý¾ÝÔâClopÀÕË÷ÍÅ»ïй¶¡£Envoy AirÌåÏÖ£¬ÊÓ²ìºóÈ·ÈϽöÉÙÁ¿ÉÌÒµÐÅÏ¢¼°ÁªÏµ·½·¨Íâй£¬ÎÞÃô¸Ð»ò¿Í»§Êý¾ÝÊÜÓ°Ïì¡£¸Ã¹«Ë¾ÒÑÁªÏµÖ´·¨²¿·Ö²¢Õö¿ªÖÜÈ«Éó²é¡£´Ë´ÎÊÂÎñÓëClopÍÅ»ï8ÔÂÆô¶¯µÄÊý¾Ý͵ÇÔÔ˶¯Ïà¹Ø£¬¸ÃÍÅ»ïͨ¹ýµç×ÓÓʼþÏòÊܺ¦ÆóÒµ·¢ËÍÀÕË÷ÒªÇó£¬Éù³ÆÇÔÈ¡ÁËOracle EBSϵͳÖеÄÊý¾Ý¡£OracleÅû¶£¬¹¥»÷ʹÓÃÁ˱àºÅΪCVE-2025-61882ºÍCVE-2025-61884µÄÁãÈÕÎó²î£¬ÆäÖÐCVE-2025-61884ÓÚÉÏÖܱ»ÇÄÇÄÐÞ²¹£¬µ«Î´¹ûÕæÆäÔø±»Æð¾¢Ê¹Óá£CrowdStrikeºÍMandiant֤ʵ£¬ClopÔÚ8Ô³õʹÓÃÕâЩÎó²îÈëÇÖϵͳ²¢°²ÅŶñÒâÈí¼þ¡£×÷Ϊͳһ¹¥»÷Á´µÄÒ»²¿·Ö£¬¹þ·ð´óѧҲÔâClopÀÕË÷£¬¸ÃУ³Æ½ö¡°Ð¡ÐÍÐÐÕþµ¥Î»Ïà¹Ø·½¡±ÊÜÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/american-airlines-subsidiary-envoy-confirms-oracle-data-theft-attack/
6. macOSαÔìÆ½Ì¨¹¥»÷ÏÖÐÂÍþв£ºAMOSÓëOdysseyÇÔÈ¡Èí¼þËÁŰ
10ÔÂ18ÈÕ£¬¿ËÈÕ£¬Õë¶ÔmacOS¿ª·¢Ö°Ô±µÄ¶ñÒâÔ˶¯Ê¹ÓÃαÔìHomebrew¡¢LogMeInºÍTradingViewƽ̨Èö²¥AMOS£¨Atomic macOS Stealer£©¼°OdysseyµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¹¥»÷Õß½ÓÄÉ¡°ClickFix¡±ÊÖÒÕ£¬Í¨¹ýGoogle AdsÍÆ¹ãµÄ85¸öðÃûÓòÃûÓÕÆÓû§¸´ÖÆcurlÏÂÁî×°ÖöñÒâ³ÌÐò¡£ÀýÈ磬TradingViewÐéÎ±ÍøÕ¾ÒÔ¡°Ç徲ȷÈÏ¡±Îª»Ï×Ó£¬ÏÖʵ½«base64±àÂëµÄ×°ÖÃÏÂÁî¸´ÖÆµ½¼ôÌù°å£¬Ö´ÐкóÏÂÔØ²¢½âÂë¡°install.sh¡±Îļþ£¬ÈƹýGatekeeper·À»¤»úÖÆ£¬×îÖÕ¼ÓÔØAMOS»òOdyssey¶ñÒâÈí¼þ¡£ÕâЩ¶ñÒâÈí¼þ¾ß±¸·´ÐéÄâ»ú¼ì²âÄÜÁ¦£¬ÔËÐкóÊ×ÏÈÒÔrootȨÏÞÍøÂçÖ÷»úÓ²¼þ¡¢ÄÚ´æÐÅÏ¢£¬²¢Í¨¹ýʹÓÃϵͳ·þÎñ£¨ÈçÖÕÖ¹OneDriveÊØ»¤Àú³Ì£©¼°ÓëmacOS XPC·þÎñ½»»¥£¬½«¶ñÒâÔ˶¯Î±×°³ÉÕýµ±Àú³Ì¡£×îÖÕ¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ£¬ÇÔÈ¡ä¯ÀÀÆ÷´æ´¢µÄÃô¸ÐÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üƾ֤¡¢Ô¿³×´®ÄÚÈݼ°Ð¡ÎÒ˽¼ÒÎļþ£¬ÒÔZIPÃûÌûش«ÖÁ¹¥»÷Õß¿ØÖƵÄC2·þÎñÆ÷¡£
https://www.bleepingcomputer.com/news/security/google-ads-for-fake-homebrew-logmein-sites-push-infostealers/


¾©¹«Íø°²±¸11010802024551ºÅ