Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2025-11-12

1. Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷


11ÔÂ10ÈÕ£¬¿ËÈÕ£¬Ò»¼ÒΪҽÉúÌṩ¼Æ·Ñ·þÎñµÄÒ½ÁÆÊÖÒÕ¹«Ë¾Doctor AllianceÔâÓöÍøÂç·¸·¨·Ö×ÓÀÕË÷¹¥»÷¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳ÉÏÐû³Æ£¬ÒÑÇÔÈ¡¸Ã¹«Ë¾Áè¼Ý120ÍòÌõÃô¸ÐÒ½ÁƼͼ£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÕâЩÊý¾Ý¡£±»µÁÊý¾Ýº­¸ÇÕï¶ÏЧ¹û¡¢Ìå¼ì×ܽᡢ´¦·½¡¢ÖÎÁƼƻ®¡¢Ò½ÔºÒ½ÖöµÈ½¹µãÒ½ÁÆÐÅÏ¢£¬Í¬Ê±°üÀ¨»¼ÕßÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢¿µ½¡°ü¹ÜË÷Åâ¼Í¼¡¢Ò½ÉúÐÕÃûµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£Çå¾²Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄ200MBÊý¾ÝÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬ÆäÖгäÂú×Å´ó×ÚÎÞ·¨»Ö¸´µÄÒ½ÁƺÍÉúÎïʶ±ðÊý¾Ý¡£´ËÀàÊý¾Ýй¶½«´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓû¼ÕßÉí·ÝÐÅÏ¢¾ÙÐÐÒ½ÁÆÉí·Ý͵ÇÔ£¬Ã°³äÊܺ¦Õß»ñÈ¡´¦·½Ò©»òÒ½ÁÆ·þÎñ£¬ÉõÖÁͨ¹ýÉç½»¹¤³Ì¹¥»÷Ò½ÉúºÍ»¼Õߣ»ÈôÉæ¼°»¼Õß²¡Ê·£¬»¹¿ÉÄÜÒý·¢Ú²Æ­ÀÕË÷¡£ÓëÃÜÂë»òÐÅÓÿ¨²î±ð£¬Ò½ÁƼͼһµ©Ð¹Â¶ÎÞ·¨Í¨¹ý¸ü¸Ä»Ö¸´£¬µ¼ÖÂΣº¦ºã¾Ã±£´æ¡£


https://cybernews.com/security/doctor-alliance-breach-allegedly-exposes-patients-health-data/


2. Triofox¸ßΣÎó²î±»Ê¹ÓÃʵÏÖÈ«Á´¹¥»÷ÓëȨÏÞÌáÉý


11ÔÂ11ÈÕ£¬¹È¸èMandiantÍŶÓÅû¶£¬Triofoxƽ̨±£´æÑÏÖØÎó²îCVE-2025-12480£¨CVSSÆÀ·Ö9.1£©£¬¹¥»÷Õßͨ¹ý¸ÃÎó²îÈÆ¹ýÉí·ÝÑéÖ¤£¬Ê¹Ó÷À²¡¶¾¹¦Ð§ÉÏ´«²¢Ö´ÐÐÔ¶³Ì»á¼û¹¤¾ß¡£Mandiant×·×Ù·¢Ã÷£¬Íþв¼¯ÈºUNC6485ÔçÔÚ2025Äê8ÔÂ24ÈÕ±ãʹÓôËÎó²î£¬ÍŽá·À²¡¶¾¹¦Ð§ÊµÏÖ´úÂëÖ´ÐУ¬Ðγɡ°Éí·ÝÈÆ¹ý-ÕË»§½¨Éè-¾ç±¾Ö´ÐÐ-ȨÏÞÌáÉý¡±µÄÍêÕû¹¥»÷Á´¡£ÊÖÒÕϸ½ÚÏÔʾ£¬¹¥»÷Õßͨ¹ýαÔìHTTPÖ÷»úͷΪ¡°localhost¡±£¬ÈƹýTriofox¶ÔAdminAccount.aspxµÈÖÎÀíÒ³ÃæµÄ»á¼û¿ØÖÆ£¬Ê¹ÓÃGladPageUILib.dllÖÐCanRunCriticalPage()º¯ÊýµÄÂß¼­È±ÏÝ£¬ÔÚ×°ÖÃÀú³ÌÖн¨Éè¡°¼¯ÈºÖÎÀíÔ±¡±ÕË»§¡£Ëæºó£¬Í¨¹ý·À²¡¶¾¹¦Ð§ÉÏ´«¶ñÒâÅú´¦Öóͷ£Îļþ£¬¸ÃÎļþÔÚÎļþÉÏ´«ÖÁ¹²ÏíÎļþ¼Ðʱ±»´¥·¢£¬ÒÔSYSTEMȨÏÞÖ´ÐÐPowerShellÏÂÔØÆ÷£¬ÏÂÔØÎ±×°³ÉSAgentInstallerµÄ¶ñÒâ³ÌÐò£¬¾²Ä¬×°ÖÃZoho UEMS£¬²¢°²ÅÅZoho AssistºÍAnyDeskʵÏÖÔ¶³Ì»á¼û¡£¹¥»÷Õß½øÒ»²½Ã¶¾ÙSMB»á»°ºÍÓû§ÕË»§£¬ÊµÑéÐÞ¸ÄÃÜÂë²¢ÌáÉýȨÏÞÖÁÍâµØ/ÓòÖÎÀíÔ±£¬Í¬Ê±Í¨¹ý¶Ë¿Ú443½¨ÉèSSH·´ÏòËíµÀ£¬½«ÍâµØRDP·þÎñת·¢ÖÁ¹¥»÷Õß¿ØÖÆÖ÷»ú£¬Ðγɳ¤ÆÚ»¯»á¼ûͨµÀ¡£MandiantÇ¿µ÷£¬Ö»¹ÜÐÞ¸´°æ±¾16.7.10368.56560ÒÑÐû²¼£¬µ«½¨ÒéÓû§Éý¼¶ÖÁ×îа汾£¬²¢ÉóºËÖÎÀíÔ±ÕË»§ÒÔ¼ì²âÒì³£½¨Éè¡£


https://securityaffairs.com/184439/hacking/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html


3. ClickFixÍøÂç´¹ÂÚ¹¥»÷ʹÓÃPureRATÃé×¼ÂùÝϵͳ


11ÔÂ10ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬Ò»³¡Õë¶ÔÂùÝÒµµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷Ô˶¯×Ô2025Äê4ÔÂÒ»Á¬ÖÁ10Ô³õ£¬ÓÉ·¨¹úÇå¾²¹«Ë¾SekoiaÉî¶ÈÆÊÎö¡£¹¥»÷Õßͨ¹ýÈëÇÖÕýµ±ÓÊÏäÕË»§£¬ÏòÂùÝ˾ÌêÍ·ËÍ·ÂðBooking.comµÄ´¹ÂÚÓʼþ£¬ÓÕµ¼Æäµã»÷αװ³ÉreCAPTCHAÑéÖ¤µÄClickFixÉç½»¹¤³ÌÒ³Ãæ¡£¸ÃÒ³Ãæ½ÓÄÉÖØ´óÖØ¶¨Ïò»úÖÆ£¬×îÖÕ´¥·¢¶ñÒâPowerShellÏÂÁÏÂÔØº¬DLLÅÔ¼ÓÔØÊÖÒÕµÄZIPѹËõ°ü£¬¼¤»îÄ£¿é»¯Ä¾ÂíPureRAT¡£PureRAT¾ß±¸È«·½Î»¼à¿Ø¹¦Ð§£¬°üÀ¨¼üÅ̼ͼ¡¢Ô¶³Ì¿ØÖÆ¡¢ÉãÏñÍ·²¶»ñ¼°ÎļþÇÔÈ¡£¬²¢Í¨¹ý.NET Reactor»ìÏý±£»¤£¬Ê¹ÓÃ×¢²á±íʵÏÖ³¤ÆÚ»¯×¤Áô¡£¹¥»÷µ½Êֺ󣬷¸·¨·Ö×Ó½øÒ»²½Ê¹ÓÃÇÔÈ¡µÄÂùÝÔ¤¶©Æ½Ì¨ÕË»§£¬Í¨¹ýWhatsApp»òÓʼþÁªÏµÕæÊµ¿Í»§£¬ÒÔ¡°È·ÈÏÔ¤¶©ÐÅÏ¢¡±ÎªÃûÓÕµ¼Æä½øÈë·ÂðµÄBooking.com»òExpediaÒ³Ãæ£¬ÇÔÈ¡ÒøÐп¨ÐÅÏ¢¡£ÊӲ췢Ã÷£¬·¸·¨ÍÅ»ï´ÓLolzTeamµÈºÚ¿ÍÂÛ̳¹ºÖÃBooking.comÖÎÀíÔ±ÕË»§ÐÅÏ¢£¬ÉõÖÁ°´ÀûÈó·Ö³ÉÕÐļ·ÖÏúר¼Ò¡£SekoiaÊӲ쵽רѧÉúÒâÔ¤¶©Æ½Ì¨ÈÕÖ¾µÄTelegram»úеÈ˼°ÌṩÈ˹¤ÑéºÅ·þÎñµÄºÚ²ú¹©Ó¦Á´¡£


https://thehackernews.com/2025/11/large-scale-clickfix-phishing-attacks.html


4. Maverick¶ñÒâÈí¼þÐ®ÖÆä¯ÀÀÆ÷»á»°£¬Ãé×¼°ÍÎ÷×î´óÒøÐÐ


11ÔÂ11ÈÕ£¬Çå¾²Ñо¿Ô±·¢Ã÷£¬Á½¿îÕë¶Ô°ÍÎ÷ÒøÐÐÓû§µÄ.NET¶ñÒâÈí¼þCoyoteÓëMaverick±£´æÏÔÖø¹ØÁªÐÔ¡£CyberProof±¨¸æÏÔʾ£¬¶þÕß¾ù¾ß±¸ÒøÐÐURL¶¨Ïò¡¢Ó¦ÓÃ¼à¿Ø¼°WhatsAppÍøÒ³°æÈö²¥ÄÜÁ¦¡£MaverickÓÉÇ÷ÊÆ¿Æ¼¼Ê״μͼµÄ"Ë®ÈøÎ÷"£¨Water Saci£©¹¥»÷Ô˶¯ÍƳö£¬°üÀ¨×ÔÈö²¥×é¼þSORVEPOTEL£¬Í¨¹ýWhatsApp×ÀÃæ°æÀ©É¢º¬¶ñÒâZIP°ü¡£¸ÃľÂí¼à¿Øä¯ÀÀÆ÷±êǩҳ£¬Ê¶±ðÀ­¶¡ÃÀÖÞ½ðÈÚ»ú¹¹URLºóÅþÁ¬Ô¶³Ì·þÎñÆ÷£¬ÍÆËÍ´¹ÂÚÒ³ÃæÇÔȡƾ֤¡£SophosÆÊÎöÖ¸³ö£¬Maverick¿ÉÄÜÊÇCoyoteµÄÉý¼¶°æ£¬¿¨°Í˹»ùÔò·¢Ã÷¶þÕß±£´æ´ó×Ú´úÂëÖØµþ£¬µ«½«ÆäÊÓΪ°ÍÎ÷ÐÂÍþв¡£CyberProof×îÐÂÊÓ²ìÕ¹ÏÖ£¬ZIPÎļþÖеÄLNKÎļþÆô¶¯ºó»áÅþÁ¬Íⲿ·þÎñÆ÷ÏÂÔØÓÐÓÃÔØºÉ£¬½ûÓÃ΢ÈíDefenderºÍUAC£¬¼ÓÔØ¾ß±¸·´ÆÊÎöÊÖÒÕµÄ.NET¼ÓÔØÆ÷£¬×îÖÕ°²ÅÅSORVEPOTELºÍMaverick¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Maverick½öÔÚÈ·ÈÏÊܺ¦ÕßλÓÚ°ÍÎ÷ºó×°Öã¬ÇÒ¹¥»÷Ä¿µÄÒÑÀ©Õ¹ÖÁ°ÍÎ÷ÂùÝ¡£


https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html


5. RhadamanthysÐÅÏ¢ÇÔÈ¡Ðж¯ÔâÖ´·¨ÖÐÖ¹


11ÔÂ11ÈÕ£¬¿ËÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±g0njxaºÍGi7w0rm¼à²âµ½£¬ÃûΪRhadamanthysµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Ðж¯ÒÑÔâÖÐÖ¹£¬Æä"¿Í»§"ÆÕ±é±¨¸æÎÞ·¨»á¼û·þÎñÆ÷¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶©ÔÄģʽÔËÓª£¬ÍøÂç·¸·¨·Ö×ÓÐèÿÔÂÏò¿ª·¢ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡Èí¼þ¡¢ÊÖÒÕÖ§³Ö¼°ÓÃÓÚÍøÂç±»µÁÊý¾ÝµÄÍøÂçÃæ°å»á¼ûȨÏÞ¡£ÆäÈö²¥Í¾¾¶°üÀ¨Î±×°³ÉÈí¼þÆÆ½â³ÌÐò¡¢YouTubeÊÓÆµ»ò¶ñÒâËÑË÷¹ã¸æ£¬Ö÷ÒªÇÔÈ¡ä¯ÀÀÆ÷¡¢µç×ÓÓʼþ¿Í»§¶ËµÈÓ¦ÓóÌÐòµÄƾ֤ºÍÉí·ÝÑéÖ¤cookie¡£¾ÝºÚ¿ÍÂÛ̳Óû§·´Ï죬²¿·Ö¿Í»§·¢Ã÷RhadamanthysÍøÂçÃæ°åµÄSSH»á¼ûȨÏÞ±»¸ÄΪ֤ÊéµÇ¼ģʽ£¬ÐèÖØÐÂ×°Ö÷þÎñÆ÷²¢É¨³ýºÛ¼££¬µÂ¹ú¾¯·½ÒѽéÈëÊӲ졣¿ª·¢ÕßÍÆ²âµÂ¹úÖ´·¨²¿·ÖΪĻºóºÚÊÖ£¬ÒòÍøÂçÃæ°åÔÚÖÐÖ¹Ç°ÔøÓе¹úIPµØµãµÇ¼¼Í¼¡£Í¬Ê±£¬¸ÃÐж¯µÄTorÑó´ÐÍøÕ¾Ò²ÒÑÀëÏߣ¬µ«Î´ÏÔʾ¾¯·½²é·âºá·ù£¬ÏêϸĻºóʹÓÃÕßÈÔ´ýÈ·ÈÏ¡£´Ë´ÎÖÐÖ¹¿ÉÄÜÓë"ÖÕ¾ÖÐж¯"£¨Operation Endgame£©ÓйØ¡£¸ÃÖ´·¨Ðж¯×ÔÆô¶¯ÒÔÀ´£¬ÒѶԶà¸ö¶ñÒâÈí¼þ»ù´¡ÉèÊ©Ôì³ÉÆÆËð¡£


https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/


6. Ó¢¹ú¹úÃñÒ½ÁÆ·þÎñϵͳNHS UKÔâClopÀÕË÷¹¥»÷


11ÔÂ11ÈÕ£¬ÀÕË÷Èí¼þ×éÖ¯ClopÔÚÆä°µÍøÍøÕ¾Ðû³Æ¶ÔÓ¢¹ú¹ú¼ÒÒ½ÁÆ·þÎñϵͳ£¨NHS UK£©Êý¾Ýй¶ÈÏÕæ£¬Ö¸ÔðÆä¡°Ä®ÊÓ¿Í»§Çå¾²¡±¡£¸Ã×é֯ʹÓÃOracle E-Business Suite£¨EBS£©ÖеÄCVE-2025-61882Îó²î£¨CVSSÆÀ·Ö9.8£©ÊµÑé¹¥»÷£¬¸ÃÎó²îÓÚ2025Äê10ÔÂ4ÈÕÓÉOracleÐû²¼½ôÆÈ²¹¶¡ÐÞ¸´£¬µ«Ê¹ÓÃÐÐΪÔçÓÚ²¹¶¡Ðû²¼£¬×Ô2025Äê8ÔÂÆð£¬¹¥»÷Õß±ãÕë¶ÔEBS 12.2.3ÖÁ12.2.14°æ±¾ÖеÄBI PublisherÄ£¿éÌᳫ¹¥»÷£¬Í¨¹ýδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì»á¼ûÇÔÈ¡Êý¾Ý¡£Îó²îÈö²¥Òò2025Äê10ÔÂ3ÈÕScattered Lapsus$ Huntersй¶¿´·¨ÑéÖ¤´úÂë¶ø¼ÓËÙ£¬´ÙʹCl0p¡¢FIN11µÈÍþвÐÐΪÕßÀ©´ó¹¥»÷¹æÄ£¡£½¨ÒéÊÜÓ°Ïì×éÖ¯Á¬Ã¦×°ÖÃ2025Äê10Ô²¹¶¡£¬×·ËÝÖÁ8ÔµÄȡ֤Éó²é£¬²¢¼à¿Ø¿ÉÒÉIP¡£´Ë´Î¹¥»÷²¨¼°¹þ·ð´óѧ¡¢ÃÀ¹úº½¿Õ×Ó¹«Ë¾EnvoyµÈ»ú¹¹£¬Ä¿µÄÖ±Ö¸ÒÀÀµEBS¾ÙÐвÆÎñ¡¢ÈËÁ¦×ÊÔ´¼°¹©Ó¦Á´ÖÎÀíµÄÆóÒµ¡£


https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/