GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷

Ðû²¼Ê±¼ä 2025-11-13

1. GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷


11ÔÂ11ÈÕ£¬ÈÕÁ¢ÆìÏÂÊý×Ö¹¤³Ì·þÎñÉÌGlobalLogic¿ËÈÕÅû¶£¬ÆäOracle E-Business Suite£¨EBS£©Æ½Ì¨ÒòÁãÈÕÎó²îCVE-2025-61882ÔâÓöÊý¾Ýй¶£¬Ó°Ïì10,471ÃûÏÖÈμ°Ç°ÈÎÔ±¹¤¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚ¼ÓÖÝÊ¥¿ËÀ­À­£¬ÓªÒµÁýÕÖÈ«Çò59¸ö¹¤³ÌÖÐÐÄ¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎ¥¹æÍ¨Öª£¬¹¥»÷Õß×îÔçÓÚ2025Äê7ÔÂ10ÈÕÔ˶¯£¬8ÔÂ20ÈÕÍê³ÉÊý¾ÝÇÔÈ¡£¬10ÔÂ9ÈÕ»á¼ûÊý¾Ý¿âʵÑé͵ÇÔ£¬Éæ¼°ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢½ôÆÈÁªÏµÈË¡¢µç×ÓÓÊÏä¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢»¤ÕÕ/Éí·ÝÖ¤ºÅ¡¢ÈËΪ¼°ÒøÐÐÕË»§µÈÃô¸ÐÄÚÈÝ¡£GlobalLogicÇ¿µ÷£¬´Ë´ÎÊÂÎñ½ö²¨¼°Oracleƽ̨£¬Î´Ó°ÏìÆäËûϵͳ£¬²¢Ö¸³öÆäÊÇÖÚ¶àÊÜOracleÎó²îÓ°ÏìµÄ¿Í»§Ö®Ò»¡£Ö»¹ÜδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬µ«ÊÂÎñϸ½ÚÓëClopÀÕË÷Èí¼þÍÅ»ï×Ô8ÔÂÒÔÀ´µÄ¹¥»÷ģʽ¸ß¶ÈÎǺϡª¡ª¸Ã×é֯ʹÓÃͳһÎó²î´Ó¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÇÔÈ¡Êý¾Ý£¬²¢Í¨¹ýTorÐ¹Â¶ÍøÕ¾Ðû²¼Êܺ¦ÕßÐÅÏ¢¡£ÏÖÔÚ£¬GlobalLogicδ·ºÆðÔÚClopµÄй¶Ãûµ¥ÖУ¬¿ÉÄÜ´¦ÓÚ̸ÅлòÒÑÖ§¸¶Êê½ð½×¶Î¡£


https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/


2. ºº±¤Î¢Ëõ¾°¹Û¹ÝÔâÓöÍøÂç¹¥»÷£¬ÐÅÓÿ¨Êý¾ÝÔâй¶


11ÔÂ11ÈÕ£¬ºº±¤Î¢Ëõ¾°¹Û¹ÝÊǵ¹ú±±²¿ÈÈÃÅÂÃÓÎʤµØ¼°È«Çò×î´óÌúµÀÄ£×ÓÕ¹Çø£¬¿ËÈÕÏòÓοÍת´ïÒ»ÆðÑÏÖØÊý¾ÝÇå¾²ÊÂÎñ¡£¾­ÊӲ죬6ÔÂ6ÈÕÖÁ10ÔÂ29ÈÕʱ´ú£¬Í¨¹ýÏßÉÏÇþµÀʹÓÃÐÅÓÿ¨¹ºÆ±µÄÓοÍÐÅÏ¢¿ÉÄܱ»Î´ÊÚȨµÚÈý·½»ñÈ¡£¬Éæ¼°³Ö¿¨ÈËÐÕÃû¡¢¿¨ºÅ¡¢ÑéÖ¤Âë¼°ÓÐÓÃÆÚµÈÃô¸ÐÊý¾Ý£¬Ó°Ïì¹æÄ£Ô¤¼Æ´ïÊýǧÖÁÊýÊ®ÍòÈË¡£¸Ã³¡¹ÝÔÚÓʼþÖÐÃ÷È·£¬ÏßÉϹºÆ±Ò³Ãæ±£´æÇå¾²Îó²î£¬µ¼ÖÂÐÅÓÿ¨Êý¾Ý²»µ«´«ÊäÖÁÖ§¸¶·þÎñÉÌ£¬»¹Á÷ÏòÁËÁíһ̨×ÔÁ¦·þÎñÆ÷£¬Ð¹Â¶Ê±³¤¿¿½üÎå¸öÔ¡£×÷ΪÄê½Ó´ý³¬150ÍòÈ˴εÄÈÈÞ°µã£¬Ö»¹Ü²¢·ÇËùÓÐÓο;ùͨ¹ýÏßÉϹºÆ±£¬µ«´Ë´ÎÊÂÎñÈÔ¿ÉÄÜÒý·¢´ó¹æÄ£¹¤ÒµËðʧ»òÉí·ÝðÓÃΣº¦¡£³¡¹Ý·½ÃæÌåÏÖ£¬ÊÂÎñ·¢Ã÷ºóÒÑÁ¬Ã¦¸ôÀëÊÜÓ°Ïì·þÎñÆ÷£¬µ«Ïêϸй¶¹æÄ£¼°¹¥»÷ÕßÉí·ÝÈÔ´ý½øÒ»³ÌÐò²é¡£³¡¹ÝÔÚ֪ͨÖÐÇ¿µ÷£¬ÎÞ·¨Íêȫɨ³ýÊý¾Ý±»ÀÄÓõĿÉÄÜÐÔ£¬½¨ÒéÊÜÓ°ÏìÓοÍÇ×½ü¹Ø×¢ÐÅÓÿ¨ÉúÒâ¼Í¼£¬ÊµÊ±ÁªÏµÒøÐж³½áÕË»§»òÌæ»»¿¨Æ¬¡£


https://cybernews.com/security/miniatur-wunderland-museum-cyberattack/


3. SIAD GroupÔâEverest GroupÀÕË÷¹¥»÷


11ÔÂ11ÈÕ£¬¶íÂÞ˹¹ØÁªµÄÀÕË÷Èí¼þÍÅ»ïEverest Group¿ËÈÕÔÚ°µÍøÐ¹Â¶Õ¾µãÐû³Æ£¬ÒÑ´ÓÒâ´óÀû×î´ó¹¤ÒµÆøÌåÉú²úÉÌÖ®Ò»SIAD GroupÇÔÈ¡159GBÊý¾Ý£¬²¢Æô¶¯8Ììµ¹¼ÆÊ±Íþв¹ûÕæÐ¹Â¶¡£SIAD Group½¨ÉèÓÚ1927Ä꣬×ܲ¿Î»ÓÚ±´¼ÓĪ£¬2024ÄêÓªÒµ¶î³¬11ÒÚÅ·Ôª£¬ÓªÒµº­¸ÇʳÎï¡¢Ò½ÁÆ¡¢Æû³µ¡¢Ò±½ðµÈÐÐÒµµÄ¹¤ÒµÆøÌåÉú²úÓë·ÖÏú£¬Í¬Ê±Éæ¼°Òº»¯Ê¯ÓÍÆø¡¢×ÔÈ»Æø¹©Ó¦¡¢ÆøÌå´¦Öóͷ£×°±¸Ñз¢¼°Ò½ÁƱ£½¡·þÎñ¡£¸ÃÍÅ»ïÒªÇóSIAD GroupÔÚµ¹¼ÆÊ±¿¢ÊÂǰÁªÏµÖ§¸¶Êê½ð£¬²»È»½«¹ûÕæ±»µÁÊý¾Ý¡£ÏÖÔÚ£¬°µÍøÕ¾µãÉÐδÐû²¼Êý¾ÝÑù±¾£¬ÏêϸÊÜÓ°Ïìϵͳ¼°Êý¾ÝÄÚÈÝÈÔ²»Ã÷È·¡£Ñо¿Ö°Ô±Ö¸³ö£¬ÈôÎ÷Ñǵ¼¯ÍÅÉú²úÔËÓªÒò¹¥»÷ÖÐÖ¹£¬¿ÉÄÜÓ°ÏìÅ·ÃËÖÆÔìÒµ¡¢Ò½ÁƺÍÄÜÔ´ÐÐÒµµÄºÄ²Ä¹©Ó¦£¬Òý·¢Á¬Ëø·´Ó¦¡£Everest Group×Ô2021Äê7Ô»îÔ¾ÒÔÀ´£¬ÒÑ·¢¶¯¶àÆðÆÆËðÐÔ¹¥»÷¡£´Ë´ÎÕë¶ÔSIAD GroupµÄ¹¥»÷£¬ÊǸÃÍÅ»ïÒ»Á¬Õë¶ÔÒªº¦»ù´¡ÉèÊ©ºÍ´óÐÍÆóÒµµÄ×îа¸Àý¡£


https://cybernews.com/security/siad-group-ransomware-attack/


4. DanaBot¶ñÒâÈí¼þа汾669½ÓÄÉTorÓòÃûÖØÐÞC2»ù´¡ÉèÊ©


11ÔÂ12ÈÕ£¬ÔÚÖ´·¨²¿·Ö5ÔÂÌᳫ¡°ÖÕ¾ÖÐж¯¡±ÆÆËðDanaBot¶ñÒâÈí¼þ»ù´¡ÉèÊ©Áù¸öԺ󣬸ÃÒøÐÐľÂíÒÔа汾669Ç¿ÊÆ»Ø¹é£¬²¢ÖØÐÞÁËÏÂÁîÓë¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¾ÝZscaler ThreatLabzÇå¾²Ñо¿Ö°Ô±Åû¶£¬DanaBotбäÖÖʹÓÃTorÓòÃû£¨.onion£©ºÍ¡°·´ÏòÅþÁ¬¡±½Úµã¹¹½¨Òþ²ØÍ¨Ñ¶ÍøÂ磬ͬʱʶ±ð³öÍþвÐÐΪÕßÓÃÓÚÎüÊÕ±»µÁ×ʽðµÄBTC¡¢ETH¡¢LTC¡¢TRXµÈ¶à¸ö¼ÓÃÜÇ®±ÒµØµã¡£DanaBot×î³õÓÉProofpointÑо¿Ö°Ô±Åû¶£¬ÊÇÒ»ÖÖ»ùÓÚDelphiµÄÒøÐÐľÂí£¬Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¹ã¸æÈö²¥£¬½ÓÄɶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Ä£Ê½ÔËÓª£¬ÒÔ¶©ÔÄ·ÑÐÎʽ³ö×â¸øÍøÂç·¸·¨·Ö×Ó¡£ÔÚ¶àÄêÑݱäÖУ¬¸Ã¶ñÒâÈí¼þÒÑÉú³¤ÎªÄ£¿é»¯ÐÅÏ¢ÇÔÈ¡Æ÷ºÍ¼ÓÔØÆ÷£¬×¨ÃÅÇÔÈ¡ÍøÂçä¯ÀÀÆ÷´æ´¢µÄƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬²¢Ôø¶à´Î¼ÓÈë´ó¹æÄ£¹¥»÷Ô˶¯£¬×Ô2021ÄêÆðÒ»Á¬¶Ô»¥ÁªÍøÓû§×é³ÉÍþв¡£


https://www.bleepingcomputer.com/news/security/danabot-malware-is-back-to-infecting-windows-after-6-month-break/


5. ºÚ¿ÍʹÓÃCitrixºÍCisco ISEµÄÎó²îÌᳫÁãÈÕ¹¥»÷


11ÔÂ12ÈÕ£¬ÑÇÂíÑ·ÍþвÇ鱨ÍŶÓ̫ͨ¹ýÎö"MadPot"ÃÛ¹ÞÊý¾Ý·¢Ã÷£¬¸ß¼¶ÍþвÐÐΪÕßÔÚCitrix Bleed 2£¨CVE-2025-5777£©ºÍCisco ISE£¨CVE-2025-20337£©Îó²î¹ûÕæÅû¶ǰÒѽ«Æä×÷ΪÁãÈÕÎó²îʹÓá£ÕâÁ½¸öÑÏÖØÎó²î»®·Ö±£´æÓÚNetScaler ADC/GatewayµÄÔ½½çÄÚ´æ¶ÁÈ¡»úÖÆºÍCisco ISEµÄ·´ÐòÁл¯Âß¼­ÖУ¬Ç°ÕßÓÚ6ÔÂÏÂÑ®Ðû²¼ÐÞ¸´³ÌÐò£¬µ«Îó²îʹÓóÌÐò7Ô³õ¼´·ºÆð²¢±»CISA±ê¼ÇΪÒÑʹÓ㻺óÕß7ÔÂ17ÈÕÐû²¼ºó½öÎåÌì¼´±»Ö¤ÊµÔâÆð¾¢Ê¹Ó᣹¥»÷ÕßʹÓÃCVE-2025-20337»ñÈ¡Cisco ISEÔ¤ÈÏÖ¤ÖÎÀíԱȨÏÞ£¬°²ÅÅÃûΪ"IdentityAuditAction"µÄ×Ô½ç˵Web Shell¡£¸Ã¶ñÒâ×é¼þαװ³ÉÕýµ±ISE×é¼þ£¬×¢²áΪHTTP¼àÌýÆ÷×èµ²ËùÓÐÇëÇó£¬Í¨¹ýJava·´Éä×¢ÈëTomcatỊ̈߳¬²¢½ÓÄÉDES¼ÓÃܺͷDZê×¼base64±àÂëÔöÇ¿Òþ²ØÐÔ£¬ÐèÌØ¶¨HTTP±êÍ·²Å»ª»á¼ûÇÒÏÕЩÎÞȡ֤ºÛ¼£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/


6. Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝÓû§Êý¾Ýй¶


11ÔÂ12ÈÕ£¬Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝFrancis FrithÒòÒ»¸ö±»ÒÅÆúµÄElasticsearchÊý¾Ý¿â̻¶Áè¼Ý30ÍòÌõÓû§¼Í¼£¬¸ÃÊý¾Ý¿âÎÞÐèÈÏÖ¤¼´¿É»á¼û£¬ÓÉCybernewsÑо¿Ö°Ô±·¢Ã÷¡£½¨ÉèÓÚ1860ÄêµÄFrancis Frith¹«Ë¾×øÂäÓÚË÷¶û×Ȳ®ÀÒÔÊÕ²Ø1860ÖÁ1970Äê¼äÓ¢¹ú³ÇÕòÐæÂäÀúÊ·ÕÕÆ¬ÖøÃû£¬Ö÷ÒªÏúÊÛ³åÓ¡ÕÕÆ¬¡¢Êé¼®¼°¸öÐÔ»¯Ó°ÏñÖÆÆ·¡£Ñо¿Ö°Ô±Í¨¹ýй¶ÐÅÏ¢ÖÐÌá¼°µÄÓ¢¹úÒŲúÍøÕ¾francisfrith.comËø¶¨Ãü¾ÝÔ´£¬È·ÈÏÊôÓÚÈÏÕæ¸Ã¹«Ë¾²úÆ·ÖÆÔìµÄHeritage Resource Management Ltd¿Í»§¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨Óû§È«Ãû¡¢ÓÊÏ䵨µã¼°²¿·ÖʵÌåסַ£¬Éæ¼°½ü4.4ÍòÌõ¿Í»§×Éѯ¼Í¼£¬Ê±¼ä¿ç¶È´Ó2006ÄêÖÁ½ü¶þÊ®Äê¡£Ö»¹ÜÎ´Éæ¼°½ðÈÚÕË»§»òÃÜÂ룬µ«Ð¹Â¶Êý¾ÝÈÔ×é³ÉÖØ´óÒþ˽Íþв£¬ÓÈÆä¶ÔÔÚ˽ÐÅÖÐ͸¶¼ÒͥסַµÄÓû§Ó°ÏìÓúÉõ¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±ÖÒÑÔ£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅϢð³äFrancis FrithÆ·ÅÆÊµÑé¾«×¼ÍøÂç´¹ÂÚ¡£


https://cybernews.com/security/francis-frith-data-leak-2025/