¡°»Æ½ð¹¤³§¡±ÍøÂç·¸·¨ÍÅ»ïÕë¶Ô¶«ÄÏÑÇÌᳫ¹¥»÷
Ðû²¼Ê±¼ä 2025-12-081. ¡°»Æ½ð¹¤³§¡±ÍøÂç·¸·¨ÍÅ»ïÕë¶Ô¶«ÄÏÑÇÌᳫ¹¥»÷
12ÔÂ4ÈÕ£¬ÒÔIJÀûΪĿµÄµÄ¡°»Æ½ð¹¤³§¡±ÍøÂç·¸·¨ÍÅ»ï½üÆÚÒÔαװÕþ¸®·þÎñ»ú¹¹µÄ·½·¨£¬ÏòÓ¡¶ÈÄáÎ÷ÑÇ¡¢Ì©¹úºÍÔ½ÄϵÄÒÆ¶¯Óû§ÌᳫÐÂÒ»ÂÖ¹¥»÷¡£¸ÃÍÅ»ï×Ô2024Äê10ÔÂÆð£¬Í¨¹ýÈö²¥Ö²È밲׿¶ñÒâÈí¼þµÄ¸Ä¶¯°æÒøÐÐÓ¦ÓÃʵÑé¹¥»÷£¬×îÔçÔÚÌ©¹ú±»·¢Ã÷£¬ºóÉìÕÅÖÁÔ½ÄϺÍÓ¡Äá¡£¾ÝÐÂ¼ÓÆÂIB¼¯ÍÅÊÖÒÕ±¨¸æ£¬½öÓ¡Äá¾ÍÔì³É½ü2200Æð×°±¸Ñ¬È¾£¬×ÜѬȾ°¸Àý³¬1.1ÍòÆð£¬ÆäÖÐ63%µÄ¸Ä¶¯Ó¦ÓÃÕë¶ÔÓ¡ÄáÊг¡¡£¹¥»÷Á÷³Ìαװ³ÉÕþ¸®»ú¹¹»ò×ÅÃûÆ·ÅÆ£¬Í¨¹ýµç»°Õ©ÆÓÕµ¼Óû§µã»÷ZaloµÈͨѶÈí¼þÖеÄÁ´½Ó£¬×°ÖöñÒâÈí¼þ¡£¶ñÒâ³ÌÐòͨ¹ý×¢Èë¶ñÒâ´úÂëµ½Õý¹æÒøÐÐÓ¦Ó㬱£´æÕý³£¹¦Ð§ÒÔÈÆ¹ýÇå¾²·À»¤£¬½¹µãÄ¿µÄÊÇÔ¶³Ì²Ù¿Ø×°±¸¡£Ñо¿Ö°Ô±·¢Ã÷ÈýÀàÐ®ÖÆÆ÷×é¼þ¡ª¡ª¡°¸¥ÈðÐ®ÖÆÆ÷¡±¡°Ìì¿ÕÐ®ÖÆÆ÷¡±¡°Åɶ÷Ð®ÖÆÆ÷¡±£¬¿ÉʵÏÖÒþ²ØÓ¦Óᢹæ±Ü¼ì²â¡¢Î±ÔìÊðÃû¡¢ÇÔÈ¡Óà¶îÐÅÏ¢µÈ¹¦Ð§¡£¸ÃÍŻﻹ¿ª·¢ÁË¡°¾ÞÐÍ»¨¡±²âÊÔ°æ¶ñÒâÈí¼þ£¬Ö§³Öʵʱ´«Êä×°±¸»Ãæ¡¢¼üÅ̼ͼ¡¢µ¯³öÐéα½çÃæÇÔÊØÐÅÏ¢£¬²¢ÕýÔÚ¿ª·¢¶þάÂëɨÃ蹦ЧÒÔÌáȡԽÄÏÉí·ÝÖ¤ÐÅÏ¢¡£
https://thehackernews.com/2025/12/goldfactory-hits-southeast-asia-with.html
2. Ó¡¶ÈÆóÒµÔâαװ˰Îñ²¿·Ö´¹ÂÚ¹¥»÷
12ÔÂ4ÈÕ£¬½üÆÚ£¬Ò»³¡Õë¶ÔÓ¡¶ÈÆóÒµµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷ÇÄÈ»Õö¿ª¡£¹¥»÷Õßαװ³ÉÓ¡¶ÈËùµÃ˰²¿·Ö£¬Í¨¹ý¸ß¶È·ÂÕæµÄÕþ¸®¹«ë¹Ä£°å¼°Ó¡µØÓïÓëÓ¢ÓïË«ÓïͨѶ£¬ÒýÓá¶ËùµÃ˰·¨¡·Ìõ¿îÖÆÔìÕýµ±ÐÔÓë½ôÆÈ¸Ð£¬»Ñ³ÆÊÕ¼þÈ˱£´æË°ÎñÎ¥¹æÐÐΪ£¬ÒªÇó72СʱÄÚÌá½»Îļþ£¬ÓÕÆÓû§·¿ª¶ñÒ⸽¼þ¡£´Ë´Î¹¥»÷½ÓÄÉÁ½½×¶Î¶ñÒâÈí¼þÁ´£º³õÆÚÒÔÃÜÂë±£»¤µÄZIPÎļþ´îÔØshellcode¼ÓÔØÆ÷£¬ºóÐø±äÌåʹÓùȸèÎĵµÁ´½Ó½»¸¶¶þ¼¶Ôغɣ¬×îÖÕͶ·ÅAsyncRATÔ¶³Ì¿ØÖÆÄ¾Âí£¬ÊµÏÖÆÁÄ»¹²Ïí¡¢Îļþ´«Êä¼°Ô¶³ÌÏÂÁîÖ´ÐС£¹¥»÷Ä¿µÄËø¶¨Ö¤È¯¹«Ë¾¡¢½ðÈÚ»ú¹¹¼°·ÇÒøÐнðÈÚ¹«Ë¾£¬ÒòÕâЩ»ú¹¹Ðè°´ÆÚÓëÕþ¸®²¿·Ö½»Á÷î¿ÏµÎļþ£¬³ÉÎªÖØµãÄ¿µÄ¡£RavenÇå¾²ÍŶÓͨ¹ýʶ±ð¹¥»÷¼Ü¹¹ÖеĶà²ãì¶Üµã£¬Àֳɷ¢Ã÷²¢×èÖ¹ÁËÕâÒ»ÁãÈÕ¹¥»÷£¬×èֹĿµÄ»ú¹¹´ó¹æÄ£Ñ¬È¾¡£ÓʼþÔ´×ÔÕýµ±Ãâ·ÑÓÊÏäÕ˺ţ¬Í¨¹ýSPF¡¢DKIM¼°DMARCÈÏÖ¤£¬Èƹý¹Å°åÓʼþ¹ýÂËÆ÷¡£ÃÜÂë±£»¤¸½¼þ×èÖ¹´«ÊäÖб»É±¶¾Èí¼þɨÃ裬½âѹºó·ºÆðµÄ¡°NeededDocuments¡±¿ÉÖ´ÐÐÎļþÄÚÖÃshellcode£¬shellcodeÓëAsyncRAT¿ØÖÆ·þÎñÆ÷½¨ÉèͨѶ¡£
https://cybersecuritynews.com/new-phishing-attack-mimic-as-income-tax-department/
3. React2ShellÎó²î´ó¹æÄ£Ê¹Ó㬳¬7.7ÍòIPÊÜÓ°Ïì
12ÔÂ6ÈÕ£¬React2ShellÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-55182£©Òý·¢È«ÇòÇ徲Σ»ú¡£¸ÃÎó²îÔ´ÓÚReact·þÎñÆ÷×é¼þ¶Ô¿Í»§¶Ë¿ØÖÆÊý¾ÝµÄ²»Çå¾²·´ÐòÁл¯»úÖÆ£¬¹¥»÷Õß¿Éͨ¹ýµ¥¸öHTTPÇëÇó´¥·¢Î´¾Éí·ÝÑéÖ¤µÄí§ÒâÏÂÁîÖ´ÐУ¬Ó°ÏìËùÓÐʵÏÖReact·þÎñÆ÷×é¼þµÄ¿ò¼ÜÈçNext.js¡£Shadowserver±¨¸æÏÔʾ£¬³¬77,000¸ö̻¶ÔÚ»¥ÁªÍøµÄIPµØµãÒ×Êܹ¥»÷£¬ÆäÖÐÔ¼23,700¸öλÓÚÃÀ¹ú£¬Éæ¼°¶à¸öÐÐÒµ¡£Îó²îÅû¶ºó£¬Çå¾²Ñо¿Ô±Maple3142Ðû²¼¿´·¨ÑéÖ¤£¬Íƶ¯×Ô¶¯»¯É¨Ã蹤¾ßѸËÙÀ©É¢¡£GreyNoise¼à²âµ½£¬ÒÑÍù24СʱÄÚÓÐ181¸ö²î±ðIPʵÑéʹÓøÃÎó²î£¬Á÷Á¿Ö÷ÒªÀ´×ÔºÉÀ¼¡¢Öйú¡¢ÃÀ¹ú¡¢Ïã¸ÛµÈµØÇø£¬¹¥»÷Õß¶àʹÓÃPowerShellÏÂÁîÈç¡°40138*41979¡±²âÊÔÎó²î£¬È·ÈϺóͨ¹ýbase64±àÂëÏÂÔØµÚ¶þ½×¶Î¾ç±¾£¬°²ÅÅCobalt StrikeÐűê»òSnowlight¡¢Vshell¶ñÒâÈí¼þ£¬ÊµÏÖÔ¶³Ì»á¼û¡¢ºáÏòÒÆ¶¯¼°Ãô¸ÐÐÅÏ¢ÇÔÈ¡¡£
https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable/
4. Barts Health NHS TrustÔâClopÀÕË÷Èí¼þ¹¥»÷
12ÔÂ5ÈÕ£¬Ó¢¹úBarts Health NHS Trust¿ËÈÕÐû²¼£¬ÆäOracle E-business SuiteÈí¼þ±£´æÎó²î£¨CVE-2025-61882£©£¬±»ClopÀÕË÷Èí¼þÍÅ»ïʹÓ㬵¼ÖÂÊý¾Ý¿âÖпçÔ½ÊýÄêµÄ·¢Æ±Îļþ±»µÁ¡£Ð¹Â¶Êý¾ÝÉæ¼°ÔÚ°Í´Ä¿µ½¡Ò½Ôº½ÓÊÜÖÎÁÆ»ò·þÎñÖ°Ô±µÄÈ«Ãû¡¢µØµã£¬²¿·Öǰ¹ÍÔ±¼°ÒѹûÕæÊý¾ÝµÄ¹©Ó¦ÉÌÐÅÏ¢£¬ÒÔ¼°×Ô2024Äê4ÔÂÆð¸ÃÐÅÍÐÏòBarking¡¢HaveringºÍRedbridge´óѧҽԺNHSÐÅÍÐÌṩµÄ»á¼Æ·þÎñÏà¹ØÎļþ¡£ClopÒѽ«ÇÔÊØÐÅÏ¢ÉÏ´«ÖÁ°µÍøÐ¹Â¶ÃÅ»§£¬µ«BartsÇ¿µ÷£¬ÏÖÔÚ½öÏÞ¼ÓÃܰµÍøÓû§¿É»á¼ûѹËõÎļþ£¬Î´·¢Ã÷Êý¾ÝÔÚ¹ûÕæ»¥ÁªÍøÈö²¥¡£´Ë´Î¹¥»÷±¬·¢ÓÚ2025Äê8Ô£¬Ö±ÖÁ11ÔÂÎļþ±»Ðû²¼ÖÁ°µÍøºó²ÅÈ·ÈÏÊý¾ÝΣº¦¡£BartsÒÑÏò¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ¡¢Â׶ؾ¯Ô±Ìü¼°ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©×ª´ïÊÂÎñ£¬²¢ÉêÇë¸ßµÈ·¨ÔºÏÂÁîեȡÊý¾ÝʹÓá¢Ðû²¼»ò·ÖÏí£¬µ«´ËÀà½ûÁîÏÖʵЧÁ¦ÓÐÏÞ¡£¸Ã»ú¹¹ÔËÓªÂ×¶ØÎå¼ÒÒ½Ôº£¬°üÀ¨»Ê¼ÒÂ×¶ØÒ½Ôº¡¢Ê¥°ÍÈûÂåçÑÒ½ÔºµÈ£¬Æäµç×Ó²¡Àú¼°ÁÙ´²ÏµÍ³Î´ÊÜÓ°Ï죬½¹µãIT»ù´¡ÉèÊ©Çå¾²ÐÔÈÔ»ñÒ»¶¨¡£
https://www.bleepingcomputer.com/news/security/barts-health-nhs-discloses-data-breach-after-oracle-zero-day-hack/
5. InotivÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷ÖÂ9500ÓàÈËÊý¾Ýй¶
12ÔÂ5ÈÕ£¬ÃÀ¹úÖÆÒ©¹«Ë¾Inotiv¿ËÈÕÅû¶£¬2025Äê8ÔÂ5ÈÕÖÁ8ÈÕʱ´ú£¬Æä²¿·ÖÍøÂçºÍϵͳÔâÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÊý¾Ý¿â¼°ÄÚ²¿Ó¦ÓóÌÐò̱»¾£¬ÓªÒµÔËÓªÊÜÑÏÖØÓ°Ïì¡£¸Ã¹«Ë¾ËæºóÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»ÎļþÈ·ÈÏ£¬Òѻָ´ÊÜÓ°Ïìϵͳ»á¼ûȨÏÞ£¬²¢ÕýÏò8ÔÂÊÂÎñÖÐÊý¾Ý±»µÁµÄ9,542ÃûСÎÒ˽¼Ò·¢ËÍ֪ͨ£¬Éæ¼°ÏÖÈÎ/ǰÈÎÔ±¹¤¡¢¾ìÊô¼°ÓëÊÕ¹º¹«Ë¾Óйý»¥¶¯µÄÆäËûÖ°Ô±¡£´Ë´Î¹¥»÷ÓÉ÷è÷ëÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈÏÕæ¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Éù³Æ£¬ÇÔÈ¡ÁËInotiv³¬16.2Íò¸öÎļþ£¬×ܼÆ176GB£¬µ«InotivδÃ÷È·Ïêϸй¶Êý¾ÝÀàÐÍ£¬Ò²Î´È·ÈÏ÷è÷ëÉùÃ÷µÄÕæÊµÐÔ¡£Inotiv×ܲ¿Î»ÓÚÓ¡µÚ°²ÄÉÖÝ£¬ÊÇÒ»¼ÒÄêÊÕÈ볬5ÒÚÃÀÔªµÄÌõÔ¼Ñо¿»ú¹¹£¬×¨×¢Ò©Î↑·¢¡¢Çå¾²ÐÔÆÀ¹À¼°»îÌ嶯ÎïÑо¿Ä£×Ó¹¹½¨£¬ÓµÓÐÔ¼2000ÃûÔ±¹¤¡£Ö»¹Ü´Ë´Î¹¥»÷䲨¼°½¹µãÁÙ´²ÏµÍ³£¬µ«Êý¾Ýй¶Σº¦ÈÔÒý·¢î¿Ïµ¹Ø×¢¡£
https://www.bleepingcomputer.com/news/security/pharma-firm-inotiv-discloses-data-breach-after-ransomware-attack/
6. ¶à½×¶Î¹¥»÷Ô˶¯Ãé×¼Palo AltoÓëSonicWallÇå¾²×°±¸
12ÔÂ6ÈÕ£¬ÍþвÐÐΪÕß12ÔÂ2ÈÕÆðʹÓõ¹úÍйܷþÎñÌṩÉÌ3xK GmbHÔËÓªµÄBGPÍøÂ磨AS200373£©ÏÂ7000Óà¸öIPµØµã£¬ÌᳫÕë¶ÔPalo Alto GlobalProtect VPNÃÅ»§¼°SonicWall SonicOS API¶ËµãµÄ¶à½×¶Î¹¥»÷¡£GreyNoise±¨¸æÏÔʾ£¬¹¥»÷ÕßÊ×ÏÈͨ¹ý±©Á¦ÆÆ½âʵÑéµÇ¼Palo Alto·À»ðǽµÄÔ¶³Ì»á¼û×é¼þGlobalProtect£¬ËæºóתÏòɨÃèSonicOS API¶Ëµã¡ª¡ª¸Ã²Ù×÷ϵͳ¿ØÖÆSonicWall·À»ðǽµÄÉèÖÃÓë¼à¿Ø¹¦Ð§¡£´Ë´ÎÔ˶¯Óë11ÔÂÖÐÑ®¼Í¼µÄ230Íò´ÎGlobalProtectɨÃè±£´æ¹ØÁª£º62%µÄ¹¥»÷IPλÓڵ¹ú£¬¾ùʹÓÃÏàͬTCP/JA4tÖ¸ÎÆ£¬ÇÒÔ´×Ô´ËǰÎÞ¶ñÒâ¼Í¼µÄËĸöASN¡£ÀúʷɨÃèÔ˶¯ÔøÌìÉú³¬900Íò´Î²»¿ÉαÔìµÄHTTP»á»°£¬Ä¿µÄÖ±Ö¸GlobalProtect¡£12ÔÂ3ÈÕ£¬Õë¶ÔSonicOS APIµÄɨÃèÖÐÔٴηºÆðÏàͬÈý¸ö¿Í»§Ö¸ÎÆ£¬GreyNoise¾Ý´ËÅжÏÁ½½×¶Î¹¥»÷ͬԴ¡£Palo Alto Networks»ØÓ¦³Æ£¬¼ì²âµ½µÄɨÃèÔ˶¯ÊôÓÚ¡°Æ¾Ö¤¹¥»÷¶ø·ÇÎó²îʹÓá±£¬ÆäÄÚ²¿Ò£²â¼°Cortex XSIAM·À»¤ÏµÍ³È·ÈÏδ¶Ô²úÆ··þÎñÔì³ÉË𺦣¬½¨Òé¿Í»§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©Ìá·Àƾ֤ÀÄÓá£SonicWall·½ÃæÉÐδ¹ûÕæÖÃÆÀ¡£
https://www.bleepingcomputer.com/news/security/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/


¾©¹«Íø°²±¸11010802024551ºÅ