¡°»Æ½ð¹¤³§¡±ÍøÂç·¸·¨ÍÅ»ïÕë¶Ô¶«ÄÏÑÇÌᳫ¹¥»÷

Ðû²¼Ê±¼ä 2025-12-08

1. ¡°»Æ½ð¹¤³§¡±ÍøÂç·¸·¨ÍÅ»ïÕë¶Ô¶«ÄÏÑÇÌᳫ¹¥»÷


12ÔÂ4ÈÕ £¬ÒÔIJÀûΪĿµÄµÄ¡°»Æ½ð¹¤³§¡±ÍøÂç·¸·¨ÍÅ»ï½üÆÚÒÔαװÕþ¸®·þÎñ»ú¹¹µÄ·½·¨ £¬ÏòÓ¡¶ÈÄáÎ÷ÑÇ¡¢Ì©¹úºÍÔ½ÄϵÄÒÆ¶¯Óû§ÌᳫÐÂÒ»ÂÖ¹¥»÷¡£¸ÃÍÅ»ï×Ô2024Äê10ÔÂÆð £¬Í¨¹ýÈö²¥Ö²È밲׿¶ñÒâÈí¼þµÄ¸Ä¶¯°æÒøÐÐÓ¦ÓÃʵÑé¹¥»÷ £¬×îÔçÔÚÌ©¹ú±»·¢Ã÷ £¬ºóÉìÕÅÖÁÔ½ÄϺÍÓ¡Äá¡£¾ÝÐÂ¼ÓÆÂIB¼¯ÍÅÊÖÒÕ±¨¸æ £¬½öÓ¡Äá¾ÍÔì³É½ü2200Æð×°±¸Ñ¬È¾ £¬×ÜѬȾ°¸Àý³¬1.1ÍòÆð £¬ÆäÖÐ63%µÄ¸Ä¶¯Ó¦ÓÃÕë¶ÔÓ¡ÄáÊг¡¡£¹¥»÷Á÷³Ìαװ³ÉÕþ¸®»ú¹¹»ò×ÅÃûÆ·ÅÆ £¬Í¨¹ýµç»°Õ©Æ­ÓÕµ¼Óû§µã»÷ZaloµÈͨѶÈí¼þÖеÄÁ´½Ó £¬×°ÖöñÒâÈí¼þ¡£¶ñÒâ³ÌÐòͨ¹ý×¢Èë¶ñÒâ´úÂëµ½Õý¹æÒøÐÐÓ¦Óà £¬±£´æÕý³£¹¦Ð§ÒÔÈÆ¹ýÇå¾²·À»¤ £¬½¹µãÄ¿µÄÊÇÔ¶³Ì²Ù¿Ø×°±¸¡£Ñо¿Ö°Ô±·¢Ã÷ÈýÀàÐ®ÖÆÆ÷×é¼þ¡ª¡ª¡°¸¥ÈðÐ®ÖÆÆ÷¡±¡°Ìì¿ÕÐ®ÖÆÆ÷¡±¡°Åɶ÷Ð®ÖÆÆ÷¡± £¬¿ÉʵÏÖÒþ²ØÓ¦Óᢹæ±Ü¼ì²â¡¢Î±ÔìÊðÃû¡¢ÇÔÈ¡Óà¶îÐÅÏ¢µÈ¹¦Ð§¡£¸ÃÍŻﻹ¿ª·¢ÁË¡°¾ÞÐÍ»¨¡±²âÊÔ°æ¶ñÒâÈí¼þ £¬Ö§³Öʵʱ´«Êä×°±¸»­Ãæ¡¢¼üÅ̼ͼ¡¢µ¯³öÐéα½çÃæÇÔÊØÐÅÏ¢ £¬²¢ÕýÔÚ¿ª·¢¶þάÂëɨÃ蹦ЧÒÔÌáȡԽÄÏÉí·ÝÖ¤ÐÅÏ¢¡£


https://thehackernews.com/2025/12/goldfactory-hits-southeast-asia-with.html


2. Ó¡¶ÈÆóÒµÔâαװ˰Îñ²¿·Ö´¹ÂÚ¹¥»÷


12ÔÂ4ÈÕ £¬½üÆÚ £¬Ò»³¡Õë¶ÔÓ¡¶ÈÆóÒµµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷ÇÄÈ»Õö¿ª¡£¹¥»÷Õßαװ³ÉÓ¡¶ÈËùµÃ˰²¿·Ö £¬Í¨¹ý¸ß¶È·ÂÕæµÄÕþ¸®¹«ë¹Ä£°å¼°Ó¡µØÓïÓëÓ¢ÓïË«ÓïͨѶ £¬ÒýÓá¶ËùµÃ˰·¨¡·Ìõ¿îÖÆÔìÕýµ±ÐÔÓë½ôÆÈ¸Ð £¬»Ñ³ÆÊÕ¼þÈ˱£´æË°ÎñÎ¥¹æÐÐΪ £¬ÒªÇó72СʱÄÚÌá½»Îļþ £¬ÓÕÆ­Óû§·­¿ª¶ñÒ⸽¼þ¡£´Ë´Î¹¥»÷½ÓÄÉÁ½½×¶Î¶ñÒâÈí¼þÁ´£º³õÆÚÒÔÃÜÂë±£»¤µÄZIPÎļþ´îÔØshellcode¼ÓÔØÆ÷ £¬ºóÐø±äÌåʹÓùȸèÎĵµÁ´½Ó½»¸¶¶þ¼¶ÔغÉ £¬×îÖÕͶ·ÅAsyncRATÔ¶³Ì¿ØÖÆÄ¾Âí £¬ÊµÏÖÆÁÄ»¹²Ïí¡¢Îļþ´«Êä¼°Ô¶³ÌÏÂÁîÖ´ÐС£¹¥»÷Ä¿µÄËø¶¨Ö¤È¯¹«Ë¾¡¢½ðÈÚ»ú¹¹¼°·ÇÒøÐнðÈÚ¹«Ë¾ £¬ÒòÕâЩ»ú¹¹Ðè°´ÆÚÓëÕþ¸®²¿·Ö½»Á÷î¿ÏµÎļþ £¬³ÉÎªÖØµãÄ¿µÄ¡£RavenÇå¾²ÍŶÓͨ¹ýʶ±ð¹¥»÷¼Ü¹¹ÖеĶà²ãì¶Üµã £¬Àֳɷ¢Ã÷²¢×èÖ¹ÁËÕâÒ»ÁãÈÕ¹¥»÷ £¬×èֹĿµÄ»ú¹¹´ó¹æÄ£Ñ¬È¾¡£ÓʼþÔ´×ÔÕýµ±Ãâ·ÑÓÊÏäÕ˺Å £¬Í¨¹ýSPF¡¢DKIM¼°DMARCÈÏÖ¤ £¬Èƹý¹Å°åÓʼþ¹ýÂËÆ÷¡£ÃÜÂë±£»¤¸½¼þ×èÖ¹´«ÊäÖб»É±¶¾Èí¼þɨÃè £¬½âѹºó·ºÆðµÄ¡°NeededDocuments¡±¿ÉÖ´ÐÐÎļþÄÚÖÃshellcode £¬shellcodeÓëAsyncRAT¿ØÖÆ·þÎñÆ÷½¨ÉèͨѶ¡£


https://cybersecuritynews.com/new-phishing-attack-mimic-as-income-tax-department/


3. React2ShellÎó²î´ó¹æÄ£Ê¹Óà £¬³¬7.7ÍòIPÊÜÓ°Ïì


12ÔÂ6ÈÕ £¬React2ShellÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-55182£©Òý·¢È«ÇòÇ徲Σ»ú¡£¸ÃÎó²îÔ´ÓÚReact·þÎñÆ÷×é¼þ¶Ô¿Í»§¶Ë¿ØÖÆÊý¾ÝµÄ²»Çå¾²·´ÐòÁл¯»úÖÆ £¬¹¥»÷Õß¿Éͨ¹ýµ¥¸öHTTPÇëÇó´¥·¢Î´¾­Éí·ÝÑéÖ¤µÄí§ÒâÏÂÁîÖ´ÐÐ £¬Ó°ÏìËùÓÐʵÏÖReact·þÎñÆ÷×é¼þµÄ¿ò¼ÜÈçNext.js¡£Shadowserver±¨¸æÏÔʾ £¬³¬77,000¸ö̻¶ÔÚ»¥ÁªÍøµÄIPµØµãÒ×Êܹ¥»÷ £¬ÆäÖÐÔ¼23,700¸öλÓÚÃÀ¹ú £¬Éæ¼°¶à¸öÐÐÒµ¡£Îó²îÅû¶ºó £¬Çå¾²Ñо¿Ô±Maple3142Ðû²¼¿´·¨ÑéÖ¤ £¬Íƶ¯×Ô¶¯»¯É¨Ã蹤¾ßѸËÙÀ©É¢¡£GreyNoise¼à²âµ½ £¬ÒÑÍù24СʱÄÚÓÐ181¸ö²î±ðIPʵÑéʹÓøÃÎó²î £¬Á÷Á¿Ö÷ÒªÀ´×ÔºÉÀ¼¡¢Öйú¡¢ÃÀ¹ú¡¢Ïã¸ÛµÈµØÇø £¬¹¥»÷Õß¶àʹÓÃPowerShellÏÂÁîÈç¡°40138*41979¡±²âÊÔÎó²î £¬È·ÈϺóͨ¹ýbase64±àÂëÏÂÔØµÚ¶þ½×¶Î¾ç±¾ £¬°²ÅÅCobalt StrikeÐűê»òSnowlight¡¢Vshell¶ñÒâÈí¼þ £¬ÊµÏÖÔ¶³Ì»á¼û¡¢ºáÏòÒÆ¶¯¼°Ãô¸ÐÐÅÏ¢ÇÔÈ¡¡£


https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable/


4. Barts Health NHS TrustÔâClopÀÕË÷Èí¼þ¹¥»÷


12ÔÂ5ÈÕ £¬Ó¢¹úBarts Health NHS Trust¿ËÈÕÐû²¼ £¬ÆäOracle E-business SuiteÈí¼þ±£´æÎó²î£¨CVE-2025-61882£© £¬±»ClopÀÕË÷Èí¼þÍÅ»ïʹÓà £¬µ¼ÖÂÊý¾Ý¿âÖпçÔ½ÊýÄêµÄ·¢Æ±Îļþ±»µÁ¡£Ð¹Â¶Êý¾ÝÉæ¼°ÔÚ°Í´Ä¿µ½¡Ò½Ôº½ÓÊÜÖÎÁÆ»ò·þÎñÖ°Ô±µÄÈ«Ãû¡¢µØµã £¬²¿·Öǰ¹ÍÔ±¼°ÒѹûÕæÊý¾ÝµÄ¹©Ó¦ÉÌÐÅÏ¢ £¬ÒÔ¼°×Ô2024Äê4ÔÂÆð¸ÃÐÅÍÐÏòBarking¡¢HaveringºÍRedbridge´óѧҽԺNHSÐÅÍÐÌṩµÄ»á¼Æ·þÎñÏà¹ØÎļþ¡£ClopÒѽ«ÇÔÊØÐÅÏ¢ÉÏ´«ÖÁ°µÍøÐ¹Â¶ÃÅ»§ £¬µ«BartsÇ¿µ÷ £¬ÏÖÔÚ½öÏÞ¼ÓÃܰµÍøÓû§¿É»á¼ûѹËõÎļþ £¬Î´·¢Ã÷Êý¾ÝÔÚ¹ûÕæ»¥ÁªÍøÈö²¥¡£´Ë´Î¹¥»÷±¬·¢ÓÚ2025Äê8Ô £¬Ö±ÖÁ11ÔÂÎļþ±»Ðû²¼ÖÁ°µÍøºó²ÅÈ·ÈÏÊý¾ÝΣº¦¡£BartsÒÑÏò¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ¡¢Â׶ؾ¯Ô±Ìü¼°ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©×ª´ïÊÂÎñ £¬²¢ÉêÇë¸ßµÈ·¨ÔºÏÂÁîեȡÊý¾ÝʹÓá¢Ðû²¼»ò·ÖÏí £¬µ«´ËÀà½ûÁîÏÖʵЧÁ¦ÓÐÏÞ¡£¸Ã»ú¹¹ÔËÓªÂ×¶ØÎå¼ÒÒ½Ôº £¬°üÀ¨»Ê¼ÒÂ×¶ØÒ½Ôº¡¢Ê¥°ÍÈûÂåçÑÒ½ÔºµÈ £¬Æäµç×Ó²¡Àú¼°ÁÙ´²ÏµÍ³Î´ÊÜÓ°Ïì £¬½¹µãIT»ù´¡ÉèÊ©Çå¾²ÐÔÈÔ»ñÒ»¶¨¡£


https://www.bleepingcomputer.com/news/security/barts-health-nhs-discloses-data-breach-after-oracle-zero-day-hack/


5. InotivÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷ÖÂ9500ÓàÈËÊý¾Ýй¶


12ÔÂ5ÈÕ £¬ÃÀ¹úÖÆÒ©¹«Ë¾Inotiv¿ËÈÕÅû¶ £¬2025Äê8ÔÂ5ÈÕÖÁ8ÈÕʱ´ú £¬Æä²¿·ÖÍøÂçºÍϵͳÔâÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂÊý¾Ý¿â¼°ÄÚ²¿Ó¦ÓóÌÐò̱»¾ £¬ÓªÒµÔËÓªÊÜÑÏÖØÓ°Ïì¡£¸Ã¹«Ë¾ËæºóÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»ÎļþÈ·ÈÏ £¬Òѻָ´ÊÜÓ°Ïìϵͳ»á¼ûȨÏÞ £¬²¢ÕýÏò8ÔÂÊÂÎñÖÐÊý¾Ý±»µÁµÄ9,542ÃûСÎÒ˽¼Ò·¢ËÍ֪ͨ £¬Éæ¼°ÏÖÈÎ/ǰÈÎÔ±¹¤¡¢¾ìÊô¼°ÓëÊÕ¹º¹«Ë¾Óйý»¥¶¯µÄÆäËûÖ°Ô±¡£´Ë´Î¹¥»÷ÓÉ÷è÷ëÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈÏÕæ¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Éù³Æ £¬ÇÔÈ¡ÁËInotiv³¬16.2Íò¸öÎļþ £¬×ܼÆ176GB £¬µ«InotivδÃ÷È·Ïêϸй¶Êý¾ÝÀàÐÍ £¬Ò²Î´È·ÈÏ÷è÷ëÉùÃ÷µÄÕæÊµÐÔ¡£Inotiv×ܲ¿Î»ÓÚÓ¡µÚ°²ÄÉÖÝ £¬ÊÇÒ»¼ÒÄêÊÕÈ볬5ÒÚÃÀÔªµÄÌõÔ¼Ñо¿»ú¹¹ £¬×¨×¢Ò©Î↑·¢¡¢Çå¾²ÐÔÆÀ¹À¼°»îÌ嶯ÎïÑо¿Ä£×Ó¹¹½¨ £¬ÓµÓÐÔ¼2000ÃûÔ±¹¤¡£Ö»¹Ü´Ë´Î¹¥»÷䲨¼°½¹µãÁÙ´²ÏµÍ³ £¬µ«Êý¾Ýй¶Σº¦ÈÔÒý·¢î¿Ïµ¹Ø×¢¡£


https://www.bleepingcomputer.com/news/security/pharma-firm-inotiv-discloses-data-breach-after-ransomware-attack/


6. ¶à½×¶Î¹¥»÷Ô˶¯Ãé×¼Palo AltoÓëSonicWallÇå¾²×°±¸


12ÔÂ6ÈÕ £¬ÍþвÐÐΪÕß12ÔÂ2ÈÕÆðʹÓõ¹úÍйܷþÎñÌṩÉÌ3xK GmbHÔËÓªµÄBGPÍøÂ磨AS200373£©ÏÂ7000Óà¸öIPµØµã £¬ÌᳫÕë¶ÔPalo Alto GlobalProtect VPNÃÅ»§¼°SonicWall SonicOS API¶ËµãµÄ¶à½×¶Î¹¥»÷¡£GreyNoise±¨¸æÏÔʾ £¬¹¥»÷ÕßÊ×ÏÈͨ¹ý±©Á¦ÆÆ½âʵÑéµÇ¼Palo Alto·À»ðǽµÄÔ¶³Ì»á¼û×é¼þGlobalProtect £¬ËæºóתÏòɨÃèSonicOS API¶Ëµã¡ª¡ª¸Ã²Ù×÷ϵͳ¿ØÖÆSonicWall·À»ðǽµÄÉèÖÃÓë¼à¿Ø¹¦Ð§¡£´Ë´ÎÔ˶¯Óë11ÔÂÖÐÑ®¼Í¼µÄ230Íò´ÎGlobalProtectɨÃè±£´æ¹ØÁª£º62%µÄ¹¥»÷IPλÓڵ¹ú £¬¾ùʹÓÃÏàͬTCP/JA4tÖ¸ÎÆ £¬ÇÒÔ´×Ô´ËǰÎÞ¶ñÒâ¼Í¼µÄËĸöASN¡£ÀúʷɨÃèÔ˶¯ÔøÌìÉú³¬900Íò´Î²»¿ÉαÔìµÄHTTP»á»° £¬Ä¿µÄÖ±Ö¸GlobalProtect¡£12ÔÂ3ÈÕ £¬Õë¶ÔSonicOS APIµÄɨÃèÖÐÔٴηºÆðÏàͬÈý¸ö¿Í»§Ö¸ÎÆ £¬GreyNoise¾Ý´ËÅжÏÁ½½×¶Î¹¥»÷ͬԴ¡£Palo Alto Networks»ØÓ¦³Æ £¬¼ì²âµ½µÄɨÃèÔ˶¯ÊôÓÚ¡°Æ¾Ö¤¹¥»÷¶ø·ÇÎó²îʹÓá± £¬ÆäÄÚ²¿Ò£²â¼°Cortex XSIAM·À»¤ÏµÍ³È·ÈÏδ¶Ô²úÆ··þÎñÔì³ÉË𺦠£¬½¨Òé¿Í»§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©Ìá·Àƾ֤ÀÄÓá£SonicWall·½ÃæÉÐδ¹ûÕæÖÃÆÀ¡£


https://www.bleepingcomputer.com/news/security/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/