AflacÊý¾Ýй¶ӰÏìÁè¼Ý2200Íò¿Í»§
Ðû²¼Ê±¼ä 2025-12-241. AflacÊý¾Ýй¶ӰÏìÁè¼Ý2200Íò¿Í»§
12ÔÂ24ÈÕ£¬×ܲ¿Î»ÓÚ×ôÖÎÑÇÖݵİü¹Ü¾ÞÍ·Aflac 6ÔÂÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂÁè¼Ý2270Íò¿Í»§¡¢Ô±¹¤¼°ÏàÖúͬ°éµÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬ÆäÖе¿ËÈøË¹ÖÝÊÜÓ°ÏìסÃñ³¬200Íò¡£¸Ã¹«Ë¾×îÐÂÉùÏÔ×Åʾ£¬¾ÓÉÊýÔÂÊӲ죬ÊÂÎñÒÑÓÚ12ÔÂ4ÈÕÕýʽÁ˰¸¡£¾ÝÊӲ죬ºÚ¿Íͨ¹ýαװITÖ°Ô±ÈëÇÖϵͳ£¬Ö»¹ÜAflacÔÚ¡°¼¸Ð¡Ê±ÄÚ¡±×èÖ¹Á˹¥»÷£¬µ«°ü¹ÜË÷Åâ¡¢¿µ½¡Êý¾Ý¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢ÈÔ±»ÇÔÈ¡¡£¸Ã¹«Ë¾Ç¿µ÷£¬´Ë´ÎÊÂÎñÎ´Éæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬ÇÒδ¶Ô¹«Ë¾ÔËÓªÔì³ÉʵÖÊÓ°Ïì¡£ÏÖÔÚ£¬AflacÒÑÏò¸÷ÖÝî¿Ïµ»ú¹¹×ª´ïÇéÐΣ¬²¢ÏòÊܺ¦Õß·¢ËÍÊý¾Ýй¶֪ͨÐÅ£¬ÌṩΪÆÚÁ½ÄêµÄÉí·Ý±£»¤·þÎñ£¬×¢²á×èÖ¹ÈÕÆÚΪ2026Äê4ÔÂ18ÈÕ¡£Áª°îÖ´·¨²¿·ÖÒѽéÈëÊӲ죬²¢Ô¼ÇëÍøÂçÇ徲ר¼ÒÐÖú´¦Öóͷ£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬´Ë´Î¹¥»÷ÓëÃûΪ¡°É¢ÂäÖ©Ö롱£¨Scattered Spider£©µÄ¿ç¹úÍøÂç·¸·¨ÍÅ»ïÇ×½üÏà¹Ø¡£
https://therecord.media/22-million-impacted-aflac-breach
2. WebRAT¶ñÒâÈí¼þ½èGitHubÐéαÎó²îʹÓóÌÐòÈö²¥
12ÔÂ23ÈÕ£¬Ò»ÖÖÃûΪWebRATµÄÐÅÏ¢ÇÔÈ¡ÐͺóÃŶñÒâÈí¼þÕýͨ¹ýGitHub´æ´¢¿â¾ÙÐдó¹æÄ£·Ö·¢¡£¹¥»÷Õßαװ³É¡°Îó²îʹÓóÌÐòÌṩÕß¡±£¬ÔÚ´æ´¢¿âÖÐÉù³ÆÍйÜÁËÕë¶ÔCVE-2025-59295¡¢CVE-2025-10294¡¢CVE-2025-59230µÈ½üÆÚÅû¶Îó²îµÄ¿´·¨ÑéÖ¤´úÂ룬ÓÕÆ¿ª·¢ÕßÏÂÔØ¡£¾Ý¿¨°Í˹»ùÇå¾²ÍŶÓÅû¶£¬ÕâЩ´æ´¢¿âÏÖʵ°üÀ¨¶ñÒâ³ÌÐò°ü¡£¹¥»÷ÕßʹÓÃÃÜÂë±£»¤µÄZIPÎļþ×÷ÎªÔØÌ壬ÄÚº¬¿ÕÎļþ¡¢Ë𻵵ÄÓÕ¶üDLL¡¢Åú´¦Öóͷ£¾ç±¾¼°Ö÷Ͷ·ÅÆ÷¡°rasmanesc.exe¡±¡£¸ÃͶ·ÅÆ÷»áͨ¹ýÌáÉýȨÏÞ¡¢½ûÓÃWindows DefenderµÈÊֶΣ¬´ÓÔ¤ÉèURLÏÂÔØ²¢Ö´ÐÐWebRAT¡£¿¨°Í˹»ùÒÑ·¢Ã÷15¸ö´ËÀà¶ñÒâ´æ´¢¿â£¬ÆäÐÅÏ¢½á¹¹ÒÉËÆÓÉAIÌìÉú¡£WebRAT×Ô½ñÄêÄêÍ··ºÆðÒÔÀ´£¬Ö÷Ҫͨ¹ýµÁ°æÈí¼þ¡¢ÓÎÏ·×÷±×¹¤¾ßÈö²¥¡£Æä¹¦Ð§°üÀ¨ÇÔÈ¡Steam¡¢Discord¡¢TelegramÕË»§Æ¾Ö¤¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬Í¨¹ýÉãÏñÍ·¼à¿ØÊܺ¦Õß²¢½ØÈ¡ÆÁÄ»½ØÍ¼£¬Í¬Ê±Í¨¹ýÐÞ¸Ä×¢²á±í¡¢ÍýÏëʹÃü¼°ÏµÍ³Ä¿Â¼×¢ÈëµÈ·½·¨½¨É賤ÆÚÐÔ¡£´Ë´Î¹¥»÷ÖÐʹÓõÄWebRAT±äÖÖÓë´Ëǰ¼Í¼µÄÑù±¾¹¦Ð§Ò»Ö¡£
https://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/
3. αװVPNµÄ¶ñÒâChromeÀ©Õ¹ÇÔÈ¡Óû§Æ¾Ö¤
12ÔÂ23ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Á½¿îͬÃû¶ñÒâChromeÀ©Õ¹"»ÃÓ°´©Ëó»ú"£¬»®·ÖÓµÓÐ2000ÃûºÍ180ÃûÓû§¡£ÕâÁ½¿îÓÉͳһ¿ª·¢ÕßÐû²¼µÄ²å¼þαװ³É"¶àËùÔÚÍøÂçËÙÂʲâÊÔ¹¤¾ß"£¬Í¨¹ýÊÕÈ¡1.4-13.5ÃÀÔª¶©ÔÄ·ÑÓÕµ¼Óû§×°Öã¬ÏÖʵִÐÐÁ÷Á¿×èµ²ÓëÆ¾Ö¤ÇÔÈ¡µÄ¶ñÒâ²Ù×÷¡£À©Õ¹³ÌÐòͨ¹ýÐÞ¸ÄÀ¦°óµÄJavaScript¿â£¬ÔÚchrome.webRequest.onAuthRequired×¢²á¼àÌýÆ÷£¬×Ô¶¯ÏòËùÓÐHTTPÉí·ÝÑéÖ¤ÖÊѯעÈëÓ²±àÂëÊðÀíÆ¾Ö¤£¬ÊµÏÖ͸Ã÷ÖÐÐÄÈ˹¥»÷¡£Óû§¸¶¿î¼¤»îVIPÉí·Ýºó£¬À©Õ¹³ÌÐòÆôÓÃ"ÖÇÄÜ"ÊðÀíģʽ£¬Î´À´×ÔGitHub¡¢AWS¡¢Azure¡¢FacebookµÈ170Óà¸ö¸ß¼ÛÖµÓòÃûµÄÁ÷Á¿Â·ÓÉÖÁ¹¥»÷Õß¿ØÖƵÄC2·þÎñÆ÷¡£À©Õ¹³ÌÐòͨ¹ýÈýÖÖÊðÀíģʽһÁ¬ÇÔÈ¡Êý¾Ý£º¹Ø±Õģʽ½ûÓÃÊðÀí£¬Ê¼ÖÕģʽ·ÓÉËùÓÐÁ÷Á¿£¬ÖÇÄÜģʽ¶¨Ïò·ÓÉÄ¿µÄÓòÃû¡£Æäÿ60ÃëÓëC2·þÎñÆ÷¼á³ÖÐÄÌøÍ¨Ñ¶£¬Ã¿Îå·ÖÖÓͨ¹ýHTTP GETÇëÇóй¶VIPÓû§µÄµç×ÓÓʼþ¡¢Ã÷ÎÄÃÜÂëºÍ°æ±¾ºÅ¡£ÕâÖÖ"ÐÄÌøÐ¹Â¶+ÊðÀíÖÐÐÄÈ˹¥»÷"µÄ×éºÏʹ¹¥»÷ÕßÄÜÒ»Á¬²¶»ñÃÜÂë¡¢ÐÅÓÿ¨ºÅ¡¢Éí·ÝÑéÖ¤cookie¡¢APIÃÜÔ¿µÈÃô¸ÐÊý¾Ý£¬ÉõÖÁΪ¹©Ó¦Á´¹¥»÷ÆÌ·¡£
https://thehackernews.com/2025/12/two-chrome-extensions-caught-secretly.html
4. ±´¿Ë´óѧÔâÍøÂç¹¥»÷ÖÂ5.3ÍòÈËÐÅϢй¶
12ÔÂ23ÈÕ£¬±´¿Ë´óѧλÓÚ¿°ÈøË¹Öݱ«µÂÎÂÊУ¬½¨ÉèÓÚ1858Ä꣬ӵÓÐÔ¼2000ÃûѧÉú¼°300ÃûÔ±¹¤¡£´Ë´óѧ¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬2024Äê12ÔÂ2ÈÕÖÁ19ÈÕʱ´ú£¬¹¥»÷ÕßÈëÇÖ¸ÃÐ£ÍøÂ磬ÇÔÈ¡53,624È˵ÄСÎÒ˽¼Ò¡¢¿µ½¡¼°²ÆÎñÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ò½ÁƼͼ¡¢»¤ÕÕÐÅÏ¢¡¢Éç»á°ü¹ÜºÅÂ롢ѧÉúÖ¤ºÅÂ뼰˰ÎñʶÓÖÃûÂëµÈÃô¸ÐÄÚÈÝ¡£´Ë´ÎÊÂÎñÔ´ÓÚ2024Äê12Ô³õÑ§Ð£ÍøÂç¹ÊÕϺó¼ì²âµ½µÄ¿ÉÒÉÔ˶¯£¬¾Éó²éÈ·ÈÏÐÅϢй¶¹æÄ£¡£Ñ§Ð£ÌåÏÖ£¬ÏÖÔÚδ·¢Ã÷ÇÔÊØÐÅÏ¢±»ÓÃÓÚÚ²ÆÔ˶¯µÄÖ¤¾Ý£¬µ«ÒÑÏòÊÜÓ°ÏìÕßÌṩÃâ·ÑÐÅÓÃ¼à¿Ø·þÎñ£¬²¢½¨Òé°´ÆÚ¼ì²éÕË»§¶ÔÕ˵¥¼°ÐÅÓñ¨¸æÒÔÌá·ÀΣº¦¡£±´¿Ë´óѧУ³¤Çǵϡ¤¸£Äá¶ûÇ¿µ÷£¬±£»¤ÉçÇø³ÉÔ±ÐÅÏ¢Çå¾²ÊÇÖ÷ҪʹÃü£¬ÊÂÎñ±¬·¢ºó£¬Ñ§Ð£ÒÑÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÍŶÓÏàÖú£¬ÖØÐÞÊÜËðµÄÖ÷Ҫƽ̨¡£È»¶ø£¬Ñ§Ð£Î´Ðû²¼¹¥»÷ÏêϸÐÔ×Ó£¬Ò²Î´¹éÒòÓÚÌØ¶¨ÍøÂç·¸·¨×éÖ¯»ò¹ú¼ÒÖ§³ÖÕûÌå¡£
https://www.bleepingcomputer.com/news/security/baker-university-data-breach-impacts-over-53-000-individuals/
5. n8n¸ßΣÎó²îÖ³¬10ÍòʵÀýÃæÁÙí§Òâ´úÂëÖ´ÐÐΣº¦
12ÔÂ23ÈÕ£¬ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨n8n¿ËÈÕ±»Åû¶±£´æ±àºÅΪCVE-2025-68613µÄ¸ßΣÇå¾²Îó²î£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö£¬Êô¡°ÑÏÖØ¡±¼¶±ð¡£¸ÃÎó²îÔ´ÓÚÒÑÈÏÖ¤Óû§ÔÚÉèÖÃÊÂÇéÁ÷ʱÌá½»µÄ±í´ïʽ£¬¿ÉÄÜÔÚδÓëµ×²ãÔËÐÐÇéÐγä·Ö¸ôÀëµÄÖ´ÐÐÉÏÏÂÎÄÖб»ÆÊÎöÖ´ÐУ¬µ¼Ö¹¥»÷ÕßÒÔn8nÀú³ÌȨÏÞÖ´ÐÐí§Òâ´úÂ룬½ø¶øÍêÈ«¹¥ÏÝÆ½Ì¨ÊµÀý£¬Òý·¢Ãô¸ÐÊý¾Ýй¶¡¢ÊÂÇéÁ÷¸Ä¶¯¡¢ÏµÍ³¼¶¶ñÒâ²Ù×÷µÈÑÏÖØÐ§¹û¡£¾Ýnpmƽ̨ͳ¼Æ£¬n8nÈí¼þ°üÖÜÏÂÔØÁ¿Ô¼5.7Íò´Î£¬Ó°Ïì¹æÄ£º¸ÇËùÓа汾ºÅ¡Ý0.211.0ÇÒ¡Ü1.120.4µÄn8n³ÌÐò¡£¹¥»÷ÃæÖÎÀíÆ½Ì¨Censys¼à²âÊý¾ÝÏÔʾ£¬×èÖ¹2025Äê12ÔÂ22ÈÕ£¬È«Çò¹æÄ£ÄÚ±£´æÇ±ÔÚÎó²îΣº¦µÄn8nʵÀý¶à´ï103,476¸ö£¬Ö÷ÒªÂþÑÜÔÚÃÀ¹ú¡¢µÂ¹ú¡¢·¨¹ú¡¢°ÍÎ÷¼°ÐÂ¼ÓÆÂµÈ¹ú¼Ò¡£¹Ù·½ÒÑÍê³ÉÎó²îÐÞ¸´£¬²¢Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìÉý¼¶ÖÁÇå¾²°æ±¾¡£ÈôÔÝʱÎÞ·¨°²ÅŲ¹¶¡£¬¿Éͨ¹ý»º½â²½·¥½µµÍΣº¦¡£
https://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html
6. vLex AIÖúÊÖÎó²îÖÂÈ«Çò20Íò»ú¹¹Êý¾Ýй¶Σº¦
12ÔÂ24ÈÕ£¬PromptArmorÑо¿Ö°Ô±¿ËÈÕÅû¶£¬vLexƽ̨µÄÖÇÄÜÖ´·¨ÖúÊÖVincent±£´æÑÏÖØÇå¾²Îó²î£¬¿É±»ºÚ¿ÍʹÓÃʵÑéÍøÂç´¹ÂÚ¹¥»÷£¬ÇÔÈ¡Óû§µÇ¼ƾ֤¼°Ãô¸Ð¿Í»§Îļþ¡£¸ÃÎó²îÔ´ÓÚ¹¥»÷Õß¿Éͨ¹ýÔÚÉÏ´«ÖÁƽ̨µÄÎĵµÖÐǶÈëÒþ²ØÎı¾Èç°×µ×°××ÖαÔìÒýÓÓÕʹVincentÆÊÎöʱÌìÉú¶ñÒâHTML´úÂ룬×îÖÕÔÚÓû§ä¯ÀÀÆ÷Öд¥·¢¡°ÆÁÄ»µþ¼Ó¡±´¹ÂÚ¹¥»÷£¬ÐéαµÇ¼½çÃæÁýÕÖÕæÊµÒ³Ãæ£¬ÓÕÆÓû§ÊäÈëÆ¾Ö¤¡£Ñо¿Ö¸³ö£¬´Ë¡°Èý²½¹¥»÷Á´¡±¾ßÓи߶ÈÒþ²ØÐÔ£ºÊ×ÏÈ£¬¹¥»÷Õß½«¶ñÒâ´úÂëǶÈëÍøÂç»ñÈ¡µÄÎĵµ£»Æä´Î£¬Ö´·¨ÍŶÓÉÏ´«Îĵµºó£¬VincentÆÊÎö¡°Ö±½ÓÒýÓʱ´¥·¢Òþ²Ø´úÂ룻×îºó£¬ä¯ÀÀÆ÷Ö´ÐдúÂëÏÔʾ·ÂðµÄvLexµÇ¼½çÃæ£¬ÊµÊ±ÇÔÈ¡ÊäÈëÐÅÏ¢¡£¸üÑÏÖØµÄÊÇ£¬¸ÃÎó²î¿ÉÀ©Õ¹ÎªÔ¶³Ì´úÂëÖ´ÐУ¬µ¼Ö»ỰÁîÅÆ±»µÁ¡¢Áãµã»÷Êý¾Ýй¶¡¢Ç¿ÖÆÎļþÏÂÔØÉõÖÁ¼ÓÃÜÇ®±ÒÍÚ¿ó£¬ÇÒÿ´Î·¿ªÌ¸Ìì´°¿Ú¶¼»áÖØ¸´Ö´Ðй¥»÷¡£
https://cybernews.com/security/vlex-vincent-ai-phishing-vulnerability-lawyers-law-firms/


¾©¹«Íø°²±¸11010802024551ºÅ