˼¿Æ·À»ðǽÁãÈÕ·ì϶Ôâ¹ú¶ÈÖ§³Ö×éÖ¯¹¥»÷
°ä²¼¹¦·ò 2025-11-111. ˼¿Æ·À»ðǽÁãÈÕ·ì϶Ôâ¹ú¶ÈÖ§³Ö×éÖ¯¹¥»÷
11ÔÂ7ÈÕ£¬£¬£¬Ë¼¿ÆÓÚ2025Äê9ÔÂ25ÈÕ°ä²¼°²È«¸üУ¬£¬£¬ÐÞ¸´CVE-2025-20362£¨ÔÊÐíδ¾Éí·ÝÑéÖ¤½Ó¼ûÊÜÏÞURL£©ºÍCVE-2025-20333£¨ÔÊÐí¾Éí·ÝÑéÖ¤Ô¶³Ì´úÂëÖ´ÐУ©Á½¸ö¸ßΣ·ì϶¡£¶þÕß¹ØÁªºó£¬£¬£¬Ô¶³Ìδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÆëÈ«½ÚÖÆÎ´´ò²¹¶¡µÄASAºÍFTD·À»ðǽϵͳ£¬£¬£¬µ¼ÖÂÉè±¸ÖØÆôÑ»·¼°»Ø¾ø·þÎñ£¨DoS£©¹¥»÷¡£Í¬ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©°ä²¼´¹Î£Ö¸Á£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚ±£»£»¤Ë¼¿Æ·À»ðǽÉ豸£¬£¬£¬²¢Ç¿ÖƶϿªÒÑÖÕ³¡Ö§³Ö£¨EoS£©µÄASAÉ豸ÓëÁª°îÍøÂçµÄÏνӡ£Íþв¼à¿Ø·þÎñShadowserver×·×Ù·¢ÏÖ£¬£¬£¬»¥ÁªÍøÉ϶³öµÄÒ×Êܹ¥»÷ASAºÍFTDʵÀý³¬¹ý34,000¸ö£¬£¬£¬9ÔÂδÐÞ²¹·À»ðǽÊýÁ¿¿¿½ü50,000¸ö¡£Ë¼¿ÆÖ¸³ö£¬£¬£¬ÕâЩ¹¥»÷Óë2024ÄêArcaneDoor¹¥»÷»î¶¯Í¬ÊôÒ»¸ö¹ú¶ÈÖ§³ÖµÄ×éÖ¯£¨Î¢Èí×·×ÙΪSTORM-1849/UAT4356£©£¬£¬£¬¸Ã×éÖ¯ÔøÀûÓÃCVE-2024-20353ºÍCVE-2024-20359·ì϶ÈëÇÖÈ«Çòµ±¾ÖÍøÂ磬£¬£¬²¿ÊðLine DancerÄÚ´æshellcode¼ÓÔØÆ÷ºÍLine RunnerºóÃŶñÒâÈí¼þÒÔά³ÖÓÆ¾ÃÐÔ¡£2025Äê11ÔÂ5ÈÕ£¬£¬£¬Ë¼¿Æ·¢ÏÖй¥»÷±äÖÖ£¬£¬£¬Õë¶ÔÔËÐÐÒ»Ñù·ì϶ӰÏìµÄASA/FTDÈí¼þ°æ±¾µÄÉ豸£¬£¬£¬µ¼ÖÂδ´ò²¹¶¡É豸²»²âÖØÆô¡£
https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/
2. RhysidaÀÕË÷ÍÅ»ïй¶Gemini Group½ü2TBÊý¾Ý
11ÔÂ6ÈÕ£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄRhysidaÀÕË÷Èí¼þÍÅ»ï½üÈÕÔÚ°µÍøÐ¹Â¶ÃÀ¹úÖÆ×÷Òµ¾ÞÍ·Gemini Group½ü2TBÃô¸ÐÊý¾Ý£¬£¬£¬Éæ¼°170ÓàÍò¸öÎļþ£¬£¬£¬Ô̺¬Ô±¹¤Ð½×Ê¡¢¡¢ÐݼÙÓà¶î¡¢¡¢Éç»á°²È«ºÅÂë¡¢¡¢½¡¿µ±£ÏÕÏêÇé¡¢¡¢¿Í»§Ãûµ¥¼°ÄÚ²¿²ÆÕþÎļþµÈ¡£Õâ´Îй¶ʹ1400ÓàÃûÔ±¹¤Ãæ¶ÔÉí·Ý͵ÇÔ¡¢¡¢Ú²Æ¼°ÈËÉí°²È«Íþв·çÏÕ£¬£¬£¬Í¬Ê±Â¶³ö¸£ÌØ¡¢¡¢·áÌï¡¢¡¢Í¨ÓÃÆû³µµÈÖ÷Ìâ¿Í»§µÄ¹©¸øÁ´ÐÅÏ¢£¬£¬£¬¿ÉÄÜÒý·¢ÐÅÀµÎ£»£»úÓë˾·¨×·Ôð¡£Gemini Group×ܲ¿Î»ÓÚÃÜЪ¸ùÖÝ£¬£¬£¬×÷Ϊһ¼¶¹©¸øÉÌÔÚÃÀ¹úºÍÄ«Î÷¸çÉèÓÐ18¸ö·ÖÖ§»ú¹¹£¬£¬£¬ÄêÓªÊÕ3ÒÚÃÀÔª£¬£¬£¬Ö÷ÓªËÜÁϼ·³ö³ÉÐÍ¡¢¡¢½ðÊôÄ£¾ßÖÆ×÷µÈÒµÎñ£¬£¬£¬ÊÇÆû³µÐÐÒµ¹Ø¼ü¹©¸øÉÌ¡£10Ôµף¬£¬£¬RhysidaÍÅ»ïÔÚ°µÍø°ä²¼ÉêÃ÷£¬£¬£¬³ÆÇÔÈ¡ÆäÖØÒªÊý¾Ýºó´ÍÓëÒ»ÖÜ¿íÆÚÏÞ£¬£¬£¬×îÖÕ¹«¿ª1.9TBÊý¾Ý¼¯£¬£¬£¬º¸ÇʵϰÉúÃûµ¥¡¢¡¢²É¹º»ã±¨¡¢¡¢·¢Æ±¼°Ô±¹¤Ð¡ÎÒÕÕÆ¬µÈ¡£
https://cybernews.com/security/gemini-group-rhysida-data-leak/
3. »ªÊ¢¶ÙÓʱ¨ÔâClopÀÕË÷¹¥»÷£¬£¬£¬OracleÁãÈÕ·ì϶²¨¼°È«Çò
11ÔÂ6ÈÕ£¬£¬£¬¡¶»ªÊ¢¶ÙÓʱ¨¡·½üÈÕÈ·ÈϳÉΪClopÀÕË÷Èí¼þ×éÖ¯×îй¥»÷Ö¸±ê£¬£¬£¬¸ÃÍÅ»ïÀûÓÃOracle E-Business Suite£¨EBS£©Æ½Ì¨ÁãÈÕ·ì϶ÌáÒé´ó¹æÄ£¹¥»÷£¬£¬£¬Ä¿Ç°ÒѲ¨¼°È«ÇòÊý°Ù¼Ò×éÖ¯ÇÒÓ°Ïì³ÖÐøÀ©´ó¡£×÷ΪÑÇÂíÑ·Ê×´´È˽ܷò¡¤±´×ô˹ÆìÏÂýÌ壬£¬£¬¸Ã±¨Òò³ÛÃû¶È±»ClopÔÚ°µÍøÐ¹Â¶ÍøÕ¾¶¥²¿Öö¥£¬£¬£¬²¢µ¥¶ÀÒÔ»ÆÉ«×ÖÌå±ê×¢"ÖÒ¸æ"£¬£¬£¬ÍþвÈô²»Ö§¸¶Êê½ð½«Í¨¹ýBitTorrent´ÅÁ¦Á´½Ó¹«¿ª±»µÁÊý¾Ý¡£Oracle EBS×÷ΪȫÇòÊýǧÆóҵʹÓõÄÖ÷ÌâÒµÎñÖÎÀíϵͳ£¬£¬£¬Éæ¼°¿Í»§¡¢¡¢¹©¸øÉÌ¡¢¡¢ÖÆ×÷¡¢¡¢ÎïÁ÷µÈ¶àÁ÷³ÌÖÎÀí¡£Õâ´Î¹¥»÷Ô´ÓÚEBSÈí¼þµÄ¹Ø¼üÁãÈÕ·ì϶£¬£¬£¬¹È¸è×êÑÐÈËÔ±ÔçÔÚ2025Äê7ÔÂÒÑ×·×Ùµ½¸Ã·ì϶£¬£¬£¬µ«OracleÖ±ÖÁ10ÔÂ2ÈÕ²ÅÕýʽ»ã±¨£¬£¬£¬ÇÒ³õ´Î´¹Î£²¹¶¡Ê§°Ü£¬£¬£¬Ö±ÖÁ10ÔÂ11ÈղŰ䲼ÓÐЧÐÞ¸´£¬£¬£¬µ¼Ö¿ͻ§ÔÚÊýÈÕÄÚ´¦ÓÚÒ×Êܹ¥»÷״̬¡£ClopÍÅ»ïÕâ´Î¹¥»÷Ò»Á¬Æä¹ßÓÃÕ½Êõ£º£º£ºÍ¨¹ý°µÍøÐ¹Â¶Ò³ÃæÊ©Ñ¹Êܺ¦Õߣ¬£¬£¬´ËÇ°ÔøÀûÓÃMOVEit¡¢¡¢Fortra GoAnywhereµÈÎļþ´«Ê䷨ʽ·ì϶·¢ÆðÂŴδó¹æÄ£¹¥»÷¡£
https://cybernews.com/security/washington-post-clop-oracle-ebs-victim-zero-day-hack/
4. ³¯ÏʺڿÍÀûÓùȸ蹤¾ßÕë¶Ôº«¹úÓû§Ö´Ðо«×¼¹¥»÷
11ÔÂ10ÈÕ£¬£¬£¬¾Ýº«¹úÍøÂ簲ȫ¹«Ë¾GeniansÅû¶£¬£¬£¬³¯ÏʺڿÍ×é֯ͨ¹ýÀÄÓùȸè"²éÕÒÖÐÐÄ"¹¤¾ßÖ´Ðо«×¼¹¥»÷£¬£¬£¬ÖØÒªÕë¶Ôº«¹úÓû§¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýKakaoTalk½Ó´¥Ç±ÔÚÖ¸±ê£¬£¬£¬ÀûÓ÷Â𺫹ú¹ú˰¾Ö¡¢¡¢¾¯·½µÈ»ú¹¹µÄ´¹µöÐÅÏ¢£¬£¬£¬ÓÕµ¼Óû§Ö´Ðк¬Êý×ÖÊðÃûµÄMSI¶ñÒ⸽¼þ¡£¸Ã¸½¼þͨ¹ýǶÌ×µÄinstall.batºÍerror.vbs¾ç±¾ÖÆ×÷"˵»°°üÃýÎó"¼ÙÏ󣬣¬£¬ÏÖʵ´¥·¢AutoIT¾ç±¾³ÉÁ¢Óƾû¯½Ó¼û¡£¹¥»÷Á´ÖУ¬£¬£¬¶ñÒâ¾ç±¾´ÓC2½ÚµãÏÂÔØRemcosRAT¡¢¡¢QuasarRATµÈÔ¶³Ì½Ó¼ûľÂí£¬£¬£¬ÊµÏÖ¼üÅ̼ͼ¡¢¡¢Æ¾Ö¤ÇÔÈ¡¼°¶þ´ÎÓÐÐ§ÔØºÉÖ²Èë¡£¹¥»÷ÕßÀûÓñ»µÁµÄ¹È¸èÕË»§µÇ¼"²éÕÒÖÐÐÄ"£¬£¬£¬¶¨Î»Ö¸±ê°²×¿É豸µÄGPS×ø±ê£¬£¬£¬Ñ¡ÔñÊܺ¦Õß»§Íâ»î¶¯¡¢¡¢Ó¦¼±ÏìÓ¦ÄÑÌâʱ¶ÎÌáÒé¹¥»÷¡£Í¨¹ýÔ¶³ÌÖØÖúÅÁî²Á³ýÉ豸Êý¾Ý£¬£¬£¬Ö´ÐÐÈý´Î²Á³ý²Ù×÷È·±£É豸³Ö¾ÃÎÞ·¨¸´Ô£¬£¬£¬Í¬Ê±½Ù³ÖÒÑÈëÇÖµÄKakaoTalk PC»á»°ÏòÁªÏµÈË´«²¼²¡¶¾¡£¹¥»÷Õßͨ¹ýÇÔÈ¡Google/NaverÕË»§Æ¾Ö¤£¬£¬£¬Åú¸Ä°²È«ÉèÖò¢¶Ï¸ùÈëÇÖÈÕÖ¾£¬£¬£¬ÊµÏÖÒñ±ÎÓÆ¾Ã»¯½ÚÖÆ¡£¼¼Êõ·ÖÎöÏÔʾ£¬£¬£¬¹¥»÷ÓëKONNI»î¶¯¼¯ÈºÓйØÁª£¬£¬£¬³Ö¾ÃÕë¶Ô½ÌÓý¡¢¡¢µ±¾Ö¡¢¡¢¼ÓÃÜÇ®±ÒµÈÁìÓò¡£
https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/
5. ¶íÂÞ˹¹«ÃñÈϿɲμӶàÆðYanluowangÀÕË÷¹¥»÷
11ÔÂ10ÈÕ£¬£¬£¬¾ÝÃÀ¹ú˾·¨²¿Åû¶£¬£¬£¬¶íÂÞ˹¹«ÃñAleksey Olegovich Volkov£¨±ðºÅ¡°chubaka.kor¡±¡°nets¡±£©ÒÑÇ©ÊðÈÏ×ïºÍ̸£¬£¬£¬ÈÏ¿ÉÔÚ2021Äê7ÔÂÖÁ2022Äê11ÔÂÆÚ¼ä×÷Ϊ¡°³õʼ½Ó¼û´úÀí¡±£¨IAB£©£¬£¬£¬ÎªÕë¶ÔÖÁÉٰ˼ÒÃÀ¹ú¹«Ë¾µÄYanluowangÀÕË÷Èí¼þ¹¥»÷Ìá¹©ÍøÂçÈëÇÖ·þÎñ¡£Volkovͨ¹ýÈëÇÖÆóÒµÍøÂç»ñÈ¡½Ó¼ûȨÏ޺󣬣¬£¬½«ÆäÏúÊÛ¸øÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬ºóÕß²¿ÊðÀÕË÷Èí¼þ¼ÓÃÜÊý¾Ý²¢Ë÷Òª30ÍòÖÁ1500ÍòÃÀÔª²»µÈµÄ±ÈÌØ±ÒÊê½ð¡£FBIµ÷²éÏÔʾ£¬£¬£¬VolkovµÄÉí·Ýͨ¹ý¶àά¶ÈÖ¤¾ÝÁ´±»Ëø¶¨£º£º£º·¨Âɲ¿ÃÅͨ¹ý·þÎñÆ÷ËѲéÁÔÁË̸Ìì¼Í¼¡¢¡¢±»µÁÊý¾Ý¡¢¡¢ÍøÂçÆ¾Ö¤¼°YanluowangÓÊÏäÖ¤¾Ý£»£»½áºÏÆäApple iCloudÕË»§¡¢¡¢¼ÓÃÜÇ®±ÒÂòÂô¼Í¼¼°É罻ýÌåÕ˺Å×·×Ùµ½Æä¶íÂÞ˹»¤ÕÕ¼°µç»°ºÅÂëÐÅÏ¢¡£Ì¸Ìì¼Í¼½øÒ»²½½Òʾ£¬£¬£¬VolkovÓë´úºÅ¡°CC-1¡±µÄͬıԼ¶¨£¬£¬£¬ÒÔÌṩÊܺ¦Õ߯¾Ö¤ÎªÇ°Ìá·ÖµÃÊê½ð±ÈÀý£¬£¬£¬×îÖÕ´Ó150ÍòÃÀÔªÊê½ðÖлñÈ¡·Ö³É¡£´ËÍ⣬£¬£¬ÆäÆ»¹ûÕË»§ÄÚÎļþÏÔʾÓëLockBitÀÕË÷ÍÅ»ï´æÔÚ¹ØÁª£¬£¬£¬°µÊ¾¸ü¿í·ºµÄ·¸×ïÍøÂç¡£VolkovÃæ¶Ô·¸·¨×ªÒÆÉí·Ý¡¢¡¢··Âô½Ó¼ûÐÅÏ¢µÈ11ÏîÖ¸¿Ø£¬£¬£¬×î¸ßÐÌÆÚ´ï53Ä꣬£¬£¬²¢±»ÒªÇóÏòÊܺ¦ÕßÅâ³¥³¬910ÍòÃÀÔª¡£
https://www.bleepingcomputer.com/news/security/yanluowang-initial-access-broker-pleaded-guilty-to-ransomware-attacks/
6. Ê¢ÐеÄJavaScript¿âexpr-eval´æÔÚÔ¶³Ì´úÂëÖ´Ðзì϶
11ÔÂ10ÈÕ£¬£¬£¬Ê¢ÐÐJavaScript¿âexpr-eval±»ÆØ´æÔÚÑÏÖØ°²È«·ì϶£¨CVE-2025-12735£©£¬£¬£¬¸Ã¿âÔÚNPMƽ̨ÿÖÜÏÂÔØÁ¿³¬80Íò´Î£¬£¬£¬±»³¬¹ý250¸öÏîĿʹÓá£ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½«ÆäÑÏÖØË®Æ½ÆÀ¶¨Îª¡°ÑÏÖØ¡±£¬£¬£¬CVSSÆÀ·Ö´ï9.8¡£¸Ã·ì϶Óɰ²È«×êÑÐÔ±Jangwoo Choe·¢ÏÖ£¬£¬£¬Ô´ÓÚ¿âÔÚ´¦ÖÃParser.evaluate()º¯Êýʱδ¶Ô´«ÈëµÄ±äÁ¿/¸ßµÍÎĶÔÏó½øÐгä·ÖÑéÖ¤¡£¹¥»÷Õ߿ɻú¹Ø¶ñÒ⺯Êý¶ÔÏ󣬣¬£¬ÔÚ½âÎö¹ý³ÌÖд¥·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬£¬£¬´Ó¶øÆëÈ«½ÚÖÆÊÜÓ°Ïìϵͳ»òÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£CERTе÷ÖÐÐÄ£¨CERT-CC£©ÖҸ棬£¬£¬´Ë·ì϶¿ÉÄܵ¼ÖÂÈí¼þÐÐΪ±»´Û¸Ä»òϵͳÊý¾Ýй¶¡£expr-eval×î³õÓÉMatthew Crumley¿ª·¢£¬£¬£¬ÊÇÓÃÓÚÔËÐÐʱ°²È«½âÎöÓû§Êýѧ±í°×ʽµÄÇáÁ¿¼¶¹¤¾ß£¬£¬£¬¿í·ºÀûÓÃÓÚÔÚÏßÍÆËãÆ÷¡¢¡¢½ÌÓý¹¤¾ß¡¢¡¢½ðÈÚϵͳ¼°AI/NLP³¡¾°ÖеÄÊýѧ±í°×ʽ½âÎö¡£·ì϶²»½öÓ°ÏìÔʼexpr-eval¿â£¨²»±ä°æ6Äêǰ°ä²¼£©£¬£¬£¬»¹²¨¼°Æä»îÔ¾·ÖÖ§expr-eval-fork£¬£¬£¬¸Ã·ÖÖ§ÔÚNPMÿÖÜÏÂÔØÁ¿³¬8Íò´Î¡£ÐÞ¸´¹æ»®ÒÑËæexpr-eval-fork v3.0.0°æ±¾°ä²¼£¬£¬£¬½¨ÒéÊÜÓ°ÏìÏîÄ¿Á¢¼´Ç¨áãÖÁ¸Ã°æ±¾¡£
https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/


¾©¹«Íø°²±¸11010802024551ºÅ