˼¿Æ·À»ðǽÁãÈÕÎó²îÔâ¹ú¼ÒÖ§³Ö×éÖ¯¹¥»÷
Ðû²¼Ê±¼ä 2025-11-111. ˼¿Æ·À»ðǽÁãÈÕÎó²îÔâ¹ú¼ÒÖ§³Ö×éÖ¯¹¥»÷
11ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬Ë¼¿ÆÓÚ2025Äê9ÔÂ25ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´CVE-2025-20362£¨ÔÊÐíδ¾Éí·ÝÑéÖ¤»á¼ûÊÜÏÞURL£©ºÍCVE-2025-20333£¨ÔÊÐí¾Éí·ÝÑéÖ¤Ô¶³Ì´úÂëÖ´ÐУ©Á½¸ö¸ßΣÎó²î¡£¡£¡£¡£¡£¶þÕß¹ØÁªºó£¬£¬£¬£¬£¬£¬£¬Ô¶³Ìδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÍêÈ«¿ØÖÆÎ´´ò²¹¶¡µÄASAºÍFTD·À»ðǽϵͳ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ×°±¸ÖØÆôÑ»·¼°¾Ü¾øÐ§ÀÍ£¨DoS£©¹¥»÷¡£¡£¡£¡£¡£Í¬ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼½ôÆÈÖ¸Á£¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚ±£»£»£»£»£»£»¤Ë¼¿Æ·À»ðǽװ±¸£¬£¬£¬£¬£¬£¬£¬²¢Ç¿ÖƶϿªÒÑ×èÖ¹Ö§³Ö£¨EoS£©µÄASA×°±¸ÓëÁª°îÍøÂçµÄÅþÁ¬¡£¡£¡£¡£¡£Íþв¼à¿ØÐ§ÀÍShadowserver×·×Ù·¢Ã÷£¬£¬£¬£¬£¬£¬£¬»¥ÁªÍøÉÏ̻¶µÄÒ×Êܹ¥»÷ASAºÍFTDʵÀýÁè¼Ý34,000¸ö£¬£¬£¬£¬£¬£¬£¬9ÔÂδÐÞ²¹·À»ðǽÊýÄ¿¿¿½ü50,000¸ö¡£¡£¡£¡£¡£Ë¼¿ÆÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Óë2024ÄêArcaneDoor¹¥»÷»î¶¯Í¬ÊôÒ»¸ö¹ú¼ÒÖ§³ÖµÄ×éÖ¯£¨Î¢Èí×·×ÙΪSTORM-1849/UAT4356£©£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔøÊ¹ÓÃCVE-2024-20353ºÍCVE-2024-20359Îó²îÈëÇÖÈ«ÇòÕþ¸®ÍøÂ磬£¬£¬£¬£¬£¬£¬°²ÅÅLine DancerÄÚ´æshellcode¼ÓÔØÆ÷ºÍLine RunnerºóÃŶñÒâÈí¼þÒÔά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£2025Äê11ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬£¬Ë¼¿Æ·¢Ã÷й¥»÷±äÖÖ£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÔËÐÐÏàͬÎó²îÓ°ÏìµÄASA/FTDÈí¼þ°æ±¾µÄ×°±¸£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂδ´ò²¹¶¡×°±¸ÒâÍâÖØÆô¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisco-actively-exploited-firewall-flaws-now-abused-for-dos-attacks/
2. RhysidaÀÕË÷ÍÅ»ïй¶Gemini Group½ü2TBÊý¾Ý
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄRhysidaÀÕË÷Èí¼þÍÅ»ï¿ËÈÕÔÚ°µÍøÐ¹Â¶ÃÀ¹úÖÆÔìÒµ¾ÞÍ·Gemini Group½ü2TBÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Éæ¼°170ÓàÍò¸öÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ô±¹¤Ð½×Ê¡¢ÐݼÙÓà¶î¡¢Éç»áÇå¾²ºÅÂë¡¢¿µ½¡°ü¹ÜÏêÇé¡¢¿Í»§Ãûµ¥¼°ÄÚ²¿²ÆÎñÎļþµÈ¡£¡£¡£¡£¡£´Ë´Îй¶ʹ1400ÓàÃûÔ±¹¤ÃæÁÙÉí·Ý͵ÇÔ¡¢Ú²Æ¼°ÈËÉíÇå¾²ÍþвΣº¦£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ì»Â¶¸£ÌØ¡¢·áÌͨÓÃÆû³µµÈ½¹µã¿Í»§µÄ¹©Ó¦Á´ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÒý·¢ÐÅÈÎΣ»£»£»£»£»£»úÓëÖ´·¨×·Ô𡣡£¡£¡£¡£Gemini Group×ܲ¿Î»ÓÚÃÜЪ¸ùÖÝ£¬£¬£¬£¬£¬£¬£¬×÷Ϊһ¼¶¹©Ó¦ÉÌÔÚÃÀ¹úºÍÄ«Î÷¸çÉèÓÐ18¸ö·ÖÖ§»ú¹¹£¬£¬£¬£¬£¬£¬£¬ÄêÓªÊÕ3ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Ö÷ÓªËÜÁϼ·³ö³ÉÐÍ¡¢½ðÊôÄ£¾ßÖÆÔìµÈÓªÒµ£¬£¬£¬£¬£¬£¬£¬ÊÇÆû³µÐÐÒµÒªº¦¹©Ó¦ÉÌ¡£¡£¡£¡£¡£10ÔÂ⣬£¬£¬£¬£¬£¬£¬RhysidaÍÅ»ïÔÚ°µÍøÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬³ÆÇÔÈ¡ÆäÖ÷ÒªÊý¾Ýºó¸øÓèÒ»ÖÜÍÑÆÚÆÚ£¬£¬£¬£¬£¬£¬£¬×îÖÕ¹ûÕæ1.9TBÊý¾Ý¼¯£¬£¬£¬£¬£¬£¬£¬º¸ÇʵϰÉúÃûµ¥¡¢²É¹º±¨¸æ¡¢·¢Æ±¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÕÕÆ¬µÈ¡£¡£¡£¡£¡£
https://cybernews.com/security/gemini-group-rhysida-data-leak/
3. »ªÊ¢¶ÙÓʱ¨ÔâClopÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬OracleÁãÈÕÎó²î²¨¼°È«Çò
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬¡¶»ªÊ¢¶ÙÓʱ¨¡·¿ËÈÕÈ·ÈϳÉΪClopÀÕË÷Èí¼þ×éÖ¯×îй¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïʹÓÃOracle E-Business Suite£¨EBS£©Æ½Ì¨ÁãÈÕÎó²îÌᳫ´ó¹æÄ£¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѲ¨¼°È«ÇòÊý°Ù¼Ò×éÖ¯ÇÒÓ°ÏìÒ»Á¬À©´ó¡£¡£¡£¡£¡£×÷ΪÑÇÂíÑ·Ê×´´È˽ܷò¡¤±´×ô˹ÆìÏÂýÌ壬£¬£¬£¬£¬£¬£¬¸Ã±¨Òò×ÅÃû¶È±»ClopÔÚ°µÍøÐ¹Â¶ÍøÕ¾¶¥²¿Öö¥£¬£¬£¬£¬£¬£¬£¬²¢µ¥¶ÀÒÔ»ÆÉ«×ÖÌå±ê×¢"ÖÒÑÔ"£¬£¬£¬£¬£¬£¬£¬ÍþвÈô²»Ö§¸¶Êê½ð½«Í¨¹ýBitTorrent´ÅÁ¦Á´½Ó¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡£Oracle EBS×÷ΪȫÇòÊýǧÆóҵʹÓõĽ¹µãÓªÒµÖÎÀíϵͳ£¬£¬£¬£¬£¬£¬£¬Éæ¼°¿Í»§¡¢¹©Ó¦ÉÌ¡¢ÖÆÔì¡¢ÎïÁ÷µÈ¶àÁ÷³ÌÖÎÀí¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ô´ÓÚEBSÈí¼þµÄÒªº¦ÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬¹È¸èÑо¿Ö°Ô±ÔçÔÚ2025Äê7ÔÂÒÑ×·×Ùµ½¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬µ«OracleÖ±ÖÁ10ÔÂ2ÈÕ²ÅÕýʽ±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÇÒÊ״νôÆÈ²¹¶¡Ê§°Ü£¬£¬£¬£¬£¬£¬£¬Ö±ÖÁ10ÔÂ11ÈÕ²ÅÐû²¼ÓÐÓÃÐÞ¸´£¬£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§ÔÚÊýÈÕÄÚ´¦ÓÚÒ×Êܹ¥»÷״̬¡£¡£¡£¡£¡£ClopÍÅ»ï´Ë´Î¹¥»÷ÑÓÐøÆäϰÓÃÕ½ÂÔ£ºÍ¨¹ý°µÍøÐ¹Â¶Ò³ÃæÊ©Ñ¹Êܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬´ËÇ°ÔøÊ¹ÓÃMOVEit¡¢Fortra GoAnywhereµÈÎļþ´«Êä³ÌÐòÎó²î·¢¶¯¶à´Î´ó¹æÄ£¹¥»÷¡£¡£¡£¡£¡£
https://cybernews.com/security/washington-post-clop-oracle-ebs-victim-zero-day-hack/
4. ³¯ÏʺڿÍʹÓùȸ蹤¾ßÕë¶Ôº«¹úÓû§ÊµÑ龫׼¹¥»÷
11ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬¾Ýº«¹úÍøÂçÇå¾²¹«Ë¾GeniansÅû¶£¬£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍ×é֯ͨ¹ýÀÄÓùȸè"²éÕÒÖÐÐÄ"¹¤¾ßʵÑ龫׼¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úÓû§¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýKakaoTalk½Ó´¥Ç±ÔÚÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬Ê¹Ó÷Â𺫹ú¹ú˰¾Ö¡¢¾¯·½µÈ»ú¹¹µÄ´¹ÂÚÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§Ö´Ðк¬Êý×ÖÊðÃûµÄMSI¶ñÒ⸽¼þ¡£¡£¡£¡£¡£¸Ã¸½¼þͨ¹ýǶÌ×µÄinstall.batºÍerror.vbs¾ç±¾ÖÆÔì"ÓïÑÔ°ü¹ýʧ"¼ÙÏ󣬣¬£¬£¬£¬£¬£¬ÏÖʵ´¥·¢AutoIT¾ç±¾½¨É賤ÆÚ»¯»á¼û¡£¡£¡£¡£¡£¹¥»÷Á´ÖУ¬£¬£¬£¬£¬£¬£¬¶ñÒâ¾ç±¾´ÓC2½ÚµãÏÂÔØRemcosRAT¡¢QuasarRATµÈÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ¼üÅ̼ͼ¡¢Æ¾Ö¤ÇÔÈ¡¼°¶þ´ÎÓÐÓÃÔØºÉÖ²Èë¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓñ»µÁµÄ¹È¸èÕË»§µÇ¼"²éÕÒÖÐÐÄ"£¬£¬£¬£¬£¬£¬£¬¶¨Î»Ä¿µÄ°²×¿×°±¸µÄGPS×ø±ê£¬£¬£¬£¬£¬£¬£¬Ñ¡ÔñÊܺ¦Õß»§Íâ»î¶¯¡¢Ó¦¼±ÏìÓ¦ÄÑÌâʱ¶ÎÌᳫ¹¥»÷¡£¡£¡£¡£¡£Í¨¹ýÔ¶³ÌÖØÖÃÏÂÁî²Á³ý×°±¸Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐÈý´Î²Á³ý²Ù×÷È·±£×°±¸ºã¾ÃÎÞ·¨»Ö¸´£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ð®ÖÆÒÑÈëÇÖµÄKakaoTalk PC»á»°ÏòÁªÏµÈËÈö²¥²¡¶¾¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÇÔÈ¡Google/NaverÕË»§Æ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÐÞ¸ÄÇå¾²ÉèÖò¢É¨³ýÈëÇÖÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÒþ²Ø³¤ÆÚ»¯¿ØÖÆ¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÓëKONNI»î¶¯¼¯ÈºÏà¹ØÁª£¬£¬£¬£¬£¬£¬£¬ºã¾ÃÕë¶Ô½ÌÓý¡¢Õþ¸®¡¢¼ÓÃÜÇ®±ÒµÈÁìÓò¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/
5. ¶íÂÞ˹¹«ÃñÈϿɼÓÈë¶àÆðYanluowangÀÕË÷¹¥»÷
11ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬¾ÝÃÀ¹ú˾·¨²¿Åû¶£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹¹«ÃñAleksey Olegovich Volkov£¨ÓÖÃû¡°chubaka.kor¡±¡°nets¡±£©ÒÑÇ©ÊðÈÏ×ïÐÒ飬£¬£¬£¬£¬£¬£¬ÈÏ¿ÉÔÚ2021Äê7ÔÂÖÁ2022Äê11ÔÂʱ´ú×÷Ϊ¡°³õʼ»á¼ûÊðÀí¡±£¨IAB£©£¬£¬£¬£¬£¬£¬£¬ÎªÕë¶ÔÖÁÉٰ˼ÒÃÀ¹ú¹«Ë¾µÄYanluowangÀÕË÷Èí¼þ¹¥»÷Ìá¹©ÍøÂçÈëÇÖЧÀÍ¡£¡£¡£¡£¡£Volkovͨ¹ýÈëÇÖÆóÒµÍøÂç»ñÈ¡»á¼ûȨÏ޺󣬣¬£¬£¬£¬£¬£¬½«Æä³öÊÛ¸øÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬£¬£¬£¬£¬ºóÕß°²ÅÅÀÕË÷Èí¼þ¼ÓÃÜÊý¾Ý²¢Ë÷Òª30ÍòÖÁ1500ÍòÃÀÔª²»µÈµÄ±ÈÌØ±ÒÊê½ð¡£¡£¡£¡£¡£FBIÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬VolkovµÄÉí·Ýͨ¹ý¶àά¶ÈÖ¤¾ÝÁ´±»Ëø¶¨£ºÖ´·¨²¿·Öͨ¹ýЧÀÍÆ÷ËѲéÁî»Ö¸´ÁË̸Ìì¼Í¼¡¢±»µÁÊý¾Ý¡¢ÍøÂçÆ¾Ö¤¼°YanluowangÓÊÏäÖ¤¾Ý£»£»£»£»£»£»Á¬ÏµÆäApple iCloudÕË»§¡¢¼ÓÃÜÇ®±ÒÉúÒâ¼Í¼¼°É罻ýÌåÕ˺Å×·×Ùµ½Æä¶íÂÞ˹»¤ÕÕ¼°µç»°ºÅÂëÐÅÏ¢¡£¡£¡£¡£¡£Ì¸Ìì¼Í¼½øÒ»²½Õ¹ÏÖ£¬£¬£¬£¬£¬£¬£¬VolkovÓë´úºÅ¡°CC-1¡±µÄͬıԼ¶¨£¬£¬£¬£¬£¬£¬£¬ÒÔÌṩÊܺ¦Õ߯¾Ö¤ÎªÌõ¼þ·ÖµÃÊê½ð±ÈÀý£¬£¬£¬£¬£¬£¬£¬×îÖÕ´Ó150ÍòÃÀÔªÊê½ðÖлñÈ¡·Ö³É¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÆäÆ»¹ûÕË»§ÄÚÎļþÏÔʾÓëLockBitÀÕË÷ÍŻﱣ´æ¹ØÁª£¬£¬£¬£¬£¬£¬£¬ÌåÏÖ¸üÆÕ±éµÄ·¸·¨ÍøÂç¡£¡£¡£¡£¡£VolkovÃæÁÙ²»·¨×ªÒÆÉí·Ý¡¢ÏúÊÛ»á¼ûÐÅÏ¢µÈ11ÏîÖ¸¿Ø£¬£¬£¬£¬£¬£¬£¬×î¸ßÐÌÆÚ´ï53Ä꣬£¬£¬£¬£¬£¬£¬²¢±»ÒªÇóÏòÊܺ¦ÕßÅâ³¥³¬910ÍòÃÀÔª¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/yanluowang-initial-access-broker-pleaded-guilty-to-ransomware-attacks/
6. Ê¢ÐеÄJavaScript¿âexpr-eval±£´æÔ¶³Ì´úÂëÖ´ÐÐÎó²î
11ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬Ê¢ÐÐJavaScript¿âexpr-eval±»ÆØ±£´æÑÏÖØÇå¾²Îó²î£¨CVE-2025-12735£©£¬£¬£¬£¬£¬£¬£¬¸Ã¿âÔÚNPMƽ̨ÿÖÜÏÂÔØÁ¿³¬80Íò´Î£¬£¬£¬£¬£¬£¬£¬±»Áè¼Ý250¸öÏîĿʹÓᣡ£¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½«ÆäÑÏÖØË®Æ½ÆÀ¶¨Îª¡°ÑÏÖØ¡±£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö´ï9.8¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Jangwoo Choe·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ô´ÓÚ¿âÔÚ´¦Öóͷ£Parser.evaluate()º¯Êýʱδ¶Ô´«ÈëµÄ±äÁ¿/ÉÏÏÂÎŤ¾ß¾ÙÐгä·ÖÑéÖ¤¡£¡£¡£¡£¡£¹¥»÷Õ߿ɽṹ¶ñÒ⺯Êý¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÔÚÆÊÎöÀú³ÌÖд¥·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬£¬£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÊÜÓ°Ïìϵͳ»òÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£CERTе÷ÖÐÐÄ£¨CERT-CC£©ÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬´ËÎó²î¿ÉÄܵ¼ÖÂÈí¼þÐÐΪ±»¸Ä¶¯»òϵͳÊý¾Ýй¶¡£¡£¡£¡£¡£expr-eval×î³õÓÉMatthew Crumley¿ª·¢£¬£¬£¬£¬£¬£¬£¬ÊÇÓÃÓÚÔËÐÐʱÇå¾²ÆÊÎöÓû§Êýѧ±í´ïʽµÄÇáÁ¿¼¶¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÆÕ±éÓ¦ÓÃÓÚÔÚÏßÅÌËãÆ÷¡¢½ÌÓý¹¤¾ß¡¢½ðÈÚϵͳ¼°AI/NLP³¡¾°ÖеÄÊýѧ±í´ïʽÆÊÎö¡£¡£¡£¡£¡£Îó²î²»µ«Ó°ÏìÔʼexpr-eval¿â£¨Îȹ̰æ6ÄêǰÐû²¼£©£¬£¬£¬£¬£¬£¬£¬»¹²¨¼°Æä»îÔ¾·ÖÖ§expr-eval-fork£¬£¬£¬£¬£¬£¬£¬¸Ã·ÖÖ§ÔÚNPMÿÖÜÏÂÔØÁ¿³¬8Íò´Î¡£¡£¡£¡£¡£ÐÞ¸´¼Æ»®ÒÑËæexpr-eval-fork v3.0.0°æ±¾Ðû²¼£¬£¬£¬£¬£¬£¬£¬½¨ÒéÊÜÓ°ÏìÏîÄ¿Á¬Ã¦Ç¨áãÖÁ¸Ã°æ±¾¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/


¾©¹«Íø°²±¸11010802024551ºÅ