AflacÊý¾Ýй¶ӰÏìÁè¼Ý2200Íò¿Í»§

Ðû²¼Ê±¼ä 2025-12-24

1. AflacÊý¾Ýй¶ӰÏìÁè¼Ý2200Íò¿Í»§


12ÔÂ24ÈÕ£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ×ôÖÎÑÇÖݵİü¹Ü¾ÞÍ·Aflac 6ÔÂÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý2270Íò¿Í»§¡¢Ô±¹¤¼°ÏàÖúͬ°éµÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬ÆäÖе¿ËÈøË¹ÖÝÊÜÓ°ÏìסÃñ³¬200Íò¡£¡£¡£¡£¸Ã¹«Ë¾×îÐÂÉùÏÔ×Åʾ£¬£¬£¬£¬£¬¾­ÓÉÊýÔÂÊӲ죬£¬£¬£¬£¬ÊÂÎñÒÑÓÚ12ÔÂ4ÈÕÕýʽÁ˰¸¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬ºÚ¿Íͨ¹ýαװITÖ°Ô±ÈëÇÖϵͳ£¬£¬£¬£¬£¬Ö»¹ÜAflacÔÚ¡°¼¸Ð¡Ê±ÄÚ¡±×èÖ¹Á˹¥»÷£¬£¬£¬£¬£¬µ«°ü¹ÜË÷Åâ¡¢¿µ½¡Êý¾Ý¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢ÈÔ±»ÇÔÈ¡¡£¡£¡£¡£¸Ã¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÎ´Éæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ÇÒδ¶Ô¹«Ë¾ÔËÓªÔì³ÉʵÖÊÓ°Ïì¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬AflacÒÑÏò¸÷ÖÝî¿Ïµ»ú¹¹×ª´ïÇéÐΣ¬£¬£¬£¬£¬²¢ÏòÊܺ¦Õß·¢ËÍÊý¾Ýй¶֪ͨÐÅ£¬£¬£¬£¬£¬ÌṩΪÆÚÁ½ÄêµÄÉí·Ý±£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬×¢²á×èÖ¹ÈÕÆÚΪ2026Äê4ÔÂ18ÈÕ¡£¡£¡£¡£Áª°îÖ´·¨²¿·ÖÒѽéÈëÊӲ죬£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇ徲ר¼ÒЭÖú´¦Öóͷ£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÓëÃûΪ¡°É¢ÂäÖ©Ö롱£¨Scattered Spider£©µÄ¿ç¹úÍøÂç·¸·¨ÍÅ»ïÇ×½üÏà¹Ø¡£¡£¡£¡£


https://therecord.media/22-million-impacted-aflac-breach


2. WebRAT¶ñÒâÈí¼þ½èGitHubÐéαÎó²îʹÓóÌÐòÈö²¥


12ÔÂ23ÈÕ£¬£¬£¬£¬£¬Ò»ÖÖÃûΪWebRATµÄÐÅÏ¢ÇÔÈ¡ÐͺóÃŶñÒâÈí¼þÕýͨ¹ýGitHub´æ´¢¿â¾ÙÐдó¹æÄ£·Ö·¢¡£¡£¡£¡£¹¥»÷Õßαװ³É¡°Îó²îʹÓóÌÐòÌṩÕß¡±£¬£¬£¬£¬£¬ÔÚ´æ´¢¿âÖÐÉù³ÆÍйÜÁËÕë¶ÔCVE-2025-59295¡¢CVE-2025-10294¡¢CVE-2025-59230µÈ½üÆÚÅû¶Îó²îµÄ¿´·¨ÑéÖ¤´úÂ룬£¬£¬£¬£¬ÓÕÆ­¿ª·¢ÕßÏÂÔØ¡£¡£¡£¡£¾Ý¿¨°Í˹»ùÇå¾²ÍŶÓÅû¶£¬£¬£¬£¬£¬ÕâЩ´æ´¢¿âÏÖʵ°üÀ¨¶ñÒâ³ÌÐò°ü¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÃÜÂë±£»£»£»£»£»£»¤µÄZIPÎļþ×÷ÎªÔØÌ壬£¬£¬£¬£¬ÄÚº¬¿ÕÎļþ¡¢Ë𻵵ÄÓÕ¶üDLL¡¢Åú´¦Öóͷ£¾ç±¾¼°Ö÷Ͷ·ÅÆ÷¡°rasmanesc.exe¡±¡£¡£¡£¡£¸ÃͶ·ÅÆ÷»áͨ¹ýÌáÉýȨÏÞ¡¢½ûÓÃWindows DefenderµÈÊֶΣ¬£¬£¬£¬£¬´ÓÔ¤ÉèURLÏÂÔØ²¢Ö´ÐÐWebRAT¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÒÑ·¢Ã÷15¸ö´ËÀà¶ñÒâ´æ´¢¿â£¬£¬£¬£¬£¬ÆäÐÅÏ¢½á¹¹ÒÉËÆÓÉAIÌìÉú¡£¡£¡£¡£WebRAT×Ô½ñÄêÄêÍ··ºÆðÒÔÀ´£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ýµÁ°æÈí¼þ¡¢ÓÎÏ·×÷±×¹¤¾ßÈö²¥¡£¡£¡£¡£Æä¹¦Ð§°üÀ¨ÇÔÈ¡Steam¡¢Discord¡¢TelegramÕË»§Æ¾Ö¤¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬£¬Í¨¹ýÉãÏñÍ·¼à¿ØÊܺ¦Õß²¢½ØÈ¡ÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬Í¬Ê±Í¨¹ýÐÞ¸Ä×¢²á±í¡¢ÍýÏëʹÃü¼°ÏµÍ³Ä¿Â¼×¢ÈëµÈ·½·¨½¨É賤ÆÚÐÔ¡£¡£¡£¡£´Ë´Î¹¥»÷ÖÐʹÓõÄWebRAT±äÖÖÓë´Ëǰ¼Í¼µÄÑù±¾¹¦Ð§Ò»Ö¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/


3. αװVPNµÄ¶ñÒâChromeÀ©Õ¹ÇÔÈ¡Óû§Æ¾Ö¤


12ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Á½¿îͬÃû¶ñÒâChromeÀ©Õ¹"»ÃÓ°´©Ëó»ú"£¬£¬£¬£¬£¬»®·ÖÓµÓÐ2000ÃûºÍ180ÃûÓû§¡£¡£¡£¡£ÕâÁ½¿îÓÉͳһ¿ª·¢ÕßÐû²¼µÄ²å¼þαװ³É"¶àËùÔÚÍøÂçËÙÂʲâÊÔ¹¤¾ß"£¬£¬£¬£¬£¬Í¨¹ýÊÕÈ¡1.4-13.5ÃÀÔª¶©ÔÄ·ÑÓÕµ¼Óû§×°Ö㬣¬£¬£¬£¬ÏÖʵִÐÐÁ÷Á¿×èµ²ÓëÆ¾Ö¤ÇÔÈ¡µÄ¶ñÒâ²Ù×÷¡£¡£¡£¡£À©Õ¹³ÌÐòͨ¹ýÐÞ¸ÄÀ¦°óµÄJavaScript¿â£¬£¬£¬£¬£¬ÔÚchrome.webRequest.onAuthRequired×¢²á¼àÌýÆ÷£¬£¬£¬£¬£¬×Ô¶¯ÏòËùÓÐHTTPÉí·ÝÑéÖ¤ÖÊѯעÈëÓ²±àÂëÊðÀíÆ¾Ö¤£¬£¬£¬£¬£¬ÊµÏÖ͸Ã÷ÖÐÐÄÈ˹¥»÷¡£¡£¡£¡£Óû§¸¶¿î¼¤»îVIPÉí·Ýºó£¬£¬£¬£¬£¬À©Õ¹³ÌÐòÆôÓÃ"ÖÇÄÜ"ÊðÀíģʽ£¬£¬£¬£¬£¬Î´À´×ÔGitHub¡¢AWS¡¢Azure¡¢FacebookµÈ170Óà¸ö¸ß¼ÛÖµÓòÃûµÄÁ÷Á¿Â·ÓÉÖÁ¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷¡£¡£¡£¡£À©Õ¹³ÌÐòͨ¹ýÈýÖÖÊðÀíģʽһÁ¬ÇÔÈ¡Êý¾Ý£º¹Ø±Õģʽ½ûÓÃÊðÀí£¬£¬£¬£¬£¬Ê¼ÖÕģʽ·ÓÉËùÓÐÁ÷Á¿£¬£¬£¬£¬£¬ÖÇÄÜģʽ¶¨Ïò·ÓÉÄ¿µÄÓòÃû¡£¡£¡£¡£Æäÿ60ÃëÓëC2ЧÀÍÆ÷¼á³ÖÐÄÌøÍ¨Ñ¶£¬£¬£¬£¬£¬Ã¿Îå·ÖÖÓͨ¹ýHTTP GETÇëÇóй¶VIPÓû§µÄµç×ÓÓʼþ¡¢Ã÷ÎÄÃÜÂëºÍ°æ±¾ºÅ¡£¡£¡£¡£ÕâÖÖ"ÐÄÌøÐ¹Â¶+ÊðÀíÖÐÐÄÈ˹¥»÷"µÄ×éºÏʹ¹¥»÷ÕßÄÜÒ»Á¬²¶»ñÃÜÂë¡¢ÐÅÓÿ¨ºÅ¡¢Éí·ÝÑéÖ¤cookie¡¢APIÃÜÔ¿µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ÉõÖÁΪ¹©Ó¦Á´¹¥»÷ÆÌ·¡£¡£¡£¡£


https://thehackernews.com/2025/12/two-chrome-extensions-caught-secretly.html


4. ±´¿Ë´óѧÔâÍøÂç¹¥»÷ÖÂ5.3ÍòÈËÐÅϢй¶


12ÔÂ23ÈÕ£¬£¬£¬£¬£¬±´¿Ë´óѧλÓÚ¿°ÈøË¹Öݱ«µÂÎÂÊУ¬£¬£¬£¬£¬½¨ÉèÓÚ1858Ä꣬£¬£¬£¬£¬ÓµÓÐÔ¼2000ÃûѧÉú¼°300ÃûÔ±¹¤¡£¡£¡£¡£´Ë´óѧ¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬2024Äê12ÔÂ2ÈÕÖÁ19ÈÕʱ´ú£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖ¸ÃÐ£ÍøÂ磬£¬£¬£¬£¬ÇÔÈ¡53,624È˵ÄСÎÒ˽¼Ò¡¢¿µ½¡¼°²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ò½ÁƼͼ¡¢»¤ÕÕÐÅÏ¢¡¢Éç»á°ü¹ÜºÅÂ롢ѧÉúÖ¤ºÅÂ뼰˰ÎñʶÓÖÃûÂëµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ2024Äê12Ô³õÑ§Ð£ÍøÂç¹ÊÕϺó¼ì²âµ½µÄ¿ÉÒɻ£¬£¬£¬£¬£¬¾­Éó²éÈ·ÈÏÐÅϢй¶¹æÄ£¡£¡£¡£¡£Ñ§Ð£ÌåÏÖ£¬£¬£¬£¬£¬ÏÖÔÚδ·¢Ã÷ÇÔÊØÐÅÏ¢±»ÓÃÓÚڲƭ»î¶¯µÄÖ¤¾Ý£¬£¬£¬£¬£¬µ«ÒÑÏòÊÜÓ°ÏìÕßÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬²¢½¨Òé°´ÆÚ¼ì²éÕË»§¶ÔÕ˵¥¼°ÐÅÓñ¨¸æÒÔÌá·ÀΣº¦¡£¡£¡£¡£±´¿Ë´óѧУ³¤Çǵϡ¤¸£Äá¶ûÇ¿µ÷£¬£¬£¬£¬£¬±£»£»£»£»£»£»¤ÉçÇø³ÉÔ±ÐÅÏ¢Çå¾²ÊÇÖ÷ҪʹÃü£¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬Ñ§Ð£ÒÑÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÍŶÓÏàÖú£¬£¬£¬£¬£¬ÖØÐÞÊÜËðµÄÖ÷Ҫƽ̨¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Ñ§Ð£Î´Ðû²¼¹¥»÷ÏêϸÐÔ×Ó£¬£¬£¬£¬£¬Ò²Î´¹éÒòÓÚÌØ¶¨ÍøÂç·¸·¨×éÖ¯»ò¹ú¼ÒÖ§³ÖÕûÌå¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/baker-university-data-breach-impacts-over-53-000-individuals/


5. n8n¸ßΣÎó²îÖ³¬10ÍòʵÀýÃæÁÙí§Òâ´úÂëÖ´ÐÐΣº¦


12ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨n8n¿ËÈÕ±»Åû¶±£´æ±àºÅΪCVE-2025-68613µÄ¸ßΣÇå¾²Îó²î£¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö£¬£¬£¬£¬£¬Êô¡°ÑÏÖØ¡±¼¶±ð¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÒÑÈÏÖ¤Óû§ÔÚÉèÖÃÊÂÇéÁ÷ʱÌá½»µÄ±í´ïʽ£¬£¬£¬£¬£¬¿ÉÄÜÔÚδÓëµ×²ãÔËÐÐÇéÐγä·Ö¸ôÀëµÄÖ´ÐÐÉÏÏÂÎÄÖб»ÆÊÎöÖ´ÐУ¬£¬£¬£¬£¬µ¼Ö¹¥»÷ÕßÒÔn8nÀú³ÌȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬½ø¶øÍêÈ«¹¥ÏÝÆ½Ì¨ÊµÀý£¬£¬£¬£¬£¬Òý·¢Ãô¸ÐÊý¾Ýй¶¡¢ÊÂÇéÁ÷¸Ä¶¯¡¢ÏµÍ³¼¶¶ñÒâ²Ù×÷µÈÑÏÖØÐ§¹û¡£¡£¡£¡£¾Ýnpmƽ̨ͳ¼Æ£¬£¬£¬£¬£¬n8nÈí¼þ°üÖÜÏÂÔØÁ¿Ô¼5.7Íò´Î£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£º­¸ÇËùÓа汾ºÅ¡Ý0.211.0ÇÒ¡Ü1.120.4µÄn8n³ÌÐò¡£¡£¡£¡£¹¥»÷ÃæÖÎÀíÆ½Ì¨Censys¼à²âÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬×èÖ¹2025Äê12ÔÂ22ÈÕ£¬£¬£¬£¬£¬È«Çò¹æÄ£ÄÚ±£´æÇ±ÔÚÎó²îΣº¦µÄn8nʵÀý¶à´ï103,476¸ö£¬£¬£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÃÀ¹ú¡¢µÂ¹ú¡¢·¨¹ú¡¢°ÍÎ÷¼°ÐÂ¼ÓÆÂµÈ¹ú¼Ò¡£¡£¡£¡£¹Ù·½ÒÑÍê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìÉý¼¶ÖÁÇå¾²°æ±¾¡£¡£¡£¡£ÈôÔÝʱÎÞ·¨°²ÅŲ¹¶¡£¬£¬£¬£¬£¬¿Éͨ¹ý»º½â²½·¥½µµÍΣº¦¡£¡£¡£¡£


https://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html


6. vLex AIÖúÊÖÎó²îÖÂÈ«Çò20Íò»ú¹¹Êý¾Ýй¶Σº¦


12ÔÂ24ÈÕ£¬£¬£¬£¬£¬PromptArmorÑо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬£¬vLexƽ̨µÄÖÇÄÜÖ´·¨ÖúÊÖVincent±£´æÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃʵÑéÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ÇÔÈ¡Óû§µÇ¼ƾ֤¼°Ãô¸Ð¿Í»§Îļþ¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ¹¥»÷Õß¿Éͨ¹ýÔÚÉÏ´«ÖÁƽ̨µÄÎĵµÖÐǶÈëÒþ²ØÎı¾Èç°×µ×°××ÖαÔìÒýÓ£¬£¬£¬£¬ÓÕʹVincentÆÊÎöʱÌìÉú¶ñÒâHTML´úÂ룬£¬£¬£¬£¬×îÖÕÔÚÓû§ä¯ÀÀÆ÷Öд¥·¢¡°ÆÁÄ»µþ¼Ó¡±´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ÐéαµÇ¼½çÃæÁýÕÖÕæÊµÒ³Ãæ£¬£¬£¬£¬£¬ÓÕÆ­Óû§ÊäÈëÆ¾Ö¤¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬´Ë¡°Èý²½¹¥»÷Á´¡±¾ßÓи߶ÈÒþ²ØÐÔ£ºÊ×ÏÈ£¬£¬£¬£¬£¬¹¥»÷Õß½«¶ñÒâ´úÂëǶÈëÍøÂç»ñÈ¡µÄÎĵµ£»£»£»£»£»£»Æä´Î£¬£¬£¬£¬£¬Ö´·¨ÍŶÓÉÏ´«Îĵµºó£¬£¬£¬£¬£¬VincentÆÊÎö¡°Ö±½ÓÒýÓʱ´¥·¢Òþ²Ø´úÂ룻£»£»£»£»£»×îºó£¬£¬£¬£¬£¬ä¯ÀÀÆ÷Ö´ÐдúÂëÏÔʾ·ÂðµÄvLexµÇ¼½çÃæ£¬£¬£¬£¬£¬ÊµÊ±ÇÔÈ¡ÊäÈëÐÅÏ¢¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÀ©Õ¹ÎªÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬µ¼Ö»ỰÁîÅÆ±»µÁ¡¢Áãµã»÷Êý¾Ýй¶¡¢Ç¿ÖÆÎļþÏÂÔØÉõÖÁ¼ÓÃÜÇ®±ÒÍڿ󣬣¬£¬£¬£¬ÇÒÿ´Î·­¿ªÌ¸Ìì´°¿Ú¶¼»áÖØ¸´Ö´Ðй¥»÷¡£¡£¡£¡£


https://cybernews.com/security/vlex-vincent-ai-phishing-vulnerability-lawyers-law-firms/