ºÚ¿ÍʹÓÃ˼¿ÆSNMPÎó²îÔÚ½»Á÷»úÉϰ²ÅÅrootkit

Ðû²¼Ê±¼ä 2025-10-20

1. ºÚ¿ÍʹÓÃ˼¿ÆSNMPÎó²îÔÚ½»Á÷»úÉϰ²ÅÅrootkit


10ÔÂ16ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼Åû¶£¬£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃ˼¿ÆIOS/IOS XEϵͳÖÐÒÑÐÞ²¹µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2025-20352£¬£¬£¬£¬ £¬£¬£¬Õë¶Ô9400¡¢9300¼°¹Å°å3750GϵÁÐδ°²ÅŶ˵ã¼ì²âÏìÓ¦½â¾ö¼Æ»®µÄ×°±¸Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÉæ¼°SNMPЭÒ飬£¬£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ý»ñÈ¡rootȨÏÞ¿ÉʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬ £¬£¬£¬Ë¼¿ÆÒÑÔÚ10ÔÂ6ÈÕ¸üÐÂͨ¸æÖн«Æä±ê¼ÇΪÁãÈÕÎó²î²¢È·Èϱ£´æÀÖ³ÉʹÓð¸Àý¡£¡£¡£¡£¡£¡£¡£¹¥»÷±»×·×ÙΪ"Operation Zero Disco"£¬£¬£¬£¬ £¬£¬£¬ÒòÖ²Èë¶ñÒâÈí¼þʱÉèÖÃÁ˰üÀ¨"disco"µÄͨÓûá¼ûÃÜÂë¡£¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß²»µ«Ê¹ÓÃÐÂÎó²î£¬£¬£¬£¬ £¬£¬£¬»¹ÊµÑ鸴ÓÃÆßÄêǰ¾ÉÎó²îCVE-2017-3881À©´ó¹¥»÷Ãæ¡£¡£¡£¡£¡£¡£¡£ÀÖ³ÉÉøÍ¸ºó£¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÔÚÄ¿µÄϵͳ°²Åž߱¸³¤ÆÚ»¯ÄÜÁ¦µÄLinux Rootkit£¬£¬£¬£¬ £¬£¬£¬¸Ã¹¤¾ß°ü¼¯³ÉUDP¿ØÖÆÆ÷£¬£¬£¬£¬ £¬£¬£¬¿ÉʵÏֶ˿ڼàÌý¡¢ÈÕÖ¾¸Ä¶¯¡¢ÈƹýAAAÈÏÖ¤ºÍVTY»á¼û¿ØÖÆÁÐ±í¡¢¶¯Ì¬ÐÞ¸ÄͨÓÃÃÜÂë¡¢Òþ²ØÉèÖÃÏî¼°ÖØÖÃʱ¼ä´ÁµÈ²Ù×÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬ £¬£¬£¬Ä¿½ñȱ·¦¿É¿¿¹¤¾ß±ê¼ÇÊÜѬȾװ±¸£¬£¬£¬£¬ £¬£¬£¬½¨ÒéÏÓÒÉÔâÈëÇÖµÄ×éÖ¯Ö´Ðгõ¼¶¹Ì¼þ¼°ROMÇøÓòÉî¶ÈÊӲ졣¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-cisco-snmp-flaw-to-deploy-rootkit-on-switches/


2. µÃ¿ËÈøË¹ÖݵçÁ¦ÏàÖúÉçÔâ¡°÷è÷롱ÀÕË÷Èí¼þ¹¥»÷


10ÔÂ14ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÍøÂç·¸·¨ÍŻ÷è÷롱£¨Qilin£©ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇֵÿËÈøË¹ÖÝÁ½¼ÒµçÁ¦·ÖÏúÏàÖúÉ磬£¬£¬£¬ £¬£¬£¬Ê¥²®ÄɵµçÁ¦ÏàÖúÉçÓ뿨¶÷˹µçÁ¦ÏàÖúÉ磬£¬£¬£¬ £¬£¬£¬²¢Ð¹Â¶Ãô¸Ð²ÆÎñÎļþ¡£¡£¡£¡£¡£¡£¡£Ê¥²®ÄɵÂÏàÖúÉçÓµÓÐ3900Ó¢ÀïÅäµçÏß·£¬£¬£¬£¬ £¬£¬£¬Ð§ÀÍ8ÏØÔ¼2.8Íò»§¼ÒÍ¥£¬£¬£¬£¬ £¬£¬£¬ÄêÊÕÈë9250ÍòÃÀÔª£»£»£»£»£»£»£»¿¨¶÷˹ÏàÖúÉçÔËÓª½ü5000Ó¢ÀïÏß·£¬£¬£¬£¬ £¬£¬£¬ÁýÕÖ12ÏØ2.3Íò»§¼ÒÍ¥£¬£¬£¬£¬ £¬£¬£¬ÄêÊÕÈë7580ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£Á½¼Ò»ú¹¹¾ùÊôÃÀ¹úÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬ £¬£¬£¬ÆäÇå¾²Ö±½Ó¹ØÏµ¹ú¼ÒÇå¾²¡£¡£¡£¡£¡£¡£¡£¡°÷è÷롱ÔÚÐ¹Â¶ÍøÕ¾Ðû²¼ÁËÊý¾ÝÑù±¾£¬£¬£¬£¬ £¬£¬£¬°üÀ¨Ê¥²®ÄɵµÄÊ×´ÎÊÂÎñ±¨¸æ£¨º¬Ö°Ô±È«Ãû¡¢µç»°¼°ÊÂÎñÏêÇ飩¡¢Äê¶ÈÔ¤Ëã¡¢°ü¹ÜÎļþ¡¢·ÑÂʰ¸Óöȱ¨¸æµÈ£»£»£»£»£»£»£»¿¨¶÷˹·½ÃæÔòй¶Á˶­Ê»á³ÉÔ±Ãûµ¥£¨º¬µØµã¡¢ÁªÏµ·½·¨£©¡¢ÊÕÖ§Óà¶î±¨¸æ¡¢×éÖ¯³ÉÔ±Êý¾ÝµÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÊý¾ÝÕæÊµÐÔÉÐδºËʵ£¬£¬£¬£¬ £¬£¬£¬µ«ÈôÊôʵ£¬£¬£¬£¬ £¬£¬£¬½«Ì»Â¶ÆóÒµ¶¨¼ÛÕ½ÂÔ¡¢Òý·¢ÐÅÈÎΣ»£»£»£»£»£»£»ú»ò¾ºÕùÁÓÊÆ£¬£¬£¬£¬ £¬£¬£¬Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¸ü¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢É§Èż°Éç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬ £¬£¬£¬ÓÈÆä¶Ô¶­Ê»á³ÉԱΣº¦¼«¸ß¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/texas-electric-coops-ransomware-attack/


3. F5ÅûÂ¶ÖØ´óÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬£¬È«Çò³¬26ÍòBIG-IP×°±¸ÃæÁÙΣº¦


10ÔÂ17ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÍøÂçÇå¾²¹«Ë¾F5¿ËÈÕÅû¶£¬£¬£¬£¬ £¬£¬£¬·ÇÓªÀû×éÖ¯Shadowserver Foundation·¢Ã÷È«ÇòÁè¼Ý26.6Íò¸öF5 BIG-IPʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬ £¬£¬£¬ÆäÖÐÃÀ¹úÕ¼14.2Íò¸ö£¬£¬£¬£¬ £¬£¬£¬Å·ÖÞºÍÑÇÖÞ¹²Ô¼10Íò¸ö¡£¡£¡£¡£¡£¡£¡£F5֤ʵÆäÍøÂçÔâ¹ú¼ÒºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ £¬£¬£¬ÇÔÈ¡ÁËδ¹ûÕæµÄBIG-IPÇå¾²Îó²îÔ´´úÂë¼°Ïà¹ØÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬µ«Î´·¢Ã÷¹¥»÷ÕßʹÓÃÕâЩÎó²îµÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÍþв£¬£¬£¬£¬ £¬£¬£¬F5½ôÆÈÐû²¼²¹¶¡ÐÞ¸´44¸öÎó²î£¨º¬±»ÇÔÈ¡Îó²î£©£¬£¬£¬£¬ £¬£¬£¬²¢±Þ²ß¿Í»§¸üÐÂBIG-IP¡¢F5OS¡¢BIG-IP Next for KubernetesµÈϵÁвúÆ·¡£¡£¡£¡£¡£¡£¡£F5 »¹Ò»Ö±ÔÚÓëÆä¿Í»§·ÖÏíÒ»·ÝÍþвÕ÷²ÉÖ¸ÄÏ£¬£¬£¬£¬ £¬£¬£¬Éæ¼°BrickstormºóÃųÌÐò¼°UNC5291Íþв×éÖ¯¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Í¬²½Ðû²¼½ôÆÈÖ¸Á£¬£¬£¬ £¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ22ÈÕǰΪF5OS¡¢BIG-IP TMOS¡¢BIG-IQºÍBNK/CNF²úÆ·×°ÖÃ×îв¹¶¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬ £¬£¬£¬²¢½«ÆäËûF5×°±¸µÄ¸üÐÂ×èÖ¹ÈÕÆÚÑÓÉìÖÁ10ÔÂ31ÈÕ¡£¡£¡£¡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬£¬ £¬£¬£¬»ú¹¹ÐèÅÌ»õËùÓÐF5 BIG-IP×°±¸£¬£¬£¬£¬ £¬£¬£¬ÆÀ¹ÀÍøÂçÖÎÀí½Ó¿ÚµÄ»¥ÁªÍøÌ»Â¶ÇéÐΣ¬£¬£¬£¬ £¬£¬£¬²¢Í£ÓÃÒÑÖÕÖ¹Ö§³ÖµÄ×°±¸¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-266-000-f5-big-ip-instances-exposed-to-remote-attacks/


4. Å·ÖÞµ·»Ù¿ç¹ú²»·¨SIM¿¨ºÐÍøÂ磬£¬£¬£¬ £¬£¬£¬ÆÆ»ñ³¬3200Æðڲƭ°¸


10ÔÂ17ÈÕ£¬£¬£¬£¬ £¬£¬£¬Å·ÖÞÐ̾¯×éÖ¯ÁªºÏ¶à¹úÖ´·¨²¿·Ö¿ªÕ¹µÄ"SIMCARTEL"Ðж¯ÖУ¬£¬£¬£¬ £¬£¬£¬Àֳɵ·»ÙÒ»¸öÉæ¼°80Óà¹úµÄ²»·¨SIM¿¨ºÐЧÀÍÍøÂç¡£¡£¡£¡£¡£¡£¡£¸Ã·¸·¨×éÖ¯ÔËÓªgogetsms.comºÍapisim.comÁ½¸öÍøÕ¾£¬£¬£¬£¬ £¬£¬£¬°²ÅÅ1,200̨SIMºÐ×°±¸¼°40,000ÕÅSIM¿¨£¬£¬£¬£¬ £¬£¬£¬ÎªÈ«Çò·¸·¨·Ö×ÓÌṩÐéαµç»°ºÅÂëÒÔ½¨ÉèºÍÑé֤ڲƭÐÔÔÚÏßÕË»§£¬£¬£¬£¬ £¬£¬£¬ÓÃÓÚʵÑéÍøÂç´¹ÂÚ¡¢Í¶×ÊÕ©Æ­¡¢Ã°Ã»Êռ취¡¢ÀÕË÷¼°ÍµÔËÒÆÃñµÈ·¸·¨»î¶¯¡£¡£¡£¡£¡£¡£¡£¾ÝÅ·ÖÞÐ̾¯×é֯ת´ï£¬£¬£¬£¬ £¬£¬£¬¸ÃЧÀÍÖ±½Ó¹ØÁª°ÂµØÀû1,700Æð¡¢À­ÍÑάÑÇ1,500Æðڲƭ°¸¼þ£¬£¬£¬£¬ £¬£¬£¬ÀÛ¼ÆÔì³É¾­¼ÃËðʧ³¬450ÍòÅ·Ôª¡£¡£¡£¡£¡£¡£¡£ÆäÊÖÒռܹ¹Öش󣬣¬£¬£¬ £¬£¬£¬¿ÉÒþ²ØÓû§ÕæÊµÉí·ÝºÍλÖ㬣¬£¬£¬ £¬£¬£¬Öú³¤½¨Éè4,900Íò¸öÐéÎ±ÍøÂçÕË»§£¬£¬£¬£¬ £¬£¬£¬Éæ¼°µçÐÅÕ©Æ­¡¢WhatsApp"Ö§ÊôÕ©Æ­"¡¢ÐéαͶ×ÊÆ½Ì¨Õ©Æ­µÈ¶àÖÖ·¸·¨ÐÎ̬¡£¡£¡£¡£¡£¡£¡£10ÔÂ10ÈÕÐж¯ÖУ¬£¬£¬£¬ £¬£¬£¬¾¯·½ÔڰµØÀû¡¢°®É³ÄáÑÇ¡¢·ÒÀ¼¡¢À­ÍÑάÑÇËĹúͬ²½¿ªÕ¹26´ÎËѲ飬£¬£¬£¬ £¬£¬£¬¾Ð²¶5ÃûÀ­ÍÑάÑǼ®Ö÷·¸¼°2Ãû¹²·¸£¬£¬£¬£¬ £¬£¬£¬½É»ñ¼ÛÖµÊý°ÙÍòÅ·ÔªµÄ×ʲú£º°üÀ¨1,200̨SIMºÐ×°±¸¡¢ÊýÊ®ÍòÕÅSIM¿¨¡¢5̨ЧÀÍÆ÷¡¢¶³½áÒøÐÐÕË»§43.1ÍòÅ·Ôª¼°¼ÓÃÜÇ®±ÒÕË»§33.3ÍòÃÀÔª£¬£¬£¬£¬ £¬£¬£¬²¢¿ÛѺ4Á¾ºÀ»ª³µ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬£¬±»²é·âµÄЧÀÍÆ÷Õý¾ÙÐÐȡ֤ÆÊÎöÒÔ×·Ëݿͻ§Éí·Ý¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/europol-dismantles-sim-box-operation-renting-numbers-for-cybercrime/


5. ÃÀ¹úº½¿Õ×Ó¹«Ë¾Envoy AirÔâClopÀÕË÷ÍŻ﹥»÷


10ÔÂ17ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÃÀ¹úº½¿ÕÆìÏÂÇøÓòº½¿Õ¹«Ë¾Envoy Air֤ʵ£¬£¬£¬£¬ £¬£¬£¬ÆäOracle E-Business SuiteÓ¦ÓóÌÐòÊý¾ÝÔâClopÀÕË÷ÍÅ»ïй¶¡£¡£¡£¡£¡£¡£¡£Envoy AirÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬ÊÓ²ìºóÈ·ÈϽöÉÙÁ¿ÉÌÒµÐÅÏ¢¼°ÁªÏµ·½·¨Íâй£¬£¬£¬£¬ £¬£¬£¬ÎÞÃô¸Ð»ò¿Í»§Êý¾ÝÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÁªÏµÖ´·¨²¿·Ö²¢Õö¿ªÖÜÈ«Éó²é¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓëClopÍÅ»ï8ÔÂÆô¶¯µÄÊý¾Ý͵ÇԻÏà¹Ø£¬£¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ïͨ¹ýµç×ÓÓʼþÏòÊܺ¦ÆóÒµ·¢ËÍÀÕË÷ÒªÇ󣬣¬£¬£¬ £¬£¬£¬Éù³ÆÇÔÈ¡ÁËOracle EBSϵͳÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£OracleÅû¶£¬£¬£¬£¬ £¬£¬£¬¹¥»÷ʹÓÃÁ˱àºÅΪCVE-2025-61882ºÍCVE-2025-61884µÄÁãÈÕÎó²î£¬£¬£¬£¬ £¬£¬£¬ÆäÖÐCVE-2025-61884ÓÚÉÏÖܱ»ÇÄÇÄÐÞ²¹£¬£¬£¬£¬ £¬£¬£¬µ«Î´¹ûÕæÆäÔø±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£CrowdStrikeºÍMandiant֤ʵ£¬£¬£¬£¬ £¬£¬£¬ClopÔÚ8Ô³õʹÓÃÕâЩÎó²îÈëÇÖϵͳ²¢°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£×÷Ϊͳһ¹¥»÷Á´µÄÒ»²¿·Ö£¬£¬£¬£¬ £¬£¬£¬¹þ·ð´óѧҲÔâClopÀÕË÷£¬£¬£¬£¬ £¬£¬£¬¸ÃУ³Æ½ö¡°Ð¡ÐÍÐÐÕþµ¥Î»Ïà¹Ø·½¡±ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/american-airlines-subsidiary-envoy-confirms-oracle-data-theft-attack/


6. macOSαÔìÆ½Ì¨¹¥»÷ÏÖÐÂÍþв£ºAMOSÓëOdysseyÇÔÈ¡Èí¼þËÁŰ


10ÔÂ18ÈÕ£¬£¬£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ £¬£¬£¬Õë¶ÔmacOS¿ª·¢Ö°Ô±µÄ¶ñÒâ»î¶¯Ê¹ÓÃαÔìHomebrew¡¢LogMeInºÍTradingViewƽ̨Èö²¥AMOS£¨Atomic macOS Stealer£©¼°OdysseyµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉ¡°ClickFix¡±ÊÖÒÕ£¬£¬£¬£¬ £¬£¬£¬Í¨¹ýGoogle AdsÍÆ¹ãµÄ85¸öðÃûÓòÃûÓÕÆ­Óû§¸´ÖÆcurlÏÂÁî×°ÖöñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬ £¬£¬£¬TradingViewÐéÎ±ÍøÕ¾ÒÔ¡°Ç徲ȷÈÏ¡±Îª»Ï×Ó£¬£¬£¬£¬ £¬£¬£¬ÏÖʵ½«base64±àÂëµÄ×°ÖÃÏÂÁî¸´ÖÆµ½¼ôÌù°å£¬£¬£¬£¬ £¬£¬£¬Ö´ÐкóÏÂÔØ²¢½âÂë¡°install.sh¡±Îļþ£¬£¬£¬£¬ £¬£¬£¬ÈƹýGatekeeper·À»¤»úÖÆ£¬£¬£¬£¬ £¬£¬£¬×îÖÕ¼ÓÔØAMOS»òOdyssey¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ¾ß±¸·´ÐéÄâ»ú¼ì²âÄÜÁ¦£¬£¬£¬£¬ £¬£¬£¬ÔËÐкóÊ×ÏÈÒÔrootȨÏÞÍøÂçÖ÷»úÓ²¼þ¡¢ÄÚ´æÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬²¢Í¨¹ýʹÓÃϵͳЧÀÍ£¨ÈçÖÕÖ¹OneDriveÊØ»¤Àú³Ì£©¼°ÓëmacOS XPCЧÀͽ»»¥£¬£¬£¬£¬ £¬£¬£¬½«¶ñÒâ»î¶¯Î±×°³ÉÕýµ±Àú³Ì¡£¡£¡£¡£¡£¡£¡£×îÖÕ¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ£¬£¬£¬£¬ £¬£¬£¬ÇÔÈ¡ä¯ÀÀÆ÷´æ´¢µÄÃô¸ÐÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üƾ֤¡¢Ô¿³×´®ÄÚÈݼ°Ð¡ÎÒ˽¼ÒÎļþ£¬£¬£¬£¬ £¬£¬£¬ÒÔZIPÃûÌûش«ÖÁ¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/google-ads-for-fake-homebrew-logmein-sites-push-infostealers/