ºÚ¿ÍʹÓÃ˼¿ÆSNMPÎó²îÔÚ½»Á÷»úÉϰ²ÅÅrootkit
Ðû²¼Ê±¼ä 2025-10-201. ºÚ¿ÍʹÓÃ˼¿ÆSNMPÎó²îÔÚ½»Á÷»úÉϰ²ÅÅrootkit
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼Åû¶£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃ˼¿ÆIOS/IOS XEϵͳÖÐÒÑÐÞ²¹µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2025-20352£¬£¬£¬£¬£¬£¬£¬Õë¶Ô9400¡¢9300¼°¹Å°å3750GϵÁÐδ°²ÅŶ˵ã¼ì²âÏìÓ¦½â¾ö¼Æ»®µÄ×°±¸Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÉæ¼°SNMPÐÒ飬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý»ñÈ¡rootȨÏÞ¿ÉʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬Ë¼¿ÆÒÑÔÚ10ÔÂ6ÈÕ¸üÐÂͨ¸æÖн«Æä±ê¼ÇΪÁãÈÕÎó²î²¢È·Èϱ£´æÀÖ³ÉʹÓð¸Àý¡£¡£¡£¡£¡£¡£¡£¹¥»÷±»×·×ÙΪ"Operation Zero Disco"£¬£¬£¬£¬£¬£¬£¬ÒòÖ²Èë¶ñÒâÈí¼þʱÉèÖÃÁ˰üÀ¨"disco"µÄͨÓûá¼ûÃÜÂë¡£¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß²»µ«Ê¹ÓÃÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬»¹ÊµÑ鸴ÓÃÆßÄêǰ¾ÉÎó²îCVE-2017-3881À©´ó¹¥»÷Ãæ¡£¡£¡£¡£¡£¡£¡£ÀÖ³ÉÉøÍ¸ºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÄ¿µÄϵͳ°²Åž߱¸³¤ÆÚ»¯ÄÜÁ¦µÄLinux Rootkit£¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß°ü¼¯³ÉUDP¿ØÖÆÆ÷£¬£¬£¬£¬£¬£¬£¬¿ÉʵÏֶ˿ڼàÌý¡¢ÈÕÖ¾¸Ä¶¯¡¢ÈƹýAAAÈÏÖ¤ºÍVTY»á¼û¿ØÖÆÁÐ±í¡¢¶¯Ì¬ÐÞ¸ÄͨÓÃÃÜÂë¡¢Òþ²ØÉèÖÃÏî¼°ÖØÖÃʱ¼ä´ÁµÈ²Ù×÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬£¬£¬£¬Ä¿½ñȱ·¦¿É¿¿¹¤¾ß±ê¼ÇÊÜѬȾװ±¸£¬£¬£¬£¬£¬£¬£¬½¨ÒéÏÓÒÉÔâÈëÇÖµÄ×éÖ¯Ö´Ðгõ¼¶¹Ì¼þ¼°ROMÇøÓòÉî¶ÈÊӲ졣¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-cisco-snmp-flaw-to-deploy-rootkit-on-switches/
2. µÃ¿ËÈøË¹ÖݵçÁ¦ÏàÖúÉçÔâ¡°÷è÷롱ÀÕË÷Èí¼þ¹¥»÷
10ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨ÍŻ÷è÷롱£¨Qilin£©ÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇֵÿËÈøË¹ÖÝÁ½¼ÒµçÁ¦·ÖÏúÏàÖúÉ磬£¬£¬£¬£¬£¬£¬Ê¥²®ÄɵµçÁ¦ÏàÖúÉçÓ뿨¶÷˹µçÁ¦ÏàÖúÉ磬£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶Ãô¸Ð²ÆÎñÎļþ¡£¡£¡£¡£¡£¡£¡£Ê¥²®ÄɵÂÏàÖúÉçÓµÓÐ3900Ó¢ÀïÅäµçÏß·£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍ8ÏØÔ¼2.8Íò»§¼ÒÍ¥£¬£¬£¬£¬£¬£¬£¬ÄêÊÕÈë9250ÍòÃÀÔª£»£»£»£»£»£»£»¿¨¶÷˹ÏàÖúÉçÔËÓª½ü5000Ó¢ÀïÏß·£¬£¬£¬£¬£¬£¬£¬ÁýÕÖ12ÏØ2.3Íò»§¼ÒÍ¥£¬£¬£¬£¬£¬£¬£¬ÄêÊÕÈë7580ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£Á½¼Ò»ú¹¹¾ùÊôÃÀ¹úÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬ÆäÇå¾²Ö±½Ó¹ØÏµ¹ú¼ÒÇå¾²¡£¡£¡£¡£¡£¡£¡£¡°÷è÷롱ÔÚÐ¹Â¶ÍøÕ¾Ðû²¼ÁËÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ê¥²®ÄɵµÄÊ×´ÎÊÂÎñ±¨¸æ£¨º¬Ö°Ô±È«Ãû¡¢µç»°¼°ÊÂÎñÏêÇ飩¡¢Äê¶ÈÔ¤Ëã¡¢°ü¹ÜÎļþ¡¢·ÑÂʰ¸Óöȱ¨¸æµÈ£»£»£»£»£»£»£»¿¨¶÷˹·½ÃæÔòй¶Á˶Ê»á³ÉÔ±Ãûµ¥£¨º¬µØµã¡¢ÁªÏµ·½·¨£©¡¢ÊÕÖ§Óà¶î±¨¸æ¡¢×éÖ¯³ÉÔ±Êý¾ÝµÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÊý¾ÝÕæÊµÐÔÉÐδºËʵ£¬£¬£¬£¬£¬£¬£¬µ«ÈôÊôʵ£¬£¬£¬£¬£¬£¬£¬½«Ì»Â¶ÆóÒµ¶¨¼ÛÕ½ÂÔ¡¢Òý·¢ÐÅÈÎΣ»£»£»£»£»£»£»ú»ò¾ºÕùÁÓÊÆ£¬£¬£¬£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¸ü¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢É§Èż°Éç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÓÈÆä¶Ô¶Ê»á³ÉԱΣº¦¼«¸ß¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/texas-electric-coops-ransomware-attack/
3. F5ÅûÂ¶ÖØ´óÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬È«Çò³¬26ÍòBIG-IP×°±¸ÃæÁÙΣº¦
10ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾F5¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬·ÇÓªÀû×éÖ¯Shadowserver Foundation·¢Ã÷È«ÇòÁè¼Ý26.6Íò¸öF5 BIG-IPʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÃÀ¹úÕ¼14.2Íò¸ö£¬£¬£¬£¬£¬£¬£¬Å·ÖÞºÍÑÇÖÞ¹²Ô¼10Íò¸ö¡£¡£¡£¡£¡£¡£¡£F5֤ʵÆäÍøÂçÔâ¹ú¼ÒºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËδ¹ûÕæµÄBIG-IPÇå¾²Îó²îÔ´´úÂë¼°Ïà¹ØÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«Î´·¢Ã÷¹¥»÷ÕßʹÓÃÕâЩÎó²îµÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÍþв£¬£¬£¬£¬£¬£¬£¬F5½ôÆÈÐû²¼²¹¶¡ÐÞ¸´44¸öÎó²î£¨º¬±»ÇÔÈ¡Îó²î£©£¬£¬£¬£¬£¬£¬£¬²¢±Þ²ß¿Í»§¸üÐÂBIG-IP¡¢F5OS¡¢BIG-IP Next for KubernetesµÈϵÁвúÆ·¡£¡£¡£¡£¡£¡£¡£F5 »¹Ò»Ö±ÔÚÓëÆä¿Í»§·ÖÏíÒ»·ÝÍþвÕ÷²ÉÖ¸ÄÏ£¬£¬£¬£¬£¬£¬£¬Éæ¼°BrickstormºóÃųÌÐò¼°UNC5291Íþв×éÖ¯¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Í¬²½Ðû²¼½ôÆÈÖ¸Á£¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ22ÈÕǰΪF5OS¡¢BIG-IP TMOS¡¢BIG-IQºÍBNK/CNF²úÆ·×°ÖÃ×îв¹¶¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäËûF5×°±¸µÄ¸üÐÂ×èÖ¹ÈÕÆÚÑÓÉìÖÁ10ÔÂ31ÈÕ¡£¡£¡£¡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬»ú¹¹ÐèÅÌ»õËùÓÐF5 BIG-IP×°±¸£¬£¬£¬£¬£¬£¬£¬ÆÀ¹ÀÍøÂçÖÎÀí½Ó¿ÚµÄ»¥ÁªÍøÌ»Â¶ÇéÐΣ¬£¬£¬£¬£¬£¬£¬²¢Í£ÓÃÒÑÖÕÖ¹Ö§³ÖµÄ×°±¸¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-266-000-f5-big-ip-instances-exposed-to-remote-attacks/
4. Å·ÖÞµ·»Ù¿ç¹ú²»·¨SIM¿¨ºÐÍøÂ磬£¬£¬£¬£¬£¬£¬ÆÆ»ñ³¬3200Æðڲư¸
10ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Å·ÖÞÐ̾¯×éÖ¯ÁªºÏ¶à¹úÖ´·¨²¿·Ö¿ªÕ¹µÄ"SIMCARTEL"Ðж¯ÖУ¬£¬£¬£¬£¬£¬£¬Àֳɵ·»ÙÒ»¸öÉæ¼°80Óà¹úµÄ²»·¨SIM¿¨ºÐЧÀÍÍøÂç¡£¡£¡£¡£¡£¡£¡£¸Ã·¸·¨×éÖ¯ÔËÓªgogetsms.comºÍapisim.comÁ½¸öÍøÕ¾£¬£¬£¬£¬£¬£¬£¬°²ÅÅ1,200̨SIMºÐ×°±¸¼°40,000ÕÅSIM¿¨£¬£¬£¬£¬£¬£¬£¬ÎªÈ«Çò·¸·¨·Ö×ÓÌṩÐéαµç»°ºÅÂëÒÔ½¨ÉèºÍÑéÖ¤Ú²ÆÐÔÔÚÏßÕË»§£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚʵÑéÍøÂç´¹ÂÚ¡¢Í¶×ÊÕ©Æ¡¢Ã°Ã»Êռ취¡¢ÀÕË÷¼°ÍµÔËÒÆÃñµÈ·¸·¨»î¶¯¡£¡£¡£¡£¡£¡£¡£¾ÝÅ·ÖÞÐ̾¯×é֯ת´ï£¬£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÖ±½Ó¹ØÁª°ÂµØÀû1,700Æð¡¢ÀÍÑάÑÇ1,500Æðڲư¸¼þ£¬£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÔì³É¾¼ÃËðʧ³¬450ÍòÅ·Ôª¡£¡£¡£¡£¡£¡£¡£ÆäÊÖÒռܹ¹Öش󣬣¬£¬£¬£¬£¬£¬¿ÉÒþ²ØÓû§ÕæÊµÉí·ÝºÍλÖ㬣¬£¬£¬£¬£¬£¬Öú³¤½¨Éè4,900Íò¸öÐéÎ±ÍøÂçÕË»§£¬£¬£¬£¬£¬£¬£¬Éæ¼°µçÐÅÕ©Æ¡¢WhatsApp"Ö§ÊôÕ©Æ"¡¢ÐéαͶ×ÊÆ½Ì¨Õ©ÆµÈ¶àÖÖ·¸·¨ÐÎ̬¡£¡£¡£¡£¡£¡£¡£10ÔÂ10ÈÕÐж¯ÖУ¬£¬£¬£¬£¬£¬£¬¾¯·½ÔڰµØÀû¡¢°®É³ÄáÑÇ¡¢·ÒÀ¼¡¢ÀÍÑάÑÇËĹúͬ²½¿ªÕ¹26´ÎËѲ飬£¬£¬£¬£¬£¬£¬¾Ð²¶5ÃûÀÍÑάÑǼ®Ö÷·¸¼°2Ãû¹²·¸£¬£¬£¬£¬£¬£¬£¬½É»ñ¼ÛÖµÊý°ÙÍòÅ·ÔªµÄ×ʲú£º°üÀ¨1,200̨SIMºÐ×°±¸¡¢ÊýÊ®ÍòÕÅSIM¿¨¡¢5̨ЧÀÍÆ÷¡¢¶³½áÒøÐÐÕË»§43.1ÍòÅ·Ôª¼°¼ÓÃÜÇ®±ÒÕË»§33.3ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬²¢¿ÛѺ4Á¾ºÀ»ª³µ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬±»²é·âµÄЧÀÍÆ÷Õý¾ÙÐÐȡ֤ÆÊÎöÒÔ×·Ëݿͻ§Éí·Ý¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/europol-dismantles-sim-box-operation-renting-numbers-for-cybercrime/
5. ÃÀ¹úº½¿Õ×Ó¹«Ë¾Envoy AirÔâClopÀÕË÷ÍŻ﹥»÷
10ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úº½¿ÕÆìÏÂÇøÓòº½¿Õ¹«Ë¾Envoy Air֤ʵ£¬£¬£¬£¬£¬£¬£¬ÆäOracle E-Business SuiteÓ¦ÓóÌÐòÊý¾ÝÔâClopÀÕË÷ÍÅ»ïй¶¡£¡£¡£¡£¡£¡£¡£Envoy AirÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÊÓ²ìºóÈ·ÈϽöÉÙÁ¿ÉÌÒµÐÅÏ¢¼°ÁªÏµ·½·¨Íâй£¬£¬£¬£¬£¬£¬£¬ÎÞÃô¸Ð»ò¿Í»§Êý¾ÝÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÁªÏµÖ´·¨²¿·Ö²¢Õö¿ªÖÜÈ«Éó²é¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓëClopÍÅ»ï8ÔÂÆô¶¯µÄÊý¾Ý͵ÇԻÏà¹Ø£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïͨ¹ýµç×ÓÓʼþÏòÊܺ¦ÆóÒµ·¢ËÍÀÕË÷ÒªÇ󣬣¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡ÁËOracle EBSϵͳÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£OracleÅû¶£¬£¬£¬£¬£¬£¬£¬¹¥»÷ʹÓÃÁ˱àºÅΪCVE-2025-61882ºÍCVE-2025-61884µÄÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäÖÐCVE-2025-61884ÓÚÉÏÖܱ»ÇÄÇÄÐÞ²¹£¬£¬£¬£¬£¬£¬£¬µ«Î´¹ûÕæÆäÔø±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£CrowdStrikeºÍMandiant֤ʵ£¬£¬£¬£¬£¬£¬£¬ClopÔÚ8Ô³õʹÓÃÕâЩÎó²îÈëÇÖϵͳ²¢°²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£×÷Ϊͳһ¹¥»÷Á´µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬£¬¹þ·ð´óѧҲÔâClopÀÕË÷£¬£¬£¬£¬£¬£¬£¬¸ÃУ³Æ½ö¡°Ð¡ÐÍÐÐÕþµ¥Î»Ïà¹Ø·½¡±ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/american-airlines-subsidiary-envoy-confirms-oracle-data-theft-attack/
6. macOSαÔìÆ½Ì¨¹¥»÷ÏÖÐÂÍþв£ºAMOSÓëOdysseyÇÔÈ¡Èí¼þËÁŰ
10ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Õë¶ÔmacOS¿ª·¢Ö°Ô±µÄ¶ñÒâ»î¶¯Ê¹ÓÃαÔìHomebrew¡¢LogMeInºÍTradingViewƽ̨Èö²¥AMOS£¨Atomic macOS Stealer£©¼°OdysseyµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉ¡°ClickFix¡±ÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýGoogle AdsÍÆ¹ãµÄ85¸öðÃûÓòÃûÓÕÆÓû§¸´ÖÆcurlÏÂÁî×°ÖöñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬£¬TradingViewÐéÎ±ÍøÕ¾ÒÔ¡°Ç徲ȷÈÏ¡±Îª»Ï×Ó£¬£¬£¬£¬£¬£¬£¬ÏÖʵ½«base64±àÂëµÄ×°ÖÃÏÂÁî¸´ÖÆµ½¼ôÌù°å£¬£¬£¬£¬£¬£¬£¬Ö´ÐкóÏÂÔØ²¢½âÂë¡°install.sh¡±Îļþ£¬£¬£¬£¬£¬£¬£¬ÈƹýGatekeeper·À»¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬×îÖÕ¼ÓÔØAMOS»òOdyssey¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ¾ß±¸·´ÐéÄâ»ú¼ì²âÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÔËÐкóÊ×ÏÈÒÔrootȨÏÞÍøÂçÖ÷»úÓ²¼þ¡¢ÄÚ´æÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýʹÓÃϵͳЧÀÍ£¨ÈçÖÕÖ¹OneDriveÊØ»¤Àú³Ì£©¼°ÓëmacOS XPCЧÀͽ»»¥£¬£¬£¬£¬£¬£¬£¬½«¶ñÒâ»î¶¯Î±×°³ÉÕýµ±Àú³Ì¡£¡£¡£¡£¡£¡£¡£×îÖÕ¼¤»îÐÅÏ¢ÇÔÈ¡×é¼þ£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ä¯ÀÀÆ÷´æ´¢µÄÃô¸ÐÊý¾Ý¡¢¼ÓÃÜÇ®±ÒÇ®°üƾ֤¡¢Ô¿³×´®ÄÚÈݼ°Ð¡ÎÒ˽¼ÒÎļþ£¬£¬£¬£¬£¬£¬£¬ÒÔZIPÃûÌûش«ÖÁ¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-ads-for-fake-homebrew-logmein-sites-push-infostealers/


¾©¹«Íø°²±¸11010802024551ºÅ