Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2025-11-121. Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷
11ÔÂ10ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬Ò»¼ÒΪҽÉúÌṩ¼Æ·ÑЧÀ͵ÄÒ½ÁÆÊÖÒÕ¹«Ë¾Doctor AllianceÔâÓöÍøÂç·¸·¨·Ö×ÓÀÕË÷¹¥»÷¡£¡£¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳ÉÏÐû³Æ£¬£¬£¬ÒÑÇÔÈ¡¸Ã¹«Ë¾Áè¼Ý120ÍòÌõÃô¸ÐÒ½ÁƼͼ£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÕâЩÊý¾Ý¡£¡£¡£±»µÁÊý¾Ýº¸ÇÕï¶ÏЧ¹û¡¢Ìå¼ì×ܽᡢ´¦·½¡¢ÖÎÁƼƻ®¡¢Ò½ÔºÒ½ÖöµÈ½¹µãÒ½ÁÆÐÅÏ¢£¬£¬£¬Í¬Ê±°üÀ¨»¼ÕßÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢¿µ½¡°ü¹ÜË÷Åâ¼Í¼¡¢Ò½ÉúÐÕÃûµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£Çå¾²Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄ200MBÊý¾ÝÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬£¬£¬ÆäÖгäÂú×Å´ó×ÚÎÞ·¨»Ö¸´µÄÒ½ÁƺÍÉúÎïʶ±ðÊý¾Ý¡£¡£¡£´ËÀàÊý¾Ýй¶½«´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓû¼ÕßÉí·ÝÐÅÏ¢¾ÙÐÐÒ½ÁÆÉí·Ý͵ÇÔ£¬£¬£¬Ã°³äÊܺ¦Õß»ñÈ¡´¦·½Ò©»òÒ½ÁÆÐ§ÀÍ£¬£¬£¬ÉõÖÁͨ¹ýÉç½»¹¤³Ì¹¥»÷Ò½ÉúºÍ»¼Õߣ»£»£»£»£»£»£»ÈôÉæ¼°»¼Õß²¡Ê·£¬£¬£¬»¹¿ÉÄÜÒý·¢Ú²ÆÀÕË÷¡£¡£¡£ÓëÃÜÂë»òÐÅÓÿ¨²î±ð£¬£¬£¬Ò½ÁƼͼһµ©Ð¹Â¶ÎÞ·¨Í¨¹ý¸ü¸Ä»Ö¸´£¬£¬£¬µ¼ÖÂΣº¦ºã¾Ã±£´æ¡£¡£¡£
https://cybernews.com/security/doctor-alliance-breach-allegedly-exposes-patients-health-data/
2. Triofox¸ßΣÎó²î±»Ê¹ÓÃʵÏÖÈ«Á´¹¥»÷ÓëȨÏÞÌáÉý
11ÔÂ11ÈÕ£¬£¬£¬¹È¸èMandiantÍŶÓÅû¶£¬£¬£¬Triofoxƽ̨±£´æÑÏÖØÎó²îCVE-2025-12480£¨CVSSÆÀ·Ö9.1£©£¬£¬£¬¹¥»÷Õßͨ¹ý¸ÃÎó²îÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬£¬Ê¹Ó÷À²¡¶¾¹¦Ð§ÉÏ´«²¢Ö´ÐÐÔ¶³Ì»á¼û¹¤¾ß¡£¡£¡£Mandiant×·×Ù·¢Ã÷£¬£¬£¬Íþв¼¯ÈºUNC6485ÔçÔÚ2025Äê8ÔÂ24ÈÕ±ãʹÓôËÎó²î£¬£¬£¬Á¬Ïµ·À²¡¶¾¹¦Ð§ÊµÏÖ´úÂëÖ´ÐУ¬£¬£¬Ðγɡ°Éí·ÝÈÆ¹ý-ÕË»§½¨Éè-¾ç±¾Ö´ÐÐ-ȨÏÞÌáÉý¡±µÄÍêÕû¹¥»÷Á´¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬£¬¹¥»÷Õßͨ¹ýαÔìHTTPÖ÷»úͷΪ¡°localhost¡±£¬£¬£¬ÈƹýTriofox¶ÔAdminAccount.aspxµÈÖÎÀíÒ³ÃæµÄ»á¼û¿ØÖÆ£¬£¬£¬Ê¹ÓÃGladPageUILib.dllÖÐCanRunCriticalPage()º¯ÊýµÄÂ߼ȱÏÝ£¬£¬£¬ÔÚ×°ÖÃÀú³ÌÖн¨Éè¡°¼¯ÈºÖÎÀíÔ±¡±ÕË»§¡£¡£¡£Ëæºó£¬£¬£¬Í¨¹ý·À²¡¶¾¹¦Ð§ÉÏ´«¶ñÒâÅú´¦Öóͷ£Îļþ£¬£¬£¬¸ÃÎļþÔÚÎļþÉÏ´«ÖÁ¹²ÏíÎļþ¼Ðʱ±»´¥·¢£¬£¬£¬ÒÔSYSTEMȨÏÞÖ´ÐÐPowerShellÏÂÔØÆ÷£¬£¬£¬ÏÂÔØÎ±×°³ÉSAgentInstallerµÄ¶ñÒâ³ÌÐò£¬£¬£¬¾²Ä¬×°ÖÃZoho UEMS£¬£¬£¬²¢°²ÅÅZoho AssistºÍAnyDeskʵÏÖÔ¶³Ì»á¼û¡£¡£¡£¹¥»÷Õß½øÒ»²½Ã¶¾ÙSMB»á»°ºÍÓû§ÕË»§£¬£¬£¬ÊµÑéÐÞ¸ÄÃÜÂë²¢ÌáÉýȨÏÞÖÁÍâµØ/ÓòÖÎÀíÔ±£¬£¬£¬Í¬Ê±Í¨¹ý¶Ë¿Ú443½¨ÉèSSH·´ÏòËíµÀ£¬£¬£¬½«ÍâµØRDPЧÀÍת·¢ÖÁ¹¥»÷Õß¿ØÖÆÖ÷»ú£¬£¬£¬Ðγɳ¤ÆÚ»¯»á¼ûͨµÀ¡£¡£¡£MandiantÇ¿µ÷£¬£¬£¬Ö»¹ÜÐÞ¸´°æ±¾16.7.10368.56560ÒÑÐû²¼£¬£¬£¬µ«½¨ÒéÓû§Éý¼¶ÖÁ×îа汾£¬£¬£¬²¢ÉóºËÖÎÀíÔ±ÕË»§ÒÔ¼ì²âÒì³£½¨Éè¡£¡£¡£
https://securityaffairs.com/184439/hacking/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html
3. ClickFixÍøÂç´¹ÂÚ¹¥»÷ʹÓÃPureRATÃé×¼ÂùÝϵͳ
11ÔÂ10ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬Ò»³¡Õë¶ÔÂùÝÒµµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷»î¶¯×Ô2025Äê4ÔÂÒ»Á¬ÖÁ10Ô³õ£¬£¬£¬ÓÉ·¨¹úÇå¾²¹«Ë¾SekoiaÉî¶ÈÆÊÎö¡£¡£¡£¹¥»÷Õßͨ¹ýÈëÇÖÕýµ±ÓÊÏäÕË»§£¬£¬£¬ÏòÂùÝ˾ÌêÍ·ËÍ·ÂðBooking.comµÄ´¹ÂÚÓʼþ£¬£¬£¬ÓÕµ¼Æäµã»÷αװ³ÉreCAPTCHAÑéÖ¤µÄClickFixÉç½»¹¤³ÌÒ³Ãæ¡£¡£¡£¸ÃÒ³Ãæ½ÓÄÉÖØ´óÖØ¶¨Ïò»úÖÆ£¬£¬£¬×îÖÕ´¥·¢¶ñÒâPowerShellÏÂÁ£¬£¬ÏÂÔØº¬DLLÅÔ¼ÓÔØÊÖÒÕµÄZIPѹËõ°ü£¬£¬£¬¼¤»îÄ£¿£¿£¿é»¯Ä¾ÂíPureRAT¡£¡£¡£PureRAT¾ß±¸È«·½Î»¼à¿Ø¹¦Ð§£¬£¬£¬°üÀ¨¼üÅ̼ͼ¡¢Ô¶³Ì¿ØÖÆ¡¢ÉãÏñÍ·²¶»ñ¼°ÎļþÇÔÈ¡£¬£¬£¬²¢Í¨¹ý.NET Reactor»ìÏý±£»£»£»£»£»£»£»¤£¬£¬£¬Ê¹ÓÃ×¢²á±íʵÏÖ³¤ÆÚ»¯×¤Áô¡£¡£¡£¹¥»÷µ½Êֺ󣬣¬£¬·¸·¨·Ö×Ó½øÒ»²½Ê¹ÓÃÇÔÈ¡µÄÂùÝÔ¤¶©Æ½Ì¨ÕË»§£¬£¬£¬Í¨¹ýWhatsApp»òÓʼþÁªÏµÕæÊµ¿Í»§£¬£¬£¬ÒÔ¡°È·ÈÏÔ¤¶©ÐÅÏ¢¡±ÎªÃûÓÕµ¼Æä½øÈë·ÂðµÄBooking.com»òExpediaÒ³Ãæ£¬£¬£¬ÇÔÈ¡ÒøÐп¨ÐÅÏ¢¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬·¸·¨ÍÅ»ï´ÓLolzTeamµÈºÚ¿ÍÂÛ̳¹ºÖÃBooking.comÖÎÀíÔ±ÕË»§ÐÅÏ¢£¬£¬£¬ÉõÖÁ°´ÀûÈó·Ö³ÉÕÐļ·ÖÏúר¼Ò¡£¡£¡£SekoiaÊӲ쵽רѧÉúÒâÔ¤¶©Æ½Ì¨ÈÕÖ¾µÄTelegram»úеÈ˼°ÌṩÈ˹¤ÑéºÅЧÀ͵ĺڲú¹©Ó¦Á´¡£¡£¡£
https://thehackernews.com/2025/11/large-scale-clickfix-phishing-attacks.html
4. Maverick¶ñÒâÈí¼þÐ®ÖÆä¯ÀÀÆ÷»á»°£¬£¬£¬Ãé×¼°ÍÎ÷×î´óÒøÐÐ
11ÔÂ11ÈÕ£¬£¬£¬Çå¾²Ñо¿Ô±·¢Ã÷£¬£¬£¬Á½¿îÕë¶Ô°ÍÎ÷ÒøÐÐÓû§µÄ.NET¶ñÒâÈí¼þCoyoteÓëMaverick±£´æÏÔÖø¹ØÁªÐÔ¡£¡£¡£CyberProof±¨¸æÏÔʾ£¬£¬£¬¶þÕß¾ù¾ß±¸ÒøÐÐURL¶¨Ïò¡¢Ó¦ÓÃ¼à¿Ø¼°WhatsAppÍøÒ³°æÈö²¥ÄÜÁ¦¡£¡£¡£MaverickÓÉÇ÷ÊÆ¿Æ¼¼Ê״μͼµÄ"Ë®ÈøÎ÷"£¨Water Saci£©¹¥»÷»î¶¯ÍƳö£¬£¬£¬°üÀ¨×ÔÈö²¥×é¼þSORVEPOTEL£¬£¬£¬Í¨¹ýWhatsApp×ÀÃæ°æÀ©É¢º¬¶ñÒâZIP°ü¡£¡£¡£¸ÃľÂí¼à¿Øä¯ÀÀÆ÷±êǩҳ£¬£¬£¬Ê¶±ðÀ¶¡ÃÀÖÞ½ðÈÚ»ú¹¹URLºóÅþÁ¬Ô¶³ÌЧÀÍÆ÷£¬£¬£¬ÍÆËÍ´¹ÂÚÒ³ÃæÇÔȡƾ֤¡£¡£¡£SophosÆÊÎöÖ¸³ö£¬£¬£¬Maverick¿ÉÄÜÊÇCoyoteµÄÉý¼¶°æ£¬£¬£¬¿¨°Í˹»ùÔò·¢Ã÷¶þÕß±£´æ´ó×Ú´úÂëÖØµþ£¬£¬£¬µ«½«ÆäÊÓΪ°ÍÎ÷ÐÂÍþв¡£¡£¡£CyberProof×îÐÂÊÓ²ìÕ¹ÏÖ£¬£¬£¬ZIPÎļþÖеÄLNKÎļþÆô¶¯ºó»áÅþÁ¬ÍⲿЧÀÍÆ÷ÏÂÔØÓÐÓÃÔØºÉ£¬£¬£¬½ûÓÃ΢ÈíDefenderºÍUAC£¬£¬£¬¼ÓÔØ¾ß±¸·´ÆÊÎöÊÖÒÕµÄ.NET¼ÓÔØÆ÷£¬£¬£¬×îÖÕ°²ÅÅSORVEPOTELºÍMaverick¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Maverick½öÔÚÈ·ÈÏÊܺ¦ÕßλÓÚ°ÍÎ÷ºó×°Ö㬣¬£¬ÇÒ¹¥»÷Ä¿µÄÒÑÀ©Õ¹ÖÁ°ÍÎ÷Âùݡ£¡£¡£
https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html
5. RhadamanthysÐÅÏ¢ÇÔÈ¡Ðж¯ÔâÖ´·¨ÖÐÖ¹
11ÔÂ11ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±g0njxaºÍGi7w0rm¼à²âµ½£¬£¬£¬ÃûΪRhadamanthysµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ðж¯ÒÑÔâÖÐÖ¹£¬£¬£¬Æä"¿Í»§"ÆÕ±é±¨¸æÎÞ·¨»á¼ûЧÀÍÆ÷¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶©ÔÄģʽÔËÓª£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÐèÿÔÂÏò¿ª·¢ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡Èí¼þ¡¢ÊÖÒÕÖ§³Ö¼°ÓÃÓÚÍøÂç±»µÁÊý¾ÝµÄÍøÂçÃæ°å»á¼ûȨÏÞ¡£¡£¡£ÆäÈö²¥Í¾¾¶°üÀ¨Î±×°³ÉÈí¼þÆÆ½â³ÌÐò¡¢YouTubeÊÓÆµ»ò¶ñÒâËÑË÷¹ã¸æ£¬£¬£¬Ö÷ÒªÇÔÈ¡ä¯ÀÀÆ÷¡¢µç×ÓÓʼþ¿Í»§¶ËµÈÓ¦ÓóÌÐòµÄƾ֤ºÍÉí·ÝÑéÖ¤cookie¡£¡£¡£¾ÝºÚ¿ÍÂÛ̳Óû§·´Ï죬£¬£¬²¿·Ö¿Í»§·¢Ã÷RhadamanthysÍøÂçÃæ°åµÄSSH»á¼ûȨÏÞ±»¸ÄΪ֤ÊéµÇ¼ģʽ£¬£¬£¬ÐèÖØÐÂ×°ÖÃЧÀÍÆ÷²¢É¨³ýºÛ¼££¬£¬£¬µÂ¹ú¾¯·½ÒѽéÈëÊӲ졣¡£¡£¿£¿£¿ª·¢ÕßÍÆ²âµÂ¹úÖ´·¨²¿·ÖΪĻºóºÚÊÖ£¬£¬£¬ÒòÍøÂçÃæ°åÔÚÖÐÖ¹Ç°ÔøÓе¹úIPµØµãµÇ¼¼Í¼¡£¡£¡£Í¬Ê±£¬£¬£¬¸ÃÐж¯µÄTorÑó´ÐÍøÕ¾Ò²ÒÑÀëÏߣ¬£¬£¬µ«Î´ÏÔʾ¾¯·½²é·âºá·ù£¬£¬£¬ÏêϸĻºóʹÓÃÕßÈÔ´ýÈ·ÈÏ¡£¡£¡£´Ë´ÎÖÐÖ¹¿ÉÄÜÓë"ÖÕ¾ÖÐж¯"£¨Operation Endgame£©Óйء£¡£¡£¸ÃÖ´·¨Ðж¯×ÔÆô¶¯ÒÔÀ´£¬£¬£¬ÒѶԶà¸ö¶ñÒâÈí¼þ»ù´¡ÉèÊ©Ôì³ÉÆÆË𡣡£¡£
https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/
6. Ó¢¹ú¹úÃñÒ½ÁÆÐ§ÀÍϵͳNHS UKÔâClopÀÕË÷¹¥»÷
11ÔÂ11ÈÕ£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯ClopÔÚÆä°µÍøÍøÕ¾Ðû³Æ¶ÔÓ¢¹ú¹ú¼ÒÒ½ÁÆÐ§ÀÍϵͳ£¨NHS UK£©Êý¾Ýй¶ÈÏÕæ£¬£¬£¬Ö¸ÔðÆä¡°Ä®ÊÓ¿Í»§Çå¾²¡±¡£¡£¡£¸Ã×é֯ʹÓÃOracle E-Business Suite£¨EBS£©ÖеÄCVE-2025-61882Îó²î£¨CVSSÆÀ·Ö9.8£©ÊµÑé¹¥»÷£¬£¬£¬¸ÃÎó²îÓÚ2025Äê10ÔÂ4ÈÕÓÉOracleÐû²¼½ôÆÈ²¹¶¡ÐÞ¸´£¬£¬£¬µ«Ê¹ÓÃÐÐΪÔçÓÚ²¹¶¡Ðû²¼£¬£¬£¬×Ô2025Äê8ÔÂÆð£¬£¬£¬¹¥»÷Õß±ãÕë¶ÔEBS 12.2.3ÖÁ12.2.14°æ±¾ÖеÄBI PublisherÄ£¿£¿£¿éÌᳫ¹¥»÷£¬£¬£¬Í¨¹ýδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì»á¼ûÇÔÈ¡Êý¾Ý¡£¡£¡£Îó²îÈö²¥Òò2025Äê10ÔÂ3ÈÕScattered Lapsus$ Huntersй¶¿´·¨ÑéÖ¤´úÂë¶ø¼ÓËÙ£¬£¬£¬´ÙʹCl0p¡¢FIN11µÈÍþвÐÐΪÕßÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£½¨ÒéÊÜÓ°Ïì×éÖ¯Á¬Ã¦×°ÖÃ2025Äê10Ô²¹¶¡£¬£¬£¬×·ËÝÖÁ8ÔµÄȡ֤Éó²é£¬£¬£¬²¢¼à¿Ø¿ÉÒÉIP¡£¡£¡£´Ë´Î¹¥»÷²¨¼°¹þ·ð´óѧ¡¢ÃÀ¹úº½¿Õ×Ó¹«Ë¾EnvoyµÈ»ú¹¹£¬£¬£¬Ä¿µÄÖ±Ö¸ÒÀÀµEBS¾ÙÐвÆÎñ¡¢ÈËÁ¦×ÊÔ´¼°¹©Ó¦Á´ÖÎÀíµÄÆóÒµ¡£¡£¡£
https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/


¾©¹«Íø°²±¸11010802024551ºÅ