CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ
Ðû²¼Ê±¼ä 2025-11-251. CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ
11ÔÂ21ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬£¬£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê12ÔÂ12ÈÕǰÐÞ¸´Oracle Identity ManagerµÄCVE-2025-61757Îó²î¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪ¡°ÁãÈÕÎó²î¡±£¬£¬£¬Òѱ»ÏÖÊÊÓÃÓÚ¹¥»÷£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£CVE-2025-61757ÊÇOracle Identity Manager REST APIÖб£´æµÄÉí·ÝÑé֤ǰԶ³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬ÓÉSearchlight CyberÆÊÎöʦAdam KuesºÍShubham Shahflaw·¢Ã÷²¢Åû¶¡£¡£¡£¡£¡£Îó²îÔ´ÓÚ¹¥»÷Õß¿Éͨ¹ýÔÚURL·¾¶ÖÐÌí¼Ó¡°--public-access¡±»òÀàËÆ²ÎÊý£¬£¬£¬ÓÕÆÇå¾²¹ýÂËÆ÷½«Êܱ£»£»£»¤¶ËµãÊÓΪ¹ûÕæ¿É»á¼û£¬£¬£¬´Ó¶øÈƹýÉí·ÝÑéÖ¤Ö±½Ó»á¼ûGroovy¾ç±¾±àÒë¶Ëµã¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃGroovyµÄ×¢½â´¦Öóͷ£¹¦Ð§£¬£¬£¬ÔÚ±àÒëʱעÈë¶ñÒâ´úÂëʵÏÖÔ¶³ÌÖ´ÐУ¬£¬£¬ÎÞÐèÈκÎÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£OracleÒÑÓÚ2025Äê10ÔÂ21ÈÕÐû²¼Çå¾²¸üÐÂÐÞ¸´¸ÃÎó²î£¬£¬£¬µ«CISAÇ¿µ÷£¬£¬£¬¸ÃÎó²îÒòÊÖÒÕÃż÷µÍ¡¢Ê¹ÓüòÆÓ£¬£¬£¬¼«Ò×±»ÍþвÐÐΪÕß¿ìËÙ¸´ÖÆÊ¹Óᣡ£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-oracle-identity-manager-rce-flaw-is-being-actively-exploited/
2. ¶íÏà¹Ø¹¥»÷½è3DÊг¡´«StealC V2ÇÔÃÜÈí¼þ
11ÔÂ24ÈÕ£¬£¬£¬Óë¶íÂÞ˹Ïà¹ØµÄÍøÂç¹¥»÷»î¶¯Õýͨ¹ýCGTraderµÈ3DÄ£×ÓÊг¡Èö²¥StealC V2ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃBlender¿ªÔ´3DÈí¼þÌØÕ÷£¬£¬£¬½«¶ñÒâPython´úÂëǶÈë.blendÎļþÖС£¡£¡£¡£¡£µ±Óû§ÆôÓÃBlenderµÄ×Ô¶¯ÔËÐй¦Ð§Ê±£¬£¬£¬·¿ªº¬¶ñÒâ¾ç±¾µÄ½ÇÉ«°ó¶¨Îļþ»á´¥·¢×Ô¶¯¼ÓÔØ£¬£¬£¬¸Ã¾ç±¾Í¨¹ýCloudflare WorkersÓò»ñÈ¡¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬½ø¶øÏÂÔØPowerShell¾ç±¾£¬£¬£¬×îÖÕ´Ó¹¥»÷Õß¿ØÖƵÄIPµØµã¼ìË÷Á½¸öZIP´æµµ¡£¡£¡£¡£¡£ÕâЩѹËõÎļþ½âѹÖÁ%TEMP%Îļþ¼Ð£¬£¬£¬²¢ÔÚÆô¶¯Ä¿Â¼°²ÅÅLNKÎļþʵÏÖ³¤ÆÚ»¯£¬£¬£¬Í¬Ê±°²ÅÅStealCÖ÷ÇÔÈ¡Æ÷¼°¸¨ÖúPythonÇÔÈ¡Æ÷ÐγÉÈßÓ౸·Ý¡£¡£¡£¡£¡£Morphisec¹«Ë¾Ö¸³ö£¬£¬£¬±¾´Î¹¥»÷ʹÓõÄStealCΪ½ñÄêÔçЩʱ¼äZscalerÆÊÎöµÄµÚ¶þ¸öÖ÷Òª°æ±¾µÄ×îбäÖÖ¡£¡£¡£¡£¡£Ð°æStealCÀ©Õ¹ÁËÊý¾ÝÇÔÈ¡ÄÜÁ¦£¬£¬£¬Ö§³Ö´Ó23ÖÖÒÔÉÏä¯ÀÀÆ÷¡¢100Óà¸ö¼ÓÃÜÇ®±ÒÇ®°üÀ©Õ¹/Ó¦Óá¢Telegram¡¢DiscordµÈͨѶ¹¤¾ß¡¢VPN¼°Óʼþ¿Í»§¶ËÇÔÈ¡Êý¾Ý£¬£¬£¬²¢Å䱸¸üеÄUACÈÆ¹ý»úÖÆ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-blender-model-files-deliver-stealc-infostealing-malware/
3. ClickFix¹¥»÷ʹÓÃͼÏñÒþдÊõÈö²¥¶ñÒâÈí¼þ
11ÔÂ24ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ClickFix¹¥»÷·ºÆðбäÖÖ£¬£¬£¬¹¥»÷Õßͨ¹ý±ÆÕæµÄWindows¸üж¯»ºÍͼÏñÒþдÊõÔÚÈ«ÆÁä¯ÀÀÆ÷Ò³ÃæÊµÑéÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷×Ô10ÔÂ1ÈÕÆð»îÔ¾£¬£¬£¬ÒÔÍê³É"Òªº¦Çå¾²¸üÐÂ"»ò"È˹¤ÑéÖ¤"ΪÓÕ¶ü£¬£¬£¬ÓÕµ¼Óû§ÔÚWindowsÏÂÁîÌáÐÑ·ûÖÐÕ³Ìù²¢Ö´Ðй¥»÷Õßͨ¹ýJavaScript×Ô¶¯¸´ÖƵ½¼ôÌù°åµÄ¶ñÒâÏÂÁî¡£¡£¡£¡£¡£Ð±äÖÖ½ÓÄÉÏȽøÒþдÊÖÒÕ£¬£¬£¬½«¶ñÒâÈí¼þÓÐÓÃÔØºÉ±àÂëÓÚPNGͼÏñµÄÏñËØÊý¾ÝÖУ¬£¬£¬Í¨¹ýÌØ¶¨ÑÕɫͨµÀÔÚÄÚ´æÖÐÖØÐÞ²¢½âÃÜ¡£¡£¡£¡£¡£¹¥»÷Á÷³Ì°üÀ¨¶à½×¶ÎÖ´ÐУºÊ×ÏÈʹÓÃmshtaÔÉú¶þ½øÖÆÎļþÖ´ÐжñÒâJS´úÂ룬£¬£¬Ëæºóͨ¹ýPowerShellºÍ.NET³ÌÐò¼¯´Ó¼ÓÃÜͼÏñÖÐÌáÈ¡shellcode¡£¡£¡£¡£¡£Stego LoaderµÄÇåµ¥×ÊÔ´ÖаüÀ¨AES¼ÓÃܵÄblob£¬£¬£¬ÊµÖÊÊÇǶÈëPNGÎļþµÄshellcode£¬£¬£¬Ðèͨ¹ý×Ô½ç˵C#´úÂëÖØÐÞ¡£¡£¡£¡£¡£ÍþвÐÐΪÕß»¹½ÓÄɶ¯Ì¬¹æ±ÜÕ½ÂÔ"ctrampoline"£¬£¬£¬Í¨¹ýÈë¿Úµãº¯ÊýŲÓÃÍò¸ö¿Õº¯Êý×ÌÈÅÆÊÎö¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/
4. SitusAMCÊý¾Ýй¶ÊÂÎñ²¨¼°¶¥¼¶ÒøÐпͻ§
11ÔÂ24ÈÕ£¬£¬£¬·¿µØ²úÈÚ×ÊЧÀ;ÞÍ·SitusAMCÓÚ2025Äê11ÔÂ12ÈÕ·¢Ã÷Êý¾Ýй¶ÊÂÎñ£¬£¬£¬¸Ã¹«Ë¾Îª»¨Æì¼¯ÍÅ¡¢Ä¦¸ùÊ¿µ¤Àû¡¢Ä¦¸ù´óͨµÈ1500¼Ò¿Í»§ÌṩµäÖÊ´û¿î·¢·Å¡¢Ð§Àͼ°ºÏ¹æµÈºǫ́ÔËÓªÖ§³Ö£¬£¬£¬ÄêÓªÊÕÔ¼10ÒÚÃÀÔª¡£¡£¡£¡£¡£¾³õ³ÌÐò²éÈ·ÈÏ£¬£¬£¬´Ë´ÎÊÂÎñµ¼ÖÂÆóÒµ¿Í»§¼°ÖÕ¶ËÓû§Êý¾Ýй¶£¬£¬£¬Ïêϸ°üÀ¨ÓëÓªÒµ¹ØÏµÏà¹ØµÄ»á¼Æ¼Í¼¡¢Ö´·¨ÐÒéµÈÆóÒµÊý¾Ý£¬£¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄ¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾ£¬£¬£¬SitusAMCÔÚ11ÔÂ12ÈÕÊÕµ½Çå¾²¾¯±¨ºó£¬£¬£¬ÓÚ15ÈÕÍê³É³õ³ÌÐò²éÈ·ÈÏÎó²îÐÔ×Ó£¬£¬£¬16ÈÕ×îÏÈ֪ͨסլÓû§£¬£¬£¬ÖÁ22ÈÕÍêÓñ³É²¿¿Í»§¼û¸æ¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷ÓªÒµÔËӪδÊÜÓ°Ï죬£¬£¬ÏµÍ³Î´·¢Ã÷¼ÓÃܶñÒâÈí¼þ°²Åźۼ£¡£¡£¡£¡£¡£Ê×ϯִÐйÙÂõ¿Ë¶û¡¤¸¥À¼¿ÆÌåÏÖ£¬£¬£¬¹«Ë¾Õýͨ¹ýÖ±½ÓÏàͬÇþµÀÏòÊÜÓ°Ïì¿Í»§ÌṩһÁ¬¸üУ¬£¬£¬²¢×¨×¢ÓÚÆÊÎöÊÜÓ°ÏìÊý¾Ý¹æÄ£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Êý¾ÝÖØ´óÐԽϸߣ¬£¬£¬ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¼°Êý¾Ý¹æÄ£ÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£Ö»¹ÜÊÂÎñÉæ¼°¶à¼ÒÒøÐÐÒµ¾ÞÍ·£¬£¬£¬µ«¹«Ë¾Î´Åû¶ÏêϸÊÜÓ°Ïì»ú¹¹Ãûµ¥¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/
5. Shai-Hulud¹©Ó¦Á´¹¥»÷ÖØ´´npmÉú̬
11ÔÂ24ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Íþв×éÖ¯Shai-HuludÔÚnpm×¢²á±íÌᳫ´ó¹æÄ£¹©Ó¦Á´¹¥»÷£¬£¬£¬Í¨¹ýľÂí»¯Zapier¡¢ENS Domains¡¢PostHogµÈ492¸ö×ÅÃûÈí¼þ°ü£¬£¬£¬ÇÔÈ¡¿ª·¢Õß¼°CI/CDÍŶӵÄÉñÃØÐÅÏ¢²¢¼ÓÃÜÉÏ´«ÖÁGitHub¡£¡£¡£¡£¡£¹¥»÷ʹÓñ»µÁά»¤ÕßÕË»§ÐÞ¸Äpackage.json×¢Èë¶ñÒâ¾ç±¾£¬£¬£¬Á¬ÏµTruffleHog¹¤¾ßʵÑéÇÔÃÜ£¬£¬£¬GitHubÒѼì²âµ½27,600ÌõÏà¹ØÌõÄ¿¡£¡£¡£¡£¡£´Ë´Î¹¥»÷·ºÆðÖ¸Êý¼¶À©É¢ÌØÕ÷£ºWizÔÆÇ徲ƽ̨·¢Ã÷350¸öÉæ°¸Î¬»¤ÕßÕË»§£¬£¬£¬Ã¿30·ÖÖÓÐÂÔöÔ¼1,000¸ö´æ´¢¿â¡£¡£¡£¡£¡£¶ñÒâÈí¼þ°üÀ¨setup_bun.jsºÍ10MBµÄbun_environment.js£¬£¬£¬Ö´ÐÐÎå½×¶Î¹¥»÷Á÷³Ì£ºÇÔÈ¡GitHub/npmÁîÅÆ¡¢ÔÆÆ½Ì¨ÃÜÔ¿µÈÉñÃØ£¬£¬£¬²¢ÔÚÖª×ãÌØ¶¨Ìõ¼þ£¨ÈçÎÞ·¨ÈÏÖ¤GitHub¡¢»ñÈ¡ÁîÅÆÊ§°Ü£©Ê±ÁýÕÖÓû§Ö÷Ŀ¼¡£¡£¡£¡£¡£¹¥»÷Ó°ÏìÉîÔ¶£ºENS DomainsµÈ¹¤¾ß°ü±»ÈëÇÖ£¬£¬£¬Ó°ÏìÒÔÌ«·»µØµãÆÊÎö¡¢ENSÖÇÄܺÏÔ¼½»»¥µÈ½¹µã¹¦Ð§¡£¡£¡£¡£¡£GitHubËäÒ»Á¬É¾³ý¹¥»÷Õß½¨ÉèµÄSha1-Hulud£¬£¬£¬µ«ÍþвÐÐΪÕßÈÔ¿ìËÙÖØÐÞ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/
6. ¹þ·ð´óѧÔâÓïÒô´¹ÂÚ¹¥»÷ÖÂУÓÑÊý¾Ýй¶
11ÔÂ24ÈÕ£¬£¬£¬¹þ·ð´óѧУÓÑÊÂÎñºÍÉú³¤ÏµÍ³11ÔÂ18ÈÕÔâÓöÓïÒôÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬µ¼ÖÂѧÉú¡¢Ð£ÓÑ¡¢¾èÔùÕß¡¢Ô±¹¤¼°½ÌÖ°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¾Ý¸ÃУ¸±Ð£³¤¿ËÀÀ¡¤½ÜÁÖ¿ÆÍÞºÍУÓÑÊÂÎñÓëÉú³¤¸±Ð£³¤¼ªÄ·¡¤ºúÉÅû¶£¬£¬£¬Ð¹Â¶Êý¾Ýº¸Çµç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒÍ¥/°ì¹«µØµã¡¢»î¶¯³öϯ¼Í¼¡¢¾èÔùÏêÇé¼°Óë´óѧ³ï¿îºÍУÓѼÓÈëÏà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬µ«Î´°üÀ¨Éç»á°ü¹ÜºÅÂë¡¢ÃÜÂë¡¢Ö§¸¶¿¨ÐÅÏ¢»ò²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬É漰УÓѼ°ÆäÅäż/ÅóÙ/Òſס¢¾èÔùÕß¡¢ÔÚУÉú¼°½áÒµÉú¼Ò³¤¡¢²¿·ÖÔÚУѧÉúºÍ½ÌÖ°Ô±¹¤¡£¡£¡£¡£¡£¹þ·ð´óѧÒÑÁ¬Ã¦½ÓÄɲ½·¥É¨³ý¹¥»÷Õßϵͳ»á¼ûȨÏÞ£¬£¬£¬²¢ÓëÖ´·¨²¿·Ö¼°µÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖúÊӲ졣¡£¡£¡£¡£11ÔÂ22ÈÕ£¬£¬£¬Ñ§Ð£Ïò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬ÌáÐÑСÐÄÒ쳣ͨѶ£¬£¬£¬ÌØÊâÊÇÒªÇóÌṩÃÜÂë¡¢Éç±£ºÅ»òÒøÐÐÐÅÏ¢µÄµç»°¡¢¶ÌÐÅ»òÓʼþ¡£¡£¡£¡£¡£ÕâÊǹþ·ð´óѧ½üÆÚµÚ¶þÆðÊý¾ÝÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£10ÔÂÖÐÑ®£¬£¬£¬ClopÀÕË÷Èí¼þÍÅ»ïÔøÉù³ÆÊ¹ÓÃOracle E-Business SuiteÁãÈÕÎó²îÈëÇÖ¸ÃУϵͳ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/


¾©¹«Íø°²±¸11010802024551ºÅ