CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2025-11-25

1. CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ


11ÔÂ21ÈÕ£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬ £¬£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê12ÔÂ12ÈÕǰÐÞ¸´Oracle Identity ManagerµÄCVE-2025-61757Îó²î¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪ¡°ÁãÈÕÎó²î¡±£¬ £¬£¬Òѱ»ÏÖÊÊÓÃÓÚ¹¥»÷£¬ £¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£CVE-2025-61757ÊÇOracle Identity Manager REST APIÖб£´æµÄÉí·ÝÑé֤ǰԶ³Ì´úÂëÖ´ÐÐÎó²î£¬ £¬£¬ÓÉSearchlight CyberÆÊÎöʦAdam KuesºÍShubham Shahflaw·¢Ã÷²¢Åû¶¡£¡£¡£¡£¡£Îó²îÔ´ÓÚ¹¥»÷Õß¿Éͨ¹ýÔÚURL·¾¶ÖÐÌí¼Ó¡°--public-access¡±»òÀàËÆ²ÎÊý£¬ £¬£¬ÓÕÆ­Çå¾²¹ýÂËÆ÷½«Êܱ£»£»£»¤¶ËµãÊÓΪ¹ûÕæ¿É»á¼û£¬ £¬£¬´Ó¶øÈƹýÉí·ÝÑéÖ¤Ö±½Ó»á¼ûGroovy¾ç±¾±àÒë¶Ëµã¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃGroovyµÄ×¢½â´¦Öóͷ£¹¦Ð§£¬ £¬£¬ÔÚ±àÒëʱעÈë¶ñÒâ´úÂëʵÏÖÔ¶³ÌÖ´ÐУ¬ £¬£¬ÎÞÐèÈκÎÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£OracleÒÑÓÚ2025Äê10ÔÂ21ÈÕÐû²¼Çå¾²¸üÐÂÐÞ¸´¸ÃÎó²î£¬ £¬£¬µ«CISAÇ¿µ÷£¬ £¬£¬¸ÃÎó²îÒòÊÖÒÕÃż÷µÍ¡¢Ê¹ÓüòÆÓ£¬ £¬£¬¼«Ò×±»ÍþвÐÐΪÕß¿ìËÙ¸´ÖÆÊ¹Óᣡ£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-oracle-identity-manager-rce-flaw-is-being-actively-exploited/


2. ¶íÏà¹Ø¹¥»÷½è3DÊг¡´«StealC V2ÇÔÃÜÈí¼þ


11ÔÂ24ÈÕ£¬ £¬£¬Óë¶íÂÞ˹Ïà¹ØµÄÍøÂç¹¥»÷»î¶¯Õýͨ¹ýCGTraderµÈ3DÄ£×ÓÊг¡Èö²¥StealC V2ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃBlender¿ªÔ´3DÈí¼þÌØÕ÷£¬ £¬£¬½«¶ñÒâPython´úÂëǶÈë.blendÎļþÖС£¡£¡£¡£¡£µ±Óû§ÆôÓÃBlenderµÄ×Ô¶¯ÔËÐй¦Ð§Ê±£¬ £¬£¬·­¿ªº¬¶ñÒâ¾ç±¾µÄ½ÇÉ«°ó¶¨Îļþ»á´¥·¢×Ô¶¯¼ÓÔØ£¬ £¬£¬¸Ã¾ç±¾Í¨¹ýCloudflare WorkersÓò»ñÈ¡¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬ £¬£¬½ø¶øÏÂÔØPowerShell¾ç±¾£¬ £¬£¬×îÖÕ´Ó¹¥»÷Õß¿ØÖƵÄIPµØµã¼ìË÷Á½¸öZIP´æµµ¡£¡£¡£¡£¡£ÕâЩѹËõÎļþ½âѹÖÁ%TEMP%Îļþ¼Ð£¬ £¬£¬²¢ÔÚÆô¶¯Ä¿Â¼°²ÅÅLNKÎļþʵÏÖ³¤ÆÚ»¯£¬ £¬£¬Í¬Ê±°²ÅÅStealCÖ÷ÇÔÈ¡Æ÷¼°¸¨ÖúPythonÇÔÈ¡Æ÷ÐγÉÈßÓ౸·Ý¡£¡£¡£¡£¡£Morphisec¹«Ë¾Ö¸³ö£¬ £¬£¬±¾´Î¹¥»÷ʹÓõÄStealCΪ½ñÄêÔçЩʱ¼äZscalerÆÊÎöµÄµÚ¶þ¸öÖ÷Òª°æ±¾µÄ×îбäÖÖ¡£¡£¡£¡£¡£Ð°æStealCÀ©Õ¹ÁËÊý¾ÝÇÔÈ¡ÄÜÁ¦£¬ £¬£¬Ö§³Ö´Ó23ÖÖÒÔÉÏä¯ÀÀÆ÷¡¢100Óà¸ö¼ÓÃÜÇ®±ÒÇ®°üÀ©Õ¹/Ó¦Óá¢Telegram¡¢DiscordµÈͨѶ¹¤¾ß¡¢VPN¼°Óʼþ¿Í»§¶ËÇÔÈ¡Êý¾Ý£¬ £¬£¬²¢Å䱸¸üеÄUACÈÆ¹ý»úÖÆ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-blender-model-files-deliver-stealc-infostealing-malware/


3. ClickFix¹¥»÷ʹÓÃͼÏñÒþдÊõÈö²¥¶ñÒâÈí¼þ


11ÔÂ24ÈÕ£¬ £¬£¬½üÆÚ£¬ £¬£¬Ñо¿Ö°Ô±·¢Ã÷ClickFix¹¥»÷·ºÆðбäÖÖ£¬ £¬£¬¹¥»÷Õßͨ¹ý±ÆÕæµÄWindows¸üж¯»­ºÍͼÏñÒþдÊõÔÚÈ«ÆÁä¯ÀÀÆ÷Ò³ÃæÊµÑéÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷×Ô10ÔÂ1ÈÕÆð»îÔ¾£¬ £¬£¬ÒÔÍê³É"Òªº¦Çå¾²¸üÐÂ"»ò"È˹¤ÑéÖ¤"ΪÓÕ¶ü£¬ £¬£¬ÓÕµ¼Óû§ÔÚWindowsÏÂÁîÌáÐÑ·ûÖÐÕ³Ìù²¢Ö´Ðй¥»÷Õßͨ¹ýJavaScript×Ô¶¯¸´ÖƵ½¼ôÌù°åµÄ¶ñÒâÏÂÁî¡£¡£¡£¡£¡£Ð±äÖÖ½ÓÄÉÏȽøÒþдÊÖÒÕ£¬ £¬£¬½«¶ñÒâÈí¼þÓÐÓÃÔØºÉ±àÂëÓÚPNGͼÏñµÄÏñËØÊý¾ÝÖУ¬ £¬£¬Í¨¹ýÌØ¶¨ÑÕɫͨµÀÔÚÄÚ´æÖÐÖØÐÞ²¢½âÃÜ¡£¡£¡£¡£¡£¹¥»÷Á÷³Ì°üÀ¨¶à½×¶ÎÖ´ÐУºÊ×ÏÈʹÓÃmshtaÔ­Éú¶þ½øÖÆÎļþÖ´ÐжñÒâJS´úÂ룬 £¬£¬Ëæºóͨ¹ýPowerShellºÍ.NET³ÌÐò¼¯´Ó¼ÓÃÜͼÏñÖÐÌáÈ¡shellcode¡£¡£¡£¡£¡£Stego LoaderµÄÇåµ¥×ÊÔ´ÖаüÀ¨AES¼ÓÃܵÄblob£¬ £¬£¬ÊµÖÊÊÇǶÈëPNGÎļþµÄshellcode£¬ £¬£¬Ðèͨ¹ý×Ô½ç˵C#´úÂëÖØÐÞ¡£¡£¡£¡£¡£ÍþвÐÐΪÕß»¹½ÓÄɶ¯Ì¬¹æ±ÜÕ½ÂÔ"ctrampoline"£¬ £¬£¬Í¨¹ýÈë¿Úµãº¯ÊýŲÓÃÍò¸ö¿Õº¯Êý×ÌÈÅÆÊÎö¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/


4. SitusAMCÊý¾Ýй¶ÊÂÎñ²¨¼°¶¥¼¶ÒøÐпͻ§


11ÔÂ24ÈÕ£¬ £¬£¬·¿µØ²úÈÚ×ÊЧÀ;ÞÍ·SitusAMCÓÚ2025Äê11ÔÂ12ÈÕ·¢Ã÷Êý¾Ýй¶ÊÂÎñ£¬ £¬£¬¸Ã¹«Ë¾Îª»¨Æì¼¯ÍÅ¡¢Ä¦¸ùÊ¿µ¤Àû¡¢Ä¦¸ù´óͨµÈ1500¼Ò¿Í»§ÌṩµäÖÊ´û¿î·¢·Å¡¢Ð§Àͼ°ºÏ¹æµÈºǫ́ÔËÓªÖ§³Ö£¬ £¬£¬ÄêÓªÊÕÔ¼10ÒÚÃÀÔª¡£¡£¡£¡£¡£¾­³õ³ÌÐò²éÈ·ÈÏ£¬ £¬£¬´Ë´ÎÊÂÎñµ¼ÖÂÆóÒµ¿Í»§¼°ÖÕ¶ËÓû§Êý¾Ýй¶£¬ £¬£¬Ïêϸ°üÀ¨ÓëÓªÒµ¹ØÏµÏà¹ØµÄ»á¼Æ¼Í¼¡¢Ö´·¨Ð­ÒéµÈÆóÒµÊý¾Ý£¬ £¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄ¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾ£¬ £¬£¬SitusAMCÔÚ11ÔÂ12ÈÕÊÕµ½Çå¾²¾¯±¨ºó£¬ £¬£¬ÓÚ15ÈÕÍê³É³õ³ÌÐò²éÈ·ÈÏÎó²îÐÔ×Ó£¬ £¬£¬16ÈÕ×îÏÈ֪ͨסլÓû§£¬ £¬£¬ÖÁ22ÈÕÍêÓñ³É²¿¿Í»§¼û¸æ¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷ÓªÒµÔËӪδÊÜÓ°Ï죬 £¬£¬ÏµÍ³Î´·¢Ã÷¼ÓÃܶñÒâÈí¼þ°²Åźۼ£¡£¡£¡£¡£¡£Ê×ϯִÐйÙÂõ¿Ë¶û¡¤¸¥À¼¿ÆÌåÏÖ£¬ £¬£¬¹«Ë¾Õýͨ¹ýÖ±½ÓÏàͬÇþµÀÏòÊÜÓ°Ïì¿Í»§ÌṩһÁ¬¸üУ¬ £¬£¬²¢×¨×¢ÓÚÆÊÎöÊÜÓ°ÏìÊý¾Ý¹æÄ£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Êý¾ÝÖØ´óÐԽϸߣ¬ £¬£¬ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¼°Êý¾Ý¹æÄ£ÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£Ö»¹ÜÊÂÎñÉæ¼°¶à¼ÒÒøÐÐÒµ¾ÞÍ·£¬ £¬£¬µ«¹«Ë¾Î´Åû¶ÏêϸÊÜÓ°Ïì»ú¹¹Ãûµ¥¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/


5. Shai-Hulud¹©Ó¦Á´¹¥»÷ÖØ´´npmÉú̬


11ÔÂ24ÈÕ£¬ £¬£¬½üÆÚ£¬ £¬£¬Íþв×éÖ¯Shai-HuludÔÚnpm×¢²á±íÌᳫ´ó¹æÄ£¹©Ó¦Á´¹¥»÷£¬ £¬£¬Í¨¹ýľÂí»¯Zapier¡¢ENS Domains¡¢PostHogµÈ492¸ö×ÅÃûÈí¼þ°ü£¬ £¬£¬ÇÔÈ¡¿ª·¢Õß¼°CI/CDÍŶӵÄÉñÃØÐÅÏ¢²¢¼ÓÃÜÉÏ´«ÖÁGitHub¡£¡£¡£¡£¡£¹¥»÷ʹÓñ»µÁά»¤ÕßÕË»§ÐÞ¸Äpackage.json×¢Èë¶ñÒâ¾ç±¾£¬ £¬£¬Á¬ÏµTruffleHog¹¤¾ßʵÑéÇÔÃÜ£¬ £¬£¬GitHubÒѼì²âµ½27,600ÌõÏà¹ØÌõÄ¿¡£¡£¡£¡£¡£´Ë´Î¹¥»÷·ºÆðÖ¸Êý¼¶À©É¢ÌØÕ÷£ºWizÔÆÇ徲ƽ̨·¢Ã÷350¸öÉæ°¸Î¬»¤ÕßÕË»§£¬ £¬£¬Ã¿30·ÖÖÓÐÂÔöÔ¼1,000¸ö´æ´¢¿â¡£¡£¡£¡£¡£¶ñÒâÈí¼þ°üÀ¨setup_bun.jsºÍ10MBµÄbun_environment.js£¬ £¬£¬Ö´ÐÐÎå½×¶Î¹¥»÷Á÷³Ì£ºÇÔÈ¡GitHub/npmÁîÅÆ¡¢ÔÆÆ½Ì¨ÃÜÔ¿µÈÉñÃØ£¬ £¬£¬²¢ÔÚÖª×ãÌØ¶¨Ìõ¼þ£¨ÈçÎÞ·¨ÈÏÖ¤GitHub¡¢»ñÈ¡ÁîÅÆÊ§°Ü£©Ê±ÁýÕÖÓû§Ö÷Ŀ¼¡£¡£¡£¡£¡£¹¥»÷Ó°ÏìÉîÔ¶£ºENS DomainsµÈ¹¤¾ß°ü±»ÈëÇÖ£¬ £¬£¬Ó°ÏìÒÔÌ«·»µØµãÆÊÎö¡¢ENSÖÇÄܺÏÔ¼½»»¥µÈ½¹µã¹¦Ð§¡£¡£¡£¡£¡£GitHubËäÒ»Á¬É¾³ý¹¥»÷Õß½¨ÉèµÄSha1-Hulud£¬ £¬£¬µ«ÍþвÐÐΪÕßÈÔ¿ìËÙÖØÐÞ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/


6. ¹þ·ð´óѧÔâÓïÒô´¹ÂÚ¹¥»÷ÖÂУÓÑÊý¾Ýй¶


11ÔÂ24ÈÕ£¬ £¬£¬¹þ·ð´óѧУÓÑÊÂÎñºÍÉú³¤ÏµÍ³11ÔÂ18ÈÕÔâÓöÓïÒôÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬µ¼ÖÂѧÉú¡¢Ð£ÓÑ¡¢¾èÔùÕß¡¢Ô±¹¤¼°½ÌÖ°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¾Ý¸ÃУ¸±Ð£³¤¿ËÀ­À­¡¤½ÜÁÖ¿ÆÍÞºÍУÓÑÊÂÎñÓëÉú³¤¸±Ð£³¤¼ªÄ·¡¤ºúÉ­Åû¶£¬ £¬£¬Ð¹Â¶Êý¾Ýº­¸Çµç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒÍ¥/°ì¹«µØµã¡¢»î¶¯³öϯ¼Í¼¡¢¾èÔùÏêÇé¼°Óë´óѧ³ï¿îºÍУÓѼÓÈëÏà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬µ«Î´°üÀ¨Éç»á°ü¹ÜºÅÂë¡¢ÃÜÂë¡¢Ö§¸¶¿¨ÐÅÏ¢»ò²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬ £¬£¬É漰УÓѼ°ÆäÅäż/ÅóÙ­/Òſס¢¾èÔùÕß¡¢ÔÚУÉú¼°½áÒµÉú¼Ò³¤¡¢²¿·ÖÔÚУѧÉúºÍ½ÌÖ°Ô±¹¤¡£¡£¡£¡£¡£¹þ·ð´óѧÒÑÁ¬Ã¦½ÓÄɲ½·¥É¨³ý¹¥»÷Õßϵͳ»á¼ûȨÏÞ£¬ £¬£¬²¢ÓëÖ´·¨²¿·Ö¼°µÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖúÊӲ졣¡£¡£¡£¡£11ÔÂ22ÈÕ£¬ £¬£¬Ñ§Ð£Ïò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍÊý¾Ýй¶֪ͨ£¬ £¬£¬ÌáÐÑСÐÄÒ쳣ͨѶ£¬ £¬£¬ÌØÊâÊÇÒªÇóÌṩÃÜÂë¡¢Éç±£ºÅ»òÒøÐÐÐÅÏ¢µÄµç»°¡¢¶ÌÐÅ»òÓʼþ¡£¡£¡£¡£¡£ÕâÊǹþ·ð´óѧ½üÆÚµÚ¶þÆðÊý¾ÝÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£10ÔÂÖÐÑ®£¬ £¬£¬ClopÀÕË÷Èí¼þÍÅ»ïÔøÉù³ÆÊ¹ÓÃOracle E-Business SuiteÁãÈÕÎó²îÈëÇÖ¸ÃУϵͳ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/