²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î
Ðû²¼Ê±¼ä 2025-03-051. ²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î
3ÔÂ4ÈÕ£¬£¬£¬²©Í¨½üÆÚÐû²¼ÁËÇå¾²¸üУ¬£¬£¬Ö¼ÔÚÐÞ¸´VMware ESX²úÆ·Öб£´æµÄÈý¸öÑÏÖØÁãÈÕÎó²î£¬£¬£¬Îó²î±àºÅ»®·ÖΪCVE-2025-22224¡¢CVE-2025-22225ºÍCVE-2025-22226£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁ˰üÀ¨VMware ESXi¡¢vSphere¡¢Workstation¡¢Fusion¡¢Cloud FoundationºÍTelco Cloud PlatformÔÚÄڵĶà¸ö²úÆ·¡£¡£¡£ÕâЩÎó²îÓÉ΢ÈíÍþвÇ鱨ÖÐÐĵÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ÆäÖÐCVE-2025-22224ΪVMCI¶ÑÒç³öÎó²î£¬£¬£¬CVSSÆÀ·ÖΪ9.3£»£»£»£»£»£»CVE-2025-22225ΪVMware ESXií§ÒâдÈëÎó²î£¬£¬£¬CVSSÆÀ·ÖΪ8.2£»£»£»£»£»£»CVE-2025-22226ΪHGFSÐÅϢй¶Îó²î£¬£¬£¬CVSSÆÀ·ÖΪ7.1¡£¡£¡£¹¥»÷ÕßÈôÓµÓÐÌØÈ¨ÖÎÀíÔ±»ò¸ù»á¼ûȨÏÞ£¬£¬£¬¿ÉʹÓÃÕâЩÎó²îʵÏÖÐéÄâ»úɳºÐÌÓÒÝ¡£¡£¡£²©Í¨Í¨¹ýVMSA-2025-0004Ç徲ͨ¸æÈ·ÈÏÁËÕâЩÎó²îµÄ±£´æ£¬£¬£¬²¢Ö¸³öËüÃÇÒѱ»ÆÕ±éʹÓᣡ£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖÐéÄâ»ú²¢»ñµÃÌØÈ¨»á¼ûµÄ¹¥»÷Õߣ¬£¬£¬¿ÉʹÓÃÕâЩÎó²î½øÒ»²½»á¼ûÐéÄâ»úÖÎÀí³ÌÐò×Ô¼º¡£¡£¡£È»¶ø£¬£¬£¬²©Í¨ÏÖÔÚÉÐδÅû¶¹ØÓÚÏêϸ¹¥»÷»ò±³ºóÍþвÐÐΪÕßµÄÏêϸÐÅÏ¢¡£¡£¡£
https://securityaffairs.com/174911/security/vmware-fixed-three-actively-exploited-zero-days-in-esx-products.html
2. Eleven11bot½©Ê¬ÍøÂçѬȾ8.6Íǫ̀ÎïÁªÍø×°±¸·¢¶¯DDoS¹¥»÷
3ÔÂ4ÈÕ£¬£¬£¬Ò»ÖÖÃûΪ¡°Eleven11bot¡±µÄÐÂÐͽ©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾÁè¼Ý86,000̨ÎïÁªÍø×°±¸£¬£¬£¬Ö÷ÒªÊÇÇå¾²ÉãÏñÍ·ºÍÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©£¬£¬£¬ÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓëÒÁÀÊÓÐËÉÉ¢ÁªÏµ£¬£¬£¬ÒÑÕë¶ÔµçÐÅЧÀÍÌṩÉ̺ÍÔÚÏßÓÎϷЧÀÍÆ÷Ìᳫ¹¥»÷¡£¡£¡£Åµ»ùÑÇÑо¿Ö°Ô±·¢Ã÷Á˸ý©Ê¬ÍøÂ磬£¬£¬²¢ÓëÍþв¼à¿ØÆ½Ì¨GreyNoise·ÖÏíÁËÏêϸÐÅÏ¢¡£¡£¡£¾ÝShadowserver Foundation±¨¸æ£¬£¬£¬ÊÜѬȾµÄ×°±¸´ó¶àλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢¼ÓÄôóºÍ°Ä´óÀûÑÇ¡£¡£¡£Eleven11botµÄ¹¥»÷Á¿ÒѵִïÿÃëÊýÒÚ¸öÊý¾Ý°ü£¬£¬£¬Ò»Á¬Ê±¼äͨ³£ÎªÊýÌì¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇ¿ÖÆÊ¹ÓÃÈõ»ò³£¼ûµÄÖÎÀíԱƾ֤¡¢Ê¹ÓÃÒÑ֪ĬÈÏÆ¾Ö¤ÒÔ¼°É¨Ãè̻¶µÄTelnetºÍSSH¶Ë¿ÚÀ´Èö²¥¡£¡£¡£GreyNoise½¨Òé·ÀÓùÕß½«Ïà¹ØIPµØµãÌí¼Óµ½ºÚÃûµ¥ÖУ¬£¬£¬²¢¼à¿Ø¿ÉÒɵǼʵÑé¡£¡£¡£ÎªÈ·±£Çå¾²£¬£¬£¬½¨ÒéÎïÁªÍø×°±¸ÔËÐÐ×îй̼þ°æ±¾£¬£¬£¬½ûÓò»ÐëÒªµÄÔ¶³Ì»á¼û¹¦Ð§£¬£¬£¬²¢¸ü¸ÄĬÈÏÖÎÀíÔ±ÕÊ»§Æ¾Ö¤¡£¡£¡£±ðµÄ£¬£¬£¬°´ÆÚ¼ì²é×°±¸ÊÇ·ñµÖ´ïʹÓÃÊÙÃüÖյ㲢ÓÃÐÂÐͺÅÌæ»»ÖÁ¹ØÖ÷Òª¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-eleven11bot-botnet-infects-86-000-devices-for-ddos-attacks/
3. ¶àÓïÑÔ¶ñÒâÈí¼þSosanoÕë¶Ô°¢ÁªÇõÒªº¦×éÖ¯Ìᳫ¹¥»÷
3ÔÂ4ÈÕ£¬£¬£¬Ò»ÖÖÕë¶Ô°¢À²®ÁªºÏÇõ³¤¹úº½¿Õ¡¢ÎÀÐÇͨѶºÍÒªº¦½»Í¨×éÖ¯µÄ¶àÓïÑÔ¶ñÒâÈí¼þÕýÔÚ±»Î´ÖªÍþвÐÐΪÕßʹÓᣡ£¡£¸ÃÈí¼þÃûΪSosano£¬£¬£¬ÌṩºóÃŹ¦Ð§£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾװ±¸ÉϽ¨É賤ÆÚÐÔ²¢Ô¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£ProofpointÓÚ2024Äê10Ô·¢Ã÷ÁËÕâÒ»»î¶¯£¬£¬£¬Ö¸³öÆäÓëÒÁÀÊÃËÓÑTA451ºÍTA455µÄÐж¯ÓÐÏàËÆÖ®´¦£¬£¬£¬µ«´Ë´Î»î¶¯ÖصãÔÚÓÚÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÌØÖÆÎļþ£¬£¬£¬°üÀ¨¶àÖÖÎļþÃûÌ㬣¬£¬ÌӱܻùÓÚ¼òµ¥ÃûÌÃÆÊÎöµÄÇå¾²Èí¼þ¼ì²â¡£¡£¡£¹¥»÷ʼÓÚÓ¡¶Èµç×Ó¹«Ë¾·¢Ë͵ÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬°üÀ¨¶ñÒâURLºÍZIP´æµµ£¬£¬£¬ÄÚº¬Î±×°³ÉXLSµÄLNKÎļþºÍÁ½¸ö¶àÓïÑÔPDFÎļþ¡£¡£¡£PDFÎļþ°üÀ¨HTA´úÂëºÍÒþ²ØZIPµµ°¸£¬£¬£¬´¥·¢SosanoºóÃÅ¡£¡£¡£SosanoºóÃÅÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèÅþÁ¬£¬£¬£¬ÆÚ´ýÎļþ²Ù×÷¡¢shellÏÂÁîÖ´ÐеÈÏÂÁî¡£¡£¡£·ÀÓù´ËÀàÍþвÐè½ÓÄɶà¹ÜÆëÏÂÒªÁ죬£¬£¬°üÀ¨µç×ÓÓʼþɨÃè¡¢Óû§½ÌÓýºÍÄܹ»¼ì²â¶àÖÖÎļþÃûÌõÄÇå¾²Èí¼þ¡£¡£¡£×èֹΣÏÕÎļþÀàÐÍÒ²ÊÇÃ÷ÖÇÖ®¾Ù¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-polyglot-malware-hits-aviation-satellite-communication-firms/
4. ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷ÈÕ±¾°©Ö¢ÖÎÁÆÖÐÐÄ£¬£¬£¬Ð¹Â¶30Íò»¼ÕßÊý¾Ý
3ÔÂ4ÈÕ£¬£¬£¬ÈÕ±¾Óî¶¼¹¬ÖÐÑëÕïËù(UCC)°©Ö¢ÖÎÁÆÖÐÐÄÓÚ2ÔÂ10ÈÕÔâµ½÷è÷ëÀÕË÷Èí¼þ×éÖ¯µÄºÚ¿Í¹¥»÷£¬£¬£¬µ¼ÖÂ30ÍòÃû»¼ÕßµÄÃô¸Ð¿µ½¡ÐÅϢй¶£¬£¬£¬Ò½ÔºÏµÍ³Ò²ÎÞ·¨Ê¹Óᣡ£¡£¸Ã×éÖ¯ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˱»µÁÐÅÏ¢£¬£¬£¬°üÀ¨»¼ÕßÐÕÃû¡¢ÉúÈÕ¡¢ÐԱ𡢵ص㡢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Ò½ÁÆÐÅÏ¢µÈ£¬£¬£¬²¢¼¥Ð¦»¼ÕßʹÓÃUCCµÄЧÀÍ¿ÉÄܻᵼÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£UCC¹ÙÔ±±Þ²ß¿Í»§Ð¡ÐÄÕ©ÆÐÅÏ¢£¬£¬£¬²¢ÉèÁ¢ÁËÈÈÏߵ绰¹©»¼Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£¡£¡£÷è÷ë×éÖ¯×Ô2025ÄêÍ·ÒÔÀ´Ò»Ö±ÔÚÔöÇ¿¹¥»÷£¬£¬£¬½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ģʽÔË×÷£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßʹÓÃË«ÖØÀÕË÷ÊֶζøÖøÃû¡£¡£¡£¸Ã×éÖ¯ÒÑÍù12¸öÔµÄÍøÂç¹¥»÷»î¶¯Ò»Ö±£¬£¬£¬×ÜÊܺ¦ÕßÊýÄ¿ÒÑ´ï191´Î¡£¡£¡£÷è÷ë×é֝ɿÏÓͨ¹ýÇÔÈ¡Google Chromeƾ֤ÒÔ¼°ÉñÃØÌӱܻò½ûÓö˵ã¼ì²âºÍÏìÓ¦(EDR)ϵͳÀ´Ê¹ÓÃÊܺ¦Õߣ¬£¬£¬Ê¹ÓÃÁËÖøÃûµÄ¡°Citrix Bleed¡±ÁãÈÕÎó²î¡£¡£¡£
https://cybernews.com/news/cancer-hospital-breach-is-claimed-by-qilin-gang-in-new-ransomware-low/
5. Zhong Stealer¶ñÒâÈí¼þͨ¹ý¿Í·þѬȾ½ðÈڿƼ¼¹«Ë¾
3ÔÂ4ÈÕ£¬£¬£¬ÃûΪ¡°Zhong Stealer¡±µÄÐÂÐͶñÒâÈí¼þÒÑÔÚÖйú·ºÆð£¬£¬£¬Ëüͨ¹ýʹÓÿͻ§Ö§³Ö̸ÌìÕâÒ»ÒâÏë²»µ½µÄÇÐÈëµãDZÈëÆóÒµ£¬£¬£¬Ö÷ҪĿµÄÊǽðÈڿƼ¼¹«Ë¾£¬£¬£¬µ«Æä˳ӦÐÔ¼«Ç¿£¬£¬£¬¿ÉÕë¶ÔÈκÎÒÀÀµ¿Í»§Ö§³ÖÍŶӵÄÐÐÒµ¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÈËÐÔµÄÈõµã£¬£¬£¬Èç½ôÆÈ¸Ð¡¢ÒÉÐĺ;ÚÉ¥£¬£¬£¬Í¨¹ýÈ«ÐIJ߻®µÄȦÌ×ÓÕµ¼¿Í·þÖ°Ô±·¿ª°üÀ¨¶ñÒâZIPÎļþµÄ¸½¼þ¡£¡£¡£Zhong StealerÄܹ»ÏÂÔØÆäËû×é¼þ¾ÙÐй¥»÷£¬£¬£¬²¢ÔÚÊÜѬȾϵͳÖмá³Ö³¤ÆÚÐÔ£¬£¬£¬Í¨¹ýÌí¼Ó×¢²á±íÏî»òʹÓÃÍýÏëʹÃüÖØÐÂÆô¶¯×ÔÉí£¬£¬£¬ÄÑÒÔ³¹µ×Ïû³ý¡£¡£¡£ÆäÖ÷ҪĿµÄÊÇÍøÂçÆ¾Ö¤ºÍä¯ÀÀÆ÷À©Õ¹Êý¾Ý£¬£¬£¬ÇÔÈ¡Ãô¸ÐµÄÉÌÒµºÍСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬²¢½«ÐÅÏ¢·¢ËÍ»ØÎ»ÓÚÏã¸ÛµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£Îª±£»£»£»£»£»£»¤ÆóÒµÃâÊÜZhong StealerË𺦣¬£¬£¬¿ÉʹÓÃANY.RUNɳÏäµÈ¹¤¾ß¶Ô¿ÉÒÉÎļþ¾ÙÐÐÆÊÎö£¬£¬£¬Éó²éʵʱ¶ñÒâÈí¼þÐÐΪ£¬£¬£¬Á¬Ã¦Ê¶±ðÍþв£¬£¬£¬²¢ÔÚÔ±¹¤·¿ªÎļþ֮ǰ×Ô¶¯¼ì²éÎļþ£¬£¬£¬ÒÔ±ÜÃâѬȾ¡£¡£¡£
https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/
6. ´ó¹æÄ£ÍøÂçÇå¾²Îó²îÖÂ3.5ÍòÍøÕ¾ÔâÐ®ÖÆÖØ¶¨ÏòÖÁ¶Ä²©Æ½Ì¨
3ÔÂ3ÈÕ£¬£¬£¬Ò»Æð´ó¹æÄ£ÍøÂçÇå¾²Îó²îÊÂÎñÓÚ2ÔÂ20ÈÕ±¬·¢£¬£¬£¬Áè¼Ý35,000¸öÍøÕ¾Ôâµ½¹¥»÷£¬£¬£¬Óû§ä¯ÀÀÆ÷´°¿Ú±»¶ñÒâ¾ç±¾ÍêÈ«Ð®ÖÆ²¢Öض¨ÏòÖÁÖÐÎĶIJ©Æ½Ì¨¡°Kaiyun¡±¡£¡£¡£c/sideÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÊÜÓ°ÏìÍøÕ¾µÄÔ´´úÂëÖвåÈë¼òÆÓ¾ç±¾±êÇ©£¬£¬£¬¼ÓÔØÆäËû¶ñÒâ´úÂ룬£¬£¬ÕâЩ´úÂëʹÓÃ×°±¸¼ì²âÊÖÒÕ²¢ÉèÖÃ500-1000ºÁÃëËæ»úÑÓ³ÙÒÔÌÓ±ÜÇ徲ɨÃè¡£¡£¡£×îÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬¶ñÒâ¾ç±¾×¢ÈëÈ«ÆÁiframe´úÂ룬£¬£¬Ìæ»»ÔÊ¼ÍøÕ¾ÄÚÈÝΪ¶Ä²©Æ½Ì¨¡£¡£¡£¹¥»÷ͨ¹ý¶à¸ö´úÂëÖ´Ðн׶ξÙÐУ¬£¬£¬Ê¹ÓÃJavaScriptº¯Êý¼ì²âÓû§×°±¸ÀàÐÍ£¬£¬£¬ÓÐÕë¶ÔÐÔµØÍ¶·Å¶ñÒâÄÚÈÝ£¬£¬£¬²¢½¨ÉèÔªÊÓ¿Ú±êǩȷ±£¶ñÒâÄÚÈÝÌîÂúÕû¸öÆÁÄ»¡£¡£¡£²¿·Ö¹¥»÷±äÖÖ»¹ÊµÑé»ùÓÚµØÇøµÄ¹ýÂË»úÖÆ£¬£¬£¬Æ¾Ö¤Óû§IPµØµãÏÔʾ²î±ðÄÚÈÝ¡£¡£¡£Ç徲ר¼ÒÍÆ²â´Ë´Î¹¥»÷ÓëMegalayerÎó²îÓйأ¬£¬£¬½¨ÒéÍøÕ¾ËùÓÐÕßÉóºËÔ´´úÂë¡¢×èÖ¹¶ñÒâÓò¡¢°´ÆÚ¼ì²éÎļþÐ޸ġ¢ÊµÑéÄÚÈÝÇå¾²Õ½ÂÔÏÞÖÆ£¬£¬£¬²¢Ê¹Óù¤¾ßÖ´ÐÐÆµÈÔÕ¾µãɨÃèÒÔ·¢Ã÷¶ñÒâ×¢È룬£¬£¬´Ó¶ø±£»£»£»£»£»£»¤Æ½Ì¨ÃâÊÜÀàËÆ¹¥»÷¡£¡£¡£
https://cybersecuritynews.com/35000-websites-hacked-to-inject-malicious-scripts/


¾©¹«Íø°²±¸11010802024551ºÅ