CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2025-11-25

1. CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ


11ÔÂ21ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê12ÔÂ12ÈÕǰÐÞ¸´Oracle Identity ManagerµÄCVE-2025-61757Îó²î¡£¸ÃÎó²î±»×·×ÙΪ¡°ÁãÈÕÎó²î¡±£¬Òѱ»ÏÖÊÊÓÃÓÚ¹¥»÷£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£CVE-2025-61757ÊÇOracle Identity Manager REST APIÖб£´æµÄÉí·ÝÑé֤ǰԶ³Ì´úÂëÖ´ÐÐÎó²î£¬ÓÉSearchlight CyberÆÊÎöʦAdam KuesºÍShubham Shahflaw·¢Ã÷²¢Åû¶¡£Îó²îÔ´ÓÚ¹¥»÷Õß¿Éͨ¹ýÔÚURL·¾¶ÖÐÌí¼Ó¡°--public-access¡±»òÀàËÆ²ÎÊý£¬ÓÕÆ­Çå¾²¹ýÂËÆ÷½«Êܱ£»¤¶ËµãÊÓΪ¹ûÕæ¿É»á¼û£¬´Ó¶øÈƹýÉí·ÝÑéÖ¤Ö±½Ó»á¼ûGroovy¾ç±¾±àÒë¶Ëµã¡£¹¥»÷Õß¿ÉʹÓÃGroovyµÄ×¢½â´¦Öóͷ£¹¦Ð§£¬ÔÚ±àÒëʱעÈë¶ñÒâ´úÂëʵÏÖÔ¶³ÌÖ´ÐУ¬ÎÞÐèÈκÎÉí·ÝÑéÖ¤¡£OracleÒÑÓÚ2025Äê10ÔÂ21ÈÕÐû²¼Çå¾²¸üÐÂÐÞ¸´¸ÃÎó²î£¬µ«CISAÇ¿µ÷£¬¸ÃÎó²îÒòÊÖÒÕÃż÷µÍ¡¢Ê¹ÓüòÆÓ£¬¼«Ò×±»ÍþвÐÐΪÕß¿ìËÙ¸´ÖÆÊ¹Óá£


https://www.bleepingcomputer.com/news/security/cisa-warns-oracle-identity-manager-rce-flaw-is-being-actively-exploited/


2. ¶íÏà¹Ø¹¥»÷½è3DÊг¡´«StealC V2ÇÔÃÜÈí¼þ


11ÔÂ24ÈÕ£¬Óë¶íÂÞ˹Ïà¹ØµÄÍøÂç¹¥»÷Ô˶¯Õýͨ¹ýCGTraderµÈ3DÄ£×ÓÊг¡Èö²¥StealC V2ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¹¥»÷ÕßʹÓÃBlender¿ªÔ´3DÈí¼þÌØÕ÷£¬½«¶ñÒâPython´úÂëǶÈë.blendÎļþÖС£µ±Óû§ÆôÓÃBlenderµÄ×Ô¶¯ÔËÐй¦Ð§Ê±£¬·­¿ªº¬¶ñÒâ¾ç±¾µÄ½ÇÉ«°ó¶¨Îļþ»á´¥·¢×Ô¶¯¼ÓÔØ£¬¸Ã¾ç±¾Í¨¹ýCloudflare WorkersÓò»ñÈ¡¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬½ø¶øÏÂÔØPowerShell¾ç±¾£¬×îÖÕ´Ó¹¥»÷Õß¿ØÖƵÄIPµØµã¼ìË÷Á½¸öZIP´æµµ¡£ÕâЩѹËõÎļþ½âѹÖÁ%TEMP%Îļþ¼Ð£¬²¢ÔÚÆô¶¯Ä¿Â¼°²ÅÅLNKÎļþʵÏÖ³¤ÆÚ»¯£¬Í¬Ê±°²ÅÅStealCÖ÷ÇÔÈ¡Æ÷¼°¸¨ÖúPythonÇÔÈ¡Æ÷ÐγÉÈßÓ౸·Ý¡£Morphisec¹«Ë¾Ö¸³ö£¬±¾´Î¹¥»÷ʹÓõÄStealCΪ½ñÄêÔçЩʱ¼äZscalerÆÊÎöµÄµÚ¶þ¸öÖ÷Òª°æ±¾µÄ×îбäÖÖ¡£Ð°æStealCÀ©Õ¹ÁËÊý¾ÝÇÔÈ¡ÄÜÁ¦£¬Ö§³Ö´Ó23ÖÖÒÔÉÏä¯ÀÀÆ÷¡¢100Óà¸ö¼ÓÃÜÇ®±ÒÇ®°üÀ©Õ¹/Ó¦Óá¢Telegram¡¢DiscordµÈͨѶ¹¤¾ß¡¢VPN¼°Óʼþ¿Í»§¶ËÇÔÈ¡Êý¾Ý£¬²¢Å䱸¸üеÄUACÈÆ¹ý»úÖÆ¡£


https://www.bleepingcomputer.com/news/security/malicious-blender-model-files-deliver-stealc-infostealing-malware/


3. ClickFix¹¥»÷ʹÓÃͼÏñÒþдÊõÈö²¥¶ñÒâÈí¼þ


11ÔÂ24ÈÕ£¬½üÆÚ£¬Ñо¿Ö°Ô±·¢Ã÷ClickFix¹¥»÷·ºÆðбäÖÖ£¬¹¥»÷Õßͨ¹ý±ÆÕæµÄWindows¸üж¯»­ºÍͼÏñÒþдÊõÔÚÈ«ÆÁä¯ÀÀÆ÷Ò³ÃæÊµÑéÉç»á¹¤³Ì¹¥»÷¡£¸Ã¹¥»÷×Ô10ÔÂ1ÈÕÆð»îÔ¾£¬ÒÔÍê³É"Òªº¦Çå¾²¸üÐÂ"»ò"È˹¤ÑéÖ¤"ΪÓÕ¶ü£¬ÓÕµ¼Óû§ÔÚWindowsÏÂÁîÌáÐÑ·ûÖÐÕ³Ìù²¢Ö´Ðй¥»÷Õßͨ¹ýJavaScript×Ô¶¯¸´ÖƵ½¼ôÌù°åµÄ¶ñÒâÏÂÁбäÖÖ½ÓÄÉÏȽøÒþдÊÖÒÕ£¬½«¶ñÒâÈí¼þÓÐÓÃÔØºÉ±àÂëÓÚPNGͼÏñµÄÏñËØÊý¾ÝÖУ¬Í¨¹ýÌØ¶¨ÑÕɫͨµÀÔÚÄÚ´æÖÐÖØÐÞ²¢½âÃÜ¡£¹¥»÷Á÷³Ì°üÀ¨¶à½×¶ÎÖ´ÐУºÊ×ÏÈʹÓÃmshtaÔ­Éú¶þ½øÖÆÎļþÖ´ÐжñÒâJS´úÂë£¬Ëæºóͨ¹ýPowerShellºÍ.NET³ÌÐò¼¯´Ó¼ÓÃÜͼÏñÖÐÌáÈ¡shellcode¡£Stego LoaderµÄÇåµ¥×ÊÔ´ÖаüÀ¨AES¼ÓÃܵÄblob£¬ÊµÖÊÊÇǶÈëPNGÎļþµÄshellcode£¬Ðèͨ¹ý×Ô½ç˵C#´úÂëÖØÐÞ¡£ÍþвÐÐΪÕß»¹½ÓÄɶ¯Ì¬¹æ±ÜÕ½ÂÔ"ctrampoline"£¬Í¨¹ýÈë¿Úµãº¯ÊýŲÓÃÍò¸ö¿Õº¯Êý×ÌÈÅÆÊÎö¡£


https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/


4. SitusAMCÊý¾Ýй¶ÊÂÎñ²¨¼°¶¥¼¶ÒøÐпͻ§


11ÔÂ24ÈÕ£¬·¿µØ²úÈÚ×Ê·þÎñ¾ÞÍ·SitusAMCÓÚ2025Äê11ÔÂ12ÈÕ·¢Ã÷Êý¾Ýй¶ÊÂÎñ£¬¸Ã¹«Ë¾Îª»¨Æì¼¯ÍÅ¡¢Ä¦¸ùÊ¿µ¤Àû¡¢Ä¦¸ù´óͨµÈ1500¼Ò¿Í»§ÌṩµäÖÊ´û¿î·¢·Å¡¢·þÎñ¼°ºÏ¹æµÈºǫ́ÔËÓªÖ§³Ö£¬ÄêÓªÊÕÔ¼10ÒÚÃÀÔª¡£¾­³õ³ÌÐò²éÈ·ÈÏ£¬´Ë´ÎÊÂÎñµ¼ÖÂÆóÒµ¿Í»§¼°ÖÕ¶ËÓû§Êý¾Ýй¶£¬Ïêϸ°üÀ¨ÓëÓªÒµ¹ØÏµÏà¹ØµÄ»á¼Æ¼Í¼¡¢Ö´·¨Ð­ÒéµÈÆóÒµÊý¾Ý£¬ÒÔ¼°²¿·Ö¿Í»§µÄ¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£ÊÂÎñʱ¼äÏßÏÔʾ£¬SitusAMCÔÚ11ÔÂ12ÈÕÊÕµ½Çå¾²¾¯±¨ºó£¬ÓÚ15ÈÕÍê³É³õ³ÌÐò²éÈ·ÈÏÎó²îÐÔ×Ó£¬16ÈÕ×îÏÈ֪ͨסլÓû§£¬ÖÁ22ÈÕÍêÓñ³É²¿¿Í»§¼û¸æ¡£¹«Ë¾Ç¿µ÷ÓªÒµÔËӪδÊÜÓ°Ï죬ϵͳδ·¢Ã÷¼ÓÃܶñÒâÈí¼þ°²Åźۼ£¡£Ê×ϯִÐйÙÂõ¿Ë¶û¡¤¸¥À¼¿ÆÌåÏÖ£¬¹«Ë¾Õýͨ¹ýÖ±½ÓÏàͬÇþµÀÏòÊÜÓ°Ïì¿Í»§ÌṩһÁ¬¸üУ¬²¢×¨×¢ÓÚÆÊÎöÊÜÓ°ÏìÊý¾Ý¹æÄ£¡£´Ë´ÎÊÂÎñÉæ¼°Êý¾ÝÖØ´óÐԽϸߣ¬ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¼°Êý¾Ý¹æÄ£ÈÔÔÚÊÓ²ìÖС£Ö»¹ÜÊÂÎñÉæ¼°¶à¼ÒÒøÐÐÒµ¾ÞÍ·£¬µ«¹«Ë¾Î´Åû¶ÏêϸÊÜÓ°Ïì»ú¹¹Ãûµ¥¡£


https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/


5. Shai-Hulud¹©Ó¦Á´¹¥»÷ÖØ´´npmÉú̬


11ÔÂ24ÈÕ£¬½üÆÚ£¬Íþв×éÖ¯Shai-HuludÔÚnpm×¢²á±íÌᳫ´ó¹æÄ£¹©Ó¦Á´¹¥»÷£¬Í¨¹ýľÂí»¯Zapier¡¢ENS Domains¡¢PostHogµÈ492¸ö×ÅÃûÈí¼þ°ü£¬ÇÔÈ¡¿ª·¢Õß¼°CI/CDÍŶӵÄÉñÃØÐÅÏ¢²¢¼ÓÃÜÉÏ´«ÖÁGitHub¡£¹¥»÷ʹÓñ»µÁά»¤ÕßÕË»§ÐÞ¸Äpackage.json×¢Èë¶ñÒâ¾ç±¾£¬ÍŽáTruffleHog¹¤¾ßʵÑéÇÔÃÜ£¬GitHubÒѼì²âµ½27,600ÌõÏà¹ØÌõÄ¿¡£´Ë´Î¹¥»÷·ºÆðÖ¸Êý¼¶À©É¢ÌØÕ÷£ºWizÔÆÇ徲ƽ̨·¢Ã÷350¸öÉæ°¸Î¬»¤ÕßÕË»§£¬Ã¿30·ÖÖÓÐÂÔöÔ¼1,000¸ö´æ´¢¿â¡£¶ñÒâÈí¼þ°üÀ¨setup_bun.jsºÍ10MBµÄbun_environment.js£¬Ö´ÐÐÎå½×¶Î¹¥»÷Á÷³Ì£ºÇÔÈ¡GitHub/npmÁîÅÆ¡¢ÔÆÆ½Ì¨ÃÜÔ¿µÈÉñÃØ£¬²¢ÔÚÖª×ãÌØ¶¨Ìõ¼þ£¨ÈçÎÞ·¨ÈÏÖ¤GitHub¡¢»ñÈ¡ÁîÅÆÊ§°Ü£©Ê±ÁýÕÖÓû§Ö÷Ŀ¼¡£¹¥»÷Ó°ÏìÉîÔ¶£ºENS DomainsµÈ¹¤¾ß°ü±»ÈëÇÖ£¬Ó°ÏìÒÔÌ«·»µØµãÆÊÎö¡¢ENSÖÇÄܺÏÔ¼½»»¥µÈ½¹µã¹¦Ð§¡£GitHubËäÒ»Á¬É¾³ý¹¥»÷Õß½¨ÉèµÄSha1-Hulud£¬µ«ÍþвÐÐΪÕßÈÔ¿ìËÙÖØÐÞ¡£


https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/


6. ¹þ·ð´óѧÔâÓïÒô´¹ÂÚ¹¥»÷ÖÂУÓÑÊý¾Ýй¶


11ÔÂ24ÈÕ£¬¹þ·ð´óѧУÓÑÊÂÎñºÍÉú³¤ÏµÍ³11ÔÂ18ÈÕÔâÓöÓïÒôÍøÂç´¹ÂÚ¹¥»÷£¬µ¼ÖÂѧÉú¡¢Ð£ÓÑ¡¢¾èÔùÕß¡¢Ô±¹¤¼°½ÌÖ°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¾Ý¸ÃУ¸±Ð£³¤¿ËÀ­À­¡¤½ÜÁÖ¿ÆÍÞºÍУÓÑÊÂÎñÓëÉú³¤¸±Ð£³¤¼ªÄ·¡¤ºúÉ­Åû¶£¬Ð¹Â¶Êý¾Ýº­¸Çµç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒÍ¥/°ì¹«µØµã¡¢Ô˶¯³öϯ¼Í¼¡¢¾èÔùÏêÇé¼°Óë´óѧ³ï¿îºÍУÓѼÓÈëÏà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬µ«Î´°üÀ¨Éç»á°ü¹ÜºÅÂë¡¢ÃÜÂë¡¢Ö§¸¶¿¨ÐÅÏ¢»ò²ÆÎñÐÅÏ¢¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬É漰УÓѼ°ÆäÅäż/ÅóÙ­/Òſס¢¾èÔùÕß¡¢ÔÚУÉú¼°½áÒµÉú¼Ò³¤¡¢²¿·ÖÔÚУѧÉúºÍ½ÌÖ°Ô±¹¤¡£¹þ·ð´óѧÒÑÁ¬Ã¦½ÓÄɲ½·¥É¨³ý¹¥»÷Õßϵͳ»á¼ûȨÏÞ£¬²¢ÓëÖ´·¨²¿·Ö¼°µÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖúÊӲ졣11ÔÂ22ÈÕ£¬Ñ§Ð£Ïò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍÊý¾Ýй¶֪ͨ£¬ÌáÐÑСÐÄÒ쳣ͨѶ£¬ÌØÊâÊÇÒªÇóÌṩÃÜÂë¡¢Éç±£ºÅ»òÒøÐÐÐÅÏ¢µÄµç»°¡¢¶ÌÐÅ»òÓʼþ¡£ÕâÊǹþ·ð´óѧ½üÆÚµÚ¶þÆðÊý¾ÝÇå¾²ÊÂÎñ¡£10ÔÂÖÐÑ®£¬ClopÀÕË÷Èí¼þÍÅ»ïÔøÉù³ÆÊ¹ÓÃOracle E-Business SuiteÁãÈÕÎó²îÈëÇÖ¸ÃУϵͳ¡£


https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/