CISAÒªÇóÁª°î»ú¹¹½ôÆÈÐÞ¸´HPE OneViewÎó²î
Ðû²¼Ê±¼ä 2026-01-091. CISAÒªÇóÁª°î»ú¹¹½ôÆÈÐÞ¸´HPE OneViewÎó²î
1ÔÂ8ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«HPE OneViewµÄCVE-2025-37164Îó²î±ê¼ÇΪ¡°ÕýÔÚ±»Æð¾¢Ê¹Óá±£¬¸ÃÎó²îÊô×î¸ß¼¶±ðΣº¦¡£HPE OneViewÊÇÓÃÓÚ¼¯ÖÐÖÎÀí´æ´¢¡¢·þÎñÆ÷ºÍÍøÂç×°±¸µÄ»ù´¡¼Ü¹¹ÖÎÀíÈí¼þ£¬ÆÕ±éÓ¦ÓÃÓÚÆóÒµITÇéÐΡ£Îó²îÓÉÔ½ÄÏÇå¾²Ñо¿Ô±Nguyen Quoc Khanh£¨brocked200£©·¢Ã÷²¢±¨¸æ£¬HPEÓÚ2025Äê12ÔÂÖÐÑ®Ðû²¼Çå¾²²¹¶¡£¬µ«Îó²îÓ°Ïìv11.00֮ǰµÄËùÓÐOneView°æ±¾¡£CVE-2025-37164ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßͨ¹ýµÍÖØÆ¯ºó´úÂë×¢Èë¹¥»÷ʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬¹¥»÷ÕßÎÞÐèÍâµØÈ¨ÏÞ¼´¿ÉÍêÈ«¿ØÖÆÊÜÓ°Ïìϵͳ¡£HPEÔÚ12ÔÂ16ÈÕµÄÖÒÑÔÖÐÇ¿µ÷£¬¸ÃÎó²î¿ÉÄܱ»Ô¶³ÌÓû§Ê¹ÓÃÖ´ÐжñÒâ´úÂ룬ֱ½ÓÍþвÆóÒµ½¹µã»ù´¡ÉèÊ©Çå¾²¡£CISAÒѽ«¸ÃÎó²îÄÉÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¬²¢ÒÀ¾Ý2021ÄêÐû²¼µÄBOD 22-01Ö¸ÁҪÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚ2026Äê1ÔÂ28ÈÕǰÍê³ÉϵͳÐÞ¸´¡£
https://www.bleepingcomputer.com/news/security/cisa-tags-max-severity-hpe-oneview-flaw-as-actively-exploited/
2. GoBruteforcer½©Ê¬ÍøÂçÉý¼¶±©Á¦ÆÆ½â¹¥»÷
1ÔÂ7ÈÕ£¬Ò»¿îÃûΪGoBruteforcerµÄ¸ßÖØÆ¯ºóGoÓïÑÔ½©Ê¬ÍøÂçÕý¶ÔÈ«ÇòLinux·þÎñÆ÷ÌᳫǿÁÒ¹¥»÷£¬Í¨¹ý±©Á¦ÆÆ½âÊÖ¶ÎʵÑé»ñÈ¡FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdminµÈ¹«ÍøÌ»Â¶·þÎñµÄÈõÃÜÂë¡£Check Point Research¼Í¼ÏÔʾ£¬Æä2025Äê±äÖÖ°æ±¾ÊÖÒÕˮƽ´ó·ùÉý¼¶£¬Òѹ¥ÏÝÊýÍǫ̀·þÎñÆ÷£¬È«Çò³¬5Íǫ̀·þÎñÆ÷ÃæÁÙΣº¦£¬Éæ¼°570ÍòFTP¡¢223ÍòMySQL¼°56ÍòPostgreSQLĬÈ϶˿Ú̻¶װ±¸¡£¸Ã½©Ê¬ÍøÂç½ÓÄÉÄ£¿é»¯¼Ü¹¹£¬°üÀ¨ÍøÒ³ºóÃÅ¡¢ÏÂÔØÆ÷¡¢IRC½©Ê¬³ÌÐò¼°±©Á¦ÆÆ½âÄ£¿é¡£¹¥»÷ÍÆÊÖÖ÷ÒªÔ´ÓÚÔËάְԱ¸´ÓÃAIÌìÉúµÄ·þÎñÆ÷ÉèÖÃÄ£°å£¬ÒÔ¼°XAMPPµÈÀϾɼ¯³ÉÇéÐÎȱ·¦¼Ó¹Ì¡£ÆäÃÜÂëÁбíÓë1000ÍòÌõй¶ÃÜÂëÊý¾Ý¿âÖØºÏÂÊ´ï2.44%£¬»ùÓÚ375-600¸öÈõÃÜÂëÌìÉú±äÌ壬ÍŽáÖØ´ó̻¶·þÎñ»ùÊýÐγɸ߾¼ÃÐ§Òæ¹¥»÷¡£2025±äÖÖÍêÈ«ÖØ¹¹IRC×é¼þΪGoÓïÑÔ£¬Ê¹ÓÃGarbler¹¤¾ßÉî¶È»ìÏý´úÂ룬ÐÂÔöÀú³ÌαװÊÖÒÕ£¬ÌÓ±ÜÇå¾²¼ì²â¡£
https://cybersecuritynews.com/gobruteforcer-botnet/
3. ¶ñÒânpm°üÈö²¥NodeCordRAT¶ñÒâÈí¼þ
1ÔÂ8ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÒ»ÆðÕë¶ÔnpmÉú̬µÄ¶ñÒâÈí¼þÈö²¥ÊÂÎñ£¬·¢Ã÷Èý¸öÓÉÓû§"wenmoonx"ÉÏ´«µÄ¶ñÒânpmÈí¼þ°ü¡ª¡ªbitcoin-main-lib£¨2,300´ÎÏÂÔØ£©¡¢bitcoin-lib-js£¨193´ÎÏÂÔØ£©¼°bip40£¨970´ÎÏÂÔØ£©¡£×èÖ¹2025Äê11Ô£¬ÕâЩ°üÒѱ»È«ÊÖϼܣ¬µ«ÒѶԿª·¢ÕßÉçÇøÔì³ÉʵÖÊÐÔÍþв¡£¾ÝÆÊÎö£¬Ç°Á½¸ö¶ñÒâ°üÔÚ×°ÖÃʱ»áÖ´ÐÐpostinstall.cjs¾ç±¾£¬×Ô¶¯×°ÖðüÀ¨¶ñÒâ¸ºÔØµÄbip40°ü¡£¸Ã×îÖÕ¸ºÔر»ÃüÃûΪNodeCordRAT£¬ÊÇÒ»ÖÖ¾ßÓÐÊý¾ÝÇÔÈ¡ÄÜÁ¦µÄÔ¶³Ì»á¼ûľÂí¡£ÆäÃû³ÆÔ´ÓÚË«ÖØÈö²¥ÌØÕ÷£ºÊ¹ÓÃnpm×÷Ϊ³õʼÈö²¥Ç°ÑÔ£¬Í¨¹ýDiscord·þÎñÆ÷½¨ÉèÏÂÁîÓë¿ØÖÆ£¨C&C£©Í¨µÀ¡£¸ÃľÂí¾ß±¸¶àÖØÎ£º¦¹¦Ð§£º¿ÉÇÔÈ¡¹È¸èChromeä¯ÀÀÆ÷ƾ֤¡¢APIÁîÅÆ¼°MetaMaskµÈ¼ÓÃÜÇ®±ÒÇ®°üµÄÖú¼Ç´Ê£»Í¨¹ýÓ²±àÂëµÄDiscord·þÎñÆ÷ÎüÊÕÖ¸Á֧³ÖÖ´ÐÐí§ÒâshellÏÂÁî¡¢½ØÈ¡×ÀÃæÆÁÄ»¼°ÉÏ´«Ö¸¶¨ÎļþµÈ²Ù×÷¡£Êý¾Ýͨ¹ýDiscord APIµÄ/messages¶ËµãÒÔ¸½¼þÐÎʽÉÏ´«ÖÁ˽ÃÜÆµµÀ£¬ÐγÉÒþ²ØµÄÇÔÃÜÁ´Â·¡£
https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
4. °ÍÎ÷WhatsAppÓû§ÔâAstarothľÂí¶¨Ïò¹¥»÷
1ÔÂ8ÈÕ£¬°²¿Ëŵ˹ÍþвÑо¿ÍŶӿËÈÕÅû¶´úºÅ"·ÛºìºÓëà"µÄÐÂÐ͹¥»÷Ô˶¯£¬¹¥»÷ÕßÒÔ°ÍÎ÷WhatsAppÓû§ÎªÄ¿µÄ£¬Í¨¹ý¸Ãƽ̨Èö²¥¾ßÓжàÄ£¿é»¯ÌØÕ÷µÄAstaroth£¨ÓÖÃû"¼ª¶û´ïÂí"£©WindowsÒøÐÐľÂí¡£¸ÃľÂí×Ô2015ÄêÆðÒ»Á¬»îÔ¾ÓÚÀÃÀµØÇø£¬ÓÈÒÔ°ÍÎ÷ÎªÖØÔÖÇø£¬½¹µãÄ¿µÄΪÇÔÈ¡Óû§Êý¾Ý¼°ÒøÐÐÆ¾Ö¤¡£¹¥»÷Á´ÒÔZIPѹËõ°üΪ³õÊ¼ÔØÌ壬ÄÚº¬Î±×°³ÉÕý³£ÎļþµÄVB¾ç±¾¼°MSI×°ÖóÌÐò¡£µ±Êܺ¦Õß½âѹ²¢Ö´Ðо籾ºó£¬»á´¥·¢PowerShell/Python¾ç±¾ÏÂÔØ£¬Æô¶¯×°±¸ÈëÇÖÁ÷³Ì¡£´Ë´Î¹¥»÷µÄÏÔÖøÌØÕ÷ÔÚÓÚÐÂÔöµÄPythonÓïÑÔ¿ª·¢WhatsAppÈ䳿ģ¿é£¬¸ÃÄ£¿é¿É×Ô¶¯ÍøÂçÊܺ¦ÕßͨѶ¼£¬²¢ÏòËùÓÐÁªÏµÈËת·¢º¬¶ñÒâZIPµÄÈö²¥ÐÂÎÅ£¬Ðγɼ¸ºÎ¼¶À©É¢Ð§Ó¦¡£Astaroth½ÓÄÉÄ£¿é»¯¼Ü¹¹Éè¼Æ£ºÆä½¹µã³ÌÐòÓɵ¶û¸£ÓïÑÔ±àд£¬×°ÖóÌÐòÒÀÍÐVB¾ç±¾ÔËÐУ¬¶øÈö²¥Ä£¿éÔòʹÓÃPython¿ª·¢£¬ÌåÏÖÍþвÐÐΪÕß¶Ô¶àÓïÑÔ±à³ÌµÄÎÞаÔËÓá£ÒøÐÐľÂíÄ£¿éÔÚºǫ́һÁ¬¼à¿ØÓû§ä¯ÀÀÆ÷Ô˶¯£¬µ±¼ì²âµ½»á¼ûÒøÐÐÏà¹ØÍøÖ·Ê±£¬Á¬Ã¦¼¤»î²¢ÇÔÈ¡µÇ¼ƾ֤£¬ÊµÏÖ¾¼Ã·¸·¨Ä¿µÄ¡£
https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
5. ³¯ÏÊKimsukiʹÓöñÒâ¶þάÂë¹¥»÷ÃÀ¹ú×éÖ¯
1ÔÂ8ÈÕ£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö¿ËÈÕÐû²¼½ôÆÈ¾¯±¨£¬½ÒÆÆ³¯Ïʹٷ½Ö§³ÖµÄºÚ¿Í×éÖ¯Kimsuki£¨APT43£©Õýͨ¹ý¶ñÒâ¶þάÂëÌᳫÕë¶ÔÃÀ¹ú×éÖ¯µÄÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£´Ë´Î¹¥»÷Ö÷ÒªÃé×¼¼ÓÈ볯ÏÊÏà¹ØÕþ²ß¡¢Ñо¿ºÍÆÊÎöµÄÃÀ¹ú»ú¹¹£¬°üÀ¨·ÇÕþ¸®×éÖ¯¡¢Öǿ⡢ѧÊõ»ú¹¹¡¢Õ½ÂÔ×Éѯ¹«Ë¾¼°Õþ¸®ÊµÌå¡£¹¥»÷Õßͨ¹ý·¢ËͰüÀ¨¶ñÒâ¶þάÂëµÄ´¹ÂÚÓʼþ£¬ÓÕʹÊܺ¦ÕßɨÃè¶þάÂëºóÖØ¶¨ÏòÖÁαװ³ÉÎʾíÊӲ졢Çå¾²Çý¶¯Æ÷»òÐéαµÇÂ¼Ò³ÃæµÄ¶ñÒâÍøÕ¾¡£É¨Ãèºó£¬Êܺ¦Õß×°±¸»á±»Â·ÓÉÖÁ¹¥»÷Õß¿ØÖƵĻù´¡ÉèÊ©£¬¾ÙÐÐ×°±¸Ö¸ÎÆÊ¶±ð£¬ÍøÂçÓû§ÊðÀíÐÅÏ¢¡¢²Ù×÷ϵͳ¡¢IPµØµã¡¢ÆÁÄ»³ß´ç¼°ÍâµØÓïÑÔµÈÊý¾Ý¡£Ëæºó£¬Êܺ¦Õ߻ῴµ½Ä£ÄâMicrosoft 365¡¢Okta¡¢VPN»òGoogleµÇÂ¼Ò³ÃæµÄ´¹ÂÚÒ³Ãæ£¬×îÖÕÄ¿µÄΪÇÔÈ¡»á¼ûƾ֤»ò»á»°ÁîÅÆ¡£´ËÀ๥»÷ͨ¹ýÒÆ¶¯×°±¸É¨Ãè¶þάÂëµÄÌØÕ÷£¬ÓÐÓÃÈÆ¹ý¹Å°åµç×ÓÓʼþÇå¾²½â¾ö¼Æ»®¼°¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©¡£ÓÉÓÚ¹¥»÷Ô´×ÔδÊÜÖÎÀíµÄÒÆ¶¯×°±¸£¬´¦ÓÚ±ê×¼¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©ºÍÍøÂç¼à¿ØÖ®Í⣬±»ÐÎòΪ¡°²»ÊÜMFA±£»¤µÄÉí·ÝÈëÇÖÏòÁ¿¡±¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-about-kimsuky-hackers-using-qr-codes-to-phish-us-orgs/
6. ¶ñÒâÈí¼þ¼ÓÔØÆ÷pkr_mtsi¿Éת´ï¶àÖÖÓÐÓÃÔØºÉ
1ÔÂ8ÈÕ£¬ReversingLabs£¨RL£©¿ËÈÕÅû¶£¬Ò»ÖÖÃûΪpkr_mtsiµÄ¶ñÒâWindows´ò°ü³ÌÐò×Ô2025Äê4ÔÂ24ÈÕ·¢Ã÷ÒÔÀ´Ò»Á¬»îÔ¾£¬³ÉΪ´ó¹æÄ£¶ñÒâ¹ã¸æºÍSEOͶ¶¾Ô˶¯µÄ½¹µã¼ÓÔØÆ÷¡£¸Ã¹¤¾ßͨ¹ýÐéαÏÂÔØÍøÕ¾ÓÕÆÓû§ÏÂÔØÎ±×°³ÉPuTTY¡¢Rufus¡¢Microsoft TeamsµÈÕýµ±Èí¼þµÄľÂí×°ÖóÌÐò£¬Ê¹Óø¶·ÑËÑË÷¹ã¸æºÍËÑË÷ÅÅÃûʹÓÃÌáÉýÆØ¹âÂÊ£¬¶ø·ÇÒÀÀµ¹©Ó¦ÉÌÈëÇÖ¡£pkr_mtsi¾ß±¸¸ß¶ÈÎÞаÐÔ£¬¿É°²ÅÅOyster¡¢Vidar¡¢Vanguard Stealer¡¢SupperµÈ¶àÖÖ¶ñÒâÈí¼þ¼Ò×å¡£Æä½ø»¯¹ì¼£ÏÔÖø£ºÒÑÍù°Ë¸öÔÂÄÚÒýÈë¸üǿʢµÄ»ìÏýÊÖÒÕ¡¢¹þÏ£APIÆÊÎö¼°·´ÆÊÎö»úÖÆ£¬Í¬Ê±¼á³Ö¡°ÄÚ´æ·ÖÅÉ-С¹æÄ£Ð´ÈëÖØÐÞÔØºÉ¡±µÄÎȹÌÖ´ÐÐÄ£×Ó¡£Òªº¦ÊÖÒÕÌØÕ÷°üÀ¨Ë¢ÐµÄUPXÖÐÐļ¶Ìî³ä¡¢»ìÏýµÄZwAllocateVirtualMemoryŲÓá¢×ÌÈÅÆÊÎöµÄÀ¬»øGDI APIŲÓã¬ÒÔ¼°´¥·¢Àú³ÌÖÕÖ¹»òÎÞÏÞÑ»·µÄ·´µ÷ÊÔ¼ì²é¡£Ö»¹Ü½á¹¹¶à±ä£¬µ«ÆäÖØ¸´Å²ÓôøÓÐÎÞЧ±£»¤±ê¼ÇµÄNtProtectVirtualMemoryº¯Êý±¬·¢µÄ¿ÉÕ¹Íû¹ýʧ£¬Îª¶ËµãÒ£²â¼à¿ØÌṩÁ˿ɿ¿¼ì²âʱ»ú¡£
https://www.infosecurity-magazine.com/news/malware-loader-pkrmtsi-payloads/


¾©¹«Íø°²±¸11010802024551ºÅ