ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß

Ðû²¼Ê±¼ä 2025-10-22

1. ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß


10ÔÂ20ÈÕ£¬£¬£¬£¬ £¬Ò»ÖÖÃûΪGlassWormµÄ×ÔÎÒÈö²¥¶ñÒâÈí¼þÕýͨ¹ýOpenVSXºÍMicrosoft Visual StudioÊг¡Ìᳫ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬ £¬ÒÑÔì³ÉÔ¼35,800´Î×°Ö㬣¬£¬£¬ £¬³ÉΪÊ×ÀýÕë¶ÔVS CodeµÄÈä³æÊ½¹©Ó¦Á´¹¥»÷°¸Àý¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÒþÐÎUnicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬ £¬Í¨¹ýÇÔÈ¡µÄÕË»§ÐÅÏ¢Èö²¥ÖÁ¸ü¶à¿É»á¼ûµÄÀ©Õ¹³ÌÐò£¬£¬£¬£¬ £¬²¢½ÓÄÉSolanaÇø¿éÁ´¾ÙÐп¹É¾³ýµÄÏÂÁî¿ØÖÆ£¬£¬£¬£¬ £¬Í¬Ê±ÒÔGoogleÈÕÀú×÷Ϊ±¸ÓÃͨµÀ¡£¡£¡£¡£¹¥»÷·¾¶ÏÔʾ£¬£¬£¬£¬ £¬GlassWormÔÚ×°Öúó»áÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°49¸öÀ©Õ¹µÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬ £¬°²ÅÅSOCKSÊðÀí·ÓɶñÒâÁ÷Á¿£¬£¬£¬£¬ £¬²¢×°ÖÃVNC¿Í»§¶ËʵÏÖÒþÐÎÔ¶³Ì»á¼û¡£¡£¡£¡£Æä×îÖÕÓÐÓÃÔØºÉZOMBIͨ¹ýSolanaÇø¿éÁ´ÉúÒâÁ´½Ó·Ö·¢£¬£¬£¬£¬ £¬½«ÊÜѬȾϵͳת»¯ÎªÍøÂç·¸·¨½Úµã¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃBitTorrent DHT¾ÙÐÐÊèÉ¢ÏÂÁî·Ö·¢£¬£¬£¬£¬ £¬²¢Ö§³ÖÖ±½ÓÅþÁ¬IPµØµãµÄµÚÈý½»¸¶»úÖÆ¡£¡£¡£¡£×èÖ¹±¨¸æÐû²¼£¬£¬£¬£¬ £¬OpenVSXÉÏÖÁÉÙ11¸öÀ©Õ¹¼°VS CodeÊг¡1¸öÀ©Õ¹±»Ñ¬È¾¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬OpenVSXÉÏÈÔÓÐÖÁÉÙ4¸öÊÜѬȾÀ©Õ¹¿ÉÏÂÔØ£¬£¬£¬£¬ £¬Î¢ÈíÒÑÒÆ³ý¶ñÒâÀ©Õ¹£¬£¬£¬£¬ £¬²¿·ÖÐû²¼ÕßÒѸüÐÂÐÞ¸´¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/


2. ºÚ¿ÍÉù³ÆÍâÂôƽ̨GetirÊý¾Ýй¶


10ÔÂ20ÈÕ£¬£¬£¬£¬ £¬ÍÁ¶úÆäÍâÂôƽ̨Getir¿ËÈÕÏÝÈëÊý¾Ýй¶ÕùÒé¡£¡£¡£¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳Ðû²¼Ìû×Ó£¬£¬£¬£¬ £¬Éù³ÆÒÑ¡°ÈëÇÖ¡±¸Ã¹«Ë¾ÄÚÍøÏµÍ³¡£¡£¡£¡£¾Ý¹¥»÷ÕßÅû¶µÄÑù±¾Êý¾Ý£¬£¬£¬£¬ £¬Ð¹Â¶ÄÚÈÝÖ÷ҪΪGetirÄÚ²¿Ó¦ÓóÌÐòÔªÊý¾Ý£¬£¬£¬£¬ £¬°üÀ¨Bitbucket´æ´¢¿âURL¡¢Óû§È¨ÏÞ¡¢ÏîÄ¿Ãû³Æ¡¢ÊÂÇéÇøID¼°Ô±¹¤µç×ÓÓʼþµØµã¡£¡£¡£¡£Ñо¿ÍŶӯÊÎöÒÔΪ£¬£¬£¬£¬ £¬ÕâЩÊý¾Ý¸ü¿ÉÄÜͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉÌ»ñÈ¡£¡£¡£¡£¬£¬£¬£¬ £¬¶ø·ÇÖ±½Ó»á¼û¹«Ë¾½¹µãϵͳ¡£¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬ £¬Ð¹Â¶µÄÔªÊý¾ÝÈÔ¿ÉÄÜ´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓÃÔ±¹¤µç×ÓÓʼþµØµãʵÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬ £¬ÓÕµ¼Ô±¹¤Ð¹Â¶Ãô¸ÐÐÅÏ¢»òµã»÷¶ñÒâÁ´½Ó£¬£¬£¬£¬ £¬½ø¶ø»ñÈ¡¸üÉî²ãϵͳȨÏÞ£»£»£»£»Ì»Â¶µÄ´æ´¢¿âURLºÍÊÂÇéÇøIDÔò±ãÓÚ¹¥»÷ÕßÔÚÏîÄ¿ÖÐÕ÷²ÉδÊܱ£»£»£»£»¤µÄAPI¶Ëµã»òÉèÖÃÎó²î£¬£¬£¬£¬ £¬ÎªºóÐø¹¥»÷£¨ÈçÔ´´úÂëÇÔÈ¡¡¢ÏµÍ³ÈëÇÖ£©´´Á¢Ìõ¼þ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬GetirÉÐδ¶ÔÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£¡£¡£¡£


https://cybernews.com/security/getir-data-breach-claims/


3. VerisureÔâµÚÈý·½ÏàÖú·½Êý¾Ýй¶£¬£¬£¬£¬ £¬Ó°ÏìÈðµä3.5ÍòÓû§


10ÔÂ20ÈÕ£¬£¬£¬£¬ £¬ÈðµäÇå¾²¾ÞÍ·Verisure¿ËÈÕÅû¶һÆðÉæ¼°ÆìÏÂAlert Alarm²¿·Ö¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÆäÈðµäÍⲿ·¢Æ±ÏàÖúͬ°éµÄЧÀÍÆ÷£¬£¬£¬£¬ £¬²»·¨»á¼ûÁËÓëAlert Alarm¿Í»§Ïà¹ØµÄÊý¾Ý¡£¡£¡£¡£¾­³õ³ÌÐò²é£¬£¬£¬£¬ £¬Verisure×ÔÉíÍøÂç¼°½¹µãϵͳδ·¢Ã÷ÈëÇÖºÛ¼££¬£¬£¬£¬ £¬ÊÂÎñ½öÓ°ÏìµÚÈý·½¼Æ·Ñϵͳ£¬£¬£¬£¬ £¬µ«ÒѲ¨¼°ÈðµäÔ¼3.5ÍòÃûAlert AlarmµÄÏÖÓм°Ç°Óû§¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¿Í»§È«Ãû¡¢µØµã¡¢µç×ÓÓʼþµØµã¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£VerisureÇ¿µ÷£¬£¬£¬£¬ £¬Ö»¹ÜÊý¾Ý»á¼ûȨÏÞ¡°ÓÐÏÞ¡±£¬£¬£¬£¬ £¬µ«ÒÑÆô¶¯ÖÜÈ«ÊӲ첢Ó뾯·½¡¢î¿Ïµ²¿·ÖÏàÖú£¬£¬£¬£¬ £¬ºóÐø½«ÊµÊ±ÏòÊÜÓ°Ïì¿Í»§×ª´ïÏ£Íû¡£¡£¡£¡£Alert Alarm×÷ΪVerisureÆìÏÂרעסլ¡¢¹«Ô¢¼°Ð¡ÐÍÆóÒµÇ徲ЧÀ͵IJ¿·Ö£¬£¬£¬£¬ £¬ÔÚÈðµäÓµÓв»µ½6000Ãû¶©ÔÄÓû§£¬£¬£¬£¬ £¬µ«´Ë´ÎÊÂÎñÏÖʵӰÏì¹æÄ£¸ü¹ã£¬£¬£¬£¬ £¬Éæ¼°ÀúÊ·Óû§Êý¾Ý¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬VerisureÕýÓëÇå¾²ÕÕÁÏÏàÖúÅŲéÎó²î£¬£¬£¬£¬ £¬²¢ºôÓõ¿Í»§Ð¡ÐÄ´¹ÂÚ¹¥»÷¼°Éí·Ýڲƭ¡£¡£¡£¡£


https://cybernews.com/security/verisure-data-breach/


4. AWSÈ«Çò´ó¹æÄ£ÖÐÖ¹ÖÂ¶àÆ½Ì¨Ì±»¾£¬£¬£¬£¬ £¬Ð§Àͻָ´Àú³ÌÒ»Á¬Íƽø


10ÔÂ20ÈÕ£¬£¬£¬£¬ £¬ÑÇÂíÑ·AWSÔâÓöÈ«ÇòÐÔ´ó¹æÄ£ÖÐÖ¹ÊÂÎñ£¬£¬£¬£¬ £¬µ¼ÖÂÊý°ÙÍòÍøÕ¾¼°Ð§ÀÍ̱»¾£¬£¬£¬£¬ £¬Ó°Ïì¹æÄ£º­¸ÇÃÀ¹ú¡¢Å·Ö޵ȶà¸öµØÇø¡£¡£¡£¡£´Ë´ÎÖÐֹʼÓÚÃÀ¹ú¶«²¿Ê±¼äÆÆÏþ4:30×óÓÒ£¬£¬£¬£¬ £¬Ò»Á¬Ô¼45·ÖÖӺ󲿷ÖЧÀÍ×îÏȻָ´£¬£¬£¬£¬ £¬µ«ºóÐøÓÖÒòÍøÂç¸ºÔØÆ½ºâÆ÷ÎÊÌâ·ºÆðÖØ¸´£¬£¬£¬£¬ £¬×èÖ¹µ±ÈÕÏÂÖç12:06£¬£¬£¬£¬ £¬AWSÐû²¼ÒÑͨ¹ýÌØÊ⻺½â²½·¥»Ö¸´ÅþÁ¬ÐÔ¼°API¹¦Ð§£¬£¬£¬£¬ £¬µ«ÐÂEC2ʵÀýÆô¶¯ÈÔÊÜÏÞ£¬£¬£¬£¬ £¬Ô¤¼ÆÌ«Æ½ÑóÏÄÁîʱÉÏÎç10:00ǰ¸üÐÂÏ£Íû¡£¡£¡£¡£¾ÝAWS¿µ½¡Ò³ÃæÅû¶£¬£¬£¬£¬ £¬ÎÊÌâ½¹µãÔ´ÓÚUS-EAST-1ÇøÓòDynamoDB API¶ËµãµÄDNSÆÊÎö¹ÊÕÏ£¬£¬£¬£¬ £¬Òý·¢¶à¸öЧÀ͹ýʧÂÊÓëÑÓ³Ù¼¤Ôö£¬£¬£¬£¬ £¬°üÀ¨Amazon.com¡¢Prime Video¡¢Perplexity AI¡¢CanvaµÈ½¹µãƽ̨¾ùÊܲ¨¼°¡£¡£¡£¡£ÏêϸÊÜÓ°ÏìЧÀÍÇåµ¥ÏÔʾ£¬£¬£¬£¬ £¬³ýÑÇÂíÑ·×ÔÓªÓªÒµÍ⣬£¬£¬£¬ £¬Epic GamesÆìÏ¡¶±¤ÀÝÖ®Ò¹¡·£¨µÇ¼¹¦Ð§Ì±»¾£©¡¢Roblox¡¢Hulu¡¢Snapchat¡¢Grammarly¡¢Roblox¼°½ÌÓýƽ̨CanvasµÈ15¸öÖ÷ҪЧÀÍͨ¹ýDowndetectorÈ·ÈÏÖÐÖ¹£¬£¬£¬£¬ £¬CanvaÔÚ×´Ì¬Ò³ÃæÃ÷È·Ö¸ÍÉ»¯ÎóÂÊÏÔÖøÉÏÉýÓ°ÏìͼÏñ±à¼­µÈ¹¦Ð§£¬£¬£¬£¬ £¬Fortnite¡¢PerplexityÒà֤ʵЧÀÍÏÂÏß¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/aws-outage-crashes-amazon-prime-video-fortnite-perplexity-and-more/


5. CISAÈ·ÈÏOracle E-Business Suite SSRFÎó²îÔâʹÓÃ


10ÔÂ21ÈÕ£¬£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Oracle E-Business SuiteµÄCVE-2025-61884Îó²îÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬ £¬ÒªÇóÁª°î»ú¹¹ÓÚ2025Äê11ÔÂ10ÈÕǰÍê³ÉÐÞ²¹¡£¡£¡£¡£¸ÃÎó²îΪOracle ConfiguratorÔËÐÐʱ×é¼þÖеÄЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬£¬£¬£¬ £¬OracleÓÚ10ÔÂ11ÈÕÅû¶ʱ½«ÆäÑÏÖØÐÔÆÀ¼¶Îª7.5£¬£¬£¬£¬ £¬ÖÒÑÔÆäÒ×±»Ê¹ÓÃÒÔ¡°Î´¾­ÊÚȨ»á¼ûÒªº¦Êý¾Ý»òÍêÈ«»á¼ûËùÓÐOracle Configurator¿É»á¼ûÊý¾Ý¡±¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ £¬¸ÃÎó²îÓë7Ô¹¥»÷ÖÐй¶µÄÎó²îÖ±½ÓÏà¹Ø¡£¡£¡£¡£10Ô³õ£¬£¬£¬£¬ £¬MandiantÅû¶ClopÀÕË÷Èí¼þÍÅ»ïÒÑÏòÆóÒµ·¢ËÍÀÕË÷Óʼþ£¬£¬£¬£¬ £¬Éù³ÆÊ¹ÓÃÁãÈÕÎó²îÇÔÈ¡ÁËOracle EBSÊý¾Ý¡£¡£¡£¡£Oracle»ØÓ¦³Æ£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßʹÓÃÁË7ÔÂÒÑÐÞ²¹µÄÎó²î¡£¡£¡£¡£½øÒ»³ÌÐò²éÕ¹ÏÖ£¬£¬£¬£¬ £¬Oracle EBS³ÉΪÁ½Æð×ÔÁ¦¹¥»÷µÄÄ¿µÄ£º7Ô¹¥»÷Õë¶Ô¡°/configurator/UiServlet¡±¶ËµãµÄSSRFÎó²î£¨¼´CVE-2025-61884£©£¬£¬£¬£¬ £¬¶ø8Ô¹¥»÷ÔòʹÓá°/OA_HTML/SyncServlet¡±¶ËµãµÄÁíÒ»Îó²î£¨CVE-2025-61882£©£¬£¬£¬£¬ £¬ºóÕß±»¹éÒòÓÚClopÍŻ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw/


6. ¶í¹ØÁªÀÕË÷ÍÅ»ïINC RansomÍþв¹ûÕæ¸ß¶û·ò¾ÞÍ·Êý¾Ý


10ÔÂ21ÈÕ£¬£¬£¬£¬ £¬Óë¶íÂÞ˹ÓйصÄÀÕË÷Èí¼þÍÅ»ïINC Ransom 10ÔÂ16ÈÕÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû³Æ£¬£¬£¬£¬ £¬ÒÑÇÔÈ¡¸ß¶û·ò´ò°ç¾ÞÍ·Summit Golf Brands47GBÊý¾Ý£¬£¬£¬£¬ £¬²¢Æô¶¯Êý¾Ý¹ûÕæµ¹¼ÆÊ±£¬£¬£¬£¬ £¬¾àËùν¡°Êý¾ÝÐû²¼¡±½öÊ£ÈýÌì¡£¡£¡£¡£¸ÃÍÅ»ïÉÐδÌṩÊý¾ÝÑù±¾×ôÖ¤£¬£¬£¬£¬ £¬´Ë¾Ù±»ÊÓΪÆÈʹÆóÒµÖ§¸¶Êê½ðµÄÕ½ÂÔÊֶΡ£¡£¡£¡£Summit Golf BrandsÆìϰüÀ¨Zero Restriction¡¢B. DraddyµÈ×ÅÃûÆ·ÅÆ£¬£¬£¬£¬ £¬ÄêÓªÊÕ2790ÍòÃÀÔª¡£¡£¡£¡£INC Ransom½¨ÉèÓÚ2023Äê7Ô£¬£¬£¬£¬ £¬ÒÑÔì³É234ÃûÊܺ¦Õߣ¬£¬£¬£¬ £¬ÒÔ¡°¶àÖØÀÕË÷¡±Öø³Æ£º²»µ«¼ÓÃÜÎļþ£¬£¬£¬£¬ £¬»¹ÇÔÈ¡Êý¾Ý²¢Íþвй¶£¬£¬£¬£¬ £¬ÉõÖÁÒÔ¡°¸¶·Ñ¼´ÌáÉýϵͳÇå¾²¡±µÄŤÇú˵´ÇÓÕÆ­Êê½ð¡£¡£¡£¡£´Ë´ÎÕë¶ÔSummit Golf BrandsµÄ¹¥»÷£¬£¬£¬£¬ £¬Ì»Â¶ÁËÀÕË÷Èí¼þÍÅ»ï¶ÔÉÌҵʵÌåµÄÒ»Á¬Íþв¡£¡£¡£¡£Ëæ×ŵ¹¼ÆÊ±ÁÚ½ü£¬£¬£¬£¬ £¬ÆóÒµÃæÁÙÁ½ÄÑ£ºÖ§¸¶Êê½ð¿ÉÄÜÖú³¤·¸·¨£¬£¬£¬£¬ £¬¾Ü¾øÔò¿ÉÄÜÃæÁÙÊý¾Ýй¶Σº¦¼°ÉùÓþË𺦡£¡£¡£¡£


https://cybernews.com/security/hackers-threaten-to-drop-47gb-of-top-golf-brands-secrets/