GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷
Ðû²¼Ê±¼ä 2025-11-131. GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷
11ÔÂ11ÈÕ£¬£¬£¬£¬ÈÕÁ¢ÆìÏÂÊý×Ö¹¤³ÌЧÀÍÉÌGlobalLogic¿ËÈÕÅû¶£¬£¬£¬£¬ÆäOracle E-Business Suite£¨EBS£©Æ½Ì¨ÒòÁãÈÕÎó²îCVE-2025-61882ÔâÓöÊý¾Ýй¶£¬£¬£¬£¬Ó°Ïì10,471ÃûÏÖÈμ°Ç°ÈÎÔ±¹¤¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚ¼ÓÖÝÊ¥¿ËÀÀ£¬£¬£¬£¬ÓªÒµÁýÕÖÈ«Çò59¸ö¹¤³ÌÖÐÐÄ¡£¡£¡£¡£¡£¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎ¥¹æÍ¨Öª£¬£¬£¬£¬¹¥»÷Õß×îÔçÓÚ2025Äê7ÔÂ10Èջ£¬£¬£¬£¬8ÔÂ20ÈÕÍê³ÉÊý¾ÝÇÔÈ¡£¬£¬£¬£¬10ÔÂ9ÈÕ»á¼ûÊý¾Ý¿âʵÑé͵ÇÔ£¬£¬£¬£¬Éæ¼°ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢½ôÆÈÁªÏµÈË¡¢µç×ÓÓÊÏä¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢»¤ÕÕ/Éí·ÝÖ¤ºÅ¡¢ÈËΪ¼°ÒøÐÐÕË»§µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£GlobalLogicÇ¿µ÷£¬£¬£¬£¬´Ë´ÎÊÂÎñ½ö²¨¼°Oracleƽ̨£¬£¬£¬£¬Î´Ó°ÏìÆäËûϵͳ£¬£¬£¬£¬²¢Ö¸³öÆäÊÇÖÚ¶àÊÜOracleÎó²îÓ°ÏìµÄ¿Í»§Ö®Ò»¡£¡£¡£¡£¡£¡£Ö»¹ÜδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬£¬µ«ÊÂÎñϸ½ÚÓëClopÀÕË÷Èí¼þÍÅ»ï×Ô8ÔÂÒÔÀ´µÄ¹¥»÷ģʽ¸ß¶ÈÎǺϡª¡ª¸Ã×é֯ʹÓÃͳһÎó²î´Ó¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬²¢Í¨¹ýTorÐ¹Â¶ÍøÕ¾Ðû²¼Êܺ¦ÕßÐÅÏ¢¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬GlobalLogicδ·ºÆðÔÚClopµÄй¶Ãûµ¥ÖУ¬£¬£¬£¬¿ÉÄÜ´¦ÓÚ̸ÅлòÒÑÖ§¸¶Êê½ð½×¶Î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/
2. ºº±¤Î¢Ëõ¾°¹Û¹ÝÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬ÐÅÓÿ¨Êý¾ÝÔâй¶
11ÔÂ11ÈÕ£¬£¬£¬£¬ºº±¤Î¢Ëõ¾°¹Û¹ÝÊǵ¹ú±±²¿ÈÈÃÅÂÃÓÎʤµØ¼°È«Çò×î´óÌúµÀÄ£×ÓÕ¹Çø£¬£¬£¬£¬¿ËÈÕÏòÓοÍת´ïÒ»ÆðÑÏÖØÊý¾ÝÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬6ÔÂ6ÈÕÖÁ10ÔÂ29ÈÕʱ´ú£¬£¬£¬£¬Í¨¹ýÏßÉÏÇþµÀʹÓÃÐÅÓÿ¨¹ºÆ±µÄÓοÍÐÅÏ¢¿ÉÄܱ»Î´ÊÚȨµÚÈý·½»ñÈ¡£¬£¬£¬£¬Éæ¼°³Ö¿¨ÈËÐÕÃû¡¢¿¨ºÅ¡¢ÑéÖ¤Âë¼°ÓÐÓÃÆÚµÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬Ó°Ïì¹æÄ£Ô¤¼Æ´ïÊýǧÖÁÊýÊ®ÍòÈË¡£¡£¡£¡£¡£¡£¸Ã³¡¹ÝÔÚÓʼþÖÐÃ÷È·£¬£¬£¬£¬ÏßÉϹºÆ±Ò³Ãæ±£´æÇå¾²Îó²î£¬£¬£¬£¬µ¼ÖÂÐÅÓÿ¨Êý¾Ý²»µ«´«ÊäÖÁÖ§¸¶Ð§ÀÍÉÌ£¬£¬£¬£¬»¹Á÷ÏòÁËÁíһ̨×ÔÁ¦Ð§ÀÍÆ÷£¬£¬£¬£¬Ð¹Â¶Ê±³¤¿¿½üÎå¸öÔ¡£¡£¡£¡£¡£¡£×÷ΪÄê½Ó´ý³¬150ÍòÈ˴εÄÈÈÞ°µã£¬£¬£¬£¬Ö»¹Ü²¢·ÇËùÓÐÓο;ùͨ¹ýÏßÉϹºÆ±£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÈÔ¿ÉÄÜÒý·¢´ó¹æÄ£¹¤ÒµËðʧ»òÉí·ÝðÓÃΣº¦¡£¡£¡£¡£¡£¡£³¡¹Ý·½ÃæÌåÏÖ£¬£¬£¬£¬ÊÂÎñ·¢Ã÷ºóÒÑÁ¬Ã¦¸ôÀëÊÜÓ°ÏìЧÀÍÆ÷£¬£¬£¬£¬µ«Ïêϸй¶¹æÄ£¼°¹¥»÷ÕßÉí·ÝÈÔ´ý½øÒ»³ÌÐò²é¡£¡£¡£¡£¡£¡£³¡¹ÝÔÚ֪ͨÖÐÇ¿µ÷£¬£¬£¬£¬ÎÞ·¨Íêȫɨ³ýÊý¾Ý±»ÀÄÓõĿÉÄÜÐÔ£¬£¬£¬£¬½¨ÒéÊÜÓ°ÏìÓοÍÇ×½ü¹Ø×¢ÐÅÓÿ¨ÉúÒâ¼Í¼£¬£¬£¬£¬ÊµÊ±ÁªÏµÒøÐж³½áÕË»§»òÌæ»»¿¨Æ¬¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/miniatur-wunderland-museum-cyberattack/
3. SIAD GroupÔâEverest GroupÀÕË÷¹¥»÷
11ÔÂ11ÈÕ£¬£¬£¬£¬¶íÂÞ˹¹ØÁªµÄÀÕË÷Èí¼þÍÅ»ïEverest Group¿ËÈÕÔÚ°µÍøÐ¹Â¶Õ¾µãÐû³Æ£¬£¬£¬£¬ÒÑ´ÓÒâ´óÀû×î´ó¹¤ÒµÆøÌåÉú²úÉÌÖ®Ò»SIAD GroupÇÔÈ¡159GBÊý¾Ý£¬£¬£¬£¬²¢Æô¶¯8Ììµ¹¼ÆÊ±Íþв¹ûÕæÐ¹Â¶¡£¡£¡£¡£¡£¡£SIAD Group½¨ÉèÓÚ1927Ä꣬£¬£¬£¬×ܲ¿Î»ÓÚ±´¼ÓĪ£¬£¬£¬£¬2024ÄêÓªÒµ¶î³¬11ÒÚÅ·Ôª£¬£¬£¬£¬ÓªÒµº¸ÇʳÎï¡¢Ò½ÁÆ¡¢Æû³µ¡¢Ò±½ðµÈÐÐÒµµÄ¹¤ÒµÆøÌåÉú²úÓë·ÖÏú£¬£¬£¬£¬Í¬Ê±Éæ¼°Òº»¯Ê¯ÓÍÆø¡¢×ÔÈ»Æø¹©Ó¦¡¢ÆøÌå´¦Öóͷ£×°±¸Ñз¢¼°Ò½ÁƱ£½¡Ð§ÀÍ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÒªÇóSIAD GroupÔÚµ¹¼ÆÊ±¿¢ÊÂǰÁªÏµÖ§¸¶Êê½ð£¬£¬£¬£¬²»È»½«¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬°µÍøÕ¾µãÉÐδÐû²¼Êý¾ÝÑù±¾£¬£¬£¬£¬ÏêϸÊÜÓ°Ïìϵͳ¼°Êý¾ÝÄÚÈÝÈÔ²»Ã÷È·¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬ÈôÎ÷Ñǵ¼¯ÍÅÉú²úÔËÓªÒò¹¥»÷ÖÐÖ¹£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÅ·ÃËÖÆÔìÒµ¡¢Ò½ÁƺÍÄÜÔ´ÐÐÒµµÄºÄ²Ä¹©Ó¦£¬£¬£¬£¬Òý·¢Á¬Ëø·´Ó¦¡£¡£¡£¡£¡£¡£Everest Group×Ô2021Äê7Ô»îÔ¾ÒÔÀ´£¬£¬£¬£¬ÒÑ·¢¶¯¶àÆðÆÆËðÐÔ¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´ÎÕë¶ÔSIAD GroupµÄ¹¥»÷£¬£¬£¬£¬ÊǸÃÍÅ»ïÒ»Á¬Õë¶ÔÒªº¦»ù´¡ÉèÊ©ºÍ´óÐÍÆóÒµµÄ×îа¸Àý¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/siad-group-ransomware-attack/
4. DanaBot¶ñÒâÈí¼þа汾669½ÓÄÉTorÓòÃûÖØÐÞC2»ù´¡ÉèÊ©
11ÔÂ12ÈÕ£¬£¬£¬£¬ÔÚÖ´·¨²¿·Ö5ÔÂÌᳫ¡°ÖÕ¾ÖÐж¯¡±ÆÆËðDanaBot¶ñÒâÈí¼þ»ù´¡ÉèÊ©Áù¸öÔº󣬣¬£¬£¬¸ÃÒøÐÐľÂíÒÔа汾669Ç¿ÊÆ»Ø¹é£¬£¬£¬£¬²¢ÖØÐÞÁËÏÂÁîÓë¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¾ÝZscaler ThreatLabzÇå¾²Ñо¿Ö°Ô±Åû¶£¬£¬£¬£¬DanaBotбäÖÖʹÓÃTorÓòÃû£¨.onion£©ºÍ¡°·´ÏòÅþÁ¬¡±½Úµã¹¹½¨Òþ²ØÍ¨Ñ¶ÍøÂ磬£¬£¬£¬Í¬Ê±Ê¶±ð³öÍþвÐÐΪÕßÓÃÓÚÎüÊÕ±»µÁ×ʽðµÄBTC¡¢ETH¡¢LTC¡¢TRXµÈ¶à¸ö¼ÓÃÜÇ®±ÒµØµã¡£¡£¡£¡£¡£¡£DanaBot×î³õÓÉProofpointÑо¿Ö°Ô±Åû¶£¬£¬£¬£¬ÊÇÒ»ÖÖ»ùÓÚDelphiµÄÒøÐÐľÂí£¬£¬£¬£¬Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¹ã¸æÈö²¥£¬£¬£¬£¬½ÓÄɶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ä£Ê½ÔËÓª£¬£¬£¬£¬ÒÔ¶©ÔÄ·ÑÐÎʽ³ö×â¸øÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¡£¡£ÔÚ¶àÄêÑݱäÖУ¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒÑÉú³¤ÎªÄ£¿£¿£¿£¿£¿£¿£¿é»¯ÐÅÏ¢ÇÔÈ¡Æ÷ºÍ¼ÓÔØÆ÷£¬£¬£¬£¬×¨ÃÅÇÔÈ¡ÍøÂçä¯ÀÀÆ÷´æ´¢µÄƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬²¢Ôø¶à´Î¼ÓÈë´ó¹æÄ£¹¥»÷»î¶¯£¬£¬£¬£¬×Ô2021ÄêÆðÒ»Á¬¶Ô»¥ÁªÍøÓû§×é³ÉÍþв¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/danabot-malware-is-back-to-infecting-windows-after-6-month-break/
5. ºÚ¿ÍʹÓÃCitrixºÍCisco ISEµÄÎó²îÌᳫÁãÈÕ¹¥»÷
11ÔÂ12ÈÕ£¬£¬£¬£¬ÑÇÂíÑ·ÍþвÇ鱨ÍŶÓ̫ͨ¹ýÎö"MadPot"ÃÛ¹ÞÊý¾Ý·¢Ã÷£¬£¬£¬£¬¸ß¼¶ÍþвÐÐΪÕßÔÚCitrix Bleed 2£¨CVE-2025-5777£©ºÍCisco ISE£¨CVE-2025-20337£©Îó²î¹ûÕæÅû¶ǰÒѽ«Æä×÷ΪÁãÈÕÎó²îʹÓᣡ£¡£¡£¡£¡£ÕâÁ½¸öÑÏÖØÎó²î»®·Ö±£´æÓÚNetScaler ADC/GatewayµÄÔ½½çÄÚ´æ¶ÁÈ¡»úÖÆºÍCisco ISEµÄ·´ÐòÁл¯Âß¼ÖУ¬£¬£¬£¬Ç°ÕßÓÚ6ÔÂÏÂÑ®Ðû²¼ÐÞ¸´³ÌÐò£¬£¬£¬£¬µ«Îó²îʹÓóÌÐò7Ô³õ¼´·ºÆð²¢±»CISA±ê¼ÇΪÒÑʹÓ㻣»£»£»£»£»ºóÕß7ÔÂ17ÈÕÐû²¼ºó½öÎåÌì¼´±»Ö¤ÊµÔâÆð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃCVE-2025-20337»ñÈ¡Cisco ISEÔ¤ÈÏÖ¤ÖÎÀíԱȨÏÞ£¬£¬£¬£¬°²ÅÅÃûΪ"IdentityAuditAction"µÄ×Ô½ç˵Web Shell¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâ×é¼þαװ³ÉÕýµ±ISE×é¼þ£¬£¬£¬£¬×¢²áΪHTTP¼àÌýÆ÷×èµ²ËùÓÐÇëÇ󣬣¬£¬£¬Í¨¹ýJava·´Éä×¢ÈëTomcatỊ̈߳¬£¬£¬£¬²¢½ÓÄÉDES¼ÓÃܺͷDZê×¼base64±àÂëÔöÇ¿Òþ²ØÐÔ£¬£¬£¬£¬ÐèÌØ¶¨HTTP±êÍ·²Å»ª»á¼ûÇÒÏÕЩÎÞȡ֤ºÛ¼£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/
6. Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝÓû§Êý¾Ýй¶
11ÔÂ12ÈÕ£¬£¬£¬£¬Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝFrancis FrithÒòÒ»¸ö±»ÒÅÆúµÄElasticsearchÊý¾Ý¿â̻¶Áè¼Ý30ÍòÌõÓû§¼Í¼£¬£¬£¬£¬¸ÃÊý¾Ý¿âÎÞÐèÈÏÖ¤¼´¿É»á¼û£¬£¬£¬£¬ÓÉCybernewsÑо¿Ö°Ô±·¢Ã÷¡£¡£¡£¡£¡£¡£½¨ÉèÓÚ1860ÄêµÄFrancis Frith¹«Ë¾×øÂäÓÚË÷¶û×Ȳ®À£¬£¬£¬ÒÔÕ䲨1860ÖÁ1970Äê¼äÓ¢¹ú³ÇÕòÐæÂäÀúÊ·ÕÕÆ¬ÖøÃû£¬£¬£¬£¬Ö÷ÒªÏúÊÛ³åÓ¡ÕÕÆ¬¡¢Êé¼®¼°¸öÐÔ»¯Ó°ÏñÖÆÆ·¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýй¶ÐÅÏ¢ÖÐÌá¼°µÄÓ¢¹úÒŲúÍøÕ¾francisfrith.comËø¶¨Ãü¾ÝÔ´£¬£¬£¬£¬È·ÈÏÊôÓÚÈÏÕæ¸Ã¹«Ë¾²úÆ·ÖÆÔìµÄHeritage Resource Management Ltd¿Í»§¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨Óû§È«Ãû¡¢ÓÊÏ䵨µã¼°²¿·ÖʵÌåסַ£¬£¬£¬£¬Éæ¼°½ü4.4ÍòÌõ¿Í»§×Éѯ¼Í¼£¬£¬£¬£¬Ê±¼ä¿ç¶È´Ó2006ÄêÖÁ½ü¶þÊ®Äê¡£¡£¡£¡£¡£¡£Ö»¹ÜÎ´Éæ¼°½ðÈÚÕË»§»òÃÜÂ룬£¬£¬£¬µ«Ð¹Â¶Êý¾ÝÈÔ×é³ÉÖØ´óÒþ˽Íþв£¬£¬£¬£¬ÓÈÆä¶ÔÔÚ˽ÐÅÖÐ͸¶¼ÒͥסַµÄÓû§Ó°ÏìÓúÉõ¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±ÖÒÑÔ£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅϢð³äFrancis FrithÆ·ÅÆÊµÑé¾«×¼ÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/francis-frith-data-leak-2025/


¾©¹«Íø°²±¸11010802024551ºÅ