GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷

Ðû²¼Ê±¼ä 2025-11-13

1. GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷


11ÔÂ11ÈÕ£¬£¬ £¬£¬ÈÕÁ¢ÆìÏÂÊý×Ö¹¤³ÌЧÀÍÉÌGlobalLogic¿ËÈÕÅû¶£¬£¬ £¬£¬ÆäOracle E-Business Suite£¨EBS£©Æ½Ì¨ÒòÁãÈÕÎó²îCVE-2025-61882ÔâÓöÊý¾Ýй¶£¬£¬ £¬£¬Ó°Ïì10,471ÃûÏÖÈμ°Ç°ÈÎÔ±¹¤¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚ¼ÓÖÝÊ¥¿ËÀ­À­£¬£¬ £¬£¬ÓªÒµÁýÕÖÈ«Çò59¸ö¹¤³ÌÖÐÐÄ¡£¡£¡£¡£¡£¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎ¥¹æÍ¨Öª£¬£¬ £¬£¬¹¥»÷Õß×îÔçÓÚ2025Äê7ÔÂ10Èջ£¬£¬ £¬£¬8ÔÂ20ÈÕÍê³ÉÊý¾ÝÇÔÈ¡£¬£¬ £¬£¬10ÔÂ9ÈÕ»á¼ûÊý¾Ý¿âʵÑé͵ÇÔ£¬£¬ £¬£¬Éæ¼°ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢½ôÆÈÁªÏµÈË¡¢µç×ÓÓÊÏä¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢»¤ÕÕ/Éí·ÝÖ¤ºÅ¡¢ÈËΪ¼°ÒøÐÐÕË»§µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£GlobalLogicÇ¿µ÷£¬£¬ £¬£¬´Ë´ÎÊÂÎñ½ö²¨¼°Oracleƽ̨£¬£¬ £¬£¬Î´Ó°ÏìÆäËûϵͳ£¬£¬ £¬£¬²¢Ö¸³öÆäÊÇÖÚ¶àÊÜOracleÎó²îÓ°ÏìµÄ¿Í»§Ö®Ò»¡£¡£¡£¡£¡£¡£Ö»¹ÜδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬£¬ £¬£¬µ«ÊÂÎñϸ½ÚÓëClopÀÕË÷Èí¼þÍÅ»ï×Ô8ÔÂÒÔÀ´µÄ¹¥»÷ģʽ¸ß¶ÈÎǺϡª¡ª¸Ã×é֯ʹÓÃͳһÎó²î´Ó¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬²¢Í¨¹ýTorÐ¹Â¶ÍøÕ¾Ðû²¼Êܺ¦ÕßÐÅÏ¢¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬GlobalLogicδ·ºÆðÔÚClopµÄй¶Ãûµ¥ÖУ¬£¬ £¬£¬¿ÉÄÜ´¦ÓÚ̸ÅлòÒÑÖ§¸¶Êê½ð½×¶Î¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/


2. ºº±¤Î¢Ëõ¾°¹Û¹ÝÔâÓöÍøÂç¹¥»÷£¬£¬ £¬£¬ÐÅÓÿ¨Êý¾ÝÔâй¶


11ÔÂ11ÈÕ£¬£¬ £¬£¬ºº±¤Î¢Ëõ¾°¹Û¹ÝÊǵ¹ú±±²¿ÈÈÃÅÂÃÓÎʤµØ¼°È«Çò×î´óÌúµÀÄ£×ÓÕ¹Çø£¬£¬ £¬£¬¿ËÈÕÏòÓοÍת´ïÒ»ÆðÑÏÖØÊý¾ÝÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¾­ÊӲ죬£¬ £¬£¬6ÔÂ6ÈÕÖÁ10ÔÂ29ÈÕʱ´ú£¬£¬ £¬£¬Í¨¹ýÏßÉÏÇþµÀʹÓÃÐÅÓÿ¨¹ºÆ±µÄÓοÍÐÅÏ¢¿ÉÄܱ»Î´ÊÚȨµÚÈý·½»ñÈ¡£¬£¬ £¬£¬Éæ¼°³Ö¿¨ÈËÐÕÃû¡¢¿¨ºÅ¡¢ÑéÖ¤Âë¼°ÓÐÓÃÆÚµÈÃô¸ÐÊý¾Ý£¬£¬ £¬£¬Ó°Ïì¹æÄ£Ô¤¼Æ´ïÊýǧÖÁÊýÊ®ÍòÈË¡£¡£¡£¡£¡£¡£¸Ã³¡¹ÝÔÚÓʼþÖÐÃ÷È·£¬£¬ £¬£¬ÏßÉϹºÆ±Ò³Ãæ±£´æÇå¾²Îó²î£¬£¬ £¬£¬µ¼ÖÂÐÅÓÿ¨Êý¾Ý²»µ«´«ÊäÖÁÖ§¸¶Ð§ÀÍÉÌ£¬£¬ £¬£¬»¹Á÷ÏòÁËÁíһ̨×ÔÁ¦Ð§ÀÍÆ÷£¬£¬ £¬£¬Ð¹Â¶Ê±³¤¿¿½üÎå¸öÔ¡£¡£¡£¡£¡£¡£×÷ΪÄê½Ó´ý³¬150ÍòÈ˴εÄÈÈÞ°µã£¬£¬ £¬£¬Ö»¹Ü²¢·ÇËùÓÐÓο;ùͨ¹ýÏßÉϹºÆ±£¬£¬ £¬£¬µ«´Ë´ÎÊÂÎñÈÔ¿ÉÄÜÒý·¢´ó¹æÄ£¹¤ÒµËðʧ»òÉí·ÝðÓÃΣº¦¡£¡£¡£¡£¡£¡£³¡¹Ý·½ÃæÌåÏÖ£¬£¬ £¬£¬ÊÂÎñ·¢Ã÷ºóÒÑÁ¬Ã¦¸ôÀëÊÜÓ°ÏìЧÀÍÆ÷£¬£¬ £¬£¬µ«Ïêϸй¶¹æÄ£¼°¹¥»÷ÕßÉí·ÝÈÔ´ý½øÒ»³ÌÐò²é¡£¡£¡£¡£¡£¡£³¡¹ÝÔÚ֪ͨÖÐÇ¿µ÷£¬£¬ £¬£¬ÎÞ·¨Íêȫɨ³ýÊý¾Ý±»ÀÄÓõĿÉÄÜÐÔ£¬£¬ £¬£¬½¨ÒéÊÜÓ°ÏìÓοÍÇ×½ü¹Ø×¢ÐÅÓÿ¨ÉúÒâ¼Í¼£¬£¬ £¬£¬ÊµÊ±ÁªÏµÒøÐж³½áÕË»§»òÌæ»»¿¨Æ¬¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/miniatur-wunderland-museum-cyberattack/


3. SIAD GroupÔâEverest GroupÀÕË÷¹¥»÷


11ÔÂ11ÈÕ£¬£¬ £¬£¬¶íÂÞ˹¹ØÁªµÄÀÕË÷Èí¼þÍÅ»ïEverest Group¿ËÈÕÔÚ°µÍøÐ¹Â¶Õ¾µãÐû³Æ£¬£¬ £¬£¬ÒÑ´ÓÒâ´óÀû×î´ó¹¤ÒµÆøÌåÉú²úÉÌÖ®Ò»SIAD GroupÇÔÈ¡159GBÊý¾Ý£¬£¬ £¬£¬²¢Æô¶¯8Ììµ¹¼ÆÊ±Íþв¹ûÕæÐ¹Â¶¡£¡£¡£¡£¡£¡£SIAD Group½¨ÉèÓÚ1927Ä꣬£¬ £¬£¬×ܲ¿Î»ÓÚ±´¼ÓĪ£¬£¬ £¬£¬2024ÄêÓªÒµ¶î³¬11ÒÚÅ·Ôª£¬£¬ £¬£¬ÓªÒµº­¸ÇʳÎï¡¢Ò½ÁÆ¡¢Æû³µ¡¢Ò±½ðµÈÐÐÒµµÄ¹¤ÒµÆøÌåÉú²úÓë·ÖÏú£¬£¬ £¬£¬Í¬Ê±Éæ¼°Òº»¯Ê¯ÓÍÆø¡¢×ÔÈ»Æø¹©Ó¦¡¢ÆøÌå´¦Öóͷ£×°±¸Ñз¢¼°Ò½ÁƱ£½¡Ð§ÀÍ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÒªÇóSIAD GroupÔÚµ¹¼ÆÊ±¿¢ÊÂǰÁªÏµÖ§¸¶Êê½ð£¬£¬ £¬£¬²»È»½«¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬°µÍøÕ¾µãÉÐδÐû²¼Êý¾ÝÑù±¾£¬£¬ £¬£¬ÏêϸÊÜÓ°Ïìϵͳ¼°Êý¾ÝÄÚÈÝÈÔ²»Ã÷È·¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬ £¬£¬ÈôÎ÷Ñǵ¼¯ÍÅÉú²úÔËÓªÒò¹¥»÷ÖÐÖ¹£¬£¬ £¬£¬¿ÉÄÜÓ°ÏìÅ·ÃËÖÆÔìÒµ¡¢Ò½ÁƺÍÄÜÔ´ÐÐÒµµÄºÄ²Ä¹©Ó¦£¬£¬ £¬£¬Òý·¢Á¬Ëø·´Ó¦¡£¡£¡£¡£¡£¡£Everest Group×Ô2021Äê7Ô»îÔ¾ÒÔÀ´£¬£¬ £¬£¬ÒÑ·¢¶¯¶àÆðÆÆËðÐÔ¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´ÎÕë¶ÔSIAD GroupµÄ¹¥»÷£¬£¬ £¬£¬ÊǸÃÍÅ»ïÒ»Á¬Õë¶ÔÒªº¦»ù´¡ÉèÊ©ºÍ´óÐÍÆóÒµµÄ×îа¸Àý¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/siad-group-ransomware-attack/


4. DanaBot¶ñÒâÈí¼þа汾669½ÓÄÉTorÓòÃûÖØÐÞC2»ù´¡ÉèÊ©


11ÔÂ12ÈÕ£¬£¬ £¬£¬ÔÚÖ´·¨²¿·Ö5ÔÂÌᳫ¡°ÖÕ¾ÖÐж¯¡±ÆÆËðDanaBot¶ñÒâÈí¼þ»ù´¡ÉèÊ©Áù¸öԺ󣬣¬ £¬£¬¸ÃÒøÐÐľÂíÒÔа汾669Ç¿ÊÆ»Ø¹é£¬£¬ £¬£¬²¢ÖØÐÞÁËÏÂÁîÓë¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¾ÝZscaler ThreatLabzÇå¾²Ñо¿Ö°Ô±Åû¶£¬£¬ £¬£¬DanaBotбäÖÖʹÓÃTorÓòÃû£¨.onion£©ºÍ¡°·´ÏòÅþÁ¬¡±½Úµã¹¹½¨Òþ²ØÍ¨Ñ¶ÍøÂ磬£¬ £¬£¬Í¬Ê±Ê¶±ð³öÍþвÐÐΪÕßÓÃÓÚÎüÊÕ±»µÁ×ʽðµÄBTC¡¢ETH¡¢LTC¡¢TRXµÈ¶à¸ö¼ÓÃÜÇ®±ÒµØµã¡£¡£¡£¡£¡£¡£DanaBot×î³õÓÉProofpointÑо¿Ö°Ô±Åû¶£¬£¬ £¬£¬ÊÇÒ»ÖÖ»ùÓÚDelphiµÄÒøÐÐľÂí£¬£¬ £¬£¬Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¹ã¸æÈö²¥£¬£¬ £¬£¬½ÓÄɶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ä£Ê½ÔËÓª£¬£¬ £¬£¬ÒÔ¶©ÔÄ·ÑÐÎʽ³ö×â¸øÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¡£¡£ÔÚ¶àÄêÑݱäÖУ¬£¬ £¬£¬¸Ã¶ñÒâÈí¼þÒÑÉú³¤ÎªÄ£¿£¿£¿£¿£¿£¿£¿é»¯ÐÅÏ¢ÇÔÈ¡Æ÷ºÍ¼ÓÔØÆ÷£¬£¬ £¬£¬×¨ÃÅÇÔÈ¡ÍøÂçä¯ÀÀÆ÷´æ´¢µÄƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬ £¬£¬²¢Ôø¶à´Î¼ÓÈë´ó¹æÄ£¹¥»÷»î¶¯£¬£¬ £¬£¬×Ô2021ÄêÆðÒ»Á¬¶Ô»¥ÁªÍøÓû§×é³ÉÍþв¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/danabot-malware-is-back-to-infecting-windows-after-6-month-break/


5. ºÚ¿ÍʹÓÃCitrixºÍCisco ISEµÄÎó²îÌᳫÁãÈÕ¹¥»÷


11ÔÂ12ÈÕ£¬£¬ £¬£¬ÑÇÂíÑ·ÍþвÇ鱨ÍŶÓ̫ͨ¹ýÎö"MadPot"ÃÛ¹ÞÊý¾Ý·¢Ã÷£¬£¬ £¬£¬¸ß¼¶ÍþвÐÐΪÕßÔÚCitrix Bleed 2£¨CVE-2025-5777£©ºÍCisco ISE£¨CVE-2025-20337£©Îó²î¹ûÕæÅû¶ǰÒѽ«Æä×÷ΪÁãÈÕÎó²îʹÓᣡ£¡£¡£¡£¡£ÕâÁ½¸öÑÏÖØÎó²î»®·Ö±£´æÓÚNetScaler ADC/GatewayµÄÔ½½çÄÚ´æ¶ÁÈ¡»úÖÆºÍCisco ISEµÄ·´ÐòÁл¯Âß¼­ÖУ¬£¬ £¬£¬Ç°ÕßÓÚ6ÔÂÏÂÑ®Ðû²¼ÐÞ¸´³ÌÐò£¬£¬ £¬£¬µ«Îó²îʹÓóÌÐò7Ô³õ¼´·ºÆð²¢±»CISA±ê¼ÇΪÒÑʹÓ㻣»£»£»£»£»ºóÕß7ÔÂ17ÈÕÐû²¼ºó½öÎåÌì¼´±»Ö¤ÊµÔâÆð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃCVE-2025-20337»ñÈ¡Cisco ISEÔ¤ÈÏÖ¤ÖÎÀíԱȨÏÞ£¬£¬ £¬£¬°²ÅÅÃûΪ"IdentityAuditAction"µÄ×Ô½ç˵Web Shell¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâ×é¼þαװ³ÉÕýµ±ISE×é¼þ£¬£¬ £¬£¬×¢²áΪHTTP¼àÌýÆ÷×èµ²ËùÓÐÇëÇ󣬣¬ £¬£¬Í¨¹ýJava·´Éä×¢ÈëTomcatỊ̈߳¬£¬ £¬£¬²¢½ÓÄÉDES¼ÓÃܺͷDZê×¼base64±àÂëÔöÇ¿Òþ²ØÐÔ£¬£¬ £¬£¬ÐèÌØ¶¨HTTP±êÍ·²Å»ª»á¼ûÇÒÏÕЩÎÞȡ֤ºÛ¼£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/


6. Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝÓû§Êý¾Ýй¶


11ÔÂ12ÈÕ£¬£¬ £¬£¬Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝFrancis FrithÒòÒ»¸ö±»ÒÅÆúµÄElasticsearchÊý¾Ý¿â̻¶Áè¼Ý30ÍòÌõÓû§¼Í¼£¬£¬ £¬£¬¸ÃÊý¾Ý¿âÎÞÐèÈÏÖ¤¼´¿É»á¼û£¬£¬ £¬£¬ÓÉCybernewsÑо¿Ö°Ô±·¢Ã÷¡£¡£¡£¡£¡£¡£½¨ÉèÓÚ1860ÄêµÄFrancis Frith¹«Ë¾×øÂäÓÚË÷¶û×Ȳ®À£¬ £¬£¬ÒÔÕ䲨1860ÖÁ1970Äê¼äÓ¢¹ú³ÇÕòÐæÂäÀúÊ·ÕÕÆ¬ÖøÃû£¬£¬ £¬£¬Ö÷ÒªÏúÊÛ³åÓ¡ÕÕÆ¬¡¢Êé¼®¼°¸öÐÔ»¯Ó°ÏñÖÆÆ·¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýй¶ÐÅÏ¢ÖÐÌá¼°µÄÓ¢¹úÒŲúÍøÕ¾francisfrith.comËø¶¨Ãü¾ÝÔ´£¬£¬ £¬£¬È·ÈÏÊôÓÚÈÏÕæ¸Ã¹«Ë¾²úÆ·ÖÆÔìµÄHeritage Resource Management Ltd¿Í»§¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨Óû§È«Ãû¡¢ÓÊÏ䵨µã¼°²¿·ÖʵÌåסַ£¬£¬ £¬£¬Éæ¼°½ü4.4ÍòÌõ¿Í»§×Éѯ¼Í¼£¬£¬ £¬£¬Ê±¼ä¿ç¶È´Ó2006ÄêÖÁ½ü¶þÊ®Äê¡£¡£¡£¡£¡£¡£Ö»¹ÜÎ´Éæ¼°½ðÈÚÕË»§»òÃÜÂ룬£¬ £¬£¬µ«Ð¹Â¶Êý¾ÝÈÔ×é³ÉÖØ´óÒþ˽Íþв£¬£¬ £¬£¬ÓÈÆä¶ÔÔÚ˽ÐÅÖÐ͸¶¼ÒͥסַµÄÓû§Ó°ÏìÓúÉõ¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±ÖÒÑÔ£¬£¬ £¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅϢð³äFrancis FrithÆ·ÅÆÊµÑé¾«×¼ÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/francis-frith-data-leak-2025/