CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2025-11-25

1. CISAÖÒÑÔOracle¸ßΣÎó²îÕý±»Æð¾¢Ê¹ÓÃ


11ÔÂ21ÈÕ£¬£¬£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼ÑÏÖØÖÒÑÔ£¬£¬£¬£¬£¬ £¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê12ÔÂ12ÈÕǰÐÞ¸´Oracle Identity ManagerµÄCVE-2025-61757Îó²î¡£¡£¡£¡£¡£¡£ ¡£¸ÃÎó²î±»×·×ÙΪ¡°ÁãÈÕÎó²î¡±£¬£¬£¬£¬£¬ £¬Òѱ»ÏÖÊÊÓÃÓÚ¹¥»÷£¬£¬£¬£¬£¬ £¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£¡£ ¡£CVE-2025-61757ÊÇOracle Identity Manager REST APIÖб£´æµÄÉí·ÝÑé֤ǰԶ³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬ £¬ÓÉSearchlight CyberÆÊÎöʦAdam KuesºÍShubham Shahflaw·¢Ã÷²¢Åû¶¡£¡£¡£¡£¡£¡£ ¡£Îó²îÔ´ÓÚ¹¥»÷Õß¿Éͨ¹ýÔÚURL·¾¶ÖÐÌí¼Ó¡°--public-access¡±»òÀàËÆ²ÎÊý£¬£¬£¬£¬£¬ £¬ÓÕÆ­Çå¾²¹ýÂËÆ÷½«Êܱ£»£»£»£»£»£»¤¶ËµãÊÓΪ¹ûÕæ¿É»á¼û£¬£¬£¬£¬£¬ £¬´Ó¶øÈƹýÉí·ÝÑéÖ¤Ö±½Ó»á¼ûGroovy¾ç±¾±àÒë¶Ëµã¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß¿ÉʹÓÃGroovyµÄ×¢½â´¦Öóͷ£¹¦Ð§£¬£¬£¬£¬£¬ £¬ÔÚ±àÒëʱעÈë¶ñÒâ´úÂëʵÏÖÔ¶³ÌÖ´ÐУ¬£¬£¬£¬£¬ £¬ÎÞÐèÈκÎÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£ ¡£OracleÒÑÓÚ2025Äê10ÔÂ21ÈÕÐû²¼Çå¾²¸üÐÂÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬ £¬µ«CISAÇ¿µ÷£¬£¬£¬£¬£¬ £¬¸ÃÎó²îÒòÊÖÒÕÃż÷µÍ¡¢Ê¹ÓüòÆÓ£¬£¬£¬£¬£¬ £¬¼«Ò×±»ÍþвÐÐΪÕß¿ìËÙ¸´ÖÆÊ¹Óᣡ£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-oracle-identity-manager-rce-flaw-is-being-actively-exploited/


2. ¶íÏà¹Ø¹¥»÷½è3DÊг¡´«StealC V2ÇÔÃÜÈí¼þ


11ÔÂ24ÈÕ£¬£¬£¬£¬£¬ £¬Óë¶íÂÞ˹Ïà¹ØµÄÍøÂç¹¥»÷»î¶¯Õýͨ¹ýCGTraderµÈ3DÄ£×ÓÊг¡Èö²¥StealC V2ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßʹÓÃBlender¿ªÔ´3DÈí¼þÌØÕ÷£¬£¬£¬£¬£¬ £¬½«¶ñÒâPython´úÂëǶÈë.blendÎļþÖС£¡£¡£¡£¡£¡£ ¡£µ±Óû§ÆôÓÃBlenderµÄ×Ô¶¯ÔËÐй¦Ð§Ê±£¬£¬£¬£¬£¬ £¬·­¿ªº¬¶ñÒâ¾ç±¾µÄ½ÇÉ«°ó¶¨Îļþ»á´¥·¢×Ô¶¯¼ÓÔØ£¬£¬£¬£¬£¬ £¬¸Ã¾ç±¾Í¨¹ýCloudflare WorkersÓò»ñÈ¡¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬£¬ £¬½ø¶øÏÂÔØPowerShell¾ç±¾£¬£¬£¬£¬£¬ £¬×îÖÕ´Ó¹¥»÷Õß¿ØÖƵÄIPµØµã¼ìË÷Á½¸öZIP´æµµ¡£¡£¡£¡£¡£¡£ ¡£ÕâЩѹËõÎļþ½âѹÖÁ%TEMP%Îļþ¼Ð£¬£¬£¬£¬£¬ £¬²¢ÔÚÆô¶¯Ä¿Â¼°²ÅÅLNKÎļþʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬£¬ £¬Í¬Ê±°²ÅÅStealCÖ÷ÇÔÈ¡Æ÷¼°¸¨ÖúPythonÇÔÈ¡Æ÷ÐγÉÈßÓ౸·Ý¡£¡£¡£¡£¡£¡£ ¡£Morphisec¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬ £¬±¾´Î¹¥»÷ʹÓõÄStealCΪ½ñÄêÔçЩʱ¼äZscalerÆÊÎöµÄµÚ¶þ¸öÖ÷Òª°æ±¾µÄ×îбäÖÖ¡£¡£¡£¡£¡£¡£ ¡£Ð°æStealCÀ©Õ¹ÁËÊý¾ÝÇÔÈ¡ÄÜÁ¦£¬£¬£¬£¬£¬ £¬Ö§³Ö´Ó23ÖÖÒÔÉÏä¯ÀÀÆ÷¡¢100Óà¸ö¼ÓÃÜÇ®±ÒÇ®°üÀ©Õ¹/Ó¦Óá¢Telegram¡¢DiscordµÈͨѶ¹¤¾ß¡¢VPN¼°Óʼþ¿Í»§¶ËÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬ £¬²¢Å䱸¸üеÄUACÈÆ¹ý»úÖÆ¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/malicious-blender-model-files-deliver-stealc-infostealing-malware/


3. ClickFix¹¥»÷ʹÓÃͼÏñÒþдÊõÈö²¥¶ñÒâÈí¼þ


11ÔÂ24ÈÕ£¬£¬£¬£¬£¬ £¬½üÆÚ£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ClickFix¹¥»÷·ºÆðбäÖÖ£¬£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ý±ÆÕæµÄWindows¸üж¯»­ºÍͼÏñÒþдÊõÔÚÈ«ÆÁä¯ÀÀÆ÷Ò³ÃæÊµÑéÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£ ¡£¸Ã¹¥»÷×Ô10ÔÂ1ÈÕÆð»îÔ¾£¬£¬£¬£¬£¬ £¬ÒÔÍê³É"Òªº¦Çå¾²¸üÐÂ"»ò"È˹¤ÑéÖ¤"ΪÓÕ¶ü£¬£¬£¬£¬£¬ £¬ÓÕµ¼Óû§ÔÚWindowsÏÂÁîÌáÐÑ·ûÖÐÕ³Ìù²¢Ö´Ðй¥»÷Õßͨ¹ýJavaScript×Ô¶¯¸´ÖƵ½¼ôÌù°åµÄ¶ñÒâÏÂÁî¡£¡£¡£¡£¡£¡£ ¡£Ð±äÖÖ½ÓÄÉÏȽøÒþдÊÖÒÕ£¬£¬£¬£¬£¬ £¬½«¶ñÒâÈí¼þÓÐÓÃÔØºÉ±àÂëÓÚPNGͼÏñµÄÏñËØÊý¾ÝÖУ¬£¬£¬£¬£¬ £¬Í¨¹ýÌØ¶¨ÑÕɫͨµÀÔÚÄÚ´æÖÐÖØÐÞ²¢½âÃÜ¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷Á÷³Ì°üÀ¨¶à½×¶ÎÖ´ÐУºÊ×ÏÈʹÓÃmshtaÔ­Éú¶þ½øÖÆÎļþÖ´ÐжñÒâJS´úÂ룬£¬£¬£¬£¬ £¬Ëæºóͨ¹ýPowerShellºÍ.NET³ÌÐò¼¯´Ó¼ÓÃÜͼÏñÖÐÌáÈ¡shellcode¡£¡£¡£¡£¡£¡£ ¡£Stego LoaderµÄÇåµ¥×ÊÔ´ÖаüÀ¨AES¼ÓÃܵÄblob£¬£¬£¬£¬£¬ £¬ÊµÖÊÊÇǶÈëPNGÎļþµÄshellcode£¬£¬£¬£¬£¬ £¬Ðèͨ¹ý×Ô½ç˵C#´úÂëÖØÐÞ¡£¡£¡£¡£¡£¡£ ¡£ÍþвÐÐΪÕß»¹½ÓÄɶ¯Ì¬¹æ±ÜÕ½ÂÔ"ctrampoline"£¬£¬£¬£¬£¬ £¬Í¨¹ýÈë¿Úµãº¯ÊýŲÓÃÍò¸ö¿Õº¯Êý×ÌÈÅÆÊÎö¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/


4. SitusAMCÊý¾Ýй¶ÊÂÎñ²¨¼°¶¥¼¶ÒøÐпͻ§


11ÔÂ24ÈÕ£¬£¬£¬£¬£¬ £¬·¿µØ²úÈÚ×ÊЧÀ;ÞÍ·SitusAMCÓÚ2025Äê11ÔÂ12ÈÕ·¢Ã÷Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ £¬¸Ã¹«Ë¾Îª»¨Æì¼¯ÍÅ¡¢Ä¦¸ùÊ¿µ¤Àû¡¢Ä¦¸ù´óͨµÈ1500¼Ò¿Í»§ÌṩµäÖÊ´û¿î·¢·Å¡¢Ð§Àͼ°ºÏ¹æµÈºǫ́ÔËÓªÖ§³Ö£¬£¬£¬£¬£¬ £¬ÄêÓªÊÕÔ¼10ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£ ¡£¾­³õ³ÌÐò²éÈ·ÈÏ£¬£¬£¬£¬£¬ £¬´Ë´ÎÊÂÎñµ¼ÖÂÆóÒµ¿Í»§¼°ÖÕ¶ËÓû§Êý¾Ýй¶£¬£¬£¬£¬£¬ £¬Ïêϸ°üÀ¨ÓëÓªÒµ¹ØÏµÏà¹ØµÄ»á¼Æ¼Í¼¡¢Ö´·¨Ð­ÒéµÈÆóÒµÊý¾Ý£¬£¬£¬£¬£¬ £¬ÒÔ¼°²¿·Ö¿Í»§µÄ¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£ ¡£ÊÂÎñʱ¼äÏßÏÔʾ£¬£¬£¬£¬£¬ £¬SitusAMCÔÚ11ÔÂ12ÈÕÊÕµ½Çå¾²¾¯±¨ºó£¬£¬£¬£¬£¬ £¬ÓÚ15ÈÕÍê³É³õ³ÌÐò²éÈ·ÈÏÎó²îÐÔ×Ó£¬£¬£¬£¬£¬ £¬16ÈÕ×îÏÈ֪ͨסլÓû§£¬£¬£¬£¬£¬ £¬ÖÁ22ÈÕÍêÓñ³É²¿¿Í»§¼û¸æ¡£¡£¡£¡£¡£¡£ ¡£¹«Ë¾Ç¿µ÷ÓªÒµÔËӪδÊÜÓ°Ï죬£¬£¬£¬£¬ £¬ÏµÍ³Î´·¢Ã÷¼ÓÃܶñÒâÈí¼þ°²Åźۼ£¡£¡£¡£¡£¡£¡£ ¡£Ê×ϯִÐйÙÂõ¿Ë¶û¡¤¸¥À¼¿ÆÌåÏÖ£¬£¬£¬£¬£¬ £¬¹«Ë¾Õýͨ¹ýÖ±½ÓÏàͬÇþµÀÏòÊÜÓ°Ïì¿Í»§ÌṩһÁ¬¸üУ¬£¬£¬£¬£¬ £¬²¢×¨×¢ÓÚÆÊÎöÊÜÓ°ÏìÊý¾Ý¹æÄ£¡£¡£¡£¡£¡£¡£ ¡£´Ë´ÎÊÂÎñÉæ¼°Êý¾ÝÖØ´óÐԽϸߣ¬£¬£¬£¬£¬ £¬ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¼°Êý¾Ý¹æÄ£ÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£ ¡£Ö»¹ÜÊÂÎñÉæ¼°¶à¼ÒÒøÐÐÒµ¾ÞÍ·£¬£¬£¬£¬£¬ £¬µ«¹«Ë¾Î´Åû¶ÏêϸÊÜÓ°Ïì»ú¹¹Ãûµ¥¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/


5. Shai-Hulud¹©Ó¦Á´¹¥»÷ÖØ´´npmÉú̬


11ÔÂ24ÈÕ£¬£¬£¬£¬£¬ £¬½üÆÚ£¬£¬£¬£¬£¬ £¬Íþв×éÖ¯Shai-HuludÔÚnpm×¢²á±íÌᳫ´ó¹æÄ£¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬ £¬Í¨¹ýľÂí»¯Zapier¡¢ENS Domains¡¢PostHogµÈ492¸ö×ÅÃûÈí¼þ°ü£¬£¬£¬£¬£¬ £¬ÇÔÈ¡¿ª·¢Õß¼°CI/CDÍŶӵÄÉñÃØÐÅÏ¢²¢¼ÓÃÜÉÏ´«ÖÁGitHub¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷ʹÓñ»µÁά»¤ÕßÕË»§ÐÞ¸Äpackage.json×¢Èë¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬ £¬Á¬ÏµTruffleHog¹¤¾ßʵÑéÇÔÃÜ£¬£¬£¬£¬£¬ £¬GitHubÒѼì²âµ½27,600ÌõÏà¹ØÌõÄ¿¡£¡£¡£¡£¡£¡£ ¡£´Ë´Î¹¥»÷·ºÆðÖ¸Êý¼¶À©É¢ÌØÕ÷£ºWizÔÆÇ徲ƽ̨·¢Ã÷350¸öÉæ°¸Î¬»¤ÕßÕË»§£¬£¬£¬£¬£¬ £¬Ã¿30·ÖÖÓÐÂÔöÔ¼1,000¸ö´æ´¢¿â¡£¡£¡£¡£¡£¡£ ¡£¶ñÒâÈí¼þ°üÀ¨setup_bun.jsºÍ10MBµÄbun_environment.js£¬£¬£¬£¬£¬ £¬Ö´ÐÐÎå½×¶Î¹¥»÷Á÷³Ì£ºÇÔÈ¡GitHub/npmÁîÅÆ¡¢ÔÆÆ½Ì¨ÃÜÔ¿µÈÉñÃØ£¬£¬£¬£¬£¬ £¬²¢ÔÚÖª×ãÌØ¶¨Ìõ¼þ£¨ÈçÎÞ·¨ÈÏÖ¤GitHub¡¢»ñÈ¡ÁîÅÆÊ§°Ü£©Ê±ÁýÕÖÓû§Ö÷Ŀ¼¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷Ó°ÏìÉîÔ¶£ºENS DomainsµÈ¹¤¾ß°ü±»ÈëÇÖ£¬£¬£¬£¬£¬ £¬Ó°ÏìÒÔÌ«·»µØµãÆÊÎö¡¢ENSÖÇÄܺÏÔ¼½»»¥µÈ½¹µã¹¦Ð§¡£¡£¡£¡£¡£¡£ ¡£GitHubËäÒ»Á¬É¾³ý¹¥»÷Õß½¨ÉèµÄSha1-Hulud£¬£¬£¬£¬£¬ £¬µ«ÍþвÐÐΪÕßÈÔ¿ìËÙÖØÐÞ¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/


6. ¹þ·ð´óѧÔâÓïÒô´¹ÂÚ¹¥»÷ÖÂУÓÑÊý¾Ýй¶


11ÔÂ24ÈÕ£¬£¬£¬£¬£¬ £¬¹þ·ð´óѧУÓÑÊÂÎñºÍÉú³¤ÏµÍ³11ÔÂ18ÈÕÔâÓöÓïÒôÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ £¬µ¼ÖÂѧÉú¡¢Ð£ÓÑ¡¢¾èÔùÕß¡¢Ô±¹¤¼°½ÌÖ°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£ ¡£¾Ý¸ÃУ¸±Ð£³¤¿ËÀ­À­¡¤½ÜÁÖ¿ÆÍÞºÍУÓÑÊÂÎñÓëÉú³¤¸±Ð£³¤¼ªÄ·¡¤ºúÉ­Åû¶£¬£¬£¬£¬£¬ £¬Ð¹Â¶Êý¾Ýº­¸Çµç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒÍ¥/°ì¹«µØµã¡¢»î¶¯³öϯ¼Í¼¡¢¾èÔùÏêÇé¼°Óë´óѧ³ï¿îºÍУÓѼÓÈëÏà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ £¬µ«Î´°üÀ¨Éç»á°ü¹ÜºÅÂë¡¢ÃÜÂë¡¢Ö§¸¶¿¨ÐÅÏ¢»ò²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£ ¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬ £¬É漰УÓѼ°ÆäÅäż/ÅóÙ­/Òſס¢¾èÔùÕß¡¢ÔÚУÉú¼°½áÒµÉú¼Ò³¤¡¢²¿·ÖÔÚУѧÉúºÍ½ÌÖ°Ô±¹¤¡£¡£¡£¡£¡£¡£ ¡£¹þ·ð´óѧÒÑÁ¬Ã¦½ÓÄɲ½·¥É¨³ý¹¥»÷Õßϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ £¬²¢ÓëÖ´·¨²¿·Ö¼°µÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖúÊӲ졣¡£¡£¡£¡£¡£ ¡£11ÔÂ22ÈÕ£¬£¬£¬£¬£¬ £¬Ñ§Ð£Ïò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬ £¬ÌáÐÑСÐÄÒ쳣ͨѶ£¬£¬£¬£¬£¬ £¬ÌØÊâÊÇÒªÇóÌṩÃÜÂë¡¢Éç±£ºÅ»òÒøÐÐÐÅÏ¢µÄµç»°¡¢¶ÌÐÅ»òÓʼþ¡£¡£¡£¡£¡£¡£ ¡£ÕâÊǹþ·ð´óѧ½üÆÚµÚ¶þÆðÊý¾ÝÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£ ¡£10ÔÂÖÐÑ®£¬£¬£¬£¬£¬ £¬ClopÀÕË÷Èí¼þÍÅ»ïÔøÉù³ÆÊ¹ÓÃOracle E-Business SuiteÁãÈÕÎó²îÈëÇÖ¸ÃУϵͳ¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/