²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î
Ðû²¼Ê±¼ä 2025-03-051. ²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î
3ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬²©Í¨½üÆÚÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬Ö¼ÔÚÐÞ¸´VMware ESX²úÆ·Öб£´æµÄÈý¸öÑÏÖØÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬Îó²î±àºÅ»®·ÖΪCVE-2025-22224¡¢CVE-2025-22225ºÍCVE-2025-22226£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁ˰üÀ¨VMware ESXi¡¢vSphere¡¢Workstation¡¢Fusion¡¢Cloud FoundationºÍTelco Cloud PlatformÔÚÄڵĶà¸ö²úÆ·¡£¡£¡£¡£ÕâЩÎó²îÓÉ΢ÈíÍþвÇ鱨ÖÐÐĵÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÆäÖÐCVE-2025-22224ΪVMCI¶ÑÒç³öÎó²î£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.3£»£»£»£»£»CVE-2025-22225ΪVMware ESXií§ÒâдÈëÎó²î£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ8.2£»£»£»£»£»CVE-2025-22226ΪHGFSÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.1¡£¡£¡£¡£¹¥»÷ÕßÈôÓµÓÐÌØÈ¨ÖÎÀíÔ±»ò¸ù»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²îʵÏÖÐéÄâ»úɳºÐÌÓÒÝ¡£¡£¡£¡£²©Í¨Í¨¹ýVMSA-2025-0004Ç徲ͨ¸æÈ·ÈÏÁËÕâЩÎó²îµÄ±£´æ£¬£¬£¬£¬£¬£¬²¢Ö¸³öËüÃÇÒѱ»ÆÕ±éʹÓᣡ£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖÐéÄâ»ú²¢»ñµÃÌØÈ¨»á¼ûµÄ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²î½øÒ»²½»á¼ûÐéÄâ»úÖÎÀí³ÌÐò×Ô¼º¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬²©Í¨ÏÖÔÚÉÐδÅû¶¹ØÓÚÏêϸ¹¥»÷»ò±³ºóÍþвÐÐΪÕßµÄÏêϸÐÅÏ¢¡£¡£¡£¡£
https://securityaffairs.com/174911/security/vmware-fixed-three-actively-exploited-zero-days-in-esx-products.html
2. Eleven11bot½©Ê¬ÍøÂçѬȾ8.6Íǫ̀ÎïÁªÍø×°±¸·¢¶¯DDoS¹¥»÷
3ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Eleven11bot¡±µÄÐÂÐͽ©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾÁè¼Ý86,000̨ÎïÁªÍø×°±¸£¬£¬£¬£¬£¬£¬Ö÷ÒªÊÇÇå¾²ÉãÏñÍ·ºÍÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©£¬£¬£¬£¬£¬£¬ÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓëÒÁÀÊÓÐËÉÉ¢ÁªÏµ£¬£¬£¬£¬£¬£¬ÒÑÕë¶ÔµçÐÅЧÀÍÌṩÉ̺ÍÔÚÏßÓÎϷЧÀÍÆ÷Ìᳫ¹¥»÷¡£¡£¡£¡£Åµ»ùÑÇÑо¿Ö°Ô±·¢Ã÷Á˸ý©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬²¢ÓëÍþв¼à¿ØÆ½Ì¨GreyNoise·ÖÏíÁËÏêϸÐÅÏ¢¡£¡£¡£¡£¾ÝShadowserver Foundation±¨¸æ£¬£¬£¬£¬£¬£¬ÊÜѬȾµÄ×°±¸´ó¶àλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢¼ÓÄôóºÍ°Ä´óÀûÑÇ¡£¡£¡£¡£Eleven11botµÄ¹¥»÷Á¿ÒѵִïÿÃëÊýÒÚ¸öÊý¾Ý°ü£¬£¬£¬£¬£¬£¬Ò»Á¬Ê±¼äͨ³£ÎªÊýÌì¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇ¿ÖÆÊ¹ÓÃÈõ»ò³£¼ûµÄÖÎÀíԱƾ֤¡¢Ê¹ÓÃÒÑ֪ĬÈÏÆ¾Ö¤ÒÔ¼°É¨Ãè̻¶µÄTelnetºÍSSH¶Ë¿ÚÀ´Èö²¥¡£¡£¡£¡£GreyNoise½¨Òé·ÀÓùÕß½«Ïà¹ØIPµØµãÌí¼Óµ½ºÚÃûµ¥ÖУ¬£¬£¬£¬£¬£¬²¢¼à¿Ø¿ÉÒɵǼʵÑé¡£¡£¡£¡£ÎªÈ·±£Çå¾²£¬£¬£¬£¬£¬£¬½¨ÒéÎïÁªÍø×°±¸ÔËÐÐ×îй̼þ°æ±¾£¬£¬£¬£¬£¬£¬½ûÓò»ÐëÒªµÄÔ¶³Ì»á¼û¹¦Ð§£¬£¬£¬£¬£¬£¬²¢¸ü¸ÄĬÈÏÖÎÀíÔ±ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬°´ÆÚ¼ì²é×°±¸ÊÇ·ñµÖ´ïʹÓÃÊÙÃüÖյ㲢ÓÃÐÂÐͺÅÌæ»»ÖÁ¹ØÖ÷Òª¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-eleven11bot-botnet-infects-86-000-devices-for-ddos-attacks/
3. ¶àÓïÑÔ¶ñÒâÈí¼þSosanoÕë¶Ô°¢ÁªÇõÒªº¦×éÖ¯Ìᳫ¹¥»÷
3ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÕë¶Ô°¢À²®ÁªºÏÇõ³¤¹úº½¿Õ¡¢ÎÀÐÇͨѶºÍÒªº¦½»Í¨×éÖ¯µÄ¶àÓïÑÔ¶ñÒâÈí¼þÕýÔÚ±»Î´ÖªÍþвÐÐΪÕßʹÓᣡ£¡£¡£¸ÃÈí¼þÃûΪSosano£¬£¬£¬£¬£¬£¬ÌṩºóÃŹ¦Ð§£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾװ±¸ÉϽ¨É賤ÆÚÐÔ²¢Ô¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£¡£ProofpointÓÚ2024Äê10Ô·¢Ã÷ÁËÕâÒ»»î¶¯£¬£¬£¬£¬£¬£¬Ö¸³öÆäÓëÒÁÀÊÃËÓÑTA451ºÍTA455µÄÐж¯ÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬£¬µ«´Ë´Î»î¶¯ÖصãÔÚÓÚÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÌØÖÆÎļþ£¬£¬£¬£¬£¬£¬°üÀ¨¶àÖÖÎļþÃûÌ㬣¬£¬£¬£¬£¬ÌӱܻùÓÚ¼òµ¥ÃûÌÃÆÊÎöµÄÇå¾²Èí¼þ¼ì²â¡£¡£¡£¡£¹¥»÷ʼÓÚÓ¡¶Èµç×Ó¹«Ë¾·¢Ë͵ÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬°üÀ¨¶ñÒâURLºÍZIP´æµµ£¬£¬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉXLSµÄLNKÎļþºÍÁ½¸ö¶àÓïÑÔPDFÎļþ¡£¡£¡£¡£PDFÎļþ°üÀ¨HTA´úÂëºÍÒþ²ØZIPµµ°¸£¬£¬£¬£¬£¬£¬´¥·¢SosanoºóÃÅ¡£¡£¡£¡£SosanoºóÃÅÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèÅþÁ¬£¬£¬£¬£¬£¬£¬ÆÚ´ýÎļþ²Ù×÷¡¢shellÏÂÁîÖ´ÐеÈÏÂÁî¡£¡£¡£¡£·ÀÓù´ËÀàÍþвÐè½ÓÄɶà¹ÜÆëÏÂÒªÁ죬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþɨÃè¡¢Óû§½ÌÓýºÍÄܹ»¼ì²â¶àÖÖÎļþÃûÌõÄÇå¾²Èí¼þ¡£¡£¡£¡£×èֹΣÏÕÎļþÀàÐÍÒ²ÊÇÃ÷ÖÇÖ®¾Ù¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-polyglot-malware-hits-aviation-satellite-communication-firms/
4. ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷ÈÕ±¾°©Ö¢ÖÎÁÆÖÐÐÄ£¬£¬£¬£¬£¬£¬Ð¹Â¶30Íò»¼ÕßÊý¾Ý
3ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬ÈÕ±¾Óî¶¼¹¬ÖÐÑëÕïËù(UCC)°©Ö¢ÖÎÁÆÖÐÐÄÓÚ2ÔÂ10ÈÕÔâµ½÷è÷ëÀÕË÷Èí¼þ×éÖ¯µÄºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂ30ÍòÃû»¼ÕßµÄÃô¸Ð¿µ½¡ÐÅϢй¶£¬£¬£¬£¬£¬£¬Ò½ÔºÏµÍ³Ò²ÎÞ·¨Ê¹Óᣡ£¡£¡£¸Ã×éÖ¯ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˱»µÁÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨»¼ÕßÐÕÃû¡¢ÉúÈÕ¡¢ÐԱ𡢵ص㡢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Ò½ÁÆÐÅÏ¢µÈ£¬£¬£¬£¬£¬£¬²¢¼¥Ð¦»¼ÕßʹÓÃUCCµÄЧÀÍ¿ÉÄܻᵼÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£UCC¹ÙÔ±±Þ²ß¿Í»§Ð¡ÐÄÕ©ÆÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢ÉèÁ¢ÁËÈÈÏߵ绰¹©»¼Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£¡£¡£¡£÷è÷ë×éÖ¯×Ô2025ÄêÍ·ÒÔÀ´Ò»Ö±ÔÚÔöÇ¿¹¥»÷£¬£¬£¬£¬£¬£¬½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ģʽÔË×÷£¬£¬£¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßʹÓÃË«ÖØÀÕË÷ÊֶζøÖøÃû¡£¡£¡£¡£¸Ã×éÖ¯ÒÑÍù12¸öÔµÄÍøÂç¹¥»÷»î¶¯Ò»Ö±£¬£¬£¬£¬£¬£¬×ÜÊܺ¦ÕßÊýÄ¿ÒÑ´ï191´Î¡£¡£¡£¡£÷è÷ë×é֝ɿÏÓͨ¹ýÇÔÈ¡Google Chromeƾ֤ÒÔ¼°ÉñÃØÌӱܻò½ûÓö˵ã¼ì²âºÍÏìÓ¦(EDR)ϵͳÀ´Ê¹ÓÃÊܺ¦Õߣ¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÖøÃûµÄ¡°Citrix Bleed¡±ÁãÈÕÎó²î¡£¡£¡£¡£
https://cybernews.com/news/cancer-hospital-breach-is-claimed-by-qilin-gang-in-new-ransomware-low/
5. Zhong Stealer¶ñÒâÈí¼þͨ¹ý¿Í·þѬȾ½ðÈڿƼ¼¹«Ë¾
3ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬ÃûΪ¡°Zhong Stealer¡±µÄÐÂÐͶñÒâÈí¼þÒÑÔÚÖйú·ºÆð£¬£¬£¬£¬£¬£¬Ëüͨ¹ýʹÓÿͻ§Ö§³Ö̸ÌìÕâÒ»ÒâÏë²»µ½µÄÇÐÈëµãDZÈëÆóÒµ£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄÊǽðÈڿƼ¼¹«Ë¾£¬£¬£¬£¬£¬£¬µ«Æä˳ӦÐÔ¼«Ç¿£¬£¬£¬£¬£¬£¬¿ÉÕë¶ÔÈκÎÒÀÀµ¿Í»§Ö§³ÖÍŶӵÄÐÐÒµ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÈËÐÔµÄÈõµã£¬£¬£¬£¬£¬£¬Èç½ôÆÈ¸Ð¡¢ÒÉÐĺ;ÚÉ¥£¬£¬£¬£¬£¬£¬Í¨¹ýÈ«ÐIJ߻®µÄȦÌ×ÓÕµ¼¿Í·þÖ°Ô±·¿ª°üÀ¨¶ñÒâZIPÎļþµÄ¸½¼þ¡£¡£¡£¡£Zhong StealerÄܹ»ÏÂÔØÆäËû×é¼þ¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬²¢ÔÚÊÜѬȾϵͳÖмá³Ö³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬Í¨¹ýÌí¼Ó×¢²á±íÏî»òʹÓÃÍýÏëʹÃüÖØÐÂÆô¶¯×ÔÉí£¬£¬£¬£¬£¬£¬ÄÑÒÔ³¹µ×Ïû³ý¡£¡£¡£¡£ÆäÖ÷ҪĿµÄÊÇÍøÂçÆ¾Ö¤ºÍä¯ÀÀÆ÷À©Õ¹Êý¾Ý£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐµÄÉÌÒµºÍСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬²¢½«ÐÅÏ¢·¢ËÍ»ØÎ»ÓÚÏã¸ÛµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£Îª±£»£»£»£»£»¤ÆóÒµÃâÊÜZhong StealerË𺦣¬£¬£¬£¬£¬£¬¿ÉʹÓÃANY.RUNɳÏäµÈ¹¤¾ß¶Ô¿ÉÒÉÎļþ¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬£¬Éó²éʵʱ¶ñÒâÈí¼þÐÐΪ£¬£¬£¬£¬£¬£¬Á¬Ã¦Ê¶±ðÍþв£¬£¬£¬£¬£¬£¬²¢ÔÚÔ±¹¤·¿ªÎļþ֮ǰ×Ô¶¯¼ì²éÎļþ£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâѬȾ¡£¡£¡£¡£
https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/
6. ´ó¹æÄ£ÍøÂçÇå¾²Îó²îÖÂ3.5ÍòÍøÕ¾ÔâÐ®ÖÆÖØ¶¨ÏòÖÁ¶Ä²©Æ½Ì¨
3ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬Ò»Æð´ó¹æÄ£ÍøÂçÇå¾²Îó²îÊÂÎñÓÚ2ÔÂ20ÈÕ±¬·¢£¬£¬£¬£¬£¬£¬Áè¼Ý35,000¸öÍøÕ¾Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Óû§ä¯ÀÀÆ÷´°¿Ú±»¶ñÒâ¾ç±¾ÍêÈ«Ð®ÖÆ²¢Öض¨ÏòÖÁÖÐÎĶIJ©Æ½Ì¨¡°Kaiyun¡±¡£¡£¡£¡£c/sideÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÊÜÓ°ÏìÍøÕ¾µÄÔ´´úÂëÖвåÈë¼òÆÓ¾ç±¾±êÇ©£¬£¬£¬£¬£¬£¬¼ÓÔØÆäËû¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬ÕâЩ´úÂëʹÓÃ×°±¸¼ì²âÊÖÒÕ²¢ÉèÖÃ500-1000ºÁÃëËæ»úÑÓ³ÙÒÔÌÓ±ÜÇ徲ɨÃè¡£¡£¡£¡£×îÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬£¬¶ñÒâ¾ç±¾×¢ÈëÈ«ÆÁiframe´úÂ룬£¬£¬£¬£¬£¬Ìæ»»ÔÊ¼ÍøÕ¾ÄÚÈÝΪ¶Ä²©Æ½Ì¨¡£¡£¡£¡£¹¥»÷ͨ¹ý¶à¸ö´úÂëÖ´Ðн׶ξÙÐУ¬£¬£¬£¬£¬£¬Ê¹ÓÃJavaScriptº¯Êý¼ì²âÓû§×°±¸ÀàÐÍ£¬£¬£¬£¬£¬£¬ÓÐÕë¶ÔÐÔµØÍ¶·Å¶ñÒâÄÚÈÝ£¬£¬£¬£¬£¬£¬²¢½¨ÉèÔªÊÓ¿Ú±êǩȷ±£¶ñÒâÄÚÈÝÌîÂúÕû¸öÆÁÄ»¡£¡£¡£¡£²¿·Ö¹¥»÷±äÖÖ»¹ÊµÑé»ùÓÚµØÇøµÄ¹ýÂË»úÖÆ£¬£¬£¬£¬£¬£¬Æ¾Ö¤Óû§IPµØµãÏÔʾ²î±ðÄÚÈÝ¡£¡£¡£¡£Ç徲ר¼ÒÍÆ²â´Ë´Î¹¥»÷ÓëMegalayerÎó²îÓйأ¬£¬£¬£¬£¬£¬½¨ÒéÍøÕ¾ËùÓÐÕßÉóºËÔ´´úÂë¡¢×èÖ¹¶ñÒâÓò¡¢°´ÆÚ¼ì²éÎļþÐ޸ġ¢ÊµÑéÄÚÈÝÇå¾²Õ½ÂÔÏÞÖÆ£¬£¬£¬£¬£¬£¬²¢Ê¹Óù¤¾ßÖ´ÐÐÆµÈÔÕ¾µãɨÃèÒÔ·¢Ã÷¶ñÒâ×¢È룬£¬£¬£¬£¬£¬´Ó¶ø±£»£»£»£»£»¤Æ½Ì¨ÃâÊÜÀàËÆ¹¥»÷¡£¡£¡£¡£
https://cybersecuritynews.com/35000-websites-hacked-to-inject-malicious-scripts/