²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î

Ðû²¼Ê±¼ä 2025-03-05

1. ²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î


3ÔÂ4ÈÕ£¬£¬£¬£¬²©Í¨½üÆÚÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬Ö¼ÔÚÐÞ¸´VMware ESX²úÆ·Öб£´æµÄÈý¸öÑÏÖØÁãÈÕÎó²î£¬£¬£¬£¬Îó²î±àºÅ»®·ÖΪCVE-2025-22224¡¢CVE-2025-22225ºÍCVE-2025-22226£¬£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁ˰üÀ¨VMware ESXi¡¢vSphere¡¢Workstation¡¢Fusion¡¢Cloud FoundationºÍTelco Cloud PlatformÔÚÄڵĶà¸ö²úÆ·¡£¡£¡£¡£ÕâЩÎó²îÓÉ΢ÈíÍþвÇ鱨ÖÐÐĵÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ÆäÖÐCVE-2025-22224ΪVMCI¶ÑÒç³öÎó²î£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.3£»£»£»£»CVE-2025-22225ΪVMware ESXií§ÒâдÈëÎó²î£¬£¬£¬£¬CVSSÆÀ·ÖΪ8.2£»£»£»£»CVE-2025-22226ΪHGFSÐÅϢй¶Îó²î£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.1¡£¡£¡£¡£¹¥»÷ÕßÈôÓµÓÐÌØÈ¨ÖÎÀíÔ±»ò¸ù»á¼ûȨÏÞ£¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²îʵÏÖÐéÄâ»úɳºÐÌÓÒÝ¡£¡£¡£¡£²©Í¨Í¨¹ýVMSA-2025-0004Ç徲ͨ¸æÈ·ÈÏÁËÕâЩÎó²îµÄ±£´æ£¬£¬£¬£¬²¢Ö¸³öËüÃÇÒѱ»ÆÕ±éʹÓᣡ£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖÐéÄâ»ú²¢»ñµÃÌØÈ¨»á¼ûµÄ¹¥»÷Õߣ¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²î½øÒ»²½»á¼ûÐéÄâ»úÖÎÀí³ÌÐò×Ô¼º¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬²©Í¨ÏÖÔÚÉÐδÅû¶¹ØÓÚÏêϸ¹¥»÷»ò±³ºóÍþвÐÐΪÕßµÄÏêϸÐÅÏ¢¡£¡£¡£¡£


https://securityaffairs.com/174911/security/vmware-fixed-three-actively-exploited-zero-days-in-esx-products.html


2. Eleven11bot½©Ê¬ÍøÂçѬȾ8.6Íǫ̀ÎïÁªÍø×°±¸·¢¶¯DDoS¹¥»÷


3ÔÂ4ÈÕ£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Eleven11bot¡±µÄÐÂÐͽ©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾÁè¼Ý86,000̨ÎïÁªÍø×°±¸£¬£¬£¬£¬Ö÷ÒªÊÇÇå¾²ÉãÏñÍ·ºÍÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©£¬£¬£¬£¬ÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓëÒÁÀÊÓÐËÉÉ¢ÁªÏµ£¬£¬£¬£¬ÒÑÕë¶ÔµçÐÅЧÀÍÌṩÉ̺ÍÔÚÏßÓÎϷЧÀÍÆ÷Ìᳫ¹¥»÷¡£¡£¡£¡£Åµ»ùÑÇÑо¿Ö°Ô±·¢Ã÷Á˸ý©Ê¬ÍøÂ磬£¬£¬£¬²¢ÓëÍþв¼à¿ØÆ½Ì¨GreyNoise·ÖÏíÁËÏêϸÐÅÏ¢¡£¡£¡£¡£¾ÝShadowserver Foundation±¨¸æ£¬£¬£¬£¬ÊÜѬȾµÄ×°±¸´ó¶àλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢¼ÓÄôóºÍ°Ä´óÀûÑÇ¡£¡£¡£¡£Eleven11botµÄ¹¥»÷Á¿ÒѵִïÿÃëÊýÒÚ¸öÊý¾Ý°ü£¬£¬£¬£¬Ò»Á¬Ê±¼äͨ³£ÎªÊýÌì¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇ¿ÖÆÊ¹ÓÃÈõ»ò³£¼ûµÄÖÎÀíԱƾ֤¡¢Ê¹ÓÃÒÑ֪ĬÈÏÆ¾Ö¤ÒÔ¼°É¨Ãè̻¶µÄTelnetºÍSSH¶Ë¿ÚÀ´Èö²¥¡£¡£¡£¡£GreyNoise½¨Òé·ÀÓùÕß½«Ïà¹ØIPµØµãÌí¼Óµ½ºÚÃûµ¥ÖУ¬£¬£¬£¬²¢¼à¿Ø¿ÉÒɵǼʵÑé¡£¡£¡£¡£ÎªÈ·±£Çå¾²£¬£¬£¬£¬½¨ÒéÎïÁªÍø×°±¸ÔËÐÐ×îй̼þ°æ±¾£¬£¬£¬£¬½ûÓò»ÐëÒªµÄÔ¶³Ì»á¼û¹¦Ð§£¬£¬£¬£¬²¢¸ü¸ÄĬÈÏÖÎÀíÔ±ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬°´ÆÚ¼ì²é×°±¸ÊÇ·ñµÖ´ïʹÓÃÊÙÃüÖյ㲢ÓÃÐÂÐͺÅÌæ»»ÖÁ¹ØÖ÷Òª¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-eleven11bot-botnet-infects-86-000-devices-for-ddos-attacks/


3. ¶àÓïÑÔ¶ñÒâÈí¼þSosanoÕë¶Ô°¢ÁªÇõÒªº¦×éÖ¯Ìᳫ¹¥»÷


3ÔÂ4ÈÕ£¬£¬£¬£¬Ò»ÖÖÕë¶Ô°¢À­²®ÁªºÏÇõ³¤¹úº½¿Õ¡¢ÎÀÐÇͨѶºÍÒªº¦½»Í¨×éÖ¯µÄ¶àÓïÑÔ¶ñÒâÈí¼þÕýÔÚ±»Î´ÖªÍþвÐÐΪÕßʹÓᣡ£¡£¡£¸ÃÈí¼þÃûΪSosano£¬£¬£¬£¬ÌṩºóÃŹ¦Ð§£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾװ±¸ÉϽ¨É賤ÆÚÐÔ²¢Ô¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£¡£ProofpointÓÚ2024Äê10Ô·¢Ã÷ÁËÕâÒ»»î¶¯£¬£¬£¬£¬Ö¸³öÆäÓëÒÁÀÊÃËÓÑTA451ºÍTA455µÄÐж¯ÓÐÏàËÆÖ®´¦£¬£¬£¬£¬µ«´Ë´Î»î¶¯ÖصãÔÚÓÚÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÌØÖÆÎļþ£¬£¬£¬£¬°üÀ¨¶àÖÖÎļþÃûÌ㬣¬£¬£¬ÌӱܻùÓÚ¼òµ¥ÃûÌÃÆÊÎöµÄÇå¾²Èí¼þ¼ì²â¡£¡£¡£¡£¹¥»÷ʼÓÚÓ¡¶Èµç×Ó¹«Ë¾·¢Ë͵ÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬°üÀ¨¶ñÒâURLºÍZIP´æµµ£¬£¬£¬£¬ÄÚº¬Î±×°³ÉXLSµÄLNKÎļþºÍÁ½¸ö¶àÓïÑÔPDFÎļþ¡£¡£¡£¡£PDFÎļþ°üÀ¨HTA´úÂëºÍÒþ²ØZIPµµ°¸£¬£¬£¬£¬´¥·¢SosanoºóÃÅ¡£¡£¡£¡£SosanoºóÃÅÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèÅþÁ¬£¬£¬£¬£¬ÆÚ´ýÎļþ²Ù×÷¡¢shellÏÂÁîÖ´ÐеÈÏÂÁî¡£¡£¡£¡£·ÀÓù´ËÀàÍþвÐè½ÓÄɶà¹ÜÆëÏÂÒªÁ죬£¬£¬£¬°üÀ¨µç×ÓÓʼþɨÃè¡¢Óû§½ÌÓýºÍÄܹ»¼ì²â¶àÖÖÎļþÃûÌõÄÇå¾²Èí¼þ¡£¡£¡£¡£×èֹΣÏÕÎļþÀàÐÍÒ²ÊÇÃ÷ÖÇÖ®¾Ù¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-polyglot-malware-hits-aviation-satellite-communication-firms/


4. ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷ÈÕ±¾°©Ö¢ÖÎÁÆÖÐÐÄ£¬£¬£¬£¬Ð¹Â¶30Íò»¼ÕßÊý¾Ý


3ÔÂ4ÈÕ£¬£¬£¬£¬ÈÕ±¾Óî¶¼¹¬ÖÐÑëÕïËù(UCC)°©Ö¢ÖÎÁÆÖÐÐÄÓÚ2ÔÂ10ÈÕÔâµ½÷è÷ëÀÕË÷Èí¼þ×éÖ¯µÄºÚ¿Í¹¥»÷£¬£¬£¬£¬µ¼ÖÂ30ÍòÃû»¼ÕßµÄÃô¸Ð¿µ½¡ÐÅϢй¶£¬£¬£¬£¬Ò½ÔºÏµÍ³Ò²ÎÞ·¨Ê¹Óᣡ£¡£¡£¸Ã×éÖ¯ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˱»µÁÐÅÏ¢£¬£¬£¬£¬°üÀ¨»¼ÕßÐÕÃû¡¢ÉúÈÕ¡¢ÐԱ𡢵ص㡢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Ò½ÁÆÐÅÏ¢µÈ£¬£¬£¬£¬²¢¼¥Ð¦»¼ÕßʹÓÃUCCµÄЧÀÍ¿ÉÄܻᵼÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£UCC¹ÙÔ±±Þ²ß¿Í»§Ð¡ÐÄÕ©Æ­ÐÅÏ¢£¬£¬£¬£¬²¢ÉèÁ¢ÁËÈÈÏߵ绰¹©»¼Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£¡£¡£¡£÷è÷ë×éÖ¯×Ô2025ÄêÍ·ÒÔÀ´Ò»Ö±ÔÚÔöÇ¿¹¥»÷£¬£¬£¬£¬½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ģʽÔË×÷£¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßʹÓÃË«ÖØÀÕË÷ÊֶζøÖøÃû¡£¡£¡£¡£¸Ã×éÖ¯ÒÑÍù12¸öÔµÄÍøÂç¹¥»÷»î¶¯Ò»Ö±£¬£¬£¬£¬×ÜÊܺ¦ÕßÊýÄ¿ÒÑ´ï191´Î¡£¡£¡£¡£÷è÷ë×é֝ɿÏÓͨ¹ýÇÔÈ¡Google Chromeƾ֤ÒÔ¼°ÉñÃØÌӱܻò½ûÓö˵ã¼ì²âºÍÏìÓ¦(EDR)ϵͳÀ´Ê¹ÓÃÊܺ¦Õߣ¬£¬£¬£¬Ê¹ÓÃÁËÖøÃûµÄ¡°Citrix Bleed¡±ÁãÈÕÎó²î¡£¡£¡£¡£


https://cybernews.com/news/cancer-hospital-breach-is-claimed-by-qilin-gang-in-new-ransomware-low/


5. Zhong Stealer¶ñÒâÈí¼þͨ¹ý¿Í·þѬȾ½ðÈڿƼ¼¹«Ë¾


3ÔÂ4ÈÕ£¬£¬£¬£¬ÃûΪ¡°Zhong Stealer¡±µÄÐÂÐͶñÒâÈí¼þÒÑÔÚÖйú·ºÆð£¬£¬£¬£¬Ëüͨ¹ýʹÓÿͻ§Ö§³Ö̸ÌìÕâÒ»ÒâÏë²»µ½µÄÇÐÈëµãDZÈëÆóÒµ£¬£¬£¬£¬Ö÷ҪĿµÄÊǽðÈڿƼ¼¹«Ë¾£¬£¬£¬£¬µ«Æä˳ӦÐÔ¼«Ç¿£¬£¬£¬£¬¿ÉÕë¶ÔÈκÎÒÀÀµ¿Í»§Ö§³ÖÍŶӵÄÐÐÒµ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÈËÐÔµÄÈõµã£¬£¬£¬£¬Èç½ôÆÈ¸Ð¡¢ÒÉÐĺ;ÚÉ¥£¬£¬£¬£¬Í¨¹ýÈ«ÐIJ߻®µÄȦÌ×ÓÕµ¼¿Í·þÖ°Ô±·­¿ª°üÀ¨¶ñÒâZIPÎļþµÄ¸½¼þ¡£¡£¡£¡£Zhong StealerÄܹ»ÏÂÔØÆäËû×é¼þ¾ÙÐй¥»÷£¬£¬£¬£¬²¢ÔÚÊÜѬȾϵͳÖмá³Ö³¤ÆÚÐÔ£¬£¬£¬£¬Í¨¹ýÌí¼Ó×¢²á±íÏî»òʹÓÃÍýÏëʹÃüÖØÐÂÆô¶¯×ÔÉí£¬£¬£¬£¬ÄÑÒÔ³¹µ×Ïû³ý¡£¡£¡£¡£ÆäÖ÷ҪĿµÄÊÇÍøÂçÆ¾Ö¤ºÍä¯ÀÀÆ÷À©Õ¹Êý¾Ý£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐµÄÉÌÒµºÍСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬²¢½«ÐÅÏ¢·¢ËÍ»ØÎ»ÓÚÏã¸ÛµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£Îª±£»£»£»£»¤ÆóÒµÃâÊÜZhong StealerË𺦣¬£¬£¬£¬¿ÉʹÓÃANY.RUNɳÏäµÈ¹¤¾ß¶Ô¿ÉÒÉÎļþ¾ÙÐÐÆÊÎö£¬£¬£¬£¬Éó²éʵʱ¶ñÒâÈí¼þÐÐΪ£¬£¬£¬£¬Á¬Ã¦Ê¶±ðÍþв£¬£¬£¬£¬²¢ÔÚÔ±¹¤·­¿ªÎļþ֮ǰ×Ô¶¯¼ì²éÎļþ£¬£¬£¬£¬ÒÔ±ÜÃâѬȾ¡£¡£¡£¡£


https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/


6. ´ó¹æÄ£ÍøÂçÇå¾²Îó²îÖÂ3.5ÍòÍøÕ¾ÔâÐ®ÖÆÖØ¶¨ÏòÖÁ¶Ä²©Æ½Ì¨


3ÔÂ3ÈÕ£¬£¬£¬£¬Ò»Æð´ó¹æÄ£ÍøÂçÇå¾²Îó²îÊÂÎñÓÚ2ÔÂ20ÈÕ±¬·¢£¬£¬£¬£¬Áè¼Ý35,000¸öÍøÕ¾Ôâµ½¹¥»÷£¬£¬£¬£¬Óû§ä¯ÀÀÆ÷´°¿Ú±»¶ñÒâ¾ç±¾ÍêÈ«Ð®ÖÆ²¢Öض¨ÏòÖÁÖÐÎĶIJ©Æ½Ì¨¡°Kaiyun¡±¡£¡£¡£¡£c/sideÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÊÜÓ°ÏìÍøÕ¾µÄÔ´´úÂëÖвåÈë¼òÆÓ¾ç±¾±êÇ©£¬£¬£¬£¬¼ÓÔØÆäËû¶ñÒâ´úÂ룬£¬£¬£¬ÕâЩ´úÂëʹÓÃ×°±¸¼ì²âÊÖÒÕ²¢ÉèÖÃ500-1000ºÁÃëËæ»úÑÓ³ÙÒÔÌÓ±ÜÇ徲ɨÃè¡£¡£¡£¡£×îÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬¶ñÒâ¾ç±¾×¢ÈëÈ«ÆÁiframe´úÂ룬£¬£¬£¬Ìæ»»Ô­Ê¼ÍøÕ¾ÄÚÈÝΪ¶Ä²©Æ½Ì¨¡£¡£¡£¡£¹¥»÷ͨ¹ý¶à¸ö´úÂëÖ´Ðн׶ξÙÐУ¬£¬£¬£¬Ê¹ÓÃJavaScriptº¯Êý¼ì²âÓû§×°±¸ÀàÐÍ£¬£¬£¬£¬ÓÐÕë¶ÔÐÔµØÍ¶·Å¶ñÒâÄÚÈÝ£¬£¬£¬£¬²¢½¨ÉèÔªÊÓ¿Ú±êǩȷ±£¶ñÒâÄÚÈÝÌîÂúÕû¸öÆÁÄ»¡£¡£¡£¡£²¿·Ö¹¥»÷±äÖÖ»¹ÊµÑé»ùÓÚµØÇøµÄ¹ýÂË»úÖÆ£¬£¬£¬£¬Æ¾Ö¤Óû§IPµØµãÏÔʾ²î±ðÄÚÈÝ¡£¡£¡£¡£Ç徲ר¼ÒÍÆ²â´Ë´Î¹¥»÷ÓëMegalayerÎó²îÓйØ£¬£¬£¬£¬½¨ÒéÍøÕ¾ËùÓÐÕßÉóºËÔ´´úÂë¡¢×èÖ¹¶ñÒâÓò¡¢°´ÆÚ¼ì²éÎļþÐ޸ġ¢ÊµÑéÄÚÈÝÇå¾²Õ½ÂÔÏÞÖÆ£¬£¬£¬£¬²¢Ê¹Óù¤¾ßÖ´ÐÐÆµÈÔÕ¾µãɨÃèÒÔ·¢Ã÷¶ñÒâ×¢È룬£¬£¬£¬´Ó¶ø±£»£»£»£»¤Æ½Ì¨ÃâÊÜÀàËÆ¹¥»÷¡£¡£¡£¡£


https://cybersecuritynews.com/35000-websites-hacked-to-inject-malicious-scripts/