²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î

Ðû²¼Ê±¼ä 2025-03-05

1. ²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬²©Í¨½üÆÚÐû²¼ÁËÇå¾²¸üР£¬£¬£¬£¬£¬Ö¼ÔÚÐÞ¸´VMware ESX²úÆ·Öб£´æµÄÈý¸öÑÏÖØÁãÈÕÎó²î £¬£¬£¬£¬£¬Îó²î±àºÅ»®·ÖΪCVE-2025-22224¡¢CVE-2025-22225ºÍCVE-2025-22226 £¬£¬£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁ˰üÀ¨VMware ESXi¡¢vSphere¡¢Workstation¡¢Fusion¡¢Cloud FoundationºÍTelco Cloud PlatformÔÚÄڵĶà¸ö²úÆ·¡£¡£¡£¡£ÕâЩÎó²îÓÉ΢ÈíÍþвÇ鱨ÖÐÐĵÄÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬ÆäÖÐCVE-2025-22224ΪVMCI¶ÑÒç³öÎó²î £¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.3£»£»£»CVE-2025-22225ΪVMware ESXií§ÒâдÈëÎó²î £¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ8.2£»£»£»CVE-2025-22226ΪHGFSÐÅϢй¶Îó²î £¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.1¡£¡£¡£¡£¹¥»÷ÕßÈôÓµÓÐÌØÈ¨ÖÎÀíÔ±»ò¸ù»á¼ûȨÏÞ £¬£¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²îʵÏÖÐéÄâ»úɳºÐÌÓÒÝ¡£¡£¡£¡£²©Í¨Í¨¹ýVMSA-2025-0004Ç徲ͨ¸æÈ·ÈÏÁËÕâЩÎó²îµÄ±£´æ £¬£¬£¬£¬£¬²¢Ö¸³öËüÃÇÒѱ»ÆÕ±éʹÓᣡ£¡£¡£¹«Ë¾Ç¿µ÷ £¬£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖÐéÄâ»ú²¢»ñµÃÌØÈ¨»á¼ûµÄ¹¥»÷Õß £¬£¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²î½øÒ»²½»á¼ûÐéÄâ»úÖÎÀí³ÌÐò×Ô¼º¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬²©Í¨ÏÖÔÚÉÐδÅû¶¹ØÓÚÏêϸ¹¥»÷»ò±³ºóÍþвÐÐΪÕßµÄÏêϸÐÅÏ¢¡£¡£¡£¡£


https://securityaffairs.com/174911/security/vmware-fixed-three-actively-exploited-zero-days-in-esx-products.html


2. Eleven11bot½©Ê¬ÍøÂçѬȾ8.6Íǫ̀ÎïÁªÍø×°±¸·¢¶¯DDoS¹¥»÷


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Eleven11bot¡±µÄÐÂÐͽ©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾÁè¼Ý86,000̨ÎïÁªÍø×°±¸ £¬£¬£¬£¬£¬Ö÷ÒªÊÇÇå¾²ÉãÏñÍ·ºÍÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£© £¬£¬£¬£¬£¬ÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓëÒÁÀÊÓÐËÉÉ¢ÁªÏµ £¬£¬£¬£¬£¬ÒÑÕë¶ÔµçÐÅЧÀÍÌṩÉ̺ÍÔÚÏßÓÎϷЧÀÍÆ÷Ìᳫ¹¥»÷¡£¡£¡£¡£Åµ»ùÑÇÑо¿Ö°Ô±·¢Ã÷Á˸ý©Ê¬ÍøÂç £¬£¬£¬£¬£¬²¢ÓëÍþв¼à¿ØÆ½Ì¨GreyNoise·ÖÏíÁËÏêϸÐÅÏ¢¡£¡£¡£¡£¾ÝShadowserver Foundation±¨¸æ £¬£¬£¬£¬£¬ÊÜѬȾµÄ×°±¸´ó¶àλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢¼ÓÄôóºÍ°Ä´óÀûÑÇ¡£¡£¡£¡£Eleven11botµÄ¹¥»÷Á¿ÒѵִïÿÃëÊýÒÚ¸öÊý¾Ý°ü £¬£¬£¬£¬£¬Ò»Á¬Ê±¼äͨ³£ÎªÊýÌì¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇ¿ÖÆÊ¹ÓÃÈõ»ò³£¼ûµÄÖÎÀíԱƾ֤¡¢Ê¹ÓÃÒÑ֪ĬÈÏÆ¾Ö¤ÒÔ¼°É¨Ãè̻¶µÄTelnetºÍSSH¶Ë¿ÚÀ´Èö²¥¡£¡£¡£¡£GreyNoise½¨Òé·ÀÓùÕß½«Ïà¹ØIPµØµãÌí¼Óµ½ºÚÃûµ¥ÖÐ £¬£¬£¬£¬£¬²¢¼à¿Ø¿ÉÒɵǼʵÑé¡£¡£¡£¡£ÎªÈ·±£Çå¾² £¬£¬£¬£¬£¬½¨ÒéÎïÁªÍø×°±¸ÔËÐÐ×îй̼þ°æ±¾ £¬£¬£¬£¬£¬½ûÓò»ÐëÒªµÄÔ¶³Ì»á¼û¹¦Ð§ £¬£¬£¬£¬£¬²¢¸ü¸ÄĬÈÏÖÎÀíÔ±ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬°´ÆÚ¼ì²é×°±¸ÊÇ·ñµÖ´ïʹÓÃÊÙÃüÖյ㲢ÓÃÐÂÐͺÅÌæ»»ÖÁ¹ØÖ÷Òª¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-eleven11bot-botnet-infects-86-000-devices-for-ddos-attacks/


3. ¶àÓïÑÔ¶ñÒâÈí¼þSosanoÕë¶Ô°¢ÁªÇõÒªº¦×éÖ¯Ìᳫ¹¥»÷


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬Ò»ÖÖÕë¶Ô°¢À­²®ÁªºÏÇõ³¤¹úº½¿Õ¡¢ÎÀÐÇͨѶºÍÒªº¦½»Í¨×éÖ¯µÄ¶àÓïÑÔ¶ñÒâÈí¼þÕýÔÚ±»Î´ÖªÍþвÐÐΪÕßʹÓᣡ£¡£¡£¸ÃÈí¼þÃûΪSosano £¬£¬£¬£¬£¬ÌṩºóÃŹ¦Ð§ £¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾװ±¸ÉϽ¨É賤ÆÚÐÔ²¢Ô¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£¡£ProofpointÓÚ2024Äê10Ô·¢Ã÷ÁËÕâÒ»»î¶¯ £¬£¬£¬£¬£¬Ö¸³öÆäÓëÒÁÀÊÃËÓÑTA451ºÍTA455µÄÐж¯ÓÐÏàËÆÖ®´¦ £¬£¬£¬£¬£¬µ«´Ë´Î»î¶¯ÖصãÔÚÓÚÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÌØÖÆÎļþ £¬£¬£¬£¬£¬°üÀ¨¶àÖÖÎļþÃûÌà £¬£¬£¬£¬£¬ÌӱܻùÓÚ¼òµ¥ÃûÌÃÆÊÎöµÄÇå¾²Èí¼þ¼ì²â¡£¡£¡£¡£¹¥»÷ʼÓÚÓ¡¶Èµç×Ó¹«Ë¾·¢Ë͵ÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ £¬£¬£¬£¬£¬°üÀ¨¶ñÒâURLºÍZIP´æµµ £¬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉXLSµÄLNKÎļþºÍÁ½¸ö¶àÓïÑÔPDFÎļþ¡£¡£¡£¡£PDFÎļþ°üÀ¨HTA´úÂëºÍÒþ²ØZIPµµ°¸ £¬£¬£¬£¬£¬´¥·¢SosanoºóÃÅ¡£¡£¡£¡£SosanoºóÃÅÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèÅþÁ¬ £¬£¬£¬£¬£¬ÆÚ´ýÎļþ²Ù×÷¡¢shellÏÂÁîÖ´ÐеÈÏÂÁî¡£¡£¡£¡£·ÀÓù´ËÀàÍþвÐè½ÓÄɶà¹ÜÆëÏÂÒªÁì £¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþɨÃè¡¢Óû§½ÌÓýºÍÄܹ»¼ì²â¶àÖÖÎļþÃûÌõÄÇå¾²Èí¼þ¡£¡£¡£¡£×èֹΣÏÕÎļþÀàÐÍÒ²ÊÇÃ÷ÖÇÖ®¾Ù¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-polyglot-malware-hits-aviation-satellite-communication-firms/


4. ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷ÈÕ±¾°©Ö¢ÖÎÁÆÖÐÐÄ £¬£¬£¬£¬£¬Ð¹Â¶30Íò»¼ÕßÊý¾Ý


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬ÈÕ±¾Óî¶¼¹¬ÖÐÑëÕïËù(UCC)°©Ö¢ÖÎÁÆÖÐÐÄÓÚ2ÔÂ10ÈÕÔâµ½÷è÷ëÀÕË÷Èí¼þ×éÖ¯µÄºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬µ¼ÖÂ30ÍòÃû»¼ÕßµÄÃô¸Ð¿µ½¡ÐÅϢй¶ £¬£¬£¬£¬£¬Ò½ÔºÏµÍ³Ò²ÎÞ·¨Ê¹Óᣡ£¡£¡£¸Ã×éÖ¯ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˱»µÁÐÅÏ¢ £¬£¬£¬£¬£¬°üÀ¨»¼ÕßÐÕÃû¡¢ÉúÈÕ¡¢ÐԱ𡢵ص㡢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Ò½ÁÆÐÅÏ¢µÈ £¬£¬£¬£¬£¬²¢¼¥Ð¦»¼ÕßʹÓÃUCCµÄЧÀÍ¿ÉÄܻᵼÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£UCC¹ÙÔ±±Þ²ß¿Í»§Ð¡ÐÄÕ©Æ­ÐÅÏ¢ £¬£¬£¬£¬£¬²¢ÉèÁ¢ÁËÈÈÏߵ绰¹©»¼Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£¡£¡£¡£÷è÷ë×éÖ¯×Ô2025ÄêÍ·ÒÔÀ´Ò»Ö±ÔÚÔöÇ¿¹¥»÷ £¬£¬£¬£¬£¬½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ģʽÔË×÷ £¬£¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßʹÓÃË«ÖØÀÕË÷ÊֶζøÖøÃû¡£¡£¡£¡£¸Ã×éÖ¯ÒÑÍù12¸öÔµÄÍøÂç¹¥»÷»î¶¯Ò»Ö± £¬£¬£¬£¬£¬×ÜÊܺ¦ÕßÊýÄ¿ÒÑ´ï191´Î¡£¡£¡£¡£÷è÷ë×é֝ɿÏÓͨ¹ýÇÔÈ¡Google Chromeƾ֤ÒÔ¼°ÉñÃØÌӱܻò½ûÓö˵ã¼ì²âºÍÏìÓ¦(EDR)ϵͳÀ´Ê¹ÓÃÊܺ¦Õß £¬£¬£¬£¬£¬Ê¹ÓÃÁËÖøÃûµÄ¡°Citrix Bleed¡±ÁãÈÕÎó²î¡£¡£¡£¡£


https://cybernews.com/news/cancer-hospital-breach-is-claimed-by-qilin-gang-in-new-ransomware-low/


5. Zhong Stealer¶ñÒâÈí¼þͨ¹ý¿Í·þѬȾ½ðÈڿƼ¼¹«Ë¾


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬ÃûΪ¡°Zhong Stealer¡±µÄÐÂÐͶñÒâÈí¼þÒÑÔÚÖйú·ºÆð £¬£¬£¬£¬£¬Ëüͨ¹ýʹÓÿͻ§Ö§³Ö̸ÌìÕâÒ»ÒâÏë²»µ½µÄÇÐÈëµãDZÈëÆóÒµ £¬£¬£¬£¬£¬Ö÷ҪĿµÄÊǽðÈڿƼ¼¹«Ë¾ £¬£¬£¬£¬£¬µ«Æä˳ӦÐÔ¼«Ç¿ £¬£¬£¬£¬£¬¿ÉÕë¶ÔÈκÎÒÀÀµ¿Í»§Ö§³ÖÍŶӵÄÐÐÒµ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÈËÐÔµÄÈõµã £¬£¬£¬£¬£¬Èç½ôÆÈ¸Ð¡¢ÒÉÐĺ;ÚÉ¥ £¬£¬£¬£¬£¬Í¨¹ýÈ«ÐIJ߻®µÄȦÌ×ÓÕµ¼¿Í·þÖ°Ô±·­¿ª°üÀ¨¶ñÒâZIPÎļþµÄ¸½¼þ¡£¡£¡£¡£Zhong StealerÄܹ»ÏÂÔØÆäËû×é¼þ¾ÙÐй¥»÷ £¬£¬£¬£¬£¬²¢ÔÚÊÜѬȾϵͳÖмá³Ö³¤ÆÚÐÔ £¬£¬£¬£¬£¬Í¨¹ýÌí¼Ó×¢²á±íÏî»òʹÓÃÍýÏëʹÃüÖØÐÂÆô¶¯×ÔÉí £¬£¬£¬£¬£¬ÄÑÒÔ³¹µ×Ïû³ý¡£¡£¡£¡£ÆäÖ÷ҪĿµÄÊÇÍøÂçÆ¾Ö¤ºÍä¯ÀÀÆ÷À©Õ¹Êý¾Ý £¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐµÄÉÌÒµºÍСÎÒ˽¼ÒÊý¾Ý £¬£¬£¬£¬£¬²¢½«ÐÅÏ¢·¢ËÍ»ØÎ»ÓÚÏã¸ÛµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£Îª±£»£»£»¤ÆóÒµÃâÊÜZhong StealerË𺦠£¬£¬£¬£¬£¬¿ÉʹÓÃANY.RUNɳÏäµÈ¹¤¾ß¶Ô¿ÉÒÉÎļþ¾ÙÐÐÆÊÎö £¬£¬£¬£¬£¬Éó²éʵʱ¶ñÒâÈí¼þÐÐΪ £¬£¬£¬£¬£¬Á¬Ã¦Ê¶±ðÍþв £¬£¬£¬£¬£¬²¢ÔÚÔ±¹¤·­¿ªÎļþ֮ǰ×Ô¶¯¼ì²éÎļþ £¬£¬£¬£¬£¬ÒÔ±ÜÃâѬȾ¡£¡£¡£¡£


https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/


6. ´ó¹æÄ£ÍøÂçÇå¾²Îó²îÖÂ3.5ÍòÍøÕ¾ÔâÐ®ÖÆÖØ¶¨ÏòÖÁ¶Ä²©Æ½Ì¨


3ÔÂ3ÈÕ £¬£¬£¬£¬£¬Ò»Æð´ó¹æÄ£ÍøÂçÇå¾²Îó²îÊÂÎñÓÚ2ÔÂ20ÈÕ±¬·¢ £¬£¬£¬£¬£¬Áè¼Ý35,000¸öÍøÕ¾Ôâµ½¹¥»÷ £¬£¬£¬£¬£¬Óû§ä¯ÀÀÆ÷´°¿Ú±»¶ñÒâ¾ç±¾ÍêÈ«Ð®ÖÆ²¢Öض¨ÏòÖÁÖÐÎĶIJ©Æ½Ì¨¡°Kaiyun¡±¡£¡£¡£¡£c/sideÇå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÊÜÓ°ÏìÍøÕ¾µÄÔ´´úÂëÖвåÈë¼òÆÓ¾ç±¾±êÇ© £¬£¬£¬£¬£¬¼ÓÔØÆäËû¶ñÒâ´úÂë £¬£¬£¬£¬£¬ÕâЩ´úÂëʹÓÃ×°±¸¼ì²âÊÖÒÕ²¢ÉèÖÃ500-1000ºÁÃëËæ»úÑÓ³ÙÒÔÌÓ±ÜÇ徲ɨÃè¡£¡£¡£¡£×îÁîÈ˵£ÐĵÄÊÇ £¬£¬£¬£¬£¬¶ñÒâ¾ç±¾×¢ÈëÈ«ÆÁiframe´úÂë £¬£¬£¬£¬£¬Ìæ»»Ô­Ê¼ÍøÕ¾ÄÚÈÝΪ¶Ä²©Æ½Ì¨¡£¡£¡£¡£¹¥»÷ͨ¹ý¶à¸ö´úÂëÖ´Ðн׶ξÙÐÐ £¬£¬£¬£¬£¬Ê¹ÓÃJavaScriptº¯Êý¼ì²âÓû§×°±¸ÀàÐÍ £¬£¬£¬£¬£¬ÓÐÕë¶ÔÐÔµØÍ¶·Å¶ñÒâÄÚÈÝ £¬£¬£¬£¬£¬²¢½¨ÉèÔªÊÓ¿Ú±êǩȷ±£¶ñÒâÄÚÈÝÌîÂúÕû¸öÆÁÄ»¡£¡£¡£¡£²¿·Ö¹¥»÷±äÖÖ»¹ÊµÑé»ùÓÚµØÇøµÄ¹ýÂË»úÖÆ £¬£¬£¬£¬£¬Æ¾Ö¤Óû§IPµØµãÏÔʾ²î±ðÄÚÈÝ¡£¡£¡£¡£Ç徲ר¼ÒÍÆ²â´Ë´Î¹¥»÷ÓëMegalayerÎó²îÓÐ¹Ø £¬£¬£¬£¬£¬½¨ÒéÍøÕ¾ËùÓÐÕßÉóºËÔ´´úÂë¡¢×èÖ¹¶ñÒâÓò¡¢°´ÆÚ¼ì²éÎļþÐ޸ġ¢ÊµÑéÄÚÈÝÇå¾²Õ½ÂÔÏÞÖÆ £¬£¬£¬£¬£¬²¢Ê¹Óù¤¾ßÖ´ÐÐÆµÈÔÕ¾µãɨÃèÒÔ·¢Ã÷¶ñÒâ×¢Èë £¬£¬£¬£¬£¬´Ó¶ø±£»£»£»¤Æ½Ì¨ÃâÊÜÀàËÆ¹¥»÷¡£¡£¡£¡£


https://cybersecuritynews.com/35000-websites-hacked-to-inject-malicious-scripts/