²©Í¨½¨¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»»ý¼«ÀûÓõÄÁãÈÕ·ì϶

°ä²¼¹¦·ò 2025-03-05

1. ²©Í¨½¨¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»»ý¼«ÀûÓõÄÁãÈÕ·ì϶


3ÔÂ4ÈÕ£¬²©Í¨½üÆÚ°ä²¼Á˰²È«¸üУ¬Ö¼ÔÚ½¨¸´VMware ESX²úÆ·ÖдæÔÚµÄÈý¸öÑϳÁÁãÈÕ·ì϶£¬·ì϶±àºÅ±ðÀëΪCVE-2025-22224¡¢CVE-2025-22225ºÍCVE-2025-22226£¬ÕâЩ·ì϶ӰÏìÁËÔ̺¬VMware ESXi¡¢vSphere¡¢Workstation¡¢Fusion¡¢Cloud FoundationºÍTelco Cloud PlatformÔÚÄڵĶà¸ö²úÆ·¡£ÕâЩ·ì϶ÓÉ΢ÈíÍþвµý±¨ÖÐÐĵÄ×êÑÐÈËÔ±·¢ÏÖ£¬ÆäÖÐCVE-2025-22224ΪVMCI¶ÑÒç¶Âí½Å£¬CVSSÆÀ·ÖΪ9.3 £»CVE-2025-22225ΪVMware ESXiËÁÒâдÈë·ì϶£¬CVSSÆÀ·ÖΪ8.2 £»CVE-2025-22226ΪHGFSÐÅϢй¶·ì϶£¬CVSSÆÀ·ÖΪ7.1¡£¹¥»÷ÕßÈôÕ¼ÓÐÌØÈ¨ÖÎÀíÔ±»ò¸ù½Ó¼ûȨÏÞ£¬¿ÉÀûÓÃÕâЩ·ì϶ʵÏÖÐé¹¹»úɳºÐÌÓÒÝ¡£²©Í³Í³¹ýVMSA-2025-0004°²È«²¼¸æÈ·ÈÏÁËÕâЩ·ì϶µÄ´æÔÚ£¬²¢Ö¸³öËüÃÇÒѱ»¿í·ºÀûÓ᣹«Ë¾Ç¿µ÷£¬Òѳɹ¦ÈëÇÖÐé¹¹»ú²¢»ñµÃÌØÈ¨½Ó¼ûµÄ¹¥»÷Õߣ¬¿ÉÀûÓÃÕâЩ·ì϶½øÒ»²½½Ó¼ûÐé¹¹»úÖÎÀí·¨Ê½×ÔÉí¡£È»¶ø£¬²©Í¨Ä¿Ç°ÉÐδÅû¶¹ØÓÚ¾ßÌå¹¥»÷»ò±³ºóÍþвÐÐΪÕߵľßÌåÐÅÏ¢¡£


https://securityaffairs.com/174911/security/vmware-fixed-three-actively-exploited-zero-days-in-esx-products.html


2. Eleven11bot½©Ê¬ÍøÂçϰȾ8.6Íǫ̀ÎïÁªÍøÉ豸·¢ÆðDDoS¹¥»÷


3ÔÂ4ÈÕ£¬Ò»ÖÖÃûΪ¡°Eleven11bot¡±µÄÐÂÐͽ©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑϰȾ³¬¹ý86,000̨ÎïÁªÍøÉ豸£¬ÖØÒªÊǰ²È«ÉãÏñÍ·ºÍÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©£¬ÓÃÓÚ·¢ÆðÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷¡£¸Ã½©Ê¬ÍøÂçÓëÒÁÀÊÓÐÊèËÉÁªÏµ£¬ÒÑÕë¶ÔµçÕÛ·þÎñÌṩÉ̺ÍÔÚÏßÓÎÏ··þÎñÆ÷ÌáÒé¹¥»÷¡£Åµ»ùÑÇ×êÑÐÈËÔ±·¢ÏÖÁ˸ý©Ê¬ÍøÂ磬²¢ÓëÍþв¼à¿ØÆ½Ì¨GreyNoise·ÖÏíÁ˾ßÌåÐÅÏ¢¡£¾ÝShadowserver Foundation»ã±¨£¬ÊÜϰȾµÄÉ豸´ó¶àλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢¼ÓÄôóºÍ°Ä´óÀûÑÇ¡£Eleven11botµÄ¹¥»÷Á¿ÒѴﵽÿÃëÊýÒÚ¸öÊý¾Ý°ü£¬³ÖÐø¹¦·òͨ³£ÎªÊýÌì¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇ¿ÔìʹÓÃÈõ»ò³£¼ûµÄÖÎÀíԱʹ´¦¡¢ÀûÓÃÒÑ֪ĬÈÏÍ´´¦ÒÔ¼°É¨Ãè¶³öµÄTelnetºÍSSH¶Ë¿ÚÀ´´«²¼¡£GreyNoise½¨Òé·ÀÓùÕß½«ÓйØIPµØÖ·Ôö³¤µ½ºÚÃûµ¥ÖУ¬²¢¼à¿Ø¿ÉÒɵǼ³¢ÊÔ¡£ÎªÈ·±£°²È«£¬½¨ÒéÎïÁªÍøÉ豸ÔËÐÐ×îй̼þ°æ±¾£¬½ûÓò»ÓÃÒªµÄÔ¶³Ì½Ó¼ûÖ°ÄÜ£¬²¢¸ü¸ÄĬÈÏÖÎÀíÔ¹ØÊ»§Í´´¦¡£´Ë±í£¬¶¨ÆÚ²é³­É豸ÊÇ·ñ´ïµ½Ê¹ÓÃÊÙÃüÖյ㲢ÓÃÐÂÐͺŴúÌæÖÁ¹Ø³ÁÒª¡£


https://www.bleepingcomputer.com/news/security/new-eleven11bot-botnet-infects-86-000-devices-for-ddos-attacks/


3. ¶à˵»°¶ñÒâÈí¼þSosanoÕë¶Ô°¢ÁªÇõ¹Ø¼ü×éÖ¯ÌáÒé¹¥»÷


3ÔÂ4ÈÕ£¬Ò»ÖÖÕë¶Ô°¢À­²®½áºÏÇõ³¤¹úº½¿Õ¡¢ÎÀÐÇͨѶºÍ¹Ø¼ü½»Í¨×éÖ¯µÄ¶à˵»°¶ñÒâÈí¼þÔÚ±»Î´ÖªÍþвÐÐΪÕßÀûÓ᣸ÃÈí¼þÃûΪSosano£¬ÌṩºóÃÅÖ°ÄÜ£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜϰȾÉ豸ÉϳÉÁ¢ÓƾÃÐÔ²¢Ô¶³ÌÖ´ÐкÅÁî¡£ProofpointÓÚ2024Äê10Ô·¢ÏÖÁËÕâÒ»»î¶¯£¬Ö¸³öÆäÓëÒÁÀÊÃËÓÑTA451ºÍTA455µÄÐж¯ÓÐÀàËÆÖ®´¦£¬µ«Õâ´Î»î¶¯³ÁµãÔÚÓÚÍøÂç¼äµý»î¶¯¡£¸Ã¶ñÒâÈí¼þͨ¹ýÌØÔìÎļþ£¬Ô̺¬¶àÖÖÎļþÌåʽ£¬ÌӱܻùÓÚµ¥Ò»Ìåʽ·ÖÎöµÄ°²È«Èí¼þ¼ì²â¡£¹¥»÷ʼÓÚÓ¡¶Èµç×Ó¹«Ë¾·¢Ë͵ÄÓã²æÊ½ÍøÂç´¹µöµç×ÓÓʼþ£¬Ô̺¬¶ñÒâURLºÍZIP´æµµ£¬ÄÚº¬¼Ù×°³ÉXLSµÄLNKÎļþºÍÁ½¸ö¶à˵»°PDFÎļþ¡£PDFÎļþÔ̺¬HTA´úÂëºÍ°µ²ØZIPµµ°¸£¬´¥·¢SosanoºóÃÅ¡£SosanoºóÃÅÓëºÅÁîºÍ½ÚÔì·þÎñÆ÷³ÉÁ¢ÏνÓ£¬ÆÚ´ýÎļþ²Ù×÷¡¢shellºÅÁîÖ´ÐеȺÅÁî¡£·ÀÓù´ËÀàÍþвÐè²ÉÈ¡¶à¹ÜÆëϲ½Ö裬Ô̺¬µç×ÓÓʼþɨÃè¡¢Óû§½ÌÓýºÍ¿ÉÄܼì²â¶àÖÖÎļþÌåʽµÄ°²È«Èí¼þ¡£×èֹΣÏÕÎļþÀàÐÍÒ²ÊÇÃ÷ÖÇÖ®¾Ù¡£


https://www.bleepingcomputer.com/news/security/new-polyglot-malware-hits-aviation-satellite-communication-firms/


4. ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷ÈÕ±¾°©Ö¢Ò½ÖÎÖÐÐÄ£¬Ð¹Â¶30Íò»¼ÕßÊý¾Ý


3ÔÂ4ÈÕ£¬ÈÕ±¾Óî¶¼¹¬ÖÐÑëÕïËù(UCC)°©Ö¢Ò½ÖÎÖÐÐÄÓÚ2ÔÂ10ÈÕÔâµ½÷è÷ëÀÕË÷Èí¼þ×éÖ¯µÄºÚ¿Í¹¥»÷£¬µ¼ÖÂ30ÍòÃû»¼ÕßµÄÃô¸Ð½¡È«ÐÅϢй¶£¬Ò½ÔºÏµÍ³Ò²ÎÞ·¨Ê¹Ó᣸Ã×éÖ¯ÔÚÆä°µÍø²©¿ÍÉϰ䲼Á˱»µÁÐÅÏ¢£¬Ô̺¬»¼ÕßÐÕÃû¡¢ÉúÈÕ¡¢ÐԱ𡢵ØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢Ò½ÁÆÐÅÏ¢µÈ£¬²¢³°·í»¼ÕßʹÓÃUCCµÄ·þÎñ¿ÉÄܻᵼÖÂÃô¸ÐÊý¾Ýй¶¡£UCC¹ÙÔ±¶½´Ù¿Í»§¾¯ÌèÚ¿Æ­ÐÅÏ¢£¬²¢ÉèÁ¢ÁËÈÈÏߵ绰¹©»¼Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£÷è÷ë×éÖ¯×Ô2025ËêÊ×ÒÔÀ´Ò»ÏòÔÚ¼ÓÇ¿¹¥»÷£¬Ñ¡È¡ÀÕË÷Èí¼þ¼´·þÎñ(RaaS)ģʽÔË×÷£¬ÒÔ¶ÔÊܺ¦ÕßʹÓÃË«³ÁÀÕË÷¼¿Á©¶øÎÅÃû¡£¸Ã×éÖ¯´Óǰ12¸öÔµÄÍøÂç¹¥»÷»î¶¯²»ÐÝ£¬×ÜÊܺ¦ÕßÊýÁ¿ÒÑ´ï191´Î¡£÷è÷ë×é֝ɿÏÓͨ¹ýÇÔÈ¡Google Chromeƾ֤ÒÔ¼°°ÂÃØÌӱܻò½ûÓö˵ã¼ì²âºÍÏìÓ¦(EDR)ϵͳÀ´ÀûÓÃÊܺ¦Õߣ¬ÀûÓÃÁ˳ÛÃûµÄ¡°Citrix Bleed¡±ÁãÈÕ·ì϶¡£


https://cybernews.com/news/cancer-hospital-breach-is-claimed-by-qilin-gang-in-new-ransomware-low/


5. Zhong Stealer¶ñÒâÈí¼þͨ¹ý¿Í·þϰȾ½ðÈڿƼ¼¹«Ë¾


3ÔÂ4ÈÕ£¬ÃûΪ¡°Zhong Stealer¡±µÄÐÂÐͶñÒâÈí¼þÒÑÔÚÖйú³öÏÖ£¬Ëüͨ¹ýÀûÓÿͻ§Ö§³Ö̸ÌìÕâÒ»ÒâÏë²»µ½µÄÇÐÈëµãDZÈëÆóÒµ£¬ÖØÒªÖ¸±êÊǽðÈڿƼ¼¹«Ë¾£¬µ«ÆäÊÊÓ¦ÐÔ¼«Ç¿£¬¿ÉÕë¶ÔÈκÎÒÀÀµ¿Í»§Ö§³ÖÍŶӵÄÐÐÒµ¡£¸Ã¶ñÒâÈí¼þÀûÓÃÈ˵ÀµÄÈõµã£¬Èç½ôÆÈ¸Ó×¢²ÂÒɺ;ÚÉ¥£¬Í¨¹ý¾«ÐIJ߶¯µÄȦÌ×ÓÕµ¼¿Í·þÈËÔ±´ò¿ªÔ̺¬¶ñÒâZIPÎļþµÄ¸½¼þ¡£Zhong Stealer¿ÉÄÜÏÂÔØÆäËû×é¼þ½øÐй¥»÷£¬²¢ÔÚÊÜϰȾϵͳÖÐά³ÖÓÆ¾ÃÐÔ£¬Í¨¹ýÔö³¤×¢²á±íÏî»òʹÓôòË㹤×÷³ÁÐÂÆô¶¯×ÔÉí£¬ÄÑÒÔ³¹µ×½â³ý¡£ÆäÖØÒªÖ¸±êÊÇÍøÂçÆ¾Ö¤ºÍä¯ÀÀÆ÷À©´óÊý¾Ý£¬ÇÔÈ¡Ãô¸ÐµÄóÒ׺ÍÓ×ÎÒÊý¾Ý£¬²¢½«ÐÅÏ¢·¢ËÍ»ØÎ»ÓÚÏã¸ÛµÄºÅÁîºÍ½ÚÔì·þÎñÆ÷¡£Îª± £»¤ÆóÒµÃâÊÜZhong StealerÇÖº¦£¬¿ÉʹÓÃANY.RUNɳÏäµÈ¹¤¾ß¶Ô¿ÉÒÉÎļþ½øÐзÖÎö£¬²é¿´ÊµÊ±¶ñÒâÈí¼þÐÐΪ£¬µ±¼´¼ø±ðÍþв£¬²¢ÔÚÔ±¹¤´ò¿ªÎļþ֮ǰ×Ô¶¯²é³­Îļþ£¬ÒÔÔ¤·ÀϰȾ¡£


https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/


6. ´ó¹æÄ£ÍøÂ簲ȫ·ì϶ÖÂ3.5ÍòÍøÕ¾Ôâ½Ù³Ö³Á¶¨ÏòÖÁ´ò¶Äƽ̨


3ÔÂ3ÈÕ£¬Ò»Â·´ó¹æÄ£ÍøÂ簲ȫ·ì϶ÊÂÎñÓÚ2ÔÂ20ÈÕ·¢×÷£¬³¬¹ý35,000¸öÍøÕ¾Ôâµ½¹¥»÷£¬Óû§ä¯ÀÀÆ÷´°¿Ú±»¶ñÒâ¾ç±¾ÆëÈ«½Ù³Ö²¢³Á¶¨ÏòÖÁÖÐÎÄ´ò¶Äƽ̨¡°Kaiyun¡±¡£c/side°²È«×êÑÐÈËÔ±·¢ÏÖ£¬¹¥»÷Õßͨ¹ýÔÚÊÜÓ°ÏìÍøÕ¾µÄÔ´´úÂëÖвåÈëµ¥Ò»¾ç±¾±êÇ©£¬¼ÓÔØÆäËû¶ñÒâ´úÂ룬ÕâЩ´úÂëÀûÓÃÉ豸¼ì²â¼¼Êõ²¢ÉèÖÃ500-1000ºÁÃëËæ»úÑÓ³¤ÒÔÌӱܰ²È«É¨Ãè¡£×îÁîÈËÓÇÓôµÄÊÇ£¬¶ñÒâ¾ç±¾×¢ÈëÈ«ÆÁiframe´úÂ룬´úÌæÔ­Ê¼ÍøÕ¾ÄÚÈÝΪ´ò¶Äƽ̨¡£¹¥»÷ͨ¹ý¶à¸ö´úÂëÖ´Ðн׶νøÐУ¬Ê¹ÓÃJavaScriptº¯Êý¼ì²âÓû§É豸ÀàÐÍ£¬ÓÐÕë¶ÔÐÔµØÍ¶·Å¶ñÒâÄÚÈÝ£¬²¢´´½¨ÔªÊÓ¿Ú±êǩȷ±£¶ñÒâÄÚÈÝÌîÂúÕû¸öÆÁÄ»¡£²¿ÃŹ¥»÷±äÖÖ»¹Ö´ÐлùÓÚµØÓòµÄ¹ýÂË»úÔ죬ƾ¾ÝÓû§IPµØÖ·ÏÔʾ·ÖÆçÄÚÈÝ¡£°²È«×¨¼Ò´§Ä¦Õâ´Î¹¥»÷ÓëMegalayer·ì϶ÓйØ£¬½¨ÒéÍøÕ¾ËùÓÐÕßÉóºËÔ´´úÂë¡¢×èÖ¹¶ñÒâÓò¡¢¶¨ÆÚ²é³­ÎļþÅú¸Ä¡¢Ö´ÐÐÄÚÈݰ²È«Õ½ÊõÏÞ¶È£¬²¢Ê¹Óù¤¾ßÖ´ÐÐÆµ·¹Ø¾µãɨÃèÒÔ·¢ÏÖ¶ñÒâ×¢È룬´Ó¶ø± £»¤Æ½Ì¨ÃâÊÜÀàËÆ¹¥»÷¡£


https://cybersecuritynews.com/35000-websites-hacked-to-inject-malicious-scripts/