Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷

°ä²¼¹¦·ò 2025-11-12

1. Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷


11ÔÂ10ÈÕ£¬½üÈÕ£¬Ò»¼ÒΪҽÉúÌṩ¼Æ·Ñ·þÎñµÄÒ½ÁƼ¼Êõ¹«Ë¾Doctor AllianceÔâ·êÍøÂç·¸×ï·Ö×ÓÀÕË÷¹¥»÷¡£¹¥»÷ÕßÔÚÈȵãÊý¾Ýй¶ÂÛ̳ÉÏÐû³Æ£¬ÒÑÇÔÈ¡¸Ã¹«Ë¾³¬¹ý120ÍòÌõÃô¸ÐÒ½ÁƼͼ£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹«¿ªÕâЩÊý¾Ý¡£±»µÁÊý¾Ýº­¸ÇÕï¶ÏÁ˾֡¢Ìå¼ì×ܽᡢ´¦·½¡¢Ò½Öι滮¡¢Ò½ÔºÒ½ÖöµÈÖ÷ÌâÒ½ÁÆÐÅÏ¢£¬Í¬Ê±Ô̺¬»¼ÕßÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢½¡È«±£ÏÕË÷Åâ¼Í¼¡¢Ò½ÉúÐÕÃûµÈÓ×ÎÒÉí·ÝÐÅÏ¢¡£°²È«×êÑÐÍŶӶԹ¥»÷ÕßÌṩµÄ200MBÊý¾ÝÑù±¾½øÐзÖÎöºóÈ·ÈÏ£¬ÆäÖгäÒç×Å´óÁ¿ÎÞ·¨¸´Ô­µÄÒ½ÁƺÍÉúÎï¼ø±ðÊý¾Ý¡£´ËÀàÊý¾Ýй¶½«´øÀ´¶à³Á·çÏÕ£º¹¥»÷Õß¿ÉÀûÓû¼ÕßÉí·ÝÐÅÏ¢½øÐÐÒ½ÁÆÉí·Ý͵ÇÔ£¬¼ÙÒâÊܺ¦Õß»ñÈ¡´¦·½Ò©»òÒ½ÁÆ·þÎñ£¬ÉõÖÁͨ¹ýÉç½»¹¤³Ì¹¥»÷Ò½ÉúºÍ»¼Õߣ»ÈôÉæ¼°»¼Õß²¡Ê·£¬»¹¿ÉÄÜÒý·¢Ú²Æ­ÀÕË÷¡£ÓëÃÜÂë»òÐÅÓþ¿¨·ÖÆç£¬Ò½ÁƼͼһµ©Ð¹Â¶ÎÞ·¨Í¨¹ý¸ü¸Ä¸´Ô­£¬µ¼Ö·çÏճ־ôæÔÚ¡£


https://cybernews.com/security/doctor-alliance-breach-allegedly-exposes-patients-health-data/


2. Triofox¸ßΣ·ì϶±»ÀûÓÃʵÏÖÈ«Á´¹¥»÷ÓëȨÏÞÌáÉý


11ÔÂ11ÈÕ£¬¹È¸èMandiantÍŶÓÅû¶£¬Triofoxƽ̨´æÔÚÑϳÁ·ì϶CVE-2025-12480£¨CVSSÆÀ·Ö9.1£©£¬¹¥»÷Õßͨ¹ý¸Ã·ìÏ¶ÈÆ¹ýÉí·ÝÑéÖ¤£¬ÀûÓ÷À²¡¶¾Ö°ÄÜÉÏ´«²¢Ö´ÐÐÔ¶³Ì½Ó¼û¹¤¾ß¡£Mandiant×·×Ù·¢ÏÖ£¬Íþв¼¯ÈºUNC6485ÔçÔÚ2025Äê8ÔÂ24ÈÕ·½±ãÓô˷ì϶£¬½áºÏ·À²¡¶¾Ö°ÄÜʵÏÖ´úÂëÖ´ÐУ¬Ðγɡ°Éí·ÝÈÆ¹ý-ÕË»§´´½¨-¾ç±¾Ö´ÐÐ-ȨÏÞÌáÉý¡±µÄÆëÈ«¹¥»÷Á´¡£¼¼Êõϸ½ÚÏÔʾ£¬¹¥»÷Õßͨ¹ýαÔìHTTPÖ÷»úͷΪ¡°localhost¡±£¬ÈƹýTriofox¶ÔAdminAccount.aspxµÈÖÎÀíÒ³ÃæµÄ½Ó¼û½ÚÔ죬ÀûÓÃGladPageUILib.dllÖÐCanRunCriticalPage()º¯ÊýµÄÂß¼­È±µã£¬ÔÚ×°Öùý³ÌÖд´½¨¡°¼¯ÈºÖÎÀíÔ±¡¹ØË»§¡£Ëæºó£¬Í¨¹ý·À²¡¶¾Ö°ÄÜÉÏ´«¶ñÒâÅú´¦ÖÃÎļþ£¬¸ÃÎļþÔÚÎļþÉÏ´«ÖÁ¹²ÏíÎļþ¼Ðʱ±»´¥·¢£¬ÒÔSYSTEMȨÏÞÖ´ÐÐPowerShellÏÂÔØÆ÷£¬ÏÂÔØ¼Ù×°³ÉSAgentInstallerµÄ¶ñÒⷨʽ£¬¾²Ä¬×°ÖÃZoho UEMS£¬²¢²¿ÊðZoho AssistºÍAnyDeskʵÏÖÔ¶³Ì½Ó¼û¡£¹¥»÷Õß½øÒ»²½Ã¶¾ÙSMB»á»°ºÍÓû§ÕË»§£¬³¢ÊÔÅú¸ÄÃÜÂë²¢ÌáÉýȨÏÞÖÁ±¾µØ/ÓòÖÎÀíÔ±£¬Í¬Ê±Í¨¹ý¶Ë¿Ú443³ÉÁ¢SSH·´ÏòËí·£¬½«±¾µØRDP·þÎñת·¢ÖÁ¹¥»÷Õß½ÚÔìÖ÷»ú£¬ÐγÉÓÆ¾Ã»¯½Ó¼ûͨ·¡£MandiantÇ¿µ÷£¬Ö»¹Ü½¨¸´°æ±¾16.7.10368.56560ÒѰ䲼£¬µ«½¨ÒéÓû§Éý¼¶ÖÁ×îа汾£¬²¢ÉóºËÖÎÀíÔ¹ØË»§ÒÔ¼ì²âÒì³£´´½¨¡£


https://securityaffairs.com/184439/hacking/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html


3. ClickFixÍøÂç´¹µö¹¥»÷ÀûÓÃPureRAT¶Ô×¼¾Æµêϵͳ


11ÔÂ10ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶£¬Ò»³¡Õë¶Ô¾ÆµêÒµµÄ´ó¹æÄ£´¹µö¹¥»÷»î¶¯×Ô2025Äê4Ô³ÖÐøÖÁ10Ô³õ£¬ÓÉ·¨¹ú°²È«¹«Ë¾SekoiaÉî¶È·ÖÎö¡£¹¥»÷Õßͨ¹ýÈëÇֺϷ¨ÓÊÏäÕË»§£¬Ïò¾Æµê¾­Àí·¢ËÍ·ÂðBooking.comµÄ´¹µöÓʼþ£¬ÓÕµ¼Æäµã»÷¼Ù×°³ÉreCAPTCHAÑéÖ¤µÄClickFixÉç½»¹¤³ÌÒ³Ãæ¡£¸ÃÒ³ÃæÑ¡È¡¸´ÔÓ³Á¶¨Ïò»úÔ죬×îÖÕ´¥·¢¶ñÒâPowerShellºÅÁÏÂÔØº¬DLLÅÔ¼ÓÔØ¼¼ÊõµÄZIPѹËõ°ü£¬¼¤»îÄ£¿é»¯Ä¾ÂíPureRAT¡£PureRAT¾ß±¸È«·½Î»¼à¿ØÖ°ÄÜ£¬Ô̺¬¼üÅ̼ͼ¡¢Ô¶³Ì½ÚÔì¡¢ÉãÏñÍ·²¶»ñ¼°ÎļþÇÔÈ¡£¬²¢Í¨¹ý.NET Reactor»ìºÏ±£»¤£¬ÀûÓÃ×¢²á±íʵÏÖÓÆ¾Ã»¯×¤Áô¡£¹¥»÷µÃÊֺ󣬷¸×ï·Ö×Ó½øÒ»²½ÀûÓÃÇÔÈ¡µÄ¾ÆµêԤԼƽ̨ÕË»§£¬Í¨¹ýWhatsApp»òÓʼþÁªÏµÕæÊµ¿Í»§£¬ÒÔ¡°È·ÈÏÔ¤Ô¼ÐÅÏ¢¡±ÎªÃûÓÕµ¼Æä½øÈë·ÂðµÄBooking.com»òExpediaÒ³Ãæ£¬ÇÔÈ¡ÒøÐп¨ÐÅÏ¢¡£µ÷²é·¢ÏÖ£¬·¸×ïÍÅ»ï´ÓLolzTeamµÈºÚ¿ÍÂÛ̳²É°ìBooking.comÖÎÀíÔ¹ØË»§ÐÅÏ¢£¬ÉõÖÁ°´ÀûÈó·Ö³ÉÕÐļ·ÖÏúר¼Ò¡£Sekoia¹Û²ìµ½×¨ÃÅÂòÂôԤԼƽ̨ÈÕÖ¾µÄTelegram»úеÈ˼°ÌṩÈËΪÑéºÅ·þÎñµÄºÚ²ú¹©¸øÁ´¡£


https://thehackernews.com/2025/11/large-scale-clickfix-phishing-attacks.html


4. Maverick¶ñÒâÈí¼þ½Ù³Öä¯ÀÀÆ÷»á»°£¬¶Ô×¼°ÍÎ÷×î´óÒøÐÐ


11ÔÂ11ÈÕ£¬°²È«×êÑÐÔ±·¢ÏÖ£¬Á½¿îÕë¶Ô°ÍÎ÷ÒøÐÐÓû§µÄ.NET¶ñÒâÈí¼þCoyoteÓëMaverick´æÔÚÏÔÖø¹ØÁªÐÔ¡£CyberProof»ã±¨ÏÔʾ£¬¶þÕß¾ù¾ß±¸ÒøÐÐURL¶¨Ïò¡¢ÀûÓÃ¼à¿Ø¼°WhatsAppÍøÒ³°æ´«²¼ÄÜÁ¦¡£MaverickÓÉÇ÷Ïò¿Æ¼¼³õ´Î¼Í¼µÄ"Ë®ÈøÎ÷"£¨Water Saci£©¹¥»÷»î¶¯ÍƳö£¬Ô̺¬×Ô´«²¼×é¼þSORVEPOTEL£¬Í¨¹ýWhatsApp×ÀÃæ°æÀ©É¢º¬¶ñÒâZIP°ü¡£¸ÃľÂí¼à¿Øä¯ÀÀÆ÷±êǩҳ£¬¼ø±ðÀ­¶¡ÃÀÖÞ½ðÈÚ»ú¹¹URLºóÏνÓÔ¶³Ì·þÎñÆ÷£¬ÍÆËÍ´¹µöÒ³ÃæÇÔȡƾ֤¡£Sophos·ÖÎöÖ¸³ö£¬Maverick¿ÉÄÜÊÇCoyoteµÄÉý¼¶°æ£¬¿¨°Í˹»ùÔò·¢ÏÖ¶þÕß´æÔÚ´óÁ¿´úÂë³Áµþ£¬µ«½«ÆäÊÓΪ°ÍÎ÷ÐÂÍþв¡£CyberProof×îе÷²é½Òʾ£¬ZIPÎļþÖеÄLNKÎļþÆô¶¯ºó»áÏÎ½Ó±í²¿·þÎñÆ÷ÏÂÔØÓÐÐ§ÔØºÉ£¬½ûÓÃ΢ÈíDefenderºÍUAC£¬¼ÓÔØ¾ß±¸·´·ÖÎö¼¼ÊõµÄ.NET¼ÓÔØÆ÷£¬×îÖÕ²¿ÊðSORVEPOTELºÍMaverick¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Maverick½öÔÚÈ·ÈÏÊܺ¦ÕßλÓÚ°ÍÎ÷ºó×°Öã¬ÇÒ¹¥»÷Ö¸±êÒÑÀ©´óÖÁ°ÍÎ÷¾Æµê¡£


https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html


5. RhadamanthysÐÅÏ¢ÇÔÈ¡Ðж¯Ôâ·¨ÂÉÖжÏ


11ÔÂ11ÈÕ£¬½üÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±g0njxaºÍGi7w0rm¼à²âµ½£¬ÃûΪRhadamanthysµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Ðж¯ÒÑÔâÖжÏ£¬Æä"¿Í»§"ÆÕ±é»ã±¨ÎÞ·¨½Ó¼û·þÎñÆ÷¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶©ÔÄģʽÔËÓª£¬ÍøÂç·¸×ï·Ö×ÓÐèÿÔÂÏò¿ª·¢ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡Èí¼þ¡¢¼¼ÊõÖ§³Ö¼°ÓÃÓÚÍøÂç±»µÁÊý¾ÝµÄÍøÂçÃæ°å½Ó¼ûȨÏÞ¡£Æä´«²¼õè¾¶Ô̺¬¼Ù×°³ÉÈí¼þÆÆ½â·¨Ê½¡¢YouTubeÊÓÆµ»ò¶ñÒâËÑË÷¸æ°×£¬ÖØÒªÇÔÈ¡ä¯ÀÀÆ÷¡¢µç×ÓÓʼþ¿Í»§¶ËµÅצÓ÷¨Ê½µÄÍ´´¦ºÍÉí·ÝÑéÖ¤cookie¡£¾ÝºÚ¿ÍÂÛ̳Óû§·´À¡£¬²¿Ãſͻ§·¢ÏÖRhadamanthysÍøÂçÃæ°åµÄSSH½Ó¼ûȨÏÞ±»¸ÄΪ֤ÊéµÇ¼ģʽ£¬Ðè³ÁÐÂ×°Ö÷þÎñÆ÷²¢¶Ï¸ùºÛ¼££¬µÂ¹ú¾¯·½ÒÑȾָµ÷²é¡£¿ª·¢Õß´§Ä¦µÂ¹ú·¨Âɲ¿ÃÅΪĻºóºÚÊÖ£¬ÒòÍøÂçÃæ°åÔÚÖжÏÇ°ÔøÓе¹úIPµØÖ·µÇ¼¼Í¼¡£Í¬Ê±£¬¸ÃÐж¯µÄTorÑó´ÐÍøÕ¾Ò²ÒÑÀëÏߣ¬µ«Î´ÏÔʾ¾¯·½²é·âºá·ù£¬¾ßÌåÄ»ºó°Ñ³ÖÕßÈÔ´ýÈ·ÈÏ¡£Õâ´ÎÖжϿÉÄÜÓë"ÖÕ¾ÖÐж¯"£¨Operation Endgame£©ÓйØ¡£¸Ã·¨ÂÉÐж¯×ÔÆô¶¯ÒÔÀ´£¬ÒѶԶà¸ö¶ñÒâÈí¼þ»ù´¡ÉèÊ©Ôì³É·ÛËé¡£


https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/


6. Ó¢¹ú¹úÃñÒ½ÁÆ·þÎñϵͳNHS UKÔâClopÀÕË÷¹¥»÷


11ÔÂ11ÈÕ£¬ÀÕË÷Èí¼þ×éÖ¯ClopÔÚÆä°µÍøÍøÕ¾Ðû³Æ¶ÔÓ¢¹ú¹ú¶ÈÒ½ÁÆ·þÎñϵͳ£¨NHS UK£©Êý¾ÝÐ¹Â¶ÕÆ¹Ü£¬Ôð¹Ôìä¡°Ä®ÊÓ¿Í»§°²È«¡±¡£¸Ã×éÖ¯ÀûÓÃOracle E-Business Suite£¨EBS£©ÖеÄCVE-2025-61882·ì϶£¨CVSSÆÀ·Ö9.8£©Ö´Ðй¥»÷£¬¸Ã·ì϶ÓÚ2025Äê10ÔÂ4ÈÕÓÉOracle°ä²¼´¹Î£²¹¶¡½¨¸´£¬µ«ÀûÓÃÐÐΪÔçÓÚ²¹¶¡°ä²¼£¬×Ô2025Äê8ÔÂÆð£¬¹¥»÷Õß±ãÕë¶ÔEBS 12.2.3ÖÁ12.2.14°æ±¾ÖеÄBI PublisherÄ£¿éÌáÒé¹¥»÷£¬Í¨¹ýδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì½Ó¼ûÇÔÈ¡Êý¾Ý¡£·ì϶´«²¼Òò2025Äê10ÔÂ3ÈÕScattered Lapsus$ Huntersй¶¸ÅÏëÑéÖ¤´úÂë¶ø¼Ó¿ì£¬´ÙʹCl0p¡¢FIN11µÈÍþвÐÐΪÕßÀ©´ó¹¥»÷ÁìÓò¡£½¨ÒéÊÜÓ°Ïì×éÖ¯µ±¼´×°ÖÃ2025Äê10Ô²¹¶¡£¬×·ÒäÖÁ8ÔµÄȡ֤Éó²é£¬²¢¼à¿Ø¿ÉÒÉIP¡£Õâ´Î¹¥»÷²¨¼°¹þ·ð´óѧ¡¢ÃÀ¹úº½¿Õ×Ó¹«Ë¾EnvoyµÈ»ú¹¹£¬Ö¸±êÖ±Ö¸ÒÀÀµEBS½øÐвÆÕþ¡¢ÈËÁ¦×ÊÔ´¼°¹©¸øÁ´ÖÎÀíµÄÆóÒµ¡£


https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/