GlobalLogicÔâOracle EBSÁãÈÕ·ì϶¹¥»÷

°ä²¼¹¦·ò 2025-11-13

1. GlobalLogicÔâOracle EBSÁãÈÕ·ì϶¹¥»÷


11ÔÂ11ÈÕ£¬ÈÕÁ¢ÆìÏÂÊý×Ö¹¤³Ì·þÎñÉÌGlobalLogic½üÈÕÅû¶£¬ÆäOracle E-Business Suite£¨EBS£©Æ½Ì¨ÒòÁãÈÕ·ì϶CVE-2025-61882Ôâ·êÊý¾Ýй¶£¬Ó°Ïì10,471ÃûÏÖÈμ°Ç°ÈÎÔ±¹¤¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚ¼ÓÖÝÊ¥¿ËÀ­À­£¬ÒµÎñ¸²¸ÇÈ«Çò59¸ö¹¤³ÌÖÐÐÄ¡£¾ÝÏòÃåÒòÖÝ×ܼì²ì³¤Ìá½»µÄÎ¥¹æÍ¨Öª£¬¹¥»÷Õß×îÔçÓÚ2025Äê7ÔÂ10Èջ£¬8ÔÂ20ÈÕʵÏÖÊý¾ÝÇÔÈ¡£¬10ÔÂ9ÈÕ½Ó¼ûÊý¾Ý¿âÖ´ÐÐ͵ÇÔ£¬Éæ¼°ÐÅÏ¢Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢´¹Î£ÁªÏµÈË¡¢µç×ÓÓÊÏä¡¢µ®ÉúÈÕÆÚ¡¢¹ú¼®¡¢»¤ÕÕ/Éí·ÝÖ¤ºÅ¡¢¹¤×ʼ°ÒøÐÐÕË»§µÈÃô¸ÐÄÚÈÝ¡£GlobalLogicÇ¿µ÷£¬Õâ´ÎÊÂÎñ½ö²¨¼°Oracleƽ̨£¬Î´Ó°ÏìÆäËûϵͳ£¬²¢Ö¸³öÆäÊǶà¶àÊÜOracle·ì϶ӰÏìµÄ¿Í»§Ö®Ò»¡£Ö»¹ÜδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬µ«ÊÂÎñϸ½ÚÓëClopÀÕË÷Èí¼þÍÅ»ï×Ô8ÔÂÒÔÀ´µÄ¹¥»÷ģʽ¸ß¶ÈÎǺϡª¡ª¸Ã×éÖ¯ÀûÓÃͳһ·ì϶´Ó¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÇÔÈ¡Êý¾Ý£¬²¢Í¨¹ýTorÐ¹Â¶ÍøÕ¾°ä²¼Êܺ¦ÕßÐÅÏ¢¡£Ä¿Ç°£¬GlobalLogicδ³Ê´Ë¿ÌClopµÄй¼ûûµ¥ÖУ¬¿ÉÄÜ´¦ÓÚ½»Éæ»òÒÑÖ§¸¶Êê½ð½×¶Î¡£


https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/


2. ºº±¤Î¢Ëõ¾°¹Û¹ÝÔâ·êÍøÂç¹¥»÷£¬ÐÅÓþ¿¨Êý¾ÝÔâй¶


11ÔÂ11ÈÕ£¬ºº±¤Î¢Ëõ¾°¹Û¹ÝÊǵ¹ú±±²¿ÈȵãÓÎÀÀʤµØ¼°È«Çò×î´óÌú·ģÐÍÕ¹Çø£¬½üÈÕÏòÓοʹ«µÝһ·ÑϳÁÊý¾Ý°²È«ÊÂÎñ¡£¾­µ÷²é£¬6ÔÂ6ÈÕÖÁ10ÔÂ29ÈÕÆÚ¼ä£¬Í¨¹ýÏßÉÏÇþ·ʹÓÃÐÅÓþ¿¨¹ºÆ±µÄÓοÍÐÅÏ¢¿ÉÄܱ»Î´ÊÚȨµÚÈý·½»ñÈ¡£¬Éæ¼°³Ö¿¨ÈËÐÕÃû¡¢¿¨ºÅ¡¢ÑéÖ¤Âë¼°ÓÐЧÆÚµÈÃô¸ÐÊý¾Ý£¬Ó°ÏìÁìÓòÔ¤¼Æ´ïÊýǧÖÁÊýÊ®ÍòÈË¡£¸Ã³¡¹ÝÔÚÓʼþÖÐÃ÷È·£¬ÏßÉϹºÆ±Ò³Ãæ´æÔÚ°²È«·ì϶£¬µ¼ÖÂÐÅÓþ¿¨Êý¾Ý²»½ö´«ÊäÖÁÖ§¸¶·þÎñÉÌ£¬»¹Á÷ÏòÁËÁíһ̨¶ÀÁ¢·þÎñÆ÷£¬Ð¹Â¶Ê±³¤¿¿½üÎå¸öÔ¡£×÷ΪÄê»¶Ó­³¬150ÍòÈ˴εÄÈȵ㾰µã£¬Ö»¹Ü²¢·ÇËùÓÐÓο;ùͨ¹ýÏßÉϹºÆ±£¬µ«Õâ´ÎÊÂÎñÈÔ¿ÉÄÜÒý·¢´ó¹æÄ£²Æ¸»Ëðʧ»òÉí·ÝðÓ÷çÏÕ¡£³¡¹Ý·½Ã氵ʾ£¬ÊÂÎñ·¢ÏÖºóÒѵ±¼´¸ôÀëÊÜÓ°Ïì·þÎñÆ÷£¬µ«¾ßÌåй¶¹æÄ£¼°¹¥»÷ÕßÉí·ÝÈÔ´ý½øÒ»´ëÊ©²é¡£³¡¹ÝÔÚ֪ͨÖÐÇ¿µ÷£¬ÎÞ·¨ÆëÈ«ÅųýÊý¾Ý±»ÀÄÓõĿÉÄÜÐÔ£¬½¨ÒéÊÜÓ°ÏìÓοÍÇ×êǹØ×¢ÐÅÓþ¿¨ÂòÂô¼Í¼£¬ÊµÊ±ÁªÏµÒøÐж³½áÕË»§»ò¸ü»»¿¨Æ¬¡£


https://cybernews.com/security/miniatur-wunderland-museum-cyberattack/


3. SIAD GroupÔâEverest GroupÀÕË÷¹¥»÷


11ÔÂ11ÈÕ£¬¶íÂÞ˹¹ØÁªµÄÀÕË÷Èí¼þÍÅ»ïEverest Group½üÈÕÔÚ°µÍøÐ¹Â¶Õ¾µãÐû³Æ£¬ÒÑ´ÓÒâ´óÀû×î´ó¹¤ÒµÆøÌå³ö²úÉÌÖ®Ò»SIAD GroupÇÔÈ¡159GBÊý¾Ý£¬²¢Æô¶¯8Ììµ¹¼ÆÊ±Íþв¹«¿ªÐ¹Â¶¡£SIAD Group³ÉÁ¢ÓÚ1927Ä꣬×ܲ¿Î»ÓÚ±´¼ÓĪ£¬2024Äê½»Ò׶11ÒÚÅ·Ôª£¬ÒµÎñº­¸ÇʳƷ¡¢Ò½ÁÆ¡¢Æû³µ¡¢Ò±½ðµÈÐÐÒµµÄ¹¤ÒµÆøÌå³ö²úÓë·ÖÏú£¬Í¬Ê±Éæ¼°Òº»¯Ê¯ÓÍÆø¡¢ÌìÈ»Æø¹©¸ø¡¢ÆøÌå´¦ÖÃÉ豸Ñз¢¼°Ò½ÁƱ£½¡·þÎñ¡£¸ÃÍÅ»ïÒªÇóSIAD GroupÔÚµ¹¼ÆÊ±ÊµÏÖǰÁªÏµÖ§¸¶Êê½ð£¬²»È»½«¹«¿ª±»µÁÊý¾Ý¡£Ä¿Ç°£¬°µÍøÕ¾µãÉÐδ°ä²¼Êý¾ÝÑù±¾£¬¾ßÌåÊÜÓ°Ïìϵͳ¼°Êý¾ÝÄÚÈÝÈÔ²»Ã÷È·¡£×êÑÐÈËÔ±Ö¸³ö£¬ÈôÎ÷Ñǵ¼¯Íųö²úÔËÓªÒò¹¥»÷ÖжÏ£¬¿ÉÄÜÓ°ÏìÅ·ÃËÔì×÷Òµ¡¢Ò½ÁƺÍÄÜÔ´ÐÐÒµµÄºÄ²Ä¹©¸ø£¬Òý·¢Á¬Ëø·´Ó³¡£Everest Group×Ô2021Äê7Ô»îÔ¾ÒÔÀ´£¬ÒÑ·¢Æð¶àÆð·ÛËéÐÔ¹¥»÷¡£Õâ´ÎÕë¶ÔSIAD GroupµÄ¹¥»÷£¬ÊǸÃÍÅ»ï³ÖÐøÕë¶Ô¹Ø¼ü»ù´¡ÉèÊ©ºÍ´óÐÍÆóÒµµÄ×îа¸Àý¡£


https://cybernews.com/security/siad-group-ransomware-attack/


4. DanaBot¶ñÒâÈí¼þа汾669ѡȡTorÓòÃû³Á½¨C2»ù´¡ÉèÊ©


11ÔÂ12ÈÕ£¬ÔÚ·¨Âɲ¿ÃÅ5ÔÂÌáÒé¡°ÖÕ¾ÖÐж¯¡±·ÛËéDanaBot¶ñÒâÈí¼þ»ù´¡ÉèÊ©Áù¸öԺ󣬸ÃÒøÐÐľÂíÒÔа汾669Ç¿ÊÆ»Ø¹é£¬²¢³Á½¨Á˺ÅÁîÓë½ÚÔ죨C2£©»ù´¡ÉèÊ©¡£¾ÝZscaler ThreatLabz°²È«×êÑÐÈËÔ±Åû¶£¬DanaBotбäÖÖÀûÓÃTorÓòÃû£¨.onion£©ºÍ¡°·´ÏòÏνӡ±½Úµã¹¹½¨Òñ±ÎÍ¨Ñ¶ÍøÂ磬ͬʱ¼ø±ð³öÍþвÐÐΪÕßÓÃÓڽӹܱ»µÁ×ʽðµÄBTC¡¢ETH¡¢LTC¡¢TRXµÈ¶à¸ö¼ÓÃÜÇ®±ÒµØÖ·¡£DanaBot×î³õÓÉProofpoint×êÑÐÈËÔ±Åû¶£¬ÊÇÒ»ÖÖ»ùÓÚDelphiµÄÒøÐÐľÂí£¬Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¸æ°×´«²¼£¬Ñ¡È¡¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Ä£Ê½ÔËÓª£¬ÒÔ¶©ÔÄ·Ñ´ó¾Ö³ö×â¸øÍøÂç·¸×ï·Ö×Ó¡£ÔÚ¶àÄêÑݱäÖУ¬¸Ã¶ñÒâÈí¼þÒÑ·¢Õ¹ÎªÄ £¿é»¯ÐÅÏ¢ÇÔÈ¡Æ÷ºÍ¼ÓÔØÆ÷£¬×¨ÃÅÇÔÈ¡ÍøÂçä¯ÀÀÆ÷´æ´¢µÄÍ´´¦ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬²¢ÔøÂŴβμӴó¹æÄ£¹¥»÷»î¶¯£¬×Ô2021ÄêÆð³ÖÐø¶Ô»¥ÁªÍøÓû§×é³ÉÍþв¡£


https://www.bleepingcomputer.com/news/security/danabot-malware-is-back-to-infecting-windows-after-6-month-break/


5. ºÚ¿ÍÀûÓÃCitrixºÍCisco ISEµÄ·ì϶ÌáÒéÁãÈÕ¹¥»÷


11ÔÂ12ÈÕ£¬ÑÇÂíÑ·Íþвµý±¨ÍŶÓͨ¹ý¶ÈÎö"MadPot"ÃÛ¹ÞÊý¾Ý·¢ÏÖ£¬¸ß¼¶ÍþвÐÐΪÕßÔÚCitrix Bleed 2£¨CVE-2025-5777£©ºÍCisco ISE£¨CVE-2025-20337£©·ì϶¹«¿ªÅû¶ǰÒѽ«Æä×÷ΪÁãÈÕ·ì϶ʹÓá£ÕâÁ½¸öÑϳÁ·ì϶±ðÀë´æÔÚÓÚNetScaler ADC/GatewayµÄÔ½½çÄÚ´æ¶ÁÈ¡»úÔìºÍCisco ISEµÄ·´ÐòÁл¯Âß¼­ÖУ¬Ç°ÕßÓÚ6ÔÂÏÂÑ®°ä²¼½¨¸´·¨Ê½£¬µ«·ì϶ÀûÓ÷¨Ê½7Ô³õ¼´³öÏÖ²¢±»CISAÏóÕ÷ΪÒÑÀûÓà £»ºóÕß7ÔÂ17ÈÕ°ä²¼ºó½öÎåÌì¼´±»Ö¤ÊµÔâ»ý¼«ÀûÓ᣹¥»÷ÕßÀûÓÃCVE-2025-20337»ñÈ¡Cisco ISEÔ¤ÈÏÖ¤ÖÎÀíԱȨÏÞ£¬²¿ÊðÃûΪ"IdentityAuditAction"µÄ×Ô½ç˵Web Shell¡£¸Ã¶ñÒâ×é¼þ¼Ù×°³ÉºÏ·¨ISE×é¼þ£¬×¢²áΪHTTP¼àÌýÆ÷À¹½ØËùÓÐÒªÇó£¬Í¨¹ýJava·´Éä×¢ÈëTomcatỊ̈߳¬²¢Ñ¡È¡DES¼ÓÃܺͷdz߶Èbase64±àÂë¼ÓÇ¿Òñ±ÎÐÔ£¬ÐèÌØ¶¨HTTP±êÍ·ÄÜÁ¦½Ó¼ûÇÒÏÕЩÎÞȡ֤ºÛ¼£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/


6. Ó¢¹úº¹ÇàÓ°Ïñµµ°¸¹ÝÓû§Êý¾Ýй¶


11ÔÂ12ÈÕ£¬Ó¢¹úº¹ÇàÓ°Ïñµµ°¸¹ÝFrancis FrithÒòÒ»¸ö±»ÒÅÆúµÄElasticsearchÊý¾Ý¿â¶³ö³¬¹ý30ÍòÌõÓû§¼Í¼£¬¸ÃÊý¾Ý¿âÎÞÐèÈÏÖ¤¼´¿É½Ó¼û£¬ÓÉCybernews×êÑÐÈËÔ±·¢ÏÖ¡£³ÉÁ¢ÓÚ1860ÄêµÄFrancis Frith¹«Ë¾×øÂäÓÚË÷¶û×Ȳ®ÀÒÔÕ䲨1860ÖÁ1970Äê¼äÓ¢¹ú³ÇÕò´åÂ亹ÇàÕÕÆ¬ÎÅÃû£¬ÖØÒªÏúÊÛ³åÓ¡ÕÕÆ¬¡¢Êé¼®¼°¸öÐÔ»¯Ó°ÏñÖÆÆ·¡£×êÑÐÈËԱͨ¹ýй¶ÐÅÏ¢ÖÐÌá¼°µÄÓ¢¹úÒŲúÍøÕ¾francisfrith.comËø¶¨Êý¾ÝÔ´£¬È·ÈÏÊôÓÚÕÆ¹Ü¸Ã¹«Ë¾²úÆ·Ôì×÷µÄHeritage Resource Management Ltd¿Í»§¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬Óû§È«Ãû¡¢ÓÊÏ䵨ַ¼°²¿ÃÅʵÌåסַ£¬Éæ¼°½ü4.4ÍòÌõ¿Í»§Õ÷ѯ¼Í¼£¬¹¦·ò¿ç¶È´Ó2006ÄêÖÁ½ü¶þÊ®Äê¡£Ö»¹ÜÎ´Éæ¼°½ðÈÚÕË»§»òÃÜÂ룬µ«Ð¹Â¶Êý¾ÝÈÔ×é³É³Á´óÒþÖÔÍþв£¬ÓÈÆä¶ÔÔÚ˽ÐÅÖÐй©¼ÒͥסַµÄÓû§Ó°Ïì¸üÉõ¡£ÍøÂ簲ȫ×êÑÐÈËÔ±ÖҸ棬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢¼ÙÒâFrancis FrithÆ·ÅÆÖ´Ðо«×¼ÍøÂç´¹µö¡£


https://cybernews.com/security/francis-frith-data-leak-2025/