CISAÒªÇóÁª¹ú»ú¹¹´¹Î£½¨¸´HPE OneView·ì϶
°ä²¼¹¦·ò 2026-01-091. CISAÒªÇóÁª¹ú»ú¹¹´¹Î£½¨¸´HPE OneView·ì϶
1ÔÂ8ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«HPE OneViewµÄCVE-2025-37164·ì϶ÏóÕ÷Ϊ¡°ÔÚ±»»ý¼«ÀûÓá±£¬¸Ã·ì϶ÊôµÚÒ»Á÷±ð·çÏÕ¡£HPE OneViewÊÇÓÃÓÚ¼¯ÖÐÖÎÀí´æ´¢¡¢·þÎñÆ÷ºÍÍøÂçÉ豸µÄ»ù´¡¼Ü¹¹ÖÎÀíÈí¼þ£¬¿í·ºÀûÓÃÓÚÆóÒµIT»·¾³¡£·ì϶ÓÉÔ½Äϰ²È«×êÑÐÔ±Nguyen Quoc Khanh£¨brocked200£©·¢ÏÖ²¢»ã±¨£¬HPEÓÚ2025Äê12ÔÂÖÐÑ®°ä²¼°²È«²¹¶¡£¬µ«·ì϶ӰÏìv11.00֮ǰµÄËùÓÐOneView°æ±¾¡£CVE-2025-37164ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßͨ¹ýµÍ¸´ÔÓ¶È´úÂë×¢Èë¹¥»÷ʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬¹¥»÷ÕßÎÞÐè±¾µØÈ¨ÏÞ¼´¿ÉÆëÈ«½ÚÔìÊÜÓ°Ïìϵͳ¡£HPEÔÚ12ÔÂ16ÈÕµÄÖÒ¸æÖÐÇ¿µ÷£¬¸Ã·ì϶¿ÉÄܱ»Ô¶³ÌÓû§ÀûÓÃÖ´ÐжñÒâ´úÂ룬ֱ½ÓÍþвÆóÒµÖ÷Ìâ»ù´¡ÉèÊ©°²È«¡£CISAÒѽ«¸Ã·ì϶ÄÉÈë¡°ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼¡±£¬²¢Æ¾¾Ý2021Äê°ä²¼µÄBOD 22-01Ö¸ÁҪÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÔÚ2026Äê1ÔÂ28ÈÕǰʵÏÖϵͳ½¨¸´¡£
https://www.bleepingcomputer.com/news/security/cisa-tags-max-severity-hpe-oneview-flaw-as-actively-exploited/
2. GoBruteforcer½©Ê¬ÍøÂçÉý¼¶±©Á¦ÆÆ½â¹¥»÷
1ÔÂ7ÈÕ£¬Ò»¿îÃûΪGoBruteforcerµÄ¸ß¸´ÔÓ¶ÈGo˵»°½©Ê¬ÍøÂçÕý¶ÔÈ«ÇòLinux·þÎñÆ÷ÌáÒé¾çÁÒ¹¥»÷£¬Í¨¹ý±©Á¦ÆÆ½â¼¿Á©³¢ÊÔ»ñÈ¡FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdminµÈ¹«ÍøÂ¶³ö·þÎñµÄÈõÃÜÂë¡£Check Point Research¼Í¼ÏÔʾ£¬Æä2025Äê±äÖÖ°æ±¾¼¼Êõˮƽ´ó·ùÉý¼¶£¬Òѹ¥ÏÂÊýÍǫ̀·þÎñÆ÷£¬È«Çò³¬5Íǫ̀·þÎñÆ÷Ãæ¶Ô·çÏÕ£¬Éæ¼°570ÍòFTP¡¢223ÍòMySQL¼°56ÍòPostgreSQLĬÈ϶˿Ú¶³öÉ豸¡£¸Ã½©Ê¬ÍøÂçѡȡģ¿é»¯¼Ü¹¹£¬Ô̺¬ÍøÒ³ºóÃÅ¡¢ÏÂÔØÆ÷¡¢IRC½©Ê¬·¨Ê½¼°±©Á¦ÆÆ½âÄ£¿é¡£¹¥»÷ÍÆÊÖÖØÒªÔ´ÓÚÔËάÈËÔ±¸´ÓÃAIÌìÉúµÄ·þÎñÆ÷ÅäÖÃÄ£°å£¬ÒÔ¼°XAMPPµÈÀϾɼ¯³É»·¾³²»×ã¼Ó¹Ì¡£ÆäÃÜÂëÁбíÓë1000ÍòÌõй¼ûÜÂëÊý¾Ý¿â³ÁºÏÂÊ´ï2.44%£¬»ùÓÚ375-600¸öÈõÃÜÂëÌìÉú±äÌ壬½áºÏÖØ´ó¶³ö·þÎñ»ùÊýÐγɸ߾¼ÃÐ§Òæ¹¥»÷¡£2025±äÖÖÆëÈ«³Á¹¹IRC×é¼þΪGo˵»°£¬Ê¹ÓÃGarbler¹¤¾ßÉî¶È»ìºÏ´úÂ룬дٹý³Ì¼Ù×°¼¼Êõ£¬¶ã±Ü°²È«¼ì²â¡£
https://cybersecuritynews.com/gobruteforcer-botnet/
3. ¶ñÒânpm°ü´«²¼NodeCordRAT¶ñÒâÈí¼þ
1ÔÂ8ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶ÁËһ·Õë¶ÔnpmÉú̬µÄ¶ñÒâÈí¼þ´«²¼ÊÂÎñ£¬·¢ÏÖÈý¸öÓÉÓû§"wenmoonx"ÉÏ´«µÄ¶ñÒânpmÈí¼þ°ü¡ª¡ªbitcoin-main-lib£¨2,300´ÎÏÂÔØ£©¡¢bitcoin-lib-js£¨193´ÎÏÂÔØ£©¼°bip40£¨970´ÎÏÂÔØ£©¡£½ØÖÁ2025Äê11Ô£¬ÕâЩ°üÒѱ»È«Êýϼܣ¬µ«ÒѶԿª·¢ÕßÉçÇøÔì³ÉÄÚÈÝÐÔÍþв¡£¾Ý·ÖÎö£¬Ç°Á½¸ö¶ñÒâ°üÔÚ×°ÖÃʱ»áÖ´ÐÐpostinstall.cjs¾ç±¾£¬×Ô¶¯×°ÖÃÔ̺¬¶ñÒâ¸ºÔØµÄbip40°ü¡£¸Ã×îÖÕ¸ºÔر»¶¨ÃûΪNodeCordRAT£¬ÊÇÒ»Ö־ߺ±¼û¾ÝÇÔÈ¡ÄÜÁ¦µÄÔ¶³Ì½Ó¼ûľÂí¡£ÆäÃû³ÆÔ´ÓÚË«³Á´«²¼¸öÐÔ£ºÀûÓÃnpm×÷Ϊ³õʼ´«²¼Ã½½é£¬Í¨¹ýDiscord·þÎñÆ÷³ÉÁ¢ºÅÁîÓë½ÚÔ죨C&C£©Í¨Â·¡£¸ÃľÂí¾ß±¸¶à³Á·çÏÕÖ°ÄÜ£º¿ÉÇÔÈ¡¹È¸èChromeä¯ÀÀÆ÷ƾ֤¡¢APIÁîÅÆ¼°MetaMaskµÈ¼ÓÃÜÇ®±ÒÇ®°üµÄÖú¼Ç´Ê£»Í¨¹ýÓ²±àÂëµÄDiscord·þÎñÆ÷½Ó¹ÜÖ¸Á֧³ÖÖ´ÐÐËÁÒâshellºÅÁî¡¢½ØÈ¡×ÀÃæÆÁÄ»¼°ÉÏ´«Ö¸¶¨ÎļþµÈ²Ù×÷¡£Êý¾Ýͨ¹ýDiscord APIµÄ/messages¶ËµãÒÔ¸½¼þ´ó¾ÖÉÏ´«ÖÁ˽ÃÜÆµÂ·£¬ÐγÉÒñ±ÎµÄÇÔÃÜÁ´Â·¡£
https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
4. °ÍÎ÷WhatsAppÓû§ÔâAstarothľÂí¶¨Ïò¹¥»÷
1ÔÂ8ÈÕ£¬°²¿Ëŵ˹Íþв×êÑÐÍŶӽüÈÕÅû¶´úºÅ"·ÛºìºÓëà"µÄÐÂÐ͹¥»÷»î¶¯£¬¹¥»÷ÕßÒÔ°ÍÎ÷WhatsAppÓû§ÎªÖ¸±ê£¬Í¨¹ý¸Ãƽ̨´«²¼ÓµÓжàÄ£¿é»¯¸öÐÔµÄAstaroth£¨±ðÃû"¼ª¶û´ïÂí"£©WindowsÒøÐÐľÂí¡£¸ÃľÂí×Ô2015ÄêÆð³ÖÐø»îÔ¾ÓÚÀÃÀµØÓò£¬ÓÈÒÔ°ÍÎ÷Ϊ³ÁÔÖÇø£¬Ö÷ÌâÖ¸±êΪÇÔÈ¡Óû§Êý¾Ý¼°ÒøÐÐÆ¾Ö¤¡£¹¥»÷Á´ÒÔZIPѹËõ°üΪ³õÊ¼ÔØÌ壬ÄÚº¬¼Ù×°³ÉÕý³£ÎļþµÄVB¾ç±¾¼°MSI×°Ö÷¨Ê½¡£µ±Êܺ¦Õß½âѹ²¢Ö´Ðо籾ºó£¬»á´¥·¢PowerShell/Python¾ç±¾ÏÂÔØ£¬Æô¶¯É豸ÈëÇÖÁ÷³Ì¡£Õâ´Î¹¥»÷µÄÏÔÖøÌØµãÔÚÓÚÐÂÔöµÄPython˵»°¿ª·¢WhatsAppÈ䳿ģ¿é£¬¸ÃÄ£¿é¿É×Ô¶¯ÍøÂçÊܺ¦ÕßͨѶ¼£¬²¢ÏòÈ«ÊýÁªÏµÈËת·¢º¬¶ñÒâZIPµÄ´«²¼ÐÂÎÅ£¬Ðγɼ¸ºÎ¼¶À©É¢Ð§Ó¦¡£Astarothѡȡģ¿é»¯¼Ü¹¹Éè¼Æ£ºÆäÖ÷ÌⷨʽÓɵ¶û¸£Ëµ»°±àд£¬×°Ö÷¨Ê½ÒÀ¸½VB¾ç±¾ÔËÐУ¬¶ø´«²¼Ä£¿éÔòʹÓÃPython¿ª·¢£¬ÌåÏÖÍþвÐÐΪÕß¶Ô¶à˵»°±à³ÌµÄ½Ã½ÝʹÓá£ÒøÐÐľÂíÄ£¿éÔÚºó¶Ü³ÖÐø¼à¿ØÓû§ä¯ÀÀÆ÷»î¶¯£¬µ±¼ì²âµ½½Ó¼ûÒøÐÐÓйØÍøÖ·Ê±£¬µ±¼´¼¤»î²¢ÇÔÈ¡µÇ¼ƾ֤£¬ÊµÏÖ¾¼Ã·¸×ïÖ÷ÕÅ¡£
https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
5. ³¯ÏÊKimsukiÀûÓöñÒâ¶þάÂë¹¥»÷ÃÀ¹ú×éÖ¯
1ÔÂ8ÈÕ£¬ÃÀ¹úÁª¹úµ÷²é¾Ö½üÈÕ°ä²¼´¹Î£¾¯±¨£¬¸æ·¢³¯Ïʹٷ½Ö§³ÖµÄºÚ¿Í×éÖ¯Kimsuki£¨APT43£©Õýͨ¹ý¶ñÒâ¶þάÂëÌáÒéÕë¶ÔÃÀ¹ú×éÖ¯µÄÓã²æÊ½ÍøÂç´¹µö¹¥»÷¡£Õâ´Î¹¥»÷ÖØÒª¶Ô×¼²Î¼Ó³¯ÏÊÓйØÕþ²ß¡¢×êÑкͷÖÎöµÄÃÀ¹ú»ú¹¹£¬Ô̺¬·Çµ±¾Ö×éÖ¯¡¢Öǿ⡢ѧÊõ»ú¹¹¡¢Õ½ÊõÕ÷ѯ¹«Ë¾¼°µÐÔÖʵÌå¡£¹¥»÷Õßͨ¹ý·¢ËÍÔ̺¬¶ñÒâ¶þάÂëµÄ´¹µöÓʼþ£¬ÓÕʹÊܺ¦ÕßɨÃè¶þάÂëºó³Á¶¨ÏòÖÁ¼Ù×°³ÉÎʾíµ÷²é¡¢°²È«Çý¶¯Æ÷»òÐéαµÇÂ¼Ò³ÃæµÄ¶ñÒâÍøÕ¾¡£É¨Ãèºó£¬Êܺ¦ÕßÉ豸»á±»Â·ÓÉÖÁ¹¥»÷Õß½ÚÔìµÄ»ù´¡ÉèÊ©£¬½øÐÐÉè±¸Ö¸ÎÆ¼ø±ð£¬ÍøÂçÓû§´úÀíÐÅÏ¢¡¢²Ù×÷ϵͳ¡¢IPµØÖ·¡¢ÆÁÄ»³ß´ç¼°±¾µØËµ»°µÈÊý¾Ý¡£Ëæºó£¬Êܺ¦Õ߻ῴµ½·ÂÕÕMicrosoft 365¡¢Okta¡¢VPN»òGoogleµÇÂ¼Ò³ÃæµÄ´¹µöÒ³Ãæ£¬×îÖÕÖ÷ÕÅΪÇÔÈ¡½Ó¼ûƾ֤»ò»á»°ÁîÅÆ¡£´ËÀ๥»÷ͨ¹ýÒÆ¶¯É豸ɨÃè¶þάÂëµÄ¸öÐÔ£¬ÓÐÐ§ÈÆ¹ý´«Í³µç×ÓÓʼþ°²È«½â¾ö¹æ»®¼°¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©¡£ÓÉÓÚ¹¥»÷Ô´×ÔδÊÜÖÎÀíµÄÒÆ¶¯É豸£¬´¦Óڳ߶ȶ˵ã¼ì²âÓëÏìÓ¦£¨EDR£©ºÍÍøÂç¼à¿ØÖ®±í£¬±»ÃèÊöΪ¡°²»ÊÜMFA±£»¤µÄÉí·ÝÈëÇÖÏòÁ¿¡±¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-about-kimsuky-hackers-using-qr-codes-to-phish-us-orgs/
6. ¶ñÒâÈí¼þ¼ÓÔØÆ÷pkr_mtsi¿É´«µÝ¶àÖÖÓÐÐ§ÔØºÉ
1ÔÂ8ÈÕ£¬ReversingLabs£¨RL£©½üÈÕÅû¶£¬Ò»ÖÖÃûΪpkr_mtsiµÄ¶ñÒâWindows´ò°ü·¨Ê½×Ô2025Äê4ÔÂ24ÈÕ·¢ÏÖÒÔÀ´³ÖÐø»îÔ¾£¬³ÉΪ´ó¹æÄ£¶ñÒâ¸æ°×ºÍSEOͶ¶¾»î¶¯µÄÖ÷Ìâ¼ÓÔØÆ÷¡£¸Ã¹¤¾ßͨ¹ýÐéαÏÂÔØÍøÕ¾ÓÕÆÓû§ÏÂÔØ¼Ù×°³ÉPuTTY¡¢Rufus¡¢Microsoft TeamsµÈºÏ·¨Èí¼þµÄľÂí×°Ö÷¨Ê½£¬ÀûÓø¶·ÑËÑË÷¸æ°×ºÍËÑË÷ÅÅÃû°Ñ³ÖÌáÉýÆØ¹âÂÊ£¬¶ø·ÇÒÀÀµ¹©¸øÉÌÈëÇÖ¡£pkr_mtsi¾ß±¸¸ß¶È½Ã½ÝÐÔ£¬¿É²¿ÊðOyster¡¢Vidar¡¢Vanguard Stealer¡¢SupperµÈ¶àÖÖ¶ñÒâÈí¼þ¼Ò×å¡£Æä½ø»¯¹ì¼£ÏÔÖø£º´Óǰ°Ë¸öÔÂÄÚÒýÈë¸ü׳´óµÄ»ìºÏ¼¼Êõ¡¢¹þÏ£API½âÎö¼°·´·ÖÎö»úÔ죬ͬʱά³Ö¡°ÄÚ´æ·ÖÅä-Ó×¹æÄ£Ð´Èë³Á½¨Ôغɡ±µÄ²»±äÖ´ÐÐÄ£ÐÍ¡£¹Ø¼ü¼¼ÊõÌØµãÔ̺¬¸Ä½øµÄUPXÖÐÑë¼¶Ìî³ä¡¢»ìºÏµÄZwAllocateVirtualMemoryŲÓá¢×ÌÈÅ·ÖÎöµÄÀ¬»øGDI APIŲÓã¬ÒÔ¼°´¥·¢¹ý³ÌÖÕÖ¹»òÎÞÏÞÑ»·µÄ·´µ÷ÊԲ鳡£Ö»¹Ü½á¹¹¶à±ä£¬µ«Æä³Á¸´Å²ÓôøÓÐÎÞЧ±£»¤±êÖ¾µÄNtProtectVirtualMemoryº¯Êý²úÉúµÄ¿ÉÔ¤²âÃýÎó£¬Îª¶ËµãÒ£²â¼à¿ØÌṩÁË¿¿µÃס¼ì²â»úÓö¡£
https://www.infosecurity-magazine.com/news/malware-loader-pkrmtsi-payloads/


¾©¹«Íø°²±¸11010802024551ºÅ