²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î

Ðû²¼Ê±¼ä 2025-03-05

1. ²©Í¨ÐÞ¸´ÁËVMware ESX²úÆ·ÖÐÈý¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬²©Í¨½üÆÚÐû²¼ÁËÇå¾²¸üР£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÐÞ¸´VMware ESX²úÆ·Öб£´æµÄÈý¸öÑÏÖØÁãÈÕÎó²î £¬£¬£¬£¬£¬£¬£¬£¬Îó²î±àºÅ»®·ÖΪCVE-2025-22224¡¢CVE-2025-22225ºÍCVE-2025-22226 £¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁ˰üÀ¨VMware ESXi¡¢vSphere¡¢Workstation¡¢Fusion¡¢Cloud FoundationºÍTelco Cloud PlatformÔÚÄڵĶà¸ö²úÆ·¡£¡£¡£ÕâЩÎó²îÓÉ΢ÈíÍþвÇ鱨ÖÐÐĵÄÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐCVE-2025-22224ΪVMCI¶ÑÒç³öÎó²î £¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.3£»£»£»£»£»£»CVE-2025-22225ΪVMware ESXií§ÒâдÈëÎó²î £¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ8.2£»£»£»£»£»£»CVE-2025-22226ΪHGFSÐÅϢй¶Îó²î £¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.1¡£¡£¡£¹¥»÷ÕßÈôÓµÓÐÌØÈ¨ÖÎÀíÔ±»ò¸ù»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²îʵÏÖÐéÄâ»úɳºÐÌÓÒÝ¡£¡£¡£²©Í¨Í¨¹ýVMSA-2025-0004Ç徲ͨ¸æÈ·ÈÏÁËÕâЩÎó²îµÄ±£´æ £¬£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öËüÃÇÒѱ»ÆÕ±éʹÓᣡ£¡£¹«Ë¾Ç¿µ÷ £¬£¬£¬£¬£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖÐéÄâ»ú²¢»ñµÃÌØÈ¨»á¼ûµÄ¹¥»÷Õß £¬£¬£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÕâЩÎó²î½øÒ»²½»á¼ûÐéÄâ»úÖÎÀí³ÌÐò×Ô¼º¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬£¬£¬£¬²©Í¨ÏÖÔÚÉÐδÅû¶¹ØÓÚÏêϸ¹¥»÷»ò±³ºóÍþвÐÐΪÕßµÄÏêϸÐÅÏ¢¡£¡£¡£


https://securityaffairs.com/174911/security/vmware-fixed-three-actively-exploited-zero-days-in-esx-products.html


2. Eleven11bot½©Ê¬ÍøÂçѬȾ8.6Íǫ̀ÎïÁªÍø×°±¸·¢¶¯DDoS¹¥»÷


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Eleven11bot¡±µÄÐÂÐͽ©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾÁè¼Ý86,000̨ÎïÁªÍø×°±¸ £¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÊÇÇå¾²ÉãÏñÍ·ºÍÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£© £¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓëÒÁÀÊÓÐËÉÉ¢ÁªÏµ £¬£¬£¬£¬£¬£¬£¬£¬ÒÑÕë¶ÔµçÐÅЧÀÍÌṩÉ̺ÍÔÚÏßÓÎϷЧÀÍÆ÷Ìᳫ¹¥»÷¡£¡£¡£Åµ»ùÑÇÑо¿Ö°Ô±·¢Ã÷Á˸ý©Ê¬ÍøÂç £¬£¬£¬£¬£¬£¬£¬£¬²¢ÓëÍþв¼à¿ØÆ½Ì¨GreyNoise·ÖÏíÁËÏêϸÐÅÏ¢¡£¡£¡£¾ÝShadowserver Foundation±¨¸æ £¬£¬£¬£¬£¬£¬£¬£¬ÊÜѬȾµÄ×°±¸´ó¶àλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢Ä«Î÷¸ç¡¢¼ÓÄôóºÍ°Ä´óÀûÑÇ¡£¡£¡£Eleven11botµÄ¹¥»÷Á¿ÒѵִïÿÃëÊýÒÚ¸öÊý¾Ý°ü £¬£¬£¬£¬£¬£¬£¬£¬Ò»Á¬Ê±¼äͨ³£ÎªÊýÌì¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇ¿ÖÆÊ¹ÓÃÈõ»ò³£¼ûµÄÖÎÀíԱƾ֤¡¢Ê¹ÓÃÒÑ֪ĬÈÏÆ¾Ö¤ÒÔ¼°É¨Ãè̻¶µÄTelnetºÍSSH¶Ë¿ÚÀ´Èö²¥¡£¡£¡£GreyNoise½¨Òé·ÀÓùÕß½«Ïà¹ØIPµØµãÌí¼Óµ½ºÚÃûµ¥ÖÐ £¬£¬£¬£¬£¬£¬£¬£¬²¢¼à¿Ø¿ÉÒɵǼʵÑé¡£¡£¡£ÎªÈ·±£Çå¾² £¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéÎïÁªÍø×°±¸ÔËÐÐ×îй̼þ°æ±¾ £¬£¬£¬£¬£¬£¬£¬£¬½ûÓò»ÐëÒªµÄÔ¶³Ì»á¼û¹¦Ð§ £¬£¬£¬£¬£¬£¬£¬£¬²¢¸ü¸ÄĬÈÏÖÎÀíÔ±ÕÊ»§Æ¾Ö¤¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬£¬°´ÆÚ¼ì²é×°±¸ÊÇ·ñµÖ´ïʹÓÃÊÙÃüÖյ㲢ÓÃÐÂÐͺÅÌæ»»ÖÁ¹ØÖ÷Òª¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-eleven11bot-botnet-infects-86-000-devices-for-ddos-attacks/


3. ¶àÓïÑÔ¶ñÒâÈí¼þSosanoÕë¶Ô°¢ÁªÇõÒªº¦×éÖ¯Ìᳫ¹¥»÷


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÕë¶Ô°¢À­²®ÁªºÏÇõ³¤¹úº½¿Õ¡¢ÎÀÐÇͨѶºÍÒªº¦½»Í¨×éÖ¯µÄ¶àÓïÑÔ¶ñÒâÈí¼þÕýÔÚ±»Î´ÖªÍþвÐÐΪÕßʹÓᣡ£¡£¸ÃÈí¼þÃûΪSosano £¬£¬£¬£¬£¬£¬£¬£¬ÌṩºóÃŹ¦Ð§ £¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÊÜѬȾװ±¸ÉϽ¨É賤ÆÚÐÔ²¢Ô¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£ProofpointÓÚ2024Äê10Ô·¢Ã÷ÁËÕâÒ»»î¶¯ £¬£¬£¬£¬£¬£¬£¬£¬Ö¸³öÆäÓëÒÁÀÊÃËÓÑTA451ºÍTA455µÄÐж¯ÓÐÏàËÆÖ®´¦ £¬£¬£¬£¬£¬£¬£¬£¬µ«´Ë´Î»î¶¯ÖصãÔÚÓÚÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÌØÖÆÎļþ £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶àÖÖÎļþÃûÌà £¬£¬£¬£¬£¬£¬£¬£¬ÌӱܻùÓÚ¼òµ¥ÃûÌÃÆÊÎöµÄÇå¾²Èí¼þ¼ì²â¡£¡£¡£¹¥»÷ʼÓÚÓ¡¶Èµç×Ó¹«Ë¾·¢Ë͵ÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶ñÒâURLºÍZIP´æµµ £¬£¬£¬£¬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉXLSµÄLNKÎļþºÍÁ½¸ö¶àÓïÑÔPDFÎļþ¡£¡£¡£PDFÎļþ°üÀ¨HTA´úÂëºÍÒþ²ØZIPµµ°¸ £¬£¬£¬£¬£¬£¬£¬£¬´¥·¢SosanoºóÃÅ¡£¡£¡£SosanoºóÃÅÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèÅþÁ¬ £¬£¬£¬£¬£¬£¬£¬£¬ÆÚ´ýÎļþ²Ù×÷¡¢shellÏÂÁîÖ´ÐеÈÏÂÁî¡£¡£¡£·ÀÓù´ËÀàÍþвÐè½ÓÄɶà¹ÜÆëÏÂÒªÁì £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþɨÃè¡¢Óû§½ÌÓýºÍÄܹ»¼ì²â¶àÖÖÎļþÃûÌõÄÇå¾²Èí¼þ¡£¡£¡£×èֹΣÏÕÎļþÀàÐÍÒ²ÊÇÃ÷ÖÇÖ®¾Ù¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-polyglot-malware-hits-aviation-satellite-communication-firms/


4. ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷ÈÕ±¾°©Ö¢ÖÎÁÆÖÐÐÄ £¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶30Íò»¼ÕßÊý¾Ý


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾Óî¶¼¹¬ÖÐÑëÕïËù(UCC)°©Ö¢ÖÎÁÆÖÐÐÄÓÚ2ÔÂ10ÈÕÔâµ½÷è÷ëÀÕË÷Èí¼þ×éÖ¯µÄºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ30ÍòÃû»¼ÕßµÄÃô¸Ð¿µ½¡ÐÅϢй¶ £¬£¬£¬£¬£¬£¬£¬£¬Ò½ÔºÏµÍ³Ò²ÎÞ·¨Ê¹Óᣡ£¡£¸Ã×éÖ¯ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˱»µÁÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨»¼ÕßÐÕÃû¡¢ÉúÈÕ¡¢ÐԱ𡢵ص㡢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Ò½ÁÆÐÅÏ¢µÈ £¬£¬£¬£¬£¬£¬£¬£¬²¢¼¥Ð¦»¼ÕßʹÓÃUCCµÄЧÀÍ¿ÉÄܻᵼÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£UCC¹ÙÔ±±Þ²ß¿Í»§Ð¡ÐÄÕ©Æ­ÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÉèÁ¢ÁËÈÈÏߵ绰¹©»¼Õß»ñÈ¡¸ü¶àÐÅÏ¢¡£¡£¡£÷è÷ë×éÖ¯×Ô2025ÄêÍ·ÒÔÀ´Ò»Ö±ÔÚÔöÇ¿¹¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ģʽÔË×÷ £¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßʹÓÃË«ÖØÀÕË÷ÊֶζøÖøÃû¡£¡£¡£¸Ã×éÖ¯ÒÑÍù12¸öÔµÄÍøÂç¹¥»÷»î¶¯Ò»Ö± £¬£¬£¬£¬£¬£¬£¬£¬×ÜÊܺ¦ÕßÊýÄ¿ÒÑ´ï191´Î¡£¡£¡£÷è÷ë×é֝ɿÏÓͨ¹ýÇÔÈ¡Google Chromeƾ֤ÒÔ¼°ÉñÃØÌӱܻò½ûÓö˵ã¼ì²âºÍÏìÓ¦(EDR)ϵͳÀ´Ê¹ÓÃÊܺ¦Õß £¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÖøÃûµÄ¡°Citrix Bleed¡±ÁãÈÕÎó²î¡£¡£¡£


https://cybernews.com/news/cancer-hospital-breach-is-claimed-by-qilin-gang-in-new-ransomware-low/


5. Zhong Stealer¶ñÒâÈí¼þͨ¹ý¿Í·þѬȾ½ðÈڿƼ¼¹«Ë¾


3ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬ÃûΪ¡°Zhong Stealer¡±µÄÐÂÐͶñÒâÈí¼þÒÑÔÚÖйú·ºÆð £¬£¬£¬£¬£¬£¬£¬£¬Ëüͨ¹ýʹÓÿͻ§Ö§³Ö̸ÌìÕâÒ»ÒâÏë²»µ½µÄÇÐÈëµãDZÈëÆóÒµ £¬£¬£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄÊǽðÈڿƼ¼¹«Ë¾ £¬£¬£¬£¬£¬£¬£¬£¬µ«Æä˳ӦÐÔ¼«Ç¿ £¬£¬£¬£¬£¬£¬£¬£¬¿ÉÕë¶ÔÈκÎÒÀÀµ¿Í»§Ö§³ÖÍŶӵÄÐÐÒµ¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÈËÐÔµÄÈõµã £¬£¬£¬£¬£¬£¬£¬£¬Èç½ôÆÈ¸Ð¡¢ÒÉÐĺ;ÚÉ¥ £¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÈ«ÐIJ߻®µÄȦÌ×ÓÕµ¼¿Í·þÖ°Ô±·­¿ª°üÀ¨¶ñÒâZIPÎļþµÄ¸½¼þ¡£¡£¡£Zhong StealerÄܹ»ÏÂÔØÆäËû×é¼þ¾ÙÐй¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÊÜѬȾϵͳÖмá³Ö³¤ÆÚÐÔ £¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÌí¼Ó×¢²á±íÏî»òʹÓÃÍýÏëʹÃüÖØÐÂÆô¶¯×ÔÉí £¬£¬£¬£¬£¬£¬£¬£¬ÄÑÒÔ³¹µ×Ïû³ý¡£¡£¡£ÆäÖ÷ҪĿµÄÊÇÍøÂçÆ¾Ö¤ºÍä¯ÀÀÆ÷À©Õ¹Êý¾Ý £¬£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐµÄÉÌÒµºÍСÎÒ˽¼ÒÊý¾Ý £¬£¬£¬£¬£¬£¬£¬£¬²¢½«ÐÅÏ¢·¢ËÍ»ØÎ»ÓÚÏã¸ÛµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£Îª±£»£»£»£»£»£»¤ÆóÒµÃâÊÜZhong StealerË𺦠£¬£¬£¬£¬£¬£¬£¬£¬¿ÉʹÓÃANY.RUNɳÏäµÈ¹¤¾ß¶Ô¿ÉÒÉÎļþ¾ÙÐÐÆÊÎö £¬£¬£¬£¬£¬£¬£¬£¬Éó²éʵʱ¶ñÒâÈí¼þÐÐΪ £¬£¬£¬£¬£¬£¬£¬£¬Á¬Ã¦Ê¶±ðÍþв £¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÔ±¹¤·­¿ªÎļþ֮ǰ×Ô¶¯¼ì²éÎļþ £¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâѬȾ¡£¡£¡£


https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/


6. ´ó¹æÄ£ÍøÂçÇå¾²Îó²îÖÂ3.5ÍòÍøÕ¾ÔâÐ®ÖÆÖØ¶¨ÏòÖÁ¶Ä²©Æ½Ì¨


3ÔÂ3ÈÕ £¬£¬£¬£¬£¬£¬£¬£¬Ò»Æð´ó¹æÄ£ÍøÂçÇå¾²Îó²îÊÂÎñÓÚ2ÔÂ20ÈÕ±¬·¢ £¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý35,000¸öÍøÕ¾Ôâµ½¹¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬Óû§ä¯ÀÀÆ÷´°¿Ú±»¶ñÒâ¾ç±¾ÍêÈ«Ð®ÖÆ²¢Öض¨ÏòÖÁÖÐÎĶIJ©Æ½Ì¨¡°Kaiyun¡±¡£¡£¡£c/sideÇå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÊÜÓ°ÏìÍøÕ¾µÄÔ´´úÂëÖвåÈë¼òÆÓ¾ç±¾±êÇ© £¬£¬£¬£¬£¬£¬£¬£¬¼ÓÔØÆäËû¶ñÒâ´úÂë £¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ´úÂëʹÓÃ×°±¸¼ì²âÊÖÒÕ²¢ÉèÖÃ500-1000ºÁÃëËæ»úÑÓ³ÙÒÔÌÓ±ÜÇ徲ɨÃè¡£¡£¡£×îÁîÈ˵£ÐĵÄÊÇ £¬£¬£¬£¬£¬£¬£¬£¬¶ñÒâ¾ç±¾×¢ÈëÈ«ÆÁiframe´úÂë £¬£¬£¬£¬£¬£¬£¬£¬Ìæ»»Ô­Ê¼ÍøÕ¾ÄÚÈÝΪ¶Ä²©Æ½Ì¨¡£¡£¡£¹¥»÷ͨ¹ý¶à¸ö´úÂëÖ´Ðн׶ξÙÐÐ £¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃJavaScriptº¯Êý¼ì²âÓû§×°±¸ÀàÐÍ £¬£¬£¬£¬£¬£¬£¬£¬ÓÐÕë¶ÔÐÔµØÍ¶·Å¶ñÒâÄÚÈÝ £¬£¬£¬£¬£¬£¬£¬£¬²¢½¨ÉèÔªÊÓ¿Ú±êǩȷ±£¶ñÒâÄÚÈÝÌîÂúÕû¸öÆÁÄ»¡£¡£¡£²¿·Ö¹¥»÷±äÖÖ»¹ÊµÑé»ùÓÚµØÇøµÄ¹ýÂË»úÖÆ £¬£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Óû§IPµØµãÏÔʾ²î±ðÄÚÈÝ¡£¡£¡£Ç徲ר¼ÒÍÆ²â´Ë´Î¹¥»÷ÓëMegalayerÎó²îÓÐ¹Ø £¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéÍøÕ¾ËùÓÐÕßÉóºËÔ´´úÂë¡¢×èÖ¹¶ñÒâÓò¡¢°´ÆÚ¼ì²éÎļþÐ޸ġ¢ÊµÑéÄÚÈÝÇå¾²Õ½ÂÔÏÞÖÆ £¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óù¤¾ßÖ´ÐÐÆµÈÔÕ¾µãɨÃèÒÔ·¢Ã÷¶ñÒâ×¢Èë £¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø±£»£»£»£»£»£»¤Æ½Ì¨ÃâÊÜÀàËÆ¹¥»÷¡£¡£¡£


https://cybersecuritynews.com/35000-websites-hacked-to-inject-malicious-scripts/