Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2025-11-121. Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷
11ÔÂ10ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬Ò»¼ÒΪҽÉúÌṩ¼Æ·ÑЧÀ͵ÄÒ½ÁÆÊÖÒÕ¹«Ë¾Doctor AllianceÔâÓöÍøÂç·¸·¨·Ö×ÓÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳ÉÏÐû³Æ£¬£¬£¬£¬£¬ÒÑÇÔÈ¡¸Ã¹«Ë¾Áè¼Ý120ÍòÌõÃô¸ÐÒ½ÁƼͼ£¬£¬£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ýº¸ÇÕï¶ÏЧ¹û¡¢Ìå¼ì×ܽᡢ´¦·½¡¢ÖÎÁƼƻ®¡¢Ò½ÔºÒ½ÖöµÈ½¹µãÒ½ÁÆÐÅÏ¢£¬£¬£¬£¬£¬Í¬Ê±°üÀ¨»¼ÕßÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢¿µ½¡°ü¹ÜË÷Åâ¼Í¼¡¢Ò½ÉúÐÕÃûµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄ200MBÊý¾ÝÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬£¬£¬£¬£¬ÆäÖгäÂú×Å´ó×ÚÎÞ·¨»Ö¸´µÄÒ½ÁƺÍÉúÎïʶ±ðÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´ËÀàÊý¾Ýй¶½«´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓû¼ÕßÉí·ÝÐÅÏ¢¾ÙÐÐÒ½ÁÆÉí·Ý͵ÇÔ£¬£¬£¬£¬£¬Ã°³äÊܺ¦Õß»ñÈ¡´¦·½Ò©»òÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬£¬ÉõÖÁͨ¹ýÉç½»¹¤³Ì¹¥»÷Ò½ÉúºÍ»¼Õߣ»£»£»£»£»£»£»ÈôÉæ¼°»¼Õß²¡Ê·£¬£¬£¬£¬£¬»¹¿ÉÄÜÒý·¢Ú²ÆÀÕË÷¡£¡£¡£¡£¡£¡£¡£ÓëÃÜÂë»òÐÅÓÿ¨²î±ð£¬£¬£¬£¬£¬Ò½ÁƼͼһµ©Ð¹Â¶ÎÞ·¨Í¨¹ý¸ü¸Ä»Ö¸´£¬£¬£¬£¬£¬µ¼ÖÂΣº¦ºã¾Ã±£´æ¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/doctor-alliance-breach-allegedly-exposes-patients-health-data/
2. Triofox¸ßΣÎó²î±»Ê¹ÓÃʵÏÖÈ«Á´¹¥»÷ÓëȨÏÞÌáÉý
11ÔÂ11ÈÕ£¬£¬£¬£¬£¬¹È¸èMandiantÍŶÓÅû¶£¬£¬£¬£¬£¬Triofoxƽ̨±£´æÑÏÖØÎó²îCVE-2025-12480£¨CVSSÆÀ·Ö9.1£©£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸ÃÎó²îÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬Ê¹Ó÷À²¡¶¾¹¦Ð§ÉÏ´«²¢Ö´ÐÐÔ¶³Ì»á¼û¹¤¾ß¡£¡£¡£¡£¡£¡£¡£Mandiant×·×Ù·¢Ã÷£¬£¬£¬£¬£¬Íþв¼¯ÈºUNC6485ÔçÔÚ2025Äê8ÔÂ24ÈÕ±ãʹÓôËÎó²î£¬£¬£¬£¬£¬Á¬Ïµ·À²¡¶¾¹¦Ð§ÊµÏÖ´úÂëÖ´ÐУ¬£¬£¬£¬£¬Ðγɡ°Éí·ÝÈÆ¹ý-ÕË»§½¨Éè-¾ç±¾Ö´ÐÐ-ȨÏÞÌáÉý¡±µÄÍêÕû¹¥»÷Á´¡£¡£¡£¡£¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýαÔìHTTPÖ÷»úͷΪ¡°localhost¡±£¬£¬£¬£¬£¬ÈƹýTriofox¶ÔAdminAccount.aspxµÈÖÎÀíÒ³ÃæµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬Ê¹ÓÃGladPageUILib.dllÖÐCanRunCriticalPage()º¯ÊýµÄÂ߼ȱÏÝ£¬£¬£¬£¬£¬ÔÚ×°ÖÃÀú³ÌÖн¨Éè¡°¼¯ÈºÖÎÀíÔ±¡±ÕË»§¡£¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬Í¨¹ý·À²¡¶¾¹¦Ð§ÉÏ´«¶ñÒâÅú´¦Öóͷ£Îļþ£¬£¬£¬£¬£¬¸ÃÎļþÔÚÎļþÉÏ´«ÖÁ¹²ÏíÎļþ¼Ðʱ±»´¥·¢£¬£¬£¬£¬£¬ÒÔSYSTEMȨÏÞÖ´ÐÐPowerShellÏÂÔØÆ÷£¬£¬£¬£¬£¬ÏÂÔØÎ±×°³ÉSAgentInstallerµÄ¶ñÒâ³ÌÐò£¬£¬£¬£¬£¬¾²Ä¬×°ÖÃZoho UEMS£¬£¬£¬£¬£¬²¢°²ÅÅZoho AssistºÍAnyDeskʵÏÖÔ¶³Ì»á¼û¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß½øÒ»²½Ã¶¾ÙSMB»á»°ºÍÓû§ÕË»§£¬£¬£¬£¬£¬ÊµÑéÐÞ¸ÄÃÜÂë²¢ÌáÉýȨÏÞÖÁÍâµØ/ÓòÖÎÀíÔ±£¬£¬£¬£¬£¬Í¬Ê±Í¨¹ý¶Ë¿Ú443½¨ÉèSSH·´ÏòËíµÀ£¬£¬£¬£¬£¬½«ÍâµØRDPЧÀÍת·¢ÖÁ¹¥»÷Õß¿ØÖÆÖ÷»ú£¬£¬£¬£¬£¬Ðγɳ¤ÆÚ»¯»á¼ûͨµÀ¡£¡£¡£¡£¡£¡£¡£MandiantÇ¿µ÷£¬£¬£¬£¬£¬Ö»¹ÜÐÞ¸´°æ±¾16.7.10368.56560ÒÑÐû²¼£¬£¬£¬£¬£¬µ«½¨ÒéÓû§Éý¼¶ÖÁ×îа汾£¬£¬£¬£¬£¬²¢ÉóºËÖÎÀíÔ±ÕË»§ÒÔ¼ì²âÒì³£½¨Éè¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/184439/hacking/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html
3. ClickFixÍøÂç´¹ÂÚ¹¥»÷ʹÓÃPureRATÃé×¼ÂùÝϵͳ
11ÔÂ10ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬£¬Ò»³¡Õë¶ÔÂùÝÒµµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷»î¶¯×Ô2025Äê4ÔÂÒ»Á¬ÖÁ10Ô³õ£¬£¬£¬£¬£¬ÓÉ·¨¹úÇå¾²¹«Ë¾SekoiaÉî¶ÈÆÊÎö¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÈëÇÖÕýµ±ÓÊÏäÕË»§£¬£¬£¬£¬£¬ÏòÂùÝ˾ÌêÍ·ËÍ·ÂðBooking.comµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬ÓÕµ¼Æäµã»÷αװ³ÉreCAPTCHAÑéÖ¤µÄClickFixÉç½»¹¤³ÌÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£¸ÃÒ³Ãæ½ÓÄÉÖØ´óÖØ¶¨Ïò»úÖÆ£¬£¬£¬£¬£¬×îÖÕ´¥·¢¶ñÒâPowerShellÏÂÁ£¬£¬£¬£¬ÏÂÔØº¬DLLÅÔ¼ÓÔØÊÖÒÕµÄZIPѹËõ°ü£¬£¬£¬£¬£¬¼¤»îÄ£¿£¿£¿£¿£¿é»¯Ä¾ÂíPureRAT¡£¡£¡£¡£¡£¡£¡£PureRAT¾ß±¸È«·½Î»¼à¿Ø¹¦Ð§£¬£¬£¬£¬£¬°üÀ¨¼üÅ̼ͼ¡¢Ô¶³Ì¿ØÖÆ¡¢ÉãÏñÍ·²¶»ñ¼°ÎļþÇÔÈ¡£¬£¬£¬£¬£¬²¢Í¨¹ý.NET Reactor»ìÏý±£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬Ê¹ÓÃ×¢²á±íʵÏÖ³¤ÆÚ»¯×¤Áô¡£¡£¡£¡£¡£¡£¡£¹¥»÷µ½Êֺ󣬣¬£¬£¬£¬·¸·¨·Ö×Ó½øÒ»²½Ê¹ÓÃÇÔÈ¡µÄÂùÝÔ¤¶©Æ½Ì¨ÕË»§£¬£¬£¬£¬£¬Í¨¹ýWhatsApp»òÓʼþÁªÏµÕæÊµ¿Í»§£¬£¬£¬£¬£¬ÒÔ¡°È·ÈÏÔ¤¶©ÐÅÏ¢¡±ÎªÃûÓÕµ¼Æä½øÈë·ÂðµÄBooking.com»òExpediaÒ³Ãæ£¬£¬£¬£¬£¬ÇÔÈ¡ÒøÐп¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬·¸·¨ÍÅ»ï´ÓLolzTeamµÈºÚ¿ÍÂÛ̳¹ºÖÃBooking.comÖÎÀíÔ±ÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬ÉõÖÁ°´ÀûÈó·Ö³ÉÕÐļ·ÖÏúר¼Ò¡£¡£¡£¡£¡£¡£¡£SekoiaÊӲ쵽רѧÉúÒâÔ¤¶©Æ½Ì¨ÈÕÖ¾µÄTelegram»úеÈ˼°ÌṩÈ˹¤ÑéºÅЧÀ͵ĺڲú¹©Ó¦Á´¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/11/large-scale-clickfix-phishing-attacks.html
4. Maverick¶ñÒâÈí¼þÐ®ÖÆä¯ÀÀÆ÷»á»°£¬£¬£¬£¬£¬Ãé×¼°ÍÎ÷×î´óÒøÐÐ
11ÔÂ11ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±·¢Ã÷£¬£¬£¬£¬£¬Á½¿îÕë¶Ô°ÍÎ÷ÒøÐÐÓû§µÄ.NET¶ñÒâÈí¼þCoyoteÓëMaverick±£´æÏÔÖø¹ØÁªÐÔ¡£¡£¡£¡£¡£¡£¡£CyberProof±¨¸æÏÔʾ£¬£¬£¬£¬£¬¶þÕß¾ù¾ß±¸ÒøÐÐURL¶¨Ïò¡¢Ó¦ÓÃ¼à¿Ø¼°WhatsAppÍøÒ³°æÈö²¥ÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£MaverickÓÉÇ÷ÊÆ¿Æ¼¼Ê״μͼµÄ"Ë®ÈøÎ÷"£¨Water Saci£©¹¥»÷»î¶¯ÍƳö£¬£¬£¬£¬£¬°üÀ¨×ÔÈö²¥×é¼þSORVEPOTEL£¬£¬£¬£¬£¬Í¨¹ýWhatsApp×ÀÃæ°æÀ©É¢º¬¶ñÒâZIP°ü¡£¡£¡£¡£¡£¡£¡£¸ÃľÂí¼à¿Øä¯ÀÀÆ÷±êǩҳ£¬£¬£¬£¬£¬Ê¶±ðÀ¶¡ÃÀÖÞ½ðÈÚ»ú¹¹URLºóÅþÁ¬Ô¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬ÍÆËÍ´¹ÂÚÒ³ÃæÇÔȡƾ֤¡£¡£¡£¡£¡£¡£¡£SophosÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬Maverick¿ÉÄÜÊÇCoyoteµÄÉý¼¶°æ£¬£¬£¬£¬£¬¿¨°Í˹»ùÔò·¢Ã÷¶þÕß±£´æ´ó×Ú´úÂëÖØµþ£¬£¬£¬£¬£¬µ«½«ÆäÊÓΪ°ÍÎ÷ÐÂÍþв¡£¡£¡£¡£¡£¡£¡£CyberProof×îÐÂÊÓ²ìÕ¹ÏÖ£¬£¬£¬£¬£¬ZIPÎļþÖеÄLNKÎļþÆô¶¯ºó»áÅþÁ¬ÍⲿЧÀÍÆ÷ÏÂÔØÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬½ûÓÃ΢ÈíDefenderºÍUAC£¬£¬£¬£¬£¬¼ÓÔØ¾ß±¸·´ÆÊÎöÊÖÒÕµÄ.NET¼ÓÔØÆ÷£¬£¬£¬£¬£¬×îÖÕ°²ÅÅSORVEPOTELºÍMaverick¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Maverick½öÔÚÈ·ÈÏÊܺ¦ÕßλÓÚ°ÍÎ÷ºó×°Ö㬣¬£¬£¬£¬ÇÒ¹¥»÷Ä¿µÄÒÑÀ©Õ¹ÖÁ°ÍÎ÷Âùݡ£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html
5. RhadamanthysÐÅÏ¢ÇÔÈ¡Ðж¯ÔâÖ´·¨ÖÐÖ¹
11ÔÂ11ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±g0njxaºÍGi7w0rm¼à²âµ½£¬£¬£¬£¬£¬ÃûΪRhadamanthysµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ðж¯ÒÑÔâÖÐÖ¹£¬£¬£¬£¬£¬Æä"¿Í»§"ÆÕ±é±¨¸æÎÞ·¨»á¼ûЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶©ÔÄģʽÔËÓª£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÐèÿÔÂÏò¿ª·¢ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡Èí¼þ¡¢ÊÖÒÕÖ§³Ö¼°ÓÃÓÚÍøÂç±»µÁÊý¾ÝµÄÍøÂçÃæ°å»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£ÆäÈö²¥Í¾¾¶°üÀ¨Î±×°³ÉÈí¼þÆÆ½â³ÌÐò¡¢YouTubeÊÓÆµ»ò¶ñÒâËÑË÷¹ã¸æ£¬£¬£¬£¬£¬Ö÷ÒªÇÔÈ¡ä¯ÀÀÆ÷¡¢µç×ÓÓʼþ¿Í»§¶ËµÈÓ¦ÓóÌÐòµÄƾ֤ºÍÉí·ÝÑéÖ¤cookie¡£¡£¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÂÛ̳Óû§·´Ï죬£¬£¬£¬£¬²¿·Ö¿Í»§·¢Ã÷RhadamanthysÍøÂçÃæ°åµÄSSH»á¼ûȨÏÞ±»¸ÄΪ֤ÊéµÇ¼ģʽ£¬£¬£¬£¬£¬ÐèÖØÐÂ×°ÖÃЧÀÍÆ÷²¢É¨³ýºÛ¼££¬£¬£¬£¬£¬µÂ¹ú¾¯·½ÒѽéÈëÊӲ졣¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ª·¢ÕßÍÆ²âµÂ¹úÖ´·¨²¿·ÖΪĻºóºÚÊÖ£¬£¬£¬£¬£¬ÒòÍøÂçÃæ°åÔÚÖÐÖ¹Ç°ÔøÓе¹úIPµØµãµÇ¼¼Í¼¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¸ÃÐж¯µÄTorÑó´ÐÍøÕ¾Ò²ÒÑÀëÏߣ¬£¬£¬£¬£¬µ«Î´ÏÔʾ¾¯·½²é·âºá·ù£¬£¬£¬£¬£¬ÏêϸĻºóʹÓÃÕßÈÔ´ýÈ·ÈÏ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹¿ÉÄÜÓë"ÖÕ¾ÖÐж¯"£¨Operation Endgame£©Óйء£¡£¡£¡£¡£¡£¡£¸ÃÖ´·¨Ðж¯×ÔÆô¶¯ÒÔÀ´£¬£¬£¬£¬£¬ÒѶԶà¸ö¶ñÒâÈí¼þ»ù´¡ÉèÊ©Ôì³ÉÆÆË𡣡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/
6. Ó¢¹ú¹úÃñÒ½ÁÆÐ§ÀÍϵͳNHS UKÔâClopÀÕË÷¹¥»÷
11ÔÂ11ÈÕ£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯ClopÔÚÆä°µÍøÍøÕ¾Ðû³Æ¶ÔÓ¢¹ú¹ú¼ÒÒ½ÁÆÐ§ÀÍϵͳ£¨NHS UK£©Êý¾Ýй¶ÈÏÕæ£¬£¬£¬£¬£¬Ö¸ÔðÆä¡°Ä®ÊÓ¿Í»§Çå¾²¡±¡£¡£¡£¡£¡£¡£¡£¸Ã×é֯ʹÓÃOracle E-Business Suite£¨EBS£©ÖеÄCVE-2025-61882Îó²î£¨CVSSÆÀ·Ö9.8£©ÊµÑé¹¥»÷£¬£¬£¬£¬£¬¸ÃÎó²îÓÚ2025Äê10ÔÂ4ÈÕÓÉOracleÐû²¼½ôÆÈ²¹¶¡ÐÞ¸´£¬£¬£¬£¬£¬µ«Ê¹ÓÃÐÐΪÔçÓÚ²¹¶¡Ðû²¼£¬£¬£¬£¬£¬×Ô2025Äê8ÔÂÆð£¬£¬£¬£¬£¬¹¥»÷Õß±ãÕë¶ÔEBS 12.2.3ÖÁ12.2.14°æ±¾ÖеÄBI PublisherÄ£¿£¿£¿£¿£¿éÌᳫ¹¥»÷£¬£¬£¬£¬£¬Í¨¹ýδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì»á¼ûÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£Îó²îÈö²¥Òò2025Äê10ÔÂ3ÈÕScattered Lapsus$ Huntersй¶¿´·¨ÑéÖ¤´úÂë¶ø¼ÓËÙ£¬£¬£¬£¬£¬´ÙʹCl0p¡¢FIN11µÈÍþвÐÐΪÕßÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£¡£¡£¡£½¨ÒéÊÜÓ°Ïì×éÖ¯Á¬Ã¦×°ÖÃ2025Äê10Ô²¹¶¡£¬£¬£¬£¬£¬×·ËÝÖÁ8ÔµÄȡ֤Éó²é£¬£¬£¬£¬£¬²¢¼à¿Ø¿ÉÒÉIP¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²¨¼°¹þ·ð´óѧ¡¢ÃÀ¹úº½¿Õ×Ó¹«Ë¾EnvoyµÈ»ú¹¹£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸ÒÀÀµEBS¾ÙÐвÆÎñ¡¢ÈËÁ¦×ÊÔ´¼°¹©Ó¦Á´ÖÎÀíµÄÆóÒµ¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/


¾©¹«Íø°²±¸11010802024551ºÅ