GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷

Ðû²¼Ê±¼ä 2025-11-13

1. GlobalLogicÔâOracle EBSÁãÈÕÎó²î¹¥»÷


11ÔÂ11ÈÕ£¬£¬£¬£¬£¬ÈÕÁ¢ÆìÏÂÊý×Ö¹¤³ÌЧÀÍÉÌGlobalLogic¿ËÈÕÅû¶£¬£¬£¬£¬£¬ÆäOracle E-Business Suite£¨EBS£©Æ½Ì¨ÒòÁãÈÕÎó²îCVE-2025-61882ÔâÓöÊý¾Ýй¶£¬£¬£¬£¬£¬Ó°Ïì10,471ÃûÏÖÈμ°Ç°ÈÎÔ±¹¤ ¡£¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚ¼ÓÖÝÊ¥¿ËÀ­À­£¬£¬£¬£¬£¬ÓªÒµÁýÕÖÈ«Çò59¸ö¹¤³ÌÖÐÐÄ ¡£¡£¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎ¥¹æÍ¨Öª£¬£¬£¬£¬£¬¹¥»÷Õß×îÔçÓÚ2025Äê7ÔÂ10Èջ£¬£¬£¬£¬£¬8ÔÂ20ÈÕÍê³ÉÊý¾ÝÇÔÈ ¡£¡£¡£¬£¬£¬£¬£¬10ÔÂ9ÈÕ»á¼ûÊý¾Ý¿âʵÑé͵ÇÔ£¬£¬£¬£¬£¬Éæ¼°ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢½ôÆÈÁªÏµÈË¡¢µç×ÓÓÊÏä¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢»¤ÕÕ/Éí·ÝÖ¤ºÅ¡¢ÈËΪ¼°ÒøÐÐÕË»§µÈÃô¸ÐÄÚÈÝ ¡£¡£¡£GlobalLogicÇ¿µ÷£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½ö²¨¼°Oracleƽ̨£¬£¬£¬£¬£¬Î´Ó°ÏìÆäËûϵͳ£¬£¬£¬£¬£¬²¢Ö¸³öÆäÊÇÖÚ¶àÊÜOracleÎó²îÓ°ÏìµÄ¿Í»§Ö®Ò» ¡£¡£¡£Ö»¹ÜδÃ÷È·¹é×ïÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬£¬£¬µ«ÊÂÎñϸ½ÚÓëClopÀÕË÷Èí¼þÍÅ»ï×Ô8ÔÂÒÔÀ´µÄ¹¥»÷ģʽ¸ß¶ÈÎǺϡª¡ª¸Ã×é֯ʹÓÃͳһÎó²î´Ó¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬²¢Í¨¹ýTorÐ¹Â¶ÍøÕ¾Ðû²¼Êܺ¦ÕßÐÅÏ¢ ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬GlobalLogicδ·ºÆðÔÚClopµÄй¶Ãûµ¥ÖУ¬£¬£¬£¬£¬¿ÉÄÜ´¦ÓÚ̸ÅлòÒÑÖ§¸¶Êê½ð½×¶Î ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/globallogic-warns-10-000-employees-of-data-theft-after-oracle-breach/


2. ºº±¤Î¢Ëõ¾°¹Û¹ÝÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÐÅÓÿ¨Êý¾ÝÔâй¶


11ÔÂ11ÈÕ£¬£¬£¬£¬£¬ºº±¤Î¢Ëõ¾°¹Û¹ÝÊǵ¹ú±±²¿ÈÈÃÅÂÃÓÎʤµØ¼°È«Çò×î´óÌúµÀÄ£×ÓÕ¹Çø£¬£¬£¬£¬£¬¿ËÈÕÏòÓοÍת´ïÒ»ÆðÑÏÖØÊý¾ÝÇå¾²ÊÂÎñ ¡£¡£¡£¾­ÊӲ죬£¬£¬£¬£¬6ÔÂ6ÈÕÖÁ10ÔÂ29ÈÕʱ´ú£¬£¬£¬£¬£¬Í¨¹ýÏßÉÏÇþµÀʹÓÃÐÅÓÿ¨¹ºÆ±µÄÓοÍÐÅÏ¢¿ÉÄܱ»Î´ÊÚȨµÚÈý·½»ñÈ ¡£¡£¡£¬£¬£¬£¬£¬Éæ¼°³Ö¿¨ÈËÐÕÃû¡¢¿¨ºÅ¡¢ÑéÖ¤Âë¼°ÓÐÓÃÆÚµÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£Ô¤¼Æ´ïÊýǧÖÁÊýÊ®ÍòÈË ¡£¡£¡£¸Ã³¡¹ÝÔÚÓʼþÖÐÃ÷È·£¬£¬£¬£¬£¬ÏßÉϹºÆ±Ò³Ãæ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬µ¼ÖÂÐÅÓÿ¨Êý¾Ý²»µ«´«ÊäÖÁÖ§¸¶Ð§ÀÍÉÌ£¬£¬£¬£¬£¬»¹Á÷ÏòÁËÁíһ̨×ÔÁ¦Ð§ÀÍÆ÷£¬£¬£¬£¬£¬Ð¹Â¶Ê±³¤¿¿½üÎå¸öÔ ¡£¡£¡£×÷ΪÄê½Ó´ý³¬150ÍòÈ˴εÄÈÈÞ°µã£¬£¬£¬£¬£¬Ö»¹Ü²¢·ÇËùÓÐÓο;ùͨ¹ýÏßÉϹºÆ±£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÈÔ¿ÉÄÜÒý·¢´ó¹æÄ£¹¤ÒµËðʧ»òÉí·ÝðÓÃΣº¦ ¡£¡£¡£³¡¹Ý·½ÃæÌåÏÖ£¬£¬£¬£¬£¬ÊÂÎñ·¢Ã÷ºóÒÑÁ¬Ã¦¸ôÀëÊÜÓ°ÏìЧÀÍÆ÷£¬£¬£¬£¬£¬µ«Ïêϸй¶¹æÄ£¼°¹¥»÷ÕßÉí·ÝÈÔ´ý½øÒ»³ÌÐò²é ¡£¡£¡£³¡¹ÝÔÚ֪ͨÖÐÇ¿µ÷£¬£¬£¬£¬£¬ÎÞ·¨Íêȫɨ³ýÊý¾Ý±»ÀÄÓõĿÉÄÜÐÔ£¬£¬£¬£¬£¬½¨ÒéÊÜÓ°ÏìÓοÍÇ×½ü¹Ø×¢ÐÅÓÿ¨ÉúÒâ¼Í¼£¬£¬£¬£¬£¬ÊµÊ±ÁªÏµÒøÐж³½áÕË»§»òÌæ»»¿¨Æ¬ ¡£¡£¡£


https://cybernews.com/security/miniatur-wunderland-museum-cyberattack/


3. SIAD GroupÔâEverest GroupÀÕË÷¹¥»÷


11ÔÂ11ÈÕ£¬£¬£¬£¬£¬¶íÂÞ˹¹ØÁªµÄÀÕË÷Èí¼þÍÅ»ïEverest Group¿ËÈÕÔÚ°µÍøÐ¹Â¶Õ¾µãÐû³Æ£¬£¬£¬£¬£¬ÒÑ´ÓÒâ´óÀû×î´ó¹¤ÒµÆøÌåÉú²úÉÌÖ®Ò»SIAD GroupÇÔÈ¡159GBÊý¾Ý£¬£¬£¬£¬£¬²¢Æô¶¯8Ììµ¹¼ÆÊ±Íþв¹ûÕæÐ¹Â¶ ¡£¡£¡£SIAD Group½¨ÉèÓÚ1927Ä꣬£¬£¬£¬£¬×ܲ¿Î»ÓÚ±´¼ÓĪ£¬£¬£¬£¬£¬2024ÄêÓªÒµ¶î³¬11ÒÚÅ·Ôª£¬£¬£¬£¬£¬ÓªÒµº­¸ÇʳÎï¡¢Ò½ÁÆ¡¢Æû³µ¡¢Ò±½ðµÈÐÐÒµµÄ¹¤ÒµÆøÌåÉú²úÓë·ÖÏú£¬£¬£¬£¬£¬Í¬Ê±Éæ¼°Òº»¯Ê¯ÓÍÆø¡¢×ÔÈ»Æø¹©Ó¦¡¢ÆøÌå´¦Öóͷ£×°±¸Ñз¢¼°Ò½ÁƱ£½¡Ð§ÀÍ ¡£¡£¡£¸ÃÍÅ»ïÒªÇóSIAD GroupÔÚµ¹¼ÆÊ±¿¢ÊÂǰÁªÏµÖ§¸¶Êê½ð£¬£¬£¬£¬£¬²»È»½«¹ûÕæ±»µÁÊý¾Ý ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬°µÍøÕ¾µãÉÐδÐû²¼Êý¾ÝÑù±¾£¬£¬£¬£¬£¬ÏêϸÊÜÓ°Ïìϵͳ¼°Êý¾ÝÄÚÈÝÈÔ²»Ã÷È· ¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬ÈôÎ÷Ñǵ¼¯ÍÅÉú²úÔËÓªÒò¹¥»÷ÖÐÖ¹£¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÅ·ÃËÖÆÔìÒµ¡¢Ò½ÁƺÍÄÜÔ´ÐÐÒµµÄºÄ²Ä¹©Ó¦£¬£¬£¬£¬£¬Òý·¢Á¬Ëø·´Ó¦ ¡£¡£¡£Everest Group×Ô2021Äê7Ô»îÔ¾ÒÔÀ´£¬£¬£¬£¬£¬ÒÑ·¢¶¯¶àÆðÆÆËðÐÔ¹¥»÷ ¡£¡£¡£´Ë´ÎÕë¶ÔSIAD GroupµÄ¹¥»÷£¬£¬£¬£¬£¬ÊǸÃÍÅ»ïÒ»Á¬Õë¶ÔÒªº¦»ù´¡ÉèÊ©ºÍ´óÐÍÆóÒµµÄ×îа¸Àý ¡£¡£¡£


https://cybernews.com/security/siad-group-ransomware-attack/


4. DanaBot¶ñÒâÈí¼þа汾669½ÓÄÉTorÓòÃûÖØÐÞC2»ù´¡ÉèÊ©


11ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÔÚÖ´·¨²¿·Ö5ÔÂÌᳫ¡°ÖÕ¾ÖÐж¯¡±ÆÆËðDanaBot¶ñÒâÈí¼þ»ù´¡ÉèÊ©Áù¸öԺ󣬣¬£¬£¬£¬¸ÃÒøÐÐľÂíÒÔа汾669Ç¿ÊÆ»Ø¹é£¬£¬£¬£¬£¬²¢ÖØÐÞÁËÏÂÁîÓë¿ØÖÆ£¨C2£©»ù´¡ÉèÊ© ¡£¡£¡£¾ÝZscaler ThreatLabzÇå¾²Ñо¿Ö°Ô±Åû¶£¬£¬£¬£¬£¬DanaBotбäÖÖʹÓÃTorÓòÃû£¨.onion£©ºÍ¡°·´ÏòÅþÁ¬¡±½Úµã¹¹½¨Òþ²ØÍ¨Ñ¶ÍøÂ磬£¬£¬£¬£¬Í¬Ê±Ê¶±ð³öÍþвÐÐΪÕßÓÃÓÚÎüÊÕ±»µÁ×ʽðµÄBTC¡¢ETH¡¢LTC¡¢TRXµÈ¶à¸ö¼ÓÃÜÇ®±ÒµØµã ¡£¡£¡£DanaBot×î³õÓÉProofpointÑо¿Ö°Ô±Åû¶£¬£¬£¬£¬£¬ÊÇÒ»ÖÖ»ùÓÚDelphiµÄÒøÐÐľÂí£¬£¬£¬£¬£¬Í¨¹ýµç×ÓÓʼþºÍ¶ñÒâ¹ã¸æÈö²¥£¬£¬£¬£¬£¬½ÓÄɶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ä£Ê½ÔËÓª£¬£¬£¬£¬£¬ÒÔ¶©ÔÄ·ÑÐÎʽ³ö×â¸øÍøÂç·¸·¨·Ö×Ó ¡£¡£¡£ÔÚ¶àÄêÑݱäÖУ¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒÑÉú³¤ÎªÄ£¿£¿£¿é»¯ÐÅÏ¢ÇÔÈ¡Æ÷ºÍ¼ÓÔØÆ÷£¬£¬£¬£¬£¬×¨ÃÅÇÔÈ¡ÍøÂçä¯ÀÀÆ÷´æ´¢µÄƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬£¬²¢Ôø¶à´Î¼ÓÈë´ó¹æÄ£¹¥»÷»î¶¯£¬£¬£¬£¬£¬×Ô2021ÄêÆðÒ»Á¬¶Ô»¥ÁªÍøÓû§×é³ÉÍþв ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/danabot-malware-is-back-to-infecting-windows-after-6-month-break/


5. ºÚ¿ÍʹÓÃCitrixºÍCisco ISEµÄÎó²îÌᳫÁãÈÕ¹¥»÷


11ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÑÇÂíÑ·ÍþвÇ鱨ÍŶÓ̫ͨ¹ýÎö"MadPot"ÃÛ¹ÞÊý¾Ý·¢Ã÷£¬£¬£¬£¬£¬¸ß¼¶ÍþвÐÐΪÕßÔÚCitrix Bleed 2£¨CVE-2025-5777£©ºÍCisco ISE£¨CVE-2025-20337£©Îó²î¹ûÕæÅû¶ǰÒѽ«Æä×÷ΪÁãÈÕÎó²îʹÓà ¡£¡£¡£ÕâÁ½¸öÑÏÖØÎó²î»®·Ö±£´æÓÚNetScaler ADC/GatewayµÄÔ½½çÄÚ´æ¶ÁÈ¡»úÖÆºÍCisco ISEµÄ·´ÐòÁл¯Âß¼­ÖУ¬£¬£¬£¬£¬Ç°ÕßÓÚ6ÔÂÏÂÑ®Ðû²¼ÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬µ«Îó²îʹÓóÌÐò7Ô³õ¼´·ºÆð²¢±»CISA±ê¼ÇΪÒÑʹÓã» £»£» £»ºóÕß7ÔÂ17ÈÕÐû²¼ºó½öÎåÌì¼´±»Ö¤ÊµÔâÆð¾¢Ê¹Óà ¡£¡£¡£¹¥»÷ÕßʹÓÃCVE-2025-20337»ñÈ¡Cisco ISEÔ¤ÈÏÖ¤ÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬°²ÅÅÃûΪ"IdentityAuditAction"µÄ×Ô½ç˵Web Shell ¡£¡£¡£¸Ã¶ñÒâ×é¼þαװ³ÉÕýµ±ISE×é¼þ£¬£¬£¬£¬£¬×¢²áΪHTTP¼àÌýÆ÷×èµ²ËùÓÐÇëÇ󣬣¬£¬£¬£¬Í¨¹ýJava·´Éä×¢ÈëTomcatỊ̈߳¬£¬£¬£¬£¬²¢½ÓÄÉDES¼ÓÃܺͷDZê×¼base64±àÂëÔöÇ¿Òþ²ØÐÔ£¬£¬£¬£¬£¬ÐèÌØ¶¨HTTP±êÍ·²Å»ª»á¼ûÇÒÏÕЩÎÞȡ֤ºÛ¼£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/


6. Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝÓû§Êý¾Ýй¶


11ÔÂ12ÈÕ£¬£¬£¬£¬£¬Ó¢¹úÀúÊ·Ó°Ïñµµ°¸¹ÝFrancis FrithÒòÒ»¸ö±»ÒÅÆúµÄElasticsearchÊý¾Ý¿â̻¶Áè¼Ý30ÍòÌõÓû§¼Í¼£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âÎÞÐèÈÏÖ¤¼´¿É»á¼û£¬£¬£¬£¬£¬ÓÉCybernewsÑо¿Ö°Ô±·¢Ã÷ ¡£¡£¡£½¨ÉèÓÚ1860ÄêµÄFrancis Frith¹«Ë¾×øÂäÓÚË÷¶û×Ȳ®À£¬£¬£¬£¬ÒÔÕ䲨1860ÖÁ1970Äê¼äÓ¢¹ú³ÇÕòÐæÂäÀúÊ·ÕÕÆ¬ÖøÃû£¬£¬£¬£¬£¬Ö÷ÒªÏúÊÛ³åÓ¡ÕÕÆ¬¡¢Êé¼®¼°¸öÐÔ»¯Ó°ÏñÖÆÆ· ¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýй¶ÐÅÏ¢ÖÐÌá¼°µÄÓ¢¹úÒŲúÍøÕ¾francisfrith.comËø¶¨Ãü¾ÝÔ´£¬£¬£¬£¬£¬È·ÈÏÊôÓÚÈÏÕæ¸Ã¹«Ë¾²úÆ·ÖÆÔìµÄHeritage Resource Management Ltd¿Í»§ ¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨Óû§È«Ãû¡¢ÓÊÏ䵨µã¼°²¿·ÖʵÌåסַ£¬£¬£¬£¬£¬Éæ¼°½ü4.4ÍòÌõ¿Í»§×Éѯ¼Í¼£¬£¬£¬£¬£¬Ê±¼ä¿ç¶È´Ó2006ÄêÖÁ½ü¶þÊ®Äê ¡£¡£¡£Ö»¹ÜÎ´Éæ¼°½ðÈÚÕË»§»òÃÜÂ룬£¬£¬£¬£¬µ«Ð¹Â¶Êý¾ÝÈÔ×é³ÉÖØ´óÒþ˽Íþв£¬£¬£¬£¬£¬ÓÈÆä¶ÔÔÚ˽ÐÅÖÐ͸¶¼ÒͥסַµÄÓû§Ó°ÏìÓúÉõ ¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±ÖÒÑÔ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅϢð³äFrancis FrithÆ·ÅÆÊµÑé¾«×¼ÍøÂç´¹ÂÚ ¡£¡£¡£


https://cybernews.com/security/francis-frith-data-leak-2025/