Space BearsÀÕË÷×éÖ¯½èQuasarÎó²îÇÔÈ¡ComcastÊý¾Ý

Ðû²¼Ê±¼ä 2025-12-10

1. Space BearsÀÕË÷×éÖ¯½èQuasarÎó²îÇÔÈ¡ComcastÊý¾Ý


12ÔÂ8ÈÕ £¬£¬£¬£¬£¬ £¬Space BearsÀÕË÷Èí¼þ×éÖ¯¿ËÈÕÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû³Æ £¬£¬£¬£¬£¬ £¬Í¨¹ý×ôÖÎÑÇÖݵçÐŹ¤³Ì³Ð°üÉÌQuasar Inc.µÄÎó²î»ñÈ¡ÁËComcastÄÚ²¿×ÊÁÏ £¬£¬£¬£¬£¬ £¬²¢Í¬²½½«QuasarÁÐΪ×ÔÁ¦Êܺ¦Õß £¬£¬£¬£¬£¬ £¬ÌåÏÖÁ½Æð¹ØÁªÊÂÎñ¡£¡£¡£¸Ã×éÖ¯2024Äê4Ô·ºÆð £¬£¬£¬£¬£¬ £¬±»ÆÊÎöΪÊý¾ÝÇÔÈ¡ÐÍÀÕË÷ÕûÌå £¬£¬£¬£¬£¬ £¬³£Í¨¹ýɾ³ýÃô¸ÐÎļþ²¢Ë÷ÒªÊê½ð×èÖ¹Ðû²¼ £¬£¬£¬£¬£¬ £¬ÓëPhobosÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©³ÌÐò±£´æ¹ØÁª £¬£¬£¬£¬£¬ £¬ÆäйÃÜÍøÕ¾±»ÊÓΪÏà¹Ø»î¶¯¹²ÏíÐû²¼µã¡£¡£¡£Õë¶ÔComcastµÄÖ¸¿ØÖÐ £¬£¬£¬£¬£¬ £¬Space BearsÉù³ÆQuasarΪComcast¼°GenesisÏîÄ¿ÖÆ×÷ÊÖÒÕÎĵµ £¬£¬£¬£¬£¬ £¬´Ó¶ø»ñÈ¡°üÀ¨¶àµØ¶¼»áÉè¼ÆÎĵµºÍ¹«ÓÃÉèÊ©ÍýÏëͼµÄÐÅÏ¢ £¬£¬£¬£¬£¬ £¬²¢É趨6Ììµ¹¼ÆÊ± £¬£¬£¬£¬£¬ £¬ÓâÆÚ½«¹ûÕæÊý¾Ý £¬£¬£¬£¬£¬ £¬Ê±´úÌṩÊý¾ÝÊÛÂôЧÀÍ¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬ £¬¸Ã×é֯δÌṩÎļþÑù±¾ £¬£¬£¬£¬£¬ £¬×ÔÁ¦ÑéÖ¤Ôݲ»¿ÉÐС£¡£¡£Quasar Inc.ÓÚ2025Äê12ÔÂ4ÈÕ±»µ¥¶ÀÁÐΪÊܺ¦Õß £¬£¬£¬£¬£¬ £¬Space BearsÐû³Æ»ñÈ¡ÆäÍøÂçÏîÄ¿¡¢¶¼»áÍýÏëͼ¡¢Í¨Ñ¶½á¹¹µÈÄÚ²¿Îĵµ £¬£¬£¬£¬£¬ £¬²¢¿ªÆôËÄÌìµ¹¼ÆÊ±ÊÛÂôÊý¾Ý¡£¡£¡£


https://hackread.com/space-bears-ransomware-comcast-quasar-breach/


2. WordPress²å¼þ¸ßΣÎó²îÔâ´ó¹æÄ£Ê¹ÓÃ


12ÔÂ8ÈÕ £¬£¬£¬£¬£¬ £¬Wordfence¼à²âÏÔʾ £¬£¬£¬£¬£¬ £¬WordPressƽ̨µÄSneeit Framework²å¼þ±£´æ¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²îCVE-2025-6389£¨CVSSÆÀ·Ö9.8£© £¬£¬£¬£¬£¬ £¬Ó°Ïì8.3¼°ÒÔϰ汾 £¬£¬£¬£¬£¬ £¬ÒÑͨ¹ý2025Äê8ÔÂ5ÈÕÐû²¼µÄ8.4°æ±¾ÐÞ¸´¡£¡£¡£¸Ã²å¼þ»îÔ¾×°ÖÃÁ¿³¬1700¸ö £¬£¬£¬£¬£¬ £¬Îó²îÔ´ÓÚº¯ÊýδÑéÖ¤Óû§ÊäÈëÖ±½ÓÖ´ÐдúÂë £¬£¬£¬£¬£¬ £¬¹¥»÷Õ߿ɽè´Ë½¨Éè¶ñÒâÖÎÀíÔ±ÕË»§¡¢Ö²ÈëºóÃÅ £¬£¬£¬£¬£¬ £¬»òÖØ¶¨Ïò·Ã¿ÍÖÁ´¹ÂÚ/¶ñÒâÕ¾µã¡£¡£¡£×Ô11ÔÂ24ÈÕÎó²î¹ûÕæºó £¬£¬£¬£¬£¬ £¬WordfenceÒÑ×èµ²³¬13.1Íò´Î¹¥»÷ £¬£¬£¬£¬£¬ £¬24СʱÄÚ¼´¼Í¼15381´Î¡£¡£¡£¹¥»÷Õßͨ¹ý¡°/wp-admin/admin-ajax.php¡±¶Ëµã·¢ËÍÌØÖÆÇëÇó £¬£¬£¬£¬£¬ £¬½¨Éè¡°arudikadis¡±µÈ¶ñÒâÕË»§ £¬£¬£¬£¬£¬ £¬ÉÏ´«¡°tijtewmg.php¡±µÈ¾ß±¸Ä¿Â¼É¨Ãè¡¢Îļþ²Ù×÷¹¦Ð§µÄ¶ñÒâÎļþ £¬£¬£¬£¬£¬ £¬²¢´ÓÍⲿЧÀÍÆ÷ÏÂÔØ¡°.htaccess¡±ÎļþÈÆ¹ý»á¼ûÏÞÖÆ¡£¡£¡£Í¬Ê± £¬£¬£¬£¬£¬ £¬VulnCheck¼à²âµ½¹¥»÷ÕßʹÓÃICTBroadcastÎó²îCVE-2025-2611£¨CVSSÆÀ·Ö9.3£© £¬£¬£¬£¬£¬ £¬Í¨¹ýÏÂÔØShell¾ç±¾¼ÓÔØÆ÷Èö²¥Frost DDoS½©Ê¬ÍøÂç¡£¡£¡£


https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html


3. ´¹ÂÚ¹¤¾ß°üGhostFrameÏòÈ«ÇòÊý°ÙÍòÓû§Ìᳫ¹¥»÷


12ÔÂ8ÈÕ £¬£¬£¬£¬£¬ £¬BarracudaÇå¾²Ñо¿Ô±ÓÚ2025Äê9ÔÂÊ״η¢Ã÷ÃûΪGhostFrameµÄÐÂÐ͸ßÖØÆ¯ºó´¹ÂÚ¹¤¾ß°ü £¬£¬£¬£¬£¬ £¬¸Ã¹¤¾ßÒÑÌᳫ³¬100Íò´Î¹¥»÷ £¬£¬£¬£¬£¬ £¬±ê¼Ç×Å´¹ÂÚ¼´Ð§ÀÍ£¨PaaS£©ÊÖÒÕµÄΣÏÕÉý¼¶¡£¡£¡£Æä½¹µãÍþвÔÚÓÚ½«¶ñÒâ²Ù×÷ÒþÄäÓÚÒþÐÎiframe¿ò¼ÜÖÐ £¬£¬£¬£¬£¬ £¬Í¨¹ýÌìÉú¿´ËÆÎÞº¦µÄHTMLÎļþ £¬£¬£¬£¬£¬ £¬ÔÚÒ³Ãæµ×²ã¼ÓÔØÀ´×Ô¶¯Ì¬×ÓÓòÃûµÄÕæÊµ´¹ÂÚÄÚÈÝ £¬£¬£¬£¬£¬ £¬Ê¹Çå¾²¹¤¾ßÄÑÒÔ¼ì²â¡£¡£¡£¹¥»÷Á÷³Ì·ÖΪÁ½½×¶Î£ºÊ×ÏÈͨ¹ýαװ³É¡°±£ÃÜÌõÔ¼¡±¡°ÃÜÂëÖØÖá±µÈÖ÷ÌâµÄ´¹ÂÚÓʼþÓÕµ¼Óû§µã»÷£»£»£»ËæºóÓû§½øÈë¿´ËÆÇå¾²µÄÍøÒ³ £¬£¬£¬£¬£¬ £¬µ×²ãiframe´Óʵʱ±ä»»µÄ×ÓÓòÃû¼ÓÔØ¹¥»÷ÄÚÈÝ¡£¡£¡£Îª¹æ±Ü¼ì²â £¬£¬£¬£¬£¬ £¬¹¥»÷ÕßΪÿ¸öÄ¿µÄµ¥¶À½¨ÉèרÊô×ÓÓòÃû £¬£¬£¬£¬£¬ £¬²¢ÄÚÖ÷´ÆÊÎö¹¦Ð§ £¬£¬£¬£¬£¬ £¬Èç½ûÓÃÓÒ¼ü²Ëµ¥¡¢ÆÁÕÏ¿ì½Ý¼ü¼°¹Ø±Õ¿ª·¢Õß¹¤¾ß £¬£¬£¬£¬£¬ £¬×è°­Çå¾²ºË²é¡£¡£¡£GhostFrame´îÔØ¶àÏî¸ßÒþ²ØÌØÕ÷£º´¹ÂÚ±íµ¥Òþ²ØÔÚ´óÎļþͼÏñÁ÷ÖÐÈÆ¹ý¹Å°åɨÃ裻£»£»×ÓÓòÃû¶¯Ì¬ÂÖ»»ÅäºÏ±¸ÓÃiframe¿ò¼Ü £¬£¬£¬£¬£¬ £¬Ó¦¶ÔJavaScript×èµ²£»£»£»Ö§³Ö¶àÄ¿µÄÎÞаÊÊÅä £¬£¬£¬£¬£¬ £¬ÎÞÐèÐÞ¸ÄÖ÷Ò³Ãæ¼´¿ÉÌæ»»´¹ÂÚÄÚÈÝ£»£»£»Í¨¹ýÐÞ¸ÄÒ³ÃæÎÊÌâºÍͼ±ê·ÂðÕýµ±Ð§ÀÍ £¬£¬£¬£¬£¬ £¬ÔöÇ¿Î±×°ÕæÊµÐÔ¡£¡£¡£


https://cybersecuritynews.com/new-ghostframe-super-stealthy-phishing-kit-attacks-millions-of-users-worldwide/


4. ºÚ¿ÍʹÓÃReact2ShellÎó²îÌᳫEtherRAT¶ñÒâÈí¼þ¹¥»÷


12ÔÂ9ÈÕ £¬£¬£¬£¬£¬ £¬ÔÆÇå¾²¹«Ë¾SysdigÅû¶ÁËÒ»ÖÖÃûΪEtherRATµÄÐÂÐͶñÒâÈí¼þ £¬£¬£¬£¬£¬ £¬Æäͨ¹ýʹÓÃReact/Next.js¿ò¼ÜÖеĸßΣÎó²îCVE-2025-55182£¨React2Shell£©ÊµÑé¹¥»÷¡£¡£¡£¸ÃÎó²îÔ´ÓÚReact Server ComponentsµÄ¡°Flight¡±Ð­Òé·´ÐòÁл¯È±ÏÝ £¬£¬£¬£¬£¬ £¬ÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâHTTPÇëÇóÖ´ÐÐÔ¶³Ì´úÂë £¬£¬£¬£¬£¬ £¬Ó°Ïì´ó×ÚÔÆÇéÐΡ£¡£¡£SysdigÑо¿Ö°Ô±Ö¸³ö £¬£¬£¬£¬£¬ £¬EtherRATÓ볯ÏÊ¡°Ñ¬È¾ÐÔ·Ã̸¡±»î¶¯Ê¹ÓõŤ¾ß±£´æ¹ØÁªÐÔ £¬£¬£¬£¬£¬ £¬µ«¾ß±¸ÆæÒìÊÖÒÕÌØÕ÷¡£¡£¡£EtherRAT½ÓÄɶà½×¶Î¹¥»÷Á´£ºÊ×ÏÈͨ¹ýReact2ShellÎó²îÔÚÄ¿µÄϵͳִÐÐBase64±àÂëµÄshellÏÂÁî £¬£¬£¬£¬£¬ £¬ÏÂÔØ²¢ÔËÐжñÒâ¾ç±¾s.sh¡£¡£¡£¸Ã¾ç±¾»á½¨ÉèÒþ²ØÄ¿Â¼ £¬£¬£¬£¬£¬ £¬°²ÅÅÕýµ±Node.jsÔËÐÐʱ¼°¼ÓÃÜÓÐÓÃÔØºÉ £¬£¬£¬£¬£¬ £¬×îÖÕ½âÃܳöEtherRATÖ²Èë³ÌÐò¡£¡£¡£Æä½¹µãÁ¢ÒìÔÚÓÚ»ùÓÚÒÔÌ«·»ÖÇÄܺÏÔ¼µÄC2ͨѶ»úÖÆ £¬£¬£¬£¬£¬ £¬Í¨¹ýÅÌÎÊ9¸ö¹«¹²ÒÔÌ«·»RPC½Úµã²¢½ÓÄÉ´ó¶¼ÏìÓ¦Õ½ÂÔµÖÓùµ¥µã¹ÊÕÏ £¬£¬£¬£¬£¬ £¬ÊµÏÖÎÞаÇÒ¿¹×ÌÈŵÄÖ¸Áî´«Êä¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-react2shell-flaw-in-etherrat-malware-attacks/


5. ÐÂÐÍMirai±äÖÖʹÓú£ÊÂDVRÎó²îʵÑéÖØ´ó¹¥»÷


12ÔÂ9ÈÕ £¬£¬£¬£¬£¬ £¬CydomeÑо¿Ö°Ô±·¢Ã÷ÃûΪBroadsideµÄÐÂÐÍMirai½©Ê¬ÍøÂç±äÖÖ £¬£¬£¬£¬£¬ £¬¸Ã±äÖÖÕë¶Ôº£ÊÂÎïÊ¢ÐÐÒµ £¬£¬£¬£¬£¬ £¬Ê¹Óô¬²°¼°×°±¸Ê¹ÓõÄTBK DVR×°±¸ÖеÄÏÂÁî×¢ÈëÎó²îCVE-2024-3721Ìᳫ¹¥»÷¡£¡£¡£¸ÃÎó²îÓÚ2024Äê4ÔÂÅû¶²¢¸½´øPoC´úÂë £¬£¬£¬£¬£¬ £¬ÖÁ2025ÄêÖÐÒѱ»¶à¸öDDoS½©Ê¬ÍøÂçÆÕ±éʹÓᣡ£¡£Mirai½©Ê¬ÍøÂçÔ´´úÂëÔÚ½üÊ®Äêǰ¹ûÕæºó £¬£¬£¬£¬£¬ £¬Ò»Á¬±»ÍøÂç·¸·¨·Ö×ÓÐÞ¸ÄÖØÓÃÒÔÇý¶¯´ó¹æÄ£¹¥»÷¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷ £¬£¬£¬£¬£¬ £¬TBK DVRÎó²îͬÑùÓ°ÏìÒÔCeNova¡¢Night Owl¡¢QSeeµÈÆ·ÅÆÖØÐ°ü×°µÄÐͺŠ£¬£¬£¬£¬£¬ £¬¶Ôº½Ô˹«Ë¾×é³ÉÑÏÖØÍþв¡£¡£¡£ÈëÇÖ×°±¸¿ÉÄÜʹ¹¥»÷Õß»á¼û¼ÝÊ»ÊÒ¡¢»õ²Õ»ò»ú²ÕµÄCCTV»­Ãæ £¬£¬£¬£¬£¬ £¬×ÌÈÅÎÀÐÇͨѶ £¬£¬£¬£¬£¬ £¬»òºáÏòÒÆ¶¯ÖÁ´¬²°Òªº¦ÔËÓªÊÖÒÕϵͳ¡£¡£¡£±¨¸æÖ¸³ö £¬£¬£¬£¬£¬ £¬Broadside²»µ«ÏÞÓÚDDoS¹¥»÷ £¬£¬£¬£¬£¬ £¬Æä×Ô¶¯ÇÔȡϵͳƾ֤ÎļþµÄÐÐΪÅú×¢ £¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÒâͼ½«ÊÜѬȾװ±¸´Ó¼òÆÓ½©Ê¬ÍøÂç½Úµãת±äΪսÂÔפ×ãµã¡£¡£¡£


https://securityaffairs.com/185491/malware/broadside-botnet-hits-tbk-dvrs-raising-alarms-for-maritime-logistics.html


6. Vitas HealthcareÔâÍøÂç¹¥»÷Ö³¬30ÍòÈËÐÅϢй¶


12ÔÂ9ÈÕ £¬£¬£¬£¬£¬ £¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©Ò½ÁƱ£½¡Êý¾Ýй¶׷×ÙÆ÷ÏÔʾ £¬£¬£¬£¬£¬ £¬ÃÀ¹ú×î´óÓªÀûÐÔÁÙÖÕ¾ì×¢Á¬Ëø»ú¹¹Vitas Healthcare½üÆÚ±¬·¢ÖØ´óÍøÂçÇå¾²ÊÂÎñ £¬£¬£¬£¬£¬ £¬Ó°ÏìÈËÊý´ï319,177ÈË¡£¡£¡£¸Ã»ú¹¹Á¥ÊôÓÚChemed¼¯ÍÅ £¬£¬£¬£¬£¬ £¬ÆìÏÂVitas Hospice ServicesÓÚ10ÔÂ24ÈÕ·¢Ã÷ϵͳÈëÇÖ £¬£¬£¬£¬£¬ £¬ÊÓ²ìÏÔʾ¹¥»÷Õßͨ¹ý±»µÁÓõũӦÉÌÕË»§ £¬£¬£¬£¬£¬ £¬ÔÚ9ÔÂ21ÈÕÖÁ10ÔÂ27ÈÕʱ´úÒ»Á¬»á¼ûÆäϵͳ £¬£¬£¬£¬£¬ £¬²¢ÏÂÔØÁË´ó×Ú»¼Õß¼°½üÇ×µÄÃô¸ÐÐÅÏ¢¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÆÕ±é £¬£¬£¬£¬£¬ £¬°üÀ¨»¼Õß¼°Ç°»¼ÕßµÄÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢ÒÔ¼°Ö§ÊôÁªÏµ·½·¨µÈ½¹µãСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδÃ÷È·´Ë´ÎÊÂÎñÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬ £¬ÇÒÎÞÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ £¬£¬£¬£¬£¬ £¬µ«ÊÂÎñµÄÑÏÖØÐÔÒÑÒý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬ £¬VitasÒÑͨ¹ýרÃÅÊý¾ÝÐ¹Â¶Í¨ÖªÍøÕ¾Ïò¹«ÖÚÅû¶ÊÂÎñÏêÇé £¬£¬£¬£¬£¬ £¬µ«ÏêϸÊÖÒÕϸ½Ú¼°ºóÐøµ÷½â²½·¥ÉÐδÍêÈ«¹ûÕæ¡£¡£¡£


https://www.securityweek.com/over-300000-individuals-impacted-by-vitas-hospice-data-breach/