ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß

Ðû²¼Ê±¼ä 2025-10-22

1. ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß


10ÔÂ20ÈÕ£¬£¬£¬Ò»ÖÖÃûΪGlassWormµÄ×ÔÎÒÈö²¥¶ñÒâÈí¼þÕýͨ¹ýOpenVSXºÍMicrosoft Visual StudioÊг¡Ìᳫ¹©Ó¦Á´¹¥»÷£¬£¬£¬ÒÑÔì³ÉÔ¼35,800´Î×°Ö㬣¬£¬³ÉΪÊ×ÀýÕë¶ÔVS CodeµÄÈä³æÊ½¹©Ó¦Á´¹¥»÷°¸Àý¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÒþÐÎUnicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬£¬£¬Í¨¹ýÇÔÈ¡µÄÕË»§ÐÅÏ¢Èö²¥ÖÁ¸ü¶à¿É»á¼ûµÄÀ©Õ¹³ÌÐò£¬£¬£¬²¢½ÓÄÉSolanaÇø¿éÁ´¾ÙÐп¹É¾³ýµÄÏÂÁî¿ØÖÆ£¬£¬£¬Í¬Ê±ÒÔGoogleÈÕÀú×÷Ϊ±¸ÓÃͨµÀ¡£¡£¡£¹¥»÷·¾¶ÏÔʾ£¬£¬£¬GlassWormÔÚ×°Öúó»áÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°49¸öÀ©Õ¹µÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬°²ÅÅSOCKSÊðÀí·ÓɶñÒâÁ÷Á¿£¬£¬£¬²¢×°ÖÃVNC¿Í»§¶ËʵÏÖÒþÐÎÔ¶³Ì»á¼û¡£¡£¡£Æä×îÖÕÓÐÓÃÔØºÉZOMBIͨ¹ýSolanaÇø¿éÁ´ÉúÒâÁ´½Ó·Ö·¢£¬£¬£¬½«ÊÜѬȾϵͳת»¯ÎªÍøÂç·¸·¨½Úµã¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃBitTorrent DHT¾ÙÐÐÊèÉ¢ÏÂÁî·Ö·¢£¬£¬£¬²¢Ö§³ÖÖ±½ÓÅþÁ¬IPµØµãµÄµÚÈý½»¸¶»úÖÆ¡£¡£¡£×èÖ¹±¨¸æÐû²¼£¬£¬£¬OpenVSXÉÏÖÁÉÙ11¸öÀ©Õ¹¼°VS CodeÊг¡1¸öÀ©Õ¹±»Ñ¬È¾¡£¡£¡£ÏÖÔÚ£¬£¬£¬OpenVSXÉÏÈÔÓÐÖÁÉÙ4¸öÊÜѬȾÀ©Õ¹¿ÉÏÂÔØ£¬£¬£¬Î¢ÈíÒÑÒÆ³ý¶ñÒâÀ©Õ¹£¬£¬£¬²¿·ÖÐû²¼ÕßÒѸüÐÂÐÞ¸´¡£¡£¡£


https://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/


2. ºÚ¿ÍÉù³ÆÍâÂôƽ̨GetirÊý¾Ýй¶


10ÔÂ20ÈÕ£¬£¬£¬ÍÁ¶úÆäÍâÂôƽ̨Getir¿ËÈÕÏÝÈëÊý¾Ýй¶ÕùÒé¡£¡£¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳Ðû²¼Ìû×Ó£¬£¬£¬Éù³ÆÒÑ¡°ÈëÇÖ¡±¸Ã¹«Ë¾ÄÚÍøÏµÍ³¡£¡£¡£¾Ý¹¥»÷ÕßÅû¶µÄÑù±¾Êý¾Ý£¬£¬£¬Ð¹Â¶ÄÚÈÝÖ÷ҪΪGetirÄÚ²¿Ó¦ÓóÌÐòÔªÊý¾Ý£¬£¬£¬°üÀ¨Bitbucket´æ´¢¿âURL¡¢Óû§È¨ÏÞ¡¢ÏîÄ¿Ãû³Æ¡¢ÊÂÇéÇøID¼°Ô±¹¤µç×ÓÓʼþµØµã¡£¡£¡£Ñо¿ÍŶӯÊÎöÒÔΪ£¬£¬£¬ÕâЩÊý¾Ý¸ü¿ÉÄÜͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉÌ»ñÈ¡£¬£¬£¬¶ø·ÇÖ±½Ó»á¼û¹«Ë¾½¹µãϵͳ¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬Ð¹Â¶µÄÔªÊý¾ÝÈÔ¿ÉÄÜ´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓÃÔ±¹¤µç×ÓÓʼþµØµãʵÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬ÓÕµ¼Ô±¹¤Ð¹Â¶Ãô¸ÐÐÅÏ¢»òµã»÷¶ñÒâÁ´½Ó£¬£¬£¬½ø¶ø»ñÈ¡¸üÉî²ãϵͳȨÏÞ£»£»£» £»£»£»£»Ì»Â¶µÄ´æ´¢¿âURLºÍÊÂÇéÇøIDÔò±ãÓÚ¹¥»÷ÕßÔÚÏîÄ¿ÖÐÕ÷²ÉδÊܱ£»£»£» £»£»£»£»¤µÄAPI¶Ëµã»òÉèÖÃÎó²î£¬£¬£¬ÎªºóÐø¹¥»÷£¨ÈçÔ´´úÂëÇÔÈ¡¡¢ÏµÍ³ÈëÇÖ£©´´Á¢Ìõ¼þ¡£¡£¡£ÏÖÔÚ£¬£¬£¬GetirÉÐδ¶ÔÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£¡£¡£


https://cybernews.com/security/getir-data-breach-claims/


3. VerisureÔâµÚÈý·½ÏàÖú·½Êý¾Ýй¶£¬£¬£¬Ó°ÏìÈðµä3.5ÍòÓû§


10ÔÂ20ÈÕ£¬£¬£¬ÈðµäÇå¾²¾ÞÍ·Verisure¿ËÈÕÅû¶һÆðÉæ¼°ÆìÏÂAlert Alarm²¿·Ö¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬¹¥»÷Õßͨ¹ýÆäÈðµäÍⲿ·¢Æ±ÏàÖúͬ°éµÄЧÀÍÆ÷£¬£¬£¬²»·¨»á¼ûÁËÓëAlert Alarm¿Í»§Ïà¹ØµÄÊý¾Ý¡£¡£¡£¾­³õ³ÌÐò²é£¬£¬£¬Verisure×ÔÉíÍøÂç¼°½¹µãϵͳδ·¢Ã÷ÈëÇÖºÛ¼££¬£¬£¬ÊÂÎñ½öÓ°ÏìµÚÈý·½¼Æ·Ñϵͳ£¬£¬£¬µ«ÒѲ¨¼°ÈðµäÔ¼3.5ÍòÃûAlert AlarmµÄÏÖÓм°Ç°Óû§¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¿Í»§È«Ãû¡¢µØµã¡¢µç×ÓÓʼþµØµã¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£VerisureÇ¿µ÷£¬£¬£¬Ö»¹ÜÊý¾Ý»á¼ûȨÏÞ¡°ÓÐÏÞ¡±£¬£¬£¬µ«ÒÑÆô¶¯ÖÜÈ«ÊӲ첢Ó뾯·½¡¢î¿Ïµ²¿·ÖÏàÖú£¬£¬£¬ºóÐø½«ÊµÊ±ÏòÊÜÓ°Ïì¿Í»§×ª´ïÏ£Íû¡£¡£¡£Alert Alarm×÷ΪVerisureÆìÏÂרעסլ¡¢¹«Ô¢¼°Ð¡ÐÍÆóÒµÇ徲ЧÀ͵IJ¿·Ö£¬£¬£¬ÔÚÈðµäÓµÓв»µ½6000Ãû¶©ÔÄÓû§£¬£¬£¬µ«´Ë´ÎÊÂÎñÏÖʵӰÏì¹æÄ£¸ü¹ã£¬£¬£¬Éæ¼°ÀúÊ·Óû§Êý¾Ý¡£¡£¡£ÏÖÔÚ£¬£¬£¬VerisureÕýÓëÇå¾²ÕÕÁÏÏàÖúÅŲéÎó²î£¬£¬£¬²¢ºôÓõ¿Í»§Ð¡ÐÄ´¹ÂÚ¹¥»÷¼°Éí·Ýڲƭ¡£¡£¡£


https://cybernews.com/security/verisure-data-breach/


4. AWSÈ«Çò´ó¹æÄ£ÖÐÖ¹ÖÂ¶àÆ½Ì¨Ì±»¾£¬£¬£¬Ð§Àͻָ´Àú³ÌÒ»Á¬Íƽø


10ÔÂ20ÈÕ£¬£¬£¬ÑÇÂíÑ·AWSÔâÓöÈ«ÇòÐÔ´ó¹æÄ£ÖÐÖ¹ÊÂÎñ£¬£¬£¬µ¼ÖÂÊý°ÙÍòÍøÕ¾¼°Ð§ÀÍ̱»¾£¬£¬£¬Ó°Ïì¹æÄ£º­¸ÇÃÀ¹ú¡¢Å·Ö޵ȶà¸öµØÇø¡£¡£¡£´Ë´ÎÖÐֹʼÓÚÃÀ¹ú¶«²¿Ê±¼äÆÆÏþ4:30×óÓÒ£¬£¬£¬Ò»Á¬Ô¼45·ÖÖӺ󲿷ÖЧÀÍ×îÏȻָ´£¬£¬£¬µ«ºóÐøÓÖÒòÍøÂç¸ºÔØÆ½ºâÆ÷ÎÊÌâ·ºÆðÖØ¸´£¬£¬£¬×èÖ¹µ±ÈÕÏÂÖç12:06£¬£¬£¬AWSÐû²¼ÒÑͨ¹ýÌØÊ⻺½â²½·¥»Ö¸´ÅþÁ¬ÐÔ¼°API¹¦Ð§£¬£¬£¬µ«ÐÂEC2ʵÀýÆô¶¯ÈÔÊÜÏÞ£¬£¬£¬Ô¤¼ÆÌ«Æ½ÑóÏÄÁîʱÉÏÎç10:00ǰ¸üÐÂÏ£Íû¡£¡£¡£¾ÝAWS¿µ½¡Ò³ÃæÅû¶£¬£¬£¬ÎÊÌâ½¹µãÔ´ÓÚUS-EAST-1ÇøÓòDynamoDB API¶ËµãµÄDNSÆÊÎö¹ÊÕÏ£¬£¬£¬Òý·¢¶à¸öЧÀ͹ýʧÂÊÓëÑÓ³Ù¼¤Ôö£¬£¬£¬°üÀ¨Amazon.com¡¢Prime Video¡¢Perplexity AI¡¢CanvaµÈ½¹µãƽ̨¾ùÊܲ¨¼°¡£¡£¡£ÏêϸÊÜÓ°ÏìЧÀÍÇåµ¥ÏÔʾ£¬£¬£¬³ýÑÇÂíÑ·×ÔÓªÓªÒµÍ⣬£¬£¬Epic GamesÆìÏ¡¶±¤ÀÝÖ®Ò¹¡·£¨µÇ¼¹¦Ð§Ì±»¾£©¡¢Roblox¡¢Hulu¡¢Snapchat¡¢Grammarly¡¢Roblox¼°½ÌÓýƽ̨CanvasµÈ15¸öÖ÷ҪЧÀÍͨ¹ýDowndetectorÈ·ÈÏÖÐÖ¹£¬£¬£¬CanvaÔÚ×´Ì¬Ò³ÃæÃ÷È·Ö¸ÍÉ»¯ÎóÂÊÏÔÖøÉÏÉýÓ°ÏìͼÏñ±à¼­µÈ¹¦Ð§£¬£¬£¬Fortnite¡¢PerplexityÒà֤ʵЧÀÍÏÂÏß¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/aws-outage-crashes-amazon-prime-video-fortnite-perplexity-and-more/


5. CISAÈ·ÈÏOracle E-Business Suite SSRFÎó²îÔâʹÓÃ


10ÔÂ21ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Oracle E-Business SuiteµÄCVE-2025-61884Îó²îÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÓÚ2025Äê11ÔÂ10ÈÕǰÍê³ÉÐÞ²¹¡£¡£¡£¸ÃÎó²îΪOracle ConfiguratorÔËÐÐʱ×é¼þÖеÄЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬£¬£¬OracleÓÚ10ÔÂ11ÈÕÅû¶ʱ½«ÆäÑÏÖØÐÔÆÀ¼¶Îª7.5£¬£¬£¬ÖÒÑÔÆäÒ×±»Ê¹ÓÃÒÔ¡°Î´¾­ÊÚȨ»á¼ûÒªº¦Êý¾Ý»òÍêÈ«»á¼ûËùÓÐOracle Configurator¿É»á¼ûÊý¾Ý¡±¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬¸ÃÎó²îÓë7Ô¹¥»÷ÖÐй¶µÄÎó²îÖ±½ÓÏà¹Ø¡£¡£¡£10Ô³õ£¬£¬£¬MandiantÅû¶ClopÀÕË÷Èí¼þÍÅ»ïÒÑÏòÆóÒµ·¢ËÍÀÕË÷Óʼþ£¬£¬£¬Éù³ÆÊ¹ÓÃÁãÈÕÎó²îÇÔÈ¡ÁËOracle EBSÊý¾Ý¡£¡£¡£Oracle»ØÓ¦³Æ£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÁË7ÔÂÒÑÐÞ²¹µÄÎó²î¡£¡£¡£½øÒ»³ÌÐò²éÕ¹ÏÖ£¬£¬£¬Oracle EBS³ÉΪÁ½Æð×ÔÁ¦¹¥»÷µÄÄ¿µÄ£º7Ô¹¥»÷Õë¶Ô¡°/configurator/UiServlet¡±¶ËµãµÄSSRFÎó²î£¨¼´CVE-2025-61884£©£¬£¬£¬¶ø8Ô¹¥»÷ÔòʹÓá°/OA_HTML/SyncServlet¡±¶ËµãµÄÁíÒ»Îó²î£¨CVE-2025-61882£©£¬£¬£¬ºóÕß±»¹éÒòÓÚClopÍŻ¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw/


6. ¶í¹ØÁªÀÕË÷ÍÅ»ïINC RansomÍþв¹ûÕæ¸ß¶û·ò¾ÞÍ·Êý¾Ý


10ÔÂ21ÈÕ£¬£¬£¬Óë¶íÂÞ˹ÓйصÄÀÕË÷Èí¼þÍÅ»ïINC Ransom 10ÔÂ16ÈÕÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû³Æ£¬£¬£¬ÒÑÇÔÈ¡¸ß¶û·ò´ò°ç¾ÞÍ·Summit Golf Brands47GBÊý¾Ý£¬£¬£¬²¢Æô¶¯Êý¾Ý¹ûÕæµ¹¼ÆÊ±£¬£¬£¬¾àËùν¡°Êý¾ÝÐû²¼¡±½öÊ£ÈýÌì¡£¡£¡£¸ÃÍÅ»ïÉÐδÌṩÊý¾ÝÑù±¾×ôÖ¤£¬£¬£¬´Ë¾Ù±»ÊÓΪÆÈʹÆóÒµÖ§¸¶Êê½ðµÄÕ½ÂÔÊֶΡ£¡£¡£Summit Golf BrandsÆìϰüÀ¨Zero Restriction¡¢B. DraddyµÈ×ÅÃûÆ·ÅÆ£¬£¬£¬ÄêÓªÊÕ2790ÍòÃÀÔª¡£¡£¡£INC Ransom½¨ÉèÓÚ2023Äê7Ô£¬£¬£¬ÒÑÔì³É234ÃûÊܺ¦Õߣ¬£¬£¬ÒÔ¡°¶àÖØÀÕË÷¡±Öø³Æ£º²»µ«¼ÓÃÜÎļþ£¬£¬£¬»¹ÇÔÈ¡Êý¾Ý²¢Íþвй¶£¬£¬£¬ÉõÖÁÒÔ¡°¸¶·Ñ¼´ÌáÉýϵͳÇå¾²¡±µÄŤÇú˵´ÇÓÕÆ­Êê½ð¡£¡£¡£´Ë´ÎÕë¶ÔSummit Golf BrandsµÄ¹¥»÷£¬£¬£¬Ì»Â¶ÁËÀÕË÷Èí¼þÍÅ»ï¶ÔÉÌҵʵÌåµÄÒ»Á¬Íþв¡£¡£¡£Ëæ×ŵ¹¼ÆÊ±ÁÚ½ü£¬£¬£¬ÆóÒµÃæÁÙÁ½ÄÑ£ºÖ§¸¶Êê½ð¿ÉÄÜÖú³¤·¸·¨£¬£¬£¬¾Ü¾øÔò¿ÉÄÜÃæÁÙÊý¾Ýй¶Σº¦¼°ÉùÓþË𺦡£¡£¡£


https://cybernews.com/security/hackers-threaten-to-drop-47gb-of-top-golf-brands-secrets/