Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2025-11-12

1. Ò½ÁƿƼ¼¹«Ë¾Doctor AllianceÔâÀÕË÷¹¥»÷


11ÔÂ10ÈÕ£¬£¬£¬£¬ £¬¿ËÈÕ£¬£¬£¬£¬ £¬Ò»¼ÒΪҽÉúÌṩ¼Æ·ÑЧÀ͵ÄÒ½ÁÆÊÖÒÕ¹«Ë¾Doctor AllianceÔâÓöÍøÂç·¸·¨·Ö×ÓÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳ÉÏÐû³Æ£¬£¬£¬£¬ £¬ÒÑÇÔÈ¡¸Ã¹«Ë¾Áè¼Ý120ÍòÌõÃô¸ÐÒ½ÁƼͼ£¬£¬£¬£¬ £¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«¹ûÕæÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ýº­¸ÇÕï¶ÏЧ¹û¡¢Ìå¼ì×ܽᡢ´¦·½¡¢ÖÎÁƼƻ®¡¢Ò½ÔºÒ½ÖöµÈ½¹µãÒ½ÁÆÐÅÏ¢£¬£¬£¬£¬ £¬Í¬Ê±°üÀ¨»¼ÕßÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢¿µ½¡°ü¹ÜË÷Åâ¼Í¼¡¢Ò½ÉúÐÕÃûµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿ÍŶӶԹ¥»÷ÕßÌṩµÄ200MBÊý¾ÝÑù±¾¾ÙÐÐÆÊÎöºóÈ·ÈÏ£¬£¬£¬£¬ £¬ÆäÖгäÂú×Å´ó×ÚÎÞ·¨»Ö¸´µÄÒ½ÁƺÍÉúÎïʶ±ðÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´ËÀàÊý¾Ýй¶½«´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓû¼ÕßÉí·ÝÐÅÏ¢¾ÙÐÐÒ½ÁÆÉí·Ý͵ÇÔ£¬£¬£¬£¬ £¬Ã°³äÊܺ¦Õß»ñÈ¡´¦·½Ò©»òÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬ £¬ÉõÖÁͨ¹ýÉç½»¹¤³Ì¹¥»÷Ò½ÉúºÍ»¼Õߣ»£»£»£»£»£»£»ÈôÉæ¼°»¼Õß²¡Ê·£¬£¬£¬£¬ £¬»¹¿ÉÄÜÒý·¢Ú²Æ­ÀÕË÷¡£¡£¡£¡£¡£¡£¡£ÓëÃÜÂë»òÐÅÓÿ¨²î±ð£¬£¬£¬£¬ £¬Ò½ÁƼͼһµ©Ð¹Â¶ÎÞ·¨Í¨¹ý¸ü¸Ä»Ö¸´£¬£¬£¬£¬ £¬µ¼ÖÂΣº¦ºã¾Ã±£´æ¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/doctor-alliance-breach-allegedly-exposes-patients-health-data/


2. Triofox¸ßΣÎó²î±»Ê¹ÓÃʵÏÖÈ«Á´¹¥»÷ÓëȨÏÞÌáÉý


11ÔÂ11ÈÕ£¬£¬£¬£¬ £¬¹È¸èMandiantÍŶÓÅû¶£¬£¬£¬£¬ £¬Triofoxƽ̨±£´æÑÏÖØÎó²îCVE-2025-12480£¨CVSSÆÀ·Ö9.1£©£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ý¸ÃÎó²îÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬£¬£¬ £¬Ê¹Ó÷À²¡¶¾¹¦Ð§ÉÏ´«²¢Ö´ÐÐÔ¶³Ì»á¼û¹¤¾ß¡£¡£¡£¡£¡£¡£¡£Mandiant×·×Ù·¢Ã÷£¬£¬£¬£¬ £¬Íþв¼¯ÈºUNC6485ÔçÔÚ2025Äê8ÔÂ24ÈÕ±ãʹÓôËÎó²î£¬£¬£¬£¬ £¬Á¬Ïµ·À²¡¶¾¹¦Ð§ÊµÏÖ´úÂëÖ´ÐУ¬£¬£¬£¬ £¬Ðγɡ°Éí·ÝÈÆ¹ý-ÕË»§½¨Éè-¾ç±¾Ö´ÐÐ-ȨÏÞÌáÉý¡±µÄÍêÕû¹¥»÷Á´¡£¡£¡£¡£¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýαÔìHTTPÖ÷»úͷΪ¡°localhost¡±£¬£¬£¬£¬ £¬ÈƹýTriofox¶ÔAdminAccount.aspxµÈÖÎÀíÒ³ÃæµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬ £¬Ê¹ÓÃGladPageUILib.dllÖÐCanRunCriticalPage()º¯ÊýµÄÂß¼­È±ÏÝ£¬£¬£¬£¬ £¬ÔÚ×°ÖÃÀú³ÌÖн¨Éè¡°¼¯ÈºÖÎÀíÔ±¡±ÕË»§¡£¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬ £¬Í¨¹ý·À²¡¶¾¹¦Ð§ÉÏ´«¶ñÒâÅú´¦Öóͷ£Îļþ£¬£¬£¬£¬ £¬¸ÃÎļþÔÚÎļþÉÏ´«ÖÁ¹²ÏíÎļþ¼Ðʱ±»´¥·¢£¬£¬£¬£¬ £¬ÒÔSYSTEMȨÏÞÖ´ÐÐPowerShellÏÂÔØÆ÷£¬£¬£¬£¬ £¬ÏÂÔØÎ±×°³ÉSAgentInstallerµÄ¶ñÒâ³ÌÐò£¬£¬£¬£¬ £¬¾²Ä¬×°ÖÃZoho UEMS£¬£¬£¬£¬ £¬²¢°²ÅÅZoho AssistºÍAnyDeskʵÏÖÔ¶³Ì»á¼û¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß½øÒ»²½Ã¶¾ÙSMB»á»°ºÍÓû§ÕË»§£¬£¬£¬£¬ £¬ÊµÑéÐÞ¸ÄÃÜÂë²¢ÌáÉýȨÏÞÖÁÍâµØ/ÓòÖÎÀíÔ±£¬£¬£¬£¬ £¬Í¬Ê±Í¨¹ý¶Ë¿Ú443½¨ÉèSSH·´ÏòËíµÀ£¬£¬£¬£¬ £¬½«ÍâµØRDPЧÀÍת·¢ÖÁ¹¥»÷Õß¿ØÖÆÖ÷»ú£¬£¬£¬£¬ £¬Ðγɳ¤ÆÚ»¯»á¼ûͨµÀ¡£¡£¡£¡£¡£¡£¡£MandiantÇ¿µ÷£¬£¬£¬£¬ £¬Ö»¹ÜÐÞ¸´°æ±¾16.7.10368.56560ÒÑÐû²¼£¬£¬£¬£¬ £¬µ«½¨ÒéÓû§Éý¼¶ÖÁ×îа汾£¬£¬£¬£¬ £¬²¢ÉóºËÖÎÀíÔ±ÕË»§ÒÔ¼ì²âÒì³£½¨Éè¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/184439/hacking/critical-triofox-bug-exploited-to-run-malicious-payloads-via-av-configuration.html


3. ClickFixÍøÂç´¹ÂÚ¹¥»÷ʹÓÃPureRATÃé×¼ÂùÝϵͳ


11ÔÂ10ÈÕ£¬£¬£¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬ £¬Ò»³¡Õë¶ÔÂùÝÒµµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷»î¶¯×Ô2025Äê4ÔÂÒ»Á¬ÖÁ10Ô³õ£¬£¬£¬£¬ £¬ÓÉ·¨¹úÇå¾²¹«Ë¾SekoiaÉî¶ÈÆÊÎö¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÈëÇÖÕýµ±ÓÊÏäÕË»§£¬£¬£¬£¬ £¬ÏòÂùÝ˾ÌêÍ·ËÍ·ÂðBooking.comµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬ £¬ÓÕµ¼Æäµã»÷αװ³ÉreCAPTCHAÑéÖ¤µÄClickFixÉç½»¹¤³ÌÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£¸ÃÒ³Ãæ½ÓÄÉÖØ´óÖØ¶¨Ïò»úÖÆ£¬£¬£¬£¬ £¬×îÖÕ´¥·¢¶ñÒâPowerShellÏÂÁ£¬£¬£¬ £¬ÏÂÔØº¬DLLÅÔ¼ÓÔØÊÖÒÕµÄZIPѹËõ°ü£¬£¬£¬£¬ £¬¼¤»îÄ£¿£¿£¿£¿£¿é»¯Ä¾ÂíPureRAT¡£¡£¡£¡£¡£¡£¡£PureRAT¾ß±¸È«·½Î»¼à¿Ø¹¦Ð§£¬£¬£¬£¬ £¬°üÀ¨¼üÅ̼ͼ¡¢Ô¶³Ì¿ØÖÆ¡¢ÉãÏñÍ·²¶»ñ¼°ÎļþÇÔÈ¡£¬£¬£¬£¬ £¬²¢Í¨¹ý.NET Reactor»ìÏý±£»£»£»£»£»£»£»¤£¬£¬£¬£¬ £¬Ê¹ÓÃ×¢²á±íʵÏÖ³¤ÆÚ»¯×¤Áô¡£¡£¡£¡£¡£¡£¡£¹¥»÷µ½Êֺ󣬣¬£¬£¬ £¬·¸·¨·Ö×Ó½øÒ»²½Ê¹ÓÃÇÔÈ¡µÄÂùÝÔ¤¶©Æ½Ì¨ÕË»§£¬£¬£¬£¬ £¬Í¨¹ýWhatsApp»òÓʼþÁªÏµÕæÊµ¿Í»§£¬£¬£¬£¬ £¬ÒÔ¡°È·ÈÏÔ¤¶©ÐÅÏ¢¡±ÎªÃûÓÕµ¼Æä½øÈë·ÂðµÄBooking.com»òExpediaÒ³Ãæ£¬£¬£¬£¬ £¬ÇÔÈ¡ÒøÐп¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬ £¬·¸·¨ÍÅ»ï´ÓLolzTeamµÈºÚ¿ÍÂÛ̳¹ºÖÃBooking.comÖÎÀíÔ±ÕË»§ÐÅÏ¢£¬£¬£¬£¬ £¬ÉõÖÁ°´ÀûÈó·Ö³ÉÕÐļ·ÖÏúר¼Ò¡£¡£¡£¡£¡£¡£¡£SekoiaÊӲ쵽רѧÉúÒâÔ¤¶©Æ½Ì¨ÈÕÖ¾µÄTelegram»úеÈ˼°ÌṩÈ˹¤ÑéºÅЧÀ͵ĺڲú¹©Ó¦Á´¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/11/large-scale-clickfix-phishing-attacks.html


4. Maverick¶ñÒâÈí¼þÐ®ÖÆä¯ÀÀÆ÷»á»°£¬£¬£¬£¬ £¬Ãé×¼°ÍÎ÷×î´óÒøÐÐ


11ÔÂ11ÈÕ£¬£¬£¬£¬ £¬Çå¾²Ñо¿Ô±·¢Ã÷£¬£¬£¬£¬ £¬Á½¿îÕë¶Ô°ÍÎ÷ÒøÐÐÓû§µÄ.NET¶ñÒâÈí¼þCoyoteÓëMaverick±£´æÏÔÖø¹ØÁªÐÔ¡£¡£¡£¡£¡£¡£¡£CyberProof±¨¸æÏÔʾ£¬£¬£¬£¬ £¬¶þÕß¾ù¾ß±¸ÒøÐÐURL¶¨Ïò¡¢Ó¦ÓÃ¼à¿Ø¼°WhatsAppÍøÒ³°æÈö²¥ÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£MaverickÓÉÇ÷ÊÆ¿Æ¼¼Ê״μͼµÄ"Ë®ÈøÎ÷"£¨Water Saci£©¹¥»÷»î¶¯ÍƳö£¬£¬£¬£¬ £¬°üÀ¨×ÔÈö²¥×é¼þSORVEPOTEL£¬£¬£¬£¬ £¬Í¨¹ýWhatsApp×ÀÃæ°æÀ©É¢º¬¶ñÒâZIP°ü¡£¡£¡£¡£¡£¡£¡£¸ÃľÂí¼à¿Øä¯ÀÀÆ÷±êǩҳ£¬£¬£¬£¬ £¬Ê¶±ðÀ­¶¡ÃÀÖÞ½ðÈÚ»ú¹¹URLºóÅþÁ¬Ô¶³ÌЧÀÍÆ÷£¬£¬£¬£¬ £¬ÍÆËÍ´¹ÂÚÒ³ÃæÇÔȡƾ֤¡£¡£¡£¡£¡£¡£¡£SophosÆÊÎöÖ¸³ö£¬£¬£¬£¬ £¬Maverick¿ÉÄÜÊÇCoyoteµÄÉý¼¶°æ£¬£¬£¬£¬ £¬¿¨°Í˹»ùÔò·¢Ã÷¶þÕß±£´æ´ó×Ú´úÂëÖØµþ£¬£¬£¬£¬ £¬µ«½«ÆäÊÓΪ°ÍÎ÷ÐÂÍþв¡£¡£¡£¡£¡£¡£¡£CyberProof×îÐÂÊÓ²ìÕ¹ÏÖ£¬£¬£¬£¬ £¬ZIPÎļþÖеÄLNKÎļþÆô¶¯ºó»áÅþÁ¬ÍⲿЧÀÍÆ÷ÏÂÔØÓÐÓÃÔØºÉ£¬£¬£¬£¬ £¬½ûÓÃ΢ÈíDefenderºÍUAC£¬£¬£¬£¬ £¬¼ÓÔØ¾ß±¸·´ÆÊÎöÊÖÒÕµÄ.NET¼ÓÔØÆ÷£¬£¬£¬£¬ £¬×îÖÕ°²ÅÅSORVEPOTELºÍMaverick¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬Maverick½öÔÚÈ·ÈÏÊܺ¦ÕßλÓÚ°ÍÎ÷ºó×°Ö㬣¬£¬£¬ £¬ÇÒ¹¥»÷Ä¿µÄÒÑÀ©Õ¹ÖÁ°ÍÎ÷ÂùÝ¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/11/whatsapp-malware-maverick-hijacks.html


5. RhadamanthysÐÅÏ¢ÇÔÈ¡Ðж¯ÔâÖ´·¨ÖÐÖ¹


11ÔÂ11ÈÕ£¬£¬£¬£¬ £¬¿ËÈÕ£¬£¬£¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±g0njxaºÍGi7w0rm¼à²âµ½£¬£¬£¬£¬ £¬ÃûΪRhadamanthysµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ðж¯ÒÑÔâÖÐÖ¹£¬£¬£¬£¬ £¬Æä"¿Í»§"ÆÕ±é±¨¸æÎÞ·¨»á¼ûЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶©ÔÄģʽÔËÓª£¬£¬£¬£¬ £¬ÍøÂç·¸·¨·Ö×ÓÐèÿÔÂÏò¿ª·¢ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡Èí¼þ¡¢ÊÖÒÕÖ§³Ö¼°ÓÃÓÚÍøÂç±»µÁÊý¾ÝµÄÍøÂçÃæ°å»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£ÆäÈö²¥Í¾¾¶°üÀ¨Î±×°³ÉÈí¼þÆÆ½â³ÌÐò¡¢YouTubeÊÓÆµ»ò¶ñÒâËÑË÷¹ã¸æ£¬£¬£¬£¬ £¬Ö÷ÒªÇÔÈ¡ä¯ÀÀÆ÷¡¢µç×ÓÓʼþ¿Í»§¶ËµÈÓ¦ÓóÌÐòµÄƾ֤ºÍÉí·ÝÑéÖ¤cookie¡£¡£¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÂÛ̳Óû§·´Ï죬£¬£¬£¬ £¬²¿·Ö¿Í»§·¢Ã÷RhadamanthysÍøÂçÃæ°åµÄSSH»á¼ûȨÏÞ±»¸ÄΪ֤ÊéµÇ¼ģʽ£¬£¬£¬£¬ £¬ÐèÖØÐÂ×°ÖÃЧÀÍÆ÷²¢É¨³ýºÛ¼££¬£¬£¬£¬ £¬µÂ¹ú¾¯·½ÒѽéÈëÊӲ졣¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ª·¢ÕßÍÆ²âµÂ¹úÖ´·¨²¿·ÖΪĻºóºÚÊÖ£¬£¬£¬£¬ £¬ÒòÍøÂçÃæ°åÔÚÖÐÖ¹Ç°ÔøÓе¹úIPµØµãµÇ¼¼Í¼¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ £¬¸ÃÐж¯µÄTorÑó´ÐÍøÕ¾Ò²ÒÑÀëÏߣ¬£¬£¬£¬ £¬µ«Î´ÏÔʾ¾¯·½²é·âºá·ù£¬£¬£¬£¬ £¬ÏêϸĻºóʹÓÃÕßÈÔ´ýÈ·ÈÏ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹¿ÉÄÜÓë"ÖÕ¾ÖÐж¯"£¨Operation Endgame£©ÓйØ¡£¡£¡£¡£¡£¡£¡£¸ÃÖ´·¨Ðж¯×ÔÆô¶¯ÒÔÀ´£¬£¬£¬£¬ £¬ÒѶԶà¸ö¶ñÒâÈí¼þ»ù´¡ÉèÊ©Ôì³ÉÆÆË𡣡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/


6. Ó¢¹ú¹úÃñÒ½ÁÆÐ§ÀÍϵͳNHS UKÔâClopÀÕË÷¹¥»÷


11ÔÂ11ÈÕ£¬£¬£¬£¬ £¬ÀÕË÷Èí¼þ×éÖ¯ClopÔÚÆä°µÍøÍøÕ¾Ðû³Æ¶ÔÓ¢¹ú¹ú¼ÒÒ½ÁÆÐ§ÀÍϵͳ£¨NHS UK£©Êý¾Ýй¶ÈÏÕæ£¬£¬£¬£¬ £¬Ö¸ÔðÆä¡°Ä®ÊÓ¿Í»§Çå¾²¡±¡£¡£¡£¡£¡£¡£¡£¸Ã×é֯ʹÓÃOracle E-Business Suite£¨EBS£©ÖеÄCVE-2025-61882Îó²î£¨CVSSÆÀ·Ö9.8£©ÊµÑé¹¥»÷£¬£¬£¬£¬ £¬¸ÃÎó²îÓÚ2025Äê10ÔÂ4ÈÕÓÉOracleÐû²¼½ôÆÈ²¹¶¡ÐÞ¸´£¬£¬£¬£¬ £¬µ«Ê¹ÓÃÐÐΪÔçÓÚ²¹¶¡Ðû²¼£¬£¬£¬£¬ £¬×Ô2025Äê8ÔÂÆð£¬£¬£¬£¬ £¬¹¥»÷Õß±ãÕë¶ÔEBS 12.2.3ÖÁ12.2.14°æ±¾ÖеÄBI PublisherÄ£¿£¿£¿£¿£¿éÌᳫ¹¥»÷£¬£¬£¬£¬ £¬Í¨¹ýδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì»á¼ûÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£Îó²îÈö²¥Òò2025Äê10ÔÂ3ÈÕScattered Lapsus$ Huntersй¶¿´·¨ÑéÖ¤´úÂë¶ø¼ÓËÙ£¬£¬£¬£¬ £¬´ÙʹCl0p¡¢FIN11µÈÍþвÐÐΪÕßÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£¡£¡£¡£½¨ÒéÊÜÓ°Ïì×éÖ¯Á¬Ã¦×°ÖÃ2025Äê10Ô²¹¶¡£¬£¬£¬£¬ £¬×·ËÝÖÁ8ÔµÄȡ֤Éó²é£¬£¬£¬£¬ £¬²¢¼à¿Ø¿ÉÒÉIP¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²¨¼°¹þ·ð´óѧ¡¢ÃÀ¹úº½¿Õ×Ó¹«Ë¾EnvoyµÈ»ú¹¹£¬£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸ÒÀÀµEBS¾ÙÐвÆÎñ¡¢ÈËÁ¦×ÊÔ´¼°¹©Ó¦Á´ÖÎÀíµÄÆóÒµ¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/cl0p-ransomware-nhs-uk-washington-post-breach/