Space BearsÀÕË÷×éÖ¯½èQuasarÎó²îÇÔÈ¡ComcastÊý¾Ý
Ðû²¼Ê±¼ä 2025-12-101. Space BearsÀÕË÷×éÖ¯½èQuasarÎó²îÇÔÈ¡ComcastÊý¾Ý
12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬Space BearsÀÕË÷Èí¼þ×éÖ¯¿ËÈÕÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû³Æ£¬£¬£¬£¬£¬£¬Í¨¹ý×ôÖÎÑÇÖݵçÐŹ¤³Ì³Ð°üÉÌQuasar Inc.µÄÎó²î»ñÈ¡ÁËComcastÄÚ²¿×ÊÁÏ£¬£¬£¬£¬£¬£¬²¢Í¬²½½«QuasarÁÐΪ×ÔÁ¦Êܺ¦Õߣ¬£¬£¬£¬£¬£¬ÌåÏÖÁ½Æð¹ØÁªÊÂÎñ¡£¡£¡£¸Ã×éÖ¯2024Äê4Ô·ºÆð£¬£¬£¬£¬£¬£¬±»ÆÊÎöΪÊý¾ÝÇÔÈ¡ÐÍÀÕË÷ÕûÌ壬£¬£¬£¬£¬£¬³£Í¨¹ýɾ³ýÃô¸ÐÎļþ²¢Ë÷ÒªÊê½ð×èÖ¹Ðû²¼£¬£¬£¬£¬£¬£¬ÓëPhobosÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©³ÌÐò±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬ÆäйÃÜÍøÕ¾±»ÊÓΪÏà¹Ø»î¶¯¹²ÏíÐû²¼µã¡£¡£¡£Õë¶ÔComcastµÄÖ¸¿ØÖУ¬£¬£¬£¬£¬£¬Space BearsÉù³ÆQuasarΪComcast¼°GenesisÏîÄ¿ÖÆ×÷ÊÖÒÕÎĵµ£¬£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡°üÀ¨¶àµØ¶¼»áÉè¼ÆÎĵµºÍ¹«ÓÃÉèÊ©ÍýÏëͼµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢É趨6Ììµ¹¼ÆÊ±£¬£¬£¬£¬£¬£¬ÓâÆÚ½«¹ûÕæÊý¾Ý£¬£¬£¬£¬£¬£¬Ê±´úÌṩÊý¾ÝÊÛÂôЧÀÍ¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¸Ã×é֯δÌṩÎļþÑù±¾£¬£¬£¬£¬£¬£¬×ÔÁ¦ÑéÖ¤Ôݲ»¿ÉÐС£¡£¡£Quasar Inc.ÓÚ2025Äê12ÔÂ4ÈÕ±»µ¥¶ÀÁÐΪÊܺ¦Õߣ¬£¬£¬£¬£¬£¬Space BearsÐû³Æ»ñÈ¡ÆäÍøÂçÏîÄ¿¡¢¶¼»áÍýÏëͼ¡¢Í¨Ñ¶½á¹¹µÈÄÚ²¿Îĵµ£¬£¬£¬£¬£¬£¬²¢¿ªÆôËÄÌìµ¹¼ÆÊ±ÊÛÂôÊý¾Ý¡£¡£¡£
https://hackread.com/space-bears-ransomware-comcast-quasar-breach/
2. WordPress²å¼þ¸ßΣÎó²îÔâ´ó¹æÄ£Ê¹ÓÃ
12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬Wordfence¼à²âÏÔʾ£¬£¬£¬£¬£¬£¬WordPressƽ̨µÄSneeit Framework²å¼þ±£´æ¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²îCVE-2025-6389£¨CVSSÆÀ·Ö9.8£©£¬£¬£¬£¬£¬£¬Ó°Ïì8.3¼°ÒÔϰ汾£¬£¬£¬£¬£¬£¬ÒÑͨ¹ý2025Äê8ÔÂ5ÈÕÐû²¼µÄ8.4°æ±¾ÐÞ¸´¡£¡£¡£¸Ã²å¼þ»îÔ¾×°ÖÃÁ¿³¬1700¸ö£¬£¬£¬£¬£¬£¬Îó²îÔ´ÓÚº¯ÊýδÑéÖ¤Óû§ÊäÈëÖ±½ÓÖ´ÐдúÂ룬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´Ë½¨Éè¶ñÒâÖÎÀíÔ±ÕË»§¡¢Ö²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬»òÖØ¶¨Ïò·Ã¿ÍÖÁ´¹ÂÚ/¶ñÒâÕ¾µã¡£¡£¡£×Ô11ÔÂ24ÈÕÎó²î¹ûÕæºó£¬£¬£¬£¬£¬£¬WordfenceÒÑ×èµ²³¬13.1Íò´Î¹¥»÷£¬£¬£¬£¬£¬£¬24СʱÄÚ¼´¼Í¼15381´Î¡£¡£¡£¹¥»÷Õßͨ¹ý¡°/wp-admin/admin-ajax.php¡±¶Ëµã·¢ËÍÌØÖÆÇëÇ󣬣¬£¬£¬£¬£¬½¨Éè¡°arudikadis¡±µÈ¶ñÒâÕË»§£¬£¬£¬£¬£¬£¬ÉÏ´«¡°tijtewmg.php¡±µÈ¾ß±¸Ä¿Â¼É¨Ãè¡¢Îļþ²Ù×÷¹¦Ð§µÄ¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬²¢´ÓÍⲿЧÀÍÆ÷ÏÂÔØ¡°.htaccess¡±ÎļþÈÆ¹ý»á¼ûÏÞÖÆ¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬VulnCheck¼à²âµ½¹¥»÷ÕßʹÓÃICTBroadcastÎó²îCVE-2025-2611£¨CVSSÆÀ·Ö9.3£©£¬£¬£¬£¬£¬£¬Í¨¹ýÏÂÔØShell¾ç±¾¼ÓÔØÆ÷Èö²¥Frost DDoS½©Ê¬ÍøÂç¡£¡£¡£
https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html
3. ´¹ÂÚ¹¤¾ß°üGhostFrameÏòÈ«ÇòÊý°ÙÍòÓû§Ìᳫ¹¥»÷
12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬BarracudaÇå¾²Ñо¿Ô±ÓÚ2025Äê9ÔÂÊ״η¢Ã÷ÃûΪGhostFrameµÄÐÂÐ͸ßÖØÆ¯ºó´¹ÂÚ¹¤¾ß°ü£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÒÑÌᳫ³¬100Íò´Î¹¥»÷£¬£¬£¬£¬£¬£¬±ê¼Ç×Å´¹ÂÚ¼´Ð§ÀÍ£¨PaaS£©ÊÖÒÕµÄΣÏÕÉý¼¶¡£¡£¡£Æä½¹µãÍþвÔÚÓÚ½«¶ñÒâ²Ù×÷ÒþÄäÓÚÒþÐÎiframe¿ò¼ÜÖУ¬£¬£¬£¬£¬£¬Í¨¹ýÌìÉú¿´ËÆÎÞº¦µÄHTMLÎļþ£¬£¬£¬£¬£¬£¬ÔÚÒ³Ãæµ×²ã¼ÓÔØÀ´×Ô¶¯Ì¬×ÓÓòÃûµÄÕæÊµ´¹ÂÚÄÚÈÝ£¬£¬£¬£¬£¬£¬Ê¹Çå¾²¹¤¾ßÄÑÒÔ¼ì²â¡£¡£¡£¹¥»÷Á÷³Ì·ÖΪÁ½½×¶Î£ºÊ×ÏÈͨ¹ýαװ³É¡°±£ÃÜÌõÔ¼¡±¡°ÃÜÂëÖØÖá±µÈÖ÷ÌâµÄ´¹ÂÚÓʼþÓÕµ¼Óû§µã»÷£»£»£»ËæºóÓû§½øÈë¿´ËÆÇå¾²µÄÍøÒ³£¬£¬£¬£¬£¬£¬µ×²ãiframe´Óʵʱ±ä»»µÄ×ÓÓòÃû¼ÓÔØ¹¥»÷ÄÚÈÝ¡£¡£¡£Îª¹æ±Ü¼ì²â£¬£¬£¬£¬£¬£¬¹¥»÷ÕßΪÿ¸öÄ¿µÄµ¥¶À½¨ÉèרÊô×ÓÓòÃû£¬£¬£¬£¬£¬£¬²¢ÄÚÖ÷´ÆÊÎö¹¦Ð§£¬£¬£¬£¬£¬£¬Èç½ûÓÃÓÒ¼ü²Ëµ¥¡¢ÆÁÕÏ¿ì½Ý¼ü¼°¹Ø±Õ¿ª·¢Õß¹¤¾ß£¬£¬£¬£¬£¬£¬×è°Çå¾²ºË²é¡£¡£¡£GhostFrame´îÔØ¶àÏî¸ßÒþ²ØÌØÕ÷£º´¹ÂÚ±íµ¥Òþ²ØÔÚ´óÎļþͼÏñÁ÷ÖÐÈÆ¹ý¹Å°åɨÃ裻£»£»×ÓÓòÃû¶¯Ì¬ÂÖ»»ÅäºÏ±¸ÓÃiframe¿ò¼Ü£¬£¬£¬£¬£¬£¬Ó¦¶ÔJavaScript×èµ²£»£»£»Ö§³Ö¶àÄ¿µÄÎÞаÊÊÅ䣬£¬£¬£¬£¬£¬ÎÞÐèÐÞ¸ÄÖ÷Ò³Ãæ¼´¿ÉÌæ»»´¹ÂÚÄÚÈÝ£»£»£»Í¨¹ýÐÞ¸ÄÒ³ÃæÎÊÌâºÍͼ±ê·ÂðÕýµ±Ð§ÀÍ£¬£¬£¬£¬£¬£¬ÔöÇ¿Î±×°ÕæÊµÐÔ¡£¡£¡£
https://cybersecuritynews.com/new-ghostframe-super-stealthy-phishing-kit-attacks-millions-of-users-worldwide/
4. ºÚ¿ÍʹÓÃReact2ShellÎó²îÌᳫEtherRAT¶ñÒâÈí¼þ¹¥»÷
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾SysdigÅû¶ÁËÒ»ÖÖÃûΪEtherRATµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Æäͨ¹ýʹÓÃReact/Next.js¿ò¼ÜÖеĸßΣÎó²îCVE-2025-55182£¨React2Shell£©ÊµÑé¹¥»÷¡£¡£¡£¸ÃÎó²îÔ´ÓÚReact Server ComponentsµÄ¡°Flight¡±ÐÒé·´ÐòÁл¯È±ÏÝ£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâHTTPÇëÇóÖ´ÐÐÔ¶³Ì´úÂ룬£¬£¬£¬£¬£¬Ó°Ïì´ó×ÚÔÆÇéÐΡ£¡£¡£SysdigÑо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬EtherRATÓ볯ÏÊ¡°Ñ¬È¾ÐÔ·Ã̸¡±»î¶¯Ê¹ÓõŤ¾ß±£´æ¹ØÁªÐÔ£¬£¬£¬£¬£¬£¬µ«¾ß±¸ÆæÒìÊÖÒÕÌØÕ÷¡£¡£¡£EtherRAT½ÓÄɶà½×¶Î¹¥»÷Á´£ºÊ×ÏÈͨ¹ýReact2ShellÎó²îÔÚÄ¿µÄϵͳִÐÐBase64±àÂëµÄshellÏÂÁ£¬£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐжñÒâ¾ç±¾s.sh¡£¡£¡£¸Ã¾ç±¾»á½¨ÉèÒþ²ØÄ¿Â¼£¬£¬£¬£¬£¬£¬°²ÅÅÕýµ±Node.jsÔËÐÐʱ¼°¼ÓÃÜÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬×îÖÕ½âÃܳöEtherRATÖ²Èë³ÌÐò¡£¡£¡£Æä½¹µãÁ¢ÒìÔÚÓÚ»ùÓÚÒÔÌ«·»ÖÇÄܺÏÔ¼µÄC2ͨѶ»úÖÆ£¬£¬£¬£¬£¬£¬Í¨¹ýÅÌÎÊ9¸ö¹«¹²ÒÔÌ«·»RPC½Úµã²¢½ÓÄÉ´ó¶¼ÏìÓ¦Õ½ÂÔµÖÓùµ¥µã¹ÊÕÏ£¬£¬£¬£¬£¬£¬ÊµÏÖÎÞаÇÒ¿¹×ÌÈŵÄÖ¸Áî´«Êä¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-react2shell-flaw-in-etherrat-malware-attacks/
5. ÐÂÐÍMirai±äÖÖʹÓú£ÊÂDVRÎó²îʵÑéÖØ´ó¹¥»÷
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬CydomeÑо¿Ö°Ô±·¢Ã÷ÃûΪBroadsideµÄÐÂÐÍMirai½©Ê¬ÍøÂç±äÖÖ£¬£¬£¬£¬£¬£¬¸Ã±äÖÖÕë¶Ôº£ÊÂÎïÊ¢ÐÐÒµ£¬£¬£¬£¬£¬£¬Ê¹Óô¬²°¼°×°±¸Ê¹ÓõÄTBK DVR×°±¸ÖеÄÏÂÁî×¢ÈëÎó²îCVE-2024-3721Ìᳫ¹¥»÷¡£¡£¡£¸ÃÎó²îÓÚ2024Äê4ÔÂÅû¶²¢¸½´øPoC´úÂ룬£¬£¬£¬£¬£¬ÖÁ2025ÄêÖÐÒѱ»¶à¸öDDoS½©Ê¬ÍøÂçÆÕ±éʹÓᣡ£¡£Mirai½©Ê¬ÍøÂçÔ´´úÂëÔÚ½üÊ®Äêǰ¹ûÕæºó£¬£¬£¬£¬£¬£¬Ò»Á¬±»ÍøÂç·¸·¨·Ö×ÓÐÞ¸ÄÖØÓÃÒÔÇý¶¯´ó¹æÄ£¹¥»÷¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬£¬£¬TBK DVRÎó²îͬÑùÓ°ÏìÒÔCeNova¡¢Night Owl¡¢QSeeµÈÆ·ÅÆÖØÐ°ü×°µÄÐͺţ¬£¬£¬£¬£¬£¬¶Ôº½Ô˹«Ë¾×é³ÉÑÏÖØÍþв¡£¡£¡£ÈëÇÖ×°±¸¿ÉÄÜʹ¹¥»÷Õß»á¼û¼ÝÊ»ÊÒ¡¢»õ²Õ»ò»ú²ÕµÄCCTV»Ã棬£¬£¬£¬£¬£¬×ÌÈÅÎÀÐÇͨѶ£¬£¬£¬£¬£¬£¬»òºáÏòÒÆ¶¯ÖÁ´¬²°Òªº¦ÔËÓªÊÖÒÕϵͳ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Broadside²»µ«ÏÞÓÚDDoS¹¥»÷£¬£¬£¬£¬£¬£¬Æä×Ô¶¯ÇÔȡϵͳƾ֤ÎļþµÄÐÐΪÅú×¢£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒâͼ½«ÊÜѬȾװ±¸´Ó¼òÆÓ½©Ê¬ÍøÂç½Úµãת±äΪսÂÔפ×ãµã¡£¡£¡£
https://securityaffairs.com/185491/malware/broadside-botnet-hits-tbk-dvrs-raising-alarms-for-maritime-logistics.html
6. Vitas HealthcareÔâÍøÂç¹¥»÷Ö³¬30ÍòÈËÐÅϢй¶
12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©Ò½ÁƱ£½¡Êý¾Ýй¶׷×ÙÆ÷ÏÔʾ£¬£¬£¬£¬£¬£¬ÃÀ¹ú×î´óÓªÀûÐÔÁÙÖÕ¾ì×¢Á¬Ëø»ú¹¹Vitas Healthcare½üÆÚ±¬·¢ÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬Ó°ÏìÈËÊý´ï319,177ÈË¡£¡£¡£¸Ã»ú¹¹Á¥ÊôÓÚChemed¼¯ÍÅ£¬£¬£¬£¬£¬£¬ÆìÏÂVitas Hospice ServicesÓÚ10ÔÂ24ÈÕ·¢Ã÷ϵͳÈëÇÖ£¬£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾ¹¥»÷Õßͨ¹ý±»µÁÓõũӦÉÌÕË»§£¬£¬£¬£¬£¬£¬ÔÚ9ÔÂ21ÈÕÖÁ10ÔÂ27ÈÕʱ´úÒ»Á¬»á¼ûÆäϵͳ£¬£¬£¬£¬£¬£¬²¢ÏÂÔØÁË´ó×Ú»¼Õß¼°½üÇ×µÄÃô¸ÐÐÅÏ¢¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬°üÀ¨»¼Õß¼°Ç°»¼ÕßµÄÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢ÒÔ¼°Ö§ÊôÁªÏµ·½·¨µÈ½¹µãСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδÃ÷È·´Ë´ÎÊÂÎñÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÇÒÎÞÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬£¬µ«ÊÂÎñµÄÑÏÖØÐÔÒÑÒý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬VitasÒÑͨ¹ýרÃÅÊý¾ÝÐ¹Â¶Í¨ÖªÍøÕ¾Ïò¹«ÖÚÅû¶ÊÂÎñÏêÇ飬£¬£¬£¬£¬£¬µ«ÏêϸÊÖÒÕϸ½Ú¼°ºóÐøµ÷½â²½·¥ÉÐδÍêÈ«¹ûÕæ¡£¡£¡£
https://www.securityweek.com/over-300000-individuals-impacted-by-vitas-hospice-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ