ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß
Ðû²¼Ê±¼ä 2025-10-221. ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪGlassWormµÄ×ÔÎÒÈö²¥¶ñÒâÈí¼þÕýͨ¹ýOpenVSXºÍMicrosoft Visual StudioÊг¡Ìᳫ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬ÒÑÔì³ÉÔ¼35,800´Î×°Ö㬣¬£¬£¬£¬£¬³ÉΪÊ×ÀýÕë¶ÔVS CodeµÄÈä³æÊ½¹©Ó¦Á´¹¥»÷°¸Àý¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÒþÐÎUnicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬Í¨¹ýÇÔÈ¡µÄÕË»§ÐÅÏ¢Èö²¥ÖÁ¸ü¶à¿É»á¼ûµÄÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬²¢½ÓÄÉSolanaÇø¿éÁ´¾ÙÐп¹É¾³ýµÄÏÂÁî¿ØÖÆ£¬£¬£¬£¬£¬£¬Í¬Ê±ÒÔGoogleÈÕÀú×÷Ϊ±¸ÓÃͨµÀ¡£¡£¡£¡£¹¥»÷·¾¶ÏÔʾ£¬£¬£¬£¬£¬£¬GlassWormÔÚ×°Öúó»áÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°49¸öÀ©Õ¹µÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬£¬£¬°²ÅÅSOCKSÊðÀí·ÓɶñÒâÁ÷Á¿£¬£¬£¬£¬£¬£¬²¢×°ÖÃVNC¿Í»§¶ËʵÏÖÒþÐÎÔ¶³Ì»á¼û¡£¡£¡£¡£Æä×îÖÕÓÐÓÃÔØºÉZOMBIͨ¹ýSolanaÇø¿éÁ´ÉúÒâÁ´½Ó·Ö·¢£¬£¬£¬£¬£¬£¬½«ÊÜѬȾϵͳת»¯ÎªÍøÂç·¸·¨½Úµã¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃBitTorrent DHT¾ÙÐÐÊèÉ¢ÏÂÁî·Ö·¢£¬£¬£¬£¬£¬£¬²¢Ö§³ÖÖ±½ÓÅþÁ¬IPµØµãµÄµÚÈý½»¸¶»úÖÆ¡£¡£¡£¡£×èÖ¹±¨¸æÐû²¼£¬£¬£¬£¬£¬£¬OpenVSXÉÏÖÁÉÙ11¸öÀ©Õ¹¼°VS CodeÊг¡1¸öÀ©Õ¹±»Ñ¬È¾¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬OpenVSXÉÏÈÔÓÐÖÁÉÙ4¸öÊÜѬȾÀ©Õ¹¿ÉÏÂÔØ£¬£¬£¬£¬£¬£¬Î¢ÈíÒÑÒÆ³ý¶ñÒâÀ©Õ¹£¬£¬£¬£¬£¬£¬²¿·ÖÐû²¼ÕßÒѸüÐÂÐÞ¸´¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/
2. ºÚ¿ÍÉù³ÆÍâÂôƽ̨GetirÊý¾Ýй¶
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÍÁ¶úÆäÍâÂôƽ̨Getir¿ËÈÕÏÝÈëÊý¾Ýй¶ÕùÒé¡£¡£¡£¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳Ðû²¼Ìû×Ó£¬£¬£¬£¬£¬£¬Éù³ÆÒÑ¡°ÈëÇÖ¡±¸Ã¹«Ë¾ÄÚÍøÏµÍ³¡£¡£¡£¡£¾Ý¹¥»÷ÕßÅû¶µÄÑù±¾Êý¾Ý£¬£¬£¬£¬£¬£¬Ð¹Â¶ÄÚÈÝÖ÷ҪΪGetirÄÚ²¿Ó¦ÓóÌÐòÔªÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨Bitbucket´æ´¢¿âURL¡¢Óû§È¨ÏÞ¡¢ÏîÄ¿Ãû³Æ¡¢ÊÂÇéÇøID¼°Ô±¹¤µç×ÓÓʼþµØµã¡£¡£¡£¡£Ñо¿ÍŶӯÊÎöÒÔΪ£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¸ü¿ÉÄÜͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉÌ»ñÈ¡£¬£¬£¬£¬£¬£¬¶ø·ÇÖ±½Ó»á¼û¹«Ë¾½¹µãϵͳ¡£¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÔªÊý¾ÝÈÔ¿ÉÄÜ´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓÃÔ±¹¤µç×ÓÓʼþµØµãʵÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬ÓÕµ¼Ô±¹¤Ð¹Â¶Ãô¸ÐÐÅÏ¢»òµã»÷¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬½ø¶ø»ñÈ¡¸üÉî²ãϵͳȨÏÞ£»£»£»£»Ì»Â¶µÄ´æ´¢¿âURLºÍÊÂÇéÇøIDÔò±ãÓÚ¹¥»÷ÕßÔÚÏîÄ¿ÖÐÕ÷²ÉδÊܱ£»£»£»£»¤µÄAPI¶Ëµã»òÉèÖÃÎó²î£¬£¬£¬£¬£¬£¬ÎªºóÐø¹¥»÷£¨ÈçÔ´´úÂëÇÔÈ¡¡¢ÏµÍ³ÈëÇÖ£©´´Á¢Ìõ¼þ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬GetirÉÐδ¶ÔÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£¡£¡£¡£
https://cybernews.com/security/getir-data-breach-claims/
3. VerisureÔâµÚÈý·½ÏàÖú·½Êý¾Ýй¶£¬£¬£¬£¬£¬£¬Ó°ÏìÈðµä3.5ÍòÓû§
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÈðµäÇå¾²¾ÞÍ·Verisure¿ËÈÕÅû¶һÆðÉæ¼°ÆìÏÂAlert Alarm²¿·Ö¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÆäÈðµäÍⲿ·¢Æ±ÏàÖúͬ°éµÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬²»·¨»á¼ûÁËÓëAlert Alarm¿Í»§Ïà¹ØµÄÊý¾Ý¡£¡£¡£¡£¾³õ³ÌÐò²é£¬£¬£¬£¬£¬£¬Verisure×ÔÉíÍøÂç¼°½¹µãϵͳδ·¢Ã÷ÈëÇÖºÛ¼££¬£¬£¬£¬£¬£¬ÊÂÎñ½öÓ°ÏìµÚÈý·½¼Æ·Ñϵͳ£¬£¬£¬£¬£¬£¬µ«ÒѲ¨¼°ÈðµäÔ¼3.5ÍòÃûAlert AlarmµÄÏÖÓм°Ç°Óû§¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¿Í»§È«Ãû¡¢µØµã¡¢µç×ÓÓʼþµØµã¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£VerisureÇ¿µ÷£¬£¬£¬£¬£¬£¬Ö»¹ÜÊý¾Ý»á¼ûȨÏÞ¡°ÓÐÏÞ¡±£¬£¬£¬£¬£¬£¬µ«ÒÑÆô¶¯ÖÜÈ«ÊӲ첢Ó뾯·½¡¢î¿Ïµ²¿·ÖÏàÖú£¬£¬£¬£¬£¬£¬ºóÐø½«ÊµÊ±ÏòÊÜÓ°Ïì¿Í»§×ª´ïÏ£Íû¡£¡£¡£¡£Alert Alarm×÷ΪVerisureÆìÏÂרעסլ¡¢¹«Ô¢¼°Ð¡ÐÍÆóÒµÇ徲ЧÀ͵IJ¿·Ö£¬£¬£¬£¬£¬£¬ÔÚÈðµäÓµÓв»µ½6000Ãû¶©ÔÄÓû§£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÏÖʵӰÏì¹æÄ£¸ü¹ã£¬£¬£¬£¬£¬£¬Éæ¼°ÀúÊ·Óû§Êý¾Ý¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬VerisureÕýÓëÇå¾²ÕÕÁÏÏàÖúÅŲéÎó²î£¬£¬£¬£¬£¬£¬²¢ºôÓõ¿Í»§Ð¡ÐÄ´¹ÂÚ¹¥»÷¼°Éí·Ýڲơ£¡£¡£¡£
https://cybernews.com/security/verisure-data-breach/
4. AWSÈ«Çò´ó¹æÄ£ÖÐÖ¹ÖÂ¶àÆ½Ì¨Ì±»¾£¬£¬£¬£¬£¬£¬Ð§Àͻָ´Àú³ÌÒ»Á¬Íƽø
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÑÇÂíÑ·AWSÔâÓöÈ«ÇòÐÔ´ó¹æÄ£ÖÐÖ¹ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÍòÍøÕ¾¼°Ð§ÀÍ̱»¾£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£º¸ÇÃÀ¹ú¡¢Å·Ö޵ȶà¸öµØÇø¡£¡£¡£¡£´Ë´ÎÖÐֹʼÓÚÃÀ¹ú¶«²¿Ê±¼äÆÆÏþ4:30×óÓÒ£¬£¬£¬£¬£¬£¬Ò»Á¬Ô¼45·ÖÖӺ󲿷ÖЧÀÍ×îÏȻָ´£¬£¬£¬£¬£¬£¬µ«ºóÐøÓÖÒòÍøÂç¸ºÔØÆ½ºâÆ÷ÎÊÌâ·ºÆðÖØ¸´£¬£¬£¬£¬£¬£¬×èÖ¹µ±ÈÕÏÂÖç12:06£¬£¬£¬£¬£¬£¬AWSÐû²¼ÒÑͨ¹ýÌØÊ⻺½â²½·¥»Ö¸´ÅþÁ¬ÐÔ¼°API¹¦Ð§£¬£¬£¬£¬£¬£¬µ«ÐÂEC2ʵÀýÆô¶¯ÈÔÊÜÏÞ£¬£¬£¬£¬£¬£¬Ô¤¼ÆÌ«Æ½ÑóÏÄÁîʱÉÏÎç10:00ǰ¸üÐÂÏ£Íû¡£¡£¡£¡£¾ÝAWS¿µ½¡Ò³ÃæÅû¶£¬£¬£¬£¬£¬£¬ÎÊÌâ½¹µãÔ´ÓÚUS-EAST-1ÇøÓòDynamoDB API¶ËµãµÄDNSÆÊÎö¹ÊÕÏ£¬£¬£¬£¬£¬£¬Òý·¢¶à¸öЧÀ͹ýʧÂÊÓëÑÓ³Ù¼¤Ôö£¬£¬£¬£¬£¬£¬°üÀ¨Amazon.com¡¢Prime Video¡¢Perplexity AI¡¢CanvaµÈ½¹µãƽ̨¾ùÊܲ¨¼°¡£¡£¡£¡£ÏêϸÊÜÓ°ÏìЧÀÍÇåµ¥ÏÔʾ£¬£¬£¬£¬£¬£¬³ýÑÇÂíÑ·×ÔÓªÓªÒµÍ⣬£¬£¬£¬£¬£¬Epic GamesÆìÏ¡¶±¤ÀÝÖ®Ò¹¡·£¨µÇ¼¹¦Ð§Ì±»¾£©¡¢Roblox¡¢Hulu¡¢Snapchat¡¢Grammarly¡¢Roblox¼°½ÌÓýƽ̨CanvasµÈ15¸öÖ÷ҪЧÀÍͨ¹ýDowndetectorÈ·ÈÏÖÐÖ¹£¬£¬£¬£¬£¬£¬CanvaÔÚ×´Ì¬Ò³ÃæÃ÷È·Ö¸ÍÉ»¯ÎóÂÊÏÔÖøÉÏÉýÓ°ÏìͼÏñ±à¼µÈ¹¦Ð§£¬£¬£¬£¬£¬£¬Fortnite¡¢PerplexityÒà֤ʵЧÀÍÏÂÏß¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/aws-outage-crashes-amazon-prime-video-fortnite-perplexity-and-more/
5. CISAÈ·ÈÏOracle E-Business Suite SSRFÎó²îÔâʹÓÃ
10ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Oracle E-Business SuiteµÄCVE-2025-61884Îó²îÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÓÚ2025Äê11ÔÂ10ÈÕǰÍê³ÉÐÞ²¹¡£¡£¡£¡£¸ÃÎó²îΪOracle ConfiguratorÔËÐÐʱ×é¼þÖеÄЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬£¬£¬£¬£¬£¬OracleÓÚ10ÔÂ11ÈÕÅû¶ʱ½«ÆäÑÏÖØÐÔÆÀ¼¶Îª7.5£¬£¬£¬£¬£¬£¬ÖÒÑÔÆäÒ×±»Ê¹ÓÃÒÔ¡°Î´¾ÊÚȨ»á¼ûÒªº¦Êý¾Ý»òÍêÈ«»á¼ûËùÓÐOracle Configurator¿É»á¼ûÊý¾Ý¡±¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓë7Ô¹¥»÷ÖÐй¶µÄÎó²îÖ±½ÓÏà¹Ø¡£¡£¡£¡£10Ô³õ£¬£¬£¬£¬£¬£¬MandiantÅû¶ClopÀÕË÷Èí¼þÍÅ»ïÒÑÏòÆóÒµ·¢ËÍÀÕË÷Óʼþ£¬£¬£¬£¬£¬£¬Éù³ÆÊ¹ÓÃÁãÈÕÎó²îÇÔÈ¡ÁËOracle EBSÊý¾Ý¡£¡£¡£¡£Oracle»ØÓ¦³Æ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÁË7ÔÂÒÑÐÞ²¹µÄÎó²î¡£¡£¡£¡£½øÒ»³ÌÐò²éÕ¹ÏÖ£¬£¬£¬£¬£¬£¬Oracle EBS³ÉΪÁ½Æð×ÔÁ¦¹¥»÷µÄÄ¿µÄ£º7Ô¹¥»÷Õë¶Ô¡°/configurator/UiServlet¡±¶ËµãµÄSSRFÎó²î£¨¼´CVE-2025-61884£©£¬£¬£¬£¬£¬£¬¶ø8Ô¹¥»÷ÔòʹÓá°/OA_HTML/SyncServlet¡±¶ËµãµÄÁíÒ»Îó²î£¨CVE-2025-61882£©£¬£¬£¬£¬£¬£¬ºóÕß±»¹éÒòÓÚClopÍŻ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw/
6. ¶í¹ØÁªÀÕË÷ÍÅ»ïINC RansomÍþв¹ûÕæ¸ß¶û·ò¾ÞÍ·Êý¾Ý
10ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹ÓйصÄÀÕË÷Èí¼þÍÅ»ïINC Ransom 10ÔÂ16ÈÕÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû³Æ£¬£¬£¬£¬£¬£¬ÒÑÇÔÈ¡¸ß¶û·ò´ò°ç¾ÞÍ·Summit Golf Brands47GBÊý¾Ý£¬£¬£¬£¬£¬£¬²¢Æô¶¯Êý¾Ý¹ûÕæµ¹¼ÆÊ±£¬£¬£¬£¬£¬£¬¾àËùν¡°Êý¾ÝÐû²¼¡±½öÊ£ÈýÌì¡£¡£¡£¡£¸ÃÍÅ»ïÉÐδÌṩÊý¾ÝÑù±¾×ôÖ¤£¬£¬£¬£¬£¬£¬´Ë¾Ù±»ÊÓΪÆÈʹÆóÒµÖ§¸¶Êê½ðµÄÕ½ÂÔÊֶΡ£¡£¡£¡£Summit Golf BrandsÆìϰüÀ¨Zero Restriction¡¢B. DraddyµÈ×ÅÃûÆ·ÅÆ£¬£¬£¬£¬£¬£¬ÄêÓªÊÕ2790ÍòÃÀÔª¡£¡£¡£¡£INC Ransom½¨ÉèÓÚ2023Äê7Ô£¬£¬£¬£¬£¬£¬ÒÑÔì³É234ÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬ÒÔ¡°¶àÖØÀÕË÷¡±Öø³Æ£º²»µ«¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬»¹ÇÔÈ¡Êý¾Ý²¢Íþвй¶£¬£¬£¬£¬£¬£¬ÉõÖÁÒÔ¡°¸¶·Ñ¼´ÌáÉýϵͳÇå¾²¡±µÄŤÇú˵´ÇÓÕÆÊê½ð¡£¡£¡£¡£´Ë´ÎÕë¶ÔSummit Golf BrandsµÄ¹¥»÷£¬£¬£¬£¬£¬£¬Ì»Â¶ÁËÀÕË÷Èí¼þÍÅ»ï¶ÔÉÌҵʵÌåµÄÒ»Á¬Íþв¡£¡£¡£¡£Ëæ×ŵ¹¼ÆÊ±ÁÚ½ü£¬£¬£¬£¬£¬£¬ÆóÒµÃæÁÙÁ½ÄÑ£ºÖ§¸¶Êê½ð¿ÉÄÜÖú³¤·¸·¨£¬£¬£¬£¬£¬£¬¾Ü¾øÔò¿ÉÄÜÃæÁÙÊý¾Ýй¶Σº¦¼°ÉùÓþË𺦡£¡£¡£¡£
https://cybernews.com/security/hackers-threaten-to-drop-47gb-of-top-golf-brands-secrets/


¾©¹«Íø°²±¸11010802024551ºÅ