Space BearsÀÕË÷×éÖ¯½èQuasarÎó²îÇÔÈ¡ComcastÊý¾Ý

Ðû²¼Ê±¼ä 2025-12-10

1. Space BearsÀÕË÷×éÖ¯½èQuasarÎó²îÇÔÈ¡ComcastÊý¾Ý


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬Space BearsÀÕË÷Èí¼þ×éÖ¯¿ËÈÕÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû³Æ£¬£¬£¬£¬£¬Í¨¹ý×ôÖÎÑÇÖݵçÐŹ¤³Ì³Ð°üÉÌQuasar Inc.µÄÎó²î»ñÈ¡ÁËComcastÄÚ²¿×ÊÁÏ£¬£¬£¬£¬£¬²¢Í¬²½½«QuasarÁÐΪ×ÔÁ¦Êܺ¦Õߣ¬£¬£¬£¬£¬ÌåÏÖÁ½Æð¹ØÁªÊÂÎñ¡£¡£¡£¡£¡£¸Ã×éÖ¯2024Äê4Ô·ºÆð£¬£¬£¬£¬£¬±»ÆÊÎöΪÊý¾ÝÇÔÈ¡ÐÍÀÕË÷ÕûÌ壬£¬£¬£¬£¬³£Í¨¹ýɾ³ýÃô¸ÐÎļþ²¢Ë÷ÒªÊê½ð×èÖ¹Ðû²¼£¬£¬£¬£¬£¬ÓëPhobosÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©³ÌÐò±£´æ¹ØÁª£¬£¬£¬£¬£¬ÆäйÃÜÍøÕ¾±»ÊÓΪÏà¹Ø»î¶¯¹²ÏíÐû²¼µã¡£¡£¡£¡£¡£Õë¶ÔComcastµÄÖ¸¿ØÖУ¬£¬£¬£¬£¬Space BearsÉù³ÆQuasarΪComcast¼°GenesisÏîÄ¿ÖÆ×÷ÊÖÒÕÎĵµ£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡°üÀ¨¶àµØ¶¼»áÉè¼ÆÎĵµºÍ¹«ÓÃÉèÊ©ÍýÏëͼµÄÐÅÏ¢£¬£¬£¬£¬£¬²¢É趨6Ììµ¹¼ÆÊ±£¬£¬£¬£¬£¬ÓâÆÚ½«¹ûÕæÊý¾Ý£¬£¬£¬£¬£¬Ê±´úÌṩÊý¾ÝÊÛÂôЧÀÍ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬¸Ã×é֯δÌṩÎļþÑù±¾£¬£¬£¬£¬£¬×ÔÁ¦ÑéÖ¤Ôݲ»¿ÉÐС£¡£¡£¡£¡£Quasar Inc.ÓÚ2025Äê12ÔÂ4ÈÕ±»µ¥¶ÀÁÐΪÊܺ¦Õߣ¬£¬£¬£¬£¬Space BearsÐû³Æ»ñÈ¡ÆäÍøÂçÏîÄ¿¡¢¶¼»áÍýÏëͼ¡¢Í¨Ñ¶½á¹¹µÈÄÚ²¿Îĵµ£¬£¬£¬£¬£¬²¢¿ªÆôËÄÌìµ¹¼ÆÊ±ÊÛÂôÊý¾Ý¡£¡£¡£¡£¡£


https://hackread.com/space-bears-ransomware-comcast-quasar-breach/


2. WordPress²å¼þ¸ßΣÎó²îÔâ´ó¹æÄ£Ê¹ÓÃ


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬Wordfence¼à²âÏÔʾ£¬£¬£¬£¬£¬WordPressƽ̨µÄSneeit Framework²å¼þ±£´æ¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²îCVE-2025-6389£¨CVSSÆÀ·Ö9.8£©£¬£¬£¬£¬£¬Ó°Ïì8.3¼°ÒÔϰ汾£¬£¬£¬£¬£¬ÒÑͨ¹ý2025Äê8ÔÂ5ÈÕÐû²¼µÄ8.4°æ±¾ÐÞ¸´¡£¡£¡£¡£¡£¸Ã²å¼þ»îÔ¾×°ÖÃÁ¿³¬1700¸ö£¬£¬£¬£¬£¬Îó²îÔ´ÓÚº¯ÊýδÑéÖ¤Óû§ÊäÈëÖ±½ÓÖ´ÐдúÂ룬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´Ë½¨Éè¶ñÒâÖÎÀíÔ±ÕË»§¡¢Ö²ÈëºóÃÅ£¬£¬£¬£¬£¬»òÖØ¶¨Ïò·Ã¿ÍÖÁ´¹ÂÚ/¶ñÒâÕ¾µã¡£¡£¡£¡£¡£×Ô11ÔÂ24ÈÕÎó²î¹ûÕæºó£¬£¬£¬£¬£¬WordfenceÒÑ×èµ²³¬13.1Íò´Î¹¥»÷£¬£¬£¬£¬£¬24СʱÄÚ¼´¼Í¼15381´Î¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¡°/wp-admin/admin-ajax.php¡±¶Ëµã·¢ËÍÌØÖÆÇëÇ󣬣¬£¬£¬£¬½¨Éè¡°arudikadis¡±µÈ¶ñÒâÕË»§£¬£¬£¬£¬£¬ÉÏ´«¡°tijtewmg.php¡±µÈ¾ß±¸Ä¿Â¼É¨Ãè¡¢Îļþ²Ù×÷¹¦Ð§µÄ¶ñÒâÎļþ£¬£¬£¬£¬£¬²¢´ÓÍⲿЧÀÍÆ÷ÏÂÔØ¡°.htaccess¡±ÎļþÈÆ¹ý»á¼ûÏÞÖÆ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬VulnCheck¼à²âµ½¹¥»÷ÕßʹÓÃICTBroadcastÎó²îCVE-2025-2611£¨CVSSÆÀ·Ö9.3£©£¬£¬£¬£¬£¬Í¨¹ýÏÂÔØShell¾ç±¾¼ÓÔØÆ÷Èö²¥Frost DDoS½©Ê¬ÍøÂç¡£¡£¡£¡£¡£


https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html


3. ´¹ÂÚ¹¤¾ß°üGhostFrameÏòÈ«ÇòÊý°ÙÍòÓû§Ìᳫ¹¥»÷


12ÔÂ8ÈÕ£¬£¬£¬£¬£¬BarracudaÇå¾²Ñо¿Ô±ÓÚ2025Äê9ÔÂÊ״η¢Ã÷ÃûΪGhostFrameµÄÐÂÐ͸ßÖØÆ¯ºó´¹ÂÚ¹¤¾ß°ü£¬£¬£¬£¬£¬¸Ã¹¤¾ßÒÑÌᳫ³¬100Íò´Î¹¥»÷£¬£¬£¬£¬£¬±ê¼Ç×Å´¹ÂÚ¼´Ð§ÀÍ£¨PaaS£©ÊÖÒÕµÄΣÏÕÉý¼¶¡£¡£¡£¡£¡£Æä½¹µãÍþвÔÚÓÚ½«¶ñÒâ²Ù×÷ÒþÄäÓÚÒþÐÎiframe¿ò¼ÜÖУ¬£¬£¬£¬£¬Í¨¹ýÌìÉú¿´ËÆÎÞº¦µÄHTMLÎļþ£¬£¬£¬£¬£¬ÔÚÒ³Ãæµ×²ã¼ÓÔØÀ´×Ô¶¯Ì¬×ÓÓòÃûµÄÕæÊµ´¹ÂÚÄÚÈÝ£¬£¬£¬£¬£¬Ê¹Çå¾²¹¤¾ßÄÑÒÔ¼ì²â¡£¡£¡£¡£¡£¹¥»÷Á÷³Ì·ÖΪÁ½½×¶Î£ºÊ×ÏÈͨ¹ýαװ³É¡°±£ÃÜÌõÔ¼¡±¡°ÃÜÂëÖØÖá±µÈÖ÷ÌâµÄ´¹ÂÚÓʼþÓÕµ¼Óû§µã»÷£»£»£»£»£»ËæºóÓû§½øÈë¿´ËÆÇå¾²µÄÍøÒ³£¬£¬£¬£¬£¬µ×²ãiframe´Óʵʱ±ä»»µÄ×ÓÓòÃû¼ÓÔØ¹¥»÷ÄÚÈÝ¡£¡£¡£¡£¡£Îª¹æ±Ü¼ì²â£¬£¬£¬£¬£¬¹¥»÷ÕßΪÿ¸öÄ¿µÄµ¥¶À½¨ÉèרÊô×ÓÓòÃû£¬£¬£¬£¬£¬²¢ÄÚÖ÷´ÆÊÎö¹¦Ð§£¬£¬£¬£¬£¬Èç½ûÓÃÓÒ¼ü²Ëµ¥¡¢ÆÁÕÏ¿ì½Ý¼ü¼°¹Ø±Õ¿ª·¢Õß¹¤¾ß£¬£¬£¬£¬£¬×è°­Çå¾²ºË²é¡£¡£¡£¡£¡£GhostFrame´îÔØ¶àÏî¸ßÒþ²ØÌØÕ÷£º´¹ÂÚ±íµ¥Òþ²ØÔÚ´óÎļþͼÏñÁ÷ÖÐÈÆ¹ý¹Å°åɨÃ裻£»£»£»£»×ÓÓòÃû¶¯Ì¬ÂÖ»»ÅäºÏ±¸ÓÃiframe¿ò¼Ü£¬£¬£¬£¬£¬Ó¦¶ÔJavaScript×èµ²£»£»£»£»£»Ö§³Ö¶àÄ¿µÄÎÞаÊÊÅ䣬£¬£¬£¬£¬ÎÞÐèÐÞ¸ÄÖ÷Ò³Ãæ¼´¿ÉÌæ»»´¹ÂÚÄÚÈÝ£»£»£»£»£»Í¨¹ýÐÞ¸ÄÒ³ÃæÎÊÌâºÍͼ±ê·ÂðÕýµ±Ð§ÀÍ£¬£¬£¬£¬£¬ÔöÇ¿Î±×°ÕæÊµÐÔ¡£¡£¡£¡£¡£


https://cybersecuritynews.com/new-ghostframe-super-stealthy-phishing-kit-attacks-millions-of-users-worldwide/


4. ºÚ¿ÍʹÓÃReact2ShellÎó²îÌᳫEtherRAT¶ñÒâÈí¼þ¹¥»÷


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾SysdigÅû¶ÁËÒ»ÖÖÃûΪEtherRATµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬Æäͨ¹ýʹÓÃReact/Next.js¿ò¼ÜÖеĸßΣÎó²îCVE-2025-55182£¨React2Shell£©ÊµÑé¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚReact Server ComponentsµÄ¡°Flight¡±Ð­Òé·´ÐòÁл¯È±ÏÝ£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâHTTPÇëÇóÖ´ÐÐÔ¶³Ì´úÂ룬£¬£¬£¬£¬Ó°Ïì´ó×ÚÔÆÇéÐΡ£¡£¡£¡£¡£SysdigÑо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬EtherRATÓ볯ÏÊ¡°Ñ¬È¾ÐÔ·Ã̸¡±»î¶¯Ê¹ÓõŤ¾ß±£´æ¹ØÁªÐÔ£¬£¬£¬£¬£¬µ«¾ß±¸ÆæÒìÊÖÒÕÌØÕ÷¡£¡£¡£¡£¡£EtherRAT½ÓÄɶà½×¶Î¹¥»÷Á´£ºÊ×ÏÈͨ¹ýReact2ShellÎó²îÔÚÄ¿µÄϵͳִÐÐBase64±àÂëµÄshellÏÂÁ£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐжñÒâ¾ç±¾s.sh¡£¡£¡£¡£¡£¸Ã¾ç±¾»á½¨ÉèÒþ²ØÄ¿Â¼£¬£¬£¬£¬£¬°²ÅÅÕýµ±Node.jsÔËÐÐʱ¼°¼ÓÃÜÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬×îÖÕ½âÃܳöEtherRATÖ²Èë³ÌÐò¡£¡£¡£¡£¡£Æä½¹µãÁ¢ÒìÔÚÓÚ»ùÓÚÒÔÌ«·»ÖÇÄܺÏÔ¼µÄC2ͨѶ»úÖÆ£¬£¬£¬£¬£¬Í¨¹ýÅÌÎÊ9¸ö¹«¹²ÒÔÌ«·»RPC½Úµã²¢½ÓÄÉ´ó¶¼ÏìÓ¦Õ½ÂÔµÖÓùµ¥µã¹ÊÕÏ£¬£¬£¬£¬£¬ÊµÏÖÎÞаÇÒ¿¹×ÌÈŵÄÖ¸Áî´«Êä¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-react2shell-flaw-in-etherrat-malware-attacks/


5. ÐÂÐÍMirai±äÖÖʹÓú£ÊÂDVRÎó²îʵÑéÖØ´ó¹¥»÷


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬CydomeÑо¿Ö°Ô±·¢Ã÷ÃûΪBroadsideµÄÐÂÐÍMirai½©Ê¬ÍøÂç±äÖÖ£¬£¬£¬£¬£¬¸Ã±äÖÖÕë¶Ôº£ÊÂÎïÊ¢ÐÐÒµ£¬£¬£¬£¬£¬Ê¹Óô¬²°¼°×°±¸Ê¹ÓõÄTBK DVR×°±¸ÖеÄÏÂÁî×¢ÈëÎó²îCVE-2024-3721Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ2024Äê4ÔÂÅû¶²¢¸½´øPoC´úÂ룬£¬£¬£¬£¬ÖÁ2025ÄêÖÐÒѱ»¶à¸öDDoS½©Ê¬ÍøÂçÆÕ±éʹÓᣡ£¡£¡£¡£Mirai½©Ê¬ÍøÂçÔ´´úÂëÔÚ½üÊ®Äêǰ¹ûÕæºó£¬£¬£¬£¬£¬Ò»Á¬±»ÍøÂç·¸·¨·Ö×ÓÐÞ¸ÄÖØÓÃÒÔÇý¶¯´ó¹æÄ£¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬£¬TBK DVRÎó²îͬÑùÓ°ÏìÒÔCeNova¡¢Night Owl¡¢QSeeµÈÆ·ÅÆÖØÐ°ü×°µÄÐͺţ¬£¬£¬£¬£¬¶Ôº½Ô˹«Ë¾×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£ÈëÇÖ×°±¸¿ÉÄÜʹ¹¥»÷Õß»á¼û¼ÝÊ»ÊÒ¡¢»õ²Õ»ò»ú²ÕµÄCCTV»­Ã棬£¬£¬£¬£¬×ÌÈÅÎÀÐÇͨѶ£¬£¬£¬£¬£¬»òºáÏòÒÆ¶¯ÖÁ´¬²°Òªº¦ÔËÓªÊÖÒÕϵͳ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬Broadside²»µ«ÏÞÓÚDDoS¹¥»÷£¬£¬£¬£¬£¬Æä×Ô¶¯ÇÔȡϵͳƾ֤ÎļþµÄÐÐΪÅú×¢£¬£¬£¬£¬£¬¹¥»÷ÕßÒâͼ½«ÊÜѬȾװ±¸´Ó¼òÆÓ½©Ê¬ÍøÂç½Úµãת±äΪսÂÔפ×ãµã¡£¡£¡£¡£¡£


https://securityaffairs.com/185491/malware/broadside-botnet-hits-tbk-dvrs-raising-alarms-for-maritime-logistics.html


6. Vitas HealthcareÔâÍøÂç¹¥»÷Ö³¬30ÍòÈËÐÅϢй¶


12ÔÂ9ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©Ò½ÁƱ£½¡Êý¾Ýй¶׷×ÙÆ÷ÏÔʾ£¬£¬£¬£¬£¬ÃÀ¹ú×î´óÓªÀûÐÔÁÙÖÕ¾ì×¢Á¬Ëø»ú¹¹Vitas Healthcare½üÆÚ±¬·¢ÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬Ó°ÏìÈËÊý´ï319,177ÈË¡£¡£¡£¡£¡£¸Ã»ú¹¹Á¥ÊôÓÚChemed¼¯ÍÅ£¬£¬£¬£¬£¬ÆìÏÂVitas Hospice ServicesÓÚ10ÔÂ24ÈÕ·¢Ã÷ϵͳÈëÇÖ£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾ¹¥»÷Õßͨ¹ý±»µÁÓõũӦÉÌÕË»§£¬£¬£¬£¬£¬ÔÚ9ÔÂ21ÈÕÖÁ10ÔÂ27ÈÕʱ´úÒ»Á¬»á¼ûÆäϵͳ£¬£¬£¬£¬£¬²¢ÏÂÔØÁË´ó×Ú»¼Õß¼°½üÇ×µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬°üÀ¨»¼Õß¼°Ç°»¼ÕßµÄÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢ÒÔ¼°Ö§ÊôÁªÏµ·½·¨µÈ½¹µãСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδÃ÷È·´Ë´ÎÊÂÎñÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ÇÒÎÞÒÑÖªÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬µ«ÊÂÎñµÄÑÏÖØÐÔÒÑÒý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬VitasÒÑͨ¹ýרÃÅÊý¾ÝÐ¹Â¶Í¨ÖªÍøÕ¾Ïò¹«ÖÚÅû¶ÊÂÎñÏêÇ飬£¬£¬£¬£¬µ«ÏêϸÊÖÒÕϸ½Ú¼°ºóÐøµ÷½â²½·¥ÉÐδÍêÈ«¹ûÕæ¡£¡£¡£¡£¡£


https://www.securityweek.com/over-300000-individuals-impacted-by-vitas-hospice-data-breach/