CISAÒªÇóÁª°î»ú¹¹½ôÆÈÐÞ¸´HPE OneViewÎó²î

Ðû²¼Ê±¼ä 2026-01-09

1. CISAÒªÇóÁª°î»ú¹¹½ôÆÈÐÞ¸´HPE OneViewÎó²î


1ÔÂ8ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«HPE OneViewµÄCVE-2025-37164Îó²î±ê¼ÇΪ¡°ÕýÔÚ±»Æð¾¢Ê¹Óá±£¬£¬£¬£¬¸ÃÎó²îÊô×î¸ß¼¶±ðΣº¦¡£¡£¡£¡£HPE OneViewÊÇÓÃÓÚ¼¯ÖÐÖÎÀí´æ´¢¡¢Ð§ÀÍÆ÷ºÍÍøÂç×°±¸µÄ»ù´¡¼Ü¹¹ÖÎÀíÈí¼þ£¬£¬£¬£¬ÆÕ±éÓ¦ÓÃÓÚÆóÒµITÇéÐΡ£¡£¡£¡£Îó²îÓÉÔ½ÄÏÇå¾²Ñо¿Ô±Nguyen Quoc Khanh£¨brocked200£©·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬HPEÓÚ2025Äê12ÔÂÖÐÑ®Ðû²¼Çå¾²²¹¶¡£¬£¬£¬£¬µ«Îó²îÓ°Ïìv11.00֮ǰµÄËùÓÐOneView°æ±¾¡£¡£¡£¡£CVE-2025-37164ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßͨ¹ýµÍÖØÆ¯ºó´úÂë×¢Èë¹¥»÷ʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬¹¥»÷ÕßÎÞÐèÍâµØÈ¨ÏÞ¼´¿ÉÍêÈ«¿ØÖÆÊÜÓ°Ïìϵͳ¡£¡£¡£¡£HPEÔÚ12ÔÂ16ÈÕµÄÖÒÑÔÖÐÇ¿µ÷£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܱ»Ô¶³ÌÓû§Ê¹ÓÃÖ´ÐжñÒâ´úÂ룬£¬£¬£¬Ö±½ÓÍþвÆóÒµ½¹µã»ù´¡ÉèÊ©Çå¾²¡£¡£¡£¡£CISAÒѽ«¸ÃÎó²îÄÉÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¬£¬£¬£¬²¢ÒÀ¾Ý2021ÄêÐû²¼µÄBOD 22-01Ö¸Á£¬£¬£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚ2026Äê1ÔÂ28ÈÕǰÍê³ÉϵͳÐÞ¸´¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-tags-max-severity-hpe-oneview-flaw-as-actively-exploited/


2. GoBruteforcer½©Ê¬ÍøÂçÉý¼¶±©Á¦ÆÆ½â¹¥»÷


1ÔÂ7ÈÕ£¬£¬£¬£¬Ò»¿îÃûΪGoBruteforcerµÄ¸ßÖØÆ¯ºóGoÓïÑÔ½©Ê¬ÍøÂçÕý¶ÔÈ«ÇòLinuxЧÀÍÆ÷ÌᳫǿÁÒ¹¥»÷£¬£¬£¬£¬Í¨¹ý±©Á¦ÆÆ½âÊÖ¶ÎʵÑé»ñÈ¡FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdminµÈ¹«ÍøÌ»Â¶Ð§À͵ÄÈõÃÜÂë¡£¡£¡£¡£Check Point Research¼Í¼ÏÔʾ£¬£¬£¬£¬Æä2025Äê±äÖÖ°æ±¾ÊÖÒÕˮƽ´ó·ùÉý¼¶£¬£¬£¬£¬Òѹ¥ÏÝÊýÍǫ̀ЧÀÍÆ÷£¬£¬£¬£¬È«Çò³¬5Íǫ̀ЧÀÍÆ÷ÃæÁÙΣº¦£¬£¬£¬£¬Éæ¼°570ÍòFTP¡¢223ÍòMySQL¼°56ÍòPostgreSQLĬÈ϶˿Ú̻¶װ±¸¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç½ÓÄÉÄ£¿£¿£¿£¿£¿é»¯¼Ü¹¹£¬£¬£¬£¬°üÀ¨ÍøÒ³ºóÃÅ¡¢ÏÂÔØÆ÷¡¢IRC½©Ê¬³ÌÐò¼°±©Á¦ÆÆ½âÄ£¿£¿£¿£¿£¿é¡£¡£¡£¡£¹¥»÷ÍÆÊÖÖ÷ÒªÔ´ÓÚÔËάְԱ¸´ÓÃAIÌìÉúµÄЧÀÍÆ÷ÉèÖÃÄ£°å£¬£¬£¬£¬ÒÔ¼°XAMPPµÈÀϾɼ¯³ÉÇéÐÎȱ·¦¼Ó¹Ì¡£¡£¡£¡£ÆäÃÜÂëÁбíÓë1000ÍòÌõй¶ÃÜÂëÊý¾Ý¿âÖØºÏÂÊ´ï2.44%£¬£¬£¬£¬»ùÓÚ375-600¸öÈõÃÜÂëÌìÉú±äÌ壬£¬£¬£¬Á¬ÏµÖØ´ó̻¶ЧÀÍ»ùÊýÐγɸ߾­¼ÃÐ§Òæ¹¥»÷¡£¡£¡£¡£2025±äÖÖÍêÈ«ÖØ¹¹IRC×é¼þΪGoÓïÑÔ£¬£¬£¬£¬Ê¹ÓÃGarbler¹¤¾ßÉî¶È»ìÏý´úÂ룬£¬£¬£¬ÐÂÔöÀú³ÌαװÊÖÒÕ£¬£¬£¬£¬ÌÓ±ÜÇå¾²¼ì²â¡£¡£¡£¡£


https://cybersecuritynews.com/gobruteforcer-botnet/


3. ¶ñÒânpm°üÈö²¥NodeCordRAT¶ñÒâÈí¼þ


1ÔÂ8ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÒ»ÆðÕë¶ÔnpmÉú̬µÄ¶ñÒâÈí¼þÈö²¥ÊÂÎñ£¬£¬£¬£¬·¢Ã÷Èý¸öÓÉÓû§"wenmoonx"ÉÏ´«µÄ¶ñÒânpmÈí¼þ°ü¡ª¡ªbitcoin-main-lib£¨2,300´ÎÏÂÔØ£©¡¢bitcoin-lib-js£¨193´ÎÏÂÔØ£©¼°bip40£¨970´ÎÏÂÔØ£©¡£¡£¡£¡£×èÖ¹2025Äê11Ô£¬£¬£¬£¬ÕâЩ°üÒѱ»È«ÊÖϼÜ£¬£¬£¬£¬µ«ÒѶԿª·¢ÕßÉçÇøÔì³ÉʵÖÊÐÔÍþв¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬Ç°Á½¸ö¶ñÒâ°üÔÚ×°ÖÃʱ»áÖ´ÐÐpostinstall.cjs¾ç±¾£¬£¬£¬£¬×Ô¶¯×°ÖðüÀ¨¶ñÒâ¸ºÔØµÄbip40°ü¡£¡£¡£¡£¸Ã×îÖÕ¸ºÔر»ÃüÃûΪNodeCordRAT£¬£¬£¬£¬ÊÇÒ»ÖÖ¾ßÓÐÊý¾ÝÇÔÈ¡ÄÜÁ¦µÄÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£ÆäÃû³ÆÔ´ÓÚË«ÖØÈö²¥ÌØÕ÷£ºÊ¹ÓÃnpm×÷Ϊ³õʼÈö²¥Ç°ÑÔ£¬£¬£¬£¬Í¨¹ýDiscordЧÀÍÆ÷½¨ÉèÏÂÁîÓë¿ØÖÆ£¨C&C£©Í¨µÀ¡£¡£¡£¡£¸ÃľÂí¾ß±¸¶àÖØÎ£º¦¹¦Ð§£º¿ÉÇÔÈ¡¹È¸èChromeä¯ÀÀÆ÷ƾ֤¡¢APIÁîÅÆ¼°MetaMaskµÈ¼ÓÃÜÇ®±ÒÇ®°üµÄÖú¼Ç´Ê£»£»£»£»£»£»Í¨¹ýÓ²±àÂëµÄDiscordЧÀÍÆ÷ÎüÊÕÖ¸Á£¬£¬£¬Ö§³ÖÖ´ÐÐí§ÒâshellÏÂÁî¡¢½ØÈ¡×ÀÃæÆÁÄ»¼°ÉÏ´«Ö¸¶¨ÎļþµÈ²Ù×÷¡£¡£¡£¡£Êý¾Ýͨ¹ýDiscord APIµÄ/messages¶ËµãÒÔ¸½¼þÐÎʽÉÏ´«ÖÁ˽ÃÜÆµµÀ£¬£¬£¬£¬ÐγÉÒþ²ØµÄÇÔÃÜÁ´Â·¡£¡£¡£¡£


https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html


4. °ÍÎ÷WhatsAppÓû§ÔâAstarothľÂí¶¨Ïò¹¥»÷


1ÔÂ8ÈÕ£¬£¬£¬£¬°²¿Ëŵ˹ÍþвÑо¿ÍŶӿËÈÕÅû¶´úºÅ"·ÛºìºÓëà"µÄÐÂÐ͹¥»÷»î¶¯£¬£¬£¬£¬¹¥»÷ÕßÒÔ°ÍÎ÷WhatsAppÓû§ÎªÄ¿µÄ£¬£¬£¬£¬Í¨¹ý¸Ãƽ̨Èö²¥¾ßÓжàÄ£¿£¿£¿£¿£¿é»¯ÌØÕ÷µÄAstaroth£¨ÓÖÃû"¼ª¶û´ïÂí"£©WindowsÒøÐÐľÂí¡£¡£¡£¡£¸ÃľÂí×Ô2015ÄêÆðÒ»Á¬»îÔ¾ÓÚÀ­ÃÀµØÇø£¬£¬£¬£¬ÓÈÒÔ°ÍÎ÷ÎªÖØÔÖÇø£¬£¬£¬£¬½¹µãÄ¿µÄΪÇÔÈ¡Óû§Êý¾Ý¼°ÒøÐÐÆ¾Ö¤¡£¡£¡£¡£¹¥»÷Á´ÒÔZIPѹËõ°üΪ³õÊ¼ÔØÌ壬£¬£¬£¬ÄÚº¬Î±×°³ÉÕý³£ÎļþµÄVB¾ç±¾¼°MSI×°ÖóÌÐò¡£¡£¡£¡£µ±Êܺ¦Õß½âѹ²¢Ö´Ðо籾ºó£¬£¬£¬£¬»á´¥·¢PowerShell/Python¾ç±¾ÏÂÔØ£¬£¬£¬£¬Æô¶¯×°±¸ÈëÇÖÁ÷³Ì¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÏÔÖøÌØÕ÷ÔÚÓÚÐÂÔöµÄPythonÓïÑÔ¿ª·¢WhatsAppÈ䳿Ä£¿£¿£¿£¿£¿é£¬£¬£¬£¬¸ÃÄ£¿£¿£¿£¿£¿é¿É×Ô¶¯ÍøÂçÊܺ¦ÕßͨѶ¼£¬£¬£¬£¬²¢ÏòËùÓÐÁªÏµÈËת·¢º¬¶ñÒâZIPµÄÈö²¥ÐÂÎÅ£¬£¬£¬£¬Ðγɼ¸ºÎ¼¶À©É¢Ð§Ó¦¡£¡£¡£¡£Astaroth½ÓÄÉÄ£¿£¿£¿£¿£¿é»¯¼Ü¹¹Éè¼Æ£ºÆä½¹µã³ÌÐòÓɵ¶û¸£ÓïÑÔ±àд£¬£¬£¬£¬×°ÖóÌÐòÒÀÍÐVB¾ç±¾ÔËÐУ¬£¬£¬£¬¶øÈö²¥Ä£¿£¿£¿£¿£¿éÔòʹÓÃPython¿ª·¢£¬£¬£¬£¬ÌåÏÖÍþвÐÐΪÕß¶Ô¶àÓïÑÔ±à³ÌµÄÎÞаÔËÓᣡ£¡£¡£ÒøÐÐľÂíÄ£¿£¿£¿£¿£¿éÔÚºǫ́һÁ¬¼à¿ØÓû§ä¯ÀÀÆ÷»î¶¯£¬£¬£¬£¬µ±¼ì²âµ½»á¼ûÒøÐÐÏà¹ØÍøÖ·Ê±£¬£¬£¬£¬Á¬Ã¦¼¤»î²¢ÇÔÈ¡µÇ¼ƾ֤£¬£¬£¬£¬ÊµÏÖ¾­¼Ã·¸·¨Ä¿µÄ¡£¡£¡£¡£


https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html


5. ³¯ÏÊKimsukiʹÓöñÒâ¶þάÂë¹¥»÷ÃÀ¹ú×éÖ¯


1ÔÂ8ÈÕ£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö¿ËÈÕÐû²¼½ôÆÈ¾¯±¨£¬£¬£¬£¬½ÒÆÆ³¯Ïʹٷ½Ö§³ÖµÄºÚ¿Í×éÖ¯Kimsuki£¨APT43£©Õýͨ¹ý¶ñÒâ¶þάÂëÌᳫÕë¶ÔÃÀ¹ú×éÖ¯µÄÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£´Ë´Î¹¥»÷Ö÷ÒªÃé×¼¼ÓÈ볯ÏÊÏà¹ØÕþ²ß¡¢Ñо¿ºÍÆÊÎöµÄÃÀ¹ú»ú¹¹£¬£¬£¬£¬°üÀ¨·ÇÕþ¸®×éÖ¯¡¢Öǿ⡢ѧÊõ»ú¹¹¡¢Õ½ÂÔ×Éѯ¹«Ë¾¼°Õþ¸®ÊµÌå¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËͰüÀ¨¶ñÒâ¶þάÂëµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬ÓÕʹÊܺ¦ÕßɨÃè¶þάÂëºóÖØ¶¨ÏòÖÁαװ³ÉÎʾíÊӲ졢Çå¾²Çý¶¯Æ÷»òÐéαµÇÂ¼Ò³ÃæµÄ¶ñÒâÍøÕ¾¡£¡£¡£¡£É¨Ãèºó£¬£¬£¬£¬Êܺ¦Õß×°±¸»á±»Â·ÓÉÖÁ¹¥»÷Õß¿ØÖƵĻù´¡ÉèÊ©£¬£¬£¬£¬¾ÙÐÐ×°±¸Ö¸ÎÆÊ¶±ð£¬£¬£¬£¬ÍøÂçÓû§ÊðÀíÐÅÏ¢¡¢²Ù×÷ϵͳ¡¢IPµØµã¡¢ÆÁÄ»³ß´ç¼°ÍâµØÓïÑÔµÈÊý¾Ý¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬Êܺ¦Õ߻ῴµ½Ä£ÄâMicrosoft 365¡¢Okta¡¢VPN»òGoogleµÇÂ¼Ò³ÃæµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬£¬×îÖÕÄ¿µÄΪÇÔÈ¡»á¼ûƾ֤»ò»á»°ÁîÅÆ¡£¡£¡£¡£´ËÀ๥»÷ͨ¹ýÒÆ¶¯×°±¸É¨Ãè¶þάÂëµÄÌØÕ÷£¬£¬£¬£¬ÓÐÓÃÈÆ¹ý¹Å°åµç×ÓÓʼþÇå¾²½â¾ö¼Æ»®¼°¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©¡£¡£¡£¡£ÓÉÓÚ¹¥»÷Ô´×ÔδÊÜÖÎÀíµÄÒÆ¶¯×°±¸£¬£¬£¬£¬´¦ÓÚ±ê×¼¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©ºÍÍøÂç¼à¿ØÖ®Í⣬£¬£¬£¬±»ÐÎòΪ¡°²»ÊÜMFA±£»£»£»£»£»£»¤µÄÉí·ÝÈëÇÖÏòÁ¿¡±¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-warns-about-kimsuky-hackers-using-qr-codes-to-phish-us-orgs/


6. ¶ñÒâÈí¼þ¼ÓÔØÆ÷pkr_mtsi¿Éת´ï¶àÖÖÓÐÓÃÔØºÉ


1ÔÂ8ÈÕ£¬£¬£¬£¬ReversingLabs£¨RL£©¿ËÈÕÅû¶£¬£¬£¬£¬Ò»ÖÖÃûΪpkr_mtsiµÄ¶ñÒâWindows´ò°ü³ÌÐò×Ô2025Äê4ÔÂ24ÈÕ·¢Ã÷ÒÔÀ´Ò»Á¬»îÔ¾£¬£¬£¬£¬³ÉΪ´ó¹æÄ£¶ñÒâ¹ã¸æºÍSEOͶ¶¾»î¶¯µÄ½¹µã¼ÓÔØÆ÷¡£¡£¡£¡£¸Ã¹¤¾ßͨ¹ýÐéαÏÂÔØÍøÕ¾ÓÕÆ­Óû§ÏÂÔØÎ±×°³ÉPuTTY¡¢Rufus¡¢Microsoft TeamsµÈÕýµ±Èí¼þµÄľÂí×°ÖóÌÐò£¬£¬£¬£¬Ê¹Óø¶·ÑËÑË÷¹ã¸æºÍËÑË÷ÅÅÃûʹÓÃÌáÉýÆØ¹âÂÊ£¬£¬£¬£¬¶ø·ÇÒÀÀµ¹©Ó¦ÉÌÈëÇÖ¡£¡£¡£¡£pkr_mtsi¾ß±¸¸ß¶ÈÎÞаÐÔ£¬£¬£¬£¬¿É°²ÅÅOyster¡¢Vidar¡¢Vanguard Stealer¡¢SupperµÈ¶àÖÖ¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£¡£Æä½ø»¯¹ì¼£ÏÔÖø£ºÒÑÍù°Ë¸öÔÂÄÚÒýÈë¸üǿʢµÄ»ìÏýÊÖÒÕ¡¢¹þÏ£APIÆÊÎö¼°·´ÆÊÎö»úÖÆ£¬£¬£¬£¬Í¬Ê±¼á³Ö¡°ÄÚ´æ·ÖÅÉ-С¹æÄ£Ð´ÈëÖØÐÞÔØºÉ¡±µÄÎȹÌÖ´ÐÐÄ£×Ó¡£¡£¡£¡£Òªº¦ÊÖÒÕÌØÕ÷°üÀ¨Ë¢ÐµÄUPXÖÐÐļ¶Ìî³ä¡¢»ìÏýµÄZwAllocateVirtualMemoryŲÓá¢×ÌÈÅÆÊÎöµÄÀ¬»øGDI APIŲÓ㬣¬£¬£¬ÒÔ¼°´¥·¢Àú³ÌÖÕÖ¹»òÎÞÏÞÑ­»·µÄ·´µ÷ÊÔ¼ì²é¡£¡£¡£¡£Ö»¹Ü½á¹¹¶à±ä£¬£¬£¬£¬µ«ÆäÖØ¸´Å²ÓôøÓÐÎÞЧ±£»£»£»£»£»£»¤±ê¼ÇµÄNtProtectVirtualMemoryº¯Êý±¬·¢µÄ¿ÉÕ¹Íû¹ýʧ£¬£¬£¬£¬Îª¶ËµãÒ£²â¼à¿ØÌṩÁ˿ɿ¿¼ì²âʱ»ú¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/malware-loader-pkrmtsi-payloads/