AflacÊý¾Ýй¶ӰÏ쳬¹ý2200Íò¿Í»§
°ä²¼¹¦·ò 2025-12-241. AflacÊý¾Ýй¶ӰÏ쳬¹ý2200Íò¿Í»§
12ÔÂ24ÈÕ£¬×ܲ¿Î»ÓÚ×ôÖÎÑÇÖݵı£ÏÕ¾ÞÍ·Aflac 6ÔÂÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬µ¼Ö³¬¹ý2270Íò¿Í»§¡¢Ô±¹¤¼°ºÏ×÷ͬ°éµÄÓ×ÎÒÐÅÏ¢±»µÁ£¬ÆäÖе¿ËÈøË¹ÖÝÊÜÓ°Ïì¾ÓÃñ³¬200Íò¡£¸Ã¹«Ë¾×îÐÂÉùÏÔÖøÊ¾£¬¾¹ýÊýÔµ÷²é£¬ÊÂÎñÒÑÓÚ12ÔÂ4ÈÕÕýʽ½á°¸¡£¾Ýµ÷²é£¬ºÚ¿Íͨ¹ý¼Ù×°ITÈËÔ±ÈëÇÖϵͳ£¬Ö»¹ÜAflacÔÚ¡°¼¸Ó×ʱÄÚ¡±×èÖ¹Á˹¥»÷£¬µ«±£ÏÕË÷Åâ¡¢½¡È«Êý¾Ý¡¢Éç»á±£ÏÕºÅÂëµÈÃô¸ÐÐÅÏ¢ÈÔ±»ÇÔÈ¡¡£¸Ã¹«Ë¾Ç¿µ÷£¬Õâ´ÎÊÂÎñÎ´Éæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬ÇÒδ¶Ô¹«Ë¾ÔËÓªÔì³ÉÄÚÈÝÓ°Ï졣Ŀǰ£¬AflacÒÑÏò¸÷Öݼà¹Ü»ú¹¹´«µÝÇé¿ö£¬²¢ÏòÊܺ¦Õß·¢ËÍÊý¾Ýй¶֪ͨÐÅ£¬ÌṩΪÆÚÁ½ÄêµÄÉí·Ý±£»¤·þÎñ£¬×¢²á½ØÖ¹ÈÕÆÚΪ2026Äê4ÔÂ18ÈÕ¡£Áª¹ú·¨Âɲ¿ÃÅÒÑȾָµ÷²é£¬²¢ÀñÆ¸ÍøÂ簲ȫר¼ÒÐÖú´¦Öá£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ´Î¹¥»÷ÓëÃûΪ¡°É¢ÂäÖ©Ö롱£¨Scattered Spider£©µÄ¿ç¹úÍøÂç·¸×ïÍÅ»ïÇ×êÇÓйء£
https://therecord.media/22-million-impacted-aflac-breach
2. WebRAT¶ñÒâÈí¼þ½èGitHubÐéα·ì϶ÀûÓ÷¨Ê½´«²¼
12ÔÂ23ÈÕ£¬Ò»ÖÖÃûΪWebRATµÄÐÅÏ¢ÇÔÈ¡ÐͺóÃŶñÒâÈí¼þÕýͨ¹ýGitHub´æ´¢¿â½øÐдó¹æÄ£·Ö·¢¡£¹¥»÷Õß¼Ù×°³É¡°·ì϶ÀûÓ÷¨Ê½ÌṩÕß¡±£¬ÔÚ´æ´¢¿âÖÐÐû³ÆÍйÜÁËÕë¶ÔCVE-2025-59295¡¢CVE-2025-10294¡¢CVE-2025-59230µÈ½üÆÚÅû¶·ì϶µÄ¸ÅÏëÑéÖ¤´úÂ룬ÓÕÆ¿ª·¢ÕßÏÂÔØ¡£¾Ý¿¨°Í˹»ù°²È«ÍŶÓÅû¶£¬ÕâЩ´æ´¢¿âÏÖʵÔ̺¬¶ñÒⷨʽ°ü¡£¹¥»÷ÕßʹÓÃÃÜÂë±£»¤µÄZIPÎļþ×÷ÎªÔØÌ壬ÄÚº¬¿ÕÎļþ¡¢°Ü»µµÄµö¶üDLL¡¢Åú´¦Öþ籾¼°Ö÷Ͷ·ÅÆ÷¡°rasmanesc.exe¡±¡£¸ÃͶ·ÅÆ÷»áͨ¹ýÌáÉýȨÏÞ¡¢½ûÓÃWindows DefenderµÈ¼¿Á©£¬´ÓÔ¤ÉèURLÏÂÔØ²¢Ö´ÐÐWebRAT¡£¿¨°Í˹»ùÒÑ·¢ÏÖ15¸ö´ËÀà¶ñÒâ´æ´¢¿â£¬ÆäÐÅÏ¢½á¹¹ÒÉËÆÓÉAIÌìÉú¡£WebRAT×Ô½ñÄêËêÊ׳öÏÖÒÔÀ´£¬ÖØÒªÍ¨¹ýµÁ°æÈí¼þ¡¢ÓÎÏ·Îè±×¹¤¾ß´«²¼¡£ÆäÖ°ÄÜÔ̺¬ÇÔÈ¡Steam¡¢Discord¡¢TelegramÕË»§Æ¾Ö¤¡¢¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬Í¨¹ýÉãÏñÍ·¼à¿ØÊܺ¦Õß²¢½ØÈ¡ÆÁÄ»½ØÍ¼£¬Í¬Ê±Í¨¹ýÅú¸Ä×¢²á±í¡¢´òË㹤×÷¼°ÏµÍ³Ä¿Â¼×¢ÈëµÈ·½Ê½³ÉÁ¢ÓƾÃÐÔ¡£Õâ´Î¹¥»÷ÖÐʹÓõÄWebRAT±äÖÖÓë´Ëǰ¼Í¼µÄÑùÐÔ×ÓÄÜÒ»Ö¡£
https://www.bleepingcomputer.com/news/security/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/
3. ¼Ù×°VPNµÄ¶ñÒâChromeÀ©´óÇÔÈ¡Óû§Í´´¦
12ÔÂ23ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÁ½¿îͬÃû¶ñÒâChromeÀ©´ó"»ÃÓ°´©Ëó»ú"£¬±ðÀëÕ¼ÓÐ2000ÃûºÍ180ÃûÓû§¡£ÕâÁ½¿îÓÉͳһ¿ª·¢Õß°ä²¼µÄ²å¼þ¼Ù×°³É"¶àµØÖ·ÍøÂç¿ìÂʲâÊÔ¹¤¾ß"£¬Í¨¹ýÊÕÈ¡1.4-13.5ÃÀÔª¶©ÔÄ·ÑÓÕµ¼Óû§×°Öã¬ÏÖʵִÐÐÁ÷Á¿À¹½ØÓëÍ´´¦ÇÔÈ¡µÄ¶ñÒâ²Ù×÷¡£À©´ó·¨Ê½Í¨¹ýÅú¸Ä°ó¸¿µÄJavaScript¿â£¬ÔÚchrome.webRequest.onAuthRequired×¢²á¼àÌýÆ÷£¬×Ô¶¯ÏòËùÓÐHTTPÉí·ÝÑéÖ¤ÖÊѯעÈëÓ²±àÂë´úÀíÍ´´¦£¬ÊµÏÖͨÃ÷ÖÐÑëÈ˹¥»÷¡£Óû§¸¶¿î¼¤»îVIPÉí·Ýºó£¬À©´ó·¨Ê½ÆôÓÃ"ÖÇÄÜ"´úÀíģʽ£¬½«À´×ÔGitHub¡¢AWS¡¢Azure¡¢FacebookµÈ170Óà¸ö¸ß¼ÛÖµÓòÃûµÄÁ÷Á¿Â·ÓÉÖÁ¹¥»÷Õß½ÚÔìµÄC2·þÎñÆ÷¡£À©´ó·¨Ê½Í¨¹ýÈýÖÖ´úÀíģʽ³ÖÐøÇÔÈ¡Êý¾Ý£º¹Ø¹ØÄ£Ê½½ûÓôúÀí£¬Ê¼ÖÕģʽ·ÓÉÈ«ÊýÁ÷Á¿£¬ÖÇÄÜģʽ¶¨Ïò·ÓÉÖ¸±êÓòÃû¡£Æäÿ60ÃëÓëC2·þÎñÆ÷ά³ÖÐÄÌøÍ¨Ñ¶£¬Ã¿Îå·ÖÖÓͨ¹ýHTTP GETÒªÇóй¶VIPÓû§µÄµç×ÓÓʼþ¡¢Ã÷ÎÄÃÜÂëºÍ°æ±¾ºÅ¡£ÕâÖÖ"ÐÄÌøÐ¹Â¶+´úÀíÖÐÑëÈ˹¥»÷"µÄ×éºÏʹ¹¥»÷ÕßÄܳÖÐø²¶»ñÃÜÂë¡¢ÐÅÓþ¿¨ºÅ¡¢Éí·ÝÑéÖ¤cookie¡¢APIÃÜÔ¿µÈÃô¸ÐÊý¾Ý£¬ÉõÖÁΪ¹©¸øÁ´¹¥»÷ÆÌ·¡£
https://thehackernews.com/2025/12/two-chrome-extensions-caught-secretly.html
4. ±´¿Ë´óѧÔâÍøÂç¹¥»÷ÖÂ5.3ÍòÈËÐÅϢй¶
12ÔÂ23ÈÕ£¬±´¿Ë´óѧλÓÚ¿°ÈøË¹Öݱ«µÂÎÂÊУ¬³ÉÁ¢ÓÚ1858Ä꣬ռÓÐÔ¼2000ÃûѧÉú¼°300ÃûÔ±¹¤¡£´Ë´óѧ½üÈÕÅû¶һ·³Á´óÊý¾Ýй¶ÊÂÎñ£¬2024Äê12ÔÂ2ÈÕÖÁ19ÈÕÆÚ¼ä£¬¹¥»÷ÕßÈëÇÖ¸ÃÐ£ÍøÂ磬ÇÔÈ¡53,624È˵ÄÓ×ÎÒ¡¢½¡È«¼°²ÆÕþÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢½¡È«±£ÏÕÐÅÏ¢¡¢Ò½ÁƼͼ¡¢»¤ÕÕÐÅÏ¢¡¢Éç»á±£ÏÕºÅÂ롢ѧÉúÖ¤ºÅÂ뼰˰Îñ¼ø±ðºÅÂëµÈÃô¸ÐÄÚÈÝ¡£Õâ´ÎÊÂÎñÔ´ÓÚ2024Äê12ÔÂÈëÃÅÐ£ÍøÂç¹ÊÕϺó¼ì²âµ½µÄ¿ÉÒɻ£¬¾Éó²éÈ·ÈÏÐÅϢй¶ÁìÓò¡£Ñ§ÌðµÊ¾£¬Ä¿Ç°Î´·¢ÏÖÇÔÊØÐÅÏ¢±»ÓÃÓÚڲƻµÄÖ¤¾Ý£¬µ«ÒÑÏòÊÜÓ°ÏìÕßÌṩÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ£¬²¢½¨Ò鶨ÆÚ²é³ÕË»§¶ÔÕ˵¥¼°ÐÅÓþ»ã±¨ÒÔ·À±¸·çÏÕ¡£±´¿Ë´óѧÌó¤Çǵϡ¤¸£Äá¶ûÇ¿µ÷£¬±£»¤ÉçÇø³ÉÔ±ÐÅÏ¢°²ÂúÊÇÊ×Òª¹¤×÷£¬ÊÂÎñ²úÉúºó£¬Ñ§ÌÃÒÑÓë±í²¿ÍøÂ簲ȫר¼ÒÍŶӺÏ×÷£¬³Á½¨ÊÜËðµÄÖØÒªÆ½Ì¨¡£È»¶ø£¬Ñ§ÌÃδ°ä²¼¹¥»÷¾ßÌåÐÔÖÊ£¬Ò²Î´¹éÒòÓÚÌØ¶¨ÍøÂç·¸×ï×éÖ¯»ò¹ú¶ÈÖ§³Ö¼¯Ìå¡£
https://www.bleepingcomputer.com/news/security/baker-university-data-breach-impacts-over-53-000-individuals/
5. n8n¸ßΣ©¶Â±Ã§¬10ÍòÊ·ýÃæ¶ÔËÁÒâ´úÂëÖ´ÐзçÏÕ
12ÔÂ23ÈÕ£¬¹¤×÷Á÷×Ô¶¯»¯Æ½Ì¨n8n½üÈÕ±»Åû¶´æÔÚ±àºÅΪCVE-2025-68613µÄ¸ßΣ°²È«·ì϶£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö£¬Êô¡°ÑϳÁ¡±¼¶±ð¡£¸Ã·ì϶ԴÓÚÒÑÈÏÖ¤Óû§ÔÚÅäÖù¤×÷Á÷ʱÌá½»µÄ±í°×ʽ£¬¿ÉÄÜÔÚδÓëµ×²ãÔËÐл·¾³³ä·Ö¸ôÀëµÄÖ´ÐиߵÍÎÄÖб»½âÎöÖ´ÐУ¬µ¼Ö¹¥»÷ÕßÒÔn8n¹ý³ÌȨÏÞÖ´ÐÐËÁÒâ´úÂ룬½ø¶øÆëÈ«¹¥ÏÂÆ½Ì¨Ê·ý£¬Òý·¢Ãô¸ÐÊý¾Ýй¶¡¢¹¤×÷Á÷´Û¸Ä¡¢ÏµÍ³¼¶¶ñÒâ²Ù×÷µÈÑϳÁºó¹û¡£¾Ýnpmƽ̨ͳ¼Æ£¬n8nÈí¼þ°üÖÜÏÂÔØÁ¿Ô¼5.7Íò´Î£¬Ó°ÏìÁìÓòº¸ÇËùÓа汾ºÅ¡Ý0.211.0ÇÒ¡Ü1.120.4µÄn8n·¨Ê½¡£¹¥»÷ÃæÖÎÀíÆ½Ì¨Censys¼à²âÊý¾ÝÏÔʾ£¬½ØÖÁ2025Äê12ÔÂ22ÈÕ£¬È«ÇòÁìÓòÄÚ´æÔÚDZÔÚ·ì϶·çÏÕµÄn8nÊ·ý¶à´ï103,476¸ö£¬ÖØÒªÉ¢²¼ÔÚÃÀ¹ú¡¢µÂ¹ú¡¢·¨¹ú¡¢°ÍÎ÷¼°ÐÂ¼ÓÆÂµÈ¹ú¶È¡£¹Ù·½ÒÑʵÏÖ·ì϶½¨¸´£¬²¢Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìÉý¼¶ÖÁ°²È«°æ±¾¡£ÈôÁÙʱÎÞ·¨²¿Êð²¹¶¡£¬¿Éͨ¹ý»º½â´ëÊ©½µµÍ·çÏÕ¡£
https://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html
6. vLex AI¸±ÊÖ·ì϶ÖÂÈ«Çò20Íò»ú¹¹Êý¾Ýй¶·çÏÕ
12ÔÂ24ÈÕ£¬PromptArmor×êÑÐÈËÔ±½üÈÕÅû¶£¬vLexƽ̨µÄÖÇÄÜ˾·¨¸±ÊÖVincent´æÔÚÑϳÁ°²È«·ì϶£¬¿É±»ºÚ¿ÍÀûÓÃÖ´ÐÐÍøÂç´¹µö¹¥»÷£¬ÇÔÈ¡Óû§µÇ¼ƾ֤¼°Ãô¸Ð¿Í»§Îļþ¡£¸Ã·ì϶ԴÓÚ¹¥»÷Õß¿Éͨ¹ýÔÚÉÏ´«ÖÁƽ̨µÄÎĵµÖÐǶÈë°µ²ØÎı¾Èç°×µ×°××ÖαÔìÒýÓÓÕʹVincent½âÎöʱÌìÉú¶ñÒâHTML´úÂ룬×îÖÕÔÚÓû§ä¯ÀÀÆ÷Öд¥·¢¡°ÆÁÄ»µþ¼Ó¡±´¹µö¹¥»÷£¬ÐéαµÇ¼½çÃæ¸²¸ÇÕæÊµÒ³Ãæ£¬ÓÕÆÓû§ÊäÈëÍ´´¦¡£×êÑÐÖ¸³ö£¬´Ë¡°Èý²½¹¥»÷Á´¡±ÓµÓи߶ÈÒñ±ÎÐÔ£ºÊ×ÏÈ£¬¹¥»÷Õß½«¶ñÒâ´úÂëǶÈëÍøÂç»ñÈ¡µÄÎĵµ£»Æä´Î£¬Ë¾·¨ÍŶÓÉÏ´«Îĵµºó£¬Vincent½âÎö¡°Ö±½ÓÒýÓʱ´¥·¢°µ²Ø´úÂ룻×îºó£¬ä¯ÀÀÆ÷Ö´ÐдúÂëÏÔʾ·ÂðµÄvLexµÇ¼½çÃæ£¬ÊµÊ±ÇÔÈ¡ÊäÈëÐÅÏ¢¡£¸üÑϳÁµÄÊÇ£¬¸Ã·ì϶¿ÉÀ©´óΪԶ³Ì´úÂëÖ´ÐУ¬µ¼Ö»ỰÁîÅÆ±»µÁ¡¢Áãµã»÷Êý¾Ýй¶¡¢Ç¿ÔìÎļþÏÂÔØÉõÖÁ¼ÓÃÜÇ®±ÒÍÚ¿ó£¬ÇÒÿ´Î´ò¿ªÌ¸Ìì´°¿Ú³ÇÊгÁ¸´Ö´Ðй¥»÷¡£
https://cybernews.com/security/vlex-vincent-ai-phishing-vulnerability-lawyers-law-firms/


¾©¹«Íø°²±¸11010802024551ºÅ