ºÚ¿ÍÇÔÈ¡GlobalX AirÇýÖ𺽰àÊý¾Ý

Ðû²¼Ê±¼ä 2025-05-07

1. ºÚ¿ÍÇÔÈ¡GlobalX AirÇýÖ𺽰àÊý¾Ý


5ÔÂ6ÈÕ  £¬¾Ý404 MediaÐÂÎÅ  £¬ºÚ¿Í½«Ä¿µÄËø¶¨ÔÚÌØÀÊÆÕÕþ¸®ÓÃÓÚÇýÖð³ö¾³µÄÖ÷Òªº½¿Õ¹«Ë¾Ö®Ò»GlobalX Air  £¬ÇÔÈ¡ÁËÆäËùÓк½°à£¨º¬ÇýÖð³ö¾³º½°à£©µÄº½ÐмͼÓëÂÿÍÃûµ¥¡£GlobalXÊÇÒ»¼Ò°ü»ú¹«Ë¾  £¬ÔøÐ­Öú½«Êý°ÙÃûίÄÚÈðÀ­ÈËÇýÖðÖÁÈø¶ûÍß¶à¡£ºÚ¿Í×Ô¶¯ÁªÏµ404 Media¼°ÆäËû¼ÇÕß  £¬³ÆÕâЩÊý¾Ý¿ÉÌṩGlobalXº½°àÉϱ»ÇýÖð³ö¾³Ö°Ô±µÄÏêϸÐÅÏ¢  £¬°üÀ¨ÏêϸְԱ¡¢Ê±¼ä¼°Ä¿µÄµØ¡£GlobalXÍøÕ¾·ºÆðÒ»ÌõÎÛËðÐÅÏ¢  £¬Âä¿îΪ¡°ÄäÃûÕß¡±  £¬¸Ã×éÖ¯ÒÔʹÓøÇÒÁ¡¤¸£¿ËË¹Ãæ¾ßÖøÃû  £¬ÊÇһЩºÚ¿Í¾ÙÐÐËùν¡°ºÚ¿ÍÐж¯Ö÷Ò塱µÄ±£»¤É¡¡£ÐÅÏ¢ÖÐÖ¸ÔðÄ¿µÄÎÞÊÓÕýµ±ÏÂÁî  £¬¾öÒéÖ´Ðз¨¹ÙµÄÏÂÁî¡£ºÚ¿ÍÌåÏÖ  £¬ÇÔÈ¡µÄÊý¾Ýº­¸Çº½°à¼Í¼ÓëÂÿÍÃûµ¥  £¬²¢Ïò404 Media·¢ËÍÁËÊý¾Ý¸±±¾¡£ÕâЩÊý¾Ý°´1ÔÂ19ÈÕÖÁ5ÔÂ1ÈÕʱ´úÖðÈÕÈÕÆÚ·ÖÀà´æ·ÅÔÚÎļþ¼ÐÖС£ÎªÑéÖ¤Êý¾ÝµÄÕæÊµÐÔ  £¬404 MediaδÀ´×Ô¹Ù·½¿É¿¿ÈªÔ´µÄICEÇýÖ𺽰àÒÑÖªÐÅÏ¢  £¬ÓëºÚ¿Í»ñÈ¡µÄº½°àÂÿÍÃûµ¥¼°º½°àÏêÇé¾ÙÐÐÁ˽»Ö¯ºË¶Ô¡£Ð§¹ûÏÔʾ  £¬ºÚ¿Í»ñÈ¡µÄÊý¾ÝÖÐȷʵ°üÀ¨Ïà¹Øº½°àÐÅÏ¢  £¬ÀýÈç»ù¶ûÂí¡¤°¢²¼À׸ꡤ¼ÓÎ÷Ñǵĺ½°àÐÅÏ¢¡£


https://www.404media.co/email/fe8ce8ec-6dad-464a-8022-84e93b909397/


2. PoCÐû²¼ºóÈýÐÇMagicINFOÎó²îÔâʹÓÃ


5ÔÂ6ÈÕ  £¬Ñо¿Ö°Ô±·¢Ã÷  £¬ÔÚ¿´·¨ÑéÖ¤£¨PoC£©Îó²î´úÂë¹ûÕæÐû²¼¼¸Ììºó  £¬ÍþвÐÐΪÕß±ã×îÏÈʹÓÃÈýÐÇMagicINFOÄÚÈÝÖÎÀíϵͳ£¨CMS£©ÖеĸßÑÏÖØÐÔÎó²îCVE-2024-7399£¨CVSSÆÀ·Ö8.8£©¡£¸ÃÎó²î±£´æÓÚÈýÐÇMagicINFO 9 Server 21.1050֮ǰ°æ±¾  £¬ÊÇ·¾¶ÃûÏÞÖÆµ½ÊÜÏÞĿ¼µÄȱÏÝ  £¬¹¥»÷Õ߿ɽè´ËÒÔϵͳȨÏÞдÈëí§ÒâÎļþ¡£±¨¸æÏÔʾ  £¬×èÖ¹2025Äê5Ô³õ  £¬ÒÑÊӲ쵽¸ÃÎó²îÔÚÈýÐÇMagicINFO 9·þÎñÆ÷Öб»ÆÕ±éʹÓᣴËÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÓû§Ð´Èëí§ÒâÎļþ  £¬ÈôÓÃÓÚ±àÐ´ÌØÖÆµÄJavaServer Pages£¨JSP£©Îļþ  £¬×îÖÕ¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£CVE-2024-7399ʵÖÊÊÇÈýÐÇMagicINFO 9 ServerÊäÈëÑéÖ¤µÄȱÏÝ  £¬ÄÜÈÃδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÉÏ´«JSPÎļþ²¢ÒÔϵͳ¼¶»á¼ûȨÏÞÖ´ÐдúÂë¡£ÈýÐÇÓÚ2024Äê8ÔÂÊ×´ÎÅû¶¸ÃÎó²î  £¬Ðû²¼MagicINFO 9 Server°æ±¾21.1050ÐÞ¸´´ËÎó²î  £¬Æäʱ²¢ÎÞʹÓü£Ïó  £¬µ«2025Äê4ÔÂ30ÈÕPoCÐû²¼¼¸Ììºó  £¬ÍþвÐÐΪÕß¾Í×îÏÈʹÓ᣼øÓÚ¸ÃÎó²îʹÓÃÄѶȵÍÇÒPoCÒѹûÕæ  £¬×¨¼ÒÒÔΪ´ËÀ๥»÷¿ÉÄÜÒ»Á¬¡£


https://securityaffairs.com/177529/hacking/samsung-magicinfo-vulnerability-exploited-after-poc-publication.html


3. LangflowÎó²îCVE-2025-3248±»Æð¾¢Ê¹ÓÃ


5ÔÂ6ÈÕ  £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½«LangflowÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-3248£©±ê¼ÇΪÆð¾¢Ê¹ÓÃ״̬  £¬±Þ²ß¸÷×éÖ¯¾¡¿ìÓ¦ÓÃÇå¾²¸üлººÍ½â²½·¥¡£´ËÎó²îΪÑÏÖØÎ´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î  £¬ÄÜÈû¥ÁªÍøÉϵĹ¥»÷ÕßʹÓÃAPI¶ËµãÎó²îÍêÈ«¿ØÖÆÒ×Êܹ¥»÷µÄLangflow·þÎñÆ÷¡£LangflowÊÇÒ»¿î¿ªÔ´¿ÉÊÓ»¯±à³Ì¹¤¾ß  £¬ÔÚGitHubÉÏÓµÓнü6Íò¸östarºÍ6.3Íò¸öfork  £¬ÔÚÈ˹¤ÖÇÄÜ¿ª·¢¡¢Ñо¿ºÍÊ×´´ÁìÓòÓ¦ÓÃÆÕ±é¡£Æä¹ûÕæµÄÓÃÓÚÑéÖ¤Óû§Ìá½»½ÓÂëµÄ¶Ëµã±£´æÇ徲ȱÏÝ  £¬Îó²î°æ±¾ÖÐÎÞ·¨Çå¾²µØ¶ÔÊäÈë¾ÙÐÐɳºÐ´¦Öóͷ£»ò¹ýÂË  £¬¹¥»÷Õ߿ɽè´Ë·¢ËͶñÒâ´úÂë²¢ÔÚ·þÎñÆ÷ÉÏÖ±½ÓÖ´ÐС£¸ÃÎó²îÒÑÔÚ2025Äê4ÔÂ1ÈÕÐû²¼µÄ1.3.0°æ±¾ÖÐÐÞ¸´  £¬²¹¶¡½öΪÒ×Êܹ¥»÷µÄ¶ËµãÌí¼ÓÁËÉí·ÝÑéÖ¤¡£×îа汾1.4.0ÒÑÐû²¼  £¬°üÀ¨´ó×ÚÐÞ¸´  £¬½¨ÒéÓû§Éý¼¶¡£Horizon3Ñо¿Ö°Ô±Ðû²¼Ïà¹ØÊÖÒÕ²©¿Í²¢ÖÒÑÔ  £¬¸ÃÎó²î±»Ê¹ÓõĿÉÄÜÐԺܸß  £¬ÆäʱÒÑ·¢Ã÷ÖÁÉÙ500¸ö̻¶ÔÚ»¥ÁªÍøÉϵÄʵÀý¡£¹ØÓÚÎÞ·¨Á¬Ã¦Éý¼¶µÄÓû§  £¬½¨Òéͨ¹ý·À»ðǽ¡¢·´ÏòÊðÀí»òVPNÏÞÖÆLangflowµÄÍøÂç»á¼û  £¬ÇÒ²»½¨ÒéÖ±½Ó½«Æä̻¶ÔÚ»¥ÁªÍøÉÏ¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê5ÔÂ26ÈÕǰ½ÓÄÉÐж¯  £¬²»È»×èֹʹÓøÃÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/critical-langflow-rce-flaw-exploited-to-hack-ai-app-servers/


4. GitHub¶ñÒâGoÄ£¿éÒþ²ØLinux Wiper¶ñÒâÈí¼þ


5ÔÂ6ÈÕ  £¬½üÆÚ  £¬Õë¶ÔLinux·þÎñÆ÷µÄ¹©Ó¦Á´¹¥»÷±»ÆØ¹â  £¬¹¥»÷ÕßÔÚGitHubÉÏÐû²¼µÄGolangÄ£¿éÖÐÒþ²ØÁË´ÅÅ̲Á³ý¶ñÒâÈí¼þ¡£¸ÃÔ˶¯ÓÚÉϸöÔ±»·¢Ã÷  £¬ÒÀÀµÈý¸ö°üÀ¨¡°¸ß¶È»ìÏý´úÂ롱µÄ¶ñÒâGoÄ£¿éÀ´¼ìË÷²¢Ö´ÐÐÔ¶³ÌÓÐÓÃÔØºÉ¡£´Ë´Î¹¥»÷ÏÔÈ»ÊÇרÃÅÕë¶Ô»ùÓÚLinuxµÄ·þÎñÆ÷ºÍ¿ª·¢ÇéÐÎÉè¼ÆµÄ  £¬ÆäÆÆËðÐÔ¸ºÔØÎªÒ»¸öÃûΪdone.shµÄBash¾ç±¾  £¬¸Ã¾ç±¾»áÔËÐС°dd¡±ÏÂÁî¾ÙÐÐÎļþ²Á³ýÔ˶¯¡£ÔÚÖ´ÐÐǰ  £¬ÓÐÓÃÔØºÉ»áÑéÖ¤ÆäÊÇ·ñÔÚLinuxÇéÐÎÖÐÔËÐС£¾Ý¹©Ó¦Á´Çå¾²¹«Ë¾SocketÆÊÎö  £¬¸ÃÏÂÁî»áÓÃÁãÁýÕÖÿ¸öÊý¾Ý×Ö½Ú  £¬µ¼Ö²»¿ÉÄæ×ªµÄÊý¾ÝɥʧºÍϵͳ¹ÊÕÏ  £¬Ä¿µÄÊÇÉúÑÄÒªº¦ÏµÍ³Êý¾Ý¡¢Óû§Îļþ¡¢Êý¾Ý¿âºÍÉèÖõÄÖ÷´æ´¢¾í/dev/sda¡£Ñо¿Ö°Ô±ÓÚ4Ô·ݷ¢Ã÷Á˴˴ι¥»÷  £¬²¢ÔÚGitHubÉÏ·¢Ã÷ÁËÈý¸öÏÖÒѱ»É¾³ýµÄ¶ñÒâGoÄ£¿é¡£ÕâЩÄ£¿é¾ù°üÀ¨»ìÏý´úÂë  £¬½âÂëºó»áʹÓá°wget¡±ÏÂÔØ²¢Á¬Ã¦Ö´ÐжñÒâÊý¾Ý²Á³ý¾ç±¾  £¬ÏÕЩûÓиøÊܺ¦ÕßÁôÏÂÏìÓ¦»ò»Ö¸´µÄʱ¼ä¡£¶ñÒâGoÄ£¿éËÆºõð³äÁËÕýµ±ÏîÄ¿  £¬ÈçÓÃÓÚÐÂÎÅÊý¾Ýת»»µÄPrototransform¡¢Ä£×ÓÉÏÏÂÎÄЭÒéµÄGoʵÏÖgo-mcpÒÔ¼°ÎªTCPºÍHTTP·þÎñÆ÷Ìṩ¼ÓÃܵÄTLSÊðÀí¹¤¾ßtlsproxy¡£SocketÑо¿Ö°Ô±ÖÒÑÔ³Æ  £¬×ÝÈ»½ö×îСˮƽµØÌ»Â¶ÓÚÕâÐ©ÆÆËðÐÔÄ£¿é  £¬Ò²¿ÉÄܵ¼ÖÂÊý¾ÝÍêȫɥʧµÈÑÏÖØÐ§¹û¡£


https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/


5. ð³äSSAÓʼþ·Ö·¢ScreenConnect RATÈëÇÖÓû§×°±¸


5ÔÂ6ÈÕ  £¬ÍøÂçÇ徲ר¼Ò·¢Ã÷  £¬·¸·¨·Ö×ÓʹÓÃÃÀ¹úÉç»á°ü¹Ü¾Ö£¨SSA£©ÃûÒå  £¬ÓÕÆ­Óû§×°ÖÃÃûΪScreenConnectµÄΣÏÕÔ¶³Ì»á¼ûľÂí£¨RAT£©¡£Ò»µ©×°Öà  £¬¹¥»÷Õß±ã¿ÉÔ¶³Ì¿ØÖƵçÄÔ  £¬ÇÔȡСÎÒ˽¼ÒÐÅÏ¢²¢×°Öøü¶àÓк¦Èí¼þ¡£MalwarebytesÑо¿Ö°Ô±Ê×ÏÈ×¢ÖØµ½ÕâЩÐéαÓʼþ  £¬ËüÃÇÒÔ¡°Éç±£ÉùÃ÷ÏÖÒÑ¿ÉÓá±ÎªÓÉ  £¬±Þ²ßÓû§ÏÂÔØ¸½¼þ»òµã»÷Á´½ÓÉó²é¡£ÕâЩÓʼþÉè¼Æ±ÆÕæ  £¬ÄÑÒÔÇø·ÖÕæÎ±  £¬ÓʼþÖеÄÁ´½Ó»ò¸½¼þ»áÖ¸µ¼Óû§ÏÂÔØÓÃÓÚ×°ÖÃScreenConnect¿Í»§¶ËµÄÎļþ  £¬ÎļþÓÐʱ»á±»¸¶ÓëÎóµ¼ÐÔÃû³Æ  £¬Èç¡°ReceiptApirl2025Pdfc.exe¡±µÈ¡£ScreenConnect±¾ÊÇÆóÒµITÖ§³Ö¹¤¾ß  £¬µ«ÂäÈë·¸·¨·Ö×ÓÊÖÖÐÔò±äµÃΣÏÕ  £¬ËûÃÇ¿Éͨ¹ýÆä¿ØÖÆÅÌËã»ú  £¬ÇÔÈ¡Ãô¸ÐÊý¾Ý  £¬Ä»ºóºÚÊÖMolatori¼¯ÍÅÖ÷ҪĿµÄÊǾÙÐнðÈÚÕ©Æ­¡£CofenseÇ徲ר¼ÒÒ²±¨¸æÁËÀàËÆÃ°³äSSAµÄÍøÂç´¹ÂÚÔ˶¯  £¬ÕâЩÓʼþͨ³£Éù³ÆÌṩ¸£ÀûÉùÃ÷  £¬Ê¹Óò»Æ¥ÅäÁ´½Ó»òÒþ²Ø¶ñÒâÁ´½Ó¡£CofenseÖ¸³ö  £¬ÕâЩÐéαÓʼþÖ¼ÔÚ×°ÖÃConnectWise RAT  £¬¼´Õýµ±Èí¼þConnectWise Control£¨Ô­ScreenConnect£©µÄÊÜѬȾ°æ±¾¡£


https://hackread.com/fake-ssa-emails-trick-users-installing-screenconnect-rat/


6. µÂ¿ËÈøË¹ÖÝÑ§ÇøÏò³¬47,000ÃûְԱת´ïÊý¾Ýй¶ÊÂÎñ


5ÔÂ7ÈÕ  £¬µÂ¿ËÈøË¹Öݰ¢¶ûÎÄ×ÔÁ¦Ñ§Çø£¨AISD£©±¬·¢Ò»ÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ  £¬ÖÂʹ47606È˵ÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ¡£¸ÃÑ§ÇøÈ·ÈÏÎó²î·ºÆðÔÚ2024Äê6Ô  £¬²¢ÓÚ±¾ÖÜÄ©×îÏÈ֪ͨÊÜÓ°ÏìÖ°Ô±¡£Ð¹Â¶Êý¾Ýº­¸ÇÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÖÝÕþ¸®Ç©·¢Ö¤¼þ¡¢ÐÅÓÿ¨/½è¼Ç¿¨ÐÅÏ¢¡¢½ðÈÚÕË»§ºÅÂë¡¢Ò½ÁÆÊý¾Ý¼°¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£µÂ¿ËÈøË¹ÖÝ×ÜÉó²é³¤°ì¹«ÊÒÓÚ2025Äê5ÔÂ2ÈÕת´ïÁËÕâÒ»ÊÂÎñ¡£ÀÕË÷Èí¼þÍÅ»ïFogÔÚ2024Äê7ÔÂÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ  £¬³Æ´ÓAISDÇÔÈ¡ÁË60GBÊý¾Ý  £¬²¢½«Ñ§ÇøÃû³ÆÐû²¼ÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏ  £¬ÒÔ´ËÏòÊܺ¦ÕßʩѹË÷ÒªÊê½ð¡£Fog×Ô2024Äê7ÔÂ×îÏÈÐû²¼¹¥»÷Ô˶¯  £¬AISDÊÇÆäÊ×ÅúÊܺ¦ÕßÖ®Ò»¡£ÒÔºó  £¬¸ÃÍÅ»ïÐû³ÆÊµÑéÁË20ÆðÒÑÈ·ÈϵÄÀÕË÷Èí¼þ¹¥»÷£¨ÆäÖÐ12ÆðÕë¶Ô½ÌÓý»ú¹¹£©¼°157ÆðδȷÈÏÊÂÎñ  £¬ÆäÔ˶¯¼£ÏóÓÚ2025Äê4ÔÂ×èÖ¹¡£¸ÃÍÅ»ïÒÔ¼ÓÃÜÎļþºÍÇÔÈ¡Êý¾ÝΪÊÖ¶Î  £¬³£Ãé×¼¿ª·¢ÇéÐÎ  £¬¹¥»÷¹æÄ£²»¾ÖÏÞÓÚѧУ¡£


https://www.infosecurity-magazine.com/news/texas-school-47000-people-data/