Elasticsearch·þÎñÆ÷ÉèÖùýʧÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
Ðû²¼Ê±¼ä 2025-07-251. Elasticsearch·þÎñÆ÷ÉèÖùýʧÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
7ÔÂ23ÈÕ£¬Ò»¸öÎÞÐèÉí·ÝÑéÖ¤µÄ¹ûÕæÊý¾Ý¿â̻¶ÁËÈðµä¹«Ãñ¼°ÆóÒµÁè¼Ý1ÒÚÌõÃô¸Ð¼Í¼£¬Ê±¼ä¿ç¶ÈÁýÕÖ2019ÖÁ2024Ä꣬Êý¾Ý×ÜÁ¿´ï200GBÒÔÉÏ¡£´Ë´ÎÊÂÎñÓÉCybernewsÑо¿Ö°Ô±·¢Ã÷£¬Ì»Â¶µÄÊý¾Ý°üÀ¨Ð¡ÎÒ˽¼Ò·¨¶¨ÐÕÃû£¨º¬ÀúÊ·ÔøÓÃÃû£©¡¢ÈðµäÉí·ÝÖ¤ºÅ¡¢³öÉúÈÕÆÚ¡¢»éÒö״̬¡¢º£ÄÚÍâµØµã¹ì¼£¡¢ÒÆÃñÐÅÏ¢¡¢Õ®Îñ¼Í¼¡¢ÐÝÒµÀúÊ·¡¢¹¤ÒµËùÓÐȨָ±ê¼°Ò»Á¬ÎåÄêµÄËùµÃ˰Êý¾Ý£¨2019-2023£©£¬ÉõÖÁ°üÀ¨ÆóÒµÉÌÒµ¹ØÏµ¡¢ËðÒæ±íÌá½»¼Í¼µÈÐÐΪÈÕÖ¾£¬ÐγɶÔÈðµäÉç»á³ÉÔ±³¤´ïÎåÄêµÄ²ÆÎñÓëÐÐΪȫ¾°»Ïñ¡£¸ÃÊý¾Ý¿âµÄÒ쳣̻¶ԴÓÚElasticsearch¼¯ÈºµÄȨÏÞ¿ØÖÆÊ§Ð§¡£Ö»¹ÜÊý¾Ý½á¹¹Óë×Ö¶ÎÃüÃûÏÔʾÆäÀ´×Ô±±Å·ÉÌÒµÖÇÄÜÆÊÎö¹«Ë¾Risika£¨ÄÚ²¿±êÇ©º¬"dwh*"Êý¾Ý¿ÍÕ»±êʶ£©£¬µ«½øÒ»³ÌÐò²é֤ʵ¸Ã·þÎñÆ÷²¢·ÇÓÉRisikaÖ±½ÓÔËÓª£¬¶øÊÇÆäÊÚȨµÄµÚÈý·½¿Í»§¶Ë¡£Ñо¿Ö°Ô±ÍƲ⣬Êý¾Ý¿ÉÄÜͨ¹ýÕýµ±ÉÌÒµÔÊÐíÌṩӦÏÂÓÎÏàÖúͬ°é£¬È´ÒòÔËάÊèºöµ¼Ö·þÎñÆ÷Ïò¹«¹²»¥ÁªÍøÍêÈ«¿ª·Å»á¼û¡£
https://cybernews.com/security/risika-swedish-data-exposed/
2. ·¨¹úˮʦ¼¯ÍÅÔâºÚ¿ÍÀÕË÷£¬¾üÊÂÉñÃØÐ¹Â¶Íþв¹ú¼ÒÇå¾²
7ÔÂ23ÈÕ£¬·¨¹ú¹ú·À¹¤Òµ¾Þͷˮʦ¼¯ÍÅ£¨Naval Group£©¿ËÈÕÏÝÈëÖØ´óÍøÂçÇ徲Σ»ú¡£¾ÝCybernews±¨µÀ£¬Ò»¸öÉí·Ý²»Ã÷µÄÍþвÐÐΪÕßÔÚÊý¾Ýй¶ÂÛ̳ÉÏÐû³ÆÈëÇÖÁ˸ù«Ë¾£¬²¢ÍþÐ²Ð¹Â¶Éæ¼°¾ü½¢×÷Õ½ÖÎÀíϵͳ£¨CMS£©µÄÃô¸ÐÊý¾Ý£¬¶ø·ÇË÷ÒªÊê½ð¡£´Ë´ÎÊÂÎñÒòÉæ¼°·¨¹ú½¹µã¹ú·ÀÊÖÒÕ£¬Òý·¢¶Ô¹ú¼ÒÇå¾²µÄÉî¶Èµ£ÐÄ¡£¹¥»÷ÕßÉù³Æ»ñÈ¡µÄÊý¾Ý°üÀ¨£ºCMSÔ´´úÂë¡¢ÊÖÒÕÎĵµ¡¢¿ª·¢Ö°Ô±ÐéÄâʱ»ú¼ûȨÏÞ¼°±£ÃÜͨѶ¼Í¼¡£ÎªÖ¤ÊµÕæÊµÐÔ£¬Æä¸½ÉÏÁË13GBÊý¾ÝÑù±¾£¬ÄÚº¬ÌõÔ¼Îļþ¡¢ÒÉËÆCMSÄÚ²¿ÐÅÏ¢¼°2003ÄêDZͧ¼à¿ØÏµÍ³ÊÓÆµ¡£CybernewsÑо¿ÍŶӯðÔ´ÑéÖ¤²¿·ÖÊý¾ÝºóÒÔΪ£¬Ð¹Â¶ÄÚÈݾßÓнϸ߿ÉÐŶȡ£ÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷Õßδ½ÓÄÉͨÀýµÄÊý¾ÝÊÛÂôģʽ£¬¶øÊÇÊÔͼͨ¹ýÍþв¹ûÕæÐÅÏ¢Ïòˮʦ¼¯ÍÅʩѹ£¬ÕâÒ»±ä̬ÐÐΪÌåÏÖÆäÄîÍ·¿ÉÄÜÓâÔ½¾¼ÃÀûÒæ¡£´Ë´ÎÊÂÎñ¶Ô·¨¹ú¹ú·ÀÇå¾²×é³ÉË«ÖØÎ£º¦£ºÊÖÒÕ²ãÃæ£¬Ç±Í§Ó뻤ÎÀ½¢CMSÔ´´úÂëµÄй¶¿ÉÄÜÏ÷Èõ·¨¾üÕ½ÊõÓÅÊÆ£»Õ½ÂÔ²ãÃæ£¬Ãô¸ÐÎĵµµÄÀ©É¢»ò±»³ðÊÓÊÆÁ¦ÓÃÓÚÄæÏò¹¤³Ì»òÍøÂç¹¥»÷¡£
https://cybernews.com/security/naval-group-france-defense-data-breach/
3. WordPressÍøÕ¾ÏÖÒþÃØºóÃÅ£ºÊ¹ÓÃmu-pluginsĿ¼ʵÏÖ³¤ÆÚ¿ØÖÆ
7ÔÂ24ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÔÚWordPressÍøÕ¾µÄ¡°mu-plugins¡±£¨±ØÐèʹÓòå¼þ£©Ä¿Â¼Öз¢Ã÷Ò»¸ö¸ß¶ÈÒþ²ØµÄºóÃųÌÐò£¬¸ÃºóÃſɸ¶Óë¹¥»÷Õß³¤ÆÚ»¯»á¼ûȨÏÞ²¢Ô¶³ÌÖ´ÐÐí§Òâ²Ù×÷¡£mu-plugins×÷ΪWordPressĬÈÏÆôÓõÄÌØÊâ²å¼þ£¬ÆäÎļþλÓÚ¡°wp-content/mu-plugins¡±Ä¿Â¼£¬ÇÒ²»»áÏÔʾÔÚºǫ́²å¼þÖÎÀíÒ³Ãæ£¬³ý·ÇÊÖ¶¯É¾³ýÎļþ²»È»ÎÞ·¨½ûÓã¬ÕâÒ»ÌØÕ÷ʹÆä³ÉΪ¹¥»÷ÕßÒþ²Ø¶ñÒâ´úÂëµÄÀíÏëÄ¿µÄ¡£´Ë´Î·¢Ã÷µÄ¶ñÒâ³ÌÐòͨ¹ý¡°wp-index.php¡±¾ç±¾×÷Ϊ³õʼ¼ÓÔØÆ÷£¬´ÓʹÓÃROT13Ëã·¨»ìÏýµÄURLÖмìË÷Ô¶³ÌÓÐÓøºÔØ£¬²¢½«Æä´æ´¢ÔÚWordPressÊý¾Ý¿âµÄ¡°_hdra_core¡±×ֶΣ¨wp_options±í£©ÖС£¶ñÒâ´úÂëÖ´Ðк󣬻áÏòÖ÷ÎÊÌâ¼עÈëÃûΪ¡°pricing-table-3.php¡±µÄÒþ²ØÎļþÖÎÀíÆ÷£¬ÔÊÐí¹¥»÷ÕßÔ¶³Ìä¯ÀÀ¡¢ÉÏ´«»òɾ³ýÎļþ£»Í¬Ê±½¨Éè¡°officialwp¡±ÖÎÀíÔ±ÕË»§²¢¼¤»î¶ñÒâ²å¼þ¡°wp-bot-protect.php¡±£¬ÐγÉË«ÖØ¿ØÖÆÁ´¡£¸üΣÏÕµÄÊÇ£¬¸ÃºóÞ߱¸ÃÜÂëÖØÖù¦Ð§£¬¿É½«³£ÓÃÖÎÀíÔ±ÕË»§¼°×ÔÉí½¨ÉèµÄ¡°officialwp¡±Óû§ÃÜÂëÐÞ¸ÄΪ¹¥»÷ÕßÔ¤ÉèµÄĬÈÏÖµ£¬³¹µ×Ëø¶¨ÆäËûÖÎÀíԱȨÏÞ¡£
https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
4. ºÚ¿Í½«ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þDZÈëÕùÏÈÌåÑé°æSteamÓÎÏ·
7ÔÂ24ÈÕ£¬×ÅÃûÍþв×éÖ¯EncryptHub£¨ÓÖÃûLarva-208£©Í¨¹ýÈëÇÖSteamƽ̨ÓÎÏ·¡¶Chemia¡·£¬ÏòÈ«ÇòÍæ¼Ò·Ö·¢ÐÅÏ¢ÇÔÈ¡Àà¶ñÒâÈí¼þ¡£¾ÝÍþвÇ鱨¹«Ë¾ProdaftÅû¶£¬¹¥»÷ʼÓÚ7ÔÂ22ÈÕ¡£ºÚ¿Í×éÖ¯½«¶ñÒâ¶þ½øÖÆÎļþÖ²ÈëÓÉAether Forge Studios¿ª·¢µÄÉúÑÄÖÆ×÷ÀàÓÎÏ·¡¶Chemia¡·ÖС£¸ÃÓÎÏ·ÏÖÔÚÒÔ"ÕùÏÈÌåÑé"ÐÎʽÉϰ¶Steam£¬ÉÐδÐû²¼Õýʽ¿¯ÐÐÈÕÆÚ¡£¹¥»÷Õßͨ¹ýÔÚÓÎÏ·ÎļþÖÐÌí¼ÓÃûΪCVKRUTNP.exeµÄHijackLoader¶ñÒâÈí¼þ£¬ÔÚÊܺ¦×°±¸½¨É賤ÆÚ»¯»úÖÆºó£¬½øÒ»²½ÏÂÔØ¾ßÓÐÐÅÏ¢ÇÔÈ¡¹¦Ð§µÄVidar³ÌÐò£¨v9d9d.exe£©¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¸Ã¶ñÒâÈí¼þͨ¹ýijTelegramƵµÀ»ñÈ¡ÏÂÁîÓë¿ØÖÆ£¨C2£©·þÎñÆ÷µØµã£¬ÐγÉÒþ²ØµÄͨѶÁ´Â·¡£´Ë´Î¹¥»÷·ºÆð¶àÖØÊÖÒÕÌØÕ÷£ºÈýСʱºó£¬¹¥»÷Õßͨ¹ýDLLÎļþcclib.dllÖ²ÈëµÚ¶þ¿î¶ñÒâÈí¼þFickle Stealer¡£¸ÃÎļþʹÓÃPowerShell¾ç±¾worker.ps1´ÓÓòÃûsoft-gets[.]com»ñÈ¡Ö÷ÔØºÉ£¬×¨ÃÅÕë¶Ôä¯ÀÀÆ÷´æ´¢Êý¾ÝʵÑéÇÔÈ¡£¬°üÀ¨ÕË»§Æ¾Ö¤¡¢×Ô¶¯Ìî³äÐÅÏ¢¡¢Cookie¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/
5. ÐÂÐÍAIÇý¶¯Linux¶ñÒâÈí¼þKoskeͨ¹ýÐÜèͼƬʵÑéÎÞÎļþ¹¥»÷
7ÔÂ24ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾AquaSec½üÆÚÅû¶һ¿îÃûΪKoskeµÄÐÂÐÍLinux¶ñÒâÈí¼þ£¬ÆäÁ¢Òì¹¥»÷ÊÖ·¨ÓëÒÉËÆÈ˹¤ÖÇÄÜ£¨AI£©Çý¶¯ÌØÕ÷Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¸ÃÍþвͨ¹ý¿´ËÆÎÞº¦µÄÐÜèÖ÷ÌâJPEGͼƬ°²ÅŶñÒâ´úÂ룬ֱ½ÓÔÚϵͳÄÚ´æÖÐÖ´ÐвÙ×÷£¬Õ¹ÏÖ³öÖØ´óµÄÊÖÒռܹ¹Óë¸ß¶È×Ô¶¯»¯ÄÜÁ¦¡£Koske±»AquaSecÑо¿Ö°Ô±½ç˵Ϊ"ÖØ´óµÄLinuxÍþв"£¬Æä½¹µãÌØÕ÷ÔÚÓÚʹÓöà̬ÎļþÊÖÒÕʵÏÖÒþ²Ø¹¥»÷¡£¹¥»÷ÕßÊ×ÏÈͨ¹ý̻¶ÔÚ¹«ÍøµÄJupyterLabʵÀýÉèÖùýʧ»ñÈ¡³õʼ»á¼ûȨÏÞ£¬Ëæºó´ÓOVH imagesµÈÕýµ±Í¼´²ÏÂÔØÁ½ÕÅÐÜèJPEGͼƬ¡£ÕâЩͼƬËäÏÔʾΪÕý³£Í¼Ïñ£¬È´Í¨¹ýÌØÊâÎļþ½á¹¹Éè¼ÆÍ¬Ê±°üÀ¨ÓÐÓÃJPEGÎļþÍ·Óë¶ñÒâShell¾ç±¾¡¢C´úÂ룺Îļþǰ²¿ÎªÕý³£Í¼Æ¬Êý¾Ý£¬ºó²¿¸½¼Ó¿ÉÖ´ÐдúÂ룬ʹͳһÎļþ¼ÈÄܱ»Í¼ÏñÉó²éÆ÷ÆÊÎöΪͼƬ£¬ÓÖÄܱ»¾ç±¾Ú¹ÊÍÆ÷ʶ±ðΪ¿ÉÖ´ÐгÌÐò¡£¹¥»÷Àú³ÌÖУ¬Á½ÕÅÐÜèͼƬ»®·ÖÊͷŲî±ðÔØºÉ²¢Í¬²½Æô¶¯£ºÔغÉһʵÏÖϵͳ¼¶Òþ²Ø£»Ôغɶþ½¨É賤ÆÚ»¯»úÖÆ¡£¶ñÒâÈí¼þ»áÆÀ¹ÀÖ÷»úCPUÓëGPUÐÔÄÜ£¬´ÓGitHubÏÂÔØÕë¶ÔÓ²¼þÓÅ»¯µÄ¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¬Ö§³Ö°üÀ¨Monero¡¢RavencoinÔÚÄÚµÄ18ÖÖ¼ÓÃÜÇ®±Ò¡£
https://www.bleepingcomputer.com/news/security/new-koske-linux-malware-hides-in-cute-panda-images/
6. ¶íÂÞ˹ºÚ¿ÍDZÔÚÊýÖÜ£¬ÈëÇÖºÉÀ¼Ë¾·¨ÏµÍ³
7ÔÂ24ÈÕ£¬ºÉÀ¼Ë¾·¨ÏµÍ³½üÆÚÔâÓöÑÏÖØÍøÂç¹¥»÷£¬¶íÂÞ˹Åä¾°ºÚ¿Í±»ÁÐΪÖ÷ÒªÏÓÒɹ¤¾ß¡£ºÉÀ¼¹«¹²Éó²éÊð£¨OM£©ÏµÍ³ÔâÈëÇÖÊÂÎñ±£´æÇ¿ÁÒ¶íÂÞ˹¹ØÁª¼£Ï󣬹¥»÷ÕßÒÑÔÚ˾·¨²¿ÍøÂçÖÐDZÔÚÊýÖÜδ±»·¢Ã÷¡£´Ë´ÎÊÂÎñÔÙ´Î̻¶¹ú¼ÒÒªº¦»ù´¡ÉèÊ©ÃæÁÙµÄϵͳÐÔÇ徲Σº¦¡£Î£º¦Ô¤¾¯Ê¼ÓÚ6ÔÂ17ÈÕ£¬Éó²éÊðÔ¶³Ì°ì¹«Õý̨ʹÓõĵÚÈý·½Èí¼þCitrix NetScaler±»ÆØ±£´æÑÏÖØÎó²î¡£¸ÃÎó²îÔÚͨÓÃÎó²îÆÀ·Öϵͳ£¨CVSS£©ÖлñµÃ9.3·Ö¸ßΣÆÀ¼¶£¬Ö»¹ÜÉó²éÊðÉù³ÆÒѰ´³§É̽¨ÒéÍê³Éϵͳ¸üУ¬µ«ÓÐÖ¤¾ÝÅú×¢Îó²îÔÚÐÞ²¹Ç°Òѱ»Ê¹Óá£Îª×è¶Ï¹¥»÷ÉìÕÅ£¬Éó²éÊð±»ÆÈ×Ô¶¯ÇжÏÄÚ²¿ÅÌËã»ú»¥ÁªÍøÅþÁ¬£¬µ«´Ëʱ¹¥»÷Õß¿ÉÄÜÒѽӴ¥°üÀ¨Ôڰ쾯·½ÊӲ쵵²á¡¢Î´Éó½áÐÌʰ¸¼þ¾í×Ú¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵĸ߶ÈÃô¸ÐÊý¾Ý£¬Ïêϸй¶¹æÄ£ÉдýÈ·ÈÏ¡£ÊÖÒÕÆÊÎöÏÔʾ£¬¹¥»÷ÕßʹÓõÚÈý·½Èí¼þÎó²î½¨Éè³õʼ»á¼ûͨµÀºó£¬Í¨¹ýºã¾ÃDZÔÚʵÑéÊý¾ÝÇÔÈ¡¡£ÕâÖÖ"µÍÂýС"¹¥»÷ģʽÓë¶íÂÞ˹¹ú¼ÒÖ§³ÖºÚ¿ÍÕûÌåµÄÕ½ÊõÌØÕ÷¸ß¶ÈÎǺϣ¬ÆäÑ¡ÔñÔÚϵͳÐÞ²¹Ç°ÊµÑé¹¥»÷£¬Åú×¢¶ÔÄ¿µÄÍøÂçά»¤ÖÜÆÚµÄ¾«×¼ÕÆÎÕ¡£
https://cybernews.com/security/russian-hack-dutch-justice-system-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ