XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub £¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼

Ðû²¼Ê±¼ä 2025-08-14

1. XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub £¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼


8ÔÂ12ÈÕ £¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚÒ»Á¬·¢½Í £¬BinarlyÑо¿ÍŶӷ¢Ã÷Docker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ±£´æ35¸öÊÜѬȾµÄLinux¾µÏñ £¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ýת´ïÐÔѬȾÍþвÓû§¼°×éÖ¯Êý¾ÝÇå¾²¡£¸ÃºóÃÅÓɺã¾ÃÏîĿТ˳Õß"Jia Tan"ÉñÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖÐ £¬Í¨¹ýglibcµÄIFUNC»úÖÆÐ®ÖÆOpenSSHµÄRSA_public_decryptº¯Êý £¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootÏÂÁî¡£Ö»¹ÜÎó²î·¢Ã÷½ÏÔçÇÒ¹Ù·½ÒÑÐû²¼5.6.2¼°ÒÔÉÏÐÞ¸´°æ±¾ £¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢FedoraµÈÖ÷Á÷Linux¿¯Ðаæ £¬³ÉΪȥÄê×îÑÏÖØµÄÈí¼þ¹©Ó¦Á´Çå¾²ÊÂÎñÖ®Ò»¡£Docker Hub×÷ΪȫÇò¿ª·¢Õ߯ձéʹÓõÄÈÝÆ÷¾µÏñƽ̨ £¬ÆäÎÊÌâ¾µÏñµÄÒ»Á¬±£´æÒý·¢µ£ÐÄ¡£BinarlyɨÃè·¢Ã÷ £¬²¿·ÖÊÜѬȾ¾µÏñÈÔ¹ûÕæÐû²¼ £¬ÇÒ±£´æ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ" £¬ÐγÉת´ïÐÔΣº¦¡£Ðí¶àCI/CD¹ÜµÀ¼°Éú²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã £¬Èôδʵʱ¸üР£¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼ÌÐø¶ñÒâ´úÂë¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈά»¤Õßת´ïÇéÐÎ £¬µ«DebianÑ¡Ôñ±£´æÕâЩºóÞµÏñ £¬ÀíÓÉÊÇ"ʹÓÃÌõ¼þ¿Á¿Ì"ÇÒÐèά³Ö´æµµÒ»Á¬ÐÔ £¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£


https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/


2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷


8ÔÂ12ÈÕ £¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀí·þÎñ¾ÞÍ·Pacific HealthWorks£¨PHW£©¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷ £¬µ¼ÖÂÆä·þÎñµÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆ·þÎñ»ú¹¹£¨MSO£© £¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢Ò½ÉúÕûÌå¼°ÕïËùÌṩ¼±Õï¡¢ÖØÖ¢¼à»¤¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö £¬Äê·þÎñ»¼Õß³¬140ÍòÈ˴Ρ£´Ë´ÎÊÂÎñÖÐ £¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢µÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶ £¬²¿·ÖÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹ûÕæ¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÆáºÚÊܺ¦Õß"ÍøÕ¾Ðû²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉùÃ÷ £¬ÍþвÈôδÔÚָ׼ʱ¼äÄÚÁªÏµÌ¸ÅÐ £¬½«Ðû²¼°üÀ¨Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£CybernewsºË²é·¢Ã÷ £¬Ð¹Â¶Îļþº­¸ÇEmergent Medical Associates¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹ £¬Éæ¼°Õï¶Ï´úÂë¡¢°ü¹ÜË÷ÅâµÈ½¹µãÒ½ÁÆÊý¾Ý¡£


https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/


3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷ £¬·þÎñÖÐÖ¹Òý·ÛË¿¿Ö»Å


8ÔÂ12ÈÕ £¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ¿ËÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯Ó¦ÓÃÖÐÖ¹ÊýСʱ £¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂçÇ徲Σ»ú¡£´Ë´ÎÊÂÎñʼÓÚÍâµØÊ±¼äÆÆÏþ4µã30·Ö £¬Óû§ÎÞ·¨Ô¤¶©Ñݳª»áÃÅÆ±¡¢»á¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£Yes24ѸËÙ½«ÏµÍ³ÀëÏßÒÔ×èÖ¹¹¥»÷ £¬²¢ÒÀÍб¸·ÝÊý¾ÝÔÚ7СʱÄÚ»Ö¸´ÔËÓª £¬µ«Î´Í¸Â¶¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇó¡£ÖÐÖ¹¶Ôº«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ïì £¬Ô­¶¨ÓÚµ±Íí8µã×îÏȵÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ£ £¬·þÎñ»Ö¸´ºó¸Õ¸ÕÖØÆô¡£´Ë´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ôȱ·¦Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌì £¬Ó°ÏìÆÓ±¦½£¡¢ENHYPENµÈÒÕÈËÑݳöƱÎñ £¬²¢Ì»Â¶Æäȱ·¦ÒìµØ±¸·ÝϵͳµÄÇå¾²¶Ì°å¡£Ö»¹Ü¸Ã¹«Ë¾ÊºóÔÊÐí"³¹²éÇ徲ϵͳ"¡¢Ô¼ÇëÍⲿÍŶӲ¢Éý¼¶ÏµÍ³ £¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ £¬Ö¸ÔðÆäÕû¸Ä²½·¥²»µ½Î»ÇÒÐÅϢ͸Ã÷¶Èȱ·¦¡£


https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected


4. FortinetÖÒÑÔFortiSIEMÔ¤ÊÚȨRCEÎó²î¿ÉÄܱ»Ê¹ÓÃ


8ÔÂ13ÈÕ £¬ÍøÂçÇå¾²³§ÉÌFortinet¿ËÈÕÐû²¼½ôÆÈÇ徲ͨ¸æ £¬Åû¶Æä½¹µãÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM±£´æÒ»¸öÑÏÖØÆ·¼¶£¨CVSS 9.8£©µÄÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2025-25256£©¡£¸ÃÎó²îÓ°Ïì°æ±¾¹æÄ£ÆÕ±é £¬º­¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§ £¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹ÊÖÒÕÖ§³Ö £¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ7.3.2¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£Îó²î³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ¾ÙÐгä·Ö¹ýÂË £¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâCLIÇëÇó £¬ÔÚÄ¿µÄϵͳִÐÐí§ÒâÏÂÁî¡£FortinetÈ·ÈϸÃÎó²î±£´æ¿É¹ûÕæ»ñÈ¡µÄʹÓôúÂë £¬ÇÒ¹¥»÷ÐÐΪ²»»á±¬·¢ÆæÒìIOCÌØÕ÷ £¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕʹÓà £¬µ«GreyNoiseÍþвÇ鱨¹«Ë¾Ö¸³ö £¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö £¬´ËÀàÒì³£Á÷Á¿²¨¶¯ÍùÍùԤʾÐÂÎó²îÅû¶ £¬Á½Õß¿ÉÄܱ£´æ¹ØÁªÐÔ¡£´Ë´ÎÎó²î̻¶ºó £¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖ¸ùÌìÐÔÐÞ¸´ £¬Í¬Ê±ÌṩÔÝʱ»º½â¼Æ»®¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/


5. ±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾


8ÔÂ13ÈÕ £¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒ¿ËÈÕÔâÓöÑÏÖØÍøÂç¹¥»÷ £¬µ¼ÖÂÆä½¹µãÐÅϢϵͳÖÜȫ̱»¾ £¬°üÀ¨¹Ù·½ÍøÕ¾¡¢µç×ÓÓʼþÕË»§¼°Àο¿µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ £¬´Ë´ÎÊÂÎñÒÑ´¥·¢¿ç²¿·ÖЭ×÷ÏìÓ¦ £¬ÊÖÒÕÖ°Ô±ÔÚÖ´·¨»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦»Ö¸´·þÎñ²¢ÊӲ칥»÷Ô´Í·¡£Ö»¹ÜÄ¿½ñ¹¥»÷ǰÑÔÉÐδÃ÷È· £¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹ûÕæÈÏÁìÔðÈÎ £¬µ«ÊÂÎñµÄÆÕ±éÓ°Ï켰ϵͳ̱»¾ÌØÕ÷Óëµä·¶ÀÕË÷¹¥»÷¸ß¶ÈÎǺÏ £¬Òý·¢¶ÔDZÔÚ¹©Ó¦Á´Î£º¦µÄµ£ÐÄ¡£ÍøÂçÇ徲ר¼Ò¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢Ã÷ΪÊÂÎñÊÓ²ìÌṩÁËÒªº¦ÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«ÖÚµÄCitrix NetScaler×°±¸ÒòδÐÞ²¹CVE-2025-5777Îó²î¶øºã¾Ã̻¶ÓÚ¹¥»÷Σº¦ÖС£ShodanɨÃèÊý¾ÝÏÔʾ £¬Á½Ì¨Ïà¹Ø×°±¸»®·ÖÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏß £¬Ê±¼äÏßÓë¹¥»÷±¬·¢¸ß¶ÈÖØºÏ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬¸ÃÎó²îÒѱ»ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡± £¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚÍê³ÉÐÞ²¹¡£×èÖ¹±¨µÀÐû²¼ £¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤ÍøÕ¾ÈÔδ»Ö¸´ £¬ÏµÍ³ÐÞ¸´ÊÂÇéÈÔÔÚ¾ÙÐÐÖС£


https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/


6. AIÉî¶ÈαÔìÊÖÒÕ´ßÉú¿ç¹úͶ×ÊȦÌ× £¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ


8ÔÂ13ÈÕ £¬ÍøÂçÇå¾²»ú¹¹Group-IB¿ËÈÕÅû¶ £¬Õ©Æ­·Ö×ÓÕýʹÓÃÌìÉúʽAIÊÖÒÕ¹¹½¨¸ß¶È±ÆÕæµÄÚ²Æ­ÍøÂç £¬Í¨¹ýÉî¶ÈαÔìÊÓÆµ¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¹ã¸æÍ¶·Å £¬ÓÕÆ­È«Çò¶à¹úͶ×ÊÕß¼ÓÈëÐéαÉúÒâÆ½Ì¨¡£Ñо¿ÏÔʾ £¬´ËÀàȦÌ×ÒÑÐΪϰÄ£»¯¹¤ÒµÁ´ £¬ÆäÊÖÒÕÖØÆ¯ºóÓëÐÄÀí²Ù¿ØÊֶξù´ïи߶È¡£½¹µãڲƭÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£Õ©Æ­Õ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«ÖÚÈËÎïµÄÓ°ÏñÓëÉùÒô £¬ÖÆ×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Ï £¬ÍŽá¸Ä¶¯µÄÉúÒâÊý¾Ýͼ±íÓëÐéαר¼Ò±³Êé £¬ÓªÔì³ö"¶À¼ÒͶ×Êʱ»ú"µÄ½ôÆÈ¸Ð¡£Êܺ¦Õß±»Ö¸µ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾ £¬ÕâÐ©ÍøÕ¾Í¨¹ýÍâµØ»¯ÄÚÈÝÊÊÅäÓû§ËùÔÚ¹ú¼ÒÓïÑÔ £¬²¢Ç¶ÈëÉ罻ýÌåÕ˺𢲩¿ÍÎÄÕ¼°YouTubeƵµÀ¾ÙÐжàÇþµÀÍÆ¹ã £¬ÐγÉÐéαÐÅÏ¢Éú̬¡£×¢²á½×¶Î £¬Æ½Ì¨ÒÔ"С¶î°ü¹Ü½ð"£¨100-250ÃÀÔª£©½µµÍÓû§Ð¡ÐÄÐÔ £¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢×¡Ö·Ö¤ÊµÉõÖÁÐÅÓÿ¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£ÖµµÃСÐĵÄÊÇ £¬´ËÀàÍøÕ¾Í¨¹ýIPµØµãÓëÓïÑÔ¼ì²âʵÏÖ¾«×¼ÆÁÕÏ £¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨»á¼û £¬¶øÓ¡¶È¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÈÕ±¾µÈ13¸ö¹ú¼Ò³ÉΪÖ÷ҪĿµÄ¡£


https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/