XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼
Ðû²¼Ê±¼ä 2025-08-141. XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼
8ÔÂ12ÈÕ£¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚÒ»Á¬·¢½Í£¬BinarlyÑо¿ÍŶӷ¢Ã÷Docker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ±£´æ35¸öÊÜѬȾµÄLinux¾µÏñ£¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ýת´ïÐÔѬȾÍþвÓû§¼°×éÖ¯Êý¾ÝÇå¾²¡£¸ÃºóÃÅÓɺã¾ÃÏîĿТ˳Õß"Jia Tan"ÉñÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖУ¬Í¨¹ýglibcµÄIFUNC»úÖÆÐ®ÖÆOpenSSHµÄRSA_public_decryptº¯Êý£¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootÏÂÁî¡£Ö»¹ÜÎó²î·¢Ã÷½ÏÔçÇÒ¹Ù·½ÒÑÐû²¼5.6.2¼°ÒÔÉÏÐÞ¸´°æ±¾£¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢FedoraµÈÖ÷Á÷Linux¿¯Ðа棬³ÉΪȥÄê×îÑÏÖØµÄÈí¼þ¹©Ó¦Á´Çå¾²ÊÂÎñÖ®Ò»¡£Docker Hub×÷ΪȫÇò¿ª·¢Õ߯ձéʹÓõÄÈÝÆ÷¾µÏñƽ̨£¬ÆäÎÊÌâ¾µÏñµÄÒ»Á¬±£´æÒý·¢µ£ÐÄ¡£BinarlyɨÃè·¢Ã÷£¬²¿·ÖÊÜѬȾ¾µÏñÈÔ¹ûÕæÐû²¼£¬ÇÒ±£´æ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ"£¬ÐγÉת´ïÐÔΣº¦¡£Ðí¶àCI/CD¹ÜµÀ¼°Éú²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã£¬Èôδʵʱ¸üУ¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼ÌÐø¶ñÒâ´úÂë¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈά»¤Õßת´ïÇéÐΣ¬µ«DebianÑ¡Ôñ±£´æÕâЩºóÞµÏñ£¬ÀíÓÉÊÇ"ʹÓÃÌõ¼þ¿Á¿Ì"ÇÒÐèά³Ö´æµµÒ»Á¬ÐÔ£¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£
https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/
2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷
8ÔÂ12ÈÕ£¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀí·þÎñ¾ÞÍ·Pacific HealthWorks£¨PHW£©¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬µ¼ÖÂÆä·þÎñµÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆ·þÎñ»ú¹¹£¨MSO£©£¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢Ò½ÉúÕûÌå¼°ÕïËùÌṩ¼±Õï¡¢ÖØÖ¢¼à»¤¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö£¬Äê·þÎñ»¼Õß³¬140ÍòÈ˴Ρ£´Ë´ÎÊÂÎñÖУ¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢µÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶£¬²¿·ÖÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹ûÕæ¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÆáºÚÊܺ¦Õß"ÍøÕ¾Ðû²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉùÃ÷£¬ÍþвÈôδÔÚָ׼ʱ¼äÄÚÁªÏµÌ¸ÅУ¬½«Ðû²¼°üÀ¨Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£CybernewsºË²é·¢Ã÷£¬Ð¹Â¶Îļþº¸ÇEmergent Medical Associates¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹£¬Éæ¼°Õï¶Ï´úÂë¡¢°ü¹ÜË÷ÅâµÈ½¹µãÒ½ÁÆÊý¾Ý¡£
https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/
3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷£¬·þÎñÖÐÖ¹Òý·ÛË¿¿Ö»Å
8ÔÂ12ÈÕ£¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ¿ËÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯Ó¦ÓÃÖÐÖ¹ÊýСʱ£¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂçÇ徲Σ»ú¡£´Ë´ÎÊÂÎñʼÓÚÍâµØÊ±¼äÆÆÏþ4µã30·Ö£¬Óû§ÎÞ·¨Ô¤¶©Ñݳª»áÃÅÆ±¡¢»á¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£Yes24ѸËÙ½«ÏµÍ³ÀëÏßÒÔ×èÖ¹¹¥»÷£¬²¢ÒÀÍб¸·ÝÊý¾ÝÔÚ7СʱÄÚ»Ö¸´ÔËÓª£¬µ«Î´Í¸Â¶¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇó¡£ÖÐÖ¹¶Ôº«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ï죬Զ¨ÓÚµ±Íí8µã×îÏȵÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ££¬·þÎñ»Ö¸´ºó¸Õ¸ÕÖØÆô¡£´Ë´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ôȱ·¦Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌ죬ӰÏìÆÓ±¦½£¡¢ENHYPENµÈÒÕÈËÑݳöƱÎñ£¬²¢Ì»Â¶Æäȱ·¦ÒìµØ±¸·ÝϵͳµÄÇå¾²¶Ì°å¡£Ö»¹Ü¸Ã¹«Ë¾ÊºóÔÊÐí"³¹²éÇ徲ϵͳ"¡¢Ô¼ÇëÍⲿÍŶӲ¢Éý¼¶ÏµÍ³£¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ£¬Ö¸ÔðÆäÕû¸Ä²½·¥²»µ½Î»ÇÒÐÅϢ͸Ã÷¶Èȱ·¦¡£
https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected
4. FortinetÖÒÑÔFortiSIEMÔ¤ÊÚȨRCEÎó²î¿ÉÄܱ»Ê¹ÓÃ
8ÔÂ13ÈÕ£¬ÍøÂçÇå¾²³§ÉÌFortinet¿ËÈÕÐû²¼½ôÆÈÇ徲ͨ¸æ£¬Åû¶Æä½¹µãÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM±£´æÒ»¸öÑÏÖØÆ·¼¶£¨CVSS 9.8£©µÄÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2025-25256£©¡£¸ÃÎó²îÓ°Ïì°æ±¾¹æÄ£ÆÕ±é£¬º¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§£¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹ÊÖÒÕÖ§³Ö£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ7.3.2¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£Îó²î³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ¾ÙÐгä·Ö¹ýÂË£¬µ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâCLIÇëÇó£¬ÔÚÄ¿µÄϵͳִÐÐí§ÒâÏÂÁî¡£FortinetÈ·ÈϸÃÎó²î±£´æ¿É¹ûÕæ»ñÈ¡µÄʹÓôúÂ룬ÇÒ¹¥»÷ÐÐΪ²»»á±¬·¢ÆæÒìIOCÌØÕ÷£¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕʹÓ㬵«GreyNoiseÍþвÇ鱨¹«Ë¾Ö¸³ö£¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö£¬´ËÀàÒì³£Á÷Á¿²¨¶¯ÍùÍùԤʾÐÂÎó²îÅû¶£¬Á½Õß¿ÉÄܱ£´æ¹ØÁªÐÔ¡£´Ë´ÎÎó²î̻¶ºó£¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖ¸ùÌìÐÔÐÞ¸´£¬Í¬Ê±ÌṩÔÝʱ»º½â¼Æ»®¡£
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/
5. ±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾
8ÔÂ13ÈÕ£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒ¿ËÈÕÔâÓöÑÏÖØÍøÂç¹¥»÷£¬µ¼ÖÂÆä½¹µãÐÅϢϵͳÖÜȫ̱»¾£¬°üÀ¨¹Ù·½ÍøÕ¾¡¢µç×ÓÓʼþÕË»§¼°Àο¿µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ£¬´Ë´ÎÊÂÎñÒÑ´¥·¢¿ç²¿·ÖÐ×÷ÏìÓ¦£¬ÊÖÒÕÖ°Ô±ÔÚÖ´·¨»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦»Ö¸´·þÎñ²¢ÊӲ칥»÷Ô´Í·¡£Ö»¹ÜÄ¿½ñ¹¥»÷ǰÑÔÉÐδÃ÷È·£¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹ûÕæÈÏÁìÔðÈΣ¬µ«ÊÂÎñµÄÆÕ±éÓ°Ï켰ϵͳ̱»¾ÌØÕ÷Óëµä·¶ÀÕË÷¹¥»÷¸ß¶ÈÎǺϣ¬Òý·¢¶ÔDZÔÚ¹©Ó¦Á´Î£º¦µÄµ£ÐÄ¡£ÍøÂçÇ徲ר¼Ò¿ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢Ã÷ΪÊÂÎñÊÓ²ìÌṩÁËÒªº¦ÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«ÖÚµÄCitrix NetScaler×°±¸ÒòδÐÞ²¹CVE-2025-5777Îó²î¶øºã¾Ã̻¶ÓÚ¹¥»÷Σº¦ÖС£ShodanɨÃèÊý¾ÝÏÔʾ£¬Á½Ì¨Ïà¹Ø×°±¸»®·ÖÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏߣ¬Ê±¼äÏßÓë¹¥»÷±¬·¢¸ß¶ÈÖØºÏ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¸ÃÎó²îÒѱ»ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚÍê³ÉÐÞ²¹¡£×èÖ¹±¨µÀÐû²¼£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤ÍøÕ¾ÈÔδ»Ö¸´£¬ÏµÍ³ÐÞ¸´ÊÂÇéÈÔÔÚ¾ÙÐÐÖС£
https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/
6. AIÉî¶ÈαÔìÊÖÒÕ´ßÉú¿ç¹úͶ×ÊȦÌ×£¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ
8ÔÂ13ÈÕ£¬ÍøÂçÇå¾²»ú¹¹Group-IB¿ËÈÕÅû¶£¬Õ©Æ·Ö×ÓÕýʹÓÃÌìÉúʽAIÊÖÒÕ¹¹½¨¸ß¶È±ÆÕæµÄÚ²ÆÍøÂ磬ͨ¹ýÉî¶ÈαÔìÊÓÆµ¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¹ã¸æÍ¶·Å£¬ÓÕÆÈ«Çò¶à¹úͶ×ÊÕß¼ÓÈëÐéαÉúÒâÆ½Ì¨¡£Ñо¿ÏÔʾ£¬´ËÀàȦÌ×ÒÑÐΪϰ컝¹¤ÒµÁ´£¬ÆäÊÖÒÕÖØÆ¯ºóÓëÐÄÀí²Ù¿ØÊֶξù´ïи߶ȡ£½¹µãÚ²ÆÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£Õ©ÆÕ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«ÖÚÈËÎïµÄÓ°ÏñÓëÉùÒô£¬ÖÆ×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Ï£¬ÍŽá¸Ä¶¯µÄÉúÒâÊý¾Ýͼ±íÓëÐéαר¼Ò±³Ê飬ӪÔì³ö"¶À¼ÒͶ×Êʱ»ú"µÄ½ôÆÈ¸Ð¡£Êܺ¦Õß±»Ö¸µ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾£¬ÕâÐ©ÍøÕ¾Í¨¹ýÍâµØ»¯ÄÚÈÝÊÊÅäÓû§ËùÔÚ¹ú¼ÒÓïÑÔ£¬²¢Ç¶ÈëÉ罻ýÌåÕ˺𢲩¿ÍÎÄÕ¼°YouTubeƵµÀ¾ÙÐжàÇþµÀÍÆ¹ã£¬ÐγÉÐéαÐÅÏ¢Éú̬¡£×¢²á½×¶Î£¬Æ½Ì¨ÒÔ"С¶î°ü¹Ü½ð"£¨100-250ÃÀÔª£©½µµÍÓû§Ð¡ÐÄÐÔ£¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢×¡Ö·Ö¤ÊµÉõÖÁÐÅÓÿ¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£ÖµµÃСÐĵÄÊÇ£¬´ËÀàÍøÕ¾Í¨¹ýIPµØµãÓëÓïÑÔ¼ì²âʵÏÖ¾«×¼ÆÁÕÏ£¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨»á¼û£¬¶øÓ¡¶È¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÈÕ±¾µÈ13¸ö¹ú¼Ò³ÉΪÖ÷ҪĿµÄ¡£
https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/


¾©¹«Íø°²±¸11010802024551ºÅ