Wazuh·þÎñÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ö¸±ê

°ä²¼¹¦·ò 2025-06-12

1. Wazuh·þÎñÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ö¸±ê


6ÔÂ10ÈÕ£¬Akamai°²È«µý±¨ºÍÏìÓ¦ÍŶӣ¨SIRT£©½üÈÕ·¢ÏÖ£¬Mirai½©Ê¬ÍøÂç±äÖÖÔÚÀûÓÃWazuh·þÎñÆ÷ÖеÄÒ»¸ö¹Ø¼üÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶£¨CVE-2025-24016£©½øÐй¥»÷»î¶¯¡£¸Ã·ì϶×î³õÓÚ½ñÄê2Ô·ݱ»Åû¶£¬µ«ÖÁ½ñÉÐδ±»Ôö³¤µ½ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©µÄÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£WazuhÊÇÒ»¸öÓÃÓÚÍþвԤ·À¡¢¼ì²âºÍÏìÓ¦µÄÃâ·Ñ¿ªÔ´Æ½Ì¨£¬¶øÕâ´ÎÊÜÓ°ÏìµÄ°æ±¾ÎªWazuh 4.4.0ÖÁ4.9.0£¬²¹¶¡ÒÑÔÚ4.9.1°æ±¾Öа䲼¡£¸Ã·ì϶ÔÊÐíÓµÓÐAPI½Ó¼ûȨÏÞµÄÔ¶³Ì¹¥»÷Õßͨ¹ýÉÏ´«¶ñÒâJSONÎļþÀ´Ö´ÐÐËÁÒâ´úÂë¡£¾ßÌåÀ´Ëµ£¬ÔÚWazuh APIÖУ¬DistributedAPIµÄ²ÎÊý»á±»ÐòÁл¯ÎªJSON£¬²¢Ê¹ÓÃÌØ¶¨ÎļþÖеÄas_Wazuh_object½øÐз´ÐòÁл¯¡£¹¥»÷ÕßÄܹ»Í¨¹ýÔÚDAPIÒªÇóÖÐ×¢Èëδ¾­´¦ÖõÄ×ÖµäÀ´ÀûÓô˷ì϶£¬½ø¶øµ¼ÖÂËÁÒâPython´úÂëµÄÖ´ÐУ¬»òÕ߸üͨË×µØËµ£¬ÓÕÆ­ÏµÍ³ÔËÐжñÒâPython´úÂë¡£×êÑÐÈËԱǿµ÷£¬¸Ã·ì϶½öÓ°ÏìÔËÐйýÆÚ°æ±¾µÄ»î¶¯Wazuh·þÎñÆ÷£¬Òò¶ø¶½´ÙÓû§¾¡¿ì¸üе½Wazuh 4.9.1»ò¸ü¸ß°æ±¾£¬ÒÔ·À±¸Ç±ÔڵݲȫÍþв¡£


https://cybernews.com/security/wazuh-servers-targeted-by-mirai-botnets/


2. FacebookÉÏ·¢ÏÖ4000¶à¸öÐéÎ±ÍøÕ¾°ä²¼ÐéαÂòÂô


6ÔÂ10ÈÕ£¬Silent PushÍþв·ÖÎöʦ½üÈÕ·¢ÏÖÁËÒ»¸öÃûΪ¡°GhostVendors¡±µÄÖØ´óÐéαÊг¡ÍøÂç£¬Éæ¼°³¬¹ý4000¸öÚ¿Æ­ÍøÕ¾£¬ÕâÐ©ÍøÕ¾¼ÙÒâÁËÔ̺¬ÑÇÂíÑ·¡¢Argos¡¢Costco¡¢Nordstrom¡¢ÀÍÁ¦Ê¿¡¢ÃܶûÎÖ»ù¹¤¾ß£¨Milwaukee Tools£¬ÔÚÚ¿Æ­¸æ°×Öб»´Û¸ÄΪ¡°Millaeke¡±£©ÒÔ¼°²ª¿Ï£¨Birkenstock£©µÈÔÚÄÚµÄÊýÊ®¸ö³ÛÃûÆ·ÅÆ¡£Ú¿Æ­Õßͨ¹ýFacebook MarketplaceͶ·Å´óÁ¿¸æ°×½øÐÐÍÆ¹ã£¬ÀûÓü«µÍµÄ¼ÛÖµÒýÓÕÏû·ÑÕß¡£ËûÃÇÆæÃîµØÀûÓÃMetaµÄ¸æ°×Êý¾Ý±£Áô¹æ¶¨£¬ÔڻʵÏÖºóѸ¿ìɾ³ýËùÓкۼ££¬Ê¹µÃ·ÀÓùÕßÄÑÒÔ×·×Ù¡£Ú¿Æ­Õß²»½ö¿Ë¡³ÛÃûÆ·ÅÆÍøÕ¾Ä£°å£¬»¹Ôì×÷ÁËÊýÊ®¸öÀàËÆµÄ¼Ù𸱱¾£¬Í¨¹ý¡°Çå²Ö¡±»ò¡°½ÚÈÕ´ÙÏú¡±µÈ¹Ø¼ü´ÊÒÔ¼°ÁîÈËÄÑÒÔÏàÐŵÄÓÅ»ÝÂòÂôÀ´ÎüÒý½Ó¼ûÕß¡£Ò»µ©Ïû·ÑÕßÖмÆ£¬Ú¿Æ­Õß±ã¿ÉÄܲ»½»¸¶¶©¹ºµÄ²úÆ·»òÇÔÈ¡Æä¸¶¿î¾ßÌåÐÅÏ¢£¬Ö´ÐнðÈÚڲƭ¡£ÓÉÓÚMetaµÄ¸æ°×Êý¾Ý±£Áô¹æ¶¨Ïà¶ÔËɳÚ£¬·ÀÓùÕßÔÚ×·×ÙÕâЩ¼±¾çÆô¶¯ºÍÖÕ³¡µÄÚ¿Æ­»î¶¯Ê±Ãæ¶Ô³Á´óÌôÕ½¡£Silent PushÖÒ¸æ³Æ£¬ºÚ¿ÍÔÚÀûÓÃÕâÐ©Ú²Æ­ÍøÕ¾½øÐи÷ÖÖÀàÐ͵ĽðÈÚڲƭ£¬ÇÒĿǰÏÕЩ²»³ÉÄÜÈ«Ãæ×·×Ù¸ÃÍøÂçÉϵĶñÒâ¸æ°×¡£Òò¶ø£¬Ïû·ÑÕßÐèÌá¸ß¾¯Ì裬Ԥ·ÀÊÜÆ­ÊÜÆ­£¬Í¬Ê±£¬ÓÐ¹ØÆ½Ì¨Ò²Ó¦¼ÓÇ¿¼à¹Ü£¬ÃÀÂú¸æ°×Êý¾Ý±£Áô¹æ¶¨£¬ÒÔÓÐЧ½ø¹¥´ËÀàÚ¿Æ­»î¶¯¡£


https://cybernews.com/security/thousands-domains-pushing-phony-deals-on-facebook/


3. ·Ñ³ÇMastery SchoolsÔâÀÕË÷¹¥»÷£¬³¬3.7ÍòÈËÊý¾Ýй¶


6ÔÂ10ÈÕ£¬·Ñ³ÇÌØÐíѧÌÃÍøÂçMastery SchoolsÓÚ2024Äê9ÔÂÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂ37,031ÈËÓ×ÎÒÊý¾Ýй¶¡£Õâ´ÎÊÂÎñÉæ¼°¸ÃѧÌÃÔڷѳǼ°¿¨Ä·µÇÔËÓªµÄ23ËùУ԰£¬Ô¼14,000ÃûѧÉúÊܵ½Ó°Ï졣й¶µÄÃô¸ÐÐÅÏ¢¿í·º£¬Ô̺¬Éç»á±£Ïպš¢Ò½ÁƼͼ¡¢Ñ§Éúµµ°¸¡¢ÒøÐм°²ÆÕþÐÅÏ¢¡¢ÉúÎï¼ø±ðÊý¾ÝµÈ¡£¹¥»÷µ¼ÖÂѧÌÃÖ÷ÌâÒµÎñÖжÏ£¬ÀÕË÷×éÖ¯DragonForceÐû³Æ¶ÔÊÂÎñÕÆ¹Ü£¬²¢Ðû³ÆÇÔÈ¡ÁË171GBÊý¾Ý£¬µ«Mastery Schoolsδ֤ʵ¸Ã˵·¨£¬Ò²Î´Ð¹Â©ÈëÇÖ·½Ê½»òÊÇ·ñÖ§¸¶Êê½ð¡£Ð£·½°µÊ¾£¬ÒÑÈ·¶¨Î´¾­ÊÚȨÕßÏÂÔØÁ˲¿ÃÅÊý¾Ý£¬µ«Ä¿Ç°ÉÐÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»ÓÃÓÚÉí·ÝµÁÓûòڲƭ¡£ÎªÐ­ÖúÊÜÓ°ÏìÈËÔ±£¬Mastery Schoolsͨ¹ýExperianµÄIdentityWorks·þÎñÌṩÃâ·ÑÉí·Ý± £»¤£¬²¢¼ÓÇ¿Á˶à³É·ÖÈÏÖ¤ÀûÓá¢ÌáÉýÁËÖÕ¶Ë¼à¿ØÄÜÁ¦£¬Í¬Ê±ÒýÈë±í²¿ÍøÂ簲ȫר¼ÒÍŶӲ¢½áºÏÁª¹ú·¨Âɲ¿ÃÅÉî¿Ìµ÷²é¡£ComparitechÊý¾ÝÏÔʾ£¬2024ÄêÃÀ¹ú´âУ¼°´óѧ¹²Ôâ·ê79ÆðÀÕË÷¹¥»÷£¬²¨¼°½ü290Íò±Ê¼Í¼£¬´ËÀ๥»÷³£µ¼Ö³Á´óÔËÓªÖжÏ£¬È翼ÊÔÑÓÆÚ¡¢Ð½×Êϵͳ̱»¾µÈ£¬¶Ô½ÌÓý»ú»ú¹Ø³ÉÑϳÁÓ°Ïì¡£


https://www.infosecurity-magazine.com/news/mastery-schools-data-breach/


4. ¡°°²È«Ðж¯¡±¹ú¼Ê·¨ÂÉ£º½ø¹¥¶à¹úÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ


6ÔÂ11ÈÕ£¬´úºÅΪ¡°°²È«Ðж¯¡±µÄ¹ú¼Ê·¨ÂÉÐж¯ÓÚ2025Äê1ÔÂÖÁ4Ô·¢Õ¹£¬Óɹú¼ÊÐ̾¯×é֯ǣͷ£¬Õë¶Ô26¸ö¹ú¶ÈµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ù´¡ÉèÊ©·¢Õ¹´ó¹æÄ£½ø¹¥¡£Ðж¯³Áµã½ø¹¥Í¨¹ý¿í·ºÏ°È¾ÇÔÈ¡²ÆÕþºÍÓ×ÎÒÊý¾ÝµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍŻÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡ÕË»§Æ¾Ö¤¡¢ä¯ÀÀÆ÷CookieºÍ¼ÓÃÜÇ®±ÒÇ®°üÏêÇéµÈÊý¾Ý£¬»ã±à³É¡°ÈÕÖ¾¡±ÔÚÍøÂç·¸×ïÊг¡ÏúÊÛ»òÓÃÓÚ¶¨Ïò¹¥»÷¸ß¼ÛÖµÊܺ¦Õß¡£Õâ´ÎÐж¯³É¾ÍÏÔÖø£º¹Ø¹Ø³¬20000¸öÓëÐÅÏ¢ÇÔÈ¡ÕßÓйصĶñÒâIP/ÓòÃû£¬²é»ñ41̨֧³ÖÐÅÏ¢ÇÔÈ¡»î¶¯µÄ·þÎñÆ÷£¬¿ÛÁô32ÃûÏÓÒÉÈË£¬³ä¹«100GBÊý¾Ý£¬²¢Í¨Öª216000ÃûÊܺ¦Õß¡£µ±¾Ö»¹·¢ÏÖÏã¸ÛÓÐ117̨·þÎñÆ÷×é³ÉµÄ´óÐͼ¯Èº£¬±»ÓÃ×÷ÍøÂç´¹µö¡¢ÍøÂçڲƭºÍÉ罻ýÌåÚ¿Æ­Ðж¯µÄºÅÁîºÍ½ÚÔ죨C2£©»ù´¡ÉèÊ©¡£Ô½ÄϾ¯·½ÔÚÕâ´ÎÐж¯Öвû·¢Í¹Æð£¬¿ÛÁô18ÃûÏÓÒÉÈË£¬ÆäÖÐÔ̺¬Ò»ÃûרÃÅÏúÊÛ¹«Ë¾ÕË»§µÄÍøÂç·¸×OÍÅÍ·×Ó¡£Ðж¯»¹µÃµ½¿¨°Í˹»ù¡¢Group-IBºÍÇ÷Ïò¿Æ¼¼µÈ¸öÈËÍøÂ簲ȫºÏ×÷ͬ°éµÄЭÖú¡£Group-IBÖ¸³ö£¬Ðж¯ÒÑÓ°ÏìÓëLumma¡¢RiseProºÍMETA StealerÓйصĻù´¡ÉèÊ©£¬×êÑÐÈËÔ±Ïòµ±¾ÖÌṩ¹Ø¼ü¹¤×÷µý±¨£¬²¢×·×ÙÁËÔËÓªÉÌÓÃÓÚÐû´«¶ñÒâÈí¼þºÍÏúÊÛ±»µÁÊý¾ÝµÄTelegramºÍ°µÍøÕË»§¡£


https://www.bleepingcomputer.com/news/security/operation-secure-disrupts-global-infostealer-malware-operations/


5. ÒÁÀû±£ÏÕ¼¯ÍÅÔâÍøÂç¹¥»÷µ¼ÖÂÒµÎñÖжÏ


6ÔÂ11ÈÕ£¬ÒÁÀû±£ÏÕ¹«Ë¾£¨Erie Insurance£©ºÍÒÁÀûÅâ³¥¹«Ë¾½üÈÕй©£¬ÖÜÄ©²úÉúµÄÍøÂç¹¥»÷Êǵ¼ÖÂÆäÍøÕ¾ÒµÎñÖÐ¶ÏºÍÆ½Ì¨Ì±»¾µÄÔ­Òò¡£ÒÁÀûÅâ³¥¹«Ë¾×÷ΪÒÁÀû±£ÏÕ¼¯ÍŵÄÖÎÀí¹«Ë¾£¬¸Ã¼¯ÍÅÊÇÒ»¼ÒÕ¼Óг¬¹ý600Íò·ÝÓÐЧ±£µ¥µÄ²Æ¸»ºÍÒâ±íÏÕ±£ÏÕ¹«Ë¾£¬Í¨¹ý¶ÀÁ¢´úÀíÈËÌṩ¶àÖÖ±£ÏÕ·þÎñ¡£×Ô6ÔÂ7ÈÕÐÇÆÚÁùÆð£¬Erie Insurance±ãÔâ·ê´óÃæ»ýÍ£µçºÍÒµÎñÖжÏ£¬¿Í»§ÎÞ·¨µÇ¼¿Í»§ÃÅ»§£¬ÔÚÌá³öË÷Åâ»ò½Ó¹ÜÎļþʱÓöµ½ÄÑÌâ¡£ÒÁÀûÅâ³¥¼¯ÍÅÒÑÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»8-K±í¸ñ£¬³ÆÔÚ6ÔÂ7ÈÕ¼ì²âµ½¡°Òì³£ÍøÂç»î¶¯¡±¡£ÒÁÀû±£ÏÕÍøÕ¾Ò²°ä²¼Í¨Öª£¬³ÆÐÅÏ¢°²È«ÍŶÓÔÚ6ÔÂ7ÈÕ·¢ÏÖÒì³£ÍøÂç»î¶¯£¬²¢µ±¼´²ÉÈ¡Ðж¯Ó¦¶Ô£¬ÒÔ± £»¤ÏµÍ³ºÍÊý¾Ý¡£¹«Ë¾ÒÑÆô¶¯ÊÂÎñÏìÓ¦ºÍ̸£¬²¢²ÉÈ¡± £»¤´ëʩȷ±£ÏµÍ³°²È«¡£Ä¿Ç°£¬ÒÁÀû±£ÏÕÔÚÓë·¨Âɲ¿ÃźÏ×÷£¬²¢ÔÚÍøÂ簲ȫר¼ÒµÄЭÖúϽøÐÐÈ«ÃæµÄȡ֤·ÖÎö£¬ÒÔÈ«ÃæÏàʶÊÂÎñ¡£¹«Ë¾ÖÒ¸æ³Æ£¬ÔÚÍ£µçÆÚ¼ä²»»áÖµç»ò·¢Ë͵ç×ÓÓʼþ¸ø¿Í»§ÒªÇ󸶿²¢½¨Òé¿Í»§²»Öصã»÷δ֪ÆðÔ´µÄÁ´½Ó»òÌṩÓ×ÎÒÐÅÏ¢¡£¶ÔÓÚ±ØÒªÌá³öË÷ÅâµÄͶ±£ÈË£¬¹«Ë¾ÌṩÁËÁªÏµ±¾µØ´úÀíÈË»òERIE³õ´ÎËðʧ֪ͨÍŶӵĵ绰£¬ÒÔ¼°¿Í»§·þÎñµç»°¡£Ä¿Ç°£¬ÉÐδȷ¶¨Õâ´Î¹¥»÷ÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬Ò²Î´Ð¹Â©Êý¾ÝÊÇ·ñÔÚ¹¥»÷¹ý³ÌÖб»µÁ¡£ÒÁÀû°µÊ¾£¬¸ÃÊÂÎñµÄÈ«ÊýÁìÓò¡¢ÐÔÖʺÍÓ°ÏìÈÔÓдý½øÒ»²½È·¶¨¡£


https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/


6. Roundcube RCE·ì϶²¹¶¡ºóÔâÀûÓ㬳¬8Íǫ̀·þÎñÆ÷ÊÜÓ°Ïì


6ÔÂ11ÈÕ£¬RoundcubeÕâһʢÐÐWebÓʼþƽ̨½üÈÕÆØ³öÑϳÁÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶£¨±àºÅCVE-2025-49113£©£¬¸Ã·ì϶ÔÚ²¹¶¡°ä²¼½ö¼¸Ììºó¾Í±»ÍþвÐÐΪÕßÀûÓ㬹¥»÷Á˳¬¹ý80,000Ì¨ÃæÏò»¥ÁªÍøµÄ·þÎñÆ÷¡£¸Ã·ì϶CVSSÆÀ·Ö¸ß´ï9.9£¬´ËǰÒÑÂñ·üÊ®ÓàÄ꣬¹¥»÷Õ߿ɽè´Ë½ÚÔìÊÜÓ°Ïìϵͳ²¢ÔËÐжñÒâ´úÂ룬¶ÔÓû§ºÍ×éÖ¯×é³É¾Þ´ó·çÏÕ¡£FearsOffÊ×´´È˼æÊ×ϯִÐйÙKirill Firsov·¢ÏÖÁË´Ë·ì϶£¬Ëû¹À¼Æ¸Ã·ì϶ӰÏ쳬¹ý5300Íǫ̀Ö÷»ú£¬Ô̺¬Ê¹ÓÃcPanel¡¢PleskµÈ¹¤¾ßµÄ·þÎñÆ÷¡£NIST°ä²¼µÄ°²È«²¼¸æÖ¸³ö£¬Roundcube Webmail 1.5.10֮ǰµÄ°æ±¾ºÍ1.6.11֮ǰµÄ1.6.x°æ±¾´æÔÚ´Ë·ì϶£¬ÒòURLÖеÄ_from²ÎÊýδÔÚÌØ¶¨ÎļþÖÐÑéÖ¤£¬µ¼ÖÂPHP¶ÔÏó·´ÐòÁл¯£¬´Ó¶øÔÊÐí¾­¹ýÉí·ÝÑéÖ¤µÄÓû§Ö´ÐÐÔ¶³Ì´úÂë¡£¸Ã·ì϶ÒÑÔÚRoundcube 1.6.11ºÍ1.5.10 LTS°æ±¾Öеõ½½¨¸´¡£·ì϶Åû¶ºó£¬Positive Technologies×êÑÐÈËÔ±³É¹¦¸´ÏÖÁ˸÷ì϶£¬²¢¶½´ÙÓû§µ±¼´¸üÐÂÖÁ×îа汾¡£È»¶ø£¬Shadowserver»ù½ð»á×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬»¥ÁªÍøÉÏÈÔÓÐԼĪ84,000¸öRoundcubeÊ·ýδµÃµ½½¨²¹£¬´æÔÚÑϳÁ°²È«Òþ»¼¡£


https://securityaffairs.com/178887/hacking/over-80000-servers-hit-as-roundcube-rce-bug-gets-rapidly-exploited.html