Elasticsearch·þÎñÆ÷ÅäÖÃÃýÎóÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
°ä²¼¹¦·ò 2025-07-251. Elasticsearch·þÎñÆ÷ÅäÖÃÃýÎóÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
7ÔÂ23ÈÕ£¬Ò»¸öÎÞÐèÉí·ÝÑéÖ¤µÄ¹«¿ªÊý¾Ý¿â¶³öÁËÈðµä¹«Ãñ¼°ÆóÒµ³¬¹ý1ÒÚÌõÃô¸Ð¼Í¼£¬¹¦·ò¿ç¶È¸²¸Ç2019ÖÁ2024Ä꣬Êý¾Ý×ÜÁ¿´ï200GBÒÔÉÏ¡£Õâ´ÎÊÂÎñÓÉCybernews×êÑÐÈËÔ±·¢ÏÖ£¬Â¶³öµÄÊý¾ÝÔ̺¬Ó×ÎÒ·¨¶¨ÐÕÃû£¨º¬º¹ÇàÔøÓÃÃû£©¡¢ÈðµäÉí·ÝÖ¤ºÅ¡¢µ®ÉúÈÕÆÚ¡¢»éÒöÇé¿ö¡¢¹úÄÚ±íµØÖ·¹ì¼£¡¢ÒÆÃñÐÅÏ¢¡¢Õ®Îñ¼Í¼¡¢ÆÆ²úº¹Çà¡¢²Æ¸»ËùÓÐȨָ±ê¼°Â½ÐøÎåÄêµÄËùµÃ˰Êý¾Ý£¨2019-2023£©£¬ÉõÖÁÔ̺¬ÆóҵóÒ×¹ØÏµ¡¢ËðÒæ±íÌá½»¼Í¼µÈÐÐΪÈÕÖ¾£¬ÐγɶÔÈðµäÉç»á³ÉÔ±³¤´ïÎåÄêµÄ²ÆÕþÓëÐÐΪȫ¾°»Ïñ¡£¸ÃÊý¾Ý¿âµÄÒ쳣¶³öÔ´ÓÚElasticsearch¼¯ÈºµÄȨÏÞ½ÚÔìʧЧ¡£Ö»¹ÜÊý¾Ý½á¹¹Óë×ֶζ¨ÃûÏÔʾÆäÀ´×Ô±±Å·Ã³Ò×ÖÇÄÜ·ÖÎö¹«Ë¾Risika£¨ÄÚ²¿±êÇ©º¬"dwh*"Êý¾Ý²Ö¿â±êʶ£©£¬µ«½øÒ»´ëÊ©²é֤ʵ¸Ã·þÎñÆ÷²¢·ÇÓÉRisikaÖ±½ÓÔËÓª£¬¶øÊÇÆäÊÚȨµÄµÚÈý·½¿Í»§¶Ë¡£×êÑÐÈËÔ±´§Ä¦£¬Êý¾Ý¿ÉÄÜͨ¹ýºÏ·¨Ã³Ò×Ðí¿ÉÌṩ¸øÏÂÓκÏ×÷ͬ°é£¬È´ÒòÔËάºöÂÔµ¼Ö·þÎñÆ÷Ïò¹«¹²»¥ÁªÍøÆëȫʢ¿ª½Ó¼û¡£
https://cybernews.com/security/risika-swedish-data-exposed/
2. ·¨¹úˮʦ¼¯ÍÅÔâºÚ¿ÍÀÕË÷£¬¾üÊ»úÃÜй¶Íþв¹ú¶È°²È«
7ÔÂ23ÈÕ£¬·¨¹ú¹ú·À¹¤Òµ¾Þͷˮʦ¼¯ÍÅ£¨Naval Group£©½üÈÕÏÝÈë³Á´óÍøÂ簲ȫΣ»ú¡£¾ÝCybernews±¨Â·£¬Ò»¸öÉí·Ý²»Ã÷µÄÍþвÐÐΪÕßÔÚÊý¾Ýй¶ÂÛ̳ÉÏÐû³ÆÈëÇÖÁ˸ù«Ë¾£¬²¢ÍþÐ²Ð¹Â¶Éæ¼°¾ü½¢×÷Õ½ÖÎÀíϵͳ£¨CMS£©µÄÃô¸ÐÊý¾Ý£¬¶ø·ÇË÷ÒªÊê½ð¡£Õâ´ÎÊÂÎñÒòÉæ¼°·¨¹úÖ÷Ìâ¹ú·À¼¼Êõ£¬Òý·¢¶Ô¹ú¶È°²È«µÄÉî¶ÈÓÇÓô¡£¹¥»÷ÕßÐû³Æ»ñÈ¡µÄÊý¾ÝÔ̺¬£ºCMSÔ´´úÂë¡¢¼¼ÊõÎĵµ¡¢¿ª·¢ÈËÔ±Ðé¹¹»ú½Ó¼ûȨÏÞ¼°±£ÃÜͨѶ¼Í¼¡£ÎªÖ¤Ã÷ÕæÊµÐÔ£¬Æä¸½ÉÏÁË13GBÊý¾ÝÑù±¾£¬ÄÚº¬ºÏͬÎļþ¡¢ÒÉËÆCMSÄÚ²¿ÐÅÏ¢¼°2003ÄêDZͧ¼à¿ØÏµÍ³ÊÓÆµ¡£Cybernews×êÑÐÍŶӳõ²½ÑéÖ¤²¿ÃÅÊý¾ÝºóÒÔΪ£¬Ð¹Â¶ÄÚÈÝÓµÓнϸ߿ÉÐŶȡ£ÖµÍ×ÌùÐĵÄÊÇ£¬¹¥»÷ÕßδѡȡͨÀýµÄÊý¾ÝÊÛÂôģʽ£¬¶øÊÇÊÔͼͨ¹ýÍþв¹«¿ªÐÅÏ¢Ïòˮʦ¼¯ÍÅʩѹ£¬ÕâÒ»»ûÐÎÐÐΪ°µÊ¾Æä¶¯»ú¿ÉÄܳ¬¹ý¾¼ÃÀûÒæ¡£Õâ´ÎÊÂÎñ¶Ô·¨¹ú¹ú·À°²È«×é³ÉË«³Á·çÏÕ£º¼¼Êõ²ãÃæ£¬Ç±Í§Ó뻤ÎÀ½¢CMSÔ´´úÂëµÄй¶¿ÉÄܼõÈõ·¨¾üÕ½ÊõÓÅÊÆ£»Õ½Êõ²ãÃæ£¬Ãô¸ÐÎĵµµÄÀ©É¢»ò±»µÐ¶ÔÈ¨ÊÆÓÃÓÚÄæÏò¹¤³Ì»òÍøÂç¹¥»÷¡£
https://cybernews.com/security/naval-group-france-defense-data-breach/
3. WordPressÍøÕ¾ÏÖÒþÃØºóÃÅ£ºÀûÓÃmu-pluginsĿ¼ʵÏÖÓÆ¾Ã½ÚÔì
7ÔÂ24ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÔÚWordPressÍøÕ¾µÄ¡°mu-plugins¡±£¨±ØÐëʹÓòå¼þ£©Ä¿Â¼Öз¢ÏÖÒ»¸ö¸ß¶ÈÒñ±ÎµÄºóÃÅ·¨Ê½£¬¸ÃºóÃſɸ³Óè¹¥»÷ÕßÓÆ¾Ã»¯½Ó¼ûȨÏÞ²¢Ô¶³ÌÖ´ÐÐËÁÒâ²Ù×÷¡£mu-plugins×÷ΪWordPressĬÈÏÆôÓõÄÌØÊâ²å¼þ£¬ÆäÎļþλÓÚ¡°wp-content/mu-plugins¡±Ä¿Â¼£¬ÇÒ²»»áÏÔʾÔÚºó¶Ü²å¼þÖÎÀíÒ³Ãæ£¬³ý·ÇÊÖ¶¯É¾³ýÎļþ²»È»ÎÞ·¨½ûÓã¬ÕâÒ»¸öÐÔʹÆä³ÉΪ¹¥»÷Õß°µ²Ø¶ñÒâ´úÂëµÄÃÎÏëÖ¸±ê¡£Õâ´Î·¢ÏֵĶñÒⷨʽͨ¹ý¡°wp-index.php¡±¾ç±¾×÷Ϊ³õʼ¼ÓÔØÆ÷£¬´ÓʹÓÃROT13Ëã·¨»ìºÏµÄURLÖмìË÷Ô¶³ÌÓÐЧ¸ºÔØ£¬²¢½«Æä´æ´¢ÔÚWordPressÊý¾Ý¿âµÄ¡°_hdra_core¡±×ֶΣ¨wp_options±í£©ÖС£¶ñÒâ´úÂëÖ´Ðк󣬻áÏòÖ÷±êÌâ´Î×¢ÈëÃûΪ¡°pricing-table-3.php¡±µÄ°µ²ØÎļþÖÎÀíÆ÷£¬ÔÊÐí¹¥»÷ÕßÔ¶³Ìä¯ÀÀ¡¢ÉÏ´«»òɾ³ýÎļþ£»Í¬Ê±´´½¨¡°officialwp¡±ÖÎÀíÔ¹ØË»§²¢¼¤»î¶ñÒâ²å¼þ¡°wp-bot-protect.php¡±£¬ÐγÉË«³Á½ÚÔìÁ´¡£¸üΣÏÕµÄÊÇ£¬¸ÃºóÞ߱¸ÃÜÂë³ÁÖÃÖ°ÄÜ£¬¿É½«³£ÓÃÖÎÀíÔ¹ØË»§¼°×ÔÉí´´½¨µÄ¡°officialwp¡±Óû§ÃÜÂëÅú¸ÄΪ¹¥»÷ÕßÔ¤ÉèµÄĬÈÏÖµ£¬³¹µ×Ëø¶¨ÆäËûÖÎÀíԱȨÏÞ¡£
https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
4. ºÚ¿Í½«ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þDZÈëÕùÏÈÂÄÀú°æSteamÓÎÏ·
7ÔÂ24ÈÕ£¬³ÛÃûÍþв×éÖ¯EncryptHub£¨±ðºÅLarva-208£©Í¨¹ýÈëÇÖSteamƽ̨ÓÎÏ·¡¶Chemia¡·£¬ÏòÈ«ÇòÍæ¼Ò·Ö·¢ÐÅÏ¢ÇÔÈ¡Àà¶ñÒâÈí¼þ¡£¾ÝÍþвµý±¨¹«Ë¾ProdaftÅû¶£¬¹¥»÷ʼÓÚ7ÔÂ22ÈÕ¡£ºÚ¿Í×éÖ¯½«¶ñÒâ¶þ½øÔìÎļþÖ²ÈëÓÉAether Forge Studios¿ª·¢µÄÉú¼ÆÔì×÷ÀàÓÎÏ·¡¶Chemia¡·ÖС£¸ÃÓÎϷĿǰÒÔ"ÕùÏÈÂÄÀú"´ó¾ÖµÇ½Steam£¬ÉÐδ°ä²¼Õýʽ¿¯ÐÐÈÕÆÚ¡£¹¥»÷Õßͨ¹ýÔÚÓÎÏ·ÎļþÖÐÔö³¤ÃûΪCVKRUTNP.exeµÄHijackLoader¶ñÒâÈí¼þ£¬ÔÚÊܺ¦É豸³ÉÁ¢Óƾû¯»úÔìºó£¬½øÒ»²½ÏÂÔØÓµÓÐÐÅÏ¢ÇÔȡְÄܵÄVidar·¨Ê½£¨v9d9d.exe£©¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸Ã¶ñÒâÈí¼þͨ¹ýijTelegramƵ·»ñÈ¡ºÅÁîÓë½ÚÔ죨C2£©·þÎñÆ÷µØÖ·£¬ÐγÉÒñ±ÎµÄͨѶÁ´Â·¡£Õâ´Î¹¥»÷³öÏÖ¶à³Á¼¼ÊõÌØµã£ºÈýÓ×ʱºó£¬¹¥»÷Õßͨ¹ýDLLÎļþcclib.dllÖ²ÈëµÚ¶þ¿î¶ñÒâÈí¼þFickle Stealer¡£¸ÃÎļþÀûÓÃPowerShell¾ç±¾worker.ps1´ÓÓòÃûsoft-gets[.]com»ñÈ¡Ö÷ÔØºÉ£¬×¨ÃÅÕë¶Ôä¯ÀÀÆ÷´æ´¢Êý¾ÝÖ´ÐÐÇÔÈ¡£¬Ô̺¬ÕË»§Æ¾Ö¤¡¢×Ô¶¯Ìî³äÐÅÏ¢¡¢Cookie¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/
5. ÐÂÐÍAIÇý¶¯Linux¶ñÒâÈí¼þKoskeͨ¹ýÐÜèͼƬִÐÐÎÞÎļþ¹¥»÷
7ÔÂ24ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾AquaSec½üÆÚÅû¶һ¿îÃûΪKoskeµÄÐÂÐÍLinux¶ñÒâÈí¼þ£¬Æä´´Ð¹¥»÷ÊÖ·¨ÓëÒÉËÆÈËΪÖÇÄÜ£¨AI£©Çý¶¯¸öÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¸ÃÍþвͨ¹ý¿´ËÆÎÞº¦µÄÐÜèÖ÷ÌâJPEGͼƬ²¿Êð¶ñÒâ´úÂ룬ֱ½ÓÔÚϵͳÄÚ´æÖÐÖ´ÐвÙ×÷£¬Õ¹Ê¾³ö¸´Ôӵļ¼Êõ¼Ü¹¹Óë¸ß¶È×Ô¶¯»¯ÄÜÁ¦¡£Koske±»AquaSec×êÑÐÈËÔ±½ç˵Ϊ"¸´ÔÓµÄLinuxÍþв"£¬ÆäÖ÷ÌâÌØµãÔÚÓÚÀûÓöà̬Îļþ¼¼ÊõʵÏÖÒñ±Î¹¥»÷¡£¹¥»÷ÕßÊ×ÏÈͨ¹ý¶³öÔÚ¹«ÍøµÄJupyterLabÊ·ýÅäÖÃÃýÎó»ñÈ¡³õʼ½Ó¼ûȨÏÞ£¬Ëæºó´ÓOVH imagesµÈºÏ·¨Í¼´²ÏÂÔØÁ½ÕÅÐÜèJPEGͼƬ¡£ÕâЩͼƬËäÏÔʾΪÕý³£Í¼Ïñ£¬È´Í¨¹ýÌØÊâÎļþ½á¹¹Éè¼ÆÍ¬Ê±Ô̺¬ÓÐЧJPEGÎļþÍ·Óë¶ñÒâShell¾ç±¾¡¢C´úÂ룺Îļþǰ²¿ÎªÕý³£Í¼Æ¬Êý¾Ý£¬ºó²¿¸½¼Ó¿ÉÖ´ÐдúÂ룬ʹͳһÎļþ¼ÈÄܱ»Í¼Ïñ²é¿´Æ÷½âÎöΪͼƬ£¬ÓÖÄܱ»¾ç±¾Ú¹ÊÍÆ÷¼ø±ðΪ¿ÉÖ´Ðз¨Ê½¡£¹¥»÷¹ý³ÌÖУ¬Á½ÕÅÐÜèͼƬ±ðÀ뿪ÊÍ·ÖÆçÔØºÉ²¢Í¬²½Æô¶¯£ºÔغÉһʵÏÖϵͳ¼¶°µ²Ø£»Ôغɶþ³ÉÁ¢Óƾû¯»úÔì¡£¶ñÒâÈí¼þ»áÆÀ¹ÀÖ÷»úCPUÓëGPU»úÄÜ£¬´ÓGitHubÏÂÔØÕë¶ÔÓ²¼þÓÅ»¯µÄ¼ÓÃÜÇ®±ÒÍÚ¿ó·¨Ê½£¬Ö§³ÖÔ̺¬Monero¡¢RavencoinÔÚÄÚµÄ18ÖÖ¼ÓÃÜÇ®±Ò¡£
https://www.bleepingcomputer.com/news/security/new-koske-linux-malware-hides-in-cute-panda-images/
6. ¶íÂÞ˹ºÚ¿ÍÂñ·üÊýÖÜ£¬ÈëÇÖºÉÀ¼Ë¾·¨ÏµÍ³
7ÔÂ24ÈÕ£¬ºÉÀ¼Ë¾·¨ÏµÍ³½üÆÚÔâ·êÑϳÁÍøÂç¹¥»÷£¬¶íÂÞ˹²¼¾°ºÚ¿Í±»ÁÐΪÊ×ÒªÏÓÒɶÔÏ󡣺ÉÀ¼¹«¹²¼ì²ìÊð£¨OM£©ÏµÍ³ÔâÈëÇÖÊÂÎñ´æÔÚÇ¿ÁÒ¶íÂÞ˹¹ØÁª¼£Ï󣬹¥»÷ÕßÒÑÔÚ˾·¨²¿ÍøÂçÖÐÂñ·üÊýÖÜδ±»·¢ÏÖ¡£Õâ´ÎÊÂÎñÔٴζ³ö¹ú¶È¹Ø¼ü»ù´¡ÉèÊ©Ãæ¶ÔµÄϵͳÐÔ°²È«·çÏÕ¡£·çÏÕÔ¤¾¯Ê¼ÓÚ6ÔÂ17ÈÕ£¬¼ì²ìÊðÔ¶³Ì°ìƽÕý̨ʹÓõĵÚÈý·½Èí¼þCitrix NetScaler±»ÆØ´æÔÚÑϳÁ·ì϶¡£¸Ã·ì϶ÔÚͨÓ÷ì϶ÆÀ·Öϵͳ£¨CVSS£©ÖлñµÃ9.3·Ö¸ßΣÆÀ¼¶£¬Ö»¹Ü¼ì²ìÊðÐû³ÆÒѰ´³§É̽¨ÒéʵÏÖϵͳ¸üУ¬µ«ÓÐÖ¤¾ÝÅú×¢·ì϶ÔÚ½¨²¹Ç°Òѱ»ÀûÓá£Îª×è¶Ï¹¥»÷ÊæÕ¹£¬¼ì²ìÊð±»ÆÈ×Ô¶¯¶Â½ØÄÚ²¿ÍÆËã»ú»¥ÁªÍøÏνӣ¬µ«´Ëʱ¹¥»÷Õß¿ÉÄÜÒѽӴ¥Ô̺¬Ôڰ쾯·½µ÷²é°¸¾í¡¢Î´Éó½áÐÌʰ¸¼þ¾í×Ú¼°Ô±¹¤Ó×ÎÒÐÅÏ¢ÔÚÄڵĸ߶ÈÃô¸ÐÊý¾Ý£¬¾ßÌåй¶ÁìÓòÉдýÈ·ÈÏ¡£¼¼Êõ·ÖÎöÏÔʾ£¬¹¥»÷ÕßÀûÓõÚÈý·½Èí¼þ·ì϶³ÉÁ¢³õʼ½Ó¼ûͨ·ºó£¬Í¨¹ý³Ö¾ÃÂñ·üÖ´ÐÐÊý¾ÝÇÔÈ¡¡£ÕâÖÖ"µÍÂýÓ×"¹¥»÷ģʽÓë¶íÂÞ˹¹ú¶ÈÖ§³ÖºÚ¿Í¼¯ÌåµÄÕ½ÊõÌØµã¸ß¶ÈÎǺϣ¬ÆäÑ¡ÔñÔÚϵͳ½¨²¹Ç°Ö´Ðй¥»÷£¬Åú×¢¶ÔÖ¸±êÍøÂçÊØ»¤ÖÜÆÚµÄ¾«×¼°ÑÎÕ¡£
https://cybernews.com/security/russian-hack-dutch-justice-system-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ