XZ-UtilsºóÃųÖÐøÍþвDocker Hub£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼

°ä²¼¹¦·ò 2025-08-14

1. XZ-UtilsºóÃųÖÐøÍþвDocker Hub£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼


8ÔÂ12ÈÕ£¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚ³ÖÐø·¢½Í£¬Binarly×êÑÐÍŶӷ¢ÏÖDocker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ´æÔÚ35¸öÊÜϰȾµÄLinux¾µÏñ£¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ý´«µÝÐÔϰȾÍþвÓû§¼°×éÖ¯Êý¾Ý°²È«¡£¡£¸ÃºóÃÅÓɳ־ÃÏîÄ¿¹±Ï×Õß"Jia Tan"°ÂÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖУ¬Í¨¹ýglibcµÄIFUNC»úÖÆ½Ù³ÖOpenSSHµÄRSA_public_decryptº¯Êý£¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootºÅÁî¡£¡£Ö»¹Ü·ì϶·¢ÏÖ½ÏÔçÇÒ¹Ù·½ÒѰ䲼5.6.2¼°ÒÔÉÏÐÞ¸´°æ±¾£¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢¡¢FedoraµÈÖ÷Á÷Linux¿¯Ðаæ£¬³ÉΪȥÄê×îÑÏÖØµÄÈí¼þ¹©¸øÁ´°²È«ÊÂÎñÖ®Ò»¡£¡£Docker Hub×÷ΪȫÇò¿ª·¢Õß¿í·ºÊ¹ÓõÄÈÝÆ÷¾µÏñƽ̨£¬ÆäÎÊÌâ¾µÏñµÄ³ÖÐø´æÔÚÒý·¢ÓÇÓô¡£¡£BinarlyɨÃè·¢ÏÖ£¬²¿ÃÅÊÜϰȾ¾µÏñÈÔ¹«¿ª°ä²¼£¬ÇÒ´æÔÚ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ"£¬Ðγɴ«µÝÐÔ·çÏÕ¡£¡£ºÜ¶àCI/CD¹ÜµÀ¼°³ö²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã£¬Èôδʵʱ¸üУ¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼Ì³Ð¶ñÒâ´úÂë¡£¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈÊØ»¤Õß´«µÝÇé¿ö£¬µ«DebianÑ¡Ôñ±£ÁôÕâЩºóÞµÏñ£¬ÀíÓÉÊÇ"ÀûÓÃǰÌá¿Ì±¡"ÇÒÐèά³Ö´æµµÂ½ÐøÐÔ£¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£¡£


https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/


2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷


8ÔÂ12ÈÕ£¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀí·þÎñ¾ÞÍ·Pacific HealthWorks£¨PHW£©½üÈÕÔâ·êEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬µ¼ÖÂÆä·þÎñµÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆ·þÎñ»ú¹¹£¨MSO£©£¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢¡¢Ò½Éú¼¯Ìå¼°ÕïËùÌṩ¼±Õï¡¢¡¢ÖØÖ¢¼à»¤¡¢¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö£¬Äê·þÎñ»¼Õß³¬140ÍòÈ˴Ρ£¡£Õâ´ÎÊÂÎñÖУ¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢¡¢Éç»á°²È«ºÅÂë¡¢¡¢Ò½ÁƼͼ¡¢¡¢±£ÏÕÐÅÏ¢µÈСÎÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶£¬²¿ÃÅÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹«¿ª¡£¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÒõÓôÊܺ¦Õß"ÍøÕ¾°ä²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉêÃ÷£¬ÍþвÈôδÔÚÖ¸°´¹¦·òÄÚÁªÏµ½»É棬½«°ä²¼Ô̺¬Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£¡£CybernewsºË²é·¢ÏÖ£¬Ð¹Â¶Îļþº­¸ÇEmergent Medical Associates¡¢¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹£¬Éæ¼°Õï¶Ï´úÂë¡¢¡¢±£ÏÕË÷ÅâµÈÖ÷ÌâÒ½ÁÆÊý¾Ý¡£¡£


https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/


3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷£¬·þÎñÖжÏÒý·ÛË¿·¢¼±


8ÔÂ12ÈÕ£¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯ÀûÓÃÖжÏÊýСʱ£¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂ簲ȫΣ»£»£»ú¡£¡£Õâ´ÎÊÂÎñʼÓÚ±¾µØ¹¦·òÁ賿4µã30·Ö£¬Óû§ÎÞ·¨Ô¤Ô¼Ñݳª»áÃÅÆ±¡¢¡¢½Ó¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£¡£Yes24ѸËÙ½«ÏµÍ³ÀëÏßÒÔ¶ôÖÆ¹¥»÷£¬²¢ÒÀ¸½±¸·ÝÊý¾ÝÔÚ7СʱÄÚ¸´Ô­ÔËÓª£¬µ«Î´Ð¹Â©¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇ󡣡£Öж϶Ժ«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ï죬ԭ¶¨ÓÚµ±Íí8µãÆðÍ·µÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ££¬·þÎñ¸´Ô­ºó¸Õ¸ÕÖØÆô¡£¡£Õâ´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ô²»¼°Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌ죬ӰÏìÆÓ±¦½£¡£¡£¡¢¡¢ENHYPENµÈÑÝÔ±ÑݳöƱÎñ£¬²¢Â¶³öÆä²»×ãÒìµØ±¸·ÝϵͳµÄ°²È«¶Ì°å¡£¡£Ö»¹Ü¸Ã¹«Ë¾¹ýºó³Ðŵ"³¹²é°²Õû¸öϵ"¡¢¡¢ÀñƸÍⲿÍŶӲ¢Éý¼¶ÏµÍ³£¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ£¬Ôð¹ÖÆäÕû¸Ä´ëÊ©²»µ½Î»ÇÒÐÅϢͨÃ÷¶È²»¼°¡£¡£


https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected


4. FortinetÖÒ¸æFortiSIEMÔ¤ÊÚȨRCE·ì϶¿ÉÄܱ»ÀûÓÃ


8ÔÂ13ÈÕ£¬ÍøÂ簲ȫ³§ÉÌFortinet½üÈÕ°ä²¼´¹Î£°²È«²¼¸æ£¬Åû¶ÆäÖ÷ÌⰲȫÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM´æÔÚÒ»¸öÑÏÖØµÈ¼¶£¨CVSS 9.8£©µÄÔ¶³ÌºÅÁî×¢Èë·ì϶£¨CVE-2025-25256£©¡£¡£¸Ã·ì϶ӰÏì°æ¼¼ÇÉÓò¿í·º£¬º­¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§£¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹¼¼ÊõÖ§³Ö£¬½¨ÒéÓû§Á¢¼´Éý¼¶ÖÁ7.3.2¡¢¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£¡£·ì϶³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ½øÐгä·Ö¹ýÂË£¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý»ú¹Ø¶ñÒâCLIÒªÇó£¬ÔÚÖ¸±êϵͳִÐÐËÁÒâºÅÁî¡£¡£FortinetÈ·Èϸ÷ì϶´æÔڿɹ«¿ª»ñÈ¡µÄÀûÓôúÂ룬ÇÒ¹¥»÷ÐÐΪ²»»á²úÉú¹ÖÒìIOCÌØµã£¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕÀûÓ㬵«GreyNoiseÍþвµý±¨¹«Ë¾Ö¸³ö£¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö£¬´ËÀàÒì³£Á÷Á¿µßô¤ÍùÍùԤʾзì϶Åû¶£¬Á½Õß¿ÉÄÜ´æÔÚ¹ØÁªÐÔ¡£¡£Õâ´Î·ì϶¶³öºó£¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖµ××ÓÐÔÐÞ¸´£¬Í¬Ê±Ìṩһʱ»º½â¹æ»®¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/


5. ±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾


8ÔÂ13ÈÕ£¬±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤°ì¹«ÊÒ½üÈÕÔâ·êÑÏÖØÍøÂç¹¥»÷£¬µ¼ÖÂÆäÖ÷ÌâÐÅÏ¢ÏµÍ³È«ÃæÌ±»¾£¬Ô̺¬¹Ù·½ÍøÕ¾¡¢¡¢µç×ÓÓʼþÕË»§¼°¹Ì¶¨µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ£¬Õâ´ÎÊÂÎñÒÑ´¥·¢¿ç²¿ÃźÏ×÷ÏìÓ¦£¬¼¼ÊõÈËÔ±ÔÚ·¨ÂÉ»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦¸´Ô­·þÎñ²¢µ÷²é¹¥»÷Ô´Í·¡£¡£Ö»¹Üµ±Ç°¹¥»÷ý½éÉÐδÃ÷È·£¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹«¿ªÈÏÁìÔðÈΣ¬µ«ÊÂÎñµÄ¿í·ºÓ°Ï켰ϵͳ̱»¾ÌصãÓëµäÐÍÀÕË÷¹¥»÷¸ß¶ÈÎǺÏ£¬Òý·¢¶ÔDZÔÚ¹©¸øÁ´·çÏÕµÄÓÇÓô¡£¡£ÍøÂ簲ȫר¼Ò¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢ÏÖΪÊÂÎñµ÷²éÌṩÁ˹ؼüÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«¼ÒµÄCitrix NetScalerÉ豸ÒòδÐÞ²¹CVE-2025-5777·ì϶¶ø³Ö¾Ã¶³öÓÚ¹¥»÷·çÏÕÖС£¡£ShodanɨÃèÊý¾ÝÏÔʾ£¬Á½Ì¨ÓйØÉ豸±ðÀëÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏߣ¬¹¦·òÏßÓë¹¥»÷²úÉú¸ß¶ÈÖØºÏ¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸Ã·ì϶Òѱ»ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼¡±£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚʵÏÖÐÞ²¹¡£¡£½ØÖÁ±¨µÀ°ä²¼£¬±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤ÍøÕ¾ÈÔδ¸´Ô­£¬ÏµÍ³ÐÞ¸´¹¤×÷ÈÔÔÚ½øÐÐÖС£¡£


https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/


6. AIÉî¶ÈαÔì¼¼Êõ´ßÉú¿ç¹úͶ×ÊȦÌ×£¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ


8ÔÂ13ÈÕ£¬ÍøÂ簲ȫ»ú¹¹Group-IB½üÈÕÅû¶£¬Ú¿Æ­·Ö×ÓÕýÀûÓÃÌìÉúʽAI¼¼Êõ¹¹½¨¸ß¶ÈÕæÇеÄÚ²Æ­ÍøÂ磬ͨ¹ýÉî¶ÈαÔìÊÓÆµ¡¢¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¸æ°×Ͷ·Å£¬ÓÕÆ­È«Çò¶à¹úͶ×ÊÕ߲μÓÐéαÂòÂôƽ̨¡£¡£×êÑÐÏÔʾ£¬´ËÀàȦÌ×ÒÑÐγɹæÄ£»£»£»¯²úÒµÁ´£¬Æä¼¼Êõ¸´ÔÓ¶ÈÓëÉúÀí²Ù¿Ø¼¿Á©¾ù´ïи߶È¡£¡£Ö÷ÌâڲƭÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£¡£Ú¿Æ­Õ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«¼ÒÈËÎïµÄÓ°ÏñÓëÉùÒô£¬ÖÆ×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Î£¬½áºÏ´Û¸ÄµÄÂòÂôÊý¾Ýͼ±íÓëÐéαר¼Ò±³Ê飬ӪÔì³ö"¶À¼ÒͶ×Ê»úÓö"µÄ½ôÆÈ¸Ð¡£¡£Êܺ¦Õß±»Êèµ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾£¬ÕâÐ©ÍøÕ¾Í¨¹ý±¾µØ»¯ÄÚÈÝÊÊÅäÓû§µØµã¹ú¶È˵»°£¬²¢Ç¶ÈëÉ罻ýÌåÕ˺Å¡¢¡¢²©¿ÍÎÄÕ¼°YouTubeƵµÀ½øÐжàÇþµÀÍÆ¹ã£¬ÐγÉÐéαÐÅÏ¢Éú̬¡£¡£×¢²á½×¶Î£¬Æ½Ì¨ÒÔ"С¶î±£ÕϽð"£¨100-250ÃÀÔª£©½µµÍÓû§¾¯ÌèÐÔ£¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢¡¢×¡Ö·Ö¤Ã÷ÉõÖÁÐÅÓþ¿¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£¡£ÖµµÃ¾¯ÌèµÄÊÇ£¬´ËÀàÍøÕ¾Í¨¹ýIPµØÖ·Óë˵»°¼ì²âʵÏÖ¾«×¼ÆÁ±Î£¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨½Ó¼û£¬¶øÓ¡¶È¡¢¡¢Ó¢¹ú¡¢¡¢µÂ¹ú¡¢¡¢ÈÕ±¾µÈ13¸ö¹ú¶È³ÉÎªÖØÒªÖ¸±ê¡£¡£


https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/