ºÚ¿ÍÇÔÈ¡GlobalX Air±÷³ýº½°àÊý¾Ý
°ä²¼¹¦·ò 2025-05-071. ºÚ¿ÍÇÔÈ¡GlobalX Air±÷³ýº½°àÊý¾Ý
5ÔÂ6ÈÕ£¬¾Ý404 MediaÐÂÎÅ£¬ºÚ¿Í½«Ö¸±êËø¶¨ÔÚÌØÀÊÆÕµ±¾ÖÓÃÓÚ±÷³ý³ö¾³µÄÖØÒªº½¿Õ¹«Ë¾Ö®Ò»GlobalX Air£¬ÇÔÈ¡ÁËÆäËùÓк½°à£¨º¬±÷³ý³ö¾³º½°à£©µÄ·ÉÐмͼÓë³Ë¿ÍÃûµ¥¡£GlobalXÊÇÒ»¼Ò°ü»ú¹«Ë¾£¬ÔøÐÖú½«Êý°ÙÃûίÄÚÈðÀÈ˱÷³ýÖÁÈø¶ûÍß¶à¡£ºÚ¿Í×Ô¶¯ÁªÏµ404 Media¼°ÆäËû¼ÇÕߣ¬³ÆÕâЩÊý¾Ý¿ÉÌṩGlobalXº½°àÉϱ»±÷³ý³ö¾³ÈËÔ±µÄ¾ßÌåÐÅÏ¢£¬Ô̺¬¾ßÌåÈËÔ±¡¢¹¦·ò¼°Ö÷Õŵء£GlobalXÍøÕ¾³öÏÖÒ»ÌõÎÛËðÐÅÏ¢£¬ÌâÃûΪ¡°ÄäÃûÕß¡±£¬¸Ã×éÖ¯ÒÔʹÓøÇÒÁ¡¤¸£¿ËË¹Ãæ¾ßÎÅÃû£¬ÊÇһЩºÚ¿Í½øÐÐËùν¡°ºÚ¿ÍÐж¯Ö÷Ò塱µÄ±£»¤É¡¡£ÐÅÏ¢ÖÐÔð¹ÖÖ¸±êºöÊӺϷ¨ºÅÁ¾ö¶¨Ö´Ðз¨¹ÙµÄºÅÁî¡£ºÚ¿Í°µÊ¾£¬ÇÔÈ¡µÄÊý¾Ýº¸Çº½°à¼Í¼Óë³Ë¿ÍÃûµ¥£¬²¢Ïò404 Media·¢ËÍÁËÊý¾Ý¸±±¾¡£ÕâЩÊý¾Ý°´1ÔÂ19ÈÕÖÁ5ÔÂ1ÈÕÆÚ¼äÖðÈÕÈÕÆÚ·ÖÀà´æ·ÅÔÚÎļþ¼ÐÖС£ÎªÑéÖ¤Êý¾ÝµÄÕæÊµÐÔ£¬404 Media½«À´×Ô¹Ù·½¿¿µÃסÆðÔ´µÄICE±÷³ýº½°àÒÑÖªÐÅÏ¢£¬ÓëºÚ¿Í»ñÈ¡µÄº½°à³Ë¿ÍÃûµ¥¼°º½°àÏêÇé½øÐÐÁ˽»²æ²é¶Ô¡£Á˾ÖÏÔʾ£¬ºÚ¿Í»ñÈ¡µÄÊý¾ÝÖеÄÈ·Ô̺¬Óйغ½°àÐÅÏ¢£¬ÀýÈç»ù¶ûÂí¡¤°¢²¼À׸ꡤ¼ÓÎ÷Ñǵĺ½°àÐÅÏ¢¡£
https://www.404media.co/email/fe8ce8ec-6dad-464a-8022-84e93b909397/
2. PoC°ä²¼ºóÈýÐÇMagicINFO·ì϶ÔâÀûÓÃ
5ÔÂ6ÈÕ£¬×êÑÐÈËÔ±·¢ÏÖ£¬ÔÚ¸ÅÏëÑéÖ¤£¨PoC£©·ì϶´úÂ빫¿ª°ä²¼¼¸Ììºó£¬ÍþвÐÐΪÕß±ãÆðÍ·ÀûÓÃÈýÐÇMagicINFOÄÚÈÝÖÎÀíϵͳ£¨CMS£©ÖеĸßÑϳÁÐÔ·ì϶CVE-2024-7399£¨CVSSÆÀ·Ö8.8£©¡£¸Ã·ì϶´æÔÚÓÚÈýÐÇMagicINFO 9 Server 21.1050֮ǰ°æ±¾£¬ÊÇõè¾¼ûûÏ޶ȵ½ÊÜÏÞĿ¼µÄȱµã£¬¹¥»÷Õ߿ɽè´ËÒÔϵͳȨÏÞдÈëËÁÒâÎļþ¡£»ã±¨ÏÔʾ£¬½ØÖÁ2025Äê5Ô³õ£¬Òѹ۲쵽¸Ã·ì϶ÔÚÈýÐÇMagicINFO 9·þÎñÆ÷Öб»¿í·ºÀûÓᣴ˷ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÓû§Ð´ÈëËÁÒâÎļþ£¬ÈôÓÃÓÚ±àÐ´ÌØÔìµÄJavaServer Pages£¨JSP£©Îļþ£¬×îÖÕ¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£CVE-2024-7399ÐÔÖÊÊÇÈýÐÇMagicINFO 9 ServerÊäÈëÑéÖ¤µÄȱµã£¬ÄÜÈÃδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÉÏ´«JSPÎļþ²¢ÒÔϵͳ¼¶½Ó¼ûȨÏÞÖ´ÐдúÂë¡£ÈýÐÇÓÚ2024Äê8Ô³õ´ÎÅû¶¸Ã·ì϶£¬°ä²¼MagicINFO 9 Server°æ±¾21.1050½¨¸´´Ë·ì϶£¬Æäʱ²¢ÎÞÀûÓü£Ï󣬵«2025Äê4ÔÂ30ÈÕPoC°ä²¼¼¸Ììºó£¬ÍþвÐÐΪÕß¾ÍÆðÍ·ÀûÓ᣼øÓڸ÷ì϶ÀûÓÃÄѶȵÍÇÒPoCÒѹ«¿ª£¬×¨¼ÒÒÔΪ´ËÀ๥»÷¿ÉÄܳÖÐø¡£
https://securityaffairs.com/177529/hacking/samsung-magicinfo-vulnerability-exploited-after-poc-publication.html
3. Langflow·ì϶CVE-2025-3248±»»ý¼«ÀûÓÃ
5ÔÂ6ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½«LangflowÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-3248£©ÏóÕ÷Ϊ»ý¼«ÀûÓÃ״̬£¬¶½´Ù¸÷×éÖ¯¾¡¿ìÀûÓð²È«¸üлººÍ½â´ëÊ©¡£´Ë·ì϶ΪÑϳÁδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶£¬ÄÜÈû¥ÁªÍøÉϵĹ¥»÷ÕßÀûÓÃAPI¶Ëµã·ì϶ÆëÈ«½ÚÔìÒ×Êܹ¥»÷µÄLangflow·þÎñÆ÷¡£LangflowÊÇÒ»¿î¿ªÔ´¿ÉÊÓ»¯±à³Ì¹¤¾ß£¬ÔÚGitHubÉÏÕ¼Óнü6Íò¸östarºÍ6.3Íò¸öfork£¬ÔÚÈËΪÖÇÄÜ¿ª·¢¡¢×êÑкͲݴ´ÁìÓòÀûÓÃ¿í·º¡£Æä¹«¿ªµÄÓÃÓÚÑéÖ¤Óû§Ìá½»´úÂëµÄ¶Ëµã´æÔÚ°²È«È±µã£¬·ì϶°æ±¾ÖÐÎÞ·¨°²È«µØ¶ÔÊäÈë½øÐÐɳºÐ´¦Öûò¹ýÂË£¬¹¥»÷Õ߿ɽè´Ë·¢ËͶñÒâ´úÂë²¢ÔÚ·þÎñÆ÷ÉÏÖ±½ÓÖ´ÐС£¸Ã·ì϶ÒÑÔÚ2025Äê4ÔÂ1ÈÕ°ä²¼µÄ1.3.0°æ±¾Öн¨¸´£¬²¹¶¡½öΪÒ×Êܹ¥»÷µÄ¶ËµãÔö³¤ÁËÉí·ÝÑéÖ¤¡£×îа汾1.4.0ÒѰ䲼£¬Ô̺¬´óÁ¿½¨¸´£¬½¨ÒéÓû§Éý¼¶¡£Horizon3×êÑÐÈËÔ±°ä²¼Óйؼ¼Êõ²©¿Í²¢ÖҸ棬¸Ã·ì϶±»ÀûÓõĿÉÄÜÐԺܸߣ¬ÆäʱÒÑ·¢ÏÖÖÁÉÙ500¸ö¶³öÔÚ»¥ÁªÍøÉϵÄÊ·ý¡£¶ÔÓÚÎÞ·¨µ±¼´Éý¼¶µÄÓû§£¬½¨Òéͨ¹ý·À»ðǽ¡¢·´Ïò´úÀí»òVPNÏÞ¶ÈLangflowµÄÍøÂç½Ó¼û£¬ÇÒ²»½¨ÒéÖ±½Ó½«Æä¶³öÔÚ»¥ÁªÍøÉÏ¡£CISAÒªÇóÁª¹ú»ú¹¹ÔÚ2025Äê5ÔÂ26ÈÕǰ²ÉÈ¡Ðж¯£¬²»È»ÖÕ³¡Ê¹ÓøÃÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/critical-langflow-rce-flaw-exploited-to-hack-ai-app-servers/
4. GitHub¶ñÒâGoÄ£¿é°µ²ØLinux Wiper¶ñÒâÈí¼þ
5ÔÂ6ÈÕ£¬½üÆÚ£¬Õë¶ÔLinux·þÎñÆ÷µÄ¹©¸øÁ´¹¥»÷±»ÆØ¹â£¬¹¥»÷ÕßÔÚGitHubÉϰ䲼µÄGolangÄ£¿éÖаµ²ØÁË´ÅÅ̲Á³ý¶ñÒâÈí¼þ¡£¸Ã»î¶¯ÓÚÉϸöÔ±»·¢ÏÖ£¬ÒÀÀµÈý¸öÔ̺¬¡°¸ß¶È»ìºÏ´úÂ롱µÄ¶ñÒâGoÄ£¿éÀ´¼ìË÷²¢Ö´ÐÐÔ¶³ÌÓÐÐ§ÔØºÉ¡£Õâ´Î¹¥»÷ÏÔÈ»ÊÇרÃÅÕë¶Ô»ùÓÚLinuxµÄ·þÎñÆ÷ºÍ¿ª·¢»·¾³Éè¼ÆµÄ£¬Æä·ÛËéÐÔ¸ºÔØÎªÒ»¸öÃûΪdone.shµÄBash¾ç±¾£¬¸Ã¾ç±¾»áÔËÐÓ×°dd¡±ºÅÁî½øÐÐÎļþ²Á³ý»î¶¯¡£ÔÚÖ´ÐÐǰ£¬ÓÐÐ§ÔØºÉ»áÑéÖ¤ÆäÊÇ·ñÔÚLinux»·¾³ÖÐÔËÐС£¾Ý¹©¸øÁ´°²È«¹«Ë¾Socket·ÖÎö£¬¸ÃºÅÁî»áÓÃÁ㸲¸Çÿ¸öÊý¾Ý×Ö½Ú£¬µ¼Ö²»³ÉÄæ×ªµÄÊý¾ÝÃÔʧºÍϵͳ¹ÊÕÏ£¬Ö¸±êÊDZ£Áô¹Ø¼üϵͳÊý¾Ý¡¢Óû§Îļþ¡¢Êý¾Ý¿âºÍÅäÖõÄÖ÷´æ´¢¾í/dev/sda¡£×êÑÐÈËÔ±ÓÚ4Ô·ݷ¢ÏÖÁËÕâ´Î¹¥»÷£¬²¢ÔÚGitHubÉÏ·¢ÏÖÁËÈý¸öÏÖÒѱ»É¾³ýµÄ¶ñÒâGoÄ£¿é¡£ÕâЩģ¿é¾ù°ü·Ñ½âÏý´úÂ룬½âÂëºó»áʹÓá°wget¡±ÏÂÔØ²¢µ±¼´Ö´ÐжñÒâÊý¾Ý²Á³ý¾ç±¾£¬ÏÕЩûÓиøÊܺ¦ÕßÁôÏÂÏìÓ¦»ò¸´ÔµÄ¹¦·ò¡£¶ñÒâGoÄ£¿éËÆºõ¼ÙÒâÁ˺Ϸ¨ÏîÄ¿£¬ÈçÓÃÓÚÐÂÎÅÊý¾Ýת»»µÄPrototransform¡¢Ä£Ð͸ߵÍÎĺÍ̸µÄGoʵÏÖgo-mcpÒÔ¼°ÎªTCPºÍHTTP·þÎñÆ÷Ìṩ¼ÓÃܵÄTLS´úÀí¹¤¾ßtlsproxy¡£Socket×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬¼´±ã½ö×îÓ×ˮƽµØÂ¶³öÓÚÕâЩ·ÛËéÐÔÄ£¿é£¬Ò²¿ÉÄܵ¼ÖÂÊý¾ÝÆëÈ«ÃÔʧµÈÑϳÁºó¹û¡£
https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/
5. ¼ÙðSSAÓʼþ·Ö·¢ScreenConnect RATÈëÇÖÓû§É豸
5ÔÂ6ÈÕ£¬ÍøÂ簲ȫר¼Ò·¢ÏÖ£¬·¸×ï·Ö×ÓÀûÓÃÃÀ¹úÉç»á±£ÏÕ¾Ö£¨SSA£©ÃûÒ壬ÓÕÆÓû§×°ÖÃÃûΪScreenConnectµÄΣÏÕÔ¶³Ì½Ó¼ûľÂí£¨RAT£©¡£Ò»µ©×°Ö㬹¥»÷Õß±ã¿ÉÔ¶³Ì½ÚÔìµçÄÔ£¬ÇÔÈ¡Ó×ÎÒÐÅÏ¢²¢×°Öøü¶àÓк¦Èí¼þ¡£Malwarebytes×êÑÐÈËÔ±Ê×ÏȰÑÎȵ½ÕâЩÐéαÓʼþ£¬ËüÃÇÒÔ¡°Éç±£ÉêÃ÷ÏÖÒÑ¿ÉÓá±ÎªÓÉ£¬¶½´ÙÓû§ÏÂÔØ¸½¼þ»òµã»÷Á´½Ó²é¿´¡£ÕâЩÓʼþÉè¼ÆÕæÇУ¬ÄÑÒÔ·Ö±æÕæÎ±£¬ÓʼþÖеÄÁ´½Ó»ò¸½¼þ»áÊèµ¼Óû§ÏÂÔØÓÃÓÚ×°ÖÃScreenConnect¿Í»§¶ËµÄÎļþ£¬ÎļþÓÐʱ»á±»¸³ÓèÎóµ¼ÐÔÃû³Æ£¬Èç¡°ReceiptApirl2025Pdfc.exe¡±µÈ¡£ScreenConnect±¾ÊÇÆóÒµITÖ§³Ö¹¤¾ß£¬µ«ÂäÈë·¸×ï·Ö×ÓÊÖÖÐÔò±äµÃΣÏÕ£¬ËûÃÇ¿Éͨ¹ýÆä½ÚÔìÍÆËã»ú£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬Ä»ºóºÚÊÖMolatori¼¯ÍÅÖØÒªÖ÷ÕÅÊǽøÐнðÈÚÚ¿Æ¡£Cofense°²È«×¨¼ÒÒ²»ã±¨ÁËÀàËÆ¼ÙÒâSSAµÄÍøÂç´¹µö»î¶¯£¬ÕâЩÓʼþͨ³£Ðû³ÆÌṩ¸£ÀûÉêÃ÷£¬Ê¹Óò»Æ¥ÅäÁ´½Ó»ò°µ²Ø¶ñÒâÁ´½Ó¡£CofenseÖ¸³ö£¬ÕâЩÐéαÓʼþÖ¼ÔÚ×°ÖÃConnectWise RAT£¬¼´ºÏ·¨Èí¼þConnectWise Control£¨ÔScreenConnect£©µÄÊÜϰȾ°æ±¾¡£
https://hackread.com/fake-ssa-emails-trick-users-installing-screenconnect-rat/
6. µÂ¿ËÈøË¹ÖÝÑ§ÇøÏò³¬47,000ÃûÈËÔ±´«µÝÊý¾Ýй¶ÊÂÎñ
5ÔÂ7ÈÕ£¬µÂ¿ËÈøË¹Öݰ¢¶ûÎĶÀÁ¢Ñ§Çø£¨AISD£©²úÉúһ·ÑϳÁÊý¾Ýй¶ÊÂÎñ£¬ÒÔÖÁ47606È˵ÄÃô¸ÐÓ×ÎÒÐÅÏ¢±»ÇÔ¡£¸ÃÑ§ÇøÈ·ÈÏ·ì϶³Ê´Ë¿Ì2024Äê6Ô£¬²¢ÓÚ±¾ÖÜÄ©Æðͷ֪ͨÊÜÓ°ÏìÈËÔ±¡£Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢Öݵ±¾ÖÇ©·¢Ö¤¼þ¡¢ÐÅÓþ¿¨/½è¼Ç¿¨ÐÅÏ¢¡¢½ðÈÚÕË»§ºÅÂë¡¢Ò½ÁÆÊý¾Ý¼°½¡È«±£ÏÕÐÅÏ¢µÈ¡£µÂ¿ËÈøË¹ÖÝ×ܼì²ì³¤°ì¹«ÊÒÓÚ2025Äê5ÔÂ2ÈÕ´«µÝÁËÕâÒ»ÊÂÎñ¡£ÀÕË÷Èí¼þÍÅ»ïFogÔÚ2024Äê7ÔÂÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬³Æ´ÓAISDÇÔÈ¡ÁË60GBÊý¾Ý£¬²¢½«Ñ§ÇøÃû³Æ°ä²¼ÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏ£¬ÒÔ´ËÏòÊܺ¦ÕßʩѹË÷ÒªÊê½ð¡£Fog×Ô2024Äê7ÔÂÆðÍ·°ä²¼¹¥»÷»î¶¯£¬AISDÊÇÆäÊ×ÅúÊܺ¦ÕßÖ®Ò»¡£¶ûºó£¬¸ÃÍÅ»ïÐû³ÆÖ´ÐÐÁË20ÆðÒÑÈ·ÈϵÄÀÕË÷Èí¼þ¹¥»÷£¨ÆäÖÐ12ÆðÕë¶Ô½ÌÓý»ú¹¹£©¼°157ÆðδȷÈÏÊÂÎñ£¬Æä»î¶¯¼£ÏóÓÚ2025Äê4ÔÂÖÕ³¡¡£¸ÃÍÅ»ïÒÔ¼ÓÃÜÎļþºÍÇÔÈ¡Êý¾ÝΪ¼¿Á©£¬³£¶Ô×¼¿ª·¢»·¾³£¬¹¥»÷ÁìÓò²»¾ÖÏÞÓÚѧÌá£
https://www.infosecurity-magazine.com/news/texas-school-47000-people-data/


¾©¹«Íø°²±¸11010802024551ºÅ