ÊýÊ®¿î¼ÙÇ®°ü²å¼þÓ¿ÈëFirefoxÉ̵꣬µÁÈ¡¼ÓÃÜÇ®±Ò
°ä²¼¹¦·ò 2025-07-041. ÊýÊ®¿î¼ÙÇ®°ü²å¼þÓ¿ÈëFirefoxÉ̵꣬µÁÈ¡¼ÓÃÜÇ®±Ò
7ÔÂ2ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Koi Security×îÐÂÅû¶£¬Firefox¹Ù·½¸½¼Ó×é¼þÉ̵êÕýÔâ·ê´ó¹æÄ£¶ñÒâÀ©´ó·¨Ê½¹¥»÷£¬³¬¹ý40¿î¼Ù×°³ÉÖ÷Á÷¼ÓÃÜÇ®±ÒÇ®°üµÄ²å¼þ³ÖÐøÇÔÈ¡Óû§Ãô¸ÐÊý¾Ý¡£ÕâЩ·ÂðÀûÓø²¸ÇCoinbase¡¢MetaMask¡¢Trust WalletµÈ°Ë´ó³ÛÃûÆ·ÅÆ£¬Í¨¹ýÖ²Èë¶ñÒâ´úÂëʵʱ²¶»ñÇ®°üƾ֤¼°Öú¼Ç´Ê£¬¹¥»÷Õß½è´Ë¿ÉÆëÈ«½ÚÔìÊܺ¦ÕßÊý×Ö×ʲú¡£×êÑнÒʾ£¬¸ÃºÚ¿Í×é֯ѡȡ˫³ÁºýŪսÊõ£ºÒ»·½Ã棬ֱ½Ó¿Ë¡¿ªÔ´Ç®°ü´úÂë²¢×¢Èë¶ñÒâÂß¼£¬Í¨¹ý"ÊäÈë/µã»÷"ÊÂÎñ¼àÌýÆ÷ɸѡ³¤¶È³¬¹ý30×Ö·ûµÄÃÜÔ¿ÐÅÏ¢£»ÁíÒ»·½Ã棬αÔìÊý°ÙÌõÐéαÎåÐÇºÃÆÀ»ìºÏÊÓÌý£¬ÉõÖÁ»ìÈë´óÁ¿Ò»ÐDzîÆÀÔì×÷"¿ÉÐŶÈ"¡£¼¼Êõ·ÖÎöÏÔʾ£¬¶ñÒâ´úÂëͨ¹ý°µ²ØÃýÎó¶Ô»°¿òʵÏÖÆëÈ«¾²Ä¬ÔËÐУ¬Êܺ¦Õß×ʲú±»µÁºóÍùÍùÎóÒÔΪÕý³£ÂòÂô£¬µ¼ÖÂËðʧÄÑÒÔ×·Òä¡£Koi Security×·×Ù·¢ÏÖ£¬¸Ã¹¥»÷Ðж¯ÖÁÉÙ³ÖÐøÖÁ4Ô£¬Ã¿ÖܾùÓÐÐÂÐͶñÒâ²å¼þÉÏÏß¡£×îа¸ÀýÏÔʾ£¬ÉÏÖÜÈÔÓзÂðǮ°üͨ¹ýMozillaÉóºËÁ÷³Ì¡£Ö»¹ÜMozillaÐû³ÆÒѲ¿Êð×Ô¶¯»¯·çÏÕÆÀ¹Àϵͳ£¬µ«½ØÖÁ±¨Â·°ä²¼£¬ÎÞÊýÉæÊ²å¼þÈÔ¿ÉÕý³£ÏÂÔØ¡£
https://www.bleepingcomputer.com/news/security/dozens-of-fake-wallet-add-ons-flood-firefox-store-to-drain-crypto/
2. ˼¿ÆÖҸ湥»÷Õß¿ÉÆ¾¾²Ì¬ÃÜÂëÔ¶³ÌÊÕÊÜIPµç»°ÏµÍ³
7ÔÂ2ÈÕ£¬ÍøÂ簲ȫÁìÓòÔÙÏ쾯±¨£¬Ë¼¿ÆÏµÍ³¹«Ë¾°ä·¢ÔÚÆäÖ÷ÌâͨѶ²úÆ·Öд¹Î£ÒƳýÒ»¸ö¸ßΣºóÃÅÕË»§¡£¸Ã·ì϶£¨CVE-2025-20309£©Ó°ÏìCisco Unified Communications Manager£¨ÔCallManager£©¼°SME Engineering Special°æ±¾15.0.1.13010-1ÖÁ15.0.1.13017-1£¬ÔÊÐí¹¥»÷Õßͨ¹ýÎÞ·¨Åú¸ÄµÄ¾²Ì¬rootƾ֤Զ³Ì»ñÈ¡É豸×î¸ßȨÏÞ¡£×÷ΪȫÇòÆóÒµIPµç»°ÏµÍ³µÄÖÐÊàÆ½Ì¨£¬Unified CMÖÎÀí×ÅÊý°ÙÍǫ̀É豸µÄºô½Ð·ÓÉ¡¢ÅäÖÃÕ½Êõ¼°ÓïÒô·þÎñ¡£Õâ´ÎÅû¶µÄ·ì϶ԴÓÚ¿ª·¢²âÊÔ½×¶ÎÒÅÁôµÄÓ²±àÂëÕË»§£¬¸ÃÕË»§Î´ÔÚ³ö²ú°æ±¾ÖнûÓã¬ÇÒĬÈÏÍ´´¦Ö±½Ó¶³öÓÚ¹«Íø¡£Ë¼¿Æ°²È«²¼¸æÖ¤Êµ£¬¹¥»÷ÕßÎÞÐèÈκÎÉí·ÝÑéÖ¤¼´¿Éͨ¹ý¸ÃºóÃÅÒÔrootȨÏÞÖ´ÐÐËÁÒâºÅÁÆëÈ«½ÚÔìÊÜÓ°ÏìÉ豸¡£Ö»¹ÜÉÐδ·¢ÏÖÒ°±í¹¥»÷Ñù±¾£¬µ«ÈÕÖ¾·ÖÎöÏÔʾ£¬/var/log/active/syslog/secureõè¾¶ÒѼͼÓйØÈëÇÖºÛ¼££¬ÖÎÀíÔ±¿Éͨ¹ýfile get activelog syslog/secureºÅÁî¼ì²âÒì³£µÇ¼¡£ÓëÒÔÍù·ì϶·ÖÆç£¬Õâ´ÎÊÂÎñÎÞһʱ»º½â´ëÊ©£¬Ë¼¿Æ½öÌṩÁ½ÖÖ½¨¸´õè¾¶£ºÉý¼¶ÖÁ2025Äê7Ô°䲼µÄ15SU3°æ±¾£¬»ò´¹Î£×°ÖÃCSCwp27755²¹¶¡¡£¸Ã·ì϶±»ÆÀ¶¨Îª×î¸ßÑϳÁµÈ¼¶£¨CVSS 10.0£©£¬¹¥»÷Õ߿ɽè´ËºáÏòÉøÈëÄÚÍø£¬ÇÔȡͨ»°¼Í¼¡¢´Û¸ÄÓïÒôÓʼþ£¬ÉõÖÁ½«ÆóÒµµç»°ÏµÍ³×ª»¯Îª½©Ê¬ÍøÂç½Úµã¡£
https://www.bleepingcomputer.com/news/security/cisco-removes-unified-cm-callManager-backdoor-root-account/
3. Forminator²å¼þ¸ßΣ·ì϶Íþв60ÍòWordPressÍøÕ¾
7ÔÂ2ÈÕ£¬È«Çò³¬60ÍòWordPressÍøÕ¾ÕýÃæ¶ÔÑϸñ°²È«Íþв£¬ÆäʹÓõÄForminator±íµ¥²å¼þ±»ÆØ´æÔÚ¸ßΣËÁÒâÎļþɾ³ý·ì϶£¨CVE-2025-6463£¬CVSS 8.8£©¡£¸Ã·ì϶ÔÊÐí¹¥»÷ÕßÎÞÐèÈÏÖ¤¼´¿Éɾ³ý·þÎñÆ÷¹Ø¼üÎļþ£¬Ô̺¬Ö÷ÌâÅäÖÃÎļþwp-config.php£¬×îÖÕµ¼ÖÂÍøÕ¾Æëȫʧ¿Ø¡£°²È«ÍŶÓÇ¿ÁÒ½¨Òéµ±¼´Éý¼¶ÖÁ1.44.3°æ±¾ÒÔ½¨¸´´Ë·çÏÕ¡£·ì϶Ö÷ÌâÔ´ÓÚ²å¼þµÄentry_delete_upload_files()º¯Êý´æÔÚõè¾¶Ñé֤ȱµã¡£µ±ÖÎÀíÔ±ËãÕʶñÒâ±íµ¥Ìύʱ£¬¹¥»÷Õ߿ɻú¹ØÔ̺¬õè¾¶±éÀú×Ö·û´®£¨Èç../../../wp-config.php£©µÄ±íµ¥×ֶΣ¬´¥·¢·þÎñÆ÷ɾ³ýËÁÒâÎļþ¡£Ò»µ©wp-config.php±»É¾£¬WordPress½«×Ô¶¯³ÁÖÃΪװÖÃģʽ£¬¹¥»÷Õß½è´Ë¿É´Û¸ÄÊý¾Ý¿âƾ֤²¢Ö²ÈëºóÃÅ£¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐС£¼¼Êõ·ÖÎöÏÔʾ£¬¸Ã·ì϶ÀûÓÃǰÌἫΪ¿íËÉ£º½öÐèÖ¸±êÍøÕ¾ÆôÓÃForminator²å¼þÇÒ´æÔڿɱ»É¾³ýµÄ±íµ¥¼Í¼¡£¹¥»÷Õ߼ȿÉÊÖ¶¯Ìá·´Ä¿Òâ±íµ¥£¬Òà¿ÉÀûÓÃ×Ô¶¯»¯¹¤¾ßÅúÁ¿É¨Ãè´àÈõÕ¾µã¡£
https://cybersecuritynews.com/forminator-wordpress-plugin-vulnerability/
4. ¸¥¼ªÄáÑǸñÂåË¹ÌØÏØÔâÀÕË÷Èí¼þ¹¥»÷£¬µ±¾Ö¹ÍÔ±Êý¾Ýй¶
7ÔÂ4ÈÕ£¬½ñÄê4Ô£¬ÃÀ¹ú¸¥¼ªÄáÑÇÖݸñÂåË¹ÌØÏØ²úÉúһ·Õë¶Ô´¦Ëùµ±¾ÖµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ£¬µ¼ÖÂ3527ÃûÏÖÈμ°Ç°Èε±¾Ö¹ÍÔ±µÄÃô¸ÐÐÅÏ¢±»µÁ£¬Òý·¢Éç»á¶ÔÍøÂ簲ȫÍþвµÄ¿í·º¹Ø×¢¡£Õâ´ÎÊÂÎñÖУ¬ºÚ¿Í³É¹¦ÈëÇÖ¸ÃÏØÐÅϢϵͳ£¬ÇÔÈ¡ÁËÔ̺¬Éç»á°²È«ºÅÂë¡¢¼ÝÕÕÐÅÏ¢¡¢ÒøÐÐÕË»§ÏêÇé¡¢½¡È«±£ÏÕºÅÂë¼°Ò½ÁƼͼµÈ¸ß¶ÈÃô¸ÐÊý¾Ý£¬¶ÔÓ×ÎÒÒþÖԺͲƸ»°²È«×é³ÉÑϳÁÍþв¡£¸ñÂåË¹ÌØÏØÎ»ÓÚ¸¥¼ªÄáÑÇÖݶ«²¿£¬¾àÊ׸®ÀïÊ¿ÂúÔ¼Ò»Ó×ʱ³µ³Ì£¬È˶¡Ô¼4Íò¡£ÊÂÎñ²úÉúºó£¬¸ÃÏØÐÐÕþÖ÷×ù¿¨ÂÞ¶û¡¤Ë¹µÙ¶ûÓÚ±¾ÖÜÕýʽÏòÊÜÓ°Ïì¹ÍÔ±·¢³ö֪ͨ£¬È·ÈÏÊý¾Ýй¶ÊÂʵ£¬²¢°µÊ¾ÒÑÀñÆ¸ÍøÂ簲ȫר¼ÒÐÖúϵͳ¸´Ô£¬Í¬Ê±ÏòÁª¹úµ÷²é¾Ö£¨FBI£©ÍøÂç·¸×ﲿÃż°¸¥¼ªÄáÑÇÖݾ¯Ô±¾ÖÍøÂçÈÚºÏÖÐÐı¨°¸¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Ö»¹Ü¸ÃÏØÔøÓÚ4ÔÂ22ÈÕÖÁ23ÈÕÆÚ¼ä°ä²¼ÍøÂçÖжÏÖҸ棬µ«¶ûºóδ³ÖÐø¸üÐÂÊÂÎñ½øÕ¹£¬½öÇ¿µ÷¡°ÔÚ³ÖÐø¼à¿ØÓ°Ï족¡£µ÷²éÏÔʾ£¬Õâ´Î¹¥»÷ÓëÃûΪBlackSuitµÄÀÕË÷Èí¼þÍÅ»ïÓйء£¸Ã×éÖ¯ÓÚ5ÔÂ15ÈÕÔÚ°µÍø°ä²¼Ìû×Ó£¬Ðû³Æ¶Ô¸ñÂåË¹ÌØÏØÊÂÎñÕÆ¹Ü£¬²¢Ö¸¿ØÏØ·½»Ø¾ø¾ÍÊê½ð·¢Õ¹½»Éæ¡£
https://therecord.media/virginia-county-says-ransomware-attack-exposed-ssns
5. °ÍÎ÷CIEE Oneƽ̨Êý¾Ýй¶ÊÂÎñ£ºÃô¸ÐÐÅÏ¢ÔâÇÔ²¢ÔÚ°µÍøÏúÊÛ
7ÔÂ3ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾ResecurityÅû¶°ÍÎ÷ÖØÒªÊµÏ°ÓëѧͽÏîÄ¿·þÎñƽ̨CIEE One²úÉú³Á´óÊý¾Ýй¶ÊÂÎñ£¬µ¼Ö´óÁ¿Ãô¸ÐÓ×ÎÒÐÅÏ¢£¨PII£©¼°Îļþ±»ÇÔ²¢ÔÚ°µÍøÏúÊÛ¡£Õâ´ÎÊÂÎñÖУ¬ÍþвÐÐΪÕßͨ¹ý¶³öµÄ¹È¸èÔÆ´æ´¢Í°ÈëÇÖϵͳ£¬µÁÈ¡ÁËÔ̺¬Éí·Ý¼Í¼¡¢ÁªÏµ·½Ê½¡¢Ò½Áƻ㱨¼°ÎĵµÉ¨Ãè¼þµÈ¸ß¼ÛÖµÊý¾Ý£¬ËæºóÓɵØÏÂÊý¾Ý¾¼ÍÉÌ"888"ÔÚ°µÍøÆ½Ì¨½øÐÐÂòÂô¡£CIEE OneÓɰÍÎ÷CIEEÉÌѧԺÕûºÏÖÐÐÄÔËÓª£¬ÎªÔ̺¬BradescoÒøÐÓ×¢Caixa¾¼ÃÒøÐÓ×¢ClaroµçÐŵÈÔÚÄڵĶ¥¼¶½ðÈÚ»ú¹¹¼°ÄÜÔ´¡¢¿Æ¼¼ÁìÓòÆóÒµÌṩÕÐÆ¸·þÎñ£¬ÏνÓÊýÍòÃûרҵÈËÊ¿Óë°ÍÎ÷±¾ÍÁ¼°¿ç¹ú¹«Ë¾¡£ÓÉÓÚÆäÆ½Ì¨»ã¾ÛÁËÓÃÓÚ²¼¾°µ÷²éºÍÕÐÆ¸Á÷³ÌµÄº£Á¿Ãô¸ÐÊý¾Ý£¬³ÉÎªÍøÂç·¸×ï·Ö×ӵijÁµãÖ¸±ê¡£±»µÁÐÅÏ¢¼«Ò×±»ÓÃÓÚÉí·Ý͵ÇÔ¡¢½ðÈÚڲƵȷ¸·¨»î¶¯£¬¶ÔÆóÒµºÍÇóÖ°Õß×é³ÉË«³Á·çÏÕ¡£¾ÝResecurity·ÖÎö£¬Õâ´ÎÈëÇÖÔ´ÓÚÔÆ´æ´¢·þÎñÅäÖò»µ±£¬Â¶³öµÄ¹È¸èÔÆ´æ´¢Í°Òò²»×ã¸ù»ù°²È«·À»¤³ÉΪ¹¥»÷Èë¿Ú¡£
https://securityaffairs.com/179609/data-breach/cybercriminals-target-brazil-248725-exposed-in-ciee-one-data-breach.html
6. Hunters InternationalÀÕË÷Èí¼þ°ä·¢Í£Ô˲¢ÌṩÃâ·Ñ½âÃܹ¤¾ß
7ÔÂ3ÈÕ£¬È«Çò³ÛÃûÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©×éÖ¯Hunters InternationalÓÚ½üÈÕ°ä·¢ÕýʽÖÕ³¡ÔËÓª£¬²¢º±¼û½âÏòËùÓÐÊܺ¦ÆóÒµÌṩÃâ·Ñ½âÃܹ¤¾ß£¬³ÉΪÊ׸ö×Ô¶¯ÉÕ»ÙÊê½ðÒªÇóµÄÍøÂç·¸×OÌå¡£¸Ã×éÖ¯ÔÚ°µÍø°ä²¼µÄÉêÃ÷Öгƣ¬´Ë¾ÙÖ¼ÔÚ"±í°×ÉÆÒâ²¢Ô®ÊÖÊÜÓ°Ï칫˾¸´ÔÊý¾Ý"£¬Í¬Ê±Ç¿µ÷¹Ø¹Ø¾ö¶¨¾¹ý"É÷³Á˼¿¼"£¬µ«Î´Ã÷È·Ìá¼°¾ßÌåÔÒò¡£Hunters International×Ô2023ËêĺáÈÆð£¬Òò´úÂëÌØµãÓëÒÑDzɢµÄHiveÀÕË÷Èí¼þ¸ß¶ÈÀàËÆ£¬±»°²È«»ú¹¹ÊÓΪÆäDZÔڸİ档¸Ã×é֯ѡȡ¶àƽ̨¹¥»÷Õ½Êõ£¬Æä¶ñÒâÈí¼þÖ§³ÖWindows¡¢Linux¡¢FreeBSDµÈϵͳ¼°x64¡¢ARMµÈ¼Ü¹¹£¬¾ß±¸¿çƽ̨ϰȾÄÜÁ¦¡£´ÓǰÁ½Äê¼ä£¬¸ÃÍÅ»ï¶ÔÈ«Çò½ü300¼ÒÆóÒµÌáÒé¹¥»÷£¬Êê½ðÒªÇó´ÓÊýÊ®ÍòÖÁÊý°ÙÍòÃÀÔª²»µÈ¡£Õâ´ÎÍ£Ô˲¢·ÇºöÈ»¡£2024Äê11Ô£¬¸Ã×éÖ¯ÔøÔ¤±¨½«Òò"·¨ÂÉÉó²é¼ÓÇ¿ºÍÓ¯ÀûÄÜÁ¦½µÂä"¹Ø¹Ø¡£Í¬ÆÚ£¬Íþвµý±¨¹«Ë¾Group-IBÅû¶ÆäÕýı»®×ªÐÍ£¬´òËãͨ¹ý¸ÄÃûΪ"World Leaks"µÄÐÂÆ·ÅÆ×¨Ò»Êý¾Ý͵ÇÔ£¬Ê¹ÓÃÉý¼¶°æÐ¹Â¶¹¤¾ß·¢Õ¹´¿ÀÕË÷Ðж¯£¬²»ÔÙ¼ÓÃÜÎļþ¶øÊÇÖ±½ÓÍþÐ²ÆØ¹âÊý¾Ý¡£ÕâÒ»¶¯ÏòÅú×¢£¬Ö»¹ÜHunters InternationalÖ÷ÌåÖÕ³¡ÔËÓª£¬µ«Æä¼¼Êõ×ʲú¿ÉÄÜÒÔÐÂ״̬³ÖÐø»îÔ¾¡£
https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-shuts-down-after-world-leaks-rebrand/


¾©¹«Íø°²±¸11010802024551ºÅ