ºÚ¿ÍÔÚÀûÓÃWing FTP ServerµÄÑϳÁRCE·ì϶

°ä²¼¹¦·ò 2025-07-14

1. ºÚ¿ÍÔÚÀûÓÃWing FTP ServerµÄÑϳÁRCE·ì϶


7ÔÂ13ÈÕ£¬ÍøÂ簲ȫÁìÓòÆØ³öÕë¶ÔWing FTP ServerµÄÑϳÁÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-47812£©£¬¸Ã·ì϶ÒòCVSS 10·ÖµÄ×î¸ßΣÆÀ¼¶Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£×÷Ϊ֧³Ö¶àºÍ̸£¨FTP/FTPS/SFTP/HTTP/S£©µÄ¿çƽ̨Îļþ´«Êä½â¾ö¹æ»®£¬Wing FTP ServerĬÈÏÒÔroot£¨Linux£©»òSYSTEM£¨Windows£©È¨ÏÞÔËÐУ¬ÇÒ²»×ãȨÏÞ¸ôÀë»úÔ죬µ¼Ö·ì϶±»ÀûÓÃʱ¿ÉÖ±½ÓÔì³É·þÎñÆ÷Æëȫʧ¿Ø¡£·ì϶±¾Ô­ÔÚÓÚÈí¼þ¶Ô¿Õ×ֽڵĴ¦ÖÃȱµã¡£MITRE°²È«²¼¸æÖ¸³ö£¬7.4.4°æ±¾Ç°µÄ²úƷδ¶ÔÓû§ºÍÖÎÀíÔ±Web½çÃæÖеĻỰÎļþ½øÐгä·ÖÑéÖ¤£¬¹¥»÷Õß¿Éͨ¹ý×¢Èëº¬ÌØÊâ×Ö·ûµÄÓû§Ãû£¬½«¶ñÒâLua´úÂëÖ²Èë»á»°Îļþ¡£µ±Êܺ¦Õß½Ó¼ûÌØ¶¨Ò³Ãæ»òÖ´ÐÐĿ¼²Ù×÷ʱ£¬¶ñÒâ´úÂë±ã»áÒÔϵͳ×î¸ßȨÏÞ´¥·¢£¬ÐγÉÎÞÐèÎïÀí½Ó´¥µÄÔ¶³Ì´úÂëÖ´ÐÐÁ´¡£ÓÈΪΣÏÕµÄÊÇ£¬¼´±ãÆôÓÃĬÈϽûÓõÄÄäÃûFTPÕË»§£¬¹¥»÷ÕßÈÔ¿ÉÈÆ¹ý×Ö·û´®´¦ÖûúÔìÖ´Ðй¥»÷£¬ÊµÏÖ´Óͨ³£Óû§È¨ÏÞµ½ÏµÍ³ÖÎÀíԱȨÏÞµÄ×ÝÏòÌáȨ¡£¸Ã·ì϶¼¼Êõϸ½ÚÓÚ6ÔÂ30ÈÕ¹«¿ªºó£¬7ÔÂ1ÈÕ¼´³öÏÖÕæÊµ¹¥»÷°¸Àý¡£


https://securityaffairs.com/179861/hacking/wing-ftp-server-flaw-actively-exploited-shortly-after-technical-details-were-made-public.html


2. Google Gemini ·ì϶¿É½Ù³Öµç×ÓÓʼþÌáÒª½øÐÐÍøÂç´¹µö


7ÔÂ13ÈÕ£¬°²È«×êÑÐÈËÔ±Åû¶Google Gemini for Workspace´æÔÚÐÂÐÍÍøÂç´¹µö·ì϶£¬¹¥»÷Õß¿Éͨ¹ý°µ²ØÔÚµç×ÓÓʼþÕýÎÄÖеĶñÒâÖ¸ÁÓÕʹAI¹¤¾ßÌìÉú¿´ËƺϷ¨µÄ´¹µöÄÚÈÝ¡£¸Ã·ì϶ÀûÓÃGeminiµÄÌáÒªÉú³É¹¦ÄÜ£¬Í¨¹ý¼¼Êõ¼¿Á©Èƹý´«Í³°²È«¼ì²â£¬³ÉΪ¼Ì2024ÄêÌáÐÑ×¢Èë¹¥»÷ºó£¬Õë¶ÔÌìÉúʽAIµÄÓÖÒ»³Á´ó°²È«ÌôÕ½¡£¾ÝMozilla GenAI·ì϶Éͽð´òËã×êÑÐÔ±Marco FigueroaÅû¶£¬¹¥»÷Õß¿Éͨ¹ýHTML/CSS¼¼Êõ½«¶ñÒâÖ¸ÁîǶÈëÓʼþÕýÎÄ£¬Í¨¹ýÉèÖÃ×ÖÌå´óÓ×Ϊ0¡¢É«²ÊΪ°×É«£¬Ê¹Ö¸ÁîÔÚGmail¿Í»§¶ËÖÐÆëÈ«²»Ë½¼û¡£µ±Óû§ÒªÇóGeminiÌìÉúÓʼþÌáҪʱ£¬AI»á½âÎö²¢Ö´ÐÐÕâЩ°µ²ØÖ¸ÁÌìÉúÔ̺¬Ðéα°²È«ÖҸ桢´¹µöÁ´½Ó»òÖ§³Öµç»°ºÅÂëµÄÄÚÈÝ¡£ÀýÈ磬ÔÚFigueroaÌṩµÄ°¸ÀýÖУ¬GeminiÌìÉúÁË"ÄúµÄGmailÃÜÂëÒÑй¶£¬Çëµ±¼´²¦´òÖ§³Öµç»°´¦ÖÃ"µÄÐéα¾¯±¨£¬´ËÀàÐÅÏ¢¼«Ò×±»Óû§ÎóÒÔΪÊÇGoogle¹Ù·½Í¨Öª¡£¸Ã¹¥»÷µÄÒñ±ÎÐÔÌå´Ë¿ÌÈý¸ö·½Ã棺ÎÞÐ踽¼þ»òÁ´½Ó¼´¿É´¥·¢¡¢ÀûÓÃÓû§¶ÔAIÌáÒªµÄÐÅÀµ¡¢Í¨¹ýÊÓ¾õ°µ²Ø¶ã±ÜÓʼþÄÚÈÝɸ²é¡£


https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/


3. Gravity FormsÔ⹩¸øÁ´¹¥»÷£¬¹Ù·½Çþ·ÏÂÔØÎļþ±»Ö²ÈëºóÃÅ


7ÔÂ11ÈÕ£¬È«ÇòÔ¼°ÙÍò¸öÍøÕ¾Ê¹ÓõÄWordPress¸ß¼¶±íµ¥²å¼þGravity FormsÔâ·êÑϳÁ¹©¸øÁ´¹¥»÷£¬Æä¹Ù·½ÍøÕ¾ÌṩµÄÊÖ¶¯×°Öðü±»Ö²Èë¶ñÒâºóÃÅ£¬µ¼Ö²¿ÃÅÏÂÔØ°æ±¾´æÔÚÔ¶³Ì´úÂëÖ´ÐзçÏÕ¡£¾Ý°²È«¹«Ë¾PatchStackÅû¶£¬¹¥»÷Õßͨ¹ý´Û¸Ä²å¼þÖ÷ÌâÎļþcommon.php£¬ÔÚ7ÔÂ10ÈÕÖÁ11ÈÕÆÚ¼äÏò½Ó¼ûgravityapi.orgÓòÃûµÄ·þÎñÆ÷·¢ËÍÕ¾µãÔªÊý¾Ý£¨Ô̺¬URL¡¢ÖÎÀíõè¾¶¡¢Ö÷Ìâ²å¼þ°æ±¾µÈÃô¸ÐÐÅÏ¢£©£¬²¢½Ó¹Übase64±àÂëµÄ¶ñÒâÔØºÉ£¬×îÖÕÔÚÍøÕ¾Ä¿Â¼ÌìÉú¼Ù×°³ÉWordPressϵͳÎļþµÄ"bookmark-canonical.php"£¬ÊµÏÖÎÞÐèÉí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£Õâ´ÎÊÂÎñÓ°ÏìÁìÓò¿í·º£¬Éæ¼°Gravity Forms 2.9.11.1ºÍ2.9.12°æ±¾µÄÊÖ¶¯ÏÂÔØ¼°Composer×°Ö÷½Ê½¡£¹¥»÷ÕßÀûÓøúóÃŲ»½öÇÔÈ¡Êý¾Ý£¬¸üÖ±½ÓÔÚÊÜÏ°È¾ÍøÕ¾Ôö³¤ÖÎÀíÔ¹ØË»§£¬ÆëÈ«½ÚÔìÖ¸±êϵͳ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Í¨¹ýGravity Forms¹Ù·½API·þÎñ½øÐеÄ×Ô¶¯¸üк͸½¼Ó×é¼þ×°ÖÃδÊÜÓ°Ï죬µ«ÊÖ¶¯ÏÂÔØÇþ·³ÉΪ¹¥»÷Èë¿Ú¡£¿ª·¢³§ÉÌRocketGeniusÔÚ¹ýºó»ã±¨ÖÐÈ·ÈÏ£¬¶ñÒâ´úÂë»á×è¶ÏÕý³£¸üÐÂÁ÷³Ì²¢³ÖÐøÏÎ½Ó±í²¿·þÎñÆ÷£¬½¨ÒéËùÓнüÆÚͨ¹ýÊÖ¶¯·½Ê½×°Öûò¸üвå¼þµÄÓû§µ±¼´³ÁÐÂ×°Öùٷ½¸É¾»°æ±¾£¬²¢²é³­ÍøÕ¾ÊÇ·ñ´æÔÚÒì³£ÖÎÀíÔ¹ØË»§¡£


https://www.bleepingcomputer.com/news/security/wordpress-gravity-forms-developer-hacked-to-push-backdoored-plugins/


4. ÃÀ¹ú°¢À­°ÍÂíÖݼӵǴú¶ûÊÐÔâINC RansomÀÕË÷¹¥»÷


7ÔÂ11ÈÕ£¬ÃÀ¹ú°¢À­°ÍÂíÖݼӵǴú¶ûÊе±¾Ö½üÈÕÏÝÈëÊý¾Ý°²È«Î£»ú£¬ÆäÃô¸ÐÐÅÏ¢±»ÆØ³Ê´Ë¿Ì°µÍøÂÛ̳ÉÏ¡£³ÛÃûÀÕË÷×éÖ¯INC RansomÐû³ÆÒÑÇÔÈ¡¸ÃÊÐÔ¼50GBÊý¾Ý£¬Ô̺¬ÊÐÕþºÏͬ¡¢²ÆÕþ¼Í¼¡¢¿Í»§ÐÅÏ¢¡¢ÈËÁ¦×ÊÔ´µµ°¸¼°±äÂһ㱨µÈ»úÃÜ×ÊÁÏ£¬²¢½«ÆäÁÐÈëйÃÜÍøÕ¾ÒÔʩѹ֧¸¶Êê½ð¡£Ö»¹Ü¹¥»÷ÕßÉÐδÌṩÊý¾ÝÑù±¾»ò½ØÍ¼ÑéÖ¤ÕæÊµÐÔ£¬µ«Õâ´ÎÊÂÎñÒÑÒý·¢¶ÔÊÐÃñÉí·ÝµÁÓ÷çÏÕ¼°ÊÐÕþϵͳ°²È«ÐÔµÄÓÇÓô¡£¼ÓµÇ´ú¶ûÊÐ×÷Ϊ²®Ã÷º²±±²¿½¼Çø¡¢È˶¡³¬1.6ÍòµÄ³ÇÕò£¬ÈôÊý¾Ýй¶Êôʵ£¬¿ÉÄܳÉÎªÍøÂç·¸×ï·Ö×Ó½øÒ»²½ÉøÈëµ±¾ÖÍøÂçµÄ¹Ø¼üÌø°å¡£INC Ransom×éÖ¯×Ô2023Äê7Ô»îÔ¾ÒÔÀ´£¬ÒÑÐγÉ"¶à³ÁÀÕË÷"ģʽ£¬²»½ö¼ÓÃÜÊý¾Ý£¬¸üÒÔ¹«¿ªÐ¹Â¶ÎªÍþв£¬ÆÈʹÊܺ¦Õ߾ͷ¶¡£¾Ý°µÍø¼à¿Ø¹¤¾ßRansomlookerͳ¼Æ£¬¸ÃÍÅ»ï´ÓǰһÄêÄÚ¹¥»÷ÖÁÉÙ176¼Ò»ú¹¹£¬Êܺ¦Õ߱鲼ҽÁÆ¡¢½ÌÓý¡¢µ±¾ÐİÆóÒµÁìÓò¡£


https://cybernews.com/security/gardendale-alabama-ransomware-attack/


5. ÷è÷ëÀÕË÷Èí¼þÇ¿ÊÆáÈÆð£¬ÀûÓÃFortinet·ì϶ÖÂ81¼Ò»ú¹¹Êܹ¥»÷


7ÔÂ12ÈÕ£¬½üÈÕÀÕË÷Èí¼þÁìÓòÓ­À´³Á´ó±ä¾Ö£¬÷è÷루Qilin£©×é֯ƾ½è47.3%µÄ»îÔ¾¶È¼¤Ôö£¬ÒÔ81ÆðÐÂÔö°¸¼þ³¬¹ý´«Í³¾¢Â㬳ÉΪȫÇò×î»îÔ¾µÄÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©ÍŻ¸Ã×éÖ¯×Ôµ®ÉúÒÔÀ´ÒÑÀۼƹ¥»÷³¬310¸öÖ¸±ê£¬Æä¼¼ÊõÑݽøÓëÕ½ÊõתÐÍÕý³ÁËÜÍøÂ簲ȫÍþв¸ñ¾Ö¡£÷è÷ëµÄ¼±¾çÀ©ÕÅÔ´ÓڶԹؼü»ù´¡ÉèÊ©·ì϶µÄϵͳÐÔÀûÓá£2025Äê5-6Լ䣬¸Ã×éÖ¯½«¹¥»÷½¹µã¶Ô׼佨²¹µÄFortinet°²È«É豸£¬ÓÈÆäÕë¶ÔFortiGateºÍFortiProxyÉ豸ÖеÄCVE-2024-21762£¨Éí·ÝÑéÖ¤ÈÆ¹ý£©ÓëCVE-2024-55591£¨Ô¶³Ì´úÂëÖ´ÐУ©·ì϶¡£Ö»¹ÜǰÕßÒÑÓÚ2025Äê2Ô°䲼²¹¶¡£¬µ«È«ÇòÊýÍǫ̀É豸ÈÔ¶³öÔÚ¹¥»÷ÃæÏ£¬Îª÷è÷ëÌṩÁË×Ô¶¯»¯²¿ÊðµÄ¾ø¼ÑÈë¿Ú¡£¹¥»÷Á´ÏÔʾ£¬ÍþвÐÐΪÕßͨ¹ýÌØÔìÒªÇó´¥·¢·ì϶£¬ÎÞÐèÍ´´¦¼´¿É³ÉÁ¢ÍøÂç°²Éíµã£¬Ëæºó¿ªÊÍѡȡRustÓëC˵»°±àдµÄÄ£¿é»¯¶ñÒâÔØºÉ£¬Ö´ÐÐÓÆ¾Ã»¯½ÚÔìÓëºáÏòÉøÈë¡£¼¼Êõ·ÖÎö½Òʾ£¬÷è÷ëµÄÍþвģÐÍÒÑÍ»ÆÆ´«Í³ÀÕË÷ÁìÓò£¬¹¹½¨Æðº­¸ÇÀ¬»øÓʼþ¡¢DDoS¹¥»÷¡¢PB¼¶Êý¾Ý´æ´¢¼°ÉúÀíÕ½¹¤¾ßµÄÆëÈ«·¸×ïÉú̬¡£Æä¶À´´µÄ"ºô½ÐÂÉʦ"Ö°ÄÜͨ¹ý·ÂÕÕ˾·¨½»É泡¾°£¬¶ÔÊܺ¦ÕßÊ©¼ÓÉúÀíѹÁ¦£¬ÏÔÖøÌáÉýÊê½ðЭÉÌЧÄÜ¡£ÕâÖÖ¶àά¶È¹¥»÷ģʽʹÆäѸ¿ìÌí²¹LockBit¡¢BlackCatµÈDzɢ×éÖ¯ÁôϵÄÊг¡¿Õȱ£¬ÎüÒý´óÁ¿´ÓÊôÍŶӼÓÃË¡£


https://cybersecuritynews.com/qilin-emerged-as-the-most-active-group/


6. ºÚ¿Í½èºÏ·¨Mac¹¤¾ßÖ²ÈëZuRuľÂí£¬³ÁµãÕë¶Ô¿ª·¢ÕßȺÌå


7ÔÂ11ÈÕ£¬°²È«»ú¹¹SentinelOne½üÈÕ°ä²¼¾¯±¨£¬½ÒʾºÚ¿ÍÕýͨ¹ý´«È¾ËÑË÷ÒýÇæÁ˾ֵķ½Ê½£¬½«Ö²ÈëZuRuľÂíµÄ´Û¸Ä°æMac¹¤¾ßÍÆË͸øÓû§£¬×îй¥»÷Ö¸±ê¶Ô×¼¿çƽ̨SSH¿Í»§¶ËTermius¡£Õâ´Î¹¥»÷Ò»Á¬ÁËÕë¶Ô¿ª·¢Õß³£Óù¤¾ßµÄ¶ñÒâÈí¼þ´«²¼Ä£Ê½£¬Í¹ÏÔmacOSÆ½Ì¨Ãæ¶ÔµÄ¹©¸øÁ´°²È«Íþв³ÖÐøÉý¼¶¡£±»´Û¸ÄµÄTermius×°ÖðüÄÚº¬Ð°æmacOS.ZuRuºóÃŲ¡¶¾¡£¸ÃľÂí×°Öúó»áÔÚºó¶Ü¾²Ä¬ÔËÐУ¬³ÉÁ¢Óƾû¯½Ó¼ûͨ·£¬²»½ö¿ÉÄÜÔ¶³ÌÏÂÔØÓк¦×é¼þ£¬»¹¿ÉÖ´Ðй¥»÷ÕßÖ¸ÁְÄܺ­¸ÇÎļþ´«Ê䡢ϵͳ¿úËÅ¡¢¹ý³Ì²Ù¿Ø¼°Ö¸Áî·´À¡µÈ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¹¥»÷ÕßÒªÇóÊܺ¦ÏµÍ³ÖÁÉÙΪ2023Äê10Ô°䲼µÄSonoma 14.1»ò¸üа汾£¬°µÊ¾Æä¿ÉÄÜÕë¶Ô½ÏеÄmacOS»·¾³ÓÅ»¯¹¥»÷´úÂë¡£¼¼Êõ·ÖÎöÏÔʾ£¬Õâ´Î¹¥»÷Öд۸ĵÄTermiusÔ̺¬ÓƾÃÐÔÏÂÔØÆ÷£¬¿É»ñÈ¡²¢½âÂë¿ªÔ´ÉøÈ빤¾ßKhepri£¬Í¨¹ý¶ñÒâÓòÃû³ÉÁ¢ºÅÁî½ÚÔìͨ·¡£¶ñÒâ´úÂëÖ´ÐÐʱ»áͬ²½Æô¶¯Ä¾Âí¼ÓÔØÆ÷ÓëÕý°æÀûÓã¬È·±£Óû§ÄÑÒÔ¾õ²ìÒì³£¡£°²È«×¨¼ÒÆÀ¹ÀÒÔΪ£¬´ËÀ๥»÷ÖØÒªÕë¶Ô"²»×ãÓÐЧÖÕ¶Ë·À»¤"µÄ»·¾³£¬ÓÈÆäÊÇÒÀÀµËÑË÷ÒýÇæÏÂÔØÈí¼þµÄ¿ª·¢ÕßȺÌå¡£


https://cybernews.com/security/hackers-hide-mac-trojan-in-legitimate-applications/