Elasticsearch·þÎñÆ÷ÅäÖÃÃýÎóÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶

°ä²¼¹¦·ò 2025-07-25

1. Elasticsearch·þÎñÆ÷ÅäÖÃÃýÎóÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶


7ÔÂ23ÈÕ £¬Ò»¸öÎÞÐèÉí·ÝÑéÖ¤µÄ¹«¿ªÊý¾Ý¿â¶³öÁËÈðµä¹«Ãñ¼°ÆóÒµ³¬¹ý1ÒÚÌõÃô¸Ð¼Í¼ £¬¹¦·ò¿ç¶È¸²¸Ç2019ÖÁ2024Äê £¬Êý¾Ý×ÜÁ¿´ï200GBÒÔÉÏ¡£Õâ´ÎÊÂÎñÓÉCybernews×êÑÐÈËÔ±·¢ÏÖ £¬Â¶³öµÄÊý¾ÝÔ̺¬Ó×ÎÒ·¨¶¨ÐÕÃû£¨º¬º¹ÇàÔøÓÃÃû£©¡¢ÈðµäÉí·ÝÖ¤ºÅ¡¢µ®ÉúÈÕÆÚ¡¢»éÒöÇé¿ö¡¢¹úÄÚ±íµØÖ·¹ì¼£¡¢ÒÆÃñÐÅÏ¢¡¢Õ®Îñ¼Í¼¡¢ÆÆ²úº¹Çà¡¢²Æ¸»ËùÓÐȨָ±ê¼°Â½ÐøÎåÄêµÄËùµÃ˰Êý¾Ý£¨2019-2023£© £¬ÉõÖÁÔ̺¬ÆóҵóÒ×¹ØÏµ¡¢ËðÒæ±íÌá½»¼Í¼µÈÐÐΪÈÕÖ¾ £¬ÐγɶÔÈðµäÉç»á³ÉÔ±³¤´ïÎåÄêµÄ²ÆÕþÓëÐÐΪȫ¾°»­Ïñ¡£¸ÃÊý¾Ý¿âµÄÒ쳣¶³öÔ´ÓÚElasticsearch¼¯ÈºµÄȨÏÞ½ÚÔìʧЧ¡£Ö»¹ÜÊý¾Ý½á¹¹Óë×ֶζ¨ÃûÏÔʾÆäÀ´×Ô±±Å·Ã³Ò×ÖÇÄÜ·ÖÎö¹«Ë¾Risika£¨ÄÚ²¿±êÇ©º¬"dwh*"Êý¾Ý²Ö¿â±êʶ£© £¬µ«½øÒ»´ëÊ©²é֤ʵ¸Ã·þÎñÆ÷²¢·ÇÓÉRisikaÖ±½ÓÔËÓª £¬¶øÊÇÆäÊÚȨµÄµÚÈý·½¿Í»§¶Ë¡£×êÑÐÈËÔ±´§Ä¦ £¬Êý¾Ý¿ÉÄÜͨ¹ýºÏ·¨Ã³Ò×Ðí¿ÉÌṩ¸øÏÂÓκÏ×÷ͬ°é £¬È´ÒòÔËάºöÂÔµ¼Ö·þÎñÆ÷Ïò¹«¹²»¥ÁªÍøÆëȫʢ¿ª½Ó¼û¡£


https://cybernews.com/security/risika-swedish-data-exposed/


2. ·¨¹úˮʦ¼¯ÍÅÔâºÚ¿ÍÀÕË÷ £¬¾üÊ»úÃÜй¶Íþв¹ú¶È°²È«


7ÔÂ23ÈÕ £¬·¨¹ú¹ú·À¹¤Òµ¾Þͷˮʦ¼¯ÍÅ£¨Naval Group£©½üÈÕÏÝÈë³Á´óÍøÂ簲ȫÎ £»ú¡£¾ÝCybernews±¨Â· £¬Ò»¸öÉí·Ý²»Ã÷µÄÍþвÐÐΪÕßÔÚÊý¾Ýй¶ÂÛ̳ÉÏÐû³ÆÈëÇÖÁ˸ù«Ë¾ £¬²¢ÍþÐ²Ð¹Â¶Éæ¼°¾ü½¢×÷Õ½ÖÎÀíϵͳ£¨CMS£©µÄÃô¸ÐÊý¾Ý £¬¶ø·ÇË÷ÒªÊê½ð¡£Õâ´ÎÊÂÎñÒòÉæ¼°·¨¹úÖ÷Ìâ¹ú·À¼¼Êõ £¬Òý·¢¶Ô¹ú¶È°²È«µÄÉî¶ÈÓÇÓô¡£¹¥»÷ÕßÐû³Æ»ñÈ¡µÄÊý¾ÝÔ̺¬£ºCMSÔ´´úÂë¡¢¼¼ÊõÎĵµ¡¢¿ª·¢ÈËÔ±Ðé¹¹»ú½Ó¼ûȨÏÞ¼°±£ÃÜͨѶ¼Í¼¡£ÎªÖ¤Ã÷ÕæÊµÐÔ £¬Æä¸½ÉÏÁË13GBÊý¾ÝÑù±¾ £¬ÄÚº¬ºÏͬÎļþ¡¢ÒÉËÆCMSÄÚ²¿ÐÅÏ¢¼°2003ÄêDZͧ¼à¿ØÏµÍ³ÊÓÆµ¡£Cybernews×êÑÐÍŶӳõ²½ÑéÖ¤²¿ÃÅÊý¾ÝºóÒÔΪ £¬Ð¹Â¶ÄÚÈÝÓµÓнϸ߿ÉÐŶÈ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬¹¥»÷ÕßδѡȡͨÀýµÄÊý¾ÝÊÛÂôģʽ £¬¶øÊÇÊÔͼͨ¹ýÍþв¹«¿ªÐÅÏ¢Ïòˮʦ¼¯ÍÅʩѹ £¬ÕâÒ»»ûÐÎÐÐΪ°µÊ¾Æä¶¯»ú¿ÉÄܳ¬¹ý¾­¼ÃÀûÒæ¡£Õâ´ÎÊÂÎñ¶Ô·¨¹ú¹ú·À°²È«×é³ÉË«³Á·çÏÕ£º¼¼Êõ²ãÃæ £¬Ç±Í§Ó뻤ÎÀ½¢CMSÔ´´úÂëµÄй¶¿ÉÄܼõÈõ·¨¾üÕ½ÊõÓÅÊÆ £»Õ½Êõ²ãÃæ £¬Ãô¸ÐÎĵµµÄÀ©É¢»ò±»µÐ¶ÔÈ¨ÊÆÓÃÓÚÄæÏò¹¤³Ì»òÍøÂç¹¥»÷¡£


https://cybernews.com/security/naval-group-france-defense-data-breach/


3. WordPressÍøÕ¾ÏÖÒþÃØºóÃÅ£ºÀûÓÃmu-pluginsĿ¼ʵÏÖÓÆ¾Ã½ÚÔì


7ÔÂ24ÈÕ £¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÔÚWordPressÍøÕ¾µÄ¡°mu-plugins¡±£¨±ØÐëʹÓòå¼þ£©Ä¿Â¼Öз¢ÏÖÒ»¸ö¸ß¶ÈÒñ±ÎµÄºóÃÅ·¨Ê½ £¬¸ÃºóÃſɸ³Óè¹¥»÷ÕßÓÆ¾Ã»¯½Ó¼ûȨÏÞ²¢Ô¶³ÌÖ´ÐÐËÁÒâ²Ù×÷¡£mu-plugins×÷ΪWordPressĬÈÏÆôÓõÄÌØÊâ²å¼þ £¬ÆäÎļþλÓÚ¡°wp-content/mu-plugins¡±Ä¿Â¼ £¬ÇÒ²»»áÏÔʾÔÚºó¶Ü²å¼þÖÎÀíÒ³Ãæ £¬³ý·ÇÊÖ¶¯É¾³ýÎļþ²»È»ÎÞ·¨½ûÓà £¬ÕâÒ»¸öÐÔʹÆä³ÉΪ¹¥»÷Õß°µ²Ø¶ñÒâ´úÂëµÄÃÎÏëÖ¸±ê¡£Õâ´Î·¢ÏֵĶñÒⷨʽͨ¹ý¡°wp-index.php¡±¾ç±¾×÷Ϊ³õʼ¼ÓÔØÆ÷ £¬´ÓʹÓÃROT13Ëã·¨»ìºÏµÄURLÖмìË÷Ô¶³ÌÓÐЧ¸ºÔØ £¬²¢½«Æä´æ´¢ÔÚWordPressÊý¾Ý¿âµÄ¡°_hdra_core¡±×ֶΣ¨wp_options±í£©ÖС£¶ñÒâ´úÂëÖ´Ðкó £¬»áÏòÖ÷±êÌâ´Î×¢ÈëÃûΪ¡°pricing-table-3.php¡±µÄ°µ²ØÎļþÖÎÀíÆ÷ £¬ÔÊÐí¹¥»÷ÕßÔ¶³Ìä¯ÀÀ¡¢ÉÏ´«»òɾ³ýÎļþ £»Í¬Ê±´´½¨¡°officialwp¡±ÖÎÀíÔ¹ØË»§²¢¼¤»î¶ñÒâ²å¼þ¡°wp-bot-protect.php¡± £¬ÐγÉË«³Á½ÚÔìÁ´¡£¸üΣÏÕµÄÊÇ £¬¸ÃºóÞ߱¸ÃÜÂë³ÁÖÃÖ°ÄÜ £¬¿É½«³£ÓÃÖÎÀíÔ¹ØË»§¼°×ÔÉí´´½¨µÄ¡°officialwp¡±Óû§ÃÜÂëÅú¸ÄΪ¹¥»÷ÕßÔ¤ÉèµÄĬÈÏÖµ £¬³¹µ×Ëø¶¨ÆäËûÖÎÀíԱȨÏÞ¡£


https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html


4. ºÚ¿Í½«ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þDZÈëÕùÏÈÂÄÀú°æSteamÓÎÏ·


7ÔÂ24ÈÕ £¬³ÛÃûÍþв×éÖ¯EncryptHub£¨±ðºÅLarva-208£©Í¨¹ýÈëÇÖSteamƽ̨ÓÎÏ·¡¶Chemia¡· £¬ÏòÈ«ÇòÍæ¼Ò·Ö·¢ÐÅÏ¢ÇÔÈ¡Àà¶ñÒâÈí¼þ¡£¾ÝÍþвµý±¨¹«Ë¾ProdaftÅû¶ £¬¹¥»÷ʼÓÚ7ÔÂ22ÈÕ¡£ºÚ¿Í×éÖ¯½«¶ñÒâ¶þ½øÔìÎļþÖ²ÈëÓÉAether Forge Studios¿ª·¢µÄÉú¼ÆÔì×÷ÀàÓÎÏ·¡¶Chemia¡·ÖС£¸ÃÓÎϷĿǰÒÔ"ÕùÏÈÂÄÀú"´ó¾ÖµÇ½Steam £¬ÉÐδ°ä²¼Õýʽ¿¯ÐÐÈÕÆÚ¡£¹¥»÷Õßͨ¹ýÔÚÓÎÏ·ÎļþÖÐÔö³¤ÃûΪCVKRUTNP.exeµÄHijackLoader¶ñÒâÈí¼þ £¬ÔÚÊܺ¦É豸³ÉÁ¢Óƾû¯»úÔìºó £¬½øÒ»²½ÏÂÔØÓµÓÐÐÅÏ¢ÇÔȡְÄܵÄVidar·¨Ê½£¨v9d9d.exe£©¡£ÖµÍ×ÌùÐĵÄÊÇ £¬¸Ã¶ñÒâÈí¼þͨ¹ýijTelegramƵ·»ñÈ¡ºÅÁîÓë½ÚÔ죨C2£©·þÎñÆ÷µØÖ· £¬ÐγÉÒñ±ÎµÄͨѶÁ´Â·¡£Õâ´Î¹¥»÷³öÏÖ¶à³Á¼¼ÊõÌØµã£ºÈýÓ×ʱºó £¬¹¥»÷Õßͨ¹ýDLLÎļþcclib.dllÖ²ÈëµÚ¶þ¿î¶ñÒâÈí¼þFickle Stealer¡£¸ÃÎļþÀûÓÃPowerShell¾ç±¾worker.ps1´ÓÓòÃûsoft-gets[.]com»ñÈ¡Ö÷ÔØºÉ £¬×¨ÃÅÕë¶Ôä¯ÀÀÆ÷´æ´¢Êý¾ÝÖ´ÐÐÇÔÈ¡ £¬Ô̺¬ÕË»§Æ¾Ö¤¡¢×Ô¶¯Ìî³äÐÅÏ¢¡¢Cookie¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/


5. ÐÂÐÍAIÇý¶¯Linux¶ñÒâÈí¼þKoskeͨ¹ýÐÜèͼƬִÐÐÎÞÎļþ¹¥»÷


7ÔÂ24ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾AquaSec½üÆÚÅû¶һ¿îÃûΪKoskeµÄÐÂÐÍLinux¶ñÒâÈí¼þ £¬Æä´´Ð¹¥»÷ÊÖ·¨ÓëÒÉËÆÈËΪÖÇÄÜ£¨AI£©Çý¶¯¸öÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¸ÃÍþвͨ¹ý¿´ËÆÎÞº¦µÄÐÜèÖ÷ÌâJPEGͼƬ²¿Êð¶ñÒâ´úÂë £¬Ö±½ÓÔÚϵͳÄÚ´æÖÐÖ´ÐвÙ×÷ £¬Õ¹Ê¾³ö¸´Ôӵļ¼Êõ¼Ü¹¹Óë¸ß¶È×Ô¶¯»¯ÄÜÁ¦¡£Koske±»AquaSec×êÑÐÈËÔ±½ç˵Ϊ"¸´ÔÓµÄLinuxÍþв" £¬ÆäÖ÷ÌâÌØµãÔÚÓÚÀûÓöà̬Îļþ¼¼ÊõʵÏÖÒñ±Î¹¥»÷¡£¹¥»÷ÕßÊ×ÏÈͨ¹ý¶³öÔÚ¹«ÍøµÄJupyterLabÊ·ýÅäÖÃÃýÎó»ñÈ¡³õʼ½Ó¼ûȨÏÞ £¬Ëæºó´ÓOVH imagesµÈºÏ·¨Í¼´²ÏÂÔØÁ½ÕÅÐÜèJPEGͼƬ¡£ÕâЩͼƬËäÏÔʾΪÕý³£Í¼Ïñ £¬È´Í¨¹ýÌØÊâÎļþ½á¹¹Éè¼ÆÍ¬Ê±Ô̺¬ÓÐЧJPEGÎļþÍ·Óë¶ñÒâShell¾ç±¾¡¢C´úÂ룺Îļþǰ²¿ÎªÕý³£Í¼Æ¬Êý¾Ý £¬ºó²¿¸½¼Ó¿ÉÖ´ÐдúÂë £¬Ê¹Í³Ò»Îļþ¼ÈÄܱ»Í¼Ïñ²é¿´Æ÷½âÎöΪͼƬ £¬ÓÖÄܱ»¾ç±¾Ú¹ÊÍÆ÷¼ø±ðΪ¿ÉÖ´Ðз¨Ê½¡£¹¥»÷¹ý³ÌÖÐ £¬Á½ÕÅÐÜèͼƬ±ðÀ뿪ÊÍ·ÖÆçÔØºÉ²¢Í¬²½Æô¶¯£ºÔغÉһʵÏÖϵͳ¼¶°µ²Ø £»Ôغɶþ³ÉÁ¢Óƾû¯»úÔì¡£¶ñÒâÈí¼þ»áÆÀ¹ÀÖ÷»úCPUÓëGPU»úÄÜ £¬´ÓGitHubÏÂÔØÕë¶ÔÓ²¼þÓÅ»¯µÄ¼ÓÃÜÇ®±ÒÍÚ¿ó·¨Ê½ £¬Ö§³ÖÔ̺¬Monero¡¢RavencoinÔÚÄÚµÄ18ÖÖ¼ÓÃÜÇ®±Ò¡£


https://www.bleepingcomputer.com/news/security/new-koske-linux-malware-hides-in-cute-panda-images/


6. ¶íÂÞ˹ºÚ¿ÍÂñ·üÊýÖÜ £¬ÈëÇÖºÉÀ¼Ë¾·¨ÏµÍ³


7ÔÂ24ÈÕ £¬ºÉÀ¼Ë¾·¨ÏµÍ³½üÆÚÔâ·êÑϳÁÍøÂç¹¥»÷ £¬¶íÂÞ˹²¼¾°ºÚ¿Í±»ÁÐΪÊ×ÒªÏÓÒɶÔÏ󡣺ÉÀ¼¹«¹²¼ì²ìÊð£¨OM£©ÏµÍ³ÔâÈëÇÖÊÂÎñ´æÔÚÇ¿ÁÒ¶íÂÞ˹¹ØÁª¼£Ïó £¬¹¥»÷ÕßÒÑÔÚ˾·¨²¿ÍøÂçÖÐÂñ·üÊýÖÜδ±»·¢ÏÖ¡£Õâ´ÎÊÂÎñÔٴζ³ö¹ú¶È¹Ø¼ü»ù´¡ÉèÊ©Ãæ¶ÔµÄϵͳÐÔ°²È«·çÏÕ¡£·çÏÕÔ¤¾¯Ê¼ÓÚ6ÔÂ17ÈÕ £¬¼ì²ìÊðÔ¶³Ì°ìƽÕý̨ʹÓõĵÚÈý·½Èí¼þCitrix NetScaler±»ÆØ´æÔÚÑϳÁ·ì϶¡£¸Ã·ì϶ÔÚͨÓ÷ì϶ÆÀ·Öϵͳ£¨CVSS£©ÖлñµÃ9.3·Ö¸ßΣÆÀ¼¶ £¬Ö»¹Ü¼ì²ìÊðÐû³ÆÒѰ´³§É̽¨ÒéʵÏÖϵͳ¸üР£¬µ«ÓÐÖ¤¾ÝÅú×¢·ì϶ÔÚ½¨²¹Ç°Òѱ»ÀûÓá£Îª×è¶Ï¹¥»÷ÊæÕ¹ £¬¼ì²ìÊð±»ÆÈ×Ô¶¯¶Â½ØÄÚ²¿ÍÆËã»ú»¥ÁªÍøÏνÓ £¬µ«´Ëʱ¹¥»÷Õß¿ÉÄÜÒѽӴ¥Ô̺¬Ôڰ쾯·½µ÷²é°¸¾í¡¢Î´Éó½áÐÌʰ¸¼þ¾í×Ú¼°Ô±¹¤Ó×ÎÒÐÅÏ¢ÔÚÄڵĸ߶ÈÃô¸ÐÊý¾Ý £¬¾ßÌåй¶ÁìÓòÉдýÈ·ÈÏ¡£¼¼Êõ·ÖÎöÏÔʾ £¬¹¥»÷ÕßÀûÓõÚÈý·½Èí¼þ·ì϶³ÉÁ¢³õʼ½Ó¼ûͨ·ºó £¬Í¨¹ý³Ö¾ÃÂñ·üÖ´ÐÐÊý¾ÝÇÔÈ¡¡£ÕâÖÖ"µÍÂýÓ×"¹¥»÷ģʽÓë¶íÂÞ˹¹ú¶ÈÖ§³ÖºÚ¿Í¼¯ÌåµÄÕ½ÊõÌØµã¸ß¶ÈÎǺÏ £¬ÆäÑ¡ÔñÔÚϵͳ½¨²¹Ç°Ö´Ðй¥»÷ £¬Åú×¢¶ÔÖ¸±êÍøÂçÊØ»¤ÖÜÆÚµÄ¾«×¼°ÑÎÕ¡£


https://cybernews.com/security/russian-hack-dutch-justice-system-data-breach/