XZ-UtilsºóÃųÖÐøÍþвDocker Hub£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼

°ä²¼¹¦·ò 2025-08-14

1. XZ-UtilsºóÃųÖÐøÍþвDocker Hub£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼


8ÔÂ12ÈÕ£¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚ³ÖÐø·¢½Í£¬Binarly×êÑÐÍŶӷ¢ÏÖDocker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ´æÔÚ35¸öÊÜϰȾµÄLinux¾µÏñ£¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ý´«µÝÐÔϰȾÍþвÓû§¼°×éÖ¯Êý¾Ý°²È«¡£¸ÃºóÃÅÓɳ־ÃÏîÄ¿¹±Ï×Õß"Jia Tan"°ÂÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖУ¬Í¨¹ýglibcµÄIFUNC»úÔì½Ù³ÖOpenSSHµÄRSA_public_decryptº¯Êý£¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootºÅÁî¡£Ö»¹Ü·ì϶·¢ÏÖ½ÏÔçÇÒ¹Ù·½ÒѰ䲼5.6.2¼°ÒÔÉϽ¨¸´°æ±¾£¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢FedoraµÈÖ÷Á÷Linux¿¯Ðаæ£¬³ÉΪȥÄê×îÑϳÁµÄÈí¼þ¹©¸øÁ´°²È«ÊÂÎñÖ®Ò»¡£Docker Hub×÷ΪȫÇò¿ª·¢Õß¿í·ºÊ¹ÓõÄÈÝÆ÷¾µÏñƽ̨£¬ÆäÎÊÌâ¾µÏñµÄ³ÖÐø´æÔÚÒý·¢ÓÇÓô¡£BinarlyɨÃè·¢ÏÖ£¬²¿ÃÅÊÜϰȾ¾µÏñÈÔ¹«¿ª°ä²¼£¬ÇÒ´æÔÚ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ"£¬Ðγɴ«µÝÐÔ·çÏÕ¡£ºÜ¶àCI/CD¹Ü·¼°³ö²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã£¬Èôδʵʱ¸üУ¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼Ì³Ð¶ñÒâ´úÂë¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈÊØ»¤Õß´«µÝÇé¿ö£¬µ«DebianÑ¡Ôñ±£ÁôÕâЩºóÞµÏñ£¬ÀíÓÉÊÇ"ÀûÓÃǰÌá¿Ì±¡"ÇÒÐèά³Ö´æµµÂ½ÐøÐÔ£¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£


https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/


2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷


8ÔÂ12ÈÕ£¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀí·þÎñ¾ÞÍ·Pacific HealthWorks£¨PHW£©½üÈÕÔâ·êEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬µ¼ÖÂÆä·þÎñµÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆ·þÎñ»ú¹¹£¨MSO£©£¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢Ò½Éú¼¯Ìå¼°ÕïËùÌṩ¼¹Øï¡¢³ÁÖ¢¼à»¤¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö£¬Äê·þÎñ»¼Õß³¬140ÍòÈ˴Ρ£Õâ´ÎÊÂÎñÖУ¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢Ò½ÁƼͼ¡¢±£ÏÕÐÅÏ¢µÈÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶£¬²¿ÃÅÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹«¿ª¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÒõÓôÊܺ¦Õß"ÍøÕ¾°ä²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉêÃ÷£¬ÍþвÈôδÔÚÖ¸°´¹¦·òÄÚÁªÏµ½»É棬½«°ä²¼Ô̺¬Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£CybernewsºË²é·¢ÏÖ£¬Ð¹Â¶Îļþº­¸ÇEmergent Medical Associates¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹£¬Éæ¼°Õï¶Ï´úÂë¡¢±£ÏÕË÷ÅâµÈÖ÷ÌâÒ½ÁÆÊý¾Ý¡£


https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/


3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷£¬·þÎñÖжÏÒý·ÛË¿·¢¼±


8ÔÂ12ÈÕ£¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯ÀûÓÃÖжÏÊýÓ×ʱ£¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂ簲ȫΣ»ú¡£Õâ´ÎÊÂÎñʼÓÚ±¾µØ¹¦·òÁ賿4µã30·Ö£¬Óû§ÎÞ·¨Ô¤Ô¼Ñݳª»áÃÅÆ±¡¢½Ó¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£Yes24Ѹ¿ì½«ÏµÍ³ÀëÏßÒÔ¶ôÔì¹¥»÷£¬²¢ÒÀ¸½±¸·ÝÊý¾ÝÔÚ7Ó×ʱÄÚ¸´Ô­ÔËÓª£¬µ«Î´Ð¹Â©¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇó¡£Öж϶Ժ«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ï죬ԭ¶¨ÓÚµ±Íí8µãÆðÍ·µÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ££¬·þÎñ¸´Ô­ºó¸Õ¸Õ³ÁÆô¡£Õâ´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ô²»¼°Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌ죬ӰÏìÆÓ±¦½£¡¢ENHYPENµÈÑÝÔ±ÑݳöƱÎñ£¬²¢Â¶³öÆä²»×ãÒìµØ±¸·ÝϵͳµÄ°²È«¶Ì°å¡£Ö»¹Ü¸Ã¹«Ë¾¹ýºó³Ðŵ"³¹²é°²Õû¸öϵ"¡¢ÀñƸ±í²¿ÍŶӲ¢Éý¼¶ÏµÍ³£¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ£¬Ôð¹ÔìäÕû¸Ä´ëÊ©²»µ½Î»ÇÒÐÅϢͨÃ÷¶È²»¼°¡£


https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected


4. FortinetÖÒ¸æFortiSIEMÔ¤ÊÚȨRCE·ì϶¿ÉÄܱ»ÀûÓÃ


8ÔÂ13ÈÕ£¬ÍøÂ簲ȫ³§ÉÌFortinet½üÈÕ°ä²¼´¹Î£°²È«²¼¸æ£¬Åû¶ÆäÖ÷ÌⰲȫÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM´æÔÚÒ»¸öÑϳÁµÈ¼¶£¨CVSS 9.8£©µÄÔ¶³ÌºÅÁî×¢Èë·ì϶£¨CVE-2025-25256£©¡£¸Ã·ì϶ӰÏì°æ¼¼ÇÉÓò¿í·º£¬º­¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§£¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹¼¼ÊõÖ§³Ö£¬½¨ÒéÓû§µ±¼´Éý¼¶ÖÁ7.3.2¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£·ì϶³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ½øÐгä·Ö¹ýÂË£¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý»ú¹Ø¶ñÒâCLIÒªÇó£¬ÔÚÖ¸±êϵͳִÐÐËÁÒâºÅÁî¡£FortinetÈ·Èϸ÷ì϶´æÔڿɹ«¿ª»ñÈ¡µÄÀûÓôúÂ룬ÇÒ¹¥»÷ÐÐΪ²»»á²úÉú¹ÖÒìIOCÌØµã£¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕÀûÓ㬵«GreyNoiseÍþвµý±¨¹«Ë¾Ö¸³ö£¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö£¬´ËÀàÒì³£Á÷Á¿µßô¤ÍùÍùԤʾзì϶Åû¶£¬Á½Õß¿ÉÄÜ´æÔÚ¹ØÁªÐÔ¡£Õâ´Î·ì϶¶³öºó£¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖµ××ÓÐÔ½¨¸´£¬Í¬Ê±Ìṩһʱ»º½â¹æ»®¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/


5. ±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾


8ÔÂ13ÈÕ£¬±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤°ì¹«ÊÒ½üÈÕÔâ·êÑϳÁÍøÂç¹¥»÷£¬µ¼ÖÂÆäÖ÷ÌâÐÅÏ¢ÏµÍ³È«ÃæÌ±»¾£¬Ô̺¬¹Ù·½ÍøÕ¾¡¢µç×ÓÓʼþÕË»§¼°¹Ì¶¨µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ£¬Õâ´ÎÊÂÎñÒÑ´¥·¢¿ç²¿ÃźÏ×÷ÏìÓ¦£¬¼¼ÊõÈËÔ±ÔÚ·¨ÂÉ»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦¸´Ô­·þÎñ²¢µ÷²é¹¥»÷Ô´Í·¡£Ö»¹Üµ±Ç°¹¥»÷ý½éÉÐδÃ÷È·£¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹«¿ªÈÏÁìÔðÈΣ¬µ«ÊÂÎñµÄ¿í·ºÓ°Ï켰ϵͳ̱»¾ÌصãÓëµäÐÍÀÕË÷¹¥»÷¸ß¶ÈÎǺÏ£¬Òý·¢¶ÔDZÔÚ¹©¸øÁ´·çÏÕµÄÓÇÓô¡£ÍøÂ簲ȫר¼Ò¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢ÏÖΪÊÂÎñµ÷²éÌṩÁ˹ؼüÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«¼ÒµÄCitrix NetScalerÉ豸Òò佨²¹CVE-2025-5777·ì϶¶ø³Ö¾Ã¶³öÓÚ¹¥»÷·çÏÕÖС£ShodanɨÃèÊý¾ÝÏÔʾ£¬Á½Ì¨ÓйØÉ豸±ðÀëÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏߣ¬¹¦·òÏßÓë¹¥»÷²úÉú¸ß¶È³ÁºÏ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸Ã·ì϶Òѱ»ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼¡±£¬²¢ÒªÇóÁª¹ú»ú¹¹ÔÚ24Ó×ʱÄÚʵÏÖ½¨²¹¡£½ØÖÁ±¨Â·°ä²¼£¬±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤ÍøÕ¾ÈÔδ¸´Ô­£¬ÏµÍ³½¨¸´¹¤×÷ÈÔÔÚ½øÐÐÖС£


https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/


6. AIÉî¶ÈαÔì¼¼Êõ´ßÉú¿ç¹úͶ×ÊȦÌ×£¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ


8ÔÂ13ÈÕ£¬ÍøÂ簲ȫ»ú¹¹Group-IB½üÈÕÅû¶£¬Ú¿Æ­·Ö×ÓÕýÀûÓÃÌìÉúʽAI¼¼Êõ¹¹½¨¸ß¶ÈÕæÇеÄÚ²Æ­ÍøÂ磬ͨ¹ýÉî¶ÈαÔìÊÓÆµ¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¸æ°×Ͷ·Å£¬ÓÕÆ­È«Çò¶à¹úͶ×ÊÕ߲μÓÐéαÂòÂôƽ̨¡£×êÑÐÏÔʾ£¬´ËÀàȦÌ×ÒÑÐγɹæÄ£»¯²úÒµÁ´£¬Æä¼¼Êõ¸´ÔÓ¶Å×ëÉúÀí²Ù¿Ø¼¿Á©¾ù´ïи߶È¡£Ö÷ÌâڲƭÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£Ú¿Æ­Õ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«¼ÒÈËÎïµÄÓ°ÏñÓëÉùÒô£¬Ôì×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Î£¬½áºÏ´Û¸ÄµÄÂòÂôÊý¾Ýͼ±íÓëÐéαר¼Ò±³Ê飬ӪÔì³ö"¶À¼ÒͶ×Ê»úÓö"µÄ½ôÆÈ¸Ð¡£Êܺ¦Õß±»Êèµ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾£¬ÕâÐ©ÍøÕ¾Í¨¹ý±¾µØ»¯ÄÚÈÝÊÊÅäÓû§µØµã¹ú¶È˵»°£¬²¢Ç¶ÈëÉ罻ýÌåÕ˺𢲩¿ÍÎÄÕ¼°YouTubeƵ·½øÐжàÇþÂ·ÍÆ¹ã£¬ÐγÉÐéαÐÅÏ¢Éú̬¡£×¢²á½×¶Î£¬Æ½Ì¨ÒÔ"Ó×¶î±£ÕϽð"£¨100-250ÃÀÔª£©½µµÍÓû§¾¯ÌèÐÔ£¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢×¡Ö·Ö¤Ã÷ÉõÖÁÐÅÓþ¿¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£ÖµµÃ¾¯ÌèµÄÊÇ£¬´ËÀàÍøÕ¾Í¨¹ýIPµØÖ·Óë˵»°¼ì²âʵÏÖ¾«×¼ÆÁ±Î£¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨½Ó¼û£¬¶øÓ¡¶È¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÈÕ±¾µÈ13¸ö¹ú¶È³ÉÎªÖØÒªÖ¸±ê¡£


https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/