´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷
°ä²¼¹¦·ò 2025-12-301. ´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷
12ÔÂ29ÈÕ£¬º«¹ú¹ú¶Èº½¿Õ¹«Ë¾´óº«º½¿Õ½üÈÕÅû¶£¬Æä»úÉϲÍÒû¹©¸øÉ̼°Ç°×Ó¹«Ë¾´óº«º½¿Õ²ÍÒûÃâ˰¹«Ë¾£¨KC&D£©Ôâ·êºÚ¿Í¹¥»÷£¬µ¼ÖÂÔ¼3ÍòÃûÔ±¹¤Ó×ÎÒÐÅϢй¶¡£KC&DÓÚ2020Äê´Ó´óº«º½¿Õ·Ö²ðΪ¶ÀÁ¢¹«Ë¾£¬Õâ´ÎÊÂÎñÖУ¬ÆäERPϵͳÖд洢µÄÔ±¹¤ÐÕÃû¡¢ÒøÐÐÕ˺ŵÈÃô¸ÐÐÅÏ¢±»ÇÔÈ¡¡£´óº«º½¿ÕÊ×ϯִÐйÙÓí»ùºéÔÚÄÚ²¿±¸Íü¼ÖÐÇ¿µ÷£¬Ö»¹ÜÊÂÎñ²úÉúÔÚ±í²¿ºÏ×÷ͬ°éÖÎÀíÁìÓòÄÚ£¬µ«Éæ¼°Ô±¹¤ÐÅÏ¢°²È«£¬¹«Ë¾¸ß¶ÈÆ÷³Á¡£×÷Ϊº«¹ú×î´óº½¿Õ¹«Ë¾£¬´óº«º½¿ÕÕ¼Óг¬2ÍòÃûÔ±¹¤¡¢160Óà¼Ü·É»ú£¬2024ÄêÔËËͳ˿ͳ¬2300ÍòÈ˴Σ¬ÓªÊÕ³¬110ÒÚÃÀÔª¡£Õâ´ÎÊý¾Ýй¶¹æÄ£¾Þ´ó£¬±¾µØÃ½Ì屨·³Æ¹¥»÷ÕßÇÔÈ¡ÁËÔ¼3ÍòÌõÊý¾Ý¼Í¼£¬Ö»¹Ü´óº«º½¿ÕδÃ÷È·¾ßÌåÊýÁ¿£¬µ«ÒÑÏòÓйز¿ÃŻ㱨²¢Æô¶¯µ÷²é¡£Ä¿Ç°ÉÐδ·¢ÏÖ±»µÁÊý¾Ý±»ÓÃÓÚڲƵÄÖ¤¾Ý£¬µ«¹«Ë¾ÌáÐÑÔ±¹¤¾¯Ìè¼ÙÒ⹫˾»ò½ðÈÚ»ú¹¹µÄÚ¿ÆÓʼþ¼°¶ÌÐÅ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ClopÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾°ä²¼±»µÁÊý¾Ý£¬ÔÊÐíͨ¹ýTorrentÏÂÔØ¡£
https://www.bleepingcomputer.com/news/security/korean-air-data-breach-exposes-data-of-thousands-of-employees/
2. EmEditorÔ⹩¸øÁ´¹¥»÷£º¶ñÒâÈí¼þÇÔÈ¡Êý¾Ý²¢²¿ÊðÀ©´ó
12ÔÂ29ÈÕ£¬½üÈÕ£¬¹ãÊÜÓ½ÓµÄÎı¾ºÍ´úÂë±à×ëÈí¼þEmEditorÔâ·ê¹©¸øÁ´¹¥»÷£¬µ¼ÖÂÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ´«²¼¡£EmEditorÓÉÀ×µÂÃɵÂEmurasoft¹«Ë¾¿ª·¢£¬ÊÇÒ»¿î¸ß»úÄÜWindows¹¤¾ß£¬×¨Îª±àÂë¡¢Îı¾±à×ë¼°´¦ÖôóÐÍÎļþÉè¼Æ¡£12ÔÂ19ÈÕ18:39ÖÁ22ÈÕ12:50ÆÚ¼ä£¬Í¨¹ýEmEditorÖ÷Ò³¡°µ±¼´ÏÂÔØ¡±°´Å¥ÏÂÔØ×°Ö÷¨Ê½µÄÓû§¿ÉÄÜÔâ·ê¶ñÒâ°æ±¾¡£¸Ã°´Å¥µÄURL±»´Û¸Ä£¬Ö¸ÏòÍøÕ¾·ÖÆçµØÎ»ÍйܵĶñÒâ.msiÎļþ¡£¼Ù×°Ö÷¨Ê½ÓëÕæÆ·Ãû³Æ¡¢Ìå»ýÀàËÆ£¬µ«ÊðÃûÖ¤ÊéÊôÓÚÆäËû¹«Ë¾¡£ÔËÐк󣬶ñÒⷨʽִÐÐPowerShellºÅÁ´ÓαÔìÓòÏÂÔØ²¢Ö´ÐÐÎļþ¡£¸Ã¶ñÒâÈí¼þÍøÂçϵͳÐÅÏ¢¡¢×ÀÃæ/Îĵµ/ÏÂÔØÎļþ¼ÐÎļþ¡¢VPNÅäÖá¢ä¯ÀÀÆ÷Êý¾Ý¼°Zoho Mail¡¢Discord¡¢SlackµÅצÓÃÍ´´¦¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Èôϵͳ˵»°ÎªÇ°ËÕÁª¹ú¶È»òÒÁÀÊ£¬¶ñÒâÈí¼þ»áÖÕÖ¹ÔËÐС£¸üÑϳÁµÄÊÇ£¬¹¥»÷Õß²¿ÊðÁËÃûΪ¡°Google Drive Caching¡±µÄä¯ÀÀÆ÷À©´ó£¬¸ÃÀ©´ó¾ß±¸ÆëÈ«ÐÅÏ¢ÇÔȡְÄÜ£¬¿ÉÓÆ¾Ã»¯ÍøÂçä¯ÀÀÆ÷º¹Çà¡¢ÊéÇ©¡¢cookie£¬Ö´ÐмôÌù°å½Ù³Ö£¨´úÌæ¼ÓÃÜÇ®±ÒµØÖ·£©¡¢¼üÅ̼ͼ¼°ÇÔÈ¡Facebook¸æ°×ÕË»§¡£
https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/
3. FortiGate·À»ðǽ2FAÈÆ¹ý·ì϶³ÖÐøÔâÀûÓÃ
12ÔÂ29ÈÕ£¬ÍøÂ簲ȫ³§ÉÌFortinet½üÈÕÏò¿Í»§·¢³öÖҸ棬ÍþвÐÐΪÕßÈÔÔÚ»ý¼«ÀûÓñàºÅΪCVE-2020-12812µÄÑϳÁ·ì϶¹¥»÷佨¸´µÄFortiGate·À»ðǽÉ豸¡£¸Ã·ì϶×îÔçÓÚ2020Äê7Ô±»Åû¶²¢½¨¸´£¬¹¥»÷Õß¿Éͨ¹ýÅú¸ÄÓû§Ãû´óÓ×Ð´ÈÆ¹ýË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©»úÔ죬ÔÚÅäÖÃÁËLDAPÔ¶³ÌÉí·ÝÑéÖ¤ÇÒÆôÓÃ"Óû§±¾µØ"2FAµÄFortiGate SSL VPNÉ豸ÉÏʵÏÖδÊÚȨ½Ó¼û¡£·ì϶³ÉÒòÔÚÓÚ±¾µØÉí·ÝÑéÖ¤ÓëÔ¶³ÌLDAPÉí·ÝÑéÖ¤Ö®¼äµÄ´óÓ×дƥÅäÂß¼²»Ò»Ö¡£FortinetÆäʱͨ¹ý°ä²¼FortiOS 6.4.1/6.2.4/6.0.10°æ±¾½¨¸´¸ÃÎÊÌ⣬²¢½¨ÒéÎÞ·¨µ±¼´Éý¼¶µÄ¿Í»§¹Ø¹ØÓû§Ãû·Ö±æ´óÓ×дְÄÜ¡£È»¶ø£¬×îмà²âÏÔʾ£¬¹¥»÷ÕßÈÔÔÚÕë¶ÔÅäÖÃÁËLDAP¹ØÁª±¾µØÓû§ÇÒÆôÓÃ2FAµÄÌØ¶¨ÏµÍ³Ö´Ðй¥»÷¡£Èô¸¨ÖúLDAP×éÅäÖò»µ±£¬¹¥»÷³É¹¦Âʽ«½øÒ»²½ÌáÉý£¬¸Ã×é±¾Ó¦ÔÚÖ÷LDAPÈÏ֤ʧ°ÜʱÆôÓ㬵«Èô·Ç±ØÒªÓ¦Ö±½Óɾ³ý¡£
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-5-year-old-fortios-2fa-bypass-still-exploited-in-attacks/
4. LangChain CoreÏÖ"LangGrinch"¸ßΣ·ì϶
12ÔÂ27ÈÕ£¬°²È«×êÑÐÔ±Yarden PoratÓÚ2025Äê12ÔÂ4ÈÕÅû¶ÁËLangChainÉú̬Ö÷ÌâPython°ülangchain-coreÖеÄÑϳÁ·ì϶CVE-2025-68664£¨´úºÅ"LangGrinch"£©£¬CVSSÆÀ·Ö´ï9.3¡£·ì϶¸ùÒòÔÚÓÚº¯Êýδ¶Ôº¬"lc"¼üµÄÓû§×ֵ佸ÐÐתÒå´¦Ö᣹¥»÷Õß¿ÉÀûÓÃmetadata¡¢responseµÈÒµÎñ×Ö¶Î×¢Èë¶ñÒâ¶ÔÏó½á¹¹£¬ÔÚºóÐøload()/loads()·´ÐòÁл¯Ê±£¬ÔÚlangchain_core¡¢langchain_communityµÈÊÜÐżÓÃÃû¿Õ¼äÄÚÊ·ý»¯Serializable×ÓÀà¡£²¿ÃÅÀàÔÚ³õʼ»¯Ê±¿ÉÄÜ´¥·¢¸±×÷Óã¬Èç»·¾³±äÁ¿Ð¹Â¶¡¢Jinja2Ä£°å´úÂëÖ´ÐÓעΣÏÕÀàÊ·ý»¯µÈ£¬ÉõÖÁ¿Éͨ¹ýÌáÐÑ×¢È뽫¶ñÒâ¶ÔÏó°µ²ØÓÚÓû§¿É¿Ø×ֶΣ¬ÊµÏÖÒñ±Î¹¥»÷¡£¸Ã·ì϶ÓÈΪÑϳÁ£ºÆäÒ»£¬Î»ÓÚlangchain-core±¾Ìå¶ø·Ç±íΧ¹¤¾ß£¬Ó°ÏìÃæ¹ã£»Æä¶þ£¬dumps()/dumpd()×÷Ϊ¿ò¼ÜÖ÷ÌâAPI£¬È«ÇòÀÛ¼Æ×°ÖÃÁ¿ÊýÒÚ£»ÆäÈý£¬¹¥»÷¿Éͨ¹ýµ¥ÌõLLMÊä³ö¼ä½Ó´¥·¢£¬Õý³£ÒµÎñÁ÷³ÌÖУ¬LLMÌìÉúµÄmetadataÈô±»ÐòÁл¯£¬¼´¿É´¥·¢·ì϶£¬Òñ±ÎÐÔÇ¿ÇÒ¹¥»÷Ãż÷µÍ¡£½¨¸´¹æ»®ÒÑËæ°æ±¾1.2.5¡¢0.3.81°ä²¼¡£
https://securityaffairs.com/186185/hacking/langchain-core-vulnerability-allows-prompt-injection-and-data-exposure.html
5. ¾ÈÊÀ¾üÔâInterlockÀÕË÷ÍŻ﹥»÷
12ÔÂ29ÈÕ£¬¹ú¼Ê´È±¯×éÖ¯¾ÈÊÀ¾ü½üÈÕÔâ·êÑϳÁÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁË93GBÃô¸ÐÐÅÏ¢²¢°ä²¼ÔÚInterlockÀÕË÷Èí¼þÍÅ»ïµÄ°µÍø²©¿ÍÉÏ¡£Õâ´ÎÐ¹Â¶Éæ¼°160Íò±ÊÃÀ¹ú¾ÓÃñ¾è¿îÂòÂô¼Í¼£¬×ܶî´ïÊýǧÍòÃÀÔª£¬Ô̺¬È«Ãû¡¢µç»°¡¢×¡Ö·¡¢¾è¿î½ð¶îµÈÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©£¬Êý¾Ý½á¹¹ÏÔʾ¹¥»÷Õß»ñÈ¡ÁËÏ꾡µÄ¾èÔùÈËÃûµ¥¡£¾ÈÊÀ¾ü×÷ΪȫÇò×î´ó´È±¯»ú¹¹Ö®Ò»£¬³ÉÁ¢ÓÚ1865Ä꣬2024ÄêÊÕÈë½ü50ÒÚÃÀÔª£¬Î»ÁÐÃÀ¹úµÚÁù´ó´È±¯»ú¹¹£¬ÔÚ134¸ö¹ú¶È·¢Õ¹ÔöÔ®ÏîÄ¿£¬²¢µ£ÈνáºÏ¹ú´ÓÊô»ú¹¹¡£Õâ´ÎÊÂÎñ²¢·ÇÊ×Àý£¬½ñÄê5Ô£¬ChaosÀÕË÷Èí¼þ¼¯ÍÅÔø¹¥»÷¾ÈÊÀ¾ü²¢°ä²¼Êý¾Ý£»¶ø±¾´Î¹¥»÷ÕßInterlockÍÅ»ï×Ô2024Ëêĺ³öÏÖ£¬´Óǰ12¸öÔÂÒÑÇÖº¦ÖÁÉÙ66¸ö×éÖ¯£¬Ñ¡È¡Ë«³ÁÀÕË÷Õ½Êõ£¬Í¨¹ýÈëÇÖÍøÕ¾»òÉç»á¹¤³Ìѧ»ñÈ¡³õ²½°²Éíµã£¬6ÔºÍ8Ô¹¥»÷ÓÈΪ»îÔ¾¡£ÍøÂ簲ȫÍŶӷÖÎöÖ¸³ö£¬Ð¹Â¶Êý¾ÝÔ´ÓÚ΢ÈíSQL ServerÊý¾Ý¿â±¸·Ý£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩ½á¹¹»¯Êý¾ÝÖ´ÐÐÉí·Ý͵ÇÔ¡¢ÐéαÕË»§´´½¨»òÚ¿Æ¡£ÓÈÆäÖµµÃ¹Ø×¢µÄÊÇ£¬¹¥»÷Õß¿ÉÄܼÙÒâ¾ÈÊÀ¾ü»òÆäËû´È±¯»ú¹¹½øÐÐÚ¿Æ£¬ÀûÓþèÔùÕßµÄÉÆÐÄÓÕµ¼×ªÕË£¬»òͨ¹ý²ÆÕþ·ÖÎö¾«×¼¶¨Î»¸ß¼ÛÖµÖ¸±ê¡£
https://cybernews.com/security/salvation-army-data-breach-donors/
6. LynxÀÕË÷ÍŻ﹥»÷ÂíÈøÖîÈûÖݹÜÕÊÊÂÎñËù
12ÔÂ29ÈÕ£¬½üÈÕ£¬Óë¶íÂÞ˹¹ØÁªµÄLynxÀÕË÷Èí¼þÍÅ»ïÐû³Æ£¬´ÓÕ¼ÓÐ75Ä꺹ÇàµÄÂíÈøÖîÈûÖݹÜÕÊÊÂÎñËùCSA Tax & AdvisoryÇÔÈ¡ÁË´óÁ¿ÄÉ˰É걨Êý¾Ý¼°Éç»á±£ÏÕºÅÂ룬²¢ÒÔ´ËÀÕË÷Êê½ð¡£CSA×÷ΪרӪ˰Îñ·þÎñµÄ»ú¹¹£¬Æä¿Í»§Êý¾ÝÈôÔâй¶£¬½«Ãæ¶ÔÑϳÁÍøÂç´¹µö¹¥»÷ºÍÉí·Ý͵ÇÔ·çÏÕ¡£LynxÍÅ»ïÓÚ12ÔÂ26ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾°ä²¼²¼¸æ£¬Ðû³ÆÒÑ»ñÈ¡¸Ã¹«Ë¾¼°¿Í»§µÄÃô¸ÐÐÅÏ¢£¬²¢Ç¿µ÷¡°¼¤Àø¶Ô»°½â¾öÎÊÌâ¶ø·Ç»ìÂÒ·ÛË顱¡£ÎªÖ¤Ã÷¹¥»÷ÕæÊµÐÔ£¬¸ÃÍÅ»ï°ä²¼ÁËÔ̺¬È«Ãû¡¢Éç»á°²È«ºÅÂë¡¢ÎïÀíµØÖ·¡¢ÅäżҽÁƱ£ÏÕºÍ̸¡¢·þÎñ·¢Æ±¡¢Ó×ÎÒËùµÃ˰É걨Êý¾Ý¡¢¹ú˰¾Öµç×ÓÉ걨ÊðÃûÊÚȨ±í¸ñ¼°¹«Ë¾ÄÚ²¿ÐꝵĽØÍ¼¡£ÈôÊý¾ÝÊôʵ£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ¾ßÌåÓ×ÎÒÐÅÏ¢Ö´Ðо«×¼Ú¿Æ£¬ÀýÈç¼ÙÒâ˰Îñ»ú¹¹»òÒøÐУ¬ÓÕµ¼Êܺ¦ÕßתÕË»òй¶¸ü¶àÃô¸ÐÐÅÏ¢¡£
https://cybernews.com/security/lynx-ransomware-csa-tax-breach/


¾©¹«Íø°²±¸11010802024551ºÅ