XZ-UtilsºóÃųÖÐøÍþвDocker Hub £¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼

°ä²¼¹¦·ò 2025-08-14

1. XZ-UtilsºóÃųÖÐøÍþвDocker Hub £¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼


8ÔÂ12ÈÕ £¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚ³ÖÐø·¢½Í £¬Binarly×êÑÐÍŶӷ¢ÏÖDocker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ´æÔÚ35¸öÊÜϰȾµÄLinux¾µÏñ £¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ý´«µÝÐÔϰȾÍþвÓû§¼°×éÖ¯Êý¾Ý°²È«¡£¸ÃºóÃÅÓɳ־ÃÏîÄ¿¹±Ï×Õß"Jia Tan"°ÂÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖÐ £¬Í¨¹ýglibcµÄIFUNC»úÔì½Ù³ÖOpenSSHµÄRSA_public_decryptº¯Êý £¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootºÅÁî¡£Ö»¹Ü·ì϶·¢ÏÖ½ÏÔçÇÒ¹Ù·½ÒѰ䲼5.6.2¼°ÒÔÉϽ¨¸´°æ±¾ £¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢FedoraµÈÖ÷Á÷Linux¿¯Ðаæ £¬³ÉΪȥÄê×îÑϳÁµÄÈí¼þ¹©¸øÁ´°²È«ÊÂÎñÖ®Ò»¡£Docker Hub×÷ΪȫÇò¿ª·¢Õß¿í·ºÊ¹ÓõÄÈÝÆ÷¾µÏñƽ̨ £¬ÆäÎÊÌâ¾µÏñµÄ³ÖÐø´æÔÚÒý·¢ÓÇÓô¡£BinarlyɨÃè·¢ÏÖ £¬²¿ÃÅÊÜϰȾ¾µÏñÈÔ¹«¿ª°ä²¼ £¬ÇÒ´æÔÚ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ" £¬Ðγɴ«µÝÐÔ·çÏÕ¡£ºÜ¶àCI/CD¹Ü·¼°³ö²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã £¬Èôδʵʱ¸üР£¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼Ì³Ð¶ñÒâ´úÂë¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈÊØ»¤Õß´«µÝÇé¿ö £¬µ«DebianÑ¡Ôñ±£ÁôÕâЩºóÞµÏñ £¬ÀíÓÉÊÇ"ÀûÓÃǰÌá¿Ì±¡"ÇÒÐèά³Ö´æµµÂ½ÐøÐÔ £¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£


https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/


2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷


8ÔÂ12ÈÕ £¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀí·þÎñ¾ÞÍ·Pacific HealthWorks£¨PHW£©½üÈÕÔâ·êEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷ £¬µ¼ÖÂÆä·þÎñµÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆ·þÎñ»ú¹¹£¨MSO£© £¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢Ò½Éú¼¯Ìå¼°ÕïËùÌṩ¼¹Øï¡¢³ÁÖ¢¼à»¤¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö £¬Äê·þÎñ»¼Õß³¬140ÍòÈ˴Ρ£Õâ´ÎÊÂÎñÖÐ £¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢Ò½ÁƼͼ¡¢±£ÏÕÐÅÏ¢µÈÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶ £¬²¿ÃÅÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹«¿ª¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÒõÓôÊܺ¦Õß"ÍøÕ¾°ä²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉêÃ÷ £¬ÍþвÈôδÔÚÖ¸°´¹¦·òÄÚÁªÏµ½»Éæ £¬½«°ä²¼Ô̺¬Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£CybernewsºË²é·¢ÏÖ £¬Ð¹Â¶Îļþº­¸ÇEmergent Medical Associates¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹ £¬Éæ¼°Õï¶Ï´úÂë¡¢±£ÏÕË÷ÅâµÈÖ÷ÌâÒ½ÁÆÊý¾Ý¡£


https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/


3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷ £¬·þÎñÖжÏÒý·ÛË¿·¢¼±


8ÔÂ12ÈÕ £¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯ÀûÓÃÖжÏÊýÓ×ʱ £¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂ簲ȫΣ»ú¡£Õâ´ÎÊÂÎñʼÓÚ±¾µØ¹¦·òÁ賿4µã30·Ö £¬Óû§ÎÞ·¨Ô¤Ô¼Ñݳª»áÃÅÆ±¡¢½Ó¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£Yes24ѸËÙ½«ÏµÍ³ÀëÏßÒÔ¶ôÔì¹¥»÷ £¬²¢ÒÀ¸½±¸·ÝÊý¾ÝÔÚ7Ó×ʱÄÚ¸´Ô­ÔËÓª £¬µ«Î´Ð¹Â©¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇó¡£Öж϶Ժ«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ïì £¬Ô­¶¨ÓÚµ±Íí8µãÆðÍ·µÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ£ £¬·þÎñ¸´Ô­ºó¸Õ¸Õ³ÁÆô¡£Õâ´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ô²»¼°Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌì £¬Ó°ÏìÆÓ±¦½£¡¢ENHYPENµÈÑÝÔ±ÑݳöƱÎñ £¬²¢Â¶³öÆä²»×ãÒìµØ±¸·ÝϵͳµÄ°²È«¶Ì°å¡£Ö»¹Ü¸Ã¹«Ë¾¹ýºó³Ðŵ"³¹²é°²Õû¸öϵ"¡¢ÀñƸ±í²¿ÍŶӲ¢Éý¼¶ÏµÍ³ £¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ £¬Ôð¹ÔìäÕû¸Ä´ëÊ©²»µ½Î»ÇÒÐÅϢͨÃ÷¶È²»¼°¡£


https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected


4. FortinetÖÒ¸æFortiSIEMÔ¤ÊÚȨRCE·ì϶¿ÉÄܱ»ÀûÓÃ


8ÔÂ13ÈÕ £¬ÍøÂ簲ȫ³§ÉÌFortinet½üÈÕ°ä²¼´¹Î£°²È«²¼¸æ £¬Åû¶ÆäÖ÷ÌⰲȫÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM´æÔÚÒ»¸öÑϳÁµÈ¼¶£¨CVSS 9.8£©µÄÔ¶³ÌºÅÁî×¢Èë·ì϶£¨CVE-2025-25256£©¡£¸Ã·ì϶ӰÏì°æ¼¼ÇÉÓò¿í·º £¬º­¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§ £¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹¼¼ÊõÖ§³Ö £¬½¨ÒéÓû§Á¢¼´Éý¼¶ÖÁ7.3.2¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£·ì϶³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ½øÐгä·Ö¹ýÂË £¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý»ú¹Ø¶ñÒâCLIÒªÇó £¬ÔÚÖ¸±êϵͳִÐÐËÁÒâºÅÁî¡£FortinetÈ·Èϸ÷ì϶´æÔڿɹ«¿ª»ñÈ¡µÄÀûÓôúÂë £¬ÇÒ¹¥»÷ÐÐΪ²»»á²úÉú¹ÖÒìIOCÌØµã £¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕÀûÓà £¬µ«GreyNoiseÍþвµý±¨¹«Ë¾Ö¸³ö £¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö £¬´ËÀàÒì³£Á÷Á¿µßô¤ÍùÍùԤʾзì϶Åû¶ £¬Á½Õß¿ÉÄÜ´æÔÚ¹ØÁªÐÔ¡£Õâ´Î·ì϶¶³öºó £¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖµ××ÓÐÔ½¨¸´ £¬Í¬Ê±Ìṩһʱ»º½â¹æ»®¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/


5. ±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾


8ÔÂ13ÈÕ £¬±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤°ì¹«ÊÒ½üÈÕÔâ·êÑϳÁÍøÂç¹¥»÷ £¬µ¼ÖÂÆäÖ÷ÌâÐÅÏ¢ÏµÍ³È«ÃæÌ±»¾ £¬Ô̺¬¹Ù·½ÍøÕ¾¡¢µç×ÓÓʼþÕË»§¼°¹Ì¶¨µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ £¬Õâ´ÎÊÂÎñÒÑ´¥·¢¿ç²¿ÃźÏ×÷ÏìÓ¦ £¬¼¼ÊõÈËÔ±ÔÚ·¨ÂÉ»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦¸´Ô­·þÎñ²¢µ÷²é¹¥»÷Ô´Í·¡£Ö»¹Üµ±Ç°¹¥»÷ý½éÉÐδÃ÷È· £¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹«¿ªÈÏÁìÔðÈÎ £¬µ«ÊÂÎñµÄ¿í·ºÓ°Ï켰ϵͳ̱»¾ÌصãÓëµäÐÍÀÕË÷¹¥»÷¸ß¶ÈÎǺÏ £¬Òý·¢¶ÔDZÔÚ¹©¸øÁ´·çÏÕµÄÓÇÓô¡£ÍøÂ簲ȫר¼Ò¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢ÏÖΪÊÂÎñµ÷²éÌṩÁ˹ؼüÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«¼ÒµÄCitrix NetScalerÉ豸Òò佨²¹CVE-2025-5777·ì϶¶ø³Ö¾Ã¶³öÓÚ¹¥»÷·çÏÕÖС£ShodanɨÃèÊý¾ÝÏÔʾ £¬Á½Ì¨ÓйØÉ豸±ðÀëÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏß £¬¹¦·òÏßÓë¹¥»÷²úÉú¸ß¶È³ÁºÏ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬¸Ã·ì϶Òѱ»ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼¡± £¬²¢ÒªÇóÁª¹ú»ú¹¹ÔÚ24Ó×ʱÄÚʵÏÖ½¨²¹¡£½ØÖÁ±¨Â·°ä²¼ £¬±öϦ·¨ÄáÑÇÖÝ×ܼì²ì³¤ÍøÕ¾ÈÔδ¸´Ô­ £¬ÏµÍ³½¨¸´¹¤×÷ÈÔÔÚ½øÐÐÖС£


https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/


6. AIÉî¶ÈαÔì¼¼Êõ´ßÉú¿ç¹úͶ×ÊȦÌ× £¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ


8ÔÂ13ÈÕ £¬ÍøÂ簲ȫ»ú¹¹Group-IB½üÈÕÅû¶ £¬Ú¿Æ­·Ö×ÓÕýÀûÓÃÌìÉúʽAI¼¼Êõ¹¹½¨¸ß¶ÈÕæÇеÄÚ²Æ­ÍøÂç £¬Í¨¹ýÉî¶ÈαÔìÊÓÆµ¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¸æ°×Ͷ·Å £¬ÓÕÆ­È«Çò¶à¹úͶ×ÊÕ߲μÓÐéαÂòÂôƽ̨¡£×êÑÐÏÔʾ £¬´ËÀàȦÌ×ÒÑÐγɹæÄ£»¯²úÒµÁ´ £¬Æä¼¼Êõ¸´ÔÓ¶Å×ëÉúÀí²Ù¿Ø¼¿Á©¾ù´ïи߶È¡£Ö÷ÌâڲƭÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£Ú¿Æ­Õ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«¼ÒÈËÎïµÄÓ°ÏñÓëÉùÒô £¬Ôì×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Î £¬½áºÏ´Û¸ÄµÄÂòÂôÊý¾Ýͼ±íÓëÐéαר¼Ò±³Êé £¬ÓªÔì³ö"¶À¼ÒͶ×Ê»úÓö"µÄ½ôÆÈ¸Ð¡£Êܺ¦Õß±»Êèµ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾ £¬ÕâÐ©ÍøÕ¾Í¨¹ý±¾µØ»¯ÄÚÈÝÊÊÅäÓû§µØµã¹ú¶È˵»° £¬²¢Ç¶ÈëÉ罻ýÌåÕ˺𢲩¿ÍÎÄÕ¼°YouTubeƵ·½øÐжàÇþÂ·ÍÆ¹ã £¬ÐγÉÐéαÐÅÏ¢Éú̬¡£×¢²á½×¶Î £¬Æ½Ì¨ÒÔ"Ó×¶î±£ÕϽð"£¨100-250ÃÀÔª£©½µµÍÓû§¾¯ÌèÐÔ £¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢×¡Ö·Ö¤Ã÷ÉõÖÁÐÅÓþ¿¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£ÖµµÃ¾¯ÌèµÄÊÇ £¬´ËÀàÍøÕ¾Í¨¹ýIPµØÖ·Óë˵»°¼ì²âʵÏÖ¾«×¼ÆÁ±Î £¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨½Ó¼û £¬¶øÓ¡¶È¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÈÕ±¾µÈ13¸ö¹ú¶È³ÉÎªÖØÒªÖ¸±ê¡£


https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/