ElasticsearchЧÀÍÆ÷ÉèÖùýʧÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
Ðû²¼Ê±¼ä 2025-07-251. ElasticsearchЧÀÍÆ÷ÉèÖùýʧÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
7ÔÂ23ÈÕ£¬£¬£¬Ò»¸öÎÞÐèÉí·ÝÑéÖ¤µÄ¹ûÕæÊý¾Ý¿â̻¶ÁËÈðµä¹«Ãñ¼°ÆóÒµÁè¼Ý1ÒÚÌõÃô¸Ð¼Í¼£¬£¬£¬Ê±¼ä¿ç¶ÈÁýÕÖ2019ÖÁ2024Ä꣬£¬£¬Êý¾Ý×ÜÁ¿´ï200GBÒÔÉÏ¡£¡£¡£´Ë´ÎÊÂÎñÓÉCybernewsÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬Ì»Â¶µÄÊý¾Ý°üÀ¨Ð¡ÎÒ˽¼Ò·¨¶¨ÐÕÃû£¨º¬ÀúÊ·ÔøÓÃÃû£©¡¢ÈðµäÉí·ÝÖ¤ºÅ¡¢³öÉúÈÕÆÚ¡¢»éÒö״̬¡¢º£ÄÚÍâµØµã¹ì¼£¡¢ÒÆÃñÐÅÏ¢¡¢Õ®Îñ¼Í¼¡¢ÐÝÒµÀúÊ·¡¢¹¤ÒµËùÓÐȨָ±ê¼°Ò»Á¬ÎåÄêµÄËùµÃ˰Êý¾Ý£¨2019-2023£©£¬£¬£¬ÉõÖÁ°üÀ¨ÆóÒµÉÌÒµ¹ØÏµ¡¢ËðÒæ±íÌá½»¼Í¼µÈÐÐΪÈÕÖ¾£¬£¬£¬ÐγɶÔÈðµäÉç»á³ÉÔ±³¤´ïÎåÄêµÄ²ÆÎñÓëÐÐΪȫ¾°»Ïñ¡£¡£¡£¸ÃÊý¾Ý¿âµÄÒ쳣̻¶ԴÓÚElasticsearch¼¯ÈºµÄȨÏÞ¿ØÖÆÊ§Ð§¡£¡£¡£Ö»¹ÜÊý¾Ý½á¹¹Óë×Ö¶ÎÃüÃûÏÔʾÆäÀ´×Ô±±Å·ÉÌÒµÖÇÄÜÆÊÎö¹«Ë¾Risika£¨ÄÚ²¿±êÇ©º¬"dwh*"Êý¾Ý¿ÍÕ»±êʶ£©£¬£¬£¬µ«½øÒ»³ÌÐò²é֤ʵ¸ÃЧÀÍÆ÷²¢·ÇÓÉRisikaÖ±½ÓÔËÓª£¬£¬£¬¶øÊÇÆäÊÚȨµÄµÚÈý·½¿Í»§¶Ë¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬£¬Êý¾Ý¿ÉÄÜͨ¹ýÕýµ±ÉÌÒµÔÊÐíÌṩӦÏÂÓÎÏàÖúͬ°é£¬£¬£¬È´ÒòÔËάÊèºöµ¼ÖÂЧÀÍÆ÷Ïò¹«¹²»¥ÁªÍøÍêÈ«¿ª·Å»á¼û¡£¡£¡£
https://cybernews.com/security/risika-swedish-data-exposed/
2. ·¨¹úˮʦ¼¯ÍÅÔâºÚ¿ÍÀÕË÷£¬£¬£¬¾üÊÂÉñÃØÐ¹Â¶Íþв¹ú¼ÒÇå¾²
7ÔÂ23ÈÕ£¬£¬£¬·¨¹ú¹ú·À¹¤Òµ¾Þͷˮʦ¼¯ÍÅ£¨Naval Group£©¿ËÈÕÏÝÈëÖØ´óÍøÂçÇ徲Σ»£»£»ú¡£¡£¡£¾ÝCybernews±¨µÀ£¬£¬£¬Ò»¸öÉí·Ý²»Ã÷µÄÍþвÐÐΪÕßÔÚÊý¾Ýй¶ÂÛ̳ÉÏÐû³ÆÈëÇÖÁ˸ù«Ë¾£¬£¬£¬²¢ÍþÐ²Ð¹Â¶Éæ¼°¾ü½¢×÷Õ½ÖÎÀíϵͳ£¨CMS£©µÄÃô¸ÐÊý¾Ý£¬£¬£¬¶ø·ÇË÷ÒªÊê½ð¡£¡£¡£´Ë´ÎÊÂÎñÒòÉæ¼°·¨¹ú½¹µã¹ú·ÀÊÖÒÕ£¬£¬£¬Òý·¢¶Ô¹ú¼ÒÇå¾²µÄÉî¶Èµ£ÐÄ¡£¡£¡£¹¥»÷ÕßÉù³Æ»ñÈ¡µÄÊý¾Ý°üÀ¨£ºCMSÔ´´úÂë¡¢ÊÖÒÕÎĵµ¡¢¿ª·¢Ö°Ô±ÐéÄâʱ»ú¼ûȨÏÞ¼°±£ÃÜͨѶ¼Í¼¡£¡£¡£ÎªÖ¤ÊµÕæÊµÐÔ£¬£¬£¬Æä¸½ÉÏÁË13GBÊý¾ÝÑù±¾£¬£¬£¬ÄÚº¬ÌõÔ¼Îļþ¡¢ÒÉËÆCMSÄÚ²¿ÐÅÏ¢¼°2003ÄêDZͧ¼à¿ØÏµÍ³ÊÓÆµ¡£¡£¡£CybernewsÑо¿ÍŶӯðÔ´ÑéÖ¤²¿·ÖÊý¾ÝºóÒÔΪ£¬£¬£¬Ð¹Â¶ÄÚÈݾßÓнϸ߿ÉÐŶȡ£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¹¥»÷Õßδ½ÓÄÉͨÀýµÄÊý¾ÝÊÛÂôģʽ£¬£¬£¬¶øÊÇÊÔͼͨ¹ýÍþв¹ûÕæÐÅÏ¢Ïòˮʦ¼¯ÍÅʩѹ£¬£¬£¬ÕâÒ»±ä̬ÐÐΪÌåÏÖÆäÄîÍ·¿ÉÄÜÓâÔ½¾¼ÃÀûÒæ¡£¡£¡£´Ë´ÎÊÂÎñ¶Ô·¨¹ú¹ú·ÀÇå¾²×é³ÉË«ÖØÎ£º¦£ºÊÖÒÕ²ãÃæ£¬£¬£¬Ç±Í§Ó뻤ÎÀ½¢CMSÔ´´úÂëµÄй¶¿ÉÄÜÏ÷Èõ·¨¾üÕ½ÊõÓÅÊÆ£»£»£»Õ½ÂÔ²ãÃæ£¬£¬£¬Ãô¸ÐÎĵµµÄÀ©É¢»ò±»³ðÊÓÊÆÁ¦ÓÃÓÚÄæÏò¹¤³Ì»òÍøÂç¹¥»÷¡£¡£¡£
https://cybernews.com/security/naval-group-france-defense-data-breach/
3. WordPressÍøÕ¾ÏÖÒþÃØºóÃÅ£ºÊ¹ÓÃmu-pluginsĿ¼ʵÏÖ³¤ÆÚ¿ØÖÆ
7ÔÂ24ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÔÚWordPressÍøÕ¾µÄ¡°mu-plugins¡±£¨±ØÐèʹÓòå¼þ£©Ä¿Â¼Öз¢Ã÷Ò»¸ö¸ß¶ÈÒþ²ØµÄºóÃųÌÐò£¬£¬£¬¸ÃºóÃſɸ¶Óë¹¥»÷Õß³¤ÆÚ»¯»á¼ûȨÏÞ²¢Ô¶³ÌÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£mu-plugins×÷ΪWordPressĬÈÏÆôÓõÄÌØÊâ²å¼þ£¬£¬£¬ÆäÎļþλÓÚ¡°wp-content/mu-plugins¡±Ä¿Â¼£¬£¬£¬ÇÒ²»»áÏÔʾÔÚºǫ́²å¼þÖÎÀíÒ³Ãæ£¬£¬£¬³ý·ÇÊÖ¶¯É¾³ýÎļþ²»È»ÎÞ·¨½ûÓ㬣¬£¬ÕâÒ»ÌØÕ÷ʹÆä³ÉΪ¹¥»÷ÕßÒþ²Ø¶ñÒâ´úÂëµÄÀíÏëÄ¿µÄ¡£¡£¡£´Ë´Î·¢Ã÷µÄ¶ñÒâ³ÌÐòͨ¹ý¡°wp-index.php¡±¾ç±¾×÷Ϊ³õʼ¼ÓÔØÆ÷£¬£¬£¬´ÓʹÓÃROT13Ëã·¨»ìÏýµÄURLÖмìË÷Ô¶³ÌÓÐÓøºÔØ£¬£¬£¬²¢½«Æä´æ´¢ÔÚWordPressÊý¾Ý¿âµÄ¡°_hdra_core¡±×ֶΣ¨wp_options±í£©ÖС£¡£¡£¶ñÒâ´úÂëÖ´Ðк󣬣¬£¬»áÏòÖ÷ÎÊÌâ¼עÈëÃûΪ¡°pricing-table-3.php¡±µÄÒþ²ØÎļþÖÎÀíÆ÷£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔ¶³Ìä¯ÀÀ¡¢ÉÏ´«»òɾ³ýÎļþ£»£»£»Í¬Ê±½¨Éè¡°officialwp¡±ÖÎÀíÔ±ÕË»§²¢¼¤»î¶ñÒâ²å¼þ¡°wp-bot-protect.php¡±£¬£¬£¬ÐγÉË«ÖØ¿ØÖÆÁ´¡£¡£¡£¸üΣÏÕµÄÊÇ£¬£¬£¬¸ÃºóÞ߱¸ÃÜÂëÖØÖù¦Ð§£¬£¬£¬¿É½«³£ÓÃÖÎÀíÔ±ÕË»§¼°×ÔÉí½¨ÉèµÄ¡°officialwp¡±Óû§ÃÜÂëÐÞ¸ÄΪ¹¥»÷ÕßÔ¤ÉèµÄĬÈÏÖµ£¬£¬£¬³¹µ×Ëø¶¨ÆäËûÖÎÀíԱȨÏÞ¡£¡£¡£
https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
4. ºÚ¿Í½«ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þDZÈëÕùÏÈÌåÑé°æSteamÓÎÏ·
7ÔÂ24ÈÕ£¬£¬£¬×ÅÃûÍþв×éÖ¯EncryptHub£¨ÓÖÃûLarva-208£©Í¨¹ýÈëÇÖSteamƽ̨ÓÎÏ·¡¶Chemia¡·£¬£¬£¬ÏòÈ«ÇòÍæ¼Ò·Ö·¢ÐÅÏ¢ÇÔÈ¡Àà¶ñÒâÈí¼þ¡£¡£¡£¾ÝÍþвÇ鱨¹«Ë¾ProdaftÅû¶£¬£¬£¬¹¥»÷ʼÓÚ7ÔÂ22ÈÕ¡£¡£¡£ºÚ¿Í×éÖ¯½«¶ñÒâ¶þ½øÖÆÎļþÖ²ÈëÓÉAether Forge Studios¿ª·¢µÄÉúÑÄÖÆ×÷ÀàÓÎÏ·¡¶Chemia¡·ÖС£¡£¡£¸ÃÓÎÏ·ÏÖÔÚÒÔ"ÕùÏÈÌåÑé"ÐÎʽÉϰ¶Steam£¬£¬£¬ÉÐδÐû²¼Õýʽ¿¯ÐÐÈÕÆÚ¡£¡£¡£¹¥»÷Õßͨ¹ýÔÚÓÎÏ·ÎļþÖÐÌí¼ÓÃûΪCVKRUTNP.exeµÄHijackLoader¶ñÒâÈí¼þ£¬£¬£¬ÔÚÊܺ¦×°±¸½¨É賤ÆÚ»¯»úÖÆºó£¬£¬£¬½øÒ»²½ÏÂÔØ¾ßÓÐÐÅÏ¢ÇÔÈ¡¹¦Ð§µÄVidar³ÌÐò£¨v9d9d.exe£©¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýijTelegramƵµÀ»ñÈ¡ÏÂÁîÓë¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷µØµã£¬£¬£¬ÐγÉÒþ²ØµÄͨѶÁ´Â·¡£¡£¡£´Ë´Î¹¥»÷·ºÆð¶àÖØÊÖÒÕÌØÕ÷£ºÈýСʱºó£¬£¬£¬¹¥»÷Õßͨ¹ýDLLÎļþcclib.dllÖ²ÈëµÚ¶þ¿î¶ñÒâÈí¼þFickle Stealer¡£¡£¡£¸ÃÎļþʹÓÃPowerShell¾ç±¾worker.ps1´ÓÓòÃûsoft-gets[.]com»ñÈ¡Ö÷ÔØºÉ£¬£¬£¬×¨ÃÅÕë¶Ôä¯ÀÀÆ÷´æ´¢Êý¾ÝʵÑéÇÔÈ¡£¬£¬£¬°üÀ¨ÕË»§Æ¾Ö¤¡¢×Ô¶¯Ìî³äÐÅÏ¢¡¢Cookie¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/
5. ÐÂÐÍAIÇý¶¯Linux¶ñÒâÈí¼þKoskeͨ¹ýÐÜèͼƬʵÑéÎÞÎļþ¹¥»÷
7ÔÂ24ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾AquaSec½üÆÚÅû¶һ¿îÃûΪKoskeµÄÐÂÐÍLinux¶ñÒâÈí¼þ£¬£¬£¬ÆäÁ¢Òì¹¥»÷ÊÖ·¨ÓëÒÉËÆÈ˹¤ÖÇÄÜ£¨AI£©Çý¶¯ÌØÕ÷Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¸ÃÍþвͨ¹ý¿´ËÆÎÞº¦µÄÐÜèÖ÷ÌâJPEGͼƬ°²ÅŶñÒâ´úÂ룬£¬£¬Ö±½ÓÔÚϵͳÄÚ´æÖÐÖ´ÐвÙ×÷£¬£¬£¬Õ¹ÏÖ³öÖØ´óµÄÊÖÒռܹ¹Óë¸ß¶È×Ô¶¯»¯ÄÜÁ¦¡£¡£¡£Koske±»AquaSecÑо¿Ö°Ô±½ç˵Ϊ"ÖØ´óµÄLinuxÍþв"£¬£¬£¬Æä½¹µãÌØÕ÷ÔÚÓÚʹÓöà̬ÎļþÊÖÒÕʵÏÖÒþ²Ø¹¥»÷¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ý̻¶ÔÚ¹«ÍøµÄJupyterLabʵÀýÉèÖùýʧ»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬Ëæºó´ÓOVH imagesµÈÕýµ±Í¼´²ÏÂÔØÁ½ÕÅÐÜèJPEGͼƬ¡£¡£¡£ÕâЩͼƬËäÏÔʾΪÕý³£Í¼Ïñ£¬£¬£¬È´Í¨¹ýÌØÊâÎļþ½á¹¹Éè¼ÆÍ¬Ê±°üÀ¨ÓÐÓÃJPEGÎļþÍ·Óë¶ñÒâShell¾ç±¾¡¢C´úÂ룺Îļþǰ²¿ÎªÕý³£Í¼Æ¬Êý¾Ý£¬£¬£¬ºó²¿¸½¼Ó¿ÉÖ´ÐдúÂ룬£¬£¬Ê¹Í³Ò»Îļþ¼ÈÄܱ»Í¼ÏñÉó²éÆ÷ÆÊÎöΪͼƬ£¬£¬£¬ÓÖÄܱ»¾ç±¾Ú¹ÊÍÆ÷ʶ±ðΪ¿ÉÖ´ÐгÌÐò¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬Á½ÕÅÐÜèͼƬ»®·ÖÊͷŲî±ðÔØºÉ²¢Í¬²½Æô¶¯£ºÔغÉһʵÏÖϵͳ¼¶Òþ²Ø£»£»£»Ôغɶþ½¨É賤ÆÚ»¯»úÖÆ¡£¡£¡£¶ñÒâÈí¼þ»áÆÀ¹ÀÖ÷»úCPUÓëGPUÐÔÄÜ£¬£¬£¬´ÓGitHubÏÂÔØÕë¶ÔÓ²¼þÓÅ»¯µÄ¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¬£¬£¬Ö§³Ö°üÀ¨Monero¡¢RavencoinÔÚÄÚµÄ18ÖÖ¼ÓÃÜÇ®±Ò¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-koske-linux-malware-hides-in-cute-panda-images/
6. ¶íÂÞ˹ºÚ¿ÍDZÔÚÊýÖÜ£¬£¬£¬ÈëÇÖºÉÀ¼Ë¾·¨ÏµÍ³
7ÔÂ24ÈÕ£¬£¬£¬ºÉÀ¼Ë¾·¨ÏµÍ³½üÆÚÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬¶íÂÞ˹Åä¾°ºÚ¿Í±»ÁÐΪÖ÷ÒªÏÓÒɹ¤¾ß¡£¡£¡£ºÉÀ¼¹«¹²Éó²éÊð£¨OM£©ÏµÍ³ÔâÈëÇÖÊÂÎñ±£´æÇ¿ÁÒ¶íÂÞ˹¹ØÁª¼£Ï󣬣¬£¬¹¥»÷ÕßÒÑÔÚ˾·¨²¿ÍøÂçÖÐDZÔÚÊýÖÜδ±»·¢Ã÷¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´Î̻¶¹ú¼ÒÒªº¦»ù´¡ÉèÊ©ÃæÁÙµÄϵͳÐÔÇ徲Σº¦¡£¡£¡£Î£º¦Ô¤¾¯Ê¼ÓÚ6ÔÂ17ÈÕ£¬£¬£¬Éó²éÊðÔ¶³Ì°ì¹«Õý̨ʹÓõĵÚÈý·½Èí¼þCitrix NetScaler±»ÆØ±£´æÑÏÖØÎó²î¡£¡£¡£¸ÃÎó²îÔÚͨÓÃÎó²îÆÀ·Öϵͳ£¨CVSS£©ÖлñµÃ9.3·Ö¸ßΣÆÀ¼¶£¬£¬£¬Ö»¹ÜÉó²éÊðÉù³ÆÒѰ´³§É̽¨ÒéÍê³Éϵͳ¸üУ¬£¬£¬µ«ÓÐÖ¤¾ÝÅú×¢Îó²îÔÚÐÞ²¹Ç°Òѱ»Ê¹Óᣡ£¡£Îª×è¶Ï¹¥»÷ÉìÕÅ£¬£¬£¬Éó²éÊð±»ÆÈ×Ô¶¯ÇжÏÄÚ²¿ÅÌËã»ú»¥ÁªÍøÅþÁ¬£¬£¬£¬µ«´Ëʱ¹¥»÷Õß¿ÉÄÜÒѽӴ¥°üÀ¨Ôڰ쾯·½ÊӲ쵵²á¡¢Î´Éó½áÐÌʰ¸¼þ¾í×Ú¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵĸ߶ÈÃô¸ÐÊý¾Ý£¬£¬£¬Ïêϸй¶¹æÄ£ÉдýÈ·ÈÏ¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬¹¥»÷ÕßʹÓõÚÈý·½Èí¼þÎó²î½¨Éè³õʼ»á¼ûͨµÀºó£¬£¬£¬Í¨¹ýºã¾ÃDZÔÚʵÑéÊý¾ÝÇÔÈ¡¡£¡£¡£ÕâÖÖ"µÍÂýС"¹¥»÷ģʽÓë¶íÂÞ˹¹ú¼ÒÖ§³ÖºÚ¿ÍÕûÌåµÄÕ½ÊõÌØÕ÷¸ß¶ÈÎǺϣ¬£¬£¬ÆäÑ¡ÔñÔÚϵͳÐÞ²¹Ç°ÊµÑé¹¥»÷£¬£¬£¬Åú×¢¶ÔÄ¿µÄÍøÂçά»¤ÖÜÆÚµÄ¾«×¼ÕÆÎÕ¡£¡£¡£
https://cybernews.com/security/russian-hack-dutch-justice-system-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ