ElasticsearchЧÀÍÆ÷ÉèÖùýʧÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
Ðû²¼Ê±¼ä 2025-07-251. ElasticsearchЧÀÍÆ÷ÉèÖùýʧÖÂÈðµäÊýÒÚÌõÃô¸ÐÊý¾Ýй¶
7ÔÂ23ÈÕ£¬£¬£¬£¬Ò»¸öÎÞÐèÉí·ÝÑéÖ¤µÄ¹ûÕæÊý¾Ý¿â̻¶ÁËÈðµä¹«Ãñ¼°ÆóÒµÁè¼Ý1ÒÚÌõÃô¸Ð¼Í¼£¬£¬£¬£¬Ê±¼ä¿ç¶ÈÁýÕÖ2019ÖÁ2024Ä꣬£¬£¬£¬Êý¾Ý×ÜÁ¿´ï200GBÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÉCybernewsÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬Ì»Â¶µÄÊý¾Ý°üÀ¨Ð¡ÎÒ˽¼Ò·¨¶¨ÐÕÃû£¨º¬ÀúÊ·ÔøÓÃÃû£©¡¢ÈðµäÉí·ÝÖ¤ºÅ¡¢³öÉúÈÕÆÚ¡¢»éÒö״̬¡¢º£ÄÚÍâµØµã¹ì¼£¡¢ÒÆÃñÐÅÏ¢¡¢Õ®Îñ¼Í¼¡¢ÐÝÒµÀúÊ·¡¢¹¤ÒµËùÓÐȨָ±ê¼°Ò»Á¬ÎåÄêµÄËùµÃ˰Êý¾Ý£¨2019-2023£©£¬£¬£¬£¬ÉõÖÁ°üÀ¨ÆóÒµÉÌÒµ¹ØÏµ¡¢ËðÒæ±íÌá½»¼Í¼µÈÐÐΪÈÕÖ¾£¬£¬£¬£¬ÐγɶÔÈðµäÉç»á³ÉÔ±³¤´ïÎåÄêµÄ²ÆÎñÓëÐÐΪȫ¾°»Ïñ¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âµÄÒ쳣̻¶ԴÓÚElasticsearch¼¯ÈºµÄȨÏÞ¿ØÖÆÊ§Ð§¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÊý¾Ý½á¹¹Óë×Ö¶ÎÃüÃûÏÔʾÆäÀ´×Ô±±Å·ÉÌÒµÖÇÄÜÆÊÎö¹«Ë¾Risika£¨ÄÚ²¿±êÇ©º¬"dwh*"Êý¾Ý¿ÍÕ»±êʶ£©£¬£¬£¬£¬µ«½øÒ»³ÌÐò²é֤ʵ¸ÃЧÀÍÆ÷²¢·ÇÓÉRisikaÖ±½ÓÔËÓª£¬£¬£¬£¬¶øÊÇÆäÊÚȨµÄµÚÈý·½¿Í»§¶Ë¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬£¬£¬Êý¾Ý¿ÉÄÜͨ¹ýÕýµ±ÉÌÒµÔÊÐíÌṩӦÏÂÓÎÏàÖúͬ°é£¬£¬£¬£¬È´ÒòÔËάÊèºöµ¼ÖÂЧÀÍÆ÷Ïò¹«¹²»¥ÁªÍøÍêÈ«¿ª·Å»á¼û¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/risika-swedish-data-exposed/
2. ·¨¹úˮʦ¼¯ÍÅÔâºÚ¿ÍÀÕË÷£¬£¬£¬£¬¾üÊÂÉñÃØÐ¹Â¶Íþв¹ú¼ÒÇå¾²
7ÔÂ23ÈÕ£¬£¬£¬£¬·¨¹ú¹ú·À¹¤Òµ¾Þͷˮʦ¼¯ÍÅ£¨Naval Group£©¿ËÈÕÏÝÈëÖØ´óÍøÂçÇ徲Σ»£»£»ú¡£¡£¡£¡£¡£¡£¡£¾ÝCybernews±¨µÀ£¬£¬£¬£¬Ò»¸öÉí·Ý²»Ã÷µÄÍþвÐÐΪÕßÔÚÊý¾Ýй¶ÂÛ̳ÉÏÐû³ÆÈëÇÖÁ˸ù«Ë¾£¬£¬£¬£¬²¢ÍþÐ²Ð¹Â¶Éæ¼°¾ü½¢×÷Õ½ÖÎÀíϵͳ£¨CMS£©µÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬¶ø·ÇË÷ÒªÊê½ð¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒòÉæ¼°·¨¹ú½¹µã¹ú·ÀÊÖÒÕ£¬£¬£¬£¬Òý·¢¶Ô¹ú¼ÒÇå¾²µÄÉî¶Èµ£ÐÄ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³Æ»ñÈ¡µÄÊý¾Ý°üÀ¨£ºCMSÔ´´úÂë¡¢ÊÖÒÕÎĵµ¡¢¿ª·¢Ö°Ô±ÐéÄâʱ»ú¼ûȨÏÞ¼°±£ÃÜͨѶ¼Í¼¡£¡£¡£¡£¡£¡£¡£ÎªÖ¤ÊµÕæÊµÐÔ£¬£¬£¬£¬Æä¸½ÉÏÁË13GBÊý¾ÝÑù±¾£¬£¬£¬£¬ÄÚº¬ÌõÔ¼Îļþ¡¢ÒÉËÆCMSÄÚ²¿ÐÅÏ¢¼°2003ÄêDZͧ¼à¿ØÏµÍ³ÊÓÆµ¡£¡£¡£¡£¡£¡£¡£CybernewsÑо¿ÍŶӯðÔ´ÑéÖ¤²¿·ÖÊý¾ÝºóÒÔΪ£¬£¬£¬£¬Ð¹Â¶ÄÚÈݾßÓнϸ߿ÉÐŶȡ£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¹¥»÷Õßδ½ÓÄÉͨÀýµÄÊý¾ÝÊÛÂôģʽ£¬£¬£¬£¬¶øÊÇÊÔͼͨ¹ýÍþв¹ûÕæÐÅÏ¢Ïòˮʦ¼¯ÍÅʩѹ£¬£¬£¬£¬ÕâÒ»±ä̬ÐÐΪÌåÏÖÆäÄîÍ·¿ÉÄÜÓâÔ½¾¼ÃÀûÒæ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¶Ô·¨¹ú¹ú·ÀÇå¾²×é³ÉË«ÖØÎ£º¦£ºÊÖÒÕ²ãÃæ£¬£¬£¬£¬Ç±Í§Ó뻤ÎÀ½¢CMSÔ´´úÂëµÄй¶¿ÉÄÜÏ÷Èõ·¨¾üÕ½ÊõÓÅÊÆ£»£»£»Õ½ÂÔ²ãÃæ£¬£¬£¬£¬Ãô¸ÐÎĵµµÄÀ©É¢»ò±»³ðÊÓÊÆÁ¦ÓÃÓÚÄæÏò¹¤³Ì»òÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/naval-group-france-defense-data-breach/
3. WordPressÍøÕ¾ÏÖÒþÃØºóÃÅ£ºÊ¹ÓÃmu-pluginsĿ¼ʵÏÖ³¤ÆÚ¿ØÖÆ
7ÔÂ24ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÔÚWordPressÍøÕ¾µÄ¡°mu-plugins¡±£¨±ØÐèʹÓòå¼þ£©Ä¿Â¼Öз¢Ã÷Ò»¸ö¸ß¶ÈÒþ²ØµÄºóÃųÌÐò£¬£¬£¬£¬¸ÃºóÃſɸ¶Óë¹¥»÷Õß³¤ÆÚ»¯»á¼ûȨÏÞ²¢Ô¶³ÌÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£¡£¡£¡£¡£mu-plugins×÷ΪWordPressĬÈÏÆôÓõÄÌØÊâ²å¼þ£¬£¬£¬£¬ÆäÎļþλÓÚ¡°wp-content/mu-plugins¡±Ä¿Â¼£¬£¬£¬£¬ÇÒ²»»áÏÔʾÔÚºǫ́²å¼þÖÎÀíÒ³Ãæ£¬£¬£¬£¬³ý·ÇÊÖ¶¯É¾³ýÎļþ²»È»ÎÞ·¨½ûÓ㬣¬£¬£¬ÕâÒ»ÌØÕ÷ʹÆä³ÉΪ¹¥»÷ÕßÒþ²Ø¶ñÒâ´úÂëµÄÀíÏëÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄ¶ñÒâ³ÌÐòͨ¹ý¡°wp-index.php¡±¾ç±¾×÷Ϊ³õʼ¼ÓÔØÆ÷£¬£¬£¬£¬´ÓʹÓÃROT13Ëã·¨»ìÏýµÄURLÖмìË÷Ô¶³ÌÓÐÓøºÔØ£¬£¬£¬£¬²¢½«Æä´æ´¢ÔÚWordPressÊý¾Ý¿âµÄ¡°_hdra_core¡±×ֶΣ¨wp_options±í£©ÖС£¡£¡£¡£¡£¡£¡£¶ñÒâ´úÂëÖ´Ðк󣬣¬£¬£¬»áÏòÖ÷ÎÊÌâ¼עÈëÃûΪ¡°pricing-table-3.php¡±µÄÒþ²ØÎļþÖÎÀíÆ÷£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔ¶³Ìä¯ÀÀ¡¢ÉÏ´«»òɾ³ýÎļþ£»£»£»Í¬Ê±½¨Éè¡°officialwp¡±ÖÎÀíÔ±ÕË»§²¢¼¤»î¶ñÒâ²å¼þ¡°wp-bot-protect.php¡±£¬£¬£¬£¬ÐγÉË«ÖØ¿ØÖÆÁ´¡£¡£¡£¡£¡£¡£¡£¸üΣÏÕµÄÊÇ£¬£¬£¬£¬¸ÃºóÞ߱¸ÃÜÂëÖØÖù¦Ð§£¬£¬£¬£¬¿É½«³£ÓÃÖÎÀíÔ±ÕË»§¼°×ÔÉí½¨ÉèµÄ¡°officialwp¡±Óû§ÃÜÂëÐÞ¸ÄΪ¹¥»÷ÕßÔ¤ÉèµÄĬÈÏÖµ£¬£¬£¬£¬³¹µ×Ëø¶¨ÆäËûÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
4. ºÚ¿Í½«ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þDZÈëÕùÏÈÌåÑé°æSteamÓÎÏ·
7ÔÂ24ÈÕ£¬£¬£¬£¬×ÅÃûÍþв×éÖ¯EncryptHub£¨ÓÖÃûLarva-208£©Í¨¹ýÈëÇÖSteamƽ̨ÓÎÏ·¡¶Chemia¡·£¬£¬£¬£¬ÏòÈ«ÇòÍæ¼Ò·Ö·¢ÐÅÏ¢ÇÔÈ¡Àà¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¾ÝÍþвÇ鱨¹«Ë¾ProdaftÅû¶£¬£¬£¬£¬¹¥»÷ʼÓÚ7ÔÂ22ÈÕ¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯½«¶ñÒâ¶þ½øÖÆÎļþÖ²ÈëÓÉAether Forge Studios¿ª·¢µÄÉúÑÄÖÆ×÷ÀàÓÎÏ·¡¶Chemia¡·ÖС£¡£¡£¡£¡£¡£¡£¸ÃÓÎÏ·ÏÖÔÚÒÔ"ÕùÏÈÌåÑé"ÐÎʽÉϰ¶Steam£¬£¬£¬£¬ÉÐδÐû²¼Õýʽ¿¯ÐÐÈÕÆÚ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÔÚÓÎÏ·ÎļþÖÐÌí¼ÓÃûΪCVKRUTNP.exeµÄHijackLoader¶ñÒâÈí¼þ£¬£¬£¬£¬ÔÚÊܺ¦×°±¸½¨É賤ÆÚ»¯»úÖÆºó£¬£¬£¬£¬½øÒ»²½ÏÂÔØ¾ßÓÐÐÅÏ¢ÇÔÈ¡¹¦Ð§µÄVidar³ÌÐò£¨v9d9d.exe£©¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýijTelegramƵµÀ»ñÈ¡ÏÂÁîÓë¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷µØµã£¬£¬£¬£¬ÐγÉÒþ²ØµÄͨѶÁ´Â·¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷·ºÆð¶àÖØÊÖÒÕÌØÕ÷£ºÈýСʱºó£¬£¬£¬£¬¹¥»÷Õßͨ¹ýDLLÎļþcclib.dllÖ²ÈëµÚ¶þ¿î¶ñÒâÈí¼þFickle Stealer¡£¡£¡£¡£¡£¡£¡£¸ÃÎļþʹÓÃPowerShell¾ç±¾worker.ps1´ÓÓòÃûsoft-gets[.]com»ñÈ¡Ö÷ÔØºÉ£¬£¬£¬£¬×¨ÃÅÕë¶Ôä¯ÀÀÆ÷´æ´¢Êý¾ÝʵÑéÇÔÈ¡£¬£¬£¬£¬°üÀ¨ÕË»§Æ¾Ö¤¡¢×Ô¶¯Ìî³äÐÅÏ¢¡¢Cookie¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/
5. ÐÂÐÍAIÇý¶¯Linux¶ñÒâÈí¼þKoskeͨ¹ýÐÜèͼƬʵÑéÎÞÎļþ¹¥»÷
7ÔÂ24ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾AquaSec½üÆÚÅû¶һ¿îÃûΪKoskeµÄÐÂÐÍLinux¶ñÒâÈí¼þ£¬£¬£¬£¬ÆäÁ¢Òì¹¥»÷ÊÖ·¨ÓëÒÉËÆÈ˹¤ÖÇÄÜ£¨AI£©Çý¶¯ÌØÕ÷Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¸ÃÍþвͨ¹ý¿´ËÆÎÞº¦µÄÐÜèÖ÷ÌâJPEGͼƬ°²ÅŶñÒâ´úÂ룬£¬£¬£¬Ö±½ÓÔÚϵͳÄÚ´æÖÐÖ´ÐвÙ×÷£¬£¬£¬£¬Õ¹ÏÖ³öÖØ´óµÄÊÖÒռܹ¹Óë¸ß¶È×Ô¶¯»¯ÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£Koske±»AquaSecÑо¿Ö°Ô±½ç˵Ϊ"ÖØ´óµÄLinuxÍþв"£¬£¬£¬£¬Æä½¹µãÌØÕ÷ÔÚÓÚʹÓöà̬ÎļþÊÖÒÕʵÏÖÒþ²Ø¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ý̻¶ÔÚ¹«ÍøµÄJupyterLabʵÀýÉèÖùýʧ»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬Ëæºó´ÓOVH imagesµÈÕýµ±Í¼´²ÏÂÔØÁ½ÕÅÐÜèJPEGͼƬ¡£¡£¡£¡£¡£¡£¡£ÕâЩͼƬËäÏÔʾΪÕý³£Í¼Ïñ£¬£¬£¬£¬È´Í¨¹ýÌØÊâÎļþ½á¹¹Éè¼ÆÍ¬Ê±°üÀ¨ÓÐÓÃJPEGÎļþÍ·Óë¶ñÒâShell¾ç±¾¡¢C´úÂ룺Îļþǰ²¿ÎªÕý³£Í¼Æ¬Êý¾Ý£¬£¬£¬£¬ºó²¿¸½¼Ó¿ÉÖ´ÐдúÂ룬£¬£¬£¬Ê¹Í³Ò»Îļþ¼ÈÄܱ»Í¼ÏñÉó²éÆ÷ÆÊÎöΪͼƬ£¬£¬£¬£¬ÓÖÄܱ»¾ç±¾Ú¹ÊÍÆ÷ʶ±ðΪ¿ÉÖ´ÐгÌÐò¡£¡£¡£¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬£¬£¬£¬Á½ÕÅÐÜèͼƬ»®·ÖÊͷŲî±ðÔØºÉ²¢Í¬²½Æô¶¯£ºÔغÉһʵÏÖϵͳ¼¶Òþ²Ø£»£»£»Ôغɶþ½¨É賤ÆÚ»¯»úÖÆ¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þ»áÆÀ¹ÀÖ÷»úCPUÓëGPUÐÔÄÜ£¬£¬£¬£¬´ÓGitHubÏÂÔØÕë¶ÔÓ²¼þÓÅ»¯µÄ¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¬£¬£¬£¬Ö§³Ö°üÀ¨Monero¡¢RavencoinÔÚÄÚµÄ18ÖÖ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-koske-linux-malware-hides-in-cute-panda-images/
6. ¶íÂÞ˹ºÚ¿ÍDZÔÚÊýÖÜ£¬£¬£¬£¬ÈëÇÖºÉÀ¼Ë¾·¨ÏµÍ³
7ÔÂ24ÈÕ£¬£¬£¬£¬ºÉÀ¼Ë¾·¨ÏµÍ³½üÆÚÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬£¬¶íÂÞ˹Åä¾°ºÚ¿Í±»ÁÐΪÖ÷ÒªÏÓÒɹ¤¾ß¡£¡£¡£¡£¡£¡£¡£ºÉÀ¼¹«¹²Éó²éÊð£¨OM£©ÏµÍ³ÔâÈëÇÖÊÂÎñ±£´æÇ¿ÁÒ¶íÂÞ˹¹ØÁª¼£Ï󣬣¬£¬£¬¹¥»÷ÕßÒÑÔÚ˾·¨²¿ÍøÂçÖÐDZÔÚÊýÖÜδ±»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´Î̻¶¹ú¼ÒÒªº¦»ù´¡ÉèÊ©ÃæÁÙµÄϵͳÐÔÇ徲Σº¦¡£¡£¡£¡£¡£¡£¡£Î£º¦Ô¤¾¯Ê¼ÓÚ6ÔÂ17ÈÕ£¬£¬£¬£¬Éó²éÊðÔ¶³Ì°ì¹«Õý̨ʹÓõĵÚÈý·½Èí¼þCitrix NetScaler±»ÆØ±£´æÑÏÖØÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÚͨÓÃÎó²îÆÀ·Öϵͳ£¨CVSS£©ÖлñµÃ9.3·Ö¸ßΣÆÀ¼¶£¬£¬£¬£¬Ö»¹ÜÉó²éÊðÉù³ÆÒѰ´³§É̽¨ÒéÍê³Éϵͳ¸üУ¬£¬£¬£¬µ«ÓÐÖ¤¾ÝÅú×¢Îó²îÔÚÐÞ²¹Ç°Òѱ»Ê¹Óᣡ£¡£¡£¡£¡£¡£Îª×è¶Ï¹¥»÷ÉìÕÅ£¬£¬£¬£¬Éó²éÊð±»ÆÈ×Ô¶¯ÇжÏÄÚ²¿ÅÌËã»ú»¥ÁªÍøÅþÁ¬£¬£¬£¬£¬µ«´Ëʱ¹¥»÷Õß¿ÉÄÜÒѽӴ¥°üÀ¨Ôڰ쾯·½ÊӲ쵵²á¡¢Î´Éó½áÐÌʰ¸¼þ¾í×Ú¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵĸ߶ÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬Ïêϸй¶¹æÄ£ÉдýÈ·ÈÏ¡£¡£¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬¹¥»÷ÕßʹÓõÚÈý·½Èí¼þÎó²î½¨Éè³õʼ»á¼ûͨµÀºó£¬£¬£¬£¬Í¨¹ýºã¾ÃDZÔÚʵÑéÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ"µÍÂýС"¹¥»÷ģʽÓë¶íÂÞ˹¹ú¼ÒÖ§³ÖºÚ¿ÍÕûÌåµÄÕ½ÊõÌØÕ÷¸ß¶ÈÎǺϣ¬£¬£¬£¬ÆäÑ¡ÔñÔÚϵͳÐÞ²¹Ç°ÊµÑé¹¥»÷£¬£¬£¬£¬Åú×¢¶ÔÄ¿µÄÍøÂçά»¤ÖÜÆÚµÄ¾«×¼ÕÆÎÕ¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/russian-hack-dutch-justice-system-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ