ºÚ¿ÍÕýÔÚʹÓÃWing FTP ServerµÄÑÏÖØRCEÎó²î

Ðû²¼Ê±¼ä 2025-07-14

1. ºÚ¿ÍÕýÔÚʹÓÃWing FTP ServerµÄÑÏÖØRCEÎó²î


7ÔÂ13ÈÕ£¬ÍøÂçÇå¾²ÁìÓòÆØ³öÕë¶ÔWing FTP ServerµÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-47812£©£¬¸ÃÎó²îÒòCVSS 10·ÖµÄ×î¸ßΣÆÀ¼¶Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£×÷Ϊ֧³Ö¶àЭÒ飨FTP/FTPS/SFTP/HTTP/S£©µÄ¿çƽ̨Îļþ´«Êä½â¾ö¼Æ»®£¬Wing FTP ServerĬÈÏÒÔroot£¨Linux£©»òSYSTEM£¨Windows£©È¨ÏÞÔËÐУ¬ÇÒȱ·¦È¨ÏÞ¸ôÀë»úÖÆ£¬µ¼ÖÂÎó²î±»Ê¹ÓÃʱ¿ÉÖ±½ÓÔì³É·þÎñÆ÷Íêȫʧ¿Ø¡£Îó²îȪԴÔÚÓÚÈí¼þ¶Ô¿Õ×ֽڵĴ¦Öóͷ£È±ÏÝ¡£MITREÇ徲ͨ¸æÖ¸³ö£¬7.4.4°æ±¾Ç°µÄ²úƷδ¶ÔÓû§ºÍÖÎÀíÔ±Web½çÃæÖеĻỰÎļþ¾ÙÐгä·ÖÑéÖ¤£¬¹¥»÷Õß¿Éͨ¹ý×¢Èëº¬ÌØÊâ×Ö·ûµÄÓû§Ãû£¬½«¶ñÒâLua´úÂëÖ²Èë»á»°Îļþ¡£µ±Êܺ¦Õß»á¼ûÌØ¶¨Ò³Ãæ»òÖ´ÐÐĿ¼²Ù×÷ʱ£¬¶ñÒâ´úÂë±ã»áÒÔϵͳ×î¸ßȨÏÞ´¥·¢£¬ÐγÉÎÞÐèÎïÀí½Ó´¥µÄÔ¶³Ì´úÂëÖ´ÐÐÁ´¡£ÓÈΪΣÏÕµÄÊÇ£¬×ÝÈ»ÆôÓÃĬÈϽûÓõÄÄäÃûFTPÕË»§£¬¹¥»÷ÕßÈÔ¿ÉÈÆ¹ý×Ö·û´®´¦Öóͷ£»úÖÆÊµÑé¹¥»÷£¬ÊµÏÖ´ÓͨË×Óû§È¨ÏÞµ½ÏµÍ³ÖÎÀíԱȨÏÞµÄ×ÝÏòÌáȨ¡£¸ÃÎó²îÊÖÒÕϸ½ÚÓÚ6ÔÂ30ÈÕ¹ûÕæºó£¬7ÔÂ1ÈÕ¼´·ºÆðÕæÊµ¹¥»÷°¸Àý¡£


https://securityaffairs.com/179861/hacking/wing-ftp-server-flaw-actively-exploited-shortly-after-technical-details-were-made-public.html


2. Google Gemini Îó²î¿ÉÐ®ÖÆµç×ÓÓʼþÕªÒª¾ÙÐÐÍøÂç´¹ÂÚ


7ÔÂ13ÈÕ£¬Çå¾²Ñо¿Ö°Ô±Åû¶Google Gemini for Workspace±£´æÐÂÐÍÍøÂç´¹ÂÚÎó²î£¬¹¥»÷Õß¿Éͨ¹ýÒþ²ØÔÚµç×ÓÓʼþÕýÎÄÖеĶñÒâÖ¸ÁÓÕʹAI¹¤¾ßÌìÉú¿´ËÆÕýµ±µÄ´¹ÂÚÄÚÈÝ¡£¸ÃÎó²îʹÓÃGeminiµÄÕªÒªÉúÀÖ³ÉÄÜ£¬Í¨¹ýÊÖÒÕÊÖ¶ÎÈÆ¹ý¹Å°åÇå¾²¼ì²â£¬³ÉΪ¼Ì2024ÄêÌáÐÑ×¢Èë¹¥»÷ºó£¬Õë¶ÔÌìÉúʽAIµÄÓÖÒ»ÖØ´óÇå¾²ÌôÕ½¡£¾ÝMozilla GenAIÎó²îÉͽðÍýÏëÑо¿Ô±Marco FigueroaÅû¶£¬¹¥»÷Õß¿Éͨ¹ýHTML/CSSÊÖÒÕ½«¶ñÒâÖ¸ÁîǶÈëÓʼþÕýÎÄ£¬Í¨¹ýÉèÖÃ×ÖÌå¾ÞϸΪ0¡¢ÑÕɫΪ°×É«£¬Ê¹Ö¸ÁîÔÚGmail¿Í»§¶ËÖÐÍêÈ«²»¿É¼û¡£µ±Óû§ÇëÇóGeminiÌìÉúÓʼþժҪʱ£¬AI»áÆÊÎö²¢Ö´ÐÐÕâЩÒþ²ØÖ¸ÁÌìÉú°üÀ¨ÐéαÇå¾²ÖÒÑÔ¡¢´¹ÂÚÁ´½Ó»òÖ§³Öµç»°ºÅÂëµÄÄÚÈÝ¡£ÀýÈ磬ÔÚFigueroaÌṩµÄ°¸ÀýÖУ¬GeminiÌìÉúÁË"ÄúµÄGmailÃÜÂëÒÑй¶£¬ÇëÁ¬Ã¦²¦´òÖ§³Öµç»°´¦Öóͷ£"µÄÐéα¾¯±¨£¬´ËÀàÐÅÏ¢¼«Ò×±»Óû§ÎóÒÔΪÊÇGoogle¹Ù·½Í¨Öª¡£¸Ã¹¥»÷µÄÒþ²ØÐÔÌåÏÖÔÚÈý¸ö·½Ã棺ÎÞÐ踽¼þ»òÁ´½Ó¼´¿É´¥·¢¡¢Ê¹ÓÃÓû§¶ÔAIÕªÒªµÄÐÅÍС¢Í¨¹ýÊÓ¾õÒþ²Ø¹æ±ÜÓʼþÄÚÈÝɸ²é¡£


https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/


3. Gravity FormsÔ⹩ӦÁ´¹¥»÷£¬¹Ù·½ÇþµÀÏÂÔØÎļþ±»Ö²ÈëºóÃÅ


7ÔÂ11ÈÕ£¬È«ÇòÔ¼°ÙÍò¸öÍøÕ¾Ê¹ÓõÄWordPress¸ß¼¶±íµ¥²å¼þGravity FormsÔâÓöÑÏÖØ¹©Ó¦Á´¹¥»÷£¬Æä¹Ù·½ÍøÕ¾ÌṩµÄÊÖ¶¯×°Öðü±»Ö²Èë¶ñÒâºóÃÅ£¬µ¼Ö²¿·ÖÏÂÔØ°æ±¾±£´æÔ¶³Ì´úÂëÖ´ÐÐΣº¦¡£¾ÝÇå¾²¹«Ë¾PatchStackÅû¶£¬¹¥»÷Õßͨ¹ý¸Ä¶¯²å¼þ½¹µãÎļþcommon.php£¬ÔÚ7ÔÂ10ÈÕÖÁ11ÈÕʱ´úÏò»á¼ûgravityapi.orgÓòÃûµÄ·þÎñÆ÷·¢ËÍÕ¾µãÔªÊý¾Ý£¨°üÀ¨URL¡¢ÖÎÀí·¾¶¡¢Ö÷Ìâ²å¼þ°æ±¾µÈÃô¸ÐÐÅÏ¢£©£¬²¢ÎüÊÕbase64±àÂëµÄ¶ñÒâÔØºÉ£¬×îÖÕÔÚÍøÕ¾Ä¿Â¼ÌìÉúαװ³ÉWordPressϵͳÎļþµÄ"bookmark-canonical.php"£¬ÊµÏÖÎÞÐèÉí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬Éæ¼°Gravity Forms 2.9.11.1ºÍ2.9.12°æ±¾µÄÊÖ¶¯ÏÂÔØ¼°Composer×°Ö÷½·¨¡£¹¥»÷ÕßʹÓøúóÃŲ»µ«ÇÔÈ¡Êý¾Ý£¬¸üÖ±½ÓÔÚÊÜÑ¬È¾ÍøÕ¾Ìí¼ÓÖÎÀíÔ±ÕË»§£¬ÍêÈ«¿ØÖÆÄ¿µÄϵͳ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Í¨¹ýGravity Forms¹Ù·½API·þÎñ¾ÙÐеÄ×Ô¶¯¸üк͸½¼Ó×é¼þ×°ÖÃδÊÜÓ°Ï죬µ«ÊÖ¶¯ÏÂÔØÇþµÀ³ÉΪ¹¥»÷Èë¿Ú¡£¿ª·¢³§ÉÌRocketGeniusÔÚʺ󱨸æÖÐÈ·ÈÏ£¬¶ñÒâ´úÂë»á×è¶ÏÕý³£¸üÐÂÁ÷³Ì²¢Ò»Á¬ÅþÁ¬Íⲿ·þÎñÆ÷£¬½¨ÒéËùÓнüÆÚͨ¹ýÊÖ¶¯·½·¨×°Öûò¸üвå¼þµÄÓû§Á¬Ã¦ÖØÐÂ×°Öùٷ½Çå½à°æ±¾£¬²¢¼ì²éÍøÕ¾ÊÇ·ñ±£´æÒì³£ÖÎÀíÔ±ÕË»§¡£


https://www.bleepingcomputer.com/news/security/wordpress-gravity-forms-developer-hacked-to-push-backdoored-plugins/


4. ÃÀ¹ú°¢À­°ÍÂíÖݼӵǴú¶ûÊÐÔâINC RansomÀÕË÷¹¥»÷


7ÔÂ11ÈÕ£¬ÃÀ¹ú°¢À­°ÍÂíÖݼӵǴú¶ûÊÐÕþ¸®¿ËÈÕÏÝÈëÊý¾ÝÇ徲Π£»ú£¬ÆäÃô¸ÐÐÅÏ¢±»ÆØ·ºÆðÔÚ°µÍøÂÛ̳ÉÏ¡£×ÅÃûÀÕË÷×éÖ¯INC RansomÐû³ÆÒÑÇÔÈ¡¸ÃÊÐÔ¼50GBÊý¾Ý£¬°üÀ¨ÊÐÕþÌõÔ¼¡¢²ÆÎñ¼Í¼¡¢¿Í»§ÐÅÏ¢¡¢ÈËÁ¦×ÊÔ´µµ°¸¼°Ê¹ʱ¨¸æµÈÉñÃØ×ÊÁÏ£¬²¢½«ÆäÁÐÈëйÃÜÍøÕ¾ÒÔʩѹ֧¸¶Êê½ð¡£Ö»¹Ü¹¥»÷ÕßÉÐδÌṩÊý¾ÝÑù±¾»ò½ØÍ¼ÑéÖ¤ÕæÊµÐÔ£¬µ«´Ë´ÎÊÂÎñÒÑÒý·¢¶ÔÊÐÃñÉí·ÝµÁÓÃΣº¦¼°ÊÐÕþϵͳÇå¾²ÐԵĵ£ÐÄ¡£¼ÓµÇ´ú¶ûÊÐ×÷Ϊ²®Ã÷º²±±²¿½¼Çø¡¢Éú³Ý³¬1.6ÍòµÄ³ÇÕò£¬ÈôÊý¾Ýй¶Êôʵ£¬¿ÉÄܳÉÎªÍøÂç·¸·¨·Ö×Ó½øÒ»²½ÉøÍ¸Õþ¸®ÍøÂçµÄÒªº¦Ìø°å¡£INC Ransom×éÖ¯×Ô2023Äê7Ô»îÔ¾ÒÔÀ´£¬ÒÑÐγÉ"¶àÖØÀÕË÷"ģʽ£¬²»µ«¼ÓÃÜÊý¾Ý£¬¸üÒÔ¹ûÕæÐ¹Â¶ÎªÍþв£¬ÆÈʹÊܺ¦Õ߾ͷ¶¡£¾Ý°µÍø¼à¿Ø¹¤¾ßRansomlookerͳ¼Æ£¬¸ÃÍÅ»ïÒÑÍùÒ»ÄêÄÚ¹¥»÷ÖÁÉÙ176¼Ò»ú¹¹£¬Êܺ¦Õ߱鲼ҽÁÆ¡¢½ÌÓý¡¢Õþ¸®¼°ÆóÒµÁìÓò¡£


https://cybernews.com/security/gardendale-alabama-ransomware-attack/


5. ÷è÷ëÀÕË÷Èí¼þÇ¿ÊÆáÈÆð£¬Ê¹ÓÃFortinetÎó²îÖÂ81¼Ò»ú¹¹Êܹ¥»÷


7ÔÂ12ÈÕ£¬¿ËÈÕÀÕË÷Èí¼þÁìÓòÓ­À´ÖØ´ó±ä¾Ö£¬÷è÷루Qilin£©×éÖ¯ÒÀ¸½47.3%µÄ»îÔ¾¶È¼¤Ôö£¬ÒÔ81ÆðÐÂÔö°¸¼þÓâÔ½¹Å°å¾¢Â㬳ÉΪȫÇò×î»îÔ¾µÄÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©ÍŻ¸Ã×éÖ¯×Ô½µÉúÒÔÀ´ÒÑÀۼƹ¥»÷³¬310¸öÄ¿µÄ£¬ÆäÊÖÒÕÑݽøÓëÕ½ÂÔתÐÍÕýÖØËÜÍøÂçÇå¾²ÍþвÃûÌá£÷è÷ëµÄ¿ìËÙÀ©ÕÅÔ´ÓÚ¶ÔÒªº¦»ù´¡ÉèÊ©Îó²îµÄϵͳÐÔʹÓá£2025Äê5-6Լ䣬¸Ã×éÖ¯½«¹¥»÷½¹µãÃé׼δÐÞ²¹µÄFortinetÇå¾²×°±¸£¬ÓÈÆäÕë¶ÔFortiGateºÍFortiProxy×°±¸ÖеÄCVE-2024-21762£¨Éí·ÝÑéÖ¤ÈÆ¹ý£©ÓëCVE-2024-55591£¨Ô¶³Ì´úÂëÖ´ÐУ©Îó²î¡£Ö»¹ÜǰÕßÒÑÓÚ2025Äê2ÔÂÐû²¼²¹¶¡£¬µ«È«ÇòÊýÍǫ̀װ±¸ÈÔ̻¶ÔÚ¹¥»÷ÃæÏ£¬Îª÷è÷ëÌṩÁË×Ô¶¯»¯°²Åŵľø¼ÑÈë¿Ú¡£¹¥»÷Á´ÏÔʾ£¬ÍþвÐÐΪÕßͨ¹ýÌØÖÆÇëÇó´¥·¢Îó²î£¬ÎÞÐèÆ¾Ö¤¼´¿É½¨ÉèÍøÂçפ×ãµã£¬ËæºóÊͷŽÓÄÉRustÓëCÓïÑÔ±àдµÄÄ£¿é»¯¶ñÒâÔØºÉ£¬ÊµÑ鳤ÆÚ»¯¿ØÖÆÓëºáÏòÉøÍ¸¡£ÊÖÒÕÆÊÎöÕ¹ÏÖ£¬÷è÷ëµÄÍþвģ×ÓÒÑÍ»ÆÆ¹Å°åÀÕË÷ÁìÓò£¬¹¹½¨Æðº­¸ÇÀ¬»øÓʼþ¡¢DDoS¹¥»÷¡¢PB¼¶Êý¾Ý´æ´¢¼°ÐÄÀíÕ½¹¤¾ßµÄÍêÕû·¸·¨Éú̬¡£Æä¶À´´µÄ"ºô½Ð״ʦ"¹¦Ð§Í¨¹ýÄ£ÄâÖ´·¨Ì¸Åг¡¾°£¬¶ÔÊܺ¦ÕßÊ©¼ÓÐÄÀíѹÁ¦£¬ÏÔÖøÌáÉýÊê½ðЭÉÌЧÂÊ¡£ÕâÖÖ¶àά¶È¹¥»÷ģʽʹÆäѸËÙÌî²¹LockBit¡¢BlackCatµÈÇýÖð×éÖ¯ÁôϵÄÊг¡¿Õȱ£¬ÎüÒý´ó×ÚÁ¥ÊôÍŶӼÓÃË¡£


https://cybersecuritynews.com/qilin-emerged-as-the-most-active-group/


6. ºÚ¿Í½èÕýµ±Mac¹¤¾ßÖ²ÈëZuRuľÂí£¬ÖصãÕë¶Ô¿ª·¢ÕßȺÌå


7ÔÂ11ÈÕ£¬Çå¾²»ú¹¹SentinelOne¿ËÈÕÐû²¼¾¯±¨£¬Õ¹ÏÖºÚ¿ÍÕýͨ¹ýÎÛȾËÑË÷ÒýÇæÐ§¹ûµÄ·½·¨£¬½«Ö²ÈëZuRuľÂíµÄ¸Ä¶¯°æMac¹¤¾ßÍÆË͸øÓû§£¬×îй¥»÷Ä¿µÄÃé×¼¿çƽ̨SSH¿Í»§¶ËTermius¡£´Ë´Î¹¥»÷ÑÓÐøÁËÕë¶Ô¿ª·¢Õß³£Óù¤¾ßµÄ¶ñÒâÈí¼þÈö²¥Ä£Ê½£¬Í¹ÏÔmacOSÆ½Ì¨ÃæÁٵũӦÁ´Çå¾²ÍþвһÁ¬Éý¼¶¡£±»¸Ä¶¯µÄTermius×°ÖðüÄÚº¬Ð°æmacOS.ZuRuºóÃŲ¡¶¾¡£¸ÃľÂí×°Öúó»áÔÚºǫ́¾²Ä¬ÔËÐУ¬½¨É賤ÆÚ»¯»á¼ûͨµÀ£¬²»µ«Äܹ»Ô¶³ÌÏÂÔØÓк¦×é¼þ£¬»¹¿ÉÖ´Ðй¥»÷ÕßÖ¸Á¹¦Ð§º­¸ÇÎļþ´«Ê䡢ϵͳÕì̽¡¢Àú³Ì²Ù¿Ø¼°Ö¸Áî·´ÏìµÈ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷ÕßÒªÇóÊܺ¦ÏµÍ³ÖÁÉÙΪ2023Äê10ÔÂÐû²¼µÄSonoma 14.1»ò¸üа汾£¬ÌåÏÖÆä¿ÉÄÜÕë¶Ô½ÏеÄmacOSÇéÐÎÓÅ»¯¹¥»÷´úÂë¡£ÊÖÒÕÆÊÎöÏÔʾ£¬´Ë´Î¹¥»÷Öи͝µÄTermius°üÀ¨³¤ÆÚÐÔÏÂÔØÆ÷£¬¿É»ñÈ¡²¢½âÂë¿ªÔ´ÉøÍ¸¹¤¾ßKhepri£¬Í¨¹ý¶ñÒâÓòÃû½¨ÉèÏÂÁî¿ØÖÆÍ¨µÀ¡£¶ñÒâ´úÂëÖ´ÐÐʱ»áͬ²½Æô¶¯Ä¾Âí¼ÓÔØÆ÷ÓëÕý°æÓ¦Óã¬È·±£Óû§ÄÑÒÔ²ì¾õÒì³£¡£Ç徲ר¼ÒÆÀ¹ÀÒÔΪ£¬´ËÀ๥»÷Ö÷ÒªÕë¶Ô"ȱ·¦ÓÐÓÃÖÕ¶Ë·À»¤"µÄÇéÐΣ¬ÓÈÆäÊÇÒÀÀµËÑË÷ÒýÇæÏÂÔØÈí¼þµÄ¿ª·¢ÕßȺÌå¡£


https://cybernews.com/security/hackers-hide-mac-trojan-in-legitimate-applications/