´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷

Ðû²¼Ê±¼ä 2025-12-30

1. ´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷


12ÔÂ29ÈÕ£¬£¬£¬º«¹ú¹ú¼Òº½¿Õ¹«Ë¾´óº«º½¿Õ¿ËÈÕÅû¶£¬£¬£¬Æä»úÉϲÍÒû¹©Ó¦É̼°Ç°×Ó¹«Ë¾´óº«º½¿Õ²ÍÒûÃâ˰¹«Ë¾£¨KC&D£©ÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬µ¼ÖÂÔ¼3ÍòÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£KC&DÓÚ2020Äê´Ó´óº«º½¿Õ·Ö²ðΪ×ÔÁ¦¹«Ë¾£¬£¬£¬´Ë´ÎÊÂÎñÖУ¬£¬£¬ÆäERPϵͳÖд洢µÄÔ±¹¤ÐÕÃû¡¢ÒøÐÐÕ˺ŵÈÃô¸ÐÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¡£¡£´óº«º½¿ÕÊ×ϯִÐйÙÓí»ùºéÔÚÄÚ²¿±¸Íü¼ÖÐÇ¿µ÷£¬£¬£¬Ö»¹ÜÊÂÎñ±¬·¢ÔÚÍⲿÏàÖúͬ°éÖÎÀí¹æÄ£ÄÚ£¬£¬£¬µ«Éæ¼°Ô±¹¤ÐÅÏ¢Çå¾²£¬£¬£¬¹«Ë¾¸ß¶ÈÖØÊÓ¡£¡£¡£¡£¡£×÷Ϊº«¹ú×î´óº½¿Õ¹«Ë¾£¬£¬£¬´óº«º½¿ÕÓµÓг¬2ÍòÃûÔ±¹¤¡¢160Óà¼Ü·É»ú£¬£¬£¬2024ÄêÔËËÍÂÿͳ¬2300ÍòÈ˴Σ¬£¬£¬ÓªÊÕ³¬110ÒÚÃÀÔª¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶¹æÄ£Öش󣬣¬£¬ÍâµØÃ½Ì屨µÀ³Æ¹¥»÷ÕßÇÔÈ¡ÁËÔ¼3ÍòÌõÊý¾Ý¼Í¼£¬£¬£¬Ö»¹Ü´óº«º½¿ÕδÃ÷È·ÏêϸÊýÄ¿£¬£¬£¬µ«ÒÑÏòÓйز¿·Ö±¨¸æ²¢Æô¶¯ÊӲ졣¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷±»µÁÊý¾Ý±»ÓÃÓÚڲƭµÄÖ¤¾Ý£¬£¬£¬µ«¹«Ë¾ÌáÐÑÔ±¹¤Ð¡ÐÄðûÊÕ˾»ò½ðÈÚ»ú¹¹µÄÕ©Æ­Óʼþ¼°¶ÌÐÅ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ClopÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼±»µÁÊý¾Ý£¬£¬£¬ÔÊÐíͨ¹ýTorrentÏÂÔØ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/korean-air-data-breach-exposes-data-of-thousands-of-employees/


2. EmEditorÔ⹩ӦÁ´¹¥»÷£º¶ñÒâÈí¼þÇÔÈ¡Êý¾Ý²¢°²ÅÅÀ©Õ¹


12ÔÂ29ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬¹ãÊܽӴýµÄÎı¾ºÍ´úÂë±à¼­Èí¼þEmEditorÔâÓö¹©Ó¦Á´¹¥»÷£¬£¬£¬µ¼ÖÂÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÈö²¥¡£¡£¡£¡£¡£EmEditorÓÉÀ×µÂÃɵÂEmurasoft¹«Ë¾¿ª·¢£¬£¬£¬ÊÇÒ»¿î¸ßÐÔÄÜWindows¹¤¾ß£¬£¬£¬×¨Îª±àÂë¡¢Îı¾±à¼­¼°´¦Öóͷ£´óÐÍÎļþÉè¼Æ¡£¡£¡£¡£¡£12ÔÂ19ÈÕ18:39ÖÁ22ÈÕ12:50ʱ´ú£¬£¬£¬Í¨¹ýEmEditorÖ÷Ò³¡°Á¬Ã¦ÏÂÔØ¡±°´Å¥ÏÂÔØ×°ÖóÌÐòµÄÓû§¿ÉÄÜÔâÓö¶ñÒâ°æ±¾¡£¡£¡£¡£¡£¸Ã°´Å¥µÄURL±»¸Ä¶¯£¬£¬£¬Ö¸ÏòÍøÕ¾²î±ðλÖÃÍйܵĶñÒâ.msiÎļþ¡£¡£¡£¡£¡£¼Ù×°ÖóÌÐòÓëÕæÆ·Ãû³Æ¡¢Ìå»ýÏàËÆ£¬£¬£¬µ«ÊðÃûÖ¤ÊéÊôÓÚÆäËû¹«Ë¾¡£¡£¡£¡£¡£ÔËÐк󣬣¬£¬¶ñÒâ³ÌÐòÖ´ÐÐPowerShellÏÂÁ£¬£¬´ÓαÔìÓòÏÂÔØ²¢Ö´ÐÐÎļþ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÍøÂçϵͳÐÅÏ¢¡¢×ÀÃæ/Îĵµ/ÏÂÔØÎļþ¼ÐÎļþ¡¢VPNÉèÖá¢ä¯ÀÀÆ÷Êý¾Ý¼°Zoho Mail¡¢Discord¡¢SlackµÈÓ¦ÓÃÆ¾Ö¤¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ÈôϵͳÓïÑÔΪǰËÕÁª¹ú¼Ò»òÒÁÀÊ£¬£¬£¬¶ñÒâÈí¼þ»áÖÕÖ¹ÔËÐС£¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬¹¥»÷Õß°²ÅÅÁËÃûΪ¡°Google Drive Caching¡±µÄä¯ÀÀÆ÷À©Õ¹£¬£¬£¬¸ÃÀ©Õ¹¾ß±¸ÍêÕûÐÅÏ¢ÇÔÈ¡¹¦Ð§£¬£¬£¬¿É³¤ÆÚ»¯ÍøÂçä¯ÀÀÆ÷ÀúÊ·¡¢ÊéÇ©¡¢cookie£¬£¬£¬ÊµÑé¼ôÌù°åÐ®ÖÆ£¨Ìæ»»¼ÓÃÜÇ®±ÒµØµã£©¡¢¼üÅ̼ͼ¼°ÇÔÈ¡Facebook¹ã¸æÕË»§¡£¡£¡£¡£¡£


https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/


3. FortiGate·À»ðǽ2FAÈÆ¹ýÎó²îÒ»Á¬ÔâʹÓÃ


12ÔÂ29ÈÕ£¬£¬£¬ÍøÂçÇå¾²³§ÉÌFortinet¿ËÈÕÏò¿Í»§·¢³öÖÒÑÔ£¬£¬£¬ÍþвÐÐΪÕßÈÔÔÚÆð¾¢Ê¹ÓñàºÅΪCVE-2020-12812µÄÑÏÖØÎó²î¹¥»÷δÐÞ¸´µÄFortiGate·À»ðǽװ±¸¡£¡£¡£¡£¡£¸ÃÎó²î×îÔçÓÚ2020Äê7Ô±»Åû¶²¢ÐÞ¸´£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÐÞ¸ÄÓû§Ãû¾ÞÏ¸Ð´ÈÆ¹ýË«ÒòËØÉí·ÝÑéÖ¤£¨2FA£©»úÖÆ£¬£¬£¬ÔÚÉèÖÃÁËLDAPÔ¶³ÌÉí·ÝÑéÖ¤ÇÒÆôÓÃ"Óû§ÍâµØ"2FAµÄFortiGate SSL VPN×°±¸ÉÏʵÏÖδÊÚȨ»á¼û¡£¡£¡£¡£¡£Îó²î³ÉÒòÔÚÓÚÍâµØÉí·ÝÑéÖ¤ÓëÔ¶³ÌLDAPÉí·ÝÑéÖ¤Ö®¼äµÄ¾ÞϸдƥÅäÂß¼­·×ÆçÖ¡£¡£¡£¡£¡£FortinetÆäʱͨ¹ýÐû²¼FortiOS 6.4.1/6.2.4/6.0.10°æ±¾ÐÞ¸´¸ÃÎÊÌ⣬£¬£¬²¢½¨ÒéÎÞ·¨Á¬Ã¦Éý¼¶µÄ¿Í»§¹Ø±ÕÓû§ÃûÇø·Ö¾Þϸд¹¦Ð§¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬×îмà²âÏÔʾ£¬£¬£¬¹¥»÷ÕßÈÔÔÚÕë¶ÔÉèÖÃÁËLDAP¹ØÁªÍâµØÓû§ÇÒÆôÓÃ2FAµÄÌØ¶¨ÏµÍ³ÊµÑé¹¥»÷¡£¡£¡£¡£¡£Èô¸¨ÖúLDAP×éÉèÖò»µ±£¬£¬£¬¹¥»÷ÀÖ³ÉÂʽ«½øÒ»²½ÌáÉý£¬£¬£¬¸Ã×é±¾Ó¦ÔÚÖ÷LDAPÈÏ֤ʧ°ÜʱÆôÓ㬣¬£¬µ«Èô·ÇÐëÒªÓ¦Ö±½Óɾ³ý¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-5-year-old-fortios-2fa-bypass-still-exploited-in-attacks/


4. LangChain CoreÏÖ"LangGrinch"¸ßΣÎó²î


12ÔÂ27ÈÕ£¬£¬£¬Çå¾²Ñо¿Ô±Yarden PoratÓÚ2025Äê12ÔÂ4ÈÕÅû¶ÁËLangChainÉú̬½¹µãPython°ülangchain-coreÖеÄÑÏÖØÎó²îCVE-2025-68664£¨´úºÅ"LangGrinch"£©£¬£¬£¬CVSSÆÀ·Ö´ï9.3¡£¡£¡£¡£¡£Îó²î¸ùÒòÔÚÓÚº¯Êýδ¶Ôº¬"lc"¼üµÄÓû§×Öµä¾ÙÐÐתÒå´¦Öóͷ£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃmetadata¡¢responseµÈÓªÒµ×Ö¶Î×¢Èë¶ñÒ⹤¾ß½á¹¹£¬£¬£¬ÔÚºóÐøload()/loads()·´ÐòÁл¯Ê±£¬£¬£¬ÔÚlangchain_core¡¢langchain_communityµÈÊÜÐÅÈÎÃüÃû¿Õ¼äÄÚʵÀý»¯Serializable×ÓÀà¡£¡£¡£¡£¡£²¿·ÖÀàÔÚ³õʼ»¯Ê±¿ÉÄÜ´¥·¢¸±×÷Ó㬣¬£¬ÈçÇéÐαäÁ¿Ð¹Â¶¡¢Jinja2Ä£°å´úÂëÖ´ÐС¢Î£ÏÕÀàʵÀý»¯µÈ£¬£¬£¬ÉõÖÁ¿Éͨ¹ýÌáÐÑ×¢È뽫¶ñÒ⹤¾ßÒþ²ØÓÚÓû§¿É¿Ø×ֶΣ¬£¬£¬ÊµÏÖÒþ²Ø¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÈΪÑÏÖØ£ºÆäÒ»£¬£¬£¬Î»ÓÚlangchain-core±¾Ìå¶ø·ÇÍâΧ¹¤¾ß£¬£¬£¬Ó°ÏìÃæ¹ã£»£»£»£»£»£»Æä¶þ£¬£¬£¬dumps()/dumpd()×÷Ϊ¿ò¼Ü½¹µãAPI£¬£¬£¬È«ÇòÀÛ¼Æ×°ÖÃÁ¿ÊýÒÚ£»£»£»£»£»£»ÆäÈý£¬£¬£¬¹¥»÷¿Éͨ¹ýµ¥ÌõLLMÊä³ö¼ä½Ó´¥·¢£¬£¬£¬Õý³£ÓªÒµÁ÷³ÌÖУ¬£¬£¬LLMÌìÉúµÄmetadataÈô±»ÐòÁл¯£¬£¬£¬¼´¿É´¥·¢Îó²î£¬£¬£¬Òþ²ØÐÔÇ¿ÇÒ¹¥»÷Ãż÷µÍ¡£¡£¡£¡£¡£ÐÞ¸´¼Æ»®ÒÑËæ°æ±¾1.2.5¡¢0.3.81Ðû²¼¡£¡£¡£¡£¡£


https://securityaffairs.com/186185/hacking/langchain-core-vulnerability-allows-prompt-injection-and-data-exposure.html


5. ¾ÈÊÀ¾üÔâInterlockÀÕË÷ÍŻ﹥»÷


12ÔÂ29ÈÕ£¬£¬£¬¹ú¼Ê´ÈÉÆ×éÖ¯¾ÈÊÀ¾ü¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁË93GBÃô¸ÐÐÅÏ¢²¢Ðû²¼ÔÚInterlockÀÕË÷Èí¼þÍÅ»ïµÄ°µÍø²©¿ÍÉÏ¡£¡£¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°160Íò±ÊÃÀ¹úסÃñ¾èÇ®ÉúÒâ¼Í¼£¬£¬£¬×ܶî´ïÊýÍòÍòÃÀÔª£¬£¬£¬°üÀ¨È«Ãû¡¢µç»°¡¢×¡Ö·¡¢¾èÇ®½ð¶îµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬Êý¾Ý½á¹¹ÏÔʾ¹¥»÷Õß»ñÈ¡ÁËÏ꾡µÄ¾èÔùÈËÃûµ¥¡£¡£¡£¡£¡£¾ÈÊÀ¾ü×÷ΪȫÇò×î´ó´ÈÉÆ»ú¹¹Ö®Ò»£¬£¬£¬½¨ÉèÓÚ1865Ä꣬£¬£¬2024ÄêÊÕÈë½ü50ÒÚÃÀÔª£¬£¬£¬Î»ÁÐÃÀ¹úµÚÁù´ó´ÈÉÆ»ú¹¹£¬£¬£¬ÔÚ134¸ö¹ú¼Ò¿ªÕ¹Ô®ÖúÏîÄ¿£¬£¬£¬²¢µ£µ±ÁªºÏ¹úÁ¥Êô»ú¹¹¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²¢·ÇÊ×Àý£¬£¬£¬½ñÄê5Ô£¬£¬£¬ChaosÀÕË÷Èí¼þ¼¯ÍÅÔø¹¥»÷¾ÈÊÀ¾ü²¢Ðû²¼Êý¾Ý£»£»£»£»£»£»¶ø±¾´Î¹¥»÷ÕßInterlockÍÅ»ï×Ô2024Äêβ·ºÆð£¬£¬£¬ÒÑÍù12¸öÔÂÒÑËðº¦ÖÁÉÙ66¸ö×éÖ¯£¬£¬£¬½ÓÄÉË«ÖØÀÕË÷Õ½ÂÔ£¬£¬£¬Í¨¹ýÈëÇÖÍøÕ¾»òÉç»á¹¤³Ìѧ»ñÈ¡ÆðԴפ×ãµã£¬£¬£¬6ÔºÍ8Ô¹¥»÷ÓÈΪ»îÔ¾¡£¡£¡£¡£¡£ÍøÂçÇå¾²ÍŶӯÊÎöÖ¸³ö£¬£¬£¬Ð¹Â¶Êý¾ÝÔ´ÓÚ΢ÈíSQL ServerÊý¾Ý¿â±¸·Ý£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩ½á¹¹»¯Êý¾ÝʵÑéÉí·Ý͵ÇÔ¡¢ÐéαÕË»§½¨Éè»òÕ©Æ­¡£¡£¡£¡£¡£ÓÈÆäÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬¹¥»÷Õß¿ÉÄÜð³ä¾ÈÊÀ¾ü»òÆäËû´ÈÉÆ»ú¹¹¾ÙÐÐÕ©Æ­£¬£¬£¬Ê¹ÓþèÔùÕßµÄÉÆÐÄÓÕµ¼×ªÕË£¬£¬£¬»òͨ¹ý²ÆÎñÆÊÎö¾«×¼¶¨Î»¸ß¼ÛֵĿµÄ¡£¡£¡£¡£¡£


https://cybernews.com/security/salvation-army-data-breach-donors/


6. LynxÀÕË÷ÍŻ﹥»÷ÂíÈøÖîÈûÖÝ»á¼ÆÊÂÎñËù


12ÔÂ29ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄLynxÀÕË÷Èí¼þÍÅ»ïÐû³Æ£¬£¬£¬´ÓÓµÓÐ75ÄêÀúÊ·µÄÂíÈøÖîÈûÖÝ»á¼ÆÊÂÎñËùCSA Tax & AdvisoryÇÔÈ¡ÁË´ó×ÚÄÉ˰É걨Êý¾Ý¼°Éç»á°ü¹ÜºÅÂ룬£¬£¬²¢ÒÔ´ËÀÕË÷Êê½ð¡£¡£¡£¡£¡£CSA×÷ΪרӪ˰ÎñЧÀ͵Ļú¹¹£¬£¬£¬Æä¿Í»§Êý¾ÝÈôÔâй¶£¬£¬£¬½«ÃæÁÙÑÏÖØÍøÂç´¹ÂÚ¹¥»÷ºÍÉí·Ý͵ÇÔΣº¦¡£¡£¡£¡£¡£LynxÍÅ»ïÓÚ12ÔÂ26ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼Í¨¸æ£¬£¬£¬Éù³ÆÒÑ»ñÈ¡¸Ã¹«Ë¾¼°¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬²¢Ç¿µ÷¡°ÃãÀø¶Ô»°½â¾öÎÊÌâ¶ø·ÇÔÓÂÒÆÆË𡱡£¡£¡£¡£¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬£¬£¬¸ÃÍÅ»ïÐû²¼Á˰üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢ÎïÀíµØµã¡¢ÅäżҽÁưü¹ÜЭÒ顢ЧÀÍ·¢Æ±¡¢Ð¡ÎÒ˽¼ÒËùµÃ˰É걨Êý¾Ý¡¢¹ú˰¾Öµç×ÓÉ걨ÊðÃûÊÚȨ±í¸ñ¼°¹«Ë¾ÄÚ²¿ÐꝵĽØÍ¼¡£¡£¡£¡£¡£ÈôÊý¾ÝÊôʵ£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÏêϸСÎÒ˽¼ÒÐÅϢʵÑ龫׼թƭ£¬£¬£¬ÀýÈçð³ä˰Îñ»ú¹¹»òÒøÐУ¬£¬£¬ÓÕµ¼Êܺ¦ÕßתÕË»òй¶¸ü¶àÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£


https://cybernews.com/security/lynx-ransomware-csa-tax-breach/