ºÚ¿ÍÇÔÈ¡GlobalX AirÇýÖ𺽰àÊý¾Ý
Ðû²¼Ê±¼ä 2025-05-071. ºÚ¿ÍÇÔÈ¡GlobalX AirÇýÖ𺽰àÊý¾Ý
5ÔÂ6ÈÕ£¬£¬£¬¾Ý404 MediaÐÂÎÅ£¬£¬£¬ºÚ¿Í½«Ä¿µÄËø¶¨ÔÚÌØÀÊÆÕÕþ¸®ÓÃÓÚÇýÖð³ö¾³µÄÖ÷Òªº½¿Õ¹«Ë¾Ö®Ò»GlobalX Air£¬£¬£¬ÇÔÈ¡ÁËÆäËùÓк½°à£¨º¬ÇýÖð³ö¾³º½°à£©µÄº½ÐмͼÓëÂÿÍÃûµ¥¡£¡£¡£¡£¡£¡£GlobalXÊÇÒ»¼Ò°ü»ú¹«Ë¾£¬£¬£¬ÔøÐÖú½«Êý°ÙÃûίÄÚÈðÀÈËÇýÖðÖÁÈø¶ûÍß¶à¡£¡£¡£¡£¡£¡£ºÚ¿Í×Ô¶¯ÁªÏµ404 Media¼°ÆäËû¼ÇÕߣ¬£¬£¬³ÆÕâЩÊý¾Ý¿ÉÌṩGlobalXº½°àÉϱ»ÇýÖð³ö¾³Ö°Ô±µÄÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨ÏêϸְԱ¡¢Ê±¼ä¼°Ä¿µÄµØ¡£¡£¡£¡£¡£¡£GlobalXÍøÕ¾·ºÆðÒ»ÌõÎÛËðÐÅÏ¢£¬£¬£¬Âä¿îΪ¡°ÄäÃûÕß¡±£¬£¬£¬¸Ã×éÖ¯ÒÔʹÓøÇÒÁ¡¤¸£¿£¿£¿£¿£¿£¿£¿ËË¹Ãæ¾ßÖøÃû£¬£¬£¬ÊÇһЩºÚ¿Í¾ÙÐÐËùν¡°ºÚ¿ÍÐж¯Ö÷Ò塱µÄ±£»£»£»£»¤É¡¡£¡£¡£¡£¡£¡£ÐÅÏ¢ÖÐÖ¸ÔðÄ¿µÄÎÞÊÓÕýµ±ÏÂÁ£¬£¬¾öÒéÖ´Ðз¨¹ÙµÄÏÂÁî¡£¡£¡£¡£¡£¡£ºÚ¿ÍÌåÏÖ£¬£¬£¬ÇÔÈ¡µÄÊý¾Ýº¸Çº½°à¼Í¼ÓëÂÿÍÃûµ¥£¬£¬£¬²¢Ïò404 Media·¢ËÍÁËÊý¾Ý¸±±¾¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý°´1ÔÂ19ÈÕÖÁ5ÔÂ1ÈÕʱ´úÖðÈÕÈÕÆÚ·ÖÀà´æ·ÅÔÚÎļþ¼ÐÖС£¡£¡£¡£¡£¡£ÎªÑéÖ¤Êý¾ÝµÄÕæÊµÐÔ£¬£¬£¬404 MediaδÀ´×Ô¹Ù·½¿É¿¿ÈªÔ´µÄICEÇýÖ𺽰àÒÑÖªÐÅÏ¢£¬£¬£¬ÓëºÚ¿Í»ñÈ¡µÄº½°àÂÿÍÃûµ¥¼°º½°àÏêÇé¾ÙÐÐÁ˽»Ö¯ºË¶Ô¡£¡£¡£¡£¡£¡£Ð§¹ûÏÔʾ£¬£¬£¬ºÚ¿Í»ñÈ¡µÄÊý¾ÝÖÐȷʵ°üÀ¨Ïà¹Øº½°àÐÅÏ¢£¬£¬£¬ÀýÈç»ù¶ûÂí¡¤°¢²¼À׸ꡤ¼ÓÎ÷Ñǵĺ½°àÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://www.404media.co/email/fe8ce8ec-6dad-464a-8022-84e93b909397/
2. PoCÐû²¼ºóÈýÐÇMagicINFOÎó²îÔâʹÓÃ
5ÔÂ6ÈÕ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬ÔÚ¿´·¨ÑéÖ¤£¨PoC£©Îó²î´úÂë¹ûÕæÐû²¼¼¸Ììºó£¬£¬£¬ÍþвÐÐΪÕß±ã×îÏÈʹÓÃÈýÐÇMagicINFOÄÚÈÝÖÎÀíϵͳ£¨CMS£©ÖеĸßÑÏÖØÐÔÎó²îCVE-2024-7399£¨CVSSÆÀ·Ö8.8£©¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚÈýÐÇMagicINFO 9 Server 21.1050֮ǰ°æ±¾£¬£¬£¬ÊÇ·¾¶ÃûÏÞÖÆµ½ÊÜÏÞĿ¼µÄȱÏÝ£¬£¬£¬¹¥»÷Õ߿ɽè´ËÒÔϵͳȨÏÞдÈëí§ÒâÎļþ¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬×èÖ¹2025Äê5Ô³õ£¬£¬£¬ÒÑÊӲ쵽¸ÃÎó²îÔÚÈýÐÇMagicINFO 9ЧÀÍÆ÷Öб»ÆÕ±éʹÓᣡ£¡£¡£¡£¡£´ËÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÓû§Ð´Èëí§ÒâÎļþ£¬£¬£¬ÈôÓÃÓÚ±àÐ´ÌØÖÆµÄJavaServer Pages£¨JSP£©Îļþ£¬£¬£¬×îÖÕ¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£CVE-2024-7399ʵÖÊÊÇÈýÐÇMagicINFO 9 ServerÊäÈëÑéÖ¤µÄȱÏÝ£¬£¬£¬ÄÜÈÃδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÉÏ´«JSPÎļþ²¢ÒÔϵͳ¼¶»á¼ûȨÏÞÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£ÈýÐÇÓÚ2024Äê8ÔÂÊ×´ÎÅû¶¸ÃÎó²î£¬£¬£¬Ðû²¼MagicINFO 9 Server°æ±¾21.1050ÐÞ¸´´ËÎó²î£¬£¬£¬Æäʱ²¢ÎÞʹÓü£Ï󣬣¬£¬µ«2025Äê4ÔÂ30ÈÕPoCÐû²¼¼¸Ììºó£¬£¬£¬ÍþвÐÐΪÕß¾Í×îÏÈʹÓᣡ£¡£¡£¡£¡£¼øÓÚ¸ÃÎó²îʹÓÃÄѶȵÍÇÒPoCÒѹûÕæ£¬£¬£¬×¨¼ÒÒÔΪ´ËÀ๥»÷¿ÉÄÜÒ»Á¬¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/177529/hacking/samsung-magicinfo-vulnerability-exploited-after-poc-publication.html
3. LangflowÎó²îCVE-2025-3248±»Æð¾¢Ê¹ÓÃ
5ÔÂ6ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½«LangflowÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-3248£©±ê¼ÇΪÆð¾¢Ê¹ÓÃ״̬£¬£¬£¬±Þ²ß¸÷×éÖ¯¾¡¿ìÓ¦ÓÃÇå¾²¸üлººÍ½â²½·¥¡£¡£¡£¡£¡£¡£´ËÎó²îΪÑÏÖØÎ´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬£¬ÄÜÈû¥ÁªÍøÉϵĹ¥»÷ÕßʹÓÃAPI¶ËµãÎó²îÍêÈ«¿ØÖÆÒ×Êܹ¥»÷µÄLangflowЧÀÍÆ÷¡£¡£¡£¡£¡£¡£LangflowÊÇÒ»¿î¿ªÔ´¿ÉÊÓ»¯±à³Ì¹¤¾ß£¬£¬£¬ÔÚGitHubÉÏÓµÓнü6Íò¸östarºÍ6.3Íò¸öfork£¬£¬£¬ÔÚÈ˹¤ÖÇÄÜ¿ª·¢¡¢Ñо¿ºÍÊ×´´ÁìÓòÓ¦ÓÃÆÕ±é¡£¡£¡£¡£¡£¡£Æä¹ûÕæµÄÓÃÓÚÑéÖ¤Óû§Ìá½»½ÓÂëµÄ¶Ëµã±£´æÇ徲ȱÏÝ£¬£¬£¬Îó²î°æ±¾ÖÐÎÞ·¨Çå¾²µØ¶ÔÊäÈë¾ÙÐÐɳºÐ´¦Öóͷ£»ò¹ýÂË£¬£¬£¬¹¥»÷Õ߿ɽè´Ë·¢ËͶñÒâ´úÂë²¢ÔÚЧÀÍÆ÷ÉÏÖ±½ÓÖ´ÐС£¡£¡£¡£¡£¡£¸ÃÎó²îÒÑÔÚ2025Äê4ÔÂ1ÈÕÐû²¼µÄ1.3.0°æ±¾ÖÐÐÞ¸´£¬£¬£¬²¹¶¡½öΪÒ×Êܹ¥»÷µÄ¶ËµãÌí¼ÓÁËÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£×îа汾1.4.0ÒÑÐû²¼£¬£¬£¬°üÀ¨´ó×ÚÐÞ¸´£¬£¬£¬½¨ÒéÓû§Éý¼¶¡£¡£¡£¡£¡£¡£Horizon3Ñо¿Ö°Ô±Ðû²¼Ïà¹ØÊÖÒÕ²©¿Í²¢ÖÒÑÔ£¬£¬£¬¸ÃÎó²î±»Ê¹ÓõĿÉÄÜÐԺܸߣ¬£¬£¬ÆäʱÒÑ·¢Ã÷ÖÁÉÙ500¸ö̻¶ÔÚ»¥ÁªÍøÉϵÄʵÀý¡£¡£¡£¡£¡£¡£¹ØÓÚÎÞ·¨Á¬Ã¦Éý¼¶µÄÓû§£¬£¬£¬½¨Òéͨ¹ý·À»ðǽ¡¢·´ÏòÊðÀí»òVPNÏÞÖÆLangflowµÄÍøÂç»á¼û£¬£¬£¬ÇÒ²»½¨ÒéÖ±½Ó½«Æä̻¶ÔÚ»¥ÁªÍøÉÏ¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê5ÔÂ26ÈÕǰ½ÓÄÉÐж¯£¬£¬£¬²»È»×èֹʹÓøÃÈí¼þ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-langflow-rce-flaw-exploited-to-hack-ai-app-servers/
4. GitHub¶ñÒâGoÄ£¿£¿£¿£¿£¿£¿£¿éÒþ²ØLinux Wiper¶ñÒâÈí¼þ
5ÔÂ6ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Õë¶ÔLinuxЧÀÍÆ÷µÄ¹©Ó¦Á´¹¥»÷±»ÆØ¹â£¬£¬£¬¹¥»÷ÕßÔÚGitHubÉÏÐû²¼µÄGolangÄ£¿£¿£¿£¿£¿£¿£¿éÖÐÒþ²ØÁË´ÅÅ̲Á³ý¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚÉϸöÔ±»·¢Ã÷£¬£¬£¬ÒÀÀµÈý¸ö°üÀ¨¡°¸ß¶È»ìÏý´úÂ롱µÄ¶ñÒâGoÄ£¿£¿£¿£¿£¿£¿£¿éÀ´¼ìË÷²¢Ö´ÐÐÔ¶³ÌÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÏÔÈ»ÊÇרÃÅÕë¶Ô»ùÓÚLinuxµÄЧÀÍÆ÷ºÍ¿ª·¢ÇéÐÎÉè¼ÆµÄ£¬£¬£¬ÆäÆÆËðÐÔ¸ºÔØÎªÒ»¸öÃûΪdone.shµÄBash¾ç±¾£¬£¬£¬¸Ã¾ç±¾»áÔËÐС°dd¡±ÏÂÁî¾ÙÐÐÎļþ²Á³ý»î¶¯¡£¡£¡£¡£¡£¡£ÔÚÖ´ÐÐǰ£¬£¬£¬ÓÐÓÃÔØºÉ»áÑéÖ¤ÆäÊÇ·ñÔÚLinuxÇéÐÎÖÐÔËÐС£¡£¡£¡£¡£¡£¾Ý¹©Ó¦Á´Çå¾²¹«Ë¾SocketÆÊÎö£¬£¬£¬¸ÃÏÂÁî»áÓÃÁãÁýÕÖÿ¸öÊý¾Ý×Ö½Ú£¬£¬£¬µ¼Ö²»¿ÉÄæ×ªµÄÊý¾ÝɥʧºÍϵͳ¹ÊÕÏ£¬£¬£¬Ä¿µÄÊÇÉúÑÄÒªº¦ÏµÍ³Êý¾Ý¡¢Óû§Îļþ¡¢Êý¾Ý¿âºÍÉèÖõÄÖ÷´æ´¢¾í/dev/sda¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ4Ô·ݷ¢Ã÷Á˴˴ι¥»÷£¬£¬£¬²¢ÔÚGitHubÉÏ·¢Ã÷ÁËÈý¸öÏÖÒѱ»É¾³ýµÄ¶ñÒâGoÄ£¿£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£ÕâЩģ¿£¿£¿£¿£¿£¿£¿é¾ù°üÀ¨»ìÏý´úÂ룬£¬£¬½âÂëºó»áʹÓá°wget¡±ÏÂÔØ²¢Á¬Ã¦Ö´ÐжñÒâÊý¾Ý²Á³ý¾ç±¾£¬£¬£¬ÏÕЩûÓиøÊܺ¦ÕßÁôÏÂÏìÓ¦»ò»Ö¸´µÄʱ¼ä¡£¡£¡£¡£¡£¡£¶ñÒâGoÄ£¿£¿£¿£¿£¿£¿£¿éËÆºõð³äÁËÕýµ±ÏîÄ¿£¬£¬£¬ÈçÓÃÓÚÐÂÎÅÊý¾Ýת»»µÄPrototransform¡¢Ä£×ÓÉÏÏÂÎÄÐÒéµÄGoʵÏÖgo-mcpÒÔ¼°ÎªTCPºÍHTTPЧÀÍÆ÷Ìṩ¼ÓÃܵÄTLSÊðÀí¹¤¾ßtlsproxy¡£¡£¡£¡£¡£¡£SocketÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬×ÝÈ»½ö×îСˮƽµØÌ»Â¶ÓÚÕâÐ©ÆÆËðÐÔÄ£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬Ò²¿ÉÄܵ¼ÖÂÊý¾ÝÍêȫɥʧµÈÑÏÖØÐ§¹û¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/
5. ð³äSSAÓʼþ·Ö·¢ScreenConnect RATÈëÇÖÓû§×°±¸
5ÔÂ6ÈÕ£¬£¬£¬ÍøÂçÇ徲ר¼Ò·¢Ã÷£¬£¬£¬·¸·¨·Ö×ÓʹÓÃÃÀ¹úÉç»á°ü¹Ü¾Ö£¨SSA£©ÃûÒ壬£¬£¬ÓÕÆÓû§×°ÖÃÃûΪScreenConnectµÄΣÏÕÔ¶³Ì»á¼ûľÂí£¨RAT£©¡£¡£¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬¹¥»÷Õß±ã¿ÉÔ¶³Ì¿ØÖƵçÄÔ£¬£¬£¬ÇÔȡСÎÒ˽¼ÒÐÅÏ¢²¢×°Öøü¶àÓк¦Èí¼þ¡£¡£¡£¡£¡£¡£MalwarebytesÑо¿Ö°Ô±Ê×ÏÈ×¢ÖØµ½ÕâЩÐéαÓʼþ£¬£¬£¬ËüÃÇÒÔ¡°Éç±£ÉùÃ÷ÏÖÒÑ¿ÉÓá±ÎªÓÉ£¬£¬£¬±Þ²ßÓû§ÏÂÔØ¸½¼þ»òµã»÷Á´½ÓÉó²é¡£¡£¡£¡£¡£¡£ÕâЩÓʼþÉè¼Æ±ÆÕ棬£¬£¬ÄÑÒÔÇø·ÖÕæÎ±£¬£¬£¬ÓʼþÖеÄÁ´½Ó»ò¸½¼þ»áÖ¸µ¼Óû§ÏÂÔØÓÃÓÚ×°ÖÃScreenConnect¿Í»§¶ËµÄÎļþ£¬£¬£¬ÎļþÓÐʱ»á±»¸¶ÓëÎóµ¼ÐÔÃû³Æ£¬£¬£¬Èç¡°ReceiptApirl2025Pdfc.exe¡±µÈ¡£¡£¡£¡£¡£¡£ScreenConnect±¾ÊÇÆóÒµITÖ§³Ö¹¤¾ß£¬£¬£¬µ«ÂäÈë·¸·¨·Ö×ÓÊÖÖÐÔò±äµÃΣÏÕ£¬£¬£¬ËûÃÇ¿Éͨ¹ýÆä¿ØÖÆÅÌËã»ú£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬Ä»ºóºÚÊÖMolatori¼¯ÍÅÖ÷ҪĿµÄÊǾÙÐнðÈÚÕ©Æ¡£¡£¡£¡£¡£¡£CofenseÇ徲ר¼ÒÒ²±¨¸æÁËÀàËÆÃ°³äSSAµÄÍøÂç´¹Âڻ£¬£¬£¬ÕâЩÓʼþͨ³£Éù³ÆÌṩ¸£ÀûÉùÃ÷£¬£¬£¬Ê¹Óò»Æ¥ÅäÁ´½Ó»òÒþ²Ø¶ñÒâÁ´½Ó¡£¡£¡£¡£¡£¡£CofenseÖ¸³ö£¬£¬£¬ÕâЩÐéαÓʼþÖ¼ÔÚ×°ÖÃConnectWise RAT£¬£¬£¬¼´Õýµ±Èí¼þConnectWise Control£¨ÔScreenConnect£©µÄÊÜѬȾ°æ±¾¡£¡£¡£¡£¡£¡£
https://hackread.com/fake-ssa-emails-trick-users-installing-screenconnect-rat/
6. µÂ¿ËÈøË¹ÖÝÑ§ÇøÏò³¬47,000ÃûְԱת´ïÊý¾Ýй¶ÊÂÎñ
5ÔÂ7ÈÕ£¬£¬£¬µÂ¿ËÈøË¹Öݰ¢¶ûÎÄ×ÔÁ¦Ñ§Çø£¨AISD£©±¬·¢Ò»ÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ÖÂʹ47606È˵ÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ¡£¡£¡£¡£¡£¡£¸ÃÑ§ÇøÈ·ÈÏÎó²î·ºÆðÔÚ2024Äê6Ô£¬£¬£¬²¢ÓÚ±¾ÖÜÄ©×îÏÈ֪ͨÊÜÓ°ÏìÖ°Ô±¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÖÝÕþ¸®Ç©·¢Ö¤¼þ¡¢ÐÅÓÿ¨/½è¼Ç¿¨ÐÅÏ¢¡¢½ðÈÚÕË»§ºÅÂë¡¢Ò½ÁÆÊý¾Ý¼°¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£µÂ¿ËÈøË¹ÖÝ×ÜÉó²é³¤°ì¹«ÊÒÓÚ2025Äê5ÔÂ2ÈÕת´ïÁËÕâÒ»ÊÂÎñ¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÍÅ»ïFogÔÚ2024Äê7ÔÂÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬³Æ´ÓAISDÇÔÈ¡ÁË60GBÊý¾Ý£¬£¬£¬²¢½«Ñ§ÇøÃû³ÆÐû²¼ÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏ£¬£¬£¬ÒÔ´ËÏòÊܺ¦ÕßʩѹË÷ÒªÊê½ð¡£¡£¡£¡£¡£¡£Fog×Ô2024Äê7ÔÂ×îÏÈÐû²¼¹¥»÷»î¶¯£¬£¬£¬AISDÊÇÆäÊ×ÅúÊܺ¦ÕßÖ®Ò»¡£¡£¡£¡£¡£¡£ÒԺ󣬣¬£¬¸ÃÍÅ»ïÐû³ÆÊµÑéÁË20ÆðÒÑÈ·ÈϵÄÀÕË÷Èí¼þ¹¥»÷£¨ÆäÖÐ12ÆðÕë¶Ô½ÌÓý»ú¹¹£©¼°157ÆðδȷÈÏÊÂÎñ£¬£¬£¬Æä»î¶¯¼£ÏóÓÚ2025Äê4ÔÂ×èÖ¹¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÒÔ¼ÓÃÜÎļþºÍÇÔÈ¡Êý¾ÝΪÊֶΣ¬£¬£¬³£Ãé×¼¿ª·¢ÇéÐΣ¬£¬£¬¹¥»÷¹æÄ£²»¾ÖÏÞÓÚѧУ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/texas-school-47000-people-data/