±±ÃÀ±ùÖÆÆ·¹©Ó¦ÉÌÔâ÷è÷ëÀÕË÷Èí¼þÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬Ãô¸ÐÊý¾ÝÒÉй¶

Ðû²¼Ê±¼ä 2025-07-31

1. ±±ÃÀ±ùÖÆÆ·¹©Ó¦ÉÌÔâ÷è÷ëÀÕË÷Èí¼þÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬Ãô¸ÐÊý¾ÝÒÉй¶


7ÔÂ29ÈÕ£¬£¬£¬ £¬£¬£¬£¬±±ÃÀÖ÷Òª±ùÖÆÆ·¹©Ó¦É̱±¼«±ù´¨£¨Arctic Glacier£©¿ËÈÕ±»ÆØ³ÉΪ÷è÷루Qilin£©ÀÕË÷Èí¼þÍÅ»ïµÄ×îй¥»÷Ä¿µÄ£¬£¬£¬ £¬£¬£¬£¬ÆäÃô¸ÐÆóÒµÊý¾Ý¡¢Ô±¹¤ÐÅÏ¢¼°Ë½ÈË×ÊÁÏÔâÇÔ²¢ÔÚ°µÍøÕ¹Ê¾¡£¡£¡£¡£¡£¡£×÷ΪÃÀ¹úºÍ¼ÓÄôó×î´óµÄ°ü×°±ù¼°Ëé±ù¹©Ó¦ÉÌÖ®Ò»£¬£¬£¬ £¬£¬£¬£¬±±¼«±ù´¨Ð§À͹¤¾ßº­¸Ç7-ElevenµÈ±ãµ±µê¾ÞÍ·£¬£¬£¬ £¬£¬£¬£¬ÔËÓª×ÅÁè¼Ý100¸ö·ÖÏúÖÐÐÄ£¬£¬£¬ £¬£¬£¬£¬Îª7.5Íò¼ÒÁãÊÛ¡¢ÉÌÒµ¼°¹¤Òµ¿Í»§ÌṩЧÀÍ£¬£¬£¬ £¬£¬£¬£¬È¥ÄêÓªÊÕ¿¿½ü3ÒÚÃÀÔª£¬£¬£¬ £¬£¬£¬£¬Ô±¹¤¹æÄ£³¬Ç§ÈË¡£¡£¡£¡£¡£¡£÷è÷ëÍÅ»ïÔÚÆä°µÍø²©¿ÍÐû³ÆÈëÇÖÀֳɣ¬£¬£¬ £¬£¬£¬£¬²¢Ðû²¼Á˶àÕžݳÆÀ´×Ô±±¼«±ù´¨µÄй¶Êý¾Ý½ØÍ¼£¬£¬£¬ £¬£¬£¬£¬ÄÚÈݰüÀ¨»¤ÕÕ¡¢¼ÝÕÕ¸±±¾¡¢Ô±¹¤Ð½³ê¼Í¼¼°Ö´·¨²ÆÎñÎļþ¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶¿ÉÄÜÒý·¢¶àÖØÎ£º¦£º¹¥»÷Õß»òʹÓÃСÎÒ˽¼ÒÐÅϢʵÑéÉí·Ý͵ÇÔ¡¢Ú²Æ­ÐÔÕË»§×¢²á£¬£¬£¬ £¬£¬£¬£¬»òͨ¹ýαװ³É¹«Ë¾¿Í»§/¹ÍÖ÷ÌᳫÕë¶ÔÐÔ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬£¬Ð¹Â¶µÄÖ´·¨Îļþ¿ÉÄܱ»ÓÃÓÚÆÊÎöÆóÒµÀûÒæ¹ØÏµ£¬£¬£¬ £¬£¬£¬£¬ÎªºóÐø¸ü¾ßÆÆËðÐԵĹ¥»÷ÌṩÇ鱨֧³Ö¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/arctic-glacier-data-breach-claims/


2. PyPIÔâÓö¸ßÒþ²ØÐÔÍøÂç´¹ÂÚ¹¥»÷


7ÔÂ29ÈÕ£¬£¬£¬ £¬£¬£¬£¬Python°üË÷Òý£¨PyPI£©Î¬»¤Õß¿ËÈÕ·¢³ö½ôÆÈÖÒÑÔ£¬£¬£¬ £¬£¬£¬£¬³ÆÆäÓû§ÕýÔâÓöÒ»³¡È«ÐIJ߻®µÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýαÔìÖ÷ÌâΪ¡°[PyPI] µç×ÓÓʼþÑéÖ¤¡±µÄÓʼþ£¬£¬£¬ £¬£¬£¬£¬ÓÕµ¼Óû§µã»÷Á´½ÓÖÁÐéÎ±ÍøÕ¾£¬£¬£¬ £¬£¬£¬£¬ÒÔÇÔÈ¡µÇ¼ƾ֤¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÆæÒìÖ®´¦ÔÚÓÚ£¬£¬£¬ £¬£¬£¬£¬ÆäÊÖÒÕÊÖ·¨¾ßÓи߶ÈÒþ²ØÐÔ£¬£¬£¬ £¬£¬£¬£¬Óû§ÔÚÐéÎ±ÍøÕ¾ÊäÈëÐÅÏ¢ºó£¬£¬£¬ £¬£¬£¬£¬ÇëÇó»á±»Â·ÓÉÖÁÕýµ±PyPIЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬£¬Ê¹Êܺ¦ÕßÎóÒÔΪ²Ù×÷Õý³££¬£¬£¬ £¬£¬£¬£¬ÊµÔòƾ֤ÒÑÔâ½Ø»ñ¡£¡£¡£¡£¡£¡£¾ÝPyPIÖÎÀíÔ±Mike FiedlerÅû¶£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Óʼþ·¢¼þµØµãΪnoreply@pypj[.]org£¨×¢ÖØÓòÃû²¢·Ç¹Ù·½pypi[.]org£©£¬£¬£¬ £¬£¬£¬£¬ÓʼþÄÚÈÝÒªÇóÓû§ÑéÖ¤ÓÊÏ䵨µã£¬£¬£¬ £¬£¬£¬£¬²¢Ö¸µ¼ÖÁ·ÂðPyPI½çÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷δֱ½ÓÍ»ÆÆPyPIϵͳÇå¾²£¬£¬£¬ £¬£¬£¬£¬µ«Ê¹ÓÃÁËÓû§¶Ô¹Ù·½Æ½Ì¨µÄÐÅÈΣ¬£¬£¬ £¬£¬£¬£¬ÊôÓڵ䷶µÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£PyPIÍŶÓÇ¿µ÷£¬£¬£¬ £¬£¬£¬£¬´ËÀàÐÐΪ¿ÉÄÜÕë¶ÔÖÎÀíÈÈÃÅÈí¼þ°üµÄ¿ª·¢ÕßÕË»§£¬£¬£¬ £¬£¬£¬£¬Ò»µ©µÃ³Ñ£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß»ò¿ÉÐû²¼¶ñÒâ°ü£¬£¬£¬ £¬£¬£¬£¬À©´óΣº¦¹æÄ£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/07/pypi-warns-of-ongoing-phishing-campaign.html


3. ·ÇÖÞ×éÖ¯ÔâÊÜ´ó¹æÄ£Microsoft SharePointÎó²î¹¥»÷


7ÔÂ30ÈÕ£¬£¬£¬ £¬£¬£¬£¬·ÇÖÞ¹ú¼ÒÕýÃæÁÙÍøÂç¹¥»÷µÄ¿Õǰ¼¤Ôö£¬£¬£¬ £¬£¬£¬£¬Ê±»úÖ÷ÒåÍþвÐÐΪÕßͨ¹ý´ó¹æÄ£É¨Ã軥ÁªÍø£¬£¬£¬ £¬£¬£¬£¬Ê¹ÓÃδʵʱÐÞ²¹µÄn-dayÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Æä¿ìËÙÀ©Õŵ«Çå¾²·À»¤±¡ÈõµÄÊý×Ö»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬ £¬£¬£¬£¬ÄϷǹú¼Ò²ÆÎñ²¿¡¢Æû³µÖÆÔìÒµ¡¢´óѧ¼°µØ·½Õþ¸®µÈÖÁÉÙÁù¼Ò»ú¹¹Ôâ΢ÈíSharePointÈí¼þÖеÄToolShellÎó²î£¨CVE-2025-53770/53771£©¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÊÂÎñ²¨¼°Ã«ÀïÇó˹¡¢Ô¼µ©µÈµØ£¬£¬£¬ £¬£¬£¬£¬Í¹ÏÔ·ÇÖÞ³ÉΪȫÇòÍøÂç·¸·¨µÄÐÂÄ¿µÄ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄÎó²î×îÔçÔÚ2025Äê5ÔÂPwn2Own¾ºÈüÖб»·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬Î¢ÈíËäÓÚ7Ô³õÐû²¼²¹¶¡£¬£¬£¬ £¬£¬£¬£¬µ«ÈýÌìºóÁãÈÕ±äÌå¼´±»ÓÃÓÚʵս¡£¡£¡£¡£¡£¡£Çå¾²¹«Ë¾BitdefenderÖ¸³ö£¬£¬£¬ £¬£¬£¬£¬·ÇÖÞµÄųÈõÐÔÔ´ÓÚÆäÊý×Ö»¯Àú³ÌÓëÍøÂçÇå¾²ÄÜÁ¦µÄ²»Æ¥Å䣺Ϊ½µµÍ±¾Ç®£¬£¬£¬ £¬£¬£¬£¬´ó×Ú×éÖ¯½ÓÄÉÍâµØ°²ÅÅÈí¼þ£¨Èç±£´æÎó²îµÄSharePoint£©£¬£¬£¬ £¬£¬£¬£¬µ«ÒòITÈËÁ¦ÓÐÏÞ£¬£¬£¬ £¬£¬£¬£¬ÄÑÒÔÓÐÓÃÖÎÀíÇå¾²¸üС£¡£¡£¡£¡£¡£ESETÑо¿Ô±Anton CherepanovÔö²¹³Æ£¬£¬£¬ £¬£¬£¬£¬¹¥»÷ģʽ·ºÆðÁ½½×¶ÎÌØÕ÷£¬£¬£¬ £¬£¬£¬£¬Îó²î¿´·¨ÑéÖ¤£¨PoC£©´úÂëÐû²¼ºó24СʱÄÚ£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ìËÙ½¨Éè̲ͷÕ󵨣¬£¬£¬ £¬£¬£¬£¬ÊýÖܺóÔÙÕö¿ªÊÖ¶¯ÉøÍ¸¡£¡£¡£¡£¡£¡£


https://www.darkreading.com/cyber-risk/african-orgs-mass-microsoft-sharepoint-exploits


4. ¶íÂÞ˹ҽÁÆÓëÃñÉúÁìÓòÔâ´ó¹æÄ£ÍøÂç¹¥»÷


7ÔÂ30ÈÕ£¬£¬£¬ £¬£¬£¬£¬±¾ÖܶíÂÞ˹ҽÁƼ°ÃñÉúÁìÓòÔâÓö¶àÆðÑÏÖØÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÌìÏÂÊý°Ù¼ÒÒ©µêÐÝÒµ¡¢Ò½ÁÆ»ú¹¹Ð§ÀÍ̱»¾£¬£¬£¬ £¬£¬£¬£¬Òý·¢Éç»áÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£¶íÂÞ˹Á½´óÁ¬ËøÒ©µêStolichki£¨Ô¼1000¼ÒÃŵ꣩ºÍNeofarm£¨³¬110¼ÒÃŵ꣩Ïà¼Ì֤ʵ£¬£¬£¬ £¬£¬£¬£¬ÖܶþÒòÓɺڿ͹¥»÷µ¼ÖÂÖ§¸¶ÏµÍ³¡¢Ò©Æ·Ô¤¶©¼°»áԱЧÀÍÖÜÈ«ÖÐÖ¹¡£¡£¡£¡£¡£¡£Ö»¹ÜStolichkiÖÜÈý»Ö¸´°ëÊýÃŵêÔËÓª£¬£¬£¬ £¬£¬£¬£¬µ«Á½¼ÒÆóÒµÔ±¹¤¾ù±»ÇýÖ𣬣¬£¬ £¬£¬£¬£¬ÔÚÏßЧÀÍÈÔ´¦Ì±»¾×´Ì¬¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬£¬ÕâÁ½¼ÒÒ©µêͬÊôÒ»¼Ò¿Ø¹É¹«Ë¾£¬£¬£¬ £¬£¬£¬£¬×Åʵ¼Ê¿ØÖÆÈ¨Òò2022ÄêÔ­¹É¶«¡¢Ç°¹ú¼Ò¶ÅÂíÒéÔ±Ò¶·ò¸ùÄᡤÄá·²µÙÒ®·òÊÜÎ÷·½ÖƲÃתÈùÉȨºó£¬£¬£¬ £¬£¬£¬£¬ÈÔ´æ¼ä½Ó¹ØÁªÕùÒé¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²¨¼°¹æÄ£Áè¼ÝÒ½Ò©ÁìÓò¡£¡£¡£¡£¡£¡£ÄªË¹¿Æ¼ÒÍ¥Ò½ÉúÕïËùÍøÂçͬÈÕ±¨¸æÍøÂç¹ÊÕÏ£¬£¬£¬ £¬£¬£¬£¬»¼ÕßÃÅ»§ÓëԤԼϵͳ̱»¾£¬£¬£¬ £¬£¬£¬£¬½öÄÜÏÖ³¡¾ÍÕï¡£¡£¡£¡£¡£¡£Ö»¹Ü¶íÂÞ˹»¥ÁªÍøî¿Ïµ»ú¹¹Roskomnadzor·ñ¶¨ÊÂÎñÉæ¼°ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬ £¬£¬£¬£¬µ«Î´Ðû²¼ÏêϸÊÖ·¨¼°ÈªÔ´£¬£¬£¬ £¬£¬£¬£¬°µÍøÂÛ̳Ôò·ºÆðѵ³â¹¥»÷"Î¥·´Æ·µÂ"µÄÉùÒô£¬£¬£¬ £¬£¬£¬£¬ÌåÏÖµØÔµÕþÖÎÄîÍ·¡£¡£¡£¡£¡£¡£


https://therecord.media/cyberattack-shuts-down-russian-pharmacies


5. ÃÀ¹úÁãÊÛ¾ÞÍ·Dollar TreeÔâÀÕË÷Èí¼þ¹¥»÷


7ÔÂ30ÈÕ£¬£¬£¬ £¬£¬£¬£¬ÃÀ¹úÕÛ¿ÛÁãÊÛ¾ÞÍ·Dollar Tree½üÆÚ±»×ÅÃûÀÕË÷Èí¼þÍÅ»ïINC RansomÁÐΪ¹¥»÷Ä¿µÄ£¬£¬£¬ £¬£¬£¬£¬¸ÃÍÅ»ïÔÚ°µÍø²©¿ÍÐû³ÆÒÑ»ñÈ¡ÆäÁè¼Ý1.2TBµÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬²¢Íþв¹ûÕæ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬£¬Dollar TreeѸËÙ»ØÓ¦³Æ£¬£¬£¬ £¬£¬£¬£¬Ïà¹ØÖ¸¿Ø½öÉæ¼°2024ÄêÊÕ¹ºµÄ99 Cents OnlyÁ¬ËøµêÒÅÁôϵͳ£¬£¬£¬ £¬£¬£¬£¬Ç¿µ÷¹«Ë¾²¢Î´ÊÕ¹º¸ÃÆ·ÅÆµÄÆóҵʵÌå¡¢ÍøÂç»òÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬½ö±£´æ²¿·Ö·¿µØ²ú×âÁÞȨ£¬£¬£¬ £¬£¬£¬£¬ÈκιØÓÚÆäÖ±½Ó¾íÈëÊý¾Ýй¶µÄÖ¸¿Ø¾ù²»Êôʵ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚINC Ransom½«Dollar TreeÁÐÈë°µÍøÐ¹ÃÜÍøÕ¾£¬£¬£¬ £¬£¬£¬£¬²¢Ðû²¼ÉÙÁ¿Îĵµ½ØÍ¼×÷Ϊ֤¾Ý¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδ¹ûÕæÍêÕûÊý¾ÝÑù±¾£¬£¬£¬ £¬£¬£¬£¬µ«¸ÃÍÅ»ïµÄ¡°¶àÖØÀÕË÷¡±Ä£Ê½Í¨³£ÒÔй¶Êý¾ÝΪҪЮ£¬£¬£¬ £¬£¬£¬£¬ÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬£¬Èô¹¥»÷Êôʵ£¬£¬£¬ £¬£¬£¬£¬Õâ²¢·ÇDollar TreeÊ×´ÎÔâÓöÊý¾ÝÇå¾²ÎÊÌ⣬£¬£¬ £¬£¬£¬£¬2023ÄêÆäÔøÒòµÚÈý·½¹©Ó¦ÉÌϵͳÔâÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÔ±¹¤¼°¿Í»§Î´¼ÓÃÜÐÅϢй¶¡£¡£¡£¡£¡£¡£Ö»¹ÜDollar TreeÇ¿µ÷´Ë´ÎÊÂÎñÓë×ÔÉí½¹µãϵͳÎ޹أ¬£¬£¬ £¬£¬£¬£¬µ«ÊÕ¹ººóµÄÊý¾ÝÖÎÀíÎó²îÈÔÒý·¢¹Ø×¢¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/dollar-tree-data-breach-claims/


6. ºÚ¿ÍÆð¾¢Ê¹ÓÃWordPress AloneÖ÷ÌâÖеÄÒªº¦RCEÎó²î


7ÔÂ30ÈÕ£¬£¬£¬ £¬£¬£¬£¬WordPress¸ß¼¶Ö÷ÌâAlone¿ËÈÕ±»ÆØ±£´æÎ´¾­Éí·ÝÑéÖ¤µÄí§ÒâÎļþÉÏ´«Îó²î£¨CVE-2025-5394£©£¬£¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¸ÃÎó²îʵÏÖÔ¶³Ì´úÂëÖ´Ðм°Õ¾µã½ÓÊÜ¡£¡£¡£¡£¡£¡£¾ÝÇå¾²³§ÉÌWordfenceͳ¼Æ£¬£¬£¬ £¬£¬£¬£¬ÆäÒÑ×èµ²Áè¼Ý12Íò´ÎÕë¶Ô¸ÃÎó²îµÄ¹¥»÷ʵÑ飬£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃÖ÷Ìâ½¹µãº¯Êý"alone_import_pack_install_plugin()"µÄȱÏÝ£¬£¬£¬ £¬£¬£¬£¬Í¨¹ýAJAX½Ó¿ÚÎüÊÕÔ¶³ÌURLÉÏ´«¶ñÒâZIP°ü£¬£¬£¬ £¬£¬£¬£¬½ø¶øÖ²ÈëWebshell¡¢PHPºóÃÅ»ò½¨ÉèÒþ²ØÖÎÀíÔ±ÕË»§£¬£¬£¬ £¬£¬£¬£¬ÉõÖÁ°²ÅÅÍêÕûÎļþÖÎÀíÆ÷ÒÔÍêÈ«¿ØÖÆÊý¾Ý¿â¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷·ºÆðÏÔÖøÁãÈÕÎó²îÌØÕ÷£ºWordfence·¢Ã÷¹¥»÷»î¶¯ÔçÓÚ¹Ù·½²¹¶¡Ðû²¼ÖÁÉÙËÄÌ죬£¬£¬ £¬£¬£¬£¬Åú×¢¹¥»÷Õßͨ¹ý¼à¿Ø°æ±¾¸üÐÂÈÕÖ¾ÌáÇ°Ëø¶¨Ä¿µÄ¡£¡£¡£¡£¡£¡£Îó²îÓ°ÏìAlone 7.8.3¼°ÒÔÉϰ汾£¬£¬£¬ £¬£¬£¬£¬¸ÃÖ÷ÌâÖ÷ҪЧÀÍÓÚ´ÈÉÆ»ú¹¹¡¢·ÇÕþ¸®×éÖ¯µÈ·ÇÓªÀûʵÌ壬£¬£¬ £¬£¬£¬£¬ÆäÓû§ÈºÌåÌØÊâÐÔ¼Ó¾çÁËÊý¾Ýй¶Σº¦¡£¡£¡£¡£¡£¡£¹¥»÷¼£Ïó°üÀ¨ÐÂÔöÖÎÀíÔ±ÕË»§¡¢¿ÉÒÉZIP/²å¼þÎļþ¼°¶Ô"admin-ajax.php?action=alone_import_pack_install_plugin"·¾¶µÄÒì³£ÇëÇ󡣡£¡£¡£¡£¡£WordfenceÌØÊâÖ¸³ö£¬£¬£¬ £¬£¬£¬£¬À´×ÔËĸöÔ´IPµÄ¹¥»÷Á÷Á¿Õ¼½ÏÁ¿¸ß£¬£¬£¬ £¬£¬£¬£¬½¨ÒéÁ¬Ã¦·â±Õ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-actively-exploit-critical-rce-in-wordpress-alone-theme/