¹È¸èGemini¼ä½ÓÌáÐÑ×¢Èë·ìÏ¶ÆØ¹â

°ä²¼¹¦·ò 2026-01-21

1. ¹È¸èGemini¼ä½ÓÌáÐÑ×¢Èë·ìÏ¶ÆØ¹â


1ÔÂ19ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶һÏîÀûÓüä½ÓÌáÐÑ×¢Èë¼¼Êõ¹¥»÷¹È¸èGeminiµÄ·ì϶£¬¿ÉÈÆ¹ýÊÚȨ·À»¤»úÖÆ£¬½«¹È¸èÈÕÀú×÷ΪÊý¾ÝÌáȡͨµÀ¡£¡£Miggo Security×êÑÐÖ÷¹ÜLiad EliyahuÖ¸³ö£¬¹¥»÷Õßͨ¹ýÔÚÈÕÀúÔ¼ÇëÖÐǶÈë¶ñÒâÌìȻ˵»°ÌáÐÑ£¬ÎÞÐèÓû§Ö±½Ó½»»¥¼´¿É½Ó¼û¸öÈË»áÒéÊý¾Ý²¢´´½¨ºýŪÐÔÊÂÎñ¡£¡£¹¥»÷Á´Ê¼ÓÚ¹¥»÷Õß·¢ËÍÔ̺¬ÌØÖÆÌáÐѵÄÈÕÀúÔ¼Çë¡£¡£µ±Óû§ÏòGeminiѯÎÊÈÕ³ÌÎÊÌâʱ£¬AI»á½âÎöÊÂÎñÃèÊöÖеĶñÒâÌáÐÑ£¬»ã×ÜÓû§Ìض¨ÈÕÆÚµÄ»áÒéÊý¾Ý£¬´´½¨ÐÂÈÕÀúÊÂÎñ²¢Ð´ÈëÌáÒª¡£¡£ÔںܶàÆóÒµÅäÖÃÖУ¬¸ÃÐÂÊÂÎñ¶Ô¹¥»÷Õ߿ɼû£¬Ê¹ÆäÄÜÇÔÈ¡¸öÈËÊý¾Ý¶øÓû§¾ø²»ÖªÇé¡£¡£Õâ´ÎÅû¶ÕýÖµÆäËûAI°²È«·ì϶Ƶ·¢Ö®¼Ê¡£¡£VaronisÃèÊöµÄ¡°Reprompt¡±¹¥»÷¿ÉÈÆ¹ýÆóÒµ°²È«½ÚÖÆÌáÈ¡Microsoft CopilotÃô¸ÐÊý¾Ý£»XM CyberÔڹȸèÔÆVertex AIºÍRayÖз¢ÏÖȨÏÞÌáÉý·ì϶£¬ÔÊÐíµÍȨÏÞ¹¥»÷Õß½Ù³Ö¸ßȨÏÞ·þÎñ´úÀí£»The Librarian¹¤¾ß´æÔÚ¶à¸ö·ì϶£¨CVE-2026-0612µÈ£©£¬¿Éй¶ÄÚ²¿»ù´¡ÉèÊ©ÐÅÏ¢£»ÏµÍ³ÌáÐÑÌáÈ¡·ì϶ͨ¹ýLLMÖúÊÖÌáȡϵͳÌáÐÑ£»Claude CodeÊг¡´æÔÚ¶ñÒâ²å¼þ¹¥»÷£»Cursor´æÔÚRCE·ì϶£¨CVE-2026-22708£©£¬¿ÉÀûÓÃShellºÅÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£


https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html


2. EverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾


1ÔÂ20ÈÕ£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾£¬²¢ÇÔÈ¡¸ß´ï861GBµÄ¿Í»§Êý¾Ý¼°¹«Ë¾ÄÚ²¿Îļþ¡£¡£¸Ã×é֯ͨ¹ý°ä²¼ÄÚ²¿½ØÍ¼×ôÖ¤Æä˵·¨£¬½ØÍ¼ÏÔÊ¾Éæ¼°2023ÖÁ2026ÄêµÄ²ÆÕþ»ã±¨¡¢¡¢É󼯏ú×ټͼ¡¢¡¢³É±¾¸ú×Ù±í¡¢¡¢ERPǨáãÎļþ¡¢¡¢¶¨¼ÛÊý¾Ý¼°Ãô¸ÐÄÚ²¿Í¨Ñ¶¼Í¼¡£¡£¶à¸öĿ¼°´ÔÂϸ·Ö£¬°µÊ¾Æä¶Ô¹ÜÕÊ»òÆóÒµ×ÊÔ´¹æ»®ÏµÍ³Õ¼Óнṹ»¯½Ó¼ûȨÏÞ¡£¡£ÆäÖС°Í¶×ÊÕßÐÅÏ¢¡±Ä¿Â¼¿ÉÄÜÔ̺¬¶­Ê»ἶ±ð»úÃÜ×ÊÁÏ£¬¶ø¡°ÁªÏµÈËÊý¾Ý¿â¡±µç×Ó±í¸ñÔò¾ßÌå¼Í¼ÁËÃÀ¹ú¡¢¡¢Ó¢¹ú¡¢¡¢ÐÂ¼ÓÆÂºÍÓ¡¶ÈµÈµØÍ¶×ÊÕß¼°Ã³Ò×ͬ°éµÄÐÕÃû¡¢¡¢µØÖ·¡¢¡¢µç»°¼°ÓÊÏä¡£¡£´ËÍ⣬ÄÚ²¿ÃŵêÊý¾ÝÔ̺¬¾­ÀíÐÕÃû¡¢¡¢mcdonaldsindia.comÓÊÏä¼°ÊýÊ®¼ÒÃŵêµÄÖ±½ÓÁªÏµµç»°¡£¡£EverestÒªÇóÂóµ±ÀÍÓ¡¶È¹«Ë¾ÔÚÁ½ÌìÄÚ»ØÓ¦£¬µ«½ØÖÁĿǰ¸Ã¹«Ë¾ÉÐδ°ä²¼¹Ù·½ÉêÃ÷£¬ÊÂÎñÕæÊµÐÔÈÔÐè½øÒ»²½Ö¤Êµ¡£¡£


https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/


3. ACF Extended¸ßΣ·ì϶Òý´ó¹æÄ£¿úËÅ·çÏÕ


1ÔÂ20ÈÕ£¬½üÈÕ£¬WordPressµÄAdvanced Custom Fields: Extended£¨ACF Extended£©²å¼þ±»ÆØ´æÔÚÑÏÖØ°²È«·ì϶CVE-2025-14533£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔ¶³ÌÀûÓø÷ì϶»ñÈ¡ÖÎÀíȨÏÞ¡£¡£¸Ã²å¼þĿǰÒÑÔÚ10Íò¸öÍøÕ¾ÉÏÆôÓã¬×÷ΪAdvanced Custom Fields£¨ACF£©µÄÀ©´ó²å¼þ£¬Îª¿ª·¢ÈËÔ±ºÍ¸ß¼¶ÍøÕ¾¹¹½¨ÕßÌṩ¶îÍâÖ°ÄÜ¡£¡£·ì϶´æÔÚÓÚACF Extended 0.9.2.1¼°¸üÔç°æ±¾ÖУ¬Í¨¹ýÀÄÓòå¼þµÄ¡°²åÈëÓû§/¸üÐÂÓû§¡±±íµ¥²Ù×÷ʵÏÖ¡£¡£ÎÊÌâ±¾Ô­ÔÚÓÚ±íµ¥Óû§´´½¨»ò¸üйý³ÌÖУ¬½ÇÉ«ÏÞ¶Èδ±»Ç¿ÖÆÖ´ÐУ¬¼´±ã×Ö¶ÎÉèÖÃÖÐÕýÈ·ÅäÖÃÁ˽ÇÉ«ÏÞ¶È£¬¹¥»÷ÕßÈÔ¿ÉËÁÒâÉèÖÃÓû§½ÇÉ«£¬´Ó¶øÆëÈ«½ÚÖÆÍøÕ¾¡£¡£¸Ã·ì϶Óɰ²È«×êÑÐÔ±Andrea BocchettiÓÚ2025Äê12ÔÂ10ÈÕ·¢ÏÖ²¢»ã±¨£¬¹©¸øÉÌÔÚËÄÌìºó°ä²¼0.9.2.2°æ±¾ÐÞ¸´¡£¡£È»¶ø£¬Æ¾¾Ýwordpress.orgÏÂÔØÍ³¼Æ£¬×ÔÐÞ¸´ÒÔÀ´Ô¼5ÍòÓû§ÏÂÔØÁ˸òå¼þ£¬Èç¹ûËùÓÐÏÂÔØ¾ùΪ×îа汾£¬ÈÔÓÐÒ»ÑùÊýÁ¿ÍøÕ¾Ãæ¶Ô¹¥»÷·çÏÕ¡£¡£


https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/


4. VoidLinkÔÆ¶ñÒâÈí¼þ²û·¢³öÏÔÖøµÄAIÌìÉúÌØµã


1ÔÂ20ÈÕ£¬½üÈÕ£¬Check Point ResearchÅû¶ÁËÒÔÔÆÎªÖÐÐĵÄVoidLink¶ñÒâÈí¼þ¿ò¼ÜµÄ¾ßÌåÐÅÏ¢£¬¸Ã¿ò¼Ü±»ÆÀ¹ÀΪÓɾ«Í¨¶à±à³Ì˵»°µÄÖйú¿ª·¢Õß½èÖúÈËΪÖÇÄÜÄ£ÐÍ¿ª·¢¡£¡£×÷Ϊ¸ß¼¶Linux¶ñÒâÈí¼þ£¬VoidLinkÔ̺¬×Ô½ç˵¼ÓÔØÆ÷¡¢¡¢Ö²È뷨ʽ¡¢¡¢rootkit¶ã±ÜÄ£¿é¼°ÊýÊ®¸öÖ°ÄÜÀ©´ó²å¼þ£¬Æä¿ª·¢ÖÜÆÚÖ®¶Ì¡¢¡¢´úÂëÁ¿Ö®¾ÞÒý·¢°²È«½ç¸ß¶È¹Ø×¢¡£¡£×êÑÐÖ¸³ö£¬VoidLinkµÄ¿ª·¢Ê¼ÓÚ2025Äê11ÔÂÏÂÑ®£¬¿ª·¢ÕßתÏòʹÓÃǶÈëAIÖÐÐÄIDE TRAEµÄÖÇÄÜÖúÊÖTRAE SOLO¡£¡£ÓÉÓÚ·þÎñÆ÷´æÔÚÊ¢¿ªÄ¿Â¼·ì϶£¬¿ª·¢¹ý³ÌÖеÄÔ´´úÂë¡¢¡¢Îĵµ¡¢¡¢³å´Ì´òËã¼°ÄÚ²¿ÏîÄ¿½á¹¹±»²»²âй¶¡£¡£Check Pointͨ¹ý¶ÈÎöÕâЩÎļþ·¢ÏÖ£¬¿ª·¢Õßѡȡ¹æ·¶Çý¶¯¿ª·¢£¨SDD£©Ä£Ê½£¬Í¨¹ýAIÌìÉúº­¸Ç¼Ü¹¹¡¢¡¢µü´úºÍ³ß¶ÈµÄ¶àÍŶӿª·¢´òËã¡£¡£Ö»¹ÜÏîÄ¿¹æ»®ÖÜÆÚΪ16-30ÖÜ£¬µ«ÏÖʵ½öÓÃÒ»Öܼ´ÊµÏÖ¿ÉÔËÐа汾£¬ÖÁ2025Äê12Ô³õ´úÂëÁ¿ÒÑ´ï88,000ÐС£¡£


https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/


5. TP-LinkÐÞ¸ßΣ·ì϶£º32¿îÆóÒµÉãÏñÍ·´æÉí·ÝÑéÖ¤·çÏÕ


1ÔÂ20ÈÕ£¬TP-Link½üÆÚÐÞ¸´Á˱àºÅΪCVE-2026-0629£¨CVSSÆÀ·Ö8.7£©µÄ¸ßΣ·ì϶£¬¸Ã·ì϶ӰÏìÆäVIGI²úÆ·ÏßÖг¬¹ý32¿îVIGI CºÍVIGI InSightÆóÒµ¼¶CCTVÉãÏñÍ·ÐͺÅ¡£¡£·ì϶Ö÷ÌâÔÚÓÚ±¾µØWeb½çÃæµÄÃÜÂ븴ԭְÄÜ´æÔÚÉí·ÝÑéÖ¤ÈÆ¹ýȱµã£¬¹¥»÷Õß¿ÉÀûÓô˷ì϶ͨ¹ý°Ñ³Ö¿Í»§¶Ë״̬£¬ÔÚδ¾­±¾µØÍøÂçÉí·ÝÑéÖ¤µÄÇé¿öÏÂÖ±½ÓÖØÖÃÖÎÀíÔ±ÃÜÂ룬´Ó¶ø»ñµÃÉ豸µÄÆëÈ«ÖÎÀíȨÏÞ¡£¡£¾Ý°²È«²¼¸æÅû¶£¬¸Ã·ì϶ÔÊÐí¾ÖÓòÍø¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬Ö±½ÓÅú¸ÄÖÎÀíÔ±ÕË»§ÃÜÂë¡£¡£Ò»µ©³É¹¦ÀûÓ㬹¥»÷Õß²»½öÄܽÚÖÆÉãÏñÍ·ÅäÖᢡ¢½Ó¼ûʵʱ¼°º¹ÇàÊÓÆµÊý¾Ý£¬»¹¿É½«É豸ÄÉÈë½©Ê¬ÍøÂçÌáÒéDDoS¹¥»÷£¬»ò´Û¸Ä¼à¿ØÖ¤¾Ý¡¢¡¢ÇÖÈÅÆóÒµÔËÓª£¬ÉõÖÁͨ¹ýÉãÏñÍ·×÷ÎªÌø°åÈëÇÖÆóÒµÄÚÍø£¬Òý·¢¼äµý»î¶¯¡¢¡¢ÎïÀíÈëÇÖµÈÑÜÉú·çÏÕ£¬²¢¿ÉÄÜÒò¼Óº¦ÒþÖÔ´¥·¢Ë¾·¨Óë¼à¹Ü´¦·£¡£¡£


https://securityaffairs.com/187110/hacking/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems.html


6. "Nomad Leopard"´¹µö¹¥»÷¾«×¼Õë¶Ô°¢¸»º¹µ±¾Ö¹ÍÔ±


1ÔÂ21ÈÕ£¬Ó¡¶ÈÍøÂ簲ȫ¹«Ë¾Seqrite½üÈÕÅû¶£¬ºÚ¿ÍÕýͨ¹ýαÔì°¢¸»º¹×ÜÀí°ì¹«ÊÒ¹Ù·½º¯¼þµÄÍøÂç´¹µöÓʼþ£¬¶Ô°¢¸»º¹µ±¾Ö¹ÍÔ±ÌáÒ龫׼¹¥»÷¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê12ÔÂÆð±»·¢ÏÖ£¬¹¥»÷Õß¾«ÐÄÉè¼Æµö¶üÎĵµ£¬ÒÔ×Ú½ÌÎʺòÓ↑ͷ¡¢¡¢Ô̺¬²ÆÕþÉ걨Åúʾ²¢Î±Ôì¸ß¼¶¹ÙÔ±ÊðÃûµÄ"Õýʽ¹«º¯"£¬ÓÕʹָ±ê´ò¿ªÎļþºóÖ²ÈëFalseCub¶ñÒâÈí¼þ£¬ÊµÏÖÊý¾ÝÇÔÈ¡Óë±ð´«¡£¡£×êÑÐÈËÔ±·¢ÏÖ£¬¹¥»÷Õß½«GitHub×÷ÎªÒ»Ê±ÔØºÉÍÐ¹ÜÆ½Ì¨£¬Í¨¹ý12ÔÂÏÂÑ®´´½¨µÄÕ˺ŷַ¢¶ñÒâÎļþ£¬Ðж¯ÊµÏÖºóѸËÙɾ³ýÄÚÈÝ¡£¡£¸üÖµµÃ¹Ø×¢µÄÊÇ£¬ÍþвÐÐΪÕßÔÚScribdÉÏ´«ÁË´óÁ¿Ë¾·¨ÓëÐÐÕþÎļþ£¬Ô̺¬°¢¸»º¹µ±¾ÖÖ¸Áî¡¢¡¢¹ú·À²¿Í¨Ñ¶Îļþ¼°ÃÀ¹úÉæ°¢¸»º¹°ü±ÓÈËȨÎļþ£¬ÕâЩ×ÊÁÏ»ò³ÉΪ½«À´¹¥»÷µÄ"µö¶ü¿â"¡£¡£¹¥»÷ÕßʹÓÃ"Afghan Khan"»¯Ãû£¬ÔÚPinterest¡¢¡¢DailymotionµÈƽ̨»î¶¯£¬²¿ÃÅÕ˺ŹØÁª°Í»ù˹̹£¬ÇÒÓÃÓÚÖØ¶¨ÏòµÄ¶ÌÁ´½ÓÒàÔ´×Ô°Í»ù˹̹¡£¡£Õâ´Î¹¥»÷±»¶¨ÃûΪ"Nomad Leopard"£¬SeqriteÖÒ¸æÆäÁìÓò¿ÉÄÜÀ©´óÖÁÆäËû¹ú¶È¡£¡£


https://therecord.media/hackers-target-afghan-workers