WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ
Ðû²¼Ê±¼ä 2025-06-121. WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ
6ÔÂ10ÈÕ£¬£¬£¬£¬£¬AkamaiÇå¾²Ç鱨ºÍÏìÓ¦ÍŶӣ¨SIRT£©¿ËÈÕ·¢Ã÷£¬£¬£¬£¬£¬Mirai½©Ê¬ÍøÂç±äÖÖÕýÔÚʹÓÃWazuhЧÀÍÆ÷ÖеÄÒ»¸öÒªº¦Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨CVE-2025-24016£©¾ÙÐй¥»÷»î¶¯¡£¡£¡£¸ÃÎó²î×î³õÓÚ½ñÄê2Ô·ݱ»Åû¶£¬£¬£¬£¬£¬µ«ÖÁ½ñÉÐδ±»Ìí¼Óµ½ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©µÄÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£WazuhÊÇÒ»¸öÓÃÓÚÍþвԤ·À¡¢¼ì²âºÍÏìÓ¦µÄÃâ·Ñ¿ªÔ´Æ½Ì¨£¬£¬£¬£¬£¬¶ø´Ë´ÎÊÜÓ°ÏìµÄ°æ±¾ÎªWazuh 4.4.0ÖÁ4.9.0£¬£¬£¬£¬£¬²¹¶¡ÒÑÔÚ4.9.1°æ±¾ÖÐÐû²¼¡£¡£¡£¸ÃÎó²îÔÊÐí¾ßÓÐAPI»á¼ûȨÏÞµÄÔ¶³Ì¹¥»÷Õßͨ¹ýÉÏ´«¶ñÒâJSONÎļþÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬ÔÚWazuh APIÖУ¬£¬£¬£¬£¬DistributedAPIµÄ²ÎÊý»á±»ÐòÁл¯ÎªJSON£¬£¬£¬£¬£¬²¢Ê¹ÓÃÌØ¶¨ÎļþÖеÄas_Wazuh_object¾ÙÐз´ÐòÁл¯¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÔÚDAPIÇëÇóÖÐ×¢Èëδ¾´¦Öóͷ£µÄ×ÖµäÀ´Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬½ø¶øµ¼ÖÂí§ÒâPython´úÂëµÄÖ´ÐУ¬£¬£¬£¬£¬»òÕ߸üͨË×µØËµ£¬£¬£¬£¬£¬ÓÕÆÏµÍ³ÔËÐжñÒâPython´úÂë¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬£¬¸ÃÎó²î½öÓ°ÏìÔËÐйýʱ°æ±¾µÄ»î¶¯WazuhЧÀÍÆ÷£¬£¬£¬£¬£¬Òò´Ë±Þ²ßÓû§¾¡¿ì¸üе½Wazuh 4.9.1»ò¸ü¸ß°æ±¾£¬£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÇå¾²Íþв¡£¡£¡£
https://cybernews.com/security/wazuh-servers-targeted-by-mirai-botnets/
2. FacebookÉÏ·¢Ã÷4000¶à¸öÐéÎ±ÍøÕ¾Ðû²¼ÐéαÉúÒâ
6ÔÂ10ÈÕ£¬£¬£¬£¬£¬Silent PushÍþвÆÊÎöʦ¿ËÈÕ·¢Ã÷ÁËÒ»¸öÃûΪ¡°GhostVendors¡±µÄÖØ´óÐéαÊг¡ÍøÂ磬£¬£¬£¬£¬Éæ¼°Áè¼Ý4000¸öÕ©ÆÍøÕ¾£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Ã°³äÁ˰üÀ¨ÑÇÂíÑ·¡¢Argos¡¢Costco¡¢Nordstrom¡¢ÀÍÁ¦Ê¿¡¢ÃܶûÎÖ»ù¹¤¾ß£¨Milwaukee Tools£¬£¬£¬£¬£¬ÔÚÕ©Æ¹ã¸æÖб»¸Ä¶¯Îª¡°Millaeke¡±£©ÒÔ¼°²ª¿Ï£¨Birkenstock£©µÈÔÚÄÚµÄÊýÊ®¸ö×ÅÃûÆ·ÅÆ¡£¡£¡£Õ©ÆÕßͨ¹ýFacebook MarketplaceͶ·Å´ó×Ú¹ã¸æ¾ÙÐÐÍÆ¹ã£¬£¬£¬£¬£¬Ê¹Óü«µÍµÄ¼ÛÇ®ÒýÓÕÏûºÄÕß¡£¡£¡£ËûÃÇÇÉÃîµØÊ¹ÓÃMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬£¬£¬£¬Ôڻ¿¢ÊºóѸËÙɾ³ýËùÓкۼ££¬£¬£¬£¬£¬Ê¹µÃ·ÀÓùÕßÄÑÒÔ×·×Ù¡£¡£¡£Õ©ÆÕß²»µ«¿Ë¡×ÅÃûÆ·ÅÆÍøÕ¾Ä£°å£¬£¬£¬£¬£¬»¹ÖÆ×÷ÁËÊýÊ®¸öÏàËÆµÄð³ä¸±±¾£¬£¬£¬£¬£¬Í¨¹ý¡°Çå²Ö¡±»ò¡°½ÚÈÕ´ÙÏú¡±µÈÒªº¦´ÊÒÔ¼°ÁîÈËÄÑÒÔÖÃÐŵÄÓÅ»ÝÉúÒâÀ´ÎüÒý»á¼ûÕß¡£¡£¡£Ò»µ©ÏûºÄÕßÖмƣ¬£¬£¬£¬£¬Õ©ÆÕß±ã¿ÉÄܲ»½»¸¶¶©¹ºµÄ²úÆ·»òÇÔÈ¡Æä¸¶¿îÏêϸÐÅÏ¢£¬£¬£¬£¬£¬ÊµÑé½ðÈÚڲơ£¡£¡£ÓÉÓÚMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔòÏà¶ÔËÉи£¬£¬£¬£¬£¬·ÀÓùÕßÔÚ×·×ÙÕâЩ¿ìËÙÆô¶¯ºÍ×èÖ¹µÄÕ©Æ»î¶¯Ê±ÃæÁÙÖØ´óÌôÕ½¡£¡£¡£Silent PushÖÒÑԳƣ¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÕâЩڲÆÍøÕ¾¾ÙÐÐÖÖÖÖÀàÐ͵ĽðÈÚڲƣ¬£¬£¬£¬£¬ÇÒÏÖÔÚÏÕЩ²»¿ÉÄÜÖÜȫ׷×Ù¸ÃÍøÂçÉϵĶñÒâ¹ã¸æ¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÏûºÄÕßÐèÌá¸ßСÐÄ£¬£¬£¬£¬£¬×èÖ¹ÊÜÆÊÜÆ£¬£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬£¬Ïà¹ØÆ½Ì¨Ò²Ó¦ÔöÇ¿î¿Ïµ£¬£¬£¬£¬£¬ÍêÉÆ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬£¬£¬£¬ÒÔÓÐÓù¥»÷´ËÀàթƻ¡£¡£¡£
https://cybernews.com/security/thousands-domains-pushing-phony-deals-on-facebook/
3. ·Ñ³ÇMastery SchoolsÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬³¬3.7ÍòÈËÊý¾Ýй¶
6ÔÂ10ÈÕ£¬£¬£¬£¬£¬·Ñ³ÇÌØÐíÑ§Ð£ÍøÂçMastery SchoolsÓÚ2024Äê9ÔÂÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂ37,031ÈËСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°¸ÃѧУÔڷѳǼ°¿¨Ä·µÇÔËÓªµÄ23ËùУ԰£¬£¬£¬£¬£¬Ô¼14,000ÃûѧÉúÊܵ½Ó°Ïì¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢ÆÕ±é£¬£¬£¬£¬£¬°üÀ¨Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼ¡¢Ñ§Éúµµ°¸¡¢ÒøÐм°²ÆÎñÐÅÏ¢¡¢ÉúÎïʶ±ðÊý¾ÝµÈ¡£¡£¡£¹¥»÷µ¼ÖÂѧУ½¹µãÓªÒµÖÐÖ¹£¬£¬£¬£¬£¬ÀÕË÷×éÖ¯DragonForceÐû³Æ¶ÔÊÂÎñÈÏÕæ£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË171GBÊý¾Ý£¬£¬£¬£¬£¬µ«Mastery Schoolsδ֤ʵ¸Ã˵·¨£¬£¬£¬£¬£¬Ò²Î´Í¸Â¶ÈëÇÖ·½·¨»òÊÇ·ñÖ§¸¶Êê½ð¡£¡£¡£Ð£·½ÌåÏÖ£¬£¬£¬£¬£¬ÒÑÈ·¶¨Î´¾ÊÚȨÕßÏÂÔØÁ˲¿·ÖÊý¾Ý£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»ÓÃÓÚÉí·ÝµÁÓûòڲơ£¡£¡£ÎªÐÖúÊÜÓ°ÏìÖ°Ô±£¬£¬£¬£¬£¬Mastery Schoolsͨ¹ýExperianµÄIdentityWorksЧÀÍÌṩÃâ·ÑÉí·Ý±£»£»£»£»£»¤£¬£¬£¬£¬£¬²¢ÔöÇ¿Á˶àÒòËØÈÏÖ¤Ó¦Óá¢ÌáÉýÁËÖÕ¶Ë¼à¿ØÄÜÁ¦£¬£¬£¬£¬£¬Í¬Ê±ÒýÈëÍâ²¿ÍøÂçÇ徲ר¼ÒÍŶӲ¢ÁªºÏÁª°îÖ´·¨²¿·ÖÉîÈëÊӲ졣¡£¡£ComparitechÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬2024ÄêÃÀ¹úѧУ¼°´óѧ¹²ÔâÓö79ÆðÀÕË÷¹¥»÷£¬£¬£¬£¬£¬²¨¼°½ü290ÍòÌõ¼Í¼£¬£¬£¬£¬£¬´ËÀ๥»÷³£µ¼ÖÂÖØ´óÔËÓªÖÐÖ¹£¬£¬£¬£¬£¬È翼ÊÔÑÓÆÚ¡¢Ð½×Êϵͳ̱»¾µÈ£¬£¬£¬£¬£¬¶Ô½ÌÓý»ú½á¹¹³ÉÑÏÖØÓ°Ïì¡£¡£¡£
https://www.infosecurity-magazine.com/news/mastery-schools-data-breach/
4. ¡°Çå¾²Ðж¯¡±¹ú¼ÊÖ´·¨£º¹¥»÷¶à¹úÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ
6ÔÂ11ÈÕ£¬£¬£¬£¬£¬´úºÅΪ¡°Çå¾²Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÓÚ2025Äê1ÔÂÖÁ4Ô¿ªÕ¹£¬£¬£¬£¬£¬Óɹú¼ÊÐ̾¯×é֯ǣͷ£¬£¬£¬£¬£¬Õë¶Ô26¸ö¹ú¼ÒµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ù´¡ÉèÊ©Õö¿ª´ó¹æÄ£¹¥»÷¡£¡£¡£Ðж¯Öص㹥»÷ͨ¹ýÆÕ±éѬȾÇÔÈ¡²ÆÎñºÍСÎÒ˽¼ÒÊý¾ÝµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍŻ¡£¡£ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡ÕË»§Æ¾Ö¤¡¢ä¯ÀÀÆ÷CookieºÍ¼ÓÃÜÇ®±ÒÇ®°üÏêÇéµÈÊý¾Ý£¬£¬£¬£¬£¬»ã±à³É¡°ÈÕÖ¾¡±ÔÚÍøÂç·¸·¨Êг¡³öÊÛ»òÓÃÓÚ¶¨Ïò¹¥»÷¸ß¼ÛÖµÊܺ¦Õß¡£¡£¡£´Ë´ÎÐж¯Ð§¹ûÏÔÖø£º¹Ø±Õ³¬20000¸öÓëÐÅÏ¢ÇÔÈ¡ÕßÏà¹ØµÄ¶ñÒâIP/ÓòÃû£¬£¬£¬£¬£¬²é»ñ41̨֧³ÖÐÅÏ¢ÇÔÈ¡»î¶¯µÄЧÀÍÆ÷£¬£¬£¬£¬£¬¾Ð²¶32ÃûÏÓÒÉÈË£¬£¬£¬£¬£¬Ã»ÊÕ100GBÊý¾Ý£¬£¬£¬£¬£¬²¢Í¨Öª216000ÃûÊܺ¦Õß¡£¡£¡£Õþ¸®»¹·¢Ã÷Ïã¸ÛÓÐ117̨ЧÀÍÆ÷×é³ÉµÄ´óÐͼ¯Èº£¬£¬£¬£¬£¬±»ÓÃ×÷ÍøÂç´¹ÂÚ¡¢ÍøÂçڲƺÍÉ罻ýÌåÕ©ÆÐж¯µÄÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£¡£Ô½ÄϾ¯·½ÔÚ´Ë´ÎÐж¯ÖÐÌåÏÖÍ»³ö£¬£¬£¬£¬£¬¾Ð²¶18ÃûÏÓÒÉÈË£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»ÃûרÃųöÊÛ¹«Ë¾ÕË»§µÄÍøÂç·¸·¨¼¯ÍÅÍ·Ä¿¡£¡£¡£Ðж¯»¹»ñµÃ¿¨°Í˹»ù¡¢Group-IBºÍÇ÷ÊÆ¿Æ¼¼µÈ˽ÈËÍøÂçÇå¾²ÏàÖúͬ°éµÄÐÖú¡£¡£¡£Group-IBÖ¸³ö£¬£¬£¬£¬£¬Ðж¯ÒÑÓ°ÏìÓëLumma¡¢RiseProºÍMETA StealerÏà¹ØµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÏòÕþ¸®ÌṩҪº¦Ê¹ÃüÇ鱨£¬£¬£¬£¬£¬²¢×·×ÙÁËÔËÓªÉÌÓÃÓÚÐû´«¶ñÒâÈí¼þºÍ³öÊÛ±»µÁÊý¾ÝµÄTelegramºÍ°µÍøÕË»§¡£¡£¡£
https://www.bleepingcomputer.com/news/security/operation-secure-disrupts-global-infostealer-malware-operations/
5. ÒÁÀû°ü¹Ü¼¯ÍÅÔâÍøÂç¹¥»÷µ¼ÖÂÓªÒµÖÐÖ¹
6ÔÂ11ÈÕ£¬£¬£¬£¬£¬ÒÁÀû°ü¹Ü¹«Ë¾£¨Erie Insurance£©ºÍÒÁÀûÅâ³¥¹«Ë¾¿ËÈÕ͸¶£¬£¬£¬£¬£¬ÖÜÄ©±¬·¢µÄÍøÂç¹¥»÷Êǵ¼ÖÂÆäÍøÕ¾ÓªÒµÖÐÖ¹Ç徲̨̱»¾µÄÔµ¹ÊÔÓÉ¡£¡£¡£ÒÁÀûÅâ³¥¹«Ë¾×÷ΪÒÁÀû°ü¹Ü¼¯ÍŵÄÖÎÀí¹«Ë¾£¬£¬£¬£¬£¬¸Ã¼¯ÍÅÊÇÒ»¼ÒÓµÓÐÁè¼Ý600Íò·ÝÓÐÓñ£µ¥µÄ¹¤ÒµºÍÒâÍâÏÕ°ü¹Ü¹«Ë¾£¬£¬£¬£¬£¬Í¨¹ý×ÔÁ¦ÊðÀíÈËÌṩ¶àÖÖ°ü¹ÜЧÀÍ¡£¡£¡£×Ô6ÔÂ7ÈÕÐÇÆÚÁùÆð£¬£¬£¬£¬£¬Erie Insurance±ãÔâÊÜ´óÃæ»ýÍ£µçºÍÓªÒµÖÐÖ¹£¬£¬£¬£¬£¬¿Í»§ÎÞ·¨µÇ¼¿Í»§ÃÅ»§£¬£¬£¬£¬£¬ÔÚÌá³öË÷Åâ»òÎüÊÕÎļþʱÓöµ½ÄÑÌâ¡£¡£¡£ÒÁÀûÅâ³¥¼¯ÍÅÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñ£¬£¬£¬£¬£¬³ÆÔÚ6ÔÂ7ÈÕ¼ì²âµ½¡°Òì³£ÍøÂç»î¶¯¡±¡£¡£¡£ÒÁÀû°ü¹ÜÍøÕ¾Ò²Ðû²¼Í¨Öª£¬£¬£¬£¬£¬³ÆÐÅÏ¢Çå¾²ÍŶÓÔÚ6ÔÂ7ÈÕ·¢Ã÷Òì³£ÍøÂç»î¶¯£¬£¬£¬£¬£¬²¢Á¬Ã¦½ÓÄÉÐж¯Ó¦¶Ô£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»¤ÏµÍ³ºÍÊý¾Ý¡£¡£¡£¹«Ë¾ÒÑÆô¶¯ÊÂÎñÏìÓ¦ÐÒ飬£¬£¬£¬£¬²¢½ÓÄɱ£»£»£»£»£»¤²½·¥È·±£ÏµÍ³Çå¾²¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÒÁÀû°ü¹ÜÕýÔÚÓëÖ´·¨²¿·ÖÏàÖú£¬£¬£¬£¬£¬²¢ÔÚÍøÂçÇ徲ר¼ÒµÄÐÖúϾÙÐÐÖÜÈ«µÄȡ֤ÆÊÎö£¬£¬£¬£¬£¬ÒÔÖÜÈ«ÏàʶÊÂÎñ¡£¡£¡£¹«Ë¾ÖÒÑԳƣ¬£¬£¬£¬£¬ÔÚÍ£µçʱ´ú²»»áÖµç»ò·¢Ë͵ç×ÓÓʼþ¸ø¿Í»§ÒªÇ󸶿£¬£¬£¬£¬²¢½¨Òé¿Í»§²»Òªµã»÷δ֪ȪԴµÄÁ´½Ó»òÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¹ØÓÚÐèÒªÌá³öË÷ÅâµÄͶ±£ÈË£¬£¬£¬£¬£¬¹«Ë¾ÌṩÁËÁªÏµÍâµØÊðÀíÈË»òERIEÊ×´ÎËðʧ֪ͨÍŶӵĵ绰£¬£¬£¬£¬£¬ÒÔ¼°¿Í»§Ð§À͵绰¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐδȷ¶¨´Ë´Î¹¥»÷ÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Ò²Î´Í¸Â¶Êý¾ÝÊÇ·ñÔÚ¹¥»÷Àú³ÌÖб»µÁ¡£¡£¡£ÒÁÀûÌåÏÖ£¬£¬£¬£¬£¬¸ÃÊÂÎñµÄËùÓйæÄ£¡¢ÐÔ×ÓºÍÓ°ÏìÈÔÓдý½øÒ»²½È·¶¨¡£¡£¡£
https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/
6. Roundcube RCEÎó²î²¹¶¡ºóÔâʹÓ㬣¬£¬£¬£¬³¬8Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ïì
6ÔÂ11ÈÕ£¬£¬£¬£¬£¬RoundcubeÕâһʢÐÐWebÓʼþƽ̨¿ËÈÕÆØ³öÑÏÖØÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨±àºÅCVE-2025-49113£©£¬£¬£¬£¬£¬¸ÃÎó²îÔÚ²¹¶¡Ðû²¼½ö¼¸Ììºó¾Í±»ÍþвÐÐΪÕßʹÓ㬣¬£¬£¬£¬¹¥»÷ÁËÁè¼Ý80,000Ì¨ÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷¡£¡£¡£¸ÃÎó²îCVSSÆÀ·Ö¸ß´ï9.9£¬£¬£¬£¬£¬´ËǰÒÑDZÔÚÊ®ÓàÄ꣬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´Ë¿ØÖÆÊÜÓ°Ïìϵͳ²¢ÔËÐжñÒâ´úÂ룬£¬£¬£¬£¬¶ÔÓû§ºÍ×éÖ¯×é³ÉÖØ´óΣº¦¡£¡£¡£FearsOffÊ×´´È˼æÊ×ϯִÐйÙKirill Firsov·¢Ã÷ÁË´ËÎó²î£¬£¬£¬£¬£¬ËûÔ¤¼Æ¸ÃÎó²îÓ°ÏìÁè¼Ý5300Íǫ̀Ö÷»ú£¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÃcPanel¡¢PleskµÈ¹¤¾ßµÄЧÀÍÆ÷¡£¡£¡£NISTÐû²¼µÄÇ徲ͨ¸æÖ¸³ö£¬£¬£¬£¬£¬Roundcube Webmail 1.5.10֮ǰµÄ°æ±¾ºÍ1.6.11֮ǰµÄ1.6.x°æ±¾±£´æ´ËÎó²î£¬£¬£¬£¬£¬ÒòURLÖеÄ_from²ÎÊýδÔÚÌØ¶¨ÎļþÖÐÑéÖ¤£¬£¬£¬£¬£¬µ¼ÖÂPHP¹¤¾ß·´ÐòÁл¯£¬£¬£¬£¬£¬´Ó¶øÔÊÐí¾ÓÉÉí·ÝÑéÖ¤µÄÓû§Ö´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¸ÃÎó²îÒÑÔÚRoundcube 1.6.11ºÍ1.5.10 LTS°æ±¾ÖлñµÃÐÞ¸´¡£¡£¡£Îó²îÅû¶ºó£¬£¬£¬£¬£¬Positive TechnologiesÑо¿Ö°Ô±Àֳɸ´ÏÖÁ˸ÃÎó²î£¬£¬£¬£¬£¬²¢±Þ²ßÓû§Á¬Ã¦¸üÐÂÖÁ×îа汾¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Shadowserver»ù½ð»áÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬£¬»¥ÁªÍøÉÏÈÔÓÐԼĪ84,000¸öRoundcubeʵÀýδ»ñµÃÐÞ²¹£¬£¬£¬£¬£¬±£´æÑÏÖØÇå¾²Òþ»¼¡£¡£¡£
https://securityaffairs.com/178887/hacking/over-80000-servers-hit-as-roundcube-rce-bug-gets-rapidly-exploited.html


¾©¹«Íø°²±¸11010802024551ºÅ