AkiraÀÕË÷Èí¼þÉù³Æ¹¥ÆÆApache OpenOfficeϵͳ

Ðû²¼Ê±¼ä 2025-11-03

1. AkiraÀÕË÷Èí¼þÉù³Æ¹¥ÆÆApache OpenOfficeϵͳ


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬ÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©×éÖ¯AkiraÐû³ÆÒѹ¥ÆÆApache OpenOfficeϵͳ²¢ÇÔÈ¡23GBÊý¾Ý£¬£¬ £¬£¬£¬Òý·¢Çå¾²¹Ø×¢¡£¡£¡£¡£¡£¡£Apache OpenOfficeÊÇApacheÈí¼þ»ù½ð»á¿ª·¢µÄÃâ·Ñ¿ªÔ´°ì¹«Èí¼þÌ×¼þ£¬£¬ £¬£¬£¬°üÀ¨ÎÄ×Ö´¦Öóͷ£¡¢µç×Ó±í¸ñ¡¢ÑÝʾÎĸ塢ͼÐλæÖÆ¡¢Êý¾Ý¿â¼°Êýѧ¹«Ê½½¨ÉèµÈ¹¤¾ß£¬£¬ £¬£¬£¬Ö§³ÖWindows¡¢LinuxºÍmacOSϵͳ£¬£¬ £¬£¬£¬×÷ΪMicrosoft OfficeµÄÃâ·ÑÌæ»»¼Æ»®±»ÆÕ±éʹÓᣡ£¡£¡£¡£¡£AkiraÉù³Æ±»µÁÊý¾Ý°üÀ¨Ô±¹¤Ãô¸ÐÐÅÏ¢£¨ÈçÏÖʵµØµã¡¢µç»°ºÅÂë¡¢¼ÝʻִÕÕ¡¢Éç»á°ü¹Ü¿¨¡¢ÐÅÓÿ¨ÐÅÏ¢µÈ£©¡¢²ÆÎñ¼Í¼¡¢ÄÚ²¿ÉñÃØÎļþ¼°´ó×ÚÓû§Ê¹ÓÃÎÊÌⱨ¸æ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹Â¶ÍøÕ¾ÌåÏÖ£¬£¬ £¬£¬£¬½«ºÜ¿ìÉÏ´«ÕâЩÎļþ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬×èÖ¹·¢¸åʱ£¬£¬ £¬£¬£¬ApacheÈí¼þ»ù½ð»áÉÐδ֤ʵϵͳ»òÊý¾ÝÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£¡£ÈôÈëÇÖÊôʵ£¬£¬ £¬£¬£¬¿ÉÄÜй¶ÄÚ²¿¿ª·¢Êý¾Ý»òТ˳ÕßÐÅÏ¢£¬£¬ £¬£¬£¬µ«°ì¹«Ì×¼þÓû§ÏÖÔÚ²»Ì«¿ÉÄÜÖ±½ÓÊÜÓ°Ï죬£¬ £¬£¬£¬ÒòÏÂÔØ»ù´¡ÉèÊ©Ó뿪·¢Ð§ÀÍÆ÷×ÔÁ¦£¬£¬ £¬£¬£¬¹«¹²Èí¼þ·Ö·¢ÇþµÀδÊܲ¨¼°¡£¡£¡£¡£¡£¡£


https://hackread.com/akira-ransomware-stole-apache-openoffice-data/


2. LinkedIn´¹ÂÚ¹¥»÷¼¤Ôö£¬£¬ £¬£¬£¬²ÆÎñ¸ß¹Ü³ÉÖ÷ҪĿµÄ


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬ºÚ¿ÍÕýͨ¹ýLinkedInƽ̨ÌᳫÕë¶Ô²ÆÎñ¸ß¹ÜµÄÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷£¬£¬ £¬£¬£¬Ö¼ÔÚÇÔÈ¡Æä΢ÈíÕË»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¾ÝPush SecurityÅû¶£¬£¬ £¬£¬£¬¹¥»÷Õßαװ³É¡°ÅäºÏ²Æ²ú¡±Í¶×Ê»ù½ð£¬£¬ £¬£¬£¬Í¨¹ýLinkedIn˽ÐÅ·¢ËͰüÀ¨¶ñÒâÁ´½ÓµÄ¡°Ö´Ðж­Ê»áÔ¼Ç롱£¬£¬ £¬£¬£¬Éù³ÆÓëAMCOΣº¦Í¶×Ê»ù½ðÏàÖúÍÆ³öÄÏÃÀÖÞͶ×ÊÏîÄ¿¡£¡£¡£¡£¡£¡£µã»÷Á´½Óºó£¬£¬ £¬£¬£¬Óû§»á±»Öض¨ÏòÖÁGoogle¿ª·ÅÖØ¶¨Ïò£¬£¬ £¬£¬£¬×îÖÕÌø×ªÖÁ¹¥»÷Õß¿ØÖƵÄFirebase´æ´¢Ò³Ã棬£¬ £¬£¬£¬¸ÃÒ³ÃæÎ±×°³É¡°LinkedIn Cloud Share¡±ÃÅ»§£¬£¬ £¬£¬£¬Õ¹Ê¾¶­Ê»áÏà¹ØÎĵµ¡£¡£¡£¡£¡£¡£µ±Óû§ÊµÑéÉó²éÎĵµÊ±£¬£¬ £¬£¬£¬ÏµÍ³»áÌáÐÑ¡°Ê¹ÓÃMicrosoftÉó²é¡±£¬£¬ £¬£¬£¬½ø¶øÌø×ªÖÁαÔìµÄ΢ÈíµÇÂ¼Ò³Ãæ£¬£¬ £¬£¬£¬²¢Í¨¹ýCloudflare TurnstileÑéÖ¤Âë×èÖ¹×Ô¶¯»¯Çå¾²¹¤¾ßÆÊÎö£¬£¬ £¬£¬£¬×îÖÕͨ¹ýÖÐÐÄÈ˹¥»÷²¶»ñÓû§Æ¾Ö¤ºÍ»á»°cookie¡£¡£¡£¡£¡£¡£Push SecurityÖ¸³ö£¬£¬ £¬£¬£¬ÒÑÍùÒ»¸öÔÂÔ¼34%µÄÍøÂç´¹ÂÚ¹¥»÷À´×ÔLinkedInµÈ·Çµç×ÓÓʼþÇþµÀ£¬£¬ £¬£¬£¬½ÏÈý¸öÔÂǰȱ·¦10%µÄ±ÈÀýÏÔÖøÉÏÉý¡£¡£¡£¡£¡£¡£Óû§Ó¦Ð¡ÐÄLinkedInÉϵÄÉÌҵʱ»ú»ò¶­Ê»áÔ¼ÇëÐÂÎÅ£¬£¬ £¬£¬£¬×èÖ¹µã»÷˽ÐÅÖеÄÁ´½Ó£¬£¬ £¬£¬£¬ÓÈÆäÊÇʹÓÃ.top¡¢.icu¡¢.xyzµÈ²»³£¼û¶¥¼¶ÓòÃûµÄÁ´½Ó¡£¡£¡£¡£¡£¡£ÊÕµ½Î´¾­ÇëÇóµÄÐÅϢʱ£¬£¬ £¬£¬£¬Ðèͨ¹ýÆäËûÇþµÀºËʵ·¢¼þÈËÉí·ÝºÍÄÚÈÝÕýµ±ÐÔ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/linkedin-phishing-targets-finance-execs-with-fake-board-invites/


3. ÈÕ±¾Á¬Ëø³¬ÊÐSuper Value Co.Ôâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄ÷è÷ëÀÕË÷Èí¼þÍÅ»ïÔٴη¢¶¯¹¥»÷£¬£¬ £¬£¬£¬Ä¿µÄΪÈÕ±¾Á¬Ëø³¬ÊÐSuper Value Co.£¬£¬ £¬£¬£¬²¢ÔÚ°µÍøÐ¹Â¶ÆäÔ±¹¤¼°²ÆÎñÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê»îÔ¾ÒÔÀ´£¬£¬ £¬£¬£¬ÒÑÔì³É947ÃûÊܺ¦Õߣ¬£¬ £¬£¬£¬³ÉΪÒÑÍù12¸öÔÂ×î»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬ £¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÈËÁ¦×ÊÔ´Îļþ¡¢Çå¾²ÃÜÔ¿×ªÒÆÖ¤Êµ¡¢¼¨Ð§±¨¸æ¡¢ÊÂÇ鳡ºÏʹʼͼ¡¢ÈËΪƱ¾Ý¼°²ÆÎñ±¨¸æµÈ£¬£¬ £¬£¬£¬º­¸ÇÔ±¹¤±àºÅ¡¢È«Ãû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Ð½×ʵÈÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬ÈôÊôʵ½«Ê¹Ô±¹¤ÃæÁÙÉí·Ý͵ÇÔΣº¦£¬£¬ £¬£¬£¬ÆóÒµÔËӪϸ½Ú̻¶¿ÉÄܱ»¾ºÕùµÐÊÖʹÓᣡ£¡£¡£¡£¡£÷è÷ëÍÅ»ïÀúÊ·¹¥»÷¹æÄ£ÆÕ±é£¬£¬ £¬£¬£¬ÔøÕë¶ÔÒ½Ôº¡¢ÖÆÔìÒµ¡¢µçÁ¦¹«Ë¾¼°Æû³µÆóÒµµÈ¡£¡£¡£¡£¡£¡£×¨¼ÒÖ¸³ö£¬£¬ £¬£¬£¬¸ÃÍÅ»ïÓëLockBit¡¢DragonForceµÈÀÕË÷Èí¼þ½áÃË£¬£¬ £¬£¬£¬Í¨¹ý×ÊÔ´¹²ÏíÌáÉý¹¥»÷Õ½ÂÔ¼°ÆµÂÊ£¬£¬ £¬£¬£¬¼Ó¾çÍøÂçÇå¾²Íþв¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/qilin-super-value-japan-breach/


4. CISA֤ʵLinuxÄں˸ßΣÎó²î±»ÓÃÓÚÀÕË÷Èí¼þ¹¥»÷


10ÔÂ31ÈÕ£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖÜËÄ֤ʵ£¬£¬ £¬£¬£¬LinuxÄÚºËÖÐÒ»¸ö¸ßΣȨÏÞÌáÉýÎó²î£¨CVE-2024-1086£©Õý±»ÓÃÓÚÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚnetfilter: nf_tablesÄÚºË×é¼þµÄÊͷźóʹÓÃÈõµã£¬£¬ £¬£¬£¬ÓÚ2024Äê1ÔÂ31ÈÕÅû¶£¬£¬ £¬£¬£¬ÆäȪԴ¿É×·ËÝÖÁ2014Äê2ÔµĴúÂëÌá½»£¬£¬ £¬£¬£¬2024Äê1ÔÂÒÑͨ¹ý²¹¶¡ÐÞ¸´¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²î¿ÉʹÍâµØ¹¥»÷ÕßÌáÉýȨÏÞÖÁroot¼¶£¬£¬ £¬£¬£¬µ¼ÖÂϵͳ±»ÍêÈ«½ÓÊÜ¡¢ºáÏòÒÆ¶¯ÖÁÆäËû×°±¸¼°Êý¾Ý͵ÇÔ¡£¡£¡£¡£¡£¡£2024Äê3ÔÂÏÂÑ®£¬£¬ £¬£¬£¬Çå¾²Ñо¿Ö°Ô±¡°Notselwyn¡±ÔÚGitHubÐû²¼¿´·¨ÑéÖ¤£¨PoC£©´úÂ룬£¬ £¬£¬£¬Õ¹Ê¾ÆäÔÚLinuxÄÚºË5.14ÖÁ6.6°æ±¾ÖеÄʹÓ÷½·¨£¬£¬ £¬£¬£¬Ö¤ÊµÎó²î¿É±»ÏÖʵ¹¥»÷¡£¡£¡£¡£¡£¡£Îó²îÓ°Ïì¹æÄ£ÆÕ±é£¬£¬ £¬£¬£¬Éæ¼°Debian¡¢Ubuntu¡¢Fedora¡¢Red HatµÈÖ÷Á÷Linux¿¯Ðаæ£¬£¬ £¬£¬£¬º­¸ÇÄں˰汾3.15ÖÁ6.8-rc1¡£¡£¡£¡£¡£¡£CISAÓÚ2024Äê5Ô½«¸ÃÎó²îÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬ £¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ6ÔÂ20ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£ÈôÎÞ·¨Á¬Ã¦ÐÞ¸´£¬£¬ £¬£¬£¬CISA½¨Òé½ÓÄÉ»º½â²½·¥¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-linux-privilege-escalation-flaw-now-exploited-in-ransomware-attacks/


5. δ´ò²¹¶¡µÄ˼¿Æ×°±¸¿ÉÄÜѬȾBadCandy²¡¶¾


10ÔÂ31ÈÕ£¬£¬ £¬£¬£¬°Ä´óÀûÑÇÕþ¸®¿ËÈÕ·¢³öÑÏÖØÇå¾²ÖÒÑÔ£¬£¬ £¬£¬£¬Ö¸³ö¸Ã¹úδÐÞ¸´Cisco IOS XE×°±¸ÕýÔâÊÜʹÓÃCVE-2023-20198¸ßΣÎó²îµÄÒ»Á¬ÍøÂç¹¥»÷£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ýÖ²Èë»ùÓÚLuaµÄBadCandy webshellѬȾ·ÓÉÆ÷¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδÊÚȨԶ³Ì¹¥»÷Õßͨ¹ýWeb½çÃæ½¨ÉèÍâµØÖÎÀíÔ±ÕË»§²¢ÍêÈ«¿ØÖÆ×°±¸£¬£¬ £¬£¬£¬Ë¼¿ÆËäÓÚ2023Äê10ÔÂÐû²¼²¹¶¡£¬£¬ £¬£¬£¬µ«Îó²îʹÓóÌÐòÁ½Öܺ󼴹ûÕæ£¬£¬ £¬£¬£¬µ¼Ö´ó×Ú̻¶ÔÚ»¥ÁªÍøµÄ×°±¸±»Ö²ÈëºóÃÅ¡£¡£¡£¡£¡£¡£°Ä´óÀûÑÇÍøÂçÇå¾²²¿·Ö£¨ASD£©ÆÀ¹ÀÏÔʾ£¬£¬ £¬£¬£¬2025Äê7ÔÂÖÁ½ñ£¬£¬ £¬£¬£¬¾³ÄÚ³¬400̨װ±¸ÔøÑ¬È¾BadCandy£¬£¬ £¬£¬£¬×èÖ¹10ÔÂβÈÔÓг¬150̨װ±¸Ò»Á¬Ñ¬È¾¡£¡£¡£¡£¡£¡£Ö»¹ÜѬȾÊýÄ¿³ÊϽµÇ÷ÊÆ£¬£¬ £¬£¬£¬µ«¹¥»÷ÕßÄܼì²âwebshell±»ÒƳýºóÖØÐÂÖ²Èëͳһװ±¸£¬£¬ £¬£¬£¬ÐγÉ"ѬȾ-ɨ³ý-ÔÙѬȾ"µÄÑ­»·¹¥»÷ģʽ¡£¡£¡£¡£¡£¡£BadCandyÒ»µ©×°Ö㬣¬ £¬£¬£¬¿ÉÈù¥»÷ÕßÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁ£¬ £¬£¬£¬ÖØÆôºówebshellË䱻ɨ³ý£¬£¬ £¬£¬£¬µ«Î´´ò²¹¶¡µÄ×°±¸ÒòWeb½çÃæÈÔ¿É»á¼û£¬£¬ £¬£¬£¬¹¥»÷Õ߿ɿìËÙÖØÐ°²ÅÅ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/australia-warns-of-badcandy-infections-on-unpatched-cisco-devices/


6. ºÚ¿ÍÉù³ÆÇÔÈ¡±öϦ·¨ÄáÑÇ´óѧ120Íò¾èÔùÕßÐÅÏ¢


11ÔÂ2ÈÕ£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬±öϦ·¨ÄáÑÇ´óѧÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬Ò»ÃûºÚ¿Í×éÖ¯Ðû³Æ¶ÔÉÏÖܱ¬·¢µÄ"ÎÒÃDZ»ºÚ¿Í¹¥»÷ÁË"¶ñÒâÓʼþÊÂÎñÈÏÕæ£¬£¬ £¬£¬£¬²¢Éù³ÆÒÑÇÔȡԼ120ÍòÃûѧÉú¡¢Ð£ÓѼ°¾èÔùÕßµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñʼÓÚ10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬ºÚ¿Íͨ¹ýÔ±¹¤PennKeyµ¥µãµÇ¼ÕË»§ÇÖÈë´óѧϵͳ£¬£¬ £¬£¬£¬»ñµÃVPN¡¢SalesforceÊý¾Ýƽ̨¡¢QlikÆÊÎöϵͳ¡¢SAPÉÌÒµÖÇÄܼ°SharePointÎļþϵͳµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÅû¶£¬£¬ £¬£¬£¬ÆäÓÚ10ÔÂ31ÈÕÍê³ÉÊý¾ÝÏÂÔØ£¬£¬ £¬£¬£¬ÇÔÈ¡ÄÚÈݰüÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢¾»×ʲú¹ÀËã¡¢¾èÔùÀúÊ·¼°×ڽ̡¢ÖÖ×å¡¢ÐÔÈ¡ÏòµÈÉú³Ýͳ¼ÆÐÅÏ¢¡£¡£¡£¡£¡£¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬£¬ £¬£¬£¬ºÚ¿ÍÏòýÌåÌṩÁËϵͳ½ØÍ¼ºÍÊý¾ÝÑù±¾£¬£¬ £¬£¬£¬²¢Ðû²¼1.7GBѹËõÎļþ£¬£¬ £¬£¬£¬ÄÚº¬µç×Ó±í¸ñ¡¢¾èÔùÖÊÁϵȾݳÆÀ´×ÔSharePointºÍBoxϵͳµÄÎļþ¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý±öϦ·¨ÄáÑÇ´óѧÍйÜÔÚSalesforce Marketing CloudµÄconnect.upenn.eduƽ̨£¬£¬ £¬£¬£¬ÏòÔ¼70ÍòÊÕ¼þÈË·¢Ë͹¥»÷ÐÔÓʼþ£¬£¬ £¬£¬£¬ÄÚÈݰüÀ¨¶Ô´óѧÕÐÉúÕþ²ß¼°Çå¾²²½·¥µÄÇ¿ÁÒÆ·ÆÀ¡£¡£¡£¡£¡£¡£±öϦ·¨ÄáÑÇ´óѧ»ØÓ¦³Æ"ÕýÔÚ¼ÌÐøÊÓ²ì"£¬£¬ £¬£¬£¬²¢ÌáÐѾèÔùÕßСÐÄÕë¶ÔÐÔ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-hacker-claims-1.2-million-donor-data-breach/