CISAÖÒÑÔSonicWallSMA×°±¸Îó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃ
Ðû²¼Ê±¼ä 2025-04-181. CISAÖÒÑÔSonicWallSMA×°±¸Îó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃ
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÓÚÖÜÈý½«Ó°ÏìSonicWallÇå¾²ÒÆ¶¯»á¼û£¨SMA£©100ϵÁÐÍø¹ØµÄ¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2021-20035£¨CVSSÆÀ·Ö£º7.2£©Ìí¼ÓÖÁÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£¡£¡£´ËÎó²îÓë²Ù×÷ϵͳÏÂÁî×¢ÈëÓйأ¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£SonicWallÔÚ2021Äê9ÔÂÐû²¼µÄÇ徲ͨ¸æÖÐÖ¸³ö£¬£¬£¬£¬£¬£¬£¬SMA100ÖÎÀí½çÃæÖÐÌØÊâÔªËØµÄ²»µ±Öкͣ¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¾ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒÔ'nobody'Óû§Éí·Ý×¢Èëí§ÒâÏÂÁ£¬£¬£¬£¬£¬£¬½ø¶ø¿ÉÄܵ¼Ö´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÔËÐÐÌØ¶¨°æ±¾µÄSMA200¡¢SMA210¡¢SMA400¡¢SMA410ºÍSMA500v£¨ESX¡¢KVM¡¢AWS¡¢Azure£©×°±¸£¬£¬£¬£¬£¬£¬£¬Ïêϸ°üÀ¨10.2.1.0-17sv¼°¸üÔç°æ±¾¡¢10.2.0.7-34sv¼°¸üÔç°æ±¾ºÍ9.0.0.10-28sv¼°¸üÔç°æ±¾¡£¡£¡£¡£¡£¡£¡£ÕâЩ°æ±¾ÒÑÔÚºóÐøµÄ¸üÐÂÖлñµÃÐÞ¸´£¬£¬£¬£¬£¬£¬£¬»®·ÖΪ10.2.1.1-19sv¼°¸ü¸ß°æ±¾¡¢10.2.0.8-37sv¼°¸ü¸ß°æ±¾ºÍ9.0.0.11-31sv¼°¸ü¸ß°æ±¾¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉв»ÇåÎú¸ÃÎó²îµÄÏêϸʹÓÃϸ½Ú£¬£¬£¬£¬£¬£¬£¬µ«SonicWallÒÑÐÞ¸Äͨ¸æ£¬£¬£¬£¬£¬£¬£¬ÈϿɴËÎó²î¿ÉÄÜÕýÔÚ±»Ò°ÍâʹÓᣡ£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»ÒªÇóÔÚ2025Äê5ÔÂ7ÈÕ֮ǰ½ÓÄÉÐëÒªµÄ»º½â²½·¥£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
2. TheLoopƽ̨210Íò·ÝÃô¸ÐÐÅϢй¶
4ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÓÉMTV¸ß¹Ü½¨ÉèµÄ°Ä´óÀûÑÇÒ»¾×îÈÈÃŵĴ´ÒâÊÂÇéÆ½Ì¨TheLoopÓÚ2024Äê¹Ø±Õ£¬£¬£¬£¬£¬£¬£¬È»¶øÆäÓû§Ãô¸ÐÊý¾Ýй¶Σ»£»£»£»£»£»£»úÖÁ½ñδ½â¡£¡£¡£¡£¡£¡£¡£2025Äê2Ô£¬£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸Ãƽ̨¹ýʧÉèÖõÄGoogleCloud´æ´¢Í°µ¼ÖÂ210Íò·ÝÎļþй¶£¬£¬£¬£¬£¬£¬£¬°üÀ¨º¬È«Ãû¡¢µØµã¡¢µç»°ºÅÂë¡¢ÓÊÏä¼°ÍêÕûÖ°ÒµÂÄÀúµÄ¼òÀú¡£¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝΪթÆÕßÌṩÁ˼«´ó±ãµ±¡£¡£¡£¡£¡£¡£¡£Õ©ÆÕß¿ÉʹÓÃй¶ÐÅϢʵÑé¸ß¶È¶¨ÏòµÄ´¹ÂÚ¹¥»÷¡¢ÓïÒô´¹ÂںͶÌÐÅ´¹ÂÚ¡£¡£¡£¡£¡£¡£¡£ÒÀ¸½Ïêϸ¼òÀú£¬£¬£¬£¬£¬£¬£¬Õ©ÆÕßÄÜÖÆ×÷¼«¶Ë±ÆÕæµÄ¸öÐÔ»¯´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬Ìá¼°Êܺ¦ÕßÕæÊµÖ°Î»Ãû³Æ¡¢¹ýÍù¿Í»§ÉõÖÁÒ»Ñùƽ³£Ê¹Óù¤¾ß£¬£¬£¬£¬£¬£¬£¬»¹¿ÉÄܸ½´øÐéαְλÑûÔ¼¡¢´ýÇ©ÊðÌõÔ¼»òÒªÇóÑéÖ¤Éí·Ý£¨ÐèÌṩ»¤ÕÕ¸´Ó¡¼þ£©¡£¡£¡£¡£¡£¡£¡£µ±Õ©ÆÕßÕÆÎյ绰ºÅÂëºÍÅä¾°ÐÅϢʱ£¬£¬£¬£¬£¬£¬£¬ÓïÒô´¹ÂںͶÌÐÅ´¹ÂÚ¼«¾ß˵·þÁ¦£¬£¬£¬£¬£¬£¬£¬Èç×Ô³ÆÀ´×ÔÊܺ¦ÕßÔøÓ¦Æ¸µÄ´´Òâ»ú¹¹£¬£¬£¬£¬£¬£¬£¬ÒªÇó×îÖÕÈ·ÈÏÒøÐÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Õ©ÆÕß»¹ÄÜαװ³ÉÊܺ¦ÕßÏò¿Í»§»ò¹ÍÖ÷·¢ËÍÐéα·¢Æ±¡£¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±ÊµÑéÁªÏµ¸Ã¹«Ë¾¼°ÅÌËã»úÓ¦¼±ÏìÓ¦×飬£¬£¬£¬£¬£¬£¬µ«Î´ÊÕµ½»ØÓ¦¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/loop-leaks-personal-data-creatives-exposed/
3. ÀÕË÷Èí¼þʹÓÃAWSÃÜÔ¿¹¥»÷AWSS3´æ´¢Í°
4ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÆðÓÐÊýÇÒ¿ÉÄÜÊ·ÎÞǰÀýµÄÐͬÀÕË÷»î¶¯ÆØ¹â£¬£¬£¬£¬£¬£¬£¬Éæ¼°Áè¼Ý1.2ÒÚÌõй¶µÄAWSÃÜÔ¿¼Í¼£¬£¬£¬£¬£¬£¬£¬×îÖÕÖ¸Ïò1,229¸öΨһƾ֤¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÕâЩƾ֤¶ÔS3´æ´¢Í°ÖеÄÊý¾ÝÓ¦ÓÃÁËЧÀÍÆ÷¶Ë¼ÓÃÜ£¨SSE-C£©£¬£¬£¬£¬£¬£¬£¬ËæºóÁôÏÂÀÕË÷ÐÅÒªÇóÒÔ±ÈÌØ±ÒÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬Ã¿Î»Êܺ¦ÕßÀÕË÷½ð¶îΪ0.3BTC£¨Ô¼25,000ÃÀÔª£©¡£¡£¡£¡£¡£¡£¡£´Ë´Î¶ñÒâ»î¶¯¸ß¶È×Ô¶¯»¯£¬£¬£¬£¬£¬£¬£¬ÇÒûÓÐÃ÷È·µÄ¹éÊô¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÔÚÿ¸ö¼ÓÃܵÄS3´æ´¢Í°ÖÐÁôÏÂÃûΪwarning.txtµÄÀÕË÷ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢¸½´øÎ¨Ò»µÄ±ÈÌØ±ÒµØµãºÍawsdecrypt[@]techie.comµÄµç×ÓÓʼþµØµãÓÃÓÚÁªÏµ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃAWSÔÉúЧÀÍÆ÷¶Ë¼ÓÃÜ£¨Ê¹Óÿͻ§ÌṩµÄÃÜÔ¿£©À´¼ÓÃÜS3´æ´¢Í°Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ÌìÉú×Ô¼ºµÄAES-256¼ÓÃÜÃÜÔ¿Ëø¶¨Ãü¾Ý£¬£¬£¬£¬£¬£¬£¬Ê¹µÃÊܺ¦ÕßÎÞ·¨»Ö¸´¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷ģʽÔÊÐí¡°¾²Ä¬ÈëÇÖ¡±£¬£¬£¬£¬£¬£¬£¬ÈëÇÖʱ²»»á·¢³ö¾¯±¨»ò±¨¸æ£¬£¬£¬£¬£¬£¬£¬Ò²²»»áÁôÏÂÎļþɾ³ýÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬ÍþвÕß±£´æ´æ´¢Í°½á¹¹£¬£¬£¬£¬£¬£¬£¬ÉõÖÁδÇÔÈ¡Êý¾Ý¾ÙÐÐË«ÖØÀÕË÷¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹ÔøÉèÖÃS3ÉúÃüÖÜÆÚÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÔÚ7ÌìÄÚɾ³ý¼ÓÃÜÊý¾Ý£¬£¬£¬£¬£¬£¬£¬½øÒ»²½ÏòÊܺ¦Õßʩѹ¡£¡£¡£¡£¡£¡£¡£ÁîÈËÕ𾪵ÄÊÇ£¬£¬£¬£¬£¬£¬£¬ÔÚ¶à¸öÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄAWSÇéÐÎÈÔÔÚ¼ÌÐøÔËÐУ¬£¬£¬£¬£¬£¬£¬Åú×¢Êܺ¦Õß¿ÉÄÜÈÔδÒâʶµ½ÕâÒ»Îó²î¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡AWSÃÜÔ¿µÄÏêϸҪÁìÉÐδ֤ʵ¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/aws-cloud-storage-bucket-ransomware-attacks/
4. ÓéÀÖЧÀ;ÞÍ·LegendsInternationalÅû¶Êý¾Ýй¶ÊÂÎñ
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬LegendsInternationalÊÇÈ«ÇòÌåÓýºÍÓéÀÖЧÀ͹«Ë¾£¬£¬£¬£¬£¬£¬£¬ÓªÒµº¸ÇÔ°µØÍýÏë¡¢ÏúÊÛ¡¢ÏàÖú¡¢½Ó´ý¡¢ÉÌÆ·ºÍÊÖÒÕ½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬ÄêÊÕÈ볬11ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÖÎÀí×ÅÎå´óÖÞ350¶à¸ö³¡¹Ý£¬£¬£¬£¬£¬£¬£¬ÏñÂåÉ¼í¶µÄSoFiÌåÓý³¡¡¢Å¦Ô¼µÄÒ»ºÅÌìϹ۾°Ì¨µÈ×ÅÃû³¡¹Ý¾ùÔÚÆäÁС£¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬£¬Ëü»¹Í¨¹ýÊÕ¹ºASMGlobalÀ©´óÁËÓªÒµ¹æÄ£¡£¡£¡£¡£¡£¡£¡£LegendsInternational·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬ÆäÓÚ2024Äê11Ô±¬·¢Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬ÆìÏÂÔ±¹¤Ó볡ºÏ·Ã¿ÍÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÔÚÓëÕþ¸®µÄ֪ͨº¯À£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾³Æ11ÔÂ9ÈÕÔÚITϵͳ¼ì²âµ½Î´¾ÊÚȨ»î¶¯£¬£¬£¬£¬£¬£¬£¬Ëæ¼´ÔÚÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÏÂÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£ÊÓ²ì֤ʵÈëÇÖÕßÇÔÈ¡ÁËСÎÒ˽¼ÒÊý¾ÝÎļþ£¬£¬£¬£¬£¬£¬£¬µ«ÐżþδÃ÷ȷй¶Êý¾ÝÀàÐÍ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶µÄ¹æÄ£ºÍÊÜÓ°ÏìÈËÊý²»Ã÷£¬£¬£¬£¬£¬£¬£¬µ«¼øÓÚ¹«Ë¾ÖØ´óµÄÔËÓª¹æÄ£ºÍÖÎÀíµÄº£Á¿Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ£ÐÄÇéÐ÷ÄÑÃâ¡£¡£¡£¡£¡£¡£¡£ÔÚÖÂÊÜÓ°ÏìÓû§µÄÐź¯ÖУ¬£¬£¬£¬£¬£¬£¬LegendsInternationalÌåÏÖÊÂÎñǰÒѽÓÄÉÇå¾²²½·¥£¬£¬£¬£¬£¬£¬£¬ÏµÍ³»Ö¸´ºóҲʵÑéÁËÌØÊâ²½·¥£¬£¬£¬£¬£¬£¬£¬µ«Î´ÌṩÏêϸϸ½Ú¡£¡£¡£¡£¡£¡£¡£ÐżþÊÕ¼þÈË¿Éͨ¹ýExperian»ñµÃ24¸öÔµÄÉí·Ý͵ÇÔ¼ì²âЧÀͰü¹Ü£¬£¬£¬£¬£¬£¬£¬ÐèÔÚ2025Äê7ÔÂ31ÈÕǰע²á¡£¡£¡£¡£¡£¡£¡£¹«Ë¾³ÆÎ´·¢Ã÷СÎÒ˽¼ÒÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬µ«½¨ÒéÓû§¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/entertainment-services-giant-legends-international-discloses-data-breach/
5. INCRansomÀÕË÷Èí¼þ¹¥»÷ºó£¬£¬£¬£¬£¬£¬£¬AholdDelhaizeÈ·ÈÏÊý¾Ý±»µÁ
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬°¢»ôµÂµÂ¶ûº£×È(AholdDelhaize)ÊÇ¿ç¹úÁãÊÛºÍÅú·¢¾ÞÍ·£¬£¬£¬£¬£¬£¬£¬ÔÚÎ÷ŷı»®½ü8000¼ÒÊÐËÁ£¬£¬£¬£¬£¬£¬£¬ÓµÓг¬41ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬ÄêÊÕÈëÔ¼1000ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬ÔÚÃÀ¹úı»®FoodLionµÈÆ·ÅÆ¡£¡£¡£¡£¡£¡£¡£2024Äê11Ô£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾¹ûÕæÅûÂ¶ÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢¹Ø±ÕITϵͳ±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£Æä³ÆÎÊÌâ¼°»º½â²½·¥ÒÑÓ°ÏìÃÀ¹úÄ³Ð©Æ·ÅÆºÍЧÀÍ£¬£¬£¬£¬£¬£¬£¬°üÀ¨²¿·ÖÒ©µêºÍµçÉÌÓªÒµ¡£¡£¡£¡£¡£¡£¡£×òÈÕ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯INCRansom½«AholdDelhaizeÌí¼ÓÖÁÆä°µÍøÊý¾Ýй¿àÕË÷ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÒÉËÆÇÔÈ¡µÄÎļþÑù±¾¡£¡£¡£¡£¡£¡£¡£AholdDelhaize½²»°ÈË֤ʵÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬µ«Î´Ì¸ÂÛÀÕË÷Èí¼þÊÇ·ñ¼ÓÈë´Ë´Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾¶ÔÊÂÎñµÄÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬£¬ÈôÈ·ÈϿͻ§Êý¾ÝÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬½«Í¨ÖªÏà¹ØÖ°Ô±¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬ÆäËùÓÐÊÐËÁºÍµçÉÌЧÀÍÈÔÕý³£ÔËÓª£¬£¬£¬£¬£¬£¬£¬Ö÷¹Ë²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ahold-delhaize-confirms-data-theft-after-inc-ransomware-claims-attack/
6. CISAÖÒÑÔOracle¹Å°åÔÆÐ§ÀÍÆ÷ÔâÈëÇÖ¼Ó¾çÆ¾Ö¤Ð¹Â¶Î£º¦
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬CISA·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬½ñÄêÔçЩʱ¼äOracle¹Å°åÔÆÐ§ÀÍÆ÷ÔâÈëÇֺ󣬣¬£¬£¬£¬£¬£¬Î¥¹æÎ£º¦¼Ó¾ç£¬£¬£¬£¬£¬£¬£¬ÆóÒµÍøÂçÃæÁÙÖØ´óÍþв¡£¡£¡£¡£¡£¡£¡£CISAÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Ëù±¨¸æ»î¶¯¶Ô×éÖ¯ºÍСÎÒ˽¼Ò×é³ÉDZÔÚΣº¦£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤ÖÊÁÏ¿ÉÄÜй¶¡¢Öظ´Ê¹ÓûòǶÈëϵͳ£¬£¬£¬£¬£¬£¬£¬ËäÆä¹æÄ£ºÍÓ°ÏìÉÐδ֤ʵ£¬£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤ÖÊÁÏÒ»µ©Ç¶Èë¾ÍÄÑÒÔ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ì»Â¶ºó»òÖºã¾Ãδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬£¬¶ÔÆóÒµÇéÐÎ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬£¬CISAÐû²¼Ö¸ÄÏ£¬£¬£¬£¬£¬£¬£¬±Þ²ßÍøÂç·ÀÓùÕßÖØÖÃÊÜÓ°ÏìÓû§ÃÜÂ룬£¬£¬£¬£¬£¬£¬Ìæ»»Ó²±àÂë»òǶÈëʽƾ֤£¬£¬£¬£¬£¬£¬£¬ÊµÑé·ÀÍøÂç´¹ÂڵĶàÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬²¢¼à¿ØÉí·ÝÑéÖ¤ÈÕÖ¾¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬¼×¹ÇÎÄÈ·ÈÏÒ»ÃûÍþвÐÐΪÕßй¶ÁË´Ó¡°Á½Ì¨¹ýʱµÄЧÀÍÆ÷¡±ÖÐÇÔÈ¡µÄƾ֤£¬£¬£¬£¬£¬£¬£¬²»¹ýÆäÔÆÐ§ÀÍÆ÷δÊܹ¥»÷£¬£¬£¬£¬£¬£¬£¬ÊÂÎñδӰÏìÔÆÐ§ÀÍ»ò¿Í»§Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÇÔÈ¡Á˾ɿͻ§Æ¾Ö¤£¬£¬£¬£¬£¬£¬£¬²¢ÔÚBreachForumsÉÏÐû²¼2025Äê¸üмͼ£¬£¬£¬£¬£¬£¬£¬ÓëýÌå¹²Ïí2024Äêµ×Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ÇÒй¶Êý¾ÝÑù±¾¾¶àλOracle¿Í»§È·ÈÏÓÐÓᣡ£¡£¡£¡£¡£¡£3ÔÂ⣬£¬£¬£¬£¬£¬£¬CybelAngel͸¶Oracle¼û¸æ¿Í»§£¬£¬£¬£¬£¬£¬£¬ÔçÔÚ2025Äê1Ô£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¾ÍÔÚ²¿·ÖGen1ЧÀÍÆ÷Éϰ²ÅÅÁËWebShellºÍÆäËû¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ö±ÖÁ2ÔÂβ·¢Ã÷Îó²î£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß´ÓOracleIdentityManagerÊý¾Ý¿âÖÐÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÉϸöÔÂýÌ屨µÀ³Æ¼×¹ÇÎÄ¿µ½¡¹«Ë¾1Ô·ÝÒ²±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¶à¼ÒÃÀ¹úÒ½ÁÆ»ú¹¹ºÍÒ½ÔºµÄ»¼ÕßÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-increased-breach-risks-following-oracle-cloud-leak/


¾©¹«Íø°²±¸11010802024551ºÅ