AkiraÀÕË÷Èí¼þÐû³Æ¹¥ÆÆApache OpenOfficeϵͳ

°ä²¼¹¦·ò 2025-11-03

1. AkiraÀÕË÷Èí¼þÐû³Æ¹¥ÆÆApache OpenOfficeϵͳ


10ÔÂ30ÈÕ £¬ÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©×éÖ¯AkiraÐû³ÆÒѹ¥ÆÆApache OpenOfficeϵͳ²¢ÇÔÈ¡23GBÊý¾Ý £¬Òý·¢°²È«¹Ø×¢¡£Apache OpenOfficeÊÇApacheÈí¼þ»ù½ð»á¿ª·¢µÄÃâ·Ñ¿ªÔ´°ì¹«Èí¼þÌ×¼þ £¬Ô̺¬ÎÄ×Ö´¦Öᢵç×Ó±í¸ñ¡¢ÑÝʾÎĸ塢ͼÐλæÔì¡¢Êý¾Ý¿â¼°Êýѧ¹«Ê½´´½¨µÈ¹¤¾ß £¬Ö§³ÖWindows¡¢LinuxºÍmacOSϵͳ £¬×÷ΪMicrosoft OfficeµÄÃâ·Ñ´úÌæ¹æ»®±»¿í·ºÊ¹Óá£AkiraÐû³Æ±»µÁÊý¾ÝÔ̺¬Ô±¹¤Ãô¸ÐÐÅÏ¢£¨ÈçÏÖʵµØÖ·¡¢µç»°ºÅÂë¡¢¼ÝÊ»ÅÆÕÕ¡¢Éç»á±£ÏÕ¿¨¡¢ÐÅÓþ¿¨ÐÅÏ¢µÈ£©¡¢²ÆÕþ¼Í¼¡¢ÄÚ²¿»úÃÜÎļþ¼°´óÁ¿Óû§Ê¹ÓÃÎÊÌâ»ã±¨¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹Â¶ÍøÕ¾°µÊ¾ £¬½«ºÜ¿ìÉÏ´«ÕâЩÎļþ¡£È»¶ø £¬½ØÖÁ·¢¸åʱ £¬ApacheÈí¼þ»ù½ð»áÉÐδ֤ʵϵͳ»òÊý¾ÝÔâµ½ÈëÇÖ¡£ÈôÈëÇÖÊôʵ £¬¿ÉÄÜй¶ÄÚ²¿¿ª·¢Êý¾Ý»ò¹±Ï×ÕßÐÅÏ¢ £¬µ«°ì¹«Ì×¼þÓû§Ä¿Ç°²»Ì«¿ÉÄÜÖ±½ÓÊÜÓ°Ïì £¬ÒòÏÂÔØ»ù´¡ÉèÊ©Ó뿪·¢·þÎñÆ÷¶ÀÁ¢ £¬¹«¹²Èí¼þ·Ö·¢Çþ·δÊܲ¨¼°¡£


https://hackread.com/akira-ransomware-stole-apache-openoffice-data/


2. LinkedIn´¹µö¹¥»÷¼¤Ôö £¬²ÆÕþ¸ß¹Ü³ÉÖØÒªÖ¸±ê


10ÔÂ30ÈÕ £¬ºÚ¿ÍÕýͨ¹ýLinkedInƽ̨ÌáÒéÕë¶Ô²ÆÕþ¸ß¹ÜµÄÐÂÐÍÍøÂç´¹µö¹¥»÷ £¬Ö¼ÔÚÇÔÈ¡Æä΢ÈíÕË»§Æ¾Ö¤¡£¾ÝPush SecurityÅû¶ £¬¹¥»÷Õß¼Ù×°³É¡°¹²Í¬²Æ¸»¡±Í¶×Ê»ù½ð £¬Í¨¹ýLinkedIn˽ÐÅ·¢ËÍÔ̺¬¶ñÒâÁ´½ÓµÄ¡°Ö´Ðж­Ê»áÔ¼Ç롱 £¬Ðû³ÆÓëAMCO·çÏÕͶ×Ê»ù½ðºÏ×÷ÍÆ³öÄÏÃÀÖÞͶ×ÊÏîÄ¿¡£µã»÷Á´½Óºó £¬Óû§»á±»³Á¶¨ÏòÖÁGoogleÊ¢¿ª³Á¶¨Ïò £¬×îÖÕÌø×ªÖÁ¹¥»÷Õß½ÚÔìµÄFirebase´æ´¢Ò³Ãæ £¬¸ÃÒ³Ãæ¼Ù×°³É¡°LinkedIn Cloud Share¡±ÃÅ»§ £¬Õ¹Ê¾¶­Ê»áÓйØÎĵµ¡£µ±Óû§³¢ÊԲ鿴ÎĵµÊ± £¬ÏµÍ³»áÌáÐÑ¡°Ê¹ÓÃMicrosoft²é¿´¡± £¬½ø¶øÌø×ªÖÁαÔìµÄ΢ÈíµÇÂ¼Ò³Ãæ £¬²¢Í¨¹ýCloudflare TurnstileÑéÖ¤Âë×èÖ¹×Ô¶¯»¯°²È«¹¤¾ß·ÖÎö £¬×îÖÕͨ¹ýÖÐÑëÈ˹¥»÷²¶»ñÓû§Í´´¦ºÍ»á»°cookie¡£Push SecurityÖ¸³ö £¬´Óǰһ¸öÔÂÔ¼34%µÄÍøÂç´¹µö¹¥»÷À´×ÔLinkedInµÈ·Çµç×ÓÓʼþÇþ· £¬½ÏÈý¸öÔÂǰ²»¼°10%µÄ±ÈÀýÏÔÖøÉÏÉý¡£Óû§Ó¦¾¯ÌèLinkedInÉϵÄóÒ×»úÓö»ò¶­Ê»áÔ¼ÇëÐÂÎÅ £¬Ô¤·Àµã»÷˽ÐÅÖеÄÁ´½Ó £¬ÓÈÆäÊÇʹÓÃ.top¡¢.icu¡¢.xyzµÈ²»³£¼û¶¥¼¶ÓòÃûµÄÁ´½Ó¡£ÊÕµ½Î´¾­ÒªÇóµÄÐÅϢʱ £¬Ðèͨ¹ýÆäËûÇþ·ºËʵ·¢¼þÈËÉí·ÝºÍÄÚÈݺϷ¨ÐÔ¡£


https://www.bleepingcomputer.com/news/security/linkedin-phishing-targets-finance-execs-with-fake-board-invites/


3. ÈÕ±¾Á¬Ëø³¬ÊÐSuper Value Co.Ôâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


10ÔÂ30ÈÕ £¬½üÈÕ £¬Óë¶íÂÞ˹¹ØÁªµÄ÷è÷ëÀÕË÷Èí¼þÍÅ»ïÔٴη¢Æð¹¥»÷ £¬Ö¸±êΪÈÕ±¾Á¬Ëø³¬ÊÐSuper Value Co. £¬²¢ÔÚ°µÍøÐ¹Â¶ÆäÔ±¹¤¼°²ÆÕþÊý¾Ý¡£¸ÃÍÅ»ï×Ô2022Äê»îÔ¾ÒÔÀ´ £¬ÒÑÔì³É947ÃûÊܺ¦Õß £¬³ÉΪ´Óǰ12¸öÔÂ×î»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£Õâ´Î¹¥»÷ÖÐ £¬Ð¹Â¶Êý¾ÝÔ̺¬ÈËÁ¦×ÊÔ´Îļþ¡¢°²È«ÃÜÔ¿×ªÒÆÖ¤Ã÷¡¢¼¨Ð§»ã±¨¡¢¹¤×÷³¡Ëù±äÂҼͼ¡¢¹¤×ʵ¥¾Ý¼°²ÆÕþ»ã±¨µÈ £¬º­¸ÇÔ±¹¤±àºÅ¡¢È«Ãû¡¢×¡Ö·¡¢µ®ÉúÈÕÆÚ¡¢Ð½×ʵÈÃô¸ÐÐÅÏ¢ £¬ÈôÊôʵ½«Ê¹Ô±¹¤Ãæ¶ÔÉí·Ý͵ÇÔ·çÏÕ £¬ÆóÒµÔËӪϸ½Ú¶³ö¿ÉÄܱ»¾ºÕùµÐÊÖÀûÓá£÷è÷ëÍŻﺹÇ๥»÷ÁìÓò¿í·º £¬ÔøÕë¶ÔÒ½Ôº¡¢Ôì×÷Òµ¡¢µçÁ¦¹«Ë¾¼°Æû³µÆóÒµµÈ¡£×¨¼ÒÖ¸³ö £¬¸ÃÍÅ»ïÓëLockBit¡¢DragonForceµÈÀÕË÷Èí¼þ½áÃË £¬Í¨¹ý×ÊÔ´¹²ÏíÌáÉý¹¥»÷Õ½Êõ¼°ÆµÂÊ £¬¼Ó¾çÍøÂ簲ȫÍþв¡£


https://cybernews.com/security/qilin-super-value-japan-breach/


4. CISA֤ʵLinuxÄں˸ßΣ·ì϶±»ÓÃÓÚÀÕË÷Èí¼þ¹¥»÷


10ÔÂ31ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÖÜËÄ֤ʵ £¬LinuxÄÚºËÖÐÒ»¸ö¸ßΣȨÏÞÌáÉý·ì϶£¨CVE-2024-1086£©Õý±»ÓÃÓÚÀÕË÷Èí¼þ¹¥»÷¡£¸Ã·ì϶ԴÓÚnetfilter: nf_tablesÄÚºË×é¼þµÄ¿ªÊͺóʹÓÃÈõµã £¬ÓÚ2024Äê1ÔÂ31ÈÕÅû¶ £¬Æä±¾Ô­¿É×·ÒäÖÁ2014Äê2ÔµĴúÂëÌá½» £¬2024Äê1ÔÂÒÑͨ¹ý²¹¶¡½¨¸´¡£³É¹¦ÀûÓø÷ì϶¿Éʹ±¾µØ¹¥»÷ÕßÌáÉýȨÏÞÖÁroot¼¶ £¬µ¼ÖÂϵͳ±»ÆëÈ«ÊÕÊÜ¡¢ºáÏòÒÆ¶¯ÖÁÆäËûÉ豸¼°Êý¾Ý͵ÇÔ¡£2024Äê3ÔÂÏÂÑ® £¬°²È«×êÑÐÈËÔ±¡°Notselwyn¡±ÔÚGitHub°ä²¼¸ÅÏëÑéÖ¤£¨PoC£©´úÂë £¬Õ¹Ê¾ÆäÔÚLinuxÄÚºË5.14ÖÁ6.6°æ±¾ÖеÄÀûÓ÷½Ê½ £¬Ö¤Êµ·ì϶¿É±»ÏÖʵ¹¥»÷¡£·ì϶ӰÏìÁìÓò¿í·º £¬Éæ¼°Debian¡¢Ubuntu¡¢Fedora¡¢Red HatµÈÖ÷Á÷Linux¿¯Ðаæ £¬º­¸ÇÄں˰汾3.15ÖÁ6.8-rc1¡£CISAÓÚ2024Äê5Ô½«¸Ã·ì϶ÄÉÈëÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ £¬ÒªÇóÁª¹ú»ú¹¹ÔÚ6ÔÂ20ÈÕǰʵÏÖ½¨¸´¡£ÈôÎÞ·¨Á¢¼´½¨¸´ £¬CISA½¨Òé²ÉÈ¡»º½â´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/cisa-linux-privilege-escalation-flaw-now-exploited-in-ransomware-attacks/


5. δ´ò²¹¶¡µÄ˼¿ÆÉ豸¿ÉÄÜϰȾBadCandy²¡¶¾


10ÔÂ31ÈÕ £¬°Ä´óÀûÑǵ±¾Ö½üÈÕ·¢³öÑϳÁ°²È«ÖÒ¸æ £¬Ö¸³ö¸Ã¹ú佨¸´Cisco IOS XEÉ豸ÕýÔâ·êÀûÓÃCVE-2023-20198¸ßΣ·ì϶µÄ³ÖÐøÍøÂç¹¥»÷ £¬¹¥»÷Õßͨ¹ýÖ²Èë»ùÓÚLuaµÄBadCandy webshellϰȾ·ÓÉÆ÷¡£¸Ã·ì϶ÔÊÐíδÊÚȨԶ³Ì¹¥»÷Õßͨ¹ýWeb½çÃæ´´½¨±¾µØÖÎÀíÔ¹ØË»§²¢ÆëÈ«½ÚÔìÉ豸 £¬Ë¼¿ÆËäÓÚ2023Äê10Ô°䲼²¹¶¡ £¬µ«·ì϶ÀûÓ÷¨Ê½Á½Öܺ󼴹«¿ª £¬µ¼Ö´óÁ¿Â¶³öÔÚ»¥ÁªÍøµÄÉ豸±»Ö²ÈëºóÃÅ¡£°Ä´óÀûÑÇÍøÂ簲ȫÊýÃÅ£¨ASD£©ÆÀ¹ÀÏÔʾ £¬2025Äê7ÔÂÖÁ½ñ £¬¾³ÄÚ³¬400̨Éè±¸ÔøÏ°È¾BadCandy £¬½ØÖÁ10Ôµ×ÈÔÓг¬150̨É豸³ÖÐøÏ°È¾¡£Ö»¹ÜϰȾÊýÁ¿³Ê½µÂäÇ÷Ïò £¬µ«¹¥»÷ÕßÄܼì²âwebshell±»ÒƳýºó³ÁÐÂÖ²ÈëͳһÉ豸 £¬ÐγÉ"ϰȾ-¶Ï¸ù-ÔÙϰȾ"µÄÑ­»·¹¥»÷ģʽ¡£BadCandyÒ»µ©×°Öà £¬¿ÉÈù¥»÷ÕßÒÔrootȨÏÞÖ´ÐÐËÁÒâºÅÁî £¬³ÁÆôºówebshellËä±»¶Ï¸ù £¬µ«Î´´ò²¹¶¡µÄÉ豸ÒòWeb½çÃæÈԿɽӼû £¬¹¥»÷Õ߿ɼ±¾ç³Áв¿Êð¡£


https://www.bleepingcomputer.com/news/security/australia-warns-of-badcandy-infections-on-unpatched-cisco-devices/


6. ºÚ¿ÍÐû³ÆÇÔÈ¡±öϦ·¨ÄáÑÇ´óѧ120Íò¾èÔùÕßÐÅÏ¢


11ÔÂ2ÈÕ £¬½üÈÕ £¬±öϦ·¨ÄáÑÇ´óѧÔâ·êÑϳÁÍøÂ簲ȫÊÂÎñ £¬Ò»ÃûºÚ¿Í×éÖ¯Ðû³Æ¶ÔÉÏÖܲúÉúµÄ"ÎÒÃDZ»ºÚ¿Í¹¥»÷ÁË"¶ñÒâÓʼþÊÂÎñÕÆ¹Ü £¬²¢Ðû³ÆÒÑÇÔȡԼ120ÍòÃûѧÉú¡¢Ð£ÓѼ°¾èÔùÕßµÄÃô¸ÐÊý¾Ý¡£¸ÃÊÂÎñʼÓÚ10ÔÂ30ÈÕ £¬ºÚ¿Íͨ¹ýÔ±¹¤PennKeyµ¥µãµÇ¼ÕË»§ÇÖÈë´óѧϵͳ £¬»ñµÃVPN¡¢SalesforceÊý¾Ýƽ̨¡¢Qlik·ÖÎöϵͳ¡¢SAPóÒ×ÖÇÄܼ°SharePointÎļþϵͳµÄÆëÈ«½ÚÔìȨ¡£¾ÝºÚ¿ÍÅû¶ £¬ÆäÓÚ10ÔÂ31ÈÕʵÏÖÊý¾ÝÏÂÔØ £¬ÇÔÈ¡ÄÚÈÝÔ̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µØÖ·¡¢µç»°ºÅÂë¡¢¾»×ʲú¹ÀËã¡¢¾èÔùº¹Ç༰×ڽ̡¢ÖÖ×å¡¢ÐÔÈ¡ÏòµÈÈ˶¡Í³¼ÆÐÅÏ¢¡£ÎªÖ¤Ã÷¹¥»÷ÕæÊµÐÔ £¬ºÚ¿ÍÏòýÌåÌṩÁËϵͳ½ØÍ¼ºÍÊý¾ÝÑù±¾ £¬²¢°ä²¼1.7GBѹËõÎļþ £¬ÄÚº¬µç×Ó±í¸ñ¡¢¾èÔù×ÊÁϵȾݳÆÀ´×ÔSharePointºÍBoxϵͳµÄÎļþ¡£¹¥»÷Õßͨ¹ý±öϦ·¨ÄáÑÇ´óѧÍйÜÔÚSalesforce Marketing CloudµÄconnect.upenn.eduƽ̨ £¬ÏòÔ¼70ÍòÊÕ¼þÈË·¢Ë͹¥»÷ÐÔÓʼþ £¬ÄÚÈÝÔ̺¬¶Ô´óѧÕÐÉúÕþ²ß¼°°²È«´ëÊ©µÄÇ¿ÁÒÆ·ÆÀ¡£±öϦ·¨ÄáÑÇ´óѧ»ØÓ¦³Æ"ÔÚ³ÖÐøµ÷²é" £¬²¢ÌáÐѾèÔùÕß¾¯ÌèÕë¶ÔÐÔ´¹µö¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-hacker-claims-1.2-million-donor-data-breach/