WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ

Ðû²¼Ê±¼ä 2025-06-12

1. WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ


6ÔÂ10ÈÕ£¬£¬£¬£¬AkamaiÇå¾²Ç鱨ºÍÏìÓ¦ÍŶӣ¨SIRT£©¿ËÈÕ·¢Ã÷£¬£¬£¬£¬Mirai½©Ê¬ÍøÂç±äÖÖÕýÔÚʹÓÃWazuhЧÀÍÆ÷ÖеÄÒ»¸öÒªº¦Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨CVE-2025-24016£©¾ÙÐй¥»÷»î¶¯¡£¡£¸ÃÎó²î×î³õÓÚ½ñÄê2Ô·ݱ»Åû¶£¬£¬£¬£¬µ«ÖÁ½ñÉÐδ±»Ìí¼Óµ½ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©µÄÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£WazuhÊÇÒ»¸öÓÃÓÚÍþвԤ·À¡¢¼ì²âºÍÏìÓ¦µÄÃâ·Ñ¿ªÔ´Æ½Ì¨£¬£¬£¬£¬¶ø´Ë´ÎÊÜÓ°ÏìµÄ°æ±¾ÎªWazuh 4.4.0ÖÁ4.9.0£¬£¬£¬£¬²¹¶¡ÒÑÔÚ4.9.1°æ±¾ÖÐÐû²¼¡£¡£¸ÃÎó²îÔÊÐí¾ßÓÐAPI»á¼ûȨÏÞµÄÔ¶³Ì¹¥»÷Õßͨ¹ýÉÏ´«¶ñÒâJSONÎļþÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬ÔÚWazuh APIÖУ¬£¬£¬£¬DistributedAPIµÄ²ÎÊý»á±»ÐòÁл¯ÎªJSON£¬£¬£¬£¬²¢Ê¹ÓÃÌØ¶¨ÎļþÖеÄas_Wazuh_object¾ÙÐз´ÐòÁл¯¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÔÚDAPIÇëÇóÖÐ×¢Èëδ¾­´¦Öóͷ£µÄ×ÖµäÀ´Ê¹ÓôËÎó²î£¬£¬£¬£¬½ø¶øµ¼ÖÂí§ÒâPython´úÂëµÄÖ´ÐУ¬£¬£¬£¬»òÕ߸üͨË×µØËµ£¬£¬£¬£¬ÓÕÆ­ÏµÍ³ÔËÐжñÒâPython´úÂë¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬¸ÃÎó²î½öÓ°ÏìÔËÐйýʱ°æ±¾µÄ»î¶¯WazuhЧÀÍÆ÷£¬£¬£¬£¬Òò´Ë±Þ²ßÓû§¾¡¿ì¸üе½Wazuh 4.9.1»ò¸ü¸ß°æ±¾£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÇå¾²Íþв¡£¡£


https://cybernews.com/security/wazuh-servers-targeted-by-mirai-botnets/


2. FacebookÉÏ·¢Ã÷4000¶à¸öÐéÎ±ÍøÕ¾Ðû²¼ÐéαÉúÒâ


6ÔÂ10ÈÕ£¬£¬£¬£¬Silent PushÍþвÆÊÎöʦ¿ËÈÕ·¢Ã÷ÁËÒ»¸öÃûΪ¡°GhostVendors¡±µÄÖØ´óÐéαÊг¡ÍøÂ磬£¬£¬£¬Éæ¼°Áè¼Ý4000¸öÕ©Æ­ÍøÕ¾£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Ã°³äÁ˰üÀ¨ÑÇÂíÑ·¡¢Argos¡¢Costco¡¢Nordstrom¡¢ÀÍÁ¦Ê¿¡¢ÃܶûÎÖ»ù¹¤¾ß£¨Milwaukee Tools£¬£¬£¬£¬ÔÚÕ©Æ­¹ã¸æÖб»¸Ä¶¯Îª¡°Millaeke¡±£©ÒÔ¼°²ª¿Ï£¨Birkenstock£©µÈÔÚÄÚµÄÊýÊ®¸ö×ÅÃûÆ·ÅÆ¡£¡£Õ©Æ­Õßͨ¹ýFacebook MarketplaceͶ·Å´ó×Ú¹ã¸æ¾ÙÐÐÍÆ¹ã£¬£¬£¬£¬Ê¹Óü«µÍµÄ¼ÛÇ®ÒýÓÕÏûºÄÕß¡£¡£ËûÃÇÇÉÃîµØÊ¹ÓÃMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬£¬£¬Ôڻ¿¢ÊºóѸËÙɾ³ýËùÓкۼ££¬£¬£¬£¬Ê¹µÃ·ÀÓùÕßÄÑÒÔ×·×Ù¡£¡£Õ©Æ­Õß²»µ«¿Ë¡×ÅÃûÆ·ÅÆÍøÕ¾Ä£°å£¬£¬£¬£¬»¹ÖÆ×÷ÁËÊýÊ®¸öÏàËÆµÄð³ä¸±±¾£¬£¬£¬£¬Í¨¹ý¡°Çå²Ö¡±»ò¡°½ÚÈÕ´ÙÏú¡±µÈÒªº¦´ÊÒÔ¼°ÁîÈËÄÑÒÔÖÃÐŵÄÓÅ»ÝÉúÒâÀ´ÎüÒý»á¼ûÕß¡£¡£Ò»µ©ÏûºÄÕßÖмƣ¬£¬£¬£¬Õ©Æ­Õß±ã¿ÉÄܲ»½»¸¶¶©¹ºµÄ²úÆ·»òÇÔÈ¡Æä¸¶¿îÏêϸÐÅÏ¢£¬£¬£¬£¬ÊµÑé½ðÈÚڲƭ¡£¡£ÓÉÓÚMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔòÏà¶ÔËÉи£¬£¬£¬£¬·ÀÓùÕßÔÚ×·×ÙÕâЩ¿ìËÙÆô¶¯ºÍ×èÖ¹µÄÕ©Æ­»î¶¯Ê±ÃæÁÙÖØ´óÌôÕ½¡£¡£Silent PushÖÒÑԳƣ¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÕâÐ©Ú²Æ­ÍøÕ¾¾ÙÐÐÖÖÖÖÀàÐ͵ĽðÈÚڲƭ£¬£¬£¬£¬ÇÒÏÖÔÚÏÕЩ²»¿ÉÄÜÖÜȫ׷×Ù¸ÃÍøÂçÉϵĶñÒâ¹ã¸æ¡£¡£Òò´Ë£¬£¬£¬£¬ÏûºÄÕßÐèÌá¸ßСÐÄ£¬£¬£¬£¬×èÖ¹ÊÜÆ­ÊÜÆ­£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬Ïà¹ØÆ½Ì¨Ò²Ó¦ÔöÇ¿î¿Ïµ£¬£¬£¬£¬ÍêÉÆ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬£¬£¬ÒÔÓÐÓù¥»÷´ËÀàÕ©Æ­»î¶¯¡£¡£


https://cybernews.com/security/thousands-domains-pushing-phony-deals-on-facebook/


3. ·Ñ³ÇMastery SchoolsÔâÀÕË÷¹¥»÷£¬£¬£¬£¬³¬3.7ÍòÈËÊý¾Ýй¶


6ÔÂ10ÈÕ£¬£¬£¬£¬·Ñ³ÇÌØÐíÑ§Ð£ÍøÂçMastery SchoolsÓÚ2024Äê9ÔÂÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼ÖÂ37,031ÈËСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£´Ë´ÎÊÂÎñÉæ¼°¸ÃѧУÔڷѳǼ°¿¨Ä·µÇÔËÓªµÄ23ËùУ԰£¬£¬£¬£¬Ô¼14,000ÃûѧÉúÊܵ½Ó°Ïì¡£¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢ÆÕ±é£¬£¬£¬£¬°üÀ¨Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼ¡¢Ñ§Éúµµ°¸¡¢ÒøÐм°²ÆÎñÐÅÏ¢¡¢ÉúÎïʶ±ðÊý¾ÝµÈ¡£¡£¹¥»÷µ¼ÖÂѧУ½¹µãÓªÒµÖÐÖ¹£¬£¬£¬£¬ÀÕË÷×éÖ¯DragonForceÐû³Æ¶ÔÊÂÎñÈÏÕæ£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË171GBÊý¾Ý£¬£¬£¬£¬µ«Mastery Schoolsδ֤ʵ¸Ã˵·¨£¬£¬£¬£¬Ò²Î´Í¸Â¶ÈëÇÖ·½·¨»òÊÇ·ñÖ§¸¶Êê½ð¡£¡£Ð£·½ÌåÏÖ£¬£¬£¬£¬ÒÑÈ·¶¨Î´¾­ÊÚȨÕßÏÂÔØÁ˲¿·ÖÊý¾Ý£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»ÓÃÓÚÉí·ÝµÁÓûòڲƭ¡£¡£ÎªÐ­ÖúÊÜÓ°ÏìÖ°Ô±£¬£¬£¬£¬Mastery Schoolsͨ¹ýExperianµÄIdentityWorksЧÀÍÌṩÃâ·ÑÉí·Ý±£»£»¤£¬£¬£¬£¬²¢ÔöÇ¿Á˶àÒòËØÈÏÖ¤Ó¦Óá¢ÌáÉýÁËÖÕ¶Ë¼à¿ØÄÜÁ¦£¬£¬£¬£¬Í¬Ê±ÒýÈëÍâ²¿ÍøÂçÇ徲ר¼ÒÍŶӲ¢ÁªºÏÁª°îÖ´·¨²¿·ÖÉîÈëÊӲ졣¡£ComparitechÊý¾ÝÏÔʾ£¬£¬£¬£¬2024ÄêÃÀ¹úѧУ¼°´óѧ¹²ÔâÓö79ÆðÀÕË÷¹¥»÷£¬£¬£¬£¬²¨¼°½ü290ÍòÌõ¼Í¼£¬£¬£¬£¬´ËÀ๥»÷³£µ¼ÖÂÖØ´óÔËÓªÖÐÖ¹£¬£¬£¬£¬È翼ÊÔÑÓÆÚ¡¢Ð½×Êϵͳ̱»¾µÈ£¬£¬£¬£¬¶Ô½ÌÓý»ú½á¹¹³ÉÑÏÖØÓ°Ïì¡£¡£


https://www.infosecurity-magazine.com/news/mastery-schools-data-breach/


4. ¡°Çå¾²Ðж¯¡±¹ú¼ÊÖ´·¨£º¹¥»÷¶à¹úÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ


6ÔÂ11ÈÕ£¬£¬£¬£¬´úºÅΪ¡°Çå¾²Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÓÚ2025Äê1ÔÂÖÁ4Ô¿ªÕ¹£¬£¬£¬£¬Óɹú¼ÊÐ̾¯×é֯ǣͷ£¬£¬£¬£¬Õë¶Ô26¸ö¹ú¼ÒµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ù´¡ÉèÊ©Õö¿ª´ó¹æÄ£¹¥»÷¡£¡£Ðж¯Öص㹥»÷ͨ¹ýÆÕ±éѬȾÇÔÈ¡²ÆÎñºÍСÎÒ˽¼ÒÊý¾ÝµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍŻ¡£ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡ÕË»§Æ¾Ö¤¡¢ä¯ÀÀÆ÷CookieºÍ¼ÓÃÜÇ®±ÒÇ®°üÏêÇéµÈÊý¾Ý£¬£¬£¬£¬»ã±à³É¡°ÈÕÖ¾¡±ÔÚÍøÂç·¸·¨Êг¡³öÊÛ»òÓÃÓÚ¶¨Ïò¹¥»÷¸ß¼ÛÖµÊܺ¦Õß¡£¡£´Ë´ÎÐж¯Ð§¹ûÏÔÖø£º¹Ø±Õ³¬20000¸öÓëÐÅÏ¢ÇÔÈ¡ÕßÏà¹ØµÄ¶ñÒâIP/ÓòÃû£¬£¬£¬£¬²é»ñ41̨֧³ÖÐÅÏ¢ÇÔÈ¡»î¶¯µÄЧÀÍÆ÷£¬£¬£¬£¬¾Ð²¶32ÃûÏÓÒÉÈË£¬£¬£¬£¬Ã»ÊÕ100GBÊý¾Ý£¬£¬£¬£¬²¢Í¨Öª216000ÃûÊܺ¦Õß¡£¡£Õþ¸®»¹·¢Ã÷Ïã¸ÛÓÐ117̨ЧÀÍÆ÷×é³ÉµÄ´óÐͼ¯Èº£¬£¬£¬£¬±»ÓÃ×÷ÍøÂç´¹ÂÚ¡¢ÍøÂçڲƭºÍÉ罻ýÌåÕ©Æ­Ðж¯µÄÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£Ô½ÄϾ¯·½ÔÚ´Ë´ÎÐж¯ÖÐÌåÏÖÍ»³ö£¬£¬£¬£¬¾Ð²¶18ÃûÏÓÒÉÈË£¬£¬£¬£¬ÆäÖаüÀ¨Ò»ÃûרÃųöÊÛ¹«Ë¾ÕË»§µÄÍøÂç·¸·¨¼¯ÍÅÍ·Ä¿¡£¡£Ðж¯»¹»ñµÃ¿¨°Í˹»ù¡¢Group-IBºÍÇ÷ÊÆ¿Æ¼¼µÈ˽ÈËÍøÂçÇå¾²ÏàÖúͬ°éµÄЭÖú¡£¡£Group-IBÖ¸³ö£¬£¬£¬£¬Ðж¯ÒÑÓ°ÏìÓëLumma¡¢RiseProºÍMETA StealerÏà¹ØµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬Ñо¿Ö°Ô±ÏòÕþ¸®ÌṩҪº¦Ê¹ÃüÇ鱨£¬£¬£¬£¬²¢×·×ÙÁËÔËÓªÉÌÓÃÓÚÐû´«¶ñÒâÈí¼þºÍ³öÊÛ±»µÁÊý¾ÝµÄTelegramºÍ°µÍøÕË»§¡£¡£


https://www.bleepingcomputer.com/news/security/operation-secure-disrupts-global-infostealer-malware-operations/


5. ÒÁÀû°ü¹Ü¼¯ÍÅÔâÍøÂç¹¥»÷µ¼ÖÂÓªÒµÖÐÖ¹


6ÔÂ11ÈÕ£¬£¬£¬£¬ÒÁÀû°ü¹Ü¹«Ë¾£¨Erie Insurance£©ºÍÒÁÀûÅâ³¥¹«Ë¾¿ËÈÕ͸¶£¬£¬£¬£¬ÖÜÄ©±¬·¢µÄÍøÂç¹¥»÷Êǵ¼ÖÂÆäÍøÕ¾ÓªÒµÖÐÖ¹Ç徲̨̱»¾µÄÔµ¹ÊÔ­ÓÉ¡£¡£ÒÁÀûÅâ³¥¹«Ë¾×÷ΪÒÁÀû°ü¹Ü¼¯ÍŵÄÖÎÀí¹«Ë¾£¬£¬£¬£¬¸Ã¼¯ÍÅÊÇÒ»¼ÒÓµÓÐÁè¼Ý600Íò·ÝÓÐÓñ£µ¥µÄ¹¤ÒµºÍÒâÍâÏÕ°ü¹Ü¹«Ë¾£¬£¬£¬£¬Í¨¹ý×ÔÁ¦ÊðÀíÈËÌṩ¶àÖÖ°ü¹ÜЧÀÍ¡£¡£×Ô6ÔÂ7ÈÕÐÇÆÚÁùÆð£¬£¬£¬£¬Erie Insurance±ãÔâÊÜ´óÃæ»ýÍ£µçºÍÓªÒµÖÐÖ¹£¬£¬£¬£¬¿Í»§ÎÞ·¨µÇ¼¿Í»§ÃÅ»§£¬£¬£¬£¬ÔÚÌá³öË÷Åâ»òÎüÊÕÎļþʱÓöµ½ÄÑÌâ¡£¡£ÒÁÀûÅâ³¥¼¯ÍÅÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñ£¬£¬£¬£¬³ÆÔÚ6ÔÂ7ÈÕ¼ì²âµ½¡°Òì³£ÍøÂç»î¶¯¡±¡£¡£ÒÁÀû°ü¹ÜÍøÕ¾Ò²Ðû²¼Í¨Öª£¬£¬£¬£¬³ÆÐÅÏ¢Çå¾²ÍŶÓÔÚ6ÔÂ7ÈÕ·¢Ã÷Òì³£ÍøÂç»î¶¯£¬£¬£¬£¬²¢Á¬Ã¦½ÓÄÉÐж¯Ó¦¶Ô£¬£¬£¬£¬ÒÔ±£»£»¤ÏµÍ³ºÍÊý¾Ý¡£¡£¹«Ë¾ÒÑÆô¶¯ÊÂÎñÏìӦЭÒ飬£¬£¬£¬²¢½ÓÄɱ£»£»¤²½·¥È·±£ÏµÍ³Çå¾²¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÒÁÀû°ü¹ÜÕýÔÚÓëÖ´·¨²¿·ÖÏàÖú£¬£¬£¬£¬²¢ÔÚÍøÂçÇ徲ר¼ÒµÄЭÖúϾÙÐÐÖÜÈ«µÄȡ֤ÆÊÎö£¬£¬£¬£¬ÒÔÖÜÈ«ÏàʶÊÂÎñ¡£¡£¹«Ë¾ÖÒÑԳƣ¬£¬£¬£¬ÔÚÍ£µçʱ´ú²»»áÖµç»ò·¢Ë͵ç×ÓÓʼþ¸ø¿Í»§ÒªÇ󸶿£¬£¬£¬²¢½¨Òé¿Í»§²»Òªµã»÷δ֪ȪԴµÄÁ´½Ó»òÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¹ØÓÚÐèÒªÌá³öË÷ÅâµÄͶ±£ÈË£¬£¬£¬£¬¹«Ë¾ÌṩÁËÁªÏµÍâµØÊðÀíÈË»òERIEÊ×´ÎËðʧ֪ͨÍŶӵĵ绰£¬£¬£¬£¬ÒÔ¼°¿Í»§Ð§À͵绰¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÉÐδȷ¶¨´Ë´Î¹¥»÷ÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ò²Î´Í¸Â¶Êý¾ÝÊÇ·ñÔÚ¹¥»÷Àú³ÌÖб»µÁ¡£¡£ÒÁÀûÌåÏÖ£¬£¬£¬£¬¸ÃÊÂÎñµÄËùÓйæÄ£¡¢ÐÔ×ÓºÍÓ°ÏìÈÔÓдý½øÒ»²½È·¶¨¡£¡£


https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/


6. Roundcube RCEÎó²î²¹¶¡ºóÔâʹÓ㬣¬£¬£¬³¬8Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ïì


6ÔÂ11ÈÕ£¬£¬£¬£¬RoundcubeÕâһʢÐÐWebÓʼþƽ̨¿ËÈÕÆØ³öÑÏÖØÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨±àºÅCVE-2025-49113£©£¬£¬£¬£¬¸ÃÎó²îÔÚ²¹¶¡Ðû²¼½ö¼¸Ììºó¾Í±»ÍþвÐÐΪÕßʹÓ㬣¬£¬£¬¹¥»÷ÁËÁè¼Ý80,000Ì¨ÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷¡£¡£¸ÃÎó²îCVSSÆÀ·Ö¸ß´ï9.9£¬£¬£¬£¬´ËǰÒÑDZÔÚÊ®ÓàÄ꣬£¬£¬£¬¹¥»÷Õ߿ɽè´Ë¿ØÖÆÊÜÓ°Ïìϵͳ²¢ÔËÐжñÒâ´úÂ룬£¬£¬£¬¶ÔÓû§ºÍ×éÖ¯×é³ÉÖØ´óΣº¦¡£¡£FearsOffÊ×´´È˼æÊ×ϯִÐйÙKirill Firsov·¢Ã÷ÁË´ËÎó²î£¬£¬£¬£¬ËûÔ¤¼Æ¸ÃÎó²îÓ°ÏìÁè¼Ý5300Íǫ̀Ö÷»ú£¬£¬£¬£¬°üÀ¨Ê¹ÓÃcPanel¡¢PleskµÈ¹¤¾ßµÄЧÀÍÆ÷¡£¡£NISTÐû²¼µÄÇ徲ͨ¸æÖ¸³ö£¬£¬£¬£¬Roundcube Webmail 1.5.10֮ǰµÄ°æ±¾ºÍ1.6.11֮ǰµÄ1.6.x°æ±¾±£´æ´ËÎó²î£¬£¬£¬£¬ÒòURLÖеÄ_from²ÎÊýδÔÚÌØ¶¨ÎļþÖÐÑéÖ¤£¬£¬£¬£¬µ¼ÖÂPHP¹¤¾ß·´ÐòÁл¯£¬£¬£¬£¬´Ó¶øÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§Ö´ÐÐÔ¶³Ì´úÂë¡£¡£¸ÃÎó²îÒÑÔÚRoundcube 1.6.11ºÍ1.5.10 LTS°æ±¾ÖлñµÃÐÞ¸´¡£¡£Îó²îÅû¶ºó£¬£¬£¬£¬Positive TechnologiesÑо¿Ö°Ô±Àֳɸ´ÏÖÁ˸ÃÎó²î£¬£¬£¬£¬²¢±Þ²ßÓû§Á¬Ã¦¸üÐÂÖÁ×îа汾¡£¡£È»¶ø£¬£¬£¬£¬Shadowserver»ù½ð»áÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬»¥ÁªÍøÉÏÈÔÓÐԼĪ84,000¸öRoundcubeʵÀýδ»ñµÃÐÞ²¹£¬£¬£¬£¬±£´æÑÏÖØÇå¾²Òþ»¼¡£¡£


https://securityaffairs.com/178887/hacking/over-80000-servers-hit-as-roundcube-rce-bug-gets-rapidly-exploited.html