ÂíÊõÆ÷²Ä¾ÞÍ·ÔâPlayÀÕË÷Èí¼þË«ÖØÀÕË÷

°ä²¼¹¦·ò 2025-11-05

1. ÂíÊõÆ÷²Ä¾ÞÍ·ÔâPlayÀÕË÷Èí¼þË«ÖØÀÕË÷


11ÔÂ3ÈÕ£¬£¬£¬ÃÀ¹ú¼ÓÖÝÂíÊõ»î¶¯Æ÷²Ä¾ÞÍ·Professional's Choice Sports Medicine Products½üÈÕ³ÉΪPlayÀÕË÷Èí¼þ×îÐÂÖ¸±ê¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍø°ä²¼11ÔÂ4ÈÕÌû×Ó£¬£¬£¬Ðû³ÆÇÔÈ¡Õâ¼Ò1976Äê³ÉÁ¢¡¢¡¢ÄêÊÕÈë6500ÍòÃÀÔªÆóÒµµÄ¡°¸öÈË»úÃÜÊý¾Ý¡¢¡¢¿Í»§Îļþ¡¢¡¢Ô¤Ëã¡¢¡¢¹¤×ʵ¥¡¢¡¢Ë°Îñ¼°²ÆÕþÐÅÏ¢¡±£¬£¬£¬²¢Íþв24СʱÄÚ¹«¿ªÐ¹Â¶¡£¡£¡£PlayÍÅ»ïÑ¡È¡Ë«ÖØÀÕË÷ģʽ£º£ºÏÈÒªÇóÖ§¸¶Êê½ð»»È¡¼ÓÃÜÊý¾Ý½âÃÜÃÜÔ¿£¬£¬£¬ÔÙË÷ÒªµÚ¶þ±ÊÊê½ð²»È»ÏúÊÛ»ò¹«¿ª±»µÁÊý¾Ý¡£¡£¡£¸ÃÍÅ»ïÓë¶íÂÞ˹¹ØÁª£¬£¬£¬Á½Äê¼äÒѹ¥»÷964¸öÖ¸±ê£¬£¬£¬º­¸Ç¹Ø¼ü»ù´¡ÉèÊ©¼°ÆóÒµ¡£¡£¡£¼¼Êõ²ãÃæ£¬£¬£¬Play±»ÊÓΪÊ×Åúѡȡ¡°¼äЪÐÔ¼ÓÃÜ¡±µÄÀÕË÷Èí¼þ×éÖ¯¡£¡£¡£¸ÃÕ½Êõ½ö¼ÓÃÜϵͳ¹Ì¶¨²¿ÃÅ£¬£¬£¬´ó·ùËõ¶Ì¼ÓÃܹ¦·ò£¬£¬£¬¼Ó¿ìÊý¾ÝÇÔÈ¡¡£¡£¡£ÀàËÆÊÖ·¨Ò²±»ALPHV/BlackCat¡¢¡¢DarkBitµÈ³ÛÃûÍÅ»ïЧ·Â¡£¡£¡£


https://cybernews.com/security/ransomware-proffesional-choice-sports-medicine-products/


2. ³¬40ÍòWordPressÍøÕ¾Ãæ¶ÔPost SMTP²å¼þ·ì϶Íþв


11ÔÂ4ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬ÍþвÐÐΪÕßÕýÀûÓÃWordPress²å¼þPost SMTPÖеÄÑÏÖØ·ì϶¶Ô³¬40ÍòÍøÕ¾ÌáÒé¹¥»÷£¬£¬£¬¸Ã·ì϶¿Éµ¼ÖÂÖÎÀíÔ±ÕË»§±»ÆëÈ«ÊÕÊÜ¡£¡£¡£Post SMTPÊÇ´úÌæÄ¬ÈÏwp_mail()º¯ÊýµÄÖ÷Á÷Óʼþ·¢Ëͽâ¾ö¹æ»®£¬£¬£¬Æä3.6.0¼°¸üÔç°æ±¾´æÔÚ±àºÅΪCVE-2025-11833µÄ¸ßΣ·ì϶£¨CVSSÆÀ·Ö9.8£©£¬£¬£¬Ô´ÓÚ²å¼þµÄPostmanEmailLogsÁ÷³ÌÖÐ_constructº¯Êý²»×ãÊÚȨ²é³­£¬£¬£¬ÔÊÐíδÈÏÖ¤¹¥»÷ÕßÖ±½Ó¶ÁÈ¡ËÁÒâÒѼͼµÄµç×ÓÓʼþÄÚÈÝ£¬£¬£¬Ô̺¬º¬ÃÜÂëÖØÖÃÁ´½ÓµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¹¥»÷Õß¿ÉÀûÓôËÀàÁ´½ÓÈÆ¹ýºÏ·¨ÕË»§ÑéÖ¤£¬£¬£¬Ö±½ÓÖØÖÃÖÎÀíÔ±ÃÜÂë²¢½ÚÖÆÕû¸öÍøÕ¾¡£¡£¡£Wordfence°²È«ÍŶÓÓÚ10ÔÂ11ÈÕ³õ´ÎÊÕµ½×êÑÐÔ±"netranger"µÄ·ì϶»ã±¨£¬£¬£¬15ÈÕʵÏÖ¼¼ÊõÑéÖ¤ºóÏò²å¼þ¿ª·¢ÕßSaad IqbalÅû¶£¬£¬£¬10ÔÂ29ÈÕ°ä²¼²¹¶¡°æ±¾3.6.1¡£¡£¡£È»¶ø£¬£¬£¬Æ¾¾ÝWordPress.orgÊý¾Ý£¬£¬£¬½öÔ¼50%Óû§ÊµÏÖÉý¼¶£¬£¬£¬ÈÔÓÐÔ¼21ÍòÍøÕ¾´¦ÓÚ·çÏÕ״̬¡£¡£¡£×Ô11ÔÂ1ÈÕÆð£¬£¬£¬ºÚ¿ÍÒÑÆðÍ·´ó¹æÄ£ÀûÓø÷ì϶£¬£¬£¬WordfenceÒÑÔÚÆä¿Í»§ÈºÖÐÀ¹½Ø³¬4500´Î¹¥»÷³¢ÊÔ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-post-smtp-to-hijack-admin-accounts/


3. Apache»ù½ð»á·ñ¶¨OpenOfficeÔâÀÕË÷¹¥»÷Ö¸¿Ø


11ÔÂ4ÈÕ£¬£¬£¬ApacheÈí¼þ»ù½ð»á½üÈÕ¹«¿ª·ñ¶¨Æä¿ªÔ´ÏîÄ¿OpenOfficeÔâ·êAkiraÀÕË÷Èí¼þ¹¥»÷µÄ˵·¨¡£¡£¡£´Ëǰ£¬£¬£¬AkiraÍÅ»ïÐû³ÆÓÚ10ÔÂ30ÈÕÈëÇÖ¸ÃÏîÄ¿²¢ÇÔÈ¡23GBÊý¾Ý£¬£¬£¬Ô̺¬Ô±¹¤Ð¡ÎÒÐÅÏ¢¡¢¡¢²ÆÕþ¼Í¼¼°ÄÚ²¿ÎļþµÈ¡£¡£¡£OpenOffice×÷ΪÃâ·Ñ¿ªÔ´°ì¹«Ì×¼þ£¬£¬£¬¼æÈÝÖ÷Á÷ÎĵµÌåʽ£¬£¬£¬Ö§³Ö¶à²Ù×÷ϵͳÔËÐУ¬£¬£¬ÓÉÈ«Çò×ÔÔ¸Õß¹±Ï×Õß¹²Í¬ÊØ»¤¡£¡£¡£Õë¶ÔÖ¸¿Ø£¬£¬£¬»ù½ð»áÇ¿µ÷OpenOfficeÏîÄ¿²»´æÔÚÍþвÐÐΪÕßÃèÊöµÄÃô¸ÐÊý¾ÝÀàÐÍ¡£¡£¡£ÓÉÓÚÏîĿѡȡ·Ç¹ÍÓ¶ÖÆ¿ª·¢Ä£Ê½£¬£¬£¬¹±Ï×Õß¾ùΪ×ÔÔ¸Õߣ¬£¬£¬Òò¶ø²»´æ´¢Ô±¹¤µØÖ·¡¢¡¢ÐÅÓþ¿¨ÐÅÏ¢¡¢¡¢Éç±£º£ºÅÂëµÈ´«Í³ÆóÒµ¼¶Êý¾Ý¡£¡£¡£ÏîÄ¿¿ª·¢È«³Ìͨ¹ý¹«¿ªÓʼþÁÐ±í½øÐУ¬£¬£¬ËùÓзì϶»ã±¨¡¢¡¢Ö°ÄÜÒªÇó¼°¼¼ÊõÎÊÌâ¾ùͨÃ÷¿É¼û£¬£¬£¬²»´æÔÚ"ÄÚ²¿»úÃÜÎļþ"¡£¡£¡£»£»ù½ð»áÖ¸³ö£¬£¬£¬AkiraËù³ÆµÄ"23GB¹«Ë¾Îļþ"ÓëÏîÄ¿ÏÖʵÊý¾Ý½á¹¹²»·û£¬£¬£¬ÇÒÖÁ½ñδÌṩÈκÎÊý¾ÝÑù±¾ÑéÖ¤ÆäÖ÷ÕÅ¡£¡£¡£»£»ù½ð»á°µÊ¾£¬£¬£¬Ä¿Ç°Î´ÊÕµ½ÈκÎÀÕË÷ÒªÇ󣬣¬£¬Ò²Î´·¢ÏÖϵͳ±»ÈëÇÖµÄÖ¤¾Ý¡£¡£¡£µ÷²éÏÔʾ£¬£¬£¬»ù½ð»á¼°OpenOfficeÏîÖ÷ÕÅ»ù´¡ÉèʩδÊÜÓ°Ï죬£¬£¬ÏîÄ¿¿ª·¢Á÷³ÌµÄ¹«¿ªÐÔ×ÔÉí¼´×é³É°²È«·®Àé¡£¡£¡£


https://www.bleepingcomputer.com/news/security/apache-openoffice-disputes-data-breach-claims-by-ransomware-gang/


4. Google PlayÉϵĶñÒâAndroidÀûÓÃÏÂÔØÁ¿´ï4200Íò´Î


11ÔÂ4ÈÕ£¬£¬£¬Ôư²È«¹«Ë¾Zscaler°ä²¼µÄÄê¶È»ã±¨ÏÔʾ£¬£¬£¬2024Äê6ÔÂÖÁ2025Äê5ÔÂÆÚ¼ä£¬£¬£¬Google PlayÉ̵êÖÐ239¿î¶ñÒâAndroidÀûÓÃÀÛ¼ÆÏÂÔØÁ¿³¬4200Íò´Î£¬£¬£¬½ÏÉÏÄêͬÆÚÔö³¤ÏÔÖø¡£¡£¡£Í¬ÆÚÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷ͬ±ÈÔö³¤67%£¬£¬£¬¼äµýÈí¼þÓëÒøÐÐľÂí³ÉÎªÖØÒªÍþв£¬£¬£¬ÆäÖиæ°×Èí¼þÕ¼±È¸ß´ï69%£¬£¬£¬ÏÕЩÊÇÈ¥ÄêÁ½±¶£¬£¬£¬JokerÐÅÏ¢ÇÔÈ¡·¨Ê½Êг¡·Ý¶î´Ó38%½µÖÁ23%¡£¡£¡£»ã±¨Ö¸³ö£¬£¬£¬¹¥»÷¼¿Á©Õý´Ó´«Í³ÐÅÓþ¿¨Ú²Æ­×ªÏòÍøÂç´¹µö¡¢¡¢¶ÌÐÅ´¹µö¡¢¡¢SIM¿¨»¥»»ºÍÖ§¸¶Ú¿Æ­µÈÉç»á¹¤³Ì¹¥»÷£¬£¬£¬ÕâµÃÒæÓÚоƬ°²È«³ß¶ÈÌáÉý¼°Òƶ¯Ö§¸¶±é¼°¡£¡£¡£¼äµýÈí¼þ¼Ò×åÈçSpyNote¡¢¡¢SpyLoanµÈͬ±È¼¤Ôö220%£¬£¬£¬±»ÓÃÓڼල¡¢¡¢ÀÕË÷ºÍÉí·Ý͵ÇÔ¡£¡£¡£´ÓµØÓòÉ¢²¼¿´£¬£¬£¬Ó¡¶È¡¢¡¢ÃÀ¹úºÍ¼ÓÄôó½ÓÊÜ55%µÄ¹¥»÷£¬£¬£¬Òâ´óÀûºÍÒÔÉ«ÁеĹ¥»÷Á¿¸üͬ±È±©Ôö800%-4000%¡£¡£¡£Öصã¶ñÒâÈí¼þ·½Ã棬£¬£¬AnatsaÒøÐÐľÂíͨ¹ý¼Ù×°¹¦Ð§Äܹ¤¾ßÀûÓÃDZÈëGoogle Play£¬£¬£¬×îбäÖÖ¿ÉÇÔÈ¡831¼Ò½ðÈÚ»ú¹¹¼°¼ÓÃÜÇ®±Òƽ̨Êý¾Ý£»£»Android VoidºóÃÅÔòϰȾ160Íǫ̀ÔËÐйýÆÚAOSPϵͳµÄÉ豸£¬£¬£¬ÖØÒªÉ¢²¼ÔÚÓ¡¶ÈºÍ°ÍÎ÷£»£»Xnotice RATÔòÕë¶ÔÖж«¼°ÒÁÀÊʯÓÍÐÐÒµÇóÖ°Õߣ¬£¬£¬Í¨¹ýÐéαÕÐÆ¸ÀûÓô«²¼£¬£¬£¬Í¨¹ý¸²¸Ç²ã¡¢¡¢MFA´úÂëÇÔÈ¡ÒøÐÐÆ¾Ö¤¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-android-apps-on-google-play-downloaded-42-million-times/


5. ÈðµäMilj?dataÊý¾Ýй¶ÊÂÎñÓ°ÏìÁË150ÍòÈË


11ÔÂ4ÈÕ£¬£¬£¬ÈðµäÒþÖÔ±£»£»¤¾Ö£¨IMY£©Õý¶ÔITϵͳ¹©¸øÉÌMilj?dataÔâ·êµÄÍøÂç¹¥»÷·¢Õ¹Éî¶Èµ÷²é£¬£¬£¬¸ÃÊÂÎñµ¼ÖÂÔ¼150Íò¹«ÃñСÎÒÊý¾Ýй¶£¬£¬£¬Éæ¼°ÐÕÃû¡¢¡¢µØÖ·¡¢¡¢µç»°¡¢¡¢Éí·ÝÖ¤¼þ¼°µ®ÉúÈÕÆÚµÈÃô¸ÐÐÅÏ¢¡£¡£¡£Milj?data×÷ΪÈðµäÔ¼80%ÊÐÕþµ±¾ÖµÄITϵͳ·þÎñÉÌ£¬£¬£¬ÓÚ8ÔÂ25ÈÕÅû¶¹¥»÷ϸ½Ú£º£º¹¥»÷ÕßÇÔÈ¡Êý¾ÝºóÀÕË÷1.5¸ö±ÈÌØ±Ò£¬£¬£¬²»È»½«¹«¿ªÊý¾Ý¡£¡£¡£Õâ´ÎÊÂÎñÔì³É¹þÀ¼¡¢¡¢¸çÌØÀ¼µÈ¶àµØÓòÔËÓªÖжÏ£¬£¬£¬Ó°Ï칫Ãñ·þÎñ¡£¡£¡£IMYÕÆ¹ÜÈËÖ¸³ö£¬£¬£¬Êý¾Ýй¶Òý·¢¶Ôϵͳ°²È«µÈ¼¶¼°´æ´¢ÐÅÏ¢ÀàÐ͵ÄÑÏÖØÖÊÒÉ¡£¡£¡£µ÷²éÖØµã¾Û½¹ÓÚ¼ø±ðϵͳ°²È«·ì϶¼°Êý¾Ý´¦ÖÃʵ¼ÊÖеIJ»¼°£¬£¬£¬ÒÔ·À±¸½«À´ÀàËÆÊÂÎñ¡£¡£¡£°µÍø¼à¿ØÏÔʾ£¬£¬£¬Íþв×éÖ¯DatacarryÓÚ9ÔÂ13ÈÕÔÚÆäÃÅ»§ÍøÕ¾°ä²¼224MBµÄ±»µÁÊý¾Ý´æµµ£¬£¬£¬²¢Áгö±ðµÄ12ÃûÊܺ¦Õß¡£¡£¡£Ö»¹ÜMilj?dataÅû¶ʱÎÞÀÕË÷×éÖ¯ÈÏÁ죬£¬£¬µ«Êý¾ÝÒѱ»Have I Been PwnedÊÕ¼£¬£¬£¬¸Ãƽ̨»ã±¨ÏÔÊ¾Ð¹Â¶Éæ¼°87ÍòÈË£¬£¬£¬Ô¼ÎªIMYͳ¼ÆÊý×ÖµÄÒ»°ë£¬£¬£¬Êý¾ÝÁ¿²î¾àÒý·¢½øÒ»²½ºË²éÐèÒª¡£¡£¡£


https://www.bleepingcomputer.com/news/security/data-breach-at-major-swedish-software-supplier-impacts-15-million/


6. ÈÕ¾­ÐÂÎÅSlackƽ̨ÔâÈëÇÖÖÂ1.7ÍòÌõÐÅϢй¶


11ÔÂ4ÈÕ£¬£¬£¬ÈÕ±¾³ö°æ¾ÞÍ·ÈÕ¾­ÐÂÎŽüÈÕÅû¶£¬£¬£¬ÆäSlack¼´Ê±Í¨Ñ¶Æ½Ì¨ÒòÔ±¹¤µçÄÔϰȾ¶ñÒâÈí¼þµ¼ÖÂÉí·ÝÑé֤ʹ´¦±»µÁ£¬£¬£¬¹¥»÷Õß½è´Ë½Ó¼ûÔ±¹¤ÕË»§£¬£¬£¬Ôì³É³¬¹ý17,000ÃûÔ±¹¤¼°Ã³Ò×ͬ°éµÄÐÕÃû¡¢¡¢µç×ÓÓʼþµØÖ·¼°Ì¸Ìì¼Í¼й¶¡£¡£¡£×÷ΪȫÇò×î´óýÌ弯ÍÅÖ®Ò»£¬£¬£¬ÈÕ¾­ÆìÏÂÕ¼ÓС¶½ðÈÚʱ±¨¡·¡¶ÈÕ¾­ÐÂÎÅ¡·µÈ370ÍòÊý×Ö¶©ÔÄÓû§¼°40Óà¼Ò´ÓÊô¹«Ë¾£¬£¬£¬ÒµÎñ¸²¸Ç³ö°æ¡¢¡¢¹ã²¥¡¢¡¢Êý¾Ý¿â·þÎñµÈÁìÓò£¬£¬£¬²¢ÔÚÈ«ÇòÉèÓÐ37¸öÍâÑó±à×벿¼°1500ÓàÃû¼ÇÕß¡£¡£¡£ÊÂÎñ²úÉúÓÚ½ñÄê9Ô£¬£¬£¬ÈÕ¾­·¢ÏÖ°²È«·ì϶ºóÁ¢¼´²ÉÈ¡Ç¿ÖÆÃÜÂë¸ü¸ÄµÈ´ëÊ©¡£¡£¡£Ö»¹Üй¶ÐÅÏ¢²»ÊôÓÚÈÕ±¾¡¶Ð¡ÎÒÐÅÏ¢±£»£»¤·¨¡·Ç¿Öƻ㱨ÁìÓò£¬£¬£¬µ«ÈÕ¾­×Ô¶¯ÏòСÎÒÐÅÏ¢±£»£»¤Î¯Ô±»á»ã±¨£¬£¬£¬Ç¿µ÷ÊÂÎñ¡°ÖØÒªÐÔ¡±¼°Í¨Ã÷¶È×¼Ôò¡£¡£¡£¹«Ë¾³ö¸ñÉêÃ÷£¬£¬£¬Óë»úÃÜÐÂÎÅÆðÔ´¼°±¨µÀ»î¶¯ÓйصÄÐÅϢδ±»Ð¹Â¶£¬£¬£¬ÐÂÎŲɼ¯Êý¾Ýά³Ö°²È«¡£¡£¡£


https://www.bleepingcomputer.com/news/security/media-giant-nikkei-reports-data-breach-impacting-17-000-people/