˼¿ÆÖÇÄÜÔÊÐíÊÊÓóÌÐòµÄÑÏÖØÎó²îÏÖÒѱ»Ê¹ÓÃÓÚ¹¥»÷

Ðû²¼Ê±¼ä 2025-03-21

1. ˼¿ÆÖÇÄÜÔÊÐíÊÊÓóÌÐòµÄÑÏÖØÎó²îÏÖÒѱ»Ê¹ÓÃÓÚ¹¥»÷


3ÔÂ20ÈÕ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒÑ×îÏÈÕë¶Ô±£´æÎ´ÐÞ²¹Çå¾²Îó²îµÄ˼¿ÆÖÇÄÜÔÊÐíÊÊÓóÌÐò£¨CSLU£©Ìᳫ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܵ¼ÖÂÄÚÖúóÃÅÖÎÀíÔ±ÕÊ»§Ì»Â¶¡£ ¡£¡£¡£¡£¡£CSLUÊÇ˼¿Æ¿ª·¢µÄWindowsÓ¦ÓóÌÐò£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíÖÎÀíÔ±ÔÚÍâµØÖÎÀíÔÊÐíÖ¤ºÍÁ´½Ó²úÆ·£¬ £¬£¬£¬£¬£¬£¬ÎÞÐèÅþÁ¬ÖÁÆäÔÆ½â¾ö¼Æ»®¡£ ¡£¡£¡£¡£¡£Ë¼¿ÆÓÚ9ÔÂÐû²¼ÁËÇå¾²²¹¶¡£ ¡£¡£¡£¡£¡£¨CVE-2024-20439£©£¬ £¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÕâÒ»ÎÊÌ⣬ £¬£¬£¬£¬£¬£¬²¢Ö¸³öÕâÊÇÒ»¸öδ¼Í¼µÄ¾²Ì¬Óû§Æ¾Ö¤Îó²î£¬ £¬£¬£¬£¬£¬£¬¿Éʹ¹¥»÷ÕßÔ¶³ÌµÇ¼δÐÞ²¹µÄϵͳ¡£ ¡£¡£¡£¡£¡£Í¬Ê±£¬ £¬£¬£¬£¬£¬£¬Ë¼¿Æ»¹½â¾öÁËÁíÒ»¸öÑÏÖØµÄÐÅϢй¶Îó²î£¨CVE-2024-20440£©£¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷Õßͨ¹ýÈ«ÐÄÉè¼ÆµÄHTTPÇëÇó»á¼ûÃô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î½öÓ°ÏìÔËÐÐÒ×Êܹ¥»÷CSLU°æ±¾µÄϵͳ£¬ £¬£¬£¬£¬£¬£¬ÇÒ½öµ±Óû§Æô¶¯Ó¦ÓóÌÐòʱ²Å»ª±»Ê¹Óᣠ¡£¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬£¬ÔÚ˼¿ÆÐû²¼²¹¶¡ºó²»¾Ã£¬ £¬£¬£¬£¬£¬£¬ArubaÍþвÑо¿Ô±ÄæÏò¹¤³ÌÁ˸ÃÎó²î£¬ £¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÊÖÒÕϸ½Ú£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Ó²±àÂëµÄ¾²Ì¬ÃÜÂë¡£ ¡£¡£¡£¡£¡£SANSÊÖÒÕÑо¿ËùµÄÑо¿Ö÷Èα¨¸æ³Æ£¬ £¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýÔÚʹÓÃÕâÁ½¸öÎó²î¶Ô»¥ÁªÍøÉϵÄCSLUʵÀý¾ÙÐй¥»÷¡£ ¡£¡£¡£¡£¡£Ö»¹ÜÕâЩ¹¥»÷µÄ×îÖÕÄ¿µÄÉв»ÇåÎú£¬ £¬£¬£¬£¬£¬£¬µ«¹¥»÷Õß»¹ÊÔͼʹÓÃÆäËûÇå¾²Îó²î£¬ £¬£¬£¬£¬£¬£¬ÈçÓ°Ïì¹ãÖÝÓ¯¿Æµç×ÓDVRµÄÐÅϢй¶Îó²î£¨CVE-2024-0305£©¡£ ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬£¬£¬Õâ²¢·Ç˼¿ÆÊ×´Î´ÓÆä²úÆ·ÖÐɾ³ýºóÃÅÕÊ»§£¬ £¬£¬£¬£¬£¬£¬Ö®Ç°µÄÓ²±àÂëÆ¾Ö¤Ò²Ôø±£´æÓÚÆä¶à¸ö²úÆ·ÖС£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-cisco-smart-licensing-utility-flaws-now-exploited-in-attacks/


2. ÒÔÉ«ÁÐÌØ¹¤Èí¼þGraphiteʹÓÃWhatsAppÁãÈÕÎó²î


3ÔÂ20ÈÕ£¬ £¬£¬£¬£¬£¬£¬¶àÂ×¶à´óѧ¹«ÃñʵÑéÊÒµÄÍøÂçÇå¾²Ñо¿Ö°Ô±½ÒÆÆÁËÒÔÉ«Áй«Ë¾Paragon Solutions¿ª·¢µÄGraphiteÌØ¹¤Èí¼þµÄʹÓÃÇéÐΣ¬ £¬£¬£¬£¬£¬£¬¸ÃÈí¼þͨ¹ýWhatsAppÕë¶Ô×ÅÃûÈËÊ¿¾ÙÐй¥»÷¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬WhatsAppÖб£´æÒ»¸öδ֪µÄÁãÈÕÎó²î£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíÌØ¹¤Èí¼þÔÚÎÞÐèÓû§ÈκβÙ×÷µÄÇéÐÎÏÂ×°ÖÃÔÚ×°±¸ÉÏ£¬ £¬£¬£¬£¬£¬£¬´Ó¶øÊµÏÖ¶ÔÄ¿µÄÊÖ»úµÄδ¾­ÊÚȨ»á¼û¡£ ¡£¡£¡£¡£¡£Paragon SolutionsÉù³Æ×Ô¼ºÓëÆäËûÌØ¹¤Èí¼þ¹©Ó¦É̲î±ð£¬ £¬£¬£¬£¬£¬£¬×ñÊØÆ·µÂ±ê×¼£¬ £¬£¬£¬£¬£¬£¬È»¶ø¹«ÃñʵÑéÊÒµÄÑо¿È´Õ¹ÏÖÁ˸ù«Ë¾ÔÚ¶à¸ö¹ú¼ÒÕë¶Ô¼ÇÕß¡¢ÈËȨ»î¶¯¼ÒºÍÕþ¸®Æ·ÆÀÕßÒÉËÆ°²ÅÅÌØ¹¤Èí¼þµÄÇéÐΡ£ ¡£¡£¡£¡£¡£ÊӲ컹·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬¼ÓÄô󰲼òªʡ¾¯Ô±¾ÖϵͳÐÔµØÊ¹ÓÃÌØ¹¤Èí¼þ¹¦Ð§¡£ ¡£¡£¡£¡£¡£Òâ´óÀûÕþ¸®×î³õ·ñ¶¨ÓëParagonµÄÇ£Á¬£¬ £¬£¬£¬£¬£¬£¬µ«ØÊºóÈÏ¿ÉÓëÆäÇ©ÊðÁËÌõÔ¼¡£ ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬ÊÓ²ì»¹Éæ¼°ParagonÈ·ÈÏÄ¿µÄµÄÇ×ÃÜͬ°éÊÕµ½µÄAppleÍþв֪ͨ£¬ £¬£¬£¬£¬£¬£¬Ö¤ÊµÁËÐÂÐÍÌØ¹¤Èí¼þµÄ±£´æ¡£ ¡£¡£¡£¡£¡£Meta¡¢Æ»¹ûºÍ¹È¸èÏàÖú½â¾öÁ˸ÃÇå¾²Îó²î£¬ £¬£¬£¬£¬£¬£¬WhatsAppʵÑéÁËЧÀÍÆ÷¶ËÐÞ¸´£¬ £¬£¬£¬£¬£¬£¬Æ»¹ûÒ²Ðû²¼ÁËiOS²Ù×÷ϵͳ²¹¶¡¡£ ¡£¡£¡£¡£¡£


https://hackread.com/israeli-spyware-graphite-hit-whatsapp-0-click-exploit/


3. RansomHubÀÕË÷Èí¼þʹÓÃеÄBetruger¶à¹¦Ð§ºóÃÅ


3ÔÂ20ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÈüÃÅÌú¿ËÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪBetrugerµÄжñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬£¬ËüÊÇÒ»Öֶ๦ЧºóÃÅ£¬ £¬£¬£¬£¬£¬£¬ºÜ¿ÉÄÜÊÇΪÀÕË÷Èí¼þ¹¥»÷¶øÉè¼ÆµÄ¡£ ¡£¡£¡£¡£¡£Betruger¾ßÓÐÆÕ±éµÄ¹¦Ð§£¬ £¬£¬£¬£¬£¬£¬°üÀ¨¼üÅ̼ͼ¡¢ÍøÂçɨÃ衢ȨÏÞÌáÉý¡¢Æ¾Ö¤×ª´¢¡¢½ØÍ¼ÒÔ¼°ÎļþÉÏ´«µÈ£¬ £¬£¬£¬£¬£¬£¬Ö¼ÔÚïÔÌ­ÔÚÄ¿µÄÍøÂçÉÏͶ·ÅµÄй¤¾ßÊýÄ¿¡£ ¡£¡£¡£¡£¡£ÕâÖÖºóÃÅÓëRansomHubÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÔËÓªÁ¥Êô»ú¹¹Óйأ¬ £¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÓÚ2024Äê2Ô·ºÆð£¬ £¬£¬£¬£¬£¬£¬²¢×¨×¢ÓÚ»ùÓÚÊý¾Ý͵ÇÔµÄÀÕË÷£¬ £¬£¬£¬£¬£¬£¬¶ø·Ç¼òÆÓ¼ÓÃÜÊý¾Ý¡£ ¡£¡£¡£¡£¡£RansomHubÒѹ¥»÷Á˶à¼Ò×ÅÃûÆóÒµ£¬ £¬£¬£¬£¬£¬£¬°üÀ¨¹þÀï²®¶Ù¡¢¼ÑÊ¿µÃÅÄÂôÐС¢Frontier Communications¡¢Rite AidÁ¬ËøÒ©µêµÈ£¬ £¬£¬£¬£¬£¬£¬²¢Ð¹Â¶ÁËChange Healthcare±»µÁµÄÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬Ó°ÏìÁËÁè¼Ý1.9ÒÚÈË¡£ ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬¸ÃÍŻﻹÉù³ÆÈëÇÖÁ˱±ÃÀ×î´óµÄ³Éñ«ÖÎÁÆÌṩÉÌBayMark Health Services¡£ ¡£¡£¡£¡£¡£¾ÝÃÀ¹úÁª°îÊÓ²ì¾Öͳ¼Æ£¬ £¬£¬£¬£¬£¬£¬×èÖ¹2024Äê8Ô£¬ £¬£¬£¬£¬£¬£¬RansomHubÒÑÈëÇÖÃÀ¹ú¶à¸öÒªº¦»ù´¡ÉèÊ©²¿·ÖµÄ200¶àÃûÊܺ¦Õߣ¬ £¬£¬£¬£¬£¬£¬°üÀ¨Õþ¸®¡¢Òªº¦»ù´¡ÉèÊ©ºÍÒ½ÁƱ£½¡µÈÁìÓò¡£ ¡£¡£¡£¡£¡£BetrugerºóÃŵķ¢Ã÷½øÒ»²½Õ¹ÏÖÁËÀÕË÷Èí¼þÍÅ»ïÔÚ¹¥»÷ÊÖ¶ÎÉϵÄÒ»Ö±Á¢ÒìºÍÖØ´óÐÔ¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-uses-new-betruger-multi-function-backdoor/


4. HellCatºÚ¿Í×é֯ʹÓÃJiraƾ֤¹¥»÷AscomµÈÈ«ÇòÆóÒµ


3ÔÂ20ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÈðʿȫÇò½â¾ö¼Æ»®ÌṩÉÌAscomÈ·ÈÏÆäIT»ù´¡ÉèÊ©ÔâÊÜÁËÃûΪHellCatµÄºÚ¿Í×éÖ¯ÌᳫµÄÍøÂç¹¥»÷¡£ ¡£¡£¡£¡£¡£ºÚ¿Íͨ¹ýÇÔÈ¡µÄƾ֤¹¥»÷ÁËÈ«ÇòµÄJiraЧÀÍÆ÷£¬ £¬£¬£¬£¬£¬£¬ÇÖÈëÁËAscomµÄÊÖÒÕÆ±Îñϵͳ£¬ £¬£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁËÔ¼44GBµÄÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬Éæ¼°¸Ã¹«Ë¾µÄËùÓв¿·Ö¡£ ¡£¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬£¬AscomÌåÏÖ´Ë´ÎÊÂÎñ¶Ô¹«Ë¾µÄÓªÒµÔËӪûÓÐÓ°Ï죬 £¬£¬£¬£¬£¬£¬¿Í»§ºÍÏàÖúͬ°éÎÞÐè½ÓÄÉÔ¤·À²½·¥£¬ £¬£¬£¬£¬£¬£¬ÏÖÔÚÊÓ²ìÕýÔÚ¾ÙÐÐÖС£ ¡£¡£¡£¡£¡£HellCatºÚ¿Í×éÖ¯ÒÔ¹¥»÷JiraЧÀÍÆ÷Ϊ³£ÓÃÊֶΣ¬ £¬£¬£¬£¬£¬£¬¸Ãƽ̨ͨ³£°üÀ¨Ãô¸ÐÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬ÈçÔ´´úÂë¡¢Éí·ÝÑéÖ¤ÃÜÔ¿µÈ¡£ ¡£¡£¡£¡£¡£´Ëǰ£¬ £¬£¬£¬£¬£¬£¬HellCatÒÑÀֳɹ¥»÷ÁËÊ©ÄÍµÂµçÆø¡¢Î÷°àÑÀµçÐÅ¡¢Orange GroupºÍ½Ý±ªÂ·»¢µÈ¹«Ë¾£¬ £¬£¬£¬£¬£¬£¬ÇÔÈ¡²¢Ð¹Â¶ÁË´ó×ÚÄÚ²¿Îļþ¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷µÄ½¹µãÔÚÓÚHellCatʹÓôӱ»ÐÅÏ¢ÇÔÈ¡³ÌÐòѬȾµÄÊÜѬȾԱ¹¤ÄÇÀï»ñÈ¡µÄJiraƾ֤¡£ ¡£¡£¡£¡£¡£×î½ü£¬ £¬£¬£¬£¬£¬£¬HellCat»¹Ðû²¼ÈëÇÖÁËÓªÏú¹«Ë¾AffinitivµÄJiraϵͳ£¬ £¬£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨´ó×Úµç×ÓÓʼþºÍ¼Í¼µÄÊý¾Ý¿â¡£ ¡£¡£¡£¡£¡£ÓÉÓÚÐÅÏ¢ÇÔÈ¡ÕßÍøÂçµÄƾ֤ÈÝÒ×ÕÒµ½£¬ £¬£¬£¬£¬£¬£¬ÇÒ¹«Ë¾Î´Äܽ«ÆäÄÉÈë°´ÆÚÂÖ»»Á÷³Ì£¬ £¬£¬£¬£¬£¬£¬´ËÀ๥»÷¿ÉÄÜ»á±äµÃÔ½·¢ÆµÈÔ¡£ ¡£¡£¡£¡£¡£×¨¼ÒÖÒÑԳƣ¬ £¬£¬£¬£¬£¬£¬JiraÓÉÓÚÆäÔÚÆóÒµÊÂÇéÁ÷³ÌÖеĽ¹µãְλ¼°Æä´æ´¢µÄ´ó×ÚÊý¾Ý¶ø³ÉΪ¹¥»÷ÕßµÄÖ÷ҪĿµÄ¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hellcat-hackers-go-on-a-worldwide-jira-hacking-spree/


5. Oberlin MarketingÊýÊ®Íò·ÝÃô¸Ð¿µ½¡²ÆÎñÐÅÏ¢Ôâй¶


3ÔÂ18ÈÕ£¬ £¬£¬£¬£¬£¬£¬°ü¹Ü¾­¼Í¹«Ë¾Oberlin MarketingÒòδ±£»£»£»£»£»£»£»¤ÆäAWS S3´æ´¢Í°£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÊýÊ®Íò·Ý°üÀ¨¿Í»§¿µ½¡×´Ì¬ºÍ²ÆÎñÐÅÏ¢µÄÃô¸ÐÎļþÔâй¶¡£ ¡£¡£¡£¡£¡£ÕâЩÎļþÉæ¼°Áè¼Ý320,000ÃûÓû§£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢵绰ºÅÂë¡¢ÊðÃû¡¢¿µ½¡ÐÅÏ¢ºÍ²ÆÎñÏêÇéµÈ¡£ ¡£¡£¡£¡£¡£Ö»¹Ü¶à´ÎʵÑé֪ͨ¸Ã¹«Ë¾£¬ £¬£¬£¬£¬£¬£¬µ«´æ´¢Í°ÈÔ³¤Ê±¼ä̻¶ÔÚÍ⣬ £¬£¬£¬£¬£¬£¬ÔöÌíÁ˿ͻ§ÃæÁÙڲƭ¡¢Éí·Ý͵ÇÔºÍÆäËûÍøÂçÍþвµÄΣº¦¡£ ¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖ÷ÒªÊÇÒ½Áưü¹ÜÉêÇ룬 £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÉí·Ý͵ÇÔ¡¢¿ªÉèڲƭÐÔÒøÐÐÕË»§¡¢ÉêÇë´û¿î»ò¾ÙÐÐÆäËû²»·¨»î¶¯¡£ ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó»¹¿ÉÒÔʹÓÃй¶µÄÐÅÏ¢¾ÙÐÐÓÐÕë¶ÔÐÔµÄÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ÖÆ×÷¼«¾ß˵·þÁ¦µÄÐÂÎÅ£¬ £¬£¬£¬£¬£¬£¬ÓÕÆ­Ð¡ÎÒ˽¼Ò͸¶¸ü¶àÃô¸ÐÐÅÏ¢»òÏÂÔØ¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£¡£ÎªÁ˱ÜÃâÀàËÆµÄÊý¾Ýй¶£¬ £¬£¬£¬£¬£¬£¬½¨Òé¸ü¸Ä»á¼û¿ØÖÆ¡¢¸üÐÂȨÏÞ¡¢¼à¿Ø»á¼ûÈÕÖ¾¡¢ÆôÓÃЧÀÍÆ÷¶Ë¼ÓÃܲ¢Ê¹ÓÃAWSÃÜÔ¿ÖÎÀíЧÀÍÇå¾²µØÖÎÀí¼ÓÃÜÃÜÔ¿¡£ ¡£¡£¡£¡£¡£


https://cybernews.com/security/oberlin-marketing-medicare-applications-leaked/


6. CISAÖÒÑÔNAKIVOÎó²îCVE-2024-48248Õý±»Æð¾¢Ê¹ÓÃ


3ÔÂ20ÈÕ£¬ £¬£¬£¬£¬£¬£¬CISAÒÑÏòÃÀ¹úÁª°î»ú¹¹·¢³öÖÒÑÔ£¬ £¬£¬£¬£¬£¬£¬ÒªÇóÔöÇ¿ÍøÂçÇå¾²Ìá·À£¬ £¬£¬£¬£¬£¬£¬Õë¶ÔNAKIVO±¸·ÝºÍ¸´ÖÆÈí¼þÖб£´æµÄ¸ßÑÏÖØÎó²îCVE-2024-48248¾ÙÐзÀ»¤¡£ ¡£¡£¡£¡£¡£¸ÃÎó²îΪ¾ø¶Ô·¾¶±éÀúÎó²î£¬ £¬£¬£¬£¬£¬£¬¿Éʹδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¶ÁÈ¡Ò×Êܹ¥»÷Éè±¹ØÁ¬Äí§ÒâÎļþ¡£ ¡£¡£¡£¡£¡£NAKIVOÔÚ11ÔÂÐû²¼µÄBackup & Replication v11.0.0.88174°æ±¾ÖÐÒÑÇÄÇÄÐÞ²¹´ËÎó²î£¬ £¬£¬£¬£¬£¬£¬µ«´ËÇ°ÍøÂçÇå¾²¹«Ë¾watchTowrÒÑ·¢Ã÷´ËÎó²î½üÁ½¸öÔ¡£ ¡£¡£¡£¡£¡£watchTowrÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓôËÎó²î¿ÉÄÜ̻¶Ãô¸ÐÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬ÉõÖÁ½âËøÕû¸ö»ù´¡ÉèÊ©ÇéÐΡ£ ¡£¡£¡£¡£¡£CISAÒѽ«CVE-2024-48248Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓõÄÎó²îĿ¼ÖУ¬ £¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÐèÔÚÈýÖÜÄÚ±£»£»£»£»£»£»£»¤ÆäϵͳÃâÊܹ¥»÷¡£ ¡£¡£¡£¡£¡£ËäÈ»¸ÃÖ¸Áî½öÊÊÓÃÓÚÁª°î»ú¹¹£¬ £¬£¬£¬£¬£¬£¬µ«½¨ÒéËùÓÐ×éÖ¯¾¡¿ìÐÞ²¹´ËÎó²îÒÔ×èÖ¹¹¥»÷¡£ ¡£¡£¡£¡£¡£NAKIVOÔÚÈ«ÇòÓµÓÐÖÚ¶àÏàÖúͬ°éºÍ¿Í»§£¬ £¬£¬£¬£¬£¬£¬ÓªÒµÆÕ±é¶à¸ö¹ú¼Ò£¬ £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨±¾Ì˼¿Æ¡¢ÊʿڿÉÀÖºÍÎ÷ÃÅ×ÓµÈ×ÅÃû¹«Ë¾¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-tags-nakivo-backup-flaw-as-actively-exploited-in-attacks/