¶íÂÞ˹µç×ÓÉúÒâÆ½Ì¨RoseltorgÔâÇ×ÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯ÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2025-01-17

1. ¶íÂÞ˹µç×ÓÉúÒâÆ½Ì¨RoseltorgÔâÇ×ÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯ÍøÂç¹¥»÷


1ÔÂ14ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬¶íÂÞ˹Ö÷ÒªµÄÕþ¸®ºÍÆóÒµ²É¹ºµç×ÓÉúÒâÆ½Ì¨RoseltorgÔÚÖÜһȷÈÏ £¬£¬£¬£¬£¬ £¬£¬£¬Æäƽ̨ÔâÓöÁËÍøÂç¹¥»÷ £¬£¬£¬£¬£¬ £¬£¬£¬µ¼ÖÂЧÀÍÔÝʱÖÐÖ¹¡£ ¡£¡£¡£¡£¡£¡£¡£RoseltorgÊǶíÂÞ˹Õþ¸®Ñ¡¶¨µÄ×î´óµÄµç×ÓÉúÒâÔËÓªÉÌÖ®Ò» £¬£¬£¬£¬£¬ £¬£¬£¬ÈÏÕæ¹«¹²²É¹º £¬£¬£¬£¬£¬ £¬£¬£¬°üÀ¨¹ú·ÀºÍÐÞ½¨ÐÐÒµµÄÌõÔ¼ £¬£¬£¬£¬£¬ £¬£¬£¬²¢Ìṩµç×ÓÎĵµÖÎÀíºÍ²É¹ºÍýÏ빤¾ß¡£ ¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯Yellow DriftÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ £¬£¬£¬£¬£¬ £¬£¬£¬Éù³ÆÉ¾³ýÁË550TBµÄÊý¾Ý £¬£¬£¬£¬£¬ £¬£¬£¬°üÀ¨µç×ÓÓʼþºÍ±¸·Ý £¬£¬£¬£¬£¬ £¬£¬£¬²¢Ðû²¼Á˾ݳƱ»ÈëÇֵĻù´¡ÉèÊ©µÄ½ØÍ¼¡£ ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÒѾ­Ó°Ïìµ½ÒÀÀµRoseltorgÔËÓªµÄ¿Í»§ £¬£¬£¬£¬£¬ £¬£¬£¬°üÀ¨Õþ¸®»ú¹¹¡¢¹úÓÐÆóÒµºÍ¹©Ó¦ÉÌ £¬£¬£¬£¬£¬ £¬£¬£¬µ¼ÖÂDZÔڵIJÆÎñËðʧºÍ²É¹ºÁ÷³ÌµÄÑÓÎó¡£ ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜRoseltorgÌåÏÖËùÓÐÊý¾ÝºÍ»ù´¡ÉèÊ©ÒÑÍêÈ«»Ö¸´ £¬£¬£¬£¬£¬ £¬£¬£¬ÉúÒâϵͳԤ¼Æ½«ºÜ¿ì»Ö¸´ÔËÐÐ £¬£¬£¬£¬£¬ £¬£¬£¬µ«×èÖ¹Ïà¹Ø±¨µÀ׫дʱ £¬£¬£¬£¬£¬ £¬£¬£¬ÆäÍøÕ¾ÈÔ´¦ÓÚÀëÏß״̬¡£ ¡£¡£¡£¡£¡£¡£¡£RoseltorgÊDZ¾ÔÂÔâµ½Ç×ÎÚ¿ËÀ¼ºÚ¿Í¹¥»÷µÄ¼¸¼Ò¶íÂÞ˹¹«Ë¾Ö®Ò» £¬£¬£¬£¬£¬ £¬£¬£¬ÆäËû¹«Ë¾Èç¶íÂÞ˹Õþ¸®»ú¹¹RosreestrºÍ»¥ÁªÍøÌṩÉÌNodexÒ²Ôâµ½ÁËÀàËÆµÄ¹¥»÷¡£ ¡£¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬ £¬£¬£¬Ò»¸öÃûΪCyber Anarchy SquadµÄÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯»¹Ðû²¼¹¥»÷Á˶íÂÞ˹¿Æ¼¼¹«Ë¾Infobis £¬£¬£¬£¬£¬ £¬£¬£¬Éù³ÆÇÔÈ¡ÁË3TBµÄÐÅÏ¢²¢ÆÆËðÁ˸ù«Ë¾µÄ²¿·Ö»ù´¡ÉèÊ©¡£ ¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/russian-platform-for-state-procurement-hit-cyberattack


2. Avery ProductsÔâºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬ £¬£¬£¬6Íò¿Í»§Êý¾Ýй¶


1ÔÂ15ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬°¬Àû²úÆ·¹«Ë¾£¨Avery Products Corporation£© £¬£¬£¬£¬£¬ £¬£¬£¬Ò»¼ÒרעÓÚ²»¸É½º±êÇ©¡¢´ò°çÆ·ÅÆÔªËØ¼°Ó¡Ë¢Ð§À͵ÄÃÀ¹úÆóÒµ £¬£¬£¬£¬£¬ £¬£¬£¬½üÆÚÖÒÑÔ³ÆÆäÍøÕ¾avery.comÔâÓöÁ˺ڿ͹¥»÷ £¬£¬£¬£¬£¬ £¬£¬£¬µ¼Ö¿ͻ§ÐÅÓÿ¨ºÍСÎÒ˽¼ÒÐÅϢй¶¡£ ¡£¡£¡£¡£¡£¡£¡£2024Äê12ÔÂ9ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬¹«Ë¾·¢Ã÷ÕâÒ»¹¥»÷ £¬£¬£¬£¬£¬ £¬£¬£¬¾­ÄÚ²¿Êý×Öȡ֤ר¼ÒÊÓ²ìÈ·ÈÏ £¬£¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÔçÔÚͬÄê7ÔÂ18ÈÕ¾ÍÔÚÆäÔÚÏßÊÐËÁÖ²ÈëÁË¿¨Æ¬µÁË¢Æ÷ £¬£¬£¬£¬£¬ £¬£¬£¬ÖÂʹ7ÔÂ18ÈÕÖÁ12ÔÂ9ÈÕʱ´úÔÚÍøÕ¾ÉÏÊäÈëµÄÖ§¸¶ÐÅÏ¢±»ÇÔÈ¡¡£ ¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢Ö§¸¶¿¨ºÅ¡¢CVVÂë¡¢ÓÐÓÃÆÚ¼°¹ºÖýð¶îµÈ £¬£¬£¬£¬£¬ £¬£¬£¬ËäÎ´Éæ¼°Éç»áÇå¾²ºÅ¡¢¼ÝÕպš¢Éí·ÝÖ¤ºÅ¼°³öÉúÈÕÆÚµÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬ £¬£¬£¬µ«ÒÑ×ã¹»¾ÙÐÐڲƭÉúÒâ¡£ ¡£¡£¡£¡£¡£¡£¡£AveryÌåÏÖ £¬£¬£¬£¬£¬ £¬£¬£¬ËäÎÞ·¨È·ÈÏڲƭÊÕ·ÑÓë´Ë´ÎÊÂÎñÖ±½ÓÏà¹Ø £¬£¬£¬£¬£¬ £¬£¬£¬µ«Òѽӵ½¿Í»§ÔâÊÜڲƭÐÔÊշѺÍÍøÂç´¹ÂÚÓʼþµÄ±¨¸æ¡£ ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁË61,193Ãû¿Í»§ £¬£¬£¬£¬£¬ £¬£¬£¬AveryΪ´ËÌṩ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ £¬£¬£¬£¬£¬ £¬£¬£¬²¢½¨ÒéÊÕ¼þÈËСÐÄδ¾­ÇëÇóµÄͨѶ £¬£¬£¬£¬£¬ £¬£¬£¬ÊµÊ±±¨¸æ¿ÉÒɻ¡£ ¡£¡£¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬£¬ £¬£¬£¬¹«Ë¾ÉèÁ¢ÁË×ÊÖúÈÈÏß £¬£¬£¬£¬£¬ £¬£¬£¬ÒÔ½â´ð¿Í»§¶Ô´ËÊÂÎñµÄÒÉÎʺ͵£ÐÄ¡£ ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/label-giant-avery-says-website-hacked-to-steal-credit-cards/


3. MikroTik½©Ê¬ÍøÂçʹÓÃSPFÉèÖùýʧÈö²¥¶ñÒâÈí¼þ


1ÔÂ15ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬Ò»¸öÓÉÔ¼13,000̨MikroTik×°±¸×é³ÉµÄ½©Ê¬ÍøÂç±»·¢Ã÷ʹÓÃÓòÃûЧÀÍÆ÷¼Í¼ÖеĹýʧÉèÖÃÀ´Èƹýµç×ÓÓʼþ±£»£»£»£»¤ £¬£¬£¬£¬£¬ £¬£¬£¬²¢ÓÕÆ­Ô¼Äª20,000¸öÍøÂçÓòÈö²¥¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâ»î¶¯ÓÚ2024Äê11ÔÂÏÂÑ®×îÏÈ»îÔ¾ £¬£¬£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßͨ¹ýαÔìDHL ExpressµÄÔËÊ乫˾Éí·Ý £¬£¬£¬£¬£¬ £¬£¬£¬·¢ËÍ´øÓжñÒâJavaScriptÎļþµÄZIP¸½¼þ £¬£¬£¬£¬£¬ £¬£¬£¬¸ÃÎļþÄÜ»ã±àºÍÔËÐÐPowerShell¾ç±¾ £¬£¬£¬£¬£¬ £¬£¬£¬½ø¶øÓëλÓÚ֮ǰÓë¶íÂÞ˹ºÚ¿ÍÏà¹ØµÄÓòÖеÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèÅþÁ¬¡£ ¡£¡£¡£¡£¡£¡£¡£DNSÇå¾²¹«Ë¾InfobloxÖ¸³ö £¬£¬£¬£¬£¬ £¬£¬£¬ÕâЩ¶ñÒâÓʼþÏÔʾ³ö´ó×ÚÓòÃûºÍSMTPЧÀÍÆ÷IPµØµã £¬£¬£¬£¬£¬ £¬£¬£¬Õ¹ÏÖÁËÒ»¸öÖØ´óµÄ½©Ê¬ÍøÂç¡£ ¡£¡£¡£¡£¡£¡£¡£Ô¼20,000¸öÓòµÄSPF DNS¼Í¼ÉèÖùýÓÚ¿íËÉ £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹ÓÃÁË¡°+all¡±Ñ¡Ïî £¬£¬£¬£¬£¬ £¬£¬£¬ÔÊÐíÈκÎЧÀÍÆ÷´ú±íÕâЩÓò·¢Ë͵ç×ÓÓʼþ £¬£¬£¬£¬£¬ £¬£¬£¬ÕâΪÓÕÆ­ºÍδ¾­ÊÚȨµÄµç×ÓÓʼþ·¢ËÍÌṩÁËʱ»ú¡£ ¡£¡£¡£¡£¡£¡£¡£MikroTik×°±¸ÒòÆä¹¦Ð§Ç¿Ê¢¶ø³ÉΪĿµÄ £¬£¬£¬£¬£¬ £¬£¬£¬Ö»¹ÜÈ¥ÄêÑ×ÌìÒѱ޲ß×°±¸ËùÓÐÕ߸üÐÂϵͳ £¬£¬£¬£¬£¬ £¬£¬£¬µ«²¹¶¡Ðû²¼»ºÂý £¬£¬£¬£¬£¬ £¬£¬£¬Ðí¶à·ÓÉÆ÷ÈÔ±£´æÎó²î¡£ ¡£¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂ罫װ±¸ÉèÖÃΪSOCKS4ÊðÀí £¬£¬£¬£¬£¬ £¬£¬£¬ÓÃÓÚÌᳫDDoS¹¥»÷¡¢·¢ËÍÍøÂç´¹ÂÚÓʼþ¡¢ÇÔÈ¡Êý¾Ý £¬£¬£¬£¬£¬ £¬£¬£¬²¢ÑÚÊζñÒâÁ÷Á¿ÈªÔ´¡£ ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mikrotik-botnet-uses-misconfigured-spf-dns-records-to-spread-malware/


4. ºÚ¿ÍʹÓùȸèËÑË÷¹ã¸æÍƹ㴹ÂÚÍøÕ¾ÇÔÈ¡¹ã¸æÉÌÆ¾Ö¤


1ÔÂ15ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÏÖÔÚ¾¹Ê¹ÓùȸèËÑË÷¹ã¸æÍƹ㴹ÂÚÍøÕ¾ £¬£¬£¬£¬£¬ £¬£¬£¬ÍýÏëÇÔÈ¡¹ã¸æÉ̵Ĺȸè¹ã¸æÆ½Ì¨Æ¾Ö¤ £¬£¬£¬£¬£¬ £¬£¬£¬ÕâÒ»ÐÐΪ¼«¾ß¼¥Ð¦Òâζ¡£ ¡£¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ýÔÚGoogleËÑË÷ÉÏͶ·Åð³äGoogle¹ã¸æµÄ¹ã¸æ £¬£¬£¬£¬£¬ £¬£¬£¬ÏÔʾΪÔÞÖúЧ¹û £¬£¬£¬£¬£¬ £¬£¬£¬ÓÕµ¼Ç±ÔÚÊܺ¦Õß½øÈë¿´ËÆ¹Ù·½µÄÐéαµÇÂ¼Ò³Ãæ £¬£¬£¬£¬£¬ £¬£¬£¬½ø¶øÆ­È¡ÕË»§ÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚÒ³ÃæÍйÜÔÚGoogle SitesÉÏ £¬£¬£¬£¬£¬ £¬£¬£¬ÆäURLÓëGoogle AdsµÄ¸ùÓòÏàÆ¥Åä £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹µÃαװԽ·¢±ÆÕæ £¬£¬£¬£¬£¬ £¬£¬£¬ÈÝÒ×ÈÆ¹ýÁËÖ¼ÔÚ±ÜÃâÀÄÓúÍð³äµÄ¹æÔò¡£ ¡£¡£¡£¡£¡£¡£¡£¾ÝÊܺ¦ÕßÐÎò £¬£¬£¬£¬£¬ £¬£¬£¬¹¥»÷Á÷³Ì°üÀ¨ÊäÈëÕË»§ÐÅÏ¢¡¢ÍøÂç±êʶ·ûºÍƾ֤¡¢ÊÕµ½Òì³£µÇ¼ËùÔÚÌáÐÑÒÔ¼°ÕË»§±»ÐÂÖÎÀíÔ±½ÓÊܵȽ׶Ρ£ ¡£¡£¡£¡£¡£¡£¡£ÖÁÉÙÓÐÈý¸öÍøÂç·¸·¨ÍÅ»ïÉæ¼°´ËÀ๥»÷ £¬£¬£¬£¬£¬ £¬£¬£¬ËûÃÇ×îÖÕÄ¿µÄÊÇÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ±»µÁÕË»§²¢·¢¶¯¸ü¶à¹¥»÷¡£ ¡£¡£¡£¡£¡£¡£¡£Malwarebytes LabsÖ¸³ö £¬£¬£¬£¬£¬ £¬£¬£¬ÕâÊÇËûÃÇ×·×Ùµ½µÄ×î±°ÁӵĶñÒâ¹ã¸æÐж¯Ö®Ò» £¬£¬£¬£¬£¬ £¬£¬£¬¿ÉÄÜÓ°ÏìÈ«ÇòÊýǧÃû¿Í»§¡£ ¡£¡£¡£¡£¡£¡£¡£¶ø¹È¸èÔòÌåÏÖÃ÷ȷեȡ´ËÀàÓÕÆ­ÐÔ¹ã¸æ £¬£¬£¬£¬£¬ £¬£¬£¬²¢ÕýÔÚÆð¾¢ÊӲ첢½ÓÄÉÐж¯¡£ ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-use-google-search-ads-to-steal-google-ads-accounts/


5. Wolf Haldenstein ÔâÊý¾Ýй¶ £¬£¬£¬£¬£¬ £¬£¬£¬½ü350ÍòÈËÐÅÏ¢ÊÜÓ°Ïì


1ÔÂ16ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬Wolf Haldenstein Adler Freeman & Herz LLP£¨Wolf Haldenstein£© £¬£¬£¬£¬£¬ £¬£¬£¬Ò»¼Ò½¨ÉèÓÚ1888Äê²¢ÔÚÃÀ¹ú¶àµØÉèÓÐЧÀÍ´¦µÄ×ÅÃû״ʦÊÂÎñËù £¬£¬£¬£¬£¬ £¬£¬£¬ÓÚ2023Äê12ÔÂ13ÈÕÔâÓöÁËÊý¾Ýй¶ÊÂÎñ¡£ ¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÇÔÈ¡Á˽ü344ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢ £¬£¬£¬£¬£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢Ô±¹¤Ê¶ÓÖÃû¡¢Ò½ÁÆÕï¶Ï¼°Ë÷ÅâÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÊý¾ÝÆÊÎöºÍÊý×Öȡ֤µÄÖØ´óÐÔ £¬£¬£¬£¬£¬ £¬£¬£¬¸ÃÊÂÎñµÄÊÓ²ì½ø¶ÈÑÏÖØÖÍºó £¬£¬£¬£¬£¬ £¬£¬£¬Ö±µ½2024Äê12ÔÂ3ÈÕ²Å×îÖÕÈ·¶¨ÁËÊÜÓ°ÏìÈËÊý¡£ ¡£¡£¡£¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬ £¬£¬£¬ÓÉÓÚÎÞ·¨ÕÒµ½²¿·ÖÊÜÓ°ÏìÖ°Ô±µÄÁªÏµÐÅÏ¢ £¬£¬£¬£¬£¬ £¬£¬£¬Wolf HaldensteinÉÐδÏòËùÓÐÈË·¢ËÍ֪ͨ¡£ ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓà £¬£¬£¬£¬£¬ £¬£¬£¬µ«Ð¹Â¶µÄÐÅÏ¢¿ÉÄÜʹÊÜÓ°ÏìСÎÒ˽¼ÒÃæÁÙÍøÂç´¹ÂÚ¡¢Õ©Æ­µÈΣº¦ÔöÌí¡£ ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒѶԴ洢ÔÚЧÀÍÆ÷ÉϵÄÊý¾Ý¾ÙÐÐÁËÏêϸÉó²é £¬£¬£¬£¬£¬ £¬£¬£¬²¢Îª¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÔö²¹ÐÅÓÃ¼à¿Ø°ü¹Ü¡£ ¡£¡£¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬£¬ £¬£¬£¬Wolf HaldensteinÃãÀøÐ¡ÎÒ˽¼Ò¼á³ÖСÐÄ £¬£¬£¬£¬£¬ £¬£¬£¬ÉèÖÃڲƭ¾¯±¨»òÇå¾²¶³½á¡£ ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬ £¬£¬£¬Éв»ÇåÎúй¶µÄÊý¾ÝÊÇÊôÓÚ¿Í»§¡¢Ô±¹¤ÕվɯäËû´æ´¢ÔÚÆäЧÀÍÆ÷ÉϵÄСÎÒ˽¼Ò¡£ ¡£¡£¡£¡£¡£¡£¡£ÈôÊÇÄúÓëWolf HaldensteinÓÐÓªÒµÍùÀ´ £¬£¬£¬£¬£¬ £¬£¬£¬½¨ÒéÁªÏµËûÃÇÏàʶ´ËÊÂÎñ¶ÔÄúµÄÓ°Ïì¡£ ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wolf-haldenstein-law-firm-says-35-million-impacted-by-data-breach/


6. W3 Total Cache²å¼þ´æÑÏÖØÎó²î £¬£¬£¬£¬£¬ £¬£¬£¬ÊýÊ®ÍòWordPressÍøÕ¾ÃæÁÙΣº¦


1ÔÂ16ÈÕ £¬£¬£¬£¬£¬ £¬£¬£¬W3 Total Cache²å¼þÊÇÒ»¿îÆÕ±éÓ¦ÓÃÓÚWordPressÍøÕ¾µÄ¼ÓËÙ¹¤¾ß £¬£¬£¬£¬£¬ £¬£¬£¬½üÆÚ±»·¢Ã÷±£´æÒ»¸ö±àºÅΪCVE-2024-12365µÄÑÏÖØÇå¾²Îó²î¡£ ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÄܵ¼Ö¹¥»÷ÕßÈÝÒ×»á¼ûÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬ £¬£¬£¬°üÀ¨ÔÆÓ¦ÓÃÔªÊý¾Ý £¬£¬£¬£¬£¬ £¬£¬£¬¶ÔÍøÕ¾Çå¾²×é³ÉÖØ´óÍþв¡£ ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¿ª·¢Ö°Ô±ÒÑÔÚ×îа汾2.8.2ÖÐÐÞ¸´ÁË´ËÎÊÌâ £¬£¬£¬£¬£¬ £¬£¬£¬µ«ÈÔÓÐÊýÊ®ÍòÍøÕ¾ÉÐδ¸üР£¬£¬£¬£¬£¬ £¬£¬£¬ÈÔ´¦ÓÚΣº¦Ö®ÖС£ ¡£¡£¡£¡£¡£¡£¡£WordfenceÖ¸³ö £¬£¬£¬£¬£¬ £¬£¬£¬Îó²îÔ´Óھɰ汾ÖС°is_w3tc_admin_page¡±º¯ÊýµÄ¹¦Ð§¼ì²éȱʧ £¬£¬£¬£¬£¬ £¬£¬£¬Ê¹µÃ¹¥»÷ÕßÄÜÔÚ³õ¼¶±ðÉí·ÝÑéÖ¤ºóÖ´ÐÐδÊÚȨ²Ù×÷¡£ ¡£¡£¡£¡£¡£¡£¡£´ËÎó²îµÄΣº¦°üÀ¨Ð§ÀÍÆ÷¶ËÇëÇóαÔì¡¢ÐÅÏ¢Åû¶ºÍЧÀÍÀÄÓà £¬£¬£¬£¬£¬ £¬£¬£¬¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡¢ÍøÕ¾ÐÔÄÜϽµ¼°±¾Ç®ÔöÌí¡£ ¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÓû§Ó¦¾¡¿ìÉý¼¶ÖÁW3 Total Cache 2.8.2°æ±¾ÒÔÏû³ýÒþ»¼¡£ ¡£¡£¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬£¬ £¬£¬£¬ÍøÕ¾ËùÓÐÕßÓ¦ÉóÉ÷×°Öòå¼þ £¬£¬£¬£¬£¬ £¬£¬£¬×èÖ¹²»ÐëÒªµÄ²úÆ· £¬£¬£¬£¬£¬ £¬£¬£¬²¢Ë¼Á¿Ê¹ÓÃWebÓ¦ÓóÌÐò·À»ðǽÀ´Ê¶±ðºÍ×èÖ¹¹¥»÷ʵÑé £¬£¬£¬£¬£¬ £¬£¬£¬ÒÔ½øÒ»²½ÌáÉýÍøÕ¾Çå¾²ÐÔ¡£ ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/w3-total-cache-plugin-flaw-exposes-1-million-wordpress-sites-to-attacks/