ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶

Ðû²¼Ê±¼ä 2025-08-19

1. ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶


8ÔÂ18ÈÕ£¬£¬£¬ £¬È«ÇòÈËÁ¦×ÊÔ´¾ÞÍ·Workday¿ËÈÕÅû¶һÆðÖØ´óÊý¾ÝÇå¾²ÊÂÎñ£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÈëÇÖÆäµÚÈý·½¿Í»§¹ØÏµÖÎÀí£¨CRM£©Æ½Ì¨£¬£¬£¬ £¬µ¼Ö²¿·ÖÆóÒµÁªÏµÐÅϢй¶¡£¡£¡£´Ë´ÎÊÂÎñÒý¿¯ÐÐÒµÆÕ±é¹Ø×¢£¬£¬£¬ £¬²»µ«ÒòWorkdayµÄÖØ´ó¿Í»§»ù´¡£¬£¬£¬ £¬ÆäЧÀÍÁýÕÖÈ«Çò11,000Óà¼ÒÆóÒµ£¬£¬£¬ £¬°üÀ¨³¬60%µÄ¡¶²Æ²ú¡·500Ç¿ÆóÒµ£¬£¬£¬ £¬¸üÒò¸ÃÊÂÎñ±»Ö¤ÊµÓë½üÆÚÕë¶ÔSalesforce CRMʵÀýµÄϵÁй¥»÷±£´æ¹ØÁª¡£¡£¡£¾ÝWorkday¹Ù·½Åû¶£¬£¬£¬ £¬8ÔÂ6ÈÕ¹«Ë¾¼à²âµ½Òì³£»£»£»£»£»£»î¶¯£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÓÕÆ­Ô±¹¤ÊÚȨ¶ñÒâOAuthÓ¦Ó㬣¬£¬ £¬×îÖÕ»ñÈ¡µÚÈý·½CRMƽ̨´æ´¢µÄÉÌÒµÁªÏµÐÅÏ¢£¬£¬£¬ £¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂë¡£¡£¡£Ö»¹ÜWorkdayÇ¿µ÷¿Í»§½¹µãÊý¾ÝδÊÜÓ°Ï죬£¬£¬ £¬µ«Ð¹Â¶µÄÁªÏµ·½·¨ÈÔ¿ÉÄܱ»ÓÃÓÚºóÐøÕ©Æ­¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬´Ë´Î¹¥»÷ģʽÓëÎÛÃûÕÑÖøµÄShinyHuntersÀÕË÷×éÖ¯ÊÖ·¨¸ß¶ÈÎǺÏ£¬£¬£¬ £¬¸Ã×éÖ¯×ÔÄêÍ·Æðͨ¹ýÀàËÆÊÖ¶ÎÈëÇÖ¶à¼ÒÆóÒµSalesforceʵÀý£¬£¬£¬ £¬ÇÔÈ¡Êý¾Ý¿âºóʵÑéÀÕË÷£¬£¬£¬ £¬´ËǰÒѲ¨¼°°¢µÏ´ï˹¡¢°ÄÖÞº½¿Õ¡¢Â·Ò×ÍþµÇµÈÈ«Çò×ÅÃûÆóÒµ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks/


2. ÍþвÕßÉù³Æ³öÊÛ1580Íò·Ý´¿Îı¾PayPalƾ֤


8ÔÂ18ÈÕ£¬£¬£¬ £¬ÍøÂç·¸·¨ÂÛ̳ÉÏ·ºÆðÒ»Æð´ó¹æÄ£PayPalÕË»§Êý¾Ýй¶ÊÂÎñ¡£¡£¡£Ò»ÃûΪChucky_BFµÄÍþвÐÐΪÕß¹ûÕæ³öÊÛ±ê°ñΪ¡°È«ÇòPayPalƾ֤ת´¢2025¡±µÄÊý¾Ý¼¯£¬£¬£¬ £¬Éù³Æ°üÀ¨1580ÍòÌõ¼Í¼£¬£¬£¬ £¬Éæ¼°µç×ÓÓʼþµØµã¡¢Ã÷ÎÄÃÜÂë¼°Ö±½ÓÁ´½ÓÖÁPayPalЧÀ͵ÄURL£¬£¬£¬ £¬Êý¾Ý×ÜÁ¿´ï1.1GB¡£¡£¡£Âô¼Ò½«Æä³ÆÎª¡°ÍøÂç·¸·¨·Ö×ӵĽð¿ó¡±£¬£¬£¬ £¬²¢ÖÒÑÔ¸ÃÊý¾Ý¿ÉÄܱ»ÓÃÓÚÆ¾Ö¤Ìî³ä¹¥»÷¡¢ÍøÂç´¹ÂÚ¼°Ú²Æ­ÐÐΪ¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬ £¬¸ÃÊý¾Ý¼¯µÄ½á¹¹ÇкÏÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÌØÕ÷¡£¡£¡£´ËÀàÈí¼þͨ³£Í¨¹ýѬȾÓû§×°±¸£¬£¬£¬ £¬ÇÔÈ¡ÉúÑĵĵǼƾ֤¡¢ä¯ÀÀÆ÷Êý¾Ý¼°ÍøÕ¾»î¶¯£¬£¬£¬ £¬×îÖÕ½«ÍøÂçµÄÐÅÏ¢»ã×ܳöÊÛ¡£¡£¡£Ñù±¾ÏÔʾ£¬£¬£¬ £¬²¿·Ö¼Í¼°üÀ¨GmailµÈÓÊÏäÓëÃÜÂëµÄÅä¶Ô£¬£¬£¬ £¬ÇÒͳһÕË»§ÔÚÍøÂç°æºÍÒÆ¶¯°æPayPalÖеÄÏêϸÐÅÏ¢¾ù±»ÊÕ¼£¬£¬£¬ £¬ÌåÏÖÊý¾ÝÀ´×ÔÈ«Çò¶àµØÊÜѬȾװ±¸¡£¡£¡£Ö»¹ÜÂôÃÅ·ç³Æ¡°´ó´ó¶¼ÃÜÂëÇ¿¶È¸ßÇÒÆæÒ족£¬£¬£¬ £¬µ«Ò²ÈϿɱ£´æÖظ´Ê¹ÓÃÇéÐΣ¬£¬£¬ £¬ÕâÒâζ×ÅÓû§ÔÚÆäËûƽ̨ʹÓÃÏàͬÃÜÂëʱ¿ÉÄÜÃæÁÙ¿çվΣº¦¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬PayPalÉÐδ֤ʵ¸ÃÊý¾Ý¼¯µÄÕæÊµÐÔ£¬£¬£¬ £¬ÎÞ·¨È·¶¨ÆäÊÇÍêÈ«ÕæÊµµÄ¼Í¼¡¢°üÀ¨ÐéαÐÅÏ¢£¬£¬£¬ £¬ÕվɶÔÀúʷй¶Êý¾ÝµÄÖØÐ°ü×°¡£¡£¡£


https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/


3. Î÷½Ýº½¿ÕÈ·ÈÏÍøÂç¹¥»÷̻¶Á˿ͻ§µÄÃô¸ÐÐÅÏ¢


8ÔÂ15ÈÕ£¬£¬£¬ £¬¼ÓÄôóµÚ¶þ´óº½¿Õ¹«Ë¾Î÷½Ýº½¿Õ¿ËÈÕ֤ʵ£¬£¬£¬ £¬ÆäÂÿͲ¿·ÖСÎÒ˽¼ÒÐÅÏ¢ÔÚ6Ô·ݵÄÍøÂç¹¥»÷Öб»ÇÔÈ¡£¬£¬£¬ £¬³ÉΪÓÖÒ»ÆðÕë¶Ôº½¿ÕÒµµÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¾ÝÅû¶£¬£¬£¬ £¬6ÔÂ13ÈÕ£¬£¬£¬ £¬Î÷½Ýº½¿Õϵͳ¼ì²âµ½¿ÉÒɻ£¬£¬£¬ £¬·¸·¨·Ö×Óͨ¹ýÔÝʱ»á¼ûȨÏÞÇÔÈ¡ÁËÂÿÍÊý¾Ý¡£¡£¡£Ö»¹Ü¹«Ë¾Î´¹ûÕæÏêϸÊÜÓ°ÏìÈËÊý£¬£¬£¬ £¬µ«Ã÷È·ÌåÏÖй¶ÐÅÏ¢¿ÉÄÜÒòÂÿͶøÒ죬£¬£¬ £¬º­¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµÐÅÏ¢¡¢ÐÔ±ð¡¢ÂÃÐÐÖ¤¼þÐÅÏ¢¼°½üÆÚÔ¤¶©¼Í¼¡£¡£¡£ÓÈΪֵµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬»¤ÕÕµÈСÎÒ˽¼ÒÎļþ¿ÉÄܱ»ÓÃÓÚαÔìÉí·Ý»òʵÑéÆäËû·¸·¨»î¶¯£¬£¬£¬ £¬Òý·¢¶ÔÉí·Ý͵ÇÔΣº¦µÄµ£ÐÄ¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬ £¬Î÷½Ýº½¿ÕÇ¿µ÷ÐÅÓÿ¨ºÅ¡¢½è¼Ç¿¨ÏêϸÐÅÏ¢¼°Óû§ÃÜÂëδ±»Ð¹Â¶£¬£¬£¬ £¬Ò»¶¨Ë®Æ½ÉÏ»º½âÁËÓû§¶Ô²ÆÎñËðʧµÄÖ±½Óµ£ÐÄ¡£¡£¡£¹«Ë¾»ØÓ¦³Æ£¬£¬£¬ £¬ÒÑÒÔ¡°×î½ôÆÈºÍ×îÖØÊÓµÄ̬¶È¡±´¦Öóͷ£¸ÃÊÂÎñ£¬£¬£¬ £¬²¢½ÓÄÉÌØÊâÇå¾²²½·¥Ç¿»¯ÏµÍ³·À»¤£¬£¬£¬ £¬±ÜÃâÀàËÆÊÂÎñÖØÑÝ¡£¡£¡£ÎªÌDZÔÚËðʧ£¬£¬£¬ £¬Î÷½Ýº½¿ÕÓëÐÅÓüà²â»ú¹¹TransUnion CanadaÏàÖú£¬£¬£¬ £¬ÎªÊÜÓ°ÏìÂÿÍÌṩΪÆÚ24¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£Âÿͻ¹¿Éͨ¹ý¡°Éí·Ý»Ö¸´ÊðÀí¡±»ñȡרҵ֧³Ö£¬£¬£¬ £¬½â¾öÉí·Ý͵ÇÔÏà¹ØÎÊÌ⣬£¬£¬ £¬²¢ÏíÓÐ×î¸ß100ÍòÃÀÔªµÄÓöȱ¨Ïú°ü¹ÜÒÔÓ¦¶ÔڲƭÊÂÎñ¡£¡£¡£


https://cybernews.com/news/westjet-confirms-cyber-breach-exposed-sensitive-details-of-customers/


4. ºÚ¿ÍÔÚNetflixÍøÂç´¹ÂÚÖÐÇÔÈ¡FacebookµÇ¼ÐÅÏ¢


8ÔÂ15ÈÕ£¬£¬£¬ £¬ÍøÂçÇå¾²¹«Ë¾Malwarebytes×îÐÂÑо¿Õ¹ÏÖ£¬£¬£¬ £¬Õ©Æ­ÕßÕýͨ¹ýαÔìNetflixÕÐÆ¸ÓʼþʵÑé¾«×¼ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸Äܹ»»á¼ûÆóÒµFacebookÉÌÒµÕË»§µÄÓªÏúÖ°Ô±¡£¡£¡£´Ë´Î¹¥»÷ÒÔ¡°¸ßнְλ¡±ÎªÓÕ¶ü£¬£¬£¬ £¬ÓÕµ¼Êܺ¦Õßй¶É罻ýÌ対֤£¬£¬£¬ £¬×îÖÕ¿ÉÄܱ»ÓÃÓÚ¶ñÒâ¹ã¸æÍ¶·Å¡¢ÕË»§ÀÕË÷»òÈö²¥ÐéαÐÅÏ¢¡£¡£¡£¹¥»÷Á÷³ÌÏÔʾ£¬£¬£¬ £¬Õ©Æ­ÕßÊ×ÏÈ·¢ËÍ¿´ËÆ×¨ÒµµÄÕÐÆ¸Óʼþ£¬£¬£¬ £¬ÎÊÌâΪ¡°Netflix¸ß¹Üְλʱ»ú¡±£¬£¬£¬ £¬ÄÚÈݸ߶ȸöÐÔ»¯£¬£¬£¬ £¬ÔÞÑïÊܺ¦Õߵġ°ÓªÏúÏòµ¼Á¦¡±²¢Ô¼ÇëÉêÇë¡°ÓªÏú¸±×ܲᱡ°É罻ýÌå×ܼࡱµÈְλ¡£¡£¡£ÓʼþÖи½ÓÐÐéαNetflixÖ°ÒµÍøÕ¾Á´½Ó£¬£¬£¬ £¬ÒªÇóÊܺ¦Õß½¨ÉèСÎÒ˽¼Òµµ°¸²¢¹ØÁªFacebookÕË»§¡£¡£¡£µ±Óû§µã»÷¡°¼ÌÐøÊ¹ÓÃFacebook¡±»òÓÊÏäµÇ¼ʱ£¬£¬£¬ £¬Ò³Ãæ»áÌø×ªÖÁαÔìµÄFacebookµÇ¼½çÃæ£¬£¬£¬ £¬ÓÕµ¼ÊäÈëÆ¾Ö¤¡£¡£¡£MalwarebytesÑо¿Ô±Pieter ArntzÖ¸³ö£¬£¬£¬ £¬´Ë´Î¹¥»÷µÄÊÖÒÕÖØÆ¯ºó½Ï¸ß£ºÕ©Æ­Õßͨ¹ýwebsocketÒªÁìʵʱ×èµ²Óû§ÊäÈ룬£¬£¬ £¬ÔÚÊܺ¦ÕߺÁÎÞ²ì¾õµÄÇéÐÎϵǼÆäÕæÊµFacebookÕË»§£¬£¬£¬ £¬ÉõÖÁ¿ÉÄÜÈÆ¹ý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©¡£¡£¡£Ò»µ©¿ØÖÆÕË»§£¬£¬£¬ £¬¹¥»÷Õß¿ÉÁ¬Ã¦×¢ÏúÊܺ¦Õß×°±¸¡¢ÏòÆäÖ¿ÓÑ·¢ËÍÀ¬»øÓʼþ£¬£¬£¬ £¬»òʹÓÃÆóÒµÖ§¸¶È¨ÏÞͶ·Å¶ñÒâ¹ã¸æ¡£¡£¡£


https://cybernews.com/security/netflix-phishing-campaign-facebook-login-targets-marketing-social-media-job-seekers/


5. ERMAC V3.0ÒøÐÐľÂíÔ´´úÂëй¶£¬£¬£¬ £¬Ì»Â¶ÍêÕû¶ñÒâÈí¼þ»ù´¡ÉèÊ©


8ÔÂ16ÈÕ£¬£¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÐÂÐÍAndroidÒøÐÐľÂíERMAC 3.0µÄÏêϸÔË×÷»úÖÆ£¬£¬£¬ £¬Õ¹ÏÖÆä×÷Ϊ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©²úÆ·µÄÍêÕûÊÖÒռܹ¹¼°ÔËÓªÎó²î¡£¡£¡£¸Ã±äÖÖÓÉDukeEugeneÍþв×éÖ¯ÔËÓª£¬£¬£¬ £¬±»ÆÀ¹ÀΪCerberusºÍBlackRockµÄ½ø»¯°æ±¾£¬£¬£¬ £¬ÆäÊÖÒÕѪͳ¿É×·ËÝÖÁHook£¨ERMAC 2.0£©¡¢PegasusµÈ×ÅÃû¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£¾ÝHunt.ioÐû²¼µÄ±¨¸æ£¬£¬£¬ £¬ERMAC 3.0ʵÏÖÈý´óÊÖÒÕÍ»ÆÆ£ºÊ×ÏÈ£¬£¬£¬ £¬Ä¿µÄÓ¦ÓùæÄ£´ó·ùÀ©Õ¹ÖÁ700Óà¸öÒøÐС¢µçÉ̼°¼ÓÃÜÇ®±Òƽ̨£¬£¬£¬ £¬Í¨¹ýÔöÇ¿µÄ±íµ¥×¢È빦ЧʵÏÖ¾«×¼Êý¾ÝÇÔÈ¡£¡£¡£»£»£»£»£»£»Æä´Î£¬£¬£¬ £¬½ÓÄÉAES-CBC¼ÓÃÜͨѶЭÒ飬£¬£¬ £¬²¢Öع¹ÁË»ùÓÚPHP/LaravelµÄC2ЧÀÍÆ÷¡¢Reactǰ¶ËÃæ°å¡¢GolangÉøÍ¸Ð§ÀÍÆ÷¼°Kotlin±àдµÄAndroidºóÃŵÈȫջ×é¼þ£»£»£»£»£»£»×îºó£¬£¬£¬ £¬ÆäÄ£¿ £¿£¿£¿£¿£¿é»¯¹¹½¨Æ÷ÔÊÐí¿Í»§¶¨ÖƶñÒâÈí¼þ²ÎÊý£¬£¬£¬ £¬Ðγɰ´Ðè¶¨ÖÆµÄ¹¥»÷Á´¡£¡£¡£Ñо¿ÍŶÓͨ¹ýÉøÍ¸ÆÊÎö·¢Ã÷£¬£¬£¬ £¬¸Ã×éÖ¯ÔËÓªµÄЧÀÍÆ÷±£´æÑÏÖØÇ徲ȱÏÝ£ºÖÎÀíÃæ°å¿ª·ÅÄäÃû×¢²á£¬£¬£¬ £¬Ä¬ÈÏʹÓþ²Ì¬ÖÎÀíÔ±ÁîÅÆºÍÓ²±àÂëJWTÃÜÔ¿£¬£¬£¬ £¬ºó¶ËÊý¾Ý¿âδ×öȨÏÞ¸ôÀë¡£¡£¡£ÕâЩÎó²îµ¼Ö¹¥»÷ÕßµÄÍêÕûÊÖÒÕ×ʲúÍâй£¬£¬£¬ £¬°üÀ¨Ô´´úÂë¡¢×°±¸°ó¶¨»úÖÆ¡¢ÁýÕÖ¹¥»÷Ä£°å¼°C2ͨѶЭÒé¡£¡£¡£


https://thehackernews.com/2025/08/ermac-v30-banking-trojan-source-code.html


6. ΢ÈíÐéα̸ÌìGPT×ÀÃæÓ¦ÓóÌÐòÌṩPipeMagicºóÃÅ


8ÔÂ18ÈÕ£¬£¬£¬ £¬Î¢ÈíÇå¾²ÍŶӿËÈÕÅû¶һÆðʹÓÃαÔìChatGPT×ÀÃæÓ¦ÓÃÈö²¥ÐÂÐͺóÃÅPipeMagicµÄ¹¥»÷ÊÂÎñ£¬£¬£¬ £¬¸ÃÊÂÎñÓëÕë¶ÔÈ«Çò½ðÈÚ¡¢·¿µØ²úµÈÐÐÒµµÄÀÕË÷Èí¼þ¹¥»÷Ïà¹ØÁª£¬£¬£¬ £¬ÆäÊÖÒÕÖØ´óÐÔ¼°Òþ²ØÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¹¥»÷Õßͨ¹ý¸Ä¶¯GitHubÉϵĿªÔ´ChatGPT×ÀÃæÏîÄ¿£¬£¬£¬ £¬ÔÚÆäÖÐÖ²Èë¶ñÒâ´úÂ룬£¬£¬ £¬ÓÕµ¼Óû§´Ó·Ç¹Ù·½ÇþµÀÏÂÔØÄ¾Âí»¯¸±±¾¡£¡£¡£PipeMagicºóÃŽÓÄɸ߶ÈÄ£¿ £¿£¿£¿£¿£¿é»¯¼Ü¹¹£¬£¬£¬ £¬½«ÏÂÁî¿ØÖÆÍ¨Ñ¶¡¢ÓÐÓÃÔØºÉÖ´Ðеȹ¦Ð§²ð·ÖΪ×ÔÁ¦×é¼þ£¬£¬£¬ £¬Í¨¹ý¼ÓÃÜÃüÃû¹ÜµÀºÍÄÚ´æ²Ù×÷ʵÏÖÒþ²ØÔËÐС£¡£¡£Æä½¹µãÉè¼Æ°üÀ¨Èý×éÁ´±í½á¹¹£ºÒ»×éÖÎÀí´ýÖ´ÐÐÄ£¿ £¿£¿£¿£¿£¿é£¬£¬£¬ £¬Ò»×é´¦Öóͷ£ÍøÂçͨѶ£¬£¬£¬ £¬ÁíÒ»×鶯̬¼ÓÔØ¹¦Ð§×é¼þ¡£¡£¡£ÕâÖÖÊèɢʽ¼Ü¹¹²»µ«½µµÍÁ˼ì²âÄѶÈ£¬£¬£¬ £¬»¹ÔÊÐí¹¥»÷Õßͨ¹ýרÓÃÍøÂçÄ£¿ £¿£¿£¿£¿£¿é½¨ÉèWebSocketÆø¸ÅµÄÇ徲ͨµÀ£¬£¬£¬ £¬ÓëC2ЧÀÍÆ÷½»»¥ÏµÍ³ÐÅÏ¢²¢ÎüÊÕÖ¸Á£¬£¬ £¬ÊµÏÖÄ£¿ £¿£¿£¿£¿£¿é¶¯Ì¬¸üлòÌæ»»£¬£¬£¬ £¬ÎÞÐèÖØÐ°²ÅÅÕû¸öºóÃÅ¡£¡£¡£Î¢Èí½«´Ë´Î¹¥»÷¹éÒòÓÚÒÔ¾­¼ÃÀûÒæÎªµ¼ÏòµÄStorm-2460×éÖ¯¡£¡£¡£¸Ã×éÖ¯ÔڻÖÐʹÓÃWindows CLFSÁãÈÕÎó²îCVE-2025-29824£¬£¬£¬ £¬´Ó³õʼ»á¼û¿ìËÙתÏòÀÕË÷Èí¼þ°²ÅÅ¡£¡£¡£Æä¹¥»÷¹æÄ£ÁýÕÖÃÀ¹ú¡¢Å·ÖÞ¡¢ÄÏÃÀ¼°Öж«µØÇø£¬£¬£¬ £¬Ä¿µÄ°üÀ¨½ðÈÚ¡¢·¿µØ²úµÈ¶àÐÐÒµ»ú¹¹¡£¡£¡£


https://hackread.com/fake-chatgpt-desktop-app-pipemagic-backdoor-microsoft/