FourlisÅû¶Ò˼ÒÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ëðʧ³¬2000ÍòÅ·Ôª

Ðû²¼Ê±¼ä 2025-04-14

1. FourlisÅû¶Ò˼ÒÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ëðʧ³¬2000ÍòÅ·Ôª


4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Fourlis¼¯ÍÅ×÷ΪÒ˼ÒÔÚÏ£À°¡¢ÈûÆÖ·˹¡¢ÂÞÂíÄáÑǺͱ£¼ÓÀûÑǵÄÊÐËÁÔËÓªÉÌ£¬£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬£¬ÆäÔÚ2024Äê11ÔÂ27ÈÕÐþÉ«ÐÇÆÚÎåǰÔâÊܵÄÀÕË÷Èí¼þ¹¥»÷Ôì³ÉÁËÔ¼2000ÍòÅ·Ôª£¨2280ÍòÃÀÔª£©µÄËðʧ¡£¡£¡£ ¡£¡£¸ÃÇå¾²ÊÂÎñÓÚ2024Äê12ÔÂ3ÈÕ±»¹ûÕæ£¬£¬£¬£¬£¬£¬£¬£¬¼¯ÍÅÈÏ¿ÉÒ˼ÒÍøÉÏÊÐËÁÃæÁÙµÄÊÖÒÕÎÊÌâÔ´ÓÚ¡°¶ñÒâÍⲿÐÐΪ¡±¡£¡£¡£ ¡£¡£Ö»¹ÜFourlis¼¯ÍÅÔÚÕâЩ¹ú¼Ò»¹Ä±»®×ÅIntersport¡¢FootLockerºÍHolland&BarrettÊÐËÁ£¬£¬£¬£¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷Ö÷ÒªÓ°ÏìÁËÒ˼ÒÓªÒµ¡£¡£¡£ ¡£¡£ÐÂΟåÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷µ¼ÖÂÊÐËÁ²¹»õÔÝʱÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÓ°ÏìÁË2024Äê12ÔÂÖÁ2025Äê2ÔÂʱ´úµÄ¼Ò¾Ó×°Êβ¿·ÖºÍµç×ÓÉÌÎñÔËÓª¡£¡£¡£ ¡£¡£Fourlis¼¯ÍÅÊ×ϯִÐйÙDimitrisValachisÔ¤¼Æ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÇå¾²ÊÂÎñ¶ÔÒ˼ÒÏúÊÛÓªÒµµÄÓ°Ïìµ½2024Äê12Ô½«µÖ´ï1500ÍòÅ·Ôª£¬£¬£¬£¬£¬£¬£¬£¬µ½2025Ä꽫ÔÙµÖ´ï500ÍòÅ·Ôª¡£¡£¡£ ¡£¡£Valachis»¹Ç¿µ÷£¬£¬£¬£¬£¬£¬£¬£¬¹«Ë¾Ã»ÓÐÏòÀÕË÷Èí¼þ¹¥»÷ÕßÖ§¸¶ÈκÎÓöÈ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÍâ²¿ÍøÂçÇ徲ר¼ÒµÄ×ÊÖúÏ»ָ´ÁËÊÜÓ°ÏìµÄϵͳ¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬¹«Ë¾»¹Àֳɴì°ÜÁ˶à´ÎºóÐø¹¥»÷¡£¡£¡£ ¡£¡£Ö»¹Ü¹¥»÷ÒÑÒÑÍùÊýÔ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´ËÈÏÕæ¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-attack-cost-ikea-operator-in-eastern-europe-23-million/


2. LSCÔâÓöÖØ´óÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬160ÍòÈËÃô¸ÐÐÅÏ¢±»µÁ


4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÊµÑéÊÒЧÀÍÏàÖúÉ磨LSC£©¿ËÈÕÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬£¬³ÆÆäÔâÓöÑÏÖØÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬Ô¼160ÍòÈ˵ÄÃô¸ÐÐÅÏ¢±»ºÚ¿ÍÇÔÈ¡¡£¡£¡£ ¡£¡£LSC×÷Ϊһ¼ÒλÓÚÎ÷ÑÅͼµÄ·ÇÓªÀû×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬ÎªÃÀ¹ú35¶à¸öÖݵÄÉúÖ³¿µ½¡Ð§ÀÍ×éÖ¯Ìṩ¼¯ÖÐʵÑéÊÒЧÀÍ£¬£¬£¬£¬£¬£¬£¬£¬´¦Öóͷ£´ó×ÚÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£¡£¾ÝLSCÐû²¼µÄÇå¾²ÊÂÎñ֪ͨ£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÓÚ2024Äê10ÔÂÈëÇÖÆäÍøÂç²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£ ¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËLSCµÄ²¿·ÖÍøÂ磬£¬£¬£¬£¬£¬£¬£¬²¢»á¼û/ɾ³ýÁËijЩÎļþ¡£¡£¡£ ¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼Ò±êʶ·û¡¢Ò½ÁÆÐÅÏ¢¡¢°ü¹ÜÐÅÏ¢ÒÔ¼°Õ˵¥ºÍ²ÆÎñÊý¾ÝµÈ¡£¡£¡£ ¡£¡£´Ë´ÎÊý¾Ýй¶Ö÷ÒªÓ°Ïìͨ¹ý²¿·ÖÍýÏëÉúÓýÖÐÐľÙÐÐʵÑéÊÒ¼ì²âµÄСÎÒ˽¼Ò¡£¡£¡£ ¡£¡£Ö»¹ÜLSC¿ÉÒÔÈ·ÈÏÄÄЩÖÐÐÄÊܵ½ÁËÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚÒþ˽Ե¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬£¬£¬ÎÞ·¨Ñé֤СÎÒ˽¼Ò²ãÃæµÄÓ°Ïì¡£¡£¡£ ¡£¡£LSCÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¶ÔÕâÆðÇå¾²ÊÂÎñµÄÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬£¬£¬Íâ²¿ÍøÂçÇ徲ר¼ÒÒ²ÔÚ°µÍøÉÏ¼à¿ØÓë´Ë´ÎÈëÇÖÏà¹ØµÄÊý¾Ýй¶ÇéÐΡ£¡£¡£ ¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬ÉÐδ·¢Ã÷´ËÀàÊý¾ÝÔÚ°µÍøÊг¡¡¢ÂÛ̳»òÀÕË÷ÍøÕ¾ÉÏй¶¡£¡£¡£ ¡£¡£ÎªÓ¦¶Ô´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬LSCΪ¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÃâ·ÑÐÅÓÃ¼à¿ØºÍÒ½ÁÆÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÓÃÆÚΪ12»ò24¸öÔ¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/us-lab-testing-provider-exposed-health-data-of-16-million-people/


3. Î÷ϤÄá´óѧÔâÓö¶àÆðÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÐÅϢй¶Òý·¢¹Ø×¢


4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Î÷ϤÄá´óѧ£¨WSU£©½üÆÚÐû²¼±¬·¢Á½ÆðÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÉçÇø³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢Ôâй¶¡£¡£¡£ ¡£¡£×÷Ϊ°Ä´óÀûÑÇ×ÅÃû¸ßУ£¬£¬£¬£¬£¬£¬£¬£¬WSUÌṩ¿ç¶à¸öѧ¿ÆµÄ¿Î³Ì£¬£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ4.7ÍòÃûѧÉú¼°4500¶àÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬£¬Äê¶ÈÔËÓªÔ¤ËãÔ¼6ÒÚÃÀÔª¡£¡£¡£ ¡£¡£µÚÒ»ÆðÊÂÎñÉæ¼°2025Äê1ÔÂÖÁ2ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬£¬¸Ã´óѧµ¥µãµÇ¼£¨SSO£©ÏµÍ³ÔâÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬Ô¼1ÍòÃûÏÖÈμ°Ç°ÈÎѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢±»Î´¾­ÊÚȨ»á¼û¡£¡£¡£ ¡£¡£WSUÔÚ·¢Ã÷Î¥¹æÐÐΪºóѸËÙ½ÓÄÉÐж¯×èÖ¹¹¥»÷Õߣ¬£¬£¬£¬£¬£¬£¬£¬²¢Õö¿ªÊӲ졣¡£¡£ ¡£¡£µÚ¶þÆðÊÂÎñÔòÉæ¼°´óѧÉçÇø³ÉԱСÎÒ˽¼ÒÐÅÏ¢ÔÚ°µÍøÐ¹Â¶¡£¡£¡£ ¡£¡£Ö»¹ÜºÚ¿ÍÔçÔÚ2024Äê11ÔÂ1ÈÕ¾ÍÐû²¼ÁËÕâЩÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬µ«WSUÖ±µ½½ñÄê3ÔÂ24ÈÕ²ÅÒâʶµ½¡£¡£¡£ ¡£¡£´Ë´Îй¶µÄÐÅÏ¢ÀàÐÍÓëÖ®Ç°ÍøÂç֪ͨÖиÅÊöµÄÏàËÆ¡£¡£¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬WSUÔÚ2023Äê5Ô»¹ÔøÔâÓöÁíÒ»´ÎÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ7500ÈËÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁËÆäMicrosoftOffice365ÇéÐΣ¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþÕÊ»§ºÍSharePointÎļþ¡£¡£¡£ ¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ2023Äê7ÔÂÖÁ2024Äê3ÔÂʱ´úÒ»Ö±»á¼ûWSUÍøÂ磬£¬£¬£¬£¬£¬£¬£¬²¢»ñÈ¡ÁË580TBÊý¾Ý¡£¡£¡£ ¡£¡£¼øÓÚÒ»ÔÙ±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬¸±Ð£³¤¼æÐ£³¤ÇÇÖΡ¤ÍþÁ®Ä·Ë¹´ú±í´óѧ½ÒÏþÖÂǸÉùÃ÷£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÍŶÓÕýÔÚÆð¾¢Ó¦¶Ô£¬£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿Êý×ÖÇéÐΡ£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/western-sydney-university-discloses-security-breaches-data-leak/


4. ĦÂå¸ç¹ú¼ÒÉç»á°ü¹Ü¾ÖÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Êý°ÙÍò¹«ÃñÊý¾Ýй¶


4ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ä¦Âå¸ç¹ú¼ÒÉç»á°ü¹Ü¾ÖÕýÊÓ²ìÒ»ÆðÒÉËÆÓɰ¢¶û¼°ÀûÑǺڿÍÌᳫµÄÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÍò¹«ÃñÃô¸ÐÊý¾Ýй¶¡£¡£¡£ ¡£¡£¾ÝĦÂå¸çýÌ屨µÀ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈÆ¹ýÇ徲ϵͳ£¬£¬£¬£¬£¬£¬£¬£¬ÍµÈ¡ÁËÁè¼Ý5.4Íò·ÝÎļþ£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°½ü200ÍòÈ˵ÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢Éí·ÝÖ¤ºÅÂë¡¢ÁªÏµ·½·¨¼°ÒøÐÐÕË»§ÏêϸÐÅÏ¢µÈ¡£¡£¡£ ¡£¡£ÕâЩÎļþ±»Ðû²¼µ½Telegram¹«¹²ÆµµÀ£¬£¬£¬£¬£¬£¬£¬£¬²¿·ÖÖÊÁϱ£´æÎóµ¼ÐÔ¡¢½û¾øÈ·»ò²»ÍêÕûµÄÇéÐΡ£¡£¡£ ¡£¡£×Ô³ÆJabaROOTµÄºÚ¿Í×éÖ¯Éù³Æ¶Ô´Ë´ÎÈëÇÖÈÏÕæ£¬£¬£¬£¬£¬£¬£¬£¬Ö¸ÔðĦÂå¸çÔÚÍøÉϹ¥»÷°¢¶û¼°ÀûÑÇ»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔÈôĦÂå¸ç¼ÌÐø¾ÙÐÐÊý×ÖɧÈÅ£¬£¬£¬£¬£¬£¬£¬£¬½«·¢¶¯½øÒ»²½¹¥»÷¡£¡£¡£ ¡£¡£ÃÀ¹úÇå¾²¹«Ë¾ResecurityÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬±»µÁÊý¾Ý±»ÉÏ´«µ½°µÍøµ«ÉÐδ³öÊÛ£¬£¬£¬£¬£¬£¬£¬£¬Åú×¢¹¥»÷ÄîÍ·¿ÉÄÜÊÇÕþÖζø·Ç¾­¼Ã¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÈëÇÖÊÂÎñÓ°ÏìÁËĦÂå¸çºÍÍâ¹úʵÌ壬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Å·ÖÞ¹«Ë¾¡£¡£¡£ ¡£¡£ÈëÇÖ·½·¨Éв»ÇåÎú£¬£¬£¬£¬£¬£¬£¬£¬µ«ÔçÆÚÆÊÎöÅú×¢¿ÉÄÜÊÇÁãÈÕÎó²î»òµÚÈý·½Èí¼þÎó²îËùÖ¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬JabaROOT»¹·ÖÏíÁËĦÂå¸çÀ͹¤²¿ÍøÕ¾±»ÆÆËðµÄ½ØÍ¼£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾ÒÑÏÂÏß¡£¡£¡£ ¡£¡£Ä¦Âå¸çÓë°¢¶û¼°ÀûÑǹØÏµºã¾ÃÖ÷Òª£¬£¬£¬£¬£¬£¬£¬£¬ÕþÖκÍÁìÍÁÕù¶ËÒ»Ö±¼ÓÉî¡£¡£¡£ ¡£¡£´Ë´ÎÍøÂç¹¥»÷ÊÂÎñ½øÒ»²½¼Ó¾çÁËÁ½¹úÖ®¼äµÄÖ÷ÒªÊ±ÊÆ¡£¡£¡£ ¡£¡£


https://therecord.media/morocco-investigates-breach-hackers-algeria


5. ºÚ¿ÍʹÓ÷ûºÅÁ´½Ó±£´æ¶ÔÒÑÐÞ²¹µÄFortiGateVPNµÄ»á¼ûȨÏÞ


4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Fortinet·¢³ö½ôÆÈÇå¾²ÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬£¬³ÆÍþвÐÐΪÕßʹÓúóʹÓÃÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬¼´±ãԭʼ¹¥»÷ǰÑÔÒѱ»ÐÞ²¹£¬£¬£¬£¬£¬£¬£¬£¬ÈÔÄܼá³Ö¶ÔÊܹ¥»÷µÄFortiGateVPN×°±¸µÄÖ»¶Á»á¼ûȨÏÞ¡£¡£¡£ ¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬£¬FortinetÒÑÏò¿Í»§·¢ËÍÎÊÌâΪ¡°×°±¸Ð¹Â¶Í¨Öª-FortiGate/FortiOS-ÐèÒª½ôÆÈÐж¯¡±µÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ö¸¶¨ÎªTLP:AMBER+STRICT£¬£¬£¬£¬£¬£¬£¬£¬Ö¸³öÎÊÌâÓëÐÂÎó²îÎ޹أ¬£¬£¬£¬£¬£¬£¬£¬¶øÊÇÍþвÐÐΪÕßʹÓÃÏÈǰÒÑÖªÎó²îÁôϵÄ¡£¡£¡£ ¡£¡£ÕâЩÎó²î°üÀ¨CVE-2022-42475¡¢CVE-2023-27997ºÍCVE-2024-21762¡£¡£¡£ ¡£¡£ÍþвÐÐΪÕßͨ¹ýÔÚÓïÑÔÎļþ¼ÐÄÚ½¨ÉèÖ¸Ïò×°±¸¸ùÎļþϵͳµÄ·ûºÅÁ´½Ó£¬£¬£¬£¬£¬£¬£¬£¬¹æ±Ü¼ì²â²¢¼á³Ö»á¼ûȨÏÞ¡£¡£¡£ ¡£¡£FortinetÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬×ÝÈ»×°±¸ÒѸüÐÂÖÁ½â¾öԭʼÎó²îµÄ°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬´Ë·ûºÅÁ´½ÓÈÔ¿ÉÄܱ»ÒÅÁô£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÍþвÐÐΪÕß¼á³Ö¶Ô×°±¸ÎļþϵͳÉÏÎļþµÄÖ»¶Á»á¼ûȨÏÞ¡£¡£¡£ ¡£¡£·¨¹úCERT-FR͸¶£¬£¬£¬£¬£¬£¬£¬£¬ÕâÖÖÊÖÒÕÒѱ»ÓÃÓÚ¿É×·ËÝÖÁ2023ÄêÍ·µÄ´ó¹æÄ£¹¥»÷ÖС£¡£¡£ ¡£¡£CISA½¨ÒéÍøÂç·ÀÓùÕß½«ÓëFortinet±¨¸æÏà¹ØµÄÈκÎÊÂÎñºÍÒì³£»£»£»£»£»î¶¯±¨¸æÖÁÆä24/7ÔËÓªÖÐÐÄ¡£¡£¡£ ¡£¡£Fortinet½¨Òé¿Í»§Á¬Ã¦Éý¼¶FortiOS°æ±¾ÒÔɾ³ý¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬£¬£¬²¢¼ì²é×°±¸ÉèÖ㬣¬£¬£¬£¬£¬£¬£¬ÖØµã¹Ø×¢ÈκÎÒâÍâ¸ü¸Ä¡£¡£¡£ ¡£¡£CERT-FR»¹½¨Ò齫ÊÜËðµÄVPN×°±¸ÓëÍøÂç¸ôÀ룬£¬£¬£¬£¬£¬£¬£¬ÖØÖÃËùÓÐÉñÃØ£¬£¬£¬£¬£¬£¬£¬£¬²¢ËÑË÷ºáÏòÍøÂçÒÆ¶¯µÄÖ¤¾Ý¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-hackers-retain-access-to-patched-fortigate-vpns-using-symlinks/


6. Tycoon2FAƽ̨Éý¼¶ÒþÉíÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬£¬SVG´¹ÂÚ¹¥»÷¼¤ÔöÒý¹Ø×¢


4ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬£¬×ÅÃûÍøÂç´¹ÂÚ¼´Ð§ÀÍ(PhaaS)ƽ̨Tycoon2FA¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿ÆäÒþÉíºÍÌÓ±ÜÄÜÁ¦¡£¡£¡£ ¡£¡£¸Ãƽ̨×Ô2023Äê10Ô±»SekoiaÑо¿Ö°Ô±·¢Ã÷ÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬Ò»Ö±ÒÔÈÆ¹ýMicrosoft365ºÍGmailÕÊ»§ÉϵĶàÒòËØÉí·ÝÑéÖ¤¶øÖøÃû¡£¡£¡£ ¡£¡£´Ë´Î¸üаüÀ¨Ê¹Óò»¿É¼ûµÄUnicode×Ö·ûÒþ²ØJavaScriptÖеĶþ½øÖÆÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬Çл»µ½×ÔÍйÜCAPTCHAÒÔÌÓ±ÜÓòÃûÐÅÓþϵͳµÄÖ¸ÎÆÊ¶±ð£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°°üÀ¨·´µ÷ÊÔJavaScriptÒÔ¼ì²â²¢×èÖ¹ä¯ÀÀÆ÷×Ô¶¯»¯¹¤¾ß¡£¡£¡£ ¡£¡£ÕâЩ¹æ±ÜÊÖÒÕÁ¬Ïµºó£¬£¬£¬£¬£¬£¬£¬£¬Ê¹¼ì²âºÍÆÊÎö±äµÃÔ½·¢Öش󡣡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬£¬Trustwave±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓöñÒâSVG£¨¿ÉËõ·ÅʸÁ¿Í¼ÐΣ©ÎļþµÄÍøÂç´¹ÂÚ¹¥»÷¼±¾çÔöÌí£¬£¬£¬£¬£¬£¬£¬£¬ÕâÒ»Ç÷ÊÆÓÉTycoon2FAµÈPhaaSÆ½Ì¨ÍÆ¶¯¡£¡£¡£ ¡£¡£´Ó2024Äê4Ôµ½2025Äê3Ô£¬£¬£¬£¬£¬£¬£¬£¬´ËÀ๥»÷ÊýÄ¿ÉÏÉýÁË1,800%¡£¡£¡£ ¡£¡£¶ñÒâSVGͼÏñαװÕëÑÔÒôÐÂÎÅ¡¢»Õ±ê»òÔÆÎĵµÍ¼±ê£¬£¬£¬£¬£¬£¬£¬£¬µ«¿ÉÄܰüÀ¨JavaScript£¬£¬£¬£¬£¬£¬£¬£¬µ±Í¼ÏñÔÚä¯ÀÀÆ÷ÖзºÆðʱ£¬£¬£¬£¬£¬£¬£¬£¬JavaScript»á×Ô¶¯´¥·¢£¬£¬£¬£¬£¬£¬£¬£¬½«ÓʼþÊÕ¼þÈËÖØ¶¨Ïòµ½ÇÔÈ¡ÆäÕÊ»§Æ¾Ö¤µÄMicrosoft365ÍøÂç´¹ÂÚÒ³Ãæ¡£¡£¡£ ¡£¡£ÃæÁÙPhaaSƽ̨ºÍ»ùÓÚSVGµÄÍøÂç´¹ÂÚµÄÐËÆð£¬£¬£¬£¬£¬£¬£¬£¬Ìá¸ßСÐIJ¢ÑéÖ¤·¢¼þÈËÕæÊµÐÔ±äµÃÖÁ¹ØÖ÷Òª¡£¡£¡£ ¡£¡£Ò»ÖÖÓÐÓõķÀÓù²½·¥ÊÇ×èÖ¹»ò±ê¼Çµç×ÓÓʼþÍø¹ØÖеÄSVG¸½¼þ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Ó÷ÀÍøÂç´¹ÂÚµÄMFAÒªÁì¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/tycoon2fa-phishing-kit-targets-microsoft-365-with-new-tricks/