SuperCard XʹÓÃNFCÖм̹¥»÷Ãé×¼Android×°±¸

Ðû²¼Ê±¼ä 2025-04-21

1. SuperCard XʹÓÃNFCÖм̹¥»÷Ãé×¼Android×°±¸


4ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬ÐÂÐͶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Æ½Ì¨¡°SuperCard X¡±ÒÑÏÖÉí£¬£¬£¬£¬£¬£¬£¬¸Ãƽ̨Õë¶ÔAndroid×°±¸£¬£¬£¬£¬£¬£¬£¬Í¨¹ýNFCÖм̹¥»÷ʵÑéÏúÊ۵㼰ATMÉúÒâڲƭ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃй¶µÄÖ§¸¶¿¨Êý¾Ý²»·¨×¬Ç®¡£¡£¡£¡£¡£¡£¡£¡£´Ëƽ̨´úÂëÓ뿪ԴÏîÄ¿NFCGate¼°Æä¶ñÒâ±äÖÖNGate±£´æÏàËÆÐÔ£¬£¬£¬£¬£¬£¬£¬ºóÕß×ÔÈ¥ÄêÆðÔÚÅ·ÖÞÆµÈÔ·¢¶¯¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£SuperCard Xͨ¹ýTelegramƵµÀ¾ÙÐÐÍÆ¹ã£¬£¬£¬£¬£¬£¬£¬²¢Îª¡°¿Í»§¡±Ìṩֱ½ÓÖ§³Ö¡£¡£¡£¡£¡£¡£¡£¡£Òƶ¯Çå¾²¹«Ë¾CleafyÔÚÒâ´óÀû¼à²âµ½Ê¹Óô˶ñÒâÈí¼þµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Éæ¼°¶à¸öÑù±¾£¬£¬£¬£¬£¬£¬£¬ÏÔʾÆäͬÃË»áÔ±¿Éƾ֤µØÇø»òÌØ¶¨ÐèÇó¶¨Öư汾¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌʼÓÚÊܺ¦ÕßÊÕµ½Ã°³äÒøÐеÄÐéαÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ËæºóÆ­×Óͨ¹ýÉç½»¹¤³ÌÊÖ¶ÎÓÕÆ­Êܺ¦ÕßÌṩ¿¨ºÅºÍPINÂ룬£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Æä×°ÖÃαװ³ÉÇå¾²»òÑéÖ¤¹¤¾ßµÄ¶ñÒâÓ¦Óá°Reader¡±¡£¡£¡£¡£¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓýöÇëÇó»á¼ûNFCÄ£¿£¿£¿£¿éµÄȨÏÞ£¬£¬£¬£¬£¬£¬£¬½ø¶øÇÔȡ֧¸¶¿¨Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄÊý¾ÝÔÚAndroid×°±¸ÉÏÄ£ÄâÊܺ¦ÕߵĿ¨£¬£¬£¬£¬£¬£¬£¬¾ÙÐзǽӴ¥Ê½Ö§¸¶ºÍATMÈ¡¿î¡£¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬SuperCard XÏÖÔÚÉÐδ±»VirusTotalÉϵÄÈκηÀ²¡¶¾ÒýÇæ±ê¼Ç£¬£¬£¬£¬£¬£¬£¬ÇÒÓÉÓÚ²»°üÀ¨Î£ÏÕȨÏÞÇëÇóºÍ¹¥»÷ÐÔ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Äܹ»¹æ±ÜÆô·¢Ê½É¨ÃèµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/supercard-x-android-malware-use-stolen-cards-in-nfc-relay-attacks/


2. Erlang/OTP SSHÑÏÖØÎó²îÏÖÒѹûÕæ£¬£¬£¬£¬£¬£¬£¬ÇëÁ¬Ã¦ÐÞ²¹


4ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Õë¶ÔErlang/OTP SSHµÄÒ»¸öÑÏÖØÎó²î£¨CVE-2025-32433£©µÄ¹ûÕæ¹¥»÷ÒѸ¡³öË®Ãæ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÊÜÓ°Ïì×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬£¬£¬µÂ¹ú²¨ºè³¶û´óѧÑо¿Ö°Ô±ÓÚÖÜÈýÅû¶ÁË´ËÎó²î£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔËùÓÐÔËÐиÃÊØ»¤Àú³ÌµÄ×°±¸¾ù±£´æÎ£º¦¡£¡£¡£¡£¡£¡£¡£¡£Îó²îÔ´ÓÚSSHЭÒéÐÂÎÅ´¦Öóͷ£ÖеÄÒ»¸öȱÏÝ£¬£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷ÕßÄÜÔÚÉí·ÝÑé֤ǰ·¢ËÍÅþÁ¬Ð­ÒéÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¸ÃÎó²îÒÑÔÚ25.3.2.10ºÍ26.2.4°æ±¾ÖÐÐÞ¸´£¬£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚErlang/OTP³£ÓÃÓÚµçÐÅ»ù´¡ÉèÊ©¡¢Êý¾Ý¿âºÍ¸ß¿ÉÓÃÐÔϵͳ£¬£¬£¬£¬£¬£¬£¬×°±¸¸üпÉÄܲ¢½ûÖ¹Òס£¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÇéÐθüΪ½ôÆÈµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¶àÃûÍøÂçÇå¾²Ñо¿Ö°Ô±ÒÑ˽Ͻ¨ÉèÁË¿ÉÔÚÒ×Êܹ¥»÷×°±¸ÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Zero Day InitiativeµÄPeter GirnusºÍHorizon3µÄÑо¿Ö°Ô±£¬£¬£¬£¬£¬£¬£¬ËûÃǾùÌåÏÖ¸ÃÎó²î¼«Ò×±»Ê¹Óᣡ£¡£¡£¡£¡£¡£¡£²»¾Ãºó£¬£¬£¬£¬£¬£¬£¬ProDefenseÔÚGitHubÉÏÐû²¼ÁËPoCÎó²î£¬£¬£¬£¬£¬£¬£¬²¢ÔÚPastebinÉÏÄäÃûÐû²¼ÁËÁíÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬Á½Õß¾ùÔÚÉ罻ýÌåÉÏѸËÙÈö²¥¡£¡£¡£¡£¡£¡£¡£¡£¼øÓÚSSHÊÇ×î³£ÓõÄÔ¶³Ì»á¼ûÖÎÀíЭÒ飬£¬£¬£¬£¬£¬£¬ÇÒµçÐŹ«Ë¾ÆµÈÔ³ÉΪ¹ú¼Ò¼¶APT¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ç¿ÁÒ½¨ÒéËùÓÐÔËÐÐErlang OTP SSHµÄ×°±¸ÔÚÊܵ½ÍþвÕß¹¥»÷֮ǰÁ¬Ã¦Éý¼¶¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/public-exploits-released-for-critical-erlang-otp-ssh-flaw-patch-now/


3. Kairos×é֯й¶°Í¶ûµÄĦÊÐÉó²é¹Ù°ì¹«ÊÒÊý¾Ý


4ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÆðÉæ¼°ÂíÀïÀ¼ÖݰͶûµÄĦÊÐÉó²é¹Ù°ì¹«ÊÒµÄÊý¾Ýй¶ÊÂÎñÒý·¢¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¡£ÃûΪKairosµÄ×éÖ¯ÓÚ2025Äê3ÔÂ31ÈÕ½«stattorney[.]orgÌí¼Óµ½ÆäйÃÜÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ»ñÈ¡ÁË325GBÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨·¸·¨Êܺ¦Õߺͷ¸·¨ÕßµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜDataBreaches¶à´ÎѯÎÊ£¬£¬£¬£¬£¬£¬£¬µ«ÖÝÉó²é¹Ù°ì¹«ÊÒʼÖÕδ¾ÍÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦£¬£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ÉÏÒàÎÞÏà¹ØÅû¶¡£¡£¡£¡£¡£¡£¡£¡£¾ÝKairos³Æ£¬£¬£¬£¬£¬£¬£¬ËûÃÇͨ³£¸øÓèÄ¿µÄ7Ììʱ¼äÁªÏµ£¬£¬£¬£¬£¬£¬£¬²»È»½«ÔÚÍøÕ¾ÉÏÐû²¼µ¹¼ÆÊ±¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ±¾°¸ÖУ¬£¬£¬£¬£¬£¬£¬KairosÔÚ½«ÖÝÕþ¸®»ú¹¹ÁÐÈëйÃÜÍøÕ¾Ô¼5Ììºó£¬£¬£¬£¬£¬£¬£¬ÊÕµ½ÖÝÉó²é¹Ù°ì¹«ÊÒµÄÐżþ£¬£¬£¬£¬£¬£¬£¬ÒªÇó²»ÒªÐû²¼ÈκÎÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ËæºóË«·½×îÏÈ̸ÅС£¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Ì¸ÅжÌÔÝÇÒδ¹û£¬£¬£¬£¬£¬£¬£¬ÖÝÉó²é¹Ù°ì¹«ÊÒÒªÇóÌṩËùÓÐÏÂÔØÎļþµÄÇåµ¥£¬£¬£¬£¬£¬£¬£¬²¢Ñ¡Ôñ5¸öÎļþ¾ÙÐÐÌá½»£¬£¬£¬£¬£¬£¬£¬Ö®ºó̸Åп¢Ê¡£¡£¡£¡£¡£¡£¡£¡£DataBreaches¶ÔÊý¾Ý¼¯µÄ¼ì²é֤ʵÁËKairosµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬ËûÃÇÏÂÔØÁË´ó×ÚÐÌʰ¸¼þÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨×ï·¸ºÍÊܺ¦ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÐí¶à¼ÍÂ¼Éæ¼°ÇàÉÙÄ꣬£¬£¬£¬£¬£¬£¬²¢ÌṩÁËËûÃǵ폷¨¡¢°²¶Ù¡¢ÖÎÁƺÍÖ°ÒµÔÙÅàѵµÈϸ½Ú¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬DataBreaches»¹·¢Ã÷Á˹ØÓÚ¾¯Ô±ÊÓ²ìµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°°üÀ¨°Í¶ûµÄĦ¾¯Ô±¾Ö6350¶àÃû¾¯Ô±ÐÕÃû¡¢Ö°¼¶ºÍÒÉËÆÐ¡ÎÒ˽¼Òµç»°ºÅÂëµÄµç×Ó±í¸ñ¡£¡£¡£¡£¡£¡£¡£¡£


https://databreaches.net/2025/04/19/baltimore-city-states-attorneys-office-hacked-data-leaked/


4. »ªË¶Â·ÓÉÆ÷AiCloud¹¦Ð§ÏÖÑÏÖØÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


4ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬»ªË¶¿ËÈÕ·¢³öÇå¾²ÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬Ö¸³öÆôÓÃAiCloud¹¦Ð§µÄ·ÓÉÆ÷±£´æÑÏÖØÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-2492£¬£¬£¬£¬£¬£¬£¬CVSS v4ÆÀ·Ö£º9.2£©¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÔ¶³Ì¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÌØÖÆÇëÇóÔÚ×°±¸ÉÏÖ´ÐÐδ¾­ÊÚȨµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Î£º¦¼«¸ß¡£¡£¡£¡£¡£¡£¡£¡£»£» £»£»£»£»ªË¶Í¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬²¿õè¾¶ÓÉÆ÷¹Ì¼þϵÁб£´æ²»µ±µÄÉí·ÝÑéÖ¤¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜÓÉÈ«ÐÄÉè¼ÆµÄÇëÇó´¥·¢£¬£¬£¬£¬£¬£¬£¬½ø¶øµ¼ÖÂδ¾­ÊÚȨµÄ¹¦Ð§Ö´ÐС£¡£¡£¡£¡£¡£¡£¡£AiCloud×÷Ϊ»ªË¶Â·ÓÉÆ÷ÄÚÖõĻùÓÚÔÆµÄÔ¶³Ì»á¼û¹¦Ð§£¬£¬£¬£¬£¬£¬£¬¿É½«Â·ÓÉÆ÷ת±äΪ΢ÐÍ˽ÓÐÔÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÓû§Ô¶³Ì»á¼ûÎļþ¡¢Á÷ýÌ塢ͬ²½Îļþ¼°¹²ÏíÎļþ¡£¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬´ËÎó²îÓ°ÏìÆÕ±é£¬£¬£¬£¬£¬£¬£¬ÒÑÕë¶Ô¶à¸ö¹Ì¼þ·ÖÖ§Ðû²¼ÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬£¬°üÀ¨3.0.0.4_382ϵÁеÈ¡£¡£¡£¡£¡£¡£¡£¡£Îª°ü¹ÜÇå¾²£¬£¬£¬£¬£¬£¬£¬»ªË¶½¨ÒéÓû§Á¬Ã¦Éý¼¶µ½×îй̼þ°æ±¾£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚ¹©Ó¦É̵ÄÖ§³ÖÃÅ»§»ò²úÆ·²éÕÒÒ³Ãæ»ñÈ¡¡£¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Óû§Ó¦Ê¹Óòî±ðÃÜÂë±£»£» £»£»£»£»¤ÎÞÏßÍøÂçºÍ·ÓÉÆ÷ÖÎÀíÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬È·±£ÃÜÂëÖÁÉÙ10¸ö×Ö·û³¤ÇÒ°üÀ¨×Öĸ¡¢Êý×ֺͷûºÅ¡£¡£¡£¡£¡£¡£¡£¡£¹ØÓÚÊÜÓ°ÏìµÄÍ£²ú²úÆ·Óû§£¬£¬£¬£¬£¬£¬£¬½¨ÒéÍêÈ«½ûÓÃAiCloud²¢¹Ø±ÕÏà¹ØÐ§À͵Ļ¥ÁªÍø»á¼û¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/asus-warns-of-critical-auth-bypass-flaw-in-routers-using-aicloud/


5. ChromeÀ©Õ¹³ÌÐò¶ñÒâ¹¦Ð§ÍøÂ磬£¬£¬£¬£¬£¬£¬600ÍòÓû§ÊÜÓ°Ïì


4ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬Secure AnnexÑо¿Ô±John Tuckner·¢Ã÷Ò»¸öÓÉ58¸öChromeÀ©Õ¹³ÌÐò×é³ÉµÄ¶ñÒâÍøÂ磬£¬£¬£¬£¬£¬£¬×Ü×°ÖÃÁ¿´ï600Íò´Î¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÀ©Õ¹³ÌÐòαװ³ÉÒþ˽»òÊÊÓù¤¾ß£¬£¬£¬£¬£¬£¬£¬ÈçÓÅ»Ýȯ²éÕÒÆ÷¡¢¹ã¸æ×èµ²Æ÷µÈ£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÓÐЩÉù³ÆÄܱ£»£» £»£»£»£»¤Óû§ÃâÊÜÆäËû¶ñÒâÀ©Õ¹³ÌÐòË𺦣¬£¬£¬£¬£¬£¬£¬µ«¾ù»ñµÃ¹ýÓÚ¿í·ºµÄȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢°üÀ¨Òþ²ØµÄDZÔÚ¶ñÒ⹦Ч£¬£¬£¬£¬£¬£¬£¬Èç»á¼ûCookieºÍÁîÅÆ¡¢¼àÊÓÓû§ÐÐΪ¡¢ÔËÐÐÔ¶³Ì´úÂëÒÔ¼°¼ìË÷ÆäËûÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÀ©Õ¹³ÌÐò´ó¶àδ¹ûÕæ£¬£¬£¬£¬£¬£¬£¬ÎÞ·¨Í¨¹ýChromeÍøÉÏÓ¦Óõê»òËÑË÷ÒýÇæÕÒµ½£¬£¬£¬£¬£¬£¬£¬Ö»ÄÜͨ¹ý¶ñÒâÁ´½ÓÈö²¥¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬´ËÀàÀ©Õ¹³ÌÐò±£´æÖØ´óÇå¾²Òþ»¼£¬£¬£¬£¬£¬£¬£¬²¿·ÖÒѱ»¹È¸èÆÀΪ¡°ÍƼö¡±È´ÎÞ·¨±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÈÝÒ×Îóµ¼Óû§¡£¡£¡£¡£¡£¡£¡£¡£Tuckner×î³õͨ¹ýƴд¹ýʧµÄÓòÃûʶ±ð³ö35¸öδ¹ûÕæµÄÒÉËÆ¶ñÒâÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬£¬ºóÔÚObsidian SecurityµÄ×ÊÖúϸüÐÂÁËÁбí¡£¡£¡£¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬£¬¹È¸èÒÑÖªÏþÕâÏîÑо¿£¬£¬£¬£¬£¬£¬£¬²¢ÒÑϼܲ¿·Ö¿ÉÒÉÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬£¬µ«²¢·ÇËùÓС£¡£¡£¡£¡£¡£¡£¡£±¨¸æÌṩÁËÍêÕûµÄÈëÇÖÖ¸±êÁбí£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬¹ýÓÚ¿í·ººÍÇÖÈëÐÔµÄȨÏÞ¡¢ÓòÃûƴд¹ýʧÒÔ¼°´ó×Ú¾­ÓÉÑÏÖØ»ìÏýµÄ´úÂ룬£¬£¬£¬£¬£¬£¬¶¼ÊÇÀ©Õ¹³ÌÐò¿ÉÄܱ£´æ¶ñÒâÐÐΪµÄ¼£Ï󡣡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/network-of-chrome-extensions-contain-secret-code-to-track-users/


6. ÐÂÐÍGorilla Android¶ñÒâÈí¼þ×èµ²OTP¶ÌÐÅ


4ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò·ºÆðÒ»ÖÖÃûΪ¡°Gorilla¡±µÄÖØ´óÐÂÐÍAndroid¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÖ±Ö¸°üÀ¨Ò»´ÎÐÔÃÜÂë(OTP)µÄ¶ÌÐÅ×èµ²¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÔÚºǫ́ÇÄÈ»ÔËÐУ¬£¬£¬£¬£¬£¬£¬½èÖúAndroidȨÏÞϵͳÇÔÈ¡ÊÜѬȾÉè±¹ØÁ¬ÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£ÆðÔ´ÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬GorillaÖ÷ÒªÃé×¼ÒøÐпͻ§¼°YandexµÈÈÈÃÅЧÀÍÓû§£¬£¬£¬£¬£¬£¬£¬¶ÔÇÔÈ¡µÄ¶ÌОÙÐÐÏ꾡·ÖÀ࣬£¬£¬£¬£¬£¬£¬ÒԱ㹥»÷ÕßÇáËÉʹÓᣡ£¡£¡£¡£¡£¡£¡£GorillaʹÓÃÒªº¦µÄAndroidȨÏÞ»á¼ûSIM¿¨ÐÅÏ¢¼°×°±¸µç»°ºÅÂ룬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýWebSocketЭÒéÓëC2»ù´¡ÉèÊ©½¨É賤ÆÚÅþÁ¬£¬£¬£¬£¬£¬£¬£¬ÊµÏÖʵʱͨѶÓëÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ½ÓÄɲ»Ñ°³£ÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬×èֹʹÓÿÉÄÜÒýÆðÏÓÒÉµÄ API£¬£¬£¬£¬£¬£¬£¬×ª¶øÅÌÎÊÆô¶¯Æ÷ÒâͼÒÔÍøÂçÒÑ×°ÖÃÓ¦ÓóÌÐòÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£C2Ãæ°åÕ¹ÏÖÁËGorillaµÄÖØ´ó²Ù×÷£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡µÄ¶ÌÐű»ÓÐÌõ²»ÎɵØ×éÖ¯ÔÚ¡°ÒøÐС±ºÍ¡°Yandex¡±µÈ±êǩϣ¬£¬£¬£¬£¬£¬£¬ÏÔʾ³öÆäÕë¶Ô½ðÈÚÐÅÏ¢ºÍÈÈÃÅЧÀ͵ľ«×¼¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýһϵÁкǫ́ЧÀÍÒ»Á¬ÔËÐУ¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃstartForeground API¼°FOREGROUND_SERVICEȨÏÞÏÔʾ֪ͨ£¬£¬£¬£¬£¬£¬£¬ÑÚÊÎÆä¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬GorillaµÄÏÂÁî½á¹¹°üÀ¨ÈýÖÖÖ÷Òª²Ù×÷ÀàÐÍ£¬£¬£¬£¬£¬£¬£¬ÆäÖС°send_sms¡±ÏÂÁîÓÈΪҪº¦£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õß´ÓÊÜѬȾװ±¸·¢ËÍ×Ô½ç˵¶ÌÐÅ¡£¡£¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/new-gorilla-android-malware-intercept-sms-messages/