¼ÓÖÝÀ¶¶Ü°ü¹Ü¹«Ë¾Ïò¹È¸èй¶ÁË470ÍòÃû»áÔ±µÄ¿µ½¡Êý¾Ý

Ðû²¼Ê±¼ä 2025-04-24

1. ¼ÓÖÝÀ¶¶Ü°ü¹Ü¹«Ë¾Ïò¹È¸èй¶ÁË470ÍòÃû»áÔ±µÄ¿µ½¡Êý¾Ý


4ÔÂ23ÈÕ£¬£¬£¬£¬¼ÓÖÝÀ¶¶Ü°ü¹Ü¹«Ë¾½üÆÚÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Æä470Íò»áÔ±µÄÊܱ£» £»£»£»¤¿µ½¡ÐÅÏ¢±»Ð¹Â¶¸ø¹È¸èµÄÆÊÎöºÍ¹ã¸æÆ½Ì¨¡£¡£¡£¡£¡£¡£×÷ΪΪ¼ÓÖݽü600Íò»áÔ±ÌṩЧÀ͵ķÇÓªÀûÐÔ¿µ½¡ÍýÏ룬£¬£¬£¬À¶¶ÜÔÚÍøÕ¾ÉÏÐû²¼ÁËÊý¾Ýй¶֪ͨ£¬£¬£¬£¬Ö¸³ö»áÔ±Êý¾ÝÔÚ2021Äê4ÔÂÖÁ2024Äê1ÔÂʱ´úÔ⵽й¶¡£¡£¡£¡£¡£¡£ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Ð¹ÃÜÃÅ»§ÍøÕ¾Ò²¶Ô´Ë´ÎÊÂÎñ¾ÙÐÐÁ˸üУ¬£¬£¬£¬È·ÈÏÁË470ÍòÃû»áÔ±µÄÊܱ£» £»£»£»¤¿µ½¡Êý¾Ý̻¶¡£¡£¡£¡£¡£¡£´Ë´Îй¶ԴÓÚBlue ShieldÍøÕ¾ÉÏGoogle AnalyticsÉèÖùýʧ£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÊý¾Ý¿ÉÄܱ»¹²Ïí¸ø¹È¸è¹ã¸æÆ½Ì¨ºÍ¹ã¸æÉÌ¡£¡£¡£¡£¡£¡£Í¨ÖªÖÐÃ÷È·Ìáµ½£¬£¬£¬£¬2025Äê2ÔÂ11ÈÕ£¬£¬£¬£¬À¶¶Ü·¢Ã÷Google AnalyticsµÄÉèÖ÷½·¨ÔÊÐíijЩ»áÔ±Êý¾ÝÓëGoogle Ads¹²Ïí£¬£¬£¬£¬ÆäÖпÉÄܰüÀ¨Êܱ£» £»£»£»¤µÄ¿µ½¡ÐÅÏ¢£¬£¬£¬£¬¹È¸è¿ÉÄÜʹÓÃÕâЩÊý¾Ý¿ªÕ¹ÓÐÕë¶ÔÐÔµÄ¹ã¸æ»î¶¯¡£¡£¡£¡£¡£¡£Ì»Â¶µÄÊý¾ÝÀàÐͰüÀ¨°ü¹ÜÍýÏëÃû³Æ¡¢ÀàÐͺÍ×éºÅ¡¢¶¼»áºÍÓÊÕþ±àÂë¡¢ÐԱ𡢼ÒÍ¥¹æÄ£µÈ£¬£¬£¬£¬ÉÐÓÐÒ½ÁÆË÷ÅâЧÀÍÈÕÆÚ¡¢Ð§ÀÍÌṩÕß¡¢»¼ÕßÐÕÃû¼°²ÆÎñÔðÈεÈÒ½ÁÆÏà¹ØÊý¾Ý£¬£¬£¬£¬ÒÔ¼°¡°Ñ°ÕÒÒ½Éú¡±ËÑË÷Ìõ¼þºÍЧ¹ûµÈ¡£¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬À¶¶ÜÇ¿µ÷£¬£¬£¬£¬ÆäËûСÎÒ˽¼ÒÐÅÏ¢ÈçÉç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢ÒøÐкÍÐÅÓÿ¨ÐÅÏ¢²¢Î´Òò´Ë´ÎÊÂÎñй¶¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/blue-shield-of-california-leaked-health-data-of-47-million-members-to-google/


2. ¶íÂÞ˹¾ü¶ÓÔâµØÍ¼Ó¦ÓÃÖÐÒþ²ØµÄÐÂÐÍAndroid¶ñÒâÈí¼þ¹¥»÷


4ÔÂ23ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚAlpine QuestµØÍ¼Ó¦ÓóÌÐòµÄľÂí°æ±¾Öз¢Ã÷ÁËÒ»ÖÖÐÂÐÍAndroid¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬¶íÂÞ˹ʿ±øÔøÊ¹ÓøÃÓ¦ÓóÌÐò×÷ÎªÕ½Çø×÷Õ½ÍýÏ빤¾ß¡£¡£¡£¡£¡£¡£¹¥»÷Õß½«´ËľÂíαװ³É¸ß¼¶Alpine Quest ProµÄÃâ·ÑÆÆ½â°æ£¬£¬£¬£¬²¢Í¨¹ýTelegramƵµÀºÍ¶íÂÞ˹ӦÓóÌÐòĿ¼¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£AlpineQuestÊÇÒ»¿îÕýµ±µÄAndroid GPSºÍµØÐÎ²â»æÓ¦Ó㬣¬£¬£¬ÉîÊÜðÏÕ¼Ò¡¢ÔË·¢¶¯¡¢ËѾȶӼ°¾üÊÂÖ°Ô±Çàíù£¬£¬£¬£¬ÒòÆäÀëÏß¹¦Ð§ºÍ׼ȷ¶È¶ø±¸ÊÜÔÞÓþ¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÌṩÁ½¸ö°æ±¾£º¹¦Ð§ÊÜÏÞµÄÃâ·Ñ¾«¼ò°æºÍÎÞ¸ú×Ù¿â¡¢ÆÊÎö¼°¹ã¸æµÄÃâ·Ñרҵ°æ¡£¡£¡£¡£¡£¡£Õâ¿îÌØ¹¤Èí¼þÓɶíÂÞË¹ÒÆ¶¯·À²¡¶¾¹«Ë¾Doctor WebµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ËüÇÉÃîµØÒþ²ØÔÚ¹¦Ð§ÆëÈ«µÄAlpine QuestÓ¦ÓÃÖУ¬£¬£¬£¬ÒԴ˽µµÍÓû§ÏÓÒÉ£¬£¬£¬£¬²¢ËÅ»úÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£Ò»µ©Æô¶¯£¬£¬£¬£¬Ìع¤Èí¼þ±ãÊÔͼÇÔȡװ±¸ÖеÄͨѶÊý¾ÝºÍÃô¸ÐÎļþ£¬£¬£¬£¬¿ÉÄÜй¶¾ü¶ÓÐж¯Ï¸½Ú£¬£¬£¬£¬°üÀ¨·¢ËÍÓû§µç»°ºÅÂë¡¢ÁªÏµÈË¡¢µØÀíλÖá¢ÎļþÐÅÏ¢¼°Ó¦Óð汾ÖÁ¹¥»÷Õߣ¬£¬£¬£¬ÊµÊ±¼à¿ØÎ»ÖÃת±ä²¢¸üÐÂÖÁTelegram»úеÈË£¬£¬£¬£¬ÏÂÔØÌØÊâÄ£¿£¿£¿éÇÔÈ¡ÉñÃØÎļþ£¬£¬£¬£¬ÓÈÆäÊÇͨ¹ýTelegramºÍWhatsApp·¢Ë͵ÄÎļþ£¬£¬£¬£¬ÒÔ¼°´ÓAlpine QuestÖÐÌáÈ¡°üÀ¨Î»ÖÃÀúÊ·ÈÕÖ¾µÄ¡°locLog¡±Îļþ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-army-targeted-by-new-android-malware-hidden-in-mapping-app/


3. Kelly BenefitsÅû¶ӰÏ쳬26ÍòÈËÊý¾Ýй¶ÊÂÎñ


4ÔÂ23ÈÕ£¬£¬£¬£¬×ܲ¿Î»ÓÚÂíÀïÀ¼Öݵĸ£ÀûºÍÈËΪ½â¾ö¼Æ»®ÌṩÉÌKelly & Associates Insurance Group£¨ÒÔdba Kelly BenefitsÔËÓª£©¿ËÈÕÅû¶ÁËÒ»ÆðÓ°ÏìÁè¼Ý26ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÂíÀïÀ¼Öݼ°Öܱ߸÷ÖÝÌṩ¸£ÀûÖÎÀí¡¢ÊÖÒÕ¡¢¾­¼ÍºÍ×ÉѯЧÀÍÒÔ¼°ÈËΪ½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£ÆäÍøÕ¾ÉÏÐû²¼µÄÊý¾ÝÇ徲֪ͨÏÔʾ£¬£¬£¬£¬¹«Ë¾×î½ü¼ì²âµ½ÆäÍøÂçÉϱ£´æ¿ÉÒɻ£¬£¬£¬£¬ÊÓ²ìÏÔʾºÚ¿ÍÔÚ2024Äê12ÔÂ12ÈÕÖÁ12ÔÂ17ÈÕʱ´ú»á¼ûÁËÆäϵͳ£¬£¬£¬£¬²¢ÔÚ´Ëʱ´úй¶ÁËijЩÎļþ£¬£¬£¬£¬ÕâЩÎļþ°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ롢˰ºÅ¡¢Ò½ÁÆÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢ºÍ½ðÈÚÕË»§ÐÅÏ¢µÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄСÎÒ˽¼ÒÒÑÊÕµ½Í¨Öª£¬£¬£¬£¬Kelly Benefits´ú±í¶à¼ÒÊÜÓ°ÏìµÄ¿Í»§·¢³ö֪ͨ£¬£¬£¬£¬°üÀ¨Amergis¡¢Beam Benefits¡¢Beltway CompaniesµÈ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÏòÃåÒòÖÝ×ÜÉó²é³¤ÌåÏÖ£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ӰÏìÁ˽ü264,000ÈË¡£¡£¡£¡£¡£¡£Ö»¹Ü´Ë¹«Ë¾¿ÉÄÜÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴κڿ͹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¿£¿£Ë¼Á¿µ½ÊÂÎñ±¬·¢ÔÚ¼¸¸öÔÂǰ£¬£¬£¬£¬ÈôÊǸù«Ë¾È·ÊµÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÄÇô¿ÉÄÜÒѾ­Ö§¸¶ÁËÊê½ðÒÔ×èÖ¹Êý¾Ýй¶µÄ½øÒ»²½¹ûÕæ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÔÚ½ÓÄɲ½·¥ÔöÇ¿ÆäÍøÂçÇå¾²·À»¤£¬£¬£¬£¬ÒÔ±ÜÃâδÀ´±¬·¢ÀàËÆÊÂÎñ¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/kelly-benefits-data-breach-impacts-260000-people/


4. Onsite Mammography³¬35ÍòÈËÐÅÏ¢Ôâй¶


4ÔÂ23ÈÕ£¬£¬£¬£¬ÂíÈøÖîÈûÖÝÒ½ÁÆÐ§ÀÍÌṩÉÌOnsite Mammography£¨ÒÔOnsite Women's HealthÆ·ÅÆÔËÓª£©¿ËÈÕ֪ͨÁè¼Ý35ÍòÈË£¬£¬£¬£¬ÆäСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢ÔÚÊý¾Ýй¶ÖÐÔ⵽й¶¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ2024Äê10Ô·¢Ã÷£¬£¬£¬£¬É漰δ¾­ÊÚȨ»á¼ûÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬µ¼ÖÂÊÕ¼þÏäÖеÄijЩµç×ÓÓʼþй¶ÁËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÊܱ£» £»£»£»¤µÄ¿µ½¡ÐÅÏ¢£¨PHI£©¡£¡£¡£¡£¡£¡£2025Äê2ÔÂÍê³ÉµÄ¶Ôй¶ÐÅÏ¢µÄÉó²éÈ·¶¨£¬£¬£¬£¬ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢ÐÅÓÿ¨ºÅÂëÒÔ¼°¾«ÉñºÍÉíÌ念½¡ÐÅÏ¢µÈ¾ùÔ⵽й¶¡£¡£¡£¡£¡£¡£OnsiteÌåÏÖ£¬£¬£¬£¬ÊÓ²ì½øÒ»²½ÏÔʾ£¬£¬£¬£¬¸ÃÐÐΪÕßÖ»ÄÜ»á¼ûµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬¶øÎÞ·¨»á¼ûÍøÂçÖеÄÈÎºÎÆäËûϵͳ¡£¡£¡£¡£¡£¡£¸ÃÒ½ÁÆÐ§ÀÍÌṩÉÌÒÑ֪ͨÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ£¬£¬£¬£¬ÓÐ357,265Ãû»¼ÕßÊܵ½Ó°Ï죬£¬£¬£¬²¢ÎªËûÃÇÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£» £»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£OnsiteÌåÏÖ£¬£¬£¬£¬Ã»ÓÐÀíÓÉÏàÐÅÈκÎÐÅÏ¢ÒòÕâÆðÊÂÎñ¶ø±»ÀÄÓûò½«±»ÀÄÓᣡ£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬OnsiteÁ¬Ã¦½ÓÄÉÁËÐж¯£¬£¬£¬£¬Ô¼ÇëÁËÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬Í¨ÖªÁËÖ´·¨²¿·Ö£¬£¬£¬£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬£¬£¬£¬½«¼ÌÐøÈ«Á¦Î¬»¤»¼ÕßµÄÒþ˽ºÍÊý¾ÝÇå¾²¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/data-breach-at-onsite-mammography-impacts-350000/


5. WorkComposer¼à¿Ø¹¤¾ßʵʱй¶Êý°ÙÍòÃô¸Ð½ØÍ¼


4ÔÂ23ÈÕ£¬£¬£¬£¬Ò»ÖÖÓÃÓÚ¼àÊÓÔ±¹¤µÄ¼à¿Ø¹¤¾ßWorkComposerÕý½«Êý°ÙÍòÕÅʵʱ½ØÍ¼Ð¹Â¶µ½¿ª·ÅÍøÂç¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÖ¼ÔÚͨ¹ý¼Í¼»î¶¯ºÍ½ØÈ¡ÆÁÄ»¿ìÕÕÀ´¸ú×ÙÊÂÇéЧÂÊ£¬£¬£¬£¬È´½«Áè¼Ý2100ÍòÕÅͼƬ̻¶ÔÚ²»Çå¾²µÄAmazon S3´æ´¢Í°ÖУ¬£¬£¬£¬ÖðÖ¡²¥·ÅÁËÔ±¹¤µÄÒ»Ñùƽ³£ÊÂÇé¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý¼«ÆäÃô¸Ð£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢ÄÚ²¿Ì¸Ìì¡¢ÉñÃØÉÌÒµÎļþµÄÈ«ÆÁ½ØÍ¼£¬£¬£¬£¬ÒÔ¼°µÇÂ¼Ò³Ãæ¡¢Æ¾Ö¤¡¢APIÃÜÔ¿µÈ¿ÉÄܱ»Ê¹ÓÃÀ´¹¥»÷È«ÇòÆóÒµµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñ͹ÏÔÁ˵±»ù±¾Çå¾²²½·¥±»ºöÊÓʱ£¬£¬£¬£¬Ê±¼ä¸ú×Ù¹¤¾ß½«±äµÃºÎµÈΣÏÕ£¬£¬£¬£¬Ò»Ñùƽ³£ÊÂÇé»î¶¯Äð³ÉÁËÍøÂç·¸·¨·Ö×ӵĽð¿ó¡£¡£¡£¡£¡£¡£²¶»ñµÇÂ¼Ò³Ãæ¡¢µç×ÓÓʼþÊÕ¼þÏä¡¢ÄÚ²¿ÐÂÎÅÆ½Ì¨ºÍ²ÆÎñÎļþµÄÆÁÄ»½ØÍ¼£¬£¬£¬£¬¿ÉÒÔÈÃÈËÏàʶ¹«Ë¾¼°ÆäÔ±¹¤µÄÄÚ²¿ÔË×÷ÇéÐΡ£¡£¡£¡£¡£¡£Ò»ÕÅ̻¶µÄÆÁÄ»½ØÍ¼£¬£¬£¬£¬ÏÔʾ¿É¼ûµÄÃÜÂë¡¢APIÃÜÔ¿»òÃô¸Ð¶Ô»°£¬£¬£¬£¬¿ÉÄܻᵼÖÂÆ¾Ö¤ÍµÇÔ¡¢ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬ÉõÖÁÆóÒµÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£×ß©µÄʵʱÐÔ·Å´óÁËΣÏÕ£¬£¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔËæÊ±¼à¿ØÕýÔÚÕö¿ªµÄÓªÒµÔËÓª£¬£¬£¬£¬´Ó¶ø»á¼ûÔ­±¾Ëø¶¨µÄÇéÐΡ£¡£¡£¡£¡£¡£³ýÁËÖ±½ÓµÄÍøÂçÇ徲Σº¦Í⣬£¬£¬£¬»¹±£´æÑÏÖØµÄÒþ˽ÇÖÕ¼ÎÊÌâ¡£¡£¡£¡£¡£¡£Ê±¼ä×·×Ù¹¤¾ßÔçÒÑÏÝÈëÆ·µÂµÄÄà̶£¬£¬£¬£¬ËüÃÇ´ò×ÅÉú²úÁ¦µÄÆìÖÄ£¬£¬£¬£¬×¼È·¼Í¼Ա¹¤µÄÿһ·ÖÖÓÊý×ÖÐÐΪ¡£¡£¡£¡£¡£¡£Ô±¹¤ÎÞ·¨¿ØÖÆÕâЩ½ØÍ¼×îÖÕ»á°üÀ¨ÄÄЩÄÚÈÝ£¬£¬£¬£¬Ò×Êܹ¥»÷µÄ²»µ«½öÊǹ«Ë¾Êý¾Ý£¬£¬£¬£¬ÉÐÓÐСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/employee-monitoring-app-leaks-millions-screenshots/


6. 2024ÄêÒÁÀÊÍþв×éÖ¯Õë¶ÔÒÔÉ«ÁеĶàά¶ÈÍøÂç¹¥»÷»î¶¯


4ÔÂ23ÈÕ£¬£¬£¬£¬2024Ä꣬£¬£¬£¬ÒÁÀÊÍþв×éÖ¯¶ÔÒÔÉ«ÁÐÕö¿ª¶àÂÖÍøÂç¹¥»÷£¬£¬£¬£¬ÊÖ·¨¶àÑùÇÒÒþ²Ø¡£¡£¡£¡£¡£¡£ÓëÒÁÀʽáÃ˵ÄÍþв×éÖ¯UNC2428ÔÚ10ÔÂÒÔÕÐÆ¸Îª»Ï×Ó£¬£¬£¬£¬Í¨¹ý·ÂðÒÔÉ«Áйú·À³Ð°üÉÌÀ­ì³¶û£¨Rafael£©ÍøÕ¾£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÎ±×°³É¡°ÇóÖ°¸¨Öú¹¤¾ß¡±µÄ¶ñÒâÈí¼þ¡°RafaelConnect.exe¡±£¬£¬£¬£¬¸ÃÈí¼þʵΪLONEFLEET×°ÖóÌÐò£¬£¬£¬£¬¿É¼¤»îMURKYTOURºóÃÅ£¬£¬£¬£¬Ê¹¹¥»÷Õß»ñµÃ¶ÔÊÜѬȾװ±¸µÄÒ»Á¬»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÒÁÀÊÍþв×éÖ¯ºÚÓ°£¨Black Shadow£©ÒÔ¹¥»÷ÒÔÉ«ÁжàÁìÓò¶øÖøÃû£¬£¬£¬£¬Cyber Toufan×é֯ʹÓÃרÓвÁ³ýÆ÷POKYBLIGHT£¬£¬£¬£¬UNC3313Ôòͨ¹ý´¹ÂÚ¹¥»÷¾ÙÐмàÊÓºÍÐÅÏ¢ÍøÂ磬£¬£¬£¬²¢·Ö·¢JELLYBEANͶ·ÅÆ÷ºÍCANDYBOXºóÃÅ£¬£¬£¬£¬ÀÄÓÃ9ÖÖÕýµ±Ô¶³Ì¼à¿Ø¹¤¾ß¹æ±Ü¼ì²â¡£¡£¡£¡£¡£¡£7Ô£¬£¬£¬£¬ÒÉËÆÒÁÀÊÅä¾°µÄ¹¥»÷Õßαװ³ÉPalo Alto NetworksµÄGlobalProtectÔ¶³Ì»á¼ûÈí¼þ×°Öðü£¬£¬£¬£¬ÆáºÚ°²ÅÅ.NETºóÃÅCACTUSPAL¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ÒÁÀÊÍþв×éÖ¯»¹Í¨¹ýÔÆ»ù´¡ÉèÊ©ÔöÇ¿Òþ²ØÐÔ£¬£¬£¬£¬ÈçʹÓÃÆ´Ð´¹ýʧÓòÃû»ò¸´ÓÃÕýµ±ÓòÃûÍйÜC2½Úµã£¬£¬£¬£¬ÒÔ¼°Î±Ôì×ÅÃû¹«Ë¾µÇÂ¼Ò³ÃæÇÔȡƾ֤¡£¡£¡£¡£¡£¡£MandiantÖÒÑÔ£¬£¬£¬£¬ÒÁÀÊÏà¹ØÍþв×éÖ¯½«Ò»Á¬µ÷½âÕ½ÊõÊÖ¶ÎÒÔ˳ӦĿ½ñÐÎÊÆ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/04/iran-linked-hackers-target-israel-with.html