FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ
Ðû²¼Ê±¼ä 2025-05-191. FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ
5ÔÂ18ÈÕ£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©·¢³öÖÒÑÔ£¬£¬£¬³Æ±£´æÒ»ÖÖÖØ´óµÄÓïÒôÍøÂç´¹ÂںͶÌÐÅÍøÂç´¹Âڻ£¬£¬£¬¶ñÒâÈËÊ¿ÕýʹÓÃÈ˹¤ÖÇÄÜ£¨AI£©¿ªÕ¹ÓÕÆÐÐΪ£¬£¬£¬ÍþвÈÕÒæÑÏÖØ¡£¡£¡£¡£¡£¡£×Ô2025Äê4ÔÂÒÔÀ´£¬£¬£¬¡°¶ñÒâÐÐΪÕß¡±ÔËÓá°¶ÌÐÅÍøÂç´¹ÂÚ¡±ºÍ¡°ÓïÒôÍøÂç´¹ÂÚ¡±ÊÖÒÕ£¬£¬£¬½¨Éè¿´ËÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÓïÒô±¸Íü¼£¬£¬£¬Á¬ÏµÓÕÆÐÔ¶ÌÐŹ¥»÷ÏÖÈÎ/ǰÈÎÕþ¸®¹ÙÔ±¼°ÆäͨѶ¼ÖеÄСÎÒ˽¼Ò£¬£¬£¬ÊÔͼÓëÄ¿µÄ½¨ÉèÐÅÈκÍÁªÏµ¡£¡£¡£¡£¡£¡£FBIÃ÷È·ÌáÐÑÃñÖÚ£¬£¬£¬ÊÕµ½Éù³ÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÐÂÎŲ»¿ÉÇáÐÅ¡£¡£¡£¡£¡£¡£Ò»µ©ÁªÏµÉÏÄ¿µÄ£¬£¬£¬·¸·¨·Ö×Ó»áÊÔͼ»á¼ûÆäСÎÒ˽¼ÒÕË»§£¬£¬£¬ÈçÔÚÐÅÏ¢Öз¢ËͶñÒâÁ´½Ó£¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷ºó×ªÒÆµ½Ëùν¸üÇå¾²µÄÐÂÎÅÆ½Ì¨£¬£¬£¬ÊµÔò¿ÉÄÜÖ¸µ¼Óû§½øÈë¶ñÒâÍøÕ¾£¬£¬£¬ÇÔÈ¡µÇ¼ƾ֤»ò×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Ò»´ÎÀÖ³ÉÈëÇÖ¿ÉÄÜÒý·¢Á¬Ëø·´Ó¦£¬£¬£¬²»·¨·Ö×Ó¿ÉÄÜʹÓñ»µÁÕË»§¹¥»÷ÆäËûÃÀ¹ú¹ÙÔ±»òÆäͬ»ï£¬£¬£¬ÇÔÈ¡µÄÐÅÏ¢ÓÃÓÚÖÆÔìð³äÕË»§»òÌᳫ½øÒ»²½Éç»á¹¤³Ì¹¥»÷£¬£¬£¬Í¨¹ýÉç»á¹¤³ÌѧÊֶλñÈ¡µÄÁªÏµÐÅÏ¢Ò²¿ÉÄܱ»ÓÃÀ´Ã°³äÁªÏµÈËÇÔÊØÐÅÏ¢»ò×ʽ𡣡£¡£¡£¡£¡£FBIËäδ͸¶±»Ã°³äµÄÏêϸ¹ÙÔ±£¬£¬£¬µ«Í¨¸æÅú×¢´ó¶¼Ä¿µÄÊÇ¡°ÏÖÈλòǰÈÎÃÀ¹úÁª°î»òÖÝÕþ¸®¸ß¼¶¹ÙÔ±¼°ÆäÁªÏµÈË¡±£¬£¬£¬ÕâÊÇÒ»³¡Õë¶ÔÕÆÎÕDZÔÚÃô¸ÐÐÅÏ¢»ò»á¼ûȨÏÞСÎÒ˽¼ÒµÄÆÕ±é¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£
https://hackread.com/fbi-warn-ai-voice-scams-impersonate-us-govt-officials/
2. BSHÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬²©Í¨Ô±¹¤Êý¾ÝÔâй¶
5ÔÂ17ÈÕ£¬£¬£¬Ð½×ÊЧÀ;ÞÍ·ADPµÄÖж«ÏàÖúͬ°éBSHÔÚ2024Äê9ÔÂÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Ö²©Í¨Ô±¹¤Ãô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£²©Í¨ÔøÊ¹ÓÃADP´¦Öóͷ£ÈËΪµ¥£¬£¬£¬BSHÊÇADPÖж«ÇøÓò¹©Ó¦ÉÌ£¬£¬£¬Ë䲩ͨÆäʱÒÑ×îÏÈ·ÅÆúADPºÍBSH£¬£¬£¬µ«Çл»Î´Íê³Éʱ¹¥»÷ÒÑ·¢¶¯¡£¡£¡£¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾÆóÒµ¼à¿ØºÍ±£»£»£»£»£»£»¤¹©Ó¦ÉÌÉúÌ¬ÏµÍ³ÃæÁÙÌôÕ½¡£¡£¡£¡£¡£¡£BSH/ADPÓÚ2024Äê9ÔÂÏÂÑ®·¢Ã÷ÈëÇÖ£¬£¬£¬Ö±µ½12Ô²ÅÒâʶµ½Ô±¹¤Êý¾Ý±»Ð¹Â¶µ½»¥ÁªÍø¡£¡£¡£¡£¡£¡£Òò±»µÁÐÅϢΪ¡°·Ç½á¹¹»¯ÃûÌá±£¬£¬£¬BSHºÍADPÔÚÈ·¶¨ÊÜÓ°ÏìÊý¾ÝºÍСÎÒ˽¼Ò¹æÄ£ÉÏÔâÓöÖØ´óÑÓÎ󣬣¬£¬²©Í¨Ö±µ½2025Äê5ÔÂ12ÈÕ²ÅÊÕµ½¾¯±¨£¬£¬£¬¾àÀëÊ×´ÎÈëÇÖ½ü°Ë¸öÔ¡£¡£¡£¡£¡£¡£ÄÚ²¿ÓʼþÅú×¢£¬£¬£¬È·¶¨ÊÜÓ°ÏìÔ±¹¤ºÍÊý¾Ý×ֶζÔBSH/ADPÊÇÂþ³¤Àú³Ì£¬£¬£¬µ¼ÖÂÔ±¹¤ºã¾Ã²»È·¶¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ÊÇ·ñй¶¡£¡£¡£¡£¡£¡£TechNadu±¨µÀ³Æ£¬£¬£¬El DoradoÀÕË÷Èí¼þ×éÖ¯²ß»®Á˴˴ι¥»÷£¬£¬£¬¸Ã×éÖ¯³£¹¥»÷µÚÈý·½Ð§ÀÍÌṩÉ̲¢ÇÔȡԱ¹¤Êý¾Ý¡£¡£¡£¡£¡£¡£ÕâÅú×¢ÍøÂç·¸·¨·Ö×ÓÕýÃé×¼´óÐÍ×éÖ¯Êý×Ö¹©Ó¦Á´±¡Èõ»·½Ú¡£¡£¡£¡£¡£¡£²©Í¨ÂÄÀúÓëÒµ½ç¶Ô¹©Ó¦ÉÌΣº¦ÖÎÀíµ£ÐÄÒ»Ö£¬£¬£¬Ð½×ÊЧÀÍÌṩÉÌת»»Àú³ÌÖØ´ó£¬£¬£¬BSHºÍADPδʵʱÅû¶Υ¹æÐÐΪ¼Ó¾çÄæ¾³¡£¡£¡£¡£¡£¡£Á½¼Ò¹«Ë¾ÒÑÓëÖ´·¨²¿·ÖºÍÊý¾Ý±£»£»£»£»£»£»¤»ú¹¹ÁªÏµ£¬£¬£¬²¢½ÓÄɲ½·¥Ç¿»¯BSHÇéÐΡ£¡£¡£¡£¡£¡£
https://www.webpronews.com/ransomware-attack-on-adp-partner-exposes-broadcom-employee-data/
3. Ç×ÎÚ¿ËÀ¼×é֯ʹÓÃPythonºóÃŹ¥»÷¶íÂÞ˹¿ª·¢Õß
5ÔÂ16ÈÕ£¬£¬£¬ReversingLabsÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öÃûΪdbgpkgµÄαÔìPythonµ÷ÊÔÆ÷Èí¼þ°ü£¬£¬£¬¸ÃÈí¼þ°üαװ³Éµ÷ÊÔ¹¤¾ß£¬£¬£¬ÊµÔòÉñÃØÔÚ¿ª·¢ÕßϵͳÖÐÖ²ÈëºóÃÅÒÔÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£RLÏÓÒɴ˹¥»÷±³ºóÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼µÄºÚ¿Í×éÖ¯£¬£¬£¬¸Ã×éÖ¯ÒÔÖ§³ÖÎÚ¿ËÀ¼¡¢Õë¶Ô¶íÂÞ˹ÀûÒæ¶øÖøÃû¡£¡£¡£¡£¡£¡£dbgpkg²»°üÀ¨ÏÖʵµ÷ÊÔ¹¦Ð§£¬£¬£¬¶øÊÇÓÕÆ¿ª·¢Ö°Ô±×°ÖúóÃÅ£¬£¬£¬½«Æä¿ª·¢»úеÄð³ÉÊÜѬȾ×ʲú¡£¡£¡£¡£¡£¡£ÆäÖ²ÈëºóÃŵÄÒªÁìÖØ´ó£¬£¬£¬Ê¹Óá°º¯Êý°ü×°¡±»ò¡°×°ÊÎÆ÷¡±ÊÖÒÕÐ޸ıê×¼PythonÍøÂ繤¾ßÐÐΪ£¬£¬£¬Ê¹¶ñÒâ´úÂëÔÚ¿ª·¢Ö°Ô±Ê¹ÓÃÍøÂ纯ÊýǰһֱÒþ²Ø¡£¡£¡£¡£¡£¡£¶ñÒâ°ü×°Æ÷´úÂë»á¼ì²éÌØ¶¨Îļþ£¬£¬£¬ÈôºóÃŲ»±£´æÔòÖ´ÐÐÈý¸öÏÂÁ£¬£¬°üÀ¨´ÓÔÚÏßPastebinЧÀÍÏÂÔØ¹«Ô¿¡¢×°ÖÃÈÆ¹ý·À»ðǽµÄ¹¤¾ßGlobal Socket Toolkit²¢¼ÓÃÜÅþÁ¬ºóÃÅËùÐèÃÜÔ¿¡¢½«¼ÓÃÜÃÜÔ¿·¢Ë͵½Ë½ÃÜÔÚÏßλÖ㬣¬£¬¶à½×¶ÎÀú³ÌÓë¶ÔÊÜÐÅÈÎÄ£¿£¿£¿£¿éʹÓú¯Êý°ü×°Æ÷ÔöÌíÁ˶ñÒâ»î¶¯¼ì²âÄѶȡ£¡£¡£¡£¡£¡£RLÑо¿Ö°Ô±»¹·¢Ã÷¸ÃºóÃÅÓëÇ×ÎÚ¿ËÀ¼µÄPhoenix HyenaºÚ¿Í×éÖ¯ÏÈǰʹÓõĶñÒâÈí¼þÓÐÏàËÆÖ®´¦£¬£¬£¬¸Ã×éÖ¯×Ô2022ÄêÒÔÀ´»îÔ¾£¬£¬£¬ÒÔÕë¶Ô¶íÂÞ˹ʵÌåÖø³Æ£¬£¬£¬ÇÒ2024Äê9ÔÂÉæÏÓÈëÇÖ¶íÂÞË¹ÍøÂçÇå¾²¹«Ë¾Dr. Web¡£¡£¡£¡£¡£¡£
https://hackread.com/ukraine-group-russian-developers-python-backdoor/
4. ÀÕË÷Èí¼þÍÅ»ïÇàíùSkitnet¶ñÒâÈí¼þ
5ÔÂ16ÈÕ£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÕýÔ½À´Ô½¶àµØÊ¹ÓÃÃûΪSkitnet£¨¡°Bossnet¡±£©µÄжñÒâÈí¼þ£¬£¬£¬ÔÚ±»¹¥ÆÆµÄÍøÂçÖÐÖ´ÐÐÒþÃØµÄºóʹÓû¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô2024Äê4ÔÂÆðÔÚµØÏÂÂÛ̳³öÊÛ£¬£¬£¬µ«×Ô2025ÄêÍ·ÒÔÀ´£¬£¬£¬ÔÚÀÕË÷Èí¼þÍÅ»ïÖÐÊܵ½ÏÔÖø¹Ø×¢¡£¡£¡£¡£¡£¡£ProdaftÑо¿Ö°Ô±ÊӲ쵽£¬£¬£¬¶à¸öÀÕË÷Èí¼þ²Ù×÷ÔÚÏÖʵ¹¥»÷Öа²ÅÅÁËSkitnet£¬£¬£¬ÈçÕë¶ÔÆóÒµµÄMicrosoft TeamsÍøÂç´¹ÂÚ¹¥»÷ÖеÄBlackBastaºÍCactus¡£¡£¡£¡£¡£¡£SkitnetµÄѬȾʼÓÚÔÚÄ¿µÄϵͳÉϰ²ÅŲ¢Ö´ÐлùÓÚRustµÄ¼ÓÔØÆ÷£¬£¬£¬¸Ã¼ÓÔØÆ÷½âÃÜChaCha20¼ÓÃܵÄNim¶þ½øÖÆÎļþ²¢¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£¡£¡£NimÓÐÓøºÔؽ¨Éè»ùÓÚDNSµÄ·´Ïòshell£¬£¬£¬ÓÃÓÚÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬²¢Ê¹ÓÃËæ»úDNSÅÌÎÊÆô¶¯»á»°¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÆô¶¯Èý¸öỊ̈߳¬£¬£¬»®·ÖÓÃÓÚ·¢ËÍÐÄÌøDNSÇëÇó¡¢¼àÊÓºÍй¶shellÊä³ö¡¢¼àÌýÏ¢ÕùÃÜÀ´×ÔDNSÏìÓ¦µÄÏÂÁî¡£¡£¡£¡£¡£¡£Í¨Ñ¶ºÍ´ýÖ´ÐеÄÏÂÁîͨ¹ýHTTP»òDNS·¢ËÍ£¬£¬£¬»ùÓÚSkitnet C2¿ØÖÆÃæ°åµÄÖ¸Áî¡£¡£¡£¡£¡£¡£SkitnetÖ§³Ö¶àÖÖÏÂÁ£¬£¬°üÀ¨½¨É賤ÆÚÐÔ¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢ÏÂÔØ²¢¾²Ä¬×°ÖÃÕýµ±µÄÔ¶³Ì»á¼û¹¤¾ß¡¢Æô¶¯PowerShellÏÂÁîÑ»·ÒÔ¼°Ã¶¾ÙÒÑ×°ÖõķÀ²¡¶¾ºÍÇå¾²Èí¼þµÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬²Ù×÷Ô±»¹¿ÉʹÓÃÉæ¼°.NET¼ÓÔØÆ÷µÄ¹¦Ð§£¬£¬£¬ÔÚÄÚ´æÖÐÖ´ÐÐPowerShell¾ç±¾£¬£¬£¬ÊµÏÖ¸üÉîÌõÀíµÄ¹¥»÷¶¨ÖÆ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/
5. °²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÀÕË÷¹¥»÷ÖÂÊý¾Ýй¶
5ÔÂ15ÈÕ£¬£¬£¬2Ô·ݰ²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬µ¼Ö»¼ÕßÉñÃØÊý¾Ýй¶¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý·¢ÏØÕþ¸®´óÂ¥ÔÝʱ¹Ø±Õ£¬£¬£¬²¢Ó°Ïì¶àÏîסÃñЧÀÍ¡£¡£¡£¡£¡£¡£ÏØÕþ¸®ÓÚ2ÔÂ22ÈÕÊ״βì¾õ´Ë´Î¹¥»÷£¬£¬£¬²¢Á¬Ã¦ÁªºÏÐÐÒµÁìÏȵÄÍøÂçÇ徲ר¼Ò¡¢Ö´·¨»ú¹¹¼°Ïà¹ØÖÝÕþ¸®»ú¹¹Õö¿ªÊӲ졣¡£¡£¡£¡£¡£ÊÓ²ìЧ¹ûÏÔʾ£¬£¬£¬´Ë´ÎÊÂÎñΪÍⲿÍþвÐÐΪÕßÌᳫµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¹¥»÷±¬·¢ÔÚ1ÔÂ28ÈÕÖÁ2ÔÂ22ÈÕʱ´ú£¬£¬£¬¡°¸ÃÏØÍøÂçµÄһС²¿·Ö¡±Ôâµ½ÈëÇÖ£¬£¬£¬Ê±´úijЩÎļþ±»Î´¾ÊÚȨ»á¼û»òÏÂÔØ¡£¡£¡£¡£¡£¡£×¨¼ÒÖ¸³ö£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÖУ¬£¬£¬ºÚ¿Íͨ³£ÇÖÈëϵͳ¼ÓÃÜ»òËø¶¨Ãü¾Ý£¬£¬£¬²¢ÒªÇóÖ§¸¶Êê½ðÒÔÊÍ·ÅÐÅÏ¢¡£¡£¡£¡£¡£¡£µ±±»Îʼ°ÊÇ·ñÒÑÖ§¸¶Êê½ðʱ£¬£¬£¬½²»°ÈËÌåÏÖÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬ÎÞ·¨Í¸Â¶Ïà¹ØÐÅÏ¢¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÏØÕýÓëÕÕÁÏÏàÖú£¬£¬£¬ÒÔÈ·¶¨ÄÄЩÎļþ±»Ð¹Â¶£¬£¬£¬Éв»ÇåÎúÊÜÓ°ÏìÈËÊý¡£¡£¡£¡£¡£¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÓû§µÄÈ«Ãû¡¢µØµã¼°Ò½ÁÆÕï¶ÏµÈÐÅÏ¢£¬£¬£¬Ö»¹Ü²ÆÎñÐÅϢδÊÜй¶£¬£¬£¬µ«¹ÙÔ±ÈÔÃãÀø×¡Ãñ¼á³ÖСÐÄ£¬£¬£¬Í¨¹ýÉó²éÕË»§±¨±í¡¢ÐÅÓñ¨¸æµÈÌá·ÀÉí·Ý͵ÇÔ¡£¡£¡£¡£¡£¡£
https://www.thebaltimorebanner.com/community/local-news/cybersecurity-ransomware-anne-arundel-county-cyberattack-FYSLHXQANFCHBBCBDJWNDVUW6Q/
6. EffortelÊý¾Ýй¶Ö±ÈÀûʱMVNOÆßÍò¿Í»§ÐÅÏ¢Íâй
5ÔÂ16ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬ÓÉÓÚEffortel±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬µ¼ÖÂÈý¼Ò±ÈÀûÊ±ÒÆ¶¯ÐéÄâÍøÂçÔËÓªÉÌ£¨MVNO£©µÄ70,000Ãû¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£¡£¡£Effortel×÷ÎªÒÆ¶¯ÐéÄâÍøÂçÍÆ¶¯Õߣ¨MVNE£©£¬£¬£¬ÔÚµçÐÅÐÐÒµÖÐÊÎÑÝ×ÅÒªº¦½ÇÉ«£¬£¬£¬ËüΪӵÓÐÎïÀíÍøÂçµÄµçÐŹ«Ë¾£¨ÈçProximus£©ÓëÐéÄâµçÐÅÌṩÉÌ£¨ÈçNeibo£©Ö®¼ä´î½¨ÇÅÁº£¬£¬£¬Í¨¹ý¿ª·¢Èí¼þƽ̨£¬£¬£¬Ê¹ÆóÒµÄܹ»ÒÔMVNOÉí·ÝÔÚµçÐÅÔËÓªÉ̵ÄÎïÀíÍøÂçÉÏÔËÓª£¬£¬£¬¶øÎÞÐè¾ß±¸´ó×ÚÊÖÒÕרҵ֪ʶ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬EffortelΪȫÇò30¶à¼ÒMVNO¿Í»§Ìṩ¿ªÆ±ºÍÅþÁ¬SIM¿¨µÈЧÀÍ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñ±¬·¢ÔÚÖÐÑëÊý¾Ý¿âµÄ²âÊԽ׶Σ¬£¬£¬EffortelÔÚת´ï¿Í»§Êý¾Ý£¨ÈçÓÃÓÚ½ôÆÈЧÀ͵ÄÊý¾Ý£©ÒÔ¾ÙÐÐϵͳ¼¯³Éʱ£¬£¬£¬ÌìÉúÁ˰üÀ¨¿Í»§Êý¾ÝµÄÎļþ£¬£¬£¬ÕâЩÎļþ²»ÐÒ±»Ð¹Â¶¡£¡£¡£¡£¡£¡£Ò»ÃûºÚ¿ÍÀÖ³ÉÈëÇÖÁËMVNOºÍTelfortÖ®¼äµÄÖ§³ÖÃÅ»§£¬£¬£¬»ñÈ¡ÁËÕâЩÎļþµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°¼ÒÀÖ¸£Òƶ¯¡¢NeiboºÍUndoµÈ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ롢סլµØµã¡¢»¤ÕÕºÅÂë¡¢Óû§ºÅÂëÒÔ¼°SIM¿¨ºÅµÈÊÖÒÕʶ±ðÊý¾Ý¡£¡£¡£¡£¡£¡£Effortel×Ü˾ÀíLaurent BatailleÌåÏÖ£¬£¬£¬60%µ½65%µÄÖն˿ͻ§Í¨¹ýÔÚÏßÖ§¸¶È·ÈÏÉí·Ý£¬£¬£¬ÆäÉí·ÝÊý¾Ý²»»á±»´æ´¢£¬£¬£¬Ö§¸¶IDËä±£´æ£¬£¬£¬µ«Ö»ÄÜͨ¹ýÖ§¸¶ÌṩÉÌÓëСÎÒ˽¼ÒÊý¾Ý¹ØÁª¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/data-belgian-virtual-telecom-operators-leaked/


¾©¹«Íø°²±¸11010802024551ºÅ