FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß

Ðû²¼Ê±¼ä 2025-04-22

1. FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß


4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬FogÀÕË÷Èí¼þÔËÓªÉ̽üÆÚʹÓÃDOGEÖ÷ÌâÀÕË÷Ðż¥Ð¦Êܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬ÌṩÃ⺬»ìÃÜÃÜÔ¿ÒÔ»»È¡¶ñÒâÈí¼þÈö²¥¡£¡£¡£¡£¡£ÓëÔçÆÚÒÀÀµ±»µÁVPNƾ֤²î±ð£¬£¬£¬£¬£¬£¬£¬×îй¥»÷ʼÓÚ°üÀ¨¡°Pay Adjustment.zip¡±µÄÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬ÄÚº¬¶ñÒâLNKÎļþ£¬£¬£¬£¬£¬£¬£¬µã»÷ºó´¥·¢Ò»ÏµÁвÙ×÷½«ÀÕË÷Èí¼þÖ²Èëϵͳ¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬×Ô½ñÄê1ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þÒÑѬȾ100ÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬2Ô·Ý×î¶à£¬£¬£¬£¬£¬£¬£¬Îª53ÈË£»£»£»£»£»£»£»×Ô2024Äê6ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬ÔÚ¿Í»§Öмì²âµ½173ÆðÏà¹ØÀÕË÷»î¶¯¡£¡£¡£¡£¡£´ó¶¼Êܺ¦ÕßÀ´×ԿƼ¼¡¢ÖÆÔì¡¢½ÌÓýºÍ½»Í¨ÔËÊäÐÐÒµ¡£¡£¡£¡£¡£Ð¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬¶ñÒâLNKÎļþÏÂÔØPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬£¬¼ìË÷ÀÕË÷Èí¼þÏÂÔØ³ÌÐò¼°¶à¸öÆäËû¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£ÕâЩ¾ç±¾°üÀ¨ÍøÂçϵͳÐÅÏ¢¡¢ºáÏòÒÆ¶¯¹¤¾ß¼°·­¿ª¶þάÂëµÄ¾ç±¾£¬£¬£¬£¬£¬£¬£¬Êܺ¦Õß¿ÉÓøöþάÂëÖ§¸¶Êê½ð¡£¡£¡£¡£¡£³õʼPowerShell¾ç±¾»¹·­¿ªÕþÖÎÖ÷ÌâYouTubeÊÓÆµ²¢°üÀ¨ÊéÃæÕþÖÎ̸ÂÛ¡£¡£¡£¡£¡£³õʼÊê½ð֪ͨÌá¼°DOGE£¬£¬£¬£¬£¬£¬£¬ÉõÖÁDOGEÊÂÇéÖ°Ô±£¬£¬£¬£¬£¬£¬£¬ÒªÇóÊܺ¦ÕßÁгöÎåÏîʹÃü£¬£¬£¬£¬£¬£¬£¬²»È»Ö§¸¶Ò»ÍòÒÚÃÀÔªÊê½ð¡£¡£¡£¡£¡£ÍþвÕßÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÈôÊܺ¦Õß½«¶ñÒâÈí¼þ·¢Ë͸øËûÈË£¬£¬£¬£¬£¬£¬£¬¼´¿ÉÃ⺬»ìÃÜϵͳ¡£¡£¡£¡£¡£FogÀÕË÷Èí¼þÊÇÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬£¬£¬£¬ÆóÒµ±ØÐ轫ÆäÌí¼Óµ½¼à¿ØÁбíÖС£¡£¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/fog-hackers-doge-ransom-notes


2. RustoBot½©Ê¬ÍøÂçʹÓ÷ÓÉÆ÷Îó²î·¢¶¯¹¥»÷


4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬FortiGuard Labs½üÆÚ·¢Ã÷RustoBot£¬£¬£¬£¬£¬£¬£¬ÕâÒ»ÓÃRust±àдµÄÖØ´ó½©Ê¬ÍøÂçÕýʹÓÃTOTOLINKºÍDrayTek·ÓÉÆ÷Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÚÈÕ±¾¡¢Ì¨Íå¡¢Ô½ÄϺÍÄ«Î÷¸çµÄÊÖÒÕ»ù´¡ÉèÊ©ÖÐËÁŰ¡£¡£¡£¡£¡£2025ÄêÍ·£¬£¬£¬£¬£¬£¬£¬¹¥»÷ʵÑé¼±¾çÔöÌí£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸TOTOLINK cstecgi.cgi¾ç±¾Öеĺã¾ÃÎó²î£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÉæ¼°ÉèÖøü¸ÄºÍÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬±£´æ¶à¸öÏÂÁî×¢Èëµã£¬£¬£¬£¬£¬£¬£¬°üÀ¨CVE-2022-26210¡¢CVE-2022-26187ÒÔ¼°Ó°ÏìDrayTek·ÓÉÆ÷µÄCVE-2024-12987¡£¡£¡£¡£¡£ÕâЩÈõµãʹ¹¥»÷Õß»ñµÃÔ¶³Ì´úÂëÖ´ÐÐÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÎªRustoBotѬȾÆÌƽõè¾¶¡£¡£¡£¡£¡£Ò»µ©»ñµÃ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬RustoBot±ãͨ¹ýËĸöÏÂÔØ¾ç±¾Ö®Ò»¾ÙÐа²ÅÅ£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¶àÖּܹ¹£¬£¬£¬£¬£¬£¬£¬È·±£ÓëÒ×Êܹ¥»÷µÄ·ÓÉÆ÷ÆÕ±é¼æÈÝ¡£¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚʹÓÃRustÓïÑÔ£¬£¬£¬£¬£¬£¬£¬¶þ½øÖƽṹͨ¹ýXOR¼ÓÃܺÍGOT²Ù×÷¾ÙÐлìÏý£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÒþÉíÐÔ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÄæÏò¹¤³ÌÖØ´ó»¯¡£¡£¡£¡£¡£½âÃܺóµÄÉèÖÃÕ¹ÏÖ£¬£¬£¬£¬£¬£¬£¬RustoBotÖ´ÐÐÁ½Ïî½¹µã¶ñÒâ²Ù×÷£ºÆÊÎö¶à¸öC2ÓòÃû£¬£¬£¬£¬£¬£¬£¬²¢Æ¾Ö¤ÏÂÁîÌᳫDDoS¹¥»÷¡£¡£¡£¡£¡£RustoBot»î¶¯ÒÑÓ°Ïì¶à¿îTOTOLINKºÍDrayTek·ÓÉÆ÷Ðͺţ¬£¬£¬£¬£¬£¬£¬Êܺ¦ÕßÖ÷ҪλÓڿƼ¼ÁìÓò£¬£¬£¬£¬£¬£¬£¬Åú×¢¹¥»÷¿ÉÄܾßÓÐÕë¶ÔÐÔ¡£¡£¡£¡£¡£


https://securityonline.info/rustobot-botnet-exploits-router-flaws-in-sophisticated-attacks/


3. WordPress¹ã¸æÚ²Æ­²å¼þÌìÌ챬·¢14ÒÚ¸ö¹ã¸æÇëÇó


4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Scallywag¡±µÄ´ó¹æÄ£¹ã¸æÚ²Æ­×éÖ¯¸¡³öË®Ãæ£¬£¬£¬£¬£¬£¬£¬¸Ã×é֯ͨ¹ý¶¨ÖÆWordPress²å¼þ£¬£¬£¬£¬£¬£¬£¬½«µÁ°æºÍURLËõ¶ÌÍøÕ¾Ç®±Ò»¯£¬£¬£¬£¬£¬£¬£¬ÖðÈÕ±¬·¢ÊýÊ®ÒÚ¸öڲƭÇëÇ󡣡£¡£¡£¡£ScallywagÓÉ»úеÈ˺Íڲƭ¼ì²â¹«Ë¾HUMAN·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Æä±³ºóÊÇÒ»¸öÓÉ407¸öÓòÃû×é³ÉµÄÖØ´óÍøÂ磬£¬£¬£¬£¬£¬£¬ÖðÈÕڲƭ¹ã¸æÇëÇó·åÖµ¸ß´ï14ÒÚÌõ¡£¡£¡£¡£¡£Ö»¹ÜHUMAN½ÓÄɲ½·¥Ê¹ScallywagÁ÷Á¿ïÔÌ­95%£¬£¬£¬£¬£¬£¬£¬µ«¸Ã×é֯ͨ¹ýÂÖ»»ÓòÃûºÍµ÷½âÇ®±Ò»¯Ä£Ê½Õ¹ÏÖ³öǿʢÈÍÐÔ¡£¡£¡£¡£¡£Scallywag»ùÓÚËĸöWordPress²å¼þ¹¹½¨£¬£¬£¬£¬£¬£¬£¬°üÀ¨Soralink¡¢Yu Idea¡¢WPSafeLinkºÍDroplink£¬£¬£¬£¬£¬£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´Ó¸ßΣº¦¡¢µÍÖÊÁ¿ÍøÕ¾×¬Ç®µÄ;¾¶¡£¡£¡£¡£¡£ÕâЩ²å¼þ½µµÍÁËDZÔÚÍþвÐÐΪÕߵĽøÈëÃż÷£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÓÐÈËÔÚYouTubeÉÏÐû²¼²Ù×÷½Ì³Ì¡£¡£¡£¡£¡£Óû§»á¼ûµÁ°æÄ¿Â¼ÍøÕ¾Ê±£¬£¬£¬£¬£¬£¬£¬µã»÷ǶÈëµÄURLËõ¶ÌÁ´½Ó£¬£¬£¬£¬£¬£¬£¬»á±»Öض¨ÏòÖÁÖÐÐĹãÃÜ¸æ¼¯Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬ÎªScallywagÔËÓªÉ̱¬·¢Ú²Æ­ÐÔÓ¡Ï󣬣¬£¬£¬£¬£¬£¬×îÖÕ½øÈëÔÊÐíÄÚÈݵÄÒ³Ãæ¡£¡£¡£¡£¡£ÕâЩÖÐÐÄÍøÕ¾ÔËÐÐScallywag²å¼þ£¬£¬£¬£¬£¬£¬£¬ÈÏÕæ´¦Öóͷ£Öض¨ÏòÂß¼­¡¢¹ã¸æ¼ÓÔØµÈ£¬£¬£¬£¬£¬£¬£¬ÒÔÔÚ¹ã¸æÆ½Ì¨¼ì²éÖÐαװ³ÉÕý³£²©¿Í¡£¡£¡£¡£¡£HUMAN̫ͨ¹ýÎöÁ÷Á¿Ä£Ê½¼ì²âScallywag»î¶¯£¬£¬£¬£¬£¬£¬£¬²¢Óë¹ã¸æÌṩÉÌÏàÖú×èÖ¹¶Ô¹ã¸æÇëÇóµÄ¾º±ê£¬£¬£¬£¬£¬£¬£¬ÇÐ¶ÏÆäÊÕÈëȪԴ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/scallywag-ad-fraud-operation-generated-14-billion-ad-requests-per-day/


4. ÐÂÐͶñÒâÈí¼þResolverRATÍþвҽÁÆÓëÖÆÒ©ÐÐÒµ


4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬MorphisecÍþвʵÑéÊÒ·¢Ã÷ÁËÒ»ÖÖÐÂÐÍÖØ´ó¶ñÒâÈí¼þResolverRAT£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÕýÆð¾¢Õë¶ÔÒ½ÁƱ£½¡ºÍÖÆÒ©ÐÐÒµÕö¿ª¹¥»÷£¬£¬£¬£¬£¬£¬£¬×î½üÒ»²¨¹¥»÷¼¯ÖÐÔÚ2025Äê3ÔÂ10ÈÕ×óÓÒ¡£¡£¡£¡£¡£ResolverRATÒÀ¸½ÆäÏȽøµÄÊÖÒÕÊֶΣ¬£¬£¬£¬£¬£¬£¬ÈçÄÚ´æÖ´ÐС¢¶¯Ì¬×ÊÔ´´¦Öóͷ£¼°¶à²ã¹æ±ÜÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Ê¹µÃ¹Å°å¼ì²âÒªÁìÄÑÒÔ×àЧ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬£¬£¬£¬Ê¹ÓýôÆÈ¸Ð»ò¿Ö¾å¸ÐÓÕµ¼ÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬£¬½ø¶ø´¥·¢Ñ¬È¾Àú³Ì¡£¡£¡£¡£¡£¹¥»÷¸ß¶ÈÍâµØ»¯£¬£¬£¬£¬£¬£¬£¬Óʼþ½ÓÄÉÄ¿µÄ¹ú¼ÒĸÓï׫д£¬£¬£¬£¬£¬£¬£¬Ö÷ÌâÉæ¼°Ö´·¨ÊÓ²ì»ò°æÈ¨ÇÖȨ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚͨ¹ý¸öÐÔ»¯¶¨Î»Ìá¸ßѬȾÀÖ³ÉÂÊ¡£¡£¡£¡£¡£Ñ¬È¾Ê¼ÓÚDLL²àÔØÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬½«¶ñÒâDLLÎļþÓëÕýµ±³ÌÐò£¨Èç hpreader.exe£©Ò»Í¬°²ÅÅ£¬£¬£¬£¬£¬£¬£¬µ±³ÌÐòÖ´ÐÐʱ£¬£¬£¬£¬£¬£¬£¬¶ñÒâDLL±»ÇÄÇļÓÔØ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÆô¶¯¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ResolverRAT ½ÓÄɶà²ã¹æ±ÜÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬°üÀ¨´úÂë»ìÏýºÍ×Ô½ç˵ЭÒéÀ´»ìÏýÍøÂçÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬²¢ÔÚÔËÐÐʱ¶¯Ì¬Ê¶±ðºÍʹÓÃϵͳº¯Êý¡£¡£¡£¡£¡£ÎªÈ·¼á³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬ResolverRAT ÔÚ Windows ×¢²á±íÖн¨Éè¶à¸öÌõÄ¿£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¶à¸öλÖÃ×°ÖÃ×ÔÉí¸±±¾¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ëü»¹Ê¹ÓÃÆæÒìµÄÖ¤ÊéÑéÖ¤ÒªÁìºÍ¡°.NET ×ÊÔ´ÆÊÎöÆ÷Ð®ÖÆ¡±ÊÖÒÕÀ´ÒþÉí£¬£¬£¬£¬£¬£¬£¬²¢ÊµÑé¶ÔÆÊÎöÇéÐξÙÐÐÖ¸ÎÆÊ¶±ð£¬£¬£¬£¬£¬£¬£¬ÒÔÔÚ¼ì²âµ½±»¼ì²éʱ¸Ä±äÐÐΪ¡£¡£¡£¡£¡£


https://hackread.com/native-language-phishing-resolverrat-healthcare/


5. Õ©Æ­·Ö×Óð³äFBI IC3Ô±¹¤ÇÔÈ¡ÄúµÄ²ÆÎñÐÅÏ¢


4ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬FBIÐû²¼Õ©Æ­¾¯±¨£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÕ©Æ­·Ö×ÓÕýð³äFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐÄ(IC3)Ö°Ô±£¬£¬£¬£¬£¬£¬£¬ÒÔ×·»ØËðʧ×ʽðΪÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Êܺ¦Õß²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£×Ô2023Äê12ÔÂÖÁ2025Äê2Ô£¬£¬£¬£¬£¬£¬£¬FBIÒÑÊÕµ½100¶àÆðÏà¹Ø±¨¸æ¡£¡£¡£¡£¡£Õ©Æ­Õß³£Ãé×¼ÍøÂç½ðÈÚÕ©Æ­Êܺ¦ÕßµÄÉç½»ÍøÂç»òÔÚÏßÂÛ̳£¬£¬£¬£¬£¬£¬£¬ÓÐʱð³äÕæÊµÉí·Ý»òʹÓÃÐéαƾ֤¡£¡£¡£¡£¡£ËùÓÐȦÌ×¾ùÉæ¼°ÒÔijÖÖÐÎʽ×ÊÖúÊܺ¦Õß×·»ØËðʧ£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü×î³õÁªÏµ·½·¨¸÷Ò죬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢µç»°¡¢É罻ýÌå»òÂÛ̳¡£¡£¡£¡£¡£ÔÚijЩ°¸ÀýÖУ¬£¬£¬£¬£¬£¬£¬Õ©Æ­ÕßÉõÖÁÉù³ÆÉ¥Ê§×ʽð¾ÍÔÚËûÃÇÊÖÖС£¡£¡£¡£¡£ËûÃÇͨ¹ý½¨ÉèÐéαСÎÒ˽¼Ò×ÊÁÏ£¬£¬£¬£¬£¬£¬£¬¼ÓÈëÔÚÏß½ðÈÚÕ©Æ­ÍŻ£¬£¬£¬£¬£¬£¬²¢½¨ÒéÊܺ¦ÕßÁªÏµÃ°³äµÄIC3¡°Ê×ϯִÐй١±»ñÈ¡×ÊÖú¡£¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÖмƣ¬£¬£¬£¬£¬£¬£¬Õ©Æ­Õß±ãÉù³ÆÒѻָ´×ʽ𣬣¬£¬£¬£¬£¬£¬²¢½è´Ë»ñÈ¡Æä²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕâЩÍýÏë²»µ«ÓÕÆ­ºÍÕ©Æ­Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬»¹Ê¹ËûÃÇÔٴγÉΪÊܺ¦Õß¡£¡£¡£¡£¡£ÎªÌá·À´ËÀàÕ©Æ­£¬£¬£¬£¬£¬£¬£¬FBIÌáÐѹ«ÖÚ£¬£¬£¬£¬£¬£¬£¬IC3¾ø²»»áͨ¹ýµç»°¡¢µç×ÓÓʼþ¡¢É罻ýÌåµÈÖ±½ÓÓëСÎÒ˽¼ÒÏàͬ£¬£¬£¬£¬£¬£¬£¬Ò²²»»áÒªÇ󸶿îÀ´×·»ØËðʧ×ʽ𣬣¬£¬£¬£¬£¬£¬¸ü²»»á½«Êܺ¦Õßת½é¸øÒªÇ󸶿îµÄ¹«Ë¾¡£¡£¡£¡£¡£¹«ÖÚÓ¦Ìá¸ßСÐÄ£¬£¬£¬£¬£¬£¬£¬ÇÐÎðÓë½öÔÚÍøÉÏ»òµç»°ÖÐÊìϤµÄÈË·ÖÏíÃô¸ÐÐÅÏ¢»ò·¢ËÍÇ®²Æ¡£¡£¡£¡£¡£ÈçÐè¾Ù±¨ÍøÂçڲƭ£¬£¬£¬£¬£¬£¬£¬¿É»á¼ûFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐĹÙÍø¡£¡£¡£¡£¡£


https://cybernews.com/security/fbi-alert-ic3-impersonation-scam-recover-lost-funds-steal-financial-info/


6. ºÚ¿ÍʹÓÃGoogleϵͳÈõµãʵÑéDKIMÖØ·ÅÍøÂç´¹ÂÚ¹¥»÷


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃGoogleϵͳÈõµã£¬£¬£¬£¬£¬£¬£¬ÌᳫÁËÒ»³¡ÇÉÃîµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÒ»·â¿´ËÆÀ´×Ô¡°no-reply@google.com¡±µÄÐéαµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈÆ¹ýËùÓÐÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Ö¸ÏòÒ»¸öÍøÂçµÇ¼ÐÅÏ¢µÄÚ²Æ­Ò³Ãæ¡£¡£¡£¡£¡£¸ÃÓʼþ²»µ«Í¨¹ýÁËDKIMÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬ÇÒÄÚÈÝÏÕЩÓë¹È¸è¹Ù·½Çå¾²¾¯±¨ÎÞÒ죬£¬£¬£¬£¬£¬£¬¼«Ò×ÓÕÆ­ÊÖÒÕˮƽ½ÏµÍµÄÓû§¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ENSÊ×ϯ¿ª·¢Ö°Ô±Äá¿Ë¡¤Ô¼º²Ñ·ÃôÈñµØ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ðéα֧³ÖÃÅ»§ÍйÜÔÚsites.google.comÉÏ£¬£¬£¬£¬£¬£¬£¬¶ø·ÇÕæÕýµÄaccounts.google.com£¬£¬£¬£¬£¬£¬£¬´Ó¶øÊ¶ÆÆÁËȦÌס£¡£¡£¡£¡£¹¥»÷ÕßÇÉÃîµØ×¢²áÁËÒ»¸öÓòÃû£¬£¬£¬£¬£¬£¬£¬²¢ÒÔ¡°me@domain¡±½¨ÉèGoogleÕÊ»§£¬£¬£¬£¬£¬£¬£¬Ëæºó½¨ÉèÁËÒ»¸öGoogle OAuthÓ¦Ó㬣¬£¬£¬£¬£¬£¬½«´¹ÂÚÓʼþÃüÃûΪ¸ÃÓ¦Óᣡ£¡£¡£¡£µ±¹¥»÷ÕßÊÚÓèÆäOAuthÓ¦Óûá¼ûGoogle WorkspaceÖеç×ÓÓʼþµØµãµÄȨÏÞʱ£¬£¬£¬£¬£¬£¬£¬Google×Ô¶¯·¢ËÍÁËÇå¾²¾¯±¨£¬£¬£¬£¬£¬£¬£¬¸Ã¾¯±¨ÒòʹÓÃÓÐÓõÄDKIMÃÜÔ¿ÊðÃû¶øÍ¨¹ýÁËËùÓмì²é¡£¡£¡£¡£¡£¹¥»÷ÕßËæºó½«Çå¾²¾¯±¨×ª·¢¸øÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬Ê¹Æä¿´ÆðÀ´ÏñÊÇÀ´×ԹȸèµÄÕýµ±Óʼþ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËGoogleϵͳµÄÈõµã£¬£¬£¬£¬£¬£¬£¬¼´DKIM½ö¼ì²éÓʼþÕýÎĺÍÓʼþÍ·£¬£¬£¬£¬£¬£¬£¬¶ø²»¼ì²éÐŷ⣬£¬£¬£¬£¬£¬£¬Ê¹µÃαÔìÓʼþÄܹ»Í¨¹ýÊðÃûÑéÖ¤¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¹È¸èÒÑÊìϤµ½OAuthµÄÈõµã£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚÆð¾¢ÐÞ¸´¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/