¼ÓÖÝÀ¶¶Ü°ü¹Ü¹«Ë¾Ïò¹È¸èй¶ÁË470ÍòÃû»áÔ±µÄ¿µ½¡Êý¾Ý

Ðû²¼Ê±¼ä 2025-04-24

1. ¼ÓÖÝÀ¶¶Ü°ü¹Ü¹«Ë¾Ïò¹È¸èй¶ÁË470ÍòÃû»áÔ±µÄ¿µ½¡Êý¾Ý


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬¼ÓÖÝÀ¶¶Ü°ü¹Ü¹«Ë¾½üÆÚÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Æä470Íò»áÔ±µÄÊܱ£»£»£»£»¤¿µ½¡ÐÅÏ¢±»Ð¹Â¶¸ø¹È¸èµÄÆÊÎöºÍ¹ã¸æÆ½Ì¨¡£¡£¡£¡£ ¡£¡£×÷ΪΪ¼ÓÖݽü600Íò»áÔ±ÌṩЧÀ͵ķÇÓªÀûÐÔ¿µ½¡ÍýÏ룬£¬£¬£¬£¬£¬£¬À¶¶ÜÔÚÍøÕ¾ÉÏÐû²¼ÁËÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬£¬Ö¸³ö»áÔ±Êý¾ÝÔÚ2021Äê4ÔÂÖÁ2024Äê1ÔÂʱ´úÔ⵽й¶¡£¡£¡£¡£ ¡£¡£ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Ð¹ÃÜÃÅ»§ÍøÕ¾Ò²¶Ô´Ë´ÎÊÂÎñ¾ÙÐÐÁ˸üУ¬£¬£¬£¬£¬£¬£¬È·ÈÏÁË470ÍòÃû»áÔ±µÄÊܱ£»£»£»£»¤¿µ½¡Êý¾Ý̻¶¡£¡£¡£¡£ ¡£¡£´Ë´Îй¶ԴÓÚBlue ShieldÍøÕ¾ÉÏGoogle AnalyticsÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÊý¾Ý¿ÉÄܱ»¹²Ïí¸ø¹È¸è¹ã¸æÆ½Ì¨ºÍ¹ã¸æÉÌ¡£¡£¡£¡£ ¡£¡£Í¨ÖªÖÐÃ÷È·Ìáµ½£¬£¬£¬£¬£¬£¬£¬2025Äê2ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬À¶¶Ü·¢Ã÷Google AnalyticsµÄÉèÖ÷½·¨ÔÊÐíijЩ»áÔ±Êý¾ÝÓëGoogle Ads¹²Ïí£¬£¬£¬£¬£¬£¬£¬ÆäÖпÉÄܰüÀ¨Êܱ£»£»£»£»¤µÄ¿µ½¡ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¹È¸è¿ÉÄÜʹÓÃÕâЩÊý¾Ý¿ªÕ¹ÓÐÕë¶ÔÐÔµÄ¹ã¸æ»î¶¯¡£¡£¡£¡£ ¡£¡£Ì»Â¶µÄÊý¾ÝÀàÐͰüÀ¨°ü¹ÜÍýÏëÃû³Æ¡¢ÀàÐͺÍ×éºÅ¡¢¶¼»áºÍÓÊÕþ±àÂë¡¢ÐԱ𡢼ÒÍ¥¹æÄ£µÈ£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐÒ½ÁÆË÷ÅâЧÀÍÈÕÆÚ¡¢Ð§ÀÍÌṩÕß¡¢»¼ÕßÐÕÃû¼°²ÆÎñÔðÈεÈÒ½ÁÆÏà¹ØÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¡°Ñ°ÕÒÒ½Éú¡±ËÑË÷Ìõ¼þºÍЧ¹ûµÈ¡£¡£¡£¡£ ¡£¡£²»¹ý£¬£¬£¬£¬£¬£¬£¬À¶¶ÜÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬ÆäËûСÎÒ˽¼ÒÐÅÏ¢ÈçÉç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢ÒøÐкÍÐÅÓÿ¨ÐÅÏ¢²¢Î´Òò´Ë´ÎÊÂÎñй¶¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/blue-shield-of-california-leaked-health-data-of-47-million-members-to-google/


2. ¶íÂÞ˹¾ü¶ÓÔâµØÍ¼Ó¦ÓÃÖÐÒþ²ØµÄÐÂÐÍAndroid¶ñÒâÈí¼þ¹¥»÷


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚAlpine QuestµØÍ¼Ó¦ÓóÌÐòµÄľÂí°æ±¾Öз¢Ã÷ÁËÒ»ÖÖÐÂÐÍAndroid¶ñÒâÈí¼þ¡£¡£¡£¡£ ¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹ʿ±øÔøÊ¹ÓøÃÓ¦ÓóÌÐò×÷ÎªÕ½Çø×÷Õ½ÍýÏ빤¾ß¡£¡£¡£¡£ ¡£¡£¹¥»÷Õß½«´ËľÂíαװ³É¸ß¼¶Alpine Quest ProµÄÃâ·ÑÆÆ½â°æ£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýTelegramƵµÀºÍ¶íÂÞ˹ӦÓóÌÐòĿ¼¾ÙÐÐÈö²¥¡£¡£¡£¡£ ¡£¡£AlpineQuestÊÇÒ»¿îÕýµ±µÄAndroid GPSºÍµØÐÎ²â»æÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÉîÊÜðÏÕ¼Ò¡¢ÔË·¢¶¯¡¢ËѾȶӼ°¾üÊÂÖ°Ô±Çàíù£¬£¬£¬£¬£¬£¬£¬ÒòÆäÀëÏß¹¦Ð§ºÍ׼ȷ¶È¶ø±¸ÊÜÔÞÓþ¡£¡£¡£¡£ ¡£¡£¸ÃÓ¦ÓÃÌṩÁ½¸ö°æ±¾£º¹¦Ð§ÊÜÏÞµÄÃâ·Ñ¾«¼ò°æºÍÎÞ¸ú×Ù¿â¡¢ÆÊÎö¼°¹ã¸æµÄÃâ·Ñרҵ°æ¡£¡£¡£¡£ ¡£¡£Õâ¿îÌØ¹¤Èí¼þÓɶíÂÞË¹ÒÆ¶¯·À²¡¶¾¹«Ë¾Doctor WebµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ËüÇÉÃîµØÒþ²ØÔÚ¹¦Ð§ÆëÈ«µÄAlpine QuestÓ¦ÓÃÖУ¬£¬£¬£¬£¬£¬£¬ÒԴ˽µµÍÓû§ÏÓÒÉ£¬£¬£¬£¬£¬£¬£¬²¢ËÅ»úÇÔÈ¡Êý¾Ý¡£¡£¡£¡£ ¡£¡£Ò»µ©Æô¶¯£¬£¬£¬£¬£¬£¬£¬Ìع¤Èí¼þ±ãÊÔͼÇÔȡװ±¸ÖеÄͨѶÊý¾ÝºÍÃô¸ÐÎļþ£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜй¶¾ü¶ÓÐж¯Ï¸½Ú£¬£¬£¬£¬£¬£¬£¬°üÀ¨·¢ËÍÓû§µç»°ºÅÂë¡¢ÁªÏµÈË¡¢µØÀíλÖá¢ÎļþÐÅÏ¢¼°Ó¦Óð汾ÖÁ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬£¬ÊµÊ±¼à¿ØÎ»ÖÃת±ä²¢¸üÐÂÖÁTelegram»úеÈË£¬£¬£¬£¬£¬£¬£¬ÏÂÔØÌØÊâÄ£¿£¿£¿ £¿éÇÔÈ¡ÉñÃØÎļþ£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇͨ¹ýTelegramºÍWhatsApp·¢Ë͵ÄÎļþ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°´ÓAlpine QuestÖÐÌáÈ¡°üÀ¨Î»ÖÃÀúÊ·ÈÕÖ¾µÄ¡°locLog¡±Îļþ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/russian-army-targeted-by-new-android-malware-hidden-in-mapping-app/


3. Kelly BenefitsÅû¶ӰÏ쳬26ÍòÈËÊý¾Ýй¶ÊÂÎñ


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚÂíÀïÀ¼Öݵĸ£ÀûºÍÈËΪ½â¾ö¼Æ»®ÌṩÉÌKelly & Associates Insurance Group£¨ÒÔdba Kelly BenefitsÔËÓª£©¿ËÈÕÅû¶ÁËÒ»ÆðÓ°ÏìÁè¼Ý26ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾ÎªÂíÀïÀ¼Öݼ°Öܱ߸÷ÖÝÌṩ¸£ÀûÖÎÀí¡¢ÊÖÒÕ¡¢¾­¼ÍºÍ×ÉѯЧÀÍÒÔ¼°ÈËΪ½â¾ö¼Æ»®¡£¡£¡£¡£ ¡£¡£ÆäÍøÕ¾ÉÏÐû²¼µÄÊý¾ÝÇ徲֪ͨÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹«Ë¾×î½ü¼ì²âµ½ÆäÍøÂçÉϱ£´æ¿ÉÒɻ£¬£¬£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾºÚ¿ÍÔÚ2024Äê12ÔÂ12ÈÕÖÁ12ÔÂ17ÈÕʱ´ú»á¼ûÁËÆäϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ´Ëʱ´úй¶ÁËijЩÎļþ£¬£¬£¬£¬£¬£¬£¬ÕâЩÎļþ°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ롢˰ºÅ¡¢Ò½ÁÆÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢ºÍ½ðÈÚÕË»§ÐÅÏ¢µÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£ ¡£¡£ÊÜÓ°ÏìµÄСÎÒ˽¼ÒÒÑÊÕµ½Í¨Öª£¬£¬£¬£¬£¬£¬£¬Kelly Benefits´ú±í¶à¼ÒÊÜÓ°ÏìµÄ¿Í»§·¢³ö֪ͨ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Amergis¡¢Beam Benefits¡¢Beltway CompaniesµÈ¡£¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾ÏòÃåÒòÖÝ×ÜÉó²é³¤ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ӰÏìÁ˽ü264,000ÈË¡£¡£¡£¡£ ¡£¡£Ö»¹Ü´Ë¹«Ë¾¿ÉÄÜÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴κڿ͹¥»÷ÈÏÕæ¡£¡£¡£¡£ ¡£¡£¿£¿£¿ £Ë¼Á¿µ½ÊÂÎñ±¬·¢ÔÚ¼¸¸öÔÂǰ£¬£¬£¬£¬£¬£¬£¬ÈôÊǸù«Ë¾È·ÊµÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÄÇô¿ÉÄÜÒѾ­Ö§¸¶ÁËÊê½ðÒÔ×èÖ¹Êý¾Ýй¶µÄ½øÒ»²½¹ûÕæ¡£¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÔÚ½ÓÄɲ½·¥ÔöÇ¿ÆäÍøÂçÇå¾²·À»¤£¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâδÀ´±¬·¢ÀàËÆÊÂÎñ¡£¡£¡£¡£ ¡£¡£


https://www.securityweek.com/kelly-benefits-data-breach-impacts-260000-people/


4. Onsite Mammography³¬35ÍòÈËÐÅÏ¢Ôâй¶


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬ÂíÈøÖîÈûÖÝÒ½ÁÆÐ§ÀÍÌṩÉÌOnsite Mammography£¨ÒÔOnsite Women's HealthÆ·ÅÆÔËÓª£©¿ËÈÕ֪ͨÁè¼Ý35ÍòÈË£¬£¬£¬£¬£¬£¬£¬ÆäСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢ÔÚÊý¾Ýй¶ÖÐÔ⵽й¶¡£¡£¡£¡£ ¡£¡£¸ÃÊÂÎñÓÚ2024Äê10Ô·¢Ã÷£¬£¬£¬£¬£¬£¬£¬É漰δ¾­ÊÚȨ»á¼ûÔ±¹¤µÄµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊÕ¼þÏäÖеÄijЩµç×ÓÓʼþй¶ÁËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÊܱ£»£»£»£»¤µÄ¿µ½¡ÐÅÏ¢£¨PHI£©¡£¡£¡£¡£ ¡£¡£2025Äê2ÔÂÍê³ÉµÄ¶Ôй¶ÐÅÏ¢µÄÉó²éÈ·¶¨£¬£¬£¬£¬£¬£¬£¬ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂë¡¢ÐÅÓÿ¨ºÅÂëÒÔ¼°¾«ÉñºÍÉíÌ念½¡ÐÅÏ¢µÈ¾ùÔ⵽й¶¡£¡£¡£¡£ ¡£¡£OnsiteÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÊÓ²ì½øÒ»²½ÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸ÃÐÐΪÕßÖ»ÄÜ»á¼ûµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬£¬¶øÎÞ·¨»á¼ûÍøÂçÖеÄÈÎºÎÆäËûϵͳ¡£¡£¡£¡£ ¡£¡£¸ÃÒ½ÁÆÐ§ÀÍÌṩÉÌÒÑ֪ͨÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ£¬£¬£¬£¬£¬£¬£¬ÓÐ357,265Ãû»¼ÕßÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬²¢ÎªËûÃÇÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£ ¡£¡£OnsiteÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÀíÓÉÏàÐÅÈκÎÐÅÏ¢ÒòÕâÆðÊÂÎñ¶ø±»ÀÄÓûò½«±»ÀÄÓᣡ£¡£¡£ ¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬£¬OnsiteÁ¬Ã¦½ÓÄÉÁËÐж¯£¬£¬£¬£¬£¬£¬£¬Ô¼ÇëÁËÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬£¬£¬£¬Í¨ÖªÁËÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬½«¼ÌÐøÈ«Á¦Î¬»¤»¼ÕßµÄÒþ˽ºÍÊý¾ÝÇå¾²¡£¡£¡£¡£ ¡£¡£


https://www.securityweek.com/data-breach-at-onsite-mammography-impacts-350000/


5. WorkComposer¼à¿Ø¹¤¾ßʵʱй¶Êý°ÙÍòÃô¸Ð½ØÍ¼


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÓÃÓÚ¼àÊÓÔ±¹¤µÄ¼à¿Ø¹¤¾ßWorkComposerÕý½«Êý°ÙÍòÕÅʵʱ½ØÍ¼Ð¹Â¶µ½¿ª·ÅÍøÂç¡£¡£¡£¡£ ¡£¡£¸ÃÓ¦ÓÃÖ¼ÔÚͨ¹ý¼Í¼»î¶¯ºÍ½ØÈ¡ÆÁÄ»¿ìÕÕÀ´¸ú×ÙÊÂÇéЧÂÊ£¬£¬£¬£¬£¬£¬£¬È´½«Áè¼Ý2100ÍòÕÅͼƬ̻¶ÔÚ²»Çå¾²µÄAmazon S3´æ´¢Í°ÖУ¬£¬£¬£¬£¬£¬£¬ÖðÖ¡²¥·ÅÁËÔ±¹¤µÄÒ»Ñùƽ³£ÊÂÇé¡£¡£¡£¡£ ¡£¡£Ð¹Â¶Êý¾Ý¼«ÆäÃô¸Ð£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢ÄÚ²¿Ì¸Ìì¡¢ÉñÃØÉÌÒµÎļþµÄÈ«ÆÁ½ØÍ¼£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°µÇÂ¼Ò³Ãæ¡¢Æ¾Ö¤¡¢APIÃÜÔ¿µÈ¿ÉÄܱ»Ê¹ÓÃÀ´¹¥»÷È«ÇòÆóÒµµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ ¡£¡£´Ë´ÎйÃÜÊÂÎñ͹ÏÔÁ˵±»ù±¾Çå¾²²½·¥±»ºöÊÓʱ£¬£¬£¬£¬£¬£¬£¬Ê±¼ä¸ú×Ù¹¤¾ß½«±äµÃºÎµÈΣÏÕ£¬£¬£¬£¬£¬£¬£¬Ò»Ñùƽ³£ÊÂÇé»î¶¯Äð³ÉÁËÍøÂç·¸·¨·Ö×ӵĽð¿ó¡£¡£¡£¡£ ¡£¡£²¶»ñµÇÂ¼Ò³Ãæ¡¢µç×ÓÓʼþÊÕ¼þÏä¡¢ÄÚ²¿ÐÂÎÅÆ½Ì¨ºÍ²ÆÎñÎļþµÄÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÈÃÈËÏàʶ¹«Ë¾¼°ÆäÔ±¹¤µÄÄÚ²¿ÔË×÷ÇéÐΡ£¡£¡£¡£ ¡£¡£Ò»ÕÅ̻¶µÄÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬£¬£¬ÏÔʾ¿É¼ûµÄÃÜÂë¡¢APIÃÜÔ¿»òÃô¸Ð¶Ô»°£¬£¬£¬£¬£¬£¬£¬¿ÉÄܻᵼÖÂÆ¾Ö¤ÍµÇÔ¡¢ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÆóÒµÌØ¹¤»î¶¯¡£¡£¡£¡£ ¡£¡£×ß©µÄʵʱÐÔ·Å´óÁËΣÏÕ£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔËæÊ±¼à¿ØÕýÔÚÕö¿ªµÄÓªÒµÔËÓª£¬£¬£¬£¬£¬£¬£¬´Ó¶ø»á¼ûÔ­±¾Ëø¶¨µÄÇéÐΡ£¡£¡£¡£ ¡£¡£³ýÁËÖ±½ÓµÄÍøÂçÇ徲Σº¦Í⣬£¬£¬£¬£¬£¬£¬»¹±£´æÑÏÖØµÄÒþ˽ÇÖÕ¼ÎÊÌâ¡£¡£¡£¡£ ¡£¡£Ê±¼ä×·×Ù¹¤¾ßÔçÒÑÏÝÈëÆ·µÂµÄÄà̶£¬£¬£¬£¬£¬£¬£¬ËüÃÇ´ò×ÅÉú²úÁ¦µÄÆìÖÄ£¬£¬£¬£¬£¬£¬£¬×¼È·¼Í¼Ա¹¤µÄÿһ·ÖÖÓÊý×ÖÐÐΪ¡£¡£¡£¡£ ¡£¡£Ô±¹¤ÎÞ·¨¿ØÖÆÕâЩ½ØÍ¼×îÖÕ»á°üÀ¨ÄÄЩÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬Ò×Êܹ¥»÷µÄ²»µ«½öÊǹ«Ë¾Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐСÎÒ˽¼Ò¡£¡£¡£¡£ ¡£¡£


https://cybernews.com/security/employee-monitoring-app-leaks-millions-screenshots/


6. 2024ÄêÒÁÀÊÍþв×éÖ¯Õë¶ÔÒÔÉ«ÁеĶàά¶ÈÍøÂç¹¥»÷»î¶¯


4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬2024Ä꣬£¬£¬£¬£¬£¬£¬ÒÁÀÊÍþв×éÖ¯¶ÔÒÔÉ«ÁÐÕö¿ª¶àÂÖÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÊÖ·¨¶àÑùÇÒÒþ²Ø¡£¡£¡£¡£ ¡£¡£ÓëÒÁÀʽáÃ˵ÄÍþв×éÖ¯UNC2428ÔÚ10ÔÂÒÔÕÐÆ¸Îª»Ï×Ó£¬£¬£¬£¬£¬£¬£¬Í¨¹ý·ÂðÒÔÉ«Áйú·À³Ð°üÉÌÀ­ì³¶û£¨Rafael£©ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÎ±×°³É¡°ÇóÖ°¸¨Öú¹¤¾ß¡±µÄ¶ñÒâÈí¼þ¡°RafaelConnect.exe¡±£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þʵΪLONEFLEET×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬¿É¼¤»îMURKYTOURºóÃÅ£¬£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷Õß»ñµÃ¶ÔÊÜѬȾװ±¸µÄÒ»Á¬»á¼ûȨÏÞ¡£¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÒÁÀÊÍþв×éÖ¯ºÚÓ°£¨Black Shadow£©ÒÔ¹¥»÷ÒÔÉ«ÁжàÁìÓò¶øÖøÃû£¬£¬£¬£¬£¬£¬£¬Cyber Toufan×é֯ʹÓÃרÓвÁ³ýÆ÷POKYBLIGHT£¬£¬£¬£¬£¬£¬£¬UNC3313Ôòͨ¹ý´¹ÂÚ¹¥»÷¾ÙÐмàÊÓºÍÐÅÏ¢ÍøÂ磬£¬£¬£¬£¬£¬£¬²¢·Ö·¢JELLYBEANͶ·ÅÆ÷ºÍCANDYBOXºóÃÅ£¬£¬£¬£¬£¬£¬£¬ÀÄÓÃ9ÖÖÕýµ±Ô¶³Ì¼à¿Ø¹¤¾ß¹æ±Ü¼ì²â¡£¡£¡£¡£ ¡£¡£7Ô£¬£¬£¬£¬£¬£¬£¬ÒÉËÆÒÁÀÊÅä¾°µÄ¹¥»÷Õßαװ³ÉPalo Alto NetworksµÄGlobalProtectÔ¶³Ì»á¼ûÈí¼þ×°Öðü£¬£¬£¬£¬£¬£¬£¬ÆáºÚ°²ÅÅ.NETºóÃÅCACTUSPAL¡£¡£¡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬ÒÁÀÊÍþв×éÖ¯»¹Í¨¹ýÔÆ»ù´¡ÉèÊ©ÔöÇ¿Òþ²ØÐÔ£¬£¬£¬£¬£¬£¬£¬ÈçʹÓÃÆ´Ð´¹ýʧÓòÃû»ò¸´ÓÃÕýµ±ÓòÃûÍйÜC2½Úµã£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Î±Ôì×ÅÃû¹«Ë¾µÇÂ¼Ò³ÃæÇÔȡƾ֤¡£¡£¡£¡£ ¡£¡£MandiantÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬ÒÁÀÊÏà¹ØÍþв×éÖ¯½«Ò»Á¬µ÷½âÕ½ÊõÊÖ¶ÎÒÔ˳ӦĿ½ñÐÎÊÆ¡£¡£¡£¡£ ¡£¡£


https://thehackernews.com/2025/04/iran-linked-hackers-target-israel-with.html