Freedman HealthcareÔâWorld LeaksÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-06-19

1. Freedman HealthcareÔâWorld LeaksÀÕË÷Èí¼þ¹¥»÷


6ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÃÀ¹ú¿µ½¡Êý¾ÝÖÎÀíÈí¼þ¹«Ë¾Freedman HealthcareÔâÊÜÁËWorld LeaksµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬¸Ã¹¥»÷ÊÇÓÉHunter's International¿ª·¢µÄÀÕË÷Èí¼þÏîÄ¿¡£ ¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þ¼¯ÍÅÖÜÒ»ÔÚÆäÊܺ¦ÕßÒ³ÃæÉÏÐû³Æ¹¥»÷ÁËλÓÚÂíÈøÖîÈûÖݵÄFreedman Healthcare¡£ ¡£¡£¡£¡£Freedman HealthcareÓë¶þÊ®¶à¸öÖÝÕþ¸®¡¢¶à¸ö·ÇÓªÀû×éÖ¯ºÍ°ü¹Ü¹«Ë¾ÏàÖú£¬£¬£¬£¬£¬£¬ £¬Îª¶à¸öÖݵÄÖÝÁ¢¹«¹²ÎÀÉú²¿·ÖºÍÆäËû¹«¹²×ÊÖúÏîÄ¿Éè¼Æ¡¢ÊµÑéºÍά»¤×ÛºÏÊý¾Ýϵͳ£¬£¬£¬£¬£¬£¬ £¬Êý°ÙÍòÃÀ¹úÈ˵ÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢ÓÉÆä×ÛºÏÊý¾ÝÖÎÀíÆ½Ì¨´¦Öóͷ£¡£ ¡£¡£¡£¡£World LeaksÉù³Æ´Ó¸Ã¹«Ë¾Ð§ÀÍÆ÷ÇÔȡԼ52.4GBÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬Ô¼42204¸öÎļþ£¬£¬£¬£¬£¬£¬ £¬µ«×èÖ¹ÖÜÒ»ÍíÉÏÉÐδÉÏ´«ÎļþÑù±¾¡£ ¡£¡£¡£¡£ÆäÍøÕ¾µ¹¼ÆÊ±ÖÓÏÔʾ×îºóÏÞÆÚ²»µ½°ëÌ죬£¬£¬£¬£¬£¬ £¬ÒÉËÆÎªÖ§¸¶Êê½ðÒªÇó¡£ ¡£¡£¡£¡£ÈôFreedman Healthcare²»¸¶¿î£¬£¬£¬£¬£¬£¬ £¬World Leaks¿ÉÄÜÏñ֮ǰ¶Ô²»¿Ï̸ÅеÄÊܺ¦ÕßÒ»Ñù£¬£¬£¬£¬£¬£¬ £¬ÔÚÆäйÃÜÍøÕ¾Ðû²¼±»µÁÊý¾Ý¡£ ¡£¡£¡£¡£


https://cybernews.com/news/freedman-healthcare-ransomware-attack-data-27-state-public-health-departments/


2. Ò½ÁÆÐ§À͹«Ë¾EpisourceÊý¾Ýй¶ӰÏì540ÍòÈË


6ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬Ò½ÁƱ£½¡¹«Ë¾EpisourceÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬£¬£¬ £¬Áè¼Ý540ÍòÈ˵ÄСÎÒ˽¼ÒºÍ¿µ½¡Êý¾Ýй¶¡£ ¡£¡£¡£¡£EpisourceÊÇÒ»¼ÒÃÀ¹úÒ½ÁÆÐ§ÀͺÍÊÖÒÕ¹«Ë¾£¬£¬£¬£¬£¬£¬ £¬Ö÷ҪΪÔÚMedicare Advantage¡¢MedicaidºÍACAÊг¡ÔËÓªµÄ¿µ½¡ÍýÏëºÍÒ½ÁƱ£½¡×éÖ¯ÌṩΣº¦µ÷½âЧÀÍ¡¢ÁÙ´²Êý¾ÝÆÊÎöºÍÒ½ÁƼͼÉó²é½â¾ö¼Æ»®¡£ ¡£¡£¡£¡£2025Äê2ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ £¬Episource¼ì²âµ½ÆäϵͳÖб£´æ¿ÉÒɻ£¬£¬£¬£¬£¬£¬ £¬¾­ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬ £¬ÔÚ1ÔÂ27ÈÕÖÁ2ÔÂ6ÈÕʱ´ú£¬£¬£¬£¬£¬£¬ £¬Ò»ÃûÍþвÐÐΪÕß»á¼û²¢¸´ÖÆÁËÊý¾Ý¡£ ¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ £¬EpisourceѸËٹرÕϵͳ£¬£¬£¬£¬£¬£¬ £¬Ô¼Çëר¼ÒÍŶÓЭÖúÊӲ죬£¬£¬£¬£¬£¬ £¬²¢ÁªÏµÁËÖ´·¨²¿·Ö¡£ ¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ £¬ÉÐδ·¢Ã÷Êý¾Ý±»ÀÄÓõı¨¸æ¡£ ¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÒòÈ˶øÒ죬£¬£¬£¬£¬£¬ £¬¿ÉÄܺ­¸ÇÁªÏµ·½·¨£¨ÈçÐÕÃû¡¢µØµã¡¢µç»°ºÅÂëºÍµç×ÓÓʼþ£©¡¢¿µ½¡°ü¹ÜÐÅÏ¢£¨È翵½¡ÍýÏë/±£µ¥¡¢°ü¹Ü¹«Ë¾¡¢»áÔ±/ÕûÌåIDºÅµÈ£©¡¢Ò½ÁƼͼ£¨È粡ÀúºÅ¡¢Ò½Éú¡¢Õï¶Ï¡¢Ò©ÎïµÈ£©£¬£¬£¬£¬£¬£¬ £¬ÔÚÓÐÏÞÇéÐÎÏ»¹°üÀ¨Éç»áÇå¾²ºÅÂë»ò³öÉúÈÕÆÚ¡£ ¡£¡£¡£¡£Episource×Ô4ÔÂ23ÈÕÆð×îÏÈ֪ͨ¿Í»§¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼ÒºÍÏêϸÊý¾Ý¡£ ¡£¡£¡£¡£Ö»¹Ü²ÆÎñÊý¾Ý»ù±¾Î´ÊÜÓ°Ï죬£¬£¬£¬£¬£¬ £¬µ«EpisourceÈÔ½¨ÒéСÎÒ˽¼Ò¼à¿Ø¿µ½¡¡¢²ÆÎñºÍ˰Îñ¼Í¼ÖеĿÉÒɻ£¬£¬£¬£¬£¬£¬ £¬²¢ÊµÊ±ÏòÏà¹Ø»ú¹¹±¨¸æÒì³£ÇéÐΡ£ ¡£¡£¡£¡£


https://securityaffairs.com/179115/data-breach/healthcare-services-company-episource-data-breach-impacts-5-4-million-people.html


3. Ç×ÒÔºÚ¿Í¡°ÂÓʳÂéȸ¡±ÇÔÈ¡²¢Ïú»ÙNobitex³¬9000ÍòÃÀÔª¼ÓÃÜÇ®±Ò


6ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬Ç×ÒÔÉ«Áеġ°ÂÓʳÂéȸ¡±£¨Predatory Sparrow£©ºÚ¿Í×éÖ¯¶ÔÒÁÀÊ×î´óµÄ¼ÓÃÜÇ®±ÒÉúÒâËùNobitex·¢¶¯ÁËÒ»´Î³öÓÚÕþÖÎÄîÍ·µÄÍøÂç¹¥»÷¡£ ¡£¡£¡£¡£NobitexÓÚÃÀ¹ú¶«²¿Ê±¼äÆÆÏþ2:24Ê×´ÎÔÚXÉϱ¨¸æÁ˴˴ι¥»÷£¬£¬£¬£¬£¬£¬ £¬ÆäÊÖÒÕÍŶӼì²âµ½²¿·Ö±¨¸æ»ù´¡ÉèÊ©ºÍÈÈÇ®°ü±»Î´¾­ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬ £¬Ëæ¼´ÔÝÍ£ËùÓлá¼û£¬£¬£¬£¬£¬£¬ £¬ÄÚ²¿Çå¾²ÍŶÓÕö¿ªÊӲ졣 ¡£¡£¡£¡£²»¾Ãºó£¬£¬£¬£¬£¬£¬ £¬Predatory Sparrowͨ¹ýÆäGonjeshke Darande XÕË»§Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬ £¬²¢ÍþвÐû²¼Nobitex±»µÁµÄÔ´´úÂëºÍÄÚ²¿ÐÅÏ¢¡£ ¡£¡£¡£¡£¾ÝÇø¿éÁ´ÆÊÎö¹«Ë¾Elliptic±¨¸æ£¬£¬£¬£¬£¬£¬ £¬Áè¼Ý9000ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò´ÓNobitexÇ®°üÖб»µÁ£¬£¬£¬£¬£¬£¬ £¬µ«ºÚ¿Í²¢Î´ÊÔͼ¾ÝΪ¼ºÓУ¬£¬£¬£¬£¬£¬ £¬¶øÊǽ«ÏÕЩËùÓмÓÃÜÇ®±Ò·¢Ë͵½Ç¶ÈëÁË·´ÒÁ˹À¼¹²ºÍ¹úÎÀ¶Ó£¨IRGC£©ÐÅÏ¢µÄÐéÈٵص㣬£¬£¬£¬£¬£¬ £¬ÕâЩµØµãÐèÒª´ó×ÚÅÌËãÄÜÁ¦²Å»ªÌìÉú£¬£¬£¬£¬£¬£¬ £¬ÇÒ½¨ÉèÔÆÔÆ³¤µÄ×Ö·û´®Ãû³ÆÔÚÅÌËãÉϲ»¿ÉÐУ¬£¬£¬£¬£¬£¬ £¬Òâζןڿ;ÓÐÄÏú»ÙÁ˼ÓÃÜÇ®±Ò£¬£¬£¬£¬£¬£¬ £¬Ê¹ÆäÎÞ·¨±»Ôٴλá¼û¡£ ¡£¡£¡£¡£EllipticÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬´Ë´ÎºÚ¿Í¹¥»÷²¢·Ç³öÓÚ¾­¼ÃÄîÍ·¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬EllipticµÄÊÓ²ìÏÔʾNobitexÓëÒÁÀʸïÃüÎÀ¶ÓºÍÒÁÀÊÏòµ¼²ãÓÐÁªÏµ£¬£¬£¬£¬£¬£¬ £¬ÆäËûÑо¿Ö°Ô±Ò²Ôø½«¸ÃÉúÒâËùÓëÒÁÀÊ×î¸ßÊ×ÄÔÖ§Êô¡¢¸ïÃüÎÀ¶ÓÁ¥ÊôÉÌÒµÀûÒæ¼¯Íż°ÊÜÖÆ²ÃСÎÒ˽¼ÒÁªÏµÆðÀ´£¬£¬£¬£¬£¬£¬ £¬ÕâЩÈ˾ݱ¨µÀʹÓÃNobitex×ªÒÆÀÕË÷Èí¼þ²Ù×÷±¬·¢µÄ×ʽð¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/


4. ¶íÏÖÊ×Àý±¾ÍÁ»¯NFCÊý¾ÝÇÔÈ¡¹¥»÷£¬£¬£¬£¬£¬£¬ £¬SuperCard¶ñÒâÈí¼þÏÖÉí


6ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ £¬¶íÂÞË¹ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ê×Àý±¾ÍÁ»¯Êý¾ÝÇÔÈ¡¹¥»÷£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßʹÓþ­¸Ä¶¯µÄ½ü³¡Í¨Ñ¶£¨NFC£©Õýµ±Èí¼þʵÑé·¸·¨£¬£¬£¬£¬£¬£¬ £¬Õâ»òΪ¸üÆÕ±é¹¥»÷»î¶¯µÄ²âÊԽ׶Ρ£ ¡£¡£¡£¡£´Ë´Î¹¥»÷Éæ¼°µÄ¶ñÒâÈí¼þΪSuperCard£¬£¬£¬£¬£¬£¬ £¬ËüÊÇ´ËǰÒÑÖªÕýµ±Èí¼þNFCGateµÄ±äÖÖ¡£ ¡£¡£¡£¡£NFCGateÔ­±¾ÓÃÓÚÔÚÏà½ü×°±¸¼äÖм̴«ÊäNFCÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬µ«³£±»ÍøÂç·¸·¨·Ö×ÓÀÄÓÃÒÔÍµÈ¡ÒøÐÐ×ʽð¡£ ¡£¡£¡£¡£ÔÚÏÈǰÕë¶ÔÅ·ÖÞÒøÐеÄSuperCard¹¥»÷ÖУ¬£¬£¬£¬£¬£¬ £¬ºÚ¿Íͨ¹ý±»ÈëÇֵݲ׿ÊÖ»ú£¬£¬£¬£¬£¬£¬ £¬½«Êܺ¦ÕßʵÌåÖ§¸¶¿¨Êý¾ÝÖм̴«ÊäÖÁ¹¥»÷Õß¿ØÖƵÄ×°±¸£¬£¬£¬£¬£¬£¬ £¬½ø¶øÊµÑéATMÉúÒâ»òÖ±½Ó×ªÒÆÕË»§×ʽð¡£ ¡£¡£¡£¡£ÄªË¹¿ÆÍøÂçÇå¾²¹«Ë¾F6ÔÚ6ÔÂ17Èյı¨¸æÖÐÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬SuperCardÓÚ2025Äê5ÔÂÊ×´ÎÔÚ¶íÂÞ˹¾³ÄÚÕë¶Ô°²×¿Óû§°²ÅÅ£¬£¬£¬£¬£¬£¬ £¬¶ø¸Ã¶ñÒâÈí¼þ×î³õÓÚͬÄê4ÔÂÔÚÒâ´óÀû±»·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬ÆäʱÒâ´óÀûÇå¾²¹«Ë¾CleafyÅû¶ÆäÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©ÐÎʽ·Ö·¢£¬£¬£¬£¬£¬£¬ £¬ÓÉ¡°ÖÐÎÄʹÓÃÕß¡±²Ù×÷¡£ ¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÓÕÆ­Êܺ¦ÕßÏÂÔØÎ±×°³ÉÕýµ±Ó¦ÓõÄSuperCard£¬£¬£¬£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þÄÜʶ±ðÊܺ¦ÕßʹÓõÄÖ§¸¶ÏµÍ³£¬£¬£¬£¬£¬£¬ £¬½ø¶øÖ§³Ö·¸·¨·Ö×ÓʵÑéڲƭÉúÒâ¡£ ¡£¡£¡£¡£ÓëÒÔÍù»ùÓÚNFCGateµÄ¶ñÒâÈí¼þ²î±ð£¬£¬£¬£¬£¬£¬ £¬SuperCard½ÓÄÉÉÌÒµ»¯·Ö·¢Õ½ÂÔ£¬£¬£¬£¬£¬£¬ £¬Ê×´Îͨ¹ýTelegramÖÐÎÄÆµµÀ¹ûÕæÍÆ¹ã£¬£¬£¬£¬£¬£¬ £¬½ÓÄɶ©ÔÄÖÆÏúÊÛ²¢Ìṩ¿Í»§Ö§³Ö£¬£¬£¬£¬£¬£¬ £¬¹ã¸æÐû³Æ¿ÉÕë¶ÔÃÀ¹ú¡¢°Ä´óÀûÑǼ°Å·ÖÞÖ÷ÒªÒøÐеĿͻ§¡£ ¡£¡£¡£¡£


https://therecord.media/supercard-nfc-banking-malware-russia


5. ³¯ÏÊBlueNoroff×éÖ¯½èZoomÉî¶ÈαÔìÈö²¥macOS¶ñÒâÈí¼þ


6ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬HuntressÑо¿Ö°Ô±ÔÚÊÓ²ìÏàÖúͬ°éÍøÂç¿ÉÄÜÔâÊܵÄÈëÇÖʱ£¬£¬£¬£¬£¬£¬ £¬·¢Ã÷³¯Ïʸ߼¶Ò»Á¬ÐÔÍþв×éÖ¯BlueNoroff£¨ÓÖÃûSapphire Sleet»òTA444£©ÌᳫµÄÒ»´Îй¥»÷¡£ ¡£¡£¡£¡£¸Ã×éÖ¯ÒÔʹÓÃWindowsºÍMac¶ñÒâÈí¼þ¾ÙÐмÓÃÜÇ®±Ò͵ÇÔ¹¥»÷Öø³Æ£¬£¬£¬£¬£¬£¬ £¬´Ë´Î¹¥»÷Ä¿µÄºÜ¿ÉÄÜÊÇ͵ÇÔ¼ÓÃÜÇ®±Ò¡£ ¡£¡£¡£¡£¹¥»÷Õßͨ¹ýTelegram¼Ù°çÍⲿרҵÈËÊ¿£¬£¬£¬£¬£¬£¬ £¬ÏòÒ»¼Ò¿Æ¼¼¹«Ë¾Ô±¹¤·¢ËͰüÀ¨ÐéαZoomÓòµÄCalendlyÁ´½Ó£¬£¬£¬£¬£¬£¬ £¬ÓÕʹÆä¼ÓÈë¾Û»á¡£ ¡£¡£¡£¡£»£»£»£»£»£¾Û»áÖаüÀ¨Éî¶ÈαÔìµÄ¹«Ë¾¸ß²ãÏòµ¼ºÍÍⲿ¼ÓÈëÕßÊÓÆµ£¬£¬£¬£¬£¬£¬ £¬ÒÔÔöÌí¿ÉÐŶÈ¡£ ¡£¡£¡£¡£Ê±´ú£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÒÔÂó¿Ë·ç¹ÊÕÏΪÓÉ£¬£¬£¬£¬£¬£¬ £¬Ö¸µ¼Êܺ¦ÕßÏÂÔØËùνµÄZoomÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬ £¬ÊµÎª¶ñÒâAppleScriptÎļþ¡£ ¡£¡£¡£¡£¸ÃÎļþÔÚÆÊÎö´ó×Ú¿ÕȱÐк󣬣¬£¬£¬£¬£¬ £¬Ö´ÐжñÒâÏÂÁ£¬£¬£¬£¬£¬ £¬´ÓÍⲿȪԴÏÂÔØ²¢Ö´Ðи¨ÖúÓÐÓÃÔØºÉ¡£ ¡£¡£¡£¡£HuntressÔÚÊÓ²ìʱ·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬×îÖÕÓÐÓÃÔØºÉËäÒѱ»ÌáÈ¡£¬£¬£¬£¬£¬£¬ £¬µ«ÔÚVirusTotalÉÏÕÒµ½ÁËÒ»¸ö°æ±¾£¬£¬£¬£¬£¬£¬ £¬ÌṩÁËÏßË÷¡£ ¡£¡£¡£¡£¸Ã¾ç±¾»á½ûÓÃbashÀúÊ·¼Í¼£¬£¬£¬£¬£¬£¬ £¬¼ì²é²¢×°ÖÃRosetta 2ÒÔÈ·±£x86_64¸ºÔØÔËÐУ¬£¬£¬£¬£¬£¬ £¬»¹»á½¨ÉèÒþ²ØÎļþ²¢ÏÂÔØ¸ºÔØ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ±»ÈëÇÖÖ÷»úÉÏ·¢Ã÷Á˰˸ö²î±ðµÄ¶ñÒâ¶þ½øÖÆÎļþ¡£ ¡£¡£¡£¡£´Ë´Î¹¥»÷·´Ó¦ÁËBlueNoroffÈÕÒæÔöÌíµÄÖØ´óÐÔ£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃAIÉî¶ÈαÔì¾ÙÐÐÉç»á¹¤³ÌºÍ¶¨ÖÆmacOS¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-deepfake-execs-in-zoom-call-to-spread-mac-malware/


6. GitHub¶ñÒâÄ£×éÉøÍ¸¡¶ÎÒµÄÌìÏ¡·£¬£¬£¬£¬£¬£¬ £¬³¬1500ÃûÍæ¼ÒÖÐÕÐ


6ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬Check Point¹«Ë¾Ñо¿Ö°Ô±·¢Ã÷Ò»³¡Õë¶Ô¡¶ÎÒµÄÌìÏ¡·Íæ¼ÒµÄ¶à½×¶Î¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬£¬ £¬¸Ã»î¶¯Ê¹Óá°Stargazers Ghost Network¡±ÕâÒ»·Ö·¢¼´Ð§ÀÍ£¨DaaS£©Æ½Ì¨£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓûùÓÚJavaµÄ¶ñÒâÈí¼þÈö²¥¡£ ¡£¡£¡£¡£¶ñÒâÈí¼þð³ä¡°¾ç±¾ºÍºê¹¤¾ß¡±£¨×÷±×¹¤¾ß£©OringoºÍTaunahi£¬£¬£¬£¬£¬£¬ £¬µÚÒ»ºÍµÚ¶þ½×¶Î¶ñÒâ³ÌÐò¾ùÓÃJava¿ª·¢£¬£¬£¬£¬£¬£¬ £¬ÐèÔÚ×°Öá¶ÎÒµÄÌìÏ¡·ÔËÐÐÇéÐεÄÖ÷»úÉÏÖ´ÐС£ ¡£¡£¡£¡£¹¥»÷×îÖÕÄ¿µÄÊÇÓÕÆ­Íæ¼Ò´ÓGitHubÏÂÔØ¡¶ÎÒµÄÌìÏ¡·Ä£×飬£¬£¬£¬£¬£¬ £¬½ø¶øÍ¶·Å¾ßÓÐÖÜÈ«Êý¾ÝÇÔÈ¡ÄÜÁ¦µÄ.NETÐÅÏ¢ÇÔÈ¡³ÌÐò¡£ ¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÊýǧ¸öGitHubÕÊ»§½¨Éè±»ÎÛȾµÄ´úÂë¿ÍÕ»£¬£¬£¬£¬£¬£¬ £¬Î±×°³ÉÆÆ½âÈí¼þºÍÓÎÏ·×÷±×¹¤¾ß¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±±ê¼ÇÔ¼500¸öGitHub¿ÍÕ»£¬£¬£¬£¬£¬£¬ £¬ÊӲ쵽Լ70¸öÕÊ»§±¬·¢700¸öµãÔÞ¡£ ¡£¡£¡£¡£Î±×°³ÉÄ£×éµÄ¶ñÒâ¿ÍÕ»»áͶ·Åδ±»·À²¡¶¾ÒýÇæ¼ì²âµ½µÄJava¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬ £¬ÊµÑé·´ÐéÄâ»úºÍ·´ÆÊÎöÊÖÒÕ£¬£¬£¬£¬£¬£¬ £¬Ö÷ҪĿµÄÊÇÏÂÔØ²¢ÔËÐеڶþ½×¶ÎÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬ £¬×îÖÕ»ñÈ¡²¢Ö´ÐÐ.NETÇÔÈ¡³ÌÐò×÷ΪÓÐÓÃÔØºÉ¡£ ¡£¡£¡£¡£.NETÇÔÈ¡³ÌÐòÄÜ´Óä¯ÀÀÆ÷ÇÔȡƾ֤£¬£¬£¬£¬£¬£¬ £¬ÍøÂçÎļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬²¢½ØÈ¡ÆÁÄ»½ØÍ¼µÈ£¬£¬£¬£¬£¬£¬ £¬²¶»ñÐÅϢͨ¹ýDiscordµÄWebhook´«Ê仨¹¥»÷Õß¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÏÓÒɻÓɶíÓïÍþвÐÐΪÕßÌᳫ£¬£¬£¬£¬£¬£¬ £¬Ô¤¼Æ³¬1500̨װ±¸Êܺ¦¡£ ¡£¡£¡£¡£


https://thehackernews.com/2025/06/1500-minecraft-players-infected-by-java.html