DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
Ðû²¼Ê±¼ä 2025-07-101. DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Trellix¸ß¼¶Ñо¿ÖÐÐÄÅû¶һÆðÕë¶ÔÅ·ÖÞÍâ½»»ú¹¹µÄ¶¨ÏòÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Æä±³ºóÒÉËÆÉæ¼°Ó¡¶ÈÅä¾°µÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯DoNot Team£¨±ð³ÆAPT-C-35µÈ£©¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2016ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬£¬£¬£¬£¬ÒÔ¶¨ÖÆ»¯Windows¶ñÒâÈí¼þ£¨ÈçYTY¡¢GEditºóÃÅ£©Á¬ÏµÓã²æÊ½´¹ÂÚÓʼþΪÖ÷Òª¹¥»÷ÊֶΣ¬£¬£¬£¬£¬£¬£¬ºã¾ÃÕë¶ÔÕþ¸®¡¢Íâ½»¡¢¹ú·À¼°·ÇÕþ¸®×éÖ¯Õö¿ªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÇøÓò´Ëǰ¼¯ÖÐÓÚÄÏÑÇ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊ×´ÎÈ·ÈÏÆä¶ÔÅ·ÖÞÍâ½»ÁìÓòµÄÀ©ÕÅÐÔÉøÍ¸¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Á´Ê¼ÓÚαװ³ÉÒâ´óÀûפÃϼÓÀ¹ú¹ú·ÀÎä¹Ù»á¼ûÐг̵Ĵ¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýGmailÕË»§·¢ËÍUTF-8±àÂëµÄHTMLÃûÌÃÓʼþ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÌØÊâ×Ö·û£¨Èç·¨Óï"Attach¨¦"£©ÔöÇ¿¿ÉÐŶȣ¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Ä¿µÄµã»÷GoogleÔÆ¶ËÓ²ÅÌÁ´½ÓÏÂÔØRARѹËõ°ü¡£¡£¡£¡£¡£Ñ¹Ëõ°üÄÚº¬Î±×°ÎªPDFÎĵµµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬Êܺ¦Õß·¿ªºó½«´¥·¢LoptikModÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¸ÃľÂíͨ¹ýÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯×¤Áô£¬£¬£¬£¬£¬£¬£¬¾ß±¸ÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢ÎüÊÕÔ¶³ÌÖ¸Áî¡¢ÏÂÔØ¸½¼ÓÄ£¿£¿£¿£¿£¿£¿éµÈ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬²¢½ÓÄÉ·´ÐéÄâ»úÊÖÒÕºÍASCII»ìÏýÊÖÒÕ¹æ±ÜÇå¾²ÆÊÎö£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Í¨¹ýµ¥ÊµÀýÔËÐлúÖÆ×èÖ¹³åÍ»¡£¡£¡£¡£¡£
https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html
2. ÈÕ±¾ÐÂÈÕÌú×Ó¹«Ë¾ÔâÁãÈÕ¹¥»÷ÖÂÊý¾Ýй¶
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾ÐÂÈÕÌú¼¯ÍÅÆìÏÂ×Ó¹«Ë¾ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾£¨Nippon Steel Solutions£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃδ¹ûÕæµÄÁãÈÕÎó²îÇÖÈëÆäÄÚ²¿ÍøÂ磬£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¡¢ÏàÖúͬ°é¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¡£¡£¸Ã¹«Ë¾×¨×¢ÓÚÔÆÐ§ÀÍÓëÍøÂçÇå¾²½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒòÆäÊÖÒÕÅä¾°¶ø±¸ÊܹØ×¢¡£¡£¡£¡£¡£2025Äê3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾¼à²âµ½Ð§ÀÍÆ÷Òì³£»£»£»î¶¯£¬£¬£¬£¬£¬£¬£¬Ëæ¼´¸ôÀëÊÜÓ°Ïìϵͳ¡£¡£¡£¡£¡£¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÕë¶ÔÍøÂç×°±¸µÄÁãÈÕÎó²îʵÑéÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ôì³ÉÄÚ²¿ÍøÂçδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬£¬²¿·ÖÃô¸ÐÊý¾Ý¿ÉÄܱ»ÇÔÈ¡¡£¡£¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ç¿µ÷ÆäÔÆÐ§ÀÍÆ½Ì¨Î´Êܲ¨¼°£¬£¬£¬£¬£¬£¬£¬ÓªÒµÒ»Á¬ÐÔδÊÜÖ±½ÓÓ°Ïì¡£¡£¡£¡£¡£Æ¾Ö¤Í¨¸æ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º¸ÇÈýÀàÖ÷Ì壺¿Í»§Êý¾Ý°üÀ¨ÐÕÃû¡¢¹«Ë¾Ãû³Æ¡¢ËùÊô»ú¹¹¡¢Ö°Î»¡¢µØµã¡¢ÓÊÏä¼°µç»°£»£»£»ÏàÖúͬ°éÐÅÏ¢Éæ¼°ÐÕÃû¼°¹«Ë¾ÓòÃûÓÊÏ䣻£»£»Ô±¹¤Êý¾ÝÔò°üÀ¨ÐÕÃû¡¢²¿·Ö¡¢Ö°Î»¼°ÆóÒµÓÊÏä¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢ÕâЩÐÅÏ¢ÒÑͨ¹ýÉ罻ýÌå»ò°µÍøÀ©É¢£¬£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÈÔ¾¯Ê¾Óû§Ð¡ÐÄ¿ÉÒÉͨѶ£¬£¬£¬£¬£¬£¬£¬×èÖ¹µã»÷²»Ã÷Á´½Ó»ò»Ø¸´ÉúÊèÀ´µç¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÒÑÍê³ÉÄÚ²¿ÍøÂçÇå¾²»Ö¸´£¬£¬£¬£¬£¬£¬£¬²¢Ïò¾¯·½¼°ÈÕ±¾Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»£»£»¤Î¯Ô±»áÌá½»±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÍÆÐз¨¶¨Åû¶ÒåÎñ¡£¡£¡£¡£¡£
https://securityaffairs.com/179766/data-breach/nippon-steel-solutions-data-breach.html
3. ÃÀ¹ú¼ÓÃÜATM¾ÞÍ·Bitcoin DepotÔâÓöÊý¾Ýй¶
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin Depot¿ËÈÕÅû¶һÆðÓ°Ïì2.7Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Í¨¹ýÐżþ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬£¬£¬£¬£¬ÊÂÎñ¿É×·ËÝÖÁ2024Äê6ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬ÆäÍøÂçÊ״μì²âµ½¿ÉÒɻ£¬£¬£¬£¬£¬£¬£¬µ«ÒòÁª°îÖ´·¨»ú¹¹ÒªÇóÅäºÏÊӲ죬£¬£¬£¬£¬£¬£¬Ö±ÖÁ7ÔÂ18ÈÕÄÚ²¿ÊÓ²ìÍê³Éºó·½ÄÜÆô¶¯Åû¶³ÌÐò¡£¡£¡£¡£¡£Æ¾Ö¤Í¨¸æ£¬£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄ¹¥»÷Õß»ñÈ¡Á˲¿·Ö¿Í»§ÔÚKYCÑéÖ¤Àú³ÌÖÐÌá½»µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¼°µç×ÓÓÊÏäµÈ¡£¡£¡£¡£¡£Bitcoin DepotÔÚÈ«ÃÀ¡¢¼ÓÄô󼰰ĴóÀûÑÇÔËÓª×Å8800̨װ±¸£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°¹æÄ£ÆÕ±é¡£¡£¡£¡£¡£ÓÉÓÚ¼ÓÃÜÇ®±ÒÉúÒâµÄÄäÃûÐÔÓë×ʽð¿ìËÙÁ÷×ªÌØÕ÷£¬£¬£¬£¬£¬£¬£¬¹Å°å½ðÈÚÁìÓòµÄÉí·Ý¼à¿ØÓë·ÀµÁЧÀÍÔڴ˳¡¾°ÖÐÄÑÒÔʵÑé¡£¡£¡£¡£¡£Bitcoin DepotÃ÷È·ÌåÏÖÎÞ·¨ÎªÊÜÓ°ÏìÓû§ÌṩÐÅÓñ£»£»£»¤»òÉí·Ý¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬×ª¶ø½¨ÒéÓû§×Ô¶¯¼à¿ØÕË»§Òì³£ÉúÒâ¡¢¶³½áÐÅÓñ¨¸æ²¢Ð¡ÐÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/
4. ÃÀ¹ú˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerboxй¶24.5ÍòÌõÃô¸ÐÊý¾Ý
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úµÃ¿ËÈøË¹ÖÝ˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerbox¿ËÈÕÒòδÉèÃÜÂë±£»£»£»¤µÄÊý¾Ý¿â̻¶£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ245,949Ìõ¡¢×ܼÆ286.9GBµÄÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬º¸ÇÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢µØµã¡¢¼ÝʻִÕÕ¼°ÍËÎéÎäÊ¿DD214ÎļþµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷²¢±¨¸æÖÁvpnMentor¡£¡£¡£¡£¡£×÷ΪרעÓÚ¹ÍÖ÷˰ÊÕ¼¤ÀøÍýÏ루ÈçWOTC¡¢ERTCµÈ£©µÄЧÀÍÉÌ£¬£¬£¬£¬£¬£¬£¬RockerboxΪ²ÍÒû¡¢Âùݡ¢Ò½ÁƵȶà¸öÐÐÒµµÄÆóÒµÌṩ˰ÎñÓÅ»¯Ö§³Ö£¬£¬£¬£¬£¬£¬£¬Æäй¶µÄ¿Í»§Êý¾ÝÉæ¼°ÖØ´óµÄ²ÆÎñÓëСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£³ýÖ±½Ó´æ´¢µÄPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©Í⣬£¬£¬£¬£¬£¬£¬´ó×Ú˰ÊÕµÖÃâÉêÇëÎļþ¡¢Åú×¼/¾Ü¾øº¯¼°ÃÜÂë±£»£»£»¤PDFµÄÎļþÃûÒ²Ôâ̻¶£¬£¬£¬£¬£¬£¬£¬²¿·ÖÎļþÃû¿ÉÄÜÒþº¬ÃÜÂëÏßË÷£¬£¬£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÐÅÏ¢ÀÄÓÃΣº¦¡£¡£¡£¡£¡£FowlerÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ¼°½ðÈÚڲƣ¬£¬£¬£¬£¬£¬£¬¶ÔÊÜÓ°ÏìСÎÒ˽¼Ò×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£ÊÂÎñ̻¶ºó£¬£¬£¬£¬£¬£¬£¬FowlerÁ¬Ã¦Í¨ÖªRockerbox£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´×÷³öÕýʽ»ØÓ¦£¬£¬£¬£¬£¬£¬£¬Êý¾Ý¿âÔÚÊýÈÕºó²Å±»¼ÓÃܱ£»£»£»¤¡£¡£¡£¡£¡£
https://hackread.com/rockerbox-server-tax-firm-exposed-sensitive-records/
5. AnatsaÒÆ¶¯¶ñÒâÈí¼þÔٴι¥»÷±±ÃÀÒøÐпͻ§
7ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±È·ÈÏ£¬£¬£¬£¬£¬£¬£¬ºã¾Ã»îÔ¾µÄAndroidÒøÐÐľÂíAnatsa½üÆÚÕë¶Ô±±ÃÀ½ðÈÚ»ú¹¹ÌᳫÐÂÒ»ÂÖ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ºÉÀ¼ThreatFabric¹«Ë¾×·×ÙÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÕâÒÑÊÇÆäÖÁÉÙµÚÈý´Î½«ÃÀ¹úÓë¼ÓÄôóÒÆ¶¯ÒøÐÐÓû§ÁÐΪĿµÄ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼Í¼¼üÅÌÊäÈ뼰ͨ¹ýÔ¶³Ì¿ØÖÆÖ±½ÓʵÑéÚ²ÆÉúÒâµÄÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÆäÁ½½×¶Î¹¥»÷ģʽÒý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¡£¡£±¾´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈÔÚÓ¦ÓÃÊÐËÁÉϼܿ´ËÆÕýµ±µÄ¹¤¾ßÀàÓ¦Óã¨ÈçÎļþÔĶÁÆ÷£©£¬£¬£¬£¬£¬£¬£¬³õÆÚ¹¦Ð§Õý³£ÒÔ»ýÀÛÓû§ÐÅÈΡ£¡£¡£¡£¡£´ýÏÂÔØÁ¿µÖ´ïÊýÍò´Îºó£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¸üÐÂ×¢Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬½«Anatsa×÷Ϊ×ÔÁ¦³ÌÐò×°ÖÃÖÁ×°±¸¡£¡£¡£¡£¡£ÒÔ±¾´Î°¸ÀýΪÀý£¬£¬£¬£¬£¬£¬£¬Ò»¿îÎļþÔĶÁÆ÷Ó¦ÓÃÔÚ6ÔÂ24ÈÕÖÁ30ÈÕʱ´úÍÆË͸üУ¬£¬£¬£¬£¬£¬£¬Ï¼ÜǰÒÑÔÚÃÀ¹úPlayÊÐËÁÃâ·Ñ¹¤¾ß°ñѹµ¹Ò»ÇУ¬£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬5Íò´Î¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬Anatsa´Ë´Î¹¥»÷Ä¿µÄÇåµ¥ÏÔÖøÀ©Õ¹£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÁ˸üÆÕ±éµÄÃÀ¹úÒÆ¶¯ÒøÐÐÓ¦Óᣡ£¡£¡£¡£
https://therecord.media/anatsa-android-banking-malware-returns-north-america
6. FlirtAIÔ¼»áÖúÊÖÒòδÊܱ£»£»£»¤Ôƴ洢й¶16ÍòÕÅ˽ÃܽØÍ¼
7ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬µÂ¹ú°ØÁÖ¹«Ë¾Buddy Network GmbH¿ª·¢µÄiOSÓ¦ÓÃFlirtAI¿ËÈÕÒòÔÆ´æ´¢Çå¾²Îó²îÒý·¢ÑÏÖØÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬³¬16ÍòÕÅÓû§ÉÏ´«µÄ˽ÃÜ̸Ìì½ØÍ¼Ì»Â¶ÓÚ¹«¹²»¥ÁªÍø¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÖ÷´òAI¸¨ÖúÉç½»¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Óû§ÐèÊÖ¶¯½ØÈ¡Ô¼»áÈí¼þ¶Ô»°»òСÎÒ˽¼Ò×ÊÁϽçÃæ²¢ÉÏ´«£¬£¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡ÎåÌõ¶¨Öƻظ´½¨Òé¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Æä¹È¸èÔÆ´æ´¢Í°Î´ÉèÖûá¼ûȨÏÞ¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÊý¾Ýºã¾ÃÂã¶¡£¡£¡£¡£¡£Êý¾ÝÏÔʾÇàÉÙÄêÓû§Õ¼±ÈÏÔÖø£¬£¬£¬£¬£¬£¬£¬ÆäÉÏ´«µÄ½ØÍ¼°üÀ¨Í¬ÁäÈË˽ÃܶԻ°£¬£¬£¬£¬£¬£¬£¬²¿·Öδ³ÉÄêÈË¿ÉÄÜÍêÈ«²»ÖªÏþ̸ÌìÄÚÈݱ»½ØÍ¼Íâй¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÓ¦ÓÃÌõ¿îÒªÇó¡°ÉÏ´«Ç°Ðè»ñµÃ¶Ô»°·½ÊÚȨ¡±£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵ²Ù×÷ÖÐÏÕЩÎÞ·¨Ö´ÐС£¡£¡£¡£¡£ËäȻƻ¹ûÊÐËÁ±ê×¢17+ÄêËêÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬ÈÔδÄÜÓÐÓÃ×èֹδ³ÉÄêÈËʹÓᣡ£¡£¡£¡£ÊÂÎñ´¦Öóͷ£Ê±¼äÏßÏÔʾ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±5ÔÂ6ÈÕ·¢Ã÷Îó²îºó£¬£¬£¬£¬£¬£¬£¬ÓÚ5ÔÂ19ÈÕÏò¿ª·¢ÉÌת´ï£¬£¬£¬£¬£¬£¬£¬6ÔÂ2ÈÕÁªÏµÅÌËã»úÓ¦¼±ÏìӦС×飨CERT£©£¬£¬£¬£¬£¬£¬£¬×îÖÕÔÚ6ÔÂ16ÈÕÐÞ¸´´æ´¢Í°È¨ÏÞ¡£¡£¡£¡£¡£
https://cybernews.com/security/iphone-flirtai-app-leaks-chat-screenshots/


¾©¹«Íø°²±¸11010802024551ºÅ