DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿

Ðû²¼Ê±¼ä 2025-07-10

1. DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿


7ÔÂ9ÈÕ £¬£¬£¬£¬£¬£¬£¬½üÆÚ £¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Trellix¸ß¼¶Ñо¿ÖÐÐÄÅû¶һÆðÕë¶ÔÅ·ÖÞÍâ½»»ú¹¹µÄ¶¨ÏòÍøÂç¹¥»÷ÊÂÎñ £¬£¬£¬£¬£¬£¬£¬Æä±³ºóÒÉËÆÉæ¼°Ó¡¶ÈÅä¾°µÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯DoNot Team£¨±ð³ÆAPT-C-35µÈ£©¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2016ÄêÆðÒ»Á¬»îÔ¾ £¬£¬£¬£¬£¬£¬£¬ÒÔ¶¨ÖÆ»¯Windows¶ñÒâÈí¼þ£¨ÈçYTY¡¢GEditºóÃÅ£©Á¬ÏµÓã²æÊ½´¹ÂÚÓʼþΪÖ÷Òª¹¥»÷ÊÖ¶Î £¬£¬£¬£¬£¬£¬£¬ºã¾ÃÕë¶ÔÕþ¸®¡¢Íâ½»¡¢¹ú·À¼°·ÇÕþ¸®×éÖ¯Õö¿ªÍøÂçÌØ¹¤»î¶¯ £¬£¬£¬£¬£¬£¬£¬Ä¿µÄÇøÓò´Ëǰ¼¯ÖÐÓÚÄÏÑÇ £¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊ×´ÎÈ·ÈÏÆä¶ÔÅ·ÖÞÍâ½»ÁìÓòµÄÀ©ÕÅÐÔÉøÍ¸¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Á´Ê¼ÓÚαװ³ÉÒâ´óÀûפÃϼÓÀ­¹ú¹ú·ÀÎä¹Ù»á¼ûÐг̵Ĵ¹ÂÚÓʼþ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýGmailÕË»§·¢ËÍUTF-8±àÂëµÄHTMLÃûÌÃÓʼþ £¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÌØÊâ×Ö·û£¨Èç·¨Óï"Attach¨¦"£©ÔöÇ¿¿ÉÐÅ¶È £¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Ä¿µÄµã»÷GoogleÔÆ¶ËÓ²ÅÌÁ´½ÓÏÂÔØRARѹËõ°ü¡£¡£¡£¡£¡£Ñ¹Ëõ°üÄÚº¬Î±×°ÎªPDFÎĵµµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ £¬£¬£¬£¬£¬£¬£¬Êܺ¦Õß·­¿ªºó½«´¥·¢LoptikModÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¸ÃľÂíͨ¹ýÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯×¤Áô £¬£¬£¬£¬£¬£¬£¬¾ß±¸ÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢ÎüÊÕÔ¶³ÌÖ¸Áî¡¢ÏÂÔØ¸½¼ÓÄ£¿£¿£¿£¿£¿£¿éµÈ¹¦Ð§ £¬£¬£¬£¬£¬£¬£¬²¢½ÓÄÉ·´ÐéÄâ»úÊÖÒÕºÍASCII»ìÏýÊÖÒÕ¹æ±ÜÇå¾²ÆÊÎö £¬£¬£¬£¬£¬£¬£¬Í¬Ê±Í¨¹ýµ¥ÊµÀýÔËÐлúÖÆ×èÖ¹³åÍ»¡£¡£¡£¡£¡£


https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html


2. ÈÕ±¾ÐÂÈÕÌú×Ó¹«Ë¾ÔâÁãÈÕ¹¥»÷ÖÂÊý¾Ýй¶


7ÔÂ9ÈÕ £¬£¬£¬£¬£¬£¬£¬ÈÕ±¾ÐÂÈÕÌú¼¯ÍÅÆìÏÂ×Ó¹«Ë¾ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾£¨Nippon Steel Solutions£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃδ¹ûÕæµÄÁãÈÕÎó²îÇÖÈëÆäÄÚ²¿ÍøÂç £¬£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¡¢ÏàÖúͬ°é¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¡£¡£¸Ã¹«Ë¾×¨×¢ÓÚÔÆÐ§ÀÍÓëÍøÂçÇå¾²½â¾ö¼Æ»® £¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒòÆäÊÖÒÕÅä¾°¶ø±¸ÊܹØ×¢¡£¡£¡£¡£¡£2025Äê3ÔÂ7ÈÕ £¬£¬£¬£¬£¬£¬£¬ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾¼à²âµ½Ð§ÀÍÆ÷Òì³£» £»£»î¶¯ £¬£¬£¬£¬£¬£¬£¬Ëæ¼´¸ôÀëÊÜÓ°Ïìϵͳ¡£¡£¡£¡£¡£¾­ÊÓ²ìÈ·ÈÏ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÕë¶ÔÍøÂç×°±¸µÄÁãÈÕÎó²îʵÑéÈëÇÖ £¬£¬£¬£¬£¬£¬£¬Ôì³ÉÄÚ²¿ÍøÂçδ¾­ÊÚȨ»á¼û £¬£¬£¬£¬£¬£¬£¬²¿·ÖÃô¸ÐÊý¾Ý¿ÉÄܱ»ÇÔÈ¡¡£¡£¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ £¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ç¿µ÷ÆäÔÆÐ§ÀÍÆ½Ì¨Î´Êܲ¨¼° £¬£¬£¬£¬£¬£¬£¬ÓªÒµÒ»Á¬ÐÔδÊÜÖ±½ÓÓ°Ïì¡£¡£¡£¡£¡£Æ¾Ö¤Í¨¸æ £¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢º­¸ÇÈýÀàÖ÷Ì壺¿Í»§Êý¾Ý°üÀ¨ÐÕÃû¡¢¹«Ë¾Ãû³Æ¡¢ËùÊô»ú¹¹¡¢Ö°Î»¡¢µØµã¡¢ÓÊÏä¼°µç»°£» £»£»ÏàÖúͬ°éÐÅÏ¢Éæ¼°ÐÕÃû¼°¹«Ë¾ÓòÃûÓÊÏ䣻 £»£»Ô±¹¤Êý¾ÝÔò°üÀ¨ÐÕÃû¡¢²¿·Ö¡¢Ö°Î»¼°ÆóÒµÓÊÏä¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢ÕâЩÐÅÏ¢ÒÑͨ¹ýÉ罻ýÌå»ò°µÍøÀ©É¢ £¬£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÈÔ¾¯Ê¾Óû§Ð¡ÐÄ¿ÉÒÉͨѶ £¬£¬£¬£¬£¬£¬£¬×èÖ¹µã»÷²»Ã÷Á´½Ó»ò»Ø¸´ÉúÊèÀ´µç¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÒÑÍê³ÉÄÚ²¿ÍøÂçÇå¾²»Ö¸´ £¬£¬£¬£¬£¬£¬£¬²¢Ïò¾¯·½¼°ÈÕ±¾Ð¡ÎÒ˽¼ÒÐÅÏ¢±£» £»£»¤Î¯Ô±»áÌá½»±¨¸æ £¬£¬£¬£¬£¬£¬£¬ÍÆÐз¨¶¨Åû¶ÒåÎñ¡£¡£¡£¡£¡£


https://securityaffairs.com/179766/data-breach/nippon-steel-solutions-data-breach.html


3. ÃÀ¹ú¼ÓÃÜATM¾ÞÍ·Bitcoin DepotÔâÓöÊý¾Ýй¶


7ÔÂ9ÈÕ £¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin Depot¿ËÈÕÅû¶һÆðÓ°Ïì2.7Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Í¨¹ýÐżþ֪ͨÊÜÓ°ÏìÓû§ £¬£¬£¬£¬£¬£¬£¬ÊÂÎñ¿É×·ËÝÖÁ2024Äê6ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬£¬ÆäÍøÂçÊ״μì²âµ½¿ÉÒɻ £¬£¬£¬£¬£¬£¬£¬µ«ÒòÁª°îÖ´·¨»ú¹¹ÒªÇóÅäºÏÊÓ²ì £¬£¬£¬£¬£¬£¬£¬Ö±ÖÁ7ÔÂ18ÈÕÄÚ²¿ÊÓ²ìÍê³Éºó·½ÄÜÆô¶¯Åû¶³ÌÐò¡£¡£¡£¡£¡£Æ¾Ö¤Í¨¸æ £¬£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄ¹¥»÷Õß»ñÈ¡Á˲¿·Ö¿Í»§ÔÚKYCÑéÖ¤Àú³ÌÖÐÌá½»µÄÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¼°µç×ÓÓÊÏäµÈ¡£¡£¡£¡£¡£Bitcoin DepotÔÚÈ«ÃÀ¡¢¼ÓÄô󼰰ĴóÀûÑÇÔËÓª×Å8800̨װ±¸ £¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°¹æÄ£ÆÕ±é¡£¡£¡£¡£¡£ÓÉÓÚ¼ÓÃÜÇ®±ÒÉúÒâµÄÄäÃûÐÔÓë×ʽð¿ìËÙÁ÷×ªÌØÕ÷ £¬£¬£¬£¬£¬£¬£¬¹Å°å½ðÈÚÁìÓòµÄÉí·Ý¼à¿ØÓë·ÀµÁЧÀÍÔڴ˳¡¾°ÖÐÄÑÒÔʵÑé¡£¡£¡£¡£¡£Bitcoin DepotÃ÷È·ÌåÏÖÎÞ·¨ÎªÊÜÓ°ÏìÓû§ÌṩÐÅÓñ£» £»£»¤»òÉí·Ý¼à¿ØÐ§ÀÍ £¬£¬£¬£¬£¬£¬£¬×ª¶ø½¨ÒéÓû§×Ô¶¯¼à¿ØÕË»§Òì³£ÉúÒâ¡¢¶³½áÐÅÓñ¨¸æ²¢Ð¡ÐÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/


4. ÃÀ¹ú˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerboxй¶24.5ÍòÌõÃô¸ÐÊý¾Ý


7ÔÂ9ÈÕ £¬£¬£¬£¬£¬£¬£¬ÃÀ¹úµÃ¿ËÈøË¹ÖÝ˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerbox¿ËÈÕÒòδÉèÃÜÂë±£» £»£»¤µÄÊý¾Ý¿â̻¶ £¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ245,949Ìõ¡¢×ܼÆ286.9GBµÄÃô¸ÐÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬º­¸ÇÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢µØµã¡¢¼ÝʻִÕÕ¼°ÍËÎéÎäÊ¿DD214ÎļþµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷²¢±¨¸æÖÁvpnMentor¡£¡£¡£¡£¡£×÷ΪרעÓÚ¹ÍÖ÷˰ÊÕ¼¤ÀøÍýÏ루ÈçWOTC¡¢ERTCµÈ£©µÄЧÀÍÉÌ £¬£¬£¬£¬£¬£¬£¬RockerboxΪ²ÍÒû¡¢Âùݡ¢Ò½ÁƵȶà¸öÐÐÒµµÄÆóÒµÌṩ˰ÎñÓÅ»¯Ö§³Ö £¬£¬£¬£¬£¬£¬£¬Æäй¶µÄ¿Í»§Êý¾ÝÉæ¼°ÖØ´óµÄ²ÆÎñÓëСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£³ýÖ±½Ó´æ´¢µÄPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©Íâ £¬£¬£¬£¬£¬£¬£¬´ó×Ú˰ÊÕµÖÃâÉêÇëÎļþ¡¢Åú×¼/¾Ü¾øº¯¼°ÃÜÂë±£» £»£»¤PDFµÄÎļþÃûÒ²Ôâ̻¶ £¬£¬£¬£¬£¬£¬£¬²¿·ÖÎļþÃû¿ÉÄÜÒþº¬ÃÜÂëÏßË÷ £¬£¬£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÐÅÏ¢ÀÄÓÃΣº¦¡£¡£¡£¡£¡£FowlerÖ¸³ö £¬£¬£¬£¬£¬£¬£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ¼°½ðÈÚڲƭ £¬£¬£¬£¬£¬£¬£¬¶ÔÊÜÓ°ÏìСÎÒ˽¼Ò×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£ÊÂÎñ̻¶ºó £¬£¬£¬£¬£¬£¬£¬FowlerÁ¬Ã¦Í¨ÖªRockerbox £¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Î´×÷³öÕýʽ»ØÓ¦ £¬£¬£¬£¬£¬£¬£¬Êý¾Ý¿âÔÚÊýÈÕºó²Å±»¼ÓÃܱ£» £»£»¤¡£¡£¡£¡£¡£


https://hackread.com/rockerbox-server-tax-firm-exposed-sensitive-records/


5. AnatsaÒÆ¶¯¶ñÒâÈí¼þÔٴι¥»÷±±ÃÀÒøÐпͻ§


7ÔÂ9ÈÕ £¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±È·ÈÏ £¬£¬£¬£¬£¬£¬£¬ºã¾Ã»îÔ¾µÄAndroidÒøÐÐľÂíAnatsa½üÆÚÕë¶Ô±±ÃÀ½ðÈÚ»ú¹¹ÌᳫÐÂÒ»ÂÖ¹¥»÷ £¬£¬£¬£¬£¬£¬£¬ºÉÀ¼ThreatFabric¹«Ë¾×·×ÙÏÔʾ £¬£¬£¬£¬£¬£¬£¬ÕâÒÑÊÇÆäÖÁÉÙµÚÈý´Î½«ÃÀ¹úÓë¼ÓÄôóÒÆ¶¯ÒøÐÐÓû§ÁÐΪĿµÄ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼Í¼¼üÅÌÊäÈ뼰ͨ¹ýÔ¶³Ì¿ØÖÆÖ±½ÓʵÑéڲƭÉúÒâµÄÄÜÁ¦ £¬£¬£¬£¬£¬£¬£¬ÆäÁ½½×¶Î¹¥»÷ģʽÒý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¡£¡£±¾´Î¹¥»÷ÖÐ £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈÔÚÓ¦ÓÃÊÐËÁÉϼܿ´ËÆÕýµ±µÄ¹¤¾ßÀàÓ¦Óã¨ÈçÎļþÔĶÁÆ÷£© £¬£¬£¬£¬£¬£¬£¬³õÆÚ¹¦Ð§Õý³£ÒÔ»ýÀÛÓû§ÐÅÈΡ£¡£¡£¡£¡£´ýÏÂÔØÁ¿µÖ´ïÊýÍò´Îºó £¬£¬£¬£¬£¬£¬£¬Í¨¹ý¸üÐÂ×¢Èë¶ñÒâ´úÂë £¬£¬£¬£¬£¬£¬£¬½«Anatsa×÷Ϊ×ÔÁ¦³ÌÐò×°ÖÃÖÁ×°±¸¡£¡£¡£¡£¡£ÒÔ±¾´Î°¸ÀýΪÀý £¬£¬£¬£¬£¬£¬£¬Ò»¿îÎļþÔĶÁÆ÷Ó¦ÓÃÔÚ6ÔÂ24ÈÕÖÁ30ÈÕʱ´úÍÆË͸üР£¬£¬£¬£¬£¬£¬£¬Ï¼ÜǰÒÑÔÚÃÀ¹úPlayÊÐËÁÃâ·Ñ¹¤¾ß°ñѹµ¹Ò»ÇÐ £¬£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬5Íò´Î¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬£¬£¬£¬£¬£¬£¬Anatsa´Ë´Î¹¥»÷Ä¿µÄÇåµ¥ÏÔÖøÀ©Õ¹ £¬£¬£¬£¬£¬£¬£¬ÁýÕÖÁ˸üÆÕ±éµÄÃÀ¹úÒÆ¶¯ÒøÐÐÓ¦Óᣡ£¡£¡£¡£


https://therecord.media/anatsa-android-banking-malware-returns-north-america


6. FlirtAIÔ¼»áÖúÊÖÒòδÊܱ£» £»£»¤Ôƴ洢й¶16ÍòÕÅ˽ÃܽØÍ¼


7ÔÂ8ÈÕ £¬£¬£¬£¬£¬£¬£¬µÂ¹ú°ØÁÖ¹«Ë¾Buddy Network GmbH¿ª·¢µÄiOSÓ¦ÓÃFlirtAI¿ËÈÕÒòÔÆ´æ´¢Çå¾²Îó²îÒý·¢ÑÏÖØÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬³¬16ÍòÕÅÓû§ÉÏ´«µÄ˽ÃÜ̸Ìì½ØÍ¼Ì»Â¶ÓÚ¹«¹²»¥ÁªÍø¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÖ÷´òAI¸¨ÖúÉç½»¹¦Ð§ £¬£¬£¬£¬£¬£¬£¬Óû§ÐèÊÖ¶¯½ØÈ¡Ô¼»áÈí¼þ¶Ô»°»òСÎÒ˽¼Ò×ÊÁϽçÃæ²¢ÉÏ´« £¬£¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡ÎåÌõ¶¨Öƻظ´½¨Òé¡£¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Æä¹È¸èÔÆ´æ´¢Í°Î´ÉèÖûá¼ûȨÏÞ¿ØÖÆ £¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÊý¾Ýºã¾ÃÂã¶¡£¡£¡£¡£¡£Êý¾ÝÏÔʾÇàÉÙÄêÓû§Õ¼±ÈÏÔÖø £¬£¬£¬£¬£¬£¬£¬ÆäÉÏ´«µÄ½ØÍ¼°üÀ¨Í¬ÁäÈË˽ÃܶԻ° £¬£¬£¬£¬£¬£¬£¬²¿·Öδ³ÉÄêÈË¿ÉÄÜÍêÈ«²»ÖªÏþ̸ÌìÄÚÈݱ»½ØÍ¼Íâй¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÓ¦ÓÃÌõ¿îÒªÇó¡°ÉÏ´«Ç°Ðè»ñµÃ¶Ô»°·½ÊÚȨ¡± £¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵ²Ù×÷ÖÐÏÕЩÎÞ·¨Ö´ÐС£¡£¡£¡£¡£ËäȻƻ¹ûÊÐËÁ±ê×¢17+ÄêËêÏÞÖÆ £¬£¬£¬£¬£¬£¬£¬ÈÔδÄÜÓÐÓÃ×èֹδ³ÉÄêÈËʹÓᣡ£¡£¡£¡£ÊÂÎñ´¦Öóͷ£Ê±¼äÏßÏÔʾ £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±5ÔÂ6ÈÕ·¢Ã÷Îó²îºó £¬£¬£¬£¬£¬£¬£¬ÓÚ5ÔÂ19ÈÕÏò¿ª·¢ÉÌת´ï £¬£¬£¬£¬£¬£¬£¬6ÔÂ2ÈÕÁªÏµÅÌËã»úÓ¦¼±ÏìӦС×飨CERT£© £¬£¬£¬£¬£¬£¬£¬×îÖÕÔÚ6ÔÂ16ÈÕÐÞ¸´´æ´¢Í°È¨ÏÞ¡£¡£¡£¡£¡£


https://cybernews.com/security/iphone-flirtai-app-leaks-chat-screenshots/