ÃÀ¹úÁª°î˾·¨»ú¹¹È·ÈÏÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ãô¸Ð°¸¼þÎļþÇå¾²ÔâÍþв
Ðû²¼Ê±¼ä 2025-08-121. ÃÀ¹úÁª°î˾·¨»ú¹¹È·ÈÏÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ãô¸Ð°¸¼þÎļþÇå¾²ÔâÍþв
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°î˾·¨»ú¹¹¿ËÈÕ֤ʵ£¬£¬£¬£¬£¬£¬ÆäÓÃÓÚÖÎÀíÉñÃØ·¨Í¥ÎļþµÄµç×Ó°¸¼þÖÎÀíϵͳÕýÔâÓöÖØ´óÇÒÒ»Á¬µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬²¢ÒѽÓÄÉÌØÊâÇå¾²²½·¥ÔöÇ¿·À»¤¡£¡£¡£¡£´Ë´ÎÊܹ¥»÷µÄϵͳ°üÀ¨Áª°î·¨ÔºÎļþÖÎÀíµÄ½¹µãƽ̨CM/ECF£¨°¸¼þÖÎÀí/µç×Ó°¸¼þµµ°¸ÏµÍ³£©ºÍPACER£¨¹«¹²»á¼û·¨Ôºµç×Ӽͼϵͳ£©£¬£¬£¬£¬£¬£¬ºóÕß×÷ΪÁª°î˾·¨Îļþ¹ûÕæÓë´æ´¢µÄÖ§Öù£¬£¬£¬£¬£¬£¬ÆäÇå¾²ÐÔÖ±½Ó¹Øºõ´ó×ÚËßËϵ±ÊÂÈ˵ÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Ö»¹Ü˾·¨»ú¹¹ÉùÃ÷δֱ½ÓÈ·ÈÏPolitico±¨µÀÖÐÌáµ½µÄ¡°ÉñÃØÏßÈËÉí·Ýй¶¡±µÈÏêϸָ¿Ø£¬£¬£¬£¬£¬£¬µ«ÆäÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬£¬£¬£¬²¿·ÖÃÜ·âÎļþÒò°üÀ¨Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ÏÖÒÑͨ¹ý¸üÑÏ¿áµÄ»á¼û¿ØÖÆÊÖÒÕÔöÇ¿±£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬Ö¼ÔÚ×è¶ÏºÚ¿Í¹¥»÷·¾¶¡£¡£¡£¡£Ë¾·¨²¿·ÖͬʱÌåÏÖ£¬£¬£¬£¬£¬£¬ÕýÓÅÏÈÓë¸÷¼¶·¨ÔºÐ×÷£¬£¬£¬£¬£¬£¬ÒÔ¼õÇá¹¥»÷¶ÔËßËϵ±ÊÂÈË¿ÉÄÜÔì³ÉµÄÓ°Ï죬£¬£¬£¬£¬£¬²¢Ò»Á¬Éý¼¶ÏµÍ³Çå¾²ÐÔÒÔÌá·ÀδÀ´Íþв¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ2025Äê7Ô³õ£¬£¬£¬£¬£¬£¬Ë¾·¨»ú¹¹Í¨¹ýÄäÃûÐÂÎÅÔ´»ñϤ¹¥»÷ÑÏÖØÐԺ󣬣¬£¬£¬£¬£¬ÓÚ7ÔÂ4ÈÕÆô¶¯ÄÚ²¿ÊӲ첢¼ò±¨Ïà¹ØÇéÐΣ¬£¬£¬£¬£¬£¬µ«Î´Á¬Ã¦¹ûÕæÉùÃ÷¡£¡£¡£¡£Ö±ÖÁPolitico±¨µÀÅû¶¡°Ãô¸ÐÐÅϢй¶ӰÏì¶àÁª°îµØÇø¡±ºó£¬£¬£¬£¬£¬£¬Ë¾·¨»ú¹¹²ÅÐû²¼Í¨¸æ»ØÓ¦£¬£¬£¬£¬£¬£¬µ«Î´Ïêϸ˵Ã÷¹¥»÷ȪԴ»òÏêϸËðʧ¹æÄ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-judiciary-confirms-breach-of-court-electronic-records-service/
2. °Í»ù˹̹ʯÓÍÓÐÏÞ¹«Ë¾£¨PPL£©ÀÖ³É×èÖ¹ÀÕË÷Èí¼þ¹¥»÷
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬°Í»ù˹̹ʯÓÍÓÐÏÞ¹«Ë¾£¨PPL£©ÓÚ2025Äê8ÔÂ6ÈÕÔâÓöÒ»ÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Æä²¿·ÖIT»ù´¡ÉèÊ©Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬µ«¹«Ë¾Í¨¹ý¿ìËÙÏìÓ¦ºÍ¶à²ãÍøÂçÇå¾²²½·¥ÀֳɿØÖÆÁËÊÂÎñ£¬£¬£¬£¬£¬£¬½¹µãÔËӪϵͳ¼°Ãô¸ÐÊý¾ÝδÔâй¶¡£¡£¡£¡£PPLÔÚÏò°Í»ù˹̹֤ȯÉúÒâËù£¨PSX£©Ìá½»µÄ֪ͨÖÐÅû¶£¬£¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬¹«Ë¾Á¬Ã¦Æô¶¯ÄÚ²¿ÍøÂçÇå¾²ÐÒ飬£¬£¬£¬£¬£¬ITÍŶÓÓëÍⲿר¼ÒÐͬ½ÓÄÉ×èÖ¹²½·¥£¬£¬£¬£¬£¬£¬°üÀ¨ÔÝÍ£²¿·Ö·ÇÒªº¦ITЧÀÍÒÔÏÞÖÆÇ±ÔÚÓ°Ï죬£¬£¬£¬£¬£¬È·±£ÏµÍ³ÍêÕûÐÔ¡£¡£¡£¡£¹«Ë¾ÉùÃ÷Ç¿µ÷£¬£¬£¬£¬£¬£¬Æä¶à²ãÍøÂçÇå¾²¿ò¼ÜÓÐÓøôÀëÁËÍþв£¬£¬£¬£¬£¬£¬Î´·¢Ã÷Òªº¦ÓªÒµÊý¾Ý»òÃô¸ÐÐÅÏ¢±»Ð¹Â¶£¬£¬£¬£¬£¬£¬½¹µãÔËӪϵͳ¼á³ÖÕý³£ÔËÐУ¬£¬£¬£¬£¬£¬Î´·ºÆðÖÐÖ¹¡£¡£¡£¡£Ö»¹ÜÊÕµ½ÍⲿְԱµÄÀÕË÷֪ͨ£¬£¬£¬£¬£¬£¬PPLÃ÷È·ÌåÏÖδÓëºÚ¿Í½¨ÉèÁªÏµ£¬£¬£¬£¬£¬£¬²¢ÒÑÒÀ¾ÝÖ´·¨ÒªÇó½«ÊÂÎñÉϱ¨ÖÁÏà¹ØÖ´·¨¼°î¿Ïµ»ú¹¹£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÅäºÏ¿ªÕ¹ÊӲ졣¡£¡£¡£Îª°ü¹Ü½ðÈÚÉúÒâÇå¾²£¬£¬£¬£¬£¬£¬¹«Ë¾ÔÚɨÃèʱ´úÔÝͣϵͳÉúÒ⹦Ч£¬£¬£¬£¬£¬£¬¸ÄÓÃÊÖ¶¯·½·¨Íê³É¸¶¿îÁ÷³Ì£¬£¬£¬£¬£¬£¬×èֹΣº¦À©É¢¡£¡£¡£¡£
https://www.brecorder.com/news/amp/40376980
3. ³¯ÏʺڿÍ×éÖ¯ScarCruftÊ״ΰ²ÅÅÀÕË÷Èí¼þ
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬º«¹úÇå¾²¹«Ë¾S2W¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Ó볯ÏÊÕþ¸®¹ØÁªµÄºÚ¿Í×éÖ¯ScarCruft£¨APT37£©ÔÚ½üÆÚÍøÂç¹¥»÷ÖÐÊ×´ÎʹÓÃÁËÐÂÐÍÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬±ê¼Ç×ÅÆäÐж¯Ä¿µÄ¿ÉÄܴӹŰåÌØ¹¤»î¶¯×ªÏò¾¼ÃÀûÒæÇý¶¯¡£¡£¡£¡£¸Ã×éÖ¯ºã¾ÃÒÔº«¹ú¡¢ÈÕ±¾¡¢Ô½ÄϵȹúµÄ¸ß¼ÛֵСÎÒ˽¼Ò¼°Õþ¸®»ú¹¹Îª¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÐж¯ÖУ¬£¬£¬£¬£¬£¬Æäͨ¹ýÓã²æÊ½´¹ÂÚÓʼþͶµÝº¬¶ñÒâѹËõ°üµÄÓÕ¶üÎļþ£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖϵͳ²¢°²ÅÅÁËÃûΪ¡°VCD¡±µÄÀÕË÷Èí¼þ¡£¡£¡£¡£VCDÀÕË÷Èí¼þ»á¶Ô¼ÓÃÜÎļþÌí¼Ó¡°.vcd¡±À©Õ¹Ãû£¬£¬£¬£¬£¬£¬²¢ÌìÉúÓ¢ÎÄÓ뺫ÎÄË«°æ±¾ÀÕË÷֪ͨ£¬£¬£¬£¬£¬£¬ÒªÇóÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£S2WÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬ÕâÒ»ÐÐΪÌåÏÖScarCruft¿ÉÄÜÍØÕ¹Á˰üÀ¨ÆÆËðÐÔ¼°ÀÕË÷Õ½ÂÔµÄÔËӪĿµÄ£¬£¬£¬£¬£¬£¬»òÊÔͼͨ¹ý¾¼ÃÊÖ¶ÎΪÊÜÖÆ²ÃÕþȨ³ï¼¯×ʽ𡣡£¡£¡£Ñо¿»¹Ê¶±ð³ö¹¥»÷ÖÐʹÓõÄÁè¼Ý9Àà¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬°üÀ¨ÐÅÏ¢ÇÔÈ¡¹¤¾ßLightPeek¡¢¿ÉÂ¼ÖÆÒôƵ¼°¼Í¼»÷¼üµÄFadeStealer£¬£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃÕýµ±ÊµÊ±Í¨Ñ¶Æ½Ì¨PubNub¾ÙÐÐÒþ²ØÏÂÁî¿ØÖÆ£¨C2£©Í¨Ñ¶µÄºóÃųÌÐòNubSpy¡£¡£¡£¡£Í¨¹ý½«¶ñÒâÁ÷Á¿Î±×°³ÉÕý³£ÍøÂçͨѶ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÓÐÓÃÒþ²ØÁËÐÐ×Ù¡£¡£¡£¡£´Ë´Î¹¥»÷±»¹éÒòÓÚScarCruftÏÂÊôС×éChinopuNK£¬£¬£¬£¬£¬£¬¸ÃС×éÔøÈö²¥Ö§³ÖWindows/Android˫ƽ̨¹¥»÷µÄChinotto¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬²¢ÔÚ±¾´ÎÐж¯ÖÐʹÓÃÁËбäÖÖChillyChino¡£¡£¡£¡£
https://therecord.media/scarcruft-north-korea-hackers-add-ransomware
4. ¹È¸èÐÞ¸´GeminiÈÕÀúÔ¼ÇëÎó²î
8ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬¹È¸è¿ËÈÕÐÞ¸´ÁËÒ»Ïî¸ßΣÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷Õßͨ¹ýÈ«ÐÄÖÆ×÷µÄGoogleÈÕÀúÔ¼Ç룬£¬£¬£¬£¬£¬Ô¶³Ì½ÓÊÜÓû§×°±¸ÉÏÔËÐеÄGeminiÊðÀí²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£´Ë´Î¹¥»÷ÎÞÐèÓû§×Ô¶¯µã»÷¶ñÒâÁ´½Ó»òÏÂÔØÎļþ£¬£¬£¬£¬£¬£¬½öÐèÒ»Ñùƽ³£ÓëGeminiÖúÊÖ»¥¶¯¼´¿É´¥·¢£¬£¬£¬£¬£¬£¬¶ÔÒÀÀµ¸ÃЧÀ͵ÄÓû§×é³ÉÏÔÖøÍþв¡£¡£¡£¡£Gemini×÷Ϊ¹È¸è¼¯³ÉÔÚAndroid¡¢GoogleÍøÂçЧÀͼ°WorkspaceÓ¦ÓÃÖеĴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÖúÊÖ£¬£¬£¬£¬£¬£¬¿É»á¼ûGmail¡¢ÈÕÀúºÍGoogle HomeµÈ½¹µã¹¦Ð§¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËͰüÀ¨Ç¶ÈëʽÌáÐÑ×¢ÈëµÄÈÕÀúÔ¼Ç룬£¬£¬£¬£¬£¬¿ÉʹÓÃGeminiµÄ¿ç¹¤¾ßȨÏÞÖ´ÐжñÒâ²Ù×÷¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬µ±Óû§Ñ¯ÎÊ¡°½ñÈÕÈÕÀúÊÂÎñ¡±Ê±£¬£¬£¬£¬£¬£¬Gemini»á´ÓÈÕÀúÖÐÌáÈ¡ËùÓÐÊÂÎñ£¬£¬£¬£¬£¬£¬°üÀ¨¹¥»÷ÕßÖ²ÈëµÄ¶ñÒâÎÊÌâ¡£¡£¡£¡£ÕâЩÒþ²ØÖ¸Áî¿ÉÆÈʹGeminiÇÔÈ¡µç×ÓÓʼþÄÚÈÝ¡¢¸ú×ÙÓû§Î»Öá¢Í¨¹ýGoogle Home¿ØÖÆÖÇÄܼҾÓ×°±¸¡¢ÔÚAndroid×°±¸ÉÏ·¿ªÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬ÉõÖÁ´¥·¢ZoomÊÓÆµÍ¨»°¡£¡£¡£¡£¹È¸èÇå¾²ÍŶÓÈ·ÈÏÎó²îºóѸËÙÐÞ¸´£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷Æäͨ¹ýºì¶ÓÑÝÁ·ºÍ¿çÐÐÒµÐ×÷Ò»Á¬Ç¿»¯·ÀÓù¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-calendar-invites-let-researchers-hijack-gemini-to-leak-user-data/
5. ConnexÐÅÓÃÏàÖúÉçÔâÊý¾Ýй¶£¬£¬£¬£¬£¬£¬7Íò»áÔ±ÐÅÏ¢±»ÇÔ
8ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬¿µÄùµÒ¸ñÖÝ×î´óµÄ·ÇÓªÀûÐÔÐÅÓÃÏàÖúÉçÖ®Ò»Connex¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬ÆäϵͳÔÚ2025Äê6Ô³õÔâÓöδ֪¹¥»÷ÕßÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼Ö´ó×Ú»áԱСÎÒ˽¼Ò¼°²ÆÎñÐÅϢй¶¡£¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÓÚ6ÔÂ2ÈÕÖÁ3ÈÕʱ´ú²»·¨»á¼û²¢ÏÂÔØÁ˲¿·ÖÎļþ£¬£¬£¬£¬£¬£¬ConnexÔÚ6ÔÂ3ÈÕ¼ì²âµ½Òì³££¬£¬£¬£¬£¬£¬²¢ÓÚ7ÔÂ27ÈÕÈ·ÈÏÐ¹Â¶Éæ¼°ÐÕÃû¡¢Õ˺š¢½è¼Ç¿¨ÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¼°Õþ¸®Éí·ÝÖ¤µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬µ«Î´·¢Ã÷×ʽð»òÕË»§±»Ö±½ÓÇÔÈ¡µÄÖ¤¾Ý¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬£¬£¬£¬£¬ConnexÒÑͨ¹ýÃÀ¹úÓÊÕþÏòÊÜÓ°Ïì»áÔ±·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬²¢ÔÚ¹ÙÍøÐû²¼Õ©Æ¾¯±¨£¬£¬£¬£¬£¬£¬ÌáÐÑ»áԱСÐÄÕ©Æ·Ö×Óð³äÆäÔ±¹¤ÊµÑéÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¾¯±¨Ã÷È·Ö¸³ö£¬£¬£¬£¬£¬£¬Connex¾ø²»»áͨ¹ýµç»°»ò¶ÌÐÅË÷Òª»áÔ±µÄPINÂë¡¢ÃÜÂë»òÕ˺ţ¬£¬£¬£¬£¬£¬ºôÓõÊÕµ½¿ÉÒÉÁªÏµÊ±Á¬Ã¦¹Ò¶Ï²¢²¦´ò¹Ù·½µç»°ºËʵ¡£¡£¡£¡£Ö»¹ÜConnexδÌá¼°´Ë´Îй¶ÊÇ·ñÓëÀÕË÷ÍÅ»ïÖ±½ÓÏà¹Ø£¬£¬£¬£¬£¬£¬µ«ÆäÐû²¼µÄÕ©ÆÔ¤¾¯ÌåÏÖ¹¥»÷Õß¿ÉÄÜʹÓñ»µÁÐÅÏ¢½øÒ»²½ÊµÑ龫׼´¹ÂÚ£¬£¬£¬£¬£¬£¬¼Ó¾ç»áԱΣº¦¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/connex-credit-union-discloses-data-breach-impacting-172-000-people/
6. ³¯ÏʺڿÍ×éÖ¯KimsukyÔâÆ·µÂºÚ¿Í·´ÖÆ£¬£¬£¬£¬£¬£¬8.9GBÉñÃØÊý¾Ýй¶
8ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬³¯ÏÊÕþ¸®Åä¾°µÄºÚ¿Í×éÖ¯KimsukyÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Á½Ãû×Ô³Æ"Saber"ºÍ"cyb0rg"µÄÆ·µÂºÚ¿ÍÒÔ×èµ²ÕþÖβÙŪΪÓÉ£¬£¬£¬£¬£¬£¬½«ÆäÇÔÈ¡µÄÉñÃØÊý¾Ý¹ûÕæÖÁÍøÂç¡£¡£¡£¡£´Ë´ÎÐж¯ÔÚDEF CON 33ºÚ¿Í´ó»áʱ´úͨ¹ý´«ÆæºÚ¿ÍÔÓÖ¾PhrackµÚ72ÆÚÆØ¹â£¬£¬£¬£¬£¬£¬Òý·¢È«ÇòÍøÂçÇå¾²½ç¹Ø×¢¡£¡£¡£¡£¾ÝÅû¶£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄ8.9GBÊý¾Ý°üÀ¨Kimsuky×éÖ¯¶à¸ö½¹µã×ʲú£ºº¸Çº«¹ú¹ú·À·´Ç鱨˾Á£¨dcc.mil.kr£©µÈÕþ¸®»ú¹¹¡¢Ö÷Á÷ÓÊÏäЧÀÍÉÌ£¨naver/daum/kakao£©µÄÍøÂç´¹ÂÚÈÕÖ¾£¬£¬£¬£¬£¬£¬ÒÔ¼°º«ÍâÑó½»²¿µç×ÓÓʼþƽ̨"Kebi"µÄÍêÕûÔ´´úÂë¡£¡£¡£¡£ÊÖÒÕÎĵµÏÔʾ£¬£¬£¬£¬£¬£¬¸Ã×é֯ʹÓö¨ÖÆ»¯PHP¹¤¾ß°ü¹¹½¨¾ß±¸¼ì²â¹æ±Ü¹¦Ð§µÄ´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬²¢Å䱸ʵʱ¸üеĴ¹ÂÚ¹¤¾ß°ü¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬×ª´¢ÎļþÖл¹°üÀ¨Î´±»VirusTotal±ê¼ÇµÄδ֪¶þ½øÖÆÎļþºÍCobalt Strike¼ÓÔØÆ÷µÈ¸ß¼¶¹¥»÷¹¤¾ß¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬KimsukyµÄ»ù´¡ÉèÊ©±£´æÏÔÖøÌØÕ÷£ºÆä³ÉԱƵÈÔʹÓÃGoogle·Òë´¦Öóͷ£ÖÐÎĹýʧÐÅÏ¢£¬£¬£¬£¬£¬£¬»á¼ų̂Íå¾üÕþÍøÕ¾£¬£¬£¬£¬£¬£¬²¢Í¨¹ýPureVPNµÈЧÀÍÉ̹ºÖÃVPNЧÀÍ¡£¡£¡£¡£BashÀúÊ·¼Í¼ÏÔʾ£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔøÍ¨¹ýSSHÅþÁ¬ÄÚ²¿ÏµÍ³£¬£¬£¬£¬£¬£¬²¢¹ØÁª¶à¸ö¿ÉÒÉGitHubÕ˺źͺڿÍÂÛ̳¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-kimsuky-hackers-exposed-in-alleged-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ