ÐÂÐÍCrocodilus¶ñÒâÈí¼þÇÔÈ¡AndroidÓû§¼ÓÃÜÇ®°üÃÜÔ¿
Ðû²¼Ê±¼ä 2025-03-311. ÐÂÐÍCrocodilus¶ñÒâÈí¼þÇÔÈ¡AndroidÓû§¼ÓÃÜÇ®°üÃÜÔ¿
3ÔÂ30ÈÕ£¬£¬£¬£¬£¬Ð·¢Ã÷µÄAndroidÒøÐжñÒâÈí¼þ"Crocodilus"ͨ¹ýÕûºÏÉç»á¹¤³Ìѧ¹¥»÷Óë¸ß¼¶ÉøÍ¸ÊÖÒÕ£¬£¬£¬£¬£¬Õ¹ÏÖ³ö¶Ô¼ÓÃÜÇ®±ÒÇ®°ü¼°½ðÈÚÕË»§µÄÑÏÖØÍþв¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃרÓÐÖ²ÈëÆ÷ÈÆ¹ýAndroid 13¼°ÒÔÉϰ汾µÄÇå¾²»úÖÆ£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâÍøÕ¾¡¢É罻ڲƻòµÚÈý·½Ó¦ÓÃÊÐËÁʵÑé³õʼѬȾ¡£¡£¡£¡£Æä¹¥»÷Á´µÄ½¹µãÔÚÓÚÓÕµ¼Óû§Ð¹Â¶¼ÓÃÜÇ®°üµÄ"ÖÖ×Ó¶ÌÓï"£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýαÔìϵͳÖÒÑÔ½çÃæ£¬£¬£¬£¬£¬±Þ²ßÓû§ÔÚ12СʱÄÚ±¸·ÝÇ®°üÃÜÔ¿£¬£¬£¬£¬£¬ÊµÔòʹÓø¨Öú¹¦Ð§Ð§ÀͼÍÈÎÃü»§ÊäÈëÐÅÏ¢£¬£¬£¬£¬£¬½ø¶øÍêÈ«¿ØÖÆÊý×Ö×ʲú¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬Crocodilus¾ß±¸ÍêÕûµÄRAT£¨Ô¶³Ì»á¼ûľÂí£©¹¦Ð§£¬£¬£¬£¬£¬¿ÉʵÑé23Ïî×°±¸¿ØÖÆÖ¸Á£¬£¬£¬£¬°üÀ¨×èµ²¶ÌÐÅ¡¢¸Ä¶¯ÈÏÖ¤Æ÷½ØÍ¼ÇÔȡ˫ÒòËØÁîÅÆ¡¢ÁýÕÖÆÁÄ»½çÃæÍµÈ¡ÒøÐÐÆ¾Ö¤µÈ¡£¡£¡£¡£ÆäÌØÊâÄÜÁ¦ÔÚÓÚ¼¤»îºÚÆÁ¾²Ä¬Ä£Ê½Òþ²Ø¹¥»÷ÐÐΪ£¬£¬£¬£¬£¬Í¬Ê±ÀÄÓø¨Öú¹¦Ð§Ð§ÀÍÍ»ÆÆÎÞÕϰȨÏÞÏÞÖÆ¡£¡£¡£¡£Ä¿½ñ¹¥»÷Ä¿µÄ¼¯ÖÐÓÚÍÁ¶úÆäºÍÎ÷°àÑÀµÄ½ðÈÚÓû§£¬£¬£¬£¬£¬µ«Ä£¿£¿£¿£¿£¿£¿é»¯Éè¼ÆÌåÏÖÆä¾ß±¸¿ìËÙÀ©Õ¹¹¥»÷ÃæµÄDZÁ¦¡£¡£¡£¡£Ç徲ר¼Ò½¨ÒéÓû§Ó¦ÑÏ¿á×ñÕÕ¹Ù·½Ó¦ÓÃÊÐËÁÏÂÔØÔÔò£¬£¬£¬£¬£¬¼á³ÖPlay Protectʵʱ·À»¤£¬£¬£¬£¬£¬²¢¶ÔÒªÇóÌṩÃô¸ÐÐÅÏ¢µÄÒ쳣ϵͳÌáÐѼá³ÖСÐÄ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-crocodilus-malware-steals-android-users-crypto-wallet-keys/
2. Oracle Health¾ÉЧÀÍÆ÷ÔâÈëÇÖÖÂÃÀ¶à¼ÒÒ½Ôº»¼ÕßÊý¾Ýй¶
3ÔÂ28ÈÕ£¬£¬£¬£¬£¬×ÅÃûÒ½ÁÆÐÅÏ¢»¯Ð§ÀÍÉÌOracle Health£¨Ç°ÉíΪCerner£©È·ÈÏÆäÒÅÁôЧÀÍÆ÷ÔâδÊÚȨ»á¼û£¬£¬£¬£¬£¬µ¼Ö¶à¼ÒÃÀ¹úÒ½ÁÆ»ú¹¹»¼ÕßÊý¾Ýй¶¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃй¶µÄ¿Í»§Æ¾Ö¤ÓÚ2025Äê1ÔÂÈëÇÖδǨáãÖÁOracle CloudµÄ¾É°æCernerЧÀÍÆ÷£¬£¬£¬£¬£¬ÇÔÈ¡ÁË¿ÉÄܰüÀ¨µç×Ó¿µ½¡¼Í¼£¨EHR£©µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜOracleÔÚ˽ÃÜ֪ͨÖнö±íÊöΪ"²¿·ÖÊý¾ÝÊÜÓ°Ïì"£¬£¬£¬£¬£¬µ«¶à¸öÐÂÎÅԴ֤ʵ»¼ÕßÐÅϢȷÒѱ»µÁ¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶OracleÔÚΣ»£»£»£»£»£»£»ú´¦Öóͷ£ÖеÄ͸Ã÷¶Èȱ·¦£ºÊÜÓ°ÏìÒ½ÔºÊÕµ½µÄ֪ͨ½ÓÄÉͨË×°×Ö½¶ø·Ç¹Ù·½Ðż㣬£¬£¬£¬£¬ÇÒ¹«Ë¾Î´¹ûÕæÈÏ¿ÉÇ徲Υ¹æ¡£¡£¡£¡£¸üÒý·¢¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬ÍþвÐÐΪÕß"°²µÂ³"ͨ¹ýÃ÷ÍøÍøÕ¾ÊµÑéÀÕË÷£¬£¬£¬£¬£¬ÒªÇóÊý°ÙÍòÃÀÔª¼ÓÃÜÇ®±ÒÒÔ×èÖ¹Êý¾Ý¹ûÕæ£¬£¬£¬£¬£¬Æä¹¥»÷ÊÖ·¨ÓëÒÑÖªÀÕË÷ÍÅ»ïÎÞ¹ØÁª¡£¡£¡£¡£Ò½ÁÆ»ú¹¹±»ÆÈ×ÔÐÐÆÀ¹ÀÊÇ·ñÎ¥·´HIPAA¹æÔò²¢³Ðµ£»£»£»£»£»£»£»¼Õß֪ͨÔðÈΣ¬£¬£¬£¬£¬¶øOracle½öÌṩÓÐÏÞÐÖúÄ£°åºÍÓöÈÅâ³¥¡£¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬£¬£¬£¬¹¥»÷Õß½«ÍµÈ¡Êý¾Ý×ªÒÆÖÁÔ¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬Æä×÷°¸ÊÖ·¨Óë½üÆÚOracle CloudÁªºÏµ¥µãµÇ¼£¨SSO£©Ð§ÀÍÆ÷ÔâÈëÇÖÊÂÎñ±£´æÇ±ÔÚ¹ØÁª¡£¡£¡£¡£´ËǰÍþвÕßÔøÐû³ÆÇÔÈ¡600ÍòÌõLDAPÈÏÖ¤Êý¾Ý£¬£¬£¬£¬£¬Ö»¹ÜOracle¹Ù·½·ñ¶¨£¬£¬£¬£¬£¬µ«¿Í»§ÑéÖ¤Ñù±¾Ö¤ÊµÊý¾ÝÓÐÓÃÐÔ¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬OracleÔÚ´¦Öóͷ£Á½ÆðÊÂÎñÖеÄÐÅÏ¢¹Ø±ÕÕ½ÂÔ£¬£¬£¬£¬£¬¿ÉÄܼӾçÒ½Áƿͻ§ÔںϹæÓ¦¶ÔºÍ»¼ÕßÐÅÈÎÖØÐÞÖеÄÄæ¾³¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
3. GrandoreiroľÂíÔÙ·¢È«Çò´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬Î±×°Ë°ÎñÇÔÈ¡½ðÈÚÊý¾Ý
3ÔÂ28ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Forcepoint½üÆÚÐû²¼µÄÍþвÇ鱨ÏÔʾ£¬£¬£¬£¬£¬ºã¾Ã»îÔ¾µÄGrandoreiroÒøÐÐľÂíÕýͨ¹ýÐÂÐÍÍøÂç´¹ÂÚ¹¥ÊƶÔÈ«Çò½ðÈÚϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô2016ÄêÊ×´ÎÏÖÉí°ÍÎ÷ºó£¬£¬£¬£¬£¬Öð²½½«¹¥»÷¹æÄ£À©Õ¹ÖÁÄ«Î÷¸ç¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀµÈÀÃÀ¼°Å·ÖÞ¹ú¼Ò£¬£¬£¬£¬£¬²¢ÔÚ2024Äê½øÒ»²½½«Ä¿µÄËø¶¨ÑÇÖÞ½ðÈÚ»ú¹¹£¬£¬£¬£¬£¬ÐγÉÁýÕÖ1700¼ÒÒøÐм°276¸ö¼ÓÃÜÇ®°üµÄÈ«Çò¹¥»÷ÍøÂç¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬Grandoreiro½ÓÄÉ"¶ñÒâÈí¼þ¼´Ð§ÀÍ"£¨MaaS£©ÉÌҵģʽÔËÓª£¬£¬£¬£¬£¬Æä±³ºóµÄTetrade·¸·¨¼¯Íż´±ãÔÚ2021ÄêÓë2024Äê¶à´ÎÖ´·¨¹¥»÷ÖгÉÔ±Ôâ²¶£¬£¬£¬£¬£¬ÈÔÒ»Á¬¸üй¥»÷ÊÖ·¨¡£¡£¡£¡£×îй¥»÷»î¶¯Ê¹ÓÃOVHcloud»ù´¡Éèʩαװ˰Îñ·£¿£¿£¿£¿£¿£¿î֪ͨ£¬£¬£¬£¬£¬Í¨¹ýMediafireƽ̨·Ö·¢µÄPDFÎĵµ¼ÓÔØ¶ñÒâÔØºÉ£¬£¬£¬£¬£¬Êܺ¦ÕßÊÕµ½µÄ»ìÏýÐÍVisual Basic¾ç±¾ÓëÐéαDelphi¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬¿ÉÇÔÈ¡ÕË»§Æ¾Ö¤²¢Í¨¹ý¼ÓÃÜѹËõÎļþ¹æ±ÜÇå¾²¼ì²â¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬£¬¸ÃľÂíÕ¹ÏÖ³ö¸ß¶ÈÄ£¿£¿£¿£¿£¿£¿é»¯µÄ¹¥»÷ÌØÕ÷£ºÖ´Ðк󲻵«ÇÔÈ¡Óû§Æ¾Ö¤£¬£¬£¬£¬£¬»¹»áɨÃè±ÈÌØ±ÒÇ®°ü·¾¶²¢Óë¹¥»÷Õß¿ØÖƵÄcontaboserver[.]net×ÓÓòÃû½¨ÉèC&CͨѶ£¬£¬£¬£¬£¬Í¨¹ýƵÈÔÌæ»»×ÓÓòÃûÓòÃûÀ´ÌÓ±Ü×·×Ù¡£¡£¡£¡£ForcepointÌØÊâÇ¿µ÷£¬£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓÃÕýµ±ÍйÜЧÀÍContaboµÄÐÅÓþʵÑé·¸·¨£¬£¬£¬£¬£¬Í¹ÏÔÁËÍøÂç·¸·¨Á´ÌõÖлù´¡ÉèÊ©ÀÄÓõÄÐÂÇ÷ÊÆ¡£¡£¡£¡£
https://www.securityweek.com/fresh-grandoreiro-banking-trojan-campaigns-target-latin-america-europe/
4. Twitter(X)ÉæÏÓÄÚ²¿Ö°Ô±²Ù×÷µ¼ÖÂ28ÒÚСÎÒ˽¼Ò×ÊÁÏÊý¾Ýй¶
3ÔÂ29ÈÕ£¬£¬£¬£¬£¬É罻ýÌåÆ½Ì¨X£¨ÔTwitter£©ÔâÓöÊ·ÉÏ×î´ó¹æÄ£Óû§Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Éæ¼°¸ß´ï28ÒÚÓû§ÐÅÏ¢£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÖÁ½ñδ×÷¹Ù·½»ØÓ¦¡£¡£¡£¡£Çå¾²ÉçÇøBreach ForumsÉÏ£¬£¬£¬£¬£¬Óû§ThinkingOneÐû²¼ÉùÃ÷³Æ£¬£¬£¬£¬£¬´Ë´Îй¶ԴÓÚX¹«Ë¾²ÃÈËʱ´úijԱ¹¤µÄ²»ÂúÐÐΪ£¬£¬£¬£¬£¬²¢ÌṩÁ˰üÀ¨400GBÔʼÊý¾ÝµÄÖ¤¾Ý¡£¡£¡£¡£´Ë´ÎÊÂÎñÓë2023Äêй¶ÐγÉÏÊÃ÷±ÈÕÕ¡£¡£¡£¡£2023ÄêËê¼þÉæ¼°2.09ÒÚÓû§£¬£¬£¬£¬£¬Ö÷Ҫ̻¶µç×ÓÓʼþ¡¢Óû§ÃûµÈ¹ûÕæÐÅÏ¢£¬£¬£¬£¬£¬X¹«Ë¾ÆäʱÒÔ"ÎÞÃô¸ÐÊý¾Ý"ΪÓɵ»¯Ó°Ïì¡£¡£¡£¡£¶ø2025Äêй¶Ëä²»º¬µç×ÓÓʼþ£¬£¬£¬£¬£¬È´°üÀ¨Óû§ID¡¢ÕË»§½¨ÉèÈÕÆÚ¡¢µØÀíλÖá¢ÍÆÎÄÀúÊ·µÈ¶¯Ì¬ÔªÊý¾Ý£¬£¬£¬£¬£¬ÊµÖʹ¹½¨ÁËÓû§ÐÐΪµÄȫά¶È»Ïñ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ThinkingOne½«Á½´Îй¶Êý¾ÝºÏ²¢ÌìÉú34GBÊý¾Ý¼¯£¬£¬£¬£¬£¬µ¼Ö¹«ÖÚÎóÅÐ2025Äêй¶°üÀ¨ÓʼþÐÅÏ¢¡£¡£¡£¡£ÏÖʵÉÏ£¬£¬£¬£¬£¬ÓʼþÊý¾Ý½öÀ´×Ô2023ÄêËê¼þ¡£¡£¡£¡£ÕâÖÖ»ìÏý²Ù×÷·Å´óÁËÊÂÎñÓ°Ï죬£¬£¬£¬£¬Òý·¢¶ÔÊý¾ÝÍêÕûÐÔµÄÖÊÒÉ¡£¡£¡£¡£¹ØÓÚ28ÒÚÓû§µÄÒì³£Êý×Ö£¬£¬£¬£¬£¬Ç徲ר¼ÒÖ¸³ö¿ÉÄܱ£´æ¶àÖØÍ³¼ÆÎó²î£º°üÀ¨ÒÑɾ³ýÕË»§¡¢»úеÈËÕ˺š¢APIЧÀÍÕ˺ŵȷÇÕæÊÊÓû§ÊµÌ壬£¬£¬£¬£¬»òÊÇÀúÊ·Êý¾Ýµþ¼Óµ¼ÖÂÖØ¸´¼ÆÊý¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ThinkingOneµÄÊý¾ÝȪԴÈÔ´æÒÉ£¬£¬£¬£¬£¬ÆäÉí·Ý¸üÆ«ÏòÊý¾ÝÆÊÎöʦ¶ø·Ç¹Å°åºÚ¿Í£¬£¬£¬£¬£¬Æä»ñȡ;¾¶¿ÉÄÜÉæ¼°ÄÚ²¿Ð¹ÃÜ»òÖØ´óµÄÊý¾Ý¾ÛºÏ¡£¡£¡£¡£
https://hackread.com/twitter-x-of-2-8-billion-data-leak-an-insider-job/
5. ɽķ»áÔ±µêÊÓ²ìClopÀÕË÷Èí¼þ£¬£¬£¬£¬£¬ÁãÈÕÎó²îÍþвÊý¾ÝÇå¾²
3ÔÂ28ÈÕ£¬£¬£¬£¬£¬ÎÖ¶ûÂêÆìϲִ¢ÁãÊÛ¾Þͷɽķ»áÔ±ÊÐËÁ£¨Sam's Club£©ÕýÃæÁÙClopÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖÖ¸¿Ø£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÑÔÚÆä°µÍøÐ¹ÃÜÆ½Ì¨Ðû²¼Ïà¹ØÌõÄ¿¡£¡£¡£¡£×÷ΪȫÃÀÓµÓÐ600Óà¼ÒÃŵꡢÍâÑóÁýÕÖÖÐÄ«Á½¹úµÄ²Ö´¢Á¬ËøÆóÒµ£¬£¬£¬£¬£¬É½Ä·ÓµÓÐ230ÍòÔ±¹¤¼°843ÒÚÃÀÔªÄêÓªÒµ¶î£¬£¬£¬£¬£¬ÆäÐÅÏ¢×ʲú¼ÛֵʹÆä³ÉÎªÍøÂç·¸·¨µÄ¸ß¼ÛֵĿµÄ¡£¡£¡£¡£É½Ä·½²»°ÈË֤ʵÒÑÆô¶¯Çå¾²ÊÂÎñÊӲ죬£¬£¬£¬£¬Ç¿µ÷"¿Í»§Êý¾ÝÇå¾²ÊÇÖ÷Òª¹ØÇÐ"¡£¡£¡£¡£Ö»¹ÜÆóҵδÅû¶ÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬µ«ClopÍÅ»ïµÄÖ¸¿ØÄ£Ê½ÏÔʾÆäϰÓÃÁãÈÕÎó²îʵÑ鹩ӦÁ´¹¥»÷¡ª¡ª½ñÄêÍ·¸ÃÍÅ»ïÒÑʹÓÃCleoÎļþ´«ÊäÈí¼þµÄδÅû¶Îó²î£¨CVE-2024-50623£©ÊµÑé´ó¹æÄ£Êý¾ÝÇÔÈ¡£¡£¡£¡£¬£¬£¬£¬£¬µ¼ÖÂÎ÷²¿Í¬ÃËÒøÐеÈ4000Óà¼Ò»ú¹¹ÖÐÕС£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬Clop´Ë´Î¹¥»÷ÓëÈ¥ÄêÕë¶ÔAccellion FTAµÈÎļþ´«ÊäϵͳµÄÁãÈÕÎó²îʹÓÃÈç³öÒ»ÕÞ£¬£¬£¬£¬£¬·´Ó¦³öÆä¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¾«×¼¹¥»÷Õ½ÂÔ¡£¡£¡£¡£¶øÉ½Ä·²¢·ÇÊ×´ÎÔâÓöÇ徲Σ»£»£»£»£»£»£»ú£º2020ÄêÔø±¬·¢Æ¾Ö¤Ìî³ä¹¥»÷£¬£¬£¬£¬£¬ÆÈʹÆóÒµÖØÖÃÊýÍò¿Í»§ÃÜÂ룬£¬£¬£¬£¬Æäʱ¹«Ë¾Ç¿µ÷ϵÍⲿ´¹ÂڻËùÖ¶ø·Çϵͳ±»Í»ÆÆ¡£¡£¡£¡£Ä¿½ñÊӲ콹µãÔÚÓÚÈ·ÈÏClopÊÇ·ñÀÖ³ÉÉøÍ¸É½Ä·ÏµÍ³£¬£¬£¬£¬£¬ÒÔ¼°ÊÇ·ñʹÓÃCleoÎó²îʵÑé¹¥»÷¡£¡£¡£¡£¼øÓÚɽķ»áÔ±Êý¾Ý°üÀ¨ÏûºÄ¼Í¼µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬Ç±ÔÚй¶Σº¦¿ÉÄÜÒý·¢´ó¹æÄ£Ú²Æ¼°ºÏ¹æÎ£º¦¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/
6. Morphing Meerkat´¹ÂÚ¼´Ð§ÀÍʹÓÃDoHÓëMX¼Í¼¹æ±Ü¼ì²â
3ÔÂ28ÈÕ£¬£¬£¬£¬£¬ÍøÂç·¸·¨ÁìÓò½üÆÚ¸¡ÏÖµÄ"Morphing Meerkat"´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨£¬£¬£¬£¬£¬Õ¹ÏÖ³ö¸ß¶ÈϸÃܵĹ¥»÷ÊÖÒÕÁ´¡£¡£¡£¡£¸Ã×éÖ¯×Ô2020ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬£¬£¬Í¨¹ýDNS over HTTPS£¨DoH£©¼ÓÃÜÐÒéÓëDNSÓʼþ½»Á÷£¨MX£©¼Í¼ÅÌÎʹ¹½¨¶¯Ì¬¹¥»÷»ù´¡ÉèÊ©£¬£¬£¬£¬£¬ÀÖªϰ±Ü¹Å°åÇå¾²¼à²â¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔËÓª×ŰüÀ¨114¸öÆ·ÅÆ·Âðģ°åµÄ´¹ÂÚ¹¤¾ß°ü£¬£¬£¬£¬£¬Ê¹ÓÃiomartºÍHostPapaµÄSMTPЧÀÍ·Ö·¢¶àÓïÑÔ´¹ÂÚÓʼþ¡£¡£¡£¡£¹¥»÷Óʼþ½ÓÄÉ"ÕË»§Í£ÓÃ"µÈ½ôÆÈÖ÷Ì⣬£¬£¬£¬£¬ÅäºÏ·¢¼þÈ˵صãαÔìÊÖÒÕ£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷¶ñÒâÁ´½Ó¡£¡£¡£¡£ºóÐø¹¥»÷Á´¾ÓÉÈ«ÐÄÉè¼ÆµÄ¿ª·ÅÖØ¶¨Ïò·¾¶£¬£¬£¬£¬£¬Éæ¼°±»ÈëÇÖµÄWordPressÕ¾µã¡¢ÐéαÓòÃû¼°Ãâ·ÑÍйÜЧÀÍ£¬£¬£¬£¬£¬×îÖÕͨ¹ýGoogle/CloudflareµÄDoHЧÀͼÓÔØ´¹ÂÚÒ³Ãæ¡£¡£¡£¡£ÊÖÒÕÍ»ÆÆÌåÏÖÔÚÆäË«ÖØ¹æ±ÜÕ½ÂÔ£ºÒ»·½Ã棬£¬£¬£¬£¬DoH¼ÓÃÜÅÌÎÊʹDNSÁ÷Á¿ÆÊÎöʧЧ£»£»£»£»£»£»£»ÁíÒ»·½Ã棬£¬£¬£¬£¬ÊµÊ±ÆÊÎöÊܺ¦ÕßÓÊÏäÓòµÄMX¼Í¼£¬£¬£¬£¬£¬¶¯Ì¬ÌìÉúÓëÆäÓʼþЧÀÍÉÌÆ¥ÅäµÄ´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¹¥»÷ÕßÉõÖÁÉèÖÃ"ÃÜÂë¹ýʧ"ÐéαÌáÐÑ£¬£¬£¬£¬£¬ÓÕÆÓû§Öظ´Ìύƾ֤£¬£¬£¬£¬£¬²¢Í¨¹ýAJAXÇëÇóÓëPHP¾ç±¾¼´Ê±»Ø´«Êý¾Ý£¬£¬£¬£¬£¬¸¨ÒÔTelegram»úеÈËʵÏÖʵʱÊý¾Ýת·¢¡£¡£¡£¡£·ÀÓùÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬ÆóÒµÓ¦ÔöÇ¿DNS²ã¹Ü¿Ø£¬£¬£¬£¬£¬ÏÞÖÆ·ÇÓªÒµÏà¹ØµÄDoHͨѶ£¬£¬£¬£¬£¬×è¶ÏÓë¹ã¸æÊÖÒÕ¡¢Îļþ¹²ÏíµÈ¸ßΣº¦»ù´¡ÉèÊ©µÄ½»»¥¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phishing-as-a-service-operation-uses-dns-over-https-for-evasion/