FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß
Ðû²¼Ê±¼ä 2025-04-221. FogÀÕË÷Èí¼þʹÓÃDOGEÖ÷ÌâÀÕË÷ÐŹ¥»÷Êܺ¦Õß
4ÔÂ22ÈÕ£¬£¬£¬£¬FogÀÕË÷Èí¼þÔËÓªÉ̽üÆÚʹÓÃDOGEÖ÷ÌâÀÕË÷Ðż¥Ð¦Êܺ¦Õߣ¬£¬£¬£¬ÌṩÃ⺬»ìÃÜÃÜÔ¿ÒÔ»»È¡¶ñÒâÈí¼þÈö²¥¡£¡£¡£¡£¡£ÓëÔçÆÚÒÀÀµ±»µÁVPNƾ֤²î±ð£¬£¬£¬£¬×îй¥»÷ʼÓÚ°üÀ¨¡°Pay Adjustment.zip¡±µÄÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬ÄÚº¬¶ñÒâLNKÎļþ£¬£¬£¬£¬µã»÷ºó´¥·¢Ò»ÏµÁвÙ×÷½«ÀÕË÷Èí¼þÖ²Èëϵͳ¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬×Ô½ñÄê1ÔÂÒÔÀ´£¬£¬£¬£¬¸ÃÈí¼þÒÑѬȾ100ÃûÊܺ¦Õߣ¬£¬£¬£¬2Ô·Ý×î¶à£¬£¬£¬£¬Îª53ÈË£»£»£»£»×Ô2024Äê6ÔÂÒÔÀ´£¬£¬£¬£¬ÔÚ¿Í»§Öмì²âµ½173ÆðÏà¹ØÀÕË÷»î¶¯¡£¡£¡£¡£¡£´ó¶¼Êܺ¦ÕßÀ´×ԿƼ¼¡¢ÖÆÔì¡¢½ÌÓýºÍ½»Í¨ÔËÊäÐÐÒµ¡£¡£¡£¡£¡£Ð¹¥»÷ÖУ¬£¬£¬£¬¶ñÒâLNKÎļþÏÂÔØPowerShell¾ç±¾£¬£¬£¬£¬¼ìË÷ÀÕË÷Èí¼þÏÂÔØ³ÌÐò¼°¶à¸öÆäËû¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£ÕâЩ¾ç±¾°üÀ¨ÍøÂçϵͳÐÅÏ¢¡¢ºáÏòÒÆ¶¯¹¤¾ß¼°·¿ª¶þάÂëµÄ¾ç±¾£¬£¬£¬£¬Êܺ¦Õß¿ÉÓøöþάÂëÖ§¸¶Êê½ð¡£¡£¡£¡£¡£³õʼPowerShell¾ç±¾»¹·¿ªÕþÖÎÖ÷ÌâYouTubeÊÓÆµ²¢°üÀ¨ÊéÃæÕþÖÎ̸ÂÛ¡£¡£¡£¡£¡£³õʼÊê½ð֪ͨÌá¼°DOGE£¬£¬£¬£¬ÉõÖÁDOGEÊÂÇéÖ°Ô±£¬£¬£¬£¬ÒªÇóÊܺ¦ÕßÁгöÎåÏîʹÃü£¬£¬£¬£¬²»È»Ö§¸¶Ò»ÍòÒÚÃÀÔªÊê½ð¡£¡£¡£¡£¡£ÍþвÕßÌåÏÖ£¬£¬£¬£¬ÈôÊܺ¦Õß½«¶ñÒâÈí¼þ·¢Ë͸øËûÈË£¬£¬£¬£¬¼´¿ÉÃ⺬»ìÃÜϵͳ¡£¡£¡£¡£¡£FogÀÕË÷Èí¼þÊÇÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬ÆóÒµ±ØÐ轫ÆäÌí¼Óµ½¼à¿ØÁбíÖС£¡£¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/fog-hackers-doge-ransom-notes
2. RustoBot½©Ê¬ÍøÂçʹÓ÷ÓÉÆ÷Îó²î·¢¶¯¹¥»÷
4ÔÂ22ÈÕ£¬£¬£¬£¬FortiGuard Labs½üÆÚ·¢Ã÷RustoBot£¬£¬£¬£¬ÕâÒ»ÓÃRust±àдµÄÖØ´ó½©Ê¬ÍøÂçÕýʹÓÃTOTOLINKºÍDrayTek·ÓÉÆ÷Îó²î£¬£¬£¬£¬ÔÚÈÕ±¾¡¢Ì¨Íå¡¢Ô½ÄϺÍÄ«Î÷¸çµÄÊÖÒÕ»ù´¡ÉèÊ©ÖÐËÁŰ¡£¡£¡£¡£¡£2025ÄêÍ·£¬£¬£¬£¬¹¥»÷ʵÑé¼±¾çÔöÌí£¬£¬£¬£¬Ä¿µÄÖ±Ö¸TOTOLINK cstecgi.cgi¾ç±¾Öеĺã¾ÃÎó²î£¬£¬£¬£¬ÕâЩÎó²îÉæ¼°ÉèÖøü¸ÄºÍÉí·ÝÑéÖ¤£¬£¬£¬£¬±£´æ¶à¸öÏÂÁî×¢Èëµã£¬£¬£¬£¬°üÀ¨CVE-2022-26210¡¢CVE-2022-26187ÒÔ¼°Ó°ÏìDrayTek·ÓÉÆ÷µÄCVE-2024-12987¡£¡£¡£¡£¡£ÕâЩÈõµãʹ¹¥»÷Õß»ñµÃÔ¶³Ì´úÂëÖ´ÐÐÄÜÁ¦£¬£¬£¬£¬ÎªRustoBotѬȾÆÌƽõè¾¶¡£¡£¡£¡£¡£Ò»µ©»ñµÃ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬RustoBot±ãͨ¹ýËĸöÏÂÔØ¾ç±¾Ö®Ò»¾ÙÐа²ÅÅ£¬£¬£¬£¬Ö§³Ö¶àÖּܹ¹£¬£¬£¬£¬È·±£ÓëÒ×Êܹ¥»÷µÄ·ÓÉÆ÷ÆÕ±é¼æÈÝ¡£¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚʹÓÃRustÓïÑÔ£¬£¬£¬£¬¶þ½øÖƽṹͨ¹ýXOR¼ÓÃܺÍGOT²Ù×÷¾ÙÐлìÏý£¬£¬£¬£¬ÊµÏÖÒþÉíÐÔ£¬£¬£¬£¬²¢Ê¹ÄæÏò¹¤³ÌÖØ´ó»¯¡£¡£¡£¡£¡£½âÃܺóµÄÉèÖÃÕ¹ÏÖ£¬£¬£¬£¬RustoBotÖ´ÐÐÁ½Ïî½¹µã¶ñÒâ²Ù×÷£ºÆÊÎö¶à¸öC2ÓòÃû£¬£¬£¬£¬²¢Æ¾Ö¤ÏÂÁîÌᳫDDoS¹¥»÷¡£¡£¡£¡£¡£RustoBot»î¶¯ÒÑÓ°Ïì¶à¿îTOTOLINKºÍDrayTek·ÓÉÆ÷Ðͺţ¬£¬£¬£¬Êܺ¦ÕßÖ÷ҪλÓڿƼ¼ÁìÓò£¬£¬£¬£¬Åú×¢¹¥»÷¿ÉÄܾßÓÐÕë¶ÔÐÔ¡£¡£¡£¡£¡£
https://securityonline.info/rustobot-botnet-exploits-router-flaws-in-sophisticated-attacks/
3. WordPress¹ã¸æÚ²Æ²å¼þÌìÌ챬·¢14ÒÚ¸ö¹ã¸æÇëÇó
4ÔÂ21ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Ò»¸öÃûΪ¡°Scallywag¡±µÄ´ó¹æÄ£¹ã¸æÚ²Æ×éÖ¯¸¡³öË®Ãæ£¬£¬£¬£¬¸Ã×é֯ͨ¹ý¶¨ÖÆWordPress²å¼þ£¬£¬£¬£¬½«µÁ°æºÍURLËõ¶ÌÍøÕ¾Ç®±Ò»¯£¬£¬£¬£¬ÖðÈÕ±¬·¢ÊýÊ®ÒÚ¸öÚ²ÆÇëÇ󡣡£¡£¡£¡£ScallywagÓÉ»úеÈ˺ÍڲƼì²â¹«Ë¾HUMAN·¢Ã÷£¬£¬£¬£¬Æä±³ºóÊÇÒ»¸öÓÉ407¸öÓòÃû×é³ÉµÄÖØ´óÍøÂ磬£¬£¬£¬ÖðÈÕÚ²Æ¹ã¸æÇëÇó·åÖµ¸ß´ï14ÒÚÌõ¡£¡£¡£¡£¡£Ö»¹ÜHUMAN½ÓÄɲ½·¥Ê¹ScallywagÁ÷Á¿ïÔÌ95%£¬£¬£¬£¬µ«¸Ã×é֯ͨ¹ýÂÖ»»ÓòÃûºÍµ÷½âÇ®±Ò»¯Ä£Ê½Õ¹ÏÖ³öǿʢÈÍÐÔ¡£¡£¡£¡£¡£Scallywag»ùÓÚËĸöWordPress²å¼þ¹¹½¨£¬£¬£¬£¬°üÀ¨Soralink¡¢Yu Idea¡¢WPSafeLinkºÍDroplink£¬£¬£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´Ó¸ßΣº¦¡¢µÍÖÊÁ¿ÍøÕ¾×¬Ç®µÄ;¾¶¡£¡£¡£¡£¡£ÕâЩ²å¼þ½µµÍÁËDZÔÚÍþвÐÐΪÕߵĽøÈëÃż÷£¬£¬£¬£¬ÉõÖÁÓÐÈËÔÚYouTubeÉÏÐû²¼²Ù×÷½Ì³Ì¡£¡£¡£¡£¡£Óû§»á¼ûµÁ°æÄ¿Â¼ÍøÕ¾Ê±£¬£¬£¬£¬µã»÷ǶÈëµÄURLËõ¶ÌÁ´½Ó£¬£¬£¬£¬»á±»Öض¨ÏòÖÁÖÐÐĹãÃÜ¸æ¼¯Ò³Ãæ£¬£¬£¬£¬ÎªScallywagÔËÓªÉ̱¬·¢Ú²ÆÐÔÓ¡Ï󣬣¬£¬£¬×îÖÕ½øÈëÔÊÐíÄÚÈݵÄÒ³Ãæ¡£¡£¡£¡£¡£ÕâЩÖÐÐÄÍøÕ¾ÔËÐÐScallywag²å¼þ£¬£¬£¬£¬ÈÏÕæ´¦Öóͷ£Öض¨ÏòÂß¼¡¢¹ã¸æ¼ÓÔØµÈ£¬£¬£¬£¬ÒÔÔÚ¹ã¸æÆ½Ì¨¼ì²éÖÐαװ³ÉÕý³£²©¿Í¡£¡£¡£¡£¡£HUMAN̫ͨ¹ýÎöÁ÷Á¿Ä£Ê½¼ì²âScallywag»î¶¯£¬£¬£¬£¬²¢Óë¹ã¸æÌṩÉÌÏàÖú×èÖ¹¶Ô¹ã¸æÇëÇóµÄ¾º±ê£¬£¬£¬£¬ÇÐ¶ÏÆäÊÕÈëȪԴ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/scallywag-ad-fraud-operation-generated-14-billion-ad-requests-per-day/
4. ÐÂÐͶñÒâÈí¼þResolverRATÍþвҽÁÆÓëÖÆÒ©ÐÐÒµ
4ÔÂ21ÈÕ£¬£¬£¬£¬MorphisecÍþвʵÑéÊÒ·¢Ã÷ÁËÒ»ÖÖÐÂÐÍÖØ´ó¶ñÒâÈí¼þResolverRAT£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÕýÆð¾¢Õë¶ÔÒ½ÁƱ£½¡ºÍÖÆÒ©ÐÐÒµÕö¿ª¹¥»÷£¬£¬£¬£¬×î½üÒ»²¨¹¥»÷¼¯ÖÐÔÚ2025Äê3ÔÂ10ÈÕ×óÓÒ¡£¡£¡£¡£¡£ResolverRATÒÀ¸½ÆäÏȽøµÄÊÖÒÕÊֶΣ¬£¬£¬£¬ÈçÄÚ´æÖ´ÐС¢¶¯Ì¬×ÊÔ´´¦Öóͷ£¼°¶à²ã¹æ±ÜÊÖÒÕ£¬£¬£¬£¬Ê¹µÃ¹Å°å¼ì²âÒªÁìÄÑÒÔ×àЧ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬Ê¹ÓýôÆÈ¸Ð»ò¿Ö¾å¸ÐÓÕµ¼ÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó£¬£¬£¬£¬½ø¶ø´¥·¢Ñ¬È¾Àú³Ì¡£¡£¡£¡£¡£¹¥»÷¸ß¶ÈÍâµØ»¯£¬£¬£¬£¬Óʼþ½ÓÄÉÄ¿µÄ¹ú¼ÒĸÓï׫д£¬£¬£¬£¬Ö÷ÌâÉæ¼°Ö´·¨ÊÓ²ì»ò°æÈ¨ÇÖȨ£¬£¬£¬£¬Ö¼ÔÚͨ¹ý¸öÐÔ»¯¶¨Î»Ìá¸ßѬȾÀÖ³ÉÂÊ¡£¡£¡£¡£¡£Ñ¬È¾Ê¼ÓÚDLL²àÔØÊÖÒÕ£¬£¬£¬£¬½«¶ñÒâDLLÎļþÓëÕýµ±³ÌÐò£¨Èç hpreader.exe£©Ò»Í¬°²ÅÅ£¬£¬£¬£¬µ±³ÌÐòÖ´ÐÐʱ£¬£¬£¬£¬¶ñÒâDLL±»ÇÄÇļÓÔØ£¬£¬£¬£¬´Ó¶øÆô¶¯¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ResolverRAT ½ÓÄɶà²ã¹æ±ÜÊÖÒÕ£¬£¬£¬£¬°üÀ¨´úÂë»ìÏýºÍ×Ô½ç˵ÐÒéÀ´»ìÏýÍøÂçÁ÷Á¿£¬£¬£¬£¬Ö±½ÓÔÚÄÚ´æÖÐÖ´ÐжñÒâ´úÂ룬£¬£¬£¬²¢ÔÚÔËÐÐʱ¶¯Ì¬Ê¶±ðºÍʹÓÃϵͳº¯Êý¡£¡£¡£¡£¡£ÎªÈ·¼á³¤ÆÚÐÔ£¬£¬£¬£¬ResolverRAT ÔÚ Windows ×¢²á±íÖн¨Éè¶à¸öÌõÄ¿£¬£¬£¬£¬²¢ÔÚ¶à¸öλÖÃ×°ÖÃ×ÔÉí¸±±¾¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ëü»¹Ê¹ÓÃÆæÒìµÄÖ¤ÊéÑéÖ¤ÒªÁìºÍ¡°.NET ×ÊÔ´ÆÊÎöÆ÷Ð®ÖÆ¡±ÊÖÒÕÀ´ÒþÉí£¬£¬£¬£¬²¢ÊµÑé¶ÔÆÊÎöÇéÐξÙÐÐÖ¸ÎÆÊ¶±ð£¬£¬£¬£¬ÒÔÔÚ¼ì²âµ½±»¼ì²éʱ¸Ä±äÐÐΪ¡£¡£¡£¡£¡£
https://hackread.com/native-language-phishing-resolverrat-healthcare/
5. Õ©Æ·Ö×Óð³äFBI IC3Ô±¹¤ÇÔÈ¡ÄúµÄ²ÆÎñÐÅÏ¢
4ÔÂ19ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬FBIÐû²¼Õ©Æ¾¯±¨£¬£¬£¬£¬Õ¹ÏÖÕ©Æ·Ö×ÓÕýð³äFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐÄ(IC3)Ö°Ô±£¬£¬£¬£¬ÒÔ×·»ØËðʧ×ʽðΪÓÕ¶ü£¬£¬£¬£¬ÇÔÈ¡Êܺ¦Õß²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£×Ô2023Äê12ÔÂÖÁ2025Äê2Ô£¬£¬£¬£¬FBIÒÑÊÕµ½100¶àÆðÏà¹Ø±¨¸æ¡£¡£¡£¡£¡£Õ©ÆÕß³£Ãé×¼ÍøÂç½ðÈÚÕ©ÆÊܺ¦ÕßµÄÉç½»ÍøÂç»òÔÚÏßÂÛ̳£¬£¬£¬£¬ÓÐʱð³äÕæÊµÉí·Ý»òʹÓÃÐéαƾ֤¡£¡£¡£¡£¡£ËùÓÐȦÌ×¾ùÉæ¼°ÒÔijÖÖÐÎʽ×ÊÖúÊܺ¦Õß×·»ØËðʧ£¬£¬£¬£¬Ö»¹Ü×î³õÁªÏµ·½·¨¸÷Ò죬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢µç»°¡¢É罻ýÌå»òÂÛ̳¡£¡£¡£¡£¡£ÔÚijЩ°¸ÀýÖУ¬£¬£¬£¬Õ©ÆÕßÉõÖÁÉù³ÆÉ¥Ê§×ʽð¾ÍÔÚËûÃÇÊÖÖС£¡£¡£¡£¡£ËûÃÇͨ¹ý½¨ÉèÐéαСÎÒ˽¼Ò×ÊÁÏ£¬£¬£¬£¬¼ÓÈëÔÚÏß½ðÈÚÕ©ÆÍŻ£¬£¬£¬²¢½¨ÒéÊܺ¦ÕßÁªÏµÃ°³äµÄIC3¡°Ê×ϯִÐй١±»ñÈ¡×ÊÖú¡£¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÖмƣ¬£¬£¬£¬Õ©ÆÕß±ãÉù³ÆÒѻָ´×ʽ𣬣¬£¬£¬²¢½è´Ë»ñÈ¡Æä²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬ÕâЩÍýÏë²»µ«ÓÕÆºÍÕ©ÆÄ¿µÄ£¬£¬£¬£¬»¹Ê¹ËûÃÇÔٴγÉΪÊܺ¦Õß¡£¡£¡£¡£¡£ÎªÌá·À´ËÀàÕ©Æ£¬£¬£¬£¬FBIÌáÐѹ«ÖÚ£¬£¬£¬£¬IC3¾ø²»»áͨ¹ýµç»°¡¢µç×ÓÓʼþ¡¢É罻ýÌåµÈÖ±½ÓÓëСÎÒ˽¼ÒÏàͬ£¬£¬£¬£¬Ò²²»»áÒªÇ󸶿îÀ´×·»ØËðʧ×ʽ𣬣¬£¬£¬¸ü²»»á½«Êܺ¦Õßת½é¸øÒªÇ󸶿îµÄ¹«Ë¾¡£¡£¡£¡£¡£¹«ÖÚÓ¦Ìá¸ßСÐÄ£¬£¬£¬£¬ÇÐÎðÓë½öÔÚÍøÉÏ»òµç»°ÖÐÊìϤµÄÈË·ÖÏíÃô¸ÐÐÅÏ¢»ò·¢ËÍÇ®²Æ¡£¡£¡£¡£¡£ÈçÐè¾Ù±¨ÍøÂçڲƣ¬£¬£¬£¬¿É»á¼ûFBI»¥ÁªÍø·¸·¨Í¶ËßÖÐÐĹÙÍø¡£¡£¡£¡£¡£
https://cybernews.com/security/fbi-alert-ic3-impersonation-scam-recover-lost-funds-steal-financial-info/
6. ºÚ¿ÍʹÓÃGoogleϵͳÈõµãʵÑéDKIMÖØ·ÅÍøÂç´¹ÂÚ¹¥»÷
4ÔÂ20ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬ºÚ¿ÍʹÓÃGoogleϵͳÈõµã£¬£¬£¬£¬ÌᳫÁËÒ»³¡ÇÉÃîµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÒ»·â¿´ËÆÀ´×Ô¡°no-reply@google.com¡±µÄÐéαµç×ÓÓʼþ£¬£¬£¬£¬ÀÖ³ÉÈÆ¹ýËùÓÐÑéÖ¤£¬£¬£¬£¬Ö¸ÏòÒ»¸öÍøÂçµÇ¼ÐÅÏ¢µÄÚ²ÆÒ³Ãæ¡£¡£¡£¡£¡£¸ÃÓʼþ²»µ«Í¨¹ýÁËDKIMÉí·ÝÑéÖ¤£¬£¬£¬£¬ÇÒÄÚÈÝÏÕЩÓë¹È¸è¹Ù·½Çå¾²¾¯±¨ÎÞÒ죬£¬£¬£¬¼«Ò×ÓÕÆÊÖÒÕˮƽ½ÏµÍµÄÓû§¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ENSÊ×ϯ¿ª·¢Ö°Ô±Äá¿Ë¡¤Ô¼º²Ñ·ÃôÈñµØ·¢Ã÷£¬£¬£¬£¬Ðéα֧³ÖÃÅ»§ÍйÜÔÚsites.google.comÉÏ£¬£¬£¬£¬¶ø·ÇÕæÕýµÄaccounts.google.com£¬£¬£¬£¬´Ó¶øÊ¶ÆÆÁËȦÌס£¡£¡£¡£¡£¹¥»÷ÕßÇÉÃîµØ×¢²áÁËÒ»¸öÓòÃû£¬£¬£¬£¬²¢ÒÔ¡°me@domain¡±½¨ÉèGoogleÕÊ»§£¬£¬£¬£¬Ëæºó½¨ÉèÁËÒ»¸öGoogle OAuthÓ¦Ó㬣¬£¬£¬½«´¹ÂÚÓʼþÃüÃûΪ¸ÃÓ¦Óᣡ£¡£¡£¡£µ±¹¥»÷ÕßÊÚÓèÆäOAuthÓ¦Óûá¼ûGoogle WorkspaceÖеç×ÓÓʼþµØµãµÄȨÏÞʱ£¬£¬£¬£¬Google×Ô¶¯·¢ËÍÁËÇå¾²¾¯±¨£¬£¬£¬£¬¸Ã¾¯±¨ÒòʹÓÃÓÐÓõÄDKIMÃÜÔ¿ÊðÃû¶øÍ¨¹ýÁËËùÓмì²é¡£¡£¡£¡£¡£¹¥»÷ÕßËæºó½«Çå¾²¾¯±¨×ª·¢¸øÊܺ¦Õߣ¬£¬£¬£¬Ê¹Æä¿´ÆðÀ´ÏñÊÇÀ´×ԹȸèµÄÕýµ±Óʼþ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËGoogleϵͳµÄÈõµã£¬£¬£¬£¬¼´DKIM½ö¼ì²éÓʼþÕýÎĺÍÓʼþÍ·£¬£¬£¬£¬¶ø²»¼ì²éÐŷ⣬£¬£¬£¬Ê¹µÃαÔìÓʼþÄܹ»Í¨¹ýÊðÃûÑéÖ¤¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¹È¸èÒÑÊìϤµ½OAuthµÄÈõµã£¬£¬£¬£¬²¢ÕýÔÚÆð¾¢ÐÞ¸´¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/