ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-05-091. ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶
5ÔÂ8ÈÕ£¬£¬£¬£¬£¬½ÌÓý¾ÞÍ·ÅàÉú¼¯ÍÅÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˹«Ë¾Êý¾ÝºÍ¿Í»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£ÅàÉú¼¯ÍÅ×ܲ¿Î»ÓÚÓ¢¹ú£¬£¬£¬£¬£¬ÊÇÈ«Çò×î´óµÄѧÊõ³öÊé¡¢Êý×Öѧϰ¹¤¾ßºÍ±ê×¼»¯ÆÀ¹ÀÌṩÉÌÖ®Ò»¡£¡£¡£¡£¡£¡£ÅàÉú¼¯ÍŽÒÏþÉùÃ÷ÈÏ¿ÉÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬Êý¾Ý±»µÁ£¬£¬£¬£¬£¬µ«³Æ´ó²¿·ÖΪ¡°ÒÅÁôÊý¾Ý¡±¡£¡£¡£¡£¡£¡£ÅàÉú´ú±í֤ʵ£¬£¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄÐÐΪÕß»á¼ûÁËÆä²¿·Öϵͳ£¬£¬£¬£¬£¬Ò»µ©È·Èϸû£¬£¬£¬£¬£¬ÅàÉúÁ¬Ã¦½ÓÄɲ½·¥×èÖ¹£¬£¬£¬£¬£¬²¢Óëȡ֤ר¼ÒÏàÖúÊÓ²ìÊÂÎñ¾Óɼ°ÊÜÓ°ÏìÊý¾Ý£¬£¬£¬£¬£¬»¹ÐÖúÖ´·¨²¿·Ö¿ªÕ¹ÊӲ죬£¬£¬£¬£¬Í¬Ê±ÒÑÔÚϵͳÖа²ÅÅÌØÊâÇå¾²²½·¥£¬£¬£¬£¬£¬°üÀ¨ÔöÇ¿Çå¾²¼à¿ØºÍÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£ÅàÉú»¹Ö¤Êµ±»µÁÊý¾Ý²»°üÀ¨Ô±¹¤ÐÅÏ¢¡£¡£¡£¡£¡£¡£´ËǰÓÐÐÂÎųƣ¬£¬£¬£¬£¬ÍþвÐÐΪÕßÓÚ2025Äê1ÔÂͨ¹ýÔÚ¹«¹².git/configÎļþÖз¢Ã÷µÄ̻¶µÄGitLabСÎÒ˽¼Ò»á¼ûÁîÅÆÆÆËðÁËÅàÉúµÄ¿ª·¢ÇéÐΣ¬£¬£¬£¬£¬¸ÃÎļþÈôÎó̻¶ÇÒ°üÀ¨Ç¶ÈëÔÚÔ¶³ÌURLÖеĻá¼ûÁîÅÆ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜδ¾ÊÚȨ»á¼ûÄÚ²¿´æ´¢¿â¡£¡£¡£¡£¡£¡£ÔÚÕë¶ÔÅàÉúµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬Ì»Â¶µÄÁîÅÆÊ¹ÍþвÐÐΪÕß»á¼ûÁ˹«Ë¾Ô´´úÂ룬£¬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚÔÆÆ½Ì¨µÄ½øÒ»²½Ó²±àÂëÆ¾Ö¤ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬ËæºóÍþвÐÐΪÕßʹÓÃÕâЩƾ֤´Ó¹«Ë¾ÄÚ²¿ÍøÂçºÍÔÆ»ù´¡ÉèÊ©ÖÐÇÔÈ¡ÁËÊýTBÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨AWS¡¢Google Cloud¼°ÖÖÖÖ»ùÓÚÔÆµÄÊý¾Ý¿âЧÀÍÊý¾Ý£¬£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨¿Í»§ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢µÈ£¬£¬£¬£¬£¬Êý°ÙÍòÈËÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/
2. PyPI¾ªÏÖ¶ñÒâ°üÕë¶ÔDiscord¿ª·¢Õßϵͳ
5ÔÂ8ÈÕ£¬£¬£¬£¬£¬PythonÈí¼þ°üË÷Òý£¨PyPI£©ÉϾªÏÖÕë¶ÔDiscord¿ª·¢Ö°Ô±µÄ¶ñÒâPythonÈí¼þ°ü¡°discordpydebug¡±¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ°üαװ³ÉDiscord»úеÈË¿ª·¢Ö°Ô±µÄ¹ýʧ¼Í¼Æ÷ÊÊÓóÌÐò£¬£¬£¬£¬£¬×Ô2022Äê3ÔÂ21ÈÕÉÏ´«ÒÔÀ´£¬£¬£¬£¬£¬Òѱ»ÏÂÔØÁè¼Ý11000´Î¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Socket×îÏÈ·¢Ã÷ÕâÒ»¶ñÒâÈí¼þ£¬£¬£¬£¬£¬²¢Ö¸³öÆä¿ÉÓÃÓÚ¶ÔDiscord¿ª·¢Ö°Ô±µÄϵͳ¾ÙÐкóÃŹ¥»÷£¬£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÊý¾Ý͵ÇÔºÍÔ¶³Ì´úÂëÖ´Ðй¦Ð§¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬¸ÃÈí¼þ°üÖ÷ÒªÕë¶Ô¹¹½¨»òά»¤Discord»úеÈ˵Ŀª·¢Ö°Ô±£¬£¬£¬£¬£¬ÕâЩ¿ª·¢Ö°Ô±¿ÉÄÜ»áÔÚδ¾ÆÕ±éÉó²éµÄÇéÐÎÏÂ×°ÖôËÀ๤¾ß¡£¡£¡£¡£¡£¡£ÓÉÓÚPyPI²»»á¶ÔÉÏ´«µÄÈí¼þ°ü¾ÙÐÐÉî¶ÈÇå¾²ÉóºË£¬£¬£¬£¬£¬¹¥»÷Õß³£Ê¹ÓÃÕâÒ»µã£¬£¬£¬£¬£¬Í¨¹ýÎóµ¼ÐÔÐÎò¡¢Õýµ±Ãû³Æ»ò¸´ÖÆÊ¢ÐÐÏîÄ¿´úÂëÀ´Ê¹¶ñÒâÈí¼þ°üÏԵÿÉÐÅ¡£¡£¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬¶ñÒâÈí¼þ°ü±ã»á½«×°±¸×ª±äΪԶ³Ì¿ØÖÆÏµÍ³£¬£¬£¬£¬£¬Ö´Ðй¥»÷Õß¿ØÖƵÄÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷·¢Ë͵ÄÖ¸Áî¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý¸Ã¶ñÒâÈí¼þ»ñȡƾ֤µÈÃô¸ÐÐÅÏ¢µÄδ¾ÊÚȨ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý¡¢¼àÊÓϵͳ»î¶¯¡¢Ô¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬²¢»ñÈ¡ÓÐÖúÓÚÔÚÍøÂçÖкáÏòÒÆ¶¯µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þËäȱ·¦³¤ÆÚÐÔ»òȨÏÞÌáÉý»úÖÆ£¬£¬£¬£¬£¬µ«Ê¹ÓóöÕ¾HTTPÂÖѯ¿ÉÈÆ¹ý·À»ðǽºÍÇå¾²Èí¼þ¡£¡£¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬Ëü»á¾²Ä¬ÅþÁ¬µ½¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹¾ß±¸Í¨¹ýÌØ¶¨Òªº¦×Ö´¥·¢À´¶ÁÈ¡ºÍдÈëÖ÷»úÉÏÎļþµÄ¹¦Ð§¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-pypi-package-hides-rat-malware-targets-discord-devs-since-2022/
3. ÀÕË÷Èí¼þʹÓÃÕýµ±KickidlerÈí¼þʵÑé¹¥»÷²¢ÇÔÃÜ
5ÔÂ8ÈÕ£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ·ÖÖ§»ú¹¹QilinºÍHunters InternationalʹÓÃÕýµ±Ô±¹¤¼à¿ØÈí¼þKickidlerÕö¿ª¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ÔÚVaronisºÍSynacktivÊӲ쵽µÄ¹¥»÷ÖУ¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÖ²ÈëGoogle¹ã¸æ£¬£¬£¬£¬£¬ÓÕµ¼Óû§µã»÷ºóÌø×ªÖÁαÔìµÄRVToolsÍøÕ¾£¬£¬£¬£¬£¬´Ó¶øÏÂÔØ²¢ÔËÐб»Ä¾ÂíѬȾµÄ³ÌÐò¡£¡£¡£¡£¡£¡£¸Ã³ÌÐò×÷Ϊ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐÐSMOKEDHAM PowerShell .NETºóÃÅ£¬£¬£¬£¬£¬½ø¶øÔÚ×°±¸Éϰ²ÅÅKickidler¡£¡£¡£¡£¡£¡£Kickidler¿É²¶»ñ»÷¼ü¡¢½ØÈ¡ÆÁÄ»½ØÍ¼ºÍ½¨ÉèÆÁÄ»ÊÓÆµ£¬£¬£¬£¬£¬¹¥»÷Õß½è´Ë¼àÊÓÆóÒµÖÎÀíÔ±µÄ»î¶¯£¬£¬£¬£¬£¬»ñÈ¡ÌØÈ¨Æ¾Ö¤¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜÒÑÉñÃØ»á¼ûÊܺ¦ÕßϵͳÊýÌìÉõÖÁÊýÖÜ£¬£¬£¬£¬£¬ÒÔÊÕ¾Û»á¼ûÒìµØÔÆ±¸·ÝËùÐèµÄƾ֤¡£¡£¡£¡£¡£¡£Kickidlerͨ¹ý²¶»ñÖÎÀíÔ±ÊÂÇéÕ¾µÄ°´¼üºÍÍøÒ³£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Ê¶±ðÒìµØÔÆ±¸·Ý²¢»ñÈ¡ÃÜÂ룬£¬£¬£¬£¬ÎÞÐè½ÓÄɸßΣº¦Õ½ÂÔ¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÔËÓªÉÌÔÚ»Ö¸´¶ñÒâ»î¶¯ºó£¬£¬£¬£¬£¬°²ÅÅÕë¶ÔÊܺ¦ÕßVMware ESXi»ù´¡¼Ü¹¹µÄÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬¼ÓÃÜVMDKÐéÄâÓ²ÅÌÇý¶¯Æ÷£¬£¬£¬£¬£¬Ôì³ÉÑÏÖØÆÆË𡣡£¡£¡£¡£¡£Hunters InternationalʹÓõİ²Åž籾ʹÓÃVMware PowerCLIºÍWinSCP AutomationÀ´Ö´ÐÐÏà¹Ø²Ù×÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ï¶àÄêÀ´Ò»Ö±ÔÚÀÄÓÃÕýµ±µÄÔ¶³Ì¼à¿ØºÍÖÎÀí£¨RMM£©Èí¼þ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kickidler-employee-monitoring-software-abused-in-ransomware-attacks/
4. ¶íÕþ¸®Ö§³ÖColdRiver×é֯ʹÓÃLostKeys¶ñÒâÈí¼þÇÔÃÜ
5ÔÂ8ÈÕ£¬£¬£¬£¬£¬×Ô½ñÄêÄêÍ·Æð£¬£¬£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄColdRiverºÚ¿Í×éÖ¯Ò»Á¬Ê¹ÓÃÐÂÐÍLostKeys¶ñÒâÈí¼þ£¬£¬£¬£¬£¬¶ÔÎ÷·½Õþ¸®¡¢¼ÇÕß¡¢Öǿ⼰·ÇÕþ¸®×éÖ¯·¢¶¯Ìع¤¹¥»÷ÒÔÇÔÈ¡Îļþ¡£¡£¡£¡£¡£¡£12Ô£¬£¬£¬£¬£¬Ó¢¹úºÍÎåÑÛͬÃËÈ·ÈϸÃ×éÖ¯Óë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£¹È¸èÍþвÇ鱨С×飨GTIG£©ÓÚ1ÔÂÊ״η¢Ã÷LostKeys±»¸ß¶ÈÑ¡ÔñÐԵذ²ÅÅ£¬£¬£¬£¬£¬×÷ΪClickFixÉç»á¹¤³Ì¹¥»÷µÄÒ»²¿·Ö£¬£¬£¬£¬£¬¹¥»÷ÕßÓÕÆÄ¿µÄÔËÐжñÒâPowerShell¾ç±¾£¬£¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÌØÊâPowerShell¸ºÔØ£¬£¬£¬£¬£¬×îÖÕ°²Åű»×·×ÙΪLostKeysµÄVisual Basic Script£¨VBS£©Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£GTIGÖ¸³ö£¬£¬£¬£¬£¬LOSTKEYSÄÜ´ÓÓ²±àÂëµÄÀ©Õ¹ÃûºÍĿ¼ÁбíÖÐÇÔÈ¡Îļþ£¬£¬£¬£¬£¬²¢Ïò¹¥»÷Õß·¢ËÍϵͳÐÅÏ¢ºÍÕýÔÚÔËÐеÄÀú³Ì¡£¡£¡£¡£¡£¡£ColdRiver¹ß³£ÇÔȡƾ֤ÒÔÇÔȡĿµÄµç×ÓÓʼþºÍÁªÏµÈË£¬£¬£¬£¬£¬ÈôÐè»á¼ûÄ¿µÄϵͳÎĵµ£¬£¬£¬£¬£¬»¹»á°²ÅÅSPICA¶ñÒâÈí¼þ¾ÙÐÐÑ¡ÔñÐÔ»ñÈ¡¡£¡£¡£¡£¡£¡£LOSTKEYSÉè¼ÆÄ¿µÄÓëColdRiverÀàËÆ£¬£¬£¬£¬£¬ÇÒ½öÔÚÌØ¶¨ÇéÐÎϰ²ÅÅ¡£¡£¡£¡£¡£¡£ColdRiver×Ô2017ÄêÆð±ãʹÓÃÉç»á¹¤³ÌѧºÍ¿ªÔ´Ç鱨ÊÖÒÕÑо¿ºÍÒýÓÕÄ¿µÄ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-links-new-lostkeys-data-theft-malware-to-russian-cyberspies/
5. ÃÀ¶à²¿·Ö¾¯±¨ÓÍÆøÐÐÒµICS/SCADAÏµÍ³ÃæÁÙÍøÂç¹¥»÷Íþв
5ÔÂ7ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¾Ö£¨CISA£©¡¢Áª°îÊÓ²ì¾Ö£¨FBI£©¡¢ÇéÐα£»£»£»£»£»£»¤¾Ö£¨EPA£©ºÍÄÜÔ´²¿£¨DoE£©ÓÚÖܶþÁªºÏÐû²¼¾¯±¨£¬£¬£¬£¬£¬¾ÍÕë¶ÔÃÀ¹úʯÓͺÍ×ÔÈ»ÆøÐÐÒµµÄÍøÂç¹¥»÷·¢³öÖÒÑÔ¡£¡£¡£¡£¡£¡£Õþ¸®»ú¹¹Ö¸³ö£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Ëä½ÓÄÉ»ù±¾ÈëÇÖÊÖÒÕ£¬£¬£¬£¬£¬µ«Òªº¦»ù´¡ÉèÊ©×éÖ¯ÍøÂçÇå¾²ÎÀÉú״̬²»¼Ñ£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹ÉõÖÁÎïÀíË𻵡£¡£¡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬£¬£¬Ò»Ð©ÊÖÒÕ²»Ì«ÖØ´óµÄÍøÂçÐÐΪÕßÕýÃé×¼ÃÀ¹úÒªº¦»ù´¡ÉèÊ©²¿·Ö£¨ÓÈÆäÊÇÄÜÔ´ºÍ½»Í¨ÏµÍ³£©µÄ¹¤Òµ¿ØÖÆÏµÍ³/¼à¿ØÓëÊý¾ÝÊÕÂÞϵͳ£¨ICS/SCADA£©·¢¶¯¹¥»÷¡£¡£¡£¡£¡£¡£ÕâЩÍþвÐÐΪÕߺܿÉÄÜÊǺڿÍÐж¯Ö÷ÒåÕûÌå»ò×ԳƺڿÍÐж¯Ö÷ÒåÕߵĺڿͣ¬£¬£¬£¬£¬½üÄêÀ´ËûÃÇÒѶà´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÊܱ£»£»£»£»£»£»¤»òʹÓÃĬÈÏÃÜÂëµÄSCADA¼°ÆäËûICSϵͳ·¢¶¯¹¥»÷¡£¡£¡£¡£¡£¡£¹¤ÒµÍøÂçÇ徲ר¼ÒÖÒÑԳƣ¬£¬£¬£¬£¬Ö»¹ÜºÚ¿ÍµÄÐí¶à˵·¨±»Ç¿µ÷£¬£¬£¬£¬£¬µ«ÕâЩ¹¥»÷ÈÔ¿ÉÄܱ¬·¢ÖØ´óÓ°Ïì¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÕâЩÍþв£¬£¬£¬£¬£¬CISA¡¢FBI¡¢EPAºÍDoE±Þ²ßÒªº¦»ù´¡ÉèÊ©×éÖ¯Á¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬¸ÄÉÆÍøÂçÇå¾²Ì¬ÊÆ¡£¡£¡£¡£¡£¡£Ïêϸ²½·¥°üÀ¨È·±£ÔËÓªÊÖÒÕ£¨OT£©ÏµÍ³ÎÞ·¨Ö±½Ó´Ó»¥ÁªÍø»á¼û£¬£¬£¬£¬£¬Í¨¹ýÐéÄâרÓÃÍøÂ磨VPN£©¡¢Ç¿ÃÜÂëºÍ·À´¹ÂÚ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©Çå¾²µØÔ¶³Ì»á¼ûËüÃÇ£¬£¬£¬£¬£¬Ê¶±ð²¢¸ü¸ÄĬÈÏÃÜÂ룬£¬£¬£¬£¬¶ÔÒªº¦ÏµÍ³ÊµÑéÍøÂç·Ö¶Î£¬£¬£¬£¬£¬²¢È·±£Äܹ»ÊÖ¶¯²Ù×÷OTϵͳ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬½¨Òé×éÖ¯ÓëÏà¹ØÊµÌåÏàÖú£¬£¬£¬£¬£¬Ê¶±ð²¢½â¾ö¿ÉÄܱ£´æµÄÉèÖùýʧ¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/
6. iOSÓÎÏ·½ü50ÍòÓû§Êý¾Ýй¶ÇÒÓ²±àÂëÉñÃØÔâÆØ¹â
5ÔÂ8ÈÕ£¬£¬£¬£¬£¬iOSÓÎÏ·¡°Cats Tower£ºThe Cat Game£¡¡±±£´æÑÏÖØÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬ÖÂʹ½ü50ÍòÓû§ÃæÁٺڿ͹¥»÷Σº¦¡£¡£¡£¡£¡£¡£CybernewsÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¸ÃÓÎϷй¶ÁËÍæ¼ÒµÄIPµØµã¡¢Óû§Ãû¡¢FacebookÓû§ID¼°»á¼ûÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ºÚ¿ÍÓÃÓÚ×·×ÙÓû§ÔÚÏ߻¡¢Ð®ÖÆFacebookÕË»§£¬£¬£¬£¬£¬ÉõÖÁ׼ȷ¶¨Î»Óû§Î»Öᣡ£¡£¡£¡£¡£Ö»¹ÜIPµØµã²¢·ÇGPS×ø±ê£¬£¬£¬£¬£¬µ«Á¬ÏµÆäËûÊý¾ÝÈÔ¿ÉÌṩ½Ï׼ȷµÄλÖÃÐÅÏ¢¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÓÉÓÚFirebaseÉèÖùýʧ£¬£¬£¬£¬£¬¸ÃÓ¦Óû¹Ð¹Â¶ÁËÁè¼Ý45ÍòÓû§µÄIPµØµãºÍÓû§Ãû£¬£¬£¬£¬£¬ÒÔ¼°229¸öFacebookÓû§IDºÍ»á¼ûÁîÅÆ¶Ô¡£¡£¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬¸ÃÓ¦ÓôúÂë¿âÖл¹³äÂú×Ų»Ó¦±»¹ûÕæµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬Èç¿Í»§¶ËID¡¢APIÃÜÔ¿¡¢ÏîÄ¿IDµÈ£¬£¬£¬£¬£¬ÕâЩӲ±àÂëµÄÉñÃØÒ»µ©±»ÕÆÎÕ£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¾ÍÄÜ»æÖƳöÓ¦ÓóÌÐòµÄÕû¸öºó¶Ë»ù´¡ÉèÊ©£¬£¬£¬£¬£¬ÀÄÓÃÆäЧÀÍÍøÂç¸ü¶àÓû§Êý¾Ý£¬£¬£¬£¬£¬ÉõÖÁÖ±½Óͨ¹ýÓ¦Óûù´¡ÉèÊ©·¢ËÍÀ¬»øÓʼþ£¬£¬£¬£¬£¬´Ó¶ø½«ÆäÎäÆ÷»¯¡£¡£¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñÊÇCybernewsÊÓ²ìµÄÒ»²¿·Ö£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÆÊÎöÁËÔ¼8%µÄApp StoreÓ¦Ó㬣¬£¬£¬£¬·¢Ã÷71%µÄÊÜÆÊÎöÓ¦ÓÃÖÁÉÙй¶ÁËÒ»¸öÉñÃØÐÅÏ¢£¬£¬£¬£¬£¬Æ½¾ùÿ¸öÓ¦ÓÃй¶5.2¸ö¡£¡£¡£¡£¡£¡£Ä³Ð©°¸ÀýÖУ¬£¬£¬£¬£¬ÈÈÃÅÔ¼»áÓ¦ÓÃй¶ÁËÓû§ÕÕÆ¬£¬£¬£¬£¬£¬¼ÒÍ¥×·×ÙÓ¦ÓÃй¶ÁËʵʱGPS×ø±ê£¬£¬£¬£¬£¬À¬»øÓʼþ×èµ²Æ÷Ôòй¶Á˱»×èµ²µÄºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/cats-tower-iphone-data-leak/