ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-05-091. ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶
5ÔÂ8ÈÕ£¬£¬£¬½ÌÓý¾ÞÍ·ÅàÉú¼¯ÍÅÔâÊÜÍøÂç¹¥»÷£¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˹«Ë¾Êý¾ÝºÍ¿Í»§ÐÅÏ¢¡£¡£¡£¡£ÅàÉú¼¯ÍÅ×ܲ¿Î»ÓÚÓ¢¹ú£¬£¬£¬ÊÇÈ«Çò×î´óµÄѧÊõ³öÊé¡¢Êý×Öѧϰ¹¤¾ßºÍ±ê×¼»¯ÆÀ¹ÀÌṩÉÌÖ®Ò»¡£¡£¡£¡£ÅàÉú¼¯ÍŽÒÏþÉùÃ÷ÈÏ¿ÉÔâÊÜÍøÂç¹¥»÷£¬£¬£¬Êý¾Ý±»µÁ£¬£¬£¬µ«³Æ´ó²¿·ÖΪ¡°ÒÅÁôÊý¾Ý¡±¡£¡£¡£¡£ÅàÉú´ú±í֤ʵ£¬£¬£¬ÓÐδ¾ÊÚȨµÄÐÐΪÕß»á¼ûÁËÆä²¿·Öϵͳ£¬£¬£¬Ò»µ©È·Èϸû£¬£¬£¬ÅàÉúÁ¬Ã¦½ÓÄɲ½·¥×èÖ¹£¬£¬£¬²¢Óëȡ֤ר¼ÒÏàÖúÊÓ²ìÊÂÎñ¾Óɼ°ÊÜÓ°ÏìÊý¾Ý£¬£¬£¬»¹ÐÖúÖ´·¨²¿·Ö¿ªÕ¹ÊӲ죬£¬£¬Í¬Ê±ÒÑÔÚϵͳÖа²ÅÅÌØÊâÇå¾²²½·¥£¬£¬£¬°üÀ¨ÔöÇ¿Çå¾²¼à¿ØºÍÉí·ÝÑéÖ¤¡£¡£¡£¡£ÅàÉú»¹Ö¤Êµ±»µÁÊý¾Ý²»°üÀ¨Ô±¹¤ÐÅÏ¢¡£¡£¡£¡£´ËǰÓÐÐÂÎųƣ¬£¬£¬ÍþвÐÐΪÕßÓÚ2025Äê1ÔÂͨ¹ýÔÚ¹«¹².git/configÎļþÖз¢Ã÷µÄ̻¶µÄGitLabСÎÒ˽¼Ò»á¼ûÁîÅÆÆÆËðÁËÅàÉúµÄ¿ª·¢ÇéÐΣ¬£¬£¬¸ÃÎļþÈôÎó̻¶ÇÒ°üÀ¨Ç¶ÈëÔÚÔ¶³ÌURLÖеĻá¼ûÁîÅÆ£¬£¬£¬¹¥»÷Õß¿ÉÄÜδ¾ÊÚȨ»á¼ûÄÚ²¿´æ´¢¿â¡£¡£¡£¡£ÔÚÕë¶ÔÅàÉúµÄ¹¥»÷ÖУ¬£¬£¬Ì»Â¶µÄÁîÅÆÊ¹ÍþвÐÐΪÕß»á¼ûÁ˹«Ë¾Ô´´úÂ룬£¬£¬ÆäÖаüÀ¨ÓÃÓÚÔÆÆ½Ì¨µÄ½øÒ»²½Ó²±àÂëÆ¾Ö¤ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬ËæºóÍþвÐÐΪÕßʹÓÃÕâЩƾ֤´Ó¹«Ë¾ÄÚ²¿ÍøÂçºÍÔÆ»ù´¡ÉèÊ©ÖÐÇÔÈ¡ÁËÊýTBÊý¾Ý£¬£¬£¬°üÀ¨AWS¡¢Google Cloud¼°ÖÖÖÖ»ùÓÚÔÆµÄÊý¾Ý¿âЧÀÍÊý¾Ý£¬£¬£¬±»µÁÊý¾Ý°üÀ¨¿Í»§ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢µÈ£¬£¬£¬Êý°ÙÍòÈËÊÜÓ°Ïì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/
2. PyPI¾ªÏÖ¶ñÒâ°üÕë¶ÔDiscord¿ª·¢Õßϵͳ
5ÔÂ8ÈÕ£¬£¬£¬PythonÈí¼þ°üË÷Òý£¨PyPI£©ÉϾªÏÖÕë¶ÔDiscord¿ª·¢Ö°Ô±µÄ¶ñÒâPythonÈí¼þ°ü¡°discordpydebug¡±¡£¡£¡£¡£¸ÃÈí¼þ°üαװ³ÉDiscord»úеÈË¿ª·¢Ö°Ô±µÄ¹ýʧ¼Í¼Æ÷ÊÊÓóÌÐò£¬£¬£¬×Ô2022Äê3ÔÂ21ÈÕÉÏ´«ÒÔÀ´£¬£¬£¬Òѱ»ÏÂÔØÁè¼Ý11000´Î¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Socket×îÏÈ·¢Ã÷ÕâÒ»¶ñÒâÈí¼þ£¬£¬£¬²¢Ö¸³öÆä¿ÉÓÃÓÚ¶ÔDiscord¿ª·¢Ö°Ô±µÄϵͳ¾ÙÐкóÃŹ¥»÷£¬£¬£¬Îª¹¥»÷ÕßÌṩÊý¾Ý͵ÇÔºÍÔ¶³Ì´úÂëÖ´Ðй¦Ð§¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬¸ÃÈí¼þ°üÖ÷ÒªÕë¶Ô¹¹½¨»òά»¤Discord»úеÈ˵Ŀª·¢Ö°Ô±£¬£¬£¬ÕâЩ¿ª·¢Ö°Ô±¿ÉÄÜ»áÔÚδ¾ÆÕ±éÉó²éµÄÇéÐÎÏÂ×°ÖôËÀ๤¾ß¡£¡£¡£¡£ÓÉÓÚPyPI²»»á¶ÔÉÏ´«µÄÈí¼þ°ü¾ÙÐÐÉî¶ÈÇå¾²ÉóºË£¬£¬£¬¹¥»÷Õß³£Ê¹ÓÃÕâÒ»µã£¬£¬£¬Í¨¹ýÎóµ¼ÐÔÐÎò¡¢Õýµ±Ãû³Æ»ò¸´ÖÆÊ¢ÐÐÏîÄ¿´úÂëÀ´Ê¹¶ñÒâÈí¼þ°üÏԵÿÉÐÅ¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬¶ñÒâÈí¼þ°ü±ã»á½«×°±¸×ª±äΪԶ³Ì¿ØÖÆÏµÍ³£¬£¬£¬Ö´Ðй¥»÷Õß¿ØÖƵÄÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷·¢Ë͵ÄÖ¸Áî¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý¸Ã¶ñÒâÈí¼þ»ñȡƾ֤µÈÃô¸ÐÐÅÏ¢µÄδ¾ÊÚȨ»á¼ûȨÏÞ£¬£¬£¬ÇÔÈ¡Êý¾Ý¡¢¼àÊÓϵͳ»î¶¯¡¢Ô¶³ÌÖ´ÐдúÂ룬£¬£¬²¢»ñÈ¡ÓÐÖúÓÚÔÚÍøÂçÖкáÏòÒÆ¶¯µÄÐÅÏ¢¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þËäȱ·¦³¤ÆÚÐÔ»òȨÏÞÌáÉý»úÖÆ£¬£¬£¬µ«Ê¹ÓóöÕ¾HTTPÂÖѯ¿ÉÈÆ¹ý·À»ðǽºÍÇå¾²Èí¼þ¡£¡£¡£¡£×°Öú󣬣¬£¬Ëü»á¾²Ä¬ÅþÁ¬µ½¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹¾ß±¸Í¨¹ýÌØ¶¨Òªº¦×Ö´¥·¢À´¶ÁÈ¡ºÍдÈëÖ÷»úÉÏÎļþµÄ¹¦Ð§¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-pypi-package-hides-rat-malware-targets-discord-devs-since-2022/
3. ÀÕË÷Èí¼þʹÓÃÕýµ±KickidlerÈí¼þʵÑé¹¥»÷²¢ÇÔÃÜ
5ÔÂ8ÈÕ£¬£¬£¬ÀÕË÷Èí¼þ·ÖÖ§»ú¹¹QilinºÍHunters InternationalʹÓÃÕýµ±Ô±¹¤¼à¿ØÈí¼þKickidlerÕö¿ª¹¥»÷»î¶¯¡£¡£¡£¡£ÔÚVaronisºÍSynacktivÊӲ쵽µÄ¹¥»÷ÖУ¬£¬£¬¹¥»÷Õßͨ¹ýÖ²ÈëGoogle¹ã¸æ£¬£¬£¬ÓÕµ¼Óû§µã»÷ºóÌø×ªÖÁαÔìµÄRVToolsÍøÕ¾£¬£¬£¬´Ó¶øÏÂÔØ²¢ÔËÐб»Ä¾ÂíѬȾµÄ³ÌÐò¡£¡£¡£¡£¸Ã³ÌÐò×÷Ϊ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬ÏÂÔØ²¢ÔËÐÐSMOKEDHAM PowerShell .NETºóÃÅ£¬£¬£¬½ø¶øÔÚ×°±¸Éϰ²ÅÅKickidler¡£¡£¡£¡£Kickidler¿É²¶»ñ»÷¼ü¡¢½ØÈ¡ÆÁÄ»½ØÍ¼ºÍ½¨ÉèÆÁÄ»ÊÓÆµ£¬£¬£¬¹¥»÷Õß½è´Ë¼àÊÓÆóÒµÖÎÀíÔ±µÄ»î¶¯£¬£¬£¬»ñÈ¡ÌØÈ¨Æ¾Ö¤¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜÒÑÉñÃØ»á¼ûÊܺ¦ÕßϵͳÊýÌìÉõÖÁÊýÖÜ£¬£¬£¬ÒÔÊÕ¾Û»á¼ûÒìµØÔÆ±¸·ÝËùÐèµÄƾ֤¡£¡£¡£¡£Kickidlerͨ¹ý²¶»ñÖÎÀíÔ±ÊÂÇéÕ¾µÄ°´¼üºÍÍøÒ³£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Ê¶±ðÒìµØÔÆ±¸·Ý²¢»ñÈ¡ÃÜÂ룬£¬£¬ÎÞÐè½ÓÄɸßΣº¦Õ½ÂÔ¡£¡£¡£¡£ÀÕË÷Èí¼þÔËÓªÉÌÔÚ»Ö¸´¶ñÒâ»î¶¯ºó£¬£¬£¬°²ÅÅÕë¶ÔÊܺ¦ÕßVMware ESXi»ù´¡¼Ü¹¹µÄÓÐÓÃÔØºÉ£¬£¬£¬¼ÓÃÜVMDKÐéÄâÓ²ÅÌÇý¶¯Æ÷£¬£¬£¬Ôì³ÉÑÏÖØÆÆË𡣡£¡£¡£Hunters InternationalʹÓõİ²Åž籾ʹÓÃVMware PowerCLIºÍWinSCP AutomationÀ´Ö´ÐÐÏà¹Ø²Ù×÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ï¶àÄêÀ´Ò»Ö±ÔÚÀÄÓÃÕýµ±µÄÔ¶³Ì¼à¿ØºÍÖÎÀí£¨RMM£©Èí¼þ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kickidler-employee-monitoring-software-abused-in-ransomware-attacks/
4. ¶íÕþ¸®Ö§³ÖColdRiver×é֯ʹÓÃLostKeys¶ñÒâÈí¼þÇÔÃÜ
5ÔÂ8ÈÕ£¬£¬£¬×Ô½ñÄêÄêÍ·Æð£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄColdRiverºÚ¿Í×éÖ¯Ò»Á¬Ê¹ÓÃÐÂÐÍLostKeys¶ñÒâÈí¼þ£¬£¬£¬¶ÔÎ÷·½Õþ¸®¡¢¼ÇÕß¡¢Öǿ⼰·ÇÕþ¸®×éÖ¯·¢¶¯Ìع¤¹¥»÷ÒÔÇÔÈ¡Îļþ¡£¡£¡£¡£12Ô£¬£¬£¬Ó¢¹úºÍÎåÑÛͬÃËÈ·ÈϸÃ×éÖ¯Óë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±£´æ¹ØÁª¡£¡£¡£¡£¹È¸èÍþвÇ鱨С×飨GTIG£©ÓÚ1ÔÂÊ״η¢Ã÷LostKeys±»¸ß¶ÈÑ¡ÔñÐԵذ²ÅÅ£¬£¬£¬×÷ΪClickFixÉç»á¹¤³Ì¹¥»÷µÄÒ»²¿·Ö£¬£¬£¬¹¥»÷ÕßÓÕÆÄ¿µÄÔËÐжñÒâPowerShell¾ç±¾£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÌØÊâPowerShell¸ºÔØ£¬£¬£¬×îÖÕ°²Åű»×·×ÙΪLostKeysµÄVisual Basic Script£¨VBS£©Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£GTIGÖ¸³ö£¬£¬£¬LOSTKEYSÄÜ´ÓÓ²±àÂëµÄÀ©Õ¹ÃûºÍĿ¼ÁбíÖÐÇÔÈ¡Îļþ£¬£¬£¬²¢Ïò¹¥»÷Õß·¢ËÍϵͳÐÅÏ¢ºÍÕýÔÚÔËÐеÄÀú³Ì¡£¡£¡£¡£ColdRiver¹ß³£ÇÔȡƾ֤ÒÔÇÔȡĿµÄµç×ÓÓʼþºÍÁªÏµÈË£¬£¬£¬ÈôÐè»á¼ûÄ¿µÄϵͳÎĵµ£¬£¬£¬»¹»á°²ÅÅSPICA¶ñÒâÈí¼þ¾ÙÐÐÑ¡ÔñÐÔ»ñÈ¡¡£¡£¡£¡£LOSTKEYSÉè¼ÆÄ¿µÄÓëColdRiverÀàËÆ£¬£¬£¬ÇÒ½öÔÚÌØ¶¨ÇéÐÎϰ²ÅÅ¡£¡£¡£¡£ColdRiver×Ô2017ÄêÆð±ãʹÓÃÉç»á¹¤³ÌѧºÍ¿ªÔ´Ç鱨ÊÖÒÕÑо¿ºÍÒýÓÕÄ¿µÄ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-links-new-lostkeys-data-theft-malware-to-russian-cyberspies/
5. ÃÀ¶à²¿·Ö¾¯±¨ÓÍÆøÐÐÒµICS/SCADAÏµÍ³ÃæÁÙÍøÂç¹¥»÷Íþв
5ÔÂ7ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¾Ö£¨CISA£©¡¢Áª°îÊÓ²ì¾Ö£¨FBI£©¡¢ÇéÐα£»£»£»£»£»£»¤¾Ö£¨EPA£©ºÍÄÜÔ´²¿£¨DoE£©ÓÚÖܶþÁªºÏÐû²¼¾¯±¨£¬£¬£¬¾ÍÕë¶ÔÃÀ¹úʯÓͺÍ×ÔÈ»ÆøÐÐÒµµÄÍøÂç¹¥»÷·¢³öÖÒÑÔ¡£¡£¡£¡£Õþ¸®»ú¹¹Ö¸³ö£¬£¬£¬ÕâЩ¹¥»÷Ëä½ÓÄÉ»ù±¾ÈëÇÖÊÖÒÕ£¬£¬£¬µ«Òªº¦»ù´¡ÉèÊ©×éÖ¯ÍøÂçÇå¾²ÎÀÉú״̬²»¼Ñ£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹ÉõÖÁÎïÀíË𻵡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬Ò»Ð©ÊÖÒÕ²»Ì«ÖØ´óµÄÍøÂçÐÐΪÕßÕýÃé×¼ÃÀ¹úÒªº¦»ù´¡ÉèÊ©²¿·Ö£¨ÓÈÆäÊÇÄÜÔ´ºÍ½»Í¨ÏµÍ³£©µÄ¹¤Òµ¿ØÖÆÏµÍ³/¼à¿ØÓëÊý¾ÝÊÕÂÞϵͳ£¨ICS/SCADA£©·¢¶¯¹¥»÷¡£¡£¡£¡£ÕâЩÍþвÐÐΪÕߺܿÉÄÜÊǺڿÍÐж¯Ö÷ÒåÕûÌå»ò×ԳƺڿÍÐж¯Ö÷ÒåÕߵĺڿͣ¬£¬£¬½üÄêÀ´ËûÃÇÒѶà´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÊܱ£»£»£»£»£»£»¤»òʹÓÃĬÈÏÃÜÂëµÄSCADA¼°ÆäËûICSϵͳ·¢¶¯¹¥»÷¡£¡£¡£¡£¹¤ÒµÍøÂçÇ徲ר¼ÒÖÒÑԳƣ¬£¬£¬Ö»¹ÜºÚ¿ÍµÄÐí¶à˵·¨±»Ç¿µ÷£¬£¬£¬µ«ÕâЩ¹¥»÷ÈÔ¿ÉÄܱ¬·¢ÖØ´óÓ°Ïì¡£¡£¡£¡£ÎªÓ¦¶ÔÕâЩÍþв£¬£¬£¬CISA¡¢FBI¡¢EPAºÍDoE±Þ²ßÒªº¦»ù´¡ÉèÊ©×éÖ¯Á¬Ã¦½ÓÄÉÐж¯£¬£¬£¬¸ÄÉÆÍøÂçÇå¾²Ì¬ÊÆ¡£¡£¡£¡£Ïêϸ²½·¥°üÀ¨È·±£ÔËÓªÊÖÒÕ£¨OT£©ÏµÍ³ÎÞ·¨Ö±½Ó´Ó»¥ÁªÍø»á¼û£¬£¬£¬Í¨¹ýÐéÄâרÓÃÍøÂ磨VPN£©¡¢Ç¿ÃÜÂëºÍ·À´¹ÂÚ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©Çå¾²µØÔ¶³Ì»á¼ûËüÃÇ£¬£¬£¬Ê¶±ð²¢¸ü¸ÄĬÈÏÃÜÂ룬£¬£¬¶ÔÒªº¦ÏµÍ³ÊµÑéÍøÂç·Ö¶Î£¬£¬£¬²¢È·±£Äܹ»ÊÖ¶¯²Ù×÷OTϵͳ¡£¡£¡£¡£±ðµÄ£¬£¬£¬½¨Òé×éÖ¯ÓëÏà¹ØÊµÌåÏàÖú£¬£¬£¬Ê¶±ð²¢½â¾ö¿ÉÄܱ£´æµÄÉèÖùýʧ¡£¡£¡£¡£
https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/
6. iOSÓÎÏ·½ü50ÍòÓû§Êý¾Ýй¶ÇÒÓ²±àÂëÉñÃØÔâÆØ¹â
5ÔÂ8ÈÕ£¬£¬£¬iOSÓÎÏ·¡°Cats Tower£ºThe Cat Game£¡¡±±£´æÑÏÖØÊý¾Ýй¶ÎÊÌ⣬£¬£¬ÖÂʹ½ü50ÍòÓû§ÃæÁٺڿ͹¥»÷Σº¦¡£¡£¡£¡£CybernewsÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬¸ÃÓÎϷй¶ÁËÍæ¼ÒµÄIPµØµã¡¢Óû§Ãû¡¢FacebookÓû§ID¼°»á¼ûÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ºÚ¿ÍÓÃÓÚ×·×ÙÓû§ÔÚÏ߻¡¢Ð®ÖÆFacebookÕË»§£¬£¬£¬ÉõÖÁ׼ȷ¶¨Î»Óû§Î»Öᣡ£¡£¡£Ö»¹ÜIPµØµã²¢·ÇGPS×ø±ê£¬£¬£¬µ«Á¬ÏµÆäËûÊý¾ÝÈÔ¿ÉÌṩ½Ï׼ȷµÄλÖÃÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÓÉÓÚFirebaseÉèÖùýʧ£¬£¬£¬¸ÃÓ¦Óû¹Ð¹Â¶ÁËÁè¼Ý45ÍòÓû§µÄIPµØµãºÍÓû§Ãû£¬£¬£¬ÒÔ¼°229¸öFacebookÓû§IDºÍ»á¼ûÁîÅÆ¶Ô¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬¸ÃÓ¦ÓôúÂë¿âÖл¹³äÂú×Ų»Ó¦±»¹ûÕæµÄÃô¸ÐÐÅÏ¢£¬£¬£¬Èç¿Í»§¶ËID¡¢APIÃÜÔ¿¡¢ÏîÄ¿IDµÈ£¬£¬£¬ÕâЩӲ±àÂëµÄÉñÃØÒ»µ©±»ÕÆÎÕ£¬£¬£¬ÍþвÐÐΪÕß¾ÍÄÜ»æÖƳöÓ¦ÓóÌÐòµÄÕû¸öºó¶Ë»ù´¡ÉèÊ©£¬£¬£¬ÀÄÓÃÆäЧÀÍÍøÂç¸ü¶àÓû§Êý¾Ý£¬£¬£¬ÉõÖÁÖ±½Óͨ¹ýÓ¦Óûù´¡ÉèÊ©·¢ËÍÀ¬»øÓʼþ£¬£¬£¬´Ó¶ø½«ÆäÎäÆ÷»¯¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñÊÇCybernewsÊÓ²ìµÄÒ»²¿·Ö£¬£¬£¬Ñо¿Ö°Ô±ÆÊÎöÁËÔ¼8%µÄApp StoreÓ¦Ó㬣¬£¬·¢Ã÷71%µÄÊÜÆÊÎöÓ¦ÓÃÖÁÉÙй¶ÁËÒ»¸öÉñÃØÐÅÏ¢£¬£¬£¬Æ½¾ùÿ¸öÓ¦ÓÃй¶5.2¸ö¡£¡£¡£¡£Ä³Ð©°¸ÀýÖУ¬£¬£¬ÈÈÃÅÔ¼»áÓ¦ÓÃй¶ÁËÓû§ÕÕÆ¬£¬£¬£¬¼ÒÍ¥×·×ÙÓ¦ÓÃй¶ÁËʵʱGPS×ø±ê£¬£¬£¬À¬»øÓʼþ×èµ²Æ÷Ôòй¶Á˱»×èµ²µÄºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£
https://cybernews.com/security/cats-tower-iphone-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ