FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ
Ðû²¼Ê±¼ä 2025-05-191. FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ
5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬³Æ±£´æÒ»ÖÖÖØ´óµÄÓïÒôÍøÂç´¹ÂںͶÌÐÅÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈËÊ¿ÕýʹÓÃÈ˹¤ÖÇÄÜ£¨AI£©¿ªÕ¹ÓÕÆÐÐΪ£¬£¬£¬£¬£¬£¬£¬ÍþвÈÕÒæÑÏÖØ¡£¡£¡£¡£¡£¡£¡£×Ô2025Äê4ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬¡°¶ñÒâÐÐΪÕß¡±ÔËÓá°¶ÌÐÅÍøÂç´¹ÂÚ¡±ºÍ¡°ÓïÒôÍøÂç´¹ÂÚ¡±ÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬½¨Éè¿´ËÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÓïÒô±¸Íü¼£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÓÕÆÐÔ¶ÌÐŹ¥»÷ÏÖÈÎ/ǰÈÎÕþ¸®¹ÙÔ±¼°ÆäͨѶ¼ÖеÄСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬ÊÔͼÓëÄ¿µÄ½¨ÉèÐÅÈκÍÁªÏµ¡£¡£¡£¡£¡£¡£¡£FBIÃ÷È·ÌáÐÑÃñÖÚ£¬£¬£¬£¬£¬£¬£¬ÊÕµ½Éù³ÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÐÂÎŲ»¿ÉÇáÐÅ¡£¡£¡£¡£¡£¡£¡£Ò»µ©ÁªÏµÉÏÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×Ó»áÊÔͼ»á¼ûÆäСÎÒ˽¼ÒÕË»§£¬£¬£¬£¬£¬£¬£¬ÈçÔÚÐÅÏ¢Öз¢ËͶñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷ºó×ªÒÆµ½Ëùν¸üÇå¾²µÄÐÂÎÅÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬ÊµÔò¿ÉÄÜÖ¸µ¼Óû§½øÈë¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡µÇ¼ƾ֤»ò×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Ò»´ÎÀÖ³ÉÈëÇÖ¿ÉÄÜÒý·¢Á¬Ëø·´Ó¦£¬£¬£¬£¬£¬£¬£¬²»·¨·Ö×Ó¿ÉÄÜʹÓñ»µÁÕË»§¹¥»÷ÆäËûÃÀ¹ú¹ÙÔ±»òÆäͬ»ï£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡µÄÐÅÏ¢ÓÃÓÚÖÆÔìð³äÕË»§»òÌᳫ½øÒ»²½Éç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÉç»á¹¤³ÌѧÊֶλñÈ¡µÄÁªÏµÐÅÏ¢Ò²¿ÉÄܱ»ÓÃÀ´Ã°³äÁªÏµÈËÇÔÊØÐÅÏ¢»ò×ʽ𡣡£¡£¡£¡£¡£¡£FBIËäδ͸¶±»Ã°³äµÄÏêϸ¹ÙÔ±£¬£¬£¬£¬£¬£¬£¬µ«Í¨¸æÅú×¢´ó¶¼Ä¿µÄÊÇ¡°ÏÖÈλòǰÈÎÃÀ¹úÁª°î»òÖÝÕþ¸®¸ß¼¶¹ÙÔ±¼°ÆäÁªÏµÈË¡±£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»³¡Õë¶ÔÕÆÎÕDZÔÚÃô¸ÐÐÅÏ¢»ò»á¼ûȨÏÞСÎÒ˽¼ÒµÄÆÕ±é¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/fbi-warn-ai-voice-scams-impersonate-us-govt-officials/
2. BSHÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²©Í¨Ô±¹¤Êý¾ÝÔâй¶
5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Ð½×ÊЧÀ;ÞÍ·ADPµÄÖж«ÏàÖúͬ°éBSHÔÚ2024Äê9ÔÂÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ö²©Í¨Ô±¹¤Ãô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£²©Í¨ÔøÊ¹ÓÃADP´¦Öóͷ£ÈËΪµ¥£¬£¬£¬£¬£¬£¬£¬BSHÊÇADPÖж«ÇøÓò¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬£¬Ë䲩ͨÆäʱÒÑ×îÏÈ·ÅÆúADPºÍBSH£¬£¬£¬£¬£¬£¬£¬µ«Çл»Î´Íê³Éʱ¹¥»÷ÒÑ·¢¶¯¡£¡£¡£¡£¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾÆóÒµ¼à¿ØºÍ±£»£»£»£»¤¹©Ó¦ÉÌÉúÌ¬ÏµÍ³ÃæÁÙÌôÕ½¡£¡£¡£¡£¡£¡£¡£BSH/ADPÓÚ2024Äê9ÔÂÏÂÑ®·¢Ã÷ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ö±µ½12Ô²ÅÒâʶµ½Ô±¹¤Êý¾Ý±»Ð¹Â¶µ½»¥ÁªÍø¡£¡£¡£¡£¡£¡£¡£Òò±»µÁÐÅϢΪ¡°·Ç½á¹¹»¯ÃûÌá±£¬£¬£¬£¬£¬£¬£¬BSHºÍADPÔÚÈ·¶¨ÊÜÓ°ÏìÊý¾ÝºÍСÎÒ˽¼Ò¹æÄ£ÉÏÔâÓöÖØ´óÑÓÎ󣬣¬£¬£¬£¬£¬£¬²©Í¨Ö±µ½2025Äê5ÔÂ12ÈÕ²ÅÊÕµ½¾¯±¨£¬£¬£¬£¬£¬£¬£¬¾àÀëÊ×´ÎÈëÇÖ½ü°Ë¸öÔ¡£¡£¡£¡£¡£¡£¡£ÄÚ²¿ÓʼþÅú×¢£¬£¬£¬£¬£¬£¬£¬È·¶¨ÊÜÓ°ÏìÔ±¹¤ºÍÊý¾Ý×ֶζÔBSH/ADPÊÇÂþ³¤Àú³Ì£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤ºã¾Ã²»È·¶¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ÊÇ·ñй¶¡£¡£¡£¡£¡£¡£¡£TechNadu±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬El DoradoÀÕË÷Èí¼þ×éÖ¯²ß»®Á˴˴ι¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯³£¹¥»÷µÚÈý·½Ð§ÀÍÌṩÉ̲¢ÇÔȡԱ¹¤Êý¾Ý¡£¡£¡£¡£¡£¡£¡£ÕâÅú×¢ÍøÂç·¸·¨·Ö×ÓÕýÃé×¼´óÐÍ×éÖ¯Êý×Ö¹©Ó¦Á´±¡Èõ»·½Ú¡£¡£¡£¡£¡£¡£¡£²©Í¨ÂÄÀúÓëÒµ½ç¶Ô¹©Ó¦ÉÌΣº¦ÖÎÀíµ£ÐÄÒ»Ö£¬£¬£¬£¬£¬£¬£¬Ð½×ÊЧÀÍÌṩÉÌת»»Àú³ÌÖØ´ó£¬£¬£¬£¬£¬£¬£¬BSHºÍADPδʵʱÅû¶Υ¹æÐÐΪ¼Ó¾çÄæ¾³¡£¡£¡£¡£¡£¡£¡£Á½¼Ò¹«Ë¾ÒÑÓëÖ´·¨²¿·ÖºÍÊý¾Ý±£»£»£»£»¤»ú¹¹ÁªÏµ£¬£¬£¬£¬£¬£¬£¬²¢½ÓÄɲ½·¥Ç¿»¯BSHÇéÐΡ£¡£¡£¡£¡£¡£¡£
https://www.webpronews.com/ransomware-attack-on-adp-partner-exposes-broadcom-employee-data/
3. Ç×ÎÚ¿ËÀ¼×é֯ʹÓÃPythonºóÃŹ¥»÷¶íÂÞ˹¿ª·¢Õß
5ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ReversingLabsÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öÃûΪdbgpkgµÄαÔìPythonµ÷ÊÔÆ÷Èí¼þ°ü£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°üαװ³Éµ÷ÊÔ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÊµÔòÉñÃØÔÚ¿ª·¢ÕßϵͳÖÐÖ²ÈëºóÃÅÒÔÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£RLÏÓÒɴ˹¥»÷±³ºóÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼µÄºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÔÖ§³ÖÎÚ¿ËÀ¼¡¢Õë¶Ô¶íÂÞ˹ÀûÒæ¶øÖøÃû¡£¡£¡£¡£¡£¡£¡£dbgpkg²»°üÀ¨ÏÖʵµ÷ÊÔ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬¶øÊÇÓÕÆ¿ª·¢Ö°Ô±×°ÖúóÃÅ£¬£¬£¬£¬£¬£¬£¬½«Æä¿ª·¢»úеÄð³ÉÊÜѬȾ×ʲú¡£¡£¡£¡£¡£¡£¡£ÆäÖ²ÈëºóÃŵÄÒªÁìÖØ´ó£¬£¬£¬£¬£¬£¬£¬Ê¹Óá°º¯Êý°ü×°¡±»ò¡°×°ÊÎÆ÷¡±ÊÖÒÕÐ޸ıê×¼PythonÍøÂ繤¾ßÐÐΪ£¬£¬£¬£¬£¬£¬£¬Ê¹¶ñÒâ´úÂëÔÚ¿ª·¢Ö°Ô±Ê¹ÓÃÍøÂ纯ÊýǰһֱÒþ²Ø¡£¡£¡£¡£¡£¡£¡£¶ñÒâ°ü×°Æ÷´úÂë»á¼ì²éÌØ¶¨Îļþ£¬£¬£¬£¬£¬£¬£¬ÈôºóÃŲ»±£´æÔòÖ´ÐÐÈý¸öÏÂÁ£¬£¬£¬£¬£¬£¬°üÀ¨´ÓÔÚÏßPastebinЧÀÍÏÂÔØ¹«Ô¿¡¢×°ÖÃÈÆ¹ý·À»ðǽµÄ¹¤¾ßGlobal Socket Toolkit²¢¼ÓÃÜÅþÁ¬ºóÃÅËùÐèÃÜÔ¿¡¢½«¼ÓÃÜÃÜÔ¿·¢Ë͵½Ë½ÃÜÔÚÏßλÖ㬣¬£¬£¬£¬£¬£¬¶à½×¶ÎÀú³ÌÓë¶ÔÊÜÐÅÈÎÄ£¿£¿£¿£¿£¿£¿éʹÓú¯Êý°ü×°Æ÷ÔöÌíÁ˶ñÒâ»î¶¯¼ì²âÄѶȡ£¡£¡£¡£¡£¡£¡£RLÑо¿Ö°Ô±»¹·¢Ã÷¸ÃºóÃÅÓëÇ×ÎÚ¿ËÀ¼µÄPhoenix HyenaºÚ¿Í×éÖ¯ÏÈǰʹÓõĶñÒâÈí¼þÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯×Ô2022ÄêÒÔÀ´»îÔ¾£¬£¬£¬£¬£¬£¬£¬ÒÔÕë¶Ô¶íÂÞ˹ʵÌåÖø³Æ£¬£¬£¬£¬£¬£¬£¬ÇÒ2024Äê9ÔÂÉæÏÓÈëÇÖ¶íÂÞË¹ÍøÂçÇå¾²¹«Ë¾Dr. Web¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/ukraine-group-russian-developers-python-backdoor/
4. ÀÕË÷Èí¼þÍÅ»ïÇàíùSkitnet¶ñÒâÈí¼þ
5ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÕýÔ½À´Ô½¶àµØÊ¹ÓÃÃûΪSkitnet£¨¡°Bossnet¡±£©µÄжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÔÚ±»¹¥ÆÆµÄÍøÂçÖÐÖ´ÐÐÒþÃØµÄºóʹÓû¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô2024Äê4ÔÂÆðÔÚµØÏÂÂÛ̳³öÊÛ£¬£¬£¬£¬£¬£¬£¬µ«×Ô2025ÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬£¬£¬ÔÚÀÕË÷Èí¼þÍÅ»ïÖÐÊܵ½ÏÔÖø¹Ø×¢¡£¡£¡£¡£¡£¡£¡£ProdaftÑо¿Ö°Ô±ÊӲ쵽£¬£¬£¬£¬£¬£¬£¬¶à¸öÀÕË÷Èí¼þ²Ù×÷ÔÚÏÖʵ¹¥»÷Öа²ÅÅÁËSkitnet£¬£¬£¬£¬£¬£¬£¬ÈçÕë¶ÔÆóÒµµÄMicrosoft TeamsÍøÂç´¹ÂÚ¹¥»÷ÖеÄBlackBastaºÍCactus¡£¡£¡£¡£¡£¡£¡£SkitnetµÄѬȾʼÓÚÔÚÄ¿µÄϵͳÉϰ²ÅŲ¢Ö´ÐлùÓÚRustµÄ¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬£¬¸Ã¼ÓÔØÆ÷½âÃÜChaCha20¼ÓÃܵÄNim¶þ½øÖÆÎļþ²¢¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£¡£¡£¡£NimÓÐÓøºÔؽ¨Éè»ùÓÚDNSµÄ·´Ïòshell£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃËæ»úDNSÅÌÎÊÆô¶¯»á»°¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÆô¶¯Èý¸öỊ̈߳¬£¬£¬£¬£¬£¬£¬»®·ÖÓÃÓÚ·¢ËÍÐÄÌøDNSÇëÇó¡¢¼àÊÓºÍй¶shellÊä³ö¡¢¼àÌýÏ¢ÕùÃÜÀ´×ÔDNSÏìÓ¦µÄÏÂÁî¡£¡£¡£¡£¡£¡£¡£Í¨Ñ¶ºÍ´ýÖ´ÐеÄÏÂÁîͨ¹ýHTTP»òDNS·¢ËÍ£¬£¬£¬£¬£¬£¬£¬»ùÓÚSkitnet C2¿ØÖÆÃæ°åµÄÖ¸Áî¡£¡£¡£¡£¡£¡£¡£SkitnetÖ§³Ö¶àÖÖÏÂÁ£¬£¬£¬£¬£¬£¬°üÀ¨½¨É賤ÆÚÐÔ¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢ÏÂÔØ²¢¾²Ä¬×°ÖÃÕýµ±µÄÔ¶³Ì»á¼û¹¤¾ß¡¢Æô¶¯PowerShellÏÂÁîÑ»·ÒÔ¼°Ã¶¾ÙÒÑ×°ÖõķÀ²¡¶¾ºÍÇå¾²Èí¼þµÈ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬²Ù×÷Ô±»¹¿ÉʹÓÃÉæ¼°.NET¼ÓÔØÆ÷µÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÔÚÄÚ´æÖÐÖ´ÐÐPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ¸üÉîÌõÀíµÄ¹¥»÷¶¨ÖÆ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/
5. °²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÀÕË÷¹¥»÷ÖÂÊý¾Ýй¶
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬2Ô·ݰ²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼Ö»¼ÕßÉñÃØÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý·¢ÏØÕþ¸®´óÂ¥ÔÝʱ¹Ø±Õ£¬£¬£¬£¬£¬£¬£¬²¢Ó°Ïì¶àÏîסÃñЧÀÍ¡£¡£¡£¡£¡£¡£¡£ÏØÕþ¸®ÓÚ2ÔÂ22ÈÕÊ״βì¾õ´Ë´Î¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦ÁªºÏÐÐÒµÁìÏȵÄÍøÂçÇ徲ר¼Ò¡¢Ö´·¨»ú¹¹¼°Ïà¹ØÖÝÕþ¸®»ú¹¹Õö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£ÊÓ²ìЧ¹ûÏÔʾ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñΪÍⲿÍþвÐÐΪÕßÌᳫµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ1ÔÂ28ÈÕÖÁ2ÔÂ22ÈÕʱ´ú£¬£¬£¬£¬£¬£¬£¬¡°¸ÃÏØÍøÂçµÄһС²¿·Ö¡±Ôâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ê±´úijЩÎļþ±»Î´¾ÊÚȨ»á¼û»òÏÂÔØ¡£¡£¡£¡£¡£¡£¡£×¨¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ³£ÇÖÈëϵͳ¼ÓÃÜ»òËø¶¨Ãü¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇóÖ§¸¶Êê½ðÒÔÊÍ·ÅÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£µ±±»Îʼ°ÊÇ·ñÒÑÖ§¸¶Êê½ðʱ£¬£¬£¬£¬£¬£¬£¬½²»°ÈËÌåÏÖÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬£¬ÎÞ·¨Í¸Â¶Ïà¹ØÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸ÃÏØÕýÓëÕÕÁÏÏàÖú£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÄÄЩÎļþ±»Ð¹Â¶£¬£¬£¬£¬£¬£¬£¬Éв»ÇåÎúÊÜÓ°ÏìÈËÊý¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÓû§µÄÈ«Ãû¡¢µØµã¼°Ò½ÁÆÕï¶ÏµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü²ÆÎñÐÅϢδÊÜй¶£¬£¬£¬£¬£¬£¬£¬µ«¹ÙÔ±ÈÔÃãÀø×¡Ãñ¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÉó²éÕË»§±¨±í¡¢ÐÅÓñ¨¸æµÈÌá·ÀÉí·Ý͵ÇÔ¡£¡£¡£¡£¡£¡£¡£
https://www.thebaltimorebanner.com/community/local-news/cybersecurity-ransomware-anne-arundel-county-cyberattack-FYSLHXQANFCHBBCBDJWNDVUW6Q/
6. EffortelÊý¾Ýй¶Ö±ÈÀûʱMVNOÆßÍò¿Í»§ÐÅÏ¢Íâй
5ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚEffortel±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÈý¼Ò±ÈÀûÊ±ÒÆ¶¯ÐéÄâÍøÂçÔËÓªÉÌ£¨MVNO£©µÄ70,000Ãû¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£Effortel×÷ÎªÒÆ¶¯ÐéÄâÍøÂçÍÆ¶¯Õߣ¨MVNE£©£¬£¬£¬£¬£¬£¬£¬ÔÚµçÐÅÐÐÒµÖÐÊÎÑÝ×ÅÒªº¦½ÇÉ«£¬£¬£¬£¬£¬£¬£¬ËüΪӵÓÐÎïÀíÍøÂçµÄµçÐŹ«Ë¾£¨ÈçProximus£©ÓëÐéÄâµçÐÅÌṩÉÌ£¨ÈçNeibo£©Ö®¼ä´î½¨ÇÅÁº£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¿ª·¢Èí¼þƽ̨£¬£¬£¬£¬£¬£¬£¬Ê¹ÆóÒµÄܹ»ÒÔMVNOÉí·ÝÔÚµçÐÅÔËÓªÉ̵ÄÎïÀíÍøÂçÉÏÔËÓª£¬£¬£¬£¬£¬£¬£¬¶øÎÞÐè¾ß±¸´ó×ÚÊÖÒÕרҵ֪ʶ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬EffortelΪȫÇò30¶à¼ÒMVNO¿Í»§Ìṩ¿ªÆ±ºÍÅþÁ¬SIM¿¨µÈЧÀÍ¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñ±¬·¢ÔÚÖÐÑëÊý¾Ý¿âµÄ²âÊԽ׶Σ¬£¬£¬£¬£¬£¬£¬EffortelÔÚת´ï¿Í»§Êý¾Ý£¨ÈçÓÃÓÚ½ôÆÈЧÀ͵ÄÊý¾Ý£©ÒÔ¾ÙÐÐϵͳ¼¯³Éʱ£¬£¬£¬£¬£¬£¬£¬ÌìÉúÁ˰üÀ¨¿Í»§Êý¾ÝµÄÎļþ£¬£¬£¬£¬£¬£¬£¬ÕâЩÎļþ²»ÐÒ±»Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£Ò»ÃûºÚ¿ÍÀÖ³ÉÈëÇÖÁËMVNOºÍTelfortÖ®¼äµÄÖ§³ÖÃÅ»§£¬£¬£¬£¬£¬£¬£¬»ñÈ¡ÁËÕâЩÎļþµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°¼ÒÀÖ¸£Òƶ¯¡¢NeiboºÍUndoµÈ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ롢סլµØµã¡¢»¤ÕÕºÅÂë¡¢Óû§ºÅÂëÒÔ¼°SIM¿¨ºÅµÈÊÖÒÕʶ±ðÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Effortel×Ü˾ÀíLaurent BatailleÌåÏÖ£¬£¬£¬£¬£¬£¬£¬60%µ½65%µÄÖն˿ͻ§Í¨¹ýÔÚÏßÖ§¸¶È·ÈÏÉí·Ý£¬£¬£¬£¬£¬£¬£¬ÆäÉí·ÝÊý¾Ý²»»á±»´æ´¢£¬£¬£¬£¬£¬£¬£¬Ö§¸¶IDËä±£´æ£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÄÜͨ¹ýÖ§¸¶ÌṩÉÌÓëСÎÒ˽¼ÒÊý¾Ý¹ØÁª¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/data-belgian-virtual-telecom-operators-leaked/