ºÚ¿ÍÉù³Æ¹«¹²Æû³µÔâÈëÇÖ £¬ £¬£¬µ«Î´ÄÜÌṩ֤¾Ý

Ðû²¼Ê±¼ä 2025-06-04

1. ºÚ¿ÍÉù³Æ¹«¹²Æû³µÔâÈëÇÖ £¬ £¬£¬µ«Î´ÄÜÌṩ֤¾Ý


6ÔÂ2ÈÕ £¬ £¬£¬µÂ¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ·ºÆðÔÚÀÕË÷Èí¼þ¼¯ÍÅStormousµÄ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ £¬ £¬£¬Òý·¢ÁË¶ÔÆäÊý¾ÝÇå¾²µÄ¹Ø×¢¡£¡£¡£¡£¡£¹«¹²Æû³µ¼¯ÍÅÓÚ5ÔÂβÅû¶ÁËÓë¸ÃÀÕË÷Èí¼þÍÅ»ïµÄÁªÏµ £¬ £¬£¬²¢Ö¸³öÍþвÐÐΪÕßÉù³ÆÄÜ»á¼ûÓû§ÕÊ»§Êý¾Ý¡¢Éí·ÝÑéÖ¤ÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£È»¶ø £¬ £¬£¬Ñо¿Ö°Ô±ÏÖÔÚÎÞ·¨È·ÈϹ«¹²Æû³µ¼¯ÍŵÄÊý¾ÝÊÇ·ñ±»ÇÔÈ¡¡£¡£¡£¡£¡£StormousÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÉù³Æ½«ÔÚ¼¸ÌìÄÚÐû²¼¹«Ë¾Êý¾Ý £¬ £¬£¬ÕâÊÇÆäϰÓõÄʩѹÊÖ¶Î £¬ £¬£¬Í¨³£ÍøÂç·¸·¨·Ö×Ó»áÐû²¼Êý¾ÝÑù±¾ÒÔ֤ʵÆä¿ÉÐÅ¶È £¬ £¬£¬µ«´Ë´Î¸ÃÍÅ»ï½ö·ÖÏíÁËÎÞЧÁ´½Ó £¬ £¬£¬Î´ÌṩÓмÛÖµÄÚÈÝ¡£¡£¡£¡£¡£Ö»¹ÜÔÆÔÆ £¬ £¬£¬Stormous×÷ΪµØÏÂÀÕË÷Èí¼þÁìÓòµÄ×ÅÃû¼ÓÈëÕß £¬ £¬£¬´Ë´ÎÐÐΪ¿ÉÄÜÖ¼ÔÚÏò¹«¹²Æû³µ¼¯ÍÅʩѹ £¬ £¬£¬ÆÈʹÆäÖª×ãÊê½ðÒªÇ󡣡£¡£¡£¡£Ò»µ©Êý¾Ýй¶»ñµÃ֤ʵ £¬ £¬£¬½«Î£¼°¹«Ë¾Óû§ £¬ £¬£¬¿ÉÄܵ¼ÖÂÕË»§±»µÁºÍδ¾­ÊÚȨµÄ»á¼ûʵÑé £¬ £¬£¬Í¬Ê±ÉæÏÓй¶µÄСÎÒ˽¼ÒÐÅÏ¢Ò²¿ÉÄÜΣ¼°Òþ˽¡£¡£¡£¡£¡£StormousÀÕË÷Èí¼þÍÅ»ï×Ô2022ÄêÊ״α»·¢Ã÷ÒÔÀ´ £¬ £¬£¬ÒѳÉΪ¸ÃÁìÓòµÄÂÄÀú¸»ºñ¼ÓÈëÕß £¬ £¬£¬¸ÃÍÅ»ïÔÚÒÑÍù12¸öÔÂÄÚÖÁÉÙ¹¥»÷ÁË34¸ö×éÖ¯¡£¡£¡£¡£¡£ÏÖÔÚ £¬ £¬£¬¹«¹²Æû³µ¼¯ÍÅÉÐδ¾Í´Ë´ÎÊÂÎñ½ÒÏþ½øÒ»²½ÉùÃ÷ £¬ £¬£¬¸÷ÆÓÖ±Ç×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£


https://cybernews.com/security/volkswagen-data-breach-claim-lacks-evidence/


2. MainStreetÒøÐй©Ó¦ÉÌÔâ¹¥»÷Ö¿ͻ§ÐÅϢй¶


6ÔÂ3ÈÕ £¬ £¬£¬ÃÀ¹úMainStreetÒøÐÐÅû¶ÆäÏàÖú¹©Ó¦ÉÌÔâÊÜÍøÂç¹¥»÷ £¬ £¬£¬µ¼ÖÂÔ¼5%µÄ¿Í»§Ãô¸ÐÐÅϢй¶¡£¡£¡£¡£¡£¸ÃÐÐÔÚÌá½»¸øÃÀ¹úÖ¤½»»á£¨SEC£©µÄÎļþÖÐÌåÏÖ £¬ £¬£¬3Ô»ñÖª¹©Ó¦ÉÌϵͳ±»ÈëÇÖºó £¬ £¬£¬Á¬Ã¦ÖÕÖ¹ÁËÓë¸Ã¹©Ó¦É̵ÄËùÓÐÏàÖú £¬ £¬£¬²¢ÓÚ4ÔÂÏÂÑ®Íê³ÉÊÂÎñ¹æÄ£Éó²é £¬ £¬£¬µ«Î´»ØÓ¦ÏêϸÊܺ¦ÈËÊý¼°ÐÅÏ¢ÀàÐ͵ÄÖÊѯ¡£¡£¡£¡£¡£ÊÓ²ìÈ·ÈÏÒøÐÐ×ÔÉíϵͳδÊÜÈëÇÖ £¬ £¬£¬¿Í»§ÕË»§×ʽðÇå¾²ÎÞÓÝ £¬ £¬£¬ÒøÐÐÒÑÓÚ5ÔÂ26ÈÕ֪ͨî¿Ïµ»ú¹¹¼°¿Í»§ £¬ £¬£¬²¢ÎªÊÜÓ°Ïì¿Í»§½¨Éè¿ÉÒɻ¼à²âϵͳ¡£¡£¡£¡£¡£ÒøÐÐÉùÃ÷¸ÃÊÂÎñδ¶ÔÆäÔËÓª±¬·¢ÖØ´óÓ°Ïì £¬ £¬£¬´ÓÆä×îвƱ¨À´¿´ £¬ £¬£¬´æ¿îÔ¼19ÒÚÃÀÔª £¬ £¬£¬¾»ÀûÈó250ÍòÃÀÔª £¬ £¬£¬Óë2024Äê¿÷Ëð998ÍòÃÀÔªµÄÇéÐÎÏà±ÈÒÑÓиÄÉÆ¡£¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÃÀ¹úÎå´óÒøÐÐЭ»áÁªºÏÖº¯SECÒªÇ󯯳ýÍøÂçÇå¾²ÊÂÎñÇ¿ÖÆÅû¶»®¶¨Ö®¼Ê £¬ £¬£¬¸Ã¹æÕÂ×Ô2023ÄêÉúЧÒÔÀ´ £¬ £¬£¬Ò»Ö±Êܵ½¹ú»áÓëÒøÐÐÒµµÄÅê»÷ £¬ £¬£¬±»Ö¸ÔöÌíºÏ¹æÎ£º¦±¾Ç® £¬ £¬£¬Î´ÄÜÌṩÓÐÓÃͶ×ʾöÒéÐÅÏ¢ £¬ £¬£¬·´¶ø¡°×è°­×ÊÔ´ÐγɻúÖÆ¡±¡£¡£¡£¡£¡£


https://therecord.media/Main-street-cyber-incident-bank


3. ºÏ¹æ×Ô¶¯»¯ÉÌVantaÈí¼þÎó²îÖ¿ͻ§Êý¾Ýй¶


6ÔÂ3ÈÕ £¬ £¬£¬ºÏ¹æ×Ô¶¯»¯ÌṩÉÌVantaÈ·Èϱ¬·¢ÁËÒ»ÆðÖØ´óÈí¼þÎó²îµ¼ÖµÄÊý¾Ýй¶ÊÂÎñ £¬ £¬£¬Êý°ÙÃû¿Í»§Êܵ½Ó°Ïì¡£¡£¡£¡£¡£VantaÒÔ×ÊÖúÆóÒµÖÎÀíÇå¾²ºÍºÏ¹æÐÔÖø³Æ £¬ £¬£¬È»¶ø´Ë´ÎÈ´ÒòÍøÂçÇå¾²ÎÊÌâÏÝÈë·ç²¨¡£¡£¡£¡£¡£5ÔÂ26ÈÕ £¬ £¬£¬VantaÍŶӷ¢Ã÷ÕâÒ»ÑÏÖØÎÊÌâ¡£¡£¡£¡£¡£ÓÉÓÚ²úÆ·±ä»»ÒýÆðµÄ´úÂë¹ýʧ £¬ £¬£¬Ãô¸ÐÔ±¹¤Êý¾Ý¡¢ÕË»§ÉèÖ÷½·¨¡¢Ë«ÒòËØÉí·ÝÑéÖ¤£¨MFA£©Ê¹ÓÃÏêÇé¼°¹¤¾ßÉèÖÃÐÅÏ¢µÈ±»¡°¹ýʧµØµ¼È롱µ½ÆäËû¿Í»§ÕË»§¡£¡£¡£¡£¡£VantaÌåÏÖ¡°Ö»Óв»µ½4%µÄ¿Í»§¡±Êܵ½Ó°Ïì £¬ £¬£¬µ«ÕâÈÔÒâζ×ÅÊý°Ù¼ÒÆóÒµÊý¾Ýй¶¡£¡£¡£¡£¡£VantaÊ×ϯ²úÆ·¹ÙJeremy Epling֤ʵÁË´Ë´ÎÊý¾Ýй¶ÊÂÎñ £¬ £¬£¬²¢Ö¸³ö¡°²»µ½20%µÄµÚÈý·½¼¯³ÉÊý¾Ý×Ó¼¯Ì»Â¶¸øÁËÆäËûVanta¿Í»§¡±¡£¡£¡£¡£¡£VantaÒÑ×îÏÈ֪ͨÊÜÓ°Ïì¿Í»§ £¬ £¬£¬¼û¸æÆäÔ±¹¤ÕÊ»§Êý¾Ý±»¹ýʧ²åÈëµ½ÆäËû¿Í»§ÊµÀýÖС£¡£¡£¡£¡£·¢Ã÷´ËÎÊÌâºó £¬ £¬£¬VantaÁ¬Ã¦»Ø¹öÁ˱任²¢Æô¶¯ÐÞ¸´ÊÂÇé £¬ £¬£¬ÍýÏëÔÚ6ÔÂ4ÈÕǰÍê³ÉÐÞ¸´ £¬ £¬£¬ËùÓÐÊÜÓ°ÏìµÄ¿Í»§¶¼ÒÑÊÕµ½Í¨Öª £¬ £¬£¬¿Í»§Ö§³ÖÍŶÓÕýÔÚ½â´ðÒÉÎʺÍÇëÇ󡣡£¡£¡£¡£Îª±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢ £¬ £¬£¬VantaÕýÔÚ¸üеÚÈý·½¼¯³ÉAPI²¢Ë¢Ð»á¼û¿ØÖƲâÊÔ¡£¡£¡£¡£¡£


https://hackread.com/code-bug-compliance-vanta-data-leak-customer-clients/


4. µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÔºÔâInterLockÀÕË÷Èí¼þ¹¥»÷


6ÔÂ3ÈÕ £¬ £¬£¬InterLockÀÕË÷Èí¼þ×ßÂ©ÍøÕ¾½üÆÚ½«Texas Digestive Specialists£¨µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½Éú¼¯ÍÅ£©ÁÐÈëÆä×ß©ÁÐ±í £¬ £¬£¬Éù³ÆÒÑÇÔÈ¡²¢×ß©Á˸ÃÒ½ÁƼ¯ÍÅ263GBµÄÊý¾Ý £¬ £¬£¬Éæ¼°16920¸öÎļþ¼ÐºÍ215245¸öÎļþ¡£¡£¡£¡£¡£DataBreaches¶ÔÊý¾Ý¼¯¾ÙÐÐÁ˳éÑùÊÓ²ì £¬ £¬£¬ËäÔÚ¸ÃÒ½ÁƼ¯ÍŹÙÍøÎ´·¢Ã÷Òì³£»£»£»£»£»£»òй¶ÐÅÏ¢ £¬ £¬£¬µ«·¢Ã÷InterLockÒѼÓÃÜÎļþ £¬ £¬£¬ÇÒÐí¶à°üÀ¨Êܱ£»£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©µÄÎļþΪʵÑéÊÒ²¡Àí±¨¸æµÄ.pdfÎļþ¡£¡£¡£¡£¡£ÕâЩʵÑéÊÒ±¨¸æÏêϸ¼Í¼ÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ì²éÈÕÆÚ¡¢Ïà¹Ø²¡Ê·ºÍ¼ì²éЧ¹û £¬ £¬£¬ÔÚÒ»¸öѹËõµµ°¸Öоͷ¢Ã÷ÁËÁè¼Ý2Íò·Ý´ËÀ౨¸æ £¬ £¬£¬Ê±¼ä¿ç¶È´Ó2023Äê8Ôµ½2025ÄêÍ· £¬ £¬£¬ÁíÒ»¸öµµ°¸»¹°üÀ¨375Ò³¹ØÓÚ2024Ä겿·Öʱ¼äµãÖ¸¶¨»¼ÕߵIJ¡Àí±¨¸æ £¬ £¬£¬ÇÒËùÓб¨¸æ¾ùÓ¡Óе¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÉúµÄÑöÃæ¡£¡£¡£¡£¡£µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÔºÎª³ÉÈ˺ͶùͯÌṩҽÁƺÍÍâ¿ÆÐ§ÀÍ £¬ £¬£¬Ôڵ¿ËÈøË¹ÖÝÉèÓÐÈý¸öÕïËù¡£¡£¡£¡£¡£DataBreachesÒÑÏò¸ÃÒ½Ôº·¢ËÍÁªÏµ±í¸ñѯÎÊÆä¶ÔÒÉËÆÀÕË÷Èí¼þ¹¥»÷µÄ»ØÓ¦ £¬ £¬£¬µ«×èÖ¹·¢¸å £¬ £¬£¬Ò½ÔºÉÐδ»Ø¸´ £¬ £¬£¬Ò²Î´¾ÍÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©»òµÂ¿ËÈøË¹ÖÝ×ÜÉó²é³¤°ì¹«ÊҵĹ«¹²Î¥¹æ¹¤¾ßÌá½»Èκα¨¸æ¡£¡£¡£¡£¡£


https://databreaches.net/2025/06/03/texas-gastroenterology-and-surgical-practice-victim-of-ransomware-attack/


5. Ó¡¶ÈÔÓ»õÅäËÍKiranaProÔâºÚ¿Í¹¥»÷ÖÂÊý¾Ý±»Çå


6ÔÂ3ÈÕ £¬ £¬£¬Ó¡¶ÈÔÓ»õÅäËÍÊ×´´¹«Ë¾KiranaProÔâÓöºÚ¿Í¹¥»÷ £¬ £¬£¬ËùÓÐÊý¾Ý±»É¨³ý £¬ £¬£¬ÆäÊ×´´ÈËDeepak Ravindran֤ʵÁËÕâÒ»ÐÂÎÅ¡£¡£¡£¡£¡£±»Ïú»ÙµÄÊý¾Ýº­¸ÇÓ¦ÓóÌÐò´úÂ롢ЧÀÍÆ÷ÐÅÏ¢ÒÔ¼°´ó×ÚÃô¸Ð¿Í»§ÐÅÏ¢ £¬ £¬£¬°üÀ¨ÐÕÃû¡¢ÓʼĵصãºÍ¸¶¿îÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄÓ¦ÓóÌÐòËäÈÔÔÚÏß £¬ £¬£¬µ«ÒÑÎÞ·¨´¦Öóͷ£¶©µ¥¡£¡£¡£¡£¡£KiranaProÓÚ2024Äê12ÔÂÍÆ³ö £¬ £¬£¬ÊÇÓ¡¶ÈÕþ¸®Êý×ÖÉÌÎñ¿ª·ÅÍøÂçÉϵÄÂò¼ÒÓ¦ÓóÌÐò £¬ £¬£¬ÔÊÐí¿Í»§´ÓÍâµØÊÐËÁºÍÖÜΧ³¬ÊйºÖÃÔÓ»õ £¬ £¬£¬ÓµÓÐ5.5ÍòÃû¿Í»§ £¬ £¬£¬ÆäÖÐ3ÍòÖÁ3.5ÍòÃû»îÔ¾Âò¼Ò±é²¼50¸ö¶¼»á £¬ £¬£¬ÖðÈÕ×ܼÆÏµ¥2000±Ê¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ìṩ»ùÓÚÓïÒôµÄ½çÃæ £¬ £¬£¬Ö§³Ö¶àÖÖÓïÑÔϵ¥¡£¡£¡£¡£¡£È»¶ø £¬ £¬£¬5ÔÂ26ÈÕ £¬ £¬£¬KiranaPro¸ß¹ÜµÇ¼ÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©ÕË»§Ê±·¢Ã÷Òì³£ £¬ £¬£¬ºÚ¿ÍÀֳɻá¼ûÁËÆäÔÚAWSºÍGitHubÉϵĸùÕË»§¡£¡£¡£¡£¡£Ê×ϯÊÖÒÕ¹ÙSaurav KumarÖ¸³ö £¬ £¬£¬¹¥»÷±¬·¢ÔÚ5ÔÂ24ÈÕÖÁ25ÈÕ×óÓÒ £¬ £¬£¬ÆäʱAWSÕË»§µÄ¶àÒòËØÉí·ÝÑéÖ¤´úÂë±»¸ü¸Ä £¬ £¬£¬ËùÓÐÔÊÐí¿Í»§»á¼ûÐéÄâÅÌËã»úÔËÐÐÓ¦ÓóÌÐòµÄEC2ЧÀͱ»É¾³ý £¬ £¬£¬ÇÒ¹«Ë¾ÎÞ·¨»ñÈ¡ÈκÎÈÕÖ¾ £¬ £¬£¬ÓÉÓÚȱ·¦¸ùÕË»§È¨ÏÞ¡£¡£¡£¡£¡£RavindranÌåÏÖ £¬ £¬£¬KiranaProÒÑÁªÏµGitHubÖ§³ÖÍÅ¶Ó £¬ £¬£¬Ð­Öúʶ±ðºÚ¿ÍIPµØµãºÍÆäËû¹¥»÷ºÛ¼£ £¬ £¬£¬²¢ÕýÔÚ¶Ôǰ¹ÍÔ±ÌáÆðËßËÏ £¬ £¬£¬³ÆÆäδÌá½»»á¼ûGitHubÕË»§µÄƾ֤¡£¡£¡£¡£¡£ÏÖÔÚ £¬ £¬£¬¹¥»÷Ïêϸ·½·¨Éв»ÇåÎú £¬ £¬£¬µ«½üÄêÀ´Ò»Ð©´óÐÍÍøÂç¹¥»÷¶àÓÉÆ¾Ö¤ÍµÇÔÒýÆð¡£¡£¡£¡£¡£


https://techcrunch.com/2025/06/03/indian-grocery-startup-kiranapro-was-hacked-and-its-servers-deleted-ceo-confirms/


6. ¶ñÒâÈí¼þCrocodilusÌí¼ÓÐéαÁªÏµÈËÓÕÆ­È«ÇòÓû§


6ÔÂ3ÈÕ £¬ £¬£¬×îа桰Crocodilus¡±Android¶ñÒâÈí¼þ½ø»¯ £¬ £¬£¬ÍþвÉý¼¶¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2025Äê3ÔÂÏÂÑ®±»Threat FabricÑо¿Ö°Ô±Ê״μͼ £¬ £¬£¬ÔçÆÚ°æ±¾ÒѾ߱¸ÆÕ±éÊý¾Ý͵ÇÔºÍÔ¶³Ì¿ØÖƹ¦Ð§ £¬ £¬£¬»¹Í¨¹ýÐéα¹ýʧÐÂΞÙÐÐÉç»á¹¤³ÌʵÑé £¬ £¬£¬ÓÕµ¼Óû§Ð¹Â¶¼ÓÃÜÇ®±ÒÇ®°üÃÜÔ¿ £¬ £¬£¬Æäʱ½öÔÚÍÁ¶úÆäÓÐС¹æÄ£»£»£»£»£»£»î¶¯¡£¡£¡£¡£¡£ÏÖÔÚ £¬ £¬£¬Threat FabricÒ»Á¬¼à¿Ø·¢Ã÷ £¬ £¬£¬CrocodilusÒѽ«Ä¿µÄ¹æÄ£À©´óÖÁÈ«Çò¡£¡£¡£¡£¡£×îа汾ÒýÈëлúÖÆ £¬ £¬£¬ÔÚÊÜѬȾװ±¸ÁªÏµÈËÁбíÖÐÌí¼ÓÐéαÁªÏµÈË £¬ £¬£¬µ±Êܺ¦Õß½Óµ½ÍþвÐÐΪÕߵ绰ʱ £¬ £¬£¬×°±¸»áÏÔʾÐéαÁªÏµÈËÐÕÃû¶ø·ÇÀ´µçÕßID £¬ £¬£¬ÍþвÐÐΪÕ߿ɽè´Ëð³äÒøÐС¢¹«Ë¾»òÇ×ÓÑ £¬ £¬£¬Ê¹Í¨»°¸ü¾ßÒÉ»óÐÔ £¬ £¬£¬´Ë²Ù×÷ÔÚÊÕµ½Ìض¨ÃüÁîʱ´¥·¢ £¬ £¬£¬Í¨¹ý±à³Ì·½·¨½¨ÉèÐÂÍâµØÁªÏµÈË¡£¡£¡£¡£¡£±ðµÄ £¬ £¬£¬Ð°汾»¹Í¨¹ý´úÂë´ò°üºÍÌØÊâXOR¼ÓÃÜÌáÉýÌӱܹ¥»÷ÄÜÁ¦ £¬ £¬£¬´úÂë¾í»ýºÍ¾À²øÊ¹ÄæÏò¹¤³Ì¸üÄÑÌâ £¬ £¬£¬»¹ÐÂÔöÍâµØÆÊÎö±»µÁÊý¾Ý¹¦Ð§ £¬ £¬£¬ÒÔʵÏÖ¸ü¸ßÖÊÁ¿µÄÊý¾ÝÍøÂç¡£¡£¡£¡£¡£CrocodilusµÄ¿ìËÙ½ø»¯ÏÔʾ³öÆä¶ÔÉç»á¹¤³ÌѧµÄÉî¶ÈÔËÓà £¬ £¬£¬³ÉΪһÖÖÌØÊâΣÏյĶñÒâÈí¼þ¡£¡£¡£¡£¡£¼øÓÚÆäÍþв £¬ £¬£¬½¨ÒéAndroidÓû§ÏÂÔØÈí¼þʱ¼á³ÖʹÓÃGoogle Play»ò¿ÉÐÅÈεÄÐû²¼ÉÌ £¬ £¬£¬È·±£Play ProtectʼÖÕ´¦ÓÚ¼¤»î״̬ £¬ £¬£¬²¢Ö»¹ÜïÔ̭ʹÓÃÓ¦ÓóÌÐòµÄÊýÄ¿ £¬ £¬£¬ÒÔ½µµÍѬȾΣº¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-malware-crocodilus-adds-fake-contacts-to-spoof-trusted-callers/