°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶

Ðû²¼Ê±¼ä 2025-04-23

1. °Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶


4ÔÂ23ÈÕ£¬£¬£¬£¬½ñÄê2Ô£¬£¬£¬£¬°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÏµÍ³ÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÊýǧÃûѧÉú¡¢Î÷ϯºÍÖÎÀíÖ°Ô±ÐÅÏ¢±»µÁ¡£¡£¡£¡£Öܶþ£¬£¬£¬£¬Ñ§Ð£¹ÙÔ±Ðû²¼Î¥¹æÍ¨Öª£¬£¬£¬£¬ÖÒÑÔ2ÔÂ13ÈÕ±¬·¢µÄÍøÂçÊÂÎñ̻¶ÁËijЩITϵͳ¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬Ò»Ð©Îļþ¿ÉÄÜÒѱ»·¸·¨·Ö×Óй¶£¬£¬£¬£¬Éæ¼°ÏÖÈκÍǰÈιÍÔ±¡¢×ÔÔ¸ÕߺͳаüÉÌ£¬£¬£¬£¬ÒÔ¼°²»µ½1.5%µÄѧÉú¡£¡£¡£¡£°Í¶ûµÄĦÊй«Á¢Ñ§Ð£¹ÙԱȷÈÏ£¬£¬£¬£¬´Ë´ÎÊÂÎñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ«Î´Ö§¸¶Êê½ð¡£¡£¡£¡£Ñ§Ð£Î´Í¸Â¶ÏêϸÊÜÓ°ÏìÈËÊý£¬£¬£¬£¬µ«Ö¸³öÊÜÓ°ÏìѧÉúÁè¼Ý1150ÈË¡£¡£¡£¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÔ±¹¤Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂë»ò»¤ÕÕºÅÂ룬£¬£¬£¬ÒÔ¼°Ñ§Éúͨ»°¼Í¼¡¢È±¿Î¼Í¼»òÉúÓý״̬µÈÎļþ¡£¡£¡£¡£Ñ§Ð£ÏµÍ³Ê×ϯִÐйÙÉ£ÌØÀûÈû˹×Ô¼ºÒ²ÊÜÓ°Ï죬£¬£¬£¬ËýÌåÏÖѧУ55%µÄÔ±¹¤Êܵ½Ó°Ïì¡£¡£¡£¡£ÉÐÓб¨µÀ³Æ£¬£¬£¬£¬·¢Ã÷ÁËÒ»·âÀ´×ÔCloakÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£¡£¡£Ñ§Ð£¹ÙÔ±³Æ£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼2.5ÍòÈË£¬£¬£¬£¬°üÀ¨7000¶àÃûÏÖÈÎÎ÷ϯÒÔ¼°×Ô2010ÄêÒÔÀ´ÔÚ¸ÃÑ§ÇøÊÂÇéµÄËùÓÐÈË¡£¡£¡£¡£Ö´·¨²¿·ÖÒѽӵ½Í¨Öª£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾Ð­Öú»Ö¸´¡£¡£¡£¡£Ñ§Ð£ÒÑ×îÏÈÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬£¬£¬£¬ÌṩÁ½ÄêÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬²¢ÉèÁ¢ºô½ÐÖÐÐĽâ´ðÎÊÌâ¡£¡£¡£¡£


https://therecord.media/baltimore-public-schools-data-breach-ransomware


2. Âêɯ°Ù»õÔâÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂÖ÷¹Ë¶©µ¥ÑÓ³Ù


4ÔÂ22ÈÕ£¬£¬£¬£¬Ó¢¹ú¿ç¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬¶ÔÆäÔËÓªÔì³ÉÒ»¶¨×ÌÈÅ£¬£¬£¬£¬ÓÈÆäÊÇClick and Collect¶©µ¥ÏµÍ³¡£¡£¡£¡£Âêɯ°Ù»õÔÚÈ«ÇòÓµÓÐ1400¶à¼ÒÃŵ꣬£¬£¬£¬Ô±¹¤×ÜÊý´ï6.4ÍòÃû£¬£¬£¬£¬ÒÔÏúÊÛ´ò°ç¡¢Ê³ÎïºÍ¼Ò¾ÓÓÃÆ·µÈ¶àÑù»¯²úÆ·¶øÖøÃû¡£¡£¡£¡£ÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÐû²¼µÄÐÂΟåÖУ¬£¬£¬£¬Âêɯ°Ù»õ֤ʵÁË´Ë´ÎÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú£¬£¬£¬£¬ÒÔÖÎÀíÏ¢Õù¾öÕâÒ»½ôÆÈÇéÐΡ£¡£¡£¡£¹«Ë¾ÒѽÓÄÉС¹æÄ£ÔÝʱµ÷½â²½·¥±£»£»£»£»£»£»¤Ö÷¹ËºÍÓªÒµÇå¾²£¬£¬£¬£¬²¢¶Ô´ËÔì³ÉµÄδ±ãÉî±íǸÒâ¡£¡£¡£¡£Ö»¹ÜÃæÁÙÌôÕ½£¬£¬£¬£¬Âêɯ°Ù»õµÄÃÅµê¡¢ÍøÕ¾ºÍÓ¦ÓóÌÐòÈÔÔÚÕý³£ÔËÓª¡£¡£¡£¡£¹«Ë¾ÒÑÔ¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊӲ죬£¬£¬£¬²¢½ÓÄɲ½·¥½øÒ»²½±£»£»£»£»£»£»¤ÆäÍøÂ磬£¬£¬£¬È·±£¿£¿£¿£¿Í»§Ð§ÀͲ»ÊÜÓ°Ïì¡£¡£¡£¡£Âêɯ°Ù»õÒÑ֪ͨÊý¾Ý±£»£»£»£»£»£»¤¼àÊÓ»ú¹¹ºÍ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¬£¬£¬£¬µ«Î´Ìá¹©ÍøÂçÊÂÎñµÄÏêϸϸ½Ú¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÀÕË÷Èí¼þÍÅ»ï»òÆäËûÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬µ«Èô´Ë´Î¹¥»÷Éæ¼°ÀÕË÷Èí¼þ£¬£¬£¬£¬Êý¾ÝºÜ¿ÉÄÜÒѱ»ÍµÈ¡£¡£¡£¡£¬£¬£¬£¬²¢¿ÉÄܱ»ÓÃ×÷½øÒ»²½Ê©Ñ¹¹«Ë¾Ö§¸¶ÀÕË÷½ðµÄ³ïÂë¡£¡£¡£¡£Âêɯ°Ù»õÒÑÏòÊÜÓ°Ïì¿Í»§ÖÂǸ£¬£¬£¬£¬²¢ÔÊÐí¾¡¿ì»Ö¸´Õý³£Ð§ÀÍ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/marks-and-spencer-confirms-a-cyberattack-as-customers-face-delayed-orders/


3. SK TelecomÔâ¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬¿Í»§USIMÐÅÏ¢ÃæÁÙΣº¦


4ÔÂ22ÈÕ£¬£¬£¬£¬º«¹ú×î´óÒÆ¶¯ÔËÓªÉÌSK Telecom¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÈí¼þѬȾ»ñÈ¡Á˿ͻ§Ãô¸ÐµÄUSIMÏà¹ØÐÅÏ¢¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚÍâµØÊ±¼ä2025Äê4ÔÂ19ÈÕÐÇÆÚÁùÍíÉÏ11µã£¬£¬£¬£¬ÕýÖµÖÜÄ©ÇÒ´ó¶¼×éÖ¯ÈËÊÖȱ·¦Ö®¼Ê¡£¡£¡£¡£SK TelecomѸËÙÏìÓ¦£¬£¬£¬£¬ÔÚ·¢Ã÷¶ñÒâÈí¼þºóÁ¬Ã¦É¾³ý²¢¸ôÀëÁËÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ÉÐδȷÈÏй¶ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£¡£¡£´Ë´ÎÊÂÎñÒýÆðÁ˺«¹ú»¥ÁªÍøÇå¾²¾Ö£¨KISA£©ºÍ¸Ã¹úСÎÒ˽¼ÒÐÅÏ¢±£»£»£»£»£»£»¤Î¯Ô±»áµÄ¸ß¶È¹Ø×¢£¬£¬£¬£¬ÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬£¬£¬£¬ÈëÇÖµÄÏêϸԵ¹ÊÔ­ÓÉ¡¢¹æÄ£»£»£»£»£»£»ò¹æÄ£ÉÐδȷ¶¨¡£¡£¡£¡£USIMÊý¾Ý°üÀ¨¹ú¼ÊÒÆ¶¯Óû§Ê¶±ðÂë¡¢ÒÆ¶¯Õ¾ISDNºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ÕâЩÊý¾ÝÒ»µ©Ð¹Â¶£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÓÐÕë¶ÔÐԵļàÊÓ¡¢¸ú×ÙºÍSIM¿¨½»Á÷¹¥»÷¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´Î¹¥»÷£¬£¬£¬£¬SK TelecomÒÑÔöÇ¿¶ÔUSIM½»Á÷ºÍÒì³£Éí·ÝÑé֤ʵÑéµÄ×èÖ¹£¬£¬£¬£¬²¢½«Á¬Ã¦ÔÝÍ£Óë¿ÉÒɻÏà¹ØµÄÕË»§Ð§ÀÍ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬½¨ÒéÓû§Í¨¹ýÖ¸¶¨ÃÅ»§×¢²áUSIM±£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬ÒÔ±ÜÃâÊÖ»úºÅÂë±»²»·¨ÒÆÖ²µ½ÁíÒ»ÕÅSIM¿¨ÉÏ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÉÐÎÞÍþвÐÐΪÕ߶Դ˴ι¥»÷ÈÏÕæ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/


4. Active! MailÁãÈÕÎó²îÔâÆð¾¢Ê¹Ó㬣¬£¬£¬ÈÕ±¾¶à»ú¹¹ÊÜÓ°Ïì


4ÔÂ22ÈÕ£¬£¬£¬£¬Active! Mail±£´æÑÏÖØÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-42599£¬£¬£¬£¬CVSS v3ÆÀ·Ö9.8£©£¬£¬£¬£¬Õý±»Æð¾¢Ê¹ÓÃÓÚÕë¶ÔÈÕ±¾´óÐÍ×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìËùÓа汾Active!£¬£¬£¬£¬°üÀ¨ËùÓÐÊÜÖ§³Ö²Ù×÷ϵͳƽ̨Éϵġ°BuildInfo£º6.60.05008561¡±£¬£¬£¬£¬ÈôÔ¶³ÌµÚÈý·½·¢ËͶñÒâÇëÇ󣬣¬£¬£¬Ôò¿ÉÄÜÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾øÐ§ÀÍÌõ¼þ¡£¡£¡£¡£Active!mail×÷Ϊ»ùÓÚÍøÂçµÄµç×ÓÓʼþ¿Í»§¶Ë£¬£¬£¬£¬ËäÔÚÈ«Çò¹æÄ£ÄÚ²»ÈçGmail»òOutlookÆÕ±éʹÓ㬣¬£¬£¬µ«ÔÚÈÕ±¾´óÐÍÆóÒµ¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÒøÐеÄÈÕÓïÇéÐÎÖг£±»ÓÃ×÷Ⱥ¼þ×é¼þ£¬£¬£¬£¬Òѱ»Áè¼Ý2,250¸ö×éÖ¯½ÓÄÉ£¬£¬£¬£¬ÓµÓÐÁè¼Ý11,000,000¸öÕÊ»§£¬£¬£¬£¬ÊǸùúÉÌÒµÍøÂçÓʼþÊг¡µÄÖ÷Òª¼ÓÈëÕß¡£¡£¡£¡£ÈÕ±¾CERTÒÑÈ·ÈϸÃÎó²î´¦ÓÚ»îԾʹÓÃ״̬£¬£¬£¬£¬²¢±Þ²ßËùÓÐÓû§¾¡¿ì¸üÐÂÖÁActive!Mail 6 BuildInfo: 6.60.06008562¡£¡£¡£¡£ÈÕ±¾ÍøÂçÍйܺÍITЧÀÍÌṩÉÌKagoya Japan¼°WADAX¾ù±¨¸æÁËÒòÊÔͼʹÓøÃÎó²îÔì³ÉµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬²¢ÒÑÔÝʱ×èÖ¹Active!ÓʼþЧÀÍ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬MacnicaÇå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬£¬ÖÁÉÙÓÐ227̨̻¶ÔÚ»¥ÁªÍøÉϵÄActive!ЧÀÍÆ÷¿ÉÄÜÊܵ½¹¥»÷£¬£¬£¬£¬ÆäÖÐ63̨ÔÚ´óѧʹÓᣡ£¡£¡£ÈÕ±¾CERTΪÎÞ·¨Á¬Ã¦Ó¦ÓÃÇå¾²¸üеÄÓû§Ìá³öÁËÏêϸ»º½â²½·¥£¬£¬£¬£¬ÒÔÓ¦¶Ô´ËÎó²î´øÀ´µÄÍþв¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/


5. ÀÕË÷Èí¼þÖÂÁ½Ò½ÁƱ£½¡×éÖ¯Êý¾Ýй¶£¬£¬£¬£¬³¬24ÍòÈËÊÜÓ°Ïì


4ÔÂ22ÈÕ£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬Á½¼ÒÒ½ÁƱ£½¡×éÖ¯Ïà¼ÌÈ·ÈÏÔÚÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó·ºÆðÊý¾Ýй¶£¬£¬£¬£¬Ó°ÏìÈËÊý¾ùÁè¼Ý10Íò¡£¡£¡£¡£Î»ÓÚÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ±´¶û¾È»¤³µ¹«Ë¾£¬£¬£¬£¬ÔÚ2025Äê2ÔÂ13ÈÕ¼ì²âµ½ÍøÂçÈëÇÖ£¬£¬£¬£¬ºÚ¿Í»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¼°¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢µÄÎļþ£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁË114,000ÈË¡£¡£¡£¡£ÃÀ¶ÅɯÀÕË÷Èí¼þ×éÖ¯Ðû³Æ´Ó±´¶û¾È»¤³µÇÔÈ¡ÁËÁè¼Ý200GBµÄÊý¾Ý¡£¡£¡£¡£ÁíÒ»¼ÒÊÜÓ°ÏìµÄÒ½ÁƱ£½¡×éÖ¯ÊÇλÓÚ°¢À­°ÍÂíÖݲ®Ã÷º²µÄÑÛ¿ÆÕïËù°¢À­°ÍÂíÑÛ¿ÆÐ­»á¡£¡£¡£¡£¸ÃÕïËùÓÚ4ÔÂ10ÈÕ͸¶£¬£¬£¬£¬ÏÖÓкÍÒÔǰ»¼ÕßµÄСÎÒ˽¼Ò¼°Êܱ£»£»£»£»£»£»¤¿µ½¡ÐÅÏ¢Ô⵽й¶£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ1ÔÂ30ÈÕ·¢Ã÷ÍøÂçÎó²î£¬£¬£¬£¬ºÚ¿Í×Ô1ÔÂ22ÈÕÆð¼´¿É»á¼ûÆäϵͳ¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬¾ÝÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý131,000ÈË¡£¡£¡£¡£È¥Ä꣬£¬£¬£¬ÃÀ¹ú±¬·¢ÁË700¶àÆðÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ð¹Â¶µÄ¼Í¼×ÜÊýÁè¼Ý1.8ÒÚÌõ¡£¡£¡£¡£


https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/


6. Elusive CometºÚ¿Í×é֯ʹÓÃZoomʵÑéÉç»á¹¤³Ì¹¥»÷


4ÔÂ22ÈÕ£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬Ò»¸öÃûΪ¡°Elusive Comet¡±µÄºÚ¿Í×éÖ¯Õë¶Ô¼ÓÃÜÇ®±ÒÓû§ÌᳫÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬Í¨¹ýZoomµÄÔ¶³Ì¿ØÖƹ¦Ð§ÓÕÆ­Óû§ÊÚÓèÆä»á¼ûȨÏÞ¡£¡£¡£¡£¸Ã×é֯ģÄâLazarusºÚ¿Í×éÖ¯ÔÚ15ÒÚÃÀÔªBybit¼ÓÃÜÇ®±Ò͵ÇÔ°¸ÖÐʹÓõÄÊÖÒÕ£¬£¬£¬£¬Ê¹ÓÃÕýµ±ÊÂÇéÁ÷³ÌʵÑé¹¥»÷¡£¡£¡£¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵĿþÀÜÕË»§»òµç×ÓÓʼþ£¬£¬£¬£¬ÒÔ¡°Åí²©¼ÓÃÜÇ®±Ò¡±²É·ÃÔ¼ÇëΪ»Ï×Ó£¬£¬£¬£¬Ïò¸ß¼ÛֵĿµÄ·¢ËÍCalendlyÁ´½Ó£¬£¬£¬£¬°²ÅÅZoom¾Û»á¡£¡£¡£¡£ÓÉÓÚÔ¼ÇëÁ´½ÓÕæÊµÓÐÓ㬣¬£¬£¬½µµÍÁËÄ¿µÄµÄÏÓÒÉˮƽ¡£¡£¡£¡£ÔÚZoomͨ»°Ê±´ú£¬£¬£¬£¬¹¥»÷ÕßÌᳫÆÁÄ»¹²Ïí»á»°£¬£¬£¬£¬²¢½«ÆäZoomÏÔʾÃû³ÆÖØÃüÃûΪ¡°Zoom¡±£¬£¬£¬£¬Ê¹Êܺ¦ÕßÎóÒÔΪÇëÇóÀ´×ÔÓ¦ÓóÌÐò×Ô¼º£¬£¬£¬£¬´Ó¶øÅú×¼Ô¶³Ì¿ØÖÆÇëÇ󡣡£¡£¡£Ò»µ©»ñµÃ¿ØÖÆÈ¨£¬£¬£¬£¬¹¥»÷Õß±ã¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢×°ÖöñÒâÈí¼þ¡¢»á¼ûÎļþ»òÌᳫ¼ÓÃÜÉúÒâ¡£¡£¡£¡£ËûÃÇ»¹¿ÉÄÜѸËÙÖ²ÈëÒþÃØºóÃÅ£¬£¬£¬£¬½¨É賤ÆÚ»á¼ûȨÏÞ£¬£¬£¬£¬ÒÔ±ãÈÕºóʹÓᣡ£¡£¡£Trail of Bits¹«Ë¾Ö¸³ö£¬£¬£¬£¬´Ë´Î¹¥»÷µÄȨÏÞ¶Ô»°¿òÓëÆäËûÎÞº¦µÄZoom֪ͨÏàËÆ£¬£¬£¬£¬Óû§¿ÉÄÜÔÚ²»ÏàʶЧ¹ûµÄÇéÐÎÏÂÊÚÓèÅÌËã»úÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£Îª·ÀÓù´ËÀàÍþв£¬£¬£¬£¬¸Ã¹«Ë¾½¨ÒéʵÑéϵͳ¹æÄ£µÄÒþ˽ƫºÃÕ½ÂÔ¿ØÖÆÉèÖÃÎļþ£¬£¬£¬£¬±ÜÃâ¿É»á¼ûÐÔ»á¼û£¬£¬£¬£¬²¢½¨ÒéÇå¾²Òªº¦ÐÍÇéÐκʹ¦Öóͷ£Ãû¹óÊý×Ö×ʲúµÄ×éÖ¯ÍêÈ«ÒÆ³ýZoom¿Í»§¶Ë£¬£¬£¬£¬ÒÔ½µµÍΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-abuse-zoom-remote-control-feature-for-crypto-theft-attacks/