¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î

Ðû²¼Ê±¼ä 2025-06-05

1. ¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î


6ÔÂ3ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬¼ÓÄôóInstantel¹«Ë¾Éú²úµÄ1000¶ą̀¹¤Òµ¼à¿Ø×°±¸ÃæÁÙÑÏÖØÇå¾²Íþв¡£¡£¡£¡£ÍøÂçÇå¾²»ú¹¹CISAÐû²¼µÄ×Éѯ±¨¸æÏÔʾ£¬£¬£¬ £¬£¬£¬£¬£¬InstantelµÄMicromate²úÆ·£¨ÓÃÓڼͼÕñ¶¯¡¢ÔëÒôºÍ¿ÕÆø¹ýѹ£©ÒòÓëÉèÖö˿Úȱ·¦Éí·ÝÑéÖ¤Ïà¹ØµÄÎó²î¶øÊÜÓ°Ï죬£¬£¬ £¬£¬£¬£¬£¬¸ÃÎó²î±àºÅΪCVE-2025-1907£¬£¬£¬ £¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.8£¬£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£·¢Ã÷´ËÎó²îµÄMicrosecÑо¿Ô±Souvik Kandar͸¶£¬£¬£¬ £¬£¬£¬£¬£¬È«ÇòÓÐÁè¼Ý1000̨̻¶ÔÚ»¥ÁªÍøÉϵÄMicromate×°±¸¿ÉÄÜÒ×Êܹ¥»÷¡£¡£¡£¡£ÕâЩÒ×Ëð×°±¸ÆÕ±éÓ¦ÓÃÓڲɿó¡¢ËíµÀ¡¢ÇÅÁº¼à²â¡¢ÐÞ½¨ºÍÇéÐÎÇå¾²µÈ¶à¸öÁìÓò¡£¡£¡£¡£¹¥»÷ÕßÈôÄÜÔÚMicromate×°±¸ÉÏÖ´ÐÐÏÂÁ£¬£¬ £¬£¬£¬£¬£¬²»µ«¿É¸ü¸Ä»ò½ûÓÃÆä¼à¿Ø¹¦Ð§£¬£¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ý¹ýʧ»ò²»ÍêÕû£¬£¬£¬ £¬£¬£¬£¬£¬ÆÆËðÊý¾ÝÍêÕûÐÔ£¬£¬£¬ £¬£¬£¬£¬£¬»¹¿ÉÄܸøÉ󼯡¢ºÏ¹æÐÔ»ò°ü¹ÜË÷Åâ´øÀ´ÎÊÌâ¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬£¬×°±¸»¹¿ÉÄܱ»Ë𻵻ò¹Ø±Õ£¬£¬£¬ £¬£¬£¬£¬£¬ÖÂʹ±¬ÆÆºÍËíµÀÍÚ¾òµÈÒªº¦²Ù×÷ÖÐÖ¹¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓñ»ÈëÇÖ×°±¸ºáÏòÒÆ¶¯µ½ÆäËûÅþÁ¬µÄIT»òOTϵͳ¡£¡£¡£¡£CISAÔÚͨ¸æÖÐÖ¸³ö£¬£¬£¬ £¬£¬£¬£¬£¬InstantelÕýÔÚÕë¶Ô´ËÎó²î¾ÙÐй̼þ¸üУ¬£¬£¬ £¬£¬£¬£¬£¬ÔÚ²¹¶¡Ðû²¼Ç°£¬£¬£¬ £¬£¬£¬£¬£¬½¨ÒéÓû§½«ÊÜÓ°Ïì×°±¸µÄ»á¼ûÏÞÖÆÔÚÊÜÐÅÈεÄIPµØµã¡£¡£¡£¡£


https://www.securityweek.com/1000-instantel-industrial-monitoring-devices-possibly-exposed-to-hacking/


2. Gargle¹«Ë¾Êý¾Ý¿â´æÒþ»¼ÖÂ270Íò»¼ÕßÐÅϢ̻¶


6ÔÂ3ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬CybernewsÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÆðÓ°ÏìÃÀ¹ú¹«ÃñÒ½ÁÆÊý¾ÝµÄ´ó¹æÄ£Ð¹Â¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬£¬Ô¼270ÍòÃû»¼Õß×ÊÁϺÍ880ÍòÌõÔ¤Ô¼¼Í¼Íêȫ̻¶¡£¡£¡£¡£´Ë´Îй¶ԴÓÚÒ»¸öδÉèÖÃÇå¾²·À»¤µÄMongoDBÊý¾Ý¿â£¬£¬£¬ £¬£¬£¬£¬£¬Êý¾ÝËùÓÐÕßËäδ»ñ¹Ù·½È·ÈÏ£¬£¬£¬ £¬£¬£¬£¬£¬µ«ÏßË÷Ö¸ÏòGargle¹«Ë¾¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÑÀ¿ÆÕïËùÌṩӪÏú¡¢SEOºÍÍøÕ¾¿ª·¢Ð§ÀÍ£¬£¬£¬ £¬£¬£¬£¬£¬Ëä·ÇÒ½ÁƱ£½¡ÌṩÕߣ¬£¬£¬ £¬£¬£¬£¬£¬µ«ÓªÒµÄ£Ê½Éæ¼°´¦Öóͷ£»¼ÕßÊý¾Ý¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊý¾Ý¿â̻¶ʱ³¤¼°»á¼ûÕߣ¬£¬£¬ £¬£¬£¬£¬£¬ÔÚCybernews¼û¸æºó£¬£¬£¬ £¬£¬£¬£¬£¬Êý¾Ý¼¯Òѱ»±£»£»£»¤£¬£¬£¬ £¬£¬£¬£¬£¬µ«ÉÐδÊÕµ½¸Ã¹«Ë¾Ì¸ÂÛ¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸Ç»¼ÕßÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢×¡Ö·¡¢µç»°ºÅÂë¡¢ÐԱ𡢲¡ÀúID¡¢ÓïÑÔÆ«ºÃ¡¢Õ˵¥ÏêÇé¼°Ô¤Ô¼¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Éî¶ÈÃô¸ÐÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬£¬À¦°óºó×é³ÉСÎÒ˽¼ÒÉí·ÝÖÜÈ«À¶Í¼£¬£¬£¬ £¬£¬£¬£¬£¬ÎªÉí·Ý͵ÇÔ¡¢°ü¹Üڲƭ¡¢Ò½ÁÆÉí·Ý͵ÇÔ¼°´¹ÂÚ¹¥»÷µÈÀÄÓÃÐÐΪ·­¿ª´óÃÅ£¬£¬£¬ £¬£¬£¬£¬£¬Òý·¢¶Ô¸Ã¹«Ë¾²»×ñÊØHIPAA¹æÔòµÄÑÏÖØÖÊÒÉ¡£¡£¡£¡£


https://cybernews.com/security/dental-marketing-gargle-data-leak/


3. ÎÚ¿ËÀ¼GUR´Ó¶íͼ²¨Áзò¹«Ë¾ÇÔÈ¡4.4GBÉñÃØÊý¾Ý


6ÔÂ4ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¾üÊÂÇ鱨»ú¹¹GUR£¨ÓÖÃûHUR£©¶Ô¶íÂÞ˹º½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Í¼²¨Áзò·¢¶¯Á˺ڿ͹¥»÷£¬£¬£¬ £¬£¬£¬£¬£¬ÇÔÈ¡Á˸߶ÈÉñÃØÊý¾Ý¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬ £¬£¬£¬£¬£¬GURÈëÇÖÁ˶íÂÞ˹ÁªºÏ·É»ú¹«Ë¾£¨UAC£©Í¼²¨Áзò·Ö²¿£¬£¬£¬ £¬£¬£¬£¬£¬¸Ã·Ö²¿×÷ΪËÕÁªÊ±ÆÚͼ²¨ÁзòÉè¼Æ¾ÖµÄ¼ÌÐøÕߣ¬£¬£¬ £¬£¬£¬£¬£¬ÊǶíÂÞ˹¾ü·½Õ½ÂÔºäÕ¨»úµÄÖ÷Òª¿ª·¢ÉÌ¡£¡£¡£¡£Ç鱨½çÐÂÎÅÈËʿ͸¶£¬£¬£¬ £¬£¬£¬£¬£¬´Ë´ÎÐж¯ÖУ¬£¬£¬ £¬£¬£¬£¬£¬ÎÚ¿ËÀ¼Ìع¤»ñÈ¡ÁËÁè¼Ý4.4GB¾ßÓÐÕ½ÂÔÒâÒåµÄ¸ß¶ÈÉñÃØÄÚ²¿Êý¾Ý¡£¡£¡£¡£ÕâЩÊý¾Ýº­¸ÇÆÕ±é£¬£¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÄÚ²¿Í¨Ñ¶¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¹¤³Ìʦ¼òÀú¡¢²É¹º¼Í¼ÒÔ¼°ÉñÃØ¾Û»á¼Í¼µÈ¡£¡£¡£¡£ÎÚ¿ËÀ¼Ç鱨²¿·ÖÐÂÎÅÈËÊ¿ÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÏÕЩ̻¶ÁËͼ²¨ÁзòµÄËùÓÐÉñÃØ£¬£¬£¬ £¬£¬£¬£¬£¬Ê¹ÎÚ¿ËÀ¼·½ÃæÄܹ»ÖÜÈ«ÕÆÎÕ¶íÂÞ˹սÂÔº½¿ÕµÄÖ°Ô±ºÍÐж¯ÇéÐΡ£¡£¡£¡£ÕâЩÊý¾Ý¶ÔÎÚ¿ËÀ¼Ç鱨²¿·Ö¶øÑÔ¼ÛÖµ¼«¸ß£¬£¬£¬ £¬£¬£¬£¬£¬Ê¹Æä¶Ôͼ²¨ÁзòµÄÔË×÷ÏÕЩÁËÈçÖ¸ÕÆ¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬£¬GUR»¹ÉñÃØ¼à¿ØÍ¼²¨Áзò¹«Ë¾ÄÚ²¿ÎļþÁ÷´ïÊýÔ£¬£¬£¬ £¬£¬£¬£¬£¬ÉîÈëÏàʶ¹«Ë¾ÔËÓª£¬£¬£¬ £¬£¬£¬£¬£¬ÎªÎ´À´¹¥»÷¶íÂÞ˹¹ú·À¹¤ÒµÍøÂçÖ¤¾Ý¡£¡£¡£¡£ÎªÏóÕ÷ÐÔ¹¥»÷¶íÂÞ˹£¬£¬£¬ £¬£¬£¬£¬£¬GUR»¹ÔÚͼ²¨Áзò¹«Ë¾ÍøÕ¾ÉÏͿѻ£¬£¬£¬ £¬£¬£¬£¬£¬»­ÉÏèͷӥץ×ŶíÂÞ˹ºäÕ¨»úµÄͼ°¸¡£¡£¡£¡£´Ë´ÎÐж¯²¢·ÇÁæØêÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬£¬ÎÚ¿ËÀ¼GURÒ»Ö±ÔÚÒ»Ö±¹¥»÷¶íÂÞ˹µÄ¾ü¹¤ÁªºÏÌ壬£¬£¬ £¬£¬£¬£¬£¬ÈëÇÖÓë¹ú·À¡¢Õ½ÂÔº½¿Õ¡¢ÎäÆ÷Éú²úºÍÎïÁ÷Ïà¹ØµÄ¶íÂÞ˹¹«Ë¾Êý¾Ý¿â¡£¡£¡£¡£


https://securityaffairs.com/178641/hacking/ukraines-military-intelligence-agency-stole-4-4gb-of-highly-classified-internal-data-from-tupolev.html


4. FBIµÈ»ú¹¹¸üУºPlayÀÕË÷Èí¼þÒѹ¥»÷900¸ö×éÖ¯


6ÔÂ4ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©¡¢CISA¼°°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄÁªºÏÐû²¼µÄ×Éѯ¸üÐÂÅú×¢£¬£¬£¬ £¬£¬£¬£¬£¬×èÖ¹2025Äê5Ô£¬£¬£¬ £¬£¬£¬£¬£¬PlayÀÕË÷Èí¼þÍÅ»ïÒÑÈëÇÖÔ¼900¸ö×éÖ¯£¬£¬£¬ £¬£¬£¬£¬£¬Êܺ¦ÕßÊýÄ¿ÊÇ2023Äê10Ô±¨¸æµÄÈý±¶¡£¡£¡£¡£×Ô2022Äê6ÔÂÆð£¬£¬£¬ £¬£¬£¬£¬£¬PlayÀÕË÷Èí¼þ×éÖ¯¾Í¶Ô±±ÃÀ¡¢ÄÏÃÀºÍÅ·ÖÞµÄÖÚ¶àÆóÒµ¼°Òªº¦»ù´¡ÉèÊ©Ôì³ÉÓ°Ï죬£¬£¬ £¬£¬£¬£¬£¬³ÉΪ2024Äê×î»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£¡£¡£¡£¸ÃÍÅ»ïÿ´Î¹¥»÷¾ùʹÓÃÖØÐ±àÒëµÄ¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬£¬£¬Õâ´ó´óÔöÌíÁËÇå¾²½â¾ö¼Æ»®¼ì²âºÍ×èÖ¹µÄÄѶÈ£¬£¬£¬ £¬£¬£¬£¬£¬²¿·ÖÊܺ¦Õß»¹½Óµ½µç»°ÀÕË÷Êê½ð£¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ±ÜÃâÊý¾Ýй¶¡£¡£¡£¡£½ñÄêÄêÍ·ÒÔÀ´£¬£¬£¬ £¬£¬£¬£¬£¬ÓëPlayÀÕË÷Èí¼þÔËÓªÉÌÓйصijõʼ»á¼ûÊðÀíʹÓÃÔ¶³Ì¼à¿ØºÍÖÎÀí¹¤¾ßÖеĶà¸öÎó²î£¬£¬£¬ £¬£¬£¬£¬£¬¶ÔÃÀ¹ú×éÖ¯ÌᳫԶ³Ì´úÂëÖ´Ðй¥»÷£¬£¬£¬ £¬£¬£¬£¬£¬ÎªºóÐøµÄÀÕË÷Èí¼þ¹¥»÷×ö×¼±¸¡£¡£¡£¡£PlayÀÕË÷Èí¼þÍÅ»ïÒѱ£´æ½üÈýÄ꣬£¬£¬ £¬£¬£¬£¬£¬ÔÚ°²ÅÅÀÕË÷Èí¼þǰ»áÇÔÈ¡Ãô¸ÐÎļþ£¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ´ËÏòÊܺ¦ÕßʩѹË÷ÒªÊê½ð£¬£¬£¬ £¬£¬£¬£¬£¬ÇÒ½ÓÄɵç×ÓÓʼþ×÷Ϊ̸ÅÐÇþµÀ£¬£¬£¬ £¬£¬£¬£¬£¬²»ÌṩTor̸ÅÐÒ³ÃæÁ´½Ó£¬£¬£¬ £¬£¬£¬£¬£¬»¹Ê¹ÓÃ×Ô½ç˵VSS¸´Öƹ¤¾ßÇÔÈ¡Îļþ¡£¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬£¬£¬ £¬£¬£¬£¬£¬FBIµÈ»ú¹¹±Þ²ßÇå¾²ÍŶÓÓÅÏȽ«ÏµÍ³¡¢Èí¼þºÍ¹Ì¼þ¸üÐÂÖÁ×îа汾£¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ½µµÍÎó²î±»Ê¹ÓõÄΣº¦£»£»£»ÔÚËùÓÐЧÀÍÖÐʵÑé¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©£¬£¬£¬ £¬£¬£¬£¬£¬ÓÈÆäÒªÖØµã¹Ø×¢VPN¡¢ÍøÂçÓʼþµÈ¿É»á¼û×éÖ¯ÍøÂçÖÐÒªº¦ÏµÍ³µÄÕË»§£»£»£»Í¬Ê±ÒªÎ¬»¤ÀëÏßÊý¾Ý±¸·Ý£¬£¬£¬ £¬£¬£¬£¬£¬²¢¿ª·¢ºÍ²âÊÔ»Ö¸´³ÌÐò£¬£¬£¬ £¬£¬£¬£¬£¬½«Æä×÷Ϊ×éÖ¯±ê×¼Ç徲ʵ¼ùµÄÒ»²¿·Ö¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/


5. ³öÊé¾ÞÍ·Lee Enterprises³ÆÊý¾Ýй¶ӰÏìÁ˽ü4ÍòÈË


6ÔÂ4ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬³öÊé¾ÞÍ·Lee EnterprisesÕýÔÚ֪ͨ½ü40,000ÃûСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê2ÔÂÀÕË÷Èí¼þ¹¥»÷Öб»µÁµÄÖ°Ô±¡£¡£¡£¡£×÷ΪÃÀ¹ú×î´óµÄ±¨Òµ¼¯ÍÅÖ®Ò»£¬£¬£¬ £¬£¬£¬£¬£¬Lee EnterprisesÔÚ26¸öÖݳöÊé¶à·ÝÈÕ±¨¡¢ÖÜ¿¯ºÍרҵ¿¯Î£¬£¬ £¬£¬£¬£¬£¬ÓµÓÐÖØ´óµÄ¶ÁÕßȺÌå¡£¡£¡£¡£¸Ã¹«Ë¾±¾ÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨39,779ÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÄÎļþ£¬£¬£¬ £¬£¬£¬£¬£¬¿ÉÄÜÉæ¼°µÄÃû×Ö¡¢ÐÕÊÏÒÔ¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢ÔÚ2ÔÂ3ÈÕ±»Î´¾­ÊÚȨ»á¼û»ò»ñÈ¡¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂLee EnterprisesÃÀ¹ú¸÷µØµÄÐÂÎű༭ÊÒϵͳÖÐÖ¹£¬£¬£¬ £¬£¬£¬£¬£¬ÆÈʹ³öÊéÉ̹رÕÐí¶àÍøÂ磬£¬£¬ £¬£¬£¬£¬£¬Ôì³ÉÊýÊ®¼Ò±¨Ö½µÄÓ¡Ë¢ºÍµÝËÍ´óÃæ»ýÖÐÖ¹£¬£¬£¬ £¬£¬£¬£¬£¬»¹Òý·¢ÁËÆóÒµVPNÖÐÖ¹ÒÔ¼°ÎÞ·¨»á¼ûÄÚ²¿ÏµÍ³ºÍÔÆ´æ´¢µÈÑÏÖØÎÊÌâ¡£¡£¡£¡£Ò»Öܺ󣬣¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»Îļþ£¬£¬£¬ £¬£¬£¬£¬£¬Åû¶ºÚ¿Í¡°¼ÓÃÜÁËÒªº¦Ó¦ÓóÌÐò²¢ÇÔÈ¡ÁËijЩÎļþ¡±¡£¡£¡£¡£Ö»¹ÜLee EnterprisesÉÐδÃ÷È·¹é×ïÓÚÏêϸÐж¯·½£¬£¬£¬ £¬£¬£¬£¬£¬µ«÷è÷ëÀÕË÷Èí¼þÍÅ»ïÒÑÔÚ2ÔÂβÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬ £¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË×ܼÆ350GBµÄ120,000·ÝÎļþ£¬£¬£¬ £¬£¬£¬£¬£¬Íþв½«ÓÚ3ÔÂ5ÈÕËùÓÐÐû²¼¡£¡£¡£¡£2ÔÂ28ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÍŻォLee EnterprisesÌí¼Óµ½Æä°µÍøÐ¹ÃÜÍøÕ¾£¬£¬£¬ £¬£¬£¬£¬£¬·ÖÏíÁ˾ݳƴӸù«Ë¾ÊÜËðϵͳÖÐÇÔÈ¡µÄÊý¾ÝÑù±¾£¬£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Õþ¸®Éí·Ý֤ɨÃè¼þ¡¢²ÆÎñµç×Ó±í¸ñµÈÉñÃØÎļþ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/media-giant-lee-enterprises-says-data-breach-affects-39-000-people/


6. À­½Ü¹ûµÂÊÐÕþ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬£¬£¬³¬400GBÊý¾Ý»òй¶


6ÔÂ4ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬À­½Ü¹ûµÂÊÐÕþ¹«Ë¾£¨RMC£©ÍøÕ¾ÒÉËÆÔâÓöÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬£¬£¬Òý·¢¹«ÖÚ¶ÔÃô¸Ð¹«ÃñÊý¾Ý¿ÉÄܱ»µÁµÄµ£ÐÄ£¬£¬£¬ £¬£¬£¬£¬£¬½üÆÚ¸ÃÊý¾Ýй¶ÊÂÎñÆØ¹âºó£¬£¬£¬ £¬£¬£¬£¬£¬Òý·¢×¡Ãñ¿Ö»Å¡£¡£¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ£¬£¬£¬ £¬£¬£¬£¬£¬´Ë´Îй¶µÄÊý¾Ý¿ÉÄܰüÀ¨À­½Ü¹ûµÂÊÐÕþ¸®ÐÞ½¨ºÍ¹«¹²»ù´¡ÉèÊ©µÄÒªº¦ÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬£¬ÈçѧУ¡¢Ò½Ôº¡¢ÇÅÁººÍ°ì¹«Êҵȣ¬£¬£¬ £¬£¬£¬£¬£¬¹ÙÔ±ÏÓÒÉÁè¼Ý400GBµÄÊý¾Ý¿ÉÄÜÔ⵽й¶¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬ £¬£¬£¬£¬£¬RMCÖÎÀí²¿·ÖѸËÙ֪ͨÁËÓ¡¶È¹ú¼ÒµçÐÅÓÐÏÞ¹«Ë¾£¨BSNL£©µÄÍøÂçÇå¾²ÍŶӡ£¡£¡£¡£BSNLÍŶÓÁ¬Ã¦½«GIS£¨µØÀíÐÅϢϵͳ£©ÍøÕ¾´ÓÍøÂçÖиôÀ룬£¬£¬ £¬£¬£¬£¬£¬²¢¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñÕö¿ªÏêϸÊӲ죬£¬£¬ £¬£¬£¬£¬£¬ÏÖÔÚÕýÆð¾¢È·¶¨Ãü¾Ýй¶Ö鯽¼°ÕÒ³öµ¼Ö¹¥»÷µÄÎó²î¡£¡£¡£¡£ÆðÔ´ÆÀ¹ÀÏÔʾ£¬£¬£¬ £¬£¬£¬£¬£¬¸ÃÍøÕ¾¿ÉÄÜÔÚ¡°ÐÁ¶à¶ûÐж¯¡±£¨Ó¡¶È½üÆÚÕë¶ÔÅÁ¹þ¶û¼ÓÄ·¿Ö²ÀÏ®»÷µÄ¾üÊ»ØÓ¦£©Ê±´úÔâµ½ÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬£¬²»¹ýÕâÒ»¹ØÁªÉÐδ»ñµÃ֤ʵ¡£¡£¡£¡£Ö»¹ÜRMCÔÚÍøÂçÇå¾²²½·¥ÉÏͶÈëÁËÔ¼1ÒÚ¬±È£¬£¬£¬ £¬£¬£¬£¬£¬µ«ÒÑÍùÒ²ÔøÔâÓö¹ýÀàËÆÊÂÎñ¡£¡£¡£¡£Õþ¸®ÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬£¬ÒªÖÜÈ«Ïàʶ´Ë´ÎÍøÂç¹¥»÷µÄÓ°Ï죬£¬£¬ £¬£¬£¬£¬£¬»¹ÐèÆÚ´ýÕýÔÚ¾ÙÐеÄȡ֤ÊÓ²ìÍê³É¡£¡£¡£¡£


https://www.news9live.com/crime/rajkot-civic-bodys-gis-website-hit-by-cyber-attack-over-400-gb-data-feared-stolen-2862626