Âêɯ°Ù»õÈ·ÈÏÉç»á¹¤³ÌѧÒý·¢´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2025-07-091. Âêɯ°Ù»õÈ·ÈÏÉç»á¹¤³ÌѧÒý·¢´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷
7ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ó¢¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©ÔâÓöÒ»ÆðÓÉÖØ´óÉç»á¹¤³Ì¹¥»÷Òý·¢µÄÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕÑݱäΪDragonForceÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¸Ã¹«Ë¾¶Ê³¤°¢Ææ¡¤ÅµÂüÔÚÓ¢¹úÒé»áÌýÖ¤»áÉÏÅû¶£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¾«×¼Ã°³äÓëÂêɯ°Ù»õÏàÖúµÄµÚÈý·½ÊµÌåÔ±¹¤£¬£¬£¬£¬£¬£¬£¬£¬ÓÕÆITÍâ°üЧÀÍÉÌËþËþ×ÉѯЧÀ͹«Ë¾ÖØÖÃÔ±¹¤ÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉÇÖÈëÆäÍøÂç¡£¡£¡£´Ë´ÎÉç»á¹¤³ÌÊֶα»ÅµÂü³ÆÎª"¼«ÆäÖØ´óµÄð³äÐÐΪ"£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß²»µ«Î±ÔìÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬»¹Ê¹ÓõÚÈý·½Ð§ÀÍ×÷ÎªÌø°å£¬£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÇÖÈëÍøÂçºó°²ÅÅÁËÔ´×ÔÑÇÖÞµÄDragonForceÀÕË÷Èí¼þ¡£¡£¡£Ö»¹Ü²¿·ÖýÌåÎ󽫸ÃÍÅ»ïÓëÂíÀ´Î÷ÑÇÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯"DragonForce Malaysia"¹ØÁª£¬£¬£¬£¬£¬£¬£¬£¬µ«¾ÝÇå¾²»ú¹¹×·×Ù£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÏÖʵÓÉÓëScattered SpiderÏà¹ØµÄÍþвÐÐΪÕßʵÑ飬£¬£¬£¬£¬£¬£¬£¬½ÓÄÉË«ÖØÀÕË÷Õ½ÂÔ¡£¡£¡£ÃæÁÙÀÕË÷Íþв£¬£¬£¬£¬£¬£¬£¬£¬Âêɯ°Ù»õ½ÓÄÉ"²»Ö±½Ó½Ó´¥¹¥»÷Õß"µÄÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬Î¯ÍÐרҵ̸ÅÐÍŶӴ¦Öóͷ£¡£¡£¡£ÅµÂüÔÚÌýÖ¤»áÉÏÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬£¬ÆóÒµÒÑÓëÓ¢¹ú¹ú¼Ò·¸·¨¾Ö£¨NCA£©µÈÖ´·¨»ú¹¹³ä·ÖÏàÖú£¬£¬£¬£¬£¬£¬£¬£¬µ«¾Ü¾øÍ¸Â¶ÊÇ·ñÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬£¬½öÌåÏÖ"¹ûÕæÏ¸½Ú²»ÇкϹ«ÖÚÀûÒæ"¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü±£´æÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬DragonForceÀÕË÷ÍøÕ¾ÉÐδÐû²¼Âêɯ°Ù»õÏà¹ØÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬ÌåÏÖ¿ÉÄÜͨ¹ý̸Åи濢½â¾ö¼Æ»®¡£¡£¡£
https://www.bleepingcomputer.com/news/security/mands-confirms-social-engineering-led-to-massive-ransomware-attack/
2. ChromeÓëEdgeÊÐËÁ¾ªÏÖ°ÙÍò¼¶¶ñÒâÀ©Õ¹
7ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¹È¸èChromeÍøÉÏÓ¦Óõ꼰΢ÈíEdge¹Ù·½ÊÐËÁ¿ËÈÕÆØ³ö´ó¹æÄ£¶ñÒâÀ©Õ¹³ÌÐòÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°½ü30¿îαװ³ÉÊÊÓù¤¾ßµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬×ÜѬȾÓû§Áè¼Ý230Íò¡£¡£¡£¾ÝÇå¾²¹«Ë¾Koi SecurityÅû¶£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÀ©Õ¹³ÌÐòÒÔÑÕɫѡÔñÆ÷¡¢VPN¡¢ÐÄÇé·ûºÅ¼üÅÌ¡¢ÒôÁ¿ÔöÇ¿Æ÷µÈÒ»Ñùƽ³£¹¦Ð§Îª»Ï×Ó£¬£¬£¬£¬£¬£¬£¬£¬ÔÚChromeÊÐËÁÀÛ¼ÆÏÂÔØÁ¿´ï170Íò´Î£¬£¬£¬£¬£¬£¬£¬£¬EdgeÊÐËÁÏà¹ØÀ©Õ¹ÏÂÔØÁ¿ÒàÍ»ÆÆ60Íò´Î¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬´ó¶¼¶ñÒâÀ©Õ¹×î³õÒÔÕýµ±ÃæÄ¿Éϼܣ¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÊý°ÙÌõÕýÃæÆÀ¼ÛºÍÏÔÖøÕ¹Ê¾Î»ÖÃÎóµ¼Óû§¡£¡£¡£Æä¶ñÒ⹦ЧͨʺóÐø¸üÐÂÇÄȻֲÈ룬£¬£¬£¬£¬£¬£¬£¬¹È¸èµÄ×Ô¶¯¸üлúÖÆ»áÔÚÓû§ÎÞ¸ÐÖªÇéÐÎϰ²ÅÅ×îа汾£¬£¬£¬£¬£¬£¬£¬£¬ÎÞÐèÈκÎÊÚȨ¡£¡£¡£¶ñÒâ´úÂëʹÓÃChromeÀ©Õ¹APIÔÚºǫ́ÔËÐмàÌý³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬µ±Óû§»á¼ûÐÂÍøÒ³Ê±£¬£¬£¬£¬£¬£¬£¬£¬×Ô¶¯²¶»ñURL²¢Á¬Í¬Î¨Ò»¸ú×ÙID·¢ËÍÖÁ¾³ÍâЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬±£´æÐ®ÖÆä¯ÀÀ»î¶¯¡¢Öض¨ÏòÖÁ´¹ÂÚÍøÕ¾»ò¶ñÒâÁ´½ÓµÄΣº¦¡£¡£¡£Ö»¹Ü²âÊÔÖÐδÏÖʵ´¥·¢Öض¨Ïò£¬£¬£¬£¬£¬£¬£¬£¬µ«Êý¾Ýй¶Σº¦ÒÑÒý·¢Çå¾²¾¯±¨¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-chrome-extensions-with-17m-installs-found-on-web-store/
3. ÐÂÐÍRondoDox½©Ê¬ÍøÂçʹÓÃÎïÁªÍøÎó²î¹¹½¨ÒþÐι¥»÷ÍøÂç
7ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±½üÆÚ·¢Ã÷Ò»ÖÖÃûΪRondoDoxµÄÐÂÐͽ©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬£¬£¬Õýͨ¹ýÕë¶ÔTBKÊý×ÖÊÓÆµÂ¼Ïñ»ú£¨DVR£©ºÍFour-Faith·ÓÉÆ÷µÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬½«´ó×ÚÎïÁªÍø×°±¸×ª»¯ÎªÒþ²Ø¹¥»÷½Úµã¡£¡£¡£¸Ã¶ñÒâÈí¼þ»î¶¯¾Û½¹ÓÚÁ½¸öÒѱ»¹ûÕæÅû¶µÄÏÂÁî×¢ÈëÎó²î£ºCVE-2024-3721ºÍCVE-2024-12856£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩװ±¸Òòºã¾Ã°²ÅÅÔÚÁãÊ۵ꡢ¿ÍÕ»µÈÎÞÈË¼à¿ØÇéÐΣ¬£¬£¬£¬£¬£¬£¬£¬ÇÒ³£Í¨¹ý¹ýʱ¹Ì¼þ»ò¹ýʧÉèÖÃ̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬£¬£¬³ÉΪÀíÏë¹¥»÷Ä¿µÄ¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬RondoDoxͨ¹ý¶à¼Ü¹¹Ö²ÈëÆ÷À©´óѬȾ¹æÄ££¬£¬£¬£¬£¬£¬£¬£¬³õʼ½×¶ÎÕë¶ÔARM/MIPS¼Ü¹¹µÄLinuxϵͳ£¬£¬£¬£¬£¬£¬£¬£¬Ëæºóͨ¹ýshell¾ç±¾ÏÂÔØ³ÌÐòÀ©Õ¹ÖÁIntel 80386¡¢PowerPC¡¢AArch64µÈ¸ü¶à¼Ü¹¹¡£¡£¡£¶ñÒâÈí¼þÆô¶¯ºó£¬£¬£¬£¬£¬£¬£¬£¬»áºöÂÔϵͳÖÕÖ¹Ðźš¢É¨³ýÏÂÁîÖ´ÐÐÀúÊ·£¬£¬£¬£¬£¬£¬£¬£¬²¢½¨É賤ÆÚ»¯»úÖÆ£¬£¬£¬£¬£¬£¬£¬£¬È·ÕäÖØÆôºó×Ô¶¯ÔËÐС£¡£¡£RondoDox½ÓÄɶàÖØ·´¼ì²âÊÖÒÕ£ºÍ¨¹ýÄ£ÄâValve¡¢Minecraft¡¢RobloxµÈÓÎϷƽ̨¼°Discord¡¢OpenVPNµÈ¹¤¾ßµÄÁ÷Á¿ÌØÕ÷ÈÚÈëÕý³£ÍøÂç»î¶¯£»£»£»£»£»£»£»Ê¹ÓÃXOR¼ÓÃÜÉèÖÃÊý¾ÝºÍ¶¨ÖÆ¿â¹æ±Ü¹Å°åÈëÇÖ¼ì²âϵͳ£¨IDS£©£»£»£»£»£»£»£»Í¬Ê±ÖÕÖ¹wget¡¢curlµÈÍøÂ繤¾ß¼°WiresharkÖÐÆÊÎöÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬È·±£²Ù×÷ÒþÃØÐÔ¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áÁªÏµÍⲿЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýHTTP/UDP/TCPÐÒéÌᳫDDoS¹¥»÷¡£¡£¡£
https://thehackernews.com/2025/07/rondodox-botnet-exploits-flaws-in-tbk.html
4. APT36×éÖ¯ÌᳫÕë¶ÔÓ¡¶ÈLinuxϵͳµÄÖØ´óÍøÂçÌØ¹¤»î¶¯
7ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Cyfirma¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬£¬ÒÉËÆÓɰͻù˹̹APT36£¨Óֳơ°Í¸Ã÷²¿Â䡱£©ÌᳫµÄÍøÂçÌØ¹¤»î¶¯Õý½«Ã¬Í·Ãé×¼Ó¡¶È¹ú·ÀÏà¹Ø»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬Ê״νÓÄÉרÃÅÕë¶ÔLinuxÇéÐεĶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬±ê¼ÇןÃ×éÖ¯¹¥»÷ÄÜÁ¦µÄÏÔÖøÉý¼¶¡£¡£¡£´Ë´Î¹¥»÷¾Û½¹ÓÚÔËÐÐBOSS LinuxµÄϵͳ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÒ»»ùÓÚDebianµÄÓ¡¶È¹ú²úLinux¿¯Ðа汻ÆÕ±éÓÃÓÚÕþ¸®»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔ¹¥»÷Õß¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¾«×¼¶¨Î»¡£¡£¡£¹¥»÷Õßͨ¹ýÈ«ÐÄÉè¼ÆµÄÍøÂç´¹ÂÚÓʼþÈö²¥¶ñÒâÔØºÉ£¬£¬£¬£¬£¬£¬£¬£¬Óʼþ¸½¼þΪαװ³É¡°Cyber-Security-Advisory.zip¡±µÄѹËõÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÄÚº¬Ò»¸öÃûΪ¡°.desktop¡±µÄLinux¿ì½Ý·½·¨Îļþ¡£¡£¡£µ±Óû§·¿ª¸ÃÎļþʱ£¬£¬£¬£¬£¬£¬£¬£¬ÏµÍ³»áͬʱִÐÐÁ½Ïî²Ù×÷£ºÇ°Ì¨×Ô¶¯ÏÂÔØ²¢Õ¹Ê¾Ò»¸ö¿´ËÆÕý³£µÄPowerPointÎļþÒÔÊèÉ¢×¢ÖØÁ¦£¬£¬£¬£¬£¬£¬£¬£¬ºǫ́ÔòÉñÃØÔËÐÐÃûΪ¡°BOSS.elf¡±µÄELF¶þ½øÖƶñÒâÈí¼þ¡£¡£¡£¸Ã¶ñÒâ³ÌÐòʹÓÃGoÓïÑÔ±àд£¬£¬£¬£¬£¬£¬£¬£¬Êǹ¥»÷µÄ½¹µãÔØºÉ£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÈëÇÖÖ÷»ú²¢½¨É賤ÆÚ»¯»á¼û¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬BOSS.elf»áʵÑéÅþÁ¬IPµØµã101.99.92.182µÄ12520¶Ë¿Ú£¬£¬£¬£¬£¬£¬£¬£¬²¢ÓëÓòÃûsorlastore.comͨѶ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÓòÃûÒѱ»È·ÒÔΪAPT36Õë¶ÔÓ¡¶È¹ú·À²¿·ÖµÄ¶ñÒâ»ù´¡ÉèÊ©¡£¡£¡£
https://hackread.com/pakistan-transparent-tribe-indian-defence-linux-malware/
5. ÐÂÐÍBataviaÌØ¹¤Èí¼þ½è´¹ÂÚÓʼþÈëÇÖ¶íÂÞ˹¹¤ÒµÆóÒµ
7ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬×Ô2024Äê7ÔÂÆð£¬£¬£¬£¬£¬£¬£¬£¬Ò»³¡Õë¶Ô¶íÂÞ˹¹¤ÒµÆóÒµµÄ¶¨ÏòÍøÂçÌØ¹¤»î¶¯Ò»Á¬Éý¼¶£¬£¬£¬£¬£¬£¬£¬£¬Æä½¹µãÔØÌåΪÐÂÐÍBataviaÌØ¹¤Èí¼þ¡£¡£¡£¿£¿£¿£¿¨°Í˹»ùʵÑéÊÒ×·×Ù·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷×Ô2025Äê3Ô½øÈë»îÔ¾ÆÚ£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÌõÔ¼ÎļþµÄ´¹ÂÚÓʼþÈö²¥¶ñÒâ.vbeÎļþÁ´½Ó£¬£¬£¬£¬£¬£¬£¬£¬Òѵ¼Ö¶íÂÞ˹ÊýÊ®¼Ò»ú¹¹Áè¼Ý100ÃûÓû§ÊÜÓ°Ïì¡£¡£¡£¹¥»÷ʼÓÚαװ³ÉÌõÔ¼»ò¸½¼þµÄ¶ñÒâ.vbeÎļþÁ´½Ó£¬£¬£¬£¬£¬£¬£¬£¬µã»÷Á´½ÓÏÂÔØVBE¾ç±¾£¬£¬£¬£¬£¬£¬£¬£¬ÆäÍøÂçϵͳÐÅÏ¢²¢¼ìË÷¶ñÒâÈí¼þÎļþ£¬£¬£¬£¬£¬£¬£¬£¬¼ì²é²Ù×÷ϵͳ°æ±¾Ö´ÐÐÓÐÓÃÔØºÉ²¢·¢ËÍÊý¾Ýµ½C2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬ÇÒʹÓö¨ÖƲÎÊýÖÎÀíѬȾ½×¶Î¹æ±Ü¼ì²â¡£¡£¡£ÔÚ¹¥»÷Á´µÚ¶þ½×¶Î£¬£¬£¬£¬£¬£¬£¬£¬WebView.exe¶ñÒâÈí¼þÏÂÔØ²¢ÏÔʾÐéαÌõÔ¼£¬£¬£¬£¬£¬£¬£¬£¬¼àÊÓϵͳ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçϵͳÈÕÖ¾µÈ²¢°´ÆÚ½ØÍ¼·¢Ë͵½ÐÂC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬ÏÂÔØÐ¶ñÒâÈí¼þ½×¶Î²¢ÉèÖÃÆô¶¯¿ì½Ý·½·¨¡£¡£¡£×îºó½×¶Î£¬£¬£¬£¬£¬£¬£¬£¬javav.exeÀ©Õ¹¹¥»÷¹æÄ££¬£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¸ü¶àÎļþÀàÐÍ´«Êäµ½C2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬¿É¸ü¸ÄC2µØµã¡¢ÊµÏÖUACÈÆ¹ýÀ´ÏÂÔØ/Ö´ÐÐÐÂÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬£¬£¬Í¨Ñ¶¼ÓÃÜÇÒͨ¹ýÎļþ¹þÏ£×èÖ¹ÖØ¸´ÉÏ´«¡£¡£¡£
https://securityaffairs.com/179699/malware/new-batavia-spyware-targets-russian-industrial-enterprises.html
6. ÒÁÀʹØÁª×éÖ¯BladedFelineÃé×¼ÒÁÀ¿ËÕþ¸®ÏµÍ³
7ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹ESETÅû¶£¬£¬£¬£¬£¬£¬£¬£¬ÓëÒÁÀʱ£´æÇ×½ü¹ØÁªµÄAPT×éÖ¯BladedFelineÕý¶ÔÒÁÀ¿ËÖÐÑëÕþ¸®¼°¿â¶ûµÂ×ÔÖÎÇøÕþ¸®£¨KRG£©ÊµÑéºã¾ÃÍøÂçÌØ¹¤»î¶¯¡£¡£¡£Ñо¿Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬£¬BladedFeline×Ô2017ÄêÊ×´ÎÉøÍ¸¿â¶ûµÂÍ⽻ϵͳÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬Ò»Á¬¿ª·¢ÐÂÐ͹¥»÷¹¤¾ß¡£¡£¡£×îлÖУ¬£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯°²ÅÅÁËÄ£¿£¿£¿£¿é»¯¶ñÒâÈí¼þÌ×¼þ£¬£¬£¬£¬£¬£¬£¬£¬½¹µã×é¼þ°üÀ¨£ºÍ¨¹ýÊÜËð΢ÈíExchangeÓÊÏäÕË»§ÊÕ·¢Ö¸ÁîµÄ"Whisper"ºóÃÅ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¾ßÓиïÃüÐÔÒþ²Ø»úÖÆµÄ"PrimeCache"¶ñÒâIISÄ£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷¹¤¾ßÁ´»¹°üÀ¨LaretÓëPinarÁ½¿î·´ÏòËíµÀ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¶à½×¶ÎÉøÍ¸×é¼þ¡£¡£¡£¸ÃÌ×¼þ¸¶Óë¹¥»÷ÕßËÄÏî½¹µãÄÜÁ¦£ººã¾Ãά³Ö¸ß¼ÛֵĿµÄϵͳ»á¼ûȨÏÞ¡¢Í¨¹ý¼ÓÃÜͨѶÌӱܼà²â¡¢Ê¹ÓÃÕýµ±WebmailÕË»§Ô¶³ÌÖ´ÐÐÖ¸Áî¡¢½«¶ñÒâ»î¶¯Ç¶Èë¿ÉÐÅЧÀÍÆ÷Àú³ÌʵÏÖÉî¶ÈÒþÄä¡£¡£¡£ÊÖÒÕËÝÔ´ÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬BladedFelineÓëÒÁÀʹú¼Ò¼¶ºÚ¿Í×éÖ¯OilRig±£´æÇ¿¹ØÁªÐÔ£¬£¬£¬£¬£¬£¬£¬£¬Æä¶ñÒâÈí¼þ¹¦Ð§Éè¼ÆÓëOilRig±ê¼ÇÐÔºóÃÅRDAT¸ß¶ÈÏàËÆ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷»ù´¡ÉèÊ©±£´æÖصþ£¬£¬£¬£¬£¬£¬£¬£¬Õ½ÊõÄ¿µÄ¾ù¾Û½¹Öж«µØÔµÕþÖÎÇé±¨ÍøÂç¡£¡£¡£ESETÆÀ¹ÀÒÔΪ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯¼«¿ÉÄÜΪOilRigµÄÕ½Êõ×Óµ¥Î»¡£¡£¡£
https://www.infosecurity-magazine.com/news/iran-hacking-group-targets-middle/


¾©¹«Íø°²±¸11010802024551ºÅ