°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬Ê¦ÉúÐÅϢй¶

Ðû²¼Ê±¼ä 2025-04-23

1. °Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬Ê¦ÉúÐÅϢй¶


4ÔÂ23ÈÕ£¬£¬ £¬£¬£¬½ñÄê2Ô£¬£¬ £¬£¬£¬°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÏµÍ³ÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬ÊýǧÃûѧÉú¡¢Î÷ϯºÍÖÎÀíÖ°Ô±ÐÅÏ¢±»µÁ¡£¡£ ¡£Öܶþ£¬£¬ £¬£¬£¬Ñ§Ð£¹ÙÔ±Ðû²¼Î¥¹æÍ¨Öª£¬£¬ £¬£¬£¬ÖÒÑÔ2ÔÂ13ÈÕ±¬·¢µÄÍøÂçÊÂÎñ̻¶ÁËijЩITϵͳ¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬£¬ £¬£¬£¬Ò»Ð©Îļþ¿ÉÄÜÒѱ»·¸·¨·Ö×Óй¶£¬£¬ £¬£¬£¬Éæ¼°ÏÖÈκÍǰÈιÍÔ±¡¢×ÔÔ¸ÕߺͳаüÉÌ£¬£¬ £¬£¬£¬ÒÔ¼°²»µ½1.5%µÄѧÉú¡£¡£ ¡£°Í¶ûµÄĦÊй«Á¢Ñ§Ð£¹ÙԱȷÈÏ£¬£¬ £¬£¬£¬´Ë´ÎÊÂÎñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬µ«Î´Ö§¸¶Êê½ð¡£¡£ ¡£Ñ§Ð£Î´Í¸Â¶ÏêϸÊÜÓ°ÏìÈËÊý£¬£¬ £¬£¬£¬µ«Ö¸³öÊÜÓ°ÏìѧÉúÁè¼Ý1150ÈË¡£¡£ ¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÔ±¹¤Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂë»ò»¤ÕÕºÅÂ룬£¬ £¬£¬£¬ÒÔ¼°Ñ§Éúͨ»°¼Í¼¡¢È±¿Î¼Í¼»òÉúÓý״̬µÈÎļþ¡£¡£ ¡£Ñ§Ð£ÏµÍ³Ê×ϯִÐйÙÉ£ÌØÀûÈû˹×Ô¼ºÒ²ÊÜÓ°Ï죬£¬ £¬£¬£¬ËýÌåÏÖѧУ55%µÄÔ±¹¤Êܵ½Ó°Ïì¡£¡£ ¡£ÉÐÓб¨µÀ³Æ£¬£¬ £¬£¬£¬·¢Ã÷ÁËÒ»·âÀ´×ÔCloakÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£ ¡£Ñ§Ð£¹ÙÔ±³Æ£¬£¬ £¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼2.5ÍòÈË£¬£¬ £¬£¬£¬°üÀ¨7000¶àÃûÏÖÈÎÎ÷ϯÒÔ¼°×Ô2010ÄêÒÔÀ´ÔÚ¸ÃÑ§ÇøÊÂÇéµÄËùÓÐÈË¡£¡£ ¡£Ö´·¨²¿·ÖÒѽӵ½Í¨Öª£¬£¬ £¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾Ð­Öú»Ö¸´¡£¡£ ¡£Ñ§Ð£ÒÑ×îÏÈÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬£¬ £¬£¬£¬ÌṩÁ½ÄêÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬ £¬£¬£¬²¢ÉèÁ¢ºô½ÐÖÐÐĽâ´ðÎÊÌâ¡£¡£ ¡£


https://therecord.media/baltimore-public-schools-data-breach-ransomware


2. Âêɯ°Ù»õÔâÍøÂç¹¥»÷£¬£¬ £¬£¬£¬µ¼ÖÂÖ÷¹Ë¶©µ¥ÑÓ³Ù


4ÔÂ22ÈÕ£¬£¬ £¬£¬£¬Ó¢¹ú¿ç¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬ £¬£¬£¬¶ÔÆäÔËÓªÔì³ÉÒ»¶¨×ÌÈÅ£¬£¬ £¬£¬£¬ÓÈÆäÊÇClick and Collect¶©µ¥ÏµÍ³¡£¡£ ¡£Âêɯ°Ù»õÔÚÈ«ÇòÓµÓÐ1400¶à¼ÒÃŵ꣬£¬ £¬£¬£¬Ô±¹¤×ÜÊý´ï6.4ÍòÃû£¬£¬ £¬£¬£¬ÒÔÏúÊÛ´ò°ç¡¢Ê³ÎïºÍ¼Ò¾ÓÓÃÆ·µÈ¶àÑù»¯²úÆ·¶øÖøÃû¡£¡£ ¡£ÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÐû²¼µÄÐÂΟåÖУ¬£¬ £¬£¬£¬Âêɯ°Ù»õ֤ʵÁË´Ë´ÎÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬²¢ÌåÏÖÕýÔÚÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú£¬£¬ £¬£¬£¬ÒÔÖÎÀíÏ¢Õù¾öÕâÒ»½ôÆÈÇéÐΡ£¡£ ¡£¹«Ë¾ÒѽÓÄÉС¹æÄ£ÔÝʱµ÷½â²½·¥±£»£»£»£»¤Ö÷¹ËºÍÓªÒµÇå¾²£¬£¬ £¬£¬£¬²¢¶Ô´ËÔì³ÉµÄδ±ãÉî±íǸÒâ¡£¡£ ¡£Ö»¹ÜÃæÁÙÌôÕ½£¬£¬ £¬£¬£¬Âêɯ°Ù»õµÄÃÅµê¡¢ÍøÕ¾ºÍÓ¦ÓóÌÐòÈÔÔÚÕý³£ÔËÓª¡£¡£ ¡£¹«Ë¾ÒÑÔ¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊӲ죬£¬ £¬£¬£¬²¢½ÓÄɲ½·¥½øÒ»²½±£»£»£»£»¤ÆäÍøÂ磬£¬ £¬£¬£¬È·± £¿£¿£¿£¿Í»§Ð§ÀͲ»ÊÜÓ°Ïì¡£¡£ ¡£Âêɯ°Ù»õÒÑ֪ͨÊý¾Ý±£»£»£»£»¤¼àÊÓ»ú¹¹ºÍ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¬£¬ £¬£¬£¬µ«Î´Ìá¹©ÍøÂçÊÂÎñµÄÏêϸϸ½Ú¡£¡£ ¡£Ö»¹ÜÏÖÔÚÉÐÎÞÀÕË÷Èí¼þÍÅ»ï»òÆäËûÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬µ«Èô´Ë´Î¹¥»÷Éæ¼°ÀÕË÷Èí¼þ£¬£¬ £¬£¬£¬Êý¾ÝºÜ¿ÉÄÜÒѱ»ÍµÈ¡£¬£¬ £¬£¬£¬²¢¿ÉÄܱ»ÓÃ×÷½øÒ»²½Ê©Ñ¹¹«Ë¾Ö§¸¶ÀÕË÷½ðµÄ³ïÂë¡£¡£ ¡£Âêɯ°Ù»õÒÑÏòÊÜÓ°Ïì¿Í»§ÖÂǸ£¬£¬ £¬£¬£¬²¢ÔÊÐí¾¡¿ì»Ö¸´Õý³£Ð§ÀÍ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/marks-and-spencer-confirms-a-cyberattack-as-customers-face-delayed-orders/


3. SK TelecomÔâ¶ñÒâÈí¼þ¹¥»÷£¬£¬ £¬£¬£¬¿Í»§USIMÐÅÏ¢ÃæÁÙΣº¦


4ÔÂ22ÈÕ£¬£¬ £¬£¬£¬º«¹ú×î´óÒÆ¶¯ÔËÓªÉÌSK Telecom¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÈí¼þѬȾ»ñÈ¡Á˿ͻ§Ãô¸ÐµÄUSIMÏà¹ØÐÅÏ¢¡£¡£ ¡£´Ë´Î¹¥»÷±¬·¢ÔÚÍâµØÊ±¼ä2025Äê4ÔÂ19ÈÕÐÇÆÚÁùÍíÉÏ11µã£¬£¬ £¬£¬£¬ÕýÖµÖÜÄ©ÇÒ´ó¶¼×éÖ¯ÈËÊÖȱ·¦Ö®¼Ê¡£¡£ ¡£SK TelecomѸËÙÏìÓ¦£¬£¬ £¬£¬£¬ÔÚ·¢Ã÷¶ñÒâÈí¼þºóÁ¬Ã¦É¾³ý²¢¸ôÀëÁËÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£¡£ ¡£×èÖ¹ÏÖÔÚ£¬£¬ £¬£¬£¬ÉÐδȷÈÏй¶ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£ ¡£´Ë´ÎÊÂÎñÒýÆðÁ˺«¹ú»¥ÁªÍøÇå¾²¾Ö£¨KISA£©ºÍ¸Ã¹úСÎÒ˽¼ÒÐÅÏ¢±£»£»£»£»¤Î¯Ô±»áµÄ¸ß¶È¹Ø×¢£¬£¬ £¬£¬£¬ÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬£¬ £¬£¬£¬ÈëÇÖµÄÏêϸԵ¹ÊÔ­ÓÉ¡¢¹æÄ£»£»£»£»ò¹æÄ£ÉÐδȷ¶¨¡£¡£ ¡£USIMÊý¾Ý°üÀ¨¹ú¼ÊÒÆ¶¯Óû§Ê¶±ðÂë¡¢ÒÆ¶¯Õ¾ISDNºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬ÕâЩÊý¾ÝÒ»µ©Ð¹Â¶£¬£¬ £¬£¬£¬¿ÉÄܱ»ÓÃÓÚÓÐÕë¶ÔÐԵļàÊÓ¡¢¸ú×ÙºÍSIM¿¨½»Á÷¹¥»÷¡£¡£ ¡£ÎªÓ¦¶Ô´Ë´Î¹¥»÷£¬£¬ £¬£¬£¬SK TelecomÒÑÔöÇ¿¶ÔUSIM½»Á÷ºÍÒì³£Éí·ÝÑé֤ʵÑéµÄ×èÖ¹£¬£¬ £¬£¬£¬²¢½«Á¬Ã¦ÔÝÍ£Óë¿ÉÒɻÏà¹ØµÄÕË»§Ð§ÀÍ¡£¡£ ¡£Í¬Ê±£¬£¬ £¬£¬£¬½¨ÒéÓû§Í¨¹ýÖ¸¶¨ÃÅ»§×¢²áUSIM±£»£»£»£»¤Ð§ÀÍ£¬£¬ £¬£¬£¬ÒÔ±ÜÃâÊÖ»úºÅÂë±»²»·¨ÒÆÖ²µ½ÁíÒ»ÕÅSIM¿¨ÉÏ¡£¡£ ¡£ÏÖÔÚ£¬£¬ £¬£¬£¬ÉÐÎÞÍþвÐÐΪÕ߶Դ˴ι¥»÷ÈÏÕæ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/


4. Active! MailÁãÈÕÎó²îÔâÆð¾¢Ê¹Ó㬣¬ £¬£¬£¬ÈÕ±¾¶à»ú¹¹ÊÜÓ°Ïì


4ÔÂ22ÈÕ£¬£¬ £¬£¬£¬Active! Mail±£´æÑÏÖØÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-42599£¬£¬ £¬£¬£¬CVSS v3ÆÀ·Ö9.8£©£¬£¬ £¬£¬£¬Õý±»Æð¾¢Ê¹ÓÃÓÚÕë¶ÔÈÕ±¾´óÐÍ×éÖ¯µÄ¹¥»÷¡£¡£ ¡£¸ÃÎó²îÓ°ÏìËùÓа汾Active!£¬£¬ £¬£¬£¬°üÀ¨ËùÓÐÊÜÖ§³Ö²Ù×÷ϵͳƽ̨Éϵġ°BuildInfo£º6.60.05008561¡±£¬£¬ £¬£¬£¬ÈôÔ¶³ÌµÚÈý·½·¢ËͶñÒâÇëÇ󣬣¬ £¬£¬£¬Ôò¿ÉÄÜÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾øÐ§ÀÍÌõ¼þ¡£¡£ ¡£Active!mail×÷Ϊ»ùÓÚÍøÂçµÄµç×ÓÓʼþ¿Í»§¶Ë£¬£¬ £¬£¬£¬ËäÔÚÈ«Çò¹æÄ£ÄÚ²»ÈçGmail»òOutlookÆÕ±éʹÓ㬣¬ £¬£¬£¬µ«ÔÚÈÕ±¾´óÐÍÆóÒµ¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÒøÐеÄÈÕÓïÇéÐÎÖг£±»ÓÃ×÷Ⱥ¼þ×é¼þ£¬£¬ £¬£¬£¬Òѱ»Áè¼Ý2,250¸ö×éÖ¯½ÓÄÉ£¬£¬ £¬£¬£¬ÓµÓÐÁè¼Ý11,000,000¸öÕÊ»§£¬£¬ £¬£¬£¬ÊǸùúÉÌÒµÍøÂçÓʼþÊг¡µÄÖ÷Òª¼ÓÈëÕß¡£¡£ ¡£ÈÕ±¾CERTÒÑÈ·ÈϸÃÎó²î´¦ÓÚ»îԾʹÓÃ״̬£¬£¬ £¬£¬£¬²¢±Þ²ßËùÓÐÓû§¾¡¿ì¸üÐÂÖÁActive!Mail 6 BuildInfo: 6.60.06008562¡£¡£ ¡£ÈÕ±¾ÍøÂçÍйܺÍITЧÀÍÌṩÉÌKagoya Japan¼°WADAX¾ù±¨¸æÁËÒòÊÔͼʹÓøÃÎó²îÔì³ÉµÄЧÀÍÖÐÖ¹£¬£¬ £¬£¬£¬²¢ÒÑÔÝʱ×èÖ¹Active!ÓʼþЧÀÍ¡£¡£ ¡£±ðµÄ£¬£¬ £¬£¬£¬MacnicaÇå¾²Ñо¿Ô±Ö¸³ö£¬£¬ £¬£¬£¬ÖÁÉÙÓÐ227̨̻¶ÔÚ»¥ÁªÍøÉϵÄActive!ЧÀÍÆ÷¿ÉÄÜÊܵ½¹¥»÷£¬£¬ £¬£¬£¬ÆäÖÐ63̨ÔÚ´óѧʹÓᣡ£ ¡£ÈÕ±¾CERTΪÎÞ·¨Á¬Ã¦Ó¦ÓÃÇå¾²¸üеÄÓû§Ìá³öÁËÏêϸ»º½â²½·¥£¬£¬ £¬£¬£¬ÒÔÓ¦¶Ô´ËÎó²î´øÀ´µÄÍþв¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/


5. ÀÕË÷Èí¼þÖÂÁ½Ò½ÁƱ£½¡×éÖ¯Êý¾Ýй¶£¬£¬ £¬£¬£¬³¬24ÍòÈËÊÜÓ°Ïì


4ÔÂ22ÈÕ£¬£¬ £¬£¬£¬½üÆÚ£¬£¬ £¬£¬£¬Á½¼ÒÒ½ÁƱ£½¡×éÖ¯Ïà¼ÌÈ·ÈÏÔÚÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó·ºÆðÊý¾Ýй¶£¬£¬ £¬£¬£¬Ó°ÏìÈËÊý¾ùÁè¼Ý10Íò¡£¡£ ¡£Î»ÓÚÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ±´¶û¾È»¤³µ¹«Ë¾£¬£¬ £¬£¬£¬ÔÚ2025Äê2ÔÂ13ÈÕ¼ì²âµ½ÍøÂçÈëÇÖ£¬£¬ £¬£¬£¬ºÚ¿Í»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¼°¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢µÄÎļþ£¬£¬ £¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬ £¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁË114,000ÈË¡£¡£ ¡£ÃÀ¶ÅɯÀÕË÷Èí¼þ×éÖ¯Ðû³Æ´Ó±´¶û¾È»¤³µÇÔÈ¡ÁËÁè¼Ý200GBµÄÊý¾Ý¡£¡£ ¡£ÁíÒ»¼ÒÊÜÓ°ÏìµÄÒ½ÁƱ£½¡×éÖ¯ÊÇλÓÚ°¢À­°ÍÂíÖݲ®Ã÷º²µÄÑÛ¿ÆÕïËù°¢À­°ÍÂíÑÛ¿ÆÐ­»á¡£¡£ ¡£¸ÃÕïËùÓÚ4ÔÂ10ÈÕ͸¶£¬£¬ £¬£¬£¬ÏÖÓкÍÒÔǰ»¼ÕßµÄСÎÒ˽¼Ò¼°Êܱ£»£»£»£»¤¿µ½¡ÐÅÏ¢Ô⵽й¶£¬£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£ ¡£¸Ã×éÖ¯ÓÚ1ÔÂ30ÈÕ·¢Ã÷ÍøÂçÎó²î£¬£¬ £¬£¬£¬ºÚ¿Í×Ô1ÔÂ22ÈÕÆð¼´¿É»á¼ûÆäϵͳ¡£¡£ ¡£BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬¾ÝÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬ £¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý131,000ÈË¡£¡£ ¡£È¥Ä꣬£¬ £¬£¬£¬ÃÀ¹ú±¬·¢ÁË700¶àÆðÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬Ð¹Â¶µÄ¼Í¼×ÜÊýÁè¼Ý1.8ÒÚÌõ¡£¡£ ¡£


https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/


6. Elusive CometºÚ¿Í×é֯ʹÓÃZoomʵÑéÉç»á¹¤³Ì¹¥»÷


4ÔÂ22ÈÕ£¬£¬ £¬£¬£¬½üÆÚ£¬£¬ £¬£¬£¬Ò»¸öÃûΪ¡°Elusive Comet¡±µÄºÚ¿Í×éÖ¯Õë¶Ô¼ÓÃÜÇ®±ÒÓû§ÌᳫÉç»á¹¤³Ì¹¥»÷£¬£¬ £¬£¬£¬Í¨¹ýZoomµÄÔ¶³Ì¿ØÖƹ¦Ð§ÓÕÆ­Óû§ÊÚÓèÆä»á¼ûȨÏÞ¡£¡£ ¡£¸Ã×é֯ģÄâLazarusºÚ¿Í×éÖ¯ÔÚ15ÒÚÃÀÔªBybit¼ÓÃÜÇ®±Ò͵ÇÔ°¸ÖÐʹÓõÄÊÖÒÕ£¬£¬ £¬£¬£¬Ê¹ÓÃÕýµ±ÊÂÇéÁ÷³ÌʵÑé¹¥»÷¡£¡£ ¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵĿþÀÜÕË»§»òµç×ÓÓʼþ£¬£¬ £¬£¬£¬ÒÔ¡°Åí²©¼ÓÃÜÇ®±Ò¡±²É·ÃÔ¼ÇëΪ»Ï×Ó£¬£¬ £¬£¬£¬Ïò¸ß¼ÛֵĿµÄ·¢ËÍCalendlyÁ´½Ó£¬£¬ £¬£¬£¬°²ÅÅZoom¾Û»á¡£¡£ ¡£ÓÉÓÚÔ¼ÇëÁ´½ÓÕæÊµÓÐÓ㬣¬ £¬£¬£¬½µµÍÁËÄ¿µÄµÄÏÓÒÉˮƽ¡£¡£ ¡£ÔÚZoomͨ»°Ê±´ú£¬£¬ £¬£¬£¬¹¥»÷ÕßÌᳫÆÁÄ»¹²Ïí»á»°£¬£¬ £¬£¬£¬²¢½«ÆäZoomÏÔʾÃû³ÆÖØÃüÃûΪ¡°Zoom¡±£¬£¬ £¬£¬£¬Ê¹Êܺ¦ÕßÎóÒÔΪÇëÇóÀ´×ÔÓ¦ÓóÌÐò×Ô¼º£¬£¬ £¬£¬£¬´Ó¶øÅú×¼Ô¶³Ì¿ØÖÆÇëÇ󡣡£ ¡£Ò»µ©»ñµÃ¿ØÖÆÈ¨£¬£¬ £¬£¬£¬¹¥»÷Õß±ã¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢×°ÖöñÒâÈí¼þ¡¢»á¼ûÎļþ»òÌᳫ¼ÓÃÜÉúÒâ¡£¡£ ¡£ËûÃÇ»¹¿ÉÄÜѸËÙÖ²ÈëÒþÃØºóÃÅ£¬£¬ £¬£¬£¬½¨É賤ÆÚ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬ÒÔ±ãÈÕºóʹÓᣡ£ ¡£Trail of Bits¹«Ë¾Ö¸³ö£¬£¬ £¬£¬£¬´Ë´Î¹¥»÷µÄȨÏÞ¶Ô»°¿òÓëÆäËûÎÞº¦µÄZoom֪ͨÏàËÆ£¬£¬ £¬£¬£¬Óû§¿ÉÄÜÔÚ²»ÏàʶЧ¹ûµÄÇéÐÎÏÂÊÚÓèÅÌËã»úÍêÈ«¿ØÖÆÈ¨¡£¡£ ¡£Îª·ÀÓù´ËÀàÍþв£¬£¬ £¬£¬£¬¸Ã¹«Ë¾½¨ÒéʵÑéϵͳ¹æÄ£µÄÒþ˽ƫºÃÕ½ÂÔ¿ØÖÆÉèÖÃÎļþ£¬£¬ £¬£¬£¬±ÜÃâ¿É»á¼ûÐÔ»á¼û£¬£¬ £¬£¬£¬²¢½¨ÒéÇå¾²Òªº¦ÐÍÇéÐκʹ¦Öóͷ£Ãû¹óÊý×Ö×ʲúµÄ×éÖ¯ÍêÈ«ÒÆ³ýZoom¿Í»§¶Ë£¬£¬ £¬£¬£¬ÒÔ½µµÍΣº¦¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hackers-abuse-zoom-remote-control-feature-for-crypto-theft-attacks/