ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-05-091. ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶
5ÔÂ8ÈÕ£¬£¬£¬£¬½ÌÓý¾ÞÍ·ÅàÉú¼¯ÍÅÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˹«Ë¾Êý¾ÝºÍ¿Í»§ÐÅÏ¢¡£¡£¡£ÅàÉú¼¯ÍÅ×ܲ¿Î»ÓÚÓ¢¹ú£¬£¬£¬£¬ÊÇÈ«Çò×î´óµÄѧÊõ³öÊé¡¢Êý×Öѧϰ¹¤¾ßºÍ±ê×¼»¯ÆÀ¹ÀÌṩÉÌÖ®Ò»¡£¡£¡£ÅàÉú¼¯ÍŽÒÏþÉùÃ÷ÈÏ¿ÉÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬Êý¾Ý±»µÁ£¬£¬£¬£¬µ«³Æ´ó²¿·ÖΪ¡°ÒÅÁôÊý¾Ý¡±¡£¡£¡£ÅàÉú´ú±í֤ʵ£¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄÐÐΪÕß»á¼ûÁËÆä²¿·Öϵͳ£¬£¬£¬£¬Ò»µ©È·Èϸû£¬£¬£¬£¬ÅàÉúÁ¬Ã¦½ÓÄɲ½·¥×èÖ¹£¬£¬£¬£¬²¢Óëȡ֤ר¼ÒÏàÖúÊÓ²ìÊÂÎñ¾Óɼ°ÊÜÓ°ÏìÊý¾Ý£¬£¬£¬£¬»¹ÐÖúÖ´·¨²¿·Ö¿ªÕ¹ÊӲ죬£¬£¬£¬Í¬Ê±ÒÑÔÚϵͳÖа²ÅÅÌØÊâÇå¾²²½·¥£¬£¬£¬£¬°üÀ¨ÔöÇ¿Çå¾²¼à¿ØºÍÉí·ÝÑéÖ¤¡£¡£¡£ÅàÉú»¹Ö¤Êµ±»µÁÊý¾Ý²»°üÀ¨Ô±¹¤ÐÅÏ¢¡£¡£¡£´ËǰÓÐÐÂÎųƣ¬£¬£¬£¬ÍþвÐÐΪÕßÓÚ2025Äê1ÔÂͨ¹ýÔÚ¹«¹².git/configÎļþÖз¢Ã÷µÄ̻¶µÄGitLabСÎÒ˽¼Ò»á¼ûÁîÅÆÆÆËðÁËÅàÉúµÄ¿ª·¢ÇéÐΣ¬£¬£¬£¬¸ÃÎļþÈôÎó̻¶ÇÒ°üÀ¨Ç¶ÈëÔÚÔ¶³ÌURLÖеĻá¼ûÁîÅÆ£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜδ¾ÊÚȨ»á¼ûÄÚ²¿´æ´¢¿â¡£¡£¡£ÔÚÕë¶ÔÅàÉúµÄ¹¥»÷ÖУ¬£¬£¬£¬Ì»Â¶µÄÁîÅÆÊ¹ÍþвÐÐΪÕß»á¼ûÁ˹«Ë¾Ô´´úÂ룬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚÔÆÆ½Ì¨µÄ½øÒ»²½Ó²±àÂëÆ¾Ö¤ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬£¬ËæºóÍþвÐÐΪÕßʹÓÃÕâЩƾ֤´Ó¹«Ë¾ÄÚ²¿ÍøÂçºÍÔÆ»ù´¡ÉèÊ©ÖÐÇÔÈ¡ÁËÊýTBÊý¾Ý£¬£¬£¬£¬°üÀ¨AWS¡¢Google Cloud¼°ÖÖÖÖ»ùÓÚÔÆµÄÊý¾Ý¿âЧÀÍÊý¾Ý£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨¿Í»§ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢µÈ£¬£¬£¬£¬Êý°ÙÍòÈËÊÜÓ°Ïì¡£¡£¡£
https://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/
2. PyPI¾ªÏÖ¶ñÒâ°üÕë¶ÔDiscord¿ª·¢Õßϵͳ
5ÔÂ8ÈÕ£¬£¬£¬£¬PythonÈí¼þ°üË÷Òý£¨PyPI£©ÉϾªÏÖÕë¶ÔDiscord¿ª·¢Ö°Ô±µÄ¶ñÒâPythonÈí¼þ°ü¡°discordpydebug¡±¡£¡£¡£¸ÃÈí¼þ°üαװ³ÉDiscord»úеÈË¿ª·¢Ö°Ô±µÄ¹ýʧ¼Í¼Æ÷ÊÊÓóÌÐò£¬£¬£¬£¬×Ô2022Äê3ÔÂ21ÈÕÉÏ´«ÒÔÀ´£¬£¬£¬£¬Òѱ»ÏÂÔØÁè¼Ý11000´Î¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Socket×îÏÈ·¢Ã÷ÕâÒ»¶ñÒâÈí¼þ£¬£¬£¬£¬²¢Ö¸³öÆä¿ÉÓÃÓÚ¶ÔDiscord¿ª·¢Ö°Ô±µÄϵͳ¾ÙÐкóÃŹ¥»÷£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÊý¾Ý͵ÇÔºÍÔ¶³Ì´úÂëÖ´Ðй¦Ð§¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬¸ÃÈí¼þ°üÖ÷ÒªÕë¶Ô¹¹½¨»òά»¤Discord»úеÈ˵Ŀª·¢Ö°Ô±£¬£¬£¬£¬ÕâЩ¿ª·¢Ö°Ô±¿ÉÄÜ»áÔÚδ¾ÆÕ±éÉó²éµÄÇéÐÎÏÂ×°ÖôËÀ๤¾ß¡£¡£¡£ÓÉÓÚPyPI²»»á¶ÔÉÏ´«µÄÈí¼þ°ü¾ÙÐÐÉî¶ÈÇå¾²ÉóºË£¬£¬£¬£¬¹¥»÷Õß³£Ê¹ÓÃÕâÒ»µã£¬£¬£¬£¬Í¨¹ýÎóµ¼ÐÔÐÎò¡¢Õýµ±Ãû³Æ»ò¸´ÖÆÊ¢ÐÐÏîÄ¿´úÂëÀ´Ê¹¶ñÒâÈí¼þ°üÏԵÿÉÐÅ¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬¶ñÒâÈí¼þ°ü±ã»á½«×°±¸×ª±äΪԶ³Ì¿ØÖÆÏµÍ³£¬£¬£¬£¬Ö´Ðй¥»÷Õß¿ØÖƵÄÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷·¢Ë͵ÄÖ¸Áî¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý¸Ã¶ñÒâÈí¼þ»ñȡƾ֤µÈÃô¸ÐÐÅÏ¢µÄδ¾ÊÚȨ»á¼ûȨÏÞ£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý¡¢¼àÊÓϵͳ»î¶¯¡¢Ô¶³ÌÖ´ÐдúÂ룬£¬£¬£¬²¢»ñÈ¡ÓÐÖúÓÚÔÚÍøÂçÖкáÏòÒÆ¶¯µÄÐÅÏ¢¡£¡£¡£¸Ã¶ñÒâÈí¼þËäȱ·¦³¤ÆÚÐÔ»òȨÏÞÌáÉý»úÖÆ£¬£¬£¬£¬µ«Ê¹ÓóöÕ¾HTTPÂÖѯ¿ÉÈÆ¹ý·À»ðǽºÍÇå¾²Èí¼þ¡£¡£¡£×°Öú󣬣¬£¬£¬Ëü»á¾²Ä¬ÅþÁ¬µ½¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹¾ß±¸Í¨¹ýÌØ¶¨Òªº¦×Ö´¥·¢À´¶ÁÈ¡ºÍдÈëÖ÷»úÉÏÎļþµÄ¹¦Ð§¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-pypi-package-hides-rat-malware-targets-discord-devs-since-2022/
3. ÀÕË÷Èí¼þʹÓÃÕýµ±KickidlerÈí¼þʵÑé¹¥»÷²¢ÇÔÃÜ
5ÔÂ8ÈÕ£¬£¬£¬£¬ÀÕË÷Èí¼þ·ÖÖ§»ú¹¹QilinºÍHunters InternationalʹÓÃÕýµ±Ô±¹¤¼à¿ØÈí¼þKickidlerÕö¿ª¹¥»÷»î¶¯¡£¡£¡£ÔÚVaronisºÍSynacktivÊӲ쵽µÄ¹¥»÷ÖУ¬£¬£¬£¬¹¥»÷Õßͨ¹ýÖ²ÈëGoogle¹ã¸æ£¬£¬£¬£¬ÓÕµ¼Óû§µã»÷ºóÌø×ªÖÁαÔìµÄRVToolsÍøÕ¾£¬£¬£¬£¬´Ó¶øÏÂÔØ²¢ÔËÐб»Ä¾ÂíѬȾµÄ³ÌÐò¡£¡£¡£¸Ã³ÌÐò×÷Ϊ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐÐSMOKEDHAM PowerShell .NETºóÃÅ£¬£¬£¬£¬½ø¶øÔÚ×°±¸Éϰ²ÅÅKickidler¡£¡£¡£Kickidler¿É²¶»ñ»÷¼ü¡¢½ØÈ¡ÆÁÄ»½ØÍ¼ºÍ½¨ÉèÆÁÄ»ÊÓÆµ£¬£¬£¬£¬¹¥»÷Õß½è´Ë¼àÊÓÆóÒµÖÎÀíÔ±µÄ»î¶¯£¬£¬£¬£¬»ñÈ¡ÌØÈ¨Æ¾Ö¤¡£¡£¡£¹¥»÷Õß¿ÉÄÜÒÑÉñÃØ»á¼ûÊܺ¦ÕßϵͳÊýÌìÉõÖÁÊýÖÜ£¬£¬£¬£¬ÒÔÊÕ¾Û»á¼ûÒìµØÔÆ±¸·ÝËùÐèµÄƾ֤¡£¡£¡£Kickidlerͨ¹ý²¶»ñÖÎÀíÔ±ÊÂÇéÕ¾µÄ°´¼üºÍÍøÒ³£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Ê¶±ðÒìµØÔÆ±¸·Ý²¢»ñÈ¡ÃÜÂ룬£¬£¬£¬ÎÞÐè½ÓÄɸßΣº¦Õ½ÂÔ¡£¡£¡£ÀÕË÷Èí¼þÔËÓªÉÌÔÚ»Ö¸´¶ñÒâ»î¶¯ºó£¬£¬£¬£¬°²ÅÅÕë¶ÔÊܺ¦ÕßVMware ESXi»ù´¡¼Ü¹¹µÄÓÐÓÃÔØºÉ£¬£¬£¬£¬¼ÓÃÜVMDKÐéÄâÓ²ÅÌÇý¶¯Æ÷£¬£¬£¬£¬Ôì³ÉÑÏÖØÆÆË𡣡£¡£Hunters InternationalʹÓõİ²Åž籾ʹÓÃVMware PowerCLIºÍWinSCP AutomationÀ´Ö´ÐÐÏà¹Ø²Ù×÷¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ï¶àÄêÀ´Ò»Ö±ÔÚÀÄÓÃÕýµ±µÄÔ¶³Ì¼à¿ØºÍÖÎÀí£¨RMM£©Èí¼þ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kickidler-employee-monitoring-software-abused-in-ransomware-attacks/
4. ¶íÕþ¸®Ö§³ÖColdRiver×é֯ʹÓÃLostKeys¶ñÒâÈí¼þÇÔÃÜ
5ÔÂ8ÈÕ£¬£¬£¬£¬×Ô½ñÄêÄêÍ·Æð£¬£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄColdRiverºÚ¿Í×éÖ¯Ò»Á¬Ê¹ÓÃÐÂÐÍLostKeys¶ñÒâÈí¼þ£¬£¬£¬£¬¶ÔÎ÷·½Õþ¸®¡¢¼ÇÕß¡¢Öǿ⼰·ÇÕþ¸®×éÖ¯·¢¶¯Ìع¤¹¥»÷ÒÔÇÔÈ¡Îļþ¡£¡£¡£12Ô£¬£¬£¬£¬Ó¢¹úºÍÎåÑÛͬÃËÈ·ÈϸÃ×éÖ¯Óë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±£´æ¹ØÁª¡£¡£¡£¹È¸èÍþвÇ鱨С×飨GTIG£©ÓÚ1ÔÂÊ״η¢Ã÷LostKeys±»¸ß¶ÈÑ¡ÔñÐԵذ²ÅÅ£¬£¬£¬£¬×÷ΪClickFixÉç»á¹¤³Ì¹¥»÷µÄÒ»²¿·Ö£¬£¬£¬£¬¹¥»÷ÕßÓÕÆÄ¿µÄÔËÐжñÒâPowerShell¾ç±¾£¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÌØÊâPowerShell¸ºÔØ£¬£¬£¬£¬×îÖÕ°²Åű»×·×ÙΪLostKeysµÄVisual Basic Script£¨VBS£©Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£GTIGÖ¸³ö£¬£¬£¬£¬LOSTKEYSÄÜ´ÓÓ²±àÂëµÄÀ©Õ¹ÃûºÍĿ¼ÁбíÖÐÇÔÈ¡Îļþ£¬£¬£¬£¬²¢Ïò¹¥»÷Õß·¢ËÍϵͳÐÅÏ¢ºÍÕýÔÚÔËÐеÄÀú³Ì¡£¡£¡£ColdRiver¹ß³£ÇÔȡƾ֤ÒÔÇÔȡĿµÄµç×ÓÓʼþºÍÁªÏµÈË£¬£¬£¬£¬ÈôÐè»á¼ûÄ¿µÄϵͳÎĵµ£¬£¬£¬£¬»¹»á°²ÅÅSPICA¶ñÒâÈí¼þ¾ÙÐÐÑ¡ÔñÐÔ»ñÈ¡¡£¡£¡£LOSTKEYSÉè¼ÆÄ¿µÄÓëColdRiverÀàËÆ£¬£¬£¬£¬ÇÒ½öÔÚÌØ¶¨ÇéÐÎϰ²ÅÅ¡£¡£¡£ColdRiver×Ô2017ÄêÆð±ãʹÓÃÉç»á¹¤³ÌѧºÍ¿ªÔ´Ç鱨ÊÖÒÕÑо¿ºÍÒýÓÕÄ¿µÄ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-links-new-lostkeys-data-theft-malware-to-russian-cyberspies/
5. ÃÀ¶à²¿·Ö¾¯±¨ÓÍÆøÐÐÒµICS/SCADAÏµÍ³ÃæÁÙÍøÂç¹¥»÷Íþв
5ÔÂ7ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¾Ö£¨CISA£©¡¢Áª°îÊÓ²ì¾Ö£¨FBI£©¡¢ÇéÐα£»£»£»£»£»¤¾Ö£¨EPA£©ºÍÄÜÔ´²¿£¨DoE£©ÓÚÖܶþÁªºÏÐû²¼¾¯±¨£¬£¬£¬£¬¾ÍÕë¶ÔÃÀ¹úʯÓͺÍ×ÔÈ»ÆøÐÐÒµµÄÍøÂç¹¥»÷·¢³öÖÒÑÔ¡£¡£¡£Õþ¸®»ú¹¹Ö¸³ö£¬£¬£¬£¬ÕâЩ¹¥»÷Ëä½ÓÄÉ»ù±¾ÈëÇÖÊÖÒÕ£¬£¬£¬£¬µ«Òªº¦»ù´¡ÉèÊ©×éÖ¯ÍøÂçÇå¾²ÎÀÉú״̬²»¼Ñ£¬£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹ÉõÖÁÎïÀíË𻵡£¡£¡£CISAÇ¿µ÷£¬£¬£¬£¬Ò»Ð©ÊÖÒÕ²»Ì«ÖØ´óµÄÍøÂçÐÐΪÕßÕýÃé×¼ÃÀ¹úÒªº¦»ù´¡ÉèÊ©²¿·Ö£¨ÓÈÆäÊÇÄÜÔ´ºÍ½»Í¨ÏµÍ³£©µÄ¹¤Òµ¿ØÖÆÏµÍ³/¼à¿ØÓëÊý¾ÝÊÕÂÞϵͳ£¨ICS/SCADA£©·¢¶¯¹¥»÷¡£¡£¡£ÕâЩÍþвÐÐΪÕߺܿÉÄÜÊǺڿÍÐж¯Ö÷ÒåÕûÌå»ò×ԳƺڿÍÐж¯Ö÷ÒåÕߵĺڿͣ¬£¬£¬£¬½üÄêÀ´ËûÃÇÒѶà´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÊܱ£»£»£»£»£»¤»òʹÓÃĬÈÏÃÜÂëµÄSCADA¼°ÆäËûICSϵͳ·¢¶¯¹¥»÷¡£¡£¡£¹¤ÒµÍøÂçÇ徲ר¼ÒÖÒÑԳƣ¬£¬£¬£¬Ö»¹ÜºÚ¿ÍµÄÐí¶à˵·¨±»Ç¿µ÷£¬£¬£¬£¬µ«ÕâЩ¹¥»÷ÈÔ¿ÉÄܱ¬·¢ÖØ´óÓ°Ïì¡£¡£¡£ÎªÓ¦¶ÔÕâЩÍþв£¬£¬£¬£¬CISA¡¢FBI¡¢EPAºÍDoE±Þ²ßÒªº¦»ù´¡ÉèÊ©×éÖ¯Á¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬¸ÄÉÆÍøÂçÇå¾²Ì¬ÊÆ¡£¡£¡£Ïêϸ²½·¥°üÀ¨È·±£ÔËÓªÊÖÒÕ£¨OT£©ÏµÍ³ÎÞ·¨Ö±½Ó´Ó»¥ÁªÍø»á¼û£¬£¬£¬£¬Í¨¹ýÐéÄâרÓÃÍøÂ磨VPN£©¡¢Ç¿ÃÜÂëºÍ·À´¹ÂÚ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©Çå¾²µØÔ¶³Ì»á¼ûËüÃÇ£¬£¬£¬£¬Ê¶±ð²¢¸ü¸ÄĬÈÏÃÜÂ룬£¬£¬£¬¶ÔÒªº¦ÏµÍ³ÊµÑéÍøÂç·Ö¶Î£¬£¬£¬£¬²¢È·±£Äܹ»ÊÖ¶¯²Ù×÷OTϵͳ¡£¡£¡£±ðµÄ£¬£¬£¬£¬½¨Òé×éÖ¯ÓëÏà¹ØÊµÌåÏàÖú£¬£¬£¬£¬Ê¶±ð²¢½â¾ö¿ÉÄܱ£´æµÄÉèÖùýʧ¡£¡£¡£
https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/
6. iOSÓÎÏ·½ü50ÍòÓû§Êý¾Ýй¶ÇÒÓ²±àÂëÉñÃØÔâÆØ¹â
5ÔÂ8ÈÕ£¬£¬£¬£¬iOSÓÎÏ·¡°Cats Tower£ºThe Cat Game£¡¡±±£´æÑÏÖØÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬ÖÂʹ½ü50ÍòÓû§ÃæÁٺڿ͹¥»÷Σº¦¡£¡£¡£CybernewsÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬¸ÃÓÎϷй¶ÁËÍæ¼ÒµÄIPµØµã¡¢Óû§Ãû¡¢FacebookÓû§ID¼°»á¼ûÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ºÚ¿ÍÓÃÓÚ×·×ÙÓû§ÔÚÏ߻¡¢Ð®ÖÆFacebookÕË»§£¬£¬£¬£¬ÉõÖÁ׼ȷ¶¨Î»Óû§Î»Öᣡ£¡£Ö»¹ÜIPµØµã²¢·ÇGPS×ø±ê£¬£¬£¬£¬µ«Á¬ÏµÆäËûÊý¾ÝÈÔ¿ÉÌṩ½Ï׼ȷµÄλÖÃÐÅÏ¢¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÓÉÓÚFirebaseÉèÖùýʧ£¬£¬£¬£¬¸ÃÓ¦Óû¹Ð¹Â¶ÁËÁè¼Ý45ÍòÓû§µÄIPµØµãºÍÓû§Ãû£¬£¬£¬£¬ÒÔ¼°229¸öFacebookÓû§IDºÍ»á¼ûÁîÅÆ¶Ô¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬¸ÃÓ¦ÓôúÂë¿âÖл¹³äÂú×Ų»Ó¦±»¹ûÕæµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬Èç¿Í»§¶ËID¡¢APIÃÜÔ¿¡¢ÏîÄ¿IDµÈ£¬£¬£¬£¬ÕâЩӲ±àÂëµÄÉñÃØÒ»µ©±»ÕÆÎÕ£¬£¬£¬£¬ÍþвÐÐΪÕß¾ÍÄÜ»æÖƳöÓ¦ÓóÌÐòµÄÕû¸öºó¶Ë»ù´¡ÉèÊ©£¬£¬£¬£¬ÀÄÓÃÆäЧÀÍÍøÂç¸ü¶àÓû§Êý¾Ý£¬£¬£¬£¬ÉõÖÁÖ±½Óͨ¹ýÓ¦Óûù´¡ÉèÊ©·¢ËÍÀ¬»øÓʼþ£¬£¬£¬£¬´Ó¶ø½«ÆäÎäÆ÷»¯¡£¡£¡£´Ë´ÎйÃÜÊÂÎñÊÇCybernewsÊÓ²ìµÄÒ»²¿·Ö£¬£¬£¬£¬Ñо¿Ö°Ô±ÆÊÎöÁËÔ¼8%µÄApp StoreÓ¦Ó㬣¬£¬£¬·¢Ã÷71%µÄÊÜÆÊÎöÓ¦ÓÃÖÁÉÙй¶ÁËÒ»¸öÉñÃØÐÅÏ¢£¬£¬£¬£¬Æ½¾ùÿ¸öÓ¦ÓÃй¶5.2¸ö¡£¡£¡£Ä³Ð©°¸ÀýÖУ¬£¬£¬£¬ÈÈÃÅÔ¼»áÓ¦ÓÃй¶ÁËÓû§ÕÕÆ¬£¬£¬£¬£¬¼ÒÍ¥×·×ÙÓ¦ÓÃй¶ÁËʵʱGPS×ø±ê£¬£¬£¬£¬À¬»øÓʼþ×èµ²Æ÷Ôòй¶Á˱»×èµ²µÄºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£
https://cybernews.com/security/cats-tower-iphone-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ