ºÚ¿ÍÉù³Æ¹«¹²Æû³µÔâÈëÇÖ£¬£¬£¬£¬ £¬£¬µ«Î´ÄÜÌṩ֤¾Ý

Ðû²¼Ê±¼ä 2025-06-04

1. ºÚ¿ÍÉù³Æ¹«¹²Æû³µÔâÈëÇÖ£¬£¬£¬£¬ £¬£¬µ«Î´ÄÜÌṩ֤¾Ý


6ÔÂ2ÈÕ£¬£¬£¬£¬ £¬£¬µÂ¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ·ºÆðÔÚÀÕË÷Èí¼þ¼¯ÍÅStormousµÄ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ£¬£¬£¬£¬ £¬£¬Òý·¢ÁË¶ÔÆäÊý¾ÝÇå¾²µÄ¹Ø×¢¡£¡£¡£¡£¡£¡£¹«¹²Æû³µ¼¯ÍÅÓÚ5ÔÂβÅû¶ÁËÓë¸ÃÀÕË÷Èí¼þÍÅ»ïµÄÁªÏµ£¬£¬£¬£¬ £¬£¬²¢Ö¸³öÍþвÐÐΪÕßÉù³ÆÄÜ»á¼ûÓû§ÕÊ»§Êý¾Ý¡¢Éí·ÝÑéÖ¤ÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±ÏÖÔÚÎÞ·¨È·ÈϹ«¹²Æû³µ¼¯ÍŵÄÊý¾ÝÊÇ·ñ±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£StormousÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÉù³Æ½«ÔÚ¼¸ÌìÄÚÐû²¼¹«Ë¾Êý¾Ý£¬£¬£¬£¬ £¬£¬ÕâÊÇÆäϰÓõÄʩѹÊֶΣ¬£¬£¬£¬ £¬£¬Í¨³£ÍøÂç·¸·¨·Ö×Ó»áÐû²¼Êý¾ÝÑù±¾ÒÔ֤ʵÆä¿ÉÐŶȣ¬£¬£¬£¬ £¬£¬µ«´Ë´Î¸ÃÍÅ»ï½ö·ÖÏíÁËÎÞЧÁ´½Ó£¬£¬£¬£¬ £¬£¬Î´ÌṩÓмÛÖµÄÚÈÝ¡£¡£¡£¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬ £¬£¬Stormous×÷ΪµØÏÂÀÕË÷Èí¼þÁìÓòµÄ×ÅÃû¼ÓÈëÕߣ¬£¬£¬£¬ £¬£¬´Ë´ÎÐÐΪ¿ÉÄÜÖ¼ÔÚÏò¹«¹²Æû³µ¼¯ÍÅʩѹ£¬£¬£¬£¬ £¬£¬ÆÈʹÆäÖª×ãÊê½ðÒªÇ󡣡£¡£¡£¡£¡£Ò»µ©Êý¾Ýй¶»ñµÃ֤ʵ£¬£¬£¬£¬ £¬£¬½«Î£¼°¹«Ë¾Óû§£¬£¬£¬£¬ £¬£¬¿ÉÄܵ¼ÖÂÕË»§±»µÁºÍδ¾­ÊÚȨµÄ»á¼ûʵÑ飬£¬£¬£¬ £¬£¬Í¬Ê±ÉæÏÓй¶µÄСÎÒ˽¼ÒÐÅÏ¢Ò²¿ÉÄÜΣ¼°Òþ˽¡£¡£¡£¡£¡£¡£StormousÀÕË÷Èí¼þÍÅ»ï×Ô2022ÄêÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬£¬ £¬£¬ÒѳÉΪ¸ÃÁìÓòµÄÂÄÀú¸»ºñ¼ÓÈëÕߣ¬£¬£¬£¬ £¬£¬¸ÃÍÅ»ïÔÚÒÑÍù12¸öÔÂÄÚÖÁÉÙ¹¥»÷ÁË34¸ö×éÖ¯¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬¹«¹²Æû³µ¼¯ÍÅÉÐδ¾Í´Ë´ÎÊÂÎñ½ÒÏþ½øÒ»²½ÉùÃ÷£¬£¬£¬£¬ £¬£¬¸÷ÆÓÖ±Ç×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/volkswagen-data-breach-claim-lacks-evidence/


2. MainStreetÒøÐй©Ó¦ÉÌÔâ¹¥»÷Ö¿ͻ§ÐÅϢй¶


6ÔÂ3ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úMainStreetÒøÐÐÅû¶ÆäÏàÖú¹©Ó¦ÉÌÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬µ¼ÖÂÔ¼5%µÄ¿Í»§Ãô¸ÐÐÅϢй¶¡£¡£¡£¡£¡£¡£¸ÃÐÐÔÚÌá½»¸øÃÀ¹úÖ¤½»»á£¨SEC£©µÄÎļþÖÐÌåÏÖ£¬£¬£¬£¬ £¬£¬3Ô»ñÖª¹©Ó¦ÉÌϵͳ±»ÈëÇֺ󣬣¬£¬£¬ £¬£¬Á¬Ã¦ÖÕÖ¹ÁËÓë¸Ã¹©Ó¦É̵ÄËùÓÐÏàÖú£¬£¬£¬£¬ £¬£¬²¢ÓÚ4ÔÂÏÂÑ®Íê³ÉÊÂÎñ¹æÄ£Éó²é£¬£¬£¬£¬ £¬£¬µ«Î´»ØÓ¦ÏêϸÊܺ¦ÈËÊý¼°ÐÅÏ¢ÀàÐ͵ÄÖÊѯ¡£¡£¡£¡£¡£¡£ÊÓ²ìÈ·ÈÏÒøÐÐ×ÔÉíϵͳδÊÜÈëÇÖ£¬£¬£¬£¬ £¬£¬¿Í»§ÕË»§×ʽðÇå¾²ÎÞÓÝ£¬£¬£¬£¬ £¬£¬ÒøÐÐÒÑÓÚ5ÔÂ26ÈÕ֪ͨî¿Ïµ»ú¹¹¼°¿Í»§£¬£¬£¬£¬ £¬£¬²¢ÎªÊÜÓ°Ïì¿Í»§½¨Éè¿ÉÒɻ¼à²âϵͳ¡£¡£¡£¡£¡£¡£ÒøÐÐÉùÃ÷¸ÃÊÂÎñδ¶ÔÆäÔËÓª±¬·¢ÖØ´óÓ°Ï죬£¬£¬£¬ £¬£¬´ÓÆä×îвƱ¨À´¿´£¬£¬£¬£¬ £¬£¬´æ¿îÔ¼19ÒÚÃÀÔª£¬£¬£¬£¬ £¬£¬¾»ÀûÈó250ÍòÃÀÔª£¬£¬£¬£¬ £¬£¬Óë2024Äê¿÷Ëð998ÍòÃÀÔªµÄÇéÐÎÏà±ÈÒÑÓиÄÉÆ¡£¡£¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÃÀ¹úÎå´óÒøÐÐЭ»áÁªºÏÖº¯SECÒªÇ󯯳ýÍøÂçÇå¾²ÊÂÎñÇ¿ÖÆÅû¶»®¶¨Ö®¼Ê£¬£¬£¬£¬ £¬£¬¸Ã¹æÕÂ×Ô2023ÄêÉúЧÒÔÀ´£¬£¬£¬£¬ £¬£¬Ò»Ö±Êܵ½¹ú»áÓëÒøÐÐÒµµÄÅê»÷£¬£¬£¬£¬ £¬£¬±»Ö¸ÔöÌíºÏ¹æÎ£º¦±¾Ç®£¬£¬£¬£¬ £¬£¬Î´ÄÜÌṩÓÐÓÃͶ×ʾöÒéÐÅÏ¢£¬£¬£¬£¬ £¬£¬·´¶ø¡°×è°­×ÊÔ´ÐγɻúÖÆ¡±¡£¡£¡£¡£¡£¡£


https://therecord.media/Main-street-cyber-incident-bank


3. ºÏ¹æ×Ô¶¯»¯ÉÌVantaÈí¼þÎó²îÖ¿ͻ§Êý¾Ýй¶


6ÔÂ3ÈÕ£¬£¬£¬£¬ £¬£¬ºÏ¹æ×Ô¶¯»¯ÌṩÉÌVantaÈ·Èϱ¬·¢ÁËÒ»ÆðÖØ´óÈí¼þÎó²îµ¼ÖµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬Êý°ÙÃû¿Í»§Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£VantaÒÔ×ÊÖúÆóÒµÖÎÀíÇå¾²ºÍºÏ¹æÐÔÖø³Æ£¬£¬£¬£¬ £¬£¬È»¶ø´Ë´ÎÈ´ÒòÍøÂçÇå¾²ÎÊÌâÏÝÈë·ç²¨¡£¡£¡£¡£¡£¡£5ÔÂ26ÈÕ£¬£¬£¬£¬ £¬£¬VantaÍŶӷ¢Ã÷ÕâÒ»ÑÏÖØÎÊÌâ¡£¡£¡£¡£¡£¡£ÓÉÓÚ²úÆ·±ä»»ÒýÆðµÄ´úÂë¹ýʧ£¬£¬£¬£¬ £¬£¬Ãô¸ÐÔ±¹¤Êý¾Ý¡¢ÕË»§ÉèÖ÷½·¨¡¢Ë«ÒòËØÉí·ÝÑéÖ¤£¨MFA£©Ê¹ÓÃÏêÇé¼°¹¤¾ßÉèÖÃÐÅÏ¢µÈ±»¡°¹ýʧµØµ¼È롱µ½ÆäËû¿Í»§ÕË»§¡£¡£¡£¡£¡£¡£VantaÌåÏÖ¡°Ö»Óв»µ½4%µÄ¿Í»§¡±Êܵ½Ó°Ï죬£¬£¬£¬ £¬£¬µ«ÕâÈÔÒâζ×ÅÊý°Ù¼ÒÆóÒµÊý¾Ýй¶¡£¡£¡£¡£¡£¡£VantaÊ×ϯ²úÆ·¹ÙJeremy Epling֤ʵÁË´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬²¢Ö¸³ö¡°²»µ½20%µÄµÚÈý·½¼¯³ÉÊý¾Ý×Ó¼¯Ì»Â¶¸øÁËÆäËûVanta¿Í»§¡±¡£¡£¡£¡£¡£¡£VantaÒÑ×îÏÈ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬ £¬£¬¼û¸æÆäÔ±¹¤ÕÊ»§Êý¾Ý±»¹ýʧ²åÈëµ½ÆäËû¿Í»§ÊµÀýÖС£¡£¡£¡£¡£¡£·¢Ã÷´ËÎÊÌâºó£¬£¬£¬£¬ £¬£¬VantaÁ¬Ã¦»Ø¹öÁ˱任²¢Æô¶¯ÐÞ¸´ÊÂÇ飬£¬£¬£¬ £¬£¬ÍýÏëÔÚ6ÔÂ4ÈÕǰÍê³ÉÐÞ¸´£¬£¬£¬£¬ £¬£¬ËùÓÐÊÜÓ°ÏìµÄ¿Í»§¶¼ÒÑÊÕµ½Í¨Öª£¬£¬£¬£¬ £¬£¬¿Í»§Ö§³ÖÍŶÓÕýÔÚ½â´ðÒÉÎʺÍÇëÇ󡣡£¡£¡£¡£¡£Îª±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬£¬ £¬£¬VantaÕýÔÚ¸üеÚÈý·½¼¯³ÉAPI²¢Ë¢Ð»á¼û¿ØÖƲâÊÔ¡£¡£¡£¡£¡£¡£


https://hackread.com/code-bug-compliance-vanta-data-leak-customer-clients/


4. µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÔºÔâInterLockÀÕË÷Èí¼þ¹¥»÷


6ÔÂ3ÈÕ£¬£¬£¬£¬ £¬£¬InterLockÀÕË÷Èí¼þ×ßÂ©ÍøÕ¾½üÆÚ½«Texas Digestive Specialists£¨µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½Éú¼¯ÍÅ£©ÁÐÈëÆä×ß©ÁÐ±í£¬£¬£¬£¬ £¬£¬Éù³ÆÒÑÇÔÈ¡²¢×ß©Á˸ÃÒ½ÁƼ¯ÍÅ263GBµÄÊý¾Ý£¬£¬£¬£¬ £¬£¬Éæ¼°16920¸öÎļþ¼ÐºÍ215245¸öÎļþ¡£¡£¡£¡£¡£¡£DataBreaches¶ÔÊý¾Ý¼¯¾ÙÐÐÁ˳éÑùÊӲ죬£¬£¬£¬ £¬£¬ËäÔÚ¸ÃÒ½ÁƼ¯ÍŹÙÍøÎ´·¢Ã÷Òì³£»£»£»£»£»òй¶ÐÅÏ¢£¬£¬£¬£¬ £¬£¬µ«·¢Ã÷InterLockÒѼÓÃÜÎļþ£¬£¬£¬£¬ £¬£¬ÇÒÐí¶à°üÀ¨Êܱ£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©µÄÎļþΪʵÑéÊÒ²¡Àí±¨¸æµÄ.pdfÎļþ¡£¡£¡£¡£¡£¡£ÕâЩʵÑéÊÒ±¨¸æÏêϸ¼Í¼ÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ì²éÈÕÆÚ¡¢Ïà¹Ø²¡Ê·ºÍ¼ì²éЧ¹û£¬£¬£¬£¬ £¬£¬ÔÚÒ»¸öѹËõµµ°¸Öоͷ¢Ã÷ÁËÁè¼Ý2Íò·Ý´ËÀ౨¸æ£¬£¬£¬£¬ £¬£¬Ê±¼ä¿ç¶È´Ó2023Äê8Ôµ½2025ÄêÍ·£¬£¬£¬£¬ £¬£¬ÁíÒ»¸öµµ°¸»¹°üÀ¨375Ò³¹ØÓÚ2024Ä겿·Öʱ¼äµãÖ¸¶¨»¼ÕߵIJ¡Àí±¨¸æ£¬£¬£¬£¬ £¬£¬ÇÒËùÓб¨¸æ¾ùÓ¡Óе¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÉúµÄÑöÃæ¡£¡£¡£¡£¡£¡£µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÔºÎª³ÉÈ˺ͶùͯÌṩҽÁƺÍÍâ¿ÆÐ§ÀÍ£¬£¬£¬£¬ £¬£¬Ôڵ¿ËÈøË¹ÖÝÉèÓÐÈý¸öÕïËù¡£¡£¡£¡£¡£¡£DataBreachesÒÑÏò¸ÃÒ½Ôº·¢ËÍÁªÏµ±í¸ñѯÎÊÆä¶ÔÒÉËÆÀÕË÷Èí¼þ¹¥»÷µÄ»ØÓ¦£¬£¬£¬£¬ £¬£¬µ«×èÖ¹·¢¸å£¬£¬£¬£¬ £¬£¬Ò½ÔºÉÐδ»Ø¸´£¬£¬£¬£¬ £¬£¬Ò²Î´¾ÍÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©»òµÂ¿ËÈøË¹ÖÝ×ÜÉó²é³¤°ì¹«ÊҵĹ«¹²Î¥¹æ¹¤¾ßÌá½»Èκα¨¸æ¡£¡£¡£¡£¡£¡£


https://databreaches.net/2025/06/03/texas-gastroenterology-and-surgical-practice-victim-of-ransomware-attack/


5. Ó¡¶ÈÔÓ»õÅäËÍKiranaProÔâºÚ¿Í¹¥»÷ÖÂÊý¾Ý±»Çå


6ÔÂ3ÈÕ£¬£¬£¬£¬ £¬£¬Ó¡¶ÈÔÓ»õÅäËÍÊ×´´¹«Ë¾KiranaProÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬ £¬£¬ËùÓÐÊý¾Ý±»É¨³ý£¬£¬£¬£¬ £¬£¬ÆäÊ×´´ÈËDeepak Ravindran֤ʵÁËÕâÒ»ÐÂÎÅ¡£¡£¡£¡£¡£¡£±»Ïú»ÙµÄÊý¾Ýº­¸ÇÓ¦ÓóÌÐò´úÂ롢ЧÀÍÆ÷ÐÅÏ¢ÒÔ¼°´ó×ÚÃô¸Ð¿Í»§ÐÅÏ¢£¬£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢ÓʼĵصãºÍ¸¶¿îÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄÓ¦ÓóÌÐòËäÈÔÔÚÏߣ¬£¬£¬£¬ £¬£¬µ«ÒÑÎÞ·¨´¦Öóͷ£¶©µ¥¡£¡£¡£¡£¡£¡£KiranaProÓÚ2024Äê12ÔÂÍÆ³ö£¬£¬£¬£¬ £¬£¬ÊÇÓ¡¶ÈÕþ¸®Êý×ÖÉÌÎñ¿ª·ÅÍøÂçÉϵÄÂò¼ÒÓ¦ÓóÌÐò£¬£¬£¬£¬ £¬£¬ÔÊÐí¿Í»§´ÓÍâµØÊÐËÁºÍÖÜΧ³¬ÊйºÖÃÔÓ»õ£¬£¬£¬£¬ £¬£¬ÓµÓÐ5.5ÍòÃû¿Í»§£¬£¬£¬£¬ £¬£¬ÆäÖÐ3ÍòÖÁ3.5ÍòÃû»îÔ¾Âò¼Ò±é²¼50¸ö¶¼»á£¬£¬£¬£¬ £¬£¬ÖðÈÕ×ܼÆÏµ¥2000±Ê¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ìṩ»ùÓÚÓïÒôµÄ½çÃæ£¬£¬£¬£¬ £¬£¬Ö§³Ö¶àÖÖÓïÑÔϵ¥¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬£¬5ÔÂ26ÈÕ£¬£¬£¬£¬ £¬£¬KiranaPro¸ß¹ÜµÇ¼ÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©ÕË»§Ê±·¢Ã÷Òì³££¬£¬£¬£¬ £¬£¬ºÚ¿ÍÀֳɻá¼ûÁËÆäÔÚAWSºÍGitHubÉϵĸùÕË»§¡£¡£¡£¡£¡£¡£Ê×ϯÊÖÒÕ¹ÙSaurav KumarÖ¸³ö£¬£¬£¬£¬ £¬£¬¹¥»÷±¬·¢ÔÚ5ÔÂ24ÈÕÖÁ25ÈÕ×óÓÒ£¬£¬£¬£¬ £¬£¬ÆäʱAWSÕË»§µÄ¶àÒòËØÉí·ÝÑéÖ¤´úÂë±»¸ü¸Ä£¬£¬£¬£¬ £¬£¬ËùÓÐÔÊÐí¿Í»§»á¼ûÐéÄâÅÌËã»úÔËÐÐÓ¦ÓóÌÐòµÄEC2ЧÀͱ»É¾³ý£¬£¬£¬£¬ £¬£¬ÇÒ¹«Ë¾ÎÞ·¨»ñÈ¡ÈκÎÈÕÖ¾£¬£¬£¬£¬ £¬£¬ÓÉÓÚȱ·¦¸ùÕË»§È¨ÏÞ¡£¡£¡£¡£¡£¡£RavindranÌåÏÖ£¬£¬£¬£¬ £¬£¬KiranaProÒÑÁªÏµGitHubÖ§³ÖÍŶӣ¬£¬£¬£¬ £¬£¬Ð­Öúʶ±ðºÚ¿ÍIPµØµãºÍÆäËû¹¥»÷ºÛ¼££¬£¬£¬£¬ £¬£¬²¢ÕýÔÚ¶Ôǰ¹ÍÔ±ÌáÆðËßËÏ£¬£¬£¬£¬ £¬£¬³ÆÆäδÌá½»»á¼ûGitHubÕË»§µÄƾ֤¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬¹¥»÷Ïêϸ·½·¨Éв»ÇåÎú£¬£¬£¬£¬ £¬£¬µ«½üÄêÀ´Ò»Ð©´óÐÍÍøÂç¹¥»÷¶àÓÉÆ¾Ö¤ÍµÇÔÒýÆð¡£¡£¡£¡£¡£¡£


https://techcrunch.com/2025/06/03/indian-grocery-startup-kiranapro-was-hacked-and-its-servers-deleted-ceo-confirms/


6. ¶ñÒâÈí¼þCrocodilusÌí¼ÓÐéαÁªÏµÈËÓÕÆ­È«ÇòÓû§


6ÔÂ3ÈÕ£¬£¬£¬£¬ £¬£¬×îа桰Crocodilus¡±Android¶ñÒâÈí¼þ½ø»¯£¬£¬£¬£¬ £¬£¬ÍþвÉý¼¶¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2025Äê3ÔÂÏÂÑ®±»Threat FabricÑо¿Ö°Ô±Ê״μͼ£¬£¬£¬£¬ £¬£¬ÔçÆÚ°æ±¾ÒѾ߱¸ÆÕ±éÊý¾Ý͵ÇÔºÍÔ¶³Ì¿ØÖƹ¦Ð§£¬£¬£¬£¬ £¬£¬»¹Í¨¹ýÐéα¹ýʧÐÂΞÙÐÐÉç»á¹¤³ÌʵÑ飬£¬£¬£¬ £¬£¬ÓÕµ¼Óû§Ð¹Â¶¼ÓÃÜÇ®±ÒÇ®°üÃÜÔ¿£¬£¬£¬£¬ £¬£¬Æäʱ½öÔÚÍÁ¶úÆäÓÐС¹æÄ£»£»£»£»£»î¶¯¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬Threat FabricÒ»Á¬¼à¿Ø·¢Ã÷£¬£¬£¬£¬ £¬£¬CrocodilusÒѽ«Ä¿µÄ¹æÄ£À©´óÖÁÈ«Çò¡£¡£¡£¡£¡£¡£×îа汾ÒýÈëлúÖÆ£¬£¬£¬£¬ £¬£¬ÔÚÊÜѬȾװ±¸ÁªÏµÈËÁбíÖÐÌí¼ÓÐéαÁªÏµÈË£¬£¬£¬£¬ £¬£¬µ±Êܺ¦Õß½Óµ½ÍþвÐÐΪÕߵ绰ʱ£¬£¬£¬£¬ £¬£¬×°±¸»áÏÔʾÐéαÁªÏµÈËÐÕÃû¶ø·ÇÀ´µçÕßID£¬£¬£¬£¬ £¬£¬ÍþвÐÐΪÕ߿ɽè´Ëð³äÒøÐС¢¹«Ë¾»òÇ×ÓÑ£¬£¬£¬£¬ £¬£¬Ê¹Í¨»°¸ü¾ßÒÉ»óÐÔ£¬£¬£¬£¬ £¬£¬´Ë²Ù×÷ÔÚÊÕµ½Ìض¨ÃüÁîʱ´¥·¢£¬£¬£¬£¬ £¬£¬Í¨¹ý±à³Ì·½·¨½¨ÉèÐÂÍâµØÁªÏµÈË¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬Ð°汾»¹Í¨¹ý´úÂë´ò°üºÍÌØÊâXOR¼ÓÃÜÌáÉýÌӱܹ¥»÷ÄÜÁ¦£¬£¬£¬£¬ £¬£¬´úÂë¾í»ýºÍ¾À²øÊ¹ÄæÏò¹¤³Ì¸üÄÑÌ⣬£¬£¬£¬ £¬£¬»¹ÐÂÔöÍâµØÆÊÎö±»µÁÊý¾Ý¹¦Ð§£¬£¬£¬£¬ £¬£¬ÒÔʵÏÖ¸ü¸ßÖÊÁ¿µÄÊý¾ÝÍøÂç¡£¡£¡£¡£¡£¡£CrocodilusµÄ¿ìËÙ½ø»¯ÏÔʾ³öÆä¶ÔÉç»á¹¤³ÌѧµÄÉî¶ÈÔËÓ㬣¬£¬£¬ £¬£¬³ÉΪһÖÖÌØÊâΣÏյĶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¼øÓÚÆäÍþв£¬£¬£¬£¬ £¬£¬½¨ÒéAndroidÓû§ÏÂÔØÈí¼þʱ¼á³ÖʹÓÃGoogle Play»ò¿ÉÐÅÈεÄÐû²¼ÉÌ£¬£¬£¬£¬ £¬£¬È·±£Play ProtectʼÖÕ´¦ÓÚ¼¤»î״̬£¬£¬£¬£¬ £¬£¬²¢Ö»¹ÜïÔ̭ʹÓÃÓ¦ÓóÌÐòµÄÊýÄ¿£¬£¬£¬£¬ £¬£¬ÒÔ½µµÍѬȾΣº¦¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-malware-crocodilus-adds-fake-contacts-to-spoof-trusted-callers/