Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¼Ò
Ðû²¼Ê±¼ä 2025-06-111. Rare Werewolf×éÖ¯ÍøÂç¹¥»÷£ºÊÖ·¨¶àÑùÍþв¶í¼°CIS¹ú¼Ò
6ÔÂ10ÈÕ£¬£¬Rare Werewolf£¨Ç°³Æ Rare Wolf£©ºÚ¿Í×éÖ¯£¬£¬Ò²±»³ÆÎª Librarian Ghouls ºÍ Rezet£¬£¬±»È϶¨Îª¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯£¬£¬ÓëһϵÁÐÕë¶Ô¶íÂÞ˹ºÍ×ÔÁ¦¹ú¼ÒÁªºÏÌ壨CIS£©¹ú¼ÒµÄÍøÂç¹¥»÷Óйأ¬£¬×Ô 2019 ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¸Ã×éÖ¯¹¥»÷ÒâͼÊÇÔÚÊÜѬȾÖ÷»úÉϽ¨ÉèÔ¶³Ì»á¼û¡¢ÇÔȡƾ֤²¢°²ÅżÓÃÜÇ®±Ò¿ó¹¤£¬£¬Ó°ÏìÊý°ÙÃû¶íÂÞ˹Óû§£¬£¬Éæ¼°¹¤ÒµÆóÒµºÍ¹¤³ÌԺУ£¬£¬°×¶íÂÞ˹ºÍ¹þÈø¿Ë˹̹ҲÓÐÉÙÁ¿Ñ¬È¾¡£¡£Æä¹¥»÷ÏÔÖøÌØÕ÷ÊÇÇãÏòÓÚʹÓÃÕýµ±µÚÈý·½Èí¼þ£¬£¬¶ñÒ⹦Чͨ¹ýÏÂÁîÎļþºÍ PowerShell ¾ç±¾ÊµÏÖ¡£¡£¸ÃÍþвÐÐΪÕßͨ¹ý´¹ÂÚÓʼþ»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬Ê¹ÓÃפ×ãµãÇÔÈ¡Êý¾Ý²¢Í¶·Å¶àÖÖ¹¤¾ß£¬£¬ÓÃÓÚ½»»¥¡¢ÍøÂçÃÜÂëºÍ½ûÓ÷À²¡¶¾Èí¼þ¡£¡£¿£¿£¿¨°Í˹»ù¼Í¼µÄ×îй¥»÷ÏÔʾ£¬£¬ÒÔ°üÀ¨¿ÉÖ´ÐÐÎļþµÄÊÜÃÜÂë±£»£»£»£»£»¤Ñ¹Ëõ°üΪÆðµã£¬£¬Ñ¹Ëõ°üÖÐÓÐ×°ÖóÌÐò£¬£¬ÓÃÓÚ°²ÅÅÕýµ±¹¤¾ß¼°ÆäËûÔØºÉ£¬£¬°üÀ¨ÓÕ¶ü PDF Îĵµ¡£¡£ÖÐÐÄÔØºÉ´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡ÆäËûÎļþ£¬£¬»¹Ê¹Óà AnyDesk Ô¶³Ì×ÀÃæÈí¼þºÍ Windows Åú´¦Öóͷ£¾ç±¾Ôö½øÊý¾ÝÇÔÈ¡ºÍ¿ó¹¤°²ÅÅ£¬£¬Åú´¦Öóͷ£¾ç±¾ÄÜ×Ô¶¯½ÐÐÑÊܺ¦Õßϵͳ²¢ÔÊÐí¹¥»÷ÕßÔ¶³Ì»á¼û¡£¡£Ê¹ÓõÚÈýÆÓÖ±µ±Èí¼þ¾ÙÐжñÒâÄ¿µÄÊdz£¼ûÊÖÒÕ£¬£¬ÔöÌíÁË APT »î¶¯¼ì²âºÍ¹éÒòÄѶȡ£¡£
https://thehackernews.com/2025/06/rare-werewolf-apt-uses-legitimate.html
2. DanaBot¶ñÒâÈí¼þÎó²î¡°DanaBleed¡±Ì»Â¶ÖÂÆä±»²é
6ÔÂ10ÈÕ£¬£¬2022Äê6Ô¸üÐÂÖУ¬£¬DanaBot¶ñÒâÈí¼þ²Ù×÷ÒýÈëµÄÃûΪ¡°DanaBleed¡±µÄÎó²î£¬£¬µ¼ÖÂÆäÔÚºóÐøÖ´·¨Ðж¯Öб»Ê¶±ð¡¢ÆðËß²¢²ð³ý¡£¡£DanaBotÊÇÒ»¸ö»îÔ¾ÓÚ2018ÄêÖÁ2025ÄêµÄ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Æ½Ì¨£¬£¬³£ÓÃÓÚÒøÐÐڲơ¢Æ¾Ö¤ÍµÇÔ¡¢Ô¶³Ì»á¼ûºÍDDoS¹¥»÷¡£¡£Zscaler ThreatLabzÑо¿Ö°Ô±·¢Ã÷¸ÃÎó²î£¬£¬ÄÚ´æ×ß©ʹËûÃǵÃÒÔÉîÈëÏàʶ¶ñÒâÈí¼þÄÚ²¿²Ù×÷¼°Æä±³ºóÖ°Ô±¡£¡£Ê¹ÓôËÎó²î£¬£¬¹ú¼ÊÖ´·¨²¿·Ö¿ªÕ¹¡°ÖÕ¾ÖÐж¯¡±£¬£¬Ê¹DanaBot»ù´¡ÉèÊ©ÏÂÏߣ¬£¬²¢ÆðË߸ÃÍþв×éÖ¯16Ãû³ÉÔ±¡£¡£DanaBleedÎó²îËæDataBot°æ±¾2380ÒýÈ룬£¬¸Ã°æ±¾ÐÂÔöC2ÐÒ飬£¬µ«ÐÂÐÒéÂß¼±£´æÈõµã£¬£¬Î´ÎªËæ»úÌìÉúµÄÌî³ä×Ö½Ú³õʼ»¯Ð·ÖÅÉÄڴ棬£¬µ¼ÖÂC2ÏìÓ¦°üÀ¨Ð§ÀÍÆ÷ÄÚ´æÖÐÊ£ÓàÊý¾ÝƬ¶Ï£¬£¬ÀàËÆ2014ÄêHeartBleedÎÊÌâ¡£¡£´ËÎó²îʹ´ó×Ú˽ÈËÊý¾Ý̻¶¸øÑо¿Ö°Ô±£¬£¬°üÀ¨ÍþвÐÐΪÕßÏêϸÐÅÏ¢¡¢ºó¶Ë»ù´¡ÉèÊ©¡¢Êܺ¦ÕßÊý¾Ý¡¢¶ñÒâÈí¼þ¸üÐÂÈÕÖ¾¡¢Ë½È˼ÓÃÜÃÜÔ¿¡¢SQLÅÌÎʺ͵÷ÊÔÈÕÖ¾ÒÔ¼°C2ÒDZí°åµÄHTMLºÍWeb½çÃæÆ¬¶ÏµÈ¡£¡£ÈýÄê¶àÀ´£¬£¬DanaBotÒ»Ö±´¦ÓÚÊÜËðģʽ£¬£¬¿ª·¢Ö°Ô±»ò¿Í»§Î´²ì¾õÒÑ̻¶¡£¡£µ±ÍøÂçµ½×ã¹»Êý¾Ýºó£¬£¬Ö´·¨²¿·Ö½ÓÄÉÐж¯£¬£¬Ëä½¹µãÍŶӽö±»ÆðËßδ±»¾Ð²¶£¬£¬µ«Òªº¦C2ЧÀÍÆ÷¡¢650¸öÓòÃûºÍ½ü400ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»²é·â£¬£¬ÔÝʱÏû³ýÁËÍþв¡£¡£Î´À´ÍþвÐÐΪÕßÖØ·µÍøÂç·¸·¨»î¶¯µÄ¿ÉÄÜÐÔ²»´ó£¬£¬ÇÒºÚ¿ÍÉçÇøÐÅÈζȽµµÍ½«³ÉΪÆäÒ»´óÕϰ¡£¡£
https://www.bleepingcomputer.com/news/security/danabot-malware-operators-exposed-via-c2-bug-added-in-2022/
3. FIN6ºÚ¿Í×é֯ð³äÇóÖ°ÕßÈö²¥¶ñÒâÈí¼þ¡°More Eggs¡±
6ÔÂ10ÈÕ£¬£¬Óëµä·¶ÕÐÆ¸Ïà¹ØÉç»á¹¤³Ì¹¥»÷²î±ð£¬£¬FIN6ºÚ¿Í×é֯ð³äÇóÖ°Õߣ¬£¬Ê¹ÓÃÉç»á¹¤³ÌÊÖ¶ÎÈö²¥¶ñÒâÈí¼þ¡£¡£FIN6ÓÖÃû¡°÷¼÷ÃÖ©Ö롱£¬£¬×î³õÒÔ½ðÈÚÚ²ÆÖøÃû£¬£¬ÈçÈëÇÖÏúÊÛµãϵͳÇÔÊØÐÅÓÿ¨ÐÅÏ¢£¬£¬2019ÄêÆð¹¥»÷¹æÄ£À©´óÖÁÀÕË÷Èí¼þ£¬£¬²¢¼ÓÈëRyukºÍLockergogaµÈÐж¯¡£¡£½üÆÚ£¬£¬¸Ã×é֯ʹÓÃÉç»á¹¤³Ì»î¶¯Èö²¥¡°More Eggs¡±£¬£¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ¼´Ð§À͵ÄJavaScriptºóÃÅ£¬£¬ÓÃÓÚÆ¾Ö¤ÍµÇÔ¡¢ÏµÍ³»á¼ûºÍÀÕË÷Èí¼þ°²ÅÅ¡£¡£¹¥»÷Àú³ÌÖУ¬£¬FIN6αװ³ÉÐéαÇóÖ°Õߣ¬£¬Í¨¹ýLinkedInºÍIndeedÓëÕÐÆ¸Ö°Ô±ºÍÈËÁ¦×ÊÔ´²¿·ÖÁªÏµ£¬£¬½¨Éè¹ØÏµºó·¢ËÍ´¹ÂÚÓʼþ¡£¡£Óʼþº¬Ö¸Ïò¡°¼òÀúÍøÕ¾¡±µÄ²»¿Éµã»÷URL£¬£¬ÆÈʹÊÕ¼þÈËÊÖ¶¯ÊäÈ룬£¬ÕâЩÓòÃûͨ¹ýGoDaddyÄäÃû×¢²á²¢ÍйÜÔÚAWSÉÏ¡£¡£FIN6»¹ÔöÌíÇéÐÎÖ¸ÎÆºÍÐÐΪ¼ì²é£¬£¬È·±£Ö»ÓÐÄ¿µÄÄÜ·¿ªÉϰ¶Ò³Ã棬£¬×èÖ¹VPN»òÔÆÅþÁ¬¼°Linux»òmacOS»á¼ûʵÑé¡£¡£ÇкÏÌõ¼þµÄÊܺ¦Õß»áÊÕµ½¼ÙµÄCAPTCHA°ì·¨£¬£¬²¢±»ÌáÐÑÏÂÔØ°üÀ¨Î±×°Windows¿ì½Ý·½·¨Îļþ£¨LNK£©µÄZIPµµ°¸£¬£¬¸ÃÎļþÖ´Ðо籾ÏÂÔØ¡°More Eggs¡±ºóÃÅ¡£¡£¸ÃºóÃÅÓÉ¡°Venom Spider¡±½¨É裬£¬ÊÇÄ£¿£¿£¿é»¯ºóÃÅ£¬£¬ÄÜÖ´ÐÐÏÂÁî¡¢ÇÔȡƾ֤¡¢×ª´ïÌØÊâÓÐÓÃÔØºÉ¼°Ö´ÐÐPowerShell¡£¡£FIN6µÄ¹¥»÷Ëä¼òÆÓµ«ÓÐÓ㬣¬ÒÀÀµÉç»á¹¤³ÌѧºÍ¸ß¼¶ÌÓ±ÜÊÖÒÕ¡£¡£Òò´Ë£¬£¬ÕÐÆ¸Ö°Ô±ºÍÈËÁ¦×ÊÔ´Ô±¹¤Ó¦ÉóÉ÷¿´´ýÉó²é¼òÀúºÍ×÷Æ·¼¯µÄÔ¼Ç룬£¬¹«Ë¾ºÍÕÐÆ¸»ú¹¹Ò²Ó¦×ÔÁ¦È·ÈÏÖ°Ô±Éí·Ý¡£¡£
https://www.bleepingcomputer.com/news/security/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices/
4. HerokuÍ»·¢´óÃæ»ýÖÐÖ¹³¬ÁùСʱ£¬£¬Ö¿ª·¢ÊÜ×èЧÀÍÊÜÓ°Ïì
6ÔÂ10ÈÕ£¬£¬Heroku×÷ΪSalesforceÆìÏÂµÄÆ½Ì¨¼´Ð§ÀÍ£¨PaaS£©£¬£¬ÔÊÐí¿ª·¢Ö°Ô±½«Ó¦ÓóÌÐò°²Åŵ½Ôƶ˶øÎÞÐèÖÎÀí»ù´¡ÉèÊ©£¬£¬µ«¿ËÈÕÔâÓöÁËÒ»Á¬Áù¸ö¶àСʱµÄ´óÃæ»ýÖÐÖ¹¡£¡£´Ë´Îå´»úʼÓÚÖܶþÆÆÏþ£¬£¬Óû§±¨¸æ³ÆHerokuÓ¦ÓÃÎÞ·¨ÔËÐУ¬£¬ÇÒ¿ª·¢Ö°Ô±ÎÞ·¨µÇ¼HerokuÒDZí°å²¢Ê¹ÓÃCLI¹¤¾ß¡£¡£HerokuÔÚÆä×´Ì¬Ò³ÃæÉÏÈÏ¿ÉÁËÕâÒ»ÊÂÎñ£¬£¬²¢ÌåÏÖÕýÔÚÊӲ졣¡£ÖÐÖ¹Ó°ÏìÁËÖڶ๫˾ºÍÕ¾µãµÄЧÀÍ£¬£¬ÀýÈçSolarWindsÒòÎÞ·¨´ÓHeroku»ñÈ¡ÈÕÖ¾¶øÊܵ½²¨¼°¡£¡£Ê¹ÓÃHerokuÓ¦ÓóÌÐòʵÏÖÖÖÖÖ¹¦Ð§µÄÍøÕ¾Ò²Êܵ½Ó°Ï죬£¬²¿·Ö¹¦Ð§ÎÞ·¨Õý³£ÔËÐС£¡£HerokuÉÐδÌṩÓйØÖÐÖ¹»ù´¡Ôµ¹ÊÔÓɵÄÏêϸÐÅÏ¢»òºÎʱ»Ö¸´Ð§ÀÍ£¬£¬²»¹ýÔÚ2025Äê6ÔÂ10ÈÕ£¬£¬SalesforceÌåÏÖûÓÐÖ¤¾ÝÅú×¢´Ë´ÎЧÀÍÖÐÖ¹±£´æ¶ñÒâ»î¶¯£¬£¬²¢ÌṩÁ˿ͻ§¸ú×Ù¸üеÄÁ´½Ó¡£¡£×èÖ¹UTCʱ¼ä21:48:25£¬£¬Heroku×´Ì¬Ò³ÃæÏÔʾÒѽâ¾ödashboard.heroku.comµÄÎÊÌ⣬£¬¿Í»§¿É»á¼û¸ÃÍøÕ¾£¬£¬Í¬Ê±ÎªÈÔÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËͨ¹ýHerokuÏÂÁîÐнçÃæÔËÐеÄÏÂÁî×÷Ϊ½â¾öÒªÁ죬£¬²¢Ç¿µ÷Ó¦Ò»´ÎÖØÆôһ̨²â¹¦»úÒÔ×èֹЧÀÍÖÐÖ¹¡£¡£HerokuÌåÏÖÆäÊÂÇéÖØµãÈÔÊÇÄÚ²¿²âÊÔºÍÑéÖ¤£¬£¬²¢½«¼ÌÐø¹Ø×¢ÆäËû²úÆ·µÄˢУ¬£¬Í¬Ê±ÔÊÐí¾¡¿ìÌṩ½â¾ö¼Æ»®Ê±¼ä±í£¬£¬²¢¶ÔÓÉ´ËÔì³ÉµÄÒ»Á¬À§ÈÅÉî±íǸÒâ¡£¡£
https://www.bleepingcomputer.com/news/technology/massive-heroku-outage-impacts-web-platforms-worldwide/
5. DuplexSpy RATÐÂÐÍľÂíÏÖÉí£¬£¬¿ÉÍêÈ«¿ØÖÆWindowsϵͳ
6ÔÂ9ÈÕ£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷Ò»¿îÃûΪDuplexSpy RATµÄÐÂÐ͸߼¶Ô¶³Ì»á¼ûľÂí£¬£¬¸ÃľÂí¿ÉÈù¥»÷ÕßÖÜÈ«¼à¿ØÓë¿ØÖÆWindowsϵͳ¡£¡£Õâ¿î¶ñÒâÈí¼þ½ÓÄÉC#ÓïÑÔ¿ª·¢£¬£¬¾ß±¸¾«Á·µÄͼÐνçÃæºÍ¿ÉÉèÖÃÑ¡Ï£¬ÏÔÖø½µµÍÁËÍøÂç·¸·¨·Ö×ÓÈëÇÖÄ¿µÄ×°±¸µÄÊÖÒÕÃż÷¡£¡£Æä½ÓÄÉAES-256-CBCºÍRSA-4096Ë«ÖØ¼ÓÃÜËã·¨£¬£¬±£»£»£»£»£»¤ÊÜѬȾÖ÷»úÓëÏÂÁî¿ØÖÆÐ§ÀÍÆ÷¼äµÄͨѶ£¬£¬ÓÐÓùæ±ÜÍøÂç¼ì²â¡£¡£¸ÃRAT×î³õÓÉ¿ª·¢ÕßÒÔ¡°½ÌÓýÓÃ;¡±Ðû²¼ÔÚGitHubÉÏ£¬£¬µ«Æä¶à¹¦Ð§ÐÔºÍÒ×¶¨ÖÆÐÔÎüÒýÁËÍþвÐÐΪÕß¡£¡£DuplexSpy RAT¹¦Ð§ÖÜÈ«£¬£¬²»µ«°üÀ¨¼üÅ̼ͼ¡¢ÊµÊ±ÆÁÄ»²¶»ñµÈ¹Å°åÔ¶³Ì»á¼û¹¦Ð§£¬£¬»¹¾ß±¸ÉãÏñÍ·/Âó¿Ë·ç¼à¿Ø¼°½»»¥Ê½ÏÂÁîÖն˵ȸ߼¶¼à¿ØÄÜÁ¦¡£¡£ÔÚ³¤ÆÚ»¯ÓëÒþ²ØÐÔ·½Ã棬£¬¸ÃľÂí½ÓÄɶà²ãÕ½ÂÔ£¬£¬ÒÔ¡°Windows Update.exe¡±ÎªÎ±×°Ãû³Æ¸´ÖƵ½Óû§Æô¶¯Îļþ¼Ð£¬£¬²¢½¨Éè¶ÔӦע²á±íÏ£¬È·±£ÏµÍ³ÖØÆôºÍÕûÀíʵÑéÖÐÈÔÄÜ´æ»î¡£¡£Í¬Ê±£¬£¬Ëü»¹¾ß±¸¸ß¼¶·´ÆÊÎöÄÜÁ¦£¬£¬Ã¿100ºÁÃë¼à¿ØÏµÍ³Àú³Ì£¬£¬Õë¶ÔÇå¾²¹¤¾ßºÍÆÊÎöÓ¦Ó㬣¬Ò»µ©¼ì²âµ½Çå¾²Èí¼þ£¬£¬±ã»áÖÕÖ¹Ïà¹ØÀú³Ì²¢ÏÔʾÐéα¹ýʧÐÅÏ¢Îóµ¼Óû§¡£¡£±ðµÄ£¬£¬¸ÃRAT½ÓÄÉÎÞÎļþÖ´ÐÐÊÖÒÕ£¬£¬Ö±½Ó½«×ÔÉí¼ÓÔØµ½ÄÚ´æºóɾ³ý´ÅÅÌÔʼ¿ÉÖ´ÐÐÎļþ£¬£¬¼«´óïÔÌÁËȡ֤ºÛ¼£¡£¡£
https://cybersecuritynews.com/new-duplexspy-rat-let-attackers-gain-complete-control/
6. S5 Agency WorldÔâBertÀÕË÷¹¥»÷ÖÂÊý¾Ý±»µÁ
6ÔÂ10ÈÕ£¬£¬´óÐͿڰ¶ÊðÀí»ú¹¹S5 Agency World¿ËÈÕÔâµ½ÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Á˽ü140GBÊý¾Ý£¬£¬²¢½«¸Ã¹«Ë¾Ãû×ÖÐû²¼ÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ£¬£¬ÒÔ´ËÆÈʹS5Ö§¸¶Êê½ð£¬£¬×èÖ¹Êý¾Ýй¶¸ø¹«ÖÚ´øÀ´²»Á¼Ó°Ïì¡£¡£S5×÷Ϊһ¼Òº£ÉÏÔËÊ乫˾£¬£¬ÓªÒµÁýÕÖÈ«Çò360¶à¸ö¿Ú°¶£¬£¬ÔÚº½Ô˹«Ë¾´¬²°Í£¿£¿£¿¿Ê±³äµ±ÍâµØ´ú±í£¬£¬ÆäÔËÓª¶Ôº£ÉÏÔËÊäÖÁ¹ØÖ÷Òª¡£¡£¹¥»÷ÕßÐû²¼Á˼¸ÕžݳƱ»µÁÐÅÏ¢µÄ½ØÍ¼£¬£¬¾Ñо¿ÍŶÓÊӲ죬£¬ÕâЩÊý¾ÝÑù±¾ËƺõÊÇÕýµ±µÄ£¬£¬°üÀ¨¼ì²é±¨¸æ¡¢Ô±¹¤Ð¹ÚÒßÃç½ÓÖÖÇéÐΡ¢²¿·Ö»¤ÕÕ¸´Ó¡¼þµÈ£¬£¬µ«Êý¾ÝÑù±¾ÓÐÏÞ£¬£¬ÏÖʵ»ñÈ¡µÄÎļþ×ÜÁ¿¿ÉÄܸü´ó¡£¡£¹ØÓÚº£ÉÏÔËÊ乫˾¶øÑÔ£¬£¬ÍøÂç¹¥»÷µ¼ÖµÄÍ£»£»£»£»£»ú²»¿É½ÓÊÜ£¬£¬ÓÉÓÚÔËÊäÑÓÎó»áÔì³É¹©Ó¦Á´Æ¿¾±£¬£¬¶Ô¿Í»§Ôì³É¸ºÃæÓ°Ïì¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬BertÀÕË÷Èí¼þÊǸÃÁìÓòµÄгÉÔ±£¬£¬ÓÚ2025Äê4ÔÂÊ״α»·¢Ã÷£¬£¬ÇÒÔڶ̶Ìʱ¼äÄÚÒÑÀֳɹ¥»÷ÁËÊ®¼¸¸ö×éÖ¯¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬BertÀÕË÷Èí¼þÍÅ»ïͨ¹ýÕýµ±Èí¼þ¹©Ó¦Á´Èö²¥¶ñÒâÈí¼þ£¬£¬Í¨³£ÒÔÒ½ÁƱ£½¡ºÍ¿Æ¼¼ÐÐҵΪĿµÄ£¬£¬ÇÒËÆºõºÜÊÇ˳ӦĿ½ñµÄÍøÂç·¸·¨ÐÎÊÆ£¬£¬Î´À´¿ÉÄÜÑÝÄð³É¸ü´óµÄÍþв¡£¡£
https://cybernews.com/security/port-agency-ransomware-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ