°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶

Ðû²¼Ê±¼ä 2025-04-23

1. °Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶


4ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬½ñÄê2Ô £¬£¬£¬£¬£¬£¬°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÏµÍ³ÔâÓöÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬ÊýǧÃûѧÉú¡¢Î÷ϯºÍÖÎÀíÖ°Ô±ÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¡£¡£Öܶþ £¬£¬£¬£¬£¬£¬Ñ§Ð£¹ÙÔ±Ðû²¼Î¥¹æÍ¨Öª £¬£¬£¬£¬£¬£¬ÖÒÑÔ2ÔÂ13ÈÕ±¬·¢µÄÍøÂçÊÂÎñ̻¶ÁËijЩITϵͳ¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ £¬£¬£¬£¬£¬£¬Ò»Ð©Îļþ¿ÉÄÜÒѱ»·¸·¨·Ö×Óй¶ £¬£¬£¬£¬£¬£¬Éæ¼°ÏÖÈκÍǰÈιÍÔ±¡¢×ÔÔ¸ÕߺͳаüÉÌ £¬£¬£¬£¬£¬£¬ÒÔ¼°²»µ½1.5%µÄѧÉú¡£¡£¡£¡£¡£¡£¡£°Í¶ûµÄĦÊй«Á¢Ñ§Ð£¹ÙԱȷÈÏ £¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñΪÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬µ«Î´Ö§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£Ñ§Ð£Î´Í¸Â¶ÏêϸÊÜÓ°ÏìÈËÊý £¬£¬£¬£¬£¬£¬µ«Ö¸³öÊÜÓ°ÏìѧÉúÁè¼Ý1150ÈË¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÔ±¹¤Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂë»ò»¤ÕÕºÅÂë £¬£¬£¬£¬£¬£¬ÒÔ¼°Ñ§Éúͨ»°¼Í¼¡¢È±¿Î¼Í¼»òÉúÓý״̬µÈÎļþ¡£¡£¡£¡£¡£¡£¡£Ñ§Ð£ÏµÍ³Ê×ϯִÐйÙÉ£ÌØÀûÈû˹×Ô¼ºÒ²ÊÜÓ°Ïì £¬£¬£¬£¬£¬£¬ËýÌåÏÖѧУ55%µÄÔ±¹¤Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£ÉÐÓб¨µÀ³Æ £¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»·âÀ´×ÔCloakÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£¡£¡£¡£¡£¡£Ñ§Ð£¹ÙÔ±³Æ £¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼2.5ÍòÈË £¬£¬£¬£¬£¬£¬°üÀ¨7000¶àÃûÏÖÈÎÎ÷ϯÒÔ¼°×Ô2010ÄêÒÔÀ´ÔÚ¸ÃÑ§ÇøÊÂÇéµÄËùÓÐÈË¡£¡£¡£¡£¡£¡£¡£Ö´·¨²¿·ÖÒѽӵ½Í¨Öª £¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾Ð­Öú»Ö¸´¡£¡£¡£¡£¡£¡£¡£Ñ§Ð£ÒÑ×îÏÈÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ £¬£¬£¬£¬£¬£¬ÌṩÁ½ÄêÐÅÓÃ¼à¿ØÐ§ÀÍ £¬£¬£¬£¬£¬£¬²¢ÉèÁ¢ºô½ÐÖÐÐĽâ´ðÎÊÌâ¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/baltimore-public-schools-data-breach-ransomware


2. Âêɯ°Ù»õÔâÍøÂç¹¥»÷ £¬£¬£¬£¬£¬£¬µ¼ÖÂÖ÷¹Ë¶©µ¥ÑÓ³Ù


4ÔÂ22ÈÕ £¬£¬£¬£¬£¬£¬Ó¢¹ú¿ç¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷ £¬£¬£¬£¬£¬£¬¶ÔÆäÔËÓªÔì³ÉÒ»¶¨×ÌÈÅ £¬£¬£¬£¬£¬£¬ÓÈÆäÊÇClick and Collect¶©µ¥ÏµÍ³¡£¡£¡£¡£¡£¡£¡£Âêɯ°Ù»õÔÚÈ«ÇòÓµÓÐ1400¶à¼ÒÃÅµê £¬£¬£¬£¬£¬£¬Ô±¹¤×ÜÊý´ï6.4ÍòÃû £¬£¬£¬£¬£¬£¬ÒÔÏúÊÛ´ò°ç¡¢Ê³ÎïºÍ¼Ò¾ÓÓÃÆ·µÈ¶àÑù»¯²úÆ·¶øÖøÃû¡£¡£¡£¡£¡£¡£¡£ÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÐû²¼µÄÐÂΟåÖÐ £¬£¬£¬£¬£¬£¬Âêɯ°Ù»õ֤ʵÁË´Ë´ÎÍøÂçÇå¾²ÊÂÎñ £¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú £¬£¬£¬£¬£¬£¬ÒÔÖÎÀíÏ¢Õù¾öÕâÒ»½ôÆÈÇéÐΡ£¡£¡£¡£¡£¡£¡£¹«Ë¾ÒѽÓÄÉС¹æÄ£ÔÝʱµ÷½â²½·¥±£»£»£»¤Ö÷¹ËºÍÓªÒµÇå¾² £¬£¬£¬£¬£¬£¬²¢¶Ô´ËÔì³ÉµÄδ±ãÉî±íǸÒâ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÃæÁÙÌôÕ½ £¬£¬£¬£¬£¬£¬Âêɯ°Ù»õµÄÃÅµê¡¢ÍøÕ¾ºÍÓ¦ÓóÌÐòÈÔÔÚÕý³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑÔ¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊÓ²ì £¬£¬£¬£¬£¬£¬²¢½ÓÄɲ½·¥½øÒ»²½±£»£»£»¤ÆäÍøÂç £¬£¬£¬£¬£¬£¬È·±£¿£¿£¿£¿£¿Í»§Ð§ÀͲ»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£Âêɯ°Ù»õÒÑ֪ͨÊý¾Ý±£»£»£»¤¼àÊÓ»ú¹¹ºÍ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ £¬£¬£¬£¬£¬£¬µ«Î´Ìá¹©ÍøÂçÊÂÎñµÄÏêϸϸ½Ú¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÀÕË÷Èí¼þÍÅ»ï»òÆäËûÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ £¬£¬£¬£¬£¬£¬µ«Èô´Ë´Î¹¥»÷Éæ¼°ÀÕË÷Èí¼þ £¬£¬£¬£¬£¬£¬Êý¾ÝºÜ¿ÉÄÜÒѱ»ÍµÈ¡ £¬£¬£¬£¬£¬£¬²¢¿ÉÄܱ»ÓÃ×÷½øÒ»²½Ê©Ñ¹¹«Ë¾Ö§¸¶ÀÕË÷½ðµÄ³ïÂë¡£¡£¡£¡£¡£¡£¡£Âêɯ°Ù»õÒÑÏòÊÜÓ°Ïì¿Í»§ÖÂǸ £¬£¬£¬£¬£¬£¬²¢ÔÊÐí¾¡¿ì»Ö¸´Õý³£Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/marks-and-spencer-confirms-a-cyberattack-as-customers-face-delayed-orders/


3. SK TelecomÔâ¶ñÒâÈí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬¿Í»§USIMÐÅÏ¢ÃæÁÙΣº¦


4ÔÂ22ÈÕ £¬£¬£¬£¬£¬£¬º«¹ú×î´óÒÆ¶¯ÔËÓªÉÌSK Telecom¿ËÈÕÔâÓöÍøÂç¹¥»÷ £¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÈí¼þѬȾ»ñÈ¡Á˿ͻ§Ãô¸ÐµÄUSIMÏà¹ØÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚÍâµØÊ±¼ä2025Äê4ÔÂ19ÈÕÐÇÆÚÁùÍíÉÏ11µã £¬£¬£¬£¬£¬£¬ÕýÖµÖÜÄ©ÇÒ´ó¶¼×éÖ¯ÈËÊÖȱ·¦Ö®¼Ê¡£¡£¡£¡£¡£¡£¡£SK TelecomѸËÙÏìÓ¦ £¬£¬£¬£¬£¬£¬ÔÚ·¢Ã÷¶ñÒâÈí¼þºóÁ¬Ã¦É¾³ý²¢¸ôÀëÁËÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ £¬£¬£¬£¬£¬£¬ÉÐδȷÈÏй¶ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒýÆðÁ˺«¹ú»¥ÁªÍøÇå¾²¾Ö£¨KISA£©ºÍ¸Ã¹úСÎÒ˽¼ÒÐÅÏ¢±£»£»£»¤Î¯Ô±»áµÄ¸ß¶È¹Ø×¢ £¬£¬£¬£¬£¬£¬ÊÓ²ìÕýÔÚ¾ÙÐÐÖÐ £¬£¬£¬£¬£¬£¬ÈëÇÖµÄÏêϸԵ¹ÊÔ­ÓÉ¡¢¹æÄ£»£»£»ò¹æÄ£ÉÐδȷ¶¨¡£¡£¡£¡£¡£¡£¡£USIMÊý¾Ý°üÀ¨¹ú¼ÊÒÆ¶¯Óû§Ê¶±ðÂë¡¢ÒÆ¶¯Õ¾ISDNºÅÂëµÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÒ»µ©Ð¹Â¶ £¬£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÓÐÕë¶ÔÐԵļàÊÓ¡¢¸ú×ÙºÍSIM¿¨½»Á÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´Î¹¥»÷ £¬£¬£¬£¬£¬£¬SK TelecomÒÑÔöÇ¿¶ÔUSIM½»Á÷ºÍÒì³£Éí·ÝÑé֤ʵÑéµÄ×èÖ¹ £¬£¬£¬£¬£¬£¬²¢½«Á¬Ã¦ÔÝÍ£Óë¿ÉÒɻÏà¹ØµÄÕË»§Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬£¬£¬½¨ÒéÓû§Í¨¹ýÖ¸¶¨ÃÅ»§×¢²áUSIM±£»£»£»¤Ð§ÀÍ £¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâÊÖ»úºÅÂë±»²»·¨ÒÆÖ²µ½ÁíÒ»ÕÅSIM¿¨ÉÏ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬ÉÐÎÞÍþвÐÐΪÕ߶Դ˴ι¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/


4. Active! MailÁãÈÕÎó²îÔâÆð¾¢Ê¹Óà £¬£¬£¬£¬£¬£¬ÈÕ±¾¶à»ú¹¹ÊÜÓ°Ïì


4ÔÂ22ÈÕ £¬£¬£¬£¬£¬£¬Active! Mail±£´æÑÏÖØÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-42599 £¬£¬£¬£¬£¬£¬CVSS v3ÆÀ·Ö9.8£© £¬£¬£¬£¬£¬£¬Õý±»Æð¾¢Ê¹ÓÃÓÚÕë¶ÔÈÕ±¾´óÐÍ×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìËùÓа汾Active! £¬£¬£¬£¬£¬£¬°üÀ¨ËùÓÐÊÜÖ§³Ö²Ù×÷ϵͳƽ̨Éϵġ°BuildInfo£º6.60.05008561¡± £¬£¬£¬£¬£¬£¬ÈôÔ¶³ÌµÚÈý·½·¢ËͶñÒâÇëÇó £¬£¬£¬£¬£¬£¬Ôò¿ÉÄÜÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾øÐ§ÀÍÌõ¼þ¡£¡£¡£¡£¡£¡£¡£Active!mail×÷Ϊ»ùÓÚÍøÂçµÄµç×ÓÓʼþ¿Í»§¶Ë £¬£¬£¬£¬£¬£¬ËäÔÚÈ«Çò¹æÄ£ÄÚ²»ÈçGmail»òOutlookÆÕ±éʹÓà £¬£¬£¬£¬£¬£¬µ«ÔÚÈÕ±¾´óÐÍÆóÒµ¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÒøÐеÄÈÕÓïÇéÐÎÖг£±»ÓÃ×÷Ⱥ¼þ×é¼þ £¬£¬£¬£¬£¬£¬Òѱ»Áè¼Ý2,250¸ö×éÖ¯½ÓÄÉ £¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý11,000,000¸öÕÊ»§ £¬£¬£¬£¬£¬£¬ÊǸùúÉÌÒµÍøÂçÓʼþÊг¡µÄÖ÷Òª¼ÓÈëÕß¡£¡£¡£¡£¡£¡£¡£ÈÕ±¾CERTÒÑÈ·ÈϸÃÎó²î´¦ÓÚ»îԾʹÓÃ״̬ £¬£¬£¬£¬£¬£¬²¢±Þ²ßËùÓÐÓû§¾¡¿ì¸üÐÂÖÁActive!Mail 6 BuildInfo: 6.60.06008562¡£¡£¡£¡£¡£¡£¡£ÈÕ±¾ÍøÂçÍйܺÍITЧÀÍÌṩÉÌKagoya Japan¼°WADAX¾ù±¨¸æÁËÒòÊÔͼʹÓøÃÎó²îÔì³ÉµÄЧÀÍÖÐÖ¹ £¬£¬£¬£¬£¬£¬²¢ÒÑÔÝʱ×èÖ¹Active!ÓʼþЧÀÍ¡£¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬MacnicaÇå¾²Ñо¿Ô±Ö¸³ö £¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐ227̨̻¶ÔÚ»¥ÁªÍøÉϵÄActive!ЧÀÍÆ÷¿ÉÄÜÊܵ½¹¥»÷ £¬£¬£¬£¬£¬£¬ÆäÖÐ63̨ÔÚ´óѧʹÓᣡ£¡£¡£¡£¡£¡£ÈÕ±¾CERTΪÎÞ·¨Á¬Ã¦Ó¦ÓÃÇå¾²¸üеÄÓû§Ìá³öÁËÏêϸ»º½â²½·¥ £¬£¬£¬£¬£¬£¬ÒÔÓ¦¶Ô´ËÎó²î´øÀ´µÄÍþв¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/


5. ÀÕË÷Èí¼þÖÂÁ½Ò½ÁƱ£½¡×éÖ¯Êý¾Ýй¶ £¬£¬£¬£¬£¬£¬³¬24ÍòÈËÊÜÓ°Ïì


4ÔÂ22ÈÕ £¬£¬£¬£¬£¬£¬½üÆÚ £¬£¬£¬£¬£¬£¬Á½¼ÒÒ½ÁƱ£½¡×éÖ¯Ïà¼ÌÈ·ÈÏÔÚÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó·ºÆðÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬Ó°ÏìÈËÊý¾ùÁè¼Ý10Íò¡£¡£¡£¡£¡£¡£¡£Î»ÓÚÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ±´¶û¾È»¤³µ¹«Ë¾ £¬£¬£¬£¬£¬£¬ÔÚ2025Äê2ÔÂ13ÈÕ¼ì²âµ½ÍøÂçÈëÇÖ £¬£¬£¬£¬£¬£¬ºÚ¿Í»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¼°¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢µÄÎļþ £¬£¬£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ £¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁË114,000ÈË¡£¡£¡£¡£¡£¡£¡£ÃÀ¶ÅɯÀÕË÷Èí¼þ×éÖ¯Ðû³Æ´Ó±´¶û¾È»¤³µÇÔÈ¡ÁËÁè¼Ý200GBµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÁíÒ»¼ÒÊÜÓ°ÏìµÄÒ½ÁƱ£½¡×éÖ¯ÊÇλÓÚ°¢À­°ÍÂíÖݲ®Ã÷º²µÄÑÛ¿ÆÕïËù°¢À­°ÍÂíÑÛ¿ÆÐ­»á¡£¡£¡£¡£¡£¡£¡£¸ÃÕïËùÓÚ4ÔÂ10ÈÕ͸¶ £¬£¬£¬£¬£¬£¬ÏÖÓкÍÒÔǰ»¼ÕßµÄСÎÒ˽¼Ò¼°Êܱ£»£»£»¤¿µ½¡ÐÅÏ¢Ô⵽й¶ £¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ1ÔÂ30ÈÕ·¢Ã÷ÍøÂçÎó²î £¬£¬£¬£¬£¬£¬ºÚ¿Í×Ô1ÔÂ22ÈÕÆð¼´¿É»á¼ûÆäϵͳ¡£¡£¡£¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ £¬£¬£¬£¬£¬£¬¾ÝÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ £¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý131,000ÈË¡£¡£¡£¡£¡£¡£¡£È¥Äê £¬£¬£¬£¬£¬£¬ÃÀ¹ú±¬·¢ÁË700¶àÆðÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬Ð¹Â¶µÄ¼Í¼×ÜÊýÁè¼Ý1.8ÒÚÌõ¡£¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/


6. Elusive CometºÚ¿Í×é֯ʹÓÃZoomʵÑéÉç»á¹¤³Ì¹¥»÷


4ÔÂ22ÈÕ £¬£¬£¬£¬£¬£¬½üÆÚ £¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Elusive Comet¡±µÄºÚ¿Í×éÖ¯Õë¶Ô¼ÓÃÜÇ®±ÒÓû§ÌᳫÉç»á¹¤³Ì¹¥»÷ £¬£¬£¬£¬£¬£¬Í¨¹ýZoomµÄÔ¶³Ì¿ØÖƹ¦Ð§ÓÕÆ­Óû§ÊÚÓèÆä»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£¸Ã×é֯ģÄâLazarusºÚ¿Í×éÖ¯ÔÚ15ÒÚÃÀÔªBybit¼ÓÃÜÇ®±Ò͵ÇÔ°¸ÖÐʹÓõÄÊÖÒÕ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±ÊÂÇéÁ÷³ÌʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵĿþÀÜÕË»§»òµç×ÓÓʼþ £¬£¬£¬£¬£¬£¬ÒÔ¡°Åí²©¼ÓÃÜÇ®±Ò¡±²É·ÃÔ¼ÇëΪ»Ï×Ó £¬£¬£¬£¬£¬£¬Ïò¸ß¼ÛֵĿµÄ·¢ËÍCalendlyÁ´½Ó £¬£¬£¬£¬£¬£¬°²ÅÅZoom¾Û»á¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÔ¼ÇëÁ´½ÓÕæÊµÓÐÓà £¬£¬£¬£¬£¬£¬½µµÍÁËÄ¿µÄµÄÏÓÒÉˮƽ¡£¡£¡£¡£¡£¡£¡£ÔÚZoomͨ»°Ê±´ú £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÌᳫÆÁÄ»¹²Ïí»á»° £¬£¬£¬£¬£¬£¬²¢½«ÆäZoomÏÔʾÃû³ÆÖØÃüÃûΪ¡°Zoom¡± £¬£¬£¬£¬£¬£¬Ê¹Êܺ¦ÕßÎóÒÔΪÇëÇóÀ´×ÔÓ¦ÓóÌÐò×Ô¼º £¬£¬£¬£¬£¬£¬´Ó¶øÅú×¼Ô¶³Ì¿ØÖÆÇëÇ󡣡£¡£¡£¡£¡£¡£Ò»µ©»ñµÃ¿ØÖÆÈ¨ £¬£¬£¬£¬£¬£¬¹¥»÷Õß±ã¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢×°ÖöñÒâÈí¼þ¡¢»á¼ûÎļþ»òÌᳫ¼ÓÃÜÉúÒâ¡£¡£¡£¡£¡£¡£¡£ËûÃÇ»¹¿ÉÄÜѸËÙÖ²ÈëÒþÃØºóÃÅ £¬£¬£¬£¬£¬£¬½¨É賤ÆÚ»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬ÒÔ±ãÈÕºóʹÓᣡ£¡£¡£¡£¡£¡£Trail of Bits¹«Ë¾Ö¸³ö £¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄȨÏÞ¶Ô»°¿òÓëÆäËûÎÞº¦µÄZoom֪ͨÏàËÆ £¬£¬£¬£¬£¬£¬Óû§¿ÉÄÜÔÚ²»ÏàʶЧ¹ûµÄÇéÐÎÏÂÊÚÓèÅÌËã»úÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£Îª·ÀÓù´ËÀàÍþв £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾½¨ÒéʵÑéϵͳ¹æÄ£µÄÒþ˽ƫºÃÕ½ÂÔ¿ØÖÆÉèÖÃÎļþ £¬£¬£¬£¬£¬£¬±ÜÃâ¿É»á¼ûÐÔ»á¼û £¬£¬£¬£¬£¬£¬²¢½¨ÒéÇå¾²Òªº¦ÐÍÇéÐκʹ¦Öóͷ£Ãû¹óÊý×Ö×ʲúµÄ×éÖ¯ÍêÈ«ÒÆ³ýZoom¿Í»§¶Ë £¬£¬£¬£¬£¬£¬ÒÔ½µµÍΣº¦¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-abuse-zoom-remote-control-feature-for-crypto-theft-attacks/