MathWorksÅû¶ÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬£¬ITϵͳ¼°¶àÓ¦ÓÃÊÜÓ°Ïì

Ðû²¼Ê±¼ä 2025-05-29

1. MathWorksÅû¶ÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬£¬ITϵͳ¼°¶àÓ¦ÓÃÊÜÓ°Ïì


5ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬×ܲ¿Î»ÓÚÂíÈøÖîÈûÖÝÄɵٿ˵ÄÊýѧÅÌËãÈí¼þ¹«Ë¾MathWorksÖÜÒ»ÔÚÆäÍøÕ¾¸üÐÂÖÐÅû¶ÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£MathWorksÒÔ½¨ÉèMATLABÅÌËãÆ½Ì¨ºÍSimulink·ÂÕæ¶øÖøÃû£¬£¬ £¬£¬£¬£¬±»ÖÚ¶à×éÖ¯ºÍ¿Í»§ÆÕ±éʹÓᣡ£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷Ó°ÏìÁËÆäITϵͳ£¬£¬ £¬£¬£¬£¬×Ô5ÔÂ18ÈÕÆð£¬£¬ £¬£¬£¬£¬²¿·Ö¿Í»§Ê¹ÓõÄÔÚÏßÓ¦ÓóÌÐòÒÔ¼°Ô±¹¤Ê¹ÓõÄijЩÄÚ²¿ÏµÍ³¾ù±äµÃ²»¿ÉÓᣡ£¡£¡£5ÔÂ18ÈÕ£¬£¬ £¬£¬£¬£¬MathWorksÊ×´ÎÐû²¼¸üУ¬£¬ £¬£¬£¬£¬Ö¸³ö¶à¸öÓ¦ÓóÌÐò±£´æÎÊÌ⣬£¬ £¬£¬£¬£¬²¢ÕýÔÚÆÀ¹ÀÓ°ÏìºÍÊÓ²ìÔµ¹ÊÔ­ÓÉ¡£¡£¡£¡£ÔÚ½ÓÏÂÀ´µÄ°Ë´Î¸üÐÂÖУ¬£¬ £¬£¬£¬£¬¹«Ë¾¾ùÌåÏÖÕýÔÚ¼ÌÐøÊӲ졣¡£¡£¡£Ö±µ½5ÔÂ20ÈÕ£¬£¬ £¬£¬£¬£¬¹«Ë¾±¨¸æ³ÆThingSpeakÒ²±»Ìí¼Óµ½ÊÜÓ°ÏìÓ¦ÓóÌÐòÁбíÖС£¡£¡£¡£5ÔÂ21ÈÕ£¬£¬ £¬£¬£¬£¬MathWorksÐÞ¸´ÁËÕÊ»§µ¥µãµÇ¼ºÍ¶àÒòËØÉí·ÝÑéÖ¤¹¦Ð§£¬£¬ £¬£¬£¬£¬µ«Í¬Ê±Ö¸³öCloud CenterºÍMATLAB MobileÊÇÊÜÓ°ÏìµÄÓ¦ÓóÌÐò¡£¡£¡£¡£5ÔÂ23ÈÕ£¬£¬ £¬£¬£¬£¬¹«Ë¾ÔٴθüУ¬£¬ £¬£¬£¬£¬ÌåÏÖMathWorksÕÊ»§Ð§ÀÍÖÊÁ¿Ï½µ£¬£¬ £¬£¬£¬£¬Óû§ÎÞ·¨½¨ÉèÐÂÕÊ»§£¬£¬ £¬£¬£¬£¬ÇÒ×Ô2024Äê10ÔÂÒÔÀ´Î´µÇ¼µÄÓû§½«ÎÞ·¨µÇ¼£¬£¬ £¬£¬£¬£¬Á½²½ÑéÖ¤¹¦Ð§Ò²Ö»ÄܼäЪÐÔÊÂÇé¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬²¿·ÖÊÜÓ°ÏìµÄϵͳÒѻָ´ÉÏÏߣ¬£¬ £¬£¬£¬£¬ÆäËûϵͳÔòÔÚÍøÂçÇ徲ר¼ÒµÄЭÖúϾÙÐд¦Öóͷ£¡£¡£¡£¡£MathWorksÕýÔÚ¼ÌÐøÊÓ²ì´Ë´Î¹¥»÷£¬£¬ £¬£¬£¬£¬²¢Æð¾¢½â¾öÓ¦ÓóÌÐòÖз¢Ã÷µÄÎÊÌ⣬£¬ £¬£¬£¬£¬ÈçMATLAB¼°ÆäÔÆÖÐÐĵÄÎÊÌâ¡£¡£¡£¡£¹«Ë¾Òѽ«´Ë´Î¹¥»÷¼û¸æÁª°îÖ´·¨»ú¹¹£¬£¬ £¬£¬£¬£¬µ«ÉÐδ͸¶¹¥»÷ϸ½Ú£¬£¬ £¬£¬£¬£¬ÏÖÔÚÒ²ÉÐÎÞÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£


https://www.darkreading.com/vulnerabilities-threats/mathworks-confirms-ransomware-attack


2. AyySSHush½©Ê¬ÍøÂçÈëÇÖ9000¶à¸ö»ªË¶Â·ÓÉÆ÷


5ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬Áè¼Ý9000̨»ªË¶Â·ÓÉÆ÷ÔâÊÜÃûΪ¡°AyySSHush¡±µÄÐÂÐͽ©Ê¬ÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬¸Ã½©Ê¬ÍøÂ绹¶Ô˼¿Æ¡¢D - LinkºÍLinksysµÄSOHO·ÓÉÆ÷Ìᳫ¹¥»÷¡£¡£¡£¡£2025Äê3ÔÂÖÐÑ®£¬£¬ £¬£¬£¬£¬GreyNoiseÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÕâÒ»»î¶¯¡£¡£¡£¡£´Ë´Î¹¥»÷ÊֶζàÑù£¬£¬ £¬£¬£¬£¬Á¬Ïµ±©Á¦ÆÆ½âµÇ¼ƾ֤¡¢ÈƹýÉí·ÝÑéÖ¤ºÍʹÓþÉÎó²îÀ´Î£º¦»ªË¶Â·ÓÉÆ÷£¬£¬ £¬£¬£¬£¬Éæ¼°RT-AC3100¡¢RT-AC3200ºÍRT-AX55µÈÐͺ𣡣¡£¡£¹¥»÷ÕßʹÓÃCVE-2023-39780¾ÉÏÂÁî×¢ÈëÎó²îÌí¼Ó×Ô¼ºµÄSSH¹«Ô¿£¬£¬ £¬£¬£¬£¬²¢ÆôÓÃSSHÊØ»¤Àú³Ì¼àÌý·Ç±ê×¼TCP¶Ë¿Ú53282£¬£¬ £¬£¬£¬£¬ÕâÖÖÐÞ¸ÄÈÃÍþвÐÐΪÕßÔÚÖØÆôºÍ¹Ì¼þ¸üмäÈÔ±£´æ¶Ô×°±¸µÄºóÃÅ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬Çҹ̼þÉý¼¶ºó´ËÉèÖøü¸ÄÈԻᱣ´æ¡£¡£¡£¡£¹¥»÷Òþ²Ø£¬£¬ £¬£¬£¬£¬²»Éæ¼°¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬»¹¹Ø±ÕÈÕÖ¾¼Í¼ºÍÇ÷ÊÆ¿Æ¼¼µÄAiProtectionÒÔÌӱܼì²â¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬¡°AyySSHush¡±Ïêϸ²Ù×÷Ä¿µÄ²»Ã÷£¬£¬ £¬£¬£¬£¬µ«¸Ã»î¶¯ËƺõÔÚÇÄÇĹ¹½¨ºóõè¾¶ÓÉÆ÷ÍøÂ磬£¬ £¬£¬£¬£¬ÎªÎ´À´½©Ê¬ÍøÂçµÓÚ¨»ù´¡¡£¡£¡£¡£Îª±£»£»£»£»£»¤»ªË¶Â·ÓÉÆ÷£¬£¬ £¬£¬£¬£¬»ªË¶ÒÑÐû²¼Õë¶ÔÊÜÓ°Ïì·ÓÉÆ÷µÄCVE-2023-39780Çå¾²¸üУ¬£¬ £¬£¬£¬£¬Ðû²¼Ê±¼äÒòÐͺŶøÒì¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ìÉý¼¶¹Ì¼þ£¬£¬ £¬£¬£¬£¬ÔÚ¡°authorized_keys¡±ÎļþÉϲéÕÒ¿ÉÒÉÎļþºÍ¹¥»÷ÕßµÄSSHÃÜÔ¿¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/botnet-hacks-9-000-plus-asus-routers-to-add-persistent-ssh-backdoor/


3. ÐÂÐÍPumaBot½©Ê¬ÍøÂçÃé×¼Linux IoT×°±¸


5ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬»ùÓÚǶÈëʽLinuxµÄÎïÁªÍø£¨IoT£©×°±¸ÕýÔâÊÜÐÂÐͽ©Ê¬ÍøÂçPumaBot¹¥»÷¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓÉGoÓïÑÔ±àд£¬£¬ £¬£¬£¬£¬Õë¶ÔSSHЧÀÍʵÑ鱩Á¦ÆÆ½â¹¥»÷ÒÔÀ©´ó¹æÄ££¬£¬ £¬£¬£¬£¬²¢ÏòÊÜѬȾÖ÷»úͶµÝÆäËû¶ñÒâÈí¼þ¡£¡£¡£¡£Æä²»Ö±½ÓɨÃ軥ÁªÍø£¬£¬ £¬£¬£¬£¬¶øÊÇ´ÓÏÂÁî¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷»ñȡĿµÄÁбíºóʵÑ鱩Á¦ÆÆ½âSSHƾ֤£¬£¬ £¬£¬£¬£¬ÀÖ³ÉÈëÇÖºó»áÎüÊÕÔ¶³ÌÖ¸Áͨ¹ýϵͳЧÀÍÎļþ½¨É賤ÆÚ»¯×¤Áô¡£¡£¡£¡£PumaBotͨ¹ýÕë¶Ô¿ª·ÅSSH¶Ë¿ÚµÄIPµØµãÁбíʵÑ鱩Á¦ÆÆ½â»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬Ä¿µÄIPÁбí´ÓÍⲿЧÀÍÆ÷»ñÈ¡¡£¡£¡£¡£ÔÚ±©Á¦ÆÆ½âʱ£¬£¬ £¬£¬£¬£¬¶ñÒâ³ÌÐò»á¼ì²éÄ¿µÄϵͳÊÊÓÃÐÔ¼°ÊÇ·ñΪÃÛ¹ÞÇéÐΣ¬£¬ £¬£¬£¬£¬»¹»á¼ì²âÌØ¶¨¼à¿ØÉãÏñÍ·ÖÆÔìÉÌÃû³Æ×Ö·û´®£¬£¬ £¬£¬£¬£¬Åú×¢¹¥»÷Õß¿ÉÄÜÓÐÕë¶ÔÐÔ¡£¡£¡£¡£ÈëÇÖÀֳɺ󣬣¬ £¬£¬£¬£¬¶ñÒâÈí¼þÍøÂçϵͳÐÅÏ¢»Ø´«ÖÁC2ЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬½¨É賤ÆÚ»¯»úÖÆ²¢Ö´ÐÐÖ¸Áî¡£¡£¡£¡£Ëüαװ³ÉÕýµ±RedisϵͳÎļþ£¬£¬ £¬£¬£¬£¬ÔÚsystemdĿ¼½¨Éè¿´ËÆÕýµ±µÄЧÀÍÎļþ£¬£¬ £¬£¬£¬£¬ÒÔµÖÓùÏµÍ³ÖØÆô¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬½©Ê¬ÍøÂçÖ´ÐеÄÖ¸Áî°üÀ¨²»·¨¼ÓÃÜÇ®±ÒÍÚ¿óÏà¹ØÏÂÁ£¬ £¬£¬£¬£¬ÌåÏÖ±»¿Ø×°±¸±»ÓÃÓÚÍڿ󡣡£¡£¡£ËÝÔ´ÆÊÎö·¢Ã÷£¬£¬ £¬£¬£¬£¬¸ÃÐж¯»¹°²ÅÅÁËddaemonµÈ¹ØÁª×é¼þ£¬£¬ £¬£¬£¬£¬°üÀ¨»ùÓÚGoµÄºóÃųÌÐò¡¢SSH±©Á¦ÆÆ½â¹¤¾ß¡¢ÏÂÔØ¾ç±¾µÈ£¬£¬ £¬£¬£¬£¬¸÷×é¼þЭͬʵÏÖ¶ñÒ⹦Ч£¬£¬ £¬£¬£¬£¬ÈçÇÔȡƾ֤¡¢Íâ´«ÐÅÏ¢µÈ¡£¡£¡£¡£


https://thehackernews.com/2025/05/new-pumabot-botnet-targets-linux-iot.html


4. LexisNexis Risk SolutionsÅû¶Êý¾Ýй¶ÊÂÎñ


5ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬LexisNexis Risk Solutions£¨LNRS£©³ÉΪ×îÐÂÅû¶ÑÏÖØÍøÂç¹¥»÷²¢ÖÂÊý¾Ý±»µÁµÄ×ÅÃû»ú¹¹£¬£¬ £¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÈËÊý´ï364,333ÈË¡£¡£¡£¡£¾Ý·¢Ë͸øÊÜÓ°ÏìСÎÒ˽¼ÒµÄ֪ͨÐÅ£¬£¬ £¬£¬£¬£¬2024Äê12ÔÂ25ÈÕ£¬£¬ £¬£¬£¬£¬Ò»¸ö¡°Î´¾­ÊÚȨµÄÒ»·½¡±»á¼ûÁ˵ÚÈý·½Èí¼þ¿ª·¢Æ½Ì¨²¢ÇÔÈ¡ÁËLNRSÊý¾Ý¡£¡£¡£¡£¸Ã¹«Ë¾ÌṩÊý¾ÝÆÊÎö¡¢Ïàʶ¿Í»§¼°Î£º¦ÖÎÀí¶´²ìµÈ²úÆ·£¬£¬ £¬£¬£¬£¬ÓÚ2025Äê4ÔÂ1ÈÕ¼ì²âµ½ÈëÇÖ£¬£¬ £¬£¬£¬£¬²»¹ýÆä×ÔÉíÍøÂç»òϵͳδÊÜÓ°Ïì¡£¡£¡£¡£LNRSÔÚÉùÃ÷Öгƣ¬£¬ £¬£¬£¬£¬ÊÕµ½Î´ÖªµÚÈý·½±¨¸æºó£¬£¬ £¬£¬£¬£¬ÐÅÏ¢Çå¾²ÍŶÓÓëȡ֤¹«Ë¾Ð­ÉÌÕö¿ªÊӲ죬£¬ £¬£¬£¬£¬È·ÈÏGitHubÖÐÉúÑĵIJ¿·ÖÊý¾Ý±»»ñÈ¡£¡£¡£¡£¬£¬ £¬£¬£¬£¬²¿·ÖÈí¼þ¹¹¼þ¼°Ð¡ÎÒ˽¼ÒÐÅÏ¢Ôâ»á¼û¡£¡£¡£¡£¸Ã¹«Ë¾Ôö²¹£¬£¬ £¬£¬£¬£¬²ÆÎñ¡¢ÐÅÓÿ¨»òÆäËûÃô¸ÐСÎÒ˽¼ÒÐÅϢδ±»»á¼û£¬£¬ £¬£¬£¬£¬ÇÒÆäϵͳ¡¢»ù´¡ÉèÊ©ºÍ²úƷδÊÜ¡°Ë𺦡±¡£¡£¡£¡£LNRSÒÑ֪ͨԼ36ÍòÃûÊÜÓ°ÏìÖ°Ô±¼°¡°Ïà¹Øî¿Ïµ»ú¹¹¡±£¬£¬ £¬£¬£¬£¬²¢½«ÊÂÎñ±¨¸æ¸øÖ´·¨²¿·Ö¡£¡£¡£¡£±»µÁÊý¾Ý°üÀ¨Ãû×Ö¡¢µç»°ºÅÂë¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂëºÍ³öÉúÈÕÆÚµÈ¡£¡£¡£¡£¸Ã»ú¹¹ÖÂСÎÒ˽¼ÒµÄÐżþÖ¸³ö£¬£¬ £¬£¬£¬£¬ÎÊÌⱬ·¢ºó£¬£¬ £¬£¬£¬£¬Á¬Ã¦ÔÚÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÏÂÊӲ죬£¬ £¬£¬£¬£¬Í¨ÖªÖ´·¨²¿·Ö£¬£¬ £¬£¬£¬£¬²¢½ÓÄɲ½·¥Éó²éºÍÔöÇ¿Çå¾²¿ØÖÆ¡£¡£¡£¡£Í¬Ê±ÌáÐÑÊÜÓ°ÏìСÎÒ˽¼ÒСÐÄڲƭºÍÉí·Ý͵ÇÔ£¬£¬ £¬£¬£¬£¬½¨ÒéÉó²éÕË»§±¨±í¡¢¼à¿ØÃâ·ÑÐÅÓñ¨¸æ£¬£¬ £¬£¬£¬£¬²¢¼û¸æÃÀ¹ú¹«ÃñÿÄêÓÐȨ»ñµÃÒ»·ÝÃâ·ÑÐÅÓñ¨¸æ£¬£¬ £¬£¬£¬£¬»¹¿Éͨ¹ýExperian»ñµÃ24¸öÔÂÉí·Ý±£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿Ø¡£¡£¡£¡£


https://www.theregister.com/2025/05/28/attack_on_lexisnexis_risk_solutions/


5. InterlockÀÕË÷ÍÅ»ïÕë¶Ô½ÌÓý»ú¹¹°²ÅÅÐÂÐÍNodeSnake RAT


5ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬InterlockÀÕË÷Èí¼þÍÅ»ïÕýÕë¶Ô½ÌÓý»ú¹¹°²ÅÅÒ»ÖÖ´Ëǰδ¼Í¼µÄÔ¶³Ì»á¼ûľÂíNodeSnake£¬£¬ £¬£¬£¬£¬ÒÔ»ñÈ¡¶ÔÆóÒµÍøÂçµÄÒ»Á¬»á¼û¡£¡£¡£¡£Ñо¿Ö°Ô±±¨¸æ³Æ£¬£¬ £¬£¬£¬£¬2025Äê1ÔºÍ3Ô£¬£¬ £¬£¬£¬£¬ÖÁÉÙÓÐÁ½ÆðÕë¶ÔÓ¢¹ú´óѧµÄ¹¥»÷°¸ÀýÖз¢Ã÷ÁËNodeSnakeµÄ°²ÅÅ£¬£¬ £¬£¬£¬£¬ÇÒÁ½¸ö¶ñÒâÈí¼þÑù±¾²î±ðÏÔÖø£¬£¬ £¬£¬£¬£¬Åú×¢¸ÃľÂíÕý±»Æð¾¢¿ª·¢ÒÔÔöÌíй¦Ð§¡£¡£¡£¡£Interlockͨ¹ýЯ´ø¶ñÒâÁ´½Ó»ò¸½¼þµÄÍøÂç´¹ÂÚµç×ÓÓʼþÈö²¥NodeSnake RAT¡£¡£¡£¡£¸ÃJavaScript¶ñÒâÈí¼þʹÓÃNodeJSÖ´ÐУ¬£¬ £¬£¬£¬£¬Í¨¹ý±àдÃûΪ¡°ChromeUpdater¡±µÄÓÕÆ­ÐÔ×¢²á±íÏîÀ´Ã°³äGoogle Chrome¸üгÌÐòÒÔ½¨É賤ÆÚÐÔ¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬ £¬£¬£¬£¬¶ñÒâÈí¼þ×÷Ϊ×ÔÁ¦ºǫ́Àú³ÌÔËÐУ¬£¬ £¬£¬£¬£¬ÎļþÃûºÍÓÐÓÃÔØºÉËæ»úÃüÃû£¬£¬ £¬£¬£¬£¬C2µØµãÒÔËæ»úÑÓ³ÙÑ­»·£¬£¬ £¬£¬£¬£¬»¹¾ßÓдúÂë»ìÏý¡¢Òì»ò¼ÓÃܼ°¿ØÖÆÌ¨¸Ä¶¯µÈÌØÕ÷£¬£¬ £¬£¬£¬£¬ÇÒÅþÁ¬Í¨¹ýCloudflareÊðÀíÓò·ÓÉ¡£¡£¡£¡£Ò»µ©¼¤»î£¬£¬ £¬£¬£¬£¬NodeSnake»áÍøÂçÒªº¦ÔªÊý¾Ý²¢Ð¹Â¶¸øC2£¬£¬ £¬£¬£¬£¬»¹ÄÜɱËÀÀú³Ì»ò¼ÓÔØÌØÊâÓÐÓøºÔØ£¬£¬ £¬£¬£¬£¬½ÏеıäÖÖ¿ÉÖ´ÐÐCMDÏÂÁî²¢¶¯Ì¬¸ü¸ÄC2ÂÖѯÐÐΪ£¬£¬ £¬£¬£¬£¬ÔÊÐíʵʱShell½»»¥¡£¡£¡£¡£NodeSnakeµÄ±£´æ¼°ÆäÒ»Á¬Éú³¤Åú×¢InterlockÔÚÒ»Ö±Éú³¤ÇÒ×¢ÖØºã¾ÃÒþÉí³¤ÆÚÐÔ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/


6. Dark PartnersʹÓÃÐéαÈí¼þÏÂÔØÍø·¢¶¯È«Çò¼ÓÃÜ͵ÇÔ¹¥»÷


5ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬Dark PartnersÍþвÐÐΪÕßÕýʹÓÃÖØ´óÐéαÈí¼þÏÂÔØÍøÕ¾ÍøÂçÔÚÈ«Çò·¢¶¯¼ÓÃÜ͵ÇÔ¹¥»÷¡£¡£¡£¡£ÕâЩ¿ËÂ¡ÍøÕ¾Î±×°³ÉÈÈÃÅÓ¦Ó㬣¬ £¬£¬£¬£¬ÌṩPoseiden£¨macOS£©ºÍLumma£¨Windows£©µÈÐÅÏ¢ÇÔÈ¡³ÌÐò¼°ÀàËÆPaydayµÄ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐò£¬£¬ £¬£¬£¬£¬ÓÃÓÚÇÔÈ¡¼ÓÃÜÇ®±ÒºÍÃô¸ÐÊý¾Ý£¬£¬ £¬£¬£¬£¬ÈçÖ÷»úÐÅÏ¢¡¢Æ¾Ö¤¡¢Ë½Ô¿»òCookie£¬£¬ £¬£¬£¬£¬ÕâЩÊý¾Ý»ò½«ÔÚÍøÂç·¸·¨Êг¡ÉϳöÊÛ¡£¡£¡£¡£ÔÚWindowsÉÏ£¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßʹÓöà¼Ò¹«Ë¾Ö¤Êé¶Ô¶ñÒâÈí¼þ¹¹½¨Êý×ÖÊðÃû£¬£¬ £¬£¬£¬£¬ÆäÖÐÉæ¼°PayDay Loader£»£»£»£»£»Lumma Stealer×÷ΪÐÅÏ¢ÇÔÈ¡³ÌÐòÖ®Ò»£¬£¬ £¬£¬£¬£¬Òѱ»Ö´·¨²¿·Öµ·»Ù²¿·Ö»ù´¡ÉèÊ©¡£¡£¡£¡£ÔÚmacOSÉÏ£¬£¬ £¬£¬£¬£¬Í¶·ÅµÄPoseidon StealerʹÓÃ×Ô½ç˵DMGÆô¶¯Æ÷£¬£¬ £¬£¬£¬£¬Õë¶ÔFirefoxºÍ»ùÓÚChromiumµÄÍøÂçä¯ÀÀÆ÷¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±g0njxaÖ¸³ö£¬£¬ £¬£¬£¬£¬Dark Partnersͨ¹ýÄ£ÄâÖÁÉÙ37¸öÓ¦ÓóÌÐòºÍ¹¤¾ßµÄ¼òÆÓÍøÕ¾ÌṩÐÅÏ¢ÇÔÈ¡Õߣ¬£¬ £¬£¬£¬£¬ÕâÐ©ÍøÕ¾Öв¿·ÖʹÓÃÌìÉúʽAIÊÖÒÕ¡£¡£¡£¡£ÐéÎ±ÍøÕ¾ÁÐ±íº­¸Ç¼ÓÃÜÓ¦Óá¢VPNЧÀÍ¡¢Ö§¸¶Æ½Ì¨¡¢3D½¨Ä£Ó¦Óõȡ£¡£¡£¡£Éϰ¶Ò³ÃæÒ×ʶ±ð£¬£¬ £¬£¬£¬£¬½öÌṩÏÂÔØ°´Å¥ÇÒ¹²Ïí×Ô½ç˵¡°ÆÚ´ýÎļþÏÂÔØ¡±¿ò¼Ü¡£¡£¡£¡£ÔÚÌṩ¶ñÒâÈí¼þǰ£¬£¬ £¬£¬£¬£¬ÍøÕ¾»á¼ì²é»úеÈËÏÂÔØ²¢·¢ËÍÓû§ÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬Poseidon Stealer¿ÉÍøÂçä¯ÀÀÆ÷Êý¾Ý£¬£¬ £¬£¬£¬£¬°üÀ¨»ùÓÚChromiumµÄä¯ÀÀÆ÷¼°Ç®°üÀ©Õ¹Êý¾Ý£¬£¬ £¬£¬£¬£¬»¹×¨ÃÅÕë¶Ô¶à¸ö×ÀÃæÓ¦ÓóÌÐòµÄÇ®°üÎļþ¼Ð¡£¡£¡£¡£PayDay LoaderÊÇWindowsרÓöñÒâÓ¦Ó㬣¬ £¬£¬£¬£¬ÓÃÓÚת´ïÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬ £¬£¬£¬£¬Óз´É³ºÐÄ£¿£¿£¿é£¬£¬ £¬£¬£¬£¬Ê¹ÓûìÏýº¯Êý¼ìË÷C2ЧÀÍÆ÷µØµã£¬£¬ £¬£¬£¬£¬½¨É賤ÆÚÐÔÀú³ÌÖØ´ó¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dark-partners-cybercrime-gang-fuels-large-scale-crypto-heists/