ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01й¶Óû§Êý¾Ý

Ðû²¼Ê±¼ä 2025-10-17

1. ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01й¶Óû§Êý¾Ý


10ÔÂ15ÈÕ£¬£¬£¬ £¬£¬£¬È¥ÖÐÐÄ»¯ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01Ðû³ÆÌṩ¸ßÇå¾²ÐÔWebRTCЧÀÍ£¬£¬£¬ £¬£¬£¬È´ÒòδÊܱ£»£»£»£»¤µÄKafka BrokerʵÀýµ¼Ö´ó¹æÄ£Óû§Êý¾Ýй¶¡£¡£¡£¡£¡£¡£Ñо¿ÍŶӷ¢Ã÷£¬£¬£¬ £¬£¬£¬¸Ãƽ̨ÓÃÓÚ´«ÊäʵʱÈÕÖ¾µÄKafka BrokerδÆôÓÃÉí·ÝÑéÖ¤¡¢¼ÓÃÜ»ò»á¼û¿ØÖÆ£¬£¬£¬ £¬£¬£¬Ì»Â¶ÁË2025Äê8ÔÂ13ÈÕÖÁ26ÈÕʱ´ú³¬621,000ÌõʵʱÈÕÖ¾ÌõÄ¿£¬£¬£¬ £¬£¬£¬º­¸ÇÓû§µç×ÓÓʼþ¡¢IPµØµã¡¢¼ÓÃÜÇ®°üµØµã£¨Ö§³Ö±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈÇø¿éÁ´£©¡¢Í¨»°¼ÓÈë¼Í¼¡¢¹ú¼Ò¡¢Ê±¼ä¡¢Ê±³¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÒÔÃ÷ÎÄÐÎʽʵʱ´«Ê䣬£¬£¬ £¬£¬£¬ÈκεÚÈý·½¾ù¿ÉÎÞÕϰ­»á¼û¡£¡£¡£¡£¡£¡£Ö»¹ÜHuddle01ÔÚÓ¦ÓÃÊÐËÁÉùÃ÷¡°²»ÍøÂç»ò¹²ÏíÓû§Êý¾Ý¡±£¬£¬£¬ £¬£¬£¬ÇÒÒþ˽Õþ²ßÇ¿µ÷¡°È¥ÖÐÐÄ»¯Í¨Ñ¶ÖеÄÊý¾Ý͸Ã÷ÓëÓû§¿ØÖÆ¡±£¬£¬£¬ £¬£¬£¬µ«ÏÖʵ̻¶µÄÊý¾ÝÏÔʾÆä±£´æÑÏÖØÇå¾²Îó²î¡£¡£¡£¡£¡£¡£Æ½Ì¨ÓÉÃÀ¹úÌØÀ­»ªÖÝGraphene01 Labs¿ª·¢£¬£¬£¬ £¬£¬£¬ÔÚGoogle PlayÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬ £¬£¬£¬iOS¶Ëƽ¾ùÆÀ·Ö4.7ÐÇ£¬£¬£¬ £¬£¬£¬ÉîÊܼÓÃÜÇ®±Òϲ»¶ÕßÇàíù¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬Çø¿éÁ´¼¯³É·´¶ø¼Ó¾çÁËΣº¦£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓÃй¶µÄÇ®°üµØµã¹ØÁªÕæÊµÉí·Ý£¬£¬£¬ £¬£¬£¬»æÖÆÓû§¹ØÏµÍ¼£¬£¬£¬ £¬£¬£¬½ø¶øÊµÑ龫׼´¹ÂÚ¹¥»÷»òÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/video-call-app-huddle01-leaks-sensitive-user-data/


2. CISA½ôÆÈ¸üÐÂKEVĿ¼£ºAdobeÓëSKYSEAÎó²îÔâ×Ô¶¯Ê¹ÓÃ


10ÔÂ16ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÓÚ¿ËÈÕ½«Á½¸öÑÏÖØÇå¾²Îó²îÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬ £¬£¬£¬Í¹ÏÔÄ¿½ñÍøÂçÇå¾²ÍþвµÄ½ôÆÈÐÔ¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬ £¬£¬£¬Ó°ÏìAdobe Experience Manager£¨AEM£©µÄCVE-2025-54253Îó²î±»ÆÀ¶¨Îª×î¸ßÑÏÖØÐÔÆ·¼¶£¨CVSS 10.0£©£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÔ´ÓÚAEM Forms JEE 6.5.23.0¼°¸üÔç°æ±¾Öб£´æÎ´ÂÄÀúÖ¤µÄ/adminui/debug servlet¶Ëµã£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓô˶˵ãÌá½»¶ñÒâOGNL±í´ïʽ£¬£¬£¬ £¬£¬£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÖ´ÐÐí§ÒâϵͳÏÂÁî¡£¡£¡£¡£¡£¡£AdobeÒÑÓÚ2025Äê8ÔÂÐû²¼µÄ6.5.0-0108°æ±¾ÖÐÐÞ¸´´ËÎó²î£¬£¬£¬ £¬£¬£¬Í¬Ê±ÐÞ¸´µÄÉÐÓÐCVSS 8.6·ÖµÄCVE-2025-54254¡£¡£¡£¡£¡£¡£Ö»¹ÜAdobeÈϿɱ£´æ¹ûÕæ¿´·¨ÑéÖ¤£¬£¬£¬ £¬£¬£¬µ«ÏÖʵ¹¥»÷ϸ½ÚÉÐδÅû¶¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê11ÔÂ5ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£ÁíÒ»ÔòÖ÷Òª¸üÐÂÉæ¼°SKYSEA Client ViewµÄCVE-2016-7836Îó²î£¨CVSS 9.8·Ö£©£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÔ´ÓÚÉí·ÝÑéÖ¤»úÖÆÈ±ÏÝ£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÖÎÀí¿ØÖÆÌ¨µÄTCPÅþÁ¬Ô¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£ÈÕ±¾Îó²î˵Ã÷£¨JVN£©ÔÚ2016Äêµ×µÄÇ徲ͨ¸æÖÐÃ÷È·Ö¸³ö£¬£¬£¬ £¬£¬£¬Ò°ÍâÒѼì²âµ½Õë¶Ô´ËÎó²îµÄ¹¥»÷ÐÐΪ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html


3. ËÕ¸»±ÈÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬¿Í»§Ãô¸ÐÐÅÏ¢ÔâÇÔÈ¡


10ÔÂ16ÈÕ£¬£¬£¬ £¬£¬£¬È«Çò×ÅÃûÒÕÊõÆ·ÅÄÂôÐÐËÕ¸»±È¿ËÈÕת´ïÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˿ͻ§Ãô¸ÐÐÅÏ¢£¬£¬£¬ £¬£¬£¬°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂ루SSN£©¼°½ðÈÚÕË»§ÏêÇé¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ2025Äê7ÔÂ24ÈÕ±»·¢Ã÷£¬£¬£¬ £¬£¬£¬¾­ÓÉÁ½¸öÔµÄÏêϸÊӲ죬£¬£¬ £¬£¬£¬¹«Ë¾·½È·Èϱ»µÁÊý¾ÝÀàÐͼ°ÊÜÓ°ÏìСÎÒ˽¼Ò¹æÄ£¡£¡£¡£¡£¡£¡£×÷ΪȫÇòÁìÏȵĸ߼ÛÖµÎïÆ·ÅÄÂôÐÐÓë×ʲúÖ§³Ö´û¿îЧÀÍÉÌ£¬£¬£¬ £¬£¬£¬ËÕ¸»±ÈÿÄê´¦Öóͷ£ÊýÊ®ÒÚÃÀÔªÅÄÂôÉúÒ⣬£¬£¬ £¬£¬£¬2024Äê×ÜÏúÊÛ¶î´ï60ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£´Ë´Îй¶ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬ £¬£¬£¬Æ¾Ö¤ÏòÃÀ¹úÃåÒòÖÝÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþ£¬£¬£¬ £¬£¬£¬ÒÑÈ·ÈϰüÀ¨ÃåÒòÖݺÍÂ޵µºÖÝÔÚÄڵIJ¿·Ö¿Í»§ÐÅÏ¢Ôâ²»·¨»ñÈ¡£¬£¬£¬ £¬£¬£¬µ«ÏêϸÊÜÓ°Ïì×ÜÈËÊýÉÐδÍêÈ«Åû¶¡£¡£¡£¡£¡£¡£ËÕ¸»±ÈÔÚ֪ͨÖÐÇ¿µ÷£¬£¬£¬ £¬£¬£¬ÊÂÎñ±¬·¢ºóÁ¬Ã¦Æô¶¯ÖÜÈ«ÊӲ죬£¬£¬ £¬£¬£¬Í¨¹ýÊý¾ÝÉó²éÈ·¶¨ÐÅϢй¶¹æÄ£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ £¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎΣ»£»£»£»ú£¬£¬£¬ £¬£¬£¬ËÕ¸»±ÈΪÊÜÓ°Ïì¿Í»§Ìṩµ÷½â²½·¥£ºÍ¨¹ýTransUnionÌṩΪÆÚ12¸öÔµÄÃâ·ÑÉí·Ý±£»£»£»£»¤ÓëÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬ £¬£¬£¬¿Í»§ÐèÔÚ90ÌìÄÚÍê³É×¢²á¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/auction-giant-sothebys-says-data-breach-exposed-customer-information/


4. ProsperÔâ´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬ £¬£¬£¬1760ÍòÓû§ÐÅÏ¢±»ÇÔ


10ÔÂ16ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹úµã¶Ôµã½è´ûƽ̨ProsperÅû¶Æäϵͳ9ÔÂ2ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬£¬µ¼ÖÂÁè¼Ý1760ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°¿Í»§¼°´û¿îÉêÇëÈ˵ÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡¢ÐÕÃû¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅ¡¢¾Íҵ״̬¡¢ÐÅÓÃÆÀ·Ö¡¢ÊÕÈëˮƽ¡¢³öÉúÈÕÆÚ¡¢ÏÖʵµØµã¡¢IPµØµã¼°ä¯ÀÀÆ÷Óû§ÊðÀíÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£Ö»¹ÜProsperÌåÏÖÉÐδ·¢Ã÷¹¥»÷Õß»ñÈ¡¿Í»§ÕË»§»ò×ʽð»á¼ûȨÏÞµÄÖ¤¾Ý£¬£¬£¬ £¬£¬£¬µ«È·ÈÏÉñÃØÊý¾ÝÒÑͨ¹ýδ¾­ÊÚȨÅÌÎʹ«Ë¾Êý¾Ý¿âµÄ·½·¨±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£×÷Ϊ½¨ÉèÓÚ2005ÄêµÄÀÏÅÆ½ðÈÚÆ½Ì¨£¬£¬£¬ £¬£¬£¬ProsperÒÑ×ÊÖú³¬200Íò¿Í»§Íê³É³¬300ÒÚÃÀÔª´û¿îÉúÒâ¡£¡£¡£¡£¡£¡£±¾´ÎÇå¾²Îó²îδӰÏìÆäÃæÏò¿Í»§µÄÒ»Ñùƽ³£ÔËÓª£¬£¬£¬ £¬£¬£¬¹«Ë¾ÒÑÏòî¿Ïµ²¿·ÖºÍÖ´·¨»ú¹Ø±¨°¸£¬£¬£¬ £¬£¬£¬²¢Æô¶¯ÁªºÏÊӲ졣¡£¡£¡£¡£¡£ProsperÇ¿µ÷£¬£¬£¬ £¬£¬£¬ÊÓ²ìÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬£¬£¬ £¬£¬£¬ÔÚÈ·¶¨ÏêϸÊÜÓ°ÏìÊý¾Ý¹æÄ£ºó£¬£¬£¬ £¬£¬£¬½«ÏòÊÜÓ°ÏìÓû§ÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬Êý¾Ýй¶֪ͨЧÀÍHave I Been Pwned£¨HIBP£©Åû¶ÊÂÎñÓ°Ïì¹æÄ£´ï1760Íò¸öΨһµç×ÓÓʼþµØµã£¬£¬£¬ £¬£¬£¬µ«Prosper½²»°ÈËÌåÏÖ¡°ÎÞ·¨ÑéÖ¤¡±¸ÃÊý¾ÝµÄ׼ȷÐÔ£¬£¬£¬ £¬£¬£¬²¢ÖØÉ깫˾ÈÔÔÚºËʵÏêϸÊÜÓ°ÏìÊý¾Ý¼°ËùÓÐÕßÉí·Ý¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-prosper-data-breach-impacting-176-million-accounts/


5. Ó¡¶ÈNetcoreCloudЧÀÍÆ÷ÉèÖùýʧÖÂ400ÒÚÌõÃô¸ÐÊý¾Ýй¶


10ÔÂ16ÈÕ£¬£¬£¬ £¬£¬£¬Ó¡¶ÈÈ«Çòµç×ÓÓʼþÓªÏúÓë×Ô¶¯»¯ÆóÒµNetcoreCloudÒòЧÀÍÆ÷ÉèÖùýʧ£¬£¬£¬ £¬£¬£¬µ¼Ö°üÀ¨400ÒÚÌõ¼Í¼¡¢×ܼÆ13.4TBµÄÃô¸ÐÊý¾Ýй¶£¬£¬£¬ £¬£¬£¬Éæ¼°È«Çò¿Í»§µç×ÓÓʼþ¡¢ÄÚ²¿ÏêϸÐÅÏ¢¼°ÊÖÒÕÉèÖõȽ¹µãÊý¾Ý¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÔÚ¹ûÕæÊý¾Ý¿âÖз¢Ã÷¸ÃÎó²î£¬£¬£¬ £¬£¬£¬Êý¾Ý¿âδ¼ÓÃÜÇÒδÊܱ£»£»£»£»¤£¬£¬£¬ £¬£¬£¬ÈκλñÈ¡IPµØµãÕß¾ù¿É»á¼ûº£Á¿ÓʼþͨѶ¼Í¼£¬£¬£¬ £¬£¬£¬°üÀ¨Ò½ÁƱ£½¡Í¨Öª¡¢ÒøÐл¾¯±¨¡¢¾ÍÒµÏà¹ØÓʼþ¼°²¿·ÖÕË»§ÊÖÒÕÐÅÏ¢£¨ÈçIPµØµã¡¢SMTPÉèÖã©£¬£¬£¬ £¬£¬£¬²¿·Ö¼Í¼ÉõÖÁ±ê¼ÇΪÉñÃØ¡£¡£¡£¡£¡£¡£NetcoreCloud×ܲ¿Î»ÓÚÓ¡¶ÈÃÏÂò£¬£¬£¬ £¬£¬£¬Îª40¸ö¹ú¼Ò/µØÇøµÄ6500Óà¸öÆ·ÅÆÌṩµç×ÓÓʼþ¼°×Ô¶¯»¯Ð§ÀÍ£¬£¬£¬ £¬£¬£¬ÁýÕÖµçÉÌ¡¢½ðÈÚ¡¢Ã½Ìå¡¢ÂÃÓεÈÐÐÒµ¡£¡£¡£¡£¡£¡£Fowler·¢Ã÷ºóÁ¬Ã¦Í¨Öª¸Ã¹«Ë¾£¬£¬£¬ £¬£¬£¬Êý¾Ý¿âÓÚµ±ÈÕ±»½ôÆÈ±£»£»£»£»¤²¢ÏÞÖÆ»á¼û¡£¡£¡£¡£¡£¡£Netcore»ØÓ¦³Æ½«¿ªÕ¹ÄÚ²¿Éó²é£¬£¬£¬ £¬£¬£¬µ«ÏÖÔÚÈÔ±£´æÈý´óÒɵ㣺й¶Êý¾Ý¿âÓÉNetcoreÖ±½ÓÖÎÀí»òµÚÈý·½ÍйÜδÃ÷£»£»£»£»Êý¾Ý̻¶ʱ³¤¼°ÊÇ·ñ±»¶ñÒâ»á¼ûδȷÈÏ£»£»£»£»ÊÇ·ñÓÐÆäËûÖ÷ÌåÏÂÔØ»ò¸´ÖÆÊý¾ÝÐèͨ¹ý·¨ÎñÉó¼ÆºËʵ¡£¡£¡£¡£¡£¡£


https://hackread.com/misconfigured-netcorecloud-server-40-billion-records/


6. ³¯ÏʺڿÍʹÓÃEtherHidingÔÚÇø¿éÁ´ÉÏÒþ²Ø¶ñÒâÈí¼þ


10ÔÂ16ÈÕ£¬£¬£¬ £¬£¬£¬³¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯UNC5342×Ô2025Äê2ÔÂÆð£¬£¬£¬ £¬£¬£¬ÔÚÕë¶ÔÈí¼þ¼°ÍøÂ翪·¢Ö°Ô±µÄÉç»á¹¤³Ì¹¥»÷ÖУ¬£¬£¬ £¬£¬£¬Ê״νÓÄÉÃûΪ"EtherHiding"µÄÇø¿éÁ´ÖÇÄܺÏÔ¼¶ñÒâÈí¼þÈö²¥ÊÖÒÕ¡£¡£¡£¡£¡£¡£¸ÃÊÖÒÕÓÉGuardio LabsÓÚ2023ÄêÌá³ö£¬£¬£¬ £¬£¬£¬Í¨¹ý½«¶ñÒâÔØºÉǶÈë±Ò°²ÖÇÄÜÁ´»òÒÔÌ«·»µÄÖÇÄܺÏÔ¼ÖУ¬£¬£¬ £¬£¬£¬ÊµÏֵͱ¾Ç®¡¢¸ßÄäÃûÐԵĶñÒâÈí¼þÍйÜÓ붯̬¸üС£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÒÔÐéαÇóÖ°ÃæÊÔΪÓÕ¶ü£¬£¬£¬ £¬£¬£¬ÓÉαÔìʵÌ壨ÈçBlockNovas LLC¡¢Angeloper Agency£©Ìᳫ¡£¡£¡£¡£¡£¡£Êܺ¦ÕßÔÚÊÖÒÕÆÀ¹À»·½Ú±»ÓÕÆ­Ö´ÐÐJavaScriptÏÂÔØ³ÌÐò£¬£¬£¬ £¬£¬£¬¸Ã³ÌÐòͨ¹ýÖÇÄܺÏÔ¼ÓëÒÔÌ«·»½»»¥£¬£¬£¬ £¬£¬£¬»ñÈ¡°üÀ¨InvisibleFerretÌØ¹¤Èí¼þJS°æ±¾µÄµÚÈý½×¶ÎÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£Çø¿éÁ´ÌØÕ÷ʹ¹¥»÷¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬£¬£¬ £¬£¬£¬Í¨¹ýÖ»¶ÁŲÓûñÈ¡ÔØºÉ²»ÁôÉúÒâ¼Í¼£¬£¬£¬ £¬£¬£¬Òþ²ØÐÔ¼«Ç¿£»£»£»£»Æä¶þ£¬£¬£¬ £¬£¬£¬ºÏÔ¼ÔÚǰËĸöÔ¸üг¬20´Î£¬£¬£¬ £¬£¬£¬Ã¿´Î½öÐè1.37ÃÀÔªgas·Ñ£¬£¬£¬ £¬£¬£¬Ö§³Ö¿ìËÙÎÞаµ÷½â£»£»£»£»ÆäÈý£¬£¬£¬ £¬£¬£¬¶àÁ´Ê¹ÓÃÅú×¢³¯ÏʺڿÍÍŶӱ£´æ²Ù×÷¸ôÀë¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÔÚÄÚ´æÖÐÔËÐУ¬£¬£¬ £¬£¬£¬¿É¶¯Ì¬¼ÓÔØÆ¾Ö¤ÇÔȡģ¿£¿ £¿£¿é£¬£¬£¬ £¬£¬£¬Ä¿µÄÖ±Ö¸Chrome¡¢EdgeµÈä¯ÀÀÆ÷µÄÃÜÂë¡¢ÐÅÓÿ¨¼°¼ÓÃÜÇ®°üÊý¾Ý¡£¡£¡£¡£¡£¡£ÆäÏÂÁî¿ØÖÆ£¨C2£©Í¨µÀÖ§³ÖÖ´ÐÐí§ÒâÏÂÁî¡¢ZIPѹËõÎļþÍâйÖÁTelegramµÈ²Ù×÷¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-etherhiding-to-hide-malware-on-the-blockchain/