ÐÂÐÍCrocodilus¶ñÒâÈí¼þÇÔÈ¡AndroidÓû§¼ÓÃÜÇ®°üÃÜÔ¿
Ðû²¼Ê±¼ä 2025-03-311. ÐÂÐÍCrocodilus¶ñÒâÈí¼þÇÔÈ¡AndroidÓû§¼ÓÃÜÇ®°üÃÜÔ¿
3ÔÂ30ÈÕ£¬£¬£¬£¬Ð·¢Ã÷µÄAndroidÒøÐжñÒâÈí¼þ"Crocodilus"ͨ¹ýÕûºÏÉç»á¹¤³Ìѧ¹¥»÷Óë¸ß¼¶ÉøÍ¸ÊÖÒÕ£¬£¬£¬£¬Õ¹ÏÖ³ö¶Ô¼ÓÃÜÇ®±ÒÇ®°ü¼°½ðÈÚÕË»§µÄÑÏÖØÍþв¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃרÓÐÖ²ÈëÆ÷ÈÆ¹ýAndroid 13¼°ÒÔÉϰ汾µÄÇå¾²»úÖÆ£¬£¬£¬£¬Í¨¹ý¶ñÒâÍøÕ¾¡¢É罻ڲƻòµÚÈý·½Ó¦ÓÃÊÐËÁʵÑé³õʼѬȾ¡£¡£¡£Æä¹¥»÷Á´µÄ½¹µãÔÚÓÚÓÕµ¼Óû§Ð¹Â¶¼ÓÃÜÇ®°üµÄ"ÖÖ×Ó¶ÌÓï"£¬£¬£¬£¬¹¥»÷Õßͨ¹ýαÔìϵͳÖÒÑÔ½çÃæ£¬£¬£¬£¬±Þ²ßÓû§ÔÚ12СʱÄÚ±¸·ÝÇ®°üÃÜÔ¿£¬£¬£¬£¬ÊµÔòʹÓø¨Öú¹¦Ð§Ð§ÀͼÍÈÎÃü»§ÊäÈëÐÅÏ¢£¬£¬£¬£¬½ø¶øÍêÈ«¿ØÖÆÊý×Ö×ʲú¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬Crocodilus¾ß±¸ÍêÕûµÄRAT£¨Ô¶³Ì»á¼ûľÂí£©¹¦Ð§£¬£¬£¬£¬¿ÉʵÑé23Ïî×°±¸¿ØÖÆÖ¸Á£¬£¬£¬°üÀ¨×èµ²¶ÌÐÅ¡¢¸Ä¶¯ÈÏÖ¤Æ÷½ØÍ¼ÇÔȡ˫ÒòËØÁîÅÆ¡¢ÁýÕÖÆÁÄ»½çÃæÍµÈ¡ÒøÐÐÆ¾Ö¤µÈ¡£¡£¡£ÆäÌØÊâÄÜÁ¦ÔÚÓÚ¼¤»îºÚÆÁ¾²Ä¬Ä£Ê½Òþ²Ø¹¥»÷ÐÐΪ£¬£¬£¬£¬Í¬Ê±ÀÄÓø¨Öú¹¦Ð§Ð§ÀÍÍ»ÆÆÎÞÕϰȨÏÞÏÞÖÆ¡£¡£¡£Ä¿½ñ¹¥»÷Ä¿µÄ¼¯ÖÐÓÚÍÁ¶úÆäºÍÎ÷°àÑÀµÄ½ðÈÚÓû§£¬£¬£¬£¬µ«Ä£¿£¿£¿£¿£¿é»¯Éè¼ÆÌåÏÖÆä¾ß±¸¿ìËÙÀ©Õ¹¹¥»÷ÃæµÄDZÁ¦¡£¡£¡£Ç徲ר¼Ò½¨ÒéÓû§Ó¦ÑÏ¿á×ñÕÕ¹Ù·½Ó¦ÓÃÊÐËÁÏÂÔØÔÔò£¬£¬£¬£¬¼á³ÖPlay Protectʵʱ·À»¤£¬£¬£¬£¬²¢¶ÔÒªÇóÌṩÃô¸ÐÐÅÏ¢µÄÒ쳣ϵͳÌáÐѼá³ÖСÐÄ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-crocodilus-malware-steals-android-users-crypto-wallet-keys/
2. Oracle Health¾ÉЧÀÍÆ÷ÔâÈëÇÖÖÂÃÀ¶à¼ÒÒ½Ôº»¼ÕßÊý¾Ýй¶
3ÔÂ28ÈÕ£¬£¬£¬£¬×ÅÃûÒ½ÁÆÐÅÏ¢»¯Ð§ÀÍÉÌOracle Health£¨Ç°ÉíΪCerner£©È·ÈÏÆäÒÅÁôЧÀÍÆ÷ÔâδÊÚȨ»á¼û£¬£¬£¬£¬µ¼Ö¶à¼ÒÃÀ¹úÒ½ÁÆ»ú¹¹»¼ÕßÊý¾Ýй¶¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬¹¥»÷ÕßʹÓÃй¶µÄ¿Í»§Æ¾Ö¤ÓÚ2025Äê1ÔÂÈëÇÖδǨáãÖÁOracle CloudµÄ¾É°æCernerЧÀÍÆ÷£¬£¬£¬£¬ÇÔÈ¡ÁË¿ÉÄܰüÀ¨µç×Ó¿µ½¡¼Í¼£¨EHR£©µÄÃô¸ÐÐÅÏ¢¡£¡£¡£Ö»¹ÜOracleÔÚ˽ÃÜ֪ͨÖнö±íÊöΪ"²¿·ÖÊý¾ÝÊÜÓ°Ïì"£¬£¬£¬£¬µ«¶à¸öÐÂÎÅԴ֤ʵ»¼ÕßÐÅϢȷÒѱ»µÁ¡£¡£¡£´Ë´ÎÊÂÎñ̻¶OracleÔÚΣ»£»£»£»£»ú´¦Öóͷ£ÖеÄ͸Ã÷¶Èȱ·¦£ºÊÜÓ°ÏìÒ½ÔºÊÕµ½µÄ֪ͨ½ÓÄÉͨË×°×Ö½¶ø·Ç¹Ù·½Ðż㣬£¬£¬£¬ÇÒ¹«Ë¾Î´¹ûÕæÈÏ¿ÉÇ徲Υ¹æ¡£¡£¡£¸üÒý·¢¹Ø×¢µÄÊÇ£¬£¬£¬£¬ÍþвÐÐΪÕß"°²µÂ³"ͨ¹ýÃ÷ÍøÍøÕ¾ÊµÑéÀÕË÷£¬£¬£¬£¬ÒªÇóÊý°ÙÍòÃÀÔª¼ÓÃÜÇ®±ÒÒÔ×èÖ¹Êý¾Ý¹ûÕæ£¬£¬£¬£¬Æä¹¥»÷ÊÖ·¨ÓëÒÑÖªÀÕË÷ÍÅ»ïÎÞ¹ØÁª¡£¡£¡£Ò½ÁÆ»ú¹¹±»ÆÈ×ÔÐÐÆÀ¹ÀÊÇ·ñÎ¥·´HIPAA¹æÔò²¢¼ç¸º»£»£»£»£»¼Õß֪ͨÔðÈΣ¬£¬£¬£¬¶øOracle½öÌṩÓÐÏÞÐÖúÄ£°åºÍÓöÈÅâ³¥¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬£¬£¬¹¥»÷Õß½«ÍµÈ¡Êý¾Ý×ªÒÆÖÁÔ¶³ÌЧÀÍÆ÷£¬£¬£¬£¬Æä×÷°¸ÊÖ·¨Óë½üÆÚOracle CloudÁªºÏµ¥µãµÇ¼£¨SSO£©Ð§ÀÍÆ÷ÔâÈëÇÖÊÂÎñ±£´æÇ±ÔÚ¹ØÁª¡£¡£¡£´ËǰÍþвÕßÔøÐû³ÆÇÔÈ¡600ÍòÌõLDAPÈÏÖ¤Êý¾Ý£¬£¬£¬£¬Ö»¹ÜOracle¹Ù·½·ñ¶¨£¬£¬£¬£¬µ«¿Í»§ÑéÖ¤Ñù±¾Ö¤ÊµÊý¾ÝÓÐÓÃÐÔ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬OracleÔÚ´¦Öóͷ£Á½ÆðÊÂÎñÖеÄÐÅÏ¢¹Ø±ÕÕ½ÂÔ£¬£¬£¬£¬¿ÉÄܼӾçÒ½Áƿͻ§ÔںϹæÓ¦¶ÔºÍ»¼ÕßÐÅÈÎÖØÐÞÖеÄÄæ¾³¡£¡£¡£
https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
3. GrandoreiroľÂíÔÙ·¢È«Çò´¹ÂÚ¹¥»÷£¬£¬£¬£¬Î±×°Ë°ÎñÇÔÈ¡½ðÈÚÊý¾Ý
3ÔÂ28ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Forcepoint½üÆÚÐû²¼µÄÍþвÇ鱨ÏÔʾ£¬£¬£¬£¬ºã¾Ã»îÔ¾µÄGrandoreiroÒøÐÐľÂíÕýͨ¹ýÐÂÐÍÍøÂç´¹ÂÚ¹¥ÊƶÔÈ«Çò½ðÈÚϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô2016ÄêÊ×´ÎÏÖÉí°ÍÎ÷ºó£¬£¬£¬£¬Öð²½½«¹¥»÷¹æÄ£À©Õ¹ÖÁÄ«Î÷¸ç¡¢ÆÏÌÑÑÀ¡¢Î÷°àÑÀµÈÀÃÀ¼°Å·ÖÞ¹ú¼Ò£¬£¬£¬£¬²¢ÔÚ2024Äê½øÒ»²½½«Ä¿µÄËø¶¨ÑÇÖÞ½ðÈÚ»ú¹¹£¬£¬£¬£¬ÐγÉÁýÕÖ1700¼ÒÒøÐм°276¸ö¼ÓÃÜÇ®°üµÄÈ«Çò¹¥»÷ÍøÂç¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬Grandoreiro½ÓÄÉ"¶ñÒâÈí¼þ¼´Ð§ÀÍ"£¨MaaS£©ÉÌҵģʽÔËÓª£¬£¬£¬£¬Æä±³ºóµÄTetrade·¸·¨¼¯Íż´±ãÔÚ2021ÄêÓë2024Äê¶à´ÎÖ´·¨¹¥»÷ÖгÉÔ±Ôâ²¶£¬£¬£¬£¬ÈÔÒ»Á¬¸üй¥»÷ÊÖ·¨¡£¡£¡£×îй¥»÷»î¶¯Ê¹ÓÃOVHcloud»ù´¡Éèʩαװ˰Îñ·£¿£¿£¿£¿£¿î֪ͨ£¬£¬£¬£¬Í¨¹ýMediafireƽ̨·Ö·¢µÄPDFÎĵµ¼ÓÔØ¶ñÒâÔØºÉ£¬£¬£¬£¬Êܺ¦ÕßÊÕµ½µÄ»ìÏýÐÍVisual Basic¾ç±¾ÓëÐéαDelphi¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬¿ÉÇÔÈ¡ÕË»§Æ¾Ö¤²¢Í¨¹ý¼ÓÃÜѹËõÎļþ¹æ±ÜÇå¾²¼ì²â¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬¸ÃľÂíÕ¹ÏÖ³ö¸ß¶ÈÄ£¿£¿£¿£¿£¿é»¯µÄ¹¥»÷ÌØÕ÷£ºÖ´Ðк󲻵«ÇÔÈ¡Óû§Æ¾Ö¤£¬£¬£¬£¬»¹»áɨÃè±ÈÌØ±ÒÇ®°ü·¾¶²¢Óë¹¥»÷Õß¿ØÖƵÄcontaboserver[.]net×ÓÓòÃû½¨ÉèC&CͨѶ£¬£¬£¬£¬Í¨¹ýƵÈÔÌæ»»×ÓÓòÃûÓòÃûÀ´ÌÓ±Ü×·×Ù¡£¡£¡£ForcepointÌØÊâÇ¿µ÷£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓÃÕýµ±ÍйÜЧÀÍContaboµÄÐÅÓþʵÑé·¸·¨£¬£¬£¬£¬Í¹ÏÔÁËÍøÂç·¸·¨Á´ÌõÖлù´¡ÉèÊ©ÀÄÓõÄÐÂÇ÷ÊÆ¡£¡£¡£
https://www.securityweek.com/fresh-grandoreiro-banking-trojan-campaigns-target-latin-america-europe/
4. Twitter(X)ÉæÏÓÄÚ²¿Ö°Ô±²Ù×÷µ¼ÖÂ28ÒÚСÎÒ˽¼Ò×ÊÁÏÊý¾Ýй¶
3ÔÂ29ÈÕ£¬£¬£¬£¬É罻ýÌåÆ½Ì¨X£¨ÔTwitter£©ÔâÓöÊ·ÉÏ×î´ó¹æÄ£Óû§Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Éæ¼°¸ß´ï28ÒÚÓû§ÐÅÏ¢£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÖÁ½ñδ×÷¹Ù·½»ØÓ¦¡£¡£¡£Çå¾²ÉçÇøBreach ForumsÉÏ£¬£¬£¬£¬Óû§ThinkingOneÐû²¼ÉùÃ÷³Æ£¬£¬£¬£¬´Ë´Îй¶ԴÓÚX¹«Ë¾²ÃÈËʱ´úijԱ¹¤µÄ²»ÂúÐÐΪ£¬£¬£¬£¬²¢ÌṩÁ˰üÀ¨400GBÔʼÊý¾ÝµÄÖ¤¾Ý¡£¡£¡£´Ë´ÎÊÂÎñÓë2023Äêй¶ÐγÉÏÊÃ÷±ÈÕÕ¡£¡£¡£2023ÄêËê¼þÉæ¼°2.09ÒÚÓû§£¬£¬£¬£¬Ö÷Ҫ̻¶µç×ÓÓʼþ¡¢Óû§ÃûµÈ¹ûÕæÐÅÏ¢£¬£¬£¬£¬X¹«Ë¾ÆäʱÒÔ"ÎÞÃô¸ÐÊý¾Ý"ΪÓɵ»¯Ó°Ïì¡£¡£¡£¶ø2025Äêй¶Ëä²»º¬µç×ÓÓʼþ£¬£¬£¬£¬È´°üÀ¨Óû§ID¡¢ÕË»§½¨ÉèÈÕÆÚ¡¢µØÀíλÖá¢ÍÆÎÄÀúÊ·µÈ¶¯Ì¬ÔªÊý¾Ý£¬£¬£¬£¬ÊµÖʹ¹½¨ÁËÓû§ÐÐΪµÄȫά¶È»Ïñ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ThinkingOne½«Á½´Îй¶Êý¾ÝºÏ²¢ÌìÉú34GBÊý¾Ý¼¯£¬£¬£¬£¬µ¼Ö¹«ÖÚÎóÅÐ2025Äêй¶°üÀ¨ÓʼþÐÅÏ¢¡£¡£¡£ÏÖʵÉÏ£¬£¬£¬£¬ÓʼþÊý¾Ý½öÀ´×Ô2023ÄêËê¼þ¡£¡£¡£ÕâÖÖ»ìÏý²Ù×÷·Å´óÁËÊÂÎñÓ°Ï죬£¬£¬£¬Òý·¢¶ÔÊý¾ÝÍêÕûÐÔµÄÖÊÒÉ¡£¡£¡£¹ØÓÚ28ÒÚÓû§µÄÒì³£Êý×Ö£¬£¬£¬£¬Ç徲ר¼ÒÖ¸³ö¿ÉÄܱ£´æ¶àÖØÍ³¼ÆÎó²î£º°üÀ¨ÒÑɾ³ýÕË»§¡¢»úеÈËÕ˺š¢APIЧÀÍÕ˺ŵȷÇÕæÊÊÓû§ÊµÌ壬£¬£¬£¬»òÊÇÀúÊ·Êý¾Ýµþ¼Óµ¼ÖÂÖØ¸´¼ÆÊý¡£¡£¡£±ðµÄ£¬£¬£¬£¬ThinkingOneµÄÊý¾ÝȪԴÈÔ´æÒÉ£¬£¬£¬£¬ÆäÉí·Ý¸üÆ«ÏòÊý¾ÝÆÊÎöʦ¶ø·Ç¹Å°åºÚ¿Í£¬£¬£¬£¬Æä»ñȡ;¾¶¿ÉÄÜÉæ¼°ÄÚ²¿Ð¹ÃÜ»òÖØ´óµÄÊý¾Ý¾ÛºÏ¡£¡£¡£
https://hackread.com/twitter-x-of-2-8-billion-data-leak-an-insider-job/
5. ɽķ»áÔ±µêÊÓ²ìClopÀÕË÷Èí¼þ£¬£¬£¬£¬ÁãÈÕÎó²îÍþвÊý¾ÝÇå¾²
3ÔÂ28ÈÕ£¬£¬£¬£¬ÎÖ¶ûÂêÆìϲִ¢ÁãÊÛ¾Þͷɽķ»áÔ±ÊÐËÁ£¨Sam's Club£©ÕýÃæÁÙClopÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖÖ¸¿Ø£¬£¬£¬£¬¸Ã×éÖ¯ÒÑÔÚÆä°µÍøÐ¹ÃÜÆ½Ì¨Ðû²¼Ïà¹ØÌõÄ¿¡£¡£¡£×÷ΪȫÃÀÓµÓÐ600Óà¼ÒÃŵꡢÍâÑóÁýÕÖÖÐÄ«Á½¹úµÄ²Ö´¢Á¬ËøÆóÒµ£¬£¬£¬£¬É½Ä·ÓµÓÐ230ÍòÔ±¹¤¼°843ÒÚÃÀÔªÄêÓªÒµ¶î£¬£¬£¬£¬ÆäÐÅÏ¢×ʲú¼ÛֵʹÆä³ÉÎªÍøÂç·¸·¨µÄ¸ß¼ÛֵĿµÄ¡£¡£¡£É½Ä·½²»°ÈË֤ʵÒÑÆô¶¯Çå¾²ÊÂÎñÊӲ죬£¬£¬£¬Ç¿µ÷"¿Í»§Êý¾ÝÇå¾²ÊÇÖ÷Òª¹ØÇÐ"¡£¡£¡£Ö»¹ÜÆóҵδÅû¶ÊÖÒÕϸ½Ú£¬£¬£¬£¬µ«ClopÍÅ»ïµÄÖ¸¿ØÄ£Ê½ÏÔʾÆäϰÓÃÁãÈÕÎó²îʵÑ鹩ӦÁ´¹¥»÷¡ª¡ª½ñÄêÍ·¸ÃÍÅ»ïÒÑʹÓÃCleoÎļþ´«ÊäÈí¼þµÄδÅû¶Îó²î£¨CVE-2024-50623£©ÊµÑé´ó¹æÄ£Êý¾ÝÇÔÈ¡£¡£¡£¬£¬£¬£¬µ¼ÖÂÎ÷²¿Í¬ÃËÒøÐеÈ4000Óà¼Ò»ú¹¹ÖÐÕС£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬Clop´Ë´Î¹¥»÷ÓëÈ¥ÄêÕë¶ÔAccellion FTAµÈÎļþ´«ÊäϵͳµÄÁãÈÕÎó²îʹÓÃÈç³öÒ»ÕÞ£¬£¬£¬£¬·´Ó¦³öÆä¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¾«×¼¹¥»÷Õ½ÂÔ¡£¡£¡£¶øÉ½Ä·²¢·ÇÊ×´ÎÔâÓöÇ徲Σ»£»£»£»£»ú£º2020ÄêÔø±¬·¢Æ¾Ö¤Ìî³ä¹¥»÷£¬£¬£¬£¬ÆÈʹÆóÒµÖØÖÃÊýÍò¿Í»§ÃÜÂ룬£¬£¬£¬Æäʱ¹«Ë¾Ç¿µ÷ϵÍⲿ´¹ÂڻËùÖ¶ø·Çϵͳ±»Í»ÆÆ¡£¡£¡£Ä¿½ñÊӲ콹µãÔÚÓÚÈ·ÈÏClopÊÇ·ñÀÖ³ÉÉøÍ¸É½Ä·ÏµÍ³£¬£¬£¬£¬ÒÔ¼°ÊÇ·ñʹÓÃCleoÎó²îʵÑé¹¥»÷¡£¡£¡£¼øÓÚɽķ»áÔ±Êý¾Ý°üÀ¨ÏûºÄ¼Í¼µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬Ç±ÔÚй¶Σº¦¿ÉÄÜÒý·¢´ó¹æÄ£Ú²Æ¼°ºÏ¹æÎ£º¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/
6. Morphing Meerkat´¹ÂÚ¼´Ð§ÀÍʹÓÃDoHÓëMX¼Í¼¹æ±Ü¼ì²â
3ÔÂ28ÈÕ£¬£¬£¬£¬ÍøÂç·¸·¨ÁìÓò½üÆÚ¸¡ÏÖµÄ"Morphing Meerkat"´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨£¬£¬£¬£¬Õ¹ÏÖ³ö¸ß¶ÈϸÃܵĹ¥»÷ÊÖÒÕÁ´¡£¡£¡£¸Ã×éÖ¯×Ô2020ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬£¬Í¨¹ýDNS over HTTPS£¨DoH£©¼ÓÃÜÐÒéÓëDNSÓʼþ½»Á÷£¨MX£©¼Í¼ÅÌÎʹ¹½¨¶¯Ì¬¹¥»÷»ù´¡ÉèÊ©£¬£¬£¬£¬ÀÖªϰ±Ü¹Å°åÇå¾²¼à²â¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬¸ÃÍÅ»ïÔËÓª×ŰüÀ¨114¸öÆ·ÅÆ·Âðģ°åµÄ´¹ÂÚ¹¤¾ß°ü£¬£¬£¬£¬Ê¹ÓÃiomartºÍHostPapaµÄSMTPЧÀÍ·Ö·¢¶àÓïÑÔ´¹ÂÚÓʼþ¡£¡£¡£¹¥»÷Óʼþ½ÓÄÉ"ÕË»§Í£ÓÃ"µÈ½ôÆÈÖ÷Ì⣬£¬£¬£¬ÅäºÏ·¢¼þÈ˵صãαÔìÊÖÒÕ£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷¶ñÒâÁ´½Ó¡£¡£¡£ºóÐø¹¥»÷Á´¾ÓÉÈ«ÐÄÉè¼ÆµÄ¿ª·ÅÖØ¶¨Ïò·¾¶£¬£¬£¬£¬Éæ¼°±»ÈëÇÖµÄWordPressÕ¾µã¡¢ÐéαÓòÃû¼°Ãâ·ÑÍйÜЧÀÍ£¬£¬£¬£¬×îÖÕͨ¹ýGoogle/CloudflareµÄDoHЧÀͼÓÔØ´¹ÂÚÒ³Ãæ¡£¡£¡£ÊÖÒÕÍ»ÆÆÌåÏÖÔÚÆäË«ÖØ¹æ±ÜÕ½ÂÔ£ºÒ»·½Ã棬£¬£¬£¬DoH¼ÓÃÜÅÌÎÊʹDNSÁ÷Á¿ÆÊÎöʧЧ£»£»£»£»£»ÁíÒ»·½Ã棬£¬£¬£¬ÊµÊ±ÆÊÎöÊܺ¦ÕßÓÊÏäÓòµÄMX¼Í¼£¬£¬£¬£¬¶¯Ì¬ÌìÉúÓëÆäÓʼþЧÀÍÉÌÆ¥ÅäµÄ´¹ÂÚÒ³Ãæ¡£¡£¡£¹¥»÷ÕßÉõÖÁÉèÖÃ"ÃÜÂë¹ýʧ"ÐéαÌáÐÑ£¬£¬£¬£¬ÓÕÆÓû§Öظ´Ìύƾ֤£¬£¬£¬£¬²¢Í¨¹ýAJAXÇëÇóÓëPHP¾ç±¾¼´Ê±»Ø´«Êý¾Ý£¬£¬£¬£¬¸¨ÒÔTelegram»úеÈËʵÏÖʵʱÊý¾Ýת·¢¡£¡£¡£·ÀÓùÆÊÎöÖ¸³ö£¬£¬£¬£¬ÆóÒµÓ¦ÔöÇ¿DNS²ã¹Ü¿Ø£¬£¬£¬£¬ÏÞÖÆ·ÇÓªÒµÏà¹ØµÄDoHͨѶ£¬£¬£¬£¬×è¶ÏÓë¹ã¸æÊÖÒÕ¡¢Îļþ¹²ÏíµÈ¸ßΣº¦»ù´¡ÉèÊ©µÄ½»»¥¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phishing-as-a-service-operation-uses-dns-over-https-for-evasion/