°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶
Ðû²¼Ê±¼ä 2025-04-231. °Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬½ñÄê2Ô£¬£¬£¬£¬£¬£¬°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÏµÍ³ÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÊýǧÃûѧÉú¡¢Î÷ϯºÍÖÎÀíÖ°Ô±ÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£Öܶþ£¬£¬£¬£¬£¬£¬Ñ§Ð£¹ÙÔ±Ðû²¼Î¥¹æÍ¨Öª£¬£¬£¬£¬£¬£¬ÖÒÑÔ2ÔÂ13ÈÕ±¬·¢µÄÍøÂçÊÂÎñ̻¶ÁËijЩITϵͳ¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬Ò»Ð©Îļþ¿ÉÄÜÒѱ»·¸·¨·Ö×Óй¶£¬£¬£¬£¬£¬£¬Éæ¼°ÏÖÈκÍǰÈιÍÔ±¡¢×ÔÔ¸ÕߺͳаüÉÌ£¬£¬£¬£¬£¬£¬ÒÔ¼°²»µ½1.5%µÄѧÉú¡£¡£¡£¡£¡£°Í¶ûµÄĦÊй«Á¢Ñ§Ð£¹ÙԱȷÈÏ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ«Î´Ö§¸¶Êê½ð¡£¡£¡£¡£¡£Ñ§Ð£Î´Í¸Â¶ÏêϸÊÜÓ°ÏìÈËÊý£¬£¬£¬£¬£¬£¬µ«Ö¸³öÊÜÓ°ÏìѧÉúÁè¼Ý1150ÈË¡£¡£¡£¡£¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÔ±¹¤Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂë»ò»¤ÕÕºÅÂ룬£¬£¬£¬£¬£¬ÒÔ¼°Ñ§Éúͨ»°¼Í¼¡¢È±¿Î¼Í¼»òÉúÓý״̬µÈÎļþ¡£¡£¡£¡£¡£Ñ§Ð£ÏµÍ³Ê×ϯִÐйÙÉ£ÌØÀûÈû˹×Ô¼ºÒ²ÊÜÓ°Ï죬£¬£¬£¬£¬£¬ËýÌåÏÖѧУ55%µÄÔ±¹¤Êܵ½Ó°Ïì¡£¡£¡£¡£¡£ÉÐÓб¨µÀ³Æ£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»·âÀ´×ÔCloakÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£¡£¡£¡£Ñ§Ð£¹ÙÔ±³Æ£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼2.5ÍòÈË£¬£¬£¬£¬£¬£¬°üÀ¨7000¶àÃûÏÖÈÎÎ÷ϯÒÔ¼°×Ô2010ÄêÒÔÀ´ÔÚ¸ÃÑ§ÇøÊÂÇéµÄËùÓÐÈË¡£¡£¡£¡£¡£Ö´·¨²¿·ÖÒѽӵ½Í¨Öª£¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾ÐÖú»Ö¸´¡£¡£¡£¡£¡£Ñ§Ð£ÒÑ×îÏÈÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬£¬£¬£¬£¬£¬ÌṩÁ½ÄêÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬²¢ÉèÁ¢ºô½ÐÖÐÐĽâ´ðÎÊÌâ¡£¡£¡£¡£¡£
https://therecord.media/baltimore-public-schools-data-breach-ransomware
2. Âêɯ°Ù»õÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÖ÷¹Ë¶©µ¥ÑÓ³Ù
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬Ó¢¹ú¿ç¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¶ÔÆäÔËÓªÔì³ÉÒ»¶¨×ÌÈÅ£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇClick and Collect¶©µ¥ÏµÍ³¡£¡£¡£¡£¡£Âêɯ°Ù»õÔÚÈ«ÇòÓµÓÐ1400¶à¼ÒÃŵ꣬£¬£¬£¬£¬£¬Ô±¹¤×ÜÊý´ï6.4ÍòÃû£¬£¬£¬£¬£¬£¬ÒÔÏúÊÛ´ò°ç¡¢Ê³ÎïºÍ¼Ò¾ÓÓÃÆ·µÈ¶àÑù»¯²úÆ·¶øÖøÃû¡£¡£¡£¡£¡£ÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÐû²¼µÄÐÂΟåÖУ¬£¬£¬£¬£¬£¬Âêɯ°Ù»õ֤ʵÁË´Ë´ÎÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú£¬£¬£¬£¬£¬£¬ÒÔÖÎÀíÏ¢Õù¾öÕâÒ»½ôÆÈÇéÐΡ£¡£¡£¡£¡£¹«Ë¾ÒѽÓÄÉС¹æÄ£ÔÝʱµ÷½â²½·¥±£»£»£»£»¤Ö÷¹ËºÍÓªÒµÇå¾²£¬£¬£¬£¬£¬£¬²¢¶Ô´ËÔì³ÉµÄδ±ãÉî±íǸÒâ¡£¡£¡£¡£¡£Ö»¹ÜÃæÁÙÌôÕ½£¬£¬£¬£¬£¬£¬Âêɯ°Ù»õµÄÃÅµê¡¢ÍøÕ¾ºÍÓ¦ÓóÌÐòÈÔÔÚÕý³£ÔËÓª¡£¡£¡£¡£¡£¹«Ë¾ÒÑÔ¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÊӲ죬£¬£¬£¬£¬£¬²¢½ÓÄɲ½·¥½øÒ»²½±£»£»£»£»¤ÆäÍøÂ磬£¬£¬£¬£¬£¬È·±£¿£¿£¿£¿£¿£¿Í»§Ð§ÀͲ»ÊÜÓ°Ïì¡£¡£¡£¡£¡£Âêɯ°Ù»õÒÑ֪ͨÊý¾Ý±£»£»£»£»¤¼àÊÓ»ú¹¹ºÍ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¬£¬£¬£¬£¬£¬µ«Î´Ìá¹©ÍøÂçÊÂÎñµÄÏêϸϸ½Ú¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÀÕË÷Èí¼þÍÅ»ï»òÆäËûÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬µ«Èô´Ë´Î¹¥»÷Éæ¼°ÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬Êý¾ÝºÜ¿ÉÄÜÒѱ»ÍµÈ¡£¬£¬£¬£¬£¬£¬²¢¿ÉÄܱ»ÓÃ×÷½øÒ»²½Ê©Ñ¹¹«Ë¾Ö§¸¶ÀÕË÷½ðµÄ³ïÂë¡£¡£¡£¡£¡£Âêɯ°Ù»õÒÑÏòÊÜÓ°Ïì¿Í»§ÖÂǸ£¬£¬£¬£¬£¬£¬²¢ÔÊÐí¾¡¿ì»Ö¸´Õý³£Ð§ÀÍ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/marks-and-spencer-confirms-a-cyberattack-as-customers-face-delayed-orders/
3. SK TelecomÔâ¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§USIMÐÅÏ¢ÃæÁÙΣº¦
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬º«¹ú×î´óÒÆ¶¯ÔËÓªÉÌSK Telecom¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÈí¼þѬȾ»ñÈ¡Á˿ͻ§Ãô¸ÐµÄUSIMÏà¹ØÐÅÏ¢¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚÍâµØÊ±¼ä2025Äê4ÔÂ19ÈÕÐÇÆÚÁùÍíÉÏ11µã£¬£¬£¬£¬£¬£¬ÕýÖµÖÜÄ©ÇÒ´ó¶¼×éÖ¯ÈËÊÖȱ·¦Ö®¼Ê¡£¡£¡£¡£¡£SK TelecomѸËÙÏìÓ¦£¬£¬£¬£¬£¬£¬ÔÚ·¢Ã÷¶ñÒâÈí¼þºóÁ¬Ã¦É¾³ý²¢¸ôÀëÁËÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐδȷÈÏй¶ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒýÆðÁ˺«¹ú»¥ÁªÍøÇå¾²¾Ö£¨KISA£©ºÍ¸Ã¹úСÎÒ˽¼ÒÐÅÏ¢±£»£»£»£»¤Î¯Ô±»áµÄ¸ß¶È¹Ø×¢£¬£¬£¬£¬£¬£¬ÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬ÈëÇÖµÄÏêϸԵ¹ÊÔÓÉ¡¢¹æÄ£»£»£»£»ò¹æÄ£ÉÐδȷ¶¨¡£¡£¡£¡£¡£USIMÊý¾Ý°üÀ¨¹ú¼ÊÒÆ¶¯Óû§Ê¶±ðÂë¡¢ÒÆ¶¯Õ¾ISDNºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÒ»µ©Ð¹Â¶£¬£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÓÐÕë¶ÔÐԵļàÊÓ¡¢¸ú×ÙºÍSIM¿¨½»Á÷¹¥»÷¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´Î¹¥»÷£¬£¬£¬£¬£¬£¬SK TelecomÒÑÔöÇ¿¶ÔUSIM½»Á÷ºÍÒì³£Éí·ÝÑé֤ʵÑéµÄ×èÖ¹£¬£¬£¬£¬£¬£¬²¢½«Á¬Ã¦ÔÝÍ£Óë¿ÉÒɻÏà¹ØµÄÕË»§Ð§ÀÍ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬½¨ÒéÓû§Í¨¹ýÖ¸¶¨ÃÅ»§×¢²áUSIM±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâÊÖ»úºÅÂë±»²»·¨ÒÆÖ²µ½ÁíÒ»ÕÅSIM¿¨ÉÏ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐÎÞÍþвÐÐΪÕ߶Դ˴ι¥»÷ÈÏÕæ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/
4. Active! MailÁãÈÕÎó²îÔâÆð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬ÈÕ±¾¶à»ú¹¹ÊÜÓ°Ïì
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬Active! Mail±£´æÑÏÖØÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-42599£¬£¬£¬£¬£¬£¬CVSS v3ÆÀ·Ö9.8£©£¬£¬£¬£¬£¬£¬Õý±»Æð¾¢Ê¹ÓÃÓÚÕë¶ÔÈÕ±¾´óÐÍ×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìËùÓа汾Active!£¬£¬£¬£¬£¬£¬°üÀ¨ËùÓÐÊÜÖ§³Ö²Ù×÷ϵͳƽ̨Éϵġ°BuildInfo£º6.60.05008561¡±£¬£¬£¬£¬£¬£¬ÈôÔ¶³ÌµÚÈý·½·¢ËͶñÒâÇëÇ󣬣¬£¬£¬£¬£¬Ôò¿ÉÄÜÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾øÐ§ÀÍÌõ¼þ¡£¡£¡£¡£¡£Active!mail×÷Ϊ»ùÓÚÍøÂçµÄµç×ÓÓʼþ¿Í»§¶Ë£¬£¬£¬£¬£¬£¬ËäÔÚÈ«Çò¹æÄ£ÄÚ²»ÈçGmail»òOutlookÆÕ±éʹÓ㬣¬£¬£¬£¬£¬µ«ÔÚÈÕ±¾´óÐÍÆóÒµ¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÒøÐеÄÈÕÓïÇéÐÎÖг£±»ÓÃ×÷Ⱥ¼þ×é¼þ£¬£¬£¬£¬£¬£¬Òѱ»Áè¼Ý2,250¸ö×éÖ¯½ÓÄÉ£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý11,000,000¸öÕÊ»§£¬£¬£¬£¬£¬£¬ÊǸùúÉÌÒµÍøÂçÓʼþÊг¡µÄÖ÷Òª¼ÓÈëÕß¡£¡£¡£¡£¡£ÈÕ±¾CERTÒÑÈ·ÈϸÃÎó²î´¦ÓÚ»îԾʹÓÃ״̬£¬£¬£¬£¬£¬£¬²¢±Þ²ßËùÓÐÓû§¾¡¿ì¸üÐÂÖÁActive!Mail 6 BuildInfo: 6.60.06008562¡£¡£¡£¡£¡£ÈÕ±¾ÍøÂçÍйܺÍITЧÀÍÌṩÉÌKagoya Japan¼°WADAX¾ù±¨¸æÁËÒòÊÔͼʹÓøÃÎó²îÔì³ÉµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬²¢ÒÑÔÝʱ×èÖ¹Active!ÓʼþЧÀÍ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬MacnicaÇå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐ227̨̻¶ÔÚ»¥ÁªÍøÉϵÄActive!ЧÀÍÆ÷¿ÉÄÜÊܵ½¹¥»÷£¬£¬£¬£¬£¬£¬ÆäÖÐ63̨ÔÚ´óѧʹÓᣡ£¡£¡£¡£ÈÕ±¾CERTΪÎÞ·¨Á¬Ã¦Ó¦ÓÃÇå¾²¸üеÄÓû§Ìá³öÁËÏêϸ»º½â²½·¥£¬£¬£¬£¬£¬£¬ÒÔÓ¦¶Ô´ËÎó²î´øÀ´µÄÍþв¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/
5. ÀÕË÷Èí¼þÖÂÁ½Ò½ÁƱ£½¡×éÖ¯Êý¾Ýй¶£¬£¬£¬£¬£¬£¬³¬24ÍòÈËÊÜÓ°Ïì
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬Á½¼ÒÒ½ÁƱ£½¡×éÖ¯Ïà¼ÌÈ·ÈÏÔÚÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó·ºÆðÊý¾Ýй¶£¬£¬£¬£¬£¬£¬Ó°ÏìÈËÊý¾ùÁè¼Ý10Íò¡£¡£¡£¡£¡£Î»ÓÚÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ±´¶û¾È»¤³µ¹«Ë¾£¬£¬£¬£¬£¬£¬ÔÚ2025Äê2ÔÂ13ÈÕ¼ì²âµ½ÍøÂçÈëÇÖ£¬£¬£¬£¬£¬£¬ºÚ¿Í»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¼°¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢µÄÎļþ£¬£¬£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁË114,000ÈË¡£¡£¡£¡£¡£ÃÀ¶ÅɯÀÕË÷Èí¼þ×éÖ¯Ðû³Æ´Ó±´¶û¾È»¤³µÇÔÈ¡ÁËÁè¼Ý200GBµÄÊý¾Ý¡£¡£¡£¡£¡£ÁíÒ»¼ÒÊÜÓ°ÏìµÄÒ½ÁƱ£½¡×éÖ¯ÊÇλÓÚ°¢À°ÍÂíÖݲ®Ã÷º²µÄÑÛ¿ÆÕïËù°¢À°ÍÂíÑÛ¿ÆÐ»á¡£¡£¡£¡£¡£¸ÃÕïËùÓÚ4ÔÂ10ÈÕ͸¶£¬£¬£¬£¬£¬£¬ÏÖÓкÍÒÔǰ»¼ÕßµÄСÎÒ˽¼Ò¼°Êܱ£»£»£»£»¤¿µ½¡ÐÅÏ¢Ô⵽й¶£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ1ÔÂ30ÈÕ·¢Ã÷ÍøÂçÎó²î£¬£¬£¬£¬£¬£¬ºÚ¿Í×Ô1ÔÂ22ÈÕÆð¼´¿É»á¼ûÆäϵͳ¡£¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬¾ÝÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý131,000ÈË¡£¡£¡£¡£¡£È¥Ä꣬£¬£¬£¬£¬£¬ÃÀ¹ú±¬·¢ÁË700¶àÆðÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄ¼Í¼×ÜÊýÁè¼Ý1.8ÒÚÌõ¡£¡£¡£¡£¡£
https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/
6. Elusive CometºÚ¿Í×é֯ʹÓÃZoomʵÑéÉç»á¹¤³Ì¹¥»÷
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Elusive Comet¡±µÄºÚ¿Í×éÖ¯Õë¶Ô¼ÓÃÜÇ®±ÒÓû§ÌᳫÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬Í¨¹ýZoomµÄÔ¶³Ì¿ØÖƹ¦Ð§ÓÕÆÓû§ÊÚÓèÆä»á¼ûȨÏÞ¡£¡£¡£¡£¡£¸Ã×é֯ģÄâLazarusºÚ¿Í×éÖ¯ÔÚ15ÒÚÃÀÔªBybit¼ÓÃÜÇ®±Ò͵ÇÔ°¸ÖÐʹÓõÄÊÖÒÕ£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±ÊÂÇéÁ÷³ÌʵÑé¹¥»÷¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵĿþÀÜÕË»§»òµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ÒÔ¡°Åí²©¼ÓÃÜÇ®±Ò¡±²É·ÃÔ¼ÇëΪ»Ï×Ó£¬£¬£¬£¬£¬£¬Ïò¸ß¼ÛֵĿµÄ·¢ËÍCalendlyÁ´½Ó£¬£¬£¬£¬£¬£¬°²ÅÅZoom¾Û»á¡£¡£¡£¡£¡£ÓÉÓÚÔ¼ÇëÁ´½ÓÕæÊµÓÐÓ㬣¬£¬£¬£¬£¬½µµÍÁËÄ¿µÄµÄÏÓÒÉˮƽ¡£¡£¡£¡£¡£ÔÚZoomͨ»°Ê±´ú£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÌᳫÆÁÄ»¹²Ïí»á»°£¬£¬£¬£¬£¬£¬²¢½«ÆäZoomÏÔʾÃû³ÆÖØÃüÃûΪ¡°Zoom¡±£¬£¬£¬£¬£¬£¬Ê¹Êܺ¦ÕßÎóÒÔΪÇëÇóÀ´×ÔÓ¦ÓóÌÐò×Ô¼º£¬£¬£¬£¬£¬£¬´Ó¶øÅú×¼Ô¶³Ì¿ØÖÆÇëÇ󡣡£¡£¡£¡£Ò»µ©»ñµÃ¿ØÖÆÈ¨£¬£¬£¬£¬£¬£¬¹¥»÷Õß±ã¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢×°ÖöñÒâÈí¼þ¡¢»á¼ûÎļþ»òÌᳫ¼ÓÃÜÉúÒâ¡£¡£¡£¡£¡£ËûÃÇ»¹¿ÉÄÜѸËÙÖ²ÈëÒþÃØºóÃÅ£¬£¬£¬£¬£¬£¬½¨É賤ÆÚ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ÒÔ±ãÈÕºóʹÓᣡ£¡£¡£¡£Trail of Bits¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄȨÏÞ¶Ô»°¿òÓëÆäËûÎÞº¦µÄZoom֪ͨÏàËÆ£¬£¬£¬£¬£¬£¬Óû§¿ÉÄÜÔÚ²»ÏàʶЧ¹ûµÄÇéÐÎÏÂÊÚÓèÅÌËã»úÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£Îª·ÀÓù´ËÀàÍþв£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾½¨ÒéʵÑéϵͳ¹æÄ£µÄÒþ˽ƫºÃÕ½ÂÔ¿ØÖÆÉèÖÃÎļþ£¬£¬£¬£¬£¬£¬±ÜÃâ¿É»á¼ûÐÔ»á¼û£¬£¬£¬£¬£¬£¬²¢½¨ÒéÇå¾²Òªº¦ÐÍÇéÐκʹ¦Öóͷ£Ãû¹óÊý×Ö×ʲúµÄ×éÖ¯ÍêÈ«ÒÆ³ýZoom¿Í»§¶Ë£¬£¬£¬£¬£¬£¬ÒÔ½µµÍΣº¦¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-abuse-zoom-remote-control-feature-for-crypto-theft-attacks/