°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶

Ðû²¼Ê±¼ä 2025-04-23

1. °Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶


4ÔÂ23ÈÕ£¬ £¬£¬£¬£¬£¬½ñÄê2Ô£¬ £¬£¬£¬£¬£¬°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÏµÍ³ÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬ÊýǧÃûѧÉú¡¢Î÷ϯºÍÖÎÀíÖ°Ô±ÐÅÏ¢±»µÁ¡£¡£¡£¡£ ¡£Öܶþ£¬ £¬£¬£¬£¬£¬Ñ§Ð£¹ÙÔ±Ðû²¼Î¥¹æÍ¨Öª£¬ £¬£¬£¬£¬£¬ÖÒÑÔ2ÔÂ13ÈÕ±¬·¢µÄÍøÂçÊÂÎñ̻¶ÁËijЩITϵͳ¡£¡£¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬ £¬£¬£¬£¬£¬Ò»Ð©Îļþ¿ÉÄÜÒѱ»·¸·¨·Ö×Óй¶£¬ £¬£¬£¬£¬£¬Éæ¼°ÏÖÈκÍǰÈιÍÔ±¡¢×ÔÔ¸ÕߺͳаüÉÌ£¬ £¬£¬£¬£¬£¬ÒÔ¼°²»µ½1.5%µÄѧÉú¡£¡£¡£¡£ ¡£°Í¶ûµÄĦÊй«Á¢Ñ§Ð£¹ÙԱȷÈÏ£¬ £¬£¬£¬£¬£¬´Ë´ÎÊÂÎñΪÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬µ«Î´Ö§¸¶Êê½ð¡£¡£¡£¡£ ¡£Ñ§Ð£Î´Í¸Â¶ÏêϸÊÜÓ°ÏìÈËÊý£¬ £¬£¬£¬£¬£¬µ«Ö¸³öÊÜÓ°ÏìѧÉúÁè¼Ý1150ÈË¡£¡£¡£¡£ ¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÔ±¹¤Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂë»ò»¤ÕÕºÅÂ룬 £¬£¬£¬£¬£¬ÒÔ¼°Ñ§Éúͨ»°¼Í¼¡¢È±¿Î¼Í¼»òÉúÓý״̬µÈÎļþ¡£¡£¡£¡£ ¡£Ñ§Ð£ÏµÍ³Ê×ϯִÐйÙÉ£ÌØÀûÈû˹×Ô¼ºÒ²ÊÜÓ°Ï죬 £¬£¬£¬£¬£¬ËýÌåÏÖѧУ55%µÄÔ±¹¤Êܵ½Ó°Ïì¡£¡£¡£¡£ ¡£ÉÐÓб¨µÀ³Æ£¬ £¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»·âÀ´×ÔCloakÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£¡£¡£ ¡£Ñ§Ð£¹ÙÔ±³Æ£¬ £¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼2.5ÍòÈË£¬ £¬£¬£¬£¬£¬°üÀ¨7000¶àÃûÏÖÈÎÎ÷ϯÒÔ¼°×Ô2010ÄêÒÔÀ´ÔÚ¸ÃÑ§ÇøÊÂÇéµÄËùÓÐÈË¡£¡£¡£¡£ ¡£Ö´·¨²¿·ÖÒѽӵ½Í¨Öª£¬ £¬£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾Ð­Öú»Ö¸´¡£¡£¡£¡£ ¡£Ñ§Ð£ÒÑ×îÏÈÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬ £¬£¬£¬£¬£¬ÌṩÁ½ÄêÐÅÓÃ¼à¿ØÐ§ÀÍ£¬ £¬£¬£¬£¬£¬²¢ÉèÁ¢ºô½ÐÖÐÐĽâ´ðÎÊÌâ¡£¡£¡£¡£ ¡£


https://therecord.media/baltimore-public-schools-data-breach-ransomware


2. Âêɯ°Ù»õÔâÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬µ¼ÖÂÖ÷¹Ë¶©µ¥ÑÓ³Ù


4ÔÂ22ÈÕ£¬ £¬£¬£¬£¬£¬Ó¢¹ú¿ç¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬¶ÔÆäÔËÓªÔì³ÉÒ»¶¨×ÌÈÅ£¬ £¬£¬£¬£¬£¬ÓÈÆäÊÇClick and Collect¶©µ¥ÏµÍ³¡£¡£¡£¡£ ¡£Âêɯ°Ù»õÔÚÈ«ÇòÓµÓÐ1400¶à¼ÒÃŵ꣬ £¬£¬£¬£¬£¬Ô±¹¤×ÜÊý´ï6.4ÍòÃû£¬ £¬£¬£¬£¬£¬ÒÔÏúÊÛ´ò°ç¡¢Ê³ÎïºÍ¼Ò¾ÓÓÃÆ·µÈ¶àÑù»¯²úÆ·¶øÖøÃû¡£¡£¡£¡£ ¡£ÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÐû²¼µÄÐÂΟåÖУ¬ £¬£¬£¬£¬£¬Âêɯ°Ù»õ֤ʵÁË´Ë´ÎÍøÂçÇå¾²ÊÂÎñ£¬ £¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú£¬ £¬£¬£¬£¬£¬ÒÔÖÎÀíÏ¢Õù¾öÕâÒ»½ôÆÈÇéÐΡ£¡£¡£¡£ ¡£¹«Ë¾ÒѽÓÄÉС¹æÄ£ÔÝʱµ÷½â²½·¥±£»£» £»£»¤Ö÷¹ËºÍÓªÒµÇå¾²£¬ £¬£¬£¬£¬£¬²¢¶Ô´ËÔì³ÉµÄδ±ãÉî±íǸÒâ¡£¡£¡£¡£ ¡£Ö»¹ÜÃæÁÙÌôÕ½£¬ £¬£¬£¬£¬£¬Âêɯ°Ù»õµÄÃÅµê¡¢ÍøÕ¾ºÍÓ¦ÓóÌÐòÈÔÔÚÕý³£ÔËÓª¡£¡£¡£¡£ ¡£¹«Ë¾ÒÑÔ¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊӲ죬 £¬£¬£¬£¬£¬²¢½ÓÄɲ½·¥½øÒ»²½±£»£» £»£»¤ÆäÍøÂ磬 £¬£¬£¬£¬£¬È·±£¿£¿£¿£¿£¿£¿Í»§Ð§ÀͲ»ÊÜÓ°Ïì¡£¡£¡£¡£ ¡£Âêɯ°Ù»õÒÑ֪ͨÊý¾Ý±£»£» £»£»¤¼àÊÓ»ú¹¹ºÍ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¬ £¬£¬£¬£¬£¬µ«Î´Ìá¹©ÍøÂçÊÂÎñµÄÏêϸϸ½Ú¡£¡£¡£¡£ ¡£Ö»¹ÜÏÖÔÚÉÐÎÞÀÕË÷Èí¼þÍÅ»ï»òÆäËûÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ £¬£¬£¬£¬£¬µ«Èô´Ë´Î¹¥»÷Éæ¼°ÀÕË÷Èí¼þ£¬ £¬£¬£¬£¬£¬Êý¾ÝºÜ¿ÉÄÜÒѱ»ÍµÈ¡£¬ £¬£¬£¬£¬£¬²¢¿ÉÄܱ»ÓÃ×÷½øÒ»²½Ê©Ñ¹¹«Ë¾Ö§¸¶ÀÕË÷½ðµÄ³ïÂë¡£¡£¡£¡£ ¡£Âêɯ°Ù»õÒÑÏòÊÜÓ°Ïì¿Í»§ÖÂǸ£¬ £¬£¬£¬£¬£¬²¢ÔÊÐí¾¡¿ì»Ö¸´Õý³£Ð§ÀÍ¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/marks-and-spencer-confirms-a-cyberattack-as-customers-face-delayed-orders/


3. SK TelecomÔâ¶ñÒâÈí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬¿Í»§USIMÐÅÏ¢ÃæÁÙΣº¦


4ÔÂ22ÈÕ£¬ £¬£¬£¬£¬£¬º«¹ú×î´óÒÆ¶¯ÔËÓªÉÌSK Telecom¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÈí¼þѬȾ»ñÈ¡Á˿ͻ§Ãô¸ÐµÄUSIMÏà¹ØÐÅÏ¢¡£¡£¡£¡£ ¡£´Ë´Î¹¥»÷±¬·¢ÔÚÍâµØÊ±¼ä2025Äê4ÔÂ19ÈÕÐÇÆÚÁùÍíÉÏ11µã£¬ £¬£¬£¬£¬£¬ÕýÖµÖÜÄ©ÇÒ´ó¶¼×éÖ¯ÈËÊÖȱ·¦Ö®¼Ê¡£¡£¡£¡£ ¡£SK TelecomѸËÙÏìÓ¦£¬ £¬£¬£¬£¬£¬ÔÚ·¢Ã÷¶ñÒâÈí¼þºóÁ¬Ã¦É¾³ý²¢¸ôÀëÁËÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£¡£¡£¡£ ¡£×èÖ¹ÏÖÔÚ£¬ £¬£¬£¬£¬£¬ÉÐδȷÈÏй¶ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£¡£¡£ ¡£´Ë´ÎÊÂÎñÒýÆðÁ˺«¹ú»¥ÁªÍøÇå¾²¾Ö£¨KISA£©ºÍ¸Ã¹úСÎÒ˽¼ÒÐÅÏ¢±£»£» £»£»¤Î¯Ô±»áµÄ¸ß¶È¹Ø×¢£¬ £¬£¬£¬£¬£¬ÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬ £¬£¬£¬£¬£¬ÈëÇÖµÄÏêϸԵ¹ÊÔ­ÓÉ¡¢¹æÄ£»£» £»£»ò¹æÄ£ÉÐδȷ¶¨¡£¡£¡£¡£ ¡£USIMÊý¾Ý°üÀ¨¹ú¼ÊÒÆ¶¯Óû§Ê¶±ðÂë¡¢ÒÆ¶¯Õ¾ISDNºÅÂëµÈÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬£¬ÕâЩÊý¾ÝÒ»µ©Ð¹Â¶£¬ £¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÓÐÕë¶ÔÐԵļàÊÓ¡¢¸ú×ÙºÍSIM¿¨½»Á÷¹¥»÷¡£¡£¡£¡£ ¡£ÎªÓ¦¶Ô´Ë´Î¹¥»÷£¬ £¬£¬£¬£¬£¬SK TelecomÒÑÔöÇ¿¶ÔUSIM½»Á÷ºÍÒì³£Éí·ÝÑé֤ʵÑéµÄ×èÖ¹£¬ £¬£¬£¬£¬£¬²¢½«Á¬Ã¦ÔÝÍ£Óë¿ÉÒɻÏà¹ØµÄÕË»§Ð§ÀÍ¡£¡£¡£¡£ ¡£Í¬Ê±£¬ £¬£¬£¬£¬£¬½¨ÒéÓû§Í¨¹ýÖ¸¶¨ÃÅ»§×¢²áUSIM±£»£» £»£»¤Ð§ÀÍ£¬ £¬£¬£¬£¬£¬ÒÔ±ÜÃâÊÖ»úºÅÂë±»²»·¨ÒÆÖ²µ½ÁíÒ»ÕÅSIM¿¨ÉÏ¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬ÉÐÎÞÍþвÐÐΪÕ߶Դ˴ι¥»÷ÈÏÕæ¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/


4. Active! MailÁãÈÕÎó²îÔâÆð¾¢Ê¹Ó㬠£¬£¬£¬£¬£¬ÈÕ±¾¶à»ú¹¹ÊÜÓ°Ïì


4ÔÂ22ÈÕ£¬ £¬£¬£¬£¬£¬Active! Mail±£´æÑÏÖØÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-42599£¬ £¬£¬£¬£¬£¬CVSS v3ÆÀ·Ö9.8£©£¬ £¬£¬£¬£¬£¬Õý±»Æð¾¢Ê¹ÓÃÓÚÕë¶ÔÈÕ±¾´óÐÍ×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£ ¡£¸ÃÎó²îÓ°ÏìËùÓа汾Active!£¬ £¬£¬£¬£¬£¬°üÀ¨ËùÓÐÊÜÖ§³Ö²Ù×÷ϵͳƽ̨Éϵġ°BuildInfo£º6.60.05008561¡±£¬ £¬£¬£¬£¬£¬ÈôÔ¶³ÌµÚÈý·½·¢ËͶñÒâÇëÇó£¬ £¬£¬£¬£¬£¬Ôò¿ÉÄÜÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾øÐ§ÀÍÌõ¼þ¡£¡£¡£¡£ ¡£Active!mail×÷Ϊ»ùÓÚÍøÂçµÄµç×ÓÓʼþ¿Í»§¶Ë£¬ £¬£¬£¬£¬£¬ËäÔÚÈ«Çò¹æÄ£ÄÚ²»ÈçGmail»òOutlookÆÕ±éʹÓ㬠£¬£¬£¬£¬£¬µ«ÔÚÈÕ±¾´óÐÍÆóÒµ¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÒøÐеÄÈÕÓïÇéÐÎÖг£±»ÓÃ×÷Ⱥ¼þ×é¼þ£¬ £¬£¬£¬£¬£¬Òѱ»Áè¼Ý2,250¸ö×éÖ¯½ÓÄÉ£¬ £¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý11,000,000¸öÕÊ»§£¬ £¬£¬£¬£¬£¬ÊǸùúÉÌÒµÍøÂçÓʼþÊг¡µÄÖ÷Òª¼ÓÈëÕß¡£¡£¡£¡£ ¡£ÈÕ±¾CERTÒÑÈ·ÈϸÃÎó²î´¦ÓÚ»îԾʹÓÃ״̬£¬ £¬£¬£¬£¬£¬²¢±Þ²ßËùÓÐÓû§¾¡¿ì¸üÐÂÖÁActive!Mail 6 BuildInfo: 6.60.06008562¡£¡£¡£¡£ ¡£ÈÕ±¾ÍøÂçÍйܺÍITЧÀÍÌṩÉÌKagoya Japan¼°WADAX¾ù±¨¸æÁËÒòÊÔͼʹÓøÃÎó²îÔì³ÉµÄЧÀÍÖÐÖ¹£¬ £¬£¬£¬£¬£¬²¢ÒÑÔÝʱ×èÖ¹Active!ÓʼþЧÀÍ¡£¡£¡£¡£ ¡£±ðµÄ£¬ £¬£¬£¬£¬£¬MacnicaÇå¾²Ñо¿Ô±Ö¸³ö£¬ £¬£¬£¬£¬£¬ÖÁÉÙÓÐ227̨̻¶ÔÚ»¥ÁªÍøÉϵÄActive!ЧÀÍÆ÷¿ÉÄÜÊܵ½¹¥»÷£¬ £¬£¬£¬£¬£¬ÆäÖÐ63̨ÔÚ´óѧʹÓᣡ£¡£¡£ ¡£ÈÕ±¾CERTΪÎÞ·¨Á¬Ã¦Ó¦ÓÃÇå¾²¸üеÄÓû§Ìá³öÁËÏêϸ»º½â²½·¥£¬ £¬£¬£¬£¬£¬ÒÔÓ¦¶Ô´ËÎó²î´øÀ´µÄÍþв¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/


5. ÀÕË÷Èí¼þÖÂÁ½Ò½ÁƱ£½¡×éÖ¯Êý¾Ýй¶£¬ £¬£¬£¬£¬£¬³¬24ÍòÈËÊÜÓ°Ïì


4ÔÂ22ÈÕ£¬ £¬£¬£¬£¬£¬½üÆÚ£¬ £¬£¬£¬£¬£¬Á½¼ÒÒ½ÁƱ£½¡×éÖ¯Ïà¼ÌÈ·ÈÏÔÚÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó·ºÆðÊý¾Ýй¶£¬ £¬£¬£¬£¬£¬Ó°ÏìÈËÊý¾ùÁè¼Ý10Íò¡£¡£¡£¡£ ¡£Î»ÓÚÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ±´¶û¾È»¤³µ¹«Ë¾£¬ £¬£¬£¬£¬£¬ÔÚ2025Äê2ÔÂ13ÈÕ¼ì²âµ½ÍøÂçÈëÇÖ£¬ £¬£¬£¬£¬£¬ºÚ¿Í»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¼°¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢µÄÎļþ£¬ £¬£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬ £¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁË114,000ÈË¡£¡£¡£¡£ ¡£ÃÀ¶ÅɯÀÕË÷Èí¼þ×éÖ¯Ðû³Æ´Ó±´¶û¾È»¤³µÇÔÈ¡ÁËÁè¼Ý200GBµÄÊý¾Ý¡£¡£¡£¡£ ¡£ÁíÒ»¼ÒÊÜÓ°ÏìµÄÒ½ÁƱ£½¡×éÖ¯ÊÇλÓÚ°¢À­°ÍÂíÖݲ®Ã÷º²µÄÑÛ¿ÆÕïËù°¢À­°ÍÂíÑÛ¿ÆÐ­»á¡£¡£¡£¡£ ¡£¸ÃÕïËùÓÚ4ÔÂ10ÈÕ͸¶£¬ £¬£¬£¬£¬£¬ÏÖÓкÍÒÔǰ»¼ÕßµÄСÎÒ˽¼Ò¼°Êܱ£»£» £»£»¤¿µ½¡ÐÅÏ¢Ô⵽й¶£¬ £¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£ ¡£¸Ã×éÖ¯ÓÚ1ÔÂ30ÈÕ·¢Ã÷ÍøÂçÎó²î£¬ £¬£¬£¬£¬£¬ºÚ¿Í×Ô1ÔÂ22ÈÕÆð¼´¿É»á¼ûÆäϵͳ¡£¡£¡£¡£ ¡£BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ £¬£¬£¬£¬£¬¾ÝÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬ £¬£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý131,000ÈË¡£¡£¡£¡£ ¡£È¥Ä꣬ £¬£¬£¬£¬£¬ÃÀ¹ú±¬·¢ÁË700¶àÆðÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬Ð¹Â¶µÄ¼Í¼×ÜÊýÁè¼Ý1.8ÒÚÌõ¡£¡£¡£¡£ ¡£


https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/


6. Elusive CometºÚ¿Í×é֯ʹÓÃZoomʵÑéÉç»á¹¤³Ì¹¥»÷


4ÔÂ22ÈÕ£¬ £¬£¬£¬£¬£¬½üÆÚ£¬ £¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Elusive Comet¡±µÄºÚ¿Í×éÖ¯Õë¶Ô¼ÓÃÜÇ®±ÒÓû§ÌᳫÉç»á¹¤³Ì¹¥»÷£¬ £¬£¬£¬£¬£¬Í¨¹ýZoomµÄÔ¶³Ì¿ØÖƹ¦Ð§ÓÕÆ­Óû§ÊÚÓèÆä»á¼ûȨÏÞ¡£¡£¡£¡£ ¡£¸Ã×é֯ģÄâLazarusºÚ¿Í×éÖ¯ÔÚ15ÒÚÃÀÔªBybit¼ÓÃÜÇ®±Ò͵ÇÔ°¸ÖÐʹÓõÄÊÖÒÕ£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±ÊÂÇéÁ÷³ÌʵÑé¹¥»÷¡£¡£¡£¡£ ¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵĿþÀÜÕË»§»òµç×ÓÓʼþ£¬ £¬£¬£¬£¬£¬ÒÔ¡°Åí²©¼ÓÃÜÇ®±Ò¡±²É·ÃÔ¼ÇëΪ»Ï×Ó£¬ £¬£¬£¬£¬£¬Ïò¸ß¼ÛֵĿµÄ·¢ËÍCalendlyÁ´½Ó£¬ £¬£¬£¬£¬£¬°²ÅÅZoom¾Û»á¡£¡£¡£¡£ ¡£ÓÉÓÚÔ¼ÇëÁ´½ÓÕæÊµÓÐÓ㬠£¬£¬£¬£¬£¬½µµÍÁËÄ¿µÄµÄÏÓÒÉˮƽ¡£¡£¡£¡£ ¡£ÔÚZoomͨ»°Ê±´ú£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÌᳫÆÁÄ»¹²Ïí»á»°£¬ £¬£¬£¬£¬£¬²¢½«ÆäZoomÏÔʾÃû³ÆÖØÃüÃûΪ¡°Zoom¡±£¬ £¬£¬£¬£¬£¬Ê¹Êܺ¦ÕßÎóÒÔΪÇëÇóÀ´×ÔÓ¦ÓóÌÐò×Ô¼º£¬ £¬£¬£¬£¬£¬´Ó¶øÅú×¼Ô¶³Ì¿ØÖÆÇëÇ󡣡£¡£¡£ ¡£Ò»µ©»ñµÃ¿ØÖÆÈ¨£¬ £¬£¬£¬£¬£¬¹¥»÷Õß±ã¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢×°ÖöñÒâÈí¼þ¡¢»á¼ûÎļþ»òÌᳫ¼ÓÃÜÉúÒâ¡£¡£¡£¡£ ¡£ËûÃÇ»¹¿ÉÄÜѸËÙÖ²ÈëÒþÃØºóÃÅ£¬ £¬£¬£¬£¬£¬½¨É賤ÆÚ»á¼ûȨÏÞ£¬ £¬£¬£¬£¬£¬ÒÔ±ãÈÕºóʹÓᣡ£¡£¡£ ¡£Trail of Bits¹«Ë¾Ö¸³ö£¬ £¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄȨÏÞ¶Ô»°¿òÓëÆäËûÎÞº¦µÄZoom֪ͨÏàËÆ£¬ £¬£¬£¬£¬£¬Óû§¿ÉÄÜÔÚ²»ÏàʶЧ¹ûµÄÇéÐÎÏÂÊÚÓèÅÌËã»úÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£ ¡£Îª·ÀÓù´ËÀàÍþв£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾½¨ÒéʵÑéϵͳ¹æÄ£µÄÒþ˽ƫºÃÕ½ÂÔ¿ØÖÆÉèÖÃÎļþ£¬ £¬£¬£¬£¬£¬±ÜÃâ¿É»á¼ûÐÔ»á¼û£¬ £¬£¬£¬£¬£¬²¢½¨ÒéÇå¾²Òªº¦ÐÍÇéÐκʹ¦Öóͷ£Ãû¹óÊý×Ö×ʲúµÄ×éÖ¯ÍêÈ«ÒÆ³ýZoom¿Í»§¶Ë£¬ £¬£¬£¬£¬£¬ÒÔ½µµÍΣº¦¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hackers-abuse-zoom-remote-control-feature-for-crypto-theft-attacks/