ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶

Ðû²¼Ê±¼ä 2025-05-09

1. ÅàÉú¼¯ÍÅÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾ºÍ¿Í»§Êý¾Ýй¶


5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬½ÌÓý¾ÞÍ·ÅàÉú¼¯ÍÅÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˹«Ë¾Êý¾ÝºÍ¿Í»§ÐÅÏ¢¡£¡£¡£¡£ÅàÉú¼¯ÍÅ×ܲ¿Î»ÓÚÓ¢¹ú£¬£¬£¬£¬£¬£¬ÊÇÈ«Çò×î´óµÄѧÊõ³öÊé¡¢Êý×Öѧϰ¹¤¾ßºÍ±ê×¼»¯ÆÀ¹ÀÌṩÉÌÖ®Ò»¡£¡£¡£¡£ÅàÉú¼¯ÍŽÒÏþÉùÃ÷ÈÏ¿ÉÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Êý¾Ý±»µÁ£¬£¬£¬£¬£¬£¬µ«³Æ´ó²¿·ÖΪ¡°ÒÅÁôÊý¾Ý¡±¡£¡£¡£¡£ÅàÉú´ú±í֤ʵ£¬£¬£¬£¬£¬£¬ÓÐδ¾­ÊÚȨµÄÐÐΪÕß»á¼ûÁËÆä²¿·Öϵͳ£¬£¬£¬£¬£¬£¬Ò»µ©È·Èϸû£¬£¬£¬£¬£¬£¬ÅàÉúÁ¬Ã¦½ÓÄɲ½·¥×èÖ¹£¬£¬£¬£¬£¬£¬²¢Óëȡ֤ר¼ÒÏàÖúÊÓ²ìÊÂÎñ¾­Óɼ°ÊÜÓ°ÏìÊý¾Ý£¬£¬£¬£¬£¬£¬»¹Ð­ÖúÖ´·¨²¿·Ö¿ªÕ¹ÊӲ죬£¬£¬£¬£¬£¬Í¬Ê±ÒÑÔÚϵͳÖа²ÅÅÌØÊâÇå¾²²½·¥£¬£¬£¬£¬£¬£¬°üÀ¨ÔöÇ¿Çå¾²¼à¿ØºÍÉí·ÝÑéÖ¤¡£¡£¡£¡£ÅàÉú»¹Ö¤Êµ±»µÁÊý¾Ý²»°üÀ¨Ô±¹¤ÐÅÏ¢¡£¡£¡£¡£´ËǰÓÐÐÂÎųƣ¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÓÚ2025Äê1ÔÂͨ¹ýÔÚ¹«¹².git/configÎļþÖз¢Ã÷µÄ̻¶µÄGitLabСÎÒ˽¼Ò»á¼ûÁîÅÆÆÆËðÁËÅàÉúµÄ¿ª·¢ÇéÐΣ¬£¬£¬£¬£¬£¬¸ÃÎļþÈôÎó̻¶ÇÒ°üÀ¨Ç¶ÈëÔÚÔ¶³ÌURLÖеĻá¼ûÁîÅÆ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜδ¾­ÊÚȨ»á¼ûÄÚ²¿´æ´¢¿â¡£¡£¡£¡£ÔÚÕë¶ÔÅàÉúµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬Ì»Â¶µÄÁîÅÆÊ¹ÍþвÐÐΪÕß»á¼ûÁ˹«Ë¾Ô´´úÂ룬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚÔÆÆ½Ì¨µÄ½øÒ»²½Ó²±àÂëÆ¾Ö¤ºÍÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬£¬ËæºóÍþвÐÐΪÕßʹÓÃÕâЩƾ֤´Ó¹«Ë¾ÄÚ²¿ÍøÂçºÍÔÆ»ù´¡ÉèÊ©ÖÐÇÔÈ¡ÁËÊýTBÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨AWS¡¢Google Cloud¼°ÖÖÖÖ»ùÓÚÔÆµÄÊý¾Ý¿âЧÀÍÊý¾Ý£¬£¬£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨¿Í»§ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢µÈ£¬£¬£¬£¬£¬£¬Êý°ÙÍòÈËÊÜÓ°Ïì¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/


2. PyPI¾ªÏÖ¶ñÒâ°üÕë¶ÔDiscord¿ª·¢Õßϵͳ


5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬PythonÈí¼þ°üË÷Òý£¨PyPI£©ÉϾªÏÖÕë¶ÔDiscord¿ª·¢Ö°Ô±µÄ¶ñÒâPythonÈí¼þ°ü¡°discordpydebug¡±¡£¡£¡£¡£¸ÃÈí¼þ°üαװ³ÉDiscord»úеÈË¿ª·¢Ö°Ô±µÄ¹ýʧ¼Í¼Æ÷ÊÊÓóÌÐò£¬£¬£¬£¬£¬£¬×Ô2022Äê3ÔÂ21ÈÕÉÏ´«ÒÔÀ´£¬£¬£¬£¬£¬£¬Òѱ»ÏÂÔØÁè¼Ý11000´Î¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Socket×îÏÈ·¢Ã÷ÕâÒ»¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬²¢Ö¸³öÆä¿ÉÓÃÓÚ¶ÔDiscord¿ª·¢Ö°Ô±µÄϵͳ¾ÙÐкóÃŹ¥»÷£¬£¬£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÊý¾Ý͵ÇÔºÍÔ¶³Ì´úÂëÖ´Ðй¦Ð§¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°üÖ÷ÒªÕë¶Ô¹¹½¨»òά»¤Discord»úеÈ˵Ŀª·¢Ö°Ô±£¬£¬£¬£¬£¬£¬ÕâЩ¿ª·¢Ö°Ô±¿ÉÄÜ»áÔÚδ¾­ÆÕ±éÉó²éµÄÇéÐÎÏÂ×°ÖôËÀ๤¾ß¡£¡£¡£¡£ÓÉÓÚPyPI²»»á¶ÔÉÏ´«µÄÈí¼þ°ü¾ÙÐÐÉî¶ÈÇå¾²ÉóºË£¬£¬£¬£¬£¬£¬¹¥»÷Õß³£Ê¹ÓÃÕâÒ»µã£¬£¬£¬£¬£¬£¬Í¨¹ýÎóµ¼ÐÔÐÎò¡¢Õýµ±Ãû³Æ»ò¸´ÖÆÊ¢ÐÐÏîÄ¿´úÂëÀ´Ê¹¶ñÒâÈí¼þ°üÏԵÿÉÐÅ¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬£¬¶ñÒâÈí¼þ°ü±ã»á½«×°±¸×ª±äΪԶ³Ì¿ØÖÆÏµÍ³£¬£¬£¬£¬£¬£¬Ö´Ðй¥»÷Õß¿ØÖƵÄÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷·¢Ë͵ÄÖ¸Áî¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý¸Ã¶ñÒâÈí¼þ»ñȡƾ֤µÈÃô¸ÐÐÅÏ¢µÄδ¾­ÊÚȨ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý¡¢¼àÊÓϵͳ»î¶¯¡¢Ô¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬£¬²¢»ñÈ¡ÓÐÖúÓÚÔÚÍøÂçÖкáÏòÒÆ¶¯µÄÐÅÏ¢¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þËäȱ·¦³¤ÆÚÐÔ»òȨÏÞÌáÉý»úÖÆ£¬£¬£¬£¬£¬£¬µ«Ê¹ÓóöÕ¾HTTPÂÖѯ¿ÉÈÆ¹ý·À»ðǽºÍÇå¾²Èí¼þ¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬£¬Ëü»á¾²Ä¬ÅþÁ¬µ½¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹¾ß±¸Í¨¹ýÌØ¶¨Òªº¦×Ö´¥·¢À´¶ÁÈ¡ºÍдÈëÖ÷»úÉÏÎļþµÄ¹¦Ð§¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-pypi-package-hides-rat-malware-targets-discord-devs-since-2022/


3. ÀÕË÷Èí¼þʹÓÃÕýµ±KickidlerÈí¼þʵÑé¹¥»÷²¢ÇÔÃÜ


5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ·ÖÖ§»ú¹¹QilinºÍHunters InternationalʹÓÃÕýµ±Ô±¹¤¼à¿ØÈí¼þKickidlerÕö¿ª¹¥»÷»î¶¯¡£¡£¡£¡£ÔÚVaronisºÍSynacktivÊӲ쵽µÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÖ²ÈëGoogle¹ã¸æ£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§µã»÷ºóÌø×ªÖÁαÔìµÄRVToolsÍøÕ¾£¬£¬£¬£¬£¬£¬´Ó¶øÏÂÔØ²¢ÔËÐб»Ä¾ÂíѬȾµÄ³ÌÐò¡£¡£¡£¡£¸Ã³ÌÐò×÷Ϊ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐÐSMOKEDHAM PowerShell .NETºóÃÅ£¬£¬£¬£¬£¬£¬½ø¶øÔÚ×°±¸Éϰ²ÅÅKickidler¡£¡£¡£¡£Kickidler¿É²¶»ñ»÷¼ü¡¢½ØÈ¡ÆÁÄ»½ØÍ¼ºÍ½¨ÉèÆÁÄ»ÊÓÆµ£¬£¬£¬£¬£¬£¬¹¥»÷Õß½è´Ë¼àÊÓÆóÒµÖÎÀíÔ±µÄ»î¶¯£¬£¬£¬£¬£¬£¬»ñÈ¡ÌØÈ¨Æ¾Ö¤¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜÒÑÉñÃØ»á¼ûÊܺ¦ÕßϵͳÊýÌìÉõÖÁÊýÖÜ£¬£¬£¬£¬£¬£¬ÒÔÊÕ¾Û»á¼ûÒìµØÔÆ±¸·ÝËùÐèµÄƾ֤¡£¡£¡£¡£Kickidlerͨ¹ý²¶»ñÖÎÀíÔ±ÊÂÇéÕ¾µÄ°´¼üºÍÍøÒ³£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Ê¶±ðÒìµØÔÆ±¸·Ý²¢»ñÈ¡ÃÜÂ룬£¬£¬£¬£¬£¬ÎÞÐè½ÓÄɸßΣº¦Õ½ÂÔ¡£¡£¡£¡£ÀÕË÷Èí¼þÔËÓªÉÌÔÚ»Ö¸´¶ñÒâ»î¶¯ºó£¬£¬£¬£¬£¬£¬°²ÅÅÕë¶ÔÊܺ¦ÕßVMware ESXi»ù´¡¼Ü¹¹µÄÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬¼ÓÃÜVMDKÐéÄâÓ²ÅÌÇý¶¯Æ÷£¬£¬£¬£¬£¬£¬Ôì³ÉÑÏÖØÆÆË𡣡£¡£¡£Hunters InternationalʹÓõİ²Åž籾ʹÓÃVMware PowerCLIºÍWinSCP AutomationÀ´Ö´ÐÐÏà¹Ø²Ù×÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ï¶àÄêÀ´Ò»Ö±ÔÚÀÄÓÃÕýµ±µÄÔ¶³Ì¼à¿ØºÍÖÎÀí£¨RMM£©Èí¼þ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/kickidler-employee-monitoring-software-abused-in-ransomware-attacks/


4. ¶íÕþ¸®Ö§³ÖColdRiver×é֯ʹÓÃLostKeys¶ñÒâÈí¼þÇÔÃÜ


5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬×Ô½ñÄêÄêÍ·Æð£¬£¬£¬£¬£¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄColdRiverºÚ¿Í×éÖ¯Ò»Á¬Ê¹ÓÃÐÂÐÍLostKeys¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¶ÔÎ÷·½Õþ¸®¡¢¼ÇÕß¡¢Öǿ⼰·ÇÕþ¸®×éÖ¯·¢¶¯Ìع¤¹¥»÷ÒÔÇÔÈ¡Îļþ¡£¡£¡£¡£12Ô£¬£¬£¬£¬£¬£¬Ó¢¹úºÍÎåÑÛͬÃËÈ·ÈϸÃ×éÖ¯Óë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±£´æ¹ØÁª¡£¡£¡£¡£¹È¸èÍþвÇ鱨С×飨GTIG£©ÓÚ1ÔÂÊ״η¢Ã÷LostKeys±»¸ß¶ÈÑ¡ÔñÐԵذ²ÅÅ£¬£¬£¬£¬£¬£¬×÷ΪClickFixÉç»á¹¤³Ì¹¥»÷µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÓÕÆ­Ä¿µÄÔËÐжñÒâPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÌØÊâPowerShell¸ºÔØ£¬£¬£¬£¬£¬£¬×îÖÕ°²Åű»×·×ÙΪLostKeysµÄVisual Basic Script£¨VBS£©Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£GTIGÖ¸³ö£¬£¬£¬£¬£¬£¬LOSTKEYSÄÜ´ÓÓ²±àÂëµÄÀ©Õ¹ÃûºÍĿ¼ÁбíÖÐÇÔÈ¡Îļþ£¬£¬£¬£¬£¬£¬²¢Ïò¹¥»÷Õß·¢ËÍϵͳÐÅÏ¢ºÍÕýÔÚÔËÐеÄÀú³Ì¡£¡£¡£¡£ColdRiver¹ß³£ÇÔȡƾ֤ÒÔÇÔȡĿµÄµç×ÓÓʼþºÍÁªÏµÈË£¬£¬£¬£¬£¬£¬ÈôÐè»á¼ûÄ¿µÄϵͳÎĵµ£¬£¬£¬£¬£¬£¬»¹»á°²ÅÅSPICA¶ñÒâÈí¼þ¾ÙÐÐÑ¡ÔñÐÔ»ñÈ¡¡£¡£¡£¡£LOSTKEYSÉè¼ÆÄ¿µÄÓëColdRiverÀàËÆ£¬£¬£¬£¬£¬£¬ÇÒ½öÔÚÌØ¶¨ÇéÐÎϰ²ÅÅ¡£¡£¡£¡£ColdRiver×Ô2017ÄêÆð±ãʹÓÃÉç»á¹¤³ÌѧºÍ¿ªÔ´Ç鱨ÊÖÒÕÑо¿ºÍÒýÓÕÄ¿µÄ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/google-links-new-lostkeys-data-theft-malware-to-russian-cyberspies/


5. ÃÀ¶à²¿·Ö¾¯±¨ÓÍÆøÐÐÒµICS/SCADAÏµÍ³ÃæÁÙÍøÂç¹¥»÷Íþв


5ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¾Ö£¨CISA£©¡¢Áª°îÊÓ²ì¾Ö£¨FBI£©¡¢ÇéÐα£»£»¤¾Ö£¨EPA£©ºÍÄÜÔ´²¿£¨DoE£©ÓÚÖܶþÁªºÏÐû²¼¾¯±¨£¬£¬£¬£¬£¬£¬¾ÍÕë¶ÔÃÀ¹úʯÓͺÍ×ÔÈ»ÆøÐÐÒµµÄÍøÂç¹¥»÷·¢³öÖÒÑÔ¡£¡£¡£¡£Õþ¸®»ú¹¹Ö¸³ö£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Ëä½ÓÄÉ»ù±¾ÈëÇÖÊÖÒÕ£¬£¬£¬£¬£¬£¬µ«Òªº¦»ù´¡ÉèÊ©×éÖ¯ÍøÂçÇå¾²ÎÀÉú״̬²»¼Ñ£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹ÉõÖÁÎïÀíË𻵡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬£¬£¬£¬Ò»Ð©ÊÖÒÕ²»Ì«ÖØ´óµÄÍøÂçÐÐΪÕßÕýÃé×¼ÃÀ¹úÒªº¦»ù´¡ÉèÊ©²¿·Ö£¨ÓÈÆäÊÇÄÜÔ´ºÍ½»Í¨ÏµÍ³£©µÄ¹¤Òµ¿ØÖÆÏµÍ³/¼à¿ØÓëÊý¾ÝÊÕÂÞϵͳ£¨ICS/SCADA£©·¢¶¯¹¥»÷¡£¡£¡£¡£ÕâЩÍþвÐÐΪÕߺܿÉÄÜÊǺڿÍÐж¯Ö÷ÒåÕûÌå»ò×ԳƺڿÍÐж¯Ö÷ÒåÕߵĺڿͣ¬£¬£¬£¬£¬£¬½üÄêÀ´ËûÃÇÒѶà´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÊܱ£»£»¤»òʹÓÃĬÈÏÃÜÂëµÄSCADA¼°ÆäËûICSϵͳ·¢¶¯¹¥»÷¡£¡£¡£¡£¹¤ÒµÍøÂçÇ徲ר¼ÒÖÒÑԳƣ¬£¬£¬£¬£¬£¬Ö»¹ÜºÚ¿ÍµÄÐí¶à˵·¨±»Ç¿µ÷£¬£¬£¬£¬£¬£¬µ«ÕâЩ¹¥»÷ÈÔ¿ÉÄܱ¬·¢ÖØ´óÓ°Ïì¡£¡£¡£¡£ÎªÓ¦¶ÔÕâЩÍþв£¬£¬£¬£¬£¬£¬CISA¡¢FBI¡¢EPAºÍDoE±Þ²ßÒªº¦»ù´¡ÉèÊ©×éÖ¯Á¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬¸ÄÉÆÍøÂçÇå¾²Ì¬ÊÆ¡£¡£¡£¡£Ïêϸ²½·¥°üÀ¨È·±£ÔËÓªÊÖÒÕ£¨OT£©ÏµÍ³ÎÞ·¨Ö±½Ó´Ó»¥ÁªÍø»á¼û£¬£¬£¬£¬£¬£¬Í¨¹ýÐéÄâרÓÃÍøÂ磨VPN£©¡¢Ç¿ÃÜÂëºÍ·À´¹ÂÚ¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©Çå¾²µØÔ¶³Ì»á¼ûËüÃÇ£¬£¬£¬£¬£¬£¬Ê¶±ð²¢¸ü¸ÄĬÈÏÃÜÂ룬£¬£¬£¬£¬£¬¶ÔÒªº¦ÏµÍ³ÊµÑéÍøÂç·Ö¶Î£¬£¬£¬£¬£¬£¬²¢È·±£Äܹ»ÊÖ¶¯²Ù×÷OTϵͳ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬½¨Òé×éÖ¯ÓëÏà¹ØÊµÌåÏàÖú£¬£¬£¬£¬£¬£¬Ê¶±ð²¢½â¾ö¿ÉÄܱ£´æµÄÉèÖùýʧ¡£¡£¡£¡£


https://www.securityweek.com/us-warns-of-hackers-targeting-ics-scada-at-oil-and-gas-organizations/


6. iOSÓÎÏ·½ü50ÍòÓû§Êý¾Ýй¶ÇÒÓ²±àÂëÉñÃØÔâÆØ¹â


5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬iOSÓÎÏ·¡°Cats Tower£ºThe Cat Game£¡¡±±£´æÑÏÖØÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬£¬ÖÂʹ½ü50ÍòÓû§ÃæÁٺڿ͹¥»÷Σº¦¡£¡£¡£¡£CybernewsÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¸ÃÓÎϷй¶ÁËÍæ¼ÒµÄIPµØµã¡¢Óû§Ãû¡¢FacebookÓû§ID¼°»á¼ûÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ºÚ¿ÍÓÃÓÚ×·×ÙÓû§ÔÚÏ߻¡¢Ð®ÖÆFacebookÕË»§£¬£¬£¬£¬£¬£¬ÉõÖÁ׼ȷ¶¨Î»Óû§Î»Öᣡ£¡£¡£Ö»¹ÜIPµØµã²¢·ÇGPS×ø±ê£¬£¬£¬£¬£¬£¬µ«Á¬ÏµÆäËûÊý¾ÝÈÔ¿ÉÌṩ½Ï׼ȷµÄλÖÃÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÓÉÓÚFirebaseÉèÖùýʧ£¬£¬£¬£¬£¬£¬¸ÃÓ¦Óû¹Ð¹Â¶ÁËÁè¼Ý45ÍòÓû§µÄIPµØµãºÍÓû§Ãû£¬£¬£¬£¬£¬£¬ÒÔ¼°229¸öFacebookÓû§IDºÍ»á¼ûÁîÅÆ¶Ô¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓôúÂë¿âÖл¹³äÂú×Ų»Ó¦±»¹ûÕæµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬Èç¿Í»§¶ËID¡¢APIÃÜÔ¿¡¢ÏîÄ¿IDµÈ£¬£¬£¬£¬£¬£¬ÕâЩӲ±àÂëµÄÉñÃØÒ»µ©±»ÕÆÎÕ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¾ÍÄÜ»æÖƳöÓ¦ÓóÌÐòµÄÕû¸öºó¶Ë»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬ÀÄÓÃÆäЧÀÍÍøÂç¸ü¶àÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬ÉõÖÁÖ±½Óͨ¹ýÓ¦Óûù´¡ÉèÊ©·¢ËÍÀ¬»øÓʼþ£¬£¬£¬£¬£¬£¬´Ó¶ø½«ÆäÎäÆ÷»¯¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñÊÇCybernewsÊÓ²ìµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÆÊÎöÁËÔ¼8%µÄApp StoreÓ¦Ó㬣¬£¬£¬£¬£¬·¢Ã÷71%µÄÊÜÆÊÎöÓ¦ÓÃÖÁÉÙй¶ÁËÒ»¸öÉñÃØÐÅÏ¢£¬£¬£¬£¬£¬£¬Æ½¾ùÿ¸öÓ¦ÓÃй¶5.2¸ö¡£¡£¡£¡£Ä³Ð©°¸ÀýÖУ¬£¬£¬£¬£¬£¬ÈÈÃÅÔ¼»áÓ¦ÓÃй¶ÁËÓû§ÕÕÆ¬£¬£¬£¬£¬£¬£¬¼ÒÍ¥×·×ÙÓ¦ÓÃй¶ÁËʵʱGPS×ø±ê£¬£¬£¬£¬£¬£¬À¬»øÓʼþ×èµ²Æ÷Ôòй¶Á˱»×èµ²µÄºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£


https://cybernews.com/security/cats-tower-iphone-data-leak/