Horabot¶ñÒâÈí¼þÕë¶ÔÀÃÀ¶à¹úWindowsÓû§Ìᳫд¹ÂÚ¹¥»÷
Ðû²¼Ê±¼ä 2025-05-151. Horabot¶ñÒâÈí¼þÕë¶ÔÀÃÀ¶à¹úWindowsÓû§Ìᳫд¹ÂÚ¹¥»÷
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»³¡Õë¶ÔÀ¶¡ÃÀÖÞ¹ú¼ÒWindowsÓû§µÄд¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔÄ«Î÷¸ç¡¢Î£µØÂíÀ¡¢¸çÂ×±ÈÑÇ¡¢ÃØÂ³¡¢ÖÇÀûºÍ°¢¸ùÍ¢µÈ¹ú£¬£¬£¬£¬£¬£¬Ê¹ÓÃÃûΪHorabotµÄ¶ñÒâÈí¼þÕö¿ª¹¥»÷¡£¡£¡£¸Ã»î¶¯ÓÚ2025Äê4Ô±»ÊӲ쵽£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓïÓû§¡£¡£¡£ÒÔ·¢Æ±ÎªÓÕ¶ü£¬£¬£¬£¬£¬£¬Í¨¹ý´¹ÂÚÓʼþÓÕʹÓû§·¿ª°üÀ¨PDFÎĵµµÄZIPѹËõ°ü£¬£¬£¬£¬£¬£¬ÊµÔòÄÚº¬¶ñÒâHTMLÎļþ£¬£¬£¬£¬£¬£¬ÓÃÓÚÅþÁ¬Ô¶³ÌЧÀÍÆ÷ÏÂÔØµÚ¶þ½×¶Î¶ñÒâÔØºÉ¡£¡£¡£µÚ¶þ½×¶ÎÔØºÉΪ°üÀ¨HTMLÓ¦ÓóÌÐò£¨HTA£©ÎļþµÄZIPѹËõ°ü£¬£¬£¬£¬£¬£¬¸ÃÎļþ¼ÓÔØÔ¶³ÌЧÀÍÆ÷Íйܵľ籾£¬£¬£¬£¬£¬£¬¾ç±¾×¢ÈëÍⲿVBScript´úÂëÖ´ÐÐһϵÁмì²â£¬£¬£¬£¬£¬£¬ÈôϵͳװÖÃAvastɱ¶¾Èí¼þ»ò´¦ÓÚÐéÄâÇéÐÎÔòÖÕÖ¹¹¥»÷¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬VBScript»áÍøÂç»ù´¡ÏµÍ³ÐÅÏ¢²¢Íâ´«ÖÁÔ¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Í¬Ê±»ñÈ¡ÌØÊâÔØºÉ£¬£¬£¬£¬£¬£¬°üÀ¨ÊÍ·ÅÒøÐÐľÂíµÄAutoIt¾ç±¾ºÍÈö²¥´¹ÂÚÓʼþµÄPowerShell¾ç±¾¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Horabot»¹ÄÜ´Ó¶àÖÖä¯ÀÀÆ÷ÇÔÈ¡Ïà¹ØÊý¾Ý£¬£¬£¬£¬£¬£¬³ýÊý¾ÝÇÔÈ¡Í⣬£¬£¬£¬£¬£¬»¹¼à¿ØÊܺ¦ÕßÐÐΪ£¬£¬£¬£¬£¬£¬×¢ÈëαÔ쵯´°ÒÔÇÔÈ¡Ãô¸ÐµÇ¼ƾ֤¡£¡£¡£
https://thehackernews.com/2025/05/horabot-malware-targets-6-latin.html
2. ¹È¸èÖÒÑÔ¡°ÊèÉ¢Ö©Ö롱ºÚ¿Íת¹¥ÃÀ¹úÁãÊÛÉÌ
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬¹È¸è½ñÈÕÖÒÑÔ£¬£¬£¬£¬£¬£¬Ê¹Óá°ÊèÉ¢Ö©Ö롱£¨Scattered Spider£¬£¬£¬£¬£¬£¬Ò²³ÆUNC3944µÈ£©Õ½ÂÔ¹¥»÷Ó¢¹úÁãÊÛÁ¬ËøµêµÄºÚ¿Í£¬£¬£¬£¬£¬£¬Òѽ«Ä¿µÄתÏòÃÀ¹úÁãÊÛÉÌ¡£¡£¡£¹È¸èÍþвÇ鱨¼¯ÍÅÊ×ϯÆÊÎöʦԼº²¡¤ºÕ¶û¿üË¹ÌØÌåÏÖ£¬£¬£¬£¬£¬£¬ÃÀ¹úÁãÊÛÒµÕý³ÉΪÀÕË÷Èí¼þºÍÚ²ÆÀÕË÷Ðж¯µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬ÏÓÒÉÓë¡°ÊèÉ¢Ö©Ö롱Óйء£¡£¡£¸Ã×éÖ¯ºã¾ÃÇÄÈ»ºóתÏòÓ¢¹úÁãÊÛÒµ£¬£¬£¬£¬£¬£¬Ô¤¼Æ¶ÌÆÚÄÚÈÔ»áÒÔ´ËΪĿµÄ¡£¡£¡£Ó¢¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õÔøÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃDragonForce¼ÓÃÜÆ÷¼ÓÃÜVMware ESXiÖ÷»úÉϵÄÐéÄâ»ú£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±»¹é×ïÓÚ¡°ÊèÉ¢Ö©Ö롱¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÏàÖúÉçºÍ¹þÂ޵°ٻõ¹«Ë¾Ò²»®·ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ç°ÕßÊý¾Ý±»ÇÔ£¬£¬£¬£¬£¬£¬ºóÕß±»ÆÈÏÞÖÆÍøÕ¾»¥ÁªÍø»á¼û¡£¡£¡£DragonForceÀÕË÷Èí¼þ×éÖ¯Ðû²¼¶ÔÕâÈýÆð¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬²ß»®ÕßʹÓÃÁËÓë¡°ÊèÉ¢Ö©Ö롱ÏàͬµÄÉç»á¹¤³ÌѧսÂÔ¡£¡£¡£¡°ÊèÉ¢Ö©Ö롱ÊÇһȺÁ÷¶¯µÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬ÒÔÖØ´óµÄÉç»á¹¤³Ì¹¥»÷ÈëÇÖÈ«Çò×ÅÃû×éÖ¯¶øÖøÃû£¬£¬£¬£¬£¬£¬¹¥»÷·½·¨Éæ¼°ÍøÂç´¹ÂÚ¡¢SIM¿¨½»Á÷¡¢MFAºäÕ¨µÈ¡£¡£¡£²¿·Ö¡°ÊèÉ¢Ö©Ö롱ÍþвÐÐΪÕß±»ÒÔΪÊÇ¡°Com¡±µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öËÉÉ¢ÁªÏµµÄÉçÇø£¬£¬£¬£¬£¬£¬¼ÓÈëÍøÂç¹¥»÷µÈÐÐΪ¡£¡£¡£ÕâÐ©ÍøÂç·¸·¨·Ö×Ó¶àΪӢÓïʹÓÃÕߣ¬£¬£¬£¬£¬£¬³£ÔÚTelegramƵµÀ¡¢DiscordЧÀÍÆ÷ºÍºÚ¿ÍÂÛ̳²ß»®ÊµÑé¹¥»÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/
3. BianLianºÍRansomExxʹÓÃSAP NetWeaverÎó²î
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓòÆØ³ö¶à¸öÍþвÐÐΪÕßʹÓÃSAP NetWeaverÇå¾²Îó²î¾ÙÐй¥»÷µÄÊÂÎñ¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾ReliaQuest×îÐÂÐÂÎÅ£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐÁ½¸ö²î±ðµÄÍøÂç·¸·¨¼¯ÍÅBianLianºÍRansomExx¼ÓÈëÁËʹÓøÃÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£ReliaQuest·¢Ã÷ÁËBianLianÊý¾ÝÀÕË÷ÍŶӺÍRansomExxÀÕË÷Èí¼þ¼Ò×壨΢Èí×·×ÙÃû³ÆÎªStorm-2460£©¼ÓÈë¹¥»÷µÄÖ¤¾Ý¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬BianLian±»ÆÀ¹ÀΪÖÁÉÙÉæ¼°Ò»ÆðÊÂÎñ£¬£¬£¬£¬£¬£¬ÒòÆä»ù´¡ÉèÊ©Á´½ÓÓëÏÈǰȷ¶¨µÄ¸Ãµç×Ó·¸·¨¼¯ÍŵÄIPµØµãÏà¹Ø¡£¡£¡£ReliaQuest»¹ÊӲ쵽£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪPipeMagicµÄ»ùÓÚ²å¼þµÄľÂí±»°²ÅÅÔÚ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬¸ÃľÂíÓëWindowsͨÓÃÈÕÖ¾Îļþϵͳ£¨CLFS£©ÖеÄȨÏÞÌáÉýÎó²î£¨CVE-2025-29824£©µÄÁãÈÕÎó²îʹÓÃÓйأ¬£¬£¬£¬£¬£¬²¢ÔÚÕë¶Ô¶à¹úʵÌåµÄÓÐÏÞ¹¥»÷Öб»Ê¹Óᣡ£¡£¹¥»÷Õßͨ¹ýʹÓÃSAP NetWeaverÎó²îͶ·ÅWeb ShellÀ´´«ËÍPipeMagic£¬£¬£¬£¬£¬£¬Ö»¹ÜÊ×´ÎʵÑéʧ°Ü£¬£¬£¬£¬£¬£¬µ«ºóÐø¹¥»÷Àֳɰ²ÅÅÁËBrute Ratel C2¿ò¼Ü¡£¡£¡£SAPÇå¾²¹«Ë¾OnapsisÔò͸¶£¬£¬£¬£¬£¬£¬×Ô2025Äê3ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÒ»Ö±ÔÚʹÓøÃÎó²î¼°Í³Ò»×é¼þÖеķ´ÐòÁл¯Îó²î£¨CVE-2025-42999£©¾ÙÐй¥»÷¡£¡£¡£Ö»¹ÜCVE-2025-42999ÐèÒª¸ü¸ßȨÏÞ£¬£¬£¬£¬£¬£¬µ«CVE-2025-31324ÄÜÌṩÍêȫϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬Òò´ËÁ½¸öÎó²îµÄµ÷½â½¨ÒéÏàͬ£¬£¬£¬£¬£¬£¬¼´Ö»ÒªCVE-2025-31324Îó²î±£´æ£¬£¬£¬£¬£¬£¬¾ÍÐèÁ¬Ã¦ÐÞ²¹ÒÔÌá·ÀDZÔÚ¹¥»÷¡£¡£¡£
https://thehackernews.com/2025/05/bianlian-and-ransomexx-exploit-sap.html
4. °Ä´óÀûÑÇÈËȨίԱ»áÍøÕ¾ÏÖÒâÍâÊý¾Ýй¶
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬°Ä´óÀûÑÇÈËȨίԱ»á£¨AHRC£©Í¸Â¶£¬£¬£¬£¬£¬£¬2025Äê4ÔÂÖÁ5ÔÂʱ´ú£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾±¬·¢ÁËÒ»ÆðÒâÍâÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Éæ¼°600¶à·ÝÌá½»ºÍÌáÃûµÄÄÚÈÝ¡£¡£¡£4ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬AHRC·¢Ã÷3ÔÂ24ÈÕÖÁ4ÔÂ10ÈÕʱ´úÉÏ´«µ½Í¶ËßÍøÂç±íµ¥µÄ¸½¼þÔÚ4ÔÂ3ÈÕÖÁ4ÔÂ10ÈÕʱ´ú±»¹ûÕæÐû²¼²¢Ôâ»á¼û¡£¡£¡£5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬¸ÃίԱ»áÓÖ·¢Ã÷¸ü¶àÎļþ±»ÆØ¹â£¬£¬£¬£¬£¬£¬ÕâЩÎļþÊÇÌá½»¸øÍøÂç±íµ¥µÄ¸½¼þ£¬£¬£¬£¬£¬£¬ÓÃÓÚ·´Ïì¡°ÂÄÀú̸֮¡±ÏîÄ¿¡¢2023ÄêÈËȨ½±ÌáÃû¼°¹ú¼Ò·´ÖÖ×åÖ÷Òå¿ò¼Ü¿´·¨ÎļþµÄÒâ¼û£¬£¬£¬£¬£¬£¬ÆØ¹âʱ¼äΪ4ÔÂ3ÈÕÖÁ5ÔÂ5ÈÕ¡£¡£¡£AHRCÔÚ5ÔÂ13ÈÕµÄÊý¾Ýй¶֪ͨÖÐÖ¸³ö£¬£¬£¬£¬£¬£¬Ô¼Äª670·ÝÎļþ¿ÉÄÜÒò¹ýʧ¶ø±»Ð¹Â¶£¬£¬£¬£¬£¬£¬ÆäÖÐÔ¼100·ÝÎļþÒÑͨ¹ý¹È¸è»ò±ØÓ¦µÈËÑË÷ÒýÇæÔÚÏß»á¼û£¬£¬£¬£¬£¬£¬ÇÒÐí¶àÎļþ°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£AHRCÌåÏÖÒѽÓÄÉÐж¯½â¾öй¶ÎÊÌ⣬£¬£¬£¬£¬£¬²¢ÇëÇó½«ÕâЩÎļþ´ÓËÑË÷ÒýÇæÖÐɾ³ý¡£¡£¡£´Ë´ÎÐÅϢй¶²¢·Ç¶ñÒâ»ò·¸·¨¹¥»÷ËùÖ£¬£¬£¬£¬£¬£¬AHRC½«Ëæ×ÅÊÓ²ìÉîÈëÌṩ×îÐÂÐÅÏ¢¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬£¬ÌØ×¼Ê±¼ä¶ÎÄÚʹÓÃÍøÂç±í¸ñÌύͶËß¡¢Òâ¼û»òÌáÃûµÄÈË¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¿£¿ÉÄܱ»Ð¹Â¶µÄÊý¾Ý°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢×¡Õ¬µØµã¡¢ÊÖ»úºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬AHRCÕýÔÚÈ·ÈÏÊÜÓ°ÏìÈËÊý£¬£¬£¬£¬£¬£¬²¢ÊÓ²ìÊÂÎñÔµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬Í¬Ê±ÒѽûÓÃËùÓÐÍøÂç±íµ¥¡£¡£¡£¸ÃίԱ»áÒѽ¨ÉèרÃÅС×éÓ¦¶Ô´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬²¢½ÓÄɲ½·¥×èÖ¹½øÒ»²½»á¼ûÊÜÓ°ÏìÎļþ¡£¡£¡£
https://www.cyberdaily.au/security/12090-breaking-personal-information-exposed-by-australian-human-rights-commission-data-breach
5. ÃÀ¹úŦ¿Â¹«Ë¾ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬²¿Ñ§Éú²úÔÝÍ£
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú×î´ó¸ÖÌúÉú²úÉÌŦ¿Â¹«Ë¾¿ËÈÕÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÆä²¿·ÖÍøÂçÏÂÏß²¢ÊµÑéÁË×èÖ¹²½·¥¡£¡£¡£´Ë´ÎÊÂÎñÔì³É¸Ã¹«Ë¾¶à¸öËùÔÚÉú²úÔÝÍ££¬£¬£¬£¬£¬£¬µ«ÖÜȫӰÏìÉдýÆÀ¹À¡£¡£¡£Å¦¿Â¹«Ë¾²»µ«ÊÇÃÀ¹úÖ÷ÒªµÄ¸ÖÌúÉú²úÉÌ£¬£¬£¬£¬£¬£¬Ò²ÊDZ±ÃÀÖ÷ÒªµÄ·Ï¸Ö½ÓÄÉÉÌ£¬£¬£¬£¬£¬£¬Æä¸Ö½î²úÆ·ÆÕ±éÓ¦ÓÃÓÚÃÀ¹úÐÞ½¨¡¢ÇÅÁº¡¢õè¾¶ºÍ»ù´¡ÉèÊ©ÁìÓò¡£¡£¡£¹«Ë¾ÔÚÃÀ¹ú¡¢Ä«Î÷¸çºÍ¼ÓÄôóÓµÓÐÖڶ๤³§£¬£¬£¬£¬£¬£¬Ô±¹¤×ÜÊýÁè¼Ý32,000ÈË£¬£¬£¬£¬£¬£¬½ñÄêµÚÒ»¼¾¶ÈÊÕÈë¸ß´ï78.3ÒÚÃÀÔª¡£¡£¡£¸Ã¹«Ë¾ÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©µÄ8-KÎļþÖÐÅû¶ÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬ÎļþÖÐÖ¸³ö£¬£¬£¬£¬£¬£¬Å¦¿Â¹«Ë¾·¢Ã÷ÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬É漰δ¾ÊÚȨµÄµÚÈý·½»á¼ûÆäÐÅÏ¢ÊÖÒÕϵͳ¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬¹«Ë¾Ñ¸ËÙÆô¶¯ÁËÓ¦¼±ÏìÓ¦ÍýÏ룬£¬£¬£¬£¬£¬×Ô¶¯ÏÂÏß¿ÉÄÜÊÜÓ°ÏìµÄϵͳ£¬£¬£¬£¬£¬£¬²¢½ÓÄÉÁËÆäËû×èÖ¹¡¢µ÷½âºÍ»Ö¸´²½·¥¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Å¦¿Â¹«Ë¾ÒÑִ֪ͨ·¨²¿·Ö£¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÊӲ졣¡£¡£Ö»¹Ü²¿Ñ§Éú²ú×÷ÒµÒÑÔÝÍ££¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÌåÏÖÕýÔÚÖð²½ÖØÆô¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¹ØÓÚ¹¥»÷µÄÏêϸÈÕÆÚºÍÀàÐÍ£¬£¬£¬£¬£¬£¬¹«Ë¾²¢Î´ÌṩÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬Òò´ËÎÞ·¨È·¶¨¸ÃÊÂÎñÊÇ·ñÉæ¼°Êý¾Ý͵ÇÔ»ò¼ÓÃÜ¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/steel-giant-nucor-corporation-facing-disruptions-after-cyberattack/
6. ·¨¹úµÏ°ÂÅûÂ¶ÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬¿Í»§ÐÅϢй¶
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úÉݳÞʱÉÐÆ·ÅƵϰÂÅû¶ÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäʱװ¼°ÅäÊοͻ§ÐÅϢй¶¡£¡£¡£¹«Ë¾½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬·¢Ã÷δ¾ÊÚȨµÄÍⲿ»ú¹¹»á¼ûÁËΪµÏ°ÂʱװºÍÅäÊοͻ§ÉúÑĵIJ¿·ÖÊý¾Ý¡£¡£¡£µÏ°ÂÁ¬Ã¦½ÓÄɲ½·¥¿ØÖÆÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÔÚ¶¥¼âÍøÂçÇ徲ר¼ÒµÄÖ§³ÖÏÂÒ»Á¬ÊÓ²ìÓ¦¶Ô¡£¡£¡£¾ÝµÏ°Â³ÎÇ壬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¢Î´Ð¹Â¶ÕË»§ÃÜÂë»òÖ§¸¶¿¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒòÕâЩÐÅÏ¢´æ´¢ÔÚÁíһδÊÜÓ°ÏìµÄÊý¾Ý¿âÖС£¡£¡£µÏ°ÂÌåÏÖÕýÔÚÆð¾¢Æ¾Ö¤ÊÊÓÃÖ´·¨Í¨ÖªÏà¹Øî¿Ïµ»ú¹¹ºÍ¿Í»§£¬£¬£¬£¬£¬£¬²¢¶Ô¿ÉÄܸø¿Í»§´øÀ´µÄµ£ÐÄ»òδ±ãÉî¸ÐÇ¸ØÆ¡£¡£¡£Ö»¹ÜµÏ°ÂδÏêϸ˵Ã÷ÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿ºÍµØÇø£¬£¬£¬£¬£¬£¬µ«ÒÑÈ·ÈϺ«¹úÍøÕ¾Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÇÒÖйú¿Í»§Ò²ÊÕµ½ÁË×ÊÁÏй¶֪ͨ¡£¡£¡£ÍøÉÏÈö²¥µÄ֪ͨ½ØÍ¼ÏÔʾ£¬£¬£¬£¬£¬£¬ÊÂÎñÓÚ5ÔÂ7ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬É漰δ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬Ì»Â¶Á˿ͻ§ÐÕÃû¡¢ÐԱ𡢵绰ºÅÂë¡¢µç×ÓÓʼþ¡¢ÓÊÕþµØµã¼°¹ºÖÃÀúÊ·¼Í¼µÈÐÅÏ¢¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬µÏ°ÂÔÚº«¹úÒòδÏòËùÓÐÏà¹Ø²¿·Öת´ïÊý¾Ýй¶ÊÂÎñ¶øÃæÁÙÖ´·¨Éó²é¡£¡£¡£µÏ°Â½¨ÒéÖ÷¹Ë¶ÔÍøÂç´¹ÂÚÐÐΪ¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦ÁªÏµ¾Ù±¨Æ·ÅÆÃ°³äÇéÐΡ£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì¿Í»§ÊýÄ¿ºÍ¹ú¼ÒµÄÏêϸÐÅÏ¢ÉÐδ¹ûÕæÅû¶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fashion-giant-dior-discloses-cyberattack-warns-of-data-breach/