¿¨µØÑÇϵͳÔâºÚ¿ÍÈëÇÖµ¼Ö¿ͻ§ÐÅϢй¶
Ðû²¼Ê±¼ä 2025-06-031. ¿¨µØÑÇϵͳÔâºÚ¿ÍÈëÇÖµ¼Ö¿ͻ§ÐÅϢй¶
6ÔÂ2ÈÕ£¬£¬£¬£¬£¬ÉݳÞʱÉÐÆ·ÅÆ¿¨µØÑÇ¿ËÈÕÏò¿Í»§·¢³öÖÒÑÔ£¬£¬£¬£¬£¬³ÆÆäϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£ÔÚ֪ͨÐÅÖУ¬£¬£¬£¬£¬¿¨µØÑÇ͸¶ºÚ¿Í»ñÈ¡ÁËÆäϵͳµÄÔÝʱ»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁËÓÐÏÞÊýÄ¿µÄ¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨¿Í»§ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍËùÔÚ¹ú¼Ò£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÃÜÂë¡¢ÐÅÓÿ¨ºÅ»òÒøÐÐÏêϸÐÅÏ¢µÈ¸üÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¿£¿£¿£¿¨µØÑÇÇ¿µ÷ÒÑ¿ØÖÆ×¡ÎÊÌ⣬£¬£¬£¬£¬²¢ÔöÇ¿ÁËϵͳºÍÊý¾ÝµÄ±£»£»£»¤£¬£¬£¬£¬£¬Í¬Ê±¼û¸æÖ´·¨²¿·Ö£¬£¬£¬£¬£¬ÕýÓëÍâ²¿ÍøÂçÇå¾²¹«Ë¾ÏàÖúÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÇå¾²Îó²î²¢·Ç¸öÀý£¬£¬£¬£¬£¬ÒÑÍùÒ»¸öÔÂÄÚ£¬£¬£¬£¬£¬ÆäËûʱÉÐÆ·ÅÆÒ²Åû¶ÁËÀàËÆÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£½ñÄê5Ô£¬£¬£¬£¬£¬µÏ°ÂÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÈëÇÖÆäϵͳ£¬£¬£¬£¬£¬ÇÔÈ¡Á˿ͻ§µÄÁªÏµ·½·¨¡¢¹ºÖÃÀúÊ·¼Í¼ºÍÆ«ºÃÉèÖ㻣»£»Í¬ÑùÔÚÉϸöÔ£¬£¬£¬£¬£¬°¢µÏ´ï˹ÖÒÑÔ¿Í»§£¬£¬£¬£¬£¬ÆäÒ»¼ÒµÚÈý·½Ð§ÀÍÌṩÉÌÔâÓöÈëÇÖ£¬£¬£¬£¬£¬µ¼ÖÂÁªÏµÐÅϢй¶£¬£¬£¬£¬£¬µ«Î´»ñÈ¡¸¶¿îÏêÇé»òÕË»§Æ¾Ö¤£»£»£»ÉÏÖÜ£¬£¬£¬£¬£¬Î¬¶àÀûÑǵÄÉñÃØÒòÒ»Á¬Çå¾²ÊÂÎñ¹Ø±ÕÁËÆäÍøÕ¾ºÍ²¿·ÖÊÐËÁЧÀÍ£¬£¬£¬£¬£¬²¢ÒÑÓëÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ졣¡£¡£¡£¡£¡£ÕâһϵÁÐÊÂÎñÅú×¢£¬£¬£¬£¬£¬Ê±ÉÐÆ·ÅÆÕýÃæÁÙ×ÅÈÕÒæÑÏËàµÄÍøÂçÇå¾²ÌôÕ½£¬£¬£¬£¬£¬ÐèÔöÇ¿Çå¾²·À»¤²½·¥£¬£¬£¬£¬£¬ÒÔ±£»£»£»¤¿Í»§ÐÅÏ¢²»±»Ð¹Â¶¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cartier-discloses-data-breach-amid-fashion-brand-cyberattacks/
2. The North FaceÔâÆ¾Ö¤Ìî³ä¹¥»÷£¬£¬£¬£¬£¬¿Í»§ÐÅϢй¶
6ÔÂ2ÈÕ£¬£¬£¬£¬£¬»§Íâ´ò°çÁãÊÛÉÌThe North FaceÖÒÑÔ¿Í»§£¬£¬£¬£¬£¬ÆäСÎÒ˽¼ÒÐÅÏ¢ÔÚ4ÔÂ·ÝµÄÆ¾Ö¤Ìî³ä¹¥»÷Öб»µÁ¡£¡£¡£¡£¡£¡£The North Face×÷ΪÃÀ¹ú´óÐÍ»§Íâ´ò°çºÍ×°±¸Æ·ÅÆ£¬£¬£¬£¬£¬ÄêÊÕÈ볬30ÒÚÃÀÔª£¬£¬£¬£¬£¬µç×ÓÉÌÎñÕ¼Æä×ÜÏúÊÛ¶îµÄ42%¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ìî³ä¹¥»÷ÖУ¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÏÈǰÊý¾Ýй¶ÖÐ̻¶µÄÓû§Ãû - ÃÜÂë¶Ô×Ô¶¯µÇ¼£¬£¬£¬£¬£¬ÊÔͼ»ñÈ¡Óû§ÕÊ»§Î´¾ÊÚȨµÄ»á¼û£¬£¬£¬£¬£¬´ËÊÖÒÕµÃÒæÓÚ¡°Æ¾Ö¤½ÓÄÉ¡±£¬£¬£¬£¬£¬¼´Óû§¶àƽ̨ʹÓÃÏàͬÓû§ÃûºÍÃÜÂ룬£¬£¬£¬£¬µ«ÈôÕË»§ÊܶàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»¤£¬£¬£¬£¬£¬¹¥»÷»áʧ°Ü¡£¡£¡£¡£¡£¡£The North FaceÒÑ×îÏÈÏòÊÜÓ°Ïì¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬²¢Ïò·ðÃÉÌØÖÝ×ÜÉó²é³¤·ÖÏíʾÀý֪ͨ£¬£¬£¬£¬£¬¼û¸æÆäÍøÕ¾ÔÚ2025Äê4ÔÂ23ÈÕ·¢Ã÷Òì³£»£»£»î¶¯£¬£¬£¬£¬£¬¾ÊӲ죬£¬£¬£¬£¬µ±ÈÕ¹¥»÷Õß·¢¶¯ÁËС¹æÄ£Æ¾Ö¤Ìî³ä¹¥»÷¡£¡£¡£¡£¡£¡£ÒÑ̻¶µÄÊý¾Ý°üÀ¨ÐÕÃû¡¢¹ºÖÃÀúÊ·¼Í¼¡¢ÊÕ¼þµØµã¡¢µç×ÓÓʼþ¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂëµÈ£¬£¬£¬£¬£¬²»¹ý¸¶¿îÐÅϢδй¶£¬£¬£¬£¬£¬ÒòÍøÕ¾¸¶¿îÓÉÍⲿÌṩÉÌ´¦Öóͷ££¬£¬£¬£¬£¬The North Face½ö±£´æÍê³ÉÁ÷³ÌËùÐèÁîÅÆ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬The North Face¾öÒé²î³ØËùÓÐÕË»§Ç¿ÖÆÖ´ÐÐMFA£¬£¬£¬£¬£¬µ¼ÖÂÆä¿Í»§ÈºËðÊ§ÖØ´ó£¬£¬£¬£¬£¬ÕâÊÇ¸ÃÆ·ÅÆÍøÕ¾×Ô2020ÄêÒÔÀ´ÔâÓöµÄµÚËÄÆðƾ֤Ìî³äÊÂÎñ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/the-north-face-warns-customers-of-april-credential-stuffing-attack/
3. SentinelOneÒòÈí¼þȱÏÝÖÂÆßСʱȫÇòЧÀÍÖÐÖ¹
6ÔÂ2ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¹«Ë¾SentinelOneÉÏÖÜĩ͸¶£¬£¬£¬£¬£¬ÒòÈí¼þÎó²îµ¼ÖÂÆäÖÜËÄ·ºÆð³¤´ïÆßСʱµÄ¡°È«ÇòЧÀÍÖÐÖ¹¡±£¬£¬£¬£¬£¬Ó°ÏìÁ˶à¸öÃæÏò¿Í»§µÄЧÀÍ¡£¡£¡£¡£¡£¡£SentinelOneÔÚÖÜËÄÐû²¼µÄÌû×ÓÖÐÈÏ¿ÉÁË´Ë´ÎÖÐÖ¹£¬£¬£¬£¬£¬²¢Ïò¿Í»§°ü¹ÜÆäϵͳÈÔÊܱ£»£»£»¤£¬£¬£¬£¬£¬Ö»ÊÇÍйÜÏìӦЧÀÍÎÞ·¨»ñµÃ¿É¼ûÐÔ£¬£¬£¬£¬£¬ÍþвÊý¾Ý±¨¸æ½öÑÓ³Ùδɥʧ£¬£¬£¬£¬£¬ÇÒÆðÔ´ÆÊÎöÅú×¢Õâ²»ÊÇÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£Á½Ììºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼»ù´¡Ôµ¹ÊÔÓÉÆÊÎö£¬£¬£¬£¬£¬È·ÈÏÊÂÎñ²¢·ÇÍøÂç¹¥»÷»òÇå¾²Îó²îËùÖ£¬£¬£¬£¬£¬¶øÊÇ»ù´¡ÉèÊ©¿ØÖÆÏµÍ³ÖеÄÈí¼þȱÏÝÒý·¢¡£¡£¡£¡£¡£¡£¸ÃȱÏÝ×Ô¶¯É¾³ýÁËÒªº¦ÍøÂç·ÓɺÍDNSÆÊÎöÆ÷¹æÔò£¬£¬£¬£¬£¬µ¼ÖÂЧÀÍ´óÃæ»ýÖÐÖ¹¡£¡£¡£¡£¡£¡£Ïêϸ¶øÑÔ£¬£¬£¬£¬£¬Òò´«³öµÄÔÆÖÎÀí¹¦Ð§±£´æÈ±ÏÝ£¬£¬£¬£¬£¬AWS Transit Gateway·ÓɱíµÄ±¸·Ý»Ö¸´Îª¿Õ£¬£¬£¬£¬£¬ÔÚËùÓбØÐèµÄÅþÁ¬»ù´¡ÉèÊ©»Ö¸´ºó£¬£¬£¬£¬£¬Ð§ÀÍÖÐÖ¹ÈÔÒ»Á¬¡£¡£¡£¡£¡£¡£SentinelOneÚ¹Êͳƣ¬£¬£¬£¬£¬¹«Ë¾ÕýÔÚ½«Éú²úϵͳ¹ý¶Éµ½»ùÓÚ»ù´¡ÉèÊ©¼´´úÂ루IaC£©ÔÔò¹¹½¨µÄÐÂÔÆ¼Ü¹¹£¬£¬£¬£¬£¬´Ë´Îɾ³ý²Ù×÷Óɼ´½«ÆúÓõĿØÖÆÏµÍ³Òò½¨ÉèÐÂÕË»§´¥·¢¡£¡£¡£¡£¡£¡£¸Ã¿ØÖÆÏµÍ³ÉèÖýÏÁ¿¹¦Ð§±£´æÈí¼þȱÏÝ£¬£¬£¬£¬£¬¹ýʧʶ±ð²î±ð²¢Ó¦ÓÃÁËËùν׼ȷµÄÉèÖÃ״̬£¬£¬£¬£¬£¬ÁýÕÖÁËÏÈÇ°ÍøÂçÉèÖ㬣¬£¬£¬£¬µ¼Ö»ָ´ÁËÒ»¸ö¿ÕµÄ·ÓÉ±í¡£¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹»¹ÖÂʹ¶Ô¹«Ë¾Ð§À͵ijÌÐò»á¼ûÖÐÖ¹£¬£¬£¬£¬£¬Í³Ò»×ʲúÖÎÀí/¿â´æºÍÉí·ÝЧÀ͹رգ¬£¬£¬£¬£¬¿Í»§ÎÞ·¨Éó²éÎó²î»ò»á¼ûÉí·Ý¿ØÖÆÌ¨¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¿ÉÄÜ»¹Ó°ÏìÁËÀ´×ÔÖÖÖÖµÚÈý·½Ð§À͵ÄÊý¾ÝÌáÈ¡ÒÔ¼°Íйܼì²âºÍÏìÓ¦£¨MDR£©¾¯±¨¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/
4. ÍøÂç¹¥»÷Ï®»÷ÁËCovenant HealthÔËÓªµÄÒ½Ôº
6ÔÂ2ÈÕ£¬£¬£¬£¬£¬2025Äê5ÔÂ26ÈÕÆð£¬£¬£¬£¬£¬·ÇÓªÀûÐÔÌìÖ÷½ÌÇøÓòÒ½ÁƱ£½¡ÏµÍ³Covenant HealthÔËÓªµÄÈý¼ÒÒ½ÔºÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬±»ÆÈ¹Ø±ÕËùÓÐϵͳÒÔ¿ØÖÆÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£Ê¥ÂêÀöÒ½ÁÆÏµÍ³³ÆÊ¥ÂêÀöÒ½ÔºÓö¹âÔÝʱϵͳ¹ÊÕÏ£¬£¬£¬£¬£¬²¿·Öµç»°ºÍÎĵµÏµÍ³ÊÜÓ°Ï죬£¬£¬£¬£¬Ò½ÁÆÐ§ÀͼÌÐøµ«ºòÕïʱ¼ä¿ÉÄÜÑÓÉ죻£»£»Ê¥Ô¼Éª·òÒ½ÔºÌåÏÖÒòϽµµÍÙʱ¹ÊÕÏ£¬£¬£¬£¬£¬5ÔÂ27ÈÕµ÷½âÃÅÕﻯÑéЧÀÍ£¬£¬£¬£¬£¬½öÔÚÔºÇøÄÚ¿ª·ÅÇÒÆ¾ÊµÌå¶©µ¥Ìṩ¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷ÖÐÊý¾ÝÊDZ»µÁÕÕ¾ÉÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Covenant HealthÔ¼ÇëÁ˶¥¼¶ÍøÂçÇ徲ר¼ÒÀ´¿ØÖƺÍÊӲ졣¡£¡£¡£¡£¡£Ö»¹Ü²¿·ÖϵͳºÍÃÅÕïʵÑéÊÒÊÜÓ°Ï죬£¬£¬£¬£¬µ«Ð§ÀÍÈÔÔÚ¼ÌÐø£¬£¬£¬£¬£¬ÖÐֹˮƽ¼«Ð¡£¬£¬£¬£¬£¬Ðº±²¼Ê²¶ûÖݵÄʥԼɪ·òÒ½ÔººÍÃåÒòÖݵÄÁ½¼ÒÒ½Ôº¾ùÊܲ¨¼°£¬£¬£¬£¬£¬²»¹ý¸Ã»ú¹¹½¨Ò黼Õß׼ʱ¾ÍÕï¡£¡£¡£¡£¡£¡£5ÔÂ26ÈÕ·¢Ã÷Î¥¹æÐÐΪӰÏìÕû¸ö×éÖ¯ÅþÁ¬ÐԺ󣬣¬£¬£¬£¬³öÓÚÉóÉ÷˼Á¿£¬£¬£¬£¬£¬Ò½Ôº¡¢ÕïËùºÍÒ½ÁÆÐ§ÀÍÌṩÕßµÄËùÓÐÊý¾Ýϵͳ»á¼û±»Á¬Ã¦×èÖ¹¡£¡£¡£¡£¡£¡£×èֹ׫д±¾ÎÄʱ£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/178507/cyber-crime/a-cyberattack-hit-hospitals-operated-by-covenant-health.html
5. ºÚ¿ÍÕýÔÚʹÓÃvBulletinÂÛ̳Èí¼þµÄÑÏÖØÎó²î
5ÔÂ30ÈÕ£¬£¬£¬£¬£¬¿ªÔ´ÂÛ̳Èí¼þvBulletin±»·¢Ã÷±£´æÁ½¸öÑÏÖØÎó²î£¬£¬£¬£¬£¬±àºÅ»®·ÖΪCVE-2025-48827ºÍCVE-2025-48828£¬£¬£¬£¬£¬ÆÀ¼¶ÎªÑÏÖØ£¬£¬£¬£¬£¬CVSS v3ÆÀ·Ö»®·ÖΪ10.0ºÍ9.0¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²îÉæ¼°Í¨¹ýÄ£°åÒýÇæÀÄÓÃÎó²î¾ÙÐÐAPIÒªÁìŲÓúÍÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¡£¡£µ±vBulletinÔÚPHP 8.1»ò¸ü¸ß°æ±¾ÉÏÔËÐÐʱ£¬£¬£¬£¬£¬°æ±¾5.0.0ÖÁ5.7.5ºÍ6.0.0ÖÁ6.0.3»áÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£ÕâЩÎó²î¿ÉÄÜÔÚÈ¥ÄêÒÑÇÄÈ»ÐÞ¸´£¬£¬£¬£¬£¬µ«ÒòÐí¶àÍøÕ¾Î´Éý¼¶£¬£¬£¬£¬£¬ÈÔ̻¶ÔÚΣº¦Ö®Ï¡£¡£¡£¡£¡£¡£2025Äê5ÔÂ23ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Egidio RomanoÔÚÆä²©¿ÍÉÏÏêϸڹÊÍÁËÔõÑùʹÓÃÕâЩÎó²î£¬£¬£¬£¬£¬Ö¸³öÎÊÌâÔ´ÓÚvBulletin¶ÔPHP·´ÉäAPIµÄÀÄÓ㬣¬£¬£¬£¬¸ÃAPIÔÚPHP 8.1ÖеÄÐÐΪת±äÔÊÐíŲÓÃÊܱ£»£»£»¤ÒªÁì¶øÎÞÐèÃ÷È·µ÷½â¿É»á¼ûÐÔ¡£¡£¡£¡£¡£¡£Îó²îÁ´°üÀ¨Í¨¹ýÈ«ÐÄÉè¼ÆµÄURLŲÓÃÊܱ£»£»£»¤ÒªÁ죬£¬£¬£¬£¬ÒÔ¼°ÀÄÓÃvBulletinÄ£°åÒýÇæÄÚµÄÄ£°åÌõ¼þ¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃÒ×Êܹ¥»÷µÄ¡°replaceAdTemplate¡±ÒªÁì×¢Èë¶ñÒâÄ£°å´úÂ룬£¬£¬£¬£¬Èƹý¡°²»Çå¾²º¯Êý¡±¹ýÂËÆ÷£¬£¬£¬£¬£¬´Ó¶øÔڵײãЧÀÍÆ÷ÉÏʵÏÖÍêȫԶ³Ì¡¢Î´¾Éí·ÝÑéÖ¤µÄ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£5ÔÂ26ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Ryan Dewhurst±¨¸æ³ÆÔÚÃÛ¹ÞÈÕÖ¾Öз¢Ã÷¶Ô±£´æÎó²îµÄ¶ËµãµÄÇëÇ󣬣¬£¬£¬£¬²¢×·×Ùµ½Ò»ÃûÀ´×Ô²¨À¼µÄ¹¥»÷ÕßÊÔͼ°²ÅÅPHPºóÃÅÖ´ÐÐϵͳÏÂÁî¡£¡£¡£¡£¡£¡£½¨ÒéÂÛ̳ÖÎÀíÔ±¾¡¿ìÓ¦ÓÃÇå¾²¸üлòÉý¼¶µ½×îа汾6.1.1ÒÔ×èֹΣº¦¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-critical-flaw-in-vbulletin-forum-software/
6. Netbird³ÉÓã²æÊ½´¹ÂÚй¤¾ß£¬£¬£¬£¬£¬Õë¶Ô¶àµØ²ÆÎñ¸ß¹Ü
6ÔÂ2ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢³öÖÒÑÔ£¬£¬£¬£¬£¬Ò»³¡Ê¹ÓÃÕýµ±Ô¶³Ì»á¼û¹¤¾ßNetbirdµÄÐÂÓã²æÊ½´¹ÂÚ¹¥»÷»î¶¯ÕýÔÚ¾ÙÐУ¬£¬£¬£¬£¬Ä¿µÄÕë¶ÔÅ·ÖÞ¡¢·ÇÖÞ¡¢¼ÓÄôó¡¢Öж«ºÍÄÏÑǵØÇøÒøÐС¢ÄÜÔ´¡¢°ü¹ÜºÍͶ×ʹ«Ë¾µÄ²ÆÎñ¸ß¹Ü¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÉTrellix¹«Ë¾ÓÚ2025Äê5ÔÂÖÐÑ®Ê״η¢Ã÷£¬£¬£¬£¬£¬ÏÖÔÚÉÐδ¹éÒòÓÚÈκÎÒÑÖªÍþвÐÐΪÕß¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÒÔÒ»·âð³äRothschild&CoÕÐÆ¸Ö°Ô±µÄ´¹ÂÚÓʼþΪÆðÔ´£¬£¬£¬£¬£¬Í¨¹ýαÔìµÄPDF¸½¼þÁ´½ÓÓÕʹÊܺ¦Õßµã»÷£¬£¬£¬£¬£¬½ø¶ø±»Öض¨ÏòÖÁÍйÜÔÚFirebaseÓ¦ÓÃÉϵÄURL¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓüÓÃܵÄÖØ¶¨ÏòURLºÍÑéÖ¤Âë¹Ø¿¨À´Èƹý·ÀÓùϵͳ£¬£¬£¬£¬£¬×îÖÕÖ¸µ¼Êܺ¦ÕßÏÂÔØ°üÀ¨¶ñÒâVBScriptµÄZIPѹËõ°ü¡£¡£¡£¡£¡£¡£¸ÃVBScriptÈÏÕæ¼ìË÷²¢Ö´ÐÐÏÂÒ»½×¶ÎVBScript£¬£¬£¬£¬£¬ºóÕß»á½øÒ»²½»ñÈ¡ÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬ÌáÈ¡²¢×°ÖÃNetBirdºÍOpenSSHÁ½¸ö³ÌÐò£¬£¬£¬£¬£¬½¨ÉèÒþ²ØÕË»§¡¢ÆôÓÃÔ¶³Ì×ÀÃæ»á¼û£¬£¬£¬£¬£¬²¢Í¨¹ýÉèÖÃÍýÏëʹÃüʹNetBirdÔÚÊÜѬȾϵͳÉϳ¤ÆÚ»¯ÔËÐУ¬£¬£¬£¬£¬Í¬Ê±É¾³ý×ÀÃæ¿ì½Ý·½·¨ÒÔÑÚÊÎÈëÇÖÐÐΪ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Trellix»¹·¢Ã÷Ò»¸öÒÑ»îÔ¾½üÒ»ÄêµÄÖØ¶¨ÏòURLÌṩÏàͬµÄVBScriptÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬ÕâÅú×¢¸Ã¹¥»÷»î¶¯¿ÉÄÜÒÑÒ»Á¬Ò»¶Îʱ¼ä¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html