GunraÀÕË÷Èí¼þÍÅ»ïÇԵϰÝÃÀ¹úÒ½Ôº4.5ÒÚÌõ¼Í¼
Ðû²¼Ê±¼ä 2025-06-061. GunraÀÕË÷Èí¼þÍÅ»ïÇԵϰÝÃÀ¹úÒ½Ôº4.5ÒÚÌõ¼Í¼
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Ò»¸öÀÕË÷Èí¼þÍÅ»ïÉù³ÆÇÔÈ¡Á˵ϰÝÃÀ¹úÒ½Ôº£¨AHD£©¶à´ï4.5ÒÚÌõµÄ»¼Õ߼ͼ£¬£¬£¬£¬£¬£¬²¢Íþв½«ÔÚ6ÔÂ8ÈÕ¹ûÕæÕâЩÊý¾Ý¡£¡£AHDÊǵϰݵØÇø×ʢÃûµÄ˽ÈËÒ½ÁƱ£½¡ÌṩÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬½¨ÉèÓÚ1996Ä꣬£¬£¬£¬£¬£¬ÓµÓÐ254ÕÅ´²Î»µÄ¼±Ö¢Õչ˻¤Ê¿»ú¹¹£¬£¬£¬£¬£¬£¬Ìṩ40¶à¸öרҵµÄЧÀÍ£¬£¬£¬£¬£¬£¬ÒÔÒ½ÁÆÁ¢ÒìÖøÃû¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÁË×ܼÆ4TBµÄδѹËõÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢ÐÅÓÿ¨ºÅ¡¢Õ˵¥ÀúÊ·¼Í¼¡¢°¢ÁªÇõÉí·ÝÖ¤ºÅÂëÒÔ¼°ÁÙ´²¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӼì²éµÄÑù±¾Êý¾ÝËÆºõÖ÷񻃾¼°²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬Èç²ÆÎñ±¨¸æ¡¢ÈËΪµ¥ºÍÕ˵¥¼Í¼µÈÒ½ÔºÄÚ²¿Îļþ¡£¡£ÈôÍêÕûÊý¾Ý¼¯È·Êµ°üÀ¨¸ÃÍÅ»ïËùÉù³ÆµÄÄÚÈÝ£¬£¬£¬£¬£¬£¬´Ë´Îй¶½«¿ÉÄܶÔÒþ˽ºÍî¿Ïµ±¬·¢ÑÏÖØÓ°Ï죬£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚÉæ¼°½ðÈں͹ú¼ÒÉí·ÝÖ¤Êý¾ÝÇÒÍøÂçÇå¾²·¨ÑÏ¿áµÄµØÇø¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬ÊµÑé´Ë´Î¹¥»÷µÄGunraÀÕË÷Èí¼þ¼¯ÍÅÊÇÀÕË÷Èí¼þÁìÓòµÄÐÂÐËÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬ÓÚ2025Äê4Ô·ºÆð£¬£¬£¬£¬£¬£¬×Ô½¨ÉèÒÔÀ´ÒÑÔì³É12ÃûÊܺ¦Õß¡£¡£¸ÃÍÅ»ïÕë¶Ô·¿µØ²ú¡¢ÖÆÒ©ºÍÖÆÔìÒµµÈ¶à¸öÐÐÒµ£¬£¬£¬£¬£¬£¬½ÓÄÉË«ÖØÀÕË÷ÊֶΣ¬£¬£¬£¬£¬£¬Íþвй¶±»µÁÊý¾ÝÒÔ»ñÈ¡¾¼ÃÀûÒæ¡£¡£
https://cybernews.com/security/gunra-ransomware-american-hospital-dubai-breach/
2. ÈûÆÖ·˹Æì½¢º½¿ÕϵͳÔâÈëÇÖ£¬£¬£¬£¬£¬£¬41GBÂÿÍÐÅϢй¶
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬ÈûÆÖ·˹Æì½¢º½¿Õ¹«Ë¾ÏµÍ³ÔâÈëÇÖ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÉù³ÆÇÔÈ¡Á˶à´ï41GBµÄÂÿÍÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢ÂÃÐмͼ¡¢ÂÃÐÐÈÕÆÚ¡¢ÒѸ¶½ð¶î¡¢ÎĵµÐÅÏ¢¡¢µç»°ºÅÂëµÈ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÈÔÄÜ»á¼û¸Ãϵͳ£¬£¬£¬£¬£¬£¬¿ÉʵʱÉó²éº½°à¶¯Ì¬¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Ñо¿ÍŶÓÒѶԹ¥»÷Õ߸½ÉϵÄÊý¾ÝÑù±¾Õö¿ªÊӲ죬£¬£¬£¬£¬£¬ÆðÔ´Åжϴ󲿷ÖÊý¾ÝÕæÊµÓÐÓ㬣¬£¬£¬£¬£¬º¸ÇÂÿͼ°²¿·ÖÔ±¹¤ÐÅÏ¢£¬£¬£¬£¬£¬£¬²¿·ÖÊý¾Ý¿É×·ËÝÖÁ2025Äê6ÔÂ3ÈÕ¡£¡£¹¥»÷ÕߺܿÉÄÜͨ¹ýƱÎñÖÎÀíÈí¼þ»ñÈ¡ÁËÕâЩÐÅÏ¢£¬£¬£¬£¬£¬£¬²»¹ýÐÒÔ˵ÄÊÇ£¬£¬£¬£¬£¬£¬ÏÖÔÚÉÐδ·¢Ã÷Ö§¸¶¿¨Êý¾Ýй¶µÄ¼£Ï󡣡£´Ë´ÎÊý¾Ýй¶ÊÂÎñÈôÊôʵ£¬£¬£¬£¬£¬£¬½«¸øÏà¹Ø·½´øÀ´ÑÏÖØÍþв¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡¢½ðÈÚڲƺÍÉí·Ý͵ÇÔ£¬£¬£¬£¬£¬£¬Ã°³äº½¿Õ¹«Ë¾ÓÕÆ¿Í»§Ð¹Â¶¸ü¶àÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬»òʹÓÃÇÔÈ¡µÄÐÅÏ¢½¨ÉèÐéαÉí·Ý£¬£¬£¬£¬£¬£¬Î£¼°Ð¡ÎÒ˽¼ÒÒþ˽¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸üרҵµÄÍþвÐÐΪÕß¿ÉÄÜʹÓÃÂÿͳöÐÐÐÅϢѰÕÒ¿ÕÖúâÓî¾ÙÐÐÈëÊÒ͵ÇÔ£¬£¬£¬£¬£¬£¬ÉõÖÁʵÑéð³äÊܺ¦ÕßÓÕÆÒøÐеȻú¹¹¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬º½¿Õ¹«Ë¾ÒòÕÆÎÕ´ó×ÚÃô¸ÐÂÿÍÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒѳÉΪºÚ¿Í¹¥»÷µÄÖØµãÄ¿µÄ¡£¡£
https://cybernews.com/security/cyprus-airways-breach-passenger-data-stolen/
3. FBIÖÒÑÔ£ºBADBOX 2.0¶ñÒâÈí¼þѬȾ³¬°ÙÍò¼ÒÍ¥×°±¸
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾ÖÖÒÑÔ£¬£¬£¬£¬£¬£¬BADBOX 2.0¶ñÒâÈí¼þ»î¶¯ÒÑѬȾ³¬100Íǫ̀¼ÒÍ¥»¥ÁªÍøÅþÁ¬×°±¸£¬£¬£¬£¬£¬£¬½«ÏûºÄµç×Ó²úƷת±äΪÓÃÓÚ¶ñÒâ»î¶¯µÄסլÊðÀí¡£¡£¸Ã½©Ê¬ÍøÂç³£¼ûÓÚÖйú»ùÓÚAndroidµÄÖÇÄܵçÊÓ¡¢Á÷ýÌåºÐµÈÎïÁªÍø×°±¸ÉÏ£¬£¬£¬£¬£¬£¬ÓÉÊý°ÙÍǫ̀ÊÜѬȾװ±¸×é³É£¬£¬£¬£¬£¬£¬Î¬»¤´ó×ÚÊðÀíЧÀͺóÃÅ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó¿Éͨ¹ý³öÊÛ»òÃâ·ÑÌṩÊÜѬȾ¼ÒÍ¥ÍøÂç»á¼ûȨÏÞÓÃÓÚ·¸·¨»î¶¯¡£¡£ÕâЩװ±¸¿ÉÄÜԤװ¸Ã¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬»òÔÚ×°Öù̼þ¸üС¢Í¨¹ý¶ñÒâAndroidÓ¦ÓóÌÐòѬȾ¡£¡£ÍøÂç·¸·¨·Ö×Óͨ¹ýÔÚÓû§¹ºÖòúƷǰÉèÖöñÒâÈí¼þ»òÔÚ×°±¸ÏÂÔØ°üÀ¨ºóÃŵÄÓ¦ÓóÌÐòʱѬȾװ±¸£¬£¬£¬£¬£¬£¬´Ó¶ø»ñµÃ¶Ô¼ÒÍ¥ÍøÂçµÄδ¾ÊÚȨ»á¼û¡£¡£Ò»µ©ÊÜѬȾµÄÎïÁªÍø×°±¸ÅþÁ¬µÖ¼ÒÍ¥ÍøÂ磬£¬£¬£¬£¬£¬¾ÍÒ׳ÉΪBADBOX 2.0½©Ê¬ÍøÂçºÍסլÊðÀíЧÀ͵ÄÒ»²¿·Ö¡£¡£Ñ¬È¾ºó£¬£¬£¬£¬£¬£¬×°±¸»áÅþÁ¬µ½¹¥»÷ÕßµÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬£¬ÎüÊÕÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬ÈçסլÊðÀíÍøÂç¡¢¹ã¸æÚ²Æ¡¢Æ¾Ö¤Ìî³äµÈ¡£¡£BADBOX 2.0ÓÉÔʼBADBOX¶ñÒâÈí¼þÑÝ±ä¶øÀ´£¬£¬£¬£¬£¬£¬2023ÄêÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬ºóÒ»Ö±À©ÕÅ£¬£¬£¬£¬£¬£¬Ëä2024ÄêµÂ¹úÍøÂçÇå¾²»ú¹¹ÆÆËðÁ˸ùú½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕßδ×èÖ¹£¬£¬£¬£¬£¬£¬Ò»Öܺó¸Ã¶ñÒâÈí¼þÒÑ×°ÖÃÔÚ19.2Íǫ̀װ±¸ÉÏ£¬£¬£¬£¬£¬£¬»¹·ºÆðÔÚ¸üÖ÷Á÷Æ·ÅÆÉÏ¡£¡£µ½2025Äê3Ô£¬£¬£¬£¬£¬£¬ÒÑÓг¬100Íǫ̀ÏûºÄ×°±¸ÊÜѬȾ£¬£¬£¬£¬£¬£¬ÁýÕÖ222¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬ÊÜѬȾװ±¸ÊýÄ¿×î¶àµÄÊǰÍÎ÷¡¢ÃÀ¹ú¡¢Ä«Î÷¸çºÍ°¢¸ùÍ¢¡£¡£ÔÚÁªºÏÐж¯ÖУ¬£¬£¬£¬£¬£¬BADBOX 2.0½©Ê¬ÍøÂçÔٴ௒ÆË𣬣¬£¬£¬£¬£¬×èÖ¹Á˳¬50Íǫ̀ÊÜѬȾװ±¸Óë¹¥»÷ÕßЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬µ«½©Ê¬ÍøÂçÈÔÔÚÔöÌí¡£¡£
https://www.bleepingcomputer.com/news/security/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices/
4. ÃÀË®Îñ¹«Ë¾¶à¿ØÖÆÊÒÒDZí°å¿ÉÎÞÃÜÂëÁ¬¹«Íø
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬TLSÖ¤ÊéÖеÄÒÅÁôÎÊÌâ̻¶³öÃÀ¹úË®Îñ¹«Ë¾±£´æÑÏÖØÇå¾²Òþ»¼¡£¡£È¥Äê10Ô£¬£¬£¬£¬£¬£¬CensysÑо¿ÍŶӶԹ¤Òµ¿ØÖÆÖ÷»ú¾ÙÐÐÀýÐÐɨÃèʱ£¬£¬£¬£¬£¬£¬·¢Ã÷Ö¤ÊéÖÐǶÈë¡°SCADA¡±×ÖÑù£¬£¬£¬£¬£¬£¬¸Ã±êÇ©Ó빤ҵ¿ØÖÆÇéÐÎÖÐµÄ¼à¿ØÏµÍ³Ïà¹Ø¡£¡£ÍŶÓÔÚ¶à¸ö»ùÓÚä¯ÀÀÆ÷µÄHMIƽ̨ʵÀýÖз¢Ã÷Ïà֤ͬÊéʶÓÖÃû£¬£¬£¬£¬£¬£¬²¢´Óÿ¸öIPµØµã»ñÈ¡ÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬£¬·¢Ã÷Ë®´¦Öóͷ£³§µÄʵʱÀú³ÌͼÐΣ¬£¬£¬£¬£¬£¬°üÀ¨Ë®Ïäˮλ¡¢ÂȱÃ״̬¼°¾¯±¨µÈ¡£¡£ÉîÈëÍÚ¾òºó£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÿ¼ÒÊÜÓ°ÏìµÄ¹«ÓÃÊÂÒµ¹«Ë¾¶¼Ê¹ÓÃÓÉHMIÈí¼þÌìÉúµÄÏàͬWebЧÀÍÆ÷½á¹¹£¬£¬£¬£¬£¬£¬ÇÒ֤ʵÖ÷»úΪÊÐÕþ¹©Ë®ÉèÊ©¡£¡£ÕâЩϵͳ´¦ÓÚÈýÖÖ״̬£ºÒÑÑéÖ¤¡¢Ö»¶ÁºÍδÑéÖ¤£¬£¬£¬£¬£¬£¬ÆäÖÐ40¸öϵͳÍêȫδ¾Éí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬ÈκÎÈ˶¼ÄÜͨ¹ýä¯ÀÀÆ÷¿ØÖÆ¡£¡£¼øÓÚÄ¿µÄΪ¹«¹²ÊÂÒµµ¥Î»£¬£¬£¬£¬£¬£¬CensysÌø¹ýÖðÒ»Åû¶³ÌÐò£¬£¬£¬£¬£¬£¬ÏòÃÀ¹úÇéÐα£»£»£»£»£»¤ÊðºÍδǩ×ÖµÄHMI¹©Ó¦ÉÌ·¢ËÍÅúÁ¿±¨¸æ¡£¡£µç×Ó±í¸ñÁгöÿ¸öIPµØµã¡¢¶Ë¿Ú¡¢¿ÉÄÜλÖü°Ç徲״̬¡£¡£¾ÅÌìÄÚ£¬£¬£¬£¬£¬£¬ÃÀ¹ú»·±£Ê𱨸æ24%µÄ̻¶ϵͳÒÑÉèÖ÷À»ðǽ»òÇ¿»¯£»£»£»£»£»Ò»¸öÔº󣬣¬£¬£¬£¬£¬ÔÚ¹©Ó¦ÉÌÍÆ³ö¶àÒòËØÉí·ÝÑéÖ¤ºÍ¸üÑÏ¿á»á¼û¹æÔòÖ¸ÄϺ󣬣¬£¬£¬£¬£¬ÕâÒ»Êý×ÖÔ¾ÉýÖÁ58%¡£¡£×èÖ¹2025Äê5Ô£¬£¬£¬£¬£¬£¬Ö»¶Á»òδ¾Éí·ÝÑéÖ¤µÄϵͳÊýÄ¿ÒѽµÖÁȱ·¦20¸ö¡£¡£
https://www.securityweek.com/misconfigured-hmis-expose-us-water-systems-to-anyone-with-a-browser/
5. ClickFix·ÂBooking.comÓʼþթƼ¤Ôö£¬£¬£¬£¬£¬£¬º¬RATÓëÇÔÃܳÌÐò
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬Cofense Intelligence·¢Ã÷£¬£¬£¬£¬£¬£¬Ã°³äBooking.comµÄClickFixµç×ÓÓʼþÕ©ÆÊýÄ¿¼¤Ôö£¬£¬£¬£¬£¬£¬´ËÀàթưüÀ¨Ô¶³Ì¹¥»÷¹¤¾ß£¨RAT£©ºÍÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£×Ô2024Äê11ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬ClickFix¹ã¸æÏµÁйØ×¢¶ÈÎȲ½ÌáÉý£¬£¬£¬£¬£¬£¬2025Äê3ÔÂÆä¹ã¸æÍ¶·ÅÁ¿Õ¼×ÜͶ·ÅÁ¿µÄ47%¡£¡£Cofense×Ô¶¯Íþв±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬75%µÄαÔìÑéÖ¤ÂëÊÂÎñ¶¼Ê¹ÓÃÁËÒÔBooking.comΪÖ÷ÌâµÄClickFixÄ£°å£¬£¬£¬£¬£¬£¬±ðµÄÉÐÓÐαÔìCloudflare TurnstileºÍCookieÔ޳ɺá·ùµÄ±äÌå¡£¡£¸ÃȦÌ×ʼÓÚÒ»·â°üÀ¨ÐéαÑéÖ¤ÂëÍøÕ¾Á´½ÓµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬µã»÷ºó²»»á·¢ËÍÕæÕýµÄÑéÖ¤Â룬£¬£¬£¬£¬£¬¶øÊÇÏòÓû§ÅÌËã»ú·¢ËÍÓк¦¾ç±¾¡£¡£ClickFixÍøÕ¾»áָʾÓû§°´ÏÂÌØ¶¨¼üÅÌ¿ì½Ý¼ü£¬£¬£¬£¬£¬£¬ÔÚWindowsÖз¿ª¡°ÔËÐС±ÏÂÁ£¬£¬£¬£¬£¬Õ³Ìù²¢Ö´ÐÐÒþ²ØµÄ¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬£¬ÕâЩ¾ç±¾Í¨³£°üÀ¨Î±×°³ÉÑéÖ¤ÂëµÄÓк¦ÏÂÁî¡£¡£ÕâÐ©ÍøÕ¾Éè¼ÆÇÉÃ£¬£¬£¬£¬£¬¿´ËÆ×ÅÃûÆ·ÅÆµÄÕýµ±Ò³Ã棬£¬£¬£¬£¬£¬ÇÒ½öÕë¶ÔWindowsµçÄÔ¡£¡£Ò»µ©¶ñÒâ¾ç±¾ÔËÐУ¬£¬£¬£¬£¬£¬±ã»á×°ÖÃXWorm RATµÈÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬£¬£¬ÒÔ¼°Pure Logs StealerºÍDanaBotµÈÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâÈí¼þÖ¼ÔÚ´ÓÔ¶´¦ÉñÃØ¿ØÖÆÊܺ¦ÕßÅÌËã»ú»òÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£ÔÚijЩÇéÐÎÏ£¬£¬£¬£¬£¬£¬RATºÍÐÅÏ¢ÇÔÈ¡³ÌÐò»áͬʱ·ºÆð¡£¡£ClickFixµÄÐÂÒªÁìÓÕµ¼Óû§×ÔÐ줻î¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÎÞÐèÖ±½ÓÏÂÔØÎļþ£¬£¬£¬£¬£¬£¬Í¹ÏÔÁ˶ԿÉÒɵç×ÓÓʼþ¼á³ÖСÐĵÄÖ÷ÒªÐÔ¡£¡£
https://hackread.com/clickfix-email-scam-fake-booking-com-emails-malware/
6. È«Çò3.5ÍòÌ×Ì«ÑôÄÜÏµÍ³ÆØÂ¶ÓÚÍøÂ磬£¬£¬£¬£¬£¬±£´æÖØ´óÇå¾²Òþ»¼
6ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÏîÖÜÈ«µÄÍøÂçÇå¾²ÊÓ²ìÕ¹ÏÖÁË¿ìËÙÀ©ÕŵÄÌ«ÑôÄÜ»ù´¡ÉèÊ©Öб£´æÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬È«Çò42¼Ò¹©Ó¦É̵Ľü35,000̨̫ÑôÄÜ×°±¸ÃæÁÙ»ùÓÚ»¥ÁªÍøµÄ¹¥»÷Σº¦¡£¡£Ëæ×Å¿ÉÔÙÉúÄÜԴϵͳÈÕÒæÈÚÈëÒªº¦µçÍø»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬ÕâÒ»·¢Ã÷͹ÏÔÁËÈÕÒæÔöÌíµÄÇå¾²µ£ÐÄ¡£¡£Å·ÖÞÔÚ̻¶װ±¸·½ÃæÕ¼ÓÐÖ÷µ¼Ö°Î»£¬£¬£¬£¬£¬£¬Õ¼Ò×Êܹ¥»÷Ì«ÑôÄÜ·¢µçϵͳµÄ76%£¬£¬£¬£¬£¬£¬µÂ¹úºÍÏ£À°ÔÚÊÜÓ°Ïì×°±¸Ì»Â¶Ö鯽ÉÏÁìÏÈ£¬£¬£¬£¬£¬£¬Òâ´óÀû½ôËæØÊºó¡£¡£2025Äê5ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ForescoutÆÊÎöʦʹÓÃShodanËÑË÷ÒýÇæ·¢Ã÷ÁËÕâЩ̻¶ÔÚ»¥ÁªÍøÉϵÄÌ«ÑôÄÜ×°±¸£¬£¬£¬£¬£¬£¬°üÀ¨Äæ±äÆ÷¡¢Êý¾Ý¼Í¼Æ÷µÈ¡£¡£ÕâÏîÑо¿»ùÓÚ¸ÃÍøÂçÇå¾²¹«Ë¾ÔçÆÚµÄSUN:DOWNÊӲ죬£¬£¬£¬£¬£¬¸ÃÊӲ췢Ã÷ÁË46¸öÓ°ÏìÌ«ÑôÄÜϵͳµÄÐÂÎó²î¡£¡£CONTEC SolarView Compact×°±¸ÊÇÌ«ÑôÄÜÎó²î±»Ê¹Óõĵ䷶°¸Àý£¬£¬£¬£¬£¬£¬Æä»¥ÁªÍøÆØ¹âÂÊÔڶ̶ÌÁ½ÄêÄÚ´ó·ùÔöÌí£¬£¬£¬£¬£¬£¬±£´æ¶à¸öÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬ÏÖÔÚÕý±»½©Ê¬ÍøÂçÔËÓªÉÌÆð¾¢Ê¹Óᣡ£µ±800̨SolarView Compact×°±¸ÔÚÈÕ±¾±»ÀÖ³ÉÐ®ÖÆ²¢ÓÃÓÚÒøÐÐÕË»§ÍµÇÔÐж¯Ê±£¬£¬£¬£¬£¬£¬ÕâЩÎó²îµÄÏÖʵӰÏì±äµÃÏÔ¶øÒ×¼û¡£¡£ForescoutÑо¿Ö°Ô±È·¶¨ÁËÒÑÍùÒ»ÄêÄÚרÃÅÕë¶ÔÕâЩ̫ÑôÄÜ×°±¸µÄ43¸öΨһIPµØµã£¬£¬£¬£¬£¬£¬ÕâЩµØµã´ó¶àÓëÒÑÖªµÄ½©Ê¬ÍøÂç²Ù×÷»ò×Ô¶¯Îó²îɨÃè»î¶¯Óйء£¡£Îª»º½âÕâЩΣº¦£¬£¬£¬£¬£¬£¬×éÖ¯Ó¦×èÖ¹½«Äæ±äÆ÷ÖÎÀí½çÃæÖ±½Ó̻¶¸ø»¥ÁªÍø£¬£¬£¬£¬£¬£¬¶øÊÇÆ¾Ö¤CISAÖ¸ÄÏʵÑé»ùÓÚVPNµÄÔ¶³Ì»á¼û¡£¡£
https://cybersecuritynews.com/35000-solar-power-systems-exposed/