Allianz LifeÊý¾Ýй¶ÊÂÎñ̻¶140Íò¿Í»§ÐÅÏ¢
Ðû²¼Ê±¼ä 2025-07-281. Allianz LifeÊý¾Ýй¶ÊÂÎñ̻¶140Íò¿Í»§ÐÅÏ¢
7ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬°²ÁªÈËÊÙ£¨Allianz Life£©È·ÈÏ7ÔÂ16ÈÕ±¬·¢ÁËÒ»ÆðÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆä140Íò¿Í»§ÖеĴó´ó¶¼Ð¡ÎÒ˽¼ÒÐÅÏ¢Ô⵽̻¶¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¹«Ë¾½²»°È˵ÄÉùÃ÷£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÊÇÓÉÓÚÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³Ì¹¥»÷ÈëÇÖÁ˵ÚÈý·½»ùÓÚÔÆµÄ¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÀֳɻñÈ¡ÁËÓë°²ÁªÈËÊÙ¿Í»§¡¢½ðÈÚרҵÈËÊ¿ÒÔ¼°²¿·ÖÔ±¹¤Ïà¹ØµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£¡£¡£¡£°²ÁªÈËÊÙѸËÙ½ÓÄɲ½·¥×èÖ¹²¢»º½âÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÏòÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©±¨¸æÁ˸ÃÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚûÓÐÖ¤¾ÝÅú×¢ÆäÄÚ²¿ÍøÂç»òÒªº¦ÏµÍ³£¨ÀýÈç±£µ¥ÖÎÀíϵͳ£©Ôâµ½»á¼û¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬Ïà¹ØÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄСÎÒ˽¼ÒÒÑ×îÏÈÊÕµ½Í¨Öª£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±¹«Ë¾ÌṩÁËרÃŵÄÖ§³ÖЧÀÍ¡£¡£¡£¡£¡£¡£¡£°²ÁªÈËÊÙ»¹ÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»ÁËÓйش˴ÎÊý¾Ýй¶µÄÎļþ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹«Ë¾Î´Ã÷È·Ö¸³ö±³ºóµÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬£¬µ«¾Ý±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷¿ÉÄÜÓëÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯ShinyHuntersÓйء£¡£¡£¡£¡£¡£¡£ShinyHuntersÊÇÒ»¸ö»îÔ¾µÄºÚ¿ÍÍŻ£¬£¬£¬£¬£¬£¬£¬Ôø¶à´ÎÔÚ°µÍøÉϳöÊÛ´Ó¶à¼Ò×ÅÃûÆóÒµÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/180445/data-breach/allianz-life-data-breach-exposed-the-data-of-most-of-its-1-4m-customers.html
2. Scattered SpiderÕýÔÚ·Å×ݹ¥»÷VMware ESXi
7ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¾¼ÃÀûÒæÎªµ¼ÏòµÄºÚ¿Í×éÖ¯Scattered Spider£¨ÓÖÃûUNC3944¡¢Octo Tempest£©¿ËÈÕÕë¶ÔÃÀ¹ú¼°Ó¢¹úÁãÊÛ¡¢º½¿Õ¡¢ÔËÊä¡¢°ü¹ÜµÈÐÐÒµÆóÒµÌᳫ´ó¹æÄ£¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäÁ¢ÒìÊÖ·¨Òý·¢Çå¾²½ç¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÞðÆú¹Å°åÎó²îʹÓÃģʽ£¬£¬£¬£¬£¬£¬£¬£¬×ª¶øÍ¨Ï꾡ÃÜÉç»á¹¤³ÌѧսÂÔ£¬£¬£¬£¬£¬£¬£¬£¬Ö±½ÓÍ»ÆÆÆóÒµÐéÄ⻯ÇéÐηÀ»¤¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´·ºÆðÎå¸öÇåÎú½×¶Î£ºÊ×ÏÈͨ¹ýð³äÔ±¹¤ÖµçITЧÀĮ́£¬£¬£¬£¬£¬£¬£¬£¬ÓÕʹÊÖÒÕÖ§³ÖÖ°Ô±ÖØÖøßȨÏÞÕË»§ÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬»ñÈ¡³õʼ»á¼ûȨÏÞ£»£»£»£»£»£»£»ËæºóɨÃèActive Directory¼°ÌØÈ¨»á¼ûÖÎÀí£¨PAM£©ÏµÍ³£¬£¬£¬£¬£¬£¬£¬£¬¾«×¼¶¨Î»ÓòÖÎÀíÔ±¡¢vSphereÖÎÀíÔ±µÈ½¹µãÕË»§ÐÅÏ¢£»£»£»£»£»£»£»¼Ì¶øÍ¨¹ý¶à´ÎÎ±×°ÌØÈ¨Óû§Öµ磬£¬£¬£¬£¬£¬£¬£¬×îÖÕ¿ØÖÆÒªº¦Õ˺Ų¢ÉøÍ¸VMware vCenter Server Appliance£¨vCSA£©£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×é¼þÈÏÕæÖÎÀí°üÀ¨ESXiÐéÄâ»úÖÎÀí³ÌÐòµÄvSphereÇéÐΡ£¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£»ñµÃvCSA¿ØÖÆÈ¨ºó£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʵÑéÁ½ÏîÒªº¦²Ù×÷£ºÆäһͨ¹ýÆôÓÃSSHÅþÁ¬²¢ÖØÖÃESXiÖ÷»úrootÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬½¨É賤ÆÚ»¯»á¼ûͨµÀ£»£»£»£»£»£»£»Æä¶þÖ´ÐÐÁ¢ÒìµÄ"´ÅÅ̽»Á÷"¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬¹Ø±ÕÓò¿ØÖÆÆ÷ÐéÄâ»úºóÊèÉ¢ÆäÐéÄâ´ÅÅÌ£¬£¬£¬£¬£¬£¬£¬£¬½«Æä¹ÒÔØÖÁ¹¥»÷Õß¿ØÖƵÄÐéÄâ»úÒÔÇÔÈ¡°üÀ¨Óû§¹þÏ£ÖµµÄNTDS.ditÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£×îÖս׶Σ¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýSSHͨµÀ°²ÅÅÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÊý¾Ý´æ´¢ÇøËùÓÐÐéÄâ»úÎļþ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/scattered-spider-is-running-a-vmware-esxi-hacking-spree/
3. ³¬20ÍòWordPressÍøÕ¾ÃæÁÙPost SMTP²å¼þÎó²îΣº¦
7ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÏîÓ°ÏìÁè¼Ý20Íò¸öWordPressÍøÕ¾µÄÑÏÖØÇå¾²Îó²î¿ËÈÕ±»ÆØ¹â¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ»îÔ¾×°ÖÃÁ¿³¬40ÍòµÄÈÈÃŲå¼þPost SMTPµÄ3.2.0¼°ÒÔϰ汾ÖУ¬£¬£¬£¬£¬£¬£¬£¬±»×·×ÙΪCVE-2025-24000£¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö´ï8.8¡£¡£¡£¡£¡£¡£¡£Îó²î½¹µãÔ´ÓÚ²å¼þREST API¶ËµãµÄ»á¼û¿ØÖÆ»úÖÆÈ±ÏÝ£¬£¬£¬£¬£¬£¬£¬£¬½öÑéÖ¤Óû§ÊÇ·ñµÇ¼£¬£¬£¬£¬£¬£¬£¬£¬¶øÎ´¼ì²éÆäȨÏÞ¼¶±ð£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖµÍȨÏÞÓû§£¨Èç¶©ÔÄÕߣ©¿É»á¼û°üÀ¨ÍêÕûÓʼþÄÚÈݵÄÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬£¬²¢´¥·¢ÖÎÀíÔ±ÕË»§ÃÜÂëÖØÖÃÁ÷³Ì¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý×èµ²ÖØÖÃÓʼþÍê³ÉÕË»§½ÓÊÜ£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕ¿ØÖÆÕû¸öÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ö°Ô±ÓÚ5ÔÂ23ÈÕ±¨¸æÖÁWordPressÇå¾²³§ÉÌPatchStack£¬£¬£¬£¬£¬£¬£¬£¬²å¼þ¿ª·¢ÕßSaad IqbalѸËÙÏìÓ¦£¬£¬£¬£¬£¬£¬£¬£¬5ÔÂ26ÈÕÌá½»ÐÞ¸´¼Æ»®²¢Í¨¹ýÔÚ"get_logs_permission"º¯ÊýÖÐÔöÌíȨÏÞУÑ飬£¬£¬£¬£¬£¬£¬£¬È·±£½öÖÎÀíÔ±¿É»á¼ûÃô¸ÐAPI¡£¡£¡£¡£¡£¡£¡£ÐÞ¸´°æ±¾3.3.0ÓÚ6ÔÂ11ÈÕÐû²¼£¬£¬£¬£¬£¬£¬£¬£¬µ«WordPress.orgͳ¼ÆÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬×èֹĿ½ñ½ö48.5%Óû§Íê³ÉÉý¼¶£¬£¬£¬£¬£¬£¬£¬£¬Òâζ×ÅÈÔÓг¬20Íò¸öÍøÕ¾Ì»Â¶ÔÚΣº¦ÖС£¡£¡£¡£¡£¡£¡£¸üÑÏËàµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬24.2%£¨Ô¼9.68Íò¸ö£©Õ¾µãÈÔÔËÐб£´æÆäËûÀúÊ·Îó²îµÄ2.x¾É°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬Çå¾²ÐÎÊÆ½ûÖ¹ÀÖ¹Û¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks/
4. ÑÇÂíÑ·AI±àÂëÊðÀíÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬×¢ÈëÊý¾Ý²Á³ýÏÂÁî
7ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÑÇÂíÑ·ÆìÏÂÌìÉúʽAI¿ª·¢ÖúÊÖAmazon QµÄVisual Studio CodeÀ©Õ¹¿ËÈÕÔâÓöÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬Òý·¢Òµ½ç¶Ô¿ªÔ´¹©Ó¦Á´Çå¾²µÄ¹Ø×¢¡£¡£¡£¡£¡£¡£¡£Õâ¿îÓµÓнü°ÙÍò×°ÖÃÁ¿µÄÃâ·ÑÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÌìÉúʽAI¸¨Öú¿ª·¢Õß±àÂë¡¢µ÷ÊÔ¼°ÉèÖÃÖÎÀí£¬£¬£¬£¬£¬£¬£¬£¬È´ÔÚGitHub´úÂëÍйÜÁ÷³ÌÖзºÆðÎó²î£¬£¬£¬£¬£¬£¬£¬£¬±»ºÚ¿ÍÖ²ÈëÊý¾Ý²Á³ý´úÂë¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ7ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í"lkmanka58"ͨ¹ýÀÈ¡ÇëÇóÏòAmazon QµÄGitHub¿ÍÕ»Ìύδ¾ÉóÅúµÄ´úÂ룬£¬£¬£¬£¬£¬£¬£¬×¢Èë°üÀ¨"ɨ³ýϵͳÖÁ³ö³§×´Ì¬²¢É¾³ýÎļþϵͳ¼°ÔÆ×ÊÔ´"Ö¸ÁîµÄ¶ñÒâÌáÐÑ¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÏîĿȨÏÞÖÎÀíÊè©»òÊÂÇéÁ÷³ÌÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÌá½»ÒâÍâ»ñµÃ´æ´¢¿â»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö°üÀ¨¶ñÒâ´úÂëµÄ1.84.0°æ±¾ÓÚ7ÔÂ17ÈÕÔÚVS CodeÊг¡Ðû²¼¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÑÇÂíѷʺóÉù³Æ´úÂëÃûÌùýʧδÏÖʵִÐУ¬£¬£¬£¬£¬£¬£¬£¬ÇÒδÔì³ÉʵÖÊΣº¦£¬£¬£¬£¬£¬£¬£¬£¬µ«Çå¾²Ñо¿Ö°Ô±ÈÔÖ¸³öÕâ̻¶ÁËÑÏÖØµÄ¹©Ó¦Á´Î£º¦£¬£¬£¬£¬£¬£¬£¬£¬Èô´úÂë¾ÓÉÓÐÓÃαװ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÒý·¢´ó¹æÄ£Êý¾ÝÆÆË𡣡£¡£¡£¡£¡£¡£7ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÑÇÂíѷͨ¹ýÇå¾²±¨¸æ»ñϤ¸ÃÎÊÌâºó£¬£¬£¬£¬£¬£¬£¬£¬Á¬Ã¦Æô¶¯È¡Ö¤ÊӲ졣¡£¡£¡£¡£¡£¡£Ô½ÈÕ¼´Ðû²¼ÐÞ¸´°æ±¾1.85.0£¬£¬£¬£¬£¬£¬£¬£¬³¹µ×ÒÆ³ý¶ñÒâ´úÂë²¢¸üÐÂÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/
5. Ô¼»áÇå¾²Ó¦ÓÃTeaÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬7.2ÍòÓû§Òþ˽ÕÕÆ¬Ð¹Â¶
7ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ö÷´òÅ®ÐÔÓû§Çå¾²µÄÔ¼»á̸ÂÛÓ¦ÓÃTea¿ËÈÕÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬³¬7.2ÍòÕÅÓû§ÕÕÆ¬±»ºÚ¿Í»ñÈ¡²¢Èö²¥£¬£¬£¬£¬£¬£¬£¬£¬Òý·¢Òþ˽Çå¾²ÕùÒé¡£¡£¡£¡£¡£¡£¡£Õâ¿îÔÊÐíÅ®ÐÔÄäÃûÆÀ¼ÛÔ¼»á¹¤¾ßµÄÓ¦ÓóÌÐòÓÚ25ÈÕÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬£¬Ö¤ÊµÆäϵͳÔâÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨Á½ÀàÃô¸ÐͼÏñ£º1.3ÍòÕÅÓÃÓÚÕË»§ÑéÖ¤µÄ×ÔÅļ°Éí·ÝÖ¤¼þÕÕ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°5.9ÍòÕÅÀ´×ÔÓû§Ðû²¼ÄÚÈÝ¡¢Ì¸ÂÛºÍ˽ÐŵÄͼƬ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹«Ë¾Ç¿µ÷δй¶ÓÊÏ䵨µã»òµç»°ºÅÂ룬£¬£¬£¬£¬£¬£¬£¬ÇÒÊÂÎñ½öÓ°Ïì2024Äê2ÔÂǰע²áµÄÓû§£¬£¬£¬£¬£¬£¬£¬£¬µ«Éí·ÝÖ¤¼þÓë˽ÃÜ»¥¶¯ÄÚÈݵÄ̻¶ÈÔ×é³ÉÑÏÖØÒþ˽Σº¦¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âÔ´ÓÚ4chanÓû§·¢Ã÷²¢Èö²¥ÁË̻¶µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýδÃ÷ȷ˵Ã÷µÄÎó²î»ñÈ¡ÁË´æ´¢Óû§ÕÕÆ¬µÄºǫ́×ÊÔ´¡£¡£¡£¡£¡£¡£¡£Tea¹«Ë¾»ØÓ¦³ÆÒѽôÆÈÔ¼ÇëµÚÈý·½ÍøÂçÇå¾²ÍŶӣ¬£¬£¬£¬£¬£¬£¬£¬24Ð¡Ê±ÍÆ½øÏµÍ³¼Ó¹Ì£¬£¬£¬£¬£¬£¬£¬£¬²¢Ðû³Æ"ÒÑʵÑéÌØÊâÇå¾²²½·¥ÇÒÐÞ¸´Êý¾ÝÎÊÌâ"£¬£¬£¬£¬£¬£¬£¬£¬µ«Î´Í¸Â¶ÏêϸÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬TeaÒÑÐû²¼ÐÞ¸´°æ±¾²¢ºôÓõÓû§¸üС£¡£¡£¡£¡£¡£¡£
https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/
6. Operation CargoTalonÕë¶Ô¶íÂÞ˹º½¿Õº½ÌìÁìÓòµÄÍøÂçÌØ¹¤»î¶¯
7ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇ徲ר¼ÒÅû¶ÁËÒ»ÏîÃûΪOperation CargoTalonµÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Õë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÓë¹ú·À²¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÎÖÂÞÄùÈÕ·É»úÖÆÔìлá(VASO)¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃαװ³É¡°»õÎïÔËÊäµ¥¡±(TTN)ÎļþµÄ¶ñÒ⸽¼þ¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâЩÎļþÍâòÉÏΪZIPѹËõ°ü£¬£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉϰüÀ¨¶ñÒâLNK¿ì½Ý·½·¨ºÍDLLÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕÊͷŲ¢Ö´ÐÐÃûΪEAGLETµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£EAGLETÊÇÒ»ÖÖ¶¨ÖÆ»¯µÄPEÎļþºóÃųÌÐò£¬£¬£¬£¬£¬£¬£¬£¬¾ß±¸ÌìÉúΨһGUID±êʶÊܺ¦Õß¡¢ÍøÂçϵͳÐÅÏ¢¡¢½¨ÉèÒþ²ØÄ¿Â¼ÒÔ¼°Í¨¹ýHTTPÅþÁ¬ÏÂÁîÓë¿ØÖÆ(C2)ЧÀÍÆ÷µÄ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£ÆäÖ§³ÖÔ¶³ÌShell»á¼û¡¢ÎļþÏÂÔØºÍÊý¾ÝÇÔÈ¡£¬£¬£¬£¬£¬£¬£¬£¬²¢Äܹ»Í¨¹ýÕýµ±Windows APIÖ´ÐÐÍøÂç²Ù×÷ÒÔʵÏÖÒþ²ØÍ¨Ñ¶¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´´Ó´¹ÂÚÓʼþ×îÏÈ£¬£¬£¬£¬£¬£¬£¬£¬¾Óɶà½×¶ÎµÄѬȾÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕÍê³ÉÊý¾ÝÇÔȡʹÃü¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯ÓÉÒ»¸ö±»×·×ÙΪUNG0901µÄÍþв×éÖ¯Ìᳫ£¬£¬£¬£¬£¬£¬£¬£¬ÇÒÓë´Ëǰ·¢Ã÷µÄHead MareÍþв¼¯Èº±£´æ¹¦Ð§ÖصþºÍÕ½ÊõÏàËÆÐÔ¡£¡£¡£¡£¡£¡£¡£¶þÕß¾ùʹÓÃÀàËÆµÄÓÕ¶üÃüÃû¹æÔòºÍºóÃŹ¤¾ß£¨ÀýÈçPhantomDL£©£¬£¬£¬£¬£¬£¬£¬£¬Åú×¢ÕâЩ¹¥»÷Ðж¯¿ÉÄܹ²Ïí²¿·Ö×ÊÔ´»òÕ½ÂÔ¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/180378/intelligence/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ