°²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬£¬£¬£¬£¬£¬ £¬£¬ÍþвŷÖÞÓû§Çå¾²

Ðû²¼Ê±¼ä 2025-08-04

1. °²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬£¬£¬£¬£¬£¬ £¬£¬ÍþвŷÖÞÓû§Çå¾²


7ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ¡°DoubleTrouble¡±µÄ°²×¿ÒøÐÐľÂíÍê³ÉÖØ´óÊÖÒÕÉý¼¶£¬£¬£¬£¬£¬£¬ £¬£¬ÆäÈö²¥ÊÖ¶ÎÓë¹¥»÷ÄÜÁ¦ÏÔÖøÔöÇ¿£¬£¬£¬£¬£¬£¬ £¬£¬¶ÔÅ·ÖÞÓû§×é³ÉÑÏËàÌôÕ½¡£¡£¡£¡£¡£¡£¡£¡£¸ÃľÂí×î³õͨ¹ý·Âð´óÐÍÒøÐд¹ÂÚÍøÕ¾Èö²¥£¬£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÒÑÀ©Õ¹ÖÁʹÓÃDiscordƽ̨ÍйܶñÒâAPKÎļþ¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬ £¬£¬´ó·ù½µµÍÁ˹ŰåÇå¾²¹¤¾ßµÄ¼ì²âЧÂÊ¡£¡£¡£¡£¡£¡£¡£¡£¾ÝZimperiumÍŶӯÊÎö£¬£¬£¬£¬£¬£¬ £¬£¬Ä¿½ñ¹¥»÷»î¶¯Éæ¼°9¸ö×îÐÂÑù±¾¼°25¸öÔçÆÚ±äÖÖ£¬£¬£¬£¬£¬£¬ £¬£¬Æä¹¦Ð§µü´úËÙÂÊÓëÒþ²ØÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¡£Ð°æÄ¾Âí¼¯³É¶àÏîÃô¸Ð¹¦Ð§£ºÍ¨¹ýMediaProjectionÓëVirtualDisplay½Ó¿ÚʵÏÖʵʱÆÁÄ»Â¼ÖÆ£¬£¬£¬£¬£¬£¬ £¬£¬¿ÉÈÆ¹ý¶àÒòËØÈÏÖ¤Ö±½Ó²¶»ñÓû§²Ù×÷»­Ã棻£»£»£»£»£»£»Î±ÔìËøÆÁ½çÃæÇÔÈ¡PINÂë¡¢ÃÜÂë¼°½âËøÍ¼°¸£»£»£»£»£»£»£»»ùÓÚÎÞÕϰ­ÊÂÎñµÄ¼üÅ̼ͼ¹¦Ð§£¬£¬£¬£¬£¬£¬ £¬£¬Äܾ«×¼²¶»ñÓû§ÊäÈëÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬£¬Ä¾Âí»¹°²ÅŶ¨ÖÆ»¯´¹ÂÚÁýÕֲ㣬£¬£¬£¬£¬£¬ £¬£¬·ÂÃ°ÒøÐÐÓ¦ÓõǼ½çÃæÓÕµ¼Óû§Ìύƾ֤£¬£¬£¬£¬£¬£¬ £¬£¬Ä¿µÄº­¸ÇÒøÐÐAPP¡¢ÃÜÂëÖÎÀí¹¤¾ß¼°¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£¡£¡£¡£¡£ÇÔÈ¡Êý¾Ý¾­±àÂëºó´«ÊäÖÁÔ¶³ÌC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ £¬£¬ÐγÉÍêÕûÊý¾ÝÇÔÈ¡Á´Ìõ¡£¡£¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/android-malware-targets-banks-via/


2. ³¯ÏÊLazarus GroupʹÓöñÒ⿪ԴÈí¼þ°üʵÑéÍøÂçÌØ¹¤»î¶¯


7ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬¾ÝÇå¾²³§ÉÌSonatype±¨¸æ£¬£¬£¬£¬£¬£¬ £¬£¬³¯Ïʹú¼ÒÖ§³ÖµÄLazarus GroupÔÚ2025ÄêÉϰëÄêÌᳫÁËÒ»³¡´ó¹æÄ£ÍøÂçÌØ¹¤Ðж¯£¬£¬£¬£¬£¬£¬ £¬£¬Í¨Ì«¹ý·¢200Óà¸ö¶ñÒ⿪ԴÈí¼þ°ü£¨Éæ¼°npmºÍPyPIƽ̨£©£¬£¬£¬£¬£¬£¬ £¬£¬ÀÖ³ÉÉøÍ¸È«Çò¿ª·¢ÇéÐΡ£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»È϶¨Îª¸Ã×éÖ¯µÄ¡°Õ½ÂÔת±ä¡±£¬£¬£¬£¬£¬£¬ £¬£¬±ê¼Ç×ÅÆä´Ó¹Å°åµÄʱ»úÖ÷Òå¹¥»÷תÏòºã¾ÃÊý¾ÝÇÔÈ¡ÓëÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£SonatypeÔÚ2025Äê1ÔÂÖÁ6Ô¼äÀÛ¼Æ×èµ²234¸öÆæÒì¶ñÒâ°ü£¬£¬£¬£¬£¬£¬ £¬£¬¹ÀËãDZÔÚÊܺ¦Õß´ï3.6ÍòÈË¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üͨ¹ýð³äÕýµ±¿ª·¢¿âʵÑéÓÕÆ­£¬£¬£¬£¬£¬£¬ £¬£¬¿ª·¢ÕßÔÚδÂÄÀúÖ¤»òɳºÐ²âÊÔµÄÇéÐÎÏÂÖ±½Ó×°Ö㬣¬£¬£¬£¬£¬ £¬£¬µ¼Ö¶ñÒâ´úÂë¾­CI/CD×Ô¶¯»¯Á÷³ÌÀ©É¢ÖÁÉú²úϵͳ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷½ÓÄɶà½×¶ÎÉè¼Æ£º³õÆÚÖ²Èë³ÌÐòÈÏÕæ½¨É賤ÆÚ»¯ºóÃÅ£¬£¬£¬£¬£¬£¬ £¬£¬ºóÐø½×¶ÎÔòרעÓÚÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬°üÀ¨¿ª·¢»úƾ֤¡¢ÔÆ»ù´¡ÉèÊ©ÁîÅÆ¼°Ô´´úÂë´æ´¢¿â»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÇ¿µ÷£¬£¬£¬£¬£¬£¬ £¬£¬LazarusµÄÄ¿µÄÒÑÓâÔ½´¿´âÇÔȡƾ֤£¬£¬£¬£¬£¬£¬ £¬£¬Æä½¹µãÒâͼÔÚÓÚͨ¹ý¿ØÖÆ¿ª·¢ÕßÇéÐΣ¬£¬£¬£¬£¬£¬ £¬£¬½øÒ»²½ÉøÍ¸ÆóÒµÍøÂç¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÌØÊâÕë¶ÔDevOps÷缯ÐÍ×éÖ¯£¬£¬£¬£¬£¬£¬ £¬£¬ÒòÆä×Ô¶¯»¯¹ÜµÀÒ׳ÉΪ¶ñÒâÒÀÀµÏîµÄÈö²¥½Úµã¡£¡£¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/200-malicious-open-source-lazarus/


3. ¼ÓÖÝ´óѧ²®¿ËÀû·ÖУÊý¾Ý¿âÔâй¶


7ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬×÷ΪÃÀ¹ú¶¥¼â¹«Á¢Ñо¿ÐÍ´óѧ£¬£¬£¬£¬£¬£¬ £¬£¬¼ÓÖÝ´óѧ²®¿ËÀû·ÖУ¿ËÈÕ±»ÆØÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¡£Ò»ÃûÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳¹ûÕæ³öÊÛËùν¡°ÍêÕûÊý¾Ý¿â¡±£¬£¬£¬£¬£¬£¬ £¬£¬Éù³Æ°üÀ¨Ñ§ÉúÊý¾Ý¡¢×êÑлáÐÅÏ¢¡¢Î÷ϯÏêÇé¡¢Óû§ÕË»§£¨º¬Óû§Ãû¡¢µç×ÓÓʼþ¼°¹þÏ£ÃÜÂ룩¼°Ö§¸¶ÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÒÔSQLºÍCSVÃûÌÃÌṩÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬Í¬Ê±¶µÊÛ»á¼û¸ÃУphpMyAdminÊý¾Ý¿âÖÎÀíÃæ°åµÄȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£ÎªÖ¤ÊµÕæÊµÐÔ£¬£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÐû²¼Á˶àÕŽØÍ¼£¬£¬£¬£¬£¬£¬ £¬£¬Õ¹Ê¾Æä¶ÔÊý¾Ý¿âºó¶ËµÄ¿ØÖÆÈ¨ÏÞ£¬£¬£¬£¬£¬£¬ £¬£¬°üÀ¨º¬Ãô¸ÐÐÅÏ¢µÄ±í¸ñ¼°Óû§ÕË»§Áбí¡£¡£¡£¡£¡£¡£¡£¡£ÍþвÕßÌṩµÄ½ØÍ¼ÏÔʾ£¬£¬£¬£¬£¬£¬ £¬£¬ÆäÀÖ³ÉÇÖÈëÊý¾Ý¿âºó¶Ë£¬£¬£¬£¬£¬£¬ £¬£¬¿ÉÉó²é°üÀ¨Ñ§Éú¡¢½ÌÖ°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄ±í¸ñ£¬£¬£¬£¬£¬£¬ £¬£¬²¢»ñÈ¡ÁË´ó×ÚÓû§ÕË»§µÄ¹þÏ£ÃÜÂë¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬£¬ÔÚ·¢Ìûʱ´ú£¬£¬£¬£¬£¬£¬ £¬£¬²®¿ËÀû·ÖУ¶à¸ö×ÓÓòÃû·ºÆðЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬ £¬£¬¹Ù·½ÍøÕ¾ÒàÏÔʾÊý¾Ý¿âÅþÁ¬¹ýʧ£¬£¬£¬£¬£¬£¬ £¬£¬½øÒ»²½×ôÖ¤ÁËÊý¾Ýй¶µÄÕæÊµÐÔ¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩϵͳÒì³£¿£¿£¿£¿£¿£¿£¿£¿ÉÄÜÓë¹¥»÷ÕߵIJÙ×÷Ö±½ÓÏà¹Ø£¬£¬£¬£¬£¬£¬ £¬£¬»ò·´Ó¦¸ÃÐ£ÍøÂçÇå¾²·À»¤±£´æÖØ´óÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


https://dailydarkweb.net/uc-berkeley-targeted-in-major-data-breach-full-university-database-allegedly-for-sale-online/


4. AkiraÀÕË÷Èí¼þʹÓÃSonicWall VPNÁãÈÕÎó²îʵÑé¹¥»÷


8ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬±±¼«ÀÇʵÑéÊÒ£¨Arctic Wolf Labs£©Ñо¿Ö°Ô±¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬ £¬£¬Õ¹ÏÖAkiraÀÕË÷Èí¼þÕýͨ¹ýSonicWall SSL VPN×°±¸ÌᳫÒÉËÆÁãÈÕÎó²î¹¥»÷£¬£¬£¬£¬£¬£¬ £¬£¬ÉõÖÁÍ»ÆÆÒÑÍêÈ«ÐÞ²¹¡¢ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¼°Æ¾Ö¤ÂÖ»»»úÖÆµÄϵͳ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê7ÔÂ15ÈÕÆð·ºÆð¼¤ÔöÌ¬ÊÆ£¬£¬£¬£¬£¬£¬ £¬£¬ÆäÀúÊ·¿É×·ËÝÖÁ2024Äê10Ô£¬£¬£¬£¬£¬£¬ £¬£¬Òý·¢ÍøÂçÇå¾²ÁìÓò¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬£¬ £¬£¬Ö»¹ÜδÍêȫɨ³ý±©Á¦ÆÆ½â¡¢Æ¾Ö¤Ìî³äµÈ¹Å°å¹¥»÷ÊֶεĿÉÄÜÐÔ£¬£¬£¬£¬£¬£¬ £¬£¬µ«¶àÏîÖ¤¾ÝÅú×¢SonicWall VPN±£´æÎ´¹ûÕæµÄÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£¡£¡£²¿·Ö°¸ÀýÏÔʾ£¬£¬£¬£¬£¬£¬ £¬£¬¼´±ã×°±¸ÒÑÍê³É×îв¹¶¡¸üС¢ÆôÓûùÓÚʱ¼äµÄÒ»´ÎÐÔÃÜÂ루TOTP£©MFA£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÔÚÆ¾Ö¤ÂÖ»»ºóÈÔÔâÈëÇÖ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÐéÄâרÓÃЧÀÍÆ÷£¨VPS£©ÍйܾÙÐÐVPNÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬ £¬£¬ÓëÕýµ±Óû§Í¨¹ý¿í´øÐ§ÀÍÉÌÍøÂçµÇ¼µÄÐÐΪģʽ±£´æÏÔÖø²î±ð¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬£¬ÈëÇÖÓëÊý¾Ý¼ÓÃܼäµÄ¶ÌÔÝʱ¼ä²î£¬£¬£¬£¬£¬£¬ £¬£¬ÌåÏÖ¹¥»÷Õ߾߱¸¿ìËÙºáÏòÒÆ¶¯ÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£¡£Õë¶ÔÕâÒ»Íþв£¬£¬£¬£¬£¬£¬ £¬£¬±±¼«ÀÇʵÑéÊÒ½¨Òé×éÖ¯ÔÝʱ½ûÓÃSonicWall SSL VPNЧÀÍ£¬£¬£¬£¬£¬£¬ £¬£¬Ö±ÖÁ¹Ù·½Ðû²¼ÓÐÓò¹¶¡¡£¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/180724/cyber-crime/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks.html


5. ·ðÂÞÀï´ïÖÝÀÎÓüÊý¾Ýй¶ÊÂÎñÒý·¢¾ìÊôÇå¾²¿Ö»Å


8ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬ÃÀ¹ú·ðÂÞÀï´ïÖÝ´óÕÓÔóµØ³Í½ÌËù£¨ECI£©½üÆÚ±¬·¢Ò»ÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ£ºÒ»ÃûÊÂÇéÖ°Ô±ÎóÏòËùÓÐÇô·¸·¢Ë͵ç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ £¬£¬ÆäÖаüÀ¨Í¬ÓüÇô·¸·Ã¿ÍµÄÁªÏµ·½·¨£¬£¬£¬£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂë¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÐÅϢͨ¹ýÀÎÓüÄÚµÄÐÅϢͤºÍÇ徲ƽ°åµçÄÔ±»Çô·¸»ñÈ¡£¬£¬£¬£¬£¬£¬ £¬£¬µ¼Ö´ó×ÚÇô·¸¾ìÊôÏÝÈëÇå¾²¿Ö»Å¡£¡£¡£¡£¡£¡£¡£¡£¶àÃûÊÜÓ°Ïì¾ìÊôÏòýÌå͸¶£¬£¬£¬£¬£¬£¬ £¬£¬Ð¹Â¶µÄÁªÏµ·½·¨¿ÉÄܱ»ÓÃÓÚÀÕË÷»òɧÈÅ¡£¡£¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬ £¬£¬¼ò¡¤ÌÀÆÕÉ­µ£ÐĵÀ£º¡°ÈôÇô·¸¼ä±¬·¢Ã¬¶Ü£¬£¬£¬£¬£¬£¬ £¬£¬¿ÉÄÜͨ¹ýй¶µÄµç»°ºÅÂëÍþв¾ìÊôÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬ £¬£¬²»È»Î£ÏÕÆä±»¹ØÑºµÄÖ§Êô¡£¡£¡£¡£¡£¡£¡£¡£¡±ÅÁÌØÀï˹¡¤¿­ÀûÔòÒòÔøÔâÓö¸ú×Ù£¬£¬£¬£¬£¬£¬ £¬£¬¸üµ£ÐÄ×Ô¼ºµÄÊý×ÖÒþ˽±»·¸·¨·Ö×ÓʹÓᣡ£¡£¡£¡£¡£¡£¡£Ö»¹ÜÀÎÓüÒÑ֪ͨ²¿·Ö¾ìÊôÊý¾Ýй¶ÇéÐΣ¬£¬£¬£¬£¬£¬ £¬£¬µ«·ðÂÞÀï´ïÖݳͽ̲¿·Öδ¶ÔýÌåѯÎÊ×÷³ö»ØÓ¦£¬£¬£¬£¬£¬£¬ £¬£¬½øÒ»²½¼Ó¾çÁ˹«Öڵĵ£ÐÄ¡£¡£¡£¡£¡£¡£¡£¡£


https://www.theregister.com/2025/08/01/florida_prison_email_blunder/


6. ÐÂÐͶà½×¶Î¶ñÒâÈí¼þʹÓÃWindows¿ì½Ý·½·¨Èö²¥REMCOSºóÃÅ


8ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬Çå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÒ»ÆðÐÂÐͶà½×¶Î¶ñÒâÈí¼þ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬ £¬£¬Æäͨ¹ýÈ«ÐÄαװµÄWindows¿ì½Ý·½·¨Èö²¥Î£ÏÕµÄREMCOSÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷Á´Éè¼ÆÇÉÃ£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÓû§¶Ô¡°ÎÞº¦Îļþ¡±µÄÐÅÈÎʵÏÖÒþ²ØÈëÇÖ£¬£¬£¬£¬£¬£¬ £¬£¬×îÖÕ¸¶Óë¹¥»÷ÕßÍêÈ«¿ØÖÆÊÜѬȾϵͳµÄÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»¸ö¿´ËÆÕý³£µÄLNKÎļþ£¬£¬£¬£¬£¬£¬ £¬£¬Í¨³£Í¨¹ýµç×ÓÓʼþ¸½¼þÈö²¥£¬£¬£¬£¬£¬£¬ £¬£¬ÎļþÃûαװ³É¡°ORDINE-DI-ACQUIST-7263535¡±µÈÉÌÎñÏà¹ØÃû³ÆÒÔ½µµÍÓû§Ð¡ÐÄ¡£¡£¡£¡£¡£¡£¡£¡£µ±Óû§µã»÷¸ÃÎļþʱ£¬£¬£¬£¬£¬£¬ £¬£¬ÆäÄÚÖõÄPowerShellÏÂÁî»áÔÚºǫ́¾²Ä¬Ö´ÐУ¬£¬£¬£¬£¬£¬ £¬£¬Èƹý¹Å°åÇå¾²¼ì²â»úÖÆ¡£¡£¡£¡£¡£¡£¡£¡£PowerShell×÷ΪWindowsʹÃü×Ô¶¯»¯¹¤¾ß£¬£¬£¬£¬£¬£¬ £¬£¬Ôڴ˴ι¥»÷Öб»ÀÄÓÃΪ¶ñÒâÔØºÉÏÂÔØÆ÷£ºÍ¨¹ý´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡Base64±àÂëµÄÓÐÓÃÔØºÉ²¢½âÂ룬£¬£¬£¬£¬£¬ £¬£¬×îÖÕÆô¶¯Ò»¸öαװ³É¡°CHROME.PIF¡±µÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£¡£¡£¡£½âÂëºóµÄÔØºÉ×îÖÕÔÚϵͳ%ProgramData%Ŀ¼Ï½¨Éè¡°Remcos¡±Îļþ¼Ð£¬£¬£¬£¬£¬£¬ £¬£¬×°ÖÃREMCOSºóÃŲ¢ÌìÉú»÷¼üÈÕÖ¾Îļþ£¬£¬£¬£¬£¬£¬ £¬£¬È·¼á³¤ÆÚ»¯×¤Áô¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õ߿ɽè´ËʵÑé¼üÅ̼ͼ¡¢½¨ÉèÔ¶³ÌShell¡¢»á¼ûÎļþ£¬£¬£¬£¬£¬£¬ £¬£¬ÉõÖÁ¿ØÖÆÉãÏñÍ·ºÍÂó¿Ë·ç¾ÙÐÐʵʱ¼àÊÓ¡£¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/attack-windows-shortcut-files-install-remcos-backdoor/