ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿£¿£¿£¿£¿éÈÆ¹ýÉí·ÝÑéÖ¤

Ðû²¼Ê±¼ä 2025-08-05

1. ÐÂÐÍLinuxºóÃÅPlagueͨ¹ý¶ñÒâPAMÄ£¿£¿£¿£¿£¿éÈÆ¹ýÉí·ÝÑéÖ¤


8ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò¿ËÈÕÅû¶һ¿îÃûΪ"Plague"µÄÐÂÐÍLinuxºóÃųÌÐò£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ýαװ³É¿É²å°ÎÈÏ֤ģ¿£¿£¿£¿£¿é£¨PAM£©ÊµÏÖ³¤´ïÒ»ÄêµÄÒþ²ØÔËÐС£¡£¡£¡£¡£¡£¾ÝNextron SystemsÑо¿Ô±Pierre-Henri PezierÕ¹ÏÖ£¬£¬£¬£¬£¬£¬£¬¸ÃÖ²Èë³ÌÐòÉî¶È¼¯³ÉÓÚLinuxϵͳµÄÈÏÖ¤¿ÍÕ»£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÌæ»»»ò¸Ä¶¯PAMÄ£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»¾²Ä¬ÈƹýϵͳÈÏÖ¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬½¨É賤ÆÚµÄSSH»á¼ûͨµÀ¡£¡£¡£¡£¡£¡£×÷ΪUNIX/Linuxϵͳ½¹µã×é¼þ£¬£¬£¬£¬£¬£¬£¬PAMͨ¹ý¹²Ïí¿âʵÏÖÓû§ÈÏÖ¤µÄ¼¯Öл¯ÖÎÀí£¬£¬£¬£¬£¬£¬£¬µ«ÕâÒ»ÌØÕ÷±»¶ñÒâÈí¼þ¿ª·¢ÕßʹÓᣡ£¡£¡£¡£¡£µ±¶ñÒâPAMÄ£¿£¿£¿£¿£¿é¼ÓÔØÖÁÌØÈ¨Àú³Ìʱ£¬£¬£¬£¬£¬£¬£¬¿ÉͬʱʵÏÖÆ¾Ö¤ÇÔÈ¡¡¢ÈÏÖ¤Á÷³ÌÈÆ¹ý¼°Çå¾²¹¤¾ß¹æ±ÜÈýÖØ¹¦Ð§¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬×Ô2024Äê7ÔÂ29ÈÕÆð£¬£¬£¬£¬£¬£¬£¬VirusTotalƽ̨ÒÑÊÕ¼¶à¸öPlagueÑù±¾£¬£¬£¬£¬£¬£¬£¬µ«×èÖ¹Åû¶ʱËùÓÐÖ÷Á÷·´²¡¶¾ÒýÇæ¾ù佫Æäʶ±ðΪÍþв£¬£¬£¬£¬£¬£¬£¬ÌåÏָÿò¼Ü¾ß±¸³ÉÊìµÄÃâɱÊÖÒÕ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/08/new-plague-pam-backdoor-exposes.html


2. ºÚ¿Í×éÖ¯CL-STA-0969DZÔÚ10¸öÔ£¬£¬£¬£¬£¬£¬£¬ÏòµçÐÅÍøÂçÖ²ÈëÒþ²Ø¶ñÒâÈí¼þ


8ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬¶«ÄÏÑǵçÐÅ×éÖ¯½üÆÚÔâÓö¹ú¼Ò¼¶Íþв×éÖ¯CL-STA-0969µÄ¶¨ÏòÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã×é֯ͨ¹ý°²ÅŸ߶ȶ¨ÖÆ»¯µÄ¶ñÒ⹤¾ßÁ´ÊµÏÖ¶ÔÄ¿µÄÍøÂçµÄÔ¶³Ì¿ØÖÆ¡£¡£¡£¡£¡£¡£¾ÝPalo Alto NetworksÆìÏÂUnit 42ʵÑéÊÒÅû¶£¬£¬£¬£¬£¬£¬£¬2024Äê2ÔÂÖÁ11ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯Õë¶Ô¶«ÄÏÑÇÒªº¦µçÐÅ»ù´¡ÉèÊ©Ìᳫ¶àÆð¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃCordscanµÈ¹¤¾ßÍøÂçÒÆ¶¯×°±¸Î»ÖÃÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«ÊÓ²ìÏÔʾÆäδʵÑéÊý¾ÝÍâй»ò×°±¸×·×ÙÐÐΪ¡£¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬CL-STA-0969×Ô2020ÄêÆðÒ»Á¬Õë¶ÔÄÏÑÇ¡¢·ÇÖÞµçÐÅʵÌ忪չÇ鱨ÇÔÈ¡»î¶¯£¬£¬£¬£¬£¬£¬£¬Æä²¿·Ö¹¥»÷ÊÖ·¨Óë×ÅÃûAPT×éÖ¯"LightBasin"£¨UNC1945£©¼°½ðÈÚ·¸·¨ÕûÌå"UNC2891"±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýSSH±©Á¦ÆÆ½âµçÐÅ×°±¸ÄÚÖÃÕË»§»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬Ê¹Óö¨ÖÆ»¯×ÖµäÁбíʵÑ鶨ÏòÍ»ÆÆ¡£¡£¡£¡£¡£¡£Æä¹¤¾ßÁ´°üÀ¨Áù´ó½¹µã×é¼þ£ºÁýÕÖÕýµ±PAMÄ£¿£¿£¿£¿£¿éµÄAuthDoorƾ֤ÇÔÈ¡¹¤¾ß¡¢ÀÄÓÃGTP-CЭÒéµÄGTPDoorÒþ²ØC2ͨµÀ¡¢»ùÓÚICMP»ØÏÔµÄEchoBackdoorÎÞ¼ÓÃÜÖ¸Áî´«Ê䡢ģÄâSGSN½ÚµãµÄÍøÂçÁ÷Á¿ÈÆÐÐÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¾ß±¸Ô¶³ÌShellºÍ¼üÅ̼ͼ¹¦Ð§µÄChronosRATºóÃÅ¡£¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇNoDepDNS¹¤¾ß£¬£¬£¬£¬£¬£¬£¬¸Ã»ùÓÚGolangµÄDNSËíµÀºóÃÅͨ¹ýԭʼÌ×½Ó×ÖÆÊÎö53¶Ë¿ÚUDPÖ¸Á£¬£¬£¬£¬£¬£¬ÊµÏÖ¿ç·À»ðǽͨѶ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html


3. Ô½ÄϺڿÍʹÓÃPXAÇÔÈ¡Èí¼þ¹¥»÷È«Çò4000¸öIPµØµã


8ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò½üÆÚÆØ¹âÒ»ÆðÓÉÔ½ÄϺڿÍÍÅ»ïÌᳫµÄ¿ç¹úÍøÂç·¸·¨»î¶¯£¬£¬£¬£¬£¬£¬£¬Æä½¹µã¹¤¾ßΪÐÂÐÍPythonÐÅÏ¢ÇÔȡľÂí"PXA Stealer"¡£¡£¡£¡£¡£¡£¾ÝBeazley SecurityÓëSentinelOneÁªºÏ±¨¸æ£¬£¬£¬£¬£¬£¬£¬¸Ã·¸·¨¼¯ÍÅͨ¹ýTelegram API¹¹½¨¶©ÔÄÖÆµØÏÂÉú̬£¬£¬£¬£¬£¬£¬£¬ÒÑÀֳɹ¥ÏÝ62¸ö¹ú¼Ò³¬4000̨װ±¸£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡°üÀ¨20Íò×é×ÔÁ¦ÃÜÂë¡¢Êý°ÙÌõÐÅÓÿ¨ÐÅÏ¢¼°400ÍòÌõä¯ÀÀÆ÷CookieµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Ðγɼ¯Êý¾ÝÇÔÈ¡¡¢×Ô¶¯»¯×ªÊÛÓ븴ÓÃÓÚÒ»ÌåµÄÍêÕû·¸·¨¹¤ÒµÁ´¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬PXA StealerµÄÊÖÒÕÑݽø·ºÆðÏÔÖøÍ»ÆÆ¡£¡£¡£¡£¡£¡£×îÔçÓÉ˼¿ÆTalosÓÚ2024Äê11Ô·¢Ã÷µÄ¸ÃľÂí£¬£¬£¬£¬£¬£¬£¬×î³õÕë¶ÔÅ·ÑÇÕþ¸®¼°½ÌÓý»ú¹¹ÊµÑ鶨Ïò¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿ÉÇÔÈ¡ÃÜÂë¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢½ðÈÚ»ú¹¹ÐÅÏ¢¼°ä¯ÀÀÆ÷×Ô¶¯Ìî³äÊý¾Ý¡£¡£¡£¡£¡£¡£2025Äê¹¥»÷»î¶¯Éý¼¶ºó£¬£¬£¬£¬£¬£¬£¬·¸·¨ÍÅ»ï½ÓÄÉDLL²à¼ÓÔØÊÖÒÕÓëÖØ´ó·Ö½×¶Î°²ÅÅ²ã¹æ±Ü¼ì²â£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÏòÊܺ¦Õßչʾ°æÈ¨ÇÖȨ֪ͨµÈ·Ç¶ñÒâÓÕ¶üÎĵµÍê³ÉѬȾÁ÷³Ì¡£¡£¡£¡£¡£¡£Ð°æÄ¾ÂíÍ»ÆÆChromiumä¯ÀÀÆ÷"Ó¦Óð󶨼ÓÃܱ£»£»£»£» £»£»£»£»¤"»úÖÆ£¬£¬£¬£¬£¬£¬£¬½«¹¥»÷¹æÄ£À©Õ¹ÖÁVPN¿Í»§¶Ë¡¢ÔÆÏÂÁîÐй¤¾ß£¨CLI£©¡¢¹²ÏíÎļþ¼°DiscordµÈÓ¦ÓÃÊý¾Ý¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html


4. ÏãÄζùÏÝSalesforceÊý¾Ýй¶·ç²¨£ºShinyHunters×éÖ¯Ò»Á¬¹¥»÷


8ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬·¨¹úʱÉоÞÍ·ÏãÄζù¿ËÈÕ³ÉΪ¿ç¹úÊý¾Ý͵ÇÔÀ˳±ÖеÄ×îÐÂÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬ÆäÃÀ¹ú¿Í»§Ð§ÀÍÖÐÐÄÊý¾Ý¿âÔâÈëÇÖµ¼ÖÂÓû§ÐÅϢй¶¡£¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÔ´ÓÚÍþвÐÐΪÕß¶ÔÏãÄζùµÚÈý·½Ð§ÀÍÌṩÉÌSalesforceʵÀýµÄ²»·¨»á¼û£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÓïÒô´¹ÂÚºÍÉç»á¹¤³ÌÊÖ¶ÎÇÔȡԱ¹¤Æ¾Ö¤£¬£¬£¬£¬£¬£¬£¬»òÓÕÆ­ÆäÊÚȨ¶ñÒâOAuthÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬×îÖÕÓÚ7ÔÂ25ÈÕÀÖ³ÉÉøÍ¸ÏµÍ³¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸Ç²¿·ÖÃÀ¹ú¿Í»§µÄÐÕÃû¡¢µç×ÓÓʼþ¡¢Óʼĵص㼰µç»°ºÅÂëµÈÓÐÏÞСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÏãÄζùÒÑÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬£¬£¬£¬£¬£¬£¬µ«Î´¹ûÕæÏêϸÊÜÓ°ÏìÈËÊý¼°µÚÈý·½Ð§ÀÍÉÌÃû³Æ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»¹éÒòÓÚÀÕË÷×éÖ¯ShinyHuntersÌᳫµÄÒ»Á¬ÐÔSalesforce¶¨Ïò¹¥»÷¡£¡£¡£¡£¡£¡£¾ÝMandiantÆÊÎö£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïͨ¹ýÖØ´óµÄÉç»á¹¤³ÌÕ½ÂÔ»ñÈ¡ÆóÒµSalesforceÕË»§¿ØÖÆÈ¨£¬£¬£¬£¬£¬£¬£¬½ø¶øÇÔÈ¡Êý¾Ý¿âʵÑéÀÕË÷¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Salesforce¹Ù·½Ç¿µ÷Æäƽ̨δ±»Ö±½ÓÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÎÊÌâÔ´ÓÚ¿Í»§ÕË»§Çå¾²²½·¥È±·¦£¬£¬£¬£¬£¬£¬£¬²¢ÖØÉêÆóÒµ¼¶Çå¾²»úÖÆÒÑÈÚÈëÆ½Ì¨µ×²ãÉè¼Æ£¬£¬£¬£¬£¬£¬£¬µ«¿Í»§ÈÔÐè¼ç¸ºÊý¾Ý±£»£»£»£» £»£»£»£»¤ÔðÈΡ£¡£¡£¡£¡£¡£¸Ã¹«Ë¾½¨ÒéÓû§ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡¢×ñÕÕ×îСȨÏÞÔ­Ôò¼°ÑÏ¿áÖÎÀíµÚÈý·½Ó¦ÓÃÅþÁ¬£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼Çå¾²Ö¸ÄÏЭÖúÌá·ÀÀàËÆ¹¥»÷¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/


5. ĦÄɸçÉÝ»ªÂùݼ¯ÍÅÔâD4rk4rmyºÚ¿Í×éÖ¯Êý¾Ýй¶


8ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬Ä¦Äɸç°ÙÄêÉÝ»ªÂùݼ¯ÍÅÃÉÌØ¿¨Âå±õº£¶È¼ÙÂùݣ¨SBM£©¿ËÈÕ¾íÈëÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨¼¯ÍÅD4rk4rmyÐû³Æ¶ÔÆä·¢¶¯ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢½«¸Ã¼¯ÍÅÁÐÈëÆäTor°µÍøÐ¹ÃÜÍøÕ¾µÄÊܺ¦ÕßÃûµ¥¡£¡£¡£¡£¡£¡£×÷ΪĦÄɸ繫¹úÏóÕ÷ÐÔÆóÒµ£¬£¬£¬£¬£¬£¬£¬SBM×Ô1863Ä꽨ÉèÒÔÀ´Ê¼ÖÕÖ÷µ¼×ÅÍâµØºÀ»ªÂùݡ¢²©²Ê¼°¸ß¶Ë²ÍÒû¹¤Òµ£¬£¬£¬£¬£¬£¬£¬ÆäÆìÏÂÃÉÌØ¿¨Âå¶Ä³¡Óë°ÍÀè´óÂùݸüÊÇÈ«Çò¾«Ó¢½×¼¶µÄ±ê¼ÇÐÔÉç½»³¡ºÏ¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÊÂÎñ²»µ«Íþвµ½¸ß¶Ë¿Í»§Òþ˽Çå¾²£¬£¬£¬£¬£¬£¬£¬¸ü¿ÉÄÜÒ¡¶¯Ä¦ÄɸçÉÝ³ÞÆ·ÐÐÒµ¿àÐÄı»®µÄÆ·ÅÆÐÎÏ󡣡£¡£¡£¡£¡£¹¥»÷ÕßÉù³ÆÒÑÇÔÈ¡´ó×ÚÃô¸Ð¿Í»§Êý¾ÝÓ빫˾ÄÚ²¿Îļþ£¬£¬£¬£¬£¬£¬£¬ÏêϸӰÏì¹æÄ£ÉÐδÍêÈ«Åû¶¡£¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ͹ÏÔÍøÂç·¸·¨·Ö×ÓÕý½«Ä¿µÄתÏò¸ß¾»ÖµÐ§ÀÍÒµ£¬£¬£¬£¬£¬£¬£¬ÕâÀà»ú¹¹ËäÓµÓÐÑÏ¿áµÄÇå¾²·À»¤ÏµÍ³£¬£¬£¬£¬£¬£¬£¬È´ÒòÕÆÎÕ´ó×ڸ߼ÛÖµ¿Í»§Êý¾Ý¶ø³ÉΪ¹¥»÷ÕßµÄ"ÓÅѡĿµÄ"¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Èôй¶ÐÅÏ¢Éæ¼°ÕþÉÌÒªÔ±»òÉñÃØÉÌÒµÊý¾Ý£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÒý·¢Á¬Ëø·´Ó¦£¬£¬£¬£¬£¬£¬£¬²¨¼°SBMµÄ¿ç¹úÏàÖúͬ°é¹ØÏµÓë¸ß¶Ë¿Í»§ÐÅÈζÈ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/180780/cyber-crime/hacking-group-d4rk4rmy-claimed-the-hack-of-monte-carlo-societe-des-bains-de-mer.html


6. CTM360·¢Ã÷Õë¶ÔTikTok ShopÓû§µÄ¶ñÒâ¡°ClickTok¡±»î¶¯


8ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹CTM360¿ËÈÕÅû¶´úºÅ"ClickTok"µÄÐÂÐÍ¿çÆ½Ì¨Õ©Æ­Ðж¯£¬£¬£¬£¬£¬£¬£¬¸Ã×é֯ͨ¹ý¹¹½¨ÍêÕûÐéαTikTokÉÌÒµÉú̬£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÍøÂç´¹ÂÚÓëSparkKittyÌØ¹¤Èí¼þʵÑé¼ÓÃÜÇ®±Ò͵ÇÔ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃAIÌìÉúÊÓÆµÔÚTikTokƽ̨´ó¹æÄ£ÒýÁ÷£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§»á¼ûÈ«ÐÄαÔìµÄÓòÃû£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¼ÓÃÜÇ®±ÒÖ§¸¶ÒªÇóÓÕµ¼×°ÖÃǶÌ×¶ñÒâ´úÂëµÄ"TikTokÐ޸İæ"Ó¦Óᣡ£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸ÃľÂíÓ뿨°Í˹»ù´ËÇ°ÆØ¹âµÄSparkCatÌØ¹¤Èí¼þ±£´æÊÖÒÕ¹ØÁª£¬£¬£¬£¬£¬£¬£¬Æä±äÖÖSparkKittyͨ¹ý×¢ÈëChromiumä¯ÀÀÆ÷Àú³ÌÍ»ÆÆ¹Å°å¼ÓÃܱ£»£»£»£» £»£»£»£»¤£¬£¬£¬£¬£¬£¬£¬¿ÉÉî¶ÈÇÔȡװ±¸½ØÍ¼¡¢VPNƾ֤¡¢ÔÆÐ§ÀÍCLI¹¤¾ßÊý¾Ý¼°DiscordµÈÓ¦ÓÃÐÅÏ¢¡£¡£¡£¡£¡£¡£ÓÈΪֵµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯½ÓÄÉ"Ó¦Óð󶨼ÓÃܱ£»£»£»£» £»£»£»£»¤"Í»ÆÆÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Ê¹¶ñÒâ´úÂëÄÜÈÆ¹ýͨÀýÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£¾ÝCTM360ͳ¼Æ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÐж¯ÒѰ²Åų¬10000¸öÐéαÓòÃû¼°5000¸ö¶ñÒâÓ¦ÓÃʵÀý£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¶þάÂë¡¢¼´Ê±Í¨Ñ¶Èí¼þ¼°Ó¦ÓÃÄÚÏÂÔØÊµÏÖÁѱäʽÈö²¥¡£¡£¡£¡£¡£¡£¹¥»÷Õß¹¹½¨ÁËÍêÕûµÄµØÏÂÉúÒâÁ´£ºÇÔÈ¡Êý¾Ý¾­SherlockµÈºÚÊÐÆ½Ì¨×ªÊÛ£¬£¬£¬£¬£¬£¬£¬ÏÂÓη¸·¨ÍÅ»ï¿ÉʹÓûñÈ¡µÄTikTokÕ˺ÅʵÑé¶þ´ÎÕ©Æ­»òÉøÍ¸¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÐγÉ"Êý¾ÝÇÔÈ¡-ƽ̨ÍйÜ-¶©ÔÄÏúÊÛ"µÄ¹¤Òµ»¯·¸·¨Ä£Ê½¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ctm360-spots-malicious-clicktok-campaign-targeting-tiktok-shop-users/