΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷

Ðû²¼Ê±¼ä 2024-10-15

1. ΢ÈíÐû²¼ÐÂÖ¸ÄÏ£ºÇ¿»¯·ÀÓùKerberoasting¹¥»÷


10ÔÂ13ÈÕ£¬ £¬£¬£¬£¬£¬£¬Î¢Èí½üÆÚÐû²¼ÁËÐÂÖ¸ÄÏ£¬ £¬£¬£¬£¬£¬£¬Ö¼ÔÚ×ÊÖú×éÖ¯ÓÐÓ÷ÀÓùÈÕÒæÑÏÖØµÄ Kerberoasting ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷Ö÷ÒªÕë¶Ô Active Directory (AD) ÇéÐÎ ¡£¡£¡£¡£¡£Kerberoasting ʹÓà Kerberos Éí·ÝÑé֤ЭÒéÇÔÈ¡ AD ƾ֤£¬ £¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»ÆÕ±é»á¼ûÃô¸Ð×ÊÔ´ ¡£¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬Ëæ×ÅÍøÂçÍþвµÄÒ»Ö±Ñݱ䣬 £¬£¬£¬£¬£¬£¬Ç徲רҵְԱ±ØÐè½ô¸ú×îÐµĹ¥»÷ǰÑԺͷÀÓù»úÖÆ ¡£¡£¡£¡£¡£ÓÉÓÚ GPU ¼ÓËÙÃÜÂëÆÆ½âÊÖÒÕµÄÔËÓ㬠£¬£¬£¬£¬£¬£¬Kerberoasting ¹¥»÷µÄÓÐÓÃÐÔÕýÔÚÌáÉý ¡£¡£¡£¡£¡£ÔÚ Kerberoasting ¹¥»÷ÖУ¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÇëÇó²¢ÆÆ½âʹÓÃÕË»§ÃÜÂë¹þÏ£¼ÓÃܵÄЧÀÍÆ±Ö¤£¬ £¬£¬£¬£¬£¬£¬À´»ñÈ¡ÕË»§ÃÜÂ뼰δ¾­ÊÚȨµÄ»á¼ûȨÏÞ ¡£¡£¡£¡£¡£ÌØÊâÊÇÃÜÂë½ÏÈõµÄÕË»§ºÍʹÓýÏÈõ¼ÓÃÜËã·¨£¨Èç¼´½«±»ÆúÓÃµÄ RC4£©µÄÕË»§£¬ £¬£¬£¬£¬£¬£¬¸üÒ×Êܵ½¹¥»÷ ¡£¡£¡£¡£¡£Î¢ÈíÍýÏëÔÚ Windows 11 24H2 ºÍ Windows Server 2025 µÄδÀ´¸üÐÂÖÐĬÈϽûÓà RC4 ¡£¡£¡£¡£¡£Îª¼õÇá Kerberoasting Σº¦£¬ £¬£¬£¬£¬£¬£¬Î¢Èí½¨Òé½ÓÄɶàÏî²½·¥£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÃ×éÍйÜЧÀÍÕÊ»§ (gMSA) »òίÍÐÍйÜЧÀÍÕÊ»§ (dMSA)¡¢Ç¿ÖÆÊ¹ÓÃÇ¿ÃÜÂë¡¢ÉèÖÃЧÀÍÕÊ»§Ê¹Óà AES ¼ÓÃÜ£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°ÉóºË²¢É¾³ý²»ÐëÒªµÄЧÀÍÖ÷ÌåÃû³Æ (SPN) ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬Î¢Èí»¹ÌṩÁ˼ì²â Kerberoasting ¹¥»÷µÄÖ¸µ¼ ¡£¡£¡£¡£¡£


https://securityonline.info/microsoft-issues-guidance-to-combat-rising-kerberoasting-attacks/


2. Water MakaraʹÓÃÐÂÌÓ±ÜÊÖÒÕÕë¶Ô°ÍÎ÷ÆóÒµ°²ÅÅAstaroth¶ñÒâÈí¼þ


10ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬£¬Trend MicroÑо¿Ö°Ô±·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬Ò»¸öÃûΪWater MakaraµÄÍþвÐÐΪÕßÕûÌåÕë¶Ô°ÍÎ÷ÆóÒµ¾ÙÐеĶñÒâ»î¶¯¼¤Ôö£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÒ»ÖÖеÄÌÓ±ÜÊÖÒÕÀ´°²ÅÅÎÛÃûÕÑÖøµÄAstarothÒøÐжñÒâÈí¼þ ¡£¡£¡£¡£¡£´Ë´ÎÓã²æÊ½ÍøÂç´¹ÂڻÖ÷ÒªÕë¶ÔÀ­¶¡ÃÀÖ޵Ĺ«Ë¾£¬ £¬£¬£¬£¬£¬£¬ÓÈÆäÊǰÍÎ÷µÄÖÆÔ칫˾¡¢ÁãÊÛ¹«Ë¾ºÍÕþ¸®»ú¹¹£¬ £¬£¬£¬£¬£¬£¬Í¨¹ýð³ä¹Ù·½Ë°ÎñÎļþ²¢Ê¹ÓÃСÎÒ˽¼ÒËùµÃ˰É걨µÄ½ôÆÈÐÔÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þ ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃmshta.exeÖ´ÐлìÏýµÄJavaScriptÏÂÁ £¬£¬£¬£¬£¬£¬ÓëC&CЧÀÍÆ÷½¨ÉèÅþÁ¬ ¡£¡£¡£¡£¡£ZIPÎļþ¸½¼þÖаüÀ¨¶ñÒâµÄLNKÎļþ£¬ £¬£¬£¬£¬£¬£¬µ±Óû§Ö´ÐÐʱ£¬ £¬£¬£¬£¬£¬£¬»áÔËÐÐǶÈëµÄ¶ñÒâJavaScriptÏÂÁî ¡£¡£¡£¡£¡£³ýÁËLNKÎļþ£¬ £¬£¬£¬£¬£¬£¬ZIPÎļþ»¹°üÀ¨ÁíÒ»¸ö¾ßÓлìÏýJavaScriptÏÂÁîµÄÎļþ ¡£¡£¡£¡£¡£Ôڴ˴λÖУ¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁ˶à¸öÎļþÀ©Õ¹Ãû£¬ £¬£¬£¬£¬£¬£¬Èç.pdf¡¢.jpgµÈ£¬ £¬£¬£¬£¬£¬£¬ÒÔÈö²¥¶ñÒâÈí¼þ ¡£¡£¡£¡£¡£½âÂëºóµÄJavaScriptÏÂÁîÕ¹ÏÖÁËÒ»¸ö¶ñÒâURL£¬ £¬£¬£¬£¬£¬£¬Í¨¹ýGetObjectº¯ÊýʵÑéÖ´Ðлò¼ìË÷¹¤¾ß£¬ £¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÆäËû¶ñÒâ²Ù×÷ ¡£¡£¡£¡£¡£Water MakaraµÄÓã²æÊ½ÍøÂç´¹ÂڻÒÀÀµÓÚÓû§µã»÷¶ñÒâÎļþ£¬ £¬£¬£¬£¬£¬£¬Òò´Ë¹«Ë¾Ó¦½ÓÄÉ×î¼Ñʵ¼ù£¬ £¬£¬£¬£¬£¬£¬ÈçÇå¾²Åàѵ¡¢Ç¿ÃÜÂëÕ½ÂÔ¡¢¶àÒòËØÉí·ÝÑéÖ¤¡¢¼á³ÖÇå¾²½â¾ö¼Æ»®¸üеÈ£¬ £¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿¶Ô´ËÀàÍþвµÄ·ÀÓù ¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html


3. GmailÓû§ÔâAIÔöÇ¿ÐÍÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬×¨¼ÒÇ××Ô½ÒÃØÈ¦Ì×


10ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬£¬Gmail×÷ΪȫÇò×îÊ¢Ðеĵç×ÓÓʼþЧÀÍ£¬ £¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý25ÒÚÓû§£¬ £¬£¬£¬£¬£¬£¬Ò²Òò´Ë³ÉΪÁ˶ñÒâÐÐΪÕßÈëÇÖÕË»§ºÍÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÖØµãÄ¿µÄ ¡£¡£¡£¡£¡£Î¢ÈíÇå¾²²úƷר¼Ò¡¢CloudJoyÊ×´´ÈËSam Mitrovic×î½üÖÒÑԳƣ¬ £¬£¬£¬£¬£¬£¬Ò»ÖÖÖØ´óµÄÈ˹¤ÖÇÄÜÔöÇ¿ÐÍÍøÂç´¹ÂÚÍýÏëÕýÕë¶ÔGmailÓû§£¬ £¬£¬£¬£¬£¬£¬¾ÍÁ¬Ëû×Ô¼ºÒ²ÖÐÁËÕÐ ¡£¡£¡£¡£¡£È¦Ì×´ÓÒ»·âÉù³ÆÀ´×ԹȸèµÄµç×ÓÓʼþ×îÏÈ£¬ £¬£¬£¬£¬£¬£¬ÓʼþÓÕµ¼Ëûµã»÷Á´½Ó½øÈëÒ»¸ö·ÂÕæµÄÚ²Æ­ÍøÕ¾£¬ £¬£¬£¬£¬£¬£¬ÍýÏëÇÔÈ¡µÇ¼ƾ֤ ¡£¡£¡£¡£¡£½Ó×Å£¬ £¬£¬£¬£¬£¬£¬ËûÓÖÊÕµ½ÁËÀ´×Ô¡°Google¡±µÄµç»°£¬ £¬£¬£¬£¬£¬£¬Éù³Æ¼ì²âµ½ÆäÕË»§±£´æÒì³£»£»£»£»£»î¶¯ ¡£¡£¡£¡£¡£Ö»¹ÜMitrovic¶ÔÀ´µçºÅÂë¾ÙÐÐÁËÔÚÏßËÑË÷£¬ £¬£¬£¬£¬£¬£¬²¢È·ÈÏÁËÆäÕýµ±ÐÔ£¬ £¬£¬£¬£¬£¬£¬µ«ÔÚ×Ðϸ¼ì²é·¢¼þÈ˵ĵç×ÓÓʼþµØµãºó£¬ £¬£¬£¬£¬£¬£¬ËûÃôÈñµØ·¢Ã÷µØµãαװ³ÉÁËGoogle¹Ù·½ÓòÃû ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬Mitrovic»¹Òâʶµ½£¬ £¬£¬£¬£¬£¬£¬Æ­×ÓµÄÉùÒô¹ýÓÚÍêÉÆ£¬ £¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇÓÉÈ˹¤ÖÇÄÜÌìÉúµÄ ¡£¡£¡£¡£¡£ËûÒÔΪ£¬ £¬£¬£¬£¬£¬£¬ÕâÊÇÈ«Çò¹æÄ£Äڵĺڿͻ£¬ £¬£¬£¬£¬£¬£¬¶øËûÖ»ÊÇÖÚ¶àÊܺ¦ÕßÖ®Ò» ¡£¡£¡£¡£¡£Òò´Ë£¬ £¬£¬£¬£¬£¬£¬ËûÏò¹«ÖÚ·¢³ö¾¯Ê¾£¬ £¬£¬£¬£¬£¬£¬ÌáÐѸ÷ÈËÕ©Æ­ÊÖ¶ÎÈÕÒæÖØ´óÇÒÁîÈËÐÅ·þ£¬ £¬£¬£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÓ¦¼á³Ö¸ß¶ÈСÐÄ£¬ £¬£¬£¬£¬£¬£¬¾ÙÐлù±¾¼ì²é»òÏòÐÅÈεÄÈËÇóÖú£¬ £¬£¬£¬£¬£¬£¬ÒÔÌá·À´ËÀ๥»÷ ¡£¡£¡£¡£¡£


https://securityonline.info/gmail-scam-alert-hackers-spoof-google-to-steal-credentials/


4. ˼¿ÆÊÓ²ìÊý¾Ýй¶ָ¿Ø£ºÒÉÔâºÚ¿ÍÈëÇÖ


10ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬£¬Ë¼¿Æ¹«Ë¾Ö¤ÊµÕýÔÚÊÓ²ìÒ»ÏîÖ¸¿Ø£¬ £¬£¬£¬£¬£¬£¬Ö¸¿Ø³ÆÒ»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉϳöÊ۾ݳÆÊÇ´Ó˼¿ÆÇÔÈ¡µÄÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬ÌåÏÖ¹«Ë¾¿ÉÄÜÒÑÔâÊÜÈëÇÖ ¡£¡£¡£¡£¡£Ë¼¿Æ½²»°ÈËÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬¹«Ë¾ÒÑÏàʶµ½Ïà¹Ø±¨µÀ£¬ £¬£¬£¬£¬£¬£¬²¢ÒÑÆô¶¯ÊÓ²ìÒÔÆÀ¹ÀÕâһ˵·¨µÄÕæÊµÐÔ£¬ £¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ ¡£¡£¡£¡£¡£´Ëǰ£¬ £¬£¬£¬£¬£¬£¬ÃûΪ¡°IntelBroker¡±µÄÍþвÐÐΪÕßÉù³Æ£¬ £¬£¬£¬£¬£¬£¬ËûÓëÁíÍâÁ½ÃûºÚ¿ÍÓÚ2024Äê6ÔÂ10ÈÕÈëÇÖÁË˼¿ÆÏµÍ³£¬ £¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË´ó×Ú¿ª·¢Ö°Ô±Êý¾Ý ¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÂÛ̳µÄÌû×ÓÏÔʾ£¬ £¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨ÖÖÖÖÏîĿԴ´úÂë¡¢Ó²±àÂëÆ¾Ö¤¡¢Ö¤Êé¡¢¿Í»§SRC¡¢Ë¼¿ÆÉñÃØÎĵµµÈ ¡£¡£¡£¡£¡£IntelBroker»¹·ÖÏíÁËÉæÏÓ±»µÁÊý¾ÝµÄÑù±¾ ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬£¬£¬6Ô·ÝIntelBrokerÒÑ×îÏȳöÊÛ»òй¶°üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý ¡£¡£¡£¡£¡£¾ÝÐÂÎÅÈËʿ͸¶£¬ £¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄÜÊÇ´ÓµÚÈý·½DevOpsºÍÈí¼þ¿ª·¢ÍйÜЧÀÍÌṩÉÌ´¦ÇÔÈ¡µÄ ¡£¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎú˼¿Æ´Ë´ÎйÃÜÊÂÎñÊÇ·ñÓë´Ëǰ6Ô·ݵÄйÃÜÊÂÎñÓÐ¹Ø ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/


5. ³¯ÏʺڿÍʹÓÃFASTCashÐÂÐÍLinux±äÖÖ͵ȡ½ðÈÚ»ú¹¹×ʽð


10ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬£¬³¯ÏʺڿÍÕýʹÓÃFASTCash¶ñÒâÈí¼þµÄÐÂÐÍLinux±äÖÖ£¬ £¬£¬£¬£¬£¬£¬Õë¶Ô½ðÈÚ»ú¹¹µÄÖ§¸¶×ª»»ÏµÍ³ÊµÑéδ¾­ÊÚȨµÄÏÖ½ðÌáÈ¡ ¡£¡£¡£¡£¡£FASTCashÏÈǰÖ÷ÒªÕë¶ÔWindowsºÍIBM AIXϵͳ£¬ £¬£¬£¬£¬£¬£¬µ«×îз¢Ã÷µÄUbuntu 22.04 LTS°æ±¾±äÖÖÏÔʾºÚ¿ÍÀ©´óÁ˹¥»÷¹æÄ£ ¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´£¬ £¬£¬£¬£¬£¬£¬FASTCashÒѱ»ÓÃÓÚÔÚ30¶à¸ö¹ú¼Ò·¢¶¯ATMÈ¡¿î¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ÇÔÈ¡ÊýÍòÍòÃÀÔª£¬ £¬£¬£¬£¬£¬£¬CISAÓÚ2018ÄêÊ×´ÎÖÒÑÔ¸ÃÍþв£¬ £¬£¬£¬£¬£¬£¬²¢½«Æä¹é×ïÓÚ³¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯¡°Òþ²ØÑÛ¾µÉß¡± ¡£¡£¡£¡£¡£2020Ä꣬ £¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂç˾Á½«FASTCash 2.0ÓëAPT38£¨Lazarus£©ÁªÏµÆðÀ´£¬ £¬£¬£¬£¬£¬£¬Ò»Äêºó£¬ £¬£¬£¬£¬£¬£¬ÈýÃû³¯ÏÊÈËÒòÉæÏÓ¼ÓÈë´ËÀàÍýÏë±»ÆðËߣ¬ £¬£¬£¬£¬£¬£¬ÇÔÈ¡½ð¶îÁè¼Ý13ÒÚÃÀÔª ¡£¡£¡£¡£¡£HaxRob·¢Ã÷µÄбäÖÖÓÚ2023Äê6ÔÂÊ×´ÎÌá½»¸øVirusTotal£¬ £¬£¬£¬£¬£¬£¬ËüÒÔ¹²Ïí¿âÐÎʽעÈëµ½Ö§¸¶½»Á÷ЧÀÍÆ÷Àú³ÌÖУ¬ £¬£¬£¬£¬£¬£¬×èµ²²¢Ê¹ÓÃISO8583ÉúÒâÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬½«ÉúÒâ¾Ü¾øÏìÓ¦Ìæ»»ÎªÅú×¼£¬ £¬£¬£¬£¬£¬£¬²¢°üÀ¨Ëæ»ú½ð¶î£¬ £¬£¬£¬£¬£¬£¬Ê¹ºÚ¿ÍÄܹ»´ÓATMÖÐÌáÈ¡Ïֽ𠡣¡£¡£¡£¡£¸ÃLinux±äÌåÔÚVirusTotalÉÏÉÐδ±»¼ì²âµ½£¬ £¬£¬£¬£¬£¬£¬Åú×¢Æä¿ÉÌӱܴó´ó¶¼Çå¾²¹¤¾ß ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬HaxRob»¹±¨¸æÁËFASTCashеÄWindows°æ±¾µÄ·ºÆð£¬ £¬£¬£¬£¬£¬£¬ÏÔʾºÚ¿ÍÕýÔÚÆð¾¢Ë¢ÐÂÆä¹¤¾ß¼¯ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-fastcash-malware-linux-variant-helps-steal-money-from-atms/


6. Gryphon HealthcareÔâÓöÊý¾Ýй¶£¬ £¬£¬£¬£¬£¬£¬40ÍòÈËÐÅÏ¢»òÔâÇÔÈ¡


10ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬£¬Gryphon HealthcareÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÝ˹¶ÙµÄÒ½ÁƱ£½¡Ð§ÀÍÌṩÉÌ£¬ £¬£¬£¬£¬£¬£¬ÔâÓöÁËÒ»Æð¿ÉÄÜÉæ¼°¶à´ï40ÍòÈËСÎÒ˽¼ÒÐÅϢй¶µÄÊÂÎñ ¡£¡£¡£¡£¡£²»·¨·Ö×Ó¿ÉÄܽøÈëÁËGryphonÒ»Ãû¿Í»§µÄϵͳ£¬ £¬£¬£¬£¬£¬£¬ÕÆÎÕÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»á°ü¹ÜºÅÒÔ¼°Ò½ÁÆÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Õï¶Ï¡¢ÖÎÁÆ¡¢´¦·½ºÍ°ü¹ÜÐÅÏ¢µÈ ¡£¡£¡£¡£¡£GryphonÌåÏÖºÜÊÇÖØÊÓÐÅÏ¢Çå¾²£¬ £¬£¬£¬£¬£¬£¬Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓ㬠£¬£¬£¬£¬£¬£¬µ«ÒÑÏòËùÓÐÊܺ¦ÕßÌṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ ¡£¡£¡£¡£¡£¾Ý³Æ£¬ £¬£¬£¬£¬£¬£¬Õâ393,358ÃûСÎÒ˽¼ÒµÄÊý¾ÝÓÉGryphonΪÆäÌṩҽÁÆÕ˵¥Ð§À͵Ä×éÖ¯´æ´¢£¬ £¬£¬£¬£¬£¬£¬¿ÉÄܰüÀ¨Ò½Ôº¡¢¼±ÕïÊÒ¡¢Ó°ÏñÖÐÐĵȶàÖÖÒ½ÁÆ»ú¹¹ ¡£¡£¡£¡£¡£GryphonÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦½ÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ£¬ £¬£¬£¬£¬£¬£¬µ«²¢Î´Ïêϸ˵Ã÷ÊÂÎñÐÔ×Ó ¡£¡£¡£¡£¡£Î´À´¼¸¸öÔ£¬ £¬£¬£¬£¬£¬£¬Ëæ×Å״ʦÃÇÖÆ¶©ÕûÌåËßËÏÍýÏ룬 £¬£¬£¬£¬£¬£¬Gryphon¿ÉÄܲ»µÃ²»Åû¶¸ü¶àÐÅÏ¢ ¡£¡£¡£¡£¡£


https://www.theregister.com/2024/10/14/gryphon_healthcare_breach/