CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷

Ðû²¼Ê±¼ä 2025-08-15

1. CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷


8ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪCharonµÄÐÂÐÍÀÕË÷Èí¼þÕýÒÔÖж«¹«¹²²¿·ÖºÍº½¿ÕҵΪĿµÄÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäÊÖÒÕÖØÆ¯ºóµÖ´ï¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©¼¶±ð¡£¡£¡£ ¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½ÓÄÉDLL²àÔØ¡¢Àú³Ì×¢Èë¼°EDRÌÓ±ÜÊÖÒÕ¹¹½¨¹¥»÷Á´£¬£¬£¬£¬£¬£¬£¬£¬ÓëÔøÕë¶ÔÑÇÌ«Õþ¸®Ä¿µÄµÄEarth Baxia APT×éÖ¯±£´æÏÔÖøÊÖÒÕÖØµþ£¬£¬£¬£¬£¬£¬£¬£¬µ«Ä¿½ñÖ¤¾ÝÉÐȱ·¦ÒÔÈ·ÈÏÖ±½Ó¹ØÁª¡£¡£¡£ ¡£´Ë´Î¹¥»÷ÒÔÕýµ±ä¯ÀÀÆ÷ÎļþEdge.exeΪÈë¿Ú£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ý²àÔØ¶ñÒâmsedge.dll×îÖÕ°²ÅÅCharonÀÕË÷Èí¼þ¡£¡£¡£ ¡£¸ÃÈí¼þ¾ß±¸¶àÖØÆÆËðÐÔ¹¦Ð§£ºÖÕÖ¹Ç徲ЧÀÍ¡¢É¾³ý¾íÓ°¸±±¾Ó뱸·ÝÒÔ×è°­»Ö¸´£¬£¬£¬£¬£¬£¬£¬£¬½ÓÄɶàÏ̼߳ÓÃÜÊÖÒÕÌáÉýÎļþËø¶¨Ð§ÂÊ£¬£¬£¬£¬£¬£¬£¬£¬²¢¼¯³É»ùÓÚ¿ªÔ´Dark-KillÏîÄ¿µÄÇý¶¯³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ý¡°×Ô´øÒ×Êܹ¥»÷Çý¶¯³ÌÐò£¨BYOVD£©¡±¹¥»÷½ûÓÃEDR·À»¤£¬£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü´Ë´Î¹¥»÷Öиù¦Ð§Î´±»´¥·¢£¬£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÆäÈÔ´¦ÓÚ²âÊԽ׶Ρ£¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓö¨ÖÆ»¯ÀÕË÷ÐÅÃ÷È·Ìá¼°Êܺ¦×éÖ¯Ãû³Æ£¬£¬£¬£¬£¬£¬£¬£¬Ö¤Êµ´ËΪÕë¶ÔÐÔÐж¯¡£¡£¡£ ¡£Ö»¹Ü¹¥»÷Á´Öжþ½øÖÆÎļþÓëEarth BaxiaÀúÊ·ÊÖ·¨¸ß¶ÈÏàËÆ¡£¡£¡£ ¡£ÏÖÔÚȱ·¦¹²Ïí»ù´¡ÉèÊ©»ò¹¥»÷ģʽµÈÈ·ÔäÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬£¬½öÄÜÅжϱ£´æ¡°ÓÐÏÞµ«ÏÔÖøµÄÊÖÒÕÇ÷ͬ¡±¡£¡£¡£ ¡£


https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html


2. EfimerľÂíºá¿ç2024-2025Ä꣬£¬£¬£¬£¬£¬£¬£¬È«ÇòÎåǧÓû§Ïݸ´ºÏÐÍÍøÂç·¸·¨Éú̬


8ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ù¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬£¬×Ô2024Äê10ÔÂÊ״η¢Ã÷ÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬EfimerľÂí²¡¶¾ÒÑÒ»Á¬»îÔ¾ÖÁ2025Ä꣬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýαÔìÖ´·¨ÉùÃ÷´¹ÂÚÓʼþ¡¢ÈëÇÖWordPressÍøÕ¾¼°¶ñÒâÖÖ×ÓÎļþÈý´óÇþµÀ£¬£¬£¬£¬£¬£¬£¬£¬Ñ¬È¾È«ÇòÁè¼Ý5000ÃûÓû§£¬£¬£¬£¬£¬£¬£¬£¬Ðγɼ¯¼ÓÃÜÇ®±ÒÇÔÈ¡¡¢ÍøÕ¾±©Á¦ÆÆ½âÓëÀ¬»øÓʼþ·Ö·¢ÓÚÒ»ÌåµÄ¸´ºÏÐÍÍøÂç·¸·¨Éú̬¡£¡£¡£ ¡£¸ÃľÂíµÄ½¹µã¹¥»÷ÊֶΰüÀ¨ÈýÖØÎ¬¶È£ºÆäÒ»£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÆóҵ״ʦµÄ´¹ÂÚÓʼþʵÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õß·­¿ªº¬¶à½×¶Î¾ç±¾µÄ¸½¼þ£¬£¬£¬£¬£¬£¬£¬£¬Ö²ÈëľÂíºóÒÔÐéα¹ýʧÐÅÏ¢ÑÚÊλºÛ¼£ £»£» £»£»£»£»£»Æä¶þ£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔWordPressÍøÕ¾Ìᳫ±©Á¦ÆÆ½â£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃά»ù°Ù¿Æ´Ê»ãÌìÉúÄ¿µÄÓòÃûÁÐ±í²¢²âÊÔ´ó×ÚÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖºóÐû²¼¶ñÒâÎļþ»òͨ¹ýαÔìÓ°Ï·ÖÖ×ÓÈö²¥ÁíÒ»Efimer±äÖÖ£¬£¬£¬£¬£¬£¬£¬£¬¸½´øTron¡¢SolanaµÈαÔìÇ®°ü £»£» £»£»£»£»£»ÆäÈý£¬£¬£¬£¬£¬£¬£¬£¬°²ÅÅÃûΪ"Liame"µÄ¾ç±¾´ÓÖ¸¶¨ÍøÕ¾×¥È¡ÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬£¬¹¹½¨¾«×¼Õ©Æ­Ä¿µÄ¿â¡£¡£¡£ ¡£Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬2024Äê10ÔÂÖÁ2025Äê7Ô¼䣬£¬£¬£¬£¬£¬£¬£¬°ÍÎ÷³ÉΪ×î´óÊܺ¦¹ú£¬£¬£¬£¬£¬£¬£¬£¬Ó¡¶È¡¢Î÷°àÑÀ¡¢¶íÂÞ˹¡¢Òâ´óÀû¼°µÂ¹ú½ôËæØÊºó¡£¡£¡£ ¡£


https://hackread.com/efimer-trojan-crypto-hacks-wordpress-torrents-phishing/


3. Ä«Î÷¸çCFE 600GBÊý¾Ýй¶̻¶Ҫº¦µçÁ¦»ù´¡ÉèÊ©ÍøÂçΣº¦


8ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬£¬Ä«Î÷¸ç¹úÓеçÁ¦¹«Ë¾Áª°îµçÁ¦Î¯Ô±»á£¨CFE£©ÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÍøÂçºÍÍþв¾¯±¨ÈÕ־ͨ¹ýµÚÈý·½Çå¾²¹«Ë¾TelikoÖÎÀíµÄKibanaʵÀý¹ûÕæÌ»Â¶£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÁ¿Áè¼Ý600GB¡£¡£¡£ ¡£×÷ΪΪīÎ÷¸ç99%Éú³Ý¹©µçµÄ½¹µãÄÜÔ´»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬CFE´Ë´ÎйÃÜÊÂÎñ±»ÆÀ¹ÀΪ¿ÉÄÜÍþвÌìϵçÁ¦¹©Ó¦Çå¾²µÄÖØ´óΣº¦¡£¡£¡£ ¡£Ð¹Â¶Êý¾Ýº­¸ÇÔ±¹¤×°±¸DNSÅÌÎʼͼ¡¢»á¼ûµÄURL¡¢Éî¶È°ü¼ì²â£¨DPI£©ÈÕÖ¾¼°·´¶ñÒâÈí¼þ¹¤¾ßÌìÉúµÄ¾¯±¨£¬£¬£¬£¬£¬£¬£¬£¬Ê±¼ä¿ç¶È¿É×·ËÝÖÁ2021Äê11Ô¡£¡£¡£ ¡£ÕâЩÈÕÖ¾ÓÉÍйܼì²âÓëÏìÓ¦£¨MDR£©½â¾ö¼Æ»®AIsaacÌìÉú£¬£¬£¬£¬£¬£¬£¬£¬Ïêϸ¼Í¼ÁËCFEÄÚ²¿ÍøÂç¼Ü¹¹¡¢Ò×Êܹ¥»÷×°±¸¼°Ð§ÀÍÁбí¡£¡£¡£ ¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿É̫ͨ¹ýÎö´ËÀàÊý¾Ý»æÖÆCFEÇå¾²·ÀÓùͼÆ×£¬£¬£¬£¬£¬£¬£¬£¬Ê¶±ð±¡Èõ»·½Ú²¢ÊµÑ龫׼¹¥»÷¡£¡£¡£ ¡£³ýÔËÓªÍþвÍ⣬£¬£¬£¬£¬£¬£¬£¬Ô±¹¤»¥ÁªÍø»î¶¯ÈÕÖ¾µÄй¶»¹×é³ÉÒþ˽Σº¦¡£¡£¡£ ¡£¹¥»÷Õß¿ÉʹÓÃÓòÃûʹÓÃģʽע²á·ÂðÓòÃû£¬£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÐ¹Â¶µÄÄÚ²¿¹¤¾ßÐÅÏ¢Ìᳫ¸ß¶È±ÆÕæµÄÓã²æÊ½ÍøÂç´¹ÂÚ¡£¡£¡£ ¡£


https://cybernews.com/security/cfe-data-leak-mexico-critical-infrastructure/


4. Crypto24ÀÕË÷Èí¼þʹÓÃ×Ô½ç˵EDR¹æ±Ü¹¤¾ß¹¥»÷´óÐÍ×éÖ¯


8ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬2024Äê9ÔÂÊ״α»ÆØ¹âµÄCrypto24ÀÕË÷Èí¼þ×éÖ¯Ëäδ¹ãΪÈËÖª£¬£¬£¬£¬£¬£¬£¬£¬µ«ÆäÕë¶ÔÈ«Çò½ðÈÚ¡¢ÖÆÔì¡¢¿Æ¼¼µÈÁìÓò¸ß¼ÛֵĿµÄµÄ¶¨Ïò¹¥»÷ÒÑÒý·¢Çå¾²½ç¹Ø×¢¡£¡£¡£ ¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ºÜ¿ÉÄÜÓÉ×ÅÃûÀÕË÷Èí¼þÍÅ»ïǰ³ÉÔ±×齨£¬£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖ³ö¸ß¶ÈµÄÊÖÒÕ³ÉÊì¶ÈÓëÕ½ÊõÒþ²ØÐÔ¡£¡£¡£ ¡£Æä¹¥»÷Á´ÒÔ¶¨ÖÆ»¯¹¤¾ßΪ½¹µã£¬£¬£¬£¬£¬£¬£¬£¬ÐγɴӳõʼÈëÇÖµ½Êý¾ÝÍâйµÄÈ«Á÷³ÌÍþвϵͳ¡£¡£¡£ ¡£ÔÚÈëÇֽ׶Σ¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¼¤»îWindowsĬÈÏÖÎÀíÔ±ÕË»§»ò½¨ÉèÐÂÓû§ÊµÏÖ³¤ÆÚ»¯»á¼û£¬£¬£¬£¬£¬£¬£¬£¬Ëæºó°²ÅÅÅú´¦Öóͷ£¾ç±¾Óëϵͳö¾ÙÏÂÁչÕì̽£¬£¬£¬£¬£¬£¬£¬£¬½¨ÉèÃûΪWinMainSvcµÄ¼üÅ̼ͼЧÀÍÓëMSRuntimeÀÕË÷Èí¼þ¼ÓÔØÆ÷¡£¡£¡£ ¡£Îª¹æ±ÜÇå¾²¼ì²â£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËRealBlindingEDR¹¤¾ßµÄ±äÖÖ£¬£¬£¬£¬£¬£¬£¬£¬Í¨Ì«¹ýÎöÄÚºËÇý¶¯ÔªÊý¾ÝÆ¥ÅäÓ²±àÂë³§ÉÌÁÐ±í£¬£¬£¬£¬£¬£¬£¬£¬º­¸ÇÇ÷ÊÆ¿Æ¼¼¡¢¿¨°Í˹»ù¡¢SentinelOneµÈ12¼ÒÇå¾²³§ÉÌ£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÐÔ½ûÓÃÄں˼¶·À»¤¹³×Ó¡£¡£¡£ ¡£Êý¾ÝÇÔÈ¡»·½Ú£¬£¬£¬£¬£¬£¬£¬£¬Crypto24½ÓÄÉË«ÖØÊֶΣº¼üÅ̼ͼÆ÷αװ³É"Microsoft Help Manager"£¬£¬£¬£¬£¬£¬£¬£¬²¶»ñ°üÀ¨¹¦Ð§¼üÔÚÄÚµÄÓû§²Ù×÷Óë´°¿ÚÎÊÌâ £»£» £»£»£»£»£»ºáÏòÒÆ¶¯Ôòͨ¹ýSMB¹²ÏíʵÏÖ£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕʹÓö¨ÖÆWinINET API¹¤¾ß½«Êý¾Ýй¶ÖÁGoogle Drive¡£¡£¡£ ¡£ÀÕË÷½×¶Î£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚɾ³ýϵͳ¾íÓ°¸±±¾ºó´¥·¢¼ÓÃܳÌÐò¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/


5. ¼ÓÄôóÏÂÒéÔºÔâÍøÂç¹¥»÷Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÎó²î³ÉÍ»ÆÆ¿Ú


8ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¼ÓÄôóÏÂÒéÔºÕýÊÓ²ìÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýʹÓÃ΢Èí½üÆÚÅû¶µÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉÇÔȡԱ¹¤Ãô¸ÐÐÅÏ¢²¢ÈëÇÖÖÎÀíÏÂÒéÔºÅÌËã»ú¼°Òƶ¯×°±¸µÄ½¹µãÊý¾Ý¿â¡£¡£¡£ ¡£¾Ý¼ÓÄôó¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬ÏÂÒéÔºÊÂÇéÖ°Ô±ÒÑÓÚÖÜһͨ¹ýÓʼþÊÕµ½Î¥¹æÍ¨Öª£¬£¬£¬£¬£¬£¬£¬£¬µ«¹Ù·½ÉÐδ¹ûÕæÉùÃ÷ÊÂÎñϸ½Ú¡£¡£¡£ ¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃ΢Èí²úÆ·ÖеÄδÐÞ²¹Îó²î»ñÈ¡Êý¾Ý¿â»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬ÍµÈ¡Á˰üÀ¨Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢°ì¹«ËùÔÚ¼°µç×ÓÓʼþµØµãÔÚÄڵķǹûÕæÊý¾Ý¡£¡£¡£ ¡£ÏÂÒéÔºÒѱ޲ßÏà¹ØÖ°Ô±Ð¡ÐÄʹÓñ»µÁÐÅϢʵÑéµÄڲƭÐÐΪ£¬£¬£¬£¬£¬£¬£¬£¬Èçð³äÒéÔ±»ò¾ÙÐÐÕ©Æ­¡£¡£¡£ ¡£¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÈ·ÈÏÕýÔÚЭÖúÊӲ죬£¬£¬£¬£¬£¬£¬£¬µ«Î´½«¹¥»÷¹éÒòÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÍøÂçÊÂÎñ¹éÒòÐèãýÃð×ÊÔ´Óëʱ¼ä£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°¶àÖØÖØ´óÒòËØ¡£¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓõÄÎó²î¿ÉÄÜÓë΢Èí½üÆÚÅû¶µÄÁ½¸ö¸ßΣÎó²îÏà¹Ø£ºCVE-2025-53770£¨ToolShell£©ºÍCVE-2025-53786¡£¡£¡£ ¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬£¬CVE-2025-53770×Ô7Ô³õÆð±»¶à¹úÍþвÕûÌåÆÕ±éʹÓà £»£» £»£»£»£»£»¶øCVE-2025-53786×÷ΪMicrosoft ExchangeÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÔÆÇéÐÎÖкáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬£¬£¬Òѱ»ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐΪ½ôÆÈÖ¸Á£¬£¬£¬£¬£¬£¬£¬ÒªÇó·Ç¾üÊ»ú¹¹Á¬Ã¦ÐÞ²¹¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/canadas-house-of-commons-investigating-data-breach-after-cyberattack/


6. ŲÍþ²¼À×â¸ñ´ó°ÓÔâÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷


8ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Å²Íþ²¼À×â¸ñ´ó°ÓÓÚ2025Äê4ÔÂÔâÓöÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäÒªº¦Êý×Ö¿ØÖÆÏµÍ³±»ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬Á÷³ö·§Ãű»¶ñÒâ·­¿ª£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý720ÍòÉý£¨190Íò¼ÓÂØ£©Ë®Á÷³ö¡£¡£¡£ ¡£´Ë´ÎÊÂÎñ±»Å²Íþ¾¯Ô±Çå¾²¾Ö£¨PST£©ÊÓΪ¶íÂÞ˹¶ÔÒªº¦»ù´¡ÉèʩԶ³Ì¹¥»÷ÄÜÁ¦µÄÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬µ«¸üÇãÏòÓÚÊÇÒ»´Î¡°ÄÜÁ¦Õ¹Ê¾¡±¶ø·ÇʵÖÊÐÔÆÆË𡣡£¡£ ¡£¾ÝPSTÈÏÕæÈ˱´æ«ÌØ¡¤¸Ê¼Ó˹ÔÚ°¢Â×´ï¶ûËÕ¿¨ÌìÏÂÂÛ̳ÉÏ͸¶£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÐÐΪµÄ½¹µãÄ¿µÄ²¢·ÇÖ±½ÓÔì³ÉÎïÀíË𺦣¬£¬£¬£¬£¬£¬£¬£¬¶øÊÇͨ¹ý¹ûÕæÑÝʾÊÖÒÕÄÜÁ¦Ê©¼ÓÐÄÀíÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬ÔÚÃñÖÚÖÐÖÆÔì¿Ö¾åÓ벻ȷ¶¨ÐÔ¡£¡£¡£ ¡£ÕâÒ»ÅжÏÓëŲÍþ¹ú¼ÒÐÌÊÂÊÓ²ì¾Ö£¨Kripos£©µÄÊÓ²ì½áÂÛÒ»Ö£ººÚ¿ÍÔÚTelegramƽ̨Ðû²¼ÁËÒ»¶ÎÈý·ÖÖÓÊÓÆµ£¬£¬£¬£¬£¬£¬£¬£¬Õ¹Ê¾´ó°Ó¿ØÖÆÃæ°å²Ù×÷½çÃæ£¬£¬£¬£¬£¬£¬£¬£¬²¢´øÓÐÓëÇ×¶íÍøÂç·¸·¨×éÖ¯¹ØÁªµÄˮӡ¡£¡£¡£ ¡£´ËÀàÐÐΪ´ËÇ°ÔøÓëSandworm (APT44) µÈ¹ú¼ÒÖ§³ÖµÄ×éÖ¯Óйأ¬£¬£¬£¬£¬£¬£¬£¬±»ÓÃÓÚÇ¿µ÷ÍþвÉùÃ÷£¬£¬£¬£¬£¬£¬£¬£¬¼ÈÐßÈèÊܹ¥»÷·½£¬£¬£¬£¬£¬£¬£¬£¬ÓÖÏòÎ÷·½×ª´ïÍøÂçÕ½ÄÜÁ¦ÐźÅ¡£¡£¡£ ¡£ÊÂÎñÖУ¬£¬£¬£¬£¬£¬£¬£¬´ó°ÓÖÎÀíÔ±ºÄʱԼËÄСʱ²Å·¢Ã÷·§ÃÅÒì³£²¢ÐÞ¸´ÉèÖ㬣¬£¬£¬£¬£¬£¬£¬µ«×ß©ÒѶԾֲ¿Ë®Á÷µ÷¿Ø±¬·¢Ó°Ïì¡£¡£¡£ ¡£Ö»¹ÜŲÍþÓë¶íÂÞ˹δ´¦ÓÚÖ±½ÓÕ½Õù״̬£¬£¬£¬£¬£¬£¬£¬£¬µ«ÆÕ¾©ÕþȨÕýͨ¹ý»ìÏýÕ½ÕùÊÖ¶Îά³Ö¶ÔÎ÷·½µÄÖ÷ҪѹÁ¦¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/pro-russian-hackers-blamed-for-water-dam-sabotage-in-norway/