APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯

Ðû²¼Ê±¼ä 2025-05-16

1. APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯


5ÔÂ15ÈÕ £¬£¬£¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET×îÐÂÑо¿·¢Ã÷ £¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹ÓйØÁªµÄÍþв×éÖ¯Õë¶ÔRoundcube¡¢Horde¡¢MDaemonºÍZimbraµÈÖ÷Á÷ÓʼþϵͳʵÑéÁËÃûΪ¡°Operation RoundPress¡±µÄÍøÂçÌØ¹¤»î¶¯¡£ ¡£´Ë´ÎÐж¯½¹µãÄ¿µÄÊÇÇÔÈ¡ÌØ¶¨ÓÊÏäÕË»§µÄÉñÃØÊý¾Ý £¬£¬£¬£¬£¬£¬Ö÷ÒªÊܺ¦ÕßΪ¶«Å·Õþ¸®»ú¹¹¼°¾ü¹¤ÆóÒµ £¬£¬£¬£¬£¬£¬Í¬Ê±·ÇÖÞ¡¢Å·ÖÞºÍÄÏÃÀÖÞµÄÕþ¸®²¿·ÖÒ²Ôâµ½¹¥»÷¡£ ¡£Ñо¿Ö°Ô±½«Æä¹éÒòÓÚ¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT28 £¬£¬£¬£¬£¬£¬ÒÀ¾Ý°üÀ¨´¹ÂÚÓʼþ·¢¼þµØµãÖØµþºÍЧÀÍÆ÷ÉèÖÃÊÖ·¨ÏàËÆ¡£ ¡£¹¥»÷Õßͨ¹ýÓʼþϵͳµÄXSSÎó²îÔÚÍøÒ³ÓÊÏä½çÃæÖ´ÐÐí§ÒâJavaScript´úÂë¡£ ¡£ÆäÖÐ £¬£¬£¬£¬£¬£¬MDaemonµÄXSSÎó²îÔÚ¹¥»÷³õÆÚΪÁãÈÕÎó²î £¬£¬£¬£¬£¬£¬ËäºóÐøÒÑÐÞ¸´ £¬£¬£¬£¬£¬£¬µ«ÆäʱδÐÞ¸´¡£ ¡£APT28ͨ¹ýµç×ÓÓʼþ·¢ËÍXSSÎó²îʹÓóÌÐò £¬£¬£¬£¬£¬£¬¶ñÒâ´úÂëÔÚä¯ÀÀÆ÷ÔËÐеÄÍøÒ³ÓÊÏä¿Í»§¶ËÖÐÖ´ÐС£ ¡£Îó²îʹÓÃÀÖ³Éºó £¬£¬£¬£¬£¬£¬ÃûΪSpyPressµÄ»ìÏýJavaScriptÓÐÓÃÔØºÉ»áÇÔÈ¡ÓÊÏ䯾֤¡¢ÓʼþÄÚÈݺÍÁªÏµÈËÐÅÏ¢ £¬£¬£¬£¬£¬£¬²¿·Ö±äÖÖ»¹Äܽ¨ÉèSieve¹æÔò £¬£¬£¬£¬£¬£¬Ò»Á¬×ª·¢ÐÂÓʼþÖÁ¹¥»÷ÕßÓÊÏä¡£ ¡£ÇÔÈ¡µÄÊý¾Ýͨ¹ýHTTP POSTÇëÇó·¢ËÍÖÁC2ЧÀÍÆ÷ £¬£¬£¬£¬£¬£¬Ä³Ð©±äÖÖ»¹Äܲ¶»ñµÇ¼¼Í¼¡¢2FA´úÂë £¬£¬£¬£¬£¬£¬ÉõÖÁΪMDAEMON½¨ÉèÓ¦ÓÃÃÜÂë¡£ ¡£


https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html


2. Coinbase¿Í»§Êý¾Ýй¶ £¬£¬£¬£¬£¬£¬Ô¤¼ÆËðʧ´ï4ÒÚ


5ÔÂ15ÈÕ £¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbaseÅû¶ £¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÓë¶ñÒâÍâÑó¿Í·þÖ°Ô±ÏàÖúÇÔÈ¡Á˿ͻ§Êý¾Ý £¬£¬£¬£¬£¬£¬²¢Ë÷Òª2000ÍòÃÀÔªÊê½ðÒÔ²»¹ûÕæ±»µÁÐÅÏ¢¡£ ¡£Coinbase¾Ü¾øÖ§¸¶Êê½ð £¬£¬£¬£¬£¬£¬µ«ÉèÁ¢2000ÍòÃÀÔª½±Àø»ù½ð £¬£¬£¬£¬£¬£¬ÒÔÃãÀøÌṩÓйع¥»÷ÕßµÄÏßË÷¡£ ¡£´Ëǰ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÏòCoinbase·¢Ë͵ç×ÓÓʼþÍþвÐû²¼¿Í»§ÕË»§ºÍÄÚ²¿ÎļþÐÅÏ¢ £¬£¬£¬£¬£¬£¬CoinbaseÊӲ췢Ã÷¹¥»÷ÕßÔÚÃÀ¹ú¾³Íâ³Ð°üÉÌ»òÖ§³ÖÖ°Ô±µÄ×ÊÖúÏ»ñÈ¡Á˿ͻ§Êý¾Ý £¬£¬£¬£¬£¬£¬ÕâЩְԱÊܹͻá¼ûÄÚ²¿ÏµÍ³ £¬£¬£¬£¬£¬£¬Coinbase·¢Ã÷ºóÒÑ¿ª³ýÏà¹ØÖ°Ô±¡£ ¡£Ö»¹ÜÍþвÐÐΪÕßÇÔÈ¡ÁËCoinbaseÔ¼1%¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ £¬£¬£¬£¬£¬£¬µ«ÎÞ·¨»ñÈ¡¿Í»§Ë½Ô¿¡¢ÃÜÂë»ò»á¼ûCoinbase PrimeÕË»§ºÍÇ®°ü¡£ ¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢µç×ÓÓʼþ¡¢²¿·ÖÉç»á°ü¹ÜºÅ¡¢ÒøÐÐÕ˺ÅÐÅÏ¢¡¢Õþ¸®Éí·Ý֤ͼÏñ¡¢ÕË»§Êý¾Ý¼°ÓÐÏ޵Ĺ«Ë¾Êý¾Ý¡£ ¡£CoinbaseÇ¿µ÷ûÓÐÃÜÂ롢˽Կ»ò×ʽðй¶ £¬£¬£¬£¬£¬£¬²¢½«Åâ³¥±»ÓÕÆ­Ïò¹¥»÷Õß»ã¿îµÄ¿Í»§¡£ ¡£ËäÈ»²ÆÎñÓ°ÏìÈÔÔÚÆÀ¹ÀÖÐ £¬£¬£¬£¬£¬£¬µ«CoinbaseÔ¤¼Æµ÷½âºÍ¿Í»§Åâ³¥ÓöȽ«ÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£ ¡£Îª±ÜÃâδÀ´Î¥¹æÐÐΪ £¬£¬£¬£¬£¬£¬CoinbaseÍýÏ뿪ÉèеÄÖ§³ÖÖÐÐÄÅâ³¥ÊÜÓ°Ïì¿Í»§ £¬£¬£¬£¬£¬£¬²¢ÔöÌí¶ÔÄÚ²¿Íþв¼ì²â¡¢Çå¾²ÍþвģÄâºÍ×Ô¶¯ÏìÓ¦µÄͶ×Ê¡£ ¡£


https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/


3. ¶ñÒâNPM°üʹÓÃUnicodeÒþдÊõÀ´Ìӱܼì²â


5ÔÂ15ÈÕ £¬£¬£¬£¬£¬£¬´úÂëÇå¾²ÆÀ¹À¹«Ë¾Veracode·¢Ã÷ £¬£¬£¬£¬£¬£¬Node°ü¹ÜÀíÆ÷Ë÷ÒýÖб£´æÃûΪ¡°os-info-checker-es6¡±µÄ¶ñÒâÈí¼þ°ü £¬£¬£¬£¬£¬£¬¸Ã°ü×Ô±¾Ô³õÒÔÀ´Òѱ»ÏÂÔØÁè¼Ý1000´Î¡£ ¡£¸ÃÈí¼þ°ü×î³õ°æ±¾ÓÚ3ÔÂ19ÈÕÉÏ´«ÖÁNPM £¬£¬£¬£¬£¬£¬×î³õ¹¦Ð§½öÊÇÍøÂç²Ù×÷ϵͳÐÅÏ¢ £¬£¬£¬£¬£¬£¬¿´ËÆÎÞº¦¡£ ¡£È»¶ø £¬£¬£¬£¬£¬£¬¼¸Ììºó £¬£¬£¬£¬£¬£¬×÷Õß¶ÔÈí¼þ°ü¾ÙÐÐÁËÐÞ¸Ä £¬£¬£¬£¬£¬£¬Ìí¼ÓÁËÌØ¶¨ÓÚÆ½Ì¨µÄ¶þ½øÖÆÎļþºÍ»ìÏýµÄ×°Öþ籾¡£ ¡£5ÔÂ7ÈÕ £¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°üÐû²¼Ð°汾 £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚת´ï×îÖÕÓÐÓÃÔØºÉµÄÖØ´óC2£¨ÏÂÁîºÍ¿ØÖÆ£©»úÖÆ´úÂë¡£ ¡£VeracodeÖÒÑÔ³Æ £¬£¬£¬£¬£¬£¬Ä¿½ñnpmÉÏ¿ÉÓõÄ×îа汾v1.0.8Ϊ¶ñÒâ°æ±¾¡£ ¡£±ðµÄ £¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°ü»¹±»ÁÐΪÆäËûËĸöNPMÈí¼þ°üµÄÒÀÀµÏî £¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúÕâЩÈí¼þ°üÊÇ·ñ»òÔõÑù±»ÍþвÐÐΪÕßÍÆ¹ã¡£ ¡£ÔÚ¶ñÒâ°æ±¾ÖÐ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃUnicodeÒþдÊõ £¬£¬£¬£¬£¬£¬½«Êý¾ÝǶÈë¿´ËÆ¡°|¡±µÄ×Ö·û´®ÖÐ £¬£¬£¬£¬£¬£¬¶øÊúÏߺóÒþ²ØÁËÒ»³¤´®²»¿É¼ûµÄUnicode×Ö·û £¬£¬£¬£¬£¬£¬ÕâЩ×Ö·ûÓÃÓÚÔö½ø»ùÓÚÎı¾µÄÒþдÊõ¡£ ¡£Veracodeͨ¹ý½âÂëºÍ·´»ìÏý×Ö·û´® £¬£¬£¬£¬£¬£¬ÕÒµ½ÁËÖØ´óC2»úÖÆµÄÓÐÓÃÔØºÉ £¬£¬£¬£¬£¬£¬¸Ã»úÖÆÒÀÀµGoogleÈÕÀú¶ÌÁ´½ÓµÖ´ïÍйÜ×îÖÕÓÐÓÃÔØºÉµÄλÖᣠ¡£Ñо¿Ö°Ô±Ú¹ÊÍÁË´Ó»ñÈ¡GoogleÈÕÀúÁ´½Óµ½×îÖÕ½âÂë»ñÈ¡¶ñÒâÈí¼þÓÐÓÃÔØºÉµÄÕû¸öÀú³Ì £¬£¬£¬£¬£¬£¬²¢Ö¸³ö×îÖÕÓÐÓÃÔØºÉ¿ÉÄܾ­ÓɼÓÃÜ¡£ ¡£


https://www.bleepingcomputer.com/news/security/malicious-npm-package-uses-unicode-steganography-to-evade-detection/


4. Ó¡µÚ°²ÄÉÖÝÕþ¸®ÖÒÑÔ£ºÐ¡ÐÄð³ä¹Ù·½ÓʼþµÄͨÐзÑÕ©Æ­


5ÔÂ13ÈÕ £¬£¬£¬£¬£¬£¬Ó¡µÚ°²ÄÉÖÝÕþ¸®»ú¹¹ÓÚÖܶþÏòסÃñ·¢³öÖÒÑÔ £¬£¬£¬£¬£¬£¬ÒªÇóɾ³ýʹÓÃÖÝÕþ¸®¹Ù·½µç×ÓÓʼþµØµã·¢Ë͵ÄÐéαµç×ÓÓʼþ¡£ ¡£ÕâЩ´¹ÂÚÓʼþÀ´×Ô¶à¸öÖÝÕþ¸®²¿·Ö £¬£¬£¬£¬£¬£¬°üÀ¨¶ùͯЧÀͲ¿¡¢ÈüÂíίԱ»áµÈ £¬£¬£¬£¬£¬£¬ËüÃÇÓÕÆ­ÐԵؼû¸æÊÕ¼þÈ˱£´æÎ´½ÉÄɵÄͨÐÐ·Ñ £¬£¬£¬£¬£¬£¬²¢ÍþвÈô²»½ÉÄɽ«ÃæÁÙ¾­¼Ã´¦·Ö»£»£»£»£»£»ò³µÁ¾¹ÒºÅ±»¿ÛÁô¡£ ¡£Óʼþ×îºó³£ÒÔ¡°Ð»Ð»Äú £¬£¬£¬£¬£¬£¬TxTag ¿Í·þ¡±×÷ΪÊðÃû £¬£¬£¬£¬£¬£¬²¢°üÀ¨ÒÉËÆ¶ñÒâÍøÕ¾µÄÁ´½Ó¡£ ¡£Ó¡µÚ°²ÄÉÖÝÁìÍÁÇå¾²²¿Í¨¹ýÊÖÒհ칫ÊÒÔÚXƽ̨Ðû²¼ÐÂÎÅ £¬£¬£¬£¬£¬£¬ÌáÐѹ«ÖÚСÐÄ´ËÀàÕ©Æ­¡£ ¡£ÉùÃ÷Ö¸³ö £¬£¬£¬£¬£¬£¬ÖÝÕþ¸®²»»áͨ¹ý¶ÌÐÅ»òµç×ÓÓʼþ·¢ËÍδ½ÉͨÐзÑ֪ͨ £¬£¬£¬£¬£¬£¬²¢ÌåÏÖÊÖÒհ칫ÊÒÕýÓëÉæÊ¹«Ë¾ÏàÖú £¬£¬£¬£¬£¬£¬ÒÔ×èÖ¹ÈκνøÒ»²½µÄͨѶ¡£ ¡£¾ÝÏàʶ £¬£¬£¬£¬£¬£¬ÖÝÕþ¸®ÓÚÈ¥ÄêÄêµ×ÖÕÖ¹ÁËÓëÒ»¼Òδǩ×Ö¹©Ó¦É̵ÄÌõÔ¼ £¬£¬£¬£¬£¬£¬µ«Î´É¾³ý¸ÃÖݵÄÕË»§¡£ ¡£´Ë´ÎÊÂÎñÖÐ £¬£¬£¬£¬£¬£¬Ò»Ãû³Ð°üÉ̵ÄÕË»§Ôâµ½ºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬£¬²¢±»ÓÃÓÚ·¢ËÍÕâЩÐéαÐÅÏ¢ £¬£¬£¬£¬£¬£¬¶øÖÝϵͳ²¢Î´·¢Ã÷ÈëÇÖ¼£Ïó¡£ ¡£µç×ÓÓʼþ½ØÍ¼ÏÔʾ £¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢ÊÇͨ¹ýµ¤·ðÈí¼þ¹«Ë¾GranicusµÄÈí¼þGovDelivery Communications Cloud·Ö·¢µÄ¡£ ¡£Granicus½²»°ÈËSharon RushenÌåÏÖ £¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ²¢Î´ÉìÕÅÖÁÆä×ÔÉíÆ½Ì¨ £¬£¬£¬£¬£¬£¬ÏµÍ³ÊÇÇå¾²µÄ¡£ ¡£ËýÖ¸³ö £¬£¬£¬£¬£¬£¬ÎÊÌâÔ´ÓÚÖÎÀíÔ±Óû§ÕË»§±»ÈëÇÖ £¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇͨ¹ýÍÆ²âƾ֤»òÉç½»¹¤³ÌÊֶλñÈ¡¡£ ¡£


https://statescoop.com/indiana-phishing-attack-contractor-hacked/


5. FrigidStealerͨ¹ýÐéαä¯ÀÀÆ÷¸üй¥»÷macOSÓû§


5ÔÂ15ÈÕ £¬£¬£¬£¬£¬£¬FrigidStealer¶ñÒâÈí¼þÕýͨ¹ýÐéαä¯ÀÀÆ÷¸üÐÂÌáÐѹ¥»÷macOSÓû§ £¬£¬£¬£¬£¬£¬¸Ã±äÖÖÓÚ2025Äê2ÔÂÊ״α»·¢Ã÷ £¬£¬£¬£¬£¬£¬²¢ÒѲ¨¼°±±ÃÀ¡¢Å·ÖÞºÍÑÇÖÞµÄÓû§¡£ ¡£´Ë¶ñÒâÈí¼þÁ¥ÊôÓÚFerret¶ñÒâÈí¼þ¼Ò×å £¬£¬£¬£¬£¬£¬ÓëTA2726ºÍTA2727²¡¶¾ÓÐ¹Ø £¬£¬£¬£¬£¬£¬Á½Õß¾ùÒÔʹÓÃÐéαä¯ÀÀÆ÷¸üÐÂΪ¹¥»÷ÊֶζøÖø³Æ¡£ ¡£¸Ã¶ñÒâÈí¼þαװ³ÉSafari¸üеĴÅÅÌÓ³ÏñÎļþ£¨DMG£© £¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§ÏÂÔØ²¢×°Öᣠ¡£×°ÖÃÀú³ÌÖÐ £¬£¬£¬£¬£¬£¬Ëü»áÌáÐÑÓû§ÊäÈëÃÜÂë £¬£¬£¬£¬£¬£¬´Ó¶øÈƹýAppleµÄGatekeeper±£»£»£»£»£»£»¤»úÖÆ £¬£¬£¬£¬£¬£¬²¢½èÖúÄÚÖõÄAppleScript¹¦Ð§Ö´ÐжñÒâ²Ù×÷¡£ ¡£×°ÖÃºó £¬£¬£¬£¬£¬£¬Ëü»áαװ³ÉÒ»¸ö´øÓÐÌØ¶¨bundle IDµÄ¶ñÒâÓ¦Óà £¬£¬£¬£¬£¬£¬ÓëÕýµ±Ó¦ÓûìÏýÊÓÌý¡£ ¡£Ò»µ©¼¤»î £¬£¬£¬£¬£¬£¬FrigidStealer±ã×îÏÈÍøÂçÓû§µÄÃô¸ÐÊý¾Ý £¬£¬£¬£¬£¬£¬°üÀ¨ä¯ÀÀÆ÷ƾ֤¡¢ÏµÍ³Îļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢¼°Apple NotesµÈ £¬£¬£¬£¬£¬£¬²¢Í¨¹ýmacOSµÄmDNSResponder·ÓɵÄDNSÅÌÎÊ £¬£¬£¬£¬£¬£¬½«ÕâЩÊý¾Ýй¶µ½ÏÂÁîÓë¿ØÖÆÐ§ÀÍÆ÷¡£ ¡£ÇÔÈ¡Êý¾Ýºó £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»á×ÔÎÒÖÕÖ¹ £¬£¬£¬£¬£¬£¬ÒÔ½µµÍ±»·¢Ã÷µÄΣº¦¡£ ¡£¾Ý¿ªÔ´ÍøÂçÇå¾²¹«Ë¾WazuhÅû¶ £¬£¬£¬£¬£¬£¬FrigidStealer²¢²»ÒÀÀµ¹Å°åµÄÎó²îʹÓù¤¾ß°ü»òÎó²î £¬£¬£¬£¬£¬£¬¶øÊÇʹÓÃÓû§¶Ôϵͳ֪ͨºÍä¯ÀÀÆ÷¸üÐÂÌáÐѵÄÐÅÈξÙÐй¥»÷ £¬£¬£¬£¬£¬£¬ÕâʹµÃËü¸üΪΣÏÕÇÒÓÐÓᣠ¡£±ðµÄ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃmacOSÌØÓеÄÐÐΪÀ´¼á³Ö³¤ÆÚÐÔ £¬£¬£¬£¬£¬£¬Í¨¹ý×¢²áΪǰ̨ӦÓóÌÐòµÈ·½·¨Óëϵͳ½»»¥ £¬£¬£¬£¬£¬£¬²¢ÔÚÖ´Ðкóɾ³ý×ÔÉíºÛ¼£ £¬£¬£¬£¬£¬£¬ÒÔ¼á³ÖÒþ²Ø¡£ ¡£


https://hackread.com/frigidstealer-malware-macos-fake-safari-browser-update/


6. ÕÐÆ¸Æ½Ì¨HireClick570Íò·Ý¼òÀúÔâй¶


5ÔÂ15ÈÕ £¬£¬£¬£¬£¬£¬CybernewsÑо¿Ö°Ô±¿ËÈÕ·¢Ã÷Ò»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬ÈªÔ´Ö¸ÏòÃæÏòÖÐСÐÍÆóÒµµÄÕÐÆ¸Æ½Ì¨HireClick¡£ ¡£ÓÉÓÚÑÇÂíÑ·AWS S3´æ´¢Í°ÉèÖùýʧ £¬£¬£¬£¬£¬£¬¸Ãƽ̨Áè¼Ý570Íò·ÝÎļþ±»Ì»Â¶ÔÚ»¥ÁªÍøÉÏ £¬£¬£¬£¬£¬£¬ÆäÖÐÖ÷ÒªÊÇÇóÖ°ÕߵļòÀú £¬£¬£¬£¬£¬£¬ÕâЩÎļþй¶ÁËÇóÖ°ÕßµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°¾ÍÒµÐÅÏ¢µÈÃô¸ÐºÍ˽ÈËÊý¾Ý¡£ ¡£´Ë´ÎÊý¾Ýй¶¶ÔHireClick¿Í»§µÄÓ°ÏìÉîÔ¶¡£ ¡£Ð¹Â¶µÄÊý¾ÝÒ»µ©ÂäÈë²»·¨·Ö×ÓÖ®ÊÖ £¬£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢Ã°³ä¡¢ÍøÂç´¹ÂڵȶàÖÖÕ©Æ­»î¶¯¡£ ¡£¹¥»÷Õß¿ÉÄٰܼçÕÐÆ¸Ë¾Àí £¬£¬£¬£¬£¬£¬Ê¹ÓÃй¶µÄÐÅÏ¢ÓÕÆ­ÇóÖ°ÕßÌṩÉí·Ý֤ɨÃè¼þ¡¢Éç»áÇå¾²ºÅÂëÉõÖÁÒøÐÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬»òͨ¹ýµç»°ÓÕÆ­ÇóÖ°ÕßÍ¸Â¶ÒøÐÐÐÅÏ¢»ò×°ÖöñÒâÈí¼þ¡£ ¡£±ðµÄ £¬£¬£¬£¬£¬£¬Õ©Æ­Õß»¹¿ÉʹÓÃй¶µÄ¼òÀú½¨ÉèÐéαÉí·Ý¾ÙÐоÍÒµÑéÖ¤Õ©Æ­ £¬£¬£¬£¬£¬£¬ÉõÖÁð³äÇóÖ°Õß½øÈëÊÂÇ鳡ºÏϵͳ¡£ ¡£ÕâÖÖÊý¾Ýй¶ÐÐΪµÄΣº¦²»µ«ÏÞÓÚÊý¾Ý͵ÇÔ×Ô¼º £¬£¬£¬£¬£¬£¬»¹¿ÉÄÜÒý·¢ÍøÂçÈËÈâËÑË÷ £¬£¬£¬£¬£¬£¬¼´¶ñÒâÆØ¹â˽ÈËÐÅÏ¢ÒÔɧÈÅ»òÏÅ»£ËûÈË¡£ ¡£¹¥»÷ÕßÕÆÎÕÁËÊܺ¦ÕßµÄÈ«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÏÖʵµØµã £¬£¬£¬£¬£¬£¬¾ÍÄÜÈÝÒ×Ëø¶¨²¢É§ÈÅÊܺ¦Õß¡£ ¡£


https://cybernews.com/security/hireclick-resume-database-data-leak/