FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ
Ðû²¼Ê±¼ä 2025-05-191. FBIÖÒÑÔAIÇý¶¯ÓïÒô¶ÌÐÅ´¹ÂÚÊ¢ÐÐ
5ÔÂ18ÈÕ£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©·¢³öÖÒÑÔ£¬£¬£¬£¬³Æ±£´æÒ»ÖÖÖØ´óµÄÓïÒôÍøÂç´¹ÂںͶÌÐÅÍøÂç´¹Âڻ£¬£¬£¬£¬¶ñÒâÈËÊ¿ÕýʹÓÃÈ˹¤ÖÇÄÜ£¨AI£©¿ªÕ¹ÓÕÆÐÐΪ£¬£¬£¬£¬ÍþвÈÕÒæÑÏÖØ¡£¡£¡£¡£¡£×Ô2025Äê4ÔÂÒÔÀ´£¬£¬£¬£¬¡°¶ñÒâÐÐΪÕß¡±ÔËÓá°¶ÌÐÅÍøÂç´¹ÂÚ¡±ºÍ¡°ÓïÒôÍøÂç´¹ÂÚ¡±ÊÖÒÕ£¬£¬£¬£¬½¨Éè¿´ËÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÓïÒô±¸Íü¼£¬£¬£¬£¬Á¬ÏµÓÕÆÐÔ¶ÌÐŹ¥»÷ÏÖÈÎ/ǰÈÎÕþ¸®¹ÙÔ±¼°ÆäͨѶ¼ÖеÄСÎÒ˽¼Ò£¬£¬£¬£¬ÊÔͼÓëÄ¿µÄ½¨ÉèÐÅÈκÍÁªÏµ¡£¡£¡£¡£¡£FBIÃ÷È·ÌáÐÑÃñÖÚ£¬£¬£¬£¬ÊÕµ½Éù³ÆÀ´×ÔÃÀ¹ú¸ß¼¶¹ÙÔ±µÄÐÂÎŲ»¿ÉÇáÐÅ¡£¡£¡£¡£¡£Ò»µ©ÁªÏµÉÏÄ¿µÄ£¬£¬£¬£¬·¸·¨·Ö×Ó»áÊÔͼ»á¼ûÆäСÎÒ˽¼ÒÕË»§£¬£¬£¬£¬ÈçÔÚÐÅÏ¢Öз¢ËͶñÒâÁ´½Ó£¬£¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷ºó×ªÒÆµ½Ëùν¸üÇå¾²µÄÐÂÎÅÆ½Ì¨£¬£¬£¬£¬ÊµÔò¿ÉÄÜÖ¸µ¼Óû§½øÈë¶ñÒâÍøÕ¾£¬£¬£¬£¬ÇÔÈ¡µÇ¼ƾ֤»ò×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£Ò»´ÎÀÖ³ÉÈëÇÖ¿ÉÄÜÒý·¢Á¬Ëø·´Ó¦£¬£¬£¬£¬²»·¨·Ö×Ó¿ÉÄÜʹÓñ»µÁÕË»§¹¥»÷ÆäËûÃÀ¹ú¹ÙÔ±»òÆäͬ»ï£¬£¬£¬£¬ÇÔÈ¡µÄÐÅÏ¢ÓÃÓÚÖÆÔìð³äÕË»§»òÌᳫ½øÒ»²½Éç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬Í¨¹ýÉç»á¹¤³ÌѧÊֶλñÈ¡µÄÁªÏµÐÅÏ¢Ò²¿ÉÄܱ»ÓÃÀ´Ã°³äÁªÏµÈËÇÔÊØÐÅÏ¢»ò×ʽ𡣡£¡£¡£¡£FBIËäδ͸¶±»Ã°³äµÄÏêϸ¹ÙÔ±£¬£¬£¬£¬µ«Í¨¸æÅú×¢´ó¶¼Ä¿µÄÊÇ¡°ÏÖÈλòǰÈÎÃÀ¹úÁª°î»òÖÝÕþ¸®¸ß¼¶¹ÙÔ±¼°ÆäÁªÏµÈË¡±£¬£¬£¬£¬ÕâÊÇÒ»³¡Õë¶ÔÕÆÎÕDZÔÚÃô¸ÐÐÅÏ¢»ò»á¼ûȨÏÞСÎÒ˽¼ÒµÄÆÕ±é¹¥»÷»î¶¯¡£¡£¡£¡£¡£
https://hackread.com/fbi-warn-ai-voice-scams-impersonate-us-govt-officials/
2. BSHÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬²©Í¨Ô±¹¤Êý¾ÝÔâй¶
5ÔÂ17ÈÕ£¬£¬£¬£¬Ð½×ÊЧÀ;ÞÍ·ADPµÄÖж«ÏàÖúͬ°éBSHÔÚ2024Äê9ÔÂÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ö²©Í¨Ô±¹¤Ãô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£²©Í¨ÔøÊ¹ÓÃADP´¦Öóͷ£ÈËΪµ¥£¬£¬£¬£¬BSHÊÇADPÖж«ÇøÓò¹©Ó¦ÉÌ£¬£¬£¬£¬Ë䲩ͨÆäʱÒÑ×îÏÈ·ÅÆúADPºÍBSH£¬£¬£¬£¬µ«Çл»Î´Íê³Éʱ¹¥»÷ÒÑ·¢¶¯¡£¡£¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾÆóÒµ¼à¿ØºÍ±£»£»£»¤¹©Ó¦ÉÌÉúÌ¬ÏµÍ³ÃæÁÙÌôÕ½¡£¡£¡£¡£¡£BSH/ADPÓÚ2024Äê9ÔÂÏÂÑ®·¢Ã÷ÈëÇÖ£¬£¬£¬£¬Ö±µ½12Ô²ÅÒâʶµ½Ô±¹¤Êý¾Ý±»Ð¹Â¶µ½»¥ÁªÍø¡£¡£¡£¡£¡£Òò±»µÁÐÅϢΪ¡°·Ç½á¹¹»¯ÃûÌá±£¬£¬£¬£¬BSHºÍADPÔÚÈ·¶¨ÊÜÓ°ÏìÊý¾ÝºÍСÎÒ˽¼Ò¹æÄ£ÉÏÔâÓöÖØ´óÑÓÎ󣬣¬£¬£¬²©Í¨Ö±µ½2025Äê5ÔÂ12ÈÕ²ÅÊÕµ½¾¯±¨£¬£¬£¬£¬¾àÀëÊ×´ÎÈëÇÖ½ü°Ë¸öÔ¡£¡£¡£¡£¡£ÄÚ²¿ÓʼþÅú×¢£¬£¬£¬£¬È·¶¨ÊÜÓ°ÏìÔ±¹¤ºÍÊý¾Ý×ֶζÔBSH/ADPÊÇÂþ³¤Àú³Ì£¬£¬£¬£¬µ¼ÖÂÔ±¹¤ºã¾Ã²»È·¶¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ÊÇ·ñй¶¡£¡£¡£¡£¡£TechNadu±¨µÀ³Æ£¬£¬£¬£¬El DoradoÀÕË÷Èí¼þ×éÖ¯²ß»®Á˴˴ι¥»÷£¬£¬£¬£¬¸Ã×éÖ¯³£¹¥»÷µÚÈý·½Ð§ÀÍÌṩÉ̲¢ÇÔȡԱ¹¤Êý¾Ý¡£¡£¡£¡£¡£ÕâÅú×¢ÍøÂç·¸·¨·Ö×ÓÕýÃé×¼´óÐÍ×éÖ¯Êý×Ö¹©Ó¦Á´±¡Èõ»·½Ú¡£¡£¡£¡£¡£²©Í¨ÂÄÀúÓëÒµ½ç¶Ô¹©Ó¦ÉÌΣº¦ÖÎÀíµ£ÐÄÒ»Ö£¬£¬£¬£¬Ð½×ÊЧÀÍÌṩÉÌת»»Àú³ÌÖØ´ó£¬£¬£¬£¬BSHºÍADPδʵʱÅû¶Υ¹æÐÐΪ¼Ó¾çÄæ¾³¡£¡£¡£¡£¡£Á½¼Ò¹«Ë¾ÒÑÓëÖ´·¨²¿·ÖºÍÊý¾Ý±£»£»£»¤»ú¹¹ÁªÏµ£¬£¬£¬£¬²¢½ÓÄɲ½·¥Ç¿»¯BSHÇéÐΡ£¡£¡£¡£¡£
https://www.webpronews.com/ransomware-attack-on-adp-partner-exposes-broadcom-employee-data/
3. Ç×ÎÚ¿ËÀ¼×é֯ʹÓÃPythonºóÃŹ¥»÷¶íÂÞ˹¿ª·¢Õß
5ÔÂ16ÈÕ£¬£¬£¬£¬ReversingLabsÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öÃûΪdbgpkgµÄαÔìPythonµ÷ÊÔÆ÷Èí¼þ°ü£¬£¬£¬£¬¸ÃÈí¼þ°üαװ³Éµ÷ÊÔ¹¤¾ß£¬£¬£¬£¬ÊµÔòÉñÃØÔÚ¿ª·¢ÕßϵͳÖÐÖ²ÈëºóÃÅÒÔÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£RLÏÓÒɴ˹¥»÷±³ºóÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼µÄºÚ¿Í×éÖ¯£¬£¬£¬£¬¸Ã×éÖ¯ÒÔÖ§³ÖÎÚ¿ËÀ¼¡¢Õë¶Ô¶íÂÞ˹ÀûÒæ¶øÖøÃû¡£¡£¡£¡£¡£dbgpkg²»°üÀ¨ÏÖʵµ÷ÊÔ¹¦Ð§£¬£¬£¬£¬¶øÊÇÓÕÆ¿ª·¢Ö°Ô±×°ÖúóÃÅ£¬£¬£¬£¬½«Æä¿ª·¢»úеÄð³ÉÊÜѬȾ×ʲú¡£¡£¡£¡£¡£ÆäÖ²ÈëºóÃŵÄÒªÁìÖØ´ó£¬£¬£¬£¬Ê¹Óá°º¯Êý°ü×°¡±»ò¡°×°ÊÎÆ÷¡±ÊÖÒÕÐ޸ıê×¼PythonÍøÂ繤¾ßÐÐΪ£¬£¬£¬£¬Ê¹¶ñÒâ´úÂëÔÚ¿ª·¢Ö°Ô±Ê¹ÓÃÍøÂ纯ÊýǰһֱÒþ²Ø¡£¡£¡£¡£¡£¶ñÒâ°ü×°Æ÷´úÂë»á¼ì²éÌØ¶¨Îļþ£¬£¬£¬£¬ÈôºóÃŲ»±£´æÔòÖ´ÐÐÈý¸öÏÂÁ£¬£¬£¬°üÀ¨´ÓÔÚÏßPastebinЧÀÍÏÂÔØ¹«Ô¿¡¢×°ÖÃÈÆ¹ý·À»ðǽµÄ¹¤¾ßGlobal Socket Toolkit²¢¼ÓÃÜÅþÁ¬ºóÃÅËùÐèÃÜÔ¿¡¢½«¼ÓÃÜÃÜÔ¿·¢Ë͵½Ë½ÃÜÔÚÏßλÖ㬣¬£¬£¬¶à½×¶ÎÀú³ÌÓë¶ÔÊÜÐÅÈÎÄ£¿£¿£¿£¿£¿£¿éʹÓú¯Êý°ü×°Æ÷ÔöÌíÁ˶ñÒâ»î¶¯¼ì²âÄѶȡ£¡£¡£¡£¡£RLÑо¿Ö°Ô±»¹·¢Ã÷¸ÃºóÃÅÓëÇ×ÎÚ¿ËÀ¼µÄPhoenix HyenaºÚ¿Í×éÖ¯ÏÈǰʹÓõĶñÒâÈí¼þÓÐÏàËÆÖ®´¦£¬£¬£¬£¬¸Ã×éÖ¯×Ô2022ÄêÒÔÀ´»îÔ¾£¬£¬£¬£¬ÒÔÕë¶Ô¶íÂÞ˹ʵÌåÖø³Æ£¬£¬£¬£¬ÇÒ2024Äê9ÔÂÉæÏÓÈëÇÖ¶íÂÞË¹ÍøÂçÇå¾²¹«Ë¾Dr. Web¡£¡£¡£¡£¡£
https://hackread.com/ukraine-group-russian-developers-python-backdoor/
4. ÀÕË÷Èí¼þÍÅ»ïÇàíùSkitnet¶ñÒâÈí¼þ
5ÔÂ16ÈÕ£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÕýÔ½À´Ô½¶àµØÊ¹ÓÃÃûΪSkitnet£¨¡°Bossnet¡±£©µÄжñÒâÈí¼þ£¬£¬£¬£¬ÔÚ±»¹¥ÆÆµÄÍøÂçÖÐÖ´ÐÐÒþÃØµÄºóʹÓû¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô2024Äê4ÔÂÆðÔÚµØÏÂÂÛ̳³öÊÛ£¬£¬£¬£¬µ«×Ô2025ÄêÍ·ÒÔÀ´£¬£¬£¬£¬ÔÚÀÕË÷Èí¼þÍÅ»ïÖÐÊܵ½ÏÔÖø¹Ø×¢¡£¡£¡£¡£¡£ProdaftÑо¿Ö°Ô±ÊӲ쵽£¬£¬£¬£¬¶à¸öÀÕË÷Èí¼þ²Ù×÷ÔÚÏÖʵ¹¥»÷Öа²ÅÅÁËSkitnet£¬£¬£¬£¬ÈçÕë¶ÔÆóÒµµÄMicrosoft TeamsÍøÂç´¹ÂÚ¹¥»÷ÖеÄBlackBastaºÍCactus¡£¡£¡£¡£¡£SkitnetµÄѬȾʼÓÚÔÚÄ¿µÄϵͳÉϰ²ÅŲ¢Ö´ÐлùÓÚRustµÄ¼ÓÔØÆ÷£¬£¬£¬£¬¸Ã¼ÓÔØÆ÷½âÃÜChaCha20¼ÓÃܵÄNim¶þ½øÖÆÎļþ²¢¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£¡£NimÓÐÓøºÔؽ¨Éè»ùÓÚDNSµÄ·´Ïòshell£¬£¬£¬£¬ÓÃÓÚÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬²¢Ê¹ÓÃËæ»úDNSÅÌÎÊÆô¶¯»á»°¡£¡£¡£¡£¡£¶ñÒâÈí¼þÆô¶¯Èý¸öỊ̈߳¬£¬£¬£¬»®·ÖÓÃÓÚ·¢ËÍÐÄÌøDNSÇëÇó¡¢¼àÊÓºÍй¶shellÊä³ö¡¢¼àÌýÏ¢ÕùÃÜÀ´×ÔDNSÏìÓ¦µÄÏÂÁî¡£¡£¡£¡£¡£Í¨Ñ¶ºÍ´ýÖ´ÐеÄÏÂÁîͨ¹ýHTTP»òDNS·¢ËÍ£¬£¬£¬£¬»ùÓÚSkitnet C2¿ØÖÆÃæ°åµÄÖ¸Áî¡£¡£¡£¡£¡£SkitnetÖ§³Ö¶àÖÖÏÂÁ£¬£¬£¬°üÀ¨½¨É賤ÆÚÐÔ¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢ÏÂÔØ²¢¾²Ä¬×°ÖÃÕýµ±µÄÔ¶³Ì»á¼û¹¤¾ß¡¢Æô¶¯PowerShellÏÂÁîÑ»·ÒÔ¼°Ã¶¾ÙÒÑ×°ÖõķÀ²¡¶¾ºÍÇå¾²Èí¼þµÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬²Ù×÷Ô±»¹¿ÉʹÓÃÉæ¼°.NET¼ÓÔØÆ÷µÄ¹¦Ð§£¬£¬£¬£¬ÔÚÄÚ´æÖÐÖ´ÐÐPowerShell¾ç±¾£¬£¬£¬£¬ÊµÏÖ¸üÉîÌõÀíµÄ¹¥»÷¶¨ÖÆ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-gangs-increasingly-use-skitnet-post-exploitation-malware/
5. °²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÀÕË÷¹¥»÷ÖÂÊý¾Ýй¶
5ÔÂ15ÈÕ£¬£¬£¬£¬2Ô·ݰ²Äݰ¢Â׵¶ûÏØÎÀÉú¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬µ¼Ö»¼ÕßÉñÃØÊý¾Ýй¶¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý·¢ÏØÕþ¸®´óÂ¥ÔÝʱ¹Ø±Õ£¬£¬£¬£¬²¢Ó°Ïì¶àÏîסÃñЧÀÍ¡£¡£¡£¡£¡£ÏØÕþ¸®ÓÚ2ÔÂ22ÈÕÊ״βì¾õ´Ë´Î¹¥»÷£¬£¬£¬£¬²¢Á¬Ã¦ÁªºÏÐÐÒµÁìÏȵÄÍøÂçÇ徲ר¼Ò¡¢Ö´·¨»ú¹¹¼°Ïà¹ØÖÝÕþ¸®»ú¹¹Õö¿ªÊӲ졣¡£¡£¡£¡£ÊÓ²ìЧ¹ûÏÔʾ£¬£¬£¬£¬´Ë´ÎÊÂÎñΪÍⲿÍþвÐÐΪÕßÌᳫµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ1ÔÂ28ÈÕÖÁ2ÔÂ22ÈÕʱ´ú£¬£¬£¬£¬¡°¸ÃÏØÍøÂçµÄһС²¿·Ö¡±Ôâµ½ÈëÇÖ£¬£¬£¬£¬Ê±´úijЩÎļþ±»Î´¾ÊÚȨ»á¼û»òÏÂÔØ¡£¡£¡£¡£¡£×¨¼ÒÖ¸³ö£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÖУ¬£¬£¬£¬ºÚ¿Íͨ³£ÇÖÈëϵͳ¼ÓÃÜ»òËø¶¨Ãü¾Ý£¬£¬£¬£¬²¢ÒªÇóÖ§¸¶Êê½ðÒÔÊÍ·ÅÐÅÏ¢¡£¡£¡£¡£¡£µ±±»Îʼ°ÊÇ·ñÒÑÖ§¸¶Êê½ðʱ£¬£¬£¬£¬½²»°ÈËÌåÏÖÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬ÎÞ·¨Í¸Â¶Ïà¹ØÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÏØÕýÓëÕÕÁÏÏàÖú£¬£¬£¬£¬ÒÔÈ·¶¨ÄÄЩÎļþ±»Ð¹Â¶£¬£¬£¬£¬Éв»ÇåÎúÊÜÓ°ÏìÈËÊý¡£¡£¡£¡£¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÓû§µÄÈ«Ãû¡¢µØµã¼°Ò½ÁÆÕï¶ÏµÈÐÅÏ¢£¬£¬£¬£¬Ö»¹Ü²ÆÎñÐÅϢδÊÜй¶£¬£¬£¬£¬µ«¹ÙÔ±ÈÔÃãÀø×¡Ãñ¼á³ÖСÐÄ£¬£¬£¬£¬Í¨¹ýÉó²éÕË»§±¨±í¡¢ÐÅÓñ¨¸æµÈÌá·ÀÉí·Ý͵ÇÔ¡£¡£¡£¡£¡£
https://www.thebaltimorebanner.com/community/local-news/cybersecurity-ransomware-anne-arundel-county-cyberattack-FYSLHXQANFCHBBCBDJWNDVUW6Q/
6. EffortelÊý¾Ýй¶Ö±ÈÀûʱMVNOÆßÍò¿Í»§ÐÅÏ¢Íâй
5ÔÂ16ÈÕ£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬ÓÉÓÚEffortel±¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬µ¼ÖÂÈý¼Ò±ÈÀûÊ±ÒÆ¶¯ÐéÄâÍøÂçÔËÓªÉÌ£¨MVNO£©µÄ70,000Ãû¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£¡£Effortel×÷ÎªÒÆ¶¯ÐéÄâÍøÂçÍÆ¶¯Õߣ¨MVNE£©£¬£¬£¬£¬ÔÚµçÐÅÐÐÒµÖÐÊÎÑÝ×ÅÒªº¦½ÇÉ«£¬£¬£¬£¬ËüΪӵÓÐÎïÀíÍøÂçµÄµçÐŹ«Ë¾£¨ÈçProximus£©ÓëÐéÄâµçÐÅÌṩÉÌ£¨ÈçNeibo£©Ö®¼ä´î½¨ÇÅÁº£¬£¬£¬£¬Í¨¹ý¿ª·¢Èí¼þƽ̨£¬£¬£¬£¬Ê¹ÆóÒµÄܹ»ÒÔMVNOÉí·ÝÔÚµçÐÅÔËÓªÉ̵ÄÎïÀíÍøÂçÉÏÔËÓª£¬£¬£¬£¬¶øÎÞÐè¾ß±¸´ó×ÚÊÖÒÕרҵ֪ʶ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬EffortelΪȫÇò30¶à¼ÒMVNO¿Í»§Ìṩ¿ªÆ±ºÍÅþÁ¬SIM¿¨µÈЧÀÍ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñ±¬·¢ÔÚÖÐÑëÊý¾Ý¿âµÄ²âÊԽ׶Σ¬£¬£¬£¬EffortelÔÚת´ï¿Í»§Êý¾Ý£¨ÈçÓÃÓÚ½ôÆÈЧÀ͵ÄÊý¾Ý£©ÒÔ¾ÙÐÐϵͳ¼¯³Éʱ£¬£¬£¬£¬ÌìÉúÁ˰üÀ¨¿Í»§Êý¾ÝµÄÎļþ£¬£¬£¬£¬ÕâЩÎļþ²»ÐÒ±»Ð¹Â¶¡£¡£¡£¡£¡£Ò»ÃûºÚ¿ÍÀÖ³ÉÈëÇÖÁËMVNOºÍTelfortÖ®¼äµÄÖ§³ÖÃÅ»§£¬£¬£¬£¬»ñÈ¡ÁËÕâЩÎļþµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°¼ÒÀÖ¸£Òƶ¯¡¢NeiboºÍUndoµÈ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ롢סլµØµã¡¢»¤ÕÕºÅÂë¡¢Óû§ºÅÂëÒÔ¼°SIM¿¨ºÅµÈÊÖÒÕʶ±ðÊý¾Ý¡£¡£¡£¡£¡£Effortel×Ü˾ÀíLaurent BatailleÌåÏÖ£¬£¬£¬£¬60%µ½65%µÄÖն˿ͻ§Í¨¹ýÔÚÏßÖ§¸¶È·ÈÏÉí·Ý£¬£¬£¬£¬ÆäÉí·ÝÊý¾Ý²»»á±»´æ´¢£¬£¬£¬£¬Ö§¸¶IDËä±£´æ£¬£¬£¬£¬µ«Ö»ÄÜͨ¹ýÖ§¸¶ÌṩÉÌÓëСÎÒ˽¼ÒÊý¾Ý¹ØÁª¡£¡£¡£¡£¡£
https://cybernews.com/security/data-belgian-virtual-telecom-operators-leaked/


¾©¹«Íø°²±¸11010802024551ºÅ