APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯
Ðû²¼Ê±¼ä 2025-05-161. APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET×îÐÂÑо¿·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹ÓйØÁªµÄÍþв×éÖ¯Õë¶ÔRoundcube¡¢Horde¡¢MDaemonºÍZimbraµÈÖ÷Á÷ÓʼþϵͳʵÑéÁËÃûΪ¡°Operation RoundPress¡±µÄÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯½¹µãÄ¿µÄÊÇÇÔÈ¡ÌØ¶¨ÓÊÏäÕË»§µÄÉñÃØÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÊܺ¦ÕßΪ¶«Å·Õþ¸®»ú¹¹¼°¾ü¹¤ÆóÒµ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±·ÇÖÞ¡¢Å·ÖÞºÍÄÏÃÀÖÞµÄÕþ¸®²¿·ÖÒ²Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½«Æä¹éÒòÓÚ¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT28£¬£¬£¬£¬£¬£¬£¬ÒÀ¾Ý°üÀ¨´¹ÂÚÓʼþ·¢¼þµØµãÖØµþºÍЧÀÍÆ÷ÉèÖÃÊÖ·¨ÏàËÆ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÓʼþϵͳµÄXSSÎó²îÔÚÍøÒ³ÓÊÏä½çÃæÖ´ÐÐí§ÒâJavaScript´úÂë¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬MDaemonµÄXSSÎó²îÔÚ¹¥»÷³õÆÚΪÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬ËäºóÐøÒÑÐÞ¸´£¬£¬£¬£¬£¬£¬£¬µ«ÆäʱδÐÞ¸´¡£¡£¡£¡£¡£¡£¡£APT28ͨ¹ýµç×ÓÓʼþ·¢ËÍXSSÎó²îʹÓóÌÐò£¬£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂëÔÚä¯ÀÀÆ÷ÔËÐеÄÍøÒ³ÓÊÏä¿Í»§¶ËÖÐÖ´ÐС£¡£¡£¡£¡£¡£¡£Îó²îʹÓÃÀֳɺ󣬣¬£¬£¬£¬£¬£¬ÃûΪSpyPressµÄ»ìÏýJavaScriptÓÐÓÃÔØºÉ»áÇÔÈ¡ÓÊÏ䯾֤¡¢ÓʼþÄÚÈݺÍÁªÏµÈËÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¿·Ö±äÖÖ»¹Äܽ¨ÉèSieve¹æÔò£¬£¬£¬£¬£¬£¬£¬Ò»Á¬×ª·¢ÐÂÓʼþÖÁ¹¥»÷ÕßÓÊÏä¡£¡£¡£¡£¡£¡£¡£ÇÔÈ¡µÄÊý¾Ýͨ¹ýHTTP POSTÇëÇó·¢ËÍÖÁC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬Ä³Ð©±äÖÖ»¹Äܲ¶»ñµÇ¼¼Í¼¡¢2FA´úÂ룬£¬£¬£¬£¬£¬£¬ÉõÖÁΪMDAEMON½¨ÉèÓ¦ÓÃÃÜÂë¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html
2. Coinbase¿Í»§Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆËðʧ´ï4ÒÚ
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbaseÅû¶£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÓë¶ñÒâÍâÑó¿Í·þÖ°Ô±ÏàÖúÇÔÈ¡Á˿ͻ§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢Ë÷Òª2000ÍòÃÀÔªÊê½ðÒÔ²»¹ûÕæ±»µÁÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Coinbase¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬µ«ÉèÁ¢2000ÍòÃÀÔª½±Àø»ù½ð£¬£¬£¬£¬£¬£¬£¬ÒÔÃãÀøÌṩÓйع¥»÷ÕßµÄÏßË÷¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÏòCoinbase·¢Ë͵ç×ÓÓʼþÍþвÐû²¼¿Í»§ÕË»§ºÍÄÚ²¿ÎļþÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬CoinbaseÊӲ췢Ã÷¹¥»÷ÕßÔÚÃÀ¹ú¾³Íâ³Ð°üÉÌ»òÖ§³ÖÖ°Ô±µÄ×ÊÖúÏ»ñÈ¡Á˿ͻ§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ÕâЩְԱÊܹͻá¼ûÄÚ²¿ÏµÍ³£¬£¬£¬£¬£¬£¬£¬Coinbase·¢Ã÷ºóÒÑ¿ª³ýÏà¹ØÖ°Ô±¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÍþвÐÐΪÕßÇÔÈ¡ÁËCoinbaseÔ¼1%¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«ÎÞ·¨»ñÈ¡¿Í»§Ë½Ô¿¡¢ÃÜÂë»ò»á¼ûCoinbase PrimeÕË»§ºÍÇ®°ü¡£¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢µç×ÓÓʼþ¡¢²¿·ÖÉç»á°ü¹ÜºÅ¡¢ÒøÐÐÕ˺ÅÐÅÏ¢¡¢Õþ¸®Éí·Ý֤ͼÏñ¡¢ÕË»§Êý¾Ý¼°ÓÐÏ޵Ĺ«Ë¾Êý¾Ý¡£¡£¡£¡£¡£¡£¡£CoinbaseÇ¿µ÷ûÓÐÃÜÂ롢˽Կ»ò×ʽðй¶£¬£¬£¬£¬£¬£¬£¬²¢½«Åâ³¥±»ÓÕÆÏò¹¥»÷Õß»ã¿îµÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£ËäÈ»²ÆÎñÓ°ÏìÈÔÔÚÆÀ¹ÀÖУ¬£¬£¬£¬£¬£¬£¬µ«CoinbaseÔ¤¼Æµ÷½âºÍ¿Í»§Åâ³¥ÓöȽ«ÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£¡£¡£¡£¡£¡£¡£Îª±ÜÃâδÀ´Î¥¹æÐÐΪ£¬£¬£¬£¬£¬£¬£¬CoinbaseÍýÏ뿪ÉèеÄÖ§³ÖÖÐÐÄÅâ³¥ÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬£¬£¬£¬²¢ÔöÌí¶ÔÄÚ²¿Íþв¼ì²â¡¢Çå¾²ÍþвģÄâºÍ×Ô¶¯ÏìÓ¦µÄͶ×Ê¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/
3. ¶ñÒâNPM°üʹÓÃUnicodeÒþдÊõÀ´Ìӱܼì²â
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬´úÂëÇå¾²ÆÀ¹À¹«Ë¾Veracode·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Node°ü¹ÜÀíÆ÷Ë÷ÒýÖб£´æÃûΪ¡°os-info-checker-es6¡±µÄ¶ñÒâÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬¸Ã°ü×Ô±¾Ô³õÒÔÀ´Òѱ»ÏÂÔØÁè¼Ý1000´Î¡£¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ°ü×î³õ°æ±¾ÓÚ3ÔÂ19ÈÕÉÏ´«ÖÁNPM£¬£¬£¬£¬£¬£¬£¬×î³õ¹¦Ð§½öÊÇÍøÂç²Ù×÷ϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¿´ËÆÎÞº¦¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¼¸Ììºó£¬£¬£¬£¬£¬£¬£¬×÷Õß¶ÔÈí¼þ°ü¾ÙÐÐÁËÐ޸쬣¬£¬£¬£¬£¬£¬Ìí¼ÓÁËÌØ¶¨ÓÚÆ½Ì¨µÄ¶þ½øÖÆÎļþºÍ»ìÏýµÄ×°Öþ籾¡£¡£¡£¡£¡£¡£¡£5ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°üÐû²¼Ð°汾£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚת´ï×îÖÕÓÐÓÃÔØºÉµÄÖØ´óC2£¨ÏÂÁîºÍ¿ØÖÆ£©»úÖÆ´úÂë¡£¡£¡£¡£¡£¡£¡£VeracodeÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬Ä¿½ñnpmÉÏ¿ÉÓõÄ×îа汾v1.0.8Ϊ¶ñÒâ°æ±¾¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°ü»¹±»ÁÐΪÆäËûËĸöNPMÈí¼þ°üµÄÒÀÀµÏ£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúÕâЩÈí¼þ°üÊÇ·ñ»òÔõÑù±»ÍþвÐÐΪÕßÍÆ¹ã¡£¡£¡£¡£¡£¡£¡£ÔÚ¶ñÒâ°æ±¾ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃUnicodeÒþдÊõ£¬£¬£¬£¬£¬£¬£¬½«Êý¾ÝǶÈë¿´ËÆ¡°|¡±µÄ×Ö·û´®ÖУ¬£¬£¬£¬£¬£¬£¬¶øÊúÏߺóÒþ²ØÁËÒ»³¤´®²»¿É¼ûµÄUnicode×Ö·û£¬£¬£¬£¬£¬£¬£¬ÕâЩ×Ö·ûÓÃÓÚÔö½ø»ùÓÚÎı¾µÄÒþдÊõ¡£¡£¡£¡£¡£¡£¡£Veracodeͨ¹ý½âÂëºÍ·´»ìÏý×Ö·û´®£¬£¬£¬£¬£¬£¬£¬ÕÒµ½ÁËÖØ´óC2»úÖÆµÄÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬£¬¸Ã»úÖÆÒÀÀµGoogleÈÕÀú¶ÌÁ´½ÓµÖ´ïÍйÜ×îÖÕÓÐÓÃÔØºÉµÄλÖᣡ£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ú¹ÊÍÁË´Ó»ñÈ¡GoogleÈÕÀúÁ´½Óµ½×îÖÕ½âÂë»ñÈ¡¶ñÒâÈí¼þÓÐÓÃÔØºÉµÄÕû¸öÀú³Ì£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³ö×îÖÕÓÐÓÃÔØºÉ¿ÉÄܾÓɼÓÃÜ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-npm-package-uses-unicode-steganography-to-evade-detection/
4. Ó¡µÚ°²ÄÉÖÝÕþ¸®ÖÒÑÔ£ºÐ¡ÐÄð³ä¹Ù·½ÓʼþµÄͨÐзÑÕ©Æ
5ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬Ó¡µÚ°²ÄÉÖÝÕþ¸®»ú¹¹ÓÚÖܶþÏòסÃñ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬ÒªÇóɾ³ýʹÓÃÖÝÕþ¸®¹Ù·½µç×ÓÓʼþµØµã·¢Ë͵ÄÐéαµç×ÓÓʼþ¡£¡£¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚÓʼþÀ´×Ô¶à¸öÖÝÕþ¸®²¿·Ö£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶ùͯЧÀͲ¿¡¢ÈüÂíίԱ»áµÈ£¬£¬£¬£¬£¬£¬£¬ËüÃÇÓÕÆÐԵؼû¸æÊÕ¼þÈ˱£´æÎ´½ÉÄɵÄͨÐзѣ¬£¬£¬£¬£¬£¬£¬²¢ÍþвÈô²»½ÉÄɽ«ÃæÁÙ¾¼Ã´¦·£»£»£»£»£»£»ò³µÁ¾¹ÒºÅ±»¿ÛÁô¡£¡£¡£¡£¡£¡£¡£Óʼþ×îºó³£ÒÔ¡°Ð»Ð»Äú£¬£¬£¬£¬£¬£¬£¬TxTag ¿Í·þ¡±×÷ΪÊðÃû£¬£¬£¬£¬£¬£¬£¬²¢°üÀ¨ÒÉËÆ¶ñÒâÍøÕ¾µÄÁ´½Ó¡£¡£¡£¡£¡£¡£¡£Ó¡µÚ°²ÄÉÖÝÁìÍÁÇå¾²²¿Í¨¹ýÊÖÒհ칫ÊÒÔÚXƽ̨Ðû²¼ÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬ÌáÐѹ«ÖÚСÐÄ´ËÀàÕ©Æ¡£¡£¡£¡£¡£¡£¡£ÉùÃ÷Ö¸³ö£¬£¬£¬£¬£¬£¬£¬ÖÝÕþ¸®²»»áͨ¹ý¶ÌÐÅ»òµç×ÓÓʼþ·¢ËÍδ½ÉͨÐзÑ֪ͨ£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÊÖÒհ칫ÊÒÕýÓëÉæÊ¹«Ë¾ÏàÖú£¬£¬£¬£¬£¬£¬£¬ÒÔ×èÖ¹ÈκνøÒ»²½µÄͨѶ¡£¡£¡£¡£¡£¡£¡£¾ÝÏàʶ£¬£¬£¬£¬£¬£¬£¬ÖÝÕþ¸®ÓÚÈ¥ÄêÄêµ×ÖÕÖ¹ÁËÓëÒ»¼Òδǩ×Ö¹©Ó¦É̵ÄÌõÔ¼£¬£¬£¬£¬£¬£¬£¬µ«Î´É¾³ý¸ÃÖݵÄÕË»§¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬£¬£¬Ò»Ãû³Ð°üÉ̵ÄÕË»§Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢±»ÓÃÓÚ·¢ËÍÕâЩÐéαÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¶øÖÝϵͳ²¢Î´·¢Ã÷ÈëÇÖ¼£Ï󡣡£¡£¡£¡£¡£¡£µç×ÓÓʼþ½ØÍ¼ÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢ÊÇͨ¹ýµ¤·ðÈí¼þ¹«Ë¾GranicusµÄÈí¼þGovDelivery Communications Cloud·Ö·¢µÄ¡£¡£¡£¡£¡£¡£¡£Granicus½²»°ÈËSharon RushenÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ²¢Î´ÉìÕÅÖÁÆä×ÔÉíÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬ÏµÍ³ÊÇÇå¾²µÄ¡£¡£¡£¡£¡£¡£¡£ËýÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÎÊÌâÔ´ÓÚÖÎÀíÔ±Óû§ÕË»§±»ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇͨ¹ýÍÆ²âƾ֤»òÉç½»¹¤³ÌÊֶλñÈ¡¡£¡£¡£¡£¡£¡£¡£
https://statescoop.com/indiana-phishing-attack-contractor-hacked/
5. FrigidStealerͨ¹ýÐéαä¯ÀÀÆ÷¸üй¥»÷macOSÓû§
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬FrigidStealer¶ñÒâÈí¼þÕýͨ¹ýÐéαä¯ÀÀÆ÷¸üÐÂÌáÐѹ¥»÷macOSÓû§£¬£¬£¬£¬£¬£¬£¬¸Ã±äÖÖÓÚ2025Äê2ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬²¢ÒѲ¨¼°±±ÃÀ¡¢Å·ÖÞºÍÑÇÖÞµÄÓû§¡£¡£¡£¡£¡£¡£¡£´Ë¶ñÒâÈí¼þÁ¥ÊôÓÚFerret¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬£¬£¬£¬ÓëTA2726ºÍTA2727²¡¶¾Óйأ¬£¬£¬£¬£¬£¬£¬Á½Õß¾ùÒÔʹÓÃÐéαä¯ÀÀÆ÷¸üÐÂΪ¹¥»÷ÊֶζøÖø³Æ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉSafari¸üеĴÅÅÌÓ³ÏñÎļþ£¨DMG£©£¬£¬£¬£¬£¬£¬£¬ÓÕÆÓû§ÏÂÔØ²¢×°Öᣡ£¡£¡£¡£¡£¡£×°ÖÃÀú³ÌÖУ¬£¬£¬£¬£¬£¬£¬Ëü»áÌáÐÑÓû§ÊäÈëÃÜÂ룬£¬£¬£¬£¬£¬£¬´Ó¶øÈƹýAppleµÄGatekeeper±£»£»£»£»£»£»¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬²¢½èÖúÄÚÖõÄAppleScript¹¦Ð§Ö´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬£¬£¬Ëü»áαװ³ÉÒ»¸ö´øÓÐÌØ¶¨bundle IDµÄ¶ñÒâÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÓëÕýµ±Ó¦ÓûìÏýÊÓÌý¡£¡£¡£¡£¡£¡£¡£Ò»µ©¼¤»î£¬£¬£¬£¬£¬£¬£¬FrigidStealer±ã×îÏÈÍøÂçÓû§µÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ä¯ÀÀÆ÷ƾ֤¡¢ÏµÍ³Îļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢¼°Apple NotesµÈ£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýmacOSµÄmDNSResponder·ÓɵÄDNSÅÌÎÊ£¬£¬£¬£¬£¬£¬£¬½«ÕâЩÊý¾Ýй¶µ½ÏÂÁîÓë¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ÇÔÈ¡Êý¾Ýºó£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»á×ÔÎÒÖÕÖ¹£¬£¬£¬£¬£¬£¬£¬ÒÔ½µµÍ±»·¢Ã÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£¾Ý¿ªÔ´ÍøÂçÇå¾²¹«Ë¾WazuhÅû¶£¬£¬£¬£¬£¬£¬£¬FrigidStealer²¢²»ÒÀÀµ¹Å°åµÄÎó²îʹÓù¤¾ß°ü»òÎó²î£¬£¬£¬£¬£¬£¬£¬¶øÊÇʹÓÃÓû§¶Ôϵͳ֪ͨºÍä¯ÀÀÆ÷¸üÐÂÌáÐѵÄÐÅÈξÙÐй¥»÷£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃËü¸üΪΣÏÕÇÒÓÐÓᣡ£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃmacOSÌØÓеÄÐÐΪÀ´¼á³Ö³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬Í¨¹ý×¢²áΪǰ̨ӦÓóÌÐòµÈ·½·¨Óëϵͳ½»»¥£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÖ´Ðкóɾ³ý×ÔÉíºÛ¼££¬£¬£¬£¬£¬£¬£¬ÒÔ¼á³ÖÒþ²Ø¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/frigidstealer-malware-macos-fake-safari-browser-update/
6. ÕÐÆ¸Æ½Ì¨HireClick570Íò·Ý¼òÀúÔâй¶
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬CybernewsÑо¿Ö°Ô±¿ËÈÕ·¢Ã÷Ò»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÈªÔ´Ö¸ÏòÃæÏòÖÐСÐÍÆóÒµµÄÕÐÆ¸Æ½Ì¨HireClick¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÑÇÂíÑ·AWS S3´æ´¢Í°ÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬¸Ãƽ̨Áè¼Ý570Íò·ÝÎļþ±»Ì»Â¶ÔÚ»¥ÁªÍøÉÏ£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÖ÷ÒªÊÇÇóÖ°ÕߵļòÀú£¬£¬£¬£¬£¬£¬£¬ÕâЩÎļþй¶ÁËÇóÖ°ÕßµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°¾ÍÒµÐÅÏ¢µÈÃô¸ÐºÍ˽ÈËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶¶ÔHireClick¿Í»§µÄÓ°ÏìÉîÔ¶¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÒ»µ©ÂäÈë²»·¨·Ö×ÓÖ®ÊÖ£¬£¬£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢Ã°³ä¡¢ÍøÂç´¹ÂڵȶàÖÖթƻ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄٰܼçÕÐÆ¸Ë¾Àí£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃй¶µÄÐÅÏ¢ÓÕÆÇóÖ°ÕßÌṩÉí·Ý֤ɨÃè¼þ¡¢Éç»áÇå¾²ºÅÂëÉõÖÁÒøÐÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬»òͨ¹ýµç»°ÓÕÆÇóÖ°ÕßÍ¸Â¶ÒøÐÐÐÅÏ¢»ò×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Õ©ÆÕß»¹¿ÉʹÓÃй¶µÄ¼òÀú½¨ÉèÐéαÉí·Ý¾ÙÐоÍÒµÑéÖ¤Õ©Æ£¬£¬£¬£¬£¬£¬£¬ÉõÖÁð³äÇóÖ°Õß½øÈëÊÂÇ鳡ºÏϵͳ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÊý¾Ýй¶ÐÐΪµÄΣº¦²»µ«ÏÞÓÚÊý¾Ý͵ÇÔ×Ô¼º£¬£¬£¬£¬£¬£¬£¬»¹¿ÉÄÜÒý·¢ÍøÂçÈËÈâËÑË÷£¬£¬£¬£¬£¬£¬£¬¼´¶ñÒâÆØ¹â˽ÈËÐÅÏ¢ÒÔɧÈÅ»òÏÅ»£ËûÈË¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÕÆÎÕÁËÊܺ¦ÕßµÄÈ«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÏÖʵµØµã£¬£¬£¬£¬£¬£¬£¬¾ÍÄÜÈÝÒ×Ëø¶¨²¢É§ÈÅÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/hireclick-resume-database-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ