TamperedChefÐÅÏ¢ÇÔÈ¡³ÌÐòͨ¹ýڲƭÐÔPDF±à¼­Æ÷Èö²¥

Ðû²¼Ê±¼ä 2025-09-01

1. TamperedChefÐÅÏ¢ÇÔÈ¡³ÌÐòͨ¹ýڲƭÐÔPDF±à¼­Æ÷Èö²¥


8ÔÂ30ÈÕ£¬ £¬£¬ £¬£¬£¬£¬½üÆÚÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶ÁËÒ»ÆðÉæ¼°Google¹ã¸æÍƹãµÄÖØ´óÍøÂç·¸·¨»î¶¯£¬ £¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý50Óà¸öαÔìÓòÃû·Ö·¢Ð¯´øTamperedChefÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄPDF±à¼­¹¤¾ß¡£¡£¡£¡£¡£¸Ã»î¶¯·ºÆð¶à½×¶ÎÌØÕ÷£¬ £¬£¬ £¬£¬£¬£¬×Ô2024Äê6ÔÂ26ÈÕÆð£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷Õßͨ¹ý×¢²á»ò½ÓÊÜÍøÕ¾ÍÆ¹ã"AppSuite PDF Editor"µÈ¹¤¾ß£¬ £¬£¬ £¬£¬£¬£¬Ê¹ÓÃÖÁÉÙËÄ¼ÒÆóÒµµÄÕýµ±Ö¤ÊéÇ©ÊðÓÕÆ­ÐÔÓ¦ÓóÌÐò£¬ £¬£¬ £¬£¬£¬£¬ÐγÉÊÖÒÕ¿ÉÐŶÈαװ¡£¡£¡£¡£¡£½¹µã¶ñÒâÈí¼þTamperedChefͨ¹ý¿ÉÖ´ÐÐÎļþµÄ"-fullupdate"²ÎÊý´¥·¢£¬ £¬£¬ £¬£¬£¬£¬ÔÚ8ÔÂ21ÈÕǰÒÔÕý³£¹¦Ð§Ê¾ÈË£¬ £¬£¬ £¬£¬£¬£¬´ýGoogle¹ã¸æÍê³É60ÌìÍÆ¹ãÖÜÆÚǰËÄÌìͻȻ¼¤»î¶ñÒâÄ£¿£¿£¿é¡£¡£¡£¡£¡£¸ÃÇÔÈ¡³ÌÐòͨ¹ýDPAPI½Ó¿Ú½âÃÜä¯ÀÀÆ÷Êý¾Ý£¬ £¬£¬ £¬£¬£¬£¬ÖصãÇÔÈ¡Óû§Æ¾Ö¤¡¢ÍøÂçCookieµÈÃô¸ÐÐÅÏ¢£¬ £¬£¬ £¬£¬£¬£¬²¢¾ß±¸¼ì²âÇå¾²ÊðÀíµÄÇéÐθÐÖªÄÜÁ¦¡£¡£¡£¡£¡£Ñо¿Õ¹Ïָ÷¸·¨ÍŻﹹ½¨ÁËÏ໥¹ØÁªµÄÓ¦ÓÃÉú̬£¬ £¬£¬ £¬£¬£¬£¬³ýÖ÷¹¥PDF¹¤¾ßÍ⣬ £¬£¬ £¬£¬£¬£¬»¹Í¨¹ýOneStart¡¢EpibrowserµÈDZÔÚÓк¦³ÌÐò£¨PUP£©Ðγɽ»Ö¯Ñ¬È¾Á´¡£¡£¡£¡£¡£Expel¹«Ë¾·¢Ã÷²¿·ÖÓ¦ÓûáÓÕµ¼Óû§½«×°±¸×¢²áΪסլÊðÀí£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÕýµ±ÊðÀíЧÀÍÉÌÏ´°×²»·¨Á÷Á¿¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬ £¬£¬£¬£¬×ÝÈ»´úÂëÊðÃûÖ¤ÊéÒѱ»µõÏú£¬ £¬£¬ £¬£¬£¬£¬Ä¿½ñÒÑ×°ÖÃ×°±¸ÈÔÃæÁÙÒ»Á¬Î£º¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/


2. APT37ʹÓÃÇ鱨Îļþ¶Ôº«·¢¶¯Ï¸ÃÜÍøÂç´¹ÂÚ¹¥»÷


8ÔÂ29ÈÕ£¬ £¬£¬ £¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Seqrite×îÐÂÅû¶£¬ £¬£¬ £¬£¬£¬£¬³¯ÏÊÖ§³ÖµÄºÚ¿Í×éÖ¯APT37½üÆÚÕë¶Ôº«¹úÕþ¸®¼°Ç鱨»ú¹¹Ìᳫ´úºÅ"º«¹ú»ÃÓ°Ðж¯"µÄÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬ £¬£¬£¬£¬Í¨¹ýË«ÖØÓÕ¶üÕ½ÂÔÀÖ³ÉÉøÍ¸Ä¿µÄϵͳ¡£¡£¡£¡£¡£¸Ã×é֯ʹÓú«¹úÑо¿»ú¹¹ÄÚ²¿Í¨Ñ¶ºÍ³¯Ïʹٷ½ÉùÃ÷Îļþ×÷Ϊ¹¥»÷ÔØÌ壬 £¬£¬ £¬£¬£¬£¬Õ¹Ïָ߶ȶ¨ÖÆ»¯µÄÍøÂçÌØ¹¤ÄÜÁ¦¡£¡£¡£¡£¡£Ê״ι¥»÷ÖУ¬ £¬£¬ £¬£¬£¬£¬APT37αÔ캫¹ú¹ú¼ÒÇ鱨Ñо¿Ð­»áµÚ52ÆÚͨѶÎļþ£¬ £¬£¬ £¬£¬£¬£¬ÓÕÆ­Ä¿µÄ³ÉÔ±ÏÂÔØ°üÀ¨¶ñÒâLNK¿ì½Ý·½·¨µÄPDFÎĵµ¡£¡£¡£¡£¡£Ö´ÐÐºó£¬ £¬£¬ £¬£¬£¬£¬¸Ã¿ì½Ý·½·¨´¥·¢ÄÚ´æ¼ÓÔØµÄRokRATºóÃÅ£¬ £¬£¬ £¬£¬£¬£¬Í¨¹ý¶à²ã»ìÏýÊÖÒÕ£¨°üÀ¨Åú´¦Öóͷ£¾ç±¾¡¢XOR½âÃܼ°ÎÞÎļþ×¢È룩ʵÏÖÒþ²Ø×¤Áô¡£¡£¡£¡£¡£¹¥»÷Á´»¹½ÓÄÉαÔìHTTPÁ÷Á¿ÉÏ´«TEMPÎļþµÄ·½·¨£¬ £¬£¬ £¬£¬£¬£¬¹æ±Ü¹Å°åÇå¾²¼ì²â¡£¡£¡£¡£¡£µÚ¶þ´Î¹¥»÷ÔòÃé×¼º«¹úÕþ¸®ÄÚ¸ó¼°Í³Ò»²¿µÈ»ú¹¹£¬ £¬£¬ £¬£¬£¬£¬Ê¹Óó¯ÏÊ×î¸ßÏòµ¼È˽ðÕý¶÷µÄ°ûÃýðÓëÕý7ÔÂ28ÈÕ½ÒÏþµÄ³ðÊÓÉùÃ÷×÷ΪÓÕ¶ü¡£¡£¡£¡£¡£¹¥»÷Õß¹¹½¨ÁËÏàËÆµÄÉøÍ¸Â·¾¶£º¶ñÒâLNKÎļþÊÍ·Åαװ³ÉPDFÉÏ´«µÄ»ìÏý×é¼þ£¬ £¬£¬ £¬£¬£¬£¬Í¨¹ýPowerShellÏÂÁîÖ´ÐÐÄÚ´æÖеļÓÃÜÔØºÉ£¬ £¬£¬ £¬£¬£¬£¬×îÖÕ´ÓC2ЧÀÍÆ÷»ñÈ¡abs.tmpÖ´ÐкóÐø²Ù×÷¡£¡£¡£¡£¡£Á½´Î¹¥»÷¾ù½ÓÄÉ"ÓÕ¶üÎļþ+¶ñÒâ¿ì½Ý·½·¨"µÄ×éºÏģʽ£¬ £¬£¬ £¬£¬£¬£¬Á¬ÏµÄÚ´æÖ´ÐÐÓëÁ÷Á¿»ìÏýÊÖÒÕ£¬ £¬£¬ £¬£¬£¬£¬ÐγÉÄÑÒÔ×·×ÙµÄÒþ²ØÍ¨µÀ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/north-korea-apt37-spear-phishing/


3. ºÚ¿ÍÉù³ÆÇÔÈ¡ÁË43.3ÍòÒ½ÁÆ´ÓÒµÕßµÄÏêϸÐÅÏ¢


8ÔÂ29ÈÕ£¬ £¬£¬ £¬£¬£¬£¬Ò»¸öÊ¢ÐÐÊý¾Ýй¶ÂÛ̳ÉÏ·ºÆðÕë¶ÔÃÀ¹úÒ½ÁÆ´ÓÒµÕߵĴó¹æÄ£Êý¾Ýй¶Ìû×Ó£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷ÕßÉù³Æ»ñÈ¡Á˰üÀ¨43.3ÍòÃûÒ½Éú¡¢Íâ¿ÆÒ½Éú¼°Ò½ÁƱ£½¡×¨ÒµÖ°Ô±Ãô¸ÐÐÅÏ¢µÄÊý¾Ý¿â¡£¡£¡£¡£¡£CybernewsÑо¿ÍŶӯÊÎöÑù±¾ºóÖ¸³ö£¬ £¬£¬ £¬£¬£¬£¬Ð¹Â¶Êý¾Ýº­¸ÇÈ«Ãû¡¢µç»°¡¢Ö°³Æ¡¢×¨ÒµÁìÓò¡¢Ò½ÔºÐÅÏ¢¡¢µç×ÓÓʼþ¡¢µØµãµÈСÎÒ˽¼ÒÓëÊÂÇéÕË»§»ìÏýÐÅÏ¢£¬ £¬£¬ £¬£¬£¬£¬ÆäȪԴ¿ÉÄÜÖ¸ÏòµÚÈý·½Ð§ÀÍÌṩÉ̵ÄÎó²î¡£¡£¡£¡£¡£´Ë´Îй¶·ºÆðÁ½´óÌØÕ÷£ºÆäÒ»£¬ £¬£¬ £¬£¬£¬£¬²¿·Öµç×ÓÓʼþ´Ëǰδ·ºÆðÔÚ¹ûÕæÊý¾Ýй¶ÊÂÎñÖУ¬ £¬£¬ £¬£¬£¬£¬ÌåÏÖÊý¾Ý¿ÉÄÜÕûºÏ×Ô¶à´Îδ¹ûÕæÎó²î»òÌØ¶¨Î´Åû¶µÄµÚÈý·½Ð§ÀÍй¶£»£»£»£»Æä¶þ£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷Õß´ËÇ°ÔøÐû²¼°´µØÇø¡¢ÐÐÒµ·ÖÀàµÄÀàËÆÊý¾Ý¿â£¬ £¬£¬ £¬£¬£¬£¬Åú×¢Æä¿ÉÄÜͨ¹ý¶àÔ´ÍøÂç¿ÌÒâÒþ²ØÏêϸȪԴ¡£¡£¡£¡£¡£ÕâÖÖģʽÔöÌíÁË×·×ÙÊý¾ÝÔ´Í·µÄÄѶȣ¬ £¬£¬ £¬£¬£¬£¬Ò²·´Ó¦³öÒ½ÁÆÐÐÒµµÚÈý·½Ð§ÀÍÉú̬µÄÇå¾²Òþ»¼¡£¡£¡£¡£¡£Ò½ÁÆÊý¾ÝÒò¸ß¼ÛÖµ³ÉÎªÍøÂç·¸·¨ÖصãÄ¿µÄ¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢¿É±»ÓÃÓÚ¶àÖØ¶ñÒⳡ¾°£º×îÖ±½ÓµÄÊÇÉí·Ý͵ÇÔ£¬ £¬£¬ £¬£¬£¬£¬Í¨¹ýαÔìÒ½ÁÆ´ÓÒµÕßÉí·Ý¿ªÉèڲƭÕË»§£»£»£»£»¸üΣÏÕµÄÊǶ¨Ïò´¹ÂÚ¹¥»÷£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜαװ³ÉÒ½ÁÆ»ú¹¹·¢ËͰüÀ¨¶ñÒâÁ´½ÓµÄÄÚÈÝ£¬ £¬£¬ £¬£¬£¬£¬ÓÕµ¼Êܺ¦Õß͸¶¸ü¶àСÎÒ˽¼ÒÐÅÏ¢»òÏÂÔØÀÕË÷Èí¼þ¡£¡£¡£¡£¡£


https://cybernews.com/security/american-doctors-data-breach-healthcare/


4. WhatsApp 0-DayÎó²î±»Ê¹Óù¥»÷iOSºÍmacOSÓû§


8ÔÂ31ÈÕ£¬ £¬£¬ £¬£¬£¬£¬WhatsApp½ôÆÈÐÞ¸´ÁËÒ»¸ö±àºÅΪCVE-2025-55177µÄÑÏÖØ0dayÎó²î£¬ £¬£¬ £¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷Õßͨ¹ýÁãµã»÷ÌØ¹¤Èí¼þ¹¥»÷ÈëÇÖiOSºÍMacÓû§µÄ×°±¸£¬ £¬£¬ £¬£¬£¬£¬ÎÞÐèÓû§µã»÷Á´½Ó»ò·­¿ªÎļþ¼´¿ÉÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£´Ë´ÎÎó²îÓÉWhatsAppÄÚ²¿Çå¾²ÍŶӷ¢Ã÷£¬ £¬£¬ £¬£¬£¬£¬ÊôÓÚÖØ´óµÄ¹¥»÷Á´µÄÒ»²¿·Ö£¬ £¬£¬ £¬£¬£¬£¬Á¬ÏµÁËÁíÒ»¸öÒÑÓÉÆ»¹ûÐÞ¸´µÄÎó²î£¨CVE-2025-43300£©£¬ £¬£¬ £¬£¬£¬£¬ÐγɿÉÔ¶³ÌÖ´ÐжñÒâ´úÂëµÄÍêÕû¹¥»÷·¾¶¡£¡£¡£¡£¡£¾ÝÇ徲ͨ¸æ£¬ £¬£¬ £¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚ¡°¹ØÁª×°±¸Í¬²½ÐÂÎÅÊÚȨ²»ÍêÕû¡±£¬ £¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓô˻úÖÆÇ¿ÖÆÄ¿µÄ×°±¸´¦Öóͷ£¶ñÒâÍøÖ·ÄÚÈÝ£¬ £¬£¬ £¬£¬£¬£¬½ø¶øÖ²ÈëÌØ¹¤Èí¼þÇÔÈ¡¶ÌÐŵÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£WhatsAppÒÑÏò¡°²»µ½200Ãû¡±Ìض¨Ä¿µÄÓû§·¢ËÍ֪ͨ£¬ £¬£¬ £¬£¬£¬£¬²¢Ç¿Å²Óû§ÐèÁ¬Ã¦¸üÐÂÖÁ×îа汾ÒÔÌá·ÀΣº¦¡£¡£¡£¡£¡£¿£¿£¿¨Ëþ¶û¹ú¼ÒÍøÂçÇå¾²¾Ö£¨NCSA£©Ö¸³ö£¬ £¬£¬ £¬£¬£¬£¬¸ÃÎó²îµÄÑÏÖØÐÔÔÚÓÚÆäʹÓÃÐÂÎÅͬ²½»úÖÆ»ñȡװ±¸ÆðÔ´»á¼ûȨÏÞ£¬ £¬£¬ £¬£¬£¬£¬¶ø¹ú¼ÊÌØÉâ×éÖ¯Ç徲ʵÑéÊÒÔò½«Æä¶¨ÐÔΪ¡°¸ß¼¶Ìع¤Èí¼þ»î¶¯¡±£¬ £¬£¬ £¬£¬£¬£¬³ÆÆäÒÑÍù90ÌìÄÚÒÑÕë¶ÔÓû§Ìᳫ¹¥»÷¡£¡£¡£¡£¡£ÊµÑéÊÒÈÏÕæÈËDonncha ¨® Cearbhaill½¨ÒéÓû§¸üÐÂ×°±¸»ò»Ö¸´³ö³§ÉèÖÃÒÔ³¹µ×ɨ³ýDZÔÚÍþв¡£¡£¡£¡£¡£


https://hackread.com/whatsapp-0-day-exploit-attack-targeted-ios-macos-users/


5. TAOTH»î¶¯£º±»Ð®ÖƵÄÈí¼þ¸üÐÂÕýÔÚÑÇÖÞ¸÷µØÈö²¥¶ñÒâÈí¼þ


9ÔÂ1ÈÕ£¬ £¬£¬ £¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶һÆð´úºÅ"TAOTH"µÄÖØ´óÍøÂçÌØ¹¤»î¶¯£¬ £¬£¬ £¬£¬£¬£¬¸ÃÐж¯×Ô2024Äêµ×Æô¶¯£¬ £¬£¬ £¬£¬£¬£¬Í¨¹ýÐ®ÖÆÈí¼þ¸üÐÂЧÀÍÆ÷ºÍÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬ £¬£¬£¬£¬ÔÚ¶«ÑǵØÇø¶¨ÏòÈö²¥¶à¸ö¶ñÒâÈí¼þ¼Ò×壬 £¬£¬ £¬£¬£¬£¬Ä¿µÄº­¸ÇÖйú´ó½¡¢Ì¨Íå¡¢Ïã¸Û¡¢ÈÕ±¾¼°º«¹úµÄÒì¼ûÈËÊ¿¡¢¼ÇÕß¡¢Ñо¿Ö°Ô±ºÍÉ̽çÊ×ÄÔ£¬ £¬£¬ £¬£¬£¬£¬²¿·ÖÃÀ¹úºÍŲÍþÓû§Ò²ÔⲨ¼°¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÒÑ·ÅÆúµÄËѹ·×¢ÒôÊäÈë·¨¸üлúÖÆÊµÑ鹩ӦÁ´¹¥»÷£º2024Äê10Ô£¬ £¬£¬ £¬£¬£¬£¬ÔÚËѹ·ÊäÈë·¨×èÖ¹¸üÐÂÎåÄêºó£¬ £¬£¬ £¬£¬£¬£¬Íþв×éÖ¯½ÓÊÜÆäʧЧÓòÃû£¬ £¬£¬ £¬£¬£¬£¬Í¨¹ý¿´ËÆÕýµ±µÄ¸üÐÂÀú³Ì·Ö·¢¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£Óû§×°Öùٷ½×°ÖóÌÐòºóÊýСʱ£¬ £¬£¬ £¬£¬£¬£¬ÏµÍ³»á×Ô¶¯´¥·¢¹¥»÷Õß¿ØÖƵÄÓò¸üУ¬ £¬£¬ £¬£¬£¬£¬Ö²ÈëTOSHIS¡¢DESFY¡¢GTELAMºÍC6DOORËÄ´ó¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£¡£¡£³ý¹©Ó¦Á´¹¥»÷Í⣬ £¬£¬ £¬£¬£¬£¬TAOTHÐж¯»¹Á¬ÏµÓã²æÊ½ÍøÂç´¹ÂÚ£º¹¥»÷Õß·¢ËÍαװ³ÉÕþÖÎÖ÷ÌâÎĵµµÄÓʼþ£¬ £¬£¬ £¬£¬£¬£¬ÓÕµ¼Óû§»á¼ûÐéÎ±ÔÆ´æ´¢Ò³ÃæÏÂÔØ¶ñÒâ´æµµ£¬ £¬£¬ £¬£¬£¬£¬»òͨ¹ýαÔìGoogle/MicrosoftµÇ¼ÃÅ»§Æ­È¡OAuthÊÚȨ£¬ £¬£¬ £¬£¬£¬£¬½ø¶ø²Ù¿ØÓÊÏäʵÑéºáÏòÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£


https://securityonline.info/taoth-campaign-hijacked-software-updates-are-spreading-malware-across-asia/


6. SikkahBot£ºÕë¶ÔÃϼÓÀ­¹úѧÉúµÄÐÂÐͰ²×¿¶ñÒâÈí¼þʵÑé½ðÈÚڲƭ


9ÔÂ1ÈÕ£¬ £¬£¬ £¬£¬£¬£¬CybleÑо¿ÓëÇ鱨ʵÑéÊÒ£¨CRIL£©½üÆÚ½ÒÆÆÁËÒ»ÆðרÃÅÕë¶ÔÃϼÓÀ­¹úѧÉúµÄÐÂÐÍAndroid¶ñÒâÈí¼þ»î¶¯"SikkahBot"¡£¡£¡£¡£¡£¸Ã»î¶¯×Ô2024Äê7ÔÂÆð»îÔ¾£¬ £¬£¬ £¬£¬£¬£¬Í¨¹ýαÔìÃϼÓÀ­¹ú½ÌÓýίԱ»á¹Ù·½½±Ñ§½ðÓ¦ÓóÌÐòʵÑ龫׼թƭ£¬ £¬£¬ £¬£¬£¬£¬ÒÑÐγɼ¯ÍøÂç´¹ÂÚ¡¢Êý¾ÝÇÔÈ¡Óë×Ô¶¯»¯½ðÈÚÉúÒâÓÚÒ»ÌåµÄ¸´ºÏÐÍÍþв¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶ÌÐÅ·¢ËÍËõ¶ÌÁ´½Ó£¬ £¬£¬ £¬£¬£¬£¬ÓÕµ¼Êܺ¦Õß»á¼û¶ñÒâAPKÏÂÔØÍøÕ¾¡£¡£¡£¡£¡£Î±×°³ÉÕý¹æ½±Ñ§½ðÓ¦ÓõĶñÒâÈí¼þÔÚ×°ÖÃºó£¬ £¬£¬ £¬£¬£¬£¬»áÒªÇóÓû§Ê¹Óùȸè»òFacebookÕ˺ŵǼ£¬ £¬£¬ £¬£¬£¬£¬²¢Öð²½Ë÷È¡ÐÕÃû¡¢ËùÊô»ú¹¹µÈСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬ £¬£¬£¬£¬×îÖÕÓÕµ¼Óû§ÌṩǮ°üºÅ¡¢PINÂëµÈÃô¸Ð²ÆÎñÊý¾Ý¡£¡£¡£¡£¡£CRILÖ¸³ö£¬ £¬£¬ £¬£¬£¬£¬Êܺ¦ÕßÌá½»ÐÅÏ¢ºó»áÊÕµ½"¿Í·þ½«ÁªÏµ"µÄÐéαÌáÐÑ£¬ £¬£¬ £¬£¬£¬£¬ÊµÔòÒÑÂäÈëÕ©Æ­ÏÝÚå¡£¡£¡£¡£¡£SikkahBotµÄ½¹µãÍþвÔÚÓÚÆäÀÄÓÃ×°±¸È¨ÏÞµÄÄÜÁ¦¡£¡£¡£¡£¡£ÔÚ»ñÈ¡Óû§ÐÅÈÎºó£¬ £¬£¬ £¬£¬£¬£¬¶ñÒâÈí¼þ»áÇ¿ÖÆÇëÇóÎÞÕϰ­Ð§ÀÍ¡¢¶ÌÐÅ»á¼û¡¢Í¨»°ÖÎÀíµÈ¸ßΣº¦È¨ÏÞ£¬ £¬£¬ £¬£¬£¬£¬ÊµÏÖ¶Ô×°±¸µÄÉî¶È¿ØÖÆ¡£¡£¡£¡£¡£Í¨¹ý×¢²á¶ÌÐżàÌýÆ÷£¬ £¬£¬ £¬£¬£¬£¬Æä¿É×èµ²°üÀ¨"bKash""NAGAD"µÈÒøÐÐÒªº¦´Ê¼°Ìض¨Ð§ÀͺÅÂëµÄ¶ÌÐÅÄÚÈÝ£¬ £¬£¬ £¬£¬£¬£¬²¢ÉÏ´«ÖÁ¹¥»÷Õß¿ØÖƵÄFirebaseЧÀÍÆ÷¡£¡£¡£¡£¡£¸üΣÏÕµÄÊÇ£¬ £¬£¬ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÄÜ×Ô¶¯µÇ¼ÃϼÓÀ­¹úÖ÷Á÷ÒøÐÐÓ¦Ó㬠£¬£¬ £¬£¬£¬£¬Í¨¹ý´ÓC2ЧÀÍÆ÷¼ìË÷PINÂë²¢×Ô¶¯Ìî³äµÇ¼×ֶΣ¬ £¬£¬ £¬£¬£¬£¬Íê³Éδ¾­ÊÚȨµÄתÕ˲Ù×÷¡£¡£¡£¡£¡£


https://securityonline.info/fraudulent-scholarship-apps-a-new-malware-campaign-targets-students-in-bangladesh/