MoneyGramÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏµÍ³ÖÐÖ¹Òý·¢ÆÕ±é¹Ø×¢

Ðû²¼Ê±¼ä 2024-09-26
1. MoneyGramÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏµÍ³ÖÐÖ¹Òý·¢ÆÕ±é¹Ø×¢


9ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬»ã¿î¾ÞÍ·MoneyGram×ÔÉÏÖÜÎåÆðÔâÓöϵͳÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬²¢È·ÈÏÕâÊÇÓÉÍøÂç¹¥»÷ËùÖ¡£¡£¡£Ö»¹Ü´Ëǰ¹«Ë¾½öÌá¼°¡°ÍøÂçÖÐÖ¹¡±£¬£¬£¬£¬£¬£¬£¬Î´Ã÷ȷ˵Ã÷Ôµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬£¬Ö±ÖÁÖÜÒ»²ÅÕýʽͨ¸æÍøÂçÇå¾²ÊÂÎñÊÇÆäϵͳ̱»¾µÄȪԴ¡£¡£¡£MoneyGram×÷ΪȫÇòµÚ¶þ´ó»ã¿îЧÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬£¬ÆäЧÀÍÁýÕÖ200¸ö¹ú¼ÒµÄ350,000¸öÍøµã¼°ÏßÉÏÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬ÄêÉúÒâÁ¿³¬1.2Òڱʡ£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÓû§ÎÞ·¨Íê³ÉÉúÒâ»ò»á¼û×ʽ𣬣¬£¬£¬£¬£¬£¬ÍøÕ¾Ò²ÎÞ·¨Ê¹Ó㬣¬£¬£¬£¬£¬£¬Òý·¢ÁËÆÕ±é¹Ø×¢ºÍµ£ÐÄ¡£¡£¡£¹«Ë¾Ñ¸ËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬½«ÊÜÓ°ÏìµÄϵͳÏÂÏßÒÔ×èÖ¹¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÓëÍⲿר¼ÒºÍÖ´·¨²¿·ÖϸÃÜÏàÖúÒÔ»Ö¸´Ð§ÀÍ¡£¡£¡£MoneyGramÇ¿µ÷Á˶ÔÊÂÎñÑÏÖØÐÔµÄÊìϤ£¬£¬£¬£¬£¬£¬£¬²¢ÔÊÐí¾¡¿ì»Ö¸´ÏµÍ³Õý³£ÔËÐС£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¹ØÓÚϵͳ»Ö¸´µÄÏêϸʱ¼ä±íÉÐδÐû²¼£¬£¬£¬£¬£¬£¬£¬ÌåÏÖ¹¥»÷¿ÉÄÜÈÔÔÚÒ»Á¬»ò»Ö¸´ÊÂÇé´¦ÓÚ³õÆÚ½×¶Î¡£¡£¡£Ö»¹Ü¹¥»÷ÀàÐÍÉÐδ¹ûÕæ£¬£¬£¬£¬£¬£¬£¬µ«³¤Ê±¼äµÄЧÀÍÖÐÖ¹ºÍÅþÁ¬ÎÊÌâÇ¿ÁÒÌåÏÖÕâ¿ÉÄÜÊÇÒ»ÆðÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¼øÓÚMoneyGramÖØ´óµÄÓû§»ù´¡£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÈôÉæ¼°Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬ÆäDZÔÚÓ°Ï콫¼«ÎªÉîÔ¶¡£¡£¡£


https://www.bleepingcomputer.com/news/security/moneygram-confirms-a-cyberattack-is-behind-dayslong-outage/


2. ºÚ¿ÍÒ»ÖÜÄÚµÚÈý´ÎÏ®»÷´÷¶û£¬£¬£¬£¬£¬£¬£¬500MBÃô¸ÐÊý¾ÝÔâй¶


9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¡°grep¡±ÔÙ´ÎÕë¶Ô¿Æ¼¼¾ÞÍ·´÷¶û·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ò»ÖÜÄÚµÚÈý´ÎÔì³ÉÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶ÁËÔ¼500MBµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÄÚ²¿Îĵµ¡¢Í¼Æ¬¡¢²âÊÔÊÓÆµ¼°¶àÖØÉí·ÝÑéÖ¤£¨MFA£©Êý¾Ý¡£¡£¡£´÷¶ûÖÁ½ñδ×ö³öÕýʽ»ØÓ¦£¬£¬£¬£¬£¬£¬£¬¶øºÚ¿Í¡°grep¡±Ôò¹ûÕæÐû³Æ¶Ô´Ë´Îй¶ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖËùÓÐÊý¾Ý¾ùÔ´×Ôµ¥´ÎÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ö»ÊÇÕ½ÂÔÐԵطÖÅúÆØ¹â¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢Öк­¸ÇÁËÄÚ²¿Æ±Îñϵͳϸ½Ú¡¢Öйú»ù´¡ÉèÊ©ÏîÄ¿Îļþ¼°Çå¾²Ïà¹ØÎĵµ£¬£¬£¬£¬£¬£¬£¬Ò»µ©ÕâЩÃô¸ÐÐÅÏ¢±»²»µ±Ê¹Ó㬣¬£¬£¬£¬£¬£¬½«¶Ô´÷¶ûµÄÔËÓªÇå¾²×é³ÉÑÏÖØÍþв¡£¡£¡£2024Äê 9 Ô 19 ÈÕ£¬£¬£¬£¬£¬£¬£¬¡°grep¡±Ð¹Â¶ÁËÁè¼Ý 12,000 Ãû´÷¶ûÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Òý·¢ÁËÄÚ²¿ÊӲ졣¡£¡£¼¸Ììºó£¬£¬£¬£¬£¬£¬£¬¼´ 9 Ô 22 ÈÕ£¬£¬£¬£¬£¬£¬£¬¸ü¶àÃô¸ÐµÄÄÚ²¿Îļþ±»Ð¹Â¶£¬£¬£¬£¬£¬£¬£¬¾Ý³ÆÊÇ´÷¶ûʹÓà Atlassian ¹¤¾ßʱй¶µÄ¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬´÷¶ûÉÐδȷÈÏ´Ë´ÎÊý¾Ýй¶µÄÏêϸӰÏì¹æÄ£¼°ÊÇ·ñÉæ¼°µÚÈý·½Îó²î£¬£¬£¬£¬£¬£¬£¬Ò»ÖÜÄÚ±¬·¢ÈýÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÈËÃǶԴ÷¶ûÍøÂçÇå¾²µÄµ£ÐÄÓëÈÕ¾ãÔö¡£¡£¡£


https://hackread.com/dell-data-leak-in-week-amid-grep-cyberattacks/


3. ÍøÂçÇå¾²Ñо¿Ö°Ô±ÖÒÑÔÐÂÐÍ»ùÓÚRustµÄSplinterºóʹÓù¤¾ß


9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪSplinterµÄÐÂÐͺóʹÓúì¶Ó¹¤¾ß£¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÓÉPalo Alto Networks Unit 42ÔÚ¿Í»§ÏµÍ³ÖÐʶ±ð²¢Ðû²¼¡£¡£¡£SplinterÓÉRustÓïÑÔ±àд£¬£¬£¬£¬£¬£¬£¬Ë书Ч²»ÈçCobalt StrikeµÈ¸ß¼¶¹¤¾ßÖÜÈ«£¬£¬£¬£¬£¬£¬£¬µ«Èç±»ÀÄÓ㬣¬£¬£¬£¬£¬£¬ÈÔ¶Ô×éÖ¯Çå¾²×é³ÉDZÔÚΣº¦¡£¡£¡£¸Ã¹¤¾ßרΪºì¶ÓÐж¯Éè¼Æ£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚʶ±ðÆóÒµÍøÂçÖеÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬µ«Í¬Ñù±£´æ±»¶ñÒâʹÓõÄΣº¦¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÉÐÎÞÖ¤¾ÝÅú×¢SplinterÓëÏêϸÍþвÐÐΪÕßÏà¹ØÁª£¬£¬£¬£¬£¬£¬£¬ÇÒÆäÅÓ¸ÅÂÔ»ýÖ÷Òª¹éÒòÓÚ°üÀ¨µÄRust¿âÊýÄ¿¡£¡£¡£Splinter¾ß±¸¶àÖÖ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÈçÖ´ÐÐWindowsÏÂÁî¡¢Ô¶³ÌÀú³Ì×¢Èë¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ÔÆÐ§ÀÍÕË»§ÐÅÏ¢ÍøÂç¼°×ÔÎÒɾ³ýµÈ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¾ùͨ¹ýÆäÉèÖõÄC2ЧÀÍÆ÷ÎüÊÕʹÃüʵÏÖ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬½üÆÚ»¹ÆØ¹âÁËÆäËû¼¸Öָ߼¶¹¥»÷ÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Èçͨ¹ýMicrosoft Office RPC½Ó¿ÚºÍ¶ñÒâµæÆ¬ÊµÏÖµÄÒþÃØ´úÂë×¢ÈëÓëȨÏÞÌáÉý£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃThread Name-CallingÊÖÒÕÈÆ¹ý¶Ëµã±£»£»£»£»£»¤¾ÙÐÐÀú³Ì×¢Èë¡£¡£¡£ÕâЩ·¢Ã÷Ç¿µ÷ÁËÔÚÍøÂçÇå¾²ÁìÓò¼á³ÖÔ¤·ÀºÍ¼ì²âÄÜÁ¦µÄÖ÷ÒªÐÔ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ·¸·¨·Ö×Ó»áÒ»Ö±½ÓÄÉÐÂÊÖÒÕÍþв×éÖ¯Çå¾²¡£¡£¡£


https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html


4. ÒÆ¶¯ÍøÂç´¹ÂÚÍþв¼¤Ôö£¬£¬£¬£¬£¬£¬£¬82%´¹ÂÚÍøÕ¾Ãé×¼ÒÆ¶¯×°±¸


9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬Ëæ×ÅÒÆ¶¯ÍøÂç´¹ÂÚ¹¥»÷µÄ¼¤Ôö£¬£¬£¬£¬£¬£¬£¬Áè¼Ý°Ë³ÉµÄÍøÂç´¹ÂÚÍøÕ¾ÏÖÒÑרעÓÚÒÆ¶¯×°±¸£¬£¬£¬£¬£¬£¬£¬ÔöÌíÂÊÏÔÖø¡£¡£¡£Çå¾²Ñо¿Õ¹ÏÖ£¬£¬£¬£¬£¬£¬£¬´ó¶¼·¸·¨·Ö×ÓʹÓÃHTTPSЭÒéαװ´¹ÂÚÍøÕ¾Çå¾²£¬£¬£¬£¬£¬£¬£¬ÔöÌíÁËʶ±ðÄѶÈ£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÔÚÒÆ¶¯¶Ë¡£¡£¡£È«Çò¹æÄ£ÄÚ£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ¼°ÆóÒµÌØ¹¤Èí¼þÍþв´ó·ùÔöÌí£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇAndroidƽ̨Îó²îÉÏÉýÏÔÖø¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬ÅþÁ¬²»Çå¾²ÍøÂçµÄ×°±¸¼¤Ôö£¬£¬£¬£¬£¬£¬£¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÎªÒÆ¶¯ÍøÂç´¹ÂÚ¹¥»÷µÄÖØÔÖÇø¡£¡£¡£×¨¼Ò½¨Ò飬£¬£¬£¬£¬£¬£¬ÈçÒ½ÁƱ£½¡×éÖ¯Ó¦½ÓÄÉÁãÐÅÈÎÇ徲ģ×Ó£¬£¬£¬£¬£¬£¬£¬Á¬ÏµAIÇý¶¯µÄÍþвÇ鱨ƽ̨ÒÔÔöÇ¿·ÀÓù¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿ÒÆ¶¯×°±¸ÖÎÀí£¨MDM£©¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©ºÍÃÜÂëÖÎÀíÕ½ÂÔ±»ÊÓΪҪº¦·ÀÓù²½·¥¡£¡£¡£°´ÆÚ¾ÙÐÐÔ±¹¤Çå¾²Åàѵ¡¢Îó²îɨÃ衢Σº¦ÆÀ¹À¼°Çå¾²Éó¼ÆÒ²±Ø²»¿ÉÉÙ¡£¡£¡£Õë¶Ô²àÔØÓ¦ÓóÌÐòµÄÇ徲Σº¦£¬£¬£¬£¬£¬£¬£¬×¨¼ÒÇ¿µ÷ÆäÈÆ¹ý¹Ù·½Éó²é¿ÉÄÜ´øÀ´µÄΣº¦£¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéÆóÒµÖÆ¶©ÑÏ¿áÕþ²ßÏÞÖÆ²àÔØÓ¦ÓÃ×°Ö㬣¬£¬£¬£¬£¬£¬Í¨¹ýMDMϵͳ¿ØÖÆÓ¦ÓÃȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢½ÌÓýÔ±¹¤Ê¶±ðÏà¹ØÎ£º¦¡£¡£¡£


https://securityboulevard.com/2024/09/mobile-phishing-attacks-explode-enterprise-devices-targeted/


5. RAISECOM GatewayÑÏÖØÎó²îCVE-2024-7120±»Æð¾¢Ê¹ÓÃ


9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬RAISECOM Gateway×°±¸½üÆÚÆØ¹âµÄCVE-2024-7120Îó²î£¬£¬£¬£¬£¬£¬£¬ÒÔÆä¼«¸ßµÄCVSSÆÀ·Ö9.8£¬£¬£¬£¬£¬£¬£¬³ÉΪÆóÒµÇå¾²ÁìÓòµÄÒ»´óÒþÓÇ¡£¡£¡£´ËÎó²îÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÊÜÓ°ÏìµÄWeb½çÃælist_base_config.php¾ç±¾Ö´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬£¬£¬Ö±½ÓÍþвµ½°æ±¾3.90µÄMSG1200¡¢MSG2100E¡¢MSG2200¼°MSG2300ÐͺÅ×°±¸µÄÇå¾²£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÑÏÖØµÄÊý¾Ýй¶ºÍϵͳ±»²»·¨ÈëÇÖ¡£¡£¡£Çå¾²½çÒÑÈ·ÈϸÃÎó²îÒ×ÓÚ±»¶ñÒâʹÓ㬣¬£¬£¬£¬£¬£¬ÇÒ×Ô9Ô³õÆð£¬£¬£¬£¬£¬£¬£¬¹¥»÷»î¶¯ÆµÈÔ£¬£¬£¬£¬£¬£¬£¬ÓÚ9ÔÂ12ÈÕÖÁ13ÈÕµÖ´ïá¯Á룬£¬£¬£¬£¬£¬£¬ÏÔʾ³öÍþвÐÐΪÕߵįð¾¢Ì¬ÊÆ¡£¡£¡£ÃæÁÙÕâÒ»½ôÆÈ״̬£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜRAISECOMÉÐδÐû²¼¹Ù·½²¹¶¡£¬£¬£¬£¬£¬£¬£¬µ«ÆóÒµÓ¦Á¬Ã¦½ÓÄɲ½·¥½µµÍΣº¦¡£¡£¡£Ö÷ҪʹÃüÊÇÑÏ¿áÏÞÖÆ¶Ô×°±¸Web½çÃæµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬½öÔÊÐíÊÜÐÅÈεÄÍøÂçºÍÊÚȨְԱ½ÓÈë¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿Web½çÃæµÄÊäÈëÑéÖ¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÊµÑéÑÏ¿áµÄÕûÀí³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÒÔµÖÓùÏÂÁî×¢Èë¹¥»÷¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬°²ÅŸßЧµÄÍøÂç¼à¿ØºÍÈëÇÖ¼ì²âϵͳ£¬£¬£¬£¬£¬£¬£¬ÊµÊ±¼à¿ØÍøÂç»î¶¯£¬£¬£¬£¬£¬£¬£¬ÊµÊ±·¢Ã÷²¢Ó¦¶ÔÈκοÉÒÉÐÐΪ£¬£¬£¬£¬£¬£¬£¬Ò²ÊÇÖÁ¹ØÖ÷ÒªµÄ·À»¤²½·¥¡£¡£¡£


https://securityonline.info/critical-flaw-in-raisecom-gateways-actively-exploited-exposing-thousands-to-remote-attacks/


6. DockerÓëKubernetesÔâÐÂÐͼÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¹¥»÷


9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬Datadog Security Research½ÒÆÆÁËÒ»ÏîÕë¶ÔDockerºÍKubernetesÇéÐεÄÖØ´ó¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÈÝÆ÷±àÅÅÊÖÒÕÖеÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇ̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÉèÖÃÊʵ±Éí·ÝÑéÖ¤µÄDocker API¶Ëµã£¬£¬£¬£¬£¬£¬£¬¾ÙÐдó¹æÄ£¼ÓÃÜÇ®±ÒÍÚ¾ò¡£¡£¡£¹¥»÷Õßͨ¹ýɨÃ蹤¾ßʶ±ðÒ×Êܹ¥»÷µÄÈÝÆ÷£¬£¬£¬£¬£¬£¬£¬°²ÅÅXMRigÍÚ¾òÈí¼þ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óóõʼ»¯¾ç±¾ÏÂÔØÌØÊâ¸ºÔØ¡¢×°ÖÃÊý¾Ý´«Ê乤¾ßºÍÀú³ÌÒþ²Ø³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿Òþ²ØÐÔºÍÈö²¥ÄÜÁ¦¡£¡£¡£´Ë¶ñÒâÈí¼þ²»µ«ÏÞÓÚ¼òµ¥DockerʵÀý£¬£¬£¬£¬£¬£¬£¬»¹Í¨¹ýºáÏòÒÆÏÂÊÖÒÕÈçkube.lateral.shµÈ¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÔÚÔÆ»ù´¡ÉèÊ©ÖÐÆÕ±éÈö²¥£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÕë¶ÔKubernetes¼¯Èº£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃKubelet API°²ÅŸü¶àÍÚ¾òÈÝÆ÷£¬£¬£¬£¬£¬£¬£¬À©´ó¹¥»÷¹æÄ£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃDocker HubÐû²¼¶ñÒâ¾µÏñ£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýʹÓÃDocker SwarmÇéÐΣ¬£¬£¬£¬£¬£¬£¬½«ÊÜѬȾÖ÷»úÄÉÈë½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬£¬ÊµÏÖ¼¯ÖпØÖÆ¡£¡£¡£¸Ã»î¶¯Í¹ÏÔÁËÔÆÇéÐÎÖÐÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇδ±£»£»£»£»£»¤Docker API¶ËµãµÄÑÏÖØÎ£º¦¡£¡£¡£¹¥»÷ÕßʹÓÃÕâЩÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔ¼«Ð¡µÄ×ÌÈÅÔÚÔÆ»ù´¡ÉèÊ©ÖÐѸËÙÀ©É¢£¬£¬£¬£¬£¬£¬£¬Ðγɴó¹æÄ£µÄÂþÑÜʽ¼ÓÃÜÍÚ¾òÍøÂ磬£¬£¬£¬£¬£¬£¬Îª×ÔÉíıȡÀûÒæ¡£¡£¡£ÎªÓ¦¶Ô´ËÀàÍþв£¬£¬£¬£¬£¬£¬£¬ÔÆÖÎÀíÔ±ÐèÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿Çå¾²ÉèÖᣡ£¡£


https://securityonline.info/new-malware-campaign-mines-crypto-in-docker-kubernetes/