APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯

Ðû²¼Ê±¼ä 2025-05-16

1. APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯


5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET×îÐÂÑо¿·¢Ã÷£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹ÓйØÁªµÄÍþв×éÖ¯Õë¶ÔRoundcube¡¢Horde¡¢MDaemonºÍZimbraµÈÖ÷Á÷ÓʼþϵͳʵÑéÁËÃûΪ¡°Operation RoundPress¡±µÄÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯½¹µãÄ¿µÄÊÇÇÔÈ¡ÌØ¶¨ÓÊÏäÕË»§µÄÉñÃØÊý¾Ý£¬£¬£¬£¬£¬£¬Ö÷ÒªÊܺ¦ÕßΪ¶«Å·Õþ¸®»ú¹¹¼°¾ü¹¤ÆóÒµ£¬£¬£¬£¬£¬£¬Í¬Ê±·ÇÖÞ¡¢Å·ÖÞºÍÄÏÃÀÖÞµÄÕþ¸®²¿·ÖÒ²Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½«Æä¹éÒòÓÚ¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT28£¬£¬£¬£¬£¬£¬ÒÀ¾Ý°üÀ¨´¹ÂÚÓʼþ·¢¼þµØµãÖØµþºÍЧÀÍÆ÷ÉèÖÃÊÖ·¨ÏàËÆ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÓʼþϵͳµÄXSSÎó²îÔÚÍøÒ³ÓÊÏä½çÃæÖ´ÐÐí§ÒâJavaScript´úÂë¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬MDaemonµÄXSSÎó²îÔÚ¹¥»÷³õÆÚΪÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ËäºóÐøÒÑÐÞ¸´£¬£¬£¬£¬£¬£¬µ«ÆäʱδÐÞ¸´¡£¡£¡£¡£¡£¡£¡£APT28ͨ¹ýµç×ÓÓʼþ·¢ËÍXSSÎó²îʹÓóÌÐò£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂëÔÚä¯ÀÀÆ÷ÔËÐеÄÍøÒ³ÓÊÏä¿Í»§¶ËÖÐÖ´ÐС£¡£¡£¡£¡£¡£¡£Îó²îʹÓÃÀֳɺ󣬣¬£¬£¬£¬£¬ÃûΪSpyPressµÄ»ìÏýJavaScriptÓÐÓÃÔØºÉ»áÇÔÈ¡ÓÊÏ䯾֤¡¢ÓʼþÄÚÈݺÍÁªÏµÈËÐÅÏ¢£¬£¬£¬£¬£¬£¬²¿·Ö±äÖÖ»¹Äܽ¨ÉèSieve¹æÔò£¬£¬£¬£¬£¬£¬Ò»Á¬×ª·¢ÐÂÓʼþÖÁ¹¥»÷ÕßÓÊÏä¡£¡£¡£¡£¡£¡£¡£ÇÔÈ¡µÄÊý¾Ýͨ¹ýHTTP POSTÇëÇó·¢ËÍÖÁC2ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Ä³Ð©±äÖÖ»¹Äܲ¶»ñµÇ¼¼Í¼¡¢2FA´úÂ룬£¬£¬£¬£¬£¬ÉõÖÁΪMDAEMON½¨ÉèÓ¦ÓÃÃÜÂë¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html


2. Coinbase¿Í»§Êý¾Ýй¶£¬£¬£¬£¬£¬£¬Ô¤¼ÆËðʧ´ï4ÒÚ


5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbaseÅû¶£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÓë¶ñÒâÍâÑó¿Í·þÖ°Ô±ÏàÖúÇÔÈ¡Á˿ͻ§Êý¾Ý£¬£¬£¬£¬£¬£¬²¢Ë÷Òª2000ÍòÃÀÔªÊê½ðÒÔ²»¹ûÕæ±»µÁÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Coinbase¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬µ«ÉèÁ¢2000ÍòÃÀÔª½±Àø»ù½ð£¬£¬£¬£¬£¬£¬ÒÔÃãÀøÌṩÓйع¥»÷ÕßµÄÏßË÷¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÏòCoinbase·¢Ë͵ç×ÓÓʼþÍþвÐû²¼¿Í»§ÕË»§ºÍÄÚ²¿ÎļþÐÅÏ¢£¬£¬£¬£¬£¬£¬CoinbaseÊӲ췢Ã÷¹¥»÷ÕßÔÚÃÀ¹ú¾³Íâ³Ð°üÉÌ»òÖ§³ÖÖ°Ô±µÄ×ÊÖúÏ»ñÈ¡Á˿ͻ§Êý¾Ý£¬£¬£¬£¬£¬£¬ÕâЩְԱÊܹͻá¼ûÄÚ²¿ÏµÍ³£¬£¬£¬£¬£¬£¬Coinbase·¢Ã÷ºóÒÑ¿ª³ýÏà¹ØÖ°Ô±¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÍþвÐÐΪÕßÇÔÈ¡ÁËCoinbaseÔ¼1%¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«ÎÞ·¨»ñÈ¡¿Í»§Ë½Ô¿¡¢ÃÜÂë»ò»á¼ûCoinbase PrimeÕË»§ºÍÇ®°ü¡£¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢µç×ÓÓʼþ¡¢²¿·ÖÉç»á°ü¹ÜºÅ¡¢ÒøÐÐÕ˺ÅÐÅÏ¢¡¢Õþ¸®Éí·Ý֤ͼÏñ¡¢ÕË»§Êý¾Ý¼°ÓÐÏ޵Ĺ«Ë¾Êý¾Ý¡£¡£¡£¡£¡£¡£¡£CoinbaseÇ¿µ÷ûÓÐÃÜÂ롢˽Կ»ò×ʽðй¶£¬£¬£¬£¬£¬£¬²¢½«Åâ³¥±»ÓÕÆ­Ïò¹¥»÷Õß»ã¿îµÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£ËäÈ»²ÆÎñÓ°ÏìÈÔÔÚÆÀ¹ÀÖУ¬£¬£¬£¬£¬£¬µ«CoinbaseÔ¤¼Æµ÷½âºÍ¿Í»§Åâ³¥ÓöȽ«ÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£¡£¡£¡£¡£¡£¡£Îª±ÜÃâδÀ´Î¥¹æÐÐΪ£¬£¬£¬£¬£¬£¬CoinbaseÍýÏ뿪ÉèеÄÖ§³ÖÖÐÐÄÅâ³¥ÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬£¬£¬²¢ÔöÌí¶ÔÄÚ²¿Íþв¼ì²â¡¢Çå¾²ÍþвģÄâºÍ×Ô¶¯ÏìÓ¦µÄͶ×Ê¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/


3. ¶ñÒâNPM°üʹÓÃUnicodeÒþдÊõÀ´Ìӱܼì²â


5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬´úÂëÇå¾²ÆÀ¹À¹«Ë¾Veracode·¢Ã÷£¬£¬£¬£¬£¬£¬Node°ü¹ÜÀíÆ÷Ë÷ÒýÖб£´æÃûΪ¡°os-info-checker-es6¡±µÄ¶ñÒâÈí¼þ°ü£¬£¬£¬£¬£¬£¬¸Ã°ü×Ô±¾Ô³õÒÔÀ´Òѱ»ÏÂÔØÁè¼Ý1000´Î¡£¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ°ü×î³õ°æ±¾ÓÚ3ÔÂ19ÈÕÉÏ´«ÖÁNPM£¬£¬£¬£¬£¬£¬×î³õ¹¦Ð§½öÊÇÍøÂç²Ù×÷ϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬¿´ËÆÎÞº¦¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¼¸Ììºó£¬£¬£¬£¬£¬£¬×÷Õß¶ÔÈí¼þ°ü¾ÙÐÐÁËÐ޸쬣¬£¬£¬£¬£¬Ìí¼ÓÁËÌØ¶¨ÓÚÆ½Ì¨µÄ¶þ½øÖÆÎļþºÍ»ìÏýµÄ×°Öþ籾¡£¡£¡£¡£¡£¡£¡£5ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°üÐû²¼Ð°汾£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓÃÓÚת´ï×îÖÕÓÐÓÃÔØºÉµÄÖØ´óC2£¨ÏÂÁîºÍ¿ØÖÆ£©»úÖÆ´úÂë¡£¡£¡£¡£¡£¡£¡£VeracodeÖÒÑԳƣ¬£¬£¬£¬£¬£¬Ä¿½ñnpmÉÏ¿ÉÓõÄ×îа汾v1.0.8Ϊ¶ñÒâ°æ±¾¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°ü»¹±»ÁÐΪÆäËûËĸöNPMÈí¼þ°üµÄÒÀÀµÏ£¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»ÇåÎúÕâЩÈí¼þ°üÊÇ·ñ»òÔõÑù±»ÍþвÐÐΪÕßÍÆ¹ã¡£¡£¡£¡£¡£¡£¡£ÔÚ¶ñÒâ°æ±¾ÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃUnicodeÒþдÊõ£¬£¬£¬£¬£¬£¬½«Êý¾ÝǶÈë¿´ËÆ¡°|¡±µÄ×Ö·û´®ÖУ¬£¬£¬£¬£¬£¬¶øÊúÏߺóÒþ²ØÁËÒ»³¤´®²»¿É¼ûµÄUnicode×Ö·û£¬£¬£¬£¬£¬£¬ÕâЩ×Ö·ûÓÃÓÚÔö½ø»ùÓÚÎı¾µÄÒþдÊõ¡£¡£¡£¡£¡£¡£¡£Veracodeͨ¹ý½âÂëºÍ·´»ìÏý×Ö·û´®£¬£¬£¬£¬£¬£¬ÕÒµ½ÁËÖØ´óC2»úÖÆµÄÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬¸Ã»úÖÆÒÀÀµGoogleÈÕÀú¶ÌÁ´½ÓµÖ´ïÍйÜ×îÖÕÓÐÓÃÔØºÉµÄλÖᣡ£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ú¹ÊÍÁË´Ó»ñÈ¡GoogleÈÕÀúÁ´½Óµ½×îÖÕ½âÂë»ñÈ¡¶ñÒâÈí¼þÓÐÓÃÔØºÉµÄÕû¸öÀú³Ì£¬£¬£¬£¬£¬£¬²¢Ö¸³ö×îÖÕÓÐÓÃÔØºÉ¿ÉÄܾ­ÓɼÓÃÜ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-npm-package-uses-unicode-steganography-to-evade-detection/


4. Ó¡µÚ°²ÄÉÖÝÕþ¸®ÖÒÑÔ£ºÐ¡ÐÄð³ä¹Ù·½ÓʼþµÄͨÐзÑÕ©Æ­


5ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬Ó¡µÚ°²ÄÉÖÝÕþ¸®»ú¹¹ÓÚÖܶþÏòסÃñ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬ÒªÇóɾ³ýʹÓÃÖÝÕþ¸®¹Ù·½µç×ÓÓʼþµØµã·¢Ë͵ÄÐéαµç×ÓÓʼþ¡£¡£¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚÓʼþÀ´×Ô¶à¸öÖÝÕþ¸®²¿·Ö£¬£¬£¬£¬£¬£¬°üÀ¨¶ùͯЧÀͲ¿¡¢ÈüÂíίԱ»áµÈ£¬£¬£¬£¬£¬£¬ËüÃÇÓÕÆ­ÐԵؼû¸æÊÕ¼þÈ˱£´æÎ´½ÉÄɵÄͨÐзѣ¬£¬£¬£¬£¬£¬²¢ÍþвÈô²»½ÉÄɽ«ÃæÁÙ¾­¼Ã´¦·£»£» £»ò³µÁ¾¹ÒºÅ±»¿ÛÁô¡£¡£¡£¡£¡£¡£¡£Óʼþ×îºó³£ÒÔ¡°Ð»Ð»Äú£¬£¬£¬£¬£¬£¬TxTag ¿Í·þ¡±×÷ΪÊðÃû£¬£¬£¬£¬£¬£¬²¢°üÀ¨ÒÉËÆ¶ñÒâÍøÕ¾µÄÁ´½Ó¡£¡£¡£¡£¡£¡£¡£Ó¡µÚ°²ÄÉÖÝÁìÍÁÇå¾²²¿Í¨¹ýÊÖÒհ칫ÊÒÔÚXƽ̨Ðû²¼ÐÂÎÅ£¬£¬£¬£¬£¬£¬ÌáÐѹ«ÖÚСÐÄ´ËÀàÕ©Æ­¡£¡£¡£¡£¡£¡£¡£ÉùÃ÷Ö¸³ö£¬£¬£¬£¬£¬£¬ÖÝÕþ¸®²»»áͨ¹ý¶ÌÐÅ»òµç×ÓÓʼþ·¢ËÍδ½ÉͨÐзÑ֪ͨ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÊÖÒհ칫ÊÒÕýÓëÉæÊ¹«Ë¾ÏàÖú£¬£¬£¬£¬£¬£¬ÒÔ×èÖ¹ÈκνøÒ»²½µÄͨѶ¡£¡£¡£¡£¡£¡£¡£¾ÝÏàʶ£¬£¬£¬£¬£¬£¬ÖÝÕþ¸®ÓÚÈ¥ÄêÄêµ×ÖÕÖ¹ÁËÓëÒ»¼Òδǩ×Ö¹©Ó¦É̵ÄÌõÔ¼£¬£¬£¬£¬£¬£¬µ«Î´É¾³ý¸ÃÖݵÄÕË»§¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬£¬Ò»Ãû³Ð°üÉ̵ÄÕË»§Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬²¢±»ÓÃÓÚ·¢ËÍÕâЩÐéαÐÅÏ¢£¬£¬£¬£¬£¬£¬¶øÖÝϵͳ²¢Î´·¢Ã÷ÈëÇÖ¼£Ï󡣡£¡£¡£¡£¡£¡£µç×ÓÓʼþ½ØÍ¼ÏÔʾ£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢ÊÇͨ¹ýµ¤·ðÈí¼þ¹«Ë¾GranicusµÄÈí¼þGovDelivery Communications Cloud·Ö·¢µÄ¡£¡£¡£¡£¡£¡£¡£Granicus½²»°ÈËSharon RushenÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ²¢Î´ÉìÕÅÖÁÆä×ÔÉíÆ½Ì¨£¬£¬£¬£¬£¬£¬ÏµÍ³ÊÇÇå¾²µÄ¡£¡£¡£¡£¡£¡£¡£ËýÖ¸³ö£¬£¬£¬£¬£¬£¬ÎÊÌâÔ´ÓÚÖÎÀíÔ±Óû§ÕË»§±»ÈëÇÖ£¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇͨ¹ýÍÆ²âƾ֤»òÉç½»¹¤³ÌÊֶλñÈ¡¡£¡£¡£¡£¡£¡£¡£


https://statescoop.com/indiana-phishing-attack-contractor-hacked/


5. FrigidStealerͨ¹ýÐéαä¯ÀÀÆ÷¸üй¥»÷macOSÓû§


5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬FrigidStealer¶ñÒâÈí¼þÕýͨ¹ýÐéαä¯ÀÀÆ÷¸üÐÂÌáÐѹ¥»÷macOSÓû§£¬£¬£¬£¬£¬£¬¸Ã±äÖÖÓÚ2025Äê2ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬²¢ÒѲ¨¼°±±ÃÀ¡¢Å·ÖÞºÍÑÇÖÞµÄÓû§¡£¡£¡£¡£¡£¡£¡£´Ë¶ñÒâÈí¼þÁ¥ÊôÓÚFerret¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬£¬£¬ÓëTA2726ºÍTA2727²¡¶¾Óйأ¬£¬£¬£¬£¬£¬Á½Õß¾ùÒÔʹÓÃÐéαä¯ÀÀÆ÷¸üÐÂΪ¹¥»÷ÊֶζøÖø³Æ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉSafari¸üеĴÅÅÌÓ³ÏñÎļþ£¨DMG£©£¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§ÏÂÔØ²¢×°Öᣡ£¡£¡£¡£¡£¡£×°ÖÃÀú³ÌÖУ¬£¬£¬£¬£¬£¬Ëü»áÌáÐÑÓû§ÊäÈëÃÜÂ룬£¬£¬£¬£¬£¬´Ó¶øÈƹýAppleµÄGatekeeper±£»£» £»¤»úÖÆ£¬£¬£¬£¬£¬£¬²¢½èÖúÄÚÖõÄAppleScript¹¦Ð§Ö´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬£¬Ëü»áαװ³ÉÒ»¸ö´øÓÐÌØ¶¨bundle IDµÄ¶ñÒâÓ¦Ó㬣¬£¬£¬£¬£¬ÓëÕýµ±Ó¦ÓûìÏýÊÓÌý¡£¡£¡£¡£¡£¡£¡£Ò»µ©¼¤»î£¬£¬£¬£¬£¬£¬FrigidStealer±ã×îÏÈÍøÂçÓû§µÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ä¯ÀÀÆ÷ƾ֤¡¢ÏµÍ³Îļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢¼°Apple NotesµÈ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýmacOSµÄmDNSResponder·ÓɵÄDNSÅÌÎÊ£¬£¬£¬£¬£¬£¬½«ÕâЩÊý¾Ýй¶µ½ÏÂÁîÓë¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ÇÔÈ¡Êý¾Ýºó£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»á×ÔÎÒÖÕÖ¹£¬£¬£¬£¬£¬£¬ÒÔ½µµÍ±»·¢Ã÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£¾Ý¿ªÔ´ÍøÂçÇå¾²¹«Ë¾WazuhÅû¶£¬£¬£¬£¬£¬£¬FrigidStealer²¢²»ÒÀÀµ¹Å°åµÄÎó²îʹÓù¤¾ß°ü»òÎó²î£¬£¬£¬£¬£¬£¬¶øÊÇʹÓÃÓû§¶Ôϵͳ֪ͨºÍä¯ÀÀÆ÷¸üÐÂÌáÐѵÄÐÅÈξÙÐй¥»÷£¬£¬£¬£¬£¬£¬ÕâʹµÃËü¸üΪΣÏÕÇÒÓÐÓᣡ£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃmacOSÌØÓеÄÐÐΪÀ´¼á³Ö³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬Í¨¹ý×¢²áΪǰ̨ӦÓóÌÐòµÈ·½·¨Óëϵͳ½»»¥£¬£¬£¬£¬£¬£¬²¢ÔÚÖ´Ðкóɾ³ý×ÔÉíºÛ¼££¬£¬£¬£¬£¬£¬ÒÔ¼á³ÖÒþ²Ø¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/frigidstealer-malware-macos-fake-safari-browser-update/


6. ÕÐÆ¸Æ½Ì¨HireClick570Íò·Ý¼òÀúÔâй¶


5ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬CybernewsÑо¿Ö°Ô±¿ËÈÕ·¢Ã÷Ò»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ÈªÔ´Ö¸ÏòÃæÏòÖÐСÐÍÆóÒµµÄÕÐÆ¸Æ½Ì¨HireClick¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÑÇÂíÑ·AWS S3´æ´¢Í°ÉèÖùýʧ£¬£¬£¬£¬£¬£¬¸Ãƽ̨Áè¼Ý570Íò·ÝÎļþ±»Ì»Â¶ÔÚ»¥ÁªÍøÉÏ£¬£¬£¬£¬£¬£¬ÆäÖÐÖ÷ÒªÊÇÇóÖ°ÕߵļòÀú£¬£¬£¬£¬£¬£¬ÕâЩÎļþй¶ÁËÇóÖ°ÕßµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°¾ÍÒµÐÅÏ¢µÈÃô¸ÐºÍ˽ÈËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶¶ÔHireClick¿Í»§µÄÓ°ÏìÉîÔ¶¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÒ»µ©ÂäÈë²»·¨·Ö×ÓÖ®ÊÖ£¬£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢Ã°³ä¡¢ÍøÂç´¹ÂڵȶàÖÖÕ©Æ­»î¶¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄٰܼçÕÐÆ¸Ë¾Àí£¬£¬£¬£¬£¬£¬Ê¹ÓÃй¶µÄÐÅÏ¢ÓÕÆ­ÇóÖ°ÕßÌṩÉí·Ý֤ɨÃè¼þ¡¢Éç»áÇå¾²ºÅÂëÉõÖÁÒøÐÐÐÅÏ¢£¬£¬£¬£¬£¬£¬»òͨ¹ýµç»°ÓÕÆ­ÇóÖ°ÕßÍ¸Â¶ÒøÐÐÐÅÏ¢»ò×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Õ©Æ­Õß»¹¿ÉʹÓÃй¶µÄ¼òÀú½¨ÉèÐéαÉí·Ý¾ÙÐоÍÒµÑéÖ¤Õ©Æ­£¬£¬£¬£¬£¬£¬ÉõÖÁð³äÇóÖ°Õß½øÈëÊÂÇ鳡ºÏϵͳ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÊý¾Ýй¶ÐÐΪµÄΣº¦²»µ«ÏÞÓÚÊý¾Ý͵ÇÔ×Ô¼º£¬£¬£¬£¬£¬£¬»¹¿ÉÄÜÒý·¢ÍøÂçÈËÈâËÑË÷£¬£¬£¬£¬£¬£¬¼´¶ñÒâÆØ¹â˽ÈËÐÅÏ¢ÒÔɧÈÅ»òÏÅ»£ËûÈË¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÕÆÎÕÁËÊܺ¦ÕßµÄÈ«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÏÖʵµØµã£¬£¬£¬£¬£¬£¬¾ÍÄÜÈÝÒ×Ëø¶¨²¢É§ÈÅÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/hireclick-resume-database-data-leak/