SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬ £¬£¬£¬£¬¶ñÒâÈí¼þDZÔÚ½üÈýÄê

Ðû²¼Ê±¼ä 2025-05-21

1. SK Telecom 2700ÍòÓû§Êý¾Ýй¶£¬ £¬£¬£¬£¬¶ñÒâÈí¼þDZÔÚ½üÈýÄê


5ÔÂ20ÈÕ£¬ £¬£¬£¬£¬SK TelecomÊǺ«¹ú×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ£¬ £¬£¬£¬£¬Õ¼ÓÐÔ¼Ò»°ëÊг¡·Ý¶î¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾¿ËÈÕÅû¶£¬ £¬£¬£¬£¬2025Äê4ÔÂ19ÈÕÔÚÆäÍøÂçÉϼì²âµ½¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬²¢¸ôÀëÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£¡£¡£ ¡£¡£´Ë´ÎÊÂÎñ×îÔç¿É×·ËÝÖÁ2022Ä꣬ £¬£¬£¬£¬×îÖÕµ¼ÖÂ2700ÍòÓû§µÄUSIMÊý¾Ýй¶¡£¡£¡£ ¡£¡£¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨IMSI¡¢USIMÈÏÖ¤ÃÜÔ¿¡¢ÍøÂçʹÓÃÊý¾Ý¼°´æ´¢ÔÚSIM¿¨ÖеĶÌÐźÍÁªÏµÈ˵ÈÊý¾Ý£¬ £¬£¬£¬£¬ÔöÌíÁËSIM¿¨½»Á÷¹¥»÷µÄΣº¦¡£¡£¡£ ¡£¡£Îª´Ë£¬ £¬£¬£¬£¬SK Telecom¾öÒéΪËùÓÐÓû§·¢·ÅSIM¿¨Ìæ»»¼þ£¬ £¬£¬£¬£¬²¢ÔöÇ¿Çå¾²²½·¥ÒÔ±ÜÃâδ¾­ÊÚȨµÄºÅÂëÒÆÖ²¡£¡£¡£ ¡£¡£2025Äê5ÔÂ8ÈÕ£¬ £¬£¬£¬£¬Õþ¸®Î¯Ô±»áÐû²¼¶ñÒâÈí¼þѬȾΣ¼°25ÖÖÊý¾ÝÀàÐÍ¡£¡£¡£ ¡£¡£ÆäʱSK TelecomÐû²¼×èÖ¹½ÓÊÜÐÂÓû§ÒÔÓ¦¶ÔЧ¹û¡£¡£¡£ ¡£¡£SK Telecom×îÐÂÐÂÎųƽ«ºÜ¿ì֪ͨ2695ÍòÊÜÓ°ÏìµÄ¿Í»§ÆäÃô¸ÐÊý¾Ýй¶¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾Ìáµ½ÔÚ23̨ÊÜѬȾЧÀÍÆ÷Öз¢Ã÷25ÖÖ²î±ð¶ñÒâÈí¼þÀàÐÍ£¬ £¬£¬£¬£¬ÈëÇÖˮƽÁè¼Ý×î³õÔ¤ÆÚ¡£¡£¡£ ¡£¡£Óë´Ëͬʱ£¬ £¬£¬£¬£¬¹«Ë½ÁªºÏÊÓ²ìС×é¶ÔSK TelecomµÄ30000̨LinuxЧÀÍÆ÷¼ì²éºó³Æ£¬ £¬£¬£¬£¬×î³õWeb ShellѬȾ±¬·¢ÔÚ2022Äê6ÔÂ15ÈÕ£¬ £¬£¬£¬£¬Òâζ×ŶñÒâÈí¼þÔÚ½üÈýÄêʱ¼äÀïδ±»·¢Ã÷£¬ £¬£¬£¬£¬¹¥»÷ÕßÔÚ23̨ЧÀÍÆ÷ÉÏÖ²Èë¶à¸öÓÐÓÃÔØºÉ¡£¡£¡£ ¡£¡£ÊÓ²ìÉù³Æ15̨ÊÜѬȾЧÀÍÆ÷º¬Ð¡ÎÒ˽¼Ò¿Í»§ÐÅÏ¢£¬ £¬£¬£¬£¬°üÀ¨291831¸öIMEIºÅÂ룬 £¬£¬£¬£¬µ«SK Telecom·ñ¶¨¡£¡£¡£ ¡£¡£ÊÓ²ìС×黹ָ³ö£¬ £¬£¬£¬£¬SK TelecomÓÚ2024Äê12ÔÂ3ÈÕ²Å×îÏȼͼÊÜÓ°ÏìЧÀÍÆ÷»î¶¯£¬ £¬£¬£¬£¬Òò´Ë´Ëǰ¿ÉÄܱ¬·¢µÄÊý¾Ýй¶ÎÞ·¨±»¼ì²âµ½¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/


2. Hazy HawkÍÅ»ïʹÓÃDNSÉèÖùýÊ§Ð®ÖÆÊÜÐÅÈÎÓòÃû


5ÔÂ20ÈÕ£¬ £¬£¬£¬£¬±»×·×ÙΪ¡°Hazy Hawk¡±µÄÍþвÐÐΪÕßÕýʹÓñ»ÒÅÍüµÄDNS CNAME¼Í¼ʵÑéÍøÂç¹¥»÷¡£¡£¡£ ¡£¡£¸ÃÍþвÐÐΪÕßÐ®ÖÆÖ¸Ïò·ÅÆúÔÆÐ§À͵ÄCNAME¼Í¼£¬ £¬£¬£¬£¬½ÓÊÜÕþ¸®¡¢´óѧºÍ²Æ²ú500Ç¿¹«Ë¾µÈ»ú¹¹µÄÊÜÐÅÈÎ×ÓÓò£¬ £¬£¬£¬£¬ÓÃÓÚ·Ö·¢Õ©Æ­¡¢ÐéαӦÓóÌÐòºÍ¶ñÒâ¹ã¸æ¡£¡£¡£ ¡£¡£InfobloxÑо¿Ö°Ô±Ö¸³ö£¬ £¬£¬£¬£¬Hazy HawkÊ×ÏÈɨÃèCNAME¼Í¼ָÏò·ÅÆúÔÆ¶ËµãµÄÓò£¬ £¬£¬£¬£¬²¢Í¨¹ý±»¶¯DNSÊý¾ÝÑé֤ȷ¶¨ÕâЩÓò£¬ £¬£¬£¬£¬È»ºó×¢²áÓë·ÅÆúCNAMEÖÐÃû³ÆÏàͬµÄÐÂÔÆ×ÊÔ´£¬ £¬£¬£¬£¬Ê¹Ô­Ê¼ÓòµÄ×ÓÓòÆÊÎöµ½ÍþвÐÐΪÕßµÄÐÂÔÆÍйÜÕ¾µã¡£¡£¡£ ¡£¡£½èÖúÕâÒ»ÊÖÒÕ£¬ £¬£¬£¬£¬Hazy HawkÐ®ÖÆÁ˶à¸ö×ÅÃûÓòÃû£¬ £¬£¬£¬£¬ÈçÃÀ¹ú¼²²¡¿ØÖÆÓëÔ¤·ÀÖÐÐĵÄcdc.gov¡¢¿ç¹úÆóÒµ¼¯ÍÅhoneywell.comµÈ¡£¡£¡£ ¡£¡£¿£¿£¿ØÖÆ×ÓÓòÃûºó£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßÌìÉúÊý°Ù¸ö¶ñÒâURL£¬ £¬£¬£¬£¬Òò¸¸ÓòÃûÐÅÈζȸߣ¬ £¬£¬£¬£¬ÕâЩURLÔÚËÑË÷ÒýÇæÖп´ËÆÕýµ±¡£¡£¡£ ¡£¡£Êܺ¦Õßµã»÷URLºó£¬ £¬£¬£¬£¬»á±»Öض¨Ïòµ½¶à²ãÓòÃûºÍTDS»ù´¡ÉèÊ©£¬ £¬£¬£¬£¬ÕâЩÉèÊ©»áƾ֤װ±¸ÀàÐÍ¡¢IPµØµãµÈÐÅÏ¢ÆÊÎöÊܺ¦ÕßÉí·Ý¡£¡£¡£ ¡£¡£Infoblox±¨¸æ³Æ£¬ £¬£¬£¬£¬ÕâÐ©ÍøÕ¾±»ÓÃÓÚÊÖÒÕÖ§³ÖÕ©Æ­¡¢Ðéα·À²¡¶¾¾¯±¨¡¢ÐéαÁ÷ýÌå/É«ÇéÍøÕ¾ºÍÍøÂç´¹ÂÚÒ³Ãæ¡£¡£¡£ ¡£¡£±ðµÄ£¬ £¬£¬£¬£¬ÊÜÆ­Óû§×ÝÈ»ÍÑÀëÕ©Æ­ÍøÕ¾£¬ £¬£¬£¬£¬ÈÔ»áÒòÔÊÐíä¯ÀÀÆ÷ÍÆËÍ֪ͨ¶øÊÕµ½Ò»Á¬¾¯±¨£¬ £¬£¬£¬£¬ÎªHazy Hawk´øÀ´¿É¹ÛÊÕÈë¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/hazy-hawk-gang-exploits-dns-misconfigs-to-hijack-trusted-domains/


3. RVToolsÔâÓö¹©Ó¦Á´¹¥»÷£¬ £¬£¬£¬£¬Èö²¥Bumblebee¶ñÒâÈí¼þ


5ÔÂ20ÈÕ£¬ £¬£¬£¬£¬¿ËÈÕ£¬ £¬£¬£¬£¬RVTools VMwareÖÎÀí¹¤¾ßÔâÓö¹©Ó¦Á´¹¥»÷£¬ £¬£¬£¬£¬¸Ã¹¤¾ß×î³õÓÉRobware¿ª·¢£¬ £¬£¬£¬£¬ÏÖ¹é´÷¶ûËùÓУ¬ £¬£¬£¬£¬ÊÇVMwareÖÎÀíÔ±³£Óù¤¾ß¡£¡£¡£ ¡£¡£¹¥»÷ÊÂÎñÒý·¢ÆÕ±é¹Ø×¢£¬ £¬£¬£¬£¬´÷¶ûÓÚ2025Äê5ÔÂ20ÈÕÐû²¼ÉùÃ÷£¬ £¬£¬£¬£¬³Æ¶ñÒâRVTools×°ÖóÌÐò²¢·Ç´ÓÆä¹Ù·½ÍøÕ¾·Ö·¢£¬ £¬£¬£¬£¬¶øÊÇÀ´×ÔÐéαÓòÃû£¬ £¬£¬£¬£¬Í¬Ê±ÆäÖÎÀíµÄRobware.netºÍRVTools.comÍøÕ¾ÒòÔâÊÜDDoS¹¥»÷¶øÏÂÏß¡£¡£¡£ ¡£¡£´Ëǰ£¬ £¬£¬£¬£¬ZeroDay LabsÑо¿Ô±Aidan LeonÔÚRedditÉÏ·¢Ìû³Æ£¬ £¬£¬£¬£¬´ÓRVToolsÍøÕ¾ÏÂÔØµÄÎļþ±»Ö²ÈëBumblebee¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬ £¬£¬£¬£¬Îļþ¹þÏ£ÖµÓëÏÖʵÏÂÔØµÄ²»Æ¥Å䣬 £¬£¬£¬£¬ÏÂÔØ°æ±¾ÏÔןü´óÇÒ°üÀ¨¶ñÒâÎļþ¡£¡£¡£ ¡£¡£¾­½øÒ»³ÌÐò²é£¬ £¬£¬£¬£¬ÕâÒ»¹¥»÷ÐÐΪ±»Ö¤Êµ¡£¡£¡£ ¡£¡£BumblebeeÊÇÒ»ÖÖͨ¹ýSEOÖж¾¡¢¶ñÒâ¹ã¸æºÍÍøÂç´¹ÂÚ¹¥»÷ÍÆ¹ãµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬ £¬£¬£¬£¬×°Öúó»áÔÚÊÜѬȾװ±¸ÉÏÏÂÔØ²¢Ö´ÐÐÆäËû¶ñÒâÓÐÓøºÔØ£¬ £¬£¬£¬£¬ÈçCobalt StrikeÐűꡢÐÅÏ¢ÇÔÈ¡³ÌÐòºÍÀÕË÷Èí¼þµÈ£¬ £¬£¬£¬£¬ÇÒÓëContiÀÕË÷Èí¼þÐж¯ÓйØ¡£¡£¡£ ¡£¡£ÍøÂçÇå¾²¹«Ë¾Arctic WolfÒ²±¨¸æ·¢Ã÷±»Ä¾ÂíѬȾµÄRVTools×°ÖóÌÐòͨ¹ý¶ñÒâÓòÃûÇÀ×¢Èö²¥£¬ £¬£¬£¬£¬¸ÃÓòÃûÓëÕýµ±ÓòÃûÏàËÆ£¬ £¬£¬£¬£¬½ö¶¥¼¶ÓòÃû²î±ð¡£¡£¡£ ¡£¡£±ðµÄ£¬ £¬£¬£¬£¬ÉÐÓÐÕë¶ÔRVToolsÆ·ÅÆµÄSEOÖж¾ºÍ¶ñÒâ¹ã¸æ»î¶¯£¬ £¬£¬£¬£¬Ö¼ÔÚÓÕÆ­Óû§ÏÂÔØ¶ñÒâ×°ÖóÌÐò¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/rvtools-hit-in-supply-chain-attack-to-deliver-bumblebee-malware/


4. ¶íº¥¶íÖÝ¿­ÌØÁÕ¿µ½¡ÖÐÐÄÔâÍøÂç¹¥»÷µ¼ÖÂϵͳÖÐÖ¹


5ÔÂ21ÈÕ£¬ £¬£¬£¬£¬¶íº¥¶íÖÝ¿­ÌØÁÕ¿µ½¡ÖÐÐÄÆìÏÂÒ½ÔºÓëÒ½ÁÆÉèÊ©¿ËÈÕÔâÊÜÍøÂç¹¥»÷£¬ £¬£¬£¬£¬µ¼ÖÂȫϵͳÊÖÒÕÖÐÖ¹¡£¡£¡£ ¡£¡£¿£¿£¿­ÌØÁÕ¿µ½¡ÖÐÐÄ×Ô³ÆÊÇÒ»¸ö»ùÓÚÐÅÑöµÄ»ù¶½¸´ÁÙЪϢÈÕ»áϵͳ£¬ £¬£¬£¬£¬Ö÷ÒªÔÚ´ú¶ÙµØÇøÔËÓª¶à¸öÒ½ÁÆÖÐÐĺÍÕïËù£¬ £¬£¬£¬£¬Ã¿Äê´¦Öóͷ£´ó×Ú¼±ÕïÊÒ¾ÍÕï¡£¡£¡£ ¡£¡£¸Ã·ÇÓªÀûÐÔÒ½ÔºÍøÂç½²»°ÈËÌåÏÖ£¬ £¬£¬£¬£¬ÏÖÔÚÕýÔÚÂÄÀúÒòδ¾­ÊÚȨ»á¼û¶øÒý·¢µÄÍøÂçÇå¾²ÊÂÎñ£¬ £¬£¬£¬£¬ÊÂÎñʼÓÚÖܶþÔçÉÏ£¬ £¬£¬£¬£¬ÏÞÖÆÁËÊÂÇéÖ°Ô±»á¼û²¿·Ö»¼ÕßÕչ˻¤Ê¿ÏµÍ³µÄÄÜÁ¦¡£¡£¡£ ¡£¡£¿£¿£¿­ÌØÁÕÒ½ÁÆÖÐÐÄÒѽÓÄɲ½·¥×èÖ¹»ººÍ½â´ËÀà»î¶¯£¬ £¬£¬£¬£¬²¢Æð¾¢ÊÓ²ìºÍ¼à²âÇéÐΣ¬ £¬£¬£¬£¬Í¬Ê±×÷·Ï²¢ÖØÐ°²ÅÅÁËÖܶþµÄסԺºÍÃÅÕïÔñÆÚÊÖÊõ¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷»¹µ¼Ö¸ÃÒ½ÔºÍøÂçµÄºô½ÐÖÐÐÄ̱»¾¡£¡£¡£ ¡£¡£²»¹ý£¬ £¬£¬£¬£¬ËùÓм±ÕïÊÒºÍÕïËùÈÔ¼á³Ö¿ª·Å£¬ £¬£¬£¬£¬¼ÌÐø½ÓÊÜ»¼ÕßÕïÖΡ£¡£¡£ ¡£¡£½²»°ÈËδ¾ÍÒ½ÔºÍøÂçÊÇ·ñÔâÊÜÀÕË÷Èí¼þ¹¥»÷µÄÎÊÌâ×÷³ö»ØÓ¦£¬ £¬£¬£¬£¬µ«¾ÝCNN±¨µÀ£¬ £¬£¬£¬£¬Ò½ÔºÍøÂçITÊÂÇéÖ°Ô±·¢Ã÷Ò»ÕžݳÆÀ´×ÔInterlockÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£¡£ ¡£¡£¸ÃÍÅ»ïÉϸöÔÂÔø¹Ø±Õ͸ÎöÖÎÁƹ«Ë¾DaVitaµÄÍøÂ磬 £¬£¬£¬£¬´Ëǰ»¹¹¥»÷¹ýµÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ¡£¡£¡£ ¡£¡£


https://therecord.media/kettering-health-system-ohio-cyberattack


5. CellcomÈ·ÈÏÍøÂç¹¥»÷ÊÇÔìÉú³¤Ê±¼äÖÐÖ¹µÄÔµ¹ÊÔ­ÓÉ


5ÔÂ20ÈÕ£¬ £¬£¬£¬£¬Íþ˹¿µÐÇÖÝÎÞÏßЧÀÍÌṩÉÌCellcomÒÑÈ·ÈÏ£¬ £¬£¬£¬£¬2025Äê5ÔÂ14ÈÕÍí×îÏȵĴóÃæ»ýЧÀÍÖÐÖ¹ÊÇÓÉÍøÂç¹¥»÷µ¼ÖµÄ¡£¡£¡£ ¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁËÍþ˹¿µÐÇÖݺÍÃÜЪ¸ùÖݱ±²¿µØÇøµÄ¿Í»§£¬ £¬£¬£¬£¬µ¼ÖÂËûÃǵÄÓïÒôºÍ¶ÌÐÅЧÀÍÖÐÖ¹£¬ £¬£¬£¬£¬ÎÞ·¨²¦´òµç»°»ò·¢ËͶÌÐÅ¡£¡£¡£ ¡£¡£CellcomÊ×ϯִÐйÙBrighid RiordanÔÚ¿ËÈÕ֤ʵÁËÍøÂç¹¥»÷µÄÊÂʵ£¬ £¬£¬£¬£¬²¢ÌåÏÖ¹«Ë¾ÒÑÖÆ¶©Ó¦¶Ô´ËÀàÇéÐεĹæ³ÌºÍÍýÏë¡£¡£¡£ ¡£¡£ÊÂÎñ±¬·¢ºó£¬ £¬£¬£¬£¬CellcomÑÏ¿á×ñÕÕÍýÏ룬 £¬£¬£¬£¬°üÀ¨Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼Ò¡¢Í¨ÖªÁª°îÊÓ²ì¾ÖºÍÍþ˹¿µÐÇÖݹÙÔ±£¬ £¬£¬£¬£¬²¢È«Á¦ÒÔ¸°È·±£ÏµÍ³Çå¾²»Ö¸´ÉÏÏß¡£¡£¡£ ¡£¡£CellcomÇ¿µ÷£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÔÚ¹«Ë¾ÍøÂçµÄÒ»¸öÇøÓò£¬ £¬£¬£¬£¬Óë´æ´¢Óû§Ãô¸ÐÐÅÏ¢µÄÇøÓò²î±ð£¬ £¬£¬£¬£¬ÇÒûÓÐÖ¤¾ÝÅú×¢Óû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Êܵ½Ó°Ïì¡£¡£¡£ ¡£¡£×î³õ£¬ £¬£¬£¬£¬CellcomÉù³ÆÖÐÖ¹ÊÇÓÉÊÖÒÕÎÊÌâÒýÆðµÄ£¬ £¬£¬£¬£¬²¢ÌåÏÖ²¿·ÖÊý¾ÝЧÀÍÈÔÔÚÔËÐС£¡£¡£ ¡£¡£È»¶ø£¬ £¬£¬£¬£¬ÓÉÓÚÆ½Ì¨·ºÆðÎÊÌ⣬ £¬£¬£¬£¬Óû§¶ÔЧÀÍÖÐÖ¹ºÍÎÞ·¨ÒÆÖ²ºÅÂë¸ÐÓ¦¾ÚÉ¥¡£¡£¡£ ¡£¡£5ÔÂ19ÈÕ£¬ £¬£¬£¬£¬Cellcom×îÏȻָ´²¿·ÖЧÀÍ£¬ £¬£¬£¬£¬°üÀ¨¶ÌÐÅÒÔ¼°²¦´òºÍ½ÓÌýÆäËûCellcomÓû§µÄµç»°¡£¡£¡£ ¡£¡£Ö»¹ÜÎÞ·¨°ü¹ÜºÎʱÖÜÈ«»Ö¸´Ð§ÀÍ£¬ £¬£¬£¬£¬µ«¹«Ë¾ÕýÆð¾¢ÔÚ±¾ÖÜĩǰʵÏÖÕâһĿµÄ¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/mobile-carrier-cellcom-confirms-cyberattack-behind-extended-outages/


6. SideWinder APT×éÖ¯¾«×¼¹¥»÷ÄÏÑǶà¹úÕþ¸®»ú¹¹


5ÔÂ20ÈÕ£¬ £¬£¬£¬£¬Ë¹ÀïÀ¼¿¨¡¢ÃϼÓÀ­¹úÓë°Í»ù˹̹µÄ¸ß¼¶±ðÕþ¸®»ú¹¹½üÆÚ³ÉΪAPT×éÖ¯SideWinderÐÂÒ»ÂÖ¹¥»÷µÄÖØµã¡£¡£¡£ ¡£¡£¹¥»÷ÕßÔËÓÃÓã²æÊ½´¹ÂÚÓʼþÁ¬ÏµµØÀíΧÀ¸ÊÖÒÕ£¬ £¬£¬£¬£¬È·±£¶ñÒâÔØºÉ½öÕë¶ÔÌØ¶¨¹ú¼ÒÄ¿µÄ¡£¡£¡£ ¡£¡£¹¥»÷Á´Í¨¹ýÓÕ¶üÎĵµ¼¤»î£¬ £¬£¬£¬£¬×îÖÕ°²ÅÅStealerBot¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬ÊÖ·¨ÓëSideWinder´Ëǰ»î¶¯ÌØÕ÷Ïà·û¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷Ãé×¼ÄÏÑǶà¹úÒªº¦²¿·Ö£¬ £¬£¬£¬£¬ÈçÃϼÓÀ­¹úµçÐÅî¿ÏµÎ¯Ô±»á¡¢¹ú·À²¿¡¢²ÆÎñ²¿£¬ £¬£¬£¬£¬°Í»ù˹̹±¾ÍÁÊÖÒÕÉú³¤¾Ö£¬ £¬£¬£¬£¬ÒÔ¼°Ë¹ÀïÀ¼¿¨ÍâÕ®ÖÎÀí¾Ö¡¢¹ú·À²¿¡¢ÖÐÑëÒøÐеÈ¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃ΢ÈíOfficeÖеÄÀúÊ·Îó²îCVE-2017-0199ÓëCVE-2017-11882×÷Ϊ³õʼ¹¥»÷ǰÑÔ£¬ £¬£¬£¬£¬°²Åž߱¸³¤ÆÚ»¯»á¼ûÄÜÁ¦µÄ¶ñÒâ³ÌÐò¡£¡£¡£ ¡£¡£¶ñÒâÎĵµ´¥·¢CVE-2017-0199Îó²îºó£¬ £¬£¬£¬£¬Í¨¹ýDLL²àÔØÊÖÒÕÊͷźóÐøÔØºÉ£¬ £¬£¬£¬£¬¶øµØÀíΧÀ¸ÊÖÒÕÔòÈ·±£½öÔ¤Éè¹ú¼Ò¹æÄ£ÄÚµÄÊܺ¦Õß»áÊÕµ½ÏÖʵ¶ñÒâRTFÎļþ£¬ £¬£¬£¬£¬¸ÃÎļþʹÓù«Ê½±à¼­Æ÷Îó²îCVE-2017-11882´¥·¢ÄÚ´æÆÆË𣬠£¬£¬£¬£¬Ö´ÐлùÓÚshellcodeµÄ¼ÓÔØÆ÷ÒÔÔËÐÐStealerBot¡£¡£¡£ ¡£¡£StealerBot×÷ΪÄ£¿£¿£¿é»¯Ö²Èë³ÌÐò£¬ £¬£¬£¬£¬Äܹ»ÇÔÈ¡ÆÁÄ»½ØÍ¼¡¢¼üÅ̼ͼ¡¢ÃÜÂë¡¢ÎļþµÈÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£¡£


https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html