DragonForceÀÕË÷Èí¼þ½èSimpleHelpÎó²î¹¥ÆÆMSP
Ðû²¼Ê±¼ä 2025-05-281. DragonForceÀÕË÷Èí¼þ½èSimpleHelpÎó²î¹¥ÆÆMSP
5ÔÂ27ÈÕ£¬£¬£¬£¬DragonForceÀÕË÷Èí¼þÍÅ»ïÀֳɹ¥ÆÆÒ»¼ÒÍйÜЧÀÍÌṩÉÌ£¬£¬£¬£¬²¢Ê¹ÓÃÆäSimpleHelpÔ¶³Ì¼à¿ØºÍÖÎÀí£¨RMM£©Æ½Ì¨ÊµÑéÁËһϵÁжñÒâ»î¶¯¡£¡£¡£Sophos¹«Ë¾ÊÜÃüÊÓ²ì´Ë´Î¹¥»÷£¬£¬£¬£¬·¢Ã÷ÍþвÐÐΪÕßʹÓÃÁËSimpleHelpµÄ½Ï¾ÉÎó²î£¬£¬£¬£¬°üÀ¨CVE-2024-57727¡¢CVE-2024-57728ºÍCVE-2024-57726£¬£¬£¬£¬À´ÆÆËðϵͳ¡£¡£¡£SimpleHelp×÷ΪһÖÖÉÌÒµÔ¶³ÌÖ§³ÖºÍ»á¼û¹¤¾ß£¬£¬£¬£¬³£±»MSPÓÃÓÚÖÎÀíϵͳºÍ°²ÅÅÈí¼þ£¬£¬£¬£¬´Ë´ÎÈ´³ÉΪ¹¥»÷ÕßµÄʹÓù¤¾ß¡£¡£¡£¹¥»÷ÕßÊ×ÏÈʹÓÃSimpleHelp¶Ô¿Í»§ÏµÍ³¾ÙÐÐÕì̽£¬£¬£¬£¬ÍøÂç×°±¸Ãû³Æ¡¢ÉèÖá¢Óû§ºÍÍøÂçÅþÁ¬µÈÐÅÏ¢¡£¡£¡£Ëæºó£¬£¬£¬£¬ËûÃÇÊÔͼÇÔÈ¡Êý¾Ý²¢ÔÚ¿Í»§ÍøÂçÉϰ²ÅżÓÃÜÆ÷£¬£¬£¬£¬²¿·ÖÍøÂçÒòʹÓÃSophos¶Ëµã±£»£»£»£»£»¤¶ø×èµ²ÏàʶÃÜÆ÷£¬£¬£¬£¬µ«ÆäËû¿Í»§Ôò²»ÐÒÖÐÕУ¬£¬£¬£¬×°±¸±»¼ÓÃÜ£¬£¬£¬£¬Êý¾Ý±»ÇÔÈ¡£¬£¬£¬£¬²¢ÓÃÓÚË«ÖØÀÕË÷¹¥»÷¡£¡£¡£SophosÒÑ·ÖÏíÓë´Ë´Î¹¥»÷Ïà¹ØµÄIOC£¬£¬£¬£¬ÒÔ×ÊÖú×éÖ¯ÔöÇ¿ÍøÂç·À»¤¡£¡£¡£ºã¾ÃÒÔÀ´£¬£¬£¬£¬ÍйÜЧÀÍÌṩÉÌÒ»Ö±ÊÇÀÕË÷Èí¼þÍÅ»ïµÄÖØµã¹¥»÷Ä¿µÄ£¬£¬£¬£¬ÒòÒ»´ÎÈëÇÖ¿ÉÄܵ¼Ö¶à¼Ò¹«Ë¾ÊÜË𡣡£¡£Ò»Ð©ÀÕË÷Èí¼þͬÃËרÃÅÑо¿MSP³£Óù¤¾ß£¬£¬£¬£¬ÈçSimpleHelp£¬£¬£¬£¬Õâµ¼ÖÂÁËÈçREvil¶ÔKaseyaµÄ´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷µÈɱ¾øÐÔÊÂÎñ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/
2. ¶íÂÞË¹ÍøÂçÌØ¹¤×éÖ¯¡°Ï´ÒÂÐÜ¡±ÉæÏÓÈëÇÖºÉÀ¼¾¯·½
5ÔÂ27ÈÕ£¬£¬£¬£¬Ò»¸ö´Ëǰ²»ÎªÈËÖªµÄ¶íÂÞ˹֧³ÖµÄÍøÂçÌØ¹¤×éÖ¯¡°Ï´ÒÂÐÜ¡±£¨Laundry Bear£©±»×·×Ùµ½Óë2024Äê9ÔºÉÀ¼¾¯·½Çå¾²Îó²îÊÂÎñÓйء£¡£¡£ºÉÀ¼¹ú¼Ò¾¯Ô±¾ÖÈ¥Äê͸¶£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˶àÃû¾¯¹ÙµÄÊÂÇéÁªÏµÐÅÏ¢£¬£¬£¬£¬ºÉÀ¼Ç鱨ºÍÇå¾²×ܾ֣¨AIVD£©ÓëºÉÀ¼¹ú·ÀÇ鱨ºÍÇå¾²¾Ö£¨MIVD£©ÔÚÖܶþµÄÁªºÏÖÒÑÔÖУ¬£¬£¬£¬½«¡°Ï´ÒÂÐÜ¡±Óë´Ë´ÎÈëÇÖÊÂÎñÁªÏµÆðÀ´£¬£¬£¬£¬²¢ÖÒÑԳƸÃ×éÖ¯ºÜ¿ÉÄÜÒ²ÈëÇÖÁËÆäËûºÉÀ¼×éÖ¯¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬¡°Ï´ÒÂÐÜ¡±ÓÚ2024Äê9Ô»á¼ûÁËÒ»ÃûºÉÀ¼¾¯Ô±¹ÍÔ±µÄÕË»§£¬£¬£¬£¬²¢Í¨¹ýÈ«ÇòµØµãÁбíÇÔÈ¡ÁËÓëÊÂÇéÏà¹ØµÄÁªÏµÐÅÏ¢£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÁË¡°×ª´ï Cookie¡±¹¥»÷£¬£¬£¬£¬Ê¹ÓÃÇÔÈ¡µÄCookieð³äËùÓÐÕߣ¬£¬£¬£¬ÎÞÐèÓû§Ãû»òÃÜÂë¼´¿É»á¼ûÐÅÏ¢¡£¡£¡£MIVDÖ÷¹Ü±ËµÃ¡¤Àï˹¿ËÌåÏÖ£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯ÀֳɻñÈ¡ÁËÈ«Çò´ó×Ú×éÖ¯ºÍ¹«Ë¾µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬¶ÔÅ·Ã˺ͱ±Ô¼¹ú¼ÒÌØÊâ¸ÐÐËȤ¡£¡£¡£¡°Ï´ÒÂÐÜ¡±Ò²±»Î¢Èí³ÆÎªVoid Blizzard£¬£¬£¬£¬ÖÁÉÙ×Ô2024Äê4ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬×¨×¢ÓÚÕë¶ÔÎÚ¿ËÀ¼ºÍ±±Ô¼³ÉÔ±¹ú·¢¶¯Óë¶íÂÞ˹սÂÔÄ¿µÄÒ»ÖµĹ¥»÷£¬£¬£¬£¬ÆäÕ½ÂÔ°üÀ¨Ê¹ÓÃÇÔÈ¡µÄƾ֤ºÍÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþÀ´Í»ÆÆÄ¿µÄ·ÀÓù£¬£¬£¬£¬²¢´ÓÊܺ¦ÕßµÄÊÜѬȾϵͳÖÐÍøÂçºÍÇÔÈ¡ÎļþºÍµç×ÓÓʼþ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-void-blizzard-cyberspies-linked-to-dutch-police-breach/
3. ºÚ¿ÍαÔìɱ¶¾ÍøÕ¾ÒÔÈö²¥Venom RAT²¢ÇÔÈ¡¼ÓÃÜÇ®°ü
5ÔÂ27ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÁ½ÆðÐÂÐͶñÒâ»î¶¯¡£¡£¡£ÆäÒ»£¬£¬£¬£¬¹¥»÷Õß·ÂðBitdefenderɱ¶¾Èí¼þÏÂÔØÍøÕ¾¡°bitdefender-download[.]com¡±£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØº¬VenomRATÔ¶³Ì»á¼ûľÂíµÄ¶ñÒâ³ÌÐò¡£¡£¡£Óû§µã»÷¸Ã·ÂÃ°ÍøÕ¾¡°Download for Windows¡±°´Å¥ºó£¬£¬£¬£¬»á´¥·¢ÎļþÏÂÔØÁ÷³Ì£¬£¬£¬£¬µ«ÏÖÔÚÏà¹ØBitbucketÕË»§Òѱ»·â½û¡£¡£¡£ÏÂÔØµÄZIPѹËõ°üÖаüÀ¨ÕûºÏÁËVenomRATľÂíÉèÖᢿªÔ´ºóÆÚʹÓÿò¼ÜSilentTrinity¼°StormKittyÐÅÏ¢ÇÔÈ¡Æ÷µÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£VenomRAT×÷ΪQuasar RAT±äÖÖ£¬£¬£¬£¬¾ßÓÐÊý¾ÝÍøÂçÓ볤ÆÚ»¯Ô¶³Ì¿ØÖÆÄÜÁ¦¡£¡£¡£DomainToolsÇ鱨ÍŶÓÖ¸³ö£¬£¬£¬£¬¸Ã´¹ÂÚÍøÕ¾»ù´¡ÉèÊ©Óë¶à¸ö·Âð¼ÓÄôó»Ê¼ÒÒøÐС¢Î¢ÈíЧÀ͵ĶñÒâÓòÃûÓйØÁª£¬£¬£¬£¬ÕâЩÓòÃû´ËǰÒѱ»ÓÃÓÚÇÔÈ¡µÇ¼ƾ֤µÄ´¹Âڻ¡£¡£¡£¹¥»÷ÊÖÒÕÁ´ÏÔʾ£¬£¬£¬£¬VenomRAT¡¢StormKittyÓëSilentTrinity¸÷˾ÆäÖ°£¬£¬£¬£¬ÅäºÏÍê³É¹¥»÷¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬´Ë´Î»î¶¯½ÓÄÉÄ£¿£¿£¿£¿£¿£¿é»¯¿ªÔ´×é¼þ¹¹½¨¶ñÒâÈí¼þϵͳ£¬£¬£¬£¬ÌáÉýÁ˹¥»÷ЧÂÊÓëÒþ²ØÐÔ¡£¡£¡£Í¬ÆÚ£¬£¬£¬£¬ÁíÒ»ÆðClickFixʽ¹¥»÷»î¶¯Ò²±»ÆØ¹â¡£¡£¡£¹¥»÷ÕßαÔì¹È¸èMeetÒ³Ãæ£¬£¬£¬£¬Ê¹ÓÃÐéα¹ýʧÌáÐÑÓÕµ¼Óû§Ö´ÐÐÌØ¶¨PowerShellÏÂÁ£¬£¬£¬°²ÅÅ»ìÏýÅú´¦Öóͷ£¾ç±¾ÊµÏÖÔ¶³Ì¿ØÖÆ¡£¡£¡£±ðµÄ£¬£¬£¬£¬Õë¶ÔMetaµÄ´ó¹æÄ£´¹Âڻ½èÖú¹È¸èAppSheetÎÞ´úÂ뿪·¢Æ½Ì¨£¬£¬£¬£¬ÈƹýÓʼþÇå¾²ÐÒ飬£¬£¬£¬Í¨¹ý¶¯Ì¬ÌìÉúΨһ°¸ÀýID¹æ±Ü¹Å°å¼ì²âϵͳ£¬£¬£¬£¬Î±×°³ÉFacebookÖ§³ÖÍŶÓÓÕÆÓû§µã»÷Á´½Ó£¬£¬£¬£¬ÇÔȡ˫ÒòËØÈÏÖ¤´úÂë¡£¡£¡£
https://thehackernews.com/2025/05/cybercriminals-clone-antivirus-site-to_4.html
4. Everest GroupÀÕË÷Èí¼þÍÅ»ïÈëÇÖMediclinic²¢ÒªÇóÊê½ð
5ÔÂ26ÈÕ£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïEverest GroupÉù³ÆÈëÇÖÁ˼ÛÖµ50ÒÚÃÀÔªµÄÒ½ÁƵ۹úMediclinic£¬£¬£¬£¬²¢Íþв³ý·Ç»ñµÃÊê½ð£¬£¬£¬£¬²»È»½«Ð¹Â¶Ãô¸ÐÊý¾Ý¡£¡£¡£Mediclinic½¨ÉèÓÚ1983Ä꣬£¬£¬£¬ÔÚ¶à¹úÔËÓªÒ½Ôº£¬£¬£¬£¬ÄêÊÕÈë¸ß´ï54ÒÚÃÀÔª¡£¡£¡£¾Ý°µÍø5ÔÂ26ÈÕͨ¸æ£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÁË1000Ãû¹«Ë¾Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý¼°4GBÄÚ²¿ÉñÃØÊý¾Ý£¬£¬£¬£¬²¢ÒªÇó¹«Ë¾ÔÚÎåÌìÄÚÓëÆäÁªÏµ²¢¸æ¿¢ÐÒ飬£¬£¬£¬²»È»½«Êͷű»µÁÊý¾Ý¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÉæÏÓÊý¾Ýй¶µÄÏêϸ¹æÄ£Éв»ÇåÎú£¬£¬£¬£¬µ«¼øÓÚMediclinic´ÓÊÂÒ½ÁÆÓªÒµ£¬£¬£¬£¬ÕâЩÊý¾Ý¿ÉÄܸ߶ÈÃô¸Ð£¬£¬£¬£¬Ò»µ©Ö¤Êµ£¬£¬£¬£¬½«Î£¼°ÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼°¹«Ë¾ÔËÓª¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬Ð¹Â¶ÄÚ²¿ÉñÃØÎļþ¶ÔÔ±¹¤ÓÈΪΣÏÕ£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÇÔÈ¡µÄÊý¾Ý¾ÙÐÐÉí·Ý͵ÇÔ¡¢Ú²Æ»òÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬ÉõÖÁ¿ÉÄÜÒý·¢¶Ô»ù´¡ÉèÊ©µÄ½øÒ»²½¹¥»÷»òÖ´·¨Ðж¯¡£¡£¡£Everest GroupÀÕË÷Èí¼þÍŶӾݳÆÓë¶íÂÞ˹µÄBlackByte¼¯ÍÅÓÐÁªÏµ£¬£¬£¬£¬×Ô2021ÄêÖÐÆÚÒÔÀ´Ò»Ö±Ôڻ£¬£¬£¬£¬±¾Ô»¹Ï®»÷ÁË¿ç¹úÈíÒûÁÏÉú²úÉÌÊʿڿÉÀÖ£¬£¬£¬£¬ÇÔÈ¡ÁËÔ±¹¤Êý¾Ý¼°ÉñÃØÎļþ£¬£¬£¬£¬²¢²ß»®ÁË2022Äê10ÔÂÕë¶ÔAT&TµÄ¹¥»÷¡£¡£¡£
https://cybernews.com/security/mediclinic-everest-ransomware-attack/
5. RhysidaÀÕË÷ÍÅ»ïÉù³ÆÇÔÈ¡°ÍÎ÷Æû³µ¾ÏúÉÌCarreraµÄÊý¾Ý
5ÔÂ26ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Óë¶íÂÞ˹ÓйØÁªµÄRhysidaÀÕË÷Èí¼þÍÅ»ïÉù³ÆÇÔÈ¡Á˰ÍÎ÷×ÅÃûÆû³µ¾ÏúÉÌCarreraµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬°üÀ¨»¤ÕÕ¡¢ÌõÔ¼µÈ£¬£¬£¬£¬²¢Ë÷Òª100ÍòÃÀÔªÊê½ðÒÔÑÚÊÎÕæÏà¡£¡£¡£¸ÃÍÅ»ïÔÚ°µÍøÐû²¼ÉùÃ÷£¬£¬£¬£¬ÒԵ䷶·½·¨Íþв¸Ã¹«Ë¾£¬£¬£¬£¬ÒªÇóÔÚ6ÔÂ1ÈÕǰ֧¸¶¾Þ¶îÊê½ð£¬£¬£¬£¬²»È»½«¹ûÕæÊý¾Ý¡£¡£¡£Carrera¹«Ë¾×ܲ¿Î»ÓÚÊ¥±£ÂÞ£¬£¬£¬£¬Ä±»®¶à¸öÆû³µÆ·ÅÆÏúÊÛ¼°Ïà¹ØÐ§ÀÍ¡£¡£¡£´Ë´ÎÀÕË÷¹¥»÷¿ÉÄܸø¹«Ë¾´øÀ´¾Þ¶îËðʧ£¬£¬£¬£¬°üÀ¨×ÊÔ´·ÖÅÉ¡¢Ö´·¨¼û¸æ¡¢¿Í»§Åâ³¥¼°·£¿£¿£¿£¿£¿£¿îµÈ£¬£¬£¬£¬·£¿£¿£¿£¿£¿£¿î½ð¶î¿ÉÄܸߴï½ü300ÍòÃÀÔª¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¤ÕÕ¸´Ó¡¼þй¶¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔºÍڲƣ¬£¬£¬£¬ÊÜÓ°Ïì¿Í»§¿ÉÄÜÆðËß¹«Ë¾ÒªÇóÅâ³¥¡£¡£¡£³ý¾¼Ã´¦·ÖÍ⣬£¬£¬£¬¹«Ë¾»¹¿ÉÄÜÔâÊÜÉùÓþË𺦣¬£¬£¬£¬Ó°ÏìÓªÒµ¼¨Ð§¡£¡£¡£Rhysida×éÖ¯ÒÔË«ÖØÀÕË÷ÊÖ¶ÎÖøÃû£¬£¬£¬£¬ÒÑÉøÍ¸µ½½ÌÓý¡¢Ò½ÁƱ£½¡µÈ¶à¸öÁìÓò£¬£¬£¬£¬×Ô2023Äê5Ô½¨ÉèÒÔÀ´ÒÑÔì³ÉÁè¼Ý202ÃûÊܺ¦Õß¡£¡£¡£²»¹ý£¬£¬£¬£¬2024Ä꺫¹ú»¥ÁªÍøÇå¾²¾ÖµÄÑо¿Ð¡×éÒÑÆÆ½â¸ÃÍÅ»ïµÄ¼ÓÃÜ´úÂ룬£¬£¬£¬²¢ÔÚÆäÍøÕ¾ÉÏ·ÖÏíÁËÃâ·ÑµÄRhysida½âÃܹ¤¾ßºÍÊֲᡣ¡£¡£
https://cybernews.com/security/carrera-chevloret-brazil-ransomware-attack/
6. ºÚ¿ÍÉù³ÆAT&TÖØ´óйÃÜÊÂÎñ̻¶ÁË3100ÍòÌõ¼Í¼
5ÔÂ26ÈÕ£¬£¬£¬£¬¹¥»÷Õß¿ËÈÕÉù³ÆÊýÍòÍòÌõAT&T¼Í¼±»Ð¹Â¶ÖÁÍøÉÏ£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪȱ·¦×ã¹»Ö¤¾ÝÖ§³Ö¡£¡£¡£¸ÃÊÂÎñÏêÇéÐû²¼ÓÚÒ»×ÅÃûºÚ¿ÍÂÛ̳£¬£¬£¬£¬¹¥»÷Õß³ÆÊý¾Ý¼¯º¬¶à´ï3100ÍòÌõÃô¸ÐÓû§¼Í¼£¬£¬£¬£¬°üÀ¨¿Í»§È«Ãû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢Ë°ºÅ¡¢×°±¸ID¡¢CookieID¡¢IPµØµã¡¢ÍêÕûµØµã¡¢µç»°ºÅÂë¼°µç×ÓÓʼþµØµãµÈ¡£¡£¡£Ñо¿ÍŶÓÊӲ췢Ã÷£¬£¬£¬£¬Ñù±¾½öº¬µ¥¸öÓû§ÏêϸÐÅÏ¢£¬£¬£¬£¬ÎÞ·¨ÑéÖ¤ÍêÕûÊý¾Ý¿âÊÇ·ñÕæÓÐ3100ÍòÌõ¼Í¼¡£¡£¡£²»¹ý£¬£¬£¬£¬¼ÙÉèÿ¸öÓû§Ì»Â¶ÐÅÏ¢Á¿Ïàͬ£¬£¬£¬£¬Ôò³¬300ÍòAT&TÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒÑй¶¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬£¬ÈôÐÅÏ¢ÕæÓÐ3100ÍòÐУ¬£¬£¬£¬½«ÊÇÑÏÖØÓû§Òþ˽й¶¡£¡£¡£Ö»¹ÜÏÖÔÚÎÞ·¨È·ÈÏй¶ÊÂÎñ£¬£¬£¬£¬µ«¹¥»÷Õß5Ô·dz£»£»£»£»£»îÔ¾£¬£¬£¬£¬Ðû²¼ÁËÊýÊ®Ìõº¬ÖÖÖÖÊý¾ÝµÄÌû×Ó¡£¡£¡£ÈôAT&TÊý¾Ýй¶±»Ö¤Êµ£¬£¬£¬£¬½«¶ÔÊÜÓ°ÏìСÎÒ˽¼Ò×é³ÉÑÏÖØÍøÂçÇå¾²ºÍÒþ˽Σº¦£¬£¬£¬£¬ÕâЩÊý¾Ý×ãÒÔÒý·¢½ðÈÚڲơ¢ÕË»§µÁÓúÍÉç»á¹¤³Ì¹¥»÷¡£¡£¡£AT&T×÷ΪȫÇò×î´óµçÐŹ«Ë¾Ö®Ò»£¬£¬£¬£¬ÄêÓªÊÕ³¬1220ÒÚÃÀÔª£¬£¬£¬£¬ÆäÖØ´ó¹æÄ£Ê¹Æä³ÉΪºÚ¿Í¹¥»÷Ä¿µÄ£¬£¬£¬£¬È¥Äê4Ô¸ù«Ë¾¾ÍÔøÌåÏÖ¿Í»§Êý¾Ý±»´ÓµÚÈý·½ÔÆÆ½Ì¨²»·¨ÏÂÔØ£¬£¬£¬£¬ÏÕЩËùÓпͻ§¶¼ÊÜÓ°Ïì¡£¡£¡£
https://cybernews.com/security/att-data-breach-millions-records-claimed/