¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î
Ðû²¼Ê±¼ä 2025-06-051. ¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î
6ÔÂ3ÈÕ£¬£¬£¬£¬£¬¼ÓÄôóInstantel¹«Ë¾Éú²úµÄ1000¶ą̀¹¤Òµ¼à¿Ø×°±¸ÃæÁÙÑÏÖØÇå¾²Íþв¡£¡£¡£¡£ÍøÂçÇå¾²»ú¹¹CISAÐû²¼µÄ×Éѯ±¨¸æÏÔʾ£¬£¬£¬£¬£¬InstantelµÄMicromate²úÆ·£¨ÓÃÓڼͼÕñ¶¯¡¢ÔëÒôºÍ¿ÕÆø¹ýѹ£©ÒòÓëÉèÖö˿Úȱ·¦Éí·ÝÑéÖ¤Ïà¹ØµÄÎó²î¶øÊÜÓ°Ï죬£¬£¬£¬£¬¸ÃÎó²î±àºÅΪCVE-2025-1907£¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.8£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£·¢Ã÷´ËÎó²îµÄMicrosecÑо¿Ô±Souvik Kandar͸¶£¬£¬£¬£¬£¬È«ÇòÓÐÁè¼Ý1000̨̻¶ÔÚ»¥ÁªÍøÉϵÄMicromate×°±¸¿ÉÄÜÒ×Êܹ¥»÷¡£¡£¡£¡£ÕâЩÒ×Ëð×°±¸ÆÕ±éÓ¦ÓÃÓڲɿó¡¢ËíµÀ¡¢ÇÅÁº¼à²â¡¢ÐÞ½¨ºÍÇéÐÎÇå¾²µÈ¶à¸öÁìÓò¡£¡£¡£¡£¹¥»÷ÕßÈôÄÜÔÚMicromate×°±¸ÉÏÖ´ÐÐÏÂÁ£¬£¬£¬£¬²»µ«¿É¸ü¸Ä»ò½ûÓÃÆä¼à¿Ø¹¦Ð§£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ý¹ýʧ»ò²»ÍêÕû£¬£¬£¬£¬£¬ÆÆËðÊý¾ÝÍêÕûÐÔ£¬£¬£¬£¬£¬»¹¿ÉÄܸøÉ󼯡¢ºÏ¹æÐÔ»ò°ü¹ÜË÷Åâ´øÀ´ÎÊÌâ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬×°±¸»¹¿ÉÄܱ»Ë𻵻ò¹Ø±Õ£¬£¬£¬£¬£¬ÖÂʹ±¬ÆÆºÍËíµÀÍÚ¾òµÈÒªº¦²Ù×÷ÖÐÖ¹¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓñ»ÈëÇÖ×°±¸ºáÏòÒÆ¶¯µ½ÆäËûÅþÁ¬µÄIT»òOTϵͳ¡£¡£¡£¡£CISAÔÚͨ¸æÖÐÖ¸³ö£¬£¬£¬£¬£¬InstantelÕýÔÚÕë¶Ô´ËÎó²î¾ÙÐй̼þ¸üУ¬£¬£¬£¬£¬ÔÚ²¹¶¡Ðû²¼Ç°£¬£¬£¬£¬£¬½¨ÒéÓû§½«ÊÜÓ°Ïì×°±¸µÄ»á¼ûÏÞÖÆÔÚÊÜÐÅÈεÄIPµØµã¡£¡£¡£¡£
https://www.securityweek.com/1000-instantel-industrial-monitoring-devices-possibly-exposed-to-hacking/
2. Gargle¹«Ë¾Êý¾Ý¿â´æÒþ»¼ÖÂ270Íò»¼ÕßÐÅϢ̻¶
6ÔÂ3ÈÕ£¬£¬£¬£¬£¬CybernewsÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÆðÓ°ÏìÃÀ¹ú¹«ÃñÒ½ÁÆÊý¾ÝµÄ´ó¹æÄ£Ð¹Â¶ÊÂÎñ£¬£¬£¬£¬£¬Ô¼270ÍòÃû»¼Õß×ÊÁϺÍ880ÍòÌõÔ¤Ô¼¼Í¼Íêȫ̻¶¡£¡£¡£¡£´Ë´Îй¶ԴÓÚÒ»¸öδÉèÖÃÇå¾²·À»¤µÄMongoDBÊý¾Ý¿â£¬£¬£¬£¬£¬Êý¾ÝËùÓÐÕßËäδ»ñ¹Ù·½È·ÈÏ£¬£¬£¬£¬£¬µ«ÏßË÷Ö¸ÏòGargle¹«Ë¾¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÑÀ¿ÆÕïËùÌṩӪÏú¡¢SEOºÍÍøÕ¾¿ª·¢Ð§ÀÍ£¬£¬£¬£¬£¬Ëä·ÇÒ½ÁƱ£½¡ÌṩÕߣ¬£¬£¬£¬£¬µ«ÓªÒµÄ£Ê½Éæ¼°´¦Öóͷ£»¼ÕßÊý¾Ý¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊý¾Ý¿â̻¶ʱ³¤¼°»á¼ûÕߣ¬£¬£¬£¬£¬ÔÚCybernews¼û¸æºó£¬£¬£¬£¬£¬Êý¾Ý¼¯Òѱ»±£»£»£»¤£¬£¬£¬£¬£¬µ«ÉÐδÊÕµ½¸Ã¹«Ë¾Ì¸ÂÛ¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº¸Ç»¼ÕßÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢×¡Ö·¡¢µç»°ºÅÂë¡¢ÐԱ𡢲¡ÀúID¡¢ÓïÑÔÆ«ºÃ¡¢Õ˵¥ÏêÇé¼°Ô¤Ô¼¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Éî¶ÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬À¦°óºó×é³ÉСÎÒ˽¼ÒÉí·ÝÖÜÈ«À¶Í¼£¬£¬£¬£¬£¬ÎªÉí·Ý͵ÇÔ¡¢°ü¹Üڲơ¢Ò½ÁÆÉí·Ý͵ÇÔ¼°´¹ÂÚ¹¥»÷µÈÀÄÓÃÐÐΪ·¿ª´óÃÅ£¬£¬£¬£¬£¬Òý·¢¶Ô¸Ã¹«Ë¾²»×ñÊØHIPAA¹æÔòµÄÑÏÖØÖÊÒÉ¡£¡£¡£¡£
https://cybernews.com/security/dental-marketing-gargle-data-leak/
3. ÎÚ¿ËÀ¼GUR´Ó¶íͼ²¨Áзò¹«Ë¾ÇÔÈ¡4.4GBÉñÃØÊý¾Ý
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¾üÊÂÇ鱨»ú¹¹GUR£¨ÓÖÃûHUR£©¶Ô¶íÂÞ˹º½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Í¼²¨Áзò·¢¶¯Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬ÇÔÈ¡Á˸߶ÈÉñÃØÊý¾Ý¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬GURÈëÇÖÁ˶íÂÞ˹ÁªºÏ·É»ú¹«Ë¾£¨UAC£©Í¼²¨Áзò·Ö²¿£¬£¬£¬£¬£¬¸Ã·Ö²¿×÷ΪËÕÁªÊ±ÆÚͼ²¨ÁзòÉè¼Æ¾ÖµÄ¼ÌÐøÕߣ¬£¬£¬£¬£¬ÊǶíÂÞ˹¾ü·½Õ½ÂÔºäÕ¨»úµÄÖ÷Òª¿ª·¢ÉÌ¡£¡£¡£¡£Ç鱨½çÐÂÎÅÈËʿ͸¶£¬£¬£¬£¬£¬´Ë´ÎÐж¯ÖУ¬£¬£¬£¬£¬ÎÚ¿ËÀ¼Ìع¤»ñÈ¡ÁËÁè¼Ý4.4GB¾ßÓÐÕ½ÂÔÒâÒåµÄ¸ß¶ÈÉñÃØÄÚ²¿Êý¾Ý¡£¡£¡£¡£ÕâЩÊý¾Ýº¸ÇÆÕ±é£¬£¬£¬£¬£¬°üÀ¨ÄÚ²¿Í¨Ñ¶¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¹¤³Ìʦ¼òÀú¡¢²É¹º¼Í¼ÒÔ¼°ÉñÃØ¾Û»á¼Í¼µÈ¡£¡£¡£¡£ÎÚ¿ËÀ¼Ç鱨²¿·ÖÐÂÎÅÈËÊ¿ÌåÏÖ£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÏÕЩ̻¶ÁËͼ²¨ÁзòµÄËùÓÐÉñÃØ£¬£¬£¬£¬£¬Ê¹ÎÚ¿ËÀ¼·½ÃæÄܹ»ÖÜÈ«ÕÆÎÕ¶íÂÞ˹սÂÔº½¿ÕµÄÖ°Ô±ºÍÐж¯ÇéÐΡ£¡£¡£¡£ÕâЩÊý¾Ý¶ÔÎÚ¿ËÀ¼Ç鱨²¿·Ö¶øÑÔ¼ÛÖµ¼«¸ß£¬£¬£¬£¬£¬Ê¹Æä¶Ôͼ²¨ÁзòµÄÔË×÷ÏÕЩÁËÈçÖ¸ÕÆ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬GUR»¹ÉñÃØ¼à¿ØÍ¼²¨Áзò¹«Ë¾ÄÚ²¿ÎļþÁ÷´ïÊýÔ£¬£¬£¬£¬£¬ÉîÈëÏàʶ¹«Ë¾ÔËÓª£¬£¬£¬£¬£¬ÎªÎ´À´¹¥»÷¶íÂÞ˹¹ú·À¹¤ÒµÍøÂçÖ¤¾Ý¡£¡£¡£¡£ÎªÏóÕ÷ÐÔ¹¥»÷¶íÂÞ˹£¬£¬£¬£¬£¬GUR»¹ÔÚͼ²¨Áзò¹«Ë¾ÍøÕ¾ÉÏͿѻ£¬£¬£¬£¬£¬»ÉÏèͷӥץ×ŶíÂÞ˹ºäÕ¨»úµÄͼ°¸¡£¡£¡£¡£´Ë´ÎÐж¯²¢·ÇÁæØêÊÂÎñ£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼GURÒ»Ö±ÔÚÒ»Ö±¹¥»÷¶íÂÞ˹µÄ¾ü¹¤ÁªºÏÌ壬£¬£¬£¬£¬ÈëÇÖÓë¹ú·À¡¢Õ½ÂÔº½¿Õ¡¢ÎäÆ÷Éú²úºÍÎïÁ÷Ïà¹ØµÄ¶íÂÞ˹¹«Ë¾Êý¾Ý¿â¡£¡£¡£¡£
https://securityaffairs.com/178641/hacking/ukraines-military-intelligence-agency-stole-4-4gb-of-highly-classified-internal-data-from-tupolev.html
4. FBIµÈ»ú¹¹¸üУºPlayÀÕË÷Èí¼þÒѹ¥»÷900¸ö×éÖ¯
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©¡¢CISA¼°°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄÁªºÏÐû²¼µÄ×Éѯ¸üÐÂÅú×¢£¬£¬£¬£¬£¬×èÖ¹2025Äê5Ô£¬£¬£¬£¬£¬PlayÀÕË÷Èí¼þÍÅ»ïÒÑÈëÇÖÔ¼900¸ö×éÖ¯£¬£¬£¬£¬£¬Êܺ¦ÕßÊýÄ¿ÊÇ2023Äê10Ô±¨¸æµÄÈý±¶¡£¡£¡£¡£×Ô2022Äê6ÔÂÆð£¬£¬£¬£¬£¬PlayÀÕË÷Èí¼þ×éÖ¯¾Í¶Ô±±ÃÀ¡¢ÄÏÃÀºÍÅ·ÖÞµÄÖÚ¶àÆóÒµ¼°Òªº¦»ù´¡ÉèÊ©Ôì³ÉÓ°Ï죬£¬£¬£¬£¬³ÉΪ2024Äê×î»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£¡£¡£¡£¸ÃÍÅ»ïÿ´Î¹¥»÷¾ùʹÓÃÖØÐ±àÒëµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Õâ´ó´óÔöÌíÁËÇå¾²½â¾ö¼Æ»®¼ì²âºÍ×èÖ¹µÄÄѶȣ¬£¬£¬£¬£¬²¿·ÖÊܺ¦Õß»¹½Óµ½µç»°ÀÕË÷Êê½ð£¬£¬£¬£¬£¬ÒÔ±ÜÃâÊý¾Ýй¶¡£¡£¡£¡£½ñÄêÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬ÓëPlayÀÕË÷Èí¼þÔËÓªÉÌÓйصijõʼ»á¼ûÊðÀíʹÓÃÔ¶³Ì¼à¿ØºÍÖÎÀí¹¤¾ßÖеĶà¸öÎó²î£¬£¬£¬£¬£¬¶ÔÃÀ¹ú×éÖ¯ÌᳫԶ³Ì´úÂëÖ´Ðй¥»÷£¬£¬£¬£¬£¬ÎªºóÐøµÄÀÕË÷Èí¼þ¹¥»÷×ö×¼±¸¡£¡£¡£¡£PlayÀÕË÷Èí¼þÍÅ»ïÒѱ£´æ½üÈýÄ꣬£¬£¬£¬£¬ÔÚ°²ÅÅÀÕË÷Èí¼þǰ»áÇÔÈ¡Ãô¸ÐÎļþ£¬£¬£¬£¬£¬ÒÔ´ËÏòÊܺ¦ÕßʩѹË÷ÒªÊê½ð£¬£¬£¬£¬£¬ÇÒ½ÓÄɵç×ÓÓʼþ×÷Ϊ̸ÅÐÇþµÀ£¬£¬£¬£¬£¬²»ÌṩTor̸ÅÐÒ³ÃæÁ´½Ó£¬£¬£¬£¬£¬»¹Ê¹ÓÃ×Ô½ç˵VSS¸´Öƹ¤¾ßÇÔÈ¡Îļþ¡£¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬£¬£¬£¬£¬FBIµÈ»ú¹¹±Þ²ßÇå¾²ÍŶÓÓÅÏȽ«ÏµÍ³¡¢Èí¼þºÍ¹Ì¼þ¸üÐÂÖÁ×îа汾£¬£¬£¬£¬£¬ÒÔ½µµÍÎó²î±»Ê¹ÓõÄΣº¦£»£»£»ÔÚËùÓÐЧÀÍÖÐʵÑé¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©£¬£¬£¬£¬£¬ÓÈÆäÒªÖØµã¹Ø×¢VPN¡¢ÍøÂçÓʼþµÈ¿É»á¼û×éÖ¯ÍøÂçÖÐÒªº¦ÏµÍ³µÄÕË»§£»£»£»Í¬Ê±ÒªÎ¬»¤ÀëÏßÊý¾Ý±¸·Ý£¬£¬£¬£¬£¬²¢¿ª·¢ºÍ²âÊÔ»Ö¸´³ÌÐò£¬£¬£¬£¬£¬½«Æä×÷Ϊ×éÖ¯±ê×¼Ç徲ʵ¼ùµÄÒ»²¿·Ö¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/
5. ³öÊé¾ÞÍ·Lee Enterprises³ÆÊý¾Ýй¶ӰÏìÁ˽ü4ÍòÈË
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬³öÊé¾ÞÍ·Lee EnterprisesÕýÔÚ֪ͨ½ü40,000ÃûСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê2ÔÂÀÕË÷Èí¼þ¹¥»÷Öб»µÁµÄÖ°Ô±¡£¡£¡£¡£×÷ΪÃÀ¹ú×î´óµÄ±¨Òµ¼¯ÍÅÖ®Ò»£¬£¬£¬£¬£¬Lee EnterprisesÔÚ26¸öÖݳöÊé¶à·ÝÈÕ±¨¡¢ÖÜ¿¯ºÍרҵ¿¯Î£¬£¬£¬£¬ÓµÓÐÖØ´óµÄ¶ÁÕßȺÌå¡£¡£¡£¡£¸Ã¹«Ë¾±¾ÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨39,779ÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÄÎļþ£¬£¬£¬£¬£¬¿ÉÄÜÉæ¼°µÄÃû×Ö¡¢ÐÕÊÏÒÔ¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢ÔÚ2ÔÂ3ÈÕ±»Î´¾ÊÚȨ»á¼û»ò»ñÈ¡¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂLee EnterprisesÃÀ¹ú¸÷µØµÄÐÂÎűà¼ÊÒϵͳÖÐÖ¹£¬£¬£¬£¬£¬ÆÈʹ³öÊéÉ̹رÕÐí¶àÍøÂ磬£¬£¬£¬£¬Ôì³ÉÊýÊ®¼Ò±¨Ö½µÄÓ¡Ë¢ºÍµÝËÍ´óÃæ»ýÖÐÖ¹£¬£¬£¬£¬£¬»¹Òý·¢ÁËÆóÒµVPNÖÐÖ¹ÒÔ¼°ÎÞ·¨»á¼ûÄÚ²¿ÏµÍ³ºÍÔÆ´æ´¢µÈÑÏÖØÎÊÌâ¡£¡£¡£¡£Ò»Öܺ󣬣¬£¬£¬£¬¸Ã¹«Ë¾ÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»Îļþ£¬£¬£¬£¬£¬Åû¶ºÚ¿Í¡°¼ÓÃÜÁËÒªº¦Ó¦ÓóÌÐò²¢ÇÔÈ¡ÁËijЩÎļþ¡±¡£¡£¡£¡£Ö»¹ÜLee EnterprisesÉÐδÃ÷È·¹é×ïÓÚÏêϸÐж¯·½£¬£¬£¬£¬£¬µ«÷è÷ëÀÕË÷Èí¼þÍÅ»ïÒÑÔÚ2ÔÂβÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË×ܼÆ350GBµÄ120,000·ÝÎļþ£¬£¬£¬£¬£¬Íþв½«ÓÚ3ÔÂ5ÈÕËùÓÐÐû²¼¡£¡£¡£¡£2ÔÂ28ÈÕ£¬£¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÍŻォLee EnterprisesÌí¼Óµ½Æä°µÍøÐ¹ÃÜÍøÕ¾£¬£¬£¬£¬£¬·ÖÏíÁ˾ݳƴӸù«Ë¾ÊÜËðϵͳÖÐÇÔÈ¡µÄÊý¾ÝÑù±¾£¬£¬£¬£¬£¬°üÀ¨Õþ¸®Éí·Ý֤ɨÃè¼þ¡¢²ÆÎñµç×Ó±í¸ñµÈÉñÃØÎļþ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/media-giant-lee-enterprises-says-data-breach-affects-39-000-people/
6. À½Ü¹ûµÂÊÐÕþ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬³¬400GBÊý¾Ý»òй¶
6ÔÂ4ÈÕ£¬£¬£¬£¬£¬À½Ü¹ûµÂÊÐÕþ¹«Ë¾£¨RMC£©ÍøÕ¾ÒÉËÆÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬Òý·¢¹«ÖÚ¶ÔÃô¸Ð¹«ÃñÊý¾Ý¿ÉÄܱ»µÁµÄµ£ÐÄ£¬£¬£¬£¬£¬½üÆÚ¸ÃÊý¾Ýй¶ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬Òý·¢×¡Ãñ¿Ö»Å¡£¡£¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ£¬£¬£¬£¬£¬´Ë´Îй¶µÄÊý¾Ý¿ÉÄܰüÀ¨À½Ü¹ûµÂÊÐÕþ¸®ÐÞ½¨ºÍ¹«¹²»ù´¡ÉèÊ©µÄÒªº¦ÐÅÏ¢£¬£¬£¬£¬£¬ÈçѧУ¡¢Ò½Ôº¡¢ÇÅÁººÍ°ì¹«Êҵȣ¬£¬£¬£¬£¬¹ÙÔ±ÏÓÒÉÁè¼Ý400GBµÄÊý¾Ý¿ÉÄÜÔ⵽й¶¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬RMCÖÎÀí²¿·ÖѸËÙ֪ͨÁËÓ¡¶È¹ú¼ÒµçÐÅÓÐÏÞ¹«Ë¾£¨BSNL£©µÄÍøÂçÇå¾²ÍŶӡ£¡£¡£¡£BSNLÍŶÓÁ¬Ã¦½«GIS£¨µØÀíÐÅϢϵͳ£©ÍøÕ¾´ÓÍøÂçÖиôÀ룬£¬£¬£¬£¬²¢¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñÕö¿ªÏêϸÊӲ죬£¬£¬£¬£¬ÏÖÔÚÕýÆð¾¢È·¶¨Ãü¾Ýй¶Ö鯽¼°ÕÒ³öµ¼Ö¹¥»÷µÄÎó²î¡£¡£¡£¡£ÆðÔ´ÆÀ¹ÀÏÔʾ£¬£¬£¬£¬£¬¸ÃÍøÕ¾¿ÉÄÜÔÚ¡°ÐÁ¶à¶ûÐж¯¡±£¨Ó¡¶È½üÆÚÕë¶ÔÅÁ¹þ¶û¼ÓÄ·¿Ö²ÀÏ®»÷µÄ¾üÊ»ØÓ¦£©Ê±´úÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬²»¹ýÕâÒ»¹ØÁªÉÐδ»ñµÃ֤ʵ¡£¡£¡£¡£Ö»¹ÜRMCÔÚÍøÂçÇå¾²²½·¥ÉÏͶÈëÁËÔ¼1ÒÚ¬±È£¬£¬£¬£¬£¬µ«ÒÑÍùÒ²ÔøÔâÓö¹ýÀàËÆÊÂÎñ¡£¡£¡£¡£Õþ¸®ÌåÏÖ£¬£¬£¬£¬£¬ÒªÖÜÈ«Ïàʶ´Ë´ÎÍøÂç¹¥»÷µÄÓ°Ï죬£¬£¬£¬£¬»¹ÐèÆÚ´ýÕýÔÚ¾ÙÐеÄȡ֤ÊÓ²ìÍê³É¡£¡£¡£¡£
https://www.news9live.com/crime/rajkot-civic-bodys-gis-website-hit-by-cyber-attack-over-400-gb-data-feared-stolen-2862626