CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬£¬£¬ £¬£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷

Ðû²¼Ê±¼ä 2025-08-15

1. CharonÀÕË÷Èí¼þÈÚºÏAPTÊÖÒÕ£¬£¬£¬ £¬£¬Öж«¹«¹²²¿·ÖÓ뺽¿ÕÒµÔ⾫׼¹¥»÷


8ÔÂ13ÈÕ£¬£¬£¬ £¬£¬ÍøÂçÇå¾²»ú¹¹Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶£¬£¬£¬ £¬£¬Ò»ÖÖÃûΪCharonµÄÐÂÐÍÀÕË÷Èí¼þÕýÒÔÖж«¹«¹²²¿·ÖºÍº½¿ÕҵΪĿµÄÌᳫ¹¥»÷£¬£¬£¬ £¬£¬ÆäÊÖÒÕÖØÆ¯ºóµÖ´ï¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©¼¶±ð¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬ £¬£¬¹¥»÷Õß½ÓÄÉDLL²àÔØ¡¢Àú³Ì×¢Èë¼°EDRÌÓ±ÜÊÖÒÕ¹¹½¨¹¥»÷Á´£¬£¬£¬ £¬£¬ÓëÔøÕë¶ÔÑÇÌ«Õþ¸®Ä¿µÄµÄEarth Baxia APT×éÖ¯±£´æÏÔÖøÊÖÒÕÖØµþ£¬£¬£¬ £¬£¬µ«Ä¿½ñÖ¤¾ÝÉÐȱ·¦ÒÔÈ·ÈÏÖ±½Ó¹ØÁª¡£¡£¡£¡£´Ë´Î¹¥»÷ÒÔÕýµ±ä¯ÀÀÆ÷ÎļþEdge.exeΪÈë¿Ú£¬£¬£¬ £¬£¬Í¨¹ý²àÔØ¶ñÒâmsedge.dll×îÖÕ°²ÅÅCharonÀÕË÷Èí¼þ¡£¡£¡£¡£¸ÃÈí¼þ¾ß±¸¶àÖØÆÆËðÐÔ¹¦Ð§£ºÖÕÖ¹Ç徲ЧÀÍ¡¢É¾³ý¾íÓ°¸±±¾Ó뱸·ÝÒÔ×è°­»Ö¸´£¬£¬£¬ £¬£¬½ÓÄɶàÏ̼߳ÓÃÜÊÖÒÕÌáÉýÎļþËø¶¨Ð§ÂÊ£¬£¬£¬ £¬£¬²¢¼¯³É»ùÓÚ¿ªÔ´Dark-KillÏîÄ¿µÄÇý¶¯³ÌÐò£¬£¬£¬ £¬£¬¿Éͨ¹ý¡°×Ô´øÒ×Êܹ¥»÷Çý¶¯³ÌÐò£¨BYOVD£©¡±¹¥»÷½ûÓÃEDR·À»¤£¬£¬£¬ £¬£¬Ö»¹Ü´Ë´Î¹¥»÷Öиù¦Ð§Î´±»´¥·¢£¬£¬£¬ £¬£¬ÌåÏÖÆäÈÔ´¦ÓÚ²âÊԽ׶Ρ£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓö¨ÖÆ»¯ÀÕË÷ÐÅÃ÷È·Ìá¼°Êܺ¦×éÖ¯Ãû³Æ£¬£¬£¬ £¬£¬Ö¤Êµ´ËΪÕë¶ÔÐÔÐж¯¡£¡£¡£¡£Ö»¹Ü¹¥»÷Á´Öжþ½øÖÆÎļþÓëEarth BaxiaÀúÊ·ÊÖ·¨¸ß¶ÈÏàËÆ¡£¡£¡£¡£ÏÖÔÚȱ·¦¹²Ïí»ù´¡ÉèÊ©»ò¹¥»÷ģʽµÈÈ·ÔäÖ¤¾Ý£¬£¬£¬ £¬£¬½öÄÜÅжϱ£´æ¡°ÓÐÏÞµ«ÏÔÖøµÄÊÖÒÕÇ÷ͬ¡±¡£¡£¡£¡£


https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html


2. EfimerľÂíºá¿ç2024-2025Ä꣬£¬£¬ £¬£¬È«ÇòÎåǧÓû§Ïݸ´ºÏÐÍÍøÂç·¸·¨Éú̬


8ÔÂ13ÈÕ£¬£¬£¬ £¬£¬¿¨°Í˹»ù¿ËÈÕÅû¶£¬£¬£¬ £¬£¬×Ô2024Äê10ÔÂÊ״η¢Ã÷ÒÔÀ´£¬£¬£¬ £¬£¬EfimerľÂí²¡¶¾ÒÑÒ»Á¬»îÔ¾ÖÁ2025Ä꣬£¬£¬ £¬£¬Í¨¹ýαÔìÖ´·¨ÉùÃ÷´¹ÂÚÓʼþ¡¢ÈëÇÖWordPressÍøÕ¾¼°¶ñÒâÖÖ×ÓÎļþÈý´óÇþµÀ£¬£¬£¬ £¬£¬Ñ¬È¾È«ÇòÁè¼Ý5000ÃûÓû§£¬£¬£¬ £¬£¬Ðγɼ¯¼ÓÃÜÇ®±ÒÇÔÈ¡¡¢ÍøÕ¾±©Á¦ÆÆ½âÓëÀ¬»øÓʼþ·Ö·¢ÓÚÒ»ÌåµÄ¸´ºÏÐÍÍøÂç·¸·¨Éú̬¡£¡£¡£¡£¸ÃľÂíµÄ½¹µã¹¥»÷ÊֶΰüÀ¨ÈýÖØÎ¬¶È£ºÆäÒ»£¬£¬£¬ £¬£¬Í¨¹ýαװ³ÉÆóҵ״ʦµÄ´¹ÂÚÓʼþʵÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬ £¬£¬ÓÕµ¼Êܺ¦Õß·­¿ªº¬¶à½×¶Î¾ç±¾µÄ¸½¼þ£¬£¬£¬ £¬£¬Ö²ÈëľÂíºóÒÔÐéα¹ýʧÐÅÏ¢ÑÚÊλºÛ¼££»£» £»£»£»Æä¶þ£¬£¬£¬ £¬£¬Õë¶ÔWordPressÍøÕ¾Ìᳫ±©Á¦ÆÆ½â£¬£¬£¬ £¬£¬Ê¹ÓÃά»ù°Ù¿Æ´Ê»ãÌìÉúÄ¿µÄÓòÃûÁÐ±í²¢²âÊÔ´ó×ÚÃÜÂ룬£¬£¬ £¬£¬ÀÖ³ÉÈëÇÖºóÐû²¼¶ñÒâÎļþ»òͨ¹ýαÔìÓ°Ï·ÖÖ×ÓÈö²¥ÁíÒ»Efimer±äÖÖ£¬£¬£¬ £¬£¬¸½´øTron¡¢SolanaµÈαÔìÇ®°ü£»£» £»£»£»ÆäÈý£¬£¬£¬ £¬£¬°²ÅÅÃûΪ"Liame"µÄ¾ç±¾´ÓÖ¸¶¨ÍøÕ¾×¥È¡ÓʼþµØµã£¬£¬£¬ £¬£¬¹¹½¨¾«×¼Õ©Æ­Ä¿µÄ¿â¡£¡£¡£¡£Êý¾ÝÏÔʾ£¬£¬£¬ £¬£¬2024Äê10ÔÂÖÁ2025Äê7Լ䣬£¬£¬ £¬£¬°ÍÎ÷³ÉΪ×î´óÊܺ¦¹ú£¬£¬£¬ £¬£¬Ó¡¶È¡¢Î÷°àÑÀ¡¢¶íÂÞ˹¡¢Òâ´óÀû¼°µÂ¹ú½ôËæØÊºó¡£¡£¡£¡£


https://hackread.com/efimer-trojan-crypto-hacks-wordpress-torrents-phishing/


3. Ä«Î÷¸çCFE 600GBÊý¾Ýй¶̻¶Ҫº¦µçÁ¦»ù´¡ÉèÊ©ÍøÂçΣº¦


8ÔÂ13ÈÕ£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬ £¬£¬Ä«Î÷¸ç¹úÓеçÁ¦¹«Ë¾Áª°îµçÁ¦Î¯Ô±»á£¨CFE£©ÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬ÆäÍøÂçºÍÍþв¾¯±¨ÈÕ־ͨ¹ýµÚÈý·½Çå¾²¹«Ë¾TelikoÖÎÀíµÄKibanaʵÀý¹ûÕæÌ»Â¶£¬£¬£¬ £¬£¬Êý¾ÝÁ¿Áè¼Ý600GB¡£¡£¡£¡£×÷ΪΪīÎ÷¸ç99%Éú³Ý¹©µçµÄ½¹µãÄÜÔ´»ú¹¹£¬£¬£¬ £¬£¬CFE´Ë´ÎйÃÜÊÂÎñ±»ÆÀ¹ÀΪ¿ÉÄÜÍþвÌìϵçÁ¦¹©Ó¦Çå¾²µÄÖØ´óΣº¦¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸ÇÔ±¹¤×°±¸DNSÅÌÎʼͼ¡¢»á¼ûµÄURL¡¢Éî¶È°ü¼ì²â£¨DPI£©ÈÕÖ¾¼°·´¶ñÒâÈí¼þ¹¤¾ßÌìÉúµÄ¾¯±¨£¬£¬£¬ £¬£¬Ê±¼ä¿ç¶È¿É×·ËÝÖÁ2021Äê11Ô¡£¡£¡£¡£ÕâЩÈÕÖ¾ÓÉÍйܼì²âÓëÏìÓ¦£¨MDR£©½â¾ö¼Æ»®AIsaacÌìÉú£¬£¬£¬ £¬£¬Ïêϸ¼Í¼ÁËCFEÄÚ²¿ÍøÂç¼Ü¹¹¡¢Ò×Êܹ¥»÷×°±¸¼°Ð§ÀÍÁбí¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬ £¬£¬¹¥»÷Õß¿É̫ͨ¹ýÎö´ËÀàÊý¾Ý»æÖÆCFEÇå¾²·ÀÓùͼÆ×£¬£¬£¬ £¬£¬Ê¶±ð±¡Èõ»·½Ú²¢ÊµÑ龫׼¹¥»÷¡£¡£¡£¡£³ýÔËÓªÍþвÍ⣬£¬£¬ £¬£¬Ô±¹¤»¥ÁªÍø»î¶¯ÈÕÖ¾µÄй¶»¹×é³ÉÒþ˽Σº¦¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃÓòÃûʹÓÃģʽע²á·ÂðÓòÃû£¬£¬£¬ £¬£¬Á¬ÏµÐ¹Â¶µÄÄÚ²¿¹¤¾ßÐÅÏ¢Ìᳫ¸ß¶È±ÆÕæµÄÓã²æÊ½ÍøÂç´¹ÂÚ¡£¡£¡£¡£


https://cybernews.com/security/cfe-data-leak-mexico-critical-infrastructure/


4. Crypto24ÀÕË÷Èí¼þʹÓÃ×Ô½ç˵EDR¹æ±Ü¹¤¾ß¹¥»÷´óÐÍ×éÖ¯


8ÔÂ14ÈÕ£¬£¬£¬ £¬£¬2024Äê9ÔÂÊ״α»ÆØ¹âµÄCrypto24ÀÕË÷Èí¼þ×éÖ¯Ëäδ¹ãΪÈËÖª£¬£¬£¬ £¬£¬µ«ÆäÕë¶ÔÈ«Çò½ðÈÚ¡¢ÖÆÔì¡¢¿Æ¼¼µÈÁìÓò¸ß¼ÛֵĿµÄµÄ¶¨Ïò¹¥»÷ÒÑÒý·¢Çå¾²½ç¹Ø×¢¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Åú×¢£¬£¬£¬ £¬£¬¸Ã×éÖ¯ºÜ¿ÉÄÜÓÉ×ÅÃûÀÕË÷Èí¼þÍÅ»ïǰ³ÉÔ±×齨£¬£¬£¬ £¬£¬Õ¹ÏÖ³ö¸ß¶ÈµÄÊÖÒÕ³ÉÊì¶ÈÓëÕ½ÊõÒþ²ØÐÔ¡£¡£¡£¡£Æä¹¥»÷Á´ÒÔ¶¨ÖÆ»¯¹¤¾ßΪ½¹µã£¬£¬£¬ £¬£¬ÐγɴӳõʼÈëÇÖµ½Êý¾ÝÍâйµÄÈ«Á÷³ÌÍþвϵͳ¡£¡£¡£¡£ÔÚÈëÇֽ׶Σ¬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ý¼¤»îWindowsĬÈÏÖÎÀíÔ±ÕË»§»ò½¨ÉèÐÂÓû§ÊµÏÖ³¤ÆÚ»¯»á¼û£¬£¬£¬ £¬£¬Ëæºó°²ÅÅÅú´¦Öóͷ£¾ç±¾Óëϵͳö¾ÙÏÂÁչÕì̽£¬£¬£¬ £¬£¬½¨ÉèÃûΪWinMainSvcµÄ¼üÅ̼ͼЧÀÍÓëMSRuntimeÀÕË÷Èí¼þ¼ÓÔØÆ÷¡£¡£¡£¡£Îª¹æ±ÜÇå¾²¼ì²â£¬£¬£¬ £¬£¬¸Ã×éÖ¯¿ª·¢ÁËRealBlindingEDR¹¤¾ßµÄ±äÖÖ£¬£¬£¬ £¬£¬Í¨Ì«¹ýÎöÄÚºËÇý¶¯ÔªÊý¾ÝÆ¥ÅäÓ²±àÂë³§ÉÌÁбí£¬£¬£¬ £¬£¬º­¸ÇÇ÷ÊÆ¿Æ¼¼¡¢¿¨°Í˹»ù¡¢SentinelOneµÈ12¼ÒÇå¾²³§ÉÌ£¬£¬£¬ £¬£¬Õë¶ÔÐÔ½ûÓÃÄں˼¶·À»¤¹³×Ó¡£¡£¡£¡£Êý¾ÝÇÔÈ¡»·½Ú£¬£¬£¬ £¬£¬Crypto24½ÓÄÉË«ÖØÊֶΣº¼üÅ̼ͼÆ÷αװ³É"Microsoft Help Manager"£¬£¬£¬ £¬£¬²¶»ñ°üÀ¨¹¦Ð§¼üÔÚÄÚµÄÓû§²Ù×÷Óë´°¿ÚÎÊÌ⣻£» £»£»£»ºáÏòÒÆ¶¯Ôòͨ¹ýSMB¹²ÏíʵÏÖ£¬£¬£¬ £¬£¬×îÖÕʹÓö¨ÖÆWinINET API¹¤¾ß½«Êý¾Ýй¶ÖÁGoogle Drive¡£¡£¡£¡£ÀÕË÷½×¶Î£¬£¬£¬ £¬£¬¹¥»÷ÕßÔÚɾ³ýϵͳ¾íÓ°¸±±¾ºó´¥·¢¼ÓÃܳÌÐò¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/


5. ¼ÓÄôóÏÂÒéÔºÔâÍøÂç¹¥»÷Êý¾Ýй¶£¬£¬£¬ £¬£¬Î¢ÈíÎó²î³ÉÍ»ÆÆ¿Ú


8ÔÂ14ÈÕ£¬£¬£¬ £¬£¬¼ÓÄôóÏÂÒéÔºÕýÊÓ²ìÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ýʹÓÃ΢Èí½üÆÚÅû¶µÄÇå¾²Îó²î£¬£¬£¬ £¬£¬ÀÖ³ÉÇÔȡԱ¹¤Ãô¸ÐÐÅÏ¢²¢ÈëÇÖÖÎÀíÏÂÒéÔºÅÌËã»ú¼°Òƶ¯×°±¸µÄ½¹µãÊý¾Ý¿â¡£¡£¡£¡£¾Ý¼ÓÄôó¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬ £¬£¬ÏÂÒéÔºÊÂÇéÖ°Ô±ÒÑÓÚÖÜһͨ¹ýÓʼþÊÕµ½Î¥¹æÍ¨Öª£¬£¬£¬ £¬£¬µ«¹Ù·½ÉÐδ¹ûÕæÉùÃ÷ÊÂÎñϸ½Ú¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬ £¬£¬ÍþвÐÐΪÕßʹÓÃ΢Èí²úÆ·ÖеÄδÐÞ²¹Îó²î»ñÈ¡Êý¾Ý¿â»á¼ûȨÏÞ£¬£¬£¬ £¬£¬ÍµÈ¡Á˰üÀ¨Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢°ì¹«ËùÔÚ¼°µç×ÓÓʼþµØµãÔÚÄڵķǹûÕæÊý¾Ý¡£¡£¡£¡£ÏÂÒéÔºÒѱ޲ßÏà¹ØÖ°Ô±Ð¡ÐÄʹÓñ»µÁÐÅϢʵÑéµÄڲƭÐÐΪ£¬£¬£¬ £¬£¬Èçð³äÒéÔ±»ò¾ÙÐÐÕ©Æ­¡£¡£¡£¡£¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÈ·ÈÏÕýÔÚЭÖúÊӲ죬£¬£¬ £¬£¬µ«Î´½«¹¥»÷¹éÒòÓÚÌØ¶¨Íþв×éÖ¯£¬£¬£¬ £¬£¬Ç¿µ÷ÍøÂçÊÂÎñ¹éÒòÐèãýÃð×ÊÔ´Óëʱ¼ä£¬£¬£¬ £¬£¬Éæ¼°¶àÖØÖØ´óÒòËØ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓõÄÎó²î¿ÉÄÜÓë΢Èí½üÆÚÅû¶µÄÁ½¸ö¸ßΣÎó²îÏà¹Ø£ºCVE-2025-53770£¨ToolShell£©ºÍCVE-2025-53786¡£¡£¡£¡£ÆäÖУ¬£¬£¬ £¬£¬CVE-2025-53770×Ô7Ô³õÆð±»¶à¹úÍþвÕûÌåÆÕ±éʹÓ㻣» £»£»£»¶øCVE-2025-53786×÷ΪMicrosoft ExchangeÎó²î£¬£¬£¬ £¬£¬ÔÊÐí¹¥»÷ÕßÔÚÔÆÇéÐÎÖкáÏòÒÆ¶¯£¬£¬£¬ £¬£¬Òѱ»ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐΪ½ôÆÈÖ¸Á£¬£¬ £¬£¬ÒªÇó·Ç¾üÊ»ú¹¹Á¬Ã¦ÐÞ²¹¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadas-house-of-commons-investigating-data-breach-after-cyberattack/


6. ŲÍþ²¼À×â¸ñ´ó°ÓÔâÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷


8ÔÂ14ÈÕ£¬£¬£¬ £¬£¬Å²Íþ²¼À×â¸ñ´ó°ÓÓÚ2025Äê4ÔÂÔâÓöÇ×¶íºÚ¿Í×éÖ¯ÍøÂç¹¥»÷£¬£¬£¬ £¬£¬ÆäÒªº¦Êý×Ö¿ØÖÆÏµÍ³±»ÈëÇÖ£¬£¬£¬ £¬£¬Á÷³ö·§Ãű»¶ñÒâ·­¿ª£¬£¬£¬ £¬£¬µ¼ÖÂÁè¼Ý720ÍòÉý£¨190Íò¼ÓÂØ£©Ë®Á÷³ö¡£¡£¡£¡£´Ë´ÎÊÂÎñ±»Å²Íþ¾¯Ô±Çå¾²¾Ö£¨PST£©ÊÓΪ¶íÂÞ˹¶ÔÒªº¦»ù´¡ÉèʩԶ³Ì¹¥»÷ÄÜÁ¦µÄÌåÏÖ£¬£¬£¬ £¬£¬µ«¸üÇãÏòÓÚÊÇÒ»´Î¡°ÄÜÁ¦Õ¹Ê¾¡±¶ø·ÇʵÖÊÐÔÆÆË𡣡£¡£¡£¾ÝPSTÈÏÕæÈ˱´æ«ÌØ¡¤¸Ê¼Ó˹ÔÚ°¢Â×´ï¶ûËÕ¿¨ÌìÏÂÂÛ̳ÉÏ͸¶£¬£¬£¬ £¬£¬ºÚ¿ÍÐÐΪµÄ½¹µãÄ¿µÄ²¢·ÇÖ±½ÓÔì³ÉÎïÀíË𺦣¬£¬£¬ £¬£¬¶øÊÇͨ¹ý¹ûÕæÑÝʾÊÖÒÕÄÜÁ¦Ê©¼ÓÐÄÀíÓ°Ï죬£¬£¬ £¬£¬ÔÚÃñÖÚÖÐÖÆÔì¿Ö¾åÓ벻ȷ¶¨ÐÔ¡£¡£¡£¡£ÕâÒ»ÅжÏÓëŲÍþ¹ú¼ÒÐÌÊÂÊÓ²ì¾Ö£¨Kripos£©µÄÊÓ²ì½áÂÛÒ»Ö£ººÚ¿ÍÔÚTelegramƽ̨Ðû²¼ÁËÒ»¶ÎÈý·ÖÖÓÊÓÆµ£¬£¬£¬ £¬£¬Õ¹Ê¾´ó°Ó¿ØÖÆÃæ°å²Ù×÷½çÃæ£¬£¬£¬ £¬£¬²¢´øÓÐÓëÇ×¶íÍøÂç·¸·¨×éÖ¯¹ØÁªµÄˮӡ¡£¡£¡£¡£´ËÀàÐÐΪ´ËÇ°ÔøÓëSandworm (APT44) µÈ¹ú¼ÒÖ§³ÖµÄ×éÖ¯ÓйØ£¬£¬£¬ £¬£¬±»ÓÃÓÚÇ¿µ÷ÍþвÉùÃ÷£¬£¬£¬ £¬£¬¼ÈÐßÈèÊܹ¥»÷·½£¬£¬£¬ £¬£¬ÓÖÏòÎ÷·½×ª´ïÍøÂçÕ½ÄÜÁ¦ÐźÅ¡£¡£¡£¡£ÊÂÎñÖУ¬£¬£¬ £¬£¬´ó°ÓÖÎÀíÔ±ºÄʱԼËÄСʱ²Å·¢Ã÷·§ÃÅÒì³£²¢ÐÞ¸´ÉèÖ㬣¬£¬ £¬£¬µ«×ß©ÒѶԾֲ¿Ë®Á÷µ÷¿Ø±¬·¢Ó°Ïì¡£¡£¡£¡£Ö»¹ÜŲÍþÓë¶íÂÞ˹δ´¦ÓÚÖ±½ÓÕ½Õù״̬£¬£¬£¬ £¬£¬µ«ÆÕ¾©ÕþȨÕýͨ¹ý»ìÏýÕ½ÕùÊÖ¶Îά³Ö¶ÔÎ÷·½µÄÖ÷ҪѹÁ¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pro-russian-hackers-blamed-for-water-dam-sabotage-in-norway/