ºÚ¿ÍÉù³Æ¹«¹²Æû³µÔâÈëÇÖ£¬£¬£¬£¬µ«Î´ÄÜÌṩ֤¾Ý

Ðû²¼Ê±¼ä 2025-06-04

1. ºÚ¿ÍÉù³Æ¹«¹²Æû³µÔâÈëÇÖ£¬£¬£¬£¬µ«Î´ÄÜÌṩ֤¾Ý


6ÔÂ2ÈÕ£¬£¬£¬£¬µÂ¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ·ºÆðÔÚÀÕË÷Èí¼þ¼¯ÍÅStormousµÄ°µÍøÐ¹ÃÜÍøÕ¾ÉÏ£¬£¬£¬£¬Òý·¢ÁË¶ÔÆäÊý¾ÝÇå¾²µÄ¹Ø×¢¡£¡£¡£¡£¹«¹²Æû³µ¼¯ÍÅÓÚ5ÔÂβÅû¶ÁËÓë¸ÃÀÕË÷Èí¼þÍÅ»ïµÄÁªÏµ£¬£¬£¬£¬²¢Ö¸³öÍþвÐÐΪÕßÉù³ÆÄÜ»á¼ûÓû§ÕÊ»§Êý¾Ý¡¢Éí·ÝÑéÖ¤ÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Ñо¿Ö°Ô±ÏÖÔÚÎÞ·¨È·ÈϹ«¹²Æû³µ¼¯ÍŵÄÊý¾ÝÊÇ·ñ±»ÇÔÈ¡¡£¡£¡£¡£StormousÀÕË÷Èí¼þÍÅ»ïÔÚ°µÍøÉù³Æ½«ÔÚ¼¸ÌìÄÚÐû²¼¹«Ë¾Êý¾Ý£¬£¬£¬£¬ÕâÊÇÆäϰÓõÄʩѹÊֶΣ¬£¬£¬£¬Í¨³£ÍøÂç·¸·¨·Ö×Ó»áÐû²¼Êý¾ÝÑù±¾ÒÔ֤ʵÆä¿ÉÐŶÈ£¬£¬£¬£¬µ«´Ë´Î¸ÃÍÅ»ï½ö·ÖÏíÁËÎÞЧÁ´½Ó£¬£¬£¬£¬Î´ÌṩÓмÛÖµÄÚÈÝ¡£¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬Stormous×÷ΪµØÏÂÀÕË÷Èí¼þÁìÓòµÄ×ÅÃû¼ÓÈëÕߣ¬£¬£¬£¬´Ë´ÎÐÐΪ¿ÉÄÜÖ¼ÔÚÏò¹«¹²Æû³µ¼¯ÍÅʩѹ£¬£¬£¬£¬ÆÈʹÆäÖª×ãÊê½ðÒªÇ󡣡£¡£¡£Ò»µ©Êý¾Ýй¶»ñµÃ֤ʵ£¬£¬£¬£¬½«Î£¼°¹«Ë¾Óû§£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÕË»§±»µÁºÍδ¾­ÊÚȨµÄ»á¼ûʵÑ飬£¬£¬£¬Í¬Ê±ÉæÏÓй¶µÄСÎÒ˽¼ÒÐÅÏ¢Ò²¿ÉÄÜΣ¼°Òþ˽¡£¡£¡£¡£StormousÀÕË÷Èí¼þÍÅ»ï×Ô2022ÄêÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬£¬ÒѳÉΪ¸ÃÁìÓòµÄÂÄÀú¸»ºñ¼ÓÈëÕߣ¬£¬£¬£¬¸ÃÍÅ»ïÔÚÒÑÍù12¸öÔÂÄÚÖÁÉÙ¹¥»÷ÁË34¸ö×éÖ¯¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¹«¹²Æû³µ¼¯ÍÅÉÐδ¾Í´Ë´ÎÊÂÎñ½ÒÏþ½øÒ»²½ÉùÃ÷£¬£¬£¬£¬¸÷ÆÓÖ±Ç×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£


https://cybernews.com/security/volkswagen-data-breach-claim-lacks-evidence/


2. MainStreetÒøÐй©Ó¦ÉÌÔâ¹¥»÷Ö¿ͻ§ÐÅϢй¶


6ÔÂ3ÈÕ£¬£¬£¬£¬ÃÀ¹úMainStreetÒøÐÐÅû¶ÆäÏàÖú¹©Ó¦ÉÌÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂÔ¼5%µÄ¿Í»§Ãô¸ÐÐÅϢй¶¡£¡£¡£¡£¸ÃÐÐÔÚÌá½»¸øÃÀ¹úÖ¤½»»á£¨SEC£©µÄÎļþÖÐÌåÏÖ£¬£¬£¬£¬3Ô»ñÖª¹©Ó¦ÉÌϵͳ±»ÈëÇֺ󣬣¬£¬£¬Á¬Ã¦ÖÕÖ¹ÁËÓë¸Ã¹©Ó¦É̵ÄËùÓÐÏàÖú£¬£¬£¬£¬²¢ÓÚ4ÔÂÏÂÑ®Íê³ÉÊÂÎñ¹æÄ£Éó²é£¬£¬£¬£¬µ«Î´»ØÓ¦ÏêϸÊܺ¦ÈËÊý¼°ÐÅÏ¢ÀàÐ͵ÄÖÊѯ¡£¡£¡£¡£ÊÓ²ìÈ·ÈÏÒøÐÐ×ÔÉíϵͳδÊÜÈëÇÖ£¬£¬£¬£¬¿Í»§ÕË»§×ʽðÇå¾²ÎÞÓÝ£¬£¬£¬£¬ÒøÐÐÒÑÓÚ5ÔÂ26ÈÕ֪ͨî¿Ïµ»ú¹¹¼°¿Í»§£¬£¬£¬£¬²¢ÎªÊÜÓ°Ïì¿Í»§½¨Éè¿ÉÒɻ¼à²âϵͳ¡£¡£¡£¡£ÒøÐÐÉùÃ÷¸ÃÊÂÎñδ¶ÔÆäÔËÓª±¬·¢ÖØ´óÓ°Ï죬£¬£¬£¬´ÓÆä×îвƱ¨À´¿´£¬£¬£¬£¬´æ¿îÔ¼19ÒÚÃÀÔª£¬£¬£¬£¬¾»ÀûÈó250ÍòÃÀÔª£¬£¬£¬£¬Óë2024Äê¿÷Ëð998ÍòÃÀÔªµÄÇéÐÎÏà±ÈÒÑÓиÄÉÆ¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÃÀ¹úÎå´óÒøÐÐЭ»áÁªºÏÖº¯SECÒªÇ󯯳ýÍøÂçÇå¾²ÊÂÎñÇ¿ÖÆÅû¶»®¶¨Ö®¼Ê£¬£¬£¬£¬¸Ã¹æÕÂ×Ô2023ÄêÉúЧÒÔÀ´£¬£¬£¬£¬Ò»Ö±Êܵ½¹ú»áÓëÒøÐÐÒµµÄÅê»÷£¬£¬£¬£¬±»Ö¸ÔöÌíºÏ¹æÎ£º¦±¾Ç®£¬£¬£¬£¬Î´ÄÜÌṩÓÐÓÃͶ×ʾöÒéÐÅÏ¢£¬£¬£¬£¬·´¶ø¡°×è°­×ÊÔ´ÐγɻúÖÆ¡±¡£¡£¡£¡£


https://therecord.media/Main-street-cyber-incident-bank


3. ºÏ¹æ×Ô¶¯»¯ÉÌVantaÈí¼þÎó²îÖ¿ͻ§Êý¾Ýй¶


6ÔÂ3ÈÕ£¬£¬£¬£¬ºÏ¹æ×Ô¶¯»¯ÌṩÉÌVantaÈ·Èϱ¬·¢ÁËÒ»ÆðÖØ´óÈí¼þÎó²îµ¼ÖµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Êý°ÙÃû¿Í»§Êܵ½Ó°Ïì¡£¡£¡£¡£VantaÒÔ×ÊÖúÆóÒµÖÎÀíÇå¾²ºÍºÏ¹æÐÔÖø³Æ£¬£¬£¬£¬È»¶ø´Ë´ÎÈ´ÒòÍøÂçÇå¾²ÎÊÌâÏÝÈë·ç²¨¡£¡£¡£¡£5ÔÂ26ÈÕ£¬£¬£¬£¬VantaÍŶӷ¢Ã÷ÕâÒ»ÑÏÖØÎÊÌâ¡£¡£¡£¡£ÓÉÓÚ²úÆ·±ä»»ÒýÆðµÄ´úÂë¹ýʧ£¬£¬£¬£¬Ãô¸ÐÔ±¹¤Êý¾Ý¡¢ÕË»§ÉèÖ÷½·¨¡¢Ë«ÒòËØÉí·ÝÑéÖ¤£¨MFA£©Ê¹ÓÃÏêÇé¼°¹¤¾ßÉèÖÃÐÅÏ¢µÈ±»¡°¹ýʧµØµ¼È롱µ½ÆäËû¿Í»§ÕË»§¡£¡£¡£¡£VantaÌåÏÖ¡°Ö»Óв»µ½4%µÄ¿Í»§¡±Êܵ½Ó°Ï죬£¬£¬£¬µ«ÕâÈÔÒâζ×ÅÊý°Ù¼ÒÆóÒµÊý¾Ýй¶¡£¡£¡£¡£VantaÊ×ϯ²úÆ·¹ÙJeremy Epling֤ʵÁË´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬²¢Ö¸³ö¡°²»µ½20%µÄµÚÈý·½¼¯³ÉÊý¾Ý×Ó¼¯Ì»Â¶¸øÁËÆäËûVanta¿Í»§¡±¡£¡£¡£¡£VantaÒÑ×îÏÈ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬¼û¸æÆäÔ±¹¤ÕÊ»§Êý¾Ý±»¹ýʧ²åÈëµ½ÆäËû¿Í»§ÊµÀýÖС£¡£¡£¡£·¢Ã÷´ËÎÊÌâºó£¬£¬£¬£¬VantaÁ¬Ã¦»Ø¹öÁ˱任²¢Æô¶¯ÐÞ¸´ÊÂÇ飬£¬£¬£¬ÍýÏëÔÚ6ÔÂ4ÈÕǰÍê³ÉÐÞ¸´£¬£¬£¬£¬ËùÓÐÊÜÓ°ÏìµÄ¿Í»§¶¼ÒÑÊÕµ½Í¨Öª£¬£¬£¬£¬¿Í»§Ö§³ÖÍŶÓÕýÔÚ½â´ðÒÉÎʺÍÇëÇ󡣡£¡£¡£Îª±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬£¬VantaÕýÔÚ¸üеÚÈý·½¼¯³ÉAPI²¢Ë¢Ð»á¼û¿ØÖƲâÊÔ¡£¡£¡£¡£


https://hackread.com/code-bug-compliance-vanta-data-leak-customer-clients/


4. µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÔºÔâInterLockÀÕË÷Èí¼þ¹¥»÷


6ÔÂ3ÈÕ£¬£¬£¬£¬InterLockÀÕË÷Èí¼þ×ßÂ©ÍøÕ¾½üÆÚ½«Texas Digestive Specialists£¨µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½Éú¼¯ÍÅ£©ÁÐÈëÆä×ß©Áбí£¬£¬£¬£¬Éù³ÆÒÑÇÔÈ¡²¢×ß©Á˸ÃÒ½ÁƼ¯ÍÅ263GBµÄÊý¾Ý£¬£¬£¬£¬Éæ¼°16920¸öÎļþ¼ÐºÍ215245¸öÎļþ¡£¡£¡£¡£DataBreaches¶ÔÊý¾Ý¼¯¾ÙÐÐÁ˳éÑùÊӲ죬£¬£¬£¬ËäÔÚ¸ÃÒ½ÁƼ¯ÍŹÙÍøÎ´·¢Ã÷Òì³£»£» £» £»òй¶ÐÅÏ¢£¬£¬£¬£¬µ«·¢Ã÷InterLockÒѼÓÃÜÎļþ£¬£¬£¬£¬ÇÒÐí¶à°üÀ¨Êܱ£»£» £» £»¤¿µ½¡ÐÅÏ¢£¨PHI£©µÄÎļþΪʵÑéÊÒ²¡Àí±¨¸æµÄ.pdfÎļþ¡£¡£¡£¡£ÕâЩʵÑéÊÒ±¨¸æÏêϸ¼Í¼ÁË»¼ÕßµÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ì²éÈÕÆÚ¡¢Ïà¹Ø²¡Ê·ºÍ¼ì²éЧ¹û£¬£¬£¬£¬ÔÚÒ»¸öѹËõµµ°¸Öоͷ¢Ã÷ÁËÁè¼Ý2Íò·Ý´ËÀ౨¸æ£¬£¬£¬£¬Ê±¼ä¿ç¶È´Ó2023Äê8Ôµ½2025ÄêÍ·£¬£¬£¬£¬ÁíÒ»¸öµµ°¸»¹°üÀ¨375Ò³¹ØÓÚ2024Ä겿·Öʱ¼äµãÖ¸¶¨»¼ÕߵIJ¡Àí±¨¸æ£¬£¬£¬£¬ÇÒËùÓб¨¸æ¾ùÓ¡Óе¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÉúµÄÑöÃæ¡£¡£¡£¡£µÂ¿ËÈøË¹Ïû»¯×¨¿ÆÒ½ÔºÎª³ÉÈ˺ͶùͯÌṩҽÁƺÍÍâ¿ÆÐ§ÀÍ£¬£¬£¬£¬Ôڵ¿ËÈøË¹ÖÝÉèÓÐÈý¸öÕïËù¡£¡£¡£¡£DataBreachesÒÑÏò¸ÃÒ½Ôº·¢ËÍÁªÏµ±í¸ñѯÎÊÆä¶ÔÒÉËÆÀÕË÷Èí¼þ¹¥»÷µÄ»ØÓ¦£¬£¬£¬£¬µ«×èÖ¹·¢¸å£¬£¬£¬£¬Ò½ÔºÉÐδ»Ø¸´£¬£¬£¬£¬Ò²Î´¾ÍÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©»òµÂ¿ËÈøË¹ÖÝ×ÜÉó²é³¤°ì¹«ÊҵĹ«¹²Î¥¹æ¹¤¾ßÌá½»Èκα¨¸æ¡£¡£¡£¡£


https://databreaches.net/2025/06/03/texas-gastroenterology-and-surgical-practice-victim-of-ransomware-attack/


5. Ó¡¶ÈÔÓ»õÅäËÍKiranaProÔâºÚ¿Í¹¥»÷ÖÂÊý¾Ý±»Çå


6ÔÂ3ÈÕ£¬£¬£¬£¬Ó¡¶ÈÔÓ»õÅäËÍÊ×´´¹«Ë¾KiranaProÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬ËùÓÐÊý¾Ý±»É¨³ý£¬£¬£¬£¬ÆäÊ×´´ÈËDeepak Ravindran֤ʵÁËÕâÒ»ÐÂÎÅ¡£¡£¡£¡£±»Ïú»ÙµÄÊý¾Ýº­¸ÇÓ¦ÓóÌÐò´úÂ롢ЧÀÍÆ÷ÐÅÏ¢ÒÔ¼°´ó×ÚÃô¸Ð¿Í»§ÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢ÓʼĵصãºÍ¸¶¿îÏêϸÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾µÄÓ¦ÓóÌÐòËäÈÔÔÚÏߣ¬£¬£¬£¬µ«ÒÑÎÞ·¨´¦Öóͷ£¶©µ¥¡£¡£¡£¡£KiranaProÓÚ2024Äê12ÔÂÍÆ³ö£¬£¬£¬£¬ÊÇÓ¡¶ÈÕþ¸®Êý×ÖÉÌÎñ¿ª·ÅÍøÂçÉϵÄÂò¼ÒÓ¦ÓóÌÐò£¬£¬£¬£¬ÔÊÐí¿Í»§´ÓÍâµØÊÐËÁºÍÖÜΧ³¬ÊйºÖÃÔÓ»õ£¬£¬£¬£¬ÓµÓÐ5.5ÍòÃû¿Í»§£¬£¬£¬£¬ÆäÖÐ3ÍòÖÁ3.5ÍòÃû»îÔ¾Âò¼Ò±é²¼50¸ö¶¼»á£¬£¬£¬£¬ÖðÈÕ×ܼÆÏµ¥2000±Ê¡£¡£¡£¡£¸Ã¹«Ë¾Ìṩ»ùÓÚÓïÒôµÄ½çÃæ£¬£¬£¬£¬Ö§³Ö¶àÖÖÓïÑÔϵ¥¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬5ÔÂ26ÈÕ£¬£¬£¬£¬KiranaPro¸ß¹ÜµÇ¼ÑÇÂíÑ·ÍøÂçЧÀÍ£¨AWS£©ÕË»§Ê±·¢Ã÷Òì³££¬£¬£¬£¬ºÚ¿ÍÀֳɻá¼ûÁËÆäÔÚAWSºÍGitHubÉϵĸùÕË»§¡£¡£¡£¡£Ê×ϯÊÖÒÕ¹ÙSaurav KumarÖ¸³ö£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ5ÔÂ24ÈÕÖÁ25ÈÕ×óÓÒ£¬£¬£¬£¬ÆäʱAWSÕË»§µÄ¶àÒòËØÉí·ÝÑéÖ¤´úÂë±»¸ü¸Ä£¬£¬£¬£¬ËùÓÐÔÊÐí¿Í»§»á¼ûÐéÄâÅÌËã»úÔËÐÐÓ¦ÓóÌÐòµÄEC2ЧÀͱ»É¾³ý£¬£¬£¬£¬ÇÒ¹«Ë¾ÎÞ·¨»ñÈ¡ÈκÎÈÕÖ¾£¬£¬£¬£¬ÓÉÓÚȱ·¦¸ùÕË»§È¨ÏÞ¡£¡£¡£¡£RavindranÌåÏÖ£¬£¬£¬£¬KiranaProÒÑÁªÏµGitHubÖ§³ÖÍŶÓ£¬£¬£¬£¬Ð­Öúʶ±ðºÚ¿ÍIPµØµãºÍÆäËû¹¥»÷ºÛ¼££¬£¬£¬£¬²¢ÕýÔÚ¶Ôǰ¹ÍÔ±ÌáÆðËßËÏ£¬£¬£¬£¬³ÆÆäδÌá½»»á¼ûGitHubÕË»§µÄƾ֤¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¹¥»÷Ïêϸ·½·¨Éв»ÇåÎú£¬£¬£¬£¬µ«½üÄêÀ´Ò»Ð©´óÐÍÍøÂç¹¥»÷¶àÓÉÆ¾Ö¤ÍµÇÔÒýÆð¡£¡£¡£¡£


https://techcrunch.com/2025/06/03/indian-grocery-startup-kiranapro-was-hacked-and-its-servers-deleted-ceo-confirms/


6. ¶ñÒâÈí¼þCrocodilusÌí¼ÓÐéαÁªÏµÈËÓÕÆ­È«ÇòÓû§


6ÔÂ3ÈÕ£¬£¬£¬£¬×îа桰Crocodilus¡±Android¶ñÒâÈí¼þ½ø»¯£¬£¬£¬£¬ÍþвÉý¼¶¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2025Äê3ÔÂÏÂÑ®±»Threat FabricÑо¿Ö°Ô±Ê״μͼ£¬£¬£¬£¬ÔçÆÚ°æ±¾ÒѾ߱¸ÆÕ±éÊý¾Ý͵ÇÔºÍÔ¶³Ì¿ØÖƹ¦Ð§£¬£¬£¬£¬»¹Í¨¹ýÐéα¹ýʧÐÂΞÙÐÐÉç»á¹¤³ÌʵÑ飬£¬£¬£¬ÓÕµ¼Óû§Ð¹Â¶¼ÓÃÜÇ®±ÒÇ®°üÃÜÔ¿£¬£¬£¬£¬Æäʱ½öÔÚÍÁ¶úÆäÓÐС¹æÄ£»£» £» £»î¶¯¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Threat FabricÒ»Á¬¼à¿Ø·¢Ã÷£¬£¬£¬£¬CrocodilusÒѽ«Ä¿µÄ¹æÄ£À©´óÖÁÈ«Çò¡£¡£¡£¡£×îа汾ÒýÈëлúÖÆ£¬£¬£¬£¬ÔÚÊÜѬȾװ±¸ÁªÏµÈËÁбíÖÐÌí¼ÓÐéαÁªÏµÈË£¬£¬£¬£¬µ±Êܺ¦Õß½Óµ½ÍþвÐÐΪÕߵ绰ʱ£¬£¬£¬£¬×°±¸»áÏÔʾÐéαÁªÏµÈËÐÕÃû¶ø·ÇÀ´µçÕßID£¬£¬£¬£¬ÍþвÐÐΪÕ߿ɽè´Ëð³äÒøÐС¢¹«Ë¾»òÇ×ÓÑ£¬£¬£¬£¬Ê¹Í¨»°¸ü¾ßÒÉ»óÐÔ£¬£¬£¬£¬´Ë²Ù×÷ÔÚÊÕµ½Ìض¨ÃüÁîʱ´¥·¢£¬£¬£¬£¬Í¨¹ý±à³Ì·½·¨½¨ÉèÐÂÍâµØÁªÏµÈË¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ð°汾»¹Í¨¹ý´úÂë´ò°üºÍÌØÊâXOR¼ÓÃÜÌáÉýÌӱܹ¥»÷ÄÜÁ¦£¬£¬£¬£¬´úÂë¾í»ýºÍ¾À²øÊ¹ÄæÏò¹¤³Ì¸üÄÑÌ⣬£¬£¬£¬»¹ÐÂÔöÍâµØÆÊÎö±»µÁÊý¾Ý¹¦Ð§£¬£¬£¬£¬ÒÔʵÏÖ¸ü¸ßÖÊÁ¿µÄÊý¾ÝÍøÂç¡£¡£¡£¡£CrocodilusµÄ¿ìËÙ½ø»¯ÏÔʾ³öÆä¶ÔÉç»á¹¤³ÌѧµÄÉî¶ÈÔËÓ㬣¬£¬£¬³ÉΪһÖÖÌØÊâΣÏյĶñÒâÈí¼þ¡£¡£¡£¡£¼øÓÚÆäÍþв£¬£¬£¬£¬½¨ÒéAndroidÓû§ÏÂÔØÈí¼þʱ¼á³ÖʹÓÃGoogle Play»ò¿ÉÐÅÈεÄÐû²¼ÉÌ£¬£¬£¬£¬È·±£Play ProtectʼÖÕ´¦ÓÚ¼¤»î״̬£¬£¬£¬£¬²¢Ö»¹ÜïÔ̭ʹÓÃÓ¦ÓóÌÐòµÄÊýÄ¿£¬£¬£¬£¬ÒÔ½µµÍѬȾΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-malware-crocodilus-adds-fake-contacts-to-spoof-trusted-callers/