°ÍÄÃÂí¾¼ÃºÍ²ÆÎñ²¿ÔâINCÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2025-09-151. °ÍÄÃÂí¾¼ÃºÍ²ÆÎñ²¿ÔâINCÀÕË÷Èí¼þ¹¥»÷
9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬°ÍÄÃÂí¾¼ÃºÍ²ÆÎñ²¿£¨MEF£©¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬Æäһ̨ÊÂÇéÕ¾ÅÌËã»ú¿ÉÄÜÔâÓö¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Õþ¸®ÒÑÆô¶¯Çå¾²³ÌÐò²¢Ç¿µ÷ÊÂÎñÒÑ»ñµÃ¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬Î´Ó°Ïì½¹µãϵͳÔËÓª¡£¡£¡£¡£¡£¡£MEFÔÚ¹Ù·½ÉùÃ÷ÖÐÖ¸³ö£¬£¬£¬£¬£¬£¬£¬¼ì²âµ½Òì³£ºóÁ¬Ã¦¼¤»î¼È¶¨Çå¾²ÐÒ飬£¬£¬£¬£¬£¬£¬ÔöÇ¿Õû¸öITϵͳµÄÔ¤·À²½·¥£¬£¬£¬£¬£¬£¬£¬²¢Ã÷È·ÖÐÑëϵͳ¼°Æ½Ì¨¾ùδÊÜË𣬣¬£¬£¬£¬£¬£¬ÏÖÔÚÕý³£ÔËÐС£¡£¡£¡£¡£¡£×÷Ϊ°ÍÄÃÂí½¹µã²ÆÎñÖÎÀí»ú¹¹£¬£¬£¬£¬£¬£¬£¬MEFÈÏÕæ²ÆÎñÕþ²ßÖÆ¶©¡¢¹«¹²Ö§³öµ÷¿Ø¡¢Õ®ÎñÖÎÀí¼°°ÍÄÃÂíÔ˺ÓÊÕÈëÖÎÀí¡£¡£¡£¡£¡£¡£¸Ã²¿Ç¿µ÷£¬£¬£¬£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÓë»ú¹¹Êý¾ÝÇå¾²£¬£¬£¬£¬£¬£¬£¬²¢ÒÑʵÑéËùÓÐÐÐÒµ±ê×¼·À»¤²½·¥ÒÔÌá·ÀºóÐøÎ£º¦¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯INC RansomÉÏÖÜÔÚ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬Ðû³Æ¶ÔMEFÌᳫ¹¥»÷²¢ÇÔÈ¡Áè¼Ý1.5TBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢²ÆÎñÎļþ¡¢Ô¤ËãÃ÷ϸµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ9ÔÂ5ÈÕ½«MEFÁÐÈëÊܺ¦ÕßÃûµ¥£¬£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶ÄÚ²¿ÎļþÑù±¾×÷ΪΥ¹æÖ¤¾Ý¡£¡£¡£¡£¡£¡£INC Ransom½¨ÉèÓÚ2023ÄêÖÐÆÚ£¬£¬£¬£¬£¬£¬£¬ÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©Ä£Ê½ÔË×÷£¬£¬£¬£¬£¬£¬£¬Ôø¹¥»÷¶à¼Ò×ÅÃûÆóÒµ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/panama-ministry-of-economy-discloses-breach-claimed-by-inc-ransomware/
2. Farmer Bros.ÔâÍøÂç¹¥»÷ÖÂ1.4ÍòÈËÊý¾Ýй¶
9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵĿ§·È¼°Ê³ÎïЧÀ͹«Ë¾Farmer Bros.¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬½ñÄê3Ô³õ±¬·¢µÄÒ»ÆðÍøÂç¹¥»÷µ¼ÖÂÁè¼Ý1.4ÍòÈËÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚϵͳÄÚ¡°áÝá塱½ü12Ììºó±»²ì¾õ£¬£¬£¬£¬£¬£¬£¬¹«Ë¾Ëæ¼´Æô¶¯ÊӲ첢ת´ïÖ´·¨²¿·ÖÐÖú×·²é¡£¡£¡£¡£¡£¡£Êý¾Ýй¶֪ͨÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡Á˲¿·ÖСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«Ïêϸй¶×ֶα»Í¿ºÚδ¹ûÕæ¡£¡£¡£¡£¡£¡£×÷Ϊµ÷½â²½·¥£¬£¬£¬£¬£¬£¬£¬Farmer Bros.ΪÊÜÓ°Ïì¸öÌåÌṩÃâ·ÑÉí·Ý͵ÇÔ¼°ÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬´ËÀàЧÀÍͨ³£Õë¶Ô¿ÉÄܰüÀ¨ÐÕÃû¡¢ÓÊÏä¡¢Éç±£ºÅµÈÃô¸Ð±êʶ·ûµÄй¶³¡¾°£¬£¬£¬£¬£¬£¬£¬ÒÔÌá·ÀÚ²ÆÎ£º¦¡£¡£¡£¡£¡£¡£¹«Ë¾ÌáÐÑÓû§°´ÆÚ¼ì²éÕË»§¼°ÐÅÓñ¨¸æ£¬£¬£¬£¬£¬£¬£¬Ð¡ÐÄÒì³£»£»£»£»î¶¯¡£¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬ChaosÀÕË÷Èí¼þÍÅ»ïÔøÓÚ½ñÄê4Ô³õÐû³ÆÕÆÎոù«Ë¾Êý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË650GBÐÅÏ¢¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ·¨È·ÈϸÃÉùÃ÷Óë±¾´Îй¶ÊÂÎñµÄÖ±½Ó¹ØÁª£¬£¬£¬£¬£¬£¬£¬µ«Ê±¼äÏߵĸ߶ÈÖØºÏÒý·¢Íâ½ç¶ÔÀÕË÷ÍÅ»ï¼ÓÈëµÄÍÆ²â¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/farmer-bros-data-breach-victims/
3. CISA½«´ïË÷ϵͳ¸ßΣÎó²îÄÉÈëKEVĿ¼
9ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«´ïË÷ϵͳDELMIA AprisoÈí¼þµÄ¸ßΣÎó²î£¨CVE-2025-5086£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö9.0£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£¡£¸ÃÎó²îΪ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯ÎÊÌ⣬£¬£¬£¬£¬£¬£¬Ó°ÏìDELMIA Apriso´Ó2020°æÖÁ2025°æµÄ¶à¸ö°æ±¾£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔ¶³ÌÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬£¬¶Ô¹¤ÒµÖÆÔìÔËÓª×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD£©22-01ÒªÇ󣬣¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê10ÔÂ2ÈÕǰÍê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£¡£CISAͬʱ½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼£¬£¬£¬£¬£¬£¬£¬×Ô¶¯ÅŲ鲢ÐÞ¸´×ÔÉí»ù´¡ÉèÊ©ÖеÄͬÀàÎó²î¡£¡£¡£¡£¡£¡£´ïË÷ϵͳDELMIA Apriso×÷ÎªÖÆÔìÔËÓªÖÎÀí£¨MOM£©Æ½Ì¨£¬£¬£¬£¬£¬£¬£¬ÆÕ±éÓ¦ÓÃÓÚÈ«Çò¹¤ÒµÆóÒµµÄÉú²ú¼à¿ØÓëÓÅ»¯£¬£¬£¬£¬£¬£¬£¬ÆäÇå¾²ÐÔÖ±½Ó¹ØÏµµ½Òªº¦»ù´¡ÉèÊ©Îȹ̡£¡£¡£¡£¡£¡£±¾´ÎÎó²îÓÉHacktron AI±¨¸æ£¬£¬£¬£¬£¬£¬£¬CISAͨ¹ýKEVĿ¼»úÖÆÍÆ¶¯¿ìËÙÏìÓ¦£¬£¬£¬£¬£¬£¬£¬ÌåÏÖ¡°·¢Ã÷-ת´ï-ÐÞ¸´¡±µÄ±Õ»·ÖÎÀíÂß¼¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/182120/hacking/u-s-cisa-adds-dassault-systemes-delmia-apriso-flaw-to-its-known-exploited-vulnerabilities-catalog.html
4. FBIÖÒÑÔUNC6040¡¢UNC6395ºÚ¿ÍÇÔÈ¡SalesforceÊý¾Ý
9ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©Ðû²¼FLASH¾¯±¨£¬£¬£¬£¬£¬£¬£¬ÖÒÑÔÁ½¸öÍþв¼¯ÈºUNC6040ºÍUNC6395Õýͨ¹ý¹¥»÷×éÖ¯µÄSalesforceÇéÐÎÇÔÈ¡Êý¾Ý²¢ÊµÑéÀÕË÷¡£¡£¡£¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÕâÁ½¸ö¼¯ÈºµÄ¶ñÒâ»î¶¯µ¼ÖÂÊý¾Ý͵ÇÔºÍÀÕË÷ÊÂÎñ¼¤Ôö£¬£¬£¬£¬£¬£¬£¬FBIÏ£Íûͨ¹ýÐû²¼ÈëÇÖÖ¸±ê£¨IOC£©ÌáÉý¹«ÖÚ·ÀÓùÄÜÁ¦¡£¡£¡£¡£¡£¡£UNC6040ÓÚ2024Äê6ÔÂÓÉGoogleÍþвÇ鱨ÍŶÓÊ×´ÎÅû¶£¬£¬£¬£¬£¬£¬£¬¸Ã¼¯Èº×Ô2024Äêµ×ÆðʹÓÃÉç»á¹¤³ÌºÍÓïÒô´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÓÕÆÔ±¹¤½«¶ñÒâSalesforce Data Loader OAuthÓ¦ÓÃÅþÁ¬ÖÁÆóÒµÕË»§¡£¡£¡£¡£¡£¡£¹¥»÷Õß³£Ã°³äITÖ§³ÖÖ°Ô±£¬£¬£¬£¬£¬£¬£¬Ê¹Óá°Î񵀮±ÎñÃÅ»§¡±µÈαװӦÓ㬣¬£¬£¬£¬£¬£¬Í¨¹ýOAuthÅþÁ¬´ó¹æÄ£ÇÔÈ¡SalesforceÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ËæºóÓÉShinyHuntersÀÕË÷×é֯ʹÓÃÕâЩÊý¾Ý¾ÙÐÐÀÕË÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô´æ´¢¿Í»§Êý¾ÝµÄ¡°ÕË»§¡±ºÍ¡°ÁªÏµÈË¡±Êý¾Ý¿â¡£¡£¡£¡£¡£¡£8Ô£¬£¬£¬£¬£¬£¬£¬ÁíÒ»¼¯ÈºUNC6395ͨ¹ý±»µÁµÄSalesloft Drift OAuthºÍË¢ÐÂÁîÅÆ¹¥»÷SalesforceʵÀý£¬£¬£¬£¬£¬£¬£¬ÇÔȡ֧³Ö°¸ÀýÖеÄÉñÃØÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨AWSÃÜÔ¿¡¢ÃÜÂëºÍSnowflakeÁîÅÆ£¬£¬£¬£¬£¬£¬£¬½ø¶øÉøÍ¸ÆäËûÔÆÇéÐΡ£¡£¡£¡£¡£¡£SalesloftÒÑÓëSalesforceÏàÖú×÷·ÏËùÓÐDriftÁîÅÆ£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇó¿Í»§ÖØÐÂÈÏÖ¤¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/
5. VoidProxyÍøÂç´¹ÂÚÆ½Ì¨Ê¹ÓÃÖÐÐÄÈ˹¥»÷ÇÔȡ΢Èí¹È¸èÕË»§Æ¾Ö¤
9ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪVoidProxyµÄÐÂÐÍÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨±»ÆØ¹â£¬£¬£¬£¬£¬£¬£¬ÆäÕë¶ÔMicrosoft 365¡¢GoogleÕË»§¼°ÊÜOktaÆ·¼¶Èý·½µ¥µãµÇ¼£¨SSO£©±£»£»£»£»¤µÄÕË»§Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÓÉOktaÍþвÇ鱨ÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬£¬±»ÐÎòΪ¡°¿ÉÀ©Õ¹¡¢¿É¹æ±ÜÇÒÖØ´ó¡±£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÖÐÐÄÈË£¨AitM£©Õ½ÂÔʵʱÇÔÈ¡Óû§Æ¾Ö¤¡¢¶àÒòËØÈÏÖ¤£¨MFA£©´úÂë¼°»á»°cookie¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÊÜѬȾµÄµç×ÓÓʼþЧÀÍÕË»§·¢ËͰüÀ¨Ëõ¶ÌÁ´½ÓµÄ´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£ÊÕ¼þÈ˵ã»÷Á´½Óºó£¬£¬£¬£¬£¬£¬£¬»áÂÄÀú¶à´ÎÖØ¶¨Ïò£¬£¬£¬£¬£¬£¬£¬×îÖÕ»á¼ûÍйÜÔÚ.icu¡¢.sbs¡¢.xyzµÈµÍ±¾Ç®ÓòÃûÉϵĴ¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£ÕâÐ©ÍøÕ¾Ê¹ÓÃCloudflare±£»£»£»£»¤Òþ²ØÕæÊµIP£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýCloudflare WorkerÇéÐιýÂËÁ÷Á¿¡¢¼ÓÔØÒ³Ãæ¡£¡£¡£¡£¡£¡£»á¼ûÕßÐèÏÈͨ¹ýCloudflare CAPTCHAÑéÖ¤ÒÔɨ³ý»úеÈË£¬£¬£¬£¬£¬£¬£¬ÔöÌíÒ³Ãæ¿ÉÐŶȡ£¡£¡£¡£¡£¡£´¹ÂÚÒ³ÃæÄ£ÄâMicrosoft»òGoogleµÇ¼½çÃæ£¬£¬£¬£¬£¬£¬£¬²¿·ÖÄ¿µÄ»á±»Ö¸µ¼ÖÁÎÞº¦µÄ¡°½Ó´ý¡±Ò³ÃæÒÔ»ìÏý¼ì²â¡£¡£¡£¡£¡£¡£µ±Óû§ÊäÈëÆ¾Ö¤Ê±£¬£¬£¬£¬£¬£¬£¬ÇëÇó»áͨ¹ýVoidProxyÊðÀíÖÁGoogle»òMicrosoftЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¹ØÓÚʹÓÃOkta SSOµÄÁªºÏÕË»§£¬£¬£¬£¬£¬£¬£¬¹¥»÷»á½øÈëµÚ¶þ½×¶Î£¬£¬£¬£¬£¬£¬£¬Ã°³äOktaµÄSSOÁ÷³ÌÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬½øÒ»²½ÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¡£VoidProxyµÄÊðÀíЧÀÍÆ÷ÔÚÊܺ¦ÕßÓëÕýµ±Ð§ÀͼäÖмÌÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬Í¬Ê±²¶»ñ´«ÊäÖеÄÓû§Ãû¡¢ÃÜÂë¡¢MFA´úÂ룬£¬£¬£¬£¬£¬£¬²¢×èµ²Õýµ±Ð§ÀÍ·¢·ÅµÄ»á»°cookie£¬£¬£¬£¬£¬£¬£¬¹©¹¥»÷ÕßÔÚÖÎÀíÃæ°åÖ±½ÓʹÓᣡ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-voidproxy-phishing-service-targets-microsoft-365-google-accounts/
6. ÐÂÐÍHybridPetyaÀÕË÷Èí¼þÍ»ÆÆUEFIÇå¾²Æô¶¯ÊµÑé¹¥»÷
9ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ESET¿ËÈÕÔÚVirusTotalƽ̨·¢Ã÷ÃûΪHybridPetyaµÄÐÂÐÍÀÕË÷Èí¼þÑù±¾£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¿ÉÈÆ¹ýUEFIÇå¾²Æô¶¯¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÔÚEFIϵͳ·ÖÇø°²ÅŶñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£HybridPetyaÏÔ×ÅÊÜ2016-2017ÄêPetya/NotPetya¶ñÒâÈí¼þÆô·¢£¬£¬£¬£¬£¬£¬£¬ºóÕßÔøÔìÓñ³ÉÇò´ó¹æÄ£ÏµÍ³Ì±»¾ÇÒÎÞ»Ö¸´Ñ¡Ï£¬£¬£¬£¬£¬£¬¶øHybridPetyaÔòÈÚºÏÁ½ÕßÌØµã£¬£¬£¬£¬£¬£¬£¬¼È±£´æÊÓ¾õÆø¸ÅºÍ¹¥»÷Á´ÌØÕ÷£¬£¬£¬£¬£¬£¬£¬ÓÖÐÂÔöÒªº¦ÊÖÒÕÍ»ÆÆ¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬HybridPetyaʹÓÃCVE-2024-7344Îó²îʵÏÖÇå¾²Æô¶¯Èƹý£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚ΢ÈíÊðÃûÓ¦ÓÃÖУ¬£¬£¬£¬£¬£¬£¬×ÝȻϵͳÆôÓÃÇå¾²Æô¶¯±£»£»£»£»¤ÈԿɱ»Ê¹Óᣡ£¡£¡£¡£¡£¹¥»÷ʱ£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þÊ×Ïȼì²âÖ÷»úÊÇ·ñ½ÓÄÉUEFI+GPT·ÖÇø×éºÏ£¬£¬£¬£¬£¬£¬£¬Ëæºó½«°üÀ¨config¡¢verify¡¢counterµÈÎļþµÄÆô¶¯¹¤¾ß°üÖ²ÈëEFIϵͳ·ÖÇø¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬configÎļþ´æ´¢¼ÓÃܱê¼Ç¡¢ÃÜÔ¿¡¢Ëæ»úÊý¼°Êܺ¦ÕßID£¬£¬£¬£¬£¬£¬£¬verifyÎļþÓÃÓÚÃÜÔ¿ÑéÖ¤£¬£¬£¬£¬£¬£¬£¬counterÔò¸ú×Ù¼ÓÃܽø¶È¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ»áÌæ»»Ôʼbootmgfw.efiΪ±£´æÎó²îµÄreloader.efi£¬£¬£¬£¬£¬£¬£¬²¢É¾³ýbootx64.efi£¬£¬£¬£¬£¬£¬£¬Í¬Ê±±¸·ÝÔʼָµ¼³ÌÐòÒÔ±ãÊê½ðÖ§¸¶ºó»Ö¸´ÏµÍ³¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬£¬£¬£¬£¬HybridPetya´¥·¢À¶ÆÁ¹ýÊ§Ç¿ÖÆÏµÍ³ÖØÆô£¬£¬£¬£¬£¬£¬£¬Ê¹¶ñÒâbootkitÔÚÆô¶¯½×¶ÎÖ´ÐС£¡£¡£¡£¡£¡£ËæºóʹÓÃSalsa20Ëã·¨¼ÓÃÜËùÓÐMFT¼¯Èº£¬£¬£¬£¬£¬£¬£¬Ê±´úÏÔʾÐéαCHKDSKÐÂÎÅÎóµ¼Óû§¡£¡£¡£¡£¡£¡£¼ÓÃÜÍê³ÉºóÔÙ´ÎÖØÆô£¬£¬£¬£¬£¬£¬£¬ÏòÊܺ¦ÕßË÷Òª1000ÃÀÔª±ÈÌØ±ÒÊê½ð£¬£¬£¬£¬£¬£¬£¬»»È¡32×Ö·ûÃÜÔ¿ÒÔ»Ö¸´Ö¸µ¼³ÌÐòÏ¢ÕùÃÜÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/


¾©¹«Íø°²±¸11010802024551ºÅ