¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î

Ðû²¼Ê±¼ä 2025-06-05

1. ¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î


6ÔÂ3ÈÕ £¬£¬£¬¼ÓÄôóInstantel¹«Ë¾Éú²úµÄ1000¶ą̀¹¤Òµ¼à¿Ø×°±¸ÃæÁÙÑÏÖØÇå¾²Íþв¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²»ú¹¹CISAÐû²¼µÄ×Éѯ±¨¸æÏÔʾ £¬£¬£¬InstantelµÄMicromate²úÆ·£¨ÓÃÓڼͼÕñ¶¯¡¢ÔëÒôºÍ¿ÕÆø¹ýѹ£©ÒòÓëÉèÖö˿Úȱ·¦Éí·ÝÑéÖ¤Ïà¹ØµÄÎó²î¶øÊÜÓ°Ïì £¬£¬£¬¸ÃÎó²î±àºÅΪCVE-2025-1907 £¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.8 £¬£¬£¬¹¥»÷Õ߿ɽè´ËÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£·¢Ã÷´ËÎó²îµÄMicrosecÑо¿Ô±Souvik Kandar͸¶ £¬£¬£¬È«ÇòÓÐÁè¼Ý1000̨̻¶ÔÚ»¥ÁªÍøÉϵÄMicromate×°±¸¿ÉÄÜÒ×Êܹ¥»÷¡£¡£¡£¡£¡£¡£ÕâЩÒ×Ëð×°±¸ÆÕ±éÓ¦ÓÃÓڲɿó¡¢ËíµÀ¡¢ÇÅÁº¼à²â¡¢ÐÞ½¨ºÍÇéÐÎÇå¾²µÈ¶à¸öÁìÓò¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÈôÄÜÔÚMicromate×°±¸ÉÏÖ´ÐÐÏÂÁî £¬£¬£¬²»µ«¿É¸ü¸Ä»ò½ûÓÃÆä¼à¿Ø¹¦Ð§ £¬£¬£¬µ¼ÖÂÊý¾Ý¹ýʧ»ò²»ÍêÕû £¬£¬£¬ÆÆËðÊý¾ÝÍêÕûÐÔ £¬£¬£¬»¹¿ÉÄܸøÉ󼯡¢ºÏ¹æÐÔ»ò°ü¹ÜË÷Åâ´øÀ´ÎÊÌâ¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬×°±¸»¹¿ÉÄܱ»Ë𻵻ò¹Ø±Õ £¬£¬£¬ÖÂʹ±¬ÆÆºÍËíµÀÍÚ¾òµÈÒªº¦²Ù×÷ÖÐÖ¹¡£¡£¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ £¬£¬£¬¹¥»÷Õß¿ÉʹÓñ»ÈëÇÖ×°±¸ºáÏòÒÆ¶¯µ½ÆäËûÅþÁ¬µÄIT»òOTϵͳ¡£¡£¡£¡£¡£¡£CISAÔÚͨ¸æÖÐÖ¸³ö £¬£¬£¬InstantelÕýÔÚÕë¶Ô´ËÎó²î¾ÙÐй̼þ¸üР£¬£¬£¬ÔÚ²¹¶¡Ðû²¼Ç° £¬£¬£¬½¨ÒéÓû§½«ÊÜÓ°Ïì×°±¸µÄ»á¼ûÏÞÖÆÔÚÊÜÐÅÈεÄIPµØµã¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/1000-instantel-industrial-monitoring-devices-possibly-exposed-to-hacking/


2. Gargle¹«Ë¾Êý¾Ý¿â´æÒþ»¼ÖÂ270Íò»¼ÕßÐÅϢ̻¶


6ÔÂ3ÈÕ £¬£¬£¬CybernewsÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÆðÓ°ÏìÃÀ¹ú¹«ÃñÒ½ÁÆÊý¾ÝµÄ´ó¹æÄ£Ð¹Â¶ÊÂÎñ £¬£¬£¬Ô¼270ÍòÃû»¼Õß×ÊÁϺÍ880ÍòÌõÔ¤Ô¼¼Í¼Íêȫ̻¶¡£¡£¡£¡£¡£¡£´Ë´Îй¶ԴÓÚÒ»¸öδÉèÖÃÇå¾²·À»¤µÄMongoDBÊý¾Ý¿â £¬£¬£¬Êý¾ÝËùÓÐÕßËäδ»ñ¹Ù·½È·ÈÏ £¬£¬£¬µ«ÏßË÷Ö¸ÏòGargle¹«Ë¾¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÑÀ¿ÆÕïËùÌṩӪÏú¡¢SEOºÍÍøÕ¾¿ª·¢Ð§ÀÍ £¬£¬£¬Ëä·ÇÒ½ÁƱ£½¡ÌṩÕß £¬£¬£¬µ«ÓªÒµÄ£Ê½Éæ¼°´¦Öóͷ£»¼ÕßÊý¾Ý¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊý¾Ý¿â̻¶ʱ³¤¼°»á¼ûÕß £¬£¬£¬ÔÚCybernews¼û¸æºó £¬£¬£¬Êý¾Ý¼¯Òѱ»±£»£»£»£»£»£»¤ £¬£¬£¬µ«ÉÐδÊÕµ½¸Ã¹«Ë¾Ì¸ÂÛ¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸Ç»¼ÕßÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢×¡Ö·¡¢µç»°ºÅÂë¡¢ÐԱ𡢲¡ÀúID¡¢ÓïÑÔÆ«ºÃ¡¢Õ˵¥ÏêÇé¼°Ô¤Ô¼¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Éî¶ÈÃô¸ÐÐÅÏ¢ £¬£¬£¬À¦°óºó×é³ÉСÎÒ˽¼ÒÉí·ÝÖÜÈ«À¶Í¼ £¬£¬£¬ÎªÉí·Ý͵ÇÔ¡¢°ü¹Üڲƭ¡¢Ò½ÁÆÉí·Ý͵ÇÔ¼°´¹ÂÚ¹¥»÷µÈÀÄÓÃÐÐΪ·­¿ª´óÃÅ £¬£¬£¬Òý·¢¶Ô¸Ã¹«Ë¾²»×ñÊØHIPAA¹æÔòµÄÑÏÖØÖÊÒÉ¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/dental-marketing-gargle-data-leak/


3. ÎÚ¿ËÀ¼GUR´Ó¶íͼ²¨Áзò¹«Ë¾ÇÔÈ¡4.4GBÉñÃØÊý¾Ý


6ÔÂ4ÈÕ £¬£¬£¬ÎÚ¿ËÀ¼¾üÊÂÇ鱨»ú¹¹GUR£¨ÓÖÃûHUR£©¶Ô¶íÂÞ˹º½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Í¼²¨Áзò·¢¶¯Á˺ڿ͹¥»÷ £¬£¬£¬ÇÔÈ¡Á˸߶ÈÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£¾Ý±¨µÀ £¬£¬£¬GURÈëÇÖÁ˶íÂÞ˹ÁªºÏ·É»ú¹«Ë¾£¨UAC£©Í¼²¨Áзò·Ö²¿ £¬£¬£¬¸Ã·Ö²¿×÷ΪËÕÁªÊ±ÆÚͼ²¨ÁзòÉè¼Æ¾ÖµÄ¼ÌÐøÕß £¬£¬£¬ÊǶíÂÞ˹¾ü·½Õ½ÂÔºäÕ¨»úµÄÖ÷Òª¿ª·¢ÉÌ¡£¡£¡£¡£¡£¡£Ç鱨½çÐÂÎÅÈËʿ͸¶ £¬£¬£¬´Ë´ÎÐж¯ÖÐ £¬£¬£¬ÎÚ¿ËÀ¼Ìع¤»ñÈ¡ÁËÁè¼Ý4.4GB¾ßÓÐÕ½ÂÔÒâÒåµÄ¸ß¶ÈÉñÃØÄÚ²¿Êý¾Ý¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ýº­¸ÇÆÕ±é £¬£¬£¬°üÀ¨ÄÚ²¿Í¨Ñ¶¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¹¤³Ìʦ¼òÀú¡¢²É¹º¼Í¼ÒÔ¼°ÉñÃØ¾Û»á¼Í¼µÈ¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼Ç鱨²¿·ÖÐÂÎÅÈËÊ¿ÌåÏÖ £¬£¬£¬´Ë´ÎÊý¾Ýй¶ÏÕЩ̻¶ÁËͼ²¨ÁзòµÄËùÓÐÉñÃØ £¬£¬£¬Ê¹ÎÚ¿ËÀ¼·½ÃæÄܹ»ÖÜÈ«ÕÆÎÕ¶íÂÞ˹սÂÔº½¿ÕµÄÖ°Ô±ºÍÐж¯ÇéÐΡ£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý¶ÔÎÚ¿ËÀ¼Ç鱨²¿·Ö¶øÑÔ¼ÛÖµ¼«¸ß £¬£¬£¬Ê¹Æä¶Ôͼ²¨ÁзòµÄÔË×÷ÏÕЩÁËÈçÖ¸ÕÆ¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬GUR»¹ÉñÃØ¼à¿ØÍ¼²¨Áзò¹«Ë¾ÄÚ²¿ÎļþÁ÷´ïÊýÔ £¬£¬£¬ÉîÈëÏàʶ¹«Ë¾ÔËÓª £¬£¬£¬ÎªÎ´À´¹¥»÷¶íÂÞ˹¹ú·À¹¤ÒµÍøÂçÖ¤¾Ý¡£¡£¡£¡£¡£¡£ÎªÏóÕ÷ÐÔ¹¥»÷¶íÂÞ˹ £¬£¬£¬GUR»¹ÔÚͼ²¨Áзò¹«Ë¾ÍøÕ¾ÉÏͿѻ £¬£¬£¬»­ÉÏèͷӥץ×ŶíÂÞ˹ºäÕ¨»úµÄͼ°¸¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯²¢·ÇÁæØêÊÂÎñ £¬£¬£¬ÎÚ¿ËÀ¼GURÒ»Ö±ÔÚÒ»Ö±¹¥»÷¶íÂÞ˹µÄ¾ü¹¤ÁªºÏÌå £¬£¬£¬ÈëÇÖÓë¹ú·À¡¢Õ½ÂÔº½¿Õ¡¢ÎäÆ÷Éú²úºÍÎïÁ÷Ïà¹ØµÄ¶íÂÞ˹¹«Ë¾Êý¾Ý¿â¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/178641/hacking/ukraines-military-intelligence-agency-stole-4-4gb-of-highly-classified-internal-data-from-tupolev.html


4. FBIµÈ»ú¹¹¸üУºPlayÀÕË÷Èí¼þÒѹ¥»÷900¸ö×éÖ¯


6ÔÂ4ÈÕ £¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©¡¢CISA¼°°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄÁªºÏÐû²¼µÄ×Éѯ¸üÐÂÅú×¢ £¬£¬£¬×èÖ¹2025Äê5Ô £¬£¬£¬PlayÀÕË÷Èí¼þÍÅ»ïÒÑÈëÇÖÔ¼900¸ö×éÖ¯ £¬£¬£¬Êܺ¦ÕßÊýÄ¿ÊÇ2023Äê10Ô±¨¸æµÄÈý±¶¡£¡£¡£¡£¡£¡£×Ô2022Äê6ÔÂÆð £¬£¬£¬PlayÀÕË÷Èí¼þ×éÖ¯¾Í¶Ô±±ÃÀ¡¢ÄÏÃÀºÍÅ·ÖÞµÄÖÚ¶àÆóÒµ¼°Òªº¦»ù´¡ÉèÊ©Ôì³ÉÓ°Ïì £¬£¬£¬³ÉΪ2024Äê×î»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÿ´Î¹¥»÷¾ùʹÓÃÖØÐ±àÒëµÄ¶ñÒâÈí¼þ £¬£¬£¬Õâ´ó´óÔöÌíÁËÇå¾²½â¾ö¼Æ»®¼ì²âºÍ×èÖ¹µÄÄÑ¶È £¬£¬£¬²¿·ÖÊܺ¦Õß»¹½Óµ½µç»°ÀÕË÷Êê½ð £¬£¬£¬ÒÔ±ÜÃâÊý¾Ýй¶¡£¡£¡£¡£¡£¡£½ñÄêÄêÍ·ÒÔÀ´ £¬£¬£¬ÓëPlayÀÕË÷Èí¼þÔËÓªÉÌÓйصijõʼ»á¼ûÊðÀíʹÓÃÔ¶³Ì¼à¿ØºÍÖÎÀí¹¤¾ßÖеĶà¸öÎó²î £¬£¬£¬¶ÔÃÀ¹ú×éÖ¯ÌᳫԶ³Ì´úÂëÖ´Ðй¥»÷ £¬£¬£¬ÎªºóÐøµÄÀÕË÷Èí¼þ¹¥»÷×ö×¼±¸¡£¡£¡£¡£¡£¡£PlayÀÕË÷Èí¼þÍÅ»ïÒѱ£´æ½üÈýÄê £¬£¬£¬ÔÚ°²ÅÅÀÕË÷Èí¼þǰ»áÇÔÈ¡Ãô¸ÐÎļþ £¬£¬£¬ÒÔ´ËÏòÊܺ¦ÕßʩѹË÷ÒªÊê½ð £¬£¬£¬ÇÒ½ÓÄɵç×ÓÓʼþ×÷Ϊ̸ÅÐÇþµÀ £¬£¬£¬²»ÌṩTor̸ÅÐÒ³ÃæÁ´½Ó £¬£¬£¬»¹Ê¹ÓÃ×Ô½ç˵VSS¸´Öƹ¤¾ßÇÔÈ¡Îļþ¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв £¬£¬£¬FBIµÈ»ú¹¹±Þ²ßÇå¾²ÍŶÓÓÅÏȽ«ÏµÍ³¡¢Èí¼þºÍ¹Ì¼þ¸üÐÂÖÁ×îа汾 £¬£¬£¬ÒÔ½µµÍÎó²î±»Ê¹ÓõÄΣº¦£»£»£»£»£»£»ÔÚËùÓÐЧÀÍÖÐʵÑé¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£© £¬£¬£¬ÓÈÆäÒªÖØµã¹Ø×¢VPN¡¢ÍøÂçÓʼþµÈ¿É»á¼û×éÖ¯ÍøÂçÖÐÒªº¦ÏµÍ³µÄÕË»§£»£»£»£»£»£»Í¬Ê±ÒªÎ¬»¤ÀëÏßÊý¾Ý±¸·Ý £¬£¬£¬²¢¿ª·¢ºÍ²âÊÔ»Ö¸´³ÌÐò £¬£¬£¬½«Æä×÷Ϊ×éÖ¯±ê×¼Ç徲ʵ¼ùµÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/


5. ³öÊé¾ÞÍ·Lee Enterprises³ÆÊý¾Ýй¶ӰÏìÁ˽ü4ÍòÈË


6ÔÂ4ÈÕ £¬£¬£¬³öÊé¾ÞÍ·Lee EnterprisesÕýÔÚ֪ͨ½ü40,000ÃûСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê2ÔÂÀÕË÷Èí¼þ¹¥»÷Öб»µÁµÄÖ°Ô±¡£¡£¡£¡£¡£¡£×÷ΪÃÀ¹ú×î´óµÄ±¨Òµ¼¯ÍÅÖ®Ò» £¬£¬£¬Lee EnterprisesÔÚ26¸öÖݳöÊé¶à·ÝÈÕ±¨¡¢ÖÜ¿¯ºÍרҵ¿¯Îï £¬£¬£¬ÓµÓÐÖØ´óµÄ¶ÁÕßȺÌå¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾±¾ÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ £¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨39,779ÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÄÎļþ £¬£¬£¬¿ÉÄÜÉæ¼°µÄÃû×Ö¡¢ÐÕÊÏÒÔ¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢ÔÚ2ÔÂ3ÈÕ±»Î´¾­ÊÚȨ»á¼û»ò»ñÈ¡¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂLee EnterprisesÃÀ¹ú¸÷µØµÄÐÂÎű༭ÊÒϵͳÖÐÖ¹ £¬£¬£¬ÆÈʹ³öÊéÉ̹رÕÐí¶àÍøÂç £¬£¬£¬Ôì³ÉÊýÊ®¼Ò±¨Ö½µÄÓ¡Ë¢ºÍµÝËÍ´óÃæ»ýÖÐÖ¹ £¬£¬£¬»¹Òý·¢ÁËÆóÒµVPNÖÐÖ¹ÒÔ¼°ÎÞ·¨»á¼ûÄÚ²¿ÏµÍ³ºÍÔÆ´æ´¢µÈÑÏÖØÎÊÌâ¡£¡£¡£¡£¡£¡£Ò»ÖÜºó £¬£¬£¬¸Ã¹«Ë¾ÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»Îļþ £¬£¬£¬Åû¶ºÚ¿Í¡°¼ÓÃÜÁËÒªº¦Ó¦ÓóÌÐò²¢ÇÔÈ¡ÁËijЩÎļþ¡±¡£¡£¡£¡£¡£¡£Ö»¹ÜLee EnterprisesÉÐδÃ÷È·¹é×ïÓÚÏêϸÐж¯·½ £¬£¬£¬µ«÷è÷ëÀÕË÷Èí¼þÍÅ»ïÒÑÔÚ2ÔÂβÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ £¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË×ܼÆ350GBµÄ120,000·ÝÎļþ £¬£¬£¬Íþв½«ÓÚ3ÔÂ5ÈÕËùÓÐÐû²¼¡£¡£¡£¡£¡£¡£2ÔÂ28ÈÕ £¬£¬£¬÷è÷ëÀÕË÷Èí¼þÍŻォLee EnterprisesÌí¼Óµ½Æä°µÍøÐ¹ÃÜÍøÕ¾ £¬£¬£¬·ÖÏíÁ˾ݳƴӸù«Ë¾ÊÜËðϵͳÖÐÇÔÈ¡µÄÊý¾ÝÑù±¾ £¬£¬£¬°üÀ¨Õþ¸®Éí·Ý֤ɨÃè¼þ¡¢²ÆÎñµç×Ó±í¸ñµÈÉñÃØÎļþ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/media-giant-lee-enterprises-says-data-breach-affects-39-000-people/


6. À­½Ü¹ûµÂÊÐÕþ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷ £¬£¬£¬³¬400GBÊý¾Ý»òй¶


6ÔÂ4ÈÕ £¬£¬£¬À­½Ü¹ûµÂÊÐÕþ¹«Ë¾£¨RMC£©ÍøÕ¾ÒÉËÆÔâÓöÍøÂç¹¥»÷ £¬£¬£¬Òý·¢¹«ÖÚ¶ÔÃô¸Ð¹«ÃñÊý¾Ý¿ÉÄܱ»µÁµÄµ£ÐÄ £¬£¬£¬½üÆÚ¸ÃÊý¾Ýй¶ÊÂÎñÆØ¹âºó £¬£¬£¬Òý·¢×¡Ãñ¿Ö»Å¡£¡£¡£¡£¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ £¬£¬£¬´Ë´Îй¶µÄÊý¾Ý¿ÉÄܰüÀ¨À­½Ü¹ûµÂÊÐÕþ¸®ÐÞ½¨ºÍ¹«¹²»ù´¡ÉèÊ©µÄÒªº¦ÐÅÏ¢ £¬£¬£¬ÈçѧУ¡¢Ò½Ôº¡¢ÇÅÁººÍ°ì¹«ÊÒµÈ £¬£¬£¬¹ÙÔ±ÏÓÒÉÁè¼Ý400GBµÄÊý¾Ý¿ÉÄÜÔ⵽й¶¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó £¬£¬£¬RMCÖÎÀí²¿·ÖѸËÙ֪ͨÁËÓ¡¶È¹ú¼ÒµçÐÅÓÐÏÞ¹«Ë¾£¨BSNL£©µÄÍøÂçÇå¾²ÍŶÓ¡£¡£¡£¡£¡£¡£BSNLÍŶÓÁ¬Ã¦½«GIS£¨µØÀíÐÅϢϵͳ£©ÍøÕ¾´ÓÍøÂçÖиôÀë £¬£¬£¬²¢¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñÕö¿ªÏêϸÊÓ²ì £¬£¬£¬ÏÖÔÚÕýÆð¾¢È·¶¨Ãü¾Ýй¶Ö鯽¼°ÕÒ³öµ¼Ö¹¥»÷µÄÎó²î¡£¡£¡£¡£¡£¡£ÆðÔ´ÆÀ¹ÀÏÔʾ £¬£¬£¬¸ÃÍøÕ¾¿ÉÄÜÔÚ¡°ÐÁ¶à¶ûÐж¯¡±£¨Ó¡¶È½üÆÚÕë¶ÔÅÁ¹þ¶û¼ÓÄ·¿Ö²ÀÏ®»÷µÄ¾üÊ»ØÓ¦£©Ê±´úÔâµ½ÈëÇÖ £¬£¬£¬²»¹ýÕâÒ»¹ØÁªÉÐδ»ñµÃ֤ʵ¡£¡£¡£¡£¡£¡£Ö»¹ÜRMCÔÚÍøÂçÇå¾²²½·¥ÉÏͶÈëÁËÔ¼1ÒÚ¬±È £¬£¬£¬µ«ÒÑÍùÒ²ÔøÔâÓö¹ýÀàËÆÊÂÎñ¡£¡£¡£¡£¡£¡£Õþ¸®ÌåÏÖ £¬£¬£¬ÒªÖÜÈ«Ïàʶ´Ë´ÎÍøÂç¹¥»÷µÄÓ°Ïì £¬£¬£¬»¹ÐèÆÚ´ýÕýÔÚ¾ÙÐеÄȡ֤ÊÓ²ìÍê³É¡£¡£¡£¡£¡£¡£


https://www.news9live.com/crime/rajkot-civic-bodys-gis-website-hit-by-cyber-attack-over-400-gb-data-feared-stolen-2862626