2026年5月22日星期五

釣魚警報 - 提防假冒反詐騙協調中心(ADCC)及多個知名品牌的釣魚網站

發佈日期: 2026年05月22日

類別: 網絡釣魚

網絡釣魚警告

現況及相關趨勢

mickmick.net 提醒市民,近日發現騙徒同時利用假冒政府機構及知名品牌網站進行多類型網絡釣魚攻擊,其中包括冒充「反詐騙協調中心(ADCC)」的虛假網站,以及偽冒物流服務、金融機構、零售平台及網上服務的釣魚頁面。

 

騙徒假冒 ADCC 設立假網站,聲稱提供協助追回騙款、免費核查、免費專業法務團隊諮詢等服務,同時透過虛構成功個案、案例分享及常見問題(Q&A)等內容,聲稱「被騙超過一個月仍可高機率追回資金」,以增加可信度並吸引受害人主動聯絡。實際上,此類網站屬於針對受害人的二次詐騙手法。

 

此外,mickmick.net 發現騙徒亦建立多個釣魚網站,分別冒充本地機構、物流服務、金融機構、旅遊平台及娛樂服務等,誘導用戶輸入個人資料、帳戶憑證或付款資訊,以進一步進行詐騙或盜用帳戶。

 

「反詐騙協調中心(ADCC)」釣魚網站

 

  • 利用「免費咨詢」或「免費調查」等話術誘導受害人接觸

 

  • 使用者點擊「立即在綫求助與檢測」後會被轉至假冒WhatsApp網頁,并建立一對一對話以進一步獲取個人敏感資料或要求付款。

 

  • 假冒網站甚至偽造成功案例,並標示「成功追回」、「安全受控」、「全額追回」等結果,以及展示虛假法務專業團隊,以提升可信度。

 

  • 網站常見問題(FAQ提供「被騙超過一個月依然有很高的追回幾率」等說法,進一步吸引受害人。

 

  • 市民應注意,真正的反詐騙協調中心官方網站為: adcc.gov.hk 且官方僅提供「防騙易 18222作諮詢熱線

 

mickmick.net 偵測到的其他釣魚網站

除「反詐騙協調中心(ADCC)」釣魚網站外,mickmick.net 亦同時觀察到多個釣魚網站,分別冒充本地機構、物流服務、金融機構、旅遊平台及娛樂服務等,以不同主題進行誘騙。

  • 假冒物流服務「菜鳥香港」網站,聲稱用戶包裹配送失敗,要求重新確認地址及支付費用,從而騙取個人資料及信用卡資訊。

 

  • 假冒保險公司Prudential、 金融服务公司Manulife驗證頁面以及「Disney+」登入頁面,誘導用戶進一步輸入登入或個人資料。

 

  • 假冒惠康網店頁面,顯示促銷優惠(如「88折」、「85折」),誘導用戶進行付款並提交信用卡資料。

 

  • 假冒旅遊平台(Klook)、Cathay Pacific航空公司積分兌換頁面、以及e-MPF平台等等。

 

 

可疑網站特徵

綜合上述案例,該批釣魚網站顯示出以下共同特徵:

  1. 該類網站普遍模仿官方網站設計及操作流程,誘使用戶誤信其為真實平台
  2. 與品牌相似但不一致的網域名稱
  3. 使用與官方網站相似但不同的網域名稱,採用較不常見的頂級域名,例如  .lol、.cyou、.top 等
  4. 其中一些可疑網域屬於近期新註冊網域
  5. 模仿官方網站設計及操作流程
  6. 利用「訂單異常」、「安全驗證」、「積分兌換」或「優惠活動」作為誘因,增加用戶點擊及操作的機會

 

 

mickmick.net 發現騙徒利用不同主題的釣魚網站進行大規模分散式攻擊,並結合「官方冒充」、「品牌仿冒」及「社交工程」等多種手法,提升成功率。

特別是針對已受騙人士,騙徒透過假冒 ADCC 網站及所謂專業團隊,利用「可追回騙款」的說法進行二次詐騙,進一步騙取金錢及敏感資料。

市民應提高警覺,切勿相信任何聲稱可快速或高機率追回騙款的網站或聯絡方式。如有懷疑,應透過官方渠道核實資料,以保障個人及財務安全。

 

 

對公眾的安全建議

mickmick.net 提醒市民:

  • 仔細核對完整網址。 政府機構官方網站一般使用「.gov.hk」域名。釣魚網站的網址通常與官方網站極為相似,但可能會在網址的拼字、字詞次序或網域的頂級域名上略有不同。用戶應在輸入任何資料前,仔細核實網址是否正確。
  • 切勿透過即時通訊平台處理詐騙個案。 官方機構通常不會透過 WhatsApp 指示用戶辦理追款或轉帳程序。
  • 對聲稱可協助追回款項的服務保持警惕。 此類服務有可能屬於二次詐騙。
  • 避免點擊不明或未經核實的連結。 不論連結來自電郵、短訊、社交媒體、即時通訊平台或搜尋引擎廣告,如未能確認其真確性,切勿隨意點擊。
  • 不要在可疑網站輸入個人或付款資料。 如網站來源不明,或網域名稱與官方網站不符,切勿輸入姓名、電話、電郵地址、信用卡資料、驗證碼或其他敏感資料。
  • 建議直接輸入官方網址瀏覽。 避免經搜尋引擎廣告或不明連結進入網站。

 

如曾提交資料,應立即採取以下行動

如市民懷疑曾於可疑網站輸入個人資料或信用卡資料,應盡快採取以下措施:

 

  • 立即停止與對方聯絡;
  • 切勿再提供任何個人或財務資料;
  • 立即聯絡相關銀行或信用卡發卡機構, 通報事件並要求採取適當保護措施;
  • 密切留意銀行戶口及信用卡交易紀錄,檢查是否出現未經授權交易;
  • 致電香港警務處反詐騙協調中心「防騙易 18222」求助;
  • 保留相關紀錄, 包括網站截圖、短訊、電郵、付款通知及交易紀錄,以便日後跟進或報案之用。

Phishing Alert - Beware of Phishing Websites Impersonating the Anti-Deception Coordination Centre (ADCC) and Multiple Well-Known Brands

Phishing Alert - Beware of Phishing Websites Impersonating the Anti-Deception Coordination Centre (ADCC) and Multiple Well-Known Brands

Release Date: 22 May 2026

Type: Phishing

Phishing Alert

Current Status and Related Trends

mickmick.net reminds the public that fraudsters have recently been using fake government institution and well-known brand websites to carry out various phishing attacks. These include fake websites impersonating the “Anti-Deception Coordination Centre (ADCC)”, as well as phishing pages posing as logistics services, financial institutions, retail platforms, and online services.

 

Scammers have set up fake ADCC websites claiming to offer services such as assistance in recovering scam losses, free verification, and free consultation with professional legal teams. These sites also use fabricated success stories, case sharing, and FAQ content, claiming that “even if more than a month has passed since the scam, there is still a high chance of recovering the funds”, in order to increase credibility and lure victims into contacting them. In reality, such websites are a form of secondary scam targeting existing victims.

 

In addition, mickmick.net has found that fraudsters have created multiple phishing websites impersonating local organisations, logistics services, financial institutions, travel platforms, and entertainment services, in order to trick users into entering personal information, account credentials, or payment details for further fraud or account theft.

 

 

Fake “Anti-Deception Coordination Centre (ADCC)” Websites

 

 

  • It uses phrases such as “free consultation” or “free investigation” to lure victims into making contact.

 

  • After users click “Get Immediate Online Help and Checking”, they are redirected to a fake WhatsApp webpage, where a one-on-one conversation is initiated to further obtain sensitive personal information or demand payment.

 

  • It even fabricates successful recovery cases and displays claims such as “successfully recovered,” “safe and secure,” and “full recovery,” while showcasing fake professional legal teams to enhance credibility.

 

  • The FAQ section of these websites may claim that “even if more than one month has passed since being scammed, there is still a high chance of recovery,” further luring victims.

  • The public should note that the official website of the ADCC is: adcc.gov.hk, and the official hotline is only “Anti-Scam Helpline 18222.”

 

 

Other Phishing Websites Observed by mickmick.net

Apart from fake ADCC websites, mickmick.net has also observed multiple phishing websites impersonating local institutions, logistics services, financial institutions, travel platforms, and entertainment services under different themes:

  • A fake Cainiao Hong Kong logistics website claiming that parcel delivery failed and asking users to reconfirm their address and pay a fee, thereby stealing personal information and credit card details.

 

  • Fake verification pages for insurance company Prudential, financial services company Manulife, and a fake Disney+ login page, prompting users to enter login credentials or personal information.

 

  • A fake Wellcome online store page displaying promotional offers such as 12% off or 15% off, tricking users to make payments and submit credit card details.

 

  • Fake Klook travel platform page, fake Cathay Pacific mileage redemption page, and fake e-MPF platform page.

 

 

 

Characteristics of Suspicious Websites 

Based on the above cases, these phishing websites share the following common features:

  1. Generally imitate the design and operating flow of official websites to mislead users into believing they are legitimate platforms.
  2. Use domain names that resemble well-known brands but are not identical.
  3. Use of domain names that are similar to, but different from, those of legitimate websites, including the use of less common top-level domains such as .lol, .cyou, and .top
  4. Some of the suspicious domains are newly registered. 
  5. Imitate the design and interaction flow of official websites.
  6. Use themes such as “abnormal order,” “security verification,” “points redemption,” or “special offers” as bait to increase the likelihood of users clicking and taking action.

mickmick.net has found that fraudsters are using phishing websites under different themes to launch large-scale distributed attacks, combining tactics such as official impersonation, brand imitation, and social engineering to improve their success rate.

 

In particular, for people who have already been scammed, fraudsters use fake ADCC websites and so-called professional teams, together with claims of being able to recover scammed funds, to carry out secondary scams and further steal money and sensitive data.

 

The public should remain vigilant and must not trust any website or contact method claiming it can quickly or highly likely recover scam losses. If in doubt, always verify information through official channels to protect personal and financial security.

 

 

Security Advice for the Public

mickmick.net reminds members of the public to: 

  • Carefully verify the full URL. Official government websites generally use the “.gov.hk” domain. The URLs of phishing websites are often very similar to those of official websites, but may differ slightly in spelling, word order or top-level domain. Users should carefully verify that the URL is correct before entering any information. 
  • Do not handle scam cases through instant messaging platforms. Official agencies generally do not instruct users via WhatsApp to recover money or transfer funds.
  • Stay cautious of services claiming they can help recover money. Such services may be secondary scams.
  • Avoid clicking on unknown or unverified links. Whether a link comes from email, text message, social media, instant messaging platforms or search engine adverts, users should not click on it unless its authenticity has been confirmed. 
  • Do not enter personal or payment information on suspicious websites. If the source of a website is unclear, or if the domain name does not match the official website, users should not enter their name, telephone number, email address, credit card information, verification code or other sensitive information. 
  • It is advisable to type the official website address directly into the browser. Avoid entering websites through search engine ads or unknown links.

 

If Information Has Been Submitted, the Following Actions Should Be Taken Immediately 

If members of the public suspect that they have entered personal information or credit card information on a suspicious website, they should take the following steps as soon as possible: 

 

  • Stop all contact with the other party immediately;
  • Do not provide any further personal or financial information;
  • Immediately contact the relevant bank or credit card issuer to report the incident and request appropriate protective measures; 
  • Closely monitor bank account and credit card transaction records to check whether any unauthorised transactions have occurred; 
  • Call the Hong Kong Police Force Anti-Deception Coordination Centre hotline “Anti-Scam Helpline 18222” for assistance; 
  • Retain relevant records, including website screenshots, text messages, emails, payment notifications and transaction records, for future follow-up or reporting purposes.

 


Splunk 產品多個漏洞

Splunk 產品多個漏洞

發佈日期: 2026年05月22日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於 Splunk 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發洩露敏感資料、繞過保安限制及阻斷服務狀況。


影響

  • 繞過保安限制
  • 資料洩露
  • 阻斷服務

受影響之系統或技術

  • Splunk Enterprise 10.2.2, 10.0.5, 9.4.11 及 9.3.12 之前的版本
  • Splunk Cloud Platform 10.4.2603.1, 10.3.2512.8, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13 及 9.3.2411.129 之前的版本
  • Splunk AI Toolkit 5.7.3 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Splunk Products Multiple Vulnerabilities

Splunk Products Multiple Vulnerabilities

Release Date: 22 May

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Splunk products. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, security restriction bypass and denial of service condition on the targeted system.


Impact

  • Security Restriction Bypass
  • Information Disclosure
  • Denial of Service

System / Technologies affected

  • Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11 and 9.3.12
  • Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.8, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13 and 9.3.2411.129
  • Splunk AI Toolkit versions below 5.7.3

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

Trend Micro Apex One 多個漏洞

Trend Micro Apex One 多個漏洞

發佈日期: 2026年05月22日

風險: 高度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於 Trend Micro Apex One 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發權限提升、遠端執行任意程式碼及資料篡改。

 

注意:

CVE-2026-34926 正在被廣泛利用。未經預先驗證的本地攻擊者可透過修改伺服器上的金鑰表,注入惡意程式碼,部署到受影響安裝中的代理程式。因此,該漏洞的風險等級被評定為高度風險。


影響

  • 權限提升
  • 遠端執行程式碼
  • 篡改

受影響之系統或技術

  • Trend Micro Apex One - 2019 (On-prem)
  • Trend Micro Apex One - Server and Agent builds below 17079 
  • Trend Micro Apex One as a Service (SaaS)
  • TrendAI Vision One Endpoint Security - Standard Endpoint Protection (SEP) - Agent builds below 14.0.20731

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Trend Micro Apex One Multiple Vulnerabilities

Trend Micro Apex One Multiple Vulnerabilities

Release Date: 22 May 2026

RISK: High Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Trend Micro Apex One. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and data manipulation on the targeted system.

 

Note:

CVE-2026-34926 is being exploited in the wild.  A pre-authenticated local attacker could modify a key table on the server to inject malicious code to deploy to agents on affected installations. Hence, the risk level is rated as High Risk.

 


Impact

  • Elevation of Privilege
  • Remote Code Execution
  • Data Manipulation

System / Technologies affected

  • Trend Micro Apex One - 2019 (On-prem)
  • Trend Micro Apex One - Server and Agent builds below 17079 
  • Trend Micro Apex One as a Service (SaaS)
  • TrendAI Vision One Endpoint Security - Standard Endpoint Protection (SEP) - Agent builds below 14.0.20731

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2026年5月21日星期四

Drupal 遠端執行程式碼漏洞

Drupal 遠端執行程式碼漏洞

發佈日期: 2026年05月21日

風險: 中度風險

類型: 伺服器 - 其他伺服器

於 Drupal Core 發現一個漏洞。遠端攻擊者可利用這個漏洞,於目標系統觸發遠端執行任意程式碼、資料篡改、權限提升及洩露敏感資料。


影響

  • 遠端執行程式碼
  • 篡改
  • 資料洩露
  • 權限提升

受影響之系統或技術

  • Drupal 8.9.0或以上至10.4.10以下版本

  • Drupal 10.5.0或以上至10.5.10以下版本

  • Drupal 10.6.0或以上至10.6.9以下版本

  • Drupal 11.0.0或以上至11.1.10以下版本

  • Drupal 11.2.0或以上至11.2.12以下版本

  • Drupal 11.3.0或以上至11.3.10以下版本


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
 

安裝供應商提供的修補程式:

  • 對於 Drupal 8.9,請手動套用 Drupal 8.9 修補程式
  • 對於任何版本的 Drupal 9,請手動套用 Drupal 9.5 修補程式
  • 對於 Drupal 10.4.x 或更早版本,更新至 Drupal 10.4.10
  • 對於 Drupal 10.5.x,更新至 Drupal 10.5.10
  • 對於 Drupal 10.6.x,更新至 Drupal 10.6.9
  • 對於 Drupal 11.1.x 或 11.0.x,更新至 Drupal 11.1.10
  • 對於 Drupal 11.2.x,更新至 Drupal 11.2.12
  • 對於 Drupal 11.3.x,更新至 Drupal 11.3.10

 

注意:

  • Drupal 8 和 Drupal 9 均已達到生命週期終止。這些不受支援的版本仍可能存在其他先前已披露的安全漏洞。
  • Drupal 11.1.x、Drupal 11.0.x、Drupal 10.4.x 及更早版本已達生命週期終止,不再獲得安全性支援。

漏洞識別碼


資料來源


相關連結

Drupal Remote Code Execution vulnerability

Drupal Remote Code Execution vulnerability

Release Date: 21 May 2026

RISK: Medium Risk

TYPE: Servers - Other Servers

A remote attacker could exploit this vulnerability to trigger remote code execution, data manipulation, elevation of privilege and sensitive information disclosure on the targeted system.


Impact

  • Remote Code Execution
  • Data Manipulation
  • Information Disclosure
  • Elevation of Privilege

System / Technologies affected

  • Drupal version 8.9.0 and later, prior to 10.4.10
  • Drupal version 10.5.0 and later, prior to 10.5.10
  • Drupal version 10.6.0 and later, prior to 10.6.9
  • Drupal version 11.0.0 and later, prior to 11.1.10
  • Drupal version 11.2.0 and later, prior to 11.2.12
  • Drupal version 11.3.0 and later, prior to 11.3.10

 


Solutions

Before installation of the software, please visit the vendor web-site for more details.
 

Apply fixes issued by the vendor:

  • For Drupal 8.9, manually applying the Drupal 8.9 patch
  • For any version of Drupal 9, manually applying the Drupal 9.5 patch
  • For Drupal 10.4.x or earlier, update to Drupal 10.4.10
  • For Drupal 10.5.x, update to Drupal 10.5.10
  • For Drupal 10.6.x, update to Drupal 10.6.9
  • For Drupal 11.1.x or 11.0.x, update to Drupal 11.1.10
  • For Drupal 11.2.x, update to Drupal 11.2.12
  • For Drupal 11.3.x, update to Drupal 11.3.10

 

Note:

  • Drupal 8 and Drupal 9 have both reached end-of-life. Those unsupported versions will still have other, previously disclosed security vulnerabilities.
  • Drupal 11.1.x, Drupal 11.0.x, Drupal 10.4.x, and below are end-of-life and do not receive security coverage.

Vulnerability Identifier


Source


Related Link

Microsoft Defender 多個漏洞

Microsoft Defender 多個漏洞

發佈日期: 2026年05月21日

風險: 高度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於 Microsoft Defender 發現多個漏洞。攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況及權限提升。

 

注意:

CVE-2026-45498 正在被廣泛利用。 Microsoft Defender 存在一個未指明的漏洞,可能導致服務中斷。

 

CVE-2026-41091 正在被廣泛利用。Microsoft Defender 在存取檔案前進行不當的連結解析('link following‘),使得具備權限的攻擊者得以在本地端提升權限。

 

因此,該漏洞的風險等級被評為高度風險。


Microsoft Defender Multiple Vulnerabilities

Microsoft Defender Multiple Vulnerabilities

Release Date: 21 May 2026

RISK: High Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Microsoft Defender. Attacker could exploit some of these vulnerabilities to trigger denial of service condition and elevation of privilege on the targeted system.

 

Note:

CVE-2026-45498 is being exploited in the wild.  Microsoft Defender contains an unspecified vulnerability that allows for denial of service.

CVE-2026-41091 is being exploited in the wild. Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally. 

 

Hence, the risk level is rated as High Risk.


2026年5月20日星期三

IBM WebSphere 產品多個漏洞

IBM WebSphere 產品多個漏洞

發佈日期: 2026年05月20日

風險: 中度風險

類型: 伺服器 - 互聯網應用伺服器

於 IBM WebSphere 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況及繞過保安限制。


影響

  • 繞過保安限制
  • 阻斷服務

受影響之系統或技術

  • WebSphere Application Server - 8.5
  • WebSphere Application Server - 9.0
  • WebSphere Application Server - Liberty 19.0.0.7-26.0.0.5

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

IBM WebSphere Products Multiple Vulnerabilities

IBM WebSphere Products Multiple Vulnerabilities

Release Date: 20 May 2026

RISK: Medium Risk

TYPE: Servers - Internet App Servers

Multiple vulnerabilities were identified in IBM WebSphere Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and security restriction bypass on the targeted system.


Impact

  • Security Restriction Bypass
  • Denial of Service

System / Technologies affected

  • WebSphere Application Server - 8.5
  • WebSphere Application Server - 9.0
  • WebSphere Application Server - Liberty 19.0.0.7-26.0.0.5

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

Mozilla 產品多個漏洞

Mozilla 產品多個漏洞

發佈日期: 2026年05月20日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Mozilla 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、繞過保安限制、仿冒及敏感資料洩露。


Mozilla Products Multiple Vulnerabilities

Mozilla Products Multiple Vulnerabilities

Release Date: 20 May 2026

RISK: Medium Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, security restriction bypass, spoofing and sensitive information disclosure on the targeted system.


2026年5月18日星期一

Microsoft Edge 多個漏洞

Microsoft Edge 多個漏洞

發佈日期: 2026年05月18日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Microsoft Edge 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、仿冒、跨網站指令碼及敏感資料洩露。

 

影響

  • 資料洩露
  • 阻斷服務
  • 遠端執行程式碼
  • 繞過保安限制
  • 跨網站指令碼
  • 仿冒

受影響之系統或技術

  • Microsoft Edge 148.0.3967.70 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 148.0.3967.70 或之後版本

漏洞識別碼


資料來源


相關連結

釣魚警報 - 提防假冒反詐騙協調中心(ADCC)及多個知名品牌的釣魚網站 發佈日期: 2026年05月22日 類別: ...