¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181119
Ðû²¼Ê±¼ä 2018-11-191¡¢°µÍøÍйܷþÎñÉÌDaniel's HostingÔâºÚ¿ÍÈëÇÖ£¬Áè¼Ý6500¸öÍøÕ¾±»É¾
11ÔÂ15ÈÕ°µÍø×î´óµÄÍøÂçÍйܷþÎñÉÌDaniel's HostingÔâµ½ºÚ¿ÍÈëÇÖ£¬¹¥»÷Õßɾ³ýÁË6500¶à¸öÍøÕ¾£¬²¢ÇÒÕâÐ©ÍøÕ¾¶¼Ã»Óб¸·Ý¡£¸ÃÍйܷþÎñÉ̱³ºóµÄ¿ª·¢Ö°Ô±Daniel Winzen֤ʵ³Æ£¬·þÎñÆ÷µÄrootÕË»§Ò²±»É¾³ýÁË£¬²¢ÇÒÆ½Ì¨ÉÏÍйܵÄÁè¼Ý6500¸öÍøÕ¾µÄÊý¾Ý¶¼Òѳ¹µ×ɥʧ¡£¹¥»÷Õß¿ÉÄÜÊÇʹÓÃÁËphpÖеÄÁãÈÕÎó²î£¬µ«Ò²ÓпÉÄÜÊÇʹÓÃÁËÆäËüµÄÎó²î¡£ÏÖÔÚ»¹Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÊÂÈÏÕæ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78165/cyber-crime/daniels-hosting-hacked.html2¡¢¼ÓÃÜÓʼþ·þÎñÉÌProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƹ¥»÷
Ê¢ÐеļÓÃܵç×ÓÓʼþ·þÎñProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƵĹ¥»÷Ô˶¯¡£¹¥»÷ÕßAmFearLiathMorÉù³ÆÈëÇÖÁ˸ù«Ë¾²¢ÇÔÈ¡ÁË¡°´ó×Ú¡±µÄÓû§Êý¾Ý¡£¹¥»÷Õß½«ÆäÊê½ðÒªÇóÐû²¼ÔÚPastebinÉÏ£¬²¢ÍþвҪÏòÈ«ÌìÏÂÐû²¼»òÏúÊÛÕâЩÊý¾Ý£¬µ«²¢Î´Ìṩ±»µÁÊý¾ÝµÄÑù±¾¡£ProtonMailÔÚÊÓ²ìÖ®ºó·ñ¶¨ÁËÕâÆð¹¥»÷ÊÂÎñ£¬Éù³ÆÕâÖ»ÊÇÒ»¸öÊÔͼڲƵÄȦÌס£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78133/hacking/protonmail-hacked-hoax.html3¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚOilRigжñÒâÔ˶¯µÄÆÊÎö±¨¸æ
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïOilRigÔÚÌᳫ¹¥»÷ǰ¶ÔÆä¶ñÒâÈí¼þºÍ¹¤¾ß¾ÙÐвâÊÔÔ˶¯µÄÆÊÎö±¨¸æ¡£OilRigµÄ²âÊÔÁ÷³Ìͨ³£°üÀ¨¶ÔÆä½»¸¶Îĵµ¾ÙÐÐÉÙÁ¿Ð޸IJ¢Ìá½»µ½ÔÚÏßɨÃè·þÎñ£¬ÒÔÈ·¶¨ÎļþµÄ¶ñÒâˮƽºÍÕÒ³öÔõÑù¹æ±ÜÕâЩ¼ì²â¡£Ñо¿Ö°Ô±·¢Ã÷OilRigÔÚ¹¥»÷ǰ6Ìì¾Í×îÏÈÁ˲âÊÔÔ˶¯£¬²¢ÔÚ8ÔÂ20ÈÕ¡¢21ÈÕºÍ26ÈÕ»®·Ö¾ÙÐÐÁËÈý´Î²âÊÔ¡£Æä×îÖÕ²âÊÔÎļþµÄ½¨Éèʱ¼äÊÇÔÚ½»¸¶ÎĵµµÄ½¨Éèʱ¼ä£¨20·ÖÖÓÖ®ºóÕâЩÎĵµ¾Íͨ¹ý´¹ÂÚÓʼþ·¢ËͳöÈ¥£©µÄ8¸öСʱ֮ǰ¡£
ÔÎÄÁ´½Ó£º
https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/4¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïINDRIK SPIDERµÄÆÊÎö±¨¸æ
CrowdStrikeÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïNDRIK SPIDERµÄÆÊÎö±¨¸æ¡£¸Ã×éÖ¯×Ô2014Äê6ÔÂÒÔÀ´Ò»Ö±Ê¹ÓöñÒâÈí¼þDridex£¬²¢¿ª·¢ÁËÐí¶àеÄÄ£¿éºÍÌí¼ÓÁËÐµķ´ÆÊÎö¹¦Ð§£¬ÒѾ»ñµÃÁËÊý°ÙÍòÃÀÔªµÄ·¸·¨ÀûÈó¡£µ«´Ó2017Äê7ÔÂ×îÏÈ£¬¸Ã×éÖ¯×îÏÈתÏòÐÂÀÕË÷Èí¼þBitPaymer£¬²¢ÒѾͨ¹ýBitPaymer»ñµÃÁËÔ¼150ÍòÃÀÔªµÄÊÕÈë¡£BitPaymerÓëDridexÖ®¼ä±£´æÇ¿ÁÒµÄÏà¹ØÐÔ£¬ËüÃǰüÀ¨Ðí¶àÖØµþµÄ·´ÆÊÎö¹¦Ð§¡£
ÔÎÄÁ´½Ó£º
https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/5¡¢Ñо¿Ö°Ô±·¢Ã÷Gmail±£´æbug£¬¿ÉÓÃÓÚÌᳫ´¹ÂÚ¹¥»÷
Ñо¿Ö°Ô±Tim Cotten·¢Ã÷Gmail±£´æÒ»¸öÎó²î£¬¿ÉÄܱ»·¸·¨·Ö×ÓʹÓÃÀ´¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¸ÃÎÊÌâÔ´ÓÚGmail×éÖ¯ÆäÎļþ¼ÐµÄ·½·¨£¬Ëü»áƾ֤ÓʼþÖÐFrom×ֶεĵصãÀ´½«µç×ÓÓʼþ¹éµµµ½¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖС£ÈôÊǹ¥»÷ÕßÏòÄ¿µÄ·¢ËÍ´¹ÂÚÓʼþ£¬²¢ÔÚFrom×ֶΰüÀ¨Ä¿µÄµÄµç×ÓÓʼþµØµã£¬Ôò¸ÃÓʼþ½«×Ô¶¯Í¬Ê±·¢ËÍÖÁÄ¿µÄµÄÊÕ¼þÏäºÍÒÑ·¢ËÍÎļþ¼Ð¡£Õâ¹ØÓÚ¹¥»÷ÕßÀ´Ëµ¿ÉÄÜÊÇÒ»¸ö¸£Òô£¬ÓÉÓÚ·¢ËÍÖÁÊÕ¼þÏäÀïµÄÀ¬»øÓʼþ¿ÉÄܻᱻ¹ýÂË£¬µ«·¢ËÍÖÁ¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖеÄÓʼþ½«»á±»±£´æÏÂÀ´¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/gmail-glitch-offers-stealthy-trick-for-phishing-attacks/139167/6¡¢InstagramÐÂÎó²îµ¼Ö²¿·ÖÓû§µÄÃÜÂë̻¶
ƾ֤The InformationµÄ±¨µÀ£¬Instagram4Ô·ÝÐû²¼µÄÓÃÓÚÏÂÔØÐ¡ÎÒ˽¼Ò×ÊÁϵŤ¾ß±£´æbug£¬¿ÉÄܵ¼ÖÂÓû§µÄÃÜÂë̻¶¡£µ±Óû§Ê¹Óøù¦Ð§Ê±£¬ËûÃǵÄÃ÷ÎÄÃÜÂë»á·ºÆðÔÚURLÖУ¬Òò´ËÔÚ¹«¹²ÍøÂçÖÐʹÓøù¤¾ß¿ÉÄܻᵼÖÂÃÜÂëÏò¹¥»÷Õß̻¶¡£¸Ã¹«Ë¾³ÆÒѾÐÞ¸´Á˸ÃÎó²î£¬²¢ÏòÊÜÓ°ÏìµÄÉÙÉÙÊýÈË·¢ËÍÁËÓʼþ֪ͨ¡£±ðµÄ£¬Ç徲ר¼Òͨ¹ýÕâÒ»ÊÂÎñÖÊÒÉInstagram´æ´¢ÁËÓû§µÄÃ÷ÎÄÃÜÂ룬µ«¸Ã¹«Ë¾½²»°ÈË·ñ¶¨ÁËÕâÒ»Ö¸Ôð¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78173/data-breach/instagram-glitch-exposed-passwords.htmlÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿Ê±Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ