ºÚ¿Í×é֯͵ȡ11¼Ò¹«Ë¾7320ÍòÌõÊý¾Ý²¢ÔÚ°µÍø³öÊÛ£»ÍÐ¹ÜÆ½Ì¨DigitalOceanй¶Ãô¸ÐÐÅÏ¢

Ðû²¼Ê±¼ä 2020-05-11

1.ºÚ¿Í×é֯͵ȡ11¼Ò¹«Ë¾7320ÍòÌõÊý¾Ý £¬ÔÚ°µÍø³öÊÛ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÔÚÒÑÍùµÄÒ»ÖÜÖÐ £¬ºÚ¿Í×éÖ¯Shiny Hunters×ܹ²ÇÔÈ¡ÁË11¼Ò¹«Ë¾Êý¾Ý¿âÖеÄ7320ÍòÓû§¼Í¼ £¬²¢ÔÚ°µÍøÉϳöÊÛ¡£´Ë´ÎÊܺ¦µÄ11¼Ò¹«Ë¾»®·ÖΪTokopedia¡¢Homechef¡¢Bhinneka¡¢Minted¡¢Styleshare¡¢Ggumim¡¢Mindful¡¢StarTribune¡¢ChatBooks¡¢The Chronicle Of Higher EducationºÍZoosk £¬±»µÁÊý¾Ý¼ÛÇ®ÓÉ500ÃÀÔªµ½5000ÃÀÔª²»µÈ¡£ÏÖÔÚ £¬BleepingComputerÒÑÓëÕâЩÊÜÓ°ÏìµÄ¹«Ë¾ÁªÏµ £¬µ«ÉÐδ»ñµÃ»Ø¸´¡£BleepingComputerÌáÐÑÉÏÊö¹«Ë¾µÄÓû§¾¡¿ì¸ü¸ÄÃÜÂë £¬ÈôÊÇÔÚÆäËûÕ¾µãÉÏʹÓÃÏàͬµÄÃÜÂëÒ²ÐèÒª¸ü¸Ä¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-group-floods-dark-web-with-data-stolen-from-11-companies/


2.ÍÐ¹ÜÆ½Ì¨DigitalOcean±£´æÇå¾²ÎÊÌâ £¬Ãô¸ÐÐÅϢй¶


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¿ËÈÕ £¬ÍøÂçÍÐ¹ÜÆ½Ì¨DigitalOceanÓÉÓÚ±£´æÇå¾²ÎÊÌâ £¬ÆäÄÚ²¿Îļþ±©Â©ÔÚ¹«ÍøÉÏ £¬µ¼Ö¹«Ë¾Ä³Ð©¿Í»§µÄСÎÒ˽¼ÒÏêϸÐÅϢй¶¡£´Ë´Îй¶Êý¾Ý°üÀ¨¿Í»§µÄÕÊ»§Ãû³Æ¡¢µç×ÓÓʼþµØµã¡¢´ø¿íʹÓÃÇéÐΡ¢Droplet¼ÆÊý £¬2018ÄêÖ§³öÒÔ¼°ÊÛºóºÍÏúÊۼͼ £¬¶ø¸ÃÄÚ²¿ÎĵµÒѱ»»á¼ûÖÁÉÙ15´Î¡£DigitalOceanÌåÏÖ £¬¸ÃÎĵµ½ö°üÀ¨²»µ½1£¥µÄ¿Í»§µÄÊý¾Ý £¬²¢ÇҸù«Ë¾ÕýÔÚ½ÓÄɲ½·¥ÒÔ±ÜÃâδÀ´±¬·¢ÀàËÆÊÂÎñ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/digitalocean-data-breach-leaves-internal-doc-online/


3.»ð³µÖÆÔìÉÌStadlerÔâÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂÊý¾Ýй¶


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¹ú¼Ê»ð³µÖÆÔìÉÌStadlerÔÚÉÏÖÜËÄÍíÉÏÐû²¼ £¬ÆäÔâµ½ÁËË÷Èí¼þ¹¥»÷ £¬»ò½«µ¼Ö¹«Ë¾ºÍÔ±¹¤µÄÊý¾Ýй¶¡£·¢Ã÷¹¥»÷ºóStadler¹«Ë¾Á¬Ã¦½ÓÄÉÁ˲½·¥ £¬ÎªÐ¹Â¶Êý¾Ý±¸·Ý²¢Æð¾¢»Ö¸´ÊÜÓ°ÏìµÄϵͳ¡£ÏÖÔÚ £¬¸ÃÊÂÎñµÄͨ¸æ²¢Î´Í¸Â¶ÊÜÓ°ÏìµÄ¹æÄ£ºÍϵͳµÄÊýÄ¿ £¬µ«ÈðʿýÌåÌåÏÖ £¬Ôڴ˴ι¥»÷ÖÐÕû¸öStadler¼¯ÍŶ¼Êܵ½ÁËÓ°Ïì £¬°üÀ¨ÈðÊ¿ºÍÍâÑóµÄ¹«Ë¾¡£BleepingComputerÒÑÓëStadler½²»°ÈËÁªÏµ £¬µ«ÏÖÔÚÉÐδ»ñµÃ»Ø¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/rail-vehicle-manufacturer-stadler-hit-by-cyberattack-blackmailed/


4.LazarusÍÅ»ïʹÓÃ2FA App·Ö·¢Dacls RAT £¬Ñ¬È¾Mac×°±¸


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


MalwarebytesÑо¿Ö°Ô±·¢Ã÷ £¬Ó볯ÏÊÓÐÁªÏµµÄºÚ¿Í×éÖ¯Lazarus £¬Í¨¹ý»ùÓÚMacϵͳµÄ2FAÓ¦ÓóÌÐòmacaOTA·Ö·¢Dacls RATбäÖÖ £¬¸ÃÓ¦ÓóÌÐòÖ÷ÒªÓÉÖйúÓû§Ê¹Óá£Ñо¿·¢Ã÷ £¬¹¥»÷ÕßÓÚ4ÔÂ8ÈÕÔÚÏã¸Û½«¿ÉÒÉMacÓ¦ÓóÌÐòµÄTinkaOTPÉÏ´«ÖÁVirusTotalµÄ £¬²¢ÇұܿªÁËËùÓÐÒýÇæµÄ¼ì²â¡£¸ÃбäÌå¿ÉÒÔʵÏÖÖÖÖÖ¹¦Ð§ £¬ÀýÈçÏÂÁîÖ´ÐС¢ÎļþÖÎÀí¡¢Á÷Á¿ÊðÀíºÍÈ䳿ɍÃè £¬×ܹ²°üÀ¨ÓÐ7¸ö²å¼þ £¬²¢ÇÒʹÓÃWolfSSL¿â¾ÙÐÐSSLͨѶ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/102981/apt/lazarus-apt-mac-dacls-rat.html?utm_source=rss&utm_medium=rss&utm_campaign=lazarus-apt-mac-dacls-rat


5.ÒÁÀʺڿÍÕë¶ÔÒ©ÉÌGilead £¬ÒÔÍøÂçÓйØCOVID-19µÄÐÅÏ¢


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¾Ý·͸É籨µÀ £¬×î½ü¼¸ÖÜ £¬ÓëÒÁÀÊÓйصĺڿͽ«ÃÀ¹úÖÆÒ©ÉÌGilead×÷Ϊ¹¥»÷Ä¿µÄ £¬Ö¼ÔÚÍøÂçÓйØCOVID-19µÄÐÅÏ¢¡£¾ÝÊÓ²ì £¬ºÚ¿ÍÓÚ4Ô·Ý £¬Ã°³äÐÂÎÅÊÂÇéÕßÏò¸Ã¹«Ë¾ÈÏÕæÖ´·¨ºÍ¹«Ë¾ÊÂÎñµÄ¸ß¹Ü·¢ËÍÁËÒ»·â´¹ÂÚÓʼþ £¬Ö¼ÔÚÆÆËðÆäµç×ÓÓʼþÕÊ»§¡£ÒÁÀÊפÍŽá¹ú´ú±íÍÅ·ñ¶¨ÆäÓëÏ®»÷ÓÐÈκÎÇ£Á¬ £¬²¢ÌåÏÖÒÁÀÊÕþ¸®²»¼ÓÈëÍøÂçÕ½¡£¶øGilead¾Ü¾ø¶Ô´ËÊÂÖÃÆÀ £¬ÓÉÓÚ¹«Ë¾²»ÌÖÂÛÍøÂçÇå¾²ÎÊÌâµÄÕþ²ß¡£¾Ý·͸ÉçÊÓ²ì £¬½üÆÚÓëÒÁÀÊÓйصĺڿÍÒ²ÊÔͼ¹¥»÷ÌìÏÂÎÀÉú×éÖ¯ £¬¶øÓëÔ½ÄÏÓйصĺڿÍÔòÕýÔÚÕë¶ÔÖйú¡£


Ô­ÎÄÁ´½Ó£º

https://www.reuters.com/article/us-healthcare-coronavirus-gilead-iran-ex/exclusive-iran-linked-hackers-recently-targeted-coronavirus-drugmaker-gilead-sources-idUSKBN22K2EV


6.Atlas VPN·¢Ã÷ £¬4Ô·ÝÈ«Çò¶ñÒâÈí¼þѬȾÁ¿ÔöÖÁ4.04ÒÚ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Atlas VPN¹«Ë¾Í³¼Æ·¢Ã÷ £¬4Ô·ÝÈ«ÇòÔ¼ÓÐ4.04ÒÚ×°±¸Ñ¬È¾¶ñÒâÈí¼þ £¬¶ñÒâÈí¼þƽ¾ùÌìÌìѬȾÁè¼Ý1000Íò×°±¸ £¬ÆäÖÐ64£¥µÄ¹¥»÷Õë¶Ô½ÌÓý»ú¹¹¡£Ñ¬È¾Á¿ÔÚ4ÔÂ16ÈÕµÖ´ïá¯Áë £¬Îª1600ÍòÀý¡£Æ¾Ö¤KasperskyµÄÍøÂçÍþвͼ £¬ÖÐÑÇÊÇÍâµØÍøÂç¹¥»÷µÄÖ÷ҪĿµÄ £¬Ëþ¼ª¿Ë˹̹ºÍÎÚ×ȱð¿Ë˹̹»®·ÖÓÐ32£¥ºÍ31£¥µÄ×°±¸Ñ¬È¾ £¬¶øÔÚÖйú £¬ÓÐ27£¥µÄ×°±¸Ñ¬È¾¡£Î¢Èí·¢Ã÷ £¬½ÌÓý²¿·ÖÖ®ºó £¬ÆóÒµºÍרҵ·þÎñÐÐҵѬȾÁ¿×î¶à £¬Æä´ÎÊÇÁãÊÛºÍÏûºÄÆ·ÐÐÒµ £¬Ö®ºóÊǽðÈںͰü¹Ü·þÎñ²¿·Ö¡¢Ò½ÁÆÐÐÒµ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/400-million-malware-infection-in-april-2020/