¶íÂÞ˹ºÚ¿Í¹¥»÷²¨À¼Õþ¸®»ú¹¹Ðû²¼Óйر±Ô¼ÑÝϰÐéαÐÅÏ¢£»Ë¼¿ÆÎªCMLºÍVIRL-PEÐû²¼Çå¾²¸üУ¬ÐÞ¸´SaltStack¿ò¼ÜÎó²î

Ðû²¼Ê±¼ä 2020-06-01

1.¶íÂÞ˹ºÚ¿Í¹¥»÷²¨À¼Õþ¸®»ú¹¹£¬Ðû²¼Óйر±Ô¼ÑÝϰÐéαÐÅÏ¢


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


²¨À¼Õþ¸®Ðû²¼¶íÂÞ˹¶ÔÆä¾ÙÐÐÁË´ó¹æÄ£µÄÍøÂç¹¥»÷£¬Ö¼ÔÚ¹¥»÷²¨À¼¾ü¶Ó£¬ÒÔ¼°ÆÆËð»ªÉ³ºÍ»ªÊ¢¶ÙÖ®¼äµÄ¹ØÏµ¡£¾ÝϤ£¬ºÚ¿ÍÏ®»÷Á˲¨À¼µÄ¶à¸öÕ¾µã£¬ÔÚNiezaleznapl¡¢Olsztyn24com¡¢RadioSzzezecinpl¡¢ePoznanplµÄInternetµÈÍøÕ¾ÉÏÐû²¼Óйر±Ô¼ÑÝϰ¡°2020Ä꺴ÎÀÕßÅ·ÖÞ¡±µÄÐéαÐÅÏ¢¡£²¨À¼ÌØÊâ·þÎñÕþ¸®Ð­µ÷²¿³¤½²»°ÈËStanislav ZharinÌåÏÖ£¬Õâ´Î¹¥»÷Ç¡·ê¡°º´ÎÀÕßÅ·ÖÞ2020¡±ÏÂÒ»½×¶ÎÑÝϰµÄ×îÏÈ£¬²¢ÇÒÉæ¼°µ½Á˲¨À¼ÓëÃÀ¹úÖ®¼äµÄ¾üÊÂÏàÖú£¬ºÚ¿ÍÄ¿µÄ¿ÉÄÜÊÇΪÁËÍ»ÆÆ±±Ô¼µÄͳһ£¬ÒÔ¼°ÃÀ¾üºÍ²¨À¼²½¶ÓÍŽáµÄ¿ÉÄÜÐÔ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/05/russian-hackers-attacked-poland-due-to.html


2.˼¿ÆÎªCMLºÍVIRL-PEÐû²¼Çå¾²¸üУ¬ÐÞ¸´SaltStack¿ò¼ÜÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


˼¿ÆÐû²¼ÁËÇå¾²¸üУ¬ÒÔÐÞ¸´Cisco Modeling LabsÆóÒµ°æ£¨CML£©ºÍÐéÄâInternet·ÓÉʵÑéÊÒСÎÒ˽¼Ò°æ£¨VIRL-PE£©ÖÐSaltStack¿ò¼ÜÎó²î£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´¿ØÖÆÏµÍ³¡£´Ë´Î²¹¶¡ÐÞ¸´ÁËÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-11651£©£¬ËüÔÊÐíÔ¶³ÌÓû§ÔÚ²»¾ÙÐÐÉí·ÝÑéÖ¤µÄÇéÐÎÏ»á¼ûmethods£¬²¢¿ÉÒÔ´Ósalt master»òsalt minionsÉÏÔËÐÐí§ÒâÏÂÁîÀ´¼ìË÷Óû§ÁîÅÆ¡£ÉÐÓÐĿ¼±éÀúÎó²î£¨CVE-2020-11652£©£¬ÆäÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§¾ÙÐÐí§ÒâĿ¼»á¼û¡£


Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2020/05/29/cisco-releases-security-updates-cml-and-virl-pe


3.ÃÀ¹úÌú·¹«Ë¾AmtrakÔâµ½ÈëÇÖµ¼ÖÂÆäÓû§ÐÅϢй¶


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹ú¹ú¼ÒÌú·Óο͹«Ë¾AmtrakÓÚ4ÔÂ16ÈÕÍíÉÏÈ·¶¨ÓÐδ֪µÄµÚÈý·½¶ÔÆäÓû§µÄÕÊ»§¾ÙÐÐδ¾­ÊÚȨµÄ»á¼û£¬µ¼ÖÂijЩGuest Rewards»áÔ±µÄСÎÒ˽¼ÒÐÅϢй¶¡£¸Ã¹«Ë¾µÄÇå¾²ÍŶÓÔÚ¼ì²âµ½ÈëÇÖºóµÄ¼¸¸öСʱÄÚ£¬±ã½ÓÄÉÁËÏìÓ¦²½·¥£¬×èÖ¹Á˺ڿ͵Ļá¼û£¬Ö®ºóÖØÖÃÁËGuest RewardsÕÊ»§µÄÃÜÂ룬²¢ÎªÊÜÓ°ÏìÓû§ÌṩÁËΪÆÚÒ»ÄêµÄExperianµÄIdentityWorksÉí·ÝµÁÓñ£»¤·þÎñ¡£Amtrak¹«Ë¾²¢Î´Í¸Â¶´Ë´ÎÊÂÎñÓ°ÏìµÄÕÊ»§×ÜÊý»ò¿ÉÄÜ̻¶µÄСÎÒ˽¼ÒÐÅÏ¢ÀàÐÍ£¬µ«ÌåÏÖûÓÐÈκβÆÎñÊý¾Ý¡¢ÐÅÓÿ¨ÐÅÏ¢»òÉç»áÇå¾²ºÅÂëй¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/amtrak-resets-user-passwords-after-guest-rewards-data-breach/


4.ºÚ¿Íй¶°µÍøÍйÜÌṩÉÌDaniel's HostingÊý¾Ý¿â


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ºÚ¿ÍÓÚ5ÔÂ31ÈÕ¹ûÕæÁË×î´óµÄÃâ·Ñ°µÍø·þÎñÍйÜÌṩÉÌDaniel's Hosting£¨DH£©µÄÊý¾Ý¿â¡£¾ÝϤ£¬´Ë´Îй¶±¬·¢ÔÚ½ñÄêÄêÍ·£¬¼´2020Äê3ÔÂ10ÈÕ£¬DHµÄËùÓÐÕßDaniel WinzenÌåÏÖ£¬ºÚ¿ÍÈëÇÖÁËËûµÄÍøÕ¾²¢ÍµÈ¡ÁËËûµÄÊý¾Ý¿â£¬È»ºóɨ³ýÁËÆäËùÓзþÎñÆ÷¡£ÔÚ¸ÃÊÂÎñ±¬·¢µÄ±¬·¢Á½Öܺó£¬3ÔÂ26ÈÕ£¬DHÓÀÊÀÐÔµØ×èÖ¹ÁËÆä·þÎñ£¬²¢±Þ²ßÓû§Ç¨áãµ½ÐµİµÍøÍйܷþÎñÌṩÉÌ¡£´Ë´Îй¿à´×ÔºÚ¿ÍKingNull£¬×ß©ÁË3671¸öµç×ÓÓʼþµØµã£¬7205¸öÕÊ»§ÃÜÂëºÍ8580¸ö.onionÓòµÄ˽Կ¡£ÍþвÇ鱨¹«Ë¾Under BreachÆÊÎö£¬´Ë´Î×ß©µÄÊý¾Ý¿âÉæ¼°µ½Êýǧ¸öDarknetÓòµÄËùÓÐÕߺÍÓû§µÄÃô¸ÐÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hacker-leaks-database-of-dark-web-hosting-provider/


5.ºÚ¿ÍαÔìWindowsÓÎÏ·ValorantµÄÊÖ»ú°æÒÔÈö²¥¶ñÒâÈí¼þ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ºÚ¿ÍαÔìRiot GamesµÄÓÎÏ·ValorantµÄÊÖ»ú°æÒÔÈö²¥¶ñÒâÈí¼þ¡£2019Äê10Ô£¬Riot GamesÐû²¼½«ÓÚ2020Äê6ÔÂÍÆ×ÅÃûΪValorantµÄÐÂÓÎÏ·£¬¸ÃÓÎÏ·¿ÉÔÚMicrosoft WindowsÉÏʹÓã¬ÏÖÔÚÍÆ³öÁ˲âÊ԰棬¾Ýͳ¼ÆÏÔʾ£¬ÌìÌìÓÐÁè¼Ý300ÍòÍæ¼ÒʹÓ᣺ڿÍÏÖÔÚ¾ÍÔÚʹÓôËÓÎÏ·µÄÈȶÈ£¬Íƹãð³äΪÊÖ»ú°æValorantµÄ¶ñÒⲡ¶¾£¬²¢ÔÚYouTubeÉÏÈö²¥¸ÃαÔìµÄÓÎÏ·µÄæÒÏ·ÌåÑ飬ÒÔÓÕʹÓû§ÏÂÔØ¡£´Ë´Î¹¥»÷Óм¸¸ö²î±ð°æ±¾µÄαÔìÓÎÏ·£¬µ«ÎÞÂÛÔõÑù£¬ ÔÚ×°ÖÃÓÎÏ·ºóÓû§¶¼»á±»Öض¨Ïòµ½Õ©Æ­Ô˶¯ÍøÕ¾»ò×°ÖÃÆäËû¶ñÒâÓ¦Óá£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/fake-mobile-game-version-valorant-malware/


6.еĴ¹ÂÚÔ˶¯Í¨Ì«¹ý·¢Î±ÔìµÄAWS֪ͨ£¬ÇÔÈ¡Óû§Æ¾Ö¤


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Abnormal SecurityµÄÑо¿Ö°Ô±·¢Ã÷£¬ÔÚеĴ¹ÂÚÔ˶¯ÖУ¬ºÚ¿Í·Ö·¢Î±ÔìµÄAmazon Web Services£¨AWS£©Í¨Öª£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£Abnormal SecurityÌåÏÖ£¬´Ë´Î¹¥»÷Ô˶¯ÓÐÐí¶à²î±ðµÄ°æ±¾£¬Éæ¼°²î±ðµÄ·¢¼þÈ˵ç×ÓÓʼþ¡¢¿Í»§¶ËºÍÓÐÓøºÔØ£¬¿ÉÊÇÓÐÒ»¸öÅäºÏµãÊÇ£¬ÕâЩµç×ÓÓʼþÔ´×Ôͳһ¸öÓÉ·¨¹úµÄVPNÍйÜIPµØµã¡£ÕâЩ¹¥»÷ÖеÄÿ¸öÓÐÓøºÔØÁ´½Ó¾ù»áÁ´½Óµ½Î±ÔìµÄAWSƾ֤ÇÔÈ¡ÍøÕ¾£¬Ò»µ©Óû§ÊäÈëÁËÆ¾Ö¤£¬¹¥»÷Õß½«»ñµÃ¶ÔÓû§µÄAWSÕË»§µÄ»á¼ûȨÏÞ£¬²¢ÇÒÇÔÈ¡ÆäÃô¸ÐÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/aws-phishing-scam-steals-aws-credentials-fake-notification/