¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181119
°ä²¼¹¦·ò 2018-11-191¡¢°µÍøÍйܷþÎñÉÌDaniel's HostingÔâºÚ¿ÍÈëÇÖ£¬³¬¹ý6500¸öÍøÕ¾±»É¾
11ÔÂ15ÈÕ°µÍø×î´óµÄÍøÂçÍйܷþÎñÉÌDaniel's HostingÔâµ½ºÚ¿ÍÈëÇÖ£¬¹¥»÷Õßɾ³ýÁË6500¶à¸öÍøÕ¾£¬²¢ÇÒÕâÐ©ÍøÕ¾¶¼Ã»Óб¸·Ý¡£¸ÃÍйܷþÎñÉ̱³ºóµÄ¿ª·¢ÈËÔ±Daniel Winzen֤ʵ³Æ£¬·þÎñÆ÷µÄrootÕË»§Ò²±»É¾³ýÁË£¬²¢ÇÒÆ½Ì¨ÉÏÍйܵij¬¹ý6500¸öÍøÕ¾µÄÊý¾Ý¶¼Òѳ¹µ×ÃÔʧ¡£¹¥»÷Õß¿ÉÄÜÊÇÀûÓÃÁËphpÖеÄÁãÈÕ·ì϶£¬µ«Ò²ÓпÉÄÜÊÇÀûÓÃÁËÆäËüµÄ·ì϶¡£Ä¿Ç°»¹Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÊÂÕÆ¹Ü¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78165/cyber-crime/daniels-hosting-hacked.html2¡¢¼ÓÃÜÓʼþ·þÎñÉÌProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƹ¥»÷
Ê¢ÐеļÓÃܵç×ÓÓʼþ·þÎñProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƵĹ¥»÷»î¶¯¡£¹¥»÷ÕßAmFearLiathMorÐû³ÆÈëÇÖÁ˸ù«Ë¾²¢ÇÔÈ¡ÁË¡°´óÁ¿¡±µÄÓû§Êý¾Ý¡£¹¥»÷Õß½«ÆäÊê½ðÒªÇó°ä²¼ÔÚPastebinÉÏ£¬²¢ÍþвҪÏòÈ«ÊÀ½ç°ä²¼»òÏúÊÛÕâЩÊý¾Ý£¬µ«²¢Î´Ìṩ±»µÁÊý¾ÝµÄÑù±¾¡£ProtonMailÔÚµ÷²éÖ®ºó·ñ¶¨ÁËÕâÆð¹¥»÷ÊÂÎñ£¬Ðû³ÆÕâÖ»ÊÇÒ»¸öÊÔͼڲƵÄȦÌס£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78133/hacking/protonmail-hacked-hoax.html3¡¢×êÑÐÍŶӰ䲼¹ØÓÚOilRigжñÒâ»î¶¯µÄ·ÖÎö»ã±¨
Palo Alto NetworksµÄUnit 42×êÑÐÍŶӰ䲼¹ØÓÚ·¸×ïÍÅ»ïOilRigÔÚÌáÒé¹¥»÷ǰ¶ÔÆä¶ñÒâÈí¼þºÍ¹¤¾ß½øÐвâÊԻµÄ·ÖÎö»ã±¨¡£OilRigµÄ²âÊÔÁ÷³Ìͨ³£Ô̺¬¶ÔÆä½»¸¶Îĵµ½øÐÐÉÙÁ¿Åú¸Ä²¢Ìá½»µ½ÔÚÏßɨÃè·þÎñ£¬ÒÔÈ·¶¨ÎļþµÄ¶ñÒâˮƽºÍÕÒ³öÈôºÎ¶ã±ÜÕâЩ¼ì²â¡£×êÑÐÈËÔ±·¢ÏÖOilRigÔÚ¹¥»÷ǰ6Ìì¾ÍÆðÍ·Á˲âÊԻ£¬²¢ÔÚ8ÔÂ20ÈÕ¡¢21ÈÕºÍ26ÈÕ±ðÀë½øÐÐÁËÈý´Î²âÊÔ¡£Æä×îÖÕ²âÊÔÎļþµÄ´´½¨¹¦·òÊÇÔÚ½»¸¶ÎĵµµÄ´´½¨¹¦·ò£¨20·ÖÖÓÖ®ºóÕâЩÎĵµ¾Íͨ¹ý´¹µöÓʼþ·¢ËͳöÈ¥£©µÄ8¸öÓ×ʱ֮ǰ¡£
ÔÎÄÁ´½Ó£º
https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/4¡¢×êÑÐÍŶӰ䲼¹ØÓÚ·¸×ïÍÅ»ïINDRIK SPIDERµÄ·ÖÎö»ã±¨
CrowdStrike°ä²¼¹ØÓÚ·¸×ïÍÅ»ïNDRIK SPIDERµÄ·ÖÎö»ã±¨¡£¸Ã×éÖ¯×Ô2014Äê6ÔÂÒÔÀ´Ò»ÏòʹÓöñÒâÈí¼þDridex£¬²¢¿ª·¢Á˺ܶàеÄÄ£¿éºÍÔö³¤ÁËÐµķ´·ÖÎöÖ°ÄÜ£¬ÒѾ»ñµÃÁËÊý°ÙÍòÃÀÔªµÄ·¸×ïÀûÈó¡£µ«´Ó2017Äê7ÔÂÆðÍ·£¬¸Ã×éÖ¯ÆðͷתÏòÐÂÀÕË÷Èí¼þBitPaymer£¬²¢ÒѾͨ¹ýBitPaymer»ñµÃÁËÔ¼150ÍòÃÀÔªµÄÊÕÈë¡£BitPaymerÓëDridexÖ®¼ä´æÔÚÇ¿ÁÒµÄÓйØÐÔ£¬ËüÃÇÔ̺¬ºÃ¶à³ÁµþµÄ·´·ÖÎöÖ°ÄÜ¡£
ÔÎÄÁ´½Ó£º
https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/5¡¢×êÑÐÈËÔ±·¢ÏÖGmail´æÔÚbug£¬¿ÉÓÃÓÚÌáÒé´¹µö¹¥»÷
×êÑÐÈËÔ±Tim Cotten·¢ÏÖGmail´æÔÚÒ»¸ö·ì϶£¬¿ÉÄܱ»·¸×ï·Ö×ÓÀûÓÃÀ´½øÐÐÍøÂç´¹µö¹¥»÷¡£¸ÃÎÊÌâÔ´ÓÚGmail×éÖ¯ÆäÎļþ¼ÐµÄ·½Ê½£¬Ëü»áƾ¾ÝÓʼþÖÐFrom×ֶεĵØÖ·À´½«µç×ÓÓʼþ¹éµµµ½¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖС£ÈôÊǹ¥»÷ÕßÏòÖ¸±ê·¢ËÍ´¹µöÓʼþ£¬²¢ÔÚFrom×Ö¶ÎÔ̺¬Ö¸±êµÄµç×ÓÓʼþµØÖ·£¬Ôò¸ÃÓʼþ½«×Ô¶¯Í¬Ê±·¢ËÍÖÁÖ¸±êµÄÊÕ¼þÏäºÍÒÑ·¢ËÍÎļþ¼Ð¡£Õâ¶ÔÓÚ¹¥»÷ÕßÀ´Ëµ¿ÉÄÜÊÇÒ»¸ö¸£Òô£¬ÓÉÓÚ·¢ËÍÖÁÊÕ¼þÏäÀïµÄÀ¬»øÓʼþ¿ÉÄܻᱻ¹ýÂË£¬µ«·¢ËÍÖÁ¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖеÄÓʼþ½«»á±»±£ÁôÏÂÀ´¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/gmail-glitch-offers-stealthy-trick-for-phishing-attacks/139167/6¡¢Instagramзì϶µ¼Ö²¿ÃÅÓû§µÄÃÜÂë¶³ö
ƾ¾ÝThe InformationµÄ±¨Â·£¬Instagram4Ô·ݰ䲼µÄÓÃÓÚÏÂÔØÓ×ÎÒ×ÊÁϵŤ¾ß´æÔÚbug£¬¿ÉÄܵ¼ÖÂÓû§µÄÃÜÂë¶³ö¡£µ±Óû§Ê¹ÓøÃÖ°ÄÜʱ£¬ËûÃǵÄÃ÷ÎÄÃÜÂë»á³Ê´Ë¿ÌURLÖУ¬Òò¶øÔÚ¹«¹²ÍøÂçÖÐʹÓøù¤¾ß¿ÉÄܻᵼÖÂÃÜÂëÏò¹¥»÷Õß¶³ö¡£¸Ã¹«Ë¾³ÆÒѾ½¨¸´Á˸÷ì϶£¬²¢ÏòÊÜÓ°ÏìµÄ¼«ÉÙÊýÈË·¢ËÍÁËÓʼþ֪ͨ¡£´Ë±í£¬°²È«×¨¼Òͨ¹ýÕâÒ»ÊÂÎñÖÊÒÉInstagram´æ´¢ÁËÓû§µÄÃ÷ÎÄÃÜÂ룬µ«¸Ã¹«Ë¾½²»°ÈË·ñ¶¨ÁËÕâÒ»Ôð¹Ö¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78173/data-breach/instagram-glitch-exposed-passwords.htmlÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ