¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181119

°ä²¼¹¦·ò 2018-11-19

1¡¢°µÍøÍйܷþÎñÉÌDaniel's HostingÔâºÚ¿ÍÈëÇÖ£¬³¬¹ý6500¸öÍøÕ¾±»É¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


11ÔÂ15ÈÕ°µÍø×î´óµÄÍøÂçÍйܷþÎñÉÌDaniel's HostingÔâµ½ºÚ¿ÍÈëÇÖ£¬¹¥»÷Õßɾ³ýÁË6500¶à¸öÍøÕ¾£¬²¢ÇÒÕâÐ©ÍøÕ¾¶¼Ã»Óб¸·Ý¡£¸ÃÍйܷþÎñÉ̱³ºóµÄ¿ª·¢ÈËÔ±Daniel Winzen֤ʵ³Æ£¬·þÎñÆ÷µÄrootÕË»§Ò²±»É¾³ýÁË£¬²¢ÇÒÆ½Ì¨ÉÏÍйܵij¬¹ý6500¸öÍøÕ¾µÄÊý¾Ý¶¼Òѳ¹µ×ÃÔʧ¡£¹¥»÷Õß¿ÉÄÜÊÇÀûÓÃÁËphpÖеÄÁãÈÕ·ì϶£¬µ«Ò²ÓпÉÄÜÊÇÀûÓÃÁËÆäËüµÄ·ì϶¡£Ä¿Ç°»¹Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÊÂÕÆ¹Ü¡£

   

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78165/cyber-crime/daniels-hosting-hacked.html


2¡¢¼ÓÃÜÓʼþ·þÎñÉÌProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƭ¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ê¢ÐеļÓÃܵç×ÓÓʼþ·þÎñProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƭµÄ¹¥»÷»î¶¯¡£¹¥»÷ÕßAmFearLiathMorÐû³ÆÈëÇÖÁ˸ù«Ë¾²¢ÇÔÈ¡ÁË¡°´óÁ¿¡±µÄÓû§Êý¾Ý¡£¹¥»÷Õß½«ÆäÊê½ðÒªÇó°ä²¼ÔÚPastebinÉÏ£¬²¢ÍþвҪÏòÈ«ÊÀ½ç°ä²¼»òÏúÊÛÕâЩÊý¾Ý£¬µ«²¢Î´Ìṩ±»µÁÊý¾ÝµÄÑù±¾¡£ProtonMailÔÚµ÷²éÖ®ºó·ñ¶¨ÁËÕâÆð¹¥»÷ÊÂÎñ£¬Ðû³ÆÕâÖ»ÊÇÒ»¸öÊÔͼڲƭµÄȦÌס£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78133/hacking/protonmail-hacked-hoax.html


3¡¢×êÑÐÍŶӰ䲼¹ØÓÚOilRigжñÒâ»î¶¯µÄ·ÖÎö»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Palo Alto NetworksµÄUnit 42×êÑÐÍŶӰ䲼¹ØÓÚ·¸×ïÍÅ»ïOilRigÔÚÌáÒé¹¥»÷ǰ¶ÔÆä¶ñÒâÈí¼þºÍ¹¤¾ß½øÐвâÊԻµÄ·ÖÎö»ã±¨¡£OilRigµÄ²âÊÔÁ÷³Ìͨ³£Ô̺¬¶ÔÆä½»¸¶Îĵµ½øÐÐÉÙÁ¿Åú¸Ä²¢Ìá½»µ½ÔÚÏßɨÃè·þÎñ£¬ÒÔÈ·¶¨ÎļþµÄ¶ñÒâˮƽºÍÕÒ³öÈôºÎ¶ã±ÜÕâЩ¼ì²â¡£×êÑÐÈËÔ±·¢ÏÖOilRigÔÚ¹¥»÷ǰ6Ìì¾ÍÆðÍ·Á˲âÊԻ£¬²¢ÔÚ8ÔÂ20ÈÕ¡¢21ÈÕºÍ26ÈÕ±ðÀë½øÐÐÁËÈý´Î²âÊÔ¡£Æä×îÖÕ²âÊÔÎļþµÄ´´½¨¹¦·òÊÇÔÚ½»¸¶ÎĵµµÄ´´½¨¹¦·ò£¨20·ÖÖÓÖ®ºóÕâЩÎĵµ¾Íͨ¹ý´¹µöÓʼþ·¢ËͳöÈ¥£©µÄ8¸öÓ×ʱ֮ǰ¡£

  

Ô­ÎÄÁ´½Ó£º

https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/


4¡¢×êÑÐÍŶӰ䲼¹ØÓÚ·¸×ïÍÅ»ïINDRIK SPIDERµÄ·ÖÎö»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


CrowdStrike°ä²¼¹ØÓÚ·¸×ïÍÅ»ïNDRIK SPIDERµÄ·ÖÎö»ã±¨¡£¸Ã×éÖ¯×Ô2014Äê6ÔÂÒÔÀ´Ò»ÏòʹÓöñÒâÈí¼þDridex£¬²¢¿ª·¢Á˺ܶàеÄÄ£¿éºÍÔö³¤ÁËÐµķ´·ÖÎöÖ°ÄÜ£¬ÒѾ­»ñµÃÁËÊý°ÙÍòÃÀÔªµÄ·¸×ïÀûÈó¡£µ«´Ó2017Äê7ÔÂÆðÍ·£¬¸Ã×éÖ¯ÆðͷתÏòÐÂÀÕË÷Èí¼þBitPaymer£¬²¢ÒѾ­Í¨¹ýBitPaymer»ñµÃÁËÔ¼150ÍòÃÀÔªµÄÊÕÈë¡£BitPaymerÓëDridexÖ®¼ä´æÔÚÇ¿ÁÒµÄÓйØÐÔ£¬ËüÃÇÔ̺¬ºÃ¶à³ÁµþµÄ·´·ÖÎöÖ°ÄÜ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/


5¡¢×êÑÐÈËÔ±·¢ÏÖGmail´æÔÚbug£¬¿ÉÓÃÓÚÌáÒé´¹µö¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±Tim Cotten·¢ÏÖGmail´æÔÚÒ»¸ö·ì϶£¬¿ÉÄܱ»·¸×ï·Ö×ÓÀûÓÃÀ´½øÐÐÍøÂç´¹µö¹¥»÷¡£¸ÃÎÊÌâÔ´ÓÚGmail×éÖ¯ÆäÎļþ¼ÐµÄ·½Ê½£¬Ëü»áƾ¾ÝÓʼþÖÐFrom×ֶεĵØÖ·À´½«µç×ÓÓʼþ¹éµµµ½¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖС£ÈôÊǹ¥»÷ÕßÏòÖ¸±ê·¢ËÍ´¹µöÓʼþ£¬²¢ÔÚFrom×Ö¶ÎÔ̺¬Ö¸±êµÄµç×ÓÓʼþµØÖ·£¬Ôò¸ÃÓʼþ½«×Ô¶¯Í¬Ê±·¢ËÍÖÁÖ¸±êµÄÊÕ¼þÏäºÍÒÑ·¢ËÍÎļþ¼Ð¡£Õâ¶ÔÓÚ¹¥»÷ÕßÀ´Ëµ¿ÉÄÜÊÇÒ»¸ö¸£Òô£¬ÓÉÓÚ·¢ËÍÖÁÊÕ¼þÏäÀïµÄÀ¬»øÓʼþ¿ÉÄܻᱻ¹ýÂË£¬µ«·¢ËÍÖÁ¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖеÄÓʼþ½«»á±»±£ÁôÏÂÀ´¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/gmail-glitch-offers-stealthy-trick-for-phishing-attacks/139167/


6¡¢Instagramзì϶µ¼Ö²¿ÃÅÓû§µÄÃÜÂë¶³ö

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝThe InformationµÄ±¨Â·£¬Instagram4Ô·ݰ䲼µÄÓÃÓÚÏÂÔØÓ×ÎÒ×ÊÁϵŤ¾ß´æÔÚbug£¬¿ÉÄܵ¼ÖÂÓû§µÄÃÜÂë¶³ö¡£µ±Óû§Ê¹ÓøÃÖ°ÄÜʱ£¬ËûÃǵÄÃ÷ÎÄÃÜÂë»á³Ê´Ë¿ÌURLÖУ¬Òò¶øÔÚ¹«¹²ÍøÂçÖÐʹÓøù¤¾ß¿ÉÄܻᵼÖÂÃÜÂëÏò¹¥»÷Õß¶³ö¡£¸Ã¹«Ë¾³ÆÒѾ­½¨¸´Á˸÷ì϶£¬²¢ÏòÊÜÓ°ÏìµÄ¼«ÉÙÊýÈË·¢ËÍÁËÓʼþ֪ͨ¡£´Ë±í£¬°²È«×¨¼Òͨ¹ýÕâÒ»ÊÂÎñÖÊÒÉInstagram´æ´¢ÁËÓû§µÄÃ÷ÎÄÃÜÂ룬µ«¸Ã¹«Ë¾½²»°ÈË·ñ¶¨ÁËÕâÒ»Ôð¹Ö¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78173/data-breach/instagram-glitch-exposed-passwords.html


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù