µÂ¹úBSIÖÒ¸æËÄ¿îÊÖ»ú´æÔÚºóÃÅ£¬Ó°Ïì2ÍòÓû§£»ÓÎÏ·ÍøÕ¾Emuparadiseй¶110Íò»áÔ±µÄÕÊ»§ÐÅÏ¢
°ä²¼¹¦·ò 2019-06-11
ÓÎÏ·ÍøÕ¾EmuparadiseÔÚ2018Äê4ÔÂÔâ·êÊý¾Ýй¶ÊÂÎñ£¬µ¼Ö½ü110ÍòÂÛ̳³ÉÔ±µÄÕË»§ÐÅϢй¶¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬ÕË»§µÄµç×ÓÓʼþµØÖ·¡¢IPµØÖ·¡¢Óû§ÃûºÍ¼ÓÑÎMD5¹þÏ£ÃÜÂë¡£Have I Been PwndÍøÕ¾³ÆËüÔÚ2019Äê6ÔÂ9ÈÕ´ÓDeHashed.com½Ó¹Üµ½¸ÃÊý¾Ý¿â£¬µ«DeHashedÈôºÎ»ñµÃ¸ÃÊý¾Ý¿âµÄ·½Ê½ÒÀȻδ֪¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/retro-gaming-site-emuparadise-suffered-data-breach-exposing-account-details-of-11-million-members-3ffd53d5
2¡¢ÃÀ¹úº£¹ØºÍ±ßÚï±£»¤¾Ö·Ö°üÉÌй¶´î¿Í³µÅƼ°ÕÕÆ¬
ÃÀ¹úº£¹ØºÍ±ßÚï±£»¤¾Ö£¨CBP£©Ö¤ÊµÆäÒ»¸ö·Ö°üÉÌÔâ·êÊý¾Ýй¶ÊÂÎñ£¬µ¼Ö´î¿ÍµÄ³µÅƺÍÕÕÆ¬ÐÅϢй¶¡£CBPÔÚÐÂΟåÖаµÊ¾£¬¸Ã·Ö°üÉÌÎ¥·´ÁËCBPµÄÕþ²ß£¬Î´¾ÊÚȨµØ½«CBPÍøÂçµÄ³µÅƺʹî¿ÍÕÕÆ¬´æ´¢ÔÚ¹«Ë¾ÄÚ²¿·þÎñÆ÷ÖУ¬²¢ÔÚºÚ¿ÍÈëÇÖÊÂÎñÖÐй¶¡£CBP²¢Î´Ð¹Â©¸Ã·Ö°üÉ̵ÄÃû×Ö£¬µ«ÓйØÃ½Ì屨·ָ³ö¿ÉÄÜÊÇPerceptics¹«Ë¾¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/cbp-says-hackers-stole-license-plate-and-travelers-photos/
3¡¢µÂ¹úBSIÖÒ¸æËÄ¿îÊÖ»ú´æÔÚºóÃÅ£¬Ó°Ïì2ÍòÓû§
µÂ¹úÁª¹úÐÅÏ¢°²È«°ì¹«ÊÒ£¨BSI£©ÖÒ¸æÔڸùúÏúÊÛµÄÖÁÉÙËÄ¿îÖÇÄÜÊÖ»úÐͺŵĹ̼þÖб»Ö²ÈëºóÃÅ£¬ÊÜÓ°ÏìµÄÐͺÅÔ̺¬Doogee BL7000¡¢M-Horse Pure 1¡¢Keecoo P11ºÍVKworld Mix Plus¡£ÕâËÄ¿îÊÖ»ú¶¼ÊǵͶËAndroidÊÖ»ú¡£BSI³ÆÕâЩÊÖ»úµÄ¹Ì¼þÔ̺¬Ò»¸öÃûΪAndr/Xgen2-CYµÄºóÃÅľÂí¡£¸ÃľÂí¿ÉÍøÂçÉ豸µÄ¾ßÌåÐÅÏ¢²¢Æ¾¾ÝC&CµÄºÅÁîÖ´ÐжñÒâ²Ù×÷¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/germany-backdoor-found-in-four-smartphone-models-20000-users-infected/
4¡¢Ð¶ñÒâÍÚ¿ó»î¶¯£¬ÀûÓÃWebLogic·ì϶·Ö·¢ÃÅÂÞ±Ò¿ó¹¤
Ç÷Ïò¿Æ¼¼·¢ÏÖÒ»¸öÀûÓÃWebLogic·ì϶·Ö·¢ÃÅÂޱҿ󹤵ÄжñÒâÍÚ¿ó»î¶¯¡£¹¥»÷ÕßÀûÓÃ4Ô·ݱ»½¨¸´µÄWebLogic·´ÐòÁл¯·ì϶£¨CVE-2019-2725£©Ö´Ðй¥»÷£¬¸Ã·ì϶¿Éµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌºÅÁîÖ´ÐС£¹¥»÷ÕßʹÓõĻìºÏ¼¼ÊõÒ²ºÜ³ö¸ñ£ºËûÃǽ«¶ñÒâ´úÂë°µ²ØÔÚÖ¤ÊéÎļþÖС£ÕâЩ֤ÊéÎļþ¿´ÆðÀ´Ïñͨ³£µÄÒþÖÔ¼ÓÇ¿Óʼþ£¨PEM£©Ìåʽ֤Ê飬µ«ÏÖʵÉÏÔ̺¬ÓÃÓÚÏÂÔØºÍÖ´ÐÐpayloadµÄ¶ñÒâPowerShell¾ç±¾¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-2725-exploited-and-certificate-files-used-for-obfuscation-to-deliver-monero-miner/
5¡¢MuddyWaterй¥»÷»î¶¯£¬·Ö·¢¶à½×¶ÎºóÃÅPOWERSTATS V3
Ç÷Ïò¿Æ¼¼°²È«×êÑÐÈËÔ±·¢ÏÖMuddyWaterÔÚй¥»÷»î¶¯ÖÐʹÓÃÁËеĶà½×¶ÎPowerShellºóÃÅPOWERSTATS v3¡£¸ÃºóÃű»ÓÃÓÚÕë¶ÔÔ¼µ©´óѧºÍÍÁ¶úÆäµ±¾ÖµÄÍøÂç´¹µö¹¥»÷ÖС£¸ÃºóÃÅ¿ÉÍøÂç²Ù×÷ϵͳµÄÐÅÏ¢²¢ÉÏ´«ÖÁC&C·þÎñÆ÷£¬Ôڽӹܵ½ÏàÓ¦µÄºÅÁîºó£¬¸ÃºóÃÅ»¹¿ÉÓÃÓÚÏÂÔØºÍ×°ÖÃÆäËüpayload¡£Ç÷Ïò¿Æ¼¼¹Û²ìµ½¹¥»÷ÕßÔÚ1Ô·ݷַ¢.NETºóÃÅSHARPSTATS£¬²¢ÔÚͳһ¸öÔÂÇл»µ½DelphiºóÃÅDELPHSTATS£»ÔÚ3ÔºÍ4Ô¹¥»÷ÕßÖØÒª·Ö·¢POWERSTATS v2£¬²¢ÔÚ5Ô·ÝÇл»µ½POWERSTATS v3¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools/
6¡¢VLC²¥·ÅÆ÷°ä²¼Ð°汾3.0.7£¬½¨¸´43¸ö°²È«·ì϶
VLC²¥·ÅÆ÷ÔÚа汾3.0.7Öн¨¸´ÁË43¸ö°²È«·ì϶£¬Ô̺¬2¸ö¸ßΣ·ì϶¡¢21¸öÖÐΣ·ì϶ºÍ20¸öµÍΣ·ì϶¡£Á½¸ö¸ßΣ·ì϶±ðÀëÊÇÒÀÀµ¿âfaad2ÖеÄÔ½½çд·ì϶ºÍRISTÄ£¿éÖеÄÕ»»º³åÇøÒç¶Âí½Å¡£ÆäËü·ì϶Ô̺¬Ô½½ç¶Á¡¢¶ÑÒç³ö¡¢NULL½âÒýÓá¢use-after-freeµÈ°²È«ÎÊÌâ¡£ÆëÈ«·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£ºhttps://gbhackers.com/vlc-3-0-7-released/


¾©¹«Íø°²±¸11010802024551ºÅ