Linux KDE 4/5´æÔÚ佨¸´µÄºÅÁî×¢Èë·ì϶£»Smominru½Ù³Ö50¶àÍǫ̀µçÄÔÍÚ¿ó£»CSA°ä²¼ÔÆÍÆËã11ÏîÍþвÁбí

°ä²¼¹¦·ò 2019-08-08
1¡¢Linux KDE 4/5´æÔÚ佨¸´µÄºÅÁî×¢Èë·ì϶ £¬PoCÒѰ䲼

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÔ±Dominik PennerÅû¶Linux KDEÖеÄÒ»¸öÉÐ佨¸´µÄ0day £¬¹¥»÷Õß¿Éͨ¹ýÓÕʹÓû§ÏÂÔØºÍ½âѹËõ¶ñÒâ.desktopºÍ.directoryÎļþÔÚÓû§µÄÍÆËã»úÉϾ²Ä¬Ö´ÐÐËÁÒâ´úÂë £¬ÉõÖÁÎÞÐèÓû§ÏÖʵ´ò¿ª¸ÃÎļþ¡£¸Ã·ì϶ӰÏìÁËKDE°æ±¾4ºÍ5 £¬ÏÕЩËùÓеÄLinux¿¯Ðа涼±»²¨¼°¡£×êÑÐÈËÔ±»¹°ä²¼ÁËPoC´úÂëÒÔ¼°¸ÃºÅÁî×¢Èë·ì϶µÄÑÝʾÊÓÆµ¡£KDEÉçÇøÈ·ÈÏÁËÕâÒ»·ì϶²¢ÏòÓû§±£ÕϽ¨¸´¹¤×÷ÔÚ½øÐÐÖС£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kde-desktop-linux-vulnerability.html


2¡¢BinanceÔâµ½ÀÕË÷ £¬¹¥»÷ÕßÍþв°ä²¼1ÍòÃû¿Í»§µÄKYCÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¼ÓÃÜÇ®±ÒÂòÂôËùBinanceÔâµ½Ò»Ãû·¸×ï·Ö×ÓµÄڲƭÀÕË÷ £¬¸ÃڲƭÕßÐû³ÆÒѾ­ÇÔÈ¡ÁËÊýǧÃûBinance¿Í»§µÄKYCÐÅÏ¢£¨¼´¡°ÏàʶÄúµÄ¿Í»§¡±ÐÅÏ¢£© £¬²¢ÏòBinanceÀÕË÷300±ÈÌØ±Ò£¨¼ÛÖµ½ü350ÍòÃÀÔª£©µÄÊê½ð¡£Binance°µÊ¾¸Ã¹«Ë¾ÈÔÔÚµ÷²éÕâЩͼÏñµÄºÏ·¨ÐÔ £¬²¢»Ø¾øÖ§¸¶Êê½ð¡£¸ÃڲƭÕß´´½¨ÁËÒ»¸öTelegram̸Ìì×é £¬²¢·ÖÏíÁË400¶àÕÅÊÖ³Ö»¤ÕÕ/Éí·ÝÖ¤µÄÈ˵ÄÕÕÆ¬ £¬µ«Æ¾¾ÝBinanceµÄ˵·¨ £¬ÕâЩͼÏñ¶ÌȱÆäÄÚ²¿ÐÅÏ¢µÄÊý×Öˮӡ £¬ÕâÔö³¤Á˶ÔÊý¾ÝÕæÊµÐÔµÄÒɻ󡣸ù«Ë¾°µÊ¾½«ÏòÌṩڲƭÕßÉí·ÝÐÅÏ¢µÄÈ˼ν±25±ÈÌØ±Ò£¨¼ÛÖµ³¬¹ý29ÍòÃÀÔª£©¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/binance-kyc-data-leak.html


3¡¢ÐǰͿËÊý¾Ý¿âSQL×¢Èë·ì϶¶³ö½ü100ÍòÌõ²ÆÕþ¼Í¼

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

°²È«×êÑÐÔ±Eugene LimÓÚ4ÔÂ8ÈÕÔÚÐÇ°Í¿ËµÄÆóÒµÊý¾Ý¿âÖз¢ÏÖÒ»¸öSQL×¢Èë·ì϶ £¬¸Ã·ì϶µ¼Ö½ü100ÍòÌõ²ÆÕþ¼Í¼¶³ö £¬Ô̺¬Ë°ÎñÐÅÏ¢¡¢ÊÕÌõÒÔ¼°¹¤×ʵ¥Êý¾ÝµÈ¡£×êÑÐÈËԱͨ¹ý¸Ã¹«Ë¾ÔÚHackerOneÉϵķì϶¼Î½±´òËãÌá½»ÁË·ì϶ £¬ÐǰͿËÔÚÁ½ÌìÄÚ½¨¸´Á˸ÃÎÊÌâ¡£×êÑÐÈËÔ±Òò¶ø»ñµÃÁË4000ÃÀÔªµÄ¼Î½±¡£¸Ã·ì϶»ã±¨ÓÚ8ÔÂ6ÈÕÔÚHackerOneÉÏÅû¶¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/sql-injection-vulnerability-exposed-starbucks-financial-records


4¡¢½©Ê¬ÍøÂçSmominru½Ù³Ö50¶àÍǫ̀µçÄÔÍÚ¿ó £¬²¢ÇÔȡʹ´¦ÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Carbon BlackµÄTAU×êÑÐÍŶӷ¢ÏÖÒ»¸öÐµĹ¥»÷»î¶¯SmominruÔÚͨ¹ý½©Ê¬ÍøÂçÍÚÈ¡ÃÅÂÞ±Ò £¬²¢ÇÒÇÔÈ¡Óû§µÄ½Ó¼ûÍ´´¦¡£SmominruÒѾ­³É¹¦½Ù³ÖÁËÈ«Çò³¬¹ý50Íǫ̀»úе £¬TAU°µÊ¾¸Ã½©Ê¬ÍøÂçÖÁÉÙÒѾ­»îÔ¾ÁËÁ½Äê £¬²¢ÇÒÖØÒªÍ¨¹ýÓÀºãÖ®À¶´«²¼ £¬Êܺ¦ÕßÖØÒªÎ»ÓÚÑÇÌ«µØÓò¡£×êÑÐÈËÔ±½«ÕâÖÖ½áºÏÍÚ¿óºÍÍ´´¦ÇÔÈ¡µÄ¹¥»÷³ÆÖ®Îªaccess mining¡£×êÑÐÈËÔ±»¹·¢ÏÖSmominruÓëÁíÒ»¸ö½©Ê¬ÍøÂçMyKings´æÔÚ¹ØÁª¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/new-cryptojacking-campaign-strikes-half-a-million-pcs/


5¡¢°Í»ù˹̹ÄÐ×Óͨ¹ý»ß¸AT£¦TÔ±¹¤·¸·¨½âËø200¶àÍò²¿ÊÖ»ú


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°Í»ù˹̹һÃûÄÐ×Ó±»Ö¸¿ØÔÚÎåÄêµÄ¹¦·òÄÚͨ¹ý»ß¸AT£¦TµçÐŹ«Ë¾µÄÔ±¹¤·¸·¨½âËø200¶àÍò²¿ÊÖ»úÒÔ¼°Ôڸù«Ë¾µÄÍøÂçÉÏÖ²Èë¶ñÒâÈí¼þ¡£¸ÃÃûÄÐ×ÓÊÇÏÖÄê34ËêµÄ°Í»ù˹̹¹«ÃñMuhammad Fahd £¬Æ¾¾ÝÃÀ¹úÁª¹úµ±¾ÖµÄ¸æ×´Êé £¬FahdÔÚ2012ÄêÖÁ2017ÄêÆÚ¼äÏòAT£¦TÄÚ²¿Ô±¹¤»ß¸³¬¹ý100ÍòÃÀÔª £¬ÒÔ·¸·¨½âËø±»AT£¦T¹«Ë¾Ëø¶¨µÄÊÖ»úÉ豸¡£ÔÚ²Î¼ÓÆä´òËãµÄһЩԱ¹¤±»AT&T¿ª³ýºó £¬Fahd»¹Ïò¸Ã¹«Ë¾ÄÚÍø×°ÖöñÒ⹤¾ß £¬Ê¹Æä¿ÉÄÜͨ¹ýAT£¦TÍÆËã»úÔ¶³Ì½âËøÊÖ»ú¡£Fahd½«Ãæ¶Ô³¤´ï20ÄêµÄ½ûïÀ¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/sim-device-unlocking-malware.html


6¡¢Ôư²È«Í¬ÃËCSA°ä²¼Õë¶ÔÔÆÍÆËãµÄ11Ïî×îÐÂÍþвÁбí

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÆ°²È«Í¬ÃË£¨CSA£©°ä²¼ÔÆÍÆËãÍþв¶´²ì»ã±¨ £¬»ã±¨ÖÐÁгöÁËÔÆÍÆËãÃæ¶ÔµÄ11Ïî¶¥¼¶°²È«ÎÊÌâ¡£ÕâÊÇ×Ô2016ÄêCSA°ä²¼ÔÆÍÆËã¶¥¼¶ÍþвTop12ÒÔÀ´µÄµÚÒ»´Î³Á´ó¸üС£Ã»ÓвúÉú±ä¶¯µÄÍþвÔ̺¬Êý¾Ýй¶¡¢Éí·ÝÖÎÀí²»ÉÆ¡¢²»°²È«µÄAPI¡¢ÕË»§½Ù³Ö¡¢ÄÚ²¿ÍþвÒÔ¼°ÔÆ·þÎñ±»ÀÄÓûò¶ñÒâʹÓá£Ê£ÏµÄÎå¸öÐÂÍþвÔ̺¬Èõ½ÚÔìÃæ¡¢Ôª½á¹¹ÓëÀûÓýṹʧ°Ü¡¢ÅäÖÃÃýÎóºÍµ÷»»½ÚÔì²»¼°¡¢²»×ãÔÆ°²È«¼Ü¹¹ºÍÕ½ÊõÒÔ¼°ÔÆÊ¹ÓõĿɼûÐÔÊÜÏÞ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/cloud-security-alliance-releases/