DoorDashÔâºÚ¿ÍÈëÇÖ £¬½ü500ÍòÓû§ÐÅϢй¶£»Å·Ö޿տ͹«Ë¾ÔÚ´Óǰ12¸öÔÂÄÚÔâµ½4´Î³Á´óÍøÂç¹¥»÷

°ä²¼¹¦·ò 2019-09-27
1.DoorDashÔâºÚ¿ÍÈëÇÖ £¬½ü500ÍòÓû§ÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ËͲͷþÎñDoorDash°ä·¢ÔâºÚ¿ÍÈëÇÖ £¬µ¼Ö½ü500ÍòÏû·ÑÕß¡¢ËͲÍÔ±¼°²Í¹ÝÉÌÈ˵ÄÓ×ÎÒÐÅϢй¶¡£Æ¾¾ÝÆäÍøÕ¾Éϰ䲼µÄ°²È«Í¨Öª £¬Î´ÊÚȨµÄµÚÈý·½ÔÚ2019Äê5ÔÂ4ÈÕ»ñµÃÁË¸ÃÆ½Ì¨Óû§Êý¾ÝµÄ½Ó¼ûȨÏÞ £¬ÊÜÓ°ÏìµÄÓû§½öÔ̺¬ÔÚ2018Äê4ÔÂ5ÈÕǰע²á¸Ãƽ̨µÄÓû§¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢ËÍ»õµØÖ·¡¢µç»°ºÅÂëºÍ¹þÏ£ÃÜÂëÒÔ¼°ÒøÐп¨ºóËÄλºÍ½ü10ÍòËͲÍÔ±µÄ¼ÝÕÕºÅÂëµÈ¡£DoorDashÇ¿µ÷ûÓÐÆëÈ«µÄÐÅÓþ¿¨ÐÅÏ¢»òÆëÈ«µÄÒøÐп¨ÕË»§ºÅÂëй¶¡£ÊÂÎñ²úÉúµÄÔ­ÒòÉв»Ã÷ÏÔ £¬µ«DoorDash°µÊ¾ÓëµÚÈý·½·þÎñÌṩÉÌÓйØ¡£

   

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/doordash-data-breach-impacts-personal-data-of-almost-5m-users/148724/

2.ÎÖ´ï·áÒÆ¶¯ÀûÓôæÔÚ·ì϶µ¼Ö²¿Ãſͻ§ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÐÂÎ÷À¼ÎÖ´ï·áµÄÒÆ¶¯appÔÚÖÜÈýÔçÉϵÄÒ»Ó׶ι¦·òÄÚ³öÏÖ·ì϶ £¬µ¼Ö¿ͻ§Äܹ»¿´µ½ÆäËû¿Í»§µÄ¾ßÌåÐÅÏ¢¡£¸ÃappÖ¼ÔÚÖÎÀíÓû§µÄÎÖ´ï·áÕÊ»§ £¬²¢Ìṩ¶ÔÕ˵¥»ò¿ÉÓ÷þÎñµÄ¼±¾ç½Ó¼û¡£¸Ã¹«Ë¾Ö¤ÊµÁËÕâÒ»ÊÂÎñ £¬³ÆÕâÊÇÓÉÓÚ´òËãÄÚµÄÀûÓÃÉý¼¶¹ý³Ì³öÏÖÃýÎóµ¼Ö嵀 £¬Ê¹µÃÓû§ÃýÎ󵨵Ǽµ½ÆäËûÈ˵ÄÕË»§¡£¸ÃÎÊÌⲢδ³ÖÐøºÜ³¤¹¦·ò £¬ÎÖ´ï·áÔÚ15·ÖÖÓºó¾Í»Ø¹öÁËÕâÒ»Éý¼¶¡£Ä¿Ç°Éв»Ã÷ÏÔÓм¸¶àÓû§µÄÓ×ÎÒÐÅÏ¢Òò¶ø¶ø¹«¿ª £¬ÎÖ´ï·á°µÊ¾ÔÚ´¹Î£ÆÀ¹ÀÊÜÓ°ÏìµÄÈËÊý¼°Ï¸½Ú £¬²¢È·¶¨Í¨ÖªÕâЩ¿Í»§±ØÒª²ÉÈ¡µÄ²½Öè¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vodafones-mobile-app-briefly-exposed-customer-information/

3.iOS 13ºÍiPadOS·ì϶¿Éµ¼ÖµÚÈý·½¼üÅÌ»ñÈ¡ÆëÈ«½Ó¼ûȨÏÞ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Æ»¹û¹Ù·½°ä²¼ÁËÒ»·ÝеÄÖ§³ÖÎĵµ £¬ÖÒ¸æÓû§ÓйØiOS 13ºÍiPadOSµÚÈý·½¼üÅÌ´æÔڵݲȫ·ì϶¡£¸Ã¹«Ë¾°µÊ¾ £¬Ò»Ð©µÚÈý·½¼üÅÌÈí¼þ¼´±ãδ±»ºË×¼ÆëÈ«½Ó¼ûȨÏÞÒ²¿ÉÄÜ»áÓÉÓÚiOS 13ºÍiPadOSÖеķì϶¶ø±»ÊÚÓèÆëÈ«½Ó¼ûȨÏÞ¡£ÕâÒ»ÎÊÌâÓ°ÏìÁËiPhone¡¢iPad»òiPod touch×°ÖõļüÅÌ £¬µ«²»Ó°ÏìÆ»¹ûµÄÄÚÖüüÅÌ £¬Ò²²»»áÓ°ÏìδÀûÓÃÆëÈ«½Ó¼ûȨÏ޵ĵÚÈý·½¼üÅÌ £¬Æ»¹û½«ÔÚ¼´½«µ½À´µÄÈí¼þ¸üÐÂÖн¨¸´´Ë·ì϶¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/bug-granting-full-access-keyboards/148638/

4.Å·Ö޿տ͹«Ë¾ÔÚ´Óǰ12¸öÔÂÄÚÔâµ½4´Î³Á´óÍøÂç¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý·¨ÐÂÉ籨· £¬Å·ÖÞ¿ÕÖпͳµ¹«Ë¾ÔÚ´Óǰ12¸öÔÂÖÐÖÁÉÙÔâµ½4´Î³Á´óÍøÂç¹¥»÷¡£2019ËêÊ× £¬¿Õ¿ÍÐû³ÆÔâ·êÊý¾Ýй¶ÊÂÎñ £¬ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µÄ¡°ÉÌÓ÷ÉÐÐÒµÎñ¡±ÏµÍ³²¢»ñµÃÁ˲¿ÃÅÔ±¹¤ÒþÖÔÐÅÏ¢µÄ½Ó¼ûȨÏÞ¡£·¨ÐÂÉ籨·³Æ¸ÃÊÂÎñÊÇÈ¥Äê½øÐеÄÒ»Ïî¸ü´ó¹æÄ£Ðж¯µÄÒ»²¿ÃÅ¡£ÔÚÕâһϵÁй©¸øÁ´¹¥»÷ÖÐ £¬¹¥»÷Õß»¹Õë¶ÔÁËÓ¢¹ú·¢Æð»úÔì×÷ÉÌRolls-RoyceºÍ·¨¹ú¼¼ÊõÕ÷ѯ¹«Ë¾¼°¹©¸øÉÌExpleo £¬ÒÔ¼°Áí±íÁ½¼Ò·¨¹ú¿Õ¿Í³Ð°üÉÌ¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91744/hacking/airbus-suppliers-attacks.html

5.¼ÓÄôóÍøÂ簲ȫÖÐÐÄÖÒ¸æÀÕË÷Èí¼þTFlowerµÄбäÌå


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¼ÓÄôóÍøÂ簲ȫÖÐÐÄ£¨CCCS£©°ä²¼ÓйØÀÕË÷Èí¼þTFlowerбäÖֵĹ¥»÷»î¶¯µÄ¾¯±¨¡£¸Ã±äÖÖÓÚ7ÔÂ30ÈÕ±»·¢ÏÖ £¬ÖØÒªÍ¨¹ýδ´ò²¹¶¡µÄÔ¶³Ì×ÀÃæ·þÎñ´«²¼ £¬µ«Ò²¿ÉÄÜͨ¹ýÀ¬»øÓʼþ¡¢ºýŪÐÔÏÂÔØ¡¢½©Ê¬ÍøÂç¡¢¶ñÒâ¸æ°×¡¢web×¢Èë¡¢Ðéα¸üлòÊÜϰȾµÄ×°Öðü´«²¼¡£ÔÚϰȾϵͳºó £¬¸Ã±äÖ᳢ֻÊÔͨ¹ýPowerShell Empire¡¢PSExecµÈ¹¤¾ßÔÚÍøÂçÉϺáÏòÒÆ¶¯¡£¸Ã±äÖÖ»áÏÅ×ëC2·þÎñÆ÷ͨѶ £¬¶øºóɾ³ý¾íÓ°¸±±¾²¢½ûÓÃwin10Öеĸ´Ô­Ö°ÄÜ £¬×îºóÅú¸Ä×¢²á±íÀ´»ñÈ¡ÓÆ¾ÃÐÔ¼°¼ÓÃÜÓû§µÄÎļþ¡£CCCS½¨ÒéϵͳËùÓÐÕßµ±¼´ÀûÓÃ×îÐµİ²È«²¹¶¡²¢ÔÚ½Ó¼ûÓʼþÖеÄÁ´½Ó»ò´ò¿ª¸½¼þʱά³Ö¾¯Ìè¡£

Ô­ÎÄÁ´½Ó£º
https://cyber.gc.ca/en/alerts/tflower-ransomware-campaign

6.Emsisoft°ä²¼ÀÕË÷Èí¼þWannaCryFakeµÄ½âÃܹ¤¾ß


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Emsisoft×êÑÐÈËÔ±°ä²¼ÀÕË÷Èí¼þWannaCryFakeµÄÃâ·Ñ½âÃܹ¤¾ß¡£WannaCryFakeÊÇÒ»¿îʹÓÃAES-256¼ÓÃÜÊܺ¦ÕßÎļþµÄÀÕË÷Èí¼þ £¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.[<id>][recoverydata54@protonmail.com].WannaCryÀ©´óÃû¡£Æ¾¾Ý¹¥»÷ÕßµÄ˵·¨ £¬Êê½ðµÄ¼ÛÖµÓëÁªÏµËûÃǵĿì¶Å×Ð¹Ø £¬µ«×êÑÐÈËÔ±°µÊ¾ÔÚÖ°ºÎÇé¿ö϶¼²»Ó¦¸Ã³¢ÊÔÁªÏµ¹¥»÷Õß¡£¸Ã½âÃÜÆ÷¿É´ÓEmsisoft¹ÙÍø¸ßµÍÔØµÃµ½¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/91715/malware/wannacryfake-ransomware-decryptor.html