Daimler Git´æ´¢¿â¶³öµ¼Ö±¼ÌÚOLUÔ´´úÂëй¶£»º½¿Õ¹«Ë¾EasyJet 900Íò¿Í»§ÐÅϢй¶

°ä²¼¹¦·ò 2020-05-20

1.Daimler 580¶à¸öGit´æ´¢¿â¶³ö £¬±¼ÌÚ×é¼þOLUÔ´´úÂëй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾ÝZDNet±¨Â· £¬Daimler 580¶à¸öGit´æ´¢¿â¶³ö £¬ÆäÖÐÔ̺¬×°ÖÃÔÚMercedez±¼ÌÚ»õ³µÖеİåÔØÂß¼­µ¥Ôª£¨OLU£©µÄÔ´´úÂë¡£¹¤³ÌʦTill Kottmann·¢ÏÖ £¬ËûÔÚMercedez±¼ÌڵĴúÂëÍйÜÍøÕ¾DaimlerÖÐʹÓÃËÁÒâµç×ÓÓʼþ×¢²áÒ»¸öÕ˺Å £¬±ãÄܹ»½Ó¼ûÆä³¬¹ý580¸öGit´æ´¢¿â¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬OLUÔ´´úÂë¡¢Raspberry PiÓ³Ïñ¡¢·þÎñÆ÷Ó³Ïñ¡¢ÓÃÓÚÖÎÀíÔ¶³ÌOLUµÄÄÚ²¿Daimler×é¼þ¡¢ÄÚ²¿Îĵµ¡¢´úÂëʾÀýµÈ¡£Íþвµý±¨¹«Ë¾Under°µÊ¾ £¬ËûÃÇͨ¹ýÉó²é»¹·¢ÏÖÁËDaimlerÄÚ²¿ÏµÍ³µÄÃÜÂëºÍAPIÁîÅÆ £¬¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖDaimlerÔÆºÍÄÚ²¿ÍøÂç¡£    


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/mercedes-benz-onboard-logic-unit-olu-source-code-leaks-online/


2.µÂÖÝÔÙÔâÀÕË÷Èí¼þ¹¥»÷ £¬Õë¶ÔÆä½»Í¨ÔËÊ䲿ϵͳ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ò»¸öÔÂÄڵ¿ËÈøË¹ÖÝÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷Èí¼þ¹¥»÷ £¬Õâ´Î¹¥»÷Õë¶ÔµÄÊǸÃÖݵĽ»Í¨ÔËÊ䲿ϵͳ £¬Ä¿Ç°¸ÃϵͳÒѱ»ÆÈ¹Ø¹Ø¡£µÂÖݽ»Í¨ÔËÊ䲿£¨TxDOT£©È·ÈÏ £¬5ÔÂ14ÈÕÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷ £¬ÓÐδ¾­ÊÚȨ½Ó¼û¸Ã»ú¹¹ÍøÂç £¬¸Ã»ú¹¹·¢ÏÖºóµ±¼´²ÉÈ¡´ëÊ© £¬Ô¤·À½øÒ»²½¹¥»÷¡£5ÔÂ8ÈÕ £¬µÂ¿ËÈøË¹ÖÝÔâµ½µÚÒ»´Î¹¥»÷ £¬ÀÕË÷Èí¼þ²¡¶¾Ï°È¾Á˸ÃÖݵķ¨ÔºÏµÍ³¡£Ä¿Ç° £¬Éв»Ã÷ÏÔÁ½´Î¹¥»÷ÊÇ·ñÓйØÁª £¬Ò²Ã»ÓйØÓÚÕâÁ½´Î¹¥»÷µÄ¾ßÌåÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/103410/cyber-crime/txdot-ransomware-attack.html


3.Ó¢¹úº½¿Õ¹«Ë¾EasyJetÔâ¹¥»÷ £¬900Íò¿Í»§ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¹ú×î´óµÄº½¿Õ¹«Ë¾EasyJe°µÊ¾ £¬ËûÃÇÔâµ½ÁËÍøÂç¹¥»÷ £¬²¢Ð¹Â¶ÁË900Íò¿Í»§µÄÐÅÏ¢¡£ÔÚÕâ´Î¹¥»÷ÖÐ £¬ºÚ¿Í½Ó¼ûÁ˸ù«Ë¾900Íò¿Í»§µÄµç×ÓÓʼþµØÖ·ºÍ¹Û¹âÐÅÏ¢ £¬»¹ÓÐÆäÖÐ2208λ¿Í»§µÄÐÅÓþ¿¨¾ßÌåÐÅÏ¢¡£EasyJetÔÚ·¢ÏÖ´ËÊÂÎñºó £¬±ã֪ͨÁËÓ¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐĺÍICO £¬²¢°µÊ¾Ä¿Ç°ËûÃÇÔÚ֪ͨÊÜÓ°Ïì¿Í»§ £¬Ô¤¼ÆÔÚ2020Äê5ÔÂ26ÈÕ֮ǰËùÓÐÊÜÓ°Ïì¿Í»§¶¼½«ÊÕµ½Í¨Öª¡£Ä¿Ç°ÉÐÎÞ´ËÊÂÎñµÄ¾ßÌåÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/easyjet-hacked-data-breach-affects-9-million-customers/


4.ºÚ¿Í¼ÙÒâÃÀ¹ú²ÆÕþ²¿Óô¹µöÓʼþ·Ö·¢»ùÓÚNode.jsµÄRAT


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Abuse.ch·¢ÏÖÁËеĴ¹µö¹¥»÷»î¶¯ £¬ºÚ¿Í¼Ù×°³ÉÃÀ¹ú²ÆÕþ²¿À´·Ö·¢»ùÓÚNode.jsµÄÔ¶³Ì½Ó¼ûľÂí£¨RAT£©ºÍÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£Ê×ÏȺڿͻáÐû³ÆÓÉÓÚÒøÐÐÐÅÏ¢²»ÕýÈ· £¬Î´Ö§¸¶µ±¾ÖºÏͬµÄ¿î×Ó £¬Ö®ºó»áͨ¹ýµç×ÓÓʼþÌáÐÑÓû§²é³­¸½¼þÎĵµÊÇ·ñÓÐÎó¡£Óʼþ¸½¼þÖÐÔ̺¬ÃûΪCONTRACT PAYMENT.jarµÄÎļþ £¬Óû§Ö´Ðкó½«ÏÂÔØNode.jsºÍWizard.js¾ç±¾²¢´æ´¢ÔÚ£¥UserProfile \ qnodejs-node-v13.13.0-win-x64Îļþ¼ÐÖС£¸ÃNode.js¶ñÒâÈí¼þQNodeServiceÓµÓÐ×ÔÎÒ¸üС¢»ñÈ¡»úеÐÅÏ¢£¨ÀýÈçIPµØÖ·¡¢»úеÃû³Æ¡¢µØÎ»¡¢Óû§ÃûºÍ²Ù×÷ϵͳ°æ±¾£©¡¢Ö´ÐкÅÁɾ³ýºÍдÈëÎļþ¡¢´Ó¸÷ÀàÀûÓ÷¨Ê½£¨ÀýÈçChromeºÍFirefox£©ÖÐÇÔÈ¡ÃÜÂëµÄÖ°ÄÜ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-us-dept-of-treasury-emails-spreads-new-nodejs-malware/


5.FBI°ä²¼ÖÒ¸æ £¬ÀÕË÷Èí¼þProLockÀûÓÃQakbot¹¥»÷Ö¸±êÍøÂç


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


FBI°ä²¼ÁËÒ»¸ö°²È«¾¯±¨ £¬ËµÁËÈ»ÐÂÐÍÀÕË÷Èí¼þProLockÄܹ»ÀûÓÃQakbot¹¥»÷Ö¸±êÍøÂç¡£¸Ã²¡¶¾ÓÚ2020Äê3Ô³õ´Î±»·¢ÏÖ £¬Òѱ»ÓÃÓÚÒ½ÁƱ£½¡×éÖ¯¡¢µ±¾Ö»ú¹¹¡¢½ðÈÚ»ú¹¹ºÍÁãÊÛ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£FBI·¢ÏÖProLockÄܹ»Í¨¹ýQakbot½Ó¼û±»ºÚµÄÍøÂç £¬Òò¶øÒ»µ©·¢ÏÖϰȾÁËQakbotµÄÍÆËã»ú £¬±ØÐ뾡¿ì½«ÆäÓëÍøÂçµÄÆäÓಿßôÀë¡£Áí±í £¬FBI»¹ÖÒ¸æºÚ¿ÍÍÅ»ïÔÚÊܺ¦ÕßÖ§¸¶Êê½ðºóÌṩµÄ½âÃÜÆ÷¿ÉÄÜÎÞ·¨Õý³£¹¤×÷ £¬»á·ÛËé´óÓÚ64MBµÄÎļþ £¬²¢¿ÉÄܵ¼ÖÂ100MBÒÔÉϵÄÎļþÿ1KBÃÔʧԼĪ1¸ö×Ö½Ú¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-prolock-ransomware-gains-access-to-victim-networks-via-qakbot-infections/


6.Verizon°ä²¼2020ÄêÊý¾Ýй¶µ÷²é»ã±¨ £¬DoS¹¥»÷Ôö¶à


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Verizon°ä²¼ÁË2020ÄêÊý¾Ýй¶µ÷²é»ã±¨ £¬·ÖÎöÁË16¸ö´¹Ö±ÐÐÒµµÄ32002Æð°²È«ÊÂÎñºÍ3950ÆðÊý¾Ýй¶ÊÂÎñ¡£»ã±¨ÏÔʾ £¬´ÓǰһÄêDoS¹¥»÷µÄÊýÁ¿ÓÐËùÔö³¤£¨1.3ÍòÆð £¬Õ¼°²È«ÊÂÎñµÄ40£¥£© £¬Óë´Ëͬʱ £¬ÍøÂç¼äµý¹¥»÷Ï÷¼õ £¬ÔÚÊý¾Ýй¶ÊÂÎñÖеÄÕ¼±È´Ó13.5£¥½µÂäµ½3.2£¥¡£ÔÚÊý¾Ýй¶·½Ãæ £¬½«½üÒ»°ë£¨45£¥£©µÄÊÂÎñÊÇÓÉÓÚÏÖʵ¹¥»÷ £¬¶ø22£¥ÔòÓÉÓÚÉç»á¹¤³Ì¹¥»÷¡£22£¥µÄÈëÇÖÉæ¼°µ½¶ñÒâÈí¼þ £¬¶ø17£¥ÊÇÓÉÃýÎóÔì³ÉµÄ¡£8£¥µÄй¶Դ×ÔÓÚÊÚȨÓû§µÄÎóÓá£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/