αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ£»ºÚ¿ÍJohn WickÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5µÁÈ¡Ãô¸ÐÊý¾Ý

°ä²¼¹¦·ò 2020-06-08

1.αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


½üÈÕ£¬ºÚ¿ÍÔÚ·Ö·¢Î±ÔìµÄSTOP DjvuÀÕË÷Èí¼þµÄ½âÃÜÆ÷£¬ÒÔ¶ÔÊܺ¦ÕßµÄÎļþ½øÐжþ´Î¼ÓÃÜ¡£STOP DjvuÊÇ´ÓǰһÄêÖÐ×î»îÔ¾µÄÀÕË÷Èí¼þ£¬¾ùÔÈÿÌìϰȾ³¬¹ý600¸öÊܺ¦Õß¡£¸ÃÀÕË÷Èí¼þÖØÒªÓ°ÏìµÄÊǼÒÍ¥Óû§£¬Òò¶øºÜ¶à±»Ï°È¾Óû§ÎÞ·¨Ö§¸¶500ÃÀÔªµÄÊê½ðÀ´²É°ì½âÃÜÆ÷¡£Ö®ºó×êÑÐÈËÔ±·¢ÏÖÁËαÔìµÄÃâ·ÑµÄSTOP Djvu½âÃÜÆ÷£¬µ«ÊÇËû²»»á¸´Ô­ÈκÎÎļþ£¬µ±Óû§´ò¿ª¸ÃÈí¼þ²¢µã»÷ÆðͷɨÃèºó£¬¸Ã·¨Ê½½«ÏÂÔØ¿ÉÖ´ÐÐÎļþcrab.exe²¢±£Áôµ½£¥Temp£¥Îļþ¼ÐÖУ¬ÒÔ¶ÔÊܺ¦ÕßÍÆËã»úÉϵÄÊý¾Ý½øÐмÓÃÜ¡£Ä¿Ç°£¬×êÑÐÈËÔ¹ØýÔÚ¶Ô´ËÀÕË÷²¡¶¾½øÐзÖÎö¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/


2.ºÚ¿ÍJohn WickÐû³ÆÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5£¬µÁÈ¡Ãô¸ÐÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×Ô³ÆÎªJohn WickµÄºÚ¿ÍÐû³Æ£¬ÆäÒѹ¥»÷ÁËÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5µÄϵͳ£¬ÇÒµÁÈ¡Á˸ù«Ë¾150GBµÄÃô¸ÐÊý¾Ý¡£¸ÃºÚ¿Í°µÊ¾£¬ÆäµÁÈ¡µÄÊý¾Ý¿âÖÐÔ̺¬×î½üµÄÂòÂô¡¢ÃÜÂë¡¢µç×ÓÓʼþ¡¢ÊÖ»úºÅÂë¡¢µç×ÓÓʼþID¡¢ÐÂÎŵÈ£¬²¢Íþв½«¹«¿ªÏúÊÛ¸ÃÊý¾Ý¿âºÍ´úÂë¡£¸üÔã¸âµÄÊÇ£¬´Ë¿Ì¸ÃºÚ¿ÍÒѾ­°ä²¼ÁËй¶Êý¾Ý¿âµÄ²¿ÃÅÊý¾Ý¡¢»î¶¯Ô´´úÂëÖеÄÃÜÔ¿¡¢¶ÔAtlassian°åµÄÒýÓÃÒÔ¼°AWS´æ´¢Í°Í´´¦¡£¾Ý´ËºÚ¿Í˵£¬ÆäÊÇÀ´×Ôº«¹úµÄ°²È«×¨¼Ò£¬Õâ´Î»î¶¯ÖØÒªÊÇΪÁËÔ®ÊÖÕâЩÈ˽¨¸´·ì϶¡£Ä¿Ç°£¬¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄµ÷²éÖУ¬ºÚ¿ÍÊÇ·ñÀ´×Ôº«¹ú»¹ÎÞ·¨È·¶¨¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/zee5-allegedly-hacked-by-korean-hackers-customer-info-at-risk/


3.ºÚ¿Íͨ¹ýVPNÇÔÈ¡Óû§Microsoft Office 365µÇ½ʹ´¦


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±°µÊ¾£¬ºÚ¿ÍÀûÓÃVPNÌáÒéÍøÂç´¹µö¹¥»÷£¬ÒÔÇÔÈ¡Óû§Microsoft Office 365µÇ½ʹ´¦¡£ÓÉÓÚÒßÇéÔ­Òò£¬´ó²¿ÃÅÈËÑ¡Ôñ¾Ó¼Ò°ì¹«£¬Õâ´ó´óÔö³¤ÁËVPNµÄʹÓÃÂÊ£¬Òò¶ø¸ü¶àµÄºÚ¿Í»áÊÔͼ½«Æä×÷Ϊ¹¥»÷ý½é¡£Õâ´Î¹¥»÷»î¶¯ÖкڿͼÙÒâÊÕ¼þÈ˹«Ë¾µÄITÖ§³Ö²¿ÃÅ·¢ËÍ֪ͨÓʼþ£¬ÓʼþÖÐÔ̺¬Ò»¸öÖ¸ÏòеÄÓÃÓÚ¼ÒÍ¥½Ó¼ûµÄVPNÅäÖõÄÁ´½Ó¡£·¢¼þÈ˵ĵç×ÓÓʼþµØÖ·±»¼Ù×°³ÉÊܺ¦Õß¹«Ë¾µÄÓò£¬´Ó¶øÓÕʹÊܺ¦Õßµã»÷Á´½Ó£¬ÒÔ½«Æä³Á¶¨Ïòµ½office365ƾ֤´¹µöÍøÕ¾¡£


Ô­ÎÄÁ´½Ó£º

https://hotforsecurity.bitdefender.com/blog/hackers-use-vpn-impersonation-in-phishing-emails-to-steal-office-365-credentials-23456.html


4.ÐÂÀÕË÷Èí¼þKupidonÖØÒªÕë¶Ô¼ÒÍ¥Óû§µÄÓ×ÎÒÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


MalwareHunterTeamÓÚ5ÔÂ9ÈÕ³õ´Î·¢ÏÖÐÂÀÕË÷Èí¼þKupidon£¬Æä²»½öÕë¶Ô¹«Ë¾ÍøÂ磬»¹Õë¶Ô¼ÒÍ¥Óû§µÄÓ×ÎÒÊý¾Ý¡£Ä¿Ç°ÉÐδ·¢ÏÖ¸ÃÀÕË÷Èí¼þµÄÑù±¾£¬×êÑÐÈËÔ±»ùÓÚÓëÊܺ¦ÕߵĽ»Ì¸ºÍÉÏ´«µÄÎļþ½øÐзÖÎö¡£ºÚ¿ÍÒ»µ©½øÈëÍøÂ磬±ã»á¼ÓÃÜÊܺ¦ÕßÎļþ£¬ÔÚÎļþÃûºó¸½¼Ó.kupidonÀ©´óÃû£¬²¢ÁôÏÂÊê½ðÒªÇ󡣯äÖУ¬Õë¶ÔÆóÒµËüÒªÇóµÄÊê½ðΪ1200ÃÀÔªµÄ±ÈÌØ±Ò£¬Õë¶Ô¼ÒÍ¥Óû§ÒªÇó300ÃÀÔªµÄÊê½ð¡£Ò»µ©Óû§Ö§¸¶Êê½ðºó±ã»áÊÕµ½AES½âÃÜÃÜÔ¿ºÍKupidon½âÃÜÆ÷¡£Ä¿Ç°»¹Ã»ÓиÃÀÕË÷²¡¶¾µÄÑù±¾£¬Òò¶øÉÐÎÞ·¨ÖªÂ·¸ÃÈí¼þÊÇ·ñ´æÔÚ·ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kupidon-is-the-latest-ransomware-targeting-your-data/


5.×êÑÐÈËÔ±·¢ÏÖFacebookÖжà¸öSSRF·ì϶£¬»ñ3.1ÍòÃÀÔª½±½ð


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±Bipin Jitiya·¢ÏÖFacebook´æÔÚ¶à¸öSSRF·ì϶£¬½áºÏÀûÓÃÕâЩ·ì϶»á¶Ôƽ̨²úÉúÑϳÁµÄÓ°Ï죬²¢Òò¶ø»ñµÃÁËFacebookÌṩµÄ×ܼÆ31500ÃÀÔª½±½ð¡£¸Ã×êÑÐÈËÔ±Ê×ÏÈ·¢ÏÖµÄÊÇshortURL¹¤×÷ÖжÌȱÈÏÖ¤»á»°£¬ÈκÎÈ˶¼Äܹ»ÔÚ²»½øÐÐÉí·ÝÑéÖ¤µÄÇé¿öϽӼû´Ë·þÎñ£¬ºÚ¿Í¿ÉÄÜÀûÓÃÆäͨ¹ýSSRF½øÐд¹µö¹¥»÷¡£´Ë±í£¬Ëû·¢ÏÖÁËFacebook¶ÌµØÖ·(https://fb.me/)ÖеÄSSRF·ì϶£¬¸Ã·ì϶й¶ÁËÈÕÖ¾Îļþ¼ÐµÄÄÚ²¿õè¾¶¡¢ÆäËûÎļþõè¾¶¡¢Ê¹ÓÃfetchÊý¾ÝµÄÄÚ²¿ÏµÍ³²éÎÊ¡¢ÄÚ²¿IPµØÖ·¡¢ÄÚ²¿ID¡¢ÅäÖÃÓйØÐÅÏ¢¡¢Ë½ÓÐÎĵµµÈÐÅÏ¢¡£Jitiya°µÊ¾£¬½áºÏÕâÁ½¸ö·ì϶£¬¿ÉÄܵ¼Ö¶ÔÄÚ²¿»ù´¡ÉèÊ©µÄõè¾¶±éÀúºÍSSRF¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/07/hacker-won-31k-bounty-for-reporting-numerous-facebook-bugs/


6.ÖÇÀûCPLTµ÷²éÏÔʾ£¬¸Ã¹úÒ½ÁÆÐÐÒµ´æÔÚÃô¸ÐÊý¾Ýй¶ÎÊÌâ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÖÇÀûͨÃ÷¶ÈίԱ»á£¨The Chilean Transparency Council £¬CPLT£©¶ÔÆäÎÀÉú²¿ÃŽøÐе÷²é£¬·¢ÏÖ´æÔÚй¼ûô¸ÐÊý¾ÝµÄÎÊÌâ¡£Õâ´ÎCPLTÖØÒª¶Ô86¸ö×éÖ¯µÄ1.2Íò·Ý²É¹ºµ¥½øÐÐÉ󼯣¬ÒÔÈ·¶¨¸Ã¹ú·ÖÆçÒ½ÔººÍÎÀÉú·þÎñ»ú¹¹¶Ô»¼Õ߲ɰìÓÃÆ·ºÍ·þÎñµÄÓ×ÎÒºÍÃô¸ÐÊý¾ÝµÄ´¦Ö᣷¢ÏÖÒ½ÔºµÄ12·Ý²É¹ºµ¥ºÍÎÀÉú·þÎñ»ú¹¹µÄ6·Ý²É¹ºµ¥Ð¹Â¶ÁË»¼ÕßµÄÃô¸ÐÓ×ÎÒÊý¾Ý£¬ÕâЩÊý¾ÝÊǽöÔÚËùÓÐÕßÃ÷È·Ô޳ɵÄÇé¿öÏÂÄÜÁ¦´«²¼µÄÐÅÏ¢¡£CPLT°µÊ¾£¬ÔڲɰìÉÌÆ·ºÍ·þÎñµÄ¹ý³ÌÖÐй¶ÕâЩÐÅÏ¢¼Óº¦ÁË»¼ÕßµÄÒþÖÔ£¬ÆäÒѾ­ÏòÎÀÉú²¿·¢³ö֪ͨ£¬²¢ÎªÆä½â¾öÕâЩÎÊÌâÌṩÁ˼¼ÊõÖ§³Ö¡£


Ô­ÎÄÁ´½Ó£º

https://www.consejotransparencia.cl/fiscalizacion-del-cplt-descubre-vulneracion-de-la-privacidad-de-pacientes-en-compras-de-hospitales-y-servicios-de-salud/