GTPºÍ̸´æÔÚ·ì϶£¬¿É±»ÀûÓöԷäÎÑÍøÂç½øÐÐDoS¹¥»÷£»ºÚ¿Í¼ÙÒâ°²È«ÍøÕ¾privnote.comÇÔÈ¡±ÈÌØ±Ò
°ä²¼¹¦·ò 2020-06-151.GTPºÍ̸´æÔÚ·ì϶£¬¿É±»ÀûÓöԷäÎÑÍøÂç½øÐÐDoS¹¥»÷
Positive Technologies°ä²¼»ã±¨°µÊ¾£¬GTPºÍ̸´æÔÚ·ì϶£¬¿É±»ÀûÓöԷäÎÑÍøÂç½øÐÐDoS¹¥»÷¡¢Ú²Æ¹¥»÷ºÍÊý¾ÝÇÔÈ¡¡£¸Ã·ì϶ӰÏìÁËʹÓÃ2G¡¢3G¡¢4GÍøÂçµÄÉ豸£¬ÒÔ¼°²¿ÃÅʹÓÃ5GÍøÂçµÄÊÖ»úÉ豸¡£»ã±¨°µÊ¾£¬×êÑÐÈËÔ±Ëù²âÊÔµÄÿһ¸öÍøÂç¶¼´æÔڸ÷ì϶£¬¿É±»ºÚ¿ÍÀûÓÃÌáÒéDoS¹¥»÷¡¢·ÛËéºÏ·¨Óû§µÄ½Ó¼ûȨÏÞ¡¢ÇÔÈ¡ÍøÂç·þÎñºÍ´ø¿í»òÕßй¶Óû§µÄÓ×ÎÒÐÅÏ¢¡£Positive Technologies°µÊ¾£¬¸Ã·ì϶´æÔÚÓÚºÍ̸µÄϵͳ½á¹¹Öжø²»ÊÇÆäʵÏÖÖУ¬²¢ÇÒ×êÑÐÈËÔ±½¨ÒéÓû§ÔÚGTP¼¶±ð¹ýÂËÁ÷Á¿²¢²ÉÈ¡GSMA°²È«½¨ÒéÒÔ·ÀÓù¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/vulnerabilities---threats/protocol-vulnerability-threatens-mobile-networks/d/d-id/1338068
2.Ó¢¹ú³¬¹ý10Íò¸öÉãÏñÍ·´æÔÚ·ì϶£¬Ò×±»ºÚ¿ÍÀûÓÃ
Ó¢¹úÒ»Ïîµ÷²éÏÔʾ£¬¸Ã¹úµÄ¼ÒÍ¥ºÍÆóÒµÖÐÓг¬¹ý10Íò¸öÊÒÄÚÉãÏñÍ·¿ÉÄÜ´æÔÚ°²È«·ì϶£¬Ê¹ÆäÈÝÒ×Êܵ½ºÚ¿Í¹¥»÷¡£¾Ý·ÖÎö£¬Ê¹ÓÃÀûÓÃCamHiµÄÉãÏñÍ·£¬Ô̺¬ÖîÈçAccfly£¬ieGeekºÍSV3CµÈÊÜӽӵį·ÅÆ£¬¶¼´æÔڸ÷ì϶¡£ºÚ¿ÍÄܹ»ÀûÓø÷ì϶ÇÔÈ¡Êý¾Ý¡¢Õë¶ÔÆäËûÎïÁªÍøÉ豸·¢Æð¹¥»÷»òÕ߼ලÓû§¡£½öÔÚ´ÓǰµÄÈý¸öÔÂÖУ¬¾ÍÓг¬¹ý12Íò¸öÉ豸ÒÑÔÚÓ¢¹ú¼¤»îʹÓ㬶øÔ¤¼ÆÈ«ÇòÔ¼ÓÐ350Íò´ËÀàÉãÏñÍ·ÔÚ±»Ê¹Ó㬲¢ÇÒÖØÒªÉ¢²¼ÔÚÔÚÑÇÖÞµØÓò¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/uk-security-cameras-risk-hacking/
3.Messenger´æÔÚ·ì϶£¬¿É±»ÀûÓÃÖ´ÐжñÒâÈí¼þ
ÍøÂ簲ȫ¹«Ë¾Reason SecurityµÄ×êÑÐÈËÔ±·¢ÏÖÁËFacebook Messenger´æÔÚ°²È«·ì϶£¬¸Ã·ì϶ӰÏìÁËWindows 460.16°æµÄFacebook Messenger¡£×êÑÐÈËÔ±Ú¹ÊÍ£¬ËûÃÇ·¢ÏÖÓÐŲÓüÓÔØÁËc:\ Python27Ŀ¼ÏµÄPython27£¬ÕâÊÇÒ»¸öµÍÆëÈ«ÐԵĵØÎ»£¬Òâζ×Åÿ¸ö¶ñÒⷨʽÔÚûÓÐÈκÎȨÏÞµÄÇé¿ö϶¼Äܹ»½Ó¼û¸Ãõè¾¶¡£¸Ã·ì϶ÔÊÐí¹¥»÷Õß½Ù³ÖÐÅʹ´úÂëÖеÄ×ÊԴŲÓã¬ÒÔÔËÐжñÒâÈí¼þ¡£Ä¿Ç°£¬Facebook°ä²¼ÁË480.5°æMessenger£¬ÒÔ½¨¸´´Ë·ì϶¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/06/14/facebook-messenger-app-vulnerability-allowed-persistent-malware-attacks/
4.ºÚ¿Í¼ÙÒâ°²È«ÍøÕ¾privnote.comÇÔÈ¡±ÈÌØ±Ò
¾Ý±¨Â·£¬ºÚ¿ÍαÔìÁËÃûΪPrivnotes.com µÄÍøÕ¾£¬¼ÙÒâ°²È«ÍøÕ¾privnote.comÒÔÇÔÈ¡±ÈÌØ±Ò¡£Krebs·¢ÏֺڿͳÉÁ¢Privnotes.comÊÇΪÁËÇÔȡͨ¹ýÆäƽ̨·¢Ë͵ļÓÃÜÇ®±Ò¸¶¿îÒªÇ󣬵±Óû§Õ³ÌùµÄÄÚÈÝÔ̺¬±ÈÌØ±ÒµØÖ·Ê±£¬¸ÃαÔìÍøÕ¾½«¸ü¸Ä±ÈÌØ±ÒµØÖ·£¬ÒÔ³¢ÊÔÇÔÈ¡¼ÓÃÜÇ®±Ò¡£´Ë±í£¬ÎªÁËÔ¤·À±»·¢ÏÖ£¬¸ü¸ÄºóµÄµØÖ·µÄǰËĸö×Ö·ûÓëÔʼճÌùµÄµØÖ·Ò»Ñù£¬²¢ÇÒÖ»ÓÐÔÚÓë´´½¨Õß·ÖÆçµÄIPµØÖ·Õ³Ìùʱ£¬ÍøÕ¾²Å»á¸ü¸Ä±ÈÌØ±ÒµØÖ·£¬ÒÔÌá¸ßÒñ±ÎÐÔ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/attackers-impersonate-secure-messaging-site-to-steal-bitcoins/
5.Õ÷ѯ¹«Ë¾Threadstone AdvisorsÔâMazeÀÕË÷Èí¼þ¹¥»÷
ÃÀ¹ú´Óʲ¢¹ºÊÕ¹ºµÄÕ÷ѯ¹«Ë¾Threadstone AdvisorsÔâµ½MazeÀÕË÷Èí¼þ¹¥»÷£¬Êý¾Ýй¶¡£¸ÃºÚ¿Í×éÖ¯ÔÚÌáÒé¹¥»÷ºó£¬±ã°ä²¼ÁËÊê½ð֪ͨÒÔ¼°Threadstone¶ÊÂ×ܾÀíJoshua GoldbergµÄµç»°ºÅÂëºÍµç×ÓÓʼþµØÖ·£¬´Ë¿ÌÓÖÔÚÆäй¶վµãÉϰ䲼ÁË¿´ËÆÊÇ´ÓThreadstoneϵͳµÁ×ßµÄÎļþ¡£ThreadstoneÊÇÒ»¼ÒλÓÚÂóµÏÑ·´ó½ÖµÄÕ÷ѯ¹«Ë¾£¬¹«Ë¾¿Í»§Ô̺¬Victoria Beckham¡¢Charles S. Cohen¡¢Æ¥×ȱ¤Æ¡¾Æ¹«Ë¾, Harrys of LondonÒÔ¼° Xcel Brands.¡£Ä¿Ç°Éв»Ã÷ÏÔThreadstoneÊÇ·ñÒÑÖ§¸¶Êê½ð¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/104718/cyber-crime/threadstone-advisors-maze-ransomware.html
6.ÀÕË÷Èí¼þBlack KingdomÀûÓÃPulse VPNµÄ·ì϶¹¥»÷ÍøÂç
²¨À¼µÄ°²È«·þÎñ¹«Ë¾REDTEAM.PL·¢ÏÖ£¬ÀÕË÷Èí¼þBlack KingdomÔÚÀûÓÃPulse Secure VPNÖеķì϶£¨CVE-2019-11510£©¹¥»÷ÆóÒµÍøÂç¡£¸Ã·ì϶´æÔÚÓÚ2019Äê4ÔÂǰµÄ°æ±¾ÖУ¬¶ø¸Ã·ì϶µÄ²¹¶¡·¨Ê½ÒѾ°ä²¼£¬µ«²¿ÃÅ×éÖ¯ÒÀȻûÓнøÐиüÐÂÉý¼¶¡£¸ÃÀÕË÷Èí¼þͨ¹ý¼ÙÒâΪGoogle Chromeä¯ÀÀÆ÷µÄ´òËã±í¹¤×÷À´°µ²Ø£¬¸Ã¹¤×÷½«ÔÚ°µ²ØµÄPowerShell´°¿ÚÖÐÔËÐÐBase64±àÂëµÄ×Ö·û´®´úÂ룬ÒÔ»ñÈ¡ ¾ç±¾reverse.ps1£¬²¢Í¨¹ý¸Ã¾ç±¾ÔÚÊÜϰȾÖ÷»úÉÏ´ò¿ª·´ÏòShell¡£¾ç±¾reverse.ps1µØµãµÄIPµØÖ·ÊÇ198.13.49.179£¬¿É±»½âÎöΪÈý¸öÓò£¬ÆäÖÐÒ»¸öÓòÏνӵ½ÍйÜAndroidºÍ¼ÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þµÄÃÀ¹úºÍÒâ´óÀûµÄ·þÎñÆ÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/black-kingdom-ransomware-hacks-networks-with-pulse-vpn-flaws/


¾©¹«Íø°²±¸11010802024551ºÅ