¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181119
Ðû²¼Ê±¼ä 2018-11-191¡¢°µÍøÍйÜЧÀÍÉÌDaniel's HostingÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Áè¼Ý6500¸öÍøÕ¾±»É¾
11ÔÂ15ÈÕ°µÍø×î´óµÄÍøÂçÍйÜЧÀÍÉÌDaniel's HostingÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¹¥»÷Õßɾ³ýÁË6500¶à¸öÍøÕ¾£¬£¬£¬£¬²¢ÇÒÕâÐ©ÍøÕ¾¶¼Ã»Óб¸·Ý¡£¡£¡£¡£¡£¡£¸ÃÍйÜЧÀÍÉ̱³ºóµÄ¿ª·¢Ö°Ô±Daniel Winzen֤ʵ³Æ£¬£¬£¬£¬Ð§ÀÍÆ÷µÄrootÕË»§Ò²±»É¾³ýÁË£¬£¬£¬£¬²¢ÇÒÆ½Ì¨ÉÏÍйܵÄÁè¼Ý6500¸öÍøÕ¾µÄÊý¾Ý¶¼Òѳ¹µ×ɥʧ¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜÊÇʹÓÃÁËphpÖеÄÁãÈÕÎó²î£¬£¬£¬£¬µ«Ò²ÓпÉÄÜÊÇʹÓÃÁËÆäËüµÄÎó²î¡£¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÊÂÈÏÕæ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78165/cyber-crime/daniels-hosting-hacked.html2¡¢¼ÓÃÜÓʼþЧÀÍÉÌProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƹ¥»÷
Ê¢ÐеļÓÃܵç×ÓÓʼþЧÀÍProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßAmFearLiathMorÉù³ÆÈëÇÖÁ˸ù«Ë¾²¢ÇÔÈ¡ÁË¡°´ó×Ú¡±µÄÓû§Êý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷Õß½«ÆäÊê½ðÒªÇóÐû²¼ÔÚPastebinÉÏ£¬£¬£¬£¬²¢ÍþвҪÏòÈ«ÌìÏÂÐû²¼»òÏúÊÛÕâЩÊý¾Ý£¬£¬£¬£¬µ«²¢Î´Ìṩ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£¡£ProtonMailÔÚÊÓ²ìÖ®ºó·ñ¶¨ÁËÕâÆð¹¥»÷ÊÂÎñ£¬£¬£¬£¬Éù³ÆÕâÖ»ÊÇÒ»¸öÊÔͼڲƵÄȦÌס£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78133/hacking/protonmail-hacked-hoax.html3¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚOilRigжñÒâ»î¶¯µÄÆÊÎö±¨¸æ
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïOilRigÔÚÌᳫ¹¥»÷ǰ¶ÔÆä¶ñÒâÈí¼þºÍ¹¤¾ß¾ÙÐвâÊԻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£OilRigµÄ²âÊÔÁ÷³Ìͨ³£°üÀ¨¶ÔÆä½»¸¶Îĵµ¾ÙÐÐÉÙÁ¿Ð޸IJ¢Ìá½»µ½ÔÚÏßɨÃèЧÀÍ£¬£¬£¬£¬ÒÔÈ·¶¨ÎļþµÄ¶ñÒâˮƽºÍÕÒ³öÔõÑù¹æ±ÜÕâЩ¼ì²â¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷OilRigÔÚ¹¥»÷ǰ6Ìì¾Í×îÏÈÁ˲âÊԻ£¬£¬£¬£¬²¢ÔÚ8ÔÂ20ÈÕ¡¢21ÈÕºÍ26ÈÕ»®·Ö¾ÙÐÐÁËÈý´Î²âÊÔ¡£¡£¡£¡£¡£¡£Æä×îÖÕ²âÊÔÎļþµÄ½¨Éèʱ¼äÊÇÔÚ½»¸¶ÎĵµµÄ½¨Éèʱ¼ä£¨20·ÖÖÓÖ®ºóÕâЩÎĵµ¾Íͨ¹ý´¹ÂÚÓʼþ·¢ËͳöÈ¥£©µÄ8¸öСʱ֮ǰ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/4¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïINDRIK SPIDERµÄÆÊÎö±¨¸æ
CrowdStrikeÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïNDRIK SPIDERµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2014Äê6ÔÂÒÔÀ´Ò»Ö±Ê¹ÓöñÒâÈí¼þDridex£¬£¬£¬£¬²¢¿ª·¢ÁËÐí¶àеÄÄ£¿£¿£¿£¿£¿£¿éºÍÌí¼ÓÁËÐµķ´ÆÊÎö¹¦Ð§£¬£¬£¬£¬ÒѾ»ñµÃÁËÊý°ÙÍòÃÀÔªµÄ·¸·¨ÀûÈ󡣡£¡£¡£¡£¡£µ«´Ó2017Äê7ÔÂ×îÏÈ£¬£¬£¬£¬¸Ã×éÖ¯×îÏÈתÏòÐÂÀÕË÷Èí¼þBitPaymer£¬£¬£¬£¬²¢ÒѾͨ¹ýBitPaymer»ñµÃÁËÔ¼150ÍòÃÀÔªµÄÊÕÈë¡£¡£¡£¡£¡£¡£BitPaymerÓëDridexÖ®¼ä±£´æÇ¿ÁÒµÄÏà¹ØÐÔ£¬£¬£¬£¬ËüÃǰüÀ¨Ðí¶àÖØµþµÄ·´ÆÊÎö¹¦Ð§¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/5¡¢Ñо¿Ö°Ô±·¢Ã÷Gmail±£´æbug£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫ´¹ÂÚ¹¥»÷
Ñо¿Ö°Ô±Tim Cotten·¢Ã÷Gmail±£´æÒ»¸öÎó²î£¬£¬£¬£¬¿ÉÄܱ»·¸·¨·Ö×ÓʹÓÃÀ´¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâÔ´ÓÚGmail×éÖ¯ÆäÎļþ¼ÐµÄ·½·¨£¬£¬£¬£¬Ëü»áƾ֤ÓʼþÖÐFrom×ֶεĵصãÀ´½«µç×ÓÓʼþ¹éµµµ½¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖС£¡£¡£¡£¡£¡£ÈôÊǹ¥»÷ÕßÏòÄ¿µÄ·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬²¢ÔÚFrom×ֶΰüÀ¨Ä¿µÄµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬Ôò¸ÃÓʼþ½«×Ô¶¯Í¬Ê±·¢ËÍÖÁÄ¿µÄµÄÊÕ¼þÏäºÍÒÑ·¢ËÍÎļþ¼Ð¡£¡£¡£¡£¡£¡£Õâ¹ØÓÚ¹¥»÷ÕßÀ´Ëµ¿ÉÄÜÊÇÒ»¸ö¸£Òô£¬£¬£¬£¬ÓÉÓÚ·¢ËÍÖÁÊÕ¼þÏäÀïµÄÀ¬»øÓʼþ¿ÉÄܻᱻ¹ýÂË£¬£¬£¬£¬µ«·¢ËÍÖÁ¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖеÄÓʼþ½«»á±»±£´æÏÂÀ´¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/gmail-glitch-offers-stealthy-trick-for-phishing-attacks/139167/6¡¢InstagramÐÂÎó²îµ¼Ö²¿·ÖÓû§µÄÃÜÂë̻¶
ƾ֤The InformationµÄ±¨µÀ£¬£¬£¬£¬Instagram4Ô·ÝÐû²¼µÄÓÃÓÚÏÂÔØÐ¡ÎÒ˽¼Ò×ÊÁϵŤ¾ß±£´æbug£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓû§µÄÃÜÂë̻¶¡£¡£¡£¡£¡£¡£µ±Óû§Ê¹Óøù¦Ð§Ê±£¬£¬£¬£¬ËûÃǵÄÃ÷ÎÄÃÜÂë»á·ºÆðÔÚURLÖУ¬£¬£¬£¬Òò´ËÔÚ¹«¹²ÍøÂçÖÐʹÓøù¤¾ß¿ÉÄܻᵼÖÂÃÜÂëÏò¹¥»÷Õß̻¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÒѾÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬²¢ÏòÊÜÓ°ÏìµÄÉÙÉÙÊýÈË·¢ËÍÁËÓʼþ֪ͨ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ç徲ר¼Òͨ¹ýÕâÒ»ÊÂÎñÖÊÒÉInstagram´æ´¢ÁËÓû§µÄÃ÷ÎÄÃÜÂ룬£¬£¬£¬µ«¸Ã¹«Ë¾½²»°ÈË·ñ¶¨ÁËÕâÒ»Ö¸Ô𡣡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78173/data-breach/instagram-glitch-exposed-passwords.htmlÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ