DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬½ü500ÍòÓû§ÐÅϢй¶£»£»Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2019-09-27
1.DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬½ü500ÍòÓû§ÐÅϢй¶

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ËͲÍЧÀÍDoorDashÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬µ¼Ö½ü500ÍòÏûºÄÕß¡¢ËͲÍÔ±¼°²Í¹ÝÉÌÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÆäÍøÕ¾ÉÏÐû²¼µÄÇ徲֪ͨ£¬£¬£¬Î´ÊÚȨµÄµÚÈý·½ÔÚ2019Äê5ÔÂ4ÈÕ»ñµÃÁË¸ÃÆ½Ì¨Óû§Êý¾ÝµÄ»á¼ûȨÏÞ£¬£¬£¬ÊÜÓ°ÏìµÄÓû§½ö°üÀ¨ÔÚ2018Äê4ÔÂ5ÈÕǰע²á¸Ãƽ̨µÄÓû§¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ËÍ»õµØµã¡¢µç»°ºÅÂëºÍ¹þÏ£ÃÜÂëÒÔ¼°ÒøÐп¨ºóËÄλºÍ½ü10ÍòËͲÍÔ±µÄ¼ÝÕÕºÅÂëµÈ¡£¡£¡£¡£¡£¡£DoorDashÇ¿µ÷ûÓÐÍêÕûµÄÐÅÓÿ¨ÐÅÏ¢»òÍêÕûµÄÒøÐп¨ÕË»§ºÅÂëй¶¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢µÄÔµ¹ÊÔ­ÓÉÉв»ÇåÎú£¬£¬£¬µ«DoorDashÌåÏÖÓëµÚÈý·½Ð§ÀÍÌṩÉÌÓйØ¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/doordash-data-breach-impacts-personal-data-of-almost-5m-users/148724/

2.ÎÖ´ï·áÒÆ¶¯Ó¦Óñ£´æÎó²îµ¼Ö²¿·Ö¿Í»§ÐÅϢй¶


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÐÂÎ÷À¼ÎÖ´ï·áµÄÒÆ¶¯appÔÚÖÜÈýÔçÉϵÄһС¶Îʱ¼äÄÚ·ºÆðÎó²î£¬£¬£¬µ¼Ö¿ͻ§¿ÉÒÔ¿´µ½ÆäËû¿Í»§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃappÖ¼ÔÚÖÎÀíÓû§µÄÎÖ´ï·áÕÊ»§£¬£¬£¬²¢Ìṩ¶ÔÕ˵¥»ò¿ÉÓÃЧÀ͵ĿìËÙ»á¼û¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤ÊµÁËÕâÒ»ÊÂÎñ£¬£¬£¬³ÆÕâÊÇÓÉÓÚÍýÏëÄÚµÄÓ¦ÓÃÉý¼¶Àú³Ì·ºÆð¹ýʧµ¼ÖµÄ£¬£¬£¬Ê¹µÃÓû§¹ýʧµØµÇ¼µ½ÆäËûÈ˵ÄÕË»§¡£¡£¡£¡£¡£¡£¸ÃÎÊÌⲢδһÁ¬ºÜ³¤Ê±¼ä£¬£¬£¬ÎÖ´ï·áÔÚ15·ÖÖÓºó¾Í»Ø¹öÁËÕâÒ»Éý¼¶¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶àÓû§µÄСÎÒ˽¼ÒÐÅÏ¢Òò´Ë¶ø¹ûÕæ£¬£¬£¬ÎÖ´ï·áÌåÏÖÕýÔÚ½ôÆÈÆÀ¹ÀÊÜÓ°ÏìµÄÈËÊý¼°Ï¸½Ú£¬£¬£¬²¢È·¶¨Í¨ÖªÕâЩ¿Í»§ÐèÒª½ÓÄɵİ취¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vodafones-mobile-app-briefly-exposed-customer-information/

3.iOS 13ºÍiPadOSÎó²î¿Éµ¼ÖµÚÈý·½¼üÅÌ»ñÈ¡ÍêÈ«»á¼ûȨÏÞ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Æ»¹û¹Ù·½Ðû²¼ÁËÒ»·ÝеÄÖ§³ÖÎĵµ£¬£¬£¬ÖÒÑÔÓû§ÓйØiOS 13ºÍiPadOSµÚÈý·½¼üÅ̱£´æµÄÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬Ò»Ð©µÚÈý·½¼üÅÌÈí¼þ×ÝȻδ±»Åú×¼ÍêÈ«»á¼ûȨÏÞÒ²¿ÉÄÜ»áÓÉÓÚiOS 13ºÍiPadOSÖеÄÎó²î¶ø±»ÊÚÓèÍêÈ«»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£ÕâÒ»ÎÊÌâÓ°ÏìÁËiPhone¡¢iPad»òiPod touch×°ÖõļüÅÌ£¬£¬£¬µ«²»Ó°ÏìÆ»¹ûµÄÄÚÖüüÅÌ£¬£¬£¬Ò²²»»áÓ°ÏìδʹÓÃÍêÈ«»á¼ûȨÏ޵ĵÚÈý·½¼üÅÌ£¬£¬£¬Æ»¹û½«ÔÚ¼´½«µ½À´µÄÈí¼þ¸üÐÂÖÐÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/bug-granting-full-access-keyboards/148638/

4.Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤·¨ÐÂÉ籨µÀ£¬£¬£¬Å·ÖÞ¿ÕÖпͳµ¹«Ë¾ÔÚÒÑÍù12¸öÔÂÖÐÖÁÉÙÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£2019ÄêÍ·£¬£¬£¬¿Õ¿ÍÐû³ÆÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µÄ¡°ÉÌÓú½ÐÐÓªÒµ¡±ÏµÍ³²¢»ñµÃÁ˲¿·ÖÔ±¹¤Òþ˽ÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£·¨ÐÂÉ籨µÀ³Æ¸ÃÊÂÎñÊÇÈ¥Äê¾ÙÐеÄÒ»Ïî¸ü´ó¹æÄ£Ðж¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£ÔÚÕâһϵÁй©Ó¦Á´¹¥»÷ÖУ¬£¬£¬¹¥»÷Õß»¹Õë¶ÔÁËÓ¢¹ú·¢ÄîÍ·ÖÆÔìÉÌRolls-RoyceºÍ·¨¹úÊÖÒÕ×Éѯ¹«Ë¾¼°¹©Ó¦ÉÌExpleo£¬£¬£¬ÒÔ¼°ÁíÍâÁ½¼Ò·¨¹ú¿Õ¿Í³Ð°üÉÌ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91744/hacking/airbus-suppliers-attacks.html

5.¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÖÒÑÔÀÕË÷Èí¼þTFlowerµÄбäÌå


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄ£¨CCCS£©Ðû²¼ÓйØÀÕË÷Èí¼þTFlowerбäÖֵĹ¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¡£¡£¡£¸Ã±äÖÖÓÚ7ÔÂ30ÈÕ±»·¢Ã÷£¬£¬£¬Ö÷Ҫͨ¹ýδ´ò²¹¶¡µÄÔ¶³Ì×ÀÃæÐ§ÀÍÈö²¥£¬£¬£¬µ«Ò²¿ÉÄÜͨ¹ýÀ¬»øÓʼþ¡¢ÓÕÆ­ÐÔÏÂÔØ¡¢½©Ê¬ÍøÂç¡¢¶ñÒâ¹ã¸æ¡¢web×¢Èë¡¢Ðéα¸üлòÊÜѬȾµÄ×°ÖðüÈö²¥¡£¡£¡£¡£¡£¡£ÔÚѬȾϵͳºó£¬£¬£¬¸Ã±äÖÖ»áʵÑéͨ¹ýPowerShell Empire¡¢PSExecµÈ¹¤¾ßÔÚÍøÂçÉϺáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£¸Ã±äÖÖ»áÏÈÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬È»ºóɾ³ý¾íÓ°¸±±¾²¢½ûÓÃwin10ÖеĻָ´¹¦Ð§£¬£¬£¬×îºóÐÞ¸Ä×¢²á±íÀ´»ñÈ¡³¤ÆÚÐÔ¼°¼ÓÃÜÓû§µÄÎļþ¡£¡£¡£¡£¡£¡£CCCS½¨ÒéϵͳËùÓÐÕßÁ¬Ã¦Ó¦ÓÃ×îеÄÇå¾²²¹¶¡²¢ÔÚ»á¼ûÓʼþÖеÄÁ´½Ó»ò·­¿ª¸½¼þʱ¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://cyber.gc.ca/en/alerts/tflower-ransomware-campaign

6.EmsisoftÐû²¼ÀÕË÷Èí¼þWannaCryFakeµÄ½âÃܹ¤¾ß


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


EmsisoftÑо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þWannaCryFakeµÄÃ⺬»ìÃܹ¤¾ß¡£¡£¡£¡£¡£¡£WannaCryFakeÊÇÒ»¿îʹÓÃAES-256¼ÓÃÜÊܺ¦ÕßÎļþµÄÀÕË÷Èí¼þ£¬£¬£¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.[<id>][recoverydata54@protonmail.com].WannaCryÀ©Õ¹Ãû¡£¡£¡£¡£¡£¡£Æ¾Ö¤¹¥»÷ÕßµÄ˵·¨£¬£¬£¬Êê½ðµÄ¼ÛÇ®ÓëÁªÏµËûÃǵÄËÙÂÊÓйØ£¬£¬£¬µ«Ñо¿Ö°Ô±ÌåÏÖÔÚÈκÎÇéÐÎ϶¼²»Ó¦¸ÃʵÑéÁªÏµ¹¥»÷Õß¡£¡£¡£¡£¡£¡£¸Ã½âÃÜÆ÷¿É´ÓEmsisoft¹ÙÍøÉÏÏÂÔØ»ñµÃ¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/91715/malware/wannacryfake-ransomware-decryptor.html