¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181119
Ðû²¼Ê±¼ä 2018-11-191¡¢°µÍøÍйÜЧÀÍÉÌDaniel's HostingÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Áè¼Ý6500¸öÍøÕ¾±»É¾

11ÔÂ15ÈÕ°µÍø×î´óµÄÍøÂçÍйÜЧÀÍÉÌDaniel's HostingÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßɾ³ýÁË6500¶à¸öÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÕâÐ©ÍøÕ¾¶¼Ã»Óб¸·Ý¡£¡£¡£¡£¸ÃÍйÜЧÀÍÉ̱³ºóµÄ¿ª·¢Ö°Ô±Daniel Winzen֤ʵ³Æ£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍÆ÷µÄrootÕË»§Ò²±»É¾³ýÁË£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÆ½Ì¨ÉÏÍйܵÄÁè¼Ý6500¸öÍøÕ¾µÄÊý¾Ý¶¼Òѳ¹µ×ɥʧ¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜÊÇʹÓÃÁËphpÖеÄÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬µ«Ò²ÓпÉÄÜÊÇʹÓÃÁËÆäËüµÄÎó²î¡£¡£¡£¡£ÏÖÔÚ»¹Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÊÂÈÏÕæ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78165/cyber-crime/daniels-hosting-hacked.html2¡¢¼ÓÃÜÓʼþЧÀÍÉÌProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƹ¥»÷

Ê¢ÐеļÓÃܵç×ÓÓʼþЧÀÍProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƵĹ¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷ÕßAmFearLiathMorÉù³ÆÈëÇÖÁ˸ù«Ë¾²¢ÇÔÈ¡ÁË¡°´ó×Ú¡±µÄÓû§Êý¾Ý¡£¡£¡£¡£¹¥»÷Õß½«ÆäÊê½ðÒªÇóÐû²¼ÔÚPastebinÉÏ£¬£¬£¬£¬£¬£¬£¬²¢ÍþвҪÏòÈ«ÌìÏÂÐû²¼»òÏúÊÛÕâЩÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´Ìṩ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£ProtonMailÔÚÊÓ²ìÖ®ºó·ñ¶¨ÁËÕâÆð¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Éù³ÆÕâÖ»ÊÇÒ»¸öÊÔͼڲƵÄȦÌס£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78133/hacking/protonmail-hacked-hoax.html3¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚOilRigжñÒâ»î¶¯µÄÆÊÎö±¨¸æ

Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïOilRigÔÚÌᳫ¹¥»÷ǰ¶ÔÆä¶ñÒâÈí¼þºÍ¹¤¾ß¾ÙÐвâÊԻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£OilRigµÄ²âÊÔÁ÷³Ìͨ³£°üÀ¨¶ÔÆä½»¸¶Îĵµ¾ÙÐÐÉÙÁ¿Ð޸IJ¢Ìá½»µ½ÔÚÏßɨÃèЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÎļþµÄ¶ñÒâˮƽºÍÕÒ³öÔõÑù¹æ±ÜÕâЩ¼ì²â¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷OilRigÔÚ¹¥»÷ǰ6Ìì¾Í×îÏÈÁ˲âÊԻ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ8ÔÂ20ÈÕ¡¢21ÈÕºÍ26ÈÕ»®·Ö¾ÙÐÐÁËÈý´Î²âÊÔ¡£¡£¡£¡£Æä×îÖÕ²âÊÔÎļþµÄ½¨Éèʱ¼äÊÇÔÚ½»¸¶ÎĵµµÄ½¨Éèʱ¼ä£¨20·ÖÖÓÖ®ºóÕâЩÎĵµ¾Íͨ¹ý´¹ÂÚÓʼþ·¢ËͳöÈ¥£©µÄ8¸öСʱ֮ǰ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/4¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïINDRIK SPIDERµÄÆÊÎö±¨¸æ

CrowdStrikeÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïNDRIK SPIDERµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã×éÖ¯×Ô2014Äê6ÔÂÒÔÀ´Ò»Ö±Ê¹ÓöñÒâÈí¼þDridex£¬£¬£¬£¬£¬£¬£¬²¢¿ª·¢ÁËÐí¶àеÄÄ£¿£¿£¿£¿£¿éºÍÌí¼ÓÁËÐµķ´ÆÊÎö¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÒѾ»ñµÃÁËÊý°ÙÍòÃÀÔªµÄ·¸·¨ÀûÈ󡣡£¡£¡£µ«´Ó2017Äê7ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯×îÏÈתÏòÐÂÀÕË÷Èí¼þBitPaymer£¬£¬£¬£¬£¬£¬£¬²¢ÒѾͨ¹ýBitPaymer»ñµÃÁËÔ¼150ÍòÃÀÔªµÄÊÕÈë¡£¡£¡£¡£BitPaymerÓëDridexÖ®¼ä±£´æÇ¿ÁÒµÄÏà¹ØÐÔ£¬£¬£¬£¬£¬£¬£¬ËüÃǰüÀ¨Ðí¶àÖØµþµÄ·´ÆÊÎö¹¦Ð§¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/5¡¢Ñо¿Ö°Ô±·¢Ã÷Gmail±£´æbug£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫ´¹ÂÚ¹¥»÷

Ñо¿Ö°Ô±Tim Cotten·¢Ã÷Gmail±£´æÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܱ»·¸·¨·Ö×ÓʹÓÃÀ´¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¸ÃÎÊÌâÔ´ÓÚGmail×éÖ¯ÆäÎļþ¼ÐµÄ·½·¨£¬£¬£¬£¬£¬£¬£¬Ëü»áƾ֤ÓʼþÖÐFrom×ֶεĵصãÀ´½«µç×ÓÓʼþ¹éµµµ½¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖС£¡£¡£¡£ÈôÊǹ¥»÷ÕßÏòÄ¿µÄ·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚFrom×ֶΰüÀ¨Ä¿µÄµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬Ôò¸ÃÓʼþ½«×Ô¶¯Í¬Ê±·¢ËÍÖÁÄ¿µÄµÄÊÕ¼þÏäºÍÒÑ·¢ËÍÎļþ¼Ð¡£¡£¡£¡£Õâ¹ØÓÚ¹¥»÷ÕßÀ´Ëµ¿ÉÄÜÊÇÒ»¸ö¸£Òô£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ·¢ËÍÖÁÊÕ¼þÏäÀïµÄÀ¬»øÓʼþ¿ÉÄܻᱻ¹ýÂË£¬£¬£¬£¬£¬£¬£¬µ«·¢ËÍÖÁ¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖеÄÓʼþ½«»á±»±£´æÏÂÀ´¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/gmail-glitch-offers-stealthy-trick-for-phishing-attacks/139167/6¡¢InstagramÐÂÎó²îµ¼Ö²¿·ÖÓû§µÄÃÜÂë̻¶

ƾ֤The InformationµÄ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Instagram4Ô·ÝÐû²¼µÄÓÃÓÚÏÂÔØÐ¡ÎÒ˽¼Ò×ÊÁϵŤ¾ß±£´æbug£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓû§µÄÃÜÂë̻¶¡£¡£¡£¡£µ±Óû§Ê¹Óøù¦Ð§Ê±£¬£¬£¬£¬£¬£¬£¬ËûÃǵÄÃ÷ÎÄÃÜÂë»á·ºÆðÔÚURLÖУ¬£¬£¬£¬£¬£¬£¬Òò´ËÔÚ¹«¹²ÍøÂçÖÐʹÓøù¤¾ß¿ÉÄܻᵼÖÂÃÜÂëÏò¹¥»÷Õß̻¶¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÒѾÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬²¢ÏòÊÜÓ°ÏìµÄÉÙÉÙÊýÈË·¢ËÍÁËÓʼþ֪ͨ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ç徲ר¼Òͨ¹ýÕâÒ»ÊÂÎñÖÊÒÉInstagram´æ´¢ÁËÓû§µÄÃ÷ÎÄÃÜÂ룬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾½²»°ÈË·ñ¶¨ÁËÕâÒ»Ö¸Ô𡣡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78173/data-breach/instagram-glitch-exposed-passwords.htmlÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí