¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190114

Ðû²¼Ê±¼ä 2019-01-14
1¡¢NASAÄÚ²¿Ó¦ÓÃȨÏÞÉèÖùýʧ£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤ºÍÏîÄ¿ÐÅϢй¶

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


NASAµÄÄÚ²¿Ó¦ÓÃJiraÒòÉèÖùýʧµ¼ÖÂÔ±¹¤µÄÓû§Ãû¡¢ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍÏîÄ¿Ãû³ÆµÈÃô¸ÐÐÅϢй¶¡£¡£¡£¡£ ¡£JIRAÊÇÒ»¸öÓÉAtlassian¹«Ë¾Ö§³ÖµÄÏîÄ¿ÖÎÀíϵͳ£¬£¬£¬£¬£¬¿É¾ÙÐÐbug¸ú×ÙºÍѸËÙÏîÄ¿ÖÎÀí¡£¡£¡£¡£ ¡£ÖÎÀíÔ±¸ã»ìÁËJiraµÄȨÏÞÉèÖÃEveryoneºÍAll users£¬£¬£¬£¬£¬EveryoneȨÏÞÏÖʵÉÏÔÊÐí»¥ÁªÍøÉϵÄÈκÎÈ˶¼¿ÉÒÔ»á¼ûÓ¦ÓÃÊý¾Ý£¬£¬£¬£¬£¬¶ø²»ÊÇÖÎÀíÔ±ÒÔΪµÄ×éÖ¯ÄÚµÄÈκÎÈË£¨ÕâÓ¦¸ÃÊÇAll usersȨÏÞ£©¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/nasa-internal-app-leaked-employee-emails-project-names/


2¡¢ÃÀÂíÈøÖîÈûÖÝÐÞ¸ÄÊý¾Ýй¶֪ͨ·¨°¸£¬£¬£¬£¬£¬½«ÓÚ4ÔÂ11ÈÕÉúЧ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



ÃÀ¹úÂíÈøÖîÈûÖÝ¶ÔÆäÊý¾Ýй¶֪ͨ·¨°¸¾ÙÐÐÁËÖØ´óµÄÐ޸쬣¬£¬£¬£¬¸ÃÐÞÕý°¸½«ÓÚ2019Äê4ÔÂ11ÈÕÉúЧ¡£¡£¡£¡£ ¡£ÆäÖÐÒ»ÏîÖ÷ÒªµÄÐ޸İüÀ¨¶Ô±¬·¢Êý¾Ýй¶µÄ×éÖ¯Ìá³öÁ˸ü¶àµÄÒªÇ󣬣¬£¬£¬£¬µ±Êý¾Ýй¶ÊÂÎñÉæ¼°µ½ÂíÈøÖîÈûÖݹ«ÃñµÄÉç»áÇå¾²ºÅÂëʱ£¬£¬£¬£¬£¬¸Ã×éÖ¯±ØÐèÏòÊÜÓ°ÏìµÄ¹«ÃñÌṩ²»ÉÙÓÚ18¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£ ¡£ÆäËüÖØ´óÐ޸İüÀ¨¸üÐÂÁË×éÖ¯ÏòÖÝî¿Ïµ»ú¹¹Ìá½»µÄÐÅÏ¢ÀàÐ͵È¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/massachusetts-enacts-significant-changes-to-its-data-breach-notification-law/


3¡¢AnonymousºÚ¿ÍÒòDDoS¶ùͯҽԺ±»ÅÐÈëÓüÁè¼Ý10Äê

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AnonymousºÚ¿ÍÒòDDoSÁ½¼ÒÒ½ÁÆ»ú¹¹±»Åд¦Áè¼Ý10ÄêµÄÓÐÆÚͽÐÌ¡£¡£¡£¡£ ¡£ÕâÃûºÚ¿ÍÊÇÏÖÄê34ËêµÄÂíÈøÖîÈûÖÝÄÐ×ÓMartin Gottesfeld£¬£¬£¬£¬£¬Ëû±»·¨¹ÙÅд¦·þÐÌ121¸öÔºÍÖ§¸¶½ü44.3ÍòÃÀÔªµÄÅâ³¥½ð¡£¡£¡£¡£ ¡£2014Äê4Ô£¬£¬£¬£¬£¬GottesfeldʹÓÃÓÉÁè¼Ý4Íò¸ö·ÓÉÆ÷×é³ÉµÄ½©Ê¬ÍøÂç¶Ô²¨Ê¿¶Ù¶ùͯҽԺ£¨BCH£©ºÍ·ÇÓªÀûÐÔÖÎÁÆ»ú¹¹Wayside·¢¶¯DDoS¹¥»÷£¬£¬£¬£¬£¬ÒÔ¿¹Òé¶ÔÇàÉÙÄ껼ÕßJustina PelletierµÄÖÎÁÆÐÐΪ¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/01/ddos-attack-anonymous-hacker.html


4¡¢Ó¢¹úºÚ¿ÍÒòDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾±»ÅÐÈëÓü32¸öÔÂ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ó¢¹úºÚ¿ÍDaniel Kaye£¨29Ë꣩Òò2016ÄêDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾Lonestar¶ø±»ÅÐÈëÓü·þÐÌ32¸öÔ¡£¡£¡£¡£ ¡£Æ¾Ö¤BBCµÄ±¨µÀ£¬£¬£¬£¬£¬LonestarµÄ¾ºÕùµÐÊÖCellcomµÄÒ»ÃûÔ±¹¤Æ¸ÓÃÁËKayeÀ´¶ÔLonestar¾ÙÐÐDDoS¹¥»÷£¬£¬£¬£¬£¬Ã¿ÔÂÏòÆäÖ§¸¶¸ß´ï1ÍòÃÀÔª£¨7800Ó¢°÷£©µÄÓöÈ¡£¡£¡£¡£ ¡£¸Ã¹¥»÷ʹµÃÎ÷·Ç¹ú¼ÒµÄ»¥ÁªÍø½ÓÈëÖÐÖ¹£¬£¬£¬£¬£¬¸øLonestarÔì³ÉÁËÊýÍòÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/79781/breaking-news/british-hacker-sentenced-liberian-attack.html


5¡¢ÐÂÑо¿Åú×¢ÀÕË÷Èí¼þRyuk±³ºó¿ÉÄÜÊǶíÂÞ˹·¸·¨ÍÅ»ï

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤Crowdstrike¡¢FireEye¡¢Kryptos LogicºÍMcAfeeÐû²¼µÄ±¨¸æ£¬£¬£¬£¬£¬ÀÕË÷Èí¼þRyuk±³ºóºÜÓпÉÄÜÊÇ¿î×ÓÄîÍ·µÄ¶íÂÞ˹·¸·¨ÍŻ£¬£¬£¬£¬¶ø²»ÊÇ֮ǰÐÂÎÅýÌ屨µÀµÄ³¯ÏʺڿÍ¡£¡£¡£¡£ ¡£Ö¤¾ÝÅú×¢RyukÊÇÓÉCrowdstrike³ÆÖ®ÎªGrim SpiderµÄ·¸·¨ÍŻィÉèµÄ£¬£¬£¬£¬£¬¸ÃÍÅ»ï´ÓºÚ¿ÍÂÛ̳ÉϹºÖÃÁËÀÕË÷Èí¼þHermesµÄÒ»¸ö±äÖÖ£¬£¬£¬£¬£¬²¢¶¨ÖÆ»¯ÐÞ¸ÄΪ×Ô¼ºµÄÀÕË÷Èí¼þRyuk¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬³¯ÏʺڿʹӺڿÍÂÛ̳ÉϹºÖÃÁËͳһ¸öHermes±äÖÖ£¬£¬£¬£¬£¬µ«ËûÃÇÓëRyukÖ®¼äûÓÐÈκιØÁª¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ryuk-ransomware-gang-probably-russian-not-north-korean/


6¡¢ÐéαӰϷÎļþ¿ÉÇÔÈ¡¼ÓÃÜÇ®±ÒºÍÐÞ¸ÄGoogleËÑË÷Ч¹û

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



Ñо¿Ö°Ô±´Óº£µÁÍåÉÏÏÂÔØÓ°Ï·Ê±·¢Ã÷Ò»¸öαװ³ÉÓ°Ï·ÎļþµÄ¶ñÒâWindows¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬£¬¸ÃÎļþÓÃÓÚÖ´ÐÐPowerShellÏÂÁ£¬£¬£¬£¬¿ÉÒÔ½«¹¥»÷ÕßµÄÄÚÈÝ×¢È뵽ά»ù°Ù¿Æ¡¢GoogleºÍYandexËÑË÷Ч¹ûµÈ£¬£¬£¬£¬£¬»¹¿ÉÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¡£¡£¡£ ¡£¶ñÒâÈí¼þ»áÐÞ¸Ä×¢²á±íÏîÒÔ½ûÓÃWindows Defender£¬£¬£¬£¬£¬»¹¿ÉÒÔÔÚFirefoxÖÐÇ¿ÖÆ×°ÖÃÀ©Õ¹Firefox Protection£¬£¬£¬£¬£¬²¢Ð®ÖÆChromeÀ©Õ¹Chrome Media Router¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-movie-file-infects-pc-to-steal-cryptocurrency-poison-google-results/


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí