Daimler Git´æ´¢¿â̻¶µ¼Ö¼²³ÛOLUÔ´´úÂëй¶£»£»£»º½¿Õ¹«Ë¾EasyJet 900Íò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2020-05-20

1.Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬£¬£¬£¬£¬¼²³Û×é¼þOLUÔ´´úÂëй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾ÝZDNet±¨µÀ£¬£¬£¬£¬£¬£¬£¬Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨×°ÖÃÔÚMercedez¼²³Û»õ³µÖеİåÔØÂß¼­µ¥Î»£¨OLU£©µÄÔ´´úÂë¡£¡£¡£¡£¡£¹¤³ÌʦTill Kottmann·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ËûÔÚMercedez¼²³ÛµÄ´úÂëÍйÜÍøÕ¾DaimlerÖÐʹÓÃí§Òâµç×ÓÓʼþ×¢²áÒ»¸öÕ˺ţ¬£¬£¬£¬£¬£¬£¬±ã¿ÉÒÔ»á¼ûÆäÁè¼Ý580¸öGit´æ´¢¿â¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨OLUÔ´´úÂë¡¢Raspberry PiÓ³Ïñ¡¢Ð§ÀÍÆ÷Ó³Ïñ¡¢ÓÃÓÚÖÎÀíÔ¶³ÌOLUµÄÄÚ²¿Daimler×é¼þ¡¢ÄÚ²¿Îĵµ¡¢´úÂëʾÀýµÈ¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾UnderÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇͨ¹ýÉó²é»¹·¢Ã÷ÁËDaimlerÄÚ²¿ÏµÍ³µÄÃÜÂëºÍAPIÁîÅÆ£¬£¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖDaimlerÔÆºÍÄÚ²¿ÍøÂç¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/mercedes-benz-onboard-logic-unit-olu-source-code-leaks-online/


2.µÂÖÝÔÙÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÆä½»Í¨ÔËÊ䲿ϵͳ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ò»¸öÔÂÄڵ¿ËÈøË¹ÖÝÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔµÄÊǸÃÖݵĽ»Í¨ÔËÊ䲿ϵͳ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃϵͳÒѱ»ÆÈ¹Ø±Õ¡£¡£¡£¡£¡£µÂÖݽ»Í¨ÔËÊ䲿£¨TxDOT£©È·ÈÏ£¬£¬£¬£¬£¬£¬£¬5ÔÂ14ÈÕÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÓÐδ¾­ÊÚȨ»á¼û¸Ã»ú¹¹ÍøÂ磬£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹·¢Ã÷ºóÁ¬Ã¦½ÓÄɲ½·¥£¬£¬£¬£¬£¬£¬£¬±ÜÃâ½øÒ»²½¹¥»÷¡£¡£¡£¡£¡£5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹ÖÝÔâµ½µÚÒ»´Î¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ²¡¶¾Ñ¬È¾Á˸ÃÖݵķ¨ÔºÏµÍ³¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Éв»ÇåÎúÁ½´Î¹¥»÷ÊÇ·ñÓйØÁª£¬£¬£¬£¬£¬£¬£¬Ò²Ã»ÓйØÓÚÕâÁ½´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/103410/cyber-crime/txdot-ransomware-attack.html


3.Ó¢¹úº½¿Õ¹«Ë¾EasyJetÔâ¹¥»÷£¬£¬£¬£¬£¬£¬£¬900Íò¿Í»§ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ó¢¹ú×î´óµÄº½¿Õ¹«Ë¾EasyJeÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶ÁË900Íò¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£¡£ÔÚÕâ´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁ˸ù«Ë¾900Íò¿Í»§µÄµç×ÓÓʼþµØµãºÍÂÃÐÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐÆäÖÐ2208λ¿Í»§µÄÐÅÓÿ¨ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£EasyJetÔÚ·¢Ã÷´ËÊÂÎñºó£¬£¬£¬£¬£¬£¬£¬±ã֪ͨÁËÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍICO£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÏÖÔÚËûÃÇÕýÔÚ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆÔÚ2020Äê5ÔÂ26ÈÕ֮ǰËùÓÐÊÜÓ°Ïì¿Í»§¶¼½«ÊÕµ½Í¨Öª¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ´ËÊÂÎñµÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/easyjet-hacked-data-breach-affects-9-million-customers/


4.ºÚ¿Íð³äÃÀ¹ú²ÆÎñ²¿Óô¹ÂÚÓʼþ·Ö·¢»ùÓÚNode.jsµÄRAT


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Abuse.ch·¢Ã÷ÁËеĴ¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íαװ³ÉÃÀ¹ú²ÆÎñ²¿À´·Ö·¢»ùÓÚNode.jsµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©ºÍÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Ê×ÏȺڿͻáÉù³ÆÓÉÓÚÒøÐÐÐÅÏ¢²»×¼È·£¬£¬£¬£¬£¬£¬£¬Î´Ö§¸¶Õþ¸®ÌõÔ¼µÄ¿î×Ó£¬£¬£¬£¬£¬£¬£¬Ö®ºó»áͨ¹ýµç×ÓÓʼþÌáÐÑÓû§¼ì²é¸½¼þÎĵµÊÇ·ñÓÐÎ󡣡£¡£¡£¡£Óʼþ¸½¼þÖаüÀ¨ÃûΪCONTRACT PAYMENT.jarµÄÎļþ£¬£¬£¬£¬£¬£¬£¬Óû§Ö´Ðкó½«ÏÂÔØNode.jsºÍWizard.js¾ç±¾²¢´æ´¢ÔÚ£¥UserProfile \ qnodejs-node-v13.13.0-win-x64Îļþ¼ÐÖС£¡£¡£¡£¡£¸ÃNode.js¶ñÒâÈí¼þQNodeService¾ßÓÐ×ÔÎÒ¸üС¢»ñÈ¡»úеÐÅÏ¢£¨ÀýÈçIPµØµã¡¢»úеÃû³Æ¡¢Î»Öá¢Óû§ÃûºÍ²Ù×÷ϵͳ°æ±¾£©¡¢Ö´ÐÐÏÂÁɾ³ýºÍдÈëÎļþ¡¢´ÓÖÖÖÖÓ¦ÓóÌÐò£¨ÀýÈçChromeºÍFirefox£©ÖÐÇÔÈ¡ÃÜÂëµÄ¹¦Ð§¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-us-dept-of-treasury-emails-spreads-new-nodejs-malware/


5.FBIÐû²¼ÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þProLockʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


FBIÐû²¼ÁËÒ»¸öÇå¾²¾¯±¨£¬£¬£¬£¬£¬£¬£¬ËµÃ÷ÎúÐÂÐÍÀÕË÷Èí¼þProLock¿ÉÒÔʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç¡£¡£¡£¡£¡£¸Ã²¡¶¾ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Òѱ»ÓÃÓÚÒ½ÁƱ£½¡×éÖ¯¡¢Õþ¸®»ú¹¹¡¢½ðÈÚ»ú¹¹ºÍÁãÊÛ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£¡£¡£¡£¡£FBI·¢Ã÷ProLock¿ÉÒÔͨ¹ýQakbot»á¼û±»ºÚµÄÍøÂ磬£¬£¬£¬£¬£¬£¬Òò´ËÒ»µ©·¢Ã÷ѬȾÁËQakbotµÄÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬±ØÐ辡¿ì½«ÆäÓëÍøÂçµÄÆäÓಿ·Ö¸ôÀë¡£¡£¡£¡£¡£ÁíÍ⣬£¬£¬£¬£¬£¬£¬FBI»¹ÖÒÑÔºÚ¿ÍÍÅ»ïÔÚÊܺ¦ÕßÖ§¸¶Êê½ðºóÌṩµÄ½âÃÜÆ÷¿ÉÄÜÎÞ·¨Õý³£ÊÂÇ飬£¬£¬£¬£¬£¬£¬»áÆÆËð´óÓÚ64MBµÄÎļþ£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄܵ¼ÖÂ100MBÒÔÉϵÄÎļþÿ1KBɥʧԼĪ1¸ö×Ö½Ú¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-prolock-ransomware-gains-access-to-victim-networks-via-qakbot-infections/


6.VerizonÐû²¼2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬£¬£¬£¬£¬DoS¹¥»÷Ôö¶à


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÁË16¸ö±ÊÖ±ÐÐÒµµÄ32002ÆðÇå¾²ÊÂÎñºÍ3950ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÒÑÍùÒ»ÄêDoS¹¥»÷µÄÊýÄ¿ÓÐËùÔöÌí£¨1.3ÍòÆð£¬£¬£¬£¬£¬£¬£¬Õ¼Çå¾²ÊÂÎñµÄ40£¥£©£¬£¬£¬£¬£¬£¬£¬Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÌØ¹¤¹¥»÷ïÔÌ­£¬£¬£¬£¬£¬£¬£¬ÔÚÊý¾Ýй¶ÊÂÎñÖеÄÕ¼±È´Ó13.5£¥Ï½µµ½3.2£¥¡£¡£¡£¡£¡£ÔÚÊý¾Ýй¶·½Ã棬£¬£¬£¬£¬£¬£¬¿ìÒªÒ»°ë£¨45£¥£©µÄÊÂÎñÊÇÓÉÓÚÏÖʵ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¶ø22£¥ÔòÓÉÓÚÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£22£¥µÄÈëÇÖÉæ¼°µ½¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬¶ø17£¥ÊÇÓɹýʧÔì³ÉµÄ¡£¡£¡£¡£¡£8£¥µÄй¶Դ×ÔÓÚÊÚȨÓû§µÄÎóÓᣡ£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/