αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ£» £» £»£»£»£»£»ºÚ¿ÍJohn WickÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5͵ȡÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2020-06-08

1.αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¿ËÈÕ£¬£¬£¬ºÚ¿ÍÕýÔÚ·Ö·¢Î±ÔìµÄSTOP DjvuÀÕË÷Èí¼þµÄ½âÃÜÆ÷£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßµÄÎļþ¾ÙÐжþ´Î¼ÓÃÜ¡£¡£¡£¡£¡£¡£STOP DjvuÊÇÒÑÍùÒ»ÄêÖÐ×î»îÔ¾µÄÀÕË÷Èí¼þ£¬£¬£¬Æ½¾ùÌìÌìѬȾÁè¼Ý600¸öÊܺ¦Õß¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÖ÷ÒªÓ°ÏìµÄÊǼÒÍ¥Óû§£¬£¬£¬Òò´ËÐí¶à±»Ñ¬È¾Óû§ÎÞ·¨Ö§¸¶500ÃÀÔªµÄÊê½ðÀ´¹ºÖýâÃÜÆ÷¡£¡£¡£¡£¡£¡£Ö®ºóÑо¿Ö°Ô±·¢Ã÷ÁËαÔìµÄÃâ·ÑµÄSTOP Djvu½âÃÜÆ÷£¬£¬£¬¿ÉÊÇËû²»»á»Ö¸´ÈκÎÎļþ£¬£¬£¬µ±Óû§·­¿ª¸ÃÈí¼þ²¢µã»÷×îÏÈɨÃèºó£¬£¬£¬¸Ã³ÌÐò½«ÏÂÔØ¿ÉÖ´ÐÐÎļþcrab.exe²¢ÉúÑĵ½£¥Temp£¥Îļþ¼ÐÖУ¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßÅÌËã»úÉϵÄÊý¾Ý¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Ñо¿Ö°Ô±ÕýÔÚ¶Ô´ËÀÕË÷²¡¶¾¾ÙÐÐÆÊÎö¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/


2.ºÚ¿ÍJohn WickÉù³ÆÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5£¬£¬£¬ÍµÈ¡Ãô¸ÐÊý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


×Ô³ÆÎªJohn WickµÄºÚ¿ÍÉù³Æ£¬£¬£¬ÆäÒѹ¥»÷ÁËÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5µÄϵͳ£¬£¬£¬ÇÒ͵ȡÁ˸ù«Ë¾150GBµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÌåÏÖ£¬£¬£¬Æä͵ȡµÄÊý¾Ý¿âÖаüÀ¨×î½üµÄÉúÒâ¡¢ÃÜÂë¡¢µç×ÓÓʼþ¡¢ÊÖ»úºÅÂë¡¢µç×ÓÓʼþID¡¢ÐÂÎŵȣ¬£¬£¬²¢Íþв½«¹ûÕæÏúÊÛ¸ÃÊý¾Ý¿âºÍ´úÂë¡£¡£¡£¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬ÏÖÔڸúڿÍÒѾ­Ðû²¼ÁËй¶Êý¾Ý¿âµÄ²¿·ÖÊý¾Ý¡¢»î¶¯Ô´´úÂëÖеÄÃÜÔ¿¡¢¶ÔAtlassian°åµÄÒýÓÃÒÔ¼°AWS´æ´¢Í°Æ¾Ö¤¡£¡£¡£¡£¡£¡£¾Ý´ËºÚ¿Í˵£¬£¬£¬ÆäÊÇÀ´×Ôº«¹úµÄÇ徲ר¼Ò£¬£¬£¬´Ë´Î»î¶¯Ö÷ÒªÊÇΪÁË×ÊÖúÕâЩÈËÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄÊÓ²ìÖУ¬£¬£¬ºÚ¿ÍÊÇ·ñÀ´×Ôº«¹ú»¹ÎÞ·¨È·¶¨¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/zee5-allegedly-hacked-by-korean-hackers-customer-info-at-risk/


3.ºÚ¿Íͨ¹ýVPNÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ºÚ¿ÍʹÓÃVPNÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬ÒÔÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤¡£¡£¡£¡£¡£¡£ÓÉÓÚÒßÇéÔµ¹ÊÔ­ÓÉ£¬£¬£¬´ó²¿·ÖÈËÑ¡Ôñ¾Ó¼Ò°ì¹«£¬£¬£¬Õâ´ó´óÔöÌíÁËVPNµÄʹÓÃÂÊ£¬£¬£¬Òò´Ë¸ü¶àµÄºÚ¿Í»áÊÔͼ½«Æä×÷Ϊ¹¥»÷ǰÑÔ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÖкڿÍð³äÊÕ¼þÈ˹«Ë¾µÄITÖ§³Ö²¿·Ö·¢ËÍ֪ͨÓʼþ£¬£¬£¬ÓʼþÖаüÀ¨Ò»¸öÖ¸ÏòеÄÓÃÓÚ¼ÒÍ¥»á¼ûµÄVPNÉèÖõÄÁ´½Ó¡£¡£¡£¡£¡£¡£·¢¼þÈ˵ĵç×ÓÓʼþµØµã±»Î±×°³ÉÊܺ¦Õß¹«Ë¾µÄÓò£¬£¬£¬´Ó¶øÓÕʹÊܺ¦Õßµã»÷Á´½Ó£¬£¬£¬ÒÔ½«ÆäÖØ¶¨Ïòµ½office365ƾ֤´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://hotforsecurity.bitdefender.com/blog/hackers-use-vpn-impersonation-in-phishing-emails-to-steal-office-365-credentials-23456.html


4.ÐÂÀÕË÷Èí¼þKupidonÖ÷ÒªÕë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


MalwareHunterTeamÓÚ5ÔÂ9ÈÕÊ״η¢Ã÷ÐÂÀÕË÷Èí¼þKupidon£¬£¬£¬Æä²»µ«Õë¶Ô¹«Ë¾ÍøÂ磬£¬£¬»¹Õë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷¸ÃÀÕË÷Èí¼þµÄÑù±¾£¬£¬£¬Ñо¿Ö°Ô±»ùÓÚÓëÊܺ¦ÕßµÄÅÊ̸ºÍÉÏ´«µÄÎļþ¾ÙÐÐÆÊÎö¡£¡£¡£¡£¡£¡£ºÚ¿ÍÒ»µ©½øÈëÍøÂ磬£¬£¬±ã»á¼ÓÃÜÊܺ¦ÕßÎļþ£¬£¬£¬ÔÚÎļþÃûºó¸½¼Ó.kupidonÀ©Õ¹Ãû£¬£¬£¬²¢ÁôÏÂÊê½ðÒªÇ󡣡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬Õë¶ÔÆóÒµËüÒªÇóµÄÊê½ðΪ1200ÃÀÔªµÄ±ÈÌØ±Ò£¬£¬£¬Õë¶Ô¼ÒÍ¥Óû§ÒªÇó300ÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£Ò»µ©Óû§Ö§¸¶Êê½ðºó±ã»áÊÕµ½AES½âÃÜÃÜÔ¿ºÍKupidon½âÃÜÆ÷¡£¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»ÓиÃÀÕË÷²¡¶¾µÄÑù±¾£¬£¬£¬Òò´ËÉÐÎÞ·¨ÖªµÀ¸ÃÈí¼þÊÇ·ñ±£´æÎó²î¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kupidon-is-the-latest-ransomware-targeting-your-data/


5.Ñо¿Ö°Ô±·¢Ã÷FacebookÖжà¸öSSRFÎó²î£¬£¬£¬»ñ3.1ÍòÃÀÔª½±½ð


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±Bipin Jitiya·¢Ã÷Facebook±£´æ¶à¸öSSRFÎó²î£¬£¬£¬Á¬ÏµÊ¹ÓÃÕâЩÎó²î»á¶Ôƽ̨±¬·¢ÑÏÖØµÄÓ°Ï죬£¬£¬²¢Òò´Ë»ñµÃÁËFacebookÌṩµÄ×ܼÆ31500ÃÀÔª½±½ð¡£¡£¡£¡£¡£¡£¸ÃÑо¿Ö°Ô±Ê×ÏÈ·¢Ã÷µÄÊÇshortURLʹÃüÖÐȱÉÙÈÏÖ¤»á»°£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔÔÚ²»¾ÙÐÐÉí·ÝÑéÖ¤µÄÇéÐÎÏ»á¼û´ËЧÀÍ£¬£¬£¬ºÚ¿Í¿ÉÄÜʹÓÃÆäͨ¹ýSSRF¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ëû·¢Ã÷ÁËFacebook¶ÌµØµã(https://fb.me/)ÖеÄSSRFÎó²î£¬£¬£¬¸ÃÎó²îй¶ÁËÈÕÖ¾Îļþ¼ÐµÄÄÚ²¿Â·¾¶¡¢ÆäËûÎļþ·¾¶¡¢Ê¹ÓÃfetchÊý¾ÝµÄÄÚ²¿ÏµÍ³ÅÌÎÊ¡¢ÄÚ²¿IPµØµã¡¢ÄÚ²¿ID¡¢ÉèÖÃÏà¹ØÐÅÏ¢¡¢Ë½ÓÐÎĵµµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£JitiyaÌåÏÖ£¬£¬£¬Á¬ÏµÕâÁ½¸öÎó²î£¬£¬£¬¿ÉÄܵ¼Ö¶ÔÄÚ²¿»ù´¡ÉèÊ©µÄ·¾¶±éÀúºÍSSRF¹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/07/hacker-won-31k-bounty-for-reporting-numerous-facebook-bugs/


6.ÖÇÀûCPLTÊÓ²ìÏÔʾ£¬£¬£¬¸Ã¹úÒ½ÁÆÐÐÒµ±£´æÃô¸ÐÊý¾Ýй¶ÎÊÌâ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÖÇÀû͸Ã÷¶ÈίԱ»á£¨The Chilean Transparency Council £¬£¬£¬CPLT£©¶ÔÆäÎÀÉú²¿·Ö¾ÙÐÐÊӲ죬£¬£¬·¢Ã÷±£´æÐ¹Â¶Ãô¸ÐÊý¾ÝµÄÎÊÌâ¡£¡£¡£¡£¡£¡£´Ë´ÎCPLTÖ÷Òª¶Ô86¸ö×éÖ¯µÄ1.2Íò·Ý²É¹ºµ¥¾ÙÐÐÉ󼯣¬£¬£¬ÒÔÈ·¶¨¸Ã¹ú²î±ðÒ½ÔººÍÎÀÉúЧÀÍ»ú¹¹¶Ô»¼Õß¹ºÖÃÓÃÆ·ºÍЧÀ͵ÄСÎÒ˽¼ÒºÍÃô¸ÐÊý¾ÝµÄ´¦Öóͷ£¡£¡£¡£¡£¡£¡£·¢Ã÷Ò½ÔºµÄ12·Ý²É¹ºµ¥ºÍÎÀÉúЧÀÍ»ú¹¹µÄ6·Ý²É¹ºµ¥Ð¹Â¶ÁË»¼ÕßµÄÃô¸ÐСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬ÕâЩÊý¾ÝÊǽöÔÚËùÓÐÕßÃ÷È·Ô޳ɵÄÇéÐÎÏ²ŻªÈö²¥µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£CPLTÌåÏÖ£¬£¬£¬ÔÚ¹ºÖÃÉÌÆ·ºÍЧÀ͵ÄÀú³ÌÖÐй¶ÕâЩÐÅÏ¢ÇÖÕ¼ÁË»¼ÕßµÄÒþ˽£¬£¬£¬ÆäÒѾ­ÏòÎÀÉú²¿·¢³ö֪ͨ£¬£¬£¬²¢ÎªÆä½â¾öÕâЩÎÊÌâÌṩÁËÊÖÒÕÖ§³Ö¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.consejotransparencia.cl/fiscalizacion-del-cplt-descubre-vulneracion-de-la-privacidad-de-pacientes-en-compras-de-hospitales-y-servicios-de-salud/