ºÚ¿ÍÔÚ°µÍø¹ûÕæÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼£»£»£»Ð¶ñÒâÈí¼þEnsiko¿É¼ÓÃÜÄ¿µÄÎļþ£¬ £¬£¬£¬£¬£¬£¬Õë¶ÔÖ÷Á÷²Ù×÷ϵͳ

Ðû²¼Ê±¼ä 2020-07-29

1.ºÚ¿ÍÔÚ°µÍø¹ûÕæÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÍøÂçÇå¾²Ç鱨¹«Ë¾CloudSEK·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍø¹ûÕæÁËÒÔÉ«ÁеÄÓªÏúÊÓÆµ½¨ÉèÍøÕ¾Promo.com°üÀ¨2200ÍòÓû§¼Í¼µÄÊý¾Ý¿â£¬ £¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨Óû§µÄµç×ÓÓʼþµØµã¡¢Ãû³Æ¡¢ÐԱ𡢵ØÀíλÖÃÒÔ¼°²¿·ÖÓû§µÄ¹þÏ£ÃÜÂë¡£¡£ ¡£¡£¡£¡£²¢ÇÒ£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÒÑÀÖ³ÉÆÆ½âÁË140ÍòÓû§ÃÜÂ룬 £¬£¬£¬£¬£¬£¬ÕâÒâζ׏¥»÷Õß¿ÉÒÔÁ¬Ã¦µÇ¼ÕâЩÓû§µÄÕÊ»§£¬ £¬£¬£¬£¬£¬£¬»òÕßÔÚÆäËûÕ¾µãÌᳫƾ֤Ìî³ä¹¥»÷¡£¡£ ¡£¡£¡£¡£PromoÐû²¼ÁËÊý¾Ýй¶֪ͨ£¬ £¬£¬£¬£¬£¬£¬²¢Ö¸³ö´Ë´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäµÚÈý·½ÏàÖú¹«Ë¾±£´æÇå¾²Îó²î¡£¡£ ¡£¡£¡£¡£PromoÕö¿ªÁËÄÚ²¿ÊӲ죬 £¬£¬£¬£¬£¬£¬²¢ÌåÏÖ´Ë´ÎÊÂÎñ²¢ÎÞ²ÆÎñÐÅϢй¶¡£¡£ ¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/


2.Cloudflare IPµØµã¿â½ü300Íò¸öÕæÊµIPµØµãÔÚ°µÍø¹ûÕæ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÇ徲Эµ÷ÖÐÐÄÉù³ÆCloudflare±¬·¢ÁËÊý¾Ý×ß©£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÆäIPµØµã¿â½ü300Íò¸öÕæÊµIPµØµãÔÚ°µÍø¹ûÕæ¡£¡£ ¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬¸Ã»ú¹¹Ðû²¼µÄ¼Í¼ÖаüÀ¨45Ìõ¾ßÓÐ gov.ua¶¥¼¶ÓòÃû£¨TLD£©µÄ¼Í¼£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°6500¸ö¾ßÓÐ .ua TLDµÄ¼Í¼£¬ £¬£¬£¬£¬£¬£¬ÕâÅú×¢°üÀ¨Òªº¦»ù´¡ÉèÊ©ÔÚÄÚµÄÐí¶àÎÚ¿ËÀ¼Õ¾µã±»ÒѾ­Ð¹Â¶¡£¡£ ¡£¡£¡£¡£CloudflareÉùÃ÷£¬ £¬£¬£¬£¬£¬£¬´Ë´Î×ß©¿ÉÄÜÊÇͨ¹ý¹«ÍøÉϵÄDNSÅÌÎÊ»ñµÃµÄÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬²¢·Ç×ß©»òÆÆËðµÄЧ¹û¡£¡£ ¡£¡£¡£¡£¾ÍÔÚ¼¸ÖÜǰ£¬ £¬£¬£¬£¬£¬£¬CloudflareЧÀÍÖÐÖ¹µ¼ÖÂһЩ¶¥¼¶ÍøÕ¾ÔÚÈ«Çò¹æÄ£ÄÚÀëÏß¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/cloudflare-data-leak-expose-ip-addresses-ukraine/


3.»¯×±Æ·¹«Ë¾AvonÔÆÐ§ÀÍÆ÷ÉèÖùýʧ£¬ £¬£¬£¬£¬£¬£¬Ð¹Â¶1900ÍòÌõÓû§¼Í¼


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SafetyDetectives·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬È«Çò»¯×±Æ·¹«Ë¾AvonÒòÔÆÐ§ÀÍÆ÷ÉèÖùýʧй¶ÁË1900ÍòÌõ¼Í¼£¬ £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍÊÖÒÕÈÕÖ¾¡£¡£ ¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨¿Í»§ºÍÔ±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬ £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨È«Ãû¡¢µç»°ºÅÂë¡¢ÉúÈÕ¡¢µç×ÓÓʼþºÍ¼ÒͥסַÒÔ¼°GPS×ø±ê£¬ £¬£¬£¬£¬£¬£¬±ðµÄÉÐÓÐ40000¶à¸öÇå¾²ÁîÅÆ¡¢OAuthÁîÅÆ¡¢ÄÚ²¿ÈÕÖ¾¡¢ÕÊ»§ÉèÖúÍÊÖÒÕЧÀÍÆ÷ÐÅÏ¢¡£¡£ ¡£¡£¡£¡£SafetyDetectivesÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬PII¿ÉÒÔ±»ÓÃÀ´¾ÙÐÐÉí·ÝڲƭºÍºóÐøµÄÍøÂç´¹ÂÚÕ©Æ­£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±£¬ £¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÊÖÒÕϸ½ÚÒ²¸øAvon´øÀ´ÁËΣº¦£¬ £¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓÃÕâЩÐÅÏ¢»ñµÃЧÀÍÆ÷µÄÍêÈ«¿ØÖÆÈ¨²¢Ìá³«ÆÆËðÐԵĹ¥»÷¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cosmetics-giant-avon-leaks-19/


4.ºÚ¿ÍʹÓÃαÔìµÄSharePoint֪ͨÇÔÈ¡Óû§Office 365ƾ֤


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚÐÂÒ»ÂÖµÄÍøÂç´¹ÂڻÖУ¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃαÔìµÄSharePoint֪ͨÇÔÈ¡Óû§Office 365ƾ֤¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤µç×ÓÓʼþÇå¾²¹«Ë¾Abnormal SecurityµÄͳ¼Æ£¬ £¬£¬£¬£¬£¬£¬µ½ÏÖÔÚΪֹ£¬ £¬£¬£¬£¬£¬£¬¸ÃÀàµç×ÓÓʼþÒÑ·¢Ë͵½50000¶à¸öÓÊÏä¡£¡£ ¡£¡£¡£¡£ÔÚµç×ÓÓʼþÕýÎÄÖУ¬ £¬£¬£¬£¬£¬£¬ºÚ¿Í¶à´ÎʹÓÃÊÕ¼þÈ˵Ĺ«Ë¾Ãû³Æ£¬ £¬£¬£¬£¬£¬£¬Ê¹µÃÓʼþ¿´ÆðÀ´¸üÏñÊÇÄÚ²¿Îĵµ¡£¡£ ¡£¡£¡£¡£Ö®ºó£¬ £¬£¬£¬£¬£¬£¬Êܺ¦ÕßÐèÒªµã»÷Á´½ÓÒÔÏÂÔØÓʼþÖÐÌáµ½µÄÖ÷ÒªÎĵµ£¬ £¬£¬£¬£¬£¬£¬¸ÃÁ´½Ó½«ÆäÖØ¶¨Ïòµ½´¹ÂÚÍøÕ¾²¢ÒªÇóËûÃÇÌá½»µÇ¼ƾ֤¡£¡£ ¡£¡£¡£¡£Office 365Óû§ÔÚ½ñÄêÔâÊÜÖÚ¶à´¹ÂÚ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Î±ÔìµÄZoom¾¯±¨¡¢VPNÉèÖá¢Microsoft TeamsºÍSGF¾ÈÔ®½ð¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-employees-with-fake-sharepoint-alerts/


5.жñÒâÈí¼þEnsiko¿É¼ÓÃÜÄ¿µÄÎļþ£¬ £¬£¬£¬£¬£¬£¬Õë¶ÔÖ÷Á÷²Ù×÷ϵͳ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÍþвÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐµĹ¦Ð§¸»ºñµÄ¶ñÒâÈí¼þEnsiko£¬ £¬£¬£¬£¬£¬£¬¿É¼ÓÃÜÄ¿µÄÎļþ£¬ £¬£¬£¬£¬£¬£¬Õë¶ÔWindows£¬ £¬£¬£¬£¬£¬£¬macOSºÍLinux WebЧÀÍÆ÷µÈÖ÷Á÷²Ù×÷ϵͳ¡£¡£ ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÓÃPHP±àдµÄWeb Shell£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´Ô¶³Ì¿ØÖÆÊÜѬȾµÄϵͳ¡£¡£ ¡£¡£¡£¡£Ensiko¾ßÓÐÎļþ¼ÓÃÜ×é¼þ£¬ £¬£¬£¬£¬£¬£¬Ëü¿ÉÓÃÓÚÕë¶ÔЧÀÍÆ÷µÄÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±·¢Ã÷ËüʹÓÃÁËCBCģʽµÄ¶Ô³ÆRijnadel-128¼ÓÃÜÎļþ¡£¡£ ¡£¡£¡£¡£Ensiko»¹¿ÉÒÔͨ¹ýÃÜÂë±£»£»£»¤À´È·±£Çå¾²»á¼û£¬ £¬£¬£¬£¬£¬£¬²¢×èÖ¹ÏñEmotetÄÇÑù±»½ÓÊÜ¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/feature-rich-ensiko-malware-can-encrypt-targets-windows-macos-linux/


6.Dussmann×Ó¹«Ë¾ÔâNefilimÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬200GBÊý¾Ý±»µÁ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


µÂ¹úDussmann Group×Ó¹«Ë¾DresdnerK¨¹hlanlagenbauGmbH£¨DKA£©Ôâµ½ÁËNefilimÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂδ¼ÓÃܵÄÎļþй¶¡£¡£ ¡£¡£¡£¡£NefilimÍÅ»ïÔÚÆäÊý¾Ý×ß©վµãÐû²¼ÁËÁ½¸öÎļþ¼Ð£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÁË14 GBµÄ±»µÁÎļþ£¬ £¬£¬£¬£¬£¬£¬Æ¾Ö¤¸ÃÎļþÁбí£¬ £¬£¬£¬£¬£¬£¬ÕâЩÎļþ¼Ð°üÀ¨WordÎĵµ¡¢Í¼Ïñ¡¢»á¼ÆÎĵµºÍAutoCADͼÐΡ£¡£ ¡£¡£¡£¡£¸ÃºÚ¿Í×éÖ¯ÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬ËûÃǼÓÃÜÁËËĸöÓò²¢ÍµÈ¡ÁËԼĪ200GBµÄÊý¾Ý¡£¡£ ¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬Éв»ÇåÎúNefilimÍÅ»ïÊÇÔõÑù»ñµÃDKAÍøÂç»á¼ûȨÏ޵ģ¬ £¬£¬£¬£¬£¬£¬ÍøÂçÇ鱨¹«Ë¾Bad PacketsÒ²²¢Î´·¢Ã÷DKAÍøÂçÉϵı£´æÒ×Êܹ¥»÷µÄVPNÍø¹Ø»ò×°±¸¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/business-giant-dussmann-groups-data-leaked-after-ransomware-attack/