NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼£»£»£»CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨
Ðû²¼Ê±¼ä 2020-08-041.NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼
NordPassÓÚ2019Äê6ÔÂÖÁ2020Äê6Ô£¬£¬£¬£¬£¬£¬ÓëÄäÃû°×ñºÚ¿ÍÏàÖúɨÃèÍøÂçÉϵÄElasticsearchºÍMongoDB¿â£¬£¬£¬£¬£¬£¬·¢Ã÷Á˽üÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶ÁË105ÒÚÌõÀ´×Ô20¸ö¹ú¼ÒºÍµØÇøµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý×î¶àµÄÈý¸ö¹ú¼ÒÖУ¬£¬£¬£¬£¬£¬·¨¹úÒÔ51ÒÚÌõλ¾Ó°ñÊ×£¬£¬£¬£¬£¬£¬ÖйúÒÔ26ÒÚÌõ½ôËæØÊºó£¬£¬£¬£¬£¬£¬ÃÀ¹úÒÔ23ÒÚÌõλ¾ÓµÚÈý¡£¡£¡£¡£¡£¡£ÉèÖùýʧµÄÊý¾Ý¿âÊýÄ¿×î¶àµÄ¹ú¼ÒÖУ¬£¬£¬£¬£¬£¬Öйúλ¾ÓµÚÒ»£¨4000¸ö£©£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÃÀ¹ú£¨3000£©ºÍÓ¡¶È£¨500£©¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬ÕâЩй¶Êý¾Ý¿âͨ³£°üÀ¨µç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬ÃÜÂëºÍµç»°ºÅÂë¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2020/07/30/10-billion-records-exposed-unsecured-databases/
2.ºÚ¿ÍÔÚ°µÍø¹ûÕæ¼Ò×°ÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý
ºÚ¿ÍÔÚ°µÍø¹ûÕæÃÀ¹úÊÒÄÚÉè¼ÆÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý¡£¡£¡£¡£¡£¡£´Ó¸ÃÊý¾Ý¿âµÄÑù±¾Öз¢Ã÷£¬£¬£¬£¬£¬£¬×ß©Êý¾Ý°üÀ¨Óû§µÄµÇ¼Ãû¡¢È«Ãû¡¢MD5¹þÏ£ÃÜÂë¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÓÊÕþ±àÂëÒÔ¼°Óë¸ÃÕ¾µãµÄʹÓÃÓйصÄÖÖÖÖÆäËûÊý¾Ý£¬£¬£¬£¬£¬£¬±ðµÄ£¬£¬£¬£¬£¬£¬Óû§ÐÅÓÿ¨µÄ×îºóËÄλÊý¿ÉÄÜÒÑй¶¡£¡£¡£¡£¡£¡£¾ÝBleepingComputer±¨¸æ³Æ£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯ShinyHuntersÒÑÔÚ°µÍøÉÏÃâ·Ñ¹ûÕæÁË18¼Ò¹«Ë¾µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬×ܼưüÀ¨3.86ÒÚÌõÓû§¼Í¼£¬£¬£¬£¬£¬£¬¶øHavenlyÒ²ÊÇÆäÖÐÖ®Ò»¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/
3.LedgerÊý¾Ý¿âÖб£´æÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶
LedgerÈ·ÈÏÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿âµÄ±£´æÑÏÖØµÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶¡£¡£¡£¡£¡£¡£7ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬ÆäÑо¿Ö°Ô±·¢Ã÷LedgerÍøÕ¾ÉÏ¿ÉÄܱ£´æÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬£¬²¢ÔÚ¾ÙÐÐÁËÄÚ²¿ÊÓ²ìºóÁ¬Ã¦ÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£ÐÞ¸´Îó²îºóÒ»ÖÜ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾·¢Ã÷Îó²îÔÚ6ÔÂ25ÈÕÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁËÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿â¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄܵ¼ÖÂÊý°ÙÍòÈ˵ç×ÓÓʼþµØµãµÈÐÅϢй¶£¬£¬£¬£¬£¬£¬ÒÔ¼°½üÍòÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ð¹Â¶£¬£¬£¬£¬£¬£¬°üÀ¨Ãû×ÖºÍÐÕÊÏ¡¢ÓÊÕþµØµã¡¢µç»°ºÅÂëºÍ¶©¹ºµÄ²úÆ·µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/crypto-firm-ledgers-breach-one/
4.CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨
ÃÀ¹úÕþ¸®µÄÈý¸ö»ú¹¹CISA¡¢DODºÍFBIÁªºÏÐû²¼Á˹ØÓÚÐÂÐͶñÒâÈí¼þTaidooµÄ¾¯±¨¡£¡£¡£¡£¡£¡£¾ÝÕâÈý¸ö»ú¹¹³Æ£¬£¬£¬£¬£¬£¬´Ë¶ñÒâÈí¼þ¾ßÓÐ32λºÍ64λϵͳ°æ±¾£¬£¬£¬£¬£¬£¬Í¨³£×÷ΪЧÀͶ¯Ì¬Á´½Ó¿â£¨DLL£©×°ÖÃÔÚÊܺ¦ÕßµÄϵͳÉÏ¡£¡£¡£¡£¡£¡£¸ÃDLL°üÀ¨ÆäËûÁ½¸öÎļþ£¬£¬£¬£¬£¬£¬ÆäÒ»ÊÇ×÷ΪЧÀÍÆô¶¯µÄ¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬£¬»á½âÃܲ¢ÔÚÄÚ´æÖÐÖ´Ðеڶþ¸öÖ÷ÒªµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©Îļþ¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ³£»£»£»á½«TaidoorÓëÊðÀíЧÀÍÆ÷Ò»Æð°²ÅÅ£¬£¬£¬£¬£¬£¬ÒÔÒþ²Ø¶ñÆäÕæÊµÈªÔ´¡£¡£¡£¡£¡£¡£DODÌåÏÖ£¬£¬£¬£¬£¬£¬×Ô2008ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬Taidoor»òÒÑÔÚÒ°ÍⱻʹÓÃÖÁÉÙ12Äê¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisa-dod-fbi-expose-new-chinese-malware-strain-named-taidoor/#ftag=RSSbaffb68
5.ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§
Zscaler ThreatLabZÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§¡£¡£¡£¡£¡£¡£ÆäÕë¶Ô·ÇÖÞÁ½¸ö×îÖøÃû×ãÇò¾ãÀÖ²¿²¢Î±×°³É¾ãÀÖ²¿µÄ¹Ù·½Ó¦ÓÃSimba SCºÍYanga£¨Young Africans£©SC¡£¡£¡£¡£¡£¡£¾ßÓÐÔĶÁ¶ÌÐÅ¡¢»ñÈ¡ÁªÏµÈË¡¢Â¼ÖÆÒôƵ¡¢Í¨»°¹¦Ð§¡¢»á¼ûʵʱλÖᢶÁ/дÍⲿ´æ´¢¡¢ÍµÕÕÆ¬ºÍ´æÈ¡Ïà»úµÄ¹¦Ð§¡£¡£¡£¡£¡£¡£¾ÓɽøÒ»²½ÆÊÎö£¬£¬£¬£¬£¬£¬·¢Ã÷ÕâЩAPKÊÇʹÓÃÊ¢ÐеÄÌØ¹¤Èí¼þ¹¤¾ßSpyMax¿ª·¢µÄ£¬£¬£¬£¬£¬£¬SpyMaxµÄǰÉíSpyNoteÊÇʹÓÃ×îÆÕ±éµÄÌØ¹¤Èí¼þ¿ò¼ÜÖ®Ò»¡£¡£¡£¡£¡£¡£ÓÉÓÚ¸ÃÌØ¹¤Èí¼þÔÚÆÊÎöʱ´úδ´¦Óڻ״̬£¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±²¢Î´×·Ëݵ½ÆäÏÂÁîºÍ¿ØÖÆ£¨C£¦C£©Ð§ÀÍÆ÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zscaler.com/blogs/research/android-spyware-targeting-tanzania-premier-league
6.ABIÔ¤¼Æµ½2026ÄêIoTÊý¾ÝÖÎÀíЧÀͽ«´ï429ÒÚÃÀÔª
ABI ResearchÌåÏÖÎïÁªÍøÊý¾ÝÖÎÀíЧÀÍÊÇÒ»¸ö¿ìËÙÔöÌíµÄÊг¡£¬£¬£¬£¬£¬£¬²¢Ô¤¼Æµ½2026Ä꽫¸ß´ï429ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Á÷´¦Öóͷ£ºÍÆÊÎö½â¾ö¼Æ»®µÄ·ºÆðΪÊý¾Ý¾öæÅºÍÆóÒµ¶´²ìÌṩÁ˶¯Á¦£¬£¬£¬£¬£¬£¬ÏÖÔÚÓÐÁ½´óÕûÌå¶ÔÆä¾ÙÐÐÖ÷µ¼£¬£¬£¬£¬£¬£¬»®·ÖÎªÔÆÓÅÏȺͱßÑØÓÅÏÈ¡£¡£¡£¡£¡£¡£Azure¡¢AWS¡¢IBM΢Èí¡¢Cloudera¡¢Informatica¡¢Software AG ApamaºÍTIBCO¶¼Î§ÈÆÒÔÔÆÎªÖÐÐĵķ½·¨ÌṩÊý¾ÝÖÎÀíЧÀÍ£¬£¬£¬£¬£¬£¬ÕâÊÇËûÃǶÔÒѾ±£´æµÄÈ«¿ÍÕ»¶Ëµ½¶ËÎïÁªÍø²úÆ·ºÍÄÜÁ¦µÄÔö²¹¡£¡£¡£¡£¡£¡£ScaleOut¡¢ Crosser¡¢ SWIM.aiºÍClearBladeʹÓÃÁËÒ»ÖÖÒÔ±ßÑØÎªÖÐÐĵÄÒªÁ죬£¬£¬£¬£¬£¬²¢ÓëÔÆ¹©Ó¦ÉÌÏàÖú£¬£¬£¬£¬£¬£¬ÌṩÐÐҵרÓõÄÊý¾ÝÖÎÀíÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/08/03/iot-data-management-services-42-9-billion-by-2026/