HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£»£»£»£»£»£»£»ÐµÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ
Ðû²¼Ê±¼ä 2020-11-021.HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ
HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£¬£¬£¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄÎó²îÀàÐÍ£¬£¬£¬±È2019ÄêÔöÌíÁË134%¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬XSSÎó²îÕ¼Á˱¨¸æµÄËùÓÐÎó²îµÄ18%£¬£¬£¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔöÌíÁË26%)¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬²»µ±»á¼û¿ØÖÆÎó²îËù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔöÌí134£¥£¬£¬£¬¸ßµÖ´ï400ÍòÃÀÔª£¬£¬£¬Æä´ÎÊÇÐÅÏ¢Åû¶Îó²î£¬£¬£¬Í¬±ÈÔöÌí63£¥¡£¡£¡£¡£¡£¡£¡£ÕâÁ½ÖÖ·½·¨¶¼»áй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬£¬£¬ÀýÈçСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
hackerone.com/hacker-powered-security-report
2.Ñо¿Ö°Ô±³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷
Ñо¿Ö°Ô±Jan Kopriva³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷¡£¡£¡£¡£¡£¡£¡£SMBGhostÎó²î£¨CVE-2020-0796£©ÎªMicrosoftЧÀÍÆ÷ÐÂÎſ飨SMB£©ÐÒéÖеÄÒ»¸öÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬Ê¹ÓøÃÎó²î¿É¾ÙÐÐÈ䳿¹¥»÷£¬£¬£¬ÒÔÈö²¥µ½ÆäËûÅÌËã»úÉÏ£¬£¬£¬MicrosoftÒÑÔÚÈýÔ·ÝÐÞ¸´¸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Jan Kopriva·¢Ã÷ÈÔÓÐÁè¼Ý103000̨ÅÌËã»úÒ×ÊÜ´ËÀ๥»÷£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓŲ́Í壨22£¥£©£¬£¬£¬Æä´ÎÊÇÈÕ±¾£¨20£¥£©ºÍ¶íÂÞ˹£¨11£¥£©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110247/hacking/smbghost-vulnerable-machines-dangers.html
3.еÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ
Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±Åû¶ÁËеÄË®¿Ó¹¥»÷»î¶¯Earth Kitsune£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úÇÈÃñ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¹¥»÷±¬·¢ÔÚ3Ô¡¢5ÔºÍ9Ô£¬£¬£¬ºÚ¿ÍʹÓÃÁ˶ñÒâÈí¼þSLUB(¼´SLackºÍgithUB)ºÍÁ½¸öкóÃÅ£¬£¬£¬dneSpyºÍagfSpy£¬£¬£¬Ö¼ÔÚ½ÓÊÜÊÜѬȾµÄϵͳ²¢´ÓÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£ÓëÆäËû¹¥»÷²î±ðµÄÊÇ£¬£¬£¬ËüÔÚÊܺ¦»úеÉϰ²ÅÅÁË´ó×ÚµÄÑù±¾£¬£¬£¬Ê¹ÓÃÁ˶à¸öÏÂÁîºÍ¿ØÖÆ(C&C)ЧÀÍÆ÷£¬£¬£¬»¹Ê¹ÓÃÁË4¸öN-dayÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110192/apt/operation-earth-kitsune.html
4.FireEye·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥
FireEyeÑо¿Ö°Ô±Alex Lanstein·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÒÔ2020ÍòÊ¥½ÚΪÖ÷Ì⣬£¬£¬»Ñ³ÆÔ¼ÇëÊܺ¦Õß¼ÓÈëÍòÊ¥½ÚÅɶԣ¬£¬£¬²¢ÌåÏÖËùÓÐÏêϸÐÅÏ¢¶¼ÔÚ¸½¼þÖУ¬£¬£¬ÒÔÓÕʹÓû§·¿ª¶ñÒ⸽¼þ¡£¡£¡£¡£¡£¡£¡£Ò»µ©Óû§·¿ª¸½¼þ£¬£¬£¬¾Í»á±»ÒªÇóµã»÷ÆôÓÃ±à¼ºÍÆôÓÃÄÚÈݰ´Å¥£¬£¬£¬Ö¼ÔÚ×°ÖÃEmotet Trojan¡£¡£¡£¡£¡£¡£¡£ÀÖ³É×°ÖöñÒâÈí¼þºó£¬£¬£¬Emotet½«Ê¹ÓøÃÅÌËã»ú·¢ËÍÀ¬»øÓʼþ£¬£¬£¬²¢ÌᳫÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/emotet-malware-wants-to-invite-you-to-a-halloween-party/
5.ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvilµ¼Ö²¿·ÖÊý¾Ýй¶
ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvil£¬£¬£¬²¢µ¼Ö²¿·ÖÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£Gaming Partners International£¨GPI£©ÊÇÒ»¼ÒΪȫÇò¶Ä³¡Ìṩ²©²Ê¼Ò¾ßºÍ×°±¸µÄÈ«·½Î»Ð§À͹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£¡£REvilÍÅ»ïÉù³ÆÆäÒѼÓÃܸù«Ë¾ÏµÍ³£¬£¬£¬²¢ÇÔÈ¡ÁË540GbµÄÊÖÒպͽðÈÚÎļþ¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ö÷ÒªÐÅÏ¢¡¢ÊÖÒÕÊý¾Ý¡¢²ÆÎñÎļþ¡¢ÓëÀ˹ά¼Ó˹¡¢°ÄÃÅ¡¢Å·ÖÞËùÓжij¡µÄÌõÔ¼¡¢ÒøÐÐÎļþµÈ¡£¡£¡£¡£¡£¡£¡£¸ÃÍŻﻹ½«Ð¹Â¶Êý¾ÝµÄ½ØÍ¼¹ûÕæÔÚÆäÊý¾Ýй¶վµã£¬£¬£¬²¢ÌåÏÖ¹«Ë¾72СʱÄÚ²»Ö§¸¶Êê½ð£¬£¬£¬ËûÃǽ«¹ûÕæËùÓб»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110237/cyber-crime/gaming-partners-international-revil-ransomware.html
6.ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼
10ÔÂ28ÈÕ£¬£¬£¬ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ð¹Â¶Êý¾ÝÏÔʾ£¬£¬£¬ËùÓб»³öÊÛµÄÊý¾Ý¿â¶¼ÊÇÔÚ2020Äê±»µÁµÄ£¬£¬£¬ÆäÖÐй¶×î¶àµÄÊÇGeekie.com.br£¬£¬£¬ÓÐ810ÍòÌõ£¬£¬£¬¶øÊÜÓ°Ïì×î´óµÄÊÇÐÂ¼ÓÆÂµÄRedMart¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÜÓ°ÏìµÄ17¼Ò¹«Ë¾»®·ÖΪGeekie.com.br£¨810Íò£©¡¢Clip.mx£¨470Íò£©¡¢Wongnai.com£¨430Íò£©¡¢Cermati.com£¨290Íò£©¡¢Everything5pounds.com£¨290Íò£©¡¢Eatigo.com£¨280Íò£©¡¢Katapult.com£¨220Íò£©¡¢Wedmegood.com£¨130Íò£©¡¢RedMart£¨110Íò£©¡¢Coupontools.com£¨100Íò£©¡¢W3layouts.com£¨78.9Íò£©¡¢Game24h.vn£¨77.9Íò£©¡¢Invideo.io£¨57.1Íò£©ºÍApps-builder.com£¨38.6£©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hacker-is-selling-34-million-user-records-stolen-from-17-companies/