¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181119
Ðû²¼Ê±¼ä 2018-11-191¡¢°µÍøÍйÜЧÀÍÉÌDaniel's HostingÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Áè¼Ý6500¸öÍøÕ¾±»É¾
11ÔÂ15ÈÕ°µÍø×î´óµÄÍøÂçÍйÜЧÀÍÉÌDaniel's HostingÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬¹¥»÷Õßɾ³ýÁË6500¶à¸öÍøÕ¾£¬£¬£¬£¬£¬²¢ÇÒÕâÐ©ÍøÕ¾¶¼Ã»Óб¸·Ý¡£¡£¡£¡£¡£¸ÃÍйÜЧÀÍÉ̱³ºóµÄ¿ª·¢Ö°Ô±Daniel Winzen֤ʵ³Æ£¬£¬£¬£¬£¬Ð§ÀÍÆ÷µÄrootÕË»§Ò²±»É¾³ýÁË£¬£¬£¬£¬£¬²¢ÇÒÆ½Ì¨ÉÏÍйܵÄÁè¼Ý6500¸öÍøÕ¾µÄÊý¾Ý¶¼Òѳ¹µ×ɥʧ¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜÊÇʹÓÃÁËphpÖеÄÁãÈÕÎó²î£¬£¬£¬£¬£¬µ«Ò²ÓпÉÄÜÊÇʹÓÃÁËÆäËüµÄÎó²î¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÊÂÈÏÕæ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78165/cyber-crime/daniels-hosting-hacked.html2¡¢¼ÓÃÜÓʼþЧÀÍÉÌProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƹ¥»÷
Ê¢ÐеļÓÃܵç×ÓÓʼþЧÀÍProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßAmFearLiathMorÉù³ÆÈëÇÖÁ˸ù«Ë¾²¢ÇÔÈ¡ÁË¡°´ó×Ú¡±µÄÓû§Êý¾Ý¡£¡£¡£¡£¡£¹¥»÷Õß½«ÆäÊê½ðÒªÇóÐû²¼ÔÚPastebinÉÏ£¬£¬£¬£¬£¬²¢ÍþвҪÏòÈ«ÌìÏÂÐû²¼»òÏúÊÛÕâЩÊý¾Ý£¬£¬£¬£¬£¬µ«²¢Î´Ìṩ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£ProtonMailÔÚÊÓ²ìÖ®ºó·ñ¶¨ÁËÕâÆð¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬Éù³ÆÕâÖ»ÊÇÒ»¸öÊÔͼڲƵÄȦÌס£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78133/hacking/protonmail-hacked-hoax.html3¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚOilRigжñÒâ»î¶¯µÄÆÊÎö±¨¸æ
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïOilRigÔÚÌᳫ¹¥»÷ǰ¶ÔÆä¶ñÒâÈí¼þºÍ¹¤¾ß¾ÙÐвâÊԻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£OilRigµÄ²âÊÔÁ÷³Ìͨ³£°üÀ¨¶ÔÆä½»¸¶Îĵµ¾ÙÐÐÉÙÁ¿Ð޸IJ¢Ìá½»µ½ÔÚÏßɨÃèЧÀÍ£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÎļþµÄ¶ñÒâˮƽºÍÕÒ³öÔõÑù¹æ±ÜÕâЩ¼ì²â¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷OilRigÔÚ¹¥»÷ǰ6Ìì¾Í×îÏÈÁ˲âÊԻ£¬£¬£¬£¬£¬²¢ÔÚ8ÔÂ20ÈÕ¡¢21ÈÕºÍ26ÈÕ»®·Ö¾ÙÐÐÁËÈý´Î²âÊÔ¡£¡£¡£¡£¡£Æä×îÖÕ²âÊÔÎļþµÄ½¨Éèʱ¼äÊÇÔÚ½»¸¶ÎĵµµÄ½¨Éèʱ¼ä£¨20·ÖÖÓÖ®ºóÕâЩÎĵµ¾Íͨ¹ý´¹ÂÚÓʼþ·¢ËͳöÈ¥£©µÄ8¸öСʱ֮ǰ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/4¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïINDRIK SPIDERµÄÆÊÎö±¨¸æ
CrowdStrikeÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïNDRIK SPIDERµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2014Äê6ÔÂÒÔÀ´Ò»Ö±Ê¹ÓöñÒâÈí¼þDridex£¬£¬£¬£¬£¬²¢¿ª·¢ÁËÐí¶àеÄÄ£¿£¿£¿éºÍÌí¼ÓÁËÐµķ´ÆÊÎö¹¦Ð§£¬£¬£¬£¬£¬ÒѾ»ñµÃÁËÊý°ÙÍòÃÀÔªµÄ·¸·¨ÀûÈ󡣡£¡£¡£¡£µ«´Ó2017Äê7ÔÂ×îÏÈ£¬£¬£¬£¬£¬¸Ã×éÖ¯×îÏÈתÏòÐÂÀÕË÷Èí¼þBitPaymer£¬£¬£¬£¬£¬²¢ÒѾͨ¹ýBitPaymer»ñµÃÁËÔ¼150ÍòÃÀÔªµÄÊÕÈë¡£¡£¡£¡£¡£BitPaymerÓëDridexÖ®¼ä±£´æÇ¿ÁÒµÄÏà¹ØÐÔ£¬£¬£¬£¬£¬ËüÃǰüÀ¨Ðí¶àÖØµþµÄ·´ÆÊÎö¹¦Ð§¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/5¡¢Ñо¿Ö°Ô±·¢Ã÷Gmail±£´æbug£¬£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫ´¹ÂÚ¹¥»÷
Ñо¿Ö°Ô±Tim Cotten·¢Ã÷Gmail±£´æÒ»¸öÎó²î£¬£¬£¬£¬£¬¿ÉÄܱ»·¸·¨·Ö×ÓʹÓÃÀ´¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎÊÌâÔ´ÓÚGmail×éÖ¯ÆäÎļþ¼ÐµÄ·½·¨£¬£¬£¬£¬£¬Ëü»áƾ֤ÓʼþÖÐFrom×ֶεĵصãÀ´½«µç×ÓÓʼþ¹éµµµ½¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖС£¡£¡£¡£¡£ÈôÊǹ¥»÷ÕßÏòÄ¿µÄ·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬²¢ÔÚFrom×ֶΰüÀ¨Ä¿µÄµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬Ôò¸ÃÓʼþ½«×Ô¶¯Í¬Ê±·¢ËÍÖÁÄ¿µÄµÄÊÕ¼þÏäºÍÒÑ·¢ËÍÎļþ¼Ð¡£¡£¡£¡£¡£Õâ¹ØÓÚ¹¥»÷ÕßÀ´Ëµ¿ÉÄÜÊÇÒ»¸ö¸£Òô£¬£¬£¬£¬£¬ÓÉÓÚ·¢ËÍÖÁÊÕ¼þÏäÀïµÄÀ¬»øÓʼþ¿ÉÄܻᱻ¹ýÂË£¬£¬£¬£¬£¬µ«·¢ËÍÖÁ¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖеÄÓʼþ½«»á±»±£´æÏÂÀ´¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/gmail-glitch-offers-stealthy-trick-for-phishing-attacks/139167/6¡¢InstagramÐÂÎó²îµ¼Ö²¿·ÖÓû§µÄÃÜÂë̻¶
ƾ֤The InformationµÄ±¨µÀ£¬£¬£¬£¬£¬Instagram4Ô·ÝÐû²¼µÄÓÃÓÚÏÂÔØÐ¡ÎÒ˽¼Ò×ÊÁϵŤ¾ß±£´æbug£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓû§µÄÃÜÂë̻¶¡£¡£¡£¡£¡£µ±Óû§Ê¹Óøù¦Ð§Ê±£¬£¬£¬£¬£¬ËûÃǵÄÃ÷ÎÄÃÜÂë»á·ºÆðÔÚURLÖУ¬£¬£¬£¬£¬Òò´ËÔÚ¹«¹²ÍøÂçÖÐʹÓøù¤¾ß¿ÉÄܻᵼÖÂÃÜÂëÏò¹¥»÷Õß̻¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÒѾÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬²¢ÏòÊÜÓ°ÏìµÄÉÙÉÙÊýÈË·¢ËÍÁËÓʼþ֪ͨ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ç徲ר¼Òͨ¹ýÕâÒ»ÊÂÎñÖÊÒÉInstagram´æ´¢ÁËÓû§µÄÃ÷ÎÄÃÜÂ룬£¬£¬£¬£¬µ«¸Ã¹«Ë¾½²»°ÈË·ñ¶¨ÁËÕâÒ»Ö¸Ô𡣡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78173/data-breach/instagram-glitch-exposed-passwords.htmlÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ