ºÚ¿Í×é֯͵ȡ11¼Ò¹«Ë¾7320ÍòÌõÊý¾Ý²¢ÔÚ°µÍø³öÊÛ£»£»£»£»£»£»ÍÐ¹ÜÆ½Ì¨DigitalOceanй¶Ãô¸ÐÐÅÏ¢
Ðû²¼Ê±¼ä 2020-05-111.ºÚ¿Í×é֯͵ȡ11¼Ò¹«Ë¾7320ÍòÌõÊý¾Ý£¬£¬£¬£¬£¬ÔÚ°µÍø³öÊÛ
ÔÚÒÑÍùµÄÒ»ÖÜÖУ¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯Shiny Hunters×ܹ²ÇÔÈ¡ÁË11¼Ò¹«Ë¾Êý¾Ý¿âÖеÄ7320ÍòÓû§¼Í¼£¬£¬£¬£¬£¬²¢ÔÚ°µÍøÉϳöÊÛ¡£¡£´Ë´ÎÊܺ¦µÄ11¼Ò¹«Ë¾»®·ÖΪTokopedia¡¢Homechef¡¢Bhinneka¡¢Minted¡¢Styleshare¡¢Ggumim¡¢Mindful¡¢StarTribune¡¢ChatBooks¡¢The Chronicle Of Higher EducationºÍZoosk£¬£¬£¬£¬£¬±»µÁÊý¾Ý¼ÛÇ®ÓÉ500ÃÀÔªµ½5000ÃÀÔª²»µÈ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬BleepingComputerÒÑÓëÕâЩÊÜÓ°ÏìµÄ¹«Ë¾ÁªÏµ£¬£¬£¬£¬£¬µ«ÉÐδ»ñµÃ»Ø¸´¡£¡£BleepingComputerÌáÐÑÉÏÊö¹«Ë¾µÄÓû§¾¡¿ì¸ü¸ÄÃÜÂ룬£¬£¬£¬£¬ÈôÊÇÔÚÆäËûÕ¾µãÉÏʹÓÃÏàͬµÄÃÜÂëÒ²ÐèÒª¸ü¸Ä¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hacker-group-floods-dark-web-with-data-stolen-from-11-companies/
2.ÍÐ¹ÜÆ½Ì¨DigitalOcean±£´æÇå¾²ÎÊÌ⣬£¬£¬£¬£¬Ãô¸ÐÐÅϢй¶
¿ËÈÕ£¬£¬£¬£¬£¬ÍøÂçÍÐ¹ÜÆ½Ì¨DigitalOceanÓÉÓÚ±£´æÇå¾²ÎÊÌ⣬£¬£¬£¬£¬ÆäÄÚ²¿Îļþ±©Â©ÔÚ¹«ÍøÉÏ£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾Ä³Ð©¿Í»§µÄСÎÒ˽¼ÒÏêϸÐÅϢй¶¡£¡£´Ë´Îй¶Êý¾Ý°üÀ¨¿Í»§µÄÕÊ»§Ãû³Æ¡¢µç×ÓÓʼþµØµã¡¢´ø¿íʹÓÃÇéÐΡ¢Droplet¼ÆÊý£¬£¬£¬£¬£¬2018ÄêÖ§³öÒÔ¼°ÊÛºóºÍÏúÊۼͼ£¬£¬£¬£¬£¬¶ø¸ÃÄÚ²¿ÎĵµÒѱ»»á¼ûÖÁÉÙ15´Î¡£¡£DigitalOceanÌåÏÖ£¬£¬£¬£¬£¬¸ÃÎĵµ½ö°üÀ¨²»µ½1£¥µÄ¿Í»§µÄÊý¾Ý£¬£¬£¬£¬£¬²¢ÇҸù«Ë¾ÕýÔÚ½ÓÄɲ½·¥ÒÔ±ÜÃâδÀ´±¬·¢ÀàËÆÊÂÎñ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/digitalocean-data-breach-leaves-internal-doc-online/
3.»ð³µÖÆÔìÉÌStadlerÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶
¹ú¼Ê»ð³µÖÆÔìÉÌStadlerÔÚÉÏÖÜËÄÍíÉÏÐû²¼£¬£¬£¬£¬£¬ÆäÔâµ½ÁËË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬»ò½«µ¼Ö¹«Ë¾ºÍÔ±¹¤µÄÊý¾Ýй¶¡£¡£·¢Ã÷¹¥»÷ºóStadler¹«Ë¾Á¬Ã¦½ÓÄÉÁ˲½·¥£¬£¬£¬£¬£¬ÎªÐ¹Â¶Êý¾Ý±¸·Ý²¢Æð¾¢»Ö¸´ÊÜÓ°ÏìµÄϵͳ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÊÂÎñµÄͨ¸æ²¢Î´Í¸Â¶ÊÜÓ°ÏìµÄ¹æÄ£ºÍϵͳµÄÊýÄ¿£¬£¬£¬£¬£¬µ«ÈðʿýÌåÌåÏÖ£¬£¬£¬£¬£¬Ôڴ˴ι¥»÷ÖÐÕû¸öStadler¼¯ÍŶ¼Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬°üÀ¨ÈðÊ¿ºÍÍâÑóµÄ¹«Ë¾¡£¡£BleepingComputerÒÑÓëStadler½²»°ÈËÁªÏµ£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐδ»ñµÃ»Ø¸´¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/rail-vehicle-manufacturer-stadler-hit-by-cyberattack-blackmailed/
4.LazarusÍÅ»ïʹÓÃ2FA App·Ö·¢Dacls RAT£¬£¬£¬£¬£¬Ñ¬È¾Mac×°±¸
MalwarebytesÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬Ó볯ÏÊÓÐÁªÏµµÄºÚ¿Í×éÖ¯Lazarus£¬£¬£¬£¬£¬Í¨¹ý»ùÓÚMacϵͳµÄ2FAÓ¦ÓóÌÐòmacaOTA·Ö·¢Dacls RATбäÖÖ£¬£¬£¬£¬£¬¸ÃÓ¦ÓóÌÐòÖ÷ÒªÓÉÖйúÓû§Ê¹Óᣡ£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷ÕßÓÚ4ÔÂ8ÈÕÔÚÏã¸Û½«¿ÉÒÉMacÓ¦ÓóÌÐòµÄTinkaOTPÉÏ´«ÖÁVirusTotalµÄ£¬£¬£¬£¬£¬²¢ÇұܿªÁËËùÓÐÒýÇæµÄ¼ì²â¡£¡£¸ÃбäÌå¿ÉÒÔʵÏÖÖÖÖÖ¹¦Ð§£¬£¬£¬£¬£¬ÀýÈçÏÂÁîÖ´ÐС¢ÎļþÖÎÀí¡¢Á÷Á¿ÊðÀíºÍÈ䳿ɍÃ裬£¬£¬£¬£¬×ܹ²°üÀ¨ÓÐ7¸ö²å¼þ£¬£¬£¬£¬£¬²¢ÇÒʹÓÃWolfSSL¿â¾ÙÐÐSSLͨѶ¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/102981/apt/lazarus-apt-mac-dacls-rat.html?utm_source=rss&utm_medium=rss&utm_campaign=lazarus-apt-mac-dacls-rat
5.ÒÁÀʺڿÍÕë¶ÔÒ©ÉÌGilead£¬£¬£¬£¬£¬ÒÔÍøÂçÓйØCOVID-19µÄÐÅÏ¢
¾Ý·͸É籨µÀ£¬£¬£¬£¬£¬×î½ü¼¸ÖÜ£¬£¬£¬£¬£¬ÓëÒÁÀÊÓйصĺڿͽ«ÃÀ¹úÖÆÒ©ÉÌGilead×÷Ϊ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬Ö¼ÔÚÍøÂçÓйØCOVID-19µÄÐÅÏ¢¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬ºÚ¿ÍÓÚ4Ô·ݣ¬£¬£¬£¬£¬Ã°³äÐÂÎÅÊÂÇéÕßÏò¸Ã¹«Ë¾ÈÏÕæÖ´·¨ºÍ¹«Ë¾ÊÂÎñµÄ¸ß¹Ü·¢ËÍÁËÒ»·â´¹ÂÚÓʼþ£¬£¬£¬£¬£¬Ö¼ÔÚÆÆËðÆäµç×ÓÓʼþÕÊ»§¡£¡£ÒÁÀÊפÁªºÏ¹ú´ú±íÍÅ·ñ¶¨ÆäÓëÏ®»÷ÓÐÈκÎÇ£Á¬£¬£¬£¬£¬£¬²¢ÌåÏÖÒÁÀÊÕþ¸®²»¼ÓÈëÍøÂçÕ½¡£¡£¶øGilead¾Ü¾ø¶Ô´ËÊÂÖÃÆÀ£¬£¬£¬£¬£¬ÓÉÓÚ¹«Ë¾²»ÌÖÂÛÍøÂçÇå¾²ÎÊÌâµÄÕþ²ß¡£¡£¾Ý·͸ÉçÊӲ죬£¬£¬£¬£¬½üÆÚÓëÒÁÀÊÓйصĺڿÍÒ²ÊÔͼ¹¥»÷ÌìÏÂÎÀÉú×éÖ¯£¬£¬£¬£¬£¬¶øÓëÔ½ÄÏÓйصĺڿÍÔòÕýÔÚÕë¶ÔÖйú¡£¡£
ÔÎÄÁ´½Ó£º
https://www.reuters.com/article/us-healthcare-coronavirus-gilead-iran-ex/exclusive-iran-linked-hackers-recently-targeted-coronavirus-drugmaker-gilead-sources-idUSKBN22K2EV
6.Atlas VPN·¢Ã÷£¬£¬£¬£¬£¬4Ô·ÝÈ«Çò¶ñÒâÈí¼þѬȾÁ¿ÔöÖÁ4.04ÒÚ
Atlas VPN¹«Ë¾Í³¼Æ·¢Ã÷£¬£¬£¬£¬£¬4Ô·ÝÈ«ÇòÔ¼ÓÐ4.04ÒÚ×°±¸Ñ¬È¾¶ñÒâÈí¼þ£¬£¬£¬£¬£¬¶ñÒâÈí¼þƽ¾ùÌìÌìѬȾÁè¼Ý1000Íò×°±¸£¬£¬£¬£¬£¬ÆäÖÐ64£¥µÄ¹¥»÷Õë¶Ô½ÌÓý»ú¹¹¡£¡£Ñ¬È¾Á¿ÔÚ4ÔÂ16ÈÕµÖ´ïá¯Á룬£¬£¬£¬£¬Îª1600ÍòÀý¡£¡£Æ¾Ö¤KasperskyµÄÍøÂçÍþвͼ£¬£¬£¬£¬£¬ÖÐÑÇÊÇÍâµØÍøÂç¹¥»÷µÄÖ÷ҪĿµÄ£¬£¬£¬£¬£¬Ëþ¼ª¿Ë˹̹ºÍÎÚ×ȱð¿Ë˹̹»®·ÖÓÐ32£¥ºÍ31£¥µÄ×°±¸Ñ¬È¾£¬£¬£¬£¬£¬¶øÔÚÖйú£¬£¬£¬£¬£¬ÓÐ27£¥µÄ×°±¸Ñ¬È¾¡£¡£Î¢Èí·¢Ã÷£¬£¬£¬£¬£¬½ÌÓý²¿·ÖÖ®ºó£¬£¬£¬£¬£¬ÆóÒµºÍרҵЧÀÍÐÐҵѬȾÁ¿×î¶à£¬£¬£¬£¬£¬Æä´ÎÊÇÁãÊÛºÍÏûºÄÆ·ÐÐÒµ£¬£¬£¬£¬£¬Ö®ºóÊǽðÈںͰü¹ÜЧÀͲ¿·Ö¡¢Ò½ÁÆÐÐÒµ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/400-million-malware-infection-in-april-2020/


¾©¹«Íø°²±¸11010802024551ºÅ