Daimler Git´æ´¢¿â̻¶µ¼Ö¼²³ÛOLUÔ´´úÂëй¶£»£»£»º½¿Õ¹«Ë¾EasyJet 900Íò¿Í»§ÐÅϢй¶
Ðû²¼Ê±¼ä 2020-05-201.Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬¼²³Û×é¼þOLUÔ´´úÂëй¶
¾ÝZDNet±¨µÀ£¬£¬£¬Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬ÆäÖаüÀ¨×°ÖÃÔÚMercedez¼²³Û»õ³µÖеİåÔØÂß¼µ¥Î»£¨OLU£©µÄÔ´´úÂë¡£¡£¹¤³ÌʦTill Kottmann·¢Ã÷£¬£¬£¬ËûÔÚMercedez¼²³ÛµÄ´úÂëÍйÜÍøÕ¾DaimlerÖÐʹÓÃí§Òâµç×ÓÓʼþ×¢²áÒ»¸öÕ˺ţ¬£¬£¬±ã¿ÉÒÔ»á¼ûÆäÁè¼Ý580¸öGit´æ´¢¿â¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨OLUÔ´´úÂë¡¢Raspberry PiÓ³Ïñ¡¢Ð§ÀÍÆ÷Ó³Ïñ¡¢ÓÃÓÚÖÎÀíÔ¶³ÌOLUµÄÄÚ²¿Daimler×é¼þ¡¢ÄÚ²¿Îĵµ¡¢´úÂëʾÀýµÈ¡£¡£ÍþвÇ鱨¹«Ë¾UnderÌåÏÖ£¬£¬£¬ËûÃÇͨ¹ýÉó²é»¹·¢Ã÷ÁËDaimlerÄÚ²¿ÏµÍ³µÄÃÜÂëºÍAPIÁîÅÆ£¬£¬£¬¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖDaimlerÔÆºÍÄÚ²¿ÍøÂç¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/mercedes-benz-onboard-logic-unit-olu-source-code-leaks-online/
2.µÂÖÝÔÙÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Õë¶ÔÆä½»Í¨ÔËÊ䲿ϵͳ
Ò»¸öÔÂÄڵ¿ËÈøË¹ÖÝÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔµÄÊǸÃÖݵĽ»Í¨ÔËÊ䲿ϵͳ£¬£¬£¬ÏÖÔÚ¸ÃϵͳÒѱ»ÆÈ¹Ø±Õ¡£¡£µÂÖݽ»Í¨ÔËÊ䲿£¨TxDOT£©È·ÈÏ£¬£¬£¬5ÔÂ14ÈÕÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÓÐδ¾ÊÚȨ»á¼û¸Ã»ú¹¹ÍøÂ磬£¬£¬¸Ã»ú¹¹·¢Ã÷ºóÁ¬Ã¦½ÓÄɲ½·¥£¬£¬£¬±ÜÃâ½øÒ»²½¹¥»÷¡£¡£5ÔÂ8ÈÕ£¬£¬£¬µÂ¿ËÈøË¹ÖÝÔâµ½µÚÒ»´Î¹¥»÷£¬£¬£¬ÀÕË÷Èí¼þ²¡¶¾Ñ¬È¾Á˸ÃÖݵķ¨ÔºÏµÍ³¡£¡£ÏÖÔÚ£¬£¬£¬Éв»ÇåÎúÁ½´Î¹¥»÷ÊÇ·ñÓйØÁª£¬£¬£¬Ò²Ã»ÓйØÓÚÕâÁ½´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/103410/cyber-crime/txdot-ransomware-attack.html
3.Ó¢¹úº½¿Õ¹«Ë¾EasyJetÔâ¹¥»÷£¬£¬£¬900Íò¿Í»§ÐÅϢй¶
Ó¢¹ú×î´óµÄº½¿Õ¹«Ë¾EasyJeÌåÏÖ£¬£¬£¬ËûÃÇÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬²¢Ð¹Â¶ÁË900Íò¿Í»§µÄÐÅÏ¢¡£¡£ÔÚÕâ´Î¹¥»÷ÖУ¬£¬£¬ºÚ¿Í»á¼ûÁ˸ù«Ë¾900Íò¿Í»§µÄµç×ÓÓʼþµØµãºÍÂÃÐÐÐÅÏ¢£¬£¬£¬ÉÐÓÐÆäÖÐ2208λ¿Í»§µÄÐÅÓÿ¨ÏêϸÐÅÏ¢¡£¡£EasyJetÔÚ·¢Ã÷´ËÊÂÎñºó£¬£¬£¬±ã֪ͨÁËÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍICO£¬£¬£¬²¢ÌåÏÖÏÖÔÚËûÃÇÕýÔÚ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬Ô¤¼ÆÔÚ2020Äê5ÔÂ26ÈÕ֮ǰËùÓÐÊÜÓ°Ïì¿Í»§¶¼½«ÊÕµ½Í¨Öª¡£¡£ÏÖÔÚÉÐÎÞ´ËÊÂÎñµÄÏêϸÐÅÏ¢¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/easyjet-hacked-data-breach-affects-9-million-customers/
4.ºÚ¿Íð³äÃÀ¹ú²ÆÎñ²¿Óô¹ÂÚÓʼþ·Ö·¢»ùÓÚNode.jsµÄRAT
Abuse.ch·¢Ã÷ÁËеĴ¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬ºÚ¿Íαװ³ÉÃÀ¹ú²ÆÎñ²¿À´·Ö·¢»ùÓÚNode.jsµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©ºÍÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¡£Ê×ÏȺڿͻáÉù³ÆÓÉÓÚÒøÐÐÐÅÏ¢²»×¼È·£¬£¬£¬Î´Ö§¸¶Õþ¸®ÌõÔ¼µÄ¿î×Ó£¬£¬£¬Ö®ºó»áͨ¹ýµç×ÓÓʼþÌáÐÑÓû§¼ì²é¸½¼þÎĵµÊÇ·ñÓÐÎ󡣡£Óʼþ¸½¼þÖаüÀ¨ÃûΪCONTRACT PAYMENT.jarµÄÎļþ£¬£¬£¬Óû§Ö´Ðкó½«ÏÂÔØNode.jsºÍWizard.js¾ç±¾²¢´æ´¢ÔÚ£¥UserProfile \ qnodejs-node-v13.13.0-win-x64Îļþ¼ÐÖС£¡£¸ÃNode.js¶ñÒâÈí¼þQNodeService¾ßÓÐ×ÔÎÒ¸üС¢»ñÈ¡»úеÐÅÏ¢£¨ÀýÈçIPµØµã¡¢»úеÃû³Æ¡¢Î»Öá¢Óû§ÃûºÍ²Ù×÷ϵͳ°æ±¾£©¡¢Ö´ÐÐÏÂÁɾ³ýºÍдÈëÎļþ¡¢´ÓÖÖÖÖÓ¦ÓóÌÐò£¨ÀýÈçChromeºÍFirefox£©ÖÐÇÔÈ¡ÃÜÂëµÄ¹¦Ð§¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fake-us-dept-of-treasury-emails-spreads-new-nodejs-malware/
5.FBIÐû²¼ÖÒÑÔ£¬£¬£¬ÀÕË÷Èí¼þProLockʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç
FBIÐû²¼ÁËÒ»¸öÇå¾²¾¯±¨£¬£¬£¬ËµÃ÷ÎúÐÂÐÍÀÕË÷Èí¼þProLock¿ÉÒÔʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç¡£¡£¸Ã²¡¶¾ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬Òѱ»ÓÃÓÚÒ½ÁƱ£½¡×éÖ¯¡¢Õþ¸®»ú¹¹¡¢½ðÈÚ»ú¹¹ºÍÁãÊÛ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£¡£FBI·¢Ã÷ProLock¿ÉÒÔͨ¹ýQakbot»á¼û±»ºÚµÄÍøÂ磬£¬£¬Òò´ËÒ»µ©·¢Ã÷ѬȾÁËQakbotµÄÅÌËã»ú£¬£¬£¬±ØÐ辡¿ì½«ÆäÓëÍøÂçµÄÆäÓಿ·Ö¸ôÀë¡£¡£ÁíÍ⣬£¬£¬FBI»¹ÖÒÑÔºÚ¿ÍÍÅ»ïÔÚÊܺ¦ÕßÖ§¸¶Êê½ðºóÌṩµÄ½âÃÜÆ÷¿ÉÄÜÎÞ·¨Õý³£ÊÂÇ飬£¬£¬»áÆÆËð´óÓÚ64MBµÄÎļþ£¬£¬£¬²¢¿ÉÄܵ¼ÖÂ100MBÒÔÉϵÄÎļþÿ1KBɥʧԼĪ1¸ö×Ö½Ú¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-prolock-ransomware-gains-access-to-victim-networks-via-qakbot-infections/
6.VerizonÐû²¼2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬DoS¹¥»÷Ôö¶à
VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬ÆÊÎöÁË16¸ö±ÊÖ±ÐÐÒµµÄ32002ÆðÇå¾²ÊÂÎñºÍ3950ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£±¨¸æÏÔʾ£¬£¬£¬ÒÑÍùÒ»ÄêDoS¹¥»÷µÄÊýÄ¿ÓÐËùÔöÌí£¨1.3ÍòÆð£¬£¬£¬Õ¼Çå¾²ÊÂÎñµÄ40£¥£©£¬£¬£¬Óë´Ëͬʱ£¬£¬£¬ÍøÂçÌØ¹¤¹¥»÷ïÔÌ£¬£¬£¬ÔÚÊý¾Ýй¶ÊÂÎñÖеÄÕ¼±È´Ó13.5£¥Ï½µµ½3.2£¥¡£¡£ÔÚÊý¾Ýй¶·½Ã棬£¬£¬¿ìÒªÒ»°ë£¨45£¥£©µÄÊÂÎñÊÇÓÉÓÚÏÖʵ¹¥»÷£¬£¬£¬¶ø22£¥ÔòÓÉÓÚÉç»á¹¤³Ì¹¥»÷¡£¡£22£¥µÄÈëÇÖÉæ¼°µ½¶ñÒâÈí¼þ£¬£¬£¬¶ø17£¥ÊÇÓɹýʧÔì³ÉµÄ¡£¡£8£¥µÄй¶Դ×ÔÓÚÊÚȨÓû§µÄÎóÓᣡ£
ÔÎÄÁ´½Ó£º
https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/


¾©¹«Íø°²±¸11010802024551ºÅ