NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼£»£»£»£»£»£»CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨
Ðû²¼Ê±¼ä 2020-08-041.NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼
NordPassÓÚ2019Äê6ÔÂÖÁ2020Äê6Ô£¬£¬£¬£¬£¬ÓëÄäÃû°×ñºÚ¿ÍÏàÖúɨÃèÍøÂçÉϵÄElasticsearchºÍMongoDB¿â£¬£¬£¬£¬£¬·¢Ã÷Á˽üÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶ÁË105ÒÚÌõÀ´×Ô20¸ö¹ú¼ÒºÍµØÇøµÄÊý¾Ý¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý×î¶àµÄÈý¸ö¹ú¼ÒÖУ¬£¬£¬£¬£¬·¨¹úÒÔ51ÒÚÌõλ¾Ó°ñÊ×£¬£¬£¬£¬£¬ÖйúÒÔ26ÒÚÌõ½ôËæØÊºó£¬£¬£¬£¬£¬ÃÀ¹úÒÔ23ÒÚÌõλ¾ÓµÚÈý¡£¡£¡£ÉèÖùýʧµÄÊý¾Ý¿âÊýÄ¿×î¶àµÄ¹ú¼ÒÖУ¬£¬£¬£¬£¬Öйúλ¾ÓµÚÒ»£¨4000¸ö£©£¬£¬£¬£¬£¬Æä´ÎÊÇÃÀ¹ú£¨3000£©ºÍÓ¡¶È£¨500£©¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬ÕâЩй¶Êý¾Ý¿âͨ³£°üÀ¨µç×ÓÓʼþµØµã£¬£¬£¬£¬£¬ÃÜÂëºÍµç»°ºÅÂë¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2020/07/30/10-billion-records-exposed-unsecured-databases/
2.ºÚ¿ÍÔÚ°µÍø¹ûÕæ¼Ò×°ÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý
ºÚ¿ÍÔÚ°µÍø¹ûÕæÃÀ¹úÊÒÄÚÉè¼ÆÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý¡£¡£¡£´Ó¸ÃÊý¾Ý¿âµÄÑù±¾Öз¢Ã÷£¬£¬£¬£¬£¬×ß©Êý¾Ý°üÀ¨Óû§µÄµÇ¼Ãû¡¢È«Ãû¡¢MD5¹þÏ£ÃÜÂë¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÓÊÕþ±àÂëÒÔ¼°Óë¸ÃÕ¾µãµÄʹÓÃÓйصÄÖÖÖÖÆäËûÊý¾Ý£¬£¬£¬£¬£¬±ðµÄ£¬£¬£¬£¬£¬Óû§ÐÅÓÿ¨µÄ×îºóËÄλÊý¿ÉÄÜÒÑй¶¡£¡£¡£¾ÝBleepingComputer±¨¸æ³Æ£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯ShinyHuntersÒÑÔÚ°µÍøÉÏÃâ·Ñ¹ûÕæÁË18¼Ò¹«Ë¾µÄÊý¾Ý¿â£¬£¬£¬£¬£¬×ܼưüÀ¨3.86ÒÚÌõÓû§¼Í¼£¬£¬£¬£¬£¬¶øHavenlyÒ²ÊÇÆäÖÐÖ®Ò»¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/
3.LedgerÊý¾Ý¿âÖб£´æÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶
LedgerÈ·ÈÏÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿âµÄ±£´æÑÏÖØµÄÇå¾²Îó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶¡£¡£¡£7ÔÂ14ÈÕ£¬£¬£¬£¬£¬ÆäÑо¿Ö°Ô±·¢Ã÷LedgerÍøÕ¾ÉÏ¿ÉÄܱ£´æÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬²¢ÔÚ¾ÙÐÐÁËÄÚ²¿ÊÓ²ìºóÁ¬Ã¦ÐÞ¸´Á˸ÃÎó²î¡£¡£¡£ÐÞ¸´Îó²îºóÒ»ÖÜ£¬£¬£¬£¬£¬¸Ã¹«Ë¾·¢Ã÷Îó²îÔÚ6ÔÂ25ÈÕÒѱ»Ê¹Ó㬣¬£¬£¬£¬ºÚ¿Í»á¼ûÁËÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿â¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄܵ¼ÖÂÊý°ÙÍòÈ˵ç×ÓÓʼþµØµãµÈÐÅϢй¶£¬£¬£¬£¬£¬ÒÔ¼°½üÍòÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ð¹Â¶£¬£¬£¬£¬£¬°üÀ¨Ãû×ÖºÍÐÕÊÏ¡¢ÓÊÕþµØµã¡¢µç»°ºÅÂëºÍ¶©¹ºµÄ²úÆ·µÈ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/crypto-firm-ledgers-breach-one/
4.CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨
ÃÀ¹úÕþ¸®µÄÈý¸ö»ú¹¹CISA¡¢DODºÍFBIÁªºÏÐû²¼Á˹ØÓÚÐÂÐͶñÒâÈí¼þTaidooµÄ¾¯±¨¡£¡£¡£¾ÝÕâÈý¸ö»ú¹¹³Æ£¬£¬£¬£¬£¬´Ë¶ñÒâÈí¼þ¾ßÓÐ32λºÍ64λϵͳ°æ±¾£¬£¬£¬£¬£¬Í¨³£×÷ΪЧÀͶ¯Ì¬Á´½Ó¿â£¨DLL£©×°ÖÃÔÚÊܺ¦ÕßµÄϵͳÉÏ¡£¡£¡£¸ÃDLL°üÀ¨ÆäËûÁ½¸öÎļþ£¬£¬£¬£¬£¬ÆäÒ»ÊÇ×÷ΪЧÀÍÆô¶¯µÄ¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬»á½âÃܲ¢ÔÚÄÚ´æÖÐÖ´Ðеڶþ¸öÖ÷ÒªµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©Îļþ¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿Íͨ³£»£»£»£»£»£»á½«TaidoorÓëÊðÀíЧÀÍÆ÷Ò»Æð°²ÅÅ£¬£¬£¬£¬£¬ÒÔÒþ²Ø¶ñÆäÕæÊµÈªÔ´¡£¡£¡£DODÌåÏÖ£¬£¬£¬£¬£¬×Ô2008ÄêÒÔÀ´£¬£¬£¬£¬£¬Taidoor»òÒÑÔÚÒ°ÍⱻʹÓÃÖÁÉÙ12Äê¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisa-dod-fbi-expose-new-chinese-malware-strain-named-taidoor/#ftag=RSSbaffb68
5.ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§
Zscaler ThreatLabZÍŶӷ¢Ã÷£¬£¬£¬£¬£¬ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§¡£¡£¡£ÆäÕë¶Ô·ÇÖÞÁ½¸ö×îÖøÃû×ãÇò¾ãÀÖ²¿²¢Î±×°³É¾ãÀÖ²¿µÄ¹Ù·½Ó¦ÓÃSimba SCºÍYanga£¨Young Africans£©SC¡£¡£¡£¾ßÓÐÔĶÁ¶ÌÐÅ¡¢»ñÈ¡ÁªÏµÈË¡¢Â¼ÖÆÒôƵ¡¢Í¨»°¹¦Ð§¡¢»á¼ûʵʱλÖᢶÁ/дÍⲿ´æ´¢¡¢ÍµÕÕÆ¬ºÍ´æÈ¡Ïà»úµÄ¹¦Ð§¡£¡£¡£¾ÓɽøÒ»²½ÆÊÎö£¬£¬£¬£¬£¬·¢Ã÷ÕâЩAPKÊÇʹÓÃÊ¢ÐеÄÌØ¹¤Èí¼þ¹¤¾ßSpyMax¿ª·¢µÄ£¬£¬£¬£¬£¬SpyMaxµÄǰÉíSpyNoteÊÇʹÓÃ×îÆÕ±éµÄÌØ¹¤Èí¼þ¿ò¼ÜÖ®Ò»¡£¡£¡£ÓÉÓÚ¸ÃÌØ¹¤Èí¼þÔÚÆÊÎöʱ´úδ´¦Óڻ״̬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±²¢Î´×·Ëݵ½ÆäÏÂÁîºÍ¿ØÖÆ£¨C£¦C£©Ð§ÀÍÆ÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zscaler.com/blogs/research/android-spyware-targeting-tanzania-premier-league
6.ABIÔ¤¼Æµ½2026ÄêIoTÊý¾ÝÖÎÀíЧÀͽ«´ï429ÒÚÃÀÔª
ABI ResearchÌåÏÖÎïÁªÍøÊý¾ÝÖÎÀíЧÀÍÊÇÒ»¸ö¿ìËÙÔöÌíµÄÊг¡£¡£¡£¬£¬£¬£¬£¬²¢Ô¤¼Æµ½2026Ä꽫¸ß´ï429ÒÚÃÀÔª¡£¡£¡£Á÷´¦Öóͷ£ºÍÆÊÎö½â¾ö¼Æ»®µÄ·ºÆðΪÊý¾Ý¾öæÅºÍÆóÒµ¶´²ìÌṩÁ˶¯Á¦£¬£¬£¬£¬£¬ÏÖÔÚÓÐÁ½´óÕûÌå¶ÔÆä¾ÙÐÐÖ÷µ¼£¬£¬£¬£¬£¬»®·ÖÎªÔÆÓÅÏȺͱßÑØÓÅÏÈ¡£¡£¡£Azure¡¢AWS¡¢IBM΢Èí¡¢Cloudera¡¢Informatica¡¢Software AG ApamaºÍTIBCO¶¼Î§ÈÆÒÔÔÆÎªÖÐÐĵķ½·¨ÌṩÊý¾ÝÖÎÀíЧÀÍ£¬£¬£¬£¬£¬ÕâÊÇËûÃǶÔÒѾ±£´æµÄÈ«¿ÍÕ»¶Ëµ½¶ËÎïÁªÍø²úÆ·ºÍÄÜÁ¦µÄÔö²¹¡£¡£¡£ScaleOut¡¢ Crosser¡¢ SWIM.aiºÍClearBladeʹÓÃÁËÒ»ÖÖÒÔ±ßÑØÎªÖÐÐĵÄÒªÁ죬£¬£¬£¬£¬²¢ÓëÔÆ¹©Ó¦ÉÌÏàÖú£¬£¬£¬£¬£¬ÌṩÐÐҵרÓõÄÊý¾ÝÖÎÀíÓ¦ÓóÌÐò¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/08/03/iot-data-management-services-42-9-billion-by-2026/


¾©¹«Íø°²±¸11010802024551ºÅ