HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£»£»ÐµÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ

Ðû²¼Ê±¼ä 2020-11-02

1.HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ


1.png


HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£¬ £¬£¬£¬£¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄÎó²îÀàÐÍ£¬ £¬£¬£¬£¬±È2019ÄêÔöÌíÁË134%¡£¡£±¨¸æÏÔʾ£¬ £¬£¬£¬£¬XSSÎó²îÕ¼Á˱¨¸æµÄËùÓÐÎó²îµÄ18%£¬ £¬£¬£¬£¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔöÌíÁË26%)¡£¡£±ðµÄ£¬ £¬£¬£¬£¬²»µ±»á¼û¿ØÖÆÎó²îËù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔöÌí134£¥£¬ £¬£¬£¬£¬¸ßµÖ´ï400ÍòÃÀÔª£¬ £¬£¬£¬£¬Æä´ÎÊÇÐÅÏ¢Åû¶Îó²î£¬ £¬£¬£¬£¬Í¬±ÈÔöÌí63£¥¡£¡£ÕâÁ½ÖÖ·½·¨¶¼»áй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬ £¬£¬£¬£¬ÀýÈçСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£


Ô­ÎÄÁ´½Ó£º

hackerone.com/hacker-powered-security-report


2.Ñо¿Ö°Ô±³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷


2.jpg


Ñо¿Ö°Ô±Jan Kopriva³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷¡£¡£SMBGhostÎó²î£¨CVE-2020-0796£©ÎªMicrosoftЧÀÍÆ÷ÐÂÎſ飨SMB£©Ð­ÒéÖеÄÒ»¸öÔ¶³ÌÖ´ÐдúÂëÎó²î£¬ £¬£¬£¬£¬Ê¹ÓøÃÎó²î¿É¾ÙÐÐÈ䳿¹¥»÷£¬ £¬£¬£¬£¬ÒÔÈö²¥µ½ÆäËûÅÌËã»úÉÏ£¬ £¬£¬£¬£¬MicrosoftÒÑÔÚÈýÔ·ÝÐÞ¸´¸ÃÎÊÌâ¡£¡£Jan Kopriva·¢Ã÷ÈÔÓÐÁè¼Ý103000̨ÅÌËã»úÒ×ÊÜ´ËÀ๥»÷£¬ £¬£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓŲ́Í壨22£¥£©£¬ £¬£¬£¬£¬Æä´ÎÊÇÈÕ±¾£¨20£¥£©ºÍ¶íÂÞ˹£¨11£¥£©¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110247/hacking/smbghost-vulnerable-machines-dangers.html


3.еÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ


3.jpg


Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±Åû¶ÁËеÄË®¿Ó¹¥»÷»î¶¯Earth Kitsune£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úÇÈÃñ¡£¡£Ñо¿Ö°Ô±·¢Ã÷¹¥»÷±¬·¢ÔÚ3Ô¡¢5ÔºÍ9Ô£¬ £¬£¬£¬£¬ºÚ¿ÍʹÓÃÁ˶ñÒâÈí¼þSLUB(¼´SLackºÍgithUB)ºÍÁ½¸öкóÃÅ£¬ £¬£¬£¬£¬dneSpyºÍagfSpy£¬ £¬£¬£¬£¬Ö¼ÔÚ½ÓÊÜÊÜѬȾµÄϵͳ²¢´ÓÖÐÇÔÈ¡Êý¾Ý¡£¡£ÓëÆäËû¹¥»÷²î±ðµÄÊÇ£¬ £¬£¬£¬£¬ËüÔÚÊܺ¦»úеÉϰ²ÅÅÁË´ó×ÚµÄÑù±¾£¬ £¬£¬£¬£¬Ê¹ÓÃÁ˶à¸öÏÂÁîºÍ¿ØÖÆ(C&C)ЧÀÍÆ÷£¬ £¬£¬£¬£¬»¹Ê¹ÓÃÁË4¸öN-dayÎó²î¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110192/apt/operation-earth-kitsune.html


4.FireEye·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥


4.jpg


FireEyeÑо¿Ö°Ô±Alex Lanstein·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥¡£¡£ºÚ¿ÍÒÔ2020ÍòÊ¥½ÚΪÖ÷Ì⣬ £¬£¬£¬£¬»Ñ³ÆÔ¼ÇëÊܺ¦Õß¼ÓÈëÍòÊ¥½ÚÅɶÔ£¬ £¬£¬£¬£¬²¢ÌåÏÖËùÓÐÏêϸÐÅÏ¢¶¼ÔÚ¸½¼þÖУ¬ £¬£¬£¬£¬ÒÔÓÕʹÓû§·­¿ª¶ñÒ⸽¼þ¡£¡£Ò»µ©Óû§·­¿ª¸½¼þ£¬ £¬£¬£¬£¬¾Í»á±»ÒªÇóµã»÷ÆôÓñ༭ºÍÆôÓÃÄÚÈݰ´Å¥£¬ £¬£¬£¬£¬Ö¼ÔÚ×°ÖÃEmotet Trojan¡£¡£ÀÖ³É×°ÖöñÒâÈí¼þºó£¬ £¬£¬£¬£¬Emotet½«Ê¹ÓøÃÅÌËã»ú·¢ËÍÀ¬»øÓʼþ£¬ £¬£¬£¬£¬²¢ÌᳫÀÕË÷Èí¼þ¹¥»÷¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/emotet-malware-wants-to-invite-you-to-a-halloween-party/


5.ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvilµ¼Ö²¿·ÖÊý¾Ýй¶


5.jpg


ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvil£¬ £¬£¬£¬£¬²¢µ¼Ö²¿·ÖÊý¾Ýй¶¡£¡£Gaming Partners International£¨GPI£©ÊÇÒ»¼ÒΪȫÇò¶Ä³¡Ìṩ²©²Ê¼Ò¾ßºÍ×°±¸µÄÈ«·½Î»Ð§À͹©Ó¦ÉÌ¡£¡£REvilÍÅ»ïÉù³ÆÆäÒѼÓÃܸù«Ë¾ÏµÍ³£¬ £¬£¬£¬£¬²¢ÇÔÈ¡ÁË540GbµÄÊÖÒպͽðÈÚÎļþ¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ö÷ÒªÐÅÏ¢¡¢ÊÖÒÕÊý¾Ý¡¢²ÆÎñÎļþ¡¢ÓëÀ­Ë¹Î¬¼Ó˹¡¢°ÄÃÅ¡¢Å·ÖÞËùÓжij¡µÄÌõÔ¼¡¢ÒøÐÐÎļþµÈ¡£¡£¸ÃÍŻﻹ½«Ð¹Â¶Êý¾ÝµÄ½ØÍ¼¹ûÕæÔÚÆäÊý¾Ýй¶վµã£¬ £¬£¬£¬£¬²¢ÌåÏÖ¹«Ë¾72СʱÄÚ²»Ö§¸¶Êê½ð£¬ £¬£¬£¬£¬ËûÃǽ«¹ûÕæËùÓб»µÁÊý¾Ý¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110237/cyber-crime/gaming-partners-international-revil-ransomware.html


6.ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼


6.png


10ÔÂ28ÈÕ£¬ £¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼¡£¡£Æ¾Ö¤Ð¹Â¶Êý¾ÝÏÔʾ£¬ £¬£¬£¬£¬ËùÓб»³öÊÛµÄÊý¾Ý¿â¶¼ÊÇÔÚ2020Äê±»µÁµÄ£¬ £¬£¬£¬£¬ÆäÖÐй¶×î¶àµÄÊÇGeekie.com.br£¬ £¬£¬£¬£¬ÓÐ810ÍòÌõ£¬ £¬£¬£¬£¬¶øÊÜÓ°Ïì×î´óµÄÊÇÐÂ¼ÓÆÂµÄRedMart¡£¡£´Ë´ÎÊÜÓ°ÏìµÄ17¼Ò¹«Ë¾»®·ÖΪGeekie.com.br£¨810Íò£©¡¢Clip.mx£¨470Íò£©¡¢Wongnai.com£¨430Íò£©¡¢Cermati.com£¨290Íò£©¡¢Everything5pounds.com£¨290Íò£©¡¢Eatigo.com£¨280Íò£©¡¢Katapult.com£¨220Íò£©¡¢Wedmegood.com£¨130Íò£©¡¢RedMart£¨110Íò£©¡¢Coupontools.com£¨100Íò£©¡¢W3layouts.com£¨78.9Íò£©¡¢Game24h.vn£¨77.9Íò£©¡¢Invideo.io£¨57.1Íò£©ºÍApps-builder.com£¨38.6£©¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-is-selling-34-million-user-records-stolen-from-17-companies/