DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬½ü500ÍòÓû§ÐÅϢй¶£»£»£»Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2019-09-27
1.DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬½ü500ÍòÓû§ÐÅϢй¶

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ËͲÍЧÀÍDoorDashÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬µ¼Ö½ü500ÍòÏûºÄÕß¡¢ËͲÍÔ±¼°²Í¹ÝÉÌÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£Æ¾Ö¤ÆäÍøÕ¾ÉÏÐû²¼µÄÇ徲֪ͨ£¬£¬£¬£¬£¬Î´ÊÚȨµÄµÚÈý·½ÔÚ2019Äê5ÔÂ4ÈÕ»ñµÃÁË¸ÃÆ½Ì¨Óû§Êý¾ÝµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÓû§½ö°üÀ¨ÔÚ2018Äê4ÔÂ5ÈÕǰע²á¸Ãƽ̨µÄÓû§¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ËÍ»õµØµã¡¢µç»°ºÅÂëºÍ¹þÏ£ÃÜÂëÒÔ¼°ÒøÐп¨ºóËÄλºÍ½ü10ÍòËͲÍÔ±µÄ¼ÝÕÕºÅÂëµÈ¡£¡£¡£¡£DoorDashÇ¿µ÷ûÓÐÍêÕûµÄÐÅÓÿ¨ÐÅÏ¢»òÍêÕûµÄÒøÐп¨ÕË»§ºÅÂëй¶¡£¡£¡£¡£ÊÂÎñ±¬·¢µÄÔµ¹ÊÔ­ÓÉÉв»ÇåÎú£¬£¬£¬£¬£¬µ«DoorDashÌåÏÖÓëµÚÈý·½Ð§ÀÍÌṩÉÌÓйØ¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/doordash-data-breach-impacts-personal-data-of-almost-5m-users/148724/

2.ÎÖ´ï·áÒÆ¶¯Ó¦Óñ£´æÎó²îµ¼Ö²¿·Ö¿Í»§ÐÅϢй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÐÂÎ÷À¼ÎÖ´ï·áµÄÒÆ¶¯appÔÚÖÜÈýÔçÉϵÄһС¶Îʱ¼äÄÚ·ºÆðÎó²î£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¿ÉÒÔ¿´µ½ÆäËû¿Í»§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¸ÃappÖ¼ÔÚÖÎÀíÓû§µÄÎÖ´ï·áÕÊ»§£¬£¬£¬£¬£¬²¢Ìṩ¶ÔÕ˵¥»ò¿ÉÓÃЧÀ͵ĿìËÙ»á¼û¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤ÊµÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬³ÆÕâÊÇÓÉÓÚÍýÏëÄÚµÄÓ¦ÓÃÉý¼¶Àú³Ì·ºÆð¹ýʧµ¼Öµģ¬£¬£¬£¬£¬Ê¹µÃÓû§¹ýʧµØµÇ¼µ½ÆäËûÈ˵ÄÕË»§¡£¡£¡£¡£¸ÃÎÊÌⲢδһÁ¬ºÜ³¤Ê±¼ä£¬£¬£¬£¬£¬ÎÖ´ï·áÔÚ15·ÖÖÓºó¾Í»Ø¹öÁËÕâÒ»Éý¼¶¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶àÓû§µÄСÎÒ˽¼ÒÐÅÏ¢Òò´Ë¶ø¹ûÕæ£¬£¬£¬£¬£¬ÎÖ´ï·áÌåÏÖÕýÔÚ½ôÆÈÆÀ¹ÀÊÜÓ°ÏìµÄÈËÊý¼°Ï¸½Ú£¬£¬£¬£¬£¬²¢È·¶¨Í¨ÖªÕâЩ¿Í»§ÐèÒª½ÓÄɵİ취¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vodafones-mobile-app-briefly-exposed-customer-information/

3.iOS 13ºÍiPadOSÎó²î¿Éµ¼ÖµÚÈý·½¼üÅÌ»ñÈ¡ÍêÈ«»á¼ûȨÏÞ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Æ»¹û¹Ù·½Ðû²¼ÁËÒ»·ÝеÄÖ§³ÖÎĵµ£¬£¬£¬£¬£¬ÖÒÑÔÓû§ÓйØiOS 13ºÍiPadOSµÚÈý·½¼üÅ̱£´æµÄÇå¾²Îó²î¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬Ò»Ð©µÚÈý·½¼üÅÌÈí¼þ×ÝȻδ±»Åú×¼ÍêÈ«»á¼ûȨÏÞÒ²¿ÉÄÜ»áÓÉÓÚiOS 13ºÍiPadOSÖеÄÎó²î¶ø±»ÊÚÓèÍêÈ«»á¼ûȨÏÞ¡£¡£¡£¡£ÕâÒ»ÎÊÌâÓ°ÏìÁËiPhone¡¢iPad»òiPod touch×°ÖõļüÅÌ£¬£¬£¬£¬£¬µ«²»Ó°ÏìÆ»¹ûµÄÄÚÖüüÅÌ£¬£¬£¬£¬£¬Ò²²»»áÓ°ÏìδʹÓÃÍêÈ«»á¼ûȨÏ޵ĵÚÈý·½¼üÅÌ£¬£¬£¬£¬£¬Æ»¹û½«ÔÚ¼´½«µ½À´µÄÈí¼þ¸üÐÂÖÐÐÞ¸´´ËÎó²î¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/bug-granting-full-access-keyboards/148638/

4.Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤·¨ÐÂÉ籨µÀ£¬£¬£¬£¬£¬Å·ÖÞ¿ÕÖпͳµ¹«Ë¾ÔÚÒÑÍù12¸öÔÂÖÐÖÁÉÙÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£¡£2019ÄêÍ·£¬£¬£¬£¬£¬¿Õ¿ÍÐû³ÆÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µÄ¡°ÉÌÓú½ÐÐÓªÒµ¡±ÏµÍ³²¢»ñµÃÁ˲¿·ÖÔ±¹¤Òþ˽ÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¡£¡£¡£·¨ÐÂÉ籨µÀ³Æ¸ÃÊÂÎñÊÇÈ¥Äê¾ÙÐеÄÒ»Ïî¸ü´ó¹æÄ£Ðж¯µÄÒ»²¿·Ö¡£¡£¡£¡£ÔÚÕâһϵÁй©Ó¦Á´¹¥»÷ÖУ¬£¬£¬£¬£¬¹¥»÷Õß»¹Õë¶ÔÁËÓ¢¹ú·¢ÄîÍ·ÖÆÔìÉÌRolls-RoyceºÍ·¨¹úÊÖÒÕ×Éѯ¹«Ë¾¼°¹©Ó¦ÉÌExpleo£¬£¬£¬£¬£¬ÒÔ¼°ÁíÍâÁ½¼Ò·¨¹ú¿Õ¿Í³Ð°üÉÌ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91744/hacking/airbus-suppliers-attacks.html

5.¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÖÒÑÔÀÕË÷Èí¼þTFlowerµÄбäÌå


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄ£¨CCCS£©Ðû²¼ÓйØÀÕË÷Èí¼þTFlowerбäÖֵĹ¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¡£¸Ã±äÖÖÓÚ7ÔÂ30ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ýδ´ò²¹¶¡µÄÔ¶³Ì×ÀÃæÐ§ÀÍÈö²¥£¬£¬£¬£¬£¬µ«Ò²¿ÉÄÜͨ¹ýÀ¬»øÓʼþ¡¢ÓÕÆ­ÐÔÏÂÔØ¡¢½©Ê¬ÍøÂç¡¢¶ñÒâ¹ã¸æ¡¢web×¢Èë¡¢Ðéα¸üлòÊÜѬȾµÄ×°ÖðüÈö²¥¡£¡£¡£¡£ÔÚѬȾϵͳºó£¬£¬£¬£¬£¬¸Ã±äÖÖ»áʵÑéͨ¹ýPowerShell Empire¡¢PSExecµÈ¹¤¾ßÔÚÍøÂçÉϺáÏòÒÆ¶¯¡£¡£¡£¡£¸Ã±äÖÖ»áÏÈÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬È»ºóɾ³ý¾íÓ°¸±±¾²¢½ûÓÃwin10ÖеĻָ´¹¦Ð§£¬£¬£¬£¬£¬×îºóÐÞ¸Ä×¢²á±íÀ´»ñÈ¡³¤ÆÚÐÔ¼°¼ÓÃÜÓû§µÄÎļþ¡£¡£¡£¡£CCCS½¨ÒéϵͳËùÓÐÕßÁ¬Ã¦Ó¦ÓÃ×îеÄÇå¾²²¹¶¡²¢ÔÚ»á¼ûÓʼþÖеÄÁ´½Ó»ò·­¿ª¸½¼þʱ¼á³ÖСÐÄ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://cyber.gc.ca/en/alerts/tflower-ransomware-campaign

6.EmsisoftÐû²¼ÀÕË÷Èí¼þWannaCryFakeµÄ½âÃܹ¤¾ß


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


EmsisoftÑо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þWannaCryFakeµÄÃ⺬»ìÃܹ¤¾ß¡£¡£¡£¡£WannaCryFakeÊÇÒ»¿îʹÓÃAES-256¼ÓÃÜÊܺ¦ÕßÎļþµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.[<id>][recoverydata54@protonmail.com].WannaCryÀ©Õ¹Ãû¡£¡£¡£¡£Æ¾Ö¤¹¥»÷ÕßµÄ˵·¨£¬£¬£¬£¬£¬Êê½ðµÄ¼ÛÇ®ÓëÁªÏµËûÃǵÄËÙÂÊÓйأ¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÌåÏÖÔÚÈκÎÇéÐÎ϶¼²»Ó¦¸ÃʵÑéÁªÏµ¹¥»÷Õß¡£¡£¡£¡£¸Ã½âÃÜÆ÷¿É´ÓEmsisoft¹ÙÍøÉÏÏÂÔØ»ñµÃ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/91715/malware/wannacryfake-ransomware-decryptor.html