DopplePaymerÌåÏÖÒÑÀÖ³ÉÈëÇÖDMI²¢ÇÔÈ¡NASAµÄÏà¹ØÎļþ£»£»£»ÓÐÏß¹«Ë¾VoliaÔâDDoS¹¥»÷Ó°ÏìÁè¼Ý10ÍòÓû§

Ðû²¼Ê±¼ä 2020-06-04

1.DopplePaymerÌåÏÖÒÑÀÖ³ÉÈëÇÖDMI²¢ÇÔÈ¡NASAµÄÏà¹ØÎļþ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÀÕË÷Èí¼þÍÅ»ïDopplePaymerÐû²¼ËûÃÇÀÖ³ÉѬȾÁËNASAµÄIT³Ð°üÉÌDigital Management Inc.£¨DMI£©µÄÍøÂç¡£¡£¡£ ¡£ÏÖÔÚDMIµÄ½²»°È˲¢Ã»Óлظ´ZDNetµÄÖÃÆÀÒªÇ󣬣¬ £¬£¬£¬Òò´ËÉв»ÇåÎúDopplePaymer¶ÔDMIÍøÂçµÄÈëÇÖÓжàÉ£¬ £¬£¬£¬ÒÔ¼°ËûÃÇÈëÇÖÁ˼¸¶à¸ö¿Í»§ÍøÂç¡£¡£¡£ ¡£Î¨Ò»ÇåÎúµÄÊÇËûÃÇÒѾ­ÇÔÈ¡ÁËÓëNASAÏà¹ØµÄÎļþ£¬£¬ £¬£¬£¬Õâ˵Ã÷ËûÃÇÈëÇÖÁËDMIÓëNASAÏà¹ØµÄ»ù´¡¼Ü¹¹¡£¡£¡£ ¡£ÎªÁË֤ʵÈëÇÖµÄÀֳɣ¬£¬ £¬£¬£¬¸Ã×éÖ¯Ðû²¼ÁË20¸öÎļþ£¬£¬ £¬£¬£¬°üÀ¨HRÎĵµºÍÏîÄ¿ÍýÏëµÄËùÓÐÄÚÈÝ¡£¡£¡£ ¡£DopplePaymer»¹Ðû²¼ÁËDMIÄÚ²¿ÍøÂçÖÐ2583̨ЧÀÍÆ÷ºÍÊÂÇéÕ¾µÄÁбí£¬£¬ £¬£¬£¬²¢ÌåÏÖÒÑ¶ÔÆä¾ÙÐÐÁ˼ÓÃÜ£¬£¬ £¬£¬£¬ÒÔÀÕË÷Êê½ð¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ransomware-gang-says-it-breached-one-of-nasas-it-contractors/


2.ÓÐÏßµçÊÓ¹«Ë¾VoliaÔâµ½DDoS¹¥»÷£¬£¬ £¬£¬£¬Ó°ÏìÆäÁè¼Ý10ÍòÓû§


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÓÐÏßµçÊÓ¹«Ë¾VoliaÌåÏÖ£¬£¬ £¬£¬£¬×Ô5ÔÂ31ÈÕÒÔÀ´£¬£¬ £¬£¬£¬Æä¹«Ë¾µÄЧÀÍÆ÷KharkovÒ»Ö±ÔâÊÜDDoS¹¥»÷¡£¡£¡£ ¡£µ½6ÔÂ3ÈÕΪֹ£¬£¬ £¬£¬£¬¸Ã¹«Ë¾Ôâµ½Á˶à´ÎÍøÂç¹¥»÷£¬£¬ £¬£¬£¬ÔçÏȹ¥»÷Ö»ÔÚÆäÓû§×ÓϵͳÉϾÙÐУ¬£¬ £¬£¬£¬ØÊºó±ãתÏòÁ˵çÐÅ»ù´¡ÉèÊ©¡£¡£¡£ ¡£µ¼ÖÂÆäÁè¼Ý10ÍòÓû§ÔÚʹÓû¥ÁªÍø¡¢IPTV¡¢¶àÆÁƽ̨ºÍÊý×ÖµçÊÓʱÓöµ½ÁËÎÊÌâ¡£¡£¡£ ¡£¾ÝVolia¹«Ë¾³Æ£¬£¬ £¬£¬£¬ÔÚ5ÔÂ31ÈÕÓÐ12·ÖÖÓ¡¢6ÔÂ1ÈÕÓÐ45·ÖÖӸù«Ë¾µÄЧÀÍÊÇÎÞ·¨Ê¹ÓõÄ£¬£¬ £¬£¬£¬²¢ÇÒÆäÍøÕ¾volia.comÒ²Ôâµ½Á˹¥»÷£¬£¬ £¬£¬£¬´Ë´ÎDDoS¹¥»÷¹æÄ£Öش󣬣¬ £¬£¬£¬¹¥»÷ÀàÐÍΪUDPºéË®ºÍÐŵÀÈÝÁ¿Òç³ö£¬£¬ £¬£¬£¬Á÷Á¿Áè¼Ý200 GB£¬£¬ £¬£¬£¬À´×ÔÌìϸ÷µØ³ÉǧÉÏÍò¸ö²î±ðµÄIPµØµã£¬£¬ £¬£¬£¬ÈçÃÀ¹ú¡¢ÂíÀ´Î÷ÑÇ¡¢Ì¨Íå¡¢Ô½ÄϵÈ¡£¡£¡£ ¡£Í¬Ê±£¬£¬ £¬£¬£¬VoliaÌåÏÖËûÃDz»¿ÉÈ·¶¨Î´À´¹¥»÷ÊÇ·ñ»áÔٴα¬·¢¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/06/provider-volia-reported-to-cyber-police.html


3.Netwalker¹¥»÷¼ÓÀû¸£ÄáÑÇ´óѧ¾É½ðɽ·ÖУ£¬£¬ £¬£¬£¬ÇÔȡδ¼ÓÃÜÊý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ºÚ¿Í×éÖ¯NetwalkerÉù³ÆÆäÒÑÀֳɹ¥»÷Á˼ÓÀû¸£ÄáÑÇ´óѧ¾É½ðɽ·ÖУ£¨UCSF£©£¬£¬ £¬£¬£¬ÇÔÈ¡ÁËδ¼ÓÃܵÄÊý¾Ý£¬£¬ £¬£¬£¬²¢¶ÔËûÃǵÄÅÌËã»ú¾ÙÐÐÁ˼ÓÃÜ¡£¡£¡£ ¡£Í¨¹ý¸Ã×éÖ¯Ðû²¼µÄ½ØÍ¼À´¿´£¬£¬ £¬£¬£¬±»µÁÊý¾Ý°üÀ¨Ñ§ÉúÓ¦ÓóÌÐò£¨´øÓÐÉç»áÇå¾²ºÅÂ룩£¬£¬ £¬£¬£¬º¬ÓÐÔ±¹¤ÐÅÏ¢¡¢Ò½Ñ§Ñо¿ºÍ²ÆÎñ״̬µÄµç×Ó±í¸ñºÍÎļþ¼Ð¡£¡£¡£ ¡£ÏÖÔÚ¸ÃѧУÉÐδ»Ø¸´Óйش˴ι¥»÷µÄÐÅÏ¢¡£¡£¡£ ¡£ÔÚÒÑÍùµÄÒ»ÖÜÖУ¬£¬ £¬£¬£¬ºÚ¿Í×éÖ¯NetwalkerÒ»Ö±Õë¶ÔÃÀ¹ú´óѧ£¬£¬ £¬£¬£¬²¢ÍþвҪÐû²¼ÆäÊý¾ÝÒÔË÷ÒªÊê½ð£¬£¬ £¬£¬£¬¸Ã×éÖ¯ÓÚ5ÔÂ28ÈÕÐû²¼Æä¹¥»÷ÁËÃÜЪ¸ùÖÝÁ¢´óѧ£¬£¬ £¬£¬£¬Ö®ºóÓÖÉù³ÆÏ®»÷ÁËÖ¥¼Ó¸ç¸çÂ×±ÈÑÇ´óѧ¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/netwalker-ransomware-continues-assault-on-us-colleges-hits-ucsf/


4.˼¿ÆÐû²¼NX-OSÈí¼þµÄÇå¾²¸üУ¬£¬ £¬£¬£¬ÐÞ¸´DoSÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


˼¿ÆÐû²¼NX-OSÈí¼þµÄÇå¾²¸üУ¬£¬ £¬£¬£¬ÐÞ¸´ÆäÖпÉÄܵ¼ÖÂDoSµÄÎó²î£¨CVE-2020-10136£©¡£¡£¡£ ¡£¸ÃÎó²î±£´æÓÚCisco NX-OSÈí¼þµÄÍøÂç¿ÍÕ»ÖУ¬£¬ £¬£¬£¬ÊÇÓÉÓÚ×°±¸¹ýʧµØ²ð·âºÍ´¦Öóͷ£ÁËÄ¿µÄµØÊÇÍâµØµØµãµÄIP°üÖеÄIP¶ø±£´æµÄ£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÒ»¸öÈ«ÐÄÉè¼ÆµÄIP°üÀ´Ê¹ÓôËÎó²î¡£¡£¡£ ¡£ÀÖ³ÉʹÓúó¿ÉÄܵ¼Ö½«IP°üÖеÄIP·â×°²¢×ª·¢ÄÚ²¿IP°ü£¬£¬ £¬£¬£¬´Ó¶øÔì³ÉIPÊý¾Ý°üÈÆ¹ý×°±¸ÉÏÉèÖõÄÊäÈë»á¼û¿ØÖÆÁбí(acl)»òÍøÂçÖÐÆäËûµÄÇå¾²½çÏß¡£¡£¡£ ¡£Òò´Ë£¬£¬ £¬£¬£¬ÔÚijЩÇéÐÎÏ£¬£¬ £¬£¬£¬¸ÃÎó²î¿ÉÄܵ¼ÖÂÍøÂç¿ÍÕ»Àú³ÌÍ߽Ⲣ¶à´ÎÖØÆô£¬£¬ £¬£¬£¬´Ó¶øµ¼ÖÂ×°±¸µÄÖØÐ¼ÓÔØºÍDoS״̬¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4


5.ѧϰƽ̨8BeltsÒòÉèÖùýʧ£¬£¬ £¬£¬£¬Ð¹Â¶È«Çò1Íò¶àÓû§ÐÅÏ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


VpnMentorµÄÍøÂçÇå¾²Ñо¿Ð¡×é·¢Ã÷£¬£¬ £¬£¬£¬Î÷°àÑÀÔÚÏßѧϰƽ̨8BeltsÓÉÓÚAmazon Web Services£¨AWS£©S3´æ´¢Í°ÉèÖùýʧ£¬£¬ £¬£¬£¬µ¼ÖÂÊý¾Ýй¶¡£¡£¡£ ¡£¾ÝÔ¤¼Æ£¬£¬ £¬£¬£¬´Ë´ÎÊÂÎñй¶ÁËÊýÍòÃûµç×ÓѧϰÓû§µÄ˽ÈËÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬°üÀ¨¹ú¼ÒÉí·ÝÖ¤ºÅÂ롢ȫÃû¡¢µç×ÓÓʼþIDºÍÁªÏµÐÅÏ¢£¬£¬ £¬£¬£¬¿ÉÄܻᵼÖÂÍøÂçڲƭºÍÉí·Ý͵ÇÔµÈÎÊÌâ¡£¡£¡£ ¡£ÓÉÓÚÊý¾Ý´æ´¢ÔÚ²»Çå¾²µÄÔÆÊý¾Ý¿âÖУ¬£¬ £¬£¬£¬Òò´ËÈκÎÓµÓÐÆäIPµØµãµÄÈ˶¼¿ÉÒÔ»á¼û¸ÃÊý¾Ý£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÓÚ4ÔÂ16ÈÕ·¢Ã÷´ËÊý¾Ý¿â£¬£¬ £¬£¬£¬²¢ÔÚ4ÔÂ20ÈÕºÍ4ÔÂ22ÈÕʵÑéÁªÏµ¸Ã¹«Ë¾µ«²¢Î´»ñµÃ»Ø¸´£¬£¬ £¬£¬£¬4ÔÂ28ÈÕ¸ÃÊý¾Ý¿âÍÑ»ú¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/8belts-exposes-data-of-100000-e-learners/


6.ºÚ¿ÍʹÓÃGithub»úеÈË¿ÉÔÚ100ÃëÄÚÇÔÈ¡1200ÃÀÔª¼ÓÃÜÇ®±Ò


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ǰ¼¸Ì죬£¬ £¬£¬£¬ºÚ¿ÍʹÓÃGithub»úеÈËÔڶ̶̵Ä100ÃëÄÚÇÔÈ¡ÁËRedditÓû§Ty Cooper¼ÛÖµ1200ÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£ ¡£¾Ý¸ÃÓû§ÏÈÈÝ£¬£¬ £¬£¬£¬Ëû½«ÆäMetaMaskÇ®°üÖÐ12¸ö×Ö·ûµÄÃÜÂëÕһضÌÓï¹ýʧµÄ̻¶ÔÚÒ»¸ö¹«¹²Github´æ´¢¿âÖУ¬£¬ £¬£¬£¬Óë´Ëͬʱ£¬£¬ £¬£¬£¬ºÚ¿ÍÕýÔÚʹÓûúеÈËɨÃèGithub£¬£¬ £¬£¬£¬ÎÞÒâÖз¢Ã÷ÁËÕâ¸öÈÝÒ×¼Ç×ŵĶÌÓ£¬ £¬£¬£¬ÓÚÊÇÓÃÕâ¸ö¶ÌÓï½øÈëÁËËûµÄÇ®°ü²¢Íµ×ßÁ˼ÓÃÜÇ®±Ò¡£¡£¡£ ¡£ÔÚÒÑÍùÒ»ÄêÖб¬·¢ÁËÎÞÊý͵ȡ¼ÓÃÜÇ®±Ò°¸Àý£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§Ö»¹Ü°ü¹ÜÖú¼Ç·ûºÍ˽ԿµÄËùÓи±±¾Ê¼ÖÕ¼á³ÖÍÑ»ú״̬£¬£¬ £¬£¬£¬²¢½«´ó²¿·Ö×Ê½ð´æ´¢ÔÚTrezor / LedgerÖ®ÀàµÄÇ®°üÖС£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/hackers-use-github-bot-steal-eth-in-seconds/