αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ£»£»£»£»£»£»£»£»ºÚ¿ÍJohn WickÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5͵ȡÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2020-06-081.αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ
¿ËÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚ·Ö·¢Î±ÔìµÄSTOP DjvuÀÕË÷Èí¼þµÄ½âÃÜÆ÷£¬£¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßµÄÎļþ¾ÙÐжþ´Î¼ÓÃÜ¡£¡£¡£¡£¡£STOP DjvuÊÇÒÑÍùÒ»ÄêÖÐ×î»îÔ¾µÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬Æ½¾ùÌìÌìѬȾÁè¼Ý600¸öÊܺ¦Õß¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÖ÷ÒªÓ°ÏìµÄÊǼÒÍ¥Óû§£¬£¬£¬£¬£¬Òò´ËÐí¶à±»Ñ¬È¾Óû§ÎÞ·¨Ö§¸¶500ÃÀÔªµÄÊê½ðÀ´¹ºÖýâÃÜÆ÷¡£¡£¡£¡£¡£Ö®ºóÑо¿Ö°Ô±·¢Ã÷ÁËαÔìµÄÃâ·ÑµÄSTOP Djvu½âÃÜÆ÷£¬£¬£¬£¬£¬¿ÉÊÇËû²»»á»Ö¸´ÈκÎÎļþ£¬£¬£¬£¬£¬µ±Óû§·¿ª¸ÃÈí¼þ²¢µã»÷×îÏÈɨÃèºó£¬£¬£¬£¬£¬¸Ã³ÌÐò½«ÏÂÔØ¿ÉÖ´ÐÐÎļþcrab.exe²¢ÉúÑĵ½£¥Temp£¥Îļþ¼ÐÖУ¬£¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßÅÌËã»úÉϵÄÊý¾Ý¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÕýÔÚ¶Ô´ËÀÕË÷²¡¶¾¾ÙÐÐÆÊÎö¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/
2.ºÚ¿ÍJohn WickÉù³ÆÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5£¬£¬£¬£¬£¬ÍµÈ¡Ãô¸ÐÊý¾Ý
×Ô³ÆÎªJohn WickµÄºÚ¿ÍÉù³Æ£¬£¬£¬£¬£¬ÆäÒѹ¥»÷ÁËÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5µÄϵͳ£¬£¬£¬£¬£¬ÇÒ͵ȡÁ˸ù«Ë¾150GBµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÌåÏÖ£¬£¬£¬£¬£¬Æä͵ȡµÄÊý¾Ý¿âÖаüÀ¨×î½üµÄÉúÒâ¡¢ÃÜÂë¡¢µç×ÓÓʼþ¡¢ÊÖ»úºÅÂë¡¢µç×ÓÓʼþID¡¢ÐÂÎŵȣ¬£¬£¬£¬£¬²¢Íþв½«¹ûÕæÏúÊÛ¸ÃÊý¾Ý¿âºÍ´úÂë¡£¡£¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬£¬£¬ÏÖÔڸúڿÍÒѾÐû²¼ÁËй¶Êý¾Ý¿âµÄ²¿·ÖÊý¾Ý¡¢»î¶¯Ô´´úÂëÖеÄÃÜÔ¿¡¢¶ÔAtlassian°åµÄÒýÓÃÒÔ¼°AWS´æ´¢Í°Æ¾Ö¤¡£¡£¡£¡£¡£¾Ý´ËºÚ¿Í˵£¬£¬£¬£¬£¬ÆäÊÇÀ´×Ôº«¹úµÄÇ徲ר¼Ò£¬£¬£¬£¬£¬´Ë´Î»î¶¯Ö÷ÒªÊÇΪÁË×ÊÖúÕâЩÈËÐÞ¸´Îó²î¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄÊÓ²ìÖУ¬£¬£¬£¬£¬ºÚ¿ÍÊÇ·ñÀ´×Ôº«¹ú»¹ÎÞ·¨È·¶¨¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/zee5-allegedly-hacked-by-korean-hackers-customer-info-at-risk/
3.ºÚ¿Íͨ¹ýVPNÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤
Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃVPNÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤¡£¡£¡£¡£¡£ÓÉÓÚÒßÇéÔµ¹ÊÔÓÉ£¬£¬£¬£¬£¬´ó²¿·ÖÈËÑ¡Ôñ¾Ó¼Ò°ì¹«£¬£¬£¬£¬£¬Õâ´ó´óÔöÌíÁËVPNµÄʹÓÃÂÊ£¬£¬£¬£¬£¬Òò´Ë¸ü¶àµÄºÚ¿Í»áÊÔͼ½«Æä×÷Ϊ¹¥»÷ǰÑÔ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÖкڿÍð³äÊÕ¼þÈ˹«Ë¾µÄITÖ§³Ö²¿·Ö·¢ËÍ֪ͨÓʼþ£¬£¬£¬£¬£¬ÓʼþÖаüÀ¨Ò»¸öÖ¸ÏòеÄÓÃÓÚ¼ÒÍ¥»á¼ûµÄVPNÉèÖõÄÁ´½Ó¡£¡£¡£¡£¡£·¢¼þÈ˵ĵç×ÓÓʼþµØµã±»Î±×°³ÉÊܺ¦Õß¹«Ë¾µÄÓò£¬£¬£¬£¬£¬´Ó¶øÓÕʹÊܺ¦Õßµã»÷Á´½Ó£¬£¬£¬£¬£¬ÒÔ½«ÆäÖØ¶¨Ïòµ½office365ƾ֤´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://hotforsecurity.bitdefender.com/blog/hackers-use-vpn-impersonation-in-phishing-emails-to-steal-office-365-credentials-23456.html
4.ÐÂÀÕË÷Èí¼þKupidonÖ÷ÒªÕë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý
MalwareHunterTeamÓÚ5ÔÂ9ÈÕÊ״η¢Ã÷ÐÂÀÕË÷Èí¼þKupidon£¬£¬£¬£¬£¬Æä²»µ«Õë¶Ô¹«Ë¾ÍøÂ磬£¬£¬£¬£¬»¹Õë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷¸ÃÀÕË÷Èí¼þµÄÑù±¾£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»ùÓÚÓëÊܺ¦ÕßµÄÅÊ̸ºÍÉÏ´«µÄÎļþ¾ÙÐÐÆÊÎö¡£¡£¡£¡£¡£ºÚ¿ÍÒ»µ©½øÈëÍøÂ磬£¬£¬£¬£¬±ã»á¼ÓÃÜÊܺ¦ÕßÎļþ£¬£¬£¬£¬£¬ÔÚÎļþÃûºó¸½¼Ó.kupidonÀ©Õ¹Ãû£¬£¬£¬£¬£¬²¢ÁôÏÂÊê½ðÒªÇ󡣡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬Õë¶ÔÆóÒµËüÒªÇóµÄÊê½ðΪ1200ÃÀÔªµÄ±ÈÌØ±Ò£¬£¬£¬£¬£¬Õë¶Ô¼ÒÍ¥Óû§ÒªÇó300ÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£Ò»µ©Óû§Ö§¸¶Êê½ðºó±ã»áÊÕµ½AES½âÃÜÃÜÔ¿ºÍKupidon½âÃÜÆ÷¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»ÓиÃÀÕË÷²¡¶¾µÄÑù±¾£¬£¬£¬£¬£¬Òò´ËÉÐÎÞ·¨ÖªµÀ¸ÃÈí¼þÊÇ·ñ±£´æÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/kupidon-is-the-latest-ransomware-targeting-your-data/
5.Ñо¿Ö°Ô±·¢Ã÷FacebookÖжà¸öSSRFÎó²î£¬£¬£¬£¬£¬»ñ3.1ÍòÃÀÔª½±½ð
Ñо¿Ö°Ô±Bipin Jitiya·¢Ã÷Facebook±£´æ¶à¸öSSRFÎó²î£¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÃÕâЩÎó²î»á¶Ôƽ̨±¬·¢ÑÏÖØµÄÓ°Ï죬£¬£¬£¬£¬²¢Òò´Ë»ñµÃÁËFacebookÌṩµÄ×ܼÆ31500ÃÀÔª½±½ð¡£¡£¡£¡£¡£¸ÃÑо¿Ö°Ô±Ê×ÏÈ·¢Ã÷µÄÊÇshortURLʹÃüÖÐȱÉÙÈÏÖ¤»á»°£¬£¬£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔÔÚ²»¾ÙÐÐÉí·ÝÑéÖ¤µÄÇéÐÎÏ»á¼û´ËЧÀÍ£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜʹÓÃÆäͨ¹ýSSRF¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ëû·¢Ã÷ÁËFacebook¶ÌµØµã(https://fb.me/)ÖеÄSSRFÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îй¶ÁËÈÕÖ¾Îļþ¼ÐµÄÄÚ²¿Â·¾¶¡¢ÆäËûÎļþ·¾¶¡¢Ê¹ÓÃfetchÊý¾ÝµÄÄÚ²¿ÏµÍ³ÅÌÎÊ¡¢ÄÚ²¿IPµØµã¡¢ÄÚ²¿ID¡¢ÉèÖÃÏà¹ØÐÅÏ¢¡¢Ë½ÓÐÎĵµµÈÐÅÏ¢¡£¡£¡£¡£¡£JitiyaÌåÏÖ£¬£¬£¬£¬£¬Á¬ÏµÕâÁ½¸öÎó²î£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¶ÔÄÚ²¿»ù´¡ÉèÊ©µÄ·¾¶±éÀúºÍSSRF¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/06/07/hacker-won-31k-bounty-for-reporting-numerous-facebook-bugs/
6.ÖÇÀûCPLTÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬¸Ã¹úÒ½ÁÆÐÐÒµ±£´æÃô¸ÐÊý¾Ýй¶ÎÊÌâ
ÖÇÀû͸Ã÷¶ÈίԱ»á£¨The Chilean Transparency Council £¬£¬£¬£¬£¬CPLT£©¶ÔÆäÎÀÉú²¿·Ö¾ÙÐÐÊӲ죬£¬£¬£¬£¬·¢Ã÷±£´æÐ¹Â¶Ãô¸ÐÊý¾ÝµÄÎÊÌâ¡£¡£¡£¡£¡£´Ë´ÎCPLTÖ÷Òª¶Ô86¸ö×éÖ¯µÄ1.2Íò·Ý²É¹ºµ¥¾ÙÐÐÉ󼯣¬£¬£¬£¬£¬ÒÔÈ·¶¨¸Ã¹ú²î±ðÒ½ÔººÍÎÀÉúЧÀÍ»ú¹¹¶Ô»¼Õß¹ºÖÃÓÃÆ·ºÍЧÀ͵ÄСÎÒ˽¼ÒºÍÃô¸ÐÊý¾ÝµÄ´¦Öóͷ£¡£¡£¡£¡£¡£·¢Ã÷Ò½ÔºµÄ12·Ý²É¹ºµ¥ºÍÎÀÉúЧÀÍ»ú¹¹µÄ6·Ý²É¹ºµ¥Ð¹Â¶ÁË»¼ÕßµÄÃô¸ÐСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊǽöÔÚËùÓÐÕßÃ÷È·Ô޳ɵÄÇéÐÎÏ²ŻªÈö²¥µÄÐÅÏ¢¡£¡£¡£¡£¡£CPLTÌåÏÖ£¬£¬£¬£¬£¬ÔÚ¹ºÖÃÉÌÆ·ºÍЧÀ͵ÄÀú³ÌÖÐй¶ÕâЩÐÅÏ¢ÇÖÕ¼ÁË»¼ÕßµÄÒþ˽£¬£¬£¬£¬£¬ÆäÒѾÏòÎÀÉú²¿·¢³ö֪ͨ£¬£¬£¬£¬£¬²¢ÎªÆä½â¾öÕâЩÎÊÌâÌṩÁËÊÖÒÕÖ§³Ö¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.consejotransparencia.cl/fiscalizacion-del-cplt-descubre-vulneracion-de-la-privacidad-de-pacientes-en-compras-de-hospitales-y-servicios-de-salud/


¾©¹«Íø°²±¸11010802024551ºÅ