αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ£»£»£»£»£» £»£»£»ºÚ¿ÍJohn WickÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5͵ȡÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2020-06-08

1.αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¿ËÈÕ£¬ £¬£¬£¬£¬ºÚ¿ÍÕýÔÚ·Ö·¢Î±ÔìµÄSTOP DjvuÀÕË÷Èí¼þµÄ½âÃÜÆ÷£¬ £¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßµÄÎļþ¾ÙÐжþ´Î¼ÓÃÜ¡£¡£¡£¡£¡£STOP DjvuÊÇÒÑÍùÒ»ÄêÖÐ×î»îÔ¾µÄÀÕË÷Èí¼þ£¬ £¬£¬£¬£¬Æ½¾ùÌìÌìѬȾÁè¼Ý600¸öÊܺ¦Õß¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÖ÷ÒªÓ°ÏìµÄÊǼÒÍ¥Óû§£¬ £¬£¬£¬£¬Òò´ËÐí¶à±»Ñ¬È¾Óû§ÎÞ·¨Ö§¸¶500ÃÀÔªµÄÊê½ðÀ´¹ºÖýâÃÜÆ÷¡£¡£¡£¡£¡£Ö®ºóÑо¿Ö°Ô±·¢Ã÷ÁËαÔìµÄÃâ·ÑµÄSTOP Djvu½âÃÜÆ÷£¬ £¬£¬£¬£¬¿ÉÊÇËû²»»á»Ö¸´ÈκÎÎļþ£¬ £¬£¬£¬£¬µ±Óû§·­¿ª¸ÃÈí¼þ²¢µã»÷×îÏÈɨÃèºó£¬ £¬£¬£¬£¬¸Ã³ÌÐò½«ÏÂÔØ¿ÉÖ´ÐÐÎļþcrab.exe²¢ÉúÑĵ½£¥Temp£¥Îļþ¼ÐÖУ¬ £¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßÅÌËã»úÉϵÄÊý¾Ý¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±ÕýÔÚ¶Ô´ËÀÕË÷²¡¶¾¾ÙÐÐÆÊÎö¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/


2.ºÚ¿ÍJohn WickÉù³ÆÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5£¬ £¬£¬£¬£¬ÍµÈ¡Ãô¸ÐÊý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


×Ô³ÆÎªJohn WickµÄºÚ¿ÍÉù³Æ£¬ £¬£¬£¬£¬ÆäÒѹ¥»÷ÁËÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5µÄϵͳ£¬ £¬£¬£¬£¬ÇÒ͵ȡÁ˸ù«Ë¾150GBµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÌåÏÖ£¬ £¬£¬£¬£¬Æä͵ȡµÄÊý¾Ý¿âÖаüÀ¨×î½üµÄÉúÒâ¡¢ÃÜÂë¡¢µç×ÓÓʼþ¡¢ÊÖ»úºÅÂë¡¢µç×ÓÓʼþID¡¢ÐÂÎŵȣ¬ £¬£¬£¬£¬²¢Íþв½«¹ûÕæÏúÊÛ¸ÃÊý¾Ý¿âºÍ´úÂë¡£¡£¡£¡£¡£¸üÔã¸âµÄÊÇ£¬ £¬£¬£¬£¬ÏÖÔڸúڿÍÒѾ­Ðû²¼ÁËй¶Êý¾Ý¿âµÄ²¿·ÖÊý¾Ý¡¢»î¶¯Ô´´úÂëÖеÄÃÜÔ¿¡¢¶ÔAtlassian°åµÄÒýÓÃÒÔ¼°AWS´æ´¢Í°Æ¾Ö¤¡£¡£¡£¡£¡£¾Ý´ËºÚ¿Í˵£¬ £¬£¬£¬£¬ÆäÊÇÀ´×Ôº«¹úµÄÇ徲ר¼Ò£¬ £¬£¬£¬£¬´Ë´Î»î¶¯Ö÷ÒªÊÇΪÁË×ÊÖúÕâЩÈËÐÞ¸´Îó²î¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄÊÓ²ìÖУ¬ £¬£¬£¬£¬ºÚ¿ÍÊÇ·ñÀ´×Ôº«¹ú»¹ÎÞ·¨È·¶¨¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/zee5-allegedly-hacked-by-korean-hackers-customer-info-at-risk/


3.ºÚ¿Íͨ¹ýVPNÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬£¬ºÚ¿ÍʹÓÃVPNÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬£¬£¬ÒÔÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤¡£¡£¡£¡£¡£ÓÉÓÚÒßÇéÔµ¹ÊÔ­ÓÉ£¬ £¬£¬£¬£¬´ó²¿·ÖÈËÑ¡Ôñ¾Ó¼Ò°ì¹«£¬ £¬£¬£¬£¬Õâ´ó´óÔöÌíÁËVPNµÄʹÓÃÂÊ£¬ £¬£¬£¬£¬Òò´Ë¸ü¶àµÄºÚ¿Í»áÊÔͼ½«Æä×÷Ϊ¹¥»÷ǰÑÔ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÖкڿÍð³äÊÕ¼þÈ˹«Ë¾µÄITÖ§³Ö²¿·Ö·¢ËÍ֪ͨÓʼþ£¬ £¬£¬£¬£¬ÓʼþÖаüÀ¨Ò»¸öÖ¸ÏòеÄÓÃÓÚ¼ÒÍ¥»á¼ûµÄVPNÉèÖõÄÁ´½Ó¡£¡£¡£¡£¡£·¢¼þÈ˵ĵç×ÓÓʼþµØµã±»Î±×°³ÉÊܺ¦Õß¹«Ë¾µÄÓò£¬ £¬£¬£¬£¬´Ó¶øÓÕʹÊܺ¦Õßµã»÷Á´½Ó£¬ £¬£¬£¬£¬ÒÔ½«ÆäÖØ¶¨Ïòµ½office365ƾ֤´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://hotforsecurity.bitdefender.com/blog/hackers-use-vpn-impersonation-in-phishing-emails-to-steal-office-365-credentials-23456.html


4.ÐÂÀÕË÷Èí¼þKupidonÖ÷ÒªÕë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


MalwareHunterTeamÓÚ5ÔÂ9ÈÕÊ״η¢Ã÷ÐÂÀÕË÷Èí¼þKupidon£¬ £¬£¬£¬£¬Æä²»µ«Õë¶Ô¹«Ë¾ÍøÂ磬 £¬£¬£¬£¬»¹Õë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷¸ÃÀÕË÷Èí¼þµÄÑù±¾£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±»ùÓÚÓëÊܺ¦ÕßµÄÅÊ̸ºÍÉÏ´«µÄÎļþ¾ÙÐÐÆÊÎö¡£¡£¡£¡£¡£ºÚ¿ÍÒ»µ©½øÈëÍøÂ磬 £¬£¬£¬£¬±ã»á¼ÓÃÜÊܺ¦ÕßÎļþ£¬ £¬£¬£¬£¬ÔÚÎļþÃûºó¸½¼Ó.kupidonÀ©Õ¹Ãû£¬ £¬£¬£¬£¬²¢ÁôÏÂÊê½ðÒªÇ󡣡£¡£¡£¡£ÆäÖУ¬ £¬£¬£¬£¬Õë¶ÔÆóÒµËüÒªÇóµÄÊê½ðΪ1200ÃÀÔªµÄ±ÈÌØ±Ò£¬ £¬£¬£¬£¬Õë¶Ô¼ÒÍ¥Óû§ÒªÇó300ÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£Ò»µ©Óû§Ö§¸¶Êê½ðºó±ã»áÊÕµ½AES½âÃÜÃÜÔ¿ºÍKupidon½âÃÜÆ÷¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»ÓиÃÀÕË÷²¡¶¾µÄÑù±¾£¬ £¬£¬£¬£¬Òò´ËÉÐÎÞ·¨ÖªµÀ¸ÃÈí¼þÊÇ·ñ±£´æÎó²î¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kupidon-is-the-latest-ransomware-targeting-your-data/


5.Ñо¿Ö°Ô±·¢Ã÷FacebookÖжà¸öSSRFÎó²î£¬ £¬£¬£¬£¬»ñ3.1ÍòÃÀÔª½±½ð


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±Bipin Jitiya·¢Ã÷Facebook±£´æ¶à¸öSSRFÎó²î£¬ £¬£¬£¬£¬Á¬ÏµÊ¹ÓÃÕâЩÎó²î»á¶Ôƽ̨±¬·¢ÑÏÖØµÄÓ°Ï죬 £¬£¬£¬£¬²¢Òò´Ë»ñµÃÁËFacebookÌṩµÄ×ܼÆ31500ÃÀÔª½±½ð¡£¡£¡£¡£¡£¸ÃÑо¿Ö°Ô±Ê×ÏÈ·¢Ã÷µÄÊÇshortURLʹÃüÖÐȱÉÙÈÏÖ¤»á»°£¬ £¬£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔÔÚ²»¾ÙÐÐÉí·ÝÑéÖ¤µÄÇéÐÎÏ»á¼û´ËЧÀÍ£¬ £¬£¬£¬£¬ºÚ¿Í¿ÉÄÜʹÓÃÆäͨ¹ýSSRF¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬Ëû·¢Ã÷ÁËFacebook¶ÌµØµã(https://fb.me/)ÖеÄSSRFÎó²î£¬ £¬£¬£¬£¬¸ÃÎó²îй¶ÁËÈÕÖ¾Îļþ¼ÐµÄÄÚ²¿Â·¾¶¡¢ÆäËûÎļþ·¾¶¡¢Ê¹ÓÃfetchÊý¾ÝµÄÄÚ²¿ÏµÍ³ÅÌÎÊ¡¢ÄÚ²¿IPµØµã¡¢ÄÚ²¿ID¡¢ÉèÖÃÏà¹ØÐÅÏ¢¡¢Ë½ÓÐÎĵµµÈÐÅÏ¢¡£¡£¡£¡£¡£JitiyaÌåÏÖ£¬ £¬£¬£¬£¬Á¬ÏµÕâÁ½¸öÎó²î£¬ £¬£¬£¬£¬¿ÉÄܵ¼Ö¶ÔÄÚ²¿»ù´¡ÉèÊ©µÄ·¾¶±éÀúºÍSSRF¹¥»÷¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/07/hacker-won-31k-bounty-for-reporting-numerous-facebook-bugs/


6.ÖÇÀûCPLTÊÓ²ìÏÔʾ£¬ £¬£¬£¬£¬¸Ã¹úÒ½ÁÆÐÐÒµ±£´æÃô¸ÐÊý¾Ýй¶ÎÊÌâ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÖÇÀû͸Ã÷¶ÈίԱ»á£¨The Chilean Transparency Council £¬ £¬£¬£¬£¬CPLT£©¶ÔÆäÎÀÉú²¿·Ö¾ÙÐÐÊӲ죬 £¬£¬£¬£¬·¢Ã÷±£´æÐ¹Â¶Ãô¸ÐÊý¾ÝµÄÎÊÌâ¡£¡£¡£¡£¡£´Ë´ÎCPLTÖ÷Òª¶Ô86¸ö×éÖ¯µÄ1.2Íò·Ý²É¹ºµ¥¾ÙÐÐÉ󼯣¬ £¬£¬£¬£¬ÒÔÈ·¶¨¸Ã¹ú²î±ðÒ½ÔººÍÎÀÉúЧÀÍ»ú¹¹¶Ô»¼Õß¹ºÖÃÓÃÆ·ºÍЧÀ͵ÄСÎÒ˽¼ÒºÍÃô¸ÐÊý¾ÝµÄ´¦Öóͷ£¡£¡£¡£¡£¡£·¢Ã÷Ò½ÔºµÄ12·Ý²É¹ºµ¥ºÍÎÀÉúЧÀÍ»ú¹¹µÄ6·Ý²É¹ºµ¥Ð¹Â¶ÁË»¼ÕßµÄÃô¸ÐСÎÒ˽¼ÒÊý¾Ý£¬ £¬£¬£¬£¬ÕâЩÊý¾ÝÊǽöÔÚËùÓÐÕßÃ÷È·Ô޳ɵÄÇéÐÎÏ²ŻªÈö²¥µÄÐÅÏ¢¡£¡£¡£¡£¡£CPLTÌåÏÖ£¬ £¬£¬£¬£¬ÔÚ¹ºÖÃÉÌÆ·ºÍЧÀ͵ÄÀú³ÌÖÐй¶ÕâЩÐÅÏ¢ÇÖÕ¼ÁË»¼ÕßµÄÒþ˽£¬ £¬£¬£¬£¬ÆäÒѾ­ÏòÎÀÉú²¿·¢³ö֪ͨ£¬ £¬£¬£¬£¬²¢ÎªÆä½â¾öÕâЩÎÊÌâÌṩÁËÊÖÒÕÖ§³Ö¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.consejotransparencia.cl/fiscalizacion-del-cplt-descubre-vulneracion-de-la-privacidad-de-pacientes-en-compras-de-hospitales-y-servicios-de-salud/