GTPÐÒé±£´æÎó²î£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓöԷäÎÑÍøÂç¾ÙÐÐDoS¹¥»÷£»£»£»£»£»ºÚ¿Íð³äÇå¾²ÍøÕ¾privnote.comÇÔÈ¡±ÈÌØ±Ò
Ðû²¼Ê±¼ä 2020-06-151.GTPÐÒé±£´æÎó²î£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓöԷäÎÑÍøÂç¾ÙÐÐDoS¹¥»÷
Positive TechnologiesÐû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬£¬£¬GTPÐÒé±£´æÎó²î£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓöԷäÎÑÍøÂç¾ÙÐÐDoS¹¥»÷¡¢Ú²Æ¹¥»÷ºÍÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËʹÓÃ2G¡¢3G¡¢4GÍøÂçµÄ×°±¸£¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·ÖʹÓÃ5GÍøÂçµÄÊÖ»ú×°±¸¡£¡£¡£¡£¡£¡£±¨¸æÌåÏÖ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ëù²âÊÔµÄÿһ¸öÍøÂç¶¼±£´æ¸ÃÎó²î£¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÌᳫDoS¹¥»÷¡¢ÆÆËðÕýµ±Óû§µÄ»á¼ûȨÏÞ¡¢ÇÔÈ¡ÍøÂçЧÀͺʹø¿í»òÕßй¶Óû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£Positive TechnologiesÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚÐÒéµÄϵͳ½á¹¹Öжø²»ÊÇ×ÅʵÏÖÖУ¬£¬£¬£¬£¬£¬²¢ÇÒÑо¿Ö°Ô±½¨ÒéÓû§ÔÚGTP¼¶±ð¹ýÂËÁ÷Á¿²¢½ÓÄÉGSMAÇå¾²½¨ÒéÒÔ·ÀÓù¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/vulnerabilities---threats/protocol-vulnerability-threatens-mobile-networks/d/d-id/1338068
2.Ó¢¹úÁè¼Ý10Íò¸öÉãÏñÍ·±£´æÎó²î£¬£¬£¬£¬£¬£¬Ò×±»ºÚ¿ÍʹÓÃ
Ó¢¹úÒ»ÏîÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¸Ã¹úµÄ¼ÒÍ¥ºÍÆóÒµÖÐÓÐÁè¼Ý10Íò¸öÊÒÄÚÉãÏñÍ·¿ÉÄܱ£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬Ê¹ÆäÈÝÒ×Êܵ½ºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓ¦ÓÃCamHiµÄÉãÏñÍ·£¬£¬£¬£¬£¬£¬°üÀ¨ÖîÈçAccfly£¬£¬£¬£¬£¬£¬ieGeekºÍSV3CµÈÊܽӴýµÄÆ·ÅÆ£¬£¬£¬£¬£¬£¬¶¼±£´æ¸ÃÎó²î¡£¡£¡£¡£¡£¡£ºÚ¿Í¿ÉÒÔʹÓøÃÎó²îÇÔÈ¡Êý¾Ý¡¢Õë¶ÔÆäËûÎïÁªÍø×°±¸·¢¶¯¹¥»÷»òÕß¼àÊÓÓû§¡£¡£¡£¡£¡£¡£½öÔÚÒÑÍùµÄÈý¸öÔÂÖУ¬£¬£¬£¬£¬£¬¾ÍÓÐÁè¼Ý12Íò¸ö×°±¸ÒÑÔÚÓ¢¹ú¼¤»îʹÓ㬣¬£¬£¬£¬£¬¶øÔ¤¼ÆÈ«ÇòÔ¼ÓÐ350Íò´ËÀàÉãÏñÍ·ÕýÔÚ±»Ê¹Ó㬣¬£¬£¬£¬£¬²¢ÇÒÖ÷ÒªÂþÑÜÔÚÔÚÑÇÖÞµØÇø¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/uk-security-cameras-risk-hacking/
3.Messenger±£´æÎó²î£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓÃÖ´ÐжñÒâÈí¼þ
ÍøÂçÇå¾²¹«Ë¾Reason SecurityµÄÑо¿Ö°Ô±·¢Ã÷ÁËFacebook Messenger±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËWindows 460.16°æµÄFacebook Messenger¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ú¹ÊÍ£¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÓÐŲÓüÓÔØÁËc:\ Python27Ŀ¼ÏµÄPython27£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öµÍÍêÕûÐÔµÄλÖ㬣¬£¬£¬£¬£¬Òâζ×Åÿ¸ö¶ñÒâ³ÌÐòÔÚûÓÐÈκÎȨÏÞµÄÇéÐÎ϶¼¿ÉÒÔ»á¼û¸Ã·¾¶¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÐ®ÖÆÐÅʹ´úÂëÖеÄ×ÊԴŲÓ㬣¬£¬£¬£¬£¬ÒÔÔËÐжñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬FacebookÐû²¼ÁË480.5°æMessenger£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/06/14/facebook-messenger-app-vulnerability-allowed-persistent-malware-attacks/
4.ºÚ¿Íð³äÇå¾²ÍøÕ¾privnote.comÇÔÈ¡±ÈÌØ±Ò
¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬ºÚ¿ÍαÔìÁËÃûΪPrivnotes.com µÄÍøÕ¾£¬£¬£¬£¬£¬£¬Ã°³äÇå¾²ÍøÕ¾privnote.comÒÔÇÔÈ¡±ÈÌØ±Ò¡£¡£¡£¡£¡£¡£Krebs·¢Ã÷ºÚ¿Í½¨ÉèPrivnotes.comÊÇΪÁËÇÔȡͨ¹ýÆäƽ̨·¢Ë͵ļÓÃÜÇ®±Ò¸¶¿îÇëÇ󣬣¬£¬£¬£¬£¬µ±Óû§Õ³ÌùµÄÄÚÈݰüÀ¨±ÈÌØ±ÒµØµãʱ£¬£¬£¬£¬£¬£¬¸ÃαÔìÍøÕ¾½«¸ü¸Ä±ÈÌØ±ÒµØµã£¬£¬£¬£¬£¬£¬ÒÔʵÑéÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÎªÁË×èÖ¹±»·¢Ã÷£¬£¬£¬£¬£¬£¬¸ü¸ÄºóµÄµØµãµÄǰËĸö×Ö·ûÓëÔʼճÌùµÄµØµãÏàͬ£¬£¬£¬£¬£¬£¬²¢ÇÒÖ»ÓÐÔÚÓ뽨ÉèÕß²î±ðµÄIPµØµãÕ³Ìùʱ£¬£¬£¬£¬£¬£¬ÍøÕ¾²Å»á¸ü¸Ä±ÈÌØ±ÒµØµã£¬£¬£¬£¬£¬£¬ÒÔÌá¸ßÒþ²ØÐÔ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/attackers-impersonate-secure-messaging-site-to-steal-bitcoins/
5.×Éѯ¹«Ë¾Threadstone AdvisorsÔâMazeÀÕË÷Èí¼þ¹¥»÷
ÃÀ¹ú´Óʲ¢¹ºÊÕ¹ºµÄ×Éѯ¹«Ë¾Threadstone AdvisorsÔâµ½MazeÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Êý¾Ýй¶¡£¡£¡£¡£¡£¡£¸ÃºÚ¿Í×éÖ¯ÔÚÌᳫ¹¥»÷ºó£¬£¬£¬£¬£¬£¬±ãÐû²¼ÁËÊê½ð֪ͨÒÔ¼°Threadstone¶ÊÂ×Ü˾ÀíJoshua GoldbergµÄµç»°ºÅÂëºÍµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬ÏÖÔÚÓÖÔÚÆäй¶վµãÉÏÐû²¼ÁË¿´ËÆÊÇ´ÓThreadstoneϵͳµÁ×ßµÄÎļþ¡£¡£¡£¡£¡£¡£ThreadstoneÊÇÒ»¼ÒλÓÚÂóµÏÑ·´ó½ÖµÄ×Éѯ¹«Ë¾£¬£¬£¬£¬£¬£¬¹«Ë¾¿Í»§°üÀ¨Victoria Beckham¡¢Charles S. Cohen¡¢Æ¥×ȱ¤Æ¡¾Æ¹«Ë¾, Harrys of LondonÒÔ¼° Xcel Brands.¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúThreadstoneÊÇ·ñÒÑÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/104718/cyber-crime/threadstone-advisors-maze-ransomware.html
6.ÀÕË÷Èí¼þBlack KingdomʹÓÃPulse VPNµÄÎó²î¹¥»÷ÍøÂç
²¨À¼µÄÇ徲ЧÀ͹«Ë¾REDTEAM.PL·¢Ã÷£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þBlack KingdomÕýÔÚʹÓÃPulse Secure VPNÖеÄÎó²î£¨CVE-2019-11510£©¹¥»÷ÆóÒµÍøÂç¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ2019Äê4ÔÂǰµÄ°æ±¾ÖУ¬£¬£¬£¬£¬£¬¶ø¸ÃÎó²îµÄ²¹¶¡³ÌÐòÒѾÐû²¼£¬£¬£¬£¬£¬£¬µ«²¿·Ö×éÖ¯ÒÀȻûÓоÙÐиüÐÂÉý¼¶¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þͨ¹ýð³äΪGoogle Chromeä¯ÀÀÆ÷µÄÍýÏë±íʹÃüÀ´Òþ²Ø£¬£¬£¬£¬£¬£¬¸ÃʹÃü½«ÔÚÒþ²ØµÄPowerShell´°¿ÚÖÐÔËÐÐBase64±àÂëµÄ×Ö·û´®´úÂ룬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡ ¾ç±¾reverse.ps1£¬£¬£¬£¬£¬£¬²¢Í¨¹ý¸Ã¾ç±¾ÔÚÊÜѬȾÖ÷»úÉÏ·¿ª·´ÏòShell¡£¡£¡£¡£¡£¡£¾ç±¾reverse.ps1ËùÔÚµÄIPµØµãÊÇ198.13.49.179£¬£¬£¬£¬£¬£¬¿É±»ÆÊÎöΪÈý¸öÓò£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÓòÅþÁ¬µ½ÍйÜAndroidºÍ¼ÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þµÄÃÀ¹úºÍÒâ´óÀûµÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/black-kingdom-ransomware-hacks-networks-with-pulse-vpn-flaws/


¾©¹«Íø°²±¸11010802024551ºÅ