NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼ £»£»£»CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨

Ðû²¼Ê±¼ä 2020-08-04

1.NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


NordPassÓÚ2019Äê6ÔÂÖÁ2020Äê6Ô£¬£¬£¬£¬£¬ £¬£¬ÓëÄäÃû°×ñºÚ¿ÍÏàÖúɨÃèÍøÂçÉϵÄElasticsearchºÍMongoDB¿â£¬£¬£¬£¬£¬ £¬£¬·¢Ã÷Á˽üÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶ÁË105ÒÚÌõÀ´×Ô20¸ö¹ú¼ÒºÍµØÇøµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬£¬£¬ £¬£¬Ð¹Â¶Êý¾Ý×î¶àµÄÈý¸ö¹ú¼ÒÖУ¬£¬£¬£¬£¬ £¬£¬·¨¹úÒÔ51ÒÚÌõλ¾Ó°ñÊ×£¬£¬£¬£¬£¬ £¬£¬ÖйúÒÔ26ÒÚÌõ½ôËæØÊºó£¬£¬£¬£¬£¬ £¬£¬ÃÀ¹úÒÔ23ÒÚÌõλ¾ÓµÚÈý¡£¡£¡£¡£¡£¡£ÉèÖùýʧµÄÊý¾Ý¿âÊýÄ¿×î¶àµÄ¹ú¼ÒÖУ¬£¬£¬£¬£¬ £¬£¬Öйúλ¾ÓµÚÒ»£¨4000¸ö£©£¬£¬£¬£¬£¬ £¬£¬Æä´ÎÊÇÃÀ¹ú£¨3000£©ºÍÓ¡¶È£¨500£©¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬ £¬£¬ÕâЩй¶Êý¾Ý¿âͨ³£°üÀ¨µç×ÓÓʼþµØµã£¬£¬£¬£¬£¬ £¬£¬ÃÜÂëºÍµç»°ºÅÂë¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/07/30/10-billion-records-exposed-unsecured-databases/


2.ºÚ¿ÍÔÚ°µÍø¹ûÕæ¼Ò×°ÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ºÚ¿ÍÔÚ°µÍø¹ûÕæÃÀ¹úÊÒÄÚÉè¼ÆÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý¡£¡£¡£¡£¡£¡£´Ó¸ÃÊý¾Ý¿âµÄÑù±¾Öз¢Ã÷£¬£¬£¬£¬£¬ £¬£¬×ß©Êý¾Ý°üÀ¨Óû§µÄµÇ¼Ãû¡¢È«Ãû¡¢MD5¹þÏ£ÃÜÂë¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÓÊÕþ±àÂëÒÔ¼°Óë¸ÃÕ¾µãµÄʹÓÃÓйصÄÖÖÖÖÆäËûÊý¾Ý£¬£¬£¬£¬£¬ £¬£¬±ðµÄ£¬£¬£¬£¬£¬ £¬£¬Óû§ÐÅÓÿ¨µÄ×îºóËÄλÊý¿ÉÄÜÒÑй¶¡£¡£¡£¡£¡£¡£¾ÝBleepingComputer±¨¸æ³Æ£¬£¬£¬£¬£¬ £¬£¬ºÚ¿Í×éÖ¯ShinyHuntersÒÑÔÚ°µÍøÉÏÃâ·Ñ¹ûÕæÁË18¼Ò¹«Ë¾µÄÊý¾Ý¿â£¬£¬£¬£¬£¬ £¬£¬×ܼưüÀ¨3.86ÒÚÌõÓû§¼Í¼£¬£¬£¬£¬£¬ £¬£¬¶øHavenlyÒ²ÊÇÆäÖÐÖ®Ò»¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/


3.LedgerÊý¾Ý¿âÖб£´æÎó²î£¬£¬£¬£¬£¬ £¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


LedgerÈ·ÈÏÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿âµÄ±£´æÑÏÖØµÄÇå¾²Îó²î£¬£¬£¬£¬£¬ £¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶¡£¡£¡£¡£¡£¡£7ÔÂ14ÈÕ£¬£¬£¬£¬£¬ £¬£¬ÆäÑо¿Ö°Ô±·¢Ã÷LedgerÍøÕ¾ÉÏ¿ÉÄܱ£´æÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬ £¬£¬²¢ÔÚ¾ÙÐÐÁËÄÚ²¿ÊÓ²ìºóÁ¬Ã¦ÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£ÐÞ¸´Îó²îºóÒ»ÖÜ£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾·¢Ã÷Îó²îÔÚ6ÔÂ25ÈÕÒѱ»Ê¹Ó㬣¬£¬£¬£¬ £¬£¬ºÚ¿Í»á¼ûÁËÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿â¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄܵ¼ÖÂÊý°ÙÍòÈ˵ç×ÓÓʼþµØµãµÈÐÅϢй¶£¬£¬£¬£¬£¬ £¬£¬ÒÔ¼°½üÍòÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ð¹Â¶£¬£¬£¬£¬£¬ £¬£¬°üÀ¨Ãû×ÖºÍÐÕÊÏ¡¢ÓÊÕþµØµã¡¢µç»°ºÅÂëºÍ¶©¹ºµÄ²úÆ·µÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/crypto-firm-ledgers-breach-one/


4.CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÃÀ¹úÕþ¸®µÄÈý¸ö»ú¹¹CISA¡¢DODºÍFBIÁªºÏÐû²¼Á˹ØÓÚÐÂÐͶñÒâÈí¼þTaidooµÄ¾¯±¨¡£¡£¡£¡£¡£¡£¾ÝÕâÈý¸ö»ú¹¹³Æ£¬£¬£¬£¬£¬ £¬£¬´Ë¶ñÒâÈí¼þ¾ßÓÐ32λºÍ64λϵͳ°æ±¾£¬£¬£¬£¬£¬ £¬£¬Í¨³£×÷ΪЧÀͶ¯Ì¬Á´½Ó¿â£¨DLL£©×°ÖÃÔÚÊܺ¦ÕßµÄϵͳÉÏ¡£¡£¡£¡£¡£¡£¸ÃDLL°üÀ¨ÆäËûÁ½¸öÎļþ£¬£¬£¬£¬£¬ £¬£¬ÆäÒ»ÊÇ×÷ΪЧÀÍÆô¶¯µÄ¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬ £¬£¬»á½âÃܲ¢ÔÚÄÚ´æÖÐÖ´Ðеڶþ¸öÖ÷ÒªµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©Îļþ¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬ £¬£¬ºÚ¿Íͨ³ £»£»£»á½«TaidoorÓëÊðÀíЧÀÍÆ÷Ò»Æð°²ÅÅ£¬£¬£¬£¬£¬ £¬£¬ÒÔÒþ²Ø¶ñÆäÕæÊµÈªÔ´¡£¡£¡£¡£¡£¡£DODÌåÏÖ£¬£¬£¬£¬£¬ £¬£¬×Ô2008ÄêÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬Taidoor»òÒÑÔÚÒ°ÍⱻʹÓÃÖÁÉÙ12Äê¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisa-dod-fbi-expose-new-chinese-malware-strain-named-taidoor/#ftag=RSSbaffb68


5.ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Zscaler ThreatLabZÍŶӷ¢Ã÷£¬£¬£¬£¬£¬ £¬£¬ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§¡£¡£¡£¡£¡£¡£ÆäÕë¶Ô·ÇÖÞÁ½¸ö×îÖøÃû×ãÇò¾ãÀÖ²¿²¢Î±×°³É¾ãÀÖ²¿µÄ¹Ù·½Ó¦ÓÃSimba SCºÍYanga£¨Young Africans£©SC¡£¡£¡£¡£¡£¡£¾ßÓÐÔĶÁ¶ÌÐÅ¡¢»ñÈ¡ÁªÏµÈË¡¢Â¼ÖÆÒôƵ¡¢Í¨»°¹¦Ð§¡¢»á¼ûʵʱλÖᢶÁ/дÍⲿ´æ´¢¡¢ÍµÕÕÆ¬ºÍ´æÈ¡Ïà»úµÄ¹¦Ð§¡£¡£¡£¡£¡£¡£¾­ÓɽøÒ»²½ÆÊÎö£¬£¬£¬£¬£¬ £¬£¬·¢Ã÷ÕâЩAPKÊÇʹÓÃÊ¢ÐеÄÌØ¹¤Èí¼þ¹¤¾ßSpyMax¿ª·¢µÄ£¬£¬£¬£¬£¬ £¬£¬SpyMaxµÄǰÉíSpyNoteÊÇʹÓÃ×îÆÕ±éµÄÌØ¹¤Èí¼þ¿ò¼ÜÖ®Ò»¡£¡£¡£¡£¡£¡£ÓÉÓÚ¸ÃÌØ¹¤Èí¼þÔÚÆÊÎöʱ´úδ´¦Óڻ״̬£¬£¬£¬£¬£¬ £¬£¬Òò´ËÑо¿Ö°Ô±²¢Î´×·Ëݵ½ÆäÏÂÁîºÍ¿ØÖÆ£¨C£¦C£©Ð§ÀÍÆ÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/research/android-spyware-targeting-tanzania-premier-league


6.ABIÔ¤¼Æµ½2026ÄêIoTÊý¾ÝÖÎÀíЧÀͽ«´ï429ÒÚÃÀÔª


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ABI ResearchÌåÏÖÎïÁªÍøÊý¾ÝÖÎÀíЧÀÍÊÇÒ»¸ö¿ìËÙÔöÌíµÄÊг¡£¬£¬£¬£¬£¬ £¬£¬²¢Ô¤¼Æµ½2026Ä꽫¸ß´ï429ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Á÷´¦Öóͷ£ºÍÆÊÎö½â¾ö¼Æ»®µÄ·ºÆðΪÊý¾Ý¾öæÅºÍÆóÒµ¶´²ìÌṩÁ˶¯Á¦£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÓÐÁ½´óÕûÌå¶ÔÆä¾ÙÐÐÖ÷µ¼£¬£¬£¬£¬£¬ £¬£¬»®·ÖÎªÔÆÓÅÏȺͱßÑØÓÅÏÈ¡£¡£¡£¡£¡£¡£Azure¡¢AWS¡¢IBM΢Èí¡¢Cloudera¡¢Informatica¡¢Software AG ApamaºÍTIBCO¶¼Î§ÈÆÒÔÔÆÎªÖÐÐĵķ½·¨ÌṩÊý¾ÝÖÎÀíЧÀÍ£¬£¬£¬£¬£¬ £¬£¬ÕâÊÇËûÃǶÔÒѾ­±£´æµÄÈ«¿ÍÕ»¶Ëµ½¶ËÎïÁªÍø²úÆ·ºÍÄÜÁ¦µÄÔö²¹¡£¡£¡£¡£¡£¡£ScaleOut¡¢ Crosser¡¢ SWIM.aiºÍClearBladeʹÓÃÁËÒ»ÖÖÒÔ±ßÑØÎªÖÐÐĵÄÒªÁ죬£¬£¬£¬£¬ £¬£¬²¢ÓëÔÆ¹©Ó¦ÉÌÏàÖú£¬£¬£¬£¬£¬ £¬£¬ÌṩÐÐҵרÓõÄÊý¾ÝÖÎÀíÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/08/03/iot-data-management-services-42-9-billion-by-2026/