¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181119

Ðû²¼Ê±¼ä 2018-11-19

1¡¢°µÍøÍйÜЧÀÍÉÌDaniel's HostingÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Áè¼Ý6500¸öÍøÕ¾±»É¾


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


11ÔÂ15ÈÕ°µÍø×î´óµÄÍøÂçÍйÜЧÀÍÉÌDaniel's HostingÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬¹¥»÷Õßɾ³ýÁË6500¶à¸öÍøÕ¾£¬£¬£¬£¬£¬²¢ÇÒÕâÐ©ÍøÕ¾¶¼Ã»Óб¸·Ý¡£¡£¡£¡£¡£¸ÃÍйÜЧÀÍÉ̱³ºóµÄ¿ª·¢Ö°Ô±Daniel Winzen֤ʵ³Æ£¬£¬£¬£¬£¬Ð§ÀÍÆ÷µÄrootÕË»§Ò²±»É¾³ýÁË£¬£¬£¬£¬£¬²¢ÇÒÆ½Ì¨ÉÏÍйܵÄÁè¼Ý6500¸öÍøÕ¾µÄÊý¾Ý¶¼Òѳ¹µ×ɥʧ¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜÊÇʹÓÃÁËphpÖеÄÁãÈÕÎó²î£¬£¬£¬£¬£¬µ«Ò²ÓпÉÄÜÊÇʹÓÃÁËÆäËüµÄÎó²î¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»Óй¥»÷ÕßÐû³Æ¶Ô´ËÊÂÈÏÕæ¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78165/cyber-crime/daniels-hosting-hacked.html


2¡¢¼ÓÃÜÓʼþЧÀÍÉÌProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƭ¹¥»÷

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ê¢ÐеļÓÃܵç×ÓÓʼþЧÀÍProtonMailÔâµ½ÒÉËÆÀÕË÷Èí¼þڲƭµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßAmFearLiathMorÉù³ÆÈëÇÖÁ˸ù«Ë¾²¢ÇÔÈ¡ÁË¡°´ó×Ú¡±µÄÓû§Êý¾Ý¡£¡£¡£¡£¡£¹¥»÷Õß½«ÆäÊê½ðÒªÇóÐû²¼ÔÚPastebinÉÏ£¬£¬£¬£¬£¬²¢ÍþвҪÏòÈ«ÌìÏÂÐû²¼»òÏúÊÛÕâЩÊý¾Ý£¬£¬£¬£¬£¬µ«²¢Î´Ìṩ±»µÁÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£ProtonMailÔÚÊÓ²ìÖ®ºó·ñ¶¨ÁËÕâÆð¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬Éù³ÆÕâÖ»ÊÇÒ»¸öÊÔͼڲƭµÄȦÌס£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78133/hacking/protonmail-hacked-hoax.html


3¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚOilRigжñÒâ»î¶¯µÄÆÊÎö±¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïOilRigÔÚÌᳫ¹¥»÷ǰ¶ÔÆä¶ñÒâÈí¼þºÍ¹¤¾ß¾ÙÐвâÊԻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£OilRigµÄ²âÊÔÁ÷³Ìͨ³£°üÀ¨¶ÔÆä½»¸¶Îĵµ¾ÙÐÐÉÙÁ¿Ð޸IJ¢Ìá½»µ½ÔÚÏßɨÃèЧÀÍ£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÎļþµÄ¶ñÒâˮƽºÍÕÒ³öÔõÑù¹æ±ÜÕâЩ¼ì²â¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷OilRigÔÚ¹¥»÷ǰ6Ìì¾Í×îÏÈÁ˲âÊԻ£¬£¬£¬£¬£¬²¢ÔÚ8ÔÂ20ÈÕ¡¢21ÈÕºÍ26ÈÕ»®·Ö¾ÙÐÐÁËÈý´Î²âÊÔ¡£¡£¡£¡£¡£Æä×îÖÕ²âÊÔÎļþµÄ½¨Éèʱ¼äÊÇÔÚ½»¸¶ÎĵµµÄ½¨Éèʱ¼ä£¨20·ÖÖÓÖ®ºóÕâЩÎĵµ¾Íͨ¹ý´¹ÂÚÓʼþ·¢ËͳöÈ¥£©µÄ8¸öСʱ֮ǰ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/


4¡¢Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïINDRIK SPIDERµÄÆÊÎö±¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


CrowdStrikeÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïNDRIK SPIDERµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2014Äê6ÔÂÒÔÀ´Ò»Ö±Ê¹ÓöñÒâÈí¼þDridex£¬£¬£¬£¬£¬²¢¿ª·¢ÁËÐí¶àеÄÄ£¿£¿ £¿éºÍÌí¼ÓÁËÐµķ´ÆÊÎö¹¦Ð§£¬£¬£¬£¬£¬ÒѾ­»ñµÃÁËÊý°ÙÍòÃÀÔªµÄ·¸·¨ÀûÈ󡣡£¡£¡£¡£µ«´Ó2017Äê7ÔÂ×îÏÈ£¬£¬£¬£¬£¬¸Ã×éÖ¯×îÏÈתÏòÐÂÀÕË÷Èí¼þBitPaymer£¬£¬£¬£¬£¬²¢ÒѾ­Í¨¹ýBitPaymer»ñµÃÁËÔ¼150ÍòÃÀÔªµÄÊÕÈë¡£¡£¡£¡£¡£BitPaymerÓëDridexÖ®¼ä±£´æÇ¿ÁÒµÄÏà¹ØÐÔ£¬£¬£¬£¬£¬ËüÃǰüÀ¨Ðí¶àÖØµþµÄ·´ÆÊÎö¹¦Ð§¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/


5¡¢Ñо¿Ö°Ô±·¢Ã÷Gmail±£´æbug£¬£¬£¬£¬£¬¿ÉÓÃÓÚÌᳫ´¹ÂÚ¹¥»÷

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ñо¿Ö°Ô±Tim Cotten·¢Ã÷Gmail±£´æÒ»¸öÎó²î£¬£¬£¬£¬£¬¿ÉÄܱ»·¸·¨·Ö×ÓʹÓÃÀ´¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎÊÌâÔ´ÓÚGmail×éÖ¯ÆäÎļþ¼ÐµÄ·½·¨£¬£¬£¬£¬£¬Ëü»áƾ֤ÓʼþÖÐFrom×ֶεĵصãÀ´½«µç×ÓÓʼþ¹éµµµ½¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖС£¡£¡£¡£¡£ÈôÊǹ¥»÷ÕßÏòÄ¿µÄ·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬²¢ÔÚFrom×ֶΰüÀ¨Ä¿µÄµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬Ôò¸ÃÓʼþ½«×Ô¶¯Í¬Ê±·¢ËÍÖÁÄ¿µÄµÄÊÕ¼þÏäºÍÒÑ·¢ËÍÎļþ¼Ð¡£¡£¡£¡£¡£Õâ¹ØÓÚ¹¥»÷ÕßÀ´Ëµ¿ÉÄÜÊÇÒ»¸ö¸£Òô£¬£¬£¬£¬£¬ÓÉÓÚ·¢ËÍÖÁÊÕ¼þÏäÀïµÄÀ¬»øÓʼþ¿ÉÄܻᱻ¹ýÂË£¬£¬£¬£¬£¬µ«·¢ËÍÖÁ¡°ÒÑ·¢ËÍ¡±Îļþ¼ÐÖеÄÓʼþ½«»á±»±£´æÏÂÀ´¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/gmail-glitch-offers-stealthy-trick-for-phishing-attacks/139167/


6¡¢InstagramÐÂÎó²îµ¼Ö²¿·ÖÓû§µÄÃÜÂë̻¶

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤The InformationµÄ±¨µÀ£¬£¬£¬£¬£¬Instagram4Ô·ÝÐû²¼µÄÓÃÓÚÏÂÔØÐ¡ÎÒ˽¼Ò×ÊÁϵŤ¾ß±£´æbug£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓû§µÄÃÜÂë̻¶¡£¡£¡£¡£¡£µ±Óû§Ê¹Óøù¦Ð§Ê±£¬£¬£¬£¬£¬ËûÃǵÄÃ÷ÎÄÃÜÂë»á·ºÆðÔÚURLÖУ¬£¬£¬£¬£¬Òò´ËÔÚ¹«¹²ÍøÂçÖÐʹÓøù¤¾ß¿ÉÄܻᵼÖÂÃÜÂëÏò¹¥»÷Õß̻¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÒѾ­ÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬²¢ÏòÊÜÓ°ÏìµÄÉÙÉÙÊýÈË·¢ËÍÁËÓʼþ֪ͨ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ç徲ר¼Òͨ¹ýÕâÒ»ÊÂÎñÖÊÒÉInstagram´æ´¢ÁËÓû§µÄÃ÷ÎÄÃÜÂ룬£¬£¬£¬£¬µ«¸Ã¹«Ë¾½²»°ÈË·ñ¶¨ÁËÕâÒ»Ö¸Ô𡣡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78173/data-breach/instagram-glitch-exposed-passwords.html


ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí