µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬£¬Ó°Ïì2ÍòÓû§£»£»£»£»£»ÓÎÏ·ÍøÕ¾Emuparadiseй¶110Íò»áÔ±µÄÕÊ»§ÐÅÏ¢

Ðû²¼Ê±¼ä 2019-06-11
1¡¢ÓÎÏ·ÍøÕ¾Emuparadiseй¶110Íò»áÔ±µÄÕÊ»§ÐÅÏ¢

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ÓÎÏ·ÍøÕ¾EmuparadiseÔÚ2018Äê4ÔÂÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬µ¼Ö½ü110ÍòÂÛ̳³ÉÔ±µÄÕË»§ÐÅϢй¶¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÕË»§µÄµç×ÓÓʼþµØµã¡¢IPµØµã¡¢Óû§ÃûºÍ¼ÓÑÎMD5¹þÏ£ÃÜÂë¡£¡£¡£Have I Been PwndÍøÕ¾³ÆËüÔÚ2019Äê6ÔÂ9ÈÕ´ÓDeHashed.comÎüÊÕµ½¸ÃÊý¾Ý¿â£¬£¬µ«DeHashedÔõÑù»ñµÃ¸ÃÊý¾Ý¿âµÄ·½·¨ÈÔȻδ֪¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/retro-gaming-site-emuparadise-suffered-data-breach-exposing-account-details-of-11-million-members-3ffd53d5

2¡¢ÃÀ¹úº£¹ØºÍÁìÍÁ±£»£»£»£»£»¤¾Ö·Ö°üÉÌй¶ÓοͳµÅƼ°ÕÕÆ¬

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ÃÀ¹úº£¹ØºÍÁìÍÁ±£»£»£»£»£»¤¾Ö£¨CBP£©Ö¤ÊµÆäÒ»¸ö·Ö°üÉÌÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬µ¼ÖÂÓο͵ijµÅƺÍÕÕÆ¬ÐÅϢй¶¡£¡£¡£CBPÔÚÐÂΟåÖÐÌåÏÖ£¬£¬¸Ã·Ö°üÉÌÎ¥·´ÁËCBPµÄÕþ²ß£¬£¬Î´¾­ÊÚȨµØ½«CBPÍøÂçµÄ³µÅƺÍÓοÍÕÕÆ¬´æ´¢ÔÚ¹«Ë¾ÄÚ²¿Ð§ÀÍÆ÷ÖУ¬£¬²¢ÔÚºÚ¿ÍÈëÇÖÊÂÎñÖÐй¶¡£¡£¡£CBP²¢Î´Í¸Â¶¸Ã·Ö°üÉ̵ÄÃû×Ö£¬£¬µ«Ïà¹ØÃ½Ì屨µÀÖ¸³ö¿ÉÄÜÊÇPerceptics¹«Ë¾¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/cbp-says-hackers-stole-license-plate-and-travelers-photos/

3¡¢µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬£¬Ó°Ïì2ÍòÓû§

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
µÂ¹úÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©ÖÒÑÔÔڸùúÏúÊÛµÄÖÁÉÙËÄ¿îÖÇÄÜÊÖ»úÐͺŵĹ̼þÖб»Ö²ÈëºóÃÅ£¬£¬ÊÜÓ°ÏìµÄÐͺŰüÀ¨Doogee BL7000¡¢M-Horse Pure 1¡¢Keecoo P11ºÍVKworld Mix Plus¡£¡£¡£ÕâËÄ¿îÊÖ»ú¶¼ÊǵͶËAndroidÊÖ»ú¡£¡£¡£BSI³ÆÕâЩÊÖ»úµÄ¹Ì¼þ°üÀ¨Ò»¸öÃûΪAndr/Xgen2-CYµÄºóÃÅľÂí¡£¡£¡£¸ÃľÂí¿ÉÍøÂç×°±¸µÄÏêϸÐÅÏ¢²¢Æ¾Ö¤C&CµÄÏÂÁîÖ´ÐжñÒâ²Ù×÷¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/germany-backdoor-found-in-four-smartphone-models-20000-users-infected/

4¡¢Ð¶ñÒâÍÚ¿ó»î¶¯£¬£¬Ê¹ÓÃWebLogicÎó²î·Ö·¢ÃÅÂÞ±Ò¿ó¹¤

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Ç÷ÊÆ¿Æ¼¼·¢Ã÷Ò»¸öʹÓÃWebLogicÎó²î·Ö·¢ÃÅÂޱҿ󹤵ÄжñÒâÍÚ¿ó»î¶¯¡£¡£¡£¹¥»÷ÕßʹÓÃ4Ô·ݱ»ÐÞ¸´µÄWebLogic·´ÐòÁл¯Îó²î£¨CVE-2019-2725£©ÊµÑé¹¥»÷£¬£¬¸ÃÎó²î¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐС£¡£¡£¹¥»÷ÕßʹÓõĻìÏýÊÖÒÕÒ²ºÜÌØÊ⣺ËûÃǽ«¶ñÒâ´úÂëÒþ²ØÔÚÖ¤ÊéÎļþÖС£¡£¡£ÕâЩ֤ÊéÎļþ¿´ÆðÀ´ÏñͨË×µÄÒþ˽ÔöÇ¿Óʼþ£¨PEM£©ÃûÌÃÖ¤Ê飬£¬µ«ÏÖʵÉϰüÀ¨ÓÃÓÚÏÂÔØºÍÖ´ÐÐpayloadµÄ¶ñÒâPowerShell¾ç±¾¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-2725-exploited-and-certificate-files-used-for-obfuscation-to-deliver-monero-miner/

5¡¢MuddyWaterй¥»÷»î¶¯£¬£¬·Ö·¢¶à½×¶ÎºóÃÅPOWERSTATS V3

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Ç÷ÊÆ¿Æ¼¼Çå¾²Ñо¿Ö°Ô±·¢Ã÷MuddyWaterÔÚй¥»÷»î¶¯ÖÐʹÓÃÁËеĶà½×¶ÎPowerShellºóÃÅPOWERSTATS v3¡£¡£¡£¸ÃºóÃű»ÓÃÓÚÕë¶ÔÔ¼µ©´óѧºÍÍÁ¶úÆäÕþ¸®µÄÍøÂç´¹ÂÚ¹¥»÷ÖС£¡£¡£¸ÃºóÃÅ¿ÉÍøÂç²Ù×÷ϵͳµÄÐÅÏ¢²¢ÉÏ´«ÖÁC&CЧÀÍÆ÷£¬£¬ÔÚÎüÊÕµ½ÏìÓ¦µÄÏÂÁîºó£¬£¬¸ÃºóÃÅ»¹¿ÉÓÃÓÚÏÂÔØºÍ×°ÖÃÆäËüpayload¡£¡£¡£Ç÷ÊÆ¿Æ¼¼ÊӲ쵽¹¥»÷ÕßÔÚ1Ô·ݷַ¢.NETºóÃÅSHARPSTATS£¬£¬²¢ÔÚͳһ¸öÔÂÇл»µ½DelphiºóÃÅDELPHSTATS£»£»£»£»£»ÔÚ3ÔºÍ4Ô¹¥»÷ÕßÖ÷Òª·Ö·¢POWERSTATS v2£¬£¬²¢ÔÚ5Ô·ÝÇл»µ½POWERSTATS v3¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools/

6¡¢VLC²¥·ÅÆ÷Ðû²¼Ð°汾3.0.7£¬£¬ÐÞ¸´43¸öÇå¾²Îó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
VLC²¥·ÅÆ÷ÔÚа汾3.0.7ÖÐÐÞ¸´ÁË43¸öÇå¾²Îó²î£¬£¬°üÀ¨2¸ö¸ßΣÎó²î¡¢21ÆäÖÐΣÎó²îºÍ20¸öµÍΣÎó²î¡£¡£¡£Á½¸ö¸ßΣÎó²î»®·ÖÊÇÒÀÀµ¿âfaad2ÖеÄÔ½½çдÎó²îºÍRISTÄ£¿£¿£¿éÖеÄÕ»»º³åÇøÒç³öÎó²î¡£¡£¡£ÆäËüÎó²î°üÀ¨Ô½½ç¶Á¡¢¶ÑÒç³ö¡¢NULL½âÒýÓá¢use-after-freeµÈÇå¾²ÎÊÌâ¡£¡£¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://gbhackers.com/vlc-3-0-7-released/