Daimler Git´æ´¢¿â̻¶µ¼Ö¼²³ÛOLUÔ´´úÂëй¶£»£» £»º½¿Õ¹«Ë¾EasyJet 900Íò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2020-05-20

1.Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬¼²³Û×é¼þOLUÔ´´úÂëй¶


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¾ÝZDNet±¨µÀ£¬£¬£¬Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬ÆäÖаüÀ¨×°ÖÃÔÚMercedez¼²³Û»õ³µÖеİåÔØÂß¼­µ¥Î»£¨OLU£©µÄÔ´´úÂë¡£¡£¹¤³ÌʦTill Kottmann·¢Ã÷£¬£¬£¬ËûÔÚMercedez¼²³ÛµÄ´úÂëÍйÜÍøÕ¾DaimlerÖÐʹÓÃí§Òâµç×ÓÓʼþ×¢²áÒ»¸öÕ˺ţ¬£¬£¬±ã¿ÉÒÔ»á¼ûÆäÁè¼Ý580¸öGit´æ´¢¿â¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨OLUÔ´´úÂë¡¢Raspberry PiÓ³Ïñ¡¢Ð§ÀÍÆ÷Ó³Ïñ¡¢ÓÃÓÚÖÎÀíÔ¶³ÌOLUµÄÄÚ²¿Daimler×é¼þ¡¢ÄÚ²¿Îĵµ¡¢´úÂëʾÀýµÈ¡£¡£ÍþвÇ鱨¹«Ë¾UnderÌåÏÖ£¬£¬£¬ËûÃÇͨ¹ýÉó²é»¹·¢Ã÷ÁËDaimlerÄÚ²¿ÏµÍ³µÄÃÜÂëºÍAPIÁîÅÆ£¬£¬£¬¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖDaimlerÔÆºÍÄÚ²¿ÍøÂç¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/mercedes-benz-onboard-logic-unit-olu-source-code-leaks-online/


2.µÂÖÝÔÙÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Õë¶ÔÆä½»Í¨ÔËÊ䲿ϵͳ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ò»¸öÔÂÄڵ¿ËÈøË¹ÖÝÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔµÄÊǸÃÖݵĽ»Í¨ÔËÊ䲿ϵͳ£¬£¬£¬ÏÖÔÚ¸ÃϵͳÒѱ»ÆÈ¹Ø±Õ¡£¡£µÂÖݽ»Í¨ÔËÊ䲿£¨TxDOT£©È·ÈÏ£¬£¬£¬5ÔÂ14ÈÕÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÓÐδ¾­ÊÚȨ»á¼û¸Ã»ú¹¹ÍøÂ磬£¬£¬¸Ã»ú¹¹·¢Ã÷ºóÁ¬Ã¦½ÓÄɲ½·¥£¬£¬£¬±ÜÃâ½øÒ»²½¹¥»÷¡£¡£5ÔÂ8ÈÕ£¬£¬£¬µÂ¿ËÈøË¹ÖÝÔâµ½µÚÒ»´Î¹¥»÷£¬£¬£¬ÀÕË÷Èí¼þ²¡¶¾Ñ¬È¾Á˸ÃÖݵķ¨ÔºÏµÍ³¡£¡£ÏÖÔÚ£¬£¬£¬Éв»ÇåÎúÁ½´Î¹¥»÷ÊÇ·ñÓйØÁª£¬£¬£¬Ò²Ã»ÓйØÓÚÕâÁ½´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/103410/cyber-crime/txdot-ransomware-attack.html


3.Ó¢¹úº½¿Õ¹«Ë¾EasyJetÔâ¹¥»÷£¬£¬£¬900Íò¿Í»§ÐÅϢй¶


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ó¢¹ú×î´óµÄº½¿Õ¹«Ë¾EasyJeÌåÏÖ£¬£¬£¬ËûÃÇÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬²¢Ð¹Â¶ÁË900Íò¿Í»§µÄÐÅÏ¢¡£¡£ÔÚÕâ´Î¹¥»÷ÖУ¬£¬£¬ºÚ¿Í»á¼ûÁ˸ù«Ë¾900Íò¿Í»§µÄµç×ÓÓʼþµØµãºÍÂÃÐÐÐÅÏ¢£¬£¬£¬ÉÐÓÐÆäÖÐ2208λ¿Í»§µÄÐÅÓÿ¨ÏêϸÐÅÏ¢¡£¡£EasyJetÔÚ·¢Ã÷´ËÊÂÎñºó£¬£¬£¬±ã֪ͨÁËÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍICO£¬£¬£¬²¢ÌåÏÖÏÖÔÚËûÃÇÕýÔÚ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬Ô¤¼ÆÔÚ2020Äê5ÔÂ26ÈÕ֮ǰËùÓÐÊÜÓ°Ïì¿Í»§¶¼½«ÊÕµ½Í¨Öª¡£¡£ÏÖÔÚÉÐÎÞ´ËÊÂÎñµÄÏêϸÐÅÏ¢¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/easyjet-hacked-data-breach-affects-9-million-customers/


4.ºÚ¿Íð³äÃÀ¹ú²ÆÎñ²¿Óô¹ÂÚÓʼþ·Ö·¢»ùÓÚNode.jsµÄRAT


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Abuse.ch·¢Ã÷ÁËеĴ¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬ºÚ¿Íαװ³ÉÃÀ¹ú²ÆÎñ²¿À´·Ö·¢»ùÓÚNode.jsµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©ºÍÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¡£Ê×ÏȺڿͻáÉù³ÆÓÉÓÚÒøÐÐÐÅÏ¢²»×¼È·£¬£¬£¬Î´Ö§¸¶Õþ¸®ÌõÔ¼µÄ¿î×Ó£¬£¬£¬Ö®ºó»áͨ¹ýµç×ÓÓʼþÌáÐÑÓû§¼ì²é¸½¼þÎĵµÊÇ·ñÓÐÎ󡣡£Óʼþ¸½¼þÖаüÀ¨ÃûΪCONTRACT PAYMENT.jarµÄÎļþ£¬£¬£¬Óû§Ö´Ðкó½«ÏÂÔØNode.jsºÍWizard.js¾ç±¾²¢´æ´¢ÔÚ£¥UserProfile \ qnodejs-node-v13.13.0-win-x64Îļþ¼ÐÖС£¡£¸ÃNode.js¶ñÒâÈí¼þQNodeService¾ßÓÐ×ÔÎÒ¸üС¢»ñÈ¡»úеÐÅÏ¢£¨ÀýÈçIPµØµã¡¢»úеÃû³Æ¡¢Î»Öá¢Óû§ÃûºÍ²Ù×÷ϵͳ°æ±¾£©¡¢Ö´ÐÐÏÂÁɾ³ýºÍдÈëÎļþ¡¢´ÓÖÖÖÖÓ¦ÓóÌÐò£¨ÀýÈçChromeºÍFirefox£©ÖÐÇÔÈ¡ÃÜÂëµÄ¹¦Ð§¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-us-dept-of-treasury-emails-spreads-new-nodejs-malware/


5.FBIÐû²¼ÖÒÑÔ£¬£¬£¬ÀÕË÷Èí¼þProLockʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


FBIÐû²¼ÁËÒ»¸öÇå¾²¾¯±¨£¬£¬£¬ËµÃ÷ÎúÐÂÐÍÀÕË÷Èí¼þProLock¿ÉÒÔʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç¡£¡£¸Ã²¡¶¾ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬Òѱ»ÓÃÓÚÒ½ÁƱ£½¡×éÖ¯¡¢Õþ¸®»ú¹¹¡¢½ðÈÚ»ú¹¹ºÍÁãÊÛ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£¡£FBI·¢Ã÷ProLock¿ÉÒÔͨ¹ýQakbot»á¼û±»ºÚµÄÍøÂ磬£¬£¬Òò´ËÒ»µ©·¢Ã÷ѬȾÁËQakbotµÄÅÌËã»ú£¬£¬£¬±ØÐ辡¿ì½«ÆäÓëÍøÂçµÄÆäÓಿ·Ö¸ôÀë¡£¡£ÁíÍ⣬£¬£¬FBI»¹ÖÒÑÔºÚ¿ÍÍÅ»ïÔÚÊܺ¦ÕßÖ§¸¶Êê½ðºóÌṩµÄ½âÃÜÆ÷¿ÉÄÜÎÞ·¨Õý³£ÊÂÇ飬£¬£¬»áÆÆËð´óÓÚ64MBµÄÎļþ£¬£¬£¬²¢¿ÉÄܵ¼ÖÂ100MBÒÔÉϵÄÎļþÿ1KBɥʧԼĪ1¸ö×Ö½Ú¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-prolock-ransomware-gains-access-to-victim-networks-via-qakbot-infections/


6.VerizonÐû²¼2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬DoS¹¥»÷Ôö¶à


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬ÆÊÎöÁË16¸ö±ÊÖ±ÐÐÒµµÄ32002ÆðÇå¾²ÊÂÎñºÍ3950ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£±¨¸æÏÔʾ£¬£¬£¬ÒÑÍùÒ»ÄêDoS¹¥»÷µÄÊýÄ¿ÓÐËùÔöÌí£¨1.3ÍòÆð£¬£¬£¬Õ¼Çå¾²ÊÂÎñµÄ40£¥£©£¬£¬£¬Óë´Ëͬʱ£¬£¬£¬ÍøÂçÌØ¹¤¹¥»÷ïÔÌ­£¬£¬£¬ÔÚÊý¾Ýй¶ÊÂÎñÖеÄÕ¼±È´Ó13.5£¥Ï½µµ½3.2£¥¡£¡£ÔÚÊý¾Ýй¶·½Ã棬£¬£¬¿ìÒªÒ»°ë£¨45£¥£©µÄÊÂÎñÊÇÓÉÓÚÏÖʵ¹¥»÷£¬£¬£¬¶ø22£¥ÔòÓÉÓÚÉç»á¹¤³Ì¹¥»÷¡£¡£22£¥µÄÈëÇÖÉæ¼°µ½¶ñÒâÈí¼þ£¬£¬£¬¶ø17£¥ÊÇÓɹýʧÔì³ÉµÄ¡£¡£8£¥µÄй¶Դ×ÔÓÚÊÚȨÓû§µÄÎóÓᣡ£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/