Ì©¹úÒÆ¶¯ÔËÓªÉÌAISй¶83ÒÚÌõÓû§¼Í¼£»£»£»£»Èý¸öºÚ¿ÍÂÛ̳Ôâµ½ºÚ¿ÍÈëÇÖ £¬£¬£¬£¬£¬£¬Êý¾Ý¿â×ß©

Ðû²¼Ê±¼ä 2020-05-27

1.Ì©¹úÒÆ¶¯ÔËÓªÉÌAIS±£´æÇå¾²ÎÊÌâ £¬£¬£¬£¬£¬£¬Ð¹Â¶83ÒÚÌõÓû§¼Í¼


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Çå¾²Ñо¿Ö°Ô±Justin Paine·¢Ã÷ÁËÌ©¹úÒÆ¶¯ÔËÓªÉÌAISµÄElasticSearchÊý¾Ý¿â̻¶ÔÚ¹«ÍøÉÏ £¬£¬£¬£¬£¬£¬Ð¹Â¶83ÒÚÌõÓû§¼Í¼ £¬£¬£¬£¬£¬£¬ÏÖÔÚÒѾ­ÍÑ»ú¡£¡£¡£¡£¡£¡£´Ë´Î×ß©ÊÂÎñÓ°ÏìÁËÊý°ÙÍòÃûÓû§ £¬£¬£¬£¬£¬£¬Ð¹Â¶4.7 TBÊý¾Ý¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ¹«¹²ÍøÂçÉÏ·¢Ã÷¸ÃÊý¾Ý¿â £¬£¬£¬£¬£¬£¬²¢ÇÒÎÞÐèÃÜÂë¼´¿É»á¼û £¬£¬£¬£¬£¬£¬°üÀ¨ÅÌÎÊDNSºÍNetflowÊý¾Ý¡£¡£¡£¡£¡£¡£Êý¾Ý¿âÓÚ2020Äê5ÔÂ1ÈÕÊ×´Î̻¶ £¬£¬£¬£¬£¬£¬ÓÚ5ÔÂ7ÈÕ±»Çå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬£¬×èÖ¹µ½ÏÖÔÚй¶ʱ¼ä³¤´ïÈýÖÜ £¬£¬£¬£¬£¬£¬Æ½¾ùÿ24СʱÔöÌí2ÒÚÌõÐÂÊý¾Ý¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2020/05/24/thai-billions-internet-records-leak/


2.ºÚ¿Í´Ó¶à¸ö¹ú¼ÒµÄÔÚÏßÉ̳ÇÇÔÈ¡20¶à¸öÊý¾Ý¿â £¬£¬£¬£¬£¬£¬¹ûÕæ³öÊÛ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ºÚ¿ÍÇÔÈ¡Á˶à¸ö¹ú¼ÒµÄÔÚÏßÉ̳ÇÖÐÁè¼Ý20¸öÊý¾Ý¿â £¬£¬£¬£¬£¬£¬²¢ÔÚ¹ûÕæÍøÕ¾³öÊÛ £¬£¬£¬£¬£¬£¬°üÀ¨µÂ¹ú¡¢°ÍÎ÷¡¢ÃÀ¹ú¡¢Òâ´óÀû¡¢Ó¡¶È¡¢Î÷°àÑÀºÍ°×¶íÂÞ˹µÄÉÌ³Ç £¬£¬£¬£¬£¬£¬ÆäÖÐÌ©°ëÊý¾ÝÀ´×Ե¹ú¡£¡£¡£¡£¡£¡£¾ÝϤ £¬£¬£¬£¬£¬£¬Âô·½ÏÖÔÚ×ܹ²ÌṩÁËÁè¼Ý150ÍòÌõ¼Í¼ £¬£¬£¬£¬£¬£¬¿ÉÊÇÏÖʵ±»µÁÊý¾ÝÊýĿҪ´óµÃ¶à¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖÐ £¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ý¹«¹²ÍøÂçÈëÇÖ²»Çå¾²µÄЧÀÍÆ÷ £¬£¬£¬£¬£¬£¬È»ºó¸´ÖÆÊý¾Ý¿â²¢ÁôÏÂÖÒÑÔ £¬£¬£¬£¬£¬£¬ÒªÇóÊܺ¦Õß10ÌìÖ®ÄÚÖ§¸¶0.06 BTC£¨Ô¼ºÏ525ÃÀÔª£©µÄÊê½ð £¬£¬£¬£¬£¬£¬²»È»¾Í»á¹ûÕæÊý¾Ý¿â¡£¡£¡£¡£¡£¡£Æ¾Ö¤±ÈÌØ±ÒÇ®°üÎļþ¼Í¼ £¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÊÇ2019Äê9ÔÂ20ÈÕ×îÏ鵀 £¬£¬£¬£¬£¬£¬ÏÖÔÚºÚ¿ÍÒÑÍê³ÉÁËÁè¼Ý100±ÊÉúÒâ £¬£¬£¬£¬£¬£¬×¬Ç®×ܼÆ5.8 BTC£¨Áè¼Ý51000ÃÀÔª£© £¬£¬£¬£¬£¬£¬×î½üµÄÒ»´ÎÉúÒⱬ·¢ÔÚ5ÔÂ20ÈÕ £¬£¬£¬£¬£¬£¬½ö5Ô¾ÍÓÐ9´ÎÉúÒâ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-extorts-online-shops-sells-databases-if-ransom-not-paid/


3.Èý¸öºÚ¿ÍÂÛ̳Ôâµ½ºÚ¿ÍÈëÇÖ £¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÊý¾Ý¿â×ß©


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


CybleµÄÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÂÛ̳Nulled.ch¡¢Sinfulsite.comºÍsuxx.to±»ºÚ¿ÍÈëÇÖ £¬£¬£¬£¬£¬£¬ÆäÊý¾Ý¿â×ß©¡£¡£¡£¡£¡£¡£ÕâЩÂÛ̳ÊǺڿͺÍÍøÂç·¸·¨·Ö×ÓµÄȺ¼¯µØ £¬£¬£¬£¬£¬£¬ËûÃÇͨ³£ÔÚÕâÀï¾ÙÐÐÌÖÂÛ²¢¹²ÏíÏà¹Ø×ÊÔ´¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨ÂÛ̳³ÉÔ±¹²ÏíºÍ³öÊÛµÄ×ß©Êý¾Ý¡¢ºÚ¿Í¹¤¾ß¡¢¶ñÒâÈí¼þºÍ½Ì³ÌµÈ¡£¡£¡£¡£¡£¡£SUXX.TOºÍNulledµÄÊý¾Ýй¶ÓÚ5ÔÂ20ÈÕ £¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÆäÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£Sinful SiteµÄй¶±¬·¢ÓÚ5ÔÂ15ÈÕ £¬£¬£¬£¬£¬£¬ÆäÍêÕûÊý¾Ý¿â£¨°üÀ¨Ë½ÈËÐÂÎÅ£©Ô⵽й¶¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬CybleÒÑÔÚÆäÊý¾Ýй¶ÅÌÎÊЧÀÍAmIBreachedÖÐΪÉÏÊöËùÓÐÊý¾Ý¿â½¨ÉèË÷Òý £¬£¬£¬£¬£¬£¬ÒԱ㹩ÈËÅÌÎÊ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/103726/data-breach/3-hacking-forums-hacked.html


4.ÃÀ¹ú¼ÓÖÝMLM¹«Ë¾ArbonneÔâµ½¹¥»÷ £¬£¬£¬£¬£¬£¬Ð¹Â¶ÊýǧÈËÐÅÏ¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


λÓÚÃÀ¹ú¼ÓÀû¸£ÄáÑÇÖݵĹú¼Ê¶àÌõÀíÓªÏú£¨MLM£©¹«Ë¾Arbonne·¢Ã÷ £¬£¬£¬£¬£¬£¬ÆäϵͳÓÚÉϸöÔÂÔâµ½¹¥»÷ £¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÊýǧÓû§µÄСÎÒ˽¼ÒÐÅÏ¢ºÍƾ֤¡£¡£¡£¡£¡£¡£Æ¾Ö¤ArbonneµÄ֪ͨ £¬£¬£¬£¬£¬£¬´Ë´Îй¶ÊÂÎñ×ܹ²Ó°ÏìÁËÓÐ3527Ãû¼ÓÀû¸£ÄáÑÇÖÝסÃñ £¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÓû§Ãû³Æ¡¢µç×ÓÓʼþºÍÓʼĵص㡢¶©µ¥¹ºÖÃÀúÊ·¼Í¼¡¢µç»°ºÅÂëºÍArbonneÕÊ»§ÃÜÂëµÈ¡£¡£¡£¡£¡£¡£ArbonneÌåÏÖ £¬£¬£¬£¬£¬£¬ÒÑÇ¿ÖÆÖØÖÃÊÜÓ°ÏìÓû§µÄÃÜÂë £¬£¬£¬£¬£¬£¬²¢½«ÎªËùÓÐÊÜÓ°ÏìÓû§ÌṩKroll¹«Ë¾µÄÒ»ÄêÃâ·ÑÐÅÓÃ¼à¿Ø¡¢Ú²Æ­×ÉѯºÍÉí·Ý͵ÇÔ»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/arbonne-mlm-data-breach-exposes-user-passwords-personal-info/


5.ÉÏǧÆóҵϵͳÔâµ½Blue Mockingbird¶ñÒâÈí¼þ¹¥»÷


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÔÆÇå¾²¹«Ë¾Red Canary·¢Ã÷ £¬£¬£¬£¬£¬£¬ÊýÒÔǧ¼ÆµÄÆóҵϵͳѬȾÁ˺ڿÍ×éÖ¯Blue MockingbirdµÄ¼ÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ëµ £¬£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷µÄÊÇÃæÏò¹«ÖÚµÄЧÀÍÆ÷ £¬£¬£¬£¬£¬£¬ËûÃǶ¼ÔËÐÐ×ÅʹÓÃÁËTelerik¿ò¼ÜµÄASP.NETÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£ºÚ¿ÍʹÓñ»×·×ÙΪCVE-2019-18935µÄÎó²î £¬£¬£¬£¬£¬£¬ÔÚÄ¿µÄЧÀÍÆ÷ÉÏÖ²Èë Web Shell £¬£¬£¬£¬£¬£¬È»ºóʹÓÃJuicy Potato»ñÈ¡ÖÎÀíÔ±¼¶±ðµÄ»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬²¢ÐÞ¸ÄЧÀÍÆ÷ÉèÖÃÒÔ¼á³ÖÆäÒ»Á¬ÐÔ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒ»µ©»ñµÃ¶ÔϵͳµÄÍêÈ«»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬±ã»áÏÂÔØ²¢×°ÖÃÓÃÓÚÍÚ¾òMonero£¨XMR£©¼ÓÃÜÇ®±ÒµÄÓ¦ÓóÌÐòXMRRig¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/thousands-of-enterprise-systems-infected-by-new-blue-mockingbird-malware-gang/


6.˼¿ÆÕë¶ÔÆäºô½ÐÖÐÐÄÈí¼þÐû²¼¶à¸öÇå¾²²¹¶¡ £¬£¬£¬£¬£¬£¬ÐÞ¸´´úÂëÖ´ÐÐÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


˼¿ÆÐû²¼ÁËÇå¾²²¹¶¡ £¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÆäºô½ÐÖÐÐÄÈí¼þUnified Contact Center ExpressÖжà¸÷Îó²î £¬£¬£¬£¬£¬£¬°üÀ¨Ò»¸ö´úÂëÖ´ÐÐÎó²î£¨CVE-2020-3280£©¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚUnified CCEµÄJavaÔ¶³ÌÖÎÀí½çÃæÖÐ £¬£¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÔÚ±£´æ¸ÃÎó²îµÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÓÉÓÚûÓÐÇå¾²µÄ·´ÐòÁл¯Óû§ÊäÈëÄÚÈݶø±£´æµÄ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËͶñÒâµÄÐòÁл¯Java¹¤¾ßµ½Ìض¨ÕìÌýÆ÷À´Ê¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£Ë¼¿ÆÌåÏÖ £¬£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃÎó²î»¹Ã»Óб»Ê¹Óᣡ£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/103765/security/cisco-unified-contact-center-express-flaw.html