HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£»£»ÐµÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ
Ðû²¼Ê±¼ä 2020-11-021.HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ

HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£¬£¬£¬£¬£¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄÎó²îÀàÐÍ£¬£¬£¬£¬£¬±È2019ÄêÔöÌíÁË134%¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬XSSÎó²îÕ¼Á˱¨¸æµÄËùÓÐÎó²îµÄ18%£¬£¬£¬£¬£¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔöÌíÁË26%)¡£¡£±ðµÄ£¬£¬£¬£¬£¬²»µ±»á¼û¿ØÖÆÎó²îËù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔöÌí134£¥£¬£¬£¬£¬£¬¸ßµÖ´ï400ÍòÃÀÔª£¬£¬£¬£¬£¬Æä´ÎÊÇÐÅÏ¢Åû¶Îó²î£¬£¬£¬£¬£¬Í¬±ÈÔöÌí63£¥¡£¡£ÕâÁ½ÖÖ·½·¨¶¼»áй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ÀýÈçСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£
ÔÎÄÁ´½Ó£º
hackerone.com/hacker-powered-security-report
2.Ñо¿Ö°Ô±³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷

Ñо¿Ö°Ô±Jan Kopriva³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷¡£¡£SMBGhostÎó²î£¨CVE-2020-0796£©ÎªMicrosoftЧÀÍÆ÷ÐÂÎſ飨SMB£©ÐÒéÖеÄÒ»¸öÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬£¬£¬Ê¹ÓøÃÎó²î¿É¾ÙÐÐÈ䳿¹¥»÷£¬£¬£¬£¬£¬ÒÔÈö²¥µ½ÆäËûÅÌËã»úÉÏ£¬£¬£¬£¬£¬MicrosoftÒÑÔÚÈýÔ·ÝÐÞ¸´¸ÃÎÊÌâ¡£¡£Jan Kopriva·¢Ã÷ÈÔÓÐÁè¼Ý103000̨ÅÌËã»úÒ×ÊÜ´ËÀ๥»÷£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓŲ́Í壨22£¥£©£¬£¬£¬£¬£¬Æä´ÎÊÇÈÕ±¾£¨20£¥£©ºÍ¶íÂÞ˹£¨11£¥£©¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110247/hacking/smbghost-vulnerable-machines-dangers.html
3.еÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ

Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±Åû¶ÁËеÄË®¿Ó¹¥»÷»î¶¯Earth Kitsune£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úÇÈÃñ¡£¡£Ñо¿Ö°Ô±·¢Ã÷¹¥»÷±¬·¢ÔÚ3Ô¡¢5ÔºÍ9Ô£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁ˶ñÒâÈí¼þSLUB(¼´SLackºÍgithUB)ºÍÁ½¸öкóÃÅ£¬£¬£¬£¬£¬dneSpyºÍagfSpy£¬£¬£¬£¬£¬Ö¼ÔÚ½ÓÊÜÊÜѬȾµÄϵͳ²¢´ÓÖÐÇÔÈ¡Êý¾Ý¡£¡£ÓëÆäËû¹¥»÷²î±ðµÄÊÇ£¬£¬£¬£¬£¬ËüÔÚÊܺ¦»úеÉϰ²ÅÅÁË´ó×ÚµÄÑù±¾£¬£¬£¬£¬£¬Ê¹ÓÃÁ˶à¸öÏÂÁîºÍ¿ØÖÆ(C&C)ЧÀÍÆ÷£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁË4¸öN-dayÎó²î¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110192/apt/operation-earth-kitsune.html
4.FireEye·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥

FireEyeÑо¿Ö°Ô±Alex Lanstein·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥¡£¡£ºÚ¿ÍÒÔ2020ÍòÊ¥½ÚΪÖ÷Ì⣬£¬£¬£¬£¬»Ñ³ÆÔ¼ÇëÊܺ¦Õß¼ÓÈëÍòÊ¥½ÚÅɶԣ¬£¬£¬£¬£¬²¢ÌåÏÖËùÓÐÏêϸÐÅÏ¢¶¼ÔÚ¸½¼þÖУ¬£¬£¬£¬£¬ÒÔÓÕʹÓû§·¿ª¶ñÒ⸽¼þ¡£¡£Ò»µ©Óû§·¿ª¸½¼þ£¬£¬£¬£¬£¬¾Í»á±»ÒªÇóµã»÷ÆôÓÃ±à¼ºÍÆôÓÃÄÚÈݰ´Å¥£¬£¬£¬£¬£¬Ö¼ÔÚ×°ÖÃEmotet Trojan¡£¡£ÀÖ³É×°ÖöñÒâÈí¼þºó£¬£¬£¬£¬£¬Emotet½«Ê¹ÓøÃÅÌËã»ú·¢ËÍÀ¬»øÓʼþ£¬£¬£¬£¬£¬²¢ÌᳫÀÕË÷Èí¼þ¹¥»÷¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/emotet-malware-wants-to-invite-you-to-a-halloween-party/
5.ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvilµ¼Ö²¿·ÖÊý¾Ýй¶

ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvil£¬£¬£¬£¬£¬²¢µ¼Ö²¿·ÖÊý¾Ýй¶¡£¡£Gaming Partners International£¨GPI£©ÊÇÒ»¼ÒΪȫÇò¶Ä³¡Ìṩ²©²Ê¼Ò¾ßºÍ×°±¸µÄÈ«·½Î»Ð§À͹©Ó¦ÉÌ¡£¡£REvilÍÅ»ïÉù³ÆÆäÒѼÓÃܸù«Ë¾ÏµÍ³£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË540GbµÄÊÖÒպͽðÈÚÎļþ¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ö÷ÒªÐÅÏ¢¡¢ÊÖÒÕÊý¾Ý¡¢²ÆÎñÎļþ¡¢ÓëÀ˹ά¼Ó˹¡¢°ÄÃÅ¡¢Å·ÖÞËùÓжij¡µÄÌõÔ¼¡¢ÒøÐÐÎļþµÈ¡£¡£¸ÃÍŻﻹ½«Ð¹Â¶Êý¾ÝµÄ½ØÍ¼¹ûÕæÔÚÆäÊý¾Ýй¶վµã£¬£¬£¬£¬£¬²¢ÌåÏÖ¹«Ë¾72СʱÄÚ²»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬ËûÃǽ«¹ûÕæËùÓб»µÁÊý¾Ý¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110237/cyber-crime/gaming-partners-international-revil-ransomware.html
6.ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼

10ÔÂ28ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼¡£¡£Æ¾Ö¤Ð¹Â¶Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬ËùÓб»³öÊÛµÄÊý¾Ý¿â¶¼ÊÇÔÚ2020Äê±»µÁµÄ£¬£¬£¬£¬£¬ÆäÖÐй¶×î¶àµÄÊÇGeekie.com.br£¬£¬£¬£¬£¬ÓÐ810ÍòÌõ£¬£¬£¬£¬£¬¶øÊÜÓ°Ïì×î´óµÄÊÇÐÂ¼ÓÆÂµÄRedMart¡£¡£´Ë´ÎÊÜÓ°ÏìµÄ17¼Ò¹«Ë¾»®·ÖΪGeekie.com.br£¨810Íò£©¡¢Clip.mx£¨470Íò£©¡¢Wongnai.com£¨430Íò£©¡¢Cermati.com£¨290Íò£©¡¢Everything5pounds.com£¨290Íò£©¡¢Eatigo.com£¨280Íò£©¡¢Katapult.com£¨220Íò£©¡¢Wedmegood.com£¨130Íò£©¡¢RedMart£¨110Íò£©¡¢Coupontools.com£¨100Íò£©¡¢W3layouts.com£¨78.9Íò£©¡¢Game24h.vn£¨77.9Íò£©¡¢Invideo.io£¨57.1Íò£©ºÍApps-builder.com£¨38.6£©¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hacker-is-selling-34-million-user-records-stolen-from-17-companies/


¾©¹«Íø°²±¸11010802024551ºÅ