Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬£¬£¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý
Ðû²¼Ê±¼ä 2024-10-1610ÔÂ14ÈÕ£¬£¬£¬£¬£¬Â׶صÄÕÛ¿Û¾çԺƱÎñƽ̨Central Tickets½üÆÚÔâÓöÁËÒ»´ÎÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈ¡£¡£¡£Ö»¹Üй¶±¬·¢ÔÚ7ÔÂ1ÈÕ£¬£¬£¬£¬£¬µ«¹«Ë¾Ö±µ½9Ô²ÅÒâʶµ½´ËÊ£¬£¬£¬£¬£¬ÆäʱÂ׶ؾ¯Ô±ÌüÔÚ°µÍøÉÏ·¢Ã÷Á˹ØÓÚ±»µÁÊý¾ÝµÄÌÖÂÛ¡£¡£¡£ºÚ¿ÍÓÖÃû0xy0um0m£¬£¬£¬£¬£¬ÓÚ7ÔÂ2ÈÕ»á¼ûÁËCentral TicketsµÄϵͳ£¬£¬£¬£¬£¬²¢ÊÔͼÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÊý¾Ý¡£¡£¡£Central TicketsÈ·ÈÏÈëÇÖÓ°ÏìÁËÓÃÓÚ²âÊÔµÄÔÝʱÊý¾Ý¿â£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âËäÓëÖ÷ϵͳ¸ôÀ룬£¬£¬£¬£¬µ«°üÀ¨Óû§Ãô¸ÐÐÅÏ¢¡£¡£¡£¹«Ë¾Ëæºóƾ֤GDPR»®¶¨ÏòÐÅϢרԱ°ì¹«ÊÒ±¨¸æ£¬£¬£¬£¬£¬²¢Á¬Ã¦Ëø¶¨ÁËÊÜѬȾµÄÊý¾Ý¿â£¬£¬£¬£¬£¬Ç¿ÖÆÓû§ÖØÖÃÃÜÂ룬£¬£¬£¬£¬²¢Õö¿ªÊӲ졣¡£¡£ÊÜÓ°ÏìÓû§ÊýĿδÅû¶£¬£¬£¬£¬£¬µ«¹«Ë¾ÖÒÑÔÓû§¿ÉÄÜÒ×ÊÜÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬²¢±Þ²ßËûÃǼá³ÖСÐÄ¡£¡£¡£Hackread.com×·×ÙÁ˺ڿͻ£¬£¬£¬£¬£¬²¢Ö¸³öºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁË100Íò¿Í»§µÄÊý¾ÝºÍÄÚ²¿ÐÅÏ¢¡£¡£¡£×¨¼ÒÆ·ÆÀCentral TicketsÔÚ·¢Ã÷ÈëÇÖÊÂÎñ·½Ãæ±£´æÑÓ³Ù£¬£¬£¬£¬£¬±Þ²ßÆóҵȷ±£Óв½·¥ÊµÊ±¼ì²âºÍÓ¦¶ÔÍøÂçÊÂÎñ¡£¡£¡£
https://hackread.com/central-tickets-data-breach-hacker-leaks-user-data/
2. ʹÓÃÕýµ±ÊðÃûÖ¤ÊéµÄHijack Loader¼°XWorm¶ñÒâÈí¼þ»î¶¯ÆØ¹â
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õ¹ÏÖÁËеĶñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÕýÏÖ´úÂëÊðÃûÖ¤ÊéÊðÃûµÄHijack Loader¹¤¼þ¡£¡£¡£·¨¹úÍøÂçÇå¾²¹«Ë¾HarfangLabÓÚ±¾Ô³õ¼à²âµ½ÕâÒ»Ö¼ÔÚ°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòLummaµÄ¹¥»÷Á´¡£¡£¡£Hijack Loader£¨ÓÖ³ÆDOILoader¡¢IDAT LoaderºÍSHADOWLADDER£©×Ô2023Äê9ÔÂÊ×´ÎÆØ¹â£¬£¬£¬£¬£¬Í¨³£Í¨¹ýÓÕÆÓû§ÏÂÔØ´øÓÐÏÝÚåµÄ¶þ½øÖÆÎļþʵÑé¹¥»÷¡£¡£¡£½üÆÚ±äÖÖ½«Óû§µ¼ÏòÐéαCAPTCHAÒ³Ãæ£¬£¬£¬£¬£¬ÒªÇó¸´ÖƺÍÔËÐÐPowerShellÏÂÁîÒÔÊͷŶñÒâ¸ºÔØ¡£¡£¡£HarfangLabÊӲ쵽Èý¸ö²î±ð°æ±¾µÄPowerShell¾ç±¾£¬£¬£¬£¬£¬Éæ¼°mshta.exe¡¢Invoke-ExpressionºÍmsiexec.exeÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£ZIP´æµµ°üÀ¨Ò×ÊÜDLL²à¼ÓÔØÓ°ÏìµÄ¿ÉÖ´ÐÐÎļþºÍ¶ñÒâDLL£¬£¬£¬£¬£¬ÓÃÓÚ½âÃܲ¢Ö´ÐмÓÃÜÎļþ¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬´«ËÍ»úÖÆÒÑ´ÓDLL²à¼ÓÔØ×ª±äΪʹÓöà¸öÊðÃû¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬µ«Ö¤ÊéÏÖÒѱ»×÷·Ï¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬´úÂëÊðÃû×Ô¼º²»¿É×÷Ϊ¿ÉÐŶȻù×¼¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬SonicWall Capture LabsÖÒÑԳƣ¬£¬£¬£¬£¬CoreWarrior¶ñÒâÈí¼þѬȾWindows»úеµÄÍøÂç¹¥»÷ÊýÄ¿¼¤Ôö£¬£¬£¬£¬£¬¶øÍøÂç´¹ÂڻҲͨ¹ýWindows¾ç±¾ÎļþÈö²¥XWorm¶ñÒâÈí¼þ£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¹¦Ð§ÆÕ±é¡£¡£¡£
https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html
3. ¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹ÝÔâÍøÂç¹¥»÷±»ÆÈÏÞÖÆÐ§ÀÍ
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹Ý½üÆÚÒòÔâÊÜÍøÂç¹¥»÷¶ø±»ÆÈÏÞÖÆÐ§ÀÍ£¬£¬£¬£¬£¬Ó°ÏìÁ˸ÃÊÐ130ÍòסÃñ¡£¡£¡£¸ÃͼÊé¹ÝϵͳӵÓÐ22¸ö·ÖÖ§»ú¹¹£¬£¬£¬£¬£¬ÓÚÖÜÎåÊ״ιûÕæÖÒÑÔ³ÆÔâÓöÁË¡°ÍøÂçÇå¾²Îó²î¡±£¬£¬£¬£¬£¬µ¼Ö²¿·ÖϵͳÊܵ½Íþв¡£¡£¡£Í¼Êé¹ÝËæ¼´¹Ø±ÕËùÓÐЧÀÍÆ÷ºÍÅÌËã»ú£¬£¬£¬£¬£¬²¢ÓÚÖÜÎåÌáǰ±Õ¹Ý¡£¡£¡£Ö»¹ÜÖÜÈý¸÷ËùÔÚ»Ö¸´ÁËÕý³£¿£¿£¿£¿£¿£¿ª·Åʱ¼ä£¬£¬£¬£¬£¬µ«Ð§ÀÍÒѾÙÐе÷½â£¬£¬£¬£¬£¬¿Í»§½öÄÜʹÓ÷ÇÊÖÒÕÊֶεÄͼÊé¹Ý¿Õ¼äºÍЧÀÍ¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬£¬£¬Í¼Êé¹ÝÕýÂÄÀúÑÏÖØµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬°üÀ¨Í¼ÊéËÍ»¹Ð§ÀÍ¡¢ÊÖÒÕºÍÊý×ÖЧÀÍ£¨ÈçÅÌËãʱ»ú¼û¡¢´òÓ¡¡¢WiFiµÈ£©ÒÔ¼°Êý×ÖͼÊé¹ÝºÍµç×Ó×ÊÔ´¹¤¾ß¾ù²»¿ÉÓᣡ£¡£Í¼Êé¹Ýδ͸¶»Ö¸´Õý³£Ð§À͵Äʱ¼ä£¬£¬£¬£¬£¬µ«ÌåÏÖÏ£Íû¾¡¿ì»Ö¸´¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¼¸ÏîÏÈǰ°²ÅŵĻÈÔ½«¼ÌÐø¾ÙÐС£¡£¡£½üÄêÀ´£¬£¬£¬£¬£¬Í¼Êé¹ÝÒòÌṩÖ÷ҪЧÀͶø³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬¼ÓÄôó¶à¸öÖ÷Òª¶¼»áµÄͼÊé¹ÝϵͳҲÔâÊÜÁËÀàËÆ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂЧÀÍÊܵ½ÑÏÖØÓ°Ïì¡£¡£¡£
https://therecord.media/calgary-public-library-limits-services
4. ¹«¹²Æû³µ¼¯ÍÅÔâ8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬¹«¹²Æû³µ¼¯ÍŽüÆÚ½ÒÏþÉùÃ÷»ØÓ¦ÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬Ò»¸öÃûΪ8BaseµÄÀÕË÷Èí¼þ×éÖ¯Éù³ÆÒÑ´Ó¸ÃÆû³µÖÆÔìÉ̵ÄϵͳÖÐÇÔÈ¡Á˰üÀ¨·¢Æ±¡¢ÊÕÌõ¡¢»á¼ÆÎļþ¡¢Ð¡ÎÒ˽¼ÒÊý¾Ý¡¢Ö¤Êé¡¢¹ÍÓ¶ÌõÔ¼¡¢ÈËʵµ°¸µÈÔÚÄڵġ°´ó×ÚÉñÃØÐÅÏ¢¡±¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬¹«¹²Æû³µ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬¹«¹²Æû³µ¼¯ÍŵÄIT»ù´¡ÉèÊ©²¢Î´Êܵ½Ó°Ï죬£¬£¬£¬£¬²¢½«¼ÌÐøÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδ͸¶Óйش˴ÎÍøÂç¹¥»÷µÄÈÎºÎÆäËûÐÅÏ¢¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Ö»¹Ü8BaseÀÕË÷Èí¼þ×éÖ¯ÔÚÍøÕ¾ÉÏÐû²¼Á˹«¹²Æû³µµÄÊê½ðÏÞÆÚÒѵ½£¬£¬£¬£¬£¬µ«ºÚ¿ÍËÆºõ²¢Î´¹ûÕæÈκα»µÁÐÅÏ¢¡£¡£¡£8Base×Ô2023ÄêÍ·¾ÍÒѱ£´æ£¬£¬£¬£¬£¬Æù½ñΪֹÒÑÐû²¼ÁË400¶àÃûÊܺ¦ÕßµÄÃû×Ö¡£¡£¡£ÍøÂç·¸·¨·Ö×ÓÒ»µ©»ñµÃÄ¿µÄ×é֯ϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬¾Í»áÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÏòÊܺ¦ÕßʩѹÒÔÖ§¸¶Êê½ð¡£¡£¡£
https://www.securityweek.com/volkswagen-says-it-infrastructure-not-affected-after-ransomware-gang-claims-data-theft/
5. Google PlayÉÏÁè¼Ý200¸ö¶ñÒâÓ¦ÓÃÏÂÔØÁ¿½ü800Íò
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬ZscalerµÄÍþвÇ鱨Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬ÔÚ2023Äê6ÔÂÖÁ2024Äê4ÔÂʱ´ú£¬£¬£¬£¬£¬Android¹Ù·½ÊÐËÁGoogle Play·Ö·¢ÁËÁè¼Ý200¸ö¶ñÒâÓ¦ÓóÌÐò£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿¿¿½ü800Íò´Î¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÀ¨ÐÅÏ¢ÇÔÈ¡ÕßJoker¡¢¹ã¸æÈí¼þ¡¢FacebookÕÊ»§Æ¾Ö¤ÇÔÈ¡³ÌÐòFacestealer¡¢ÐÅÏ¢ÇÔÈ¡ºÍ¶ÌÐÅ×èµ²³ÌÐòCoperµÈ¡£¡£¡£Ö»¹Ü¹È¸èÓµÓмì²â¶ñÒâÓ¦ÓóÌÐòµÄÇå¾²»úÖÆ£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕßÈÔʹÓÃһЩ¼¼ÇÉÈÆ¹ýÑéÖ¤Àú³Ì¡£¡£¡£ZscalerµÄ±¨¸æÖ¸³ö£¬£¬£¬£¬£¬½üÒ»°ë¶ñÒâÓ¦ÓóÌÐòÊÇÔÚGoogle PlayµÄ¹¤¾ß¡¢¸öÐÔ»¯¡¢ÉãÓ°¡¢Éú²úÁ¦ºÍÉúÑÄ·½·¨ÖÖ±ðÏÂÐû²¼µÄ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬È¥ÄêGoogle PlayÉÏÒ²·ºÆðÁËÆäËû¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ÈçNecro¡¢GoldosonºÍSpyLoanµÈ£¬£¬£¬£¬£¬ËüÃǵÄÏÂÔØÁ¿»®·ÖµÖ´ï1100Íò´Î¡¢1ÒڴκÍÁè¼Ý1200Íò´Î¡£¡£¡£±¨¸æ»¹ÏÔʾ£¬£¬£¬£¬£¬ÊÜÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÓ¡¶ÈºÍÃÀ¹ú£¬£¬£¬£¬£¬½ÌÓýÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¡£¡£ÎªÁËïÔ̱»Google Play¶ñÒâÈí¼þѬȾµÄʱ»ú£¬£¬£¬£¬£¬½¨ÒéÓû§ÔĶÁ̸ÂÛ¡¢¼ì²éÓ¦ÓóÌÐòÐû²¼ÕßÒÔ¼°×°ÖÃʱÇëÇóµÄȨÏÞ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-200-malicious-apps-on-google-play-downloaded-millions-of-times/
6. WordPress Jetpack ²å¼þÑÏÖØÎó²îÓ°Ïì2700Íò¸öÍøÕ¾
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬WordPress Jetpack²å¼þ¿ËÈÕÐû²¼ÁËÒ»ÏîÒªº¦¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸ö×Ô2016ÄêÒÔÀ´Ò»Ö±±£´æµÄÑÏÖØÎó²î¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄÁªÏµ±íµ¥¹¦Ð§ÖУ¬£¬£¬£¬£¬¿ÉÄÜÔÊÐíÈκεÇÂ¼ÍøÕ¾µÄÓû§Éó²éÍ³Ò»ÍøÕ¾ÉÏÆäËûÈËÌá½»µÄ±íµ¥¡£¡£¡£JetpackÊÇÒ»¿îÊ¢ÐеÄWordPress²å¼þ£¬£¬£¬£¬£¬ÓÉWordPress.com±³ºóµÄ¹«Ë¾Automattic¿ª·¢£¬£¬£¬£¬£¬ÌṩÁËһϵÁй¦Ð§À´ÔöÇ¿ÍøÕ¾µÄ¹¦Ð§¡¢Çå¾²ÐÔºÍÐÔÄÜ£¬£¬£¬£¬£¬ÏÖÔÚÒѱ»2700Íò¸öWordPressÍøÕ¾Ê¹Óᣡ£¡£ËäȻά»¤Ö°Ô±²¢Î´·¢Ã÷¸ÃÎó²îÒѱ»Ò°Íâ¹¥»÷ʹÓõÄÖ¤¾Ý£¬£¬£¬£¬£¬µ«ÈÔ±Þ²ßÓû§¾¡¿ì¸üÐÂÖÁ×îа汾13.9.1£¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÕ¾µÄÇå¾²¡£¡£¡£´ó´ó¶¼ÍøÕ¾ÒѾ»ò¼´½«×Ô¶¯¸üÐÂÖÁ×îа汾¡£¡£¡£JetpackÍŶӶԴ˴θøÓû§´øÀ´µÄδ±ãÌåÏÖǸÒ⣬£¬£¬£¬£¬²¢ÔÊÐí½«¼ÌÐø°´ÆÚÉóºË´úÂë¿â£¬£¬£¬£¬£¬È·±£Óû§ÍøÕ¾µÄÇå¾²¡£¡£¡£
https://securityaffairs.com/169848/uncategorized/wordpress-jetpack-plugin-critical-flaw.html


¾©¹«Íø°²±¸11010802024551ºÅ