¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190114

Ðû²¼Ê±¼ä 2019-01-14
1¡¢NASAÄÚ²¿Ó¦ÓÃȨÏÞÉèÖùýʧ£¬£¬£¬£¬µ¼ÖÂÔ±¹¤ºÍÏîÄ¿ÐÅϢй¶

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


NASAµÄÄÚ²¿Ó¦ÓÃJiraÒòÉèÖùýʧµ¼ÖÂÔ±¹¤µÄÓû§Ãû¡¢ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍÏîÄ¿Ãû³ÆµÈÃô¸ÐÐÅϢй¶¡£¡£JIRAÊÇÒ»¸öÓÉAtlassian¹«Ë¾Ö§³ÖµÄÏîÄ¿ÖÎÀíϵͳ£¬£¬£¬£¬¿É¾ÙÐÐbug¸ú×ÙºÍѸËÙÏîÄ¿ÖÎÀí¡£¡£ÖÎÀíÔ±¸ã»ìÁËJiraµÄȨÏÞÉèÖÃEveryoneºÍAll users£¬£¬£¬£¬EveryoneȨÏÞÏÖʵÉÏÔÊÐí»¥ÁªÍøÉϵÄÈκÎÈ˶¼¿ÉÒÔ»á¼ûÓ¦ÓÃÊý¾Ý£¬£¬£¬£¬¶ø²»ÊÇÖÎÀíÔ±ÒÔΪµÄ×éÖ¯ÄÚµÄÈκÎÈË£¨ÕâÓ¦¸ÃÊÇAll usersȨÏÞ£©¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/nasa-internal-app-leaked-employee-emails-project-names/


2¡¢ÃÀÂíÈøÖîÈûÖÝÐÞ¸ÄÊý¾Ýй¶֪ͨ·¨°¸£¬£¬£¬£¬½«ÓÚ4ÔÂ11ÈÕÉúЧ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



ÃÀ¹úÂíÈøÖîÈûÖÝ¶ÔÆäÊý¾Ýй¶֪ͨ·¨°¸¾ÙÐÐÁËÖØ´óµÄÐ޸쬣¬£¬£¬¸ÃÐÞÕý°¸½«ÓÚ2019Äê4ÔÂ11ÈÕÉúЧ¡£¡£ÆäÖÐÒ»ÏîÖ÷ÒªµÄÐ޸İüÀ¨¶Ô±¬·¢Êý¾Ýй¶µÄ×éÖ¯Ìá³öÁ˸ü¶àµÄÒªÇ󣬣¬£¬£¬µ±Êý¾Ýй¶ÊÂÎñÉæ¼°µ½ÂíÈøÖîÈûÖݹ«ÃñµÄÉç»áÇå¾²ºÅÂëʱ£¬£¬£¬£¬¸Ã×éÖ¯±ØÐèÏòÊÜÓ°ÏìµÄ¹«ÃñÌṩ²»ÉÙÓÚ18¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£ÆäËüÖØ´óÐ޸İüÀ¨¸üÐÂÁË×éÖ¯ÏòÖÝî¿Ïµ»ú¹¹Ìá½»µÄÐÅÏ¢ÀàÐ͵È¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/massachusetts-enacts-significant-changes-to-its-data-breach-notification-law/


3¡¢AnonymousºÚ¿ÍÒòDDoS¶ùͯҽԺ±»ÅÐÈëÓüÁè¼Ý10Äê

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


AnonymousºÚ¿ÍÒòDDoSÁ½¼ÒÒ½ÁÆ»ú¹¹±»Åд¦Áè¼Ý10ÄêµÄÓÐÆÚͽÐÌ¡£¡£ÕâÃûºÚ¿ÍÊÇÏÖÄê34ËêµÄÂíÈøÖîÈûÖÝÄÐ×ÓMartin Gottesfeld£¬£¬£¬£¬Ëû±»·¨¹ÙÅд¦·þÐÌ121¸öÔºÍÖ§¸¶½ü44.3ÍòÃÀÔªµÄÅâ³¥½ð¡£¡£2014Äê4Ô£¬£¬£¬£¬GottesfeldʹÓÃÓÉÁè¼Ý4Íò¸ö·ÓÉÆ÷×é³ÉµÄ½©Ê¬ÍøÂç¶Ô²¨Ê¿¶Ù¶ùͯҽԺ£¨BCH£©ºÍ·ÇÓªÀûÐÔÖÎÁÆ»ú¹¹Wayside·¢¶¯DDoS¹¥»÷£¬£¬£¬£¬ÒÔ¿¹Òé¶ÔÇàÉÙÄ껼ÕßJustina PelletierµÄÖÎÁÆÐÐΪ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/01/ddos-attack-anonymous-hacker.html


4¡¢Ó¢¹úºÚ¿ÍÒòDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾±»ÅÐÈëÓü32¸öÔÂ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ó¢¹úºÚ¿ÍDaniel Kaye£¨29Ë꣩Òò2016ÄêDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾Lonestar¶ø±»ÅÐÈëÓü·þÐÌ32¸öÔ¡£¡£Æ¾Ö¤BBCµÄ±¨µÀ£¬£¬£¬£¬LonestarµÄ¾ºÕùµÐÊÖCellcomµÄÒ»ÃûÔ±¹¤Æ¸ÓÃÁËKayeÀ´¶ÔLonestar¾ÙÐÐDDoS¹¥»÷£¬£¬£¬£¬Ã¿ÔÂÏòÆäÖ§¸¶¸ß´ï1ÍòÃÀÔª£¨7800Ó¢°÷£©µÄÓöÈ¡£¡£¸Ã¹¥»÷ʹµÃÎ÷·Ç¹ú¼ÒµÄ»¥ÁªÍø½ÓÈëÖÐÖ¹£¬£¬£¬£¬¸øLonestarÔì³ÉÁËÊýÍòÍòÃÀÔªµÄËðʧ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/79781/breaking-news/british-hacker-sentenced-liberian-attack.html


5¡¢ÐÂÑо¿Åú×¢ÀÕË÷Èí¼þRyuk±³ºó¿ÉÄÜÊǶíÂÞ˹·¸·¨ÍÅ»ï

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤Crowdstrike¡¢FireEye¡¢Kryptos LogicºÍMcAfeeÐû²¼µÄ±¨¸æ£¬£¬£¬£¬ÀÕË÷Èí¼þRyuk±³ºóºÜÓпÉÄÜÊÇ¿î×ÓÄîÍ·µÄ¶íÂÞ˹·¸·¨ÍŻ£¬£¬£¬¶ø²»ÊÇ֮ǰÐÂÎÅýÌ屨µÀµÄ³¯ÏʺڿÍ¡£¡£Ö¤¾ÝÅú×¢RyukÊÇÓÉCrowdstrike³ÆÖ®ÎªGrim SpiderµÄ·¸·¨ÍŻィÉèµÄ£¬£¬£¬£¬¸ÃÍÅ»ï´ÓºÚ¿ÍÂÛ̳ÉϹºÖÃÁËÀÕË÷Èí¼þHermesµÄÒ»¸ö±äÖÖ£¬£¬£¬£¬²¢¶¨ÖÆ»¯ÐÞ¸ÄΪ×Ô¼ºµÄÀÕË÷Èí¼þRyuk¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬³¯ÏʺڿʹӺڿÍÂÛ̳ÉϹºÖÃÁËͳһ¸öHermes±äÖÖ£¬£¬£¬£¬µ«ËûÃÇÓëRyukÖ®¼äûÓÐÈκιØÁª¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ryuk-ransomware-gang-probably-russian-not-north-korean/


6¡¢ÐéαӰϷÎļþ¿ÉÇÔÈ¡¼ÓÃÜÇ®±ÒºÍÐÞ¸ÄGoogleËÑË÷Ч¹û

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



Ñо¿Ö°Ô±´Óº£µÁÍåÉÏÏÂÔØÓ°Ï·Ê±·¢Ã÷Ò»¸öαװ³ÉÓ°Ï·ÎļþµÄ¶ñÒâWindows¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬¸ÃÎļþÓÃÓÚÖ´ÐÐPowerShellÏÂÁ£¬£¬£¬¿ÉÒÔ½«¹¥»÷ÕßµÄÄÚÈÝ×¢È뵽ά»ù°Ù¿Æ¡¢GoogleºÍYandexËÑË÷Ч¹ûµÈ£¬£¬£¬£¬»¹¿ÉÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¡£¶ñÒâÈí¼þ»áÐÞ¸Ä×¢²á±íÏîÒÔ½ûÓÃWindows Defender£¬£¬£¬£¬»¹¿ÉÒÔÔÚFirefoxÖÐÇ¿ÖÆ×°ÖÃÀ©Õ¹Firefox Protection£¬£¬£¬£¬²¢Ð®ÖÆChromeÀ©Õ¹Chrome Media Router¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-movie-file-infects-pc-to-steal-cryptocurrency-poison-google-results/


ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·­ÒëºÍÕûÀí