αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ£»£»£»£»ºÚ¿ÍJohn WickÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5͵ȡÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2020-06-08

1.αÔìµÄÀÕË÷Èí¼þSTOP DjvuµÄ½âÃÜÆ÷¶ÔÊܺ¦ÕßÎļþ¶þ´Î¼ÓÃÜ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¿ËÈÕ£¬£¬£¬£¬ºÚ¿ÍÕýÔÚ·Ö·¢Î±ÔìµÄSTOP DjvuÀÕË÷Èí¼þµÄ½âÃÜÆ÷£¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßµÄÎļþ¾ÙÐжþ´Î¼ÓÃÜ¡£¡£¡£¡£STOP DjvuÊÇÒÑÍùÒ»ÄêÖÐ×î»îÔ¾µÄÀÕË÷Èí¼þ£¬£¬£¬£¬Æ½¾ùÌìÌìѬȾÁè¼Ý600¸öÊܺ¦Õß¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÖ÷ÒªÓ°ÏìµÄÊǼÒÍ¥Óû§£¬£¬£¬£¬Òò´ËÐí¶à±»Ñ¬È¾Óû§ÎÞ·¨Ö§¸¶500ÃÀÔªµÄÊê½ðÀ´¹ºÖýâÃÜÆ÷¡£¡£¡£¡£Ö®ºóÑо¿Ö°Ô±·¢Ã÷ÁËαÔìµÄÃâ·ÑµÄSTOP Djvu½âÃÜÆ÷£¬£¬£¬£¬¿ÉÊÇËû²»»á»Ö¸´ÈκÎÎļþ£¬£¬£¬£¬µ±Óû§·­¿ª¸ÃÈí¼þ²¢µã»÷×îÏÈɨÃèºó£¬£¬£¬£¬¸Ã³ÌÐò½«ÏÂÔØ¿ÉÖ´ÐÐÎļþcrab.exe²¢ÉúÑĵ½£¥Temp£¥Îļþ¼ÐÖУ¬£¬£¬£¬ÒÔ¶ÔÊܺ¦ÕßÅÌËã»úÉϵÄÊý¾Ý¾ÙÐмÓÃÜ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Ñо¿Ö°Ô±ÕýÔÚ¶Ô´ËÀÕË÷²¡¶¾¾ÙÐÐÆÊÎö¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/


2.ºÚ¿ÍJohn WickÉù³ÆÈëÇÖÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5£¬£¬£¬£¬ÍµÈ¡Ãô¸ÐÊý¾Ý


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


×Ô³ÆÎªJohn WickµÄºÚ¿ÍÉù³Æ£¬£¬£¬£¬ÆäÒѹ¥»÷ÁËÓ¡¶ÈÊÓÆµÆ½Ì¨ZEE5µÄϵͳ£¬£¬£¬£¬ÇÒ͵ȡÁ˸ù«Ë¾150GBµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¸ÃºÚ¿ÍÌåÏÖ£¬£¬£¬£¬Æä͵ȡµÄÊý¾Ý¿âÖаüÀ¨×î½üµÄÉúÒâ¡¢ÃÜÂë¡¢µç×ÓÓʼþ¡¢ÊÖ»úºÅÂë¡¢µç×ÓÓʼþID¡¢ÐÂÎŵȣ¬£¬£¬£¬²¢Íþв½«¹ûÕæÏúÊÛ¸ÃÊý¾Ý¿âºÍ´úÂë¡£¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬£¬ÏÖÔڸúڿÍÒѾ­Ðû²¼ÁËй¶Êý¾Ý¿âµÄ²¿·ÖÊý¾Ý¡¢»î¶¯Ô´´úÂëÖеÄÃÜÔ¿¡¢¶ÔAtlassian°åµÄÒýÓÃÒÔ¼°AWS´æ´¢Í°Æ¾Ö¤¡£¡£¡£¡£¾Ý´ËºÚ¿Í˵£¬£¬£¬£¬ÆäÊÇÀ´×Ôº«¹úµÄÇ徲ר¼Ò£¬£¬£¬£¬´Ë´Î»î¶¯Ö÷ÒªÊÇΪÁË×ÊÖúÕâЩÈËÐÞ¸´Îó²î¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄÊÓ²ìÖУ¬£¬£¬£¬ºÚ¿ÍÊÇ·ñÀ´×Ôº«¹ú»¹ÎÞ·¨È·¶¨¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/zee5-allegedly-hacked-by-korean-hackers-customer-info-at-risk/


3.ºÚ¿Íͨ¹ýVPNÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ºÚ¿ÍʹÓÃVPNÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬ÒÔÇÔÈ¡Óû§Microsoft Office 365Éϰ¶Æ¾Ö¤¡£¡£¡£¡£ÓÉÓÚÒßÇéÔµ¹ÊÔ­ÓÉ£¬£¬£¬£¬´ó²¿·ÖÈËÑ¡Ôñ¾Ó¼Ò°ì¹«£¬£¬£¬£¬Õâ´ó´óÔöÌíÁËVPNµÄʹÓÃÂÊ£¬£¬£¬£¬Òò´Ë¸ü¶àµÄºÚ¿Í»áÊÔͼ½«Æä×÷Ϊ¹¥»÷ǰÑÔ¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÖкڿÍð³äÊÕ¼þÈ˹«Ë¾µÄITÖ§³Ö²¿·Ö·¢ËÍ֪ͨÓʼþ£¬£¬£¬£¬ÓʼþÖаüÀ¨Ò»¸öÖ¸ÏòеÄÓÃÓÚ¼ÒÍ¥»á¼ûµÄVPNÉèÖõÄÁ´½Ó¡£¡£¡£¡£·¢¼þÈ˵ĵç×ÓÓʼþµØµã±»Î±×°³ÉÊܺ¦Õß¹«Ë¾µÄÓò£¬£¬£¬£¬´Ó¶øÓÕʹÊܺ¦Õßµã»÷Á´½Ó£¬£¬£¬£¬ÒÔ½«ÆäÖØ¶¨Ïòµ½office365ƾ֤´¹ÂÚÍøÕ¾¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://hotforsecurity.bitdefender.com/blog/hackers-use-vpn-impersonation-in-phishing-emails-to-steal-office-365-credentials-23456.html


4.ÐÂÀÕË÷Èí¼þKupidonÖ÷ÒªÕë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


MalwareHunterTeamÓÚ5ÔÂ9ÈÕÊ״η¢Ã÷ÐÂÀÕË÷Èí¼þKupidon£¬£¬£¬£¬Æä²»µ«Õë¶Ô¹«Ë¾ÍøÂ磬£¬£¬£¬»¹Õë¶Ô¼ÒÍ¥Óû§µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷¸ÃÀÕË÷Èí¼þµÄÑù±¾£¬£¬£¬£¬Ñо¿Ö°Ô±»ùÓÚÓëÊܺ¦ÕßµÄÅÊ̸ºÍÉÏ´«µÄÎļþ¾ÙÐÐÆÊÎö¡£¡£¡£¡£ºÚ¿ÍÒ»µ©½øÈëÍøÂ磬£¬£¬£¬±ã»á¼ÓÃÜÊܺ¦ÕßÎļþ£¬£¬£¬£¬ÔÚÎļþÃûºó¸½¼Ó.kupidonÀ©Õ¹Ãû£¬£¬£¬£¬²¢ÁôÏÂÊê½ðÒªÇ󡣡£¡£¡£ÆäÖУ¬£¬£¬£¬Õë¶ÔÆóÒµËüÒªÇóµÄÊê½ðΪ1200ÃÀÔªµÄ±ÈÌØ±Ò£¬£¬£¬£¬Õë¶Ô¼ÒÍ¥Óû§ÒªÇó300ÃÀÔªµÄÊê½ð¡£¡£¡£¡£Ò»µ©Óû§Ö§¸¶Êê½ðºó±ã»áÊÕµ½AES½âÃÜÃÜÔ¿ºÍKupidon½âÃÜÆ÷¡£¡£¡£¡£ÏÖÔÚ»¹Ã»ÓиÃÀÕË÷²¡¶¾µÄÑù±¾£¬£¬£¬£¬Òò´ËÉÐÎÞ·¨ÖªµÀ¸ÃÈí¼þÊÇ·ñ±£´æÎó²î¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kupidon-is-the-latest-ransomware-targeting-your-data/


5.Ñо¿Ö°Ô±·¢Ã÷FacebookÖжà¸öSSRFÎó²î£¬£¬£¬£¬»ñ3.1ÍòÃÀÔª½±½ð


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±Bipin Jitiya·¢Ã÷Facebook±£´æ¶à¸öSSRFÎó²î£¬£¬£¬£¬Á¬ÏµÊ¹ÓÃÕâЩÎó²î»á¶Ôƽ̨±¬·¢ÑÏÖØµÄÓ°Ï죬£¬£¬£¬²¢Òò´Ë»ñµÃÁËFacebookÌṩµÄ×ܼÆ31500ÃÀÔª½±½ð¡£¡£¡£¡£¸ÃÑо¿Ö°Ô±Ê×ÏÈ·¢Ã÷µÄÊÇshortURLʹÃüÖÐȱÉÙÈÏÖ¤»á»°£¬£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔÔÚ²»¾ÙÐÐÉí·ÝÑéÖ¤µÄÇéÐÎÏ»á¼û´ËЧÀÍ£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜʹÓÃÆäͨ¹ýSSRF¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ëû·¢Ã÷ÁËFacebook¶ÌµØµã(https://fb.me/)ÖеÄSSRFÎó²î£¬£¬£¬£¬¸ÃÎó²îй¶ÁËÈÕÖ¾Îļþ¼ÐµÄÄÚ²¿Â·¾¶¡¢ÆäËûÎļþ·¾¶¡¢Ê¹ÓÃfetchÊý¾ÝµÄÄÚ²¿ÏµÍ³ÅÌÎÊ¡¢ÄÚ²¿IPµØµã¡¢ÄÚ²¿ID¡¢ÉèÖÃÏà¹ØÐÅÏ¢¡¢Ë½ÓÐÎĵµµÈÐÅÏ¢¡£¡£¡£¡£JitiyaÌåÏÖ£¬£¬£¬£¬Á¬ÏµÕâÁ½¸öÎó²î£¬£¬£¬£¬¿ÉÄܵ¼Ö¶ÔÄÚ²¿»ù´¡ÉèÊ©µÄ·¾¶±éÀúºÍSSRF¹¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/07/hacker-won-31k-bounty-for-reporting-numerous-facebook-bugs/


6.ÖÇÀûCPLTÊÓ²ìÏÔʾ£¬£¬£¬£¬¸Ã¹úÒ½ÁÆÐÐÒµ±£´æÃô¸ÐÊý¾Ýй¶ÎÊÌâ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÖÇÀû͸Ã÷¶ÈίԱ»á£¨The Chilean Transparency Council £¬£¬£¬£¬CPLT£©¶ÔÆäÎÀÉú²¿·Ö¾ÙÐÐÊӲ죬£¬£¬£¬·¢Ã÷±£´æÐ¹Â¶Ãô¸ÐÊý¾ÝµÄÎÊÌâ¡£¡£¡£¡£´Ë´ÎCPLTÖ÷Òª¶Ô86¸ö×éÖ¯µÄ1.2Íò·Ý²É¹ºµ¥¾ÙÐÐÉ󼯣¬£¬£¬£¬ÒÔÈ·¶¨¸Ã¹ú²î±ðÒ½ÔººÍÎÀÉúЧÀÍ»ú¹¹¶Ô»¼Õß¹ºÖÃÓÃÆ·ºÍЧÀ͵ÄСÎÒ˽¼ÒºÍÃô¸ÐÊý¾ÝµÄ´¦Öóͷ£¡£¡£¡£¡£·¢Ã÷Ò½ÔºµÄ12·Ý²É¹ºµ¥ºÍÎÀÉúЧÀÍ»ú¹¹µÄ6·Ý²É¹ºµ¥Ð¹Â¶ÁË»¼ÕßµÄÃô¸ÐСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬ÕâЩÊý¾ÝÊǽöÔÚËùÓÐÕßÃ÷È·Ô޳ɵÄÇéÐÎÏ²ŻªÈö²¥µÄÐÅÏ¢¡£¡£¡£¡£CPLTÌåÏÖ£¬£¬£¬£¬ÔÚ¹ºÖÃÉÌÆ·ºÍЧÀ͵ÄÀú³ÌÖÐй¶ÕâЩÐÅÏ¢ÇÖÕ¼ÁË»¼ÕßµÄÒþ˽£¬£¬£¬£¬ÆäÒѾ­ÏòÎÀÉú²¿·¢³ö֪ͨ£¬£¬£¬£¬²¢ÎªÆä½â¾öÕâЩÎÊÌâÌṩÁËÊÖÒÕÖ§³Ö¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.consejotransparencia.cl/fiscalizacion-del-cplt-descubre-vulneracion-de-la-privacidad-de-pacientes-en-compras-de-hospitales-y-servicios-de-salud/