Strava½¡ÉíÓ¦Óñ»ÆØÐ¹Â¶¶à¹ú×Üͳ°²±£Ö°Ô±Î»ÖÃÐÅÏ¢
Ðû²¼Ê±¼ä 2024-10-311. Strava½¡ÉíÓ¦Óñ»ÆØÐ¹Â¶¶à¹ú×Üͳ°²±£Ö°Ô±Î»ÖÃÐÅÏ¢
10ÔÂ29ÈÕ£¬£¬£¬StravaÊÇÒ»¿îÈ«Çò¹ãÊܽӴýµÄ½¡ÉíÓ¦ÓóÌÐò£¬£¬£¬ÓµÓÐ1.2ÒÚÓû§£¬£¬£¬Äܹ»¼Í¼Åܲ½¡¢ÆïÐеÈÔ˶¯¹ì¼£¡£¡£¡£È»¶ø£¬£¬£¬·¨¹úýÌå¡¶Ììϱ¨¡··¢Ã÷£¬£¬£¬Strava±£´æÐ¹Â¶Ãô¸ÐλÖÃÐÅÏ¢µÄΣº¦£¬£¬£¬°üÀ¨ÃÀ¹ú×Üͳ¼°Æä¾ºÑ¡È˵ÄÌùÉí°²±£Ö°Ô±Î»Öᣡ£¡£¾Ý±¨µÀ£¬£¬£¬ÖÁÉÙ26ÃûÃÀ¹úÌØ¹¤ÔÚStravaÉÏÓµÓй«¹²ÕË»§£¬£¬£¬ÇÒÔÚÌØÀÊÆÕÔâÓöıº¦Î´ËìÊÂÎñºóÈÔ»îÔ¾ÓÚ¸ÃÆ½Ì¨¡£¡£¡£±ðµÄ£¬£¬£¬·¨¹úºÍ¶íÂÞ˹µÄ×Üͳ°²±£Ö°Ô±Ò²±»·¢Ã÷ʹÓøÃÓ¦Ó㬣¬£¬Éæ¼°12Ãû·¨¹úGSPR³ÉÔ±ºÍ6Ãû¶íÂÞ˹FSO³ÉÔ±¡£¡£¡£ÕâЩÇå¾²Ö°Ô±ÔÚStravaÉϵÄÐж¯¿ÉÄܵ¼ÖÂÇå¾²Îó²î£¬£¬£¬ÓÉÓÚËûÃǵÄÔ˶¯¹ì¼£¿£¿£¿ÉÄÜ̻¶Ïòµ¼ÈËÏÂ齺;ۻáËùÔÚµÄÐÅÏ¢£¬£¬£¬ÉõÖÁСÎÒ˽¼ÒÉúÑÄϸ½ÚÒ²¿ÉÄܱ»¶ñÒâʹÓᣡ£¡£Ö»¹ÜÃÀ¹úÌØÇھֺͷ¨¹ú×Üͳ¹Ù·½»ú¹¹¶Ô´Ë¾ÙÐÐÁË»ØÓ¦£¬£¬£¬³ÆÊ¹ÓÃStrava²»»á¶Ô°²±£Ðж¯×é³ÉÍþв£¬£¬£¬µ«´ËǰStravaÐû²¼µÄÈ«Çò½¡ÉíÈÈÇøÍ¼¾ÍÔøÌ»Â¶ÃÀ¾üÔÚÖж«µØÇøµÄÉñÃØ»î¶¯Î»Ö㬣¬£¬Òý·¢ÕùÒé¡£¡£¡£±ðµÄ£¬£¬£¬½¡ÉíÓ¦ÓóÌÐòÊý¾Ý»¹¿ÉÄܱ»¹¥»÷ÕßÓÃÓÚ×·×ÙDZÔÚÊܺ¦Õߣ¬£¬£¬ÔöÌí¸ú×Ù¡¢ÇÀ½ÙµÈ·¸·¨Î£º¦¡£¡£¡£Òò´Ë£¬£¬£¬Ê¹ÓôËÀàÓ¦ÓÃʱÐèÉóÉ÷£¬£¬£¬×èֹй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£
https://cybernews.com/news/fitness-app-strava-location-biden-trump-harris/
2. Metaƽ̨Ôâ¶ñÒâ¹ã¸æ»î¶¯ÇÖÏ®£¬£¬£¬SYS01ÐÅÏ¢ÇÔÈ¡³ÌÐòÈ«ÇòËÁŰ
10ÔÂ30ÈÕ£¬£¬£¬Ò»ÏîеĶñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓà Meta ƽ̨Èö²¥ SYS01 ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬¸Ã³ÌÐòרÃÅÕë¶Ô 45 ËêÒÔÉϵÄÄÐÐÔÓû§£¬£¬£¬Í¨¹ýαװ³ÉÊ¢ÐÐÈí¼þ¡¢ÓÎÏ·ºÍÔÚÏßЧÀ͵ÄÐéα¹ã¸æ¾ÙÐй¥»÷¡£¡£¡£¸Ã»î¶¯×Ô 2024 Äê 9 ÔÂÊ״α»·¢Ã÷ÒÔÀ´£¬£¬£¬ÒÑÔÚÈ«Çò¹æÄ£ÄÚÔì³ÉÆÕ±éÓ°Ï죬£¬£¬°üÀ¨Å·ÃË¡¢±±ÃÀ¡¢°Ä´óÀûÑǺÍÑÇÖ޵ȵء£¡£¡£SYS01 ³ÌÐò»áÇÔÈ¡ Facebook ƾ֤£¬£¬£¬ÌØÊâÊÇÖÎÀíÉÌÒµÒ³ÃæµÄÕË»§£¬£¬£¬²¢Ê¹ÓÃÕâЩÕË»§½øÒ»²½Èö²¥¹¥»÷¡£¡£¡£¹¥»÷Õßͨ¹ý MediaFire Á´½ÓÌṩ¿´ËÆÕýµ±µÄÈí¼þÏÂÔØ£¬£¬£¬ÕâЩÏÂÔØÄÚÈݰüÀ¨¶ñÒâµÄ Electron Ó¦ÓóÌÐò£¬£¬£¬Ò»µ©Ö´ÐУ¬£¬£¬¾Í»áÖ²Èë²¢ÔËÐÐ SYS01 ³ÌÐò¡£¡£¡£¸Ã³ÌÐòÁ¬ÏµÁË·´É³ºÐ¼ì²éÒÔÌӱܼì²â£¬£¬£¬²¢»áÌáÈ¡°üÀ¨½¹µã¶ñÒâÈí¼þ×é¼þµÄÊÜÃÜÂë±£»£»£»£»£»¤µÄ´æµµ¡£¡£¡£±»µÁÕË»§²»µ«ÓÃÓÚ½øÒ»²½¹¥»÷/Õ©Æ£¬£¬£¬»¹±»ÓÃÀ´ÖÆ×÷жñÒâ¹ã¸æ£¬£¬£¬ÈƹýÇå¾²¹ýÂËÆ÷£¬£¬£¬ÐγÉÒ»¸ö×ÔÎÒά³ÖµÄÑ»·¡£¡£¡£Òò´Ë£¬£¬£¬Óû§ÔÚ Facebook ÉÏ£¬£¬£¬ÓÈÆäÊÇÔËÓªÉÌÒµÒ³ÃæµÄÓû§£¬£¬£¬±ØÐèСÐÄ´ËÀàÍþв¡£¡£¡£
https://hackread.com/fake-meta-ads-hijacking-facebook-sys01-infostealer/
3. ÃØÂ³InterbankÔâÊý¾Ýй¶£¬£¬£¬ºÚ¿ÍÉù³ÆÇÔÈ¡300Íò¿Í»§ÐÅÏ¢
10ÔÂ30ÈÕ£¬£¬£¬ÃØÂ³×ÅÃû½ðÈÚ»ú¹¹Interbank½üÆÚÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÆäϵͳ²¢ÍµÈ¡Á˿ͻ§Êý¾Ý£¬£¬£¬ËæºóÔÚÍøÉϾÙÐÐй¶¡£¡£¡£Ö»¹ÜInterbankδ͸¶ÏêϸÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿£¬£¬£¬µ«Dark Web Informer·¢Ã÷£¬£¬£¬Ò»ÃûʹÓá°kzoldyck¡±Óû§ÃûµÄºÚ¿ÍÕýÔÚ¶à¸öÂÛ̳³öÊ۾ݳƴӸÃÒøÐÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¾ÝºÚ¿ÍÉù³Æ£¬£¬£¬ËûÃÇÄܹ»»ñÈ¡Interbank¿Í»§µÄÈ«Ãû¡¢ÕË»§ID¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍIPµØµãµÈÃô¸ÐÐÅÏ¢£¬£¬£¬ÒÔ¼°ÐÅÓÿ¨ÐÅÏ¢¡¢ÒøÐÐÉúÒâÊý¾ÝµÈ£¬£¬£¬×ÜÁ¿Áè¼Ý3.7TB¡£¡£¡£±ðµÄ£¬£¬£¬ºÚ¿Í»¹Éù³ÆÓµÓпͻ§µÄÃ÷È·Óû§ÃûºÍÃÜÂëÐÅÏ¢£¬£¬£¬¿ÉÒÔ´ÓÃØÂ³IP¿é»á¼ûÒøÐÐÕË»§¡£¡£¡£ºÚ¿ÍÌåÏÖ£¬£¬£¬ËûÃÇÁ½ÖÜÇ°ÔøÊµÑéÓëInterbankÖÎÀí²ã̸Åе«Î´¹û£¬£¬£¬Òò´Ë¾öÒé¹ûÕæÐ¹Â¶Êý¾Ý¡£¡£¡£InterbankÒÑÈ·Èϱ¬·¢Êý¾Ýй¶£¬£¬£¬²¢ÌåÏÖÒѰ²ÅÅÌØÊâÇå¾²²½·¥±£»£»£»£»£»¤¿Í»§ÐÅÏ¢ºÍÔËÓª£¬£¬£¬Í¬Ê±°ü¹Ü¿Í»§´æ¿îÇå¾²£¬£¬£¬²¢Ö¸³ö´ó´ó¶¼ÓªÒµÇþµÀÒѻָ´ÔÚÏß¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/
4. ³¯ÏʺڿÍ×éÖ¯AndarielÉæÏÓ¼ÓÈëPlayÀÕË÷Èí¼þÐж¯²¢ÌÓ±ÜÖÆ²Ã
10ÔÂ30ÈÕ£¬£¬£¬³¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Andariel±»×·×ÙÓëPlayÀÕË÷Èí¼þÐж¯ÓйØÁª£¬£¬£¬¾ÝPalo Alto Networks¼°ÆäUnit 42Ñо¿Ö°Ô±µÄ±¨¸æ³Æ£¬£¬£¬Andariel¿ÉÄÜÊÇPlayµÄÁ¥Êô»ú¹¹»ò³õʼ»á¼ûÊðÀí£¬£¬£¬ÐÖúÔÚÆäÈëÇÖµÄÍøÂçÉϰ²ÅŶñÒâÈí¼þ¡£¡£¡£AndarielÊÇÒ»¸öÊܳ¯ÏÊÕþ¸®Ö§³ÖµÄAPT×éÖ¯£¬£¬£¬Ó볯ÏʾüÊÂÇ鱨»ú¹¹Õì̽×ܾÖÓйØÁª£¬£¬£¬ÔøÒò¹¥»÷ÃÀ¹úÀûÒæ¶øÊܵ½ÃÀ¹úÖÆ²Ã¡£¡£¡£´Ëǰ£¬£¬£¬AndarielÒ²ÔøÓëMauiÀÕË÷Èí¼þÐж¯Óйء£¡£¡£ÔÚ2024Äê9ÔµÄÒ»´ÎPlayÀÕË÷Èí¼þÊÂÎñÏìÓ¦ÖУ¬£¬£¬Unit 42·¢Ã÷AndarielÔÚÆä¿Í»§µÄÊÜÑ¬È¾ÍøÂçÖл£¬£¬£¬²¢ÔÚ¼¸¸öÔºóPlayÀÕË÷Èí¼þ²ÅÔÚÍøÂçÉÏÖ´ÐС£¡£¡£Ñо¿Ö°Ô±ÒÔΪAndarielµÄ±£´æºÍPlayÔÚÍ³Ò»ÍøÂçÉϵݲÅÅÓйØÁª£¬£¬£¬µ«²»È·¶¨AndarielÊÇ·ñ³äµ±ÁËPlayÁ¥Êô»ú¹¹»òÏò¹¥»÷Õß³öÊÛÁËÊÜÑ¬È¾ÍøÂçµÄ»á¼ûȨÏÞ¡£¡£¡£Í¨¹ýÓëÀÕË÷Èí¼þÍÅ»ïÏàÖú£¬£¬£¬AndarielµÃÒÔÌӱܹú¼ÊÖÆ²Ã£¬£¬£¬ÕâÖÖÕ½ÂÔÀàËÆÓÚ֮ǰÊܵ½ÖƲõĶíÂÞ˹ºÚ¿Í×éÖ¯Evil CorpºÍÒÁÀÊÍþвÐÐΪÕß¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-govt-hackers-linked-to-play-ransomware-attack/
5. Android°æFakeCall¶ñÒâÈí¼þÐ®ÖÆÒøÐе绰£¬£¬£¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢
10ÔÂ30ÈÕ£¬£¬£¬Android°æFakeCall¶ñÒâÈí¼þµÄа汾ͨ¹ý½«×Ô¼ºÉèÖÃΪĬÈϺô½Ð´¦Öóͷ£³ÌÐò£¬£¬£¬Äܹ»Ð®ÖÆÓû§²¦´òÒøÐе绰µÄºô½Ð£¬£¬£¬²¢½«ÆäÖØ¶¨Ïòµ½¹¥»÷Õߵĵ绰ºÅÂë¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔÓïÒôÍøÂç´¹ÂÚÎªÖØµã£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÈËÃǵÄÃô¸ÐÐÅÏ¢ºÍÒøÐÐÕË»§×ʽ𡣡£¡£³ýÁËÓïÒôÍøÂç´¹ÂÚ£¬£¬£¬Ëü»¹Äܲ¶»ñʵʱÒôƵºÍÊÓÆµÁ÷¡£¡£¡£×îа汾µÄFakeCallÔöÌíÁ˶àÏîˢк͹¥»÷»úÖÆ£¬£¬£¬ÈçÀ¶ÑÀ¼àÌýÆ÷¡¢ÆÁĻ״̬¼àÊÓÆ÷ºÍ¸¨Öú¹¦Ð§Ð§ÀÍ£¬£¬£¬ÒÔ»ñµÃ¶ÔÓû§½çÃæµÄÆÕ±é¿ØÖÆ£¬£¬£¬²¢ÔÊÐí¹¥»÷ÕßÖ´ÐÐÖݪֲÙ×÷£¬£¬£¬Èç»ñȡװ±¸Î»Öá¢É¾³ýÓ¦ÓóÌÐò¡¢Â¼ÖÆÒôƵ»òÊÓÆµÒÔ¼°±à¼ÁªÏµÈË¡£¡£¡£±ðµÄ£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹ÔÚÆð¾¢¿ª·¢ÖУ¬£¬£¬ÔöÌíÁ˽«¶ñÒâÈí¼þÉèÖÃΪĬÈϺô½Ð´¦Öóͷ£³ÌÐò¡¢ÊµÊ±²¥·Å×°±¸ÆÁÄ»ÄÚÈݵÈй¦Ð§¡£¡£¡£ZimperiumÐû²¼ÁËÈëÇÖÖ¸±êÁбíÒÔ×ÊÖúÓû§±Ü¿ª¶ñÒâÓ¦Ó㬣¬£¬µ«½¨ÒéÓû§´ÓGoogle Play×°ÖÃÓ¦ÓÃÒÔ×èֹΣº¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/
6. EmeraldWhaleɨÃèGitÉèÖÃÎļþ£¬£¬£¬ÇÔÈ¡15,000¸öÔÆÕÊ»§Æ¾Ö¤
10ÔÂ30ÈÕ£¬£¬£¬ÃûΪ¡°EmeraldWhale¡±µÄ´ó¹æÄ£¶ñÒâ²Ù×÷ʹÓÃ×Ô¶¯»¯¹¤¾ßɨÃè̻¶µÄGitÉèÖÃÎļþ£¬£¬£¬´ÓÊýǧ¸ö˽ÈË´æ´¢¿âÖÐÇÔÈ¡ÁËÁè¼Ý15,000¸öÔÆÕÊ»§Æ¾Ö¤¡£¡£¡£ÕâЩƾ֤±»ÓÃÓÚÏÂÔØ´æ´¢ÔÚGitHub¡¢GitLabºÍBitBucketÉϵĴ洢¿â£¬£¬£¬²¢½øÒ»²½É¨ÃèÒÔ»ñÈ¡¸ü¶àƾ֤¡£¡£¡£±»µÁÊý¾Ý±»Ð¹Â¶ÖÁÆäËûÊܺ¦ÕßµÄAmazon S3´æ´¢Í°ÖУ¬£¬£¬²¢±»ÓÃÓÚÍøÂç´¹ÂÚ¡¢À¬»øÓʼþ»î¶¯»òÖ±½Ó³öÊÛ¸øÆäËûÍøÂç·¸·¨·Ö×Ó¡£¡£¡£EmeraldWhale±³ºóµÄÍþвÐÐΪÕßʹÓÿªÔ´¹¤¾ßɨÃèÔ¼5ÒÚ¸öIPµØµãÉϵÄÍøÕ¾£¬£¬£¬ÌØÊâÊǼì²éLaravelÓ¦ÓóÌÐòÖеÄ/.git/configÎļþºÍÇéÐÎÎļþ(.env)ÊÇ·ñ̻¶¡£¡£¡£ÕâЩÎļþÖпÉÄܰüÀ¨APIÃÜÔ¿¡¢ÔÆÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£SysdigÊӲ쵽£¬£¬£¬ºÚ¿ÍʹÓÃÉÌÆ·¹¤¾ß¼¯¼ò»¯ÕâÒ»Á÷³Ì£¬£¬£¬²¢ÔÚ̻¶µÄS3´æ´¢Í°Öз¢Ã÷ÁË´ó×ÚÉñÃØÐÅÏ¢¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬Õâ´Î»î¶¯ÒÀÀµÓÚÉÌÆ·¹¤¾ßºÍ×Ô¶¯»¯£¬£¬£¬µ«ÈÔÈ»ÀÖ³ÉÇÔÈ¡ÁËÊýǧ¸ö¿ÉÄܵ¼ÖÂÔÖÄÑÐÔÊý¾Ýй¶µÄÉñÃØ¡£¡£¡£Èí¼þ¿ª·¢Ö°Ô±Ó¦Ê¹ÓÃרÓõÄÉñÃØÖÎÀí¹¤¾ßÀ´½µµÍΣº¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/


¾©¹«Íø°²±¸11010802024551ºÅ