¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190118

Ðû²¼Ê±¼ä 2019-01-18
1¡¢ÃÀOklahomaÖÝÕþ¸®Ð§ÀÍÆ÷ÒâÍâ̻¶3TBÃô¸ÐÊý¾Ý

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


UpGuardÑо¿Ö°Ô±Greg Pollock·¢Ã÷ÊôÓÚÃÀ¹ú¶í¿ËÀ­ºÉÂíÖÝ֤ȯ²¿ODSµÄһ̨ЧÀÍÆ÷¿É¹ûÕæ»á¼û £¬£¬£¬£¬£¬µ¼Ö°üÀ¨Êý°ÙÍòÃô¸ÐÎļþµÄÔ¼3TBÕþ¸®Êý¾Ý̻¶¡£¡£¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨Ö¤È¯Î¯Ô±»áÊýÊ®ÄêµÄÉñÃØÎļþºÍÐí¶àÃô¸ÐµÄFBIÊÓ²ìÎļþ £¬£¬£¬£¬£¬ÒÔ¼°Ô¼1ÍòÃû¹ÉƱ¾­¼ÍÈ˵ĵç×ÓÓʼþ¡¢Éç»áÇå¾²ºÅÂë¡¢ÐÕÃûºÍµØµãÐÅÏ¢µÈ¡£¡£¡£¡£¡£ShodanÏÔʾ¸ÃЧÀÍÆ÷ÖÁÉÙ´Ó2018Äê11ÔÂ30ÈÕ×îÏȿɹûÕæ»á¼û £¬£¬£¬£¬£¬Ô¼Ò»ÖܺóODSÊÕµ½Í¨Öª²¢¶Ô¸ÃЧÀÍÆ÷ʵÑéÁ˱£»£»£»£»£»£»£»¤²½·¥¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/01/oklahoma-fbi-data-leak.html


2¡¢º«¹ú¹ú·À²¿DAPAÔâºÚ¿ÍÈëÇÖ £¬£¬£¬£¬£¬²¿·ÖÉñÃØÎļþ±»ÇÔ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾



¾ÝÍâµØÃ½Ì屨µÀ £¬£¬£¬£¬£¬2018Äê10Ôº«¹ú¹ú·ÀÊÖÏÂÊô»ú¹¹DAPAÔâºÚ¿ÍÈëÇÖ £¬£¬£¬£¬£¬²¿·ÖÉñÃØÎļþ±»ÇÔ¡£¡£¡£¡£¡£DAPAµÄÈ«³ÆÊǹú·À¹ºÂòÍýÏëÖÎÀí¾Ö £¬£¬£¬£¬£¬ÈÏÕæ¼àÊÓ¾ü¶ÓµÄÎäÆ÷ºÍµ¯Ò©²É¹º¡£¡£¡£¡£¡£ÍâµØÃ½Ì峯ºÚ¿ÍÈëÇÖÁ˸ò¿·ÖµÄ30̨ÅÌËã»ú²¢ÇÔÈ¡ÁËÖÁÉÙ10̨ÅÌËã»úµÄÄÚ²¿Îļþ £¬£¬£¬£¬£¬ÕâЩÎļþÉõÖÁ°üÀ¨¸Ã¹úÏÂÒ»´úÕ½¶·»úµÄ²É¹ºÐÅÏ¢¡£¡£¡£¡£¡£¾Ý³ÆºÚ¿ÍÊ×ÏÈ»ñµÃÁË×°ÖÃÔÚËùÓÐÕþ¸®ÅÌËã»úÉϵÄÇå¾²Èí¼þ¡°Êý¾Ý´æ´¢·À»¤½â¾ö¼Æ»®¡±µÄЧÀÍÆ÷ÖÎÀíԱȨÏÞ £¬£¬£¬£¬£¬È»ºó´ÓÏàÁ¬µÄÊÂÇéÕ¾ÖÐÇÔÈ¡ÁËÕâЩÎļþ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-breach-and-steal-data-from-south-koreas-defense-ministry/


3¡¢Õë¶ÔÎ÷·ÇÒøÐеĹ¥»÷»î¶¯ £¬£¬£¬£¬£¬Ö÷ҪʹÓÃNanoCoreµÈ¶ñÒâÈí¼þ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤ÈüÃÅÌú¿ËµÄ±¨¸æ £¬£¬£¬£¬£¬×Ô2017ÄêÖÐÆÚÒÔÀ´Õë¶ÔÎ÷·ÇµØÇøÒøÐлú¹¹µÄ¶à´Î¹¥»÷»î¶¯Ö÷ÒªÒÀÀµÓÚÏÖÓеĶñÒâÈí¼þºÍÃâ·ÑµÄºÚ¿Í¹¤¾ß £¬£¬£¬£¬£¬°üÀ¨NanoCoreľÂí¡¢PsExec¡¢Cobalt Strike¡¢UltraVNC¡¢MimikatzºÍImminent Monitor RATµÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ±¨¸æÖÐÆÊÎöÁËÕë¶Ô¿¦Âó¡¡¢¸Õ¹û¡¢¼ÓÄÉ¡¢³àµÀ¼¸ÄÚÑǺͿÆÌصÏÍߵȹú¼ÒÒøÐлú¹¹µÄËĴι¥»÷»î¶¯ £¬£¬£¬£¬£¬ÕâЩ¹¥»÷»î¶¯±³ºóµÄ¹¥»÷ÕßÉí·ÝÈÔ²»Ã÷È·¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/banks-in-west-africa-hit-with-off-the-shelf-malware-free-tools/


4¡¢Drupal¿ª·¢ÍŶÓÐû²¼Çå¾²¸üР£¬£¬£¬£¬£¬ÐÞ¸´Á½¸öí§Òâ´úÂëÖ´ÐÐÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Drupal¿ª·¢ÍŶÓÐû²¼Çå¾²¸üР£¬£¬£¬£¬£¬ÐÞ¸´Á½¸ö¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÇå¾²Îó²î¡£¡£¡£¡£¡£µÚÒ»¸öÎó²î£¨SA-CORE-2019-002£©ÓëPHPÄÚÖõÄÁ÷°ü×°Æ÷pharÓÐ¹Ø £¬£¬£¬£¬£¬µÚ¶þ¸öÎó²î£¨CVE-2018-1000888£©ÔòÓëPHP´¦Öóͷ£.tarÎļþµÄµÚÈý·½¿âPEAR Archive_TarÓÐ¹Ø £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓöñÒâ.tarÎļþɾ³ýϵͳÉϵÄí§ÒâÎļþ £¬£¬£¬£¬£¬ÉõÖÁ¿ÉÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£DrupalÔÚа汾8.6.6¡¢8.5.9ºÍ7.62ÖÐÐÞ¸´ÁËÕâÁ½¸öÎó²î £¬£¬£¬£¬£¬Çë×¢ÖØ8.5.x֮ǰµÄDrupal 8°æ±¾ÒѾ­µÖ´ïÉúÃüÖÜÆÚ £¬£¬£¬£¬£¬½«²»»áÔÙÎüÊÕµ½Çå¾²¸üС£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/80001/security/drupal-critical-flaws.html


5¡¢ÎÚ¿ËÀ¼¾¯·½µ·»ÙÁ½¸öºÚ¿ÍÍÅ»ï £¬£¬£¬£¬£¬6ÃûÏÓ·¸±»²¶

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


±¾ÖÜÎÚ¿ËÀ¼¾¯·½»®·Öµ·»ÙÁËÁ½¸öºÚ¿ÍÍÅ»ï £¬£¬£¬£¬£¬¹²¾Ð²¶ÁË6Ãû·¸·¨·Ö×Ó¡£¡£¡£¡£¡£µÚÒ»¸öºÚ¿ÍÍÅ»ïÓÉ26ËêÖÁ30ËêµÄ4ÃûÏÓ·¸×é³É £¬£¬£¬£¬£¬ËûÃÇʹÓö¨ÖƵÄľÂíºÍ¼üÅ̼ͼÆ÷´ÓÎÚ¿ËÀ¼¹«ÃñµÄÅÌËã»úÖÐÇÔÈ¡ÒøÐÐÕË»§Æ¾Ö¤ £¬£¬£¬£¬£¬¹²Íµ×ßÁË500¶àÍòHryvnia£¨ÎÚ¿ËÀ¼Ç®±Ò £¬£¬£¬£¬£¬×ܼÛÖµÔ¼17.8ÍòÃÀÔª£©¡£¡£¡£¡£¡£µÚ¶þ¸öºÚ¿ÍÍÅ»ïÓÉÁ½ÃûÏÓ·¸×é³É £¬£¬£¬£¬£¬ËûÃÇͨ¹ý×Ô¼º¿ª·¢µÄDDoS¹¤¾ß¶ÔÎÚ¿ËÀ¼µÄ¼¸¸öÖ÷Òª×ÊÔ´¾ÙÐÐDDoS¹¥»÷ £¬£¬£¬£¬£¬°üÀ¨MariupolÊеÄÐÂÎÅÍøÕ¾ºÍ¶à¼Ò½ÌÓý»ú¹¹µÈ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/01/ukrainian-cybercriminals.html


6¡¢ESÎļþä¯ÀÀÆ÷Á½¸öÎó²îʹµÃÁè¼Ý1ÒÚAndroidÓû§ÃæÁÙΣº¦

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾



Çå¾²Ñо¿Ô±Robert BaptisteÔÚESÎļþä¯ÀÀÆ÷Öз¢Ã÷Ò»¸öʼÖÕÔÚºǫ́ÔËÐеÄÒþ²ØWebЧÀÍÆ÷£¨¶Ë¿Ú59777£© £¬£¬£¬£¬£¬ÓëÊܺ¦Õß´¦ÓÚͳһÍâµØÍøÂçµÄ¹¥»÷Õ߿ɻñÈ¡Êܺ¦ÕßÊÖ»úµÄ´ó×ÚÓÐÓÃÐÅÏ¢£¨°üÀ¨×°±¸ÐÅÏ¢¡¢app×°ÖÃÐÅÏ¢¡¢ÎļþµÈ) £¬£¬£¬£¬£¬ÉõÖÁ¿ÉÒÔÔ¶³ÌÆô¶¯app¡£¡£¡£¡£¡£¸ÃÎó²î±»¸ú×ÙΪCVE-2019-6447 £¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹Ðû²¼ÁËPOC¾ç±¾¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬ESETÑо¿Ö°Ô±Lukas Stefanko·¢Ã÷ÁËÁíÒ»ÆäÖÐÐÄÈË£¨MitM£©¹¥»÷Îó²î £¬£¬£¬£¬£¬Ó°ÏìÁË4.1.9.7.4¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£¡£ESÎļþä¯ÀÀÆ÷¿ª·¢ÍŶÓÌåÏÖÐÞ¸´²¹¶¡½«ÔÚԼĪÁ½ÌìºóÍÆ³ö¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/es-file-explorer-flaws-put-100-million-users-data-at-risk-fix-promised/


ÉùÃ÷£º±¾×ÊѶÓÉ¿­·¢k8άËûÃüÇ徲С×é·­ÒëºÍÕûÀí