µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬£¬£¬£¬£¬£¬£¬ £¬Ó°Ïì2ÍòÓû§£»£»£»£»£»£»ÓÎÏ·ÍøÕ¾Emuparadiseй¶110Íò»áÔ±µÄÕÊ»§ÐÅÏ¢

Ðû²¼Ê±¼ä 2019-06-11
1¡¢ÓÎÏ·ÍøÕ¾Emuparadiseй¶110Íò»áÔ±µÄÕÊ»§ÐÅÏ¢

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
ÓÎÏ·ÍøÕ¾EmuparadiseÔÚ2018Äê4ÔÂÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ £¬µ¼Ö½ü110ÍòÂÛ̳³ÉÔ±µÄÕË»§ÐÅϢй¶¡£ ¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÕË»§µÄµç×ÓÓʼþµØµã¡¢IPµØµã¡¢Óû§ÃûºÍ¼ÓÑÎMD5¹þÏ£ÃÜÂë¡£ ¡£¡£¡£¡£¡£¡£Have I Been PwndÍøÕ¾³ÆËüÔÚ2019Äê6ÔÂ9ÈÕ´ÓDeHashed.comÎüÊÕµ½¸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ £¬µ«DeHashedÔõÑù»ñµÃ¸ÃÊý¾Ý¿âµÄ·½·¨ÈÔȻδ֪¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/retro-gaming-site-emuparadise-suffered-data-breach-exposing-account-details-of-11-million-members-3ffd53d5

2¡¢ÃÀ¹úº£¹ØºÍÁìÍÁ±£»£»£»£»£»£»¤¾Ö·Ö°üÉÌй¶ÓοͳµÅƼ°ÕÕÆ¬

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
ÃÀ¹úº£¹ØºÍÁìÍÁ±£»£»£»£»£»£»¤¾Ö£¨CBP£©Ö¤ÊµÆäÒ»¸ö·Ö°üÉÌÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂÓο͵ijµÅƺÍÕÕÆ¬ÐÅϢй¶¡£ ¡£¡£¡£¡£¡£¡£CBPÔÚÐÂΟåÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ £¬¸Ã·Ö°üÉÌÎ¥·´ÁËCBPµÄÕþ²ß£¬£¬£¬£¬£¬£¬£¬ £¬Î´¾­ÊÚȨµØ½«CBPÍøÂçµÄ³µÅƺÍÓοÍÕÕÆ¬´æ´¢ÔÚ¹«Ë¾ÄÚ²¿Ð§ÀÍÆ÷ÖУ¬£¬£¬£¬£¬£¬£¬ £¬²¢ÔÚºÚ¿ÍÈëÇÖÊÂÎñÖÐй¶¡£ ¡£¡£¡£¡£¡£¡£CBP²¢Î´Í¸Â¶¸Ã·Ö°üÉ̵ÄÃû×Ö£¬£¬£¬£¬£¬£¬£¬ £¬µ«Ïà¹ØÃ½Ì屨µÀÖ¸³ö¿ÉÄÜÊÇPerceptics¹«Ë¾¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/cbp-says-hackers-stole-license-plate-and-travelers-photos/

3¡¢µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬£¬£¬£¬£¬£¬£¬ £¬Ó°Ïì2ÍòÓû§

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
µÂ¹úÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©ÖÒÑÔÔڸùúÏúÊÛµÄÖÁÉÙËÄ¿îÖÇÄÜÊÖ»úÐͺŵĹ̼þÖб»Ö²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬£¬ £¬ÊÜÓ°ÏìµÄÐͺŰüÀ¨Doogee BL7000¡¢M-Horse Pure 1¡¢Keecoo P11ºÍVKworld Mix Plus¡£ ¡£¡£¡£¡£¡£¡£ÕâËÄ¿îÊÖ»ú¶¼ÊǵͶËAndroidÊÖ»ú¡£ ¡£¡£¡£¡£¡£¡£BSI³ÆÕâЩÊÖ»úµÄ¹Ì¼þ°üÀ¨Ò»¸öÃûΪAndr/Xgen2-CYµÄºóÃÅľÂí¡£ ¡£¡£¡£¡£¡£¡£¸ÃľÂí¿ÉÍøÂç×°±¸µÄÏêϸÐÅÏ¢²¢Æ¾Ö¤C&CµÄÏÂÁîÖ´ÐжñÒâ²Ù×÷¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/germany-backdoor-found-in-four-smartphone-models-20000-users-infected/

4¡¢Ð¶ñÒâÍÚ¿ó»î¶¯£¬£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃWebLogicÎó²î·Ö·¢ÃÅÂÞ±Ò¿ó¹¤

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
Ç÷ÊÆ¿Æ¼¼·¢Ã÷Ò»¸öʹÓÃWebLogicÎó²î·Ö·¢ÃÅÂޱҿ󹤵ÄжñÒâÍÚ¿ó»î¶¯¡£ ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ4Ô·ݱ»ÐÞ¸´µÄWebLogic·´ÐòÁл¯Îó²î£¨CVE-2019-2725£©ÊµÑé¹¥»÷£¬£¬£¬£¬£¬£¬£¬ £¬¸ÃÎó²î¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐС£ ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõĻìÏýÊÖÒÕÒ²ºÜÌØÊ⣺ËûÃǽ«¶ñÒâ´úÂëÒþ²ØÔÚÖ¤ÊéÎļþÖС£ ¡£¡£¡£¡£¡£¡£ÕâЩ֤ÊéÎļþ¿´ÆðÀ´ÏñͨË×µÄÒþ˽ÔöÇ¿Óʼþ£¨PEM£©ÃûÌÃÖ¤Ê飬£¬£¬£¬£¬£¬£¬ £¬µ«ÏÖʵÉϰüÀ¨ÓÃÓÚÏÂÔØºÍÖ´ÐÐpayloadµÄ¶ñÒâPowerShell¾ç±¾¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-2725-exploited-and-certificate-files-used-for-obfuscation-to-deliver-monero-miner/

5¡¢MuddyWaterй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬ £¬·Ö·¢¶à½×¶ÎºóÃÅPOWERSTATS V3

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
Ç÷ÊÆ¿Æ¼¼Çå¾²Ñо¿Ö°Ô±·¢Ã÷MuddyWaterÔÚй¥»÷»î¶¯ÖÐʹÓÃÁËеĶà½×¶ÎPowerShellºóÃÅPOWERSTATS v3¡£ ¡£¡£¡£¡£¡£¡£¸ÃºóÃű»ÓÃÓÚÕë¶ÔÔ¼µ©´óѧºÍÍÁ¶úÆäÕþ¸®µÄÍøÂç´¹ÂÚ¹¥»÷ÖС£ ¡£¡£¡£¡£¡£¡£¸ÃºóÃÅ¿ÉÍøÂç²Ù×÷ϵͳµÄÐÅÏ¢²¢ÉÏ´«ÖÁC&CЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ £¬ÔÚÎüÊÕµ½ÏìÓ¦µÄÏÂÁîºó£¬£¬£¬£¬£¬£¬£¬ £¬¸ÃºóÃÅ»¹¿ÉÓÃÓÚÏÂÔØºÍ×°ÖÃÆäËüpayload¡£ ¡£¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼ÊӲ쵽¹¥»÷ÕßÔÚ1Ô·ݷַ¢.NETºóÃÅSHARPSTATS£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÔÚͳһ¸öÔÂÇл»µ½DelphiºóÃÅDELPHSTATS£»£»£»£»£»£»ÔÚ3ÔºÍ4Ô¹¥»÷ÕßÖ÷Òª·Ö·¢POWERSTATS v2£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÔÚ5Ô·ÝÇл»µ½POWERSTATS v3¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools/

6¡¢VLC²¥·ÅÆ÷Ðû²¼Ð°汾3.0.7£¬£¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´43¸öÇå¾²Îó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
VLC²¥·ÅÆ÷ÔÚа汾3.0.7ÖÐÐÞ¸´ÁË43¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ £¬°üÀ¨2¸ö¸ßΣÎó²î¡¢21ÆäÖÐΣÎó²îºÍ20¸öµÍΣÎó²î¡£ ¡£¡£¡£¡£¡£¡£Á½¸ö¸ßΣÎó²î»®·ÖÊÇÒÀÀµ¿âfaad2ÖеÄÔ½½çдÎó²îºÍRISTÄ£¿£¿£¿£¿£¿£¿£¿éÖеÄÕ»»º³åÇøÒç³öÎó²î¡£ ¡£¡£¡£¡£¡£¡£ÆäËüÎó²î°üÀ¨Ô½½ç¶Á¡¢¶ÑÒç³ö¡¢NULL½âÒýÓá¢use-after-freeµÈÇå¾²ÎÊÌâ¡£ ¡£¡£¡£¡£¡£¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£ ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://gbhackers.com/vlc-3-0-7-released/