Daimler Git´æ´¢¿â̻¶µ¼Ö¼²³ÛOLUÔ´´úÂëй¶£»£»£»£»£»º½¿Õ¹«Ë¾EasyJet 900Íò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2020-05-20

1.Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬£¬£¬£¬¼²³Û×é¼þOLUÔ´´úÂëй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¾ÝZDNet±¨µÀ£¬£¬£¬£¬£¬£¬Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨×°ÖÃÔÚMercedez¼²³Û»õ³µÖеİåÔØÂß¼­µ¥Î»£¨OLU£©µÄÔ´´úÂë¡£¡£¡£¡£¡£¡£¡£¡£¹¤³ÌʦTill Kottmann·¢Ã÷£¬£¬£¬£¬£¬£¬ËûÔÚMercedez¼²³ÛµÄ´úÂëÍйÜÍøÕ¾DaimlerÖÐʹÓÃí§Òâµç×ÓÓʼþ×¢²áÒ»¸öÕ˺Å£¬£¬£¬£¬£¬£¬±ã¿ÉÒÔ»á¼ûÆäÁè¼Ý580¸öGit´æ´¢¿â¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨OLUÔ´´úÂë¡¢Raspberry PiÓ³Ïñ¡¢Ð§ÀÍÆ÷Ó³Ïñ¡¢ÓÃÓÚÖÎÀíÔ¶³ÌOLUµÄÄÚ²¿Daimler×é¼þ¡¢ÄÚ²¿Îĵµ¡¢´úÂëʾÀýµÈ¡£¡£¡£¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾UnderÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇͨ¹ýÉó²é»¹·¢Ã÷ÁËDaimlerÄÚ²¿ÏµÍ³µÄÃÜÂëºÍAPIÁîÅÆ£¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖDaimlerÔÆºÍÄÚ²¿ÍøÂç¡£¡£¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/mercedes-benz-onboard-logic-unit-olu-source-code-leaks-online/


2.µÂÖÝÔÙÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Õë¶ÔÆä½»Í¨ÔËÊ䲿ϵͳ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ò»¸öÔÂÄڵ¿ËÈøË¹ÖÝÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔµÄÊǸÃÖݵĽ»Í¨ÔËÊ䲿ϵͳ£¬£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃϵͳÒѱ»ÆÈ¹Ø±Õ¡£¡£¡£¡£¡£¡£¡£¡£µÂÖݽ»Í¨ÔËÊ䲿£¨TxDOT£©È·ÈÏ£¬£¬£¬£¬£¬£¬5ÔÂ14ÈÕÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÓÐδ¾­ÊÚȨ»á¼û¸Ã»ú¹¹ÍøÂ磬£¬£¬£¬£¬£¬¸Ã»ú¹¹·¢Ã÷ºóÁ¬Ã¦½ÓÄɲ½·¥£¬£¬£¬£¬£¬£¬±ÜÃâ½øÒ»²½¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹ÖÝÔâµ½µÚÒ»´Î¹¥»÷£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ²¡¶¾Ñ¬È¾Á˸ÃÖݵķ¨ÔºÏµÍ³¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Éв»ÇåÎúÁ½´Î¹¥»÷ÊÇ·ñÓйØÁª£¬£¬£¬£¬£¬£¬Ò²Ã»ÓйØÓÚÕâÁ½´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/103410/cyber-crime/txdot-ransomware-attack.html


3.Ó¢¹úº½¿Õ¹«Ë¾EasyJetÔâ¹¥»÷£¬£¬£¬£¬£¬£¬900Íò¿Í»§ÐÅϢй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ó¢¹ú×î´óµÄº½¿Õ¹«Ë¾EasyJeÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶ÁË900Íò¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£ÔÚÕâ´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁ˸ù«Ë¾900Íò¿Í»§µÄµç×ÓÓʼþµØµãºÍÂÃÐÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ÉÐÓÐÆäÖÐ2208λ¿Í»§µÄÐÅÓÿ¨ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£EasyJetÔÚ·¢Ã÷´ËÊÂÎñºó£¬£¬£¬£¬£¬£¬±ã֪ͨÁËÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍICO£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÏÖÔÚËûÃÇÕýÔÚ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬£¬£¬Ô¤¼ÆÔÚ2020Äê5ÔÂ26ÈÕ֮ǰËùÓÐÊÜÓ°Ïì¿Í»§¶¼½«ÊÕµ½Í¨Öª¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ´ËÊÂÎñµÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/easyjet-hacked-data-breach-affects-9-million-customers/


4.ºÚ¿Íð³äÃÀ¹ú²ÆÎñ²¿Óô¹ÂÚÓʼþ·Ö·¢»ùÓÚNode.jsµÄRAT


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Abuse.ch·¢Ã÷ÁËеĴ¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬ºÚ¿Íαװ³ÉÃÀ¹ú²ÆÎñ²¿À´·Ö·¢»ùÓÚNode.jsµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©ºÍÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£Ê×ÏȺڿͻáÉù³ÆÓÉÓÚÒøÐÐÐÅÏ¢²»×¼È·£¬£¬£¬£¬£¬£¬Î´Ö§¸¶Õþ¸®ÌõÔ¼µÄ¿î×Ó£¬£¬£¬£¬£¬£¬Ö®ºó»áͨ¹ýµç×ÓÓʼþÌáÐÑÓû§¼ì²é¸½¼þÎĵµÊÇ·ñÓÐÎ󡣡£¡£¡£¡£¡£¡£¡£Óʼþ¸½¼þÖаüÀ¨ÃûΪCONTRACT PAYMENT.jarµÄÎļþ£¬£¬£¬£¬£¬£¬Óû§Ö´Ðкó½«ÏÂÔØNode.jsºÍWizard.js¾ç±¾²¢´æ´¢ÔÚ£¥UserProfile \ qnodejs-node-v13.13.0-win-x64Îļþ¼ÐÖС£¡£¡£¡£¡£¡£¡£¡£¸ÃNode.js¶ñÒâÈí¼þQNodeService¾ßÓÐ×ÔÎÒ¸üС¢»ñÈ¡»úеÐÅÏ¢£¨ÀýÈçIPµØµã¡¢»úеÃû³Æ¡¢Î»Öá¢Óû§ÃûºÍ²Ù×÷ϵͳ°æ±¾£©¡¢Ö´ÐÐÏÂÁɾ³ýºÍдÈëÎļþ¡¢´ÓÖÖÖÖÓ¦ÓóÌÐò£¨ÀýÈçChromeºÍFirefox£©ÖÐÇÔÈ¡ÃÜÂëµÄ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-us-dept-of-treasury-emails-spreads-new-nodejs-malware/


5.FBIÐû²¼ÖÒÑÔ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þProLockʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


FBIÐû²¼ÁËÒ»¸öÇå¾²¾¯±¨£¬£¬£¬£¬£¬£¬ËµÃ÷ÎúÐÂÐÍÀÕË÷Èí¼þProLock¿ÉÒÔʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç¡£¡£¡£¡£¡£¡£¡£¡£¸Ã²¡¶¾ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬Òѱ»ÓÃÓÚÒ½ÁƱ£½¡×éÖ¯¡¢Õþ¸®»ú¹¹¡¢½ðÈÚ»ú¹¹ºÍÁãÊÛ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£¡£¡£¡£¡£¡£¡£¡£FBI·¢Ã÷ProLock¿ÉÒÔͨ¹ýQakbot»á¼û±»ºÚµÄÍøÂ磬£¬£¬£¬£¬£¬Òò´ËÒ»µ©·¢Ã÷ѬȾÁËQakbotµÄÅÌËã»ú£¬£¬£¬£¬£¬£¬±ØÐ辡¿ì½«ÆäÓëÍøÂçµÄÆäÓಿ·Ö¸ôÀë¡£¡£¡£¡£¡£¡£¡£¡£ÁíÍ⣬£¬£¬£¬£¬£¬FBI»¹ÖÒÑÔºÚ¿ÍÍÅ»ïÔÚÊܺ¦ÕßÖ§¸¶Êê½ðºóÌṩµÄ½âÃÜÆ÷¿ÉÄÜÎÞ·¨Õý³£ÊÂÇ飬£¬£¬£¬£¬£¬»áÆÆËð´óÓÚ64MBµÄÎļþ£¬£¬£¬£¬£¬£¬²¢¿ÉÄܵ¼ÖÂ100MBÒÔÉϵÄÎļþÿ1KBɥʧԼĪ1¸ö×Ö½Ú¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-prolock-ransomware-gains-access-to-victim-networks-via-qakbot-infections/


6.VerizonÐû²¼2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬£¬£¬£¬DoS¹¥»÷Ôö¶à


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬£¬£¬£¬ÆÊÎöÁË16¸ö±ÊÖ±ÐÐÒµµÄ32002ÆðÇå¾²ÊÂÎñºÍ3950ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬ÒÑÍùÒ»ÄêDoS¹¥»÷µÄÊýÄ¿ÓÐËùÔöÌí£¨1.3ÍòÆð£¬£¬£¬£¬£¬£¬Õ¼Çå¾²ÊÂÎñµÄ40£¥£©£¬£¬£¬£¬£¬£¬Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬ÍøÂçÌØ¹¤¹¥»÷ïÔÌ­£¬£¬£¬£¬£¬£¬ÔÚÊý¾Ýй¶ÊÂÎñÖеÄÕ¼±È´Ó13.5£¥Ï½µµ½3.2£¥¡£¡£¡£¡£¡£¡£¡£¡£ÔÚÊý¾Ýй¶·½Ã棬£¬£¬£¬£¬£¬¿ìÒªÒ»°ë£¨45£¥£©µÄÊÂÎñÊÇÓÉÓÚÏÖʵ¹¥»÷£¬£¬£¬£¬£¬£¬¶ø22£¥ÔòÓÉÓÚÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£22£¥µÄÈëÇÖÉæ¼°µ½¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¶ø17£¥ÊÇÓɹýʧÔì³ÉµÄ¡£¡£¡£¡£¡£¡£¡£¡£8£¥µÄй¶Դ×ÔÓÚÊÚȨÓû§µÄÎóÓᣡ£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/