¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190114

Ðû²¼Ê±¼ä 2019-01-14
1¡¢NASAÄÚ²¿Ó¦ÓÃȨÏÞÉèÖùýʧ £¬µ¼ÖÂÔ±¹¤ºÍÏîÄ¿ÐÅϢй¶

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


NASAµÄÄÚ²¿Ó¦ÓÃJiraÒòÉèÖùýʧµ¼ÖÂÔ±¹¤µÄÓû§Ãû¡¢ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍÏîÄ¿Ãû³ÆµÈÃô¸ÐÐÅϢй¶¡£JIRAÊÇÒ»¸öÓÉAtlassian¹«Ë¾Ö§³ÖµÄÏîÄ¿ÖÎÀíϵͳ £¬¿É¾ÙÐÐbug¸ú×ÙºÍѸËÙÏîÄ¿ÖÎÀí¡£ÖÎÀíÔ±¸ã»ìÁËJiraµÄȨÏÞÉèÖÃEveryoneºÍAll users £¬EveryoneȨÏÞÏÖʵÉÏÔÊÐí»¥ÁªÍøÉϵÄÈκÎÈ˶¼¿ÉÒÔ»á¼ûÓ¦ÓÃÊý¾Ý £¬¶ø²»ÊÇÖÎÀíÔ±ÒÔΪµÄ×éÖ¯ÄÚµÄÈκÎÈË£¨ÕâÓ¦¸ÃÊÇAll usersȨÏÞ£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/nasa-internal-app-leaked-employee-emails-project-names/


2¡¢ÃÀÂíÈøÖîÈûÖÝÐÞ¸ÄÊý¾Ýй¶֪ͨ·¨°¸ £¬½«ÓÚ4ÔÂ11ÈÕÉúЧ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!



ÃÀ¹úÂíÈøÖîÈûÖÝ¶ÔÆäÊý¾Ýй¶֪ͨ·¨°¸¾ÙÐÐÁËÖØ´óµÄÐÞ¸Ä £¬¸ÃÐÞÕý°¸½«ÓÚ2019Äê4ÔÂ11ÈÕÉúЧ¡£ÆäÖÐÒ»ÏîÖ÷ÒªµÄÐ޸İüÀ¨¶Ô±¬·¢Êý¾Ýй¶µÄ×éÖ¯Ìá³öÁ˸ü¶àµÄÒªÇó £¬µ±Êý¾Ýй¶ÊÂÎñÉæ¼°µ½ÂíÈøÖîÈûÖݹ«ÃñµÄÉç»áÇå¾²ºÅÂëʱ £¬¸Ã×éÖ¯±ØÐèÏòÊÜÓ°ÏìµÄ¹«ÃñÌṩ²»ÉÙÓÚ18¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿Ø·þÎñ¡£ÆäËüÖØ´óÐ޸İüÀ¨¸üÐÂÁË×éÖ¯ÏòÖÝî¿Ïµ»ú¹¹Ìá½»µÄÐÅÏ¢ÀàÐ͵È¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/massachusetts-enacts-significant-changes-to-its-data-breach-notification-law/


3¡¢AnonymousºÚ¿ÍÒòDDoS¶ùͯҽԺ±»ÅÐÈëÓüÁè¼Ý10Äê

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


AnonymousºÚ¿ÍÒòDDoSÁ½¼ÒÒ½ÁÆ»ú¹¹±»Åд¦Áè¼Ý10ÄêµÄÓÐÆÚͽÐÌ¡£ÕâÃûºÚ¿ÍÊÇÏÖÄê34ËêµÄÂíÈøÖîÈûÖÝÄÐ×ÓMartin Gottesfeld £¬Ëû±»·¨¹ÙÅд¦·þÐÌ121¸öÔºÍÖ§¸¶½ü44.3ÍòÃÀÔªµÄÅâ³¥½ð¡£2014Äê4Ô £¬GottesfeldʹÓÃÓÉÁè¼Ý4Íò¸ö·ÓÉÆ÷×é³ÉµÄ½©Ê¬ÍøÂç¶Ô²¨Ê¿¶Ù¶ùͯҽԺ£¨BCH£©ºÍ·ÇÓªÀûÐÔÖÎÁÆ»ú¹¹Wayside·¢¶¯DDoS¹¥»÷ £¬ÒÔ¿¹Òé¶ÔÇàÉÙÄ껼ÕßJustina PelletierµÄÖÎÁÆÐÐΪ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/01/ddos-attack-anonymous-hacker.html


4¡¢Ó¢¹úºÚ¿ÍÒòDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾±»ÅÐÈëÓü32¸öÔÂ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ó¢¹úºÚ¿ÍDaniel Kaye£¨29Ë꣩Òò2016ÄêDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾Lonestar¶ø±»ÅÐÈëÓü·þÐÌ32¸öÔ¡£Æ¾Ö¤BBCµÄ±¨µÀ £¬LonestarµÄ¾ºÕùµÐÊÖCellcomµÄÒ»ÃûÔ±¹¤Æ¸ÓÃÁËKayeÀ´¶ÔLonestar¾ÙÐÐDDoS¹¥»÷ £¬Ã¿ÔÂÏòÆäÖ§¸¶¸ß´ï1ÍòÃÀÔª£¨7800Ó¢°÷£©µÄÓöÈ¡£¸Ã¹¥»÷ʹµÃÎ÷·Ç¹ú¼ÒµÄ»¥ÁªÍø½ÓÈëÖÐÖ¹ £¬¸øLonestarÔì³ÉÁËÊýÍòÍòÃÀÔªµÄËðʧ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/79781/breaking-news/british-hacker-sentenced-liberian-attack.html


5¡¢ÐÂÑо¿Åú×¢ÀÕË÷Èí¼þRyuk±³ºó¿ÉÄÜÊǶíÂÞ˹·¸·¨ÍÅ»ï

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤Crowdstrike¡¢FireEye¡¢Kryptos LogicºÍMcAfeeÐû²¼µÄ±¨¸æ £¬ÀÕË÷Èí¼þRyuk±³ºóºÜÓпÉÄÜÊÇ¿î×ÓÄîÍ·µÄ¶íÂÞ˹·¸·¨ÍÅ»ï £¬¶ø²»ÊÇ֮ǰÐÂÎÅýÌ屨µÀµÄ³¯ÏʺڿÍ¡£Ö¤¾ÝÅú×¢RyukÊÇÓÉCrowdstrike³ÆÖ®ÎªGrim SpiderµÄ·¸·¨ÍŻィÉèµÄ £¬¸ÃÍÅ»ï´ÓºÚ¿ÍÂÛ̳ÉϹºÖÃÁËÀÕË÷Èí¼þHermesµÄÒ»¸ö±äÖÖ £¬²¢¶¨ÖÆ»¯ÐÞ¸ÄΪ×Ô¼ºµÄÀÕË÷Èí¼þRyuk¡£Ñо¿Ö°Ô±ÒÔΪ £¬³¯ÏʺڿʹӺڿÍÂÛ̳ÉϹºÖÃÁËͳһ¸öHermes±äÖÖ £¬µ«ËûÃÇÓëRyukÖ®¼äûÓÐÈκιØÁª¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ryuk-ransomware-gang-probably-russian-not-north-korean/


6¡¢ÐéαӰϷÎļþ¿ÉÇÔÈ¡¼ÓÃÜÇ®±ÒºÍÐÞ¸ÄGoogleËÑË÷Ч¹û

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!



Ñо¿Ö°Ô±´Óº£µÁÍåÉÏÏÂÔØÓ°Ï·Ê±·¢Ã÷Ò»¸öαװ³ÉÓ°Ï·ÎļþµÄ¶ñÒâWindows¿ì½Ý·½·¨Îļþ £¬¸ÃÎļþÓÃÓÚÖ´ÐÐPowerShellÏÂÁî £¬¿ÉÒÔ½«¹¥»÷ÕßµÄÄÚÈÝ×¢È뵽ά»ù°Ù¿Æ¡¢GoogleºÍYandexËÑË÷Ч¹ûµÈ £¬»¹¿ÉÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¶ñÒâÈí¼þ»áÐÞ¸Ä×¢²á±íÏîÒÔ½ûÓÃWindows Defender £¬»¹¿ÉÒÔÔÚFirefoxÖÐÇ¿ÖÆ×°ÖÃÀ©Õ¹Firefox Protection £¬²¢Ð®ÖÆChromeÀ©Õ¹Chrome Media Router¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-movie-file-infects-pc-to-steal-cryptocurrency-poison-google-results/


ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí