µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬Ó°Ïì2ÍòÓû§£»ÓÎÏ·ÍøÕ¾Emuparadiseй¶110Íò»áÔ±µÄÕÊ»§ÐÅÏ¢
Ðû²¼Ê±¼ä 2019-06-11
ÓÎÏ·ÍøÕ¾EmuparadiseÔÚ2018Äê4ÔÂÔâÓöÊý¾Ýй¶ÊÂÎñ£¬µ¼Ö½ü110ÍòÂÛ̳³ÉÔ±µÄÕË»§ÐÅϢй¶¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÕË»§µÄµç×ÓÓʼþµØµã¡¢IPµØµã¡¢Óû§ÃûºÍ¼ÓÑÎMD5¹þÏ£ÃÜÂë¡£Have I Been PwndÍøÕ¾³ÆËüÔÚ2019Äê6ÔÂ9ÈÕ´ÓDeHashed.comÎüÊÕµ½¸ÃÊý¾Ý¿â£¬µ«DeHashedÔõÑù»ñµÃ¸ÃÊý¾Ý¿âµÄ·½·¨ÈÔȻδ֪¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/retro-gaming-site-emuparadise-suffered-data-breach-exposing-account-details-of-11-million-members-3ffd53d5
2¡¢ÃÀ¹úº£¹ØºÍÁìÍÁ±£»¤¾Ö·Ö°üÉÌй¶ÓοͳµÅƼ°ÕÕÆ¬
ÃÀ¹úº£¹ØºÍÁìÍÁ±£»¤¾Ö£¨CBP£©Ö¤ÊµÆäÒ»¸ö·Ö°üÉÌÔâÓöÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂÓο͵ijµÅƺÍÕÕÆ¬ÐÅϢй¶¡£CBPÔÚÐÂΟåÖÐÌåÏÖ£¬¸Ã·Ö°üÉÌÎ¥·´ÁËCBPµÄÕþ²ß£¬Î´¾ÊÚȨµØ½«CBPÍøÂçµÄ³µÅƺÍÓοÍÕÕÆ¬´æ´¢ÔÚ¹«Ë¾ÄÚ²¿·þÎñÆ÷ÖУ¬²¢ÔÚºÚ¿ÍÈëÇÖÊÂÎñÖÐй¶¡£CBP²¢Î´Í¸Â¶¸Ã·Ö°üÉ̵ÄÃû×Ö£¬µ«Ïà¹ØÃ½Ì屨µÀÖ¸³ö¿ÉÄÜÊÇPerceptics¹«Ë¾¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/cbp-says-hackers-stole-license-plate-and-travelers-photos/
3¡¢µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬Ó°Ïì2ÍòÓû§
µÂ¹úÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©ÖÒÑÔÔڸùúÏúÊÛµÄÖÁÉÙËÄ¿îÖÇÄÜÊÖ»úÐͺŵĹ̼þÖб»Ö²ÈëºóÃÅ£¬ÊÜÓ°ÏìµÄÐͺŰüÀ¨Doogee BL7000¡¢M-Horse Pure 1¡¢Keecoo P11ºÍVKworld Mix Plus¡£ÕâËÄ¿îÊÖ»ú¶¼ÊǵͶËAndroidÊÖ»ú¡£BSI³ÆÕâЩÊÖ»úµÄ¹Ì¼þ°üÀ¨Ò»¸öÃûΪAndr/Xgen2-CYµÄºóÃÅľÂí¡£¸ÃľÂí¿ÉÍøÂç×°±¸µÄÏêϸÐÅÏ¢²¢Æ¾Ö¤C&CµÄÏÂÁîÖ´ÐжñÒâ²Ù×÷¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/germany-backdoor-found-in-four-smartphone-models-20000-users-infected/
4¡¢Ð¶ñÒâÍÚ¿óÔ˶¯£¬Ê¹ÓÃWebLogicÎó²î·Ö·¢ÃÅÂÞ±Ò¿ó¹¤
Ç÷ÊÆ¿Æ¼¼·¢Ã÷Ò»¸öʹÓÃWebLogicÎó²î·Ö·¢ÃÅÂޱҿ󹤵ÄжñÒâÍÚ¿óÔ˶¯¡£¹¥»÷ÕßʹÓÃ4Ô·ݱ»ÐÞ¸´µÄWebLogic·´ÐòÁл¯Îó²î£¨CVE-2019-2725£©ÊµÑé¹¥»÷£¬¸ÃÎó²î¿Éµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐС£¹¥»÷ÕßʹÓõĻìÏýÊÖÒÕÒ²ºÜÌØÊ⣺ËûÃǽ«¶ñÒâ´úÂëÒþ²ØÔÚÖ¤ÊéÎļþÖС£ÕâЩ֤ÊéÎļþ¿´ÆðÀ´ÏñͨË×µÄÒþ˽ÔöÇ¿Óʼþ£¨PEM£©ÃûÌÃÖ¤Ê飬µ«ÏÖʵÉϰüÀ¨ÓÃÓÚÏÂÔØºÍÖ´ÐÐpayloadµÄ¶ñÒâPowerShell¾ç±¾¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-2725-exploited-and-certificate-files-used-for-obfuscation-to-deliver-monero-miner/
5¡¢MuddyWaterй¥»÷Ô˶¯£¬·Ö·¢¶à½×¶ÎºóÃÅPOWERSTATS V3
Ç÷ÊÆ¿Æ¼¼Çå¾²Ñо¿Ö°Ô±·¢Ã÷MuddyWaterÔÚй¥»÷Ô˶¯ÖÐʹÓÃÁËеĶà½×¶ÎPowerShellºóÃÅPOWERSTATS v3¡£¸ÃºóÃű»ÓÃÓÚÕë¶ÔÔ¼µ©´óѧºÍÍÁ¶úÆäÕþ¸®µÄÍøÂç´¹ÂÚ¹¥»÷ÖС£¸ÃºóÃÅ¿ÉÍøÂç²Ù×÷ϵͳµÄÐÅÏ¢²¢ÉÏ´«ÖÁC&C·þÎñÆ÷£¬ÔÚÎüÊÕµ½ÏìÓ¦µÄÏÂÁîºó£¬¸ÃºóÃÅ»¹¿ÉÓÃÓÚÏÂÔØºÍ×°ÖÃÆäËüpayload¡£Ç÷ÊÆ¿Æ¼¼ÊӲ쵽¹¥»÷ÕßÔÚ1Ô·ݷַ¢.NETºóÃÅSHARPSTATS£¬²¢ÔÚͳһ¸öÔÂÇл»µ½DelphiºóÃÅDELPHSTATS£»ÔÚ3ÔºÍ4Ô¹¥»÷ÕßÖ÷Òª·Ö·¢POWERSTATS v2£¬²¢ÔÚ5Ô·ÝÇл»µ½POWERSTATS v3¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools/
6¡¢VLC²¥·ÅÆ÷Ðû²¼Ð°汾3.0.7£¬ÐÞ¸´43¸öÇå¾²Îó²î
VLC²¥·ÅÆ÷ÔÚа汾3.0.7ÖÐÐÞ¸´ÁË43¸öÇå¾²Îó²î£¬°üÀ¨2¸ö¸ßΣÎó²î¡¢21ÆäÖÐΣÎó²îºÍ20¸öµÍΣÎó²î¡£Á½¸ö¸ßΣÎó²î»®·ÖÊÇÒÀÀµ¿âfaad2ÖеÄÔ½½çдÎó²îºÍRISTÄ£¿éÖеÄÕ»»º³åÇøÒç³öÎó²î¡£ÆäËüÎó²î°üÀ¨Ô½½ç¶Á¡¢¶ÑÒç³ö¡¢NULL½âÒýÓá¢use-after-freeµÈÇå¾²ÎÊÌâ¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£ºhttps://gbhackers.com/vlc-3-0-7-released/


¾©¹«Íø°²±¸11010802024551ºÅ