ºÚ¿ÍÔÚ°µÍø¹ûÕæÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼£»Ð¶ñÒâÈí¼þEnsiko¿É¼ÓÃÜÄ¿µÄÎļþ£¬Õë¶ÔÖ÷Á÷²Ù×÷ϵͳ
Ðû²¼Ê±¼ä 2020-07-291.ºÚ¿ÍÔÚ°µÍø¹ûÕæÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼
ÍøÂçÇå¾²Ç鱨¹«Ë¾CloudSEK·¢Ã÷£¬ºÚ¿ÍÔÚ°µÍø¹ûÕæÁËÒÔÉ«ÁеÄÓªÏúÊÓÆµ½¨ÉèÍøÕ¾Promo.com°üÀ¨2200ÍòÓû§¼Í¼µÄÊý¾Ý¿â£¬¸ÃÊý¾Ý¿â°üÀ¨Óû§µÄµç×ÓÓʼþµØµã¡¢Ãû³Æ¡¢ÐԱ𡢵ØÀíλÖÃÒÔ¼°²¿·ÖÓû§µÄ¹þÏ£ÃÜÂë¡£²¢ÇÒ£¬ºÚ¿ÍÒÑÀÖ³ÉÆÆ½âÁË140ÍòÓû§ÃÜÂ룬ÕâÒâζ׏¥»÷Õß¿ÉÒÔÁ¬Ã¦µÇ¼ÕâЩÓû§µÄÕÊ»§£¬»òÕßÔÚÆäËûÕ¾µãÌᳫƾ֤Ìî³ä¹¥»÷¡£PromoÐû²¼ÁËÊý¾Ýй¶֪ͨ£¬²¢Ö¸³ö´Ë´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäµÚÈý·½ÏàÖú¹«Ë¾±£´æÇå¾²Îó²î¡£PromoÕö¿ªÁËÄÚ²¿ÊӲ죬²¢ÌåÏÖ´Ë´ÎÊÂÎñ²¢ÎÞ²ÆÎñÐÅϢй¶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/
2.Cloudflare IPµØµã¿â½ü300Íò¸öÕæÊµIPµØµãÔÚ°µÍø¹ûÕæ
ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÇ徲е÷ÖÐÐÄÉù³ÆCloudflare±¬·¢ÁËÊý¾Ý×ß©£¬µ¼ÖÂÆäIPµØµã¿â½ü300Íò¸öÕæÊµIPµØµãÔÚ°µÍø¹ûÕæ¡£ÏÖÔÚ£¬¸Ã»ú¹¹Ðû²¼µÄ¼Í¼ÖаüÀ¨45Ìõ¾ßÓÐ gov.ua¶¥¼¶ÓòÃû£¨TLD£©µÄ¼Í¼£¬ÒÔ¼°6500¸ö¾ßÓÐ .ua TLDµÄ¼Í¼£¬ÕâÅú×¢°üÀ¨Òªº¦»ù´¡ÉèÊ©ÔÚÄÚµÄÐí¶àÎÚ¿ËÀ¼Õ¾µã±»ÒѾй¶¡£CloudflareÉùÃ÷£¬´Ë´Î×ß©¿ÉÄÜÊÇͨ¹ý¹«ÍøÉϵÄDNSÅÌÎÊ»ñµÃµÄÊý¾Ý£¬²¢·Ç×ß©»òÆÆËðµÄЧ¹û¡£¾ÍÔÚ¼¸ÖÜǰ£¬Cloudflare·þÎñÖÐÖ¹µ¼ÖÂһЩ¶¥¼¶ÍøÕ¾ÔÚÈ«Çò¹æÄ£ÄÚÀëÏß¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/cloudflare-data-leak-expose-ip-addresses-ukraine/
3.»¯×±Æ·¹«Ë¾AvonÔÆ·þÎñÆ÷ÉèÖùýʧ£¬Ð¹Â¶1900ÍòÌõÓû§¼Í¼
SafetyDetectives·¢Ã÷£¬È«Çò»¯×±Æ·¹«Ë¾AvonÒòÔÆ·þÎñÆ÷ÉèÖùýʧй¶ÁË1900ÍòÌõ¼Í¼£¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍÊÖÒÕÈÕÖ¾¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨¿Í»§ºÍÔ±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÆäÖаüÀ¨È«Ãû¡¢µç»°ºÅÂë¡¢ÉúÈÕ¡¢µç×ÓÓʼþºÍ¼ÒͥסַÒÔ¼°GPS×ø±ê£¬±ðµÄÉÐÓÐ40000¶à¸öÇå¾²ÁîÅÆ¡¢OAuthÁîÅÆ¡¢ÄÚ²¿ÈÕÖ¾¡¢ÕÊ»§ÉèÖúÍÊÖÒÕ·þÎñÆ÷ÐÅÏ¢¡£SafetyDetectivesÌåÏÖ£¬PII¿ÉÒÔ±»ÓÃÀ´¾ÙÐÐÉí·ÝڲƺͺóÐøµÄÍøÂç´¹ÂÚÕ©Æ£¬Í¬Ê±£¬Ð¹Â¶µÄÊÖÒÕϸ½ÚÒ²¸øAvon´øÀ´ÁËΣº¦£¬ºÚ¿Í¿ÉʹÓÃÕâЩÐÅÏ¢»ñµÃ·þÎñÆ÷µÄÍêÈ«¿ØÖÆÈ¨²¢Ìá³«ÆÆËðÐԵĹ¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/cosmetics-giant-avon-leaks-19/
4.ºÚ¿ÍʹÓÃαÔìµÄSharePoint֪ͨÇÔÈ¡Óû§Office 365ƾ֤
ÔÚÐÂÒ»ÂÖµÄÍøÂç´¹ÂÚÔ˶¯ÖУ¬ºÚ¿ÍʹÓÃαÔìµÄSharePoint֪ͨÇÔÈ¡Óû§Office 365ƾ֤¡£Æ¾Ö¤µç×ÓÓʼþÇå¾²¹«Ë¾Abnormal SecurityµÄͳ¼Æ£¬µ½ÏÖÔÚΪֹ£¬¸ÃÀàµç×ÓÓʼþÒÑ·¢Ë͵½50000¶à¸öÓÊÏä¡£ÔÚµç×ÓÓʼþÕýÎÄÖУ¬ºÚ¿Í¶à´ÎʹÓÃÊÕ¼þÈ˵Ĺ«Ë¾Ãû³Æ£¬Ê¹µÃÓʼþ¿´ÆðÀ´¸üÏñÊÇÄÚ²¿Îĵµ¡£Ö®ºó£¬Êܺ¦ÕßÐèÒªµã»÷Á´½ÓÒÔÏÂÔØÓʼþÖÐÌáµ½µÄÖ÷ÒªÎĵµ£¬¸ÃÁ´½Ó½«ÆäÖØ¶¨Ïòµ½´¹ÂÚÍøÕ¾²¢ÒªÇóËûÃÇÌá½»µÇ¼ƾ֤¡£Office 365Óû§ÔÚ½ñÄêÔâÊÜÖÚ¶à´¹ÂÚ¹¥»÷£¬°üÀ¨Î±ÔìµÄZoom¾¯±¨¡¢VPNÉèÖá¢Microsoft TeamsºÍSGF¾ÈÔ®½ð¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-employees-with-fake-sharepoint-alerts/
5.жñÒâÈí¼þEnsiko¿É¼ÓÃÜÄ¿µÄÎļþ£¬Õë¶ÔÖ÷Á÷²Ù×÷ϵͳ
ÍþвÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐµĹ¦Ð§¸»ºñµÄ¶ñÒâÈí¼þEnsiko£¬¿É¼ÓÃÜÄ¿µÄÎļþ£¬Õë¶ÔWindows£¬macOSºÍLinux Web·þÎñÆ÷µÈÖ÷Á÷²Ù×÷ϵͳ¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÓÃPHP±àдµÄWeb Shell£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´Ô¶³Ì¿ØÖÆÊÜѬȾµÄϵͳ¡£Ensiko¾ßÓÐÎļþ¼ÓÃÜ×é¼þ£¬Ëü¿ÉÓÃÓÚÕë¶Ô·þÎñÆ÷µÄÀÕË÷Èí¼þ¹¥»÷£¬Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±·¢Ã÷ËüʹÓÃÁËCBCģʽµÄ¶Ô³ÆRijnadel-128¼ÓÃÜÎļþ¡£Ensiko»¹¿ÉÒÔͨ¹ýÃÜÂë±£»¤À´È·±£Çå¾²»á¼û£¬²¢×èÖ¹ÏñEmotetÄÇÑù±»½ÓÊÜ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/feature-rich-ensiko-malware-can-encrypt-targets-windows-macos-linux/
6.Dussmann×Ó¹«Ë¾ÔâNefilimÀÕË÷Èí¼þ¹¥»÷£¬200GBÊý¾Ý±»µÁ
µÂ¹úDussmann Group×Ó¹«Ë¾DresdnerK¨¹hlanlagenbauGmbH£¨DKA£©Ôâµ½ÁËNefilimÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂδ¼ÓÃܵÄÎļþй¶¡£NefilimÍÅ»ïÔÚÆäÊý¾Ý×ß©վµãÐû²¼ÁËÁ½¸öÎļþ¼Ð£¬°üÀ¨ÁË14 GBµÄ±»µÁÎļþ£¬Æ¾Ö¤¸ÃÎļþÁÐ±í£¬ÕâЩÎļþ¼Ð°üÀ¨WordÎĵµ¡¢Í¼Ïñ¡¢»á¼ÆÎĵµºÍAutoCADͼÐΡ£¸ÃºÚ¿Í×éÖ¯ÌåÏÖ£¬ËûÃǼÓÃÜÁËËĸöÓò²¢ÍµÈ¡ÁËԼĪ200GBµÄÊý¾Ý¡£ÏÖÔÚ£¬Éв»ÇåÎúNefilimÍÅ»ïÊÇÔõÑù»ñµÃDKAÍøÂç»á¼ûȨÏ޵ģ¬ÍøÂçÇ鱨¹«Ë¾Bad PacketsÒ²²¢Î´·¢Ã÷DKAÍøÂçÉϵı£´æÒ×Êܹ¥»÷µÄVPNÍø¹Ø»ò×°±¸¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/business-giant-dussmann-groups-data-leaked-after-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ