¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190114

°ä²¼¹¦·ò 2019-01-14
1¡¢NASAÄÚ²¿ÀûÓÃȨÏÞÅäÖÃÃýÎó £¬µ¼ÖÂÔ±¹¤ºÍÏîÄ¿ÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


NASAµÄÄÚ²¿ÀûÓÃJiraÒòÅäÖÃÃýÎóµ¼ÖÂÔ±¹¤µÄÓû§Ãû¡¢ÐÕÃû¡¢µç×ÓÓʼþµØÖ·ºÍÏîÄ¿Ãû³ÆµÈÃô¸ÐÐÅϢй¶¡£JIRAÊÇÒ»¸öÓÉAtlassian¹«Ë¾Ö§³ÖµÄÏîÄ¿ÖÎÀíϵͳ £¬¿É½øÐÐbug¸ú×ٺͻð¿ìÏîÄ¿ÖÎÀí¡£ÖÎÀíÔ±¸ã»ìÁËJiraµÄȨÏÞÉèÖÃEveryoneºÍAll users £¬EveryoneȨÏÞÏÖʵÉÏÔÊÐí»¥ÁªÍøÉϵÄÈκÎÈ˶¼Äܹ»½Ó¼ûÀûÓÃÊý¾Ý £¬¶ø²»ÊÇÖÎÀíÔ±ÒÔΪµÄ×éÖ¯ÄÚµÄÈκÎÈË£¨ÕâÓ¦¸ÃÊÇAll usersȨÏÞ£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/nasa-internal-app-leaked-employee-emails-project-names/


2¡¢ÃÀÂíÈøÖîÈûÖÝÅú¸ÄÊý¾Ýй¶֪ͨ·¨°¸ £¬½«ÓÚ4ÔÂ11ÈÕÉúЧ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ÃÀ¹úÂíÈøÖîÈûÖÝ¶ÔÆäÊý¾Ýй¶֪ͨ·¨°¸½øÐÐÁ˳Á´óµÄÅú¸Ä £¬¸Ã½¨¸Ä°¸½«ÓÚ2019Äê4ÔÂ11ÈÕÉúЧ¡£ÆäÖÐÒ»Ïî³ÁÒªµÄÅú¸ÄÔ̺¬¶Ô²úÉúÊý¾Ýй¶µÄ×éÖ¯Ìá³öÁ˸ü¶àµÄÒªÇó £¬µ±Êý¾Ýй¶ÊÂÎñÉæ¼°µ½ÂíÈøÖîÈûÖݹ«ÃñµÄÉç»á°²È«ºÅÂëʱ £¬¸Ã×éÖ¯±ØÐëÏòÊÜÓ°ÏìµÄ¹«ÃñÌṩ²»ÉÙÓÚ18¸öÔµÄÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ¡£ÆäËü³Á´óÅú¸ÄÔ̺¬¸üÐÂÁË×éÖ¯ÏòÖݼà¹Ü»ú¹¹Ìá½»µÄÐÅÏ¢ÀàÐ͵È¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/massachusetts-enacts-significant-changes-to-its-data-breach-notification-law/


3¡¢AnonymousºÚ¿ÍÒòDDoS¶ùͯҽԺ±»ÅÐÈëÓü³¬¹ý10Äê

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


AnonymousºÚ¿ÍÒòDDoSÁ½¼ÒÒ½ÁÆ»ú¹¹±»Åд¦³¬¹ý10ÄêµÄÓÐÆÚͽÐÌ¡£ÕâÃûºÚ¿ÍÊÇÏÖÄê34ËêµÄÂíÈøÖîÈûÖÝÄÐ×ÓMartin Gottesfeld £¬Ëû±»·¨¹ÙÅд¦·þÐÌ121¸öÔºÍÖ§¸¶½ü44.3ÍòÃÀÔªµÄÅâ³¥½ð¡£2014Äê4Ô £¬GottesfeldʹÓÃÓɳ¬¹ý4Íò¸ö·ÓÉÆ÷×é³ÉµÄ½©Ê¬ÍøÂç¶Ô²¨Ê¿¶Ù¶ùͯҽԺ£¨BCH£©ºÍ·ÇͶ»úÐÔÒ½Öλú¹¹Wayside·¢ÆðDDoS¹¥»÷ £¬ÒÔ¿¹Òé¶ÔÇàÉÙÄ껼ÕßJustina PelletierµÄÒ½ÖÎÐÐΪ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/01/ddos-attack-anonymous-hacker.html


4¡¢Ó¢¹úºÚ¿ÍÒòDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾±»ÅÐÈëÓü32¸öÔÂ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¹úºÚ¿ÍDaniel Kaye£¨29Ë꣩Òò2016ÄêDDoSÀû±ÈÀïÑǵçÐŹ«Ë¾Lonestar¶ø±»ÅÐÈëÓü·þÐÌ32¸öÔ¡£Æ¾¾ÝBBCµÄ±¨Â· £¬LonestarµÄ¾ºÕùµÐÊÖCellcomµÄÒ»ÃûÔ±¹¤Æ¸ÓÃÁËKayeÀ´¶ÔLonestar½øÐÐDDoS¹¥»÷ £¬Ã¿ÔÂÏòÆäÖ§¸¶¸ß´ï1ÍòÃÀÔª£¨7800Ó¢°÷£©µÄÓöÈ¡£¸Ã¹¥»÷ʹµÃÎ÷·Ç¹ú¶ÈµÄ»¥ÁªÍø½ÓÈëÖжÏ £¬¸øLonestarÔì³ÉÁËÊýǧÍòÃÀÔªµÄËðʧ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/79781/breaking-news/british-hacker-sentenced-liberian-attack.html


5¡¢ÐÂ×êÑÐÅú×¢ÀÕË÷Èí¼þRyuk±³ºó¿ÉÄÜÊǶíÂÞ˹·¸×ïÍÅ»ï

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝCrowdstrike¡¢FireEye¡¢Kryptos LogicºÍMcAfee°ä²¼µÄ»ã±¨ £¬ÀÕË÷Èí¼þRyuk±³ºóºÜÓпÉÄÜÊǽðÇ®¶¯»úµÄ¶íÂÞ˹·¸×ïÍÅ»ï £¬¶ø²»ÊÇ֮ǰÐÂÎÅýÌ屨·µÄ³¯ÏʺڿÍ¡£Ö¤¾ÝÅú×¢RyukÊÇÓÉCrowdstrike³ÆÖ®ÎªGrim SpiderµÄ·¸×ïÍŻﴴ½¨µÄ £¬¸ÃÍÅ»ï´ÓºÚ¿ÍÂÛ̳ÉϲɰìÁËÀÕË÷Èí¼þHermesµÄÒ»¸ö±äÖÖ £¬²¢¶¨Ô컯Åú¸ÄΪ×Ô¼ºµÄÀÕË÷Èí¼þRyuk¡£×êÑÐÈËÔ±ÒÔΪ £¬³¯ÏʺڿʹӺڿÍÂÛ̳ÉϲɰìÁËͳһ¸öHermes±äÖÖ £¬µ«ËûÃÇÓëRyukÖ®¼äûÓÐÈκθÉÁª¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ryuk-ransomware-gang-probably-russian-not-north-korean/


6¡¢ÐéαµçÓ°Îļþ¿ÉÇÔÈ¡¼ÓÃÜÇ®±ÒºÍÅú¸ÄGoogleËÑË÷Á˾Ö

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



×êÑÐÈËÔ±´Óº£µÁÍå¸ßµÍÔØµçӰʱ·¢ÏÖÒ»¸ö¼Ù×°³ÉµçÓ°ÎļþµÄ¶ñÒâWindows¿ì½Ý·½Ê½Îļþ £¬¸ÃÎļþÓÃÓÚÖ´ÐÐPowerShellºÅÁî £¬Äܹ»½«¹¥»÷ÕßµÄÄÚÈÝ×¢È뵽ά»ù°Ù¿Æ¡¢GoogleºÍYandexËÑË÷Á˾ֵÈ £¬»¹Äܹ»ÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¶ñÒâÈí¼þ»áÅú¸Ä×¢²á±íÏîÒÔ½ûÓÃWindows Defender £¬»¹Äܹ»ÔÚFirefoxÖÐÇ¿Ôì×°ÖÃÀ©´óFirefox Protection £¬²¢½Ù³ÖChromeÀ©´óChrome Media Router¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-movie-file-infects-pc-to-steal-cryptocurrency-poison-google-results/


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù