×êÑÐÈËÔ±Åû¶IBMÆóÒµ°²È«Èí¼þÖеÄ4¸ö0day£»ÍÐÂ×˹ÊÐÔâdoppelpaymer¹¥»÷£¬200GBÊý¾Ý±»µÁ
°ä²¼¹¦·ò 2020-04-231.×êÑÐÈËÔ±Åû¶IBMÆóÒµ°²È«Èí¼þÖеÄ4¸ö0day
°²È«×êÑÐÈËÔ±ÔÚ·ÖÎöIBM Data Risk Manager£¨IDRM£©Ê±·¢ÏÖÁË4¸ö0day£¬±ðÀëΪÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶¡¢ºÅÁî×¢Èë·ì϶¡¢²»°²È«µÄĬÈÏÃÜÂë·ì϶ÒÔ¼°ËÁÒâÎļþÏÂÔØ·ì϶¡£ÕâЩ·ì϶Äܹ»µ¥¶ÀʹÓÃÒ²Äܹ»×éºÏʹÓã¬×éºÏʹÓÃǰÈý¸ö·ì϶Äܹ»Ê¹¹¥»÷ÕßÒÔrootȨÏÞÔ¶³ÌÖ´ÐдúÂ룬×éºÏʹÓõÚÒ»¸öºÍµÚËĸö·ì϶Äܹ»Ê¹Î´ÊÚȨµÄ¹¥»÷ÕßÏÂÔØËÁÒâÎļþ¡£·ì϶µÄÅû¶ÕßRibeiro°µÊ¾£¬IDRMÊÇ´¦ÖÃÃô¸ÐÐÅÏ¢µÄÆóÒµ°²È«²úÆ·£¬ÈôÊÇÆäÔâµ½¹¥»÷»áµ¼Ö¹«Ë¾ÀûÒæÑϳÁÊÜËð£¬Òò¶øÔÚIBM»Ø¾ø½ÓÊÜ·ì϶»ã±¨ºóÑ¡Ôñ½«Æä°ä²¼³öÀ´¡£Ä¿Ç°£¬IBM¹«Ë¾½¨¸´ÁËIDRM2.0.1¼°¸ü¸ß°æ±¾ÖеÄËÁÒâÎļþÏÂÔØ·ì϶ºÍºÅÁî×¢Èë·ì϶£¬²¢ÇÒÔÚµ÷²éÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/researcher-discloses-four-ibm-zero-days-after-refusal-to-fix/
2.°²È«³§ÉÌZecOpsÅû¶Apple iOSÖÐ2¸ö0day
°²È«³§ÉÌZecOpsÔÚÉÏÖÜÈýÅû¶ÁËApple iOSÖеÄ2¸ö0day£¬±ðÀëΪԶ³Ì¶ÑÒç¶Âí½ÅºÍÔ½½çдÈë·ì϶£¬·ì϶ӰÏìÁËiOS 6µ½iOS 13.4.1µÄËùÓа汾£¬¶øiOS 6֮ǰµÄ°æ±¾Ò²¿ÉÄÜ»áÊܵ½Ó°Ïì¡£ZecOps×êÑз¢ÏÖ£¬¸Ã·ì϶×Ô2018Äê1ÔÂ±ã´æÔÚ£¬ºÚ¿ÍÄܹ»Í¨¹ýÏòiOS MobileMail·¢ËͶñÒâÓʼþÀ´´¥·¢·ì϶£¬×Ô·ì϶±»·¢ÏÖÒÔÀ´£¬ÖÁÉÙÒѾÓÐÁù¸öºÚ¿Í×éÖ¯ÔÚ×êÑÐÈôºÎÀûÓá£ZecOps°µÊ¾¹¥»÷Õß±ØÒª½áºÏinfoleak·ì϶ºÍÄں˷ì϶ÄÜÁ¦¶ÔIOSÔì³É·çÏÕ£¬¶øApple¹«Ë¾ÖÁ½ñÒÀȻδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/mobile/apple-ios-zero-day-vulnerabilities-exploited-in-targeted-attacks/d/d-id/1337625
3.ÍÐÂ×˹ÊÐÔâdoppelpaymer¹¥»÷£¬200GBÊý¾Ý±»µÁ
ÂåÉ¼í¶µÄÍÐÂ×˹ÊÐÔâµ½ÀÕË÷Èí¼þDoppelPaymer¹¥»÷£¬Æäδ¼ÓÃܵÄÊý¾Ý±»µÁ²¢±»ÀÕË÷100±ÈÌØ±Ò£¨689,147ÃÀÔª£©µÄÊê½ð¡£¹¥»÷²úÉúÔÚ3ÔÂ1ÈÕ£¬DoppelPaymerÍÅ»ïÐû³ÆËûÃǵÁÈ¡Á˳¬¹ý200GBµÄÊý¾Ý£¨Ô̺¬8067¸öĿ¼ÖеÄ269123¸öÎļþ£©²¢ÇÒɾ³ýÁËÍÐÂ×˹Êеı¸·Ý£¬Ö®ºó¶Ô¸ÃÊÐԼĪ150̨·þÎñÆ÷ºÍ500¸ö¹¤×÷Õ¾½øÐÐÁ˼ÓÃÜ¡£BleepingComputerÒÑÓëÍÐÂ×˹ÊÐÁªÏµÒÔÈ·ÈϹ¥»÷£¬µ«Ä¿Ç°Î´ÊÕµ½»Ø¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/
4.ºÚ¿ÍÀûÓüäµýÈí¼þAgent Tesla¹¥»÷È«ÇòÄÜÔ´¹«Ë¾
ºÚ¿Í¼ÙÒâ°£¼°¹¤³Ì³Ð°üÉÌEnppi£¬ÓüäµýÈí¼þAgent Tesla¶ÔÈ«ÇòÁìÓòÄÚµÄÄÜÔ´¹«Ë¾ÌáÒéÓã²æÊ½´¹µö¹¥»÷£¬Êܺ¦ÕßÖØÒªÀ´×ÔʯÓͺÍÌìÈ»Æø¡¢Ä¾Ì¿¼Ó¹¤¡¢Ë®Á¦·¢µçÕ¾¡¢Ô×ÊÁÏÔì×÷ºÍ´óÐÍÉÌÆ·ÔËÊäµÈÐÐÒµ¡£Õâ´Î¹¥»÷ÖØÒªÕë¶ÔλÓÚÂíÀ´Î÷ÑÇ£¬ÃÀ¹ú£¬ÒÁÀÊ£¬ÄÏ·Ç£¬°¢ÂüºÍÍÁ¶úÆäÒÔ¼°·ÆÂɱöµÄ¹«Ë¾£¬×ܹ²ÌáÒéÁËÁ½´Î¡£µÚÒ»´Î¹¥»÷ÊÇÔÚ3ÔÂ31ÈÕÖÁ4ÔÂ6ÈÕ½øÐеģ¬ºÚ¿Í¼ÙÒâEnppiÐû³Æ´ú±íÌìÈ»Æø¹«Ë¾£¨Burullus£©Ô¼ÇëÊܺ¦Õß²ÎÓëRosetta¹²ÏíÉèÊ©ÏîÄ¿£¬²¢ÓÕʹÆä´ò¿ª¼Ù×°³É¸½¼þµÄ¼äµýÈí¼þ¡£µÅ×û§´ò¿ª¸½¼þºó£¬¼äµýÈí¼þÇÔÈ¡Ãô¸ÐÐÅÏ¢ºÍ¸÷ÀàÆ¾Ö¤£¬¶øºó½«ÕâЩÊý¾Ý·¢Ë͵½C2·þÎñÆ÷¡£µÚ¶þ´Î¹¥»÷ÊÇÔÚ4ÔÂ12ÈÕÆðÍ·µÄ£¬ºÚ¿Íͨ¹ýÓʼþ֪ͨÊܺ¦Õß·¢ËÍÔ¤¼Æ¸Û¿ÚÖ§¸¶ÕË»§ÐÅÏ¢£¬Óʼþ¸½¼þÖÐÒÀÈ»Ô̺¬¼äµýÈí¼þAgent Tesla¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/oil-and-gas-agent-tesla-spyware/154973/
5.BeaumontÒ½ÔºÔâºÚ¿Í¹¥»÷£¬³¬¹ý10Íò»¼ÕßÐÅϢй¶
µ×ÌØÂÉÒ½ÁÆ×éÖ¯BeaumontÈ·ÈÏÆäÍøÕ¾Ôâµ½ºÚ¿Í¹¥»÷£¬Ô¼ÄªÓÐ112000Ãû»¼ÕßµÄÐÅÏ¢±»ÇÔ£¬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á±£Ïպš¢Ò½ÁÆÇé¿ö£¬ÉõÖÁ»¹ÓÐһЩÓû§µÄÒøÐÐÕË»§Êý¾ÝºÍ¼ÝÕÕºÅÂë¡£¾ÝϤ£¬ºÚ¿ÍÊÇÔÚ2019Äê5ÔÂ23ÈÕÖÁ2019Äê6ÔÂ3ÈÕ¶ÔÍøÕ¾Ô±¹¤ÌáÒéÍøÂç´¹µö¹¥»÷²¢ÇÔÈ¡Êý¾ÝµÄ£¬¶øBeaumontÒ½ÔºÊÇ3ÔÂ29ÈÕ·¢ÏÖµÄÕâ´Î¹¥»÷¡£µ«BeaumontÒ½Ôº°µÊ¾ÖÁ½ñ±»Ð¹Â¶µÄÊý¾Ý¶¼Ã»Óб»ÀÄÓ㬶øÊܺ¦ÕßÒ²²»¼°Ò½Ôº½üÒ»Ä껼ÕßÊýÁ¿µÄ5%¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/beaumont-health-data-breach/
6.Burning Shed¹«Ë¾ÔâºÚ¿Í¹¥»÷£¬Óû§ÐÅÏ¢±»ÇÔ
¶ÀÁ¢³ªÆ¬¹«Ë¾Burning ShedÔâµ½ºÚ¿Í¹¥»÷£¬ÆäÓû§µÄÓÊÏ䵨ַºÍ¼ÓÃÜÃÜÂë±»ÇÔÈ¡¡£È¥Äê12ÔÂ18ÈÕºÚ¿ÍÇÖÈëÁËBurning Shed´æÓÐЧ»§ÐÅÏ¢µÄÊý¾Ý¿â²¢µÁÈ¡Êý¾Ý£¬ËùÐÒ¸ÃÊý¾Ý¿âÄÚ²¢²»Ô̺¬Óû§ÐÅÓþ¿¨ºÍPayPalµÈ²ÆÕþÐÅÏ¢¡£Burning Shed¹«Ë¾ÊÇÔÚ4ÔÂ17ÈÕ·¢ÏÖÕâ´Î¹¥»÷µÄ£¬²¢Í¨¹ýÓʼþ·î¸æÆäÓû§¡£¸Ã¹«Ë¾°µÊ¾ÒѾ¶ÔÍøÕ¾½øÐÐÍÑ»úÊØ»¤ºÍ°²È«¸üУ¬ÍÑ»ú״̬ԼĪ»áά³Ö48Ó×ʱ£¬Ö®ºóÓû§»á±»ÒªÇó¸ü¸ÄеÄÃÜÂë¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.co.uk/2020/04/21/burning_shed_hacked/


¾©¹«Íø°²±¸11010802024551ºÅ